debian-mirror-gitlab/app/services/users/destroy_service.rb

81 lines
3 KiB
Ruby
Raw Normal View History

2018-11-18 11:00:15 +05:30
# frozen_string_literal: true
2017-08-17 22:00:37 +05:30
module Users
class DestroyService
2018-11-20 20:47:30 +05:30
DestroyError = Class.new(StandardError)
2017-08-17 22:00:37 +05:30
attr_accessor :current_user
def initialize(current_user)
@current_user = current_user
end
2017-09-10 17:25:29 +05:30
# Synchronously destroys +user+
#
# The operation will fail if the user is the sole owner of any groups. To
# force the groups to be destroyed, pass `delete_solo_owned_groups: true` in
# +options+.
#
# The user's contributions will be migrated to a global ghost user. To
# force the contributions to be destroyed, pass `hard_delete: true` in
# +options+.
#
# `hard_delete: true` implies `delete_solo_owned_groups: true`. To perform
# a hard deletion without destroying solo-owned groups, pass
# `delete_solo_owned_groups: false, hard_delete: true` in +options+.
2017-08-17 22:00:37 +05:30
def execute(user, options = {})
2017-09-10 17:25:29 +05:30
delete_solo_owned_groups = options.fetch(:delete_solo_owned_groups, options[:hard_delete])
2021-01-03 14:25:43 +05:30
unless Ability.allowed?(current_user, :destroy_user, user) || options[:skip_authorization]
2017-08-17 22:00:37 +05:30
raise Gitlab::Access::AccessDeniedError, "#{current_user} tried to destroy user #{user}!"
end
2017-09-10 17:25:29 +05:30
if !delete_solo_owned_groups && user.solo_owned_groups.present?
2021-06-08 01:23:25 +05:30
user.errors.add(:base, 'You must transfer ownership or delete groups before you can remove user')
2017-08-17 22:00:37 +05:30
return user
end
2018-03-17 18:26:18 +05:30
# Calling all before/after_destroy hooks for the user because
# there is no dependent: destroy in the relationship. And the removal
# is done by a foreign_key. Otherwise they won't be called
user.members.find_each { |member| member.run_callbacks(:destroy) }
2017-08-17 22:00:37 +05:30
user.solo_owned_groups.each do |group|
Groups::DestroyService.new(group, current_user).execute
end
2018-03-17 18:26:18 +05:30
namespace = user.namespace
namespace.prepare_for_destroy
2017-09-10 17:25:29 +05:30
user.personal_projects.each do |project|
2018-11-20 20:47:30 +05:30
success = ::Projects::DestroyService.new(project, current_user).execute
raise DestroyError, "Project #{project.id} can't be deleted" unless success
2017-08-17 22:00:37 +05:30
end
2018-03-27 19:54:05 +05:30
yield(user) if block_given?
2022-04-04 11:22:00 +05:30
MigrateToGhostUserService.new(user).execute(hard_delete: options[:hard_delete])
2017-08-17 22:00:37 +05:30
2020-06-23 00:09:42 +05:30
response = Snippets::BulkDestroyService.new(current_user, user.snippets).execute(options)
2020-04-08 14:13:33 +05:30
raise DestroyError, response.message if response.error?
2020-03-13 15:44:24 +05:30
# Rails attempts to load all related records into memory before
# destroying: https://github.com/rails/rails/issues/22510
# This ensures we delete records in batches.
2020-04-08 14:13:33 +05:30
user.destroy_dependent_associations_in_batches(exclude: [:snippets])
2020-03-13 15:44:24 +05:30
2022-06-21 17:19:12 +05:30
if Feature.enabled?(:nullify_in_batches_on_user_deletion, default_enabled: :yaml)
user.nullify_dependent_associations_in_batches
end
2017-08-17 22:00:37 +05:30
# Destroy the namespace after destroying the user since certain methods may depend on the namespace existing
2022-04-04 11:22:00 +05:30
user_data = user.destroy
2018-03-17 18:26:18 +05:30
namespace.destroy
2017-08-17 22:00:37 +05:30
user_data
end
end
end
2019-12-04 20:38:33 +05:30
2021-06-08 01:23:25 +05:30
Users::DestroyService.prepend_mod_with('Users::DestroyService')