gitlabhq/app/models/project.rb

513 lines
14 KiB
Ruby
Raw Normal View History

2012-11-19 19:24:05 +01:00
# == Schema Information
#
# Table name: projects
#
# id :integer not null, primary key
# name :string(255)
# path :string(255)
# description :text
# created_at :datetime not null
# updated_at :datetime not null
# private_flag :boolean default(TRUE), not null
2013-01-03 20:09:18 +01:00
# creator_id :integer
2012-11-19 19:24:05 +01:00
# default_branch :string(255)
# issues_enabled :boolean default(TRUE), not null
# wall_enabled :boolean default(TRUE), not null
# merge_requests_enabled :boolean default(TRUE), not null
# wiki_enabled :boolean default(TRUE), not null
2012-11-24 21:16:51 +01:00
# namespace_id :integer
2012-11-19 19:24:05 +01:00
#
2011-10-08 23:36:38 +02:00
require "grit"
class Project < ActiveRecord::Base
2013-01-03 08:06:07 +01:00
include Gitolited
class TransferError < StandardError; end
attr_accessible :name, :path, :description, :default_branch, :issues_enabled,
:wall_enabled, :merge_requests_enabled, :wiki_enabled, :public, as: [:default, :admin]
attr_accessible :namespace_id, :creator_id, as: :admin
2012-09-27 08:20:36 +02:00
attr_accessor :error_code
# Relations
belongs_to :creator, foreign_key: "creator_id", class_name: "User"
belongs_to :group, foreign_key: "namespace_id", conditions: "type = 'Group'"
belongs_to :namespace
2012-12-05 16:06:15 +01:00
has_one :last_event, class_name: 'Event', order: 'events.created_at DESC', foreign_key: 'project_id'
2012-11-19 20:34:05 +01:00
has_one :gitlab_ci_service, dependent: :destroy
2011-11-04 08:42:36 +01:00
has_many :events, dependent: :destroy
has_many :merge_requests, dependent: :destroy
has_many :issues, dependent: :destroy, order: "closed, created_at DESC"
has_many :milestones, dependent: :destroy
has_many :users_projects, dependent: :destroy
has_many :notes, dependent: :destroy
has_many :snippets, dependent: :destroy
has_many :deploy_keys, dependent: :destroy, class_name: "Key", foreign_key: "project_id"
has_many :hooks, dependent: :destroy, class_name: "ProjectHook"
has_many :wikis, dependent: :destroy
has_many :protected_branches, dependent: :destroy
has_many :user_team_project_relationships, dependent: :destroy
has_many :users, through: :users_projects
has_many :user_teams, through: :user_team_project_relationships
has_many :user_team_user_relationships, through: :user_teams
has_many :user_teams_members, through: :user_team_user_relationships
delegate :name, to: :owner, allow_nil: true, prefix: true
2012-10-09 02:10:04 +02:00
# Validations
validates :creator, presence: true
2012-10-09 02:10:04 +02:00
validates :description, length: { within: 0..2000 }
2012-12-25 23:50:41 +01:00
validates :name, presence: true, length: { within: 0..255 },
format: { with: Gitlab::Regex.project_name_regex,
2012-12-28 08:29:57 +01:00
message: "only letters, digits, spaces & '_' '-' '.' allowed. Letter should be first" }
validates :path, presence: true, length: { within: 0..255 },
2012-11-28 04:14:05 +01:00
format: { with: Gitlab::Regex.path_regex,
2012-10-09 02:10:04 +02:00
message: "only letters, digits & '_' '-' '.' allowed. Letter should be first" }
validates :issues_enabled, :wall_enabled, :merge_requests_enabled,
:wiki_enabled, inclusion: { in: [true, false] }
validates_uniqueness_of :name, scope: :namespace_id
validates_uniqueness_of :path, scope: :namespace_id
2012-10-09 02:10:04 +02:00
validate :check_limit, :repo_name
# Scopes
scope :without_user, ->(user) { where("id NOT IN (:ids)", ids: user.authorized_projects.map(&:id) ) }
2012-10-03 13:26:37 +02:00
scope :not_in_group, ->(group) { where("id NOT IN (:ids)", ids: group.project_ids ) }
2013-01-25 15:36:14 +01:00
scope :without_team, ->(team) { team.projects.present? ? where("id NOT IN (:ids)", ids: team.projects.map(&:id)) : scoped }
scope :in_team, ->(team) { where("id IN (:ids)", ids: team.projects.map(&:id)) }
scope :in_namespace, ->(namespace) { where(namespace_id: namespace.id) }
scope :sorted_by_activity, ->() { order("(SELECT max(events.created_at) FROM events WHERE events.project_id = projects.id) DESC") }
2012-11-30 04:14:05 +01:00
scope :personal, ->(user) { where(namespace_id: user.namespace_id) }
scope :joined, ->(user) { where("namespace_id != ?", user.namespace_id) }
2013-01-12 20:54:52 +01:00
scope :public, where(public: true)
2011-10-08 23:36:38 +02:00
2012-10-09 02:10:04 +02:00
class << self
2013-01-14 08:37:29 +01:00
def abandoned
project_ids = Event.select('max(created_at) as latest_date, project_id').
group('project_id').
having('latest_date < ?', 6.months.ago).map(&:project_id)
where(id: project_ids)
end
def with_push
includes(:events).where('events.action = ?', Event::Pushed)
end
2012-10-09 02:10:04 +02:00
def active
joins(:issues, :notes, :merge_requests).order("issues.created_at, notes.created_at, merge_requests.created_at DESC")
end
2012-10-09 02:10:04 +02:00
def search query
where("projects.name LIKE :query OR projects.path LIKE :query", query: "%#{query}%")
2012-10-09 02:10:04 +02:00
end
def find_with_namespace(id)
if id.include?("/")
id = id.split("/")
namespace = Namespace.find_by_path(id.first)
return nil unless namespace
where(namespace_id: namespace.id).find_by_path(id.second)
else
where(path: id, namespace_id: nil).last
end
end
2012-10-09 02:10:04 +02:00
def access_options
UsersProject.access_roles
end
end
2013-01-03 20:09:18 +01:00
def team
2013-01-19 19:52:55 +01:00
@team ||= ProjectTeam.new(self)
2013-01-03 20:09:18 +01:00
end
def repository
if path
@repository ||= Repository.new(path_with_namespace, default_branch)
else
nil
end
rescue Grit::NoSuchPathError
nil
2013-01-03 20:09:18 +01:00
end
def git_error?
error_code == :gitolite
end
def saved?
id && valid?
end
def check_limit
unless creator.can_create_project?
errors[:base] << ("Your own projects limit is #{creator.projects_limit}! Please contact administrator to increase it")
end
rescue
2012-08-11 01:47:54 +02:00
errors[:base] << ("Can't check your ability to create project")
2011-10-08 23:36:38 +02:00
end
def repo_name
2012-12-15 11:33:45 +01:00
denied_paths = %w(gitolite-admin admin dashboard groups help profile projects search)
if denied_paths.include?(path)
errors.add(:path, "like #{path} is not allowed")
end
end
2012-07-15 14:29:06 +02:00
def to_param
if namespace
namespace.path + "/" + path
else
path
end
2011-11-06 21:38:08 +01:00
end
def web_url
[Gitlab.config.gitlab.url, path_with_namespace].join("/")
2011-12-13 22:24:31 +01:00
end
def build_commit_note(commit)
notes.new(commit_id: commit.id, noteable_type: "Commit")
2011-10-08 23:36:38 +02:00
end
2011-11-15 09:34:30 +01:00
def last_activity
last_event
2011-10-31 21:57:16 +01:00
end
def last_activity_date
last_event.try(:created_at) || updated_at
2012-03-01 19:40:32 +01:00
end
2012-03-05 23:26:40 +01:00
def project_id
self.id
end
2012-10-09 19:39:06 +02:00
def issues_labels
issues.tag_counts_on(:labels)
end
2012-11-20 13:22:00 +01:00
def services
[gitlab_ci_service].compact
end
2012-11-20 18:34:05 +01:00
def gitlab_ci?
gitlab_ci_service && gitlab_ci_service.active
end
2012-11-23 20:31:09 +01:00
# For compatibility with old code
def code
path
end
2012-11-21 06:24:05 +01:00
def items_for entity
case entity
when 'issue' then
issues
when 'merge_request' then
merge_requests
end
end
def send_move_instructions
self.users_projects.each do |member|
Notify.delay.project_was_moved_email(member.id)
end
end
def owner
if namespace
namespace_owner
else
creator
end
end
2013-01-02 22:35:11 +01:00
def team_member_by_name_or_email(name = nil, email = nil)
user = users.where("name like ? or email like ?", name, email).first
users_projects.where(user: user) if user
end
# Get Team Member record by user id
def team_member_by_id(user_id)
users_projects.find_by_user_id(user_id)
end
def transfer(new_namespace)
Project.transaction do
old_namespace = namespace
self.namespace = new_namespace
old_dir = old_namespace.try(:path) || ''
new_dir = new_namespace.try(:path) || ''
old_repo = if old_dir.present?
File.join(old_dir, self.path)
else
self.path
end
if Project.where(path: self.path, namespace_id: new_namespace.try(:id)).present?
raise TransferError.new("Project with same path in target namespace already exists")
end
Gitlab::ProjectMover.new(self, old_dir, new_dir).execute
2013-01-03 08:06:07 +01:00
gitolite.move_repository(old_repo, self)
2013-01-02 22:35:11 +01:00
save!
end
rescue Gitlab::ProjectMover::ProjectMoveError => ex
raise Project::TransferError.new(ex.message)
end
def name_with_namespace
@name_with_namespace ||= begin
if namespace
namespace.human_name + " / " + name
else
name
end
end
end
def namespace_owner
namespace.try(:owner)
end
def path_with_namespace
if namespace
namespace.path + '/' + path
else
path
end
end
# This method will be called after each post receive and only if the provided
# user is present in GitLab.
#
# All callbacks for post receive should be placed here.
def trigger_post_receive(oldrev, newrev, ref, user)
data = post_receive_data(oldrev, newrev, ref, user)
# Create satellite
self.satellite.create unless self.satellite.exists?
2013-01-02 22:35:11 +01:00
# Create push event
self.observe_push(data)
if push_to_branch? ref, oldrev
# Close merged MR
self.update_merge_requests(oldrev, newrev, ref, user)
# Execute web hooks
self.execute_hooks(data.dup)
# Execute project services
self.execute_services(data.dup)
end
# Discover the default branch, but only if it hasn't already been set to
# something else
2013-01-04 23:35:38 +01:00
if repository && default_branch.nil?
update_attributes(default_branch: self.repository.discover_default_branch)
2013-01-02 22:35:11 +01:00
end
end
def push_to_branch? ref, oldrev
ref_parts = ref.split('/')
# Return if this is not a push to a branch (e.g. new commits)
!(ref_parts[1] !~ /heads/ || oldrev == "00000000000000000000000000000000")
end
def observe_push(data)
Event.create(
project: self,
action: Event::Pushed,
data: data,
author_id: data[:user_id]
)
end
def execute_hooks(data)
hooks.each { |hook| hook.async_execute(data) }
2013-01-02 22:35:11 +01:00
end
def execute_services(data)
services.each do |service|
# Call service hook only if it is active
service.execute(data) if service.active
end
end
# Produce a hash of post-receive data
#
# data = {
# before: String,
# after: String,
# ref: String,
# user_id: String,
# user_name: String,
# repository: {
# name: String,
# url: String,
# description: String,
# homepage: String,
# },
# commits: Array,
# total_commits_count: Fixnum
# }
#
def post_receive_data(oldrev, newrev, ref, user)
push_commits = repository.commits_between(oldrev, newrev)
2013-01-02 22:35:11 +01:00
# Total commits count
push_commits_count = push_commits.size
# Get latest 20 commits ASC
push_commits_limited = push_commits.last(20)
# Hash to be passed as post_receive_data
data = {
before: oldrev,
after: newrev,
ref: ref,
user_id: user.id,
user_name: user.name,
repository: {
name: name,
url: url_to_repo,
description: description,
homepage: web_url,
},
commits: [],
total_commits_count: push_commits_count
}
# For perfomance purposes maximum 20 latest commits
# will be passed as post receive hook data.
#
push_commits_limited.each do |commit|
data[:commits] << {
id: commit.id,
message: commit.safe_message,
timestamp: commit.date.xmlschema,
url: "#{Gitlab.config.gitlab.url}/#{path_with_namespace}/commit/#{commit.id}",
author: {
name: commit.author_name,
email: commit.author_email
}
}
end
data
end
def update_merge_requests(oldrev, newrev, ref, user)
return true unless ref =~ /heads/
branch_name = ref.gsub("refs/heads/", "")
c_ids = self.repository.commits_between(oldrev, newrev).map(&:id)
2013-01-02 22:35:11 +01:00
# Update code for merge requests
mrs = self.merge_requests.opened.find_all_by_branch(branch_name).all
mrs.each { |merge_request| merge_request.reload_code; merge_request.mark_as_unchecked }
# Close merge requests
mrs = self.merge_requests.opened.where(target_branch: branch_name).all
mrs = mrs.select(&:last_commit).select { |mr| c_ids.include?(mr.last_commit.id) }
mrs.each { |merge_request| merge_request.merge!(user.id) }
true
end
def valid_repo?
repo
rescue
errors.add(:path, "Invalid repository path")
false
end
def empty_repo?
!repository || repository.empty?
2013-01-02 22:35:11 +01:00
end
def satellite
@satellite ||= Gitlab::Satellite::Satellite.new(self)
end
def repo
2013-01-03 20:09:18 +01:00
repository.raw
2013-01-02 22:35:11 +01:00
end
def url_to_repo
2013-01-03 08:06:07 +01:00
gitolite.url_to_repo(path_with_namespace)
2013-01-02 22:35:11 +01:00
end
def namespace_dir
namespace.try(:path) || ''
end
def update_repository
GitoliteWorker.perform_async(
:update_repository,
self.id
)
2013-01-02 22:35:11 +01:00
end
def destroy_repository
GitoliteWorker.perform_async(
:remove_repository,
self.path_with_namespace
)
2013-01-02 22:35:11 +01:00
end
def repo_exists?
2013-01-03 20:09:18 +01:00
@repo_exists ||= (repository && repository.branches.present?)
2013-01-02 22:35:11 +01:00
rescue
@repo_exists = false
end
def open_branches
if protected_branches.empty?
self.repo.heads
else
pnames = protected_branches.map(&:name)
self.repo.heads.reject { |h| pnames.include?(h.name) }
end.sort_by(&:name)
end
def root_ref?(branch)
2013-01-03 20:09:18 +01:00
repository.root_ref == branch
2013-01-02 22:35:11 +01:00
end
def ssh_url_to_repo
url_to_repo
end
def http_url_to_repo
http_url = [Gitlab.config.gitlab.url, "/", path_with_namespace, ".git"].join('')
end
def project_access_human(member)
project_user_relation = self.users_projects.find_by_user_id(member.id)
self.class.access_options.key(project_user_relation.project_access)
end
2013-01-02 22:35:11 +01:00
# Check if current branch name is marked as protected in the system
def protected_branch? branch_name
protected_branches.map(&:name).include?(branch_name)
end
2011-10-08 23:36:38 +02:00
end