Show More
@@ -0,0 +1,17 b'' | |||
|
1 | ||
|
2 | def apply_license(*args, **kwargs): | |
|
3 | pass | |
|
4 | ||
|
5 | try: | |
|
6 | from rc_license.models import apply_license | |
|
7 | except ImportError: | |
|
8 | pass | |
|
9 | ||
|
10 | ||
|
11 | def apply_license_from_file(*args, **kwargs): | |
|
12 | pass | |
|
13 | ||
|
14 | try: | |
|
15 | from rc_license.models import apply_license_from_file | |
|
16 | except ImportError: | |
|
17 | pass |
@@ -1,299 +1,299 b'' | |||
|
1 | 1 | # deps, generated via pipdeptree --exclude setuptools,wheel,pipdeptree,pip -f | tr '[:upper:]' '[:lower:]' |
|
2 | 2 | |
|
3 | 3 | alembic==1.13.1 |
|
4 | 4 | mako==1.2.4 |
|
5 | 5 | markupsafe==2.1.2 |
|
6 | 6 | sqlalchemy==1.4.52 |
|
7 | 7 | greenlet==3.0.3 |
|
8 | 8 | typing_extensions==4.12.2 |
|
9 | 9 | async-timeout==4.0.3 |
|
10 | 10 | babel==2.12.1 |
|
11 | 11 | beaker==1.12.1 |
|
12 | 12 | celery==5.3.6 |
|
13 | 13 | billiard==4.2.0 |
|
14 | 14 | click==8.1.3 |
|
15 | 15 | click-didyoumean==0.3.0 |
|
16 | 16 | click==8.1.3 |
|
17 | 17 | click-plugins==1.1.1 |
|
18 | 18 | click==8.1.3 |
|
19 | 19 | click-repl==0.2.0 |
|
20 | 20 | click==8.1.3 |
|
21 | 21 | prompt_toolkit==3.0.47 |
|
22 | 22 | wcwidth==0.2.13 |
|
23 | 23 | six==1.16.0 |
|
24 | 24 | kombu==5.3.5 |
|
25 | 25 | amqp==5.2.0 |
|
26 | 26 | vine==5.1.0 |
|
27 | 27 | vine==5.1.0 |
|
28 | 28 | python-dateutil==2.8.2 |
|
29 | 29 | six==1.16.0 |
|
30 | 30 | tzdata==2024.1 |
|
31 | 31 | vine==5.1.0 |
|
32 | 32 | channelstream==0.7.1 |
|
33 | 33 | gevent==24.2.1 |
|
34 | 34 | greenlet==3.0.3 |
|
35 | 35 | zope.event==5.0.0 |
|
36 |
zope.interface== |
|
|
36 | zope.interface==7.0.3 | |
|
37 | 37 | itsdangerous==1.1.0 |
|
38 | 38 | marshmallow==2.18.0 |
|
39 | 39 | pyramid==2.0.2 |
|
40 | 40 | hupper==1.12 |
|
41 | 41 | plaster==1.1.2 |
|
42 | 42 | plaster-pastedeploy==1.0.1 |
|
43 | 43 | pastedeploy==3.1.0 |
|
44 | 44 | plaster==1.1.2 |
|
45 | 45 | translationstring==1.4 |
|
46 | 46 | venusian==3.0.0 |
|
47 | 47 | webob==1.8.7 |
|
48 | 48 | zope.deprecation==5.0.0 |
|
49 |
zope.interface== |
|
|
49 | zope.interface==7.0.3 | |
|
50 | 50 | pyramid-jinja2==2.10 |
|
51 | 51 | jinja2==3.1.2 |
|
52 | 52 | markupsafe==2.1.2 |
|
53 | 53 | markupsafe==2.1.2 |
|
54 | 54 | pyramid==2.0.2 |
|
55 | 55 | hupper==1.12 |
|
56 | 56 | plaster==1.1.2 |
|
57 | 57 | plaster-pastedeploy==1.0.1 |
|
58 | 58 | pastedeploy==3.1.0 |
|
59 | 59 | plaster==1.1.2 |
|
60 | 60 | translationstring==1.4 |
|
61 | 61 | venusian==3.0.0 |
|
62 | 62 | webob==1.8.7 |
|
63 | 63 | zope.deprecation==5.0.0 |
|
64 |
zope.interface== |
|
|
64 | zope.interface==7.0.3 | |
|
65 | 65 | zope.deprecation==5.0.0 |
|
66 | 66 | python-dateutil==2.8.2 |
|
67 | 67 | six==1.16.0 |
|
68 | 68 | requests==2.28.2 |
|
69 | 69 | certifi==2022.12.7 |
|
70 | 70 | charset-normalizer==3.1.0 |
|
71 | 71 | idna==3.4 |
|
72 | 72 | urllib3==1.26.14 |
|
73 | 73 | ws4py==0.5.1 |
|
74 | 74 | deform==2.0.15 |
|
75 | 75 | chameleon==3.10.2 |
|
76 | 76 | colander==2.0 |
|
77 | 77 | iso8601==1.1.0 |
|
78 | 78 | translationstring==1.4 |
|
79 | 79 | iso8601==1.1.0 |
|
80 | 80 | peppercorn==0.6 |
|
81 | 81 | translationstring==1.4 |
|
82 | 82 | zope.deprecation==5.0.0 |
|
83 | 83 | docutils==0.19 |
|
84 | 84 | dogpile.cache==1.3.3 |
|
85 | 85 | decorator==5.1.1 |
|
86 | 86 | stevedore==5.1.0 |
|
87 | 87 | pbr==5.11.1 |
|
88 | 88 | formencode==2.1.0 |
|
89 | 89 | six==1.16.0 |
|
90 |
fsspec==2024. |
|
|
90 | fsspec==2024.9.0 | |
|
91 | 91 | gunicorn==23.0.0 |
|
92 | 92 | packaging==24.1 |
|
93 | 93 | gevent==24.2.1 |
|
94 | 94 | greenlet==3.0.3 |
|
95 | 95 | zope.event==5.0.0 |
|
96 |
zope.interface== |
|
|
96 | zope.interface==7.0.3 | |
|
97 | 97 | ipython==8.26.0 |
|
98 | 98 | decorator==5.1.1 |
|
99 | 99 | jedi==0.19.1 |
|
100 | 100 | parso==0.8.4 |
|
101 | 101 | matplotlib-inline==0.1.7 |
|
102 | 102 | traitlets==5.14.3 |
|
103 | 103 | pexpect==4.9.0 |
|
104 | 104 | ptyprocess==0.7.0 |
|
105 | 105 | prompt_toolkit==3.0.47 |
|
106 | 106 | wcwidth==0.2.13 |
|
107 | 107 | pygments==2.18.0 |
|
108 | 108 | stack-data==0.6.3 |
|
109 | 109 | asttokens==2.4.1 |
|
110 | 110 | six==1.16.0 |
|
111 | 111 | executing==2.0.1 |
|
112 | 112 | pure_eval==0.2.3 |
|
113 | 113 | traitlets==5.14.3 |
|
114 | 114 | typing_extensions==4.12.2 |
|
115 | 115 | markdown==3.4.3 |
|
116 | 116 | msgpack==1.0.8 |
|
117 | 117 | mysqlclient==2.1.1 |
|
118 | 118 | nbconvert==7.7.3 |
|
119 | 119 | beautifulsoup4==4.12.3 |
|
120 | 120 | soupsieve==2.5 |
|
121 | 121 | bleach==6.1.0 |
|
122 | 122 | six==1.16.0 |
|
123 | 123 | webencodings==0.5.1 |
|
124 | 124 | defusedxml==0.7.1 |
|
125 | 125 | jinja2==3.1.2 |
|
126 | 126 | markupsafe==2.1.2 |
|
127 | 127 | jupyter_core==5.3.1 |
|
128 | 128 | platformdirs==3.10.0 |
|
129 | 129 | traitlets==5.14.3 |
|
130 | 130 | jupyterlab-pygments==0.2.2 |
|
131 | 131 | markupsafe==2.1.2 |
|
132 | 132 | mistune==2.0.5 |
|
133 | 133 | nbclient==0.8.0 |
|
134 | 134 | jupyter_client==8.3.0 |
|
135 | 135 | jupyter_core==5.3.1 |
|
136 | 136 | platformdirs==3.10.0 |
|
137 | 137 | traitlets==5.14.3 |
|
138 | 138 | python-dateutil==2.8.2 |
|
139 | 139 | six==1.16.0 |
|
140 | 140 | pyzmq==25.0.0 |
|
141 | 141 | tornado==6.2 |
|
142 | 142 | traitlets==5.14.3 |
|
143 | 143 | jupyter_core==5.3.1 |
|
144 | 144 | platformdirs==3.10.0 |
|
145 | 145 | traitlets==5.14.3 |
|
146 | 146 | nbformat==5.9.2 |
|
147 | 147 | fastjsonschema==2.18.0 |
|
148 | 148 | jsonschema==4.18.6 |
|
149 | 149 | attrs==22.2.0 |
|
150 | 150 | pyrsistent==0.19.3 |
|
151 | 151 | jupyter_core==5.3.1 |
|
152 | 152 | platformdirs==3.10.0 |
|
153 | 153 | traitlets==5.14.3 |
|
154 | 154 | traitlets==5.14.3 |
|
155 | 155 | traitlets==5.14.3 |
|
156 | 156 | nbformat==5.9.2 |
|
157 | 157 | fastjsonschema==2.18.0 |
|
158 | 158 | jsonschema==4.18.6 |
|
159 | 159 | attrs==22.2.0 |
|
160 | 160 | pyrsistent==0.19.3 |
|
161 | 161 | jupyter_core==5.3.1 |
|
162 | 162 | platformdirs==3.10.0 |
|
163 | 163 | traitlets==5.14.3 |
|
164 | 164 | traitlets==5.14.3 |
|
165 | 165 | pandocfilters==1.5.0 |
|
166 | 166 | pygments==2.18.0 |
|
167 | 167 | tinycss2==1.2.1 |
|
168 | 168 | webencodings==0.5.1 |
|
169 | 169 | traitlets==5.14.3 |
|
170 |
orjson==3.10. |
|
|
170 | orjson==3.10.7 | |
|
171 | 171 | paste==3.10.1 |
|
172 | 172 | premailer==3.10.0 |
|
173 | 173 | cachetools==5.3.3 |
|
174 | 174 | cssselect==1.2.0 |
|
175 | 175 | cssutils==2.6.0 |
|
176 | 176 | lxml==5.3.0 |
|
177 | 177 | requests==2.28.2 |
|
178 | 178 | certifi==2022.12.7 |
|
179 | 179 | charset-normalizer==3.1.0 |
|
180 | 180 | idna==3.4 |
|
181 | 181 | urllib3==1.26.14 |
|
182 | 182 | psutil==5.9.8 |
|
183 | 183 | psycopg2==2.9.9 |
|
184 | 184 | py-bcrypt==0.4 |
|
185 | 185 | pycmarkgfm==1.2.0 |
|
186 | 186 | cffi==1.16.0 |
|
187 | 187 | pycparser==2.21 |
|
188 | 188 | pycryptodome==3.17 |
|
189 | 189 | pycurl==7.45.3 |
|
190 | 190 | pymysql==1.0.3 |
|
191 | 191 | pyotp==2.8.0 |
|
192 | 192 | pyparsing==3.1.1 |
|
193 | 193 | pyramid-mailer==0.15.1 |
|
194 | 194 | pyramid==2.0.2 |
|
195 | 195 | hupper==1.12 |
|
196 | 196 | plaster==1.1.2 |
|
197 | 197 | plaster-pastedeploy==1.0.1 |
|
198 | 198 | pastedeploy==3.1.0 |
|
199 | 199 | plaster==1.1.2 |
|
200 | 200 | translationstring==1.4 |
|
201 | 201 | venusian==3.0.0 |
|
202 | 202 | webob==1.8.7 |
|
203 | 203 | zope.deprecation==5.0.0 |
|
204 |
zope.interface== |
|
|
204 | zope.interface==7.0.3 | |
|
205 | 205 | repoze.sendmail==4.4.1 |
|
206 |
transaction== |
|
|
207 |
zope.interface== |
|
|
208 |
zope.interface== |
|
|
209 |
transaction== |
|
|
210 |
zope.interface== |
|
|
206 | transaction==5.0.0 | |
|
207 | zope.interface==7.0.3 | |
|
208 | zope.interface==7.0.3 | |
|
209 | transaction==5.0.0 | |
|
210 | zope.interface==7.0.3 | |
|
211 | 211 | pyramid-mako==1.1.0 |
|
212 | 212 | mako==1.2.4 |
|
213 | 213 | markupsafe==2.1.2 |
|
214 | 214 | pyramid==2.0.2 |
|
215 | 215 | hupper==1.12 |
|
216 | 216 | plaster==1.1.2 |
|
217 | 217 | plaster-pastedeploy==1.0.1 |
|
218 | 218 | pastedeploy==3.1.0 |
|
219 | 219 | plaster==1.1.2 |
|
220 | 220 | translationstring==1.4 |
|
221 | 221 | venusian==3.0.0 |
|
222 | 222 | webob==1.8.7 |
|
223 | 223 | zope.deprecation==5.0.0 |
|
224 |
zope.interface== |
|
|
224 | zope.interface==7.0.3 | |
|
225 | 225 | python-ldap==3.4.3 |
|
226 | 226 | pyasn1==0.4.8 |
|
227 | 227 | pyasn1-modules==0.2.8 |
|
228 | 228 | pyasn1==0.4.8 |
|
229 | 229 | python-memcached==1.59 |
|
230 | 230 | six==1.16.0 |
|
231 | 231 | python-pam==2.0.2 |
|
232 | 232 | python3-saml==1.16.0 |
|
233 | 233 | isodate==0.6.1 |
|
234 | 234 | six==1.16.0 |
|
235 | 235 | lxml==5.3.0 |
|
236 | 236 | xmlsec==1.3.14 |
|
237 | 237 | lxml==5.3.0 |
|
238 | 238 | pyyaml==6.0.1 |
|
239 |
redis==5. |
|
|
239 | redis==5.1.0 | |
|
240 | 240 | async-timeout==4.0.3 |
|
241 | 241 | regex==2022.10.31 |
|
242 | 242 | routes==2.5.1 |
|
243 | 243 | repoze.lru==0.7 |
|
244 | 244 | six==1.16.0 |
|
245 |
s3fs==2024. |
|
|
245 | s3fs==2024.9.0 | |
|
246 | 246 | aiobotocore==2.13.0 |
|
247 | 247 | aiohttp==3.9.5 |
|
248 | 248 | aiosignal==1.3.1 |
|
249 | 249 | frozenlist==1.4.1 |
|
250 | 250 | attrs==22.2.0 |
|
251 | 251 | frozenlist==1.4.1 |
|
252 | 252 | multidict==6.0.5 |
|
253 | 253 | yarl==1.9.4 |
|
254 | 254 | idna==3.4 |
|
255 | 255 | multidict==6.0.5 |
|
256 | 256 | aioitertools==0.11.0 |
|
257 | 257 | botocore==1.34.106 |
|
258 | 258 | jmespath==1.0.1 |
|
259 | 259 | python-dateutil==2.8.2 |
|
260 | 260 | six==1.16.0 |
|
261 | 261 | urllib3==1.26.14 |
|
262 | 262 | wrapt==1.16.0 |
|
263 | 263 | aiohttp==3.9.5 |
|
264 | 264 | aiosignal==1.3.1 |
|
265 | 265 | frozenlist==1.4.1 |
|
266 | 266 | attrs==22.2.0 |
|
267 | 267 | frozenlist==1.4.1 |
|
268 | 268 | multidict==6.0.5 |
|
269 | 269 | yarl==1.9.4 |
|
270 | 270 | idna==3.4 |
|
271 | 271 | multidict==6.0.5 |
|
272 |
fsspec==2024. |
|
|
272 | fsspec==2024.9.0 | |
|
273 | 273 | simplejson==3.19.2 |
|
274 | 274 | sshpubkeys==3.3.1 |
|
275 | 275 | cryptography==40.0.2 |
|
276 | 276 | cffi==1.16.0 |
|
277 | 277 | pycparser==2.21 |
|
278 | 278 | ecdsa==0.18.0 |
|
279 | 279 | six==1.16.0 |
|
280 | 280 | sqlalchemy==1.4.52 |
|
281 | 281 | greenlet==3.0.3 |
|
282 | 282 | typing_extensions==4.12.2 |
|
283 | 283 | supervisor==4.2.5 |
|
284 | 284 | tzlocal==4.3 |
|
285 | 285 | pytz-deprecation-shim==0.1.0.post0 |
|
286 | 286 | tzdata==2024.1 |
|
287 | 287 | tempita==0.5.2 |
|
288 | 288 | unidecode==1.3.6 |
|
289 | 289 | urlobject==2.4.3 |
|
290 | 290 | waitress==3.0.0 |
|
291 | 291 | webhelpers2==2.1 |
|
292 | 292 | markupsafe==2.1.2 |
|
293 | 293 | six==1.16.0 |
|
294 | 294 | whoosh==2.7.4 |
|
295 | 295 | zope.cachedescriptors==5.0.0 |
|
296 | 296 | qrcode==7.4.2 |
|
297 | 297 | |
|
298 | 298 | ## uncomment to add the debug libraries |
|
299 | 299 | #-r requirements_debug.txt |
@@ -1,1124 +1,1124 b'' | |||
|
1 | 1 | # Copyright (C) 2016-2023 RhodeCode GmbH |
|
2 | 2 | # |
|
3 | 3 | # This program is free software: you can redistribute it and/or modify |
|
4 | 4 | # it under the terms of the GNU Affero General Public License, version 3 |
|
5 | 5 | # (only), as published by the Free Software Foundation. |
|
6 | 6 | # |
|
7 | 7 | # This program is distributed in the hope that it will be useful, |
|
8 | 8 | # but WITHOUT ANY WARRANTY; without even the implied warranty of |
|
9 | 9 | # MERCHANTABILITY or FITNESS FOR A PARTICULAR PURPOSE. See the |
|
10 | 10 | # GNU General Public License for more details. |
|
11 | 11 | # |
|
12 | 12 | # You should have received a copy of the GNU Affero General Public License |
|
13 | 13 | # along with this program. If not, see <http://www.gnu.org/licenses/>. |
|
14 | 14 | # |
|
15 | 15 | # This program is dual-licensed. If you wish to learn more about the |
|
16 | 16 | # RhodeCode Enterprise Edition, including its added features, Support services, |
|
17 | 17 | # and proprietary license terms, please see https://rhodecode.com/licenses/ |
|
18 | 18 | |
|
19 | 19 | |
|
20 | 20 | from rhodecode.apps._base import ADMIN_PREFIX |
|
21 | 21 | from rhodecode.apps._base.navigation import includeme as nav_includeme |
|
22 | 22 | from rhodecode.apps.admin.views.main_views import AdminMainView |
|
23 | 23 | |
|
24 | 24 | |
|
25 | 25 | def admin_routes(config): |
|
26 | 26 | """ |
|
27 | 27 | Admin prefixed routes |
|
28 | 28 | """ |
|
29 | 29 | from rhodecode.apps.admin.views.audit_logs import AdminAuditLogsView |
|
30 | 30 | from rhodecode.apps.admin.views.artifacts import AdminArtifactsView |
|
31 | 31 | from rhodecode.apps.admin.views.automation import AdminAutomationView |
|
32 | 32 | from rhodecode.apps.admin.views.scheduler import AdminSchedulerView |
|
33 | 33 | from rhodecode.apps.admin.views.defaults import AdminDefaultSettingsView |
|
34 | 34 | from rhodecode.apps.admin.views.exception_tracker import ExceptionsTrackerView |
|
35 | 35 | from rhodecode.apps.admin.views.open_source_licenses import OpenSourceLicensesAdminSettingsView |
|
36 | 36 | from rhodecode.apps.admin.views.permissions import AdminPermissionsView |
|
37 | 37 | from rhodecode.apps.admin.views.process_management import AdminProcessManagementView |
|
38 | 38 | from rhodecode.apps.admin.views.repo_groups import AdminRepoGroupsView |
|
39 | 39 | from rhodecode.apps.admin.views.repositories import AdminReposView |
|
40 | 40 | from rhodecode.apps.admin.views.sessions import AdminSessionSettingsView |
|
41 | 41 | from rhodecode.apps.admin.views.settings import AdminSettingsView |
|
42 | 42 | from rhodecode.apps.admin.views.svn_config import AdminSvnConfigView |
|
43 | 43 | from rhodecode.apps.admin.views.system_info import AdminSystemInfoSettingsView |
|
44 | 44 | from rhodecode.apps.admin.views.user_groups import AdminUserGroupsView |
|
45 | 45 | from rhodecode.apps.admin.views.users import AdminUsersView, UsersView |
|
46 | 46 | from rhodecode.apps.admin.views.security import AdminSecurityView |
|
47 | 47 | |
|
48 | 48 | # Security EE feature |
|
49 | 49 | |
|
50 | 50 | config.add_route( |
|
51 | 51 | 'admin_security', |
|
52 | 52 | pattern='/security') |
|
53 | 53 | config.add_view( |
|
54 | 54 | AdminSecurityView, |
|
55 | 55 | attr='security', |
|
56 | 56 | route_name='admin_security', request_method='GET', |
|
57 | 57 | renderer='rhodecode:templates/admin/security/security.mako') |
|
58 | 58 | |
|
59 | 59 | config.add_route( |
|
60 | 60 | name='admin_security_update', |
|
61 | 61 | pattern='/security/update') |
|
62 | 62 | config.add_view( |
|
63 | 63 | AdminSecurityView, |
|
64 | 64 | attr='security_update', |
|
65 | 65 | route_name='admin_security_update', request_method='POST', |
|
66 | 66 | renderer='rhodecode:templates/admin/security/security.mako') |
|
67 | 67 | |
|
68 | 68 | config.add_route( |
|
69 | 69 | name='admin_security_modify_allowed_vcs_client_versions', |
|
70 | pattern='/security/modify/allowed_vcs_client_versions') | |
|
70 | pattern=ADMIN_PREFIX + '/security/modify/allowed_vcs_client_versions') | |
|
71 | 71 | config.add_view( |
|
72 | 72 | AdminSecurityView, |
|
73 | 73 | attr='vcs_whitelisted_client_versions_edit', |
|
74 | 74 | route_name='admin_security_modify_allowed_vcs_client_versions', request_method=('GET', 'POST'), |
|
75 | 75 | renderer='rhodecode:templates/admin/security/edit_allowed_vcs_client_versions.mako') |
|
76 | 76 | |
|
77 | 77 | |
|
78 | 78 | config.add_route( |
|
79 | 79 | name='admin_audit_logs', |
|
80 | 80 | pattern='/audit_logs') |
|
81 | 81 | config.add_view( |
|
82 | 82 | AdminAuditLogsView, |
|
83 | 83 | attr='admin_audit_logs', |
|
84 | 84 | route_name='admin_audit_logs', request_method='GET', |
|
85 | 85 | renderer='rhodecode:templates/admin/admin_audit_logs.mako') |
|
86 | 86 | |
|
87 | 87 | config.add_route( |
|
88 | 88 | name='admin_audit_log_entry', |
|
89 | 89 | pattern='/audit_logs/{audit_log_id}') |
|
90 | 90 | config.add_view( |
|
91 | 91 | AdminAuditLogsView, |
|
92 | 92 | attr='admin_audit_log_entry', |
|
93 | 93 | route_name='admin_audit_log_entry', request_method='GET', |
|
94 | 94 | renderer='rhodecode:templates/admin/admin_audit_log_entry.mako') |
|
95 | 95 | |
|
96 | 96 | # Artifacts EE feature |
|
97 | 97 | config.add_route( |
|
98 | 98 | 'admin_artifacts', |
|
99 | 99 | pattern=ADMIN_PREFIX + '/artifacts') |
|
100 | 100 | config.add_route( |
|
101 | 101 | 'admin_artifacts_show_all', |
|
102 | 102 | pattern=ADMIN_PREFIX + '/artifacts') |
|
103 | 103 | config.add_view( |
|
104 | 104 | AdminArtifactsView, |
|
105 | 105 | attr='artifacts', |
|
106 | 106 | route_name='admin_artifacts', request_method='GET', |
|
107 | 107 | renderer='rhodecode:templates/admin/artifacts/artifacts.mako') |
|
108 | 108 | config.add_view( |
|
109 | 109 | AdminArtifactsView, |
|
110 | 110 | attr='artifacts', |
|
111 | 111 | route_name='admin_artifacts_show_all', request_method='GET', |
|
112 | 112 | renderer='rhodecode:templates/admin/artifacts/artifacts.mako') |
|
113 | 113 | |
|
114 | 114 | # EE views |
|
115 | 115 | config.add_route( |
|
116 | 116 | name='admin_artifacts_show_info', |
|
117 | 117 | pattern=ADMIN_PREFIX + '/artifacts/{uid}') |
|
118 | 118 | config.add_route( |
|
119 | 119 | name='admin_artifacts_delete', |
|
120 | 120 | pattern=ADMIN_PREFIX + '/artifacts/{uid}/delete') |
|
121 | 121 | config.add_route( |
|
122 | 122 | name='admin_artifacts_update', |
|
123 | 123 | pattern=ADMIN_PREFIX + '/artifacts/{uid}/update') |
|
124 | 124 | |
|
125 | 125 | # Automation EE feature |
|
126 | 126 | config.add_route( |
|
127 | 127 | 'admin_automation', |
|
128 | 128 | pattern=ADMIN_PREFIX + '/automation') |
|
129 | 129 | config.add_view( |
|
130 | 130 | AdminAutomationView, |
|
131 | 131 | attr='automation', |
|
132 | 132 | route_name='admin_automation', request_method='GET', |
|
133 | 133 | renderer='rhodecode:templates/admin/automation/automation.mako') |
|
134 | 134 | |
|
135 | 135 | # Scheduler EE feature |
|
136 | 136 | config.add_route( |
|
137 | 137 | 'admin_scheduler', |
|
138 | 138 | pattern=ADMIN_PREFIX + '/scheduler') |
|
139 | 139 | config.add_view( |
|
140 | 140 | AdminSchedulerView, |
|
141 | 141 | attr='scheduler', |
|
142 | 142 | route_name='admin_scheduler', request_method='GET', |
|
143 | 143 | renderer='rhodecode:templates/admin/scheduler/scheduler.mako') |
|
144 | 144 | |
|
145 | 145 | config.add_route( |
|
146 | 146 | name='admin_settings_open_source', |
|
147 | 147 | pattern='/settings/open_source') |
|
148 | 148 | config.add_view( |
|
149 | 149 | OpenSourceLicensesAdminSettingsView, |
|
150 | 150 | attr='open_source_licenses', |
|
151 | 151 | route_name='admin_settings_open_source', request_method='GET', |
|
152 | 152 | renderer='rhodecode:templates/admin/settings/settings.mako') |
|
153 | 153 | |
|
154 | 154 | config.add_route( |
|
155 | 155 | name='admin_settings_vcs_svn_generate_cfg', |
|
156 | 156 | pattern='/settings/vcs/svn_generate_cfg') |
|
157 | 157 | config.add_view( |
|
158 | 158 | AdminSvnConfigView, |
|
159 | 159 | attr='vcs_svn_generate_config', |
|
160 | 160 | route_name='admin_settings_vcs_svn_generate_cfg', |
|
161 | 161 | request_method='POST', renderer='json') |
|
162 | 162 | |
|
163 | 163 | config.add_route( |
|
164 | 164 | name='admin_settings_system', |
|
165 | 165 | pattern='/settings/system') |
|
166 | 166 | config.add_view( |
|
167 | 167 | AdminSystemInfoSettingsView, |
|
168 | 168 | attr='settings_system_info', |
|
169 | 169 | route_name='admin_settings_system', request_method='GET', |
|
170 | 170 | renderer='rhodecode:templates/admin/settings/settings.mako') |
|
171 | 171 | |
|
172 | 172 | config.add_route( |
|
173 | 173 | name='admin_settings_system_update', |
|
174 | 174 | pattern='/settings/system/updates') |
|
175 | 175 | config.add_view( |
|
176 | 176 | AdminSystemInfoSettingsView, |
|
177 | 177 | attr='settings_system_info_check_update', |
|
178 | 178 | route_name='admin_settings_system_update', request_method='GET', |
|
179 | 179 | renderer='rhodecode:templates/admin/settings/settings_system_update.mako') |
|
180 | 180 | |
|
181 | 181 | config.add_route( |
|
182 | 182 | name='admin_settings_exception_tracker', |
|
183 | 183 | pattern='/settings/exceptions') |
|
184 | 184 | config.add_view( |
|
185 | 185 | ExceptionsTrackerView, |
|
186 | 186 | attr='browse_exceptions', |
|
187 | 187 | route_name='admin_settings_exception_tracker', request_method='GET', |
|
188 | 188 | renderer='rhodecode:templates/admin/settings/settings.mako') |
|
189 | 189 | |
|
190 | 190 | config.add_route( |
|
191 | 191 | name='admin_settings_exception_tracker_delete_all', |
|
192 | 192 | pattern='/settings/exceptions_delete_all') |
|
193 | 193 | config.add_view( |
|
194 | 194 | ExceptionsTrackerView, |
|
195 | 195 | attr='exception_delete_all', |
|
196 | 196 | route_name='admin_settings_exception_tracker_delete_all', request_method='POST', |
|
197 | 197 | renderer='rhodecode:templates/admin/settings/settings.mako') |
|
198 | 198 | |
|
199 | 199 | config.add_route( |
|
200 | 200 | name='admin_settings_exception_tracker_show', |
|
201 | 201 | pattern='/settings/exceptions/{exception_id}') |
|
202 | 202 | config.add_view( |
|
203 | 203 | ExceptionsTrackerView, |
|
204 | 204 | attr='exception_show', |
|
205 | 205 | route_name='admin_settings_exception_tracker_show', request_method='GET', |
|
206 | 206 | renderer='rhodecode:templates/admin/settings/settings.mako') |
|
207 | 207 | |
|
208 | 208 | config.add_route( |
|
209 | 209 | name='admin_settings_exception_tracker_delete', |
|
210 | 210 | pattern='/settings/exceptions/{exception_id}/delete') |
|
211 | 211 | config.add_view( |
|
212 | 212 | ExceptionsTrackerView, |
|
213 | 213 | attr='exception_delete', |
|
214 | 214 | route_name='admin_settings_exception_tracker_delete', request_method='POST', |
|
215 | 215 | renderer='rhodecode:templates/admin/settings/settings.mako') |
|
216 | 216 | |
|
217 | 217 | config.add_route( |
|
218 | 218 | name='admin_settings_sessions', |
|
219 | 219 | pattern='/settings/sessions') |
|
220 | 220 | config.add_view( |
|
221 | 221 | AdminSessionSettingsView, |
|
222 | 222 | attr='settings_sessions', |
|
223 | 223 | route_name='admin_settings_sessions', request_method='GET', |
|
224 | 224 | renderer='rhodecode:templates/admin/settings/settings.mako') |
|
225 | 225 | |
|
226 | 226 | config.add_route( |
|
227 | 227 | name='admin_settings_sessions_cleanup', |
|
228 | 228 | pattern='/settings/sessions/cleanup') |
|
229 | 229 | config.add_view( |
|
230 | 230 | AdminSessionSettingsView, |
|
231 | 231 | attr='settings_sessions_cleanup', |
|
232 | 232 | route_name='admin_settings_sessions_cleanup', request_method='POST') |
|
233 | 233 | |
|
234 | 234 | config.add_route( |
|
235 | 235 | name='admin_settings_process_management', |
|
236 | 236 | pattern='/settings/process_management') |
|
237 | 237 | config.add_view( |
|
238 | 238 | AdminProcessManagementView, |
|
239 | 239 | attr='process_management', |
|
240 | 240 | route_name='admin_settings_process_management', request_method='GET', |
|
241 | 241 | renderer='rhodecode:templates/admin/settings/settings.mako') |
|
242 | 242 | |
|
243 | 243 | config.add_route( |
|
244 | 244 | name='admin_settings_process_management_data', |
|
245 | 245 | pattern='/settings/process_management/data') |
|
246 | 246 | config.add_view( |
|
247 | 247 | AdminProcessManagementView, |
|
248 | 248 | attr='process_management_data', |
|
249 | 249 | route_name='admin_settings_process_management_data', request_method='GET', |
|
250 | 250 | renderer='rhodecode:templates/admin/settings/settings_process_management_data.mako') |
|
251 | 251 | |
|
252 | 252 | config.add_route( |
|
253 | 253 | name='admin_settings_process_management_signal', |
|
254 | 254 | pattern='/settings/process_management/signal') |
|
255 | 255 | config.add_view( |
|
256 | 256 | AdminProcessManagementView, |
|
257 | 257 | attr='process_management_signal', |
|
258 | 258 | route_name='admin_settings_process_management_signal', |
|
259 | 259 | request_method='POST', renderer='json_ext') |
|
260 | 260 | |
|
261 | 261 | config.add_route( |
|
262 | 262 | name='admin_settings_process_management_master_signal', |
|
263 | 263 | pattern='/settings/process_management/master_signal') |
|
264 | 264 | config.add_view( |
|
265 | 265 | AdminProcessManagementView, |
|
266 | 266 | attr='process_management_master_signal', |
|
267 | 267 | route_name='admin_settings_process_management_master_signal', |
|
268 | 268 | request_method='POST', renderer='json_ext') |
|
269 | 269 | |
|
270 | 270 | # default settings |
|
271 | 271 | config.add_route( |
|
272 | 272 | name='admin_defaults_repositories', |
|
273 | 273 | pattern='/defaults/repositories') |
|
274 | 274 | config.add_view( |
|
275 | 275 | AdminDefaultSettingsView, |
|
276 | 276 | attr='defaults_repository_show', |
|
277 | 277 | route_name='admin_defaults_repositories', request_method='GET', |
|
278 | 278 | renderer='rhodecode:templates/admin/defaults/defaults.mako') |
|
279 | 279 | |
|
280 | 280 | config.add_route( |
|
281 | 281 | name='admin_defaults_repositories_update', |
|
282 | 282 | pattern='/defaults/repositories/update') |
|
283 | 283 | config.add_view( |
|
284 | 284 | AdminDefaultSettingsView, |
|
285 | 285 | attr='defaults_repository_update', |
|
286 | 286 | route_name='admin_defaults_repositories_update', request_method='POST', |
|
287 | 287 | renderer='rhodecode:templates/admin/defaults/defaults.mako') |
|
288 | 288 | |
|
289 | 289 | # admin settings |
|
290 | 290 | |
|
291 | 291 | config.add_route( |
|
292 | 292 | name='admin_settings', |
|
293 | 293 | pattern='/settings') |
|
294 | 294 | config.add_view( |
|
295 | 295 | AdminSettingsView, |
|
296 | 296 | attr='settings_global', |
|
297 | 297 | route_name='admin_settings', request_method='GET', |
|
298 | 298 | renderer='rhodecode:templates/admin/settings/settings.mako') |
|
299 | 299 | |
|
300 | 300 | config.add_route( |
|
301 | 301 | name='admin_settings_update', |
|
302 | 302 | pattern='/settings/update') |
|
303 | 303 | config.add_view( |
|
304 | 304 | AdminSettingsView, |
|
305 | 305 | attr='settings_global_update', |
|
306 | 306 | route_name='admin_settings_update', request_method='POST', |
|
307 | 307 | renderer='rhodecode:templates/admin/settings/settings.mako') |
|
308 | 308 | |
|
309 | 309 | config.add_route( |
|
310 | 310 | name='admin_settings_global', |
|
311 | 311 | pattern='/settings/global') |
|
312 | 312 | config.add_view( |
|
313 | 313 | AdminSettingsView, |
|
314 | 314 | attr='settings_global', |
|
315 | 315 | route_name='admin_settings_global', request_method='GET', |
|
316 | 316 | renderer='rhodecode:templates/admin/settings/settings.mako') |
|
317 | 317 | |
|
318 | 318 | config.add_route( |
|
319 | 319 | name='admin_settings_global_update', |
|
320 | 320 | pattern='/settings/global/update') |
|
321 | 321 | config.add_view( |
|
322 | 322 | AdminSettingsView, |
|
323 | 323 | attr='settings_global_update', |
|
324 | 324 | route_name='admin_settings_global_update', request_method='POST', |
|
325 | 325 | renderer='rhodecode:templates/admin/settings/settings.mako') |
|
326 | 326 | |
|
327 | 327 | config.add_route( |
|
328 | 328 | name='admin_settings_vcs', |
|
329 | 329 | pattern='/settings/vcs') |
|
330 | 330 | config.add_view( |
|
331 | 331 | AdminSettingsView, |
|
332 | 332 | attr='settings_vcs', |
|
333 | 333 | route_name='admin_settings_vcs', request_method='GET', |
|
334 | 334 | renderer='rhodecode:templates/admin/settings/settings.mako') |
|
335 | 335 | |
|
336 | 336 | config.add_route( |
|
337 | 337 | name='admin_settings_vcs_update', |
|
338 | 338 | pattern='/settings/vcs/update') |
|
339 | 339 | config.add_view( |
|
340 | 340 | AdminSettingsView, |
|
341 | 341 | attr='settings_vcs_update', |
|
342 | 342 | route_name='admin_settings_vcs_update', request_method='POST', |
|
343 | 343 | renderer='rhodecode:templates/admin/settings/settings.mako') |
|
344 | 344 | |
|
345 | 345 | config.add_route( |
|
346 | 346 | name='admin_settings_vcs_svn_pattern_delete', |
|
347 | 347 | pattern='/settings/vcs/svn_pattern_delete') |
|
348 | 348 | config.add_view( |
|
349 | 349 | AdminSettingsView, |
|
350 | 350 | attr='settings_vcs_delete_svn_pattern', |
|
351 | 351 | route_name='admin_settings_vcs_svn_pattern_delete', request_method='POST', |
|
352 | 352 | renderer='json_ext', xhr=True) |
|
353 | 353 | |
|
354 | 354 | config.add_route( |
|
355 | 355 | name='admin_settings_mapping', |
|
356 | 356 | pattern='/settings/mapping') |
|
357 | 357 | config.add_view( |
|
358 | 358 | AdminSettingsView, |
|
359 | 359 | attr='settings_mapping', |
|
360 | 360 | route_name='admin_settings_mapping', request_method='GET', |
|
361 | 361 | renderer='rhodecode:templates/admin/settings/settings.mako') |
|
362 | 362 | |
|
363 | 363 | config.add_route( |
|
364 | 364 | name='admin_settings_mapping_update', |
|
365 | 365 | pattern='/settings/mapping/update') |
|
366 | 366 | config.add_view( |
|
367 | 367 | AdminSettingsView, |
|
368 | 368 | attr='settings_mapping_update', |
|
369 | 369 | route_name='admin_settings_mapping_update', request_method='POST', |
|
370 | 370 | renderer='rhodecode:templates/admin/settings/settings.mako') |
|
371 | 371 | |
|
372 | 372 | config.add_route( |
|
373 | 373 | name='admin_settings_visual', |
|
374 | 374 | pattern='/settings/visual') |
|
375 | 375 | config.add_view( |
|
376 | 376 | AdminSettingsView, |
|
377 | 377 | attr='settings_visual', |
|
378 | 378 | route_name='admin_settings_visual', request_method='GET', |
|
379 | 379 | renderer='rhodecode:templates/admin/settings/settings.mako') |
|
380 | 380 | |
|
381 | 381 | config.add_route( |
|
382 | 382 | name='admin_settings_visual_update', |
|
383 | 383 | pattern='/settings/visual/update') |
|
384 | 384 | config.add_view( |
|
385 | 385 | AdminSettingsView, |
|
386 | 386 | attr='settings_visual_update', |
|
387 | 387 | route_name='admin_settings_visual_update', request_method='POST', |
|
388 | 388 | renderer='rhodecode:templates/admin/settings/settings.mako') |
|
389 | 389 | |
|
390 | 390 | config.add_route( |
|
391 | 391 | name='admin_settings_issuetracker', |
|
392 | 392 | pattern='/settings/issue-tracker') |
|
393 | 393 | config.add_view( |
|
394 | 394 | AdminSettingsView, |
|
395 | 395 | attr='settings_issuetracker', |
|
396 | 396 | route_name='admin_settings_issuetracker', request_method='GET', |
|
397 | 397 | renderer='rhodecode:templates/admin/settings/settings.mako') |
|
398 | 398 | |
|
399 | 399 | config.add_route( |
|
400 | 400 | name='admin_settings_issuetracker_update', |
|
401 | 401 | pattern='/settings/issue-tracker/update') |
|
402 | 402 | config.add_view( |
|
403 | 403 | AdminSettingsView, |
|
404 | 404 | attr='settings_issuetracker_update', |
|
405 | 405 | route_name='admin_settings_issuetracker_update', request_method='POST', |
|
406 | 406 | renderer='rhodecode:templates/admin/settings/settings.mako') |
|
407 | 407 | |
|
408 | 408 | config.add_route( |
|
409 | 409 | name='admin_settings_issuetracker_test', |
|
410 | 410 | pattern='/settings/issue-tracker/test') |
|
411 | 411 | config.add_view( |
|
412 | 412 | AdminSettingsView, |
|
413 | 413 | attr='settings_issuetracker_test', |
|
414 | 414 | route_name='admin_settings_issuetracker_test', request_method='POST', |
|
415 | 415 | renderer='string', xhr=True) |
|
416 | 416 | |
|
417 | 417 | config.add_route( |
|
418 | 418 | name='admin_settings_issuetracker_delete', |
|
419 | 419 | pattern='/settings/issue-tracker/delete') |
|
420 | 420 | config.add_view( |
|
421 | 421 | AdminSettingsView, |
|
422 | 422 | attr='settings_issuetracker_delete', |
|
423 | 423 | route_name='admin_settings_issuetracker_delete', request_method='POST', |
|
424 | 424 | renderer='json_ext', xhr=True) |
|
425 | 425 | |
|
426 | 426 | config.add_route( |
|
427 | 427 | name='admin_settings_email', |
|
428 | 428 | pattern='/settings/email') |
|
429 | 429 | config.add_view( |
|
430 | 430 | AdminSettingsView, |
|
431 | 431 | attr='settings_email', |
|
432 | 432 | route_name='admin_settings_email', request_method='GET', |
|
433 | 433 | renderer='rhodecode:templates/admin/settings/settings.mako') |
|
434 | 434 | |
|
435 | 435 | config.add_route( |
|
436 | 436 | name='admin_settings_email_update', |
|
437 | 437 | pattern='/settings/email/update') |
|
438 | 438 | config.add_view( |
|
439 | 439 | AdminSettingsView, |
|
440 | 440 | attr='settings_email_update', |
|
441 | 441 | route_name='admin_settings_email_update', request_method='POST', |
|
442 | 442 | renderer='rhodecode:templates/admin/settings/settings.mako') |
|
443 | 443 | |
|
444 | 444 | config.add_route( |
|
445 | 445 | name='admin_settings_hooks', |
|
446 | 446 | pattern='/settings/hooks') |
|
447 | 447 | config.add_view( |
|
448 | 448 | AdminSettingsView, |
|
449 | 449 | attr='settings_hooks', |
|
450 | 450 | route_name='admin_settings_hooks', request_method='GET', |
|
451 | 451 | renderer='rhodecode:templates/admin/settings/settings.mako') |
|
452 | 452 | |
|
453 | 453 | config.add_route( |
|
454 | 454 | name='admin_settings_hooks_update', |
|
455 | 455 | pattern='/settings/hooks/update') |
|
456 | 456 | config.add_view( |
|
457 | 457 | AdminSettingsView, |
|
458 | 458 | attr='settings_hooks_update', |
|
459 | 459 | route_name='admin_settings_hooks_update', request_method='POST', |
|
460 | 460 | renderer='rhodecode:templates/admin/settings/settings.mako') |
|
461 | 461 | |
|
462 | 462 | config.add_route( |
|
463 | 463 | name='admin_settings_hooks_delete', |
|
464 | 464 | pattern='/settings/hooks/delete') |
|
465 | 465 | config.add_view( |
|
466 | 466 | AdminSettingsView, |
|
467 | 467 | attr='settings_hooks_update', |
|
468 | 468 | route_name='admin_settings_hooks_delete', request_method='POST', |
|
469 | 469 | renderer='rhodecode:templates/admin/settings/settings.mako') |
|
470 | 470 | |
|
471 | 471 | config.add_route( |
|
472 | 472 | name='admin_settings_search', |
|
473 | 473 | pattern='/settings/search') |
|
474 | 474 | config.add_view( |
|
475 | 475 | AdminSettingsView, |
|
476 | 476 | attr='settings_search', |
|
477 | 477 | route_name='admin_settings_search', request_method='GET', |
|
478 | 478 | renderer='rhodecode:templates/admin/settings/settings.mako') |
|
479 | 479 | |
|
480 | 480 | config.add_route( |
|
481 | 481 | name='admin_settings_labs', |
|
482 | 482 | pattern='/settings/labs') |
|
483 | 483 | config.add_view( |
|
484 | 484 | AdminSettingsView, |
|
485 | 485 | attr='settings_labs', |
|
486 | 486 | route_name='admin_settings_labs', request_method='GET', |
|
487 | 487 | renderer='rhodecode:templates/admin/settings/settings.mako') |
|
488 | 488 | |
|
489 | 489 | config.add_route( |
|
490 | 490 | name='admin_settings_labs_update', |
|
491 | 491 | pattern='/settings/labs/update') |
|
492 | 492 | config.add_view( |
|
493 | 493 | AdminSettingsView, |
|
494 | 494 | attr='settings_labs_update', |
|
495 | 495 | route_name='admin_settings_labs_update', request_method='POST', |
|
496 | 496 | renderer='rhodecode:templates/admin/settings/settings.mako') |
|
497 | 497 | |
|
498 | 498 | # global permissions |
|
499 | 499 | |
|
500 | 500 | config.add_route( |
|
501 | 501 | name='admin_permissions_application', |
|
502 | 502 | pattern='/permissions/application') |
|
503 | 503 | config.add_view( |
|
504 | 504 | AdminPermissionsView, |
|
505 | 505 | attr='permissions_application', |
|
506 | 506 | route_name='admin_permissions_application', request_method='GET', |
|
507 | 507 | renderer='rhodecode:templates/admin/permissions/permissions.mako') |
|
508 | 508 | |
|
509 | 509 | config.add_route( |
|
510 | 510 | name='admin_permissions_application_update', |
|
511 | 511 | pattern='/permissions/application/update') |
|
512 | 512 | config.add_view( |
|
513 | 513 | AdminPermissionsView, |
|
514 | 514 | attr='permissions_application_update', |
|
515 | 515 | route_name='admin_permissions_application_update', request_method='POST', |
|
516 | 516 | renderer='rhodecode:templates/admin/permissions/permissions.mako') |
|
517 | 517 | |
|
518 | 518 | config.add_route( |
|
519 | 519 | name='admin_permissions_global', |
|
520 | 520 | pattern='/permissions/global') |
|
521 | 521 | config.add_view( |
|
522 | 522 | AdminPermissionsView, |
|
523 | 523 | attr='permissions_global', |
|
524 | 524 | route_name='admin_permissions_global', request_method='GET', |
|
525 | 525 | renderer='rhodecode:templates/admin/permissions/permissions.mako') |
|
526 | 526 | |
|
527 | 527 | config.add_route( |
|
528 | 528 | name='admin_permissions_global_update', |
|
529 | 529 | pattern='/permissions/global/update') |
|
530 | 530 | config.add_view( |
|
531 | 531 | AdminPermissionsView, |
|
532 | 532 | attr='permissions_global_update', |
|
533 | 533 | route_name='admin_permissions_global_update', request_method='POST', |
|
534 | 534 | renderer='rhodecode:templates/admin/permissions/permissions.mako') |
|
535 | 535 | |
|
536 | 536 | config.add_route( |
|
537 | 537 | name='admin_permissions_object', |
|
538 | 538 | pattern='/permissions/object') |
|
539 | 539 | config.add_view( |
|
540 | 540 | AdminPermissionsView, |
|
541 | 541 | attr='permissions_objects', |
|
542 | 542 | route_name='admin_permissions_object', request_method='GET', |
|
543 | 543 | renderer='rhodecode:templates/admin/permissions/permissions.mako') |
|
544 | 544 | |
|
545 | 545 | config.add_route( |
|
546 | 546 | name='admin_permissions_object_update', |
|
547 | 547 | pattern='/permissions/object/update') |
|
548 | 548 | config.add_view( |
|
549 | 549 | AdminPermissionsView, |
|
550 | 550 | attr='permissions_objects_update', |
|
551 | 551 | route_name='admin_permissions_object_update', request_method='POST', |
|
552 | 552 | renderer='rhodecode:templates/admin/permissions/permissions.mako') |
|
553 | 553 | |
|
554 | 554 | # Branch perms EE feature |
|
555 | 555 | config.add_route( |
|
556 | 556 | name='admin_permissions_branch', |
|
557 | 557 | pattern='/permissions/branch') |
|
558 | 558 | config.add_view( |
|
559 | 559 | AdminPermissionsView, |
|
560 | 560 | attr='permissions_branch', |
|
561 | 561 | route_name='admin_permissions_branch', request_method='GET', |
|
562 | 562 | renderer='rhodecode:templates/admin/permissions/permissions.mako') |
|
563 | 563 | |
|
564 | 564 | config.add_route( |
|
565 | 565 | name='admin_permissions_ips', |
|
566 | 566 | pattern='/permissions/ips') |
|
567 | 567 | config.add_view( |
|
568 | 568 | AdminPermissionsView, |
|
569 | 569 | attr='permissions_ips', |
|
570 | 570 | route_name='admin_permissions_ips', request_method='GET', |
|
571 | 571 | renderer='rhodecode:templates/admin/permissions/permissions.mako') |
|
572 | 572 | |
|
573 | 573 | config.add_route( |
|
574 | 574 | name='admin_permissions_overview', |
|
575 | 575 | pattern='/permissions/overview') |
|
576 | 576 | config.add_view( |
|
577 | 577 | AdminPermissionsView, |
|
578 | 578 | attr='permissions_overview', |
|
579 | 579 | route_name='admin_permissions_overview', request_method='GET', |
|
580 | 580 | renderer='rhodecode:templates/admin/permissions/permissions.mako') |
|
581 | 581 | |
|
582 | 582 | config.add_route( |
|
583 | 583 | name='admin_permissions_auth_token_access', |
|
584 | 584 | pattern='/permissions/auth_token_access') |
|
585 | 585 | config.add_view( |
|
586 | 586 | AdminPermissionsView, |
|
587 | 587 | attr='auth_token_access', |
|
588 | 588 | route_name='admin_permissions_auth_token_access', request_method='GET', |
|
589 | 589 | renderer='rhodecode:templates/admin/permissions/permissions.mako') |
|
590 | 590 | |
|
591 | 591 | config.add_route( |
|
592 | 592 | name='admin_permissions_ssh_keys', |
|
593 | 593 | pattern='/permissions/ssh_keys') |
|
594 | 594 | config.add_view( |
|
595 | 595 | AdminPermissionsView, |
|
596 | 596 | attr='ssh_keys', |
|
597 | 597 | route_name='admin_permissions_ssh_keys', request_method='GET', |
|
598 | 598 | renderer='rhodecode:templates/admin/permissions/permissions.mako') |
|
599 | 599 | |
|
600 | 600 | config.add_route( |
|
601 | 601 | name='admin_permissions_ssh_keys_data', |
|
602 | 602 | pattern='/permissions/ssh_keys/data') |
|
603 | 603 | config.add_view( |
|
604 | 604 | AdminPermissionsView, |
|
605 | 605 | attr='ssh_keys_data', |
|
606 | 606 | route_name='admin_permissions_ssh_keys_data', request_method='GET', |
|
607 | 607 | renderer='json_ext', xhr=True) |
|
608 | 608 | |
|
609 | 609 | config.add_route( |
|
610 | 610 | name='admin_permissions_ssh_keys_update', |
|
611 | 611 | pattern='/permissions/ssh_keys/update') |
|
612 | 612 | config.add_view( |
|
613 | 613 | AdminPermissionsView, |
|
614 | 614 | attr='ssh_keys_update', |
|
615 | 615 | route_name='admin_permissions_ssh_keys_update', request_method='POST', |
|
616 | 616 | renderer='rhodecode:templates/admin/permissions/permissions.mako') |
|
617 | 617 | |
|
618 | 618 | # users admin |
|
619 | 619 | config.add_route( |
|
620 | 620 | name='users', |
|
621 | 621 | pattern='/users') |
|
622 | 622 | config.add_view( |
|
623 | 623 | AdminUsersView, |
|
624 | 624 | attr='users_list', |
|
625 | 625 | route_name='users', request_method='GET', |
|
626 | 626 | renderer='rhodecode:templates/admin/users/users.mako') |
|
627 | 627 | |
|
628 | 628 | config.add_route( |
|
629 | 629 | name='users_data', |
|
630 | 630 | pattern='/users_data') |
|
631 | 631 | config.add_view( |
|
632 | 632 | AdminUsersView, |
|
633 | 633 | attr='users_list_data', |
|
634 | 634 | # renderer defined below |
|
635 | 635 | route_name='users_data', request_method='GET', |
|
636 | 636 | renderer='json_ext', xhr=True) |
|
637 | 637 | |
|
638 | 638 | config.add_route( |
|
639 | 639 | name='users_create', |
|
640 | 640 | pattern='/users/create') |
|
641 | 641 | config.add_view( |
|
642 | 642 | AdminUsersView, |
|
643 | 643 | attr='users_create', |
|
644 | 644 | route_name='users_create', request_method='POST', |
|
645 | 645 | renderer='rhodecode:templates/admin/users/user_add.mako') |
|
646 | 646 | |
|
647 | 647 | config.add_route( |
|
648 | 648 | name='users_new', |
|
649 | 649 | pattern='/users/new') |
|
650 | 650 | config.add_view( |
|
651 | 651 | AdminUsersView, |
|
652 | 652 | attr='users_new', |
|
653 | 653 | route_name='users_new', request_method='GET', |
|
654 | 654 | renderer='rhodecode:templates/admin/users/user_add.mako') |
|
655 | 655 | |
|
656 | 656 | # user management |
|
657 | 657 | config.add_route( |
|
658 | 658 | name='user_edit', |
|
659 | 659 | pattern=r'/users/{user_id:\d+}/edit', |
|
660 | 660 | user_route=True) |
|
661 | 661 | config.add_view( |
|
662 | 662 | UsersView, |
|
663 | 663 | attr='user_edit', |
|
664 | 664 | route_name='user_edit', request_method='GET', |
|
665 | 665 | renderer='rhodecode:templates/admin/users/user_edit.mako') |
|
666 | 666 | |
|
667 | 667 | config.add_route( |
|
668 | 668 | name='user_edit_advanced', |
|
669 | 669 | pattern=r'/users/{user_id:\d+}/edit/advanced', |
|
670 | 670 | user_route=True) |
|
671 | 671 | config.add_view( |
|
672 | 672 | UsersView, |
|
673 | 673 | attr='user_edit_advanced', |
|
674 | 674 | route_name='user_edit_advanced', request_method='GET', |
|
675 | 675 | renderer='rhodecode:templates/admin/users/user_edit.mako') |
|
676 | 676 | |
|
677 | 677 | config.add_route( |
|
678 | 678 | name='user_edit_global_perms', |
|
679 | 679 | pattern=r'/users/{user_id:\d+}/edit/global_permissions', |
|
680 | 680 | user_route=True) |
|
681 | 681 | config.add_view( |
|
682 | 682 | UsersView, |
|
683 | 683 | attr='user_edit_global_perms', |
|
684 | 684 | route_name='user_edit_global_perms', request_method='GET', |
|
685 | 685 | renderer='rhodecode:templates/admin/users/user_edit.mako') |
|
686 | 686 | |
|
687 | 687 | config.add_route( |
|
688 | 688 | name='user_edit_global_perms_update', |
|
689 | 689 | pattern=r'/users/{user_id:\d+}/edit/global_permissions/update', |
|
690 | 690 | user_route=True) |
|
691 | 691 | config.add_view( |
|
692 | 692 | UsersView, |
|
693 | 693 | attr='user_edit_global_perms_update', |
|
694 | 694 | route_name='user_edit_global_perms_update', request_method='POST', |
|
695 | 695 | renderer='rhodecode:templates/admin/users/user_edit.mako') |
|
696 | 696 | |
|
697 | 697 | config.add_route( |
|
698 | 698 | name='user_update', |
|
699 | 699 | pattern=r'/users/{user_id:\d+}/update', |
|
700 | 700 | user_route=True) |
|
701 | 701 | config.add_view( |
|
702 | 702 | UsersView, |
|
703 | 703 | attr='user_update', |
|
704 | 704 | route_name='user_update', request_method='POST', |
|
705 | 705 | renderer='rhodecode:templates/admin/users/user_edit.mako') |
|
706 | 706 | |
|
707 | 707 | config.add_route( |
|
708 | 708 | name='user_delete', |
|
709 | 709 | pattern=r'/users/{user_id:\d+}/delete', |
|
710 | 710 | user_route=True) |
|
711 | 711 | config.add_view( |
|
712 | 712 | UsersView, |
|
713 | 713 | attr='user_delete', |
|
714 | 714 | route_name='user_delete', request_method='POST', |
|
715 | 715 | renderer='rhodecode:templates/admin/users/user_edit.mako') |
|
716 | 716 | |
|
717 | 717 | config.add_route( |
|
718 | 718 | name='user_enable_force_password_reset', |
|
719 | 719 | pattern=r'/users/{user_id:\d+}/password_reset_enable', |
|
720 | 720 | user_route=True) |
|
721 | 721 | config.add_view( |
|
722 | 722 | UsersView, |
|
723 | 723 | attr='user_enable_force_password_reset', |
|
724 | 724 | route_name='user_enable_force_password_reset', request_method='POST', |
|
725 | 725 | renderer='rhodecode:templates/admin/users/user_edit.mako') |
|
726 | 726 | |
|
727 | 727 | config.add_route( |
|
728 | 728 | name='user_disable_force_password_reset', |
|
729 | 729 | pattern=r'/users/{user_id:\d+}/password_reset_disable', |
|
730 | 730 | user_route=True) |
|
731 | 731 | config.add_view( |
|
732 | 732 | UsersView, |
|
733 | 733 | attr='user_disable_force_password_reset', |
|
734 | 734 | route_name='user_disable_force_password_reset', request_method='POST', |
|
735 | 735 | renderer='rhodecode:templates/admin/users/user_edit.mako') |
|
736 | 736 | |
|
737 | 737 | config.add_route( |
|
738 | 738 | name='user_create_personal_repo_group', |
|
739 | 739 | pattern=r'/users/{user_id:\d+}/create_repo_group', |
|
740 | 740 | user_route=True) |
|
741 | 741 | config.add_view( |
|
742 | 742 | UsersView, |
|
743 | 743 | attr='user_create_personal_repo_group', |
|
744 | 744 | route_name='user_create_personal_repo_group', request_method='POST', |
|
745 | 745 | renderer='rhodecode:templates/admin/users/user_edit.mako') |
|
746 | 746 | |
|
747 | 747 | # user notice |
|
748 | 748 | config.add_route( |
|
749 | 749 | name='user_notice_dismiss', |
|
750 | 750 | pattern=r'/users/{user_id:\d+}/notice_dismiss', |
|
751 | 751 | user_route=True) |
|
752 | 752 | config.add_view( |
|
753 | 753 | UsersView, |
|
754 | 754 | attr='user_notice_dismiss', |
|
755 | 755 | route_name='user_notice_dismiss', request_method='POST', |
|
756 | 756 | renderer='json_ext', xhr=True) |
|
757 | 757 | |
|
758 | 758 | # user auth tokens |
|
759 | 759 | config.add_route( |
|
760 | 760 | name='edit_user_auth_tokens', |
|
761 | 761 | pattern=r'/users/{user_id:\d+}/edit/auth_tokens', |
|
762 | 762 | user_route=True) |
|
763 | 763 | config.add_view( |
|
764 | 764 | UsersView, |
|
765 | 765 | attr='auth_tokens', |
|
766 | 766 | route_name='edit_user_auth_tokens', request_method='GET', |
|
767 | 767 | renderer='rhodecode:templates/admin/users/user_edit.mako') |
|
768 | 768 | |
|
769 | 769 | config.add_route( |
|
770 | 770 | name='edit_user_auth_tokens_view', |
|
771 | 771 | pattern=r'/users/{user_id:\d+}/edit/auth_tokens/view', |
|
772 | 772 | user_route=True) |
|
773 | 773 | config.add_view( |
|
774 | 774 | UsersView, |
|
775 | 775 | attr='auth_tokens_view', |
|
776 | 776 | route_name='edit_user_auth_tokens_view', request_method='POST', |
|
777 | 777 | renderer='json_ext', xhr=True) |
|
778 | 778 | |
|
779 | 779 | config.add_route( |
|
780 | 780 | name='edit_user_auth_tokens_add', |
|
781 | 781 | pattern=r'/users/{user_id:\d+}/edit/auth_tokens/new', |
|
782 | 782 | user_route=True) |
|
783 | 783 | config.add_view( |
|
784 | 784 | UsersView, |
|
785 | 785 | attr='auth_tokens_add', |
|
786 | 786 | route_name='edit_user_auth_tokens_add', request_method='POST') |
|
787 | 787 | |
|
788 | 788 | config.add_route( |
|
789 | 789 | name='edit_user_auth_tokens_delete', |
|
790 | 790 | pattern=r'/users/{user_id:\d+}/edit/auth_tokens/delete', |
|
791 | 791 | user_route=True) |
|
792 | 792 | config.add_view( |
|
793 | 793 | UsersView, |
|
794 | 794 | attr='auth_tokens_delete', |
|
795 | 795 | route_name='edit_user_auth_tokens_delete', request_method='POST') |
|
796 | 796 | |
|
797 | 797 | # user ssh keys |
|
798 | 798 | config.add_route( |
|
799 | 799 | name='edit_user_ssh_keys', |
|
800 | 800 | pattern=r'/users/{user_id:\d+}/edit/ssh_keys', |
|
801 | 801 | user_route=True) |
|
802 | 802 | config.add_view( |
|
803 | 803 | UsersView, |
|
804 | 804 | attr='ssh_keys', |
|
805 | 805 | route_name='edit_user_ssh_keys', request_method='GET', |
|
806 | 806 | renderer='rhodecode:templates/admin/users/user_edit.mako') |
|
807 | 807 | |
|
808 | 808 | config.add_route( |
|
809 | 809 | name='edit_user_ssh_keys_generate_keypair', |
|
810 | 810 | pattern=r'/users/{user_id:\d+}/edit/ssh_keys/generate', |
|
811 | 811 | user_route=True) |
|
812 | 812 | config.add_view( |
|
813 | 813 | UsersView, |
|
814 | 814 | attr='ssh_keys_generate_keypair', |
|
815 | 815 | route_name='edit_user_ssh_keys_generate_keypair', request_method='GET', |
|
816 | 816 | renderer='rhodecode:templates/admin/users/user_edit.mako') |
|
817 | 817 | |
|
818 | 818 | config.add_route( |
|
819 | 819 | name='edit_user_ssh_keys_add', |
|
820 | 820 | pattern=r'/users/{user_id:\d+}/edit/ssh_keys/new', |
|
821 | 821 | user_route=True) |
|
822 | 822 | config.add_view( |
|
823 | 823 | UsersView, |
|
824 | 824 | attr='ssh_keys_add', |
|
825 | 825 | route_name='edit_user_ssh_keys_add', request_method='POST') |
|
826 | 826 | |
|
827 | 827 | config.add_route( |
|
828 | 828 | name='edit_user_ssh_keys_delete', |
|
829 | 829 | pattern=r'/users/{user_id:\d+}/edit/ssh_keys/delete', |
|
830 | 830 | user_route=True) |
|
831 | 831 | config.add_view( |
|
832 | 832 | UsersView, |
|
833 | 833 | attr='ssh_keys_delete', |
|
834 | 834 | route_name='edit_user_ssh_keys_delete', request_method='POST') |
|
835 | 835 | |
|
836 | 836 | # user emails |
|
837 | 837 | config.add_route( |
|
838 | 838 | name='edit_user_emails', |
|
839 | 839 | pattern=r'/users/{user_id:\d+}/edit/emails', |
|
840 | 840 | user_route=True) |
|
841 | 841 | config.add_view( |
|
842 | 842 | UsersView, |
|
843 | 843 | attr='emails', |
|
844 | 844 | route_name='edit_user_emails', request_method='GET', |
|
845 | 845 | renderer='rhodecode:templates/admin/users/user_edit.mako') |
|
846 | 846 | |
|
847 | 847 | config.add_route( |
|
848 | 848 | name='edit_user_emails_add', |
|
849 | 849 | pattern=r'/users/{user_id:\d+}/edit/emails/new', |
|
850 | 850 | user_route=True) |
|
851 | 851 | config.add_view( |
|
852 | 852 | UsersView, |
|
853 | 853 | attr='emails_add', |
|
854 | 854 | route_name='edit_user_emails_add', request_method='POST') |
|
855 | 855 | |
|
856 | 856 | config.add_route( |
|
857 | 857 | name='edit_user_emails_delete', |
|
858 | 858 | pattern=r'/users/{user_id:\d+}/edit/emails/delete', |
|
859 | 859 | user_route=True) |
|
860 | 860 | config.add_view( |
|
861 | 861 | UsersView, |
|
862 | 862 | attr='emails_delete', |
|
863 | 863 | route_name='edit_user_emails_delete', request_method='POST') |
|
864 | 864 | |
|
865 | 865 | # user IPs |
|
866 | 866 | config.add_route( |
|
867 | 867 | name='edit_user_ips', |
|
868 | 868 | pattern=r'/users/{user_id:\d+}/edit/ips', |
|
869 | 869 | user_route=True) |
|
870 | 870 | config.add_view( |
|
871 | 871 | UsersView, |
|
872 | 872 | attr='ips', |
|
873 | 873 | route_name='edit_user_ips', request_method='GET', |
|
874 | 874 | renderer='rhodecode:templates/admin/users/user_edit.mako') |
|
875 | 875 | |
|
876 | 876 | config.add_route( |
|
877 | 877 | name='edit_user_ips_add', |
|
878 | 878 | pattern=r'/users/{user_id:\d+}/edit/ips/new', |
|
879 | 879 | user_route_with_default=True) # enabled for default user too |
|
880 | 880 | config.add_view( |
|
881 | 881 | UsersView, |
|
882 | 882 | attr='ips_add', |
|
883 | 883 | route_name='edit_user_ips_add', request_method='POST') |
|
884 | 884 | |
|
885 | 885 | config.add_route( |
|
886 | 886 | name='edit_user_ips_delete', |
|
887 | 887 | pattern=r'/users/{user_id:\d+}/edit/ips/delete', |
|
888 | 888 | user_route_with_default=True) # enabled for default user too |
|
889 | 889 | config.add_view( |
|
890 | 890 | UsersView, |
|
891 | 891 | attr='ips_delete', |
|
892 | 892 | route_name='edit_user_ips_delete', request_method='POST') |
|
893 | 893 | |
|
894 | 894 | # user perms |
|
895 | 895 | config.add_route( |
|
896 | 896 | name='edit_user_perms_summary', |
|
897 | 897 | pattern=r'/users/{user_id:\d+}/edit/permissions_summary', |
|
898 | 898 | user_route=True) |
|
899 | 899 | config.add_view( |
|
900 | 900 | UsersView, |
|
901 | 901 | attr='user_perms_summary', |
|
902 | 902 | route_name='edit_user_perms_summary', request_method='GET', |
|
903 | 903 | renderer='rhodecode:templates/admin/users/user_edit.mako') |
|
904 | 904 | |
|
905 | 905 | config.add_route( |
|
906 | 906 | name='edit_user_perms_summary_json', |
|
907 | 907 | pattern=r'/users/{user_id:\d+}/edit/permissions_summary/json', |
|
908 | 908 | user_route=True) |
|
909 | 909 | config.add_view( |
|
910 | 910 | UsersView, |
|
911 | 911 | attr='user_perms_summary_json', |
|
912 | 912 | route_name='edit_user_perms_summary_json', request_method='GET', |
|
913 | 913 | renderer='json_ext') |
|
914 | 914 | |
|
915 | 915 | # user user groups management |
|
916 | 916 | config.add_route( |
|
917 | 917 | name='edit_user_groups_management', |
|
918 | 918 | pattern=r'/users/{user_id:\d+}/edit/groups_management', |
|
919 | 919 | user_route=True) |
|
920 | 920 | config.add_view( |
|
921 | 921 | UsersView, |
|
922 | 922 | attr='groups_management', |
|
923 | 923 | route_name='edit_user_groups_management', request_method='GET', |
|
924 | 924 | renderer='rhodecode:templates/admin/users/user_edit.mako') |
|
925 | 925 | |
|
926 | 926 | config.add_route( |
|
927 | 927 | name='edit_user_groups_management_updates', |
|
928 | 928 | pattern=r'/users/{user_id:\d+}/edit/edit_user_groups_management/updates', |
|
929 | 929 | user_route=True) |
|
930 | 930 | config.add_view( |
|
931 | 931 | UsersView, |
|
932 | 932 | attr='groups_management_updates', |
|
933 | 933 | route_name='edit_user_groups_management_updates', request_method='POST') |
|
934 | 934 | |
|
935 | 935 | # user audit logs |
|
936 | 936 | config.add_route( |
|
937 | 937 | name='edit_user_audit_logs', |
|
938 | 938 | pattern=r'/users/{user_id:\d+}/edit/audit', user_route=True) |
|
939 | 939 | config.add_view( |
|
940 | 940 | UsersView, |
|
941 | 941 | attr='user_audit_logs', |
|
942 | 942 | route_name='edit_user_audit_logs', request_method='GET', |
|
943 | 943 | renderer='rhodecode:templates/admin/users/user_edit.mako') |
|
944 | 944 | |
|
945 | 945 | config.add_route( |
|
946 | 946 | name='edit_user_audit_logs_download', |
|
947 | 947 | pattern=r'/users/{user_id:\d+}/edit/audit/download', user_route=True) |
|
948 | 948 | config.add_view( |
|
949 | 949 | UsersView, |
|
950 | 950 | attr='user_audit_logs_download', |
|
951 | 951 | route_name='edit_user_audit_logs_download', request_method='GET', |
|
952 | 952 | renderer='string') |
|
953 | 953 | |
|
954 | 954 | # user caches |
|
955 | 955 | config.add_route( |
|
956 | 956 | name='edit_user_caches', |
|
957 | 957 | pattern=r'/users/{user_id:\d+}/edit/caches', |
|
958 | 958 | user_route=True) |
|
959 | 959 | config.add_view( |
|
960 | 960 | UsersView, |
|
961 | 961 | attr='user_caches', |
|
962 | 962 | route_name='edit_user_caches', request_method='GET', |
|
963 | 963 | renderer='rhodecode:templates/admin/users/user_edit.mako') |
|
964 | 964 | |
|
965 | 965 | config.add_route( |
|
966 | 966 | name='edit_user_caches_update', |
|
967 | 967 | pattern=r'/users/{user_id:\d+}/edit/caches/update', |
|
968 | 968 | user_route=True) |
|
969 | 969 | config.add_view( |
|
970 | 970 | UsersView, |
|
971 | 971 | attr='user_caches_update', |
|
972 | 972 | route_name='edit_user_caches_update', request_method='POST') |
|
973 | 973 | |
|
974 | 974 | # user-groups admin |
|
975 | 975 | config.add_route( |
|
976 | 976 | name='user_groups', |
|
977 | 977 | pattern='/user_groups') |
|
978 | 978 | config.add_view( |
|
979 | 979 | AdminUserGroupsView, |
|
980 | 980 | attr='user_groups_list', |
|
981 | 981 | route_name='user_groups', request_method='GET', |
|
982 | 982 | renderer='rhodecode:templates/admin/user_groups/user_groups.mako') |
|
983 | 983 | |
|
984 | 984 | config.add_route( |
|
985 | 985 | name='user_groups_data', |
|
986 | 986 | pattern='/user_groups_data') |
|
987 | 987 | config.add_view( |
|
988 | 988 | AdminUserGroupsView, |
|
989 | 989 | attr='user_groups_list_data', |
|
990 | 990 | route_name='user_groups_data', request_method='GET', |
|
991 | 991 | renderer='json_ext', xhr=True) |
|
992 | 992 | |
|
993 | 993 | config.add_route( |
|
994 | 994 | name='user_groups_new', |
|
995 | 995 | pattern='/user_groups/new') |
|
996 | 996 | config.add_view( |
|
997 | 997 | AdminUserGroupsView, |
|
998 | 998 | attr='user_groups_new', |
|
999 | 999 | route_name='user_groups_new', request_method='GET', |
|
1000 | 1000 | renderer='rhodecode:templates/admin/user_groups/user_group_add.mako') |
|
1001 | 1001 | |
|
1002 | 1002 | config.add_route( |
|
1003 | 1003 | name='user_groups_create', |
|
1004 | 1004 | pattern='/user_groups/create') |
|
1005 | 1005 | config.add_view( |
|
1006 | 1006 | AdminUserGroupsView, |
|
1007 | 1007 | attr='user_groups_create', |
|
1008 | 1008 | route_name='user_groups_create', request_method='POST', |
|
1009 | 1009 | renderer='rhodecode:templates/admin/user_groups/user_group_add.mako') |
|
1010 | 1010 | |
|
1011 | 1011 | # repos admin |
|
1012 | 1012 | config.add_route( |
|
1013 | 1013 | name='repos', |
|
1014 | 1014 | pattern='/repos') |
|
1015 | 1015 | config.add_view( |
|
1016 | 1016 | AdminReposView, |
|
1017 | 1017 | attr='repository_list', |
|
1018 | 1018 | route_name='repos', request_method='GET', |
|
1019 | 1019 | renderer='rhodecode:templates/admin/repos/repos.mako') |
|
1020 | 1020 | |
|
1021 | 1021 | config.add_route( |
|
1022 | 1022 | name='repos_data', |
|
1023 | 1023 | pattern='/repos_data') |
|
1024 | 1024 | config.add_view( |
|
1025 | 1025 | AdminReposView, |
|
1026 | 1026 | attr='repository_list_data', |
|
1027 | 1027 | route_name='repos_data', request_method='GET', |
|
1028 | 1028 | renderer='json_ext', xhr=True) |
|
1029 | 1029 | |
|
1030 | 1030 | config.add_route( |
|
1031 | 1031 | name='repo_new', |
|
1032 | 1032 | pattern='/repos/new') |
|
1033 | 1033 | config.add_view( |
|
1034 | 1034 | AdminReposView, |
|
1035 | 1035 | attr='repository_new', |
|
1036 | 1036 | route_name='repo_new', request_method='GET', |
|
1037 | 1037 | renderer='rhodecode:templates/admin/repos/repo_add.mako') |
|
1038 | 1038 | |
|
1039 | 1039 | config.add_route( |
|
1040 | 1040 | name='repo_create', |
|
1041 | 1041 | pattern='/repos/create') |
|
1042 | 1042 | config.add_view( |
|
1043 | 1043 | AdminReposView, |
|
1044 | 1044 | attr='repository_create', |
|
1045 | 1045 | route_name='repo_create', request_method='POST', |
|
1046 | 1046 | renderer='rhodecode:templates/admin/repos/repos.mako') |
|
1047 | 1047 | |
|
1048 | 1048 | # repo groups admin |
|
1049 | 1049 | config.add_route( |
|
1050 | 1050 | name='repo_groups', |
|
1051 | 1051 | pattern='/repo_groups') |
|
1052 | 1052 | config.add_view( |
|
1053 | 1053 | AdminRepoGroupsView, |
|
1054 | 1054 | attr='repo_group_list', |
|
1055 | 1055 | route_name='repo_groups', request_method='GET', |
|
1056 | 1056 | renderer='rhodecode:templates/admin/repo_groups/repo_groups.mako') |
|
1057 | 1057 | |
|
1058 | 1058 | config.add_route( |
|
1059 | 1059 | name='repo_groups_data', |
|
1060 | 1060 | pattern='/repo_groups_data') |
|
1061 | 1061 | config.add_view( |
|
1062 | 1062 | AdminRepoGroupsView, |
|
1063 | 1063 | attr='repo_group_list_data', |
|
1064 | 1064 | route_name='repo_groups_data', request_method='GET', |
|
1065 | 1065 | renderer='json_ext', xhr=True) |
|
1066 | 1066 | |
|
1067 | 1067 | config.add_route( |
|
1068 | 1068 | name='repo_group_new', |
|
1069 | 1069 | pattern='/repo_group/new') |
|
1070 | 1070 | config.add_view( |
|
1071 | 1071 | AdminRepoGroupsView, |
|
1072 | 1072 | attr='repo_group_new', |
|
1073 | 1073 | route_name='repo_group_new', request_method='GET', |
|
1074 | 1074 | renderer='rhodecode:templates/admin/repo_groups/repo_group_add.mako') |
|
1075 | 1075 | |
|
1076 | 1076 | config.add_route( |
|
1077 | 1077 | name='repo_group_create', |
|
1078 | 1078 | pattern='/repo_group/create') |
|
1079 | 1079 | config.add_view( |
|
1080 | 1080 | AdminRepoGroupsView, |
|
1081 | 1081 | attr='repo_group_create', |
|
1082 | 1082 | route_name='repo_group_create', request_method='POST', |
|
1083 | 1083 | renderer='rhodecode:templates/admin/repo_groups/repo_group_add.mako') |
|
1084 | 1084 | |
|
1085 | 1085 | |
|
1086 | 1086 | def includeme(config): |
|
1087 | 1087 | # Create admin navigation registry and add it to the pyramid registry. |
|
1088 | 1088 | nav_includeme(config) |
|
1089 | 1089 | |
|
1090 | 1090 | # main admin routes |
|
1091 | 1091 | config.add_route( |
|
1092 | 1092 | name='admin_home', pattern=ADMIN_PREFIX) |
|
1093 | 1093 | config.add_view( |
|
1094 | 1094 | AdminMainView, |
|
1095 | 1095 | attr='admin_main', |
|
1096 | 1096 | route_name='admin_home', request_method='GET', |
|
1097 | 1097 | renderer='rhodecode:templates/admin/main.mako') |
|
1098 | 1098 | |
|
1099 | 1099 | # pr global redirect |
|
1100 | 1100 | config.add_route( |
|
1101 | 1101 | name='pull_requests_global_0', # backward compat |
|
1102 | 1102 | pattern=ADMIN_PREFIX + r'/pull_requests/{pull_request_id:\d+}') |
|
1103 | 1103 | config.add_view( |
|
1104 | 1104 | AdminMainView, |
|
1105 | 1105 | attr='pull_requests', |
|
1106 | 1106 | route_name='pull_requests_global_0', request_method='GET') |
|
1107 | 1107 | |
|
1108 | 1108 | config.add_route( |
|
1109 | 1109 | name='pull_requests_global_1', # backward compat |
|
1110 | 1110 | pattern=ADMIN_PREFIX + r'/pull-requests/{pull_request_id:\d+}') |
|
1111 | 1111 | config.add_view( |
|
1112 | 1112 | AdminMainView, |
|
1113 | 1113 | attr='pull_requests', |
|
1114 | 1114 | route_name='pull_requests_global_1', request_method='GET') |
|
1115 | 1115 | |
|
1116 | 1116 | config.add_route( |
|
1117 | 1117 | name='pull_requests_global', |
|
1118 | 1118 | pattern=ADMIN_PREFIX + r'/pull-request/{pull_request_id:\d+}') |
|
1119 | 1119 | config.add_view( |
|
1120 | 1120 | AdminMainView, |
|
1121 | 1121 | attr='pull_requests', |
|
1122 | 1122 | route_name='pull_requests_global', request_method='GET') |
|
1123 | 1123 | |
|
1124 | 1124 | config.include(admin_routes, route_prefix=ADMIN_PREFIX) |
@@ -1,72 +1,46 b'' | |||
|
1 | 1 | # Copyright (C) 2010-2024 RhodeCode GmbH |
|
2 | 2 | # |
|
3 | 3 | # This program is free software: you can redistribute it and/or modify |
|
4 | 4 | # it under the terms of the GNU Affero General Public License, version 3 |
|
5 | 5 | # (only), as published by the Free Software Foundation. |
|
6 | 6 | # |
|
7 | 7 | # This program is distributed in the hope that it will be useful, |
|
8 | 8 | # but WITHOUT ANY WARRANTY; without even the implied warranty of |
|
9 | 9 | # MERCHANTABILITY or FITNESS FOR A PARTICULAR PURPOSE. See the |
|
10 | 10 | # GNU General Public License for more details. |
|
11 | 11 | # |
|
12 | 12 | # You should have received a copy of the GNU Affero General Public License |
|
13 | 13 | # along with this program. If not, see <http://www.gnu.org/licenses/>. |
|
14 | 14 | # |
|
15 | 15 | # This program is dual-licensed. If you wish to learn more about the |
|
16 | 16 | # RhodeCode Enterprise Edition, including its added features, Support services, |
|
17 | 17 | # and proprietary license terms, please see https://rhodecode.com/licenses/ |
|
18 | 18 | |
|
19 | 19 | import logging |
|
20 | import formencode | |
|
21 | 20 | |
|
22 | from rhodecode import BACKENDS | |
|
23 | 21 | from rhodecode.apps._base import BaseAppView |
|
24 | from rhodecode.model.meta import Session | |
|
25 | from rhodecode.model.settings import SettingsModel | |
|
26 | from rhodecode.model.forms import WhitelistedVcsClientsForm | |
|
27 | 22 | from rhodecode.lib.auth import LoginRequired, HasPermissionAllDecorator |
|
28 | 23 | |
|
29 | 24 | log = logging.getLogger(__name__) |
|
30 | 25 | |
|
31 | 26 | |
|
32 | 27 | class AdminSecurityView(BaseAppView): |
|
33 | 28 | |
|
34 | 29 | def load_default_context(self): |
|
35 | 30 | c = self._get_local_tmpl_context() |
|
36 | 31 | return c |
|
37 | 32 | |
|
38 | 33 | @LoginRequired() |
|
39 | 34 | @HasPermissionAllDecorator('hg.admin') |
|
40 | 35 | def security(self): |
|
41 | 36 | c = self.load_default_context() |
|
42 | 37 | c.active = 'security' |
|
43 | 38 | return self._get_template_context(c) |
|
44 | 39 | |
|
40 | ||
|
45 | 41 | @LoginRequired() |
|
46 | 42 | @HasPermissionAllDecorator('hg.admin') |
|
47 | def vcs_whitelisted_client_versions_edit(self): | |
|
48 | _ = self.request.translate | |
|
43 | def admin_security_modify_allowed_vcs_client_versions(self): | |
|
49 | 44 | c = self.load_default_context() |
|
50 | render_ctx = {} | |
|
51 | settings = SettingsModel() | |
|
52 | form = WhitelistedVcsClientsForm(_, )() | |
|
53 | if self.request.method == 'POST': | |
|
54 | try: | |
|
55 | result = form.to_python(self.request.POST) | |
|
56 | for k, v in result.items(): | |
|
57 | if v: | |
|
58 | setting = settings.create_or_update_setting(name=f'{k}_allowed_clients', val=v) | |
|
59 | Session().add(setting) | |
|
60 | Session().commit() | |
|
61 | ||
|
62 | except formencode.Invalid as errors: | |
|
63 | render_ctx.update({ | |
|
64 | 'errors': errors.error_dict | |
|
65 | }) | |
|
66 | for key in BACKENDS.keys(): | |
|
67 | verbose_name = f"initial_{key}" | |
|
68 | if existing := settings.get_setting_by_name(name=f'{key}_allowed_clients'): | |
|
69 | render_ctx[verbose_name] = existing.app_settings_value | |
|
70 | else: | |
|
71 | render_ctx[verbose_name] = '*' | |
|
72 | return self._get_template_context(c, **render_ctx) | |
|
45 | c.active = 'security' | |
|
46 | return self._get_template_context(c) |
@@ -1,708 +1,707 b'' | |||
|
1 | 1 | # Copyright (C) 2010-2023 RhodeCode GmbH |
|
2 | 2 | # |
|
3 | 3 | # This program is free software: you can redistribute it and/or modify |
|
4 | 4 | # it under the terms of the GNU Affero General Public License, version 3 |
|
5 | 5 | # (only), as published by the Free Software Foundation. |
|
6 | 6 | # |
|
7 | 7 | # This program is distributed in the hope that it will be useful, |
|
8 | 8 | # but WITHOUT ANY WARRANTY; without even the implied warranty of |
|
9 | 9 | # MERCHANTABILITY or FITNESS FOR A PARTICULAR PURPOSE. See the |
|
10 | 10 | # GNU General Public License for more details. |
|
11 | 11 | # |
|
12 | 12 | # You should have received a copy of the GNU Affero General Public License |
|
13 | 13 | # along with this program. If not, see <http://www.gnu.org/licenses/>. |
|
14 | 14 | # |
|
15 | 15 | # This program is dual-licensed. If you wish to learn more about the |
|
16 | 16 | # RhodeCode Enterprise Edition, including its added features, Support services, |
|
17 | 17 | # and proprietary license terms, please see https://rhodecode.com/licenses/ |
|
18 | 18 | |
|
19 | 19 | |
|
20 | 20 | import logging |
|
21 | 21 | import collections |
|
22 | 22 | |
|
23 | 23 | import datetime |
|
24 | 24 | import formencode |
|
25 | 25 | import formencode.htmlfill |
|
26 | 26 | |
|
27 | 27 | import rhodecode |
|
28 | 28 | |
|
29 | 29 | from pyramid.httpexceptions import HTTPFound, HTTPNotFound |
|
30 | 30 | from pyramid.renderers import render |
|
31 | 31 | from pyramid.response import Response |
|
32 | 32 | |
|
33 | 33 | from rhodecode.apps._base import BaseAppView |
|
34 | 34 | from rhodecode.apps._base.navigation import navigation_list |
|
35 | 35 | from rhodecode.apps.svn_support import config_keys |
|
36 | 36 | from rhodecode.lib import helpers as h |
|
37 | 37 | from rhodecode.lib.auth import ( |
|
38 | 38 | LoginRequired, HasPermissionAllDecorator, CSRFRequired) |
|
39 | 39 | from rhodecode.lib.celerylib import tasks, run_task |
|
40 | 40 | from rhodecode.lib.str_utils import safe_str |
|
41 | 41 | from rhodecode.lib.utils import repo2db_mapper, get_rhodecode_repo_store_path |
|
42 | 42 | from rhodecode.lib.utils2 import str2bool, AttributeDict |
|
43 | 43 | from rhodecode.lib.index import searcher_from_config |
|
44 | 44 | |
|
45 | 45 | from rhodecode.model.db import RhodeCodeUi, Repository |
|
46 | 46 | from rhodecode.model.forms import (ApplicationSettingsForm, |
|
47 | 47 | ApplicationUiSettingsForm, ApplicationVisualisationForm, |
|
48 | 48 | LabsSettingsForm, IssueTrackerPatternsForm) |
|
49 | 49 | from rhodecode.model.permission import PermissionModel |
|
50 | 50 | from rhodecode.model.repo_group import RepoGroupModel |
|
51 | 51 | |
|
52 | 52 | from rhodecode.model.scm import ScmModel |
|
53 | 53 | from rhodecode.model.notification import EmailNotificationModel |
|
54 | 54 | from rhodecode.model.meta import Session |
|
55 | 55 | from rhodecode.model.settings import ( |
|
56 | 56 | IssueTrackerSettingsModel, VcsSettingsModel, SettingNotFound, |
|
57 | 57 | SettingsModel) |
|
58 | 58 | |
|
59 | 59 | |
|
60 | 60 | log = logging.getLogger(__name__) |
|
61 | 61 | |
|
62 | 62 | |
|
63 | 63 | class AdminSettingsView(BaseAppView): |
|
64 | 64 | |
|
65 | 65 | def load_default_context(self): |
|
66 | 66 | c = self._get_local_tmpl_context() |
|
67 | 67 | c.labs_active = str2bool( |
|
68 | 68 | rhodecode.CONFIG.get('labs_settings_active', 'true')) |
|
69 | 69 | c.navlist = navigation_list(self.request) |
|
70 | 70 | return c |
|
71 | 71 | |
|
72 | 72 | @classmethod |
|
73 | 73 | def _get_ui_settings(cls): |
|
74 | 74 | ret = RhodeCodeUi.query().all() |
|
75 | 75 | |
|
76 | 76 | if not ret: |
|
77 | 77 | raise Exception('Could not get application ui settings !') |
|
78 | 78 | settings = {} |
|
79 | 79 | for each in ret: |
|
80 | 80 | k = each.ui_key |
|
81 | 81 | v = each.ui_value |
|
82 | 82 | if k == '/': |
|
83 | 83 | k = 'root_path' |
|
84 | 84 | |
|
85 |
if k in [ |
|
|
85 | if k in ['publish', 'enabled']: | |
|
86 | 86 | v = str2bool(v) |
|
87 | 87 | |
|
88 | 88 | if k.find('.') != -1: |
|
89 | 89 | k = k.replace('.', '_') |
|
90 | 90 | |
|
91 | 91 | if each.ui_section in ['hooks', 'extensions']: |
|
92 | 92 | v = each.ui_active |
|
93 | 93 | |
|
94 | 94 | settings[each.ui_section + '_' + k] = v |
|
95 | 95 | return settings |
|
96 | 96 | |
|
97 | 97 | @classmethod |
|
98 | 98 | def _form_defaults(cls): |
|
99 | 99 | defaults = SettingsModel().get_all_settings() |
|
100 | 100 | defaults.update(cls._get_ui_settings()) |
|
101 | 101 | |
|
102 | 102 | defaults.update({ |
|
103 | 103 | 'new_svn_branch': '', |
|
104 | 104 | 'new_svn_tag': '', |
|
105 | 105 | }) |
|
106 | 106 | return defaults |
|
107 | 107 | |
|
108 | 108 | @LoginRequired() |
|
109 | 109 | @HasPermissionAllDecorator('hg.admin') |
|
110 | 110 | def settings_vcs(self): |
|
111 | 111 | c = self.load_default_context() |
|
112 | 112 | c.active = 'vcs' |
|
113 | 113 | model = VcsSettingsModel() |
|
114 | 114 | c.svn_branch_patterns = model.get_global_svn_branch_patterns() |
|
115 | 115 | c.svn_tag_patterns = model.get_global_svn_tag_patterns() |
|
116 | 116 | c.svn_generate_config = rhodecode.ConfigGet().get_bool(config_keys.generate_config) |
|
117 | 117 | c.svn_config_path = rhodecode.ConfigGet().get_str(config_keys.config_file_path) |
|
118 | 118 | defaults = self._form_defaults() |
|
119 | 119 | |
|
120 | 120 | model.create_largeobjects_dirs_if_needed(defaults['paths_root_path']) |
|
121 | 121 | |
|
122 | 122 | data = render('rhodecode:templates/admin/settings/settings.mako', |
|
123 | 123 | self._get_template_context(c), self.request) |
|
124 | 124 | html = formencode.htmlfill.render( |
|
125 | 125 | data, |
|
126 | 126 | defaults=defaults, |
|
127 | 127 | encoding="UTF-8", |
|
128 | 128 | force_defaults=False |
|
129 | 129 | ) |
|
130 | 130 | return Response(html) |
|
131 | 131 | |
|
132 | 132 | @LoginRequired() |
|
133 | 133 | @HasPermissionAllDecorator('hg.admin') |
|
134 | 134 | @CSRFRequired() |
|
135 | 135 | def settings_vcs_update(self): |
|
136 | 136 | _ = self.request.translate |
|
137 | 137 | c = self.load_default_context() |
|
138 | 138 | c.active = 'vcs' |
|
139 | 139 | |
|
140 | 140 | model = VcsSettingsModel() |
|
141 | 141 | c.svn_branch_patterns = model.get_global_svn_branch_patterns() |
|
142 | 142 | c.svn_tag_patterns = model.get_global_svn_tag_patterns() |
|
143 | 143 | |
|
144 | 144 | c.svn_generate_config = rhodecode.ConfigGet().get_bool(config_keys.generate_config) |
|
145 | 145 | c.svn_config_path = rhodecode.ConfigGet().get_str(config_keys.config_file_path) |
|
146 | 146 | application_form = ApplicationUiSettingsForm(self.request.translate)() |
|
147 | 147 | |
|
148 | 148 | try: |
|
149 | 149 | form_result = application_form.to_python(dict(self.request.POST)) |
|
150 | 150 | except formencode.Invalid as errors: |
|
151 | 151 | h.flash( |
|
152 | 152 | _("Some form inputs contain invalid data."), |
|
153 | 153 | category='error') |
|
154 | 154 | data = render('rhodecode:templates/admin/settings/settings.mako', |
|
155 | 155 | self._get_template_context(c), self.request) |
|
156 | 156 | html = formencode.htmlfill.render( |
|
157 | 157 | data, |
|
158 | 158 | defaults=errors.value, |
|
159 | 159 | errors=errors.unpack_errors() or {}, |
|
160 | 160 | prefix_error=False, |
|
161 | 161 | encoding="UTF-8", |
|
162 | 162 | force_defaults=False |
|
163 | 163 | ) |
|
164 | 164 | return Response(html) |
|
165 | 165 | |
|
166 | 166 | try: |
|
167 | model.update_global_ssl_setting(form_result['web_push_ssl']) | |
|
168 | 167 | model.update_global_hook_settings(form_result) |
|
169 | 168 | |
|
170 | 169 | model.create_or_update_global_svn_settings(form_result) |
|
171 | 170 | model.create_or_update_global_hg_settings(form_result) |
|
172 | 171 | model.create_or_update_global_git_settings(form_result) |
|
173 | 172 | model.create_or_update_global_pr_settings(form_result) |
|
174 | 173 | except Exception: |
|
175 | 174 | log.exception("Exception while updating settings") |
|
176 | 175 | h.flash(_('Error occurred during updating ' |
|
177 | 176 | 'application settings'), category='error') |
|
178 | 177 | else: |
|
179 | 178 | Session().commit() |
|
180 | 179 | h.flash(_('Updated VCS settings'), category='success') |
|
181 | 180 | raise HTTPFound(h.route_path('admin_settings_vcs')) |
|
182 | 181 | |
|
183 | 182 | data = render('rhodecode:templates/admin/settings/settings.mako', |
|
184 | 183 | self._get_template_context(c), self.request) |
|
185 | 184 | html = formencode.htmlfill.render( |
|
186 | 185 | data, |
|
187 | 186 | defaults=self._form_defaults(), |
|
188 | 187 | encoding="UTF-8", |
|
189 | 188 | force_defaults=False |
|
190 | 189 | ) |
|
191 | 190 | return Response(html) |
|
192 | 191 | |
|
193 | 192 | @LoginRequired() |
|
194 | 193 | @HasPermissionAllDecorator('hg.admin') |
|
195 | 194 | @CSRFRequired() |
|
196 | 195 | def settings_vcs_delete_svn_pattern(self): |
|
197 | 196 | delete_pattern_id = self.request.POST.get('delete_svn_pattern') |
|
198 | 197 | model = VcsSettingsModel() |
|
199 | 198 | try: |
|
200 | 199 | model.delete_global_svn_pattern(delete_pattern_id) |
|
201 | 200 | except SettingNotFound: |
|
202 | 201 | log.exception( |
|
203 | 202 | 'Failed to delete svn_pattern with id %s', delete_pattern_id) |
|
204 | 203 | raise HTTPNotFound() |
|
205 | 204 | |
|
206 | 205 | Session().commit() |
|
207 | 206 | return True |
|
208 | 207 | |
|
209 | 208 | @LoginRequired() |
|
210 | 209 | @HasPermissionAllDecorator('hg.admin') |
|
211 | 210 | def settings_mapping(self): |
|
212 | 211 | c = self.load_default_context() |
|
213 | 212 | c.active = 'mapping' |
|
214 | 213 | c.storage_path = get_rhodecode_repo_store_path() |
|
215 | 214 | data = render('rhodecode:templates/admin/settings/settings.mako', |
|
216 | 215 | self._get_template_context(c), self.request) |
|
217 | 216 | html = formencode.htmlfill.render( |
|
218 | 217 | data, |
|
219 | 218 | defaults=self._form_defaults(), |
|
220 | 219 | encoding="UTF-8", |
|
221 | 220 | force_defaults=False |
|
222 | 221 | ) |
|
223 | 222 | return Response(html) |
|
224 | 223 | |
|
225 | 224 | @LoginRequired() |
|
226 | 225 | @HasPermissionAllDecorator('hg.admin') |
|
227 | 226 | @CSRFRequired() |
|
228 | 227 | def settings_mapping_update(self): |
|
229 | 228 | _ = self.request.translate |
|
230 | 229 | c = self.load_default_context() |
|
231 | 230 | c.active = 'mapping' |
|
232 | 231 | rm_obsolete = self.request.POST.get('destroy', False) |
|
233 | 232 | invalidate_cache = self.request.POST.get('invalidate', False) |
|
234 | 233 | log.debug('rescanning repo location with destroy obsolete=%s', rm_obsolete) |
|
235 | 234 | |
|
236 | 235 | if invalidate_cache: |
|
237 | 236 | log.debug('invalidating all repositories cache') |
|
238 | 237 | for repo in Repository.get_all(): |
|
239 | 238 | ScmModel().mark_for_invalidation(repo.repo_name, delete=True) |
|
240 | 239 | |
|
241 | 240 | filesystem_repos = ScmModel().repo_scan() |
|
242 | 241 | added, removed = repo2db_mapper(filesystem_repos, rm_obsolete, force_hooks_rebuild=True) |
|
243 | 242 | PermissionModel().trigger_permission_flush() |
|
244 | 243 | |
|
245 | 244 | def _repr(rm_repo): |
|
246 | 245 | return ', '.join(map(safe_str, rm_repo)) or '-' |
|
247 | 246 | |
|
248 | 247 | h.flash(_('Repositories successfully ' |
|
249 | 248 | 'rescanned added: %s ; removed: %s') % |
|
250 | 249 | (_repr(added), _repr(removed)), |
|
251 | 250 | category='success') |
|
252 | 251 | raise HTTPFound(h.route_path('admin_settings_mapping')) |
|
253 | 252 | |
|
254 | 253 | @LoginRequired() |
|
255 | 254 | @HasPermissionAllDecorator('hg.admin') |
|
256 | 255 | def settings_global(self): |
|
257 | 256 | c = self.load_default_context() |
|
258 | 257 | c.active = 'global' |
|
259 | 258 | c.personal_repo_group_default_pattern = RepoGroupModel()\ |
|
260 | 259 | .get_personal_group_name_pattern() |
|
261 | 260 | |
|
262 | 261 | data = render('rhodecode:templates/admin/settings/settings.mako', |
|
263 | 262 | self._get_template_context(c), self.request) |
|
264 | 263 | html = formencode.htmlfill.render( |
|
265 | 264 | data, |
|
266 | 265 | defaults=self._form_defaults(), |
|
267 | 266 | encoding="UTF-8", |
|
268 | 267 | force_defaults=False |
|
269 | 268 | ) |
|
270 | 269 | return Response(html) |
|
271 | 270 | |
|
272 | 271 | @LoginRequired() |
|
273 | 272 | @HasPermissionAllDecorator('hg.admin') |
|
274 | 273 | @CSRFRequired() |
|
275 | 274 | def settings_global_update(self): |
|
276 | 275 | _ = self.request.translate |
|
277 | 276 | c = self.load_default_context() |
|
278 | 277 | c.active = 'global' |
|
279 | 278 | c.personal_repo_group_default_pattern = RepoGroupModel()\ |
|
280 | 279 | .get_personal_group_name_pattern() |
|
281 | 280 | application_form = ApplicationSettingsForm(self.request.translate)() |
|
282 | 281 | try: |
|
283 | 282 | form_result = application_form.to_python(dict(self.request.POST)) |
|
284 | 283 | except formencode.Invalid as errors: |
|
285 | 284 | h.flash( |
|
286 | 285 | _("Some form inputs contain invalid data."), |
|
287 | 286 | category='error') |
|
288 | 287 | data = render('rhodecode:templates/admin/settings/settings.mako', |
|
289 | 288 | self._get_template_context(c), self.request) |
|
290 | 289 | html = formencode.htmlfill.render( |
|
291 | 290 | data, |
|
292 | 291 | defaults=errors.value, |
|
293 | 292 | errors=errors.unpack_errors() or {}, |
|
294 | 293 | prefix_error=False, |
|
295 | 294 | encoding="UTF-8", |
|
296 | 295 | force_defaults=False |
|
297 | 296 | ) |
|
298 | 297 | return Response(html) |
|
299 | 298 | |
|
300 | 299 | settings = [ |
|
301 | 300 | ('title', 'rhodecode_title', 'unicode'), |
|
302 | 301 | ('realm', 'rhodecode_realm', 'unicode'), |
|
303 | 302 | ('pre_code', 'rhodecode_pre_code', 'unicode'), |
|
304 | 303 | ('post_code', 'rhodecode_post_code', 'unicode'), |
|
305 | 304 | ('captcha_public_key', 'rhodecode_captcha_public_key', 'unicode'), |
|
306 | 305 | ('captcha_private_key', 'rhodecode_captcha_private_key', 'unicode'), |
|
307 | 306 | ('create_personal_repo_group', 'rhodecode_create_personal_repo_group', 'bool'), |
|
308 | 307 | ('personal_repo_group_pattern', 'rhodecode_personal_repo_group_pattern', 'unicode'), |
|
309 | 308 | ] |
|
310 | 309 | |
|
311 | 310 | try: |
|
312 | 311 | for setting, form_key, type_ in settings: |
|
313 | 312 | sett = SettingsModel().create_or_update_setting( |
|
314 | 313 | setting, form_result[form_key], type_) |
|
315 | 314 | Session().add(sett) |
|
316 | 315 | |
|
317 | 316 | Session().commit() |
|
318 | 317 | SettingsModel().invalidate_settings_cache() |
|
319 | 318 | h.flash(_('Updated application settings'), category='success') |
|
320 | 319 | except Exception: |
|
321 | 320 | log.exception("Exception while updating application settings") |
|
322 | 321 | h.flash( |
|
323 | 322 | _('Error occurred during updating application settings'), |
|
324 | 323 | category='error') |
|
325 | 324 | |
|
326 | 325 | raise HTTPFound(h.route_path('admin_settings_global')) |
|
327 | 326 | |
|
328 | 327 | @LoginRequired() |
|
329 | 328 | @HasPermissionAllDecorator('hg.admin') |
|
330 | 329 | def settings_visual(self): |
|
331 | 330 | c = self.load_default_context() |
|
332 | 331 | c.active = 'visual' |
|
333 | 332 | |
|
334 | 333 | data = render('rhodecode:templates/admin/settings/settings.mako', |
|
335 | 334 | self._get_template_context(c), self.request) |
|
336 | 335 | html = formencode.htmlfill.render( |
|
337 | 336 | data, |
|
338 | 337 | defaults=self._form_defaults(), |
|
339 | 338 | encoding="UTF-8", |
|
340 | 339 | force_defaults=False |
|
341 | 340 | ) |
|
342 | 341 | return Response(html) |
|
343 | 342 | |
|
344 | 343 | @LoginRequired() |
|
345 | 344 | @HasPermissionAllDecorator('hg.admin') |
|
346 | 345 | @CSRFRequired() |
|
347 | 346 | def settings_visual_update(self): |
|
348 | 347 | _ = self.request.translate |
|
349 | 348 | c = self.load_default_context() |
|
350 | 349 | c.active = 'visual' |
|
351 | 350 | application_form = ApplicationVisualisationForm(self.request.translate)() |
|
352 | 351 | try: |
|
353 | 352 | form_result = application_form.to_python(dict(self.request.POST)) |
|
354 | 353 | except formencode.Invalid as errors: |
|
355 | 354 | h.flash( |
|
356 | 355 | _("Some form inputs contain invalid data."), |
|
357 | 356 | category='error') |
|
358 | 357 | data = render('rhodecode:templates/admin/settings/settings.mako', |
|
359 | 358 | self._get_template_context(c), self.request) |
|
360 | 359 | html = formencode.htmlfill.render( |
|
361 | 360 | data, |
|
362 | 361 | defaults=errors.value, |
|
363 | 362 | errors=errors.unpack_errors() or {}, |
|
364 | 363 | prefix_error=False, |
|
365 | 364 | encoding="UTF-8", |
|
366 | 365 | force_defaults=False |
|
367 | 366 | ) |
|
368 | 367 | return Response(html) |
|
369 | 368 | |
|
370 | 369 | try: |
|
371 | 370 | settings = [ |
|
372 | 371 | ('show_public_icon', 'rhodecode_show_public_icon', 'bool'), |
|
373 | 372 | ('show_private_icon', 'rhodecode_show_private_icon', 'bool'), |
|
374 | 373 | ('stylify_metatags', 'rhodecode_stylify_metatags', 'bool'), |
|
375 | 374 | ('repository_fields', 'rhodecode_repository_fields', 'bool'), |
|
376 | 375 | ('dashboard_items', 'rhodecode_dashboard_items', 'int'), |
|
377 | 376 | ('admin_grid_items', 'rhodecode_admin_grid_items', 'int'), |
|
378 | 377 | ('show_version', 'rhodecode_show_version', 'bool'), |
|
379 | 378 | ('use_gravatar', 'rhodecode_use_gravatar', 'bool'), |
|
380 | 379 | ('markup_renderer', 'rhodecode_markup_renderer', 'unicode'), |
|
381 | 380 | ('gravatar_url', 'rhodecode_gravatar_url', 'unicode'), |
|
382 | 381 | ('clone_uri_tmpl', 'rhodecode_clone_uri_tmpl', 'unicode'), |
|
383 | 382 | ('clone_uri_id_tmpl', 'rhodecode_clone_uri_id_tmpl', 'unicode'), |
|
384 | 383 | ('clone_uri_ssh_tmpl', 'rhodecode_clone_uri_ssh_tmpl', 'unicode'), |
|
385 | 384 | ('support_url', 'rhodecode_support_url', 'unicode'), |
|
386 | 385 | ('show_revision_number', 'rhodecode_show_revision_number', 'bool'), |
|
387 | 386 | ('show_sha_length', 'rhodecode_show_sha_length', 'int'), |
|
388 | 387 | ] |
|
389 | 388 | for setting, form_key, type_ in settings: |
|
390 | 389 | sett = SettingsModel().create_or_update_setting( |
|
391 | 390 | setting, form_result[form_key], type_) |
|
392 | 391 | Session().add(sett) |
|
393 | 392 | |
|
394 | 393 | Session().commit() |
|
395 | 394 | SettingsModel().invalidate_settings_cache() |
|
396 | 395 | h.flash(_('Updated visualisation settings'), category='success') |
|
397 | 396 | except Exception: |
|
398 | 397 | log.exception("Exception updating visualization settings") |
|
399 | 398 | h.flash(_('Error occurred during updating ' |
|
400 | 399 | 'visualisation settings'), |
|
401 | 400 | category='error') |
|
402 | 401 | |
|
403 | 402 | raise HTTPFound(h.route_path('admin_settings_visual')) |
|
404 | 403 | |
|
405 | 404 | @LoginRequired() |
|
406 | 405 | @HasPermissionAllDecorator('hg.admin') |
|
407 | 406 | def settings_issuetracker(self): |
|
408 | 407 | c = self.load_default_context() |
|
409 | 408 | c.active = 'issuetracker' |
|
410 | 409 | defaults = c.rc_config |
|
411 | 410 | |
|
412 | 411 | entry_key = 'rhodecode_issuetracker_pat_' |
|
413 | 412 | |
|
414 | 413 | c.issuetracker_entries = {} |
|
415 | 414 | for k, v in defaults.items(): |
|
416 | 415 | if k.startswith(entry_key): |
|
417 | 416 | uid = k[len(entry_key):] |
|
418 | 417 | c.issuetracker_entries[uid] = None |
|
419 | 418 | |
|
420 | 419 | for uid in c.issuetracker_entries: |
|
421 | 420 | c.issuetracker_entries[uid] = AttributeDict({ |
|
422 | 421 | 'pat': defaults.get('rhodecode_issuetracker_pat_' + uid), |
|
423 | 422 | 'url': defaults.get('rhodecode_issuetracker_url_' + uid), |
|
424 | 423 | 'pref': defaults.get('rhodecode_issuetracker_pref_' + uid), |
|
425 | 424 | 'desc': defaults.get('rhodecode_issuetracker_desc_' + uid), |
|
426 | 425 | }) |
|
427 | 426 | |
|
428 | 427 | return self._get_template_context(c) |
|
429 | 428 | |
|
430 | 429 | @LoginRequired() |
|
431 | 430 | @HasPermissionAllDecorator('hg.admin') |
|
432 | 431 | @CSRFRequired() |
|
433 | 432 | def settings_issuetracker_test(self): |
|
434 | 433 | error_container = [] |
|
435 | 434 | |
|
436 | 435 | urlified_commit = h.urlify_commit_message( |
|
437 | 436 | self.request.POST.get('test_text', ''), |
|
438 | 437 | 'repo_group/test_repo1', error_container=error_container) |
|
439 | 438 | if error_container: |
|
440 | 439 | def converter(inp): |
|
441 | 440 | return h.html_escape(inp) |
|
442 | 441 | |
|
443 | 442 | return 'ERRORS: ' + '\n'.join(map(converter, error_container)) |
|
444 | 443 | |
|
445 | 444 | return urlified_commit |
|
446 | 445 | |
|
447 | 446 | @LoginRequired() |
|
448 | 447 | @HasPermissionAllDecorator('hg.admin') |
|
449 | 448 | @CSRFRequired() |
|
450 | 449 | def settings_issuetracker_update(self): |
|
451 | 450 | _ = self.request.translate |
|
452 | 451 | self.load_default_context() |
|
453 | 452 | settings_model = IssueTrackerSettingsModel() |
|
454 | 453 | |
|
455 | 454 | try: |
|
456 | 455 | form = IssueTrackerPatternsForm(self.request.translate)() |
|
457 | 456 | data = form.to_python(self.request.POST) |
|
458 | 457 | except formencode.Invalid as errors: |
|
459 | 458 | log.exception('Failed to add new pattern') |
|
460 | 459 | error = errors |
|
461 | 460 | h.flash(_(f'Invalid issue tracker pattern: {error}'), |
|
462 | 461 | category='error') |
|
463 | 462 | raise HTTPFound(h.route_path('admin_settings_issuetracker')) |
|
464 | 463 | |
|
465 | 464 | if data: |
|
466 | 465 | for uid in data.get('delete_patterns', []): |
|
467 | 466 | settings_model.delete_entries(uid) |
|
468 | 467 | |
|
469 | 468 | for pattern in data.get('patterns', []): |
|
470 | 469 | for setting, value, type_ in pattern: |
|
471 | 470 | sett = settings_model.create_or_update_setting( |
|
472 | 471 | setting, value, type_) |
|
473 | 472 | Session().add(sett) |
|
474 | 473 | |
|
475 | 474 | Session().commit() |
|
476 | 475 | |
|
477 | 476 | SettingsModel().invalidate_settings_cache() |
|
478 | 477 | h.flash(_('Updated issue tracker entries'), category='success') |
|
479 | 478 | raise HTTPFound(h.route_path('admin_settings_issuetracker')) |
|
480 | 479 | |
|
481 | 480 | @LoginRequired() |
|
482 | 481 | @HasPermissionAllDecorator('hg.admin') |
|
483 | 482 | @CSRFRequired() |
|
484 | 483 | def settings_issuetracker_delete(self): |
|
485 | 484 | _ = self.request.translate |
|
486 | 485 | self.load_default_context() |
|
487 | 486 | uid = self.request.POST.get('uid') |
|
488 | 487 | try: |
|
489 | 488 | IssueTrackerSettingsModel().delete_entries(uid) |
|
490 | 489 | except Exception: |
|
491 | 490 | log.exception('Failed to delete issue tracker setting %s', uid) |
|
492 | 491 | raise HTTPNotFound() |
|
493 | 492 | |
|
494 | 493 | SettingsModel().invalidate_settings_cache() |
|
495 | 494 | h.flash(_('Removed issue tracker entry.'), category='success') |
|
496 | 495 | |
|
497 | 496 | return {'deleted': uid} |
|
498 | 497 | |
|
499 | 498 | @LoginRequired() |
|
500 | 499 | @HasPermissionAllDecorator('hg.admin') |
|
501 | 500 | def settings_email(self): |
|
502 | 501 | c = self.load_default_context() |
|
503 | 502 | c.active = 'email' |
|
504 | 503 | c.rhodecode_ini = rhodecode.CONFIG |
|
505 | 504 | |
|
506 | 505 | data = render('rhodecode:templates/admin/settings/settings.mako', |
|
507 | 506 | self._get_template_context(c), self.request) |
|
508 | 507 | html = formencode.htmlfill.render( |
|
509 | 508 | data, |
|
510 | 509 | defaults=self._form_defaults(), |
|
511 | 510 | encoding="UTF-8", |
|
512 | 511 | force_defaults=False |
|
513 | 512 | ) |
|
514 | 513 | return Response(html) |
|
515 | 514 | |
|
516 | 515 | @LoginRequired() |
|
517 | 516 | @HasPermissionAllDecorator('hg.admin') |
|
518 | 517 | @CSRFRequired() |
|
519 | 518 | def settings_email_update(self): |
|
520 | 519 | _ = self.request.translate |
|
521 | 520 | c = self.load_default_context() |
|
522 | 521 | c.active = 'email' |
|
523 | 522 | |
|
524 | 523 | test_email = self.request.POST.get('test_email') |
|
525 | 524 | |
|
526 | 525 | if not test_email: |
|
527 | 526 | h.flash(_('Please enter email address'), category='error') |
|
528 | 527 | raise HTTPFound(h.route_path('admin_settings_email')) |
|
529 | 528 | |
|
530 | 529 | email_kwargs = { |
|
531 | 530 | 'date': datetime.datetime.now(), |
|
532 | 531 | 'user': self._rhodecode_db_user |
|
533 | 532 | } |
|
534 | 533 | |
|
535 | 534 | (subject, email_body, email_body_plaintext) = EmailNotificationModel().render_email( |
|
536 | 535 | EmailNotificationModel.TYPE_EMAIL_TEST, **email_kwargs) |
|
537 | 536 | |
|
538 | 537 | recipients = [test_email] if test_email else None |
|
539 | 538 | |
|
540 | 539 | run_task(tasks.send_email, recipients, subject, |
|
541 | 540 | email_body_plaintext, email_body) |
|
542 | 541 | |
|
543 | 542 | h.flash(_('Send email task created'), category='success') |
|
544 | 543 | raise HTTPFound(h.route_path('admin_settings_email')) |
|
545 | 544 | |
|
546 | 545 | @LoginRequired() |
|
547 | 546 | @HasPermissionAllDecorator('hg.admin') |
|
548 | 547 | def settings_hooks(self): |
|
549 | 548 | c = self.load_default_context() |
|
550 | 549 | c.active = 'hooks' |
|
551 | 550 | |
|
552 | 551 | model = SettingsModel() |
|
553 | 552 | c.hooks = model.get_builtin_hooks() |
|
554 | 553 | c.custom_hooks = model.get_custom_hooks() |
|
555 | 554 | |
|
556 | 555 | data = render('rhodecode:templates/admin/settings/settings.mako', |
|
557 | 556 | self._get_template_context(c), self.request) |
|
558 | 557 | html = formencode.htmlfill.render( |
|
559 | 558 | data, |
|
560 | 559 | defaults=self._form_defaults(), |
|
561 | 560 | encoding="UTF-8", |
|
562 | 561 | force_defaults=False |
|
563 | 562 | ) |
|
564 | 563 | return Response(html) |
|
565 | 564 | |
|
566 | 565 | @LoginRequired() |
|
567 | 566 | @HasPermissionAllDecorator('hg.admin') |
|
568 | 567 | @CSRFRequired() |
|
569 | 568 | def settings_hooks_update(self): |
|
570 | 569 | _ = self.request.translate |
|
571 | 570 | c = self.load_default_context() |
|
572 | 571 | c.active = 'hooks' |
|
573 | 572 | if c.visual.allow_custom_hooks_settings: |
|
574 | 573 | ui_key = self.request.POST.get('new_hook_ui_key') |
|
575 | 574 | ui_value = self.request.POST.get('new_hook_ui_value') |
|
576 | 575 | |
|
577 | 576 | hook_id = self.request.POST.get('hook_id') |
|
578 | 577 | new_hook = False |
|
579 | 578 | |
|
580 | 579 | model = SettingsModel() |
|
581 | 580 | try: |
|
582 | 581 | if ui_value and ui_key: |
|
583 | 582 | model.create_or_update_hook(ui_key, ui_value) |
|
584 | 583 | h.flash(_('Added new hook'), category='success') |
|
585 | 584 | new_hook = True |
|
586 | 585 | elif hook_id: |
|
587 | 586 | RhodeCodeUi.delete(hook_id) |
|
588 | 587 | Session().commit() |
|
589 | 588 | |
|
590 | 589 | # check for edits |
|
591 | 590 | update = False |
|
592 | 591 | _d = self.request.POST.dict_of_lists() |
|
593 | 592 | for k, v in zip(_d.get('hook_ui_key', []), |
|
594 | 593 | _d.get('hook_ui_value_new', [])): |
|
595 | 594 | model.create_or_update_hook(k, v) |
|
596 | 595 | update = True |
|
597 | 596 | |
|
598 | 597 | if update and not new_hook: |
|
599 | 598 | h.flash(_('Updated hooks'), category='success') |
|
600 | 599 | Session().commit() |
|
601 | 600 | except Exception: |
|
602 | 601 | log.exception("Exception during hook creation") |
|
603 | 602 | h.flash(_('Error occurred during hook creation'), |
|
604 | 603 | category='error') |
|
605 | 604 | |
|
606 | 605 | raise HTTPFound(h.route_path('admin_settings_hooks')) |
|
607 | 606 | |
|
608 | 607 | @LoginRequired() |
|
609 | 608 | @HasPermissionAllDecorator('hg.admin') |
|
610 | 609 | def settings_search(self): |
|
611 | 610 | c = self.load_default_context() |
|
612 | 611 | c.active = 'search' |
|
613 | 612 | |
|
614 | 613 | c.searcher = searcher_from_config(self.request.registry.settings) |
|
615 | 614 | c.statistics = c.searcher.statistics(self.request.translate) |
|
616 | 615 | |
|
617 | 616 | return self._get_template_context(c) |
|
618 | 617 | |
|
619 | 618 | @LoginRequired() |
|
620 | 619 | @HasPermissionAllDecorator('hg.admin') |
|
621 | 620 | def settings_labs(self): |
|
622 | 621 | c = self.load_default_context() |
|
623 | 622 | if not c.labs_active: |
|
624 | 623 | raise HTTPFound(h.route_path('admin_settings')) |
|
625 | 624 | |
|
626 | 625 | c.active = 'labs' |
|
627 | 626 | c.lab_settings = _LAB_SETTINGS |
|
628 | 627 | |
|
629 | 628 | data = render('rhodecode:templates/admin/settings/settings.mako', |
|
630 | 629 | self._get_template_context(c), self.request) |
|
631 | 630 | html = formencode.htmlfill.render( |
|
632 | 631 | data, |
|
633 | 632 | defaults=self._form_defaults(), |
|
634 | 633 | encoding="UTF-8", |
|
635 | 634 | force_defaults=False |
|
636 | 635 | ) |
|
637 | 636 | return Response(html) |
|
638 | 637 | |
|
639 | 638 | @LoginRequired() |
|
640 | 639 | @HasPermissionAllDecorator('hg.admin') |
|
641 | 640 | @CSRFRequired() |
|
642 | 641 | def settings_labs_update(self): |
|
643 | 642 | _ = self.request.translate |
|
644 | 643 | c = self.load_default_context() |
|
645 | 644 | c.active = 'labs' |
|
646 | 645 | |
|
647 | 646 | application_form = LabsSettingsForm(self.request.translate)() |
|
648 | 647 | try: |
|
649 | 648 | form_result = application_form.to_python(dict(self.request.POST)) |
|
650 | 649 | except formencode.Invalid as errors: |
|
651 | 650 | h.flash( |
|
652 | 651 | _("Some form inputs contain invalid data."), |
|
653 | 652 | category='error') |
|
654 | 653 | data = render('rhodecode:templates/admin/settings/settings.mako', |
|
655 | 654 | self._get_template_context(c), self.request) |
|
656 | 655 | html = formencode.htmlfill.render( |
|
657 | 656 | data, |
|
658 | 657 | defaults=errors.value, |
|
659 | 658 | errors=errors.unpack_errors() or {}, |
|
660 | 659 | prefix_error=False, |
|
661 | 660 | encoding="UTF-8", |
|
662 | 661 | force_defaults=False |
|
663 | 662 | ) |
|
664 | 663 | return Response(html) |
|
665 | 664 | |
|
666 | 665 | try: |
|
667 | 666 | session = Session() |
|
668 | 667 | for setting in _LAB_SETTINGS: |
|
669 | 668 | setting_name = setting.key[len('rhodecode_'):] |
|
670 | 669 | sett = SettingsModel().create_or_update_setting( |
|
671 | 670 | setting_name, form_result[setting.key], setting.type) |
|
672 | 671 | session.add(sett) |
|
673 | 672 | |
|
674 | 673 | except Exception: |
|
675 | 674 | log.exception('Exception while updating lab settings') |
|
676 | 675 | h.flash(_('Error occurred during updating labs settings'), |
|
677 | 676 | category='error') |
|
678 | 677 | else: |
|
679 | 678 | Session().commit() |
|
680 | 679 | SettingsModel().invalidate_settings_cache() |
|
681 | 680 | h.flash(_('Updated Labs settings'), category='success') |
|
682 | 681 | raise HTTPFound(h.route_path('admin_settings_labs')) |
|
683 | 682 | |
|
684 | 683 | data = render('rhodecode:templates/admin/settings/settings.mako', |
|
685 | 684 | self._get_template_context(c), self.request) |
|
686 | 685 | html = formencode.htmlfill.render( |
|
687 | 686 | data, |
|
688 | 687 | defaults=self._form_defaults(), |
|
689 | 688 | encoding="UTF-8", |
|
690 | 689 | force_defaults=False |
|
691 | 690 | ) |
|
692 | 691 | return Response(html) |
|
693 | 692 | |
|
694 | 693 | |
|
695 | 694 | # :param key: name of the setting including the 'rhodecode_' prefix |
|
696 | 695 | # :param type: the RhodeCodeSetting type to use. |
|
697 | 696 | # :param group: the i18ned group in which we should dispaly this setting |
|
698 | 697 | # :param label: the i18ned label we should display for this setting |
|
699 | 698 | # :param help: the i18ned help we should dispaly for this setting |
|
700 | 699 | LabSetting = collections.namedtuple( |
|
701 | 700 | 'LabSetting', ('key', 'type', 'group', 'label', 'help')) |
|
702 | 701 | |
|
703 | 702 | |
|
704 | 703 | # This list has to be kept in sync with the form |
|
705 | 704 | # rhodecode.model.forms.LabsSettingsForm. |
|
706 | 705 | _LAB_SETTINGS = [ |
|
707 | 706 | |
|
708 | 707 | ] |
@@ -1,231 +1,237 b'' | |||
|
1 | 1 | # Copyright (C) 2010-2023 RhodeCode GmbH |
|
2 | 2 | # |
|
3 | 3 | # This program is free software: you can redistribute it and/or modify |
|
4 | 4 | # it under the terms of the GNU Affero General Public License, version 3 |
|
5 | 5 | # (only), as published by the Free Software Foundation. |
|
6 | 6 | # |
|
7 | 7 | # This program is distributed in the hope that it will be useful, |
|
8 | 8 | # but WITHOUT ANY WARRANTY; without even the implied warranty of |
|
9 | 9 | # MERCHANTABILITY or FITNESS FOR A PARTICULAR PURPOSE. See the |
|
10 | 10 | # GNU General Public License for more details. |
|
11 | 11 | # |
|
12 | 12 | # You should have received a copy of the GNU Affero General Public License |
|
13 | 13 | # along with this program. If not, see <http://www.gnu.org/licenses/>. |
|
14 | 14 | # |
|
15 | 15 | # This program is dual-licensed. If you wish to learn more about the |
|
16 | 16 | # RhodeCode Enterprise Edition, including its added features, Support services, |
|
17 | 17 | # and proprietary license terms, please see https://rhodecode.com/licenses/ |
|
18 | 18 | |
|
19 | 19 | import os |
|
20 | 20 | import tempfile |
|
21 | 21 | import logging |
|
22 | 22 | |
|
23 | 23 | from pyramid.settings import asbool |
|
24 | 24 | |
|
25 | 25 | from rhodecode.config.settings_maker import SettingsMaker |
|
26 | 26 | from rhodecode.config import utils as config_utils |
|
27 | 27 | |
|
28 | 28 | log = logging.getLogger(__name__) |
|
29 | 29 | |
|
30 | 30 | |
|
31 | 31 | def sanitize_settings_and_apply_defaults(global_config, settings): |
|
32 | 32 | """ |
|
33 | 33 | Applies settings defaults and does all type conversion. |
|
34 | 34 | |
|
35 | 35 | We would move all settings parsing and preparation into this place, so that |
|
36 | 36 | we have only one place left which deals with this part. The remaining parts |
|
37 | 37 | of the application would start to rely fully on well-prepared settings. |
|
38 | 38 | |
|
39 | 39 | This piece would later be split up per topic to avoid a big fat monster |
|
40 | 40 | function. |
|
41 | 41 | """ |
|
42 | 42 | jn = os.path.join |
|
43 | 43 | |
|
44 | 44 | global_settings_maker = SettingsMaker(global_config) |
|
45 | 45 | global_settings_maker.make_setting('debug', default=False, parser='bool') |
|
46 | 46 | debug_enabled = asbool(global_config.get('debug')) |
|
47 | 47 | |
|
48 | 48 | settings_maker = SettingsMaker(settings) |
|
49 | 49 | |
|
50 | 50 | settings_maker.make_setting( |
|
51 | 51 | 'logging.autoconfigure', |
|
52 | 52 | default=False, |
|
53 | 53 | parser='bool') |
|
54 | 54 | |
|
55 |
|
|
|
55 | ini_loc = os.path.dirname(global_config.get('__file__')) | |
|
56 | logging_conf = jn(ini_loc, 'logging.ini') | |
|
56 | 57 | settings_maker.enable_logging(logging_conf, level='INFO' if debug_enabled else 'DEBUG') |
|
57 | 58 | |
|
58 | 59 | # Default includes, possible to change as a user |
|
59 | 60 | pyramid_includes = settings_maker.make_setting('pyramid.includes', [], parser='list:newline') |
|
60 | 61 | log.debug( |
|
61 | 62 | "Using the following pyramid.includes: %s", |
|
62 | 63 | pyramid_includes) |
|
63 | 64 | |
|
64 | 65 | settings_maker.make_setting('rhodecode.edition', 'Community Edition') |
|
65 | 66 | settings_maker.make_setting('rhodecode.edition_id', 'CE') |
|
66 | 67 | |
|
67 | 68 | if 'mako.default_filters' not in settings: |
|
68 | 69 | # set custom default filters if we don't have it defined |
|
69 | 70 | settings['mako.imports'] = 'from rhodecode.lib.base import h_filter' |
|
70 | 71 | settings['mako.default_filters'] = 'h_filter' |
|
71 | 72 | |
|
72 | 73 | if 'mako.directories' not in settings: |
|
73 | 74 | mako_directories = settings.setdefault('mako.directories', [ |
|
74 | 75 | # Base templates of the original application |
|
75 | 76 | 'rhodecode:templates', |
|
76 | 77 | ]) |
|
77 | 78 | log.debug( |
|
78 | 79 | "Using the following Mako template directories: %s", |
|
79 | 80 | mako_directories) |
|
80 | 81 | |
|
81 | 82 | # NOTE(marcink): fix redis requirement for schema of connection since 3.X |
|
82 | 83 | if 'beaker.session.type' in settings and settings['beaker.session.type'] == 'ext:redis': |
|
83 | 84 | raw_url = settings['beaker.session.url'] |
|
84 | 85 | if not raw_url.startswith(('redis://', 'rediss://', 'unix://')): |
|
85 | 86 | settings['beaker.session.url'] = 'redis://' + raw_url |
|
86 | 87 | |
|
87 | 88 | settings_maker.make_setting('__file__', global_config.get('__file__')) |
|
88 | 89 | |
|
89 | 90 | # TODO: johbo: Re-think this, usually the call to config.include |
|
90 | 91 | # should allow to pass in a prefix. |
|
91 | 92 | settings_maker.make_setting('rhodecode.api.url', '/_admin/api') |
|
92 | 93 | |
|
93 | 94 | # Sanitize generic settings. |
|
94 | 95 | settings_maker.make_setting('default_encoding', 'UTF-8', parser='list') |
|
95 | 96 | settings_maker.make_setting('gzip_responses', False, parser='bool') |
|
96 | 97 | settings_maker.make_setting('startup.import_repos', 'false', parser='bool') |
|
97 | 98 | |
|
99 | # License settings. | |
|
100 | settings_maker.make_setting('license.hide_license_info', False, parser='bool') | |
|
101 | settings_maker.make_setting('license.import_path', jn(ini_loc, 'rhodecode_enterprise.license')) | |
|
102 | settings_maker.make_setting('license.import_path_mode', 'if-missing') | |
|
103 | ||
|
98 | 104 | # statsd |
|
99 | 105 | settings_maker.make_setting('statsd.enabled', False, parser='bool') |
|
100 | 106 | settings_maker.make_setting('statsd.statsd_host', 'statsd-exporter', parser='string') |
|
101 | 107 | settings_maker.make_setting('statsd.statsd_port', 9125, parser='int') |
|
102 | 108 | settings_maker.make_setting('statsd.statsd_prefix', '') |
|
103 | 109 | settings_maker.make_setting('statsd.statsd_ipv6', False, parser='bool') |
|
104 | 110 | |
|
105 | 111 | settings_maker.make_setting('vcs.svn.compatible_version', '') |
|
106 | 112 | settings_maker.make_setting('vcs.svn.redis_conn', 'redis://redis:6379/0') |
|
107 | 113 | settings_maker.make_setting('vcs.svn.proxy.enabled', True, parser='bool') |
|
108 | 114 | settings_maker.make_setting('vcs.svn.proxy.host', 'http://svn:8090', parser='string') |
|
109 | 115 | settings_maker.make_setting('vcs.hooks.protocol.v2', 'celery') |
|
110 | 116 | settings_maker.make_setting('vcs.hooks.host', '*') |
|
111 | 117 | settings_maker.make_setting('vcs.scm_app_implementation', 'http') |
|
112 | 118 | settings_maker.make_setting('vcs.server', '') |
|
113 | 119 | settings_maker.make_setting('vcs.server.protocol', 'http') |
|
114 | 120 | settings_maker.make_setting('vcs.server.enable', 'true', parser='bool') |
|
115 | 121 | settings_maker.make_setting('vcs.hooks.direct_calls', 'false', parser='bool') |
|
116 | 122 | settings_maker.make_setting('vcs.start_server', 'false', parser='bool') |
|
117 | 123 | settings_maker.make_setting('vcs.backends', 'hg, git, svn', parser='list') |
|
118 | 124 | settings_maker.make_setting('vcs.connection_timeout', 3600, parser='int') |
|
119 | 125 | settings_maker.make_setting('vcs.git.lfs.storage_location', '/var/opt/rhodecode_repo_store/.cache/git_lfs_store') |
|
120 | 126 | settings_maker.make_setting('vcs.hg.largefiles.storage_location', |
|
121 | 127 | '/var/opt/rhodecode_repo_store/.cache/hg_largefiles_store') |
|
122 | 128 | |
|
123 | 129 | settings_maker.make_setting('vcs.methods.cache', True, parser='bool') |
|
124 | 130 | |
|
125 | 131 | # repo_store path |
|
126 | 132 | settings_maker.make_setting('repo_store.path', '/var/opt/rhodecode_repo_store') |
|
127 | 133 | # Support legacy values of vcs.scm_app_implementation. Legacy |
|
128 | 134 | # configurations may use 'rhodecode.lib.middleware.utils.scm_app_http', or |
|
129 | 135 | # disabled since 4.13 'vcsserver.scm_app' which is now mapped to 'http'. |
|
130 | 136 | scm_app_impl = settings['vcs.scm_app_implementation'] |
|
131 | 137 | if scm_app_impl in ['rhodecode.lib.middleware.utils.scm_app_http', 'vcsserver.scm_app']: |
|
132 | 138 | settings['vcs.scm_app_implementation'] = 'http' |
|
133 | 139 | |
|
134 | 140 | settings_maker.make_setting('appenlight', False, parser='bool') |
|
135 | 141 | |
|
136 | 142 | temp_store = tempfile.gettempdir() |
|
137 | 143 | tmp_cache_dir = jn(temp_store, 'rc_cache') |
|
138 | 144 | |
|
139 | 145 | # save default, cache dir, and use it for all backends later. |
|
140 | 146 | default_cache_dir = settings_maker.make_setting( |
|
141 | 147 | 'cache_dir', |
|
142 | 148 | default=tmp_cache_dir, default_when_empty=True, |
|
143 | 149 | parser='dir:ensured') |
|
144 | 150 | |
|
145 | 151 | # exception store cache |
|
146 | 152 | settings_maker.make_setting( |
|
147 | 153 | 'exception_tracker.store_path', |
|
148 | 154 | default=jn(default_cache_dir, 'exc_store'), default_when_empty=True, |
|
149 | 155 | parser='dir:ensured' |
|
150 | 156 | ) |
|
151 | 157 | |
|
152 | 158 | settings_maker.make_setting( |
|
153 | 159 | 'celerybeat-schedule.path', |
|
154 | 160 | default=jn(default_cache_dir, 'celerybeat_schedule', 'celerybeat-schedule.db'), default_when_empty=True, |
|
155 | 161 | parser='file:ensured' |
|
156 | 162 | ) |
|
157 | 163 | |
|
158 | 164 | # celery |
|
159 | 165 | broker_url = settings_maker.make_setting('celery.broker_url', 'redis://redis:6379/8') |
|
160 | 166 | settings_maker.make_setting('celery.result_backend', broker_url) |
|
161 | 167 | |
|
162 | 168 | settings_maker.make_setting('exception_tracker.send_email', False, parser='bool') |
|
163 | 169 | settings_maker.make_setting('exception_tracker.email_prefix', '[RHODECODE ERROR]', default_when_empty=True) |
|
164 | 170 | |
|
165 | 171 | # sessions, ensure file since no-value is memory |
|
166 | 172 | settings_maker.make_setting('beaker.session.type', 'file') |
|
167 | 173 | settings_maker.make_setting('beaker.session.data_dir', jn(default_cache_dir, 'session_data')) |
|
168 | 174 | |
|
169 | 175 | # cache_general |
|
170 | 176 | settings_maker.make_setting('rc_cache.cache_general.backend', 'dogpile.cache.rc.file_namespace') |
|
171 | 177 | settings_maker.make_setting('rc_cache.cache_general.expiration_time', 60 * 60 * 12, parser='int') |
|
172 | 178 | settings_maker.make_setting('rc_cache.cache_general.arguments.filename', jn(default_cache_dir, 'rhodecode_cache_general.db')) |
|
173 | 179 | |
|
174 | 180 | # cache_perms |
|
175 | 181 | settings_maker.make_setting('rc_cache.cache_perms.backend', 'dogpile.cache.rc.file_namespace') |
|
176 | 182 | settings_maker.make_setting('rc_cache.cache_perms.expiration_time', 60 * 60, parser='int') |
|
177 | 183 | settings_maker.make_setting('rc_cache.cache_perms.arguments.filename', jn(default_cache_dir, 'rhodecode_cache_perms_db')) |
|
178 | 184 | |
|
179 | 185 | # cache_repo |
|
180 | 186 | settings_maker.make_setting('rc_cache.cache_repo.backend', 'dogpile.cache.rc.file_namespace') |
|
181 | 187 | settings_maker.make_setting('rc_cache.cache_repo.expiration_time', 60 * 60 * 24 * 30, parser='int') |
|
182 | 188 | settings_maker.make_setting('rc_cache.cache_repo.arguments.filename', jn(default_cache_dir, 'rhodecode_cache_repo_db')) |
|
183 | 189 | |
|
184 | 190 | # cache_license |
|
185 | 191 | settings_maker.make_setting('rc_cache.cache_license.backend', 'dogpile.cache.rc.file_namespace') |
|
186 | 192 | settings_maker.make_setting('rc_cache.cache_license.expiration_time', 60 * 5, parser='int') |
|
187 | 193 | settings_maker.make_setting('rc_cache.cache_license.arguments.filename', jn(default_cache_dir, 'rhodecode_cache_license_db')) |
|
188 | 194 | |
|
189 | 195 | # cache_repo_longterm memory, 96H |
|
190 | 196 | settings_maker.make_setting('rc_cache.cache_repo_longterm.backend', 'dogpile.cache.rc.memory_lru') |
|
191 | 197 | settings_maker.make_setting('rc_cache.cache_repo_longterm.expiration_time', 345600, parser='int') |
|
192 | 198 | settings_maker.make_setting('rc_cache.cache_repo_longterm.max_size', 10000, parser='int') |
|
193 | 199 | |
|
194 | 200 | # sql_cache_short |
|
195 | 201 | settings_maker.make_setting('rc_cache.sql_cache_short.backend', 'dogpile.cache.rc.memory_lru') |
|
196 | 202 | settings_maker.make_setting('rc_cache.sql_cache_short.expiration_time', 30, parser='int') |
|
197 | 203 | settings_maker.make_setting('rc_cache.sql_cache_short.max_size', 10000, parser='int') |
|
198 | 204 | |
|
199 | 205 | # archive_cache |
|
200 | 206 | settings_maker.make_setting('archive_cache.locking.url', 'redis://redis:6379/1') |
|
201 | 207 | settings_maker.make_setting('archive_cache.backend.type', 'filesystem') |
|
202 | 208 | |
|
203 | 209 | settings_maker.make_setting('archive_cache.filesystem.store_dir', jn(default_cache_dir, 'archive_cache'), default_when_empty=True,) |
|
204 | 210 | settings_maker.make_setting('archive_cache.filesystem.cache_shards', 8, parser='int') |
|
205 | 211 | settings_maker.make_setting('archive_cache.filesystem.cache_size_gb', 10, parser='float') |
|
206 | 212 | settings_maker.make_setting('archive_cache.filesystem.eviction_policy', 'least-recently-stored') |
|
207 | 213 | |
|
208 | 214 | settings_maker.make_setting('archive_cache.filesystem.retry', False, parser='bool') |
|
209 | 215 | settings_maker.make_setting('archive_cache.filesystem.retry_backoff', 1, parser='int') |
|
210 | 216 | settings_maker.make_setting('archive_cache.filesystem.retry_attempts', 10, parser='int') |
|
211 | 217 | |
|
212 | 218 | settings_maker.make_setting('archive_cache.objectstore.url', 'http://s3-minio:9000', default_when_empty=True,) |
|
213 | 219 | settings_maker.make_setting('archive_cache.objectstore.key', '') |
|
214 | 220 | settings_maker.make_setting('archive_cache.objectstore.secret', '') |
|
215 | 221 | settings_maker.make_setting('archive_cache.objectstore.region', 'eu-central-1') |
|
216 | 222 | settings_maker.make_setting('archive_cache.objectstore.bucket', 'rhodecode-archive-cache', default_when_empty=True,) |
|
217 | 223 | settings_maker.make_setting('archive_cache.objectstore.bucket_shards', 8, parser='int') |
|
218 | 224 | |
|
219 | 225 | settings_maker.make_setting('archive_cache.objectstore.cache_size_gb', 10, parser='float') |
|
220 | 226 | settings_maker.make_setting('archive_cache.objectstore.eviction_policy', 'least-recently-stored') |
|
221 | 227 | |
|
222 | 228 | settings_maker.make_setting('archive_cache.objectstore.retry', False, parser='bool') |
|
223 | 229 | settings_maker.make_setting('archive_cache.objectstore.retry_backoff', 1, parser='int') |
|
224 | 230 | settings_maker.make_setting('archive_cache.objectstore.retry_attempts', 10, parser='int') |
|
225 | 231 | |
|
226 | 232 | settings_maker.env_expand() |
|
227 | 233 | |
|
228 | 234 | # configure instance id |
|
229 | 235 | config_utils.set_instance_id(settings) |
|
230 | 236 | |
|
231 | 237 | return settings |
@@ -1,470 +1,471 b'' | |||
|
1 | 1 | # Copyright (C) 2010-2023 RhodeCode GmbH |
|
2 | 2 | # |
|
3 | 3 | # This program is free software: you can redistribute it and/or modify |
|
4 | 4 | # it under the terms of the GNU Affero General Public License, version 3 |
|
5 | 5 | # (only), as published by the Free Software Foundation. |
|
6 | 6 | # |
|
7 | 7 | # This program is distributed in the hope that it will be useful, |
|
8 | 8 | # but WITHOUT ANY WARRANTY; without even the implied warranty of |
|
9 | 9 | # MERCHANTABILITY or FITNESS FOR A PARTICULAR PURPOSE. See the |
|
10 | 10 | # GNU General Public License for more details. |
|
11 | 11 | # |
|
12 | 12 | # You should have received a copy of the GNU Affero General Public License |
|
13 | 13 | # along with this program. If not, see <http://www.gnu.org/licenses/>. |
|
14 | 14 | # |
|
15 | 15 | # This program is dual-licensed. If you wish to learn more about the |
|
16 | 16 | # RhodeCode Enterprise Edition, including its added features, Support services, |
|
17 | 17 | # and proprietary license terms, please see https://rhodecode.com/licenses/ |
|
18 | 18 | |
|
19 | 19 | import os |
|
20 | 20 | import sys |
|
21 | 21 | import collections |
|
22 | 22 | |
|
23 | 23 | import time |
|
24 | 24 | import logging.config |
|
25 | 25 | |
|
26 | 26 | from paste.gzipper import make_gzip_middleware |
|
27 | 27 | import pyramid.events |
|
28 | 28 | from pyramid.wsgi import wsgiapp |
|
29 | 29 | from pyramid.config import Configurator |
|
30 | 30 | from pyramid.settings import asbool, aslist |
|
31 | 31 | from pyramid.httpexceptions import ( |
|
32 | 32 | HTTPException, HTTPError, HTTPInternalServerError, HTTPFound, HTTPNotFound) |
|
33 | 33 | from pyramid.renderers import render_to_response |
|
34 | 34 | |
|
35 | 35 | from rhodecode.model import meta |
|
36 | 36 | from rhodecode.config import patches |
|
37 | 37 | |
|
38 | 38 | from rhodecode.config.environment import load_pyramid_environment, propagate_rhodecode_config |
|
39 | 39 | |
|
40 | 40 | import rhodecode.events |
|
41 | 41 | from rhodecode.config.config_maker import sanitize_settings_and_apply_defaults |
|
42 | 42 | from rhodecode.lib.middleware.vcs import VCSMiddleware |
|
43 | 43 | from rhodecode.lib.request import Request |
|
44 | 44 | from rhodecode.lib.vcs import VCSCommunicationError |
|
45 | 45 | from rhodecode.lib.exceptions import VCSServerUnavailable |
|
46 | 46 | from rhodecode.lib.middleware.appenlight import wrap_in_appenlight_if_enabled |
|
47 | 47 | from rhodecode.lib.middleware.https_fixup import HttpsFixup |
|
48 | 48 | from rhodecode.lib.plugins.utils import register_rhodecode_plugin |
|
49 | 49 | from rhodecode.lib.utils2 import AttributeDict |
|
50 | 50 | from rhodecode.lib.exc_tracking import store_exception, format_exc |
|
51 | 51 | from rhodecode.subscribers import ( |
|
52 | 52 | scan_repositories_if_enabled, write_js_routes_if_enabled, |
|
53 | write_metadata_if_needed, write_usage_data) | |
|
53 | write_metadata_if_needed, write_usage_data, import_license_if_present) | |
|
54 | 54 | from rhodecode.lib.statsd_client import StatsdClient |
|
55 | 55 | |
|
56 | 56 | log = logging.getLogger(__name__) |
|
57 | 57 | |
|
58 | 58 | |
|
59 | 59 | def is_http_error(response): |
|
60 | 60 | # error which should have traceback |
|
61 | 61 | return response.status_code > 499 |
|
62 | 62 | |
|
63 | 63 | |
|
64 | 64 | def should_load_all(): |
|
65 | 65 | """ |
|
66 | 66 | Returns if all application components should be loaded. In some cases it's |
|
67 | 67 | desired to skip apps loading for faster shell script execution |
|
68 | 68 | """ |
|
69 | 69 | ssh_cmd = os.environ.get('RC_CMD_SSH_WRAPPER') |
|
70 | 70 | if ssh_cmd: |
|
71 | 71 | return False |
|
72 | 72 | |
|
73 | 73 | return True |
|
74 | 74 | |
|
75 | 75 | |
|
76 | 76 | def make_pyramid_app(global_config, **settings): |
|
77 | 77 | """ |
|
78 | 78 | Constructs the WSGI application based on Pyramid. |
|
79 | 79 | |
|
80 | 80 | Specials: |
|
81 | 81 | |
|
82 | 82 | * The application can also be integrated like a plugin via the call to |
|
83 | 83 | `includeme`. This is accompanied with the other utility functions which |
|
84 | 84 | are called. Changing this should be done with great care to not break |
|
85 | 85 | cases when these fragments are assembled from another place. |
|
86 | 86 | |
|
87 | 87 | """ |
|
88 | 88 | start_time = time.time() |
|
89 | 89 | log.info('Pyramid app config starting') |
|
90 | 90 | |
|
91 | 91 | sanitize_settings_and_apply_defaults(global_config, settings) |
|
92 | 92 | |
|
93 | 93 | # init and bootstrap StatsdClient |
|
94 | 94 | StatsdClient.setup(settings) |
|
95 | 95 | |
|
96 | 96 | config = Configurator(settings=settings) |
|
97 | 97 | # Init our statsd at very start |
|
98 | 98 | config.registry.statsd = StatsdClient.statsd |
|
99 | 99 | |
|
100 | 100 | # Apply compatibility patches |
|
101 | 101 | patches.inspect_getargspec() |
|
102 | 102 | patches.repoze_sendmail_lf_fix() |
|
103 | 103 | |
|
104 | 104 | load_pyramid_environment(global_config, settings) |
|
105 | 105 | |
|
106 | 106 | # Static file view comes first |
|
107 | 107 | includeme_first(config) |
|
108 | 108 | |
|
109 | 109 | includeme(config) |
|
110 | 110 | |
|
111 | 111 | pyramid_app = config.make_wsgi_app() |
|
112 | 112 | pyramid_app = wrap_app_in_wsgi_middlewares(pyramid_app, config) |
|
113 | 113 | pyramid_app.config = config |
|
114 | 114 | |
|
115 | 115 | celery_settings = get_celery_config(settings) |
|
116 | 116 | config.configure_celery(celery_settings) |
|
117 | 117 | |
|
118 | 118 | # final config set... |
|
119 | 119 | propagate_rhodecode_config(global_config, settings, config.registry.settings) |
|
120 | 120 | |
|
121 | 121 | # creating the app uses a connection - return it after we are done |
|
122 | 122 | meta.Session.remove() |
|
123 | 123 | |
|
124 | 124 | total_time = time.time() - start_time |
|
125 | 125 | log.info('Pyramid app created and configured in %.2fs', total_time) |
|
126 | 126 | return pyramid_app |
|
127 | 127 | |
|
128 | 128 | |
|
129 | 129 | def get_celery_config(settings): |
|
130 | 130 | """ |
|
131 | 131 | Converts basic ini configuration into celery 4.X options |
|
132 | 132 | """ |
|
133 | 133 | |
|
134 | 134 | def key_converter(key_name): |
|
135 | 135 | pref = 'celery.' |
|
136 | 136 | if key_name.startswith(pref): |
|
137 | 137 | return key_name[len(pref):].replace('.', '_').lower() |
|
138 | 138 | |
|
139 | 139 | def type_converter(parsed_key, value): |
|
140 | 140 | # cast to int |
|
141 | 141 | if value.isdigit(): |
|
142 | 142 | return int(value) |
|
143 | 143 | |
|
144 | 144 | # cast to bool |
|
145 | 145 | if value.lower() in ['true', 'false', 'True', 'False']: |
|
146 | 146 | return value.lower() == 'true' |
|
147 | 147 | return value |
|
148 | 148 | |
|
149 | 149 | celery_config = {} |
|
150 | 150 | for k, v in settings.items(): |
|
151 | 151 | pref = 'celery.' |
|
152 | 152 | if k.startswith(pref): |
|
153 | 153 | celery_config[key_converter(k)] = type_converter(key_converter(k), v) |
|
154 | 154 | |
|
155 | 155 | # TODO:rethink if we want to support celerybeat based file config, probably NOT |
|
156 | 156 | # beat_config = {} |
|
157 | 157 | # for section in parser.sections(): |
|
158 | 158 | # if section.startswith('celerybeat:'): |
|
159 | 159 | # name = section.split(':', 1)[1] |
|
160 | 160 | # beat_config[name] = get_beat_config(parser, section) |
|
161 | 161 | |
|
162 | 162 | # final compose of settings |
|
163 | 163 | celery_settings = {} |
|
164 | 164 | |
|
165 | 165 | if celery_config: |
|
166 | 166 | celery_settings.update(celery_config) |
|
167 | 167 | # if beat_config: |
|
168 | 168 | # celery_settings.update({'beat_schedule': beat_config}) |
|
169 | 169 | |
|
170 | 170 | return celery_settings |
|
171 | 171 | |
|
172 | 172 | |
|
173 | 173 | def not_found_view(request): |
|
174 | 174 | """ |
|
175 | 175 | This creates the view which should be registered as not-found-view to |
|
176 | 176 | pyramid. |
|
177 | 177 | """ |
|
178 | 178 | |
|
179 | 179 | if not getattr(request, 'vcs_call', None): |
|
180 | 180 | # handle like regular case with our error_handler |
|
181 | 181 | return error_handler(HTTPNotFound(), request) |
|
182 | 182 | |
|
183 | 183 | # handle not found view as a vcs call |
|
184 | 184 | settings = request.registry.settings |
|
185 | 185 | ae_client = getattr(request, 'ae_client', None) |
|
186 | 186 | vcs_app = VCSMiddleware( |
|
187 | 187 | HTTPNotFound(), request.registry, settings, |
|
188 | 188 | appenlight_client=ae_client) |
|
189 | 189 | |
|
190 | 190 | return wsgiapp(vcs_app)(None, request) |
|
191 | 191 | |
|
192 | 192 | |
|
193 | 193 | def error_handler(exception, request): |
|
194 | 194 | import rhodecode |
|
195 | 195 | from rhodecode.lib import helpers |
|
196 | 196 | |
|
197 | 197 | rhodecode_title = rhodecode.CONFIG.get('rhodecode_title') or 'RhodeCode' |
|
198 | 198 | |
|
199 | 199 | base_response = HTTPInternalServerError() |
|
200 | 200 | # prefer original exception for the response since it may have headers set |
|
201 | 201 | if isinstance(exception, HTTPException): |
|
202 | 202 | base_response = exception |
|
203 | 203 | elif isinstance(exception, VCSCommunicationError): |
|
204 | 204 | base_response = VCSServerUnavailable() |
|
205 | 205 | |
|
206 | 206 | if is_http_error(base_response): |
|
207 | 207 | traceback_info = format_exc(request.exc_info) |
|
208 | 208 | log.error( |
|
209 | 209 | 'error occurred handling this request for path: %s, \n%s', |
|
210 | 210 | request.path, traceback_info) |
|
211 | 211 | |
|
212 | 212 | error_explanation = base_response.explanation or str(base_response) |
|
213 | 213 | if base_response.status_code == 404: |
|
214 | 214 | error_explanation += " Optionally you don't have permission to access this page." |
|
215 | 215 | c = AttributeDict() |
|
216 | 216 | c.error_message = base_response.status |
|
217 | 217 | c.error_explanation = error_explanation |
|
218 | 218 | c.visual = AttributeDict() |
|
219 | 219 | |
|
220 | 220 | c.visual.rhodecode_support_url = ( |
|
221 | 221 | request.registry.settings.get('rhodecode_support_url') or |
|
222 | 222 | request.route_url('rhodecode_support') |
|
223 | 223 | ) |
|
224 | 224 | c.redirect_time = 0 |
|
225 | 225 | c.rhodecode_name = rhodecode_title |
|
226 | 226 | if not c.rhodecode_name: |
|
227 | 227 | c.rhodecode_name = 'Rhodecode' |
|
228 | 228 | |
|
229 | 229 | c.causes = [] |
|
230 | 230 | if is_http_error(base_response): |
|
231 | 231 | c.causes.append('Server is overloaded.') |
|
232 | 232 | c.causes.append('Server database connection is lost.') |
|
233 | 233 | c.causes.append('Server expected unhandled error.') |
|
234 | 234 | |
|
235 | 235 | if hasattr(base_response, 'causes'): |
|
236 | 236 | c.causes = base_response.causes |
|
237 | 237 | |
|
238 | 238 | c.messages = helpers.flash.pop_messages(request=request) |
|
239 | 239 | exc_info = sys.exc_info() |
|
240 | 240 | c.exception_id = id(exc_info) |
|
241 | 241 | c.show_exception_id = isinstance(base_response, VCSServerUnavailable) \ |
|
242 | 242 | or base_response.status_code > 499 |
|
243 | 243 | c.exception_id_url = request.route_url( |
|
244 | 244 | 'admin_settings_exception_tracker_show', exception_id=c.exception_id) |
|
245 | 245 | |
|
246 | 246 | debug_mode = rhodecode.ConfigGet().get_bool('debug') |
|
247 | 247 | if c.show_exception_id: |
|
248 | 248 | store_exception(c.exception_id, exc_info) |
|
249 | 249 | c.exception_debug = debug_mode |
|
250 | 250 | c.exception_config_ini = rhodecode.CONFIG.get('__file__') |
|
251 | 251 | |
|
252 | 252 | if debug_mode: |
|
253 | 253 | try: |
|
254 | 254 | from rich.traceback import install |
|
255 | 255 | install(show_locals=True) |
|
256 | 256 | log.debug('Installing rich tracebacks...') |
|
257 | 257 | except ImportError: |
|
258 | 258 | pass |
|
259 | 259 | |
|
260 | 260 | response = render_to_response( |
|
261 | 261 | '/errors/error_document.mako', {'c': c, 'h': helpers}, request=request, |
|
262 | 262 | response=base_response) |
|
263 | 263 | |
|
264 | 264 | response.headers["X-RC-Exception-Id"] = str(c.exception_id) |
|
265 | 265 | |
|
266 | 266 | statsd = request.registry.statsd |
|
267 | 267 | if statsd and base_response.status_code > 499: |
|
268 | 268 | exc_type = f"{exception.__class__.__module__}.{exception.__class__.__name__}" |
|
269 | 269 | statsd.incr('rhodecode_exception_total', |
|
270 | 270 | tags=["exc_source:web", |
|
271 | 271 | f"http_code:{base_response.status_code}", |
|
272 | 272 | f"type:{exc_type}"]) |
|
273 | 273 | |
|
274 | 274 | return response |
|
275 | 275 | |
|
276 | 276 | |
|
277 | 277 | def includeme_first(config): |
|
278 | 278 | # redirect automatic browser favicon.ico requests to correct place |
|
279 | 279 | def favicon_redirect(context, request): |
|
280 | 280 | return HTTPFound( |
|
281 | 281 | request.static_path('rhodecode:public/images/favicon.ico')) |
|
282 | 282 | |
|
283 | 283 | config.add_view(favicon_redirect, route_name='favicon') |
|
284 | 284 | config.add_route('favicon', '/favicon.ico') |
|
285 | 285 | |
|
286 | 286 | def robots_redirect(context, request): |
|
287 | 287 | return HTTPFound( |
|
288 | 288 | request.static_path('rhodecode:public/robots.txt')) |
|
289 | 289 | |
|
290 | 290 | config.add_view(robots_redirect, route_name='robots') |
|
291 | 291 | config.add_route('robots', '/robots.txt') |
|
292 | 292 | |
|
293 | 293 | config.add_static_view( |
|
294 | 294 | '_static/deform', 'deform:static') |
|
295 | 295 | config.add_static_view( |
|
296 | 296 | '_static/rhodecode', path='rhodecode:public', cache_max_age=3600 * 24) |
|
297 | 297 | |
|
298 | 298 | |
|
299 | 299 | ce_auth_resources = [ |
|
300 | 300 | 'rhodecode.authentication.plugins.auth_crowd', |
|
301 | 301 | 'rhodecode.authentication.plugins.auth_headers', |
|
302 | 302 | 'rhodecode.authentication.plugins.auth_jasig_cas', |
|
303 | 303 | 'rhodecode.authentication.plugins.auth_ldap', |
|
304 | 304 | 'rhodecode.authentication.plugins.auth_pam', |
|
305 | 305 | 'rhodecode.authentication.plugins.auth_rhodecode', |
|
306 | 306 | 'rhodecode.authentication.plugins.auth_token', |
|
307 | 307 | ] |
|
308 | 308 | |
|
309 | 309 | |
|
310 | 310 | def includeme(config, auth_resources=None): |
|
311 | 311 | from rhodecode.lib.celerylib.loader import configure_celery |
|
312 | 312 | log.debug('Initializing main includeme from %s', os.path.basename(__file__)) |
|
313 | 313 | settings = config.registry.settings |
|
314 | 314 | config.set_request_factory(Request) |
|
315 | 315 | |
|
316 | 316 | # plugin information |
|
317 | 317 | config.registry.rhodecode_plugins = collections.OrderedDict() |
|
318 | 318 | |
|
319 | 319 | config.add_directive( |
|
320 | 320 | 'register_rhodecode_plugin', register_rhodecode_plugin) |
|
321 | 321 | |
|
322 | 322 | config.add_directive('configure_celery', configure_celery) |
|
323 | 323 | |
|
324 | 324 | if settings.get('appenlight', False): |
|
325 | 325 | config.include('appenlight_client.ext.pyramid_tween') |
|
326 | 326 | |
|
327 | 327 | load_all = should_load_all() |
|
328 | 328 | |
|
329 | 329 | # Includes which are required. The application would fail without them. |
|
330 | 330 | config.include('pyramid_mako') |
|
331 | 331 | config.include('rhodecode.lib.rc_beaker') |
|
332 | 332 | config.include('rhodecode.lib.rc_cache') |
|
333 | 333 | config.include('rhodecode.lib.archive_cache') |
|
334 | 334 | |
|
335 | 335 | config.include('rhodecode.apps._base.navigation') |
|
336 | 336 | config.include('rhodecode.apps._base.subscribers') |
|
337 | 337 | config.include('rhodecode.tweens') |
|
338 | 338 | config.include('rhodecode.authentication') |
|
339 | 339 | |
|
340 | 340 | if load_all: |
|
341 | 341 | |
|
342 | 342 | # load CE authentication plugins |
|
343 | 343 | |
|
344 | 344 | if auth_resources: |
|
345 | 345 | ce_auth_resources.extend(auth_resources) |
|
346 | 346 | |
|
347 | 347 | for resource in ce_auth_resources: |
|
348 | 348 | config.include(resource) |
|
349 | 349 | |
|
350 | 350 | # Auto discover authentication plugins and include their configuration. |
|
351 | 351 | if asbool(settings.get('auth_plugin.import_legacy_plugins', 'true')): |
|
352 | 352 | from rhodecode.authentication import discover_legacy_plugins |
|
353 | 353 | discover_legacy_plugins(config) |
|
354 | 354 | |
|
355 | 355 | # apps |
|
356 | 356 | if load_all: |
|
357 | 357 | log.debug('Starting config.include() calls') |
|
358 | 358 | config.include('rhodecode.api.includeme') |
|
359 | 359 | config.include('rhodecode.apps._base.includeme') |
|
360 | 360 | config.include('rhodecode.apps._base.navigation.includeme') |
|
361 | 361 | config.include('rhodecode.apps._base.subscribers.includeme') |
|
362 | 362 | config.include('rhodecode.apps.hovercards.includeme') |
|
363 | 363 | config.include('rhodecode.apps.ops.includeme') |
|
364 | 364 | config.include('rhodecode.apps.channelstream.includeme') |
|
365 | 365 | config.include('rhodecode.apps.file_store.includeme') |
|
366 | 366 | config.include('rhodecode.apps.admin.includeme') |
|
367 | 367 | config.include('rhodecode.apps.login.includeme') |
|
368 | 368 | config.include('rhodecode.apps.home.includeme') |
|
369 | 369 | config.include('rhodecode.apps.journal.includeme') |
|
370 | 370 | |
|
371 | 371 | config.include('rhodecode.apps.repository.includeme') |
|
372 | 372 | config.include('rhodecode.apps.repo_group.includeme') |
|
373 | 373 | config.include('rhodecode.apps.user_group.includeme') |
|
374 | 374 | config.include('rhodecode.apps.search.includeme') |
|
375 | 375 | config.include('rhodecode.apps.user_profile.includeme') |
|
376 | 376 | config.include('rhodecode.apps.user_group_profile.includeme') |
|
377 | 377 | config.include('rhodecode.apps.my_account.includeme') |
|
378 | 378 | config.include('rhodecode.apps.gist.includeme') |
|
379 | 379 | |
|
380 | 380 | config.include('rhodecode.apps.svn_support.includeme') |
|
381 | 381 | config.include('rhodecode.apps.ssh_support.includeme') |
|
382 | 382 | config.include('rhodecode.apps.debug_style') |
|
383 | 383 | |
|
384 | 384 | if load_all: |
|
385 | 385 | config.include('rhodecode.integrations.includeme') |
|
386 | 386 | config.include('rhodecode.integrations.routes.includeme') |
|
387 | 387 | |
|
388 | 388 | config.add_route('rhodecode_support', 'https://rhodecode.com/help/', static=True) |
|
389 | 389 | settings['default_locale_name'] = settings.get('lang', 'en') |
|
390 | 390 | config.add_translation_dirs('rhodecode:i18n/') |
|
391 | 391 | |
|
392 | 392 | # Add subscribers. |
|
393 | 393 | if load_all: |
|
394 | 394 | log.debug('Adding subscribers...') |
|
395 | 395 | config.add_subscriber(scan_repositories_if_enabled, |
|
396 | 396 | pyramid.events.ApplicationCreated) |
|
397 | 397 | config.add_subscriber(write_metadata_if_needed, |
|
398 | 398 | pyramid.events.ApplicationCreated) |
|
399 | 399 | config.add_subscriber(write_usage_data, |
|
400 | 400 | pyramid.events.ApplicationCreated) |
|
401 | 401 | config.add_subscriber(write_js_routes_if_enabled, |
|
402 | 402 | pyramid.events.ApplicationCreated) |
|
403 | ||
|
403 | config.add_subscriber(import_license_if_present, | |
|
404 | pyramid.events.ApplicationCreated) | |
|
404 | 405 | |
|
405 | 406 | # Set the default renderer for HTML templates to mako. |
|
406 | 407 | config.add_mako_renderer('.html') |
|
407 | 408 | |
|
408 | 409 | config.add_renderer( |
|
409 | 410 | name='json_ext', |
|
410 | 411 | factory='rhodecode.lib.ext_json_renderer.pyramid_ext_json') |
|
411 | 412 | |
|
412 | 413 | config.add_renderer( |
|
413 | 414 | name='string_html', |
|
414 | 415 | factory='rhodecode.lib.string_renderer.html') |
|
415 | 416 | |
|
416 | 417 | # include RhodeCode plugins |
|
417 | 418 | includes = aslist(settings.get('rhodecode.includes', [])) |
|
418 | 419 | log.debug('processing rhodecode.includes data...') |
|
419 | 420 | for inc in includes: |
|
420 | 421 | config.include(inc) |
|
421 | 422 | |
|
422 | 423 | # custom not found view, if our pyramid app doesn't know how to handle |
|
423 | 424 | # the request pass it to potential VCS handling ap |
|
424 | 425 | config.add_notfound_view(not_found_view) |
|
425 | 426 | if not settings.get('debugtoolbar.enabled', False): |
|
426 | 427 | # disabled debugtoolbar handle all exceptions via the error_handlers |
|
427 | 428 | config.add_view(error_handler, context=Exception) |
|
428 | 429 | |
|
429 | 430 | # all errors including 403/404/50X |
|
430 | 431 | config.add_view(error_handler, context=HTTPError) |
|
431 | 432 | |
|
432 | 433 | |
|
433 | 434 | def wrap_app_in_wsgi_middlewares(pyramid_app, config): |
|
434 | 435 | """ |
|
435 | 436 | Apply outer WSGI middlewares around the application. |
|
436 | 437 | """ |
|
437 | 438 | registry = config.registry |
|
438 | 439 | settings = registry.settings |
|
439 | 440 | |
|
440 | 441 | # enable https redirects based on HTTP_X_URL_SCHEME set by proxy |
|
441 | 442 | pyramid_app = HttpsFixup(pyramid_app, settings) |
|
442 | 443 | |
|
443 | 444 | pyramid_app, _ae_client = wrap_in_appenlight_if_enabled( |
|
444 | 445 | pyramid_app, settings) |
|
445 | 446 | registry.ae_client = _ae_client |
|
446 | 447 | |
|
447 | 448 | if settings['gzip_responses']: |
|
448 | 449 | pyramid_app = make_gzip_middleware( |
|
449 | 450 | pyramid_app, settings, compress_level=1) |
|
450 | 451 | |
|
451 | 452 | # this should be the outer most middleware in the wsgi stack since |
|
452 | 453 | # middleware like Routes make database calls |
|
453 | 454 | def pyramid_app_with_cleanup(environ, start_response): |
|
454 | 455 | start = time.time() |
|
455 | 456 | try: |
|
456 | 457 | return pyramid_app(environ, start_response) |
|
457 | 458 | finally: |
|
458 | 459 | # Dispose current database session and rollback uncommitted |
|
459 | 460 | # transactions. |
|
460 | 461 | meta.Session.remove() |
|
461 | 462 | |
|
462 | 463 | # In a single threaded mode server, on non sqlite db we should have |
|
463 | 464 | # '0 Current Checked out connections' at the end of a request, |
|
464 | 465 | # if not, then something, somewhere is leaving a connection open |
|
465 | 466 | pool = meta.get_engine().pool |
|
466 | 467 | log.debug('sa pool status: %s', pool.status()) |
|
467 | 468 | total = time.time() - start |
|
468 | 469 | log.debug('Request processing finalized: %.4fs', total) |
|
469 | 470 | |
|
470 | 471 | return pyramid_app_with_cleanup |
@@ -1,679 +1,678 b'' | |||
|
1 | 1 | # Copyright (C) 2010-2023 RhodeCode GmbH |
|
2 | 2 | # |
|
3 | 3 | # This program is free software: you can redistribute it and/or modify |
|
4 | 4 | # it under the terms of the GNU Affero General Public License, version 3 |
|
5 | 5 | # (only), as published by the Free Software Foundation. |
|
6 | 6 | # |
|
7 | 7 | # This program is distributed in the hope that it will be useful, |
|
8 | 8 | # but WITHOUT ANY WARRANTY; without even the implied warranty of |
|
9 | 9 | # MERCHANTABILITY or FITNESS FOR A PARTICULAR PURPOSE. See the |
|
10 | 10 | # GNU General Public License for more details. |
|
11 | 11 | # |
|
12 | 12 | # You should have received a copy of the GNU Affero General Public License |
|
13 | 13 | # along with this program. If not, see <http://www.gnu.org/licenses/>. |
|
14 | 14 | # |
|
15 | 15 | # This program is dual-licensed. If you wish to learn more about the |
|
16 | 16 | # RhodeCode Enterprise Edition, including its added features, Support services, |
|
17 | 17 | # and proprietary license terms, please see https://rhodecode.com/licenses/ |
|
18 | 18 | |
|
19 | 19 | """ |
|
20 | 20 | Database creation, and setup module for RhodeCode Enterprise. Used for creation |
|
21 | 21 | of database as well as for migration operations |
|
22 | 22 | """ |
|
23 | 23 | |
|
24 | 24 | import os |
|
25 | 25 | import sys |
|
26 | 26 | import time |
|
27 | 27 | import uuid |
|
28 | 28 | import logging |
|
29 | 29 | import getpass |
|
30 | 30 | from os.path import dirname as dn, join as jn |
|
31 | 31 | |
|
32 | 32 | from sqlalchemy.engine import create_engine |
|
33 | 33 | |
|
34 | 34 | from rhodecode import __dbversion__ |
|
35 | 35 | from rhodecode.model import init_model |
|
36 | 36 | from rhodecode.model.user import UserModel |
|
37 | 37 | from rhodecode.model.db import ( |
|
38 | 38 | User, Permission, RhodeCodeUi, RhodeCodeSetting, UserToPerm, |
|
39 | 39 | DbMigrateVersion, RepoGroup, UserRepoGroupToPerm, CacheKey, Repository) |
|
40 | 40 | from rhodecode.model.meta import Session, Base |
|
41 | 41 | from rhodecode.model.permission import PermissionModel |
|
42 | 42 | from rhodecode.model.repo import RepoModel |
|
43 | 43 | from rhodecode.model.repo_group import RepoGroupModel |
|
44 | 44 | from rhodecode.model.settings import SettingsModel |
|
45 | 45 | |
|
46 | 46 | |
|
47 | 47 | log = logging.getLogger(__name__) |
|
48 | 48 | |
|
49 | 49 | |
|
50 | 50 | def notify(msg): |
|
51 | 51 | """ |
|
52 | 52 | Notification for migrations messages |
|
53 | 53 | """ |
|
54 | 54 | ml = len(msg) + (4 * 2) |
|
55 | 55 | print((('\n%s\n*** %s ***\n%s' % ('*' * ml, msg, '*' * ml)).upper())) |
|
56 | 56 | |
|
57 | 57 | |
|
58 | 58 | class DbManage(object): |
|
59 | 59 | |
|
60 | 60 | def __init__(self, log_sql, dbconf, root, tests=False, |
|
61 | 61 | SESSION=None, cli_args=None, enc_key=b''): |
|
62 | 62 | |
|
63 | 63 | self.dbname = dbconf.split('/')[-1] |
|
64 | 64 | self.tests = tests |
|
65 | 65 | self.root = root |
|
66 | 66 | self.dburi = dbconf |
|
67 | 67 | self.log_sql = log_sql |
|
68 | 68 | self.cli_args = cli_args or {} |
|
69 | 69 | self.sa = None |
|
70 | 70 | self.engine = None |
|
71 | 71 | self.enc_key = enc_key |
|
72 | 72 | # sets .sa .engine |
|
73 | 73 | self.init_db(SESSION=SESSION) |
|
74 | 74 | |
|
75 | 75 | self.ask_ok = self.get_ask_ok_func(self.cli_args.get('force_ask')) |
|
76 | 76 | |
|
77 | 77 | def db_exists(self): |
|
78 | 78 | if not self.sa: |
|
79 | 79 | self.init_db() |
|
80 | 80 | try: |
|
81 | 81 | self.sa.query(RhodeCodeUi)\ |
|
82 | 82 | .filter(RhodeCodeUi.ui_key == '/')\ |
|
83 | 83 | .scalar() |
|
84 | 84 | return True |
|
85 | 85 | except Exception: |
|
86 | 86 | return False |
|
87 | 87 | finally: |
|
88 | 88 | self.sa.rollback() |
|
89 | 89 | |
|
90 | 90 | def get_ask_ok_func(self, param): |
|
91 | 91 | if param not in [None]: |
|
92 | 92 | # return a function lambda that has a default set to param |
|
93 | 93 | return lambda *args, **kwargs: param |
|
94 | 94 | else: |
|
95 | 95 | from rhodecode.lib.utils import ask_ok |
|
96 | 96 | return ask_ok |
|
97 | 97 | |
|
98 | 98 | def init_db(self, SESSION=None): |
|
99 | 99 | |
|
100 | 100 | if SESSION: |
|
101 | 101 | self.sa = SESSION |
|
102 | 102 | self.engine = SESSION.bind |
|
103 | 103 | else: |
|
104 | 104 | # init new sessions |
|
105 | 105 | engine = create_engine(self.dburi, echo=self.log_sql) |
|
106 | 106 | init_model(engine, encryption_key=self.enc_key) |
|
107 | 107 | self.sa = Session() |
|
108 | 108 | self.engine = engine |
|
109 | 109 | |
|
110 | 110 | def create_tables(self, override=False): |
|
111 | 111 | """ |
|
112 | 112 | Create a auth database |
|
113 | 113 | """ |
|
114 | 114 | |
|
115 | 115 | log.info("Existing database with the same name is going to be destroyed.") |
|
116 | 116 | log.info("Setup command will run DROP ALL command on that database.") |
|
117 | 117 | engine = self.engine |
|
118 | 118 | |
|
119 | 119 | if self.tests: |
|
120 | 120 | destroy = True |
|
121 | 121 | else: |
|
122 | 122 | destroy = self.ask_ok('Are you sure that you want to destroy the old database? [y/n]') |
|
123 | 123 | if not destroy: |
|
124 | 124 | log.info('db tables bootstrap: Nothing done.') |
|
125 | 125 | sys.exit(0) |
|
126 | 126 | if destroy: |
|
127 | 127 | Base.metadata.drop_all(bind=engine) |
|
128 | 128 | |
|
129 | 129 | checkfirst = not override |
|
130 | 130 | Base.metadata.create_all(bind=engine, checkfirst=checkfirst) |
|
131 | 131 | log.info('Created tables for %s', self.dbname) |
|
132 | 132 | |
|
133 | 133 | def set_db_version(self): |
|
134 | 134 | ver = DbMigrateVersion() |
|
135 | 135 | ver.version = __dbversion__ |
|
136 | 136 | ver.repository_id = 'rhodecode_db_migrations' |
|
137 | 137 | ver.repository_path = 'versions' |
|
138 | 138 | self.sa.add(ver) |
|
139 | 139 | log.info('db version set to: %s', __dbversion__) |
|
140 | 140 | |
|
141 | 141 | def run_post_migration_tasks(self): |
|
142 | 142 | """ |
|
143 | 143 | Run various tasks before actually doing migrations |
|
144 | 144 | """ |
|
145 | 145 | # delete cache keys on each upgrade |
|
146 | 146 | total = CacheKey.query().count() |
|
147 | 147 | log.info("Deleting (%s) cache keys now...", total) |
|
148 | 148 | CacheKey.delete_all_cache() |
|
149 | 149 | |
|
150 | 150 | def upgrade(self, version=None): |
|
151 | 151 | """ |
|
152 | 152 | Upgrades given database schema to given revision following |
|
153 | 153 | all needed steps, to perform the upgrade |
|
154 | 154 | |
|
155 | 155 | """ |
|
156 | 156 | |
|
157 | 157 | from rhodecode.lib.dbmigrate.migrate.versioning import api |
|
158 | 158 | from rhodecode.lib.dbmigrate.migrate.exceptions import DatabaseNotControlledError |
|
159 | 159 | |
|
160 | 160 | if 'sqlite' in self.dburi: |
|
161 | 161 | print( |
|
162 | 162 | '********************** WARNING **********************\n' |
|
163 | 163 | 'Make sure your version of sqlite is at least 3.7.X. \n' |
|
164 | 164 | 'Earlier versions are known to fail on some migrations\n' |
|
165 | 165 | '*****************************************************\n') |
|
166 | 166 | |
|
167 | 167 | upgrade = self.ask_ok( |
|
168 | 168 | 'You are about to perform a database upgrade. Make ' |
|
169 | 169 | 'sure you have backed up your database. ' |
|
170 | 170 | 'Continue ? [y/n]') |
|
171 | 171 | if not upgrade: |
|
172 | 172 | log.info('No upgrade performed') |
|
173 | 173 | sys.exit(0) |
|
174 | 174 | |
|
175 | 175 | repository_path = jn(dn(dn(dn(os.path.realpath(__file__)))), |
|
176 | 176 | 'rhodecode/lib/dbmigrate') |
|
177 | 177 | db_uri = self.dburi |
|
178 | 178 | |
|
179 | 179 | if version: |
|
180 | 180 | DbMigrateVersion.set_version(version) |
|
181 | 181 | |
|
182 | 182 | try: |
|
183 | 183 | curr_version = api.db_version(db_uri, repository_path) |
|
184 | 184 | msg = (f'Found current database db_uri under version ' |
|
185 | 185 | f'control with version {curr_version}') |
|
186 | 186 | |
|
187 | 187 | except (RuntimeError, DatabaseNotControlledError): |
|
188 | 188 | curr_version = 1 |
|
189 | 189 | msg = f'Current database is not under version control. ' \ |
|
190 | 190 | f'Setting as version {curr_version}' |
|
191 | 191 | api.version_control(db_uri, repository_path, curr_version) |
|
192 | 192 | |
|
193 | 193 | notify(msg) |
|
194 | 194 | |
|
195 | 195 | if curr_version == __dbversion__: |
|
196 | 196 | log.info('This database is already at the newest version') |
|
197 | 197 | sys.exit(0) |
|
198 | 198 | |
|
199 | 199 | upgrade_steps = list(range(curr_version + 1, __dbversion__ + 1)) |
|
200 | 200 | notify(f'attempting to upgrade database from ' |
|
201 | 201 | f'version {curr_version} to version {__dbversion__}') |
|
202 | 202 | |
|
203 | 203 | # CALL THE PROPER ORDER OF STEPS TO PERFORM FULL UPGRADE |
|
204 | 204 | final_step = 'latest' |
|
205 | 205 | for step in upgrade_steps: |
|
206 | 206 | notify(f'performing upgrade step {step}') |
|
207 | 207 | time.sleep(0.5) |
|
208 | 208 | |
|
209 | 209 | api.upgrade(db_uri, repository_path, step) |
|
210 | 210 | self.sa.rollback() |
|
211 | 211 | notify(f'schema upgrade for step {step} completed') |
|
212 | 212 | |
|
213 | 213 | final_step = step |
|
214 | 214 | |
|
215 | 215 | self.run_post_migration_tasks() |
|
216 | 216 | notify(f'upgrade to version {final_step} successful') |
|
217 | 217 | |
|
218 | 218 | def fix_repo_paths(self): |
|
219 | 219 | """ |
|
220 | 220 | Fixes an old RhodeCode version path into new one without a '*' |
|
221 | 221 | """ |
|
222 | 222 | |
|
223 | 223 | paths = self.sa.query(RhodeCodeUi)\ |
|
224 | 224 | .filter(RhodeCodeUi.ui_key == '/')\ |
|
225 | 225 | .scalar() |
|
226 | 226 | |
|
227 | 227 | paths.ui_value = paths.ui_value.replace('*', '') |
|
228 | 228 | |
|
229 | 229 | try: |
|
230 | 230 | self.sa.add(paths) |
|
231 | 231 | self.sa.commit() |
|
232 | 232 | except Exception: |
|
233 | 233 | self.sa.rollback() |
|
234 | 234 | raise |
|
235 | 235 | |
|
236 | 236 | def fix_default_user(self): |
|
237 | 237 | """ |
|
238 | 238 | Fixes an old default user with some 'nicer' default values, |
|
239 | 239 | used mostly for anonymous access |
|
240 | 240 | """ |
|
241 | 241 | def_user = self.sa.query(User)\ |
|
242 | 242 | .filter(User.username == User.DEFAULT_USER)\ |
|
243 | 243 | .one() |
|
244 | 244 | |
|
245 | 245 | def_user.name = 'Anonymous' |
|
246 | 246 | def_user.lastname = 'User' |
|
247 | 247 | def_user.email = User.DEFAULT_USER_EMAIL |
|
248 | 248 | |
|
249 | 249 | try: |
|
250 | 250 | self.sa.add(def_user) |
|
251 | 251 | self.sa.commit() |
|
252 | 252 | except Exception: |
|
253 | 253 | self.sa.rollback() |
|
254 | 254 | raise |
|
255 | 255 | |
|
256 | 256 | def fix_settings(self): |
|
257 | 257 | """ |
|
258 | 258 | Fixes rhodecode settings and adds ga_code key for google analytics |
|
259 | 259 | """ |
|
260 | 260 | |
|
261 | 261 | hgsettings3 = RhodeCodeSetting('ga_code', '') |
|
262 | 262 | |
|
263 | 263 | try: |
|
264 | 264 | self.sa.add(hgsettings3) |
|
265 | 265 | self.sa.commit() |
|
266 | 266 | except Exception: |
|
267 | 267 | self.sa.rollback() |
|
268 | 268 | raise |
|
269 | 269 | |
|
270 | 270 | def create_admin_and_prompt(self): |
|
271 | 271 | |
|
272 | 272 | # defaults |
|
273 | 273 | defaults = self.cli_args |
|
274 | 274 | username = defaults.get('username') |
|
275 | 275 | password = defaults.get('password') |
|
276 | 276 | email = defaults.get('email') |
|
277 | 277 | |
|
278 | 278 | if username is None: |
|
279 | 279 | username = input('Specify admin username:') |
|
280 | 280 | if password is None: |
|
281 | 281 | password = self._get_admin_password() |
|
282 | 282 | if not password: |
|
283 | 283 | # second try |
|
284 | 284 | password = self._get_admin_password() |
|
285 | 285 | if not password: |
|
286 | 286 | sys.exit() |
|
287 | 287 | if email is None: |
|
288 | 288 | email = input('Specify admin email:') |
|
289 | 289 | api_key = self.cli_args.get('api_key') |
|
290 | 290 | self.create_user(username, password, email, True, |
|
291 | 291 | strict_creation_check=False, |
|
292 | 292 | api_key=api_key) |
|
293 | 293 | |
|
294 | 294 | def _get_admin_password(self): |
|
295 | 295 | password = getpass.getpass('Specify admin password ' |
|
296 | 296 | '(min 6 chars):') |
|
297 | 297 | confirm = getpass.getpass('Confirm password:') |
|
298 | 298 | |
|
299 | 299 | if password != confirm: |
|
300 | 300 | log.error('passwords mismatch') |
|
301 | 301 | return False |
|
302 | 302 | if len(password) < 6: |
|
303 | 303 | log.error('password is too short - use at least 6 characters') |
|
304 | 304 | return False |
|
305 | 305 | |
|
306 | 306 | return password |
|
307 | 307 | |
|
308 | 308 | def create_test_admin_and_users(self): |
|
309 | 309 | log.info('creating admin and regular test users') |
|
310 | 310 | from rhodecode.tests import TEST_USER_ADMIN_LOGIN, \ |
|
311 | 311 | TEST_USER_ADMIN_PASS, TEST_USER_ADMIN_EMAIL, \ |
|
312 | 312 | TEST_USER_REGULAR_LOGIN, TEST_USER_REGULAR_PASS, \ |
|
313 | 313 | TEST_USER_REGULAR_EMAIL, TEST_USER_REGULAR2_LOGIN, \ |
|
314 | 314 | TEST_USER_REGULAR2_PASS, TEST_USER_REGULAR2_EMAIL |
|
315 | 315 | |
|
316 | 316 | self.create_user(TEST_USER_ADMIN_LOGIN, TEST_USER_ADMIN_PASS, |
|
317 | 317 | TEST_USER_ADMIN_EMAIL, True, api_key=True) |
|
318 | 318 | |
|
319 | 319 | self.create_user(TEST_USER_REGULAR_LOGIN, TEST_USER_REGULAR_PASS, |
|
320 | 320 | TEST_USER_REGULAR_EMAIL, False, api_key=True) |
|
321 | 321 | |
|
322 | 322 | self.create_user(TEST_USER_REGULAR2_LOGIN, TEST_USER_REGULAR2_PASS, |
|
323 | 323 | TEST_USER_REGULAR2_EMAIL, False, api_key=True) |
|
324 | 324 | |
|
325 | 325 | def create_ui_settings(self, repo_store_path): |
|
326 | 326 | """ |
|
327 | 327 | Creates ui settings, fills out hooks |
|
328 | 328 | and disables dotencode |
|
329 | 329 | """ |
|
330 | 330 | settings_model = SettingsModel(sa=self.sa) |
|
331 | 331 | from rhodecode.lib.vcs.backends.hg import largefiles_store |
|
332 | 332 | from rhodecode.lib.vcs.backends.git import lfs_store |
|
333 | 333 | |
|
334 | 334 | # Build HOOKS |
|
335 | 335 | hooks = [ |
|
336 | 336 | (RhodeCodeUi.HOOK_REPO_SIZE, 'python:vcsserver.hooks.repo_size'), |
|
337 | 337 | |
|
338 | 338 | # HG |
|
339 | 339 | (RhodeCodeUi.HOOK_PRE_PULL, 'python:vcsserver.hooks.pre_pull'), |
|
340 | 340 | (RhodeCodeUi.HOOK_PULL, 'python:vcsserver.hooks.log_pull_action'), |
|
341 | 341 | (RhodeCodeUi.HOOK_PRE_PUSH, 'python:vcsserver.hooks.pre_push'), |
|
342 | 342 | (RhodeCodeUi.HOOK_PRETX_PUSH, 'python:vcsserver.hooks.pre_push'), |
|
343 | 343 | (RhodeCodeUi.HOOK_PUSH, 'python:vcsserver.hooks.log_push_action'), |
|
344 | 344 | (RhodeCodeUi.HOOK_PUSH_KEY, 'python:vcsserver.hooks.key_push'), |
|
345 | 345 | |
|
346 | 346 | ] |
|
347 | 347 | |
|
348 | 348 | for key, value in hooks: |
|
349 | 349 | hook_obj = settings_model.get_ui_by_key(key) |
|
350 | 350 | hooks2 = hook_obj if hook_obj else RhodeCodeUi() |
|
351 | 351 | hooks2.ui_section = 'hooks' |
|
352 | 352 | hooks2.ui_key = key |
|
353 | 353 | hooks2.ui_value = value |
|
354 | 354 | self.sa.add(hooks2) |
|
355 | 355 | |
|
356 | 356 | # enable largefiles |
|
357 | 357 | largefiles = RhodeCodeUi() |
|
358 | 358 | largefiles.ui_section = 'extensions' |
|
359 | 359 | largefiles.ui_key = 'largefiles' |
|
360 | 360 | largefiles.ui_value = '' |
|
361 | 361 | self.sa.add(largefiles) |
|
362 | 362 | |
|
363 | 363 | # set default largefiles cache dir, defaults to |
|
364 | 364 | # /repo_store_location/.cache/largefiles |
|
365 | 365 | largefiles = RhodeCodeUi() |
|
366 | 366 | largefiles.ui_section = 'largefiles' |
|
367 | 367 | largefiles.ui_key = 'usercache' |
|
368 | 368 | largefiles.ui_value = largefiles_store(repo_store_path) |
|
369 | 369 | |
|
370 | 370 | self.sa.add(largefiles) |
|
371 | 371 | |
|
372 | 372 | # set default lfs cache dir, defaults to |
|
373 | 373 | # /repo_store_location/.cache/lfs_store |
|
374 | 374 | lfsstore = RhodeCodeUi() |
|
375 | 375 | lfsstore.ui_section = 'vcs_git_lfs' |
|
376 | 376 | lfsstore.ui_key = 'store_location' |
|
377 | 377 | lfsstore.ui_value = lfs_store(repo_store_path) |
|
378 | 378 | |
|
379 | 379 | self.sa.add(lfsstore) |
|
380 | 380 | |
|
381 | 381 | # enable hgevolve disabled by default |
|
382 | 382 | hgevolve = RhodeCodeUi() |
|
383 | 383 | hgevolve.ui_section = 'extensions' |
|
384 | 384 | hgevolve.ui_key = 'evolve' |
|
385 | 385 | hgevolve.ui_value = '' |
|
386 | 386 | hgevolve.ui_active = False |
|
387 | 387 | self.sa.add(hgevolve) |
|
388 | 388 | |
|
389 | 389 | hgevolve = RhodeCodeUi() |
|
390 | 390 | hgevolve.ui_section = 'experimental' |
|
391 | 391 | hgevolve.ui_key = 'evolution' |
|
392 | 392 | hgevolve.ui_value = '' |
|
393 | 393 | hgevolve.ui_active = False |
|
394 | 394 | self.sa.add(hgevolve) |
|
395 | 395 | |
|
396 | 396 | hgevolve = RhodeCodeUi() |
|
397 | 397 | hgevolve.ui_section = 'experimental' |
|
398 | 398 | hgevolve.ui_key = 'evolution.exchange' |
|
399 | 399 | hgevolve.ui_value = '' |
|
400 | 400 | hgevolve.ui_active = False |
|
401 | 401 | self.sa.add(hgevolve) |
|
402 | 402 | |
|
403 | 403 | hgevolve = RhodeCodeUi() |
|
404 | 404 | hgevolve.ui_section = 'extensions' |
|
405 | 405 | hgevolve.ui_key = 'topic' |
|
406 | 406 | hgevolve.ui_value = '' |
|
407 | 407 | hgevolve.ui_active = False |
|
408 | 408 | self.sa.add(hgevolve) |
|
409 | 409 | |
|
410 | 410 | # enable hggit disabled by default |
|
411 | 411 | hggit = RhodeCodeUi() |
|
412 | 412 | hggit.ui_section = 'extensions' |
|
413 | 413 | hggit.ui_key = 'hggit' |
|
414 | 414 | hggit.ui_value = '' |
|
415 | 415 | hggit.ui_active = False |
|
416 | 416 | self.sa.add(hggit) |
|
417 | 417 | |
|
418 | 418 | # set svn branch defaults |
|
419 | 419 | branches = ["/branches/*", "/trunk"] |
|
420 | 420 | tags = ["/tags/*"] |
|
421 | 421 | |
|
422 | 422 | for branch in branches: |
|
423 | 423 | settings_model.create_ui_section_value( |
|
424 | 424 | RhodeCodeUi.SVN_BRANCH_ID, branch) |
|
425 | 425 | |
|
426 | 426 | for tag in tags: |
|
427 | 427 | settings_model.create_ui_section_value(RhodeCodeUi.SVN_TAG_ID, tag) |
|
428 | 428 | |
|
429 | 429 | def create_auth_plugin_options(self, skip_existing=False): |
|
430 | 430 | """ |
|
431 | 431 | Create default auth plugin settings, and make it active |
|
432 | 432 | |
|
433 | 433 | :param skip_existing: |
|
434 | 434 | """ |
|
435 | 435 | defaults = [ |
|
436 | 436 | ('auth_plugins', |
|
437 | 437 | 'egg:rhodecode-enterprise-ce#token,egg:rhodecode-enterprise-ce#rhodecode', |
|
438 | 438 | 'list'), |
|
439 | 439 | |
|
440 | 440 | ('auth_authtoken_enabled', |
|
441 | 441 | 'True', |
|
442 | 442 | 'bool'), |
|
443 | 443 | |
|
444 | 444 | ('auth_rhodecode_enabled', |
|
445 | 445 | 'True', |
|
446 | 446 | 'bool'), |
|
447 | 447 | ] |
|
448 | 448 | for k, v, t in defaults: |
|
449 | 449 | if (skip_existing and |
|
450 | 450 | SettingsModel().get_setting_by_name(k) is not None): |
|
451 | 451 | log.debug('Skipping option %s', k) |
|
452 | 452 | continue |
|
453 | 453 | setting = RhodeCodeSetting(k, v, t) |
|
454 | 454 | self.sa.add(setting) |
|
455 | 455 | |
|
456 | 456 | def create_default_options(self, skip_existing=False): |
|
457 | 457 | """Creates default settings""" |
|
458 | 458 | |
|
459 | 459 | for k, v, t in [ |
|
460 | 460 | ('default_repo_enable_locking', False, 'bool'), |
|
461 | 461 | ('default_repo_enable_downloads', False, 'bool'), |
|
462 | 462 | ('default_repo_enable_statistics', False, 'bool'), |
|
463 | 463 | ('default_repo_private', False, 'bool'), |
|
464 | 464 | ('default_repo_type', 'hg', 'unicode')]: |
|
465 | 465 | |
|
466 | 466 | if (skip_existing and |
|
467 | 467 | SettingsModel().get_setting_by_name(k) is not None): |
|
468 | 468 | log.debug('Skipping option %s', k) |
|
469 | 469 | continue |
|
470 | 470 | setting = RhodeCodeSetting(k, v, t) |
|
471 | 471 | self.sa.add(setting) |
|
472 | 472 | |
|
473 | 473 | def fixup_groups(self): |
|
474 | 474 | def_usr = User.get_default_user() |
|
475 | 475 | for g in RepoGroup.query().all(): |
|
476 | 476 | g.group_name = g.get_new_name(g.name) |
|
477 | 477 | self.sa.add(g) |
|
478 | 478 | # get default perm |
|
479 | 479 | default = UserRepoGroupToPerm.query()\ |
|
480 | 480 | .filter(UserRepoGroupToPerm.group == g)\ |
|
481 | 481 | .filter(UserRepoGroupToPerm.user == def_usr)\ |
|
482 | 482 | .scalar() |
|
483 | 483 | |
|
484 | 484 | if default is None: |
|
485 | 485 | log.debug('missing default permission for group %s adding', g) |
|
486 | 486 | perm_obj = RepoGroupModel()._create_default_perms(g) |
|
487 | 487 | self.sa.add(perm_obj) |
|
488 | 488 | |
|
489 | 489 | def reset_permissions(self, username): |
|
490 | 490 | """ |
|
491 | 491 | Resets permissions to default state, useful when old systems had |
|
492 | 492 | bad permissions, we must clean them up |
|
493 | 493 | |
|
494 | 494 | :param username: |
|
495 | 495 | """ |
|
496 | 496 | default_user = User.get_by_username(username) |
|
497 | 497 | if not default_user: |
|
498 | 498 | return |
|
499 | 499 | |
|
500 | 500 | u2p = UserToPerm.query()\ |
|
501 | 501 | .filter(UserToPerm.user == default_user).all() |
|
502 | 502 | fixed = False |
|
503 | 503 | if len(u2p) != len(Permission.DEFAULT_USER_PERMISSIONS): |
|
504 | 504 | for p in u2p: |
|
505 | 505 | Session().delete(p) |
|
506 | 506 | fixed = True |
|
507 | 507 | self.populate_default_permissions() |
|
508 | 508 | return fixed |
|
509 | 509 | |
|
510 | 510 | def config_prompt(self, test_repo_path='', retries=3): |
|
511 | 511 | defaults = self.cli_args |
|
512 | 512 | _path = defaults.get('repos_location') |
|
513 | 513 | if retries == 3: |
|
514 | 514 | log.info('Setting up repositories config') |
|
515 | 515 | |
|
516 | 516 | if _path is not None: |
|
517 | 517 | path = _path |
|
518 | 518 | elif not self.tests and not test_repo_path: |
|
519 | 519 | path = input( |
|
520 | 520 | 'Enter a valid absolute path to store repositories. ' |
|
521 | 521 | 'All repositories in that path will be added automatically:' |
|
522 | 522 | ) |
|
523 | 523 | else: |
|
524 | 524 | path = test_repo_path |
|
525 | 525 | path_ok = True |
|
526 | 526 | |
|
527 | 527 | # check proper dir |
|
528 | 528 | if not os.path.isdir(path): |
|
529 | 529 | path_ok = False |
|
530 | 530 | log.error('Given path %s is not a valid directory', path) |
|
531 | 531 | |
|
532 | 532 | elif not os.path.isabs(path): |
|
533 | 533 | path_ok = False |
|
534 | 534 | log.error('Given path %s is not an absolute path', path) |
|
535 | 535 | |
|
536 | 536 | # check if path is at least readable. |
|
537 | 537 | if not os.access(path, os.R_OK): |
|
538 | 538 | path_ok = False |
|
539 | 539 | log.error('Given path %s is not readable', path) |
|
540 | 540 | |
|
541 | 541 | # check write access, warn user about non writeable paths |
|
542 | 542 | elif not os.access(path, os.W_OK) and path_ok: |
|
543 | 543 | log.warning('No write permission to given path %s', path) |
|
544 | 544 | |
|
545 | 545 | q = (f'Given path {path} is not writeable, do you want to ' |
|
546 | 546 | f'continue with read only mode ? [y/n]') |
|
547 | 547 | if not self.ask_ok(q): |
|
548 | 548 | log.error('Canceled by user') |
|
549 | 549 | sys.exit(-1) |
|
550 | 550 | |
|
551 | 551 | if retries == 0: |
|
552 | 552 | sys.exit('max retries reached') |
|
553 | 553 | if not path_ok: |
|
554 | 554 | retries -= 1 |
|
555 | 555 | return self.config_prompt(test_repo_path, retries) |
|
556 | 556 | |
|
557 | 557 | real_path = os.path.normpath(os.path.realpath(path)) |
|
558 | 558 | |
|
559 | 559 | if real_path != os.path.normpath(path): |
|
560 | 560 | q = (f'Path looks like a symlink, RhodeCode Enterprise will store ' |
|
561 | 561 | f'given path as {real_path} ? [y/n]') |
|
562 | 562 | if not self.ask_ok(q): |
|
563 | 563 | log.error('Canceled by user') |
|
564 | 564 | sys.exit(-1) |
|
565 | 565 | |
|
566 | 566 | return real_path |
|
567 | 567 | |
|
568 | 568 | def create_settings(self, path): |
|
569 | 569 | |
|
570 | 570 | self.create_ui_settings(path) |
|
571 | 571 | |
|
572 | 572 | ui_config = [ |
|
573 | ('web', 'push_ssl', 'False'), | |
|
574 | 573 | ('web', 'allow_archive', 'gz zip bz2'), |
|
575 | 574 | ('web', 'allow_push', '*'), |
|
576 | 575 | ('web', 'baseurl', '/'), |
|
577 | 576 | ('paths', '/', path), |
|
578 | 577 | ('phases', 'publish', 'True') |
|
579 | 578 | ] |
|
580 | 579 | for section, key, value in ui_config: |
|
581 | 580 | ui_conf = RhodeCodeUi() |
|
582 | 581 | setattr(ui_conf, 'ui_section', section) |
|
583 | 582 | setattr(ui_conf, 'ui_key', key) |
|
584 | 583 | setattr(ui_conf, 'ui_value', value) |
|
585 | 584 | self.sa.add(ui_conf) |
|
586 | 585 | |
|
587 | 586 | # rhodecode app settings |
|
588 | 587 | settings = [ |
|
589 | 588 | ('realm', 'RhodeCode', 'unicode'), |
|
590 | 589 | ('title', '', 'unicode'), |
|
591 | 590 | ('pre_code', '', 'unicode'), |
|
592 | 591 | ('post_code', '', 'unicode'), |
|
593 | 592 | |
|
594 | 593 | # Visual |
|
595 | 594 | ('show_public_icon', True, 'bool'), |
|
596 | 595 | ('show_private_icon', True, 'bool'), |
|
597 | 596 | ('stylify_metatags', True, 'bool'), |
|
598 | 597 | ('dashboard_items', 100, 'int'), |
|
599 | 598 | ('admin_grid_items', 25, 'int'), |
|
600 | 599 | |
|
601 | 600 | ('markup_renderer', 'markdown', 'unicode'), |
|
602 | 601 | |
|
603 | 602 | ('repository_fields', True, 'bool'), |
|
604 | 603 | ('show_version', True, 'bool'), |
|
605 | 604 | ('show_revision_number', True, 'bool'), |
|
606 | 605 | ('show_sha_length', 12, 'int'), |
|
607 | 606 | |
|
608 | 607 | ('use_gravatar', False, 'bool'), |
|
609 | 608 | ('gravatar_url', User.DEFAULT_GRAVATAR_URL, 'unicode'), |
|
610 | 609 | |
|
611 | 610 | ('clone_uri_tmpl', Repository.DEFAULT_CLONE_URI, 'unicode'), |
|
612 | 611 | ('clone_uri_id_tmpl', Repository.DEFAULT_CLONE_URI_ID, 'unicode'), |
|
613 | 612 | ('clone_uri_ssh_tmpl', Repository.DEFAULT_CLONE_URI_SSH, 'unicode'), |
|
614 | 613 | ('support_url', '', 'unicode'), |
|
615 | 614 | ('update_url', RhodeCodeSetting.DEFAULT_UPDATE_URL, 'unicode'), |
|
616 | 615 | |
|
617 | 616 | # VCS Settings |
|
618 | 617 | ('pr_merge_enabled', True, 'bool'), |
|
619 | 618 | ('use_outdated_comments', True, 'bool'), |
|
620 | 619 | ('diff_cache', True, 'bool'), |
|
621 | 620 | ] |
|
622 | 621 | |
|
623 | 622 | for key, val, type_ in settings: |
|
624 | 623 | sett = RhodeCodeSetting(key, val, type_) |
|
625 | 624 | self.sa.add(sett) |
|
626 | 625 | |
|
627 | 626 | self.create_auth_plugin_options() |
|
628 | 627 | self.create_default_options() |
|
629 | 628 | |
|
630 | 629 | log.info('created ui config') |
|
631 | 630 | |
|
632 | 631 | def create_user(self, username, password, email='', admin=False, |
|
633 | 632 | strict_creation_check=True, api_key=None): |
|
634 | 633 | log.info('creating user `%s`', username) |
|
635 | 634 | user = UserModel().create_or_update( |
|
636 | 635 | username, password, email, firstname='RhodeCode', lastname='Admin', |
|
637 | 636 | active=True, admin=admin, extern_type="rhodecode", |
|
638 | 637 | strict_creation_check=strict_creation_check) |
|
639 | 638 | |
|
640 | 639 | if api_key: |
|
641 | 640 | log.info('setting a new default auth token for user `%s`', username) |
|
642 | 641 | UserModel().add_auth_token( |
|
643 | 642 | user=user, lifetime_minutes=-1, |
|
644 | 643 | role=UserModel.auth_token_role.ROLE_ALL, |
|
645 | 644 | description='BUILTIN TOKEN') |
|
646 | 645 | |
|
647 | 646 | def create_default_user(self): |
|
648 | 647 | log.info('creating default user') |
|
649 | 648 | # create default user for handling default permissions. |
|
650 | 649 | user = UserModel().create_or_update(username=User.DEFAULT_USER, |
|
651 | 650 | password=str(uuid.uuid1())[:20], |
|
652 | 651 | email=User.DEFAULT_USER_EMAIL, |
|
653 | 652 | firstname='Anonymous', |
|
654 | 653 | lastname='User', |
|
655 | 654 | strict_creation_check=False) |
|
656 | 655 | # based on configuration options activate/de-activate this user which |
|
657 | 656 | # controls anonymous access |
|
658 | 657 | if self.cli_args.get('public_access') is False: |
|
659 | 658 | log.info('Public access disabled') |
|
660 | 659 | user.active = False |
|
661 | 660 | Session().add(user) |
|
662 | 661 | Session().commit() |
|
663 | 662 | |
|
664 | 663 | def create_permissions(self): |
|
665 | 664 | """ |
|
666 | 665 | Creates all permissions defined in the system |
|
667 | 666 | """ |
|
668 | 667 | # module.(access|create|change|delete)_[name] |
|
669 | 668 | # module.(none|read|write|admin) |
|
670 | 669 | log.info('creating permissions') |
|
671 | 670 | PermissionModel(self.sa).create_permissions() |
|
672 | 671 | |
|
673 | 672 | def populate_default_permissions(self): |
|
674 | 673 | """ |
|
675 | 674 | Populate default permissions. It will create only the default |
|
676 | 675 | permissions that are missing, and not alter already defined ones |
|
677 | 676 | """ |
|
678 | 677 | log.info('creating default user permissions') |
|
679 | 678 | PermissionModel(self.sa).create_default_user_permissions(user=User.DEFAULT_USER) |
@@ -1,683 +1,662 b'' | |||
|
1 | 1 | |
|
2 | 2 | |
|
3 | 3 | # Copyright (C) 2014-2023 RhodeCode GmbH |
|
4 | 4 | # |
|
5 | 5 | # This program is free software: you can redistribute it and/or modify |
|
6 | 6 | # it under the terms of the GNU Affero General Public License, version 3 |
|
7 | 7 | # (only), as published by the Free Software Foundation. |
|
8 | 8 | # |
|
9 | 9 | # This program is distributed in the hope that it will be useful, |
|
10 | 10 | # but WITHOUT ANY WARRANTY; without even the implied warranty of |
|
11 | 11 | # MERCHANTABILITY or FITNESS FOR A PARTICULAR PURPOSE. See the |
|
12 | 12 | # GNU General Public License for more details. |
|
13 | 13 | # |
|
14 | 14 | # You should have received a copy of the GNU Affero General Public License |
|
15 | 15 | # along with this program. If not, see <http://www.gnu.org/licenses/>. |
|
16 | 16 | # |
|
17 | 17 | # This program is dual-licensed. If you wish to learn more about the |
|
18 | 18 | # RhodeCode Enterprise Edition, including its added features, Support services, |
|
19 | 19 | # and proprietary license terms, please see https://rhodecode.com/licenses/ |
|
20 | 20 | |
|
21 | 21 | """ |
|
22 | 22 | SimpleVCS middleware for handling protocol request (push/clone etc.) |
|
23 | 23 | It's implemented with basic auth function |
|
24 | 24 | """ |
|
25 | 25 | |
|
26 | 26 | import os |
|
27 | 27 | import re |
|
28 | 28 | import logging |
|
29 | 29 | import importlib |
|
30 | 30 | from functools import wraps |
|
31 | 31 | |
|
32 | 32 | import time |
|
33 | 33 | from paste.httpheaders import REMOTE_USER, AUTH_TYPE |
|
34 | 34 | |
|
35 | 35 | from pyramid.httpexceptions import ( |
|
36 | 36 | HTTPNotFound, HTTPForbidden, HTTPNotAcceptable, HTTPInternalServerError) |
|
37 | 37 | from zope.cachedescriptors.property import Lazy as LazyProperty |
|
38 | 38 | |
|
39 | 39 | import rhodecode |
|
40 | 40 | from rhodecode.authentication.base import authenticate, VCS_TYPE, loadplugin |
|
41 | 41 | from rhodecode.lib import rc_cache |
|
42 | 42 | from rhodecode.lib.svn_txn_utils import store_txn_id_data |
|
43 | 43 | from rhodecode.lib.auth import AuthUser, HasPermissionAnyMiddleware |
|
44 | 44 | from rhodecode.lib.base import ( |
|
45 | 45 | BasicAuth, get_ip_addr, get_user_agent, vcs_operation_context) |
|
46 | 46 | from rhodecode.lib.exceptions import (UserCreationError, NotAllowedToCreateUserError) |
|
47 | 47 | from rhodecode.lib.hook_daemon.base import prepare_callback_daemon |
|
48 | 48 | from rhodecode.lib.middleware import appenlight |
|
49 | 49 | from rhodecode.lib.middleware.utils import scm_app_http |
|
50 | 50 | from rhodecode.lib.str_utils import safe_bytes, safe_int |
|
51 | 51 | from rhodecode.lib.utils import is_valid_repo, SLUG_RE |
|
52 | 52 | from rhodecode.lib.utils2 import safe_str, fix_PATH, str2bool |
|
53 | 53 | from rhodecode.lib.vcs.conf import settings as vcs_settings |
|
54 | 54 | from rhodecode.lib.vcs.backends import base |
|
55 | 55 | |
|
56 | 56 | from rhodecode.model import meta |
|
57 | 57 | from rhodecode.model.db import User, Repository, PullRequest |
|
58 | 58 | from rhodecode.model.scm import ScmModel |
|
59 | 59 | from rhodecode.model.pull_request import PullRequestModel |
|
60 | 60 | from rhodecode.model.settings import SettingsModel, VcsSettingsModel |
|
61 | 61 | |
|
62 | 62 | log = logging.getLogger(__name__) |
|
63 | 63 | |
|
64 | 64 | |
|
65 | 65 | def initialize_generator(factory): |
|
66 | 66 | """ |
|
67 | 67 | Initializes the returned generator by draining its first element. |
|
68 | 68 | |
|
69 | 69 | This can be used to give a generator an initializer, which is the code |
|
70 | 70 | up to the first yield statement. This decorator enforces that the first |
|
71 | 71 | produced element has the value ``"__init__"`` to make its special |
|
72 | 72 | purpose very explicit in the using code. |
|
73 | 73 | """ |
|
74 | 74 | |
|
75 | 75 | @wraps(factory) |
|
76 | 76 | def wrapper(*args, **kwargs): |
|
77 | 77 | gen = factory(*args, **kwargs) |
|
78 | 78 | try: |
|
79 | 79 | init = next(gen) |
|
80 | 80 | except StopIteration: |
|
81 | 81 | raise ValueError('Generator must yield at least one element.') |
|
82 | 82 | if init != "__init__": |
|
83 | 83 | raise ValueError('First yielded element must be "__init__".') |
|
84 | 84 | return gen |
|
85 | 85 | return wrapper |
|
86 | 86 | |
|
87 | 87 | |
|
88 | 88 | class SimpleVCS(object): |
|
89 | 89 | """Common functionality for SCM HTTP handlers.""" |
|
90 | 90 | |
|
91 | 91 | SCM = 'unknown' |
|
92 | 92 | |
|
93 | 93 | acl_repo_name = None |
|
94 | 94 | url_repo_name = None |
|
95 | 95 | vcs_repo_name = None |
|
96 | 96 | rc_extras = {} |
|
97 | 97 | |
|
98 | 98 | # We have to handle requests to shadow repositories different than requests |
|
99 | 99 | # to normal repositories. Therefore we have to distinguish them. To do this |
|
100 | 100 | # we use this regex which will match only on URLs pointing to shadow |
|
101 | 101 | # repositories. |
|
102 | 102 | shadow_repo_re = re.compile( |
|
103 | 103 | '(?P<groups>(?:{slug_pat}/)*)' # repo groups |
|
104 | 104 | '(?P<target>{slug_pat})/' # target repo |
|
105 | 105 | 'pull-request/(?P<pr_id>\\d+)/' # pull request |
|
106 | 106 | 'repository$' # shadow repo |
|
107 | 107 | .format(slug_pat=SLUG_RE.pattern)) |
|
108 | 108 | |
|
109 | 109 | def __init__(self, config, registry): |
|
110 | 110 | self.registry = registry |
|
111 | 111 | self.config = config |
|
112 | 112 | # re-populated by specialized middleware |
|
113 | 113 | self.repo_vcs_config = base.Config() |
|
114 | 114 | |
|
115 | 115 | rc_settings = SettingsModel().get_all_settings(cache=True, from_request=False) |
|
116 | 116 | realm = rc_settings.get('rhodecode_realm') or 'RhodeCode AUTH' |
|
117 | 117 | |
|
118 | 118 | # authenticate this VCS request using authfunc |
|
119 | 119 | auth_ret_code_detection = \ |
|
120 | 120 | str2bool(self.config.get('auth_ret_code_detection', False)) |
|
121 | 121 | self.authenticate = BasicAuth( |
|
122 | 122 | '', authenticate, registry, config.get('auth_ret_code'), |
|
123 | 123 | auth_ret_code_detection, rc_realm=realm) |
|
124 | 124 | self.ip_addr = '0.0.0.0' |
|
125 | 125 | |
|
126 | 126 | @LazyProperty |
|
127 | 127 | def global_vcs_config(self): |
|
128 | 128 | try: |
|
129 | 129 | return VcsSettingsModel().get_ui_settings_as_config_obj() |
|
130 | 130 | except Exception: |
|
131 | 131 | return base.Config() |
|
132 | 132 | |
|
133 | 133 | @property |
|
134 | 134 | def base_path(self): |
|
135 | 135 | settings_path = self.config.get('repo_store.path') |
|
136 | 136 | |
|
137 | 137 | if not settings_path: |
|
138 | 138 | raise ValueError('FATAL: repo_store.path is empty') |
|
139 | 139 | return settings_path |
|
140 | 140 | |
|
141 | 141 | def set_repo_names(self, environ): |
|
142 | 142 | """ |
|
143 | 143 | This will populate the attributes acl_repo_name, url_repo_name, |
|
144 | 144 | vcs_repo_name and is_shadow_repo. In case of requests to normal (non |
|
145 | 145 | shadow) repositories all names are equal. In case of requests to a |
|
146 | 146 | shadow repository the acl-name points to the target repo of the pull |
|
147 | 147 | request and the vcs-name points to the shadow repo file system path. |
|
148 | 148 | The url-name is always the URL used by the vcs client program. |
|
149 | 149 | |
|
150 | 150 | Example in case of a shadow repo: |
|
151 | 151 | acl_repo_name = RepoGroup/MyRepo |
|
152 | 152 | url_repo_name = RepoGroup/MyRepo/pull-request/3/repository |
|
153 | 153 | vcs_repo_name = /repo/base/path/RepoGroup/.__shadow_MyRepo_pr-3' |
|
154 | 154 | """ |
|
155 | 155 | # First we set the repo name from URL for all attributes. This is the |
|
156 | 156 | # default if handling normal (non shadow) repo requests. |
|
157 | 157 | self.url_repo_name = self._get_repository_name(environ) |
|
158 | 158 | self.acl_repo_name = self.vcs_repo_name = self.url_repo_name |
|
159 | 159 | self.is_shadow_repo = False |
|
160 | 160 | |
|
161 | 161 | # Check if this is a request to a shadow repository. |
|
162 | 162 | match = self.shadow_repo_re.match(self.url_repo_name) |
|
163 | 163 | if match: |
|
164 | 164 | match_dict = match.groupdict() |
|
165 | 165 | |
|
166 | 166 | # Build acl repo name from regex match. |
|
167 | 167 | acl_repo_name = safe_str('{groups}{target}'.format( |
|
168 | 168 | groups=match_dict['groups'] or '', |
|
169 | 169 | target=match_dict['target'])) |
|
170 | 170 | |
|
171 | 171 | # Retrieve pull request instance by ID from regex match. |
|
172 | 172 | pull_request = PullRequest.get(match_dict['pr_id']) |
|
173 | 173 | |
|
174 | 174 | # Only proceed if we got a pull request and if acl repo name from |
|
175 | 175 | # URL equals the target repo name of the pull request. |
|
176 | 176 | if pull_request and (acl_repo_name == pull_request.target_repo.repo_name): |
|
177 | 177 | |
|
178 | 178 | # Get file system path to shadow repository. |
|
179 | 179 | workspace_id = PullRequestModel()._workspace_id(pull_request) |
|
180 | 180 | vcs_repo_name = pull_request.target_repo.get_shadow_repository_path(workspace_id) |
|
181 | 181 | |
|
182 | 182 | # Store names for later usage. |
|
183 | 183 | self.vcs_repo_name = vcs_repo_name |
|
184 | 184 | self.acl_repo_name = acl_repo_name |
|
185 | 185 | self.is_shadow_repo = True |
|
186 | 186 | |
|
187 | 187 | log.debug('Setting all VCS repository names: %s', { |
|
188 | 188 | 'acl_repo_name': self.acl_repo_name, |
|
189 | 189 | 'url_repo_name': self.url_repo_name, |
|
190 | 190 | 'vcs_repo_name': self.vcs_repo_name, |
|
191 | 191 | }) |
|
192 | 192 | |
|
193 | 193 | @property |
|
194 | 194 | def scm_app(self): |
|
195 | 195 | custom_implementation = self.config['vcs.scm_app_implementation'] |
|
196 | 196 | if custom_implementation == 'http': |
|
197 | 197 | log.debug('Using HTTP implementation of scm app.') |
|
198 | 198 | scm_app_impl = scm_app_http |
|
199 | 199 | else: |
|
200 | 200 | log.debug('Using custom implementation of scm_app: "{}"'.format( |
|
201 | 201 | custom_implementation)) |
|
202 | 202 | scm_app_impl = importlib.import_module(custom_implementation) |
|
203 | 203 | return scm_app_impl |
|
204 | 204 | |
|
205 | 205 | def _get_by_id(self, repo_name): |
|
206 | 206 | """ |
|
207 | 207 | Gets a special pattern _<ID> from clone url and tries to replace it |
|
208 | 208 | with a repository_name for support of _<ID> non changeable urls |
|
209 | 209 | """ |
|
210 | 210 | |
|
211 | 211 | data = repo_name.split('/') |
|
212 | 212 | if len(data) >= 2: |
|
213 | 213 | from rhodecode.model.repo import RepoModel |
|
214 | 214 | by_id_match = RepoModel().get_repo_by_id(repo_name) |
|
215 | 215 | if by_id_match: |
|
216 | 216 | data[1] = by_id_match.repo_name |
|
217 | 217 | |
|
218 | 218 | # Because PEP-3333-WSGI uses bytes-tunneled-in-latin-1 as PATH_INFO |
|
219 | 219 | # and we use this data |
|
220 | 220 | maybe_new_path = '/'.join(data) |
|
221 | 221 | return safe_bytes(maybe_new_path).decode('latin1') |
|
222 | 222 | |
|
223 | 223 | def _invalidate_cache(self, repo_name): |
|
224 | 224 | """ |
|
225 | 225 | Set's cache for this repository for invalidation on next access |
|
226 | 226 | |
|
227 | 227 | :param repo_name: full repo name, also a cache key |
|
228 | 228 | """ |
|
229 | 229 | ScmModel().mark_for_invalidation(repo_name) |
|
230 | 230 | |
|
231 | 231 | def is_valid_and_existing_repo(self, repo_name, base_path, scm_type): |
|
232 | 232 | db_repo = Repository.get_by_repo_name(repo_name) |
|
233 | 233 | if not db_repo: |
|
234 | 234 | log.debug('Repository `%s` not found inside the database.', |
|
235 | 235 | repo_name) |
|
236 | 236 | return False |
|
237 | 237 | |
|
238 | 238 | if db_repo.repo_type != scm_type: |
|
239 | 239 | log.warning( |
|
240 | 240 | 'Repository `%s` have incorrect scm_type, expected %s got %s', |
|
241 | 241 | repo_name, db_repo.repo_type, scm_type) |
|
242 | 242 | return False |
|
243 | 243 | |
|
244 | 244 | config = db_repo._config |
|
245 | 245 | config.set('extensions', 'largefiles', '') |
|
246 | 246 | return is_valid_repo( |
|
247 | 247 | repo_name, base_path, |
|
248 | 248 | explicit_scm=scm_type, expect_scm=scm_type, config=config) |
|
249 | 249 | |
|
250 | 250 | def valid_and_active_user(self, user): |
|
251 | 251 | """ |
|
252 | 252 | Checks if that user is not empty, and if it's actually object it checks |
|
253 | 253 | if he's active. |
|
254 | 254 | |
|
255 | 255 | :param user: user object or None |
|
256 | 256 | :return: boolean |
|
257 | 257 | """ |
|
258 | 258 | if user is None: |
|
259 | 259 | return False |
|
260 | 260 | |
|
261 | 261 | elif user.active: |
|
262 | 262 | return True |
|
263 | 263 | |
|
264 | 264 | return False |
|
265 | 265 | |
|
266 | 266 | @property |
|
267 | 267 | def is_shadow_repo_dir(self): |
|
268 | 268 | return os.path.isdir(self.vcs_repo_name) |
|
269 | 269 | |
|
270 | 270 | def _check_permission(self, action, user, auth_user, repo_name, ip_addr=None, |
|
271 | 271 | plugin_id='', plugin_cache_active=False, cache_ttl=0): |
|
272 | 272 | """ |
|
273 | 273 | Checks permissions using action (push/pull) user and repository |
|
274 | 274 | name. If plugin_cache and ttl is set it will use the plugin which |
|
275 | 275 | authenticated the user to store the cached permissions result for N |
|
276 | 276 | amount of seconds as in cache_ttl |
|
277 | 277 | |
|
278 | 278 | :param action: push or pull action |
|
279 | 279 | :param user: user instance |
|
280 | 280 | :param repo_name: repository name |
|
281 | 281 | """ |
|
282 | 282 | |
|
283 | 283 | log.debug('AUTH_CACHE_TTL for permissions `%s` active: %s (TTL: %s)', |
|
284 | 284 | plugin_id, plugin_cache_active, cache_ttl) |
|
285 | 285 | |
|
286 | 286 | user_id = user.user_id |
|
287 | 287 | cache_namespace_uid = f'cache_user_auth.{rc_cache.PERMISSIONS_CACHE_VER}.{user_id}' |
|
288 | 288 | region = rc_cache.get_or_create_region('cache_perms', cache_namespace_uid) |
|
289 | 289 | |
|
290 | 290 | @region.conditional_cache_on_arguments(namespace=cache_namespace_uid, |
|
291 | 291 | expiration_time=cache_ttl, |
|
292 | 292 | condition=plugin_cache_active) |
|
293 | 293 | def compute_perm_vcs( |
|
294 | 294 | cache_name, plugin_id, action, user_id, repo_name, ip_addr): |
|
295 | 295 | |
|
296 | 296 | log.debug('auth: calculating permission access now...') |
|
297 | 297 | # check IP |
|
298 | 298 | inherit = user.inherit_default_permissions |
|
299 | 299 | ip_allowed = AuthUser.check_ip_allowed( |
|
300 | 300 | user_id, ip_addr, inherit_from_default=inherit) |
|
301 | 301 | if ip_allowed: |
|
302 | 302 | log.info('Access for IP:%s allowed', ip_addr) |
|
303 | 303 | else: |
|
304 | 304 | return False |
|
305 | 305 | |
|
306 | 306 | if action == 'push': |
|
307 | 307 | perms = ('repository.write', 'repository.admin') |
|
308 | 308 | if not HasPermissionAnyMiddleware(*perms)(auth_user, repo_name): |
|
309 | 309 | return False |
|
310 | 310 | |
|
311 | 311 | else: |
|
312 | 312 | # any other action need at least read permission |
|
313 | 313 | perms = ( |
|
314 | 314 | 'repository.read', 'repository.write', 'repository.admin') |
|
315 | 315 | if not HasPermissionAnyMiddleware(*perms)(auth_user, repo_name): |
|
316 | 316 | return False |
|
317 | 317 | |
|
318 | 318 | return True |
|
319 | 319 | |
|
320 | 320 | start = time.time() |
|
321 | 321 | log.debug('Running plugin `%s` permissions check', plugin_id) |
|
322 | 322 | |
|
323 | 323 | # for environ based auth, password can be empty, but then the validation is |
|
324 | 324 | # on the server that fills in the env data needed for authentication |
|
325 | 325 | perm_result = compute_perm_vcs( |
|
326 | 326 | 'vcs_permissions', plugin_id, action, user.user_id, repo_name, ip_addr) |
|
327 | 327 | |
|
328 | 328 | auth_time = time.time() - start |
|
329 | 329 | log.debug('Permissions for plugin `%s` completed in %.4fs, ' |
|
330 | 330 | 'expiration time of fetched cache %.1fs.', |
|
331 | 331 | plugin_id, auth_time, cache_ttl) |
|
332 | 332 | |
|
333 | 333 | return perm_result |
|
334 | 334 | |
|
335 | 335 | def _get_http_scheme(self, environ): |
|
336 | 336 | try: |
|
337 | 337 | return environ['wsgi.url_scheme'] |
|
338 | 338 | except Exception: |
|
339 | 339 | log.exception('Failed to read http scheme') |
|
340 | 340 | return 'http' |
|
341 | 341 | |
|
342 | def _check_ssl(self, environ, start_response): | |
|
343 | """ | |
|
344 | Checks the SSL check flag and returns False if SSL is not present | |
|
345 | and required True otherwise | |
|
346 | """ | |
|
347 | org_proto = environ['wsgi._org_proto'] | |
|
348 | # check if we have SSL required ! if not it's a bad request ! | |
|
349 | require_ssl = str2bool(self.repo_vcs_config.get('web', 'push_ssl')) | |
|
350 | if require_ssl and org_proto == 'http': | |
|
351 | log.debug( | |
|
352 | 'Bad request: detected protocol is `%s` and ' | |
|
353 | 'SSL/HTTPS is required.', org_proto) | |
|
354 | return False | |
|
355 | return True | |
|
356 | ||
|
357 | 342 | def _get_default_cache_ttl(self): |
|
358 | 343 | # take AUTH_CACHE_TTL from the `rhodecode` auth plugin |
|
359 | 344 | plugin = loadplugin('egg:rhodecode-enterprise-ce#rhodecode') |
|
360 | 345 | plugin_settings = plugin.get_settings() |
|
361 | 346 | plugin_cache_active, cache_ttl = plugin.get_ttl_cache( |
|
362 | 347 | plugin_settings) or (False, 0) |
|
363 | 348 | return plugin_cache_active, cache_ttl |
|
364 | 349 | |
|
365 | 350 | def __call__(self, environ, start_response): |
|
366 | 351 | try: |
|
367 | 352 | return self._handle_request(environ, start_response) |
|
368 | 353 | except Exception: |
|
369 | 354 | log.exception("Exception while handling request") |
|
370 | 355 | appenlight.track_exception(environ) |
|
371 | 356 | return HTTPInternalServerError()(environ, start_response) |
|
372 | 357 | finally: |
|
373 | 358 | meta.Session.remove() |
|
374 | 359 | |
|
375 | 360 | def _handle_request(self, environ, start_response): |
|
376 | if not self._check_ssl(environ, start_response): | |
|
377 | reason = ('SSL required, while RhodeCode was unable ' | |
|
378 | 'to detect this as SSL request') | |
|
379 | log.debug('User not allowed to proceed, %s', reason) | |
|
380 | return HTTPNotAcceptable(reason)(environ, start_response) | |
|
381 | ||
|
382 | 361 | if not self.url_repo_name: |
|
383 | 362 | log.warning('Repository name is empty: %s', self.url_repo_name) |
|
384 | 363 | # failed to get repo name, we fail now |
|
385 | 364 | return HTTPNotFound()(environ, start_response) |
|
386 | 365 | log.debug('Extracted repo name is %s', self.url_repo_name) |
|
387 | 366 | |
|
388 | 367 | ip_addr = get_ip_addr(environ) |
|
389 | 368 | user_agent = get_user_agent(environ) |
|
390 | 369 | username = None |
|
391 | 370 | |
|
392 | 371 | # skip passing error to error controller |
|
393 | 372 | environ['pylons.status_code_redirect'] = True |
|
394 | 373 | |
|
395 | 374 | # ====================================================================== |
|
396 | 375 | # GET ACTION PULL or PUSH |
|
397 | 376 | # ====================================================================== |
|
398 | 377 | action = self._get_action(environ) |
|
399 | 378 | |
|
400 | 379 | # ====================================================================== |
|
401 | 380 | # Check if this is a request to a shadow repository of a pull request. |
|
402 | 381 | # In this case only pull action is allowed. |
|
403 | 382 | # ====================================================================== |
|
404 | 383 | if self.is_shadow_repo and action != 'pull': |
|
405 | 384 | reason = 'Only pull action is allowed for shadow repositories.' |
|
406 | 385 | log.debug('User not allowed to proceed, %s', reason) |
|
407 | 386 | return HTTPNotAcceptable(reason)(environ, start_response) |
|
408 | 387 | |
|
409 | 388 | # Check if the shadow repo actually exists, in case someone refers |
|
410 | 389 | # to it, and it has been deleted because of successful merge. |
|
411 | 390 | if self.is_shadow_repo and not self.is_shadow_repo_dir: |
|
412 | 391 | log.debug( |
|
413 | 392 | 'Shadow repo detected, and shadow repo dir `%s` is missing', |
|
414 | 393 | self.is_shadow_repo_dir) |
|
415 | 394 | return HTTPNotFound()(environ, start_response) |
|
416 | 395 | |
|
417 | 396 | # ====================================================================== |
|
418 | 397 | # CHECK ANONYMOUS PERMISSION |
|
419 | 398 | # ====================================================================== |
|
420 | 399 | detect_force_push = False |
|
421 | 400 | check_branch_perms = False |
|
422 | 401 | if action in ['pull', 'push']: |
|
423 | 402 | user_obj = anonymous_user = User.get_default_user() |
|
424 | 403 | auth_user = user_obj.AuthUser() |
|
425 | 404 | username = anonymous_user.username |
|
426 | 405 | if anonymous_user.active: |
|
427 | 406 | plugin_cache_active, cache_ttl = self._get_default_cache_ttl() |
|
428 | 407 | # ONLY check permissions if the user is activated |
|
429 | 408 | anonymous_perm = self._check_permission( |
|
430 | 409 | action, anonymous_user, auth_user, self.acl_repo_name, ip_addr, |
|
431 | 410 | plugin_id='anonymous_access', |
|
432 | 411 | plugin_cache_active=plugin_cache_active, |
|
433 | 412 | cache_ttl=cache_ttl, |
|
434 | 413 | ) |
|
435 | 414 | else: |
|
436 | 415 | anonymous_perm = False |
|
437 | 416 | |
|
438 | 417 | if not anonymous_user.active or not anonymous_perm: |
|
439 | 418 | if not anonymous_user.active: |
|
440 | 419 | log.debug('Anonymous access is disabled, running ' |
|
441 | 420 | 'authentication') |
|
442 | 421 | |
|
443 | 422 | if not anonymous_perm: |
|
444 | 423 | log.debug('Not enough credentials to access repo: `%s` ' |
|
445 | 424 | 'repository as anonymous user', self.acl_repo_name) |
|
446 | 425 | |
|
447 | 426 | username = None |
|
448 | 427 | # ============================================================== |
|
449 | 428 | # DEFAULT PERM FAILED OR ANONYMOUS ACCESS IS DISABLED SO WE |
|
450 | 429 | # NEED TO AUTHENTICATE AND ASK FOR AUTH USER PERMISSIONS |
|
451 | 430 | # ============================================================== |
|
452 | 431 | |
|
453 | 432 | # try to auth based on environ, container auth methods |
|
454 | 433 | log.debug('Running PRE-AUTH for container|headers based authentication') |
|
455 | 434 | |
|
456 | 435 | # headers auth, by just reading special headers and bypass the auth with user/passwd |
|
457 | 436 | pre_auth = authenticate( |
|
458 | 437 | '', '', environ, VCS_TYPE, registry=self.registry, |
|
459 | 438 | acl_repo_name=self.acl_repo_name) |
|
460 | 439 | |
|
461 | 440 | if pre_auth and pre_auth.get('username'): |
|
462 | 441 | username = pre_auth['username'] |
|
463 | 442 | log.debug('PRE-AUTH got `%s` as username', username) |
|
464 | 443 | if pre_auth: |
|
465 | 444 | log.debug('PRE-AUTH successful from %s', |
|
466 | 445 | pre_auth.get('auth_data', {}).get('_plugin')) |
|
467 | 446 | |
|
468 | 447 | # If not authenticated by the container, running basic auth |
|
469 | 448 | # before inject the calling repo_name for special scope checks |
|
470 | 449 | self.authenticate.acl_repo_name = self.acl_repo_name |
|
471 | 450 | |
|
472 | 451 | plugin_cache_active, cache_ttl = False, 0 |
|
473 | 452 | plugin = None |
|
474 | 453 | |
|
475 | 454 | # regular auth chain |
|
476 | 455 | if not username: |
|
477 | 456 | self.authenticate.realm = self.authenticate.get_rc_realm() |
|
478 | 457 | |
|
479 | 458 | try: |
|
480 | 459 | auth_result = self.authenticate(environ) |
|
481 | 460 | except (UserCreationError, NotAllowedToCreateUserError) as e: |
|
482 | 461 | log.error(e) |
|
483 | 462 | reason = safe_str(e) |
|
484 | 463 | return HTTPNotAcceptable(reason)(environ, start_response) |
|
485 | 464 | |
|
486 | 465 | if isinstance(auth_result, dict): |
|
487 | 466 | AUTH_TYPE.update(environ, 'basic') |
|
488 | 467 | REMOTE_USER.update(environ, auth_result['username']) |
|
489 | 468 | username = auth_result['username'] |
|
490 | 469 | plugin = auth_result.get('auth_data', {}).get('_plugin') |
|
491 | 470 | log.info( |
|
492 | 471 | 'MAIN-AUTH successful for user `%s` from %s plugin', |
|
493 | 472 | username, plugin) |
|
494 | 473 | |
|
495 | 474 | plugin_cache_active, cache_ttl = auth_result.get( |
|
496 | 475 | 'auth_data', {}).get('_ttl_cache') or (False, 0) |
|
497 | 476 | else: |
|
498 | 477 | return auth_result.wsgi_application(environ, start_response) |
|
499 | 478 | |
|
500 | 479 | # ============================================================== |
|
501 | 480 | # CHECK PERMISSIONS FOR THIS REQUEST USING GIVEN USERNAME |
|
502 | 481 | # ============================================================== |
|
503 | 482 | user = User.get_by_username(username) |
|
504 | 483 | if not self.valid_and_active_user(user): |
|
505 | 484 | return HTTPForbidden()(environ, start_response) |
|
506 | 485 | username = user.username |
|
507 | 486 | user_id = user.user_id |
|
508 | 487 | |
|
509 | 488 | # check user attributes for password change flag |
|
510 | 489 | user_obj = user |
|
511 | 490 | auth_user = user_obj.AuthUser() |
|
512 | 491 | if user_obj and user_obj.username != User.DEFAULT_USER and \ |
|
513 | 492 | user_obj.user_data.get('force_password_change'): |
|
514 | 493 | reason = 'password change required' |
|
515 | 494 | log.debug('User not allowed to authenticate, %s', reason) |
|
516 | 495 | return HTTPNotAcceptable(reason)(environ, start_response) |
|
517 | 496 | |
|
518 | 497 | # check permissions for this repository |
|
519 | 498 | perm = self._check_permission( |
|
520 | 499 | action, user, auth_user, self.acl_repo_name, ip_addr, |
|
521 | 500 | plugin, plugin_cache_active, cache_ttl) |
|
522 | 501 | if not perm: |
|
523 | 502 | return HTTPForbidden()(environ, start_response) |
|
524 | 503 | environ['rc_auth_user_id'] = str(user_id) |
|
525 | 504 | |
|
526 | 505 | if action == 'push': |
|
527 | 506 | perms = auth_user.get_branch_permissions(self.acl_repo_name) |
|
528 | 507 | if perms: |
|
529 | 508 | check_branch_perms = True |
|
530 | 509 | detect_force_push = True |
|
531 | 510 | |
|
532 | 511 | # extras are injected into UI object and later available |
|
533 | 512 | # in hooks executed by RhodeCode |
|
534 | 513 | check_locking = _should_check_locking(environ.get('QUERY_STRING')) |
|
535 | 514 | |
|
536 | 515 | extras = vcs_operation_context( |
|
537 | 516 | environ, repo_name=self.acl_repo_name, username=username, |
|
538 | 517 | action=action, scm=self.SCM, check_locking=check_locking, |
|
539 | 518 | is_shadow_repo=self.is_shadow_repo, check_branch_perms=check_branch_perms, |
|
540 | 519 | detect_force_push=detect_force_push |
|
541 | 520 | ) |
|
542 | 521 | |
|
543 | 522 | # ====================================================================== |
|
544 | 523 | # REQUEST HANDLING |
|
545 | 524 | # ====================================================================== |
|
546 | 525 | repo_path = os.path.join( |
|
547 | 526 | safe_str(self.base_path), safe_str(self.vcs_repo_name)) |
|
548 | 527 | log.debug('Repository path is %s', repo_path) |
|
549 | 528 | |
|
550 | 529 | fix_PATH() |
|
551 | 530 | |
|
552 | 531 | log.info( |
|
553 | 532 | '%s action on %s repo "%s" by "%s" from %s %s', |
|
554 | 533 | action, self.SCM, safe_str(self.url_repo_name), |
|
555 | 534 | safe_str(username), ip_addr, user_agent) |
|
556 | 535 | |
|
557 | 536 | return self._generate_vcs_response( |
|
558 | 537 | environ, start_response, repo_path, extras, action) |
|
559 | 538 | |
|
560 | 539 | def _get_txn_id(self, environ): |
|
561 | 540 | |
|
562 | 541 | for k in ['RAW_URI', 'HTTP_DESTINATION']: |
|
563 | 542 | url = environ.get(k) |
|
564 | 543 | if not url: |
|
565 | 544 | continue |
|
566 | 545 | |
|
567 | 546 | # regex to search for svn-txn-id |
|
568 | 547 | pattern = r'/!svn/txr/([^/]+)/' |
|
569 | 548 | |
|
570 | 549 | # Search for the pattern in the URL |
|
571 | 550 | match = re.search(pattern, url) |
|
572 | 551 | |
|
573 | 552 | # Check if a match is found and extract the captured group |
|
574 | 553 | if match: |
|
575 | 554 | txn_id = match.group(1) |
|
576 | 555 | return txn_id |
|
577 | 556 | |
|
578 | 557 | @initialize_generator |
|
579 | 558 | def _generate_vcs_response( |
|
580 | 559 | self, environ, start_response, repo_path, extras, action): |
|
581 | 560 | """ |
|
582 | 561 | Returns a generator for the response content. |
|
583 | 562 | |
|
584 | 563 | This method is implemented as a generator, so that it can trigger |
|
585 | 564 | the cache validation after all content sent back to the client. It |
|
586 | 565 | also handles the locking exceptions which will be triggered when |
|
587 | 566 | the first chunk is produced by the underlying WSGI application. |
|
588 | 567 | """ |
|
589 | 568 | svn_txn_id = '' |
|
590 | 569 | if action == 'push': |
|
591 | 570 | svn_txn_id = self._get_txn_id(environ) |
|
592 | 571 | |
|
593 | 572 | callback_daemon, extras = self._prepare_callback_daemon( |
|
594 | 573 | extras, environ, action, txn_id=svn_txn_id) |
|
595 | 574 | |
|
596 | 575 | if svn_txn_id: |
|
597 | 576 | |
|
598 | 577 | port = safe_int(extras['hooks_uri'].split(':')[-1]) |
|
599 | 578 | txn_id_data = extras.copy() |
|
600 | 579 | txn_id_data.update({'port': port}) |
|
601 | 580 | txn_id_data.update({'req_method': environ['REQUEST_METHOD']}) |
|
602 | 581 | |
|
603 | 582 | full_repo_path = repo_path |
|
604 | 583 | store_txn_id_data(full_repo_path, svn_txn_id, txn_id_data) |
|
605 | 584 | |
|
606 | 585 | log.debug('HOOKS extras is %s', extras) |
|
607 | 586 | |
|
608 | 587 | http_scheme = self._get_http_scheme(environ) |
|
609 | 588 | |
|
610 | 589 | config = self._create_config(extras, self.acl_repo_name, scheme=http_scheme) |
|
611 | 590 | app = self._create_wsgi_app(repo_path, self.url_repo_name, config) |
|
612 | 591 | with callback_daemon: |
|
613 | 592 | app.rc_extras = extras |
|
614 | 593 | |
|
615 | 594 | try: |
|
616 | 595 | response = app(environ, start_response) |
|
617 | 596 | finally: |
|
618 | 597 | # This statement works together with the decorator |
|
619 | 598 | # "initialize_generator" above. The decorator ensures that |
|
620 | 599 | # we hit the first yield statement before the generator is |
|
621 | 600 | # returned back to the WSGI server. This is needed to |
|
622 | 601 | # ensure that the call to "app" above triggers the |
|
623 | 602 | # needed callback to "start_response" before the |
|
624 | 603 | # generator is actually used. |
|
625 | 604 | yield "__init__" |
|
626 | 605 | |
|
627 | 606 | # iter content |
|
628 | 607 | for chunk in response: |
|
629 | 608 | yield chunk |
|
630 | 609 | |
|
631 | 610 | try: |
|
632 | 611 | # invalidate cache on push |
|
633 | 612 | if action == 'push': |
|
634 | 613 | self._invalidate_cache(self.url_repo_name) |
|
635 | 614 | finally: |
|
636 | 615 | meta.Session.remove() |
|
637 | 616 | |
|
638 | 617 | def _get_repository_name(self, environ): |
|
639 | 618 | """Get repository name out of the environmnent |
|
640 | 619 | |
|
641 | 620 | :param environ: WSGI environment |
|
642 | 621 | """ |
|
643 | 622 | raise NotImplementedError() |
|
644 | 623 | |
|
645 | 624 | def _get_action(self, environ): |
|
646 | 625 | """Map request commands into a pull or push command. |
|
647 | 626 | |
|
648 | 627 | :param environ: WSGI environment |
|
649 | 628 | """ |
|
650 | 629 | raise NotImplementedError() |
|
651 | 630 | |
|
652 | 631 | def _create_wsgi_app(self, repo_path, repo_name, config): |
|
653 | 632 | """Return the WSGI app that will finally handle the request.""" |
|
654 | 633 | raise NotImplementedError() |
|
655 | 634 | |
|
656 | 635 | def _create_config(self, extras, repo_name, scheme='http'): |
|
657 | 636 | """Create a safe config representation.""" |
|
658 | 637 | raise NotImplementedError() |
|
659 | 638 | |
|
660 | 639 | def _should_use_callback_daemon(self, extras, environ, action): |
|
661 | 640 | if extras.get('is_shadow_repo'): |
|
662 | 641 | # we don't want to execute hooks, and callback daemon for shadow repos |
|
663 | 642 | return False |
|
664 | 643 | return True |
|
665 | 644 | |
|
666 | 645 | def _prepare_callback_daemon(self, extras, environ, action, txn_id=None): |
|
667 | 646 | protocol = vcs_settings.HOOKS_PROTOCOL |
|
668 | 647 | |
|
669 | 648 | if not self._should_use_callback_daemon(extras, environ, action): |
|
670 | 649 | # disable callback daemon for actions that don't require it |
|
671 | 650 | protocol = 'local' |
|
672 | 651 | |
|
673 | 652 | return prepare_callback_daemon( |
|
674 | 653 | extras, protocol=protocol, |
|
675 | 654 | host=vcs_settings.HOOKS_HOST, txn_id=txn_id) |
|
676 | 655 | |
|
677 | 656 | |
|
678 | 657 | def _should_check_locking(query_string): |
|
679 | 658 | # this is kind of hacky, but due to how mercurial handles client-server |
|
680 | 659 | # server see all operation on commit; bookmarks, phases and |
|
681 | 660 | # obsolescence marker in different transaction, we don't want to check |
|
682 | 661 | # locking on those |
|
683 | 662 | return query_string not in ['cmd=listkeys'] |
@@ -1,308 +1,312 b'' | |||
|
1 | 1 | |
|
2 | 2 | # Copyright (C) 2010-2023 RhodeCode GmbH |
|
3 | 3 | # |
|
4 | 4 | # This program is free software: you can redistribute it and/or modify |
|
5 | 5 | # it under the terms of the GNU Affero General Public License, version 3 |
|
6 | 6 | # (only), as published by the Free Software Foundation. |
|
7 | 7 | # |
|
8 | 8 | # This program is distributed in the hope that it will be useful, |
|
9 | 9 | # but WITHOUT ANY WARRANTY; without even the implied warranty of |
|
10 | 10 | # MERCHANTABILITY or FITNESS FOR A PARTICULAR PURPOSE. See the |
|
11 | 11 | # GNU General Public License for more details. |
|
12 | 12 | # |
|
13 | 13 | # You should have received a copy of the GNU Affero General Public License |
|
14 | 14 | # along with this program. If not, see <http://www.gnu.org/licenses/>. |
|
15 | 15 | # |
|
16 | 16 | # This program is dual-licensed. If you wish to learn more about the |
|
17 | 17 | # RhodeCode Enterprise Edition, including its added features, Support services, |
|
18 | 18 | # and proprietary license terms, please see https://rhodecode.com/licenses/ |
|
19 | 19 | |
|
20 | 20 | import gzip |
|
21 | 21 | import shutil |
|
22 | 22 | import logging |
|
23 | 23 | import tempfile |
|
24 | 24 | import urllib.parse |
|
25 | 25 | |
|
26 | 26 | from webob.exc import HTTPNotFound |
|
27 | 27 | |
|
28 | 28 | import rhodecode |
|
29 | 29 | from rhodecode.apps._base import ADMIN_PREFIX |
|
30 | 30 | from rhodecode.lib.middleware.utils import get_path_info |
|
31 | 31 | from rhodecode.lib.middleware.appenlight import wrap_in_appenlight_if_enabled |
|
32 | 32 | from rhodecode.lib.middleware.simplegit import SimpleGit, GIT_PROTO_PAT |
|
33 | 33 | from rhodecode.lib.middleware.simplehg import SimpleHg |
|
34 | 34 | from rhodecode.lib.middleware.simplesvn import SimpleSvn |
|
35 | 35 | from rhodecode.lib.str_utils import safe_str |
|
36 | 36 | from rhodecode.model.settings import VcsSettingsModel |
|
37 | 37 | |
|
38 | 38 | |
|
39 | 39 | log = logging.getLogger(__name__) |
|
40 | 40 | |
|
41 | 41 | VCS_TYPE_KEY = '_rc_vcs_type' |
|
42 | 42 | VCS_TYPE_SKIP = '_rc_vcs_skip' |
|
43 | 43 | |
|
44 | 44 | |
|
45 | 45 | def is_git(environ): |
|
46 | 46 | """ |
|
47 | 47 | Returns True if requests should be handled by GIT wsgi middleware |
|
48 | 48 | """ |
|
49 | 49 | path_info = get_path_info(environ) |
|
50 | 50 | is_git_path = GIT_PROTO_PAT.match(path_info) |
|
51 | 51 | log.debug( |
|
52 | 52 | 'request path: `%s` detected as GIT PROTOCOL %s', path_info, |
|
53 | 53 | is_git_path is not None) |
|
54 | 54 | |
|
55 | 55 | return is_git_path |
|
56 | 56 | |
|
57 | 57 | |
|
58 | 58 | def is_hg(environ): |
|
59 | 59 | """ |
|
60 | 60 | Returns True if requests target is mercurial server - header |
|
61 | 61 | ``HTTP_ACCEPT`` of such request would start with ``application/mercurial``. |
|
62 | 62 | """ |
|
63 | 63 | is_hg_path = False |
|
64 | 64 | |
|
65 | 65 | http_accept = environ.get('HTTP_ACCEPT') |
|
66 | 66 | |
|
67 | 67 | if http_accept and http_accept.startswith('application/mercurial'): |
|
68 | 68 | query = urllib.parse.parse_qs(environ['QUERY_STRING']) |
|
69 | 69 | if 'cmd' in query: |
|
70 | 70 | is_hg_path = True |
|
71 | 71 | |
|
72 | 72 | path_info = get_path_info(environ) |
|
73 | 73 | log.debug( |
|
74 | 74 | 'request path: `%s` detected as HG PROTOCOL %s', path_info, |
|
75 | 75 | is_hg_path) |
|
76 | 76 | |
|
77 | 77 | return is_hg_path |
|
78 | 78 | |
|
79 | 79 | |
|
80 | 80 | def is_svn(environ): |
|
81 | 81 | """ |
|
82 | 82 | Returns True if requests target is Subversion server |
|
83 | 83 | """ |
|
84 | 84 | |
|
85 | 85 | http_dav = environ.get('HTTP_DAV', '') |
|
86 | 86 | magic_path_segment = rhodecode.CONFIG.get( |
|
87 | 87 | 'rhodecode_subversion_magic_path', '/!svn') |
|
88 | 88 | path_info = get_path_info(environ) |
|
89 | 89 | req_method = environ['REQUEST_METHOD'] |
|
90 | 90 | |
|
91 | 91 | is_svn_path = ( |
|
92 | 92 | 'subversion' in http_dav or |
|
93 | 93 | magic_path_segment in path_info |
|
94 | 94 | or req_method in ['PROPFIND', 'PROPPATCH', 'HEAD'] |
|
95 | 95 | ) |
|
96 | 96 | log.debug( |
|
97 | 97 | 'request path: `%s` detected as SVN PROTOCOL %s', path_info, |
|
98 | 98 | is_svn_path) |
|
99 | 99 | |
|
100 | 100 | return is_svn_path |
|
101 | 101 | |
|
102 | 102 | |
|
103 | 103 | class GunzipMiddleware(object): |
|
104 | 104 | """ |
|
105 | 105 | WSGI middleware that unzips gzip-encoded requests before |
|
106 | 106 | passing on to the underlying application. |
|
107 | 107 | """ |
|
108 | 108 | |
|
109 | 109 | def __init__(self, application): |
|
110 | 110 | self.app = application |
|
111 | 111 | |
|
112 | 112 | def __call__(self, environ, start_response): |
|
113 | 113 | accepts_encoding_header = safe_str(environ.get('HTTP_CONTENT_ENCODING', '')) |
|
114 | 114 | |
|
115 | 115 | if 'gzip' in accepts_encoding_header: |
|
116 | 116 | log.debug('gzip detected, now running gunzip wrapper') |
|
117 | 117 | wsgi_input = environ['wsgi.input'] |
|
118 | 118 | |
|
119 | 119 | if not hasattr(environ['wsgi.input'], 'seek'): |
|
120 | 120 | # The gzip implementation in the standard library of Python 2.x |
|
121 | 121 | # requires the '.seek()' and '.tell()' methods to be available |
|
122 | 122 | # on the input stream. Read the data into a temporary file to |
|
123 | 123 | # work around this limitation. |
|
124 | 124 | |
|
125 | 125 | wsgi_input = tempfile.SpooledTemporaryFile(64 * 1024 * 1024) |
|
126 | 126 | shutil.copyfileobj(environ['wsgi.input'], wsgi_input) |
|
127 | 127 | wsgi_input.seek(0) |
|
128 | 128 | |
|
129 | 129 | environ['wsgi.input'] = gzip.GzipFile(fileobj=wsgi_input, mode='r') |
|
130 | 130 | # since we "Ungzipped" the content we say now it's no longer gzip |
|
131 | 131 | # content encoding |
|
132 | 132 | del environ['HTTP_CONTENT_ENCODING'] |
|
133 | 133 | |
|
134 | 134 | # content length has changes ? or i'm not sure |
|
135 | 135 | if 'CONTENT_LENGTH' in environ: |
|
136 | 136 | del environ['CONTENT_LENGTH'] |
|
137 | 137 | else: |
|
138 | 138 | log.debug('content not gzipped, gzipMiddleware passing ' |
|
139 | 139 | 'request further') |
|
140 | 140 | return self.app(environ, start_response) |
|
141 | 141 | |
|
142 | 142 | |
|
143 | 143 | def is_vcs_call(environ): |
|
144 | 144 | if VCS_TYPE_KEY in environ: |
|
145 | 145 | raw_type = environ[VCS_TYPE_KEY] |
|
146 | 146 | return raw_type and raw_type != VCS_TYPE_SKIP |
|
147 | 147 | return False |
|
148 | 148 | |
|
149 | 149 | |
|
150 | 150 | def detect_vcs_request(environ, backends): |
|
151 | 151 | checks = { |
|
152 | 152 | 'hg': (is_hg, SimpleHg), |
|
153 | 153 | 'git': (is_git, SimpleGit), |
|
154 | 154 | 'svn': (is_svn, SimpleSvn), |
|
155 | 155 | } |
|
156 | 156 | handler = None |
|
157 | 157 | # List of path views first chunk we don't do any checks |
|
158 | 158 | white_list = [ |
|
159 | 159 | # favicon often requested by browsers |
|
160 | 160 | 'favicon.ico', |
|
161 | 161 | |
|
162 | # static files no detection | |
|
163 | '_static++', | |
|
164 | ||
|
165 | # debug-toolbar | |
|
166 | '_debug_toolbar++', | |
|
167 | ||
|
162 | 168 | # e.g /_file_store/download |
|
163 | 169 | '_file_store++', |
|
164 | 170 | |
|
165 | 171 | # login |
|
166 |
" |
|
|
172 | f"{ADMIN_PREFIX}/login", | |
|
173 | f"{ADMIN_PREFIX}/logout", | |
|
167 | 174 | |
|
168 | 175 | # 2fa |
|
169 | 176 | f"{ADMIN_PREFIX}/check_2fa", |
|
170 | 177 | f"{ADMIN_PREFIX}/setup_2fa", |
|
171 | 178 | |
|
172 | 179 | # _admin/api is safe too |
|
173 | 180 | f'{ADMIN_PREFIX}/api', |
|
174 | 181 | |
|
175 | 182 | # _admin/gist is safe too |
|
176 | 183 | f'{ADMIN_PREFIX}/gists++', |
|
177 | 184 | |
|
178 | 185 | # _admin/my_account is safe too |
|
179 | 186 | f'{ADMIN_PREFIX}/my_account++', |
|
180 | 187 | |
|
181 | # static files no detection | |
|
182 | '_static++', | |
|
183 | ||
|
184 | # debug-toolbar | |
|
185 | '_debug_toolbar++', | |
|
186 | ||
|
187 | 188 | # skip ops ping, status |
|
188 | 189 | f'{ADMIN_PREFIX}/ops/ping', |
|
189 | 190 | f'{ADMIN_PREFIX}/ops/status', |
|
190 | 191 | |
|
191 | 192 | # full channelstream connect should be VCS skipped |
|
192 | 193 | f'{ADMIN_PREFIX}/channelstream/connect', |
|
193 | 194 | |
|
194 | 195 | '++/repo_creating_check' |
|
195 | 196 | ] |
|
197 | ||
|
196 | 198 | path_info = get_path_info(environ) |
|
197 | 199 | path_url = path_info.lstrip('/') |
|
198 | 200 | req_method = environ.get('REQUEST_METHOD') |
|
199 | 201 | |
|
200 | 202 | for item in white_list: |
|
203 | item = item.lstrip('/') | |
|
204 | ||
|
201 | 205 | if item.endswith('++') and path_url.startswith(item[:-2]): |
|
202 | 206 | log.debug('path `%s` in whitelist (match:%s), skipping...', path_url, item) |
|
203 | 207 | return handler |
|
204 | 208 | if item.startswith('++') and path_url.endswith(item[2:]): |
|
205 | 209 | log.debug('path `%s` in whitelist (match:%s), skipping...', path_url, item) |
|
206 | 210 | return handler |
|
207 | 211 | if item == path_url: |
|
208 | 212 | log.debug('path `%s` in whitelist (match:%s), skipping...', path_url, item) |
|
209 | 213 | return handler |
|
210 | 214 | |
|
211 | 215 | if VCS_TYPE_KEY in environ: |
|
212 | 216 | raw_type = environ[VCS_TYPE_KEY] |
|
213 | 217 | if raw_type == VCS_TYPE_SKIP: |
|
214 | 218 | log.debug('got `skip` marker for vcs detection, skipping...') |
|
215 | 219 | return handler |
|
216 | 220 | |
|
217 | 221 | _check, handler = checks.get(raw_type) or [None, None] |
|
218 | 222 | if handler: |
|
219 | 223 | log.debug('got handler:%s from environ', handler) |
|
220 | 224 | |
|
221 | 225 | if not handler: |
|
222 | 226 | log.debug('request start: checking if request for `%s:%s` is of VCS type in order: %s', |
|
223 | 227 | req_method, path_url, backends) |
|
224 | 228 | for vcs_type in backends: |
|
225 | 229 | vcs_check, _handler = checks[vcs_type] |
|
226 | 230 | if vcs_check(environ): |
|
227 | 231 | log.debug('vcs handler found %s', _handler) |
|
228 | 232 | handler = _handler |
|
229 | 233 | break |
|
230 | 234 | |
|
231 | 235 | return handler |
|
232 | 236 | |
|
233 | 237 | |
|
234 | 238 | class VCSMiddleware(object): |
|
235 | 239 | |
|
236 | 240 | def __init__(self, app, registry, config, appenlight_client): |
|
237 | 241 | self.application = app |
|
238 | 242 | self.registry = registry |
|
239 | 243 | self.config = config |
|
240 | 244 | self.appenlight_client = appenlight_client |
|
241 | 245 | self.use_gzip = True |
|
242 | 246 | # order in which we check the middlewares, based on vcs.backends config |
|
243 | 247 | self.check_middlewares = config['vcs.backends'] |
|
244 | 248 | |
|
245 | 249 | def vcs_config(self, repo_name=None): |
|
246 | 250 | """ |
|
247 | 251 | returns serialized VcsSettings |
|
248 | 252 | """ |
|
249 | 253 | try: |
|
250 | 254 | return VcsSettingsModel( |
|
251 | 255 | repo=repo_name).get_ui_settings_as_config_obj() |
|
252 | 256 | except Exception: |
|
253 | 257 | pass |
|
254 | 258 | |
|
255 | 259 | def wrap_in_gzip_if_enabled(self, app, config): |
|
256 | 260 | if self.use_gzip: |
|
257 | 261 | app = GunzipMiddleware(app) |
|
258 | 262 | return app |
|
259 | 263 | |
|
260 | 264 | def _get_handler_app(self, environ): |
|
261 | 265 | app = None |
|
262 | 266 | log.debug('VCSMiddleware: detecting vcs type.') |
|
263 | 267 | handler = detect_vcs_request(environ, self.check_middlewares) |
|
264 | 268 | if handler: |
|
265 | 269 | app = handler(self.config, self.registry) |
|
266 | 270 | |
|
267 | 271 | return app |
|
268 | 272 | |
|
269 | 273 | def __call__(self, environ, start_response): |
|
270 | 274 | # check if we handle one of interesting protocols, optionally extract |
|
271 | 275 | # specific vcsSettings and allow changes of how things are wrapped |
|
272 | 276 | vcs_handler = self._get_handler_app(environ) |
|
273 | 277 | if vcs_handler: |
|
274 | 278 | # translate the _REPO_ID into real repo NAME for usage |
|
275 | 279 | # in middleware |
|
276 | 280 | |
|
277 | 281 | path_info = get_path_info(environ) |
|
278 | 282 | environ['PATH_INFO'] = vcs_handler._get_by_id(path_info) |
|
279 | 283 | |
|
280 | 284 | # Set acl, url and vcs repo names. |
|
281 | 285 | vcs_handler.set_repo_names(environ) |
|
282 | 286 | |
|
283 | 287 | # register repo config back to the handler |
|
284 | 288 | vcs_conf = self.vcs_config(vcs_handler.acl_repo_name) |
|
285 | 289 | # maybe damaged/non existent settings. We still want to |
|
286 | 290 | # pass that point to validate on is_valid_and_existing_repo |
|
287 | 291 | # and return proper HTTP Code back to client |
|
288 | 292 | if vcs_conf: |
|
289 | 293 | vcs_handler.repo_vcs_config = vcs_conf |
|
290 | 294 | |
|
291 | 295 | # check for type, presence in database and on filesystem |
|
292 | 296 | if not vcs_handler.is_valid_and_existing_repo( |
|
293 | 297 | vcs_handler.acl_repo_name, |
|
294 | 298 | vcs_handler.base_path, |
|
295 | 299 | vcs_handler.SCM): |
|
296 | 300 | return HTTPNotFound()(environ, start_response) |
|
297 | 301 | |
|
298 | 302 | environ['REPO_NAME'] = vcs_handler.url_repo_name |
|
299 | 303 | |
|
300 | 304 | # Wrap handler in middlewares if they are enabled. |
|
301 | 305 | vcs_handler = self.wrap_in_gzip_if_enabled( |
|
302 | 306 | vcs_handler, self.config) |
|
303 | 307 | vcs_handler, _ = wrap_in_appenlight_if_enabled( |
|
304 | 308 | vcs_handler, self.config, self.appenlight_client) |
|
305 | 309 | |
|
306 | 310 | return vcs_handler(environ, start_response) |
|
307 | 311 | |
|
308 | 312 | return self.application(environ, start_response) |
@@ -1,124 +1,123 b'' | |||
|
1 | 1 | # Copyright (C) 2016-2023 RhodeCode GmbH |
|
2 | 2 | # |
|
3 | 3 | # This program is free software: you can redistribute it and/or modify |
|
4 | 4 | # it under the terms of the GNU Affero General Public License, version 3 |
|
5 | 5 | # (only), as published by the Free Software Foundation. |
|
6 | 6 | # |
|
7 | 7 | # This program is distributed in the hope that it will be useful, |
|
8 | 8 | # but WITHOUT ANY WARRANTY; without even the implied warranty of |
|
9 | 9 | # MERCHANTABILITY or FITNESS FOR A PARTICULAR PURPOSE. See the |
|
10 | 10 | # GNU General Public License for more details. |
|
11 | 11 | # |
|
12 | 12 | # You should have received a copy of the GNU Affero General Public License |
|
13 | 13 | # along with this program. If not, see <http://www.gnu.org/licenses/>. |
|
14 | 14 | # |
|
15 | 15 | # This program is dual-licensed. If you wish to learn more about the |
|
16 | 16 | # RhodeCode Enterprise Edition, including its added features, Support services, |
|
17 | 17 | # and proprietary license terms, please see https://rhodecode.com/licenses/ |
|
18 | 18 | import logging |
|
19 | 19 | |
|
20 | 20 | import click |
|
21 | 21 | import pyramid.paster |
|
22 | 22 | |
|
23 | 23 | from rhodecode.lib.pyramid_utils import bootstrap |
|
24 | 24 | from rhodecode.lib.config_utils import get_app_config |
|
25 | 25 | from rhodecode.lib.db_manage import DbManage |
|
26 | 26 | from rhodecode.lib.utils2 import get_encryption_key |
|
27 | 27 | from rhodecode.model.db import Session |
|
28 | 28 | |
|
29 | 29 | |
|
30 | 30 | log = logging.getLogger(__name__) |
|
31 | 31 | |
|
32 | 32 | |
|
33 | 33 | @click.command() |
|
34 | 34 | @click.argument('ini_path', type=click.Path(exists=True)) |
|
35 | 35 | @click.option( |
|
36 | 36 | '--force-yes/--force-no', default=None, |
|
37 | 37 | help="Force yes/no to every question") |
|
38 | 38 | @click.option( |
|
39 | 39 | '--user', |
|
40 | 40 | default=None, |
|
41 | 41 | help='Initial super-admin username') |
|
42 | 42 | @click.option( |
|
43 | 43 | '--email', |
|
44 | 44 | default=None, |
|
45 | 45 | help='Initial super-admin email address.') |
|
46 | 46 | @click.option( |
|
47 | 47 | '--password', |
|
48 | 48 | default=None, |
|
49 | 49 | help='Initial super-admin password. Minimum 6 chars.') |
|
50 | 50 | @click.option( |
|
51 | 51 | '--api-key', |
|
52 | 52 | help='Initial API key for the admin user') |
|
53 | 53 | @click.option( |
|
54 | 54 | '--repos', |
|
55 | 55 | default=None, |
|
56 | 56 | help='Absolute path to storage location. This is storage for all ' |
|
57 | 57 | 'existing and future repositories, and repository groups.') |
|
58 | 58 | @click.option( |
|
59 | 59 | '--public-access/--no-public-access', |
|
60 | 60 | default=None, |
|
61 | 61 | help='Enable public access on this installation. ' |
|
62 | 62 | 'Default is public access enabled.') |
|
63 | 63 | @click.option( |
|
64 | 64 | '--skip-existing-db', |
|
65 | 65 | default=False, |
|
66 | 66 | is_flag=True, |
|
67 | 67 | help='Do not destroy and re-initialize the database if it already exist.') |
|
68 | 68 | @click.option( |
|
69 | 69 | '--apply-license-key', |
|
70 | 70 | default=False, |
|
71 | 71 | is_flag=True, |
|
72 | 72 | help='Get the license key from a license file or ENV and apply during DB creation.') |
|
73 | 73 | def main(ini_path, force_yes, user, email, password, api_key, repos, |
|
74 | 74 | public_access, skip_existing_db, apply_license_key): |
|
75 | 75 | return command(ini_path, force_yes, user, email, password, api_key, |
|
76 | 76 | repos, public_access, skip_existing_db, apply_license_key) |
|
77 | 77 | |
|
78 | 78 | |
|
79 | 79 | def command(ini_path, force_yes, user, email, password, api_key, repos, |
|
80 | 80 | public_access, skip_existing_db, apply_license_key): |
|
81 | 81 | # mapping of old parameters to new CLI from click |
|
82 | 82 | options = dict( |
|
83 | 83 | username=user, |
|
84 | 84 | email=email, |
|
85 | 85 | password=password, |
|
86 | 86 | api_key=api_key, |
|
87 | 87 | repos_location=repos, |
|
88 | 88 | force_ask=force_yes, |
|
89 | 89 | public_access=public_access |
|
90 | 90 | ) |
|
91 | 91 | pyramid.paster.setup_logging(ini_path) |
|
92 | 92 | |
|
93 | 93 | config = get_app_config(ini_path) |
|
94 | 94 | |
|
95 | 95 | db_uri = config['sqlalchemy.db1.url'] |
|
96 | 96 | enc_key = get_encryption_key(config) |
|
97 | 97 | dbmanage = DbManage(log_sql=True, dbconf=db_uri, root='.', |
|
98 | 98 | tests=False, cli_args=options, enc_key=enc_key) |
|
99 | 99 | if skip_existing_db and dbmanage.db_exists(): |
|
100 | 100 | return |
|
101 | 101 | |
|
102 | 102 | dbmanage.create_tables(override=True) |
|
103 | 103 | dbmanage.set_db_version() |
|
104 | 104 | opts = dbmanage.config_prompt(None) |
|
105 | 105 | dbmanage.create_settings(opts) |
|
106 | 106 | dbmanage.create_default_user() |
|
107 | 107 | dbmanage.create_admin_and_prompt() |
|
108 | 108 | dbmanage.create_permissions() |
|
109 | 109 | dbmanage.populate_default_permissions() |
|
110 | 110 | if apply_license_key: |
|
111 | try: | |
|
112 | from rc_license.models import apply_trial_license_if_missing | |
|
113 | apply_trial_license_if_missing(force=True) | |
|
114 | except ImportError: | |
|
115 | pass | |
|
111 | from rhodecode.model.license import apply_license_from_file | |
|
112 | license_file_path = config.get('license.import_path') | |
|
113 | if license_file_path: | |
|
114 | apply_license_from_file(license_file_path, force=True) | |
|
116 | 115 | |
|
117 | 116 | Session().commit() |
|
118 | 117 | |
|
119 | 118 | with bootstrap(ini_path, env={'RC_CMD_SETUP_RC': '1'}) as env: |
|
120 | 119 | msg = 'Successfully initialized database, schema and default data.' |
|
121 | 120 | print() |
|
122 | 121 | print('*' * len(msg)) |
|
123 | 122 | print(msg.upper()) |
|
124 | 123 | print('*' * len(msg)) |
@@ -1,835 +1,834 b'' | |||
|
1 | 1 | # Copyright (C) 2010-2023 RhodeCode GmbH |
|
2 | 2 | # |
|
3 | 3 | # This program is free software: you can redistribute it and/or modify |
|
4 | 4 | # it under the terms of the GNU Affero General Public License, version 3 |
|
5 | 5 | # (only), as published by the Free Software Foundation. |
|
6 | 6 | # |
|
7 | 7 | # This program is distributed in the hope that it will be useful, |
|
8 | 8 | # but WITHOUT ANY WARRANTY; without even the implied warranty of |
|
9 | 9 | # MERCHANTABILITY or FITNESS FOR A PARTICULAR PURPOSE. See the |
|
10 | 10 | # GNU General Public License for more details. |
|
11 | 11 | # |
|
12 | 12 | # You should have received a copy of the GNU Affero General Public License |
|
13 | 13 | # along with this program. If not, see <http://www.gnu.org/licenses/>. |
|
14 | 14 | # |
|
15 | 15 | # This program is dual-licensed. If you wish to learn more about the |
|
16 | 16 | # RhodeCode Enterprise Edition, including its added features, Support services, |
|
17 | 17 | # and proprietary license terms, please see https://rhodecode.com/licenses/ |
|
18 | 18 | |
|
19 | 19 | """ |
|
20 | 20 | Utilities library for RhodeCode |
|
21 | 21 | """ |
|
22 | 22 | |
|
23 | 23 | import datetime |
|
24 | 24 | |
|
25 | 25 | import decorator |
|
26 | 26 | import logging |
|
27 | 27 | import os |
|
28 | 28 | import re |
|
29 | 29 | import sys |
|
30 | 30 | import shutil |
|
31 | 31 | import socket |
|
32 | 32 | import tempfile |
|
33 | 33 | import traceback |
|
34 | 34 | import tarfile |
|
35 | 35 | |
|
36 | 36 | from functools import wraps |
|
37 | 37 | from os.path import join as jn |
|
38 | 38 | |
|
39 | 39 | import paste |
|
40 | 40 | import pkg_resources |
|
41 | 41 | from webhelpers2.text import collapse, strip_tags, convert_accented_entities, convert_misc_entities |
|
42 | 42 | |
|
43 | 43 | from mako import exceptions |
|
44 | 44 | |
|
45 | 45 | from rhodecode import ConfigGet |
|
46 | 46 | from rhodecode.lib.hash_utils import sha256_safe, md5, sha1 |
|
47 | 47 | from rhodecode.lib.type_utils import AttributeDict |
|
48 | 48 | from rhodecode.lib.str_utils import safe_bytes, safe_str |
|
49 | 49 | from rhodecode.lib.vcs.backends.base import Config |
|
50 | 50 | from rhodecode.lib.vcs.exceptions import VCSError |
|
51 | 51 | from rhodecode.lib.vcs.utils.helpers import get_scm, get_scm_backend |
|
52 | 52 | from rhodecode.lib.ext_json import sjson as json |
|
53 | 53 | from rhodecode.model import meta |
|
54 | 54 | from rhodecode.model.db import ( |
|
55 | 55 | Repository, User, RhodeCodeUi, UserLog, RepoGroup, UserGroup) |
|
56 | 56 | from rhodecode.model.meta import Session |
|
57 | 57 | |
|
58 | 58 | |
|
59 | 59 | log = logging.getLogger(__name__) |
|
60 | 60 | |
|
61 | 61 | REMOVED_REPO_PAT = re.compile(r'rm__\d{8}_\d{6}_\d{6}__.*') |
|
62 | 62 | |
|
63 | 63 | # String which contains characters that are not allowed in slug names for |
|
64 | 64 | # repositories or repository groups. It is properly escaped to use it in |
|
65 | 65 | # regular expressions. |
|
66 | 66 | SLUG_BAD_CHARS = re.escape(r'`?=[]\;\'"<>,/~!@#$%^&*()+{}|:') |
|
67 | 67 | |
|
68 | 68 | # Regex that matches forbidden characters in repo/group slugs. |
|
69 | 69 | SLUG_BAD_CHAR_RE = re.compile(r'[{}\x00-\x08\x0b-\x0c\x0e-\x1f]'.format(SLUG_BAD_CHARS)) |
|
70 | 70 | |
|
71 | 71 | # Regex that matches allowed characters in repo/group slugs. |
|
72 | 72 | SLUG_GOOD_CHAR_RE = re.compile(r'[^{}]'.format(SLUG_BAD_CHARS)) |
|
73 | 73 | |
|
74 | 74 | # Regex that matches whole repo/group slugs. |
|
75 | 75 | SLUG_RE = re.compile(r'[^{}]+'.format(SLUG_BAD_CHARS)) |
|
76 | 76 | |
|
77 | 77 | _license_cache = None |
|
78 | 78 | |
|
79 | 79 | |
|
80 | 80 | def adopt_for_celery(func): |
|
81 | 81 | """ |
|
82 | 82 | Decorator designed to adopt hooks (from rhodecode.lib.hooks_base) |
|
83 | 83 | for further usage as a celery tasks. |
|
84 | 84 | """ |
|
85 | 85 | @wraps(func) |
|
86 | 86 | def wrapper(extras): |
|
87 | 87 | extras = AttributeDict(extras) |
|
88 | 88 | try: |
|
89 | 89 | # HooksResponse implements to_json method which must be used there. |
|
90 | 90 | return func(extras).to_json() |
|
91 | 91 | except Exception as e: |
|
92 | 92 | return {'status': 128, 'exception': type(e).__name__, 'exception_args': e.args} |
|
93 | 93 | return wrapper |
|
94 | 94 | |
|
95 | 95 | |
|
96 | 96 | def repo_name_slug(value): |
|
97 | 97 | """ |
|
98 | 98 | Return slug of name of repository |
|
99 | 99 | This function is called on each creation/modification |
|
100 | 100 | of repository to prevent bad names in repo |
|
101 | 101 | """ |
|
102 | 102 | |
|
103 | 103 | replacement_char = '-' |
|
104 | 104 | |
|
105 | 105 | slug = strip_tags(value) |
|
106 | 106 | slug = convert_accented_entities(slug) |
|
107 | 107 | slug = convert_misc_entities(slug) |
|
108 | 108 | |
|
109 | 109 | slug = SLUG_BAD_CHAR_RE.sub('', slug) |
|
110 | 110 | slug = re.sub(r'[\s]+', '-', slug) |
|
111 | 111 | slug = collapse(slug, replacement_char) |
|
112 | 112 | |
|
113 | 113 | return slug |
|
114 | 114 | |
|
115 | 115 | |
|
116 | 116 | #============================================================================== |
|
117 | 117 | # PERM DECORATOR HELPERS FOR EXTRACTING NAMES FOR PERM CHECKS |
|
118 | 118 | #============================================================================== |
|
119 | 119 | def get_repo_slug(request): |
|
120 | 120 | _repo = '' |
|
121 | 121 | |
|
122 | 122 | if hasattr(request, 'db_repo_name'): |
|
123 | 123 | # if our requests has set db reference use it for name, this |
|
124 | 124 | # translates the example.com/_<id> into proper repo names |
|
125 | 125 | _repo = request.db_repo_name |
|
126 | 126 | elif getattr(request, 'matchdict', None): |
|
127 | 127 | # pyramid |
|
128 | 128 | _repo = request.matchdict.get('repo_name') |
|
129 | 129 | |
|
130 | 130 | if _repo: |
|
131 | 131 | _repo = _repo.rstrip('/') |
|
132 | 132 | return _repo |
|
133 | 133 | |
|
134 | 134 | |
|
135 | 135 | def get_repo_group_slug(request): |
|
136 | 136 | _group = '' |
|
137 | 137 | if hasattr(request, 'db_repo_group'): |
|
138 | 138 | # if our requests has set db reference use it for name, this |
|
139 | 139 | # translates the example.com/_<id> into proper repo group names |
|
140 | 140 | _group = request.db_repo_group.group_name |
|
141 | 141 | elif getattr(request, 'matchdict', None): |
|
142 | 142 | # pyramid |
|
143 | 143 | _group = request.matchdict.get('repo_group_name') |
|
144 | 144 | |
|
145 | 145 | if _group: |
|
146 | 146 | _group = _group.rstrip('/') |
|
147 | 147 | return _group |
|
148 | 148 | |
|
149 | 149 | |
|
150 | 150 | def get_user_group_slug(request): |
|
151 | 151 | _user_group = '' |
|
152 | 152 | |
|
153 | 153 | if hasattr(request, 'db_user_group'): |
|
154 | 154 | _user_group = request.db_user_group.users_group_name |
|
155 | 155 | elif getattr(request, 'matchdict', None): |
|
156 | 156 | # pyramid |
|
157 | 157 | _user_group = request.matchdict.get('user_group_id') |
|
158 | 158 | _user_group_name = request.matchdict.get('user_group_name') |
|
159 | 159 | try: |
|
160 | 160 | if _user_group: |
|
161 | 161 | _user_group = UserGroup.get(_user_group) |
|
162 | 162 | elif _user_group_name: |
|
163 | 163 | _user_group = UserGroup.get_by_group_name(_user_group_name) |
|
164 | 164 | |
|
165 | 165 | if _user_group: |
|
166 | 166 | _user_group = _user_group.users_group_name |
|
167 | 167 | except Exception: |
|
168 | 168 | log.exception('Failed to get user group by id and name') |
|
169 | 169 | # catch all failures here |
|
170 | 170 | return None |
|
171 | 171 | |
|
172 | 172 | return _user_group |
|
173 | 173 | |
|
174 | 174 | |
|
175 | 175 | def get_filesystem_repos(path, recursive=False, skip_removed_repos=True): |
|
176 | 176 | """ |
|
177 | 177 | Scans given path for repos and return (name,(type,path)) tuple |
|
178 | 178 | |
|
179 | 179 | :param path: path to scan for repositories |
|
180 | 180 | :param recursive: recursive search and return names with subdirs in front |
|
181 | 181 | """ |
|
182 | 182 | |
|
183 | 183 | # remove ending slash for better results |
|
184 | 184 | path = path.rstrip(os.sep) |
|
185 | 185 | log.debug('now scanning in %s location recursive:%s...', path, recursive) |
|
186 | 186 | |
|
187 | 187 | def _get_repos(p): |
|
188 | 188 | dirpaths = get_dirpaths(p) |
|
189 | 189 | if not _is_dir_writable(p): |
|
190 | 190 | log.warning('repo path without write access: %s', p) |
|
191 | 191 | |
|
192 | 192 | for dirpath in dirpaths: |
|
193 | 193 | if os.path.isfile(os.path.join(p, dirpath)): |
|
194 | 194 | continue |
|
195 | 195 | cur_path = os.path.join(p, dirpath) |
|
196 | 196 | |
|
197 | 197 | # skip removed repos |
|
198 | 198 | if skip_removed_repos and REMOVED_REPO_PAT.match(dirpath): |
|
199 | 199 | continue |
|
200 | 200 | |
|
201 | 201 | #skip .<somethin> dirs |
|
202 | 202 | if dirpath.startswith('.'): |
|
203 | 203 | continue |
|
204 | 204 | |
|
205 | 205 | try: |
|
206 | 206 | scm_info = get_scm(cur_path) |
|
207 | 207 | yield scm_info[1].split(path, 1)[-1].lstrip(os.sep), scm_info |
|
208 | 208 | except VCSError: |
|
209 | 209 | if not recursive: |
|
210 | 210 | continue |
|
211 | 211 | #check if this dir containts other repos for recursive scan |
|
212 | 212 | rec_path = os.path.join(p, dirpath) |
|
213 | 213 | if os.path.isdir(rec_path): |
|
214 | 214 | yield from _get_repos(rec_path) |
|
215 | 215 | |
|
216 | 216 | return _get_repos(path) |
|
217 | 217 | |
|
218 | 218 | |
|
219 | 219 | def get_dirpaths(p: str) -> list: |
|
220 | 220 | try: |
|
221 | 221 | # OS-independable way of checking if we have at least read-only |
|
222 | 222 | # access or not. |
|
223 | 223 | dirpaths = os.listdir(p) |
|
224 | 224 | except OSError: |
|
225 | 225 | log.warning('ignoring repo path without read access: %s', p) |
|
226 | 226 | return [] |
|
227 | 227 | |
|
228 | 228 | # os.listpath has a tweak: If a unicode is passed into it, then it tries to |
|
229 | 229 | # decode paths and suddenly returns unicode objects itself. The items it |
|
230 | 230 | # cannot decode are returned as strings and cause issues. |
|
231 | 231 | # |
|
232 | 232 | # Those paths are ignored here until a solid solution for path handling has |
|
233 | 233 | # been built. |
|
234 | 234 | expected_type = type(p) |
|
235 | 235 | |
|
236 | 236 | def _has_correct_type(item): |
|
237 | 237 | if type(item) is not expected_type: |
|
238 | 238 | log.error( |
|
239 | 239 | "Ignoring path %s since it cannot be decoded into str.", |
|
240 | 240 | # Using "repr" to make sure that we see the byte value in case |
|
241 | 241 | # of support. |
|
242 | 242 | repr(item)) |
|
243 | 243 | return False |
|
244 | 244 | return True |
|
245 | 245 | |
|
246 | 246 | dirpaths = [item for item in dirpaths if _has_correct_type(item)] |
|
247 | 247 | |
|
248 | 248 | return dirpaths |
|
249 | 249 | |
|
250 | 250 | |
|
251 | 251 | def _is_dir_writable(path): |
|
252 | 252 | """ |
|
253 | 253 | Probe if `path` is writable. |
|
254 | 254 | |
|
255 | 255 | Due to trouble on Cygwin / Windows, this is actually probing if it is |
|
256 | 256 | possible to create a file inside of `path`, stat does not produce reliable |
|
257 | 257 | results in this case. |
|
258 | 258 | """ |
|
259 | 259 | try: |
|
260 | 260 | with tempfile.TemporaryFile(dir=path): |
|
261 | 261 | pass |
|
262 | 262 | except OSError: |
|
263 | 263 | return False |
|
264 | 264 | return True |
|
265 | 265 | |
|
266 | 266 | |
|
267 | 267 | def is_valid_repo(repo_name, base_path, expect_scm=None, explicit_scm=None, config=None): |
|
268 | 268 | """ |
|
269 | 269 | Returns True if given path is a valid repository False otherwise. |
|
270 | 270 | If expect_scm param is given also, compare if given scm is the same |
|
271 | 271 | as expected from scm parameter. If explicit_scm is given don't try to |
|
272 | 272 | detect the scm, just use the given one to check if repo is valid |
|
273 | 273 | |
|
274 | 274 | :param repo_name: |
|
275 | 275 | :param base_path: |
|
276 | 276 | :param expect_scm: |
|
277 | 277 | :param explicit_scm: |
|
278 | 278 | :param config: |
|
279 | 279 | |
|
280 | 280 | :return True: if given path is a valid repository |
|
281 | 281 | """ |
|
282 | 282 | full_path = os.path.join(safe_str(base_path), safe_str(repo_name)) |
|
283 | 283 | log.debug('Checking if `%s` is a valid path for repository. ' |
|
284 | 284 | 'Explicit type: %s', repo_name, explicit_scm) |
|
285 | 285 | |
|
286 | 286 | try: |
|
287 | 287 | if explicit_scm: |
|
288 | 288 | detected_scms = [get_scm_backend(explicit_scm)( |
|
289 | 289 | full_path, config=config).alias] |
|
290 | 290 | else: |
|
291 | 291 | detected_scms = get_scm(full_path) |
|
292 | 292 | |
|
293 | 293 | if expect_scm: |
|
294 | 294 | return detected_scms[0] == expect_scm |
|
295 | 295 | log.debug('path: %s is an vcs object:%s', full_path, detected_scms) |
|
296 | 296 | return True |
|
297 | 297 | except VCSError: |
|
298 | 298 | log.debug('path: %s is not a valid repo !', full_path) |
|
299 | 299 | return False |
|
300 | 300 | |
|
301 | 301 | |
|
302 | 302 | def is_valid_repo_group(repo_group_name, base_path, skip_path_check=False): |
|
303 | 303 | """ |
|
304 | 304 | Returns True if a given path is a repository group, False otherwise |
|
305 | 305 | |
|
306 | 306 | :param repo_group_name: |
|
307 | 307 | :param base_path: |
|
308 | 308 | """ |
|
309 | 309 | full_path = os.path.join(safe_str(base_path), safe_str(repo_group_name)) |
|
310 | 310 | log.debug('Checking if `%s` is a valid path for repository group', |
|
311 | 311 | repo_group_name) |
|
312 | 312 | |
|
313 | 313 | # check if it's not a repo |
|
314 | 314 | if is_valid_repo(repo_group_name, base_path): |
|
315 | 315 | log.debug('Repo called %s exist, it is not a valid repo group', repo_group_name) |
|
316 | 316 | return False |
|
317 | 317 | |
|
318 | 318 | try: |
|
319 | 319 | # we need to check bare git repos at higher level |
|
320 | 320 | # since we might match branches/hooks/info/objects or possible |
|
321 | 321 | # other things inside bare git repo |
|
322 | 322 | maybe_repo = os.path.dirname(full_path) |
|
323 | 323 | if maybe_repo == base_path: |
|
324 | 324 | # skip root level repo check; we know root location CANNOT BE a repo group |
|
325 | 325 | return False |
|
326 | 326 | |
|
327 | 327 | scm_ = get_scm(maybe_repo) |
|
328 | 328 | log.debug('path: %s is a vcs object:%s, not valid repo group', full_path, scm_) |
|
329 | 329 | return False |
|
330 | 330 | except VCSError: |
|
331 | 331 | pass |
|
332 | 332 | |
|
333 | 333 | # check if it's a valid path |
|
334 | 334 | if skip_path_check or os.path.isdir(full_path): |
|
335 | 335 | log.debug('path: %s is a valid repo group !', full_path) |
|
336 | 336 | return True |
|
337 | 337 | |
|
338 | 338 | log.debug('path: %s is not a valid repo group !', full_path) |
|
339 | 339 | return False |
|
340 | 340 | |
|
341 | 341 | |
|
342 | 342 | def ask_ok(prompt, retries=4, complaint='[y]es or [n]o please!'): |
|
343 | 343 | while True: |
|
344 | 344 | ok = input(prompt) |
|
345 | 345 | if ok.lower() in ('y', 'ye', 'yes'): |
|
346 | 346 | return True |
|
347 | 347 | if ok.lower() in ('n', 'no', 'nop', 'nope'): |
|
348 | 348 | return False |
|
349 | 349 | retries = retries - 1 |
|
350 | 350 | if retries < 0: |
|
351 | 351 | raise OSError |
|
352 | 352 | print(complaint) |
|
353 | 353 | |
|
354 | 354 | # propagated from mercurial documentation |
|
355 | 355 | ui_sections = [ |
|
356 | 356 | 'alias', 'auth', |
|
357 | 357 | 'decode/encode', 'defaults', |
|
358 | 358 | 'diff', 'email', |
|
359 | 359 | 'extensions', 'format', |
|
360 | 360 | 'merge-patterns', 'merge-tools', |
|
361 | 361 | 'hooks', 'http_proxy', |
|
362 | 362 | 'smtp', 'patch', |
|
363 | 363 | 'paths', 'profiling', |
|
364 | 364 | 'server', 'trusted', |
|
365 | 365 | 'ui', 'web', ] |
|
366 | 366 | |
|
367 | 367 | |
|
368 | 368 | def prepare_config_data(clear_session=True, repo=None): |
|
369 | 369 | """ |
|
370 | 370 | Read the configuration data from the database, *.ini files and return configuration |
|
371 | 371 | tuples. |
|
372 | 372 | """ |
|
373 | 373 | from rhodecode.model.settings import VcsSettingsModel |
|
374 | 374 | |
|
375 | 375 | config = [] |
|
376 | 376 | |
|
377 | 377 | sa = meta.Session() |
|
378 | 378 | settings_model = VcsSettingsModel(repo=repo, sa=sa) |
|
379 | 379 | |
|
380 | 380 | ui_settings = settings_model.get_ui_settings() |
|
381 | 381 | |
|
382 | 382 | ui_data = [] |
|
383 | 383 | for setting in ui_settings: |
|
384 | 384 | # Todo: remove this section once transition to *.ini files will be completed |
|
385 | 385 | if setting.section in ('largefiles', 'vcs_git_lfs'): |
|
386 | 386 | if setting.key != 'enabled': |
|
387 | 387 | continue |
|
388 | 388 | if setting.active: |
|
389 | 389 | ui_data.append((setting.section, setting.key, setting.value)) |
|
390 | 390 | config.append(( |
|
391 | 391 | safe_str(setting.section), safe_str(setting.key), |
|
392 | 392 | safe_str(setting.value))) |
|
393 | 393 | if setting.key == 'push_ssl': |
|
394 |
# force set push_ssl requirement to False |
|
|
395 | # handles that | |
|
394 | # force set push_ssl requirement to False this is deprecated, and we must force it to False | |
|
396 | 395 | config.append(( |
|
397 | 396 | safe_str(setting.section), safe_str(setting.key), False)) |
|
398 | 397 | config_getter = ConfigGet() |
|
399 | 398 | config.append(('vcs_git_lfs', 'store_location', config_getter.get_str('vcs.git.lfs.storage_location'))) |
|
400 | 399 | config.append(('largefiles', 'usercache', config_getter.get_str('vcs.hg.largefiles.storage_location'))) |
|
401 | 400 | log.debug( |
|
402 | 401 | 'settings ui from db@repo[%s]: %s', |
|
403 | 402 | repo, |
|
404 | 403 | ','.join(['[{}] {}={}'.format(*s) for s in ui_data])) |
|
405 | 404 | if clear_session: |
|
406 | 405 | meta.Session.remove() |
|
407 | 406 | |
|
408 | 407 | # TODO: mikhail: probably it makes no sense to re-read hooks information. |
|
409 | 408 | # It's already there and activated/deactivated |
|
410 | 409 | skip_entries = [] |
|
411 | 410 | enabled_hook_classes = get_enabled_hook_classes(ui_settings) |
|
412 | 411 | if 'pull' not in enabled_hook_classes: |
|
413 | 412 | skip_entries.append(('hooks', RhodeCodeUi.HOOK_PRE_PULL)) |
|
414 | 413 | if 'push' not in enabled_hook_classes: |
|
415 | 414 | skip_entries.append(('hooks', RhodeCodeUi.HOOK_PRE_PUSH)) |
|
416 | 415 | skip_entries.append(('hooks', RhodeCodeUi.HOOK_PRETX_PUSH)) |
|
417 | 416 | skip_entries.append(('hooks', RhodeCodeUi.HOOK_PUSH_KEY)) |
|
418 | 417 | |
|
419 | 418 | config = [entry for entry in config if entry[:2] not in skip_entries] |
|
420 | 419 | |
|
421 | 420 | return config |
|
422 | 421 | |
|
423 | 422 | |
|
424 | 423 | def make_db_config(clear_session=True, repo=None): |
|
425 | 424 | """ |
|
426 | 425 | Create a :class:`Config` instance based on the values in the database. |
|
427 | 426 | """ |
|
428 | 427 | config = Config() |
|
429 | 428 | config_data = prepare_config_data(clear_session=clear_session, repo=repo) |
|
430 | 429 | for section, option, value in config_data: |
|
431 | 430 | config.set(section, option, value) |
|
432 | 431 | return config |
|
433 | 432 | |
|
434 | 433 | |
|
435 | 434 | def get_enabled_hook_classes(ui_settings): |
|
436 | 435 | """ |
|
437 | 436 | Return the enabled hook classes. |
|
438 | 437 | |
|
439 | 438 | :param ui_settings: List of ui_settings as returned |
|
440 | 439 | by :meth:`VcsSettingsModel.get_ui_settings` |
|
441 | 440 | |
|
442 | 441 | :return: a list with the enabled hook classes. The order is not guaranteed. |
|
443 | 442 | :rtype: list |
|
444 | 443 | """ |
|
445 | 444 | enabled_hooks = [] |
|
446 | 445 | active_hook_keys = [ |
|
447 | 446 | key for section, key, value, active in ui_settings |
|
448 | 447 | if section == 'hooks' and active] |
|
449 | 448 | |
|
450 | 449 | hook_names = { |
|
451 | 450 | RhodeCodeUi.HOOK_PUSH: 'push', |
|
452 | 451 | RhodeCodeUi.HOOK_PULL: 'pull', |
|
453 | 452 | RhodeCodeUi.HOOK_REPO_SIZE: 'repo_size' |
|
454 | 453 | } |
|
455 | 454 | |
|
456 | 455 | for key in active_hook_keys: |
|
457 | 456 | hook = hook_names.get(key) |
|
458 | 457 | if hook: |
|
459 | 458 | enabled_hooks.append(hook) |
|
460 | 459 | |
|
461 | 460 | return enabled_hooks |
|
462 | 461 | |
|
463 | 462 | |
|
464 | 463 | def set_rhodecode_config(config): |
|
465 | 464 | """ |
|
466 | 465 | Updates pyramid config with new settings from database |
|
467 | 466 | |
|
468 | 467 | :param config: |
|
469 | 468 | """ |
|
470 | 469 | from rhodecode.model.settings import SettingsModel |
|
471 | 470 | app_settings = SettingsModel().get_all_settings() |
|
472 | 471 | |
|
473 | 472 | for k, v in list(app_settings.items()): |
|
474 | 473 | config[k] = v |
|
475 | 474 | |
|
476 | 475 | |
|
477 | 476 | def get_rhodecode_realm(): |
|
478 | 477 | """ |
|
479 | 478 | Return the rhodecode realm from database. |
|
480 | 479 | """ |
|
481 | 480 | from rhodecode.model.settings import SettingsModel |
|
482 | 481 | realm = SettingsModel().get_setting_by_name('realm') |
|
483 | 482 | return safe_str(realm.app_settings_value) |
|
484 | 483 | |
|
485 | 484 | |
|
486 | 485 | def get_rhodecode_repo_store_path(): |
|
487 | 486 | """ |
|
488 | 487 | Returns the base path. The base path is the filesystem path which points |
|
489 | 488 | to the repository store. |
|
490 | 489 | """ |
|
491 | 490 | |
|
492 | 491 | import rhodecode |
|
493 | 492 | return rhodecode.CONFIG['repo_store.path'] |
|
494 | 493 | |
|
495 | 494 | |
|
496 | 495 | def map_groups(path): |
|
497 | 496 | """ |
|
498 | 497 | Given a full path to a repository, create all nested groups that this |
|
499 | 498 | repo is inside. This function creates parent-child relationships between |
|
500 | 499 | groups and creates default perms for all new groups. |
|
501 | 500 | |
|
502 | 501 | :param paths: full path to repository |
|
503 | 502 | """ |
|
504 | 503 | from rhodecode.model.repo_group import RepoGroupModel |
|
505 | 504 | sa = meta.Session() |
|
506 | 505 | groups = path.split(Repository.NAME_SEP) |
|
507 | 506 | parent = None |
|
508 | 507 | group = None |
|
509 | 508 | |
|
510 | 509 | # last element is repo in nested groups structure |
|
511 | 510 | groups = groups[:-1] |
|
512 | 511 | rgm = RepoGroupModel(sa) |
|
513 | 512 | owner = User.get_first_super_admin() |
|
514 | 513 | for lvl, group_name in enumerate(groups): |
|
515 | 514 | group_name = '/'.join(groups[:lvl] + [group_name]) |
|
516 | 515 | group = RepoGroup.get_by_group_name(group_name) |
|
517 | 516 | desc = '%s group' % group_name |
|
518 | 517 | |
|
519 | 518 | # skip folders that are now removed repos |
|
520 | 519 | if REMOVED_REPO_PAT.match(group_name): |
|
521 | 520 | break |
|
522 | 521 | |
|
523 | 522 | if group is None: |
|
524 | 523 | log.debug('creating group level: %s group_name: %s', |
|
525 | 524 | lvl, group_name) |
|
526 | 525 | group = RepoGroup(group_name, parent) |
|
527 | 526 | group.group_description = desc |
|
528 | 527 | group.user = owner |
|
529 | 528 | sa.add(group) |
|
530 | 529 | perm_obj = rgm._create_default_perms(group) |
|
531 | 530 | sa.add(perm_obj) |
|
532 | 531 | sa.flush() |
|
533 | 532 | |
|
534 | 533 | parent = group |
|
535 | 534 | return group |
|
536 | 535 | |
|
537 | 536 | |
|
538 | 537 | def repo2db_mapper(initial_repo_list, remove_obsolete=False, force_hooks_rebuild=False): |
|
539 | 538 | """ |
|
540 | 539 | maps all repos given in initial_repo_list, non existing repositories |
|
541 | 540 | are created, if remove_obsolete is True it also checks for db entries |
|
542 | 541 | that are not in initial_repo_list and removes them. |
|
543 | 542 | |
|
544 | 543 | :param initial_repo_list: list of repositories found by scanning methods |
|
545 | 544 | :param remove_obsolete: check for obsolete entries in database |
|
546 | 545 | """ |
|
547 | 546 | from rhodecode.model.repo import RepoModel |
|
548 | 547 | from rhodecode.model.repo_group import RepoGroupModel |
|
549 | 548 | from rhodecode.model.settings import SettingsModel |
|
550 | 549 | |
|
551 | 550 | sa = meta.Session() |
|
552 | 551 | repo_model = RepoModel() |
|
553 | 552 | user = User.get_first_super_admin() |
|
554 | 553 | added = [] |
|
555 | 554 | |
|
556 | 555 | # creation defaults |
|
557 | 556 | defs = SettingsModel().get_default_repo_settings(strip_prefix=True) |
|
558 | 557 | enable_statistics = defs.get('repo_enable_statistics') |
|
559 | 558 | enable_locking = defs.get('repo_enable_locking') |
|
560 | 559 | enable_downloads = defs.get('repo_enable_downloads') |
|
561 | 560 | private = defs.get('repo_private') |
|
562 | 561 | |
|
563 | 562 | for name, repo in list(initial_repo_list.items()): |
|
564 | 563 | group = map_groups(name) |
|
565 | 564 | str_name = safe_str(name) |
|
566 | 565 | db_repo = repo_model.get_by_repo_name(str_name) |
|
567 | 566 | |
|
568 | 567 | # found repo that is on filesystem not in RhodeCode database |
|
569 | 568 | if not db_repo: |
|
570 | 569 | log.info('repository `%s` not found in the database, creating now', name) |
|
571 | 570 | added.append(name) |
|
572 | 571 | desc = (repo.description |
|
573 | 572 | if repo.description != 'unknown' |
|
574 | 573 | else '%s repository' % name) |
|
575 | 574 | |
|
576 | 575 | db_repo = repo_model._create_repo( |
|
577 | 576 | repo_name=name, |
|
578 | 577 | repo_type=repo.alias, |
|
579 | 578 | description=desc, |
|
580 | 579 | repo_group=getattr(group, 'group_id', None), |
|
581 | 580 | owner=user, |
|
582 | 581 | enable_locking=enable_locking, |
|
583 | 582 | enable_downloads=enable_downloads, |
|
584 | 583 | enable_statistics=enable_statistics, |
|
585 | 584 | private=private, |
|
586 | 585 | state=Repository.STATE_CREATED |
|
587 | 586 | ) |
|
588 | 587 | sa.commit() |
|
589 | 588 | # we added that repo just now, and make sure we updated server info |
|
590 | 589 | if db_repo.repo_type == 'git': |
|
591 | 590 | git_repo = db_repo.scm_instance() |
|
592 | 591 | # update repository server-info |
|
593 | 592 | log.debug('Running update server info') |
|
594 | 593 | git_repo._update_server_info(force=True) |
|
595 | 594 | |
|
596 | 595 | db_repo.update_commit_cache(recursive=False) |
|
597 | 596 | |
|
598 | 597 | config = db_repo._config |
|
599 | 598 | config.set('extensions', 'largefiles', '') |
|
600 | 599 | repo = db_repo.scm_instance(config=config) |
|
601 | 600 | repo.install_hooks(force=force_hooks_rebuild) |
|
602 | 601 | |
|
603 | 602 | removed = [] |
|
604 | 603 | if remove_obsolete: |
|
605 | 604 | # remove from database those repositories that are not in the filesystem |
|
606 | 605 | for repo in sa.query(Repository).all(): |
|
607 | 606 | if repo.repo_name not in list(initial_repo_list.keys()): |
|
608 | 607 | log.debug("Removing non-existing repository found in db `%s`", |
|
609 | 608 | repo.repo_name) |
|
610 | 609 | try: |
|
611 | 610 | RepoModel(sa).delete(repo, forks='detach', fs_remove=False) |
|
612 | 611 | sa.commit() |
|
613 | 612 | removed.append(repo.repo_name) |
|
614 | 613 | except Exception: |
|
615 | 614 | # don't hold further removals on error |
|
616 | 615 | log.error(traceback.format_exc()) |
|
617 | 616 | sa.rollback() |
|
618 | 617 | |
|
619 | 618 | def splitter(full_repo_name): |
|
620 | 619 | _parts = full_repo_name.rsplit(RepoGroup.url_sep(), 1) |
|
621 | 620 | gr_name = None |
|
622 | 621 | if len(_parts) == 2: |
|
623 | 622 | gr_name = _parts[0] |
|
624 | 623 | return gr_name |
|
625 | 624 | |
|
626 | 625 | initial_repo_group_list = [splitter(x) for x in |
|
627 | 626 | list(initial_repo_list.keys()) if splitter(x)] |
|
628 | 627 | |
|
629 | 628 | # remove from database those repository groups that are not in the |
|
630 | 629 | # filesystem due to parent child relationships we need to delete them |
|
631 | 630 | # in a specific order of most nested first |
|
632 | 631 | all_groups = [x.group_name for x in sa.query(RepoGroup).all()] |
|
633 | 632 | def nested_sort(gr): |
|
634 | 633 | return len(gr.split('/')) |
|
635 | 634 | for group_name in sorted(all_groups, key=nested_sort, reverse=True): |
|
636 | 635 | if group_name not in initial_repo_group_list: |
|
637 | 636 | repo_group = RepoGroup.get_by_group_name(group_name) |
|
638 | 637 | if (repo_group.children.all() or |
|
639 | 638 | not RepoGroupModel().check_exist_filesystem( |
|
640 | 639 | group_name=group_name, exc_on_failure=False)): |
|
641 | 640 | continue |
|
642 | 641 | |
|
643 | 642 | log.info( |
|
644 | 643 | 'Removing non-existing repository group found in db `%s`', |
|
645 | 644 | group_name) |
|
646 | 645 | try: |
|
647 | 646 | RepoGroupModel(sa).delete(group_name, fs_remove=False) |
|
648 | 647 | sa.commit() |
|
649 | 648 | removed.append(group_name) |
|
650 | 649 | except Exception: |
|
651 | 650 | # don't hold further removals on error |
|
652 | 651 | log.exception( |
|
653 | 652 | 'Unable to remove repository group `%s`', |
|
654 | 653 | group_name) |
|
655 | 654 | sa.rollback() |
|
656 | 655 | raise |
|
657 | 656 | |
|
658 | 657 | return added, removed |
|
659 | 658 | |
|
660 | 659 | |
|
661 | 660 | def load_rcextensions(root_path): |
|
662 | 661 | import rhodecode |
|
663 | 662 | from rhodecode.config import conf |
|
664 | 663 | |
|
665 | 664 | path = os.path.join(root_path) |
|
666 | 665 | sys.path.append(path) |
|
667 | 666 | |
|
668 | 667 | try: |
|
669 | 668 | rcextensions = __import__('rcextensions') |
|
670 | 669 | except ImportError: |
|
671 | 670 | if os.path.isdir(os.path.join(path, 'rcextensions')): |
|
672 | 671 | log.warning('Unable to load rcextensions from %s', path) |
|
673 | 672 | rcextensions = None |
|
674 | 673 | |
|
675 | 674 | if rcextensions: |
|
676 | 675 | log.info('Loaded rcextensions from %s...', rcextensions) |
|
677 | 676 | rhodecode.EXTENSIONS = rcextensions |
|
678 | 677 | |
|
679 | 678 | # Additional mappings that are not present in the pygments lexers |
|
680 | 679 | conf.LANGUAGES_EXTENSIONS_MAP.update( |
|
681 | 680 | getattr(rhodecode.EXTENSIONS, 'EXTRA_MAPPINGS', {})) |
|
682 | 681 | |
|
683 | 682 | |
|
684 | 683 | def get_custom_lexer(extension): |
|
685 | 684 | """ |
|
686 | 685 | returns a custom lexer if it is defined in rcextensions module, or None |
|
687 | 686 | if there's no custom lexer defined |
|
688 | 687 | """ |
|
689 | 688 | import rhodecode |
|
690 | 689 | from pygments import lexers |
|
691 | 690 | |
|
692 | 691 | # custom override made by RhodeCode |
|
693 | 692 | if extension in ['mako']: |
|
694 | 693 | return lexers.get_lexer_by_name('html+mako') |
|
695 | 694 | |
|
696 | 695 | # check if we didn't define this extension as other lexer |
|
697 | 696 | extensions = rhodecode.EXTENSIONS and getattr(rhodecode.EXTENSIONS, 'EXTRA_LEXERS', None) |
|
698 | 697 | if extensions and extension in rhodecode.EXTENSIONS.EXTRA_LEXERS: |
|
699 | 698 | _lexer_name = rhodecode.EXTENSIONS.EXTRA_LEXERS[extension] |
|
700 | 699 | return lexers.get_lexer_by_name(_lexer_name) |
|
701 | 700 | |
|
702 | 701 | |
|
703 | 702 | #============================================================================== |
|
704 | 703 | # TEST FUNCTIONS AND CREATORS |
|
705 | 704 | #============================================================================== |
|
706 | 705 | def create_test_index(repo_location, config): |
|
707 | 706 | """ |
|
708 | 707 | Makes default test index. |
|
709 | 708 | """ |
|
710 | 709 | try: |
|
711 | 710 | import rc_testdata |
|
712 | 711 | except ImportError: |
|
713 | 712 | raise ImportError('Failed to import rc_testdata, ' |
|
714 | 713 | 'please make sure this package is installed from requirements_test.txt') |
|
715 | 714 | rc_testdata.extract_search_index( |
|
716 | 715 | 'vcs_search_index', os.path.dirname(config['search.location'])) |
|
717 | 716 | |
|
718 | 717 | |
|
719 | 718 | def create_test_directory(test_path): |
|
720 | 719 | """ |
|
721 | 720 | Create test directory if it doesn't exist. |
|
722 | 721 | """ |
|
723 | 722 | if not os.path.isdir(test_path): |
|
724 | 723 | log.debug('Creating testdir %s', test_path) |
|
725 | 724 | os.makedirs(test_path) |
|
726 | 725 | |
|
727 | 726 | |
|
728 | 727 | def create_test_database(test_path, config): |
|
729 | 728 | """ |
|
730 | 729 | Makes a fresh database. |
|
731 | 730 | """ |
|
732 | 731 | from rhodecode.lib.db_manage import DbManage |
|
733 | 732 | from rhodecode.lib.utils2 import get_encryption_key |
|
734 | 733 | |
|
735 | 734 | # PART ONE create db |
|
736 | 735 | dbconf = config['sqlalchemy.db1.url'] |
|
737 | 736 | enc_key = get_encryption_key(config) |
|
738 | 737 | |
|
739 | 738 | log.debug('making test db %s', dbconf) |
|
740 | 739 | |
|
741 | 740 | dbmanage = DbManage(log_sql=False, dbconf=dbconf, root=config['here'], |
|
742 | 741 | tests=True, cli_args={'force_ask': True}, enc_key=enc_key) |
|
743 | 742 | dbmanage.create_tables(override=True) |
|
744 | 743 | dbmanage.set_db_version() |
|
745 | 744 | # for tests dynamically set new root paths based on generated content |
|
746 | 745 | dbmanage.create_settings(dbmanage.config_prompt(test_path)) |
|
747 | 746 | dbmanage.create_default_user() |
|
748 | 747 | dbmanage.create_test_admin_and_users() |
|
749 | 748 | dbmanage.create_permissions() |
|
750 | 749 | dbmanage.populate_default_permissions() |
|
751 | 750 | Session().commit() |
|
752 | 751 | |
|
753 | 752 | |
|
754 | 753 | def create_test_repositories(test_path, config): |
|
755 | 754 | """ |
|
756 | 755 | Creates test repositories in the temporary directory. Repositories are |
|
757 | 756 | extracted from archives within the rc_testdata package. |
|
758 | 757 | """ |
|
759 | 758 | import rc_testdata |
|
760 | 759 | from rhodecode.tests import HG_REPO, GIT_REPO, SVN_REPO |
|
761 | 760 | |
|
762 | 761 | log.debug('making test vcs repositories') |
|
763 | 762 | |
|
764 | 763 | idx_path = config['search.location'] |
|
765 | 764 | data_path = config['cache_dir'] |
|
766 | 765 | |
|
767 | 766 | # clean index and data |
|
768 | 767 | if idx_path and os.path.exists(idx_path): |
|
769 | 768 | log.debug('remove %s', idx_path) |
|
770 | 769 | shutil.rmtree(idx_path) |
|
771 | 770 | |
|
772 | 771 | if data_path and os.path.exists(data_path): |
|
773 | 772 | log.debug('remove %s', data_path) |
|
774 | 773 | shutil.rmtree(data_path) |
|
775 | 774 | |
|
776 | 775 | rc_testdata.extract_hg_dump('vcs_test_hg', jn(test_path, HG_REPO)) |
|
777 | 776 | rc_testdata.extract_git_dump('vcs_test_git', jn(test_path, GIT_REPO)) |
|
778 | 777 | |
|
779 | 778 | # Note: Subversion is in the process of being integrated with the system, |
|
780 | 779 | # until we have a properly packed version of the test svn repository, this |
|
781 | 780 | # tries to copy over the repo from a package "rc_testdata" |
|
782 | 781 | svn_repo_path = rc_testdata.get_svn_repo_archive() |
|
783 | 782 | with tarfile.open(svn_repo_path) as tar: |
|
784 | 783 | tar.extractall(jn(test_path, SVN_REPO)) |
|
785 | 784 | |
|
786 | 785 | |
|
787 | 786 | def password_changed(auth_user, session): |
|
788 | 787 | # Never report password change in case of default user or anonymous user. |
|
789 | 788 | if auth_user.username == User.DEFAULT_USER or auth_user.user_id is None: |
|
790 | 789 | return False |
|
791 | 790 | |
|
792 | 791 | password_hash = md5(safe_bytes(auth_user.password)) if auth_user.password else None |
|
793 | 792 | rhodecode_user = session.get('rhodecode_user', {}) |
|
794 | 793 | session_password_hash = rhodecode_user.get('password', '') |
|
795 | 794 | return password_hash != session_password_hash |
|
796 | 795 | |
|
797 | 796 | |
|
798 | 797 | def read_opensource_licenses(): |
|
799 | 798 | global _license_cache |
|
800 | 799 | |
|
801 | 800 | if not _license_cache: |
|
802 | 801 | licenses = pkg_resources.resource_string( |
|
803 | 802 | 'rhodecode', 'config/licenses.json') |
|
804 | 803 | _license_cache = json.loads(licenses) |
|
805 | 804 | |
|
806 | 805 | return _license_cache |
|
807 | 806 | |
|
808 | 807 | |
|
809 | 808 | def generate_platform_uuid(): |
|
810 | 809 | """ |
|
811 | 810 | Generates platform UUID based on it's name |
|
812 | 811 | """ |
|
813 | 812 | import platform |
|
814 | 813 | |
|
815 | 814 | try: |
|
816 | 815 | uuid_list = [platform.platform()] |
|
817 | 816 | return sha256_safe(':'.join(uuid_list)) |
|
818 | 817 | except Exception as e: |
|
819 | 818 | log.error('Failed to generate host uuid: %s', e) |
|
820 | 819 | return 'UNDEFINED' |
|
821 | 820 | |
|
822 | 821 | |
|
823 | 822 | def send_test_email(recipients, email_body='TEST EMAIL'): |
|
824 | 823 | """ |
|
825 | 824 | Simple code for generating test emails. |
|
826 | 825 | Usage:: |
|
827 | 826 | |
|
828 | 827 | from rhodecode.lib import utils |
|
829 | 828 | utils.send_test_email() |
|
830 | 829 | """ |
|
831 | 830 | from rhodecode.lib.celerylib import tasks, run_task |
|
832 | 831 | |
|
833 | 832 | email_body = email_body_plaintext = email_body |
|
834 | 833 | subject = f'SUBJECT FROM: {socket.gethostname()}' |
|
835 | 834 | tasks.send_email(recipients, subject, email_body_plaintext, email_body) |
@@ -1,663 +1,662 b'' | |||
|
1 | 1 | # Copyright (C) 2010-2023 RhodeCode GmbH |
|
2 | 2 | # |
|
3 | 3 | # This program is free software: you can redistribute it and/or modify |
|
4 | 4 | # it under the terms of the GNU Affero General Public License, version 3 |
|
5 | 5 | # (only), as published by the Free Software Foundation. |
|
6 | 6 | # |
|
7 | 7 | # This program is distributed in the hope that it will be useful, |
|
8 | 8 | # but WITHOUT ANY WARRANTY; without even the implied warranty of |
|
9 | 9 | # MERCHANTABILITY or FITNESS FOR A PARTICULAR PURPOSE. See the |
|
10 | 10 | # GNU General Public License for more details. |
|
11 | 11 | # |
|
12 | 12 | # You should have received a copy of the GNU Affero General Public License |
|
13 | 13 | # along with this program. If not, see <http://www.gnu.org/licenses/>. |
|
14 | 14 | # |
|
15 | 15 | # This program is dual-licensed. If you wish to learn more about the |
|
16 | 16 | # RhodeCode Enterprise Edition, including its added features, Support services, |
|
17 | 17 | # and proprietary license terms, please see https://rhodecode.com/licenses/ |
|
18 | 18 | |
|
19 | 19 | """ |
|
20 | 20 | this is forms validation classes |
|
21 | 21 | http://formencode.org/module-formencode.validators.html |
|
22 | 22 | for list off all availible validators |
|
23 | 23 | |
|
24 | 24 | we can create our own validators |
|
25 | 25 | |
|
26 | 26 | The table below outlines the options which can be used in a schema in addition to the validators themselves |
|
27 | 27 | pre_validators [] These validators will be applied before the schema |
|
28 | 28 | chained_validators [] These validators will be applied after the schema |
|
29 | 29 | allow_extra_fields False If True, then it is not an error when keys that aren't associated with a validator are present |
|
30 | 30 | filter_extra_fields False If True, then keys that aren't associated with a validator are removed |
|
31 | 31 | if_key_missing NoDefault If this is given, then any keys that aren't available but are expected will be replaced with this value (and then validated). This does not override a present .if_missing attribute on validators. NoDefault is a special FormEncode class to mean that no default values has been specified and therefore missing keys shouldn't take a default value. |
|
32 | 32 | ignore_key_missing False If True, then missing keys will be missing in the result, if the validator doesn't have .if_missing on it already |
|
33 | 33 | |
|
34 | 34 | |
|
35 | 35 | <name> = formencode.validators.<name of validator> |
|
36 | 36 | <name> must equal form name |
|
37 | 37 | list=[1,2,3,4,5] |
|
38 | 38 | for SELECT use formencode.All(OneOf(list), Int()) |
|
39 | 39 | |
|
40 | 40 | """ |
|
41 | 41 | |
|
42 | 42 | import deform |
|
43 | 43 | import logging |
|
44 | 44 | import formencode |
|
45 | 45 | |
|
46 | 46 | from pkg_resources import resource_filename |
|
47 | 47 | from formencode import All, Pipe |
|
48 | 48 | |
|
49 | 49 | from pyramid.threadlocal import get_current_request |
|
50 | 50 | |
|
51 | 51 | from rhodecode import BACKENDS |
|
52 | 52 | from rhodecode.lib import helpers |
|
53 | 53 | from rhodecode.model import validators as v |
|
54 | 54 | |
|
55 | 55 | log = logging.getLogger(__name__) |
|
56 | 56 | |
|
57 | 57 | |
|
58 | 58 | deform_templates = resource_filename('deform', 'templates') |
|
59 | 59 | rhodecode_templates = resource_filename('rhodecode', 'templates/forms') |
|
60 | 60 | search_path = (rhodecode_templates, deform_templates) |
|
61 | 61 | |
|
62 | 62 | |
|
63 | 63 | class RhodecodeFormZPTRendererFactory(deform.ZPTRendererFactory): |
|
64 | 64 | """ Subclass of ZPTRendererFactory to add rhodecode context variables """ |
|
65 | 65 | def __call__(self, template_name, **kw): |
|
66 | 66 | kw['h'] = helpers |
|
67 | 67 | kw['request'] = get_current_request() |
|
68 | 68 | return self.load(template_name)(**kw) |
|
69 | 69 | |
|
70 | 70 | |
|
71 | 71 | form_renderer = RhodecodeFormZPTRendererFactory(search_path) |
|
72 | 72 | deform.Form.set_default_renderer(form_renderer) |
|
73 | 73 | |
|
74 | 74 | |
|
75 | 75 | def LoginForm(localizer): |
|
76 | 76 | _ = localizer |
|
77 | 77 | |
|
78 | 78 | class _LoginForm(formencode.Schema): |
|
79 | 79 | allow_extra_fields = True |
|
80 | 80 | filter_extra_fields = True |
|
81 | 81 | username = v.UnicodeString( |
|
82 | 82 | strip=True, |
|
83 | 83 | min=1, |
|
84 | 84 | not_empty=True, |
|
85 | 85 | messages={ |
|
86 | 86 | 'empty': _('Please enter a login'), |
|
87 | 87 | 'tooShort': _('Enter a value %(min)i characters long or more') |
|
88 | 88 | } |
|
89 | 89 | ) |
|
90 | 90 | |
|
91 | 91 | password = v.UnicodeString( |
|
92 | 92 | strip=False, |
|
93 | 93 | min=3, |
|
94 | 94 | max=72, |
|
95 | 95 | not_empty=True, |
|
96 | 96 | messages={ |
|
97 | 97 | 'empty': _('Please enter a password'), |
|
98 | 98 | 'tooShort': _('Enter %(min)i characters or more')} |
|
99 | 99 | ) |
|
100 | 100 | |
|
101 | 101 | remember = v.StringBoolean(if_missing=False) |
|
102 | 102 | |
|
103 | 103 | chained_validators = [v.ValidAuth(localizer)] |
|
104 | 104 | return _LoginForm |
|
105 | 105 | |
|
106 | 106 | |
|
107 | 107 | def TOTPForm(localizer, user, allow_recovery_code_use=False): |
|
108 | 108 | _ = localizer |
|
109 | 109 | |
|
110 | 110 | class _TOTPForm(formencode.Schema): |
|
111 | 111 | allow_extra_fields = True |
|
112 | 112 | filter_extra_fields = False |
|
113 | 113 | totp = v.Regex(r'^(?:\d{6}|[A-Z0-9]{32})$') |
|
114 | 114 | secret_totp = v.String() |
|
115 | 115 | |
|
116 | 116 | def to_python(self, value, state=None): |
|
117 | 117 | validation_checks = [user.is_totp_valid] |
|
118 | 118 | if allow_recovery_code_use: |
|
119 | 119 | validation_checks.append(user.is_2fa_recovery_code_valid) |
|
120 | 120 | form_data = super().to_python(value, state) |
|
121 | 121 | received_code = form_data['totp'] |
|
122 | 122 | secret = form_data.get('secret_totp') |
|
123 | 123 | |
|
124 | 124 | if not any(map(lambda func: func(received_code, secret), validation_checks)): |
|
125 | 125 | error_msg = _('Code is invalid. Try again!') |
|
126 | 126 | raise formencode.Invalid(error_msg, v, state, error_dict={'totp': error_msg}) |
|
127 | 127 | return form_data |
|
128 | 128 | |
|
129 | 129 | return _TOTPForm |
|
130 | 130 | |
|
131 | 131 | |
|
132 | 132 | def WhitelistedVcsClientsForm(localizer): |
|
133 | 133 | _ = localizer |
|
134 | 134 | |
|
135 | 135 | class _WhitelistedVcsClientsForm(formencode.Schema): |
|
136 | 136 | regexp = r'^(?:\s*[<>=~^!]*\s*\d{1,2}\.\d{1,2}(?:\.\d{1,2})?\s*|\*)\s*(?:,\s*[<>=~^!]*\s*\d{1,2}\.\d{1,2}(?:\.\d{1,2})?\s*|\s*\*\s*)*$' |
|
137 | 137 | allow_extra_fields = True |
|
138 | 138 | filter_extra_fields = True |
|
139 | 139 | git = v.Regex(regexp) |
|
140 | 140 | hg = v.Regex(regexp) |
|
141 | 141 | svn = v.Regex(regexp) |
|
142 | 142 | |
|
143 | 143 | return _WhitelistedVcsClientsForm |
|
144 | 144 | |
|
145 | 145 | |
|
146 | 146 | def UserForm(localizer, edit=False, available_languages=None, old_data=None): |
|
147 | 147 | old_data = old_data or {} |
|
148 | 148 | available_languages = available_languages or [] |
|
149 | 149 | _ = localizer |
|
150 | 150 | |
|
151 | 151 | class _UserForm(formencode.Schema): |
|
152 | 152 | allow_extra_fields = True |
|
153 | 153 | filter_extra_fields = True |
|
154 | 154 | username = All(v.UnicodeString(strip=True, min=1, not_empty=True), |
|
155 | 155 | v.ValidUsername(localizer, edit, old_data)) |
|
156 | 156 | if edit: |
|
157 | 157 | new_password = All( |
|
158 | 158 | v.ValidPassword(localizer), |
|
159 | 159 | v.UnicodeString(strip=False, min=6, max=72, not_empty=False) |
|
160 | 160 | ) |
|
161 | 161 | password_confirmation = All( |
|
162 | 162 | v.ValidPassword(localizer), |
|
163 | 163 | v.UnicodeString(strip=False, min=6, max=72, not_empty=False), |
|
164 | 164 | ) |
|
165 | 165 | admin = v.StringBoolean(if_missing=False) |
|
166 | 166 | else: |
|
167 | 167 | password = All( |
|
168 | 168 | v.ValidPassword(localizer), |
|
169 | 169 | v.UnicodeString(strip=False, min=6, max=72, not_empty=True) |
|
170 | 170 | ) |
|
171 | 171 | password_confirmation = All( |
|
172 | 172 | v.ValidPassword(localizer), |
|
173 | 173 | v.UnicodeString(strip=False, min=6, max=72, not_empty=False) |
|
174 | 174 | ) |
|
175 | 175 | |
|
176 | 176 | password_change = v.StringBoolean(if_missing=False) |
|
177 | 177 | create_repo_group = v.StringBoolean(if_missing=False) |
|
178 | 178 | |
|
179 | 179 | active = v.StringBoolean(if_missing=False) |
|
180 | 180 | firstname = v.UnicodeString(strip=True, min=1, not_empty=False) |
|
181 | 181 | lastname = v.UnicodeString(strip=True, min=1, not_empty=False) |
|
182 | 182 | email = All(v.UniqSystemEmail(localizer, old_data), v.Email(not_empty=True)) |
|
183 | 183 | description = v.UnicodeString(strip=True, min=1, max=250, not_empty=False, |
|
184 | 184 | if_missing='') |
|
185 | 185 | extern_name = v.UnicodeString(strip=True) |
|
186 | 186 | extern_type = v.UnicodeString(strip=True) |
|
187 | 187 | language = v.OneOf(available_languages, hideList=False, |
|
188 | 188 | testValueList=True, if_missing=None) |
|
189 | 189 | chained_validators = [v.ValidPasswordsMatch(localizer)] |
|
190 | 190 | return _UserForm |
|
191 | 191 | |
|
192 | 192 | |
|
193 | 193 | def UserGroupForm(localizer, edit=False, old_data=None, allow_disabled=False): |
|
194 | 194 | old_data = old_data or {} |
|
195 | 195 | _ = localizer |
|
196 | 196 | |
|
197 | 197 | class _UserGroupForm(formencode.Schema): |
|
198 | 198 | allow_extra_fields = True |
|
199 | 199 | filter_extra_fields = True |
|
200 | 200 | |
|
201 | 201 | users_group_name = All( |
|
202 | 202 | v.UnicodeString(strip=True, min=1, not_empty=True), |
|
203 | 203 | v.ValidUserGroup(localizer, edit, old_data) |
|
204 | 204 | ) |
|
205 | 205 | user_group_description = v.UnicodeString(strip=True, min=1, |
|
206 | 206 | not_empty=False) |
|
207 | 207 | |
|
208 | 208 | users_group_active = v.StringBoolean(if_missing=False) |
|
209 | 209 | |
|
210 | 210 | if edit: |
|
211 | 211 | # this is user group owner |
|
212 | 212 | user = All( |
|
213 | 213 | v.UnicodeString(not_empty=True), |
|
214 | 214 | v.ValidRepoUser(localizer, allow_disabled)) |
|
215 | 215 | return _UserGroupForm |
|
216 | 216 | |
|
217 | 217 | |
|
218 | 218 | def RepoGroupForm(localizer, edit=False, old_data=None, available_groups=None, |
|
219 | 219 | can_create_in_root=False, allow_disabled=False): |
|
220 | 220 | _ = localizer |
|
221 | 221 | old_data = old_data or {} |
|
222 | 222 | available_groups = available_groups or [] |
|
223 | 223 | |
|
224 | 224 | class _RepoGroupForm(formencode.Schema): |
|
225 | 225 | allow_extra_fields = True |
|
226 | 226 | filter_extra_fields = False |
|
227 | 227 | |
|
228 | 228 | group_name = All(v.UnicodeString(strip=True, min=1, not_empty=True), |
|
229 | 229 | v.SlugifyName(localizer),) |
|
230 | 230 | group_description = v.UnicodeString(strip=True, min=1, |
|
231 | 231 | not_empty=False) |
|
232 | 232 | group_copy_permissions = v.StringBoolean(if_missing=False) |
|
233 | 233 | |
|
234 | 234 | group_parent_id = v.OneOf(available_groups, hideList=False, |
|
235 | 235 | testValueList=True, not_empty=True) |
|
236 | 236 | enable_locking = v.StringBoolean(if_missing=False) |
|
237 | 237 | chained_validators = [ |
|
238 | 238 | v.ValidRepoGroup(localizer, edit, old_data, can_create_in_root)] |
|
239 | 239 | |
|
240 | 240 | if edit: |
|
241 | 241 | # this is repo group owner |
|
242 | 242 | user = All( |
|
243 | 243 | v.UnicodeString(not_empty=True), |
|
244 | 244 | v.ValidRepoUser(localizer, allow_disabled)) |
|
245 | 245 | return _RepoGroupForm |
|
246 | 246 | |
|
247 | 247 | |
|
248 | 248 | def RegisterForm(localizer, edit=False, old_data=None): |
|
249 | 249 | _ = localizer |
|
250 | 250 | old_data = old_data or {} |
|
251 | 251 | |
|
252 | 252 | class _RegisterForm(formencode.Schema): |
|
253 | 253 | allow_extra_fields = True |
|
254 | 254 | filter_extra_fields = True |
|
255 | 255 | username = All( |
|
256 | 256 | v.ValidUsername(localizer, edit, old_data), |
|
257 | 257 | v.UnicodeString(strip=True, min=1, not_empty=True) |
|
258 | 258 | ) |
|
259 | 259 | password = All( |
|
260 | 260 | v.ValidPassword(localizer), |
|
261 | 261 | v.UnicodeString(strip=False, min=6, max=72, not_empty=True) |
|
262 | 262 | ) |
|
263 | 263 | password_confirmation = All( |
|
264 | 264 | v.ValidPassword(localizer), |
|
265 | 265 | v.UnicodeString(strip=False, min=6, max=72, not_empty=True) |
|
266 | 266 | ) |
|
267 | 267 | active = v.StringBoolean(if_missing=False) |
|
268 | 268 | firstname = v.UnicodeString(strip=True, min=1, not_empty=False) |
|
269 | 269 | lastname = v.UnicodeString(strip=True, min=1, not_empty=False) |
|
270 | 270 | email = All(v.UniqSystemEmail(localizer, old_data), v.Email(not_empty=True)) |
|
271 | 271 | |
|
272 | 272 | chained_validators = [v.ValidPasswordsMatch(localizer)] |
|
273 | 273 | return _RegisterForm |
|
274 | 274 | |
|
275 | 275 | |
|
276 | 276 | def PasswordResetForm(localizer): |
|
277 | 277 | _ = localizer |
|
278 | 278 | |
|
279 | 279 | class _PasswordResetForm(formencode.Schema): |
|
280 | 280 | allow_extra_fields = True |
|
281 | 281 | filter_extra_fields = True |
|
282 | 282 | email = All(v.ValidSystemEmail(localizer), v.Email(not_empty=True)) |
|
283 | 283 | return _PasswordResetForm |
|
284 | 284 | |
|
285 | 285 | |
|
286 | 286 | def RepoForm(localizer, edit=False, old_data=None, repo_groups=None, allow_disabled=False): |
|
287 | 287 | _ = localizer |
|
288 | 288 | old_data = old_data or {} |
|
289 | 289 | repo_groups = repo_groups or [] |
|
290 | 290 | supported_backends = BACKENDS.keys() |
|
291 | 291 | |
|
292 | 292 | class _RepoForm(formencode.Schema): |
|
293 | 293 | allow_extra_fields = True |
|
294 | 294 | filter_extra_fields = False |
|
295 | 295 | repo_name = All(v.UnicodeString(strip=True, min=1, not_empty=True), |
|
296 | 296 | v.SlugifyName(localizer), v.CannotHaveGitSuffix(localizer)) |
|
297 | 297 | repo_group = All(v.CanWriteGroup(localizer, old_data), |
|
298 | 298 | v.OneOf(repo_groups, hideList=True)) |
|
299 | 299 | repo_type = v.OneOf(supported_backends, required=False, |
|
300 | 300 | if_missing=old_data.get('repo_type')) |
|
301 | 301 | repo_description = v.UnicodeString(strip=True, min=1, not_empty=False) |
|
302 | 302 | repo_private = v.StringBoolean(if_missing=False) |
|
303 | 303 | repo_copy_permissions = v.StringBoolean(if_missing=False) |
|
304 | 304 | clone_uri = All(v.UnicodeString(strip=True, min=1, not_empty=False)) |
|
305 | 305 | |
|
306 | 306 | repo_enable_statistics = v.StringBoolean(if_missing=False) |
|
307 | 307 | repo_enable_downloads = v.StringBoolean(if_missing=False) |
|
308 | 308 | repo_enable_locking = v.StringBoolean(if_missing=False) |
|
309 | 309 | |
|
310 | 310 | if edit: |
|
311 | 311 | # this is repo owner |
|
312 | 312 | user = All( |
|
313 | 313 | v.UnicodeString(not_empty=True), |
|
314 | 314 | v.ValidRepoUser(localizer, allow_disabled)) |
|
315 | 315 | clone_uri_change = v.UnicodeString( |
|
316 | 316 | not_empty=False, if_missing=v.Missing) |
|
317 | 317 | |
|
318 | 318 | chained_validators = [v.ValidCloneUri(localizer), |
|
319 | 319 | v.ValidRepoName(localizer, edit, old_data)] |
|
320 | 320 | return _RepoForm |
|
321 | 321 | |
|
322 | 322 | |
|
323 | 323 | def RepoPermsForm(localizer): |
|
324 | 324 | _ = localizer |
|
325 | 325 | |
|
326 | 326 | class _RepoPermsForm(formencode.Schema): |
|
327 | 327 | allow_extra_fields = True |
|
328 | 328 | filter_extra_fields = False |
|
329 | 329 | chained_validators = [v.ValidPerms(localizer, type_='repo')] |
|
330 | 330 | return _RepoPermsForm |
|
331 | 331 | |
|
332 | 332 | |
|
333 | 333 | def RepoGroupPermsForm(localizer, valid_recursive_choices): |
|
334 | 334 | _ = localizer |
|
335 | 335 | |
|
336 | 336 | class _RepoGroupPermsForm(formencode.Schema): |
|
337 | 337 | allow_extra_fields = True |
|
338 | 338 | filter_extra_fields = False |
|
339 | 339 | recursive = v.OneOf(valid_recursive_choices) |
|
340 | 340 | chained_validators = [v.ValidPerms(localizer, type_='repo_group')] |
|
341 | 341 | return _RepoGroupPermsForm |
|
342 | 342 | |
|
343 | 343 | |
|
344 | 344 | def UserGroupPermsForm(localizer): |
|
345 | 345 | _ = localizer |
|
346 | 346 | |
|
347 | 347 | class _UserPermsForm(formencode.Schema): |
|
348 | 348 | allow_extra_fields = True |
|
349 | 349 | filter_extra_fields = False |
|
350 | 350 | chained_validators = [v.ValidPerms(localizer, type_='user_group')] |
|
351 | 351 | return _UserPermsForm |
|
352 | 352 | |
|
353 | 353 | |
|
354 | 354 | def RepoFieldForm(localizer): |
|
355 | 355 | _ = localizer |
|
356 | 356 | |
|
357 | 357 | class _RepoFieldForm(formencode.Schema): |
|
358 | 358 | filter_extra_fields = True |
|
359 | 359 | allow_extra_fields = True |
|
360 | 360 | |
|
361 | 361 | new_field_key = All(v.FieldKey(localizer), |
|
362 | 362 | v.UnicodeString(strip=True, min=3, not_empty=True)) |
|
363 | 363 | new_field_value = v.UnicodeString(not_empty=False, if_missing='') |
|
364 | 364 | new_field_type = v.OneOf(['str', 'unicode', 'list', 'tuple'], |
|
365 | 365 | if_missing='str') |
|
366 | 366 | new_field_label = v.UnicodeString(not_empty=False) |
|
367 | 367 | new_field_desc = v.UnicodeString(not_empty=False) |
|
368 | 368 | return _RepoFieldForm |
|
369 | 369 | |
|
370 | 370 | |
|
371 | 371 | def RepoForkForm(localizer, edit=False, old_data=None, |
|
372 | 372 | supported_backends=BACKENDS.keys(), repo_groups=None): |
|
373 | 373 | _ = localizer |
|
374 | 374 | old_data = old_data or {} |
|
375 | 375 | repo_groups = repo_groups or [] |
|
376 | 376 | |
|
377 | 377 | class _RepoForkForm(formencode.Schema): |
|
378 | 378 | allow_extra_fields = True |
|
379 | 379 | filter_extra_fields = False |
|
380 | 380 | repo_name = All(v.UnicodeString(strip=True, min=1, not_empty=True), |
|
381 | 381 | v.SlugifyName(localizer)) |
|
382 | 382 | repo_group = All(v.CanWriteGroup(localizer, ), |
|
383 | 383 | v.OneOf(repo_groups, hideList=True)) |
|
384 | 384 | repo_type = All(v.ValidForkType(localizer, old_data), v.OneOf(supported_backends)) |
|
385 | 385 | description = v.UnicodeString(strip=True, min=1, not_empty=True) |
|
386 | 386 | private = v.StringBoolean(if_missing=False) |
|
387 | 387 | copy_permissions = v.StringBoolean(if_missing=False) |
|
388 | 388 | fork_parent_id = v.UnicodeString() |
|
389 | 389 | chained_validators = [v.ValidForkName(localizer, edit, old_data)] |
|
390 | 390 | return _RepoForkForm |
|
391 | 391 | |
|
392 | 392 | |
|
393 | 393 | def ApplicationSettingsForm(localizer): |
|
394 | 394 | _ = localizer |
|
395 | 395 | |
|
396 | 396 | class _ApplicationSettingsForm(formencode.Schema): |
|
397 | 397 | allow_extra_fields = True |
|
398 | 398 | filter_extra_fields = False |
|
399 | 399 | rhodecode_title = v.UnicodeString(strip=True, max=40, not_empty=False) |
|
400 | 400 | rhodecode_realm = v.UnicodeString(strip=True, min=1, not_empty=True) |
|
401 | 401 | rhodecode_pre_code = v.UnicodeString(strip=True, min=1, not_empty=False) |
|
402 | 402 | rhodecode_post_code = v.UnicodeString(strip=True, min=1, not_empty=False) |
|
403 | 403 | rhodecode_captcha_public_key = v.UnicodeString(strip=True, min=1, not_empty=False) |
|
404 | 404 | rhodecode_captcha_private_key = v.UnicodeString(strip=True, min=1, not_empty=False) |
|
405 | 405 | rhodecode_create_personal_repo_group = v.StringBoolean(if_missing=False) |
|
406 | 406 | rhodecode_personal_repo_group_pattern = v.UnicodeString(strip=True, min=1, not_empty=False) |
|
407 | 407 | return _ApplicationSettingsForm |
|
408 | 408 | |
|
409 | 409 | |
|
410 | 410 | def ApplicationVisualisationForm(localizer): |
|
411 | 411 | from rhodecode.model.db import Repository |
|
412 | 412 | _ = localizer |
|
413 | 413 | |
|
414 | 414 | class _ApplicationVisualisationForm(formencode.Schema): |
|
415 | 415 | allow_extra_fields = True |
|
416 | 416 | filter_extra_fields = False |
|
417 | 417 | rhodecode_show_public_icon = v.StringBoolean(if_missing=False) |
|
418 | 418 | rhodecode_show_private_icon = v.StringBoolean(if_missing=False) |
|
419 | 419 | rhodecode_stylify_metatags = v.StringBoolean(if_missing=False) |
|
420 | 420 | |
|
421 | 421 | rhodecode_repository_fields = v.StringBoolean(if_missing=False) |
|
422 | 422 | rhodecode_lightweight_journal = v.StringBoolean(if_missing=False) |
|
423 | 423 | rhodecode_dashboard_items = v.Int(min=5, not_empty=True) |
|
424 | 424 | rhodecode_admin_grid_items = v.Int(min=5, not_empty=True) |
|
425 | 425 | rhodecode_show_version = v.StringBoolean(if_missing=False) |
|
426 | 426 | rhodecode_use_gravatar = v.StringBoolean(if_missing=False) |
|
427 | 427 | rhodecode_markup_renderer = v.OneOf(['markdown', 'rst']) |
|
428 | 428 | rhodecode_gravatar_url = v.UnicodeString(min=3) |
|
429 | 429 | rhodecode_clone_uri_tmpl = v.UnicodeString(not_empty=False, if_empty=Repository.DEFAULT_CLONE_URI) |
|
430 | 430 | rhodecode_clone_uri_id_tmpl = v.UnicodeString(not_empty=False, if_empty=Repository.DEFAULT_CLONE_URI_ID) |
|
431 | 431 | rhodecode_clone_uri_ssh_tmpl = v.UnicodeString(not_empty=False, if_empty=Repository.DEFAULT_CLONE_URI_SSH) |
|
432 | 432 | rhodecode_support_url = v.UnicodeString() |
|
433 | 433 | rhodecode_show_revision_number = v.StringBoolean(if_missing=False) |
|
434 | 434 | rhodecode_show_sha_length = v.Int(min=4, not_empty=True) |
|
435 | 435 | return _ApplicationVisualisationForm |
|
436 | 436 | |
|
437 | 437 | |
|
438 | 438 | class _BaseVcsSettingsForm(formencode.Schema): |
|
439 | 439 | |
|
440 | 440 | allow_extra_fields = True |
|
441 | 441 | filter_extra_fields = False |
|
442 | 442 | hooks_changegroup_repo_size = v.StringBoolean(if_missing=False) |
|
443 | 443 | hooks_changegroup_push_logger = v.StringBoolean(if_missing=False) |
|
444 | 444 | hooks_outgoing_pull_logger = v.StringBoolean(if_missing=False) |
|
445 | 445 | |
|
446 | 446 | # PR/Code-review |
|
447 | 447 | rhodecode_pr_merge_enabled = v.StringBoolean(if_missing=False) |
|
448 | 448 | rhodecode_use_outdated_comments = v.StringBoolean(if_missing=False) |
|
449 | 449 | |
|
450 | 450 | # hg |
|
451 | 451 | extensions_largefiles = v.StringBoolean(if_missing=False) |
|
452 | 452 | extensions_evolve = v.StringBoolean(if_missing=False) |
|
453 | 453 | phases_publish = v.StringBoolean(if_missing=False) |
|
454 | 454 | |
|
455 | 455 | rhodecode_hg_use_rebase_for_merging = v.StringBoolean(if_missing=False) |
|
456 | 456 | rhodecode_hg_close_branch_before_merging = v.StringBoolean(if_missing=False) |
|
457 | 457 | |
|
458 | 458 | # git |
|
459 | 459 | vcs_git_lfs_enabled = v.StringBoolean(if_missing=False) |
|
460 | 460 | rhodecode_git_use_rebase_for_merging = v.StringBoolean(if_missing=False) |
|
461 | 461 | rhodecode_git_close_branch_before_merging = v.StringBoolean(if_missing=False) |
|
462 | 462 | |
|
463 | 463 | # cache |
|
464 | 464 | rhodecode_diff_cache = v.StringBoolean(if_missing=False) |
|
465 | 465 | |
|
466 | 466 | |
|
467 | 467 | def ApplicationUiSettingsForm(localizer): |
|
468 | 468 | _ = localizer |
|
469 | 469 | |
|
470 | 470 | class _ApplicationUiSettingsForm(_BaseVcsSettingsForm): |
|
471 | web_push_ssl = v.StringBoolean(if_missing=False) | |
|
472 | 471 | extensions_hggit = v.StringBoolean(if_missing=False) |
|
473 | 472 | new_svn_branch = v.ValidSvnPattern(localizer, section='vcs_svn_branch') |
|
474 | 473 | new_svn_tag = v.ValidSvnPattern(localizer, section='vcs_svn_tag') |
|
475 | 474 | return _ApplicationUiSettingsForm |
|
476 | 475 | |
|
477 | 476 | |
|
478 | 477 | def RepoVcsSettingsForm(localizer, repo_name): |
|
479 | 478 | _ = localizer |
|
480 | 479 | |
|
481 | 480 | class _RepoVcsSettingsForm(_BaseVcsSettingsForm): |
|
482 | 481 | inherit_global_settings = v.StringBoolean(if_missing=False) |
|
483 | 482 | new_svn_branch = v.ValidSvnPattern(localizer, |
|
484 | 483 | section='vcs_svn_branch', repo_name=repo_name) |
|
485 | 484 | new_svn_tag = v.ValidSvnPattern(localizer, |
|
486 | 485 | section='vcs_svn_tag', repo_name=repo_name) |
|
487 | 486 | return _RepoVcsSettingsForm |
|
488 | 487 | |
|
489 | 488 | |
|
490 | 489 | def LabsSettingsForm(localizer): |
|
491 | 490 | _ = localizer |
|
492 | 491 | |
|
493 | 492 | class _LabSettingsForm(formencode.Schema): |
|
494 | 493 | allow_extra_fields = True |
|
495 | 494 | filter_extra_fields = False |
|
496 | 495 | return _LabSettingsForm |
|
497 | 496 | |
|
498 | 497 | |
|
499 | 498 | def ApplicationPermissionsForm( |
|
500 | 499 | localizer, register_choices, password_reset_choices, |
|
501 | 500 | extern_activate_choices): |
|
502 | 501 | _ = localizer |
|
503 | 502 | |
|
504 | 503 | class _DefaultPermissionsForm(formencode.Schema): |
|
505 | 504 | allow_extra_fields = True |
|
506 | 505 | filter_extra_fields = True |
|
507 | 506 | |
|
508 | 507 | anonymous = v.StringBoolean(if_missing=False) |
|
509 | 508 | default_register = v.OneOf(register_choices) |
|
510 | 509 | default_register_message = v.UnicodeString() |
|
511 | 510 | default_password_reset = v.OneOf(password_reset_choices) |
|
512 | 511 | default_extern_activate = v.OneOf(extern_activate_choices) |
|
513 | 512 | return _DefaultPermissionsForm |
|
514 | 513 | |
|
515 | 514 | |
|
516 | 515 | def ObjectPermissionsForm(localizer, repo_perms_choices, group_perms_choices, |
|
517 | 516 | user_group_perms_choices): |
|
518 | 517 | _ = localizer |
|
519 | 518 | |
|
520 | 519 | class _ObjectPermissionsForm(formencode.Schema): |
|
521 | 520 | allow_extra_fields = True |
|
522 | 521 | filter_extra_fields = True |
|
523 | 522 | overwrite_default_repo = v.StringBoolean(if_missing=False) |
|
524 | 523 | overwrite_default_group = v.StringBoolean(if_missing=False) |
|
525 | 524 | overwrite_default_user_group = v.StringBoolean(if_missing=False) |
|
526 | 525 | |
|
527 | 526 | default_repo_perm = v.OneOf(repo_perms_choices) |
|
528 | 527 | default_group_perm = v.OneOf(group_perms_choices) |
|
529 | 528 | default_user_group_perm = v.OneOf(user_group_perms_choices) |
|
530 | 529 | |
|
531 | 530 | return _ObjectPermissionsForm |
|
532 | 531 | |
|
533 | 532 | |
|
534 | 533 | def BranchPermissionsForm(localizer, branch_perms_choices): |
|
535 | 534 | _ = localizer |
|
536 | 535 | |
|
537 | 536 | class _BranchPermissionsForm(formencode.Schema): |
|
538 | 537 | allow_extra_fields = True |
|
539 | 538 | filter_extra_fields = True |
|
540 | 539 | overwrite_default_branch = v.StringBoolean(if_missing=False) |
|
541 | 540 | default_branch_perm = v.OneOf(branch_perms_choices) |
|
542 | 541 | |
|
543 | 542 | return _BranchPermissionsForm |
|
544 | 543 | |
|
545 | 544 | |
|
546 | 545 | def UserPermissionsForm(localizer, create_choices, create_on_write_choices, |
|
547 | 546 | repo_group_create_choices, user_group_create_choices, |
|
548 | 547 | fork_choices, inherit_default_permissions_choices): |
|
549 | 548 | _ = localizer |
|
550 | 549 | |
|
551 | 550 | class _DefaultPermissionsForm(formencode.Schema): |
|
552 | 551 | allow_extra_fields = True |
|
553 | 552 | filter_extra_fields = True |
|
554 | 553 | |
|
555 | 554 | anonymous = v.StringBoolean(if_missing=False) |
|
556 | 555 | |
|
557 | 556 | default_repo_create = v.OneOf(create_choices) |
|
558 | 557 | default_repo_create_on_write = v.OneOf(create_on_write_choices) |
|
559 | 558 | default_user_group_create = v.OneOf(user_group_create_choices) |
|
560 | 559 | default_repo_group_create = v.OneOf(repo_group_create_choices) |
|
561 | 560 | default_fork_create = v.OneOf(fork_choices) |
|
562 | 561 | default_inherit_default_permissions = v.OneOf(inherit_default_permissions_choices) |
|
563 | 562 | return _DefaultPermissionsForm |
|
564 | 563 | |
|
565 | 564 | |
|
566 | 565 | def UserIndividualPermissionsForm(localizer): |
|
567 | 566 | _ = localizer |
|
568 | 567 | |
|
569 | 568 | class _DefaultPermissionsForm(formencode.Schema): |
|
570 | 569 | allow_extra_fields = True |
|
571 | 570 | filter_extra_fields = True |
|
572 | 571 | |
|
573 | 572 | inherit_default_permissions = v.StringBoolean(if_missing=False) |
|
574 | 573 | return _DefaultPermissionsForm |
|
575 | 574 | |
|
576 | 575 | |
|
577 | 576 | def DefaultsForm(localizer, edit=False, old_data=None, supported_backends=BACKENDS.keys()): |
|
578 | 577 | _ = localizer |
|
579 | 578 | old_data = old_data or {} |
|
580 | 579 | |
|
581 | 580 | class _DefaultsForm(formencode.Schema): |
|
582 | 581 | allow_extra_fields = True |
|
583 | 582 | filter_extra_fields = True |
|
584 | 583 | default_repo_type = v.OneOf(supported_backends) |
|
585 | 584 | default_repo_private = v.StringBoolean(if_missing=False) |
|
586 | 585 | default_repo_enable_statistics = v.StringBoolean(if_missing=False) |
|
587 | 586 | default_repo_enable_downloads = v.StringBoolean(if_missing=False) |
|
588 | 587 | default_repo_enable_locking = v.StringBoolean(if_missing=False) |
|
589 | 588 | return _DefaultsForm |
|
590 | 589 | |
|
591 | 590 | |
|
592 | 591 | def AuthSettingsForm(localizer): |
|
593 | 592 | _ = localizer |
|
594 | 593 | |
|
595 | 594 | class _AuthSettingsForm(formencode.Schema): |
|
596 | 595 | allow_extra_fields = True |
|
597 | 596 | filter_extra_fields = True |
|
598 | 597 | auth_plugins = All(v.ValidAuthPlugins(localizer), |
|
599 | 598 | v.UniqueListFromString(localizer)(not_empty=True)) |
|
600 | 599 | return _AuthSettingsForm |
|
601 | 600 | |
|
602 | 601 | |
|
603 | 602 | def UserExtraEmailForm(localizer): |
|
604 | 603 | _ = localizer |
|
605 | 604 | |
|
606 | 605 | class _UserExtraEmailForm(formencode.Schema): |
|
607 | 606 | email = All(v.UniqSystemEmail(localizer), v.Email(not_empty=True)) |
|
608 | 607 | return _UserExtraEmailForm |
|
609 | 608 | |
|
610 | 609 | |
|
611 | 610 | def UserExtraIpForm(localizer): |
|
612 | 611 | _ = localizer |
|
613 | 612 | |
|
614 | 613 | class _UserExtraIpForm(formencode.Schema): |
|
615 | 614 | ip = v.ValidIp(localizer)(not_empty=True) |
|
616 | 615 | return _UserExtraIpForm |
|
617 | 616 | |
|
618 | 617 | |
|
619 | 618 | def PullRequestForm(localizer, repo_id): |
|
620 | 619 | _ = localizer |
|
621 | 620 | |
|
622 | 621 | class ReviewerForm(formencode.Schema): |
|
623 | 622 | user_id = v.Int(not_empty=True) |
|
624 | 623 | reasons = All() |
|
625 | 624 | rules = All(v.UniqueList(localizer, convert=int)()) |
|
626 | 625 | mandatory = v.StringBoolean() |
|
627 | 626 | role = v.String(if_missing='reviewer') |
|
628 | 627 | |
|
629 | 628 | class ObserverForm(formencode.Schema): |
|
630 | 629 | user_id = v.Int(not_empty=True) |
|
631 | 630 | reasons = All() |
|
632 | 631 | rules = All(v.UniqueList(localizer, convert=int)()) |
|
633 | 632 | mandatory = v.StringBoolean() |
|
634 | 633 | role = v.String(if_missing='observer') |
|
635 | 634 | |
|
636 | 635 | class _PullRequestForm(formencode.Schema): |
|
637 | 636 | allow_extra_fields = True |
|
638 | 637 | filter_extra_fields = True |
|
639 | 638 | |
|
640 | 639 | common_ancestor = v.UnicodeString(strip=True, required=True) |
|
641 | 640 | source_repo = v.UnicodeString(strip=True, required=True) |
|
642 | 641 | source_ref = v.UnicodeString(strip=True, required=True) |
|
643 | 642 | target_repo = v.UnicodeString(strip=True, required=True) |
|
644 | 643 | target_ref = v.UnicodeString(strip=True, required=True) |
|
645 | 644 | revisions = All(#v.NotReviewedRevisions(localizer, repo_id)(), |
|
646 | 645 | v.UniqueList(localizer)(not_empty=True)) |
|
647 | 646 | review_members = formencode.ForEach(ReviewerForm()) |
|
648 | 647 | observer_members = formencode.ForEach(ObserverForm()) |
|
649 | 648 | pullrequest_title = v.UnicodeString(strip=True, required=True, min=1, max=255) |
|
650 | 649 | pullrequest_desc = v.UnicodeString(strip=True, required=False) |
|
651 | 650 | description_renderer = v.UnicodeString(strip=True, required=False) |
|
652 | 651 | |
|
653 | 652 | return _PullRequestForm |
|
654 | 653 | |
|
655 | 654 | |
|
656 | 655 | def IssueTrackerPatternsForm(localizer): |
|
657 | 656 | _ = localizer |
|
658 | 657 | |
|
659 | 658 | class _IssueTrackerPatternsForm(formencode.Schema): |
|
660 | 659 | allow_extra_fields = True |
|
661 | 660 | filter_extra_fields = False |
|
662 | 661 | chained_validators = [v.ValidPattern(localizer)] |
|
663 | 662 | return _IssueTrackerPatternsForm |
@@ -1,893 +1,888 b'' | |||
|
1 | 1 | # Copyright (C) 2010-2023 RhodeCode GmbH |
|
2 | 2 | # |
|
3 | 3 | # This program is free software: you can redistribute it and/or modify |
|
4 | 4 | # it under the terms of the GNU Affero General Public License, version 3 |
|
5 | 5 | # (only), as published by the Free Software Foundation. |
|
6 | 6 | # |
|
7 | 7 | # This program is distributed in the hope that it will be useful, |
|
8 | 8 | # but WITHOUT ANY WARRANTY; without even the implied warranty of |
|
9 | 9 | # MERCHANTABILITY or FITNESS FOR A PARTICULAR PURPOSE. See the |
|
10 | 10 | # GNU General Public License for more details. |
|
11 | 11 | # |
|
12 | 12 | # You should have received a copy of the GNU Affero General Public License |
|
13 | 13 | # along with this program. If not, see <http://www.gnu.org/licenses/>. |
|
14 | 14 | # |
|
15 | 15 | # This program is dual-licensed. If you wish to learn more about the |
|
16 | 16 | # RhodeCode Enterprise Edition, including its added features, Support services, |
|
17 | 17 | # and proprietary license terms, please see https://rhodecode.com/licenses/ |
|
18 | 18 | |
|
19 | 19 | import os |
|
20 | 20 | import re |
|
21 | 21 | import logging |
|
22 | 22 | import time |
|
23 | 23 | import functools |
|
24 | 24 | from collections import namedtuple |
|
25 | 25 | |
|
26 | 26 | from pyramid.threadlocal import get_current_request |
|
27 | 27 | |
|
28 | 28 | from rhodecode.lib import rc_cache |
|
29 | 29 | from rhodecode.lib.hash_utils import sha1_safe |
|
30 | 30 | from rhodecode.lib.html_filters import sanitize_html |
|
31 | 31 | from rhodecode.lib.utils2 import ( |
|
32 | 32 | Optional, AttributeDict, safe_str, remove_prefix, str2bool) |
|
33 | 33 | from rhodecode.lib.vcs.backends import base |
|
34 | 34 | from rhodecode.lib.statsd_client import StatsdClient |
|
35 | 35 | from rhodecode.model import BaseModel |
|
36 | 36 | from rhodecode.model.db import ( |
|
37 | 37 | RepoRhodeCodeUi, RepoRhodeCodeSetting, RhodeCodeUi, RhodeCodeSetting) |
|
38 | 38 | from rhodecode.model.meta import Session |
|
39 | 39 | |
|
40 | 40 | |
|
41 | 41 | log = logging.getLogger(__name__) |
|
42 | 42 | |
|
43 | 43 | |
|
44 | 44 | UiSetting = namedtuple( |
|
45 | 45 | 'UiSetting', ['section', 'key', 'value', 'active']) |
|
46 | 46 | |
|
47 | 47 | SOCIAL_PLUGINS_LIST = ['github', 'bitbucket', 'twitter', 'google'] |
|
48 | 48 | |
|
49 | 49 | |
|
50 | 50 | class SettingNotFound(Exception): |
|
51 | 51 | def __init__(self, setting_id): |
|
52 | 52 | msg = f'Setting `{setting_id}` is not found' |
|
53 | 53 | super().__init__(msg) |
|
54 | 54 | |
|
55 | 55 | |
|
56 | 56 | class SettingsModel(BaseModel): |
|
57 | 57 | BUILTIN_HOOKS = ( |
|
58 | 58 | RhodeCodeUi.HOOK_REPO_SIZE, RhodeCodeUi.HOOK_PUSH, |
|
59 | 59 | RhodeCodeUi.HOOK_PRE_PUSH, RhodeCodeUi.HOOK_PRETX_PUSH, |
|
60 | 60 | RhodeCodeUi.HOOK_PULL, RhodeCodeUi.HOOK_PRE_PULL, |
|
61 | 61 | RhodeCodeUi.HOOK_PUSH_KEY,) |
|
62 | 62 | HOOKS_SECTION = 'hooks' |
|
63 | 63 | |
|
64 | 64 | def __init__(self, sa=None, repo=None): |
|
65 | 65 | self.repo = repo |
|
66 | 66 | self.UiDbModel = RepoRhodeCodeUi if repo else RhodeCodeUi |
|
67 | 67 | self.SettingsDbModel = ( |
|
68 | 68 | RepoRhodeCodeSetting if repo else RhodeCodeSetting) |
|
69 | 69 | super().__init__(sa) |
|
70 | 70 | |
|
71 | 71 | def get_keyname(self, key_name, prefix='rhodecode_'): |
|
72 | 72 | return f'{prefix}{key_name}' |
|
73 | 73 | |
|
74 | 74 | def get_ui_by_key(self, key): |
|
75 | 75 | q = self.UiDbModel.query() |
|
76 | 76 | q = q.filter(self.UiDbModel.ui_key == key) |
|
77 | 77 | q = self._filter_by_repo(RepoRhodeCodeUi, q) |
|
78 | 78 | return q.scalar() |
|
79 | 79 | |
|
80 | 80 | def get_ui_by_section(self, section): |
|
81 | 81 | q = self.UiDbModel.query() |
|
82 | 82 | q = q.filter(self.UiDbModel.ui_section == section) |
|
83 | 83 | q = self._filter_by_repo(RepoRhodeCodeUi, q) |
|
84 | 84 | return q.all() |
|
85 | 85 | |
|
86 | 86 | def get_ui_by_section_and_key(self, section, key): |
|
87 | 87 | q = self.UiDbModel.query() |
|
88 | 88 | q = q.filter(self.UiDbModel.ui_section == section) |
|
89 | 89 | q = q.filter(self.UiDbModel.ui_key == key) |
|
90 | 90 | q = self._filter_by_repo(RepoRhodeCodeUi, q) |
|
91 | 91 | return q.scalar() |
|
92 | 92 | |
|
93 | 93 | def get_ui(self, section=None, key=None): |
|
94 | 94 | q = self.UiDbModel.query() |
|
95 | 95 | q = self._filter_by_repo(RepoRhodeCodeUi, q) |
|
96 | 96 | |
|
97 | 97 | if section: |
|
98 | 98 | q = q.filter(self.UiDbModel.ui_section == section) |
|
99 | 99 | if key: |
|
100 | 100 | q = q.filter(self.UiDbModel.ui_key == key) |
|
101 | 101 | |
|
102 | 102 | # TODO: mikhail: add caching |
|
103 | 103 | result = [ |
|
104 | 104 | UiSetting( |
|
105 | 105 | section=safe_str(r.ui_section), key=safe_str(r.ui_key), |
|
106 | 106 | value=safe_str(r.ui_value), active=r.ui_active |
|
107 | 107 | ) |
|
108 | 108 | for r in q.all() |
|
109 | 109 | ] |
|
110 | 110 | return result |
|
111 | 111 | |
|
112 | 112 | def get_builtin_hooks(self): |
|
113 | 113 | q = self.UiDbModel.query() |
|
114 | 114 | q = q.filter(self.UiDbModel.ui_key.in_(self.BUILTIN_HOOKS)) |
|
115 | 115 | return self._get_hooks(q) |
|
116 | 116 | |
|
117 | 117 | def get_custom_hooks(self): |
|
118 | 118 | q = self.UiDbModel.query() |
|
119 | 119 | q = q.filter(~self.UiDbModel.ui_key.in_(self.BUILTIN_HOOKS)) |
|
120 | 120 | return self._get_hooks(q) |
|
121 | 121 | |
|
122 | 122 | def create_ui_section_value(self, section, val, key=None, active=True): |
|
123 | 123 | new_ui = self.UiDbModel() |
|
124 | 124 | new_ui.ui_section = section |
|
125 | 125 | new_ui.ui_value = val |
|
126 | 126 | new_ui.ui_active = active |
|
127 | 127 | |
|
128 | 128 | repository_id = '' |
|
129 | 129 | if self.repo: |
|
130 | 130 | repo = self._get_repo(self.repo) |
|
131 | 131 | repository_id = repo.repo_id |
|
132 | 132 | new_ui.repository_id = repository_id |
|
133 | 133 | |
|
134 | 134 | if not key: |
|
135 | 135 | # keys are unique so they need appended info |
|
136 | 136 | if self.repo: |
|
137 | 137 | key = sha1_safe(f'{section}{val}{repository_id}') |
|
138 | 138 | else: |
|
139 | 139 | key = sha1_safe(f'{section}{val}') |
|
140 | 140 | |
|
141 | 141 | new_ui.ui_key = key |
|
142 | 142 | |
|
143 | 143 | Session().add(new_ui) |
|
144 | 144 | return new_ui |
|
145 | 145 | |
|
146 | 146 | def create_or_update_hook(self, key, value): |
|
147 | 147 | ui = ( |
|
148 | 148 | self.get_ui_by_section_and_key(self.HOOKS_SECTION, key) or |
|
149 | 149 | self.UiDbModel()) |
|
150 | 150 | ui.ui_section = self.HOOKS_SECTION |
|
151 | 151 | ui.ui_active = True |
|
152 | 152 | ui.ui_key = key |
|
153 | 153 | ui.ui_value = value |
|
154 | 154 | |
|
155 | 155 | if self.repo: |
|
156 | 156 | repo = self._get_repo(self.repo) |
|
157 | 157 | repository_id = repo.repo_id |
|
158 | 158 | ui.repository_id = repository_id |
|
159 | 159 | |
|
160 | 160 | Session().add(ui) |
|
161 | 161 | return ui |
|
162 | 162 | |
|
163 | 163 | def delete_ui(self, id_): |
|
164 | 164 | ui = self.UiDbModel.get(id_) |
|
165 | 165 | if not ui: |
|
166 | 166 | raise SettingNotFound(id_) |
|
167 | 167 | Session().delete(ui) |
|
168 | 168 | |
|
169 | 169 | def get_setting_by_name(self, name): |
|
170 | 170 | q = self._get_settings_query() |
|
171 | 171 | q = q.filter(self.SettingsDbModel.app_settings_name == name) |
|
172 | 172 | return q.scalar() |
|
173 | 173 | |
|
174 | 174 | def create_or_update_setting( |
|
175 | 175 | self, name, val: Optional | str = Optional(''), type_: Optional | str = Optional('unicode')): |
|
176 | 176 | """ |
|
177 | 177 | Creates or updates RhodeCode setting. If updates are triggered, it will |
|
178 | 178 | only update parameters that are explicitly set Optional instance will |
|
179 | 179 | be skipped |
|
180 | 180 | |
|
181 | 181 | :param name: |
|
182 | 182 | :param val: |
|
183 | 183 | :param type_: |
|
184 | 184 | :return: |
|
185 | 185 | """ |
|
186 | 186 | |
|
187 | 187 | res = self.get_setting_by_name(name) |
|
188 | 188 | repo = self._get_repo(self.repo) if self.repo else None |
|
189 | 189 | |
|
190 | 190 | if not res: |
|
191 | 191 | val = Optional.extract(val) |
|
192 | 192 | type_ = Optional.extract(type_) |
|
193 | 193 | |
|
194 | 194 | args = ( |
|
195 | 195 | (repo.repo_id, name, val, type_) |
|
196 | 196 | if repo else (name, val, type_)) |
|
197 | 197 | res = self.SettingsDbModel(*args) |
|
198 | 198 | |
|
199 | 199 | else: |
|
200 | 200 | if self.repo: |
|
201 | 201 | res.repository_id = repo.repo_id |
|
202 | 202 | |
|
203 | 203 | res.app_settings_name = name |
|
204 | 204 | if not isinstance(type_, Optional): |
|
205 | 205 | # update if set |
|
206 | 206 | res.app_settings_type = type_ |
|
207 | 207 | if not isinstance(val, Optional): |
|
208 | 208 | # update if set |
|
209 | 209 | res.app_settings_value = val |
|
210 | 210 | |
|
211 | 211 | Session().add(res) |
|
212 | 212 | return res |
|
213 | 213 | |
|
214 | 214 | def get_cache_region(self): |
|
215 | 215 | repo = self._get_repo(self.repo) if self.repo else None |
|
216 | 216 | cache_key = f"repo.v1.{repo.repo_id}" if repo else "repo.v1.ALL" |
|
217 | 217 | cache_namespace_uid = f'cache_settings.{cache_key}' |
|
218 | 218 | region = rc_cache.get_or_create_region('cache_general', cache_namespace_uid) |
|
219 | 219 | return region, cache_namespace_uid |
|
220 | 220 | |
|
221 | 221 | def invalidate_settings_cache(self, hard=False): |
|
222 | 222 | region, namespace_key = self.get_cache_region() |
|
223 | 223 | log.debug('Invalidation cache [%s] region %s for cache_key: %s', |
|
224 | 224 | 'invalidate_settings_cache', region, namespace_key) |
|
225 | 225 | |
|
226 | 226 | # we use hard cleanup if invalidation is sent |
|
227 | 227 | rc_cache.clear_cache_namespace(region, namespace_key, method=rc_cache.CLEAR_DELETE) |
|
228 | 228 | |
|
229 | 229 | def get_cache_call_method(self, cache=True): |
|
230 | 230 | region, cache_key = self.get_cache_region() |
|
231 | 231 | |
|
232 | 232 | @region.conditional_cache_on_arguments(condition=cache) |
|
233 | 233 | def _get_all_settings(name, key): |
|
234 | 234 | q = self._get_settings_query() |
|
235 | 235 | if not q: |
|
236 | 236 | raise Exception('Could not get application settings !') |
|
237 | 237 | |
|
238 | 238 | settings = { |
|
239 | 239 | self.get_keyname(res.app_settings_name): res.app_settings_value |
|
240 | 240 | for res in q |
|
241 | 241 | } |
|
242 | 242 | return settings |
|
243 | 243 | return _get_all_settings |
|
244 | 244 | |
|
245 | 245 | def get_all_settings(self, cache=False, from_request=True): |
|
246 | 246 | # defines if we use GLOBAL, or PER_REPO |
|
247 | 247 | repo = self._get_repo(self.repo) if self.repo else None |
|
248 | 248 | |
|
249 | 249 | # initially try the request context; this is the fastest |
|
250 | 250 | # we only fetch global config, NOT for repo-specific |
|
251 | 251 | if from_request and not repo: |
|
252 | 252 | request = get_current_request() |
|
253 | 253 | |
|
254 | 254 | if request and hasattr(request, 'call_context') and hasattr(request.call_context, 'rc_config'): |
|
255 | 255 | rc_config = request.call_context.rc_config |
|
256 | 256 | if rc_config: |
|
257 | 257 | return rc_config |
|
258 | 258 | |
|
259 | 259 | _region, cache_key = self.get_cache_region() |
|
260 | 260 | _get_all_settings = self.get_cache_call_method(cache=cache) |
|
261 | 261 | |
|
262 | 262 | start = time.time() |
|
263 | 263 | result = _get_all_settings('rhodecode_settings', cache_key) |
|
264 | 264 | compute_time = time.time() - start |
|
265 | 265 | log.debug('cached method:%s took %.4fs', _get_all_settings.__name__, compute_time) |
|
266 | 266 | |
|
267 | 267 | statsd = StatsdClient.statsd |
|
268 | 268 | if statsd: |
|
269 | 269 | elapsed_time_ms = round(1000.0 * compute_time) # use ms only |
|
270 | 270 | statsd.timing("rhodecode_settings_timing.histogram", elapsed_time_ms, |
|
271 | 271 | use_decimals=False) |
|
272 | 272 | |
|
273 | 273 | log.debug('Fetching app settings for key: %s took: %.4fs: cache: %s', cache_key, compute_time, cache) |
|
274 | 274 | |
|
275 | 275 | return result |
|
276 | 276 | |
|
277 | 277 | def get_auth_settings(self): |
|
278 | 278 | q = self._get_settings_query() |
|
279 | 279 | q = q.filter( |
|
280 | 280 | self.SettingsDbModel.app_settings_name.startswith('auth_')) |
|
281 | 281 | rows = q.all() |
|
282 | 282 | auth_settings = { |
|
283 | 283 | row.app_settings_name: row.app_settings_value for row in rows} |
|
284 | 284 | return auth_settings |
|
285 | 285 | |
|
286 | 286 | def get_auth_plugins(self): |
|
287 | 287 | auth_plugins = self.get_setting_by_name("auth_plugins") |
|
288 | 288 | return auth_plugins.app_settings_value |
|
289 | 289 | |
|
290 | 290 | def get_default_repo_settings(self, strip_prefix=False): |
|
291 | 291 | q = self._get_settings_query() |
|
292 | 292 | q = q.filter( |
|
293 | 293 | self.SettingsDbModel.app_settings_name.startswith('default_')) |
|
294 | 294 | rows = q.all() |
|
295 | 295 | |
|
296 | 296 | result = {} |
|
297 | 297 | for row in rows: |
|
298 | 298 | key = row.app_settings_name |
|
299 | 299 | if strip_prefix: |
|
300 | 300 | key = remove_prefix(key, prefix='default_') |
|
301 | 301 | result.update({key: row.app_settings_value}) |
|
302 | 302 | return result |
|
303 | 303 | |
|
304 | 304 | def get_repo(self): |
|
305 | 305 | repo = self._get_repo(self.repo) |
|
306 | 306 | if not repo: |
|
307 | 307 | raise Exception( |
|
308 | 308 | f'Repository `{self.repo}` cannot be found inside the database') |
|
309 | 309 | return repo |
|
310 | 310 | |
|
311 | 311 | def _filter_by_repo(self, model, query): |
|
312 | 312 | if self.repo: |
|
313 | 313 | repo = self.get_repo() |
|
314 | 314 | query = query.filter(model.repository_id == repo.repo_id) |
|
315 | 315 | return query |
|
316 | 316 | |
|
317 | 317 | def _get_hooks(self, query): |
|
318 | 318 | query = query.filter(self.UiDbModel.ui_section == self.HOOKS_SECTION) |
|
319 | 319 | query = self._filter_by_repo(RepoRhodeCodeUi, query) |
|
320 | 320 | return query.all() |
|
321 | 321 | |
|
322 | 322 | def _get_settings_query(self): |
|
323 | 323 | q = self.SettingsDbModel.query() |
|
324 | 324 | return self._filter_by_repo(RepoRhodeCodeSetting, q) |
|
325 | 325 | |
|
326 | 326 | def list_enabled_social_plugins(self, settings): |
|
327 | 327 | enabled = [] |
|
328 | 328 | for plug in SOCIAL_PLUGINS_LIST: |
|
329 | 329 | if str2bool(settings.get(f'rhodecode_auth_{plug}_enabled')): |
|
330 | 330 | enabled.append(plug) |
|
331 | 331 | return enabled |
|
332 | 332 | |
|
333 | 333 | |
|
334 | 334 | def assert_repo_settings(func): |
|
335 | 335 | @functools.wraps(func) |
|
336 | 336 | def _wrapper(self, *args, **kwargs): |
|
337 | 337 | if not self.repo_settings: |
|
338 | 338 | raise Exception('Repository is not specified') |
|
339 | 339 | return func(self, *args, **kwargs) |
|
340 | 340 | return _wrapper |
|
341 | 341 | |
|
342 | 342 | |
|
343 | 343 | class IssueTrackerSettingsModel(object): |
|
344 | 344 | INHERIT_SETTINGS = 'inherit_issue_tracker_settings' |
|
345 | 345 | SETTINGS_PREFIX = 'issuetracker_' |
|
346 | 346 | |
|
347 | 347 | def __init__(self, sa=None, repo=None): |
|
348 | 348 | self.global_settings = SettingsModel(sa=sa) |
|
349 | 349 | self.repo_settings = SettingsModel(sa=sa, repo=repo) if repo else None |
|
350 | 350 | |
|
351 | 351 | @property |
|
352 | 352 | def inherit_global_settings(self): |
|
353 | 353 | if not self.repo_settings: |
|
354 | 354 | return True |
|
355 | 355 | setting = self.repo_settings.get_setting_by_name(self.INHERIT_SETTINGS) |
|
356 | 356 | return setting.app_settings_value if setting else True |
|
357 | 357 | |
|
358 | 358 | @inherit_global_settings.setter |
|
359 | 359 | def inherit_global_settings(self, value): |
|
360 | 360 | if self.repo_settings: |
|
361 | 361 | settings = self.repo_settings.create_or_update_setting( |
|
362 | 362 | self.INHERIT_SETTINGS, value, type_='bool') |
|
363 | 363 | Session().add(settings) |
|
364 | 364 | |
|
365 | 365 | def _get_keyname(self, key, uid, prefix='rhodecode_'): |
|
366 | 366 | return f'{prefix}{self.SETTINGS_PREFIX}{key}_{uid}' |
|
367 | 367 | |
|
368 | 368 | def _make_dict_for_settings(self, qs): |
|
369 | 369 | prefix_match = self._get_keyname('pat', '',) |
|
370 | 370 | |
|
371 | 371 | issuetracker_entries = {} |
|
372 | 372 | # create keys |
|
373 | 373 | for k, v in qs.items(): |
|
374 | 374 | if k.startswith(prefix_match): |
|
375 | 375 | uid = k[len(prefix_match):] |
|
376 | 376 | issuetracker_entries[uid] = None |
|
377 | 377 | |
|
378 | 378 | def url_cleaner(input_str): |
|
379 | 379 | input_str = input_str.replace('"', '').replace("'", '') |
|
380 | 380 | input_str = sanitize_html(input_str, strip=True) |
|
381 | 381 | return input_str |
|
382 | 382 | |
|
383 | 383 | # populate |
|
384 | 384 | for uid in issuetracker_entries: |
|
385 | 385 | url_data = qs.get(self._get_keyname('url', uid)) |
|
386 | 386 | |
|
387 | 387 | pat = qs.get(self._get_keyname('pat', uid)) |
|
388 | 388 | try: |
|
389 | 389 | pat_compiled = re.compile(r'%s' % pat) |
|
390 | 390 | except re.error: |
|
391 | 391 | pat_compiled = None |
|
392 | 392 | |
|
393 | 393 | issuetracker_entries[uid] = AttributeDict({ |
|
394 | 394 | 'pat': pat, |
|
395 | 395 | 'pat_compiled': pat_compiled, |
|
396 | 396 | 'url': url_cleaner( |
|
397 | 397 | qs.get(self._get_keyname('url', uid)) or ''), |
|
398 | 398 | 'pref': sanitize_html( |
|
399 | 399 | qs.get(self._get_keyname('pref', uid)) or ''), |
|
400 | 400 | 'desc': qs.get( |
|
401 | 401 | self._get_keyname('desc', uid)), |
|
402 | 402 | }) |
|
403 | 403 | |
|
404 | 404 | return issuetracker_entries |
|
405 | 405 | |
|
406 | 406 | def get_global_settings(self, cache=False): |
|
407 | 407 | """ |
|
408 | 408 | Returns list of global issue tracker settings |
|
409 | 409 | """ |
|
410 | 410 | defaults = self.global_settings.get_all_settings(cache=cache) |
|
411 | 411 | settings = self._make_dict_for_settings(defaults) |
|
412 | 412 | return settings |
|
413 | 413 | |
|
414 | 414 | def get_repo_settings(self, cache=False): |
|
415 | 415 | """ |
|
416 | 416 | Returns list of issue tracker settings per repository |
|
417 | 417 | """ |
|
418 | 418 | if not self.repo_settings: |
|
419 | 419 | raise Exception('Repository is not specified') |
|
420 | 420 | all_settings = self.repo_settings.get_all_settings(cache=cache) |
|
421 | 421 | settings = self._make_dict_for_settings(all_settings) |
|
422 | 422 | return settings |
|
423 | 423 | |
|
424 | 424 | def get_settings(self, cache=False): |
|
425 | 425 | if self.inherit_global_settings: |
|
426 | 426 | return self.get_global_settings(cache=cache) |
|
427 | 427 | else: |
|
428 | 428 | return self.get_repo_settings(cache=cache) |
|
429 | 429 | |
|
430 | 430 | def delete_entries(self, uid): |
|
431 | 431 | if self.repo_settings: |
|
432 | 432 | all_patterns = self.get_repo_settings() |
|
433 | 433 | settings_model = self.repo_settings |
|
434 | 434 | else: |
|
435 | 435 | all_patterns = self.get_global_settings() |
|
436 | 436 | settings_model = self.global_settings |
|
437 | 437 | entries = all_patterns.get(uid, []) |
|
438 | 438 | |
|
439 | 439 | for del_key in entries: |
|
440 | 440 | setting_name = self._get_keyname(del_key, uid, prefix='') |
|
441 | 441 | entry = settings_model.get_setting_by_name(setting_name) |
|
442 | 442 | if entry: |
|
443 | 443 | Session().delete(entry) |
|
444 | 444 | |
|
445 | 445 | Session().commit() |
|
446 | 446 | |
|
447 | 447 | def create_or_update_setting( |
|
448 | 448 | self, name, val=Optional(''), type_=Optional('unicode')): |
|
449 | 449 | if self.repo_settings: |
|
450 | 450 | setting = self.repo_settings.create_or_update_setting( |
|
451 | 451 | name, val, type_) |
|
452 | 452 | else: |
|
453 | 453 | setting = self.global_settings.create_or_update_setting( |
|
454 | 454 | name, val, type_) |
|
455 | 455 | return setting |
|
456 | 456 | |
|
457 | 457 | |
|
458 | 458 | class VcsSettingsModel(object): |
|
459 | 459 | |
|
460 | 460 | INHERIT_SETTINGS = 'inherit_vcs_settings' |
|
461 | 461 | GENERAL_SETTINGS = ( |
|
462 | 462 | 'use_outdated_comments', |
|
463 | 463 | 'pr_merge_enabled', |
|
464 | 464 | 'hg_use_rebase_for_merging', |
|
465 | 465 | 'hg_close_branch_before_merging', |
|
466 | 466 | 'git_use_rebase_for_merging', |
|
467 | 467 | 'git_close_branch_before_merging', |
|
468 | 468 | 'diff_cache', |
|
469 | 469 | ) |
|
470 | 470 | |
|
471 | 471 | HOOKS_SETTINGS = ( |
|
472 | 472 | ('hooks', 'changegroup.repo_size'), |
|
473 | 473 | ('hooks', 'changegroup.push_logger'), |
|
474 | 474 | ('hooks', 'outgoing.pull_logger'), |
|
475 | 475 | ) |
|
476 | 476 | HG_SETTINGS = ( |
|
477 | 477 | ('extensions', 'largefiles'), |
|
478 | 478 | ('phases', 'publish'), |
|
479 | 479 | ('extensions', 'evolve'), |
|
480 | 480 | ('extensions', 'topic'), |
|
481 | 481 | ('experimental', 'evolution'), |
|
482 | 482 | ('experimental', 'evolution.exchange'), |
|
483 | 483 | ) |
|
484 | 484 | GIT_SETTINGS = ( |
|
485 | 485 | ('vcs_git_lfs', 'enabled'), |
|
486 | 486 | ) |
|
487 | 487 | GLOBAL_HG_SETTINGS = ( |
|
488 | 488 | ('extensions', 'largefiles'), |
|
489 | 489 | ('phases', 'publish'), |
|
490 | 490 | ('extensions', 'evolve'), |
|
491 | 491 | ('extensions', 'topic'), |
|
492 | 492 | ('experimental', 'evolution'), |
|
493 | 493 | ('experimental', 'evolution.exchange'), |
|
494 | 494 | ) |
|
495 | 495 | |
|
496 | 496 | GLOBAL_GIT_SETTINGS = ( |
|
497 | 497 | ('vcs_git_lfs', 'enabled'), |
|
498 | 498 | ) |
|
499 | 499 | |
|
500 | 500 | SVN_BRANCH_SECTION = 'vcs_svn_branch' |
|
501 | 501 | SVN_TAG_SECTION = 'vcs_svn_tag' |
|
502 | SSL_SETTING = ('web', 'push_ssl') | |
|
503 | 502 | PATH_SETTING = ('paths', '/') |
|
504 | 503 | |
|
505 | 504 | def __init__(self, sa=None, repo=None): |
|
506 | 505 | self.global_settings = SettingsModel(sa=sa) |
|
507 | 506 | self.repo_settings = SettingsModel(sa=sa, repo=repo) if repo else None |
|
508 | 507 | self._ui_settings = ( |
|
509 | 508 | self.HG_SETTINGS + self.GIT_SETTINGS + self.HOOKS_SETTINGS) |
|
510 | 509 | self._svn_sections = (self.SVN_BRANCH_SECTION, self.SVN_TAG_SECTION) |
|
511 | 510 | |
|
512 | 511 | @property |
|
513 | 512 | @assert_repo_settings |
|
514 | 513 | def inherit_global_settings(self): |
|
515 | 514 | setting = self.repo_settings.get_setting_by_name(self.INHERIT_SETTINGS) |
|
516 | 515 | return setting.app_settings_value if setting else True |
|
517 | 516 | |
|
518 | 517 | @inherit_global_settings.setter |
|
519 | 518 | @assert_repo_settings |
|
520 | 519 | def inherit_global_settings(self, value): |
|
521 | 520 | self.repo_settings.create_or_update_setting( |
|
522 | 521 | self.INHERIT_SETTINGS, value, type_='bool') |
|
523 | 522 | |
|
524 | 523 | def get_keyname(self, key_name, prefix='rhodecode_'): |
|
525 | 524 | return f'{prefix}{key_name}' |
|
526 | 525 | |
|
527 | 526 | def get_global_svn_branch_patterns(self): |
|
528 | 527 | return self.global_settings.get_ui_by_section(self.SVN_BRANCH_SECTION) |
|
529 | 528 | |
|
530 | 529 | @assert_repo_settings |
|
531 | 530 | def get_repo_svn_branch_patterns(self): |
|
532 | 531 | return self.repo_settings.get_ui_by_section(self.SVN_BRANCH_SECTION) |
|
533 | 532 | |
|
534 | 533 | def get_global_svn_tag_patterns(self): |
|
535 | 534 | return self.global_settings.get_ui_by_section(self.SVN_TAG_SECTION) |
|
536 | 535 | |
|
537 | 536 | @assert_repo_settings |
|
538 | 537 | def get_repo_svn_tag_patterns(self): |
|
539 | 538 | return self.repo_settings.get_ui_by_section(self.SVN_TAG_SECTION) |
|
540 | 539 | |
|
541 | 540 | def get_global_settings(self): |
|
542 | 541 | return self._collect_all_settings(global_=True) |
|
543 | 542 | |
|
544 | 543 | @assert_repo_settings |
|
545 | 544 | def get_repo_settings(self): |
|
546 | 545 | return self._collect_all_settings(global_=False) |
|
547 | 546 | |
|
548 | 547 | @assert_repo_settings |
|
549 | 548 | def get_repo_settings_inherited(self): |
|
550 | 549 | global_settings = self.get_global_settings() |
|
551 | 550 | global_settings.update(self.get_repo_settings()) |
|
552 | 551 | return global_settings |
|
553 | 552 | |
|
554 | 553 | @assert_repo_settings |
|
555 | 554 | def create_or_update_repo_settings( |
|
556 | 555 | self, data, inherit_global_settings=False): |
|
557 | 556 | from rhodecode.model.scm import ScmModel |
|
558 | 557 | |
|
559 | 558 | self.inherit_global_settings = inherit_global_settings |
|
560 | 559 | |
|
561 | 560 | repo = self.repo_settings.get_repo() |
|
562 | 561 | if not inherit_global_settings: |
|
563 | 562 | if repo.repo_type == 'svn': |
|
564 | 563 | self.create_repo_svn_settings(data) |
|
565 | 564 | else: |
|
566 | 565 | self.create_or_update_repo_hook_settings(data) |
|
567 | 566 | self.create_or_update_repo_pr_settings(data) |
|
568 | 567 | |
|
569 | 568 | if repo.repo_type == 'hg': |
|
570 | 569 | self.create_or_update_repo_hg_settings(data) |
|
571 | 570 | |
|
572 | 571 | if repo.repo_type == 'git': |
|
573 | 572 | self.create_or_update_repo_git_settings(data) |
|
574 | 573 | |
|
575 | 574 | ScmModel().mark_for_invalidation(repo.repo_name, delete=True) |
|
576 | 575 | |
|
577 | 576 | @assert_repo_settings |
|
578 | 577 | def create_or_update_repo_hook_settings(self, data): |
|
579 | 578 | for section, key in self.HOOKS_SETTINGS: |
|
580 | 579 | data_key = self._get_form_ui_key(section, key) |
|
581 | 580 | if data_key not in data: |
|
582 | 581 | raise ValueError( |
|
583 | 582 | f'The given data does not contain {data_key} key') |
|
584 | 583 | |
|
585 | 584 | active = data.get(data_key) |
|
586 | 585 | repo_setting = self.repo_settings.get_ui_by_section_and_key( |
|
587 | 586 | section, key) |
|
588 | 587 | if not repo_setting: |
|
589 | 588 | global_setting = self.global_settings.\ |
|
590 | 589 | get_ui_by_section_and_key(section, key) |
|
591 | 590 | self.repo_settings.create_ui_section_value( |
|
592 | 591 | section, global_setting.ui_value, key=key, active=active) |
|
593 | 592 | else: |
|
594 | 593 | repo_setting.ui_active = active |
|
595 | 594 | Session().add(repo_setting) |
|
596 | 595 | |
|
597 | 596 | def update_global_hook_settings(self, data): |
|
598 | 597 | for section, key in self.HOOKS_SETTINGS: |
|
599 | 598 | data_key = self._get_form_ui_key(section, key) |
|
600 | 599 | if data_key not in data: |
|
601 | 600 | raise ValueError( |
|
602 | 601 | f'The given data does not contain {data_key} key') |
|
603 | 602 | active = data.get(data_key) |
|
604 | 603 | repo_setting = self.global_settings.get_ui_by_section_and_key( |
|
605 | 604 | section, key) |
|
606 | 605 | repo_setting.ui_active = active |
|
607 | 606 | Session().add(repo_setting) |
|
608 | 607 | |
|
609 | 608 | @assert_repo_settings |
|
610 | 609 | def create_or_update_repo_pr_settings(self, data): |
|
611 | 610 | return self._create_or_update_general_settings( |
|
612 | 611 | self.repo_settings, data) |
|
613 | 612 | |
|
614 | 613 | def create_or_update_global_pr_settings(self, data): |
|
615 | 614 | return self._create_or_update_general_settings( |
|
616 | 615 | self.global_settings, data) |
|
617 | 616 | |
|
618 | 617 | @assert_repo_settings |
|
619 | 618 | def create_repo_svn_settings(self, data): |
|
620 | 619 | return self._create_svn_settings(self.repo_settings, data) |
|
621 | 620 | |
|
622 | 621 | def _set_evolution(self, settings, is_enabled): |
|
623 | 622 | if is_enabled: |
|
624 | 623 | # if evolve is active set evolution=all |
|
625 | 624 | |
|
626 | 625 | self._create_or_update_ui( |
|
627 | 626 | settings, *('experimental', 'evolution'), value='all', |
|
628 | 627 | active=True) |
|
629 | 628 | self._create_or_update_ui( |
|
630 | 629 | settings, *('experimental', 'evolution.exchange'), value='yes', |
|
631 | 630 | active=True) |
|
632 | 631 | # if evolve is active set topics server support |
|
633 | 632 | self._create_or_update_ui( |
|
634 | 633 | settings, *('extensions', 'topic'), value='', |
|
635 | 634 | active=True) |
|
636 | 635 | |
|
637 | 636 | else: |
|
638 | 637 | self._create_or_update_ui( |
|
639 | 638 | settings, *('experimental', 'evolution'), value='', |
|
640 | 639 | active=False) |
|
641 | 640 | self._create_or_update_ui( |
|
642 | 641 | settings, *('experimental', 'evolution.exchange'), value='no', |
|
643 | 642 | active=False) |
|
644 | 643 | self._create_or_update_ui( |
|
645 | 644 | settings, *('extensions', 'topic'), value='', |
|
646 | 645 | active=False) |
|
647 | 646 | |
|
648 | 647 | @assert_repo_settings |
|
649 | 648 | def create_or_update_repo_hg_settings(self, data): |
|
650 | 649 | largefiles, phases, evolve = \ |
|
651 | 650 | self.HG_SETTINGS[:3] |
|
652 | 651 | largefiles_key, phases_key, evolve_key = \ |
|
653 | 652 | self._get_settings_keys(self.HG_SETTINGS[:3], data) |
|
654 | 653 | |
|
655 | 654 | self._create_or_update_ui( |
|
656 | 655 | self.repo_settings, *largefiles, value='', |
|
657 | 656 | active=data[largefiles_key]) |
|
658 | 657 | self._create_or_update_ui( |
|
659 | 658 | self.repo_settings, *evolve, value='', |
|
660 | 659 | active=data[evolve_key]) |
|
661 | 660 | self._set_evolution(self.repo_settings, is_enabled=data[evolve_key]) |
|
662 | 661 | |
|
663 | 662 | self._create_or_update_ui( |
|
664 | 663 | self.repo_settings, *phases, value=safe_str(data[phases_key])) |
|
665 | 664 | |
|
666 | 665 | def create_or_update_global_hg_settings(self, data): |
|
667 | 666 | opts_len = 3 |
|
668 | 667 | largefiles, phases, evolve \ |
|
669 | 668 | = self.GLOBAL_HG_SETTINGS[:opts_len] |
|
670 | 669 | largefiles_key, phases_key, evolve_key \ |
|
671 | 670 | = self._get_settings_keys(self.GLOBAL_HG_SETTINGS[:opts_len], data) |
|
672 | 671 | |
|
673 | 672 | self._create_or_update_ui( |
|
674 | 673 | self.global_settings, *largefiles, value='', |
|
675 | 674 | active=data[largefiles_key]) |
|
676 | 675 | self._create_or_update_ui( |
|
677 | 676 | self.global_settings, *phases, value=safe_str(data[phases_key])) |
|
678 | 677 | self._create_or_update_ui( |
|
679 | 678 | self.global_settings, *evolve, value='', |
|
680 | 679 | active=data[evolve_key]) |
|
681 | 680 | self._set_evolution(self.global_settings, is_enabled=data[evolve_key]) |
|
682 | 681 | |
|
683 | 682 | def create_or_update_repo_git_settings(self, data): |
|
684 | 683 | # NOTE(marcink): # comma makes unpack work properly |
|
685 | 684 | lfs_enabled, \ |
|
686 | 685 | = self.GIT_SETTINGS |
|
687 | 686 | |
|
688 | 687 | lfs_enabled_key, \ |
|
689 | 688 | = self._get_settings_keys(self.GIT_SETTINGS, data) |
|
690 | 689 | |
|
691 | 690 | self._create_or_update_ui( |
|
692 | 691 | self.repo_settings, *lfs_enabled, value=data[lfs_enabled_key], |
|
693 | 692 | active=data[lfs_enabled_key]) |
|
694 | 693 | |
|
695 | 694 | def create_or_update_global_git_settings(self, data): |
|
696 | 695 | lfs_enabled = self.GLOBAL_GIT_SETTINGS[0] |
|
697 | 696 | lfs_enabled_key = self._get_settings_keys(self.GLOBAL_GIT_SETTINGS, data)[0] |
|
698 | 697 | |
|
699 | 698 | self._create_or_update_ui( |
|
700 | 699 | self.global_settings, *lfs_enabled, value=data[lfs_enabled_key], |
|
701 | 700 | active=data[lfs_enabled_key]) |
|
702 | 701 | |
|
703 | 702 | def create_or_update_global_svn_settings(self, data): |
|
704 | 703 | # branch/tags patterns |
|
705 | 704 | self._create_svn_settings(self.global_settings, data) |
|
706 | 705 | |
|
707 | def update_global_ssl_setting(self, value): | |
|
708 | self._create_or_update_ui( | |
|
709 | self.global_settings, *self.SSL_SETTING, value=value) | |
|
710 | ||
|
711 | 706 | @assert_repo_settings |
|
712 | 707 | def delete_repo_svn_pattern(self, id_): |
|
713 | 708 | ui = self.repo_settings.UiDbModel.get(id_) |
|
714 | 709 | if ui and ui.repository.repo_name == self.repo_settings.repo: |
|
715 | 710 | # only delete if it's the same repo as initialized settings |
|
716 | 711 | self.repo_settings.delete_ui(id_) |
|
717 | 712 | else: |
|
718 | 713 | # raise error as if we wouldn't find this option |
|
719 | 714 | self.repo_settings.delete_ui(-1) |
|
720 | 715 | |
|
721 | 716 | def delete_global_svn_pattern(self, id_): |
|
722 | 717 | self.global_settings.delete_ui(id_) |
|
723 | 718 | |
|
724 | 719 | @assert_repo_settings |
|
725 | 720 | def get_repo_ui_settings(self, section=None, key=None): |
|
726 | 721 | global_uis = self.global_settings.get_ui(section, key) |
|
727 | 722 | repo_uis = self.repo_settings.get_ui(section, key) |
|
728 | 723 | |
|
729 | 724 | filtered_repo_uis = self._filter_ui_settings(repo_uis) |
|
730 | 725 | filtered_repo_uis_keys = [ |
|
731 | 726 | (s.section, s.key) for s in filtered_repo_uis] |
|
732 | 727 | |
|
733 | 728 | def _is_global_ui_filtered(ui): |
|
734 | 729 | return ( |
|
735 | 730 | (ui.section, ui.key) in filtered_repo_uis_keys |
|
736 | 731 | or ui.section in self._svn_sections) |
|
737 | 732 | |
|
738 | 733 | filtered_global_uis = [ |
|
739 | 734 | ui for ui in global_uis if not _is_global_ui_filtered(ui)] |
|
740 | 735 | |
|
741 | 736 | return filtered_global_uis + filtered_repo_uis |
|
742 | 737 | |
|
743 | 738 | def get_global_ui_settings(self, section=None, key=None): |
|
744 | 739 | return self.global_settings.get_ui(section, key) |
|
745 | 740 | |
|
746 | 741 | def get_ui_settings_as_config_obj(self, section=None, key=None): |
|
747 | 742 | config = base.Config() |
|
748 | 743 | |
|
749 | 744 | ui_settings = self.get_ui_settings(section=section, key=key) |
|
750 | 745 | |
|
751 | 746 | for entry in ui_settings: |
|
752 | 747 | config.set(entry.section, entry.key, entry.value) |
|
753 | 748 | |
|
754 | 749 | return config |
|
755 | 750 | |
|
756 | 751 | def get_ui_settings(self, section=None, key=None): |
|
757 | 752 | if not self.repo_settings or self.inherit_global_settings: |
|
758 | 753 | return self.get_global_ui_settings(section, key) |
|
759 | 754 | else: |
|
760 | 755 | return self.get_repo_ui_settings(section, key) |
|
761 | 756 | |
|
762 | 757 | def get_svn_patterns(self, section=None): |
|
763 | 758 | if not self.repo_settings: |
|
764 | 759 | return self.get_global_ui_settings(section) |
|
765 | 760 | else: |
|
766 | 761 | return self.get_repo_ui_settings(section) |
|
767 | 762 | |
|
768 | 763 | @assert_repo_settings |
|
769 | 764 | def get_repo_general_settings(self): |
|
770 | 765 | global_settings = self.global_settings.get_all_settings() |
|
771 | 766 | repo_settings = self.repo_settings.get_all_settings() |
|
772 | 767 | filtered_repo_settings = self._filter_general_settings(repo_settings) |
|
773 | 768 | global_settings.update(filtered_repo_settings) |
|
774 | 769 | return global_settings |
|
775 | 770 | |
|
776 | 771 | def get_global_general_settings(self): |
|
777 | 772 | return self.global_settings.get_all_settings() |
|
778 | 773 | |
|
779 | 774 | def get_general_settings(self): |
|
780 | 775 | if not self.repo_settings or self.inherit_global_settings: |
|
781 | 776 | return self.get_global_general_settings() |
|
782 | 777 | else: |
|
783 | 778 | return self.get_repo_general_settings() |
|
784 | 779 | |
|
785 | 780 | def _filter_ui_settings(self, settings): |
|
786 | 781 | filtered_settings = [ |
|
787 | 782 | s for s in settings if self._should_keep_setting(s)] |
|
788 | 783 | return filtered_settings |
|
789 | 784 | |
|
790 | 785 | def _should_keep_setting(self, setting): |
|
791 | 786 | keep = ( |
|
792 | 787 | (setting.section, setting.key) in self._ui_settings or |
|
793 | 788 | setting.section in self._svn_sections) |
|
794 | 789 | return keep |
|
795 | 790 | |
|
796 | 791 | def _filter_general_settings(self, settings): |
|
797 | 792 | keys = [self.get_keyname(key) for key in self.GENERAL_SETTINGS] |
|
798 | 793 | return { |
|
799 | 794 | k: settings[k] |
|
800 | 795 | for k in settings if k in keys} |
|
801 | 796 | |
|
802 | 797 | def _collect_all_settings(self, global_=False): |
|
803 | 798 | settings = self.global_settings if global_ else self.repo_settings |
|
804 | 799 | result = {} |
|
805 | 800 | |
|
806 | 801 | for section, key in self._ui_settings: |
|
807 | 802 | ui = settings.get_ui_by_section_and_key(section, key) |
|
808 | 803 | result_key = self._get_form_ui_key(section, key) |
|
809 | 804 | |
|
810 | 805 | if ui: |
|
811 | 806 | if section in ('hooks', 'extensions'): |
|
812 | 807 | result[result_key] = ui.ui_active |
|
813 | 808 | elif result_key in ['vcs_git_lfs_enabled']: |
|
814 | 809 | result[result_key] = ui.ui_active |
|
815 | 810 | else: |
|
816 | 811 | result[result_key] = ui.ui_value |
|
817 | 812 | |
|
818 | 813 | for name in self.GENERAL_SETTINGS: |
|
819 | 814 | setting = settings.get_setting_by_name(name) |
|
820 | 815 | if setting: |
|
821 | 816 | result_key = self.get_keyname(name) |
|
822 | 817 | result[result_key] = setting.app_settings_value |
|
823 | 818 | |
|
824 | 819 | return result |
|
825 | 820 | |
|
826 | 821 | def _get_form_ui_key(self, section, key): |
|
827 | 822 | return '{section}_{key}'.format( |
|
828 | 823 | section=section, key=key.replace('.', '_')) |
|
829 | 824 | |
|
830 | 825 | def _create_or_update_ui( |
|
831 | 826 | self, settings, section, key, value=None, active=None): |
|
832 | 827 | ui = settings.get_ui_by_section_and_key(section, key) |
|
833 | 828 | if not ui: |
|
834 | 829 | active = True if active is None else active |
|
835 | 830 | settings.create_ui_section_value( |
|
836 | 831 | section, value, key=key, active=active) |
|
837 | 832 | else: |
|
838 | 833 | if active is not None: |
|
839 | 834 | ui.ui_active = active |
|
840 | 835 | if value is not None: |
|
841 | 836 | ui.ui_value = value |
|
842 | 837 | Session().add(ui) |
|
843 | 838 | |
|
844 | 839 | def _create_svn_settings(self, settings, data): |
|
845 | 840 | svn_settings = { |
|
846 | 841 | 'new_svn_branch': self.SVN_BRANCH_SECTION, |
|
847 | 842 | 'new_svn_tag': self.SVN_TAG_SECTION |
|
848 | 843 | } |
|
849 | 844 | for key in svn_settings: |
|
850 | 845 | if data.get(key): |
|
851 | 846 | settings.create_ui_section_value(svn_settings[key], data[key]) |
|
852 | 847 | |
|
853 | 848 | def _create_or_update_general_settings(self, settings, data): |
|
854 | 849 | for name in self.GENERAL_SETTINGS: |
|
855 | 850 | data_key = self.get_keyname(name) |
|
856 | 851 | if data_key not in data: |
|
857 | 852 | raise ValueError( |
|
858 | 853 | f'The given data does not contain {data_key} key') |
|
859 | 854 | setting = settings.create_or_update_setting( |
|
860 | 855 | name, data[data_key], 'bool') |
|
861 | 856 | Session().add(setting) |
|
862 | 857 | |
|
863 | 858 | def _get_settings_keys(self, settings, data): |
|
864 | 859 | data_keys = [self._get_form_ui_key(*s) for s in settings] |
|
865 | 860 | for data_key in data_keys: |
|
866 | 861 | if data_key not in data: |
|
867 | 862 | raise ValueError( |
|
868 | 863 | f'The given data does not contain {data_key} key') |
|
869 | 864 | return data_keys |
|
870 | 865 | |
|
871 | 866 | def create_largeobjects_dirs_if_needed(self, repo_store_path): |
|
872 | 867 | """ |
|
873 | 868 | This is subscribed to the `pyramid.events.ApplicationCreated` event. It |
|
874 | 869 | does a repository scan if enabled in the settings. |
|
875 | 870 | """ |
|
876 | 871 | |
|
877 | 872 | from rhodecode.lib.vcs.backends.hg import largefiles_store |
|
878 | 873 | from rhodecode.lib.vcs.backends.git import lfs_store |
|
879 | 874 | |
|
880 | 875 | paths = [ |
|
881 | 876 | largefiles_store(repo_store_path), |
|
882 | 877 | lfs_store(repo_store_path)] |
|
883 | 878 | |
|
884 | 879 | for path in paths: |
|
885 | 880 | if os.path.isdir(path): |
|
886 | 881 | continue |
|
887 | 882 | if os.path.isfile(path): |
|
888 | 883 | continue |
|
889 | 884 | # not a file nor dir, we try to create it |
|
890 | 885 | try: |
|
891 | 886 | os.makedirs(path) |
|
892 | 887 | except Exception: |
|
893 | 888 | log.warning('Failed to create largefiles dir:%s', path) |
@@ -1,399 +1,414 b'' | |||
|
1 | 1 | # Copyright (C) 2010-2023 RhodeCode GmbH |
|
2 | 2 | # |
|
3 | 3 | # This program is free software: you can redistribute it and/or modify |
|
4 | 4 | # it under the terms of the GNU Affero General Public License, version 3 |
|
5 | 5 | # (only), as published by the Free Software Foundation. |
|
6 | 6 | # |
|
7 | 7 | # This program is distributed in the hope that it will be useful, |
|
8 | 8 | # but WITHOUT ANY WARRANTY; without even the implied warranty of |
|
9 | 9 | # MERCHANTABILITY or FITNESS FOR A PARTICULAR PURPOSE. See the |
|
10 | 10 | # GNU General Public License for more details. |
|
11 | 11 | # |
|
12 | 12 | # You should have received a copy of the GNU Affero General Public License |
|
13 | 13 | # along with this program. If not, see <http://www.gnu.org/licenses/>. |
|
14 | 14 | # |
|
15 | 15 | # This program is dual-licensed. If you wish to learn more about the |
|
16 | 16 | # RhodeCode Enterprise Edition, including its added features, Support services, |
|
17 | 17 | # and proprietary license terms, please see https://rhodecode.com/licenses/ |
|
18 | 18 | import io |
|
19 | 19 | import shlex |
|
20 | 20 | |
|
21 | 21 | import math |
|
22 | 22 | import re |
|
23 | 23 | import os |
|
24 | 24 | import datetime |
|
25 | 25 | import logging |
|
26 | 26 | import queue |
|
27 | 27 | import subprocess |
|
28 | 28 | |
|
29 | 29 | |
|
30 | 30 | from dateutil.parser import parse |
|
31 | 31 | from pyramid.interfaces import IRoutesMapper |
|
32 | 32 | from pyramid.settings import asbool |
|
33 | 33 | from pyramid.path import AssetResolver |
|
34 | 34 | from threading import Thread |
|
35 | 35 | |
|
36 | 36 | from rhodecode.config.jsroutes import generate_jsroutes_content |
|
37 | 37 | from rhodecode.lib.base import get_auth_user |
|
38 | 38 | from rhodecode.lib.celerylib.loader import set_celery_conf |
|
39 | 39 | |
|
40 | 40 | import rhodecode |
|
41 | 41 | |
|
42 | 42 | |
|
43 | 43 | log = logging.getLogger(__name__) |
|
44 | 44 | |
|
45 | 45 | |
|
46 | 46 | def add_renderer_globals(event): |
|
47 | 47 | from rhodecode.lib import helpers |
|
48 | 48 | |
|
49 | 49 | # TODO: When executed in pyramid view context the request is not available |
|
50 | 50 | # in the event. Find a better solution to get the request. |
|
51 | 51 | from pyramid.threadlocal import get_current_request |
|
52 | 52 | request = event['request'] or get_current_request() |
|
53 | 53 | |
|
54 | 54 | # Add Pyramid translation as '_' to context |
|
55 | 55 | event['_'] = request.translate |
|
56 | 56 | event['_ungettext'] = request.plularize |
|
57 | 57 | event['h'] = helpers |
|
58 | 58 | |
|
59 | 59 | |
|
60 | 60 | def set_user_lang(event): |
|
61 | 61 | request = event.request |
|
62 | 62 | cur_user = getattr(request, 'user', None) |
|
63 | 63 | |
|
64 | 64 | if cur_user: |
|
65 | 65 | user_lang = cur_user.get_instance().user_data.get('language') |
|
66 | 66 | if user_lang: |
|
67 | 67 | log.debug('lang: setting current user:%s language to: %s', cur_user, user_lang) |
|
68 | 68 | event.request._LOCALE_ = user_lang |
|
69 | 69 | |
|
70 | 70 | |
|
71 | 71 | def update_celery_conf(event): |
|
72 | 72 | log.debug('Setting celery config from new request') |
|
73 | 73 | set_celery_conf(request=event.request, registry=event.request.registry) |
|
74 | 74 | |
|
75 | 75 | |
|
76 | 76 | def add_request_user_context(event): |
|
77 | 77 | """ |
|
78 | 78 | Adds auth user into request context |
|
79 | 79 | """ |
|
80 | 80 | |
|
81 | 81 | request = event.request |
|
82 | 82 | # access req_id as soon as possible |
|
83 | 83 | req_id = request.req_id |
|
84 | 84 | |
|
85 | 85 | if hasattr(request, 'vcs_call'): |
|
86 | 86 | # skip vcs calls |
|
87 | 87 | return |
|
88 | 88 | |
|
89 | 89 | if hasattr(request, 'rpc_method'): |
|
90 | 90 | # skip api calls |
|
91 | 91 | return |
|
92 | 92 | |
|
93 | 93 | auth_user, auth_token = get_auth_user(request) |
|
94 | 94 | request.user = auth_user |
|
95 | 95 | request.user_auth_token = auth_token |
|
96 | 96 | request.environ['rc_auth_user'] = auth_user |
|
97 | 97 | request.environ['rc_auth_user_id'] = str(auth_user.user_id) |
|
98 | 98 | request.environ['rc_req_id'] = req_id |
|
99 | 99 | |
|
100 | 100 | |
|
101 | 101 | def reset_log_bucket(event): |
|
102 | 102 | """ |
|
103 | 103 | reset the log bucket on new request |
|
104 | 104 | """ |
|
105 | 105 | request = event.request |
|
106 | 106 | request.req_id_records_init() |
|
107 | 107 | |
|
108 | 108 | |
|
109 | 109 | def scan_repositories_if_enabled(event): |
|
110 | 110 | """ |
|
111 | 111 | This is subscribed to the `pyramid.events.ApplicationCreated` event. It |
|
112 | 112 | does a repository scan if enabled in the settings. |
|
113 | 113 | """ |
|
114 | 114 | settings = event.app.registry.settings |
|
115 | 115 | vcs_server_enabled = settings['vcs.server.enable'] |
|
116 | 116 | import_on_startup = settings['startup.import_repos'] |
|
117 | 117 | if vcs_server_enabled and import_on_startup: |
|
118 | 118 | from rhodecode.model.scm import ScmModel |
|
119 | 119 | from rhodecode.lib.utils import repo2db_mapper |
|
120 | 120 | scm = ScmModel() |
|
121 | 121 | repositories = scm.repo_scan(scm.repos_path) |
|
122 | 122 | repo2db_mapper(repositories, remove_obsolete=False) |
|
123 | 123 | |
|
124 | 124 | |
|
125 | 125 | def write_metadata_if_needed(event): |
|
126 | 126 | """ |
|
127 | 127 | Writes upgrade metadata |
|
128 | 128 | """ |
|
129 | 129 | import rhodecode |
|
130 | 130 | from rhodecode.lib import system_info |
|
131 | 131 | from rhodecode.lib import ext_json |
|
132 | 132 | |
|
133 | 133 | fname = '.rcmetadata.json' |
|
134 | 134 | ini_loc = os.path.dirname(rhodecode.CONFIG.get('__file__')) |
|
135 | 135 | metadata_destination = os.path.join(ini_loc, fname) |
|
136 | 136 | |
|
137 | 137 | def get_update_age(): |
|
138 | 138 | now = datetime.datetime.utcnow() |
|
139 | 139 | |
|
140 | 140 | with open(metadata_destination, 'rb') as f: |
|
141 | 141 | data = ext_json.json.loads(f.read()) |
|
142 | 142 | if 'created_on' in data: |
|
143 | 143 | update_date = parse(data['created_on']) |
|
144 | 144 | diff = now - update_date |
|
145 | 145 | return diff.total_seconds() / 60.0 |
|
146 | 146 | |
|
147 | 147 | return 0 |
|
148 | 148 | |
|
149 | 149 | def write(): |
|
150 | 150 | configuration = system_info.SysInfo( |
|
151 | 151 | system_info.rhodecode_config)()['value'] |
|
152 | 152 | license_token = configuration['config']['license_token'] |
|
153 | 153 | |
|
154 | 154 | setup = dict( |
|
155 | 155 | workers=configuration['config']['server:main'].get( |
|
156 | 156 | 'workers', '?'), |
|
157 | 157 | worker_type=configuration['config']['server:main'].get( |
|
158 | 158 | 'worker_class', 'sync'), |
|
159 | 159 | ) |
|
160 | 160 | dbinfo = system_info.SysInfo(system_info.database_info)()['value'] |
|
161 | 161 | del dbinfo['url'] |
|
162 | 162 | |
|
163 | 163 | metadata = dict( |
|
164 | 164 | desc='upgrade metadata info', |
|
165 | 165 | license_token=license_token, |
|
166 | 166 | created_on=datetime.datetime.utcnow().isoformat(), |
|
167 | 167 | usage=system_info.SysInfo(system_info.usage_info)()['value'], |
|
168 | 168 | platform=system_info.SysInfo(system_info.platform_type)()['value'], |
|
169 | 169 | database=dbinfo, |
|
170 | 170 | cpu=system_info.SysInfo(system_info.cpu)()['value'], |
|
171 | 171 | memory=system_info.SysInfo(system_info.memory)()['value'], |
|
172 | 172 | setup=setup |
|
173 | 173 | ) |
|
174 | 174 | |
|
175 | 175 | with open(metadata_destination, 'wb') as f: |
|
176 | 176 | f.write(ext_json.json.dumps(metadata)) |
|
177 | 177 | |
|
178 | 178 | settings = event.app.registry.settings |
|
179 | 179 | if settings.get('metadata.skip'): |
|
180 | 180 | return |
|
181 | 181 | |
|
182 | 182 | # only write this every 24h, workers restart caused unwanted delays |
|
183 | 183 | try: |
|
184 | 184 | age_in_min = get_update_age() |
|
185 | 185 | except Exception: |
|
186 | 186 | age_in_min = 0 |
|
187 | 187 | |
|
188 | 188 | if age_in_min > 60 * 60 * 24: |
|
189 | 189 | return |
|
190 | 190 | |
|
191 | 191 | try: |
|
192 | 192 | write() |
|
193 | 193 | except Exception: |
|
194 | 194 | pass |
|
195 | 195 | |
|
196 | 196 | |
|
197 | 197 | def write_usage_data(event): |
|
198 | 198 | import rhodecode |
|
199 | 199 | from rhodecode.lib import system_info |
|
200 | 200 | from rhodecode.lib import ext_json |
|
201 | 201 | |
|
202 | 202 | settings = event.app.registry.settings |
|
203 | 203 | instance_tag = settings.get('metadata.write_usage_tag') |
|
204 | 204 | if not settings.get('metadata.write_usage'): |
|
205 | 205 | return |
|
206 | 206 | |
|
207 | 207 | def get_update_age(dest_file): |
|
208 |
now = datetime.datetime. |
|
|
208 | now = datetime.datetime.now(datetime.UTC) | |
|
209 | 209 | |
|
210 | 210 | with open(dest_file, 'rb') as f: |
|
211 | 211 | data = ext_json.json.loads(f.read()) |
|
212 | 212 | if 'created_on' in data: |
|
213 | 213 | update_date = parse(data['created_on']) |
|
214 | 214 | diff = now - update_date |
|
215 | 215 | return math.ceil(diff.total_seconds() / 60.0) |
|
216 | 216 | |
|
217 | 217 | return 0 |
|
218 | 218 | |
|
219 |
utc_date = datetime.datetime. |
|
|
219 | utc_date = datetime.datetime.now(datetime.UTC) | |
|
220 | 220 | hour_quarter = int(math.ceil((utc_date.hour + utc_date.minute/60.0) / 6.)) |
|
221 |
fname = '.rc_usage_{date.year}{date.month:02d}{date.day:02d}_{hour}.json' |
|
|
222 | date=utc_date, hour=hour_quarter) | |
|
221 | fname = f'.rc_usage_{utc_date.year}{utc_date.month:02d}{utc_date.day:02d}_{hour_quarter}.json' | |
|
223 | 222 | ini_loc = os.path.dirname(rhodecode.CONFIG.get('__file__')) |
|
224 | 223 | |
|
225 | 224 | usage_dir = os.path.join(ini_loc, '.rcusage') |
|
226 | 225 | if not os.path.isdir(usage_dir): |
|
227 | 226 | os.makedirs(usage_dir) |
|
228 | 227 | usage_metadata_destination = os.path.join(usage_dir, fname) |
|
229 | 228 | |
|
230 | 229 | try: |
|
231 | 230 | age_in_min = get_update_age(usage_metadata_destination) |
|
232 | 231 | except Exception: |
|
233 | 232 | age_in_min = 0 |
|
234 | 233 | |
|
235 | 234 | # write every 6th hour |
|
236 | 235 | if age_in_min and age_in_min < 60 * 6: |
|
237 | 236 | log.debug('Usage file created %s minutes ago, skipping (threshold: %s minutes)...', |
|
238 | 237 | age_in_min, 60 * 6) |
|
239 | 238 | return |
|
240 | 239 | |
|
241 | 240 | def write(dest_file): |
|
242 | 241 | configuration = system_info.SysInfo(system_info.rhodecode_config)()['value'] |
|
243 | 242 | license_token = configuration['config']['license_token'] |
|
244 | 243 | |
|
245 | 244 | metadata = dict( |
|
246 | 245 | desc='Usage data', |
|
247 | 246 | instance_tag=instance_tag, |
|
248 | 247 | license_token=license_token, |
|
249 | 248 | created_on=datetime.datetime.utcnow().isoformat(), |
|
250 | 249 | usage=system_info.SysInfo(system_info.usage_info)()['value'], |
|
251 | 250 | ) |
|
252 | 251 | |
|
253 | 252 | with open(dest_file, 'wb') as f: |
|
254 | 253 | f.write(ext_json.formatted_json(metadata)) |
|
255 | 254 | |
|
256 | 255 | try: |
|
257 | 256 | log.debug('Writing usage file at: %s', usage_metadata_destination) |
|
258 | 257 | write(usage_metadata_destination) |
|
259 | 258 | except Exception: |
|
260 | 259 | pass |
|
261 | 260 | |
|
262 | 261 | |
|
263 | 262 | def write_js_routes_if_enabled(event): |
|
264 | 263 | registry = event.app.registry |
|
265 | 264 | |
|
266 | 265 | mapper = registry.queryUtility(IRoutesMapper) |
|
267 | 266 | _argument_prog = re.compile(r'\{(.*?)\}|:\((.*)\)') |
|
268 | 267 | |
|
269 | 268 | def _extract_route_information(route): |
|
270 | 269 | """ |
|
271 | 270 | Convert a route into tuple(name, path, args), eg: |
|
272 | 271 | ('show_user', '/profile/%(username)s', ['username']) |
|
273 | 272 | """ |
|
274 | 273 | |
|
275 | 274 | route_path = route.pattern |
|
276 | 275 | pattern = route.pattern |
|
277 | 276 | |
|
278 | 277 | def replace(matchobj): |
|
279 | 278 | if matchobj.group(1): |
|
280 | 279 | return "%%(%s)s" % matchobj.group(1).split(':')[0] |
|
281 | 280 | else: |
|
282 | 281 | return "%%(%s)s" % matchobj.group(2) |
|
283 | 282 | |
|
284 | 283 | route_path = _argument_prog.sub(replace, route_path) |
|
285 | 284 | |
|
286 | 285 | if not route_path.startswith('/'): |
|
287 | 286 | route_path = f'/{route_path}' |
|
288 | 287 | |
|
289 | 288 | return ( |
|
290 | 289 | route.name, |
|
291 | 290 | route_path, |
|
292 | 291 | [(arg[0].split(':')[0] if arg[0] != '' else arg[1]) |
|
293 | 292 | for arg in _argument_prog.findall(pattern)] |
|
294 | 293 | ) |
|
295 | 294 | |
|
296 | 295 | def get_routes(): |
|
297 | 296 | # pyramid routes |
|
298 | 297 | for route in mapper.get_routes(): |
|
299 | 298 | if not route.name.startswith('__'): |
|
300 | 299 | yield _extract_route_information(route) |
|
301 | 300 | |
|
302 | 301 | if asbool(registry.settings.get('generate_js_files', 'false')): |
|
303 | 302 | static_path = AssetResolver().resolve('rhodecode:public').abspath() |
|
304 | 303 | jsroutes = get_routes() |
|
305 | 304 | jsroutes_file_content = generate_jsroutes_content(jsroutes) |
|
306 | 305 | jsroutes_file_path = os.path.join( |
|
307 | 306 | static_path, 'js', 'rhodecode', 'routes.js') |
|
308 | 307 | |
|
309 | 308 | try: |
|
310 | 309 | with open(jsroutes_file_path, 'w', encoding='utf-8') as f: |
|
311 | 310 | f.write(jsroutes_file_content) |
|
312 | 311 | log.debug('generated JS files in %s', jsroutes_file_path) |
|
313 | 312 | except Exception: |
|
314 | 313 | log.exception('Failed to write routes.js into %s', jsroutes_file_path) |
|
315 | 314 | |
|
316 | 315 | |
|
316 | def import_license_if_present(event): | |
|
317 | """ | |
|
318 | This is subscribed to the `pyramid.events.ApplicationCreated` event. It | |
|
319 | does a import license key based on a presence of the file. | |
|
320 | """ | |
|
321 | settings = event.app.registry.settings | |
|
322 | ||
|
323 | license_file_path = settings.get('license.import_path') | |
|
324 | force = settings.get('license.import_path_mode') == 'force' | |
|
325 | if license_file_path: | |
|
326 | from rhodecode.model.meta import Session | |
|
327 | from rhodecode.model.license import apply_license_from_file | |
|
328 | apply_license_from_file(license_file_path, force=force) | |
|
329 | Session().commit() | |
|
330 | ||
|
331 | ||
|
317 | 332 | class Subscriber(object): |
|
318 | 333 | """ |
|
319 | 334 | Base class for subscribers to the pyramid event system. |
|
320 | 335 | """ |
|
321 | 336 | def __call__(self, event): |
|
322 | 337 | self.run(event) |
|
323 | 338 | |
|
324 | 339 | def run(self, event): |
|
325 | 340 | raise NotImplementedError('Subclass has to implement this.') |
|
326 | 341 | |
|
327 | 342 | |
|
328 | 343 | class AsyncSubscriber(Subscriber): |
|
329 | 344 | """ |
|
330 | 345 | Subscriber that handles the execution of events in a separate task to not |
|
331 | 346 | block the execution of the code which triggers the event. It puts the |
|
332 | 347 | received events into a queue from which the worker process takes them in |
|
333 | 348 | order. |
|
334 | 349 | """ |
|
335 | 350 | def __init__(self): |
|
336 | 351 | self._stop = False |
|
337 | 352 | self._eventq = queue.Queue() |
|
338 | 353 | self._worker = self.create_worker() |
|
339 | 354 | self._worker.start() |
|
340 | 355 | |
|
341 | 356 | def __call__(self, event): |
|
342 | 357 | self._eventq.put(event) |
|
343 | 358 | |
|
344 | 359 | def create_worker(self): |
|
345 | 360 | worker = Thread(target=self.do_work) |
|
346 | 361 | worker.daemon = True |
|
347 | 362 | return worker |
|
348 | 363 | |
|
349 | 364 | def stop_worker(self): |
|
350 | 365 | self._stop = False |
|
351 | 366 | self._eventq.put(None) |
|
352 | 367 | self._worker.join() |
|
353 | 368 | |
|
354 | 369 | def do_work(self): |
|
355 | 370 | while not self._stop: |
|
356 | 371 | event = self._eventq.get() |
|
357 | 372 | if event is not None: |
|
358 | 373 | self.run(event) |
|
359 | 374 | |
|
360 | 375 | |
|
361 | 376 | class AsyncSubprocessSubscriber(AsyncSubscriber): |
|
362 | 377 | """ |
|
363 | 378 | Subscriber that uses the subprocess module to execute a command if an |
|
364 | 379 | event is received. Events are handled asynchronously:: |
|
365 | 380 | |
|
366 | 381 | subscriber = AsyncSubprocessSubscriber('ls -la', timeout=10) |
|
367 | 382 | subscriber(dummyEvent) # running __call__(event) |
|
368 | 383 | |
|
369 | 384 | """ |
|
370 | 385 | |
|
371 | 386 | def __init__(self, cmd, timeout=None): |
|
372 | 387 | if not isinstance(cmd, (list, tuple)): |
|
373 | 388 | cmd = shlex.split(cmd) |
|
374 | 389 | super().__init__() |
|
375 | 390 | self._cmd = cmd |
|
376 | 391 | self._timeout = timeout |
|
377 | 392 | |
|
378 | 393 | def run(self, event): |
|
379 | 394 | cmd = self._cmd |
|
380 | 395 | timeout = self._timeout |
|
381 | 396 | log.debug('Executing command %s.', cmd) |
|
382 | 397 | |
|
383 | 398 | try: |
|
384 | 399 | output = subprocess.check_output( |
|
385 | 400 | cmd, timeout=timeout, stderr=subprocess.STDOUT) |
|
386 | 401 | log.debug('Command finished %s', cmd) |
|
387 | 402 | if output: |
|
388 | 403 | log.debug('Command output: %s', output) |
|
389 | 404 | except subprocess.TimeoutExpired as e: |
|
390 | 405 | log.exception('Timeout while executing command.') |
|
391 | 406 | if e.output: |
|
392 | 407 | log.error('Command output: %s', e.output) |
|
393 | 408 | except subprocess.CalledProcessError as e: |
|
394 | 409 | log.exception('Error while executing command.') |
|
395 | 410 | if e.output: |
|
396 | 411 | log.error('Command output: %s', e.output) |
|
397 | 412 | except Exception: |
|
398 | 413 | log.exception( |
|
399 | 414 | 'Exception while executing command %s.', cmd) |
@@ -1,79 +1,50 b'' | |||
|
1 | 1 | <%inherit file="/base/base.mako"/> |
|
2 | 2 | |
|
3 | 3 | <%def name="title()"> |
|
4 | 4 | ${_('Security Admin')} |
|
5 | 5 | %if c.rhodecode_name: |
|
6 | 6 | · ${h.branding(c.rhodecode_name)} |
|
7 | 7 | %endif |
|
8 | 8 | </%def> |
|
9 | 9 | |
|
10 | 10 | <%def name="breadcrumbs_links()"></%def> |
|
11 | 11 | |
|
12 | 12 | <%def name="menu_bar_nav()"> |
|
13 | 13 | ${self.menu_items(active='admin')} |
|
14 | 14 | </%def> |
|
15 | 15 | |
|
16 | 16 | <%def name="menu_bar_subnav()"> |
|
17 | 17 | ${self.admin_menu(active='security')} |
|
18 | 18 | </%def> |
|
19 | 19 | |
|
20 | 20 | <%def name="main()"> |
|
21 | 21 | |
|
22 | 22 | <div class="box"> |
|
23 | 23 | |
|
24 | 24 | <div class="panel panel-default"> |
|
25 | 25 | <div class="panel-heading"> |
|
26 | 26 | <h3 class="panel-title">${_('Security Audit')}</h3> |
|
27 | 27 | </div> |
|
28 | 28 | <div class="panel-body"> |
|
29 | 29 | <h4>${_('This feature is available in RhodeCode EE edition only. Contact {sales_email} to obtain a trial license.').format(sales_email='<a href="mailto:sales@rhodecode.com">sales@rhodecode.com</a>')|n}</h4> |
|
30 | 30 | <p> |
|
31 | 31 | ${_('You can scan your repositories for exposed secrets, passwords, etc')} |
|
32 | 32 | </p> |
|
33 | 33 | </div> |
|
34 | 34 | </div> |
|
35 | 35 | |
|
36 | 36 | <div class="panel panel-default"> |
|
37 | 37 | <div class="panel-heading"> |
|
38 | 38 | <h3 class="panel-title">${_('Allowed client versions')}</h3> |
|
39 | 39 | </div> |
|
40 | 40 | <div class="panel-body"> |
|
41 | %if c.rhodecode_edition_id != 'EE': | |
|
42 | 41 | <h4>${_('This feature is available in RhodeCode EE edition only. Contact {sales_email} to obtain a trial license.').format(sales_email='<a href="mailto:sales@rhodecode.com">sales@rhodecode.com</a>')|n}</h4> |
|
43 | 42 | <p> |
|
44 | 43 | ${_('Some outdated client versions may have security vulnerabilities. This section have rules for whitelisting versions of clients for Git, Mercurial and SVN.')} |
|
45 | 44 | </p> |
|
46 | %else: | |
|
47 | <div class="inner form" id="container"> | |
|
48 | </div> | |
|
49 | %endif | |
|
50 | 45 | </div> |
|
51 | 46 | |
|
47 | ||
|
52 | 48 | </div> |
|
53 | 49 | |
|
54 | <script> | |
|
55 | $(document).ready(function() { | |
|
56 | $.ajax({ | |
|
57 | url: pyroutes.url('admin_security_modify_allowed_vcs_client_versions'), | |
|
58 | type: 'GET', | |
|
59 | success: function(response) { | |
|
60 | $('#container').html(response); | |
|
61 | }, | |
|
62 | }); | |
|
63 | $(document).on('submit', '#allowed_clients_form', function(event) { | |
|
64 | event.preventDefault(); | |
|
65 | var formData = $(this).serialize(); | |
|
66 | ||
|
67 | $.ajax({ | |
|
68 | url: pyroutes.url('admin_security_modify_allowed_vcs_client_versions'), | |
|
69 | type: 'POST', | |
|
70 | data: formData, | |
|
71 | success: function(response) { | |
|
72 | $('#container').html(response); | |
|
73 | }, | |
|
74 | }); | |
|
75 | }); | |
|
76 | }); | |
|
77 | </script> | |
|
78 | ||
|
79 | 50 | </%def> |
@@ -1,323 +1,308 b'' | |||
|
1 | 1 | ## snippet for displaying vcs settings |
|
2 | 2 | ## usage: |
|
3 | 3 | ## <%namespace name="vcss" file="/base/vcssettings.mako"/> |
|
4 | 4 | ## ${vcss.vcs_settings_fields()} |
|
5 | 5 | |
|
6 | 6 | <%def name="vcs_settings_fields(suffix='', svn_branch_patterns=None, svn_tag_patterns=None, repo_type=None, display_globals=False, **kwargs)"> |
|
7 | 7 | % if display_globals: |
|
8 | <div class="panel panel-default"> | |
|
9 | <div class="panel-heading" id="general"> | |
|
10 | <h3 class="panel-title">${_('General')}<a class="permalink" href="#general"> ¶</a></h3> | |
|
11 | </div> | |
|
12 | <div class="panel-body"> | |
|
13 | <div class="field"> | |
|
14 | <div class="checkbox"> | |
|
15 | ${h.checkbox('web_push_ssl' + suffix, 'True')} | |
|
16 | <label for="web_push_ssl${suffix}">${_('Require SSL for vcs operations')}</label> | |
|
17 | </div> | |
|
18 | <div class="label"> | |
|
19 | <span class="help-block">${_('Activate to set RhodeCode to require SSL for pushing or pulling. If SSL certificate is missing it will return a HTTP Error 406: Not Acceptable.')}</span> | |
|
20 | </div> | |
|
21 | </div> | |
|
22 | </div> | |
|
23 | </div> | |
|
8 | ||
|
24 | 9 |
|
|
25 | 10 | |
|
26 | 11 | % if display_globals or repo_type in ['git', 'hg']: |
|
27 | 12 | <div class="panel panel-default"> |
|
28 | 13 | <div class="panel-heading" id="vcs-hooks-options"> |
|
29 | 14 | <h3 class="panel-title">${_('Internal Hooks')}<a class="permalink" href="#vcs-hooks-options"> ¶</a></h3> |
|
30 | 15 | </div> |
|
31 | 16 | <div class="panel-body"> |
|
32 | 17 | <div class="field"> |
|
33 | 18 | <div class="checkbox"> |
|
34 | 19 | ${h.checkbox('hooks_changegroup_repo_size' + suffix, 'True', **kwargs)} |
|
35 | 20 | <label for="hooks_changegroup_repo_size${suffix}">${_('Show repository size after push')}</label> |
|
36 | 21 | </div> |
|
37 | 22 | |
|
38 | 23 | <div class="label"> |
|
39 | 24 | <span class="help-block">${_('Trigger a hook that calculates repository size after each push.')}</span> |
|
40 | 25 | </div> |
|
41 | 26 | <div class="checkbox"> |
|
42 | 27 | ${h.checkbox('hooks_changegroup_push_logger' + suffix, 'True', **kwargs)} |
|
43 | 28 | <label for="hooks_changegroup_push_logger${suffix}">${_('Execute pre/post push hooks')}</label> |
|
44 | 29 | </div> |
|
45 | 30 | <div class="label"> |
|
46 | 31 | <span class="help-block">${_('Execute Built in pre/post push hooks. This also executes rcextensions hooks.')}</span> |
|
47 | 32 | </div> |
|
48 | 33 | <div class="checkbox"> |
|
49 | 34 | ${h.checkbox('hooks_outgoing_pull_logger' + suffix, 'True', **kwargs)} |
|
50 | 35 | <label for="hooks_outgoing_pull_logger${suffix}">${_('Execute pre/post pull hooks')}</label> |
|
51 | 36 | </div> |
|
52 | 37 | <div class="label"> |
|
53 | 38 | <span class="help-block">${_('Execute Built in pre/post pull hooks. This also executes rcextensions hooks.')}</span> |
|
54 | 39 | </div> |
|
55 | 40 | </div> |
|
56 | 41 | </div> |
|
57 | 42 | </div> |
|
58 | 43 | % endif |
|
59 | 44 | |
|
60 | 45 | % if display_globals or repo_type in ['hg']: |
|
61 | 46 | <div class="panel panel-default"> |
|
62 | 47 | <div class="panel-heading" id="vcs-hg-options"> |
|
63 | 48 | <h3 class="panel-title">${_('Mercurial Settings')}<a class="permalink" href="#vcs-hg-options"> ¶</a></h3> |
|
64 | 49 | </div> |
|
65 | 50 | <div class="panel-body"> |
|
66 | 51 | <div class="checkbox"> |
|
67 | 52 | ${h.checkbox('extensions_largefiles' + suffix, 'True', **kwargs)} |
|
68 | 53 | <label for="extensions_largefiles${suffix}">${_('Enable largefiles extension')}</label> |
|
69 | 54 | </div> |
|
70 | 55 | <div class="label"> |
|
71 | 56 | % if display_globals: |
|
72 | 57 | <span class="help-block">${_('Enable Largefiles extensions for all repositories.')}</span> |
|
73 | 58 | % else: |
|
74 | 59 | <span class="help-block">${_('Enable Largefiles extensions for this repository.')}</span> |
|
75 | 60 | % endif |
|
76 | 61 | </div> |
|
77 | 62 | |
|
78 | 63 | <div class="checkbox"> |
|
79 | 64 | ${h.checkbox('phases_publish' + suffix, 'True', **kwargs)} |
|
80 | 65 | <label for="phases_publish${suffix}">${_('Set repositories as publishing') if display_globals else _('Set repository as publishing')}</label> |
|
81 | 66 | </div> |
|
82 | 67 | <div class="label"> |
|
83 | 68 | <span class="help-block">${_('When this is enabled all commits in the repository are seen as public commits by clients.')}</span> |
|
84 | 69 | </div> |
|
85 | 70 | |
|
86 | 71 | <div class="checkbox"> |
|
87 | 72 | ${h.checkbox('extensions_evolve' + suffix, 'True', **kwargs)} |
|
88 | 73 | <label for="extensions_evolve${suffix}">${_('Enable Evolve and Topic extension')}</label> |
|
89 | 74 | </div> |
|
90 | 75 | <div class="label"> |
|
91 | 76 | % if display_globals: |
|
92 | 77 | <span class="help-block">${_('Enable Evolve and Topic extensions for all repositories.')}</span> |
|
93 | 78 | % else: |
|
94 | 79 | <span class="help-block">${_('Enable Evolve and Topic extensions for this repository.')}</span> |
|
95 | 80 | % endif |
|
96 | 81 | </div> |
|
97 | 82 | |
|
98 | 83 | </div> |
|
99 | 84 | </div> |
|
100 | 85 | % endif |
|
101 | 86 | |
|
102 | 87 | % if display_globals or repo_type in ['git']: |
|
103 | 88 | <div class="panel panel-default"> |
|
104 | 89 | <div class="panel-heading" id="vcs-git-options"> |
|
105 | 90 | <h3 class="panel-title">${_('Git Settings')}<a class="permalink" href="#vcs-git-options"> ¶</a></h3> |
|
106 | 91 | </div> |
|
107 | 92 | <div class="panel-body"> |
|
108 | 93 | <div class="checkbox"> |
|
109 | 94 | ${h.checkbox('vcs_git_lfs_enabled' + suffix, 'True', **kwargs)} |
|
110 | 95 | <label for="vcs_git_lfs_enabled${suffix}">${_('Enable lfs extension')}</label> |
|
111 | 96 | </div> |
|
112 | 97 | <div class="label"> |
|
113 | 98 | % if display_globals: |
|
114 | 99 | <span class="help-block">${_('Enable lfs extensions for all repositories.')}</span> |
|
115 | 100 | % else: |
|
116 | 101 | <span class="help-block">${_('Enable lfs extensions for this repository.')}</span> |
|
117 | 102 | % endif |
|
118 | 103 | </div> |
|
119 | 104 | </div> |
|
120 | 105 | </div> |
|
121 | 106 | % endif |
|
122 | 107 | |
|
123 | 108 | % if display_globals or repo_type in ['svn']: |
|
124 | 109 | <div class="panel panel-default"> |
|
125 | 110 | <div class="panel-heading" id="vcs-svn-options"> |
|
126 | 111 | <h3 class="panel-title">${_('Subversion Settings')}<a class="permalink" href="#vcs-svn-options"> ¶</a></h3> |
|
127 | 112 | </div> |
|
128 | 113 | <div class="panel-body"> |
|
129 | 114 | % if display_globals: |
|
130 | 115 | <div class="field"> |
|
131 | 116 | <div class="content" > |
|
132 | 117 | <label>${_('mod_dav config')}</label><br/> |
|
133 | 118 | <code>path: ${c.svn_config_path}</code> |
|
134 | 119 | </div> |
|
135 | 120 | <br/> |
|
136 | 121 | |
|
137 | 122 | <div> |
|
138 | 123 | |
|
139 | 124 | % if c.svn_generate_config: |
|
140 | 125 | <span class="buttons"> |
|
141 | 126 | <button class="btn btn-primary" id="vcs_svn_generate_cfg">${_('Re-generate Apache Config')}</button> |
|
142 | 127 | </span> |
|
143 | 128 | % endif |
|
144 | 129 | </div> |
|
145 | 130 | </div> |
|
146 | 131 | % endif |
|
147 | 132 | |
|
148 | 133 | <div class="field"> |
|
149 | 134 | <div class="content" > |
|
150 | 135 | <label>${_('Repository patterns')}</label><br/> |
|
151 | 136 | </div> |
|
152 | 137 | </div> |
|
153 | 138 | <div class="label"> |
|
154 | 139 | <span class="help-block">${_('Patterns for identifying SVN branches and tags. For recursive search, use "*". Eg.: "/branches/*"')}</span> |
|
155 | 140 | </div> |
|
156 | 141 | |
|
157 | 142 | <div class="field branch_patterns"> |
|
158 | 143 | <div class="input" > |
|
159 | 144 | <label>${_('Branches')}:</label><br/> |
|
160 | 145 | </div> |
|
161 | 146 | % if svn_branch_patterns: |
|
162 | 147 | % for branch in svn_branch_patterns: |
|
163 | 148 | <div class="input adjacent" id="${'id%s' % branch.ui_id}"> |
|
164 | 149 | ${h.hidden('branch_ui_key' + suffix, branch.ui_key)} |
|
165 | 150 | ${h.text('branch_value_%d' % branch.ui_id + suffix, branch.ui_value, size=59, readonly="readonly", class_='disabled')} |
|
166 | 151 | % if kwargs.get('disabled') != 'disabled': |
|
167 | 152 | <span class="btn btn-x" onclick="ajaxDeletePattern(${branch.ui_id},'${'id%s' % branch.ui_id}')"> |
|
168 | 153 | ${_('Delete')} |
|
169 | 154 | </span> |
|
170 | 155 | % endif |
|
171 | 156 | </div> |
|
172 | 157 | % endfor |
|
173 | 158 | %endif |
|
174 | 159 | </div> |
|
175 | 160 | % if kwargs.get('disabled') != 'disabled': |
|
176 | 161 | <div class="field branch_patterns"> |
|
177 | 162 | <div class="input" > |
|
178 | 163 | ${h.text('new_svn_branch',size=59,placeholder='New branch pattern')} |
|
179 | 164 | </div> |
|
180 | 165 | </div> |
|
181 | 166 | % endif |
|
182 | 167 | <div class="field tag_patterns"> |
|
183 | 168 | <div class="input" > |
|
184 | 169 | <label>${_('Tags')}:</label><br/> |
|
185 | 170 | </div> |
|
186 | 171 | % if svn_tag_patterns: |
|
187 | 172 | % for tag in svn_tag_patterns: |
|
188 | 173 | <div class="input" id="${'id%s' % tag.ui_id + suffix}"> |
|
189 | 174 | ${h.hidden('tag_ui_key' + suffix, tag.ui_key)} |
|
190 | 175 | ${h.text('tag_ui_value_new_%d' % tag.ui_id + suffix, tag.ui_value, size=59, readonly="readonly", class_='disabled tag_input')} |
|
191 | 176 | % if kwargs.get('disabled') != 'disabled': |
|
192 | 177 | <span class="btn btn-x" onclick="ajaxDeletePattern(${tag.ui_id},'${'id%s' % tag.ui_id}')"> |
|
193 | 178 | ${_('Delete')} |
|
194 | 179 | </span> |
|
195 | 180 | %endif |
|
196 | 181 | </div> |
|
197 | 182 | % endfor |
|
198 | 183 | % endif |
|
199 | 184 | </div> |
|
200 | 185 | % if kwargs.get('disabled') != 'disabled': |
|
201 | 186 | <div class="field tag_patterns"> |
|
202 | 187 | <div class="input" > |
|
203 | 188 | ${h.text('new_svn_tag' + suffix, size=59, placeholder='New tag pattern')} |
|
204 | 189 | </div> |
|
205 | 190 | </div> |
|
206 | 191 | %endif |
|
207 | 192 | </div> |
|
208 | 193 | </div> |
|
209 | 194 | % else: |
|
210 | 195 | ${h.hidden('new_svn_branch' + suffix, '')} |
|
211 | 196 | ${h.hidden('new_svn_tag' + suffix, '')} |
|
212 | 197 | % endif |
|
213 | 198 | |
|
214 | 199 | |
|
215 | 200 | % if display_globals or repo_type in ['hg', 'git']: |
|
216 | 201 | <div class="panel panel-default"> |
|
217 | 202 | <div class="panel-heading" id="vcs-pull-requests-options"> |
|
218 | 203 | <h3 class="panel-title">${_('Pull Request Settings')}<a class="permalink" href="#vcs-pull-requests-options"> ¶</a></h3> |
|
219 | 204 | </div> |
|
220 | 205 | <div class="panel-body"> |
|
221 | 206 | <div class="checkbox"> |
|
222 | 207 | ${h.checkbox('rhodecode_pr_merge_enabled' + suffix, 'True', **kwargs)} |
|
223 | 208 | <label for="rhodecode_pr_merge_enabled${suffix}">${_('Enable server-side merge for pull requests')}</label> |
|
224 | 209 | </div> |
|
225 | 210 | <div class="label"> |
|
226 | 211 | <span class="help-block">${_('Note: when this feature is enabled, it only runs hooks defined in the rcextension package. Custom hooks added on the Admin -> Settings -> Hooks page will not be run when pull requests are automatically merged from the web interface.')}</span> |
|
227 | 212 | </div> |
|
228 | 213 | <div class="checkbox"> |
|
229 | 214 | ${h.checkbox('rhodecode_use_outdated_comments' + suffix, 'True', **kwargs)} |
|
230 | 215 | <label for="rhodecode_use_outdated_comments${suffix}">${_('Invalidate and relocate inline comments during update')}</label> |
|
231 | 216 | </div> |
|
232 | 217 | <div class="label"> |
|
233 | 218 | <span class="help-block">${_('During the update of a pull request, the position of inline comments will be updated and outdated inline comments will be hidden.')}</span> |
|
234 | 219 | </div> |
|
235 | 220 | </div> |
|
236 | 221 | </div> |
|
237 | 222 | % endif |
|
238 | 223 | |
|
239 | 224 | % if display_globals or repo_type in ['hg', 'git', 'svn']: |
|
240 | 225 | <div class="panel panel-default"> |
|
241 | 226 | <div class="panel-heading" id="vcs-pull-requests-options"> |
|
242 | 227 | <h3 class="panel-title">${_('Diff cache')}<a class="permalink" href="#vcs-pull-requests-options"> ¶</a></h3> |
|
243 | 228 | </div> |
|
244 | 229 | <div class="panel-body"> |
|
245 | 230 | <div class="checkbox"> |
|
246 | 231 | ${h.checkbox('rhodecode_diff_cache' + suffix, 'True', **kwargs)} |
|
247 | 232 | <label for="rhodecode_diff_cache${suffix}">${_('Enable caching diffs for pull requests cache and commits')}</label> |
|
248 | 233 | </div> |
|
249 | 234 | </div> |
|
250 | 235 | </div> |
|
251 | 236 | % endif |
|
252 | 237 | |
|
253 | 238 | % if display_globals or repo_type in ['hg',]: |
|
254 | 239 | <div class="panel panel-default"> |
|
255 | 240 | <div class="panel-heading" id="vcs-pull-requests-options"> |
|
256 | 241 | <h3 class="panel-title">${_('Mercurial Pull Request Settings')}<a class="permalink" href="#vcs-hg-pull-requests-options"> ¶</a></h3> |
|
257 | 242 | </div> |
|
258 | 243 | <div class="panel-body"> |
|
259 | 244 | ## Specific HG settings |
|
260 | 245 | <div class="checkbox"> |
|
261 | 246 | ${h.checkbox('rhodecode_hg_use_rebase_for_merging' + suffix, 'True', **kwargs)} |
|
262 | 247 | <label for="rhodecode_hg_use_rebase_for_merging${suffix}">${_('Use rebase as merge strategy')}</label> |
|
263 | 248 | </div> |
|
264 | 249 | <div class="label"> |
|
265 | 250 | <span class="help-block">${_('Use rebase instead of creating a merge commit when merging via web interface.')}</span> |
|
266 | 251 | </div> |
|
267 | 252 | |
|
268 | 253 | <div class="checkbox"> |
|
269 | 254 | ${h.checkbox('rhodecode_hg_close_branch_before_merging' + suffix, 'True', **kwargs)} |
|
270 | 255 | <label for="rhodecode_hg_close_branch_before_merging{suffix}">${_('Close branch before merging it')}</label> |
|
271 | 256 | </div> |
|
272 | 257 | <div class="label"> |
|
273 | 258 | <span class="help-block">${_('Close branch before merging it into destination branch. No effect when rebase strategy is use.')}</span> |
|
274 | 259 | </div> |
|
275 | 260 | |
|
276 | 261 | |
|
277 | 262 | </div> |
|
278 | 263 | </div> |
|
279 | 264 | % endif |
|
280 | 265 | |
|
281 | 266 | % if display_globals or repo_type in ['git']: |
|
282 | 267 | <div class="panel panel-default"> |
|
283 | 268 | <div class="panel-heading" id="vcs-pull-requests-options"> |
|
284 | 269 | <h3 class="panel-title">${_('Git Pull Request Settings')}<a class="permalink" href="#vcs-git-pull-requests-options"> ¶</a></h3> |
|
285 | 270 | </div> |
|
286 | 271 | <div class="panel-body"> |
|
287 | 272 | ## <div class="checkbox"> |
|
288 | 273 | ## ${h.checkbox('rhodecode_git_use_rebase_for_merging' + suffix, 'True', **kwargs)} |
|
289 | 274 | ## <label for="rhodecode_git_use_rebase_for_merging${suffix}">${_('Use rebase as merge strategy')}</label> |
|
290 | 275 | ## </div> |
|
291 | 276 | ## <div class="label"> |
|
292 | 277 | ## <span class="help-block">${_('Use rebase instead of creating a merge commit when merging via web interface.')}</span> |
|
293 | 278 | ## </div> |
|
294 | 279 | |
|
295 | 280 | <div class="checkbox"> |
|
296 | 281 | ${h.checkbox('rhodecode_git_close_branch_before_merging' + suffix, 'True', **kwargs)} |
|
297 | 282 | <label for="rhodecode_git_close_branch_before_merging{suffix}">${_('Delete branch after merging it')}</label> |
|
298 | 283 | </div> |
|
299 | 284 | <div class="label"> |
|
300 | 285 | <span class="help-block">${_('Delete branch after merging it into destination branch.')}</span> |
|
301 | 286 | </div> |
|
302 | 287 | </div> |
|
303 | 288 | </div> |
|
304 | 289 | % endif |
|
305 | 290 | |
|
306 | 291 | <script type="text/javascript"> |
|
307 | 292 | |
|
308 | 293 | $(document).ready(function() { |
|
309 | 294 | /* On click handler for the `Generate Apache Config` button. It sends a |
|
310 | 295 | POST request to trigger the (re)generation of the mod_dav_svn config. */ |
|
311 | 296 | $('#vcs_svn_generate_cfg').on('click', function(event) { |
|
312 | 297 | event.preventDefault(); |
|
313 | 298 | var url = "${h.route_path('admin_settings_vcs_svn_generate_cfg')}"; |
|
314 | 299 | var jqxhr = $.post(url, {'csrf_token': CSRF_TOKEN}); |
|
315 | 300 | jqxhr.done(function(data) { |
|
316 | 301 | $.Topic('/notifications').publish(data); |
|
317 | 302 | }); |
|
318 | 303 | }); |
|
319 | 304 | }); |
|
320 | 305 | |
|
321 | 306 | </script> |
|
322 | 307 | </%def> |
|
323 | 308 |
@@ -1,155 +1,154 b'' | |||
|
1 | 1 | |
|
2 | 2 | # Copyright (C) 2010-2023 RhodeCode GmbH |
|
3 | 3 | # |
|
4 | 4 | # This program is free software: you can redistribute it and/or modify |
|
5 | 5 | # it under the terms of the GNU Affero General Public License, version 3 |
|
6 | 6 | # (only), as published by the Free Software Foundation. |
|
7 | 7 | # |
|
8 | 8 | # This program is distributed in the hope that it will be useful, |
|
9 | 9 | # but WITHOUT ANY WARRANTY; without even the implied warranty of |
|
10 | 10 | # MERCHANTABILITY or FITNESS FOR A PARTICULAR PURPOSE. See the |
|
11 | 11 | # GNU General Public License for more details. |
|
12 | 12 | # |
|
13 | 13 | # You should have received a copy of the GNU Affero General Public License |
|
14 | 14 | # along with this program. If not, see <http://www.gnu.org/licenses/>. |
|
15 | 15 | # |
|
16 | 16 | # This program is dual-licensed. If you wish to learn more about the |
|
17 | 17 | # RhodeCode Enterprise Edition, including its added features, Support services, |
|
18 | 18 | # and proprietary license terms, please see https://rhodecode.com/licenses/ |
|
19 | 19 | |
|
20 | 20 | import urllib.parse |
|
21 | 21 | |
|
22 | 22 | import mock |
|
23 | 23 | import pytest |
|
24 | 24 | import simplejson as json |
|
25 | 25 | |
|
26 | 26 | from rhodecode.lib.vcs.backends.base import Config |
|
27 | 27 | from rhodecode.tests.lib.middleware import mock_scm_app |
|
28 | 28 | import rhodecode.lib.middleware.simplehg as simplehg |
|
29 | 29 | |
|
30 | 30 | |
|
31 | 31 | def get_environ(url): |
|
32 | 32 | """Construct a minimum WSGI environ based on the URL.""" |
|
33 | 33 | parsed_url = urllib.parse.urlparse(url) |
|
34 | 34 | environ = { |
|
35 | 35 | 'PATH_INFO': parsed_url.path, |
|
36 | 36 | 'QUERY_STRING': parsed_url.query, |
|
37 | 37 | } |
|
38 | 38 | |
|
39 | 39 | return environ |
|
40 | 40 | |
|
41 | 41 | |
|
42 | 42 | @pytest.mark.parametrize( |
|
43 | 43 | 'url, expected_action', |
|
44 | 44 | [ |
|
45 | 45 | ('/foo/bar?cmd=unbundle&key=tip', 'push'), |
|
46 | 46 | ('/foo/bar?cmd=pushkey&key=tip', 'push'), |
|
47 | 47 | ('/foo/bar?cmd=listkeys&key=tip', 'pull'), |
|
48 | 48 | ('/foo/bar?cmd=changegroup&key=tip', 'pull'), |
|
49 | 49 | ('/foo/bar?cmd=hello', 'pull'), |
|
50 | 50 | ('/foo/bar?cmd=batch', 'push'), |
|
51 | 51 | ('/foo/bar?cmd=putlfile', 'push'), |
|
52 | 52 | # Edge case: unknown argument: assume push |
|
53 | 53 | ('/foo/bar?cmd=unknown&key=tip', 'push'), |
|
54 | 54 | ('/foo/bar?cmd=&key=tip', 'push'), |
|
55 | 55 | # Edge case: not cmd argument |
|
56 | 56 | ('/foo/bar?key=tip', 'push'), |
|
57 | 57 | ]) |
|
58 | 58 | def test_get_action(url, expected_action, request_stub): |
|
59 | 59 | app = simplehg.SimpleHg(config={'auth_ret_code': '', 'base_path': ''}, |
|
60 | 60 | registry=request_stub.registry) |
|
61 | 61 | assert expected_action == app._get_action(get_environ(url)) |
|
62 | 62 | |
|
63 | 63 | |
|
64 | 64 | @pytest.mark.parametrize( |
|
65 | 65 | 'environ, expected_xargs, expected_batch', |
|
66 | 66 | [ |
|
67 | 67 | ({}, |
|
68 | 68 | [''], ['push']), |
|
69 | 69 | |
|
70 | 70 | ({'HTTP_X_HGARG_1': ''}, |
|
71 | 71 | [''], ['push']), |
|
72 | 72 | |
|
73 | 73 | ({'HTTP_X_HGARG_1': 'cmds=listkeys+namespace%3Dphases'}, |
|
74 | 74 | ['listkeys namespace=phases'], ['pull']), |
|
75 | 75 | |
|
76 | 76 | ({'HTTP_X_HGARG_1': 'cmds=pushkey+namespace%3Dbookmarks%2Ckey%3Dbm%2Cold%3D%2Cnew%3Dcb9a9f314b8b07ba71012fcdbc544b5a4d82ff5b'}, |
|
77 | 77 | ['pushkey namespace=bookmarks,key=bm,old=,new=cb9a9f314b8b07ba71012fcdbc544b5a4d82ff5b'], ['push']), |
|
78 | 78 | |
|
79 | 79 | ({'HTTP_X_HGARG_1': 'namespace=phases'}, |
|
80 | 80 | ['namespace=phases'], ['push']), |
|
81 | 81 | |
|
82 | 82 | ]) |
|
83 | 83 | def test_xarg_and_batch_commands(environ, expected_xargs, expected_batch): |
|
84 | 84 | app = simplehg.SimpleHg |
|
85 | 85 | |
|
86 | 86 | result = app._get_xarg_headers(environ) |
|
87 | 87 | result_batch = app._get_batch_cmd(environ) |
|
88 | 88 | assert expected_xargs == result |
|
89 | 89 | assert expected_batch == result_batch |
|
90 | 90 | |
|
91 | 91 | |
|
92 | 92 | @pytest.mark.parametrize( |
|
93 | 93 | 'url, expected_repo_name', |
|
94 | 94 | [ |
|
95 | 95 | ('/foo?cmd=unbundle&key=tip', 'foo'), |
|
96 | 96 | ('/foo/bar?cmd=pushkey&key=tip', 'foo/bar'), |
|
97 | 97 | ('/foo/bar/baz?cmd=listkeys&key=tip', 'foo/bar/baz'), |
|
98 | 98 | # Repos with trailing slashes. |
|
99 | 99 | ('/foo/?cmd=unbundle&key=tip', 'foo'), |
|
100 | 100 | ('/foo/bar/?cmd=pushkey&key=tip', 'foo/bar'), |
|
101 | 101 | ('/foo/bar/baz/?cmd=listkeys&key=tip', 'foo/bar/baz'), |
|
102 | 102 | ]) |
|
103 | 103 | def test_get_repository_name(url, expected_repo_name, request_stub): |
|
104 | 104 | app = simplehg.SimpleHg(config={'auth_ret_code': '', 'base_path': ''}, |
|
105 | 105 | registry=request_stub.registry) |
|
106 | 106 | assert expected_repo_name == app._get_repository_name(get_environ(url)) |
|
107 | 107 | |
|
108 | 108 | |
|
109 | 109 | def test_get_config(user_util, baseapp, request_stub): |
|
110 | 110 | repo = user_util.create_repo(repo_type='git') |
|
111 | 111 | app = simplehg.SimpleHg(config={'auth_ret_code': '', 'base_path': ''}, |
|
112 | 112 | registry=request_stub.registry) |
|
113 | 113 | extras = [('foo', 'FOO', 'bar', 'BAR')] |
|
114 | 114 | |
|
115 | 115 | hg_config = app._create_config(extras, repo_name=repo.repo_name) |
|
116 | 116 | |
|
117 | 117 | config = simplehg.utils.make_db_config(repo=repo.repo_name) |
|
118 | 118 | config.set('rhodecode', 'RC_SCM_DATA', json.dumps(extras)) |
|
119 | 119 | hg_config_org = config |
|
120 | 120 | |
|
121 | 121 | expected_config = [ |
|
122 | 122 | ('vcs_svn_tag', 'ff89f8c714d135d865f44b90e5413b88de19a55f', '/tags/*'), |
|
123 | ('web', 'push_ssl', 'False'), | |
|
124 | 123 | ('web', 'allow_push', '*'), |
|
125 | 124 | ('web', 'allow_archive', 'gz zip bz2'), |
|
126 | 125 | ('web', 'baseurl', '/'), |
|
127 | 126 | ('vcs_git_lfs', 'store_location', hg_config_org.get('vcs_git_lfs', 'store_location')), |
|
128 | 127 | ('vcs_svn_branch', '9aac1a38c3b8a0cdc4ae0f960a5f83332bc4fa5e', '/branches/*'), |
|
129 | 128 | ('vcs_svn_branch', 'c7e6a611c87da06529fd0dd733308481d67c71a8', '/trunk'), |
|
130 | 129 | ('largefiles', 'usercache', hg_config_org.get('largefiles', 'usercache')), |
|
131 | 130 | ('hooks', 'preoutgoing.pre_pull', 'python:vcsserver.hooks.pre_pull'), |
|
132 | 131 | ('hooks', 'prechangegroup.pre_push', 'python:vcsserver.hooks.pre_push'), |
|
133 | 132 | ('hooks', 'outgoing.pull_logger', 'python:vcsserver.hooks.log_pull_action'), |
|
134 | 133 | ('hooks', 'pretxnchangegroup.pre_push', 'python:vcsserver.hooks.pre_push'), |
|
135 | 134 | ('hooks', 'changegroup.push_logger', 'python:vcsserver.hooks.log_push_action'), |
|
136 | 135 | ('hooks', 'changegroup.repo_size', 'python:vcsserver.hooks.repo_size'), |
|
137 | 136 | ('phases', 'publish', 'True'), |
|
138 | 137 | ('extensions', 'largefiles', ''), |
|
139 | 138 | ('paths', '/', hg_config_org.get('paths', '/')), |
|
140 | 139 | ('rhodecode', 'RC_SCM_DATA', '[["foo","FOO","bar","BAR"]]') |
|
141 | 140 | ] |
|
142 | 141 | for entry in expected_config: |
|
143 | 142 | assert entry in hg_config |
|
144 | 143 | |
|
145 | 144 | |
|
146 | 145 | def test_create_wsgi_app_uses_scm_app_from_simplevcs(request_stub): |
|
147 | 146 | config = { |
|
148 | 147 | 'auth_ret_code': '', |
|
149 | 148 | 'base_path': '', |
|
150 | 149 | 'vcs.scm_app_implementation': |
|
151 | 150 | 'rhodecode.tests.lib.middleware.mock_scm_app', |
|
152 | 151 | } |
|
153 | 152 | app = simplehg.SimpleHg(config=config, registry=request_stub.registry) |
|
154 | 153 | wsgi_app = app._create_wsgi_app('/tmp/test', 'test_repo', {}) |
|
155 | 154 | assert wsgi_app is mock_scm_app.mock_hg_wsgi |
@@ -1,451 +1,448 b'' | |||
|
1 | 1 | |
|
2 | 2 | # Copyright (C) 2010-2023 RhodeCode GmbH |
|
3 | 3 | # |
|
4 | 4 | # This program is free software: you can redistribute it and/or modify |
|
5 | 5 | # it under the terms of the GNU Affero General Public License, version 3 |
|
6 | 6 | # (only), as published by the Free Software Foundation. |
|
7 | 7 | # |
|
8 | 8 | # This program is distributed in the hope that it will be useful, |
|
9 | 9 | # but WITHOUT ANY WARRANTY; without even the implied warranty of |
|
10 | 10 | # MERCHANTABILITY or FITNESS FOR A PARTICULAR PURPOSE. See the |
|
11 | 11 | # GNU General Public License for more details. |
|
12 | 12 | # |
|
13 | 13 | # You should have received a copy of the GNU Affero General Public License |
|
14 | 14 | # along with this program. If not, see <http://www.gnu.org/licenses/>. |
|
15 | 15 | # |
|
16 | 16 | # This program is dual-licensed. If you wish to learn more about the |
|
17 | 17 | # RhodeCode Enterprise Edition, including its added features, Support services, |
|
18 | 18 | # and proprietary license terms, please see https://rhodecode.com/licenses/ |
|
19 | 19 | |
|
20 | 20 | import mock |
|
21 | 21 | import pytest |
|
22 | 22 | |
|
23 | 23 | from rhodecode.lib.str_utils import base64_to_str |
|
24 | 24 | from rhodecode.lib.utils2 import AttributeDict |
|
25 | 25 | from rhodecode.tests.utils import CustomTestApp |
|
26 | 26 | |
|
27 | 27 | from rhodecode.lib.caching_query import FromCache |
|
28 | 28 | from rhodecode.lib.middleware import simplevcs |
|
29 | 29 | from rhodecode.lib.middleware.https_fixup import HttpsFixup |
|
30 | 30 | from rhodecode.lib.middleware.utils import scm_app_http |
|
31 | 31 | from rhodecode.model.db import User, _hash_key |
|
32 | 32 | from rhodecode.model.meta import Session, cache as db_cache |
|
33 | 33 | from rhodecode.tests import ( |
|
34 | 34 | HG_REPO, TEST_USER_ADMIN_LOGIN, TEST_USER_ADMIN_PASS) |
|
35 | 35 | from rhodecode.tests.lib.middleware import mock_scm_app |
|
36 | 36 | |
|
37 | 37 | |
|
38 | 38 | class StubVCSController(simplevcs.SimpleVCS): |
|
39 | 39 | |
|
40 | 40 | SCM = 'hg' |
|
41 | 41 | stub_response_body = tuple() |
|
42 | 42 | |
|
43 | 43 | def __init__(self, *args, **kwargs): |
|
44 | 44 | super(StubVCSController, self).__init__(*args, **kwargs) |
|
45 | 45 | self._action = 'pull' |
|
46 | 46 | self._is_shadow_repo_dir = True |
|
47 | 47 | self._name = HG_REPO |
|
48 | 48 | self.set_repo_names(None) |
|
49 | 49 | |
|
50 | 50 | @property |
|
51 | 51 | def is_shadow_repo_dir(self): |
|
52 | 52 | return self._is_shadow_repo_dir |
|
53 | 53 | |
|
54 | 54 | def _get_repository_name(self, environ): |
|
55 | 55 | return self._name |
|
56 | 56 | |
|
57 | 57 | def _get_action(self, environ): |
|
58 | 58 | return self._action |
|
59 | 59 | |
|
60 | 60 | def _create_wsgi_app(self, repo_path, repo_name, config): |
|
61 | 61 | def fake_app(environ, start_response): |
|
62 | 62 | headers = [ |
|
63 | 63 | ('Http-Accept', 'application/mercurial') |
|
64 | 64 | ] |
|
65 | 65 | start_response('200 OK', headers) |
|
66 | 66 | return self.stub_response_body |
|
67 | 67 | return fake_app |
|
68 | 68 | |
|
69 | 69 | def _create_config(self, extras, repo_name, scheme='http'): |
|
70 | 70 | return None |
|
71 | 71 | |
|
72 | 72 | |
|
73 | 73 | @pytest.fixture() |
|
74 | 74 | def vcscontroller(baseapp, config_stub, request_stub): |
|
75 | 75 | from rhodecode.config.middleware import ce_auth_resources |
|
76 | 76 | |
|
77 | 77 | config_stub.testing_securitypolicy() |
|
78 | 78 | config_stub.include('rhodecode.authentication') |
|
79 | 79 | |
|
80 | 80 | for resource in ce_auth_resources: |
|
81 | 81 | config_stub.include(resource) |
|
82 | 82 | |
|
83 | 83 | controller = StubVCSController( |
|
84 | 84 | baseapp.config.get_settings(), request_stub.registry) |
|
85 | 85 | app = HttpsFixup(controller, baseapp.config.get_settings()) |
|
86 | 86 | app = CustomTestApp(app) |
|
87 | 87 | |
|
88 | 88 | _remove_default_user_from_query_cache() |
|
89 | 89 | |
|
90 | 90 | # Sanity checks that things are set up correctly |
|
91 | 91 | app.get('/' + HG_REPO, status=200) |
|
92 | 92 | |
|
93 | 93 | app.controller = controller |
|
94 | 94 | return app |
|
95 | 95 | |
|
96 | 96 | |
|
97 | 97 | def _remove_default_user_from_query_cache(): |
|
98 | 98 | user = User.get_default_user(cache=True) |
|
99 | 99 | query = Session().query(User).filter(User.username == user.username) |
|
100 | 100 | query = query.options( |
|
101 | 101 | FromCache("sql_cache_short", f"get_user_{_hash_key(user.username)}")) |
|
102 | 102 | |
|
103 | 103 | db_cache.invalidate( |
|
104 | 104 | query, {}, |
|
105 | 105 | FromCache("sql_cache_short", f"get_user_{_hash_key(user.username)}")) |
|
106 | 106 | |
|
107 | 107 | Session().expire(user) |
|
108 | 108 | |
|
109 | 109 | |
|
110 | 110 | def test_handles_exceptions_during_permissions_checks( |
|
111 | 111 | vcscontroller, disable_anonymous_user, enable_auth_plugins, test_user_factory): |
|
112 | 112 | |
|
113 | 113 | test_password = 'qweqwe' |
|
114 | 114 | test_user = test_user_factory(password=test_password, extern_type='headers', extern_name='headers') |
|
115 | 115 | test_username = test_user.username |
|
116 | 116 | |
|
117 | 117 | enable_auth_plugins.enable([ |
|
118 | 118 | 'egg:rhodecode-enterprise-ce#headers', |
|
119 | 119 | 'egg:rhodecode-enterprise-ce#token', |
|
120 | 120 | 'egg:rhodecode-enterprise-ce#rhodecode'], |
|
121 | 121 | override={ |
|
122 | 122 | 'egg:rhodecode-enterprise-ce#headers': {'auth_headers_header': 'REMOTE_USER'} |
|
123 | 123 | }) |
|
124 | 124 | |
|
125 | 125 | user_and_pass = f'{test_username}:{test_password}' |
|
126 | 126 | auth_password = base64_to_str(user_and_pass) |
|
127 | 127 | |
|
128 | 128 | extra_environ = { |
|
129 | 129 | 'AUTH_TYPE': 'Basic', |
|
130 | 130 | 'HTTP_AUTHORIZATION': f'Basic {auth_password}', |
|
131 | 131 | 'REMOTE_USER': test_username, |
|
132 | 132 | } |
|
133 | 133 | |
|
134 | 134 | # Verify that things are hooked up correctly, we pass user with headers bound auth, and headers filled in |
|
135 | 135 | vcscontroller.get('/', status=200, extra_environ=extra_environ) |
|
136 | 136 | |
|
137 | 137 | # Simulate trouble during permission checks |
|
138 | 138 | with mock.patch('rhodecode.model.db.User.get_by_username', |
|
139 | 139 | side_effect=Exception('permission_error_test')) as get_user: |
|
140 | 140 | # Verify that a correct 500 is returned and check that the expected |
|
141 | 141 | # code path was hit. |
|
142 | 142 | vcscontroller.get('/', status=500, extra_environ=extra_environ) |
|
143 | 143 | assert get_user.called |
|
144 | 144 | |
|
145 | 145 | |
|
146 | 146 | class StubFailVCSController(simplevcs.SimpleVCS): |
|
147 | 147 | def _handle_request(self, environ, start_response): |
|
148 | 148 | raise Exception("BOOM") |
|
149 | 149 | |
|
150 | 150 | |
|
151 | 151 | @pytest.fixture(scope='module') |
|
152 | 152 | def fail_controller(baseapp): |
|
153 | 153 | controller = StubFailVCSController( |
|
154 | 154 | baseapp.config.get_settings(), baseapp.config) |
|
155 | 155 | controller = HttpsFixup(controller, baseapp.config.get_settings()) |
|
156 | 156 | controller = CustomTestApp(controller) |
|
157 | 157 | return controller |
|
158 | 158 | |
|
159 | 159 | |
|
160 | 160 | def test_handles_exceptions_as_internal_server_error(fail_controller): |
|
161 | 161 | fail_controller.get('/', status=500) |
|
162 | 162 | |
|
163 | 163 | |
|
164 | 164 | def test_provides_traceback_for_appenlight(fail_controller): |
|
165 | 165 | response = fail_controller.get( |
|
166 | 166 | '/', status=500, extra_environ={'appenlight.client': 'fake'}) |
|
167 | 167 | assert 'appenlight.__traceback' in response.request.environ |
|
168 | 168 | |
|
169 | 169 | |
|
170 | 170 | def test_provides_utils_scm_app_as_scm_app_by_default(baseapp, request_stub): |
|
171 | 171 | controller = StubVCSController(baseapp.config.get_settings(), request_stub.registry) |
|
172 | 172 | assert controller.scm_app is scm_app_http |
|
173 | 173 | |
|
174 | 174 | |
|
175 | 175 | def test_allows_to_override_scm_app_via_config(baseapp, request_stub): |
|
176 | 176 | config = baseapp.config.get_settings().copy() |
|
177 | 177 | config['vcs.scm_app_implementation'] = ( |
|
178 | 178 | 'rhodecode.tests.lib.middleware.mock_scm_app') |
|
179 | 179 | controller = StubVCSController(config, request_stub.registry) |
|
180 | 180 | assert controller.scm_app is mock_scm_app |
|
181 | 181 | |
|
182 | 182 | |
|
183 | 183 | @pytest.mark.parametrize('query_string, expected', [ |
|
184 | 184 | ('cmd=stub_command', True), |
|
185 | 185 | ('cmd=listkeys', False), |
|
186 | 186 | ]) |
|
187 | 187 | def test_should_check_locking(query_string, expected): |
|
188 | 188 | result = simplevcs._should_check_locking(query_string) |
|
189 | 189 | assert result == expected |
|
190 | 190 | |
|
191 | 191 | |
|
192 | 192 | class TestShadowRepoRegularExpression(object): |
|
193 | 193 | pr_segment = 'pull-request' |
|
194 | 194 | shadow_segment = 'repository' |
|
195 | 195 | |
|
196 | 196 | @pytest.mark.parametrize('url, expected', [ |
|
197 | 197 | # repo with/without groups |
|
198 | 198 | ('My-Repo/{pr_segment}/1/{shadow_segment}', True), |
|
199 | 199 | ('Group/My-Repo/{pr_segment}/2/{shadow_segment}', True), |
|
200 | 200 | ('Group/Sub-Group/My-Repo/{pr_segment}/3/{shadow_segment}', True), |
|
201 | 201 | ('Group/Sub-Group1/Sub-Group2/My-Repo/{pr_segment}/3/{shadow_segment}', True), |
|
202 | 202 | |
|
203 | 203 | # pull request ID |
|
204 | 204 | ('MyRepo/{pr_segment}/1/{shadow_segment}', True), |
|
205 | 205 | ('MyRepo/{pr_segment}/1234567890/{shadow_segment}', True), |
|
206 | 206 | ('MyRepo/{pr_segment}/-1/{shadow_segment}', False), |
|
207 | 207 | ('MyRepo/{pr_segment}/invalid/{shadow_segment}', False), |
|
208 | 208 | |
|
209 | 209 | # unicode |
|
210 | 210 | (u'Sp€çîál-Repö/{pr_segment}/1/{shadow_segment}', True), |
|
211 | 211 | (u'Sp€çîál-Gröüp/Sp€çîál-Repö/{pr_segment}/1/{shadow_segment}', True), |
|
212 | 212 | |
|
213 | 213 | # trailing/leading slash |
|
214 | 214 | ('/My-Repo/{pr_segment}/1/{shadow_segment}', False), |
|
215 | 215 | ('My-Repo/{pr_segment}/1/{shadow_segment}/', False), |
|
216 | 216 | ('/My-Repo/{pr_segment}/1/{shadow_segment}/', False), |
|
217 | 217 | |
|
218 | 218 | # misc |
|
219 | 219 | ('My-Repo/{pr_segment}/1/{shadow_segment}/extra', False), |
|
220 | 220 | ('My-Repo/{pr_segment}/1/{shadow_segment}extra', False), |
|
221 | 221 | ]) |
|
222 | 222 | def test_shadow_repo_regular_expression(self, url, expected): |
|
223 | 223 | from rhodecode.lib.middleware.simplevcs import SimpleVCS |
|
224 | 224 | url = url.format( |
|
225 | 225 | pr_segment=self.pr_segment, |
|
226 | 226 | shadow_segment=self.shadow_segment) |
|
227 | 227 | match_obj = SimpleVCS.shadow_repo_re.match(url) |
|
228 | 228 | assert (match_obj is not None) == expected |
|
229 | 229 | |
|
230 | 230 | |
|
231 | 231 | @pytest.mark.backends('git', 'hg') |
|
232 | 232 | class TestShadowRepoExposure(object): |
|
233 | 233 | |
|
234 | 234 | def test_pull_on_shadow_repo_propagates_to_wsgi_app( |
|
235 | 235 | self, baseapp, request_stub): |
|
236 | 236 | """ |
|
237 | 237 | Check that a pull action to a shadow repo is propagated to the |
|
238 | 238 | underlying wsgi app. |
|
239 | 239 | """ |
|
240 | 240 | controller = StubVCSController( |
|
241 | 241 | baseapp.config.get_settings(), request_stub.registry) |
|
242 | controller._check_ssl = mock.Mock() | |
|
243 | 242 | controller.is_shadow_repo = True |
|
244 | 243 | controller._action = 'pull' |
|
245 | 244 | controller._is_shadow_repo_dir = True |
|
246 | 245 | controller.stub_response_body = (b'dummy body value',) |
|
247 | 246 | controller._get_default_cache_ttl = mock.Mock( |
|
248 | 247 | return_value=(False, 0)) |
|
249 | 248 | |
|
250 | 249 | environ_stub = { |
|
251 | 250 | 'HTTP_HOST': 'test.example.com', |
|
252 | 251 | 'HTTP_ACCEPT': 'application/mercurial', |
|
253 | 252 | 'REQUEST_METHOD': 'GET', |
|
254 | 253 | 'wsgi.url_scheme': 'http', |
|
255 | 254 | } |
|
256 | 255 | |
|
257 | 256 | response = controller(environ_stub, mock.Mock()) |
|
258 | 257 | response_body = b''.join(response) |
|
259 | 258 | |
|
260 | 259 | # Assert that we got the response from the wsgi app. |
|
261 | 260 | assert response_body == b''.join(controller.stub_response_body) |
|
262 | 261 | |
|
263 | 262 | def test_pull_on_shadow_repo_that_is_missing(self, baseapp, request_stub): |
|
264 | 263 | """ |
|
265 | 264 | Check that a pull action to a shadow repo is propagated to the |
|
266 | 265 | underlying wsgi app. |
|
267 | 266 | """ |
|
268 | 267 | controller = StubVCSController( |
|
269 | 268 | baseapp.config.get_settings(), request_stub.registry) |
|
270 | controller._check_ssl = mock.Mock() | |
|
271 | 269 | controller.is_shadow_repo = True |
|
272 | 270 | controller._action = 'pull' |
|
273 | 271 | controller._is_shadow_repo_dir = False |
|
274 | 272 | controller.stub_response_body = (b'dummy body value',) |
|
275 | 273 | environ_stub = { |
|
276 | 274 | 'HTTP_HOST': 'test.example.com', |
|
277 | 275 | 'HTTP_ACCEPT': 'application/mercurial', |
|
278 | 276 | 'REQUEST_METHOD': 'GET', |
|
279 | 277 | 'wsgi.url_scheme': 'http', |
|
280 | 278 | } |
|
281 | 279 | |
|
282 | 280 | response = controller(environ_stub, mock.Mock()) |
|
283 | 281 | response_body = b''.join(response) |
|
284 | 282 | |
|
285 | 283 | # Assert that we got the response from the wsgi app. |
|
286 | 284 | assert b'404 Not Found' in response_body |
|
287 | 285 | |
|
288 | 286 | def test_push_on_shadow_repo_raises(self, baseapp, request_stub): |
|
289 | 287 | """ |
|
290 | 288 | Check that a push action to a shadow repo is aborted. |
|
291 | 289 | """ |
|
292 | 290 | controller = StubVCSController( |
|
293 | 291 | baseapp.config.get_settings(), request_stub.registry) |
|
294 | controller._check_ssl = mock.Mock() | |
|
295 | 292 | controller.is_shadow_repo = True |
|
296 | 293 | controller._action = 'push' |
|
297 | 294 | controller.stub_response_body = (b'dummy body value',) |
|
298 | 295 | environ_stub = { |
|
299 | 296 | 'HTTP_HOST': 'test.example.com', |
|
300 | 297 | 'HTTP_ACCEPT': 'application/mercurial', |
|
301 | 298 | 'REQUEST_METHOD': 'GET', |
|
302 | 299 | 'wsgi.url_scheme': 'http', |
|
303 | 300 | } |
|
304 | 301 | |
|
305 | 302 | response = controller(environ_stub, mock.Mock()) |
|
306 | 303 | response_body = b''.join(response) |
|
307 | 304 | |
|
308 | 305 | assert response_body != controller.stub_response_body |
|
309 | 306 | # Assert that a 406 error is returned. |
|
310 | 307 | assert b'406 Not Acceptable' in response_body |
|
311 | 308 | |
|
312 | 309 | def test_set_repo_names_no_shadow(self, baseapp, request_stub): |
|
313 | 310 | """ |
|
314 | 311 | Check that the set_repo_names method sets all names to the one returned |
|
315 | 312 | by the _get_repository_name method on a request to a non shadow repo. |
|
316 | 313 | """ |
|
317 | 314 | environ_stub = {} |
|
318 | 315 | controller = StubVCSController( |
|
319 | 316 | baseapp.config.get_settings(), request_stub.registry) |
|
320 | 317 | controller._name = 'RepoGroup/MyRepo' |
|
321 | 318 | controller.set_repo_names(environ_stub) |
|
322 | 319 | assert not controller.is_shadow_repo |
|
323 | 320 | assert (controller.url_repo_name == |
|
324 | 321 | controller.acl_repo_name == |
|
325 | 322 | controller.vcs_repo_name == |
|
326 | 323 | controller._get_repository_name(environ_stub)) |
|
327 | 324 | |
|
328 | 325 | def test_set_repo_names_with_shadow( |
|
329 | 326 | self, baseapp, pr_util, config_stub, request_stub): |
|
330 | 327 | """ |
|
331 | 328 | Check that the set_repo_names method sets correct names on a request |
|
332 | 329 | to a shadow repo. |
|
333 | 330 | """ |
|
334 | 331 | from rhodecode.model.pull_request import PullRequestModel |
|
335 | 332 | |
|
336 | 333 | pull_request = pr_util.create_pull_request() |
|
337 | 334 | shadow_url = '{target}/{pr_segment}/{pr_id}/{shadow_segment}'.format( |
|
338 | 335 | target=pull_request.target_repo.repo_name, |
|
339 | 336 | pr_id=pull_request.pull_request_id, |
|
340 | 337 | pr_segment=TestShadowRepoRegularExpression.pr_segment, |
|
341 | 338 | shadow_segment=TestShadowRepoRegularExpression.shadow_segment) |
|
342 | 339 | controller = StubVCSController( |
|
343 | 340 | baseapp.config.get_settings(), request_stub.registry) |
|
344 | 341 | controller._name = shadow_url |
|
345 | 342 | controller.set_repo_names({}) |
|
346 | 343 | |
|
347 | 344 | # Get file system path to shadow repo for assertions. |
|
348 | 345 | workspace_id = PullRequestModel()._workspace_id(pull_request) |
|
349 | 346 | vcs_repo_name = pull_request.target_repo.get_shadow_repository_path(workspace_id) |
|
350 | 347 | |
|
351 | 348 | assert controller.vcs_repo_name == vcs_repo_name |
|
352 | 349 | assert controller.url_repo_name == shadow_url |
|
353 | 350 | assert controller.acl_repo_name == pull_request.target_repo.repo_name |
|
354 | 351 | assert controller.is_shadow_repo |
|
355 | 352 | |
|
356 | 353 | def test_set_repo_names_with_shadow_but_missing_pr( |
|
357 | 354 | self, baseapp, pr_util, config_stub, request_stub): |
|
358 | 355 | """ |
|
359 | 356 | Checks that the set_repo_names method enforces matching target repos |
|
360 | 357 | and pull request IDs. |
|
361 | 358 | """ |
|
362 | 359 | pull_request = pr_util.create_pull_request() |
|
363 | 360 | shadow_url = '{target}/{pr_segment}/{pr_id}/{shadow_segment}'.format( |
|
364 | 361 | target=pull_request.target_repo.repo_name, |
|
365 | 362 | pr_id=999999999, |
|
366 | 363 | pr_segment=TestShadowRepoRegularExpression.pr_segment, |
|
367 | 364 | shadow_segment=TestShadowRepoRegularExpression.shadow_segment) |
|
368 | 365 | controller = StubVCSController( |
|
369 | 366 | baseapp.config.get_settings(), request_stub.registry) |
|
370 | 367 | controller._name = shadow_url |
|
371 | 368 | controller.set_repo_names({}) |
|
372 | 369 | |
|
373 | 370 | assert not controller.is_shadow_repo |
|
374 | 371 | assert (controller.url_repo_name == |
|
375 | 372 | controller.acl_repo_name == |
|
376 | 373 | controller.vcs_repo_name) |
|
377 | 374 | |
|
378 | 375 | |
|
379 | 376 | @pytest.mark.usefixtures('baseapp') |
|
380 | 377 | class TestGenerateVcsResponse(object): |
|
381 | 378 | |
|
382 | 379 | def test_ensures_that_start_response_is_called_early_enough(self): |
|
383 | 380 | self.call_controller_with_response_body(iter(['a', 'b'])) |
|
384 | 381 | assert self.start_response.called |
|
385 | 382 | |
|
386 | 383 | def test_invalidates_cache_after_body_is_consumed(self): |
|
387 | 384 | result = self.call_controller_with_response_body(iter(['a', 'b'])) |
|
388 | 385 | assert not self.was_cache_invalidated() |
|
389 | 386 | # Consume the result |
|
390 | 387 | list(result) |
|
391 | 388 | assert self.was_cache_invalidated() |
|
392 | 389 | |
|
393 | 390 | def test_raises_unknown_exceptions(self): |
|
394 | 391 | result = self.call_controller_with_response_body( |
|
395 | 392 | self.raise_result_iter(vcs_kind='unknown')) |
|
396 | 393 | with pytest.raises(Exception): |
|
397 | 394 | list(result) |
|
398 | 395 | |
|
399 | 396 | def call_controller_with_response_body(self, response_body): |
|
400 | 397 | settings = { |
|
401 | 398 | 'base_path': 'fake_base_path', |
|
402 | 399 | 'vcs.hooks.protocol.v2': 'celery', |
|
403 | 400 | 'vcs.hooks.direct_calls': False, |
|
404 | 401 | } |
|
405 | 402 | registry = AttributeDict() |
|
406 | 403 | controller = StubVCSController(settings, registry) |
|
407 | 404 | controller._invalidate_cache = mock.Mock() |
|
408 | 405 | controller.stub_response_body = response_body |
|
409 | 406 | self.start_response = mock.Mock() |
|
410 | 407 | result = controller._generate_vcs_response( |
|
411 | 408 | environ={}, start_response=self.start_response, |
|
412 | 409 | repo_path='fake_repo_path', |
|
413 | 410 | extras={}, action='push') |
|
414 | 411 | self.controller = controller |
|
415 | 412 | return result |
|
416 | 413 | |
|
417 | 414 | def raise_result_iter(self, vcs_kind='repo_locked'): |
|
418 | 415 | """ |
|
419 | 416 | Simulates an exception due to a vcs raised exception if kind vcs_kind |
|
420 | 417 | """ |
|
421 | 418 | raise self.vcs_exception(vcs_kind=vcs_kind) |
|
422 | 419 | yield "never_reached" |
|
423 | 420 | |
|
424 | 421 | def vcs_exception(self, vcs_kind='repo_locked'): |
|
425 | 422 | locked_exception = Exception('TEST_MESSAGE') |
|
426 | 423 | locked_exception._vcs_kind = vcs_kind |
|
427 | 424 | return locked_exception |
|
428 | 425 | |
|
429 | 426 | def was_cache_invalidated(self): |
|
430 | 427 | return self.controller._invalidate_cache.called |
|
431 | 428 | |
|
432 | 429 | |
|
433 | 430 | class TestInitializeGenerator(object): |
|
434 | 431 | |
|
435 | 432 | def test_drains_first_element(self): |
|
436 | 433 | gen = self.factory(['__init__', 1, 2]) |
|
437 | 434 | result = list(gen) |
|
438 | 435 | assert result == [1, 2] |
|
439 | 436 | |
|
440 | 437 | @pytest.mark.parametrize('values', [ |
|
441 | 438 | [], |
|
442 | 439 | [1, 2], |
|
443 | 440 | ]) |
|
444 | 441 | def test_raises_value_error(self, values): |
|
445 | 442 | with pytest.raises(ValueError): |
|
446 | 443 | self.factory(values) |
|
447 | 444 | |
|
448 | 445 | @simplevcs.initialize_generator |
|
449 | 446 | def factory(self, iterable): |
|
450 | 447 | for elem in iterable: |
|
451 | 448 | yield elem |
@@ -1,1108 +1,1097 b'' | |||
|
1 | 1 | |
|
2 | 2 | # Copyright (C) 2010-2023 RhodeCode GmbH |
|
3 | 3 | # |
|
4 | 4 | # This program is free software: you can redistribute it and/or modify |
|
5 | 5 | # it under the terms of the GNU Affero General Public License, version 3 |
|
6 | 6 | # (only), as published by the Free Software Foundation. |
|
7 | 7 | # |
|
8 | 8 | # This program is distributed in the hope that it will be useful, |
|
9 | 9 | # but WITHOUT ANY WARRANTY; without even the implied warranty of |
|
10 | 10 | # MERCHANTABILITY or FITNESS FOR A PARTICULAR PURPOSE. See the |
|
11 | 11 | # GNU General Public License for more details. |
|
12 | 12 | # |
|
13 | 13 | # You should have received a copy of the GNU Affero General Public License |
|
14 | 14 | # along with this program. If not, see <http://www.gnu.org/licenses/>. |
|
15 | 15 | # |
|
16 | 16 | # This program is dual-licensed. If you wish to learn more about the |
|
17 | 17 | # RhodeCode Enterprise Edition, including its added features, Support services, |
|
18 | 18 | # and proprietary license terms, please see https://rhodecode.com/licenses/ |
|
19 | 19 | |
|
20 | 20 | import mock |
|
21 | 21 | import pytest |
|
22 | 22 | |
|
23 | 23 | from rhodecode.lib.utils2 import str2bool |
|
24 | 24 | from rhodecode.model.meta import Session |
|
25 | 25 | from rhodecode.model.settings import VcsSettingsModel, UiSetting |
|
26 | 26 | |
|
27 | 27 | |
|
28 | 28 | HOOKS_FORM_DATA = { |
|
29 | 29 | 'hooks_changegroup_repo_size': True, |
|
30 | 30 | 'hooks_changegroup_push_logger': True, |
|
31 | 31 | 'hooks_outgoing_pull_logger': True |
|
32 | 32 | } |
|
33 | 33 | |
|
34 | 34 | SVN_FORM_DATA = { |
|
35 | 35 | 'new_svn_branch': 'test-branch', |
|
36 | 36 | 'new_svn_tag': 'test-tag' |
|
37 | 37 | } |
|
38 | 38 | |
|
39 | 39 | GENERAL_FORM_DATA = { |
|
40 | 40 | 'rhodecode_pr_merge_enabled': True, |
|
41 | 41 | 'rhodecode_use_outdated_comments': True, |
|
42 | 42 | 'rhodecode_hg_use_rebase_for_merging': True, |
|
43 | 43 | 'rhodecode_hg_close_branch_before_merging': True, |
|
44 | 44 | 'rhodecode_git_use_rebase_for_merging': True, |
|
45 | 45 | 'rhodecode_git_close_branch_before_merging': True, |
|
46 | 46 | 'rhodecode_diff_cache': True, |
|
47 | 47 | } |
|
48 | 48 | |
|
49 | 49 | |
|
50 | 50 | class TestInheritGlobalSettingsProperty(object): |
|
51 | 51 | def test_get_raises_exception_when_repository_not_specified(self): |
|
52 | 52 | model = VcsSettingsModel() |
|
53 | 53 | with pytest.raises(Exception) as exc_info: |
|
54 | 54 | model.inherit_global_settings |
|
55 | 55 | assert str(exc_info.value) == 'Repository is not specified' |
|
56 | 56 | |
|
57 | 57 | def test_true_is_returned_when_value_is_not_found(self, repo_stub): |
|
58 | 58 | model = VcsSettingsModel(repo=repo_stub.repo_name) |
|
59 | 59 | assert model.inherit_global_settings is True |
|
60 | 60 | |
|
61 | 61 | def test_value_is_returned(self, repo_stub, settings_util): |
|
62 | 62 | model = VcsSettingsModel(repo=repo_stub.repo_name) |
|
63 | 63 | settings_util.create_repo_rhodecode_setting( |
|
64 | 64 | repo_stub, VcsSettingsModel.INHERIT_SETTINGS, False, 'bool') |
|
65 | 65 | assert model.inherit_global_settings is False |
|
66 | 66 | |
|
67 | 67 | def test_value_is_set(self, repo_stub): |
|
68 | 68 | model = VcsSettingsModel(repo=repo_stub.repo_name) |
|
69 | 69 | model.inherit_global_settings = False |
|
70 | 70 | setting = model.repo_settings.get_setting_by_name( |
|
71 | 71 | VcsSettingsModel.INHERIT_SETTINGS) |
|
72 | 72 | try: |
|
73 | 73 | assert setting.app_settings_type == 'bool' |
|
74 | 74 | assert setting.app_settings_value is False |
|
75 | 75 | finally: |
|
76 | 76 | Session().delete(setting) |
|
77 | 77 | Session().commit() |
|
78 | 78 | |
|
79 | 79 | def test_set_raises_exception_when_repository_not_specified(self): |
|
80 | 80 | model = VcsSettingsModel() |
|
81 | 81 | with pytest.raises(Exception) as exc_info: |
|
82 | 82 | model.inherit_global_settings = False |
|
83 | 83 | assert str(exc_info.value) == 'Repository is not specified' |
|
84 | 84 | |
|
85 | 85 | |
|
86 | 86 | class TestVcsSettingsModel(object): |
|
87 | 87 | def test_global_svn_branch_patterns(self): |
|
88 | 88 | model = VcsSettingsModel() |
|
89 | 89 | expected_result = {'test': 'test'} |
|
90 | 90 | with mock.patch.object(model, 'global_settings') as settings_mock: |
|
91 | 91 | get_settings = settings_mock.get_ui_by_section |
|
92 | 92 | get_settings.return_value = expected_result |
|
93 | 93 | settings_mock.return_value = expected_result |
|
94 | 94 | result = model.get_global_svn_branch_patterns() |
|
95 | 95 | |
|
96 | 96 | get_settings.assert_called_once_with(model.SVN_BRANCH_SECTION) |
|
97 | 97 | assert expected_result == result |
|
98 | 98 | |
|
99 | 99 | def test_repo_svn_branch_patterns(self): |
|
100 | 100 | model = VcsSettingsModel() |
|
101 | 101 | expected_result = {'test': 'test'} |
|
102 | 102 | with mock.patch.object(model, 'repo_settings') as settings_mock: |
|
103 | 103 | get_settings = settings_mock.get_ui_by_section |
|
104 | 104 | get_settings.return_value = expected_result |
|
105 | 105 | settings_mock.return_value = expected_result |
|
106 | 106 | result = model.get_repo_svn_branch_patterns() |
|
107 | 107 | |
|
108 | 108 | get_settings.assert_called_once_with(model.SVN_BRANCH_SECTION) |
|
109 | 109 | assert expected_result == result |
|
110 | 110 | |
|
111 | 111 | def test_repo_svn_branch_patterns_raises_exception_when_repo_is_not_set( |
|
112 | 112 | self): |
|
113 | 113 | model = VcsSettingsModel() |
|
114 | 114 | with pytest.raises(Exception) as exc_info: |
|
115 | 115 | model.get_repo_svn_branch_patterns() |
|
116 | 116 | assert str(exc_info.value) == 'Repository is not specified' |
|
117 | 117 | |
|
118 | 118 | def test_global_svn_tag_patterns(self): |
|
119 | 119 | model = VcsSettingsModel() |
|
120 | 120 | expected_result = {'test': 'test'} |
|
121 | 121 | with mock.patch.object(model, 'global_settings') as settings_mock: |
|
122 | 122 | get_settings = settings_mock.get_ui_by_section |
|
123 | 123 | get_settings.return_value = expected_result |
|
124 | 124 | settings_mock.return_value = expected_result |
|
125 | 125 | result = model.get_global_svn_tag_patterns() |
|
126 | 126 | |
|
127 | 127 | get_settings.assert_called_once_with(model.SVN_TAG_SECTION) |
|
128 | 128 | assert expected_result == result |
|
129 | 129 | |
|
130 | 130 | def test_repo_svn_tag_patterns(self): |
|
131 | 131 | model = VcsSettingsModel() |
|
132 | 132 | expected_result = {'test': 'test'} |
|
133 | 133 | with mock.patch.object(model, 'repo_settings') as settings_mock: |
|
134 | 134 | get_settings = settings_mock.get_ui_by_section |
|
135 | 135 | get_settings.return_value = expected_result |
|
136 | 136 | settings_mock.return_value = expected_result |
|
137 | 137 | result = model.get_repo_svn_tag_patterns() |
|
138 | 138 | |
|
139 | 139 | get_settings.assert_called_once_with(model.SVN_TAG_SECTION) |
|
140 | 140 | assert expected_result == result |
|
141 | 141 | |
|
142 | 142 | def test_repo_svn_tag_patterns_raises_exception_when_repo_is_not_set(self): |
|
143 | 143 | model = VcsSettingsModel() |
|
144 | 144 | with pytest.raises(Exception) as exc_info: |
|
145 | 145 | model.get_repo_svn_tag_patterns() |
|
146 | 146 | assert str(exc_info.value) == 'Repository is not specified' |
|
147 | 147 | |
|
148 | 148 | def test_get_global_settings(self): |
|
149 | 149 | expected_result = {'test': 'test'} |
|
150 | 150 | model = VcsSettingsModel() |
|
151 | 151 | with mock.patch.object(model, '_collect_all_settings') as collect_mock: |
|
152 | 152 | collect_mock.return_value = expected_result |
|
153 | 153 | result = model.get_global_settings() |
|
154 | 154 | |
|
155 | 155 | collect_mock.assert_called_once_with(global_=True) |
|
156 | 156 | assert result == expected_result |
|
157 | 157 | |
|
158 | 158 | def test_get_repo_settings(self, repo_stub): |
|
159 | 159 | model = VcsSettingsModel(repo=repo_stub.repo_name) |
|
160 | 160 | expected_result = {'test': 'test'} |
|
161 | 161 | with mock.patch.object(model, '_collect_all_settings') as collect_mock: |
|
162 | 162 | collect_mock.return_value = expected_result |
|
163 | 163 | result = model.get_repo_settings() |
|
164 | 164 | |
|
165 | 165 | collect_mock.assert_called_once_with(global_=False) |
|
166 | 166 | assert result == expected_result |
|
167 | 167 | |
|
168 | 168 | @pytest.mark.parametrize('settings, global_', [ |
|
169 | 169 | ('global_settings', True), |
|
170 | 170 | ('repo_settings', False) |
|
171 | 171 | ]) |
|
172 | 172 | def test_collect_all_settings(self, settings, global_): |
|
173 | 173 | model = VcsSettingsModel() |
|
174 | 174 | result_mock = self._mock_result() |
|
175 | 175 | |
|
176 | 176 | settings_patch = mock.patch.object(model, settings) |
|
177 | 177 | with settings_patch as settings_mock: |
|
178 | 178 | settings_mock.get_ui_by_section_and_key.return_value = result_mock |
|
179 | 179 | settings_mock.get_setting_by_name.return_value = result_mock |
|
180 | 180 | result = model._collect_all_settings(global_=global_) |
|
181 | 181 | |
|
182 | 182 | ui_settings = model.HG_SETTINGS + model.GIT_SETTINGS + model.HOOKS_SETTINGS |
|
183 | 183 | self._assert_get_settings_calls( |
|
184 | 184 | settings_mock, ui_settings, model.GENERAL_SETTINGS) |
|
185 | 185 | self._assert_collect_all_settings_result( |
|
186 | 186 | ui_settings, model.GENERAL_SETTINGS, result) |
|
187 | 187 | |
|
188 | 188 | @pytest.mark.parametrize('settings, global_', [ |
|
189 | 189 | ('global_settings', True), |
|
190 | 190 | ('repo_settings', False) |
|
191 | 191 | ]) |
|
192 | 192 | def test_collect_all_settings_without_empty_value(self, settings, global_): |
|
193 | 193 | model = VcsSettingsModel() |
|
194 | 194 | |
|
195 | 195 | settings_patch = mock.patch.object(model, settings) |
|
196 | 196 | with settings_patch as settings_mock: |
|
197 | 197 | settings_mock.get_ui_by_section_and_key.return_value = None |
|
198 | 198 | settings_mock.get_setting_by_name.return_value = None |
|
199 | 199 | result = model._collect_all_settings(global_=global_) |
|
200 | 200 | |
|
201 | 201 | assert result == {} |
|
202 | 202 | |
|
203 | 203 | def _mock_result(self): |
|
204 | 204 | result_mock = mock.Mock() |
|
205 | 205 | result_mock.ui_value = 'ui_value' |
|
206 | 206 | result_mock.ui_active = True |
|
207 | 207 | result_mock.app_settings_value = 'setting_value' |
|
208 | 208 | return result_mock |
|
209 | 209 | |
|
210 | 210 | def _assert_get_settings_calls( |
|
211 | 211 | self, settings_mock, ui_settings, general_settings): |
|
212 | 212 | assert ( |
|
213 | 213 | settings_mock.get_ui_by_section_and_key.call_count == |
|
214 | 214 | len(ui_settings)) |
|
215 | 215 | assert ( |
|
216 | 216 | settings_mock.get_setting_by_name.call_count == |
|
217 | 217 | len(general_settings)) |
|
218 | 218 | |
|
219 | 219 | for section, key in ui_settings: |
|
220 | 220 | expected_call = mock.call(section, key) |
|
221 | 221 | assert ( |
|
222 | 222 | expected_call in |
|
223 | 223 | settings_mock.get_ui_by_section_and_key.call_args_list) |
|
224 | 224 | |
|
225 | 225 | for name in general_settings: |
|
226 | 226 | expected_call = mock.call(name) |
|
227 | 227 | assert ( |
|
228 | 228 | expected_call in |
|
229 | 229 | settings_mock.get_setting_by_name.call_args_list) |
|
230 | 230 | |
|
231 | 231 | def _assert_collect_all_settings_result( |
|
232 | 232 | self, ui_settings, general_settings, result): |
|
233 | 233 | expected_result = {} |
|
234 | 234 | for section, key in ui_settings: |
|
235 | 235 | key = '{}_{}'.format(section, key.replace('.', '_')) |
|
236 | 236 | |
|
237 | 237 | if section in ('extensions', 'hooks'): |
|
238 | 238 | value = True |
|
239 | 239 | elif key in ['vcs_git_lfs_enabled']: |
|
240 | 240 | value = True |
|
241 | 241 | else: |
|
242 | 242 | value = 'ui_value' |
|
243 | 243 | expected_result[key] = value |
|
244 | 244 | |
|
245 | 245 | for name in general_settings: |
|
246 | 246 | key = 'rhodecode_' + name |
|
247 | 247 | expected_result[key] = 'setting_value' |
|
248 | 248 | |
|
249 | 249 | assert expected_result == result |
|
250 | 250 | |
|
251 | 251 | |
|
252 | 252 | class TestCreateOrUpdateRepoHookSettings(object): |
|
253 | 253 | def test_create_when_no_repo_object_found(self, repo_stub): |
|
254 | 254 | model = VcsSettingsModel(repo=repo_stub.repo_name) |
|
255 | 255 | |
|
256 | 256 | self._create_settings(model, HOOKS_FORM_DATA) |
|
257 | 257 | |
|
258 | 258 | cleanup = [] |
|
259 | 259 | try: |
|
260 | 260 | for section, key in model.HOOKS_SETTINGS: |
|
261 | 261 | ui = model.repo_settings.get_ui_by_section_and_key( |
|
262 | 262 | section, key) |
|
263 | 263 | assert ui.ui_active is True |
|
264 | 264 | cleanup.append(ui) |
|
265 | 265 | finally: |
|
266 | 266 | for ui in cleanup: |
|
267 | 267 | Session().delete(ui) |
|
268 | 268 | Session().commit() |
|
269 | 269 | |
|
270 | 270 | def test_create_raises_exception_when_data_incomplete(self, repo_stub): |
|
271 | 271 | model = VcsSettingsModel(repo=repo_stub.repo_name) |
|
272 | 272 | |
|
273 | 273 | deleted_key = 'hooks_changegroup_repo_size' |
|
274 | 274 | data = HOOKS_FORM_DATA.copy() |
|
275 | 275 | data.pop(deleted_key) |
|
276 | 276 | |
|
277 | 277 | with pytest.raises(ValueError) as exc_info: |
|
278 | 278 | model.create_or_update_repo_hook_settings(data) |
|
279 | 279 | Session().commit() |
|
280 | 280 | |
|
281 | 281 | msg = 'The given data does not contain {} key'.format(deleted_key) |
|
282 | 282 | assert str(exc_info.value) == msg |
|
283 | 283 | |
|
284 | 284 | def test_update_when_repo_object_found(self, repo_stub, settings_util): |
|
285 | 285 | model = VcsSettingsModel(repo=repo_stub.repo_name) |
|
286 | 286 | for section, key in model.HOOKS_SETTINGS: |
|
287 | 287 | settings_util.create_repo_rhodecode_ui( |
|
288 | 288 | repo_stub, section, None, key=key, active=False) |
|
289 | 289 | model.create_or_update_repo_hook_settings(HOOKS_FORM_DATA) |
|
290 | 290 | Session().commit() |
|
291 | 291 | |
|
292 | 292 | for section, key in model.HOOKS_SETTINGS: |
|
293 | 293 | ui = model.repo_settings.get_ui_by_section_and_key(section, key) |
|
294 | 294 | assert ui.ui_active is True |
|
295 | 295 | |
|
296 | 296 | def _create_settings(self, model, data): |
|
297 | 297 | global_patch = mock.patch.object(model, 'global_settings') |
|
298 | 298 | global_setting = mock.Mock() |
|
299 | 299 | global_setting.ui_value = 'Test value' |
|
300 | 300 | with global_patch as global_mock: |
|
301 | 301 | global_mock.get_ui_by_section_and_key.return_value = global_setting |
|
302 | 302 | model.create_or_update_repo_hook_settings(HOOKS_FORM_DATA) |
|
303 | 303 | Session().commit() |
|
304 | 304 | |
|
305 | 305 | |
|
306 | 306 | class TestUpdateGlobalHookSettings(object): |
|
307 | 307 | def test_update_raises_exception_when_data_incomplete(self): |
|
308 | 308 | model = VcsSettingsModel() |
|
309 | 309 | |
|
310 | 310 | deleted_key = 'hooks_changegroup_repo_size' |
|
311 | 311 | data = HOOKS_FORM_DATA.copy() |
|
312 | 312 | data.pop(deleted_key) |
|
313 | 313 | |
|
314 | 314 | with pytest.raises(ValueError) as exc_info: |
|
315 | 315 | model.update_global_hook_settings(data) |
|
316 | 316 | Session().commit() |
|
317 | 317 | |
|
318 | 318 | msg = 'The given data does not contain {} key'.format(deleted_key) |
|
319 | 319 | assert str(exc_info.value) == msg |
|
320 | 320 | |
|
321 | 321 | def test_update_global_hook_settings(self, settings_util): |
|
322 | 322 | model = VcsSettingsModel() |
|
323 | 323 | setting_mock = mock.MagicMock() |
|
324 | 324 | setting_mock.ui_active = False |
|
325 | 325 | get_settings_patcher = mock.patch.object( |
|
326 | 326 | model.global_settings, 'get_ui_by_section_and_key', |
|
327 | 327 | return_value=setting_mock) |
|
328 | 328 | session_patcher = mock.patch('rhodecode.model.settings.Session') |
|
329 | 329 | with get_settings_patcher as get_settings_mock, session_patcher: |
|
330 | 330 | model.update_global_hook_settings(HOOKS_FORM_DATA) |
|
331 | 331 | Session().commit() |
|
332 | 332 | |
|
333 | 333 | assert setting_mock.ui_active is True |
|
334 | 334 | assert get_settings_mock.call_count == 3 |
|
335 | 335 | |
|
336 | 336 | |
|
337 | 337 | class TestCreateOrUpdateRepoGeneralSettings(object): |
|
338 | 338 | def test_calls_create_or_update_general_settings(self, repo_stub): |
|
339 | 339 | model = VcsSettingsModel(repo=repo_stub.repo_name) |
|
340 | 340 | create_patch = mock.patch.object( |
|
341 | 341 | model, '_create_or_update_general_settings') |
|
342 | 342 | with create_patch as create_mock: |
|
343 | 343 | model.create_or_update_repo_pr_settings(GENERAL_FORM_DATA) |
|
344 | 344 | Session().commit() |
|
345 | 345 | |
|
346 | 346 | create_mock.assert_called_once_with( |
|
347 | 347 | model.repo_settings, GENERAL_FORM_DATA) |
|
348 | 348 | |
|
349 | 349 | def test_raises_exception_when_repository_is_not_specified(self): |
|
350 | 350 | model = VcsSettingsModel() |
|
351 | 351 | with pytest.raises(Exception) as exc_info: |
|
352 | 352 | model.create_or_update_repo_pr_settings(GENERAL_FORM_DATA) |
|
353 | 353 | assert str(exc_info.value) == 'Repository is not specified' |
|
354 | 354 | |
|
355 | 355 | |
|
356 | 356 | class TestCreateOrUpdatGlobalGeneralSettings(object): |
|
357 | 357 | def test_calls_create_or_update_general_settings(self): |
|
358 | 358 | model = VcsSettingsModel() |
|
359 | 359 | create_patch = mock.patch.object( |
|
360 | 360 | model, '_create_or_update_general_settings') |
|
361 | 361 | with create_patch as create_mock: |
|
362 | 362 | model.create_or_update_global_pr_settings(GENERAL_FORM_DATA) |
|
363 | 363 | create_mock.assert_called_once_with( |
|
364 | 364 | model.global_settings, GENERAL_FORM_DATA) |
|
365 | 365 | |
|
366 | 366 | |
|
367 | 367 | class TestCreateOrUpdateGeneralSettings(object): |
|
368 | 368 | def test_create_when_no_repo_settings_found(self, repo_stub): |
|
369 | 369 | model = VcsSettingsModel(repo=repo_stub.repo_name) |
|
370 | 370 | model._create_or_update_general_settings( |
|
371 | 371 | model.repo_settings, GENERAL_FORM_DATA) |
|
372 | 372 | |
|
373 | 373 | cleanup = [] |
|
374 | 374 | try: |
|
375 | 375 | for name in model.GENERAL_SETTINGS: |
|
376 | 376 | setting = model.repo_settings.get_setting_by_name(name) |
|
377 | 377 | assert setting.app_settings_value is True |
|
378 | 378 | cleanup.append(setting) |
|
379 | 379 | finally: |
|
380 | 380 | for setting in cleanup: |
|
381 | 381 | Session().delete(setting) |
|
382 | 382 | Session().commit() |
|
383 | 383 | |
|
384 | 384 | def test_create_raises_exception_when_data_incomplete(self, repo_stub): |
|
385 | 385 | model = VcsSettingsModel(repo=repo_stub.repo_name) |
|
386 | 386 | |
|
387 | 387 | deleted_key = 'rhodecode_pr_merge_enabled' |
|
388 | 388 | data = GENERAL_FORM_DATA.copy() |
|
389 | 389 | data.pop(deleted_key) |
|
390 | 390 | |
|
391 | 391 | with pytest.raises(ValueError) as exc_info: |
|
392 | 392 | model._create_or_update_general_settings(model.repo_settings, data) |
|
393 | 393 | Session().commit() |
|
394 | 394 | |
|
395 | 395 | msg = 'The given data does not contain {} key'.format(deleted_key) |
|
396 | 396 | assert str(exc_info.value) == msg |
|
397 | 397 | |
|
398 | 398 | def test_update_when_repo_setting_found(self, repo_stub, settings_util): |
|
399 | 399 | model = VcsSettingsModel(repo=repo_stub.repo_name) |
|
400 | 400 | for name in model.GENERAL_SETTINGS: |
|
401 | 401 | settings_util.create_repo_rhodecode_setting( |
|
402 | 402 | repo_stub, name, False, 'bool') |
|
403 | 403 | |
|
404 | 404 | model._create_or_update_general_settings( |
|
405 | 405 | model.repo_settings, GENERAL_FORM_DATA) |
|
406 | 406 | Session().commit() |
|
407 | 407 | |
|
408 | 408 | for name in model.GENERAL_SETTINGS: |
|
409 | 409 | setting = model.repo_settings.get_setting_by_name(name) |
|
410 | 410 | assert setting.app_settings_value is True |
|
411 | 411 | |
|
412 | 412 | |
|
413 | 413 | class TestCreateRepoSvnSettings(object): |
|
414 | 414 | def test_calls_create_svn_settings(self, repo_stub): |
|
415 | 415 | model = VcsSettingsModel(repo=repo_stub.repo_name) |
|
416 | 416 | with mock.patch.object(model, '_create_svn_settings') as create_mock: |
|
417 | 417 | model.create_repo_svn_settings(SVN_FORM_DATA) |
|
418 | 418 | Session().commit() |
|
419 | 419 | |
|
420 | 420 | create_mock.assert_called_once_with(model.repo_settings, SVN_FORM_DATA) |
|
421 | 421 | |
|
422 | 422 | def test_raises_exception_when_repository_is_not_specified(self): |
|
423 | 423 | model = VcsSettingsModel() |
|
424 | 424 | with pytest.raises(Exception) as exc_info: |
|
425 | 425 | model.create_repo_svn_settings(SVN_FORM_DATA) |
|
426 | 426 | Session().commit() |
|
427 | 427 | |
|
428 | 428 | assert str(exc_info.value) == 'Repository is not specified' |
|
429 | 429 | |
|
430 | 430 | |
|
431 | 431 | class TestCreateSvnSettings(object): |
|
432 | 432 | def test_create(self, repo_stub): |
|
433 | 433 | model = VcsSettingsModel(repo=repo_stub.repo_name) |
|
434 | 434 | model._create_svn_settings(model.repo_settings, SVN_FORM_DATA) |
|
435 | 435 | Session().commit() |
|
436 | 436 | |
|
437 | 437 | branch_ui = model.repo_settings.get_ui_by_section( |
|
438 | 438 | model.SVN_BRANCH_SECTION) |
|
439 | 439 | tag_ui = model.repo_settings.get_ui_by_section( |
|
440 | 440 | model.SVN_TAG_SECTION) |
|
441 | 441 | |
|
442 | 442 | try: |
|
443 | 443 | assert len(branch_ui) == 1 |
|
444 | 444 | assert len(tag_ui) == 1 |
|
445 | 445 | finally: |
|
446 | 446 | Session().delete(branch_ui[0]) |
|
447 | 447 | Session().delete(tag_ui[0]) |
|
448 | 448 | Session().commit() |
|
449 | 449 | |
|
450 | 450 | def test_create_tag(self, repo_stub): |
|
451 | 451 | model = VcsSettingsModel(repo=repo_stub.repo_name) |
|
452 | 452 | data = SVN_FORM_DATA.copy() |
|
453 | 453 | data.pop('new_svn_branch') |
|
454 | 454 | model._create_svn_settings(model.repo_settings, data) |
|
455 | 455 | Session().commit() |
|
456 | 456 | |
|
457 | 457 | branch_ui = model.repo_settings.get_ui_by_section( |
|
458 | 458 | model.SVN_BRANCH_SECTION) |
|
459 | 459 | tag_ui = model.repo_settings.get_ui_by_section( |
|
460 | 460 | model.SVN_TAG_SECTION) |
|
461 | 461 | |
|
462 | 462 | try: |
|
463 | 463 | assert len(branch_ui) == 0 |
|
464 | 464 | assert len(tag_ui) == 1 |
|
465 | 465 | finally: |
|
466 | 466 | Session().delete(tag_ui[0]) |
|
467 | 467 | Session().commit() |
|
468 | 468 | |
|
469 | 469 | def test_create_nothing_when_no_svn_settings_specified(self, repo_stub): |
|
470 | 470 | model = VcsSettingsModel(repo=repo_stub.repo_name) |
|
471 | 471 | model._create_svn_settings(model.repo_settings, {}) |
|
472 | 472 | Session().commit() |
|
473 | 473 | |
|
474 | 474 | branch_ui = model.repo_settings.get_ui_by_section( |
|
475 | 475 | model.SVN_BRANCH_SECTION) |
|
476 | 476 | tag_ui = model.repo_settings.get_ui_by_section( |
|
477 | 477 | model.SVN_TAG_SECTION) |
|
478 | 478 | |
|
479 | 479 | assert len(branch_ui) == 0 |
|
480 | 480 | assert len(tag_ui) == 0 |
|
481 | 481 | |
|
482 | 482 | def test_create_nothing_when_empty_settings_specified(self, repo_stub): |
|
483 | 483 | model = VcsSettingsModel(repo=repo_stub.repo_name) |
|
484 | 484 | data = { |
|
485 | 485 | 'new_svn_branch': '', |
|
486 | 486 | 'new_svn_tag': '' |
|
487 | 487 | } |
|
488 | 488 | model._create_svn_settings(model.repo_settings, data) |
|
489 | 489 | Session().commit() |
|
490 | 490 | |
|
491 | 491 | branch_ui = model.repo_settings.get_ui_by_section( |
|
492 | 492 | model.SVN_BRANCH_SECTION) |
|
493 | 493 | tag_ui = model.repo_settings.get_ui_by_section( |
|
494 | 494 | model.SVN_TAG_SECTION) |
|
495 | 495 | |
|
496 | 496 | assert len(branch_ui) == 0 |
|
497 | 497 | assert len(tag_ui) == 0 |
|
498 | 498 | |
|
499 | 499 | |
|
500 | 500 | class TestCreateOrUpdateUi(object): |
|
501 | 501 | def test_create(self, repo_stub): |
|
502 | 502 | model = VcsSettingsModel(repo=repo_stub.repo_name) |
|
503 | 503 | model._create_or_update_ui( |
|
504 | 504 | model.repo_settings, 'test-section', 'test-key', active=False, |
|
505 | 505 | value='False') |
|
506 | 506 | Session().commit() |
|
507 | 507 | |
|
508 | 508 | created_ui = model.repo_settings.get_ui_by_section_and_key( |
|
509 | 509 | 'test-section', 'test-key') |
|
510 | 510 | |
|
511 | 511 | try: |
|
512 | 512 | assert created_ui.ui_active is False |
|
513 | 513 | assert str2bool(created_ui.ui_value) is False |
|
514 | 514 | finally: |
|
515 | 515 | Session().delete(created_ui) |
|
516 | 516 | Session().commit() |
|
517 | 517 | |
|
518 | 518 | def test_update(self, repo_stub, settings_util): |
|
519 | 519 | model = VcsSettingsModel(repo=repo_stub.repo_name) |
|
520 | 520 | # care about only 3 first settings |
|
521 | 521 | largefiles, phases, evolve = model.HG_SETTINGS[:3] |
|
522 | 522 | |
|
523 | 523 | section = 'test-section' |
|
524 | 524 | key = 'test-key' |
|
525 | 525 | settings_util.create_repo_rhodecode_ui( |
|
526 | 526 | repo_stub, section, 'True', key=key, active=True) |
|
527 | 527 | |
|
528 | 528 | model._create_or_update_ui( |
|
529 | 529 | model.repo_settings, section, key, active=False, value='False') |
|
530 | 530 | Session().commit() |
|
531 | 531 | |
|
532 | 532 | created_ui = model.repo_settings.get_ui_by_section_and_key( |
|
533 | 533 | section, key) |
|
534 | 534 | assert created_ui.ui_active is False |
|
535 | 535 | assert str2bool(created_ui.ui_value) is False |
|
536 | 536 | |
|
537 | 537 | |
|
538 | 538 | class TestCreateOrUpdateRepoHgSettings(object): |
|
539 | 539 | FORM_DATA = { |
|
540 | 540 | 'extensions_largefiles': False, |
|
541 | 541 | 'extensions_evolve': False, |
|
542 | 542 | 'phases_publish': False |
|
543 | 543 | } |
|
544 | 544 | |
|
545 | 545 | def test_creates_repo_hg_settings_when_data_is_correct(self, repo_stub): |
|
546 | 546 | model = VcsSettingsModel(repo=repo_stub.repo_name) |
|
547 | 547 | with mock.patch.object(model, '_create_or_update_ui') as create_mock: |
|
548 | 548 | model.create_or_update_repo_hg_settings(self.FORM_DATA) |
|
549 | 549 | expected_calls = [ |
|
550 | 550 | mock.call(model.repo_settings, 'extensions', 'largefiles', active=False, value=''), |
|
551 | 551 | mock.call(model.repo_settings, 'extensions', 'evolve', active=False, value=''), |
|
552 | 552 | mock.call(model.repo_settings, 'experimental', 'evolution', active=False, value=''), |
|
553 | 553 | mock.call(model.repo_settings, 'experimental', 'evolution.exchange', active=False, value='no'), |
|
554 | 554 | mock.call(model.repo_settings, 'extensions', 'topic', active=False, value=''), |
|
555 | 555 | mock.call(model.repo_settings, 'phases', 'publish', value='False'), |
|
556 | 556 | ] |
|
557 | 557 | assert expected_calls == create_mock.call_args_list |
|
558 | 558 | |
|
559 | 559 | @pytest.mark.parametrize('field_to_remove', FORM_DATA.keys()) |
|
560 | 560 | def test_key_is_not_found(self, repo_stub, field_to_remove): |
|
561 | 561 | model = VcsSettingsModel(repo=repo_stub.repo_name) |
|
562 | 562 | data = self.FORM_DATA.copy() |
|
563 | 563 | data.pop(field_to_remove) |
|
564 | 564 | with pytest.raises(ValueError) as exc_info: |
|
565 | 565 | model.create_or_update_repo_hg_settings(data) |
|
566 | 566 | Session().commit() |
|
567 | 567 | |
|
568 | 568 | expected_message = 'The given data does not contain {} key'.format( |
|
569 | 569 | field_to_remove) |
|
570 | 570 | assert str(exc_info.value) == expected_message |
|
571 | 571 | |
|
572 | 572 | def test_create_raises_exception_when_repository_not_specified(self): |
|
573 | 573 | model = VcsSettingsModel() |
|
574 | 574 | with pytest.raises(Exception) as exc_info: |
|
575 | 575 | model.create_or_update_repo_hg_settings(self.FORM_DATA) |
|
576 | 576 | Session().commit() |
|
577 | 577 | |
|
578 | 578 | assert str(exc_info.value) == 'Repository is not specified' |
|
579 | 579 | |
|
580 | 580 | |
|
581 | class TestUpdateGlobalSslSetting(object): | |
|
582 | def test_updates_global_hg_settings(self): | |
|
583 | model = VcsSettingsModel() | |
|
584 | with mock.patch.object(model, '_create_or_update_ui') as create_mock: | |
|
585 | model.update_global_ssl_setting('False') | |
|
586 | Session().commit() | |
|
587 | ||
|
588 | create_mock.assert_called_once_with( | |
|
589 | model.global_settings, 'web', 'push_ssl', value='False') | |
|
590 | ||
|
591 | ||
|
592 | 581 | class TestCreateOrUpdateGlobalHgSettings(object): |
|
593 | 582 | FORM_DATA = { |
|
594 | 583 | 'extensions_largefiles': False, |
|
595 | 584 | 'phases_publish': False, |
|
596 | 585 | 'extensions_evolve': False |
|
597 | 586 | } |
|
598 | 587 | |
|
599 | 588 | def test_creates_repo_hg_settings_when_data_is_correct(self): |
|
600 | 589 | model = VcsSettingsModel() |
|
601 | 590 | with mock.patch.object(model, '_create_or_update_ui') as create_mock: |
|
602 | 591 | model.create_or_update_global_hg_settings(self.FORM_DATA) |
|
603 | 592 | Session().commit() |
|
604 | 593 | |
|
605 | 594 | expected_calls = [ |
|
606 | 595 | mock.call(model.global_settings, 'extensions', 'largefiles', active=False, value=''), |
|
607 | 596 | mock.call(model.global_settings, 'phases', 'publish', value='False'), |
|
608 | 597 | mock.call(model.global_settings, 'extensions', 'evolve', active=False, value=''), |
|
609 | 598 | mock.call(model.global_settings, 'experimental', 'evolution', active=False, value=''), |
|
610 | 599 | mock.call(model.global_settings, 'experimental', 'evolution.exchange', active=False, value='no'), |
|
611 | 600 | mock.call(model.global_settings, 'extensions', 'topic', active=False, value=''), |
|
612 | 601 | ] |
|
613 | 602 | |
|
614 | 603 | assert expected_calls == create_mock.call_args_list |
|
615 | 604 | |
|
616 | 605 | @pytest.mark.parametrize('field_to_remove', FORM_DATA.keys()) |
|
617 | 606 | def test_key_is_not_found(self, repo_stub, field_to_remove): |
|
618 | 607 | model = VcsSettingsModel(repo=repo_stub.repo_name) |
|
619 | 608 | data = self.FORM_DATA.copy() |
|
620 | 609 | data.pop(field_to_remove) |
|
621 | 610 | with pytest.raises(Exception) as exc_info: |
|
622 | 611 | model.create_or_update_global_hg_settings(data) |
|
623 | 612 | Session().commit() |
|
624 | 613 | |
|
625 | 614 | expected_message = 'The given data does not contain {} key'.format( |
|
626 | 615 | field_to_remove) |
|
627 | 616 | assert str(exc_info.value) == expected_message |
|
628 | 617 | |
|
629 | 618 | |
|
630 | 619 | class TestCreateOrUpdateGlobalGitSettings(object): |
|
631 | 620 | FORM_DATA = { |
|
632 | 621 | 'vcs_git_lfs_enabled': False, |
|
633 | 622 | } |
|
634 | 623 | |
|
635 | 624 | def test_creates_repo_hg_settings_when_data_is_correct(self): |
|
636 | 625 | model = VcsSettingsModel() |
|
637 | 626 | with mock.patch.object(model, '_create_or_update_ui') as create_mock: |
|
638 | 627 | model.create_or_update_global_git_settings(self.FORM_DATA) |
|
639 | 628 | Session().commit() |
|
640 | 629 | |
|
641 | 630 | expected_calls = [ |
|
642 | 631 | mock.call(model.global_settings, 'vcs_git_lfs', 'enabled', active=False, value=False), |
|
643 | 632 | ] |
|
644 | 633 | assert expected_calls == create_mock.call_args_list |
|
645 | 634 | |
|
646 | 635 | |
|
647 | 636 | class TestDeleteRepoSvnPattern(object): |
|
648 | 637 | def test_success_when_repo_is_set(self, backend_svn, settings_util): |
|
649 | 638 | repo = backend_svn.create_repo() |
|
650 | 639 | repo_name = repo.repo_name |
|
651 | 640 | |
|
652 | 641 | model = VcsSettingsModel(repo=repo_name) |
|
653 | 642 | entry = settings_util.create_repo_rhodecode_ui( |
|
654 | 643 | repo, VcsSettingsModel.SVN_BRANCH_SECTION, 'svn-branch') |
|
655 | 644 | Session().commit() |
|
656 | 645 | |
|
657 | 646 | model.delete_repo_svn_pattern(entry.ui_id) |
|
658 | 647 | |
|
659 | 648 | def test_fail_when_delete_id_from_other_repo(self, backend_svn): |
|
660 | 649 | repo_name = backend_svn.repo_name |
|
661 | 650 | model = VcsSettingsModel(repo=repo_name) |
|
662 | 651 | delete_ui_patch = mock.patch.object(model.repo_settings, 'delete_ui') |
|
663 | 652 | with delete_ui_patch as delete_ui_mock: |
|
664 | 653 | model.delete_repo_svn_pattern(123) |
|
665 | 654 | Session().commit() |
|
666 | 655 | |
|
667 | 656 | delete_ui_mock.assert_called_once_with(-1) |
|
668 | 657 | |
|
669 | 658 | def test_raises_exception_when_repository_is_not_specified(self): |
|
670 | 659 | model = VcsSettingsModel() |
|
671 | 660 | with pytest.raises(Exception) as exc_info: |
|
672 | 661 | model.delete_repo_svn_pattern(123) |
|
673 | 662 | assert str(exc_info.value) == 'Repository is not specified' |
|
674 | 663 | |
|
675 | 664 | |
|
676 | 665 | class TestDeleteGlobalSvnPattern(object): |
|
677 | 666 | def test_delete_global_svn_pattern_calls_delete_ui(self): |
|
678 | 667 | model = VcsSettingsModel() |
|
679 | 668 | delete_ui_patch = mock.patch.object(model.global_settings, 'delete_ui') |
|
680 | 669 | with delete_ui_patch as delete_ui_mock: |
|
681 | 670 | model.delete_global_svn_pattern(123) |
|
682 | 671 | delete_ui_mock.assert_called_once_with(123) |
|
683 | 672 | |
|
684 | 673 | |
|
685 | 674 | class TestFilterUiSettings(object): |
|
686 | 675 | def test_settings_are_filtered(self): |
|
687 | 676 | model = VcsSettingsModel() |
|
688 | 677 | repo_settings = [ |
|
689 | 678 | UiSetting('extensions', 'largefiles', '', True), |
|
690 | 679 | UiSetting('phases', 'publish', 'True', True), |
|
691 | 680 | UiSetting('hooks', 'changegroup.repo_size', 'hook', True), |
|
692 | 681 | UiSetting('hooks', 'changegroup.push_logger', 'hook', True), |
|
693 | 682 | UiSetting('hooks', 'outgoing.pull_logger', 'hook', True), |
|
694 | 683 | UiSetting( |
|
695 | 684 | 'vcs_svn_branch', '84223c972204fa545ca1b22dac7bef5b68d7442d', |
|
696 | 685 | 'test_branch', True), |
|
697 | 686 | UiSetting( |
|
698 | 687 | 'vcs_svn_tag', '84229c972204fa545ca1b22dac7bef5b68d7442d', |
|
699 | 688 | 'test_tag', True), |
|
700 | 689 | ] |
|
701 | 690 | non_repo_settings = [ |
|
702 | 691 | UiSetting('largefiles', 'usercache', '/example/largefiles-store', True), |
|
703 | 692 | UiSetting('test', 'outgoing.pull_logger', 'hook', True), |
|
704 | 693 | UiSetting('hooks', 'test2', 'hook', True), |
|
705 | 694 | UiSetting( |
|
706 | 695 | 'vcs_svn_repo', '84229c972204fa545ca1b22dac7bef5b68d7442d', |
|
707 | 696 | 'test_tag', True), |
|
708 | 697 | ] |
|
709 | 698 | settings = repo_settings + non_repo_settings |
|
710 | 699 | filtered_settings = model._filter_ui_settings(settings) |
|
711 | 700 | assert sorted(filtered_settings) == sorted(repo_settings) |
|
712 | 701 | |
|
713 | 702 | |
|
714 | 703 | class TestFilterGeneralSettings(object): |
|
715 | 704 | def test_settings_are_filtered(self): |
|
716 | 705 | model = VcsSettingsModel() |
|
717 | 706 | settings = { |
|
718 | 707 | 'rhodecode_abcde': 'value1', |
|
719 | 708 | 'rhodecode_vwxyz': 'value2', |
|
720 | 709 | } |
|
721 | 710 | general_settings = { |
|
722 | 711 | 'rhodecode_{}'.format(key): 'value' |
|
723 | 712 | for key in VcsSettingsModel.GENERAL_SETTINGS |
|
724 | 713 | } |
|
725 | 714 | settings.update(general_settings) |
|
726 | 715 | |
|
727 | 716 | filtered_settings = model._filter_general_settings(general_settings) |
|
728 | 717 | assert sorted(filtered_settings) == sorted(general_settings) |
|
729 | 718 | |
|
730 | 719 | |
|
731 | 720 | class TestGetRepoUiSettings(object): |
|
732 | 721 | def test_global_uis_are_returned_when_no_repo_uis_found( |
|
733 | 722 | self, repo_stub): |
|
734 | 723 | model = VcsSettingsModel(repo=repo_stub.repo_name) |
|
735 | 724 | result = model.get_repo_ui_settings() |
|
736 | 725 | svn_sections = ( |
|
737 | 726 | VcsSettingsModel.SVN_TAG_SECTION, |
|
738 | 727 | VcsSettingsModel.SVN_BRANCH_SECTION) |
|
739 | 728 | expected_result = [ |
|
740 | 729 | s for s in model.global_settings.get_ui() |
|
741 | 730 | if s.section not in svn_sections] |
|
742 | 731 | assert sorted(result) == sorted(expected_result) |
|
743 | 732 | |
|
744 | 733 | def test_repo_uis_are_overriding_global_uis( |
|
745 | 734 | self, repo_stub, settings_util): |
|
746 | 735 | for section, key in VcsSettingsModel.HOOKS_SETTINGS: |
|
747 | 736 | settings_util.create_repo_rhodecode_ui( |
|
748 | 737 | repo_stub, section, 'repo', key=key, active=False) |
|
749 | 738 | model = VcsSettingsModel(repo=repo_stub.repo_name) |
|
750 | 739 | result = model.get_repo_ui_settings() |
|
751 | 740 | for setting in result: |
|
752 | 741 | locator = (setting.section, setting.key) |
|
753 | 742 | if locator in VcsSettingsModel.HOOKS_SETTINGS: |
|
754 | 743 | assert setting.value == 'repo' |
|
755 | 744 | |
|
756 | 745 | assert setting.active is False |
|
757 | 746 | |
|
758 | 747 | def test_global_svn_patterns_are_not_in_list( |
|
759 | 748 | self, repo_stub, settings_util): |
|
760 | 749 | svn_sections = ( |
|
761 | 750 | VcsSettingsModel.SVN_TAG_SECTION, |
|
762 | 751 | VcsSettingsModel.SVN_BRANCH_SECTION) |
|
763 | 752 | for section in svn_sections: |
|
764 | 753 | settings_util.create_rhodecode_ui( |
|
765 | 754 | section, 'repo', key='deadbeef' + section, active=False) |
|
766 | 755 | Session().commit() |
|
767 | 756 | |
|
768 | 757 | model = VcsSettingsModel(repo=repo_stub.repo_name) |
|
769 | 758 | result = model.get_repo_ui_settings() |
|
770 | 759 | for setting in result: |
|
771 | 760 | assert setting.section not in svn_sections |
|
772 | 761 | |
|
773 | 762 | def test_repo_uis_filtered_by_section_are_returned( |
|
774 | 763 | self, repo_stub, settings_util): |
|
775 | 764 | for section, key in VcsSettingsModel.HOOKS_SETTINGS: |
|
776 | 765 | settings_util.create_repo_rhodecode_ui( |
|
777 | 766 | repo_stub, section, 'repo', key=key, active=False) |
|
778 | 767 | model = VcsSettingsModel(repo=repo_stub.repo_name) |
|
779 | 768 | section, key = VcsSettingsModel.HOOKS_SETTINGS[0] |
|
780 | 769 | result = model.get_repo_ui_settings(section=section) |
|
781 | 770 | for setting in result: |
|
782 | 771 | assert setting.section == section |
|
783 | 772 | |
|
784 | 773 | def test_repo_uis_filtered_by_key_are_returned( |
|
785 | 774 | self, repo_stub, settings_util): |
|
786 | 775 | for section, key in VcsSettingsModel.HOOKS_SETTINGS: |
|
787 | 776 | settings_util.create_repo_rhodecode_ui( |
|
788 | 777 | repo_stub, section, 'repo', key=key, active=False) |
|
789 | 778 | model = VcsSettingsModel(repo=repo_stub.repo_name) |
|
790 | 779 | section, key = VcsSettingsModel.HOOKS_SETTINGS[0] |
|
791 | 780 | result = model.get_repo_ui_settings(key=key) |
|
792 | 781 | for setting in result: |
|
793 | 782 | assert setting.key == key |
|
794 | 783 | |
|
795 | 784 | def test_raises_exception_when_repository_is_not_specified(self): |
|
796 | 785 | model = VcsSettingsModel() |
|
797 | 786 | with pytest.raises(Exception) as exc_info: |
|
798 | 787 | model.get_repo_ui_settings() |
|
799 | 788 | assert str(exc_info.value) == 'Repository is not specified' |
|
800 | 789 | |
|
801 | 790 | |
|
802 | 791 | class TestGetRepoGeneralSettings(object): |
|
803 | 792 | def test_global_settings_are_returned_when_no_repo_settings_found( |
|
804 | 793 | self, repo_stub): |
|
805 | 794 | model = VcsSettingsModel(repo=repo_stub.repo_name) |
|
806 | 795 | result = model.get_repo_general_settings() |
|
807 | 796 | expected_result = model.global_settings.get_all_settings() |
|
808 | 797 | assert sorted(result) == sorted(expected_result) |
|
809 | 798 | |
|
810 | 799 | def test_repo_uis_are_overriding_global_uis( |
|
811 | 800 | self, repo_stub, settings_util): |
|
812 | 801 | for key in VcsSettingsModel.GENERAL_SETTINGS: |
|
813 | 802 | settings_util.create_repo_rhodecode_setting( |
|
814 | 803 | repo_stub, key, 'abcde', type_='unicode') |
|
815 | 804 | Session().commit() |
|
816 | 805 | |
|
817 | 806 | model = VcsSettingsModel(repo=repo_stub.repo_name) |
|
818 | 807 | result = model.get_repo_ui_settings() |
|
819 | 808 | for key in result: |
|
820 | 809 | if key in VcsSettingsModel.GENERAL_SETTINGS: |
|
821 | 810 | assert result[key] == 'abcde' |
|
822 | 811 | |
|
823 | 812 | def test_raises_exception_when_repository_is_not_specified(self): |
|
824 | 813 | model = VcsSettingsModel() |
|
825 | 814 | with pytest.raises(Exception) as exc_info: |
|
826 | 815 | model.get_repo_general_settings() |
|
827 | 816 | assert str(exc_info.value) == 'Repository is not specified' |
|
828 | 817 | |
|
829 | 818 | |
|
830 | 819 | class TestGetGlobalGeneralSettings(object): |
|
831 | 820 | def test_global_settings_are_returned(self, repo_stub): |
|
832 | 821 | model = VcsSettingsModel() |
|
833 | 822 | result = model.get_global_general_settings() |
|
834 | 823 | expected_result = model.global_settings.get_all_settings() |
|
835 | 824 | assert sorted(result) == sorted(expected_result) |
|
836 | 825 | |
|
837 | 826 | def test_repo_uis_are_not_overriding_global_uis( |
|
838 | 827 | self, repo_stub, settings_util): |
|
839 | 828 | for key in VcsSettingsModel.GENERAL_SETTINGS: |
|
840 | 829 | settings_util.create_repo_rhodecode_setting( |
|
841 | 830 | repo_stub, key, 'abcde', type_='unicode') |
|
842 | 831 | Session().commit() |
|
843 | 832 | |
|
844 | 833 | model = VcsSettingsModel(repo=repo_stub.repo_name) |
|
845 | 834 | result = model.get_global_general_settings() |
|
846 | 835 | expected_result = model.global_settings.get_all_settings() |
|
847 | 836 | assert sorted(result) == sorted(expected_result) |
|
848 | 837 | |
|
849 | 838 | |
|
850 | 839 | class TestGetGlobalUiSettings(object): |
|
851 | 840 | def test_global_uis_are_returned(self, repo_stub): |
|
852 | 841 | model = VcsSettingsModel() |
|
853 | 842 | result = model.get_global_ui_settings() |
|
854 | 843 | expected_result = model.global_settings.get_ui() |
|
855 | 844 | assert sorted(result) == sorted(expected_result) |
|
856 | 845 | |
|
857 | 846 | def test_repo_uis_are_not_overriding_global_uis( |
|
858 | 847 | self, repo_stub, settings_util): |
|
859 | 848 | for section, key in VcsSettingsModel.HOOKS_SETTINGS: |
|
860 | 849 | settings_util.create_repo_rhodecode_ui( |
|
861 | 850 | repo_stub, section, 'repo', key=key, active=False) |
|
862 | 851 | Session().commit() |
|
863 | 852 | |
|
864 | 853 | model = VcsSettingsModel(repo=repo_stub.repo_name) |
|
865 | 854 | result = model.get_global_ui_settings() |
|
866 | 855 | expected_result = model.global_settings.get_ui() |
|
867 | 856 | assert sorted(result) == sorted(expected_result) |
|
868 | 857 | |
|
869 | 858 | def test_ui_settings_filtered_by_section( |
|
870 | 859 | self, repo_stub, settings_util): |
|
871 | 860 | model = VcsSettingsModel(repo=repo_stub.repo_name) |
|
872 | 861 | section, key = VcsSettingsModel.HOOKS_SETTINGS[0] |
|
873 | 862 | result = model.get_global_ui_settings(section=section) |
|
874 | 863 | expected_result = model.global_settings.get_ui(section=section) |
|
875 | 864 | assert sorted(result) == sorted(expected_result) |
|
876 | 865 | |
|
877 | 866 | def test_ui_settings_filtered_by_key( |
|
878 | 867 | self, repo_stub, settings_util): |
|
879 | 868 | model = VcsSettingsModel(repo=repo_stub.repo_name) |
|
880 | 869 | section, key = VcsSettingsModel.HOOKS_SETTINGS[0] |
|
881 | 870 | result = model.get_global_ui_settings(key=key) |
|
882 | 871 | expected_result = model.global_settings.get_ui(key=key) |
|
883 | 872 | assert sorted(result) == sorted(expected_result) |
|
884 | 873 | |
|
885 | 874 | |
|
886 | 875 | class TestGetGeneralSettings(object): |
|
887 | 876 | def test_global_settings_are_returned_when_inherited_is_true( |
|
888 | 877 | self, repo_stub, settings_util): |
|
889 | 878 | model = VcsSettingsModel(repo=repo_stub.repo_name) |
|
890 | 879 | model.inherit_global_settings = True |
|
891 | 880 | for key in VcsSettingsModel.GENERAL_SETTINGS: |
|
892 | 881 | settings_util.create_repo_rhodecode_setting( |
|
893 | 882 | repo_stub, key, 'abcde', type_='unicode') |
|
894 | 883 | Session().commit() |
|
895 | 884 | |
|
896 | 885 | result = model.get_general_settings() |
|
897 | 886 | expected_result = model.get_global_general_settings() |
|
898 | 887 | assert sorted(result) == sorted(expected_result) |
|
899 | 888 | |
|
900 | 889 | def test_repo_settings_are_returned_when_inherited_is_false( |
|
901 | 890 | self, repo_stub, settings_util): |
|
902 | 891 | model = VcsSettingsModel(repo=repo_stub.repo_name) |
|
903 | 892 | model.inherit_global_settings = False |
|
904 | 893 | for key in VcsSettingsModel.GENERAL_SETTINGS: |
|
905 | 894 | settings_util.create_repo_rhodecode_setting( |
|
906 | 895 | repo_stub, key, 'abcde', type_='unicode') |
|
907 | 896 | Session().commit() |
|
908 | 897 | |
|
909 | 898 | result = model.get_general_settings() |
|
910 | 899 | expected_result = model.get_repo_general_settings() |
|
911 | 900 | assert sorted(result) == sorted(expected_result) |
|
912 | 901 | |
|
913 | 902 | def test_global_settings_are_returned_when_no_repository_specified(self): |
|
914 | 903 | model = VcsSettingsModel() |
|
915 | 904 | result = model.get_general_settings() |
|
916 | 905 | expected_result = model.get_global_general_settings() |
|
917 | 906 | assert sorted(result) == sorted(expected_result) |
|
918 | 907 | |
|
919 | 908 | |
|
920 | 909 | class TestGetUiSettings(object): |
|
921 | 910 | def test_global_settings_are_returned_when_inherited_is_true( |
|
922 | 911 | self, repo_stub, settings_util): |
|
923 | 912 | model = VcsSettingsModel(repo=repo_stub.repo_name) |
|
924 | 913 | model.inherit_global_settings = True |
|
925 | 914 | for section, key in VcsSettingsModel.HOOKS_SETTINGS: |
|
926 | 915 | settings_util.create_repo_rhodecode_ui( |
|
927 | 916 | repo_stub, section, 'repo', key=key, active=True) |
|
928 | 917 | Session().commit() |
|
929 | 918 | |
|
930 | 919 | result = model.get_ui_settings() |
|
931 | 920 | expected_result = model.get_global_ui_settings() |
|
932 | 921 | assert sorted(result) == sorted(expected_result) |
|
933 | 922 | |
|
934 | 923 | def test_repo_settings_are_returned_when_inherited_is_false( |
|
935 | 924 | self, repo_stub, settings_util): |
|
936 | 925 | model = VcsSettingsModel(repo=repo_stub.repo_name) |
|
937 | 926 | model.inherit_global_settings = False |
|
938 | 927 | for section, key in VcsSettingsModel.HOOKS_SETTINGS: |
|
939 | 928 | settings_util.create_repo_rhodecode_ui( |
|
940 | 929 | repo_stub, section, 'repo', key=key, active=True) |
|
941 | 930 | Session().commit() |
|
942 | 931 | |
|
943 | 932 | result = model.get_ui_settings() |
|
944 | 933 | expected_result = model.get_repo_ui_settings() |
|
945 | 934 | assert sorted(result) == sorted(expected_result) |
|
946 | 935 | |
|
947 | 936 | def test_repo_settings_filtered_by_section_and_key(self, repo_stub): |
|
948 | 937 | model = VcsSettingsModel(repo=repo_stub.repo_name) |
|
949 | 938 | model.inherit_global_settings = False |
|
950 | 939 | |
|
951 | 940 | args = ('section', 'key') |
|
952 | 941 | with mock.patch.object(model, 'get_repo_ui_settings') as settings_mock: |
|
953 | 942 | model.get_ui_settings(*args) |
|
954 | 943 | Session().commit() |
|
955 | 944 | |
|
956 | 945 | settings_mock.assert_called_once_with(*args) |
|
957 | 946 | |
|
958 | 947 | def test_global_settings_filtered_by_section_and_key(self): |
|
959 | 948 | model = VcsSettingsModel() |
|
960 | 949 | args = ('section', 'key') |
|
961 | 950 | with mock.patch.object(model, 'get_global_ui_settings') as ( |
|
962 | 951 | settings_mock): |
|
963 | 952 | model.get_ui_settings(*args) |
|
964 | 953 | settings_mock.assert_called_once_with(*args) |
|
965 | 954 | |
|
966 | 955 | def test_global_settings_are_returned_when_no_repository_specified(self): |
|
967 | 956 | model = VcsSettingsModel() |
|
968 | 957 | result = model.get_ui_settings() |
|
969 | 958 | expected_result = model.get_global_ui_settings() |
|
970 | 959 | assert sorted(result) == sorted(expected_result) |
|
971 | 960 | |
|
972 | 961 | |
|
973 | 962 | class TestGetSvnPatterns(object): |
|
974 | 963 | def test_repo_settings_filtered_by_section_and_key(self, repo_stub): |
|
975 | 964 | model = VcsSettingsModel(repo=repo_stub.repo_name) |
|
976 | 965 | args = ('section', ) |
|
977 | 966 | with mock.patch.object(model, 'get_repo_ui_settings') as settings_mock: |
|
978 | 967 | model.get_svn_patterns(*args) |
|
979 | 968 | |
|
980 | 969 | Session().commit() |
|
981 | 970 | settings_mock.assert_called_once_with(*args) |
|
982 | 971 | |
|
983 | 972 | def test_global_settings_filtered_by_section_and_key(self): |
|
984 | 973 | model = VcsSettingsModel() |
|
985 | 974 | args = ('section', ) |
|
986 | 975 | with mock.patch.object(model, 'get_global_ui_settings') as ( |
|
987 | 976 | settings_mock): |
|
988 | 977 | model.get_svn_patterns(*args) |
|
989 | 978 | settings_mock.assert_called_once_with(*args) |
|
990 | 979 | |
|
991 | 980 | |
|
992 | 981 | class TestCreateOrUpdateRepoSettings(object): |
|
993 | 982 | FORM_DATA = { |
|
994 | 983 | 'inherit_global_settings': False, |
|
995 | 984 | 'hooks_changegroup_repo_size': False, |
|
996 | 985 | 'hooks_changegroup_push_logger': False, |
|
997 | 986 | 'hooks_outgoing_pull_logger': False, |
|
998 | 987 | 'extensions_largefiles': False, |
|
999 | 988 | 'extensions_evolve': False, |
|
1000 | 989 | 'vcs_git_lfs_enabled': False, |
|
1001 | 990 | 'phases_publish': 'False', |
|
1002 | 991 | 'rhodecode_pr_merge_enabled': False, |
|
1003 | 992 | 'rhodecode_use_outdated_comments': False, |
|
1004 | 993 | 'new_svn_branch': '', |
|
1005 | 994 | 'new_svn_tag': '' |
|
1006 | 995 | } |
|
1007 | 996 | |
|
1008 | 997 | def test_get_raises_exception_when_repository_not_specified(self): |
|
1009 | 998 | model = VcsSettingsModel() |
|
1010 | 999 | with pytest.raises(Exception) as exc_info: |
|
1011 | 1000 | model.create_or_update_repo_settings(data=self.FORM_DATA) |
|
1012 | 1001 | Session().commit() |
|
1013 | 1002 | |
|
1014 | 1003 | assert str(exc_info.value) == 'Repository is not specified' |
|
1015 | 1004 | |
|
1016 | 1005 | def test_only_svn_settings_are_updated_when_type_is_svn(self, backend_svn): |
|
1017 | 1006 | repo = backend_svn.create_repo() |
|
1018 | 1007 | model = VcsSettingsModel(repo=repo) |
|
1019 | 1008 | with self._patch_model(model) as mocks: |
|
1020 | 1009 | model.create_or_update_repo_settings( |
|
1021 | 1010 | data=self.FORM_DATA, inherit_global_settings=False) |
|
1022 | 1011 | Session().commit() |
|
1023 | 1012 | |
|
1024 | 1013 | mocks['create_repo_svn_settings'].assert_called_once_with( |
|
1025 | 1014 | self.FORM_DATA) |
|
1026 | 1015 | non_called_methods = ( |
|
1027 | 1016 | 'create_or_update_repo_hook_settings', |
|
1028 | 1017 | 'create_or_update_repo_pr_settings', |
|
1029 | 1018 | 'create_or_update_repo_hg_settings') |
|
1030 | 1019 | for method in non_called_methods: |
|
1031 | 1020 | assert mocks[method].call_count == 0 |
|
1032 | 1021 | |
|
1033 | 1022 | def test_non_svn_settings_are_updated_when_type_is_hg(self, backend_hg): |
|
1034 | 1023 | repo = backend_hg.create_repo() |
|
1035 | 1024 | model = VcsSettingsModel(repo=repo) |
|
1036 | 1025 | with self._patch_model(model) as mocks: |
|
1037 | 1026 | model.create_or_update_repo_settings( |
|
1038 | 1027 | data=self.FORM_DATA, inherit_global_settings=False) |
|
1039 | 1028 | Session().commit() |
|
1040 | 1029 | |
|
1041 | 1030 | assert mocks['create_repo_svn_settings'].call_count == 0 |
|
1042 | 1031 | called_methods = ( |
|
1043 | 1032 | 'create_or_update_repo_hook_settings', |
|
1044 | 1033 | 'create_or_update_repo_pr_settings', |
|
1045 | 1034 | 'create_or_update_repo_hg_settings') |
|
1046 | 1035 | for method in called_methods: |
|
1047 | 1036 | mocks[method].assert_called_once_with(self.FORM_DATA) |
|
1048 | 1037 | |
|
1049 | 1038 | def test_non_svn_and_hg_settings_are_updated_when_type_is_git( |
|
1050 | 1039 | self, backend_git): |
|
1051 | 1040 | repo = backend_git.create_repo() |
|
1052 | 1041 | model = VcsSettingsModel(repo=repo) |
|
1053 | 1042 | with self._patch_model(model) as mocks: |
|
1054 | 1043 | model.create_or_update_repo_settings( |
|
1055 | 1044 | data=self.FORM_DATA, inherit_global_settings=False) |
|
1056 | 1045 | |
|
1057 | 1046 | assert mocks['create_repo_svn_settings'].call_count == 0 |
|
1058 | 1047 | called_methods = ( |
|
1059 | 1048 | 'create_or_update_repo_hook_settings', |
|
1060 | 1049 | 'create_or_update_repo_pr_settings') |
|
1061 | 1050 | non_called_methods = ( |
|
1062 | 1051 | 'create_repo_svn_settings', |
|
1063 | 1052 | 'create_or_update_repo_hg_settings' |
|
1064 | 1053 | ) |
|
1065 | 1054 | for method in called_methods: |
|
1066 | 1055 | mocks[method].assert_called_once_with(self.FORM_DATA) |
|
1067 | 1056 | for method in non_called_methods: |
|
1068 | 1057 | assert mocks[method].call_count == 0 |
|
1069 | 1058 | |
|
1070 | 1059 | def test_no_methods_are_called_when_settings_are_inherited( |
|
1071 | 1060 | self, backend): |
|
1072 | 1061 | repo = backend.create_repo() |
|
1073 | 1062 | model = VcsSettingsModel(repo=repo) |
|
1074 | 1063 | with self._patch_model(model) as mocks: |
|
1075 | 1064 | model.create_or_update_repo_settings( |
|
1076 | 1065 | data=self.FORM_DATA, inherit_global_settings=True) |
|
1077 | 1066 | for method_name in mocks: |
|
1078 | 1067 | assert mocks[method_name].call_count == 0 |
|
1079 | 1068 | |
|
1080 | 1069 | def test_cache_is_marked_for_invalidation(self, repo_stub): |
|
1081 | 1070 | model = VcsSettingsModel(repo=repo_stub) |
|
1082 | 1071 | invalidation_patcher = mock.patch( |
|
1083 | 1072 | 'rhodecode.model.scm.ScmModel.mark_for_invalidation') |
|
1084 | 1073 | with invalidation_patcher as invalidation_mock: |
|
1085 | 1074 | model.create_or_update_repo_settings( |
|
1086 | 1075 | data=self.FORM_DATA, inherit_global_settings=True) |
|
1087 | 1076 | Session().commit() |
|
1088 | 1077 | |
|
1089 | 1078 | invalidation_mock.assert_called_once_with( |
|
1090 | 1079 | repo_stub.repo_name, delete=True) |
|
1091 | 1080 | |
|
1092 | 1081 | def test_inherit_flag_is_saved(self, repo_stub): |
|
1093 | 1082 | model = VcsSettingsModel(repo=repo_stub) |
|
1094 | 1083 | model.inherit_global_settings = True |
|
1095 | 1084 | with self._patch_model(model): |
|
1096 | 1085 | model.create_or_update_repo_settings( |
|
1097 | 1086 | data=self.FORM_DATA, inherit_global_settings=False) |
|
1098 | 1087 | Session().commit() |
|
1099 | 1088 | |
|
1100 | 1089 | assert model.inherit_global_settings is False |
|
1101 | 1090 | |
|
1102 | 1091 | def _patch_model(self, model): |
|
1103 | 1092 | return mock.patch.multiple( |
|
1104 | 1093 | model, |
|
1105 | 1094 | create_repo_svn_settings=mock.DEFAULT, |
|
1106 | 1095 | create_or_update_repo_hook_settings=mock.DEFAULT, |
|
1107 | 1096 | create_or_update_repo_pr_settings=mock.DEFAULT, |
|
1108 | 1097 | create_or_update_repo_hg_settings=mock.DEFAULT) |
|
1 | NO CONTENT: file was removed |
General Comments 0
You need to be logged in to leave comments.
Login now