BigW Consortium Gitlab

project.rb 41.3 KB
Newer Older
1 2
require 'carrierwave/orm/activerecord'

gitlabhq committed
3
class Project < ActiveRecord::Base
4
  include Gitlab::ConfigHelper
5
  include Gitlab::ShellAdapter
6
  include Gitlab::VisibilityLevel
7
  include Gitlab::CurrentSettings
8
  include AccessRequestable
9
  include CacheMarkdownField
10 11
  include Referable
  include Sortable
12
  include AfterCommitQueue
13
  include CaseSensitivity
14
  include TokenAuthenticatable
15
  include ValidAttribute
16
  include ProjectFeaturesCompatibility
17
  include SelectForProjectAuthorization
18
  include Routable
Robert Speicher committed
19

20
  extend Gitlab::ConfigHelper
21

22 23
  class BoardLimitExceeded < StandardError; end

24
  NUMBER_OF_PERMITTED_BOARDS = 1
Jared Szechy committed
25 26
  UNKNOWN_IMPORT_URL = 'http://unknown.git'

27 28
  cache_markdown_field :description, pipeline: :description

29 30
  delegate :feature_available?, :builds_enabled?, :wiki_enabled?,
           :merge_requests_enabled?, :issues_enabled?, to: :project_feature,
31
                                                       allow_nil: true
32

33
  default_value_for :archived, false
34
  default_value_for :visibility_level, gitlab_config_features.visibility_level
35
  default_value_for :container_registry_enabled, gitlab_config_features.container_registry
36
  default_value_for(:repository_storage) { current_application_settings.pick_repository_storage }
37
  default_value_for(:shared_runners_enabled) { current_application_settings.shared_runners_enabled }
38 39 40 41 42
  default_value_for :issues_enabled, gitlab_config_features.issues
  default_value_for :merge_requests_enabled, gitlab_config_features.merge_requests
  default_value_for :builds_enabled, gitlab_config_features.builds
  default_value_for :wiki_enabled, gitlab_config_features.wiki
  default_value_for :snippets_enabled, gitlab_config_features.snippets
43
  default_value_for :only_allow_merge_if_all_discussions_are_resolved, false
44

45
  after_create :ensure_dir_exist
46
  after_create :create_project_feature, unless: :project_feature
47
  after_save :ensure_dir_exist, if: :namespace_id_changed?
48
  after_save :update_project_statistics, if: :namespace_id_changed?
49

50 51
  # set last_activity_at to the same as created_at
  after_create :set_last_activity_at
52
  def set_last_activity_at
53
    update_column(:last_activity_at, self.created_at)
54 55
  end

Kamil Trzcinski committed
56 57
  after_destroy :remove_pages

58
  # update visibility_level of forks
59 60 61 62 63 64 65 66 67 68 69 70
  after_update :update_forks_visibility_level
  def update_forks_visibility_level
    return unless visibility_level < visibility_level_was

    forks.each do |forked_project|
      if forked_project.visibility_level > visibility_level
        forked_project.visibility_level = visibility_level
        forked_project.save!
      end
    end
  end

71 72
  after_validation :check_pending_delete

73
  ActsAsTaggableOn.strict_case_match = true
74
  acts_as_taggable_on :tags
75

76
  attr_accessor :new_default_branch
77
  attr_accessor :old_path_with_namespace
78

79 80
  alias_attribute :title, :name

81
  # Relations
82
  belongs_to :creator, class_name: 'User'
83
  belongs_to :group, -> { where(type: 'Group') }, foreign_key: 'namespace_id'
84
  belongs_to :namespace
85

86
  has_one :last_event, -> {order 'events.created_at DESC'}, class_name: 'Event'
87
  has_many :boards, before_add: :validate_board_limit, dependent: :destroy
88

89
  # Project services
90
  has_one :campfire_service, dependent: :destroy
Kirilll Zaitsev committed
91
  has_one :drone_ci_service, dependent: :destroy
92
  has_one :emails_on_push_service, dependent: :destroy
93
  has_one :builds_email_service, dependent: :destroy
94
  has_one :pipelines_email_service, dependent: :destroy
Aorimn committed
95
  has_one :irker_service, dependent: :destroy
96
  has_one :pivotaltracker_service, dependent: :destroy
97
  has_one :hipchat_service, dependent: :destroy
98
  has_one :flowdock_service, dependent: :destroy
99
  has_one :assembla_service, dependent: :destroy
Jeremy committed
100
  has_one :asana_service, dependent: :destroy
101
  has_one :gemnasium_service, dependent: :destroy
102
  has_one :mattermost_slash_commands_service, dependent: :destroy
103
  has_one :mattermost_service, dependent: :destroy
104
  has_one :slack_slash_commands_service, dependent: :destroy
105
  has_one :slack_service, dependent: :destroy
106
  has_one :buildkite_service, dependent: :destroy
107
  has_one :bamboo_service, dependent: :destroy
108
  has_one :teamcity_service, dependent: :destroy
109
  has_one :pushover_service, dependent: :destroy
110 111
  has_one :jira_service, dependent: :destroy
  has_one :redmine_service, dependent: :destroy
112
  has_one :custom_issue_tracker_service, dependent: :destroy
113
  has_one :bugzilla_service, dependent: :destroy
114
  has_one :gitlab_issue_tracker_service, dependent: :destroy, inverse_of: :project
115
  has_one :external_wiki_service, dependent: :destroy
116
  has_one :kubernetes_service, dependent: :destroy, inverse_of: :project
117

118 119 120 121 122
  has_one  :forked_project_link,  dependent: :destroy, foreign_key: "forked_to_project_id"
  has_one  :forked_from_project,  through:   :forked_project_link

  has_many :forked_project_links, foreign_key: "forked_from_project_id"
  has_many :forks,                through:     :forked_project_links, source: :forked_to_project
123

124
  # Merge Requests for target project should be removed with it
125
  has_many :merge_requests,     dependent: :destroy, foreign_key: 'target_project_id'
126
  has_many :issues,             dependent: :destroy
127
  has_many :labels,             dependent: :destroy, class_name: 'ProjectLabel'
128 129
  has_many :services,           dependent: :destroy
  has_many :events,             dependent: :destroy
130 131
  has_many :milestones,         dependent: :destroy
  has_many :notes,              dependent: :destroy
132 133
  has_many :snippets,           dependent: :destroy, class_name: 'ProjectSnippet'
  has_many :hooks,              dependent: :destroy, class_name: 'ProjectHook'
134
  has_many :protected_branches, dependent: :destroy
135

136
  has_many :project_authorizations
137
  has_many :authorized_users, through: :project_authorizations, source: :user, class_name: 'User'
138
  has_many :project_members, -> { where(requested_at: nil) }, dependent: :destroy, as: :source
139
  alias_method :members, :project_members
140 141 142 143
  has_many :users, through: :project_members

  has_many :requesters, -> { where.not(requested_at: nil) }, dependent: :destroy, as: :source, class_name: 'ProjectMember'

144 145
  has_many :deploy_keys_projects, dependent: :destroy
  has_many :deploy_keys, through: :deploy_keys_projects
Ciro Santilli committed
146 147
  has_many :users_star_projects, dependent: :destroy
  has_many :starrers, through: :users_star_projects, source: :user
148
  has_many :releases, dependent: :destroy
149 150
  has_many :lfs_objects_projects, dependent: :destroy
  has_many :lfs_objects, through: :lfs_objects_projects
151 152
  has_many :project_group_links, dependent: :destroy
  has_many :invited_groups, through: :project_group_links, source: :group
Kamil Trzcinski committed
153
  has_many :pages_domains, dependent: :destroy
154
  has_many :todos, dependent: :destroy
155
  has_many :notification_settings, dependent: :destroy, as: :source
156

157
  has_one :import_data, dependent: :destroy, class_name: "ProjectImportData"
158
  has_one :project_feature, dependent: :destroy
159
  has_one :statistics, class_name: 'ProjectStatistics', dependent: :delete
160

161
  has_many :commit_statuses, dependent: :destroy, foreign_key: :gl_project_id
162
  has_many :pipelines, dependent: :destroy, class_name: 'Ci::Pipeline', foreign_key: :gl_project_id
163 164 165 166 167
  has_many :builds, class_name: 'Ci::Build', foreign_key: :gl_project_id # the builds are created from the commit_statuses
  has_many :runner_projects, dependent: :destroy, class_name: 'Ci::RunnerProject', foreign_key: :gl_project_id
  has_many :runners, through: :runner_projects, source: :runner, class_name: 'Ci::Runner'
  has_many :variables, dependent: :destroy, class_name: 'Ci::Variable', foreign_key: :gl_project_id
  has_many :triggers, dependent: :destroy, class_name: 'Ci::Trigger', foreign_key: :gl_project_id
168 169
  has_many :environments, dependent: :destroy
  has_many :deployments, dependent: :destroy
170

171
  accepts_nested_attributes_for :variables, allow_destroy: true
172
  accepts_nested_attributes_for :project_feature
173

174
  delegate :name, to: :owner, allow_nil: true, prefix: true
175
  delegate :members, to: :team, prefix: true
176
  delegate :add_user, to: :team
177
  delegate :add_guest, :add_reporter, :add_developer, :add_master, to: :team
178

Andrey Kumanyaev committed
179
  # Validations
180
  validates :creator, presence: true, on: :create
181
  validates :description, length: { maximum: 2000 }, allow_blank: true
182 183
  validates :name,
    presence: true,
184
    length: { maximum: 255 },
185
    format: { with: Gitlab::Regex.project_name_regex,
186
              message: Gitlab::Regex.project_name_regex_message }
187 188
  validates :path,
    presence: true,
189
    project_path: true,
190
    length: { maximum: 255 },
191 192
    format: { with: Gitlab::Regex.project_path_regex,
              message: Gitlab::Regex.project_path_regex_message }
193
  validates :namespace, presence: true
194 195
  validates_uniqueness_of :name, scope: :namespace_id
  validates_uniqueness_of :path, scope: :namespace_id
196
  validates :import_url, addressable_url: true, if: :external_import?
197
  validates :star_count, numericality: { greater_than_or_equal_to: 0 }
198
  validate :check_limit, on: :create
199
  validate :avatar_type,
200
    if: ->(project) { project.avatar.present? && project.avatar_changed? }
201
  validates :avatar, file_size: { maximum: 200.kilobytes.to_i }
202
  validate :visibility_level_allowed_by_group
Douwe Maan committed
203
  validate :visibility_level_allowed_as_fork
204
  validate :check_wiki_path_conflict
205 206 207
  validates :repository_storage,
    presence: true,
    inclusion: { in: ->(_object) { Gitlab.config.repositories.storages.keys } }
208

209
  add_authentication_token_field :runners_token
210
  before_save :ensure_runners_token
211

212
  mount_uploader :avatar, AvatarUploader
Andrey Kumanyaev committed
213

214
  # Scopes
215 216
  default_scope { where(pending_delete: false) }

217 218
  scope :with_deleted, -> { unscope(where: :pending_delete) }

219
  scope :sorted_by_activity, -> { reorder(last_activity_at: :desc) }
220 221
  scope :sorted_by_stars, -> { reorder('projects.star_count DESC') }

222
  scope :in_namespace, ->(namespace_ids) { where(namespace_id: namespace_ids) }
223
  scope :personal, ->(user) { where(namespace_id: user.namespace_id) }
224
  scope :joined, ->(user) { where('namespace_id != ?', user.namespace_id) }
225
  scope :visible_to_user, ->(user) { where(id: user.authorized_projects.select(:id).reorder(nil)) }
226
  scope :non_archived, -> { where(archived: false) }
227
  scope :for_milestones, ->(ids) { joins(:milestones).where('milestones.id' => ids).distinct }
228 229
  scope :with_push, -> { joins(:events).where('events.action = ?', Event::PUSHED) }

230
  scope :with_project_feature, -> { joins('LEFT JOIN project_features ON projects.id = project_features.project_id') }
231
  scope :with_statistics, -> { includes(:statistics) }
232
  scope :with_shared_runners, -> { where(shared_runners_enabled: true) }
233 234 235 236 237 238
  scope :inside_path, ->(path) do
    # We need routes alias rs for JOIN so it does not conflict with
    # includes(:route) which we use in ProjectsFinder.
    joins("INNER JOIN routes rs ON rs.source_id = projects.id AND rs.source_type = 'Project'").
      where('rs.path LIKE ?', "#{path}/%")
  end
239 240 241 242 243 244 245 246 247 248 249 250 251 252 253 254 255 256 257 258 259 260 261 262 263 264 265 266 267 268 269

  # "enabled" here means "not disabled". It includes private features!
  scope :with_feature_enabled, ->(feature) {
    access_level_attribute = ProjectFeature.access_level_attribute(feature)
    with_project_feature.where(project_features: { access_level_attribute => [nil, ProjectFeature::PRIVATE, ProjectFeature::ENABLED] })
  }

  # Picks a feature where the level is exactly that given.
  scope :with_feature_access_level, ->(feature, level) {
    access_level_attribute = ProjectFeature.access_level_attribute(feature)
    with_project_feature.where(project_features: { access_level_attribute => level })
  }

  scope :with_builds_enabled, -> { with_feature_enabled(:builds) }
  scope :with_issues_enabled, -> { with_feature_enabled(:issues) }

  # project features may be "disabled", "internal" or "enabled". If "internal",
  # they are only available to team members. This scope returns projects where
  # the feature is either enabled, or internal with permission for the user.
  def self.with_feature_available_for_user(feature, user)
    return with_feature_enabled(feature) if user.try(:admin?)

    unconditional = with_feature_access_level(feature, [nil, ProjectFeature::ENABLED])
    return unconditional if user.nil?

    conditional = with_feature_access_level(feature, ProjectFeature::PRIVATE)
    authorized = user.authorized_projects.merge(conditional.reorder(nil))

    union = Gitlab::SQL::Union.new([unconditional.select(:id), authorized.select(:id)])
    where(arel_table[:id].in(Arel::Nodes::SqlLiteral.new(union.to_sql)))
  end
270

271 272
  scope :active, -> { joins(:issues, :notes, :merge_requests).order('issues.created_at, notes.created_at, merge_requests.created_at DESC') }
  scope :abandoned, -> { where('projects.last_activity_at < ?', 6.months.ago) }
273

274 275
  scope :excluding_project, ->(project) { where.not(id: project) }

276 277
  state_machine :import_status, initial: :none do
    event :import_start do
278
      transition [:none, :finished] => :started
279 280 281
    end

    event :import_finish do
282
      transition started: :finished
283 284 285
    end

    event :import_fail do
286
      transition started: :failed
287 288 289
    end

    event :import_retry do
290
      transition failed: :started
291 292 293 294
    end

    state :started
    state :finished
295 296
    state :failed

297
    after_transition any => :finished, do: :reset_cache_and_import_attrs
298 299
  end

Andrey Kumanyaev committed
300
  class << self
301 302 303 304 305 306 307
    # Searches for a list of projects based on the query given in `query`.
    #
    # On PostgreSQL this method uses "ILIKE" to perform a case-insensitive
    # search. On MySQL a regular "LIKE" is used as it's already
    # case-insensitive.
    #
    # query - The search query as a String.
308
    def search(query)
309
      ptable  = arel_table
310 311 312 313 314 315 316 317 318
      ntable  = Namespace.arel_table
      pattern = "%#{query}%"

      projects = select(:id).where(
        ptable[:path].matches(pattern).
          or(ptable[:name].matches(pattern)).
          or(ptable[:description].matches(pattern))
      )

319 320 321 322 323 324
      # We explicitly remove any eager loading clauses as they're:
      #
      # 1. Not needed by this query
      # 2. Combined with .joins(:namespace) lead to all columns from the
      #    projects & namespaces tables being selected, leading to a SQL error
      #    due to the columns of all UNION'd queries no longer being the same.
325
      namespaces = select(:id).
326
        except(:includes).
327 328 329 330 331 332
        joins(:namespace).
        where(ntable[:name].matches(pattern))

      union = Gitlab::SQL::Union.new([projects, namespaces])

      where("projects.id IN (#{union.to_sql})")
Andrey Kumanyaev committed
333
    end
334

335
    def search_by_visibility(level)
Josh Frye committed
336
      where(visibility_level: Gitlab::VisibilityLevel.const_get(level.upcase))
337 338
    end

339
    def search_by_title(query)
340 341 342 343
      pattern = "%#{query}%"
      table   = Project.arel_table

      non_archived.where(table[:name].matches(pattern))
344 345
    end

346 347 348
    def visibility_levels
      Gitlab::VisibilityLevel.options
    end
349 350

    def sort(method)
351 352 353 354
      if method == 'storage_size_desc'
        # storage_size is a joined column so we need to
        # pass a string to avoid AR adding the table name
        reorder('project_statistics.storage_size DESC, projects.id DESC')
355 356
      else
        order_by(method)
357 358
      end
    end
359 360 361

    def reference_pattern
      name_pattern = Gitlab::Regex::NAMESPACE_REGEX_STR
362 363 364 365 366

      %r{
        ((?<namespace>#{name_pattern})\/)?
        (?<project>#{name_pattern})
      }x
367
    end
368

369 370 371
    def trending
      joins('INNER JOIN trending_projects ON projects.id = trending_projects.project_id').
        reorder('trending_projects.id ASC')
372
    end
373 374 375 376 377 378

    def cached_count
      Rails.cache.fetch('total_project_count', expires_in: 5.minutes) do
        Project.count
      end
    end
379 380

    def group_ids
381
      joins(:namespace).where(namespaces: { type: 'Group' }).select(:namespace_id)
382
    end
383 384
  end

385
  def lfs_enabled?
386
    return namespace.lfs_enabled? if self[:lfs_enabled].nil?
387

388
    self[:lfs_enabled] && Gitlab.config.lfs.enabled
389 390
  end

391 392
  def repository_storage_path
    Gitlab.config.repositories.storages[repository_storage]
393 394
  end

395
  def team
396
    @team ||= ProjectTeam.new(self)
397 398 399
  end

  def repository
400
    @repository ||= Repository.new(path_with_namespace, self)
401 402
  end

403 404 405 406
  def container_registry_path_with_namespace
    path_with_namespace.downcase
  end

407
  def container_registry_repository
Kamil Trzcinski committed
408 409
    return unless Gitlab.config.registry.enabled

410
    @container_registry_repository ||= begin
411
      token = Auth::ContainerRegistryAuthenticationService.full_access_token(container_registry_path_with_namespace)
412
      url = Gitlab.config.registry.api_url
413 414
      host_port = Gitlab.config.registry.host_port
      registry = ContainerRegistry::Registry.new(url, token: token, path: host_port)
415
      registry.repository(container_registry_path_with_namespace)
416
    end
417 418
  end

419
  def container_registry_repository_url
Kamil Trzcinski committed
420
    if Gitlab.config.registry.enabled
421
      "#{Gitlab.config.registry.host_port}/#{container_registry_path_with_namespace}"
422
    end
423 424
  end

425
  def has_container_registry_tags?
Kamil Trzcinski committed
426 427 428
    return unless container_registry_repository

    container_registry_repository.tags.any?
429 430
  end

431 432
  def commit(ref = 'HEAD')
    repository.commit(ref)
433 434
  end

435
  # ref can't be HEAD, can only be branch/tag name or SHA
436
  def latest_successful_builds_for(ref = default_branch)
437
    latest_pipeline = pipelines.latest_successful_for(ref)
438 439 440 441 442 443

    if latest_pipeline
      latest_pipeline.builds.latest.with_artifacts
    else
      builds.none
    end
444 445
  end

446
  def merge_base_commit(first_commit_id, second_commit_id)
Douwe Maan committed
447 448
    sha = repository.merge_base(first_commit_id, second_commit_id)
    repository.commit(sha) if sha
449 450
  end

451
  def saved?
452
    id && persisted?
453 454
  end

455
  def add_import_job
456
    if forked?
457 458
      job_id = RepositoryForkWorker.perform_async(id, forked_from_project.repository_storage_path,
                                                  forked_from_project.path_with_namespace,
459
                                                  self.namespace.full_path)
460
    else
461 462 463 464 465 466 467
      job_id = RepositoryImportWorker.perform_async(self.id)
    end

    if job_id
      Rails.logger.info "Import job started for #{path_with_namespace} with job ID #{job_id}"
    else
      Rails.logger.error "Import job failed to start for #{path_with_namespace}"
468
    end
469 470
  end

471
  def reset_cache_and_import_attrs
472 473
    ProjectCacheWorker.perform_async(self.id)

474
    self.import_data&.destroy
475 476
  end

477
  def import_url=(value)
478 479
    return super(value) unless Gitlab::UrlSanitizer.valid?(value)

480
    import_url = Gitlab::UrlSanitizer.new(value)
James Lopez committed
481
    super(import_url.sanitized_url)
482
    create_or_update_import_data(credentials: import_url.credentials)
483 484 485
  end

  def import_url
486
    if import_data && super.present?
487
      import_url = Gitlab::UrlSanitizer.new(super, credentials: import_data.credentials)
James Lopez committed
488 489 490
      import_url.full_url
    else
      super
491 492
    end
  end
493

James Lopez committed
494 495 496 497
  def valid_import_url?
    valid? || errors.messages[:import_url].nil?
  end

498
  def create_or_update_import_data(data: nil, credentials: nil)
499
    return unless import_url.present? && valid_import_url?
500

James Lopez committed
501
    project_import_data = import_data || build_import_data
502 503 504 505
    if data
      project_import_data.data ||= {}
      project_import_data.data = project_import_data.data.merge(data)
    end
506 507 508 509
    if credentials
      project_import_data.credentials ||= {}
      project_import_data.credentials = project_import_data.credentials.merge(credentials)
    end
510 511

    project_import_data.save
512
  end
513

514
  def import?
515
    external_import? || forked? || gitlab_project_import?
516 517
  end

518 519 520 521
  def no_import?
    import_status == 'none'
  end

522
  def external_import?
523 524 525
    import_url.present?
  end

526
  def imported?
527 528 529 530 531 532 533 534 535 536 537 538 539
    import_finished?
  end

  def import_in_progress?
    import? && import_status == 'started'
  end

  def import_failed?
    import_status == 'failed'
  end

  def import_finished?
    import_status == 'finished'
540 541
  end

542
  def safe_import_url
543
    Gitlab::UrlSanitizer.new(import_url).masked_url
544 545
  end

546 547 548 549
  def gitlab_project_import?
    import_type == 'gitlab_project'
  end

550 551 552 553
  def gitea_import?
    import_type == 'gitea'
  end

554
  def check_limit
555
    unless creator.can_create_project? or namespace.kind == 'group'
556 557 558
      projects_limit = creator.projects_limit

      if projects_limit == 0
559
        self.errors.add(:limit_reached, "Personal project creation is not allowed. Please contact your administrator with questions")
560
      else
561
        self.errors.add(:limit_reached, "Your project limit is #{projects_limit} projects! Please contact your administrator to increase it")
562
      end
563 564
    end
  rescue
565
    self.errors.add(:base, "Can't check your ability to create project")
gitlabhq committed
566 567
  end

568 569 570 571 572 573 574 575 576 577 578 579 580
  def visibility_level_allowed_by_group
    return if visibility_level_allowed_by_group?

    level_name = Gitlab::VisibilityLevel.level_name(self.visibility_level).downcase
    group_level_name = Gitlab::VisibilityLevel.level_name(self.group.visibility_level).downcase
    self.errors.add(:visibility_level, "#{level_name} is not allowed in a #{group_level_name} group.")
  end

  def visibility_level_allowed_as_fork
    return if visibility_level_allowed_as_fork?

    level_name = Gitlab::VisibilityLevel.level_name(self.visibility_level).downcase
    self.errors.add(:visibility_level, "#{level_name} is not allowed since the fork source project has lower visibility.")
581 582
  end

583 584 585 586 587 588 589 590 591 592
  def check_wiki_path_conflict
    return if path.blank?

    path_to_check = path.ends_with?('.wiki') ? path.chomp('.wiki') : "#{path}.wiki"

    if Project.where(namespace_id: namespace_id, path: path_to_check).exists?
      errors.add(:name, 'has already been taken')
    end
  end

593
  def to_param
594 595 596 597 598
    if persisted? && errors.include?(:path)
      path_was
    else
      path
    end
599 600
  end

601
  # `from` argument can be a Namespace or Project.
602 603 604 605 606 607
  def to_reference(from = nil, full: false)
    if full || cross_namespace_reference?(from)
      path_with_namespace
    elsif cross_project_reference?(from)
      path
    end
608 609 610 611 612 613 614 615
  end

  def to_human_reference(from_project = nil)
    if cross_namespace_reference?(from_project)
      name_with_namespace
    elsif cross_project_reference?(from_project)
      name
    end
616 617
  end

618
  def web_url
619
    Gitlab::Routing.url_helpers.namespace_project_url(self.namespace, self)
620 621
  end

622
  def new_issue_address(author)
623
    return unless Gitlab::IncomingEmail.supports_issue_creation? && author
624

625 626 627 628
    author.ensure_incoming_email_token!

    Gitlab::IncomingEmail.reply_address(
      "#{path_with_namespace}+#{author.incoming_email_token}")
629 630
  end

631
  def build_commit_note(commit)
632
    notes.new(commit_id: commit.id, noteable_type: 'Commit')
gitlabhq committed
633
  end
Nihad Abbasov committed
634

635
  def last_activity
636
    last_event
gitlabhq committed
637 638 639
  end

  def last_activity_date
Andrey Kumanyaev committed
640
    last_activity_at || updated_at
Dmitriy Zaporozhets committed
641
  end
642

643 644 645
  def project_id
    self.id
  end
randx committed
646

647
  def get_issue(issue_id, current_user)
648
    if default_issues_tracker?
649
      IssuesFinder.new(current_user, project_id: id).find_by(iid: issue_id)
650
    else
651
      ExternalIssue.new(issue_id, self)
652 653 654
    end
  end

655
  def issue_exists?(issue_id)
656
    get_issue(issue_id)
657 658
  end

659
  def default_issue_tracker
660
    gitlab_issue_tracker_service || create_gitlab_issue_tracker_service
661 662 663 664 665 666 667 668 669 670
  end

  def issues_tracker
    if external_issue_tracker
      external_issue_tracker
    else
      default_issue_tracker
    end
  end

671 672 673 674
  def issue_reference_pattern
    issues_tracker.reference_pattern
  end

675
  def default_issues_tracker?
676
    !external_issue_tracker
677 678 679
  end

  def external_issue_tracker
680 681 682 683 684 685 686 687 688 689 690 691 692 693 694
    if has_external_issue_tracker.nil? # To populate existing projects
      cache_has_external_issue_tracker
    end

    if has_external_issue_tracker?
      return @external_issue_tracker if defined?(@external_issue_tracker)

      @external_issue_tracker = services.external_issue_trackers.first
    else
      nil
    end
  end

  def cache_has_external_issue_tracker
    update_column(:has_external_issue_tracker, services.external_issue_trackers.any?)
695 696
  end

697 698 699 700
  def has_wiki?
    wiki_enabled? || has_external_wiki?
  end

701 702 703 704 705 706 707 708 709 710 711 712 713 714 715 716
  def external_wiki
    if has_external_wiki.nil?
      cache_has_external_wiki # Populate
    end

    if has_external_wiki
      @external_wiki ||= services.external_wikis.first
    else
      nil
    end
  end

  def cache_has_external_wiki
    update_column(:has_external_wiki, services.external_wikis.any?)
  end

717
  def find_or_initialize_services
718 719
    services_templates = Service.where(template: true)

720
    Service.available_services_names.map do |service_name|
721
      service = find_service(services, service_name)
722

723 724 725
      if service
        service
      else
726 727 728 729
        # We should check if template for the service exists
        template = find_service(services_templates, service_name)

        if template.nil?
730 731
          # If no template, we should create an instance. Ex `build_gitlab_ci_service`
          public_send("build_#{service_name}_service")
732
        else
733
          Service.build_from_template(id, template)
734 735
        end
      end
736 737 738
    end
  end

739 740 741 742
  def find_or_initialize_service(name)
    find_or_initialize_services.find { |service| service.to_param == name }
  end

743 744
  def create_labels
    Label.templates.each do |label|
745
      params = label.attributes.except('id', 'template', 'created_at', 'updated_at')
746
      Labels::FindOrCreateService.new(nil, self, params).execute(skip_authorization: true)
747 748 749
    end
  end

750 751 752
  def find_service(list, name)
    list.find { |service| service.to_param == name }
  end
753

754
  def ci_services
755
    services.where(category: :ci)
756 757 758
  end

  def ci_service
759
    @ci_service ||= ci_services.reorder(nil).find_by(active: true)
760 761
  end

762 763 764 765 766 767 768 769
  def deployment_services
    services.where(category: :deployment)
  end

  def deployment_service
    @deployment_service ||= deployment_services.reorder(nil).find_by(active: true)
  end

Drew Blessing committed
770 771 772 773
  def jira_tracker?
    issues_tracker.to_param == 'jira'
  end

774
  def avatar_type
775 776
    unless self.avatar.image?
      self.errors.add :avatar, 'only images allowed'
777 778 779 780
    end
  end

  def avatar_in_git
781
    repository.avatar
782 783
  end

784
  def avatar_url
785
    if self[:avatar].present?
786 787
      [gitlab_config.url, avatar.url].join
    elsif avatar_in_git
788
      Gitlab::Routing.url_helpers.namespace_project_avatar_url(namespace, self)
789 790 791
    end
  end

792 793 794 795 796
  # For compatibility with old code
  def code
    path
  end

797
  def items_for(entity)
798 799 800 801 802 803 804
    case entity
    when 'issue' then
      issues
    when 'merge_request' then
      merge_requests
    end
  end
805

806
  def send_move_instructions(old_path_with_namespace)
807 808 809
    # New project path needs to be committed to the DB or notification will
    # retrieve stale information
    run_after_commit { NotificationService.new.project_was_moved(self, old_path_with_namespace) }
810
  end
811 812

  def owner
813 814
    if group
      group
815
    else
816
      namespace.try(:owner)
817 818
    end
  end
Dmitriy Zaporozhets committed
819

820 821
  def execute_hooks(data, hooks_scope = :push_hooks)
    hooks.send(hooks_scope).each do |hook|
822
      hook.async_execute(data, hooks_scope.to_s)
823
    end
Dmitriy Zaporozhets committed
824 825
  end

826 827 828
  def execute_services(data, hooks_scope = :push_hooks)
    # Call only service hooks that are active for this scope
    services.send(hooks_scope).each do |service|
829
      service.async_execute(data)
Dmitriy Zaporozhets committed
830 831 832 833
    end
  end

  def valid_repo?
834
    repository.exists?
Dmitriy Zaporozhets committed
835
  rescue
836
    errors.add(:path, 'Invalid repository path')
Dmitriy Zaporozhets committed
837 838 839 840
    false
  end

  def empty_repo?
841
    repository.empty_repo?
Dmitriy Zaporozhets committed
842 843 844
  end

  def repo
845
    repository.raw
Dmitriy Zaporozhets committed
846 847 848
  end

  def url_to_repo
849
    gitlab_shell.url_to_repo(path_with_namespace)
Dmitriy Zaporozhets committed
850 851 852 853 854 855 856
  end

  def namespace_dir
    namespace.try(:path) || ''
  end

  def repo_exists?
857
    @repo_exists ||= repository.exists?
Dmitriy Zaporozhets committed
858 859 860 861
  rescue
    @repo_exists = false
  end

862
  # Branches that are not _exactly_ matched by a protected branch.
Dmitriy Zaporozhets committed
863
  def open_branches
864 865 866 867
    exact_protected_branch_names = protected_branches.reject(&:wildcard?).map(&:name)
    branch_names = repository.branches.map(&:name)
    non_open_branch_names = Set.new(exact_protected_branch_names).intersection(Set.new(branch_names))
    repository.branches.reject { |branch| non_open_branch_names.include? branch.name }
Dmitriy Zaporozhets committed
868 869 870
  end

  def root_ref?(branch)
871
    repository.root_ref == branch
Dmitriy Zaporozhets committed
872 873 874 875 876 877 878
  end

  def ssh_url_to_repo
    url_to_repo
  end

  def http_url_to_repo
Douwe Maan committed
879
    "#{web_url}.git"
Dmitriy Zaporozhets committed
880 881 882
  end

  # Check if current branch name is marked as protected in the system
883
  def protected_branch?(branch_name)
884 885
    return true if empty_repo? && default_branch_protected?

886 887
    @protected_branches ||= self.protected_branches.to_a
    ProtectedBranch.matching(branch_name, protected_branches: @protected_branches).present?
Dmitriy Zaporozhets committed
888
  end
889

890 891
  def user_can_push_to_empty_repo?(user)
    !default_branch_protected? || team.max_member_access(user.id) > Gitlab::Access::DEVELOPER
892 893
  end

894 895 896
  def forked?
    !(forked_project_link.nil? || forked_project_link.forked_from_project.nil?)
  end
897

898 899 900 901
  def personal?
    !group
  end

902
  def rename_repo
903
    path_was = previous_changes['path'].first
904 905 906
    old_path_with_namespace = File.join(namespace_dir, path_was)
    new_path_with_namespace = File.join(namespace_dir, path)

907 908
    Rails.logger.error "Attempting to rename #{old_path_with_namespace} -> #{new_path_with_namespace}"

909 910
    expire_caches_before_rename(old_path_with_namespace)

911
    if has_container_registry_tags?
912 913
      Rails.logger.error "Project #{old_path_with_namespace} cannot be renamed because container registry tags are present"

914
      # we currently doesn't support renaming repository if it contains tags in container registry
915
      raise StandardError.new('Project cannot be renamed, because tags are present in its container registry')
916 917
    end

918
    if gitlab_shell.mv_repository(repository_storage_path, old_path_with_namespace, new_path_with_namespace)
919
      # If repository moved successfully we need to send update instructions to users.
920 921 922
      # However we cannot allow rollback since we moved repository
      # So we basically we mute exceptions in next actions
      begin
923
        gitlab_shell.mv_repository(repository_storage_path, "#{old_path_with_namespace}.wiki", "#{new_path_with_namespace}.wiki")
924
        send_move_instructions(old_path_with_namespace)
925 926 927 928 929

        @old_path_with_namespace = old_path_with_namespace

        SystemHooksService.new.execute_hooks_for(self, :rename)

930
        @repository = nil
931 932
      rescue => e
        Rails.logger.error "Exception renaming #{old_path_with_namespace} -> #{new_path_with_namespace}: #{e}"
Johannes Schleifenbaum committed
933
        # Returning false does not rollback after_* transaction but gives
934 935 936 937
        # us information about failing some of tasks
        false
      end
    else
938 939
      Rails.logger.error "Repository could not be renamed: #{old_path_with_namespace} -> #{new_path_with_namespace}"

940 941
      # if we cannot move namespace directory we should rollback
      # db changes in order to prevent out of sync between db and fs
942
      raise StandardError.new('repository cannot be renamed')
943
    end
944

945 946
    Gitlab::AppLogger.info "Project was renamed: #{old_path_with_namespace} -> #{new_path_with_namespace}"

947 948
    Gitlab::UploadsTransfer.new.rename_project(path_was, path, namespace.full_path)
    Gitlab::PagesTransfer.new.rename_project(path_was, path, namespace.full_path)
949
  end
950

951 952 953 954 955 956
  # Expires various caches before a project is renamed.
  def expire_caches_before_rename(old_path)
    repo = Repository.new(old_path, self)
    wiki = Repository.new("#{old_path}.wiki", self)

    if repo.exists?
957
      repo.before_delete
958 959 960
    end

    if wiki.exists?
961
      wiki.before_delete
962 963 964
    end
  end

965 966
  def hook_attrs(backward: true)
    attrs = {
Kirill Zaitsev committed
967
      name: name,
968
      description: description,
Kirilll Zaitsev committed
969
      web_url: web_url,
970 971 972
      avatar_url: avatar_url,
      git_ssh_url: ssh_url_to_repo,
      git_http_url: http_url_to_repo,
Kirill Zaitsev committed
973
      namespace: namespace.name,
974 975 976
      visibility_level: visibility_level,
      path_with_namespace: path_with_namespace,
      default_branch: default_branch,
Kirill Zaitsev committed
977
    }
978 979 980 981 982 983 984 985 986 987 988 989

    # Backward compatibility
    if backward
      attrs.merge!({
                    homepage: web_url,
                    url: url_to_repo,
                    ssh_url: ssh_url_to_repo,
                    http_url: http_url_to_repo
                  })
    end

    attrs
Kirill Zaitsev committed
990 991
  end

992
  def project_member(user)
993
    project_members.find_by(user_id: user)
994
  end
995 996 997 998

  def default_branch
    @default_branch ||= repository.root_ref if repository.exists?
  end
999 1000 1001 1002 1003

  def reload_default_branch
    @default_branch = nil
    default_branch
  end
1004

1005 1006 1007
  def visibility_level_field
    visibility_level
  end
1008 1009 1010 1011 1012 1013 1014 1015

  def archive!
    update_attribute(:archived, true)
  end

  def unarchive!
    update_attribute(:archived, false)
  end
1016

1017
  def change_head(branch)
1018
    repository.before_change_head
P.S.V.R committed
1019 1020 1021
    repository.rugged.references.create('HEAD',
                                        "refs/heads/#{branch}",
                                        force: true)
1022
    repository.copy_gitattributes(branch)
1023
    repository.after_change_head
1024 1025
    reload_default_branch
  end
1026 1027 1028 1029

  def forked_from?(project)
    forked? && project == forked_from_project
  end
1030

1031
  def forks_count
1032
    forks.count
1033
  end
1034

1035 1036 1037
  def origin_merge_requests
    merge_requests.where(source_project_id: self.id)
  end
1038 1039

  def create_repository
1040 1041
    # Forked import is handled asynchronously
    unless forked?
1042
      if gitlab_shell.add_repository(repository_storage_path, path_with_namespace)
1043
        repository.after_create
1044 1045
        true
      else
1046
        errors.add(:base, 'Failed to create repository via gitlab-shell')
1047 1048
        false
      end
1049 1050 1051 1052 1053 1054 1055 1056 1057 1058
    end
  end

  def repository_exists?
    !!repository.exists?
  end

  def create_wiki
    ProjectWiki.new(self, self.owner).wiki
    true
1059
  rescue ProjectWiki::CouldNotCreateWikiError
1060
    errors.add(:base, 'Failed create wiki')
1061 1062
    false
  end
1063

Drew Blessing committed
1064 1065 1066 1067
  def jira_tracker_active?
    jira_tracker? && jira_service.active
  end

1068
  def allowed_to_share_with_group?
1069
    !namespace.share_with_group_lock
1070 1071
  end

1072 1073 1074
  def pipeline_for(ref, sha = nil)
    sha ||= commit(ref).try(:sha)

1075
    return unless sha
1076

1077
    pipelines.order(id: :desc).find_by(sha: sha, ref: ref)
1078 1079
  end

1080 1081 1082
  def ensure_pipeline(ref, sha, current_user = nil)
    pipeline_for(ref, sha) ||
      pipelines.create(sha: sha, ref: ref, user: current_user)
1083
  end
1084

1085
  def enable_ci
1086
    project_feature.update_attribute(:builds_access_level, ProjectFeature::ENABLED)
1087
  end
1088

1089 1090 1091 1092 1093 1094 1095 1096
  def shared_runners_available?
    shared_runners_enabled?
  end

  def shared_runners
    shared_runners_available? ? Ci::Runner.shared : Ci::Runner.none
  end

1097
  def any_runners?(&block)
1098
    if runners.active.any?(&block)
1099 1100 1101
      return true
    end

1102
    shared_runners.active.any?(&block)
1103 1104
  end

1105
  def valid_runners_token?(token)
1106
    self.runners_token && ActiveSupport::SecurityUtils.variable_size_secure_compare(token, self.runners_token)
Kamil Trzcinski committed
1107 1108
  end

1109 1110 1111 1112 1113 1114 1115 1116 1117 1118 1119
  def build_coverage_enabled?
    build_coverage_regex.present?
  end

  def build_timeout_in_minutes
    build_timeout / 60
  end

  def build_timeout_in_minutes=(value)
    self.build_timeout = value.to_i * 60
  end
1120

1121 1122 1123
  def open_issues_count
    issues.opened.count
  end
1124

1125
  def visibility_level_allowed_as_fork?(level = self.visibility_level)
Douwe Maan committed
1126
    return true unless forked?
1127

Douwe Maan committed
1128 1129 1130 1131 1132 1133
    # self.forked_from_project will be nil before the project is saved, so
    # we need to go through the relation
    original_project = forked_project_link.forked_from_project
    return true unless original_project

    level <= original_project.visibility_level
1134
  end
1135

1136 1137
  def visibility_level_allowed_by_group?(level = self.visibility_level)
    return true unless group
1138

1139
    level <= group.visibility_level
1140
  end
1141

1142 1143
  def visibility_level_allowed?(level = self.visibility_level)
    visibility_level_allowed_as_fork?(level) && visibility_level_allowed_by_group?(level)
Felipe Artur committed
1144 1145
  end

1146 1147 1148
  def runners_token
    ensure_runners_token!
  end
1149

1150 1151 1152
  def pages_deployed?
    Dir.exist?(public_pages_path)
  end
1153

1154
  def pages_url
1155 1156
    subdomain, _, url_path = full_path.partition('/')

1157 1158
    # The hostname always needs to be in downcased
    # All web servers convert hostname to lowercase
1159
    host = "#{subdomain}.#{Settings.pages.host}".downcase
1160 1161

    # The host in URL always needs to be downcased
1162
    url = Gitlab.config.pages.url.sub(/^https?:\/\//) do |prefix|
1163
      "#{prefix}#{subdomain}."
1164
    end.downcase
1165

1166
    # If the project path is the same as host, we serve it as group page
1167 1168 1169 1170
    return url if host == url_path

    "#{url}/#{url_path}"
  end
1171

1172 1173
  def pages_subdomain
    full_path.partition('/').first
1174
  end
Kamil Trzcinski committed
1175 1176

  def pages_path
1177
    File.join(Settings.pages.path, path_with_namespace)
Kamil Trzcinski committed
1178 1179 1180 1181 1182 1183 1184
  end

  def public_pages_path
    File.join(pages_path, 'public')
  end

  def remove_pages
1185 1186 1187
    # 1. We rename pages to temporary directory
    # 2. We wait 5 minutes, due to NFS caching
    # 3. We asynchronously remove pages with force
Kamil Trzcinski committed
1188
    temp_path = "#{path}.#{SecureRandom.hex}.deleted"
1189

1190 1191
    if Gitlab::PagesTransfer.new.rename_project(path, temp_path, namespace.full_path)
      PagesWorker.perform_in(5.minutes, :remove, namespace.full_path, temp_path)
1192
    end
Kamil Trzcinski committed
1193 1194
  end

1195 1196 1197
  def wiki
    @wiki ||= ProjectWiki.new(self, self.owner)
  end
1198

Josh Frye committed
1199 1200
  def running_or_pending_build_count(force: false)
    Rails.cache.fetch(['projects', id, 'running_or_pending_build_count'], force: force) do
1201 1202 1203
      builds.running_or_pending.count(:all)
    end
  end
1204 1205

  def mark_import_as_failed(error_message)
1206 1207 1208
    original_errors = errors.dup
    sanitized_message = Gitlab::UrlSanitizer.sanitize(error_message)

1209
    import_fail
1210 1211 1212 1213 1214
    update_column(:import_error, sanitized_message)
  rescue ActiveRecord::ActiveRecordError => e
    Rails.logger.error("Error setting import status to failed: #{e.message}. Original error: #{sanitized_message}")
  ensure
    @errors = original_errors
1215
  end
James Lopez committed
1216

1217 1218
  def add_export_job(current_user:)
    job_id = ProjectExportWorker.perform_async(current_user.id, self.id)
1219 1220 1221 1222 1223 1224 1225

    if job_id
      Rails.logger.info "Export job started for project ID #{self.id} with job ID #{job_id}"
    else
      Rails.logger.error "Export job failed to start for project ID #{self.id}"
    end
  end
James Lopez committed
1226 1227

  def export_path
1228
    File.join(Gitlab::ImportExport.storage_path, path_with_namespace)
James Lopez committed
1229
  end
1230 1231 1232 1233 1234 1235 1236 1237 1238

  def export_project_path
    Dir.glob("#{export_path}/*export.tar.gz").max_by { |f| File.ctime(f) }
  end

  def remove_exports
    _, status = Gitlab::Popen.popen(%W(find #{export_path} -not -path #{export_path} -delete))
    status.zero?
  end
1239 1240

  def ensure_dir_exist
1241
    gitlab_shell.add_namespace(repository_storage_path, namespace.full_path)
1242
  end
1243 1244 1245 1246 1247 1248

  def predefined_variables
    [
      { key: 'CI_PROJECT_ID', value: id.to_s, public: true },
      { key: 'CI_PROJECT_NAME', value: path, public: true },
      { key: 'CI_PROJECT_PATH', value: path_with_namespace, public: true },
1249
      { key: 'CI_PROJECT_NAMESPACE', value: namespace.full_path, public: true },
1250 1251 1252 1253 1254 1255 1256 1257 1258 1259 1260
      { key: 'CI_PROJECT_URL', value: web_url, public: true }
    ]
  end

  def container_registry_variables
    return [] unless Gitlab.config.registry.enabled

    variables = [
      { key: 'CI_REGISTRY', value: Gitlab.config.registry.host_port, public: true }
    ]

Kamil Trzcinski committed
1261 1262 1263 1264
    if container_registry_enabled?
      variables << { key: 'CI_REGISTRY_IMAGE', value: container_registry_repository_url, public: true }
    end

1265 1266 1267 1268 1269 1270 1271 1272
    variables
  end

  def secret_variables
    variables.map do |variable|
      { key: variable.key, value: variable.value, public: false }
    end
  end
1273

1274 1275 1276 1277 1278 1279
  def deployment_variables
    return [] unless deployment_service

    deployment_service.predefined_variables
  end

1280 1281 1282 1283 1284 1285 1286 1287 1288 1289
  def append_or_update_attribute(name, value)
    old_values = public_send(name.to_s)

    if Project.reflect_on_association(name).try(:macro) == :has_many && old_values.any?
      update_attribute(name, old_values + value)
    else
      update_attribute(name, value)
    end
  end

1290 1291 1292 1293 1294 1295 1296 1297 1298 1299 1300 1301
  def pushes_since_gc
    Gitlab::Redis.with { |redis| redis.get(pushes_since_gc_redis_key).to_i }
  end

  def increment_pushes_since_gc
    Gitlab::Redis.with { |redis| redis.incr(pushes_since_gc_redis_key) }
  end

  def reset_pushes_since_gc
    Gitlab::Redis.with { |redis| redis.del(pushes_since_gc_redis_key) }
  end

Douwe Maan committed
1302
  def route_map_for(commit_sha)
1303 1304
    @route_maps_by_commit ||= Hash.new do |h, sha|
      h[sha] = begin
Douwe Maan committed
1305
        data = repository.route_map_for(sha)
1306 1307
        next unless data

Douwe Maan committed
1308 1309 1310
        Gitlab::RouteMap.new(data)
      rescue Gitlab::RouteMap::FormatError
        nil
1311 1312 1313 1314 1315 1316 1317
      end
    end

    @route_maps_by_commit[commit_sha]
  end

  def public_path_for_source_path(path, commit_sha)
Douwe Maan committed
1318
    map = route_map_for(commit_sha)
1319 1320
    return unless map

Douwe Maan committed
1321
    map.public_path_for_source_path(path)
1322 1323
  end

1324 1325 1326 1327 1328 1329 1330 1331 1332 1333 1334 1335
  def parent
    namespace
  end

  def parent_changed?
    namespace_id_changed?
  end

  alias_method :name_with_namespace, :full_name
  alias_method :human_name, :full_name
  alias_method :path_with_namespace, :full_path

1336 1337
  private

1338
  def cross_namespace_reference?(from)
1339 1340 1341 1342 1343
    case from
    when Project
      namespace != from.namespace
    when Namespace
      namespace != from
1344 1345 1346
    end
  end

1347
  # Check if a reference is being done cross-project
1348 1349 1350 1351
  def cross_project_reference?(from)
    return true if from.is_a?(Namespace)

    from && self != from
1352 1353
  end

1354 1355 1356 1357
  def pushes_since_gc_redis_key
    "projects/#{id}/pushes_since_gc"
  end

1358
  def default_branch_protected?
1359 1360
    current_application_settings.default_branch_protection == Gitlab::Access::PROTECTION_FULL ||
      current_application_settings.default_branch_protection == Gitlab::Access::PROTECTION_DEV_CAN_MERGE
1361 1362
  end

1363 1364 1365 1366 1367 1368 1369
  # Similar to the normal callbacks that hook into the life cycle of an
  # Active Record object, you can also define callbacks that get triggered
  # when you add an object to an association collection. If any of these
  # callbacks throw an exception, the object will not be added to the
  # collection. Before you add a new board to the boards collection if you
  # already have 1, 2, or n it will fail, but it if you have 0 that is lower
  # than the number of permitted boards per project it won't fail.
1370
  def validate_board_limit(board)
1371
    raise BoardLimitExceeded, 'Number of permitted boards exceeded' if boards.size >= NUMBER_OF_PERMITTED_BOARDS
1372
  end
1373

1374 1375 1376 1377
  def update_project_statistics
    stats = statistics || build_statistics
    stats.update(namespace_id: namespace_id)
  end
1378 1379 1380 1381 1382 1383 1384 1385 1386 1387 1388 1389 1390 1391 1392

  def check_pending_delete
    return if valid_attribute?(:name) && valid_attribute?(:path)
    return unless pending_delete_twin

    %i[route route.path name path].each do |error|
      errors.delete(error)
    end

    errors.add(:base, "The project is still being deleted. Please try again later.")
  end

  def pending_delete_twin
    return false unless path

1393
    Project.unscoped.where(pending_delete: true).find_by_full_path(path_with_namespace)
1394
  end
gitlabhq committed
1395
end