BigW Consortium Gitlab

project.rb 41.2 KB
Newer Older
1 2
require 'carrierwave/orm/activerecord'

gitlabhq committed
3
class Project < ActiveRecord::Base
4
  include Gitlab::ConfigHelper
5
  include Gitlab::ShellAdapter
6
  include Gitlab::VisibilityLevel
7
  include Gitlab::CurrentSettings
8
  include AccessRequestable
9
  include CacheMarkdownField
10 11
  include Referable
  include Sortable
12
  include AfterCommitQueue
13
  include CaseSensitivity
14
  include TokenAuthenticatable
15
  include ValidAttribute
16
  include ProjectFeaturesCompatibility
17
  include SelectForProjectAuthorization
18
  include Routable
Robert Speicher committed
19

20
  extend Gitlab::ConfigHelper
21

22 23
  class BoardLimitExceeded < StandardError; end

24
  NUMBER_OF_PERMITTED_BOARDS = 1
Jared Szechy committed
25 26
  UNKNOWN_IMPORT_URL = 'http://unknown.git'

27 28
  cache_markdown_field :description, pipeline: :description

29 30
  delegate :feature_available?, :builds_enabled?, :wiki_enabled?,
           :merge_requests_enabled?, :issues_enabled?, to: :project_feature,
31
                                                       allow_nil: true
32

33
  default_value_for :archived, false
34
  default_value_for :visibility_level, gitlab_config_features.visibility_level
35
  default_value_for :container_registry_enabled, gitlab_config_features.container_registry
36
  default_value_for(:repository_storage) { current_application_settings.pick_repository_storage }
37
  default_value_for(:shared_runners_enabled) { current_application_settings.shared_runners_enabled }
38 39 40 41 42
  default_value_for :issues_enabled, gitlab_config_features.issues
  default_value_for :merge_requests_enabled, gitlab_config_features.merge_requests
  default_value_for :builds_enabled, gitlab_config_features.builds
  default_value_for :wiki_enabled, gitlab_config_features.wiki
  default_value_for :snippets_enabled, gitlab_config_features.snippets
43
  default_value_for :only_allow_merge_if_all_discussions_are_resolved, false
44

45
  after_create :ensure_dir_exist
46
  after_create :create_project_feature, unless: :project_feature
47
  after_save :ensure_dir_exist, if: :namespace_id_changed?
48
  after_save :update_project_statistics, if: :namespace_id_changed?
49

50 51
  # set last_activity_at to the same as created_at
  after_create :set_last_activity_at
52
  def set_last_activity_at
53
    update_column(:last_activity_at, self.created_at)
54 55
  end

Kamil Trzcinski committed
56 57
  after_destroy :remove_pages

58
  # update visibility_level of forks
59 60 61 62 63 64 65 66 67 68 69 70
  after_update :update_forks_visibility_level
  def update_forks_visibility_level
    return unless visibility_level < visibility_level_was

    forks.each do |forked_project|
      if forked_project.visibility_level > visibility_level
        forked_project.visibility_level = visibility_level
        forked_project.save!
      end
    end
  end

71 72
  after_validation :check_pending_delete

73
  ActsAsTaggableOn.strict_case_match = true
74
  acts_as_taggable_on :tags
75

76
  attr_accessor :new_default_branch
77
  attr_accessor :old_path_with_namespace
78

79 80
  alias_attribute :title, :name

81
  # Relations
82
  belongs_to :creator, class_name: 'User'
83
  belongs_to :group, -> { where(type: 'Group') }, foreign_key: 'namespace_id'
84
  belongs_to :namespace
85

86
  has_one :last_event, -> {order 'events.created_at DESC'}, class_name: 'Event'
87
  has_many :boards, before_add: :validate_board_limit, dependent: :destroy
88

89
  # Project services
90
  has_one :campfire_service, dependent: :destroy
Kirilll Zaitsev committed
91
  has_one :drone_ci_service, dependent: :destroy
92
  has_one :emails_on_push_service, dependent: :destroy
93
  has_one :builds_email_service, dependent: :destroy
94
  has_one :pipelines_email_service, dependent: :destroy
Aorimn committed
95
  has_one :irker_service, dependent: :destroy
96
  has_one :pivotaltracker_service, dependent: :destroy
97
  has_one :hipchat_service, dependent: :destroy
98
  has_one :flowdock_service, dependent: :destroy
99
  has_one :assembla_service, dependent: :destroy
Jeremy committed
100
  has_one :asana_service, dependent: :destroy
101
  has_one :gemnasium_service, dependent: :destroy
102
  has_one :mattermost_slash_commands_service, dependent: :destroy
103
  has_one :mattermost_service, dependent: :destroy
104
  has_one :slack_slash_commands_service, dependent: :destroy
105
  has_one :slack_service, dependent: :destroy
106
  has_one :buildkite_service, dependent: :destroy
107
  has_one :bamboo_service, dependent: :destroy
108
  has_one :teamcity_service, dependent: :destroy
109
  has_one :pushover_service, dependent: :destroy
110 111
  has_one :jira_service, dependent: :destroy
  has_one :redmine_service, dependent: :destroy
112
  has_one :custom_issue_tracker_service, dependent: :destroy
113
  has_one :bugzilla_service, dependent: :destroy
114
  has_one :gitlab_issue_tracker_service, dependent: :destroy, inverse_of: :project
115
  has_one :external_wiki_service, dependent: :destroy
116
  has_one :kubernetes_service, dependent: :destroy, inverse_of: :project
117

118 119 120 121 122
  has_one  :forked_project_link,  dependent: :destroy, foreign_key: "forked_to_project_id"
  has_one  :forked_from_project,  through:   :forked_project_link

  has_many :forked_project_links, foreign_key: "forked_from_project_id"
  has_many :forks,                through:     :forked_project_links, source: :forked_to_project
123

124
  # Merge Requests for target project should be removed with it
125
  has_many :merge_requests,     dependent: :destroy, foreign_key: 'target_project_id'
126
  has_many :issues,             dependent: :destroy
127
  has_many :labels,             dependent: :destroy, class_name: 'ProjectLabel'
128 129
  has_many :services,           dependent: :destroy
  has_many :events,             dependent: :destroy
130 131
  has_many :milestones,         dependent: :destroy
  has_many :notes,              dependent: :destroy
132 133
  has_many :snippets,           dependent: :destroy, class_name: 'ProjectSnippet'
  has_many :hooks,              dependent: :destroy, class_name: 'ProjectHook'
134
  has_many :protected_branches, dependent: :destroy
135

136
  has_many :project_authorizations
137
  has_many :authorized_users, through: :project_authorizations, source: :user, class_name: 'User'
138
  has_many :project_members, -> { where(requested_at: nil) }, dependent: :destroy, as: :source
139
  alias_method :members, :project_members
140 141 142 143
  has_many :users, through: :project_members

  has_many :requesters, -> { where.not(requested_at: nil) }, dependent: :destroy, as: :source, class_name: 'ProjectMember'

144 145
  has_many :deploy_keys_projects, dependent: :destroy
  has_many :deploy_keys, through: :deploy_keys_projects
Ciro Santilli committed
146 147
  has_many :users_star_projects, dependent: :destroy
  has_many :starrers, through: :users_star_projects, source: :user
148
  has_many :releases, dependent: :destroy
149 150
  has_many :lfs_objects_projects, dependent: :destroy
  has_many :lfs_objects, through: :lfs_objects_projects
151 152
  has_many :project_group_links, dependent: :destroy
  has_many :invited_groups, through: :project_group_links, source: :group
Kamil Trzcinski committed
153
  has_many :pages_domains, dependent: :destroy
154
  has_many :todos, dependent: :destroy
155
  has_many :notification_settings, dependent: :destroy, as: :source
156

157
  has_one :import_data, dependent: :destroy, class_name: "ProjectImportData"
158
  has_one :project_feature, dependent: :destroy
159
  has_one :statistics, class_name: 'ProjectStatistics', dependent: :delete
160

161
  has_many :commit_statuses, dependent: :destroy, foreign_key: :gl_project_id
162
  has_many :pipelines, dependent: :destroy, class_name: 'Ci::Pipeline', foreign_key: :gl_project_id
163 164 165 166 167
  has_many :builds, class_name: 'Ci::Build', foreign_key: :gl_project_id # the builds are created from the commit_statuses
  has_many :runner_projects, dependent: :destroy, class_name: 'Ci::RunnerProject', foreign_key: :gl_project_id
  has_many :runners, through: :runner_projects, source: :runner, class_name: 'Ci::Runner'
  has_many :variables, dependent: :destroy, class_name: 'Ci::Variable', foreign_key: :gl_project_id
  has_many :triggers, dependent: :destroy, class_name: 'Ci::Trigger', foreign_key: :gl_project_id
168 169
  has_many :environments, dependent: :destroy
  has_many :deployments, dependent: :destroy
170

171
  accepts_nested_attributes_for :variables, allow_destroy: true
172
  accepts_nested_attributes_for :project_feature
173

174
  delegate :name, to: :owner, allow_nil: true, prefix: true
175
  delegate :members, to: :team, prefix: true
176
  delegate :add_user, to: :team
177
  delegate :add_guest, :add_reporter, :add_developer, :add_master, to: :team
178

Andrey Kumanyaev committed
179
  # Validations
180
  validates :creator, presence: true, on: :create
181
  validates :description, length: { maximum: 2000 }, allow_blank: true
182 183
  validates :name,
    presence: true,
184
    length: { maximum: 255 },
185
    format: { with: Gitlab::Regex.project_name_regex,
186
              message: Gitlab::Regex.project_name_regex_message }
187 188
  validates :path,
    presence: true,
189
    project_path: true,
190
    length: { maximum: 255 },
191 192
    format: { with: Gitlab::Regex.project_path_regex,
              message: Gitlab::Regex.project_path_regex_message }
193
  validates :namespace, presence: true
194 195
  validates_uniqueness_of :name, scope: :namespace_id
  validates_uniqueness_of :path, scope: :namespace_id
196
  validates :import_url, addressable_url: true, if: :external_import?
197
  validates :star_count, numericality: { greater_than_or_equal_to: 0 }
198
  validate :check_limit, on: :create
199
  validate :avatar_type,
200
    if: ->(project) { project.avatar.present? && project.avatar_changed? }
201
  validates :avatar, file_size: { maximum: 200.kilobytes.to_i }
202
  validate :visibility_level_allowed_by_group
Douwe Maan committed
203
  validate :visibility_level_allowed_as_fork
204
  validate :check_wiki_path_conflict
205 206 207
  validates :repository_storage,
    presence: true,
    inclusion: { in: ->(_object) { Gitlab.config.repositories.storages.keys } }
208

209
  add_authentication_token_field :runners_token
210
  before_save :ensure_runners_token
211

212
  mount_uploader :avatar, AvatarUploader
Andrey Kumanyaev committed
213

214
  # Scopes
215 216
  default_scope { where(pending_delete: false) }

217
  scope :sorted_by_activity, -> { reorder(last_activity_at: :desc) }
218 219
  scope :sorted_by_stars, -> { reorder('projects.star_count DESC') }

220
  scope :in_namespace, ->(namespace_ids) { where(namespace_id: namespace_ids) }
221
  scope :personal, ->(user) { where(namespace_id: user.namespace_id) }
222
  scope :joined, ->(user) { where('namespace_id != ?', user.namespace_id) }
223
  scope :visible_to_user, ->(user) { where(id: user.authorized_projects.select(:id).reorder(nil)) }
224
  scope :non_archived, -> { where(archived: false) }
225
  scope :for_milestones, ->(ids) { joins(:milestones).where('milestones.id' => ids).distinct }
226 227
  scope :with_push, -> { joins(:events).where('events.action = ?', Event::PUSHED) }

228
  scope :with_project_feature, -> { joins('LEFT JOIN project_features ON projects.id = project_features.project_id') }
229
  scope :with_statistics, -> { includes(:statistics) }
230
  scope :with_shared_runners, -> { where(shared_runners_enabled: true) }
231 232 233 234 235 236
  scope :inside_path, ->(path) do
    # We need routes alias rs for JOIN so it does not conflict with
    # includes(:route) which we use in ProjectsFinder.
    joins("INNER JOIN routes rs ON rs.source_id = projects.id AND rs.source_type = 'Project'").
      where('rs.path LIKE ?', "#{path}/%")
  end
237 238 239 240 241 242 243 244 245 246 247 248 249 250 251 252 253 254 255 256 257 258 259 260 261 262 263 264 265 266 267

  # "enabled" here means "not disabled". It includes private features!
  scope :with_feature_enabled, ->(feature) {
    access_level_attribute = ProjectFeature.access_level_attribute(feature)
    with_project_feature.where(project_features: { access_level_attribute => [nil, ProjectFeature::PRIVATE, ProjectFeature::ENABLED] })
  }

  # Picks a feature where the level is exactly that given.
  scope :with_feature_access_level, ->(feature, level) {
    access_level_attribute = ProjectFeature.access_level_attribute(feature)
    with_project_feature.where(project_features: { access_level_attribute => level })
  }

  scope :with_builds_enabled, -> { with_feature_enabled(:builds) }
  scope :with_issues_enabled, -> { with_feature_enabled(:issues) }

  # project features may be "disabled", "internal" or "enabled". If "internal",
  # they are only available to team members. This scope returns projects where
  # the feature is either enabled, or internal with permission for the user.
  def self.with_feature_available_for_user(feature, user)
    return with_feature_enabled(feature) if user.try(:admin?)

    unconditional = with_feature_access_level(feature, [nil, ProjectFeature::ENABLED])
    return unconditional if user.nil?

    conditional = with_feature_access_level(feature, ProjectFeature::PRIVATE)
    authorized = user.authorized_projects.merge(conditional.reorder(nil))

    union = Gitlab::SQL::Union.new([unconditional.select(:id), authorized.select(:id)])
    where(arel_table[:id].in(Arel::Nodes::SqlLiteral.new(union.to_sql)))
  end
268

269 270
  scope :active, -> { joins(:issues, :notes, :merge_requests).order('issues.created_at, notes.created_at, merge_requests.created_at DESC') }
  scope :abandoned, -> { where('projects.last_activity_at < ?', 6.months.ago) }
271

272 273
  scope :excluding_project, ->(project) { where.not(id: project) }

274 275
  state_machine :import_status, initial: :none do
    event :import_start do
276
      transition [:none, :finished] => :started
277 278 279
    end

    event :import_finish do
280
      transition started: :finished
281 282 283
    end

    event :import_fail do
284
      transition started: :failed
285 286 287
    end

    event :import_retry do
288
      transition failed: :started
289 290 291 292
    end

    state :started
    state :finished
293 294
    state :failed

295
    after_transition any => :finished, do: :reset_cache_and_import_attrs
296 297
  end

Andrey Kumanyaev committed
298
  class << self
299 300 301 302 303 304 305
    # Searches for a list of projects based on the query given in `query`.
    #
    # On PostgreSQL this method uses "ILIKE" to perform a case-insensitive
    # search. On MySQL a regular "LIKE" is used as it's already
    # case-insensitive.
    #
    # query - The search query as a String.
306
    def search(query)
307
      ptable  = arel_table
308 309 310 311 312 313 314 315 316
      ntable  = Namespace.arel_table
      pattern = "%#{query}%"

      projects = select(:id).where(
        ptable[:path].matches(pattern).
          or(ptable[:name].matches(pattern)).
          or(ptable[:description].matches(pattern))
      )

317 318 319 320 321 322
      # We explicitly remove any eager loading clauses as they're:
      #
      # 1. Not needed by this query
      # 2. Combined with .joins(:namespace) lead to all columns from the
      #    projects & namespaces tables being selected, leading to a SQL error
      #    due to the columns of all UNION'd queries no longer being the same.
323
      namespaces = select(:id).
324
        except(:includes).
325 326 327 328 329 330
        joins(:namespace).
        where(ntable[:name].matches(pattern))

      union = Gitlab::SQL::Union.new([projects, namespaces])

      where("projects.id IN (#{union.to_sql})")
Andrey Kumanyaev committed
331
    end
332

333
    def search_by_visibility(level)
Josh Frye committed
334
      where(visibility_level: Gitlab::VisibilityLevel.const_get(level.upcase))
335 336
    end

337
    def search_by_title(query)
338 339 340 341
      pattern = "%#{query}%"
      table   = Project.arel_table

      non_archived.where(table[:name].matches(pattern))
342 343
    end

344 345 346
    def visibility_levels
      Gitlab::VisibilityLevel.options
    end
347 348

    def sort(method)
349 350 351 352
      if method == 'storage_size_desc'
        # storage_size is a joined column so we need to
        # pass a string to avoid AR adding the table name
        reorder('project_statistics.storage_size DESC, projects.id DESC')
353 354
      else
        order_by(method)
355 356
      end
    end
357 358 359

    def reference_pattern
      name_pattern = Gitlab::Regex::NAMESPACE_REGEX_STR
360 361 362 363 364

      %r{
        ((?<namespace>#{name_pattern})\/)?
        (?<project>#{name_pattern})
      }x
365
    end
366

367 368 369
    def trending
      joins('INNER JOIN trending_projects ON projects.id = trending_projects.project_id').
        reorder('trending_projects.id ASC')
370
    end
371 372 373 374 375 376

    def cached_count
      Rails.cache.fetch('total_project_count', expires_in: 5.minutes) do
        Project.count
      end
    end
377 378

    def group_ids
379
      joins(:namespace).where(namespaces: { type: 'Group' }).select(:namespace_id)
380
    end
381 382
  end

383
  def lfs_enabled?
384
    return namespace.lfs_enabled? if self[:lfs_enabled].nil?
385

386
    self[:lfs_enabled] && Gitlab.config.lfs.enabled
387 388
  end

389 390
  def repository_storage_path
    Gitlab.config.repositories.storages[repository_storage]
391 392
  end

393
  def team
394
    @team ||= ProjectTeam.new(self)
395 396 397
  end

  def repository
398
    @repository ||= Repository.new(path_with_namespace, self)
399 400
  end

401 402 403 404
  def container_registry_path_with_namespace
    path_with_namespace.downcase
  end

405
  def container_registry_repository
Kamil Trzcinski committed
406 407
    return unless Gitlab.config.registry.enabled

408
    @container_registry_repository ||= begin
409
      token = Auth::ContainerRegistryAuthenticationService.full_access_token(container_registry_path_with_namespace)
410
      url = Gitlab.config.registry.api_url
411 412
      host_port = Gitlab.config.registry.host_port
      registry = ContainerRegistry::Registry.new(url, token: token, path: host_port)
413
      registry.repository(container_registry_path_with_namespace)
414
    end
415 416
  end

417
  def container_registry_repository_url
Kamil Trzcinski committed
418
    if Gitlab.config.registry.enabled
419
      "#{Gitlab.config.registry.host_port}/#{container_registry_path_with_namespace}"
420
    end
421 422
  end

423
  def has_container_registry_tags?
Kamil Trzcinski committed
424 425 426
    return unless container_registry_repository

    container_registry_repository.tags.any?
427 428
  end

429 430
  def commit(ref = 'HEAD')
    repository.commit(ref)
431 432
  end

433
  # ref can't be HEAD, can only be branch/tag name or SHA
434
  def latest_successful_builds_for(ref = default_branch)
435
    latest_pipeline = pipelines.latest_successful_for(ref)
436 437 438 439 440 441

    if latest_pipeline
      latest_pipeline.builds.latest.with_artifacts
    else
      builds.none
    end
442 443
  end

444
  def merge_base_commit(first_commit_id, second_commit_id)
Douwe Maan committed
445 446
    sha = repository.merge_base(first_commit_id, second_commit_id)
    repository.commit(sha) if sha
447 448
  end

449
  def saved?
450
    id && persisted?
451 452
  end

453
  def add_import_job
454
    if forked?
455 456
      job_id = RepositoryForkWorker.perform_async(id, forked_from_project.repository_storage_path,
                                                  forked_from_project.path_with_namespace,
457
                                                  self.namespace.full_path)
458
    else
459 460 461 462 463 464 465
      job_id = RepositoryImportWorker.perform_async(self.id)
    end

    if job_id
      Rails.logger.info "Import job started for #{path_with_namespace} with job ID #{job_id}"
    else
      Rails.logger.error "Import job failed to start for #{path_with_namespace}"
466
    end
467 468
  end

469
  def reset_cache_and_import_attrs
470 471
    ProjectCacheWorker.perform_async(self.id)

472
    self.import_data&.destroy
473 474
  end

475
  def import_url=(value)
476 477
    return super(value) unless Gitlab::UrlSanitizer.valid?(value)

478
    import_url = Gitlab::UrlSanitizer.new(value)
James Lopez committed
479
    super(import_url.sanitized_url)
480
    create_or_update_import_data(credentials: import_url.credentials)
481 482 483
  end

  def import_url
484
    if import_data && super.present?
485
      import_url = Gitlab::UrlSanitizer.new(super, credentials: import_data.credentials)
James Lopez committed
486 487 488
      import_url.full_url
    else
      super
489 490
    end
  end
491

James Lopez committed
492 493 494 495
  def valid_import_url?
    valid? || errors.messages[:import_url].nil?
  end

496
  def create_or_update_import_data(data: nil, credentials: nil)
497
    return unless import_url.present? && valid_import_url?
498

James Lopez committed
499
    project_import_data = import_data || build_import_data
500 501 502 503
    if data
      project_import_data.data ||= {}
      project_import_data.data = project_import_data.data.merge(data)
    end
504 505 506 507
    if credentials
      project_import_data.credentials ||= {}
      project_import_data.credentials = project_import_data.credentials.merge(credentials)
    end
508 509

    project_import_data.save
510
  end
511

512
  def import?
513
    external_import? || forked? || gitlab_project_import?
514 515
  end

516 517 518 519
  def no_import?
    import_status == 'none'
  end

520
  def external_import?
521 522 523
    import_url.present?
  end

524
  def imported?
525 526 527 528 529 530 531 532 533 534 535 536 537
    import_finished?
  end

  def import_in_progress?
    import? && import_status == 'started'
  end

  def import_failed?
    import_status == 'failed'
  end

  def import_finished?
    import_status == 'finished'
538 539
  end

540
  def safe_import_url
541
    Gitlab::UrlSanitizer.new(import_url).masked_url
542 543
  end

544 545 546 547
  def gitlab_project_import?
    import_type == 'gitlab_project'
  end

548 549 550 551
  def gitea_import?
    import_type == 'gitea'
  end

552
  def check_limit
553
    unless creator.can_create_project? or namespace.kind == 'group'
554 555 556
      projects_limit = creator.projects_limit

      if projects_limit == 0
557
        self.errors.add(:limit_reached, "Personal project creation is not allowed. Please contact your administrator with questions")
558
      else
559
        self.errors.add(:limit_reached, "Your project limit is #{projects_limit} projects! Please contact your administrator to increase it")
560
      end
561 562
    end
  rescue
563
    self.errors.add(:base, "Can't check your ability to create project")
gitlabhq committed
564 565
  end

566 567 568 569 570 571 572 573 574 575 576 577 578
  def visibility_level_allowed_by_group
    return if visibility_level_allowed_by_group?

    level_name = Gitlab::VisibilityLevel.level_name(self.visibility_level).downcase
    group_level_name = Gitlab::VisibilityLevel.level_name(self.group.visibility_level).downcase
    self.errors.add(:visibility_level, "#{level_name} is not allowed in a #{group_level_name} group.")
  end

  def visibility_level_allowed_as_fork
    return if visibility_level_allowed_as_fork?

    level_name = Gitlab::VisibilityLevel.level_name(self.visibility_level).downcase
    self.errors.add(:visibility_level, "#{level_name} is not allowed since the fork source project has lower visibility.")
579 580
  end

581 582 583 584 585 586 587 588 589 590
  def check_wiki_path_conflict
    return if path.blank?

    path_to_check = path.ends_with?('.wiki') ? path.chomp('.wiki') : "#{path}.wiki"

    if Project.where(namespace_id: namespace_id, path: path_to_check).exists?
      errors.add(:name, 'has already been taken')
    end
  end

591
  def to_param
592 593 594 595 596
    if persisted? && errors.include?(:path)
      path_was
    else
      path
    end
597 598
  end

599
  # `from` argument can be a Namespace or Project.
600 601 602 603 604 605
  def to_reference(from = nil, full: false)
    if full || cross_namespace_reference?(from)
      path_with_namespace
    elsif cross_project_reference?(from)
      path
    end
606 607 608 609 610 611 612 613
  end

  def to_human_reference(from_project = nil)
    if cross_namespace_reference?(from_project)
      name_with_namespace
    elsif cross_project_reference?(from_project)
      name
    end
614 615
  end

616
  def web_url
617
    Gitlab::Routing.url_helpers.namespace_project_url(self.namespace, self)
618 619
  end

620
  def new_issue_address(author)
621
    return unless Gitlab::IncomingEmail.supports_issue_creation? && author
622

623 624 625 626
    author.ensure_incoming_email_token!

    Gitlab::IncomingEmail.reply_address(
      "#{path_with_namespace}+#{author.incoming_email_token}")
627 628
  end

629
  def build_commit_note(commit)
630
    notes.new(commit_id: commit.id, noteable_type: 'Commit')
gitlabhq committed
631
  end
Nihad Abbasov committed
632

633
  def last_activity
634
    last_event
gitlabhq committed
635 636 637
  end

  def last_activity_date
Andrey Kumanyaev committed
638
    last_activity_at || updated_at
Dmitriy Zaporozhets committed
639
  end
640

641 642 643
  def project_id
    self.id
  end
randx committed
644

645
  def get_issue(issue_id, current_user)
646
    if default_issues_tracker?
647
      IssuesFinder.new(current_user, project_id: id).find_by(iid: issue_id)
648
    else
649
      ExternalIssue.new(issue_id, self)
650 651 652
    end
  end

653
  def issue_exists?(issue_id)
654
    get_issue(issue_id)
655 656
  end

657
  def default_issue_tracker
658
    gitlab_issue_tracker_service || create_gitlab_issue_tracker_service
659 660 661 662 663 664 665 666 667 668
  end

  def issues_tracker
    if external_issue_tracker
      external_issue_tracker
    else
      default_issue_tracker
    end
  end

669 670 671 672
  def issue_reference_pattern
    issues_tracker.reference_pattern
  end

673
  def default_issues_tracker?
674
    !external_issue_tracker
675 676 677
  end

  def external_issue_tracker
678 679 680 681 682 683 684 685 686 687 688 689 690 691 692
    if has_external_issue_tracker.nil? # To populate existing projects
      cache_has_external_issue_tracker
    end

    if has_external_issue_tracker?
      return @external_issue_tracker if defined?(@external_issue_tracker)

      @external_issue_tracker = services.external_issue_trackers.first
    else
      nil
    end
  end

  def cache_has_external_issue_tracker
    update_column(:has_external_issue_tracker, services.external_issue_trackers.any?)
693 694
  end

695 696 697 698
  def has_wiki?
    wiki_enabled? || has_external_wiki?
  end

699 700 701 702 703 704 705 706 707 708 709 710 711 712 713 714
  def external_wiki
    if has_external_wiki.nil?
      cache_has_external_wiki # Populate
    end

    if has_external_wiki
      @external_wiki ||= services.external_wikis.first
    else
      nil
    end
  end

  def cache_has_external_wiki
    update_column(:has_external_wiki, services.external_wikis.any?)
  end

715
  def find_or_initialize_services
716 717
    services_templates = Service.where(template: true)

718
    Service.available_services_names.map do |service_name|
719
      service = find_service(services, service_name)
720

721 722 723
      if service
        service
      else
724 725 726 727
        # We should check if template for the service exists
        template = find_service(services_templates, service_name)

        if template.nil?
728 729
          # If no template, we should create an instance. Ex `build_gitlab_ci_service`
          public_send("build_#{service_name}_service")
730
        else
731
          Service.build_from_template(id, template)
732 733
        end
      end
734 735 736
    end
  end

737 738 739 740
  def find_or_initialize_service(name)
    find_or_initialize_services.find { |service| service.to_param == name }
  end

741 742
  def create_labels
    Label.templates.each do |label|
743
      params = label.attributes.except('id', 'template', 'created_at', 'updated_at')
744
      Labels::FindOrCreateService.new(nil, self, params).execute(skip_authorization: true)
745 746 747
    end
  end

748 749 750
  def find_service(list, name)
    list.find { |service| service.to_param == name }
  end
751

752
  def ci_services
753
    services.where(category: :ci)
754 755 756
  end

  def ci_service
757
    @ci_service ||= ci_services.reorder(nil).find_by(active: true)
758 759
  end

760 761 762 763 764 765 766 767
  def deployment_services
    services.where(category: :deployment)
  end

  def deployment_service
    @deployment_service ||= deployment_services.reorder(nil).find_by(active: true)
  end

Drew Blessing committed
768 769 770 771
  def jira_tracker?
    issues_tracker.to_param == 'jira'
  end

772
  def avatar_type
773 774
    unless self.avatar.image?
      self.errors.add :avatar, 'only images allowed'
775 776 777 778
    end
  end

  def avatar_in_git
779
    repository.avatar
780 781
  end

782
  def avatar_url
783
    if self[:avatar].present?
784 785
      [gitlab_config.url, avatar.url].join
    elsif avatar_in_git
786
      Gitlab::Routing.url_helpers.namespace_project_avatar_url(namespace, self)
787 788 789
    end
  end

790 791 792 793 794
  # For compatibility with old code
  def code
    path
  end

795
  def items_for(entity)
796 797 798 799 800 801 802
    case entity
    when 'issue' then
      issues
    when 'merge_request' then
      merge_requests
    end
  end
803

804
  def send_move_instructions(old_path_with_namespace)
805 806 807
    # New project path needs to be committed to the DB or notification will
    # retrieve stale information
    run_after_commit { NotificationService.new.project_was_moved(self, old_path_with_namespace) }
808
  end
809 810

  def owner
811 812
    if group
      group
813
    else
814
      namespace.try(:owner)
815 816
    end
  end
Dmitriy Zaporozhets committed
817

818 819
  def execute_hooks(data, hooks_scope = :push_hooks)
    hooks.send(hooks_scope).each do |hook|
820
      hook.async_execute(data, hooks_scope.to_s)
821
    end
Dmitriy Zaporozhets committed
822 823
  end

824 825 826
  def execute_services(data, hooks_scope = :push_hooks)
    # Call only service hooks that are active for this scope
    services.send(hooks_scope).each do |service|
827
      service.async_execute(data)
Dmitriy Zaporozhets committed
828 829 830 831
    end
  end

  def valid_repo?
832
    repository.exists?
Dmitriy Zaporozhets committed
833
  rescue
834
    errors.add(:path, 'Invalid repository path')
Dmitriy Zaporozhets committed
835 836 837 838
    false
  end

  def empty_repo?
839
    repository.empty_repo?
Dmitriy Zaporozhets committed
840 841 842
  end

  def repo
843
    repository.raw
Dmitriy Zaporozhets committed
844 845 846
  end

  def url_to_repo
847
    gitlab_shell.url_to_repo(path_with_namespace)
Dmitriy Zaporozhets committed
848 849 850 851 852 853 854
  end

  def namespace_dir
    namespace.try(:path) || ''
  end

  def repo_exists?
855
    @repo_exists ||= repository.exists?
Dmitriy Zaporozhets committed
856 857 858 859
  rescue
    @repo_exists = false
  end

860
  # Branches that are not _exactly_ matched by a protected branch.
Dmitriy Zaporozhets committed
861
  def open_branches
862 863 864 865
    exact_protected_branch_names = protected_branches.reject(&:wildcard?).map(&:name)
    branch_names = repository.branches.map(&:name)
    non_open_branch_names = Set.new(exact_protected_branch_names).intersection(Set.new(branch_names))
    repository.branches.reject { |branch| non_open_branch_names.include? branch.name }
Dmitriy Zaporozhets committed
866 867 868
  end

  def root_ref?(branch)
869
    repository.root_ref == branch
Dmitriy Zaporozhets committed
870 871 872 873 874 875 876
  end

  def ssh_url_to_repo
    url_to_repo
  end

  def http_url_to_repo
Douwe Maan committed
877
    "#{web_url}.git"
Dmitriy Zaporozhets committed
878 879 880
  end

  # Check if current branch name is marked as protected in the system
881
  def protected_branch?(branch_name)
882 883
    return true if empty_repo? && default_branch_protected?

884 885
    @protected_branches ||= self.protected_branches.to_a
    ProtectedBranch.matching(branch_name, protected_branches: @protected_branches).present?
Dmitriy Zaporozhets committed
886
  end
887

888 889
  def user_can_push_to_empty_repo?(user)
    !default_branch_protected? || team.max_member_access(user.id) > Gitlab::Access::DEVELOPER
890 891
  end

892 893 894
  def forked?
    !(forked_project_link.nil? || forked_project_link.forked_from_project.nil?)
  end
895

896 897 898 899
  def personal?
    !group
  end

900
  def rename_repo
901
    path_was = previous_changes['path'].first
902 903 904
    old_path_with_namespace = File.join(namespace_dir, path_was)
    new_path_with_namespace = File.join(namespace_dir, path)

905 906
    Rails.logger.error "Attempting to rename #{old_path_with_namespace} -> #{new_path_with_namespace}"

907 908
    expire_caches_before_rename(old_path_with_namespace)

909
    if has_container_registry_tags?
910 911
      Rails.logger.error "Project #{old_path_with_namespace} cannot be renamed because container registry tags are present"

912
      # we currently doesn't support renaming repository if it contains tags in container registry
913
      raise StandardError.new('Project cannot be renamed, because tags are present in its container registry')
914 915
    end

916
    if gitlab_shell.mv_repository(repository_storage_path, old_path_with_namespace, new_path_with_namespace)
917
      # If repository moved successfully we need to send update instructions to users.
918 919 920
      # However we cannot allow rollback since we moved repository
      # So we basically we mute exceptions in next actions
      begin
921
        gitlab_shell.mv_repository(repository_storage_path, "#{old_path_with_namespace}.wiki", "#{new_path_with_namespace}.wiki")
922
        send_move_instructions(old_path_with_namespace)
923 924 925 926 927

        @old_path_with_namespace = old_path_with_namespace

        SystemHooksService.new.execute_hooks_for(self, :rename)

928
        @repository = nil
929 930
      rescue => e
        Rails.logger.error "Exception renaming #{old_path_with_namespace} -> #{new_path_with_namespace}: #{e}"
Johannes Schleifenbaum committed
931
        # Returning false does not rollback after_* transaction but gives
932 933 934 935
        # us information about failing some of tasks
        false
      end
    else
936 937
      Rails.logger.error "Repository could not be renamed: #{old_path_with_namespace} -> #{new_path_with_namespace}"

938 939
      # if we cannot move namespace directory we should rollback
      # db changes in order to prevent out of sync between db and fs
940
      raise StandardError.new('repository cannot be renamed')
941
    end
942

943 944
    Gitlab::AppLogger.info "Project was renamed: #{old_path_with_namespace} -> #{new_path_with_namespace}"

945 946
    Gitlab::UploadsTransfer.new.rename_project(path_was, path, namespace.full_path)
    Gitlab::PagesTransfer.new.rename_project(path_was, path, namespace.full_path)
947
  end
948

949 950 951 952 953 954
  # Expires various caches before a project is renamed.
  def expire_caches_before_rename(old_path)
    repo = Repository.new(old_path, self)
    wiki = Repository.new("#{old_path}.wiki", self)

    if repo.exists?
955
      repo.before_delete
956 957 958
    end

    if wiki.exists?
959
      wiki.before_delete
960 961 962
    end
  end

963 964
  def hook_attrs(backward: true)
    attrs = {
Kirill Zaitsev committed
965
      name: name,
966
      description: description,
Kirilll Zaitsev committed
967
      web_url: web_url,
968 969 970
      avatar_url: avatar_url,
      git_ssh_url: ssh_url_to_repo,
      git_http_url: http_url_to_repo,
Kirill Zaitsev committed
971
      namespace: namespace.name,
972 973 974
      visibility_level: visibility_level,
      path_with_namespace: path_with_namespace,
      default_branch: default_branch,
Kirill Zaitsev committed
975
    }
976 977 978 979 980 981 982 983 984 985 986 987

    # Backward compatibility
    if backward
      attrs.merge!({
                    homepage: web_url,
                    url: url_to_repo,
                    ssh_url: ssh_url_to_repo,
                    http_url: http_url_to_repo
                  })
    end

    attrs
Kirill Zaitsev committed
988 989
  end

990
  def project_member(user)
991
    project_members.find_by(user_id: user)
992
  end
993 994 995 996

  def default_branch
    @default_branch ||= repository.root_ref if repository.exists?
  end
997 998 999 1000 1001

  def reload_default_branch
    @default_branch = nil
    default_branch
  end
1002

1003 1004 1005
  def visibility_level_field
    visibility_level
  end
1006 1007 1008 1009 1010 1011 1012 1013

  def archive!
    update_attribute(:archived, true)
  end

  def unarchive!
    update_attribute(:archived, false)
  end
1014

1015
  def change_head(branch)
1016
    repository.before_change_head
P.S.V.R committed
1017 1018 1019
    repository.rugged.references.create('HEAD',
                                        "refs/heads/#{branch}",
                                        force: true)
1020
    repository.copy_gitattributes(branch)
1021
    repository.after_change_head
1022 1023
    reload_default_branch
  end
1024 1025 1026 1027

  def forked_from?(project)
    forked? && project == forked_from_project
  end
1028

1029
  def forks_count
1030
    forks.count
1031
  end
1032

1033 1034 1035
  def origin_merge_requests
    merge_requests.where(source_project_id: self.id)
  end
1036 1037

  def create_repository
1038 1039
    # Forked import is handled asynchronously
    unless forked?
1040
      if gitlab_shell.add_repository(repository_storage_path, path_with_namespace)
1041
        repository.after_create
1042 1043
        true
      else
1044
        errors.add(:base, 'Failed to create repository via gitlab-shell')
1045 1046
        false
      end
1047 1048 1049 1050 1051 1052 1053 1054 1055 1056
    end
  end

  def repository_exists?
    !!repository.exists?
  end

  def create_wiki
    ProjectWiki.new(self, self.owner).wiki
    true
1057
  rescue ProjectWiki::CouldNotCreateWikiError
1058
    errors.add(:base, 'Failed create wiki')
1059 1060
    false
  end
1061

Drew Blessing committed
1062 1063 1064 1065
  def jira_tracker_active?
    jira_tracker? && jira_service.active
  end

1066
  def allowed_to_share_with_group?
1067
    !namespace.share_with_group_lock
1068 1069
  end

1070 1071 1072
  def pipeline_for(ref, sha = nil)
    sha ||= commit(ref).try(:sha)

1073
    return unless sha
1074

1075
    pipelines.order(id: :desc).find_by(sha: sha, ref: ref)
1076 1077
  end

1078 1079 1080
  def ensure_pipeline(ref, sha, current_user = nil)
    pipeline_for(ref, sha) ||
      pipelines.create(sha: sha, ref: ref, user: current_user)
1081
  end
1082

1083
  def enable_ci
1084
    project_feature.update_attribute(:builds_access_level, ProjectFeature::ENABLED)
1085
  end
1086

1087 1088 1089 1090 1091 1092 1093 1094
  def shared_runners_available?
    shared_runners_enabled?
  end

  def shared_runners
    shared_runners_available? ? Ci::Runner.shared : Ci::Runner.none
  end

1095
  def any_runners?(&block)
1096
    if runners.active.any?(&block)
1097 1098 1099
      return true
    end

1100
    shared_runners.active.any?(&block)
1101 1102
  end

1103
  def valid_runners_token?(token)
1104
    self.runners_token && ActiveSupport::SecurityUtils.variable_size_secure_compare(token, self.runners_token)
Kamil Trzcinski committed
1105 1106
  end

1107 1108 1109 1110 1111 1112 1113 1114 1115 1116 1117
  def build_coverage_enabled?
    build_coverage_regex.present?
  end

  def build_timeout_in_minutes
    build_timeout / 60
  end

  def build_timeout_in_minutes=(value)
    self.build_timeout = value.to_i * 60
  end
1118

1119 1120 1121
  def open_issues_count
    issues.opened.count
  end
1122

1123
  def visibility_level_allowed_as_fork?(level = self.visibility_level)
Douwe Maan committed
1124
    return true unless forked?
1125

Douwe Maan committed
1126 1127 1128 1129 1130 1131
    # self.forked_from_project will be nil before the project is saved, so
    # we need to go through the relation
    original_project = forked_project_link.forked_from_project
    return true unless original_project

    level <= original_project.visibility_level
1132
  end
1133

1134 1135
  def visibility_level_allowed_by_group?(level = self.visibility_level)
    return true unless group
1136

1137
    level <= group.visibility_level
1138
  end
1139

1140 1141
  def visibility_level_allowed?(level = self.visibility_level)
    visibility_level_allowed_as_fork?(level) && visibility_level_allowed_by_group?(level)
Felipe Artur committed
1142 1143
  end

1144 1145 1146
  def runners_token
    ensure_runners_token!
  end
1147

1148 1149 1150
  def pages_deployed?
    Dir.exist?(public_pages_path)
  end
1151

1152
  def pages_url
1153 1154
    subdomain, _, url_path = full_path.partition('/')

1155 1156
    # The hostname always needs to be in downcased
    # All web servers convert hostname to lowercase
1157
    host = "#{subdomain}.#{Settings.pages.host}".downcase
1158 1159

    # The host in URL always needs to be downcased
1160
    url = Gitlab.config.pages.url.sub(/^https?:\/\//) do |prefix|
1161
      "#{prefix}#{subdomain}."
1162
    end.downcase
1163

1164
    # If the project path is the same as host, we serve it as group page
1165 1166 1167 1168
    return url if host == url_path

    "#{url}/#{url_path}"
  end
1169

1170 1171
  def pages_subdomain
    full_path.partition('/').first
1172
  end
Kamil Trzcinski committed
1173 1174

  def pages_path
1175
    File.join(Settings.pages.path, path_with_namespace)
Kamil Trzcinski committed
1176 1177 1178 1179 1180 1181 1182
  end

  def public_pages_path
    File.join(pages_path, 'public')
  end

  def remove_pages
1183 1184 1185
    # 1. We rename pages to temporary directory
    # 2. We wait 5 minutes, due to NFS caching
    # 3. We asynchronously remove pages with force
Kamil Trzcinski committed
1186
    temp_path = "#{path}.#{SecureRandom.hex}.deleted"
1187

1188 1189
    if Gitlab::PagesTransfer.new.rename_project(path, temp_path, namespace.full_path)
      PagesWorker.perform_in(5.minutes, :remove, namespace.full_path, temp_path)
1190
    end
Kamil Trzcinski committed
1191 1192
  end

1193 1194 1195
  def wiki
    @wiki ||= ProjectWiki.new(self, self.owner)
  end
1196

Josh Frye committed
1197 1198
  def running_or_pending_build_count(force: false)
    Rails.cache.fetch(['projects', id, 'running_or_pending_build_count'], force: force) do
1199 1200 1201
      builds.running_or_pending.count(:all)
    end
  end
1202 1203

  def mark_import_as_failed(error_message)
1204 1205 1206
    original_errors = errors.dup
    sanitized_message = Gitlab::UrlSanitizer.sanitize(error_message)

1207
    import_fail
1208 1209 1210 1211 1212
    update_column(:import_error, sanitized_message)
  rescue ActiveRecord::ActiveRecordError => e
    Rails.logger.error("Error setting import status to failed: #{e.message}. Original error: #{sanitized_message}")
  ensure
    @errors = original_errors
1213
  end
James Lopez committed
1214

1215 1216
  def add_export_job(current_user:)
    job_id = ProjectExportWorker.perform_async(current_user.id, self.id)
1217 1218 1219 1220 1221 1222 1223

    if job_id
      Rails.logger.info "Export job started for project ID #{self.id} with job ID #{job_id}"
    else
      Rails.logger.error "Export job failed to start for project ID #{self.id}"
    end
  end
James Lopez committed
1224 1225

  def export_path
1226
    File.join(Gitlab::ImportExport.storage_path, path_with_namespace)
James Lopez committed
1227
  end
1228 1229 1230 1231 1232 1233 1234 1235 1236

  def export_project_path
    Dir.glob("#{export_path}/*export.tar.gz").max_by { |f| File.ctime(f) }
  end

  def remove_exports
    _, status = Gitlab::Popen.popen(%W(find #{export_path} -not -path #{export_path} -delete))
    status.zero?
  end
1237 1238

  def ensure_dir_exist
1239
    gitlab_shell.add_namespace(repository_storage_path, namespace.full_path)
1240
  end
1241 1242 1243 1244 1245 1246

  def predefined_variables
    [
      { key: 'CI_PROJECT_ID', value: id.to_s, public: true },
      { key: 'CI_PROJECT_NAME', value: path, public: true },
      { key: 'CI_PROJECT_PATH', value: path_with_namespace, public: true },
1247
      { key: 'CI_PROJECT_NAMESPACE', value: namespace.full_path, public: true },
1248 1249 1250 1251 1252 1253 1254 1255 1256 1257 1258
      { key: 'CI_PROJECT_URL', value: web_url, public: true }
    ]
  end

  def container_registry_variables
    return [] unless Gitlab.config.registry.enabled

    variables = [
      { key: 'CI_REGISTRY', value: Gitlab.config.registry.host_port, public: true }
    ]

Kamil Trzcinski committed
1259 1260 1261 1262
    if container_registry_enabled?
      variables << { key: 'CI_REGISTRY_IMAGE', value: container_registry_repository_url, public: true }
    end

1263 1264 1265 1266 1267 1268 1269 1270
    variables
  end

  def secret_variables
    variables.map do |variable|
      { key: variable.key, value: variable.value, public: false }
    end
  end
1271

1272 1273 1274 1275 1276 1277
  def deployment_variables
    return [] unless deployment_service

    deployment_service.predefined_variables
  end

1278 1279 1280 1281 1282 1283 1284 1285 1286 1287
  def append_or_update_attribute(name, value)
    old_values = public_send(name.to_s)

    if Project.reflect_on_association(name).try(:macro) == :has_many && old_values.any?
      update_attribute(name, old_values + value)
    else
      update_attribute(name, value)
    end
  end

1288 1289 1290 1291 1292 1293 1294 1295 1296 1297 1298 1299
  def pushes_since_gc
    Gitlab::Redis.with { |redis| redis.get(pushes_since_gc_redis_key).to_i }
  end

  def increment_pushes_since_gc
    Gitlab::Redis.with { |redis| redis.incr(pushes_since_gc_redis_key) }
  end

  def reset_pushes_since_gc
    Gitlab::Redis.with { |redis| redis.del(pushes_since_gc_redis_key) }
  end

Douwe Maan committed
1300
  def route_map_for(commit_sha)
1301 1302
    @route_maps_by_commit ||= Hash.new do |h, sha|
      h[sha] = begin
Douwe Maan committed
1303
        data = repository.route_map_for(sha)
1304 1305
        next unless data

Douwe Maan committed
1306 1307 1308
        Gitlab::RouteMap.new(data)
      rescue Gitlab::RouteMap::FormatError
        nil
1309 1310 1311 1312 1313 1314 1315
      end
    end

    @route_maps_by_commit[commit_sha]
  end

  def public_path_for_source_path(path, commit_sha)
Douwe Maan committed
1316
    map = route_map_for(commit_sha)
1317 1318
    return unless map

Douwe Maan committed
1319
    map.public_path_for_source_path(path)
1320 1321
  end

1322 1323 1324 1325 1326 1327 1328 1329 1330 1331 1332 1333
  def parent
    namespace
  end

  def parent_changed?
    namespace_id_changed?
  end

  alias_method :name_with_namespace, :full_name
  alias_method :human_name, :full_name
  alias_method :path_with_namespace, :full_path

1334 1335
  private

1336
  def cross_namespace_reference?(from)
1337 1338 1339 1340 1341
    case from
    when Project
      namespace != from.namespace
    when Namespace
      namespace != from
1342 1343 1344
    end
  end

1345
  # Check if a reference is being done cross-project
1346 1347 1348 1349
  def cross_project_reference?(from)
    return true if from.is_a?(Namespace)

    from && self != from
1350 1351
  end

1352 1353 1354 1355
  def pushes_since_gc_redis_key
    "projects/#{id}/pushes_since_gc"
  end

1356
  def default_branch_protected?
1357 1358
    current_application_settings.default_branch_protection == Gitlab::Access::PROTECTION_FULL ||
      current_application_settings.default_branch_protection == Gitlab::Access::PROTECTION_DEV_CAN_MERGE
1359 1360
  end

1361 1362 1363 1364 1365 1366 1367
  # Similar to the normal callbacks that hook into the life cycle of an
  # Active Record object, you can also define callbacks that get triggered
  # when you add an object to an association collection. If any of these
  # callbacks throw an exception, the object will not be added to the
  # collection. Before you add a new board to the boards collection if you
  # already have 1, 2, or n it will fail, but it if you have 0 that is lower
  # than the number of permitted boards per project it won't fail.
1368
  def validate_board_limit(board)
1369
    raise BoardLimitExceeded, 'Number of permitted boards exceeded' if boards.size >= NUMBER_OF_PERMITTED_BOARDS
1370
  end
1371

1372 1373 1374 1375
  def update_project_statistics
    stats = statistics || build_statistics
    stats.update(namespace_id: namespace_id)
  end
1376 1377 1378 1379 1380 1381 1382 1383 1384 1385 1386 1387 1388 1389 1390

  def check_pending_delete
    return if valid_attribute?(:name) && valid_attribute?(:path)
    return unless pending_delete_twin

    %i[route route.path name path].each do |error|
      errors.delete(error)
    end

    errors.add(:base, "The project is still being deleted. Please try again later.")
  end

  def pending_delete_twin
    return false unless path

1391
    Project.unscoped.where(pending_delete: true).find_by_full_path(path_with_namespace)
1392
  end
gitlabhq committed
1393
end