BigW Consortium Gitlab

project.rb 40.9 KB
Newer Older
1 2
require 'carrierwave/orm/activerecord'

gitlabhq committed
3
class Project < ActiveRecord::Base
4
  include Gitlab::ConfigHelper
5
  include Gitlab::ShellAdapter
6
  include Gitlab::VisibilityLevel
7
  include Gitlab::CurrentSettings
8
  include AccessRequestable
9
  include CacheMarkdownField
10 11
  include Referable
  include Sortable
12
  include AfterCommitQueue
13
  include CaseSensitivity
14
  include TokenAuthenticatable
15
  include ValidAttribute
16
  include ProjectFeaturesCompatibility
17
  include SelectForProjectAuthorization
18
  include Routable
Robert Speicher committed
19

20
  extend Gitlab::ConfigHelper
21

22
  BoardLimitExceeded = Class.new(StandardError)
23

24
  NUMBER_OF_PERMITTED_BOARDS = 1
25
  UNKNOWN_IMPORT_URL = 'http://unknown.git'.freeze
Jared Szechy committed
26

27 28
  cache_markdown_field :description, pipeline: :description

29 30
  delegate :feature_available?, :builds_enabled?, :wiki_enabled?,
           :merge_requests_enabled?, :issues_enabled?, to: :project_feature,
31
                                                       allow_nil: true
32

33
  default_value_for :archived, false
34
  default_value_for :visibility_level, gitlab_config_features.visibility_level
35
  default_value_for :container_registry_enabled, gitlab_config_features.container_registry
36
  default_value_for(:repository_storage) { current_application_settings.pick_repository_storage }
37
  default_value_for(:shared_runners_enabled) { current_application_settings.shared_runners_enabled }
38 39 40 41 42
  default_value_for :issues_enabled, gitlab_config_features.issues
  default_value_for :merge_requests_enabled, gitlab_config_features.merge_requests
  default_value_for :builds_enabled, gitlab_config_features.builds
  default_value_for :wiki_enabled, gitlab_config_features.wiki
  default_value_for :snippets_enabled, gitlab_config_features.snippets
43
  default_value_for :only_allow_merge_if_all_discussions_are_resolved, false
44

45
  after_create :ensure_dir_exist
46
  after_create :create_project_feature, unless: :project_feature
47
  after_save :ensure_dir_exist, if: :namespace_id_changed?
48
  after_save :update_project_statistics, if: :namespace_id_changed?
49

50 51
  # set last_activity_at to the same as created_at
  after_create :set_last_activity_at
52
  def set_last_activity_at
53
    update_column(:last_activity_at, self.created_at)
54 55
  end

Kamil Trzcinski committed
56 57
  after_destroy :remove_pages

58
  # update visibility_level of forks
59 60 61 62 63 64 65 66 67 68 69 70
  after_update :update_forks_visibility_level
  def update_forks_visibility_level
    return unless visibility_level < visibility_level_was

    forks.each do |forked_project|
      if forked_project.visibility_level > visibility_level
        forked_project.visibility_level = visibility_level
        forked_project.save!
      end
    end
  end

71 72
  after_validation :check_pending_delete

73
  acts_as_taggable
74

75
  attr_accessor :new_default_branch
76
  attr_accessor :old_path_with_namespace
77

78 79
  alias_attribute :title, :name

80
  # Relations
81
  belongs_to :creator, class_name: 'User'
82
  belongs_to :group, -> { where(type: 'Group') }, foreign_key: 'namespace_id'
83
  belongs_to :namespace
84

85
  has_one :last_event, -> {order 'events.created_at DESC'}, class_name: 'Event'
86
  has_many :boards, before_add: :validate_board_limit, dependent: :destroy
87

88
  # Project services
89
  has_one :campfire_service, dependent: :destroy
Kirilll Zaitsev committed
90
  has_one :drone_ci_service, dependent: :destroy
91
  has_one :emails_on_push_service, dependent: :destroy
92
  has_one :pipelines_email_service, dependent: :destroy
Aorimn committed
93
  has_one :irker_service, dependent: :destroy
94
  has_one :pivotaltracker_service, dependent: :destroy
95
  has_one :hipchat_service, dependent: :destroy
96
  has_one :flowdock_service, dependent: :destroy
97
  has_one :assembla_service, dependent: :destroy
Jeremy committed
98
  has_one :asana_service, dependent: :destroy
99
  has_one :gemnasium_service, dependent: :destroy
100
  has_one :mattermost_slash_commands_service, dependent: :destroy
101
  has_one :mattermost_service, dependent: :destroy
102
  has_one :slack_slash_commands_service, dependent: :destroy
103
  has_one :slack_service, dependent: :destroy
104
  has_one :buildkite_service, dependent: :destroy
105
  has_one :bamboo_service, dependent: :destroy
106
  has_one :teamcity_service, dependent: :destroy
107
  has_one :pushover_service, dependent: :destroy
108 109
  has_one :jira_service, dependent: :destroy
  has_one :redmine_service, dependent: :destroy
110
  has_one :custom_issue_tracker_service, dependent: :destroy
111
  has_one :bugzilla_service, dependent: :destroy
112
  has_one :gitlab_issue_tracker_service, dependent: :destroy, inverse_of: :project
113
  has_one :external_wiki_service, dependent: :destroy
114
  has_one :kubernetes_service, dependent: :destroy, inverse_of: :project
115
  has_one :prometheus_service, dependent: :destroy, inverse_of: :project
116
  has_one :mock_ci_service, dependent: :destroy
117 118
  has_one :mock_deployment_service, dependent: :destroy
  has_one :mock_monitoring_service, dependent: :destroy
119
  has_one :microsoft_teams_service, dependent: :destroy
120

121 122 123 124 125
  has_one  :forked_project_link,  dependent: :destroy, foreign_key: "forked_to_project_id"
  has_one  :forked_from_project,  through:   :forked_project_link

  has_many :forked_project_links, foreign_key: "forked_from_project_id"
  has_many :forks,                through:     :forked_project_links, source: :forked_to_project
126

127
  # Merge Requests for target project should be removed with it
128
  has_many :merge_requests,     dependent: :destroy, foreign_key: 'target_project_id'
129
  has_many :issues,             dependent: :destroy
130
  has_many :labels,             dependent: :destroy, class_name: 'ProjectLabel'
131 132
  has_many :services,           dependent: :destroy
  has_many :events,             dependent: :destroy
133 134
  has_many :milestones,         dependent: :destroy
  has_many :notes,              dependent: :destroy
135 136
  has_many :snippets,           dependent: :destroy, class_name: 'ProjectSnippet'
  has_many :hooks,              dependent: :destroy, class_name: 'ProjectHook'
137
  has_many :protected_branches, dependent: :destroy
138
  has_many :protected_tags,     dependent: :destroy
139

140
  has_many :project_authorizations
141
  has_many :authorized_users, through: :project_authorizations, source: :user, class_name: 'User'
142
  has_many :project_members, -> { where(requested_at: nil) }, dependent: :destroy, as: :source
143
  alias_method :members, :project_members
144 145 146 147
  has_many :users, through: :project_members

  has_many :requesters, -> { where.not(requested_at: nil) }, dependent: :destroy, as: :source, class_name: 'ProjectMember'

148 149
  has_many :deploy_keys_projects, dependent: :destroy
  has_many :deploy_keys, through: :deploy_keys_projects
Ciro Santilli committed
150 151
  has_many :users_star_projects, dependent: :destroy
  has_many :starrers, through: :users_star_projects, source: :user
152
  has_many :releases, dependent: :destroy
153 154
  has_many :lfs_objects_projects, dependent: :destroy
  has_many :lfs_objects, through: :lfs_objects_projects
155 156
  has_many :project_group_links, dependent: :destroy
  has_many :invited_groups, through: :project_group_links, source: :group
Kamil Trzcinski committed
157
  has_many :pages_domains, dependent: :destroy
158
  has_many :todos, dependent: :destroy
159
  has_many :notification_settings, dependent: :destroy, as: :source
160

161
  has_one :import_data, dependent: :destroy, class_name: "ProjectImportData"
162
  has_one :project_feature, dependent: :destroy
163
  has_one :statistics, class_name: 'ProjectStatistics', dependent: :delete
164
  has_many :container_repositories, dependent: :destroy
165

166 167 168 169
  has_many :commit_statuses, dependent: :destroy
  has_many :pipelines, dependent: :destroy, class_name: 'Ci::Pipeline'
  has_many :builds, class_name: 'Ci::Build' # the builds are created from the commit_statuses
  has_many :runner_projects, dependent: :destroy, class_name: 'Ci::RunnerProject'
170
  has_many :runners, through: :runner_projects, source: :runner, class_name: 'Ci::Runner'
171 172
  has_many :variables, dependent: :destroy, class_name: 'Ci::Variable'
  has_many :triggers, dependent: :destroy, class_name: 'Ci::Trigger'
173 174
  has_many :environments, dependent: :destroy
  has_many :deployments, dependent: :destroy
175

Kamil Trzcinski committed
176 177
  has_many :active_runners, -> { active }, through: :runner_projects, source: :runner, class_name: 'Ci::Runner'

178
  accepts_nested_attributes_for :variables, allow_destroy: true
179
  accepts_nested_attributes_for :project_feature
180

181
  delegate :name, to: :owner, allow_nil: true, prefix: true
Douwe Maan committed
182
  delegate :count, to: :forks, prefix: true
183
  delegate :members, to: :team, prefix: true
184
  delegate :add_user, :add_users, to: :team
185
  delegate :add_guest, :add_reporter, :add_developer, :add_master, to: :team
Douwe Maan committed
186
  delegate :empty_repo?, to: :repository
187

Andrey Kumanyaev committed
188
  # Validations
189
  validates :creator, presence: true, on: :create
190
  validates :description, length: { maximum: 2000 }, allow_blank: true
191 192
  validates :name,
    presence: true,
193
    length: { maximum: 255 },
194
    format: { with: Gitlab::Regex.project_name_regex,
195
              message: Gitlab::Regex.project_name_regex_message }
196 197
  validates :path,
    presence: true,
198
    project_path: true,
199
    length: { maximum: 255 },
200 201
    format: { with: Gitlab::Regex.project_path_regex,
              message: Gitlab::Regex.project_path_regex_message }
202
  validates :namespace, presence: true
Douwe Maan committed
203 204
  validates :name, uniqueness: { scope: :namespace_id }
  validates :path, uniqueness: { scope: :namespace_id }
205
  validates :import_url, addressable_url: true, if: :external_import?
206
  validates :import_url, importable_url: true, if: [:external_import?, :import_url_changed?]
207
  validates :star_count, numericality: { greater_than_or_equal_to: 0 }
208
  validate :check_limit, on: :create
209
  validate :avatar_type,
210
    if: ->(project) { project.avatar.present? && project.avatar_changed? }
211
  validates :avatar, file_size: { maximum: 200.kilobytes.to_i }
212
  validate :visibility_level_allowed_by_group
Douwe Maan committed
213
  validate :visibility_level_allowed_as_fork
214
  validate :check_wiki_path_conflict
215 216 217
  validates :repository_storage,
    presence: true,
    inclusion: { in: ->(_object) { Gitlab.config.repositories.storages.keys } }
218

219
  add_authentication_token_field :runners_token
220
  before_save :ensure_runners_token
221

222
  mount_uploader :avatar, AvatarUploader
223
  has_many :uploads, as: :model, dependent: :destroy
Andrey Kumanyaev committed
224

225
  # Scopes
226 227
  default_scope { where(pending_delete: false) }

228 229
  scope :with_deleted, -> { unscope(where: :pending_delete) }

230
  scope :sorted_by_activity, -> { reorder(last_activity_at: :desc) }
231 232
  scope :sorted_by_stars, -> { reorder('projects.star_count DESC') }

233
  scope :in_namespace, ->(namespace_ids) { where(namespace_id: namespace_ids) }
234
  scope :personal, ->(user) { where(namespace_id: user.namespace_id) }
235
  scope :joined, ->(user) { where('namespace_id != ?', user.namespace_id) }
236
  scope :visible_to_user, ->(user) { where(id: user.authorized_projects.select(:id).reorder(nil)) }
237
  scope :non_archived, -> { where(archived: false) }
238
  scope :for_milestones, ->(ids) { joins(:milestones).where('milestones.id' => ids).distinct }
239 240
  scope :with_push, -> { joins(:events).where('events.action = ?', Event::PUSHED) }

241
  scope :with_project_feature, -> { joins('LEFT JOIN project_features ON projects.id = project_features.project_id') }
242
  scope :with_statistics, -> { includes(:statistics) }
243
  scope :with_shared_runners, -> { where(shared_runners_enabled: true) }
244 245 246
  scope :inside_path, ->(path) do
    # We need routes alias rs for JOIN so it does not conflict with
    # includes(:route) which we use in ProjectsFinder.
247
    joins("INNER JOIN routes rs ON rs.source_id = projects.id AND rs.source_type = 'Project'").
248
      where('rs.path LIKE ?', "#{sanitize_sql_like(path)}/%")
249
  end
250 251 252 253 254 255 256 257 258 259 260 261 262 263 264 265

  # "enabled" here means "not disabled". It includes private features!
  scope :with_feature_enabled, ->(feature) {
    access_level_attribute = ProjectFeature.access_level_attribute(feature)
    with_project_feature.where(project_features: { access_level_attribute => [nil, ProjectFeature::PRIVATE, ProjectFeature::ENABLED] })
  }

  # Picks a feature where the level is exactly that given.
  scope :with_feature_access_level, ->(feature, level) {
    access_level_attribute = ProjectFeature.access_level_attribute(feature)
    with_project_feature.where(project_features: { access_level_attribute => level })
  }

  scope :with_builds_enabled, -> { with_feature_enabled(:builds) }
  scope :with_issues_enabled, -> { with_feature_enabled(:issues) }

266
  enum auto_cancel_pending_pipelines: { disabled: 0, enabled: 1 }
267

268 269 270 271 272 273 274 275 276 277 278 279 280 281 282
  # project features may be "disabled", "internal" or "enabled". If "internal",
  # they are only available to team members. This scope returns projects where
  # the feature is either enabled, or internal with permission for the user.
  def self.with_feature_available_for_user(feature, user)
    return with_feature_enabled(feature) if user.try(:admin?)

    unconditional = with_feature_access_level(feature, [nil, ProjectFeature::ENABLED])
    return unconditional if user.nil?

    conditional = with_feature_access_level(feature, ProjectFeature::PRIVATE)
    authorized = user.authorized_projects.merge(conditional.reorder(nil))

    union = Gitlab::SQL::Union.new([unconditional.select(:id), authorized.select(:id)])
    where(arel_table[:id].in(Arel::Nodes::SqlLiteral.new(union.to_sql)))
  end
283

284 285
  scope :active, -> { joins(:issues, :notes, :merge_requests).order('issues.created_at, notes.created_at, merge_requests.created_at DESC') }
  scope :abandoned, -> { where('projects.last_activity_at < ?', 6.months.ago) }
286

287 288
  scope :excluding_project, ->(project) { where.not(id: project) }

289 290
  state_machine :import_status, initial: :none do
    event :import_start do
291
      transition [:none, :finished] => :started
292 293 294
    end

    event :import_finish do
295
      transition started: :finished
296 297 298
    end

    event :import_fail do
299
      transition started: :failed
300 301 302
    end

    event :import_retry do
303
      transition failed: :started
304 305 306 307
    end

    state :started
    state :finished
308 309
    state :failed

310
    after_transition any => :finished, do: :reset_cache_and_import_attrs
311 312
  end

Andrey Kumanyaev committed
313
  class << self
314 315 316 317 318 319 320
    # Searches for a list of projects based on the query given in `query`.
    #
    # On PostgreSQL this method uses "ILIKE" to perform a case-insensitive
    # search. On MySQL a regular "LIKE" is used as it's already
    # case-insensitive.
    #
    # query - The search query as a String.
321
    def search(query)
322
      ptable  = arel_table
323 324 325
      ntable  = Namespace.arel_table
      pattern = "%#{query}%"

326 327 328
      # unscoping unnecessary conditions that'll be applied
      # when executing `where("projects.id IN (#{union.to_sql})")`
      projects = unscoped.select(:id).where(
329 330 331
        ptable[:path].matches(pattern).
          or(ptable[:name].matches(pattern)).
          or(ptable[:description].matches(pattern))
332 333
      )

334
      namespaces = unscoped.select(:id).
335 336
        joins(:namespace).
        where(ntable[:name].matches(pattern))
337 338 339 340

      union = Gitlab::SQL::Union.new([projects, namespaces])

      where("projects.id IN (#{union.to_sql})")
Andrey Kumanyaev committed
341
    end
342

343
    def search_by_visibility(level)
344
      where(visibility_level: Gitlab::VisibilityLevel.string_options[level])
345 346
    end

347
    def search_by_title(query)
348 349 350 351
      pattern = "%#{query}%"
      table   = Project.arel_table

      non_archived.where(table[:name].matches(pattern))
352 353
    end

354 355 356
    def visibility_levels
      Gitlab::VisibilityLevel.options
    end
357 358

    def sort(method)
359 360
      case method.to_s
      when 'storage_size_desc'
361 362 363
        # storage_size is a joined column so we need to
        # pass a string to avoid AR adding the table name
        reorder('project_statistics.storage_size DESC, projects.id DESC')
364 365 366 367
      when 'latest_activity_desc'
        reorder(last_activity_at: :desc)
      when 'latest_activity_asc'
        reorder(last_activity_at: :asc)
368 369
      else
        order_by(method)
370 371
      end
    end
372 373

    def reference_pattern
374
      name_pattern = Gitlab::Regex::FULL_NAMESPACE_REGEX_STR
375 376 377 378 379

      %r{
        ((?<namespace>#{name_pattern})\/)?
        (?<project>#{name_pattern})
      }x
380
    end
381

382
    def trending
383 384
      joins('INNER JOIN trending_projects ON projects.id = trending_projects.project_id').
        reorder('trending_projects.id ASC')
385
    end
386 387 388 389 390 391

    def cached_count
      Rails.cache.fetch('total_project_count', expires_in: 5.minutes) do
        Project.count
      end
    end
392 393

    def group_ids
394
      joins(:namespace).where(namespaces: { type: 'Group' }).select(:namespace_id)
395
    end
396 397
  end

398
  def lfs_enabled?
399
    return namespace.lfs_enabled? if self[:lfs_enabled].nil?
400

401
    self[:lfs_enabled] && Gitlab.config.lfs.enabled
402 403
  end

404
  def repository_storage_path
405
    Gitlab.config.repositories.storages[repository_storage]['path']
406 407
  end

408
  def team
409
    @team ||= ProjectTeam.new(self)
410 411 412
  end

  def repository
413
    @repository ||= Repository.new(path_with_namespace, self)
414 415
  end

416
  def container_registry_url
Kamil Trzcinski committed
417
    if Gitlab.config.registry.enabled
418
      "#{Gitlab.config.registry.host_port}/#{path_with_namespace.downcase}"
419
    end
420 421
  end

422
  def has_container_registry_tags?
423 424
    container_repositories.to_a.any?(&:has_tags?) ||
      has_root_container_repository_tags?
425 426
  end

427 428
  def commit(ref = 'HEAD')
    repository.commit(ref)
429 430
  end

431
  # ref can't be HEAD, can only be branch/tag name or SHA
432
  def latest_successful_builds_for(ref = default_branch)
433
    latest_pipeline = pipelines.latest_successful_for(ref)
434 435 436 437 438 439

    if latest_pipeline
      latest_pipeline.builds.latest.with_artifacts
    else
      builds.none
    end
440 441
  end

442
  def merge_base_commit(first_commit_id, second_commit_id)
Douwe Maan committed
443 444
    sha = repository.merge_base(first_commit_id, second_commit_id)
    repository.commit(sha) if sha
445 446
  end

447
  def saved?
448
    id && persisted?
449 450
  end

451
  def add_import_job
Douwe Maan committed
452 453 454 455 456 457 458 459
    job_id =
      if forked?
        RepositoryForkWorker.perform_async(id, forked_from_project.repository_storage_path,
          forked_from_project.path_with_namespace,
          self.namespace.full_path)
      else
        RepositoryImportWorker.perform_async(self.id)
      end
460 461 462 463 464

    if job_id
      Rails.logger.info "Import job started for #{path_with_namespace} with job ID #{job_id}"
    else
      Rails.logger.error "Import job failed to start for #{path_with_namespace}"
465
    end
466 467
  end

468
  def reset_cache_and_import_attrs
469 470
    ProjectCacheWorker.perform_async(self.id)

471
    self.import_data&.destroy
472 473
  end

474
  def import_url=(value)
475 476
    return super(value) unless Gitlab::UrlSanitizer.valid?(value)

477
    import_url = Gitlab::UrlSanitizer.new(value)
James Lopez committed
478
    super(import_url.sanitized_url)
479
    create_or_update_import_data(credentials: import_url.credentials)
480 481 482
  end

  def import_url
483
    if import_data && super.present?
484
      import_url = Gitlab::UrlSanitizer.new(super, credentials: import_data.credentials)
James Lopez committed
485 486 487
      import_url.full_url
    else
      super
488 489
    end
  end
490

James Lopez committed
491 492 493 494
  def valid_import_url?
    valid? || errors.messages[:import_url].nil?
  end

495
  def create_or_update_import_data(data: nil, credentials: nil)
496
    return unless import_url.present? && valid_import_url?
497

James Lopez committed
498
    project_import_data = import_data || build_import_data
499 500 501 502
    if data
      project_import_data.data ||= {}
      project_import_data.data = project_import_data.data.merge(data)
    end
503 504 505 506
    if credentials
      project_import_data.credentials ||= {}
      project_import_data.credentials = project_import_data.credentials.merge(credentials)
    end
507 508

    project_import_data.save
509
  end
510

511
  def import?
512
    external_import? || forked? || gitlab_project_import?
513 514
  end

515 516 517 518
  def no_import?
    import_status == 'none'
  end

519
  def external_import?
520 521 522
    import_url.present?
  end

523
  def imported?
524 525 526 527 528 529 530 531 532 533 534 535 536
    import_finished?
  end

  def import_in_progress?
    import? && import_status == 'started'
  end

  def import_failed?
    import_status == 'failed'
  end

  def import_finished?
    import_status == 'finished'
537 538
  end

539
  def safe_import_url
540
    Gitlab::UrlSanitizer.new(import_url).masked_url
541 542
  end

543 544 545 546
  def gitlab_project_import?
    import_type == 'gitlab_project'
  end

547 548 549 550
  def gitea_import?
    import_type == 'gitea'
  end

551 552 553 554
  def github_import?
    import_type == 'github'
  end

555
  def check_limit
Douwe Maan committed
556
    unless creator.can_create_project? || namespace.kind == 'group'
557 558 559
      projects_limit = creator.projects_limit

      if projects_limit == 0
560
        self.errors.add(:limit_reached, "Personal project creation is not allowed. Please contact your administrator with questions")
561
      else
562
        self.errors.add(:limit_reached, "Your project limit is #{projects_limit} projects! Please contact your administrator to increase it")
563
      end
564 565
    end
  rescue
566
    self.errors.add(:base, "Can't check your ability to create project")
gitlabhq committed
567 568
  end

569 570 571 572 573 574 575 576 577 578 579 580 581
  def visibility_level_allowed_by_group
    return if visibility_level_allowed_by_group?

    level_name = Gitlab::VisibilityLevel.level_name(self.visibility_level).downcase
    group_level_name = Gitlab::VisibilityLevel.level_name(self.group.visibility_level).downcase
    self.errors.add(:visibility_level, "#{level_name} is not allowed in a #{group_level_name} group.")
  end

  def visibility_level_allowed_as_fork
    return if visibility_level_allowed_as_fork?

    level_name = Gitlab::VisibilityLevel.level_name(self.visibility_level).downcase
    self.errors.add(:visibility_level, "#{level_name} is not allowed since the fork source project has lower visibility.")
582 583
  end

584 585 586 587 588 589 590 591 592 593
  def check_wiki_path_conflict
    return if path.blank?

    path_to_check = path.ends_with?('.wiki') ? path.chomp('.wiki') : "#{path}.wiki"

    if Project.where(namespace_id: namespace_id, path: path_to_check).exists?
      errors.add(:name, 'has already been taken')
    end
  end

594
  def to_param
595 596 597 598 599
    if persisted? && errors.include?(:path)
      path_was
    else
      path
    end
600 601
  end

602
  # `from` argument can be a Namespace or Project.
603 604 605 606 607 608
  def to_reference(from = nil, full: false)
    if full || cross_namespace_reference?(from)
      path_with_namespace
    elsif cross_project_reference?(from)
      path
    end
609 610 611 612 613 614 615 616
  end

  def to_human_reference(from_project = nil)
    if cross_namespace_reference?(from_project)
      name_with_namespace
    elsif cross_project_reference?(from_project)
      name
    end
617 618
  end

619
  def web_url
620
    Gitlab::Routing.url_helpers.namespace_project_url(self.namespace, self)
621 622
  end

623
  def new_issue_address(author)
624
    return unless Gitlab::IncomingEmail.supports_issue_creation? && author
625

626 627 628 629
    author.ensure_incoming_email_token!

    Gitlab::IncomingEmail.reply_address(
      "#{path_with_namespace}+#{author.incoming_email_token}")
630 631
  end

632
  def build_commit_note(commit)
633
    notes.new(commit_id: commit.id, noteable_type: 'Commit')
gitlabhq committed
634
  end
Nihad Abbasov committed
635

636
  def last_activity
637
    last_event
gitlabhq committed
638 639 640
  end

  def last_activity_date
Andrey Kumanyaev committed
641
    last_activity_at || updated_at
Dmitriy Zaporozhets committed
642
  end
643

644 645 646
  def project_id
    self.id
  end
randx committed
647

648
  def get_issue(issue_id, current_user)
649
    if default_issues_tracker?
650
      IssuesFinder.new(current_user, project_id: id).find_by(iid: issue_id)
651
    else
652
      ExternalIssue.new(issue_id, self)
653 654 655
    end
  end

656
  def issue_exists?(issue_id)
657
    get_issue(issue_id)
658 659
  end

660
  def default_issue_tracker
661
    gitlab_issue_tracker_service || create_gitlab_issue_tracker_service
662 663 664 665 666 667 668 669 670 671
  end

  def issues_tracker
    if external_issue_tracker
      external_issue_tracker
    else
      default_issue_tracker
    end
  end

672 673 674 675
  def issue_reference_pattern
    issues_tracker.reference_pattern
  end

676
  def default_issues_tracker?
677
    !external_issue_tracker
678 679 680
  end

  def external_issue_tracker
681 682 683 684 685 686 687 688 689 690 691 692 693 694 695
    if has_external_issue_tracker.nil? # To populate existing projects
      cache_has_external_issue_tracker
    end

    if has_external_issue_tracker?
      return @external_issue_tracker if defined?(@external_issue_tracker)

      @external_issue_tracker = services.external_issue_trackers.first
    else
      nil
    end
  end

  def cache_has_external_issue_tracker
    update_column(:has_external_issue_tracker, services.external_issue_trackers.any?)
696 697
  end

698 699 700 701
  def has_wiki?
    wiki_enabled? || has_external_wiki?
  end

702 703 704 705 706 707 708 709 710 711 712 713 714 715 716 717
  def external_wiki
    if has_external_wiki.nil?
      cache_has_external_wiki # Populate
    end

    if has_external_wiki
      @external_wiki ||= services.external_wikis.first
    else
      nil
    end
  end

  def cache_has_external_wiki
    update_column(:has_external_wiki, services.external_wikis.any?)
  end

718
  def find_or_initialize_services
719 720
    services_templates = Service.where(template: true)

721
    Service.available_services_names.map do |service_name|
722
      service = find_service(services, service_name)
723

724 725 726
      if service
        service
      else
727 728 729 730
        # We should check if template for the service exists
        template = find_service(services_templates, service_name)

        if template.nil?
731 732
          # If no template, we should create an instance. Ex `build_gitlab_ci_service`
          public_send("build_#{service_name}_service")
733
        else
734
          Service.build_from_template(id, template)
735 736
        end
      end
737 738 739
    end
  end

740 741 742 743
  def find_or_initialize_service(name)
    find_or_initialize_services.find { |service| service.to_param == name }
  end

744 745
  def create_labels
    Label.templates.each do |label|
746
      params = label.attributes.except('id', 'template', 'created_at', 'updated_at')
747
      Labels::FindOrCreateService.new(nil, self, params).execute(skip_authorization: true)
748 749 750
    end
  end

751 752 753
  def find_service(list, name)
    list.find { |service| service.to_param == name }
  end
754

755
  def ci_services
756
    services.where(category: :ci)
757 758 759
  end

  def ci_service
760
    @ci_service ||= ci_services.reorder(nil).find_by(active: true)
761 762
  end

763 764 765 766 767 768 769 770
  def deployment_services
    services.where(category: :deployment)
  end

  def deployment_service
    @deployment_service ||= deployment_services.reorder(nil).find_by(active: true)
  end

771 772 773 774 775 776 777 778
  def monitoring_services
    services.where(category: :monitoring)
  end

  def monitoring_service
    @monitoring_service ||= monitoring_services.reorder(nil).find_by(active: true)
  end

Drew Blessing committed
779 780 781 782
  def jira_tracker?
    issues_tracker.to_param == 'jira'
  end

783
  def avatar_type
784 785
    unless self.avatar.image?
      self.errors.add :avatar, 'only images allowed'
786 787 788 789
    end
  end

  def avatar_in_git
790
    repository.avatar
791 792
  end

793
  def avatar_url
794
    if self[:avatar].present?
795 796
      [gitlab_config.url, avatar.url].join
    elsif avatar_in_git
797
      Gitlab::Routing.url_helpers.namespace_project_avatar_url(namespace, self)
798 799 800
    end
  end

801 802 803 804 805
  # For compatibility with old code
  def code
    path
  end

806
  def items_for(entity)
807 808 809 810 811 812 813
    case entity
    when 'issue' then
      issues
    when 'merge_request' then
      merge_requests
    end
  end
814

815
  def send_move_instructions(old_path_with_namespace)
816 817 818
    # New project path needs to be committed to the DB or notification will
    # retrieve stale information
    run_after_commit { NotificationService.new.project_was_moved(self, old_path_with_namespace) }
819
  end
820 821

  def owner
822 823
    if group
      group
824
    else
825
      namespace.try(:owner)
826 827
    end
  end
Dmitriy Zaporozhets committed
828

829 830
  def execute_hooks(data, hooks_scope = :push_hooks)
    hooks.send(hooks_scope).each do |hook|
831
      hook.async_execute(data, hooks_scope.to_s)
832
    end
Dmitriy Zaporozhets committed
833 834
  end

835 836 837
  def execute_services(data, hooks_scope = :push_hooks)
    # Call only service hooks that are active for this scope
    services.send(hooks_scope).each do |service|
838
      service.async_execute(data)
Dmitriy Zaporozhets committed
839 840 841 842
    end
  end

  def valid_repo?
843
    repository.exists?
Dmitriy Zaporozhets committed
844
  rescue
845
    errors.add(:path, 'Invalid repository path')
Dmitriy Zaporozhets committed
846 847 848 849
    false
  end

  def repo
850
    repository.raw
Dmitriy Zaporozhets committed
851 852 853
  end

  def url_to_repo
854
    gitlab_shell.url_to_repo(path_with_namespace)
Dmitriy Zaporozhets committed
855 856 857
  end

  def repo_exists?
858
    @repo_exists ||= repository.exists?
Dmitriy Zaporozhets committed
859 860 861 862 863
  rescue
    @repo_exists = false
  end

  def root_ref?(branch)
864
    repository.root_ref == branch
Dmitriy Zaporozhets committed
865 866 867 868 869 870
  end

  def ssh_url_to_repo
    url_to_repo
  end

871
  def http_url_to_repo(user = nil)
872
    credentials = Gitlab::UrlSanitizer.http_credentials_for_user(user)
873

874
    Gitlab::UrlSanitizer.new("#{web_url}.git", credentials: credentials).full_url
Dmitriy Zaporozhets committed
875 876
  end

877
  def user_can_push_to_empty_repo?(user)
878
    !ProtectedBranch.default_branch_protected? || team.max_member_access(user.id) > Gitlab::Access::DEVELOPER
879 880
  end

881 882 883
  def forked?
    !(forked_project_link.nil? || forked_project_link.forked_from_project.nil?)
  end
884

885 886 887 888
  def personal?
    !group
  end

889
  def rename_repo
890
    path_was = previous_changes['path'].first
891 892
    old_path_with_namespace = File.join(namespace.full_path, path_was)
    new_path_with_namespace = File.join(namespace.full_path, path)
893

894 895
    Rails.logger.error "Attempting to rename #{old_path_with_namespace} -> #{new_path_with_namespace}"

896 897
    expire_caches_before_rename(old_path_with_namespace)

898
    if has_container_registry_tags?
899
      Rails.logger.error "Project #{old_path_with_namespace} cannot be renamed because container registry tags are present!"
900

901 902
      # we currently doesn't support renaming repository if it contains images in container registry
      raise StandardError.new('Project cannot be renamed, because images are present in its container registry')
903 904
    end

905
    if gitlab_shell.mv_repository(repository_storage_path, old_path_with_namespace, new_path_with_namespace)
906
      # If repository moved successfully we need to send update instructions to users.
907 908 909
      # However we cannot allow rollback since we moved repository
      # So we basically we mute exceptions in next actions
      begin
910
        gitlab_shell.mv_repository(repository_storage_path, "#{old_path_with_namespace}.wiki", "#{new_path_with_namespace}.wiki")
911
        send_move_instructions(old_path_with_namespace)
912 913 914 915 916

        @old_path_with_namespace = old_path_with_namespace

        SystemHooksService.new.execute_hooks_for(self, :rename)

917
        @repository = nil
918 919
      rescue => e
        Rails.logger.error "Exception renaming #{old_path_with_namespace} -> #{new_path_with_namespace}: #{e}"
Johannes Schleifenbaum committed
920
        # Returning false does not rollback after_* transaction but gives
921 922 923 924
        # us information about failing some of tasks
        false
      end
    else
925 926
      Rails.logger.error "Repository could not be renamed: #{old_path_with_namespace} -> #{new_path_with_namespace}"

927 928
      # if we cannot move namespace directory we should rollback
      # db changes in order to prevent out of sync between db and fs
929
      raise StandardError.new('repository cannot be renamed')
930
    end
931

932 933
    Gitlab::AppLogger.info "Project was renamed: #{old_path_with_namespace} -> #{new_path_with_namespace}"

934 935
    Gitlab::UploadsTransfer.new.rename_project(path_was, path, namespace.full_path)
    Gitlab::PagesTransfer.new.rename_project(path_was, path, namespace.full_path)
936
  end
937

938 939 940 941 942 943
  # Expires various caches before a project is renamed.
  def expire_caches_before_rename(old_path)
    repo = Repository.new(old_path, self)
    wiki = Repository.new("#{old_path}.wiki", self)

    if repo.exists?
944
      repo.before_delete
945 946 947
    end

    if wiki.exists?
948
      wiki.before_delete
949 950 951
    end
  end

952 953
  def hook_attrs(backward: true)
    attrs = {
Kirill Zaitsev committed
954
      name: name,
955
      description: description,
Kirilll Zaitsev committed
956
      web_url: web_url,
957 958 959
      avatar_url: avatar_url,
      git_ssh_url: ssh_url_to_repo,
      git_http_url: http_url_to_repo,
Kirill Zaitsev committed
960
      namespace: namespace.name,
961 962 963
      visibility_level: visibility_level,
      path_with_namespace: path_with_namespace,
      default_branch: default_branch,
Kirill Zaitsev committed
964
    }
965 966 967 968 969 970 971 972 973 974 975 976

    # Backward compatibility
    if backward
      attrs.merge!({
                    homepage: web_url,
                    url: url_to_repo,
                    ssh_url: ssh_url_to_repo,
                    http_url: http_url_to_repo
                  })
    end

    attrs
Kirill Zaitsev committed
977 978
  end

979
  def project_member(user)
980
    project_members.find_by(user_id: user)
981
  end
982 983 984 985

  def default_branch
    @default_branch ||= repository.root_ref if repository.exists?
  end
986 987 988 989 990

  def reload_default_branch
    @default_branch = nil
    default_branch
  end
991

992
  def visibility_level_field
993
    :visibility_level
994
  end
995 996 997 998 999 1000 1001 1002

  def archive!
    update_attribute(:archived, true)
  end

  def unarchive!
    update_attribute(:archived, false)
  end
1003

1004
  def change_head(branch)
1005
    repository.before_change_head
P.S.V.R committed
1006 1007 1008
    repository.rugged.references.create('HEAD',
                                        "refs/heads/#{branch}",
                                        force: true)
1009
    repository.copy_gitattributes(branch)
1010
    repository.after_change_head
1011 1012
    reload_default_branch
  end
1013 1014 1015 1016

  def forked_from?(project)
    forked? && project == forked_from_project
  end
1017

1018 1019 1020
  def origin_merge_requests
    merge_requests.where(source_project_id: self.id)
  end
1021 1022

  def create_repository
1023 1024
    # Forked import is handled asynchronously
    unless forked?
1025
      if gitlab_shell.add_repository(repository_storage_path, path_with_namespace)
1026
        repository.after_create
1027 1028
        true
      else
1029
        errors.add(:base, 'Failed to create repository via gitlab-shell')
1030 1031
        false
      end
1032 1033 1034 1035 1036 1037 1038 1039 1040 1041
    end
  end

  def repository_exists?
    !!repository.exists?
  end

  def create_wiki
    ProjectWiki.new(self, self.owner).wiki
    true
1042
  rescue ProjectWiki::CouldNotCreateWikiError
1043
    errors.add(:base, 'Failed create wiki')
1044 1045
    false
  end
1046

Drew Blessing committed
1047 1048 1049 1050
  def jira_tracker_active?
    jira_tracker? && jira_service.active
  end

1051
  def allowed_to_share_with_group?
1052
    !namespace.share_with_group_lock
1053 1054
  end

1055 1056 1057
  def pipeline_for(ref, sha = nil)
    sha ||= commit(ref).try(:sha)

1058
    return unless sha
1059

1060
    pipelines.order(id: :desc).find_by(sha: sha, ref: ref)
1061 1062
  end

1063 1064 1065
  def ensure_pipeline(ref, sha, current_user = nil)
    pipeline_for(ref, sha) ||
      pipelines.create(sha: sha, ref: ref, user: current_user)
1066
  end
1067

1068
  def enable_ci
1069
    project_feature.update_attribute(:builds_access_level, ProjectFeature::ENABLED)
1070
  end
1071

1072 1073 1074 1075 1076
  def shared_runners_available?
    shared_runners_enabled?
  end

  def shared_runners
1077
    @shared_runners ||= shared_runners_available? ? Ci::Runner.shared : Ci::Runner.none
1078 1079
  end

1080 1081
  def active_shared_runners
    @active_shared_runners ||= shared_runners.active
1082
  end
1083 1084

  def any_runners?(&block)
Kamil Trzcinski committed
1085
    active_runners.any?(&block) || active_shared_runners.any?(&block)
1086 1087
  end

1088
  def valid_runners_token?(token)
1089
    self.runners_token && ActiveSupport::SecurityUtils.variable_size_secure_compare(token, self.runners_token)
Kamil Trzcinski committed
1090 1091
  end

1092 1093 1094 1095 1096 1097 1098
  def build_timeout_in_minutes
    build_timeout / 60
  end

  def build_timeout_in_minutes=(value)
    self.build_timeout = value.to_i * 60
  end
1099

1100 1101 1102
  def open_issues_count
    issues.opened.count
  end
1103

1104
  def visibility_level_allowed_as_fork?(level = self.visibility_level)
Douwe Maan committed
1105
    return true unless forked?
1106

Douwe Maan committed
1107 1108 1109 1110 1111 1112
    # self.forked_from_project will be nil before the project is saved, so
    # we need to go through the relation
    original_project = forked_project_link.forked_from_project
    return true unless original_project

    level <= original_project.visibility_level
1113
  end
1114

1115 1116
  def visibility_level_allowed_by_group?(level = self.visibility_level)
    return true unless group
1117

1118
    level <= group.visibility_level
1119
  end
1120

1121 1122
  def visibility_level_allowed?(level = self.visibility_level)
    visibility_level_allowed_as_fork?(level) && visibility_level_allowed_by_group?(level)
Felipe Artur committed
1123 1124
  end

1125 1126 1127
  def runners_token
    ensure_runners_token!
  end
1128

1129 1130 1131
  def pages_deployed?
    Dir.exist?(public_pages_path)
  end
1132

1133
  def pages_url
1134 1135
    subdomain, _, url_path = full_path.partition('/')

1136 1137
    # The hostname always needs to be in downcased
    # All web servers convert hostname to lowercase
1138
    host = "#{subdomain}.#{Settings.pages.host}".downcase
1139 1140

    # The host in URL always needs to be downcased
1141
    url = Gitlab.config.pages.url.sub(/^https?:\/\//) do |prefix|
1142
      "#{prefix}#{subdomain}."
1143
    end.downcase
1144

1145
    # If the project path is the same as host, we serve it as group page
1146 1147 1148 1149
    return url if host == url_path

    "#{url}/#{url_path}"
  end
1150

1151 1152
  def pages_subdomain
    full_path.partition('/').first
1153
  end
Kamil Trzcinski committed
1154 1155

  def pages_path
1156
    File.join(Settings.pages.path, path_with_namespace)
Kamil Trzcinski committed
1157 1158 1159 1160 1161 1162 1163
  end

  def public_pages_path
    File.join(pages_path, 'public')
  end

  def remove_pages
1164 1165 1166
    # 1. We rename pages to temporary directory
    # 2. We wait 5 minutes, due to NFS caching
    # 3. We asynchronously remove pages with force
Kamil Trzcinski committed
1167
    temp_path = "#{path}.#{SecureRandom.hex}.deleted"
1168

1169 1170
    if Gitlab::PagesTransfer.new.rename_project(path, temp_path, namespace.full_path)
      PagesWorker.perform_in(5.minutes, :remove, namespace.full_path, temp_path)
1171
    end
Kamil Trzcinski committed
1172 1173
  end

1174 1175 1176
  def wiki
    @wiki ||= ProjectWiki.new(self, self.owner)
  end
1177

Josh Frye committed
1178 1179
  def running_or_pending_build_count(force: false)
    Rails.cache.fetch(['projects', id, 'running_or_pending_build_count'], force: force) do
1180 1181 1182
      builds.running_or_pending.count(:all)
    end
  end
1183

1184
  def pipeline_status
1185
    @pipeline_status ||= Gitlab::Cache::Ci::ProjectPipelineStatus.load_for_project(self)
1186 1187
  end

1188
  def mark_import_as_failed(error_message)
1189 1190 1191
    original_errors = errors.dup
    sanitized_message = Gitlab::UrlSanitizer.sanitize(error_message)

1192
    import_fail
1193 1194 1195 1196 1197
    update_column(:import_error, sanitized_message)
  rescue ActiveRecord::ActiveRecordError => e
    Rails.logger.error("Error setting import status to failed: #{e.message}. Original error: #{sanitized_message}")
  ensure
    @errors = original_errors
1198
  end
James Lopez committed
1199

1200 1201
  def add_export_job(current_user:)
    job_id = ProjectExportWorker.perform_async(current_user.id, self.id)
1202 1203 1204 1205 1206 1207 1208

    if job_id
      Rails.logger.info "Export job started for project ID #{self.id} with job ID #{job_id}"
    else
      Rails.logger.error "Export job failed to start for project ID #{self.id}"
    end
  end
James Lopez committed
1209 1210

  def export_path
1211
    File.join(Gitlab::ImportExport.storage_path, path_with_namespace)
James Lopez committed
1212
  end
1213 1214 1215 1216 1217 1218 1219 1220 1221

  def export_project_path
    Dir.glob("#{export_path}/*export.tar.gz").max_by { |f| File.ctime(f) }
  end

  def remove_exports
    _, status = Gitlab::Popen.popen(%W(find #{export_path} -not -path #{export_path} -delete))
    status.zero?
  end
1222 1223

  def ensure_dir_exist
1224
    gitlab_shell.add_namespace(repository_storage_path, namespace.full_path)
1225
  end
1226 1227 1228 1229 1230 1231

  def predefined_variables
    [
      { key: 'CI_PROJECT_ID', value: id.to_s, public: true },
      { key: 'CI_PROJECT_NAME', value: path, public: true },
      { key: 'CI_PROJECT_PATH', value: path_with_namespace, public: true },
1232
      { key: 'CI_PROJECT_NAMESPACE', value: namespace.full_path, public: true },
1233 1234 1235 1236 1237 1238 1239 1240 1241 1242 1243
      { key: 'CI_PROJECT_URL', value: web_url, public: true }
    ]
  end

  def container_registry_variables
    return [] unless Gitlab.config.registry.enabled

    variables = [
      { key: 'CI_REGISTRY', value: Gitlab.config.registry.host_port, public: true }
    ]

Kamil Trzcinski committed
1244
    if container_registry_enabled?
1245
      variables << { key: 'CI_REGISTRY_IMAGE', value: container_registry_url, public: true }
Kamil Trzcinski committed
1246 1247
    end

1248 1249 1250 1251 1252 1253 1254 1255
    variables
  end

  def secret_variables
    variables.map do |variable|
      { key: variable.key, value: variable.value, public: false }
    end
  end
1256

1257 1258 1259 1260 1261 1262
  def deployment_variables
    return [] unless deployment_service

    deployment_service.predefined_variables
  end

1263 1264 1265 1266 1267 1268 1269 1270 1271 1272
  def append_or_update_attribute(name, value)
    old_values = public_send(name.to_s)

    if Project.reflect_on_association(name).try(:macro) == :has_many && old_values.any?
      update_attribute(name, old_values + value)
    else
      update_attribute(name, value)
    end
  end

1273 1274 1275 1276 1277 1278 1279 1280 1281 1282 1283 1284
  def pushes_since_gc
    Gitlab::Redis.with { |redis| redis.get(pushes_since_gc_redis_key).to_i }
  end

  def increment_pushes_since_gc
    Gitlab::Redis.with { |redis| redis.incr(pushes_since_gc_redis_key) }
  end

  def reset_pushes_since_gc
    Gitlab::Redis.with { |redis| redis.del(pushes_since_gc_redis_key) }
  end

Douwe Maan committed
1285
  def route_map_for(commit_sha)
1286 1287
    @route_maps_by_commit ||= Hash.new do |h, sha|
      h[sha] = begin
Douwe Maan committed
1288
        data = repository.route_map_for(sha)
1289 1290
        next unless data

Douwe Maan committed
1291 1292 1293
        Gitlab::RouteMap.new(data)
      rescue Gitlab::RouteMap::FormatError
        nil
1294 1295 1296 1297 1298 1299 1300
      end
    end

    @route_maps_by_commit[commit_sha]
  end

  def public_path_for_source_path(path, commit_sha)
Douwe Maan committed
1301
    map = route_map_for(commit_sha)
1302 1303
    return unless map

Douwe Maan committed
1304
    map.public_path_for_source_path(path)
1305 1306
  end

1307 1308 1309 1310 1311 1312 1313 1314 1315 1316 1317 1318
  def parent
    namespace
  end

  def parent_changed?
    namespace_id_changed?
  end

  alias_method :name_with_namespace, :full_name
  alias_method :human_name, :full_name
  alias_method :path_with_namespace, :full_path

1319 1320
  private

1321
  def cross_namespace_reference?(from)
1322 1323 1324 1325 1326
    case from
    when Project
      namespace != from.namespace
    when Namespace
      namespace != from
1327 1328 1329
    end
  end

1330
  # Check if a reference is being done cross-project
1331 1332 1333 1334
  def cross_project_reference?(from)
    return true if from.is_a?(Namespace)

    from && self != from
1335 1336
  end

1337 1338 1339 1340
  def pushes_since_gc_redis_key
    "projects/#{id}/pushes_since_gc"
  end

1341 1342 1343 1344 1345 1346 1347
  # Similar to the normal callbacks that hook into the life cycle of an
  # Active Record object, you can also define callbacks that get triggered
  # when you add an object to an association collection. If any of these
  # callbacks throw an exception, the object will not be added to the
  # collection. Before you add a new board to the boards collection if you
  # already have 1, 2, or n it will fail, but it if you have 0 that is lower
  # than the number of permitted boards per project it won't fail.
1348
  def validate_board_limit(board)
1349
    raise BoardLimitExceeded, 'Number of permitted boards exceeded' if boards.size >= NUMBER_OF_PERMITTED_BOARDS
1350
  end
1351

1352 1353 1354 1355
  def update_project_statistics
    stats = statistics || build_statistics
    stats.update(namespace_id: namespace_id)
  end
1356 1357 1358 1359 1360 1361 1362 1363 1364 1365 1366 1367 1368 1369 1370

  def check_pending_delete
    return if valid_attribute?(:name) && valid_attribute?(:path)
    return unless pending_delete_twin

    %i[route route.path name path].each do |error|
      errors.delete(error)
    end

    errors.add(:base, "The project is still being deleted. Please try again later.")
  end

  def pending_delete_twin
    return false unless path

1371
    Project.unscoped.where(pending_delete: true).find_by_full_path(path_with_namespace)
1372
  end
1373 1374 1375 1376 1377 1378 1379 1380 1381

  ##
  # This method is here because of support for legacy container repository
  # which has exactly the same path like project does, but which might not be
  # persisted in `container_repositories` table.
  #
  def has_root_container_repository_tags?
    return false unless Gitlab.config.registry.enabled

1382
    ContainerRepository.build_root_repository(self).has_tags?
1383
  end
gitlabhq committed
1384
end