107 lines
3.4 KiB
Ruby
107 lines
3.4 KiB
Ruby
# frozen_string_literal: true
|
|
|
|
module Projects
|
|
class ForkService < BaseService
|
|
def execute(fork_to_project = nil)
|
|
if fork_to_project
|
|
link_existing_project(fork_to_project)
|
|
else
|
|
fork_new_project
|
|
end
|
|
end
|
|
|
|
private
|
|
|
|
def allowed_fork?
|
|
current_user.can?(:fork_project, @project)
|
|
end
|
|
|
|
def link_existing_project(fork_to_project)
|
|
return if fork_to_project.forked?
|
|
|
|
build_fork_network_member(fork_to_project)
|
|
|
|
if link_fork_network(fork_to_project)
|
|
# A forked project stores its LFS objects in the `forked_from_project`.
|
|
# So the LFS objects become inaccessible, and therefore delete them from
|
|
# the database so they'll get cleaned up.
|
|
#
|
|
# TODO: refactor this to get the correct lfs objects when implementing
|
|
# https://gitlab.com/gitlab-org/gitlab-ce/issues/39769
|
|
fork_to_project.lfs_objects_projects.delete_all
|
|
|
|
fork_to_project
|
|
end
|
|
end
|
|
|
|
def fork_new_project
|
|
new_params = {
|
|
visibility_level: allowed_visibility_level,
|
|
description: @project.description,
|
|
name: @project.name,
|
|
path: @project.path,
|
|
shared_runners_enabled: @project.shared_runners_enabled,
|
|
namespace_id: target_namespace.id,
|
|
fork_network: fork_network,
|
|
# We need to assign the fork network membership after the project has
|
|
# been instantiated to avoid ActiveRecord trying to create it when
|
|
# initializing the project, as that would cause a foreign key constraint
|
|
# exception.
|
|
relations_block: -> (project) { build_fork_network_member(project) }
|
|
}
|
|
|
|
if @project.avatar.present? && @project.avatar.image?
|
|
new_params[:avatar] = @project.avatar
|
|
end
|
|
|
|
new_params.merge!(@project.object_pool_params)
|
|
|
|
new_project = CreateService.new(current_user, new_params).execute
|
|
return new_project unless new_project.persisted?
|
|
|
|
# Set the forked_from_project relation after saving to avoid having to
|
|
# reload the project to reset the association information and cause an
|
|
# extra query.
|
|
new_project.forked_from_project = @project
|
|
|
|
builds_access_level = @project.project_feature.builds_access_level
|
|
new_project.project_feature.update(builds_access_level: builds_access_level)
|
|
|
|
new_project
|
|
end
|
|
|
|
def fork_network
|
|
@fork_network ||= @project.fork_network || @project.build_root_of_fork_network
|
|
end
|
|
|
|
def build_fork_network_member(fork_to_project)
|
|
if allowed_fork?
|
|
fork_to_project.build_fork_network_member(forked_from_project: @project,
|
|
fork_network: fork_network)
|
|
else
|
|
fork_to_project.errors.add(:forked_from_project_id, 'is forbidden')
|
|
end
|
|
end
|
|
|
|
def link_fork_network(fork_to_project)
|
|
return if fork_to_project.errors.any?
|
|
|
|
fork_to_project.fork_network_member.save &&
|
|
refresh_forks_count
|
|
end
|
|
|
|
def refresh_forks_count
|
|
Projects::ForksCountService.new(@project).refresh_cache
|
|
end
|
|
|
|
def target_namespace
|
|
@target_namespace ||= @params[:namespace] || current_user.namespace
|
|
end
|
|
|
|
def allowed_visibility_level
|
|
target_level = [@project.visibility_level, target_namespace.visibility_level].min
|
|
|
|
Gitlab::VisibilityLevel.closest_allowed_level(target_level)
|
|
end
|
|
end
|
|
end
|