2012-11-19 19:24:05 +01:00
|
|
|
# == Schema Information
|
|
|
|
#
|
|
|
|
# Table name: projects
|
|
|
|
#
|
|
|
|
# id :integer not null, primary key
|
|
|
|
# name :string(255)
|
|
|
|
# path :string(255)
|
|
|
|
# description :text
|
|
|
|
# created_at :datetime not null
|
|
|
|
# updated_at :datetime not null
|
|
|
|
# private_flag :boolean default(TRUE), not null
|
2013-01-03 20:09:18 +01:00
|
|
|
# creator_id :integer
|
2012-11-19 19:24:05 +01:00
|
|
|
# default_branch :string(255)
|
|
|
|
# issues_enabled :boolean default(TRUE), not null
|
|
|
|
# wall_enabled :boolean default(TRUE), not null
|
|
|
|
# merge_requests_enabled :boolean default(TRUE), not null
|
|
|
|
# wiki_enabled :boolean default(TRUE), not null
|
2012-11-24 21:16:51 +01:00
|
|
|
# namespace_id :integer
|
2012-11-19 19:24:05 +01:00
|
|
|
#
|
|
|
|
|
2011-10-08 23:36:38 +02:00
|
|
|
require "grit"
|
|
|
|
|
|
|
|
class Project < ActiveRecord::Base
|
2013-01-03 08:06:07 +01:00
|
|
|
include Gitolited
|
2012-06-07 14:44:57 +02:00
|
|
|
|
2012-12-13 17:42:15 +01:00
|
|
|
class TransferError < StandardError; end
|
|
|
|
|
2012-11-23 19:11:09 +01:00
|
|
|
attr_accessible :name, :path, :description, :default_branch, :issues_enabled,
|
2012-11-23 05:31:09 +01:00
|
|
|
:wall_enabled, :merge_requests_enabled, :wiki_enabled, as: [:default, :admin]
|
|
|
|
|
2013-01-10 19:17:57 +01:00
|
|
|
attr_accessible :namespace_id, :creator_id, :public, as: :admin
|
2012-11-23 05:31:09 +01:00
|
|
|
|
2012-09-27 08:20:36 +02:00
|
|
|
attr_accessor :error_code
|
2012-09-26 20:17:17 +02:00
|
|
|
|
2012-06-07 14:44:57 +02:00
|
|
|
# Relations
|
2012-11-24 21:39:51 +01:00
|
|
|
belongs_to :group, foreign_key: "namespace_id", conditions: "type = 'Group'"
|
2012-11-22 19:34:16 +01:00
|
|
|
belongs_to :namespace
|
2012-12-05 16:06:15 +01:00
|
|
|
|
2013-01-02 18:00:00 +01:00
|
|
|
belongs_to :creator,
|
|
|
|
class_name: "User",
|
|
|
|
foreign_key: "creator_id"
|
|
|
|
|
2012-08-11 00:07:50 +02:00
|
|
|
has_many :users, through: :users_projects
|
|
|
|
has_many :events, dependent: :destroy
|
|
|
|
has_many :merge_requests, dependent: :destroy
|
|
|
|
has_many :issues, dependent: :destroy, order: "closed, created_at DESC"
|
|
|
|
has_many :milestones, dependent: :destroy
|
|
|
|
has_many :users_projects, dependent: :destroy
|
|
|
|
has_many :notes, dependent: :destroy
|
|
|
|
has_many :snippets, dependent: :destroy
|
|
|
|
has_many :deploy_keys, dependent: :destroy, foreign_key: "project_id", class_name: "Key"
|
|
|
|
has_many :hooks, dependent: :destroy, class_name: "ProjectHook"
|
|
|
|
has_many :wikis, dependent: :destroy
|
|
|
|
has_many :protected_branches, dependent: :destroy
|
2012-10-17 21:02:52 +02:00
|
|
|
has_one :last_event, class_name: 'Event', order: 'events.created_at DESC', foreign_key: 'project_id'
|
2012-11-19 20:34:05 +01:00
|
|
|
has_one :gitlab_ci_service, dependent: :destroy
|
2011-11-04 08:42:36 +01:00
|
|
|
|
2012-10-02 18:01:40 +02:00
|
|
|
delegate :name, to: :owner, allow_nil: true, prefix: true
|
|
|
|
|
2012-10-09 02:10:04 +02:00
|
|
|
# Validations
|
2013-01-02 18:00:00 +01:00
|
|
|
validates :creator, presence: true
|
2012-10-09 02:10:04 +02:00
|
|
|
validates :description, length: { within: 0..2000 }
|
2012-12-25 23:50:41 +01:00
|
|
|
validates :name, presence: true, length: { within: 0..255 },
|
|
|
|
format: { with: Gitlab::Regex.project_name_regex,
|
2012-12-28 08:29:57 +01:00
|
|
|
message: "only letters, digits, spaces & '_' '-' '.' allowed. Letter should be first" }
|
2012-11-23 19:11:09 +01:00
|
|
|
validates :path, presence: true, length: { within: 0..255 },
|
2012-11-28 04:14:05 +01:00
|
|
|
format: { with: Gitlab::Regex.path_regex,
|
2012-10-09 02:10:04 +02:00
|
|
|
message: "only letters, digits & '_' '-' '.' allowed. Letter should be first" }
|
|
|
|
validates :issues_enabled, :wall_enabled, :merge_requests_enabled,
|
|
|
|
:wiki_enabled, inclusion: { in: [true, false] }
|
2012-11-23 07:11:09 +01:00
|
|
|
|
2012-11-23 19:11:09 +01:00
|
|
|
validates_uniqueness_of :name, scope: :namespace_id
|
|
|
|
validates_uniqueness_of :path, scope: :namespace_id
|
|
|
|
|
2012-10-09 02:10:04 +02:00
|
|
|
validate :check_limit, :repo_name
|
|
|
|
|
2012-06-07 14:44:57 +02:00
|
|
|
# Scopes
|
2013-01-02 18:32:34 +01:00
|
|
|
scope :without_user, ->(user) { where("id NOT IN (:ids)", ids: user.authorized_projects.map(&:id) ) }
|
2012-10-03 13:26:37 +02:00
|
|
|
scope :not_in_group, ->(group) { where("id NOT IN (:ids)", ids: group.project_ids ) }
|
2012-12-26 11:22:12 +01:00
|
|
|
scope :in_namespace, ->(namespace) { where(namespace_id: namespace.id) }
|
2012-11-29 15:43:09 +01:00
|
|
|
scope :sorted_by_activity, ->() { order("(SELECT max(events.created_at) FROM events WHERE events.project_id = projects.id) DESC") }
|
2012-11-30 04:14:05 +01:00
|
|
|
scope :personal, ->(user) { where(namespace_id: user.namespace_id) }
|
|
|
|
scope :joined, ->(user) { where("namespace_id != ?", user.namespace_id) }
|
2013-01-12 20:54:52 +01:00
|
|
|
scope :public, where(public: true)
|
2011-10-08 23:36:38 +02:00
|
|
|
|
2012-10-09 02:10:04 +02:00
|
|
|
class << self
|
2013-01-14 08:37:29 +01:00
|
|
|
def abandoned
|
|
|
|
project_ids = Event.select('max(created_at) as latest_date, project_id').
|
|
|
|
group('project_id').
|
|
|
|
having('latest_date < ?', 6.months.ago).map(&:project_id)
|
|
|
|
|
|
|
|
where(id: project_ids)
|
|
|
|
end
|
|
|
|
|
2013-01-14 08:44:27 +01:00
|
|
|
def with_push
|
|
|
|
includes(:events).where('events.action = ?', Event::Pushed)
|
|
|
|
end
|
|
|
|
|
2012-10-09 02:10:04 +02:00
|
|
|
def active
|
|
|
|
joins(:issues, :notes, :merge_requests).order("issues.created_at, notes.created_at, merge_requests.created_at DESC")
|
|
|
|
end
|
2012-06-11 07:52:44 +02:00
|
|
|
|
2012-10-09 02:10:04 +02:00
|
|
|
def search query
|
2012-11-23 19:11:09 +01:00
|
|
|
where("projects.name LIKE :query OR projects.path LIKE :query", query: "%#{query}%")
|
2012-10-09 02:10:04 +02:00
|
|
|
end
|
2012-06-11 07:52:44 +02:00
|
|
|
|
2012-11-24 21:00:30 +01:00
|
|
|
def find_with_namespace(id)
|
|
|
|
if id.include?("/")
|
|
|
|
id = id.split("/")
|
2013-01-02 18:00:00 +01:00
|
|
|
namespace = Namespace.find_by_path(id.first)
|
|
|
|
return nil unless namespace
|
|
|
|
|
|
|
|
where(namespace_id: namespace.id).find_by_path(id.second)
|
2012-11-24 21:00:30 +01:00
|
|
|
else
|
2012-12-13 17:42:15 +01:00
|
|
|
where(path: id, namespace_id: nil).last
|
2012-11-24 21:00:30 +01:00
|
|
|
end
|
|
|
|
end
|
|
|
|
|
2012-10-09 02:10:04 +02:00
|
|
|
def create_by_user(params, user)
|
2012-11-23 19:11:09 +01:00
|
|
|
namespace_id = params.delete(:namespace_id)
|
2012-11-23 05:11:09 +01:00
|
|
|
|
2012-10-09 02:10:04 +02:00
|
|
|
project = Project.new params
|
|
|
|
|
|
|
|
Project.transaction do
|
2012-11-23 07:11:09 +01:00
|
|
|
|
2012-11-23 19:11:09 +01:00
|
|
|
# Parametrize path for project
|
2012-11-23 07:11:09 +01:00
|
|
|
#
|
2012-11-23 19:11:09 +01:00
|
|
|
# Ex.
|
|
|
|
# 'GitLab HQ'.parameterize => "gitlab-hq"
|
|
|
|
#
|
|
|
|
project.path = project.name.dup.parameterize
|
2012-11-23 07:11:09 +01:00
|
|
|
|
2013-01-02 18:00:00 +01:00
|
|
|
project.creator = user
|
2012-11-25 10:57:01 +01:00
|
|
|
|
|
|
|
# Apply namespace if user has access to it
|
|
|
|
# else fallback to user namespace
|
2012-11-27 07:31:15 +01:00
|
|
|
if namespace_id != Namespace.global_id
|
|
|
|
project.namespace_id = user.namespace_id
|
|
|
|
|
|
|
|
if namespace_id
|
|
|
|
group = Group.find_by_id(namespace_id)
|
|
|
|
if user.can? :manage_group, group
|
|
|
|
project.namespace_id = namespace_id
|
|
|
|
end
|
2012-11-25 10:57:01 +01:00
|
|
|
end
|
|
|
|
end
|
|
|
|
|
2012-10-09 02:10:04 +02:00
|
|
|
project.save!
|
|
|
|
|
|
|
|
# Add user as project master
|
|
|
|
project.users_projects.create!(project_access: UsersProject::MASTER, user: user)
|
|
|
|
|
|
|
|
# when project saved no team member exist so
|
|
|
|
# project repository should be updated after first user add
|
|
|
|
project.update_repository
|
|
|
|
end
|
|
|
|
|
|
|
|
project
|
|
|
|
rescue Gitlab::Gitolite::AccessDenied => ex
|
|
|
|
project.error_code = :gitolite
|
|
|
|
project
|
|
|
|
rescue => ex
|
|
|
|
project.error_code = :db
|
|
|
|
project.errors.add(:base, "Can't save project. Please try again later")
|
|
|
|
project
|
2012-06-11 07:52:44 +02:00
|
|
|
end
|
|
|
|
|
2012-10-09 02:10:04 +02:00
|
|
|
def access_options
|
|
|
|
UsersProject.access_roles
|
|
|
|
end
|
2012-07-05 20:59:37 +02:00
|
|
|
end
|
|
|
|
|
2013-01-03 20:09:18 +01:00
|
|
|
def team
|
|
|
|
@team ||= Team.new(self)
|
|
|
|
end
|
|
|
|
|
|
|
|
def repository
|
2013-01-04 07:43:25 +01:00
|
|
|
if path
|
|
|
|
@repository ||= Repository.new(path_with_namespace, default_branch)
|
|
|
|
else
|
|
|
|
nil
|
|
|
|
end
|
|
|
|
rescue Grit::NoSuchPathError
|
|
|
|
nil
|
2013-01-03 20:09:18 +01:00
|
|
|
end
|
|
|
|
|
2012-07-05 20:59:37 +02:00
|
|
|
def git_error?
|
|
|
|
error_code == :gitolite
|
|
|
|
end
|
|
|
|
|
|
|
|
def saved?
|
|
|
|
id && valid?
|
2012-06-11 07:52:44 +02:00
|
|
|
end
|
|
|
|
|
2012-06-07 14:44:57 +02:00
|
|
|
def check_limit
|
2013-01-02 18:00:00 +01:00
|
|
|
unless creator.can_create_project?
|
|
|
|
errors[:base] << ("Your own projects limit is #{creator.projects_limit}! Please contact administrator to increase it")
|
2012-06-07 14:44:57 +02:00
|
|
|
end
|
|
|
|
rescue
|
2012-08-11 01:47:54 +02:00
|
|
|
errors[:base] << ("Can't check your ability to create project")
|
2011-10-08 23:36:38 +02:00
|
|
|
end
|
|
|
|
|
2012-06-07 14:44:57 +02:00
|
|
|
def repo_name
|
2012-12-15 11:33:45 +01:00
|
|
|
denied_paths = %w(gitolite-admin admin dashboard groups help profile projects search)
|
2012-10-30 12:27:15 +01:00
|
|
|
|
|
|
|
if denied_paths.include?(path)
|
|
|
|
errors.add(:path, "like #{path} is not allowed")
|
2012-06-07 14:44:57 +02:00
|
|
|
end
|
|
|
|
end
|
2012-07-15 14:29:06 +02:00
|
|
|
|
2012-06-07 14:44:57 +02:00
|
|
|
def to_param
|
2012-11-22 21:34:06 +01:00
|
|
|
if namespace
|
2012-11-23 19:11:09 +01:00
|
|
|
namespace.path + "/" + path
|
2012-11-22 21:34:06 +01:00
|
|
|
else
|
2012-11-23 19:11:09 +01:00
|
|
|
path
|
2012-11-22 21:34:06 +01:00
|
|
|
end
|
2011-11-06 21:38:08 +01:00
|
|
|
end
|
|
|
|
|
2012-06-07 14:44:57 +02:00
|
|
|
def web_url
|
2012-12-15 01:16:25 +01:00
|
|
|
[Gitlab.config.gitlab.url, path_with_namespace].join("/")
|
2011-12-13 22:24:31 +01:00
|
|
|
end
|
|
|
|
|
2011-11-11 00:28:26 +01:00
|
|
|
def build_commit_note(commit)
|
2012-12-18 19:02:00 +01:00
|
|
|
notes.new(commit_id: commit.id, noteable_type: "Commit")
|
2011-10-08 23:36:38 +02:00
|
|
|
end
|
2011-10-26 15:46:25 +02:00
|
|
|
|
2011-11-15 09:34:30 +01:00
|
|
|
def last_activity
|
2012-10-17 21:02:52 +02:00
|
|
|
last_event
|
2011-10-31 21:57:16 +01:00
|
|
|
end
|
|
|
|
|
|
|
|
def last_activity_date
|
2012-10-17 21:02:52 +02:00
|
|
|
last_event.try(:created_at) || updated_at
|
2012-03-01 19:40:32 +01:00
|
|
|
end
|
2011-12-20 07:24:14 +01:00
|
|
|
|
2012-03-05 23:26:40 +01:00
|
|
|
def project_id
|
|
|
|
self.id
|
|
|
|
end
|
2012-10-09 19:39:06 +02:00
|
|
|
|
|
|
|
def issues_labels
|
|
|
|
issues.tag_counts_on(:labels)
|
|
|
|
end
|
2012-11-20 13:22:00 +01:00
|
|
|
|
|
|
|
def services
|
|
|
|
[gitlab_ci_service].compact
|
|
|
|
end
|
2012-11-20 18:34:05 +01:00
|
|
|
|
|
|
|
def gitlab_ci?
|
|
|
|
gitlab_ci_service && gitlab_ci_service.active
|
|
|
|
end
|
2012-11-22 19:34:16 +01:00
|
|
|
|
2012-11-23 20:31:09 +01:00
|
|
|
# For compatibility with old code
|
|
|
|
def code
|
|
|
|
path
|
2012-11-22 21:34:06 +01:00
|
|
|
end
|
2012-11-24 11:37:30 +01:00
|
|
|
|
2012-11-21 06:24:05 +01:00
|
|
|
def items_for entity
|
|
|
|
case entity
|
|
|
|
when 'issue' then
|
|
|
|
issues
|
|
|
|
when 'merge_request' then
|
|
|
|
merge_requests
|
|
|
|
end
|
|
|
|
end
|
2012-12-20 21:16:51 +01:00
|
|
|
|
|
|
|
def send_move_instructions
|
|
|
|
self.users_projects.each do |member|
|
2013-01-09 06:44:05 +01:00
|
|
|
Notify.delay.project_was_moved_email(member.id)
|
2012-12-20 21:16:51 +01:00
|
|
|
end
|
|
|
|
end
|
2013-01-02 18:00:00 +01:00
|
|
|
|
|
|
|
def owner
|
|
|
|
if namespace
|
|
|
|
namespace_owner
|
|
|
|
else
|
|
|
|
creator
|
|
|
|
end
|
|
|
|
end
|
2013-01-02 22:35:11 +01:00
|
|
|
|
|
|
|
def team_member_by_name_or_email(name = nil, email = nil)
|
|
|
|
user = users.where("name like ? or email like ?", name, email).first
|
|
|
|
users_projects.where(user: user) if user
|
|
|
|
end
|
|
|
|
|
|
|
|
# Get Team Member record by user id
|
|
|
|
def team_member_by_id(user_id)
|
|
|
|
users_projects.find_by_user_id(user_id)
|
|
|
|
end
|
|
|
|
|
|
|
|
def transfer(new_namespace)
|
|
|
|
Project.transaction do
|
|
|
|
old_namespace = namespace
|
|
|
|
self.namespace = new_namespace
|
|
|
|
|
|
|
|
old_dir = old_namespace.try(:path) || ''
|
|
|
|
new_dir = new_namespace.try(:path) || ''
|
|
|
|
|
|
|
|
old_repo = if old_dir.present?
|
|
|
|
File.join(old_dir, self.path)
|
|
|
|
else
|
|
|
|
self.path
|
|
|
|
end
|
|
|
|
|
|
|
|
if Project.where(path: self.path, namespace_id: new_namespace.try(:id)).present?
|
|
|
|
raise TransferError.new("Project with same path in target namespace already exists")
|
|
|
|
end
|
|
|
|
|
|
|
|
Gitlab::ProjectMover.new(self, old_dir, new_dir).execute
|
|
|
|
|
2013-01-03 08:06:07 +01:00
|
|
|
gitolite.move_repository(old_repo, self)
|
2013-01-02 22:35:11 +01:00
|
|
|
|
|
|
|
save!
|
|
|
|
end
|
|
|
|
rescue Gitlab::ProjectMover::ProjectMoveError => ex
|
|
|
|
raise Project::TransferError.new(ex.message)
|
|
|
|
end
|
|
|
|
|
|
|
|
def name_with_namespace
|
|
|
|
@name_with_namespace ||= begin
|
|
|
|
if namespace
|
|
|
|
namespace.human_name + " / " + name
|
|
|
|
else
|
|
|
|
name
|
|
|
|
end
|
|
|
|
end
|
|
|
|
end
|
|
|
|
|
|
|
|
def namespace_owner
|
|
|
|
namespace.try(:owner)
|
|
|
|
end
|
|
|
|
|
|
|
|
def path_with_namespace
|
|
|
|
if namespace
|
|
|
|
namespace.path + '/' + path
|
|
|
|
else
|
|
|
|
path
|
|
|
|
end
|
|
|
|
end
|
|
|
|
|
|
|
|
# This method will be called after each post receive and only if the provided
|
|
|
|
# user is present in GitLab.
|
|
|
|
#
|
|
|
|
# All callbacks for post receive should be placed here.
|
|
|
|
def trigger_post_receive(oldrev, newrev, ref, user)
|
|
|
|
data = post_receive_data(oldrev, newrev, ref, user)
|
|
|
|
|
|
|
|
# Create push event
|
|
|
|
self.observe_push(data)
|
|
|
|
|
|
|
|
if push_to_branch? ref, oldrev
|
|
|
|
# Close merged MR
|
|
|
|
self.update_merge_requests(oldrev, newrev, ref, user)
|
|
|
|
|
|
|
|
# Execute web hooks
|
|
|
|
self.execute_hooks(data.dup)
|
|
|
|
|
|
|
|
# Execute project services
|
|
|
|
self.execute_services(data.dup)
|
|
|
|
end
|
|
|
|
|
|
|
|
# Create satellite
|
|
|
|
self.satellite.create unless self.satellite.exists?
|
|
|
|
|
|
|
|
# Discover the default branch, but only if it hasn't already been set to
|
|
|
|
# something else
|
2013-01-04 23:35:38 +01:00
|
|
|
if repository && default_branch.nil?
|
|
|
|
update_attributes(default_branch: self.repository.discover_default_branch)
|
2013-01-02 22:35:11 +01:00
|
|
|
end
|
|
|
|
end
|
|
|
|
|
|
|
|
def push_to_branch? ref, oldrev
|
|
|
|
ref_parts = ref.split('/')
|
|
|
|
|
|
|
|
# Return if this is not a push to a branch (e.g. new commits)
|
|
|
|
!(ref_parts[1] !~ /heads/ || oldrev == "00000000000000000000000000000000")
|
|
|
|
end
|
|
|
|
|
|
|
|
def observe_push(data)
|
|
|
|
Event.create(
|
|
|
|
project: self,
|
|
|
|
action: Event::Pushed,
|
|
|
|
data: data,
|
|
|
|
author_id: data[:user_id]
|
|
|
|
)
|
|
|
|
end
|
|
|
|
|
|
|
|
def execute_hooks(data)
|
|
|
|
hooks.each { |hook| hook.execute(data) }
|
|
|
|
end
|
|
|
|
|
|
|
|
def execute_services(data)
|
|
|
|
services.each do |service|
|
|
|
|
|
|
|
|
# Call service hook only if it is active
|
|
|
|
service.execute(data) if service.active
|
|
|
|
end
|
|
|
|
end
|
|
|
|
|
|
|
|
# Produce a hash of post-receive data
|
|
|
|
#
|
|
|
|
# data = {
|
|
|
|
# before: String,
|
|
|
|
# after: String,
|
|
|
|
# ref: String,
|
|
|
|
# user_id: String,
|
|
|
|
# user_name: String,
|
|
|
|
# repository: {
|
|
|
|
# name: String,
|
|
|
|
# url: String,
|
|
|
|
# description: String,
|
|
|
|
# homepage: String,
|
|
|
|
# },
|
|
|
|
# commits: Array,
|
|
|
|
# total_commits_count: Fixnum
|
|
|
|
# }
|
|
|
|
#
|
|
|
|
def post_receive_data(oldrev, newrev, ref, user)
|
|
|
|
|
2013-01-04 07:43:25 +01:00
|
|
|
push_commits = repository.commits_between(oldrev, newrev)
|
2013-01-02 22:35:11 +01:00
|
|
|
|
|
|
|
# Total commits count
|
|
|
|
push_commits_count = push_commits.size
|
|
|
|
|
|
|
|
# Get latest 20 commits ASC
|
|
|
|
push_commits_limited = push_commits.last(20)
|
|
|
|
|
|
|
|
# Hash to be passed as post_receive_data
|
|
|
|
data = {
|
|
|
|
before: oldrev,
|
|
|
|
after: newrev,
|
|
|
|
ref: ref,
|
|
|
|
user_id: user.id,
|
|
|
|
user_name: user.name,
|
|
|
|
repository: {
|
|
|
|
name: name,
|
|
|
|
url: url_to_repo,
|
|
|
|
description: description,
|
|
|
|
homepage: web_url,
|
|
|
|
},
|
|
|
|
commits: [],
|
|
|
|
total_commits_count: push_commits_count
|
|
|
|
}
|
|
|
|
|
|
|
|
# For perfomance purposes maximum 20 latest commits
|
|
|
|
# will be passed as post receive hook data.
|
|
|
|
#
|
|
|
|
push_commits_limited.each do |commit|
|
|
|
|
data[:commits] << {
|
|
|
|
id: commit.id,
|
|
|
|
message: commit.safe_message,
|
|
|
|
timestamp: commit.date.xmlschema,
|
|
|
|
url: "#{Gitlab.config.gitlab.url}/#{path_with_namespace}/commit/#{commit.id}",
|
|
|
|
author: {
|
|
|
|
name: commit.author_name,
|
|
|
|
email: commit.author_email
|
|
|
|
}
|
|
|
|
}
|
|
|
|
end
|
|
|
|
|
|
|
|
data
|
|
|
|
end
|
|
|
|
|
|
|
|
def update_merge_requests(oldrev, newrev, ref, user)
|
|
|
|
return true unless ref =~ /heads/
|
|
|
|
branch_name = ref.gsub("refs/heads/", "")
|
2013-01-04 07:43:25 +01:00
|
|
|
c_ids = self.repository.commits_between(oldrev, newrev).map(&:id)
|
2013-01-02 22:35:11 +01:00
|
|
|
|
|
|
|
# Update code for merge requests
|
|
|
|
mrs = self.merge_requests.opened.find_all_by_branch(branch_name).all
|
|
|
|
mrs.each { |merge_request| merge_request.reload_code; merge_request.mark_as_unchecked }
|
|
|
|
|
|
|
|
# Close merge requests
|
|
|
|
mrs = self.merge_requests.opened.where(target_branch: branch_name).all
|
|
|
|
mrs = mrs.select(&:last_commit).select { |mr| c_ids.include?(mr.last_commit.id) }
|
|
|
|
mrs.each { |merge_request| merge_request.merge!(user.id) }
|
|
|
|
|
|
|
|
true
|
|
|
|
end
|
|
|
|
|
|
|
|
def valid_repo?
|
|
|
|
repo
|
|
|
|
rescue
|
|
|
|
errors.add(:path, "Invalid repository path")
|
|
|
|
false
|
|
|
|
end
|
|
|
|
|
|
|
|
def empty_repo?
|
2013-01-04 07:43:25 +01:00
|
|
|
!repository || repository.empty?
|
2013-01-02 22:35:11 +01:00
|
|
|
end
|
|
|
|
|
|
|
|
def satellite
|
|
|
|
@satellite ||= Gitlab::Satellite::Satellite.new(self)
|
|
|
|
end
|
|
|
|
|
|
|
|
def repo
|
2013-01-03 20:09:18 +01:00
|
|
|
repository.raw
|
2013-01-02 22:35:11 +01:00
|
|
|
end
|
|
|
|
|
|
|
|
def url_to_repo
|
2013-01-03 08:06:07 +01:00
|
|
|
gitolite.url_to_repo(path_with_namespace)
|
2013-01-02 22:35:11 +01:00
|
|
|
end
|
|
|
|
|
|
|
|
def namespace_dir
|
|
|
|
namespace.try(:path) || ''
|
|
|
|
end
|
|
|
|
|
|
|
|
def update_repository
|
2013-01-03 08:06:07 +01:00
|
|
|
gitolite.update_repository(self)
|
2013-01-02 22:35:11 +01:00
|
|
|
end
|
|
|
|
|
|
|
|
def destroy_repository
|
2013-01-03 08:06:07 +01:00
|
|
|
gitolite.remove_repository(self)
|
2013-01-02 22:35:11 +01:00
|
|
|
end
|
|
|
|
|
|
|
|
def repo_exists?
|
2013-01-03 20:09:18 +01:00
|
|
|
@repo_exists ||= (repository && repository.branches.present?)
|
2013-01-02 22:35:11 +01:00
|
|
|
rescue
|
|
|
|
@repo_exists = false
|
|
|
|
end
|
|
|
|
|
|
|
|
def open_branches
|
|
|
|
if protected_branches.empty?
|
|
|
|
self.repo.heads
|
|
|
|
else
|
|
|
|
pnames = protected_branches.map(&:name)
|
|
|
|
self.repo.heads.reject { |h| pnames.include?(h.name) }
|
|
|
|
end.sort_by(&:name)
|
|
|
|
end
|
|
|
|
|
|
|
|
def root_ref?(branch)
|
2013-01-03 20:09:18 +01:00
|
|
|
repository.root_ref == branch
|
2013-01-02 22:35:11 +01:00
|
|
|
end
|
|
|
|
|
|
|
|
def ssh_url_to_repo
|
|
|
|
url_to_repo
|
|
|
|
end
|
|
|
|
|
|
|
|
def http_url_to_repo
|
|
|
|
http_url = [Gitlab.config.gitlab.url, "/", path_with_namespace, ".git"].join('')
|
|
|
|
end
|
|
|
|
|
|
|
|
# Check if current branch name is marked as protected in the system
|
|
|
|
def protected_branch? branch_name
|
|
|
|
protected_branches.map(&:name).include?(branch_name)
|
|
|
|
end
|
2011-10-08 23:36:38 +02:00
|
|
|
end
|