debian-mirror-gitlab/app/models/project.rb

1500 lines
42 KiB
Ruby
Raw Normal View History

2015-04-26 12:48:37 +05:30
require 'carrierwave/orm/activerecord'
2014-09-02 18:07:02 +05:30
class Project < ActiveRecord::Base
2015-09-11 14:41:01 +05:30
include Gitlab::ConfigHelper
2014-09-02 18:07:02 +05:30
include Gitlab::ShellAdapter
include Gitlab::VisibilityLevel
2015-11-26 14:37:03 +05:30
include Gitlab::CurrentSettings
include AccessRequestable
2017-09-10 17:25:29 +05:30
include Avatarable
2016-11-03 12:29:30 +05:30
include CacheMarkdownField
2015-09-11 14:41:01 +05:30
include Referable
include Sortable
2015-10-24 18:46:33 +05:30
include AfterCommitQueue
include CaseSensitivity
include TokenAuthenticatable
2017-08-17 22:00:37 +05:30
include ValidAttribute
2016-09-29 09:46:39 +05:30
include ProjectFeaturesCompatibility
2017-08-17 22:00:37 +05:30
include SelectForProjectAuthorization
include Routable
2017-09-10 17:25:29 +05:30
include Storage::LegacyProject
2015-12-23 02:04:40 +05:30
2014-09-02 18:07:02 +05:30
extend Gitlab::ConfigHelper
2017-08-17 22:00:37 +05:30
BoardLimitExceeded = Class.new(StandardError)
2016-11-03 12:29:30 +05:30
NUMBER_OF_PERMITTED_BOARDS = 1
2017-08-17 22:00:37 +05:30
UNKNOWN_IMPORT_URL = 'http://unknown.git'.freeze
2015-09-25 12:07:36 +05:30
2016-11-03 12:29:30 +05:30
cache_markdown_field :description, pipeline: :description
2017-08-17 22:00:37 +05:30
delegate :feature_available?, :builds_enabled?, :wiki_enabled?,
:merge_requests_enabled?, :issues_enabled?, to: :project_feature,
allow_nil: true
2016-09-29 09:46:39 +05:30
2014-09-02 18:07:02 +05:30
default_value_for :archived, false
default_value_for :visibility_level, gitlab_config_features.visibility_level
2016-06-02 11:05:42 +05:30
default_value_for :container_registry_enabled, gitlab_config_features.container_registry
2016-11-24 13:41:30 +05:30
default_value_for(:repository_storage) { current_application_settings.pick_repository_storage }
2015-12-23 02:04:40 +05:30
default_value_for(:shared_runners_enabled) { current_application_settings.shared_runners_enabled }
2016-11-24 13:41:30 +05:30
default_value_for :issues_enabled, gitlab_config_features.issues
default_value_for :merge_requests_enabled, gitlab_config_features.merge_requests
default_value_for :builds_enabled, gitlab_config_features.builds
default_value_for :wiki_enabled, gitlab_config_features.wiki
default_value_for :snippets_enabled, gitlab_config_features.snippets
2017-08-17 22:00:37 +05:30
default_value_for :only_allow_merge_if_all_discussions_are_resolved, false
2014-09-02 18:07:02 +05:30
2017-09-10 17:25:29 +05:30
after_create :ensure_storage_path_exist
2016-11-03 12:29:30 +05:30
after_create :create_project_feature, unless: :project_feature
2017-08-17 22:00:37 +05:30
after_save :update_project_statistics, if: :namespace_id_changed?
2016-08-24 12:49:21 +05:30
2015-04-26 12:48:37 +05:30
# set last_activity_at to the same as created_at
after_create :set_last_activity_at
def set_last_activity_at
update_column(:last_activity_at, self.created_at)
end
2017-08-17 22:00:37 +05:30
after_create :set_last_repository_updated_at
def set_last_repository_updated_at
update_column(:last_repository_updated_at, self.created_at)
end
2017-09-10 17:25:29 +05:30
before_destroy :remove_private_deploy_keys
after_destroy -> { run_after_commit { remove_pages } }
2017-08-17 22:00:37 +05:30
2016-06-02 11:05:42 +05:30
# update visibility_level of forks
after_update :update_forks_visibility_level
2017-08-17 22:00:37 +05:30
after_validation :check_pending_delete
2017-09-10 17:25:29 +05:30
# Legacy Storage specific hooks
after_save :ensure_storage_path_exist, if: :namespace_id_changed?
2017-08-17 22:00:37 +05:30
acts_as_taggable
2014-09-02 18:07:02 +05:30
attr_accessor :new_default_branch
attr_accessor :old_path_with_namespace
2017-09-10 17:25:29 +05:30
attr_accessor :template_name
2017-08-17 22:00:37 +05:30
attr_writer :pipeline_status
2014-09-02 18:07:02 +05:30
2016-06-02 11:05:42 +05:30
alias_attribute :title, :name
2014-09-02 18:07:02 +05:30
# Relations
2017-08-17 22:00:37 +05:30
belongs_to :creator, class_name: 'User'
2016-09-29 09:46:39 +05:30
belongs_to :group, -> { where(type: 'Group') }, foreign_key: 'namespace_id'
2014-09-02 18:07:02 +05:30
belongs_to :namespace
2017-08-17 22:00:37 +05:30
has_one :last_event, -> {order 'events.created_at DESC'}, class_name: 'Event'
2017-09-10 17:25:29 +05:30
has_many :boards, before_add: :validate_board_limit
2016-09-29 09:46:39 +05:30
2014-09-02 18:07:02 +05:30
# Project services
2017-09-10 17:25:29 +05:30
has_one :campfire_service
has_one :drone_ci_service
has_one :emails_on_push_service
has_one :pipelines_email_service
has_one :irker_service
has_one :pivotaltracker_service
has_one :hipchat_service
has_one :flowdock_service
has_one :assembla_service
has_one :asana_service
has_one :gemnasium_service
has_one :mattermost_slash_commands_service
has_one :mattermost_service
has_one :slack_slash_commands_service
has_one :slack_service
has_one :buildkite_service
has_one :bamboo_service
has_one :teamcity_service
has_one :pushover_service
has_one :jira_service
has_one :redmine_service
has_one :custom_issue_tracker_service
has_one :bugzilla_service
has_one :gitlab_issue_tracker_service, inverse_of: :project
has_one :external_wiki_service
has_one :kubernetes_service, inverse_of: :project
has_one :prometheus_service, inverse_of: :project
has_one :mock_ci_service
has_one :mock_deployment_service
has_one :mock_monitoring_service
has_one :microsoft_teams_service
has_one :forked_project_link, foreign_key: "forked_to_project_id"
has_one :forked_from_project, through: :forked_project_link
has_many :forked_project_links, foreign_key: "forked_from_project_id"
has_many :forks, through: :forked_project_links, source: :forked_to_project
2015-04-26 12:48:37 +05:30
2014-09-02 18:07:02 +05:30
# Merge Requests for target project should be removed with it
2017-09-10 17:25:29 +05:30
has_many :merge_requests, foreign_key: 'target_project_id'
has_many :issues
has_many :labels, class_name: 'ProjectLabel'
has_many :services
has_many :events
has_many :milestones
has_many :notes
has_many :snippets, class_name: 'ProjectSnippet'
has_many :hooks, class_name: 'ProjectHook'
has_many :protected_branches
has_many :protected_tags
2016-08-24 12:49:21 +05:30
2017-08-17 22:00:37 +05:30
has_many :project_authorizations
has_many :authorized_users, through: :project_authorizations, source: :user, class_name: 'User'
2017-09-10 17:25:29 +05:30
has_many :project_members, -> { where(requested_at: nil) },
as: :source, dependent: :delete_all # rubocop:disable Cop/ActiveRecordDependent
alias_method :members, :project_members
2016-08-24 12:49:21 +05:30
has_many :users, through: :project_members
2017-09-10 17:25:29 +05:30
has_many :requesters, -> { where.not(requested_at: nil) },
as: :source, class_name: 'ProjectMember', dependent: :delete_all # rubocop:disable Cop/ActiveRecordDependent
2016-08-24 12:49:21 +05:30
2017-09-10 17:25:29 +05:30
has_many :deploy_keys_projects
2014-09-02 18:07:02 +05:30
has_many :deploy_keys, through: :deploy_keys_projects
2017-09-10 17:25:29 +05:30
has_many :users_star_projects
2014-09-02 18:07:02 +05:30
has_many :starrers, through: :users_star_projects, source: :user
2017-09-10 17:25:29 +05:30
has_many :releases
has_many :lfs_objects_projects, dependent: :destroy # rubocop:disable Cop/ActiveRecordDependent
2015-11-26 14:37:03 +05:30
has_many :lfs_objects, through: :lfs_objects_projects
2017-09-10 17:25:29 +05:30
has_many :project_group_links
2016-06-02 11:05:42 +05:30
has_many :invited_groups, through: :project_group_links, source: :group
2017-09-10 17:25:29 +05:30
has_many :pages_domains
has_many :todos
has_many :notification_settings, as: :source, dependent: :delete_all # rubocop:disable Cop/ActiveRecordDependent
has_one :import_data, class_name: 'ProjectImportData', inverse_of: :project, autosave: true
has_one :project_feature
has_one :statistics, class_name: 'ProjectStatistics'
# Container repositories need to remove data from the container registry,
# which is not managed by the DB. Hence we're still using dependent: :destroy
# here.
has_many :container_repositories, dependent: :destroy # rubocop:disable Cop/ActiveRecordDependent
has_many :commit_statuses
has_many :pipelines, class_name: 'Ci::Pipeline'
# Ci::Build objects store data on the file system such as artifact files and
# build traces. Currently there's no efficient way of removing this data in
# bulk that doesn't involve loading the rows into memory. As a result we're
# still using `dependent: :destroy` here.
has_many :builds, class_name: 'Ci::Build', dependent: :destroy # rubocop:disable Cop/ActiveRecordDependent
has_many :runner_projects, class_name: 'Ci::RunnerProject'
2015-12-23 02:04:40 +05:30
has_many :runners, through: :runner_projects, source: :runner, class_name: 'Ci::Runner'
2017-09-10 17:25:29 +05:30
has_many :variables, class_name: 'Ci::Variable'
has_many :triggers, class_name: 'Ci::Trigger'
has_many :environments
has_many :deployments
has_many :pipeline_schedules, class_name: 'Ci::PipelineSchedule'
2017-08-17 22:00:37 +05:30
has_many :active_runners, -> { active }, through: :runner_projects, source: :runner, class_name: 'Ci::Runner'
2015-12-23 02:04:40 +05:30
accepts_nested_attributes_for :variables, allow_destroy: true
2016-09-29 09:46:39 +05:30
accepts_nested_attributes_for :project_feature
2017-09-10 17:25:29 +05:30
accepts_nested_attributes_for :import_data
2015-04-26 12:48:37 +05:30
2014-09-02 18:07:02 +05:30
delegate :name, to: :owner, allow_nil: true, prefix: true
delegate :members, to: :team, prefix: true
2017-08-17 22:00:37 +05:30
delegate :add_user, :add_users, to: :team
delegate :add_guest, :add_reporter, :add_developer, :add_master, to: :team
delegate :empty_repo?, to: :repository
2014-09-02 18:07:02 +05:30
# Validations
validates :creator, presence: true, on: :create
validates :description, length: { maximum: 2000 }, allow_blank: true
2017-09-10 17:25:29 +05:30
validates :ci_config_path,
format: { without: /\.{2}/,
message: 'cannot include directory traversal.' },
length: { maximum: 255 },
allow_blank: true
2015-04-26 12:48:37 +05:30
validates :name,
presence: true,
2017-08-17 22:00:37 +05:30
length: { maximum: 255 },
2015-04-26 12:48:37 +05:30
format: { with: Gitlab::Regex.project_name_regex,
message: Gitlab::Regex.project_name_regex_message }
validates :path,
presence: true,
2017-08-17 22:00:37 +05:30
dynamic_path: true,
length: { maximum: 255 },
2017-09-10 17:25:29 +05:30
format: { with: Gitlab::PathRegex.project_path_format_regex,
message: Gitlab::PathRegex.project_path_format_message },
2017-08-17 22:00:37 +05:30
uniqueness: { scope: :namespace_id }
2014-09-02 18:07:02 +05:30
validates :namespace, presence: true
2017-08-17 22:00:37 +05:30
validates :name, uniqueness: { scope: :namespace_id }
2016-08-24 12:49:21 +05:30
validates :import_url, addressable_url: true, if: :external_import?
2017-08-17 22:00:37 +05:30
validates :import_url, importable_url: true, if: [:external_import?, :import_url_changed?]
2014-09-02 18:07:02 +05:30
validates :star_count, numericality: { greater_than_or_equal_to: 0 }
validate :check_limit, on: :create
2015-04-26 12:48:37 +05:30
validate :avatar_type,
2015-09-11 14:41:01 +05:30
if: ->(project) { project.avatar.present? && project.avatar_changed? }
2015-04-26 12:48:37 +05:30
validates :avatar, file_size: { maximum: 200.kilobytes.to_i }
2016-06-02 11:05:42 +05:30
validate :visibility_level_allowed_by_group
validate :visibility_level_allowed_as_fork
2016-08-24 12:49:21 +05:30
validate :check_wiki_path_conflict
validates :repository_storage,
presence: true,
inclusion: { in: ->(_object) { Gitlab.config.repositories.storages.keys } }
2015-04-26 12:48:37 +05:30
add_authentication_token_field :runners_token
before_save :ensure_runners_token
2015-12-23 02:04:40 +05:30
2015-04-26 12:48:37 +05:30
mount_uploader :avatar, AvatarUploader
2017-09-10 17:25:29 +05:30
has_many :uploads, as: :model, dependent: :destroy # rubocop:disable Cop/ActiveRecordDependent
2014-09-02 18:07:02 +05:30
# Scopes
2017-09-10 17:25:29 +05:30
scope :pending_delete, -> { where(pending_delete: true) }
scope :without_deleted, -> { where(pending_delete: false) }
2017-08-17 22:00:37 +05:30
2015-04-26 12:48:37 +05:30
scope :sorted_by_activity, -> { reorder(last_activity_at: :desc) }
scope :sorted_by_stars, -> { reorder('projects.star_count DESC') }
2015-09-11 14:41:01 +05:30
scope :in_namespace, ->(namespace_ids) { where(namespace_id: namespace_ids) }
2014-09-02 18:07:02 +05:30
scope :personal, ->(user) { where(namespace_id: user.namespace_id) }
2015-04-26 12:48:37 +05:30
scope :joined, ->(user) { where('namespace_id != ?', user.namespace_id) }
2017-09-10 17:25:29 +05:30
scope :starred_by, ->(user) { joins(:users_star_projects).where('users_star_projects.user_id': user.id) }
2016-06-02 11:05:42 +05:30
scope :visible_to_user, ->(user) { where(id: user.authorized_projects.select(:id).reorder(nil)) }
2014-09-02 18:07:02 +05:30
scope :non_archived, -> { where(archived: false) }
2016-06-02 11:05:42 +05:30
scope :for_milestones, ->(ids) { joins(:milestones).where('milestones.id' => ids).distinct }
scope :with_push, -> { joins(:events).where('events.action = ?', Event::PUSHED) }
2016-11-24 13:41:30 +05:30
scope :with_project_feature, -> { joins('LEFT JOIN project_features ON projects.id = project_features.project_id') }
2017-08-17 22:00:37 +05:30
scope :with_statistics, -> { includes(:statistics) }
scope :with_shared_runners, -> { where(shared_runners_enabled: true) }
scope :inside_path, ->(path) do
# We need routes alias rs for JOIN so it does not conflict with
# includes(:route) which we use in ProjectsFinder.
2017-09-10 17:25:29 +05:30
joins("INNER JOIN routes rs ON rs.source_id = projects.id AND rs.source_type = 'Project'")
.where('rs.path LIKE ?', "#{sanitize_sql_like(path)}/%")
2017-08-17 22:00:37 +05:30
end
2016-11-24 13:41:30 +05:30
# "enabled" here means "not disabled". It includes private features!
scope :with_feature_enabled, ->(feature) {
access_level_attribute = ProjectFeature.access_level_attribute(feature)
with_project_feature.where(project_features: { access_level_attribute => [nil, ProjectFeature::PRIVATE, ProjectFeature::ENABLED] })
}
# Picks a feature where the level is exactly that given.
scope :with_feature_access_level, ->(feature, level) {
access_level_attribute = ProjectFeature.access_level_attribute(feature)
with_project_feature.where(project_features: { access_level_attribute => level })
}
scope :with_builds_enabled, -> { with_feature_enabled(:builds) }
scope :with_issues_enabled, -> { with_feature_enabled(:issues) }
2017-09-10 17:25:29 +05:30
scope :with_merge_requests_enabled, -> { with_feature_enabled(:merge_requests) }
2016-11-24 13:41:30 +05:30
2017-08-17 22:00:37 +05:30
enum auto_cancel_pending_pipelines: { disabled: 0, enabled: 1 }
2017-09-10 17:25:29 +05:30
# Returns a collection of projects that is either public or visible to the
# logged in user.
def self.public_or_visible_to_user(user = nil)
if user
authorized = user
.project_authorizations
.select(1)
.where('project_authorizations.project_id = projects.id')
levels = Gitlab::VisibilityLevel.levels_for_user(user)
where('EXISTS (?) OR projects.visibility_level IN (?)', authorized, levels)
else
public_to_user
end
end
2016-11-24 13:41:30 +05:30
# project features may be "disabled", "internal" or "enabled". If "internal",
# they are only available to team members. This scope returns projects where
# the feature is either enabled, or internal with permission for the user.
2017-09-10 17:25:29 +05:30
#
# This method uses an optimised version of `with_feature_access_level` for
# logged in users to more efficiently get private projects with the given
# feature.
2016-11-24 13:41:30 +05:30
def self.with_feature_available_for_user(feature, user)
2017-09-10 17:25:29 +05:30
visible = [nil, ProjectFeature::ENABLED]
2016-11-24 13:41:30 +05:30
2017-09-10 17:25:29 +05:30
if user&.admin?
with_feature_enabled(feature)
elsif user
column = ProjectFeature.quoted_access_level_column(feature)
2016-11-24 13:41:30 +05:30
2017-09-10 17:25:29 +05:30
authorized = user.project_authorizations.select(1)
.where('project_authorizations.project_id = projects.id')
2016-11-24 13:41:30 +05:30
2017-09-10 17:25:29 +05:30
with_project_feature
.where("#{column} IN (?) OR (#{column} = ? AND EXISTS (?))",
visible,
ProjectFeature::PRIVATE,
authorized)
else
with_feature_access_level(feature, visible)
end
2016-11-24 13:41:30 +05:30
end
2016-09-29 09:46:39 +05:30
2016-06-02 11:05:42 +05:30
scope :active, -> { joins(:issues, :notes, :merge_requests).order('issues.created_at, notes.created_at, merge_requests.created_at DESC') }
scope :abandoned, -> { where('projects.last_activity_at < ?', 6.months.ago) }
2014-09-02 18:07:02 +05:30
2016-09-13 17:45:13 +05:30
scope :excluding_project, ->(project) { where.not(id: project) }
2014-09-02 18:07:02 +05:30
state_machine :import_status, initial: :none do
2017-09-10 17:25:29 +05:30
event :import_schedule do
transition [:none, :finished, :failed] => :scheduled
end
event :force_import_start do
transition [:none, :finished, :failed] => :started
end
2014-09-02 18:07:02 +05:30
event :import_start do
2017-09-10 17:25:29 +05:30
transition scheduled: :started
2014-09-02 18:07:02 +05:30
end
event :import_finish do
2015-04-26 12:48:37 +05:30
transition started: :finished
2014-09-02 18:07:02 +05:30
end
event :import_fail do
2017-09-10 17:25:29 +05:30
transition [:scheduled, :started] => :failed
2014-09-02 18:07:02 +05:30
end
event :import_retry do
2015-04-26 12:48:37 +05:30
transition failed: :started
2014-09-02 18:07:02 +05:30
end
2017-09-10 17:25:29 +05:30
state :scheduled
2014-09-02 18:07:02 +05:30
state :started
state :finished
state :failed
2017-09-10 17:25:29 +05:30
after_transition [:none, :finished, :failed] => :scheduled do |project, _|
project.run_after_commit { add_import_job }
end
after_transition started: :finished do |project, _|
project.reset_cache_and_import_attrs
if Gitlab::ImportSources.importer_names.include?(project.import_type) && project.repo_exists?
project.run_after_commit do
begin
Projects::HousekeepingService.new(project).execute
rescue Projects::HousekeepingService::LeaseTaken => e
Rails.logger.info("Could not perform housekeeping for project #{project.full_path} (#{project.id}): #{e}")
end
end
end
end
2014-09-02 18:07:02 +05:30
end
class << self
2016-06-02 11:05:42 +05:30
# Searches for a list of projects based on the query given in `query`.
#
# On PostgreSQL this method uses "ILIKE" to perform a case-insensitive
# search. On MySQL a regular "LIKE" is used as it's already
# case-insensitive.
#
# query - The search query as a String.
def search(query)
ptable = arel_table
ntable = Namespace.arel_table
pattern = "%#{query}%"
2017-08-17 22:00:37 +05:30
# unscoping unnecessary conditions that'll be applied
# when executing `where("projects.id IN (#{union.to_sql})")`
projects = unscoped.select(:id).where(
2017-09-10 17:25:29 +05:30
ptable[:path].matches(pattern)
.or(ptable[:name].matches(pattern))
.or(ptable[:description].matches(pattern))
2016-06-02 11:05:42 +05:30
)
2017-09-10 17:25:29 +05:30
namespaces = unscoped.select(:id)
.joins(:namespace)
.where(ntable[:name].matches(pattern))
2014-09-02 18:07:02 +05:30
2016-06-02 11:05:42 +05:30
union = Gitlab::SQL::Union.new([projects, namespaces])
2014-09-02 18:07:02 +05:30
2016-06-02 11:05:42 +05:30
where("projects.id IN (#{union.to_sql})")
2014-09-02 18:07:02 +05:30
end
2015-04-26 12:48:37 +05:30
def search_by_title(query)
2016-06-02 11:05:42 +05:30
pattern = "%#{query}%"
table = Project.arel_table
non_archived.where(table[:name].matches(pattern))
2014-09-02 18:07:02 +05:30
end
def visibility_levels
Gitlab::VisibilityLevel.options
end
def sort(method)
2017-08-17 22:00:37 +05:30
case method.to_s
when 'storage_size_desc'
# storage_size is a joined column so we need to
# pass a string to avoid AR adding the table name
reorder('project_statistics.storage_size DESC, projects.id DESC')
when 'latest_activity_desc'
reorder(last_activity_at: :desc)
when 'latest_activity_asc'
reorder(last_activity_at: :asc)
2015-04-26 12:48:37 +05:30
else
order_by(method)
2014-09-02 18:07:02 +05:30
end
end
2015-09-11 14:41:01 +05:30
def reference_pattern
2017-08-17 22:00:37 +05:30
%r{
2017-09-10 17:25:29 +05:30
((?<namespace>#{Gitlab::PathRegex::FULL_NAMESPACE_FORMAT_REGEX})\/)?
(?<project>#{Gitlab::PathRegex::PROJECT_PATH_FORMAT_REGEX})
2017-08-17 22:00:37 +05:30
}x
2015-09-11 14:41:01 +05:30
end
2015-10-24 18:46:33 +05:30
2016-11-03 12:29:30 +05:30
def trending
2017-09-10 17:25:29 +05:30
joins('INNER JOIN trending_projects ON projects.id = trending_projects.project_id')
.reorder('trending_projects.id ASC')
2015-10-24 18:46:33 +05:30
end
2016-06-22 15:30:34 +05:30
2016-08-24 12:49:21 +05:30
def cached_count
Rails.cache.fetch('total_project_count', expires_in: 5.minutes) do
Project.count
end
2016-06-22 15:30:34 +05:30
end
2016-11-03 12:29:30 +05:30
def group_ids
2016-11-24 13:41:30 +05:30
joins(:namespace).where(namespaces: { type: 'Group' }).select(:namespace_id)
2016-11-03 12:29:30 +05:30
end
2014-09-02 18:07:02 +05:30
end
2016-09-29 09:46:39 +05:30
def lfs_enabled?
return namespace.lfs_enabled? if self[:lfs_enabled].nil?
self[:lfs_enabled] && Gitlab.config.lfs.enabled
end
2016-08-24 12:49:21 +05:30
def repository_storage_path
2017-09-10 17:25:29 +05:30
Gitlab.config.repositories.storages[repository_storage].try(:[], 'path')
2016-08-24 12:49:21 +05:30
end
2014-09-02 18:07:02 +05:30
def team
@team ||= ProjectTeam.new(self)
end
def repository
2017-09-10 17:25:29 +05:30
@repository ||= Repository.new(full_path, self, disk_path: disk_path)
2015-09-11 14:41:01 +05:30
end
2017-08-17 22:00:37 +05:30
def container_registry_url
2016-06-02 11:05:42 +05:30
if Gitlab.config.registry.enabled
2017-09-10 17:25:29 +05:30
"#{Gitlab.config.registry.host_port}/#{full_path.downcase}"
2016-06-02 11:05:42 +05:30
end
end
def has_container_registry_tags?
2017-09-10 17:25:29 +05:30
return @images if defined?(@images)
@images = container_repositories.to_a.any?(&:has_tags?) ||
2017-08-17 22:00:37 +05:30
has_root_container_repository_tags?
2016-06-02 11:05:42 +05:30
end
2016-08-24 12:49:21 +05:30
def commit(ref = 'HEAD')
repository.commit(ref)
end
# ref can't be HEAD, can only be branch/tag name or SHA
def latest_successful_builds_for(ref = default_branch)
2016-09-29 09:46:39 +05:30
latest_pipeline = pipelines.latest_successful_for(ref)
2016-08-24 12:49:21 +05:30
if latest_pipeline
latest_pipeline.builds.latest.with_artifacts
else
builds.none
end
2014-09-02 18:07:02 +05:30
end
2016-02-05 20:25:01 +05:30
def merge_base_commit(first_commit_id, second_commit_id)
sha = repository.merge_base(first_commit_id, second_commit_id)
repository.commit(sha) if sha
end
2014-09-02 18:07:02 +05:30
def saved?
id && persisted?
end
def add_import_job
2017-08-17 22:00:37 +05:30
job_id =
if forked?
RepositoryForkWorker.perform_async(id, forked_from_project.repository_storage_path,
2017-09-10 17:25:29 +05:30
forked_from_project.full_path,
2017-08-17 22:00:37 +05:30
self.namespace.full_path)
else
RepositoryImportWorker.perform_async(self.id)
end
2016-06-02 11:05:42 +05:30
if job_id
2017-09-10 17:25:29 +05:30
Rails.logger.info "Import job started for #{full_path} with job ID #{job_id}"
2015-09-25 12:07:36 +05:30
else
2017-09-10 17:25:29 +05:30
Rails.logger.error "Import job failed to start for #{full_path}"
2015-09-25 12:07:36 +05:30
end
2014-09-02 18:07:02 +05:30
end
2016-06-02 11:05:42 +05:30
def reset_cache_and_import_attrs
2017-09-10 17:25:29 +05:30
run_after_commit do
ProjectCacheWorker.perform_async(self.id)
end
remove_import_data
end
2015-11-26 14:37:03 +05:30
2017-09-10 17:25:29 +05:30
# This method is overriden in EE::Project model
def remove_import_data
import_data&.destroy
end
def ci_config_path=(value)
# Strip all leading slashes so that //foo -> foo
super(value&.sub(%r{\A/+}, '')&.delete("\0"))
2015-04-26 12:48:37 +05:30
end
2016-06-02 11:05:42 +05:30
def import_url=(value)
2016-08-24 12:49:21 +05:30
return super(value) unless Gitlab::UrlSanitizer.valid?(value)
2016-06-02 11:05:42 +05:30
import_url = Gitlab::UrlSanitizer.new(value)
super(import_url.sanitized_url)
2016-08-24 12:49:21 +05:30
create_or_update_import_data(credentials: import_url.credentials)
2016-06-02 11:05:42 +05:30
end
def import_url
2016-11-03 12:29:30 +05:30
if import_data && super.present?
2016-06-02 11:05:42 +05:30
import_url = Gitlab::UrlSanitizer.new(super, credentials: import_data.credentials)
import_url.full_url
else
super
end
end
2016-08-24 12:49:21 +05:30
def valid_import_url?
2017-09-10 17:25:29 +05:30
valid?(:import_url) || errors.messages[:import_url].nil?
2016-08-24 12:49:21 +05:30
end
2016-06-02 11:05:42 +05:30
def create_or_update_import_data(data: nil, credentials: nil)
2016-08-24 12:49:21 +05:30
return unless import_url.present? && valid_import_url?
2016-06-02 11:05:42 +05:30
project_import_data = import_data || build_import_data
if data
project_import_data.data ||= {}
project_import_data.data = project_import_data.data.merge(data)
end
if credentials
project_import_data.credentials ||= {}
project_import_data.credentials = project_import_data.credentials.merge(credentials)
end
end
2014-09-02 18:07:02 +05:30
def import?
2016-06-22 15:30:34 +05:30
external_import? || forked? || gitlab_project_import?
2015-09-25 12:07:36 +05:30
end
2016-04-02 18:10:28 +05:30
def no_import?
import_status == 'none'
end
2015-09-25 12:07:36 +05:30
def external_import?
2014-09-02 18:07:02 +05:30
import_url.present?
end
def imported?
import_finished?
end
def import_in_progress?
2017-09-10 17:25:29 +05:30
import_started? || import_scheduled?
end
def import_started?
2014-09-02 18:07:02 +05:30
import? && import_status == 'started'
end
2017-09-10 17:25:29 +05:30
def import_scheduled?
import_status == 'scheduled'
end
2014-09-02 18:07:02 +05:30
def import_failed?
import_status == 'failed'
end
def import_finished?
import_status == 'finished'
end
2015-11-26 14:37:03 +05:30
def safe_import_url
2016-06-02 11:05:42 +05:30
Gitlab::UrlSanitizer.new(import_url).masked_url
2015-11-26 14:37:03 +05:30
end
2016-06-22 15:30:34 +05:30
def gitlab_project_import?
import_type == 'gitlab_project'
end
2017-08-17 22:00:37 +05:30
def gitea_import?
import_type == 'gitea'
end
def github_import?
import_type == 'github'
end
2014-09-02 18:07:02 +05:30
def check_limit
2017-08-17 22:00:37 +05:30
unless creator.can_create_project? || namespace.kind == 'group'
projects_limit = creator.projects_limit
if projects_limit == 0
self.errors.add(:limit_reached, "Personal project creation is not allowed. Please contact your administrator with questions")
else
self.errors.add(:limit_reached, "Your project limit is #{projects_limit} projects! Please contact your administrator to increase it")
end
2014-09-02 18:07:02 +05:30
end
rescue
2016-06-02 11:05:42 +05:30
self.errors.add(:base, "Can't check your ability to create project")
end
def visibility_level_allowed_by_group
return if visibility_level_allowed_by_group?
level_name = Gitlab::VisibilityLevel.level_name(self.visibility_level).downcase
group_level_name = Gitlab::VisibilityLevel.level_name(self.group.visibility_level).downcase
self.errors.add(:visibility_level, "#{level_name} is not allowed in a #{group_level_name} group.")
end
def visibility_level_allowed_as_fork
return if visibility_level_allowed_as_fork?
level_name = Gitlab::VisibilityLevel.level_name(self.visibility_level).downcase
self.errors.add(:visibility_level, "#{level_name} is not allowed since the fork source project has lower visibility.")
2014-09-02 18:07:02 +05:30
end
2016-08-24 12:49:21 +05:30
def check_wiki_path_conflict
return if path.blank?
path_to_check = path.ends_with?('.wiki') ? path.chomp('.wiki') : "#{path}.wiki"
if Project.where(namespace_id: namespace_id, path: path_to_check).exists?
errors.add(:name, 'has already been taken')
end
end
2014-09-02 18:07:02 +05:30
def to_param
2016-09-13 17:45:13 +05:30
if persisted? && errors.include?(:path)
path_was
else
path
end
2014-09-02 18:07:02 +05:30
end
2017-08-17 22:00:37 +05:30
# `from` argument can be a Namespace or Project.
def to_reference(from = nil, full: false)
if full || cross_namespace_reference?(from)
2017-09-10 17:25:29 +05:30
full_path
2017-08-17 22:00:37 +05:30
elsif cross_project_reference?(from)
path
end
2015-09-11 14:41:01 +05:30
end
2017-08-17 22:00:37 +05:30
def to_human_reference(from_project = nil)
if cross_namespace_reference?(from_project)
name_with_namespace
elsif cross_project_reference?(from_project)
name
end
2014-09-02 18:07:02 +05:30
end
2017-08-17 22:00:37 +05:30
def web_url
2017-09-10 17:25:29 +05:30
Gitlab::Routing.url_helpers.project_url(self)
2014-09-02 18:07:02 +05:30
end
2016-09-13 17:45:13 +05:30
def new_issue_address(author)
2017-08-17 22:00:37 +05:30
return unless Gitlab::IncomingEmail.supports_issue_creation? && author
2016-09-13 17:45:13 +05:30
2017-08-17 22:00:37 +05:30
author.ensure_incoming_email_token!
Gitlab::IncomingEmail.reply_address(
2017-09-10 17:25:29 +05:30
"#{full_path}+#{author.incoming_email_token}")
2016-09-13 17:45:13 +05:30
end
2014-09-02 18:07:02 +05:30
def build_commit_note(commit)
2015-04-26 12:48:37 +05:30
notes.new(commit_id: commit.id, noteable_type: 'Commit')
2014-09-02 18:07:02 +05:30
end
def last_activity
last_event
end
def last_activity_date
2017-09-10 17:25:29 +05:30
last_repository_updated_at || last_activity_at || updated_at
2014-09-02 18:07:02 +05:30
end
def project_id
self.id
end
2017-01-15 13:20:01 +05:30
def get_issue(issue_id, current_user)
2017-09-10 17:25:29 +05:30
issue = IssuesFinder.new(current_user, project_id: id).find_by(iid: issue_id) if issues_enabled?
if issue
issue
elsif external_issue_tracker
2015-09-11 14:41:01 +05:30
ExternalIssue.new(issue_id, self)
2014-09-02 18:07:02 +05:30
end
end
2015-09-11 14:41:01 +05:30
def issue_exists?(issue_id)
get_issue(issue_id)
end
2015-04-26 12:48:37 +05:30
def default_issue_tracker
gitlab_issue_tracker_service || create_gitlab_issue_tracker_service
end
def issues_tracker
if external_issue_tracker
external_issue_tracker
else
default_issue_tracker
end
end
2017-08-17 22:00:37 +05:30
def external_issue_reference_pattern
2017-09-10 17:25:29 +05:30
external_issue_tracker.class.reference_pattern(only_long: issues_enabled?)
2016-11-03 12:29:30 +05:30
end
2015-04-26 12:48:37 +05:30
def default_issues_tracker?
2015-09-11 14:41:01 +05:30
!external_issue_tracker
2015-04-26 12:48:37 +05:30
end
def external_issue_tracker
if has_external_issue_tracker.nil? # To populate existing projects
cache_has_external_issue_tracker
end
if has_external_issue_tracker?
return @external_issue_tracker if defined?(@external_issue_tracker)
@external_issue_tracker = services.external_issue_trackers.first
else
nil
end
2014-09-02 18:07:02 +05:30
end
def cache_has_external_issue_tracker
update_column(:has_external_issue_tracker, services.external_issue_trackers.any?)
2014-09-02 18:07:02 +05:30
end
2016-09-29 09:46:39 +05:30
def has_wiki?
wiki_enabled? || has_external_wiki?
end
2016-08-24 12:49:21 +05:30
def external_wiki
if has_external_wiki.nil?
cache_has_external_wiki # Populate
end
if has_external_wiki
@external_wiki ||= services.external_wikis.first
else
nil
end
end
def cache_has_external_wiki
update_column(:has_external_wiki, services.external_wikis.any?)
end
2017-09-10 17:25:29 +05:30
def find_or_initialize_services(exceptions: [])
2015-04-26 12:48:37 +05:30
services_templates = Service.where(template: true)
2017-09-10 17:25:29 +05:30
available_services_names = Service.available_services_names - exceptions
available_services_names.map do |service_name|
2015-04-26 12:48:37 +05:30
service = find_service(services, service_name)
2014-09-02 18:07:02 +05:30
2017-08-17 22:00:37 +05:30
if service
service
else
2015-04-26 12:48:37 +05:30
# We should check if template for the service exists
template = find_service(services_templates, service_name)
if template.nil?
2017-08-17 22:00:37 +05:30
# If no template, we should create an instance. Ex `build_gitlab_ci_service`
public_send("build_#{service_name}_service")
2015-04-26 12:48:37 +05:30
else
2017-08-17 22:00:37 +05:30
Service.build_from_template(id, template)
2015-04-26 12:48:37 +05:30
end
end
2014-09-02 18:07:02 +05:30
end
end
2017-08-17 22:00:37 +05:30
def find_or_initialize_service(name)
find_or_initialize_services.find { |service| service.to_param == name }
end
2015-09-25 12:07:36 +05:30
def create_labels
Label.templates.each do |label|
2016-11-03 12:29:30 +05:30
params = label.attributes.except('id', 'template', 'created_at', 'updated_at')
Labels::FindOrCreateService.new(nil, self, params).execute(skip_authorization: true)
2015-09-25 12:07:36 +05:30
end
end
2015-04-26 12:48:37 +05:30
def find_service(list, name)
list.find { |service| service.to_param == name }
2014-09-02 18:07:02 +05:30
end
def ci_services
2016-06-02 11:05:42 +05:30
services.where(category: :ci)
2014-09-02 18:07:02 +05:30
end
def ci_service
2016-06-02 11:05:42 +05:30
@ci_service ||= ci_services.reorder(nil).find_by(active: true)
2015-12-23 02:04:40 +05:30
end
2017-08-17 22:00:37 +05:30
def deployment_services
services.where(category: :deployment)
end
def deployment_service
@deployment_service ||= deployment_services.reorder(nil).find_by(active: true)
end
def monitoring_services
services.where(category: :monitoring)
end
def monitoring_service
@monitoring_service ||= monitoring_services.reorder(nil).find_by(active: true)
end
2015-12-23 02:04:40 +05:30
def jira_tracker?
issues_tracker.to_param == 'jira'
2014-09-02 18:07:02 +05:30
end
2015-04-26 12:48:37 +05:30
def avatar_type
unless self.avatar.image?
self.errors.add :avatar, 'only images allowed'
end
end
def avatar_in_git
2016-06-02 11:05:42 +05:30
repository.avatar
2015-04-26 12:48:37 +05:30
end
2017-09-10 17:25:29 +05:30
def avatar_url(**args)
# We use avatar_path instead of overriding avatar_url because of carrierwave.
# See https://gitlab.com/gitlab-org/gitlab-ce/merge_requests/11001/diffs#note_28659864
avatar_path(args) || (Gitlab::Routing.url_helpers.project_avatar_url(self) if avatar_in_git)
2015-04-26 12:48:37 +05:30
end
2014-09-02 18:07:02 +05:30
# For compatibility with old code
def code
path
end
2015-04-26 12:48:37 +05:30
def items_for(entity)
2014-09-02 18:07:02 +05:30
case entity
when 'issue' then
issues
when 'merge_request' then
merge_requests
end
end
2015-10-24 18:46:33 +05:30
def send_move_instructions(old_path_with_namespace)
# New project path needs to be committed to the DB or notification will
# retrieve stale information
run_after_commit { NotificationService.new.project_was_moved(self, old_path_with_namespace) }
2014-09-02 18:07:02 +05:30
end
def owner
if group
group
else
namespace.try(:owner)
end
end
def execute_hooks(data, hooks_scope = :push_hooks)
hooks.send(hooks_scope).each do |hook|
2015-09-11 14:41:01 +05:30
hook.async_execute(data, hooks_scope.to_s)
2014-09-02 18:07:02 +05:30
end
end
2015-04-26 12:48:37 +05:30
def execute_services(data, hooks_scope = :push_hooks)
# Call only service hooks that are active for this scope
services.send(hooks_scope).each do |service|
service.async_execute(data)
2014-09-02 18:07:02 +05:30
end
end
def valid_repo?
repository.exists?
rescue
2015-04-26 12:48:37 +05:30
errors.add(:path, 'Invalid repository path')
2014-09-02 18:07:02 +05:30
false
end
def repo
2017-09-10 17:25:29 +05:30
repository.rugged
2014-09-02 18:07:02 +05:30
end
def url_to_repo
2017-09-10 17:25:29 +05:30
gitlab_shell.url_to_repo(full_path)
2014-09-02 18:07:02 +05:30
end
def repo_exists?
@repo_exists ||= repository.exists?
rescue
@repo_exists = false
end
def root_ref?(branch)
repository.root_ref == branch
end
def ssh_url_to_repo
url_to_repo
end
2017-09-10 17:25:29 +05:30
def http_url_to_repo
"#{web_url}.git"
2014-09-02 18:07:02 +05:30
end
2016-09-13 17:45:13 +05:30
def user_can_push_to_empty_repo?(user)
2017-08-17 22:00:37 +05:30
!ProtectedBranch.default_branch_protected? || team.max_member_access(user.id) > Gitlab::Access::DEVELOPER
2015-04-26 12:48:37 +05:30
end
2014-09-02 18:07:02 +05:30
def forked?
!(forked_project_link.nil? || forked_project_link.forked_from_project.nil?)
end
def personal?
!group
end
2016-04-02 18:10:28 +05:30
# Expires various caches before a project is renamed.
def expire_caches_before_rename(old_path)
repo = Repository.new(old_path, self)
wiki = Repository.new("#{old_path}.wiki", self)
if repo.exists?
2016-06-02 11:05:42 +05:30
repo.before_delete
2016-04-02 18:10:28 +05:30
end
if wiki.exists?
2016-06-02 11:05:42 +05:30
wiki.before_delete
2016-04-02 18:10:28 +05:30
end
end
2017-09-10 17:25:29 +05:30
# Check if repository already exists on disk
def can_create_repository?
return false unless repository_storage_path
if gitlab_shell.exists?(repository_storage_path, "#{build_full_path}.git")
errors.add(:base, 'There is already a repository with that name on disk')
return false
end
true
end
def renamed?
persisted? && path_changed?
end
2016-06-02 11:05:42 +05:30
def hook_attrs(backward: true)
attrs = {
2015-04-26 12:48:37 +05:30
name: name,
2016-04-02 18:10:28 +05:30
description: description,
2015-09-25 12:07:36 +05:30
web_url: web_url,
2016-04-02 18:10:28 +05:30
avatar_url: avatar_url,
git_ssh_url: ssh_url_to_repo,
git_http_url: http_url_to_repo,
2015-04-26 12:48:37 +05:30
namespace: namespace.name,
2016-04-02 18:10:28 +05:30
visibility_level: visibility_level,
2017-09-10 17:25:29 +05:30
path_with_namespace: full_path,
2016-04-02 18:10:28 +05:30
default_branch: default_branch,
2017-09-10 17:25:29 +05:30
ci_config_path: ci_config_path
2015-04-26 12:48:37 +05:30
}
2016-06-02 11:05:42 +05:30
# Backward compatibility
if backward
attrs.merge!({
homepage: web_url,
url: url_to_repo,
ssh_url: ssh_url_to_repo,
http_url: http_url_to_repo
})
end
attrs
2015-04-26 12:48:37 +05:30
end
2014-09-02 18:07:02 +05:30
def project_member(user)
2015-12-23 02:04:40 +05:30
project_members.find_by(user_id: user)
2014-09-02 18:07:02 +05:30
end
def default_branch
@default_branch ||= repository.root_ref if repository.exists?
end
def reload_default_branch
@default_branch = nil
default_branch
end
def visibility_level_field
2017-08-17 22:00:37 +05:30
:visibility_level
2014-09-02 18:07:02 +05:30
end
def archive!
update_attribute(:archived, true)
end
def unarchive!
update_attribute(:archived, false)
end
def change_head(branch)
2016-06-02 11:05:42 +05:30
repository.before_change_head
repository.rugged.references.create('HEAD',
"refs/heads/#{branch}",
force: true)
repository.copy_gitattributes(branch)
2017-08-17 22:00:37 +05:30
repository.after_change_head
2014-09-02 18:07:02 +05:30
reload_default_branch
end
def forked_from?(project)
forked? && project == forked_from_project
end
2015-04-26 12:48:37 +05:30
def origin_merge_requests
merge_requests.where(source_project_id: self.id)
end
2017-09-10 17:25:29 +05:30
def ensure_repository
create_repository(force: true) unless repository_exists?
2015-04-26 12:48:37 +05:30
end
def repository_exists?
!!repository.exists?
end
2017-09-10 17:25:29 +05:30
def update_forks_visibility_level
return unless visibility_level < visibility_level_was
forks.each do |forked_project|
if forked_project.visibility_level > visibility_level
forked_project.visibility_level = visibility_level
forked_project.save!
end
end
end
2015-04-26 12:48:37 +05:30
def create_wiki
ProjectWiki.new(self, self.owner).wiki
true
2015-10-24 18:46:33 +05:30
rescue ProjectWiki::CouldNotCreateWikiError
2015-04-26 12:48:37 +05:30
errors.add(:base, 'Failed create wiki')
false
end
2015-10-24 18:46:33 +05:30
2017-09-10 17:25:29 +05:30
def wiki
@wiki ||= ProjectWiki.new(self, self.owner)
end
2015-12-23 02:04:40 +05:30
def jira_tracker_active?
jira_tracker? && jira_service.active
end
2016-06-02 11:05:42 +05:30
def allowed_to_share_with_group?
!namespace.share_with_group_lock
2015-10-24 18:46:33 +05:30
end
2016-09-29 09:46:39 +05:30
def pipeline_for(ref, sha = nil)
sha ||= commit(ref).try(:sha)
return unless sha
pipelines.order(id: :desc).find_by(sha: sha, ref: ref)
2015-10-24 18:46:33 +05:30
end
2016-06-02 11:05:42 +05:30
def enable_ci
2016-09-29 09:46:39 +05:30
project_feature.update_attribute(:builds_access_level, ProjectFeature::ENABLED)
2015-11-26 14:37:03 +05:30
end
2015-12-23 02:04:40 +05:30
2017-08-17 22:00:37 +05:30
def shared_runners_available?
shared_runners_enabled?
end
2015-12-23 02:04:40 +05:30
2017-08-17 22:00:37 +05:30
def shared_runners
@shared_runners ||= shared_runners_available? ? Ci::Runner.shared : Ci::Runner.none
2015-12-23 02:04:40 +05:30
end
2017-08-17 22:00:37 +05:30
def active_shared_runners
@active_shared_runners ||= shared_runners.active
2015-12-23 02:04:40 +05:30
end
2017-08-17 22:00:37 +05:30
def any_runners?(&block)
active_runners.any?(&block) || active_shared_runners.any?(&block)
end
def valid_runners_token?(token)
self.runners_token && ActiveSupport::SecurityUtils.variable_size_secure_compare(token, self.runners_token)
2015-12-23 02:04:40 +05:30
end
def build_timeout_in_minutes
build_timeout / 60
end
def build_timeout_in_minutes=(value)
self.build_timeout = value.to_i * 60
end
def open_issues_count
issues.opened.count
end
2016-06-02 11:05:42 +05:30
def visibility_level_allowed_as_fork?(level = self.visibility_level)
return true unless forked?
2016-06-02 11:05:42 +05:30
# self.forked_from_project will be nil before the project is saved, so
# we need to go through the relation
original_project = forked_project_link.forked_from_project
return true unless original_project
level <= original_project.visibility_level
end
def visibility_level_allowed_by_group?(level = self.visibility_level)
return true unless group
level <= group.visibility_level
end
def visibility_level_allowed?(level = self.visibility_level)
visibility_level_allowed_as_fork?(level) && visibility_level_allowed_by_group?(level)
end
def runners_token
ensure_runners_token!
end
2016-04-02 18:10:28 +05:30
2017-08-17 22:00:37 +05:30
def pages_deployed?
Dir.exist?(public_pages_path)
end
def pages_url
subdomain, _, url_path = full_path.partition('/')
# The hostname always needs to be in downcased
# All web servers convert hostname to lowercase
host = "#{subdomain}.#{Settings.pages.host}".downcase
# The host in URL always needs to be downcased
url = Gitlab.config.pages.url.sub(/^https?:\/\//) do |prefix|
"#{prefix}#{subdomain}."
end.downcase
# If the project path is the same as host, we serve it as group page
return url if host == url_path
"#{url}/#{url_path}"
end
def pages_subdomain
full_path.partition('/').first
end
def pages_path
2017-09-10 17:25:29 +05:30
File.join(Settings.pages.path, disk_path)
2017-08-17 22:00:37 +05:30
end
def public_pages_path
File.join(pages_path, 'public')
end
2017-09-10 17:25:29 +05:30
def remove_private_deploy_keys
exclude_keys_linked_to_other_projects = <<-SQL
NOT EXISTS (
SELECT 1
FROM deploy_keys_projects dkp2
WHERE dkp2.deploy_key_id = deploy_keys_projects.deploy_key_id
AND dkp2.project_id != deploy_keys_projects.project_id
)
SQL
deploy_keys.where(public: false)
.where(exclude_keys_linked_to_other_projects)
.delete_all
end
# TODO: what to do here when not using Legacy Storage? Do we still need to rename and delay removal?
2017-08-17 22:00:37 +05:30
def remove_pages
2017-09-10 17:25:29 +05:30
# Projects with a missing namespace cannot have their pages removed
return unless namespace
::Projects::UpdatePagesConfigurationService.new(self).execute
2017-08-17 22:00:37 +05:30
# 1. We rename pages to temporary directory
# 2. We wait 5 minutes, due to NFS caching
# 3. We asynchronously remove pages with force
temp_path = "#{path}.#{SecureRandom.hex}.deleted"
if Gitlab::PagesTransfer.new.rename_project(path, temp_path, namespace.full_path)
PagesWorker.perform_in(5.minutes, :remove, namespace.full_path, temp_path)
end
end
def running_or_pending_build_count(force: false)
Rails.cache.fetch(['projects', id, 'running_or_pending_build_count'], force: force) do
builds.running_or_pending.count(:all)
end
end
2017-08-17 22:00:37 +05:30
# Lazy loading of the `pipeline_status` attribute
def pipeline_status
@pipeline_status ||= Gitlab::Cache::Ci::ProjectPipelineStatus.load_for_project(self)
end
def mark_import_as_failed(error_message)
original_errors = errors.dup
sanitized_message = Gitlab::UrlSanitizer.sanitize(error_message)
import_fail
update_column(:import_error, sanitized_message)
rescue ActiveRecord::ActiveRecordError => e
Rails.logger.error("Error setting import status to failed: #{e.message}. Original error: #{sanitized_message}")
ensure
@errors = original_errors
end
2016-06-22 15:30:34 +05:30
def add_export_job(current_user:)
job_id = ProjectExportWorker.perform_async(current_user.id, self.id)
if job_id
Rails.logger.info "Export job started for project ID #{self.id} with job ID #{job_id}"
else
Rails.logger.error "Export job failed to start for project ID #{self.id}"
end
end
def export_path
2017-09-10 17:25:29 +05:30
File.join(Gitlab::ImportExport.storage_path, disk_path)
2016-06-22 15:30:34 +05:30
end
def export_project_path
Dir.glob("#{export_path}/*export.tar.gz").max_by { |f| File.ctime(f) }
end
def remove_exports
_, status = Gitlab::Popen.popen(%W(find #{export_path} -not -path #{export_path} -delete))
status.zero?
end
2016-08-24 12:49:21 +05:30
def predefined_variables
[
{ key: 'CI_PROJECT_ID', value: id.to_s, public: true },
{ key: 'CI_PROJECT_NAME', value: path, public: true },
2017-09-10 17:25:29 +05:30
{ key: 'CI_PROJECT_PATH', value: full_path, public: true },
{ key: 'CI_PROJECT_PATH_SLUG', value: full_path.parameterize, public: true },
2017-08-17 22:00:37 +05:30
{ key: 'CI_PROJECT_NAMESPACE', value: namespace.full_path, public: true },
2016-08-24 12:49:21 +05:30
{ key: 'CI_PROJECT_URL', value: web_url, public: true }
]
end
def container_registry_variables
return [] unless Gitlab.config.registry.enabled
variables = [
{ key: 'CI_REGISTRY', value: Gitlab.config.registry.host_port, public: true }
]
if container_registry_enabled?
2017-08-17 22:00:37 +05:30
variables << { key: 'CI_REGISTRY_IMAGE', value: container_registry_url, public: true }
2016-08-24 12:49:21 +05:30
end
variables
end
2017-09-10 17:25:29 +05:30
def secret_variables_for(ref:, environment: nil)
# EE would use the environment
if protected_for?(ref)
variables
else
variables.unprotected
2016-08-24 12:49:21 +05:30
end
end
2017-09-10 17:25:29 +05:30
def protected_for?(ref)
ProtectedBranch.protected?(self, ref) ||
ProtectedTag.protected?(self, ref)
end
2017-08-17 22:00:37 +05:30
def deployment_variables
return [] unless deployment_service
2016-08-24 12:49:21 +05:30
2017-08-17 22:00:37 +05:30
deployment_service.predefined_variables
2016-08-24 12:49:21 +05:30
end
def append_or_update_attribute(name, value)
old_values = public_send(name.to_s)
if Project.reflect_on_association(name).try(:macro) == :has_many && old_values.any?
update_attribute(name, old_values + value)
else
update_attribute(name, value)
end
2017-08-17 22:00:37 +05:30
rescue ActiveRecord::RecordNotSaved => e
handle_update_attribute_error(e, value)
2016-08-24 12:49:21 +05:30
end
2016-09-29 09:46:39 +05:30
def pushes_since_gc
2017-09-10 17:25:29 +05:30
Gitlab::Redis::SharedState.with { |redis| redis.get(pushes_since_gc_redis_shared_state_key).to_i }
2016-09-29 09:46:39 +05:30
end
def increment_pushes_since_gc
2017-09-10 17:25:29 +05:30
Gitlab::Redis::SharedState.with { |redis| redis.incr(pushes_since_gc_redis_shared_state_key) }
2016-09-29 09:46:39 +05:30
end
def reset_pushes_since_gc
2017-09-10 17:25:29 +05:30
Gitlab::Redis::SharedState.with { |redis| redis.del(pushes_since_gc_redis_shared_state_key) }
2016-09-29 09:46:39 +05:30
end
2017-08-17 22:00:37 +05:30
def route_map_for(commit_sha)
@route_maps_by_commit ||= Hash.new do |h, sha|
h[sha] = begin
data = repository.route_map_for(sha)
next unless data
2016-09-29 09:46:39 +05:30
2017-08-17 22:00:37 +05:30
Gitlab::RouteMap.new(data)
rescue Gitlab::RouteMap::FormatError
nil
2016-09-29 09:46:39 +05:30
end
2017-08-17 22:00:37 +05:30
end
@route_maps_by_commit[commit_sha]
end
2016-09-29 09:46:39 +05:30
2017-08-17 22:00:37 +05:30
def public_path_for_source_path(path, commit_sha)
map = route_map_for(commit_sha)
return unless map
map.public_path_for_source_path(path)
end
def parent
namespace
end
def parent_changed?
namespace_id_changed?
end
def default_merge_request_target
if forked_from_project&.merge_requests_enabled?
forked_from_project
else
self
2016-09-29 09:46:39 +05:30
end
end
2017-08-17 22:00:37 +05:30
alias_method :name_with_namespace, :full_name
alias_method :human_name, :full_name
2017-09-10 17:25:29 +05:30
# @deprecated cannot remove yet because it has an index with its name in elasticsearch
2017-08-17 22:00:37 +05:30
alias_method :path_with_namespace, :full_path
2017-09-10 17:25:29 +05:30
def forks_count
Projects::ForksCountService.new(self).count
end
def legacy_storage?
self.storage_version.nil?
end
2016-08-24 12:49:21 +05:30
private
2017-08-17 22:00:37 +05:30
def cross_namespace_reference?(from)
case from
when Project
namespace != from.namespace
when Namespace
namespace != from
end
end
# Check if a reference is being done cross-project
def cross_project_reference?(from)
return true if from.is_a?(Namespace)
from && self != from
end
2017-09-10 17:25:29 +05:30
def pushes_since_gc_redis_shared_state_key
2016-09-29 09:46:39 +05:30
"projects/#{id}/pushes_since_gc"
end
2017-08-17 22:00:37 +05:30
# Similar to the normal callbacks that hook into the life cycle of an
# Active Record object, you can also define callbacks that get triggered
# when you add an object to an association collection. If any of these
# callbacks throw an exception, the object will not be added to the
# collection. Before you add a new board to the boards collection if you
# already have 1, 2, or n it will fail, but it if you have 0 that is lower
# than the number of permitted boards per project it won't fail.
def validate_board_limit(board)
raise BoardLimitExceeded, 'Number of permitted boards exceeded' if boards.size >= NUMBER_OF_PERMITTED_BOARDS
2016-09-13 17:45:13 +05:30
end
2017-08-17 22:00:37 +05:30
def update_project_statistics
stats = statistics || build_statistics
stats.update(namespace_id: namespace_id)
2016-08-24 12:49:21 +05:30
end
2017-08-17 22:00:37 +05:30
def check_pending_delete
return if valid_attribute?(:name) && valid_attribute?(:path)
return unless pending_delete_twin
%i[route route.path name path].each do |error|
errors.delete(error)
end
2016-08-24 12:49:21 +05:30
2017-08-17 22:00:37 +05:30
errors.add(:base, "The project is still being deleted. Please try again later.")
2016-08-24 12:49:21 +05:30
end
2017-08-17 22:00:37 +05:30
def pending_delete_twin
return false unless path
2016-08-24 12:49:21 +05:30
2017-09-10 17:25:29 +05:30
Project.pending_delete.find_by_full_path(full_path)
2017-08-17 22:00:37 +05:30
end
2016-08-24 12:49:21 +05:30
2017-08-17 22:00:37 +05:30
##
# This method is here because of support for legacy container repository
# which has exactly the same path like project does, but which might not be
# persisted in `container_repositories` table.
#
def has_root_container_repository_tags?
return false unless Gitlab.config.registry.enabled
ContainerRepository.build_root_repository(self).has_tags?
2016-08-24 12:49:21 +05:30
end
2016-11-03 12:29:30 +05:30
2017-08-17 22:00:37 +05:30
def handle_update_attribute_error(ex, value)
if ex.message.start_with?('Failed to replace')
if value.respond_to?(:each)
invalid = value.detect(&:invalid?)
raise ex, ([ex.message] + invalid.errors.full_messages).join(' ') if invalid
end
end
raise ex
2016-11-03 12:29:30 +05:30
end
2014-09-02 18:07:02 +05:30
end