BigW Consortium Gitlab

project.rb 39.7 KB
Newer Older
1 2
require 'carrierwave/orm/activerecord'

gitlabhq committed
3
class Project < ActiveRecord::Base
4
  include Gitlab::ConfigHelper
5
  include Gitlab::ShellAdapter
6
  include Gitlab::VisibilityLevel
7
  include Gitlab::CurrentSettings
8
  include AccessRequestable
9 10
  include Referable
  include Sortable
11
  include AfterCommitQueue
12
  include CaseSensitivity
13
  include TokenAuthenticatable
14
  include ProjectFeaturesCompatibility
Robert Speicher committed
15

16
  extend Gitlab::ConfigHelper
17

Jared Szechy committed
18 19
  UNKNOWN_IMPORT_URL = 'http://unknown.git'

20 21
  delegate :feature_available?, :builds_enabled?, :wiki_enabled?, :merge_requests_enabled?, to: :project_feature, allow_nil: true

22
  default_value_for :archived, false
23
  default_value_for :visibility_level, gitlab_config_features.visibility_level
24
  default_value_for :container_registry_enabled, gitlab_config_features.container_registry
25
  default_value_for(:repository_storage) { current_application_settings.repository_storage }
26
  default_value_for(:shared_runners_enabled) { current_application_settings.shared_runners_enabled }
27

28 29
  after_create :ensure_dir_exist
  after_save :ensure_dir_exist, if: :namespace_id_changed?
30
  after_initialize :setup_project_feature
31

32 33
  # set last_activity_at to the same as created_at
  after_create :set_last_activity_at
34
  def set_last_activity_at
35
    update_column(:last_activity_at, self.created_at)
36 37
  end

38
  # update visibility_level of forks
39 40 41 42 43 44 45 46 47 48 49 50
  after_update :update_forks_visibility_level
  def update_forks_visibility_level
    return unless visibility_level < visibility_level_was

    forks.each do |forked_project|
      if forked_project.visibility_level > visibility_level
        forked_project.visibility_level = visibility_level
        forked_project.save!
      end
    end
  end

51
  ActsAsTaggableOn.strict_case_match = true
52
  acts_as_taggable_on :tags
53

54
  attr_accessor :new_default_branch
55
  attr_accessor :old_path_with_namespace
56

57 58
  alias_attribute :title, :name

59
  # Relations
60
  belongs_to :creator, foreign_key: 'creator_id', class_name: 'User'
61
  belongs_to :group, -> { where(type: 'Group') }, foreign_key: 'namespace_id'
62
  belongs_to :namespace
63

64
  has_one :last_event, -> {order 'events.created_at DESC'}, class_name: 'Event', foreign_key: 'project_id'
65

66 67
  has_one :board, dependent: :destroy

68 69
  # Project services
  has_many :services
70
  has_one :campfire_service, dependent: :destroy
Kirilll Zaitsev committed
71
  has_one :drone_ci_service, dependent: :destroy
72
  has_one :emails_on_push_service, dependent: :destroy
73
  has_one :builds_email_service, dependent: :destroy
Aorimn committed
74
  has_one :irker_service, dependent: :destroy
75
  has_one :pivotaltracker_service, dependent: :destroy
76
  has_one :hipchat_service, dependent: :destroy
77
  has_one :flowdock_service, dependent: :destroy
78
  has_one :assembla_service, dependent: :destroy
Jeremy committed
79
  has_one :asana_service, dependent: :destroy
80
  has_one :gemnasium_service, dependent: :destroy
81
  has_one :slack_service, dependent: :destroy
82
  has_one :buildkite_service, dependent: :destroy
83
  has_one :bamboo_service, dependent: :destroy
84
  has_one :teamcity_service, dependent: :destroy
85
  has_one :pushover_service, dependent: :destroy
86 87
  has_one :jira_service, dependent: :destroy
  has_one :redmine_service, dependent: :destroy
88
  has_one :custom_issue_tracker_service, dependent: :destroy
89
  has_one :bugzilla_service, dependent: :destroy
90
  has_one :gitlab_issue_tracker_service, dependent: :destroy, inverse_of: :project
91
  has_one :external_wiki_service, dependent: :destroy
92

93 94 95 96 97
  has_one  :forked_project_link,  dependent: :destroy, foreign_key: "forked_to_project_id"
  has_one  :forked_from_project,  through:   :forked_project_link

  has_many :forked_project_links, foreign_key: "forked_from_project_id"
  has_many :forks,                through:     :forked_project_links, source: :forked_to_project
98

99
  # Merge Requests for target project should be removed with it
100
  has_many :merge_requests,     dependent: :destroy, foreign_key: 'target_project_id'
101
  # Merge requests from source project should be kept when source project was removed
102
  has_many :fork_merge_requests, foreign_key: 'source_project_id', class_name: MergeRequest
103
  has_many :issues,             dependent: :destroy
104
  has_many :labels,             dependent: :destroy
105 106
  has_many :services,           dependent: :destroy
  has_many :events,             dependent: :destroy
107 108
  has_many :milestones,         dependent: :destroy
  has_many :notes,              dependent: :destroy
109 110
  has_many :snippets,           dependent: :destroy, class_name: 'ProjectSnippet'
  has_many :hooks,              dependent: :destroy, class_name: 'ProjectHook'
111
  has_many :protected_branches, dependent: :destroy
112 113

  has_many :project_members, -> { where(requested_at: nil) }, dependent: :destroy, as: :source, class_name: 'ProjectMember'
114
  alias_method :members, :project_members
115 116 117 118
  has_many :users, through: :project_members

  has_many :requesters, -> { where.not(requested_at: nil) }, dependent: :destroy, as: :source, class_name: 'ProjectMember'

119 120
  has_many :deploy_keys_projects, dependent: :destroy
  has_many :deploy_keys, through: :deploy_keys_projects
Ciro Santilli committed
121 122
  has_many :users_star_projects, dependent: :destroy
  has_many :starrers, through: :users_star_projects, source: :user
123
  has_many :releases, dependent: :destroy
124 125
  has_many :lfs_objects_projects, dependent: :destroy
  has_many :lfs_objects, through: :lfs_objects_projects
126 127
  has_many :project_group_links, dependent: :destroy
  has_many :invited_groups, through: :project_group_links, source: :group
128
  has_many :todos, dependent: :destroy
129
  has_many :notification_settings, dependent: :destroy, as: :source
130

131
  has_one :import_data, dependent: :destroy, class_name: "ProjectImportData"
132
  has_one :project_feature, dependent: :destroy
133

134
  has_many :commit_statuses, dependent: :destroy, class_name: 'CommitStatus', foreign_key: :gl_project_id
135
  has_many :pipelines, dependent: :destroy, class_name: 'Ci::Pipeline', foreign_key: :gl_project_id
136 137 138 139 140
  has_many :builds, class_name: 'Ci::Build', foreign_key: :gl_project_id # the builds are created from the commit_statuses
  has_many :runner_projects, dependent: :destroy, class_name: 'Ci::RunnerProject', foreign_key: :gl_project_id
  has_many :runners, through: :runner_projects, source: :runner, class_name: 'Ci::Runner'
  has_many :variables, dependent: :destroy, class_name: 'Ci::Variable', foreign_key: :gl_project_id
  has_many :triggers, dependent: :destroy, class_name: 'Ci::Trigger', foreign_key: :gl_project_id
141 142
  has_many :environments, dependent: :destroy
  has_many :deployments, dependent: :destroy
143

144
  accepts_nested_attributes_for :variables, allow_destroy: true
145
  accepts_nested_attributes_for :project_feature
146

147
  delegate :name, to: :owner, allow_nil: true, prefix: true
148
  delegate :members, to: :team, prefix: true
149

Andrey Kumanyaev committed
150
  # Validations
151
  validates :creator, presence: true, on: :create
152
  validates :description, length: { maximum: 2000 }, allow_blank: true
153 154 155 156
  validates :name,
    presence: true,
    length: { within: 0..255 },
    format: { with: Gitlab::Regex.project_name_regex,
157
              message: Gitlab::Regex.project_name_regex_message }
158 159 160
  validates :path,
    presence: true,
    length: { within: 0..255 },
161 162
    format: { with: Gitlab::Regex.project_path_regex,
              message: Gitlab::Regex.project_path_regex_message }
163
  validates :namespace, presence: true
164 165
  validates_uniqueness_of :name, scope: :namespace_id
  validates_uniqueness_of :path, scope: :namespace_id
166
  validates :import_url, addressable_url: true, if: :external_import?
167
  validates :star_count, numericality: { greater_than_or_equal_to: 0 }
168
  validate :check_limit, on: :create
169
  validate :avatar_type,
170
    if: ->(project) { project.avatar.present? && project.avatar_changed? }
171
  validates :avatar, file_size: { maximum: 200.kilobytes.to_i }
172
  validate :visibility_level_allowed_by_group
Douwe Maan committed
173
  validate :visibility_level_allowed_as_fork
174
  validate :check_wiki_path_conflict
175 176 177
  validates :repository_storage,
    presence: true,
    inclusion: { in: ->(_object) { Gitlab.config.repositories.storages.keys } }
178

179
  add_authentication_token_field :runners_token
180
  before_save :ensure_runners_token
181

182
  mount_uploader :avatar, AvatarUploader
Andrey Kumanyaev committed
183

184
  # Scopes
185 186
  default_scope { where(pending_delete: false) }

187
  scope :sorted_by_activity, -> { reorder(last_activity_at: :desc) }
188 189
  scope :sorted_by_stars, -> { reorder('projects.star_count DESC') }

190
  scope :in_namespace, ->(namespace_ids) { where(namespace_id: namespace_ids) }
191
  scope :personal, ->(user) { where(namespace_id: user.namespace_id) }
192
  scope :joined, ->(user) { where('namespace_id != ?', user.namespace_id) }
193
  scope :visible_to_user, ->(user) { where(id: user.authorized_projects.select(:id).reorder(nil)) }
194
  scope :non_archived, -> { where(archived: false) }
195
  scope :for_milestones, ->(ids) { joins(:milestones).where('milestones.id' => ids).distinct }
196 197
  scope :with_push, -> { joins(:events).where('events.action = ?', Event::PUSHED) }

198 199 200
  scope :with_builds_enabled, -> { joins('LEFT JOIN project_features ON projects.id = project_features.project_id').where('project_features.builds_access_level IS NULL or project_features.builds_access_level > 0') }
  scope :with_issues_enabled, -> { joins('LEFT JOIN project_features ON projects.id = project_features.project_id').where('project_features.issues_access_level IS NULL or project_features.issues_access_level > 0') }

201 202
  scope :active, -> { joins(:issues, :notes, :merge_requests).order('issues.created_at, notes.created_at, merge_requests.created_at DESC') }
  scope :abandoned, -> { where('projects.last_activity_at < ?', 6.months.ago) }
203

204 205
  scope :excluding_project, ->(project) { where.not(id: project) }

206 207
  state_machine :import_status, initial: :none do
    event :import_start do
208
      transition [:none, :finished] => :started
209 210 211
    end

    event :import_finish do
212
      transition started: :finished
213 214 215
    end

    event :import_fail do
216
      transition started: :failed
217 218 219
    end

    event :import_retry do
220
      transition failed: :started
221 222 223 224
    end

    state :started
    state :finished
225 226
    state :failed

227
    after_transition any => :finished, do: :reset_cache_and_import_attrs
228 229
  end

Andrey Kumanyaev committed
230
  class << self
231 232 233 234 235 236 237
    # Searches for a list of projects based on the query given in `query`.
    #
    # On PostgreSQL this method uses "ILIKE" to perform a case-insensitive
    # search. On MySQL a regular "LIKE" is used as it's already
    # case-insensitive.
    #
    # query - The search query as a String.
238
    def search(query)
239
      ptable  = arel_table
240 241 242 243 244 245 246 247 248
      ntable  = Namespace.arel_table
      pattern = "%#{query}%"

      projects = select(:id).where(
        ptable[:path].matches(pattern).
          or(ptable[:name].matches(pattern)).
          or(ptable[:description].matches(pattern))
      )

249 250 251 252 253 254
      # We explicitly remove any eager loading clauses as they're:
      #
      # 1. Not needed by this query
      # 2. Combined with .joins(:namespace) lead to all columns from the
      #    projects & namespaces tables being selected, leading to a SQL error
      #    due to the columns of all UNION'd queries no longer being the same.
255
      namespaces = select(:id).
256
        except(:includes).
257 258 259 260 261 262
        joins(:namespace).
        where(ntable[:name].matches(pattern))

      union = Gitlab::SQL::Union.new([projects, namespaces])

      where("projects.id IN (#{union.to_sql})")
Andrey Kumanyaev committed
263
    end
264

265
    def search_by_visibility(level)
Josh Frye committed
266
      where(visibility_level: Gitlab::VisibilityLevel.const_get(level.upcase))
267 268
    end

269
    def search_by_title(query)
270 271 272 273
      pattern = "%#{query}%"
      table   = Project.arel_table

      non_archived.where(table[:name].matches(pattern))
274 275
    end

276 277 278 279 280 281
    # Finds a single project for the given path.
    #
    # path - The full project path (including namespace path).
    #
    # Returns a Project, or nil if no project could be found.
    def find_with_namespace(path)
282 283 284 285 286 287 288 289 290 291 292 293 294 295 296 297 298
      namespace_path, project_path = path.split('/', 2)

      return unless namespace_path && project_path

      namespace_path = connection.quote(namespace_path)
      project_path = connection.quote(project_path)

      # On MySQL we want to ensure the ORDER BY uses a case-sensitive match so
      # any literal matches come first, for this we have to use "BINARY".
      # Without this there's still no guarantee in what order MySQL will return
      # rows.
      binary = Gitlab::Database.mysql? ? 'BINARY' : ''

      order_sql = "(CASE WHEN #{binary} namespaces.path = #{namespace_path} " \
        "AND #{binary} projects.path = #{project_path} THEN 0 ELSE 1 END)"

      where_paths_in([path]).reorder(order_sql).take
299
    end
300

301 302 303 304 305 306 307 308 309 310 311 312 313 314 315 316 317 318 319 320 321 322 323 324
    # Builds a relation to find multiple projects by their full paths.
    #
    # Each path must be in the following format:
    #
    #     namespace_path/project_path
    #
    # For example:
    #
    #     gitlab-org/gitlab-ce
    #
    # Usage:
    #
    #     Project.where_paths_in(%w{gitlab-org/gitlab-ce gitlab-org/gitlab-ee})
    #
    # This would return the projects with the full paths matching the values
    # given.
    #
    # paths - An Array of full paths (namespace path + project path) for which
    #         to find the projects.
    #
    # Returns an ActiveRecord::Relation.
    def where_paths_in(paths)
      wheres = []
      cast_lower = Gitlab::Database.postgresql?
325

326 327
      paths.each do |path|
        namespace_path, project_path = path.split('/', 2)
328

329 330 331 332
        next unless namespace_path && project_path

        namespace_path = connection.quote(namespace_path)
        project_path = connection.quote(project_path)
333

334 335
        where = "(namespaces.path = #{namespace_path}
          AND projects.path = #{project_path})"
336

337 338 339 340 341 342 343 344 345 346 347 348 349 350 351 352 353 354
        if cast_lower
          where = "(
            #{where}
            OR (
              LOWER(namespaces.path) = LOWER(#{namespace_path})
              AND LOWER(projects.path) = LOWER(#{project_path})
            )
          )"
        end

        wheres << where
      end

      if wheres.empty?
        none
      else
        joins(:namespace).where(wheres.join(' OR '))
      end
355
    end
356

357 358 359
    def visibility_levels
      Gitlab::VisibilityLevel.options
    end
360 361

    def sort(method)
362 363 364 365
      if method == 'repository_size_desc'
        reorder(repository_size: :desc, id: :desc)
      else
        order_by(method)
366 367
      end
    end
368 369 370 371 372

    def reference_pattern
      name_pattern = Gitlab::Regex::NAMESPACE_REGEX_STR
      %r{(?<project>#{name_pattern}/#{name_pattern})}
    end
373 374 375 376 377 378 379 380 381 382 383 384 385 386

    def trending(since = 1.month.ago)
      # By counting in the JOIN we don't expose the GROUP BY to the outer query.
      # This means that calls such as "any?" and "count" just return a number of
      # the total count, instead of the counts grouped per project as a Hash.
      join_body = "INNER JOIN (
        SELECT project_id, COUNT(*) AS amount
        FROM notes
        WHERE created_at >= #{sanitize(since)}
        GROUP BY project_id
      ) join_note_counts ON projects.id = join_note_counts.project_id"

      joins(join_body).reorder('join_note_counts.amount DESC')
    end
387 388 389 390 391 392

    def cached_count
      Rails.cache.fetch('total_project_count', expires_in: 5.minutes) do
        Project.count
      end
    end
393 394
  end

395
  def lfs_enabled?
396
    return false unless Gitlab.config.lfs.enabled
397
    return Gitlab.config.lfs.enabled if self[:lfs_enabled].nil?
398

399
    self[:lfs_enabled]
400 401
  end

402 403
  def repository_storage_path
    Gitlab.config.repositories.storages[repository_storage]
404 405
  end

406
  def team
407
    @team ||= ProjectTeam.new(self)
408 409 410
  end

  def repository
411
    @repository ||= Repository.new(path_with_namespace, self)
412 413
  end

414 415 416 417
  def container_registry_path_with_namespace
    path_with_namespace.downcase
  end

418
  def container_registry_repository
Kamil Trzcinski committed
419 420
    return unless Gitlab.config.registry.enabled

421
    @container_registry_repository ||= begin
422
      token = Auth::ContainerRegistryAuthenticationService.full_access_token(container_registry_path_with_namespace)
423
      url = Gitlab.config.registry.api_url
424 425
      host_port = Gitlab.config.registry.host_port
      registry = ContainerRegistry::Registry.new(url, token: token, path: host_port)
426
      registry.repository(container_registry_path_with_namespace)
427
    end
428 429
  end

430
  def container_registry_repository_url
Kamil Trzcinski committed
431
    if Gitlab.config.registry.enabled
432
      "#{Gitlab.config.registry.host_port}/#{container_registry_path_with_namespace}"
433
    end
434 435
  end

436
  def has_container_registry_tags?
Kamil Trzcinski committed
437 438 439
    return unless container_registry_repository

    container_registry_repository.tags.any?
440 441
  end

442 443
  def commit(ref = 'HEAD')
    repository.commit(ref)
444 445
  end

446
  # ref can't be HEAD, can only be branch/tag name or SHA
447
  def latest_successful_builds_for(ref = default_branch)
448
    latest_pipeline = pipelines.latest_successful_for(ref)
449 450 451 452 453 454

    if latest_pipeline
      latest_pipeline.builds.latest.with_artifacts
    else
      builds.none
    end
455 456
  end

457
  def merge_base_commit(first_commit_id, second_commit_id)
Douwe Maan committed
458 459
    sha = repository.merge_base(first_commit_id, second_commit_id)
    repository.commit(sha) if sha
460 461
  end

462
  def saved?
463
    id && persisted?
464 465
  end

466
  def add_import_job
467
    if forked?
468 469 470
      job_id = RepositoryForkWorker.perform_async(id, forked_from_project.repository_storage_path,
                                                  forked_from_project.path_with_namespace,
                                                  self.namespace.path)
471
    else
472 473 474 475 476 477 478
      job_id = RepositoryImportWorker.perform_async(self.id)
    end

    if job_id
      Rails.logger.info "Import job started for #{path_with_namespace} with job ID #{job_id}"
    else
      Rails.logger.error "Import job failed to start for #{path_with_namespace}"
479
    end
480 481
  end

482
  def reset_cache_and_import_attrs
483 484
    ProjectCacheWorker.perform_async(self.id)

485
    self.import_data.destroy if self.import_data
486 487
  end

488
  def import_url=(value)
489 490
    return super(value) unless Gitlab::UrlSanitizer.valid?(value)

491
    import_url = Gitlab::UrlSanitizer.new(value)
James Lopez committed
492
    super(import_url.sanitized_url)
493
    create_or_update_import_data(credentials: import_url.credentials)
494 495 496
  end

  def import_url
497
    if import_data && super
498
      import_url = Gitlab::UrlSanitizer.new(super, credentials: import_data.credentials)
James Lopez committed
499 500 501
      import_url.full_url
    else
      super
502 503
    end
  end
504

James Lopez committed
505 506 507 508
  def valid_import_url?
    valid? || errors.messages[:import_url].nil?
  end

509
  def create_or_update_import_data(data: nil, credentials: nil)
510
    return unless import_url.present? && valid_import_url?
511

James Lopez committed
512
    project_import_data = import_data || build_import_data
513 514 515 516
    if data
      project_import_data.data ||= {}
      project_import_data.data = project_import_data.data.merge(data)
    end
517 518 519 520
    if credentials
      project_import_data.credentials ||= {}
      project_import_data.credentials = project_import_data.credentials.merge(credentials)
    end
521 522

    project_import_data.save
523
  end
524

525
  def import?
526
    external_import? || forked? || gitlab_project_import?
527 528
  end

529 530 531 532
  def no_import?
    import_status == 'none'
  end

533
  def external_import?
534 535 536
    import_url.present?
  end

537
  def imported?
538 539 540 541 542 543 544 545 546 547 548 549 550
    import_finished?
  end

  def import_in_progress?
    import? && import_status == 'started'
  end

  def import_failed?
    import_status == 'failed'
  end

  def import_finished?
    import_status == 'finished'
551 552
  end

553
  def safe_import_url
554
    Gitlab::UrlSanitizer.new(import_url).masked_url
555 556
  end

557 558 559 560
  def gitlab_project_import?
    import_type == 'gitlab_project'
  end

561
  def check_limit
562
    unless creator.can_create_project? or namespace.kind == 'group'
563 564 565
      projects_limit = creator.projects_limit

      if projects_limit == 0
566
        self.errors.add(:limit_reached, "Personal project creation is not allowed. Please contact your administrator with questions")
567
      else
568
        self.errors.add(:limit_reached, "Your project limit is #{projects_limit} projects! Please contact your administrator to increase it")
569
      end
570 571
    end
  rescue
572
    self.errors.add(:base, "Can't check your ability to create project")
gitlabhq committed
573 574
  end

575 576 577 578 579 580 581 582 583 584 585 586 587
  def visibility_level_allowed_by_group
    return if visibility_level_allowed_by_group?

    level_name = Gitlab::VisibilityLevel.level_name(self.visibility_level).downcase
    group_level_name = Gitlab::VisibilityLevel.level_name(self.group.visibility_level).downcase
    self.errors.add(:visibility_level, "#{level_name} is not allowed in a #{group_level_name} group.")
  end

  def visibility_level_allowed_as_fork
    return if visibility_level_allowed_as_fork?

    level_name = Gitlab::VisibilityLevel.level_name(self.visibility_level).downcase
    self.errors.add(:visibility_level, "#{level_name} is not allowed since the fork source project has lower visibility.")
588 589
  end

590 591 592 593 594 595 596 597 598 599
  def check_wiki_path_conflict
    return if path.blank?

    path_to_check = path.ends_with?('.wiki') ? path.chomp('.wiki') : "#{path}.wiki"

    if Project.where(namespace_id: namespace_id, path: path_to_check).exists?
      errors.add(:name, 'has already been taken')
    end
  end

600
  def to_param
601 602 603 604 605
    if persisted? && errors.include?(:path)
      path_was
    else
      path
    end
606 607
  end

608 609 610 611
  def to_reference(_from_project = nil)
    path_with_namespace
  end

612
  def web_url
613
    Gitlab::Routing.url_helpers.namespace_project_url(self.namespace, self)
614 615
  end

616
  def web_url_without_protocol
617
    web_url.split('://')[1]
618 619
  end

620
  def new_issue_address(author)
621 622 623 624
    # This feature is disabled for the time being.
    return nil

    if Gitlab::IncomingEmail.enabled? && author # rubocop:disable Lint/UnreachableCode
625 626 627
      Gitlab::IncomingEmail.reply_address(
        "#{path_with_namespace}+#{author.authentication_token}")
    end
628 629
  end

630
  def build_commit_note(commit)
631
    notes.new(commit_id: commit.id, noteable_type: 'Commit')
gitlabhq committed
632
  end
Nihad Abbasov committed
633

634
  def last_activity
635
    last_event
gitlabhq committed
636 637 638
  end

  def last_activity_date
Andrey Kumanyaev committed
639
    last_activity_at || updated_at
Dmitriy Zaporozhets committed
640
  end
641

642 643 644
  def project_id
    self.id
  end
randx committed
645

646
  def get_issue(issue_id)
647
    if default_issues_tracker?
648
      issues.find_by(iid: issue_id)
649
    else
650
      ExternalIssue.new(issue_id, self)
651 652 653
    end
  end

654
  def issue_exists?(issue_id)
655
    get_issue(issue_id)
656 657
  end

658
  def default_issue_tracker
659
    gitlab_issue_tracker_service || create_gitlab_issue_tracker_service
660 661 662 663 664 665 666 667 668 669
  end

  def issues_tracker
    if external_issue_tracker
      external_issue_tracker
    else
      default_issue_tracker
    end
  end

670
  def default_issues_tracker?
671
    !external_issue_tracker
672 673 674
  end

  def external_issue_tracker
675 676 677 678 679 680 681 682 683 684 685 686 687 688 689
    if has_external_issue_tracker.nil? # To populate existing projects
      cache_has_external_issue_tracker
    end

    if has_external_issue_tracker?
      return @external_issue_tracker if defined?(@external_issue_tracker)

      @external_issue_tracker = services.external_issue_trackers.first
    else
      nil
    end
  end

  def cache_has_external_issue_tracker
    update_column(:has_external_issue_tracker, services.external_issue_trackers.any?)
690 691
  end

692 693 694 695
  def has_wiki?
    wiki_enabled? || has_external_wiki?
  end

696 697 698 699 700 701 702 703 704 705 706 707 708 709 710 711
  def external_wiki
    if has_external_wiki.nil?
      cache_has_external_wiki # Populate
    end

    if has_external_wiki
      @external_wiki ||= services.external_wikis.first
    else
      nil
    end
  end

  def cache_has_external_wiki
    update_column(:has_external_wiki, services.external_wikis.any?)
  end

712
  def build_missing_services
713 714
    services_templates = Service.where(template: true)

715
    Service.available_services_names.each do |service_name|
716
      service = find_service(services, service_name)
717 718

      # If service is available but missing in db
719 720 721 722 723 724
      if service.nil?
        # We should check if template for the service exists
        template = find_service(services_templates, service_name)

        if template.nil?
          # If no template, we should create an instance. Ex `create_gitlab_ci_service`
725
          self.send :"create_#{service_name}_service"
726 727 728 729
        else
          Service.create_from_template(self.id, template)
        end
      end
730 731 732
    end
  end

733 734 735 736 737 738 739 740 741
  def create_labels
    Label.templates.each do |label|
      label = label.dup
      label.template = nil
      label.project_id = self.id
      label.save
    end
  end

742 743 744
  def find_service(list, name)
    list.find { |service| service.to_param == name }
  end
745

746
  def ci_services
747
    services.where(category: :ci)
748 749 750
  end

  def ci_service
751
    @ci_service ||= ci_services.reorder(nil).find_by(active: true)
752 753
  end

Drew Blessing committed
754 755 756 757
  def jira_tracker?
    issues_tracker.to_param == 'jira'
  end

758
  def avatar_type
759 760
    unless self.avatar.image?
      self.errors.add :avatar, 'only images allowed'
761 762 763 764
    end
  end

  def avatar_in_git
765
    repository.avatar
766 767
  end

768
  def avatar_url
769
    if self[:avatar].present?
770 771
      [gitlab_config.url, avatar.url].join
    elsif avatar_in_git
772
      Gitlab::Routing.url_helpers.namespace_project_avatar_url(namespace, self)
773 774 775
    end
  end

776 777 778 779 780
  # For compatibility with old code
  def code
    path
  end

781
  def items_for(entity)
782 783 784 785 786 787 788
    case entity
    when 'issue' then
      issues
    when 'merge_request' then
      merge_requests
    end
  end
789

790
  def send_move_instructions(old_path_with_namespace)
791 792 793
    # New project path needs to be committed to the DB or notification will
    # retrieve stale information
    run_after_commit { NotificationService.new.project_was_moved(self, old_path_with_namespace) }
794
  end
795 796

  def owner
797 798
    if group
      group
799
    else
800
      namespace.try(:owner)
801 802
    end
  end
Dmitriy Zaporozhets committed
803 804 805 806

  def name_with_namespace
    @name_with_namespace ||= begin
                               if namespace
807
                                 namespace.human_name + ' / ' + name
Dmitriy Zaporozhets committed
808 809 810 811 812
                               else
                                 name
                               end
                             end
  end
813
  alias_method :human_name, :name_with_namespace
Dmitriy Zaporozhets committed
814 815 816 817 818 819 820 821 822

  def path_with_namespace
    if namespace
      namespace.path + '/' + path
    else
      path
    end
  end

823 824
  def execute_hooks(data, hooks_scope = :push_hooks)
    hooks.send(hooks_scope).each do |hook|
825
      hook.async_execute(data, hooks_scope.to_s)
826
    end
Dmitriy Zaporozhets committed
827 828
  end

829 830 831
  def execute_services(data, hooks_scope = :push_hooks)
    # Call only service hooks that are active for this scope
    services.send(hooks_scope).each do |service|
832
      service.async_execute(data)
Dmitriy Zaporozhets committed
833 834 835 836
    end
  end

  def update_merge_requests(oldrev, newrev, ref, user)
837 838
    MergeRequests::RefreshService.new(self, user).
      execute(oldrev, newrev, ref)
Dmitriy Zaporozhets committed
839 840 841
  end

  def valid_repo?
842
    repository.exists?
Dmitriy Zaporozhets committed
843
  rescue
844
    errors.add(:path, 'Invalid repository path')
Dmitriy Zaporozhets committed
845 846 847 848
    false
  end

  def empty_repo?
849
    !repository.exists? || !repository.has_visible_content?
Dmitriy Zaporozhets committed
850 851 852
  end

  def repo
853
    repository.raw
Dmitriy Zaporozhets committed
854 855 856
  end

  def url_to_repo
857
    gitlab_shell.url_to_repo(path_with_namespace)
Dmitriy Zaporozhets committed
858 859 860 861 862 863 864
  end

  def namespace_dir
    namespace.try(:path) || ''
  end

  def repo_exists?
865
    @repo_exists ||= repository.exists?
Dmitriy Zaporozhets committed
866 867 868 869
  rescue
    @repo_exists = false
  end

870
  # Branches that are not _exactly_ matched by a protected branch.
Dmitriy Zaporozhets committed
871
  def open_branches
872 873 874 875
    exact_protected_branch_names = protected_branches.reject(&:wildcard?).map(&:name)
    branch_names = repository.branches.map(&:name)
    non_open_branch_names = Set.new(exact_protected_branch_names).intersection(Set.new(branch_names))
    repository.branches.reject { |branch| non_open_branch_names.include? branch.name }
Dmitriy Zaporozhets committed
876 877 878
  end

  def root_ref?(branch)
879
    repository.root_ref == branch
Dmitriy Zaporozhets committed
880 881 882 883 884 885 886
  end

  def ssh_url_to_repo
    url_to_repo
  end

  def http_url_to_repo
Douwe Maan committed
887
    "#{web_url}.git"
Dmitriy Zaporozhets committed
888 889 890
  end

  # Check if current branch name is marked as protected in the system
891
  def protected_branch?(branch_name)
892 893
    return true if empty_repo? && default_branch_protected?

894 895
    @protected_branches ||= self.protected_branches.to_a
    ProtectedBranch.matching(branch_name, protected_branches: @protected_branches).present?
Dmitriy Zaporozhets committed
896
  end
897

898 899
  def user_can_push_to_empty_repo?(user)
    !default_branch_protected? || team.max_member_access(user.id) > Gitlab::Access::DEVELOPER
900 901
  end

902 903 904
  def forked?
    !(forked_project_link.nil? || forked_project_link.forked_from_project.nil?)
  end
905

906 907 908 909
  def personal?
    !group
  end

910
  def rename_repo
911
    path_was = previous_changes['path'].first
912 913 914
    old_path_with_namespace = File.join(namespace_dir, path_was)
    new_path_with_namespace = File.join(namespace_dir, path)

915 916
    Rails.logger.error "Attempting to rename #{old_path_with_namespace} -> #{new_path_with_namespace}"

917 918
    expire_caches_before_rename(old_path_with_namespace)

919
    if has_container_registry_tags?
920 921
      Rails.logger.error "Project #{old_path_with_namespace} cannot be renamed because container registry tags are present"

922
      # we currently doesn't support renaming repository if it contains tags in container registry
Kamil Trzcinski committed
923
      raise Exception.new('Project cannot be renamed, because tags are present in its container registry')
924 925
    end

926
    if gitlab_shell.mv_repository(repository_storage_path, old_path_with_namespace, new_path_with_namespace)
927
      # If repository moved successfully we need to send update instructions to users.
928 929 930
      # However we cannot allow rollback since we moved repository
      # So we basically we mute exceptions in next actions
      begin
931
        gitlab_shell.mv_repository(repository_storage_path, "#{old_path_with_namespace}.wiki", "#{new_path_with_namespace}.wiki")
932
        send_move_instructions(old_path_with_namespace)
933
        reset_events_cache
934 935 936 937 938

        @old_path_with_namespace = old_path_with_namespace

        SystemHooksService.new.execute_hooks_for(self, :rename)

939
        @repository = nil
940 941
      rescue => e
        Rails.logger.error "Exception renaming #{old_path_with_namespace} -> #{new_path_with_namespace}: #{e}"
Johannes Schleifenbaum committed
942
        # Returning false does not rollback after_* transaction but gives
943 944 945 946
        # us information about failing some of tasks
        false
      end
    else
947 948
      Rails.logger.error "Repository could not be renamed: #{old_path_with_namespace} -> #{new_path_with_namespace}"

949 950 951 952
      # if we cannot move namespace directory we should rollback
      # db changes in order to prevent out of sync between db and fs
      raise Exception.new('repository cannot be renamed')
    end
953

954 955
    Gitlab::AppLogger.info "Project was renamed: #{old_path_with_namespace} -> #{new_path_with_namespace}"

956
    Gitlab::UploadsTransfer.new.rename_project(path_was, path, namespace.path)
957
  end
958

959 960 961 962 963 964
  # Expires various caches before a project is renamed.
  def expire_caches_before_rename(old_path)
    repo = Repository.new(old_path, self)
    wiki = Repository.new("#{old_path}.wiki", self)

    if repo.exists?
965
      repo.before_delete
966 967 968
    end

    if wiki.exists?
969
      wiki.before_delete
970 971 972
    end
  end

973 974
  def hook_attrs(backward: true)
    attrs = {
Kirill Zaitsev committed
975
      name: name,
976
      description: description,
Kirilll Zaitsev committed
977
      web_url: web_url,
978 979 980
      avatar_url: avatar_url,
      git_ssh_url: ssh_url_to_repo,
      git_http_url: http_url_to_repo,
Kirill Zaitsev committed
981
      namespace: namespace.name,
982 983 984
      visibility_level: visibility_level,
      path_with_namespace: path_with_namespace,
      default_branch: default_branch,
Kirill Zaitsev committed
985
    }
986 987 988 989 990 991 992 993 994 995 996 997

    # Backward compatibility
    if backward
      attrs.merge!({
                    homepage: web_url,
                    url: url_to_repo,
                    ssh_url: ssh_url_to_repo,
                    http_url: http_url_to_repo
                  })
    end

    attrs
Kirill Zaitsev committed
998 999
  end

1000 1001 1002 1003 1004
  # Reset events cache related to this project
  #
  # Since we do cache @event we need to reset cache in special cases:
  # * when project was moved
  # * when project was renamed
1005
  # * when the project avatar changes
1006 1007 1008 1009 1010 1011 1012 1013 1014
  # Events cache stored like  events/23-20130109142513.
  # The cache key includes updated_at timestamp.
  # Thus it will automatically generate a new fragment
  # when the event is updated because the key changes.
  def reset_events_cache
    Event.where(project_id: self.id).
      order('id DESC').limit(100).
      update_all(updated_at: Time.now)
  end
1015 1016

  def project_member(user)
1017
    project_members.find_by(user_id: user)
1018
  end
1019

1020 1021
  def add_user(user, access_level, current_user: nil, expires_at: nil)
    team.add_user(user, access_level, current_user: current_user, expires_at: expires_at)
1022 1023
  end

1024 1025 1026
  def default_branch
    @default_branch ||= repository.root_ref if repository.exists?
  end
1027 1028 1029 1030 1031

  def reload_default_branch
    @default_branch = nil
    default_branch
  end
1032

1033 1034 1035
  def visibility_level_field
    visibility_level
  end
1036 1037 1038 1039 1040 1041 1042 1043

  def archive!
    update_attribute(:archived, true)
  end

  def unarchive!
    update_attribute(:archived, false)
  end
1044

1045
  def change_head(branch)
1046
    repository.before_change_head
P.S.V.R committed
1047 1048 1049
    repository.rugged.references.create('HEAD',
                                        "refs/heads/#{branch}",
                                        force: true)
1050
    repository.copy_gitattributes(branch)
1051
    repository.expire_avatar_cache(branch)
1052 1053
    reload_default_branch
  end
1054 1055 1056 1057

  def forked_from?(project)
    forked? && project == forked_from_project
  end
1058 1059 1060 1061

  def update_repository_size
    update_attribute(:repository_size, repository.size)
  end
1062

1063 1064 1065 1066
  def update_commit_count
    update_attribute(:commit_count, repository.commit_count)
  end

1067
  def forks_count
1068
    forks.count
1069
  end
1070 1071 1072 1073

  def find_label(name)
    labels.find_by(name: name)
  end
1074 1075 1076 1077

  def origin_merge_requests
    merge_requests.where(source_project_id: self.id)
  end
1078 1079

  def create_repository
1080 1081
    # Forked import is handled asynchronously
    unless forked?
1082
      if gitlab_shell.add_repository(repository_storage_path, path_with_namespace)
1083
        repository.after_create
1084 1085
        true
      else
1086
        errors.add(:base, 'Failed to create repository via gitlab-shell')
1087 1088
        false
      end
1089 1090 1091 1092 1093 1094 1095 1096 1097 1098
    end
  end

  def repository_exists?
    !!repository.exists?
  end

  def create_wiki
    ProjectWiki.new(self, self.owner).wiki
    true
1099
  rescue ProjectWiki::CouldNotCreateWikiError
1100
    errors.add(:base, 'Failed create wiki')
1101 1102
    false
  end
1103

Drew Blessing committed
1104 1105 1106 1107
  def jira_tracker_active?
    jira_tracker? && jira_service.active
  end

1108
  def allowed_to_share_with_group?
1109
    !namespace.share_with_group_lock
1110 1111
  end

1112 1113 1114
  def pipeline_for(ref, sha = nil)
    sha ||= commit(ref).try(:sha)

1115
    return unless sha
1116

1117
    pipelines.order(id: :desc).find_by(sha: sha, ref: ref)
1118 1119
  end

1120 1121 1122
  def ensure_pipeline(ref, sha, current_user = nil)
    pipeline_for(ref, sha) ||
      pipelines.create(sha: sha, ref: ref, user: current_user)
1123
  end
1124

1125
  def enable_ci
1126
    project_feature.update_attribute(:builds_access_level, ProjectFeature::ENABLED)
1127
  end
1128

1129
  def any_runners?(&block)
1130
    if runners.active.any?(&block)
1131 1132 1133 1134 1135 1136
      return true
    end

    shared_runners_enabled? && Ci::Runner.shared.active.any?(&block)
  end

1137
  def valid_runners_token?(token)
1138
    self.runners_token && ActiveSupport::SecurityUtils.variable_size_secure_compare(token, self.runners_token)
Kamil Trzcinski committed
1139 1140
  end

Kamil Trzcinski committed
1141 1142
  # TODO (ayufan): For now we use runners_token (backward compatibility)
  # In 8.4 every build will have its own individual token valid for time of build
1143
  def valid_build_token?(token)
1144
    self.builds_enabled? && self.runners_token && ActiveSupport::SecurityUtils.variable_size_secure_compare(token, self.runners_token)
1145 1146 1147 1148 1149 1150 1151 1152 1153 1154 1155 1156 1157
  end

  def build_coverage_enabled?
    build_coverage_regex.present?
  end

  def build_timeout_in_minutes
    build_timeout / 60
  end

  def build_timeout_in_minutes=(value)
    self.build_timeout = value.to_i * 60
  end
1158

1159 1160 1161
  def open_issues_count
    issues.opened.count
  end
1162

1163
  def visibility_level_allowed_as_fork?(level = self.visibility_level)
Douwe Maan committed
1164
    return true unless forked?
1165

Douwe Maan committed
1166 1167 1168 1169 1170 1171
    # self.forked_from_project will be nil before the project is saved, so
    # we need to go through the relation
    original_project = forked_project_link.forked_from_project
    return true unless original_project

    level <= original_project.visibility_level
1172
  end
1173

1174 1175
  def visibility_level_allowed_by_group?(level = self.visibility_level)
    return true unless group
1176

1177
    level <= group.visibility_level
1178
  end
1179

1180 1181
  def visibility_level_allowed?(level = self.visibility_level)
    visibility_level_allowed_as_fork?(level) && visibility_level_allowed_by_group?(level)
Felipe Artur committed
1182 1183
  end

1184 1185 1186
  def runners_token
    ensure_runners_token!
  end
1187 1188 1189 1190

  def wiki
    @wiki ||= ProjectWiki.new(self, self.owner)
  end
1191

Josh Frye committed
1192 1193
  def running_or_pending_build_count(force: false)
    Rails.cache.fetch(['projects', id, 'running_or_pending_build_count'], force: force) do
1194 1195 1196
      builds.running_or_pending.count(:all)
    end
  end
1197 1198

  def mark_import_as_failed(error_message)
1199 1200 1201
    original_errors = errors.dup
    sanitized_message = Gitlab::UrlSanitizer.sanitize(error_message)

1202
    import_fail
1203 1204 1205 1206 1207
    update_column(:import_error, sanitized_message)
  rescue ActiveRecord::ActiveRecordError => e
    Rails.logger.error("Error setting import status to failed: #{e.message}. Original error: #{sanitized_message}")
  ensure
    @errors = original_errors
1208
  end
James Lopez committed
1209

1210 1211
  def add_export_job(current_user:)
    job_id = ProjectExportWorker.perform_async(current_user.id, self.id)
1212 1213 1214 1215 1216 1217 1218

    if job_id
      Rails.logger.info "Export job started for project ID #{self.id} with job ID #{job_id}"
    else
      Rails.logger.error "Export job failed to start for project ID #{self.id}"
    end
  end
James Lopez committed
1219 1220

  def export_path
1221
    File.join(Gitlab::ImportExport.storage_path, path_with_namespace)
James Lopez committed
1222
  end
1223 1224 1225 1226 1227 1228 1229 1230 1231

  def export_project_path
    Dir.glob("#{export_path}/*export.tar.gz").max_by { |f| File.ctime(f) }
  end

  def remove_exports
    _, status = Gitlab::Popen.popen(%W(find #{export_path} -not -path #{export_path} -delete))
    status.zero?
  end
1232 1233 1234 1235

  def ensure_dir_exist
    gitlab_shell.add_namespace(repository_storage_path, namespace.path)
  end
1236 1237 1238 1239 1240 1241 1242 1243 1244 1245 1246 1247 1248 1249 1250 1251 1252 1253

  def predefined_variables
    [
      { key: 'CI_PROJECT_ID', value: id.to_s, public: true },
      { key: 'CI_PROJECT_NAME', value: path, public: true },
      { key: 'CI_PROJECT_PATH', value: path_with_namespace, public: true },
      { key: 'CI_PROJECT_NAMESPACE', value: namespace.path, public: true },
      { key: 'CI_PROJECT_URL', value: web_url, public: true }
    ]
  end

  def container_registry_variables
    return [] unless Gitlab.config.registry.enabled

    variables = [
      { key: 'CI_REGISTRY', value: Gitlab.config.registry.host_port, public: true }
    ]

Kamil Trzcinski committed
1254 1255 1256 1257
    if container_registry_enabled?
      variables << { key: 'CI_REGISTRY_IMAGE', value: container_registry_repository_url, public: true }
    end

1258 1259 1260 1261 1262 1263 1264 1265
    variables
  end

  def secret_variables
    variables.map do |variable|
      { key: variable.key, value: variable.value, public: false }
    end
  end
1266 1267 1268 1269 1270 1271 1272 1273 1274 1275 1276 1277 1278 1279 1280

  # Checks if `user` is authorized for this project, with at least the
  # `min_access_level` (if given).
  #
  # If you change the logic of this method, please also update `User#authorized_projects`
  def authorized_for_user?(user, min_access_level = nil)
    return false unless user

    return true if personal? && namespace_id == user.namespace_id

    authorized_for_user_by_group?(user, min_access_level) ||
      authorized_for_user_by_members?(user, min_access_level) ||
      authorized_for_user_by_shared_projects?(user, min_access_level)
  end

1281 1282 1283 1284 1285 1286 1287 1288 1289 1290
  def append_or_update_attribute(name, value)
    old_values = public_send(name.to_s)

    if Project.reflect_on_association(name).try(:macro) == :has_many && old_values.any?
      update_attribute(name, old_values + value)
    else
      update_attribute(name, value)
    end
  end

1291 1292 1293 1294 1295 1296 1297 1298 1299 1300 1301 1302
  def pushes_since_gc
    Gitlab::Redis.with { |redis| redis.get(pushes_since_gc_redis_key).to_i }
  end

  def increment_pushes_since_gc
    Gitlab::Redis.with { |redis| redis.incr(pushes_since_gc_redis_key) }
  end

  def reset_pushes_since_gc
    Gitlab::Redis.with { |redis| redis.del(pushes_since_gc_redis_key) }
  end

1303 1304
  private

1305 1306 1307 1308
  def pushes_since_gc_redis_key
    "projects/#{id}/pushes_since_gc"
  end

1309 1310 1311 1312 1313
  # Prevents the creation of project_feature record for every project
  def setup_project_feature
    build_project_feature unless project_feature
  end

1314
  def default_branch_protected?
1315 1316
    current_application_settings.default_branch_protection == Gitlab::Access::PROTECTION_FULL ||
      current_application_settings.default_branch_protection == Gitlab::Access::PROTECTION_DEV_CAN_MERGE
1317 1318
  end

1319 1320 1321 1322 1323 1324 1325 1326 1327 1328 1329 1330 1331 1332 1333 1334 1335 1336 1337 1338 1339 1340 1341
  def authorized_for_user_by_group?(user, min_access_level)
    member = user.group_members.find_by(source_id: group)

    member && (!min_access_level || member.access_level >= min_access_level)
  end

  def authorized_for_user_by_members?(user, min_access_level)
    member = members.find_by(user_id: user)

    member && (!min_access_level || member.access_level >= min_access_level)
  end

  def authorized_for_user_by_shared_projects?(user, min_access_level)
    shared_projects = user.group_members.joins(group: :shared_projects).
      where(project_group_links: { project_id: self })

    if min_access_level
      members_scope = { access_level: Gitlab::Access.values.select { |access| access >= min_access_level } }
      shared_projects = shared_projects.where(members: members_scope)
    end

    shared_projects.any?
  end
gitlabhq committed
1342
end