debian-mirror-gitlab/app/models/namespace.rb

287 lines
8.4 KiB
Ruby
Raw Normal View History

2014-09-02 18:07:02 +05:30
class Namespace < ActiveRecord::Base
2016-09-13 17:45:13 +05:30
acts_as_paranoid
2016-11-03 12:29:30 +05:30
include CacheMarkdownField
2015-04-26 12:48:37 +05:30
include Sortable
2014-09-02 18:07:02 +05:30
include Gitlab::ShellAdapter
2017-08-17 22:00:37 +05:30
include Gitlab::CurrentSettings
include Routable
# Prevent users from creating unreasonably deep level of nesting.
# The number 20 was taken based on maximum nesting level of
# Android repo (15) + some extra backup.
NUMBER_OF_ANCESTORS_ALLOWED = 20
2014-09-02 18:07:02 +05:30
2016-11-03 12:29:30 +05:30
cache_markdown_field :description, pipeline: :description
2014-09-02 18:07:02 +05:30
has_many :projects, dependent: :destroy
2017-08-17 22:00:37 +05:30
has_many :project_statistics
2014-09-02 18:07:02 +05:30
belongs_to :owner, class_name: "User"
2017-08-17 22:00:37 +05:30
belongs_to :parent, class_name: "Namespace"
has_many :children, class_name: "Namespace", foreign_key: :parent_id
has_one :chat_team, dependent: :destroy
2014-09-02 18:07:02 +05:30
validates :owner, presence: true, unless: ->(n) { n.type == "Group" }
2015-04-26 12:48:37 +05:30
validates :name,
2015-12-23 02:04:40 +05:30
presence: true,
2017-08-17 22:00:37 +05:30
uniqueness: { scope: :parent_id },
length: { maximum: 255 },
namespace_name: true
2015-04-26 12:48:37 +05:30
2017-08-17 22:00:37 +05:30
validates :description, length: { maximum: 255 }
2015-04-26 12:48:37 +05:30
validates :path,
2015-12-23 02:04:40 +05:30
presence: true,
2017-08-17 22:00:37 +05:30
length: { maximum: 255 },
dynamic_path: true
validate :nesting_level_allowed
2014-09-02 18:07:02 +05:30
delegate :name, to: :owner, allow_nil: true, prefix: true
after_update :move_dir, if: :path_changed?
2017-08-17 22:00:37 +05:30
after_commit :refresh_access_of_projects_invited_groups, on: :update, if: -> { previous_changes.key?('share_with_group_lock') }
2016-08-24 12:49:21 +05:30
# Save the storage paths before the projects are destroyed to use them on after destroy
2017-08-17 22:00:37 +05:30
before_destroy(prepend: true) { prepare_for_destroy }
2014-09-02 18:07:02 +05:30
after_destroy :rm_dir
2017-08-17 22:00:37 +05:30
scope :for_user, -> { where('type IS NULL') }
scope :with_statistics, -> do
joins('LEFT JOIN project_statistics ps ON ps.namespace_id = namespaces.id')
.group('namespaces.id')
.select(
'namespaces.*',
'COALESCE(SUM(ps.storage_size), 0) AS storage_size',
'COALESCE(SUM(ps.repository_size), 0) AS repository_size',
'COALESCE(SUM(ps.lfs_objects_size), 0) AS lfs_objects_size',
'COALESCE(SUM(ps.build_artifacts_size), 0) AS build_artifacts_size',
)
end
2014-09-02 18:07:02 +05:30
2015-04-26 12:48:37 +05:30
class << self
def by_path(path)
2015-12-23 02:04:40 +05:30
find_by('lower(path) = :value', value: path.downcase)
2015-04-26 12:48:37 +05:30
end
# Case insensetive search for namespace by path or name
def find_by_path_or_name(path)
find_by("lower(path) = :path OR lower(name) = :path", path: path.downcase)
end
2016-06-02 11:05:42 +05:30
# Searches for namespaces matching the given query.
#
# This method uses ILIKE on PostgreSQL and LIKE on MySQL.
#
# query - The search query as a String
#
# Returns an ActiveRecord::Relation
2015-04-26 12:48:37 +05:30
def search(query)
2016-06-02 11:05:42 +05:30
t = arel_table
pattern = "%#{query}%"
where(t[:name].matches(pattern).or(t[:path].matches(pattern)))
2015-04-26 12:48:37 +05:30
end
2014-09-02 18:07:02 +05:30
2015-04-26 12:48:37 +05:30
def clean_path(path)
path = path.dup
2015-09-11 14:41:01 +05:30
# Get the email username by removing everything after an `@` sign.
2016-11-03 12:29:30 +05:30
path.gsub!(/@.*\z/, "")
2015-09-11 14:41:01 +05:30
# Remove everything that's not in the list of allowed characters.
2016-11-03 12:29:30 +05:30
path.gsub!(/[^a-zA-Z0-9_\-\.]/, "")
# Remove trailing violations ('.atom', '.git', or '.')
path.gsub!(/(\.atom|\.git|\.)*\z/, "")
# Remove leading violations ('-')
path.gsub!(/\A\-+/, "")
2015-04-26 12:48:37 +05:30
2015-09-11 14:41:01 +05:30
# Users with the great usernames of "." or ".." would end up with a blank username.
# Work around that by setting their username to "blank", followed by a counter.
path = "blank" if path.blank?
2017-08-17 22:00:37 +05:30
uniquify = Uniquify.new
uniquify.string(path) { |s| Namespace.find_by_path_or_name(s) }
2015-04-26 12:48:37 +05:30
end
2014-09-02 18:07:02 +05:30
end
def to_param
2017-08-17 22:00:37 +05:30
full_path
2014-09-02 18:07:02 +05:30
end
def human_name
owner_name
end
def move_dir
2016-06-02 11:05:42 +05:30
if any_project_has_container_registry_tags?
2017-08-17 22:00:37 +05:30
raise Gitlab::UpdatePathError.new('Namespace cannot be moved, because at least one project has tags in container registry')
2016-06-02 11:05:42 +05:30
end
2016-08-24 12:49:21 +05:30
# Move the namespace directory in all storages paths used by member projects
repository_storage_paths.each do |repository_storage_path|
# Ensure old directory exists before moving it
2017-08-17 22:00:37 +05:30
gitlab_shell.add_namespace(repository_storage_path, full_path_was)
unless gitlab_shell.mv_namespace(repository_storage_path, full_path_was, full_path)
Rails.logger.error "Exception moving path #{repository_storage_path} from #{full_path_was} to #{full_path}"
2016-08-24 12:49:21 +05:30
# if we cannot move namespace directory we should rollback
# db changes in order to prevent out of sync between db and fs
2017-08-17 22:00:37 +05:30
raise Gitlab::UpdatePathError.new('namespace directory cannot be moved')
2014-09-02 18:07:02 +05:30
end
2016-08-24 12:49:21 +05:30
end
2017-08-17 22:00:37 +05:30
Gitlab::UploadsTransfer.new.rename_namespace(full_path_was, full_path)
Gitlab::PagesTransfer.new.rename_namespace(full_path_was, full_path)
remove_exports!
2016-08-24 12:49:21 +05:30
# If repositories moved successfully we need to
# send update instructions to users.
# However we cannot allow rollback since we moved namespace dir
# So we basically we mute exceptions in next actions
begin
send_update_instructions
rescue
# Returning false does not rollback after_* transaction but gives
# us information about failing some of tasks
false
2014-09-02 18:07:02 +05:30
end
end
2016-06-02 11:05:42 +05:30
def any_project_has_container_registry_tags?
2017-08-17 22:00:37 +05:30
all_projects.any?(&:has_container_registry_tags?)
2016-06-02 11:05:42 +05:30
end
2014-09-02 18:07:02 +05:30
def send_update_instructions
2015-10-24 18:46:33 +05:30
projects.each do |project|
2017-08-17 22:00:37 +05:30
project.send_move_instructions("#{full_path_was}/#{project.path}")
2015-10-24 18:46:33 +05:30
end
2014-09-02 18:07:02 +05:30
end
def kind
type == 'Group' ? 'group' : 'user'
end
2015-04-26 12:48:37 +05:30
def find_fork_of(project)
2015-12-23 02:04:40 +05:30
projects.joins(:forked_project_link).find_by('forked_project_links.forked_from_project_id = ?', project.id)
2015-04-26 12:48:37 +05:30
end
2016-08-24 12:49:21 +05:30
2016-09-29 09:46:39 +05:30
def lfs_enabled?
# User namespace will always default to the global setting
Gitlab.config.lfs.enabled
end
2017-08-17 22:00:37 +05:30
def shared_runners_enabled?
projects.with_shared_runners.any?
end
# Scopes the model on ancestors of the record
def ancestors
if parent_id
path = route ? route.path : full_path
paths = []
until path.blank?
path = path.rpartition('/').first
paths << path
end
self.class.joins(:route).where('routes.path IN (?)', paths).reorder('routes.path ASC')
else
self.class.none
end
end
# Scopes the model on direct and indirect children of the record
def descendants
self.class.joins(:route).merge(Route.inside_path(route.path)).reorder('routes.path ASC')
end
def user_ids_for_project_authorizations
[owner_id]
end
def parent_changed?
parent_id_changed?
end
def prepare_for_destroy
old_repository_storage_paths
end
def old_repository_storage_paths
@old_repository_storage_paths ||= repository_storage_paths
end
# Includes projects from this namespace and projects from all subgroups
# that belongs to this namespace
def all_projects
Project.inside_path(full_path)
end
def has_parent?
parent.present?
end
2016-08-24 12:49:21 +05:30
private
def repository_storage_paths
# We need to get the storage paths for all the projects, even the ones that are
# pending delete. Unscoping also get rids of the default order, which causes
# problems with SELECT DISTINCT.
Project.unscoped do
2017-08-17 22:00:37 +05:30
all_projects.select('distinct(repository_storage)').to_a.map(&:repository_storage_path)
2016-08-24 12:49:21 +05:30
end
end
def rm_dir
# Remove the namespace directory in all storages paths used by member projects
2017-08-17 22:00:37 +05:30
old_repository_storage_paths.each do |repository_storage_path|
2016-08-24 12:49:21 +05:30
# Move namespace directory into trash.
# We will remove it later async
2017-08-17 22:00:37 +05:30
new_path = "#{full_path}+#{id}+deleted"
2016-08-24 12:49:21 +05:30
2017-08-17 22:00:37 +05:30
if gitlab_shell.mv_namespace(repository_storage_path, full_path, new_path)
message = "Namespace directory \"#{full_path}\" moved to \"#{new_path}\""
2016-08-24 12:49:21 +05:30
Gitlab::AppLogger.info message
# Remove namespace directroy async with delay so
# GitLab has time to remove all projects first
GitlabShellWorker.perform_in(5.minutes, :rm_namespace, repository_storage_path, new_path)
end
end
2017-08-17 22:00:37 +05:30
remove_exports!
end
def refresh_access_of_projects_invited_groups
Group.
joins(project_group_links: :project).
where(projects: { namespace_id: id }).
find_each(&:refresh_members_authorized_projects)
end
def remove_exports!
Gitlab::Popen.popen(%W(find #{export_path} -not -path #{export_path} -delete))
end
def export_path
File.join(Gitlab::ImportExport.storage_path, full_path_was)
end
def full_path_was
if parent
parent.full_path + '/' + path_was
else
path_was
end
end
def nesting_level_allowed
if ancestors.count > Group::NUMBER_OF_ANCESTORS_ALLOWED
errors.add(:parent_id, "has too deep level of nesting")
end
2016-08-24 12:49:21 +05:30
end
2014-09-02 18:07:02 +05:30
end