##// END OF EJS Templates
refactor: renamed get_first_admin to get_first_super_admin which...
marcink -
r278:25d706fe default
parent child Browse files
Show More

The requested changes are too big and content was truncated. Show full diff

@@ -1,406 +1,406 b''
1 1 # -*- coding: utf-8 -*-
2 2
3 3 # Copyright (C) 2010-2016 RhodeCode GmbH
4 4 #
5 5 # This program is free software: you can redistribute it and/or modify
6 6 # it under the terms of the GNU Affero General Public License, version 3
7 7 # (only), as published by the Free Software Foundation.
8 8 #
9 9 # This program is distributed in the hope that it will be useful,
10 10 # but WITHOUT ANY WARRANTY; without even the implied warranty of
11 11 # MERCHANTABILITY or FITNESS FOR A PARTICULAR PURPOSE. See the
12 12 # GNU General Public License for more details.
13 13 #
14 14 # You should have received a copy of the GNU Affero General Public License
15 15 # along with this program. If not, see <http://www.gnu.org/licenses/>.
16 16 #
17 17 # This program is dual-licensed. If you wish to learn more about the
18 18 # RhodeCode Enterprise Edition, including its added features, Support services,
19 19 # and proprietary license terms, please see https://rhodecode.com/licenses/
20 20
21 21
22 22 """
23 23 Repository groups controller for RhodeCode
24 24 """
25 25
26 26 import logging
27 27 import formencode
28 28
29 29 from formencode import htmlfill
30 30
31 31 from pylons import request, tmpl_context as c, url
32 32 from pylons.controllers.util import abort, redirect
33 33 from pylons.i18n.translation import _, ungettext
34 34
35 35 from rhodecode.lib import auth
36 36 from rhodecode.lib import helpers as h
37 37 from rhodecode.lib.ext_json import json
38 38 from rhodecode.lib.auth import (
39 39 LoginRequired, NotAnonymous, HasPermissionAll,
40 40 HasRepoGroupPermissionAll, HasRepoGroupPermissionAnyDecorator)
41 41 from rhodecode.lib.base import BaseController, render
42 42 from rhodecode.model.db import RepoGroup, User
43 43 from rhodecode.model.scm import RepoGroupList
44 44 from rhodecode.model.repo_group import RepoGroupModel
45 45 from rhodecode.model.forms import RepoGroupForm, RepoGroupPermsForm
46 46 from rhodecode.model.meta import Session
47 47 from rhodecode.lib.utils2 import safe_int
48 48
49 49
50 50 log = logging.getLogger(__name__)
51 51
52 52
53 53 class RepoGroupsController(BaseController):
54 54 """REST Controller styled on the Atom Publishing Protocol"""
55 55
56 56 @LoginRequired()
57 57 def __before__(self):
58 58 super(RepoGroupsController, self).__before__()
59 59
60 60 def __load_defaults(self, allow_empty_group=False, repo_group=None):
61 61 if self._can_create_repo_group():
62 62 # we're global admin, we're ok and we can create TOP level groups
63 63 allow_empty_group = True
64 64
65 65 # override the choices for this form, we need to filter choices
66 66 # and display only those we have ADMIN right
67 67 groups_with_admin_rights = RepoGroupList(
68 68 RepoGroup.query().all(),
69 69 perm_set=['group.admin'])
70 70 c.repo_groups = RepoGroup.groups_choices(
71 71 groups=groups_with_admin_rights,
72 72 show_empty_group=allow_empty_group)
73 73
74 74 if repo_group:
75 75 # exclude filtered ids
76 76 exclude_group_ids = [repo_group.group_id]
77 77 c.repo_groups = filter(lambda x: x[0] not in exclude_group_ids,
78 78 c.repo_groups)
79 79 c.repo_groups_choices = map(lambda k: unicode(k[0]), c.repo_groups)
80 80 parent_group = repo_group.parent_group
81 81
82 82 add_parent_group = (parent_group and (
83 83 unicode(parent_group.group_id) not in c.repo_groups_choices))
84 84 if add_parent_group:
85 85 c.repo_groups_choices.append(unicode(parent_group.group_id))
86 86 c.repo_groups.append(RepoGroup._generate_choice(parent_group))
87 87
88 88 def __load_data(self, group_id):
89 89 """
90 90 Load defaults settings for edit, and update
91 91
92 92 :param group_id:
93 93 """
94 94 repo_group = RepoGroup.get_or_404(group_id)
95 95 data = repo_group.get_dict()
96 96 data['group_name'] = repo_group.name
97 97
98 98 # fill owner
99 99 if repo_group.user:
100 100 data.update({'user': repo_group.user.username})
101 101 else:
102 replacement_user = User.get_first_admin().username
102 replacement_user = User.get_first_super_admin().username
103 103 data.update({'user': replacement_user})
104 104
105 105 # fill repository group users
106 106 for p in repo_group.repo_group_to_perm:
107 107 data.update({
108 108 'u_perm_%s' % p.user.user_id: p.permission.permission_name})
109 109
110 110 # fill repository group user groups
111 111 for p in repo_group.users_group_to_perm:
112 112 data.update({
113 113 'g_perm_%s' % p.users_group.users_group_id:
114 114 p.permission.permission_name})
115 115 # html and form expects -1 as empty parent group
116 116 data['group_parent_id'] = data['group_parent_id'] or -1
117 117 return data
118 118
119 119 def _revoke_perms_on_yourself(self, form_result):
120 120 _updates = filter(lambda u: c.rhodecode_user.user_id == int(u[0]),
121 121 form_result['perm_updates'])
122 122 _additions = filter(lambda u: c.rhodecode_user.user_id == int(u[0]),
123 123 form_result['perm_additions'])
124 124 _deletions = filter(lambda u: c.rhodecode_user.user_id == int(u[0]),
125 125 form_result['perm_deletions'])
126 126 admin_perm = 'group.admin'
127 127 if _updates and _updates[0][1] != admin_perm or \
128 128 _additions and _additions[0][1] != admin_perm or \
129 129 _deletions and _deletions[0][1] != admin_perm:
130 130 return True
131 131 return False
132 132
133 133 def _can_create_repo_group(self, parent_group_id=None):
134 134 is_admin = HasPermissionAll('hg.admin')('group create controller')
135 135 create_repo_group = HasPermissionAll(
136 136 'hg.repogroup.create.true')('group create controller')
137 137 if is_admin or (create_repo_group and not parent_group_id):
138 138 # we're global admin, or we have global repo group create
139 139 # permission
140 140 # we're ok and we can create TOP level groups
141 141 return True
142 142 elif parent_group_id:
143 143 # we check the permission if we can write to parent group
144 144 group = RepoGroup.get(parent_group_id)
145 145 group_name = group.group_name if group else None
146 146 if HasRepoGroupPermissionAll('group.admin')(
147 147 group_name, 'check if user is an admin of group'):
148 148 # we're an admin of passed in group, we're ok.
149 149 return True
150 150 else:
151 151 return False
152 152 return False
153 153
154 154 @NotAnonymous()
155 155 def index(self):
156 156 """GET /repo_groups: All items in the collection"""
157 157 # url('repo_groups')
158 158
159 159 repo_group_list = RepoGroup.get_all_repo_groups()
160 160 _perms = ['group.admin']
161 161 repo_group_list_acl = RepoGroupList(repo_group_list, perm_set=_perms)
162 162 repo_group_data = RepoGroupModel().get_repo_groups_as_dict(
163 163 repo_group_list=repo_group_list_acl, admin=True)
164 164 c.data = json.dumps(repo_group_data)
165 165 return render('admin/repo_groups/repo_groups.html')
166 166
167 167 # perm checks inside
168 168 @NotAnonymous()
169 169 @auth.CSRFRequired()
170 170 def create(self):
171 171 """POST /repo_groups: Create a new item"""
172 172 # url('repo_groups')
173 173
174 174 parent_group_id = safe_int(request.POST.get('group_parent_id'))
175 175 can_create = self._can_create_repo_group(parent_group_id)
176 176
177 177 self.__load_defaults()
178 178 # permissions for can create group based on parent_id are checked
179 179 # here in the Form
180 180 available_groups = map(lambda k: unicode(k[0]), c.repo_groups)
181 181 repo_group_form = RepoGroupForm(available_groups=available_groups,
182 182 can_create_in_root=can_create)()
183 183 try:
184 184 owner = c.rhodecode_user
185 185 form_result = repo_group_form.to_python(dict(request.POST))
186 186 RepoGroupModel().create(
187 187 group_name=form_result['group_name_full'],
188 188 group_description=form_result['group_description'],
189 189 owner=owner.user_id,
190 190 copy_permissions=form_result['group_copy_permissions']
191 191 )
192 192 Session().commit()
193 193 _new_group_name = form_result['group_name_full']
194 194 repo_group_url = h.link_to(
195 195 _new_group_name,
196 196 h.url('repo_group_home', group_name=_new_group_name))
197 197 h.flash(h.literal(_('Created repository group %s')
198 198 % repo_group_url), category='success')
199 199 # TODO: in futureaction_logger(, '', '', '', self.sa)
200 200 except formencode.Invalid as errors:
201 201 return htmlfill.render(
202 202 render('admin/repo_groups/repo_group_add.html'),
203 203 defaults=errors.value,
204 204 errors=errors.error_dict or {},
205 205 prefix_error=False,
206 206 encoding="UTF-8",
207 207 force_defaults=False)
208 208 except Exception:
209 209 log.exception("Exception during creation of repository group")
210 210 h.flash(_('Error occurred during creation of repository group %s')
211 211 % request.POST.get('group_name'), category='error')
212 212
213 213 # TODO: maybe we should get back to the main view, not the admin one
214 214 return redirect(url('repo_groups', parent_group=parent_group_id))
215 215
216 216 # perm checks inside
217 217 @NotAnonymous()
218 218 def new(self):
219 219 """GET /repo_groups/new: Form to create a new item"""
220 220 # url('new_repo_group')
221 221 # perm check for admin, create_group perm or admin of parent_group
222 222 parent_group_id = safe_int(request.GET.get('parent_group'))
223 223 if not self._can_create_repo_group(parent_group_id):
224 224 return abort(403)
225 225
226 226 self.__load_defaults()
227 227 return render('admin/repo_groups/repo_group_add.html')
228 228
229 229 @HasRepoGroupPermissionAnyDecorator('group.admin')
230 230 @auth.CSRFRequired()
231 231 def update(self, group_name):
232 232 """PUT /repo_groups/group_name: Update an existing item"""
233 233 # Forms posted to this method should contain a hidden field:
234 234 # <input type="hidden" name="_method" value="PUT" />
235 235 # Or using helpers:
236 236 # h.form(url('repos_group', group_name=GROUP_NAME), method='put')
237 237 # url('repo_group_home', group_name=GROUP_NAME)
238 238
239 239 c.repo_group = RepoGroupModel()._get_repo_group(group_name)
240 240 can_create_in_root = self._can_create_repo_group()
241 241 show_root_location = can_create_in_root
242 242 if not c.repo_group.parent_group:
243 243 # this group don't have a parrent so we should show empty value
244 244 show_root_location = True
245 245 self.__load_defaults(allow_empty_group=show_root_location,
246 246 repo_group=c.repo_group)
247 247
248 248 repo_group_form = RepoGroupForm(
249 249 edit=True, old_data=c.repo_group.get_dict(),
250 250 available_groups=c.repo_groups_choices,
251 251 can_create_in_root=can_create_in_root, allow_disabled=True)()
252 252
253 253 try:
254 254 form_result = repo_group_form.to_python(dict(request.POST))
255 255 gr_name = form_result['group_name']
256 256 new_gr = RepoGroupModel().update(group_name, form_result)
257 257 Session().commit()
258 258 h.flash(_('Updated repository group %s') % (gr_name,),
259 259 category='success')
260 260 # we now have new name !
261 261 group_name = new_gr.group_name
262 262 # TODO: in future action_logger(, '', '', '', self.sa)
263 263 except formencode.Invalid as errors:
264 264 c.active = 'settings'
265 265 return htmlfill.render(
266 266 render('admin/repo_groups/repo_group_edit.html'),
267 267 defaults=errors.value,
268 268 errors=errors.error_dict or {},
269 269 prefix_error=False,
270 270 encoding="UTF-8",
271 271 force_defaults=False)
272 272 except Exception:
273 273 log.exception("Exception during update or repository group")
274 274 h.flash(_('Error occurred during update of repository group %s')
275 275 % request.POST.get('group_name'), category='error')
276 276
277 277 return redirect(url('edit_repo_group', group_name=group_name))
278 278
279 279 @HasRepoGroupPermissionAnyDecorator('group.admin')
280 280 @auth.CSRFRequired()
281 281 def delete(self, group_name):
282 282 """DELETE /repo_groups/group_name: Delete an existing item"""
283 283 # Forms posted to this method should contain a hidden field:
284 284 # <input type="hidden" name="_method" value="DELETE" />
285 285 # Or using helpers:
286 286 # h.form(url('repos_group', group_name=GROUP_NAME), method='delete')
287 287 # url('repo_group_home', group_name=GROUP_NAME)
288 288
289 289 gr = c.repo_group = RepoGroupModel()._get_repo_group(group_name)
290 290 repos = gr.repositories.all()
291 291 if repos:
292 292 msg = ungettext(
293 293 'This group contains %(num)d repository and cannot be deleted',
294 294 'This group contains %(num)d repositories and cannot be'
295 295 ' deleted',
296 296 len(repos)) % {'num': len(repos)}
297 297 h.flash(msg, category='warning')
298 298 return redirect(url('repo_groups'))
299 299
300 300 children = gr.children.all()
301 301 if children:
302 302 msg = ungettext(
303 303 'This group contains %(num)d subgroup and cannot be deleted',
304 304 'This group contains %(num)d subgroups and cannot be deleted',
305 305 len(children)) % {'num': len(children)}
306 306 h.flash(msg, category='warning')
307 307 return redirect(url('repo_groups'))
308 308
309 309 try:
310 310 RepoGroupModel().delete(group_name)
311 311 Session().commit()
312 312 h.flash(_('Removed repository group %s') % group_name,
313 313 category='success')
314 314 # TODO: in future action_logger(, '', '', '', self.sa)
315 315 except Exception:
316 316 log.exception("Exception during deletion of repository group")
317 317 h.flash(_('Error occurred during deletion of repository group %s')
318 318 % group_name, category='error')
319 319
320 320 return redirect(url('repo_groups'))
321 321
322 322 @HasRepoGroupPermissionAnyDecorator('group.admin')
323 323 def edit(self, group_name):
324 324 """GET /repo_groups/group_name/edit: Form to edit an existing item"""
325 325 # url('edit_repo_group', group_name=GROUP_NAME)
326 326 c.active = 'settings'
327 327
328 328 c.repo_group = RepoGroupModel()._get_repo_group(group_name)
329 329 # we can only allow moving empty group if it's already a top-level
330 330 # group, ie has no parents, or we're admin
331 331 can_create_in_root = self._can_create_repo_group()
332 332 show_root_location = can_create_in_root
333 333 if not c.repo_group.parent_group:
334 334 # this group don't have a parrent so we should show empty value
335 335 show_root_location = True
336 336 self.__load_defaults(allow_empty_group=show_root_location,
337 337 repo_group=c.repo_group)
338 338 defaults = self.__load_data(c.repo_group.group_id)
339 339
340 340 return htmlfill.render(
341 341 render('admin/repo_groups/repo_group_edit.html'),
342 342 defaults=defaults,
343 343 encoding="UTF-8",
344 344 force_defaults=False
345 345 )
346 346
347 347 @HasRepoGroupPermissionAnyDecorator('group.admin')
348 348 def edit_repo_group_advanced(self, group_name):
349 349 """GET /repo_groups/group_name/edit: Form to edit an existing item"""
350 350 # url('edit_repo_group', group_name=GROUP_NAME)
351 351 c.active = 'advanced'
352 352 c.repo_group = RepoGroupModel()._get_repo_group(group_name)
353 353
354 354 return render('admin/repo_groups/repo_group_edit.html')
355 355
356 356 @HasRepoGroupPermissionAnyDecorator('group.admin')
357 357 def edit_repo_group_perms(self, group_name):
358 358 """GET /repo_groups/group_name/edit: Form to edit an existing item"""
359 359 # url('edit_repo_group', group_name=GROUP_NAME)
360 360 c.active = 'perms'
361 361 c.repo_group = RepoGroupModel()._get_repo_group(group_name)
362 362 self.__load_defaults()
363 363 defaults = self.__load_data(c.repo_group.group_id)
364 364
365 365 return htmlfill.render(
366 366 render('admin/repo_groups/repo_group_edit.html'),
367 367 defaults=defaults,
368 368 encoding="UTF-8",
369 369 force_defaults=False
370 370 )
371 371
372 372 @HasRepoGroupPermissionAnyDecorator('group.admin')
373 373 @auth.CSRFRequired()
374 374 def update_perms(self, group_name):
375 375 """
376 376 Update permissions for given repository group
377 377
378 378 :param group_name:
379 379 """
380 380
381 381 c.repo_group = RepoGroupModel()._get_repo_group(group_name)
382 382 valid_recursive_choices = ['none', 'repos', 'groups', 'all']
383 383 form = RepoGroupPermsForm(valid_recursive_choices)().to_python(
384 384 request.POST)
385 385
386 386 if not c.rhodecode_user.is_admin:
387 387 if self._revoke_perms_on_yourself(form):
388 388 msg = _('Cannot change permission for yourself as admin')
389 389 h.flash(msg, category='warning')
390 390 return redirect(
391 391 url('edit_repo_group_perms', group_name=group_name))
392 392
393 393 # iterate over all members(if in recursive mode) of this groups and
394 394 # set the permissions !
395 395 # this can be potentially heavy operation
396 396 RepoGroupModel().update_permissions(
397 397 c.repo_group,
398 398 form['perm_additions'], form['perm_updates'],
399 399 form['perm_deletions'], form['recursive'])
400 400
401 401 # TODO: implement this
402 402 # action_logger(c.rhodecode_user, 'admin_changed_repo_permissions',
403 403 # repo_name, self.ip_addr, self.sa)
404 404 Session().commit()
405 405 h.flash(_('Repository Group permissions updated'), category='success')
406 406 return redirect(url('edit_repo_group_perms', group_name=group_name))
@@ -1,480 +1,480 b''
1 1 # -*- coding: utf-8 -*-
2 2
3 3 # Copyright (C) 2011-2016 RhodeCode GmbH
4 4 #
5 5 # This program is free software: you can redistribute it and/or modify
6 6 # it under the terms of the GNU Affero General Public License, version 3
7 7 # (only), as published by the Free Software Foundation.
8 8 #
9 9 # This program is distributed in the hope that it will be useful,
10 10 # but WITHOUT ANY WARRANTY; without even the implied warranty of
11 11 # MERCHANTABILITY or FITNESS FOR A PARTICULAR PURPOSE. See the
12 12 # GNU General Public License for more details.
13 13 #
14 14 # You should have received a copy of the GNU Affero General Public License
15 15 # along with this program. If not, see <http://www.gnu.org/licenses/>.
16 16 #
17 17 # This program is dual-licensed. If you wish to learn more about the
18 18 # RhodeCode Enterprise Edition, including its added features, Support services,
19 19 # and proprietary license terms, please see https://rhodecode.com/licenses/
20 20
21 21 """
22 22 User Groups crud controller for pylons
23 23 """
24 24
25 25 import logging
26 26 import formencode
27 27
28 28 from formencode import htmlfill
29 29 from pylons import request, tmpl_context as c, url, config
30 30 from pylons.controllers.util import redirect
31 31 from pylons.i18n.translation import _
32 32
33 33 from sqlalchemy.orm import joinedload
34 34
35 35 from rhodecode.lib import auth
36 36 from rhodecode.lib import helpers as h
37 37 from rhodecode.lib.exceptions import UserGroupAssignedException,\
38 38 RepoGroupAssignmentError
39 39 from rhodecode.lib.utils import jsonify, action_logger
40 40 from rhodecode.lib.utils2 import safe_unicode, str2bool, safe_int
41 41 from rhodecode.lib.auth import (
42 42 LoginRequired, NotAnonymous, HasUserGroupPermissionAnyDecorator,
43 43 HasPermissionAnyDecorator)
44 44 from rhodecode.lib.base import BaseController, render
45 45 from rhodecode.model.permission import PermissionModel
46 46 from rhodecode.model.scm import UserGroupList
47 47 from rhodecode.model.user_group import UserGroupModel
48 48 from rhodecode.model.db import (
49 49 User, UserGroup, UserGroupRepoToPerm, UserGroupRepoGroupToPerm)
50 50 from rhodecode.model.forms import (
51 51 UserGroupForm, UserGroupPermsForm, UserIndividualPermissionsForm,
52 52 UserPermissionsForm)
53 53 from rhodecode.model.meta import Session
54 54 from rhodecode.lib.utils import action_logger
55 55 from rhodecode.lib.ext_json import json
56 56
57 57 log = logging.getLogger(__name__)
58 58
59 59
60 60 class UserGroupsController(BaseController):
61 61 """REST Controller styled on the Atom Publishing Protocol"""
62 62
63 63 @LoginRequired()
64 64 def __before__(self):
65 65 super(UserGroupsController, self).__before__()
66 66 c.available_permissions = config['available_permissions']
67 67 PermissionModel().set_global_permission_choices(c, translator=_)
68 68
69 69 def __load_data(self, user_group_id):
70 70 c.group_members_obj = [x.user for x in c.user_group.members]
71 71 c.group_members_obj.sort(key=lambda u: u.username.lower())
72 72
73 73 c.group_members = [(x.user_id, x.username) for x in c.group_members_obj]
74 74
75 75 c.available_members = [(x.user_id, x.username)
76 76 for x in User.query().all()]
77 77 c.available_members.sort(key=lambda u: u[1].lower())
78 78
79 79 def __load_defaults(self, user_group_id):
80 80 """
81 81 Load defaults settings for edit, and update
82 82
83 83 :param user_group_id:
84 84 """
85 85 user_group = UserGroup.get_or_404(user_group_id)
86 86 data = user_group.get_dict()
87 87 # fill owner
88 88 if user_group.user:
89 89 data.update({'user': user_group.user.username})
90 90 else:
91 replacement_user = User.get_first_admin().username
91 replacement_user = User.get_first_super_admin().username
92 92 data.update({'user': replacement_user})
93 93 return data
94 94
95 95 def _revoke_perms_on_yourself(self, form_result):
96 96 _updates = filter(lambda u: c.rhodecode_user.user_id == int(u[0]),
97 97 form_result['perm_updates'])
98 98 _additions = filter(lambda u: c.rhodecode_user.user_id == int(u[0]),
99 99 form_result['perm_additions'])
100 100 _deletions = filter(lambda u: c.rhodecode_user.user_id == int(u[0]),
101 101 form_result['perm_deletions'])
102 102 admin_perm = 'usergroup.admin'
103 103 if _updates and _updates[0][1] != admin_perm or \
104 104 _additions and _additions[0][1] != admin_perm or \
105 105 _deletions and _deletions[0][1] != admin_perm:
106 106 return True
107 107 return False
108 108
109 109 # permission check inside
110 110 @NotAnonymous()
111 111 def index(self):
112 112 """GET /users_groups: All items in the collection"""
113 113 # url('users_groups')
114 114
115 115 from rhodecode.lib.utils import PartialRenderer
116 116 _render = PartialRenderer('data_table/_dt_elements.html')
117 117
118 118 def user_group_name(user_group_id, user_group_name):
119 119 return _render("user_group_name", user_group_id, user_group_name)
120 120
121 121 def user_group_actions(user_group_id, user_group_name):
122 122 return _render("user_group_actions", user_group_id, user_group_name)
123 123
124 124 ## json generate
125 125 group_iter = UserGroupList(UserGroup.query().all(),
126 126 perm_set=['usergroup.admin'])
127 127
128 128 user_groups_data = []
129 129 for user_gr in group_iter:
130 130 user_groups_data.append({
131 131 "group_name": user_group_name(
132 132 user_gr.users_group_id, h.escape(user_gr.users_group_name)),
133 133 "group_name_raw": user_gr.users_group_name,
134 134 "desc": h.escape(user_gr.user_group_description),
135 135 "members": len(user_gr.members),
136 136 "active": h.bool2icon(user_gr.users_group_active),
137 137 "owner": h.escape(h.link_to_user(user_gr.user.username)),
138 138 "action": user_group_actions(
139 139 user_gr.users_group_id, user_gr.users_group_name)
140 140 })
141 141
142 142 c.data = json.dumps(user_groups_data)
143 143 return render('admin/user_groups/user_groups.html')
144 144
145 145 @HasPermissionAnyDecorator('hg.admin', 'hg.usergroup.create.true')
146 146 @auth.CSRFRequired()
147 147 def create(self):
148 148 """POST /users_groups: Create a new item"""
149 149 # url('users_groups')
150 150
151 151 users_group_form = UserGroupForm()()
152 152 try:
153 153 form_result = users_group_form.to_python(dict(request.POST))
154 154 user_group = UserGroupModel().create(
155 155 name=form_result['users_group_name'],
156 156 description=form_result['user_group_description'],
157 157 owner=c.rhodecode_user.user_id,
158 158 active=form_result['users_group_active'])
159 159 Session().flush()
160 160
161 161 user_group_name = form_result['users_group_name']
162 162 action_logger(c.rhodecode_user,
163 163 'admin_created_users_group:%s' % user_group_name,
164 164 None, self.ip_addr, self.sa)
165 165 user_group_link = h.link_to(h.escape(user_group_name),
166 166 url('edit_users_group',
167 167 user_group_id=user_group.users_group_id))
168 168 h.flash(h.literal(_('Created user group %(user_group_link)s')
169 169 % {'user_group_link': user_group_link}),
170 170 category='success')
171 171 Session().commit()
172 172 except formencode.Invalid as errors:
173 173 return htmlfill.render(
174 174 render('admin/user_groups/user_group_add.html'),
175 175 defaults=errors.value,
176 176 errors=errors.error_dict or {},
177 177 prefix_error=False,
178 178 encoding="UTF-8",
179 179 force_defaults=False)
180 180 except Exception:
181 181 log.exception("Exception creating user group")
182 182 h.flash(_('Error occurred during creation of user group %s') \
183 183 % request.POST.get('users_group_name'), category='error')
184 184
185 185 return redirect(
186 186 url('edit_users_group', user_group_id=user_group.users_group_id))
187 187
188 188 @HasPermissionAnyDecorator('hg.admin', 'hg.usergroup.create.true')
189 189 def new(self):
190 190 """GET /user_groups/new: Form to create a new item"""
191 191 # url('new_users_group')
192 192 return render('admin/user_groups/user_group_add.html')
193 193
194 194 @HasUserGroupPermissionAnyDecorator('usergroup.admin')
195 195 @auth.CSRFRequired()
196 196 def update(self, user_group_id):
197 197 """PUT /user_groups/user_group_id: Update an existing item"""
198 198 # Forms posted to this method should contain a hidden field:
199 199 # <input type="hidden" name="_method" value="PUT" />
200 200 # Or using helpers:
201 201 # h.form(url('users_group', user_group_id=ID),
202 202 # method='put')
203 203 # url('users_group', user_group_id=ID)
204 204
205 205 user_group_id = safe_int(user_group_id)
206 206 c.user_group = UserGroup.get_or_404(user_group_id)
207 207 c.active = 'settings'
208 208 self.__load_data(user_group_id)
209 209
210 210 available_members = [safe_unicode(x[0]) for x in c.available_members]
211 211
212 212 users_group_form = UserGroupForm(
213 213 edit=True, old_data=c.user_group.get_dict(),
214 214 available_members=available_members, allow_disabled=True)()
215 215
216 216 try:
217 217 form_result = users_group_form.to_python(request.POST)
218 218 UserGroupModel().update(c.user_group, form_result)
219 219 gr = form_result['users_group_name']
220 220 action_logger(c.rhodecode_user,
221 221 'admin_updated_users_group:%s' % gr,
222 222 None, self.ip_addr, self.sa)
223 223 h.flash(_('Updated user group %s') % gr, category='success')
224 224 Session().commit()
225 225 except formencode.Invalid as errors:
226 226 defaults = errors.value
227 227 e = errors.error_dict or {}
228 228
229 229 return htmlfill.render(
230 230 render('admin/user_groups/user_group_edit.html'),
231 231 defaults=defaults,
232 232 errors=e,
233 233 prefix_error=False,
234 234 encoding="UTF-8",
235 235 force_defaults=False)
236 236 except Exception:
237 237 log.exception("Exception during update of user group")
238 238 h.flash(_('Error occurred during update of user group %s')
239 239 % request.POST.get('users_group_name'), category='error')
240 240
241 241 return redirect(url('edit_users_group', user_group_id=user_group_id))
242 242
243 243 @HasUserGroupPermissionAnyDecorator('usergroup.admin')
244 244 @auth.CSRFRequired()
245 245 def delete(self, user_group_id):
246 246 """DELETE /user_groups/user_group_id: Delete an existing item"""
247 247 # Forms posted to this method should contain a hidden field:
248 248 # <input type="hidden" name="_method" value="DELETE" />
249 249 # Or using helpers:
250 250 # h.form(url('users_group', user_group_id=ID),
251 251 # method='delete')
252 252 # url('users_group', user_group_id=ID)
253 253 user_group_id = safe_int(user_group_id)
254 254 c.user_group = UserGroup.get_or_404(user_group_id)
255 255 force = str2bool(request.POST.get('force'))
256 256
257 257 try:
258 258 UserGroupModel().delete(c.user_group, force=force)
259 259 Session().commit()
260 260 h.flash(_('Successfully deleted user group'), category='success')
261 261 except UserGroupAssignedException as e:
262 262 h.flash(str(e), category='error')
263 263 except Exception:
264 264 log.exception("Exception during deletion of user group")
265 265 h.flash(_('An error occurred during deletion of user group'),
266 266 category='error')
267 267 return redirect(url('users_groups'))
268 268
269 269 @HasUserGroupPermissionAnyDecorator('usergroup.admin')
270 270 def edit(self, user_group_id):
271 271 """GET /user_groups/user_group_id/edit: Form to edit an existing item"""
272 272 # url('edit_users_group', user_group_id=ID)
273 273
274 274 user_group_id = safe_int(user_group_id)
275 275 c.user_group = UserGroup.get_or_404(user_group_id)
276 276 c.active = 'settings'
277 277 self.__load_data(user_group_id)
278 278
279 279 defaults = self.__load_defaults(user_group_id)
280 280
281 281 return htmlfill.render(
282 282 render('admin/user_groups/user_group_edit.html'),
283 283 defaults=defaults,
284 284 encoding="UTF-8",
285 285 force_defaults=False
286 286 )
287 287
288 288 @HasUserGroupPermissionAnyDecorator('usergroup.admin')
289 289 def edit_perms(self, user_group_id):
290 290 user_group_id = safe_int(user_group_id)
291 291 c.user_group = UserGroup.get_or_404(user_group_id)
292 292 c.active = 'perms'
293 293
294 294 defaults = {}
295 295 # fill user group users
296 296 for p in c.user_group.user_user_group_to_perm:
297 297 defaults.update({'u_perm_%s' % p.user.user_id:
298 298 p.permission.permission_name})
299 299
300 300 for p in c.user_group.user_group_user_group_to_perm:
301 301 defaults.update({'g_perm_%s' % p.user_group.users_group_id:
302 302 p.permission.permission_name})
303 303
304 304 return htmlfill.render(
305 305 render('admin/user_groups/user_group_edit.html'),
306 306 defaults=defaults,
307 307 encoding="UTF-8",
308 308 force_defaults=False
309 309 )
310 310
311 311 @HasUserGroupPermissionAnyDecorator('usergroup.admin')
312 312 @auth.CSRFRequired()
313 313 def update_perms(self, user_group_id):
314 314 """
315 315 grant permission for given usergroup
316 316
317 317 :param user_group_id:
318 318 """
319 319 user_group_id = safe_int(user_group_id)
320 320 c.user_group = UserGroup.get_or_404(user_group_id)
321 321 form = UserGroupPermsForm()().to_python(request.POST)
322 322
323 323 if not c.rhodecode_user.is_admin:
324 324 if self._revoke_perms_on_yourself(form):
325 325 msg = _('Cannot change permission for yourself as admin')
326 326 h.flash(msg, category='warning')
327 327 return redirect(url('edit_user_group_perms', user_group_id=user_group_id))
328 328
329 329 try:
330 330 UserGroupModel().update_permissions(user_group_id,
331 331 form['perm_additions'], form['perm_updates'], form['perm_deletions'])
332 332 except RepoGroupAssignmentError:
333 333 h.flash(_('Target group cannot be the same'), category='error')
334 334 return redirect(url('edit_user_group_perms', user_group_id=user_group_id))
335 335 #TODO: implement this
336 336 #action_logger(c.rhodecode_user, 'admin_changed_repo_permissions',
337 337 # repo_name, self.ip_addr, self.sa)
338 338 Session().commit()
339 339 h.flash(_('User Group permissions updated'), category='success')
340 340 return redirect(url('edit_user_group_perms', user_group_id=user_group_id))
341 341
342 342 @HasUserGroupPermissionAnyDecorator('usergroup.admin')
343 343 def edit_perms_summary(self, user_group_id):
344 344 user_group_id = safe_int(user_group_id)
345 345 c.user_group = UserGroup.get_or_404(user_group_id)
346 346 c.active = 'perms_summary'
347 347 permissions = {
348 348 'repositories': {},
349 349 'repositories_groups': {},
350 350 }
351 351 ugroup_repo_perms = UserGroupRepoToPerm.query()\
352 352 .options(joinedload(UserGroupRepoToPerm.permission))\
353 353 .options(joinedload(UserGroupRepoToPerm.repository))\
354 354 .filter(UserGroupRepoToPerm.users_group_id == user_group_id)\
355 355 .all()
356 356
357 357 for gr in ugroup_repo_perms:
358 358 permissions['repositories'][gr.repository.repo_name] \
359 359 = gr.permission.permission_name
360 360
361 361 ugroup_group_perms = UserGroupRepoGroupToPerm.query()\
362 362 .options(joinedload(UserGroupRepoGroupToPerm.permission))\
363 363 .options(joinedload(UserGroupRepoGroupToPerm.group))\
364 364 .filter(UserGroupRepoGroupToPerm.users_group_id == user_group_id)\
365 365 .all()
366 366
367 367 for gr in ugroup_group_perms:
368 368 permissions['repositories_groups'][gr.group.group_name] \
369 369 = gr.permission.permission_name
370 370 c.permissions = permissions
371 371 return render('admin/user_groups/user_group_edit.html')
372 372
373 373 @HasUserGroupPermissionAnyDecorator('usergroup.admin')
374 374 def edit_global_perms(self, user_group_id):
375 375 user_group_id = safe_int(user_group_id)
376 376 c.user_group = UserGroup.get_or_404(user_group_id)
377 377 c.active = 'global_perms'
378 378
379 379 c.default_user = User.get_default_user()
380 380 defaults = c.user_group.get_dict()
381 381 defaults.update(c.default_user.get_default_perms(suffix='_inherited'))
382 382 defaults.update(c.user_group.get_default_perms())
383 383
384 384 return htmlfill.render(
385 385 render('admin/user_groups/user_group_edit.html'),
386 386 defaults=defaults,
387 387 encoding="UTF-8",
388 388 force_defaults=False
389 389 )
390 390
391 391 @HasUserGroupPermissionAnyDecorator('usergroup.admin')
392 392 @auth.CSRFRequired()
393 393 def update_global_perms(self, user_group_id):
394 394 """PUT /users_perm/user_group_id: Update an existing item"""
395 395 # url('users_group_perm', user_group_id=ID, method='put')
396 396 user_group_id = safe_int(user_group_id)
397 397 user_group = UserGroup.get_or_404(user_group_id)
398 398 c.active = 'global_perms'
399 399
400 400 try:
401 401 # first stage that verifies the checkbox
402 402 _form = UserIndividualPermissionsForm()
403 403 form_result = _form.to_python(dict(request.POST))
404 404 inherit_perms = form_result['inherit_default_permissions']
405 405 user_group.inherit_default_permissions = inherit_perms
406 406 Session().add(user_group)
407 407
408 408 if not inherit_perms:
409 409 # only update the individual ones if we un check the flag
410 410 _form = UserPermissionsForm(
411 411 [x[0] for x in c.repo_create_choices],
412 412 [x[0] for x in c.repo_create_on_write_choices],
413 413 [x[0] for x in c.repo_group_create_choices],
414 414 [x[0] for x in c.user_group_create_choices],
415 415 [x[0] for x in c.fork_choices],
416 416 [x[0] for x in c.inherit_default_permission_choices])()
417 417
418 418 form_result = _form.to_python(dict(request.POST))
419 419 form_result.update({'perm_user_group_id': user_group.users_group_id})
420 420
421 421 PermissionModel().update_user_group_permissions(form_result)
422 422
423 423 Session().commit()
424 424 h.flash(_('User Group global permissions updated successfully'),
425 425 category='success')
426 426
427 427 except formencode.Invalid as errors:
428 428 defaults = errors.value
429 429 c.user_group = user_group
430 430 return htmlfill.render(
431 431 render('admin/user_groups/user_group_edit.html'),
432 432 defaults=defaults,
433 433 errors=errors.error_dict or {},
434 434 prefix_error=False,
435 435 encoding="UTF-8",
436 436 force_defaults=False)
437 437
438 438 except Exception:
439 439 log.exception("Exception during permissions saving")
440 440 h.flash(_('An error occurred during permissions saving'),
441 441 category='error')
442 442
443 443 return redirect(url('edit_user_group_global_perms', user_group_id=user_group_id))
444 444
445 445 @HasUserGroupPermissionAnyDecorator('usergroup.admin')
446 446 def edit_advanced(self, user_group_id):
447 447 user_group_id = safe_int(user_group_id)
448 448 c.user_group = UserGroup.get_or_404(user_group_id)
449 449 c.active = 'advanced'
450 450 c.group_members_obj = sorted(
451 451 (x.user for x in c.user_group.members),
452 452 key=lambda u: u.username.lower())
453 453
454 454 c.group_to_repos = sorted(
455 455 (x.repository for x in c.user_group.users_group_repo_to_perm),
456 456 key=lambda u: u.repo_name.lower())
457 457
458 458 c.group_to_repo_groups = sorted(
459 459 (x.group for x in c.user_group.users_group_repo_group_to_perm),
460 460 key=lambda u: u.group_name.lower())
461 461
462 462 return render('admin/user_groups/user_group_edit.html')
463 463
464 464 @HasUserGroupPermissionAnyDecorator('usergroup.admin')
465 465 def edit_members(self, user_group_id):
466 466 user_group_id = safe_int(user_group_id)
467 467 c.user_group = UserGroup.get_or_404(user_group_id)
468 468 c.active = 'members'
469 469 c.group_members_obj = sorted((x.user for x in c.user_group.members),
470 470 key=lambda u: u.username.lower())
471 471
472 472 group_members = [(x.user_id, x.username) for x in c.group_members_obj]
473 473
474 474 if request.is_xhr:
475 475 return jsonify(lambda *a, **k: {
476 476 'members': group_members
477 477 })
478 478
479 479 c.group_members = group_members
480 480 return render('admin/user_groups/user_group_edit.html')
@@ -1,719 +1,719 b''
1 1 # -*- coding: utf-8 -*-
2 2
3 3 # Copyright (C) 2010-2016 RhodeCode GmbH
4 4 #
5 5 # This program is free software: you can redistribute it and/or modify
6 6 # it under the terms of the GNU Affero General Public License, version 3
7 7 # (only), as published by the Free Software Foundation.
8 8 #
9 9 # This program is distributed in the hope that it will be useful,
10 10 # but WITHOUT ANY WARRANTY; without even the implied warranty of
11 11 # MERCHANTABILITY or FITNESS FOR A PARTICULAR PURPOSE. See the
12 12 # GNU General Public License for more details.
13 13 #
14 14 # You should have received a copy of the GNU Affero General Public License
15 15 # along with this program. If not, see <http://www.gnu.org/licenses/>.
16 16 #
17 17 # This program is dual-licensed. If you wish to learn more about the
18 18 # RhodeCode Enterprise Edition, including its added features, Support services,
19 19 # and proprietary license terms, please see https://rhodecode.com/licenses/
20 20
21 21 """
22 22 Users crud controller for pylons
23 23 """
24 24
25 25 import logging
26 26 import formencode
27 27
28 28 from formencode import htmlfill
29 29 from pylons import request, tmpl_context as c, url, config
30 30 from pylons.controllers.util import redirect
31 31 from pylons.i18n.translation import _
32 32
33 33 from rhodecode.authentication.plugins import auth_rhodecode
34 34 from rhodecode.lib.exceptions import (
35 35 DefaultUserException, UserOwnsReposException, UserOwnsRepoGroupsException,
36 36 UserOwnsUserGroupsException, UserCreationError)
37 37 from rhodecode.lib import helpers as h
38 38 from rhodecode.lib import auth
39 39 from rhodecode.lib.auth import (
40 40 LoginRequired, HasPermissionAllDecorator, AuthUser, generate_auth_token)
41 41 from rhodecode.lib.base import BaseController, render
42 42 from rhodecode.model.auth_token import AuthTokenModel
43 43
44 44 from rhodecode.model.db import (
45 45 PullRequestReviewers, User, UserEmailMap, UserIpMap, RepoGroup)
46 46 from rhodecode.model.forms import (
47 47 UserForm, UserPermissionsForm, UserIndividualPermissionsForm)
48 48 from rhodecode.model.user import UserModel
49 49 from rhodecode.model.meta import Session
50 50 from rhodecode.model.permission import PermissionModel
51 51 from rhodecode.lib.utils import action_logger
52 52 from rhodecode.lib.ext_json import json
53 53 from rhodecode.lib.utils2 import datetime_to_time, safe_int
54 54
55 55 log = logging.getLogger(__name__)
56 56
57 57
58 58 class UsersController(BaseController):
59 59 """REST Controller styled on the Atom Publishing Protocol"""
60 60
61 61 @LoginRequired()
62 62 def __before__(self):
63 63 super(UsersController, self).__before__()
64 64 c.available_permissions = config['available_permissions']
65 65 c.allowed_languages = [
66 66 ('en', 'English (en)'),
67 67 ('de', 'German (de)'),
68 68 ('fr', 'French (fr)'),
69 69 ('it', 'Italian (it)'),
70 70 ('ja', 'Japanese (ja)'),
71 71 ('pl', 'Polish (pl)'),
72 72 ('pt', 'Portuguese (pt)'),
73 73 ('ru', 'Russian (ru)'),
74 74 ('zh', 'Chinese (zh)'),
75 75 ]
76 76 PermissionModel().set_global_permission_choices(c, translator=_)
77 77
78 78 @HasPermissionAllDecorator('hg.admin')
79 79 def index(self):
80 80 """GET /users: All items in the collection"""
81 81 # url('users')
82 82
83 83 from rhodecode.lib.utils import PartialRenderer
84 84 _render = PartialRenderer('data_table/_dt_elements.html')
85 85
86 86 def grav_tmpl(user_email, size):
87 87 return _render("user_gravatar", user_email, size)
88 88
89 89 def username(user_id, username):
90 90 return _render("user_name", user_id, username)
91 91
92 92 def user_actions(user_id, username):
93 93 return _render("user_actions", user_id, username)
94 94
95 95 # json generate
96 96 c.users_list = User.query()\
97 97 .filter(User.username != User.DEFAULT_USER) \
98 98 .all()
99 99
100 100 users_data = []
101 101 for user in c.users_list:
102 102 users_data.append({
103 103 "gravatar": grav_tmpl(user.email, 20),
104 104 "username": h.link_to(
105 105 user.username, h.url('user_profile', username=user.username)),
106 106 "username_raw": user.username,
107 107 "email": user.email,
108 108 "first_name": h.escape(user.name),
109 109 "last_name": h.escape(user.lastname),
110 110 "last_login": h.format_date(user.last_login),
111 111 "last_login_raw": datetime_to_time(user.last_login),
112 112 "last_activity": h.format_date(
113 113 h.time_to_datetime(user.user_data.get('last_activity', 0))),
114 114 "last_activity_raw": user.user_data.get('last_activity', 0),
115 115 "active": h.bool2icon(user.active),
116 116 "active_raw": user.active,
117 117 "admin": h.bool2icon(user.admin),
118 118 "admin_raw": user.admin,
119 119 "extern_type": user.extern_type,
120 120 "extern_name": user.extern_name,
121 121 "action": user_actions(user.user_id, user.username),
122 122 })
123 123
124 124
125 125 c.data = json.dumps(users_data)
126 126 return render('admin/users/users.html')
127 127
128 128 @HasPermissionAllDecorator('hg.admin')
129 129 @auth.CSRFRequired()
130 130 def create(self):
131 131 """POST /users: Create a new item"""
132 132 # url('users')
133 133 c.default_extern_type = auth_rhodecode.RhodeCodeAuthPlugin.name
134 134 user_model = UserModel()
135 135 user_form = UserForm()()
136 136 try:
137 137 form_result = user_form.to_python(dict(request.POST))
138 138 user = user_model.create(form_result)
139 139 Session().flush()
140 140 username = form_result['username']
141 141 action_logger(c.rhodecode_user, 'admin_created_user:%s' % username,
142 142 None, self.ip_addr, self.sa)
143 143
144 144 user_link = h.link_to(h.escape(username),
145 145 url('edit_user',
146 146 user_id=user.user_id))
147 147 h.flash(h.literal(_('Created user %(user_link)s')
148 148 % {'user_link': user_link}), category='success')
149 149 Session().commit()
150 150 except formencode.Invalid as errors:
151 151 return htmlfill.render(
152 152 render('admin/users/user_add.html'),
153 153 defaults=errors.value,
154 154 errors=errors.error_dict or {},
155 155 prefix_error=False,
156 156 encoding="UTF-8",
157 157 force_defaults=False)
158 158 except UserCreationError as e:
159 159 h.flash(e, 'error')
160 160 except Exception:
161 161 log.exception("Exception creation of user")
162 162 h.flash(_('Error occurred during creation of user %s')
163 163 % request.POST.get('username'), category='error')
164 164 return redirect(url('users'))
165 165
166 166 @HasPermissionAllDecorator('hg.admin')
167 167 def new(self):
168 168 """GET /users/new: Form to create a new item"""
169 169 # url('new_user')
170 170 c.default_extern_type = auth_rhodecode.RhodeCodeAuthPlugin.name
171 171 return render('admin/users/user_add.html')
172 172
173 173 @HasPermissionAllDecorator('hg.admin')
174 174 @auth.CSRFRequired()
175 175 def update(self, user_id):
176 176 """PUT /users/user_id: Update an existing item"""
177 177 # Forms posted to this method should contain a hidden field:
178 178 # <input type="hidden" name="_method" value="PUT" />
179 179 # Or using helpers:
180 180 # h.form(url('update_user', user_id=ID),
181 181 # method='put')
182 182 # url('user', user_id=ID)
183 183 user_id = safe_int(user_id)
184 184 c.user = User.get_or_404(user_id)
185 185 c.active = 'profile'
186 186 c.extern_type = c.user.extern_type
187 187 c.extern_name = c.user.extern_name
188 188 c.perm_user = AuthUser(user_id=user_id, ip_addr=self.ip_addr)
189 189 available_languages = [x[0] for x in c.allowed_languages]
190 190 _form = UserForm(edit=True, available_languages=available_languages,
191 191 old_data={'user_id': user_id,
192 192 'email': c.user.email})()
193 193 form_result = {}
194 194 try:
195 195 form_result = _form.to_python(dict(request.POST))
196 196 skip_attrs = ['extern_type', 'extern_name']
197 197 # TODO: plugin should define if username can be updated
198 198 if c.extern_type != "rhodecode":
199 199 # forbid updating username for external accounts
200 200 skip_attrs.append('username')
201 201
202 202 UserModel().update_user(user_id, skip_attrs=skip_attrs, **form_result)
203 203 usr = form_result['username']
204 204 action_logger(c.rhodecode_user, 'admin_updated_user:%s' % usr,
205 205 None, self.ip_addr, self.sa)
206 206 h.flash(_('User updated successfully'), category='success')
207 207 Session().commit()
208 208 except formencode.Invalid as errors:
209 209 defaults = errors.value
210 210 e = errors.error_dict or {}
211 211
212 212 return htmlfill.render(
213 213 render('admin/users/user_edit.html'),
214 214 defaults=defaults,
215 215 errors=e,
216 216 prefix_error=False,
217 217 encoding="UTF-8",
218 218 force_defaults=False)
219 219 except UserCreationError as e:
220 220 h.flash(e, 'error')
221 221 except Exception:
222 222 log.exception("Exception updating user")
223 223 h.flash(_('Error occurred during update of user %s')
224 224 % form_result.get('username'), category='error')
225 225 return redirect(url('edit_user', user_id=user_id))
226 226
227 227 @HasPermissionAllDecorator('hg.admin')
228 228 @auth.CSRFRequired()
229 229 def delete(self, user_id):
230 230 """DELETE /users/user_id: Delete an existing item"""
231 231 # Forms posted to this method should contain a hidden field:
232 232 # <input type="hidden" name="_method" value="DELETE" />
233 233 # Or using helpers:
234 234 # h.form(url('delete_user', user_id=ID),
235 235 # method='delete')
236 236 # url('user', user_id=ID)
237 237 user_id = safe_int(user_id)
238 238 c.user = User.get_or_404(user_id)
239 239
240 240 _repos = c.user.repositories
241 241 _repo_groups = c.user.repository_groups
242 242 _user_groups = c.user.user_groups
243 243
244 244 handle_repos = None
245 245 handle_repo_groups = None
246 246 handle_user_groups = None
247 247 # dummy call for flash of handle
248 248 set_handle_flash_repos = lambda: None
249 249 set_handle_flash_repo_groups = lambda: None
250 250 set_handle_flash_user_groups = lambda: None
251 251
252 252 if _repos and request.POST.get('user_repos'):
253 253 do = request.POST['user_repos']
254 254 if do == 'detach':
255 255 handle_repos = 'detach'
256 256 set_handle_flash_repos = lambda: h.flash(
257 257 _('Detached %s repositories') % len(_repos),
258 258 category='success')
259 259 elif do == 'delete':
260 260 handle_repos = 'delete'
261 261 set_handle_flash_repos = lambda: h.flash(
262 262 _('Deleted %s repositories') % len(_repos),
263 263 category='success')
264 264
265 265 if _repo_groups and request.POST.get('user_repo_groups'):
266 266 do = request.POST['user_repo_groups']
267 267 if do == 'detach':
268 268 handle_repo_groups = 'detach'
269 269 set_handle_flash_repo_groups = lambda: h.flash(
270 270 _('Detached %s repository groups') % len(_repo_groups),
271 271 category='success')
272 272 elif do == 'delete':
273 273 handle_repo_groups = 'delete'
274 274 set_handle_flash_repo_groups = lambda: h.flash(
275 275 _('Deleted %s repository groups') % len(_repo_groups),
276 276 category='success')
277 277
278 278 if _user_groups and request.POST.get('user_user_groups'):
279 279 do = request.POST['user_user_groups']
280 280 if do == 'detach':
281 281 handle_user_groups = 'detach'
282 282 set_handle_flash_user_groups = lambda: h.flash(
283 283 _('Detached %s user groups') % len(_user_groups),
284 284 category='success')
285 285 elif do == 'delete':
286 286 handle_user_groups = 'delete'
287 287 set_handle_flash_user_groups = lambda: h.flash(
288 288 _('Deleted %s user groups') % len(_user_groups),
289 289 category='success')
290 290
291 291 try:
292 292 UserModel().delete(c.user, handle_repos=handle_repos,
293 293 handle_repo_groups=handle_repo_groups,
294 294 handle_user_groups=handle_user_groups)
295 295 Session().commit()
296 296 set_handle_flash_repos()
297 297 set_handle_flash_repo_groups()
298 298 set_handle_flash_user_groups()
299 299 h.flash(_('Successfully deleted user'), category='success')
300 300 except (UserOwnsReposException, UserOwnsRepoGroupsException,
301 301 UserOwnsUserGroupsException, DefaultUserException) as e:
302 302 h.flash(e, category='warning')
303 303 except Exception:
304 304 log.exception("Exception during deletion of user")
305 305 h.flash(_('An error occurred during deletion of user'),
306 306 category='error')
307 307 return redirect(url('users'))
308 308
309 309 @HasPermissionAllDecorator('hg.admin')
310 310 @auth.CSRFRequired()
311 311 def reset_password(self, user_id):
312 312 """
313 313 toggle reset password flag for this user
314 314
315 315 :param user_id:
316 316 """
317 317 user_id = safe_int(user_id)
318 318 c.user = User.get_or_404(user_id)
319 319 try:
320 320 old_value = c.user.user_data.get('force_password_change')
321 321 c.user.update_userdata(force_password_change=not old_value)
322 322 Session().commit()
323 323 if old_value:
324 324 msg = _('Force password change disabled for user')
325 325 else:
326 326 msg = _('Force password change enabled for user')
327 327 h.flash(msg, category='success')
328 328 except Exception:
329 329 log.exception("Exception during password reset for user")
330 330 h.flash(_('An error occurred during password reset for user'),
331 331 category='error')
332 332
333 333 return redirect(url('edit_user_advanced', user_id=user_id))
334 334
335 335 @HasPermissionAllDecorator('hg.admin')
336 336 @auth.CSRFRequired()
337 337 def create_personal_repo_group(self, user_id):
338 338 """
339 339 Create personal repository group for this user
340 340
341 341 :param user_id:
342 342 """
343 343 from rhodecode.model.repo_group import RepoGroupModel
344 344
345 345 user_id = safe_int(user_id)
346 346 c.user = User.get_or_404(user_id)
347 347
348 348 try:
349 349 desc = RepoGroupModel.PERSONAL_GROUP_DESC % {
350 350 'username': c.user.username}
351 351 if not RepoGroup.get_by_group_name(c.user.username):
352 352 RepoGroupModel().create(group_name=c.user.username,
353 353 group_description=desc,
354 354 owner=c.user.username)
355 355
356 356 msg = _('Created repository group `%s`' % (c.user.username,))
357 357 h.flash(msg, category='success')
358 358 except Exception:
359 359 log.exception("Exception during repository group creation")
360 360 msg = _(
361 361 'An error occurred during repository group creation for user')
362 362 h.flash(msg, category='error')
363 363
364 364 return redirect(url('edit_user_advanced', user_id=user_id))
365 365
366 366 @HasPermissionAllDecorator('hg.admin')
367 367 def show(self, user_id):
368 368 """GET /users/user_id: Show a specific item"""
369 369 # url('user', user_id=ID)
370 370 User.get_or_404(-1)
371 371
372 372 @HasPermissionAllDecorator('hg.admin')
373 373 def edit(self, user_id):
374 374 """GET /users/user_id/edit: Form to edit an existing item"""
375 375 # url('edit_user', user_id=ID)
376 376 user_id = safe_int(user_id)
377 377 c.user = User.get_or_404(user_id)
378 378 if c.user.username == User.DEFAULT_USER:
379 379 h.flash(_("You can't edit this user"), category='warning')
380 380 return redirect(url('users'))
381 381
382 382 c.active = 'profile'
383 383 c.extern_type = c.user.extern_type
384 384 c.extern_name = c.user.extern_name
385 385 c.perm_user = AuthUser(user_id=user_id, ip_addr=self.ip_addr)
386 386
387 387 defaults = c.user.get_dict()
388 388 defaults.update({'language': c.user.user_data.get('language')})
389 389 return htmlfill.render(
390 390 render('admin/users/user_edit.html'),
391 391 defaults=defaults,
392 392 encoding="UTF-8",
393 393 force_defaults=False)
394 394
395 395 @HasPermissionAllDecorator('hg.admin')
396 396 def edit_advanced(self, user_id):
397 397 user_id = safe_int(user_id)
398 398 user = c.user = User.get_or_404(user_id)
399 399 if user.username == User.DEFAULT_USER:
400 400 h.flash(_("You can't edit this user"), category='warning')
401 401 return redirect(url('users'))
402 402
403 403 c.active = 'advanced'
404 404 c.perm_user = AuthUser(user_id=user_id, ip_addr=self.ip_addr)
405 405 c.personal_repo_group = RepoGroup.get_by_group_name(user.username)
406 c.first_admin = User.get_first_admin()
406 c.first_admin = User.get_first_super_admin()
407 407 defaults = user.get_dict()
408 408
409 409 # Interim workaround if the user participated on any pull requests as a
410 410 # reviewer.
411 411 has_review = bool(PullRequestReviewers.query().filter(
412 412 PullRequestReviewers.user_id == user_id).first())
413 413 c.can_delete_user = not has_review
414 414 c.can_delete_user_message = _(
415 415 'The user participates as reviewer in pull requests and '
416 416 'cannot be deleted. You can set the user to '
417 417 '"inactive" instead of deleting it.') if has_review else ''
418 418
419 419 return htmlfill.render(
420 420 render('admin/users/user_edit.html'),
421 421 defaults=defaults,
422 422 encoding="UTF-8",
423 423 force_defaults=False)
424 424
425 425 @HasPermissionAllDecorator('hg.admin')
426 426 def edit_auth_tokens(self, user_id):
427 427 user_id = safe_int(user_id)
428 428 c.user = User.get_or_404(user_id)
429 429 if c.user.username == User.DEFAULT_USER:
430 430 h.flash(_("You can't edit this user"), category='warning')
431 431 return redirect(url('users'))
432 432
433 433 c.active = 'auth_tokens'
434 434 show_expired = True
435 435 c.lifetime_values = [
436 436 (str(-1), _('forever')),
437 437 (str(5), _('5 minutes')),
438 438 (str(60), _('1 hour')),
439 439 (str(60 * 24), _('1 day')),
440 440 (str(60 * 24 * 30), _('1 month')),
441 441 ]
442 442 c.lifetime_options = [(c.lifetime_values, _("Lifetime"))]
443 443 c.role_values = [(x, AuthTokenModel.cls._get_role_name(x))
444 444 for x in AuthTokenModel.cls.ROLES]
445 445 c.role_options = [(c.role_values, _("Role"))]
446 446 c.user_auth_tokens = AuthTokenModel().get_auth_tokens(
447 447 c.user.user_id, show_expired=show_expired)
448 448 defaults = c.user.get_dict()
449 449 return htmlfill.render(
450 450 render('admin/users/user_edit.html'),
451 451 defaults=defaults,
452 452 encoding="UTF-8",
453 453 force_defaults=False)
454 454
455 455 @HasPermissionAllDecorator('hg.admin')
456 456 @auth.CSRFRequired()
457 457 def add_auth_token(self, user_id):
458 458 user_id = safe_int(user_id)
459 459 c.user = User.get_or_404(user_id)
460 460 if c.user.username == User.DEFAULT_USER:
461 461 h.flash(_("You can't edit this user"), category='warning')
462 462 return redirect(url('users'))
463 463
464 464 lifetime = safe_int(request.POST.get('lifetime'), -1)
465 465 description = request.POST.get('description')
466 466 role = request.POST.get('role')
467 467 AuthTokenModel().create(c.user.user_id, description, lifetime, role)
468 468 Session().commit()
469 469 h.flash(_("Auth token successfully created"), category='success')
470 470 return redirect(url('edit_user_auth_tokens', user_id=c.user.user_id))
471 471
472 472 @HasPermissionAllDecorator('hg.admin')
473 473 @auth.CSRFRequired()
474 474 def delete_auth_token(self, user_id):
475 475 user_id = safe_int(user_id)
476 476 c.user = User.get_or_404(user_id)
477 477 if c.user.username == User.DEFAULT_USER:
478 478 h.flash(_("You can't edit this user"), category='warning')
479 479 return redirect(url('users'))
480 480
481 481 auth_token = request.POST.get('del_auth_token')
482 482 if request.POST.get('del_auth_token_builtin'):
483 483 user = User.get(c.user.user_id)
484 484 if user:
485 485 user.api_key = generate_auth_token(user.username)
486 486 Session().add(user)
487 487 Session().commit()
488 488 h.flash(_("Auth token successfully reset"), category='success')
489 489 elif auth_token:
490 490 AuthTokenModel().delete(auth_token, c.user.user_id)
491 491 Session().commit()
492 492 h.flash(_("Auth token successfully deleted"), category='success')
493 493
494 494 return redirect(url('edit_user_auth_tokens', user_id=c.user.user_id))
495 495
496 496 @HasPermissionAllDecorator('hg.admin')
497 497 def edit_global_perms(self, user_id):
498 498 user_id = safe_int(user_id)
499 499 c.user = User.get_or_404(user_id)
500 500 if c.user.username == User.DEFAULT_USER:
501 501 h.flash(_("You can't edit this user"), category='warning')
502 502 return redirect(url('users'))
503 503
504 504 c.active = 'global_perms'
505 505
506 506 c.default_user = User.get_default_user()
507 507 defaults = c.user.get_dict()
508 508 defaults.update(c.default_user.get_default_perms(suffix='_inherited'))
509 509 defaults.update(c.default_user.get_default_perms())
510 510 defaults.update(c.user.get_default_perms())
511 511
512 512 return htmlfill.render(
513 513 render('admin/users/user_edit.html'),
514 514 defaults=defaults,
515 515 encoding="UTF-8",
516 516 force_defaults=False)
517 517
518 518 @HasPermissionAllDecorator('hg.admin')
519 519 @auth.CSRFRequired()
520 520 def update_global_perms(self, user_id):
521 521 """PUT /users_perm/user_id: Update an existing item"""
522 522 # url('user_perm', user_id=ID, method='put')
523 523 user_id = safe_int(user_id)
524 524 user = User.get_or_404(user_id)
525 525 c.active = 'global_perms'
526 526 try:
527 527 # first stage that verifies the checkbox
528 528 _form = UserIndividualPermissionsForm()
529 529 form_result = _form.to_python(dict(request.POST))
530 530 inherit_perms = form_result['inherit_default_permissions']
531 531 user.inherit_default_permissions = inherit_perms
532 532 Session().add(user)
533 533
534 534 if not inherit_perms:
535 535 # only update the individual ones if we un check the flag
536 536 _form = UserPermissionsForm(
537 537 [x[0] for x in c.repo_create_choices],
538 538 [x[0] for x in c.repo_create_on_write_choices],
539 539 [x[0] for x in c.repo_group_create_choices],
540 540 [x[0] for x in c.user_group_create_choices],
541 541 [x[0] for x in c.fork_choices],
542 542 [x[0] for x in c.inherit_default_permission_choices])()
543 543
544 544 form_result = _form.to_python(dict(request.POST))
545 545 form_result.update({'perm_user_id': user.user_id})
546 546
547 547 PermissionModel().update_user_permissions(form_result)
548 548
549 549 Session().commit()
550 550 h.flash(_('User global permissions updated successfully'),
551 551 category='success')
552 552
553 553 Session().commit()
554 554 except formencode.Invalid as errors:
555 555 defaults = errors.value
556 556 c.user = user
557 557 return htmlfill.render(
558 558 render('admin/users/user_edit.html'),
559 559 defaults=defaults,
560 560 errors=errors.error_dict or {},
561 561 prefix_error=False,
562 562 encoding="UTF-8",
563 563 force_defaults=False)
564 564 except Exception:
565 565 log.exception("Exception during permissions saving")
566 566 h.flash(_('An error occurred during permissions saving'),
567 567 category='error')
568 568 return redirect(url('edit_user_global_perms', user_id=user_id))
569 569
570 570 @HasPermissionAllDecorator('hg.admin')
571 571 def edit_perms_summary(self, user_id):
572 572 user_id = safe_int(user_id)
573 573 c.user = User.get_or_404(user_id)
574 574 if c.user.username == User.DEFAULT_USER:
575 575 h.flash(_("You can't edit this user"), category='warning')
576 576 return redirect(url('users'))
577 577
578 578 c.active = 'perms_summary'
579 579 c.perm_user = AuthUser(user_id=user_id, ip_addr=self.ip_addr)
580 580
581 581 return render('admin/users/user_edit.html')
582 582
583 583 @HasPermissionAllDecorator('hg.admin')
584 584 def edit_emails(self, user_id):
585 585 user_id = safe_int(user_id)
586 586 c.user = User.get_or_404(user_id)
587 587 if c.user.username == User.DEFAULT_USER:
588 588 h.flash(_("You can't edit this user"), category='warning')
589 589 return redirect(url('users'))
590 590
591 591 c.active = 'emails'
592 592 c.user_email_map = UserEmailMap.query() \
593 593 .filter(UserEmailMap.user == c.user).all()
594 594
595 595 defaults = c.user.get_dict()
596 596 return htmlfill.render(
597 597 render('admin/users/user_edit.html'),
598 598 defaults=defaults,
599 599 encoding="UTF-8",
600 600 force_defaults=False)
601 601
602 602 @HasPermissionAllDecorator('hg.admin')
603 603 @auth.CSRFRequired()
604 604 def add_email(self, user_id):
605 605 """POST /user_emails:Add an existing item"""
606 606 # url('user_emails', user_id=ID, method='put')
607 607 user_id = safe_int(user_id)
608 608 c.user = User.get_or_404(user_id)
609 609
610 610 email = request.POST.get('new_email')
611 611 user_model = UserModel()
612 612
613 613 try:
614 614 user_model.add_extra_email(user_id, email)
615 615 Session().commit()
616 616 h.flash(_("Added new email address `%s` for user account") % email,
617 617 category='success')
618 618 except formencode.Invalid as error:
619 619 msg = error.error_dict['email']
620 620 h.flash(msg, category='error')
621 621 except Exception:
622 622 log.exception("Exception during email saving")
623 623 h.flash(_('An error occurred during email saving'),
624 624 category='error')
625 625 return redirect(url('edit_user_emails', user_id=user_id))
626 626
627 627 @HasPermissionAllDecorator('hg.admin')
628 628 @auth.CSRFRequired()
629 629 def delete_email(self, user_id):
630 630 """DELETE /user_emails_delete/user_id: Delete an existing item"""
631 631 # url('user_emails_delete', user_id=ID, method='delete')
632 632 user_id = safe_int(user_id)
633 633 c.user = User.get_or_404(user_id)
634 634 email_id = request.POST.get('del_email_id')
635 635 user_model = UserModel()
636 636 user_model.delete_extra_email(user_id, email_id)
637 637 Session().commit()
638 638 h.flash(_("Removed email address from user account"), category='success')
639 639 return redirect(url('edit_user_emails', user_id=user_id))
640 640
641 641 @HasPermissionAllDecorator('hg.admin')
642 642 def edit_ips(self, user_id):
643 643 user_id = safe_int(user_id)
644 644 c.user = User.get_or_404(user_id)
645 645 if c.user.username == User.DEFAULT_USER:
646 646 h.flash(_("You can't edit this user"), category='warning')
647 647 return redirect(url('users'))
648 648
649 649 c.active = 'ips'
650 650 c.user_ip_map = UserIpMap.query() \
651 651 .filter(UserIpMap.user == c.user).all()
652 652
653 653 c.inherit_default_ips = c.user.inherit_default_permissions
654 654 c.default_user_ip_map = UserIpMap.query() \
655 655 .filter(UserIpMap.user == User.get_default_user()).all()
656 656
657 657 defaults = c.user.get_dict()
658 658 return htmlfill.render(
659 659 render('admin/users/user_edit.html'),
660 660 defaults=defaults,
661 661 encoding="UTF-8",
662 662 force_defaults=False)
663 663
664 664 @HasPermissionAllDecorator('hg.admin')
665 665 @auth.CSRFRequired()
666 666 def add_ip(self, user_id):
667 667 """POST /user_ips:Add an existing item"""
668 668 # url('user_ips', user_id=ID, method='put')
669 669
670 670 user_id = safe_int(user_id)
671 671 c.user = User.get_or_404(user_id)
672 672 user_model = UserModel()
673 673 try:
674 674 ip_list = user_model.parse_ip_range(request.POST.get('new_ip'))
675 675 except Exception as e:
676 676 ip_list = []
677 677 log.exception("Exception during ip saving")
678 678 h.flash(_('An error occurred during ip saving:%s' % (e,)),
679 679 category='error')
680 680
681 681 desc = request.POST.get('description')
682 682 added = []
683 683 for ip in ip_list:
684 684 try:
685 685 user_model.add_extra_ip(user_id, ip, desc)
686 686 Session().commit()
687 687 added.append(ip)
688 688 except formencode.Invalid as error:
689 689 msg = error.error_dict['ip']
690 690 h.flash(msg, category='error')
691 691 except Exception:
692 692 log.exception("Exception during ip saving")
693 693 h.flash(_('An error occurred during ip saving'),
694 694 category='error')
695 695 if added:
696 696 h.flash(
697 697 _("Added ips %s to user whitelist") % (', '.join(ip_list), ),
698 698 category='success')
699 699 if 'default_user' in request.POST:
700 700 return redirect(url('admin_permissions_ips'))
701 701 return redirect(url('edit_user_ips', user_id=user_id))
702 702
703 703 @HasPermissionAllDecorator('hg.admin')
704 704 @auth.CSRFRequired()
705 705 def delete_ip(self, user_id):
706 706 """DELETE /user_ips_delete/user_id: Delete an existing item"""
707 707 # url('user_ips_delete', user_id=ID, method='delete')
708 708 user_id = safe_int(user_id)
709 709 c.user = User.get_or_404(user_id)
710 710
711 711 ip_id = request.POST.get('del_ip_id')
712 712 user_model = UserModel()
713 713 user_model.delete_extra_ip(user_id, ip_id)
714 714 Session().commit()
715 715 h.flash(_("Removed ip address from user whitelist"), category='success')
716 716
717 717 if 'default_user' in request.POST:
718 718 return redirect(url('admin_permissions_ips'))
719 719 return redirect(url('edit_user_ips', user_id=user_id))
@@ -1,977 +1,977 b''
1 1 # -*- coding: utf-8 -*-
2 2
3 3 # Copyright (C) 2010-2016 RhodeCode GmbH
4 4 #
5 5 # This program is free software: you can redistribute it and/or modify
6 6 # it under the terms of the GNU Affero General Public License, version 3
7 7 # (only), as published by the Free Software Foundation.
8 8 #
9 9 # This program is distributed in the hope that it will be useful,
10 10 # but WITHOUT ANY WARRANTY; without even the implied warranty of
11 11 # MERCHANTABILITY or FITNESS FOR A PARTICULAR PURPOSE. See the
12 12 # GNU General Public License for more details.
13 13 #
14 14 # You should have received a copy of the GNU Affero General Public License
15 15 # along with this program. If not, see <http://www.gnu.org/licenses/>.
16 16 #
17 17 # This program is dual-licensed. If you wish to learn more about the
18 18 # RhodeCode Enterprise Edition, including its added features, Support services,
19 19 # and proprietary license terms, please see https://rhodecode.com/licenses/
20 20
21 21 """
22 22 Utilities library for RhodeCode
23 23 """
24 24
25 25 import datetime
26 26 import decorator
27 27 import json
28 28 import logging
29 29 import os
30 30 import re
31 31 import shutil
32 32 import tempfile
33 33 import traceback
34 34 import tarfile
35 35 import warnings
36 36 from os.path import abspath
37 37 from os.path import dirname as dn, join as jn
38 38
39 39 import paste
40 40 import pkg_resources
41 41 from paste.script.command import Command, BadCommand
42 42 from webhelpers.text import collapse, remove_formatting, strip_tags
43 43 from mako import exceptions
44 44
45 45 from rhodecode.lib.fakemod import create_module
46 46 from rhodecode.lib.vcs.backends.base import Config
47 47 from rhodecode.lib.vcs.exceptions import VCSError
48 48 from rhodecode.lib.vcs.utils.helpers import get_scm, get_scm_backend
49 49 from rhodecode.lib.utils2 import (
50 50 safe_str, safe_unicode, get_current_rhodecode_user, md5)
51 51 from rhodecode.model import meta
52 52 from rhodecode.model.db import (
53 53 Repository, User, RhodeCodeUi, UserLog, RepoGroup, UserGroup)
54 54 from rhodecode.model.meta import Session
55 55
56 56
57 57 log = logging.getLogger(__name__)
58 58
59 59 REMOVED_REPO_PAT = re.compile(r'rm__\d{8}_\d{6}_\d{6}__.*')
60 60
61 61 _license_cache = None
62 62
63 63
64 64 def recursive_replace(str_, replace=' '):
65 65 """
66 66 Recursive replace of given sign to just one instance
67 67
68 68 :param str_: given string
69 69 :param replace: char to find and replace multiple instances
70 70
71 71 Examples::
72 72 >>> recursive_replace("Mighty---Mighty-Bo--sstones",'-')
73 73 'Mighty-Mighty-Bo-sstones'
74 74 """
75 75
76 76 if str_.find(replace * 2) == -1:
77 77 return str_
78 78 else:
79 79 str_ = str_.replace(replace * 2, replace)
80 80 return recursive_replace(str_, replace)
81 81
82 82
83 83 def repo_name_slug(value):
84 84 """
85 85 Return slug of name of repository
86 86 This function is called on each creation/modification
87 87 of repository to prevent bad names in repo
88 88 """
89 89
90 90 slug = remove_formatting(value)
91 91 slug = strip_tags(slug)
92 92
93 93 for c in """`?=[]\;'"<>,/~!@#$%^&*()+{}|: """:
94 94 slug = slug.replace(c, '-')
95 95 slug = recursive_replace(slug, '-')
96 96 slug = collapse(slug, '-')
97 97 return slug
98 98
99 99
100 100 #==============================================================================
101 101 # PERM DECORATOR HELPERS FOR EXTRACTING NAMES FOR PERM CHECKS
102 102 #==============================================================================
103 103 def get_repo_slug(request):
104 104 _repo = request.environ['pylons.routes_dict'].get('repo_name')
105 105 if _repo:
106 106 _repo = _repo.rstrip('/')
107 107 return _repo
108 108
109 109
110 110 def get_repo_group_slug(request):
111 111 _group = request.environ['pylons.routes_dict'].get('group_name')
112 112 if _group:
113 113 _group = _group.rstrip('/')
114 114 return _group
115 115
116 116
117 117 def get_user_group_slug(request):
118 118 _group = request.environ['pylons.routes_dict'].get('user_group_id')
119 119 try:
120 120 _group = UserGroup.get(_group)
121 121 if _group:
122 122 _group = _group.users_group_name
123 123 except Exception:
124 124 log.debug(traceback.format_exc())
125 125 #catch all failures here
126 126 pass
127 127
128 128 return _group
129 129
130 130
131 131 def action_logger(user, action, repo, ipaddr='', sa=None, commit=False):
132 132 """
133 133 Action logger for various actions made by users
134 134
135 135 :param user: user that made this action, can be a unique username string or
136 136 object containing user_id attribute
137 137 :param action: action to log, should be on of predefined unique actions for
138 138 easy translations
139 139 :param repo: string name of repository or object containing repo_id,
140 140 that action was made on
141 141 :param ipaddr: optional ip address from what the action was made
142 142 :param sa: optional sqlalchemy session
143 143
144 144 """
145 145
146 146 if not sa:
147 147 sa = meta.Session()
148 148 # if we don't get explicit IP address try to get one from registered user
149 149 # in tmpl context var
150 150 if not ipaddr:
151 151 ipaddr = getattr(get_current_rhodecode_user(), 'ip_addr', '')
152 152
153 153 try:
154 154 if getattr(user, 'user_id', None):
155 155 user_obj = User.get(user.user_id)
156 156 elif isinstance(user, basestring):
157 157 user_obj = User.get_by_username(user)
158 158 else:
159 159 raise Exception('You have to provide a user object or a username')
160 160
161 161 if getattr(repo, 'repo_id', None):
162 162 repo_obj = Repository.get(repo.repo_id)
163 163 repo_name = repo_obj.repo_name
164 164 elif isinstance(repo, basestring):
165 165 repo_name = repo.lstrip('/')
166 166 repo_obj = Repository.get_by_repo_name(repo_name)
167 167 else:
168 168 repo_obj = None
169 169 repo_name = ''
170 170
171 171 user_log = UserLog()
172 172 user_log.user_id = user_obj.user_id
173 173 user_log.username = user_obj.username
174 174 action = safe_unicode(action)
175 175 user_log.action = action[:1200000]
176 176
177 177 user_log.repository = repo_obj
178 178 user_log.repository_name = repo_name
179 179
180 180 user_log.action_date = datetime.datetime.now()
181 181 user_log.user_ip = ipaddr
182 182 sa.add(user_log)
183 183
184 184 log.info('Logging action:`%s` on repo:`%s` by user:%s ip:%s',
185 185 action, safe_unicode(repo), user_obj, ipaddr)
186 186 if commit:
187 187 sa.commit()
188 188 except Exception:
189 189 log.error(traceback.format_exc())
190 190 raise
191 191
192 192
193 193 def get_filesystem_repos(path, recursive=False, skip_removed_repos=True):
194 194 """
195 195 Scans given path for repos and return (name,(type,path)) tuple
196 196
197 197 :param path: path to scan for repositories
198 198 :param recursive: recursive search and return names with subdirs in front
199 199 """
200 200
201 201 # remove ending slash for better results
202 202 path = path.rstrip(os.sep)
203 203 log.debug('now scanning in %s location recursive:%s...', path, recursive)
204 204
205 205 def _get_repos(p):
206 206 dirpaths = _get_dirpaths(p)
207 207 if not _is_dir_writable(p):
208 208 log.warning('repo path without write access: %s', p)
209 209
210 210 for dirpath in dirpaths:
211 211 if os.path.isfile(os.path.join(p, dirpath)):
212 212 continue
213 213 cur_path = os.path.join(p, dirpath)
214 214
215 215 # skip removed repos
216 216 if skip_removed_repos and REMOVED_REPO_PAT.match(dirpath):
217 217 continue
218 218
219 219 #skip .<somethin> dirs
220 220 if dirpath.startswith('.'):
221 221 continue
222 222
223 223 try:
224 224 scm_info = get_scm(cur_path)
225 225 yield scm_info[1].split(path, 1)[-1].lstrip(os.sep), scm_info
226 226 except VCSError:
227 227 if not recursive:
228 228 continue
229 229 #check if this dir containts other repos for recursive scan
230 230 rec_path = os.path.join(p, dirpath)
231 231 if os.path.isdir(rec_path):
232 232 for inner_scm in _get_repos(rec_path):
233 233 yield inner_scm
234 234
235 235 return _get_repos(path)
236 236
237 237
238 238 def _get_dirpaths(p):
239 239 try:
240 240 # OS-independable way of checking if we have at least read-only
241 241 # access or not.
242 242 dirpaths = os.listdir(p)
243 243 except OSError:
244 244 log.warning('ignoring repo path without read access: %s', p)
245 245 return []
246 246
247 247 # os.listpath has a tweak: If a unicode is passed into it, then it tries to
248 248 # decode paths and suddenly returns unicode objects itself. The items it
249 249 # cannot decode are returned as strings and cause issues.
250 250 #
251 251 # Those paths are ignored here until a solid solution for path handling has
252 252 # been built.
253 253 expected_type = type(p)
254 254
255 255 def _has_correct_type(item):
256 256 if type(item) is not expected_type:
257 257 log.error(
258 258 u"Ignoring path %s since it cannot be decoded into unicode.",
259 259 # Using "repr" to make sure that we see the byte value in case
260 260 # of support.
261 261 repr(item))
262 262 return False
263 263 return True
264 264
265 265 dirpaths = [item for item in dirpaths if _has_correct_type(item)]
266 266
267 267 return dirpaths
268 268
269 269
270 270 def _is_dir_writable(path):
271 271 """
272 272 Probe if `path` is writable.
273 273
274 274 Due to trouble on Cygwin / Windows, this is actually probing if it is
275 275 possible to create a file inside of `path`, stat does not produce reliable
276 276 results in this case.
277 277 """
278 278 try:
279 279 with tempfile.TemporaryFile(dir=path):
280 280 pass
281 281 except OSError:
282 282 return False
283 283 return True
284 284
285 285
286 286 def is_valid_repo(repo_name, base_path, expect_scm=None, explicit_scm=None):
287 287 """
288 288 Returns True if given path is a valid repository False otherwise.
289 289 If expect_scm param is given also, compare if given scm is the same
290 290 as expected from scm parameter. If explicit_scm is given don't try to
291 291 detect the scm, just use the given one to check if repo is valid
292 292
293 293 :param repo_name:
294 294 :param base_path:
295 295 :param expect_scm:
296 296 :param explicit_scm:
297 297
298 298 :return True: if given path is a valid repository
299 299 """
300 300 full_path = os.path.join(safe_str(base_path), safe_str(repo_name))
301 301 log.debug('Checking if `%s` is a valid path for repository', repo_name)
302 302
303 303 try:
304 304 if explicit_scm:
305 305 detected_scms = [get_scm_backend(explicit_scm)]
306 306 else:
307 307 detected_scms = get_scm(full_path)
308 308
309 309 if expect_scm:
310 310 return detected_scms[0] == expect_scm
311 311 log.debug('path: %s is an vcs object:%s', full_path, detected_scms)
312 312 return True
313 313 except VCSError:
314 314 log.debug('path: %s is not a valid repo !', full_path)
315 315 return False
316 316
317 317
318 318 def is_valid_repo_group(repo_group_name, base_path, skip_path_check=False):
319 319 """
320 320 Returns True if given path is a repository group, False otherwise
321 321
322 322 :param repo_name:
323 323 :param base_path:
324 324 """
325 325 full_path = os.path.join(safe_str(base_path), safe_str(repo_group_name))
326 326 log.debug('Checking if `%s` is a valid path for repository group',
327 327 repo_group_name)
328 328
329 329 # check if it's not a repo
330 330 if is_valid_repo(repo_group_name, base_path):
331 331 log.debug('Repo called %s exist, it is not a valid '
332 332 'repo group' % repo_group_name)
333 333 return False
334 334
335 335 try:
336 336 # we need to check bare git repos at higher level
337 337 # since we might match branches/hooks/info/objects or possible
338 338 # other things inside bare git repo
339 339 scm_ = get_scm(os.path.dirname(full_path))
340 340 log.debug('path: %s is a vcs object:%s, not valid '
341 341 'repo group' % (full_path, scm_))
342 342 return False
343 343 except VCSError:
344 344 pass
345 345
346 346 # check if it's a valid path
347 347 if skip_path_check or os.path.isdir(full_path):
348 348 log.debug('path: %s is a valid repo group !', full_path)
349 349 return True
350 350
351 351 log.debug('path: %s is not a valid repo group !', full_path)
352 352 return False
353 353
354 354
355 355 def ask_ok(prompt, retries=4, complaint='Yes or no please!'):
356 356 while True:
357 357 ok = raw_input(prompt)
358 358 if ok in ('y', 'ye', 'yes'):
359 359 return True
360 360 if ok in ('n', 'no', 'nop', 'nope'):
361 361 return False
362 362 retries = retries - 1
363 363 if retries < 0:
364 364 raise IOError
365 365 print complaint
366 366
367 367 # propagated from mercurial documentation
368 368 ui_sections = [
369 369 'alias', 'auth',
370 370 'decode/encode', 'defaults',
371 371 'diff', 'email',
372 372 'extensions', 'format',
373 373 'merge-patterns', 'merge-tools',
374 374 'hooks', 'http_proxy',
375 375 'smtp', 'patch',
376 376 'paths', 'profiling',
377 377 'server', 'trusted',
378 378 'ui', 'web', ]
379 379
380 380
381 381 def config_data_from_db(clear_session=True, repo=None):
382 382 """
383 383 Read the configuration data from the database and return configuration
384 384 tuples.
385 385 """
386 386 from rhodecode.model.settings import VcsSettingsModel
387 387
388 388 config = []
389 389
390 390 sa = meta.Session()
391 391 settings_model = VcsSettingsModel(repo=repo, sa=sa)
392 392
393 393 ui_settings = settings_model.get_ui_settings()
394 394
395 395 for setting in ui_settings:
396 396 if setting.active:
397 397 log.debug(
398 398 'settings ui from db: [%s] %s=%s',
399 399 setting.section, setting.key, setting.value)
400 400 config.append((
401 401 safe_str(setting.section), safe_str(setting.key),
402 402 safe_str(setting.value)))
403 403 if setting.key == 'push_ssl':
404 404 # force set push_ssl requirement to False, rhodecode
405 405 # handles that
406 406 config.append((
407 407 safe_str(setting.section), safe_str(setting.key), False))
408 408 if clear_session:
409 409 meta.Session.remove()
410 410
411 411 # TODO: mikhail: probably it makes no sense to re-read hooks information.
412 412 # It's already there and activated/deactivated
413 413 skip_entries = []
414 414 enabled_hook_classes = get_enabled_hook_classes(ui_settings)
415 415 if 'pull' not in enabled_hook_classes:
416 416 skip_entries.append(('hooks', RhodeCodeUi.HOOK_PRE_PULL))
417 417 if 'push' not in enabled_hook_classes:
418 418 skip_entries.append(('hooks', RhodeCodeUi.HOOK_PRE_PUSH))
419 419
420 420 config = [entry for entry in config if entry[:2] not in skip_entries]
421 421
422 422 return config
423 423
424 424
425 425 def make_db_config(clear_session=True, repo=None):
426 426 """
427 427 Create a :class:`Config` instance based on the values in the database.
428 428 """
429 429 config = Config()
430 430 config_data = config_data_from_db(clear_session=clear_session, repo=repo)
431 431 for section, option, value in config_data:
432 432 config.set(section, option, value)
433 433 return config
434 434
435 435
436 436 def get_enabled_hook_classes(ui_settings):
437 437 """
438 438 Return the enabled hook classes.
439 439
440 440 :param ui_settings: List of ui_settings as returned
441 441 by :meth:`VcsSettingsModel.get_ui_settings`
442 442
443 443 :return: a list with the enabled hook classes. The order is not guaranteed.
444 444 :rtype: list
445 445 """
446 446 enabled_hooks = []
447 447 active_hook_keys = [
448 448 key for section, key, value, active in ui_settings
449 449 if section == 'hooks' and active]
450 450
451 451 hook_names = {
452 452 RhodeCodeUi.HOOK_PUSH: 'push',
453 453 RhodeCodeUi.HOOK_PULL: 'pull',
454 454 RhodeCodeUi.HOOK_REPO_SIZE: 'repo_size'
455 455 }
456 456
457 457 for key in active_hook_keys:
458 458 hook = hook_names.get(key)
459 459 if hook:
460 460 enabled_hooks.append(hook)
461 461
462 462 return enabled_hooks
463 463
464 464
465 465 def set_rhodecode_config(config):
466 466 """
467 467 Updates pylons config with new settings from database
468 468
469 469 :param config:
470 470 """
471 471 from rhodecode.model.settings import SettingsModel
472 472 app_settings = SettingsModel().get_all_settings()
473 473
474 474 for k, v in app_settings.items():
475 475 config[k] = v
476 476
477 477
478 478 def map_groups(path):
479 479 """
480 480 Given a full path to a repository, create all nested groups that this
481 481 repo is inside. This function creates parent-child relationships between
482 482 groups and creates default perms for all new groups.
483 483
484 484 :param paths: full path to repository
485 485 """
486 486 from rhodecode.model.repo_group import RepoGroupModel
487 487 sa = meta.Session()
488 488 groups = path.split(Repository.NAME_SEP)
489 489 parent = None
490 490 group = None
491 491
492 492 # last element is repo in nested groups structure
493 493 groups = groups[:-1]
494 494 rgm = RepoGroupModel(sa)
495 owner = User.get_first_admin()
495 owner = User.get_first_super_admin()
496 496 for lvl, group_name in enumerate(groups):
497 497 group_name = '/'.join(groups[:lvl] + [group_name])
498 498 group = RepoGroup.get_by_group_name(group_name)
499 499 desc = '%s group' % group_name
500 500
501 501 # skip folders that are now removed repos
502 502 if REMOVED_REPO_PAT.match(group_name):
503 503 break
504 504
505 505 if group is None:
506 506 log.debug('creating group level: %s group_name: %s',
507 507 lvl, group_name)
508 508 group = RepoGroup(group_name, parent)
509 509 group.group_description = desc
510 510 group.user = owner
511 511 sa.add(group)
512 512 perm_obj = rgm._create_default_perms(group)
513 513 sa.add(perm_obj)
514 514 sa.flush()
515 515
516 516 parent = group
517 517 return group
518 518
519 519
520 520 def repo2db_mapper(initial_repo_list, remove_obsolete=False):
521 521 """
522 522 maps all repos given in initial_repo_list, non existing repositories
523 523 are created, if remove_obsolete is True it also checks for db entries
524 524 that are not in initial_repo_list and removes them.
525 525
526 526 :param initial_repo_list: list of repositories found by scanning methods
527 527 :param remove_obsolete: check for obsolete entries in database
528 528 """
529 529 from rhodecode.model.repo import RepoModel
530 530 from rhodecode.model.scm import ScmModel
531 531 from rhodecode.model.repo_group import RepoGroupModel
532 532 from rhodecode.model.settings import SettingsModel
533 533
534 534 sa = meta.Session()
535 535 repo_model = RepoModel()
536 user = User.get_first_admin()
536 user = User.get_first_super_admin()
537 537 added = []
538 538
539 539 # creation defaults
540 540 defs = SettingsModel().get_default_repo_settings(strip_prefix=True)
541 541 enable_statistics = defs.get('repo_enable_statistics')
542 542 enable_locking = defs.get('repo_enable_locking')
543 543 enable_downloads = defs.get('repo_enable_downloads')
544 544 private = defs.get('repo_private')
545 545
546 546 for name, repo in initial_repo_list.items():
547 547 group = map_groups(name)
548 548 unicode_name = safe_unicode(name)
549 549 db_repo = repo_model.get_by_repo_name(unicode_name)
550 550 # found repo that is on filesystem not in RhodeCode database
551 551 if not db_repo:
552 552 log.info('repository %s not found, creating now', name)
553 553 added.append(name)
554 554 desc = (repo.description
555 555 if repo.description != 'unknown'
556 556 else '%s repository' % name)
557 557
558 558 db_repo = repo_model._create_repo(
559 559 repo_name=name,
560 560 repo_type=repo.alias,
561 561 description=desc,
562 562 repo_group=getattr(group, 'group_id', None),
563 563 owner=user,
564 564 enable_locking=enable_locking,
565 565 enable_downloads=enable_downloads,
566 566 enable_statistics=enable_statistics,
567 567 private=private,
568 568 state=Repository.STATE_CREATED
569 569 )
570 570 sa.commit()
571 571 # we added that repo just now, and make sure we updated server info
572 572 if db_repo.repo_type == 'git':
573 573 git_repo = db_repo.scm_instance()
574 574 # update repository server-info
575 575 log.debug('Running update server info')
576 576 git_repo._update_server_info()
577 577
578 578 db_repo.update_commit_cache()
579 579
580 580 config = db_repo._config
581 581 config.set('extensions', 'largefiles', '')
582 582 ScmModel().install_hooks(
583 583 db_repo.scm_instance(config=config),
584 584 repo_type=db_repo.repo_type)
585 585
586 586 removed = []
587 587 if remove_obsolete:
588 588 # remove from database those repositories that are not in the filesystem
589 589 for repo in sa.query(Repository).all():
590 590 if repo.repo_name not in initial_repo_list.keys():
591 591 log.debug("Removing non-existing repository found in db `%s`",
592 592 repo.repo_name)
593 593 try:
594 594 RepoModel(sa).delete(repo, forks='detach', fs_remove=False)
595 595 sa.commit()
596 596 removed.append(repo.repo_name)
597 597 except Exception:
598 598 # don't hold further removals on error
599 599 log.error(traceback.format_exc())
600 600 sa.rollback()
601 601
602 602 def splitter(full_repo_name):
603 603 _parts = full_repo_name.rsplit(RepoGroup.url_sep(), 1)
604 604 gr_name = None
605 605 if len(_parts) == 2:
606 606 gr_name = _parts[0]
607 607 return gr_name
608 608
609 609 initial_repo_group_list = [splitter(x) for x in
610 610 initial_repo_list.keys() if splitter(x)]
611 611
612 612 # remove from database those repository groups that are not in the
613 613 # filesystem due to parent child relationships we need to delete them
614 614 # in a specific order of most nested first
615 615 all_groups = [x.group_name for x in sa.query(RepoGroup).all()]
616 616 nested_sort = lambda gr: len(gr.split('/'))
617 617 for group_name in sorted(all_groups, key=nested_sort, reverse=True):
618 618 if group_name not in initial_repo_group_list:
619 619 repo_group = RepoGroup.get_by_group_name(group_name)
620 620 if (repo_group.children.all() or
621 621 not RepoGroupModel().check_exist_filesystem(
622 622 group_name=group_name, exc_on_failure=False)):
623 623 continue
624 624
625 625 log.info(
626 626 'Removing non-existing repository group found in db `%s`',
627 627 group_name)
628 628 try:
629 629 RepoGroupModel(sa).delete(group_name, fs_remove=False)
630 630 sa.commit()
631 631 removed.append(group_name)
632 632 except Exception:
633 633 # don't hold further removals on error
634 634 log.exception(
635 635 'Unable to remove repository group `%s`',
636 636 group_name)
637 637 sa.rollback()
638 638 raise
639 639
640 640 return added, removed
641 641
642 642
643 643 def get_default_cache_settings(settings):
644 644 cache_settings = {}
645 645 for key in settings.keys():
646 646 for prefix in ['beaker.cache.', 'cache.']:
647 647 if key.startswith(prefix):
648 648 name = key.split(prefix)[1].strip()
649 649 cache_settings[name] = settings[key].strip()
650 650 return cache_settings
651 651
652 652
653 653 # set cache regions for beaker so celery can utilise it
654 654 def add_cache(settings):
655 655 from rhodecode.lib import caches
656 656 cache_settings = {'regions': None}
657 657 # main cache settings used as default ...
658 658 cache_settings.update(get_default_cache_settings(settings))
659 659
660 660 if cache_settings['regions']:
661 661 for region in cache_settings['regions'].split(','):
662 662 region = region.strip()
663 663 region_settings = {}
664 664 for key, value in cache_settings.items():
665 665 if key.startswith(region):
666 666 region_settings[key.split('.')[1]] = value
667 667
668 668 caches.configure_cache_region(
669 669 region, region_settings, cache_settings)
670 670
671 671
672 672 def load_rcextensions(root_path):
673 673 import rhodecode
674 674 from rhodecode.config import conf
675 675
676 676 path = os.path.join(root_path, 'rcextensions', '__init__.py')
677 677 if os.path.isfile(path):
678 678 rcext = create_module('rc', path)
679 679 EXT = rhodecode.EXTENSIONS = rcext
680 680 log.debug('Found rcextensions now loading %s...', rcext)
681 681
682 682 # Additional mappings that are not present in the pygments lexers
683 683 conf.LANGUAGES_EXTENSIONS_MAP.update(getattr(EXT, 'EXTRA_MAPPINGS', {}))
684 684
685 685 # auto check if the module is not missing any data, set to default if is
686 686 # this will help autoupdate new feature of rcext module
687 687 #from rhodecode.config import rcextensions
688 688 #for k in dir(rcextensions):
689 689 # if not k.startswith('_') and not hasattr(EXT, k):
690 690 # setattr(EXT, k, getattr(rcextensions, k))
691 691
692 692
693 693 def get_custom_lexer(extension):
694 694 """
695 695 returns a custom lexer if it is defined in rcextensions module, or None
696 696 if there's no custom lexer defined
697 697 """
698 698 import rhodecode
699 699 from pygments import lexers
700 700 # check if we didn't define this extension as other lexer
701 701 extensions = rhodecode.EXTENSIONS and getattr(rhodecode.EXTENSIONS, 'EXTRA_LEXERS', None)
702 702 if extensions and extension in rhodecode.EXTENSIONS.EXTRA_LEXERS:
703 703 _lexer_name = rhodecode.EXTENSIONS.EXTRA_LEXERS[extension]
704 704 return lexers.get_lexer_by_name(_lexer_name)
705 705
706 706
707 707 #==============================================================================
708 708 # TEST FUNCTIONS AND CREATORS
709 709 #==============================================================================
710 710 def create_test_index(repo_location, config):
711 711 """
712 712 Makes default test index.
713 713 """
714 714 import rc_testdata
715 715
716 716 rc_testdata.extract_search_index(
717 717 'vcs_search_index', os.path.dirname(config['search.location']))
718 718
719 719
720 720 def create_test_directory(test_path):
721 721 """
722 722 Create test directory if it doesn't exist.
723 723 """
724 724 if not os.path.isdir(test_path):
725 725 log.debug('Creating testdir %s', test_path)
726 726 os.makedirs(test_path)
727 727
728 728
729 729 def create_test_database(test_path, config):
730 730 """
731 731 Makes a fresh database.
732 732 """
733 733 from rhodecode.lib.db_manage import DbManage
734 734
735 735 # PART ONE create db
736 736 dbconf = config['sqlalchemy.db1.url']
737 737 log.debug('making test db %s', dbconf)
738 738
739 739 dbmanage = DbManage(log_sql=False, dbconf=dbconf, root=config['here'],
740 740 tests=True, cli_args={'force_ask': True})
741 741 dbmanage.create_tables(override=True)
742 742 dbmanage.set_db_version()
743 743 # for tests dynamically set new root paths based on generated content
744 744 dbmanage.create_settings(dbmanage.config_prompt(test_path))
745 745 dbmanage.create_default_user()
746 746 dbmanage.create_test_admin_and_users()
747 747 dbmanage.create_permissions()
748 748 dbmanage.populate_default_permissions()
749 749 Session().commit()
750 750
751 751
752 752 def create_test_repositories(test_path, config):
753 753 """
754 754 Creates test repositories in the temporary directory. Repositories are
755 755 extracted from archives within the rc_testdata package.
756 756 """
757 757 import rc_testdata
758 758 from rhodecode.tests import HG_REPO, GIT_REPO, SVN_REPO
759 759
760 760 log.debug('making test vcs repositories')
761 761
762 762 idx_path = config['search.location']
763 763 data_path = config['cache_dir']
764 764
765 765 # clean index and data
766 766 if idx_path and os.path.exists(idx_path):
767 767 log.debug('remove %s', idx_path)
768 768 shutil.rmtree(idx_path)
769 769
770 770 if data_path and os.path.exists(data_path):
771 771 log.debug('remove %s', data_path)
772 772 shutil.rmtree(data_path)
773 773
774 774 rc_testdata.extract_hg_dump('vcs_test_hg', jn(test_path, HG_REPO))
775 775 rc_testdata.extract_git_dump('vcs_test_git', jn(test_path, GIT_REPO))
776 776
777 777 # Note: Subversion is in the process of being integrated with the system,
778 778 # until we have a properly packed version of the test svn repository, this
779 779 # tries to copy over the repo from a package "rc_testdata"
780 780 svn_repo_path = rc_testdata.get_svn_repo_archive()
781 781 with tarfile.open(svn_repo_path) as tar:
782 782 tar.extractall(jn(test_path, SVN_REPO))
783 783
784 784
785 785 #==============================================================================
786 786 # PASTER COMMANDS
787 787 #==============================================================================
788 788 class BasePasterCommand(Command):
789 789 """
790 790 Abstract Base Class for paster commands.
791 791
792 792 The celery commands are somewhat aggressive about loading
793 793 celery.conf, and since our module sets the `CELERY_LOADER`
794 794 environment variable to our loader, we have to bootstrap a bit and
795 795 make sure we've had a chance to load the pylons config off of the
796 796 command line, otherwise everything fails.
797 797 """
798 798 min_args = 1
799 799 min_args_error = "Please provide a paster config file as an argument."
800 800 takes_config_file = 1
801 801 requires_config_file = True
802 802
803 803 def notify_msg(self, msg, log=False):
804 804 """Make a notification to user, additionally if logger is passed
805 805 it logs this action using given logger
806 806
807 807 :param msg: message that will be printed to user
808 808 :param log: logging instance, to use to additionally log this message
809 809
810 810 """
811 811 if log and isinstance(log, logging):
812 812 log(msg)
813 813
814 814 def run(self, args):
815 815 """
816 816 Overrides Command.run
817 817
818 818 Checks for a config file argument and loads it.
819 819 """
820 820 if len(args) < self.min_args:
821 821 raise BadCommand(
822 822 self.min_args_error % {'min_args': self.min_args,
823 823 'actual_args': len(args)})
824 824
825 825 # Decrement because we're going to lob off the first argument.
826 826 # @@ This is hacky
827 827 self.min_args -= 1
828 828 self.bootstrap_config(args[0])
829 829 self.update_parser()
830 830 return super(BasePasterCommand, self).run(args[1:])
831 831
832 832 def update_parser(self):
833 833 """
834 834 Abstract method. Allows for the class' parser to be updated
835 835 before the superclass' `run` method is called. Necessary to
836 836 allow options/arguments to be passed through to the underlying
837 837 celery command.
838 838 """
839 839 raise NotImplementedError("Abstract Method.")
840 840
841 841 def bootstrap_config(self, conf):
842 842 """
843 843 Loads the pylons configuration.
844 844 """
845 845 from pylons import config as pylonsconfig
846 846
847 847 self.path_to_ini_file = os.path.realpath(conf)
848 848 conf = paste.deploy.appconfig('config:' + self.path_to_ini_file)
849 849 pylonsconfig.init_app(conf.global_conf, conf.local_conf)
850 850
851 851 def _init_session(self):
852 852 """
853 853 Inits SqlAlchemy Session
854 854 """
855 855 logging.config.fileConfig(self.path_to_ini_file)
856 856 from pylons import config
857 857 from rhodecode.config.utils import initialize_database
858 858
859 859 # get to remove repos !!
860 860 add_cache(config)
861 861 initialize_database(config)
862 862
863 863
864 864 @decorator.decorator
865 865 def jsonify(func, *args, **kwargs):
866 866 """Action decorator that formats output for JSON
867 867
868 868 Given a function that will return content, this decorator will turn
869 869 the result into JSON, with a content-type of 'application/json' and
870 870 output it.
871 871
872 872 """
873 873 from pylons.decorators.util import get_pylons
874 874 from rhodecode.lib.ext_json import json
875 875 pylons = get_pylons(args)
876 876 pylons.response.headers['Content-Type'] = 'application/json; charset=utf-8'
877 877 data = func(*args, **kwargs)
878 878 if isinstance(data, (list, tuple)):
879 879 msg = "JSON responses with Array envelopes are susceptible to " \
880 880 "cross-site data leak attacks, see " \
881 881 "http://wiki.pylonshq.com/display/pylonsfaq/Warnings"
882 882 warnings.warn(msg, Warning, 2)
883 883 log.warning(msg)
884 884 log.debug("Returning JSON wrapped action output")
885 885 return json.dumps(data, encoding='utf-8')
886 886
887 887
888 888 class PartialRenderer(object):
889 889 """
890 890 Partial renderer used to render chunks of html used in datagrids
891 891 use like::
892 892
893 893 _render = PartialRenderer('data_table/_dt_elements.html')
894 894 _render('quick_menu', args, kwargs)
895 895 PartialRenderer.h,
896 896 c,
897 897 _,
898 898 ungettext
899 899 are the template stuff initialized inside and can be re-used later
900 900
901 901 :param tmpl_name: template path relate to /templates/ dir
902 902 """
903 903
904 904 def __init__(self, tmpl_name):
905 905 import rhodecode
906 906 from pylons import request, tmpl_context as c
907 907 from pylons.i18n.translation import _, ungettext
908 908 from rhodecode.lib import helpers as h
909 909
910 910 self.tmpl_name = tmpl_name
911 911 self.rhodecode = rhodecode
912 912 self.c = c
913 913 self._ = _
914 914 self.ungettext = ungettext
915 915 self.h = h
916 916 self.request = request
917 917
918 918 def _mako_lookup(self):
919 919 _tmpl_lookup = self.rhodecode.CONFIG['pylons.app_globals'].mako_lookup
920 920 return _tmpl_lookup.get_template(self.tmpl_name)
921 921
922 922 def _update_kwargs_for_render(self, kwargs):
923 923 """
924 924 Inject params required for Mako rendering
925 925 """
926 926 _kwargs = {
927 927 '_': self._,
928 928 'h': self.h,
929 929 'c': self.c,
930 930 'request': self.request,
931 931 'ungettext': self.ungettext,
932 932 }
933 933 _kwargs.update(kwargs)
934 934 return _kwargs
935 935
936 936 def _render_with_exc(self, render_func, args, kwargs):
937 937 try:
938 938 return render_func.render(*args, **kwargs)
939 939 except:
940 940 log.error(exceptions.text_error_template().render())
941 941 raise
942 942
943 943 def _get_template(self, template_obj, def_name):
944 944 if def_name:
945 945 tmpl = template_obj.get_def(def_name)
946 946 else:
947 947 tmpl = template_obj
948 948 return tmpl
949 949
950 950 def render(self, def_name, *args, **kwargs):
951 951 lookup_obj = self._mako_lookup()
952 952 tmpl = self._get_template(lookup_obj, def_name=def_name)
953 953 kwargs = self._update_kwargs_for_render(kwargs)
954 954 return self._render_with_exc(tmpl, args, kwargs)
955 955
956 956 def __call__(self, tmpl, *args, **kwargs):
957 957 return self.render(tmpl, *args, **kwargs)
958 958
959 959
960 960 def password_changed(auth_user, session):
961 961 if auth_user.username == User.DEFAULT_USER:
962 962 return False
963 963 password_hash = md5(auth_user.password) if auth_user.password else None
964 964 rhodecode_user = session.get('rhodecode_user', {})
965 965 session_password_hash = rhodecode_user.get('password', '')
966 966 return password_hash != session_password_hash
967 967
968 968
969 969 def read_opensource_licenses():
970 970 global _license_cache
971 971
972 972 if not _license_cache:
973 973 licenses = pkg_resources.resource_string(
974 974 'rhodecode', 'config/licenses.json')
975 975 _license_cache = json.loads(licenses)
976 976
977 977 return _license_cache
1 NO CONTENT: modified file
The requested commit or file is too big and content was truncated. Show full diff
@@ -1,924 +1,924 b''
1 1 # -*- coding: utf-8 -*-
2 2
3 3 # Copyright (C) 2010-2016 RhodeCode GmbH
4 4 #
5 5 # This program is free software: you can redistribute it and/or modify
6 6 # it under the terms of the GNU Affero General Public License, version 3
7 7 # (only), as published by the Free Software Foundation.
8 8 #
9 9 # This program is distributed in the hope that it will be useful,
10 10 # but WITHOUT ANY WARRANTY; without even the implied warranty of
11 11 # MERCHANTABILITY or FITNESS FOR A PARTICULAR PURPOSE. See the
12 12 # GNU General Public License for more details.
13 13 #
14 14 # You should have received a copy of the GNU Affero General Public License
15 15 # along with this program. If not, see <http://www.gnu.org/licenses/>.
16 16 #
17 17 # This program is dual-licensed. If you wish to learn more about the
18 18 # RhodeCode Enterprise Edition, including its added features, Support services,
19 19 # and proprietary license terms, please see https://rhodecode.com/licenses/
20 20
21 21 """
22 22 Repository model for rhodecode
23 23 """
24 24
25 25 import logging
26 26 import os
27 27 import re
28 28 import shutil
29 29 import time
30 30 import traceback
31 31 from datetime import datetime
32 32
33 33 from sqlalchemy.sql import func
34 34 from sqlalchemy.sql.expression import true, or_
35 35 from zope.cachedescriptors.property import Lazy as LazyProperty
36 36
37 37 from rhodecode.lib import helpers as h
38 38 from rhodecode.lib.auth import HasUserGroupPermissionAny
39 39 from rhodecode.lib.caching_query import FromCache
40 40 from rhodecode.lib.exceptions import AttachedForksError
41 41 from rhodecode.lib.hooks_base import log_delete_repository
42 42 from rhodecode.lib.utils import make_db_config
43 43 from rhodecode.lib.utils2 import (
44 44 safe_str, safe_unicode, remove_prefix, obfuscate_url_pw,
45 45 get_current_rhodecode_user, safe_int, datetime_to_time, action_logger_generic)
46 46 from rhodecode.lib.vcs.backends import get_backend
47 47 from rhodecode.model import BaseModel
48 48 from rhodecode.model.db import (
49 49 Repository, UserRepoToPerm, UserGroupRepoToPerm, UserRepoGroupToPerm,
50 50 UserGroupRepoGroupToPerm, User, Permission, Statistics, UserGroup,
51 51 RepoGroup, RepositoryField)
52 52 from rhodecode.model.scm import UserGroupList
53 53 from rhodecode.model.settings import VcsSettingsModel
54 54
55 55
56 56 log = logging.getLogger(__name__)
57 57
58 58
59 59 class RepoModel(BaseModel):
60 60
61 61 cls = Repository
62 62
63 63 def _get_user_group(self, users_group):
64 64 return self._get_instance(UserGroup, users_group,
65 65 callback=UserGroup.get_by_group_name)
66 66
67 67 def _get_repo_group(self, repo_group):
68 68 return self._get_instance(RepoGroup, repo_group,
69 69 callback=RepoGroup.get_by_group_name)
70 70
71 71 def _create_default_perms(self, repository, private):
72 72 # create default permission
73 73 default = 'repository.read'
74 74 def_user = User.get_default_user()
75 75 for p in def_user.user_perms:
76 76 if p.permission.permission_name.startswith('repository.'):
77 77 default = p.permission.permission_name
78 78 break
79 79
80 80 default_perm = 'repository.none' if private else default
81 81
82 82 repo_to_perm = UserRepoToPerm()
83 83 repo_to_perm.permission = Permission.get_by_key(default_perm)
84 84
85 85 repo_to_perm.repository = repository
86 86 repo_to_perm.user_id = def_user.user_id
87 87
88 88 return repo_to_perm
89 89
90 90 @LazyProperty
91 91 def repos_path(self):
92 92 """
93 93 Gets the repositories root path from database
94 94 """
95 95 settings_model = VcsSettingsModel(sa=self.sa)
96 96 return settings_model.get_repos_location()
97 97
98 98 def get(self, repo_id, cache=False):
99 99 repo = self.sa.query(Repository) \
100 100 .filter(Repository.repo_id == repo_id)
101 101
102 102 if cache:
103 103 repo = repo.options(FromCache("sql_cache_short",
104 104 "get_repo_%s" % repo_id))
105 105 return repo.scalar()
106 106
107 107 def get_repo(self, repository):
108 108 return self._get_repo(repository)
109 109
110 110 def get_by_repo_name(self, repo_name, cache=False):
111 111 repo = self.sa.query(Repository) \
112 112 .filter(Repository.repo_name == repo_name)
113 113
114 114 if cache:
115 115 repo = repo.options(FromCache("sql_cache_short",
116 116 "get_repo_%s" % repo_name))
117 117 return repo.scalar()
118 118
119 119 def _extract_id_from_repo_name(self, repo_name):
120 120 if repo_name.startswith('/'):
121 121 repo_name = repo_name.lstrip('/')
122 122 by_id_match = re.match(r'^_(\d{1,})', repo_name)
123 123 if by_id_match:
124 124 return by_id_match.groups()[0]
125 125
126 126 def get_repo_by_id(self, repo_name):
127 127 """
128 128 Extracts repo_name by id from special urls.
129 129 Example url is _11/repo_name
130 130
131 131 :param repo_name:
132 132 :return: repo object if matched else None
133 133 """
134 134 try:
135 135 _repo_id = self._extract_id_from_repo_name(repo_name)
136 136 if _repo_id:
137 137 return self.get(_repo_id)
138 138 except Exception:
139 139 log.exception('Failed to extract repo_name from URL')
140 140
141 141 return None
142 142
143 143 def get_users(self, name_contains=None, limit=20, only_active=True):
144 144 # TODO: mikhail: move this method to the UserModel.
145 145 query = self.sa.query(User)
146 146 if only_active:
147 147 query = query.filter(User.active == true())
148 148
149 149 if name_contains:
150 150 ilike_expression = u'%{}%'.format(safe_unicode(name_contains))
151 151 query = query.filter(
152 152 or_(
153 153 User.name.ilike(ilike_expression),
154 154 User.lastname.ilike(ilike_expression),
155 155 User.username.ilike(ilike_expression)
156 156 )
157 157 )
158 158 query = query.limit(limit)
159 159 users = query.all()
160 160
161 161 _users = [
162 162 {
163 163 'id': user.user_id,
164 164 'first_name': user.name,
165 165 'last_name': user.lastname,
166 166 'username': user.username,
167 167 'icon_link': h.gravatar_url(user.email, 14),
168 168 'value_display': h.person(user.email),
169 169 'value': user.username,
170 170 'value_type': 'user',
171 171 'active': user.active,
172 172 }
173 173 for user in users
174 174 ]
175 175 return _users
176 176
177 177 def get_user_groups(self, name_contains=None, limit=20, only_active=True):
178 178 # TODO: mikhail: move this method to the UserGroupModel.
179 179 query = self.sa.query(UserGroup)
180 180 if only_active:
181 181 query = query.filter(UserGroup.users_group_active == true())
182 182
183 183 if name_contains:
184 184 ilike_expression = u'%{}%'.format(safe_unicode(name_contains))
185 185 query = query.filter(
186 186 UserGroup.users_group_name.ilike(ilike_expression))\
187 187 .order_by(func.length(UserGroup.users_group_name))\
188 188 .order_by(UserGroup.users_group_name)
189 189
190 190 query = query.limit(limit)
191 191 user_groups = query.all()
192 192 perm_set = ['usergroup.read', 'usergroup.write', 'usergroup.admin']
193 193 user_groups = UserGroupList(user_groups, perm_set=perm_set)
194 194
195 195 _groups = [
196 196 {
197 197 'id': group.users_group_id,
198 198 # TODO: marcink figure out a way to generate the url for the
199 199 # icon
200 200 'icon_link': '',
201 201 'value_display': 'Group: %s (%d members)' % (
202 202 group.users_group_name, len(group.members),),
203 203 'value': group.users_group_name,
204 204 'value_type': 'user_group',
205 205 'active': group.users_group_active,
206 206 }
207 207 for group in user_groups
208 208 ]
209 209 return _groups
210 210
211 211 @classmethod
212 212 def update_repoinfo(cls, repositories=None):
213 213 if not repositories:
214 214 repositories = Repository.getAll()
215 215 for repo in repositories:
216 216 repo.update_commit_cache()
217 217
218 218 def get_repos_as_dict(self, repo_list=None, admin=False,
219 219 super_user_actions=False):
220 220
221 221 from rhodecode.lib.utils import PartialRenderer
222 222 _render = PartialRenderer('data_table/_dt_elements.html')
223 223 c = _render.c
224 224
225 225 def quick_menu(repo_name):
226 226 return _render('quick_menu', repo_name)
227 227
228 228 def repo_lnk(name, rtype, rstate, private, fork_of):
229 229 return _render('repo_name', name, rtype, rstate, private, fork_of,
230 230 short_name=not admin, admin=False)
231 231
232 232 def last_change(last_change):
233 233 return _render("last_change", last_change)
234 234
235 235 def rss_lnk(repo_name):
236 236 return _render("rss", repo_name)
237 237
238 238 def atom_lnk(repo_name):
239 239 return _render("atom", repo_name)
240 240
241 241 def last_rev(repo_name, cs_cache):
242 242 return _render('revision', repo_name, cs_cache.get('revision'),
243 243 cs_cache.get('raw_id'), cs_cache.get('author'),
244 244 cs_cache.get('message'))
245 245
246 246 def desc(desc):
247 247 if c.visual.stylify_metatags:
248 248 return h.urlify_text(h.escaped_stylize(h.truncate(desc, 60)))
249 249 else:
250 250 return h.urlify_text(h.html_escape(h.truncate(desc, 60)))
251 251
252 252 def state(repo_state):
253 253 return _render("repo_state", repo_state)
254 254
255 255 def repo_actions(repo_name):
256 256 return _render('repo_actions', repo_name, super_user_actions)
257 257
258 258 def user_profile(username):
259 259 return _render('user_profile', username)
260 260
261 261 repos_data = []
262 262 for repo in repo_list:
263 263 cs_cache = repo.changeset_cache
264 264 row = {
265 265 "menu": quick_menu(repo.repo_name),
266 266
267 267 "name": repo_lnk(repo.repo_name, repo.repo_type,
268 268 repo.repo_state, repo.private, repo.fork),
269 269 "name_raw": repo.repo_name.lower(),
270 270
271 271 "last_change": last_change(repo.last_db_change),
272 272 "last_change_raw": datetime_to_time(repo.last_db_change),
273 273
274 274 "last_changeset": last_rev(repo.repo_name, cs_cache),
275 275 "last_changeset_raw": cs_cache.get('revision'),
276 276
277 277 "desc": desc(repo.description),
278 278 "owner": user_profile(repo.user.username),
279 279
280 280 "state": state(repo.repo_state),
281 281 "rss": rss_lnk(repo.repo_name),
282 282
283 283 "atom": atom_lnk(repo.repo_name),
284 284 }
285 285 if admin:
286 286 row.update({
287 287 "action": repo_actions(repo.repo_name),
288 288 })
289 289 repos_data.append(row)
290 290
291 291 return repos_data
292 292
293 293 def _get_defaults(self, repo_name):
294 294 """
295 295 Gets information about repository, and returns a dict for
296 296 usage in forms
297 297
298 298 :param repo_name:
299 299 """
300 300
301 301 repo_info = Repository.get_by_repo_name(repo_name)
302 302
303 303 if repo_info is None:
304 304 return None
305 305
306 306 defaults = repo_info.get_dict()
307 307 defaults['repo_name'] = repo_info.just_name
308 308
309 309 groups = repo_info.groups_with_parents
310 310 parent_group = groups[-1] if groups else None
311 311
312 312 # we use -1 as this is how in HTML, we mark an empty group
313 313 defaults['repo_group'] = getattr(parent_group, 'group_id', -1)
314 314
315 315 keys_to_process = (
316 316 {'k': 'repo_type', 'strip': False},
317 317 {'k': 'repo_enable_downloads', 'strip': True},
318 318 {'k': 'repo_description', 'strip': True},
319 319 {'k': 'repo_enable_locking', 'strip': True},
320 320 {'k': 'repo_landing_rev', 'strip': True},
321 321 {'k': 'clone_uri', 'strip': False},
322 322 {'k': 'repo_private', 'strip': True},
323 323 {'k': 'repo_enable_statistics', 'strip': True}
324 324 )
325 325
326 326 for item in keys_to_process:
327 327 attr = item['k']
328 328 if item['strip']:
329 329 attr = remove_prefix(item['k'], 'repo_')
330 330
331 331 val = defaults[attr]
332 332 if item['k'] == 'repo_landing_rev':
333 333 val = ':'.join(defaults[attr])
334 334 defaults[item['k']] = val
335 335 if item['k'] == 'clone_uri':
336 336 defaults['clone_uri_hidden'] = repo_info.clone_uri_hidden
337 337
338 338 # fill owner
339 339 if repo_info.user:
340 340 defaults.update({'user': repo_info.user.username})
341 341 else:
342 replacement_user = User.get_first_admin().username
342 replacement_user = User.get_first_super_admin().username
343 343 defaults.update({'user': replacement_user})
344 344
345 345 # fill repository users
346 346 for p in repo_info.repo_to_perm:
347 347 defaults.update({'u_perm_%s' % p.user.user_id:
348 348 p.permission.permission_name})
349 349
350 350 # fill repository groups
351 351 for p in repo_info.users_group_to_perm:
352 352 defaults.update({'g_perm_%s' % p.users_group.users_group_id:
353 353 p.permission.permission_name})
354 354
355 355 return defaults
356 356
357 357 def update(self, repo, **kwargs):
358 358 try:
359 359 cur_repo = self._get_repo(repo)
360 360 source_repo_name = cur_repo.repo_name
361 361 if 'user' in kwargs:
362 362 cur_repo.user = User.get_by_username(kwargs['user'])
363 363
364 364 if 'repo_group' in kwargs:
365 365 cur_repo.group = RepoGroup.get(kwargs['repo_group'])
366 366 log.debug('Updating repo %s with params:%s', cur_repo, kwargs)
367 367
368 368 update_keys = [
369 369 (1, 'repo_enable_downloads'),
370 370 (1, 'repo_description'),
371 371 (1, 'repo_enable_locking'),
372 372 (1, 'repo_landing_rev'),
373 373 (1, 'repo_private'),
374 374 (1, 'repo_enable_statistics'),
375 375 (0, 'clone_uri'),
376 376 (0, 'fork_id')
377 377 ]
378 378 for strip, k in update_keys:
379 379 if k in kwargs:
380 380 val = kwargs[k]
381 381 if strip:
382 382 k = remove_prefix(k, 'repo_')
383 383 if k == 'clone_uri':
384 384 from rhodecode.model.validators import Missing
385 385 _change = kwargs.get('clone_uri_change')
386 386 if _change in [Missing, 'OLD']:
387 387 # we don't change the value, so use original one
388 388 val = cur_repo.clone_uri
389 389
390 390 setattr(cur_repo, k, val)
391 391
392 392 new_name = cur_repo.get_new_name(kwargs['repo_name'])
393 393 cur_repo.repo_name = new_name
394 394
395 395 # if private flag is set, reset default permission to NONE
396 396 if kwargs.get('repo_private'):
397 397 EMPTY_PERM = 'repository.none'
398 398 RepoModel().grant_user_permission(
399 399 repo=cur_repo, user=User.DEFAULT_USER, perm=EMPTY_PERM
400 400 )
401 401
402 402 # handle extra fields
403 403 for field in filter(lambda k: k.startswith(RepositoryField.PREFIX),
404 404 kwargs):
405 405 k = RepositoryField.un_prefix_key(field)
406 406 ex_field = RepositoryField.get_by_key_name(
407 407 key=k, repo=cur_repo)
408 408 if ex_field:
409 409 ex_field.field_value = kwargs[field]
410 410 self.sa.add(ex_field)
411 411 self.sa.add(cur_repo)
412 412
413 413 if source_repo_name != new_name:
414 414 # rename repository
415 415 self._rename_filesystem_repo(
416 416 old=source_repo_name, new=new_name)
417 417
418 418 return cur_repo
419 419 except Exception:
420 420 log.error(traceback.format_exc())
421 421 raise
422 422
423 423 def _create_repo(self, repo_name, repo_type, description, owner,
424 424 private=False, clone_uri=None, repo_group=None,
425 425 landing_rev='rev:tip', fork_of=None,
426 426 copy_fork_permissions=False, enable_statistics=False,
427 427 enable_locking=False, enable_downloads=False,
428 428 copy_group_permissions=False,
429 429 state=Repository.STATE_PENDING):
430 430 """
431 431 Create repository inside database with PENDING state, this should be
432 432 only executed by create() repo. With exception of importing existing
433 433 repos
434 434 """
435 435 from rhodecode.model.scm import ScmModel
436 436
437 437 owner = self._get_user(owner)
438 438 fork_of = self._get_repo(fork_of)
439 439 repo_group = self._get_repo_group(safe_int(repo_group))
440 440
441 441 try:
442 442 repo_name = safe_unicode(repo_name)
443 443 description = safe_unicode(description)
444 444 # repo name is just a name of repository
445 445 # while repo_name_full is a full qualified name that is combined
446 446 # with name and path of group
447 447 repo_name_full = repo_name
448 448 repo_name = repo_name.split(Repository.NAME_SEP)[-1]
449 449
450 450 new_repo = Repository()
451 451 new_repo.repo_state = state
452 452 new_repo.enable_statistics = False
453 453 new_repo.repo_name = repo_name_full
454 454 new_repo.repo_type = repo_type
455 455 new_repo.user = owner
456 456 new_repo.group = repo_group
457 457 new_repo.description = description or repo_name
458 458 new_repo.private = private
459 459 new_repo.clone_uri = clone_uri
460 460 new_repo.landing_rev = landing_rev
461 461
462 462 new_repo.enable_statistics = enable_statistics
463 463 new_repo.enable_locking = enable_locking
464 464 new_repo.enable_downloads = enable_downloads
465 465
466 466 if repo_group:
467 467 new_repo.enable_locking = repo_group.enable_locking
468 468
469 469 if fork_of:
470 470 parent_repo = fork_of
471 471 new_repo.fork = parent_repo
472 472
473 473 self.sa.add(new_repo)
474 474
475 475 EMPTY_PERM = 'repository.none'
476 476 if fork_of and copy_fork_permissions:
477 477 repo = fork_of
478 478 user_perms = UserRepoToPerm.query() \
479 479 .filter(UserRepoToPerm.repository == repo).all()
480 480 group_perms = UserGroupRepoToPerm.query() \
481 481 .filter(UserGroupRepoToPerm.repository == repo).all()
482 482
483 483 for perm in user_perms:
484 484 UserRepoToPerm.create(
485 485 perm.user, new_repo, perm.permission)
486 486
487 487 for perm in group_perms:
488 488 UserGroupRepoToPerm.create(
489 489 perm.users_group, new_repo, perm.permission)
490 490 # in case we copy permissions and also set this repo to private
491 491 # override the default user permission to make it a private
492 492 # repo
493 493 if private:
494 494 RepoModel(self.sa).grant_user_permission(
495 495 repo=new_repo, user=User.DEFAULT_USER, perm=EMPTY_PERM)
496 496
497 497 elif repo_group and copy_group_permissions:
498 498 user_perms = UserRepoGroupToPerm.query() \
499 499 .filter(UserRepoGroupToPerm.group == repo_group).all()
500 500
501 501 group_perms = UserGroupRepoGroupToPerm.query() \
502 502 .filter(UserGroupRepoGroupToPerm.group == repo_group).all()
503 503
504 504 for perm in user_perms:
505 505 perm_name = perm.permission.permission_name.replace(
506 506 'group.', 'repository.')
507 507 perm_obj = Permission.get_by_key(perm_name)
508 508 UserRepoToPerm.create(perm.user, new_repo, perm_obj)
509 509
510 510 for perm in group_perms:
511 511 perm_name = perm.permission.permission_name.replace(
512 512 'group.', 'repository.')
513 513 perm_obj = Permission.get_by_key(perm_name)
514 514 UserGroupRepoToPerm.create(
515 515 perm.users_group, new_repo, perm_obj)
516 516
517 517 if private:
518 518 RepoModel(self.sa).grant_user_permission(
519 519 repo=new_repo, user=User.DEFAULT_USER, perm=EMPTY_PERM)
520 520
521 521 else:
522 522 perm_obj = self._create_default_perms(new_repo, private)
523 523 self.sa.add(perm_obj)
524 524
525 525 # now automatically start following this repository as owner
526 526 ScmModel(self.sa).toggle_following_repo(new_repo.repo_id,
527 527 owner.user_id)
528 528 # we need to flush here, in order to check if database won't
529 529 # throw any exceptions, create filesystem dirs at the very end
530 530 self.sa.flush()
531 531
532 532 return new_repo
533 533 except Exception:
534 534 log.error(traceback.format_exc())
535 535 raise
536 536
537 537 def create(self, form_data, cur_user):
538 538 """
539 539 Create repository using celery tasks
540 540
541 541 :param form_data:
542 542 :param cur_user:
543 543 """
544 544 from rhodecode.lib.celerylib import tasks, run_task
545 545 return run_task(tasks.create_repo, form_data, cur_user)
546 546
547 547 def update_permissions(self, repo, perm_additions=None, perm_updates=None,
548 548 perm_deletions=None, check_perms=True,
549 549 cur_user=None):
550 550 if not perm_additions:
551 551 perm_additions = []
552 552 if not perm_updates:
553 553 perm_updates = []
554 554 if not perm_deletions:
555 555 perm_deletions = []
556 556
557 557 req_perms = ('usergroup.read', 'usergroup.write', 'usergroup.admin')
558 558
559 559 # update permissions
560 560 for member_id, perm, member_type in perm_updates:
561 561 member_id = int(member_id)
562 562 if member_type == 'user':
563 563 # this updates also current one if found
564 564 self.grant_user_permission(
565 565 repo=repo, user=member_id, perm=perm)
566 566 else: # set for user group
567 567 # check if we have permissions to alter this usergroup
568 568 member_name = UserGroup.get(member_id).users_group_name
569 569 if not check_perms or HasUserGroupPermissionAny(
570 570 *req_perms)(member_name, user=cur_user):
571 571 self.grant_user_group_permission(
572 572 repo=repo, group_name=member_id, perm=perm)
573 573
574 574 # set new permissions
575 575 for member_id, perm, member_type in perm_additions:
576 576 member_id = int(member_id)
577 577 if member_type == 'user':
578 578 self.grant_user_permission(
579 579 repo=repo, user=member_id, perm=perm)
580 580 else: # set for user group
581 581 # check if we have permissions to alter this usergroup
582 582 member_name = UserGroup.get(member_id).users_group_name
583 583 if not check_perms or HasUserGroupPermissionAny(
584 584 *req_perms)(member_name, user=cur_user):
585 585 self.grant_user_group_permission(
586 586 repo=repo, group_name=member_id, perm=perm)
587 587
588 588 # delete permissions
589 589 for member_id, perm, member_type in perm_deletions:
590 590 member_id = int(member_id)
591 591 if member_type == 'user':
592 592 self.revoke_user_permission(repo=repo, user=member_id)
593 593 else: # set for user group
594 594 # check if we have permissions to alter this usergroup
595 595 member_name = UserGroup.get(member_id).users_group_name
596 596 if not check_perms or HasUserGroupPermissionAny(
597 597 *req_perms)(member_name, user=cur_user):
598 598 self.revoke_user_group_permission(
599 599 repo=repo, group_name=member_id)
600 600
601 601 def create_fork(self, form_data, cur_user):
602 602 """
603 603 Simple wrapper into executing celery task for fork creation
604 604
605 605 :param form_data:
606 606 :param cur_user:
607 607 """
608 608 from rhodecode.lib.celerylib import tasks, run_task
609 609 return run_task(tasks.create_repo_fork, form_data, cur_user)
610 610
611 611 def delete(self, repo, forks=None, fs_remove=True, cur_user=None):
612 612 """
613 613 Delete given repository, forks parameter defines what do do with
614 614 attached forks. Throws AttachedForksError if deleted repo has attached
615 615 forks
616 616
617 617 :param repo:
618 618 :param forks: str 'delete' or 'detach'
619 619 :param fs_remove: remove(archive) repo from filesystem
620 620 """
621 621 if not cur_user:
622 622 cur_user = getattr(get_current_rhodecode_user(), 'username', None)
623 623 repo = self._get_repo(repo)
624 624 if repo:
625 625 if forks == 'detach':
626 626 for r in repo.forks:
627 627 r.fork = None
628 628 self.sa.add(r)
629 629 elif forks == 'delete':
630 630 for r in repo.forks:
631 631 self.delete(r, forks='delete')
632 632 elif [f for f in repo.forks]:
633 633 raise AttachedForksError()
634 634
635 635 old_repo_dict = repo.get_dict()
636 636 try:
637 637 self.sa.delete(repo)
638 638 if fs_remove:
639 639 self._delete_filesystem_repo(repo)
640 640 else:
641 641 log.debug('skipping removal from filesystem')
642 642 old_repo_dict.update({
643 643 'deleted_by': cur_user,
644 644 'deleted_on': time.time(),
645 645 })
646 646 log_delete_repository(**old_repo_dict)
647 647 except Exception:
648 648 log.error(traceback.format_exc())
649 649 raise
650 650
651 651 def grant_user_permission(self, repo, user, perm):
652 652 """
653 653 Grant permission for user on given repository, or update existing one
654 654 if found
655 655
656 656 :param repo: Instance of Repository, repository_id, or repository name
657 657 :param user: Instance of User, user_id or username
658 658 :param perm: Instance of Permission, or permission_name
659 659 """
660 660 user = self._get_user(user)
661 661 repo = self._get_repo(repo)
662 662 permission = self._get_perm(perm)
663 663
664 664 # check if we have that permission already
665 665 obj = self.sa.query(UserRepoToPerm) \
666 666 .filter(UserRepoToPerm.user == user) \
667 667 .filter(UserRepoToPerm.repository == repo) \
668 668 .scalar()
669 669 if obj is None:
670 670 # create new !
671 671 obj = UserRepoToPerm()
672 672 obj.repository = repo
673 673 obj.user = user
674 674 obj.permission = permission
675 675 self.sa.add(obj)
676 676 log.debug('Granted perm %s to %s on %s', perm, user, repo)
677 677 action_logger_generic(
678 678 'granted permission: {} to user: {} on repo: {}'.format(
679 679 perm, user, repo), namespace='security.repo')
680 680 return obj
681 681
682 682 def revoke_user_permission(self, repo, user):
683 683 """
684 684 Revoke permission for user on given repository
685 685
686 686 :param repo: Instance of Repository, repository_id, or repository name
687 687 :param user: Instance of User, user_id or username
688 688 """
689 689
690 690 user = self._get_user(user)
691 691 repo = self._get_repo(repo)
692 692
693 693 obj = self.sa.query(UserRepoToPerm) \
694 694 .filter(UserRepoToPerm.repository == repo) \
695 695 .filter(UserRepoToPerm.user == user) \
696 696 .scalar()
697 697 if obj:
698 698 self.sa.delete(obj)
699 699 log.debug('Revoked perm on %s on %s', repo, user)
700 700 action_logger_generic(
701 701 'revoked permission from user: {} on repo: {}'.format(
702 702 user, repo), namespace='security.repo')
703 703
704 704 def grant_user_group_permission(self, repo, group_name, perm):
705 705 """
706 706 Grant permission for user group on given repository, or update
707 707 existing one if found
708 708
709 709 :param repo: Instance of Repository, repository_id, or repository name
710 710 :param group_name: Instance of UserGroup, users_group_id,
711 711 or user group name
712 712 :param perm: Instance of Permission, or permission_name
713 713 """
714 714 repo = self._get_repo(repo)
715 715 group_name = self._get_user_group(group_name)
716 716 permission = self._get_perm(perm)
717 717
718 718 # check if we have that permission already
719 719 obj = self.sa.query(UserGroupRepoToPerm) \
720 720 .filter(UserGroupRepoToPerm.users_group == group_name) \
721 721 .filter(UserGroupRepoToPerm.repository == repo) \
722 722 .scalar()
723 723
724 724 if obj is None:
725 725 # create new
726 726 obj = UserGroupRepoToPerm()
727 727
728 728 obj.repository = repo
729 729 obj.users_group = group_name
730 730 obj.permission = permission
731 731 self.sa.add(obj)
732 732 log.debug('Granted perm %s to %s on %s', perm, group_name, repo)
733 733 action_logger_generic(
734 734 'granted permission: {} to usergroup: {} on repo: {}'.format(
735 735 perm, group_name, repo), namespace='security.repo')
736 736
737 737 return obj
738 738
739 739 def revoke_user_group_permission(self, repo, group_name):
740 740 """
741 741 Revoke permission for user group on given repository
742 742
743 743 :param repo: Instance of Repository, repository_id, or repository name
744 744 :param group_name: Instance of UserGroup, users_group_id,
745 745 or user group name
746 746 """
747 747 repo = self._get_repo(repo)
748 748 group_name = self._get_user_group(group_name)
749 749
750 750 obj = self.sa.query(UserGroupRepoToPerm) \
751 751 .filter(UserGroupRepoToPerm.repository == repo) \
752 752 .filter(UserGroupRepoToPerm.users_group == group_name) \
753 753 .scalar()
754 754 if obj:
755 755 self.sa.delete(obj)
756 756 log.debug('Revoked perm to %s on %s', repo, group_name)
757 757 action_logger_generic(
758 758 'revoked permission from usergroup: {} on repo: {}'.format(
759 759 group_name, repo), namespace='security.repo')
760 760
761 761 def delete_stats(self, repo_name):
762 762 """
763 763 removes stats for given repo
764 764
765 765 :param repo_name:
766 766 """
767 767 repo = self._get_repo(repo_name)
768 768 try:
769 769 obj = self.sa.query(Statistics) \
770 770 .filter(Statistics.repository == repo).scalar()
771 771 if obj:
772 772 self.sa.delete(obj)
773 773 except Exception:
774 774 log.error(traceback.format_exc())
775 775 raise
776 776
777 777 def add_repo_field(self, repo_name, field_key, field_label, field_value='',
778 778 field_type='str', field_desc=''):
779 779
780 780 repo = self._get_repo(repo_name)
781 781
782 782 new_field = RepositoryField()
783 783 new_field.repository = repo
784 784 new_field.field_key = field_key
785 785 new_field.field_type = field_type # python type
786 786 new_field.field_value = field_value
787 787 new_field.field_desc = field_desc
788 788 new_field.field_label = field_label
789 789 self.sa.add(new_field)
790 790 return new_field
791 791
792 792 def delete_repo_field(self, repo_name, field_key):
793 793 repo = self._get_repo(repo_name)
794 794 field = RepositoryField.get_by_key_name(field_key, repo)
795 795 if field:
796 796 self.sa.delete(field)
797 797
798 798 def _create_filesystem_repo(self, repo_name, repo_type, repo_group,
799 799 clone_uri=None, repo_store_location=None,
800 800 use_global_config=False):
801 801 """
802 802 makes repository on filesystem. It's group aware means it'll create
803 803 a repository within a group, and alter the paths accordingly of
804 804 group location
805 805
806 806 :param repo_name:
807 807 :param alias:
808 808 :param parent:
809 809 :param clone_uri:
810 810 :param repo_store_location:
811 811 """
812 812 from rhodecode.lib.utils import is_valid_repo, is_valid_repo_group
813 813 from rhodecode.model.scm import ScmModel
814 814
815 815 if Repository.NAME_SEP in repo_name:
816 816 raise ValueError(
817 817 'repo_name must not contain groups got `%s`' % repo_name)
818 818
819 819 if isinstance(repo_group, RepoGroup):
820 820 new_parent_path = os.sep.join(repo_group.full_path_splitted)
821 821 else:
822 822 new_parent_path = repo_group or ''
823 823
824 824 if repo_store_location:
825 825 _paths = [repo_store_location]
826 826 else:
827 827 _paths = [self.repos_path, new_parent_path, repo_name]
828 828 # we need to make it str for mercurial
829 829 repo_path = os.path.join(*map(lambda x: safe_str(x), _paths))
830 830
831 831 # check if this path is not a repository
832 832 if is_valid_repo(repo_path, self.repos_path):
833 833 raise Exception('This path %s is a valid repository' % repo_path)
834 834
835 835 # check if this path is a group
836 836 if is_valid_repo_group(repo_path, self.repos_path):
837 837 raise Exception('This path %s is a valid group' % repo_path)
838 838
839 839 log.info('creating repo %s in %s from url: `%s`',
840 840 repo_name, safe_unicode(repo_path),
841 841 obfuscate_url_pw(clone_uri))
842 842
843 843 backend = get_backend(repo_type)
844 844
845 845 config_repo = None if use_global_config else repo_name
846 846 if config_repo and new_parent_path:
847 847 config_repo = Repository.NAME_SEP.join(
848 848 (new_parent_path, config_repo))
849 849 config = make_db_config(clear_session=False, repo=config_repo)
850 850 config.set('extensions', 'largefiles', '')
851 851
852 852 # patch and reset hooks section of UI config to not run any
853 853 # hooks on creating remote repo
854 854 config.clear_section('hooks')
855 855
856 856 # TODO: johbo: Unify this, hardcoded "bare=True" does not look nice
857 857 if repo_type == 'git':
858 858 repo = backend(
859 859 repo_path, config=config, create=True, src_url=clone_uri,
860 860 bare=True)
861 861 else:
862 862 repo = backend(
863 863 repo_path, config=config, create=True, src_url=clone_uri)
864 864
865 865 ScmModel().install_hooks(repo, repo_type=repo_type)
866 866
867 867 log.debug('Created repo %s with %s backend',
868 868 safe_unicode(repo_name), safe_unicode(repo_type))
869 869 return repo
870 870
871 871 def _rename_filesystem_repo(self, old, new):
872 872 """
873 873 renames repository on filesystem
874 874
875 875 :param old: old name
876 876 :param new: new name
877 877 """
878 878 log.info('renaming repo from %s to %s', old, new)
879 879
880 880 old_path = os.path.join(self.repos_path, old)
881 881 new_path = os.path.join(self.repos_path, new)
882 882 if os.path.isdir(new_path):
883 883 raise Exception(
884 884 'Was trying to rename to already existing dir %s' % new_path
885 885 )
886 886 shutil.move(old_path, new_path)
887 887
888 888 def _delete_filesystem_repo(self, repo):
889 889 """
890 890 removes repo from filesystem, the removal is acctually made by
891 891 added rm__ prefix into dir, and rename internat .hg/.git dirs so this
892 892 repository is no longer valid for rhodecode, can be undeleted later on
893 893 by reverting the renames on this repository
894 894
895 895 :param repo: repo object
896 896 """
897 897 rm_path = os.path.join(self.repos_path, repo.repo_name)
898 898 repo_group = repo.group
899 899 log.info("Removing repository %s", rm_path)
900 900 # disable hg/git internal that it doesn't get detected as repo
901 901 alias = repo.repo_type
902 902
903 903 config = make_db_config(clear_session=False)
904 904 config.set('extensions', 'largefiles', '')
905 905 bare = getattr(repo.scm_instance(config=config), 'bare', False)
906 906
907 907 # skip this for bare git repos
908 908 if not bare:
909 909 # disable VCS repo
910 910 vcs_path = os.path.join(rm_path, '.%s' % alias)
911 911 if os.path.exists(vcs_path):
912 912 shutil.move(vcs_path, os.path.join(rm_path, 'rm__.%s' % alias))
913 913
914 914 _now = datetime.now()
915 915 _ms = str(_now.microsecond).rjust(6, '0')
916 916 _d = 'rm__%s__%s' % (_now.strftime('%Y%m%d_%H%M%S_' + _ms),
917 917 repo.just_name)
918 918 if repo_group:
919 919 # if repository is in group, prefix the removal path with the group
920 920 args = repo_group.full_path_splitted + [_d]
921 921 _d = os.path.join(*args)
922 922
923 923 if os.path.isdir(rm_path):
924 924 shutil.move(rm_path, os.path.join(self.repos_path, _d))
@@ -1,838 +1,838 b''
1 1 # -*- coding: utf-8 -*-
2 2
3 3 # Copyright (C) 2010-2016 RhodeCode GmbH
4 4 #
5 5 # This program is free software: you can redistribute it and/or modify
6 6 # it under the terms of the GNU Affero General Public License, version 3
7 7 # (only), as published by the Free Software Foundation.
8 8 #
9 9 # This program is distributed in the hope that it will be useful,
10 10 # but WITHOUT ANY WARRANTY; without even the implied warranty of
11 11 # MERCHANTABILITY or FITNESS FOR A PARTICULAR PURPOSE. See the
12 12 # GNU General Public License for more details.
13 13 #
14 14 # You should have received a copy of the GNU Affero General Public License
15 15 # along with this program. If not, see <http://www.gnu.org/licenses/>.
16 16 #
17 17 # This program is dual-licensed. If you wish to learn more about the
18 18 # RhodeCode Enterprise Edition, including its added features, Support services,
19 19 # and proprietary license terms, please see https://rhodecode.com/licenses/
20 20
21 21 """
22 22 users model for RhodeCode
23 23 """
24 24
25 25 import logging
26 26 import traceback
27 27
28 28 import datetime
29 29 from pylons.i18n.translation import _
30 30
31 31 import ipaddress
32 32 from sqlalchemy.exc import DatabaseError
33 33 from sqlalchemy.sql.expression import true, false
34 34
35 35 from rhodecode.events import UserPreCreate, UserPreUpdate
36 36 from rhodecode.lib.utils2 import (
37 37 safe_unicode, get_current_rhodecode_user, action_logger_generic,
38 38 AttributeDict)
39 39 from rhodecode.lib.caching_query import FromCache
40 40 from rhodecode.model import BaseModel
41 41 from rhodecode.model.auth_token import AuthTokenModel
42 42 from rhodecode.model.db import (
43 43 User, UserToPerm, UserEmailMap, UserIpMap)
44 44 from rhodecode.lib.exceptions import (
45 45 DefaultUserException, UserOwnsReposException, UserOwnsRepoGroupsException,
46 46 UserOwnsUserGroupsException, NotAllowedToCreateUserError)
47 47 from rhodecode.model.meta import Session
48 48 from rhodecode.model.repo_group import RepoGroupModel
49 49
50 50
51 51 log = logging.getLogger(__name__)
52 52
53 53
54 54 class UserModel(BaseModel):
55 55 cls = User
56 56
57 57 def get(self, user_id, cache=False):
58 58 user = self.sa.query(User)
59 59 if cache:
60 60 user = user.options(FromCache("sql_cache_short",
61 61 "get_user_%s" % user_id))
62 62 return user.get(user_id)
63 63
64 64 def get_user(self, user):
65 65 return self._get_user(user)
66 66
67 67 def get_by_username(self, username, cache=False, case_insensitive=False):
68 68
69 69 if case_insensitive:
70 70 user = self.sa.query(User).filter(User.username.ilike(username))
71 71 else:
72 72 user = self.sa.query(User)\
73 73 .filter(User.username == username)
74 74 if cache:
75 75 user = user.options(FromCache("sql_cache_short",
76 76 "get_user_%s" % username))
77 77 return user.scalar()
78 78
79 79 def get_by_email(self, email, cache=False, case_insensitive=False):
80 80 return User.get_by_email(email, case_insensitive, cache)
81 81
82 82 def get_by_auth_token(self, auth_token, cache=False):
83 83 return User.get_by_auth_token(auth_token, cache)
84 84
85 85 def get_active_user_count(self, cache=False):
86 86 return User.query().filter(
87 87 User.active == True).filter(
88 88 User.username != User.DEFAULT_USER).count()
89 89
90 90 def create(self, form_data, cur_user=None):
91 91 if not cur_user:
92 92 cur_user = getattr(get_current_rhodecode_user(), 'username', None)
93 93
94 94 user_data = {
95 95 'username': form_data['username'],
96 96 'password': form_data['password'],
97 97 'email': form_data['email'],
98 98 'firstname': form_data['firstname'],
99 99 'lastname': form_data['lastname'],
100 100 'active': form_data['active'],
101 101 'extern_type': form_data['extern_type'],
102 102 'extern_name': form_data['extern_name'],
103 103 'admin': False,
104 104 'cur_user': cur_user
105 105 }
106 106
107 107 try:
108 108 if form_data.get('create_repo_group'):
109 109 user_data['create_repo_group'] = True
110 110 if form_data.get('password_change'):
111 111 user_data['force_password_change'] = True
112 112
113 113 return UserModel().create_or_update(**user_data)
114 114 except Exception:
115 115 log.error(traceback.format_exc())
116 116 raise
117 117
118 118 def update_user(self, user, skip_attrs=None, **kwargs):
119 119 from rhodecode.lib.auth import get_crypt_password
120 120
121 121 user = self._get_user(user)
122 122 if user.username == User.DEFAULT_USER:
123 123 raise DefaultUserException(
124 124 _("You can't Edit this user since it's"
125 125 " crucial for entire application"))
126 126
127 127 # first store only defaults
128 128 user_attrs = {
129 129 'updating_user_id': user.user_id,
130 130 'username': user.username,
131 131 'password': user.password,
132 132 'email': user.email,
133 133 'firstname': user.name,
134 134 'lastname': user.lastname,
135 135 'active': user.active,
136 136 'admin': user.admin,
137 137 'extern_name': user.extern_name,
138 138 'extern_type': user.extern_type,
139 139 'language': user.user_data.get('language')
140 140 }
141 141
142 142 # in case there's new_password, that comes from form, use it to
143 143 # store password
144 144 if kwargs.get('new_password'):
145 145 kwargs['password'] = kwargs['new_password']
146 146
147 147 # cleanups, my_account password change form
148 148 kwargs.pop('current_password', None)
149 149 kwargs.pop('new_password', None)
150 150 kwargs.pop('new_password_confirmation', None)
151 151
152 152 # cleanups, user edit password change form
153 153 kwargs.pop('password_confirmation', None)
154 154 kwargs.pop('password_change', None)
155 155
156 156 # create repo group on user creation
157 157 kwargs.pop('create_repo_group', None)
158 158
159 159 # legacy forms send name, which is the firstname
160 160 firstname = kwargs.pop('name', None)
161 161 if firstname:
162 162 kwargs['firstname'] = firstname
163 163
164 164 for k, v in kwargs.items():
165 165 # skip if we don't want to update this
166 166 if skip_attrs and k in skip_attrs:
167 167 continue
168 168
169 169 user_attrs[k] = v
170 170
171 171 try:
172 172 return self.create_or_update(**user_attrs)
173 173 except Exception:
174 174 log.error(traceback.format_exc())
175 175 raise
176 176
177 177 def create_or_update(
178 178 self, username, password, email, firstname='', lastname='',
179 179 active=True, admin=False, extern_type=None, extern_name=None,
180 180 cur_user=None, plugin=None, force_password_change=False,
181 181 allow_to_create_user=True, create_repo_group=False,
182 182 updating_user_id=None, language=None, strict_creation_check=True):
183 183 """
184 184 Creates a new instance if not found, or updates current one
185 185
186 186 :param username:
187 187 :param password:
188 188 :param email:
189 189 :param firstname:
190 190 :param lastname:
191 191 :param active:
192 192 :param admin:
193 193 :param extern_type:
194 194 :param extern_name:
195 195 :param cur_user:
196 196 :param plugin: optional plugin this method was called from
197 197 :param force_password_change: toggles new or existing user flag
198 198 for password change
199 199 :param allow_to_create_user: Defines if the method can actually create
200 200 new users
201 201 :param create_repo_group: Defines if the method should also
202 202 create an repo group with user name, and owner
203 203 :param updating_user_id: if we set it up this is the user we want to
204 204 update this allows to editing username.
205 205 :param language: language of user from interface.
206 206
207 207 :returns: new User object with injected `is_new_user` attribute.
208 208 """
209 209 if not cur_user:
210 210 cur_user = getattr(get_current_rhodecode_user(), 'username', None)
211 211
212 212 from rhodecode.lib.auth import (
213 213 get_crypt_password, check_password, generate_auth_token)
214 214 from rhodecode.lib.hooks_base import (
215 215 log_create_user, check_allowed_create_user)
216 216
217 217 def _password_change(new_user, password):
218 218 # empty password
219 219 if not new_user.password:
220 220 return False
221 221
222 222 # password check is only needed for RhodeCode internal auth calls
223 223 # in case it's a plugin we don't care
224 224 if not plugin:
225 225
226 226 # first check if we gave crypted password back, and if it matches
227 227 # it's not password change
228 228 if new_user.password == password:
229 229 return False
230 230
231 231 password_match = check_password(password, new_user.password)
232 232 if not password_match:
233 233 return True
234 234
235 235 return False
236 236
237 237 user_data = {
238 238 'username': username,
239 239 'password': password,
240 240 'email': email,
241 241 'firstname': firstname,
242 242 'lastname': lastname,
243 243 'active': active,
244 244 'admin': admin
245 245 }
246 246
247 247 if updating_user_id:
248 248 log.debug('Checking for existing account in RhodeCode '
249 249 'database with user_id `%s` ' % (updating_user_id,))
250 250 user = User.get(updating_user_id)
251 251 else:
252 252 log.debug('Checking for existing account in RhodeCode '
253 253 'database with username `%s` ' % (username,))
254 254 user = User.get_by_username(username, case_insensitive=True)
255 255
256 256 if user is None:
257 257 # we check internal flag if this method is actually allowed to
258 258 # create new user
259 259 if not allow_to_create_user:
260 260 msg = ('Method wants to create new user, but it is not '
261 261 'allowed to do so')
262 262 log.warning(msg)
263 263 raise NotAllowedToCreateUserError(msg)
264 264
265 265 log.debug('Creating new user %s', username)
266 266
267 267 # only if we create user that is active
268 268 new_active_user = active
269 269 if new_active_user and strict_creation_check:
270 270 # raises UserCreationError if it's not allowed for any reason to
271 271 # create new active user, this also executes pre-create hooks
272 272 check_allowed_create_user(user_data, cur_user, strict_check=True)
273 273 self.send_event(UserPreCreate(user_data))
274 274 new_user = User()
275 275 edit = False
276 276 else:
277 277 log.debug('updating user %s', username)
278 278 self.send_event(UserPreUpdate(user, user_data))
279 279 new_user = user
280 280 edit = True
281 281
282 282 # we're not allowed to edit default user
283 283 if user.username == User.DEFAULT_USER:
284 284 raise DefaultUserException(
285 285 _("You can't edit this user (`%(username)s`) since it's "
286 286 "crucial for entire application") % {'username': user.username})
287 287
288 288 # inject special attribute that will tell us if User is new or old
289 289 new_user.is_new_user = not edit
290 290 # for users that didn's specify auth type, we use RhodeCode built in
291 291 from rhodecode.authentication.plugins import auth_rhodecode
292 292 extern_name = extern_name or auth_rhodecode.RhodeCodeAuthPlugin.name
293 293 extern_type = extern_type or auth_rhodecode.RhodeCodeAuthPlugin.name
294 294
295 295 try:
296 296 new_user.username = username
297 297 new_user.admin = admin
298 298 new_user.email = email
299 299 new_user.active = active
300 300 new_user.extern_name = safe_unicode(extern_name)
301 301 new_user.extern_type = safe_unicode(extern_type)
302 302 new_user.name = firstname
303 303 new_user.lastname = lastname
304 304
305 305 if not edit:
306 306 new_user.api_key = generate_auth_token(username)
307 307
308 308 # set password only if creating an user or password is changed
309 309 if not edit or _password_change(new_user, password):
310 310 reason = 'new password' if edit else 'new user'
311 311 log.debug('Updating password reason=>%s', reason)
312 312 new_user.password = get_crypt_password(password) if password else None
313 313
314 314 if force_password_change:
315 315 new_user.update_userdata(force_password_change=True)
316 316 if language:
317 317 new_user.update_userdata(language=language)
318 318
319 319 self.sa.add(new_user)
320 320
321 321 if not edit and create_repo_group:
322 322 # create new group same as username, and make this user an owner
323 323 desc = RepoGroupModel.PERSONAL_GROUP_DESC % {'username': username}
324 324 RepoGroupModel().create(group_name=username,
325 325 group_description=desc,
326 326 owner=username, commit_early=False)
327 327 if not edit:
328 328 # add the RSS token
329 329 AuthTokenModel().create(username,
330 330 description='Generated feed token',
331 331 role=AuthTokenModel.cls.ROLE_FEED)
332 332 log_create_user(created_by=cur_user, **new_user.get_dict())
333 333 return new_user
334 334 except (DatabaseError,):
335 335 log.error(traceback.format_exc())
336 336 raise
337 337
338 338 def create_registration(self, form_data):
339 339 from rhodecode.model.notification import NotificationModel
340 340 from rhodecode.model.notification import EmailNotificationModel
341 341
342 342 try:
343 343 form_data['admin'] = False
344 344 form_data['extern_name'] = 'rhodecode'
345 345 form_data['extern_type'] = 'rhodecode'
346 346 new_user = self.create(form_data)
347 347
348 348 self.sa.add(new_user)
349 349 self.sa.flush()
350 350
351 351 user_data = new_user.get_dict()
352 352 kwargs = {
353 353 # use SQLALCHEMY safe dump of user data
354 354 'user': AttributeDict(user_data),
355 355 'date': datetime.datetime.now()
356 356 }
357 357 notification_type = EmailNotificationModel.TYPE_REGISTRATION
358 358 # pre-generate the subject for notification itself
359 359 (subject,
360 360 _h, _e, # we don't care about those
361 361 body_plaintext) = EmailNotificationModel().render_email(
362 362 notification_type, **kwargs)
363 363
364 364 # create notification objects, and emails
365 365 NotificationModel().create(
366 366 created_by=new_user,
367 367 notification_subject=subject,
368 368 notification_body=body_plaintext,
369 369 notification_type=notification_type,
370 370 recipients=None, # all admins
371 371 email_kwargs=kwargs,
372 372 )
373 373
374 374 return new_user
375 375 except Exception:
376 376 log.error(traceback.format_exc())
377 377 raise
378 378
379 379 def _handle_user_repos(self, username, repositories, handle_mode=None):
380 _superadmin = self.cls.get_first_admin()
380 _superadmin = self.cls.get_first_super_admin()
381 381 left_overs = True
382 382
383 383 from rhodecode.model.repo import RepoModel
384 384
385 385 if handle_mode == 'detach':
386 386 for obj in repositories:
387 387 obj.user = _superadmin
388 388 # set description we know why we super admin now owns
389 389 # additional repositories that were orphaned !
390 390 obj.description += ' \n::detached repository from deleted user: %s' % (username,)
391 391 self.sa.add(obj)
392 392 left_overs = False
393 393 elif handle_mode == 'delete':
394 394 for obj in repositories:
395 395 RepoModel().delete(obj, forks='detach')
396 396 left_overs = False
397 397
398 398 # if nothing is done we have left overs left
399 399 return left_overs
400 400
401 401 def _handle_user_repo_groups(self, username, repository_groups,
402 402 handle_mode=None):
403 _superadmin = self.cls.get_first_admin()
403 _superadmin = self.cls.get_first_super_admin()
404 404 left_overs = True
405 405
406 406 from rhodecode.model.repo_group import RepoGroupModel
407 407
408 408 if handle_mode == 'detach':
409 409 for r in repository_groups:
410 410 r.user = _superadmin
411 411 # set description we know why we super admin now owns
412 412 # additional repositories that were orphaned !
413 413 r.group_description += ' \n::detached repository group from deleted user: %s' % (username,)
414 414 self.sa.add(r)
415 415 left_overs = False
416 416 elif handle_mode == 'delete':
417 417 for r in repository_groups:
418 418 RepoGroupModel().delete(r)
419 419 left_overs = False
420 420
421 421 # if nothing is done we have left overs left
422 422 return left_overs
423 423
424 424 def _handle_user_user_groups(self, username, user_groups, handle_mode=None):
425 _superadmin = self.cls.get_first_admin()
425 _superadmin = self.cls.get_first_super_admin()
426 426 left_overs = True
427 427
428 428 from rhodecode.model.user_group import UserGroupModel
429 429
430 430 if handle_mode == 'detach':
431 431 for r in user_groups:
432 432 for user_user_group_to_perm in r.user_user_group_to_perm:
433 433 if user_user_group_to_perm.user.username == username:
434 434 user_user_group_to_perm.user = _superadmin
435 435 r.user = _superadmin
436 436 # set description we know why we super admin now owns
437 437 # additional repositories that were orphaned !
438 438 r.user_group_description += ' \n::detached user group from deleted user: %s' % (username,)
439 439 self.sa.add(r)
440 440 left_overs = False
441 441 elif handle_mode == 'delete':
442 442 for r in user_groups:
443 443 UserGroupModel().delete(r)
444 444 left_overs = False
445 445
446 446 # if nothing is done we have left overs left
447 447 return left_overs
448 448
449 449 def delete(self, user, cur_user=None, handle_repos=None,
450 450 handle_repo_groups=None, handle_user_groups=None):
451 451 if not cur_user:
452 452 cur_user = getattr(get_current_rhodecode_user(), 'username', None)
453 453 user = self._get_user(user)
454 454
455 455 try:
456 456 if user.username == User.DEFAULT_USER:
457 457 raise DefaultUserException(
458 458 _(u"You can't remove this user since it's"
459 459 u" crucial for entire application"))
460 460
461 461 left_overs = self._handle_user_repos(
462 462 user.username, user.repositories, handle_repos)
463 463 if left_overs and user.repositories:
464 464 repos = [x.repo_name for x in user.repositories]
465 465 raise UserOwnsReposException(
466 466 _(u'user "%s" still owns %s repositories and cannot be '
467 467 u'removed. Switch owners or remove those repositories:%s')
468 468 % (user.username, len(repos), ', '.join(repos)))
469 469
470 470 left_overs = self._handle_user_repo_groups(
471 471 user.username, user.repository_groups, handle_repo_groups)
472 472 if left_overs and user.repository_groups:
473 473 repo_groups = [x.group_name for x in user.repository_groups]
474 474 raise UserOwnsRepoGroupsException(
475 475 _(u'user "%s" still owns %s repository groups and cannot be '
476 476 u'removed. Switch owners or remove those repository groups:%s')
477 477 % (user.username, len(repo_groups), ', '.join(repo_groups)))
478 478
479 479 left_overs = self._handle_user_user_groups(
480 480 user.username, user.user_groups, handle_user_groups)
481 481 if left_overs and user.user_groups:
482 482 user_groups = [x.users_group_name for x in user.user_groups]
483 483 raise UserOwnsUserGroupsException(
484 484 _(u'user "%s" still owns %s user groups and cannot be '
485 485 u'removed. Switch owners or remove those user groups:%s')
486 486 % (user.username, len(user_groups), ', '.join(user_groups)))
487 487
488 488 # we might change the user data with detach/delete, make sure
489 489 # the object is marked as expired before actually deleting !
490 490 self.sa.expire(user)
491 491 self.sa.delete(user)
492 492 from rhodecode.lib.hooks_base import log_delete_user
493 493 log_delete_user(deleted_by=cur_user, **user.get_dict())
494 494 except Exception:
495 495 log.error(traceback.format_exc())
496 496 raise
497 497
498 498 def reset_password_link(self, data, pwd_reset_url):
499 499 from rhodecode.lib.celerylib import tasks, run_task
500 500 from rhodecode.model.notification import EmailNotificationModel
501 501 user_email = data['email']
502 502 try:
503 503 user = User.get_by_email(user_email)
504 504 if user:
505 505 log.debug('password reset user found %s', user)
506 506
507 507 email_kwargs = {
508 508 'password_reset_url': pwd_reset_url,
509 509 'user': user,
510 510 'email': user_email,
511 511 'date': datetime.datetime.now()
512 512 }
513 513
514 514 (subject, headers, email_body,
515 515 email_body_plaintext) = EmailNotificationModel().render_email(
516 516 EmailNotificationModel.TYPE_PASSWORD_RESET, **email_kwargs)
517 517
518 518 recipients = [user_email]
519 519
520 520 action_logger_generic(
521 521 'sending password reset email to user: {}'.format(
522 522 user), namespace='security.password_reset')
523 523
524 524 run_task(tasks.send_email, recipients, subject,
525 525 email_body_plaintext, email_body)
526 526
527 527 else:
528 528 log.debug("password reset email %s not found", user_email)
529 529 except Exception:
530 530 log.error(traceback.format_exc())
531 531 return False
532 532
533 533 return True
534 534
535 535 def reset_password(self, data):
536 536 from rhodecode.lib.celerylib import tasks, run_task
537 537 from rhodecode.model.notification import EmailNotificationModel
538 538 from rhodecode.lib import auth
539 539 user_email = data['email']
540 540 pre_db = True
541 541 try:
542 542 user = User.get_by_email(user_email)
543 543 new_passwd = auth.PasswordGenerator().gen_password(
544 544 12, auth.PasswordGenerator.ALPHABETS_BIG_SMALL)
545 545 if user:
546 546 user.password = auth.get_crypt_password(new_passwd)
547 547 # also force this user to reset his password !
548 548 user.update_userdata(force_password_change=True)
549 549
550 550 Session().add(user)
551 551 Session().commit()
552 552 log.info('change password for %s', user_email)
553 553 if new_passwd is None:
554 554 raise Exception('unable to generate new password')
555 555
556 556 pre_db = False
557 557
558 558 email_kwargs = {
559 559 'new_password': new_passwd,
560 560 'user': user,
561 561 'email': user_email,
562 562 'date': datetime.datetime.now()
563 563 }
564 564
565 565 (subject, headers, email_body,
566 566 email_body_plaintext) = EmailNotificationModel().render_email(
567 567 EmailNotificationModel.TYPE_PASSWORD_RESET_CONFIRMATION, **email_kwargs)
568 568
569 569 recipients = [user_email]
570 570
571 571 action_logger_generic(
572 572 'sent new password to user: {} with email: {}'.format(
573 573 user, user_email), namespace='security.password_reset')
574 574
575 575 run_task(tasks.send_email, recipients, subject,
576 576 email_body_plaintext, email_body)
577 577
578 578 except Exception:
579 579 log.error('Failed to update user password')
580 580 log.error(traceback.format_exc())
581 581 if pre_db:
582 582 # we rollback only if local db stuff fails. If it goes into
583 583 # run_task, we're pass rollback state this wouldn't work then
584 584 Session().rollback()
585 585
586 586 return True
587 587
588 588 def fill_data(self, auth_user, user_id=None, api_key=None, username=None):
589 589 """
590 590 Fetches auth_user by user_id,or api_key if present.
591 591 Fills auth_user attributes with those taken from database.
592 592 Additionally set's is_authenitated if lookup fails
593 593 present in database
594 594
595 595 :param auth_user: instance of user to set attributes
596 596 :param user_id: user id to fetch by
597 597 :param api_key: api key to fetch by
598 598 :param username: username to fetch by
599 599 """
600 600 if user_id is None and api_key is None and username is None:
601 601 raise Exception('You need to pass user_id, api_key or username')
602 602
603 603 log.debug(
604 604 'doing fill data based on: user_id:%s api_key:%s username:%s',
605 605 user_id, api_key, username)
606 606 try:
607 607 dbuser = None
608 608 if user_id:
609 609 dbuser = self.get(user_id)
610 610 elif api_key:
611 611 dbuser = self.get_by_auth_token(api_key)
612 612 elif username:
613 613 dbuser = self.get_by_username(username)
614 614
615 615 if not dbuser:
616 616 log.warning(
617 617 'Unable to lookup user by id:%s api_key:%s username:%s',
618 618 user_id, api_key, username)
619 619 return False
620 620 if not dbuser.active:
621 621 log.debug('User `%s` is inactive, skipping fill data', username)
622 622 return False
623 623
624 624 log.debug('filling user:%s data', dbuser)
625 625
626 626 # TODO: johbo: Think about this and find a clean solution
627 627 user_data = dbuser.get_dict()
628 628 user_data.update(dbuser.get_api_data(include_secrets=True))
629 629
630 630 for k, v in user_data.iteritems():
631 631 # properties of auth user we dont update
632 632 if k not in ['auth_tokens', 'permissions']:
633 633 setattr(auth_user, k, v)
634 634
635 635 # few extras
636 636 setattr(auth_user, 'feed_token', dbuser.feed_token)
637 637 except Exception:
638 638 log.error(traceback.format_exc())
639 639 auth_user.is_authenticated = False
640 640 return False
641 641
642 642 return True
643 643
644 644 def has_perm(self, user, perm):
645 645 perm = self._get_perm(perm)
646 646 user = self._get_user(user)
647 647
648 648 return UserToPerm.query().filter(UserToPerm.user == user)\
649 649 .filter(UserToPerm.permission == perm).scalar() is not None
650 650
651 651 def grant_perm(self, user, perm):
652 652 """
653 653 Grant user global permissions
654 654
655 655 :param user:
656 656 :param perm:
657 657 """
658 658 user = self._get_user(user)
659 659 perm = self._get_perm(perm)
660 660 # if this permission is already granted skip it
661 661 _perm = UserToPerm.query()\
662 662 .filter(UserToPerm.user == user)\
663 663 .filter(UserToPerm.permission == perm)\
664 664 .scalar()
665 665 if _perm:
666 666 return
667 667 new = UserToPerm()
668 668 new.user = user
669 669 new.permission = perm
670 670 self.sa.add(new)
671 671 return new
672 672
673 673 def revoke_perm(self, user, perm):
674 674 """
675 675 Revoke users global permissions
676 676
677 677 :param user:
678 678 :param perm:
679 679 """
680 680 user = self._get_user(user)
681 681 perm = self._get_perm(perm)
682 682
683 683 obj = UserToPerm.query()\
684 684 .filter(UserToPerm.user == user)\
685 685 .filter(UserToPerm.permission == perm)\
686 686 .scalar()
687 687 if obj:
688 688 self.sa.delete(obj)
689 689
690 690 def add_extra_email(self, user, email):
691 691 """
692 692 Adds email address to UserEmailMap
693 693
694 694 :param user:
695 695 :param email:
696 696 """
697 697 from rhodecode.model import forms
698 698 form = forms.UserExtraEmailForm()()
699 699 data = form.to_python({'email': email})
700 700 user = self._get_user(user)
701 701
702 702 obj = UserEmailMap()
703 703 obj.user = user
704 704 obj.email = data['email']
705 705 self.sa.add(obj)
706 706 return obj
707 707
708 708 def delete_extra_email(self, user, email_id):
709 709 """
710 710 Removes email address from UserEmailMap
711 711
712 712 :param user:
713 713 :param email_id:
714 714 """
715 715 user = self._get_user(user)
716 716 obj = UserEmailMap.query().get(email_id)
717 717 if obj:
718 718 self.sa.delete(obj)
719 719
720 720 def parse_ip_range(self, ip_range):
721 721 ip_list = []
722 722 def make_unique(value):
723 723 seen = []
724 724 return [c for c in value if not (c in seen or seen.append(c))]
725 725
726 726 # firsts split by commas
727 727 for ip_range in ip_range.split(','):
728 728 if not ip_range:
729 729 continue
730 730 ip_range = ip_range.strip()
731 731 if '-' in ip_range:
732 732 start_ip, end_ip = ip_range.split('-', 1)
733 733 start_ip = ipaddress.ip_address(start_ip.strip())
734 734 end_ip = ipaddress.ip_address(end_ip.strip())
735 735 parsed_ip_range = []
736 736
737 737 for index in xrange(int(start_ip), int(end_ip) + 1):
738 738 new_ip = ipaddress.ip_address(index)
739 739 parsed_ip_range.append(str(new_ip))
740 740 ip_list.extend(parsed_ip_range)
741 741 else:
742 742 ip_list.append(ip_range)
743 743
744 744 return make_unique(ip_list)
745 745
746 746 def add_extra_ip(self, user, ip, description=None):
747 747 """
748 748 Adds ip address to UserIpMap
749 749
750 750 :param user:
751 751 :param ip:
752 752 """
753 753 from rhodecode.model import forms
754 754 form = forms.UserExtraIpForm()()
755 755 data = form.to_python({'ip': ip})
756 756 user = self._get_user(user)
757 757
758 758 obj = UserIpMap()
759 759 obj.user = user
760 760 obj.ip_addr = data['ip']
761 761 obj.description = description
762 762 self.sa.add(obj)
763 763 return obj
764 764
765 765 def delete_extra_ip(self, user, ip_id):
766 766 """
767 767 Removes ip address from UserIpMap
768 768
769 769 :param user:
770 770 :param ip_id:
771 771 """
772 772 user = self._get_user(user)
773 773 obj = UserIpMap.query().get(ip_id)
774 774 if obj:
775 775 self.sa.delete(obj)
776 776
777 777 def get_accounts_in_creation_order(self, current_user=None):
778 778 """
779 779 Get accounts in order of creation for deactivation for license limits
780 780
781 781 pick currently logged in user, and append to the list in position 0
782 782 pick all super-admins in order of creation date and add it to the list
783 783 pick all other accounts in order of creation and add it to the list.
784 784
785 785 Based on that list, the last accounts can be disabled as they are
786 786 created at the end and don't include any of the super admins as well
787 787 as the current user.
788 788
789 789 :param current_user: optionally current user running this operation
790 790 """
791 791
792 792 if not current_user:
793 793 current_user = get_current_rhodecode_user()
794 794 active_super_admins = [
795 795 x.user_id for x in User.query()
796 796 .filter(User.user_id != current_user.user_id)
797 797 .filter(User.active == true())
798 798 .filter(User.admin == true())
799 799 .order_by(User.created_on.asc())]
800 800
801 801 active_regular_users = [
802 802 x.user_id for x in User.query()
803 803 .filter(User.user_id != current_user.user_id)
804 804 .filter(User.active == true())
805 805 .filter(User.admin == false())
806 806 .order_by(User.created_on.asc())]
807 807
808 808 list_of_accounts = [current_user.user_id]
809 809 list_of_accounts += active_super_admins
810 810 list_of_accounts += active_regular_users
811 811
812 812 return list_of_accounts
813 813
814 814 def deactivate_last_users(self, expected_users):
815 815 """
816 816 Deactivate accounts that are over the license limits.
817 817 Algorithm of which accounts to disabled is based on the formula:
818 818
819 819 Get current user, then super admins in creation order, then regular
820 820 active users in creation order.
821 821
822 822 Using that list we mark all accounts from the end of it as inactive.
823 823 This way we block only latest created accounts.
824 824
825 825 :param expected_users: list of users in special order, we deactivate
826 826 the end N ammoun of users from that list
827 827 """
828 828
829 829 list_of_accounts = self.get_accounts_in_creation_order()
830 830
831 831 for acc_id in list_of_accounts[expected_users + 1:]:
832 832 user = User.get(acc_id)
833 833 log.info('Deactivating account %s for license unlock', user)
834 834 user.active = False
835 835 Session().add(user)
836 836 Session().commit()
837 837
838 838 return
@@ -1,517 +1,517 b''
1 1 # -*- coding: utf-8 -*-
2 2
3 3 # Copyright (C) 2011-2016 RhodeCode GmbH
4 4 #
5 5 # This program is free software: you can redistribute it and/or modify
6 6 # it under the terms of the GNU Affero General Public License, version 3
7 7 # (only), as published by the Free Software Foundation.
8 8 #
9 9 # This program is distributed in the hope that it will be useful,
10 10 # but WITHOUT ANY WARRANTY; without even the implied warranty of
11 11 # MERCHANTABILITY or FITNESS FOR A PARTICULAR PURPOSE. See the
12 12 # GNU General Public License for more details.
13 13 #
14 14 # You should have received a copy of the GNU Affero General Public License
15 15 # along with this program. If not, see <http://www.gnu.org/licenses/>.
16 16 #
17 17 # This program is dual-licensed. If you wish to learn more about the
18 18 # RhodeCode Enterprise Edition, including its added features, Support services,
19 19 # and proprietary license terms, please see https://rhodecode.com/licenses/
20 20
21 21
22 22 """
23 23 user group model for RhodeCode
24 24 """
25 25
26 26
27 27 import logging
28 28 import traceback
29 29
30 30 from rhodecode.lib.utils2 import safe_str
31 31 from rhodecode.model import BaseModel
32 32 from rhodecode.model.db import UserGroupMember, UserGroup,\
33 33 UserGroupRepoToPerm, Permission, UserGroupToPerm, User, UserUserGroupToPerm,\
34 34 UserGroupUserGroupToPerm, UserGroupRepoGroupToPerm
35 35 from rhodecode.lib.exceptions import UserGroupAssignedException,\
36 36 RepoGroupAssignmentError
37 37 from rhodecode.lib.utils2 import get_current_rhodecode_user, action_logger_generic
38 38
39 39 log = logging.getLogger(__name__)
40 40
41 41
42 42 class UserGroupModel(BaseModel):
43 43
44 44 cls = UserGroup
45 45
46 46 def _get_user_group(self, user_group):
47 47 return self._get_instance(UserGroup, user_group,
48 48 callback=UserGroup.get_by_group_name)
49 49
50 50 def _create_default_perms(self, user_group):
51 51 # create default permission
52 52 default_perm = 'usergroup.read'
53 53 def_user = User.get_default_user()
54 54 for p in def_user.user_perms:
55 55 if p.permission.permission_name.startswith('usergroup.'):
56 56 default_perm = p.permission.permission_name
57 57 break
58 58
59 59 user_group_to_perm = UserUserGroupToPerm()
60 60 user_group_to_perm.permission = Permission.get_by_key(default_perm)
61 61
62 62 user_group_to_perm.user_group = user_group
63 63 user_group_to_perm.user_id = def_user.user_id
64 64 return user_group_to_perm
65 65
66 66 def update_permissions(self, user_group, perm_additions=None, perm_updates=None,
67 67 perm_deletions=None, check_perms=True, cur_user=None):
68 68 from rhodecode.lib.auth import HasUserGroupPermissionAny
69 69 if not perm_additions:
70 70 perm_additions = []
71 71 if not perm_updates:
72 72 perm_updates = []
73 73 if not perm_deletions:
74 74 perm_deletions = []
75 75
76 76 req_perms = ('usergroup.read', 'usergroup.write', 'usergroup.admin')
77 77
78 78 # update permissions
79 79 for member_id, perm, member_type in perm_updates:
80 80 member_id = int(member_id)
81 81 if member_type == 'user':
82 82 # this updates existing one
83 83 self.grant_user_permission(
84 84 user_group=user_group, user=member_id, perm=perm
85 85 )
86 86 else:
87 87 # check if we have permissions to alter this usergroup
88 88 member_name = UserGroup.get(member_id).users_group_name
89 89 if not check_perms or HasUserGroupPermissionAny(*req_perms)(member_name, user=cur_user):
90 90 self.grant_user_group_permission(
91 91 target_user_group=user_group, user_group=member_id, perm=perm
92 92 )
93 93
94 94 # set new permissions
95 95 for member_id, perm, member_type in perm_additions:
96 96 member_id = int(member_id)
97 97 if member_type == 'user':
98 98 self.grant_user_permission(
99 99 user_group=user_group, user=member_id, perm=perm
100 100 )
101 101 else:
102 102 # check if we have permissions to alter this usergroup
103 103 member_name = UserGroup.get(member_id).users_group_name
104 104 if not check_perms or HasUserGroupPermissionAny(*req_perms)(member_name, user=cur_user):
105 105 self.grant_user_group_permission(
106 106 target_user_group=user_group, user_group=member_id, perm=perm
107 107 )
108 108
109 109 # delete permissions
110 110 for member_id, perm, member_type in perm_deletions:
111 111 member_id = int(member_id)
112 112 if member_type == 'user':
113 113 self.revoke_user_permission(user_group=user_group, user=member_id)
114 114 else:
115 115 #check if we have permissions to alter this usergroup
116 116 member_name = UserGroup.get(member_id).users_group_name
117 117 if not check_perms or HasUserGroupPermissionAny(*req_perms)(member_name, user=cur_user):
118 118 self.revoke_user_group_permission(
119 119 target_user_group=user_group, user_group=member_id
120 120 )
121 121
122 122 def get(self, user_group_id, cache=False):
123 123 return UserGroup.get(user_group_id)
124 124
125 125 def get_group(self, user_group):
126 126 return self._get_user_group(user_group)
127 127
128 128 def get_by_name(self, name, cache=False, case_insensitive=False):
129 129 return UserGroup.get_by_group_name(name, cache, case_insensitive)
130 130
131 131 def create(self, name, description, owner, active=True, group_data=None):
132 132 try:
133 133 new_user_group = UserGroup()
134 134 new_user_group.user = self._get_user(owner)
135 135 new_user_group.users_group_name = name
136 136 new_user_group.user_group_description = description
137 137 new_user_group.users_group_active = active
138 138 if group_data:
139 139 new_user_group.group_data = group_data
140 140 self.sa.add(new_user_group)
141 141 perm_obj = self._create_default_perms(new_user_group)
142 142 self.sa.add(perm_obj)
143 143
144 144 self.grant_user_permission(user_group=new_user_group,
145 145 user=owner, perm='usergroup.admin')
146 146
147 147 return new_user_group
148 148 except Exception:
149 149 log.error(traceback.format_exc())
150 150 raise
151 151
152 152 def _get_memberships_for_user_ids(self, user_group, user_id_list):
153 153 members = []
154 154 for user_id in user_id_list:
155 155 member = self._get_membership(user_group.users_group_id, user_id)
156 156 members.append(member)
157 157 return members
158 158
159 159 def _get_added_and_removed_user_ids(self, user_group, user_id_list):
160 160 current_members = user_group.members or []
161 161 current_members_ids = [m.user.user_id for m in current_members]
162 162
163 163 added_members = [
164 164 user_id for user_id in user_id_list
165 165 if user_id not in current_members_ids]
166 166 if user_id_list == []:
167 167 # all members were deleted
168 168 deleted_members = current_members_ids
169 169 else:
170 170 deleted_members = [
171 171 user_id for user_id in current_members_ids
172 172 if user_id not in user_id_list]
173 173
174 174 return (added_members, deleted_members)
175 175
176 176 def _set_users_as_members(self, user_group, user_ids):
177 177 user_group.members = []
178 178 self.sa.flush()
179 179 members = self._get_memberships_for_user_ids(
180 180 user_group, user_ids)
181 181 user_group.members = members
182 182 self.sa.add(user_group)
183 183
184 184 def _update_members_from_user_ids(self, user_group, user_ids):
185 185 added, removed = self._get_added_and_removed_user_ids(
186 186 user_group, user_ids)
187 187 self._set_users_as_members(user_group, user_ids)
188 188 self._log_user_changes('added to', user_group, added)
189 189 self._log_user_changes('removed from', user_group, removed)
190 190
191 191 def _clean_members_data(self, members_data):
192 192 # TODO: anderson: this should be in the form validation but I couldn't
193 193 # make it work there as it conflicts with the other validator
194 194 if not members_data:
195 195 members_data = []
196 196
197 197 if isinstance(members_data, basestring):
198 198 new_members = [members_data]
199 199 else:
200 200 new_members = members_data
201 201
202 202 new_members = [int(uid) for uid in new_members]
203 203 return new_members
204 204
205 205 def update(self, user_group, form_data):
206 206 user_group = self._get_user_group(user_group)
207 207 if 'users_group_name' in form_data:
208 208 user_group.users_group_name = form_data['users_group_name']
209 209 if 'users_group_active' in form_data:
210 210 user_group.users_group_active = form_data['users_group_active']
211 211 if 'user_group_description' in form_data:
212 212 user_group.user_group_description = form_data[
213 213 'user_group_description']
214 214
215 215 # handle owner change
216 216 if 'user' in form_data:
217 217 owner = form_data['user']
218 218 if isinstance(owner, basestring):
219 219 owner = User.get_by_username(form_data['user'])
220 220
221 221 if not isinstance(owner, User):
222 222 raise ValueError(
223 223 'invalid owner for user group: %s' % form_data['user'])
224 224
225 225 user_group.user = owner
226 226
227 227 if 'users_group_members' in form_data:
228 228 members_id_list = self._clean_members_data(
229 229 form_data['users_group_members'])
230 230 self._update_members_from_user_ids(user_group, members_id_list)
231 231
232 232 self.sa.add(user_group)
233 233
234 234 def delete(self, user_group, force=False):
235 235 """
236 236 Deletes repository group, unless force flag is used
237 237 raises exception if there are members in that group, else deletes
238 238 group and users
239 239
240 240 :param user_group:
241 241 :param force:
242 242 """
243 243 user_group = self._get_user_group(user_group)
244 244 try:
245 245 # check if this group is not assigned to repo
246 246 assigned_to_repo = [x.repository for x in UserGroupRepoToPerm.query()\
247 247 .filter(UserGroupRepoToPerm.users_group == user_group).all()]
248 248 # check if this group is not assigned to repo
249 249 assigned_to_repo_group = [x.group for x in UserGroupRepoGroupToPerm.query()\
250 250 .filter(UserGroupRepoGroupToPerm.users_group == user_group).all()]
251 251
252 252 if (assigned_to_repo or assigned_to_repo_group) and not force:
253 253 assigned = ','.join(map(safe_str,
254 254 assigned_to_repo+assigned_to_repo_group))
255 255
256 256 raise UserGroupAssignedException(
257 257 'UserGroup assigned to %s' % (assigned,))
258 258 self.sa.delete(user_group)
259 259 except Exception:
260 260 log.error(traceback.format_exc())
261 261 raise
262 262
263 263 def _log_user_changes(self, action, user_group, user_or_users):
264 264 users = user_or_users
265 265 if not isinstance(users, (list, tuple)):
266 266 users = [users]
267 267 rhodecode_user = get_current_rhodecode_user()
268 268 ipaddr = getattr(rhodecode_user, 'ip_addr', '')
269 269 group_name = user_group.users_group_name
270 270
271 271 for user_or_user_id in users:
272 272 user = self._get_user(user_or_user_id)
273 273 log_text = 'User {user} {action} {group}'.format(
274 274 action=action, user=user.username, group=group_name)
275 275 log.info('Logging action: {0} by {1} ip:{2}'.format(
276 276 log_text, rhodecode_user, ipaddr))
277 277
278 278 def _find_user_in_group(self, user, user_group):
279 279 user_group_member = None
280 280 for m in user_group.members:
281 281 if m.user_id == user.user_id:
282 282 # Found this user's membership row
283 283 user_group_member = m
284 284 break
285 285
286 286 return user_group_member
287 287
288 288 def _get_membership(self, user_group_id, user_id):
289 289 user_group_member = UserGroupMember(user_group_id, user_id)
290 290 return user_group_member
291 291
292 292 def add_user_to_group(self, user_group, user):
293 293 user_group = self._get_user_group(user_group)
294 294 user = self._get_user(user)
295 295 user_member = self._find_user_in_group(user, user_group)
296 296 if user_member:
297 297 # user already in the group, skip
298 298 return True
299 299
300 300 member = self._get_membership(
301 301 user_group.users_group_id, user.user_id)
302 302 user_group.members.append(member)
303 303
304 304 try:
305 305 self.sa.add(member)
306 306 except Exception:
307 307 # what could go wrong here?
308 308 log.error(traceback.format_exc())
309 309 raise
310 310
311 311 self._log_user_changes('added to', user_group, user)
312 312 return member
313 313
314 314 def remove_user_from_group(self, user_group, user):
315 315 user_group = self._get_user_group(user_group)
316 316 user = self._get_user(user)
317 317 user_group_member = self._find_user_in_group(user, user_group)
318 318
319 319 if not user_group_member:
320 320 # User isn't in that group
321 321 return False
322 322
323 323 try:
324 324 self.sa.delete(user_group_member)
325 325 except Exception:
326 326 log.error(traceback.format_exc())
327 327 raise
328 328
329 329 self._log_user_changes('removed from', user_group, user)
330 330 return True
331 331
332 332 def has_perm(self, user_group, perm):
333 333 user_group = self._get_user_group(user_group)
334 334 perm = self._get_perm(perm)
335 335
336 336 return UserGroupToPerm.query()\
337 337 .filter(UserGroupToPerm.users_group == user_group)\
338 338 .filter(UserGroupToPerm.permission == perm).scalar() is not None
339 339
340 340 def grant_perm(self, user_group, perm):
341 341 user_group = self._get_user_group(user_group)
342 342 perm = self._get_perm(perm)
343 343
344 344 # if this permission is already granted skip it
345 345 _perm = UserGroupToPerm.query()\
346 346 .filter(UserGroupToPerm.users_group == user_group)\
347 347 .filter(UserGroupToPerm.permission == perm)\
348 348 .scalar()
349 349 if _perm:
350 350 return
351 351
352 352 new = UserGroupToPerm()
353 353 new.users_group = user_group
354 354 new.permission = perm
355 355 self.sa.add(new)
356 356 return new
357 357
358 358 def revoke_perm(self, user_group, perm):
359 359 user_group = self._get_user_group(user_group)
360 360 perm = self._get_perm(perm)
361 361
362 362 obj = UserGroupToPerm.query()\
363 363 .filter(UserGroupToPerm.users_group == user_group)\
364 364 .filter(UserGroupToPerm.permission == perm).scalar()
365 365 if obj:
366 366 self.sa.delete(obj)
367 367
368 368 def grant_user_permission(self, user_group, user, perm):
369 369 """
370 370 Grant permission for user on given user group, or update
371 371 existing one if found
372 372
373 373 :param user_group: Instance of UserGroup, users_group_id,
374 374 or users_group_name
375 375 :param user: Instance of User, user_id or username
376 376 :param perm: Instance of Permission, or permission_name
377 377 """
378 378
379 379 user_group = self._get_user_group(user_group)
380 380 user = self._get_user(user)
381 381 permission = self._get_perm(perm)
382 382
383 383 # check if we have that permission already
384 384 obj = self.sa.query(UserUserGroupToPerm)\
385 385 .filter(UserUserGroupToPerm.user == user)\
386 386 .filter(UserUserGroupToPerm.user_group == user_group)\
387 387 .scalar()
388 388 if obj is None:
389 389 # create new !
390 390 obj = UserUserGroupToPerm()
391 391 obj.user_group = user_group
392 392 obj.user = user
393 393 obj.permission = permission
394 394 self.sa.add(obj)
395 395 log.debug('Granted perm %s to %s on %s', perm, user, user_group)
396 396 action_logger_generic(
397 397 'granted permission: {} to user: {} on usergroup: {}'.format(
398 398 perm, user, user_group), namespace='security.usergroup')
399 399
400 400 return obj
401 401
402 402 def revoke_user_permission(self, user_group, user):
403 403 """
404 404 Revoke permission for user on given user group
405 405
406 406 :param user_group: Instance of UserGroup, users_group_id,
407 407 or users_group name
408 408 :param user: Instance of User, user_id or username
409 409 """
410 410
411 411 user_group = self._get_user_group(user_group)
412 412 user = self._get_user(user)
413 413
414 414 obj = self.sa.query(UserUserGroupToPerm)\
415 415 .filter(UserUserGroupToPerm.user == user)\
416 416 .filter(UserUserGroupToPerm.user_group == user_group)\
417 417 .scalar()
418 418 if obj:
419 419 self.sa.delete(obj)
420 420 log.debug('Revoked perm on %s on %s', user_group, user)
421 421 action_logger_generic(
422 422 'revoked permission from user: {} on usergroup: {}'.format(
423 423 user, user_group), namespace='security.usergroup')
424 424
425 425 def grant_user_group_permission(self, target_user_group, user_group, perm):
426 426 """
427 427 Grant user group permission for given target_user_group
428 428
429 429 :param target_user_group:
430 430 :param user_group:
431 431 :param perm:
432 432 """
433 433 target_user_group = self._get_user_group(target_user_group)
434 434 user_group = self._get_user_group(user_group)
435 435 permission = self._get_perm(perm)
436 436 # forbid assigning same user group to itself
437 437 if target_user_group == user_group:
438 438 raise RepoGroupAssignmentError('target repo:%s cannot be '
439 439 'assigned to itself' % target_user_group)
440 440
441 441 # check if we have that permission already
442 442 obj = self.sa.query(UserGroupUserGroupToPerm)\
443 443 .filter(UserGroupUserGroupToPerm.target_user_group == target_user_group)\
444 444 .filter(UserGroupUserGroupToPerm.user_group == user_group)\
445 445 .scalar()
446 446 if obj is None:
447 447 # create new !
448 448 obj = UserGroupUserGroupToPerm()
449 449 obj.user_group = user_group
450 450 obj.target_user_group = target_user_group
451 451 obj.permission = permission
452 452 self.sa.add(obj)
453 453 log.debug(
454 454 'Granted perm %s to %s on %s', perm, target_user_group, user_group)
455 455 action_logger_generic(
456 456 'granted permission: {} to usergroup: {} on usergroup: {}'.format(
457 457 perm, user_group, target_user_group),
458 458 namespace='security.usergroup')
459 459
460 460 return obj
461 461
462 462 def revoke_user_group_permission(self, target_user_group, user_group):
463 463 """
464 464 Revoke user group permission for given target_user_group
465 465
466 466 :param target_user_group:
467 467 :param user_group:
468 468 """
469 469 target_user_group = self._get_user_group(target_user_group)
470 470 user_group = self._get_user_group(user_group)
471 471
472 472 obj = self.sa.query(UserGroupUserGroupToPerm)\
473 473 .filter(UserGroupUserGroupToPerm.target_user_group == target_user_group)\
474 474 .filter(UserGroupUserGroupToPerm.user_group == user_group)\
475 475 .scalar()
476 476 if obj:
477 477 self.sa.delete(obj)
478 478 log.debug(
479 479 'Revoked perm on %s on %s', target_user_group, user_group)
480 480 action_logger_generic(
481 481 'revoked permission from usergroup: {} on usergroup: {}'.format(
482 482 user_group, target_user_group),
483 483 namespace='security.repogroup')
484 484
485 485 def enforce_groups(self, user, groups, extern_type=None):
486 486 user = self._get_user(user)
487 487 log.debug('Enforcing groups %s on user %s', groups, user)
488 488 current_groups = user.group_member
489 489 # find the external created groups
490 490 externals = [x.users_group for x in current_groups
491 491 if 'extern_type' in x.users_group.group_data]
492 492
493 493 # calculate from what groups user should be removed
494 494 # externals that are not in groups
495 495 for gr in externals:
496 496 if gr.users_group_name not in groups:
497 497 log.debug('Removing user %s from user group %s', user, gr)
498 498 self.remove_user_from_group(gr, user)
499 499
500 500 # now we calculate in which groups user should be == groups params
501 owner = User.get_first_admin().username
501 owner = User.get_first_super_admin().username
502 502 for gr in set(groups):
503 503 existing_group = UserGroup.get_by_group_name(gr)
504 504 if not existing_group:
505 505 desc = 'Automatically created from plugin:%s' % extern_type
506 506 # we use first admin account to set the owner of the group
507 507 existing_group = UserGroupModel().create(gr, desc, owner,
508 508 group_data={'extern_type': extern_type})
509 509
510 510 # we can only add users to special groups created via plugins
511 511 managed = 'extern_type' in existing_group.group_data
512 512 if managed:
513 513 log.debug('Adding user %s to user group %s', user, gr)
514 514 UserGroupModel().add_user_to_group(existing_group, user)
515 515 else:
516 516 log.debug('Skipping addition to group %s since it is '
517 517 'not managed by auth plugins' % gr)
@@ -1,54 +1,54 b''
1 1 # -*- coding: utf-8 -*-
2 2
3 3 # Copyright (C) 2010-2016 RhodeCode GmbH
4 4 #
5 5 # This program is free software: you can redistribute it and/or modify
6 6 # it under the terms of the GNU Affero General Public License, version 3
7 7 # (only), as published by the Free Software Foundation.
8 8 #
9 9 # This program is distributed in the hope that it will be useful,
10 10 # but WITHOUT ANY WARRANTY; without even the implied warranty of
11 11 # MERCHANTABILITY or FITNESS FOR A PARTICULAR PURPOSE. See the
12 12 # GNU General Public License for more details.
13 13 #
14 14 # You should have received a copy of the GNU Affero General Public License
15 15 # along with this program. If not, see <http://www.gnu.org/licenses/>.
16 16 #
17 17 # This program is dual-licensed. If you wish to learn more about the
18 18 # RhodeCode Enterprise Edition, including its added features, Support services,
19 19 # and proprietary license terms, please see https://rhodecode.com/licenses/
20 20
21 21 from rhodecode.model.db import User
22 22 from rhodecode.tests import *
23 23
24 24
25 25 class TestFeedController(TestController):
26 26
27 27 def test_rss(self, backend):
28 28 self.log_user()
29 29 response = self.app.get(url(controller='feed', action='rss',
30 30 repo_name=backend.repo_name))
31 31
32 32 assert response.content_type == "application/rss+xml"
33 33 assert """<rss version="2.0">""" in response
34 34
35 35 def test_rss_with_auth_token(self, backend):
36 auth_token = User.get_first_admin().feed_token
36 auth_token = User.get_first_super_admin().feed_token
37 37 assert auth_token != ''
38 38 response = self.app.get(url(controller='feed', action='rss',
39 39 repo_name=backend.repo_name, auth_token=auth_token))
40 40
41 41 assert response.content_type == "application/rss+xml"
42 42 assert """<rss version="2.0">""" in response
43 43
44 44 def test_atom(self, backend):
45 45 self.log_user()
46 46 response = self.app.get(url(controller='feed', action='atom',
47 47 repo_name=backend.repo_name))
48 48
49 49 assert response.content_type == """application/atom+xml"""
50 50 assert """<?xml version="1.0" encoding="utf-8"?>""" in response
51 51
52 52 tag1 = '<feed xmlns="http://www.w3.org/2005/Atom" xml:lang="en-us">'
53 53 tag2 = '<feed xml:lang="en-us" xmlns="http://www.w3.org/2005/Atom">'
54 54 assert tag1 in response or tag2 in response
@@ -1,519 +1,519 b''
1 1 # -*- coding: utf-8 -*-
2 2
3 3 # Copyright (C) 2010-2016 RhodeCode GmbH
4 4 #
5 5 # This program is free software: you can redistribute it and/or modify
6 6 # it under the terms of the GNU Affero General Public License, version 3
7 7 # (only), as published by the Free Software Foundation.
8 8 #
9 9 # This program is distributed in the hope that it will be useful,
10 10 # but WITHOUT ANY WARRANTY; without even the implied warranty of
11 11 # MERCHANTABILITY or FITNESS FOR A PARTICULAR PURPOSE. See the
12 12 # GNU General Public License for more details.
13 13 #
14 14 # You should have received a copy of the GNU Affero General Public License
15 15 # along with this program. If not, see <http://www.gnu.org/licenses/>.
16 16 #
17 17 # This program is dual-licensed. If you wish to learn more about the
18 18 # RhodeCode Enterprise Edition, including its added features, Support services,
19 19 # and proprietary license terms, please see https://rhodecode.com/licenses/
20 20
21 21 import urlparse
22 22
23 23 import mock
24 24 import pytest
25 25
26 26 from rhodecode.config.routing import ADMIN_PREFIX
27 27 from rhodecode.tests import (
28 28 assert_session_flash, url, HG_REPO, TEST_USER_ADMIN_LOGIN)
29 29 from rhodecode.tests.fixture import Fixture
30 30 from rhodecode.tests.utils import AssertResponse, get_session_from_response
31 31 from rhodecode.lib.auth import check_password, generate_auth_token
32 32 from rhodecode.lib import helpers as h
33 33 from rhodecode.model.auth_token import AuthTokenModel
34 34 from rhodecode.model import validators
35 35 from rhodecode.model.db import User, Notification
36 36 from rhodecode.model.meta import Session
37 37
38 38 fixture = Fixture()
39 39
40 40 # Hardcode URLs because we don't have a request object to use
41 41 # pyramids URL generation methods.
42 42 login_url = ADMIN_PREFIX + '/login'
43 43 logut_url = ADMIN_PREFIX + '/logout'
44 44 register_url = ADMIN_PREFIX + '/register'
45 45 pwd_reset_url = ADMIN_PREFIX + '/password_reset'
46 46 pwd_reset_confirm_url = ADMIN_PREFIX + '/password_reset_confirmation'
47 47
48 48
49 49 @pytest.mark.usefixtures('app')
50 50 class TestLoginController:
51 51 destroy_users = set()
52 52
53 53 @classmethod
54 54 def teardown_class(cls):
55 55 fixture.destroy_users(cls.destroy_users)
56 56
57 57 def teardown_method(self, method):
58 58 for n in Notification.query().all():
59 59 Session().delete(n)
60 60
61 61 Session().commit()
62 62 assert Notification.query().all() == []
63 63
64 64 def test_index(self):
65 65 response = self.app.get(login_url)
66 66 assert response.status == '200 OK'
67 67 # Test response...
68 68
69 69 def test_login_admin_ok(self):
70 70 response = self.app.post(login_url,
71 71 {'username': 'test_admin',
72 72 'password': 'test12'})
73 73 assert response.status == '302 Found'
74 74 session = get_session_from_response(response)
75 75 username = session['rhodecode_user'].get('username')
76 76 assert username == 'test_admin'
77 77 response = response.follow()
78 78 response.mustcontain('/%s' % HG_REPO)
79 79
80 80 def test_login_regular_ok(self):
81 81 response = self.app.post(login_url,
82 82 {'username': 'test_regular',
83 83 'password': 'test12'})
84 84
85 85 assert response.status == '302 Found'
86 86 session = get_session_from_response(response)
87 87 username = session['rhodecode_user'].get('username')
88 88 assert username == 'test_regular'
89 89 response = response.follow()
90 90 response.mustcontain('/%s' % HG_REPO)
91 91
92 92 def test_login_ok_came_from(self):
93 93 test_came_from = '/_admin/users?branch=stable'
94 94 _url = '{}?came_from={}'.format(login_url, test_came_from)
95 95 response = self.app.post(
96 96 _url, {'username': 'test_admin', 'password': 'test12'})
97 97 assert response.status == '302 Found'
98 98 assert 'branch=stable' in response.location
99 99 response = response.follow()
100 100
101 101 assert response.status == '200 OK'
102 102 response.mustcontain('Users administration')
103 103
104 104 def test_redirect_to_login_with_get_args(self):
105 105 with fixture.anon_access(False):
106 106 kwargs = {'branch': 'stable'}
107 107 response = self.app.get(
108 108 url('summary_home', repo_name=HG_REPO, **kwargs))
109 109 assert response.status == '302 Found'
110 110 response_query = urlparse.parse_qsl(response.location)
111 111 assert 'branch=stable' in response_query[0][1]
112 112
113 113 def test_login_form_with_get_args(self):
114 114 _url = '{}?came_from=/_admin/users,branch=stable'.format(login_url)
115 115 response = self.app.get(_url)
116 116 assert 'branch%3Dstable' in response.form.action
117 117
118 118 @pytest.mark.parametrize("url_came_from", [
119 119 'data:text/html,<script>window.alert("xss")</script>',
120 120 'mailto:test@rhodecode.org',
121 121 'file:///etc/passwd',
122 122 'ftp://some.ftp.server',
123 123 'http://other.domain',
124 124 '/\r\nX-Forwarded-Host: http://example.org',
125 125 ])
126 126 def test_login_bad_came_froms(self, url_came_from):
127 127 _url = '{}?came_from={}'.format(login_url, url_came_from)
128 128 response = self.app.post(
129 129 _url,
130 130 {'username': 'test_admin', 'password': 'test12'})
131 131 assert response.status == '302 Found'
132 132 response = response.follow()
133 133 assert response.status == '200 OK'
134 134 assert response.request.path == '/'
135 135
136 136 def test_login_short_password(self):
137 137 response = self.app.post(login_url,
138 138 {'username': 'test_admin',
139 139 'password': 'as'})
140 140 assert response.status == '200 OK'
141 141
142 142 response.mustcontain('Enter 3 characters or more')
143 143
144 144 def test_login_wrong_non_ascii_password(self, user_regular):
145 145 response = self.app.post(
146 146 login_url,
147 147 {'username': user_regular.username,
148 148 'password': u'invalid-non-asci\xe4'.encode('utf8')})
149 149
150 150 response.mustcontain('invalid user name')
151 151 response.mustcontain('invalid password')
152 152
153 153 def test_login_with_non_ascii_password(self, user_util):
154 154 password = u'valid-non-ascii\xe4'
155 155 user = user_util.create_user(password=password)
156 156 response = self.app.post(
157 157 login_url,
158 158 {'username': user.username,
159 159 'password': password.encode('utf-8')})
160 160 assert response.status_code == 302
161 161
162 162 def test_login_wrong_username_password(self):
163 163 response = self.app.post(login_url,
164 164 {'username': 'error',
165 165 'password': 'test12'})
166 166
167 167 response.mustcontain('invalid user name')
168 168 response.mustcontain('invalid password')
169 169
170 170 def test_login_admin_ok_password_migration(self, real_crypto_backend):
171 171 from rhodecode.lib import auth
172 172
173 173 # create new user, with sha256 password
174 174 temp_user = 'test_admin_sha256'
175 175 user = fixture.create_user(temp_user)
176 176 user.password = auth._RhodeCodeCryptoSha256().hash_create(
177 177 b'test123')
178 178 Session().add(user)
179 179 Session().commit()
180 180 self.destroy_users.add(temp_user)
181 181 response = self.app.post(login_url,
182 182 {'username': temp_user,
183 183 'password': 'test123'})
184 184
185 185 assert response.status == '302 Found'
186 186 session = get_session_from_response(response)
187 187 username = session['rhodecode_user'].get('username')
188 188 assert username == temp_user
189 189 response = response.follow()
190 190 response.mustcontain('/%s' % HG_REPO)
191 191
192 192 # new password should be bcrypted, after log-in and transfer
193 193 user = User.get_by_username(temp_user)
194 194 assert user.password.startswith('$')
195 195
196 196 # REGISTRATIONS
197 197 def test_register(self):
198 198 response = self.app.get(register_url)
199 199 response.mustcontain('Create an Account')
200 200
201 201 def test_register_err_same_username(self):
202 202 uname = 'test_admin'
203 203 response = self.app.post(
204 204 register_url,
205 205 {
206 206 'username': uname,
207 207 'password': 'test12',
208 208 'password_confirmation': 'test12',
209 209 'email': 'goodmail@domain.com',
210 210 'firstname': 'test',
211 211 'lastname': 'test'
212 212 }
213 213 )
214 214
215 215 assertr = AssertResponse(response)
216 216 msg = validators.ValidUsername()._messages['username_exists']
217 217 msg = msg % {'username': uname}
218 218 assertr.element_contains('#username+.error-message', msg)
219 219
220 220 def test_register_err_same_email(self):
221 221 response = self.app.post(
222 222 register_url,
223 223 {
224 224 'username': 'test_admin_0',
225 225 'password': 'test12',
226 226 'password_confirmation': 'test12',
227 227 'email': 'test_admin@mail.com',
228 228 'firstname': 'test',
229 229 'lastname': 'test'
230 230 }
231 231 )
232 232
233 233 assertr = AssertResponse(response)
234 234 msg = validators.UniqSystemEmail()()._messages['email_taken']
235 235 assertr.element_contains('#email+.error-message', msg)
236 236
237 237 def test_register_err_same_email_case_sensitive(self):
238 238 response = self.app.post(
239 239 register_url,
240 240 {
241 241 'username': 'test_admin_1',
242 242 'password': 'test12',
243 243 'password_confirmation': 'test12',
244 244 'email': 'TesT_Admin@mail.COM',
245 245 'firstname': 'test',
246 246 'lastname': 'test'
247 247 }
248 248 )
249 249 assertr = AssertResponse(response)
250 250 msg = validators.UniqSystemEmail()()._messages['email_taken']
251 251 assertr.element_contains('#email+.error-message', msg)
252 252
253 253 def test_register_err_wrong_data(self):
254 254 response = self.app.post(
255 255 register_url,
256 256 {
257 257 'username': 'xs',
258 258 'password': 'test',
259 259 'password_confirmation': 'test',
260 260 'email': 'goodmailm',
261 261 'firstname': 'test',
262 262 'lastname': 'test'
263 263 }
264 264 )
265 265 assert response.status == '200 OK'
266 266 response.mustcontain('An email address must contain a single @')
267 267 response.mustcontain('Enter a value 6 characters long or more')
268 268
269 269 def test_register_err_username(self):
270 270 response = self.app.post(
271 271 register_url,
272 272 {
273 273 'username': 'error user',
274 274 'password': 'test12',
275 275 'password_confirmation': 'test12',
276 276 'email': 'goodmailm',
277 277 'firstname': 'test',
278 278 'lastname': 'test'
279 279 }
280 280 )
281 281
282 282 response.mustcontain('An email address must contain a single @')
283 283 response.mustcontain(
284 284 'Username may only contain '
285 285 'alphanumeric characters underscores, '
286 286 'periods or dashes and must begin with '
287 287 'alphanumeric character')
288 288
289 289 def test_register_err_case_sensitive(self):
290 290 usr = 'Test_Admin'
291 291 response = self.app.post(
292 292 register_url,
293 293 {
294 294 'username': usr,
295 295 'password': 'test12',
296 296 'password_confirmation': 'test12',
297 297 'email': 'goodmailm',
298 298 'firstname': 'test',
299 299 'lastname': 'test'
300 300 }
301 301 )
302 302
303 303 assertr = AssertResponse(response)
304 304 msg = validators.ValidUsername()._messages['username_exists']
305 305 msg = msg % {'username': usr}
306 306 assertr.element_contains('#username+.error-message', msg)
307 307
308 308 def test_register_special_chars(self):
309 309 response = self.app.post(
310 310 register_url,
311 311 {
312 312 'username': 'xxxaxn',
313 313 'password': 'Δ…Δ‡ΕΊΕΌΔ…Ε›Ε›Ε›Ε›',
314 314 'password_confirmation': 'Δ…Δ‡ΕΊΕΌΔ…Ε›Ε›Ε›Ε›',
315 315 'email': 'goodmailm@test.plx',
316 316 'firstname': 'test',
317 317 'lastname': 'test'
318 318 }
319 319 )
320 320
321 321 msg = validators.ValidPassword()._messages['invalid_password']
322 322 response.mustcontain(msg)
323 323
324 324 def test_register_password_mismatch(self):
325 325 response = self.app.post(
326 326 register_url,
327 327 {
328 328 'username': 'xs',
329 329 'password': '123qwe',
330 330 'password_confirmation': 'qwe123',
331 331 'email': 'goodmailm@test.plxa',
332 332 'firstname': 'test',
333 333 'lastname': 'test'
334 334 }
335 335 )
336 336 msg = validators.ValidPasswordsMatch()._messages['password_mismatch']
337 337 response.mustcontain(msg)
338 338
339 339 def test_register_ok(self):
340 340 username = 'test_regular4'
341 341 password = 'qweqwe'
342 342 email = 'marcin@test.com'
343 343 name = 'testname'
344 344 lastname = 'testlastname'
345 345
346 346 response = self.app.post(
347 347 register_url,
348 348 {
349 349 'username': username,
350 350 'password': password,
351 351 'password_confirmation': password,
352 352 'email': email,
353 353 'firstname': name,
354 354 'lastname': lastname,
355 355 'admin': True
356 356 }
357 357 ) # This should be overriden
358 358 assert response.status == '302 Found'
359 359 assert_session_flash(
360 360 response, 'You have successfully registered with RhodeCode')
361 361
362 362 ret = Session().query(User).filter(
363 363 User.username == 'test_regular4').one()
364 364 assert ret.username == username
365 365 assert check_password(password, ret.password)
366 366 assert ret.email == email
367 367 assert ret.name == name
368 368 assert ret.lastname == lastname
369 369 assert ret.api_key is not None
370 370 assert not ret.admin
371 371
372 372 def test_forgot_password_wrong_mail(self):
373 373 bad_email = 'marcin@wrongmail.org'
374 374 response = self.app.post(
375 375 pwd_reset_url,
376 376 {'email': bad_email, }
377 377 )
378 378
379 379 msg = validators.ValidSystemEmail()._messages['non_existing_email']
380 380 msg = h.html_escape(msg % {'email': bad_email})
381 381 response.mustcontain()
382 382
383 383 def test_forgot_password(self):
384 384 response = self.app.get(pwd_reset_url)
385 385 assert response.status == '200 OK'
386 386
387 387 username = 'test_password_reset_1'
388 388 password = 'qweqwe'
389 389 email = 'marcin@python-works.com'
390 390 name = 'passwd'
391 391 lastname = 'reset'
392 392
393 393 new = User()
394 394 new.username = username
395 395 new.password = password
396 396 new.email = email
397 397 new.name = name
398 398 new.lastname = lastname
399 399 new.api_key = generate_auth_token(username)
400 400 Session().add(new)
401 401 Session().commit()
402 402
403 403 response = self.app.post(pwd_reset_url,
404 404 {'email': email, })
405 405
406 406 assert_session_flash(
407 407 response, 'Your password reset link was sent')
408 408
409 409 response = response.follow()
410 410
411 411 # BAD KEY
412 412
413 413 key = "bad"
414 414 confirm_url = '{}?key={}'.format(pwd_reset_confirm_url, key)
415 415 response = self.app.get(confirm_url)
416 416 assert response.status == '302 Found'
417 417 assert response.location.endswith(pwd_reset_url)
418 418
419 419 # GOOD KEY
420 420
421 421 key = User.get_by_username(username).api_key
422 422 confirm_url = '{}?key={}'.format(pwd_reset_confirm_url, key)
423 423 response = self.app.get(confirm_url)
424 424 assert response.status == '302 Found'
425 425 assert response.location.endswith(login_url)
426 426
427 427 assert_session_flash(
428 428 response,
429 429 'Your password reset was successful, '
430 430 'a new password has been sent to your email')
431 431
432 432 response = response.follow()
433 433
434 434 def _get_api_whitelist(self, values=None):
435 435 config = {'api_access_controllers_whitelist': values or []}
436 436 return config
437 437
438 438 @pytest.mark.parametrize("test_name, auth_token", [
439 439 ('none', None),
440 440 ('empty_string', ''),
441 441 ('fake_number', '123456'),
442 442 ('proper_auth_token', None)
443 443 ])
444 444 def test_access_not_whitelisted_page_via_auth_token(self, test_name,
445 445 auth_token):
446 446 whitelist = self._get_api_whitelist([])
447 447 with mock.patch.dict('rhodecode.CONFIG', whitelist):
448 448 assert [] == whitelist['api_access_controllers_whitelist']
449 449 if test_name == 'proper_auth_token':
450 450 # use builtin if api_key is None
451 auth_token = User.get_first_admin().api_key
451 auth_token = User.get_first_super_admin().api_key
452 452
453 453 with fixture.anon_access(False):
454 454 self.app.get(url(controller='changeset',
455 455 action='changeset_raw',
456 456 repo_name=HG_REPO, revision='tip',
457 457 api_key=auth_token),
458 458 status=302)
459 459
460 460 @pytest.mark.parametrize("test_name, auth_token, code", [
461 461 ('none', None, 302),
462 462 ('empty_string', '', 302),
463 463 ('fake_number', '123456', 302),
464 464 ('proper_auth_token', None, 200)
465 465 ])
466 466 def test_access_whitelisted_page_via_auth_token(self, test_name,
467 467 auth_token, code):
468 468 whitelist = self._get_api_whitelist(
469 469 ['ChangesetController:changeset_raw'])
470 470 with mock.patch.dict('rhodecode.CONFIG', whitelist):
471 471 assert ['ChangesetController:changeset_raw'] == \
472 472 whitelist['api_access_controllers_whitelist']
473 473 if test_name == 'proper_auth_token':
474 auth_token = User.get_first_admin().api_key
474 auth_token = User.get_first_super_admin().api_key
475 475
476 476 with fixture.anon_access(False):
477 477 self.app.get(url(controller='changeset',
478 478 action='changeset_raw',
479 479 repo_name=HG_REPO, revision='tip',
480 480 api_key=auth_token),
481 481 status=code)
482 482
483 483 def test_access_page_via_extra_auth_token(self):
484 484 whitelist = self._get_api_whitelist(
485 485 ['ChangesetController:changeset_raw'])
486 486 with mock.patch.dict('rhodecode.CONFIG', whitelist):
487 487 assert ['ChangesetController:changeset_raw'] == \
488 488 whitelist['api_access_controllers_whitelist']
489 489
490 490 new_auth_token = AuthTokenModel().create(
491 491 TEST_USER_ADMIN_LOGIN, 'test')
492 492 Session().commit()
493 493 with fixture.anon_access(False):
494 494 self.app.get(url(controller='changeset',
495 495 action='changeset_raw',
496 496 repo_name=HG_REPO, revision='tip',
497 497 api_key=new_auth_token.api_key),
498 498 status=200)
499 499
500 500 def test_access_page_via_expired_auth_token(self):
501 501 whitelist = self._get_api_whitelist(
502 502 ['ChangesetController:changeset_raw'])
503 503 with mock.patch.dict('rhodecode.CONFIG', whitelist):
504 504 assert ['ChangesetController:changeset_raw'] == \
505 505 whitelist['api_access_controllers_whitelist']
506 506
507 507 new_auth_token = AuthTokenModel().create(
508 508 TEST_USER_ADMIN_LOGIN, 'test')
509 509 Session().commit()
510 510 # patch the api key and make it expired
511 511 new_auth_token.expires = 0
512 512 Session().add(new_auth_token)
513 513 Session().commit()
514 514 with fixture.anon_access(False):
515 515 self.app.get(url(controller='changeset',
516 516 action='changeset_raw',
517 517 repo_name=HG_REPO, revision='tip',
518 518 api_key=new_auth_token.api_key),
519 519 status=302)
General Comments 0
You need to be logged in to leave comments. Login now