##// END OF EJS Templates
api: added function to fetch comments for a repository.
marcink -
r3435:2058136f default
parent child Browse files
Show More
@@ -0,0 +1,107 b''
1 # -*- coding: utf-8 -*-
2
3 # Copyright (C) 2010-2019 RhodeCode GmbH
4 #
5 # This program is free software: you can redistribute it and/or modify
6 # it under the terms of the GNU Affero General Public License, version 3
7 # (only), as published by the Free Software Foundation.
8 #
9 # This program is distributed in the hope that it will be useful,
10 # but WITHOUT ANY WARRANTY; without even the implied warranty of
11 # MERCHANTABILITY or FITNESS FOR A PARTICULAR PURPOSE. See the
12 # GNU General Public License for more details.
13 #
14 # You should have received a copy of the GNU Affero General Public License
15 # along with this program. If not, see <http://www.gnu.org/licenses/>.
16 #
17 # This program is dual-licensed. If you wish to learn more about the
18 # RhodeCode Enterprise Edition, including its added features, Support services,
19 # and proprietary license terms, please see https://rhodecode.com/licenses/
20
21
22 import pytest
23
24 from rhodecode.model.db import User, ChangesetComment
25 from rhodecode.model.meta import Session
26 from rhodecode.model.comment import CommentsModel
27 from rhodecode.api.tests.utils import (
28 build_data, api_call, assert_error, assert_call_ok)
29
30
31 @pytest.fixture()
32 def make_repo_comments_factory(request):
33
34 def maker(repo):
35 user = User.get_first_super_admin()
36 commit = repo.scm_instance()[0]
37
38 commit_id = commit.raw_id
39 file_0 = commit.affected_files[0]
40 comments = []
41
42 # general
43 CommentsModel().create(
44 text='General Comment', repo=repo, user=user, commit_id=commit_id,
45 comment_type=ChangesetComment.COMMENT_TYPE_NOTE, send_email=False)
46
47 # inline
48 CommentsModel().create(
49 text='Inline Comment', repo=repo, user=user, commit_id=commit_id,
50 f_path=file_0, line_no='n1',
51 comment_type=ChangesetComment.COMMENT_TYPE_NOTE, send_email=False)
52
53 # todo
54 CommentsModel().create(
55 text='INLINE TODO Comment', repo=repo, user=user, commit_id=commit_id,
56 f_path=file_0, line_no='n1',
57 comment_type=ChangesetComment.COMMENT_TYPE_TODO, send_email=False)
58
59 @request.addfinalizer
60 def cleanup():
61 for comment in comments:
62 Session().delete(comment)
63 return maker
64
65
66 @pytest.mark.usefixtures("testuser_api", "app")
67 class TestGetRepo(object):
68
69 @pytest.mark.parametrize('filters, expected_count', [
70 ({}, 3),
71 ({'comment_type': ChangesetComment.COMMENT_TYPE_NOTE}, 2),
72 ({'comment_type': ChangesetComment.COMMENT_TYPE_TODO}, 1),
73 ({'commit_id': 'FILLED DYNAMIC'}, 3),
74 ])
75 def test_api_get_repo_comments(self, backend, user_util,
76 make_repo_comments_factory, filters, expected_count):
77 commits = [{'message': 'A'}, {'message': 'B'}]
78 repo = backend.create_repo(commits=commits)
79 make_repo_comments_factory(repo)
80
81 api_call_params = {'repoid': repo.repo_name,}
82 api_call_params.update(filters)
83
84 if 'commit_id' in api_call_params:
85 commit = repo.scm_instance()[0]
86 commit_id = commit.raw_id
87 api_call_params['commit_id'] = commit_id
88
89 id_, params = build_data(self.apikey, 'get_repo_comments', **api_call_params)
90 response = api_call(self.app, params)
91 result = assert_call_ok(id_, given=response.body)
92
93 assert len(result) == expected_count
94
95 def test_api_get_repo_comments_wrong_comment_typ(self, backend_hg):
96
97 repo = backend_hg.create_repo()
98 make_repo_comments_factory(repo)
99
100 api_call_params = {'repoid': repo.repo_name,}
101 api_call_params.update({'comment_type': 'bogus'})
102
103 expected = 'comment_type must be one of `{}` got {}'.format(
104 ChangesetComment.COMMENT_TYPES, 'bogus')
105 id_, params = build_data(self.apikey, 'get_repo_comments', **api_call_params)
106 response = api_call(self.app, params)
107 assert_error(id_, expected, given=response.body)
@@ -1,131 +1,133 b''
1 1 # -*- coding: utf-8 -*-
2 2
3 3 # Copyright (C) 2010-2019 RhodeCode GmbH
4 4 #
5 5 # This program is free software: you can redistribute it and/or modify
6 6 # it under the terms of the GNU Affero General Public License, version 3
7 7 # (only), as published by the Free Software Foundation.
8 8 #
9 9 # This program is distributed in the hope that it will be useful,
10 10 # but WITHOUT ANY WARRANTY; without even the implied warranty of
11 11 # MERCHANTABILITY or FITNESS FOR A PARTICULAR PURPOSE. See the
12 12 # GNU General Public License for more details.
13 13 #
14 14 # You should have received a copy of the GNU Affero General Public License
15 15 # along with this program. If not, see <http://www.gnu.org/licenses/>.
16 16 #
17 17 # This program is dual-licensed. If you wish to learn more about the
18 18 # RhodeCode Enterprise Edition, including its added features, Support services,
19 19 # and proprietary license terms, please see https://rhodecode.com/licenses/
20 20
21 21 import pytest
22 22
23 23 from rhodecode.api.utils import Optional, OAttr
24 24 from rhodecode.api.tests.utils import (
25 25 build_data, api_call, assert_error, assert_ok)
26 26
27 27
28 28 @pytest.mark.usefixtures("testuser_api", "app")
29 29 class TestApi(object):
30 30 maxDiff = None
31 31
32 32 def test_Optional_object(self):
33 33
34 34 option1 = Optional(None)
35 35 assert '<Optional:%s>' % (None,) == repr(option1)
36 36 assert option1() is None
37 37
38 38 assert 1 == Optional.extract(Optional(1))
39 39 assert 'example' == Optional.extract('example')
40 40
41 41 def test_Optional_OAttr(self):
42 42 option1 = Optional(OAttr('apiuser'))
43 43 assert 'apiuser' == Optional.extract(option1)
44 44
45 45 def test_OAttr_object(self):
46 46 oattr1 = OAttr('apiuser')
47 47 assert '<OptionalAttr:apiuser>' == repr(oattr1)
48 48 assert oattr1() == oattr1
49 49
50 50 def test_api_wrong_key(self):
51 51 id_, params = build_data('trololo', 'get_user')
52 52 response = api_call(self.app, params)
53 53
54 54 expected = 'Invalid API KEY'
55 55 assert_error(id_, expected, given=response.body)
56 56
57 57 def test_api_missing_non_optional_param(self):
58 58 id_, params = build_data(self.apikey, 'get_repo')
59 59 response = api_call(self.app, params)
60 60
61 61 expected = 'Missing non optional `repoid` arg in JSON DATA'
62 62 assert_error(id_, expected, given=response.body)
63 63
64 64 def test_api_missing_non_optional_param_args_null(self):
65 65 id_, params = build_data(self.apikey, 'get_repo')
66 66 params = params.replace('"args": {}', '"args": null')
67 67 response = api_call(self.app, params)
68 68
69 69 expected = 'Missing non optional `repoid` arg in JSON DATA'
70 70 assert_error(id_, expected, given=response.body)
71 71
72 72 def test_api_missing_non_optional_param_args_bad(self):
73 73 id_, params = build_data(self.apikey, 'get_repo')
74 74 params = params.replace('"args": {}', '"args": 1')
75 75 response = api_call(self.app, params)
76 76
77 77 expected = 'Missing non optional `repoid` arg in JSON DATA'
78 78 assert_error(id_, expected, given=response.body)
79 79
80 80 def test_api_non_existing_method(self, request):
81 81 id_, params = build_data(self.apikey, 'not_existing', args='xx')
82 82 response = api_call(self.app, params)
83 83 expected = 'No such method: not_existing. Similar methods: none'
84 84 assert_error(id_, expected, given=response.body)
85 85
86 86 def test_api_non_existing_method_have_similar(self, request):
87 87 id_, params = build_data(self.apikey, 'comment', args='xx')
88 88 response = api_call(self.app, params)
89 expected = 'No such method: comment. Similar methods: changeset_comment, comment_pull_request, get_pull_request_comments, comment_commit'
89 expected = 'No such method: comment. ' \
90 'Similar methods: changeset_comment, comment_pull_request, ' \
91 'get_pull_request_comments, comment_commit, get_repo_comments'
90 92 assert_error(id_, expected, given=response.body)
91 93
92 94 def test_api_disabled_user(self, request):
93 95
94 96 def set_active(active):
95 97 from rhodecode.model.db import Session, User
96 98 user = User.get_by_auth_token(self.apikey)
97 99 user.active = active
98 100 Session().add(user)
99 101 Session().commit()
100 102
101 103 request.addfinalizer(lambda: set_active(True))
102 104
103 105 set_active(False)
104 106 id_, params = build_data(self.apikey, 'test', args='xx')
105 107 response = api_call(self.app, params)
106 108 expected = 'Request from this user not allowed'
107 109 assert_error(id_, expected, given=response.body)
108 110
109 111 def test_api_args_is_null(self):
110 112 __, params = build_data(self.apikey, 'get_users', )
111 113 params = params.replace('"args": {}', '"args": null')
112 114 response = api_call(self.app, params)
113 115 assert response.status == '200 OK'
114 116
115 117 def test_api_args_is_bad(self):
116 118 __, params = build_data(self.apikey, 'get_users', )
117 119 params = params.replace('"args": {}', '"args": 1')
118 120 response = api_call(self.app, params)
119 121 assert response.status == '200 OK'
120 122
121 123 def test_api_args_different_args(self):
122 124 import string
123 125 expected = {
124 126 'ascii_letters': string.ascii_letters,
125 127 'ws': string.whitespace,
126 128 'printables': string.printable
127 129 }
128 130 id_, params = build_data(self.apikey, 'test', args=expected)
129 131 response = api_call(self.app, params)
130 132 assert response.status == '200 OK'
131 133 assert_ok(id_, expected, response.body)
@@ -1,59 +1,59 b''
1 1 # -*- coding: utf-8 -*-
2 2
3 3 # Copyright (C) 2010-2019 RhodeCode GmbH
4 4 #
5 5 # This program is free software: you can redistribute it and/or modify
6 6 # it under the terms of the GNU Affero General Public License, version 3
7 7 # (only), as published by the Free Software Foundation.
8 8 #
9 9 # This program is distributed in the hope that it will be useful,
10 10 # but WITHOUT ANY WARRANTY; without even the implied warranty of
11 11 # MERCHANTABILITY or FITNESS FOR A PARTICULAR PURPOSE. See the
12 12 # GNU General Public License for more details.
13 13 #
14 14 # You should have received a copy of the GNU Affero General Public License
15 15 # along with this program. If not, see <http://www.gnu.org/licenses/>.
16 16 #
17 17 # This program is dual-licensed. If you wish to learn more about the
18 18 # RhodeCode Enterprise Edition, including its added features, Support services,
19 19 # and proprietary license terms, please see https://rhodecode.com/licenses/
20 20
21 21
22 22 import pytest
23 23
24 24 from rhodecode.api.tests.utils import build_data, api_call, assert_ok
25 25
26 26
27 27 @pytest.mark.usefixtures("testuser_api", "app")
28 28 class TestGetMethod(object):
29 29 def test_get_methods_no_matches(self):
30 30 id_, params = build_data(self.apikey, 'get_method', pattern='hello')
31 31 response = api_call(self.app, params)
32 32
33 33 expected = []
34 34 assert_ok(id_, expected, given=response.body)
35 35
36 36 def test_get_methods(self):
37 37 id_, params = build_data(self.apikey, 'get_method', pattern='*comment*')
38 38 response = api_call(self.app, params)
39 39
40 40 expected = ['changeset_comment', 'comment_pull_request',
41 'get_pull_request_comments', 'comment_commit']
41 'get_pull_request_comments', 'comment_commit', 'get_repo_comments']
42 42 assert_ok(id_, expected, given=response.body)
43 43
44 44 def test_get_methods_on_single_match(self):
45 45 id_, params = build_data(self.apikey, 'get_method',
46 46 pattern='*comment_commit*')
47 47 response = api_call(self.app, params)
48 48
49 49 expected = ['comment_commit',
50 50 {'apiuser': '<RequiredType>',
51 51 'comment_type': "<Optional:u'note'>",
52 52 'commit_id': '<RequiredType>',
53 53 'message': '<RequiredType>',
54 54 'repoid': '<RequiredType>',
55 55 'request': '<RequiredType>',
56 56 'resolves_comment_id': '<Optional:None>',
57 57 'status': '<Optional:None>',
58 58 'userid': '<Optional:<OptionalAttr:apiuser>>'}]
59 59 assert_ok(id_, expected, given=response.body)
@@ -1,82 +1,83 b''
1 1 # -*- coding: utf-8 -*-
2 2
3 3 # Copyright (C) 2010-2019 RhodeCode GmbH
4 4 #
5 5 # This program is free software: you can redistribute it and/or modify
6 6 # it under the terms of the GNU Affero General Public License, version 3
7 7 # (only), as published by the Free Software Foundation.
8 8 #
9 9 # This program is distributed in the hope that it will be useful,
10 10 # but WITHOUT ANY WARRANTY; without even the implied warranty of
11 11 # MERCHANTABILITY or FITNESS FOR A PARTICULAR PURPOSE. See the
12 12 # GNU General Public License for more details.
13 13 #
14 14 # You should have received a copy of the GNU Affero General Public License
15 15 # along with this program. If not, see <http://www.gnu.org/licenses/>.
16 16 #
17 17 # This program is dual-licensed. If you wish to learn more about the
18 18 # RhodeCode Enterprise Edition, including its added features, Support services,
19 19 # and proprietary license terms, please see https://rhodecode.com/licenses/
20 20
21 21
22 22 import pytest
23 23 import urlobject
24 24
25 25 from rhodecode.api.tests.utils import (
26 26 build_data, api_call, assert_error, assert_ok)
27 27 from rhodecode.lib import helpers as h
28 28 from rhodecode.lib.utils2 import safe_unicode
29 29
30 30 pytestmark = pytest.mark.backends("git", "hg")
31 31
32 32
33 33 @pytest.mark.usefixtures("testuser_api", "app")
34 34 class TestGetPullRequestComments(object):
35 35
36 36 def test_api_get_pull_request_comments(self, pr_util, http_host_only_stub):
37 37 from rhodecode.model.pull_request import PullRequestModel
38 38
39 39 pull_request = pr_util.create_pull_request(mergeable=True)
40 40 id_, params = build_data(
41 41 self.apikey, 'get_pull_request_comments',
42 42 pullrequestid=pull_request.pull_request_id)
43 43
44 44 response = api_call(self.app, params)
45 45
46 46 assert response.status == '200 OK'
47 47 resp_date = response.json['result'][0]['comment_created_on']
48 48 resp_comment_id = response.json['result'][0]['comment_id']
49 49
50 50 expected = [
51 51 {'comment_author': {'active': True,
52 52 'full_name_or_username': 'RhodeCode Admin',
53 53 'username': 'test_admin'},
54 54 'comment_created_on': resp_date,
55 55 'comment_f_path': None,
56 56 'comment_id': resp_comment_id,
57 57 'comment_lineno': None,
58 58 'comment_status': {'status': 'under_review',
59 59 'status_lbl': 'Under Review'},
60 60 'comment_text': 'Auto status change to |new_status|\n\n.. |new_status| replace:: *"Under Review"*',
61 61 'comment_type': 'note',
62 'comment_resolved_by': None,
62 63 'pull_request_version': None}
63 64 ]
64 65 assert_ok(id_, expected, response.body)
65 66
66 67 def test_api_get_pull_request_comments_repo_error(self, pr_util):
67 68 pull_request = pr_util.create_pull_request()
68 69 id_, params = build_data(
69 70 self.apikey, 'get_pull_request_comments',
70 71 repoid=666, pullrequestid=pull_request.pull_request_id)
71 72 response = api_call(self.app, params)
72 73
73 74 expected = 'repository `666` does not exist'
74 75 assert_error(id_, expected, given=response.body)
75 76
76 77 def test_api_get_pull_request_comments_pull_request_error(self):
77 78 id_, params = build_data(
78 79 self.apikey, 'get_pull_request_comments', pullrequestid=666)
79 80 response = api_call(self.app, params)
80 81
81 82 expected = 'pull request `666` does not exist'
82 83 assert_error(id_, expected, given=response.body)
@@ -1,106 +1,117 b''
1 1 # -*- coding: utf-8 -*-
2 2
3 3 # Copyright (C) 2010-2019 RhodeCode GmbH
4 4 #
5 5 # This program is free software: you can redistribute it and/or modify
6 6 # it under the terms of the GNU Affero General Public License, version 3
7 7 # (only), as published by the Free Software Foundation.
8 8 #
9 9 # This program is distributed in the hope that it will be useful,
10 10 # but WITHOUT ANY WARRANTY; without even the implied warranty of
11 11 # MERCHANTABILITY or FITNESS FOR A PARTICULAR PURPOSE. See the
12 12 # GNU General Public License for more details.
13 13 #
14 14 # You should have received a copy of the GNU Affero General Public License
15 15 # along with this program. If not, see <http://www.gnu.org/licenses/>.
16 16 #
17 17 # This program is dual-licensed. If you wish to learn more about the
18 18 # RhodeCode Enterprise Edition, including its added features, Support services,
19 19 # and proprietary license terms, please see https://rhodecode.com/licenses/
20 20
21 21
22 22 import random
23 23
24 24 from rhodecode.api.utils import get_origin
25 25 from rhodecode.lib.ext_json import json
26 26
27 27
28 28 API_URL = '/_admin/api'
29 29
30 30
31 def assert_call_ok(id_, given):
32 expected = jsonify({
33 'id': id_,
34 'error': None,
35 'result': None
36 })
37 given = json.loads(given)
38
39 assert expected['id'] == given['id']
40 assert expected['error'] == given['error']
41 return given['result']
42
43
31 44 def assert_ok(id_, expected, given):
32 45 expected = jsonify({
33 46 'id': id_,
34 47 'error': None,
35 48 'result': expected
36 49 })
37 50 given = json.loads(given)
38 51 assert expected == given
39 52
40 53
41 54 def assert_error(id_, expected, given):
42 55 expected = jsonify({
43 56 'id': id_,
44 57 'error': expected,
45 58 'result': None
46 59 })
47 60 given = json.loads(given)
48 61 assert expected == given
49 62
50 63
51 64 def jsonify(obj):
52 65 return json.loads(json.dumps(obj))
53 66
54 67
55 68 def build_data(apikey, method, **kw):
56 69 """
57 70 Builds API data with given random ID
58
59 :param random_id:
60 71 """
61 72 random_id = random.randrange(1, 9999)
62 73 return random_id, json.dumps({
63 74 "id": random_id,
64 75 "api_key": apikey,
65 76 "method": method,
66 77 "args": kw
67 78 })
68 79
69 80
70 81 def api_call(app, params, status=None):
71 82 response = app.post(
72 83 API_URL, content_type='application/json', params=params, status=status)
73 84 return response
74 85
75 86
76 87 def crash(*args, **kwargs):
77 88 raise Exception('Total Crash !')
78 89
79 90
80 91 def expected_permissions(object_with_permissions):
81 92 """
82 93 Returns the expected permissions structure for the given object.
83 94
84 95 The object is expected to be a `Repository`, `RepositoryGroup`,
85 96 or `UserGroup`. They all implement the same permission handling
86 97 API.
87 98 """
88 99 permissions = []
89 100 for _user in object_with_permissions.permissions():
90 101 user_data = {
91 102 'name': _user.username,
92 103 'permission': _user.permission,
93 104 'origin': get_origin(_user),
94 105 'type': "user",
95 106 }
96 107 permissions.append(user_data)
97 108
98 109 for _user_group in object_with_permissions.permission_user_groups():
99 110 user_group_data = {
100 111 'name': _user_group.users_group_name,
101 112 'permission': _user_group.permission,
102 113 'origin': get_origin(_user_group),
103 114 'type': "user_group",
104 115 }
105 116 permissions.append(user_group_data)
106 117 return permissions
@@ -1,2099 +1,2166 b''
1 1 # -*- coding: utf-8 -*-
2 2
3 3 # Copyright (C) 2011-2019 RhodeCode GmbH
4 4 #
5 5 # This program is free software: you can redistribute it and/or modify
6 6 # it under the terms of the GNU Affero General Public License, version 3
7 7 # (only), as published by the Free Software Foundation.
8 8 #
9 9 # This program is distributed in the hope that it will be useful,
10 10 # but WITHOUT ANY WARRANTY; without even the implied warranty of
11 11 # MERCHANTABILITY or FITNESS FOR A PARTICULAR PURPOSE. See the
12 12 # GNU General Public License for more details.
13 13 #
14 14 # You should have received a copy of the GNU Affero General Public License
15 15 # along with this program. If not, see <http://www.gnu.org/licenses/>.
16 16 #
17 17 # This program is dual-licensed. If you wish to learn more about the
18 18 # RhodeCode Enterprise Edition, including its added features, Support services,
19 19 # and proprietary license terms, please see https://rhodecode.com/licenses/
20 20
21 21 import logging
22 22 import time
23 23
24 24 import rhodecode
25 25 from rhodecode.api import (
26 26 jsonrpc_method, JSONRPCError, JSONRPCForbidden, JSONRPCValidationError)
27 27 from rhodecode.api.utils import (
28 28 has_superadmin_permission, Optional, OAttr, get_repo_or_error,
29 29 get_user_group_or_error, get_user_or_error, validate_repo_permissions,
30 30 get_perm_or_error, parse_args, get_origin, build_commit_data,
31 31 validate_set_owner_permissions)
32 32 from rhodecode.lib import audit_logger
33 33 from rhodecode.lib import repo_maintenance
34 34 from rhodecode.lib.auth import HasPermissionAnyApi, HasUserGroupPermissionAnyApi
35 35 from rhodecode.lib.celerylib.utils import get_task_id
36 36 from rhodecode.lib.utils2 import str2bool, time_to_datetime, safe_str
37 37 from rhodecode.lib.ext_json import json
38 38 from rhodecode.lib.exceptions import StatusChangeOnClosedPullRequestError
39 39 from rhodecode.model.changeset_status import ChangesetStatusModel
40 40 from rhodecode.model.comment import CommentsModel
41 41 from rhodecode.model.db import (
42 42 Session, ChangesetStatus, RepositoryField, Repository, RepoGroup,
43 43 ChangesetComment)
44 44 from rhodecode.model.repo import RepoModel
45 45 from rhodecode.model.scm import ScmModel, RepoList
46 46 from rhodecode.model.settings import SettingsModel, VcsSettingsModel
47 47 from rhodecode.model import validation_schema
48 48 from rhodecode.model.validation_schema.schemas import repo_schema
49 49
50 50 log = logging.getLogger(__name__)
51 51
52 52
53 53 @jsonrpc_method()
54 54 def get_repo(request, apiuser, repoid, cache=Optional(True)):
55 55 """
56 56 Gets an existing repository by its name or repository_id.
57 57
58 58 The members section so the output returns users groups or users
59 59 associated with that repository.
60 60
61 61 This command can only be run using an |authtoken| with admin rights,
62 62 or users with at least read rights to the |repo|.
63 63
64 64 :param apiuser: This is filled automatically from the |authtoken|.
65 65 :type apiuser: AuthUser
66 66 :param repoid: The repository name or repository id.
67 67 :type repoid: str or int
68 68 :param cache: use the cached value for last changeset
69 69 :type: cache: Optional(bool)
70 70
71 71 Example output:
72 72
73 73 .. code-block:: bash
74 74
75 75 {
76 76 "error": null,
77 77 "id": <repo_id>,
78 78 "result": {
79 79 "clone_uri": null,
80 80 "created_on": "timestamp",
81 81 "description": "repo description",
82 82 "enable_downloads": false,
83 83 "enable_locking": false,
84 84 "enable_statistics": false,
85 85 "followers": [
86 86 {
87 87 "active": true,
88 88 "admin": false,
89 89 "api_key": "****************************************",
90 90 "api_keys": [
91 91 "****************************************"
92 92 ],
93 93 "email": "user@example.com",
94 94 "emails": [
95 95 "user@example.com"
96 96 ],
97 97 "extern_name": "rhodecode",
98 98 "extern_type": "rhodecode",
99 99 "firstname": "username",
100 100 "ip_addresses": [],
101 101 "language": null,
102 102 "last_login": "2015-09-16T17:16:35.854",
103 103 "lastname": "surname",
104 104 "user_id": <user_id>,
105 105 "username": "name"
106 106 }
107 107 ],
108 108 "fork_of": "parent-repo",
109 109 "landing_rev": [
110 110 "rev",
111 111 "tip"
112 112 ],
113 113 "last_changeset": {
114 114 "author": "User <user@example.com>",
115 115 "branch": "default",
116 116 "date": "timestamp",
117 117 "message": "last commit message",
118 118 "parents": [
119 119 {
120 120 "raw_id": "commit-id"
121 121 }
122 122 ],
123 123 "raw_id": "commit-id",
124 124 "revision": <revision number>,
125 125 "short_id": "short id"
126 126 },
127 127 "lock_reason": null,
128 128 "locked_by": null,
129 129 "locked_date": null,
130 130 "owner": "owner-name",
131 131 "permissions": [
132 132 {
133 133 "name": "super-admin-name",
134 134 "origin": "super-admin",
135 135 "permission": "repository.admin",
136 136 "type": "user"
137 137 },
138 138 {
139 139 "name": "owner-name",
140 140 "origin": "owner",
141 141 "permission": "repository.admin",
142 142 "type": "user"
143 143 },
144 144 {
145 145 "name": "user-group-name",
146 146 "origin": "permission",
147 147 "permission": "repository.write",
148 148 "type": "user_group"
149 149 }
150 150 ],
151 151 "private": true,
152 152 "repo_id": 676,
153 153 "repo_name": "user-group/repo-name",
154 154 "repo_type": "hg"
155 155 }
156 156 }
157 157 """
158 158
159 159 repo = get_repo_or_error(repoid)
160 160 cache = Optional.extract(cache)
161 161
162 162 include_secrets = False
163 163 if has_superadmin_permission(apiuser):
164 164 include_secrets = True
165 165 else:
166 166 # check if we have at least read permission for this repo !
167 167 _perms = (
168 168 'repository.admin', 'repository.write', 'repository.read',)
169 169 validate_repo_permissions(apiuser, repoid, repo, _perms)
170 170
171 171 permissions = []
172 172 for _user in repo.permissions():
173 173 user_data = {
174 174 'name': _user.username,
175 175 'permission': _user.permission,
176 176 'origin': get_origin(_user),
177 177 'type': "user",
178 178 }
179 179 permissions.append(user_data)
180 180
181 181 for _user_group in repo.permission_user_groups():
182 182 user_group_data = {
183 183 'name': _user_group.users_group_name,
184 184 'permission': _user_group.permission,
185 185 'origin': get_origin(_user_group),
186 186 'type': "user_group",
187 187 }
188 188 permissions.append(user_group_data)
189 189
190 190 following_users = [
191 191 user.user.get_api_data(include_secrets=include_secrets)
192 192 for user in repo.followers]
193 193
194 194 if not cache:
195 195 repo.update_commit_cache()
196 196 data = repo.get_api_data(include_secrets=include_secrets)
197 197 data['permissions'] = permissions
198 198 data['followers'] = following_users
199 199 return data
200 200
201 201
202 202 @jsonrpc_method()
203 203 def get_repos(request, apiuser, root=Optional(None), traverse=Optional(True)):
204 204 """
205 205 Lists all existing repositories.
206 206
207 207 This command can only be run using an |authtoken| with admin rights,
208 208 or users with at least read rights to |repos|.
209 209
210 210 :param apiuser: This is filled automatically from the |authtoken|.
211 211 :type apiuser: AuthUser
212 212 :param root: specify root repository group to fetch repositories.
213 213 filters the returned repositories to be members of given root group.
214 214 :type root: Optional(None)
215 215 :param traverse: traverse given root into subrepositories. With this flag
216 216 set to False, it will only return top-level repositories from `root`.
217 217 if root is empty it will return just top-level repositories.
218 218 :type traverse: Optional(True)
219 219
220 220
221 221 Example output:
222 222
223 223 .. code-block:: bash
224 224
225 225 id : <id_given_in_input>
226 226 result: [
227 227 {
228 228 "repo_id" : "<repo_id>",
229 229 "repo_name" : "<reponame>"
230 230 "repo_type" : "<repo_type>",
231 231 "clone_uri" : "<clone_uri>",
232 232 "private": : "<bool>",
233 233 "created_on" : "<datetimecreated>",
234 234 "description" : "<description>",
235 235 "landing_rev": "<landing_rev>",
236 236 "owner": "<repo_owner>",
237 237 "fork_of": "<name_of_fork_parent>",
238 238 "enable_downloads": "<bool>",
239 239 "enable_locking": "<bool>",
240 240 "enable_statistics": "<bool>",
241 241 },
242 242 ...
243 243 ]
244 244 error: null
245 245 """
246 246
247 247 include_secrets = has_superadmin_permission(apiuser)
248 248 _perms = ('repository.read', 'repository.write', 'repository.admin',)
249 249 extras = {'user': apiuser}
250 250
251 251 root = Optional.extract(root)
252 252 traverse = Optional.extract(traverse, binary=True)
253 253
254 254 if root:
255 255 # verify parent existance, if it's empty return an error
256 256 parent = RepoGroup.get_by_group_name(root)
257 257 if not parent:
258 258 raise JSONRPCError(
259 259 'Root repository group `{}` does not exist'.format(root))
260 260
261 261 if traverse:
262 262 repos = RepoModel().get_repos_for_root(root=root, traverse=traverse)
263 263 else:
264 264 repos = RepoModel().get_repos_for_root(root=parent)
265 265 else:
266 266 if traverse:
267 267 repos = RepoModel().get_all()
268 268 else:
269 269 # return just top-level
270 270 repos = RepoModel().get_repos_for_root(root=None)
271 271
272 272 repo_list = RepoList(repos, perm_set=_perms, extra_kwargs=extras)
273 273 return [repo.get_api_data(include_secrets=include_secrets)
274 274 for repo in repo_list]
275 275
276 276
277 277 @jsonrpc_method()
278 278 def get_repo_changeset(request, apiuser, repoid, revision,
279 279 details=Optional('basic')):
280 280 """
281 281 Returns information about a changeset.
282 282
283 283 Additionally parameters define the amount of details returned by
284 284 this function.
285 285
286 286 This command can only be run using an |authtoken| with admin rights,
287 287 or users with at least read rights to the |repo|.
288 288
289 289 :param apiuser: This is filled automatically from the |authtoken|.
290 290 :type apiuser: AuthUser
291 291 :param repoid: The repository name or repository id
292 292 :type repoid: str or int
293 293 :param revision: revision for which listing should be done
294 294 :type revision: str
295 295 :param details: details can be 'basic|extended|full' full gives diff
296 296 info details like the diff itself, and number of changed files etc.
297 297 :type details: Optional(str)
298 298
299 299 """
300 300 repo = get_repo_or_error(repoid)
301 301 if not has_superadmin_permission(apiuser):
302 302 _perms = (
303 303 'repository.admin', 'repository.write', 'repository.read',)
304 304 validate_repo_permissions(apiuser, repoid, repo, _perms)
305 305
306 306 changes_details = Optional.extract(details)
307 307 _changes_details_types = ['basic', 'extended', 'full']
308 308 if changes_details not in _changes_details_types:
309 309 raise JSONRPCError(
310 310 'ret_type must be one of %s' % (
311 311 ','.join(_changes_details_types)))
312 312
313 313 pre_load = ['author', 'branch', 'date', 'message', 'parents',
314 314 'status', '_commit', '_file_paths']
315 315
316 316 try:
317 317 cs = repo.get_commit(commit_id=revision, pre_load=pre_load)
318 318 except TypeError as e:
319 319 raise JSONRPCError(safe_str(e))
320 320 _cs_json = cs.__json__()
321 321 _cs_json['diff'] = build_commit_data(cs, changes_details)
322 322 if changes_details == 'full':
323 323 _cs_json['refs'] = cs._get_refs()
324 324 return _cs_json
325 325
326 326
327 327 @jsonrpc_method()
328 328 def get_repo_changesets(request, apiuser, repoid, start_rev, limit,
329 329 details=Optional('basic')):
330 330 """
331 331 Returns a set of commits limited by the number starting
332 332 from the `start_rev` option.
333 333
334 334 Additional parameters define the amount of details returned by this
335 335 function.
336 336
337 337 This command can only be run using an |authtoken| with admin rights,
338 338 or users with at least read rights to |repos|.
339 339
340 340 :param apiuser: This is filled automatically from the |authtoken|.
341 341 :type apiuser: AuthUser
342 342 :param repoid: The repository name or repository ID.
343 343 :type repoid: str or int
344 344 :param start_rev: The starting revision from where to get changesets.
345 345 :type start_rev: str
346 346 :param limit: Limit the number of commits to this amount
347 347 :type limit: str or int
348 348 :param details: Set the level of detail returned. Valid option are:
349 349 ``basic``, ``extended`` and ``full``.
350 350 :type details: Optional(str)
351 351
352 352 .. note::
353 353
354 354 Setting the parameter `details` to the value ``full`` is extensive
355 355 and returns details like the diff itself, and the number
356 356 of changed files.
357 357
358 358 """
359 359 repo = get_repo_or_error(repoid)
360 360 if not has_superadmin_permission(apiuser):
361 361 _perms = (
362 362 'repository.admin', 'repository.write', 'repository.read',)
363 363 validate_repo_permissions(apiuser, repoid, repo, _perms)
364 364
365 365 changes_details = Optional.extract(details)
366 366 _changes_details_types = ['basic', 'extended', 'full']
367 367 if changes_details not in _changes_details_types:
368 368 raise JSONRPCError(
369 369 'ret_type must be one of %s' % (
370 370 ','.join(_changes_details_types)))
371 371
372 372 limit = int(limit)
373 373 pre_load = ['author', 'branch', 'date', 'message', 'parents',
374 374 'status', '_commit', '_file_paths']
375 375
376 376 vcs_repo = repo.scm_instance()
377 377 # SVN needs a special case to distinguish its index and commit id
378 378 if vcs_repo and vcs_repo.alias == 'svn' and (start_rev == '0'):
379 379 start_rev = vcs_repo.commit_ids[0]
380 380
381 381 try:
382 382 commits = vcs_repo.get_commits(
383 383 start_id=start_rev, pre_load=pre_load)
384 384 except TypeError as e:
385 385 raise JSONRPCError(safe_str(e))
386 386 except Exception:
387 387 log.exception('Fetching of commits failed')
388 388 raise JSONRPCError('Error occurred during commit fetching')
389 389
390 390 ret = []
391 391 for cnt, commit in enumerate(commits):
392 392 if cnt >= limit != -1:
393 393 break
394 394 _cs_json = commit.__json__()
395 395 _cs_json['diff'] = build_commit_data(commit, changes_details)
396 396 if changes_details == 'full':
397 397 _cs_json['refs'] = {
398 398 'branches': [commit.branch],
399 399 'bookmarks': getattr(commit, 'bookmarks', []),
400 400 'tags': commit.tags
401 401 }
402 402 ret.append(_cs_json)
403 403 return ret
404 404
405 405
406 406 @jsonrpc_method()
407 407 def get_repo_nodes(request, apiuser, repoid, revision, root_path,
408 408 ret_type=Optional('all'), details=Optional('basic'),
409 409 max_file_bytes=Optional(None)):
410 410 """
411 411 Returns a list of nodes and children in a flat list for a given
412 412 path at given revision.
413 413
414 414 It's possible to specify ret_type to show only `files` or `dirs`.
415 415
416 416 This command can only be run using an |authtoken| with admin rights,
417 417 or users with at least read rights to |repos|.
418 418
419 419 :param apiuser: This is filled automatically from the |authtoken|.
420 420 :type apiuser: AuthUser
421 421 :param repoid: The repository name or repository ID.
422 422 :type repoid: str or int
423 423 :param revision: The revision for which listing should be done.
424 424 :type revision: str
425 425 :param root_path: The path from which to start displaying.
426 426 :type root_path: str
427 427 :param ret_type: Set the return type. Valid options are
428 428 ``all`` (default), ``files`` and ``dirs``.
429 429 :type ret_type: Optional(str)
430 430 :param details: Returns extended information about nodes, such as
431 431 md5, binary, and or content. The valid options are ``basic`` and
432 432 ``full``.
433 433 :type details: Optional(str)
434 434 :param max_file_bytes: Only return file content under this file size bytes
435 435 :type details: Optional(int)
436 436
437 437 Example output:
438 438
439 439 .. code-block:: bash
440 440
441 441 id : <id_given_in_input>
442 442 result: [
443 443 {
444 444 "name" : "<name>"
445 445 "type" : "<type>",
446 446 "binary": "<true|false>" (only in extended mode)
447 447 "md5" : "<md5 of file content>" (only in extended mode)
448 448 },
449 449 ...
450 450 ]
451 451 error: null
452 452 """
453 453
454 454 repo = get_repo_or_error(repoid)
455 455 if not has_superadmin_permission(apiuser):
456 456 _perms = (
457 457 'repository.admin', 'repository.write', 'repository.read',)
458 458 validate_repo_permissions(apiuser, repoid, repo, _perms)
459 459
460 460 ret_type = Optional.extract(ret_type)
461 461 details = Optional.extract(details)
462 462 _extended_types = ['basic', 'full']
463 463 if details not in _extended_types:
464 464 raise JSONRPCError(
465 465 'ret_type must be one of %s' % (','.join(_extended_types)))
466 466 extended_info = False
467 467 content = False
468 468 if details == 'basic':
469 469 extended_info = True
470 470
471 471 if details == 'full':
472 472 extended_info = content = True
473 473
474 474 _map = {}
475 475 try:
476 476 # check if repo is not empty by any chance, skip quicker if it is.
477 477 _scm = repo.scm_instance()
478 478 if _scm.is_empty():
479 479 return []
480 480
481 481 _d, _f = ScmModel().get_nodes(
482 482 repo, revision, root_path, flat=False,
483 483 extended_info=extended_info, content=content,
484 484 max_file_bytes=max_file_bytes)
485 485 _map = {
486 486 'all': _d + _f,
487 487 'files': _f,
488 488 'dirs': _d,
489 489 }
490 490 return _map[ret_type]
491 491 except KeyError:
492 492 raise JSONRPCError(
493 493 'ret_type must be one of %s' % (','.join(sorted(_map.keys()))))
494 494 except Exception:
495 495 log.exception("Exception occurred while trying to get repo nodes")
496 496 raise JSONRPCError(
497 497 'failed to get repo: `%s` nodes' % repo.repo_name
498 498 )
499 499
500 500
501 501 @jsonrpc_method()
502 502 def get_repo_refs(request, apiuser, repoid):
503 503 """
504 504 Returns a dictionary of current references. It returns
505 505 bookmarks, branches, closed_branches, and tags for given repository
506 506
507 507 It's possible to specify ret_type to show only `files` or `dirs`.
508 508
509 509 This command can only be run using an |authtoken| with admin rights,
510 510 or users with at least read rights to |repos|.
511 511
512 512 :param apiuser: This is filled automatically from the |authtoken|.
513 513 :type apiuser: AuthUser
514 514 :param repoid: The repository name or repository ID.
515 515 :type repoid: str or int
516 516
517 517 Example output:
518 518
519 519 .. code-block:: bash
520 520
521 521 id : <id_given_in_input>
522 522 "result": {
523 523 "bookmarks": {
524 524 "dev": "5611d30200f4040ba2ab4f3d64e5b06408a02188",
525 525 "master": "367f590445081d8ec8c2ea0456e73ae1f1c3d6cf"
526 526 },
527 527 "branches": {
528 528 "default": "5611d30200f4040ba2ab4f3d64e5b06408a02188",
529 529 "stable": "367f590445081d8ec8c2ea0456e73ae1f1c3d6cf"
530 530 },
531 531 "branches_closed": {},
532 532 "tags": {
533 533 "tip": "5611d30200f4040ba2ab4f3d64e5b06408a02188",
534 534 "v4.4.0": "1232313f9e6adac5ce5399c2a891dc1e72b79022",
535 535 "v4.4.1": "cbb9f1d329ae5768379cdec55a62ebdd546c4e27",
536 536 "v4.4.2": "24ffe44a27fcd1c5b6936144e176b9f6dd2f3a17",
537 537 }
538 538 }
539 539 error: null
540 540 """
541 541
542 542 repo = get_repo_or_error(repoid)
543 543 if not has_superadmin_permission(apiuser):
544 544 _perms = ('repository.admin', 'repository.write', 'repository.read',)
545 545 validate_repo_permissions(apiuser, repoid, repo, _perms)
546 546
547 547 try:
548 548 # check if repo is not empty by any chance, skip quicker if it is.
549 549 vcs_instance = repo.scm_instance()
550 550 refs = vcs_instance.refs()
551 551 return refs
552 552 except Exception:
553 553 log.exception("Exception occurred while trying to get repo refs")
554 554 raise JSONRPCError(
555 555 'failed to get repo: `%s` references' % repo.repo_name
556 556 )
557 557
558 558
559 559 @jsonrpc_method()
560 560 def create_repo(
561 561 request, apiuser, repo_name, repo_type,
562 562 owner=Optional(OAttr('apiuser')),
563 563 description=Optional(''),
564 564 private=Optional(False),
565 565 clone_uri=Optional(None),
566 566 push_uri=Optional(None),
567 567 landing_rev=Optional('rev:tip'),
568 568 enable_statistics=Optional(False),
569 569 enable_locking=Optional(False),
570 570 enable_downloads=Optional(False),
571 571 copy_permissions=Optional(False)):
572 572 """
573 573 Creates a repository.
574 574
575 575 * If the repository name contains "/", repository will be created inside
576 576 a repository group or nested repository groups
577 577
578 578 For example "foo/bar/repo1" will create |repo| called "repo1" inside
579 579 group "foo/bar". You have to have permissions to access and write to
580 580 the last repository group ("bar" in this example)
581 581
582 582 This command can only be run using an |authtoken| with at least
583 583 permissions to create repositories, or write permissions to
584 584 parent repository groups.
585 585
586 586 :param apiuser: This is filled automatically from the |authtoken|.
587 587 :type apiuser: AuthUser
588 588 :param repo_name: Set the repository name.
589 589 :type repo_name: str
590 590 :param repo_type: Set the repository type; 'hg','git', or 'svn'.
591 591 :type repo_type: str
592 592 :param owner: user_id or username
593 593 :type owner: Optional(str)
594 594 :param description: Set the repository description.
595 595 :type description: Optional(str)
596 596 :param private: set repository as private
597 597 :type private: bool
598 598 :param clone_uri: set clone_uri
599 599 :type clone_uri: str
600 600 :param push_uri: set push_uri
601 601 :type push_uri: str
602 602 :param landing_rev: <rev_type>:<rev>
603 603 :type landing_rev: str
604 604 :param enable_locking:
605 605 :type enable_locking: bool
606 606 :param enable_downloads:
607 607 :type enable_downloads: bool
608 608 :param enable_statistics:
609 609 :type enable_statistics: bool
610 610 :param copy_permissions: Copy permission from group in which the
611 611 repository is being created.
612 612 :type copy_permissions: bool
613 613
614 614
615 615 Example output:
616 616
617 617 .. code-block:: bash
618 618
619 619 id : <id_given_in_input>
620 620 result: {
621 621 "msg": "Created new repository `<reponame>`",
622 622 "success": true,
623 623 "task": "<celery task id or None if done sync>"
624 624 }
625 625 error: null
626 626
627 627
628 628 Example error output:
629 629
630 630 .. code-block:: bash
631 631
632 632 id : <id_given_in_input>
633 633 result : null
634 634 error : {
635 635 'failed to create repository `<repo_name>`'
636 636 }
637 637
638 638 """
639 639
640 640 owner = validate_set_owner_permissions(apiuser, owner)
641 641
642 642 description = Optional.extract(description)
643 643 copy_permissions = Optional.extract(copy_permissions)
644 644 clone_uri = Optional.extract(clone_uri)
645 645 push_uri = Optional.extract(push_uri)
646 646 landing_commit_ref = Optional.extract(landing_rev)
647 647
648 648 defs = SettingsModel().get_default_repo_settings(strip_prefix=True)
649 649 if isinstance(private, Optional):
650 650 private = defs.get('repo_private') or Optional.extract(private)
651 651 if isinstance(repo_type, Optional):
652 652 repo_type = defs.get('repo_type')
653 653 if isinstance(enable_statistics, Optional):
654 654 enable_statistics = defs.get('repo_enable_statistics')
655 655 if isinstance(enable_locking, Optional):
656 656 enable_locking = defs.get('repo_enable_locking')
657 657 if isinstance(enable_downloads, Optional):
658 658 enable_downloads = defs.get('repo_enable_downloads')
659 659
660 660 schema = repo_schema.RepoSchema().bind(
661 661 repo_type_options=rhodecode.BACKENDS.keys(),
662 662 repo_type=repo_type,
663 663 # user caller
664 664 user=apiuser)
665 665
666 666 try:
667 667 schema_data = schema.deserialize(dict(
668 668 repo_name=repo_name,
669 669 repo_type=repo_type,
670 670 repo_owner=owner.username,
671 671 repo_description=description,
672 672 repo_landing_commit_ref=landing_commit_ref,
673 673 repo_clone_uri=clone_uri,
674 674 repo_push_uri=push_uri,
675 675 repo_private=private,
676 676 repo_copy_permissions=copy_permissions,
677 677 repo_enable_statistics=enable_statistics,
678 678 repo_enable_downloads=enable_downloads,
679 679 repo_enable_locking=enable_locking))
680 680 except validation_schema.Invalid as err:
681 681 raise JSONRPCValidationError(colander_exc=err)
682 682
683 683 try:
684 684 data = {
685 685 'owner': owner,
686 686 'repo_name': schema_data['repo_group']['repo_name_without_group'],
687 687 'repo_name_full': schema_data['repo_name'],
688 688 'repo_group': schema_data['repo_group']['repo_group_id'],
689 689 'repo_type': schema_data['repo_type'],
690 690 'repo_description': schema_data['repo_description'],
691 691 'repo_private': schema_data['repo_private'],
692 692 'clone_uri': schema_data['repo_clone_uri'],
693 693 'push_uri': schema_data['repo_push_uri'],
694 694 'repo_landing_rev': schema_data['repo_landing_commit_ref'],
695 695 'enable_statistics': schema_data['repo_enable_statistics'],
696 696 'enable_locking': schema_data['repo_enable_locking'],
697 697 'enable_downloads': schema_data['repo_enable_downloads'],
698 698 'repo_copy_permissions': schema_data['repo_copy_permissions'],
699 699 }
700 700
701 701 task = RepoModel().create(form_data=data, cur_user=owner.user_id)
702 702 task_id = get_task_id(task)
703 703 # no commit, it's done in RepoModel, or async via celery
704 704 return {
705 705 'msg': "Created new repository `%s`" % (schema_data['repo_name'],),
706 706 'success': True, # cannot return the repo data here since fork
707 707 # can be done async
708 708 'task': task_id
709 709 }
710 710 except Exception:
711 711 log.exception(
712 712 u"Exception while trying to create the repository %s",
713 713 schema_data['repo_name'])
714 714 raise JSONRPCError(
715 715 'failed to create repository `%s`' % (schema_data['repo_name'],))
716 716
717 717
718 718 @jsonrpc_method()
719 719 def add_field_to_repo(request, apiuser, repoid, key, label=Optional(''),
720 720 description=Optional('')):
721 721 """
722 722 Adds an extra field to a repository.
723 723
724 724 This command can only be run using an |authtoken| with at least
725 725 write permissions to the |repo|.
726 726
727 727 :param apiuser: This is filled automatically from the |authtoken|.
728 728 :type apiuser: AuthUser
729 729 :param repoid: Set the repository name or repository id.
730 730 :type repoid: str or int
731 731 :param key: Create a unique field key for this repository.
732 732 :type key: str
733 733 :param label:
734 734 :type label: Optional(str)
735 735 :param description:
736 736 :type description: Optional(str)
737 737 """
738 738 repo = get_repo_or_error(repoid)
739 739 if not has_superadmin_permission(apiuser):
740 740 _perms = ('repository.admin',)
741 741 validate_repo_permissions(apiuser, repoid, repo, _perms)
742 742
743 743 label = Optional.extract(label) or key
744 744 description = Optional.extract(description)
745 745
746 746 field = RepositoryField.get_by_key_name(key, repo)
747 747 if field:
748 748 raise JSONRPCError('Field with key '
749 749 '`%s` exists for repo `%s`' % (key, repoid))
750 750
751 751 try:
752 752 RepoModel().add_repo_field(repo, key, field_label=label,
753 753 field_desc=description)
754 754 Session().commit()
755 755 return {
756 756 'msg': "Added new repository field `%s`" % (key,),
757 757 'success': True,
758 758 }
759 759 except Exception:
760 760 log.exception("Exception occurred while trying to add field to repo")
761 761 raise JSONRPCError(
762 762 'failed to create new field for repository `%s`' % (repoid,))
763 763
764 764
765 765 @jsonrpc_method()
766 766 def remove_field_from_repo(request, apiuser, repoid, key):
767 767 """
768 768 Removes an extra field from a repository.
769 769
770 770 This command can only be run using an |authtoken| with at least
771 771 write permissions to the |repo|.
772 772
773 773 :param apiuser: This is filled automatically from the |authtoken|.
774 774 :type apiuser: AuthUser
775 775 :param repoid: Set the repository name or repository ID.
776 776 :type repoid: str or int
777 777 :param key: Set the unique field key for this repository.
778 778 :type key: str
779 779 """
780 780
781 781 repo = get_repo_or_error(repoid)
782 782 if not has_superadmin_permission(apiuser):
783 783 _perms = ('repository.admin',)
784 784 validate_repo_permissions(apiuser, repoid, repo, _perms)
785 785
786 786 field = RepositoryField.get_by_key_name(key, repo)
787 787 if not field:
788 788 raise JSONRPCError('Field with key `%s` does not '
789 789 'exists for repo `%s`' % (key, repoid))
790 790
791 791 try:
792 792 RepoModel().delete_repo_field(repo, field_key=key)
793 793 Session().commit()
794 794 return {
795 795 'msg': "Deleted repository field `%s`" % (key,),
796 796 'success': True,
797 797 }
798 798 except Exception:
799 799 log.exception(
800 800 "Exception occurred while trying to delete field from repo")
801 801 raise JSONRPCError(
802 802 'failed to delete field for repository `%s`' % (repoid,))
803 803
804 804
805 805 @jsonrpc_method()
806 806 def update_repo(
807 807 request, apiuser, repoid, repo_name=Optional(None),
808 808 owner=Optional(OAttr('apiuser')), description=Optional(''),
809 809 private=Optional(False),
810 810 clone_uri=Optional(None), push_uri=Optional(None),
811 811 landing_rev=Optional('rev:tip'), fork_of=Optional(None),
812 812 enable_statistics=Optional(False),
813 813 enable_locking=Optional(False),
814 814 enable_downloads=Optional(False), fields=Optional('')):
815 815 """
816 816 Updates a repository with the given information.
817 817
818 818 This command can only be run using an |authtoken| with at least
819 819 admin permissions to the |repo|.
820 820
821 821 * If the repository name contains "/", repository will be updated
822 822 accordingly with a repository group or nested repository groups
823 823
824 824 For example repoid=repo-test name="foo/bar/repo-test" will update |repo|
825 825 called "repo-test" and place it inside group "foo/bar".
826 826 You have to have permissions to access and write to the last repository
827 827 group ("bar" in this example)
828 828
829 829 :param apiuser: This is filled automatically from the |authtoken|.
830 830 :type apiuser: AuthUser
831 831 :param repoid: repository name or repository ID.
832 832 :type repoid: str or int
833 833 :param repo_name: Update the |repo| name, including the
834 834 repository group it's in.
835 835 :type repo_name: str
836 836 :param owner: Set the |repo| owner.
837 837 :type owner: str
838 838 :param fork_of: Set the |repo| as fork of another |repo|.
839 839 :type fork_of: str
840 840 :param description: Update the |repo| description.
841 841 :type description: str
842 842 :param private: Set the |repo| as private. (True | False)
843 843 :type private: bool
844 844 :param clone_uri: Update the |repo| clone URI.
845 845 :type clone_uri: str
846 846 :param landing_rev: Set the |repo| landing revision. Default is ``rev:tip``.
847 847 :type landing_rev: str
848 848 :param enable_statistics: Enable statistics on the |repo|, (True | False).
849 849 :type enable_statistics: bool
850 850 :param enable_locking: Enable |repo| locking.
851 851 :type enable_locking: bool
852 852 :param enable_downloads: Enable downloads from the |repo|, (True | False).
853 853 :type enable_downloads: bool
854 854 :param fields: Add extra fields to the |repo|. Use the following
855 855 example format: ``field_key=field_val,field_key2=fieldval2``.
856 856 Escape ', ' with \,
857 857 :type fields: str
858 858 """
859 859
860 860 repo = get_repo_or_error(repoid)
861 861
862 862 include_secrets = False
863 863 if not has_superadmin_permission(apiuser):
864 864 validate_repo_permissions(apiuser, repoid, repo, ('repository.admin',))
865 865 else:
866 866 include_secrets = True
867 867
868 868 updates = dict(
869 869 repo_name=repo_name
870 870 if not isinstance(repo_name, Optional) else repo.repo_name,
871 871
872 872 fork_id=fork_of
873 873 if not isinstance(fork_of, Optional) else repo.fork.repo_name if repo.fork else None,
874 874
875 875 user=owner
876 876 if not isinstance(owner, Optional) else repo.user.username,
877 877
878 878 repo_description=description
879 879 if not isinstance(description, Optional) else repo.description,
880 880
881 881 repo_private=private
882 882 if not isinstance(private, Optional) else repo.private,
883 883
884 884 clone_uri=clone_uri
885 885 if not isinstance(clone_uri, Optional) else repo.clone_uri,
886 886
887 887 push_uri=push_uri
888 888 if not isinstance(push_uri, Optional) else repo.push_uri,
889 889
890 890 repo_landing_rev=landing_rev
891 891 if not isinstance(landing_rev, Optional) else repo._landing_revision,
892 892
893 893 repo_enable_statistics=enable_statistics
894 894 if not isinstance(enable_statistics, Optional) else repo.enable_statistics,
895 895
896 896 repo_enable_locking=enable_locking
897 897 if not isinstance(enable_locking, Optional) else repo.enable_locking,
898 898
899 899 repo_enable_downloads=enable_downloads
900 900 if not isinstance(enable_downloads, Optional) else repo.enable_downloads)
901 901
902 902 ref_choices, _labels = ScmModel().get_repo_landing_revs(
903 903 request.translate, repo=repo)
904 904
905 905 old_values = repo.get_api_data()
906 906 repo_type = repo.repo_type
907 907 schema = repo_schema.RepoSchema().bind(
908 908 repo_type_options=rhodecode.BACKENDS.keys(),
909 909 repo_ref_options=ref_choices,
910 910 repo_type=repo_type,
911 911 # user caller
912 912 user=apiuser,
913 913 old_values=old_values)
914 914 try:
915 915 schema_data = schema.deserialize(dict(
916 916 # we save old value, users cannot change type
917 917 repo_type=repo_type,
918 918
919 919 repo_name=updates['repo_name'],
920 920 repo_owner=updates['user'],
921 921 repo_description=updates['repo_description'],
922 922 repo_clone_uri=updates['clone_uri'],
923 923 repo_push_uri=updates['push_uri'],
924 924 repo_fork_of=updates['fork_id'],
925 925 repo_private=updates['repo_private'],
926 926 repo_landing_commit_ref=updates['repo_landing_rev'],
927 927 repo_enable_statistics=updates['repo_enable_statistics'],
928 928 repo_enable_downloads=updates['repo_enable_downloads'],
929 929 repo_enable_locking=updates['repo_enable_locking']))
930 930 except validation_schema.Invalid as err:
931 931 raise JSONRPCValidationError(colander_exc=err)
932 932
933 933 # save validated data back into the updates dict
934 934 validated_updates = dict(
935 935 repo_name=schema_data['repo_group']['repo_name_without_group'],
936 936 repo_group=schema_data['repo_group']['repo_group_id'],
937 937
938 938 user=schema_data['repo_owner'],
939 939 repo_description=schema_data['repo_description'],
940 940 repo_private=schema_data['repo_private'],
941 941 clone_uri=schema_data['repo_clone_uri'],
942 942 push_uri=schema_data['repo_push_uri'],
943 943 repo_landing_rev=schema_data['repo_landing_commit_ref'],
944 944 repo_enable_statistics=schema_data['repo_enable_statistics'],
945 945 repo_enable_locking=schema_data['repo_enable_locking'],
946 946 repo_enable_downloads=schema_data['repo_enable_downloads'],
947 947 )
948 948
949 949 if schema_data['repo_fork_of']:
950 950 fork_repo = get_repo_or_error(schema_data['repo_fork_of'])
951 951 validated_updates['fork_id'] = fork_repo.repo_id
952 952
953 953 # extra fields
954 954 fields = parse_args(Optional.extract(fields), key_prefix='ex_')
955 955 if fields:
956 956 validated_updates.update(fields)
957 957
958 958 try:
959 959 RepoModel().update(repo, **validated_updates)
960 960 audit_logger.store_api(
961 961 'repo.edit', action_data={'old_data': old_values},
962 962 user=apiuser, repo=repo)
963 963 Session().commit()
964 964 return {
965 965 'msg': 'updated repo ID:%s %s' % (repo.repo_id, repo.repo_name),
966 966 'repository': repo.get_api_data(include_secrets=include_secrets)
967 967 }
968 968 except Exception:
969 969 log.exception(
970 970 u"Exception while trying to update the repository %s",
971 971 repoid)
972 972 raise JSONRPCError('failed to update repo `%s`' % repoid)
973 973
974 974
975 975 @jsonrpc_method()
976 976 def fork_repo(request, apiuser, repoid, fork_name,
977 977 owner=Optional(OAttr('apiuser')),
978 978 description=Optional(''),
979 979 private=Optional(False),
980 980 clone_uri=Optional(None),
981 981 landing_rev=Optional('rev:tip'),
982 982 copy_permissions=Optional(False)):
983 983 """
984 984 Creates a fork of the specified |repo|.
985 985
986 986 * If the fork_name contains "/", fork will be created inside
987 987 a repository group or nested repository groups
988 988
989 989 For example "foo/bar/fork-repo" will create fork called "fork-repo"
990 990 inside group "foo/bar". You have to have permissions to access and
991 991 write to the last repository group ("bar" in this example)
992 992
993 993 This command can only be run using an |authtoken| with minimum
994 994 read permissions of the forked repo, create fork permissions for an user.
995 995
996 996 :param apiuser: This is filled automatically from the |authtoken|.
997 997 :type apiuser: AuthUser
998 998 :param repoid: Set repository name or repository ID.
999 999 :type repoid: str or int
1000 1000 :param fork_name: Set the fork name, including it's repository group membership.
1001 1001 :type fork_name: str
1002 1002 :param owner: Set the fork owner.
1003 1003 :type owner: str
1004 1004 :param description: Set the fork description.
1005 1005 :type description: str
1006 1006 :param copy_permissions: Copy permissions from parent |repo|. The
1007 1007 default is False.
1008 1008 :type copy_permissions: bool
1009 1009 :param private: Make the fork private. The default is False.
1010 1010 :type private: bool
1011 1011 :param landing_rev: Set the landing revision. The default is tip.
1012 1012
1013 1013 Example output:
1014 1014
1015 1015 .. code-block:: bash
1016 1016
1017 1017 id : <id_for_response>
1018 1018 api_key : "<api_key>"
1019 1019 args: {
1020 1020 "repoid" : "<reponame or repo_id>",
1021 1021 "fork_name": "<forkname>",
1022 1022 "owner": "<username or user_id = Optional(=apiuser)>",
1023 1023 "description": "<description>",
1024 1024 "copy_permissions": "<bool>",
1025 1025 "private": "<bool>",
1026 1026 "landing_rev": "<landing_rev>"
1027 1027 }
1028 1028
1029 1029 Example error output:
1030 1030
1031 1031 .. code-block:: bash
1032 1032
1033 1033 id : <id_given_in_input>
1034 1034 result: {
1035 1035 "msg": "Created fork of `<reponame>` as `<forkname>`",
1036 1036 "success": true,
1037 1037 "task": "<celery task id or None if done sync>"
1038 1038 }
1039 1039 error: null
1040 1040
1041 1041 """
1042 1042
1043 1043 repo = get_repo_or_error(repoid)
1044 1044 repo_name = repo.repo_name
1045 1045
1046 1046 if not has_superadmin_permission(apiuser):
1047 1047 # check if we have at least read permission for
1048 1048 # this repo that we fork !
1049 1049 _perms = (
1050 1050 'repository.admin', 'repository.write', 'repository.read')
1051 1051 validate_repo_permissions(apiuser, repoid, repo, _perms)
1052 1052
1053 1053 # check if the regular user has at least fork permissions as well
1054 1054 if not HasPermissionAnyApi('hg.fork.repository')(user=apiuser):
1055 1055 raise JSONRPCForbidden()
1056 1056
1057 1057 # check if user can set owner parameter
1058 1058 owner = validate_set_owner_permissions(apiuser, owner)
1059 1059
1060 1060 description = Optional.extract(description)
1061 1061 copy_permissions = Optional.extract(copy_permissions)
1062 1062 clone_uri = Optional.extract(clone_uri)
1063 1063 landing_commit_ref = Optional.extract(landing_rev)
1064 1064 private = Optional.extract(private)
1065 1065
1066 1066 schema = repo_schema.RepoSchema().bind(
1067 1067 repo_type_options=rhodecode.BACKENDS.keys(),
1068 1068 repo_type=repo.repo_type,
1069 1069 # user caller
1070 1070 user=apiuser)
1071 1071
1072 1072 try:
1073 1073 schema_data = schema.deserialize(dict(
1074 1074 repo_name=fork_name,
1075 1075 repo_type=repo.repo_type,
1076 1076 repo_owner=owner.username,
1077 1077 repo_description=description,
1078 1078 repo_landing_commit_ref=landing_commit_ref,
1079 1079 repo_clone_uri=clone_uri,
1080 1080 repo_private=private,
1081 1081 repo_copy_permissions=copy_permissions))
1082 1082 except validation_schema.Invalid as err:
1083 1083 raise JSONRPCValidationError(colander_exc=err)
1084 1084
1085 1085 try:
1086 1086 data = {
1087 1087 'fork_parent_id': repo.repo_id,
1088 1088
1089 1089 'repo_name': schema_data['repo_group']['repo_name_without_group'],
1090 1090 'repo_name_full': schema_data['repo_name'],
1091 1091 'repo_group': schema_data['repo_group']['repo_group_id'],
1092 1092 'repo_type': schema_data['repo_type'],
1093 1093 'description': schema_data['repo_description'],
1094 1094 'private': schema_data['repo_private'],
1095 1095 'copy_permissions': schema_data['repo_copy_permissions'],
1096 1096 'landing_rev': schema_data['repo_landing_commit_ref'],
1097 1097 }
1098 1098
1099 1099 task = RepoModel().create_fork(data, cur_user=owner.user_id)
1100 1100 # no commit, it's done in RepoModel, or async via celery
1101 1101 task_id = get_task_id(task)
1102 1102
1103 1103 return {
1104 1104 'msg': 'Created fork of `%s` as `%s`' % (
1105 1105 repo.repo_name, schema_data['repo_name']),
1106 1106 'success': True, # cannot return the repo data here since fork
1107 1107 # can be done async
1108 1108 'task': task_id
1109 1109 }
1110 1110 except Exception:
1111 1111 log.exception(
1112 1112 u"Exception while trying to create fork %s",
1113 1113 schema_data['repo_name'])
1114 1114 raise JSONRPCError(
1115 1115 'failed to fork repository `%s` as `%s`' % (
1116 1116 repo_name, schema_data['repo_name']))
1117 1117
1118 1118
1119 1119 @jsonrpc_method()
1120 1120 def delete_repo(request, apiuser, repoid, forks=Optional('')):
1121 1121 """
1122 1122 Deletes a repository.
1123 1123
1124 1124 * When the `forks` parameter is set it's possible to detach or delete
1125 1125 forks of deleted repository.
1126 1126
1127 1127 This command can only be run using an |authtoken| with admin
1128 1128 permissions on the |repo|.
1129 1129
1130 1130 :param apiuser: This is filled automatically from the |authtoken|.
1131 1131 :type apiuser: AuthUser
1132 1132 :param repoid: Set the repository name or repository ID.
1133 1133 :type repoid: str or int
1134 1134 :param forks: Set to `detach` or `delete` forks from the |repo|.
1135 1135 :type forks: Optional(str)
1136 1136
1137 1137 Example error output:
1138 1138
1139 1139 .. code-block:: bash
1140 1140
1141 1141 id : <id_given_in_input>
1142 1142 result: {
1143 1143 "msg": "Deleted repository `<reponame>`",
1144 1144 "success": true
1145 1145 }
1146 1146 error: null
1147 1147 """
1148 1148
1149 1149 repo = get_repo_or_error(repoid)
1150 1150 repo_name = repo.repo_name
1151 1151 if not has_superadmin_permission(apiuser):
1152 1152 _perms = ('repository.admin',)
1153 1153 validate_repo_permissions(apiuser, repoid, repo, _perms)
1154 1154
1155 1155 try:
1156 1156 handle_forks = Optional.extract(forks)
1157 1157 _forks_msg = ''
1158 1158 _forks = [f for f in repo.forks]
1159 1159 if handle_forks == 'detach':
1160 1160 _forks_msg = ' ' + 'Detached %s forks' % len(_forks)
1161 1161 elif handle_forks == 'delete':
1162 1162 _forks_msg = ' ' + 'Deleted %s forks' % len(_forks)
1163 1163 elif _forks:
1164 1164 raise JSONRPCError(
1165 1165 'Cannot delete `%s` it still contains attached forks' %
1166 1166 (repo.repo_name,)
1167 1167 )
1168 1168 old_data = repo.get_api_data()
1169 1169 RepoModel().delete(repo, forks=forks)
1170 1170
1171 1171 repo = audit_logger.RepoWrap(repo_id=None,
1172 1172 repo_name=repo.repo_name)
1173 1173
1174 1174 audit_logger.store_api(
1175 1175 'repo.delete', action_data={'old_data': old_data},
1176 1176 user=apiuser, repo=repo)
1177 1177
1178 1178 ScmModel().mark_for_invalidation(repo_name, delete=True)
1179 1179 Session().commit()
1180 1180 return {
1181 1181 'msg': 'Deleted repository `%s`%s' % (repo_name, _forks_msg),
1182 1182 'success': True
1183 1183 }
1184 1184 except Exception:
1185 1185 log.exception("Exception occurred while trying to delete repo")
1186 1186 raise JSONRPCError(
1187 1187 'failed to delete repository `%s`' % (repo_name,)
1188 1188 )
1189 1189
1190 1190
1191 1191 #TODO: marcink, change name ?
1192 1192 @jsonrpc_method()
1193 1193 def invalidate_cache(request, apiuser, repoid, delete_keys=Optional(False)):
1194 1194 """
1195 1195 Invalidates the cache for the specified repository.
1196 1196
1197 1197 This command can only be run using an |authtoken| with admin rights to
1198 1198 the specified repository.
1199 1199
1200 1200 This command takes the following options:
1201 1201
1202 1202 :param apiuser: This is filled automatically from |authtoken|.
1203 1203 :type apiuser: AuthUser
1204 1204 :param repoid: Sets the repository name or repository ID.
1205 1205 :type repoid: str or int
1206 1206 :param delete_keys: This deletes the invalidated keys instead of
1207 1207 just flagging them.
1208 1208 :type delete_keys: Optional(``True`` | ``False``)
1209 1209
1210 1210 Example output:
1211 1211
1212 1212 .. code-block:: bash
1213 1213
1214 1214 id : <id_given_in_input>
1215 1215 result : {
1216 1216 'msg': Cache for repository `<repository name>` was invalidated,
1217 1217 'repository': <repository name>
1218 1218 }
1219 1219 error : null
1220 1220
1221 1221 Example error output:
1222 1222
1223 1223 .. code-block:: bash
1224 1224
1225 1225 id : <id_given_in_input>
1226 1226 result : null
1227 1227 error : {
1228 1228 'Error occurred during cache invalidation action'
1229 1229 }
1230 1230
1231 1231 """
1232 1232
1233 1233 repo = get_repo_or_error(repoid)
1234 1234 if not has_superadmin_permission(apiuser):
1235 1235 _perms = ('repository.admin', 'repository.write',)
1236 1236 validate_repo_permissions(apiuser, repoid, repo, _perms)
1237 1237
1238 1238 delete = Optional.extract(delete_keys)
1239 1239 try:
1240 1240 ScmModel().mark_for_invalidation(repo.repo_name, delete=delete)
1241 1241 return {
1242 1242 'msg': 'Cache for repository `%s` was invalidated' % (repoid,),
1243 1243 'repository': repo.repo_name
1244 1244 }
1245 1245 except Exception:
1246 1246 log.exception(
1247 1247 "Exception occurred while trying to invalidate repo cache")
1248 1248 raise JSONRPCError(
1249 1249 'Error occurred during cache invalidation action'
1250 1250 )
1251 1251
1252 1252
1253 1253 #TODO: marcink, change name ?
1254 1254 @jsonrpc_method()
1255 1255 def lock(request, apiuser, repoid, locked=Optional(None),
1256 1256 userid=Optional(OAttr('apiuser'))):
1257 1257 """
1258 1258 Sets the lock state of the specified |repo| by the given user.
1259 1259 From more information, see :ref:`repo-locking`.
1260 1260
1261 1261 * If the ``userid`` option is not set, the repository is locked to the
1262 1262 user who called the method.
1263 1263 * If the ``locked`` parameter is not set, the current lock state of the
1264 1264 repository is displayed.
1265 1265
1266 1266 This command can only be run using an |authtoken| with admin rights to
1267 1267 the specified repository.
1268 1268
1269 1269 This command takes the following options:
1270 1270
1271 1271 :param apiuser: This is filled automatically from the |authtoken|.
1272 1272 :type apiuser: AuthUser
1273 1273 :param repoid: Sets the repository name or repository ID.
1274 1274 :type repoid: str or int
1275 1275 :param locked: Sets the lock state.
1276 1276 :type locked: Optional(``True`` | ``False``)
1277 1277 :param userid: Set the repository lock to this user.
1278 1278 :type userid: Optional(str or int)
1279 1279
1280 1280 Example error output:
1281 1281
1282 1282 .. code-block:: bash
1283 1283
1284 1284 id : <id_given_in_input>
1285 1285 result : {
1286 1286 'repo': '<reponame>',
1287 1287 'locked': <bool: lock state>,
1288 1288 'locked_since': <int: lock timestamp>,
1289 1289 'locked_by': <username of person who made the lock>,
1290 1290 'lock_reason': <str: reason for locking>,
1291 1291 'lock_state_changed': <bool: True if lock state has been changed in this request>,
1292 1292 'msg': 'Repo `<reponame>` locked by `<username>` on <timestamp>.'
1293 1293 or
1294 1294 'msg': 'Repo `<repository name>` not locked.'
1295 1295 or
1296 1296 'msg': 'User `<user name>` set lock state for repo `<repository name>` to `<new lock state>`'
1297 1297 }
1298 1298 error : null
1299 1299
1300 1300 Example error output:
1301 1301
1302 1302 .. code-block:: bash
1303 1303
1304 1304 id : <id_given_in_input>
1305 1305 result : null
1306 1306 error : {
1307 1307 'Error occurred locking repository `<reponame>`'
1308 1308 }
1309 1309 """
1310 1310
1311 1311 repo = get_repo_or_error(repoid)
1312 1312 if not has_superadmin_permission(apiuser):
1313 1313 # check if we have at least write permission for this repo !
1314 1314 _perms = ('repository.admin', 'repository.write',)
1315 1315 validate_repo_permissions(apiuser, repoid, repo, _perms)
1316 1316
1317 1317 # make sure normal user does not pass someone else userid,
1318 1318 # he is not allowed to do that
1319 1319 if not isinstance(userid, Optional) and userid != apiuser.user_id:
1320 1320 raise JSONRPCError('userid is not the same as your user')
1321 1321
1322 1322 if isinstance(userid, Optional):
1323 1323 userid = apiuser.user_id
1324 1324
1325 1325 user = get_user_or_error(userid)
1326 1326
1327 1327 if isinstance(locked, Optional):
1328 1328 lockobj = repo.locked
1329 1329
1330 1330 if lockobj[0] is None:
1331 1331 _d = {
1332 1332 'repo': repo.repo_name,
1333 1333 'locked': False,
1334 1334 'locked_since': None,
1335 1335 'locked_by': None,
1336 1336 'lock_reason': None,
1337 1337 'lock_state_changed': False,
1338 1338 'msg': 'Repo `%s` not locked.' % repo.repo_name
1339 1339 }
1340 1340 return _d
1341 1341 else:
1342 1342 _user_id, _time, _reason = lockobj
1343 1343 lock_user = get_user_or_error(userid)
1344 1344 _d = {
1345 1345 'repo': repo.repo_name,
1346 1346 'locked': True,
1347 1347 'locked_since': _time,
1348 1348 'locked_by': lock_user.username,
1349 1349 'lock_reason': _reason,
1350 1350 'lock_state_changed': False,
1351 1351 'msg': ('Repo `%s` locked by `%s` on `%s`.'
1352 1352 % (repo.repo_name, lock_user.username,
1353 1353 json.dumps(time_to_datetime(_time))))
1354 1354 }
1355 1355 return _d
1356 1356
1357 1357 # force locked state through a flag
1358 1358 else:
1359 1359 locked = str2bool(locked)
1360 1360 lock_reason = Repository.LOCK_API
1361 1361 try:
1362 1362 if locked:
1363 1363 lock_time = time.time()
1364 1364 Repository.lock(repo, user.user_id, lock_time, lock_reason)
1365 1365 else:
1366 1366 lock_time = None
1367 1367 Repository.unlock(repo)
1368 1368 _d = {
1369 1369 'repo': repo.repo_name,
1370 1370 'locked': locked,
1371 1371 'locked_since': lock_time,
1372 1372 'locked_by': user.username,
1373 1373 'lock_reason': lock_reason,
1374 1374 'lock_state_changed': True,
1375 1375 'msg': ('User `%s` set lock state for repo `%s` to `%s`'
1376 1376 % (user.username, repo.repo_name, locked))
1377 1377 }
1378 1378 return _d
1379 1379 except Exception:
1380 1380 log.exception(
1381 1381 "Exception occurred while trying to lock repository")
1382 1382 raise JSONRPCError(
1383 1383 'Error occurred locking repository `%s`' % repo.repo_name
1384 1384 )
1385 1385
1386 1386
1387 1387 @jsonrpc_method()
1388 1388 def comment_commit(
1389 1389 request, apiuser, repoid, commit_id, message, status=Optional(None),
1390 1390 comment_type=Optional(ChangesetComment.COMMENT_TYPE_NOTE),
1391 1391 resolves_comment_id=Optional(None),
1392 1392 userid=Optional(OAttr('apiuser'))):
1393 1393 """
1394 1394 Set a commit comment, and optionally change the status of the commit.
1395 1395
1396 1396 :param apiuser: This is filled automatically from the |authtoken|.
1397 1397 :type apiuser: AuthUser
1398 1398 :param repoid: Set the repository name or repository ID.
1399 1399 :type repoid: str or int
1400 1400 :param commit_id: Specify the commit_id for which to set a comment.
1401 1401 :type commit_id: str
1402 1402 :param message: The comment text.
1403 1403 :type message: str
1404 1404 :param status: (**Optional**) status of commit, one of: 'not_reviewed',
1405 1405 'approved', 'rejected', 'under_review'
1406 1406 :type status: str
1407 1407 :param comment_type: Comment type, one of: 'note', 'todo'
1408 1408 :type comment_type: Optional(str), default: 'note'
1409 1409 :param userid: Set the user name of the comment creator.
1410 1410 :type userid: Optional(str or int)
1411 1411
1412 1412 Example error output:
1413 1413
1414 1414 .. code-block:: bash
1415 1415
1416 1416 {
1417 1417 "id" : <id_given_in_input>,
1418 1418 "result" : {
1419 1419 "msg": "Commented on commit `<commit_id>` for repository `<repoid>`",
1420 1420 "status_change": null or <status>,
1421 1421 "success": true
1422 1422 },
1423 1423 "error" : null
1424 1424 }
1425 1425
1426 1426 """
1427 1427 repo = get_repo_or_error(repoid)
1428 1428 if not has_superadmin_permission(apiuser):
1429 1429 _perms = ('repository.read', 'repository.write', 'repository.admin')
1430 1430 validate_repo_permissions(apiuser, repoid, repo, _perms)
1431 1431
1432 1432 try:
1433 1433 commit_id = repo.scm_instance().get_commit(commit_id=commit_id).raw_id
1434 1434 except Exception as e:
1435 1435 log.exception('Failed to fetch commit')
1436 1436 raise JSONRPCError(safe_str(e))
1437 1437
1438 1438 if isinstance(userid, Optional):
1439 1439 userid = apiuser.user_id
1440 1440
1441 1441 user = get_user_or_error(userid)
1442 1442 status = Optional.extract(status)
1443 1443 comment_type = Optional.extract(comment_type)
1444 1444 resolves_comment_id = Optional.extract(resolves_comment_id)
1445 1445
1446 1446 allowed_statuses = [x[0] for x in ChangesetStatus.STATUSES]
1447 1447 if status and status not in allowed_statuses:
1448 1448 raise JSONRPCError('Bad status, must be on '
1449 1449 'of %s got %s' % (allowed_statuses, status,))
1450 1450
1451 1451 if resolves_comment_id:
1452 1452 comment = ChangesetComment.get(resolves_comment_id)
1453 1453 if not comment:
1454 1454 raise JSONRPCError(
1455 1455 'Invalid resolves_comment_id `%s` for this commit.'
1456 1456 % resolves_comment_id)
1457 1457 if comment.comment_type != ChangesetComment.COMMENT_TYPE_TODO:
1458 1458 raise JSONRPCError(
1459 1459 'Comment `%s` is wrong type for setting status to resolved.'
1460 1460 % resolves_comment_id)
1461 1461
1462 1462 try:
1463 1463 rc_config = SettingsModel().get_all_settings()
1464 1464 renderer = rc_config.get('rhodecode_markup_renderer', 'rst')
1465 1465 status_change_label = ChangesetStatus.get_status_lbl(status)
1466 1466 comment = CommentsModel().create(
1467 1467 message, repo, user, commit_id=commit_id,
1468 1468 status_change=status_change_label,
1469 1469 status_change_type=status,
1470 1470 renderer=renderer,
1471 1471 comment_type=comment_type,
1472 1472 resolves_comment_id=resolves_comment_id,
1473 1473 auth_user=apiuser
1474 1474 )
1475 1475 if status:
1476 1476 # also do a status change
1477 1477 try:
1478 1478 ChangesetStatusModel().set_status(
1479 1479 repo, status, user, comment, revision=commit_id,
1480 1480 dont_allow_on_closed_pull_request=True
1481 1481 )
1482 1482 except StatusChangeOnClosedPullRequestError:
1483 1483 log.exception(
1484 1484 "Exception occurred while trying to change repo commit status")
1485 1485 msg = ('Changing status on a changeset associated with '
1486 1486 'a closed pull request is not allowed')
1487 1487 raise JSONRPCError(msg)
1488 1488
1489 1489 Session().commit()
1490 1490 return {
1491 1491 'msg': (
1492 1492 'Commented on commit `%s` for repository `%s`' % (
1493 1493 comment.revision, repo.repo_name)),
1494 1494 'status_change': status,
1495 1495 'success': True,
1496 1496 }
1497 1497 except JSONRPCError:
1498 1498 # catch any inside errors, and re-raise them to prevent from
1499 1499 # below global catch to silence them
1500 1500 raise
1501 1501 except Exception:
1502 1502 log.exception("Exception occurred while trying to comment on commit")
1503 1503 raise JSONRPCError(
1504 1504 'failed to set comment on repository `%s`' % (repo.repo_name,)
1505 1505 )
1506 1506
1507 1507
1508 1508 @jsonrpc_method()
1509 def get_repo_comments(request, apiuser, repoid,
1510 commit_id=Optional(None), comment_type=Optional(None),
1511 userid=Optional(None)):
1512 """
1513 Get all comments for a repository
1514
1515 :param apiuser: This is filled automatically from the |authtoken|.
1516 :type apiuser: AuthUser
1517 :param repoid: Set the repository name or repository ID.
1518 :type repoid: str or int
1519 :param commit_id: Optionally filter the comments by the commit_id
1520 :type commit_id: Optional(str), default: None
1521 :param comment_type: Optionally filter the comments by the comment_type
1522 one of: 'note', 'todo'
1523 :type comment_type: Optional(str), default: None
1524 :param userid: Optionally filter the comments by the author of comment
1525 :type userid: Optional(str or int), Default: None
1526
1527 Example error output:
1528
1529 .. code-block:: bash
1530
1531 {
1532 "id" : <id_given_in_input>,
1533 "result" : [
1534 {
1535 "comment_author": <USER_DETAILS>,
1536 "comment_created_on": "2017-02-01T14:38:16.309",
1537 "comment_f_path": "file.txt",
1538 "comment_id": 282,
1539 "comment_lineno": "n1",
1540 "comment_resolved_by": null,
1541 "comment_status": [],
1542 "comment_text": "This file needs a header",
1543 "comment_type": "todo"
1544 }
1545 ],
1546 "error" : null
1547 }
1548
1549 """
1550 repo = get_repo_or_error(repoid)
1551 if not has_superadmin_permission(apiuser):
1552 _perms = ('repository.read', 'repository.write', 'repository.admin')
1553 validate_repo_permissions(apiuser, repoid, repo, _perms)
1554
1555 commit_id = Optional.extract(commit_id)
1556
1557 userid = Optional.extract(userid)
1558 if userid:
1559 user = get_user_or_error(userid)
1560 else:
1561 user = None
1562
1563 comment_type = Optional.extract(comment_type)
1564 if comment_type and comment_type not in ChangesetComment.COMMENT_TYPES:
1565 raise JSONRPCError(
1566 'comment_type must be one of `{}` got {}'.format(
1567 ChangesetComment.COMMENT_TYPES, comment_type)
1568 )
1569
1570 comments = CommentsModel().get_repository_comments(
1571 repo=repo, comment_type=comment_type, user=user, commit_id=commit_id)
1572 return comments
1573
1574
1575 @jsonrpc_method()
1509 1576 def grant_user_permission(request, apiuser, repoid, userid, perm):
1510 1577 """
1511 1578 Grant permissions for the specified user on the given repository,
1512 1579 or update existing permissions if found.
1513 1580
1514 1581 This command can only be run using an |authtoken| with admin
1515 1582 permissions on the |repo|.
1516 1583
1517 1584 :param apiuser: This is filled automatically from the |authtoken|.
1518 1585 :type apiuser: AuthUser
1519 1586 :param repoid: Set the repository name or repository ID.
1520 1587 :type repoid: str or int
1521 1588 :param userid: Set the user name.
1522 1589 :type userid: str
1523 1590 :param perm: Set the user permissions, using the following format
1524 1591 ``(repository.(none|read|write|admin))``
1525 1592 :type perm: str
1526 1593
1527 1594 Example output:
1528 1595
1529 1596 .. code-block:: bash
1530 1597
1531 1598 id : <id_given_in_input>
1532 1599 result: {
1533 1600 "msg" : "Granted perm: `<perm>` for user: `<username>` in repo: `<reponame>`",
1534 1601 "success": true
1535 1602 }
1536 1603 error: null
1537 1604 """
1538 1605
1539 1606 repo = get_repo_or_error(repoid)
1540 1607 user = get_user_or_error(userid)
1541 1608 perm = get_perm_or_error(perm)
1542 1609 if not has_superadmin_permission(apiuser):
1543 1610 _perms = ('repository.admin',)
1544 1611 validate_repo_permissions(apiuser, repoid, repo, _perms)
1545 1612
1546 1613 perm_additions = [[user.user_id, perm.permission_name, "user"]]
1547 1614 try:
1548 1615 changes = RepoModel().update_permissions(
1549 1616 repo=repo, perm_additions=perm_additions, cur_user=apiuser)
1550 1617
1551 1618 action_data = {
1552 1619 'added': changes['added'],
1553 1620 'updated': changes['updated'],
1554 1621 'deleted': changes['deleted'],
1555 1622 }
1556 1623 audit_logger.store_api(
1557 1624 'repo.edit.permissions', action_data=action_data, user=apiuser, repo=repo)
1558 1625
1559 1626 Session().commit()
1560 1627 return {
1561 1628 'msg': 'Granted perm: `%s` for user: `%s` in repo: `%s`' % (
1562 1629 perm.permission_name, user.username, repo.repo_name
1563 1630 ),
1564 1631 'success': True
1565 1632 }
1566 1633 except Exception:
1567 1634 log.exception("Exception occurred while trying edit permissions for repo")
1568 1635 raise JSONRPCError(
1569 1636 'failed to edit permission for user: `%s` in repo: `%s`' % (
1570 1637 userid, repoid
1571 1638 )
1572 1639 )
1573 1640
1574 1641
1575 1642 @jsonrpc_method()
1576 1643 def revoke_user_permission(request, apiuser, repoid, userid):
1577 1644 """
1578 1645 Revoke permission for a user on the specified repository.
1579 1646
1580 1647 This command can only be run using an |authtoken| with admin
1581 1648 permissions on the |repo|.
1582 1649
1583 1650 :param apiuser: This is filled automatically from the |authtoken|.
1584 1651 :type apiuser: AuthUser
1585 1652 :param repoid: Set the repository name or repository ID.
1586 1653 :type repoid: str or int
1587 1654 :param userid: Set the user name of revoked user.
1588 1655 :type userid: str or int
1589 1656
1590 1657 Example error output:
1591 1658
1592 1659 .. code-block:: bash
1593 1660
1594 1661 id : <id_given_in_input>
1595 1662 result: {
1596 1663 "msg" : "Revoked perm for user: `<username>` in repo: `<reponame>`",
1597 1664 "success": true
1598 1665 }
1599 1666 error: null
1600 1667 """
1601 1668
1602 1669 repo = get_repo_or_error(repoid)
1603 1670 user = get_user_or_error(userid)
1604 1671 if not has_superadmin_permission(apiuser):
1605 1672 _perms = ('repository.admin',)
1606 1673 validate_repo_permissions(apiuser, repoid, repo, _perms)
1607 1674
1608 1675 perm_deletions = [[user.user_id, None, "user"]]
1609 1676 try:
1610 1677 changes = RepoModel().update_permissions(
1611 1678 repo=repo, perm_deletions=perm_deletions, cur_user=user)
1612 1679
1613 1680 action_data = {
1614 1681 'added': changes['added'],
1615 1682 'updated': changes['updated'],
1616 1683 'deleted': changes['deleted'],
1617 1684 }
1618 1685 audit_logger.store_api(
1619 1686 'repo.edit.permissions', action_data=action_data, user=apiuser, repo=repo)
1620 1687
1621 1688 Session().commit()
1622 1689 return {
1623 1690 'msg': 'Revoked perm for user: `%s` in repo: `%s`' % (
1624 1691 user.username, repo.repo_name
1625 1692 ),
1626 1693 'success': True
1627 1694 }
1628 1695 except Exception:
1629 1696 log.exception("Exception occurred while trying revoke permissions to repo")
1630 1697 raise JSONRPCError(
1631 1698 'failed to edit permission for user: `%s` in repo: `%s`' % (
1632 1699 userid, repoid
1633 1700 )
1634 1701 )
1635 1702
1636 1703
1637 1704 @jsonrpc_method()
1638 1705 def grant_user_group_permission(request, apiuser, repoid, usergroupid, perm):
1639 1706 """
1640 1707 Grant permission for a user group on the specified repository,
1641 1708 or update existing permissions.
1642 1709
1643 1710 This command can only be run using an |authtoken| with admin
1644 1711 permissions on the |repo|.
1645 1712
1646 1713 :param apiuser: This is filled automatically from the |authtoken|.
1647 1714 :type apiuser: AuthUser
1648 1715 :param repoid: Set the repository name or repository ID.
1649 1716 :type repoid: str or int
1650 1717 :param usergroupid: Specify the ID of the user group.
1651 1718 :type usergroupid: str or int
1652 1719 :param perm: Set the user group permissions using the following
1653 1720 format: (repository.(none|read|write|admin))
1654 1721 :type perm: str
1655 1722
1656 1723 Example output:
1657 1724
1658 1725 .. code-block:: bash
1659 1726
1660 1727 id : <id_given_in_input>
1661 1728 result : {
1662 1729 "msg" : "Granted perm: `<perm>` for group: `<usersgroupname>` in repo: `<reponame>`",
1663 1730 "success": true
1664 1731
1665 1732 }
1666 1733 error : null
1667 1734
1668 1735 Example error output:
1669 1736
1670 1737 .. code-block:: bash
1671 1738
1672 1739 id : <id_given_in_input>
1673 1740 result : null
1674 1741 error : {
1675 1742 "failed to edit permission for user group: `<usergroup>` in repo `<repo>`'
1676 1743 }
1677 1744
1678 1745 """
1679 1746
1680 1747 repo = get_repo_or_error(repoid)
1681 1748 perm = get_perm_or_error(perm)
1682 1749 if not has_superadmin_permission(apiuser):
1683 1750 _perms = ('repository.admin',)
1684 1751 validate_repo_permissions(apiuser, repoid, repo, _perms)
1685 1752
1686 1753 user_group = get_user_group_or_error(usergroupid)
1687 1754 if not has_superadmin_permission(apiuser):
1688 1755 # check if we have at least read permission for this user group !
1689 1756 _perms = ('usergroup.read', 'usergroup.write', 'usergroup.admin',)
1690 1757 if not HasUserGroupPermissionAnyApi(*_perms)(
1691 1758 user=apiuser, user_group_name=user_group.users_group_name):
1692 1759 raise JSONRPCError(
1693 1760 'user group `%s` does not exist' % (usergroupid,))
1694 1761
1695 1762 perm_additions = [[user_group.users_group_id, perm.permission_name, "user_group"]]
1696 1763 try:
1697 1764 changes = RepoModel().update_permissions(
1698 1765 repo=repo, perm_additions=perm_additions, cur_user=apiuser)
1699 1766 action_data = {
1700 1767 'added': changes['added'],
1701 1768 'updated': changes['updated'],
1702 1769 'deleted': changes['deleted'],
1703 1770 }
1704 1771 audit_logger.store_api(
1705 1772 'repo.edit.permissions', action_data=action_data, user=apiuser, repo=repo)
1706 1773
1707 1774 Session().commit()
1708 1775 return {
1709 1776 'msg': 'Granted perm: `%s` for user group: `%s` in '
1710 1777 'repo: `%s`' % (
1711 1778 perm.permission_name, user_group.users_group_name,
1712 1779 repo.repo_name
1713 1780 ),
1714 1781 'success': True
1715 1782 }
1716 1783 except Exception:
1717 1784 log.exception(
1718 1785 "Exception occurred while trying change permission on repo")
1719 1786 raise JSONRPCError(
1720 1787 'failed to edit permission for user group: `%s` in '
1721 1788 'repo: `%s`' % (
1722 1789 usergroupid, repo.repo_name
1723 1790 )
1724 1791 )
1725 1792
1726 1793
1727 1794 @jsonrpc_method()
1728 1795 def revoke_user_group_permission(request, apiuser, repoid, usergroupid):
1729 1796 """
1730 1797 Revoke the permissions of a user group on a given repository.
1731 1798
1732 1799 This command can only be run using an |authtoken| with admin
1733 1800 permissions on the |repo|.
1734 1801
1735 1802 :param apiuser: This is filled automatically from the |authtoken|.
1736 1803 :type apiuser: AuthUser
1737 1804 :param repoid: Set the repository name or repository ID.
1738 1805 :type repoid: str or int
1739 1806 :param usergroupid: Specify the user group ID.
1740 1807 :type usergroupid: str or int
1741 1808
1742 1809 Example output:
1743 1810
1744 1811 .. code-block:: bash
1745 1812
1746 1813 id : <id_given_in_input>
1747 1814 result: {
1748 1815 "msg" : "Revoked perm for group: `<usersgroupname>` in repo: `<reponame>`",
1749 1816 "success": true
1750 1817 }
1751 1818 error: null
1752 1819 """
1753 1820
1754 1821 repo = get_repo_or_error(repoid)
1755 1822 if not has_superadmin_permission(apiuser):
1756 1823 _perms = ('repository.admin',)
1757 1824 validate_repo_permissions(apiuser, repoid, repo, _perms)
1758 1825
1759 1826 user_group = get_user_group_or_error(usergroupid)
1760 1827 if not has_superadmin_permission(apiuser):
1761 1828 # check if we have at least read permission for this user group !
1762 1829 _perms = ('usergroup.read', 'usergroup.write', 'usergroup.admin',)
1763 1830 if not HasUserGroupPermissionAnyApi(*_perms)(
1764 1831 user=apiuser, user_group_name=user_group.users_group_name):
1765 1832 raise JSONRPCError(
1766 1833 'user group `%s` does not exist' % (usergroupid,))
1767 1834
1768 1835 perm_deletions = [[user_group.users_group_id, None, "user_group"]]
1769 1836 try:
1770 1837 changes = RepoModel().update_permissions(
1771 1838 repo=repo, perm_deletions=perm_deletions, cur_user=apiuser)
1772 1839 action_data = {
1773 1840 'added': changes['added'],
1774 1841 'updated': changes['updated'],
1775 1842 'deleted': changes['deleted'],
1776 1843 }
1777 1844 audit_logger.store_api(
1778 1845 'repo.edit.permissions', action_data=action_data, user=apiuser, repo=repo)
1779 1846
1780 1847 Session().commit()
1781 1848 return {
1782 1849 'msg': 'Revoked perm for user group: `%s` in repo: `%s`' % (
1783 1850 user_group.users_group_name, repo.repo_name
1784 1851 ),
1785 1852 'success': True
1786 1853 }
1787 1854 except Exception:
1788 1855 log.exception("Exception occurred while trying revoke "
1789 1856 "user group permission on repo")
1790 1857 raise JSONRPCError(
1791 1858 'failed to edit permission for user group: `%s` in '
1792 1859 'repo: `%s`' % (
1793 1860 user_group.users_group_name, repo.repo_name
1794 1861 )
1795 1862 )
1796 1863
1797 1864
1798 1865 @jsonrpc_method()
1799 1866 def pull(request, apiuser, repoid, remote_uri=Optional(None)):
1800 1867 """
1801 1868 Triggers a pull on the given repository from a remote location. You
1802 1869 can use this to keep remote repositories up-to-date.
1803 1870
1804 1871 This command can only be run using an |authtoken| with admin
1805 1872 rights to the specified repository. For more information,
1806 1873 see :ref:`config-token-ref`.
1807 1874
1808 1875 This command takes the following options:
1809 1876
1810 1877 :param apiuser: This is filled automatically from the |authtoken|.
1811 1878 :type apiuser: AuthUser
1812 1879 :param repoid: The repository name or repository ID.
1813 1880 :type repoid: str or int
1814 1881 :param remote_uri: Optional remote URI to pass in for pull
1815 1882 :type remote_uri: str
1816 1883
1817 1884 Example output:
1818 1885
1819 1886 .. code-block:: bash
1820 1887
1821 1888 id : <id_given_in_input>
1822 1889 result : {
1823 1890 "msg": "Pulled from url `<remote_url>` on repo `<repository name>`"
1824 1891 "repository": "<repository name>"
1825 1892 }
1826 1893 error : null
1827 1894
1828 1895 Example error output:
1829 1896
1830 1897 .. code-block:: bash
1831 1898
1832 1899 id : <id_given_in_input>
1833 1900 result : null
1834 1901 error : {
1835 1902 "Unable to push changes from `<remote_url>`"
1836 1903 }
1837 1904
1838 1905 """
1839 1906
1840 1907 repo = get_repo_or_error(repoid)
1841 1908 remote_uri = Optional.extract(remote_uri)
1842 1909 remote_uri_display = remote_uri or repo.clone_uri_hidden
1843 1910 if not has_superadmin_permission(apiuser):
1844 1911 _perms = ('repository.admin',)
1845 1912 validate_repo_permissions(apiuser, repoid, repo, _perms)
1846 1913
1847 1914 try:
1848 1915 ScmModel().pull_changes(
1849 1916 repo.repo_name, apiuser.username, remote_uri=remote_uri)
1850 1917 return {
1851 1918 'msg': 'Pulled from url `%s` on repo `%s`' % (
1852 1919 remote_uri_display, repo.repo_name),
1853 1920 'repository': repo.repo_name
1854 1921 }
1855 1922 except Exception:
1856 1923 log.exception("Exception occurred while trying to "
1857 1924 "pull changes from remote location")
1858 1925 raise JSONRPCError(
1859 1926 'Unable to pull changes from `%s`' % remote_uri_display
1860 1927 )
1861 1928
1862 1929
1863 1930 @jsonrpc_method()
1864 1931 def strip(request, apiuser, repoid, revision, branch):
1865 1932 """
1866 1933 Strips the given revision from the specified repository.
1867 1934
1868 1935 * This will remove the revision and all of its decendants.
1869 1936
1870 1937 This command can only be run using an |authtoken| with admin rights to
1871 1938 the specified repository.
1872 1939
1873 1940 This command takes the following options:
1874 1941
1875 1942 :param apiuser: This is filled automatically from the |authtoken|.
1876 1943 :type apiuser: AuthUser
1877 1944 :param repoid: The repository name or repository ID.
1878 1945 :type repoid: str or int
1879 1946 :param revision: The revision you wish to strip.
1880 1947 :type revision: str
1881 1948 :param branch: The branch from which to strip the revision.
1882 1949 :type branch: str
1883 1950
1884 1951 Example output:
1885 1952
1886 1953 .. code-block:: bash
1887 1954
1888 1955 id : <id_given_in_input>
1889 1956 result : {
1890 1957 "msg": "'Stripped commit <commit_hash> from repo `<repository name>`'"
1891 1958 "repository": "<repository name>"
1892 1959 }
1893 1960 error : null
1894 1961
1895 1962 Example error output:
1896 1963
1897 1964 .. code-block:: bash
1898 1965
1899 1966 id : <id_given_in_input>
1900 1967 result : null
1901 1968 error : {
1902 1969 "Unable to strip commit <commit_hash> from repo `<repository name>`"
1903 1970 }
1904 1971
1905 1972 """
1906 1973
1907 1974 repo = get_repo_or_error(repoid)
1908 1975 if not has_superadmin_permission(apiuser):
1909 1976 _perms = ('repository.admin',)
1910 1977 validate_repo_permissions(apiuser, repoid, repo, _perms)
1911 1978
1912 1979 try:
1913 1980 ScmModel().strip(repo, revision, branch)
1914 1981 audit_logger.store_api(
1915 1982 'repo.commit.strip', action_data={'commit_id': revision},
1916 1983 repo=repo,
1917 1984 user=apiuser, commit=True)
1918 1985
1919 1986 return {
1920 1987 'msg': 'Stripped commit %s from repo `%s`' % (
1921 1988 revision, repo.repo_name),
1922 1989 'repository': repo.repo_name
1923 1990 }
1924 1991 except Exception:
1925 1992 log.exception("Exception while trying to strip")
1926 1993 raise JSONRPCError(
1927 1994 'Unable to strip commit %s from repo `%s`' % (
1928 1995 revision, repo.repo_name)
1929 1996 )
1930 1997
1931 1998
1932 1999 @jsonrpc_method()
1933 2000 def get_repo_settings(request, apiuser, repoid, key=Optional(None)):
1934 2001 """
1935 2002 Returns all settings for a repository. If key is given it only returns the
1936 2003 setting identified by the key or null.
1937 2004
1938 2005 :param apiuser: This is filled automatically from the |authtoken|.
1939 2006 :type apiuser: AuthUser
1940 2007 :param repoid: The repository name or repository id.
1941 2008 :type repoid: str or int
1942 2009 :param key: Key of the setting to return.
1943 2010 :type: key: Optional(str)
1944 2011
1945 2012 Example output:
1946 2013
1947 2014 .. code-block:: bash
1948 2015
1949 2016 {
1950 2017 "error": null,
1951 2018 "id": 237,
1952 2019 "result": {
1953 2020 "extensions_largefiles": true,
1954 2021 "extensions_evolve": true,
1955 2022 "hooks_changegroup_push_logger": true,
1956 2023 "hooks_changegroup_repo_size": false,
1957 2024 "hooks_outgoing_pull_logger": true,
1958 2025 "phases_publish": "True",
1959 2026 "rhodecode_hg_use_rebase_for_merging": true,
1960 2027 "rhodecode_pr_merge_enabled": true,
1961 2028 "rhodecode_use_outdated_comments": true
1962 2029 }
1963 2030 }
1964 2031 """
1965 2032
1966 2033 # Restrict access to this api method to admins only.
1967 2034 if not has_superadmin_permission(apiuser):
1968 2035 raise JSONRPCForbidden()
1969 2036
1970 2037 try:
1971 2038 repo = get_repo_or_error(repoid)
1972 2039 settings_model = VcsSettingsModel(repo=repo)
1973 2040 settings = settings_model.get_global_settings()
1974 2041 settings.update(settings_model.get_repo_settings())
1975 2042
1976 2043 # If only a single setting is requested fetch it from all settings.
1977 2044 key = Optional.extract(key)
1978 2045 if key is not None:
1979 2046 settings = settings.get(key, None)
1980 2047 except Exception:
1981 2048 msg = 'Failed to fetch settings for repository `{}`'.format(repoid)
1982 2049 log.exception(msg)
1983 2050 raise JSONRPCError(msg)
1984 2051
1985 2052 return settings
1986 2053
1987 2054
1988 2055 @jsonrpc_method()
1989 2056 def set_repo_settings(request, apiuser, repoid, settings):
1990 2057 """
1991 2058 Update repository settings. Returns true on success.
1992 2059
1993 2060 :param apiuser: This is filled automatically from the |authtoken|.
1994 2061 :type apiuser: AuthUser
1995 2062 :param repoid: The repository name or repository id.
1996 2063 :type repoid: str or int
1997 2064 :param settings: The new settings for the repository.
1998 2065 :type: settings: dict
1999 2066
2000 2067 Example output:
2001 2068
2002 2069 .. code-block:: bash
2003 2070
2004 2071 {
2005 2072 "error": null,
2006 2073 "id": 237,
2007 2074 "result": true
2008 2075 }
2009 2076 """
2010 2077 # Restrict access to this api method to admins only.
2011 2078 if not has_superadmin_permission(apiuser):
2012 2079 raise JSONRPCForbidden()
2013 2080
2014 2081 if type(settings) is not dict:
2015 2082 raise JSONRPCError('Settings have to be a JSON Object.')
2016 2083
2017 2084 try:
2018 2085 settings_model = VcsSettingsModel(repo=repoid)
2019 2086
2020 2087 # Merge global, repo and incoming settings.
2021 2088 new_settings = settings_model.get_global_settings()
2022 2089 new_settings.update(settings_model.get_repo_settings())
2023 2090 new_settings.update(settings)
2024 2091
2025 2092 # Update the settings.
2026 2093 inherit_global_settings = new_settings.get(
2027 2094 'inherit_global_settings', False)
2028 2095 settings_model.create_or_update_repo_settings(
2029 2096 new_settings, inherit_global_settings=inherit_global_settings)
2030 2097 Session().commit()
2031 2098 except Exception:
2032 2099 msg = 'Failed to update settings for repository `{}`'.format(repoid)
2033 2100 log.exception(msg)
2034 2101 raise JSONRPCError(msg)
2035 2102
2036 2103 # Indicate success.
2037 2104 return True
2038 2105
2039 2106
2040 2107 @jsonrpc_method()
2041 2108 def maintenance(request, apiuser, repoid):
2042 2109 """
2043 2110 Triggers a maintenance on the given repository.
2044 2111
2045 2112 This command can only be run using an |authtoken| with admin
2046 2113 rights to the specified repository. For more information,
2047 2114 see :ref:`config-token-ref`.
2048 2115
2049 2116 This command takes the following options:
2050 2117
2051 2118 :param apiuser: This is filled automatically from the |authtoken|.
2052 2119 :type apiuser: AuthUser
2053 2120 :param repoid: The repository name or repository ID.
2054 2121 :type repoid: str or int
2055 2122
2056 2123 Example output:
2057 2124
2058 2125 .. code-block:: bash
2059 2126
2060 2127 id : <id_given_in_input>
2061 2128 result : {
2062 2129 "msg": "executed maintenance command",
2063 2130 "executed_actions": [
2064 2131 <action_message>, <action_message2>...
2065 2132 ],
2066 2133 "repository": "<repository name>"
2067 2134 }
2068 2135 error : null
2069 2136
2070 2137 Example error output:
2071 2138
2072 2139 .. code-block:: bash
2073 2140
2074 2141 id : <id_given_in_input>
2075 2142 result : null
2076 2143 error : {
2077 2144 "Unable to execute maintenance on `<reponame>`"
2078 2145 }
2079 2146
2080 2147 """
2081 2148
2082 2149 repo = get_repo_or_error(repoid)
2083 2150 if not has_superadmin_permission(apiuser):
2084 2151 _perms = ('repository.admin',)
2085 2152 validate_repo_permissions(apiuser, repoid, repo, _perms)
2086 2153
2087 2154 try:
2088 2155 maintenance = repo_maintenance.RepoMaintenance()
2089 2156 executed_actions = maintenance.execute(repo)
2090 2157
2091 2158 return {
2092 2159 'msg': 'executed maintenance command',
2093 2160 'executed_actions': executed_actions,
2094 2161 'repository': repo.repo_name
2095 2162 }
2096 2163 except Exception:
2097 2164 log.exception("Exception occurred while trying to run maintenance")
2098 2165 raise JSONRPCError(
2099 2166 'Unable to execute maintenance on `%s`' % repo.repo_name)
@@ -1,672 +1,690 b''
1 1 # -*- coding: utf-8 -*-
2 2
3 3 # Copyright (C) 2011-2019 RhodeCode GmbH
4 4 #
5 5 # This program is free software: you can redistribute it and/or modify
6 6 # it under the terms of the GNU Affero General Public License, version 3
7 7 # (only), as published by the Free Software Foundation.
8 8 #
9 9 # This program is distributed in the hope that it will be useful,
10 10 # but WITHOUT ANY WARRANTY; without even the implied warranty of
11 11 # MERCHANTABILITY or FITNESS FOR A PARTICULAR PURPOSE. See the
12 12 # GNU General Public License for more details.
13 13 #
14 14 # You should have received a copy of the GNU Affero General Public License
15 15 # along with this program. If not, see <http://www.gnu.org/licenses/>.
16 16 #
17 17 # This program is dual-licensed. If you wish to learn more about the
18 18 # RhodeCode Enterprise Edition, including its added features, Support services,
19 19 # and proprietary license terms, please see https://rhodecode.com/licenses/
20 20
21 21 """
22 22 comments model for RhodeCode
23 23 """
24 24
25 25 import logging
26 26 import traceback
27 27 import collections
28 28
29 29 from pyramid.threadlocal import get_current_registry, get_current_request
30 30 from sqlalchemy.sql.expression import null
31 31 from sqlalchemy.sql.functions import coalesce
32 32
33 33 from rhodecode.lib import helpers as h, diffs, channelstream
34 34 from rhodecode.lib import audit_logger
35 35 from rhodecode.lib.utils2 import extract_mentioned_users, safe_str
36 36 from rhodecode.model import BaseModel
37 37 from rhodecode.model.db import (
38 38 ChangesetComment, User, Notification, PullRequest, AttributeDict)
39 39 from rhodecode.model.notification import NotificationModel
40 40 from rhodecode.model.meta import Session
41 41 from rhodecode.model.settings import VcsSettingsModel
42 42 from rhodecode.model.notification import EmailNotificationModel
43 43 from rhodecode.model.validation_schema.schemas import comment_schema
44 44
45 45
46 46 log = logging.getLogger(__name__)
47 47
48 48
49 49 class CommentsModel(BaseModel):
50 50
51 51 cls = ChangesetComment
52 52
53 53 DIFF_CONTEXT_BEFORE = 3
54 54 DIFF_CONTEXT_AFTER = 3
55 55
56 56 def __get_commit_comment(self, changeset_comment):
57 57 return self._get_instance(ChangesetComment, changeset_comment)
58 58
59 59 def __get_pull_request(self, pull_request):
60 60 return self._get_instance(PullRequest, pull_request)
61 61
62 62 def _extract_mentions(self, s):
63 63 user_objects = []
64 64 for username in extract_mentioned_users(s):
65 65 user_obj = User.get_by_username(username, case_insensitive=True)
66 66 if user_obj:
67 67 user_objects.append(user_obj)
68 68 return user_objects
69 69
70 70 def _get_renderer(self, global_renderer='rst', request=None):
71 71 request = request or get_current_request()
72 72
73 73 try:
74 74 global_renderer = request.call_context.visual.default_renderer
75 75 except AttributeError:
76 76 log.debug("Renderer not set, falling back "
77 77 "to default renderer '%s'", global_renderer)
78 78 except Exception:
79 79 log.error(traceback.format_exc())
80 80 return global_renderer
81 81
82 82 def aggregate_comments(self, comments, versions, show_version, inline=False):
83 83 # group by versions, and count until, and display objects
84 84
85 85 comment_groups = collections.defaultdict(list)
86 86 [comment_groups[
87 87 _co.pull_request_version_id].append(_co) for _co in comments]
88 88
89 89 def yield_comments(pos):
90 90 for co in comment_groups[pos]:
91 91 yield co
92 92
93 93 comment_versions = collections.defaultdict(
94 94 lambda: collections.defaultdict(list))
95 95 prev_prvid = -1
96 96 # fake last entry with None, to aggregate on "latest" version which
97 97 # doesn't have an pull_request_version_id
98 98 for ver in versions + [AttributeDict({'pull_request_version_id': None})]:
99 99 prvid = ver.pull_request_version_id
100 100 if prev_prvid == -1:
101 101 prev_prvid = prvid
102 102
103 103 for co in yield_comments(prvid):
104 104 comment_versions[prvid]['at'].append(co)
105 105
106 106 # save until
107 107 current = comment_versions[prvid]['at']
108 108 prev_until = comment_versions[prev_prvid]['until']
109 109 cur_until = prev_until + current
110 110 comment_versions[prvid]['until'].extend(cur_until)
111 111
112 112 # save outdated
113 113 if inline:
114 114 outdated = [x for x in cur_until
115 115 if x.outdated_at_version(show_version)]
116 116 else:
117 117 outdated = [x for x in cur_until
118 118 if x.older_than_version(show_version)]
119 119 display = [x for x in cur_until if x not in outdated]
120 120
121 121 comment_versions[prvid]['outdated'] = outdated
122 122 comment_versions[prvid]['display'] = display
123 123
124 124 prev_prvid = prvid
125 125
126 126 return comment_versions
127 127
128 def get_repository_comments(self, repo, comment_type=None, user=None, commit_id=None):
129 qry = Session().query(ChangesetComment) \
130 .filter(ChangesetComment.repo == repo)
131
132 if comment_type and comment_type in ChangesetComment.COMMENT_TYPES:
133 qry = qry.filter(ChangesetComment.comment_type == comment_type)
134
135 if user:
136 user = self._get_user(user)
137 if user:
138 qry = qry.filter(ChangesetComment.user_id == user.user_id)
139
140 if commit_id:
141 qry = qry.filter(ChangesetComment.revision == commit_id)
142
143 qry = qry.order_by(ChangesetComment.created_on)
144 return qry.all()
145
128 146 def get_repository_unresolved_todos(self, repo):
129 147 todos = Session().query(ChangesetComment) \
130 148 .filter(ChangesetComment.repo == repo) \
131 149 .filter(ChangesetComment.resolved_by == None) \
132 150 .filter(ChangesetComment.comment_type
133 151 == ChangesetComment.COMMENT_TYPE_TODO)
134 152 todos = todos.all()
135 153
136 154 return todos
137 155
138 156 def get_pull_request_unresolved_todos(self, pull_request, show_outdated=True):
139 157
140 158 todos = Session().query(ChangesetComment) \
141 159 .filter(ChangesetComment.pull_request == pull_request) \
142 160 .filter(ChangesetComment.resolved_by == None) \
143 161 .filter(ChangesetComment.comment_type
144 162 == ChangesetComment.COMMENT_TYPE_TODO)
145 163
146 164 if not show_outdated:
147 165 todos = todos.filter(
148 166 coalesce(ChangesetComment.display_state, '') !=
149 167 ChangesetComment.COMMENT_OUTDATED)
150 168
151 169 todos = todos.all()
152 170
153 171 return todos
154 172
155 173 def get_commit_unresolved_todos(self, commit_id, show_outdated=True):
156 174
157 175 todos = Session().query(ChangesetComment) \
158 176 .filter(ChangesetComment.revision == commit_id) \
159 177 .filter(ChangesetComment.resolved_by == None) \
160 178 .filter(ChangesetComment.comment_type
161 179 == ChangesetComment.COMMENT_TYPE_TODO)
162 180
163 181 if not show_outdated:
164 182 todos = todos.filter(
165 183 coalesce(ChangesetComment.display_state, '') !=
166 184 ChangesetComment.COMMENT_OUTDATED)
167 185
168 186 todos = todos.all()
169 187
170 188 return todos
171 189
172 190 def _log_audit_action(self, action, action_data, auth_user, comment):
173 191 audit_logger.store(
174 192 action=action,
175 193 action_data=action_data,
176 194 user=auth_user,
177 195 repo=comment.repo)
178 196
179 197 def create(self, text, repo, user, commit_id=None, pull_request=None,
180 198 f_path=None, line_no=None, status_change=None,
181 199 status_change_type=None, comment_type=None,
182 200 resolves_comment_id=None, closing_pr=False, send_email=True,
183 201 renderer=None, auth_user=None):
184 202 """
185 203 Creates new comment for commit or pull request.
186 204 IF status_change is not none this comment is associated with a
187 205 status change of commit or commit associated with pull request
188 206
189 207 :param text:
190 208 :param repo:
191 209 :param user:
192 210 :param commit_id:
193 211 :param pull_request:
194 212 :param f_path:
195 213 :param line_no:
196 214 :param status_change: Label for status change
197 215 :param comment_type: Type of comment
198 216 :param status_change_type: type of status change
199 217 :param closing_pr:
200 218 :param send_email:
201 219 :param renderer: pick renderer for this comment
202 220 """
203 221
204 222 if not text:
205 223 log.warning('Missing text for comment, skipping...')
206 224 return
207 225 request = get_current_request()
208 226 _ = request.translate
209 227
210 228 if not renderer:
211 229 renderer = self._get_renderer(request=request)
212 230
213 231 repo = self._get_repo(repo)
214 232 user = self._get_user(user)
215 233 auth_user = auth_user or user
216 234
217 235 schema = comment_schema.CommentSchema()
218 236 validated_kwargs = schema.deserialize(dict(
219 237 comment_body=text,
220 238 comment_type=comment_type,
221 239 comment_file=f_path,
222 240 comment_line=line_no,
223 241 renderer_type=renderer,
224 242 status_change=status_change_type,
225 243 resolves_comment_id=resolves_comment_id,
226 244 repo=repo.repo_id,
227 245 user=user.user_id,
228 246 ))
229 247
230 248 comment = ChangesetComment()
231 249 comment.renderer = validated_kwargs['renderer_type']
232 250 comment.text = validated_kwargs['comment_body']
233 251 comment.f_path = validated_kwargs['comment_file']
234 252 comment.line_no = validated_kwargs['comment_line']
235 253 comment.comment_type = validated_kwargs['comment_type']
236 254
237 255 comment.repo = repo
238 256 comment.author = user
239 257 resolved_comment = self.__get_commit_comment(
240 258 validated_kwargs['resolves_comment_id'])
241 259 # check if the comment actually belongs to this PR
242 260 if resolved_comment and resolved_comment.pull_request and \
243 261 resolved_comment.pull_request != pull_request:
244 262 # comment not bound to this pull request, forbid
245 263 resolved_comment = None
246 264 comment.resolved_comment = resolved_comment
247 265
248 266 pull_request_id = pull_request
249 267
250 268 commit_obj = None
251 269 pull_request_obj = None
252 270
253 271 if commit_id:
254 272 notification_type = EmailNotificationModel.TYPE_COMMIT_COMMENT
255 273 # do a lookup, so we don't pass something bad here
256 274 commit_obj = repo.scm_instance().get_commit(commit_id=commit_id)
257 275 comment.revision = commit_obj.raw_id
258 276
259 277 elif pull_request_id:
260 278 notification_type = EmailNotificationModel.TYPE_PULL_REQUEST_COMMENT
261 279 pull_request_obj = self.__get_pull_request(pull_request_id)
262 280 comment.pull_request = pull_request_obj
263 281 else:
264 282 raise Exception('Please specify commit or pull_request_id')
265 283
266 284 Session().add(comment)
267 285 Session().flush()
268 286 kwargs = {
269 287 'user': user,
270 288 'renderer_type': renderer,
271 289 'repo_name': repo.repo_name,
272 290 'status_change': status_change,
273 291 'status_change_type': status_change_type,
274 292 'comment_body': text,
275 293 'comment_file': f_path,
276 294 'comment_line': line_no,
277 295 'comment_type': comment_type or 'note'
278 296 }
279 297
280 298 if commit_obj:
281 299 recipients = ChangesetComment.get_users(
282 300 revision=commit_obj.raw_id)
283 301 # add commit author if it's in RhodeCode system
284 302 cs_author = User.get_from_cs_author(commit_obj.author)
285 303 if not cs_author:
286 304 # use repo owner if we cannot extract the author correctly
287 305 cs_author = repo.user
288 306 recipients += [cs_author]
289 307
290 308 commit_comment_url = self.get_url(comment, request=request)
291 309
292 310 target_repo_url = h.link_to(
293 311 repo.repo_name,
294 312 h.route_url('repo_summary', repo_name=repo.repo_name))
295 313
296 314 # commit specifics
297 315 kwargs.update({
298 316 'commit': commit_obj,
299 317 'commit_message': commit_obj.message,
300 318 'commit_target_repo': target_repo_url,
301 319 'commit_comment_url': commit_comment_url,
302 320 })
303 321
304 322 elif pull_request_obj:
305 323 # get the current participants of this pull request
306 324 recipients = ChangesetComment.get_users(
307 325 pull_request_id=pull_request_obj.pull_request_id)
308 326 # add pull request author
309 327 recipients += [pull_request_obj.author]
310 328
311 329 # add the reviewers to notification
312 330 recipients += [x.user for x in pull_request_obj.reviewers]
313 331
314 332 pr_target_repo = pull_request_obj.target_repo
315 333 pr_source_repo = pull_request_obj.source_repo
316 334
317 335 pr_comment_url = h.route_url(
318 336 'pullrequest_show',
319 337 repo_name=pr_target_repo.repo_name,
320 338 pull_request_id=pull_request_obj.pull_request_id,
321 339 _anchor='comment-%s' % comment.comment_id)
322 340
323 341 # set some variables for email notification
324 342 pr_target_repo_url = h.route_url(
325 343 'repo_summary', repo_name=pr_target_repo.repo_name)
326 344
327 345 pr_source_repo_url = h.route_url(
328 346 'repo_summary', repo_name=pr_source_repo.repo_name)
329 347
330 348 # pull request specifics
331 349 kwargs.update({
332 350 'pull_request': pull_request_obj,
333 351 'pr_id': pull_request_obj.pull_request_id,
334 352 'pr_target_repo': pr_target_repo,
335 353 'pr_target_repo_url': pr_target_repo_url,
336 354 'pr_source_repo': pr_source_repo,
337 355 'pr_source_repo_url': pr_source_repo_url,
338 356 'pr_comment_url': pr_comment_url,
339 357 'pr_closing': closing_pr,
340 358 })
341 359 if send_email:
342 360 # pre-generate the subject for notification itself
343 361 (subject,
344 362 _h, _e, # we don't care about those
345 363 body_plaintext) = EmailNotificationModel().render_email(
346 364 notification_type, **kwargs)
347 365
348 366 mention_recipients = set(
349 367 self._extract_mentions(text)).difference(recipients)
350 368
351 369 # create notification objects, and emails
352 370 NotificationModel().create(
353 371 created_by=user,
354 372 notification_subject=subject,
355 373 notification_body=body_plaintext,
356 374 notification_type=notification_type,
357 375 recipients=recipients,
358 376 mention_recipients=mention_recipients,
359 377 email_kwargs=kwargs,
360 378 )
361 379
362 380 Session().flush()
363 381 if comment.pull_request:
364 382 action = 'repo.pull_request.comment.create'
365 383 else:
366 384 action = 'repo.commit.comment.create'
367 385
368 386 comment_data = comment.get_api_data()
369 387 self._log_audit_action(
370 388 action, {'data': comment_data}, auth_user, comment)
371 389
372 390 msg_url = ''
373 391 channel = None
374 392 if commit_obj:
375 393 msg_url = commit_comment_url
376 394 repo_name = repo.repo_name
377 395 channel = u'/repo${}$/commit/{}'.format(
378 396 repo_name,
379 397 commit_obj.raw_id
380 398 )
381 399 elif pull_request_obj:
382 400 msg_url = pr_comment_url
383 401 repo_name = pr_target_repo.repo_name
384 402 channel = u'/repo${}$/pr/{}'.format(
385 403 repo_name,
386 404 pull_request_id
387 405 )
388 406
389 407 message = '<strong>{}</strong> {} - ' \
390 408 '<a onclick="window.location=\'{}\';' \
391 409 'window.location.reload()">' \
392 410 '<strong>{}</strong></a>'
393 411 message = message.format(
394 412 user.username, _('made a comment'), msg_url,
395 413 _('Show it now'))
396 414
397 415 channelstream.post_message(
398 416 channel, message, user.username,
399 417 registry=get_current_registry())
400 418
401 419 return comment
402 420
403 421 def delete(self, comment, auth_user):
404 422 """
405 423 Deletes given comment
406 424 """
407 425 comment = self.__get_commit_comment(comment)
408 426 old_data = comment.get_api_data()
409 427 Session().delete(comment)
410 428
411 429 if comment.pull_request:
412 430 action = 'repo.pull_request.comment.delete'
413 431 else:
414 432 action = 'repo.commit.comment.delete'
415 433
416 434 self._log_audit_action(
417 435 action, {'old_data': old_data}, auth_user, comment)
418 436
419 437 return comment
420 438
421 439 def get_all_comments(self, repo_id, revision=None, pull_request=None):
422 440 q = ChangesetComment.query()\
423 441 .filter(ChangesetComment.repo_id == repo_id)
424 442 if revision:
425 443 q = q.filter(ChangesetComment.revision == revision)
426 444 elif pull_request:
427 445 pull_request = self.__get_pull_request(pull_request)
428 446 q = q.filter(ChangesetComment.pull_request == pull_request)
429 447 else:
430 448 raise Exception('Please specify commit or pull_request')
431 449 q = q.order_by(ChangesetComment.created_on)
432 450 return q.all()
433 451
434 452 def get_url(self, comment, request=None, permalink=False):
435 453 if not request:
436 454 request = get_current_request()
437 455
438 456 comment = self.__get_commit_comment(comment)
439 457 if comment.pull_request:
440 458 pull_request = comment.pull_request
441 459 if permalink:
442 460 return request.route_url(
443 461 'pull_requests_global',
444 462 pull_request_id=pull_request.pull_request_id,
445 463 _anchor='comment-%s' % comment.comment_id)
446 464 else:
447 465 return request.route_url(
448 466 'pullrequest_show',
449 467 repo_name=safe_str(pull_request.target_repo.repo_name),
450 468 pull_request_id=pull_request.pull_request_id,
451 469 _anchor='comment-%s' % comment.comment_id)
452 470
453 471 else:
454 472 repo = comment.repo
455 473 commit_id = comment.revision
456 474
457 475 if permalink:
458 476 return request.route_url(
459 477 'repo_commit', repo_name=safe_str(repo.repo_id),
460 478 commit_id=commit_id,
461 479 _anchor='comment-%s' % comment.comment_id)
462 480
463 481 else:
464 482 return request.route_url(
465 483 'repo_commit', repo_name=safe_str(repo.repo_name),
466 484 commit_id=commit_id,
467 485 _anchor='comment-%s' % comment.comment_id)
468 486
469 487 def get_comments(self, repo_id, revision=None, pull_request=None):
470 488 """
471 489 Gets main comments based on revision or pull_request_id
472 490
473 491 :param repo_id:
474 492 :param revision:
475 493 :param pull_request:
476 494 """
477 495
478 496 q = ChangesetComment.query()\
479 497 .filter(ChangesetComment.repo_id == repo_id)\
480 498 .filter(ChangesetComment.line_no == None)\
481 499 .filter(ChangesetComment.f_path == None)
482 500 if revision:
483 501 q = q.filter(ChangesetComment.revision == revision)
484 502 elif pull_request:
485 503 pull_request = self.__get_pull_request(pull_request)
486 504 q = q.filter(ChangesetComment.pull_request == pull_request)
487 505 else:
488 506 raise Exception('Please specify commit or pull_request')
489 507 q = q.order_by(ChangesetComment.created_on)
490 508 return q.all()
491 509
492 510 def get_inline_comments(self, repo_id, revision=None, pull_request=None):
493 511 q = self._get_inline_comments_query(repo_id, revision, pull_request)
494 512 return self._group_comments_by_path_and_line_number(q)
495 513
496 514 def get_inline_comments_count(self, inline_comments, skip_outdated=True,
497 515 version=None):
498 516 inline_cnt = 0
499 517 for fname, per_line_comments in inline_comments.iteritems():
500 518 for lno, comments in per_line_comments.iteritems():
501 519 for comm in comments:
502 520 if not comm.outdated_at_version(version) and skip_outdated:
503 521 inline_cnt += 1
504 522
505 523 return inline_cnt
506 524
507 525 def get_outdated_comments(self, repo_id, pull_request):
508 526 # TODO: johbo: Remove `repo_id`, it is not needed to find the comments
509 527 # of a pull request.
510 528 q = self._all_inline_comments_of_pull_request(pull_request)
511 529 q = q.filter(
512 530 ChangesetComment.display_state ==
513 531 ChangesetComment.COMMENT_OUTDATED
514 532 ).order_by(ChangesetComment.comment_id.asc())
515 533
516 534 return self._group_comments_by_path_and_line_number(q)
517 535
518 536 def _get_inline_comments_query(self, repo_id, revision, pull_request):
519 537 # TODO: johbo: Split this into two methods: One for PR and one for
520 538 # commit.
521 539 if revision:
522 540 q = Session().query(ChangesetComment).filter(
523 541 ChangesetComment.repo_id == repo_id,
524 542 ChangesetComment.line_no != null(),
525 543 ChangesetComment.f_path != null(),
526 544 ChangesetComment.revision == revision)
527 545
528 546 elif pull_request:
529 547 pull_request = self.__get_pull_request(pull_request)
530 548 if not CommentsModel.use_outdated_comments(pull_request):
531 549 q = self._visible_inline_comments_of_pull_request(pull_request)
532 550 else:
533 551 q = self._all_inline_comments_of_pull_request(pull_request)
534 552
535 553 else:
536 554 raise Exception('Please specify commit or pull_request_id')
537 555 q = q.order_by(ChangesetComment.comment_id.asc())
538 556 return q
539 557
540 558 def _group_comments_by_path_and_line_number(self, q):
541 559 comments = q.all()
542 560 paths = collections.defaultdict(lambda: collections.defaultdict(list))
543 561 for co in comments:
544 562 paths[co.f_path][co.line_no].append(co)
545 563 return paths
546 564
547 565 @classmethod
548 566 def needed_extra_diff_context(cls):
549 567 return max(cls.DIFF_CONTEXT_BEFORE, cls.DIFF_CONTEXT_AFTER)
550 568
551 569 def outdate_comments(self, pull_request, old_diff_data, new_diff_data):
552 570 if not CommentsModel.use_outdated_comments(pull_request):
553 571 return
554 572
555 573 comments = self._visible_inline_comments_of_pull_request(pull_request)
556 574 comments_to_outdate = comments.all()
557 575
558 576 for comment in comments_to_outdate:
559 577 self._outdate_one_comment(comment, old_diff_data, new_diff_data)
560 578
561 579 def _outdate_one_comment(self, comment, old_diff_proc, new_diff_proc):
562 580 diff_line = _parse_comment_line_number(comment.line_no)
563 581
564 582 try:
565 583 old_context = old_diff_proc.get_context_of_line(
566 584 path=comment.f_path, diff_line=diff_line)
567 585 new_context = new_diff_proc.get_context_of_line(
568 586 path=comment.f_path, diff_line=diff_line)
569 587 except (diffs.LineNotInDiffException,
570 588 diffs.FileNotInDiffException):
571 589 comment.display_state = ChangesetComment.COMMENT_OUTDATED
572 590 return
573 591
574 592 if old_context == new_context:
575 593 return
576 594
577 595 if self._should_relocate_diff_line(diff_line):
578 596 new_diff_lines = new_diff_proc.find_context(
579 597 path=comment.f_path, context=old_context,
580 598 offset=self.DIFF_CONTEXT_BEFORE)
581 599 if not new_diff_lines:
582 600 comment.display_state = ChangesetComment.COMMENT_OUTDATED
583 601 else:
584 602 new_diff_line = self._choose_closest_diff_line(
585 603 diff_line, new_diff_lines)
586 604 comment.line_no = _diff_to_comment_line_number(new_diff_line)
587 605 else:
588 606 comment.display_state = ChangesetComment.COMMENT_OUTDATED
589 607
590 608 def _should_relocate_diff_line(self, diff_line):
591 609 """
592 610 Checks if relocation shall be tried for the given `diff_line`.
593 611
594 612 If a comment points into the first lines, then we can have a situation
595 613 that after an update another line has been added on top. In this case
596 614 we would find the context still and move the comment around. This
597 615 would be wrong.
598 616 """
599 617 should_relocate = (
600 618 (diff_line.new and diff_line.new > self.DIFF_CONTEXT_BEFORE) or
601 619 (diff_line.old and diff_line.old > self.DIFF_CONTEXT_BEFORE))
602 620 return should_relocate
603 621
604 622 def _choose_closest_diff_line(self, diff_line, new_diff_lines):
605 623 candidate = new_diff_lines[0]
606 624 best_delta = _diff_line_delta(diff_line, candidate)
607 625 for new_diff_line in new_diff_lines[1:]:
608 626 delta = _diff_line_delta(diff_line, new_diff_line)
609 627 if delta < best_delta:
610 628 candidate = new_diff_line
611 629 best_delta = delta
612 630 return candidate
613 631
614 632 def _visible_inline_comments_of_pull_request(self, pull_request):
615 633 comments = self._all_inline_comments_of_pull_request(pull_request)
616 634 comments = comments.filter(
617 635 coalesce(ChangesetComment.display_state, '') !=
618 636 ChangesetComment.COMMENT_OUTDATED)
619 637 return comments
620 638
621 639 def _all_inline_comments_of_pull_request(self, pull_request):
622 640 comments = Session().query(ChangesetComment)\
623 641 .filter(ChangesetComment.line_no != None)\
624 642 .filter(ChangesetComment.f_path != None)\
625 643 .filter(ChangesetComment.pull_request == pull_request)
626 644 return comments
627 645
628 646 def _all_general_comments_of_pull_request(self, pull_request):
629 647 comments = Session().query(ChangesetComment)\
630 648 .filter(ChangesetComment.line_no == None)\
631 649 .filter(ChangesetComment.f_path == None)\
632 650 .filter(ChangesetComment.pull_request == pull_request)
633 651 return comments
634 652
635 653 @staticmethod
636 654 def use_outdated_comments(pull_request):
637 655 settings_model = VcsSettingsModel(repo=pull_request.target_repo)
638 656 settings = settings_model.get_general_settings()
639 657 return settings.get('rhodecode_use_outdated_comments', False)
640 658
641 659
642 660 def _parse_comment_line_number(line_no):
643 661 """
644 662 Parses line numbers of the form "(o|n)\d+" and returns them in a tuple.
645 663 """
646 664 old_line = None
647 665 new_line = None
648 666 if line_no.startswith('o'):
649 667 old_line = int(line_no[1:])
650 668 elif line_no.startswith('n'):
651 669 new_line = int(line_no[1:])
652 670 else:
653 671 raise ValueError("Comment lines have to start with either 'o' or 'n'.")
654 672 return diffs.DiffLineNumber(old_line, new_line)
655 673
656 674
657 675 def _diff_to_comment_line_number(diff_line):
658 676 if diff_line.new is not None:
659 677 return u'n{}'.format(diff_line.new)
660 678 elif diff_line.old is not None:
661 679 return u'o{}'.format(diff_line.old)
662 680 return u''
663 681
664 682
665 683 def _diff_line_delta(a, b):
666 684 if None not in (a.new, b.new):
667 685 return abs(a.new - b.new)
668 686 elif None not in (a.old, b.old):
669 687 return abs(a.old - b.old)
670 688 else:
671 689 raise ValueError(
672 690 "Cannot compute delta between {} and {}".format(a, b))
@@ -1,4876 +1,4877 b''
1 1 # -*- coding: utf-8 -*-
2 2
3 3 # Copyright (C) 2010-2019 RhodeCode GmbH
4 4 #
5 5 # This program is free software: you can redistribute it and/or modify
6 6 # it under the terms of the GNU Affero General Public License, version 3
7 7 # (only), as published by the Free Software Foundation.
8 8 #
9 9 # This program is distributed in the hope that it will be useful,
10 10 # but WITHOUT ANY WARRANTY; without even the implied warranty of
11 11 # MERCHANTABILITY or FITNESS FOR A PARTICULAR PURPOSE. See the
12 12 # GNU General Public License for more details.
13 13 #
14 14 # You should have received a copy of the GNU Affero General Public License
15 15 # along with this program. If not, see <http://www.gnu.org/licenses/>.
16 16 #
17 17 # This program is dual-licensed. If you wish to learn more about the
18 18 # RhodeCode Enterprise Edition, including its added features, Support services,
19 19 # and proprietary license terms, please see https://rhodecode.com/licenses/
20 20
21 21 """
22 22 Database Models for RhodeCode Enterprise
23 23 """
24 24
25 25 import re
26 26 import os
27 27 import time
28 28 import hashlib
29 29 import logging
30 30 import datetime
31 31 import warnings
32 32 import ipaddress
33 33 import functools
34 34 import traceback
35 35 import collections
36 36
37 37 from sqlalchemy import (
38 38 or_, and_, not_, func, TypeDecorator, event,
39 39 Index, Sequence, UniqueConstraint, ForeignKey, CheckConstraint, Column,
40 40 Boolean, String, Unicode, UnicodeText, DateTime, Integer, LargeBinary,
41 41 Text, Float, PickleType)
42 42 from sqlalchemy.sql.expression import true, false
43 43 from sqlalchemy.sql.functions import coalesce, count # pragma: no cover
44 44 from sqlalchemy.orm import (
45 45 relationship, joinedload, class_mapper, validates, aliased)
46 46 from sqlalchemy.ext.declarative import declared_attr
47 47 from sqlalchemy.ext.hybrid import hybrid_property
48 48 from sqlalchemy.exc import IntegrityError # pragma: no cover
49 49 from sqlalchemy.dialects.mysql import LONGTEXT
50 50 from zope.cachedescriptors.property import Lazy as LazyProperty
51 51 from pyramid import compat
52 52 from pyramid.threadlocal import get_current_request
53 53
54 54 from rhodecode.translation import _
55 55 from rhodecode.lib.vcs import get_vcs_instance
56 56 from rhodecode.lib.vcs.backends.base import EmptyCommit, Reference
57 57 from rhodecode.lib.utils2 import (
58 58 str2bool, safe_str, get_commit_safe, safe_unicode, sha1_safe,
59 59 time_to_datetime, aslist, Optional, safe_int, get_clone_url, AttributeDict,
60 60 glob2re, StrictAttributeDict, cleaned_uri)
61 61 from rhodecode.lib.jsonalchemy import MutationObj, MutationList, JsonType, \
62 62 JsonRaw
63 63 from rhodecode.lib.ext_json import json
64 64 from rhodecode.lib.caching_query import FromCache
65 65 from rhodecode.lib.encrypt import AESCipher
66 66
67 67 from rhodecode.model.meta import Base, Session
68 68
69 69 URL_SEP = '/'
70 70 log = logging.getLogger(__name__)
71 71
72 72 # =============================================================================
73 73 # BASE CLASSES
74 74 # =============================================================================
75 75
76 76 # this is propagated from .ini file rhodecode.encrypted_values.secret or
77 77 # beaker.session.secret if first is not set.
78 78 # and initialized at environment.py
79 79 ENCRYPTION_KEY = None
80 80
81 81 # used to sort permissions by types, '#' used here is not allowed to be in
82 82 # usernames, and it's very early in sorted string.printable table.
83 83 PERMISSION_TYPE_SORT = {
84 84 'admin': '####',
85 85 'write': '###',
86 86 'read': '##',
87 87 'none': '#',
88 88 }
89 89
90 90
91 91 def display_user_sort(obj):
92 92 """
93 93 Sort function used to sort permissions in .permissions() function of
94 94 Repository, RepoGroup, UserGroup. Also it put the default user in front
95 95 of all other resources
96 96 """
97 97
98 98 if obj.username == User.DEFAULT_USER:
99 99 return '#####'
100 100 prefix = PERMISSION_TYPE_SORT.get(obj.permission.split('.')[-1], '')
101 101 return prefix + obj.username
102 102
103 103
104 104 def display_user_group_sort(obj):
105 105 """
106 106 Sort function used to sort permissions in .permissions() function of
107 107 Repository, RepoGroup, UserGroup. Also it put the default user in front
108 108 of all other resources
109 109 """
110 110
111 111 prefix = PERMISSION_TYPE_SORT.get(obj.permission.split('.')[-1], '')
112 112 return prefix + obj.users_group_name
113 113
114 114
115 115 def _hash_key(k):
116 116 return sha1_safe(k)
117 117
118 118
119 119 def in_filter_generator(qry, items, limit=500):
120 120 """
121 121 Splits IN() into multiple with OR
122 122 e.g.::
123 123 cnt = Repository.query().filter(
124 124 or_(
125 125 *in_filter_generator(Repository.repo_id, range(100000))
126 126 )).count()
127 127 """
128 128 if not items:
129 129 # empty list will cause empty query which might cause security issues
130 130 # this can lead to hidden unpleasant results
131 131 items = [-1]
132 132
133 133 parts = []
134 134 for chunk in xrange(0, len(items), limit):
135 135 parts.append(
136 136 qry.in_(items[chunk: chunk + limit])
137 137 )
138 138
139 139 return parts
140 140
141 141
142 142 base_table_args = {
143 143 'extend_existing': True,
144 144 'mysql_engine': 'InnoDB',
145 145 'mysql_charset': 'utf8',
146 146 'sqlite_autoincrement': True
147 147 }
148 148
149 149
150 150 class EncryptedTextValue(TypeDecorator):
151 151 """
152 152 Special column for encrypted long text data, use like::
153 153
154 154 value = Column("encrypted_value", EncryptedValue(), nullable=False)
155 155
156 156 This column is intelligent so if value is in unencrypted form it return
157 157 unencrypted form, but on save it always encrypts
158 158 """
159 159 impl = Text
160 160
161 161 def process_bind_param(self, value, dialect):
162 162 if not value:
163 163 return value
164 164 if value.startswith('enc$aes$') or value.startswith('enc$aes_hmac$'):
165 165 # protect against double encrypting if someone manually starts
166 166 # doing
167 167 raise ValueError('value needs to be in unencrypted format, ie. '
168 168 'not starting with enc$aes')
169 169 return 'enc$aes_hmac$%s' % AESCipher(
170 170 ENCRYPTION_KEY, hmac=True).encrypt(value)
171 171
172 172 def process_result_value(self, value, dialect):
173 173 import rhodecode
174 174
175 175 if not value:
176 176 return value
177 177
178 178 parts = value.split('$', 3)
179 179 if not len(parts) == 3:
180 180 # probably not encrypted values
181 181 return value
182 182 else:
183 183 if parts[0] != 'enc':
184 184 # parts ok but without our header ?
185 185 return value
186 186 enc_strict_mode = str2bool(rhodecode.CONFIG.get(
187 187 'rhodecode.encrypted_values.strict') or True)
188 188 # at that stage we know it's our encryption
189 189 if parts[1] == 'aes':
190 190 decrypted_data = AESCipher(ENCRYPTION_KEY).decrypt(parts[2])
191 191 elif parts[1] == 'aes_hmac':
192 192 decrypted_data = AESCipher(
193 193 ENCRYPTION_KEY, hmac=True,
194 194 strict_verification=enc_strict_mode).decrypt(parts[2])
195 195 else:
196 196 raise ValueError(
197 197 'Encryption type part is wrong, must be `aes` '
198 198 'or `aes_hmac`, got `%s` instead' % (parts[1]))
199 199 return decrypted_data
200 200
201 201
202 202 class BaseModel(object):
203 203 """
204 204 Base Model for all classes
205 205 """
206 206
207 207 @classmethod
208 208 def _get_keys(cls):
209 209 """return column names for this model """
210 210 return class_mapper(cls).c.keys()
211 211
212 212 def get_dict(self):
213 213 """
214 214 return dict with keys and values corresponding
215 215 to this model data """
216 216
217 217 d = {}
218 218 for k in self._get_keys():
219 219 d[k] = getattr(self, k)
220 220
221 221 # also use __json__() if present to get additional fields
222 222 _json_attr = getattr(self, '__json__', None)
223 223 if _json_attr:
224 224 # update with attributes from __json__
225 225 if callable(_json_attr):
226 226 _json_attr = _json_attr()
227 227 for k, val in _json_attr.iteritems():
228 228 d[k] = val
229 229 return d
230 230
231 231 def get_appstruct(self):
232 232 """return list with keys and values tuples corresponding
233 233 to this model data """
234 234
235 235 lst = []
236 236 for k in self._get_keys():
237 237 lst.append((k, getattr(self, k),))
238 238 return lst
239 239
240 240 def populate_obj(self, populate_dict):
241 241 """populate model with data from given populate_dict"""
242 242
243 243 for k in self._get_keys():
244 244 if k in populate_dict:
245 245 setattr(self, k, populate_dict[k])
246 246
247 247 @classmethod
248 248 def query(cls):
249 249 return Session().query(cls)
250 250
251 251 @classmethod
252 252 def get(cls, id_):
253 253 if id_:
254 254 return cls.query().get(id_)
255 255
256 256 @classmethod
257 257 def get_or_404(cls, id_):
258 258 from pyramid.httpexceptions import HTTPNotFound
259 259
260 260 try:
261 261 id_ = int(id_)
262 262 except (TypeError, ValueError):
263 263 raise HTTPNotFound()
264 264
265 265 res = cls.query().get(id_)
266 266 if not res:
267 267 raise HTTPNotFound()
268 268 return res
269 269
270 270 @classmethod
271 271 def getAll(cls):
272 272 # deprecated and left for backward compatibility
273 273 return cls.get_all()
274 274
275 275 @classmethod
276 276 def get_all(cls):
277 277 return cls.query().all()
278 278
279 279 @classmethod
280 280 def delete(cls, id_):
281 281 obj = cls.query().get(id_)
282 282 Session().delete(obj)
283 283
284 284 @classmethod
285 285 def identity_cache(cls, session, attr_name, value):
286 286 exist_in_session = []
287 287 for (item_cls, pkey), instance in session.identity_map.items():
288 288 if cls == item_cls and getattr(instance, attr_name) == value:
289 289 exist_in_session.append(instance)
290 290 if exist_in_session:
291 291 if len(exist_in_session) == 1:
292 292 return exist_in_session[0]
293 293 log.exception(
294 294 'multiple objects with attr %s and '
295 295 'value %s found with same name: %r',
296 296 attr_name, value, exist_in_session)
297 297
298 298 def __repr__(self):
299 299 if hasattr(self, '__unicode__'):
300 300 # python repr needs to return str
301 301 try:
302 302 return safe_str(self.__unicode__())
303 303 except UnicodeDecodeError:
304 304 pass
305 305 return '<DB:%s>' % (self.__class__.__name__)
306 306
307 307
308 308 class RhodeCodeSetting(Base, BaseModel):
309 309 __tablename__ = 'rhodecode_settings'
310 310 __table_args__ = (
311 311 UniqueConstraint('app_settings_name'),
312 312 base_table_args
313 313 )
314 314
315 315 SETTINGS_TYPES = {
316 316 'str': safe_str,
317 317 'int': safe_int,
318 318 'unicode': safe_unicode,
319 319 'bool': str2bool,
320 320 'list': functools.partial(aslist, sep=',')
321 321 }
322 322 DEFAULT_UPDATE_URL = 'https://rhodecode.com/api/v1/info/versions'
323 323 GLOBAL_CONF_KEY = 'app_settings'
324 324
325 325 app_settings_id = Column("app_settings_id", Integer(), nullable=False, unique=True, default=None, primary_key=True)
326 326 app_settings_name = Column("app_settings_name", String(255), nullable=True, unique=None, default=None)
327 327 _app_settings_value = Column("app_settings_value", String(4096), nullable=True, unique=None, default=None)
328 328 _app_settings_type = Column("app_settings_type", String(255), nullable=True, unique=None, default=None)
329 329
330 330 def __init__(self, key='', val='', type='unicode'):
331 331 self.app_settings_name = key
332 332 self.app_settings_type = type
333 333 self.app_settings_value = val
334 334
335 335 @validates('_app_settings_value')
336 336 def validate_settings_value(self, key, val):
337 337 assert type(val) == unicode
338 338 return val
339 339
340 340 @hybrid_property
341 341 def app_settings_value(self):
342 342 v = self._app_settings_value
343 343 _type = self.app_settings_type
344 344 if _type:
345 345 _type = self.app_settings_type.split('.')[0]
346 346 # decode the encrypted value
347 347 if 'encrypted' in self.app_settings_type:
348 348 cipher = EncryptedTextValue()
349 349 v = safe_unicode(cipher.process_result_value(v, None))
350 350
351 351 converter = self.SETTINGS_TYPES.get(_type) or \
352 352 self.SETTINGS_TYPES['unicode']
353 353 return converter(v)
354 354
355 355 @app_settings_value.setter
356 356 def app_settings_value(self, val):
357 357 """
358 358 Setter that will always make sure we use unicode in app_settings_value
359 359
360 360 :param val:
361 361 """
362 362 val = safe_unicode(val)
363 363 # encode the encrypted value
364 364 if 'encrypted' in self.app_settings_type:
365 365 cipher = EncryptedTextValue()
366 366 val = safe_unicode(cipher.process_bind_param(val, None))
367 367 self._app_settings_value = val
368 368
369 369 @hybrid_property
370 370 def app_settings_type(self):
371 371 return self._app_settings_type
372 372
373 373 @app_settings_type.setter
374 374 def app_settings_type(self, val):
375 375 if val.split('.')[0] not in self.SETTINGS_TYPES:
376 376 raise Exception('type must be one of %s got %s'
377 377 % (self.SETTINGS_TYPES.keys(), val))
378 378 self._app_settings_type = val
379 379
380 380 @classmethod
381 381 def get_by_prefix(cls, prefix):
382 382 return RhodeCodeSetting.query()\
383 383 .filter(RhodeCodeSetting.app_settings_name.startswith(prefix))\
384 384 .all()
385 385
386 386 def __unicode__(self):
387 387 return u"<%s('%s:%s[%s]')>" % (
388 388 self.__class__.__name__,
389 389 self.app_settings_name, self.app_settings_value,
390 390 self.app_settings_type
391 391 )
392 392
393 393
394 394 class RhodeCodeUi(Base, BaseModel):
395 395 __tablename__ = 'rhodecode_ui'
396 396 __table_args__ = (
397 397 UniqueConstraint('ui_key'),
398 398 base_table_args
399 399 )
400 400
401 401 HOOK_REPO_SIZE = 'changegroup.repo_size'
402 402 # HG
403 403 HOOK_PRE_PULL = 'preoutgoing.pre_pull'
404 404 HOOK_PULL = 'outgoing.pull_logger'
405 405 HOOK_PRE_PUSH = 'prechangegroup.pre_push'
406 406 HOOK_PRETX_PUSH = 'pretxnchangegroup.pre_push'
407 407 HOOK_PUSH = 'changegroup.push_logger'
408 408 HOOK_PUSH_KEY = 'pushkey.key_push'
409 409
410 410 # TODO: johbo: Unify way how hooks are configured for git and hg,
411 411 # git part is currently hardcoded.
412 412
413 413 # SVN PATTERNS
414 414 SVN_BRANCH_ID = 'vcs_svn_branch'
415 415 SVN_TAG_ID = 'vcs_svn_tag'
416 416
417 417 ui_id = Column(
418 418 "ui_id", Integer(), nullable=False, unique=True, default=None,
419 419 primary_key=True)
420 420 ui_section = Column(
421 421 "ui_section", String(255), nullable=True, unique=None, default=None)
422 422 ui_key = Column(
423 423 "ui_key", String(255), nullable=True, unique=None, default=None)
424 424 ui_value = Column(
425 425 "ui_value", String(255), nullable=True, unique=None, default=None)
426 426 ui_active = Column(
427 427 "ui_active", Boolean(), nullable=True, unique=None, default=True)
428 428
429 429 def __repr__(self):
430 430 return '<%s[%s]%s=>%s]>' % (self.__class__.__name__, self.ui_section,
431 431 self.ui_key, self.ui_value)
432 432
433 433
434 434 class RepoRhodeCodeSetting(Base, BaseModel):
435 435 __tablename__ = 'repo_rhodecode_settings'
436 436 __table_args__ = (
437 437 UniqueConstraint(
438 438 'app_settings_name', 'repository_id',
439 439 name='uq_repo_rhodecode_setting_name_repo_id'),
440 440 base_table_args
441 441 )
442 442
443 443 repository_id = Column(
444 444 "repository_id", Integer(), ForeignKey('repositories.repo_id'),
445 445 nullable=False)
446 446 app_settings_id = Column(
447 447 "app_settings_id", Integer(), nullable=False, unique=True,
448 448 default=None, primary_key=True)
449 449 app_settings_name = Column(
450 450 "app_settings_name", String(255), nullable=True, unique=None,
451 451 default=None)
452 452 _app_settings_value = Column(
453 453 "app_settings_value", String(4096), nullable=True, unique=None,
454 454 default=None)
455 455 _app_settings_type = Column(
456 456 "app_settings_type", String(255), nullable=True, unique=None,
457 457 default=None)
458 458
459 459 repository = relationship('Repository')
460 460
461 461 def __init__(self, repository_id, key='', val='', type='unicode'):
462 462 self.repository_id = repository_id
463 463 self.app_settings_name = key
464 464 self.app_settings_type = type
465 465 self.app_settings_value = val
466 466
467 467 @validates('_app_settings_value')
468 468 def validate_settings_value(self, key, val):
469 469 assert type(val) == unicode
470 470 return val
471 471
472 472 @hybrid_property
473 473 def app_settings_value(self):
474 474 v = self._app_settings_value
475 475 type_ = self.app_settings_type
476 476 SETTINGS_TYPES = RhodeCodeSetting.SETTINGS_TYPES
477 477 converter = SETTINGS_TYPES.get(type_) or SETTINGS_TYPES['unicode']
478 478 return converter(v)
479 479
480 480 @app_settings_value.setter
481 481 def app_settings_value(self, val):
482 482 """
483 483 Setter that will always make sure we use unicode in app_settings_value
484 484
485 485 :param val:
486 486 """
487 487 self._app_settings_value = safe_unicode(val)
488 488
489 489 @hybrid_property
490 490 def app_settings_type(self):
491 491 return self._app_settings_type
492 492
493 493 @app_settings_type.setter
494 494 def app_settings_type(self, val):
495 495 SETTINGS_TYPES = RhodeCodeSetting.SETTINGS_TYPES
496 496 if val not in SETTINGS_TYPES:
497 497 raise Exception('type must be one of %s got %s'
498 498 % (SETTINGS_TYPES.keys(), val))
499 499 self._app_settings_type = val
500 500
501 501 def __unicode__(self):
502 502 return u"<%s('%s:%s:%s[%s]')>" % (
503 503 self.__class__.__name__, self.repository.repo_name,
504 504 self.app_settings_name, self.app_settings_value,
505 505 self.app_settings_type
506 506 )
507 507
508 508
509 509 class RepoRhodeCodeUi(Base, BaseModel):
510 510 __tablename__ = 'repo_rhodecode_ui'
511 511 __table_args__ = (
512 512 UniqueConstraint(
513 513 'repository_id', 'ui_section', 'ui_key',
514 514 name='uq_repo_rhodecode_ui_repository_id_section_key'),
515 515 base_table_args
516 516 )
517 517
518 518 repository_id = Column(
519 519 "repository_id", Integer(), ForeignKey('repositories.repo_id'),
520 520 nullable=False)
521 521 ui_id = Column(
522 522 "ui_id", Integer(), nullable=False, unique=True, default=None,
523 523 primary_key=True)
524 524 ui_section = Column(
525 525 "ui_section", String(255), nullable=True, unique=None, default=None)
526 526 ui_key = Column(
527 527 "ui_key", String(255), nullable=True, unique=None, default=None)
528 528 ui_value = Column(
529 529 "ui_value", String(255), nullable=True, unique=None, default=None)
530 530 ui_active = Column(
531 531 "ui_active", Boolean(), nullable=True, unique=None, default=True)
532 532
533 533 repository = relationship('Repository')
534 534
535 535 def __repr__(self):
536 536 return '<%s[%s:%s]%s=>%s]>' % (
537 537 self.__class__.__name__, self.repository.repo_name,
538 538 self.ui_section, self.ui_key, self.ui_value)
539 539
540 540
541 541 class User(Base, BaseModel):
542 542 __tablename__ = 'users'
543 543 __table_args__ = (
544 544 UniqueConstraint('username'), UniqueConstraint('email'),
545 545 Index('u_username_idx', 'username'),
546 546 Index('u_email_idx', 'email'),
547 547 base_table_args
548 548 )
549 549
550 550 DEFAULT_USER = 'default'
551 551 DEFAULT_USER_EMAIL = 'anonymous@rhodecode.org'
552 552 DEFAULT_GRAVATAR_URL = 'https://secure.gravatar.com/avatar/{md5email}?d=identicon&s={size}'
553 553
554 554 user_id = Column("user_id", Integer(), nullable=False, unique=True, default=None, primary_key=True)
555 555 username = Column("username", String(255), nullable=True, unique=None, default=None)
556 556 password = Column("password", String(255), nullable=True, unique=None, default=None)
557 557 active = Column("active", Boolean(), nullable=True, unique=None, default=True)
558 558 admin = Column("admin", Boolean(), nullable=True, unique=None, default=False)
559 559 name = Column("firstname", String(255), nullable=True, unique=None, default=None)
560 560 lastname = Column("lastname", String(255), nullable=True, unique=None, default=None)
561 561 _email = Column("email", String(255), nullable=True, unique=None, default=None)
562 562 last_login = Column("last_login", DateTime(timezone=False), nullable=True, unique=None, default=None)
563 563 last_activity = Column('last_activity', DateTime(timezone=False), nullable=True, unique=None, default=None)
564 564
565 565 extern_type = Column("extern_type", String(255), nullable=True, unique=None, default=None)
566 566 extern_name = Column("extern_name", String(255), nullable=True, unique=None, default=None)
567 567 _api_key = Column("api_key", String(255), nullable=True, unique=None, default=None)
568 568 inherit_default_permissions = Column("inherit_default_permissions", Boolean(), nullable=False, unique=None, default=True)
569 569 created_on = Column('created_on', DateTime(timezone=False), nullable=False, default=datetime.datetime.now)
570 570 _user_data = Column("user_data", LargeBinary(), nullable=True) # JSON data
571 571
572 572 user_log = relationship('UserLog')
573 573 user_perms = relationship('UserToPerm', primaryjoin="User.user_id==UserToPerm.user_id", cascade='all')
574 574
575 575 repositories = relationship('Repository')
576 576 repository_groups = relationship('RepoGroup')
577 577 user_groups = relationship('UserGroup')
578 578
579 579 user_followers = relationship('UserFollowing', primaryjoin='UserFollowing.follows_user_id==User.user_id', cascade='all')
580 580 followings = relationship('UserFollowing', primaryjoin='UserFollowing.user_id==User.user_id', cascade='all')
581 581
582 582 repo_to_perm = relationship('UserRepoToPerm', primaryjoin='UserRepoToPerm.user_id==User.user_id', cascade='all')
583 583 repo_group_to_perm = relationship('UserRepoGroupToPerm', primaryjoin='UserRepoGroupToPerm.user_id==User.user_id', cascade='all')
584 584 user_group_to_perm = relationship('UserUserGroupToPerm', primaryjoin='UserUserGroupToPerm.user_id==User.user_id', cascade='all')
585 585
586 586 group_member = relationship('UserGroupMember', cascade='all')
587 587
588 588 notifications = relationship('UserNotification', cascade='all')
589 589 # notifications assigned to this user
590 590 user_created_notifications = relationship('Notification', cascade='all')
591 591 # comments created by this user
592 592 user_comments = relationship('ChangesetComment', cascade='all')
593 593 # user profile extra info
594 594 user_emails = relationship('UserEmailMap', cascade='all')
595 595 user_ip_map = relationship('UserIpMap', cascade='all')
596 596 user_auth_tokens = relationship('UserApiKeys', cascade='all')
597 597 user_ssh_keys = relationship('UserSshKeys', cascade='all')
598 598
599 599 # gists
600 600 user_gists = relationship('Gist', cascade='all')
601 601 # user pull requests
602 602 user_pull_requests = relationship('PullRequest', cascade='all')
603 603 # external identities
604 604 extenal_identities = relationship(
605 605 'ExternalIdentity',
606 606 primaryjoin="User.user_id==ExternalIdentity.local_user_id",
607 607 cascade='all')
608 608 # review rules
609 609 user_review_rules = relationship('RepoReviewRuleUser', cascade='all')
610 610
611 611 def __unicode__(self):
612 612 return u"<%s('id:%s:%s')>" % (self.__class__.__name__,
613 613 self.user_id, self.username)
614 614
615 615 @hybrid_property
616 616 def email(self):
617 617 return self._email
618 618
619 619 @email.setter
620 620 def email(self, val):
621 621 self._email = val.lower() if val else None
622 622
623 623 @hybrid_property
624 624 def first_name(self):
625 625 from rhodecode.lib import helpers as h
626 626 if self.name:
627 627 return h.escape(self.name)
628 628 return self.name
629 629
630 630 @hybrid_property
631 631 def last_name(self):
632 632 from rhodecode.lib import helpers as h
633 633 if self.lastname:
634 634 return h.escape(self.lastname)
635 635 return self.lastname
636 636
637 637 @hybrid_property
638 638 def api_key(self):
639 639 """
640 640 Fetch if exist an auth-token with role ALL connected to this user
641 641 """
642 642 user_auth_token = UserApiKeys.query()\
643 643 .filter(UserApiKeys.user_id == self.user_id)\
644 644 .filter(or_(UserApiKeys.expires == -1,
645 645 UserApiKeys.expires >= time.time()))\
646 646 .filter(UserApiKeys.role == UserApiKeys.ROLE_ALL).first()
647 647 if user_auth_token:
648 648 user_auth_token = user_auth_token.api_key
649 649
650 650 return user_auth_token
651 651
652 652 @api_key.setter
653 653 def api_key(self, val):
654 654 # don't allow to set API key this is deprecated for now
655 655 self._api_key = None
656 656
657 657 @property
658 658 def reviewer_pull_requests(self):
659 659 return PullRequestReviewers.query() \
660 660 .options(joinedload(PullRequestReviewers.pull_request)) \
661 661 .filter(PullRequestReviewers.user_id == self.user_id) \
662 662 .all()
663 663
664 664 @property
665 665 def firstname(self):
666 666 # alias for future
667 667 return self.name
668 668
669 669 @property
670 670 def emails(self):
671 671 other = UserEmailMap.query()\
672 672 .filter(UserEmailMap.user == self) \
673 673 .order_by(UserEmailMap.email_id.asc()) \
674 674 .all()
675 675 return [self.email] + [x.email for x in other]
676 676
677 677 @property
678 678 def auth_tokens(self):
679 679 auth_tokens = self.get_auth_tokens()
680 680 return [x.api_key for x in auth_tokens]
681 681
682 682 def get_auth_tokens(self):
683 683 return UserApiKeys.query()\
684 684 .filter(UserApiKeys.user == self)\
685 685 .order_by(UserApiKeys.user_api_key_id.asc())\
686 686 .all()
687 687
688 688 @LazyProperty
689 689 def feed_token(self):
690 690 return self.get_feed_token()
691 691
692 692 def get_feed_token(self, cache=True):
693 693 feed_tokens = UserApiKeys.query()\
694 694 .filter(UserApiKeys.user == self)\
695 695 .filter(UserApiKeys.role == UserApiKeys.ROLE_FEED)
696 696 if cache:
697 697 feed_tokens = feed_tokens.options(
698 698 FromCache("sql_cache_short", "get_user_feed_token_%s" % self.user_id))
699 699
700 700 feed_tokens = feed_tokens.all()
701 701 if feed_tokens:
702 702 return feed_tokens[0].api_key
703 703 return 'NO_FEED_TOKEN_AVAILABLE'
704 704
705 705 @classmethod
706 706 def get(cls, user_id, cache=False):
707 707 if not user_id:
708 708 return
709 709
710 710 user = cls.query()
711 711 if cache:
712 712 user = user.options(
713 713 FromCache("sql_cache_short", "get_users_%s" % user_id))
714 714 return user.get(user_id)
715 715
716 716 @classmethod
717 717 def extra_valid_auth_tokens(cls, user, role=None):
718 718 tokens = UserApiKeys.query().filter(UserApiKeys.user == user)\
719 719 .filter(or_(UserApiKeys.expires == -1,
720 720 UserApiKeys.expires >= time.time()))
721 721 if role:
722 722 tokens = tokens.filter(or_(UserApiKeys.role == role,
723 723 UserApiKeys.role == UserApiKeys.ROLE_ALL))
724 724 return tokens.all()
725 725
726 726 def authenticate_by_token(self, auth_token, roles=None, scope_repo_id=None):
727 727 from rhodecode.lib import auth
728 728
729 729 log.debug('Trying to authenticate user: %s via auth-token, '
730 730 'and roles: %s', self, roles)
731 731
732 732 if not auth_token:
733 733 return False
734 734
735 735 crypto_backend = auth.crypto_backend()
736 736
737 737 roles = (roles or []) + [UserApiKeys.ROLE_ALL]
738 738 tokens_q = UserApiKeys.query()\
739 739 .filter(UserApiKeys.user_id == self.user_id)\
740 740 .filter(or_(UserApiKeys.expires == -1,
741 741 UserApiKeys.expires >= time.time()))
742 742
743 743 tokens_q = tokens_q.filter(UserApiKeys.role.in_(roles))
744 744
745 745 plain_tokens = []
746 746 hash_tokens = []
747 747
748 748 user_tokens = tokens_q.all()
749 749 log.debug('Found %s user tokens to check for authentication', len(user_tokens))
750 750 for token in user_tokens:
751 751 log.debug('AUTH_TOKEN: checking if user token with id `%s` matches',
752 752 token.user_api_key_id)
753 753 # verify scope first, since it's way faster than hash calculation of
754 754 # encrypted tokens
755 755 if token.repo_id:
756 756 # token has a scope, we need to verify it
757 757 if scope_repo_id != token.repo_id:
758 758 log.debug(
759 759 'AUTH_TOKEN: scope mismatch, token has a set repo scope: %s, '
760 760 'and calling scope is:%s, skipping further checks',
761 761 token.repo, scope_repo_id)
762 762 # token has a scope, and it doesn't match, skip token
763 763 continue
764 764
765 765 if token.api_key.startswith(crypto_backend.ENC_PREF):
766 766 hash_tokens.append(token.api_key)
767 767 else:
768 768 plain_tokens.append(token.api_key)
769 769
770 770 is_plain_match = auth_token in plain_tokens
771 771 if is_plain_match:
772 772 return True
773 773
774 774 for hashed in hash_tokens:
775 775 # NOTE(marcink): this is expensive to calculate, but most secure
776 776 match = crypto_backend.hash_check(auth_token, hashed)
777 777 if match:
778 778 return True
779 779
780 780 return False
781 781
782 782 @property
783 783 def ip_addresses(self):
784 784 ret = UserIpMap.query().filter(UserIpMap.user == self).all()
785 785 return [x.ip_addr for x in ret]
786 786
787 787 @property
788 788 def username_and_name(self):
789 789 return '%s (%s %s)' % (self.username, self.first_name, self.last_name)
790 790
791 791 @property
792 792 def username_or_name_or_email(self):
793 793 full_name = self.full_name if self.full_name is not ' ' else None
794 794 return self.username or full_name or self.email
795 795
796 796 @property
797 797 def full_name(self):
798 798 return '%s %s' % (self.first_name, self.last_name)
799 799
800 800 @property
801 801 def full_name_or_username(self):
802 802 return ('%s %s' % (self.first_name, self.last_name)
803 803 if (self.first_name and self.last_name) else self.username)
804 804
805 805 @property
806 806 def full_contact(self):
807 807 return '%s %s <%s>' % (self.first_name, self.last_name, self.email)
808 808
809 809 @property
810 810 def short_contact(self):
811 811 return '%s %s' % (self.first_name, self.last_name)
812 812
813 813 @property
814 814 def is_admin(self):
815 815 return self.admin
816 816
817 817 def AuthUser(self, **kwargs):
818 818 """
819 819 Returns instance of AuthUser for this user
820 820 """
821 821 from rhodecode.lib.auth import AuthUser
822 822 return AuthUser(user_id=self.user_id, username=self.username, **kwargs)
823 823
824 824 @hybrid_property
825 825 def user_data(self):
826 826 if not self._user_data:
827 827 return {}
828 828
829 829 try:
830 830 return json.loads(self._user_data)
831 831 except TypeError:
832 832 return {}
833 833
834 834 @user_data.setter
835 835 def user_data(self, val):
836 836 if not isinstance(val, dict):
837 837 raise Exception('user_data must be dict, got %s' % type(val))
838 838 try:
839 839 self._user_data = json.dumps(val)
840 840 except Exception:
841 841 log.error(traceback.format_exc())
842 842
843 843 @classmethod
844 844 def get_by_username(cls, username, case_insensitive=False,
845 845 cache=False, identity_cache=False):
846 846 session = Session()
847 847
848 848 if case_insensitive:
849 849 q = cls.query().filter(
850 850 func.lower(cls.username) == func.lower(username))
851 851 else:
852 852 q = cls.query().filter(cls.username == username)
853 853
854 854 if cache:
855 855 if identity_cache:
856 856 val = cls.identity_cache(session, 'username', username)
857 857 if val:
858 858 return val
859 859 else:
860 860 cache_key = "get_user_by_name_%s" % _hash_key(username)
861 861 q = q.options(
862 862 FromCache("sql_cache_short", cache_key))
863 863
864 864 return q.scalar()
865 865
866 866 @classmethod
867 867 def get_by_auth_token(cls, auth_token, cache=False):
868 868 q = UserApiKeys.query()\
869 869 .filter(UserApiKeys.api_key == auth_token)\
870 870 .filter(or_(UserApiKeys.expires == -1,
871 871 UserApiKeys.expires >= time.time()))
872 872 if cache:
873 873 q = q.options(
874 874 FromCache("sql_cache_short", "get_auth_token_%s" % auth_token))
875 875
876 876 match = q.first()
877 877 if match:
878 878 return match.user
879 879
880 880 @classmethod
881 881 def get_by_email(cls, email, case_insensitive=False, cache=False):
882 882
883 883 if case_insensitive:
884 884 q = cls.query().filter(func.lower(cls.email) == func.lower(email))
885 885
886 886 else:
887 887 q = cls.query().filter(cls.email == email)
888 888
889 889 email_key = _hash_key(email)
890 890 if cache:
891 891 q = q.options(
892 892 FromCache("sql_cache_short", "get_email_key_%s" % email_key))
893 893
894 894 ret = q.scalar()
895 895 if ret is None:
896 896 q = UserEmailMap.query()
897 897 # try fetching in alternate email map
898 898 if case_insensitive:
899 899 q = q.filter(func.lower(UserEmailMap.email) == func.lower(email))
900 900 else:
901 901 q = q.filter(UserEmailMap.email == email)
902 902 q = q.options(joinedload(UserEmailMap.user))
903 903 if cache:
904 904 q = q.options(
905 905 FromCache("sql_cache_short", "get_email_map_key_%s" % email_key))
906 906 ret = getattr(q.scalar(), 'user', None)
907 907
908 908 return ret
909 909
910 910 @classmethod
911 911 def get_from_cs_author(cls, author):
912 912 """
913 913 Tries to get User objects out of commit author string
914 914
915 915 :param author:
916 916 """
917 917 from rhodecode.lib.helpers import email, author_name
918 918 # Valid email in the attribute passed, see if they're in the system
919 919 _email = email(author)
920 920 if _email:
921 921 user = cls.get_by_email(_email, case_insensitive=True)
922 922 if user:
923 923 return user
924 924 # Maybe we can match by username?
925 925 _author = author_name(author)
926 926 user = cls.get_by_username(_author, case_insensitive=True)
927 927 if user:
928 928 return user
929 929
930 930 def update_userdata(self, **kwargs):
931 931 usr = self
932 932 old = usr.user_data
933 933 old.update(**kwargs)
934 934 usr.user_data = old
935 935 Session().add(usr)
936 936 log.debug('updated userdata with ', kwargs)
937 937
938 938 def update_lastlogin(self):
939 939 """Update user lastlogin"""
940 940 self.last_login = datetime.datetime.now()
941 941 Session().add(self)
942 942 log.debug('updated user %s lastlogin', self.username)
943 943
944 944 def update_password(self, new_password):
945 945 from rhodecode.lib.auth import get_crypt_password
946 946
947 947 self.password = get_crypt_password(new_password)
948 948 Session().add(self)
949 949
950 950 @classmethod
951 951 def get_first_super_admin(cls):
952 952 user = User.query()\
953 953 .filter(User.admin == true()) \
954 954 .order_by(User.user_id.asc()) \
955 955 .first()
956 956
957 957 if user is None:
958 958 raise Exception('FATAL: Missing administrative account!')
959 959 return user
960 960
961 961 @classmethod
962 962 def get_all_super_admins(cls, only_active=False):
963 963 """
964 964 Returns all admin accounts sorted by username
965 965 """
966 966 qry = User.query().filter(User.admin == true()).order_by(User.username.asc())
967 967 if only_active:
968 968 qry = qry.filter(User.active == true())
969 969 return qry.all()
970 970
971 971 @classmethod
972 972 def get_default_user(cls, cache=False, refresh=False):
973 973 user = User.get_by_username(User.DEFAULT_USER, cache=cache)
974 974 if user is None:
975 975 raise Exception('FATAL: Missing default account!')
976 976 if refresh:
977 977 # The default user might be based on outdated state which
978 978 # has been loaded from the cache.
979 979 # A call to refresh() ensures that the
980 980 # latest state from the database is used.
981 981 Session().refresh(user)
982 982 return user
983 983
984 984 def _get_default_perms(self, user, suffix=''):
985 985 from rhodecode.model.permission import PermissionModel
986 986 return PermissionModel().get_default_perms(user.user_perms, suffix)
987 987
988 988 def get_default_perms(self, suffix=''):
989 989 return self._get_default_perms(self, suffix)
990 990
991 991 def get_api_data(self, include_secrets=False, details='full'):
992 992 """
993 993 Common function for generating user related data for API
994 994
995 995 :param include_secrets: By default secrets in the API data will be replaced
996 996 by a placeholder value to prevent exposing this data by accident. In case
997 997 this data shall be exposed, set this flag to ``True``.
998 998
999 999 :param details: details can be 'basic|full' basic gives only a subset of
1000 1000 the available user information that includes user_id, name and emails.
1001 1001 """
1002 1002 user = self
1003 1003 user_data = self.user_data
1004 1004 data = {
1005 1005 'user_id': user.user_id,
1006 1006 'username': user.username,
1007 1007 'firstname': user.name,
1008 1008 'lastname': user.lastname,
1009 1009 'email': user.email,
1010 1010 'emails': user.emails,
1011 1011 }
1012 1012 if details == 'basic':
1013 1013 return data
1014 1014
1015 1015 auth_token_length = 40
1016 1016 auth_token_replacement = '*' * auth_token_length
1017 1017
1018 1018 extras = {
1019 1019 'auth_tokens': [auth_token_replacement],
1020 1020 'active': user.active,
1021 1021 'admin': user.admin,
1022 1022 'extern_type': user.extern_type,
1023 1023 'extern_name': user.extern_name,
1024 1024 'last_login': user.last_login,
1025 1025 'last_activity': user.last_activity,
1026 1026 'ip_addresses': user.ip_addresses,
1027 1027 'language': user_data.get('language')
1028 1028 }
1029 1029 data.update(extras)
1030 1030
1031 1031 if include_secrets:
1032 1032 data['auth_tokens'] = user.auth_tokens
1033 1033 return data
1034 1034
1035 1035 def __json__(self):
1036 1036 data = {
1037 1037 'full_name': self.full_name,
1038 1038 'full_name_or_username': self.full_name_or_username,
1039 1039 'short_contact': self.short_contact,
1040 1040 'full_contact': self.full_contact,
1041 1041 }
1042 1042 data.update(self.get_api_data())
1043 1043 return data
1044 1044
1045 1045
1046 1046 class UserApiKeys(Base, BaseModel):
1047 1047 __tablename__ = 'user_api_keys'
1048 1048 __table_args__ = (
1049 1049 Index('uak_api_key_idx', 'api_key', unique=True),
1050 1050 Index('uak_api_key_expires_idx', 'api_key', 'expires'),
1051 1051 base_table_args
1052 1052 )
1053 1053 __mapper_args__ = {}
1054 1054
1055 1055 # ApiKey role
1056 1056 ROLE_ALL = 'token_role_all'
1057 1057 ROLE_HTTP = 'token_role_http'
1058 1058 ROLE_VCS = 'token_role_vcs'
1059 1059 ROLE_API = 'token_role_api'
1060 1060 ROLE_FEED = 'token_role_feed'
1061 1061 ROLE_PASSWORD_RESET = 'token_password_reset'
1062 1062
1063 1063 ROLES = [ROLE_ALL, ROLE_HTTP, ROLE_VCS, ROLE_API, ROLE_FEED]
1064 1064
1065 1065 user_api_key_id = Column("user_api_key_id", Integer(), nullable=False, unique=True, default=None, primary_key=True)
1066 1066 user_id = Column("user_id", Integer(), ForeignKey('users.user_id'), nullable=True, unique=None, default=None)
1067 1067 api_key = Column("api_key", String(255), nullable=False, unique=True)
1068 1068 description = Column('description', UnicodeText().with_variant(UnicodeText(1024), 'mysql'))
1069 1069 expires = Column('expires', Float(53), nullable=False)
1070 1070 role = Column('role', String(255), nullable=True)
1071 1071 created_on = Column('created_on', DateTime(timezone=False), nullable=False, default=datetime.datetime.now)
1072 1072
1073 1073 # scope columns
1074 1074 repo_id = Column(
1075 1075 'repo_id', Integer(), ForeignKey('repositories.repo_id'),
1076 1076 nullable=True, unique=None, default=None)
1077 1077 repo = relationship('Repository', lazy='joined')
1078 1078
1079 1079 repo_group_id = Column(
1080 1080 'repo_group_id', Integer(), ForeignKey('groups.group_id'),
1081 1081 nullable=True, unique=None, default=None)
1082 1082 repo_group = relationship('RepoGroup', lazy='joined')
1083 1083
1084 1084 user = relationship('User', lazy='joined')
1085 1085
1086 1086 def __unicode__(self):
1087 1087 return u"<%s('%s')>" % (self.__class__.__name__, self.role)
1088 1088
1089 1089 def __json__(self):
1090 1090 data = {
1091 1091 'auth_token': self.api_key,
1092 1092 'role': self.role,
1093 1093 'scope': self.scope_humanized,
1094 1094 'expired': self.expired
1095 1095 }
1096 1096 return data
1097 1097
1098 1098 def get_api_data(self, include_secrets=False):
1099 1099 data = self.__json__()
1100 1100 if include_secrets:
1101 1101 return data
1102 1102 else:
1103 1103 data['auth_token'] = self.token_obfuscated
1104 1104 return data
1105 1105
1106 1106 @hybrid_property
1107 1107 def description_safe(self):
1108 1108 from rhodecode.lib import helpers as h
1109 1109 return h.escape(self.description)
1110 1110
1111 1111 @property
1112 1112 def expired(self):
1113 1113 if self.expires == -1:
1114 1114 return False
1115 1115 return time.time() > self.expires
1116 1116
1117 1117 @classmethod
1118 1118 def _get_role_name(cls, role):
1119 1119 return {
1120 1120 cls.ROLE_ALL: _('all'),
1121 1121 cls.ROLE_HTTP: _('http/web interface'),
1122 1122 cls.ROLE_VCS: _('vcs (git/hg/svn protocol)'),
1123 1123 cls.ROLE_API: _('api calls'),
1124 1124 cls.ROLE_FEED: _('feed access'),
1125 1125 }.get(role, role)
1126 1126
1127 1127 @property
1128 1128 def role_humanized(self):
1129 1129 return self._get_role_name(self.role)
1130 1130
1131 1131 def _get_scope(self):
1132 1132 if self.repo:
1133 1133 return 'Repository: {}'.format(self.repo.repo_name)
1134 1134 if self.repo_group:
1135 1135 return 'RepositoryGroup: {} (recursive)'.format(self.repo_group.group_name)
1136 1136 return 'Global'
1137 1137
1138 1138 @property
1139 1139 def scope_humanized(self):
1140 1140 return self._get_scope()
1141 1141
1142 1142 @property
1143 1143 def token_obfuscated(self):
1144 1144 if self.api_key:
1145 1145 return self.api_key[:4] + "****"
1146 1146
1147 1147
1148 1148 class UserEmailMap(Base, BaseModel):
1149 1149 __tablename__ = 'user_email_map'
1150 1150 __table_args__ = (
1151 1151 Index('uem_email_idx', 'email'),
1152 1152 UniqueConstraint('email'),
1153 1153 base_table_args
1154 1154 )
1155 1155 __mapper_args__ = {}
1156 1156
1157 1157 email_id = Column("email_id", Integer(), nullable=False, unique=True, default=None, primary_key=True)
1158 1158 user_id = Column("user_id", Integer(), ForeignKey('users.user_id'), nullable=True, unique=None, default=None)
1159 1159 _email = Column("email", String(255), nullable=True, unique=False, default=None)
1160 1160 user = relationship('User', lazy='joined')
1161 1161
1162 1162 @validates('_email')
1163 1163 def validate_email(self, key, email):
1164 1164 # check if this email is not main one
1165 1165 main_email = Session().query(User).filter(User.email == email).scalar()
1166 1166 if main_email is not None:
1167 1167 raise AttributeError('email %s is present is user table' % email)
1168 1168 return email
1169 1169
1170 1170 @hybrid_property
1171 1171 def email(self):
1172 1172 return self._email
1173 1173
1174 1174 @email.setter
1175 1175 def email(self, val):
1176 1176 self._email = val.lower() if val else None
1177 1177
1178 1178
1179 1179 class UserIpMap(Base, BaseModel):
1180 1180 __tablename__ = 'user_ip_map'
1181 1181 __table_args__ = (
1182 1182 UniqueConstraint('user_id', 'ip_addr'),
1183 1183 base_table_args
1184 1184 )
1185 1185 __mapper_args__ = {}
1186 1186
1187 1187 ip_id = Column("ip_id", Integer(), nullable=False, unique=True, default=None, primary_key=True)
1188 1188 user_id = Column("user_id", Integer(), ForeignKey('users.user_id'), nullable=True, unique=None, default=None)
1189 1189 ip_addr = Column("ip_addr", String(255), nullable=True, unique=False, default=None)
1190 1190 active = Column("active", Boolean(), nullable=True, unique=None, default=True)
1191 1191 description = Column("description", String(10000), nullable=True, unique=None, default=None)
1192 1192 user = relationship('User', lazy='joined')
1193 1193
1194 1194 @hybrid_property
1195 1195 def description_safe(self):
1196 1196 from rhodecode.lib import helpers as h
1197 1197 return h.escape(self.description)
1198 1198
1199 1199 @classmethod
1200 1200 def _get_ip_range(cls, ip_addr):
1201 1201 net = ipaddress.ip_network(safe_unicode(ip_addr), strict=False)
1202 1202 return [str(net.network_address), str(net.broadcast_address)]
1203 1203
1204 1204 def __json__(self):
1205 1205 return {
1206 1206 'ip_addr': self.ip_addr,
1207 1207 'ip_range': self._get_ip_range(self.ip_addr),
1208 1208 }
1209 1209
1210 1210 def __unicode__(self):
1211 1211 return u"<%s('user_id:%s=>%s')>" % (self.__class__.__name__,
1212 1212 self.user_id, self.ip_addr)
1213 1213
1214 1214
1215 1215 class UserSshKeys(Base, BaseModel):
1216 1216 __tablename__ = 'user_ssh_keys'
1217 1217 __table_args__ = (
1218 1218 Index('usk_ssh_key_fingerprint_idx', 'ssh_key_fingerprint'),
1219 1219
1220 1220 UniqueConstraint('ssh_key_fingerprint'),
1221 1221
1222 1222 base_table_args
1223 1223 )
1224 1224 __mapper_args__ = {}
1225 1225
1226 1226 ssh_key_id = Column('ssh_key_id', Integer(), nullable=False, unique=True, default=None, primary_key=True)
1227 1227 ssh_key_data = Column('ssh_key_data', String(10240), nullable=False, unique=None, default=None)
1228 1228 ssh_key_fingerprint = Column('ssh_key_fingerprint', String(255), nullable=False, unique=None, default=None)
1229 1229
1230 1230 description = Column('description', UnicodeText().with_variant(UnicodeText(1024), 'mysql'))
1231 1231
1232 1232 created_on = Column('created_on', DateTime(timezone=False), nullable=False, default=datetime.datetime.now)
1233 1233 accessed_on = Column('accessed_on', DateTime(timezone=False), nullable=True, default=None)
1234 1234 user_id = Column('user_id', Integer(), ForeignKey('users.user_id'), nullable=True, unique=None, default=None)
1235 1235
1236 1236 user = relationship('User', lazy='joined')
1237 1237
1238 1238 def __json__(self):
1239 1239 data = {
1240 1240 'ssh_fingerprint': self.ssh_key_fingerprint,
1241 1241 'description': self.description,
1242 1242 'created_on': self.created_on
1243 1243 }
1244 1244 return data
1245 1245
1246 1246 def get_api_data(self):
1247 1247 data = self.__json__()
1248 1248 return data
1249 1249
1250 1250
1251 1251 class UserLog(Base, BaseModel):
1252 1252 __tablename__ = 'user_logs'
1253 1253 __table_args__ = (
1254 1254 base_table_args,
1255 1255 )
1256 1256
1257 1257 VERSION_1 = 'v1'
1258 1258 VERSION_2 = 'v2'
1259 1259 VERSIONS = [VERSION_1, VERSION_2]
1260 1260
1261 1261 user_log_id = Column("user_log_id", Integer(), nullable=False, unique=True, default=None, primary_key=True)
1262 1262 user_id = Column("user_id", Integer(), ForeignKey('users.user_id',ondelete='SET NULL'), nullable=True, unique=None, default=None)
1263 1263 username = Column("username", String(255), nullable=True, unique=None, default=None)
1264 1264 repository_id = Column("repository_id", Integer(), ForeignKey('repositories.repo_id', ondelete='SET NULL'), nullable=True, unique=None, default=None)
1265 1265 repository_name = Column("repository_name", String(255), nullable=True, unique=None, default=None)
1266 1266 user_ip = Column("user_ip", String(255), nullable=True, unique=None, default=None)
1267 1267 action = Column("action", Text().with_variant(Text(1200000), 'mysql'), nullable=True, unique=None, default=None)
1268 1268 action_date = Column("action_date", DateTime(timezone=False), nullable=True, unique=None, default=None)
1269 1269
1270 1270 version = Column("version", String(255), nullable=True, default=VERSION_1)
1271 1271 user_data = Column('user_data_json', MutationObj.as_mutable(JsonType(dialect_map=dict(mysql=LONGTEXT()))))
1272 1272 action_data = Column('action_data_json', MutationObj.as_mutable(JsonType(dialect_map=dict(mysql=LONGTEXT()))))
1273 1273
1274 1274 def __unicode__(self):
1275 1275 return u"<%s('id:%s:%s')>" % (
1276 1276 self.__class__.__name__, self.repository_name, self.action)
1277 1277
1278 1278 def __json__(self):
1279 1279 return {
1280 1280 'user_id': self.user_id,
1281 1281 'username': self.username,
1282 1282 'repository_id': self.repository_id,
1283 1283 'repository_name': self.repository_name,
1284 1284 'user_ip': self.user_ip,
1285 1285 'action_date': self.action_date,
1286 1286 'action': self.action,
1287 1287 }
1288 1288
1289 1289 @hybrid_property
1290 1290 def entry_id(self):
1291 1291 return self.user_log_id
1292 1292
1293 1293 @property
1294 1294 def action_as_day(self):
1295 1295 return datetime.date(*self.action_date.timetuple()[:3])
1296 1296
1297 1297 user = relationship('User')
1298 1298 repository = relationship('Repository', cascade='')
1299 1299
1300 1300
1301 1301 class UserGroup(Base, BaseModel):
1302 1302 __tablename__ = 'users_groups'
1303 1303 __table_args__ = (
1304 1304 base_table_args,
1305 1305 )
1306 1306
1307 1307 users_group_id = Column("users_group_id", Integer(), nullable=False, unique=True, default=None, primary_key=True)
1308 1308 users_group_name = Column("users_group_name", String(255), nullable=False, unique=True, default=None)
1309 1309 user_group_description = Column("user_group_description", String(10000), nullable=True, unique=None, default=None)
1310 1310 users_group_active = Column("users_group_active", Boolean(), nullable=True, unique=None, default=None)
1311 1311 inherit_default_permissions = Column("users_group_inherit_default_permissions", Boolean(), nullable=False, unique=None, default=True)
1312 1312 user_id = Column("user_id", Integer(), ForeignKey('users.user_id'), nullable=False, unique=False, default=None)
1313 1313 created_on = Column('created_on', DateTime(timezone=False), nullable=False, default=datetime.datetime.now)
1314 1314 _group_data = Column("group_data", LargeBinary(), nullable=True) # JSON data
1315 1315
1316 1316 members = relationship('UserGroupMember', cascade="all, delete, delete-orphan", lazy="joined")
1317 1317 users_group_to_perm = relationship('UserGroupToPerm', cascade='all')
1318 1318 users_group_repo_to_perm = relationship('UserGroupRepoToPerm', cascade='all')
1319 1319 users_group_repo_group_to_perm = relationship('UserGroupRepoGroupToPerm', cascade='all')
1320 1320 user_user_group_to_perm = relationship('UserUserGroupToPerm', cascade='all')
1321 1321 user_group_user_group_to_perm = relationship('UserGroupUserGroupToPerm ', primaryjoin="UserGroupUserGroupToPerm.target_user_group_id==UserGroup.users_group_id", cascade='all')
1322 1322
1323 1323 user_group_review_rules = relationship('RepoReviewRuleUserGroup', cascade='all')
1324 1324 user = relationship('User', primaryjoin="User.user_id==UserGroup.user_id")
1325 1325
1326 1326 @classmethod
1327 1327 def _load_group_data(cls, column):
1328 1328 if not column:
1329 1329 return {}
1330 1330
1331 1331 try:
1332 1332 return json.loads(column) or {}
1333 1333 except TypeError:
1334 1334 return {}
1335 1335
1336 1336 @hybrid_property
1337 1337 def description_safe(self):
1338 1338 from rhodecode.lib import helpers as h
1339 1339 return h.escape(self.user_group_description)
1340 1340
1341 1341 @hybrid_property
1342 1342 def group_data(self):
1343 1343 return self._load_group_data(self._group_data)
1344 1344
1345 1345 @group_data.expression
1346 1346 def group_data(self, **kwargs):
1347 1347 return self._group_data
1348 1348
1349 1349 @group_data.setter
1350 1350 def group_data(self, val):
1351 1351 try:
1352 1352 self._group_data = json.dumps(val)
1353 1353 except Exception:
1354 1354 log.error(traceback.format_exc())
1355 1355
1356 1356 @classmethod
1357 1357 def _load_sync(cls, group_data):
1358 1358 if group_data:
1359 1359 return group_data.get('extern_type')
1360 1360
1361 1361 @property
1362 1362 def sync(self):
1363 1363 return self._load_sync(self.group_data)
1364 1364
1365 1365 def __unicode__(self):
1366 1366 return u"<%s('id:%s:%s')>" % (self.__class__.__name__,
1367 1367 self.users_group_id,
1368 1368 self.users_group_name)
1369 1369
1370 1370 @classmethod
1371 1371 def get_by_group_name(cls, group_name, cache=False,
1372 1372 case_insensitive=False):
1373 1373 if case_insensitive:
1374 1374 q = cls.query().filter(func.lower(cls.users_group_name) ==
1375 1375 func.lower(group_name))
1376 1376
1377 1377 else:
1378 1378 q = cls.query().filter(cls.users_group_name == group_name)
1379 1379 if cache:
1380 1380 q = q.options(
1381 1381 FromCache("sql_cache_short", "get_group_%s" % _hash_key(group_name)))
1382 1382 return q.scalar()
1383 1383
1384 1384 @classmethod
1385 1385 def get(cls, user_group_id, cache=False):
1386 1386 if not user_group_id:
1387 1387 return
1388 1388
1389 1389 user_group = cls.query()
1390 1390 if cache:
1391 1391 user_group = user_group.options(
1392 1392 FromCache("sql_cache_short", "get_users_group_%s" % user_group_id))
1393 1393 return user_group.get(user_group_id)
1394 1394
1395 1395 def permissions(self, with_admins=True, with_owner=True,
1396 1396 expand_from_user_groups=False):
1397 1397 """
1398 1398 Permissions for user groups
1399 1399 """
1400 1400 _admin_perm = 'usergroup.admin'
1401 1401
1402 1402 owner_row = []
1403 1403 if with_owner:
1404 1404 usr = AttributeDict(self.user.get_dict())
1405 1405 usr.owner_row = True
1406 1406 usr.permission = _admin_perm
1407 1407 owner_row.append(usr)
1408 1408
1409 1409 super_admin_ids = []
1410 1410 super_admin_rows = []
1411 1411 if with_admins:
1412 1412 for usr in User.get_all_super_admins():
1413 1413 super_admin_ids.append(usr.user_id)
1414 1414 # if this admin is also owner, don't double the record
1415 1415 if usr.user_id == owner_row[0].user_id:
1416 1416 owner_row[0].admin_row = True
1417 1417 else:
1418 1418 usr = AttributeDict(usr.get_dict())
1419 1419 usr.admin_row = True
1420 1420 usr.permission = _admin_perm
1421 1421 super_admin_rows.append(usr)
1422 1422
1423 1423 q = UserUserGroupToPerm.query().filter(UserUserGroupToPerm.user_group == self)
1424 1424 q = q.options(joinedload(UserUserGroupToPerm.user_group),
1425 1425 joinedload(UserUserGroupToPerm.user),
1426 1426 joinedload(UserUserGroupToPerm.permission),)
1427 1427
1428 1428 # get owners and admins and permissions. We do a trick of re-writing
1429 1429 # objects from sqlalchemy to named-tuples due to sqlalchemy session
1430 1430 # has a global reference and changing one object propagates to all
1431 1431 # others. This means if admin is also an owner admin_row that change
1432 1432 # would propagate to both objects
1433 1433 perm_rows = []
1434 1434 for _usr in q.all():
1435 1435 usr = AttributeDict(_usr.user.get_dict())
1436 1436 # if this user is also owner/admin, mark as duplicate record
1437 1437 if usr.user_id == owner_row[0].user_id or usr.user_id in super_admin_ids:
1438 1438 usr.duplicate_perm = True
1439 1439 usr.permission = _usr.permission.permission_name
1440 1440 perm_rows.append(usr)
1441 1441
1442 1442 # filter the perm rows by 'default' first and then sort them by
1443 1443 # admin,write,read,none permissions sorted again alphabetically in
1444 1444 # each group
1445 1445 perm_rows = sorted(perm_rows, key=display_user_sort)
1446 1446
1447 1447 user_groups_rows = []
1448 1448 if expand_from_user_groups:
1449 1449 for ug in self.permission_user_groups(with_members=True):
1450 1450 for user_data in ug.members:
1451 1451 user_groups_rows.append(user_data)
1452 1452
1453 1453 return super_admin_rows + owner_row + perm_rows + user_groups_rows
1454 1454
1455 1455 def permission_user_groups(self, with_members=False):
1456 1456 q = UserGroupUserGroupToPerm.query()\
1457 1457 .filter(UserGroupUserGroupToPerm.target_user_group == self)
1458 1458 q = q.options(joinedload(UserGroupUserGroupToPerm.user_group),
1459 1459 joinedload(UserGroupUserGroupToPerm.target_user_group),
1460 1460 joinedload(UserGroupUserGroupToPerm.permission),)
1461 1461
1462 1462 perm_rows = []
1463 1463 for _user_group in q.all():
1464 1464 entry = AttributeDict(_user_group.user_group.get_dict())
1465 1465 entry.permission = _user_group.permission.permission_name
1466 1466 if with_members:
1467 1467 entry.members = [x.user.get_dict()
1468 1468 for x in _user_group.users_group.members]
1469 1469 perm_rows.append(entry)
1470 1470
1471 1471 perm_rows = sorted(perm_rows, key=display_user_group_sort)
1472 1472 return perm_rows
1473 1473
1474 1474 def _get_default_perms(self, user_group, suffix=''):
1475 1475 from rhodecode.model.permission import PermissionModel
1476 1476 return PermissionModel().get_default_perms(user_group.users_group_to_perm, suffix)
1477 1477
1478 1478 def get_default_perms(self, suffix=''):
1479 1479 return self._get_default_perms(self, suffix)
1480 1480
1481 1481 def get_api_data(self, with_group_members=True, include_secrets=False):
1482 1482 """
1483 1483 :param include_secrets: See :meth:`User.get_api_data`, this parameter is
1484 1484 basically forwarded.
1485 1485
1486 1486 """
1487 1487 user_group = self
1488 1488 data = {
1489 1489 'users_group_id': user_group.users_group_id,
1490 1490 'group_name': user_group.users_group_name,
1491 1491 'group_description': user_group.user_group_description,
1492 1492 'active': user_group.users_group_active,
1493 1493 'owner': user_group.user.username,
1494 1494 'sync': user_group.sync,
1495 1495 'owner_email': user_group.user.email,
1496 1496 }
1497 1497
1498 1498 if with_group_members:
1499 1499 users = []
1500 1500 for user in user_group.members:
1501 1501 user = user.user
1502 1502 users.append(user.get_api_data(include_secrets=include_secrets))
1503 1503 data['users'] = users
1504 1504
1505 1505 return data
1506 1506
1507 1507
1508 1508 class UserGroupMember(Base, BaseModel):
1509 1509 __tablename__ = 'users_groups_members'
1510 1510 __table_args__ = (
1511 1511 base_table_args,
1512 1512 )
1513 1513
1514 1514 users_group_member_id = Column("users_group_member_id", Integer(), nullable=False, unique=True, default=None, primary_key=True)
1515 1515 users_group_id = Column("users_group_id", Integer(), ForeignKey('users_groups.users_group_id'), nullable=False, unique=None, default=None)
1516 1516 user_id = Column("user_id", Integer(), ForeignKey('users.user_id'), nullable=False, unique=None, default=None)
1517 1517
1518 1518 user = relationship('User', lazy='joined')
1519 1519 users_group = relationship('UserGroup')
1520 1520
1521 1521 def __init__(self, gr_id='', u_id=''):
1522 1522 self.users_group_id = gr_id
1523 1523 self.user_id = u_id
1524 1524
1525 1525
1526 1526 class RepositoryField(Base, BaseModel):
1527 1527 __tablename__ = 'repositories_fields'
1528 1528 __table_args__ = (
1529 1529 UniqueConstraint('repository_id', 'field_key'), # no-multi field
1530 1530 base_table_args,
1531 1531 )
1532 1532
1533 1533 PREFIX = 'ex_' # prefix used in form to not conflict with already existing fields
1534 1534
1535 1535 repo_field_id = Column("repo_field_id", Integer(), nullable=False, unique=True, default=None, primary_key=True)
1536 1536 repository_id = Column("repository_id", Integer(), ForeignKey('repositories.repo_id'), nullable=False, unique=None, default=None)
1537 1537 field_key = Column("field_key", String(250))
1538 1538 field_label = Column("field_label", String(1024), nullable=False)
1539 1539 field_value = Column("field_value", String(10000), nullable=False)
1540 1540 field_desc = Column("field_desc", String(1024), nullable=False)
1541 1541 field_type = Column("field_type", String(255), nullable=False, unique=None)
1542 1542 created_on = Column('created_on', DateTime(timezone=False), nullable=False, default=datetime.datetime.now)
1543 1543
1544 1544 repository = relationship('Repository')
1545 1545
1546 1546 @property
1547 1547 def field_key_prefixed(self):
1548 1548 return 'ex_%s' % self.field_key
1549 1549
1550 1550 @classmethod
1551 1551 def un_prefix_key(cls, key):
1552 1552 if key.startswith(cls.PREFIX):
1553 1553 return key[len(cls.PREFIX):]
1554 1554 return key
1555 1555
1556 1556 @classmethod
1557 1557 def get_by_key_name(cls, key, repo):
1558 1558 row = cls.query()\
1559 1559 .filter(cls.repository == repo)\
1560 1560 .filter(cls.field_key == key).scalar()
1561 1561 return row
1562 1562
1563 1563
1564 1564 class Repository(Base, BaseModel):
1565 1565 __tablename__ = 'repositories'
1566 1566 __table_args__ = (
1567 1567 Index('r_repo_name_idx', 'repo_name', mysql_length=255),
1568 1568 base_table_args,
1569 1569 )
1570 1570 DEFAULT_CLONE_URI = '{scheme}://{user}@{netloc}/{repo}'
1571 1571 DEFAULT_CLONE_URI_ID = '{scheme}://{user}@{netloc}/_{repoid}'
1572 1572 DEFAULT_CLONE_URI_SSH = 'ssh://{sys_user}@{hostname}/{repo}'
1573 1573
1574 1574 STATE_CREATED = 'repo_state_created'
1575 1575 STATE_PENDING = 'repo_state_pending'
1576 1576 STATE_ERROR = 'repo_state_error'
1577 1577
1578 1578 LOCK_AUTOMATIC = 'lock_auto'
1579 1579 LOCK_API = 'lock_api'
1580 1580 LOCK_WEB = 'lock_web'
1581 1581 LOCK_PULL = 'lock_pull'
1582 1582
1583 1583 NAME_SEP = URL_SEP
1584 1584
1585 1585 repo_id = Column(
1586 1586 "repo_id", Integer(), nullable=False, unique=True, default=None,
1587 1587 primary_key=True)
1588 1588 _repo_name = Column(
1589 1589 "repo_name", Text(), nullable=False, default=None)
1590 1590 _repo_name_hash = Column(
1591 1591 "repo_name_hash", String(255), nullable=False, unique=True)
1592 1592 repo_state = Column("repo_state", String(255), nullable=True)
1593 1593
1594 1594 clone_uri = Column(
1595 1595 "clone_uri", EncryptedTextValue(), nullable=True, unique=False,
1596 1596 default=None)
1597 1597 push_uri = Column(
1598 1598 "push_uri", EncryptedTextValue(), nullable=True, unique=False,
1599 1599 default=None)
1600 1600 repo_type = Column(
1601 1601 "repo_type", String(255), nullable=False, unique=False, default=None)
1602 1602 user_id = Column(
1603 1603 "user_id", Integer(), ForeignKey('users.user_id'), nullable=False,
1604 1604 unique=False, default=None)
1605 1605 private = Column(
1606 1606 "private", Boolean(), nullable=True, unique=None, default=None)
1607 1607 archived = Column(
1608 1608 "archived", Boolean(), nullable=True, unique=None, default=None)
1609 1609 enable_statistics = Column(
1610 1610 "statistics", Boolean(), nullable=True, unique=None, default=True)
1611 1611 enable_downloads = Column(
1612 1612 "downloads", Boolean(), nullable=True, unique=None, default=True)
1613 1613 description = Column(
1614 1614 "description", String(10000), nullable=True, unique=None, default=None)
1615 1615 created_on = Column(
1616 1616 'created_on', DateTime(timezone=False), nullable=True, unique=None,
1617 1617 default=datetime.datetime.now)
1618 1618 updated_on = Column(
1619 1619 'updated_on', DateTime(timezone=False), nullable=True, unique=None,
1620 1620 default=datetime.datetime.now)
1621 1621 _landing_revision = Column(
1622 1622 "landing_revision", String(255), nullable=False, unique=False,
1623 1623 default=None)
1624 1624 enable_locking = Column(
1625 1625 "enable_locking", Boolean(), nullable=False, unique=None,
1626 1626 default=False)
1627 1627 _locked = Column(
1628 1628 "locked", String(255), nullable=True, unique=False, default=None)
1629 1629 _changeset_cache = Column(
1630 1630 "changeset_cache", LargeBinary(), nullable=True) # JSON data
1631 1631
1632 1632 fork_id = Column(
1633 1633 "fork_id", Integer(), ForeignKey('repositories.repo_id'),
1634 1634 nullable=True, unique=False, default=None)
1635 1635 group_id = Column(
1636 1636 "group_id", Integer(), ForeignKey('groups.group_id'), nullable=True,
1637 1637 unique=False, default=None)
1638 1638
1639 1639 user = relationship('User', lazy='joined')
1640 1640 fork = relationship('Repository', remote_side=repo_id, lazy='joined')
1641 1641 group = relationship('RepoGroup', lazy='joined')
1642 1642 repo_to_perm = relationship(
1643 1643 'UserRepoToPerm', cascade='all',
1644 1644 order_by='UserRepoToPerm.repo_to_perm_id')
1645 1645 users_group_to_perm = relationship('UserGroupRepoToPerm', cascade='all')
1646 1646 stats = relationship('Statistics', cascade='all', uselist=False)
1647 1647
1648 1648 followers = relationship(
1649 1649 'UserFollowing',
1650 1650 primaryjoin='UserFollowing.follows_repo_id==Repository.repo_id',
1651 1651 cascade='all')
1652 1652 extra_fields = relationship(
1653 1653 'RepositoryField', cascade="all, delete, delete-orphan")
1654 1654 logs = relationship('UserLog')
1655 1655 comments = relationship(
1656 1656 'ChangesetComment', cascade="all, delete, delete-orphan")
1657 1657 pull_requests_source = relationship(
1658 1658 'PullRequest',
1659 1659 primaryjoin='PullRequest.source_repo_id==Repository.repo_id',
1660 1660 cascade="all, delete, delete-orphan")
1661 1661 pull_requests_target = relationship(
1662 1662 'PullRequest',
1663 1663 primaryjoin='PullRequest.target_repo_id==Repository.repo_id',
1664 1664 cascade="all, delete, delete-orphan")
1665 1665 ui = relationship('RepoRhodeCodeUi', cascade="all")
1666 1666 settings = relationship('RepoRhodeCodeSetting', cascade="all")
1667 1667 integrations = relationship('Integration',
1668 1668 cascade="all, delete, delete-orphan")
1669 1669
1670 1670 scoped_tokens = relationship('UserApiKeys', cascade="all")
1671 1671
1672 1672 def __unicode__(self):
1673 1673 return u"<%s('%s:%s')>" % (self.__class__.__name__, self.repo_id,
1674 1674 safe_unicode(self.repo_name))
1675 1675
1676 1676 @hybrid_property
1677 1677 def description_safe(self):
1678 1678 from rhodecode.lib import helpers as h
1679 1679 return h.escape(self.description)
1680 1680
1681 1681 @hybrid_property
1682 1682 def landing_rev(self):
1683 1683 # always should return [rev_type, rev]
1684 1684 if self._landing_revision:
1685 1685 _rev_info = self._landing_revision.split(':')
1686 1686 if len(_rev_info) < 2:
1687 1687 _rev_info.insert(0, 'rev')
1688 1688 return [_rev_info[0], _rev_info[1]]
1689 1689 return [None, None]
1690 1690
1691 1691 @landing_rev.setter
1692 1692 def landing_rev(self, val):
1693 1693 if ':' not in val:
1694 1694 raise ValueError('value must be delimited with `:` and consist '
1695 1695 'of <rev_type>:<rev>, got %s instead' % val)
1696 1696 self._landing_revision = val
1697 1697
1698 1698 @hybrid_property
1699 1699 def locked(self):
1700 1700 if self._locked:
1701 1701 user_id, timelocked, reason = self._locked.split(':')
1702 1702 lock_values = int(user_id), timelocked, reason
1703 1703 else:
1704 1704 lock_values = [None, None, None]
1705 1705 return lock_values
1706 1706
1707 1707 @locked.setter
1708 1708 def locked(self, val):
1709 1709 if val and isinstance(val, (list, tuple)):
1710 1710 self._locked = ':'.join(map(str, val))
1711 1711 else:
1712 1712 self._locked = None
1713 1713
1714 1714 @hybrid_property
1715 1715 def changeset_cache(self):
1716 1716 from rhodecode.lib.vcs.backends.base import EmptyCommit
1717 1717 dummy = EmptyCommit().__json__()
1718 1718 if not self._changeset_cache:
1719 1719 return dummy
1720 1720 try:
1721 1721 return json.loads(self._changeset_cache)
1722 1722 except TypeError:
1723 1723 return dummy
1724 1724 except Exception:
1725 1725 log.error(traceback.format_exc())
1726 1726 return dummy
1727 1727
1728 1728 @changeset_cache.setter
1729 1729 def changeset_cache(self, val):
1730 1730 try:
1731 1731 self._changeset_cache = json.dumps(val)
1732 1732 except Exception:
1733 1733 log.error(traceback.format_exc())
1734 1734
1735 1735 @hybrid_property
1736 1736 def repo_name(self):
1737 1737 return self._repo_name
1738 1738
1739 1739 @repo_name.setter
1740 1740 def repo_name(self, value):
1741 1741 self._repo_name = value
1742 1742 self._repo_name_hash = hashlib.sha1(safe_str(value)).hexdigest()
1743 1743
1744 1744 @classmethod
1745 1745 def normalize_repo_name(cls, repo_name):
1746 1746 """
1747 1747 Normalizes os specific repo_name to the format internally stored inside
1748 1748 database using URL_SEP
1749 1749
1750 1750 :param cls:
1751 1751 :param repo_name:
1752 1752 """
1753 1753 return cls.NAME_SEP.join(repo_name.split(os.sep))
1754 1754
1755 1755 @classmethod
1756 1756 def get_by_repo_name(cls, repo_name, cache=False, identity_cache=False):
1757 1757 session = Session()
1758 1758 q = session.query(cls).filter(cls.repo_name == repo_name)
1759 1759
1760 1760 if cache:
1761 1761 if identity_cache:
1762 1762 val = cls.identity_cache(session, 'repo_name', repo_name)
1763 1763 if val:
1764 1764 return val
1765 1765 else:
1766 1766 cache_key = "get_repo_by_name_%s" % _hash_key(repo_name)
1767 1767 q = q.options(
1768 1768 FromCache("sql_cache_short", cache_key))
1769 1769
1770 1770 return q.scalar()
1771 1771
1772 1772 @classmethod
1773 1773 def get_by_id_or_repo_name(cls, repoid):
1774 1774 if isinstance(repoid, (int, long)):
1775 1775 try:
1776 1776 repo = cls.get(repoid)
1777 1777 except ValueError:
1778 1778 repo = None
1779 1779 else:
1780 1780 repo = cls.get_by_repo_name(repoid)
1781 1781 return repo
1782 1782
1783 1783 @classmethod
1784 1784 def get_by_full_path(cls, repo_full_path):
1785 1785 repo_name = repo_full_path.split(cls.base_path(), 1)[-1]
1786 1786 repo_name = cls.normalize_repo_name(repo_name)
1787 1787 return cls.get_by_repo_name(repo_name.strip(URL_SEP))
1788 1788
1789 1789 @classmethod
1790 1790 def get_repo_forks(cls, repo_id):
1791 1791 return cls.query().filter(Repository.fork_id == repo_id)
1792 1792
1793 1793 @classmethod
1794 1794 def base_path(cls):
1795 1795 """
1796 1796 Returns base path when all repos are stored
1797 1797
1798 1798 :param cls:
1799 1799 """
1800 1800 q = Session().query(RhodeCodeUi)\
1801 1801 .filter(RhodeCodeUi.ui_key == cls.NAME_SEP)
1802 1802 q = q.options(FromCache("sql_cache_short", "repository_repo_path"))
1803 1803 return q.one().ui_value
1804 1804
1805 1805 @classmethod
1806 1806 def get_all_repos(cls, user_id=Optional(None), group_id=Optional(None),
1807 1807 case_insensitive=True, archived=False):
1808 1808 q = Repository.query()
1809 1809
1810 1810 if not archived:
1811 1811 q = q.filter(Repository.archived.isnot(true()))
1812 1812
1813 1813 if not isinstance(user_id, Optional):
1814 1814 q = q.filter(Repository.user_id == user_id)
1815 1815
1816 1816 if not isinstance(group_id, Optional):
1817 1817 q = q.filter(Repository.group_id == group_id)
1818 1818
1819 1819 if case_insensitive:
1820 1820 q = q.order_by(func.lower(Repository.repo_name))
1821 1821 else:
1822 1822 q = q.order_by(Repository.repo_name)
1823 1823
1824 1824 return q.all()
1825 1825
1826 1826 @property
1827 1827 def forks(self):
1828 1828 """
1829 1829 Return forks of this repo
1830 1830 """
1831 1831 return Repository.get_repo_forks(self.repo_id)
1832 1832
1833 1833 @property
1834 1834 def parent(self):
1835 1835 """
1836 1836 Returns fork parent
1837 1837 """
1838 1838 return self.fork
1839 1839
1840 1840 @property
1841 1841 def just_name(self):
1842 1842 return self.repo_name.split(self.NAME_SEP)[-1]
1843 1843
1844 1844 @property
1845 1845 def groups_with_parents(self):
1846 1846 groups = []
1847 1847 if self.group is None:
1848 1848 return groups
1849 1849
1850 1850 cur_gr = self.group
1851 1851 groups.insert(0, cur_gr)
1852 1852 while 1:
1853 1853 gr = getattr(cur_gr, 'parent_group', None)
1854 1854 cur_gr = cur_gr.parent_group
1855 1855 if gr is None:
1856 1856 break
1857 1857 groups.insert(0, gr)
1858 1858
1859 1859 return groups
1860 1860
1861 1861 @property
1862 1862 def groups_and_repo(self):
1863 1863 return self.groups_with_parents, self
1864 1864
1865 1865 @LazyProperty
1866 1866 def repo_path(self):
1867 1867 """
1868 1868 Returns base full path for that repository means where it actually
1869 1869 exists on a filesystem
1870 1870 """
1871 1871 q = Session().query(RhodeCodeUi).filter(
1872 1872 RhodeCodeUi.ui_key == self.NAME_SEP)
1873 1873 q = q.options(FromCache("sql_cache_short", "repository_repo_path"))
1874 1874 return q.one().ui_value
1875 1875
1876 1876 @property
1877 1877 def repo_full_path(self):
1878 1878 p = [self.repo_path]
1879 1879 # we need to split the name by / since this is how we store the
1880 1880 # names in the database, but that eventually needs to be converted
1881 1881 # into a valid system path
1882 1882 p += self.repo_name.split(self.NAME_SEP)
1883 1883 return os.path.join(*map(safe_unicode, p))
1884 1884
1885 1885 @property
1886 1886 def cache_keys(self):
1887 1887 """
1888 1888 Returns associated cache keys for that repo
1889 1889 """
1890 1890 invalidation_namespace = CacheKey.REPO_INVALIDATION_NAMESPACE.format(
1891 1891 repo_id=self.repo_id)
1892 1892 return CacheKey.query()\
1893 1893 .filter(CacheKey.cache_args == invalidation_namespace)\
1894 1894 .order_by(CacheKey.cache_key)\
1895 1895 .all()
1896 1896
1897 1897 @property
1898 1898 def cached_diffs_relative_dir(self):
1899 1899 """
1900 1900 Return a relative to the repository store path of cached diffs
1901 1901 used for safe display for users, who shouldn't know the absolute store
1902 1902 path
1903 1903 """
1904 1904 return os.path.join(
1905 1905 os.path.dirname(self.repo_name),
1906 1906 self.cached_diffs_dir.split(os.path.sep)[-1])
1907 1907
1908 1908 @property
1909 1909 def cached_diffs_dir(self):
1910 1910 path = self.repo_full_path
1911 1911 return os.path.join(
1912 1912 os.path.dirname(path),
1913 1913 '.__shadow_diff_cache_repo_{}'.format(self.repo_id))
1914 1914
1915 1915 def cached_diffs(self):
1916 1916 diff_cache_dir = self.cached_diffs_dir
1917 1917 if os.path.isdir(diff_cache_dir):
1918 1918 return os.listdir(diff_cache_dir)
1919 1919 return []
1920 1920
1921 1921 def shadow_repos(self):
1922 1922 shadow_repos_pattern = '.__shadow_repo_{}'.format(self.repo_id)
1923 1923 return [
1924 1924 x for x in os.listdir(os.path.dirname(self.repo_full_path))
1925 1925 if x.startswith(shadow_repos_pattern)]
1926 1926
1927 1927 def get_new_name(self, repo_name):
1928 1928 """
1929 1929 returns new full repository name based on assigned group and new new
1930 1930
1931 1931 :param group_name:
1932 1932 """
1933 1933 path_prefix = self.group.full_path_splitted if self.group else []
1934 1934 return self.NAME_SEP.join(path_prefix + [repo_name])
1935 1935
1936 1936 @property
1937 1937 def _config(self):
1938 1938 """
1939 1939 Returns db based config object.
1940 1940 """
1941 1941 from rhodecode.lib.utils import make_db_config
1942 1942 return make_db_config(clear_session=False, repo=self)
1943 1943
1944 1944 def permissions(self, with_admins=True, with_owner=True,
1945 1945 expand_from_user_groups=False):
1946 1946 """
1947 1947 Permissions for repositories
1948 1948 """
1949 1949 _admin_perm = 'repository.admin'
1950 1950
1951 1951 owner_row = []
1952 1952 if with_owner:
1953 1953 usr = AttributeDict(self.user.get_dict())
1954 1954 usr.owner_row = True
1955 1955 usr.permission = _admin_perm
1956 1956 usr.permission_id = None
1957 1957 owner_row.append(usr)
1958 1958
1959 1959 super_admin_ids = []
1960 1960 super_admin_rows = []
1961 1961 if with_admins:
1962 1962 for usr in User.get_all_super_admins():
1963 1963 super_admin_ids.append(usr.user_id)
1964 1964 # if this admin is also owner, don't double the record
1965 1965 if usr.user_id == owner_row[0].user_id:
1966 1966 owner_row[0].admin_row = True
1967 1967 else:
1968 1968 usr = AttributeDict(usr.get_dict())
1969 1969 usr.admin_row = True
1970 1970 usr.permission = _admin_perm
1971 1971 usr.permission_id = None
1972 1972 super_admin_rows.append(usr)
1973 1973
1974 1974 q = UserRepoToPerm.query().filter(UserRepoToPerm.repository == self)
1975 1975 q = q.options(joinedload(UserRepoToPerm.repository),
1976 1976 joinedload(UserRepoToPerm.user),
1977 1977 joinedload(UserRepoToPerm.permission),)
1978 1978
1979 1979 # get owners and admins and permissions. We do a trick of re-writing
1980 1980 # objects from sqlalchemy to named-tuples due to sqlalchemy session
1981 1981 # has a global reference and changing one object propagates to all
1982 1982 # others. This means if admin is also an owner admin_row that change
1983 1983 # would propagate to both objects
1984 1984 perm_rows = []
1985 1985 for _usr in q.all():
1986 1986 usr = AttributeDict(_usr.user.get_dict())
1987 1987 # if this user is also owner/admin, mark as duplicate record
1988 1988 if usr.user_id == owner_row[0].user_id or usr.user_id in super_admin_ids:
1989 1989 usr.duplicate_perm = True
1990 1990 # also check if this permission is maybe used by branch_permissions
1991 1991 if _usr.branch_perm_entry:
1992 1992 usr.branch_rules = [x.branch_rule_id for x in _usr.branch_perm_entry]
1993 1993
1994 1994 usr.permission = _usr.permission.permission_name
1995 1995 usr.permission_id = _usr.repo_to_perm_id
1996 1996 perm_rows.append(usr)
1997 1997
1998 1998 # filter the perm rows by 'default' first and then sort them by
1999 1999 # admin,write,read,none permissions sorted again alphabetically in
2000 2000 # each group
2001 2001 perm_rows = sorted(perm_rows, key=display_user_sort)
2002 2002
2003 2003 user_groups_rows = []
2004 2004 if expand_from_user_groups:
2005 2005 for ug in self.permission_user_groups(with_members=True):
2006 2006 for user_data in ug.members:
2007 2007 user_groups_rows.append(user_data)
2008 2008
2009 2009 return super_admin_rows + owner_row + perm_rows + user_groups_rows
2010 2010
2011 2011 def permission_user_groups(self, with_members=True):
2012 2012 q = UserGroupRepoToPerm.query()\
2013 2013 .filter(UserGroupRepoToPerm.repository == self)
2014 2014 q = q.options(joinedload(UserGroupRepoToPerm.repository),
2015 2015 joinedload(UserGroupRepoToPerm.users_group),
2016 2016 joinedload(UserGroupRepoToPerm.permission),)
2017 2017
2018 2018 perm_rows = []
2019 2019 for _user_group in q.all():
2020 2020 entry = AttributeDict(_user_group.users_group.get_dict())
2021 2021 entry.permission = _user_group.permission.permission_name
2022 2022 if with_members:
2023 2023 entry.members = [x.user.get_dict()
2024 2024 for x in _user_group.users_group.members]
2025 2025 perm_rows.append(entry)
2026 2026
2027 2027 perm_rows = sorted(perm_rows, key=display_user_group_sort)
2028 2028 return perm_rows
2029 2029
2030 2030 def get_api_data(self, include_secrets=False):
2031 2031 """
2032 2032 Common function for generating repo api data
2033 2033
2034 2034 :param include_secrets: See :meth:`User.get_api_data`.
2035 2035
2036 2036 """
2037 2037 # TODO: mikhail: Here there is an anti-pattern, we probably need to
2038 2038 # move this methods on models level.
2039 2039 from rhodecode.model.settings import SettingsModel
2040 2040 from rhodecode.model.repo import RepoModel
2041 2041
2042 2042 repo = self
2043 2043 _user_id, _time, _reason = self.locked
2044 2044
2045 2045 data = {
2046 2046 'repo_id': repo.repo_id,
2047 2047 'repo_name': repo.repo_name,
2048 2048 'repo_type': repo.repo_type,
2049 2049 'clone_uri': repo.clone_uri or '',
2050 2050 'push_uri': repo.push_uri or '',
2051 2051 'url': RepoModel().get_url(self),
2052 2052 'private': repo.private,
2053 2053 'created_on': repo.created_on,
2054 2054 'description': repo.description_safe,
2055 2055 'landing_rev': repo.landing_rev,
2056 2056 'owner': repo.user.username,
2057 2057 'fork_of': repo.fork.repo_name if repo.fork else None,
2058 2058 'fork_of_id': repo.fork.repo_id if repo.fork else None,
2059 2059 'enable_statistics': repo.enable_statistics,
2060 2060 'enable_locking': repo.enable_locking,
2061 2061 'enable_downloads': repo.enable_downloads,
2062 2062 'last_changeset': repo.changeset_cache,
2063 2063 'locked_by': User.get(_user_id).get_api_data(
2064 2064 include_secrets=include_secrets) if _user_id else None,
2065 2065 'locked_date': time_to_datetime(_time) if _time else None,
2066 2066 'lock_reason': _reason if _reason else None,
2067 2067 }
2068 2068
2069 2069 # TODO: mikhail: should be per-repo settings here
2070 2070 rc_config = SettingsModel().get_all_settings()
2071 2071 repository_fields = str2bool(
2072 2072 rc_config.get('rhodecode_repository_fields'))
2073 2073 if repository_fields:
2074 2074 for f in self.extra_fields:
2075 2075 data[f.field_key_prefixed] = f.field_value
2076 2076
2077 2077 return data
2078 2078
2079 2079 @classmethod
2080 2080 def lock(cls, repo, user_id, lock_time=None, lock_reason=None):
2081 2081 if not lock_time:
2082 2082 lock_time = time.time()
2083 2083 if not lock_reason:
2084 2084 lock_reason = cls.LOCK_AUTOMATIC
2085 2085 repo.locked = [user_id, lock_time, lock_reason]
2086 2086 Session().add(repo)
2087 2087 Session().commit()
2088 2088
2089 2089 @classmethod
2090 2090 def unlock(cls, repo):
2091 2091 repo.locked = None
2092 2092 Session().add(repo)
2093 2093 Session().commit()
2094 2094
2095 2095 @classmethod
2096 2096 def getlock(cls, repo):
2097 2097 return repo.locked
2098 2098
2099 2099 def is_user_lock(self, user_id):
2100 2100 if self.lock[0]:
2101 2101 lock_user_id = safe_int(self.lock[0])
2102 2102 user_id = safe_int(user_id)
2103 2103 # both are ints, and they are equal
2104 2104 return all([lock_user_id, user_id]) and lock_user_id == user_id
2105 2105
2106 2106 return False
2107 2107
2108 2108 def get_locking_state(self, action, user_id, only_when_enabled=True):
2109 2109 """
2110 2110 Checks locking on this repository, if locking is enabled and lock is
2111 2111 present returns a tuple of make_lock, locked, locked_by.
2112 2112 make_lock can have 3 states None (do nothing) True, make lock
2113 2113 False release lock, This value is later propagated to hooks, which
2114 2114 do the locking. Think about this as signals passed to hooks what to do.
2115 2115
2116 2116 """
2117 2117 # TODO: johbo: This is part of the business logic and should be moved
2118 2118 # into the RepositoryModel.
2119 2119
2120 2120 if action not in ('push', 'pull'):
2121 2121 raise ValueError("Invalid action value: %s" % repr(action))
2122 2122
2123 2123 # defines if locked error should be thrown to user
2124 2124 currently_locked = False
2125 2125 # defines if new lock should be made, tri-state
2126 2126 make_lock = None
2127 2127 repo = self
2128 2128 user = User.get(user_id)
2129 2129
2130 2130 lock_info = repo.locked
2131 2131
2132 2132 if repo and (repo.enable_locking or not only_when_enabled):
2133 2133 if action == 'push':
2134 2134 # check if it's already locked !, if it is compare users
2135 2135 locked_by_user_id = lock_info[0]
2136 2136 if user.user_id == locked_by_user_id:
2137 2137 log.debug(
2138 2138 'Got `push` action from user %s, now unlocking', user)
2139 2139 # unlock if we have push from user who locked
2140 2140 make_lock = False
2141 2141 else:
2142 2142 # we're not the same user who locked, ban with
2143 2143 # code defined in settings (default is 423 HTTP Locked) !
2144 2144 log.debug('Repo %s is currently locked by %s', repo, user)
2145 2145 currently_locked = True
2146 2146 elif action == 'pull':
2147 2147 # [0] user [1] date
2148 2148 if lock_info[0] and lock_info[1]:
2149 2149 log.debug('Repo %s is currently locked by %s', repo, user)
2150 2150 currently_locked = True
2151 2151 else:
2152 2152 log.debug('Setting lock on repo %s by %s', repo, user)
2153 2153 make_lock = True
2154 2154
2155 2155 else:
2156 2156 log.debug('Repository %s do not have locking enabled', repo)
2157 2157
2158 2158 log.debug('FINAL locking values make_lock:%s,locked:%s,locked_by:%s',
2159 2159 make_lock, currently_locked, lock_info)
2160 2160
2161 2161 from rhodecode.lib.auth import HasRepoPermissionAny
2162 2162 perm_check = HasRepoPermissionAny('repository.write', 'repository.admin')
2163 2163 if make_lock and not perm_check(repo_name=repo.repo_name, user=user):
2164 2164 # if we don't have at least write permission we cannot make a lock
2165 2165 log.debug('lock state reset back to FALSE due to lack '
2166 2166 'of at least read permission')
2167 2167 make_lock = False
2168 2168
2169 2169 return make_lock, currently_locked, lock_info
2170 2170
2171 2171 @property
2172 2172 def last_db_change(self):
2173 2173 return self.updated_on
2174 2174
2175 2175 @property
2176 2176 def clone_uri_hidden(self):
2177 2177 clone_uri = self.clone_uri
2178 2178 if clone_uri:
2179 2179 import urlobject
2180 2180 url_obj = urlobject.URLObject(cleaned_uri(clone_uri))
2181 2181 if url_obj.password:
2182 2182 clone_uri = url_obj.with_password('*****')
2183 2183 return clone_uri
2184 2184
2185 2185 @property
2186 2186 def push_uri_hidden(self):
2187 2187 push_uri = self.push_uri
2188 2188 if push_uri:
2189 2189 import urlobject
2190 2190 url_obj = urlobject.URLObject(cleaned_uri(push_uri))
2191 2191 if url_obj.password:
2192 2192 push_uri = url_obj.with_password('*****')
2193 2193 return push_uri
2194 2194
2195 2195 def clone_url(self, **override):
2196 2196 from rhodecode.model.settings import SettingsModel
2197 2197
2198 2198 uri_tmpl = None
2199 2199 if 'with_id' in override:
2200 2200 uri_tmpl = self.DEFAULT_CLONE_URI_ID
2201 2201 del override['with_id']
2202 2202
2203 2203 if 'uri_tmpl' in override:
2204 2204 uri_tmpl = override['uri_tmpl']
2205 2205 del override['uri_tmpl']
2206 2206
2207 2207 ssh = False
2208 2208 if 'ssh' in override:
2209 2209 ssh = True
2210 2210 del override['ssh']
2211 2211
2212 2212 # we didn't override our tmpl from **overrides
2213 2213 if not uri_tmpl:
2214 2214 rc_config = SettingsModel().get_all_settings(cache=True)
2215 2215 if ssh:
2216 2216 uri_tmpl = rc_config.get(
2217 2217 'rhodecode_clone_uri_ssh_tmpl') or self.DEFAULT_CLONE_URI_SSH
2218 2218 else:
2219 2219 uri_tmpl = rc_config.get(
2220 2220 'rhodecode_clone_uri_tmpl') or self.DEFAULT_CLONE_URI
2221 2221
2222 2222 request = get_current_request()
2223 2223 return get_clone_url(request=request,
2224 2224 uri_tmpl=uri_tmpl,
2225 2225 repo_name=self.repo_name,
2226 2226 repo_id=self.repo_id, **override)
2227 2227
2228 2228 def set_state(self, state):
2229 2229 self.repo_state = state
2230 2230 Session().add(self)
2231 2231 #==========================================================================
2232 2232 # SCM PROPERTIES
2233 2233 #==========================================================================
2234 2234
2235 2235 def get_commit(self, commit_id=None, commit_idx=None, pre_load=None):
2236 2236 return get_commit_safe(
2237 2237 self.scm_instance(), commit_id, commit_idx, pre_load=pre_load)
2238 2238
2239 2239 def get_changeset(self, rev=None, pre_load=None):
2240 2240 warnings.warn("Use get_commit", DeprecationWarning)
2241 2241 commit_id = None
2242 2242 commit_idx = None
2243 2243 if isinstance(rev, compat.string_types):
2244 2244 commit_id = rev
2245 2245 else:
2246 2246 commit_idx = rev
2247 2247 return self.get_commit(commit_id=commit_id, commit_idx=commit_idx,
2248 2248 pre_load=pre_load)
2249 2249
2250 2250 def get_landing_commit(self):
2251 2251 """
2252 2252 Returns landing commit, or if that doesn't exist returns the tip
2253 2253 """
2254 2254 _rev_type, _rev = self.landing_rev
2255 2255 commit = self.get_commit(_rev)
2256 2256 if isinstance(commit, EmptyCommit):
2257 2257 return self.get_commit()
2258 2258 return commit
2259 2259
2260 2260 def update_commit_cache(self, cs_cache=None, config=None):
2261 2261 """
2262 2262 Update cache of last changeset for repository, keys should be::
2263 2263
2264 2264 short_id
2265 2265 raw_id
2266 2266 revision
2267 2267 parents
2268 2268 message
2269 2269 date
2270 2270 author
2271 2271
2272 2272 :param cs_cache:
2273 2273 """
2274 2274 from rhodecode.lib.vcs.backends.base import BaseChangeset
2275 2275 if cs_cache is None:
2276 2276 # use no-cache version here
2277 2277 scm_repo = self.scm_instance(cache=False, config=config)
2278 2278
2279 2279 empty = not scm_repo or scm_repo.is_empty()
2280 2280 if not empty:
2281 2281 cs_cache = scm_repo.get_commit(
2282 2282 pre_load=["author", "date", "message", "parents"])
2283 2283 else:
2284 2284 cs_cache = EmptyCommit()
2285 2285
2286 2286 if isinstance(cs_cache, BaseChangeset):
2287 2287 cs_cache = cs_cache.__json__()
2288 2288
2289 2289 def is_outdated(new_cs_cache):
2290 2290 if (new_cs_cache['raw_id'] != self.changeset_cache['raw_id'] or
2291 2291 new_cs_cache['revision'] != self.changeset_cache['revision']):
2292 2292 return True
2293 2293 return False
2294 2294
2295 2295 # check if we have maybe already latest cached revision
2296 2296 if is_outdated(cs_cache) or not self.changeset_cache:
2297 2297 _default = datetime.datetime.utcnow()
2298 2298 last_change = cs_cache.get('date') or _default
2299 2299 if self.updated_on and self.updated_on > last_change:
2300 2300 # we check if last update is newer than the new value
2301 2301 # if yes, we use the current timestamp instead. Imagine you get
2302 2302 # old commit pushed 1y ago, we'd set last update 1y to ago.
2303 2303 last_change = _default
2304 2304 log.debug('updated repo %s with new cs cache %s',
2305 2305 self.repo_name, cs_cache)
2306 2306 self.updated_on = last_change
2307 2307 self.changeset_cache = cs_cache
2308 2308 Session().add(self)
2309 2309 Session().commit()
2310 2310 else:
2311 2311 log.debug('Skipping update_commit_cache for repo:`%s` '
2312 2312 'commit already with latest changes', self.repo_name)
2313 2313
2314 2314 @property
2315 2315 def tip(self):
2316 2316 return self.get_commit('tip')
2317 2317
2318 2318 @property
2319 2319 def author(self):
2320 2320 return self.tip.author
2321 2321
2322 2322 @property
2323 2323 def last_change(self):
2324 2324 return self.scm_instance().last_change
2325 2325
2326 2326 def get_comments(self, revisions=None):
2327 2327 """
2328 2328 Returns comments for this repository grouped by revisions
2329 2329
2330 2330 :param revisions: filter query by revisions only
2331 2331 """
2332 2332 cmts = ChangesetComment.query()\
2333 2333 .filter(ChangesetComment.repo == self)
2334 2334 if revisions:
2335 2335 cmts = cmts.filter(ChangesetComment.revision.in_(revisions))
2336 2336 grouped = collections.defaultdict(list)
2337 2337 for cmt in cmts.all():
2338 2338 grouped[cmt.revision].append(cmt)
2339 2339 return grouped
2340 2340
2341 2341 def statuses(self, revisions=None):
2342 2342 """
2343 2343 Returns statuses for this repository
2344 2344
2345 2345 :param revisions: list of revisions to get statuses for
2346 2346 """
2347 2347 statuses = ChangesetStatus.query()\
2348 2348 .filter(ChangesetStatus.repo == self)\
2349 2349 .filter(ChangesetStatus.version == 0)
2350 2350
2351 2351 if revisions:
2352 2352 # Try doing the filtering in chunks to avoid hitting limits
2353 2353 size = 500
2354 2354 status_results = []
2355 2355 for chunk in xrange(0, len(revisions), size):
2356 2356 status_results += statuses.filter(
2357 2357 ChangesetStatus.revision.in_(
2358 2358 revisions[chunk: chunk+size])
2359 2359 ).all()
2360 2360 else:
2361 2361 status_results = statuses.all()
2362 2362
2363 2363 grouped = {}
2364 2364
2365 2365 # maybe we have open new pullrequest without a status?
2366 2366 stat = ChangesetStatus.STATUS_UNDER_REVIEW
2367 2367 status_lbl = ChangesetStatus.get_status_lbl(stat)
2368 2368 for pr in PullRequest.query().filter(PullRequest.source_repo == self).all():
2369 2369 for rev in pr.revisions:
2370 2370 pr_id = pr.pull_request_id
2371 2371 pr_repo = pr.target_repo.repo_name
2372 2372 grouped[rev] = [stat, status_lbl, pr_id, pr_repo]
2373 2373
2374 2374 for stat in status_results:
2375 2375 pr_id = pr_repo = None
2376 2376 if stat.pull_request:
2377 2377 pr_id = stat.pull_request.pull_request_id
2378 2378 pr_repo = stat.pull_request.target_repo.repo_name
2379 2379 grouped[stat.revision] = [str(stat.status), stat.status_lbl,
2380 2380 pr_id, pr_repo]
2381 2381 return grouped
2382 2382
2383 2383 # ==========================================================================
2384 2384 # SCM CACHE INSTANCE
2385 2385 # ==========================================================================
2386 2386
2387 2387 def scm_instance(self, **kwargs):
2388 2388 import rhodecode
2389 2389
2390 2390 # Passing a config will not hit the cache currently only used
2391 2391 # for repo2dbmapper
2392 2392 config = kwargs.pop('config', None)
2393 2393 cache = kwargs.pop('cache', None)
2394 2394 full_cache = str2bool(rhodecode.CONFIG.get('vcs_full_cache'))
2395 2395 # if cache is NOT defined use default global, else we have a full
2396 2396 # control over cache behaviour
2397 2397 if cache is None and full_cache and not config:
2398 2398 return self._get_instance_cached()
2399 2399 return self._get_instance(cache=bool(cache), config=config)
2400 2400
2401 2401 def _get_instance_cached(self):
2402 2402 from rhodecode.lib import rc_cache
2403 2403
2404 2404 cache_namespace_uid = 'cache_repo_instance.{}'.format(self.repo_id)
2405 2405 invalidation_namespace = CacheKey.REPO_INVALIDATION_NAMESPACE.format(
2406 2406 repo_id=self.repo_id)
2407 2407 region = rc_cache.get_or_create_region('cache_repo_longterm', cache_namespace_uid)
2408 2408
2409 2409 @region.conditional_cache_on_arguments(namespace=cache_namespace_uid)
2410 2410 def get_instance_cached(repo_id, context_id):
2411 2411 return self._get_instance()
2412 2412
2413 2413 # we must use thread scoped cache here,
2414 2414 # because each thread of gevent needs it's own not shared connection and cache
2415 2415 # we also alter `args` so the cache key is individual for every green thread.
2416 2416 inv_context_manager = rc_cache.InvalidationContext(
2417 2417 uid=cache_namespace_uid, invalidation_namespace=invalidation_namespace,
2418 2418 thread_scoped=True)
2419 2419 with inv_context_manager as invalidation_context:
2420 2420 args = (self.repo_id, inv_context_manager.cache_key)
2421 2421 # re-compute and store cache if we get invalidate signal
2422 2422 if invalidation_context.should_invalidate():
2423 2423 instance = get_instance_cached.refresh(*args)
2424 2424 else:
2425 2425 instance = get_instance_cached(*args)
2426 2426
2427 2427 log.debug(
2428 2428 'Repo instance fetched in %.3fs', inv_context_manager.compute_time)
2429 2429 return instance
2430 2430
2431 2431 def _get_instance(self, cache=True, config=None):
2432 2432 config = config or self._config
2433 2433 custom_wire = {
2434 2434 'cache': cache # controls the vcs.remote cache
2435 2435 }
2436 2436 repo = get_vcs_instance(
2437 2437 repo_path=safe_str(self.repo_full_path),
2438 2438 config=config,
2439 2439 with_wire=custom_wire,
2440 2440 create=False,
2441 2441 _vcs_alias=self.repo_type)
2442 2442
2443 2443 return repo
2444 2444
2445 2445 def __json__(self):
2446 2446 return {'landing_rev': self.landing_rev}
2447 2447
2448 2448 def get_dict(self):
2449 2449
2450 2450 # Since we transformed `repo_name` to a hybrid property, we need to
2451 2451 # keep compatibility with the code which uses `repo_name` field.
2452 2452
2453 2453 result = super(Repository, self).get_dict()
2454 2454 result['repo_name'] = result.pop('_repo_name', None)
2455 2455 return result
2456 2456
2457 2457
2458 2458 class RepoGroup(Base, BaseModel):
2459 2459 __tablename__ = 'groups'
2460 2460 __table_args__ = (
2461 2461 UniqueConstraint('group_name', 'group_parent_id'),
2462 2462 CheckConstraint('group_id != group_parent_id'),
2463 2463 base_table_args,
2464 2464 )
2465 2465 __mapper_args__ = {'order_by': 'group_name'}
2466 2466
2467 2467 CHOICES_SEPARATOR = '/' # used to generate select2 choices for nested groups
2468 2468
2469 2469 group_id = Column("group_id", Integer(), nullable=False, unique=True, default=None, primary_key=True)
2470 2470 group_name = Column("group_name", String(255), nullable=False, unique=True, default=None)
2471 2471 group_parent_id = Column("group_parent_id", Integer(), ForeignKey('groups.group_id'), nullable=True, unique=None, default=None)
2472 2472 group_description = Column("group_description", String(10000), nullable=True, unique=None, default=None)
2473 2473 enable_locking = Column("enable_locking", Boolean(), nullable=False, unique=None, default=False)
2474 2474 user_id = Column("user_id", Integer(), ForeignKey('users.user_id'), nullable=False, unique=False, default=None)
2475 2475 created_on = Column('created_on', DateTime(timezone=False), nullable=False, default=datetime.datetime.now)
2476 2476 updated_on = Column('updated_on', DateTime(timezone=False), nullable=True, unique=None, default=datetime.datetime.now)
2477 2477 personal = Column('personal', Boolean(), nullable=True, unique=None, default=None)
2478 2478
2479 2479 repo_group_to_perm = relationship('UserRepoGroupToPerm', cascade='all', order_by='UserRepoGroupToPerm.group_to_perm_id')
2480 2480 users_group_to_perm = relationship('UserGroupRepoGroupToPerm', cascade='all')
2481 2481 parent_group = relationship('RepoGroup', remote_side=group_id)
2482 2482 user = relationship('User')
2483 2483 integrations = relationship('Integration',
2484 2484 cascade="all, delete, delete-orphan")
2485 2485
2486 2486 def __init__(self, group_name='', parent_group=None):
2487 2487 self.group_name = group_name
2488 2488 self.parent_group = parent_group
2489 2489
2490 2490 def __unicode__(self):
2491 2491 return u"<%s('id:%s:%s')>" % (
2492 2492 self.__class__.__name__, self.group_id, self.group_name)
2493 2493
2494 2494 @hybrid_property
2495 2495 def description_safe(self):
2496 2496 from rhodecode.lib import helpers as h
2497 2497 return h.escape(self.group_description)
2498 2498
2499 2499 @classmethod
2500 2500 def _generate_choice(cls, repo_group):
2501 2501 from webhelpers.html import literal as _literal
2502 2502 _name = lambda k: _literal(cls.CHOICES_SEPARATOR.join(k))
2503 2503 return repo_group.group_id, _name(repo_group.full_path_splitted)
2504 2504
2505 2505 @classmethod
2506 2506 def groups_choices(cls, groups=None, show_empty_group=True):
2507 2507 if not groups:
2508 2508 groups = cls.query().all()
2509 2509
2510 2510 repo_groups = []
2511 2511 if show_empty_group:
2512 2512 repo_groups = [(-1, u'-- %s --' % _('No parent'))]
2513 2513
2514 2514 repo_groups.extend([cls._generate_choice(x) for x in groups])
2515 2515
2516 2516 repo_groups = sorted(
2517 2517 repo_groups, key=lambda t: t[1].split(cls.CHOICES_SEPARATOR)[0])
2518 2518 return repo_groups
2519 2519
2520 2520 @classmethod
2521 2521 def url_sep(cls):
2522 2522 return URL_SEP
2523 2523
2524 2524 @classmethod
2525 2525 def get_by_group_name(cls, group_name, cache=False, case_insensitive=False):
2526 2526 if case_insensitive:
2527 2527 gr = cls.query().filter(func.lower(cls.group_name)
2528 2528 == func.lower(group_name))
2529 2529 else:
2530 2530 gr = cls.query().filter(cls.group_name == group_name)
2531 2531 if cache:
2532 2532 name_key = _hash_key(group_name)
2533 2533 gr = gr.options(
2534 2534 FromCache("sql_cache_short", "get_group_%s" % name_key))
2535 2535 return gr.scalar()
2536 2536
2537 2537 @classmethod
2538 2538 def get_user_personal_repo_group(cls, user_id):
2539 2539 user = User.get(user_id)
2540 2540 if user.username == User.DEFAULT_USER:
2541 2541 return None
2542 2542
2543 2543 return cls.query()\
2544 2544 .filter(cls.personal == true()) \
2545 2545 .filter(cls.user == user) \
2546 2546 .order_by(cls.group_id.asc()) \
2547 2547 .first()
2548 2548
2549 2549 @classmethod
2550 2550 def get_all_repo_groups(cls, user_id=Optional(None), group_id=Optional(None),
2551 2551 case_insensitive=True):
2552 2552 q = RepoGroup.query()
2553 2553
2554 2554 if not isinstance(user_id, Optional):
2555 2555 q = q.filter(RepoGroup.user_id == user_id)
2556 2556
2557 2557 if not isinstance(group_id, Optional):
2558 2558 q = q.filter(RepoGroup.group_parent_id == group_id)
2559 2559
2560 2560 if case_insensitive:
2561 2561 q = q.order_by(func.lower(RepoGroup.group_name))
2562 2562 else:
2563 2563 q = q.order_by(RepoGroup.group_name)
2564 2564 return q.all()
2565 2565
2566 2566 @property
2567 2567 def parents(self):
2568 2568 parents_recursion_limit = 10
2569 2569 groups = []
2570 2570 if self.parent_group is None:
2571 2571 return groups
2572 2572 cur_gr = self.parent_group
2573 2573 groups.insert(0, cur_gr)
2574 2574 cnt = 0
2575 2575 while 1:
2576 2576 cnt += 1
2577 2577 gr = getattr(cur_gr, 'parent_group', None)
2578 2578 cur_gr = cur_gr.parent_group
2579 2579 if gr is None:
2580 2580 break
2581 2581 if cnt == parents_recursion_limit:
2582 2582 # this will prevent accidental infinit loops
2583 2583 log.error('more than %s parents found for group %s, stopping '
2584 2584 'recursive parent fetching', parents_recursion_limit, self)
2585 2585 break
2586 2586
2587 2587 groups.insert(0, gr)
2588 2588 return groups
2589 2589
2590 2590 @property
2591 2591 def last_db_change(self):
2592 2592 return self.updated_on
2593 2593
2594 2594 @property
2595 2595 def children(self):
2596 2596 return RepoGroup.query().filter(RepoGroup.parent_group == self)
2597 2597
2598 2598 @property
2599 2599 def name(self):
2600 2600 return self.group_name.split(RepoGroup.url_sep())[-1]
2601 2601
2602 2602 @property
2603 2603 def full_path(self):
2604 2604 return self.group_name
2605 2605
2606 2606 @property
2607 2607 def full_path_splitted(self):
2608 2608 return self.group_name.split(RepoGroup.url_sep())
2609 2609
2610 2610 @property
2611 2611 def repositories(self):
2612 2612 return Repository.query()\
2613 2613 .filter(Repository.group == self)\
2614 2614 .order_by(Repository.repo_name)
2615 2615
2616 2616 @property
2617 2617 def repositories_recursive_count(self):
2618 2618 cnt = self.repositories.count()
2619 2619
2620 2620 def children_count(group):
2621 2621 cnt = 0
2622 2622 for child in group.children:
2623 2623 cnt += child.repositories.count()
2624 2624 cnt += children_count(child)
2625 2625 return cnt
2626 2626
2627 2627 return cnt + children_count(self)
2628 2628
2629 2629 def _recursive_objects(self, include_repos=True):
2630 2630 all_ = []
2631 2631
2632 2632 def _get_members(root_gr):
2633 2633 if include_repos:
2634 2634 for r in root_gr.repositories:
2635 2635 all_.append(r)
2636 2636 childs = root_gr.children.all()
2637 2637 if childs:
2638 2638 for gr in childs:
2639 2639 all_.append(gr)
2640 2640 _get_members(gr)
2641 2641
2642 2642 _get_members(self)
2643 2643 return [self] + all_
2644 2644
2645 2645 def recursive_groups_and_repos(self):
2646 2646 """
2647 2647 Recursive return all groups, with repositories in those groups
2648 2648 """
2649 2649 return self._recursive_objects()
2650 2650
2651 2651 def recursive_groups(self):
2652 2652 """
2653 2653 Returns all children groups for this group including children of children
2654 2654 """
2655 2655 return self._recursive_objects(include_repos=False)
2656 2656
2657 2657 def get_new_name(self, group_name):
2658 2658 """
2659 2659 returns new full group name based on parent and new name
2660 2660
2661 2661 :param group_name:
2662 2662 """
2663 2663 path_prefix = (self.parent_group.full_path_splitted if
2664 2664 self.parent_group else [])
2665 2665 return RepoGroup.url_sep().join(path_prefix + [group_name])
2666 2666
2667 2667 def permissions(self, with_admins=True, with_owner=True,
2668 2668 expand_from_user_groups=False):
2669 2669 """
2670 2670 Permissions for repository groups
2671 2671 """
2672 2672 _admin_perm = 'group.admin'
2673 2673
2674 2674 owner_row = []
2675 2675 if with_owner:
2676 2676 usr = AttributeDict(self.user.get_dict())
2677 2677 usr.owner_row = True
2678 2678 usr.permission = _admin_perm
2679 2679 owner_row.append(usr)
2680 2680
2681 2681 super_admin_ids = []
2682 2682 super_admin_rows = []
2683 2683 if with_admins:
2684 2684 for usr in User.get_all_super_admins():
2685 2685 super_admin_ids.append(usr.user_id)
2686 2686 # if this admin is also owner, don't double the record
2687 2687 if usr.user_id == owner_row[0].user_id:
2688 2688 owner_row[0].admin_row = True
2689 2689 else:
2690 2690 usr = AttributeDict(usr.get_dict())
2691 2691 usr.admin_row = True
2692 2692 usr.permission = _admin_perm
2693 2693 super_admin_rows.append(usr)
2694 2694
2695 2695 q = UserRepoGroupToPerm.query().filter(UserRepoGroupToPerm.group == self)
2696 2696 q = q.options(joinedload(UserRepoGroupToPerm.group),
2697 2697 joinedload(UserRepoGroupToPerm.user),
2698 2698 joinedload(UserRepoGroupToPerm.permission),)
2699 2699
2700 2700 # get owners and admins and permissions. We do a trick of re-writing
2701 2701 # objects from sqlalchemy to named-tuples due to sqlalchemy session
2702 2702 # has a global reference and changing one object propagates to all
2703 2703 # others. This means if admin is also an owner admin_row that change
2704 2704 # would propagate to both objects
2705 2705 perm_rows = []
2706 2706 for _usr in q.all():
2707 2707 usr = AttributeDict(_usr.user.get_dict())
2708 2708 # if this user is also owner/admin, mark as duplicate record
2709 2709 if usr.user_id == owner_row[0].user_id or usr.user_id in super_admin_ids:
2710 2710 usr.duplicate_perm = True
2711 2711 usr.permission = _usr.permission.permission_name
2712 2712 perm_rows.append(usr)
2713 2713
2714 2714 # filter the perm rows by 'default' first and then sort them by
2715 2715 # admin,write,read,none permissions sorted again alphabetically in
2716 2716 # each group
2717 2717 perm_rows = sorted(perm_rows, key=display_user_sort)
2718 2718
2719 2719 user_groups_rows = []
2720 2720 if expand_from_user_groups:
2721 2721 for ug in self.permission_user_groups(with_members=True):
2722 2722 for user_data in ug.members:
2723 2723 user_groups_rows.append(user_data)
2724 2724
2725 2725 return super_admin_rows + owner_row + perm_rows + user_groups_rows
2726 2726
2727 2727 def permission_user_groups(self, with_members=False):
2728 2728 q = UserGroupRepoGroupToPerm.query()\
2729 2729 .filter(UserGroupRepoGroupToPerm.group == self)
2730 2730 q = q.options(joinedload(UserGroupRepoGroupToPerm.group),
2731 2731 joinedload(UserGroupRepoGroupToPerm.users_group),
2732 2732 joinedload(UserGroupRepoGroupToPerm.permission),)
2733 2733
2734 2734 perm_rows = []
2735 2735 for _user_group in q.all():
2736 2736 entry = AttributeDict(_user_group.users_group.get_dict())
2737 2737 entry.permission = _user_group.permission.permission_name
2738 2738 if with_members:
2739 2739 entry.members = [x.user.get_dict()
2740 2740 for x in _user_group.users_group.members]
2741 2741 perm_rows.append(entry)
2742 2742
2743 2743 perm_rows = sorted(perm_rows, key=display_user_group_sort)
2744 2744 return perm_rows
2745 2745
2746 2746 def get_api_data(self):
2747 2747 """
2748 2748 Common function for generating api data
2749 2749
2750 2750 """
2751 2751 group = self
2752 2752 data = {
2753 2753 'group_id': group.group_id,
2754 2754 'group_name': group.group_name,
2755 2755 'group_description': group.description_safe,
2756 2756 'parent_group': group.parent_group.group_name if group.parent_group else None,
2757 2757 'repositories': [x.repo_name for x in group.repositories],
2758 2758 'owner': group.user.username,
2759 2759 }
2760 2760 return data
2761 2761
2762 2762
2763 2763 class Permission(Base, BaseModel):
2764 2764 __tablename__ = 'permissions'
2765 2765 __table_args__ = (
2766 2766 Index('p_perm_name_idx', 'permission_name'),
2767 2767 base_table_args,
2768 2768 )
2769 2769
2770 2770 PERMS = [
2771 2771 ('hg.admin', _('RhodeCode Super Administrator')),
2772 2772
2773 2773 ('repository.none', _('Repository no access')),
2774 2774 ('repository.read', _('Repository read access')),
2775 2775 ('repository.write', _('Repository write access')),
2776 2776 ('repository.admin', _('Repository admin access')),
2777 2777
2778 2778 ('group.none', _('Repository group no access')),
2779 2779 ('group.read', _('Repository group read access')),
2780 2780 ('group.write', _('Repository group write access')),
2781 2781 ('group.admin', _('Repository group admin access')),
2782 2782
2783 2783 ('usergroup.none', _('User group no access')),
2784 2784 ('usergroup.read', _('User group read access')),
2785 2785 ('usergroup.write', _('User group write access')),
2786 2786 ('usergroup.admin', _('User group admin access')),
2787 2787
2788 2788 ('branch.none', _('Branch no permissions')),
2789 2789 ('branch.merge', _('Branch access by web merge')),
2790 2790 ('branch.push', _('Branch access by push')),
2791 2791 ('branch.push_force', _('Branch access by push with force')),
2792 2792
2793 2793 ('hg.repogroup.create.false', _('Repository Group creation disabled')),
2794 2794 ('hg.repogroup.create.true', _('Repository Group creation enabled')),
2795 2795
2796 2796 ('hg.usergroup.create.false', _('User Group creation disabled')),
2797 2797 ('hg.usergroup.create.true', _('User Group creation enabled')),
2798 2798
2799 2799 ('hg.create.none', _('Repository creation disabled')),
2800 2800 ('hg.create.repository', _('Repository creation enabled')),
2801 2801 ('hg.create.write_on_repogroup.true', _('Repository creation enabled with write permission to a repository group')),
2802 2802 ('hg.create.write_on_repogroup.false', _('Repository creation disabled with write permission to a repository group')),
2803 2803
2804 2804 ('hg.fork.none', _('Repository forking disabled')),
2805 2805 ('hg.fork.repository', _('Repository forking enabled')),
2806 2806
2807 2807 ('hg.register.none', _('Registration disabled')),
2808 2808 ('hg.register.manual_activate', _('User Registration with manual account activation')),
2809 2809 ('hg.register.auto_activate', _('User Registration with automatic account activation')),
2810 2810
2811 2811 ('hg.password_reset.enabled', _('Password reset enabled')),
2812 2812 ('hg.password_reset.hidden', _('Password reset hidden')),
2813 2813 ('hg.password_reset.disabled', _('Password reset disabled')),
2814 2814
2815 2815 ('hg.extern_activate.manual', _('Manual activation of external account')),
2816 2816 ('hg.extern_activate.auto', _('Automatic activation of external account')),
2817 2817
2818 2818 ('hg.inherit_default_perms.false', _('Inherit object permissions from default user disabled')),
2819 2819 ('hg.inherit_default_perms.true', _('Inherit object permissions from default user enabled')),
2820 2820 ]
2821 2821
2822 2822 # definition of system default permissions for DEFAULT user, created on
2823 2823 # system setup
2824 2824 DEFAULT_USER_PERMISSIONS = [
2825 2825 # object perms
2826 2826 'repository.read',
2827 2827 'group.read',
2828 2828 'usergroup.read',
2829 2829 # branch, for backward compat we need same value as before so forced pushed
2830 2830 'branch.push_force',
2831 2831 # global
2832 2832 'hg.create.repository',
2833 2833 'hg.repogroup.create.false',
2834 2834 'hg.usergroup.create.false',
2835 2835 'hg.create.write_on_repogroup.true',
2836 2836 'hg.fork.repository',
2837 2837 'hg.register.manual_activate',
2838 2838 'hg.password_reset.enabled',
2839 2839 'hg.extern_activate.auto',
2840 2840 'hg.inherit_default_perms.true',
2841 2841 ]
2842 2842
2843 2843 # defines which permissions are more important higher the more important
2844 2844 # Weight defines which permissions are more important.
2845 2845 # The higher number the more important.
2846 2846 PERM_WEIGHTS = {
2847 2847 'repository.none': 0,
2848 2848 'repository.read': 1,
2849 2849 'repository.write': 3,
2850 2850 'repository.admin': 4,
2851 2851
2852 2852 'group.none': 0,
2853 2853 'group.read': 1,
2854 2854 'group.write': 3,
2855 2855 'group.admin': 4,
2856 2856
2857 2857 'usergroup.none': 0,
2858 2858 'usergroup.read': 1,
2859 2859 'usergroup.write': 3,
2860 2860 'usergroup.admin': 4,
2861 2861
2862 2862 'branch.none': 0,
2863 2863 'branch.merge': 1,
2864 2864 'branch.push': 3,
2865 2865 'branch.push_force': 4,
2866 2866
2867 2867 'hg.repogroup.create.false': 0,
2868 2868 'hg.repogroup.create.true': 1,
2869 2869
2870 2870 'hg.usergroup.create.false': 0,
2871 2871 'hg.usergroup.create.true': 1,
2872 2872
2873 2873 'hg.fork.none': 0,
2874 2874 'hg.fork.repository': 1,
2875 2875 'hg.create.none': 0,
2876 2876 'hg.create.repository': 1
2877 2877 }
2878 2878
2879 2879 permission_id = Column("permission_id", Integer(), nullable=False, unique=True, default=None, primary_key=True)
2880 2880 permission_name = Column("permission_name", String(255), nullable=True, unique=None, default=None)
2881 2881 permission_longname = Column("permission_longname", String(255), nullable=True, unique=None, default=None)
2882 2882
2883 2883 def __unicode__(self):
2884 2884 return u"<%s('%s:%s')>" % (
2885 2885 self.__class__.__name__, self.permission_id, self.permission_name
2886 2886 )
2887 2887
2888 2888 @classmethod
2889 2889 def get_by_key(cls, key):
2890 2890 return cls.query().filter(cls.permission_name == key).scalar()
2891 2891
2892 2892 @classmethod
2893 2893 def get_default_repo_perms(cls, user_id, repo_id=None):
2894 2894 q = Session().query(UserRepoToPerm, Repository, Permission)\
2895 2895 .join((Permission, UserRepoToPerm.permission_id == Permission.permission_id))\
2896 2896 .join((Repository, UserRepoToPerm.repository_id == Repository.repo_id))\
2897 2897 .filter(UserRepoToPerm.user_id == user_id)
2898 2898 if repo_id:
2899 2899 q = q.filter(UserRepoToPerm.repository_id == repo_id)
2900 2900 return q.all()
2901 2901
2902 2902 @classmethod
2903 2903 def get_default_repo_branch_perms(cls, user_id, repo_id=None):
2904 2904 q = Session().query(UserToRepoBranchPermission, UserRepoToPerm, Permission) \
2905 2905 .join(
2906 2906 Permission,
2907 2907 UserToRepoBranchPermission.permission_id == Permission.permission_id) \
2908 2908 .join(
2909 2909 UserRepoToPerm,
2910 2910 UserToRepoBranchPermission.rule_to_perm_id == UserRepoToPerm.repo_to_perm_id) \
2911 2911 .filter(UserRepoToPerm.user_id == user_id)
2912 2912
2913 2913 if repo_id:
2914 2914 q = q.filter(UserToRepoBranchPermission.repository_id == repo_id)
2915 2915 return q.order_by(UserToRepoBranchPermission.rule_order).all()
2916 2916
2917 2917 @classmethod
2918 2918 def get_default_repo_perms_from_user_group(cls, user_id, repo_id=None):
2919 2919 q = Session().query(UserGroupRepoToPerm, Repository, Permission)\
2920 2920 .join(
2921 2921 Permission,
2922 2922 UserGroupRepoToPerm.permission_id == Permission.permission_id)\
2923 2923 .join(
2924 2924 Repository,
2925 2925 UserGroupRepoToPerm.repository_id == Repository.repo_id)\
2926 2926 .join(
2927 2927 UserGroup,
2928 2928 UserGroupRepoToPerm.users_group_id ==
2929 2929 UserGroup.users_group_id)\
2930 2930 .join(
2931 2931 UserGroupMember,
2932 2932 UserGroupRepoToPerm.users_group_id ==
2933 2933 UserGroupMember.users_group_id)\
2934 2934 .filter(
2935 2935 UserGroupMember.user_id == user_id,
2936 2936 UserGroup.users_group_active == true())
2937 2937 if repo_id:
2938 2938 q = q.filter(UserGroupRepoToPerm.repository_id == repo_id)
2939 2939 return q.all()
2940 2940
2941 2941 @classmethod
2942 2942 def get_default_repo_branch_perms_from_user_group(cls, user_id, repo_id=None):
2943 2943 q = Session().query(UserGroupToRepoBranchPermission, UserGroupRepoToPerm, Permission) \
2944 2944 .join(
2945 2945 Permission,
2946 2946 UserGroupToRepoBranchPermission.permission_id == Permission.permission_id) \
2947 2947 .join(
2948 2948 UserGroupRepoToPerm,
2949 2949 UserGroupToRepoBranchPermission.rule_to_perm_id == UserGroupRepoToPerm.users_group_to_perm_id) \
2950 2950 .join(
2951 2951 UserGroup,
2952 2952 UserGroupRepoToPerm.users_group_id == UserGroup.users_group_id) \
2953 2953 .join(
2954 2954 UserGroupMember,
2955 2955 UserGroupRepoToPerm.users_group_id == UserGroupMember.users_group_id) \
2956 2956 .filter(
2957 2957 UserGroupMember.user_id == user_id,
2958 2958 UserGroup.users_group_active == true())
2959 2959
2960 2960 if repo_id:
2961 2961 q = q.filter(UserGroupToRepoBranchPermission.repository_id == repo_id)
2962 2962 return q.order_by(UserGroupToRepoBranchPermission.rule_order).all()
2963 2963
2964 2964 @classmethod
2965 2965 def get_default_group_perms(cls, user_id, repo_group_id=None):
2966 2966 q = Session().query(UserRepoGroupToPerm, RepoGroup, Permission)\
2967 2967 .join(
2968 2968 Permission,
2969 2969 UserRepoGroupToPerm.permission_id == Permission.permission_id)\
2970 2970 .join(
2971 2971 RepoGroup,
2972 2972 UserRepoGroupToPerm.group_id == RepoGroup.group_id)\
2973 2973 .filter(UserRepoGroupToPerm.user_id == user_id)
2974 2974 if repo_group_id:
2975 2975 q = q.filter(UserRepoGroupToPerm.group_id == repo_group_id)
2976 2976 return q.all()
2977 2977
2978 2978 @classmethod
2979 2979 def get_default_group_perms_from_user_group(
2980 2980 cls, user_id, repo_group_id=None):
2981 2981 q = Session().query(UserGroupRepoGroupToPerm, RepoGroup, Permission)\
2982 2982 .join(
2983 2983 Permission,
2984 2984 UserGroupRepoGroupToPerm.permission_id ==
2985 2985 Permission.permission_id)\
2986 2986 .join(
2987 2987 RepoGroup,
2988 2988 UserGroupRepoGroupToPerm.group_id == RepoGroup.group_id)\
2989 2989 .join(
2990 2990 UserGroup,
2991 2991 UserGroupRepoGroupToPerm.users_group_id ==
2992 2992 UserGroup.users_group_id)\
2993 2993 .join(
2994 2994 UserGroupMember,
2995 2995 UserGroupRepoGroupToPerm.users_group_id ==
2996 2996 UserGroupMember.users_group_id)\
2997 2997 .filter(
2998 2998 UserGroupMember.user_id == user_id,
2999 2999 UserGroup.users_group_active == true())
3000 3000 if repo_group_id:
3001 3001 q = q.filter(UserGroupRepoGroupToPerm.group_id == repo_group_id)
3002 3002 return q.all()
3003 3003
3004 3004 @classmethod
3005 3005 def get_default_user_group_perms(cls, user_id, user_group_id=None):
3006 3006 q = Session().query(UserUserGroupToPerm, UserGroup, Permission)\
3007 3007 .join((Permission, UserUserGroupToPerm.permission_id == Permission.permission_id))\
3008 3008 .join((UserGroup, UserUserGroupToPerm.user_group_id == UserGroup.users_group_id))\
3009 3009 .filter(UserUserGroupToPerm.user_id == user_id)
3010 3010 if user_group_id:
3011 3011 q = q.filter(UserUserGroupToPerm.user_group_id == user_group_id)
3012 3012 return q.all()
3013 3013
3014 3014 @classmethod
3015 3015 def get_default_user_group_perms_from_user_group(
3016 3016 cls, user_id, user_group_id=None):
3017 3017 TargetUserGroup = aliased(UserGroup, name='target_user_group')
3018 3018 q = Session().query(UserGroupUserGroupToPerm, UserGroup, Permission)\
3019 3019 .join(
3020 3020 Permission,
3021 3021 UserGroupUserGroupToPerm.permission_id ==
3022 3022 Permission.permission_id)\
3023 3023 .join(
3024 3024 TargetUserGroup,
3025 3025 UserGroupUserGroupToPerm.target_user_group_id ==
3026 3026 TargetUserGroup.users_group_id)\
3027 3027 .join(
3028 3028 UserGroup,
3029 3029 UserGroupUserGroupToPerm.user_group_id ==
3030 3030 UserGroup.users_group_id)\
3031 3031 .join(
3032 3032 UserGroupMember,
3033 3033 UserGroupUserGroupToPerm.user_group_id ==
3034 3034 UserGroupMember.users_group_id)\
3035 3035 .filter(
3036 3036 UserGroupMember.user_id == user_id,
3037 3037 UserGroup.users_group_active == true())
3038 3038 if user_group_id:
3039 3039 q = q.filter(
3040 3040 UserGroupUserGroupToPerm.user_group_id == user_group_id)
3041 3041
3042 3042 return q.all()
3043 3043
3044 3044
3045 3045 class UserRepoToPerm(Base, BaseModel):
3046 3046 __tablename__ = 'repo_to_perm'
3047 3047 __table_args__ = (
3048 3048 UniqueConstraint('user_id', 'repository_id', 'permission_id'),
3049 3049 base_table_args
3050 3050 )
3051 3051
3052 3052 repo_to_perm_id = Column("repo_to_perm_id", Integer(), nullable=False, unique=True, default=None, primary_key=True)
3053 3053 user_id = Column("user_id", Integer(), ForeignKey('users.user_id'), nullable=False, unique=None, default=None)
3054 3054 permission_id = Column("permission_id", Integer(), ForeignKey('permissions.permission_id'), nullable=False, unique=None, default=None)
3055 3055 repository_id = Column("repository_id", Integer(), ForeignKey('repositories.repo_id'), nullable=False, unique=None, default=None)
3056 3056
3057 3057 user = relationship('User')
3058 3058 repository = relationship('Repository')
3059 3059 permission = relationship('Permission')
3060 3060
3061 3061 branch_perm_entry = relationship('UserToRepoBranchPermission', cascade="all, delete, delete-orphan", lazy='joined')
3062 3062
3063 3063 @classmethod
3064 3064 def create(cls, user, repository, permission):
3065 3065 n = cls()
3066 3066 n.user = user
3067 3067 n.repository = repository
3068 3068 n.permission = permission
3069 3069 Session().add(n)
3070 3070 return n
3071 3071
3072 3072 def __unicode__(self):
3073 3073 return u'<%s => %s >' % (self.user, self.repository)
3074 3074
3075 3075
3076 3076 class UserUserGroupToPerm(Base, BaseModel):
3077 3077 __tablename__ = 'user_user_group_to_perm'
3078 3078 __table_args__ = (
3079 3079 UniqueConstraint('user_id', 'user_group_id', 'permission_id'),
3080 3080 base_table_args
3081 3081 )
3082 3082
3083 3083 user_user_group_to_perm_id = Column("user_user_group_to_perm_id", Integer(), nullable=False, unique=True, default=None, primary_key=True)
3084 3084 user_id = Column("user_id", Integer(), ForeignKey('users.user_id'), nullable=False, unique=None, default=None)
3085 3085 permission_id = Column("permission_id", Integer(), ForeignKey('permissions.permission_id'), nullable=False, unique=None, default=None)
3086 3086 user_group_id = Column("user_group_id", Integer(), ForeignKey('users_groups.users_group_id'), nullable=False, unique=None, default=None)
3087 3087
3088 3088 user = relationship('User')
3089 3089 user_group = relationship('UserGroup')
3090 3090 permission = relationship('Permission')
3091 3091
3092 3092 @classmethod
3093 3093 def create(cls, user, user_group, permission):
3094 3094 n = cls()
3095 3095 n.user = user
3096 3096 n.user_group = user_group
3097 3097 n.permission = permission
3098 3098 Session().add(n)
3099 3099 return n
3100 3100
3101 3101 def __unicode__(self):
3102 3102 return u'<%s => %s >' % (self.user, self.user_group)
3103 3103
3104 3104
3105 3105 class UserToPerm(Base, BaseModel):
3106 3106 __tablename__ = 'user_to_perm'
3107 3107 __table_args__ = (
3108 3108 UniqueConstraint('user_id', 'permission_id'),
3109 3109 base_table_args
3110 3110 )
3111 3111
3112 3112 user_to_perm_id = Column("user_to_perm_id", Integer(), nullable=False, unique=True, default=None, primary_key=True)
3113 3113 user_id = Column("user_id", Integer(), ForeignKey('users.user_id'), nullable=False, unique=None, default=None)
3114 3114 permission_id = Column("permission_id", Integer(), ForeignKey('permissions.permission_id'), nullable=False, unique=None, default=None)
3115 3115
3116 3116 user = relationship('User')
3117 3117 permission = relationship('Permission', lazy='joined')
3118 3118
3119 3119 def __unicode__(self):
3120 3120 return u'<%s => %s >' % (self.user, self.permission)
3121 3121
3122 3122
3123 3123 class UserGroupRepoToPerm(Base, BaseModel):
3124 3124 __tablename__ = 'users_group_repo_to_perm'
3125 3125 __table_args__ = (
3126 3126 UniqueConstraint('repository_id', 'users_group_id', 'permission_id'),
3127 3127 base_table_args
3128 3128 )
3129 3129
3130 3130 users_group_to_perm_id = Column("users_group_to_perm_id", Integer(), nullable=False, unique=True, default=None, primary_key=True)
3131 3131 users_group_id = Column("users_group_id", Integer(), ForeignKey('users_groups.users_group_id'), nullable=False, unique=None, default=None)
3132 3132 permission_id = Column("permission_id", Integer(), ForeignKey('permissions.permission_id'), nullable=False, unique=None, default=None)
3133 3133 repository_id = Column("repository_id", Integer(), ForeignKey('repositories.repo_id'), nullable=False, unique=None, default=None)
3134 3134
3135 3135 users_group = relationship('UserGroup')
3136 3136 permission = relationship('Permission')
3137 3137 repository = relationship('Repository')
3138 3138 user_group_branch_perms = relationship('UserGroupToRepoBranchPermission', cascade='all')
3139 3139
3140 3140 @classmethod
3141 3141 def create(cls, users_group, repository, permission):
3142 3142 n = cls()
3143 3143 n.users_group = users_group
3144 3144 n.repository = repository
3145 3145 n.permission = permission
3146 3146 Session().add(n)
3147 3147 return n
3148 3148
3149 3149 def __unicode__(self):
3150 3150 return u'<UserGroupRepoToPerm:%s => %s >' % (self.users_group, self.repository)
3151 3151
3152 3152
3153 3153 class UserGroupUserGroupToPerm(Base, BaseModel):
3154 3154 __tablename__ = 'user_group_user_group_to_perm'
3155 3155 __table_args__ = (
3156 3156 UniqueConstraint('target_user_group_id', 'user_group_id', 'permission_id'),
3157 3157 CheckConstraint('target_user_group_id != user_group_id'),
3158 3158 base_table_args
3159 3159 )
3160 3160
3161 3161 user_group_user_group_to_perm_id = Column("user_group_user_group_to_perm_id", Integer(), nullable=False, unique=True, default=None, primary_key=True)
3162 3162 target_user_group_id = Column("target_user_group_id", Integer(), ForeignKey('users_groups.users_group_id'), nullable=False, unique=None, default=None)
3163 3163 permission_id = Column("permission_id", Integer(), ForeignKey('permissions.permission_id'), nullable=False, unique=None, default=None)
3164 3164 user_group_id = Column("user_group_id", Integer(), ForeignKey('users_groups.users_group_id'), nullable=False, unique=None, default=None)
3165 3165
3166 3166 target_user_group = relationship('UserGroup', primaryjoin='UserGroupUserGroupToPerm.target_user_group_id==UserGroup.users_group_id')
3167 3167 user_group = relationship('UserGroup', primaryjoin='UserGroupUserGroupToPerm.user_group_id==UserGroup.users_group_id')
3168 3168 permission = relationship('Permission')
3169 3169
3170 3170 @classmethod
3171 3171 def create(cls, target_user_group, user_group, permission):
3172 3172 n = cls()
3173 3173 n.target_user_group = target_user_group
3174 3174 n.user_group = user_group
3175 3175 n.permission = permission
3176 3176 Session().add(n)
3177 3177 return n
3178 3178
3179 3179 def __unicode__(self):
3180 3180 return u'<UserGroupUserGroup:%s => %s >' % (self.target_user_group, self.user_group)
3181 3181
3182 3182
3183 3183 class UserGroupToPerm(Base, BaseModel):
3184 3184 __tablename__ = 'users_group_to_perm'
3185 3185 __table_args__ = (
3186 3186 UniqueConstraint('users_group_id', 'permission_id',),
3187 3187 base_table_args
3188 3188 )
3189 3189
3190 3190 users_group_to_perm_id = Column("users_group_to_perm_id", Integer(), nullable=False, unique=True, default=None, primary_key=True)
3191 3191 users_group_id = Column("users_group_id", Integer(), ForeignKey('users_groups.users_group_id'), nullable=False, unique=None, default=None)
3192 3192 permission_id = Column("permission_id", Integer(), ForeignKey('permissions.permission_id'), nullable=False, unique=None, default=None)
3193 3193
3194 3194 users_group = relationship('UserGroup')
3195 3195 permission = relationship('Permission')
3196 3196
3197 3197
3198 3198 class UserRepoGroupToPerm(Base, BaseModel):
3199 3199 __tablename__ = 'user_repo_group_to_perm'
3200 3200 __table_args__ = (
3201 3201 UniqueConstraint('user_id', 'group_id', 'permission_id'),
3202 3202 base_table_args
3203 3203 )
3204 3204
3205 3205 group_to_perm_id = Column("group_to_perm_id", Integer(), nullable=False, unique=True, default=None, primary_key=True)
3206 3206 user_id = Column("user_id", Integer(), ForeignKey('users.user_id'), nullable=False, unique=None, default=None)
3207 3207 group_id = Column("group_id", Integer(), ForeignKey('groups.group_id'), nullable=False, unique=None, default=None)
3208 3208 permission_id = Column("permission_id", Integer(), ForeignKey('permissions.permission_id'), nullable=False, unique=None, default=None)
3209 3209
3210 3210 user = relationship('User')
3211 3211 group = relationship('RepoGroup')
3212 3212 permission = relationship('Permission')
3213 3213
3214 3214 @classmethod
3215 3215 def create(cls, user, repository_group, permission):
3216 3216 n = cls()
3217 3217 n.user = user
3218 3218 n.group = repository_group
3219 3219 n.permission = permission
3220 3220 Session().add(n)
3221 3221 return n
3222 3222
3223 3223
3224 3224 class UserGroupRepoGroupToPerm(Base, BaseModel):
3225 3225 __tablename__ = 'users_group_repo_group_to_perm'
3226 3226 __table_args__ = (
3227 3227 UniqueConstraint('users_group_id', 'group_id'),
3228 3228 base_table_args
3229 3229 )
3230 3230
3231 3231 users_group_repo_group_to_perm_id = Column("users_group_repo_group_to_perm_id", Integer(), nullable=False, unique=True, default=None, primary_key=True)
3232 3232 users_group_id = Column("users_group_id", Integer(), ForeignKey('users_groups.users_group_id'), nullable=False, unique=None, default=None)
3233 3233 group_id = Column("group_id", Integer(), ForeignKey('groups.group_id'), nullable=False, unique=None, default=None)
3234 3234 permission_id = Column("permission_id", Integer(), ForeignKey('permissions.permission_id'), nullable=False, unique=None, default=None)
3235 3235
3236 3236 users_group = relationship('UserGroup')
3237 3237 permission = relationship('Permission')
3238 3238 group = relationship('RepoGroup')
3239 3239
3240 3240 @classmethod
3241 3241 def create(cls, user_group, repository_group, permission):
3242 3242 n = cls()
3243 3243 n.users_group = user_group
3244 3244 n.group = repository_group
3245 3245 n.permission = permission
3246 3246 Session().add(n)
3247 3247 return n
3248 3248
3249 3249 def __unicode__(self):
3250 3250 return u'<UserGroupRepoGroupToPerm:%s => %s >' % (self.users_group, self.group)
3251 3251
3252 3252
3253 3253 class Statistics(Base, BaseModel):
3254 3254 __tablename__ = 'statistics'
3255 3255 __table_args__ = (
3256 3256 base_table_args
3257 3257 )
3258 3258
3259 3259 stat_id = Column("stat_id", Integer(), nullable=False, unique=True, default=None, primary_key=True)
3260 3260 repository_id = Column("repository_id", Integer(), ForeignKey('repositories.repo_id'), nullable=False, unique=True, default=None)
3261 3261 stat_on_revision = Column("stat_on_revision", Integer(), nullable=False)
3262 3262 commit_activity = Column("commit_activity", LargeBinary(1000000), nullable=False)#JSON data
3263 3263 commit_activity_combined = Column("commit_activity_combined", LargeBinary(), nullable=False)#JSON data
3264 3264 languages = Column("languages", LargeBinary(1000000), nullable=False)#JSON data
3265 3265
3266 3266 repository = relationship('Repository', single_parent=True)
3267 3267
3268 3268
3269 3269 class UserFollowing(Base, BaseModel):
3270 3270 __tablename__ = 'user_followings'
3271 3271 __table_args__ = (
3272 3272 UniqueConstraint('user_id', 'follows_repository_id'),
3273 3273 UniqueConstraint('user_id', 'follows_user_id'),
3274 3274 base_table_args
3275 3275 )
3276 3276
3277 3277 user_following_id = Column("user_following_id", Integer(), nullable=False, unique=True, default=None, primary_key=True)
3278 3278 user_id = Column("user_id", Integer(), ForeignKey('users.user_id'), nullable=False, unique=None, default=None)
3279 3279 follows_repo_id = Column("follows_repository_id", Integer(), ForeignKey('repositories.repo_id'), nullable=True, unique=None, default=None)
3280 3280 follows_user_id = Column("follows_user_id", Integer(), ForeignKey('users.user_id'), nullable=True, unique=None, default=None)
3281 3281 follows_from = Column('follows_from', DateTime(timezone=False), nullable=True, unique=None, default=datetime.datetime.now)
3282 3282
3283 3283 user = relationship('User', primaryjoin='User.user_id==UserFollowing.user_id')
3284 3284
3285 3285 follows_user = relationship('User', primaryjoin='User.user_id==UserFollowing.follows_user_id')
3286 3286 follows_repository = relationship('Repository', order_by='Repository.repo_name')
3287 3287
3288 3288 @classmethod
3289 3289 def get_repo_followers(cls, repo_id):
3290 3290 return cls.query().filter(cls.follows_repo_id == repo_id)
3291 3291
3292 3292
3293 3293 class CacheKey(Base, BaseModel):
3294 3294 __tablename__ = 'cache_invalidation'
3295 3295 __table_args__ = (
3296 3296 UniqueConstraint('cache_key'),
3297 3297 Index('key_idx', 'cache_key'),
3298 3298 base_table_args,
3299 3299 )
3300 3300
3301 3301 CACHE_TYPE_FEED = 'FEED'
3302 3302 CACHE_TYPE_README = 'README'
3303 3303 # namespaces used to register process/thread aware caches
3304 3304 REPO_INVALIDATION_NAMESPACE = 'repo_cache:{repo_id}'
3305 3305 SETTINGS_INVALIDATION_NAMESPACE = 'system_settings'
3306 3306
3307 3307 cache_id = Column("cache_id", Integer(), nullable=False, unique=True, default=None, primary_key=True)
3308 3308 cache_key = Column("cache_key", String(255), nullable=True, unique=None, default=None)
3309 3309 cache_args = Column("cache_args", String(255), nullable=True, unique=None, default=None)
3310 3310 cache_active = Column("cache_active", Boolean(), nullable=True, unique=None, default=False)
3311 3311
3312 3312 def __init__(self, cache_key, cache_args=''):
3313 3313 self.cache_key = cache_key
3314 3314 self.cache_args = cache_args
3315 3315 self.cache_active = False
3316 3316
3317 3317 def __unicode__(self):
3318 3318 return u"<%s('%s:%s[%s]')>" % (
3319 3319 self.__class__.__name__,
3320 3320 self.cache_id, self.cache_key, self.cache_active)
3321 3321
3322 3322 def _cache_key_partition(self):
3323 3323 prefix, repo_name, suffix = self.cache_key.partition(self.cache_args)
3324 3324 return prefix, repo_name, suffix
3325 3325
3326 3326 def get_prefix(self):
3327 3327 """
3328 3328 Try to extract prefix from existing cache key. The key could consist
3329 3329 of prefix, repo_name, suffix
3330 3330 """
3331 3331 # this returns prefix, repo_name, suffix
3332 3332 return self._cache_key_partition()[0]
3333 3333
3334 3334 def get_suffix(self):
3335 3335 """
3336 3336 get suffix that might have been used in _get_cache_key to
3337 3337 generate self.cache_key. Only used for informational purposes
3338 3338 in repo_edit.mako.
3339 3339 """
3340 3340 # prefix, repo_name, suffix
3341 3341 return self._cache_key_partition()[2]
3342 3342
3343 3343 @classmethod
3344 3344 def delete_all_cache(cls):
3345 3345 """
3346 3346 Delete all cache keys from database.
3347 3347 Should only be run when all instances are down and all entries
3348 3348 thus stale.
3349 3349 """
3350 3350 cls.query().delete()
3351 3351 Session().commit()
3352 3352
3353 3353 @classmethod
3354 3354 def set_invalidate(cls, cache_uid, delete=False):
3355 3355 """
3356 3356 Mark all caches of a repo as invalid in the database.
3357 3357 """
3358 3358
3359 3359 try:
3360 3360 qry = Session().query(cls).filter(cls.cache_args == cache_uid)
3361 3361 if delete:
3362 3362 qry.delete()
3363 3363 log.debug('cache objects deleted for cache args %s',
3364 3364 safe_str(cache_uid))
3365 3365 else:
3366 3366 qry.update({"cache_active": False})
3367 3367 log.debug('cache objects marked as invalid for cache args %s',
3368 3368 safe_str(cache_uid))
3369 3369
3370 3370 Session().commit()
3371 3371 except Exception:
3372 3372 log.exception(
3373 3373 'Cache key invalidation failed for cache args %s',
3374 3374 safe_str(cache_uid))
3375 3375 Session().rollback()
3376 3376
3377 3377 @classmethod
3378 3378 def get_active_cache(cls, cache_key):
3379 3379 inv_obj = cls.query().filter(cls.cache_key == cache_key).scalar()
3380 3380 if inv_obj:
3381 3381 return inv_obj
3382 3382 return None
3383 3383
3384 3384
3385 3385 class ChangesetComment(Base, BaseModel):
3386 3386 __tablename__ = 'changeset_comments'
3387 3387 __table_args__ = (
3388 3388 Index('cc_revision_idx', 'revision'),
3389 3389 base_table_args,
3390 3390 )
3391 3391
3392 3392 COMMENT_OUTDATED = u'comment_outdated'
3393 3393 COMMENT_TYPE_NOTE = u'note'
3394 3394 COMMENT_TYPE_TODO = u'todo'
3395 3395 COMMENT_TYPES = [COMMENT_TYPE_NOTE, COMMENT_TYPE_TODO]
3396 3396
3397 3397 comment_id = Column('comment_id', Integer(), nullable=False, primary_key=True)
3398 3398 repo_id = Column('repo_id', Integer(), ForeignKey('repositories.repo_id'), nullable=False)
3399 3399 revision = Column('revision', String(40), nullable=True)
3400 3400 pull_request_id = Column("pull_request_id", Integer(), ForeignKey('pull_requests.pull_request_id'), nullable=True)
3401 3401 pull_request_version_id = Column("pull_request_version_id", Integer(), ForeignKey('pull_request_versions.pull_request_version_id'), nullable=True)
3402 3402 line_no = Column('line_no', Unicode(10), nullable=True)
3403 3403 hl_lines = Column('hl_lines', Unicode(512), nullable=True)
3404 3404 f_path = Column('f_path', Unicode(1000), nullable=True)
3405 3405 user_id = Column('user_id', Integer(), ForeignKey('users.user_id'), nullable=False)
3406 3406 text = Column('text', UnicodeText().with_variant(UnicodeText(25000), 'mysql'), nullable=False)
3407 3407 created_on = Column('created_on', DateTime(timezone=False), nullable=False, default=datetime.datetime.now)
3408 3408 modified_at = Column('modified_at', DateTime(timezone=False), nullable=False, default=datetime.datetime.now)
3409 3409 renderer = Column('renderer', Unicode(64), nullable=True)
3410 3410 display_state = Column('display_state', Unicode(128), nullable=True)
3411 3411
3412 3412 comment_type = Column('comment_type', Unicode(128), nullable=True, default=COMMENT_TYPE_NOTE)
3413 3413 resolved_comment_id = Column('resolved_comment_id', Integer(), ForeignKey('changeset_comments.comment_id'), nullable=True)
3414 3414
3415 3415 resolved_comment = relationship('ChangesetComment', remote_side=comment_id, back_populates='resolved_by')
3416 3416 resolved_by = relationship('ChangesetComment', back_populates='resolved_comment')
3417 3417
3418 3418 author = relationship('User', lazy='joined')
3419 3419 repo = relationship('Repository')
3420 3420 status_change = relationship('ChangesetStatus', cascade="all, delete, delete-orphan", lazy='joined')
3421 3421 pull_request = relationship('PullRequest', lazy='joined')
3422 3422 pull_request_version = relationship('PullRequestVersion')
3423 3423
3424 3424 @classmethod
3425 3425 def get_users(cls, revision=None, pull_request_id=None):
3426 3426 """
3427 3427 Returns user associated with this ChangesetComment. ie those
3428 3428 who actually commented
3429 3429
3430 3430 :param cls:
3431 3431 :param revision:
3432 3432 """
3433 3433 q = Session().query(User)\
3434 3434 .join(ChangesetComment.author)
3435 3435 if revision:
3436 3436 q = q.filter(cls.revision == revision)
3437 3437 elif pull_request_id:
3438 3438 q = q.filter(cls.pull_request_id == pull_request_id)
3439 3439 return q.all()
3440 3440
3441 3441 @classmethod
3442 3442 def get_index_from_version(cls, pr_version, versions):
3443 3443 num_versions = [x.pull_request_version_id for x in versions]
3444 3444 try:
3445 3445 return num_versions.index(pr_version) +1
3446 3446 except (IndexError, ValueError):
3447 3447 return
3448 3448
3449 3449 @property
3450 3450 def outdated(self):
3451 3451 return self.display_state == self.COMMENT_OUTDATED
3452 3452
3453 3453 def outdated_at_version(self, version):
3454 3454 """
3455 3455 Checks if comment is outdated for given pull request version
3456 3456 """
3457 3457 return self.outdated and self.pull_request_version_id != version
3458 3458
3459 3459 def older_than_version(self, version):
3460 3460 """
3461 3461 Checks if comment is made from previous version than given
3462 3462 """
3463 3463 if version is None:
3464 3464 return self.pull_request_version_id is not None
3465 3465
3466 3466 return self.pull_request_version_id < version
3467 3467
3468 3468 @property
3469 3469 def resolved(self):
3470 3470 return self.resolved_by[0] if self.resolved_by else None
3471 3471
3472 3472 @property
3473 3473 def is_todo(self):
3474 3474 return self.comment_type == self.COMMENT_TYPE_TODO
3475 3475
3476 3476 @property
3477 3477 def is_inline(self):
3478 3478 return self.line_no and self.f_path
3479 3479
3480 3480 def get_index_version(self, versions):
3481 3481 return self.get_index_from_version(
3482 3482 self.pull_request_version_id, versions)
3483 3483
3484 3484 def __repr__(self):
3485 3485 if self.comment_id:
3486 3486 return '<DB:Comment #%s>' % self.comment_id
3487 3487 else:
3488 3488 return '<DB:Comment at %#x>' % id(self)
3489 3489
3490 3490 def get_api_data(self):
3491 3491 comment = self
3492 3492 data = {
3493 3493 'comment_id': comment.comment_id,
3494 3494 'comment_type': comment.comment_type,
3495 3495 'comment_text': comment.text,
3496 3496 'comment_status': comment.status_change,
3497 3497 'comment_f_path': comment.f_path,
3498 3498 'comment_lineno': comment.line_no,
3499 3499 'comment_author': comment.author,
3500 'comment_created_on': comment.created_on
3500 'comment_created_on': comment.created_on,
3501 'comment_resolved_by': self.resolved
3501 3502 }
3502 3503 return data
3503 3504
3504 3505 def __json__(self):
3505 3506 data = dict()
3506 3507 data.update(self.get_api_data())
3507 3508 return data
3508 3509
3509 3510
3510 3511 class ChangesetStatus(Base, BaseModel):
3511 3512 __tablename__ = 'changeset_statuses'
3512 3513 __table_args__ = (
3513 3514 Index('cs_revision_idx', 'revision'),
3514 3515 Index('cs_version_idx', 'version'),
3515 3516 UniqueConstraint('repo_id', 'revision', 'version'),
3516 3517 base_table_args
3517 3518 )
3518 3519
3519 3520 STATUS_NOT_REVIEWED = DEFAULT = 'not_reviewed'
3520 3521 STATUS_APPROVED = 'approved'
3521 3522 STATUS_REJECTED = 'rejected'
3522 3523 STATUS_UNDER_REVIEW = 'under_review'
3523 3524
3524 3525 STATUSES = [
3525 3526 (STATUS_NOT_REVIEWED, _("Not Reviewed")), # (no icon) and default
3526 3527 (STATUS_APPROVED, _("Approved")),
3527 3528 (STATUS_REJECTED, _("Rejected")),
3528 3529 (STATUS_UNDER_REVIEW, _("Under Review")),
3529 3530 ]
3530 3531
3531 3532 changeset_status_id = Column('changeset_status_id', Integer(), nullable=False, primary_key=True)
3532 3533 repo_id = Column('repo_id', Integer(), ForeignKey('repositories.repo_id'), nullable=False)
3533 3534 user_id = Column("user_id", Integer(), ForeignKey('users.user_id'), nullable=False, unique=None)
3534 3535 revision = Column('revision', String(40), nullable=False)
3535 3536 status = Column('status', String(128), nullable=False, default=DEFAULT)
3536 3537 changeset_comment_id = Column('changeset_comment_id', Integer(), ForeignKey('changeset_comments.comment_id'))
3537 3538 modified_at = Column('modified_at', DateTime(), nullable=False, default=datetime.datetime.now)
3538 3539 version = Column('version', Integer(), nullable=False, default=0)
3539 3540 pull_request_id = Column("pull_request_id", Integer(), ForeignKey('pull_requests.pull_request_id'), nullable=True)
3540 3541
3541 3542 author = relationship('User', lazy='joined')
3542 3543 repo = relationship('Repository')
3543 3544 comment = relationship('ChangesetComment', lazy='joined')
3544 3545 pull_request = relationship('PullRequest', lazy='joined')
3545 3546
3546 3547 def __unicode__(self):
3547 3548 return u"<%s('%s[v%s]:%s')>" % (
3548 3549 self.__class__.__name__,
3549 3550 self.status, self.version, self.author
3550 3551 )
3551 3552
3552 3553 @classmethod
3553 3554 def get_status_lbl(cls, value):
3554 3555 return dict(cls.STATUSES).get(value)
3555 3556
3556 3557 @property
3557 3558 def status_lbl(self):
3558 3559 return ChangesetStatus.get_status_lbl(self.status)
3559 3560
3560 3561 def get_api_data(self):
3561 3562 status = self
3562 3563 data = {
3563 3564 'status_id': status.changeset_status_id,
3564 3565 'status': status.status,
3565 3566 }
3566 3567 return data
3567 3568
3568 3569 def __json__(self):
3569 3570 data = dict()
3570 3571 data.update(self.get_api_data())
3571 3572 return data
3572 3573
3573 3574
3574 3575 class _SetState(object):
3575 3576 """
3576 3577 Context processor allowing changing state for sensitive operation such as
3577 3578 pull request update or merge
3578 3579 """
3579 3580
3580 3581 def __init__(self, pull_request, pr_state, back_state=None):
3581 3582 self._pr = pull_request
3582 3583 self._org_state = back_state or pull_request.pull_request_state
3583 3584 self._pr_state = pr_state
3584 3585
3585 3586 def __enter__(self):
3586 3587 log.debug('StateLock: entering set state context, setting state to: `%s`',
3587 3588 self._pr_state)
3588 3589 self._pr.pull_request_state = self._pr_state
3589 3590 Session().add(self._pr)
3590 3591 Session().commit()
3591 3592
3592 3593 def __exit__(self, exc_type, exc_val, exc_tb):
3593 3594 log.debug('StateLock: exiting set state context, setting state to: `%s`',
3594 3595 self._org_state)
3595 3596 self._pr.pull_request_state = self._org_state
3596 3597 Session().add(self._pr)
3597 3598 Session().commit()
3598 3599
3599 3600
3600 3601 class _PullRequestBase(BaseModel):
3601 3602 """
3602 3603 Common attributes of pull request and version entries.
3603 3604 """
3604 3605
3605 3606 # .status values
3606 3607 STATUS_NEW = u'new'
3607 3608 STATUS_OPEN = u'open'
3608 3609 STATUS_CLOSED = u'closed'
3609 3610
3610 3611 # available states
3611 3612 STATE_CREATING = u'creating'
3612 3613 STATE_UPDATING = u'updating'
3613 3614 STATE_MERGING = u'merging'
3614 3615 STATE_CREATED = u'created'
3615 3616
3616 3617 title = Column('title', Unicode(255), nullable=True)
3617 3618 description = Column(
3618 3619 'description', UnicodeText().with_variant(UnicodeText(10240), 'mysql'),
3619 3620 nullable=True)
3620 3621 description_renderer = Column('description_renderer', Unicode(64), nullable=True)
3621 3622
3622 3623 # new/open/closed status of pull request (not approve/reject/etc)
3623 3624 status = Column('status', Unicode(255), nullable=False, default=STATUS_NEW)
3624 3625 created_on = Column(
3625 3626 'created_on', DateTime(timezone=False), nullable=False,
3626 3627 default=datetime.datetime.now)
3627 3628 updated_on = Column(
3628 3629 'updated_on', DateTime(timezone=False), nullable=False,
3629 3630 default=datetime.datetime.now)
3630 3631
3631 3632 pull_request_state = Column("pull_request_state", String(255), nullable=True)
3632 3633
3633 3634 @declared_attr
3634 3635 def user_id(cls):
3635 3636 return Column(
3636 3637 "user_id", Integer(), ForeignKey('users.user_id'), nullable=False,
3637 3638 unique=None)
3638 3639
3639 3640 # 500 revisions max
3640 3641 _revisions = Column(
3641 3642 'revisions', UnicodeText().with_variant(UnicodeText(20500), 'mysql'))
3642 3643
3643 3644 @declared_attr
3644 3645 def source_repo_id(cls):
3645 3646 # TODO: dan: rename column to source_repo_id
3646 3647 return Column(
3647 3648 'org_repo_id', Integer(), ForeignKey('repositories.repo_id'),
3648 3649 nullable=False)
3649 3650
3650 3651 _source_ref = Column('org_ref', Unicode(255), nullable=False)
3651 3652
3652 3653 @hybrid_property
3653 3654 def source_ref(self):
3654 3655 return self._source_ref
3655 3656
3656 3657 @source_ref.setter
3657 3658 def source_ref(self, val):
3658 3659 parts = (val or '').split(':')
3659 3660 if len(parts) != 3:
3660 3661 raise ValueError(
3661 3662 'Invalid reference format given: {}, expected X:Y:Z'.format(val))
3662 3663 self._source_ref = safe_unicode(val)
3663 3664
3664 3665 _target_ref = Column('other_ref', Unicode(255), nullable=False)
3665 3666
3666 3667 @hybrid_property
3667 3668 def target_ref(self):
3668 3669 return self._target_ref
3669 3670
3670 3671 @target_ref.setter
3671 3672 def target_ref(self, val):
3672 3673 parts = (val or '').split(':')
3673 3674 if len(parts) != 3:
3674 3675 raise ValueError(
3675 3676 'Invalid reference format given: {}, expected X:Y:Z'.format(val))
3676 3677 self._target_ref = safe_unicode(val)
3677 3678
3678 3679 @declared_attr
3679 3680 def target_repo_id(cls):
3680 3681 # TODO: dan: rename column to target_repo_id
3681 3682 return Column(
3682 3683 'other_repo_id', Integer(), ForeignKey('repositories.repo_id'),
3683 3684 nullable=False)
3684 3685
3685 3686 _shadow_merge_ref = Column('shadow_merge_ref', Unicode(255), nullable=True)
3686 3687
3687 3688 # TODO: dan: rename column to last_merge_source_rev
3688 3689 _last_merge_source_rev = Column(
3689 3690 'last_merge_org_rev', String(40), nullable=True)
3690 3691 # TODO: dan: rename column to last_merge_target_rev
3691 3692 _last_merge_target_rev = Column(
3692 3693 'last_merge_other_rev', String(40), nullable=True)
3693 3694 _last_merge_status = Column('merge_status', Integer(), nullable=True)
3694 3695 merge_rev = Column('merge_rev', String(40), nullable=True)
3695 3696
3696 3697 reviewer_data = Column(
3697 3698 'reviewer_data_json', MutationObj.as_mutable(
3698 3699 JsonType(dialect_map=dict(mysql=UnicodeText(16384)))))
3699 3700
3700 3701 @property
3701 3702 def reviewer_data_json(self):
3702 3703 return json.dumps(self.reviewer_data)
3703 3704
3704 3705 @hybrid_property
3705 3706 def description_safe(self):
3706 3707 from rhodecode.lib import helpers as h
3707 3708 return h.escape(self.description)
3708 3709
3709 3710 @hybrid_property
3710 3711 def revisions(self):
3711 3712 return self._revisions.split(':') if self._revisions else []
3712 3713
3713 3714 @revisions.setter
3714 3715 def revisions(self, val):
3715 3716 self._revisions = ':'.join(val)
3716 3717
3717 3718 @hybrid_property
3718 3719 def last_merge_status(self):
3719 3720 return safe_int(self._last_merge_status)
3720 3721
3721 3722 @last_merge_status.setter
3722 3723 def last_merge_status(self, val):
3723 3724 self._last_merge_status = val
3724 3725
3725 3726 @declared_attr
3726 3727 def author(cls):
3727 3728 return relationship('User', lazy='joined')
3728 3729
3729 3730 @declared_attr
3730 3731 def source_repo(cls):
3731 3732 return relationship(
3732 3733 'Repository',
3733 3734 primaryjoin='%s.source_repo_id==Repository.repo_id' % cls.__name__)
3734 3735
3735 3736 @property
3736 3737 def source_ref_parts(self):
3737 3738 return self.unicode_to_reference(self.source_ref)
3738 3739
3739 3740 @declared_attr
3740 3741 def target_repo(cls):
3741 3742 return relationship(
3742 3743 'Repository',
3743 3744 primaryjoin='%s.target_repo_id==Repository.repo_id' % cls.__name__)
3744 3745
3745 3746 @property
3746 3747 def target_ref_parts(self):
3747 3748 return self.unicode_to_reference(self.target_ref)
3748 3749
3749 3750 @property
3750 3751 def shadow_merge_ref(self):
3751 3752 return self.unicode_to_reference(self._shadow_merge_ref)
3752 3753
3753 3754 @shadow_merge_ref.setter
3754 3755 def shadow_merge_ref(self, ref):
3755 3756 self._shadow_merge_ref = self.reference_to_unicode(ref)
3756 3757
3757 3758 @staticmethod
3758 3759 def unicode_to_reference(raw):
3759 3760 """
3760 3761 Convert a unicode (or string) to a reference object.
3761 3762 If unicode evaluates to False it returns None.
3762 3763 """
3763 3764 if raw:
3764 3765 refs = raw.split(':')
3765 3766 return Reference(*refs)
3766 3767 else:
3767 3768 return None
3768 3769
3769 3770 @staticmethod
3770 3771 def reference_to_unicode(ref):
3771 3772 """
3772 3773 Convert a reference object to unicode.
3773 3774 If reference is None it returns None.
3774 3775 """
3775 3776 if ref:
3776 3777 return u':'.join(ref)
3777 3778 else:
3778 3779 return None
3779 3780
3780 3781 def get_api_data(self, with_merge_state=True):
3781 3782 from rhodecode.model.pull_request import PullRequestModel
3782 3783
3783 3784 pull_request = self
3784 3785 if with_merge_state:
3785 3786 merge_status = PullRequestModel().merge_status(pull_request)
3786 3787 merge_state = {
3787 3788 'status': merge_status[0],
3788 3789 'message': safe_unicode(merge_status[1]),
3789 3790 }
3790 3791 else:
3791 3792 merge_state = {'status': 'not_available',
3792 3793 'message': 'not_available'}
3793 3794
3794 3795 merge_data = {
3795 3796 'clone_url': PullRequestModel().get_shadow_clone_url(pull_request),
3796 3797 'reference': (
3797 3798 pull_request.shadow_merge_ref._asdict()
3798 3799 if pull_request.shadow_merge_ref else None),
3799 3800 }
3800 3801
3801 3802 data = {
3802 3803 'pull_request_id': pull_request.pull_request_id,
3803 3804 'url': PullRequestModel().get_url(pull_request),
3804 3805 'title': pull_request.title,
3805 3806 'description': pull_request.description,
3806 3807 'status': pull_request.status,
3807 3808 'state': pull_request.pull_request_state,
3808 3809 'created_on': pull_request.created_on,
3809 3810 'updated_on': pull_request.updated_on,
3810 3811 'commit_ids': pull_request.revisions,
3811 3812 'review_status': pull_request.calculated_review_status(),
3812 3813 'mergeable': merge_state,
3813 3814 'source': {
3814 3815 'clone_url': pull_request.source_repo.clone_url(),
3815 3816 'repository': pull_request.source_repo.repo_name,
3816 3817 'reference': {
3817 3818 'name': pull_request.source_ref_parts.name,
3818 3819 'type': pull_request.source_ref_parts.type,
3819 3820 'commit_id': pull_request.source_ref_parts.commit_id,
3820 3821 },
3821 3822 },
3822 3823 'target': {
3823 3824 'clone_url': pull_request.target_repo.clone_url(),
3824 3825 'repository': pull_request.target_repo.repo_name,
3825 3826 'reference': {
3826 3827 'name': pull_request.target_ref_parts.name,
3827 3828 'type': pull_request.target_ref_parts.type,
3828 3829 'commit_id': pull_request.target_ref_parts.commit_id,
3829 3830 },
3830 3831 },
3831 3832 'merge': merge_data,
3832 3833 'author': pull_request.author.get_api_data(include_secrets=False,
3833 3834 details='basic'),
3834 3835 'reviewers': [
3835 3836 {
3836 3837 'user': reviewer.get_api_data(include_secrets=False,
3837 3838 details='basic'),
3838 3839 'reasons': reasons,
3839 3840 'review_status': st[0][1].status if st else 'not_reviewed',
3840 3841 }
3841 3842 for obj, reviewer, reasons, mandatory, st in
3842 3843 pull_request.reviewers_statuses()
3843 3844 ]
3844 3845 }
3845 3846
3846 3847 return data
3847 3848
3848 3849 def set_state(self, pull_request_state, final_state=None):
3849 3850 """
3850 3851 # goes from initial state to updating to initial state.
3851 3852 # initial state can be changed by specifying back_state=
3852 3853 with pull_request_obj.set_state(PullRequest.STATE_UPDATING):
3853 3854 pull_request.merge()
3854 3855
3855 3856 :param pull_request_state:
3856 3857 :param final_state:
3857 3858
3858 3859 """
3859 3860
3860 3861 return _SetState(self, pull_request_state, back_state=final_state)
3861 3862
3862 3863
3863 3864 class PullRequest(Base, _PullRequestBase):
3864 3865 __tablename__ = 'pull_requests'
3865 3866 __table_args__ = (
3866 3867 base_table_args,
3867 3868 )
3868 3869
3869 3870 pull_request_id = Column(
3870 3871 'pull_request_id', Integer(), nullable=False, primary_key=True)
3871 3872
3872 3873 def __repr__(self):
3873 3874 if self.pull_request_id:
3874 3875 return '<DB:PullRequest #%s>' % self.pull_request_id
3875 3876 else:
3876 3877 return '<DB:PullRequest at %#x>' % id(self)
3877 3878
3878 3879 reviewers = relationship('PullRequestReviewers',
3879 3880 cascade="all, delete, delete-orphan")
3880 3881 statuses = relationship('ChangesetStatus',
3881 3882 cascade="all, delete, delete-orphan")
3882 3883 comments = relationship('ChangesetComment',
3883 3884 cascade="all, delete, delete-orphan")
3884 3885 versions = relationship('PullRequestVersion',
3885 3886 cascade="all, delete, delete-orphan",
3886 3887 lazy='dynamic')
3887 3888
3888 3889 @classmethod
3889 3890 def get_pr_display_object(cls, pull_request_obj, org_pull_request_obj,
3890 3891 internal_methods=None):
3891 3892
3892 3893 class PullRequestDisplay(object):
3893 3894 """
3894 3895 Special object wrapper for showing PullRequest data via Versions
3895 3896 It mimics PR object as close as possible. This is read only object
3896 3897 just for display
3897 3898 """
3898 3899
3899 3900 def __init__(self, attrs, internal=None):
3900 3901 self.attrs = attrs
3901 3902 # internal have priority over the given ones via attrs
3902 3903 self.internal = internal or ['versions']
3903 3904
3904 3905 def __getattr__(self, item):
3905 3906 if item in self.internal:
3906 3907 return getattr(self, item)
3907 3908 try:
3908 3909 return self.attrs[item]
3909 3910 except KeyError:
3910 3911 raise AttributeError(
3911 3912 '%s object has no attribute %s' % (self, item))
3912 3913
3913 3914 def __repr__(self):
3914 3915 return '<DB:PullRequestDisplay #%s>' % self.attrs.get('pull_request_id')
3915 3916
3916 3917 def versions(self):
3917 3918 return pull_request_obj.versions.order_by(
3918 3919 PullRequestVersion.pull_request_version_id).all()
3919 3920
3920 3921 def is_closed(self):
3921 3922 return pull_request_obj.is_closed()
3922 3923
3923 3924 @property
3924 3925 def pull_request_version_id(self):
3925 3926 return getattr(pull_request_obj, 'pull_request_version_id', None)
3926 3927
3927 3928 attrs = StrictAttributeDict(pull_request_obj.get_api_data())
3928 3929
3929 3930 attrs.author = StrictAttributeDict(
3930 3931 pull_request_obj.author.get_api_data())
3931 3932 if pull_request_obj.target_repo:
3932 3933 attrs.target_repo = StrictAttributeDict(
3933 3934 pull_request_obj.target_repo.get_api_data())
3934 3935 attrs.target_repo.clone_url = pull_request_obj.target_repo.clone_url
3935 3936
3936 3937 if pull_request_obj.source_repo:
3937 3938 attrs.source_repo = StrictAttributeDict(
3938 3939 pull_request_obj.source_repo.get_api_data())
3939 3940 attrs.source_repo.clone_url = pull_request_obj.source_repo.clone_url
3940 3941
3941 3942 attrs.source_ref_parts = pull_request_obj.source_ref_parts
3942 3943 attrs.target_ref_parts = pull_request_obj.target_ref_parts
3943 3944 attrs.revisions = pull_request_obj.revisions
3944 3945
3945 3946 attrs.shadow_merge_ref = org_pull_request_obj.shadow_merge_ref
3946 3947 attrs.reviewer_data = org_pull_request_obj.reviewer_data
3947 3948 attrs.reviewer_data_json = org_pull_request_obj.reviewer_data_json
3948 3949
3949 3950 return PullRequestDisplay(attrs, internal=internal_methods)
3950 3951
3951 3952 def is_closed(self):
3952 3953 return self.status == self.STATUS_CLOSED
3953 3954
3954 3955 def __json__(self):
3955 3956 return {
3956 3957 'revisions': self.revisions,
3957 3958 }
3958 3959
3959 3960 def calculated_review_status(self):
3960 3961 from rhodecode.model.changeset_status import ChangesetStatusModel
3961 3962 return ChangesetStatusModel().calculated_review_status(self)
3962 3963
3963 3964 def reviewers_statuses(self):
3964 3965 from rhodecode.model.changeset_status import ChangesetStatusModel
3965 3966 return ChangesetStatusModel().reviewers_statuses(self)
3966 3967
3967 3968 @property
3968 3969 def workspace_id(self):
3969 3970 from rhodecode.model.pull_request import PullRequestModel
3970 3971 return PullRequestModel()._workspace_id(self)
3971 3972
3972 3973 def get_shadow_repo(self):
3973 3974 workspace_id = self.workspace_id
3974 3975 vcs_obj = self.target_repo.scm_instance()
3975 3976 shadow_repository_path = vcs_obj._get_shadow_repository_path(
3976 3977 self.target_repo.repo_id, workspace_id)
3977 3978 if os.path.isdir(shadow_repository_path):
3978 3979 return vcs_obj._get_shadow_instance(shadow_repository_path)
3979 3980
3980 3981
3981 3982 class PullRequestVersion(Base, _PullRequestBase):
3982 3983 __tablename__ = 'pull_request_versions'
3983 3984 __table_args__ = (
3984 3985 base_table_args,
3985 3986 )
3986 3987
3987 3988 pull_request_version_id = Column(
3988 3989 'pull_request_version_id', Integer(), nullable=False, primary_key=True)
3989 3990 pull_request_id = Column(
3990 3991 'pull_request_id', Integer(),
3991 3992 ForeignKey('pull_requests.pull_request_id'), nullable=False)
3992 3993 pull_request = relationship('PullRequest')
3993 3994
3994 3995 def __repr__(self):
3995 3996 if self.pull_request_version_id:
3996 3997 return '<DB:PullRequestVersion #%s>' % self.pull_request_version_id
3997 3998 else:
3998 3999 return '<DB:PullRequestVersion at %#x>' % id(self)
3999 4000
4000 4001 @property
4001 4002 def reviewers(self):
4002 4003 return self.pull_request.reviewers
4003 4004
4004 4005 @property
4005 4006 def versions(self):
4006 4007 return self.pull_request.versions
4007 4008
4008 4009 def is_closed(self):
4009 4010 # calculate from original
4010 4011 return self.pull_request.status == self.STATUS_CLOSED
4011 4012
4012 4013 def calculated_review_status(self):
4013 4014 return self.pull_request.calculated_review_status()
4014 4015
4015 4016 def reviewers_statuses(self):
4016 4017 return self.pull_request.reviewers_statuses()
4017 4018
4018 4019
4019 4020 class PullRequestReviewers(Base, BaseModel):
4020 4021 __tablename__ = 'pull_request_reviewers'
4021 4022 __table_args__ = (
4022 4023 base_table_args,
4023 4024 )
4024 4025
4025 4026 @hybrid_property
4026 4027 def reasons(self):
4027 4028 if not self._reasons:
4028 4029 return []
4029 4030 return self._reasons
4030 4031
4031 4032 @reasons.setter
4032 4033 def reasons(self, val):
4033 4034 val = val or []
4034 4035 if any(not isinstance(x, compat.string_types) for x in val):
4035 4036 raise Exception('invalid reasons type, must be list of strings')
4036 4037 self._reasons = val
4037 4038
4038 4039 pull_requests_reviewers_id = Column(
4039 4040 'pull_requests_reviewers_id', Integer(), nullable=False,
4040 4041 primary_key=True)
4041 4042 pull_request_id = Column(
4042 4043 "pull_request_id", Integer(),
4043 4044 ForeignKey('pull_requests.pull_request_id'), nullable=False)
4044 4045 user_id = Column(
4045 4046 "user_id", Integer(), ForeignKey('users.user_id'), nullable=True)
4046 4047 _reasons = Column(
4047 4048 'reason', MutationList.as_mutable(
4048 4049 JsonType('list', dialect_map=dict(mysql=UnicodeText(16384)))))
4049 4050
4050 4051 mandatory = Column("mandatory", Boolean(), nullable=False, default=False)
4051 4052 user = relationship('User')
4052 4053 pull_request = relationship('PullRequest')
4053 4054
4054 4055 rule_data = Column(
4055 4056 'rule_data_json',
4056 4057 JsonType(dialect_map=dict(mysql=UnicodeText(16384))))
4057 4058
4058 4059 def rule_user_group_data(self):
4059 4060 """
4060 4061 Returns the voting user group rule data for this reviewer
4061 4062 """
4062 4063
4063 4064 if self.rule_data and 'vote_rule' in self.rule_data:
4064 4065 user_group_data = {}
4065 4066 if 'rule_user_group_entry_id' in self.rule_data:
4066 4067 # means a group with voting rules !
4067 4068 user_group_data['id'] = self.rule_data['rule_user_group_entry_id']
4068 4069 user_group_data['name'] = self.rule_data['rule_name']
4069 4070 user_group_data['vote_rule'] = self.rule_data['vote_rule']
4070 4071
4071 4072 return user_group_data
4072 4073
4073 4074 def __unicode__(self):
4074 4075 return u"<%s('id:%s')>" % (self.__class__.__name__,
4075 4076 self.pull_requests_reviewers_id)
4076 4077
4077 4078
4078 4079 class Notification(Base, BaseModel):
4079 4080 __tablename__ = 'notifications'
4080 4081 __table_args__ = (
4081 4082 Index('notification_type_idx', 'type'),
4082 4083 base_table_args,
4083 4084 )
4084 4085
4085 4086 TYPE_CHANGESET_COMMENT = u'cs_comment'
4086 4087 TYPE_MESSAGE = u'message'
4087 4088 TYPE_MENTION = u'mention'
4088 4089 TYPE_REGISTRATION = u'registration'
4089 4090 TYPE_PULL_REQUEST = u'pull_request'
4090 4091 TYPE_PULL_REQUEST_COMMENT = u'pull_request_comment'
4091 4092
4092 4093 notification_id = Column('notification_id', Integer(), nullable=False, primary_key=True)
4093 4094 subject = Column('subject', Unicode(512), nullable=True)
4094 4095 body = Column('body', UnicodeText().with_variant(UnicodeText(50000), 'mysql'), nullable=True)
4095 4096 created_by = Column("created_by", Integer(), ForeignKey('users.user_id'), nullable=True)
4096 4097 created_on = Column('created_on', DateTime(timezone=False), nullable=False, default=datetime.datetime.now)
4097 4098 type_ = Column('type', Unicode(255))
4098 4099
4099 4100 created_by_user = relationship('User')
4100 4101 notifications_to_users = relationship('UserNotification', lazy='joined',
4101 4102 cascade="all, delete, delete-orphan")
4102 4103
4103 4104 @property
4104 4105 def recipients(self):
4105 4106 return [x.user for x in UserNotification.query()\
4106 4107 .filter(UserNotification.notification == self)\
4107 4108 .order_by(UserNotification.user_id.asc()).all()]
4108 4109
4109 4110 @classmethod
4110 4111 def create(cls, created_by, subject, body, recipients, type_=None):
4111 4112 if type_ is None:
4112 4113 type_ = Notification.TYPE_MESSAGE
4113 4114
4114 4115 notification = cls()
4115 4116 notification.created_by_user = created_by
4116 4117 notification.subject = subject
4117 4118 notification.body = body
4118 4119 notification.type_ = type_
4119 4120 notification.created_on = datetime.datetime.now()
4120 4121
4121 4122 # For each recipient link the created notification to his account
4122 4123 for u in recipients:
4123 4124 assoc = UserNotification()
4124 4125 assoc.user_id = u.user_id
4125 4126 assoc.notification = notification
4126 4127
4127 4128 # if created_by is inside recipients mark his notification
4128 4129 # as read
4129 4130 if u.user_id == created_by.user_id:
4130 4131 assoc.read = True
4131 4132 Session().add(assoc)
4132 4133
4133 4134 Session().add(notification)
4134 4135
4135 4136 return notification
4136 4137
4137 4138
4138 4139 class UserNotification(Base, BaseModel):
4139 4140 __tablename__ = 'user_to_notification'
4140 4141 __table_args__ = (
4141 4142 UniqueConstraint('user_id', 'notification_id'),
4142 4143 base_table_args
4143 4144 )
4144 4145
4145 4146 user_id = Column('user_id', Integer(), ForeignKey('users.user_id'), primary_key=True)
4146 4147 notification_id = Column("notification_id", Integer(), ForeignKey('notifications.notification_id'), primary_key=True)
4147 4148 read = Column('read', Boolean, default=False)
4148 4149 sent_on = Column('sent_on', DateTime(timezone=False), nullable=True, unique=None)
4149 4150
4150 4151 user = relationship('User', lazy="joined")
4151 4152 notification = relationship('Notification', lazy="joined",
4152 4153 order_by=lambda: Notification.created_on.desc(),)
4153 4154
4154 4155 def mark_as_read(self):
4155 4156 self.read = True
4156 4157 Session().add(self)
4157 4158
4158 4159
4159 4160 class Gist(Base, BaseModel):
4160 4161 __tablename__ = 'gists'
4161 4162 __table_args__ = (
4162 4163 Index('g_gist_access_id_idx', 'gist_access_id'),
4163 4164 Index('g_created_on_idx', 'created_on'),
4164 4165 base_table_args
4165 4166 )
4166 4167
4167 4168 GIST_PUBLIC = u'public'
4168 4169 GIST_PRIVATE = u'private'
4169 4170 DEFAULT_FILENAME = u'gistfile1.txt'
4170 4171
4171 4172 ACL_LEVEL_PUBLIC = u'acl_public'
4172 4173 ACL_LEVEL_PRIVATE = u'acl_private'
4173 4174
4174 4175 gist_id = Column('gist_id', Integer(), primary_key=True)
4175 4176 gist_access_id = Column('gist_access_id', Unicode(250))
4176 4177 gist_description = Column('gist_description', UnicodeText().with_variant(UnicodeText(1024), 'mysql'))
4177 4178 gist_owner = Column('user_id', Integer(), ForeignKey('users.user_id'), nullable=True)
4178 4179 gist_expires = Column('gist_expires', Float(53), nullable=False)
4179 4180 gist_type = Column('gist_type', Unicode(128), nullable=False)
4180 4181 created_on = Column('created_on', DateTime(timezone=False), nullable=False, default=datetime.datetime.now)
4181 4182 modified_at = Column('modified_at', DateTime(timezone=False), nullable=False, default=datetime.datetime.now)
4182 4183 acl_level = Column('acl_level', Unicode(128), nullable=True)
4183 4184
4184 4185 owner = relationship('User')
4185 4186
4186 4187 def __repr__(self):
4187 4188 return '<Gist:[%s]%s>' % (self.gist_type, self.gist_access_id)
4188 4189
4189 4190 @hybrid_property
4190 4191 def description_safe(self):
4191 4192 from rhodecode.lib import helpers as h
4192 4193 return h.escape(self.gist_description)
4193 4194
4194 4195 @classmethod
4195 4196 def get_or_404(cls, id_):
4196 4197 from pyramid.httpexceptions import HTTPNotFound
4197 4198
4198 4199 res = cls.query().filter(cls.gist_access_id == id_).scalar()
4199 4200 if not res:
4200 4201 raise HTTPNotFound()
4201 4202 return res
4202 4203
4203 4204 @classmethod
4204 4205 def get_by_access_id(cls, gist_access_id):
4205 4206 return cls.query().filter(cls.gist_access_id == gist_access_id).scalar()
4206 4207
4207 4208 def gist_url(self):
4208 4209 from rhodecode.model.gist import GistModel
4209 4210 return GistModel().get_url(self)
4210 4211
4211 4212 @classmethod
4212 4213 def base_path(cls):
4213 4214 """
4214 4215 Returns base path when all gists are stored
4215 4216
4216 4217 :param cls:
4217 4218 """
4218 4219 from rhodecode.model.gist import GIST_STORE_LOC
4219 4220 q = Session().query(RhodeCodeUi)\
4220 4221 .filter(RhodeCodeUi.ui_key == URL_SEP)
4221 4222 q = q.options(FromCache("sql_cache_short", "repository_repo_path"))
4222 4223 return os.path.join(q.one().ui_value, GIST_STORE_LOC)
4223 4224
4224 4225 def get_api_data(self):
4225 4226 """
4226 4227 Common function for generating gist related data for API
4227 4228 """
4228 4229 gist = self
4229 4230 data = {
4230 4231 'gist_id': gist.gist_id,
4231 4232 'type': gist.gist_type,
4232 4233 'access_id': gist.gist_access_id,
4233 4234 'description': gist.gist_description,
4234 4235 'url': gist.gist_url(),
4235 4236 'expires': gist.gist_expires,
4236 4237 'created_on': gist.created_on,
4237 4238 'modified_at': gist.modified_at,
4238 4239 'content': None,
4239 4240 'acl_level': gist.acl_level,
4240 4241 }
4241 4242 return data
4242 4243
4243 4244 def __json__(self):
4244 4245 data = dict(
4245 4246 )
4246 4247 data.update(self.get_api_data())
4247 4248 return data
4248 4249 # SCM functions
4249 4250
4250 4251 def scm_instance(self, **kwargs):
4251 4252 full_repo_path = os.path.join(self.base_path(), self.gist_access_id)
4252 4253 return get_vcs_instance(
4253 4254 repo_path=safe_str(full_repo_path), create=False)
4254 4255
4255 4256
4256 4257 class ExternalIdentity(Base, BaseModel):
4257 4258 __tablename__ = 'external_identities'
4258 4259 __table_args__ = (
4259 4260 Index('local_user_id_idx', 'local_user_id'),
4260 4261 Index('external_id_idx', 'external_id'),
4261 4262 base_table_args
4262 4263 )
4263 4264
4264 4265 external_id = Column('external_id', Unicode(255), default=u'', primary_key=True)
4265 4266 external_username = Column('external_username', Unicode(1024), default=u'')
4266 4267 local_user_id = Column('local_user_id', Integer(), ForeignKey('users.user_id'), primary_key=True)
4267 4268 provider_name = Column('provider_name', Unicode(255), default=u'', primary_key=True)
4268 4269 access_token = Column('access_token', String(1024), default=u'')
4269 4270 alt_token = Column('alt_token', String(1024), default=u'')
4270 4271 token_secret = Column('token_secret', String(1024), default=u'')
4271 4272
4272 4273 @classmethod
4273 4274 def by_external_id_and_provider(cls, external_id, provider_name, local_user_id=None):
4274 4275 """
4275 4276 Returns ExternalIdentity instance based on search params
4276 4277
4277 4278 :param external_id:
4278 4279 :param provider_name:
4279 4280 :return: ExternalIdentity
4280 4281 """
4281 4282 query = cls.query()
4282 4283 query = query.filter(cls.external_id == external_id)
4283 4284 query = query.filter(cls.provider_name == provider_name)
4284 4285 if local_user_id:
4285 4286 query = query.filter(cls.local_user_id == local_user_id)
4286 4287 return query.first()
4287 4288
4288 4289 @classmethod
4289 4290 def user_by_external_id_and_provider(cls, external_id, provider_name):
4290 4291 """
4291 4292 Returns User instance based on search params
4292 4293
4293 4294 :param external_id:
4294 4295 :param provider_name:
4295 4296 :return: User
4296 4297 """
4297 4298 query = User.query()
4298 4299 query = query.filter(cls.external_id == external_id)
4299 4300 query = query.filter(cls.provider_name == provider_name)
4300 4301 query = query.filter(User.user_id == cls.local_user_id)
4301 4302 return query.first()
4302 4303
4303 4304 @classmethod
4304 4305 def by_local_user_id(cls, local_user_id):
4305 4306 """
4306 4307 Returns all tokens for user
4307 4308
4308 4309 :param local_user_id:
4309 4310 :return: ExternalIdentity
4310 4311 """
4311 4312 query = cls.query()
4312 4313 query = query.filter(cls.local_user_id == local_user_id)
4313 4314 return query
4314 4315
4315 4316 @classmethod
4316 4317 def load_provider_plugin(cls, plugin_id):
4317 4318 from rhodecode.authentication.base import loadplugin
4318 4319 _plugin_id = 'egg:rhodecode-enterprise-ee#{}'.format(plugin_id)
4319 4320 auth_plugin = loadplugin(_plugin_id)
4320 4321 return auth_plugin
4321 4322
4322 4323
4323 4324 class Integration(Base, BaseModel):
4324 4325 __tablename__ = 'integrations'
4325 4326 __table_args__ = (
4326 4327 base_table_args
4327 4328 )
4328 4329
4329 4330 integration_id = Column('integration_id', Integer(), primary_key=True)
4330 4331 integration_type = Column('integration_type', String(255))
4331 4332 enabled = Column('enabled', Boolean(), nullable=False)
4332 4333 name = Column('name', String(255), nullable=False)
4333 4334 child_repos_only = Column('child_repos_only', Boolean(), nullable=False,
4334 4335 default=False)
4335 4336
4336 4337 settings = Column(
4337 4338 'settings_json', MutationObj.as_mutable(
4338 4339 JsonType(dialect_map=dict(mysql=UnicodeText(16384)))))
4339 4340 repo_id = Column(
4340 4341 'repo_id', Integer(), ForeignKey('repositories.repo_id'),
4341 4342 nullable=True, unique=None, default=None)
4342 4343 repo = relationship('Repository', lazy='joined')
4343 4344
4344 4345 repo_group_id = Column(
4345 4346 'repo_group_id', Integer(), ForeignKey('groups.group_id'),
4346 4347 nullable=True, unique=None, default=None)
4347 4348 repo_group = relationship('RepoGroup', lazy='joined')
4348 4349
4349 4350 @property
4350 4351 def scope(self):
4351 4352 if self.repo:
4352 4353 return repr(self.repo)
4353 4354 if self.repo_group:
4354 4355 if self.child_repos_only:
4355 4356 return repr(self.repo_group) + ' (child repos only)'
4356 4357 else:
4357 4358 return repr(self.repo_group) + ' (recursive)'
4358 4359 if self.child_repos_only:
4359 4360 return 'root_repos'
4360 4361 return 'global'
4361 4362
4362 4363 def __repr__(self):
4363 4364 return '<Integration(%r, %r)>' % (self.integration_type, self.scope)
4364 4365
4365 4366
4366 4367 class RepoReviewRuleUser(Base, BaseModel):
4367 4368 __tablename__ = 'repo_review_rules_users'
4368 4369 __table_args__ = (
4369 4370 base_table_args
4370 4371 )
4371 4372
4372 4373 repo_review_rule_user_id = Column('repo_review_rule_user_id', Integer(), primary_key=True)
4373 4374 repo_review_rule_id = Column("repo_review_rule_id", Integer(), ForeignKey('repo_review_rules.repo_review_rule_id'))
4374 4375 user_id = Column("user_id", Integer(), ForeignKey('users.user_id'), nullable=False)
4375 4376 mandatory = Column("mandatory", Boolean(), nullable=False, default=False)
4376 4377 user = relationship('User')
4377 4378
4378 4379 def rule_data(self):
4379 4380 return {
4380 4381 'mandatory': self.mandatory
4381 4382 }
4382 4383
4383 4384
4384 4385 class RepoReviewRuleUserGroup(Base, BaseModel):
4385 4386 __tablename__ = 'repo_review_rules_users_groups'
4386 4387 __table_args__ = (
4387 4388 base_table_args
4388 4389 )
4389 4390
4390 4391 VOTE_RULE_ALL = -1
4391 4392
4392 4393 repo_review_rule_users_group_id = Column('repo_review_rule_users_group_id', Integer(), primary_key=True)
4393 4394 repo_review_rule_id = Column("repo_review_rule_id", Integer(), ForeignKey('repo_review_rules.repo_review_rule_id'))
4394 4395 users_group_id = Column("users_group_id", Integer(),ForeignKey('users_groups.users_group_id'), nullable=False)
4395 4396 mandatory = Column("mandatory", Boolean(), nullable=False, default=False)
4396 4397 vote_rule = Column("vote_rule", Integer(), nullable=True, default=VOTE_RULE_ALL)
4397 4398 users_group = relationship('UserGroup')
4398 4399
4399 4400 def rule_data(self):
4400 4401 return {
4401 4402 'mandatory': self.mandatory,
4402 4403 'vote_rule': self.vote_rule
4403 4404 }
4404 4405
4405 4406 @property
4406 4407 def vote_rule_label(self):
4407 4408 if not self.vote_rule or self.vote_rule == self.VOTE_RULE_ALL:
4408 4409 return 'all must vote'
4409 4410 else:
4410 4411 return 'min. vote {}'.format(self.vote_rule)
4411 4412
4412 4413
4413 4414 class RepoReviewRule(Base, BaseModel):
4414 4415 __tablename__ = 'repo_review_rules'
4415 4416 __table_args__ = (
4416 4417 base_table_args
4417 4418 )
4418 4419
4419 4420 repo_review_rule_id = Column(
4420 4421 'repo_review_rule_id', Integer(), primary_key=True)
4421 4422 repo_id = Column(
4422 4423 "repo_id", Integer(), ForeignKey('repositories.repo_id'))
4423 4424 repo = relationship('Repository', backref='review_rules')
4424 4425
4425 4426 review_rule_name = Column('review_rule_name', String(255))
4426 4427 _branch_pattern = Column("branch_pattern", UnicodeText().with_variant(UnicodeText(255), 'mysql'), default=u'*') # glob
4427 4428 _target_branch_pattern = Column("target_branch_pattern", UnicodeText().with_variant(UnicodeText(255), 'mysql'), default=u'*') # glob
4428 4429 _file_pattern = Column("file_pattern", UnicodeText().with_variant(UnicodeText(255), 'mysql'), default=u'*') # glob
4429 4430
4430 4431 use_authors_for_review = Column("use_authors_for_review", Boolean(), nullable=False, default=False)
4431 4432 forbid_author_to_review = Column("forbid_author_to_review", Boolean(), nullable=False, default=False)
4432 4433 forbid_commit_author_to_review = Column("forbid_commit_author_to_review", Boolean(), nullable=False, default=False)
4433 4434 forbid_adding_reviewers = Column("forbid_adding_reviewers", Boolean(), nullable=False, default=False)
4434 4435
4435 4436 rule_users = relationship('RepoReviewRuleUser')
4436 4437 rule_user_groups = relationship('RepoReviewRuleUserGroup')
4437 4438
4438 4439 def _validate_pattern(self, value):
4439 4440 re.compile('^' + glob2re(value) + '$')
4440 4441
4441 4442 @hybrid_property
4442 4443 def source_branch_pattern(self):
4443 4444 return self._branch_pattern or '*'
4444 4445
4445 4446 @source_branch_pattern.setter
4446 4447 def source_branch_pattern(self, value):
4447 4448 self._validate_pattern(value)
4448 4449 self._branch_pattern = value or '*'
4449 4450
4450 4451 @hybrid_property
4451 4452 def target_branch_pattern(self):
4452 4453 return self._target_branch_pattern or '*'
4453 4454
4454 4455 @target_branch_pattern.setter
4455 4456 def target_branch_pattern(self, value):
4456 4457 self._validate_pattern(value)
4457 4458 self._target_branch_pattern = value or '*'
4458 4459
4459 4460 @hybrid_property
4460 4461 def file_pattern(self):
4461 4462 return self._file_pattern or '*'
4462 4463
4463 4464 @file_pattern.setter
4464 4465 def file_pattern(self, value):
4465 4466 self._validate_pattern(value)
4466 4467 self._file_pattern = value or '*'
4467 4468
4468 4469 def matches(self, source_branch, target_branch, files_changed):
4469 4470 """
4470 4471 Check if this review rule matches a branch/files in a pull request
4471 4472
4472 4473 :param source_branch: source branch name for the commit
4473 4474 :param target_branch: target branch name for the commit
4474 4475 :param files_changed: list of file paths changed in the pull request
4475 4476 """
4476 4477
4477 4478 source_branch = source_branch or ''
4478 4479 target_branch = target_branch or ''
4479 4480 files_changed = files_changed or []
4480 4481
4481 4482 branch_matches = True
4482 4483 if source_branch or target_branch:
4483 4484 if self.source_branch_pattern == '*':
4484 4485 source_branch_match = True
4485 4486 else:
4486 4487 if self.source_branch_pattern.startswith('re:'):
4487 4488 source_pattern = self.source_branch_pattern[3:]
4488 4489 else:
4489 4490 source_pattern = '^' + glob2re(self.source_branch_pattern) + '$'
4490 4491 source_branch_regex = re.compile(source_pattern)
4491 4492 source_branch_match = bool(source_branch_regex.search(source_branch))
4492 4493 if self.target_branch_pattern == '*':
4493 4494 target_branch_match = True
4494 4495 else:
4495 4496 if self.target_branch_pattern.startswith('re:'):
4496 4497 target_pattern = self.target_branch_pattern[3:]
4497 4498 else:
4498 4499 target_pattern = '^' + glob2re(self.target_branch_pattern) + '$'
4499 4500 target_branch_regex = re.compile(target_pattern)
4500 4501 target_branch_match = bool(target_branch_regex.search(target_branch))
4501 4502
4502 4503 branch_matches = source_branch_match and target_branch_match
4503 4504
4504 4505 files_matches = True
4505 4506 if self.file_pattern != '*':
4506 4507 files_matches = False
4507 4508 if self.file_pattern.startswith('re:'):
4508 4509 file_pattern = self.file_pattern[3:]
4509 4510 else:
4510 4511 file_pattern = glob2re(self.file_pattern)
4511 4512 file_regex = re.compile(file_pattern)
4512 4513 for filename in files_changed:
4513 4514 if file_regex.search(filename):
4514 4515 files_matches = True
4515 4516 break
4516 4517
4517 4518 return branch_matches and files_matches
4518 4519
4519 4520 @property
4520 4521 def review_users(self):
4521 4522 """ Returns the users which this rule applies to """
4522 4523
4523 4524 users = collections.OrderedDict()
4524 4525
4525 4526 for rule_user in self.rule_users:
4526 4527 if rule_user.user.active:
4527 4528 if rule_user.user not in users:
4528 4529 users[rule_user.user.username] = {
4529 4530 'user': rule_user.user,
4530 4531 'source': 'user',
4531 4532 'source_data': {},
4532 4533 'data': rule_user.rule_data()
4533 4534 }
4534 4535
4535 4536 for rule_user_group in self.rule_user_groups:
4536 4537 source_data = {
4537 4538 'user_group_id': rule_user_group.users_group.users_group_id,
4538 4539 'name': rule_user_group.users_group.users_group_name,
4539 4540 'members': len(rule_user_group.users_group.members)
4540 4541 }
4541 4542 for member in rule_user_group.users_group.members:
4542 4543 if member.user.active:
4543 4544 key = member.user.username
4544 4545 if key in users:
4545 4546 # skip this member as we have him already
4546 4547 # this prevents from override the "first" matched
4547 4548 # users with duplicates in multiple groups
4548 4549 continue
4549 4550
4550 4551 users[key] = {
4551 4552 'user': member.user,
4552 4553 'source': 'user_group',
4553 4554 'source_data': source_data,
4554 4555 'data': rule_user_group.rule_data()
4555 4556 }
4556 4557
4557 4558 return users
4558 4559
4559 4560 def user_group_vote_rule(self, user_id):
4560 4561
4561 4562 rules = []
4562 4563 if not self.rule_user_groups:
4563 4564 return rules
4564 4565
4565 4566 for user_group in self.rule_user_groups:
4566 4567 user_group_members = [x.user_id for x in user_group.users_group.members]
4567 4568 if user_id in user_group_members:
4568 4569 rules.append(user_group)
4569 4570 return rules
4570 4571
4571 4572 def __repr__(self):
4572 4573 return '<RepoReviewerRule(id=%r, repo=%r)>' % (
4573 4574 self.repo_review_rule_id, self.repo)
4574 4575
4575 4576
4576 4577 class ScheduleEntry(Base, BaseModel):
4577 4578 __tablename__ = 'schedule_entries'
4578 4579 __table_args__ = (
4579 4580 UniqueConstraint('schedule_name', name='s_schedule_name_idx'),
4580 4581 UniqueConstraint('task_uid', name='s_task_uid_idx'),
4581 4582 base_table_args,
4582 4583 )
4583 4584
4584 4585 schedule_types = ['crontab', 'timedelta', 'integer']
4585 4586 schedule_entry_id = Column('schedule_entry_id', Integer(), primary_key=True)
4586 4587
4587 4588 schedule_name = Column("schedule_name", String(255), nullable=False, unique=None, default=None)
4588 4589 schedule_description = Column("schedule_description", String(10000), nullable=True, unique=None, default=None)
4589 4590 schedule_enabled = Column("schedule_enabled", Boolean(), nullable=False, unique=None, default=True)
4590 4591
4591 4592 _schedule_type = Column("schedule_type", String(255), nullable=False, unique=None, default=None)
4592 4593 schedule_definition = Column('schedule_definition_json', MutationObj.as_mutable(JsonType(default=lambda: "", dialect_map=dict(mysql=LONGTEXT()))))
4593 4594
4594 4595 schedule_last_run = Column('schedule_last_run', DateTime(timezone=False), nullable=True, unique=None, default=None)
4595 4596 schedule_total_run_count = Column('schedule_total_run_count', Integer(), nullable=True, unique=None, default=0)
4596 4597
4597 4598 # task
4598 4599 task_uid = Column("task_uid", String(255), nullable=False, unique=None, default=None)
4599 4600 task_dot_notation = Column("task_dot_notation", String(4096), nullable=False, unique=None, default=None)
4600 4601 task_args = Column('task_args_json', MutationObj.as_mutable(JsonType(default=list, dialect_map=dict(mysql=LONGTEXT()))))
4601 4602 task_kwargs = Column('task_kwargs_json', MutationObj.as_mutable(JsonType(default=dict, dialect_map=dict(mysql=LONGTEXT()))))
4602 4603
4603 4604 created_on = Column('created_on', DateTime(timezone=False), nullable=False, default=datetime.datetime.now)
4604 4605 updated_on = Column('updated_on', DateTime(timezone=False), nullable=True, unique=None, default=None)
4605 4606
4606 4607 @hybrid_property
4607 4608 def schedule_type(self):
4608 4609 return self._schedule_type
4609 4610
4610 4611 @schedule_type.setter
4611 4612 def schedule_type(self, val):
4612 4613 if val not in self.schedule_types:
4613 4614 raise ValueError('Value must be on of `{}` and got `{}`'.format(
4614 4615 val, self.schedule_type))
4615 4616
4616 4617 self._schedule_type = val
4617 4618
4618 4619 @classmethod
4619 4620 def get_uid(cls, obj):
4620 4621 args = obj.task_args
4621 4622 kwargs = obj.task_kwargs
4622 4623 if isinstance(args, JsonRaw):
4623 4624 try:
4624 4625 args = json.loads(args)
4625 4626 except ValueError:
4626 4627 args = tuple()
4627 4628
4628 4629 if isinstance(kwargs, JsonRaw):
4629 4630 try:
4630 4631 kwargs = json.loads(kwargs)
4631 4632 except ValueError:
4632 4633 kwargs = dict()
4633 4634
4634 4635 dot_notation = obj.task_dot_notation
4635 4636 val = '.'.join(map(safe_str, [
4636 4637 sorted(dot_notation), args, sorted(kwargs.items())]))
4637 4638 return hashlib.sha1(val).hexdigest()
4638 4639
4639 4640 @classmethod
4640 4641 def get_by_schedule_name(cls, schedule_name):
4641 4642 return cls.query().filter(cls.schedule_name == schedule_name).scalar()
4642 4643
4643 4644 @classmethod
4644 4645 def get_by_schedule_id(cls, schedule_id):
4645 4646 return cls.query().filter(cls.schedule_entry_id == schedule_id).scalar()
4646 4647
4647 4648 @property
4648 4649 def task(self):
4649 4650 return self.task_dot_notation
4650 4651
4651 4652 @property
4652 4653 def schedule(self):
4653 4654 from rhodecode.lib.celerylib.utils import raw_2_schedule
4654 4655 schedule = raw_2_schedule(self.schedule_definition, self.schedule_type)
4655 4656 return schedule
4656 4657
4657 4658 @property
4658 4659 def args(self):
4659 4660 try:
4660 4661 return list(self.task_args or [])
4661 4662 except ValueError:
4662 4663 return list()
4663 4664
4664 4665 @property
4665 4666 def kwargs(self):
4666 4667 try:
4667 4668 return dict(self.task_kwargs or {})
4668 4669 except ValueError:
4669 4670 return dict()
4670 4671
4671 4672 def _as_raw(self, val):
4672 4673 if hasattr(val, 'de_coerce'):
4673 4674 val = val.de_coerce()
4674 4675 if val:
4675 4676 val = json.dumps(val)
4676 4677
4677 4678 return val
4678 4679
4679 4680 @property
4680 4681 def schedule_definition_raw(self):
4681 4682 return self._as_raw(self.schedule_definition)
4682 4683
4683 4684 @property
4684 4685 def args_raw(self):
4685 4686 return self._as_raw(self.task_args)
4686 4687
4687 4688 @property
4688 4689 def kwargs_raw(self):
4689 4690 return self._as_raw(self.task_kwargs)
4690 4691
4691 4692 def __repr__(self):
4692 4693 return '<DB:ScheduleEntry({}:{})>'.format(
4693 4694 self.schedule_entry_id, self.schedule_name)
4694 4695
4695 4696
4696 4697 @event.listens_for(ScheduleEntry, 'before_update')
4697 4698 def update_task_uid(mapper, connection, target):
4698 4699 target.task_uid = ScheduleEntry.get_uid(target)
4699 4700
4700 4701
4701 4702 @event.listens_for(ScheduleEntry, 'before_insert')
4702 4703 def set_task_uid(mapper, connection, target):
4703 4704 target.task_uid = ScheduleEntry.get_uid(target)
4704 4705
4705 4706
4706 4707 class _BaseBranchPerms(BaseModel):
4707 4708 @classmethod
4708 4709 def compute_hash(cls, value):
4709 4710 return sha1_safe(value)
4710 4711
4711 4712 @hybrid_property
4712 4713 def branch_pattern(self):
4713 4714 return self._branch_pattern or '*'
4714 4715
4715 4716 @hybrid_property
4716 4717 def branch_hash(self):
4717 4718 return self._branch_hash
4718 4719
4719 4720 def _validate_glob(self, value):
4720 4721 re.compile('^' + glob2re(value) + '$')
4721 4722
4722 4723 @branch_pattern.setter
4723 4724 def branch_pattern(self, value):
4724 4725 self._validate_glob(value)
4725 4726 self._branch_pattern = value or '*'
4726 4727 # set the Hash when setting the branch pattern
4727 4728 self._branch_hash = self.compute_hash(self._branch_pattern)
4728 4729
4729 4730 def matches(self, branch):
4730 4731 """
4731 4732 Check if this the branch matches entry
4732 4733
4733 4734 :param branch: branch name for the commit
4734 4735 """
4735 4736
4736 4737 branch = branch or ''
4737 4738
4738 4739 branch_matches = True
4739 4740 if branch:
4740 4741 branch_regex = re.compile('^' + glob2re(self.branch_pattern) + '$')
4741 4742 branch_matches = bool(branch_regex.search(branch))
4742 4743
4743 4744 return branch_matches
4744 4745
4745 4746
4746 4747 class UserToRepoBranchPermission(Base, _BaseBranchPerms):
4747 4748 __tablename__ = 'user_to_repo_branch_permissions'
4748 4749 __table_args__ = (
4749 4750 {'extend_existing': True, 'mysql_engine': 'InnoDB',
4750 4751 'mysql_charset': 'utf8', 'sqlite_autoincrement': True,}
4751 4752 )
4752 4753
4753 4754 branch_rule_id = Column('branch_rule_id', Integer(), primary_key=True)
4754 4755
4755 4756 repository_id = Column('repository_id', Integer(), ForeignKey('repositories.repo_id'), nullable=False, unique=None, default=None)
4756 4757 repo = relationship('Repository', backref='user_branch_perms')
4757 4758
4758 4759 permission_id = Column('permission_id', Integer(), ForeignKey('permissions.permission_id'), nullable=False, unique=None, default=None)
4759 4760 permission = relationship('Permission')
4760 4761
4761 4762 rule_to_perm_id = Column('rule_to_perm_id', Integer(), ForeignKey('repo_to_perm.repo_to_perm_id'), nullable=False, unique=None, default=None)
4762 4763 user_repo_to_perm = relationship('UserRepoToPerm')
4763 4764
4764 4765 rule_order = Column('rule_order', Integer(), nullable=False)
4765 4766 _branch_pattern = Column('branch_pattern', UnicodeText().with_variant(UnicodeText(2048), 'mysql'), default=u'*') # glob
4766 4767 _branch_hash = Column('branch_hash', UnicodeText().with_variant(UnicodeText(2048), 'mysql'))
4767 4768
4768 4769 def __unicode__(self):
4769 4770 return u'<UserBranchPermission(%s => %r)>' % (
4770 4771 self.user_repo_to_perm, self.branch_pattern)
4771 4772
4772 4773
4773 4774 class UserGroupToRepoBranchPermission(Base, _BaseBranchPerms):
4774 4775 __tablename__ = 'user_group_to_repo_branch_permissions'
4775 4776 __table_args__ = (
4776 4777 {'extend_existing': True, 'mysql_engine': 'InnoDB',
4777 4778 'mysql_charset': 'utf8', 'sqlite_autoincrement': True,}
4778 4779 )
4779 4780
4780 4781 branch_rule_id = Column('branch_rule_id', Integer(), primary_key=True)
4781 4782
4782 4783 repository_id = Column('repository_id', Integer(), ForeignKey('repositories.repo_id'), nullable=False, unique=None, default=None)
4783 4784 repo = relationship('Repository', backref='user_group_branch_perms')
4784 4785
4785 4786 permission_id = Column('permission_id', Integer(), ForeignKey('permissions.permission_id'), nullable=False, unique=None, default=None)
4786 4787 permission = relationship('Permission')
4787 4788
4788 4789 rule_to_perm_id = Column('rule_to_perm_id', Integer(), ForeignKey('users_group_repo_to_perm.users_group_to_perm_id'), nullable=False, unique=None, default=None)
4789 4790 user_group_repo_to_perm = relationship('UserGroupRepoToPerm')
4790 4791
4791 4792 rule_order = Column('rule_order', Integer(), nullable=False)
4792 4793 _branch_pattern = Column('branch_pattern', UnicodeText().with_variant(UnicodeText(2048), 'mysql'), default=u'*') # glob
4793 4794 _branch_hash = Column('branch_hash', UnicodeText().with_variant(UnicodeText(2048), 'mysql'))
4794 4795
4795 4796 def __unicode__(self):
4796 4797 return u'<UserBranchPermission(%s => %r)>' % (
4797 4798 self.user_group_repo_to_perm, self.branch_pattern)
4798 4799
4799 4800
4800 4801 class UserBookmark(Base, BaseModel):
4801 4802 __tablename__ = 'user_bookmarks'
4802 4803 __table_args__ = (
4803 4804 UniqueConstraint('user_id', 'bookmark_repo_id'),
4804 4805 UniqueConstraint('user_id', 'bookmark_repo_group_id'),
4805 4806 UniqueConstraint('user_id', 'bookmark_position'),
4806 4807 base_table_args
4807 4808 )
4808 4809
4809 4810 user_bookmark_id = Column("user_bookmark_id", Integer(), nullable=False, unique=True, default=None, primary_key=True)
4810 4811 user_id = Column("user_id", Integer(), ForeignKey('users.user_id'), nullable=False, unique=None, default=None)
4811 4812 position = Column("bookmark_position", Integer(), nullable=False)
4812 4813 title = Column("bookmark_title", String(255), nullable=True, unique=None, default=None)
4813 4814 redirect_url = Column("bookmark_redirect_url", String(10240), nullable=True, unique=None, default=None)
4814 4815 created_on = Column("created_on", DateTime(timezone=False), nullable=False, default=datetime.datetime.now)
4815 4816
4816 4817 bookmark_repo_id = Column("bookmark_repo_id", Integer(), ForeignKey("repositories.repo_id"), nullable=True, unique=None, default=None)
4817 4818 bookmark_repo_group_id = Column("bookmark_repo_group_id", Integer(), ForeignKey("groups.group_id"), nullable=True, unique=None, default=None)
4818 4819
4819 4820 user = relationship("User")
4820 4821
4821 4822 repository = relationship("Repository")
4822 4823 repository_group = relationship("RepoGroup")
4823 4824
4824 4825 @classmethod
4825 4826 def get_by_position_for_user(cls, position, user_id):
4826 4827 return cls.query() \
4827 4828 .filter(UserBookmark.user_id == user_id) \
4828 4829 .filter(UserBookmark.position == position).scalar()
4829 4830
4830 4831 @classmethod
4831 4832 def get_bookmarks_for_user(cls, user_id):
4832 4833 return cls.query() \
4833 4834 .filter(UserBookmark.user_id == user_id) \
4834 4835 .options(joinedload(UserBookmark.repository)) \
4835 4836 .options(joinedload(UserBookmark.repository_group)) \
4836 4837 .order_by(UserBookmark.position.asc()) \
4837 4838 .all()
4838 4839
4839 4840 def __unicode__(self):
4840 4841 return u'<UserBookmark(%d @ %r)>' % (self.position, self.redirect_url)
4841 4842
4842 4843
4843 4844 class DbMigrateVersion(Base, BaseModel):
4844 4845 __tablename__ = 'db_migrate_version'
4845 4846 __table_args__ = (
4846 4847 base_table_args,
4847 4848 )
4848 4849
4849 4850 repository_id = Column('repository_id', String(250), primary_key=True)
4850 4851 repository_path = Column('repository_path', Text)
4851 4852 version = Column('version', Integer)
4852 4853
4853 4854 @classmethod
4854 4855 def set_version(cls, version):
4855 4856 """
4856 4857 Helper for forcing a different version, usually for debugging purposes via ishell.
4857 4858 """
4858 4859 ver = DbMigrateVersion.query().first()
4859 4860 ver.version = version
4860 4861 Session().commit()
4861 4862
4862 4863
4863 4864 class DbSession(Base, BaseModel):
4864 4865 __tablename__ = 'db_session'
4865 4866 __table_args__ = (
4866 4867 base_table_args,
4867 4868 )
4868 4869
4869 4870 def __repr__(self):
4870 4871 return '<DB:DbSession({})>'.format(self.id)
4871 4872
4872 4873 id = Column('id', Integer())
4873 4874 namespace = Column('namespace', String(255), primary_key=True)
4874 4875 accessed = Column('accessed', DateTime, nullable=False)
4875 4876 created = Column('created', DateTime, nullable=False)
4876 4877 data = Column('data', PickleType, nullable=False)
General Comments 0
You need to be logged in to leave comments. Login now