BigW Consortium Gitlab

project.rb 41.9 KB
Newer Older
1 2
require 'carrierwave/orm/activerecord'

gitlabhq committed
3
class Project < ActiveRecord::Base
4
  include Gitlab::ConfigHelper
5
  include Gitlab::ShellAdapter
6
  include Gitlab::VisibilityLevel
7
  include Gitlab::CurrentSettings
8
  include AccessRequestable
9
  include Avatarable
10
  include CacheMarkdownField
11 12
  include Referable
  include Sortable
13
  include AfterCommitQueue
14
  include CaseSensitivity
15
  include TokenAuthenticatable
16
  include ValidAttribute
17
  include ProjectFeaturesCompatibility
18
  include SelectForProjectAuthorization
19
  include Routable
Robert Speicher committed
20

21
  extend Gitlab::ConfigHelper
22

23
  BoardLimitExceeded = Class.new(StandardError)
24

25
  NUMBER_OF_PERMITTED_BOARDS = 1
26
  UNKNOWN_IMPORT_URL = 'http://unknown.git'.freeze
Jared Szechy committed
27

28 29
  cache_markdown_field :description, pipeline: :description

30 31
  delegate :feature_available?, :builds_enabled?, :wiki_enabled?,
           :merge_requests_enabled?, :issues_enabled?, to: :project_feature,
32
                                                       allow_nil: true
33

34
  default_value_for :archived, false
35
  default_value_for :visibility_level, gitlab_config_features.visibility_level
36
  default_value_for :container_registry_enabled, gitlab_config_features.container_registry
37
  default_value_for(:repository_storage) { current_application_settings.pick_repository_storage }
38
  default_value_for(:shared_runners_enabled) { current_application_settings.shared_runners_enabled }
39 40 41 42 43
  default_value_for :issues_enabled, gitlab_config_features.issues
  default_value_for :merge_requests_enabled, gitlab_config_features.merge_requests
  default_value_for :builds_enabled, gitlab_config_features.builds
  default_value_for :wiki_enabled, gitlab_config_features.wiki
  default_value_for :snippets_enabled, gitlab_config_features.snippets
44
  default_value_for :only_allow_merge_if_all_discussions_are_resolved, false
45

46
  after_create :ensure_dir_exist
47
  after_create :create_project_feature, unless: :project_feature
48
  after_save :ensure_dir_exist, if: :namespace_id_changed?
49
  after_save :update_project_statistics, if: :namespace_id_changed?
50

51 52
  # set last_activity_at to the same as created_at
  after_create :set_last_activity_at
53
  def set_last_activity_at
54
    update_column(:last_activity_at, self.created_at)
55 56
  end

57 58 59 60 61
  after_create :set_last_repository_updated_at
  def set_last_repository_updated_at
    update_column(:last_repository_updated_at, self.created_at)
  end

Kamil Trzcinski committed
62 63
  after_destroy :remove_pages

64
  # update visibility_level of forks
65 66 67 68 69 70 71 72 73 74 75 76
  after_update :update_forks_visibility_level
  def update_forks_visibility_level
    return unless visibility_level < visibility_level_was

    forks.each do |forked_project|
      if forked_project.visibility_level > visibility_level
        forked_project.visibility_level = visibility_level
        forked_project.save!
      end
    end
  end

77 78
  after_validation :check_pending_delete

79
  acts_as_taggable
80

81
  attr_accessor :new_default_branch
82
  attr_accessor :old_path_with_namespace
83
  attr_writer :pipeline_status
84

85 86
  alias_attribute :title, :name

87
  # Relations
88
  belongs_to :creator, class_name: 'User'
89
  belongs_to :group, -> { where(type: 'Group') }, foreign_key: 'namespace_id'
90
  belongs_to :namespace
91

92
  has_one :last_event, -> {order 'events.created_at DESC'}, class_name: 'Event'
93
  has_many :boards, before_add: :validate_board_limit, dependent: :destroy
94

95
  # Project services
96
  has_one :campfire_service, dependent: :destroy
Kirilll Zaitsev committed
97
  has_one :drone_ci_service, dependent: :destroy
98
  has_one :emails_on_push_service, dependent: :destroy
99
  has_one :pipelines_email_service, dependent: :destroy
Aorimn committed
100
  has_one :irker_service, dependent: :destroy
101
  has_one :pivotaltracker_service, dependent: :destroy
102
  has_one :hipchat_service, dependent: :destroy
103
  has_one :flowdock_service, dependent: :destroy
104
  has_one :assembla_service, dependent: :destroy
Jeremy committed
105
  has_one :asana_service, dependent: :destroy
106
  has_one :gemnasium_service, dependent: :destroy
107
  has_one :mattermost_slash_commands_service, dependent: :destroy
108
  has_one :mattermost_service, dependent: :destroy
109
  has_one :slack_slash_commands_service, dependent: :destroy
110
  has_one :slack_service, dependent: :destroy
111
  has_one :buildkite_service, dependent: :destroy
112
  has_one :bamboo_service, dependent: :destroy
113
  has_one :teamcity_service, dependent: :destroy
114
  has_one :pushover_service, dependent: :destroy
115 116
  has_one :jira_service, dependent: :destroy
  has_one :redmine_service, dependent: :destroy
117
  has_one :custom_issue_tracker_service, dependent: :destroy
118
  has_one :bugzilla_service, dependent: :destroy
119
  has_one :gitlab_issue_tracker_service, dependent: :destroy, inverse_of: :project
120
  has_one :external_wiki_service, dependent: :destroy
121
  has_one :kubernetes_service, dependent: :destroy, inverse_of: :project
122
  has_one :prometheus_service, dependent: :destroy, inverse_of: :project
123
  has_one :mock_ci_service, dependent: :destroy
124 125
  has_one :mock_deployment_service, dependent: :destroy
  has_one :mock_monitoring_service, dependent: :destroy
126
  has_one :microsoft_teams_service, dependent: :destroy
127

128 129 130 131 132
  has_one  :forked_project_link,  dependent: :destroy, foreign_key: "forked_to_project_id"
  has_one  :forked_from_project,  through:   :forked_project_link

  has_many :forked_project_links, foreign_key: "forked_from_project_id"
  has_many :forks,                through:     :forked_project_links, source: :forked_to_project
133

134
  # Merge Requests for target project should be removed with it
135
  has_many :merge_requests,     dependent: :destroy, foreign_key: 'target_project_id'
136
  has_many :issues,             dependent: :destroy
137
  has_many :labels,             dependent: :destroy, class_name: 'ProjectLabel'
138 139
  has_many :services,           dependent: :destroy
  has_many :events,             dependent: :destroy
140 141
  has_many :milestones,         dependent: :destroy
  has_many :notes,              dependent: :destroy
142 143
  has_many :snippets,           dependent: :destroy, class_name: 'ProjectSnippet'
  has_many :hooks,              dependent: :destroy, class_name: 'ProjectHook'
144
  has_many :protected_branches, dependent: :destroy
145
  has_many :protected_tags,     dependent: :destroy
146

147
  has_many :project_authorizations
148
  has_many :authorized_users, through: :project_authorizations, source: :user, class_name: 'User'
149
  has_many :project_members, -> { where(requested_at: nil) }, dependent: :destroy, as: :source
150
  alias_method :members, :project_members
151 152 153 154
  has_many :users, through: :project_members

  has_many :requesters, -> { where.not(requested_at: nil) }, dependent: :destroy, as: :source, class_name: 'ProjectMember'

155 156
  has_many :deploy_keys_projects, dependent: :destroy
  has_many :deploy_keys, through: :deploy_keys_projects
Ciro Santilli committed
157 158
  has_many :users_star_projects, dependent: :destroy
  has_many :starrers, through: :users_star_projects, source: :user
159
  has_many :releases, dependent: :destroy
160 161
  has_many :lfs_objects_projects, dependent: :destroy
  has_many :lfs_objects, through: :lfs_objects_projects
162 163
  has_many :project_group_links, dependent: :destroy
  has_many :invited_groups, through: :project_group_links, source: :group
Kamil Trzcinski committed
164
  has_many :pages_domains, dependent: :destroy
165
  has_many :todos, dependent: :destroy
166
  has_many :notification_settings, dependent: :destroy, as: :source
167

168
  has_one :import_data, dependent: :destroy, class_name: "ProjectImportData"
169
  has_one :project_feature, dependent: :destroy
170
  has_one :statistics, class_name: 'ProjectStatistics', dependent: :delete
171
  has_many :container_repositories, dependent: :destroy
172

173 174 175 176
  has_many :commit_statuses, dependent: :destroy
  has_many :pipelines, dependent: :destroy, class_name: 'Ci::Pipeline'
  has_many :builds, class_name: 'Ci::Build' # the builds are created from the commit_statuses
  has_many :runner_projects, dependent: :destroy, class_name: 'Ci::RunnerProject'
177
  has_many :runners, through: :runner_projects, source: :runner, class_name: 'Ci::Runner'
178
  has_many :variables, class_name: 'Ci::Variable'
179
  has_many :triggers, dependent: :destroy, class_name: 'Ci::Trigger'
180 181
  has_many :environments, dependent: :destroy
  has_many :deployments, dependent: :destroy
182
  has_many :pipeline_schedules, dependent: :destroy, class_name: 'Ci::PipelineSchedule'
183

Kamil Trzcinski committed
184 185
  has_many :active_runners, -> { active }, through: :runner_projects, source: :runner, class_name: 'Ci::Runner'

186
  accepts_nested_attributes_for :variables, allow_destroy: true
187
  accepts_nested_attributes_for :project_feature
188

189
  delegate :name, to: :owner, allow_nil: true, prefix: true
Douwe Maan committed
190
  delegate :count, to: :forks, prefix: true
191
  delegate :members, to: :team, prefix: true
192
  delegate :add_user, :add_users, to: :team
193
  delegate :add_guest, :add_reporter, :add_developer, :add_master, to: :team
Douwe Maan committed
194
  delegate :empty_repo?, to: :repository
195

Andrey Kumanyaev committed
196
  # Validations
197
  validates :creator, presence: true, on: :create
198
  validates :description, length: { maximum: 2000 }, allow_blank: true
199 200
  validates :name,
    presence: true,
201
    length: { maximum: 255 },
202
    format: { with: Gitlab::Regex.project_name_regex,
203
              message: Gitlab::Regex.project_name_regex_message }
204 205
  validates :path,
    presence: true,
206
    dynamic_path: true,
207
    length: { maximum: 255 },
208
    format: { with: Gitlab::Regex.project_path_regex,
209 210 211
              message: Gitlab::Regex.project_path_regex_message },
    uniqueness: { scope: :namespace_id }

212
  validates :namespace, presence: true
Douwe Maan committed
213
  validates :name, uniqueness: { scope: :namespace_id }
214
  validates :import_url, addressable_url: true, if: :external_import?
215
  validates :import_url, importable_url: true, if: [:external_import?, :import_url_changed?]
216
  validates :star_count, numericality: { greater_than_or_equal_to: 0 }
217
  validate :check_limit, on: :create
218
  validate :avatar_type,
219
    if: ->(project) { project.avatar.present? && project.avatar_changed? }
220
  validates :avatar, file_size: { maximum: 200.kilobytes.to_i }
221
  validate :visibility_level_allowed_by_group
Douwe Maan committed
222
  validate :visibility_level_allowed_as_fork
223
  validate :check_wiki_path_conflict
224 225 226
  validates :repository_storage,
    presence: true,
    inclusion: { in: ->(_object) { Gitlab.config.repositories.storages.keys } }
227

228
  add_authentication_token_field :runners_token
229
  before_save :ensure_runners_token
230

231
  mount_uploader :avatar, AvatarUploader
232
  has_many :uploads, as: :model, dependent: :destroy
Andrey Kumanyaev committed
233

234
  # Scopes
235 236
  default_scope { where(pending_delete: false) }

237 238
  scope :with_deleted, -> { unscope(where: :pending_delete) }

239
  scope :sorted_by_activity, -> { reorder(last_activity_at: :desc) }
240 241
  scope :sorted_by_stars, -> { reorder('projects.star_count DESC') }

242
  scope :in_namespace, ->(namespace_ids) { where(namespace_id: namespace_ids) }
243
  scope :personal, ->(user) { where(namespace_id: user.namespace_id) }
244
  scope :joined, ->(user) { where('namespace_id != ?', user.namespace_id) }
245
  scope :visible_to_user, ->(user) { where(id: user.authorized_projects.select(:id).reorder(nil)) }
246
  scope :non_archived, -> { where(archived: false) }
247
  scope :for_milestones, ->(ids) { joins(:milestones).where('milestones.id' => ids).distinct }
248 249
  scope :with_push, -> { joins(:events).where('events.action = ?', Event::PUSHED) }

250
  scope :with_project_feature, -> { joins('LEFT JOIN project_features ON projects.id = project_features.project_id') }
251
  scope :with_statistics, -> { includes(:statistics) }
252
  scope :with_shared_runners, -> { where(shared_runners_enabled: true) }
253 254 255
  scope :inside_path, ->(path) do
    # We need routes alias rs for JOIN so it does not conflict with
    # includes(:route) which we use in ProjectsFinder.
256
    joins("INNER JOIN routes rs ON rs.source_id = projects.id AND rs.source_type = 'Project'").
257
      where('rs.path LIKE ?', "#{sanitize_sql_like(path)}/%")
258
  end
259 260 261 262 263 264 265 266 267 268 269 270 271 272 273 274

  # "enabled" here means "not disabled". It includes private features!
  scope :with_feature_enabled, ->(feature) {
    access_level_attribute = ProjectFeature.access_level_attribute(feature)
    with_project_feature.where(project_features: { access_level_attribute => [nil, ProjectFeature::PRIVATE, ProjectFeature::ENABLED] })
  }

  # Picks a feature where the level is exactly that given.
  scope :with_feature_access_level, ->(feature, level) {
    access_level_attribute = ProjectFeature.access_level_attribute(feature)
    with_project_feature.where(project_features: { access_level_attribute => level })
  }

  scope :with_builds_enabled, -> { with_feature_enabled(:builds) }
  scope :with_issues_enabled, -> { with_feature_enabled(:issues) }

275
  enum auto_cancel_pending_pipelines: { disabled: 0, enabled: 1 }
276

277 278 279 280 281 282 283 284 285 286 287 288 289 290 291
  # project features may be "disabled", "internal" or "enabled". If "internal",
  # they are only available to team members. This scope returns projects where
  # the feature is either enabled, or internal with permission for the user.
  def self.with_feature_available_for_user(feature, user)
    return with_feature_enabled(feature) if user.try(:admin?)

    unconditional = with_feature_access_level(feature, [nil, ProjectFeature::ENABLED])
    return unconditional if user.nil?

    conditional = with_feature_access_level(feature, ProjectFeature::PRIVATE)
    authorized = user.authorized_projects.merge(conditional.reorder(nil))

    union = Gitlab::SQL::Union.new([unconditional.select(:id), authorized.select(:id)])
    where(arel_table[:id].in(Arel::Nodes::SqlLiteral.new(union.to_sql)))
  end
292

293 294
  scope :active, -> { joins(:issues, :notes, :merge_requests).order('issues.created_at, notes.created_at, merge_requests.created_at DESC') }
  scope :abandoned, -> { where('projects.last_activity_at < ?', 6.months.ago) }
295

296 297
  scope :excluding_project, ->(project) { where.not(id: project) }

298 299
  state_machine :import_status, initial: :none do
    event :import_start do
300
      transition [:none, :finished] => :started
301 302 303
    end

    event :import_finish do
304
      transition started: :finished
305 306 307
    end

    event :import_fail do
308
      transition started: :failed
309 310 311
    end

    event :import_retry do
312
      transition failed: :started
313 314 315 316
    end

    state :started
    state :finished
317 318
    state :failed

319
    after_transition any => :finished, do: :reset_cache_and_import_attrs
320 321
  end

Andrey Kumanyaev committed
322
  class << self
323 324 325 326 327 328 329
    # Searches for a list of projects based on the query given in `query`.
    #
    # On PostgreSQL this method uses "ILIKE" to perform a case-insensitive
    # search. On MySQL a regular "LIKE" is used as it's already
    # case-insensitive.
    #
    # query - The search query as a String.
330
    def search(query)
331
      ptable  = arel_table
332 333 334
      ntable  = Namespace.arel_table
      pattern = "%#{query}%"

335 336 337
      # unscoping unnecessary conditions that'll be applied
      # when executing `where("projects.id IN (#{union.to_sql})")`
      projects = unscoped.select(:id).where(
338 339 340
        ptable[:path].matches(pattern).
          or(ptable[:name].matches(pattern)).
          or(ptable[:description].matches(pattern))
341 342
      )

343
      namespaces = unscoped.select(:id).
344 345
        joins(:namespace).
        where(ntable[:name].matches(pattern))
346 347 348 349

      union = Gitlab::SQL::Union.new([projects, namespaces])

      where("projects.id IN (#{union.to_sql})")
Andrey Kumanyaev committed
350
    end
351

352
    def search_by_visibility(level)
353
      where(visibility_level: Gitlab::VisibilityLevel.string_options[level])
354 355
    end

356
    def search_by_title(query)
357 358 359 360
      pattern = "%#{query}%"
      table   = Project.arel_table

      non_archived.where(table[:name].matches(pattern))
361 362
    end

363 364 365
    def visibility_levels
      Gitlab::VisibilityLevel.options
    end
366 367

    def sort(method)
368 369
      case method.to_s
      when 'storage_size_desc'
370 371 372
        # storage_size is a joined column so we need to
        # pass a string to avoid AR adding the table name
        reorder('project_statistics.storage_size DESC, projects.id DESC')
373 374 375 376
      when 'latest_activity_desc'
        reorder(last_activity_at: :desc)
      when 'latest_activity_asc'
        reorder(last_activity_at: :asc)
377 378
      else
        order_by(method)
379 380
      end
    end
381 382

    def reference_pattern
383
      name_pattern = Gitlab::Regex::FULL_NAMESPACE_REGEX_STR
384 385 386 387 388

      %r{
        ((?<namespace>#{name_pattern})\/)?
        (?<project>#{name_pattern})
      }x
389
    end
390

391
    def trending
392 393
      joins('INNER JOIN trending_projects ON projects.id = trending_projects.project_id').
        reorder('trending_projects.id ASC')
394
    end
395 396 397 398 399 400

    def cached_count
      Rails.cache.fetch('total_project_count', expires_in: 5.minutes) do
        Project.count
      end
    end
401 402

    def group_ids
403
      joins(:namespace).where(namespaces: { type: 'Group' }).select(:namespace_id)
404
    end
405 406
  end

407
  def lfs_enabled?
408
    return namespace.lfs_enabled? if self[:lfs_enabled].nil?
409

410
    self[:lfs_enabled] && Gitlab.config.lfs.enabled
411 412
  end

413
  def repository_storage_path
414
    Gitlab.config.repositories.storages[repository_storage]['path']
415 416
  end

417
  def team
418
    @team ||= ProjectTeam.new(self)
419 420 421
  end

  def repository
422
    @repository ||= Repository.new(path_with_namespace, self)
423 424
  end

425
  def container_registry_url
Kamil Trzcinski committed
426
    if Gitlab.config.registry.enabled
427
      "#{Gitlab.config.registry.host_port}/#{path_with_namespace.downcase}"
428
    end
429 430
  end

431
  def has_container_registry_tags?
432 433
    container_repositories.to_a.any?(&:has_tags?) ||
      has_root_container_repository_tags?
434 435
  end

436 437
  def commit(ref = 'HEAD')
    repository.commit(ref)
438 439
  end

440
  # ref can't be HEAD, can only be branch/tag name or SHA
441
  def latest_successful_builds_for(ref = default_branch)
442
    latest_pipeline = pipelines.latest_successful_for(ref)
443 444 445 446 447 448

    if latest_pipeline
      latest_pipeline.builds.latest.with_artifacts
    else
      builds.none
    end
449 450
  end

451
  def merge_base_commit(first_commit_id, second_commit_id)
Douwe Maan committed
452 453
    sha = repository.merge_base(first_commit_id, second_commit_id)
    repository.commit(sha) if sha
454 455
  end

456
  def saved?
457
    id && persisted?
458 459
  end

460
  def add_import_job
Douwe Maan committed
461 462 463 464 465 466 467 468
    job_id =
      if forked?
        RepositoryForkWorker.perform_async(id, forked_from_project.repository_storage_path,
          forked_from_project.path_with_namespace,
          self.namespace.full_path)
      else
        RepositoryImportWorker.perform_async(self.id)
      end
469 470 471 472 473

    if job_id
      Rails.logger.info "Import job started for #{path_with_namespace} with job ID #{job_id}"
    else
      Rails.logger.error "Import job failed to start for #{path_with_namespace}"
474
    end
475 476
  end

477
  def reset_cache_and_import_attrs
478 479
    ProjectCacheWorker.perform_async(self.id)

480
    self.import_data&.destroy
481 482
  end

483
  def import_url=(value)
484 485
    return super(value) unless Gitlab::UrlSanitizer.valid?(value)

486
    import_url = Gitlab::UrlSanitizer.new(value)
James Lopez committed
487
    super(import_url.sanitized_url)
488
    create_or_update_import_data(credentials: import_url.credentials)
489 490 491
  end

  def import_url
492
    if import_data && super.present?
493
      import_url = Gitlab::UrlSanitizer.new(super, credentials: import_data.credentials)
James Lopez committed
494 495 496
      import_url.full_url
    else
      super
497 498
    end
  end
499

James Lopez committed
500 501 502 503
  def valid_import_url?
    valid? || errors.messages[:import_url].nil?
  end

504
  def create_or_update_import_data(data: nil, credentials: nil)
505
    return unless import_url.present? && valid_import_url?
506

James Lopez committed
507
    project_import_data = import_data || build_import_data
508 509 510 511
    if data
      project_import_data.data ||= {}
      project_import_data.data = project_import_data.data.merge(data)
    end
512 513 514 515
    if credentials
      project_import_data.credentials ||= {}
      project_import_data.credentials = project_import_data.credentials.merge(credentials)
    end
516 517

    project_import_data.save
518
  end
519

520
  def import?
521
    external_import? || forked? || gitlab_project_import?
522 523
  end

524 525 526 527
  def no_import?
    import_status == 'none'
  end

528
  def external_import?
529 530 531
    import_url.present?
  end

532
  def imported?
533 534 535 536 537 538 539 540 541 542 543 544 545
    import_finished?
  end

  def import_in_progress?
    import? && import_status == 'started'
  end

  def import_failed?
    import_status == 'failed'
  end

  def import_finished?
    import_status == 'finished'
546 547
  end

548
  def safe_import_url
549
    Gitlab::UrlSanitizer.new(import_url).masked_url
550 551
  end

552 553 554 555
  def gitlab_project_import?
    import_type == 'gitlab_project'
  end

556 557 558 559
  def gitea_import?
    import_type == 'gitea'
  end

560 561 562 563
  def github_import?
    import_type == 'github'
  end

564
  def check_limit
Douwe Maan committed
565
    unless creator.can_create_project? || namespace.kind == 'group'
566 567 568
      projects_limit = creator.projects_limit

      if projects_limit == 0
569
        self.errors.add(:limit_reached, "Personal project creation is not allowed. Please contact your administrator with questions")
570
      else
571
        self.errors.add(:limit_reached, "Your project limit is #{projects_limit} projects! Please contact your administrator to increase it")
572
      end
573 574
    end
  rescue
575
    self.errors.add(:base, "Can't check your ability to create project")
gitlabhq committed
576 577
  end

578 579 580 581 582 583 584 585 586 587 588 589 590
  def visibility_level_allowed_by_group
    return if visibility_level_allowed_by_group?

    level_name = Gitlab::VisibilityLevel.level_name(self.visibility_level).downcase
    group_level_name = Gitlab::VisibilityLevel.level_name(self.group.visibility_level).downcase
    self.errors.add(:visibility_level, "#{level_name} is not allowed in a #{group_level_name} group.")
  end

  def visibility_level_allowed_as_fork
    return if visibility_level_allowed_as_fork?

    level_name = Gitlab::VisibilityLevel.level_name(self.visibility_level).downcase
    self.errors.add(:visibility_level, "#{level_name} is not allowed since the fork source project has lower visibility.")
591 592
  end

593 594 595 596 597 598 599 600 601 602
  def check_wiki_path_conflict
    return if path.blank?

    path_to_check = path.ends_with?('.wiki') ? path.chomp('.wiki') : "#{path}.wiki"

    if Project.where(namespace_id: namespace_id, path: path_to_check).exists?
      errors.add(:name, 'has already been taken')
    end
  end

603
  def to_param
604 605 606 607 608
    if persisted? && errors.include?(:path)
      path_was
    else
      path
    end
609 610
  end

611
  # `from` argument can be a Namespace or Project.
612 613 614 615 616 617
  def to_reference(from = nil, full: false)
    if full || cross_namespace_reference?(from)
      path_with_namespace
    elsif cross_project_reference?(from)
      path
    end
618 619 620 621 622 623 624 625
  end

  def to_human_reference(from_project = nil)
    if cross_namespace_reference?(from_project)
      name_with_namespace
    elsif cross_project_reference?(from_project)
      name
    end
626 627
  end

628
  def web_url
629
    Gitlab::Routing.url_helpers.namespace_project_url(self.namespace, self)
630 631
  end

632
  def new_issue_address(author)
633
    return unless Gitlab::IncomingEmail.supports_issue_creation? && author
634

635 636 637 638
    author.ensure_incoming_email_token!

    Gitlab::IncomingEmail.reply_address(
      "#{path_with_namespace}+#{author.incoming_email_token}")
639 640
  end

641
  def build_commit_note(commit)
642
    notes.new(commit_id: commit.id, noteable_type: 'Commit')
gitlabhq committed
643
  end
Nihad Abbasov committed
644

645
  def last_activity
646
    last_event
gitlabhq committed
647 648 649
  end

  def last_activity_date
Andrey Kumanyaev committed
650
    last_activity_at || updated_at
Dmitriy Zaporozhets committed
651
  end
652

653 654 655
  def project_id
    self.id
  end
randx committed
656

657
  def get_issue(issue_id, current_user)
658
    if default_issues_tracker?
659
      IssuesFinder.new(current_user, project_id: id).find_by(iid: issue_id)
660
    else
661
      ExternalIssue.new(issue_id, self)
662 663 664
    end
  end

665
  def issue_exists?(issue_id)
666
    get_issue(issue_id)
667 668
  end

669
  def default_issue_tracker
670
    gitlab_issue_tracker_service || create_gitlab_issue_tracker_service
671 672 673 674 675 676 677 678 679 680
  end

  def issues_tracker
    if external_issue_tracker
      external_issue_tracker
    else
      default_issue_tracker
    end
  end

681 682 683 684
  def issue_reference_pattern
    issues_tracker.reference_pattern
  end

685
  def default_issues_tracker?
686
    !external_issue_tracker
687 688 689
  end

  def external_issue_tracker
690 691 692 693 694 695 696 697 698 699 700 701 702 703 704
    if has_external_issue_tracker.nil? # To populate existing projects
      cache_has_external_issue_tracker
    end

    if has_external_issue_tracker?
      return @external_issue_tracker if defined?(@external_issue_tracker)

      @external_issue_tracker = services.external_issue_trackers.first
    else
      nil
    end
  end

  def cache_has_external_issue_tracker
    update_column(:has_external_issue_tracker, services.external_issue_trackers.any?)
705 706
  end

707 708 709 710
  def has_wiki?
    wiki_enabled? || has_external_wiki?
  end

711 712 713 714 715 716 717 718 719 720 721 722 723 724 725 726
  def external_wiki
    if has_external_wiki.nil?
      cache_has_external_wiki # Populate
    end

    if has_external_wiki
      @external_wiki ||= services.external_wikis.first
    else
      nil
    end
  end

  def cache_has_external_wiki
    update_column(:has_external_wiki, services.external_wikis.any?)
  end

727
  def find_or_initialize_services
728 729
    services_templates = Service.where(template: true)

730
    Service.available_services_names.map do |service_name|
731
      service = find_service(services, service_name)
732

733 734 735
      if service
        service
      else
736 737 738 739
        # We should check if template for the service exists
        template = find_service(services_templates, service_name)

        if template.nil?
740 741
          # If no template, we should create an instance. Ex `build_gitlab_ci_service`
          public_send("build_#{service_name}_service")
742
        else
743
          Service.build_from_template(id, template)
744 745
        end
      end
746 747 748
    end
  end

749 750 751 752
  def find_or_initialize_service(name)
    find_or_initialize_services.find { |service| service.to_param == name }
  end

753 754
  def create_labels
    Label.templates.each do |label|
755
      params = label.attributes.except('id', 'template', 'created_at', 'updated_at')
756
      Labels::FindOrCreateService.new(nil, self, params).execute(skip_authorization: true)
757 758 759
    end
  end

760 761 762
  def find_service(list, name)
    list.find { |service| service.to_param == name }
  end
763

764
  def ci_services
765
    services.where(category: :ci)
766 767 768
  end

  def ci_service
769
    @ci_service ||= ci_services.reorder(nil).find_by(active: true)
770 771
  end

772 773 774 775 776 777 778 779
  def deployment_services
    services.where(category: :deployment)
  end

  def deployment_service
    @deployment_service ||= deployment_services.reorder(nil).find_by(active: true)
  end

780 781 782 783 784 785 786 787
  def monitoring_services
    services.where(category: :monitoring)
  end

  def monitoring_service
    @monitoring_service ||= monitoring_services.reorder(nil).find_by(active: true)
  end

Drew Blessing committed
788 789 790 791
  def jira_tracker?
    issues_tracker.to_param == 'jira'
  end

792
  def avatar_type
793 794
    unless self.avatar.image?
      self.errors.add :avatar, 'only images allowed'
795 796 797 798
    end
  end

  def avatar_in_git
799
    repository.avatar
800 801
  end

802 803 804 805
  def avatar_url(**args)
    # We use avatar_path instead of overriding avatar_url because of carrierwave.
    # See https://gitlab.com/gitlab-org/gitlab-ce/merge_requests/11001/diffs#note_28659864
    avatar_path(args) || (Gitlab::Routing.url_helpers.namespace_project_avatar_url(namespace, self) if avatar_in_git)
806 807
  end

808 809 810 811 812
  # For compatibility with old code
  def code
    path
  end

813
  def items_for(entity)
814 815 816 817 818 819 820
    case entity
    when 'issue' then
      issues
    when 'merge_request' then
      merge_requests
    end
  end
821

822
  def send_move_instructions(old_path_with_namespace)
823 824 825
    # New project path needs to be committed to the DB or notification will
    # retrieve stale information
    run_after_commit { NotificationService.new.project_was_moved(self, old_path_with_namespace) }
826
  end
827 828

  def owner
829 830
    if group
      group
831
    else
832
      namespace.try(:owner)
833 834
    end
  end
Dmitriy Zaporozhets committed
835

836 837
  def execute_hooks(data, hooks_scope = :push_hooks)
    hooks.send(hooks_scope).each do |hook|
838
      hook.async_execute(data, hooks_scope.to_s)
839
    end
Dmitriy Zaporozhets committed
840 841
  end

842 843 844
  def execute_services(data, hooks_scope = :push_hooks)
    # Call only service hooks that are active for this scope
    services.send(hooks_scope).each do |service|
845
      service.async_execute(data)
Dmitriy Zaporozhets committed
846 847 848 849
    end
  end

  def valid_repo?
850
    repository.exists?
Dmitriy Zaporozhets committed
851
  rescue
852
    errors.add(:path, 'Invalid repository path')
Dmitriy Zaporozhets committed
853 854 855 856
    false
  end

  def repo
857
    repository.raw
Dmitriy Zaporozhets committed
858 859 860
  end

  def url_to_repo
861
    gitlab_shell.url_to_repo(path_with_namespace)
Dmitriy Zaporozhets committed
862 863 864
  end

  def repo_exists?
865
    @repo_exists ||= repository.exists?
Dmitriy Zaporozhets committed
866 867 868 869 870
  rescue
    @repo_exists = false
  end

  def root_ref?(branch)
871
    repository.root_ref == branch
Dmitriy Zaporozhets committed
872 873 874 875 876 877
  end

  def ssh_url_to_repo
    url_to_repo
  end

878
  def http_url_to_repo(user = nil)
879
    credentials = Gitlab::UrlSanitizer.http_credentials_for_user(user)
880

881
    Gitlab::UrlSanitizer.new("#{web_url}.git", credentials: credentials).full_url
Dmitriy Zaporozhets committed
882 883
  end

884
  def user_can_push_to_empty_repo?(user)
885
    !ProtectedBranch.default_branch_protected? || team.max_member_access(user.id) > Gitlab::Access::DEVELOPER
886 887
  end

888 889 890
  def forked?
    !(forked_project_link.nil? || forked_project_link.forked_from_project.nil?)
  end
891

892 893 894 895
  def personal?
    !group
  end

896
  def rename_repo
897
    path_was = previous_changes['path'].first
898 899
    old_path_with_namespace = File.join(namespace.full_path, path_was)
    new_path_with_namespace = File.join(namespace.full_path, path)
900

901 902
    Rails.logger.error "Attempting to rename #{old_path_with_namespace} -> #{new_path_with_namespace}"

903 904
    expire_caches_before_rename(old_path_with_namespace)

905
    if has_container_registry_tags?
906
      Rails.logger.error "Project #{old_path_with_namespace} cannot be renamed because container registry tags are present!"
907

908 909
      # we currently doesn't support renaming repository if it contains images in container registry
      raise StandardError.new('Project cannot be renamed, because images are present in its container registry')
910 911
    end

912
    if gitlab_shell.mv_repository(repository_storage_path, old_path_with_namespace, new_path_with_namespace)
913
      # If repository moved successfully we need to send update instructions to users.
914 915 916
      # However we cannot allow rollback since we moved repository
      # So we basically we mute exceptions in next actions
      begin
917
        gitlab_shell.mv_repository(repository_storage_path, "#{old_path_with_namespace}.wiki", "#{new_path_with_namespace}.wiki")
918
        send_move_instructions(old_path_with_namespace)
919 920 921 922 923

        @old_path_with_namespace = old_path_with_namespace

        SystemHooksService.new.execute_hooks_for(self, :rename)

924
        @repository = nil
925 926
      rescue => e
        Rails.logger.error "Exception renaming #{old_path_with_namespace} -> #{new_path_with_namespace}: #{e}"
Johannes Schleifenbaum committed
927
        # Returning false does not rollback after_* transaction but gives
928 929 930 931
        # us information about failing some of tasks
        false
      end
    else
932 933
      Rails.logger.error "Repository could not be renamed: #{old_path_with_namespace} -> #{new_path_with_namespace}"

934 935
      # if we cannot move namespace directory we should rollback
      # db changes in order to prevent out of sync between db and fs
936
      raise StandardError.new('repository cannot be renamed')
937
    end
938

939 940
    Gitlab::AppLogger.info "Project was renamed: #{old_path_with_namespace} -> #{new_path_with_namespace}"

941 942
    Gitlab::UploadsTransfer.new.rename_project(path_was, path, namespace.full_path)
    Gitlab::PagesTransfer.new.rename_project(path_was, path, namespace.full_path)
943
  end
944

945 946 947 948 949 950
  # Expires various caches before a project is renamed.
  def expire_caches_before_rename(old_path)
    repo = Repository.new(old_path, self)
    wiki = Repository.new("#{old_path}.wiki", self)

    if repo.exists?
951
      repo.before_delete
952 953 954
    end

    if wiki.exists?
955
      wiki.before_delete
956 957 958
    end
  end

959 960
  def hook_attrs(backward: true)
    attrs = {
Kirill Zaitsev committed
961
      name: name,
962
      description: description,
Kirilll Zaitsev committed
963
      web_url: web_url,
964 965 966
      avatar_url: avatar_url,
      git_ssh_url: ssh_url_to_repo,
      git_http_url: http_url_to_repo,
Kirill Zaitsev committed
967
      namespace: namespace.name,
968 969
      visibility_level: visibility_level,
      path_with_namespace: path_with_namespace,
970
      default_branch: default_branch
Kirill Zaitsev committed
971
    }
972 973 974 975 976 977 978 979 980 981 982 983

    # Backward compatibility
    if backward
      attrs.merge!({
                    homepage: web_url,
                    url: url_to_repo,
                    ssh_url: ssh_url_to_repo,
                    http_url: http_url_to_repo
                  })
    end

    attrs
Kirill Zaitsev committed
984 985
  end

986
  def project_member(user)
987
    project_members.find_by(user_id: user)
988
  end
989 990 991 992

  def default_branch
    @default_branch ||= repository.root_ref if repository.exists?
  end
993 994 995 996 997

  def reload_default_branch
    @default_branch = nil
    default_branch
  end
998

999
  def visibility_level_field
1000
    :visibility_level
1001
  end
1002 1003 1004 1005 1006 1007 1008 1009

  def archive!
    update_attribute(:archived, true)
  end

  def unarchive!
    update_attribute(:archived, false)
  end
1010

1011
  def change_head(branch)
1012
    repository.before_change_head
P.S.V.R committed
1013 1014 1015
    repository.rugged.references.create('HEAD',
                                        "refs/heads/#{branch}",
                                        force: true)
1016
    repository.copy_gitattributes(branch)
1017
    repository.after_change_head
1018 1019
    reload_default_branch
  end
1020 1021 1022 1023

  def forked_from?(project)
    forked? && project == forked_from_project
  end
1024

1025 1026 1027
  def origin_merge_requests
    merge_requests.where(source_project_id: self.id)
  end
1028 1029

  def create_repository
1030 1031
    # Forked import is handled asynchronously
    unless forked?
1032
      if gitlab_shell.add_repository(repository_storage_path, path_with_namespace)
1033
        repository.after_create
1034 1035
        true
      else
1036
        errors.add(:base, 'Failed to create repository via gitlab-shell')
1037 1038
        false
      end
1039 1040 1041 1042 1043 1044 1045 1046 1047 1048
    end
  end

  def repository_exists?
    !!repository.exists?
  end

  def create_wiki
    ProjectWiki.new(self, self.owner).wiki
    true
1049
  rescue ProjectWiki::CouldNotCreateWikiError
1050
    errors.add(:base, 'Failed create wiki')
1051 1052
    false
  end
1053

Drew Blessing committed
1054 1055 1056 1057
  def jira_tracker_active?
    jira_tracker? && jira_service.active
  end

1058
  def allowed_to_share_with_group?
1059
    !namespace.share_with_group_lock
1060 1061
  end

1062 1063 1064
  def pipeline_for(ref, sha = nil)
    sha ||= commit(ref).try(:sha)

1065
    return unless sha
1066

1067
    pipelines.order(id: :desc).find_by(sha: sha, ref: ref)
1068 1069
  end

1070 1071 1072
  def ensure_pipeline(ref, sha, current_user = nil)
    pipeline_for(ref, sha) ||
      pipelines.create(sha: sha, ref: ref, user: current_user)
1073
  end
1074

1075
  def enable_ci
1076
    project_feature.update_attribute(:builds_access_level, ProjectFeature::ENABLED)
1077
  end
1078

1079 1080 1081 1082 1083
  def shared_runners_available?
    shared_runners_enabled?
  end

  def shared_runners
1084
    @shared_runners ||= shared_runners_available? ? Ci::Runner.shared : Ci::Runner.none
1085 1086
  end

1087 1088
  def active_shared_runners
    @active_shared_runners ||= shared_runners.active
1089
  end
1090 1091

  def any_runners?(&block)
Kamil Trzcinski committed
1092
    active_runners.any?(&block) || active_shared_runners.any?(&block)
1093 1094
  end

1095
  def valid_runners_token?(token)
1096
    self.runners_token && ActiveSupport::SecurityUtils.variable_size_secure_compare(token, self.runners_token)
Kamil Trzcinski committed
1097 1098
  end

1099 1100 1101 1102 1103 1104 1105
  def build_timeout_in_minutes
    build_timeout / 60
  end

  def build_timeout_in_minutes=(value)
    self.build_timeout = value.to_i * 60
  end
1106

1107 1108 1109
  def open_issues_count
    issues.opened.count
  end
1110

1111
  def visibility_level_allowed_as_fork?(level = self.visibility_level)
Douwe Maan committed
1112
    return true unless forked?
1113

Douwe Maan committed
1114 1115 1116 1117 1118 1119
    # self.forked_from_project will be nil before the project is saved, so
    # we need to go through the relation
    original_project = forked_project_link.forked_from_project
    return true unless original_project

    level <= original_project.visibility_level
1120
  end
1121

1122 1123
  def visibility_level_allowed_by_group?(level = self.visibility_level)
    return true unless group
1124

1125
    level <= group.visibility_level
1126
  end
1127

1128 1129
  def visibility_level_allowed?(level = self.visibility_level)
    visibility_level_allowed_as_fork?(level) && visibility_level_allowed_by_group?(level)
Felipe Artur committed
1130 1131
  end

1132 1133 1134
  def runners_token
    ensure_runners_token!
  end
1135

1136 1137 1138
  def pages_deployed?
    Dir.exist?(public_pages_path)
  end
1139

1140
  def pages_url
1141 1142
    subdomain, _, url_path = full_path.partition('/')

1143 1144
    # The hostname always needs to be in downcased
    # All web servers convert hostname to lowercase
1145
    host = "#{subdomain}.#{Settings.pages.host}".downcase
1146 1147

    # The host in URL always needs to be downcased
1148
    url = Gitlab.config.pages.url.sub(/^https?:\/\//) do |prefix|
1149
      "#{prefix}#{subdomain}."
1150
    end.downcase
1151

1152
    # If the project path is the same as host, we serve it as group page
1153 1154 1155 1156
    return url if host == url_path

    "#{url}/#{url_path}"
  end
1157

1158 1159
  def pages_subdomain
    full_path.partition('/').first
1160
  end
Kamil Trzcinski committed
1161 1162

  def pages_path
1163
    File.join(Settings.pages.path, path_with_namespace)
Kamil Trzcinski committed
1164 1165 1166 1167 1168 1169 1170
  end

  def public_pages_path
    File.join(pages_path, 'public')
  end

  def remove_pages
1171 1172 1173
    # 1. We rename pages to temporary directory
    # 2. We wait 5 minutes, due to NFS caching
    # 3. We asynchronously remove pages with force
Kamil Trzcinski committed
1174
    temp_path = "#{path}.#{SecureRandom.hex}.deleted"
1175

1176 1177
    if Gitlab::PagesTransfer.new.rename_project(path, temp_path, namespace.full_path)
      PagesWorker.perform_in(5.minutes, :remove, namespace.full_path, temp_path)
1178
    end
Kamil Trzcinski committed
1179 1180
  end

1181 1182 1183
  def wiki
    @wiki ||= ProjectWiki.new(self, self.owner)
  end
1184

Josh Frye committed
1185 1186
  def running_or_pending_build_count(force: false)
    Rails.cache.fetch(['projects', id, 'running_or_pending_build_count'], force: force) do
1187 1188 1189
      builds.running_or_pending.count(:all)
    end
  end
1190

1191
  # Lazy loading of the `pipeline_status` attribute
1192
  def pipeline_status
1193
    @pipeline_status ||= Gitlab::Cache::Ci::ProjectPipelineStatus.load_for_project(self)
1194 1195
  end

1196
  def mark_import_as_failed(error_message)
1197 1198 1199
    original_errors = errors.dup
    sanitized_message = Gitlab::UrlSanitizer.sanitize(error_message)

1200
    import_fail
1201 1202 1203 1204 1205
    update_column(:import_error, sanitized_message)
  rescue ActiveRecord::ActiveRecordError => e
    Rails.logger.error("Error setting import status to failed: #{e.message}. Original error: #{sanitized_message}")
  ensure
    @errors = original_errors
1206
  end
James Lopez committed
1207

1208 1209
  def add_export_job(current_user:)
    job_id = ProjectExportWorker.perform_async(current_user.id, self.id)
1210 1211 1212 1213 1214 1215 1216

    if job_id
      Rails.logger.info "Export job started for project ID #{self.id} with job ID #{job_id}"
    else
      Rails.logger.error "Export job failed to start for project ID #{self.id}"
    end
  end
James Lopez committed
1217 1218

  def export_path
1219
    File.join(Gitlab::ImportExport.storage_path, path_with_namespace)
James Lopez committed
1220
  end
1221 1222 1223 1224 1225 1226 1227 1228 1229

  def export_project_path
    Dir.glob("#{export_path}/*export.tar.gz").max_by { |f| File.ctime(f) }
  end

  def remove_exports
    _, status = Gitlab::Popen.popen(%W(find #{export_path} -not -path #{export_path} -delete))
    status.zero?
  end
1230 1231

  def ensure_dir_exist
1232
    gitlab_shell.add_namespace(repository_storage_path, namespace.full_path)
1233
  end
1234 1235 1236 1237 1238 1239

  def predefined_variables
    [
      { key: 'CI_PROJECT_ID', value: id.to_s, public: true },
      { key: 'CI_PROJECT_NAME', value: path, public: true },
      { key: 'CI_PROJECT_PATH', value: path_with_namespace, public: true },
1240
      { key: 'CI_PROJECT_NAMESPACE', value: namespace.full_path, public: true },
1241 1242 1243 1244 1245 1246 1247 1248 1249 1250 1251
      { key: 'CI_PROJECT_URL', value: web_url, public: true }
    ]
  end

  def container_registry_variables
    return [] unless Gitlab.config.registry.enabled

    variables = [
      { key: 'CI_REGISTRY', value: Gitlab.config.registry.host_port, public: true }
    ]

Kamil Trzcinski committed
1252
    if container_registry_enabled?
1253
      variables << { key: 'CI_REGISTRY_IMAGE', value: container_registry_url, public: true }
Kamil Trzcinski committed
1254 1255
    end

1256 1257 1258 1259 1260 1261 1262 1263
    variables
  end

  def secret_variables
    variables.map do |variable|
      { key: variable.key, value: variable.value, public: false }
    end
  end
1264

1265 1266 1267 1268 1269 1270
  def deployment_variables
    return [] unless deployment_service

    deployment_service.predefined_variables
  end

1271 1272 1273 1274 1275 1276 1277 1278
  def append_or_update_attribute(name, value)
    old_values = public_send(name.to_s)

    if Project.reflect_on_association(name).try(:macro) == :has_many && old_values.any?
      update_attribute(name, old_values + value)
    else
      update_attribute(name, value)
    end
1279 1280 1281

  rescue ActiveRecord::RecordNotSaved => e
    handle_update_attribute_error(e, value)
1282 1283
  end

1284 1285 1286 1287 1288 1289 1290 1291 1292 1293 1294 1295
  def pushes_since_gc
    Gitlab::Redis.with { |redis| redis.get(pushes_since_gc_redis_key).to_i }
  end

  def increment_pushes_since_gc
    Gitlab::Redis.with { |redis| redis.incr(pushes_since_gc_redis_key) }
  end

  def reset_pushes_since_gc
    Gitlab::Redis.with { |redis| redis.del(pushes_since_gc_redis_key) }
  end

Douwe Maan committed
1296
  def route_map_for(commit_sha)
1297 1298
    @route_maps_by_commit ||= Hash.new do |h, sha|
      h[sha] = begin
Douwe Maan committed
1299
        data = repository.route_map_for(sha)
1300 1301
        next unless data

Douwe Maan committed
1302 1303 1304
        Gitlab::RouteMap.new(data)
      rescue Gitlab::RouteMap::FormatError
        nil
1305 1306 1307 1308 1309 1310 1311
      end
    end

    @route_maps_by_commit[commit_sha]
  end

  def public_path_for_source_path(path, commit_sha)
Douwe Maan committed
1312
    map = route_map_for(commit_sha)
1313 1314
    return unless map

Douwe Maan committed
1315
    map.public_path_for_source_path(path)
1316 1317
  end

1318 1319 1320 1321 1322 1323 1324 1325
  def parent
    namespace
  end

  def parent_changed?
    namespace_id_changed?
  end

1326 1327 1328 1329 1330 1331 1332 1333
  def default_merge_request_target
    if forked_from_project&.merge_requests_enabled?
      forked_from_project
    else
      self
    end
  end

1334 1335 1336 1337
  alias_method :name_with_namespace, :full_name
  alias_method :human_name, :full_name
  alias_method :path_with_namespace, :full_path

1338 1339
  private

1340
  def cross_namespace_reference?(from)
1341 1342 1343 1344 1345
    case from
    when Project
      namespace != from.namespace
    when Namespace
      namespace != from
1346 1347 1348
    end
  end

1349
  # Check if a reference is being done cross-project
1350 1351 1352 1353
  def cross_project_reference?(from)
    return true if from.is_a?(Namespace)

    from && self != from
1354 1355
  end

1356 1357 1358 1359
  def pushes_since_gc_redis_key
    "projects/#{id}/pushes_since_gc"
  end

1360 1361 1362 1363 1364 1365 1366
  # Similar to the normal callbacks that hook into the life cycle of an
  # Active Record object, you can also define callbacks that get triggered
  # when you add an object to an association collection. If any of these
  # callbacks throw an exception, the object will not be added to the
  # collection. Before you add a new board to the boards collection if you
  # already have 1, 2, or n it will fail, but it if you have 0 that is lower
  # than the number of permitted boards per project it won't fail.
1367
  def validate_board_limit(board)
1368
    raise BoardLimitExceeded, 'Number of permitted boards exceeded' if boards.size >= NUMBER_OF_PERMITTED_BOARDS
1369
  end
1370

1371 1372 1373 1374
  def update_project_statistics
    stats = statistics || build_statistics
    stats.update(namespace_id: namespace_id)
  end
1375 1376 1377 1378 1379 1380 1381 1382 1383 1384 1385 1386 1387 1388 1389

  def check_pending_delete
    return if valid_attribute?(:name) && valid_attribute?(:path)
    return unless pending_delete_twin

    %i[route route.path name path].each do |error|
      errors.delete(error)
    end

    errors.add(:base, "The project is still being deleted. Please try again later.")
  end

  def pending_delete_twin
    return false unless path

1390
    Project.unscoped.where(pending_delete: true).find_by_full_path(path_with_namespace)
1391
  end
1392 1393 1394 1395 1396 1397 1398 1399 1400

  ##
  # This method is here because of support for legacy container repository
  # which has exactly the same path like project does, but which might not be
  # persisted in `container_repositories` table.
  #
  def has_root_container_repository_tags?
    return false unless Gitlab.config.registry.enabled

1401
    ContainerRepository.build_root_repository(self).has_tags?
1402
  end
1403 1404 1405 1406 1407 1408 1409 1410 1411 1412 1413 1414

  def handle_update_attribute_error(ex, value)
    if ex.message.start_with?('Failed to replace')
      if value.respond_to?(:each)
        invalid = value.detect(&:invalid?)

        raise ex, ([ex.message] + invalid.errors.full_messages).join(' ') if invalid
      end
    end

    raise ex
  end
gitlabhq committed
1415
end