BigW Consortium Gitlab

project.rb 39.7 KB
Newer Older
1 2
require 'carrierwave/orm/activerecord'

gitlabhq committed
3
class Project < ActiveRecord::Base
4
  include Gitlab::ConfigHelper
5
  include Gitlab::ShellAdapter
6
  include Gitlab::VisibilityLevel
7
  include Gitlab::CurrentSettings
8
  include AccessRequestable
9 10
  include Referable
  include Sortable
11
  include AfterCommitQueue
12
  include CaseSensitivity
13
  include TokenAuthenticatable
14
  include ProjectFeaturesCompatibility
Robert Speicher committed
15

16
  extend Gitlab::ConfigHelper
17

Jared Szechy committed
18 19
  UNKNOWN_IMPORT_URL = 'http://unknown.git'

20 21
  delegate :feature_available?, :builds_enabled?, :wiki_enabled?, :merge_requests_enabled?, to: :project_feature, allow_nil: true

22
  default_value_for :archived, false
23
  default_value_for :visibility_level, gitlab_config_features.visibility_level
24
  default_value_for :container_registry_enabled, gitlab_config_features.container_registry
25
  default_value_for(:repository_storage) { current_application_settings.repository_storage }
26
  default_value_for(:shared_runners_enabled) { current_application_settings.shared_runners_enabled }
27

28 29
  after_create :ensure_dir_exist
  after_save :ensure_dir_exist, if: :namespace_id_changed?
30
  after_initialize :setup_project_feature
31

32 33
  # set last_activity_at to the same as created_at
  after_create :set_last_activity_at
34
  def set_last_activity_at
35
    update_column(:last_activity_at, self.created_at)
36 37
  end

38
  # update visibility_level of forks
39 40 41 42 43 44 45 46 47 48 49 50
  after_update :update_forks_visibility_level
  def update_forks_visibility_level
    return unless visibility_level < visibility_level_was

    forks.each do |forked_project|
      if forked_project.visibility_level > visibility_level
        forked_project.visibility_level = visibility_level
        forked_project.save!
      end
    end
  end

51
  ActsAsTaggableOn.strict_case_match = true
52
  acts_as_taggable_on :tags
53

54
  attr_accessor :new_default_branch
55
  attr_accessor :old_path_with_namespace
56

57 58
  alias_attribute :title, :name

59
  # Relations
60
  belongs_to :creator, foreign_key: 'creator_id', class_name: 'User'
61
  belongs_to :group, -> { where(type: 'Group') }, foreign_key: 'namespace_id'
62
  belongs_to :namespace
63

64
  has_one :last_event, -> {order 'events.created_at DESC'}, class_name: 'Event', foreign_key: 'project_id'
65

66 67
  has_one :board, dependent: :destroy

68 69
  # Project services
  has_many :services
70
  has_one :campfire_service, dependent: :destroy
Kirilll Zaitsev committed
71
  has_one :drone_ci_service, dependent: :destroy
72
  has_one :emails_on_push_service, dependent: :destroy
73
  has_one :builds_email_service, dependent: :destroy
Aorimn committed
74
  has_one :irker_service, dependent: :destroy
75
  has_one :pivotaltracker_service, dependent: :destroy
76
  has_one :hipchat_service, dependent: :destroy
77
  has_one :flowdock_service, dependent: :destroy
78
  has_one :assembla_service, dependent: :destroy
Jeremy committed
79
  has_one :asana_service, dependent: :destroy
80
  has_one :gemnasium_service, dependent: :destroy
81
  has_one :slack_service, dependent: :destroy
82
  has_one :buildkite_service, dependent: :destroy
83
  has_one :bamboo_service, dependent: :destroy
84
  has_one :teamcity_service, dependent: :destroy
85
  has_one :pushover_service, dependent: :destroy
86 87
  has_one :jira_service, dependent: :destroy
  has_one :redmine_service, dependent: :destroy
88
  has_one :custom_issue_tracker_service, dependent: :destroy
89
  has_one :bugzilla_service, dependent: :destroy
90
  has_one :gitlab_issue_tracker_service, dependent: :destroy, inverse_of: :project
91
  has_one :external_wiki_service, dependent: :destroy
92

93 94 95 96 97
  has_one  :forked_project_link,  dependent: :destroy, foreign_key: "forked_to_project_id"
  has_one  :forked_from_project,  through:   :forked_project_link

  has_many :forked_project_links, foreign_key: "forked_from_project_id"
  has_many :forks,                through:     :forked_project_links, source: :forked_to_project
98

99
  # Merge Requests for target project should be removed with it
100
  has_many :merge_requests,     dependent: :destroy, foreign_key: 'target_project_id'
101
  # Merge requests from source project should be kept when source project was removed
102
  has_many :fork_merge_requests, foreign_key: 'source_project_id', class_name: MergeRequest
103
  has_many :issues,             dependent: :destroy
104
  has_many :labels,             dependent: :destroy
105 106
  has_many :services,           dependent: :destroy
  has_many :events,             dependent: :destroy
107 108
  has_many :milestones,         dependent: :destroy
  has_many :notes,              dependent: :destroy
109 110
  has_many :snippets,           dependent: :destroy, class_name: 'ProjectSnippet'
  has_many :hooks,              dependent: :destroy, class_name: 'ProjectHook'
111
  has_many :protected_branches, dependent: :destroy
112 113

  has_many :project_members, -> { where(requested_at: nil) }, dependent: :destroy, as: :source, class_name: 'ProjectMember'
114
  alias_method :members, :project_members
115 116 117 118
  has_many :users, through: :project_members

  has_many :requesters, -> { where.not(requested_at: nil) }, dependent: :destroy, as: :source, class_name: 'ProjectMember'

119 120
  has_many :deploy_keys_projects, dependent: :destroy
  has_many :deploy_keys, through: :deploy_keys_projects
Ciro Santilli committed
121 122
  has_many :users_star_projects, dependent: :destroy
  has_many :starrers, through: :users_star_projects, source: :user
123
  has_many :releases, dependent: :destroy
124 125
  has_many :lfs_objects_projects, dependent: :destroy
  has_many :lfs_objects, through: :lfs_objects_projects
126 127
  has_many :project_group_links, dependent: :destroy
  has_many :invited_groups, through: :project_group_links, source: :group
128
  has_many :todos, dependent: :destroy
129
  has_many :notification_settings, dependent: :destroy, as: :source
130

131
  has_one :import_data, dependent: :destroy, class_name: "ProjectImportData"
132
  has_one :project_feature, dependent: :destroy
133

134
  has_many :commit_statuses, dependent: :destroy, class_name: 'CommitStatus', foreign_key: :gl_project_id
135
  has_many :pipelines, dependent: :destroy, class_name: 'Ci::Pipeline', foreign_key: :gl_project_id
136 137 138 139 140
  has_many :builds, class_name: 'Ci::Build', foreign_key: :gl_project_id # the builds are created from the commit_statuses
  has_many :runner_projects, dependent: :destroy, class_name: 'Ci::RunnerProject', foreign_key: :gl_project_id
  has_many :runners, through: :runner_projects, source: :runner, class_name: 'Ci::Runner'
  has_many :variables, dependent: :destroy, class_name: 'Ci::Variable', foreign_key: :gl_project_id
  has_many :triggers, dependent: :destroy, class_name: 'Ci::Trigger', foreign_key: :gl_project_id
141 142
  has_many :environments, dependent: :destroy
  has_many :deployments, dependent: :destroy
143

144
  accepts_nested_attributes_for :variables, allow_destroy: true
145
  accepts_nested_attributes_for :project_feature
146

147
  delegate :name, to: :owner, allow_nil: true, prefix: true
148
  delegate :members, to: :team, prefix: true
149
  delegate :add_user, to: :team
150

Andrey Kumanyaev committed
151
  # Validations
152
  validates :creator, presence: true, on: :create
153
  validates :description, length: { maximum: 2000 }, allow_blank: true
154 155 156 157
  validates :name,
    presence: true,
    length: { within: 0..255 },
    format: { with: Gitlab::Regex.project_name_regex,
158
              message: Gitlab::Regex.project_name_regex_message }
159 160 161
  validates :path,
    presence: true,
    length: { within: 0..255 },
162 163
    format: { with: Gitlab::Regex.project_path_regex,
              message: Gitlab::Regex.project_path_regex_message }
164
  validates :namespace, presence: true
165 166
  validates_uniqueness_of :name, scope: :namespace_id
  validates_uniqueness_of :path, scope: :namespace_id
167
  validates :import_url, addressable_url: true, if: :external_import?
168
  validates :star_count, numericality: { greater_than_or_equal_to: 0 }
169
  validate :check_limit, on: :create
170
  validate :avatar_type,
171
    if: ->(project) { project.avatar.present? && project.avatar_changed? }
172
  validates :avatar, file_size: { maximum: 200.kilobytes.to_i }
173
  validate :visibility_level_allowed_by_group
Douwe Maan committed
174
  validate :visibility_level_allowed_as_fork
175
  validate :check_wiki_path_conflict
176 177 178
  validates :repository_storage,
    presence: true,
    inclusion: { in: ->(_object) { Gitlab.config.repositories.storages.keys } }
179

180
  add_authentication_token_field :runners_token
181
  before_save :ensure_runners_token
182

183
  mount_uploader :avatar, AvatarUploader
Andrey Kumanyaev committed
184

185
  # Scopes
186 187
  default_scope { where(pending_delete: false) }

188
  scope :sorted_by_activity, -> { reorder(last_activity_at: :desc) }
189 190
  scope :sorted_by_stars, -> { reorder('projects.star_count DESC') }

191
  scope :in_namespace, ->(namespace_ids) { where(namespace_id: namespace_ids) }
192
  scope :personal, ->(user) { where(namespace_id: user.namespace_id) }
193
  scope :joined, ->(user) { where('namespace_id != ?', user.namespace_id) }
194
  scope :visible_to_user, ->(user) { where(id: user.authorized_projects.select(:id).reorder(nil)) }
195
  scope :non_archived, -> { where(archived: false) }
196
  scope :for_milestones, ->(ids) { joins(:milestones).where('milestones.id' => ids).distinct }
197 198
  scope :with_push, -> { joins(:events).where('events.action = ?', Event::PUSHED) }

199 200 201
  scope :with_builds_enabled, -> { joins('LEFT JOIN project_features ON projects.id = project_features.project_id').where('project_features.builds_access_level IS NULL or project_features.builds_access_level > 0') }
  scope :with_issues_enabled, -> { joins('LEFT JOIN project_features ON projects.id = project_features.project_id').where('project_features.issues_access_level IS NULL or project_features.issues_access_level > 0') }

202 203
  scope :active, -> { joins(:issues, :notes, :merge_requests).order('issues.created_at, notes.created_at, merge_requests.created_at DESC') }
  scope :abandoned, -> { where('projects.last_activity_at < ?', 6.months.ago) }
204

205 206
  scope :excluding_project, ->(project) { where.not(id: project) }

207 208
  state_machine :import_status, initial: :none do
    event :import_start do
209
      transition [:none, :finished] => :started
210 211 212
    end

    event :import_finish do
213
      transition started: :finished
214 215 216
    end

    event :import_fail do
217
      transition started: :failed
218 219 220
    end

    event :import_retry do
221
      transition failed: :started
222 223 224 225
    end

    state :started
    state :finished
226 227
    state :failed

228
    after_transition any => :finished, do: :reset_cache_and_import_attrs
229 230
  end

Andrey Kumanyaev committed
231
  class << self
232 233 234 235 236 237 238
    # Searches for a list of projects based on the query given in `query`.
    #
    # On PostgreSQL this method uses "ILIKE" to perform a case-insensitive
    # search. On MySQL a regular "LIKE" is used as it's already
    # case-insensitive.
    #
    # query - The search query as a String.
239
    def search(query)
240
      ptable  = arel_table
241 242 243 244 245 246 247 248 249
      ntable  = Namespace.arel_table
      pattern = "%#{query}%"

      projects = select(:id).where(
        ptable[:path].matches(pattern).
          or(ptable[:name].matches(pattern)).
          or(ptable[:description].matches(pattern))
      )

250 251 252 253 254 255
      # We explicitly remove any eager loading clauses as they're:
      #
      # 1. Not needed by this query
      # 2. Combined with .joins(:namespace) lead to all columns from the
      #    projects & namespaces tables being selected, leading to a SQL error
      #    due to the columns of all UNION'd queries no longer being the same.
256
      namespaces = select(:id).
257
        except(:includes).
258 259 260 261 262 263
        joins(:namespace).
        where(ntable[:name].matches(pattern))

      union = Gitlab::SQL::Union.new([projects, namespaces])

      where("projects.id IN (#{union.to_sql})")
Andrey Kumanyaev committed
264
    end
265

266
    def search_by_visibility(level)
Josh Frye committed
267
      where(visibility_level: Gitlab::VisibilityLevel.const_get(level.upcase))
268 269
    end

270
    def search_by_title(query)
271 272 273 274
      pattern = "%#{query}%"
      table   = Project.arel_table

      non_archived.where(table[:name].matches(pattern))
275 276
    end

277 278 279 280 281 282
    # Finds a single project for the given path.
    #
    # path - The full project path (including namespace path).
    #
    # Returns a Project, or nil if no project could be found.
    def find_with_namespace(path)
283 284 285 286 287 288 289 290 291 292 293 294 295 296 297 298 299
      namespace_path, project_path = path.split('/', 2)

      return unless namespace_path && project_path

      namespace_path = connection.quote(namespace_path)
      project_path = connection.quote(project_path)

      # On MySQL we want to ensure the ORDER BY uses a case-sensitive match so
      # any literal matches come first, for this we have to use "BINARY".
      # Without this there's still no guarantee in what order MySQL will return
      # rows.
      binary = Gitlab::Database.mysql? ? 'BINARY' : ''

      order_sql = "(CASE WHEN #{binary} namespaces.path = #{namespace_path} " \
        "AND #{binary} projects.path = #{project_path} THEN 0 ELSE 1 END)"

      where_paths_in([path]).reorder(order_sql).take
300
    end
301

302 303 304 305 306 307 308 309 310 311 312 313 314 315 316 317 318 319 320 321 322 323 324 325
    # Builds a relation to find multiple projects by their full paths.
    #
    # Each path must be in the following format:
    #
    #     namespace_path/project_path
    #
    # For example:
    #
    #     gitlab-org/gitlab-ce
    #
    # Usage:
    #
    #     Project.where_paths_in(%w{gitlab-org/gitlab-ce gitlab-org/gitlab-ee})
    #
    # This would return the projects with the full paths matching the values
    # given.
    #
    # paths - An Array of full paths (namespace path + project path) for which
    #         to find the projects.
    #
    # Returns an ActiveRecord::Relation.
    def where_paths_in(paths)
      wheres = []
      cast_lower = Gitlab::Database.postgresql?
326

327 328
      paths.each do |path|
        namespace_path, project_path = path.split('/', 2)
329

330 331 332 333
        next unless namespace_path && project_path

        namespace_path = connection.quote(namespace_path)
        project_path = connection.quote(project_path)
334

335 336
        where = "(namespaces.path = #{namespace_path}
          AND projects.path = #{project_path})"
337

338 339 340 341 342 343 344 345 346 347 348 349 350 351 352 353 354 355
        if cast_lower
          where = "(
            #{where}
            OR (
              LOWER(namespaces.path) = LOWER(#{namespace_path})
              AND LOWER(projects.path) = LOWER(#{project_path})
            )
          )"
        end

        wheres << where
      end

      if wheres.empty?
        none
      else
        joins(:namespace).where(wheres.join(' OR '))
      end
356
    end
357

358 359 360
    def visibility_levels
      Gitlab::VisibilityLevel.options
    end
361 362

    def sort(method)
363 364 365 366
      if method == 'repository_size_desc'
        reorder(repository_size: :desc, id: :desc)
      else
        order_by(method)
367 368
      end
    end
369 370 371 372 373

    def reference_pattern
      name_pattern = Gitlab::Regex::NAMESPACE_REGEX_STR
      %r{(?<project>#{name_pattern}/#{name_pattern})}
    end
374 375 376 377 378 379 380 381 382 383 384 385 386 387

    def trending(since = 1.month.ago)
      # By counting in the JOIN we don't expose the GROUP BY to the outer query.
      # This means that calls such as "any?" and "count" just return a number of
      # the total count, instead of the counts grouped per project as a Hash.
      join_body = "INNER JOIN (
        SELECT project_id, COUNT(*) AS amount
        FROM notes
        WHERE created_at >= #{sanitize(since)}
        GROUP BY project_id
      ) join_note_counts ON projects.id = join_note_counts.project_id"

      joins(join_body).reorder('join_note_counts.amount DESC')
    end
388 389 390 391 392 393

    def cached_count
      Rails.cache.fetch('total_project_count', expires_in: 5.minutes) do
        Project.count
      end
    end
394 395
  end

396
  def lfs_enabled?
397
    return namespace.lfs_enabled? if self[:lfs_enabled].nil?
398

399
    self[:lfs_enabled] && Gitlab.config.lfs.enabled
400 401
  end

402 403
  def repository_storage_path
    Gitlab.config.repositories.storages[repository_storage]
404 405
  end

406
  def team
407
    @team ||= ProjectTeam.new(self)
408 409 410
  end

  def repository
411
    @repository ||= Repository.new(path_with_namespace, self)
412 413
  end

414 415 416 417
  def container_registry_path_with_namespace
    path_with_namespace.downcase
  end

418
  def container_registry_repository
Kamil Trzcinski committed
419 420
    return unless Gitlab.config.registry.enabled

421
    @container_registry_repository ||= begin
422
      token = Auth::ContainerRegistryAuthenticationService.full_access_token(container_registry_path_with_namespace)
423
      url = Gitlab.config.registry.api_url
424 425
      host_port = Gitlab.config.registry.host_port
      registry = ContainerRegistry::Registry.new(url, token: token, path: host_port)
426
      registry.repository(container_registry_path_with_namespace)
427
    end
428 429
  end

430
  def container_registry_repository_url
Kamil Trzcinski committed
431
    if Gitlab.config.registry.enabled
432
      "#{Gitlab.config.registry.host_port}/#{container_registry_path_with_namespace}"
433
    end
434 435
  end

436
  def has_container_registry_tags?
Kamil Trzcinski committed
437 438 439
    return unless container_registry_repository

    container_registry_repository.tags.any?
440 441
  end

442 443
  def commit(ref = 'HEAD')
    repository.commit(ref)
444 445
  end

446
  # ref can't be HEAD, can only be branch/tag name or SHA
447
  def latest_successful_builds_for(ref = default_branch)
448
    latest_pipeline = pipelines.latest_successful_for(ref)
449 450 451 452 453 454

    if latest_pipeline
      latest_pipeline.builds.latest.with_artifacts
    else
      builds.none
    end
455 456
  end

457
  def merge_base_commit(first_commit_id, second_commit_id)
Douwe Maan committed
458 459
    sha = repository.merge_base(first_commit_id, second_commit_id)
    repository.commit(sha) if sha
460 461
  end

462
  def saved?
463
    id && persisted?
464 465
  end

466
  def add_import_job
467
    if forked?
468 469 470
      job_id = RepositoryForkWorker.perform_async(id, forked_from_project.repository_storage_path,
                                                  forked_from_project.path_with_namespace,
                                                  self.namespace.path)
471
    else
472 473 474 475 476 477 478
      job_id = RepositoryImportWorker.perform_async(self.id)
    end

    if job_id
      Rails.logger.info "Import job started for #{path_with_namespace} with job ID #{job_id}"
    else
      Rails.logger.error "Import job failed to start for #{path_with_namespace}"
479
    end
480 481
  end

482
  def reset_cache_and_import_attrs
483 484
    ProjectCacheWorker.perform_async(self.id)

485
    self.import_data.destroy if self.import_data
486 487
  end

488
  def import_url=(value)
489 490
    return super(value) unless Gitlab::UrlSanitizer.valid?(value)

491
    import_url = Gitlab::UrlSanitizer.new(value)
James Lopez committed
492
    super(import_url.sanitized_url)
493
    create_or_update_import_data(credentials: import_url.credentials)
494 495 496
  end

  def import_url
497
    if import_data && super
498
      import_url = Gitlab::UrlSanitizer.new(super, credentials: import_data.credentials)
James Lopez committed
499 500 501
      import_url.full_url
    else
      super
502 503
    end
  end
504

James Lopez committed
505 506 507 508
  def valid_import_url?
    valid? || errors.messages[:import_url].nil?
  end

509
  def create_or_update_import_data(data: nil, credentials: nil)
510
    return unless import_url.present? && valid_import_url?
511

James Lopez committed
512
    project_import_data = import_data || build_import_data
513 514 515 516
    if data
      project_import_data.data ||= {}
      project_import_data.data = project_import_data.data.merge(data)
    end
517 518 519 520
    if credentials
      project_import_data.credentials ||= {}
      project_import_data.credentials = project_import_data.credentials.merge(credentials)
    end
521 522

    project_import_data.save
523
  end
524

525
  def import?
526
    external_import? || forked? || gitlab_project_import?
527 528
  end

529 530 531 532
  def no_import?
    import_status == 'none'
  end

533
  def external_import?
534 535 536
    import_url.present?
  end

537
  def imported?
538 539 540 541 542 543 544 545 546 547 548 549 550
    import_finished?
  end

  def import_in_progress?
    import? && import_status == 'started'
  end

  def import_failed?
    import_status == 'failed'
  end

  def import_finished?
    import_status == 'finished'
551 552
  end

553
  def safe_import_url
554
    Gitlab::UrlSanitizer.new(import_url).masked_url
555 556
  end

557 558 559 560
  def gitlab_project_import?
    import_type == 'gitlab_project'
  end

561
  def check_limit
562
    unless creator.can_create_project? or namespace.kind == 'group'
563 564 565
      projects_limit = creator.projects_limit

      if projects_limit == 0
566
        self.errors.add(:limit_reached, "Personal project creation is not allowed. Please contact your administrator with questions")
567
      else
568
        self.errors.add(:limit_reached, "Your project limit is #{projects_limit} projects! Please contact your administrator to increase it")
569
      end
570 571
    end
  rescue
572
    self.errors.add(:base, "Can't check your ability to create project")
gitlabhq committed
573 574
  end

575 576 577 578 579 580 581 582 583 584 585 586 587
  def visibility_level_allowed_by_group
    return if visibility_level_allowed_by_group?

    level_name = Gitlab::VisibilityLevel.level_name(self.visibility_level).downcase
    group_level_name = Gitlab::VisibilityLevel.level_name(self.group.visibility_level).downcase
    self.errors.add(:visibility_level, "#{level_name} is not allowed in a #{group_level_name} group.")
  end

  def visibility_level_allowed_as_fork
    return if visibility_level_allowed_as_fork?

    level_name = Gitlab::VisibilityLevel.level_name(self.visibility_level).downcase
    self.errors.add(:visibility_level, "#{level_name} is not allowed since the fork source project has lower visibility.")
588 589
  end

590 591 592 593 594 595 596 597 598 599
  def check_wiki_path_conflict
    return if path.blank?

    path_to_check = path.ends_with?('.wiki') ? path.chomp('.wiki') : "#{path}.wiki"

    if Project.where(namespace_id: namespace_id, path: path_to_check).exists?
      errors.add(:name, 'has already been taken')
    end
  end

600
  def to_param
601 602 603 604 605
    if persisted? && errors.include?(:path)
      path_was
    else
      path
    end
606 607
  end

608 609 610 611
  def to_reference(_from_project = nil)
    path_with_namespace
  end

612
  def web_url
613
    Gitlab::Routing.url_helpers.namespace_project_url(self.namespace, self)
614 615
  end

616
  def web_url_without_protocol
617
    web_url.split('://')[1]
618 619
  end

620
  def new_issue_address(author)
621 622 623 624
    # This feature is disabled for the time being.
    return nil

    if Gitlab::IncomingEmail.enabled? && author # rubocop:disable Lint/UnreachableCode
625 626 627
      Gitlab::IncomingEmail.reply_address(
        "#{path_with_namespace}+#{author.authentication_token}")
    end
628 629
  end

630
  def build_commit_note(commit)
631
    notes.new(commit_id: commit.id, noteable_type: 'Commit')
gitlabhq committed
632
  end
Nihad Abbasov committed
633

634
  def last_activity
635
    last_event
gitlabhq committed
636 637 638
  end

  def last_activity_date
Andrey Kumanyaev committed
639
    last_activity_at || updated_at
Dmitriy Zaporozhets committed
640
  end
641

642 643 644
  def project_id
    self.id
  end
randx committed
645

646
  def get_issue(issue_id)
647
    if default_issues_tracker?
648
      issues.find_by(iid: issue_id)
649
    else
650
      ExternalIssue.new(issue_id, self)
651 652 653
    end
  end

654
  def issue_exists?(issue_id)
655
    get_issue(issue_id)
656 657
  end

658
  def default_issue_tracker
659
    gitlab_issue_tracker_service || create_gitlab_issue_tracker_service
660 661 662 663 664 665 666 667 668 669
  end

  def issues_tracker
    if external_issue_tracker
      external_issue_tracker
    else
      default_issue_tracker
    end
  end

670
  def default_issues_tracker?
671
    !external_issue_tracker
672 673 674
  end

  def external_issue_tracker
675 676 677 678 679 680 681 682 683 684 685 686 687 688 689
    if has_external_issue_tracker.nil? # To populate existing projects
      cache_has_external_issue_tracker
    end

    if has_external_issue_tracker?
      return @external_issue_tracker if defined?(@external_issue_tracker)

      @external_issue_tracker = services.external_issue_trackers.first
    else
      nil
    end
  end

  def cache_has_external_issue_tracker
    update_column(:has_external_issue_tracker, services.external_issue_trackers.any?)
690 691
  end

692 693 694 695
  def has_wiki?
    wiki_enabled? || has_external_wiki?
  end

696 697 698 699 700 701 702 703 704 705 706 707 708 709 710 711
  def external_wiki
    if has_external_wiki.nil?
      cache_has_external_wiki # Populate
    end

    if has_external_wiki
      @external_wiki ||= services.external_wikis.first
    else
      nil
    end
  end

  def cache_has_external_wiki
    update_column(:has_external_wiki, services.external_wikis.any?)
  end

712
  def build_missing_services
713 714
    services_templates = Service.where(template: true)

715
    Service.available_services_names.each do |service_name|
716
      service = find_service(services, service_name)
717 718

      # If service is available but missing in db
719 720 721 722 723 724
      if service.nil?
        # We should check if template for the service exists
        template = find_service(services_templates, service_name)

        if template.nil?
          # If no template, we should create an instance. Ex `create_gitlab_ci_service`
725
          self.send :"create_#{service_name}_service"
726 727 728 729
        else
          Service.create_from_template(self.id, template)
        end
      end
730 731 732
    end
  end

733 734 735 736 737 738 739 740 741
  def create_labels
    Label.templates.each do |label|
      label = label.dup
      label.template = nil
      label.project_id = self.id
      label.save
    end
  end

742 743 744
  def find_service(list, name)
    list.find { |service| service.to_param == name }
  end
745

746
  def ci_services
747
    services.where(category: :ci)
748 749 750
  end

  def ci_service
751
    @ci_service ||= ci_services.reorder(nil).find_by(active: true)
752 753
  end

Drew Blessing committed
754 755 756 757
  def jira_tracker?
    issues_tracker.to_param == 'jira'
  end

758
  def avatar_type
759 760
    unless self.avatar.image?
      self.errors.add :avatar, 'only images allowed'
761 762 763 764
    end
  end

  def avatar_in_git
765
    repository.avatar
766 767
  end

768
  def avatar_url
769
    if self[:avatar].present?
770 771
      [gitlab_config.url, avatar.url].join
    elsif avatar_in_git
772
      Gitlab::Routing.url_helpers.namespace_project_avatar_url(namespace, self)
773 774 775
    end
  end

776 777 778 779 780
  # For compatibility with old code
  def code
    path
  end

781
  def items_for(entity)
782 783 784 785 786 787 788
    case entity
    when 'issue' then
      issues
    when 'merge_request' then
      merge_requests
    end
  end
789

790
  def send_move_instructions(old_path_with_namespace)
791 792 793
    # New project path needs to be committed to the DB or notification will
    # retrieve stale information
    run_after_commit { NotificationService.new.project_was_moved(self, old_path_with_namespace) }
794
  end
795 796

  def owner
797 798
    if group
      group
799
    else
800
      namespace.try(:owner)
801 802
    end
  end
Dmitriy Zaporozhets committed
803 804 805 806

  def name_with_namespace
    @name_with_namespace ||= begin
                               if namespace
807
                                 namespace.human_name + ' / ' + name
Dmitriy Zaporozhets committed
808 809 810 811 812
                               else
                                 name
                               end
                             end
  end
813
  alias_method :human_name, :name_with_namespace
Dmitriy Zaporozhets committed
814 815 816 817 818 819 820 821 822

  def path_with_namespace
    if namespace
      namespace.path + '/' + path
    else
      path
    end
  end

823 824
  def execute_hooks(data, hooks_scope = :push_hooks)
    hooks.send(hooks_scope).each do |hook|
825
      hook.async_execute(data, hooks_scope.to_s)
826
    end
Dmitriy Zaporozhets committed
827 828
  end

829 830 831
  def execute_services(data, hooks_scope = :push_hooks)
    # Call only service hooks that are active for this scope
    services.send(hooks_scope).each do |service|
832
      service.async_execute(data)
Dmitriy Zaporozhets committed
833 834 835 836
    end
  end

  def update_merge_requests(oldrev, newrev, ref, user)
837 838
    MergeRequests::RefreshService.new(self, user).
      execute(oldrev, newrev, ref)
Dmitriy Zaporozhets committed
839 840 841
  end

  def valid_repo?
842
    repository.exists?
Dmitriy Zaporozhets committed
843
  rescue
844
    errors.add(:path, 'Invalid repository path')
Dmitriy Zaporozhets committed
845 846 847 848
    false
  end

  def empty_repo?
849
    !repository.exists? || !repository.has_visible_content?
Dmitriy Zaporozhets committed
850 851 852
  end

  def repo
853
    repository.raw
Dmitriy Zaporozhets committed
854 855 856
  end

  def url_to_repo
857
    gitlab_shell.url_to_repo(path_with_namespace)
Dmitriy Zaporozhets committed
858 859 860 861 862 863 864
  end

  def namespace_dir
    namespace.try(:path) || ''
  end

  def repo_exists?
865
    @repo_exists ||= repository.exists?
Dmitriy Zaporozhets committed
866 867 868 869
  rescue
    @repo_exists = false
  end

870
  # Branches that are not _exactly_ matched by a protected branch.
Dmitriy Zaporozhets committed
871
  def open_branches
872 873 874 875
    exact_protected_branch_names = protected_branches.reject(&:wildcard?).map(&:name)
    branch_names = repository.branches.map(&:name)
    non_open_branch_names = Set.new(exact_protected_branch_names).intersection(Set.new(branch_names))
    repository.branches.reject { |branch| non_open_branch_names.include? branch.name }
Dmitriy Zaporozhets committed
876 877 878
  end

  def root_ref?(branch)
879
    repository.root_ref == branch
Dmitriy Zaporozhets committed
880 881 882 883 884 885 886
  end

  def ssh_url_to_repo
    url_to_repo
  end

  def http_url_to_repo
Douwe Maan committed
887
    "#{web_url}.git"
Dmitriy Zaporozhets committed
888 889 890
  end

  # Check if current branch name is marked as protected in the system
891
  def protected_branch?(branch_name)
892 893
    return true if empty_repo? && default_branch_protected?

894 895
    @protected_branches ||= self.protected_branches.to_a
    ProtectedBranch.matching(branch_name, protected_branches: @protected_branches).present?
Dmitriy Zaporozhets committed
896
  end
897

898 899
  def user_can_push_to_empty_repo?(user)
    !default_branch_protected? || team.max_member_access(user.id) > Gitlab::Access::DEVELOPER
900 901
  end

902 903 904
  def forked?
    !(forked_project_link.nil? || forked_project_link.forked_from_project.nil?)
  end
905

906 907 908 909
  def personal?
    !group
  end

910
  def rename_repo
911
    path_was = previous_changes['path'].first
912 913 914
    old_path_with_namespace = File.join(namespace_dir, path_was)
    new_path_with_namespace = File.join(namespace_dir, path)

915 916
    Rails.logger.error "Attempting to rename #{old_path_with_namespace} -> #{new_path_with_namespace}"

917 918
    expire_caches_before_rename(old_path_with_namespace)

919
    if has_container_registry_tags?
920 921
      Rails.logger.error "Project #{old_path_with_namespace} cannot be renamed because container registry tags are present"

922
      # we currently doesn't support renaming repository if it contains tags in container registry
Kamil Trzcinski committed
923
      raise Exception.new('Project cannot be renamed, because tags are present in its container registry')
924 925
    end

926
    if gitlab_shell.mv_repository(repository_storage_path, old_path_with_namespace, new_path_with_namespace)
927
      # If repository moved successfully we need to send update instructions to users.
928 929 930
      # However we cannot allow rollback since we moved repository
      # So we basically we mute exceptions in next actions
      begin
931
        gitlab_shell.mv_repository(repository_storage_path, "#{old_path_with_namespace}.wiki", "#{new_path_with_namespace}.wiki")
932
        send_move_instructions(old_path_with_namespace)
933
        reset_events_cache
934 935 936 937 938

        @old_path_with_namespace = old_path_with_namespace

        SystemHooksService.new.execute_hooks_for(self, :rename)

939
        @repository = nil
940 941
      rescue => e
        Rails.logger.error "Exception renaming #{old_path_with_namespace} -> #{new_path_with_namespace}: #{e}"
Johannes Schleifenbaum committed
942
        # Returning false does not rollback after_* transaction but gives
943 944 945 946
        # us information about failing some of tasks
        false
      end
    else
947 948
      Rails.logger.error "Repository could not be renamed: #{old_path_with_namespace} -> #{new_path_with_namespace}"

949 950 951 952
      # if we cannot move namespace directory we should rollback
      # db changes in order to prevent out of sync between db and fs
      raise Exception.new('repository cannot be renamed')
    end
953

954 955
    Gitlab::AppLogger.info "Project was renamed: #{old_path_with_namespace} -> #{new_path_with_namespace}"

956
    Gitlab::UploadsTransfer.new.rename_project(path_was, path, namespace.path)
957
  end
958

959 960 961 962 963 964
  # Expires various caches before a project is renamed.
  def expire_caches_before_rename(old_path)
    repo = Repository.new(old_path, self)
    wiki = Repository.new("#{old_path}.wiki", self)

    if repo.exists?
965
      repo.before_delete
966 967 968
    end

    if wiki.exists?
969
      wiki.before_delete
970 971 972
    end
  end

973 974
  def hook_attrs(backward: true)
    attrs = {
Kirill Zaitsev committed
975
      name: name,
976
      description: description,
Kirilll Zaitsev committed
977
      web_url: web_url,
978 979 980
      avatar_url: avatar_url,
      git_ssh_url: ssh_url_to_repo,
      git_http_url: http_url_to_repo,
Kirill Zaitsev committed
981
      namespace: namespace.name,
982 983 984
      visibility_level: visibility_level,
      path_with_namespace: path_with_namespace,
      default_branch: default_branch,
Kirill Zaitsev committed
985
    }
986 987 988 989 990 991 992 993 994 995 996 997

    # Backward compatibility
    if backward
      attrs.merge!({
                    homepage: web_url,
                    url: url_to_repo,
                    ssh_url: ssh_url_to_repo,
                    http_url: http_url_to_repo
                  })
    end

    attrs
Kirill Zaitsev committed
998 999
  end

1000 1001 1002 1003 1004
  # Reset events cache related to this project
  #
  # Since we do cache @event we need to reset cache in special cases:
  # * when project was moved
  # * when project was renamed
1005
  # * when the project avatar changes
1006 1007 1008 1009 1010 1011 1012 1013 1014
  # Events cache stored like  events/23-20130109142513.
  # The cache key includes updated_at timestamp.
  # Thus it will automatically generate a new fragment
  # when the event is updated because the key changes.
  def reset_events_cache
    Event.where(project_id: self.id).
      order('id DESC').limit(100).
      update_all(updated_at: Time.now)
  end
1015 1016

  def project_member(user)
1017
    project_members.find_by(user_id: user)
1018
  end
1019 1020 1021 1022

  def default_branch
    @default_branch ||= repository.root_ref if repository.exists?
  end
1023 1024 1025 1026 1027

  def reload_default_branch
    @default_branch = nil
    default_branch
  end
1028

1029 1030 1031
  def visibility_level_field
    visibility_level
  end
1032 1033 1034 1035 1036 1037 1038 1039

  def archive!
    update_attribute(:archived, true)
  end

  def unarchive!
    update_attribute(:archived, false)
  end
1040

1041
  def change_head(branch)
1042
    repository.before_change_head
P.S.V.R committed
1043 1044 1045
    repository.rugged.references.create('HEAD',
                                        "refs/heads/#{branch}",
                                        force: true)
1046
    repository.copy_gitattributes(branch)
1047
    repository.expire_avatar_cache(branch)
1048 1049
    reload_default_branch
  end
1050 1051 1052 1053

  def forked_from?(project)
    forked? && project == forked_from_project
  end
1054 1055 1056 1057

  def update_repository_size
    update_attribute(:repository_size, repository.size)
  end
1058

1059 1060 1061 1062
  def update_commit_count
    update_attribute(:commit_count, repository.commit_count)
  end

1063
  def forks_count
1064
    forks.count
1065
  end
1066 1067 1068 1069

  def find_label(name)
    labels.find_by(name: name)
  end
1070 1071 1072 1073

  def origin_merge_requests
    merge_requests.where(source_project_id: self.id)
  end
1074 1075

  def create_repository
1076 1077
    # Forked import is handled asynchronously
    unless forked?
1078
      if gitlab_shell.add_repository(repository_storage_path, path_with_namespace)
1079
        repository.after_create
1080 1081
        true
      else
1082
        errors.add(:base, 'Failed to create repository via gitlab-shell')
1083 1084
        false
      end
1085 1086 1087 1088 1089 1090 1091 1092 1093 1094
    end
  end

  def repository_exists?
    !!repository.exists?
  end

  def create_wiki
    ProjectWiki.new(self, self.owner).wiki
    true
1095
  rescue ProjectWiki::CouldNotCreateWikiError
1096
    errors.add(:base, 'Failed create wiki')
1097 1098
    false
  end
1099

Drew Blessing committed
1100 1101 1102 1103
  def jira_tracker_active?
    jira_tracker? && jira_service.active
  end

1104
  def allowed_to_share_with_group?
1105
    !namespace.share_with_group_lock
1106 1107
  end

1108 1109 1110
  def pipeline_for(ref, sha = nil)
    sha ||= commit(ref).try(:sha)

1111
    return unless sha
1112

1113
    pipelines.order(id: :desc).find_by(sha: sha, ref: ref)
1114 1115
  end

1116 1117 1118
  def ensure_pipeline(ref, sha, current_user = nil)
    pipeline_for(ref, sha) ||
      pipelines.create(sha: sha, ref: ref, user: current_user)
1119
  end
1120

1121
  def enable_ci
1122
    project_feature.update_attribute(:builds_access_level, ProjectFeature::ENABLED)
1123
  end
1124

1125
  def any_runners?(&block)
1126
    if runners.active.any?(&block)
1127 1128 1129 1130 1131 1132
      return true
    end

    shared_runners_enabled? && Ci::Runner.shared.active.any?(&block)
  end

1133
  def valid_runners_token?(token)
1134
    self.runners_token && ActiveSupport::SecurityUtils.variable_size_secure_compare(token, self.runners_token)
Kamil Trzcinski committed
1135 1136
  end

1137 1138 1139 1140 1141 1142 1143 1144 1145 1146 1147
  def build_coverage_enabled?
    build_coverage_regex.present?
  end

  def build_timeout_in_minutes
    build_timeout / 60
  end

  def build_timeout_in_minutes=(value)
    self.build_timeout = value.to_i * 60
  end
1148

1149 1150 1151
  def open_issues_count
    issues.opened.count
  end
1152

1153
  def visibility_level_allowed_as_fork?(level = self.visibility_level)
Douwe Maan committed
1154
    return true unless forked?
1155

Douwe Maan committed
1156 1157 1158 1159 1160 1161
    # self.forked_from_project will be nil before the project is saved, so
    # we need to go through the relation
    original_project = forked_project_link.forked_from_project
    return true unless original_project

    level <= original_project.visibility_level
1162
  end
1163

1164 1165
  def visibility_level_allowed_by_group?(level = self.visibility_level)
    return true unless group
1166

1167
    level <= group.visibility_level
1168
  end
1169

1170 1171
  def visibility_level_allowed?(level = self.visibility_level)
    visibility_level_allowed_as_fork?(level) && visibility_level_allowed_by_group?(level)
Felipe Artur committed
1172 1173
  end

1174 1175 1176
  def runners_token
    ensure_runners_token!
  end
1177 1178 1179 1180

  def wiki
    @wiki ||= ProjectWiki.new(self, self.owner)
  end
1181

Josh Frye committed
1182 1183
  def running_or_pending_build_count(force: false)
    Rails.cache.fetch(['projects', id, 'running_or_pending_build_count'], force: force) do
1184 1185 1186
      builds.running_or_pending.count(:all)
    end
  end
1187 1188

  def mark_import_as_failed(error_message)
1189 1190 1191
    original_errors = errors.dup
    sanitized_message = Gitlab::UrlSanitizer.sanitize(error_message)

1192
    import_fail
1193 1194 1195 1196 1197
    update_column(:import_error, sanitized_message)
  rescue ActiveRecord::ActiveRecordError => e
    Rails.logger.error("Error setting import status to failed: #{e.message}. Original error: #{sanitized_message}")
  ensure
    @errors = original_errors
1198
  end
James Lopez committed
1199

1200 1201
  def add_export_job(current_user:)
    job_id = ProjectExportWorker.perform_async(current_user.id, self.id)
1202 1203 1204 1205 1206 1207 1208

    if job_id
      Rails.logger.info "Export job started for project ID #{self.id} with job ID #{job_id}"
    else
      Rails.logger.error "Export job failed to start for project ID #{self.id}"
    end
  end
James Lopez committed
1209 1210

  def export_path
1211
    File.join(Gitlab::ImportExport.storage_path, path_with_namespace)
James Lopez committed
1212
  end
1213 1214 1215 1216 1217 1218 1219 1220 1221

  def export_project_path
    Dir.glob("#{export_path}/*export.tar.gz").max_by { |f| File.ctime(f) }
  end

  def remove_exports
    _, status = Gitlab::Popen.popen(%W(find #{export_path} -not -path #{export_path} -delete))
    status.zero?
  end
1222 1223 1224 1225

  def ensure_dir_exist
    gitlab_shell.add_namespace(repository_storage_path, namespace.path)
  end
1226 1227 1228 1229 1230 1231 1232 1233 1234 1235 1236 1237 1238 1239 1240 1241 1242 1243

  def predefined_variables
    [
      { key: 'CI_PROJECT_ID', value: id.to_s, public: true },
      { key: 'CI_PROJECT_NAME', value: path, public: true },
      { key: 'CI_PROJECT_PATH', value: path_with_namespace, public: true },
      { key: 'CI_PROJECT_NAMESPACE', value: namespace.path, public: true },
      { key: 'CI_PROJECT_URL', value: web_url, public: true }
    ]
  end

  def container_registry_variables
    return [] unless Gitlab.config.registry.enabled

    variables = [
      { key: 'CI_REGISTRY', value: Gitlab.config.registry.host_port, public: true }
    ]

Kamil Trzcinski committed
1244 1245 1246 1247
    if container_registry_enabled?
      variables << { key: 'CI_REGISTRY_IMAGE', value: container_registry_repository_url, public: true }
    end

1248 1249 1250 1251 1252 1253 1254 1255
    variables
  end

  def secret_variables
    variables.map do |variable|
      { key: variable.key, value: variable.value, public: false }
    end
  end
1256 1257 1258 1259 1260 1261 1262 1263 1264 1265 1266 1267 1268 1269 1270

  # Checks if `user` is authorized for this project, with at least the
  # `min_access_level` (if given).
  #
  # If you change the logic of this method, please also update `User#authorized_projects`
  def authorized_for_user?(user, min_access_level = nil)
    return false unless user

    return true if personal? && namespace_id == user.namespace_id

    authorized_for_user_by_group?(user, min_access_level) ||
      authorized_for_user_by_members?(user, min_access_level) ||
      authorized_for_user_by_shared_projects?(user, min_access_level)
  end

1271 1272 1273 1274 1275 1276 1277 1278 1279 1280
  def append_or_update_attribute(name, value)
    old_values = public_send(name.to_s)

    if Project.reflect_on_association(name).try(:macro) == :has_many && old_values.any?
      update_attribute(name, old_values + value)
    else
      update_attribute(name, value)
    end
  end

1281 1282 1283 1284 1285 1286 1287 1288 1289 1290 1291 1292
  def pushes_since_gc
    Gitlab::Redis.with { |redis| redis.get(pushes_since_gc_redis_key).to_i }
  end

  def increment_pushes_since_gc
    Gitlab::Redis.with { |redis| redis.incr(pushes_since_gc_redis_key) }
  end

  def reset_pushes_since_gc
    Gitlab::Redis.with { |redis| redis.del(pushes_since_gc_redis_key) }
  end

1293 1294 1295 1296 1297 1298 1299 1300 1301 1302 1303
  def environments_for(ref, commit, with_tags: false)
    environment_ids = deployments.group(:environment_id).
      select(:environment_id)

    environment_ids =
      if with_tags
        environment_ids.where('ref=? OR tag IS TRUE', ref)
      else
        environment_ids.where(ref: ref)
      end

1304
    environments.where(id: environment_ids).select do |environment|
1305 1306 1307 1308
      environment.includes_commit?(commit)
    end
  end

1309 1310
  private

1311 1312 1313 1314
  def pushes_since_gc_redis_key
    "projects/#{id}/pushes_since_gc"
  end

1315 1316 1317 1318 1319
  # Prevents the creation of project_feature record for every project
  def setup_project_feature
    build_project_feature unless project_feature
  end

1320
  def default_branch_protected?
1321 1322
    current_application_settings.default_branch_protection == Gitlab::Access::PROTECTION_FULL ||
      current_application_settings.default_branch_protection == Gitlab::Access::PROTECTION_DEV_CAN_MERGE
1323 1324
  end

1325 1326 1327 1328 1329 1330 1331 1332 1333 1334 1335 1336 1337 1338 1339 1340 1341 1342 1343 1344 1345 1346 1347
  def authorized_for_user_by_group?(user, min_access_level)
    member = user.group_members.find_by(source_id: group)

    member && (!min_access_level || member.access_level >= min_access_level)
  end

  def authorized_for_user_by_members?(user, min_access_level)
    member = members.find_by(user_id: user)

    member && (!min_access_level || member.access_level >= min_access_level)
  end

  def authorized_for_user_by_shared_projects?(user, min_access_level)
    shared_projects = user.group_members.joins(group: :shared_projects).
      where(project_group_links: { project_id: self })

    if min_access_level
      members_scope = { access_level: Gitlab::Access.values.select { |access| access >= min_access_level } }
      shared_projects = shared_projects.where(members: members_scope)
    end

    shared_projects.any?
  end
gitlabhq committed
1348
end