##// END OF EJS Templates
gists: migrated gists controller to pyramid view.
dan -
r1891:485023e6 default
parent child Browse files
Show More
@@ -0,0 +1,62 b''
1 # -*- coding: utf-8 -*-
2
3 # Copyright (C) 2016-2017 RhodeCode GmbH
4 #
5 # This program is free software: you can redistribute it and/or modify
6 # it under the terms of the GNU Affero General Public License, version 3
7 # (only), as published by the Free Software Foundation.
8 #
9 # This program is distributed in the hope that it will be useful,
10 # but WITHOUT ANY WARRANTY; without even the implied warranty of
11 # MERCHANTABILITY or FITNESS FOR A PARTICULAR PURPOSE. See the
12 # GNU General Public License for more details.
13 #
14 # You should have received a copy of the GNU Affero General Public License
15 # along with this program. If not, see <http://www.gnu.org/licenses/>.
16 #
17 # This program is dual-licensed. If you wish to learn more about the
18 # RhodeCode Enterprise Edition, including its added features, Support services,
19 # and proprietary license terms, please see https://rhodecode.com/licenses/
20 from rhodecode.apps._base import ADMIN_PREFIX
21
22
23 def admin_routes(config):
24 config.add_route(
25 name='gists_show', pattern='/gists')
26 config.add_route(
27 name='gists_new', pattern='/gists/new')
28 config.add_route(
29 name='gists_create', pattern='/gists/create')
30
31 config.add_route(
32 name='gist_show', pattern='/gists/{gist_id}')
33
34 config.add_route(
35 name='gist_delete', pattern='/gists/{gist_id}/delete')
36
37 config.add_route(
38 name='gist_edit', pattern='/gists/{gist_id}/edit')
39
40 config.add_route(
41 name='gist_edit_check_revision',
42 pattern='/gists/{gist_id}/edit/check_revision')
43
44 config.add_route(
45 name='gist_update', pattern='/gists/{gist_id}/update')
46
47 config.add_route(
48 name='gist_show_rev',
49 pattern='/gists/{gist_id}/{revision}')
50 config.add_route(
51 name='gist_show_formatted',
52 pattern='/gists/{gist_id}/{revision}/{format}')
53
54 config.add_route(
55 name='gist_show_formatted_path',
56 pattern='/gists/{gist_id}/{revision}/{format}/{f_path:.*}')
57
58
59 def includeme(config):
60 config.include(admin_routes, route_prefix=ADMIN_PREFIX)
61 # Scan module for configuration decorators.
62 config.scan()
@@ -0,0 +1,20 b''
1 # -*- coding: utf-8 -*-
2
3 # Copyright (C) 2016-2017 RhodeCode GmbH
4 #
5 # This program is free software: you can redistribute it and/or modify
6 # it under the terms of the GNU Affero General Public License, version 3
7 # (only), as published by the Free Software Foundation.
8 #
9 # This program is distributed in the hope that it will be useful,
10 # but WITHOUT ANY WARRANTY; without even the implied warranty of
11 # MERCHANTABILITY or FITNESS FOR A PARTICULAR PURPOSE. See the
12 # GNU General Public License for more details.
13 #
14 # You should have received a copy of the GNU Affero General Public License
15 # along with this program. If not, see <http://www.gnu.org/licenses/>.
16 #
17 # This program is dual-licensed. If you wish to learn more about the
18 # RhodeCode Enterprise Edition, including its added features, Support services,
19 # and proprietary license terms, please see https://rhodecode.com/licenses/
20
@@ -0,0 +1,412 b''
1 # -*- coding: utf-8 -*-
2
3 # Copyright (C) 2013-2017 RhodeCode GmbH
4 #
5 # This program is free software: you can redistribute it and/or modify
6 # it under the terms of the GNU Affero General Public License, version 3
7 # (only), as published by the Free Software Foundation.
8 #
9 # This program is distributed in the hope that it will be useful,
10 # but WITHOUT ANY WARRANTY; without even the implied warranty of
11 # MERCHANTABILITY or FITNESS FOR A PARTICULAR PURPOSE. See the
12 # GNU General Public License for more details.
13 #
14 # You should have received a copy of the GNU Affero General Public License
15 # along with this program. If not, see <http://www.gnu.org/licenses/>.
16 #
17 # This program is dual-licensed. If you wish to learn more about the
18 # RhodeCode Enterprise Edition, including its added features, Support services,
19 # and proprietary license terms, please see https://rhodecode.com/licenses/
20
21 import time
22 import logging
23
24 import formencode
25 import peppercorn
26
27 from pyramid.httpexceptions import HTTPNotFound, HTTPForbidden, HTTPFound
28 from pyramid.view import view_config
29 from pyramid.renderers import render
30 from pyramid.response import Response
31
32 from rhodecode.apps._base import BaseAppView
33 from rhodecode.lib import helpers as h
34 from rhodecode.lib.auth import LoginRequired, NotAnonymous, CSRFRequired
35 from rhodecode.lib.utils2 import time_to_datetime
36 from rhodecode.lib.ext_json import json
37 from rhodecode.lib.vcs.exceptions import VCSError, NodeNotChangedError
38 from rhodecode.model.gist import GistModel
39 from rhodecode.model.meta import Session
40 from rhodecode.model.db import Gist, User, or_
41 from rhodecode.model import validation_schema
42 from rhodecode.model.validation_schema.schemas import gist_schema
43
44
45 log = logging.getLogger(__name__)
46
47
48 class GistView(BaseAppView):
49
50 def load_default_context(self):
51 _ = self.request.translate
52 c = self._get_local_tmpl_context()
53 c.user = c.auth_user.get_instance()
54
55 c.lifetime_values = [
56 (-1, _('forever')),
57 (5, _('5 minutes')),
58 (60, _('1 hour')),
59 (60 * 24, _('1 day')),
60 (60 * 24 * 30, _('1 month')),
61 ]
62
63 c.lifetime_options = [(c.lifetime_values, _("Lifetime"))]
64 c.acl_options = [
65 (Gist.ACL_LEVEL_PRIVATE, _("Requires registered account")),
66 (Gist.ACL_LEVEL_PUBLIC, _("Can be accessed by anonymous users"))
67 ]
68
69 self._register_global_c(c)
70 return c
71
72 @LoginRequired()
73 @view_config(
74 route_name='gists_show', request_method='GET',
75 renderer='rhodecode:templates/admin/gists/index.mako')
76 def gist_show_all(self):
77 c = self.load_default_context()
78
79 not_default_user = self._rhodecode_user.username != User.DEFAULT_USER
80 c.show_private = self.request.GET.get('private') and not_default_user
81 c.show_public = self.request.GET.get('public') and not_default_user
82 c.show_all = self.request.GET.get('all') and self._rhodecode_user.admin
83
84 gists = _gists = Gist().query()\
85 .filter(or_(Gist.gist_expires == -1, Gist.gist_expires >= time.time()))\
86 .order_by(Gist.created_on.desc())
87
88 c.active = 'public'
89 # MY private
90 if c.show_private and not c.show_public:
91 gists = _gists.filter(Gist.gist_type == Gist.GIST_PRIVATE)\
92 .filter(Gist.gist_owner == self._rhodecode_user.user_id)
93 c.active = 'my_private'
94 # MY public
95 elif c.show_public and not c.show_private:
96 gists = _gists.filter(Gist.gist_type == Gist.GIST_PUBLIC)\
97 .filter(Gist.gist_owner == self._rhodecode_user.user_id)
98 c.active = 'my_public'
99 # MY public+private
100 elif c.show_private and c.show_public:
101 gists = _gists.filter(or_(Gist.gist_type == Gist.GIST_PUBLIC,
102 Gist.gist_type == Gist.GIST_PRIVATE))\
103 .filter(Gist.gist_owner == self._rhodecode_user.user_id)
104 c.active = 'my_all'
105 # Show all by super-admin
106 elif c.show_all:
107 c.active = 'all'
108 gists = _gists
109
110 # default show ALL public gists
111 if not c.show_public and not c.show_private and not c.show_all:
112 gists = _gists.filter(Gist.gist_type == Gist.GIST_PUBLIC)
113 c.active = 'public'
114
115 from rhodecode.lib.utils import PartialRenderer
116 _render = PartialRenderer('data_table/_dt_elements.mako')
117
118 data = []
119
120 for gist in gists:
121 data.append({
122 'created_on': _render('gist_created', gist.created_on),
123 'created_on_raw': gist.created_on,
124 'type': _render('gist_type', gist.gist_type),
125 'access_id': _render('gist_access_id', gist.gist_access_id, gist.owner.full_contact),
126 'author': _render('gist_author', gist.owner.full_contact, gist.created_on, gist.gist_expires),
127 'author_raw': h.escape(gist.owner.full_contact),
128 'expires': _render('gist_expires', gist.gist_expires),
129 'description': _render('gist_description', gist.gist_description)
130 })
131 c.data = json.dumps(data)
132
133 return self._get_template_context(c)
134
135 @LoginRequired()
136 @NotAnonymous()
137 @view_config(
138 route_name='gists_new', request_method='GET',
139 renderer='rhodecode:templates/admin/gists/new.mako')
140 def gist_new(self):
141 c = self.load_default_context()
142 return self._get_template_context(c)
143
144 @LoginRequired()
145 @NotAnonymous()
146 @CSRFRequired()
147 @view_config(
148 route_name='gists_create', request_method='POST',
149 renderer='rhodecode:templates/admin/gists/new.mako')
150 def gist_create(self):
151 _ = self.request.translate
152 c = self.load_default_context()
153
154 data = dict(self.request.POST)
155 data['filename'] = data.get('filename') or Gist.DEFAULT_FILENAME
156 data['nodes'] = [{
157 'filename': data['filename'],
158 'content': data.get('content'),
159 'mimetype': data.get('mimetype') # None is autodetect
160 }]
161
162 data['gist_type'] = (
163 Gist.GIST_PUBLIC if data.get('public') else Gist.GIST_PRIVATE)
164 data['gist_acl_level'] = (
165 data.get('gist_acl_level') or Gist.ACL_LEVEL_PRIVATE)
166
167 schema = gist_schema.GistSchema().bind(
168 lifetime_options=[x[0] for x in c.lifetime_values])
169
170 try:
171
172 schema_data = schema.deserialize(data)
173 # convert to safer format with just KEYs so we sure no duplicates
174 schema_data['nodes'] = gist_schema.sequence_to_nodes(
175 schema_data['nodes'])
176
177 gist = GistModel().create(
178 gist_id=schema_data['gistid'], # custom access id not real ID
179 description=schema_data['description'],
180 owner=self._rhodecode_user.user_id,
181 gist_mapping=schema_data['nodes'],
182 gist_type=schema_data['gist_type'],
183 lifetime=schema_data['lifetime'],
184 gist_acl_level=schema_data['gist_acl_level']
185 )
186 Session().commit()
187 new_gist_id = gist.gist_access_id
188 except validation_schema.Invalid as errors:
189 defaults = data
190 errors = errors.asdict()
191
192 if 'nodes.0.content' in errors:
193 errors['content'] = errors['nodes.0.content']
194 del errors['nodes.0.content']
195 if 'nodes.0.filename' in errors:
196 errors['filename'] = errors['nodes.0.filename']
197 del errors['nodes.0.filename']
198
199 data = render('rhodecode:templates/admin/gists/new.mako',
200 self._get_template_context(c), self.request)
201 html = formencode.htmlfill.render(
202 data,
203 defaults=defaults,
204 errors=errors,
205 prefix_error=False,
206 encoding="UTF-8",
207 force_defaults=False
208 )
209 return Response(html)
210
211 except Exception:
212 log.exception("Exception while trying to create a gist")
213 h.flash(_('Error occurred during gist creation'), category='error')
214 raise HTTPFound(h.route_url('gists_new'))
215 raise HTTPFound(h.route_url('gist_show', gist_id=new_gist_id))
216
217 @LoginRequired()
218 @NotAnonymous()
219 @CSRFRequired()
220 @view_config(
221 route_name='gist_delete', request_method='POST')
222 def gist_delete(self):
223 _ = self.request.translate
224 gist_id = self.request.matchdict['gist_id']
225
226 c = self.load_default_context()
227 c.gist = Gist.get_or_404(gist_id)
228
229 owner = c.gist.gist_owner == self._rhodecode_user.user_id
230 if not (h.HasPermissionAny('hg.admin')() or owner):
231 log.warning('Deletion of Gist was forbidden '
232 'by unauthorized user: `%s`', self._rhodecode_user)
233 raise HTTPNotFound()
234
235 GistModel().delete(c.gist)
236 Session().commit()
237 h.flash(_('Deleted gist %s') % c.gist.gist_access_id, category='success')
238
239 raise HTTPFound(h.route_url('gists_show'))
240
241 def _get_gist(self, gist_id):
242
243 gist = Gist.get_or_404(gist_id)
244
245 # Check if this gist is expired
246 if gist.gist_expires != -1:
247 if time.time() > gist.gist_expires:
248 log.error(
249 'Gist expired at %s', time_to_datetime(gist.gist_expires))
250 raise HTTPNotFound()
251
252 # check if this gist requires a login
253 is_default_user = self._rhodecode_user.username == User.DEFAULT_USER
254 if gist.acl_level == Gist.ACL_LEVEL_PRIVATE and is_default_user:
255 log.error("Anonymous user %s tried to access protected gist `%s`",
256 self._rhodecode_user, gist_id)
257 raise HTTPNotFound()
258 return gist
259
260 @LoginRequired()
261 @view_config(
262 route_name='gist_show', request_method='GET',
263 renderer='rhodecode:templates/admin/gists/show.mako')
264 @view_config(
265 route_name='gist_show_rev', request_method='GET',
266 renderer='rhodecode:templates/admin/gists/show.mako')
267 @view_config(
268 route_name='gist_show_formatted', request_method='GET',
269 renderer=None)
270 @view_config(
271 route_name='gist_show_formatted_path', request_method='GET',
272 renderer=None)
273 def show(self):
274 gist_id = self.request.matchdict['gist_id']
275
276 # TODO(marcink): expose those via matching dict
277 revision = self.request.matchdict.get('revision', 'tip')
278 f_path = self.request.matchdict.get('f_path', None)
279 return_format = self.request.matchdict.get('format')
280
281 c = self.load_default_context()
282 c.gist = self._get_gist(gist_id)
283 c.render = not self.request.GET.get('no-render', False)
284
285 try:
286 c.file_last_commit, c.files = GistModel().get_gist_files(
287 gist_id, revision=revision)
288 except VCSError:
289 log.exception("Exception in gist show")
290 raise HTTPNotFound()
291
292 if return_format == 'raw':
293 content = '\n\n'.join([f.content for f in c.files
294 if (f_path is None or f.path == f_path)])
295 response = Response(content)
296 response.content_type = 'text/plain'
297 return response
298
299 return self._get_template_context(c)
300
301 @LoginRequired()
302 @NotAnonymous()
303 @view_config(
304 route_name='gist_edit', request_method='GET',
305 renderer='rhodecode:templates/admin/gists/edit.mako')
306 def gist_edit(self):
307 _ = self.request.translate
308 gist_id = self.request.matchdict['gist_id']
309 c = self.load_default_context()
310 c.gist = self._get_gist(gist_id)
311
312 owner = c.gist.gist_owner == self._rhodecode_user.user_id
313 if not (h.HasPermissionAny('hg.admin')() or owner):
314 raise HTTPNotFound()
315
316 try:
317 c.file_last_commit, c.files = GistModel().get_gist_files(gist_id)
318 except VCSError:
319 log.exception("Exception in gist edit")
320 raise HTTPNotFound()
321
322 if c.gist.gist_expires == -1:
323 expiry = _('never')
324 else:
325 # this cannot use timeago, since it's used in select2 as a value
326 expiry = h.age(h.time_to_datetime(c.gist.gist_expires))
327
328 c.lifetime_values.append(
329 (0, _('%(expiry)s - current value') % {'expiry': _(expiry)})
330 )
331
332 return self._get_template_context(c)
333
334 @LoginRequired()
335 @NotAnonymous()
336 @CSRFRequired()
337 @view_config(
338 route_name='gist_update', request_method='POST',
339 renderer='rhodecode:templates/admin/gists/edit.mako')
340 def gist_update(self):
341 _ = self.request.translate
342 gist_id = self.request.matchdict['gist_id']
343 c = self.load_default_context()
344 c.gist = self._get_gist(gist_id)
345
346 owner = c.gist.gist_owner == self._rhodecode_user.user_id
347 if not (h.HasPermissionAny('hg.admin')() or owner):
348 raise HTTPNotFound()
349
350 data = peppercorn.parse(self.request.POST.items())
351
352 schema = gist_schema.GistSchema()
353 schema = schema.bind(
354 # '0' is special value to leave lifetime untouched
355 lifetime_options=[x[0] for x in c.lifetime_values] + [0],
356 )
357
358 try:
359 schema_data = schema.deserialize(data)
360 # convert to safer format with just KEYs so we sure no duplicates
361 schema_data['nodes'] = gist_schema.sequence_to_nodes(
362 schema_data['nodes'])
363
364 GistModel().update(
365 gist=c.gist,
366 description=schema_data['description'],
367 owner=c.gist.owner,
368 gist_mapping=schema_data['nodes'],
369 lifetime=schema_data['lifetime'],
370 gist_acl_level=schema_data['gist_acl_level']
371 )
372
373 Session().commit()
374 h.flash(_('Successfully updated gist content'), category='success')
375 except NodeNotChangedError:
376 # raised if nothing was changed in repo itself. We anyway then
377 # store only DB stuff for gist
378 Session().commit()
379 h.flash(_('Successfully updated gist data'), category='success')
380 except validation_schema.Invalid as errors:
381 errors = errors.asdict()
382 h.flash(_('Error occurred during update of gist {}: {}').format(
383 gist_id, errors), category='error')
384 except Exception:
385 log.exception("Exception in gist edit")
386 h.flash(_('Error occurred during update of gist %s') % gist_id,
387 category='error')
388
389 raise HTTPFound(h.route_url('gist_show', gist_id=gist_id))
390
391 @LoginRequired()
392 @NotAnonymous()
393 @view_config(
394 route_name='gist_edit_check_revision', request_method='GET',
395 renderer='json_ext')
396 def gist_edit_check_revision(self):
397 _ = self.request.translate
398 gist_id = self.request.matchdict['gist_id']
399 c = self.load_default_context()
400 c.gist = self._get_gist(gist_id)
401
402 last_rev = c.gist.scm_instance().get_commit()
403 success = True
404 revision = self.request.GET.get('revision')
405
406 if revision != last_rev.raw_id:
407 log.error('Last revision %s is different then submitted %s'
408 % (revision, last_rev))
409 # our gist has newer version than we
410 success = False
411
412 return {'success': success}
@@ -1,101 +1,101 b''
1 1 # -*- coding: utf-8 -*-
2 2
3 3 # Copyright (C) 2010-2017 RhodeCode GmbH
4 4 #
5 5 # This program is free software: you can redistribute it and/or modify
6 6 # it under the terms of the GNU Affero General Public License, version 3
7 7 # (only), as published by the Free Software Foundation.
8 8 #
9 9 # This program is distributed in the hope that it will be useful,
10 10 # but WITHOUT ANY WARRANTY; without even the implied warranty of
11 11 # MERCHANTABILITY or FITNESS FOR A PARTICULAR PURPOSE. See the
12 12 # GNU General Public License for more details.
13 13 #
14 14 # You should have received a copy of the GNU Affero General Public License
15 15 # along with this program. If not, see <http://www.gnu.org/licenses/>.
16 16 #
17 17 # This program is dual-licensed. If you wish to learn more about the
18 18 # RhodeCode Enterprise Edition, including its added features, Support services,
19 19 # and proprietary license terms, please see https://rhodecode.com/licenses/
20 20
21 21
22 22 import pytest
23 23
24 24 from rhodecode.model.db import Gist
25 25 from rhodecode.api.tests.utils import (
26 26 build_data, api_call, assert_error, assert_ok)
27 27
28 28
29 29 @pytest.mark.usefixtures("testuser_api", "app")
30 30 class TestApiGetGist(object):
31 def test_api_get_gist(self, gist_util, http_host_stub):
31 def test_api_get_gist(self, gist_util, http_host_only_stub):
32 32 gist = gist_util.create_gist()
33 33 gist_id = gist.gist_access_id
34 34 gist_created_on = gist.created_on
35 35 gist_modified_at = gist.modified_at
36 36 id_, params = build_data(
37 37 self.apikey, 'get_gist', gistid=gist_id, )
38 38 response = api_call(self.app, params)
39 39
40 40 expected = {
41 41 'access_id': gist_id,
42 42 'created_on': gist_created_on,
43 43 'modified_at': gist_modified_at,
44 44 'description': 'new-gist',
45 45 'expires': -1.0,
46 46 'gist_id': int(gist_id),
47 47 'type': 'public',
48 'url': 'http://%s/_admin/gists/%s' % (http_host_stub, gist_id,),
48 'url': 'http://%s/_admin/gists/%s' % (http_host_only_stub, gist_id,),
49 49 'acl_level': Gist.ACL_LEVEL_PUBLIC,
50 50 'content': None,
51 51 }
52 52
53 53 assert_ok(id_, expected, given=response.body)
54 54
55 def test_api_get_gist_with_content(self, gist_util, http_host_stub):
55 def test_api_get_gist_with_content(self, gist_util, http_host_only_stub):
56 56 mapping = {
57 57 u'filename1.txt': {'content': u'hello world'},
58 58 u'filename1ą.txt': {'content': u'hello worldę'}
59 59 }
60 60 gist = gist_util.create_gist(gist_mapping=mapping)
61 61 gist_id = gist.gist_access_id
62 62 gist_created_on = gist.created_on
63 63 gist_modified_at = gist.modified_at
64 64 id_, params = build_data(
65 65 self.apikey, 'get_gist', gistid=gist_id, content=True)
66 66 response = api_call(self.app, params)
67 67
68 68 expected = {
69 69 'access_id': gist_id,
70 70 'created_on': gist_created_on,
71 71 'modified_at': gist_modified_at,
72 72 'description': 'new-gist',
73 73 'expires': -1.0,
74 74 'gist_id': int(gist_id),
75 75 'type': 'public',
76 'url': 'http://%s/_admin/gists/%s' % (http_host_stub, gist_id,),
76 'url': 'http://%s/_admin/gists/%s' % (http_host_only_stub, gist_id,),
77 77 'acl_level': Gist.ACL_LEVEL_PUBLIC,
78 78 'content': {
79 79 u'filename1.txt': u'hello world',
80 80 u'filename1ą.txt': u'hello worldę'
81 81 },
82 82 }
83 83
84 84 assert_ok(id_, expected, given=response.body)
85 85
86 86 def test_api_get_gist_not_existing(self):
87 87 id_, params = build_data(
88 88 self.apikey_regular, 'get_gist', gistid='12345', )
89 89 response = api_call(self.app, params)
90 90 expected = 'gist `%s` does not exist' % ('12345',)
91 91 assert_error(id_, expected, given=response.body)
92 92
93 93 def test_api_get_gist_private_gist_without_permission(self, gist_util):
94 94 gist = gist_util.create_gist()
95 95 gist_id = gist.gist_access_id
96 96 id_, params = build_data(
97 97 self.apikey_regular, 'get_gist', gistid=gist_id, )
98 98 response = api_call(self.app, params)
99 99
100 100 expected = 'gist `%s` does not exist' % (gist_id,)
101 101 assert_error(id_, expected, given=response.body)
@@ -1,355 +1,391 b''
1 1 # -*- coding: utf-8 -*-
2 2
3 3 # Copyright (C) 2010-2017 RhodeCode GmbH
4 4 #
5 5 # This program is free software: you can redistribute it and/or modify
6 6 # it under the terms of the GNU Affero General Public License, version 3
7 7 # (only), as published by the Free Software Foundation.
8 8 #
9 9 # This program is distributed in the hope that it will be useful,
10 10 # but WITHOUT ANY WARRANTY; without even the implied warranty of
11 11 # MERCHANTABILITY or FITNESS FOR A PARTICULAR PURPOSE. See the
12 12 # GNU General Public License for more details.
13 13 #
14 14 # You should have received a copy of the GNU Affero General Public License
15 15 # along with this program. If not, see <http://www.gnu.org/licenses/>.
16 16 #
17 17 # This program is dual-licensed. If you wish to learn more about the
18 18 # RhodeCode Enterprise Edition, including its added features, Support services,
19 19 # and proprietary license terms, please see https://rhodecode.com/licenses/
20 20
21 21 import mock
22 22 import pytest
23 23
24 24 from rhodecode.lib import helpers as h
25 25 from rhodecode.model.db import User, Gist
26 26 from rhodecode.model.gist import GistModel
27 27 from rhodecode.model.meta import Session
28 28 from rhodecode.tests import (
29 29 TEST_USER_ADMIN_LOGIN, TEST_USER_REGULAR_LOGIN, TEST_USER_REGULAR_PASS,
30 TestController, assert_session_flash, url)
30 TestController, assert_session_flash)
31
32
33 def route_path(name, params=None, **kwargs):
34 import urllib
35 from rhodecode.apps._base import ADMIN_PREFIX
36
37 base_url = {
38 'gists_show': ADMIN_PREFIX + '/gists',
39 'gists_new': ADMIN_PREFIX + '/gists/new',
40 'gists_create': ADMIN_PREFIX + '/gists/create',
41 'gist_show': ADMIN_PREFIX + '/gists/{gist_id}',
42 'gist_delete': ADMIN_PREFIX + '/gists/{gist_id}/delete',
43 'gist_edit': ADMIN_PREFIX + '/gists/{gist_id}/edit',
44 'gist_edit_check_revision': ADMIN_PREFIX + '/gists/{gist_id}/edit/check_revision',
45 'gist_update': ADMIN_PREFIX + '/gists/{gist_id}/update',
46 'gist_show_rev': ADMIN_PREFIX + '/gists/{gist_id}/{revision}',
47 'gist_show_formatted': ADMIN_PREFIX + '/gists/{gist_id}/{revision}/{format}',
48 'gist_show_formatted_path': ADMIN_PREFIX + '/gists/{gist_id}/{revision}/{format}/{f_path}',
49
50 }[name].format(**kwargs)
51
52 if params:
53 base_url = '{}?{}'.format(base_url, urllib.urlencode(params))
54 return base_url
31 55
32 56
33 57 class GistUtility(object):
34 58
35 59 def __init__(self):
36 60 self._gist_ids = []
37 61
38 62 def __call__(
39 63 self, f_name, content='some gist', lifetime=-1,
40 64 description='gist-desc', gist_type='public',
41 65 acl_level=Gist.GIST_PUBLIC, owner=TEST_USER_ADMIN_LOGIN):
42 66 gist_mapping = {
43 67 f_name: {'content': content}
44 68 }
45 69 user = User.get_by_username(owner)
46 70 gist = GistModel().create(
47 71 description, owner=user, gist_mapping=gist_mapping,
48 72 gist_type=gist_type, lifetime=lifetime, gist_acl_level=acl_level)
49 73 Session().commit()
50 74 self._gist_ids.append(gist.gist_id)
51 75 return gist
52 76
53 77 def cleanup(self):
54 78 for gist_id in self._gist_ids:
55 79 gist = Gist.get(gist_id)
56 80 if gist:
57 81 Session().delete(gist)
58 82
59 83 Session().commit()
60 84
61 85
62 86 @pytest.fixture
63 87 def create_gist(request):
64 88 gist_utility = GistUtility()
65 89 request.addfinalizer(gist_utility.cleanup)
66 90 return gist_utility
67 91
68 92
69 93 class TestGistsController(TestController):
70 94
71 95 def test_index_empty(self, create_gist):
72 96 self.log_user()
73 response = self.app.get(url('gists'))
97 response = self.app.get(route_path('gists_show'))
74 98 response.mustcontain('data: [],')
75 99
76 100 def test_index(self, create_gist):
77 101 self.log_user()
78 102 g1 = create_gist('gist1')
79 103 g2 = create_gist('gist2', lifetime=1400)
80 104 g3 = create_gist('gist3', description='gist3-desc')
81 105 g4 = create_gist('gist4', gist_type='private').gist_access_id
82 response = self.app.get(url('gists'))
106 response = self.app.get(route_path('gists_show'))
83 107
84 108 response.mustcontain('gist: %s' % g1.gist_access_id)
85 109 response.mustcontain('gist: %s' % g2.gist_access_id)
86 110 response.mustcontain('gist: %s' % g3.gist_access_id)
87 111 response.mustcontain('gist3-desc')
88 112 response.mustcontain(no=['gist: %s' % g4])
89 113
90 114 # Expiration information should be visible
91 115 expires_tag = '%s' % h.age_component(
92 116 h.time_to_utcdatetime(g2.gist_expires))
93 117 response.mustcontain(expires_tag.replace('"', '\\"'))
94 118
95 119 def test_index_private_gists(self, create_gist):
96 120 self.log_user()
97 121 gist = create_gist('gist5', gist_type='private')
98 response = self.app.get(url('gists', private=1))
122 response = self.app.get(route_path('gists_show', params=dict(private=1)))
99 123
100 124 # and privates
101 125 response.mustcontain('gist: %s' % gist.gist_access_id)
102 126
103 127 def test_index_show_all(self, create_gist):
104 128 self.log_user()
105 129 create_gist('gist1')
106 130 create_gist('gist2', lifetime=1400)
107 131 create_gist('gist3', description='gist3-desc')
108 132 create_gist('gist4', gist_type='private')
109 133
110 response = self.app.get(url('gists', all=1))
134 response = self.app.get(route_path('gists_show', params=dict(all=1)))
111 135
112 136 assert len(GistModel.get_all()) == 4
113 137 # and privates
114 138 for gist in GistModel.get_all():
115 139 response.mustcontain('gist: %s' % gist.gist_access_id)
116 140
117 141 def test_index_show_all_hidden_from_regular(self, create_gist):
118 142 self.log_user(TEST_USER_REGULAR_LOGIN, TEST_USER_REGULAR_PASS)
119 143 create_gist('gist2', gist_type='private')
120 144 create_gist('gist3', gist_type='private')
121 145 create_gist('gist4', gist_type='private')
122 146
123 response = self.app.get(url('gists', all=1))
147 response = self.app.get(route_path('gists_show', params=dict(all=1)))
124 148
125 149 assert len(GistModel.get_all()) == 3
126 150 # since we don't have access to private in this view, we
127 151 # should see nothing
128 152 for gist in GistModel.get_all():
129 153 response.mustcontain(no=['gist: %s' % gist.gist_access_id])
130 154
131 155 def test_create(self):
132 156 self.log_user()
133 157 response = self.app.post(
134 url('gists'),
158 route_path('gists_create'),
135 159 params={'lifetime': -1,
136 160 'content': 'gist test',
137 161 'filename': 'foo',
138 162 'public': 'public',
139 163 'gist_acl_level': Gist.ACL_LEVEL_PUBLIC,
140 164 'csrf_token': self.csrf_token},
141 165 status=302)
142 166 response = response.follow()
143 167 response.mustcontain('added file: foo')
144 168 response.mustcontain('gist test')
145 169
146 170 def test_create_with_path_with_dirs(self):
147 171 self.log_user()
148 172 response = self.app.post(
149 url('gists'),
173 route_path('gists_create'),
150 174 params={'lifetime': -1,
151 175 'content': 'gist test',
152 176 'filename': '/home/foo',
153 177 'public': 'public',
154 178 'gist_acl_level': Gist.ACL_LEVEL_PUBLIC,
155 179 'csrf_token': self.csrf_token},
156 180 status=200)
157 181 response.mustcontain('Filename /home/foo cannot be inside a directory')
158 182
159 183 def test_access_expired_gist(self, create_gist):
160 184 self.log_user()
161 185 gist = create_gist('never-see-me')
162 186 gist.gist_expires = 0 # 1970
163 187 Session().add(gist)
164 188 Session().commit()
165 189
166 self.app.get(url('gist', gist_id=gist.gist_access_id), status=404)
190 self.app.get(route_path('gist_show', gist_id=gist.gist_access_id),
191 status=404)
167 192
168 193 def test_create_private(self):
169 194 self.log_user()
170 195 response = self.app.post(
171 url('gists'),
196 route_path('gists_create'),
172 197 params={'lifetime': -1,
173 198 'content': 'private gist test',
174 199 'filename': 'private-foo',
175 200 'private': 'private',
176 201 'gist_acl_level': Gist.ACL_LEVEL_PUBLIC,
177 202 'csrf_token': self.csrf_token},
178 203 status=302)
179 204 response = response.follow()
180 205 response.mustcontain('added file: private-foo<')
181 206 response.mustcontain('private gist test')
182 207 response.mustcontain('Private Gist')
183 208 # Make sure private gists are not indexed by robots
184 209 response.mustcontain(
185 210 '<meta name="robots" content="noindex, nofollow">')
186 211
187 212 def test_create_private_acl_private(self):
188 213 self.log_user()
189 214 response = self.app.post(
190 url('gists'),
215 route_path('gists_create'),
191 216 params={'lifetime': -1,
192 217 'content': 'private gist test',
193 218 'filename': 'private-foo',
194 219 'private': 'private',
195 220 'gist_acl_level': Gist.ACL_LEVEL_PRIVATE,
196 221 'csrf_token': self.csrf_token},
197 222 status=302)
198 223 response = response.follow()
199 224 response.mustcontain('added file: private-foo<')
200 225 response.mustcontain('private gist test')
201 226 response.mustcontain('Private Gist')
202 227 # Make sure private gists are not indexed by robots
203 228 response.mustcontain(
204 229 '<meta name="robots" content="noindex, nofollow">')
205 230
206 231 def test_create_with_description(self):
207 232 self.log_user()
208 233 response = self.app.post(
209 url('gists'),
234 route_path('gists_create'),
210 235 params={'lifetime': -1,
211 236 'content': 'gist test',
212 237 'filename': 'foo-desc',
213 238 'description': 'gist-desc',
214 239 'public': 'public',
215 240 'gist_acl_level': Gist.ACL_LEVEL_PUBLIC,
216 241 'csrf_token': self.csrf_token},
217 242 status=302)
218 243 response = response.follow()
219 244 response.mustcontain('added file: foo-desc')
220 245 response.mustcontain('gist test')
221 246 response.mustcontain('gist-desc')
222 247
223 248 def test_create_public_with_anonymous_access(self):
224 249 self.log_user()
225 250 params = {
226 251 'lifetime': -1,
227 252 'content': 'gist test',
228 253 'filename': 'foo-desc',
229 254 'description': 'gist-desc',
230 255 'public': 'public',
231 256 'gist_acl_level': Gist.ACL_LEVEL_PUBLIC,
232 257 'csrf_token': self.csrf_token
233 258 }
234 response = self.app.post(url('gists'), params=params, status=302)
259 response = self.app.post(
260 route_path('gists_create'), params=params, status=302)
235 261 self.logout_user()
236 262 response = response.follow()
237 263 response.mustcontain('added file: foo-desc')
238 264 response.mustcontain('gist test')
239 265 response.mustcontain('gist-desc')
240 266
241 267 def test_new(self):
242 268 self.log_user()
243 self.app.get(url('new_gist'))
269 self.app.get(route_path('gists_new'))
244 270
245 271 def test_delete(self, create_gist):
246 272 self.log_user()
247 273 gist = create_gist('delete-me')
248 274 response = self.app.post(
249 url('gist', gist_id=gist.gist_id),
250 params={'_method': 'delete', 'csrf_token': self.csrf_token})
275 route_path('gist_delete', gist_id=gist.gist_id),
276 params={'csrf_token': self.csrf_token})
251 277 assert_session_flash(response, 'Deleted gist %s' % gist.gist_id)
252 278
253 279 def test_delete_normal_user_his_gist(self, create_gist):
254 280 self.log_user(TEST_USER_REGULAR_LOGIN, TEST_USER_REGULAR_PASS)
255 281 gist = create_gist('delete-me', owner=TEST_USER_REGULAR_LOGIN)
282
256 283 response = self.app.post(
257 url('gist', gist_id=gist.gist_id),
258 params={'_method': 'delete', 'csrf_token': self.csrf_token})
284 route_path('gist_delete', gist_id=gist.gist_id),
285 params={'csrf_token': self.csrf_token})
259 286 assert_session_flash(response, 'Deleted gist %s' % gist.gist_id)
260 287
261 288 def test_delete_normal_user_not_his_own_gist(self, create_gist):
262 289 self.log_user(TEST_USER_REGULAR_LOGIN, TEST_USER_REGULAR_PASS)
263 gist = create_gist('delete-me')
290 gist = create_gist('delete-me-2')
291
264 292 self.app.post(
265 url('gist', gist_id=gist.gist_id),
266 params={'_method': 'delete', 'csrf_token': self.csrf_token},
267 status=403)
293 route_path('gist_delete', gist_id=gist.gist_id),
294 params={'csrf_token': self.csrf_token}, status=404)
268 295
269 296 def test_show(self, create_gist):
270 297 gist = create_gist('gist-show-me')
271 response = self.app.get(url('gist', gist_id=gist.gist_access_id))
298 response = self.app.get(route_path('gist_show', gist_id=gist.gist_access_id))
272 299
273 300 response.mustcontain('added file: gist-show-me<')
274 301
275 302 assert_response = response.assert_response()
276 303 assert_response.element_equals_to(
277 304 'div.rc-user span.user',
278 305 '<a href="/_profiles/test_admin">test_admin</a></span>')
279 306
280 307 response.mustcontain('gist-desc')
281 308
282 309 def test_show_without_hg(self, create_gist):
283 310 with mock.patch(
284 311 'rhodecode.lib.vcs.settings.ALIASES', ['git']):
285 312 gist = create_gist('gist-show-me-again')
286 self.app.get(url('gist', gist_id=gist.gist_access_id), status=200)
313 self.app.get(
314 route_path('gist_show', gist_id=gist.gist_access_id), status=200)
287 315
288 316 def test_show_acl_private(self, create_gist):
289 317 gist = create_gist('gist-show-me-only-when-im-logged-in',
290 318 acl_level=Gist.ACL_LEVEL_PRIVATE)
291 self.app.get(url('gist', gist_id=gist.gist_access_id), status=404)
319 self.app.get(
320 route_path('gist_show', gist_id=gist.gist_access_id), status=404)
292 321
293 322 # now we log-in we should see thi gist
294 323 self.log_user()
295 response = self.app.get(url('gist', gist_id=gist.gist_access_id))
324 response = self.app.get(
325 route_path('gist_show', gist_id=gist.gist_access_id))
296 326 response.mustcontain('added file: gist-show-me-only-when-im-logged-in')
297 327
298 328 assert_response = response.assert_response()
299 329 assert_response.element_equals_to(
300 330 'div.rc-user span.user',
301 331 '<a href="/_profiles/test_admin">test_admin</a></span>')
302 332 response.mustcontain('gist-desc')
303 333
304 334 def test_show_as_raw(self, create_gist):
305 335 gist = create_gist('gist-show-me', content='GIST CONTENT')
306 response = self.app.get(url('formatted_gist',
307 gist_id=gist.gist_access_id, format='raw'))
336 response = self.app.get(
337 route_path('gist_show_formatted',
338 gist_id=gist.gist_access_id, revision='tip',
339 format='raw'))
308 340 assert response.body == 'GIST CONTENT'
309 341
310 342 def test_show_as_raw_individual_file(self, create_gist):
311 343 gist = create_gist('gist-show-me-raw', content='GIST BODY')
312 response = self.app.get(url('formatted_gist_file',
313 gist_id=gist.gist_access_id, format='raw',
314 revision='tip', f_path='gist-show-me-raw'))
344 response = self.app.get(
345 route_path('gist_show_formatted_path',
346 gist_id=gist.gist_access_id, format='raw',
347 revision='tip', f_path='gist-show-me-raw'))
315 348 assert response.body == 'GIST BODY'
316 349
317 350 def test_edit_page(self, create_gist):
318 351 self.log_user()
319 352 gist = create_gist('gist-for-edit', content='GIST EDIT BODY')
320 response = self.app.get(url('edit_gist', gist_id=gist.gist_access_id))
353 response = self.app.get(route_path('gist_edit', gist_id=gist.gist_access_id))
321 354 response.mustcontain('GIST EDIT BODY')
322 355
323 356 def test_edit_page_non_logged_user(self, create_gist):
324 357 gist = create_gist('gist-for-edit', content='GIST EDIT BODY')
325 self.app.get(url('edit_gist', gist_id=gist.gist_access_id), status=302)
358 self.app.get(route_path('gist_edit', gist_id=gist.gist_access_id),
359 status=302)
326 360
327 361 def test_edit_normal_user_his_gist(self, create_gist):
328 362 self.log_user(TEST_USER_REGULAR_LOGIN, TEST_USER_REGULAR_PASS)
329 363 gist = create_gist('gist-for-edit', owner=TEST_USER_REGULAR_LOGIN)
330 self.app.get(url('edit_gist', gist_id=gist.gist_access_id, status=200))
364 self.app.get(route_path('gist_edit', gist_id=gist.gist_access_id,
365 status=200))
331 366
332 367 def test_edit_normal_user_not_his_own_gist(self, create_gist):
333 368 self.log_user(TEST_USER_REGULAR_LOGIN, TEST_USER_REGULAR_PASS)
334 369 gist = create_gist('delete-me')
335 self.app.get(url('edit_gist', gist_id=gist.gist_access_id), status=403)
370 self.app.get(route_path('gist_edit', gist_id=gist.gist_access_id),
371 status=404)
336 372
337 373 def test_user_first_name_is_escaped(self, user_util, create_gist):
338 374 xss_atack_string = '"><script>alert(\'First Name\')</script>'
339 375 xss_escaped_string = h.html_escape(h.escape(xss_atack_string))
340 376 password = 'test'
341 377 user = user_util.create_user(
342 378 firstname=xss_atack_string, password=password)
343 379 create_gist('gist', gist_type='public', owner=user.username)
344 response = self.app.get(url('gists'))
380 response = self.app.get(route_path('gists_show'))
345 381 response.mustcontain(xss_escaped_string)
346 382
347 383 def test_user_last_name_is_escaped(self, user_util, create_gist):
348 384 xss_atack_string = '"><script>alert(\'Last Name\')</script>'
349 385 xss_escaped_string = h.html_escape(h.escape(xss_atack_string))
350 386 password = 'test'
351 387 user = user_util.create_user(
352 388 lastname=xss_atack_string, password=password)
353 389 create_gist('gist', gist_type='public', owner=user.username)
354 response = self.app.get(url('gists'))
390 response = self.app.get(route_path('gists_show'))
355 391 response.mustcontain(xss_escaped_string)
@@ -1,527 +1,528 b''
1 1 # -*- coding: utf-8 -*-
2 2
3 3 # Copyright (C) 2010-2017 RhodeCode GmbH
4 4 #
5 5 # This program is free software: you can redistribute it and/or modify
6 6 # it under the terms of the GNU Affero General Public License, version 3
7 7 # (only), as published by the Free Software Foundation.
8 8 #
9 9 # This program is distributed in the hope that it will be useful,
10 10 # but WITHOUT ANY WARRANTY; without even the implied warranty of
11 11 # MERCHANTABILITY or FITNESS FOR A PARTICULAR PURPOSE. See the
12 12 # GNU General Public License for more details.
13 13 #
14 14 # You should have received a copy of the GNU Affero General Public License
15 15 # along with this program. If not, see <http://www.gnu.org/licenses/>.
16 16 #
17 17 # This program is dual-licensed. If you wish to learn more about the
18 18 # RhodeCode Enterprise Edition, including its added features, Support services,
19 19 # and proprietary license terms, please see https://rhodecode.com/licenses/
20 20
21 21 """
22 22 Pylons middleware initialization
23 23 """
24 24 import logging
25 25 from collections import OrderedDict
26 26
27 27 from paste.registry import RegistryManager
28 28 from paste.gzipper import make_gzip_middleware
29 29 from pylons.wsgiapp import PylonsApp
30 30 from pyramid.authorization import ACLAuthorizationPolicy
31 31 from pyramid.config import Configurator
32 32 from pyramid.settings import asbool, aslist
33 33 from pyramid.wsgi import wsgiapp
34 34 from pyramid.httpexceptions import (
35 35 HTTPException, HTTPError, HTTPInternalServerError, HTTPFound)
36 36 from pyramid.events import ApplicationCreated
37 37 from pyramid.renderers import render_to_response
38 38 from routes.middleware import RoutesMiddleware
39 39 import routes.util
40 40
41 41 import rhodecode
42 42
43 43 from rhodecode.model import meta
44 44 from rhodecode.config import patches
45 45 from rhodecode.config.routing import STATIC_FILE_PREFIX
46 46 from rhodecode.config.environment import (
47 47 load_environment, load_pyramid_environment)
48 48
49 49 from rhodecode.lib.vcs import VCSCommunicationError
50 50 from rhodecode.lib.exceptions import VCSServerUnavailable
51 51 from rhodecode.lib.middleware import csrf
52 52 from rhodecode.lib.middleware.appenlight import wrap_in_appenlight_if_enabled
53 53 from rhodecode.lib.middleware.error_handling import (
54 54 PylonsErrorHandlingMiddleware)
55 55 from rhodecode.lib.middleware.https_fixup import HttpsFixup
56 56 from rhodecode.lib.middleware.vcs import VCSMiddleware
57 57 from rhodecode.lib.plugins.utils import register_rhodecode_plugin
58 58 from rhodecode.lib.utils2 import aslist as rhodecode_aslist, AttributeDict
59 59 from rhodecode.subscribers import (
60 60 scan_repositories_if_enabled, write_js_routes_if_enabled,
61 61 write_metadata_if_needed)
62 62
63 63
64 64 log = logging.getLogger(__name__)
65 65
66 66
67 67 # this is used to avoid avoid the route lookup overhead in routesmiddleware
68 68 # for certain routes which won't go to pylons to - eg. static files, debugger
69 69 # it is only needed for the pylons migration and can be removed once complete
70 70 class SkippableRoutesMiddleware(RoutesMiddleware):
71 71 """ Routes middleware that allows you to skip prefixes """
72 72
73 73 def __init__(self, *args, **kw):
74 74 self.skip_prefixes = kw.pop('skip_prefixes', [])
75 75 super(SkippableRoutesMiddleware, self).__init__(*args, **kw)
76 76
77 77 def __call__(self, environ, start_response):
78 78 for prefix in self.skip_prefixes:
79 79 if environ['PATH_INFO'].startswith(prefix):
80 80 # added to avoid the case when a missing /_static route falls
81 81 # through to pylons and causes an exception as pylons is
82 82 # expecting wsgiorg.routingargs to be set in the environ
83 83 # by RoutesMiddleware.
84 84 if 'wsgiorg.routing_args' not in environ:
85 85 environ['wsgiorg.routing_args'] = (None, {})
86 86 return self.app(environ, start_response)
87 87
88 88 return super(SkippableRoutesMiddleware, self).__call__(
89 89 environ, start_response)
90 90
91 91
92 92 def make_app(global_conf, static_files=True, **app_conf):
93 93 """Create a Pylons WSGI application and return it
94 94
95 95 ``global_conf``
96 96 The inherited configuration for this application. Normally from
97 97 the [DEFAULT] section of the Paste ini file.
98 98
99 99 ``app_conf``
100 100 The application's local configuration. Normally specified in
101 101 the [app:<name>] section of the Paste ini file (where <name>
102 102 defaults to main).
103 103
104 104 """
105 105 # Apply compatibility patches
106 106 patches.kombu_1_5_1_python_2_7_11()
107 107 patches.inspect_getargspec()
108 108
109 109 # Configure the Pylons environment
110 110 config = load_environment(global_conf, app_conf)
111 111
112 112 # The Pylons WSGI app
113 113 app = PylonsApp(config=config)
114 114 if rhodecode.is_test:
115 115 app = csrf.CSRFDetector(app)
116 116
117 117 expected_origin = config.get('expected_origin')
118 118 if expected_origin:
119 119 # The API can be accessed from other Origins.
120 120 app = csrf.OriginChecker(app, expected_origin,
121 121 skip_urls=[routes.util.url_for('api')])
122 122
123 123 # Establish the Registry for this application
124 124 app = RegistryManager(app)
125 125
126 126 app.config = config
127 127
128 128 return app
129 129
130 130
131 131 def make_pyramid_app(global_config, **settings):
132 132 """
133 133 Constructs the WSGI application based on Pyramid and wraps the Pylons based
134 134 application.
135 135
136 136 Specials:
137 137
138 138 * We migrate from Pylons to Pyramid. While doing this, we keep both
139 139 frameworks functional. This involves moving some WSGI middlewares around
140 140 and providing access to some data internals, so that the old code is
141 141 still functional.
142 142
143 143 * The application can also be integrated like a plugin via the call to
144 144 `includeme`. This is accompanied with the other utility functions which
145 145 are called. Changing this should be done with great care to not break
146 146 cases when these fragments are assembled from another place.
147 147
148 148 """
149 149 # The edition string should be available in pylons too, so we add it here
150 150 # before copying the settings.
151 151 settings.setdefault('rhodecode.edition', 'Community Edition')
152 152
153 153 # As long as our Pylons application does expect "unprepared" settings, make
154 154 # sure that we keep an unmodified copy. This avoids unintentional change of
155 155 # behavior in the old application.
156 156 settings_pylons = settings.copy()
157 157
158 158 sanitize_settings_and_apply_defaults(settings)
159 159 config = Configurator(settings=settings)
160 160 add_pylons_compat_data(config.registry, global_config, settings_pylons)
161 161
162 162 load_pyramid_environment(global_config, settings)
163 163
164 164 includeme_first(config)
165 165 includeme(config)
166 166 pyramid_app = config.make_wsgi_app()
167 167 pyramid_app = wrap_app_in_wsgi_middlewares(pyramid_app, config)
168 168 pyramid_app.config = config
169 169
170 170 # creating the app uses a connection - return it after we are done
171 171 meta.Session.remove()
172 172
173 173 return pyramid_app
174 174
175 175
176 176 def make_not_found_view(config):
177 177 """
178 178 This creates the view which should be registered as not-found-view to
179 179 pyramid. Basically it contains of the old pylons app, converted to a view.
180 180 Additionally it is wrapped by some other middlewares.
181 181 """
182 182 settings = config.registry.settings
183 183 vcs_server_enabled = settings['vcs.server.enable']
184 184
185 185 # Make pylons app from unprepared settings.
186 186 pylons_app = make_app(
187 187 config.registry._pylons_compat_global_config,
188 188 **config.registry._pylons_compat_settings)
189 189 config.registry._pylons_compat_config = pylons_app.config
190 190
191 191 # Appenlight monitoring.
192 192 pylons_app, appenlight_client = wrap_in_appenlight_if_enabled(
193 193 pylons_app, settings)
194 194
195 195 # The pylons app is executed inside of the pyramid 404 exception handler.
196 196 # Exceptions which are raised inside of it are not handled by pyramid
197 197 # again. Therefore we add a middleware that invokes the error handler in
198 198 # case of an exception or error response. This way we return proper error
199 199 # HTML pages in case of an error.
200 200 reraise = (settings.get('debugtoolbar.enabled', False) or
201 201 rhodecode.disable_error_handler)
202 202 pylons_app = PylonsErrorHandlingMiddleware(
203 203 pylons_app, error_handler, reraise)
204 204
205 205 # The VCSMiddleware shall operate like a fallback if pyramid doesn't find a
206 206 # view to handle the request. Therefore it is wrapped around the pylons
207 207 # app. It has to be outside of the error handling otherwise error responses
208 208 # from the vcsserver are converted to HTML error pages. This confuses the
209 209 # command line tools and the user won't get a meaningful error message.
210 210 if vcs_server_enabled:
211 211 pylons_app = VCSMiddleware(
212 212 pylons_app, settings, appenlight_client, registry=config.registry)
213 213
214 214 # Convert WSGI app to pyramid view and return it.
215 215 return wsgiapp(pylons_app)
216 216
217 217
218 218 def add_pylons_compat_data(registry, global_config, settings):
219 219 """
220 220 Attach data to the registry to support the Pylons integration.
221 221 """
222 222 registry._pylons_compat_global_config = global_config
223 223 registry._pylons_compat_settings = settings
224 224
225 225
226 226 def error_handler(exception, request):
227 227 import rhodecode
228 228 from rhodecode.lib import helpers
229 229
230 230 rhodecode_title = rhodecode.CONFIG.get('rhodecode_title') or 'RhodeCode'
231 231
232 232 base_response = HTTPInternalServerError()
233 233 # prefer original exception for the response since it may have headers set
234 234 if isinstance(exception, HTTPException):
235 235 base_response = exception
236 236 elif isinstance(exception, VCSCommunicationError):
237 237 base_response = VCSServerUnavailable()
238 238
239 239 def is_http_error(response):
240 240 # error which should have traceback
241 241 return response.status_code > 499
242 242
243 243 if is_http_error(base_response):
244 244 log.exception(
245 245 'error occurred handling this request for path: %s', request.path)
246 246
247 247 c = AttributeDict()
248 248 c.error_message = base_response.status
249 249 c.error_explanation = base_response.explanation or str(base_response)
250 250 c.visual = AttributeDict()
251 251
252 252 c.visual.rhodecode_support_url = (
253 253 request.registry.settings.get('rhodecode_support_url') or
254 254 request.route_url('rhodecode_support')
255 255 )
256 256 c.redirect_time = 0
257 257 c.rhodecode_name = rhodecode_title
258 258 if not c.rhodecode_name:
259 259 c.rhodecode_name = 'Rhodecode'
260 260
261 261 c.causes = []
262 262 if hasattr(base_response, 'causes'):
263 263 c.causes = base_response.causes
264 264 c.messages = helpers.flash.pop_messages()
265 265
266 266 response = render_to_response(
267 267 '/errors/error_document.mako', {'c': c, 'h': helpers}, request=request,
268 268 response=base_response)
269 269
270 270 return response
271 271
272 272
273 273 def includeme(config):
274 274 settings = config.registry.settings
275 275
276 276 # plugin information
277 277 config.registry.rhodecode_plugins = OrderedDict()
278 278
279 279 config.add_directive(
280 280 'register_rhodecode_plugin', register_rhodecode_plugin)
281 281
282 282 if asbool(settings.get('appenlight', 'false')):
283 283 config.include('appenlight_client.ext.pyramid_tween')
284 284
285 285 # Includes which are required. The application would fail without them.
286 286 config.include('pyramid_mako')
287 287 config.include('pyramid_beaker')
288 288
289 289 config.include('rhodecode.authentication')
290 290 config.include('rhodecode.integrations')
291 291
292 292 # apps
293 293 config.include('rhodecode.apps._base')
294 294 config.include('rhodecode.apps.ops')
295 295
296 296 config.include('rhodecode.apps.admin')
297 297 config.include('rhodecode.apps.channelstream')
298 298 config.include('rhodecode.apps.login')
299 299 config.include('rhodecode.apps.home')
300 300 config.include('rhodecode.apps.repository')
301 301 config.include('rhodecode.apps.repo_group')
302 302 config.include('rhodecode.apps.search')
303 303 config.include('rhodecode.apps.user_profile')
304 304 config.include('rhodecode.apps.my_account')
305 305 config.include('rhodecode.apps.svn_support')
306 config.include('rhodecode.apps.gist')
306 307
307 308 config.include('rhodecode.tweens')
308 309 config.include('rhodecode.api')
309 310
310 311 config.add_route(
311 312 'rhodecode_support', 'https://rhodecode.com/help/', static=True)
312 313
313 314 config.add_translation_dirs('rhodecode:i18n/')
314 315 settings['default_locale_name'] = settings.get('lang', 'en')
315 316
316 317 # Add subscribers.
317 318 config.add_subscriber(scan_repositories_if_enabled, ApplicationCreated)
318 319 config.add_subscriber(write_metadata_if_needed, ApplicationCreated)
319 320 config.add_subscriber(write_js_routes_if_enabled, ApplicationCreated)
320 321
321 322 # events
322 323 # TODO(marcink): this should be done when pyramid migration is finished
323 324 # config.add_subscriber(
324 325 # 'rhodecode.integrations.integrations_event_handler',
325 326 # 'rhodecode.events.RhodecodeEvent')
326 327
327 328 # Set the authorization policy.
328 329 authz_policy = ACLAuthorizationPolicy()
329 330 config.set_authorization_policy(authz_policy)
330 331
331 332 # Set the default renderer for HTML templates to mako.
332 333 config.add_mako_renderer('.html')
333 334
334 335 config.add_renderer(
335 336 name='json_ext',
336 337 factory='rhodecode.lib.ext_json_renderer.pyramid_ext_json')
337 338
338 339 # include RhodeCode plugins
339 340 includes = aslist(settings.get('rhodecode.includes', []))
340 341 for inc in includes:
341 342 config.include(inc)
342 343
343 344 # This is the glue which allows us to migrate in chunks. By registering the
344 345 # pylons based application as the "Not Found" view in Pyramid, we will
345 346 # fallback to the old application each time the new one does not yet know
346 347 # how to handle a request.
347 348 config.add_notfound_view(make_not_found_view(config))
348 349
349 350 if not settings.get('debugtoolbar.enabled', False):
350 351 # if no toolbar, then any exception gets caught and rendered
351 352 config.add_view(error_handler, context=Exception)
352 353
353 354 config.add_view(error_handler, context=HTTPError)
354 355
355 356
356 357 def includeme_first(config):
357 358 # redirect automatic browser favicon.ico requests to correct place
358 359 def favicon_redirect(context, request):
359 360 return HTTPFound(
360 361 request.static_path('rhodecode:public/images/favicon.ico'))
361 362
362 363 config.add_view(favicon_redirect, route_name='favicon')
363 364 config.add_route('favicon', '/favicon.ico')
364 365
365 366 def robots_redirect(context, request):
366 367 return HTTPFound(
367 368 request.static_path('rhodecode:public/robots.txt'))
368 369
369 370 config.add_view(robots_redirect, route_name='robots')
370 371 config.add_route('robots', '/robots.txt')
371 372
372 373 config.add_static_view(
373 374 '_static/deform', 'deform:static')
374 375 config.add_static_view(
375 376 '_static/rhodecode', path='rhodecode:public', cache_max_age=3600 * 24)
376 377
377 378
378 379 def wrap_app_in_wsgi_middlewares(pyramid_app, config):
379 380 """
380 381 Apply outer WSGI middlewares around the application.
381 382
382 383 Part of this has been moved up from the Pylons layer, so that the
383 384 data is also available if old Pylons code is hit through an already ported
384 385 view.
385 386 """
386 387 settings = config.registry.settings
387 388
388 389 # enable https redirects based on HTTP_X_URL_SCHEME set by proxy
389 390 pyramid_app = HttpsFixup(pyramid_app, settings)
390 391
391 392 # Add RoutesMiddleware to support the pylons compatibility tween during
392 393 # migration to pyramid.
393 394 pyramid_app = SkippableRoutesMiddleware(
394 395 pyramid_app, config.registry._pylons_compat_config['routes.map'],
395 396 skip_prefixes=(STATIC_FILE_PREFIX, '/_debug_toolbar'))
396 397
397 398 pyramid_app, _ = wrap_in_appenlight_if_enabled(pyramid_app, settings)
398 399
399 400 if settings['gzip_responses']:
400 401 pyramid_app = make_gzip_middleware(
401 402 pyramid_app, settings, compress_level=1)
402 403
403 404 # this should be the outer most middleware in the wsgi stack since
404 405 # middleware like Routes make database calls
405 406 def pyramid_app_with_cleanup(environ, start_response):
406 407 try:
407 408 return pyramid_app(environ, start_response)
408 409 finally:
409 410 # Dispose current database session and rollback uncommitted
410 411 # transactions.
411 412 meta.Session.remove()
412 413
413 414 # In a single threaded mode server, on non sqlite db we should have
414 415 # '0 Current Checked out connections' at the end of a request,
415 416 # if not, then something, somewhere is leaving a connection open
416 417 pool = meta.Base.metadata.bind.engine.pool
417 418 log.debug('sa pool status: %s', pool.status())
418 419
419 420 return pyramid_app_with_cleanup
420 421
421 422
422 423 def sanitize_settings_and_apply_defaults(settings):
423 424 """
424 425 Applies settings defaults and does all type conversion.
425 426
426 427 We would move all settings parsing and preparation into this place, so that
427 428 we have only one place left which deals with this part. The remaining parts
428 429 of the application would start to rely fully on well prepared settings.
429 430
430 431 This piece would later be split up per topic to avoid a big fat monster
431 432 function.
432 433 """
433 434
434 435 # Pyramid's mako renderer has to search in the templates folder so that the
435 436 # old templates still work. Ported and new templates are expected to use
436 437 # real asset specifications for the includes.
437 438 mako_directories = settings.setdefault('mako.directories', [
438 439 # Base templates of the original Pylons application
439 440 'rhodecode:templates',
440 441 ])
441 442 log.debug(
442 443 "Using the following Mako template directories: %s",
443 444 mako_directories)
444 445
445 446 # Default includes, possible to change as a user
446 447 pyramid_includes = settings.setdefault('pyramid.includes', [
447 448 'rhodecode.lib.middleware.request_wrapper',
448 449 ])
449 450 log.debug(
450 451 "Using the following pyramid.includes: %s",
451 452 pyramid_includes)
452 453
453 454 # TODO: johbo: Re-think this, usually the call to config.include
454 455 # should allow to pass in a prefix.
455 456 settings.setdefault('rhodecode.api.url', '/_admin/api')
456 457
457 458 # Sanitize generic settings.
458 459 _list_setting(settings, 'default_encoding', 'UTF-8')
459 460 _bool_setting(settings, 'is_test', 'false')
460 461 _bool_setting(settings, 'gzip_responses', 'false')
461 462
462 463 # Call split out functions that sanitize settings for each topic.
463 464 _sanitize_appenlight_settings(settings)
464 465 _sanitize_vcs_settings(settings)
465 466
466 467 return settings
467 468
468 469
469 470 def _sanitize_appenlight_settings(settings):
470 471 _bool_setting(settings, 'appenlight', 'false')
471 472
472 473
473 474 def _sanitize_vcs_settings(settings):
474 475 """
475 476 Applies settings defaults and does type conversion for all VCS related
476 477 settings.
477 478 """
478 479 _string_setting(settings, 'vcs.svn.compatible_version', '')
479 480 _string_setting(settings, 'git_rev_filter', '--all')
480 481 _string_setting(settings, 'vcs.hooks.protocol', 'http')
481 482 _string_setting(settings, 'vcs.scm_app_implementation', 'http')
482 483 _string_setting(settings, 'vcs.server', '')
483 484 _string_setting(settings, 'vcs.server.log_level', 'debug')
484 485 _string_setting(settings, 'vcs.server.protocol', 'http')
485 486 _bool_setting(settings, 'startup.import_repos', 'false')
486 487 _bool_setting(settings, 'vcs.hooks.direct_calls', 'false')
487 488 _bool_setting(settings, 'vcs.server.enable', 'true')
488 489 _bool_setting(settings, 'vcs.start_server', 'false')
489 490 _list_setting(settings, 'vcs.backends', 'hg, git, svn')
490 491 _int_setting(settings, 'vcs.connection_timeout', 3600)
491 492
492 493 # Support legacy values of vcs.scm_app_implementation. Legacy
493 494 # configurations may use 'rhodecode.lib.middleware.utils.scm_app_http'
494 495 # which is now mapped to 'http'.
495 496 scm_app_impl = settings['vcs.scm_app_implementation']
496 497 if scm_app_impl == 'rhodecode.lib.middleware.utils.scm_app_http':
497 498 settings['vcs.scm_app_implementation'] = 'http'
498 499
499 500
500 501 def _int_setting(settings, name, default):
501 502 settings[name] = int(settings.get(name, default))
502 503
503 504
504 505 def _bool_setting(settings, name, default):
505 506 input = settings.get(name, default)
506 507 if isinstance(input, unicode):
507 508 input = input.encode('utf8')
508 509 settings[name] = asbool(input)
509 510
510 511
511 512 def _list_setting(settings, name, default):
512 513 raw_value = settings.get(name, default)
513 514
514 515 old_separator = ','
515 516 if old_separator in raw_value:
516 517 # If we get a comma separated list, pass it to our own function.
517 518 settings[name] = rhodecode_aslist(raw_value, sep=old_separator)
518 519 else:
519 520 # Otherwise we assume it uses pyramids space/newline separation.
520 521 settings[name] = aslist(raw_value)
521 522
522 523
523 524 def _string_setting(settings, name, default, lower=True):
524 525 value = settings.get(name, default)
525 526 if lower:
526 527 value = value.lower()
527 528 settings[name] = value
@@ -1,945 +1,912 b''
1 1 # -*- coding: utf-8 -*-
2 2
3 3 # Copyright (C) 2010-2017 RhodeCode GmbH
4 4 #
5 5 # This program is free software: you can redistribute it and/or modify
6 6 # it under the terms of the GNU Affero General Public License, version 3
7 7 # (only), as published by the Free Software Foundation.
8 8 #
9 9 # This program is distributed in the hope that it will be useful,
10 10 # but WITHOUT ANY WARRANTY; without even the implied warranty of
11 11 # MERCHANTABILITY or FITNESS FOR A PARTICULAR PURPOSE. See the
12 12 # GNU General Public License for more details.
13 13 #
14 14 # You should have received a copy of the GNU Affero General Public License
15 15 # along with this program. If not, see <http://www.gnu.org/licenses/>.
16 16 #
17 17 # This program is dual-licensed. If you wish to learn more about the
18 18 # RhodeCode Enterprise Edition, including its added features, Support services,
19 19 # and proprietary license terms, please see https://rhodecode.com/licenses/
20 20
21 21 """
22 22 Routes configuration
23 23
24 24 The more specific and detailed routes should be defined first so they
25 25 may take precedent over the more generic routes. For more information
26 26 refer to the routes manual at http://routes.groovie.org/docs/
27 27
28 28 IMPORTANT: if you change any routing here, make sure to take a look at lib/base.py
29 29 and _route_name variable which uses some of stored naming here to do redirects.
30 30 """
31 31 import os
32 32 import re
33 33 from routes import Mapper
34 34
35 35 # prefix for non repository related links needs to be prefixed with `/`
36 36 ADMIN_PREFIX = '/_admin'
37 37 STATIC_FILE_PREFIX = '/_static'
38 38
39 39 # Default requirements for URL parts
40 40 URL_NAME_REQUIREMENTS = {
41 41 # group name can have a slash in them, but they must not end with a slash
42 42 'group_name': r'.*?[^/]',
43 43 'repo_group_name': r'.*?[^/]',
44 44 # repo names can have a slash in them, but they must not end with a slash
45 45 'repo_name': r'.*?[^/]',
46 46 # file path eats up everything at the end
47 47 'f_path': r'.*',
48 48 # reference types
49 49 'source_ref_type': '(branch|book|tag|rev|\%\(source_ref_type\)s)',
50 50 'target_ref_type': '(branch|book|tag|rev|\%\(target_ref_type\)s)',
51 51 }
52 52
53 53
54 54 def add_route_requirements(route_path, requirements):
55 55 """
56 56 Adds regex requirements to pyramid routes using a mapping dict
57 57
58 58 >>> add_route_requirements('/{action}/{id}', {'id': r'\d+'})
59 59 '/{action}/{id:\d+}'
60 60
61 61 """
62 62 for key, regex in requirements.items():
63 63 route_path = route_path.replace('{%s}' % key, '{%s:%s}' % (key, regex))
64 64 return route_path
65 65
66 66
67 67 class JSRoutesMapper(Mapper):
68 68 """
69 69 Wrapper for routes.Mapper to make pyroutes compatible url definitions
70 70 """
71 71 _named_route_regex = re.compile(r'^[a-z-_0-9A-Z]+$')
72 72 _argument_prog = re.compile('\{(.*?)\}|:\((.*)\)')
73 73 def __init__(self, *args, **kw):
74 74 super(JSRoutesMapper, self).__init__(*args, **kw)
75 75 self._jsroutes = []
76 76
77 77 def connect(self, *args, **kw):
78 78 """
79 79 Wrapper for connect to take an extra argument jsroute=True
80 80
81 81 :param jsroute: boolean, if True will add the route to the pyroutes list
82 82 """
83 83 if kw.pop('jsroute', False):
84 84 if not self._named_route_regex.match(args[0]):
85 85 raise Exception('only named routes can be added to pyroutes')
86 86 self._jsroutes.append(args[0])
87 87
88 88 super(JSRoutesMapper, self).connect(*args, **kw)
89 89
90 90 def _extract_route_information(self, route):
91 91 """
92 92 Convert a route into tuple(name, path, args), eg:
93 93 ('show_user', '/profile/%(username)s', ['username'])
94 94 """
95 95 routepath = route.routepath
96 96 def replace(matchobj):
97 97 if matchobj.group(1):
98 98 return "%%(%s)s" % matchobj.group(1).split(':')[0]
99 99 else:
100 100 return "%%(%s)s" % matchobj.group(2)
101 101
102 102 routepath = self._argument_prog.sub(replace, routepath)
103 103 return (
104 104 route.name,
105 105 routepath,
106 106 [(arg[0].split(':')[0] if arg[0] != '' else arg[1])
107 107 for arg in self._argument_prog.findall(route.routepath)]
108 108 )
109 109
110 110 def jsroutes(self):
111 111 """
112 112 Return a list of pyroutes.js compatible routes
113 113 """
114 114 for route_name in self._jsroutes:
115 115 yield self._extract_route_information(self._routenames[route_name])
116 116
117 117
118 118 def make_map(config):
119 119 """Create, configure and return the routes Mapper"""
120 120 rmap = JSRoutesMapper(
121 121 directory=config['pylons.paths']['controllers'],
122 122 always_scan=config['debug'])
123 123 rmap.minimization = False
124 124 rmap.explicit = False
125 125
126 126 from rhodecode.lib.utils2 import str2bool
127 127 from rhodecode.model import repo, repo_group
128 128
129 129 def check_repo(environ, match_dict):
130 130 """
131 131 check for valid repository for proper 404 handling
132 132
133 133 :param environ:
134 134 :param match_dict:
135 135 """
136 136 repo_name = match_dict.get('repo_name')
137 137
138 138 if match_dict.get('f_path'):
139 139 # fix for multiple initial slashes that causes errors
140 140 match_dict['f_path'] = match_dict['f_path'].lstrip('/')
141 141 repo_model = repo.RepoModel()
142 142 by_name_match = repo_model.get_by_repo_name(repo_name)
143 143 # if we match quickly from database, short circuit the operation,
144 144 # and validate repo based on the type.
145 145 if by_name_match:
146 146 return True
147 147
148 148 by_id_match = repo_model.get_repo_by_id(repo_name)
149 149 if by_id_match:
150 150 repo_name = by_id_match.repo_name
151 151 match_dict['repo_name'] = repo_name
152 152 return True
153 153
154 154 return False
155 155
156 156 def check_group(environ, match_dict):
157 157 """
158 158 check for valid repository group path for proper 404 handling
159 159
160 160 :param environ:
161 161 :param match_dict:
162 162 """
163 163 repo_group_name = match_dict.get('group_name')
164 164 repo_group_model = repo_group.RepoGroupModel()
165 165 by_name_match = repo_group_model.get_by_group_name(repo_group_name)
166 166 if by_name_match:
167 167 return True
168 168
169 169 return False
170 170
171 171 def check_user_group(environ, match_dict):
172 172 """
173 173 check for valid user group for proper 404 handling
174 174
175 175 :param environ:
176 176 :param match_dict:
177 177 """
178 178 return True
179 179
180 180 def check_int(environ, match_dict):
181 181 return match_dict.get('id').isdigit()
182 182
183 183
184 184 #==========================================================================
185 185 # CUSTOM ROUTES HERE
186 186 #==========================================================================
187 187
188 188 # ping and pylons error test
189 189 rmap.connect('ping', '%s/ping' % (ADMIN_PREFIX,), controller='home', action='ping')
190 190 rmap.connect('error_test', '%s/error_test' % (ADMIN_PREFIX,), controller='home', action='error_test')
191 191
192 192 # ADMIN REPOSITORY ROUTES
193 193 with rmap.submapper(path_prefix=ADMIN_PREFIX,
194 194 controller='admin/repos') as m:
195 195 m.connect('repos', '/repos',
196 196 action='create', conditions={'method': ['POST']})
197 197 m.connect('repos', '/repos',
198 198 action='index', conditions={'method': ['GET']})
199 199 m.connect('new_repo', '/create_repository', jsroute=True,
200 200 action='create_repository', conditions={'method': ['GET']})
201 201 m.connect('delete_repo', '/repos/{repo_name}',
202 202 action='delete', conditions={'method': ['DELETE']},
203 203 requirements=URL_NAME_REQUIREMENTS)
204 204 m.connect('repo', '/repos/{repo_name}',
205 205 action='show', conditions={'method': ['GET'],
206 206 'function': check_repo},
207 207 requirements=URL_NAME_REQUIREMENTS)
208 208
209 209 # ADMIN REPOSITORY GROUPS ROUTES
210 210 with rmap.submapper(path_prefix=ADMIN_PREFIX,
211 211 controller='admin/repo_groups') as m:
212 212 m.connect('repo_groups', '/repo_groups',
213 213 action='create', conditions={'method': ['POST']})
214 214 m.connect('repo_groups', '/repo_groups',
215 215 action='index', conditions={'method': ['GET']})
216 216 m.connect('new_repo_group', '/repo_groups/new',
217 217 action='new', conditions={'method': ['GET']})
218 218 m.connect('update_repo_group', '/repo_groups/{group_name}',
219 219 action='update', conditions={'method': ['PUT'],
220 220 'function': check_group},
221 221 requirements=URL_NAME_REQUIREMENTS)
222 222
223 223 # EXTRAS REPO GROUP ROUTES
224 224 m.connect('edit_repo_group', '/repo_groups/{group_name}/edit',
225 225 action='edit',
226 226 conditions={'method': ['GET'], 'function': check_group},
227 227 requirements=URL_NAME_REQUIREMENTS)
228 228 m.connect('edit_repo_group', '/repo_groups/{group_name}/edit',
229 229 action='edit',
230 230 conditions={'method': ['PUT'], 'function': check_group},
231 231 requirements=URL_NAME_REQUIREMENTS)
232 232
233 233 m.connect('edit_repo_group_advanced', '/repo_groups/{group_name}/edit/advanced',
234 234 action='edit_repo_group_advanced',
235 235 conditions={'method': ['GET'], 'function': check_group},
236 236 requirements=URL_NAME_REQUIREMENTS)
237 237 m.connect('edit_repo_group_advanced', '/repo_groups/{group_name}/edit/advanced',
238 238 action='edit_repo_group_advanced',
239 239 conditions={'method': ['PUT'], 'function': check_group},
240 240 requirements=URL_NAME_REQUIREMENTS)
241 241
242 242 m.connect('edit_repo_group_perms', '/repo_groups/{group_name}/edit/permissions',
243 243 action='edit_repo_group_perms',
244 244 conditions={'method': ['GET'], 'function': check_group},
245 245 requirements=URL_NAME_REQUIREMENTS)
246 246 m.connect('edit_repo_group_perms', '/repo_groups/{group_name}/edit/permissions',
247 247 action='update_perms',
248 248 conditions={'method': ['PUT'], 'function': check_group},
249 249 requirements=URL_NAME_REQUIREMENTS)
250 250
251 251 m.connect('delete_repo_group', '/repo_groups/{group_name}',
252 252 action='delete', conditions={'method': ['DELETE'],
253 253 'function': check_group},
254 254 requirements=URL_NAME_REQUIREMENTS)
255 255
256 256 # ADMIN USER ROUTES
257 257 with rmap.submapper(path_prefix=ADMIN_PREFIX,
258 258 controller='admin/users') as m:
259 259 m.connect('users', '/users',
260 260 action='create', conditions={'method': ['POST']})
261 261 m.connect('new_user', '/users/new',
262 262 action='new', conditions={'method': ['GET']})
263 263 m.connect('update_user', '/users/{user_id}',
264 264 action='update', conditions={'method': ['PUT']})
265 265 m.connect('delete_user', '/users/{user_id}',
266 266 action='delete', conditions={'method': ['DELETE']})
267 267 m.connect('edit_user', '/users/{user_id}/edit',
268 268 action='edit', conditions={'method': ['GET']}, jsroute=True)
269 269 m.connect('user', '/users/{user_id}',
270 270 action='show', conditions={'method': ['GET']})
271 271 m.connect('force_password_reset_user', '/users/{user_id}/password_reset',
272 272 action='reset_password', conditions={'method': ['POST']})
273 273 m.connect('create_personal_repo_group', '/users/{user_id}/create_repo_group',
274 274 action='create_personal_repo_group', conditions={'method': ['POST']})
275 275
276 276 # EXTRAS USER ROUTES
277 277 m.connect('edit_user_advanced', '/users/{user_id}/edit/advanced',
278 278 action='edit_advanced', conditions={'method': ['GET']})
279 279 m.connect('edit_user_advanced', '/users/{user_id}/edit/advanced',
280 280 action='update_advanced', conditions={'method': ['PUT']})
281 281
282 282 m.connect('edit_user_global_perms', '/users/{user_id}/edit/global_permissions',
283 283 action='edit_global_perms', conditions={'method': ['GET']})
284 284 m.connect('edit_user_global_perms', '/users/{user_id}/edit/global_permissions',
285 285 action='update_global_perms', conditions={'method': ['PUT']})
286 286
287 287 m.connect('edit_user_perms_summary', '/users/{user_id}/edit/permissions_summary',
288 288 action='edit_perms_summary', conditions={'method': ['GET']})
289 289
290 290
291 291 # ADMIN USER GROUPS REST ROUTES
292 292 with rmap.submapper(path_prefix=ADMIN_PREFIX,
293 293 controller='admin/user_groups') as m:
294 294 m.connect('users_groups', '/user_groups',
295 295 action='create', conditions={'method': ['POST']})
296 296 m.connect('users_groups', '/user_groups',
297 297 action='index', conditions={'method': ['GET']})
298 298 m.connect('new_users_group', '/user_groups/new',
299 299 action='new', conditions={'method': ['GET']})
300 300 m.connect('update_users_group', '/user_groups/{user_group_id}',
301 301 action='update', conditions={'method': ['PUT']})
302 302 m.connect('delete_users_group', '/user_groups/{user_group_id}',
303 303 action='delete', conditions={'method': ['DELETE']})
304 304 m.connect('edit_users_group', '/user_groups/{user_group_id}/edit',
305 305 action='edit', conditions={'method': ['GET']},
306 306 function=check_user_group)
307 307
308 308 # EXTRAS USER GROUP ROUTES
309 309 m.connect('edit_user_group_global_perms',
310 310 '/user_groups/{user_group_id}/edit/global_permissions',
311 311 action='edit_global_perms', conditions={'method': ['GET']})
312 312 m.connect('edit_user_group_global_perms',
313 313 '/user_groups/{user_group_id}/edit/global_permissions',
314 314 action='update_global_perms', conditions={'method': ['PUT']})
315 315 m.connect('edit_user_group_perms_summary',
316 316 '/user_groups/{user_group_id}/edit/permissions_summary',
317 317 action='edit_perms_summary', conditions={'method': ['GET']})
318 318
319 319 m.connect('edit_user_group_perms',
320 320 '/user_groups/{user_group_id}/edit/permissions',
321 321 action='edit_perms', conditions={'method': ['GET']})
322 322 m.connect('edit_user_group_perms',
323 323 '/user_groups/{user_group_id}/edit/permissions',
324 324 action='update_perms', conditions={'method': ['PUT']})
325 325
326 326 m.connect('edit_user_group_advanced',
327 327 '/user_groups/{user_group_id}/edit/advanced',
328 328 action='edit_advanced', conditions={'method': ['GET']})
329 329
330 330 m.connect('edit_user_group_advanced_sync',
331 331 '/user_groups/{user_group_id}/edit/advanced/sync',
332 332 action='edit_advanced_set_synchronization', conditions={'method': ['POST']})
333 333
334 334 m.connect('edit_user_group_members',
335 335 '/user_groups/{user_group_id}/edit/members', jsroute=True,
336 336 action='user_group_members', conditions={'method': ['GET']})
337 337
338 338 # ADMIN PERMISSIONS ROUTES
339 339 with rmap.submapper(path_prefix=ADMIN_PREFIX,
340 340 controller='admin/permissions') as m:
341 341 m.connect('admin_permissions_application', '/permissions/application',
342 342 action='permission_application_update', conditions={'method': ['POST']})
343 343 m.connect('admin_permissions_application', '/permissions/application',
344 344 action='permission_application', conditions={'method': ['GET']})
345 345
346 346 m.connect('admin_permissions_global', '/permissions/global',
347 347 action='permission_global_update', conditions={'method': ['POST']})
348 348 m.connect('admin_permissions_global', '/permissions/global',
349 349 action='permission_global', conditions={'method': ['GET']})
350 350
351 351 m.connect('admin_permissions_object', '/permissions/object',
352 352 action='permission_objects_update', conditions={'method': ['POST']})
353 353 m.connect('admin_permissions_object', '/permissions/object',
354 354 action='permission_objects', conditions={'method': ['GET']})
355 355
356 356 m.connect('admin_permissions_ips', '/permissions/ips',
357 357 action='permission_ips', conditions={'method': ['POST']})
358 358 m.connect('admin_permissions_ips', '/permissions/ips',
359 359 action='permission_ips', conditions={'method': ['GET']})
360 360
361 361 m.connect('admin_permissions_overview', '/permissions/overview',
362 362 action='permission_perms', conditions={'method': ['GET']})
363 363
364 364 # ADMIN DEFAULTS REST ROUTES
365 365 with rmap.submapper(path_prefix=ADMIN_PREFIX,
366 366 controller='admin/defaults') as m:
367 367 m.connect('admin_defaults_repositories', '/defaults/repositories',
368 368 action='update_repository_defaults', conditions={'method': ['POST']})
369 369 m.connect('admin_defaults_repositories', '/defaults/repositories',
370 370 action='index', conditions={'method': ['GET']})
371 371
372 372 # ADMIN DEBUG STYLE ROUTES
373 373 if str2bool(config.get('debug_style')):
374 374 with rmap.submapper(path_prefix=ADMIN_PREFIX + '/debug_style',
375 375 controller='debug_style') as m:
376 376 m.connect('debug_style_home', '',
377 377 action='index', conditions={'method': ['GET']})
378 378 m.connect('debug_style_template', '/t/{t_path}',
379 379 action='template', conditions={'method': ['GET']})
380 380
381 381 # ADMIN SETTINGS ROUTES
382 382 with rmap.submapper(path_prefix=ADMIN_PREFIX,
383 383 controller='admin/settings') as m:
384 384
385 385 # default
386 386 m.connect('admin_settings', '/settings',
387 387 action='settings_global_update',
388 388 conditions={'method': ['POST']})
389 389 m.connect('admin_settings', '/settings',
390 390 action='settings_global', conditions={'method': ['GET']})
391 391
392 392 m.connect('admin_settings_vcs', '/settings/vcs',
393 393 action='settings_vcs_update',
394 394 conditions={'method': ['POST']})
395 395 m.connect('admin_settings_vcs', '/settings/vcs',
396 396 action='settings_vcs',
397 397 conditions={'method': ['GET']})
398 398 m.connect('admin_settings_vcs', '/settings/vcs',
399 399 action='delete_svn_pattern',
400 400 conditions={'method': ['DELETE']})
401 401
402 402 m.connect('admin_settings_mapping', '/settings/mapping',
403 403 action='settings_mapping_update',
404 404 conditions={'method': ['POST']})
405 405 m.connect('admin_settings_mapping', '/settings/mapping',
406 406 action='settings_mapping', conditions={'method': ['GET']})
407 407
408 408 m.connect('admin_settings_global', '/settings/global',
409 409 action='settings_global_update',
410 410 conditions={'method': ['POST']})
411 411 m.connect('admin_settings_global', '/settings/global',
412 412 action='settings_global', conditions={'method': ['GET']})
413 413
414 414 m.connect('admin_settings_visual', '/settings/visual',
415 415 action='settings_visual_update',
416 416 conditions={'method': ['POST']})
417 417 m.connect('admin_settings_visual', '/settings/visual',
418 418 action='settings_visual', conditions={'method': ['GET']})
419 419
420 420 m.connect('admin_settings_issuetracker',
421 421 '/settings/issue-tracker', action='settings_issuetracker',
422 422 conditions={'method': ['GET']})
423 423 m.connect('admin_settings_issuetracker_save',
424 424 '/settings/issue-tracker/save',
425 425 action='settings_issuetracker_save',
426 426 conditions={'method': ['POST']})
427 427 m.connect('admin_issuetracker_test', '/settings/issue-tracker/test',
428 428 action='settings_issuetracker_test',
429 429 conditions={'method': ['POST']})
430 430 m.connect('admin_issuetracker_delete',
431 431 '/settings/issue-tracker/delete',
432 432 action='settings_issuetracker_delete',
433 433 conditions={'method': ['DELETE']})
434 434
435 435 m.connect('admin_settings_email', '/settings/email',
436 436 action='settings_email_update',
437 437 conditions={'method': ['POST']})
438 438 m.connect('admin_settings_email', '/settings/email',
439 439 action='settings_email', conditions={'method': ['GET']})
440 440
441 441 m.connect('admin_settings_hooks', '/settings/hooks',
442 442 action='settings_hooks_update',
443 443 conditions={'method': ['POST', 'DELETE']})
444 444 m.connect('admin_settings_hooks', '/settings/hooks',
445 445 action='settings_hooks', conditions={'method': ['GET']})
446 446
447 447 m.connect('admin_settings_search', '/settings/search',
448 448 action='settings_search', conditions={'method': ['GET']})
449 449
450 450 m.connect('admin_settings_supervisor', '/settings/supervisor',
451 451 action='settings_supervisor', conditions={'method': ['GET']})
452 452 m.connect('admin_settings_supervisor_log', '/settings/supervisor/{procid}/log',
453 453 action='settings_supervisor_log', conditions={'method': ['GET']})
454 454
455 455 m.connect('admin_settings_labs', '/settings/labs',
456 456 action='settings_labs_update',
457 457 conditions={'method': ['POST']})
458 458 m.connect('admin_settings_labs', '/settings/labs',
459 459 action='settings_labs', conditions={'method': ['GET']})
460 460
461 461 # ADMIN MY ACCOUNT
462 462 with rmap.submapper(path_prefix=ADMIN_PREFIX,
463 463 controller='admin/my_account') as m:
464 464
465 465 m.connect('my_account_edit', '/my_account/edit',
466 466 action='my_account_edit', conditions={'method': ['GET']})
467 467 m.connect('my_account', '/my_account/update',
468 468 action='my_account_update', conditions={'method': ['POST']})
469 469
470 470 # NOTE(marcink): this needs to be kept for password force flag to be
471 471 # handler, remove after migration to pyramid
472 472 m.connect('my_account_password', '/my_account/password',
473 473 action='my_account_password', conditions={'method': ['GET']})
474 474
475 475 m.connect('my_account_pullrequests', '/my_account/pull_requests',
476 476 action='my_account_pullrequests', conditions={'method': ['GET']})
477 477
478 478 # NOTIFICATION REST ROUTES
479 479 with rmap.submapper(path_prefix=ADMIN_PREFIX,
480 480 controller='admin/notifications') as m:
481 481 m.connect('notifications', '/notifications',
482 482 action='index', conditions={'method': ['GET']})
483 483 m.connect('notifications_mark_all_read', '/notifications/mark_all_read',
484 484 action='mark_all_read', conditions={'method': ['POST']})
485 485 m.connect('/notifications/{notification_id}',
486 486 action='update', conditions={'method': ['PUT']})
487 487 m.connect('/notifications/{notification_id}',
488 488 action='delete', conditions={'method': ['DELETE']})
489 489 m.connect('notification', '/notifications/{notification_id}',
490 490 action='show', conditions={'method': ['GET']})
491 491
492 # ADMIN GIST
493 with rmap.submapper(path_prefix=ADMIN_PREFIX,
494 controller='admin/gists') as m:
495 m.connect('gists', '/gists',
496 action='create', conditions={'method': ['POST']})
497 m.connect('gists', '/gists', jsroute=True,
498 action='index', conditions={'method': ['GET']})
499 m.connect('new_gist', '/gists/new', jsroute=True,
500 action='new', conditions={'method': ['GET']})
501
502 m.connect('/gists/{gist_id}',
503 action='delete', conditions={'method': ['DELETE']})
504 m.connect('edit_gist', '/gists/{gist_id}/edit',
505 action='edit_form', conditions={'method': ['GET']})
506 m.connect('edit_gist', '/gists/{gist_id}/edit',
507 action='edit', conditions={'method': ['POST']})
508 m.connect(
509 'edit_gist_check_revision', '/gists/{gist_id}/edit/check_revision',
510 action='check_revision', conditions={'method': ['GET']})
511
512 m.connect('gist', '/gists/{gist_id}',
513 action='show', conditions={'method': ['GET']})
514 m.connect('gist_rev', '/gists/{gist_id}/{revision}',
515 revision='tip',
516 action='show', conditions={'method': ['GET']})
517 m.connect('formatted_gist', '/gists/{gist_id}/{revision}/{format}',
518 revision='tip',
519 action='show', conditions={'method': ['GET']})
520 m.connect('formatted_gist_file', '/gists/{gist_id}/{revision}/{format}/{f_path}',
521 revision='tip',
522 action='show', conditions={'method': ['GET']},
523 requirements=URL_NAME_REQUIREMENTS)
524
525 492 # USER JOURNAL
526 493 rmap.connect('journal', '%s/journal' % (ADMIN_PREFIX,),
527 494 controller='journal', action='index')
528 495 rmap.connect('journal_rss', '%s/journal/rss' % (ADMIN_PREFIX,),
529 496 controller='journal', action='journal_rss')
530 497 rmap.connect('journal_atom', '%s/journal/atom' % (ADMIN_PREFIX,),
531 498 controller='journal', action='journal_atom')
532 499
533 500 rmap.connect('public_journal', '%s/public_journal' % (ADMIN_PREFIX,),
534 501 controller='journal', action='public_journal')
535 502
536 503 rmap.connect('public_journal_rss', '%s/public_journal/rss' % (ADMIN_PREFIX,),
537 504 controller='journal', action='public_journal_rss')
538 505
539 506 rmap.connect('public_journal_rss_old', '%s/public_journal_rss' % (ADMIN_PREFIX,),
540 507 controller='journal', action='public_journal_rss')
541 508
542 509 rmap.connect('public_journal_atom',
543 510 '%s/public_journal/atom' % (ADMIN_PREFIX,), controller='journal',
544 511 action='public_journal_atom')
545 512
546 513 rmap.connect('public_journal_atom_old',
547 514 '%s/public_journal_atom' % (ADMIN_PREFIX,), controller='journal',
548 515 action='public_journal_atom')
549 516
550 517 rmap.connect('toggle_following', '%s/toggle_following' % (ADMIN_PREFIX,),
551 518 controller='journal', action='toggle_following', jsroute=True,
552 519 conditions={'method': ['POST']})
553 520
554 521 # FEEDS
555 522 rmap.connect('rss_feed_home', '/{repo_name}/feed/rss',
556 523 controller='feed', action='rss',
557 524 conditions={'function': check_repo},
558 525 requirements=URL_NAME_REQUIREMENTS)
559 526
560 527 rmap.connect('atom_feed_home', '/{repo_name}/feed/atom',
561 528 controller='feed', action='atom',
562 529 conditions={'function': check_repo},
563 530 requirements=URL_NAME_REQUIREMENTS)
564 531
565 532 #==========================================================================
566 533 # REPOSITORY ROUTES
567 534 #==========================================================================
568 535
569 536 rmap.connect('repo_creating_home', '/{repo_name}/repo_creating',
570 537 controller='admin/repos', action='repo_creating',
571 538 requirements=URL_NAME_REQUIREMENTS)
572 539 rmap.connect('repo_check_home', '/{repo_name}/crepo_check',
573 540 controller='admin/repos', action='repo_check',
574 541 requirements=URL_NAME_REQUIREMENTS)
575 542
576 543 rmap.connect('changeset_home', '/{repo_name}/changeset/{revision}',
577 544 controller='changeset', revision='tip',
578 545 conditions={'function': check_repo},
579 546 requirements=URL_NAME_REQUIREMENTS, jsroute=True)
580 547 rmap.connect('changeset_children', '/{repo_name}/changeset_children/{revision}',
581 548 controller='changeset', revision='tip', action='changeset_children',
582 549 conditions={'function': check_repo},
583 550 requirements=URL_NAME_REQUIREMENTS)
584 551 rmap.connect('changeset_parents', '/{repo_name}/changeset_parents/{revision}',
585 552 controller='changeset', revision='tip', action='changeset_parents',
586 553 conditions={'function': check_repo},
587 554 requirements=URL_NAME_REQUIREMENTS)
588 555
589 556 # repo edit options
590 557 rmap.connect('edit_repo_fields', '/{repo_name}/settings/fields',
591 558 controller='admin/repos', action='edit_fields',
592 559 conditions={'method': ['GET'], 'function': check_repo},
593 560 requirements=URL_NAME_REQUIREMENTS)
594 561 rmap.connect('create_repo_fields', '/{repo_name}/settings/fields/new',
595 562 controller='admin/repos', action='create_repo_field',
596 563 conditions={'method': ['PUT'], 'function': check_repo},
597 564 requirements=URL_NAME_REQUIREMENTS)
598 565 rmap.connect('delete_repo_fields', '/{repo_name}/settings/fields/{field_id}',
599 566 controller='admin/repos', action='delete_repo_field',
600 567 conditions={'method': ['DELETE'], 'function': check_repo},
601 568 requirements=URL_NAME_REQUIREMENTS)
602 569
603 570 rmap.connect('toggle_locking', '/{repo_name}/settings/advanced/locking_toggle',
604 571 controller='admin/repos', action='toggle_locking',
605 572 conditions={'method': ['GET'], 'function': check_repo},
606 573 requirements=URL_NAME_REQUIREMENTS)
607 574
608 575 rmap.connect('edit_repo_remote', '/{repo_name}/settings/remote',
609 576 controller='admin/repos', action='edit_remote_form',
610 577 conditions={'method': ['GET'], 'function': check_repo},
611 578 requirements=URL_NAME_REQUIREMENTS)
612 579 rmap.connect('edit_repo_remote', '/{repo_name}/settings/remote',
613 580 controller='admin/repos', action='edit_remote',
614 581 conditions={'method': ['PUT'], 'function': check_repo},
615 582 requirements=URL_NAME_REQUIREMENTS)
616 583
617 584 rmap.connect('edit_repo_statistics', '/{repo_name}/settings/statistics',
618 585 controller='admin/repos', action='edit_statistics_form',
619 586 conditions={'method': ['GET'], 'function': check_repo},
620 587 requirements=URL_NAME_REQUIREMENTS)
621 588 rmap.connect('edit_repo_statistics', '/{repo_name}/settings/statistics',
622 589 controller='admin/repos', action='edit_statistics',
623 590 conditions={'method': ['PUT'], 'function': check_repo},
624 591 requirements=URL_NAME_REQUIREMENTS)
625 592 rmap.connect('repo_settings_issuetracker',
626 593 '/{repo_name}/settings/issue-tracker',
627 594 controller='admin/repos', action='repo_issuetracker',
628 595 conditions={'method': ['GET'], 'function': check_repo},
629 596 requirements=URL_NAME_REQUIREMENTS)
630 597 rmap.connect('repo_issuetracker_test',
631 598 '/{repo_name}/settings/issue-tracker/test',
632 599 controller='admin/repos', action='repo_issuetracker_test',
633 600 conditions={'method': ['POST'], 'function': check_repo},
634 601 requirements=URL_NAME_REQUIREMENTS)
635 602 rmap.connect('repo_issuetracker_delete',
636 603 '/{repo_name}/settings/issue-tracker/delete',
637 604 controller='admin/repos', action='repo_issuetracker_delete',
638 605 conditions={'method': ['DELETE'], 'function': check_repo},
639 606 requirements=URL_NAME_REQUIREMENTS)
640 607 rmap.connect('repo_issuetracker_save',
641 608 '/{repo_name}/settings/issue-tracker/save',
642 609 controller='admin/repos', action='repo_issuetracker_save',
643 610 conditions={'method': ['POST'], 'function': check_repo},
644 611 requirements=URL_NAME_REQUIREMENTS)
645 612 rmap.connect('repo_vcs_settings', '/{repo_name}/settings/vcs',
646 613 controller='admin/repos', action='repo_settings_vcs_update',
647 614 conditions={'method': ['POST'], 'function': check_repo},
648 615 requirements=URL_NAME_REQUIREMENTS)
649 616 rmap.connect('repo_vcs_settings', '/{repo_name}/settings/vcs',
650 617 controller='admin/repos', action='repo_settings_vcs',
651 618 conditions={'method': ['GET'], 'function': check_repo},
652 619 requirements=URL_NAME_REQUIREMENTS)
653 620 rmap.connect('repo_vcs_settings', '/{repo_name}/settings/vcs',
654 621 controller='admin/repos', action='repo_delete_svn_pattern',
655 622 conditions={'method': ['DELETE'], 'function': check_repo},
656 623 requirements=URL_NAME_REQUIREMENTS)
657 624 rmap.connect('repo_pullrequest_settings', '/{repo_name}/settings/pullrequest',
658 625 controller='admin/repos', action='repo_settings_pullrequest',
659 626 conditions={'method': ['GET', 'POST'], 'function': check_repo},
660 627 requirements=URL_NAME_REQUIREMENTS)
661 628
662 629 # still working url for backward compat.
663 630 rmap.connect('raw_changeset_home_depraced',
664 631 '/{repo_name}/raw-changeset/{revision}',
665 632 controller='changeset', action='changeset_raw',
666 633 revision='tip', conditions={'function': check_repo},
667 634 requirements=URL_NAME_REQUIREMENTS)
668 635
669 636 # new URLs
670 637 rmap.connect('changeset_raw_home',
671 638 '/{repo_name}/changeset-diff/{revision}',
672 639 controller='changeset', action='changeset_raw',
673 640 revision='tip', conditions={'function': check_repo},
674 641 requirements=URL_NAME_REQUIREMENTS)
675 642
676 643 rmap.connect('changeset_patch_home',
677 644 '/{repo_name}/changeset-patch/{revision}',
678 645 controller='changeset', action='changeset_patch',
679 646 revision='tip', conditions={'function': check_repo},
680 647 requirements=URL_NAME_REQUIREMENTS)
681 648
682 649 rmap.connect('changeset_download_home',
683 650 '/{repo_name}/changeset-download/{revision}',
684 651 controller='changeset', action='changeset_download',
685 652 revision='tip', conditions={'function': check_repo},
686 653 requirements=URL_NAME_REQUIREMENTS)
687 654
688 655 rmap.connect('changeset_comment',
689 656 '/{repo_name}/changeset/{revision}/comment', jsroute=True,
690 657 controller='changeset', revision='tip', action='comment',
691 658 conditions={'function': check_repo},
692 659 requirements=URL_NAME_REQUIREMENTS)
693 660
694 661 rmap.connect('changeset_comment_preview',
695 662 '/{repo_name}/changeset/comment/preview', jsroute=True,
696 663 controller='changeset', action='preview_comment',
697 664 conditions={'function': check_repo, 'method': ['POST']},
698 665 requirements=URL_NAME_REQUIREMENTS)
699 666
700 667 rmap.connect('changeset_comment_delete',
701 668 '/{repo_name}/changeset/comment/{comment_id}/delete',
702 669 controller='changeset', action='delete_comment',
703 670 conditions={'function': check_repo, 'method': ['DELETE']},
704 671 requirements=URL_NAME_REQUIREMENTS, jsroute=True)
705 672
706 673 rmap.connect('changeset_info', '/{repo_name}/changeset_info/{revision}',
707 674 controller='changeset', action='changeset_info',
708 675 requirements=URL_NAME_REQUIREMENTS, jsroute=True)
709 676
710 677 rmap.connect('compare_home',
711 678 '/{repo_name}/compare',
712 679 controller='compare', action='index',
713 680 conditions={'function': check_repo},
714 681 requirements=URL_NAME_REQUIREMENTS)
715 682
716 683 rmap.connect('compare_url',
717 684 '/{repo_name}/compare/{source_ref_type}@{source_ref:.*?}...{target_ref_type}@{target_ref:.*?}',
718 685 controller='compare', action='compare',
719 686 conditions={'function': check_repo},
720 687 requirements=URL_NAME_REQUIREMENTS, jsroute=True)
721 688
722 689 rmap.connect('pullrequest_home',
723 690 '/{repo_name}/pull-request/new', controller='pullrequests',
724 691 action='index', conditions={'function': check_repo,
725 692 'method': ['GET']},
726 693 requirements=URL_NAME_REQUIREMENTS, jsroute=True)
727 694
728 695 rmap.connect('pullrequest',
729 696 '/{repo_name}/pull-request/new', controller='pullrequests',
730 697 action='create', conditions={'function': check_repo,
731 698 'method': ['POST']},
732 699 requirements=URL_NAME_REQUIREMENTS, jsroute=True)
733 700
734 701 rmap.connect('pullrequest_repo_refs',
735 702 '/{repo_name}/pull-request/refs/{target_repo_name:.*?[^/]}',
736 703 controller='pullrequests',
737 704 action='get_repo_refs',
738 705 conditions={'function': check_repo, 'method': ['GET']},
739 706 requirements=URL_NAME_REQUIREMENTS, jsroute=True)
740 707
741 708 rmap.connect('pullrequest_repo_destinations',
742 709 '/{repo_name}/pull-request/repo-destinations',
743 710 controller='pullrequests',
744 711 action='get_repo_destinations',
745 712 conditions={'function': check_repo, 'method': ['GET']},
746 713 requirements=URL_NAME_REQUIREMENTS, jsroute=True)
747 714
748 715 rmap.connect('pullrequest_show',
749 716 '/{repo_name}/pull-request/{pull_request_id}',
750 717 controller='pullrequests',
751 718 action='show', conditions={'function': check_repo,
752 719 'method': ['GET']},
753 720 requirements=URL_NAME_REQUIREMENTS, jsroute=True)
754 721
755 722 rmap.connect('pullrequest_update',
756 723 '/{repo_name}/pull-request/{pull_request_id}',
757 724 controller='pullrequests',
758 725 action='update', conditions={'function': check_repo,
759 726 'method': ['PUT']},
760 727 requirements=URL_NAME_REQUIREMENTS, jsroute=True)
761 728
762 729 rmap.connect('pullrequest_merge',
763 730 '/{repo_name}/pull-request/{pull_request_id}',
764 731 controller='pullrequests',
765 732 action='merge', conditions={'function': check_repo,
766 733 'method': ['POST']},
767 734 requirements=URL_NAME_REQUIREMENTS)
768 735
769 736 rmap.connect('pullrequest_delete',
770 737 '/{repo_name}/pull-request/{pull_request_id}',
771 738 controller='pullrequests',
772 739 action='delete', conditions={'function': check_repo,
773 740 'method': ['DELETE']},
774 741 requirements=URL_NAME_REQUIREMENTS)
775 742
776 743 rmap.connect('pullrequest_comment',
777 744 '/{repo_name}/pull-request-comment/{pull_request_id}',
778 745 controller='pullrequests',
779 746 action='comment', conditions={'function': check_repo,
780 747 'method': ['POST']},
781 748 requirements=URL_NAME_REQUIREMENTS, jsroute=True)
782 749
783 750 rmap.connect('pullrequest_comment_delete',
784 751 '/{repo_name}/pull-request-comment/{comment_id}/delete',
785 752 controller='pullrequests', action='delete_comment',
786 753 conditions={'function': check_repo, 'method': ['DELETE']},
787 754 requirements=URL_NAME_REQUIREMENTS, jsroute=True)
788 755
789 756 rmap.connect('changelog_home', '/{repo_name}/changelog', jsroute=True,
790 757 controller='changelog', conditions={'function': check_repo},
791 758 requirements=URL_NAME_REQUIREMENTS)
792 759
793 760 rmap.connect('changelog_file_home',
794 761 '/{repo_name}/changelog/{revision}/{f_path}',
795 762 controller='changelog', f_path=None,
796 763 conditions={'function': check_repo},
797 764 requirements=URL_NAME_REQUIREMENTS, jsroute=True)
798 765
799 766 rmap.connect('changelog_elements', '/{repo_name}/changelog_details',
800 767 controller='changelog', action='changelog_elements',
801 768 conditions={'function': check_repo},
802 769 requirements=URL_NAME_REQUIREMENTS, jsroute=True)
803 770
804 771 rmap.connect('files_home', '/{repo_name}/files/{revision}/{f_path}',
805 772 controller='files', revision='tip', f_path='',
806 773 conditions={'function': check_repo},
807 774 requirements=URL_NAME_REQUIREMENTS, jsroute=True)
808 775
809 776 rmap.connect('files_home_simple_catchrev',
810 777 '/{repo_name}/files/{revision}',
811 778 controller='files', revision='tip', f_path='',
812 779 conditions={'function': check_repo},
813 780 requirements=URL_NAME_REQUIREMENTS)
814 781
815 782 rmap.connect('files_home_simple_catchall',
816 783 '/{repo_name}/files',
817 784 controller='files', revision='tip', f_path='',
818 785 conditions={'function': check_repo},
819 786 requirements=URL_NAME_REQUIREMENTS)
820 787
821 788 rmap.connect('files_history_home',
822 789 '/{repo_name}/history/{revision}/{f_path}',
823 790 controller='files', action='history', revision='tip', f_path='',
824 791 conditions={'function': check_repo},
825 792 requirements=URL_NAME_REQUIREMENTS, jsroute=True)
826 793
827 794 rmap.connect('files_authors_home',
828 795 '/{repo_name}/authors/{revision}/{f_path}',
829 796 controller='files', action='authors', revision='tip', f_path='',
830 797 conditions={'function': check_repo},
831 798 requirements=URL_NAME_REQUIREMENTS, jsroute=True)
832 799
833 800 rmap.connect('files_diff_home', '/{repo_name}/diff/{f_path}',
834 801 controller='files', action='diff', f_path='',
835 802 conditions={'function': check_repo},
836 803 requirements=URL_NAME_REQUIREMENTS)
837 804
838 805 rmap.connect('files_diff_2way_home',
839 806 '/{repo_name}/diff-2way/{f_path}',
840 807 controller='files', action='diff_2way', f_path='',
841 808 conditions={'function': check_repo},
842 809 requirements=URL_NAME_REQUIREMENTS)
843 810
844 811 rmap.connect('files_rawfile_home',
845 812 '/{repo_name}/rawfile/{revision}/{f_path}',
846 813 controller='files', action='rawfile', revision='tip',
847 814 f_path='', conditions={'function': check_repo},
848 815 requirements=URL_NAME_REQUIREMENTS)
849 816
850 817 rmap.connect('files_raw_home',
851 818 '/{repo_name}/raw/{revision}/{f_path}',
852 819 controller='files', action='raw', revision='tip', f_path='',
853 820 conditions={'function': check_repo},
854 821 requirements=URL_NAME_REQUIREMENTS)
855 822
856 823 rmap.connect('files_render_home',
857 824 '/{repo_name}/render/{revision}/{f_path}',
858 825 controller='files', action='index', revision='tip', f_path='',
859 826 rendered=True, conditions={'function': check_repo},
860 827 requirements=URL_NAME_REQUIREMENTS)
861 828
862 829 rmap.connect('files_annotate_home',
863 830 '/{repo_name}/annotate/{revision}/{f_path}',
864 831 controller='files', action='index', revision='tip',
865 832 f_path='', annotate=True, conditions={'function': check_repo},
866 833 requirements=URL_NAME_REQUIREMENTS, jsroute=True)
867 834
868 835 rmap.connect('files_annotate_previous',
869 836 '/{repo_name}/annotate-previous/{revision}/{f_path}',
870 837 controller='files', action='annotate_previous', revision='tip',
871 838 f_path='', annotate=True, conditions={'function': check_repo},
872 839 requirements=URL_NAME_REQUIREMENTS, jsroute=True)
873 840
874 841 rmap.connect('files_edit',
875 842 '/{repo_name}/edit/{revision}/{f_path}',
876 843 controller='files', action='edit', revision='tip',
877 844 f_path='',
878 845 conditions={'function': check_repo, 'method': ['POST']},
879 846 requirements=URL_NAME_REQUIREMENTS)
880 847
881 848 rmap.connect('files_edit_home',
882 849 '/{repo_name}/edit/{revision}/{f_path}',
883 850 controller='files', action='edit_home', revision='tip',
884 851 f_path='', conditions={'function': check_repo},
885 852 requirements=URL_NAME_REQUIREMENTS)
886 853
887 854 rmap.connect('files_add',
888 855 '/{repo_name}/add/{revision}/{f_path}',
889 856 controller='files', action='add', revision='tip',
890 857 f_path='',
891 858 conditions={'function': check_repo, 'method': ['POST']},
892 859 requirements=URL_NAME_REQUIREMENTS)
893 860
894 861 rmap.connect('files_add_home',
895 862 '/{repo_name}/add/{revision}/{f_path}',
896 863 controller='files', action='add_home', revision='tip',
897 864 f_path='', conditions={'function': check_repo},
898 865 requirements=URL_NAME_REQUIREMENTS)
899 866
900 867 rmap.connect('files_delete',
901 868 '/{repo_name}/delete/{revision}/{f_path}',
902 869 controller='files', action='delete', revision='tip',
903 870 f_path='',
904 871 conditions={'function': check_repo, 'method': ['POST']},
905 872 requirements=URL_NAME_REQUIREMENTS)
906 873
907 874 rmap.connect('files_delete_home',
908 875 '/{repo_name}/delete/{revision}/{f_path}',
909 876 controller='files', action='delete_home', revision='tip',
910 877 f_path='', conditions={'function': check_repo},
911 878 requirements=URL_NAME_REQUIREMENTS)
912 879
913 880 rmap.connect('files_archive_home', '/{repo_name}/archive/{fname}',
914 881 controller='files', action='archivefile',
915 882 conditions={'function': check_repo},
916 883 requirements=URL_NAME_REQUIREMENTS, jsroute=True)
917 884
918 885 rmap.connect('files_nodelist_home',
919 886 '/{repo_name}/nodelist/{revision}/{f_path}',
920 887 controller='files', action='nodelist',
921 888 conditions={'function': check_repo},
922 889 requirements=URL_NAME_REQUIREMENTS, jsroute=True)
923 890
924 891 rmap.connect('files_nodetree_full',
925 892 '/{repo_name}/nodetree_full/{commit_id}/{f_path}',
926 893 controller='files', action='nodetree_full',
927 894 conditions={'function': check_repo},
928 895 requirements=URL_NAME_REQUIREMENTS, jsroute=True)
929 896
930 897 rmap.connect('repo_fork_create_home', '/{repo_name}/fork',
931 898 controller='forks', action='fork_create',
932 899 conditions={'function': check_repo, 'method': ['POST']},
933 900 requirements=URL_NAME_REQUIREMENTS)
934 901
935 902 rmap.connect('repo_fork_home', '/{repo_name}/fork',
936 903 controller='forks', action='fork',
937 904 conditions={'function': check_repo},
938 905 requirements=URL_NAME_REQUIREMENTS)
939 906
940 907 rmap.connect('repo_forks_home', '/{repo_name}/forks',
941 908 controller='forks', action='forks',
942 909 conditions={'function': check_repo},
943 910 requirements=URL_NAME_REQUIREMENTS)
944 911
945 912 return rmap
@@ -1,151 +1,161 b''
1 1 # -*- coding: utf-8 -*-
2 2
3 3 # Copyright (C) 2010-2017 RhodeCode GmbH
4 4 #
5 5 # This program is free software: you can redistribute it and/or modify
6 6 # it under the terms of the GNU Affero General Public License, version 3
7 7 # (only), as published by the Free Software Foundation.
8 8 #
9 9 # This program is distributed in the hope that it will be useful,
10 10 # but WITHOUT ANY WARRANTY; without even the implied warranty of
11 11 # MERCHANTABILITY or FITNESS FOR A PARTICULAR PURPOSE. See the
12 12 # GNU General Public License for more details.
13 13 #
14 14 # You should have received a copy of the GNU Affero General Public License
15 15 # along with this program. If not, see <http://www.gnu.org/licenses/>.
16 16 #
17 17 # This program is dual-licensed. If you wish to learn more about the
18 18 # RhodeCode Enterprise Edition, including its added features, Support services,
19 19 # and proprietary license terms, please see https://rhodecode.com/licenses/
20 20
21 21 import logging
22 22 import textwrap
23 23
24 24 import routes.middleware
25 25 import urlobject
26 26 import webob
27 27 import webob.exc
28 28
29 29 import rhodecode.lib.auth
30 30
31 31
32 32 log = logging.getLogger(__name__)
33 33
34 34
35 35 class CSRFDetector(object):
36 36 """
37 37 Middleware for preventing CSRF.
38 38
39 39
40 40 It checks that all requests are either GET or POST.
41 41 For POST requests, it logs the requests that do not have a CSRF token.
42 42 Eventually it will raise an error.
43 43
44 44 It special cases some endpoints as they do not really require a token.
45 45
46 46 Note: this middleware is only intended for testing.
47 47 """
48 48
49 49 _PUT_DELETE_MESSAGE = textwrap.dedent('''
50 50 Do not call in tests app.delete or app.put, use instead
51 51 app.post(..., params={'_method': 'delete'}.
52 52
53 53 The reason is twofold. The first is because that's how the browser is
54 54 calling rhodecode and the second is because it allow us to detect
55 55 potential CSRF.''').strip()
56 56
57 57 _PATHS_WITHOUT_TOKEN = frozenset((
58 58 # The password is the token.
59 59 '/_admin/login',
60 60 # Captcha may be enabled.
61 61 '/_admin/password_reset',
62 62 # Captcha may be enabled.
63 63 '/_admin/password_reset_confirmation',
64 64 # Captcha may be enabled.
65 65 '/_admin/register',
66 66 # No change in state with this controller.
67 67 '/error/document',
68 68 ))
69 69
70 _SKIP_PATTERN = frozenset((
71 '/_admin/gists/',
72 ))
73
70 74 def __init__(self, app):
71 75 self._app = app
72 76
73 77 def __call__(self, environ, start_response):
74 78 if environ['REQUEST_METHOD'].upper() not in ('GET', 'POST'):
75 79 raise Exception(self._PUT_DELETE_MESSAGE)
80 token_expected = environ['PATH_INFO'] not in self._PATHS_WITHOUT_TOKEN
81 allowed = True
82 for pattern in self._SKIP_PATTERN:
83 if environ['PATH_INFO'].startswith(pattern):
84 allowed = False
85 break
76 86
77 87 if (environ['REQUEST_METHOD'] == 'POST' and
78 environ['PATH_INFO'] not in self._PATHS_WITHOUT_TOKEN and
88 token_expected and allowed and
79 89 routes.middleware.is_form_post(environ)):
80 90 body = environ['wsgi.input']
81 91 if body.seekable():
82 92 pos = body.tell()
83 93 content = body.read()
84 94 body.seek(pos)
85 95 elif hasattr(body, 'peek'):
86 96 content = body.peek()
87 97 else:
88 98 raise Exception("Cannot check if the request has a CSRF token")
89 99 if rhodecode.lib.auth.csrf_token_key not in content:
90 100 raise Exception(
91 101 '%s to %s does not have a csrf_token %r' %
92 102 (environ['REQUEST_METHOD'], environ['PATH_INFO'], content))
93 103
94 104 return self._app(environ, start_response)
95 105
96 106
97 107 def _get_scheme_host_port(url):
98 108 url = urlobject.URLObject(url)
99 109 if '://' not in url:
100 110 return None, url, None
101 111
102 112 scheme = url.scheme or 'http'
103 113 port = url.port
104 114 if not port:
105 115 if scheme == 'http':
106 116 port = 80
107 117 elif scheme == 'https':
108 118 port = 443
109 119 host = url.netloc.without_port()
110 120
111 121 return scheme, host, port
112 122
113 123
114 124 def _equivalent_urls(url1, url2):
115 125 """Check if both urls are equivalent."""
116 126 return _get_scheme_host_port(url1) == _get_scheme_host_port(url2)
117 127
118 128
119 129 class OriginChecker(object):
120 130 """
121 131 Check whether the request has a valid Origin header.
122 132
123 133 See https://wiki.mozilla.org/Security/Origin for details.
124 134 """
125 135
126 136 def __init__(self, app, expected_origin, skip_urls=None):
127 137 """
128 138 :param expected_origin: the value we expect to see for the Origin
129 139 header.
130 140 :param skip_urls: list of urls for which we do not need to check the
131 141 Origin header.
132 142 """
133 143 self._app = app
134 144 self._expected_origin = expected_origin
135 145 self._skip_urls = frozenset(skip_urls or [])
136 146
137 147 def __call__(self, environ, start_response):
138 148 origin_header = environ.get('HTTP_ORIGIN', '')
139 149 origin = origin_header.split(' ', 1)[0]
140 150 if origin == 'null':
141 151 origin = None
142 152
143 153 if (environ['PATH_INFO'] not in self._skip_urls and origin and
144 154 not _equivalent_urls(origin, self._expected_origin)):
145 155 log.warn(
146 156 'Invalid Origin header detected: got %s, expected %s',
147 157 origin_header, self._expected_origin)
148 158 return webob.exc.HTTPForbidden('Origin header mismatch')(
149 159 environ, start_response)
150 160 else:
151 161 return self._app(environ, start_response)
@@ -1,4123 +1,4117 b''
1 1 # -*- coding: utf-8 -*-
2 2
3 3 # Copyright (C) 2010-2017 RhodeCode GmbH
4 4 #
5 5 # This program is free software: you can redistribute it and/or modify
6 6 # it under the terms of the GNU Affero General Public License, version 3
7 7 # (only), as published by the Free Software Foundation.
8 8 #
9 9 # This program is distributed in the hope that it will be useful,
10 10 # but WITHOUT ANY WARRANTY; without even the implied warranty of
11 11 # MERCHANTABILITY or FITNESS FOR A PARTICULAR PURPOSE. See the
12 12 # GNU General Public License for more details.
13 13 #
14 14 # You should have received a copy of the GNU Affero General Public License
15 15 # along with this program. If not, see <http://www.gnu.org/licenses/>.
16 16 #
17 17 # This program is dual-licensed. If you wish to learn more about the
18 18 # RhodeCode Enterprise Edition, including its added features, Support services,
19 19 # and proprietary license terms, please see https://rhodecode.com/licenses/
20 20
21 21 """
22 22 Database Models for RhodeCode Enterprise
23 23 """
24 24
25 25 import re
26 26 import os
27 27 import time
28 28 import hashlib
29 29 import logging
30 30 import datetime
31 31 import warnings
32 32 import ipaddress
33 33 import functools
34 34 import traceback
35 35 import collections
36 36
37 37
38 38 from sqlalchemy import *
39 39 from sqlalchemy.ext.declarative import declared_attr
40 40 from sqlalchemy.ext.hybrid import hybrid_property
41 41 from sqlalchemy.orm import (
42 42 relationship, joinedload, class_mapper, validates, aliased)
43 43 from sqlalchemy.sql.expression import true
44 44 from beaker.cache import cache_region
45 45 from zope.cachedescriptors.property import Lazy as LazyProperty
46 46
47 47 from pylons.i18n.translation import lazy_ugettext as _
48 48 from pyramid.threadlocal import get_current_request
49 49
50 50 from rhodecode.lib.vcs import get_vcs_instance
51 51 from rhodecode.lib.vcs.backends.base import EmptyCommit, Reference
52 52 from rhodecode.lib.utils2 import (
53 53 str2bool, safe_str, get_commit_safe, safe_unicode, md5_safe,
54 54 time_to_datetime, aslist, Optional, safe_int, get_clone_url, AttributeDict,
55 55 glob2re, StrictAttributeDict, cleaned_uri)
56 56 from rhodecode.lib.jsonalchemy import MutationObj, MutationList, JsonType
57 57 from rhodecode.lib.ext_json import json
58 58 from rhodecode.lib.caching_query import FromCache
59 59 from rhodecode.lib.encrypt import AESCipher
60 60
61 61 from rhodecode.model.meta import Base, Session
62 62
63 63 URL_SEP = '/'
64 64 log = logging.getLogger(__name__)
65 65
66 66 # =============================================================================
67 67 # BASE CLASSES
68 68 # =============================================================================
69 69
70 70 # this is propagated from .ini file rhodecode.encrypted_values.secret or
71 71 # beaker.session.secret if first is not set.
72 72 # and initialized at environment.py
73 73 ENCRYPTION_KEY = None
74 74
75 75 # used to sort permissions by types, '#' used here is not allowed to be in
76 76 # usernames, and it's very early in sorted string.printable table.
77 77 PERMISSION_TYPE_SORT = {
78 78 'admin': '####',
79 79 'write': '###',
80 80 'read': '##',
81 81 'none': '#',
82 82 }
83 83
84 84
85 85 def display_sort(obj):
86 86 """
87 87 Sort function used to sort permissions in .permissions() function of
88 88 Repository, RepoGroup, UserGroup. Also it put the default user in front
89 89 of all other resources
90 90 """
91 91
92 92 if obj.username == User.DEFAULT_USER:
93 93 return '#####'
94 94 prefix = PERMISSION_TYPE_SORT.get(obj.permission.split('.')[-1], '')
95 95 return prefix + obj.username
96 96
97 97
98 98 def _hash_key(k):
99 99 return md5_safe(k)
100 100
101 101
102 102 class EncryptedTextValue(TypeDecorator):
103 103 """
104 104 Special column for encrypted long text data, use like::
105 105
106 106 value = Column("encrypted_value", EncryptedValue(), nullable=False)
107 107
108 108 This column is intelligent so if value is in unencrypted form it return
109 109 unencrypted form, but on save it always encrypts
110 110 """
111 111 impl = Text
112 112
113 113 def process_bind_param(self, value, dialect):
114 114 if not value:
115 115 return value
116 116 if value.startswith('enc$aes$') or value.startswith('enc$aes_hmac$'):
117 117 # protect against double encrypting if someone manually starts
118 118 # doing
119 119 raise ValueError('value needs to be in unencrypted format, ie. '
120 120 'not starting with enc$aes')
121 121 return 'enc$aes_hmac$%s' % AESCipher(
122 122 ENCRYPTION_KEY, hmac=True).encrypt(value)
123 123
124 124 def process_result_value(self, value, dialect):
125 125 import rhodecode
126 126
127 127 if not value:
128 128 return value
129 129
130 130 parts = value.split('$', 3)
131 131 if not len(parts) == 3:
132 132 # probably not encrypted values
133 133 return value
134 134 else:
135 135 if parts[0] != 'enc':
136 136 # parts ok but without our header ?
137 137 return value
138 138 enc_strict_mode = str2bool(rhodecode.CONFIG.get(
139 139 'rhodecode.encrypted_values.strict') or True)
140 140 # at that stage we know it's our encryption
141 141 if parts[1] == 'aes':
142 142 decrypted_data = AESCipher(ENCRYPTION_KEY).decrypt(parts[2])
143 143 elif parts[1] == 'aes_hmac':
144 144 decrypted_data = AESCipher(
145 145 ENCRYPTION_KEY, hmac=True,
146 146 strict_verification=enc_strict_mode).decrypt(parts[2])
147 147 else:
148 148 raise ValueError(
149 149 'Encryption type part is wrong, must be `aes` '
150 150 'or `aes_hmac`, got `%s` instead' % (parts[1]))
151 151 return decrypted_data
152 152
153 153
154 154 class BaseModel(object):
155 155 """
156 156 Base Model for all classes
157 157 """
158 158
159 159 @classmethod
160 160 def _get_keys(cls):
161 161 """return column names for this model """
162 162 return class_mapper(cls).c.keys()
163 163
164 164 def get_dict(self):
165 165 """
166 166 return dict with keys and values corresponding
167 167 to this model data """
168 168
169 169 d = {}
170 170 for k in self._get_keys():
171 171 d[k] = getattr(self, k)
172 172
173 173 # also use __json__() if present to get additional fields
174 174 _json_attr = getattr(self, '__json__', None)
175 175 if _json_attr:
176 176 # update with attributes from __json__
177 177 if callable(_json_attr):
178 178 _json_attr = _json_attr()
179 179 for k, val in _json_attr.iteritems():
180 180 d[k] = val
181 181 return d
182 182
183 183 def get_appstruct(self):
184 184 """return list with keys and values tuples corresponding
185 185 to this model data """
186 186
187 187 l = []
188 188 for k in self._get_keys():
189 189 l.append((k, getattr(self, k),))
190 190 return l
191 191
192 192 def populate_obj(self, populate_dict):
193 193 """populate model with data from given populate_dict"""
194 194
195 195 for k in self._get_keys():
196 196 if k in populate_dict:
197 197 setattr(self, k, populate_dict[k])
198 198
199 199 @classmethod
200 200 def query(cls):
201 201 return Session().query(cls)
202 202
203 203 @classmethod
204 204 def get(cls, id_):
205 205 if id_:
206 206 return cls.query().get(id_)
207 207
208 208 @classmethod
209 209 def get_or_404(cls, id_, pyramid_exc=False):
210 210 if pyramid_exc:
211 211 # NOTE(marcink): backward compat, once migration to pyramid
212 212 # this should only use pyramid exceptions
213 213 from pyramid.httpexceptions import HTTPNotFound
214 214 else:
215 215 from webob.exc import HTTPNotFound
216 216
217 217 try:
218 218 id_ = int(id_)
219 219 except (TypeError, ValueError):
220 220 raise HTTPNotFound
221 221
222 222 res = cls.query().get(id_)
223 223 if not res:
224 224 raise HTTPNotFound
225 225 return res
226 226
227 227 @classmethod
228 228 def getAll(cls):
229 229 # deprecated and left for backward compatibility
230 230 return cls.get_all()
231 231
232 232 @classmethod
233 233 def get_all(cls):
234 234 return cls.query().all()
235 235
236 236 @classmethod
237 237 def delete(cls, id_):
238 238 obj = cls.query().get(id_)
239 239 Session().delete(obj)
240 240
241 241 @classmethod
242 242 def identity_cache(cls, session, attr_name, value):
243 243 exist_in_session = []
244 244 for (item_cls, pkey), instance in session.identity_map.items():
245 245 if cls == item_cls and getattr(instance, attr_name) == value:
246 246 exist_in_session.append(instance)
247 247 if exist_in_session:
248 248 if len(exist_in_session) == 1:
249 249 return exist_in_session[0]
250 250 log.exception(
251 251 'multiple objects with attr %s and '
252 252 'value %s found with same name: %r',
253 253 attr_name, value, exist_in_session)
254 254
255 255 def __repr__(self):
256 256 if hasattr(self, '__unicode__'):
257 257 # python repr needs to return str
258 258 try:
259 259 return safe_str(self.__unicode__())
260 260 except UnicodeDecodeError:
261 261 pass
262 262 return '<DB:%s>' % (self.__class__.__name__)
263 263
264 264
265 265 class RhodeCodeSetting(Base, BaseModel):
266 266 __tablename__ = 'rhodecode_settings'
267 267 __table_args__ = (
268 268 UniqueConstraint('app_settings_name'),
269 269 {'extend_existing': True, 'mysql_engine': 'InnoDB',
270 270 'mysql_charset': 'utf8', 'sqlite_autoincrement': True}
271 271 )
272 272
273 273 SETTINGS_TYPES = {
274 274 'str': safe_str,
275 275 'int': safe_int,
276 276 'unicode': safe_unicode,
277 277 'bool': str2bool,
278 278 'list': functools.partial(aslist, sep=',')
279 279 }
280 280 DEFAULT_UPDATE_URL = 'https://rhodecode.com/api/v1/info/versions'
281 281 GLOBAL_CONF_KEY = 'app_settings'
282 282
283 283 app_settings_id = Column("app_settings_id", Integer(), nullable=False, unique=True, default=None, primary_key=True)
284 284 app_settings_name = Column("app_settings_name", String(255), nullable=True, unique=None, default=None)
285 285 _app_settings_value = Column("app_settings_value", String(4096), nullable=True, unique=None, default=None)
286 286 _app_settings_type = Column("app_settings_type", String(255), nullable=True, unique=None, default=None)
287 287
288 288 def __init__(self, key='', val='', type='unicode'):
289 289 self.app_settings_name = key
290 290 self.app_settings_type = type
291 291 self.app_settings_value = val
292 292
293 293 @validates('_app_settings_value')
294 294 def validate_settings_value(self, key, val):
295 295 assert type(val) == unicode
296 296 return val
297 297
298 298 @hybrid_property
299 299 def app_settings_value(self):
300 300 v = self._app_settings_value
301 301 _type = self.app_settings_type
302 302 if _type:
303 303 _type = self.app_settings_type.split('.')[0]
304 304 # decode the encrypted value
305 305 if 'encrypted' in self.app_settings_type:
306 306 cipher = EncryptedTextValue()
307 307 v = safe_unicode(cipher.process_result_value(v, None))
308 308
309 309 converter = self.SETTINGS_TYPES.get(_type) or \
310 310 self.SETTINGS_TYPES['unicode']
311 311 return converter(v)
312 312
313 313 @app_settings_value.setter
314 314 def app_settings_value(self, val):
315 315 """
316 316 Setter that will always make sure we use unicode in app_settings_value
317 317
318 318 :param val:
319 319 """
320 320 val = safe_unicode(val)
321 321 # encode the encrypted value
322 322 if 'encrypted' in self.app_settings_type:
323 323 cipher = EncryptedTextValue()
324 324 val = safe_unicode(cipher.process_bind_param(val, None))
325 325 self._app_settings_value = val
326 326
327 327 @hybrid_property
328 328 def app_settings_type(self):
329 329 return self._app_settings_type
330 330
331 331 @app_settings_type.setter
332 332 def app_settings_type(self, val):
333 333 if val.split('.')[0] not in self.SETTINGS_TYPES:
334 334 raise Exception('type must be one of %s got %s'
335 335 % (self.SETTINGS_TYPES.keys(), val))
336 336 self._app_settings_type = val
337 337
338 338 def __unicode__(self):
339 339 return u"<%s('%s:%s[%s]')>" % (
340 340 self.__class__.__name__,
341 341 self.app_settings_name, self.app_settings_value,
342 342 self.app_settings_type
343 343 )
344 344
345 345
346 346 class RhodeCodeUi(Base, BaseModel):
347 347 __tablename__ = 'rhodecode_ui'
348 348 __table_args__ = (
349 349 UniqueConstraint('ui_key'),
350 350 {'extend_existing': True, 'mysql_engine': 'InnoDB',
351 351 'mysql_charset': 'utf8', 'sqlite_autoincrement': True}
352 352 )
353 353
354 354 HOOK_REPO_SIZE = 'changegroup.repo_size'
355 355 # HG
356 356 HOOK_PRE_PULL = 'preoutgoing.pre_pull'
357 357 HOOK_PULL = 'outgoing.pull_logger'
358 358 HOOK_PRE_PUSH = 'prechangegroup.pre_push'
359 359 HOOK_PRETX_PUSH = 'pretxnchangegroup.pre_push'
360 360 HOOK_PUSH = 'changegroup.push_logger'
361 361 HOOK_PUSH_KEY = 'pushkey.key_push'
362 362
363 363 # TODO: johbo: Unify way how hooks are configured for git and hg,
364 364 # git part is currently hardcoded.
365 365
366 366 # SVN PATTERNS
367 367 SVN_BRANCH_ID = 'vcs_svn_branch'
368 368 SVN_TAG_ID = 'vcs_svn_tag'
369 369
370 370 ui_id = Column(
371 371 "ui_id", Integer(), nullable=False, unique=True, default=None,
372 372 primary_key=True)
373 373 ui_section = Column(
374 374 "ui_section", String(255), nullable=True, unique=None, default=None)
375 375 ui_key = Column(
376 376 "ui_key", String(255), nullable=True, unique=None, default=None)
377 377 ui_value = Column(
378 378 "ui_value", String(255), nullable=True, unique=None, default=None)
379 379 ui_active = Column(
380 380 "ui_active", Boolean(), nullable=True, unique=None, default=True)
381 381
382 382 def __repr__(self):
383 383 return '<%s[%s]%s=>%s]>' % (self.__class__.__name__, self.ui_section,
384 384 self.ui_key, self.ui_value)
385 385
386 386
387 387 class RepoRhodeCodeSetting(Base, BaseModel):
388 388 __tablename__ = 'repo_rhodecode_settings'
389 389 __table_args__ = (
390 390 UniqueConstraint(
391 391 'app_settings_name', 'repository_id',
392 392 name='uq_repo_rhodecode_setting_name_repo_id'),
393 393 {'extend_existing': True, 'mysql_engine': 'InnoDB',
394 394 'mysql_charset': 'utf8', 'sqlite_autoincrement': True}
395 395 )
396 396
397 397 repository_id = Column(
398 398 "repository_id", Integer(), ForeignKey('repositories.repo_id'),
399 399 nullable=False)
400 400 app_settings_id = Column(
401 401 "app_settings_id", Integer(), nullable=False, unique=True,
402 402 default=None, primary_key=True)
403 403 app_settings_name = Column(
404 404 "app_settings_name", String(255), nullable=True, unique=None,
405 405 default=None)
406 406 _app_settings_value = Column(
407 407 "app_settings_value", String(4096), nullable=True, unique=None,
408 408 default=None)
409 409 _app_settings_type = Column(
410 410 "app_settings_type", String(255), nullable=True, unique=None,
411 411 default=None)
412 412
413 413 repository = relationship('Repository')
414 414
415 415 def __init__(self, repository_id, key='', val='', type='unicode'):
416 416 self.repository_id = repository_id
417 417 self.app_settings_name = key
418 418 self.app_settings_type = type
419 419 self.app_settings_value = val
420 420
421 421 @validates('_app_settings_value')
422 422 def validate_settings_value(self, key, val):
423 423 assert type(val) == unicode
424 424 return val
425 425
426 426 @hybrid_property
427 427 def app_settings_value(self):
428 428 v = self._app_settings_value
429 429 type_ = self.app_settings_type
430 430 SETTINGS_TYPES = RhodeCodeSetting.SETTINGS_TYPES
431 431 converter = SETTINGS_TYPES.get(type_) or SETTINGS_TYPES['unicode']
432 432 return converter(v)
433 433
434 434 @app_settings_value.setter
435 435 def app_settings_value(self, val):
436 436 """
437 437 Setter that will always make sure we use unicode in app_settings_value
438 438
439 439 :param val:
440 440 """
441 441 self._app_settings_value = safe_unicode(val)
442 442
443 443 @hybrid_property
444 444 def app_settings_type(self):
445 445 return self._app_settings_type
446 446
447 447 @app_settings_type.setter
448 448 def app_settings_type(self, val):
449 449 SETTINGS_TYPES = RhodeCodeSetting.SETTINGS_TYPES
450 450 if val not in SETTINGS_TYPES:
451 451 raise Exception('type must be one of %s got %s'
452 452 % (SETTINGS_TYPES.keys(), val))
453 453 self._app_settings_type = val
454 454
455 455 def __unicode__(self):
456 456 return u"<%s('%s:%s:%s[%s]')>" % (
457 457 self.__class__.__name__, self.repository.repo_name,
458 458 self.app_settings_name, self.app_settings_value,
459 459 self.app_settings_type
460 460 )
461 461
462 462
463 463 class RepoRhodeCodeUi(Base, BaseModel):
464 464 __tablename__ = 'repo_rhodecode_ui'
465 465 __table_args__ = (
466 466 UniqueConstraint(
467 467 'repository_id', 'ui_section', 'ui_key',
468 468 name='uq_repo_rhodecode_ui_repository_id_section_key'),
469 469 {'extend_existing': True, 'mysql_engine': 'InnoDB',
470 470 'mysql_charset': 'utf8', 'sqlite_autoincrement': True}
471 471 )
472 472
473 473 repository_id = Column(
474 474 "repository_id", Integer(), ForeignKey('repositories.repo_id'),
475 475 nullable=False)
476 476 ui_id = Column(
477 477 "ui_id", Integer(), nullable=False, unique=True, default=None,
478 478 primary_key=True)
479 479 ui_section = Column(
480 480 "ui_section", String(255), nullable=True, unique=None, default=None)
481 481 ui_key = Column(
482 482 "ui_key", String(255), nullable=True, unique=None, default=None)
483 483 ui_value = Column(
484 484 "ui_value", String(255), nullable=True, unique=None, default=None)
485 485 ui_active = Column(
486 486 "ui_active", Boolean(), nullable=True, unique=None, default=True)
487 487
488 488 repository = relationship('Repository')
489 489
490 490 def __repr__(self):
491 491 return '<%s[%s:%s]%s=>%s]>' % (
492 492 self.__class__.__name__, self.repository.repo_name,
493 493 self.ui_section, self.ui_key, self.ui_value)
494 494
495 495
496 496 class User(Base, BaseModel):
497 497 __tablename__ = 'users'
498 498 __table_args__ = (
499 499 UniqueConstraint('username'), UniqueConstraint('email'),
500 500 Index('u_username_idx', 'username'),
501 501 Index('u_email_idx', 'email'),
502 502 {'extend_existing': True, 'mysql_engine': 'InnoDB',
503 503 'mysql_charset': 'utf8', 'sqlite_autoincrement': True}
504 504 )
505 505 DEFAULT_USER = 'default'
506 506 DEFAULT_USER_EMAIL = 'anonymous@rhodecode.org'
507 507 DEFAULT_GRAVATAR_URL = 'https://secure.gravatar.com/avatar/{md5email}?d=identicon&s={size}'
508 508
509 509 user_id = Column("user_id", Integer(), nullable=False, unique=True, default=None, primary_key=True)
510 510 username = Column("username", String(255), nullable=True, unique=None, default=None)
511 511 password = Column("password", String(255), nullable=True, unique=None, default=None)
512 512 active = Column("active", Boolean(), nullable=True, unique=None, default=True)
513 513 admin = Column("admin", Boolean(), nullable=True, unique=None, default=False)
514 514 name = Column("firstname", String(255), nullable=True, unique=None, default=None)
515 515 lastname = Column("lastname", String(255), nullable=True, unique=None, default=None)
516 516 _email = Column("email", String(255), nullable=True, unique=None, default=None)
517 517 last_login = Column("last_login", DateTime(timezone=False), nullable=True, unique=None, default=None)
518 518 last_activity = Column('last_activity', DateTime(timezone=False), nullable=True, unique=None, default=None)
519 519
520 520 extern_type = Column("extern_type", String(255), nullable=True, unique=None, default=None)
521 521 extern_name = Column("extern_name", String(255), nullable=True, unique=None, default=None)
522 522 _api_key = Column("api_key", String(255), nullable=True, unique=None, default=None)
523 523 inherit_default_permissions = Column("inherit_default_permissions", Boolean(), nullable=False, unique=None, default=True)
524 524 created_on = Column('created_on', DateTime(timezone=False), nullable=False, default=datetime.datetime.now)
525 525 _user_data = Column("user_data", LargeBinary(), nullable=True) # JSON data
526 526
527 527 user_log = relationship('UserLog')
528 528 user_perms = relationship('UserToPerm', primaryjoin="User.user_id==UserToPerm.user_id", cascade='all')
529 529
530 530 repositories = relationship('Repository')
531 531 repository_groups = relationship('RepoGroup')
532 532 user_groups = relationship('UserGroup')
533 533
534 534 user_followers = relationship('UserFollowing', primaryjoin='UserFollowing.follows_user_id==User.user_id', cascade='all')
535 535 followings = relationship('UserFollowing', primaryjoin='UserFollowing.user_id==User.user_id', cascade='all')
536 536
537 537 repo_to_perm = relationship('UserRepoToPerm', primaryjoin='UserRepoToPerm.user_id==User.user_id', cascade='all')
538 538 repo_group_to_perm = relationship('UserRepoGroupToPerm', primaryjoin='UserRepoGroupToPerm.user_id==User.user_id', cascade='all')
539 539 user_group_to_perm = relationship('UserUserGroupToPerm', primaryjoin='UserUserGroupToPerm.user_id==User.user_id', cascade='all')
540 540
541 541 group_member = relationship('UserGroupMember', cascade='all')
542 542
543 543 notifications = relationship('UserNotification', cascade='all')
544 544 # notifications assigned to this user
545 545 user_created_notifications = relationship('Notification', cascade='all')
546 546 # comments created by this user
547 547 user_comments = relationship('ChangesetComment', cascade='all')
548 548 # user profile extra info
549 549 user_emails = relationship('UserEmailMap', cascade='all')
550 550 user_ip_map = relationship('UserIpMap', cascade='all')
551 551 user_auth_tokens = relationship('UserApiKeys', cascade='all')
552 552 # gists
553 553 user_gists = relationship('Gist', cascade='all')
554 554 # user pull requests
555 555 user_pull_requests = relationship('PullRequest', cascade='all')
556 556 # external identities
557 557 extenal_identities = relationship(
558 558 'ExternalIdentity',
559 559 primaryjoin="User.user_id==ExternalIdentity.local_user_id",
560 560 cascade='all')
561 561
562 562 def __unicode__(self):
563 563 return u"<%s('id:%s:%s')>" % (self.__class__.__name__,
564 564 self.user_id, self.username)
565 565
566 566 @hybrid_property
567 567 def email(self):
568 568 return self._email
569 569
570 570 @email.setter
571 571 def email(self, val):
572 572 self._email = val.lower() if val else None
573 573
574 574 @hybrid_property
575 575 def first_name(self):
576 576 from rhodecode.lib import helpers as h
577 577 if self.name:
578 578 return h.escape(self.name)
579 579 return self.name
580 580
581 581 @hybrid_property
582 582 def last_name(self):
583 583 from rhodecode.lib import helpers as h
584 584 if self.lastname:
585 585 return h.escape(self.lastname)
586 586 return self.lastname
587 587
588 588 @hybrid_property
589 589 def api_key(self):
590 590 """
591 591 Fetch if exist an auth-token with role ALL connected to this user
592 592 """
593 593 user_auth_token = UserApiKeys.query()\
594 594 .filter(UserApiKeys.user_id == self.user_id)\
595 595 .filter(or_(UserApiKeys.expires == -1,
596 596 UserApiKeys.expires >= time.time()))\
597 597 .filter(UserApiKeys.role == UserApiKeys.ROLE_ALL).first()
598 598 if user_auth_token:
599 599 user_auth_token = user_auth_token.api_key
600 600
601 601 return user_auth_token
602 602
603 603 @api_key.setter
604 604 def api_key(self, val):
605 605 # don't allow to set API key this is deprecated for now
606 606 self._api_key = None
607 607
608 608 @property
609 609 def firstname(self):
610 610 # alias for future
611 611 return self.name
612 612
613 613 @property
614 614 def emails(self):
615 615 other = UserEmailMap.query().filter(UserEmailMap.user==self).all()
616 616 return [self.email] + [x.email for x in other]
617 617
618 618 @property
619 619 def auth_tokens(self):
620 620 return [x.api_key for x in self.extra_auth_tokens]
621 621
622 622 @property
623 623 def extra_auth_tokens(self):
624 624 return UserApiKeys.query().filter(UserApiKeys.user == self).all()
625 625
626 626 @property
627 627 def feed_token(self):
628 628 return self.get_feed_token()
629 629
630 630 def get_feed_token(self):
631 631 feed_tokens = UserApiKeys.query()\
632 632 .filter(UserApiKeys.user == self)\
633 633 .filter(UserApiKeys.role == UserApiKeys.ROLE_FEED)\
634 634 .all()
635 635 if feed_tokens:
636 636 return feed_tokens[0].api_key
637 637 return 'NO_FEED_TOKEN_AVAILABLE'
638 638
639 639 @classmethod
640 640 def extra_valid_auth_tokens(cls, user, role=None):
641 641 tokens = UserApiKeys.query().filter(UserApiKeys.user == user)\
642 642 .filter(or_(UserApiKeys.expires == -1,
643 643 UserApiKeys.expires >= time.time()))
644 644 if role:
645 645 tokens = tokens.filter(or_(UserApiKeys.role == role,
646 646 UserApiKeys.role == UserApiKeys.ROLE_ALL))
647 647 return tokens.all()
648 648
649 649 def authenticate_by_token(self, auth_token, roles=None, scope_repo_id=None):
650 650 from rhodecode.lib import auth
651 651
652 652 log.debug('Trying to authenticate user: %s via auth-token, '
653 653 'and roles: %s', self, roles)
654 654
655 655 if not auth_token:
656 656 return False
657 657
658 658 crypto_backend = auth.crypto_backend()
659 659
660 660 roles = (roles or []) + [UserApiKeys.ROLE_ALL]
661 661 tokens_q = UserApiKeys.query()\
662 662 .filter(UserApiKeys.user_id == self.user_id)\
663 663 .filter(or_(UserApiKeys.expires == -1,
664 664 UserApiKeys.expires >= time.time()))
665 665
666 666 tokens_q = tokens_q.filter(UserApiKeys.role.in_(roles))
667 667
668 668 plain_tokens = []
669 669 hash_tokens = []
670 670
671 671 for token in tokens_q.all():
672 672 # verify scope first
673 673 if token.repo_id:
674 674 # token has a scope, we need to verify it
675 675 if scope_repo_id != token.repo_id:
676 676 log.debug(
677 677 'Scope mismatch: token has a set repo scope: %s, '
678 678 'and calling scope is:%s, skipping further checks',
679 679 token.repo, scope_repo_id)
680 680 # token has a scope, and it doesn't match, skip token
681 681 continue
682 682
683 683 if token.api_key.startswith(crypto_backend.ENC_PREF):
684 684 hash_tokens.append(token.api_key)
685 685 else:
686 686 plain_tokens.append(token.api_key)
687 687
688 688 is_plain_match = auth_token in plain_tokens
689 689 if is_plain_match:
690 690 return True
691 691
692 692 for hashed in hash_tokens:
693 693 # TODO(marcink): this is expensive to calculate, but most secure
694 694 match = crypto_backend.hash_check(auth_token, hashed)
695 695 if match:
696 696 return True
697 697
698 698 return False
699 699
700 700 @property
701 701 def ip_addresses(self):
702 702 ret = UserIpMap.query().filter(UserIpMap.user == self).all()
703 703 return [x.ip_addr for x in ret]
704 704
705 705 @property
706 706 def username_and_name(self):
707 707 return '%s (%s %s)' % (self.username, self.first_name, self.last_name)
708 708
709 709 @property
710 710 def username_or_name_or_email(self):
711 711 full_name = self.full_name if self.full_name is not ' ' else None
712 712 return self.username or full_name or self.email
713 713
714 714 @property
715 715 def full_name(self):
716 716 return '%s %s' % (self.first_name, self.last_name)
717 717
718 718 @property
719 719 def full_name_or_username(self):
720 720 return ('%s %s' % (self.first_name, self.last_name)
721 721 if (self.first_name and self.last_name) else self.username)
722 722
723 723 @property
724 724 def full_contact(self):
725 725 return '%s %s <%s>' % (self.first_name, self.last_name, self.email)
726 726
727 727 @property
728 728 def short_contact(self):
729 729 return '%s %s' % (self.first_name, self.last_name)
730 730
731 731 @property
732 732 def is_admin(self):
733 733 return self.admin
734 734
735 735 @property
736 736 def AuthUser(self):
737 737 """
738 738 Returns instance of AuthUser for this user
739 739 """
740 740 from rhodecode.lib.auth import AuthUser
741 741 return AuthUser(user_id=self.user_id, username=self.username)
742 742
743 743 @hybrid_property
744 744 def user_data(self):
745 745 if not self._user_data:
746 746 return {}
747 747
748 748 try:
749 749 return json.loads(self._user_data)
750 750 except TypeError:
751 751 return {}
752 752
753 753 @user_data.setter
754 754 def user_data(self, val):
755 755 if not isinstance(val, dict):
756 756 raise Exception('user_data must be dict, got %s' % type(val))
757 757 try:
758 758 self._user_data = json.dumps(val)
759 759 except Exception:
760 760 log.error(traceback.format_exc())
761 761
762 762 @classmethod
763 763 def get_by_username(cls, username, case_insensitive=False,
764 764 cache=False, identity_cache=False):
765 765 session = Session()
766 766
767 767 if case_insensitive:
768 768 q = cls.query().filter(
769 769 func.lower(cls.username) == func.lower(username))
770 770 else:
771 771 q = cls.query().filter(cls.username == username)
772 772
773 773 if cache:
774 774 if identity_cache:
775 775 val = cls.identity_cache(session, 'username', username)
776 776 if val:
777 777 return val
778 778 else:
779 779 cache_key = "get_user_by_name_%s" % _hash_key(username)
780 780 q = q.options(
781 781 FromCache("sql_cache_short", cache_key))
782 782
783 783 return q.scalar()
784 784
785 785 @classmethod
786 786 def get_by_auth_token(cls, auth_token, cache=False):
787 787 q = UserApiKeys.query()\
788 788 .filter(UserApiKeys.api_key == auth_token)\
789 789 .filter(or_(UserApiKeys.expires == -1,
790 790 UserApiKeys.expires >= time.time()))
791 791 if cache:
792 792 q = q.options(
793 793 FromCache("sql_cache_short", "get_auth_token_%s" % auth_token))
794 794
795 795 match = q.first()
796 796 if match:
797 797 return match.user
798 798
799 799 @classmethod
800 800 def get_by_email(cls, email, case_insensitive=False, cache=False):
801 801
802 802 if case_insensitive:
803 803 q = cls.query().filter(func.lower(cls.email) == func.lower(email))
804 804
805 805 else:
806 806 q = cls.query().filter(cls.email == email)
807 807
808 808 email_key = _hash_key(email)
809 809 if cache:
810 810 q = q.options(
811 811 FromCache("sql_cache_short", "get_email_key_%s" % email_key))
812 812
813 813 ret = q.scalar()
814 814 if ret is None:
815 815 q = UserEmailMap.query()
816 816 # try fetching in alternate email map
817 817 if case_insensitive:
818 818 q = q.filter(func.lower(UserEmailMap.email) == func.lower(email))
819 819 else:
820 820 q = q.filter(UserEmailMap.email == email)
821 821 q = q.options(joinedload(UserEmailMap.user))
822 822 if cache:
823 823 q = q.options(
824 824 FromCache("sql_cache_short", "get_email_map_key_%s" % email_key))
825 825 ret = getattr(q.scalar(), 'user', None)
826 826
827 827 return ret
828 828
829 829 @classmethod
830 830 def get_from_cs_author(cls, author):
831 831 """
832 832 Tries to get User objects out of commit author string
833 833
834 834 :param author:
835 835 """
836 836 from rhodecode.lib.helpers import email, author_name
837 837 # Valid email in the attribute passed, see if they're in the system
838 838 _email = email(author)
839 839 if _email:
840 840 user = cls.get_by_email(_email, case_insensitive=True)
841 841 if user:
842 842 return user
843 843 # Maybe we can match by username?
844 844 _author = author_name(author)
845 845 user = cls.get_by_username(_author, case_insensitive=True)
846 846 if user:
847 847 return user
848 848
849 849 def update_userdata(self, **kwargs):
850 850 usr = self
851 851 old = usr.user_data
852 852 old.update(**kwargs)
853 853 usr.user_data = old
854 854 Session().add(usr)
855 855 log.debug('updated userdata with ', kwargs)
856 856
857 857 def update_lastlogin(self):
858 858 """Update user lastlogin"""
859 859 self.last_login = datetime.datetime.now()
860 860 Session().add(self)
861 861 log.debug('updated user %s lastlogin', self.username)
862 862
863 863 def update_lastactivity(self):
864 864 """Update user lastactivity"""
865 865 self.last_activity = datetime.datetime.now()
866 866 Session().add(self)
867 867 log.debug('updated user %s lastactivity', self.username)
868 868
869 869 def update_password(self, new_password):
870 870 from rhodecode.lib.auth import get_crypt_password
871 871
872 872 self.password = get_crypt_password(new_password)
873 873 Session().add(self)
874 874
875 875 @classmethod
876 876 def get_first_super_admin(cls):
877 877 user = User.query().filter(User.admin == true()).first()
878 878 if user is None:
879 879 raise Exception('FATAL: Missing administrative account!')
880 880 return user
881 881
882 882 @classmethod
883 883 def get_all_super_admins(cls):
884 884 """
885 885 Returns all admin accounts sorted by username
886 886 """
887 887 return User.query().filter(User.admin == true())\
888 888 .order_by(User.username.asc()).all()
889 889
890 890 @classmethod
891 891 def get_default_user(cls, cache=False, refresh=False):
892 892 user = User.get_by_username(User.DEFAULT_USER, cache=cache)
893 893 if user is None:
894 894 raise Exception('FATAL: Missing default account!')
895 895 if refresh:
896 896 # The default user might be based on outdated state which
897 897 # has been loaded from the cache.
898 898 # A call to refresh() ensures that the
899 899 # latest state from the database is used.
900 900 Session().refresh(user)
901 901 return user
902 902
903 903 def _get_default_perms(self, user, suffix=''):
904 904 from rhodecode.model.permission import PermissionModel
905 905 return PermissionModel().get_default_perms(user.user_perms, suffix)
906 906
907 907 def get_default_perms(self, suffix=''):
908 908 return self._get_default_perms(self, suffix)
909 909
910 910 def get_api_data(self, include_secrets=False, details='full'):
911 911 """
912 912 Common function for generating user related data for API
913 913
914 914 :param include_secrets: By default secrets in the API data will be replaced
915 915 by a placeholder value to prevent exposing this data by accident. In case
916 916 this data shall be exposed, set this flag to ``True``.
917 917
918 918 :param details: details can be 'basic|full' basic gives only a subset of
919 919 the available user information that includes user_id, name and emails.
920 920 """
921 921 user = self
922 922 user_data = self.user_data
923 923 data = {
924 924 'user_id': user.user_id,
925 925 'username': user.username,
926 926 'firstname': user.name,
927 927 'lastname': user.lastname,
928 928 'email': user.email,
929 929 'emails': user.emails,
930 930 }
931 931 if details == 'basic':
932 932 return data
933 933
934 934 api_key_length = 40
935 935 api_key_replacement = '*' * api_key_length
936 936
937 937 extras = {
938 938 'api_keys': [api_key_replacement],
939 939 'auth_tokens': [api_key_replacement],
940 940 'active': user.active,
941 941 'admin': user.admin,
942 942 'extern_type': user.extern_type,
943 943 'extern_name': user.extern_name,
944 944 'last_login': user.last_login,
945 945 'last_activity': user.last_activity,
946 946 'ip_addresses': user.ip_addresses,
947 947 'language': user_data.get('language')
948 948 }
949 949 data.update(extras)
950 950
951 951 if include_secrets:
952 952 data['api_keys'] = user.auth_tokens
953 953 data['auth_tokens'] = user.extra_auth_tokens
954 954 return data
955 955
956 956 def __json__(self):
957 957 data = {
958 958 'full_name': self.full_name,
959 959 'full_name_or_username': self.full_name_or_username,
960 960 'short_contact': self.short_contact,
961 961 'full_contact': self.full_contact,
962 962 }
963 963 data.update(self.get_api_data())
964 964 return data
965 965
966 966
967 967 class UserApiKeys(Base, BaseModel):
968 968 __tablename__ = 'user_api_keys'
969 969 __table_args__ = (
970 970 Index('uak_api_key_idx', 'api_key'),
971 971 Index('uak_api_key_expires_idx', 'api_key', 'expires'),
972 972 UniqueConstraint('api_key'),
973 973 {'extend_existing': True, 'mysql_engine': 'InnoDB',
974 974 'mysql_charset': 'utf8', 'sqlite_autoincrement': True}
975 975 )
976 976 __mapper_args__ = {}
977 977
978 978 # ApiKey role
979 979 ROLE_ALL = 'token_role_all'
980 980 ROLE_HTTP = 'token_role_http'
981 981 ROLE_VCS = 'token_role_vcs'
982 982 ROLE_API = 'token_role_api'
983 983 ROLE_FEED = 'token_role_feed'
984 984 ROLE_PASSWORD_RESET = 'token_password_reset'
985 985
986 986 ROLES = [ROLE_ALL, ROLE_HTTP, ROLE_VCS, ROLE_API, ROLE_FEED]
987 987
988 988 user_api_key_id = Column("user_api_key_id", Integer(), nullable=False, unique=True, default=None, primary_key=True)
989 989 user_id = Column("user_id", Integer(), ForeignKey('users.user_id'), nullable=True, unique=None, default=None)
990 990 api_key = Column("api_key", String(255), nullable=False, unique=True)
991 991 description = Column('description', UnicodeText().with_variant(UnicodeText(1024), 'mysql'))
992 992 expires = Column('expires', Float(53), nullable=False)
993 993 role = Column('role', String(255), nullable=True)
994 994 created_on = Column('created_on', DateTime(timezone=False), nullable=False, default=datetime.datetime.now)
995 995
996 996 # scope columns
997 997 repo_id = Column(
998 998 'repo_id', Integer(), ForeignKey('repositories.repo_id'),
999 999 nullable=True, unique=None, default=None)
1000 1000 repo = relationship('Repository', lazy='joined')
1001 1001
1002 1002 repo_group_id = Column(
1003 1003 'repo_group_id', Integer(), ForeignKey('groups.group_id'),
1004 1004 nullable=True, unique=None, default=None)
1005 1005 repo_group = relationship('RepoGroup', lazy='joined')
1006 1006
1007 1007 user = relationship('User', lazy='joined')
1008 1008
1009 1009 def __unicode__(self):
1010 1010 return u"<%s('%s')>" % (self.__class__.__name__, self.role)
1011 1011
1012 1012 def __json__(self):
1013 1013 data = {
1014 1014 'auth_token': self.api_key,
1015 1015 'role': self.role,
1016 1016 'scope': self.scope_humanized,
1017 1017 'expired': self.expired
1018 1018 }
1019 1019 return data
1020 1020
1021 1021 def get_api_data(self, include_secrets=False):
1022 1022 data = self.__json__()
1023 1023 if include_secrets:
1024 1024 return data
1025 1025 else:
1026 1026 data['auth_token'] = self.token_obfuscated
1027 1027 return data
1028 1028
1029 1029 @hybrid_property
1030 1030 def description_safe(self):
1031 1031 from rhodecode.lib import helpers as h
1032 1032 return h.escape(self.description)
1033 1033
1034 1034 @property
1035 1035 def expired(self):
1036 1036 if self.expires == -1:
1037 1037 return False
1038 1038 return time.time() > self.expires
1039 1039
1040 1040 @classmethod
1041 1041 def _get_role_name(cls, role):
1042 1042 return {
1043 1043 cls.ROLE_ALL: _('all'),
1044 1044 cls.ROLE_HTTP: _('http/web interface'),
1045 1045 cls.ROLE_VCS: _('vcs (git/hg/svn protocol)'),
1046 1046 cls.ROLE_API: _('api calls'),
1047 1047 cls.ROLE_FEED: _('feed access'),
1048 1048 }.get(role, role)
1049 1049
1050 1050 @property
1051 1051 def role_humanized(self):
1052 1052 return self._get_role_name(self.role)
1053 1053
1054 1054 def _get_scope(self):
1055 1055 if self.repo:
1056 1056 return repr(self.repo)
1057 1057 if self.repo_group:
1058 1058 return repr(self.repo_group) + ' (recursive)'
1059 1059 return 'global'
1060 1060
1061 1061 @property
1062 1062 def scope_humanized(self):
1063 1063 return self._get_scope()
1064 1064
1065 1065 @property
1066 1066 def token_obfuscated(self):
1067 1067 if self.api_key:
1068 1068 return self.api_key[:4] + "****"
1069 1069
1070 1070
1071 1071 class UserEmailMap(Base, BaseModel):
1072 1072 __tablename__ = 'user_email_map'
1073 1073 __table_args__ = (
1074 1074 Index('uem_email_idx', 'email'),
1075 1075 UniqueConstraint('email'),
1076 1076 {'extend_existing': True, 'mysql_engine': 'InnoDB',
1077 1077 'mysql_charset': 'utf8', 'sqlite_autoincrement': True}
1078 1078 )
1079 1079 __mapper_args__ = {}
1080 1080
1081 1081 email_id = Column("email_id", Integer(), nullable=False, unique=True, default=None, primary_key=True)
1082 1082 user_id = Column("user_id", Integer(), ForeignKey('users.user_id'), nullable=True, unique=None, default=None)
1083 1083 _email = Column("email", String(255), nullable=True, unique=False, default=None)
1084 1084 user = relationship('User', lazy='joined')
1085 1085
1086 1086 @validates('_email')
1087 1087 def validate_email(self, key, email):
1088 1088 # check if this email is not main one
1089 1089 main_email = Session().query(User).filter(User.email == email).scalar()
1090 1090 if main_email is not None:
1091 1091 raise AttributeError('email %s is present is user table' % email)
1092 1092 return email
1093 1093
1094 1094 @hybrid_property
1095 1095 def email(self):
1096 1096 return self._email
1097 1097
1098 1098 @email.setter
1099 1099 def email(self, val):
1100 1100 self._email = val.lower() if val else None
1101 1101
1102 1102
1103 1103 class UserIpMap(Base, BaseModel):
1104 1104 __tablename__ = 'user_ip_map'
1105 1105 __table_args__ = (
1106 1106 UniqueConstraint('user_id', 'ip_addr'),
1107 1107 {'extend_existing': True, 'mysql_engine': 'InnoDB',
1108 1108 'mysql_charset': 'utf8', 'sqlite_autoincrement': True}
1109 1109 )
1110 1110 __mapper_args__ = {}
1111 1111
1112 1112 ip_id = Column("ip_id", Integer(), nullable=False, unique=True, default=None, primary_key=True)
1113 1113 user_id = Column("user_id", Integer(), ForeignKey('users.user_id'), nullable=True, unique=None, default=None)
1114 1114 ip_addr = Column("ip_addr", String(255), nullable=True, unique=False, default=None)
1115 1115 active = Column("active", Boolean(), nullable=True, unique=None, default=True)
1116 1116 description = Column("description", String(10000), nullable=True, unique=None, default=None)
1117 1117 user = relationship('User', lazy='joined')
1118 1118
1119 1119 @hybrid_property
1120 1120 def description_safe(self):
1121 1121 from rhodecode.lib import helpers as h
1122 1122 return h.escape(self.description)
1123 1123
1124 1124 @classmethod
1125 1125 def _get_ip_range(cls, ip_addr):
1126 1126 net = ipaddress.ip_network(ip_addr, strict=False)
1127 1127 return [str(net.network_address), str(net.broadcast_address)]
1128 1128
1129 1129 def __json__(self):
1130 1130 return {
1131 1131 'ip_addr': self.ip_addr,
1132 1132 'ip_range': self._get_ip_range(self.ip_addr),
1133 1133 }
1134 1134
1135 1135 def __unicode__(self):
1136 1136 return u"<%s('user_id:%s=>%s')>" % (self.__class__.__name__,
1137 1137 self.user_id, self.ip_addr)
1138 1138
1139 1139
1140 1140 class UserLog(Base, BaseModel):
1141 1141 __tablename__ = 'user_logs'
1142 1142 __table_args__ = (
1143 1143 {'extend_existing': True, 'mysql_engine': 'InnoDB',
1144 1144 'mysql_charset': 'utf8', 'sqlite_autoincrement': True},
1145 1145 )
1146 1146 VERSION_1 = 'v1'
1147 1147 VERSION_2 = 'v2'
1148 1148 VERSIONS = [VERSION_1, VERSION_2]
1149 1149
1150 1150 user_log_id = Column("user_log_id", Integer(), nullable=False, unique=True, default=None, primary_key=True)
1151 1151 user_id = Column("user_id", Integer(), ForeignKey('users.user_id'), nullable=True, unique=None, default=None)
1152 1152 username = Column("username", String(255), nullable=True, unique=None, default=None)
1153 1153 repository_id = Column("repository_id", Integer(), ForeignKey('repositories.repo_id'), nullable=True)
1154 1154 repository_name = Column("repository_name", String(255), nullable=True, unique=None, default=None)
1155 1155 user_ip = Column("user_ip", String(255), nullable=True, unique=None, default=None)
1156 1156 action = Column("action", Text().with_variant(Text(1200000), 'mysql'), nullable=True, unique=None, default=None)
1157 1157 action_date = Column("action_date", DateTime(timezone=False), nullable=True, unique=None, default=None)
1158 1158
1159 1159 version = Column("version", String(255), nullable=True, default=VERSION_1)
1160 1160 user_data = Column('user_data_json', MutationObj.as_mutable(JsonType(dialect_map=dict(mysql=UnicodeText(16384)))))
1161 1161 action_data = Column('action_data_json', MutationObj.as_mutable(JsonType(dialect_map=dict(mysql=UnicodeText(16384)))))
1162 1162
1163 1163 def __unicode__(self):
1164 1164 return u"<%s('id:%s:%s')>" % (
1165 1165 self.__class__.__name__, self.repository_name, self.action)
1166 1166
1167 1167 def __json__(self):
1168 1168 return {
1169 1169 'user_id': self.user_id,
1170 1170 'username': self.username,
1171 1171 'repository_id': self.repository_id,
1172 1172 'repository_name': self.repository_name,
1173 1173 'user_ip': self.user_ip,
1174 1174 'action_date': self.action_date,
1175 1175 'action': self.action,
1176 1176 }
1177 1177
1178 1178 @property
1179 1179 def action_as_day(self):
1180 1180 return datetime.date(*self.action_date.timetuple()[:3])
1181 1181
1182 1182 user = relationship('User')
1183 1183 repository = relationship('Repository', cascade='')
1184 1184
1185 1185
1186 1186 class UserGroup(Base, BaseModel):
1187 1187 __tablename__ = 'users_groups'
1188 1188 __table_args__ = (
1189 1189 {'extend_existing': True, 'mysql_engine': 'InnoDB',
1190 1190 'mysql_charset': 'utf8', 'sqlite_autoincrement': True},
1191 1191 )
1192 1192
1193 1193 users_group_id = Column("users_group_id", Integer(), nullable=False, unique=True, default=None, primary_key=True)
1194 1194 users_group_name = Column("users_group_name", String(255), nullable=False, unique=True, default=None)
1195 1195 user_group_description = Column("user_group_description", String(10000), nullable=True, unique=None, default=None)
1196 1196 users_group_active = Column("users_group_active", Boolean(), nullable=True, unique=None, default=None)
1197 1197 inherit_default_permissions = Column("users_group_inherit_default_permissions", Boolean(), nullable=False, unique=None, default=True)
1198 1198 user_id = Column("user_id", Integer(), ForeignKey('users.user_id'), nullable=False, unique=False, default=None)
1199 1199 created_on = Column('created_on', DateTime(timezone=False), nullable=False, default=datetime.datetime.now)
1200 1200 _group_data = Column("group_data", LargeBinary(), nullable=True) # JSON data
1201 1201
1202 1202 members = relationship('UserGroupMember', cascade="all, delete, delete-orphan", lazy="joined")
1203 1203 users_group_to_perm = relationship('UserGroupToPerm', cascade='all')
1204 1204 users_group_repo_to_perm = relationship('UserGroupRepoToPerm', cascade='all')
1205 1205 users_group_repo_group_to_perm = relationship('UserGroupRepoGroupToPerm', cascade='all')
1206 1206 user_user_group_to_perm = relationship('UserUserGroupToPerm', cascade='all')
1207 1207 user_group_user_group_to_perm = relationship('UserGroupUserGroupToPerm ', primaryjoin="UserGroupUserGroupToPerm.target_user_group_id==UserGroup.users_group_id", cascade='all')
1208 1208
1209 1209 user = relationship('User')
1210 1210
1211 1211 @hybrid_property
1212 1212 def description_safe(self):
1213 1213 from rhodecode.lib import helpers as h
1214 1214 return h.escape(self.description)
1215 1215
1216 1216 @hybrid_property
1217 1217 def group_data(self):
1218 1218 if not self._group_data:
1219 1219 return {}
1220 1220
1221 1221 try:
1222 1222 return json.loads(self._group_data)
1223 1223 except TypeError:
1224 1224 return {}
1225 1225
1226 1226 @group_data.setter
1227 1227 def group_data(self, val):
1228 1228 try:
1229 1229 self._group_data = json.dumps(val)
1230 1230 except Exception:
1231 1231 log.error(traceback.format_exc())
1232 1232
1233 1233 def __unicode__(self):
1234 1234 return u"<%s('id:%s:%s')>" % (self.__class__.__name__,
1235 1235 self.users_group_id,
1236 1236 self.users_group_name)
1237 1237
1238 1238 @classmethod
1239 1239 def get_by_group_name(cls, group_name, cache=False,
1240 1240 case_insensitive=False):
1241 1241 if case_insensitive:
1242 1242 q = cls.query().filter(func.lower(cls.users_group_name) ==
1243 1243 func.lower(group_name))
1244 1244
1245 1245 else:
1246 1246 q = cls.query().filter(cls.users_group_name == group_name)
1247 1247 if cache:
1248 1248 q = q.options(
1249 1249 FromCache("sql_cache_short", "get_group_%s" % _hash_key(group_name)))
1250 1250 return q.scalar()
1251 1251
1252 1252 @classmethod
1253 1253 def get(cls, user_group_id, cache=False):
1254 1254 user_group = cls.query()
1255 1255 if cache:
1256 1256 user_group = user_group.options(
1257 1257 FromCache("sql_cache_short", "get_users_group_%s" % user_group_id))
1258 1258 return user_group.get(user_group_id)
1259 1259
1260 1260 def permissions(self, with_admins=True, with_owner=True):
1261 1261 q = UserUserGroupToPerm.query().filter(UserUserGroupToPerm.user_group == self)
1262 1262 q = q.options(joinedload(UserUserGroupToPerm.user_group),
1263 1263 joinedload(UserUserGroupToPerm.user),
1264 1264 joinedload(UserUserGroupToPerm.permission),)
1265 1265
1266 1266 # get owners and admins and permissions. We do a trick of re-writing
1267 1267 # objects from sqlalchemy to named-tuples due to sqlalchemy session
1268 1268 # has a global reference and changing one object propagates to all
1269 1269 # others. This means if admin is also an owner admin_row that change
1270 1270 # would propagate to both objects
1271 1271 perm_rows = []
1272 1272 for _usr in q.all():
1273 1273 usr = AttributeDict(_usr.user.get_dict())
1274 1274 usr.permission = _usr.permission.permission_name
1275 1275 perm_rows.append(usr)
1276 1276
1277 1277 # filter the perm rows by 'default' first and then sort them by
1278 1278 # admin,write,read,none permissions sorted again alphabetically in
1279 1279 # each group
1280 1280 perm_rows = sorted(perm_rows, key=display_sort)
1281 1281
1282 1282 _admin_perm = 'usergroup.admin'
1283 1283 owner_row = []
1284 1284 if with_owner:
1285 1285 usr = AttributeDict(self.user.get_dict())
1286 1286 usr.owner_row = True
1287 1287 usr.permission = _admin_perm
1288 1288 owner_row.append(usr)
1289 1289
1290 1290 super_admin_rows = []
1291 1291 if with_admins:
1292 1292 for usr in User.get_all_super_admins():
1293 1293 # if this admin is also owner, don't double the record
1294 1294 if usr.user_id == owner_row[0].user_id:
1295 1295 owner_row[0].admin_row = True
1296 1296 else:
1297 1297 usr = AttributeDict(usr.get_dict())
1298 1298 usr.admin_row = True
1299 1299 usr.permission = _admin_perm
1300 1300 super_admin_rows.append(usr)
1301 1301
1302 1302 return super_admin_rows + owner_row + perm_rows
1303 1303
1304 1304 def permission_user_groups(self):
1305 1305 q = UserGroupUserGroupToPerm.query().filter(UserGroupUserGroupToPerm.target_user_group == self)
1306 1306 q = q.options(joinedload(UserGroupUserGroupToPerm.user_group),
1307 1307 joinedload(UserGroupUserGroupToPerm.target_user_group),
1308 1308 joinedload(UserGroupUserGroupToPerm.permission),)
1309 1309
1310 1310 perm_rows = []
1311 1311 for _user_group in q.all():
1312 1312 usr = AttributeDict(_user_group.user_group.get_dict())
1313 1313 usr.permission = _user_group.permission.permission_name
1314 1314 perm_rows.append(usr)
1315 1315
1316 1316 return perm_rows
1317 1317
1318 1318 def _get_default_perms(self, user_group, suffix=''):
1319 1319 from rhodecode.model.permission import PermissionModel
1320 1320 return PermissionModel().get_default_perms(user_group.users_group_to_perm, suffix)
1321 1321
1322 1322 def get_default_perms(self, suffix=''):
1323 1323 return self._get_default_perms(self, suffix)
1324 1324
1325 1325 def get_api_data(self, with_group_members=True, include_secrets=False):
1326 1326 """
1327 1327 :param include_secrets: See :meth:`User.get_api_data`, this parameter is
1328 1328 basically forwarded.
1329 1329
1330 1330 """
1331 1331 user_group = self
1332 1332 data = {
1333 1333 'users_group_id': user_group.users_group_id,
1334 1334 'group_name': user_group.users_group_name,
1335 1335 'group_description': user_group.user_group_description,
1336 1336 'active': user_group.users_group_active,
1337 1337 'owner': user_group.user.username,
1338 1338 'owner_email': user_group.user.email,
1339 1339 }
1340 1340
1341 1341 if with_group_members:
1342 1342 users = []
1343 1343 for user in user_group.members:
1344 1344 user = user.user
1345 1345 users.append(user.get_api_data(include_secrets=include_secrets))
1346 1346 data['users'] = users
1347 1347
1348 1348 return data
1349 1349
1350 1350
1351 1351 class UserGroupMember(Base, BaseModel):
1352 1352 __tablename__ = 'users_groups_members'
1353 1353 __table_args__ = (
1354 1354 {'extend_existing': True, 'mysql_engine': 'InnoDB',
1355 1355 'mysql_charset': 'utf8', 'sqlite_autoincrement': True},
1356 1356 )
1357 1357
1358 1358 users_group_member_id = Column("users_group_member_id", Integer(), nullable=False, unique=True, default=None, primary_key=True)
1359 1359 users_group_id = Column("users_group_id", Integer(), ForeignKey('users_groups.users_group_id'), nullable=False, unique=None, default=None)
1360 1360 user_id = Column("user_id", Integer(), ForeignKey('users.user_id'), nullable=False, unique=None, default=None)
1361 1361
1362 1362 user = relationship('User', lazy='joined')
1363 1363 users_group = relationship('UserGroup')
1364 1364
1365 1365 def __init__(self, gr_id='', u_id=''):
1366 1366 self.users_group_id = gr_id
1367 1367 self.user_id = u_id
1368 1368
1369 1369
1370 1370 class RepositoryField(Base, BaseModel):
1371 1371 __tablename__ = 'repositories_fields'
1372 1372 __table_args__ = (
1373 1373 UniqueConstraint('repository_id', 'field_key'), # no-multi field
1374 1374 {'extend_existing': True, 'mysql_engine': 'InnoDB',
1375 1375 'mysql_charset': 'utf8', 'sqlite_autoincrement': True},
1376 1376 )
1377 1377 PREFIX = 'ex_' # prefix used in form to not conflict with already existing fields
1378 1378
1379 1379 repo_field_id = Column("repo_field_id", Integer(), nullable=False, unique=True, default=None, primary_key=True)
1380 1380 repository_id = Column("repository_id", Integer(), ForeignKey('repositories.repo_id'), nullable=False, unique=None, default=None)
1381 1381 field_key = Column("field_key", String(250))
1382 1382 field_label = Column("field_label", String(1024), nullable=False)
1383 1383 field_value = Column("field_value", String(10000), nullable=False)
1384 1384 field_desc = Column("field_desc", String(1024), nullable=False)
1385 1385 field_type = Column("field_type", String(255), nullable=False, unique=None)
1386 1386 created_on = Column('created_on', DateTime(timezone=False), nullable=False, default=datetime.datetime.now)
1387 1387
1388 1388 repository = relationship('Repository')
1389 1389
1390 1390 @property
1391 1391 def field_key_prefixed(self):
1392 1392 return 'ex_%s' % self.field_key
1393 1393
1394 1394 @classmethod
1395 1395 def un_prefix_key(cls, key):
1396 1396 if key.startswith(cls.PREFIX):
1397 1397 return key[len(cls.PREFIX):]
1398 1398 return key
1399 1399
1400 1400 @classmethod
1401 1401 def get_by_key_name(cls, key, repo):
1402 1402 row = cls.query()\
1403 1403 .filter(cls.repository == repo)\
1404 1404 .filter(cls.field_key == key).scalar()
1405 1405 return row
1406 1406
1407 1407
1408 1408 class Repository(Base, BaseModel):
1409 1409 __tablename__ = 'repositories'
1410 1410 __table_args__ = (
1411 1411 Index('r_repo_name_idx', 'repo_name', mysql_length=255),
1412 1412 {'extend_existing': True, 'mysql_engine': 'InnoDB',
1413 1413 'mysql_charset': 'utf8', 'sqlite_autoincrement': True},
1414 1414 )
1415 1415 DEFAULT_CLONE_URI = '{scheme}://{user}@{netloc}/{repo}'
1416 1416 DEFAULT_CLONE_URI_ID = '{scheme}://{user}@{netloc}/_{repoid}'
1417 1417
1418 1418 STATE_CREATED = 'repo_state_created'
1419 1419 STATE_PENDING = 'repo_state_pending'
1420 1420 STATE_ERROR = 'repo_state_error'
1421 1421
1422 1422 LOCK_AUTOMATIC = 'lock_auto'
1423 1423 LOCK_API = 'lock_api'
1424 1424 LOCK_WEB = 'lock_web'
1425 1425 LOCK_PULL = 'lock_pull'
1426 1426
1427 1427 NAME_SEP = URL_SEP
1428 1428
1429 1429 repo_id = Column(
1430 1430 "repo_id", Integer(), nullable=False, unique=True, default=None,
1431 1431 primary_key=True)
1432 1432 _repo_name = Column(
1433 1433 "repo_name", Text(), nullable=False, default=None)
1434 1434 _repo_name_hash = Column(
1435 1435 "repo_name_hash", String(255), nullable=False, unique=True)
1436 1436 repo_state = Column("repo_state", String(255), nullable=True)
1437 1437
1438 1438 clone_uri = Column(
1439 1439 "clone_uri", EncryptedTextValue(), nullable=True, unique=False,
1440 1440 default=None)
1441 1441 repo_type = Column(
1442 1442 "repo_type", String(255), nullable=False, unique=False, default=None)
1443 1443 user_id = Column(
1444 1444 "user_id", Integer(), ForeignKey('users.user_id'), nullable=False,
1445 1445 unique=False, default=None)
1446 1446 private = Column(
1447 1447 "private", Boolean(), nullable=True, unique=None, default=None)
1448 1448 enable_statistics = Column(
1449 1449 "statistics", Boolean(), nullable=True, unique=None, default=True)
1450 1450 enable_downloads = Column(
1451 1451 "downloads", Boolean(), nullable=True, unique=None, default=True)
1452 1452 description = Column(
1453 1453 "description", String(10000), nullable=True, unique=None, default=None)
1454 1454 created_on = Column(
1455 1455 'created_on', DateTime(timezone=False), nullable=True, unique=None,
1456 1456 default=datetime.datetime.now)
1457 1457 updated_on = Column(
1458 1458 'updated_on', DateTime(timezone=False), nullable=True, unique=None,
1459 1459 default=datetime.datetime.now)
1460 1460 _landing_revision = Column(
1461 1461 "landing_revision", String(255), nullable=False, unique=False,
1462 1462 default=None)
1463 1463 enable_locking = Column(
1464 1464 "enable_locking", Boolean(), nullable=False, unique=None,
1465 1465 default=False)
1466 1466 _locked = Column(
1467 1467 "locked", String(255), nullable=True, unique=False, default=None)
1468 1468 _changeset_cache = Column(
1469 1469 "changeset_cache", LargeBinary(), nullable=True) # JSON data
1470 1470
1471 1471 fork_id = Column(
1472 1472 "fork_id", Integer(), ForeignKey('repositories.repo_id'),
1473 1473 nullable=True, unique=False, default=None)
1474 1474 group_id = Column(
1475 1475 "group_id", Integer(), ForeignKey('groups.group_id'), nullable=True,
1476 1476 unique=False, default=None)
1477 1477
1478 1478 user = relationship('User', lazy='joined')
1479 1479 fork = relationship('Repository', remote_side=repo_id, lazy='joined')
1480 1480 group = relationship('RepoGroup', lazy='joined')
1481 1481 repo_to_perm = relationship(
1482 1482 'UserRepoToPerm', cascade='all',
1483 1483 order_by='UserRepoToPerm.repo_to_perm_id')
1484 1484 users_group_to_perm = relationship('UserGroupRepoToPerm', cascade='all')
1485 1485 stats = relationship('Statistics', cascade='all', uselist=False)
1486 1486
1487 1487 followers = relationship(
1488 1488 'UserFollowing',
1489 1489 primaryjoin='UserFollowing.follows_repo_id==Repository.repo_id',
1490 1490 cascade='all')
1491 1491 extra_fields = relationship(
1492 1492 'RepositoryField', cascade="all, delete, delete-orphan")
1493 1493 logs = relationship('UserLog')
1494 1494 comments = relationship(
1495 1495 'ChangesetComment', cascade="all, delete, delete-orphan")
1496 1496 pull_requests_source = relationship(
1497 1497 'PullRequest',
1498 1498 primaryjoin='PullRequest.source_repo_id==Repository.repo_id',
1499 1499 cascade="all, delete, delete-orphan")
1500 1500 pull_requests_target = relationship(
1501 1501 'PullRequest',
1502 1502 primaryjoin='PullRequest.target_repo_id==Repository.repo_id',
1503 1503 cascade="all, delete, delete-orphan")
1504 1504 ui = relationship('RepoRhodeCodeUi', cascade="all")
1505 1505 settings = relationship('RepoRhodeCodeSetting', cascade="all")
1506 1506 integrations = relationship('Integration',
1507 1507 cascade="all, delete, delete-orphan")
1508 1508
1509 1509 def __unicode__(self):
1510 1510 return u"<%s('%s:%s')>" % (self.__class__.__name__, self.repo_id,
1511 1511 safe_unicode(self.repo_name))
1512 1512
1513 1513 @hybrid_property
1514 1514 def description_safe(self):
1515 1515 from rhodecode.lib import helpers as h
1516 1516 return h.escape(self.description)
1517 1517
1518 1518 @hybrid_property
1519 1519 def landing_rev(self):
1520 1520 # always should return [rev_type, rev]
1521 1521 if self._landing_revision:
1522 1522 _rev_info = self._landing_revision.split(':')
1523 1523 if len(_rev_info) < 2:
1524 1524 _rev_info.insert(0, 'rev')
1525 1525 return [_rev_info[0], _rev_info[1]]
1526 1526 return [None, None]
1527 1527
1528 1528 @landing_rev.setter
1529 1529 def landing_rev(self, val):
1530 1530 if ':' not in val:
1531 1531 raise ValueError('value must be delimited with `:` and consist '
1532 1532 'of <rev_type>:<rev>, got %s instead' % val)
1533 1533 self._landing_revision = val
1534 1534
1535 1535 @hybrid_property
1536 1536 def locked(self):
1537 1537 if self._locked:
1538 1538 user_id, timelocked, reason = self._locked.split(':')
1539 1539 lock_values = int(user_id), timelocked, reason
1540 1540 else:
1541 1541 lock_values = [None, None, None]
1542 1542 return lock_values
1543 1543
1544 1544 @locked.setter
1545 1545 def locked(self, val):
1546 1546 if val and isinstance(val, (list, tuple)):
1547 1547 self._locked = ':'.join(map(str, val))
1548 1548 else:
1549 1549 self._locked = None
1550 1550
1551 1551 @hybrid_property
1552 1552 def changeset_cache(self):
1553 1553 from rhodecode.lib.vcs.backends.base import EmptyCommit
1554 1554 dummy = EmptyCommit().__json__()
1555 1555 if not self._changeset_cache:
1556 1556 return dummy
1557 1557 try:
1558 1558 return json.loads(self._changeset_cache)
1559 1559 except TypeError:
1560 1560 return dummy
1561 1561 except Exception:
1562 1562 log.error(traceback.format_exc())
1563 1563 return dummy
1564 1564
1565 1565 @changeset_cache.setter
1566 1566 def changeset_cache(self, val):
1567 1567 try:
1568 1568 self._changeset_cache = json.dumps(val)
1569 1569 except Exception:
1570 1570 log.error(traceback.format_exc())
1571 1571
1572 1572 @hybrid_property
1573 1573 def repo_name(self):
1574 1574 return self._repo_name
1575 1575
1576 1576 @repo_name.setter
1577 1577 def repo_name(self, value):
1578 1578 self._repo_name = value
1579 1579 self._repo_name_hash = hashlib.sha1(safe_str(value)).hexdigest()
1580 1580
1581 1581 @classmethod
1582 1582 def normalize_repo_name(cls, repo_name):
1583 1583 """
1584 1584 Normalizes os specific repo_name to the format internally stored inside
1585 1585 database using URL_SEP
1586 1586
1587 1587 :param cls:
1588 1588 :param repo_name:
1589 1589 """
1590 1590 return cls.NAME_SEP.join(repo_name.split(os.sep))
1591 1591
1592 1592 @classmethod
1593 1593 def get_by_repo_name(cls, repo_name, cache=False, identity_cache=False):
1594 1594 session = Session()
1595 1595 q = session.query(cls).filter(cls.repo_name == repo_name)
1596 1596
1597 1597 if cache:
1598 1598 if identity_cache:
1599 1599 val = cls.identity_cache(session, 'repo_name', repo_name)
1600 1600 if val:
1601 1601 return val
1602 1602 else:
1603 1603 cache_key = "get_repo_by_name_%s" % _hash_key(repo_name)
1604 1604 q = q.options(
1605 1605 FromCache("sql_cache_short", cache_key))
1606 1606
1607 1607 return q.scalar()
1608 1608
1609 1609 @classmethod
1610 1610 def get_by_full_path(cls, repo_full_path):
1611 1611 repo_name = repo_full_path.split(cls.base_path(), 1)[-1]
1612 1612 repo_name = cls.normalize_repo_name(repo_name)
1613 1613 return cls.get_by_repo_name(repo_name.strip(URL_SEP))
1614 1614
1615 1615 @classmethod
1616 1616 def get_repo_forks(cls, repo_id):
1617 1617 return cls.query().filter(Repository.fork_id == repo_id)
1618 1618
1619 1619 @classmethod
1620 1620 def base_path(cls):
1621 1621 """
1622 1622 Returns base path when all repos are stored
1623 1623
1624 1624 :param cls:
1625 1625 """
1626 1626 q = Session().query(RhodeCodeUi)\
1627 1627 .filter(RhodeCodeUi.ui_key == cls.NAME_SEP)
1628 1628 q = q.options(FromCache("sql_cache_short", "repository_repo_path"))
1629 1629 return q.one().ui_value
1630 1630
1631 1631 @classmethod
1632 1632 def is_valid(cls, repo_name):
1633 1633 """
1634 1634 returns True if given repo name is a valid filesystem repository
1635 1635
1636 1636 :param cls:
1637 1637 :param repo_name:
1638 1638 """
1639 1639 from rhodecode.lib.utils import is_valid_repo
1640 1640
1641 1641 return is_valid_repo(repo_name, cls.base_path())
1642 1642
1643 1643 @classmethod
1644 1644 def get_all_repos(cls, user_id=Optional(None), group_id=Optional(None),
1645 1645 case_insensitive=True):
1646 1646 q = Repository.query()
1647 1647
1648 1648 if not isinstance(user_id, Optional):
1649 1649 q = q.filter(Repository.user_id == user_id)
1650 1650
1651 1651 if not isinstance(group_id, Optional):
1652 1652 q = q.filter(Repository.group_id == group_id)
1653 1653
1654 1654 if case_insensitive:
1655 1655 q = q.order_by(func.lower(Repository.repo_name))
1656 1656 else:
1657 1657 q = q.order_by(Repository.repo_name)
1658 1658 return q.all()
1659 1659
1660 1660 @property
1661 1661 def forks(self):
1662 1662 """
1663 1663 Return forks of this repo
1664 1664 """
1665 1665 return Repository.get_repo_forks(self.repo_id)
1666 1666
1667 1667 @property
1668 1668 def parent(self):
1669 1669 """
1670 1670 Returns fork parent
1671 1671 """
1672 1672 return self.fork
1673 1673
1674 1674 @property
1675 1675 def just_name(self):
1676 1676 return self.repo_name.split(self.NAME_SEP)[-1]
1677 1677
1678 1678 @property
1679 1679 def groups_with_parents(self):
1680 1680 groups = []
1681 1681 if self.group is None:
1682 1682 return groups
1683 1683
1684 1684 cur_gr = self.group
1685 1685 groups.insert(0, cur_gr)
1686 1686 while 1:
1687 1687 gr = getattr(cur_gr, 'parent_group', None)
1688 1688 cur_gr = cur_gr.parent_group
1689 1689 if gr is None:
1690 1690 break
1691 1691 groups.insert(0, gr)
1692 1692
1693 1693 return groups
1694 1694
1695 1695 @property
1696 1696 def groups_and_repo(self):
1697 1697 return self.groups_with_parents, self
1698 1698
1699 1699 @LazyProperty
1700 1700 def repo_path(self):
1701 1701 """
1702 1702 Returns base full path for that repository means where it actually
1703 1703 exists on a filesystem
1704 1704 """
1705 1705 q = Session().query(RhodeCodeUi).filter(
1706 1706 RhodeCodeUi.ui_key == self.NAME_SEP)
1707 1707 q = q.options(FromCache("sql_cache_short", "repository_repo_path"))
1708 1708 return q.one().ui_value
1709 1709
1710 1710 @property
1711 1711 def repo_full_path(self):
1712 1712 p = [self.repo_path]
1713 1713 # we need to split the name by / since this is how we store the
1714 1714 # names in the database, but that eventually needs to be converted
1715 1715 # into a valid system path
1716 1716 p += self.repo_name.split(self.NAME_SEP)
1717 1717 return os.path.join(*map(safe_unicode, p))
1718 1718
1719 1719 @property
1720 1720 def cache_keys(self):
1721 1721 """
1722 1722 Returns associated cache keys for that repo
1723 1723 """
1724 1724 return CacheKey.query()\
1725 1725 .filter(CacheKey.cache_args == self.repo_name)\
1726 1726 .order_by(CacheKey.cache_key)\
1727 1727 .all()
1728 1728
1729 1729 def get_new_name(self, repo_name):
1730 1730 """
1731 1731 returns new full repository name based on assigned group and new new
1732 1732
1733 1733 :param group_name:
1734 1734 """
1735 1735 path_prefix = self.group.full_path_splitted if self.group else []
1736 1736 return self.NAME_SEP.join(path_prefix + [repo_name])
1737 1737
1738 1738 @property
1739 1739 def _config(self):
1740 1740 """
1741 1741 Returns db based config object.
1742 1742 """
1743 1743 from rhodecode.lib.utils import make_db_config
1744 1744 return make_db_config(clear_session=False, repo=self)
1745 1745
1746 1746 def permissions(self, with_admins=True, with_owner=True):
1747 1747 q = UserRepoToPerm.query().filter(UserRepoToPerm.repository == self)
1748 1748 q = q.options(joinedload(UserRepoToPerm.repository),
1749 1749 joinedload(UserRepoToPerm.user),
1750 1750 joinedload(UserRepoToPerm.permission),)
1751 1751
1752 1752 # get owners and admins and permissions. We do a trick of re-writing
1753 1753 # objects from sqlalchemy to named-tuples due to sqlalchemy session
1754 1754 # has a global reference and changing one object propagates to all
1755 1755 # others. This means if admin is also an owner admin_row that change
1756 1756 # would propagate to both objects
1757 1757 perm_rows = []
1758 1758 for _usr in q.all():
1759 1759 usr = AttributeDict(_usr.user.get_dict())
1760 1760 usr.permission = _usr.permission.permission_name
1761 1761 perm_rows.append(usr)
1762 1762
1763 1763 # filter the perm rows by 'default' first and then sort them by
1764 1764 # admin,write,read,none permissions sorted again alphabetically in
1765 1765 # each group
1766 1766 perm_rows = sorted(perm_rows, key=display_sort)
1767 1767
1768 1768 _admin_perm = 'repository.admin'
1769 1769 owner_row = []
1770 1770 if with_owner:
1771 1771 usr = AttributeDict(self.user.get_dict())
1772 1772 usr.owner_row = True
1773 1773 usr.permission = _admin_perm
1774 1774 owner_row.append(usr)
1775 1775
1776 1776 super_admin_rows = []
1777 1777 if with_admins:
1778 1778 for usr in User.get_all_super_admins():
1779 1779 # if this admin is also owner, don't double the record
1780 1780 if usr.user_id == owner_row[0].user_id:
1781 1781 owner_row[0].admin_row = True
1782 1782 else:
1783 1783 usr = AttributeDict(usr.get_dict())
1784 1784 usr.admin_row = True
1785 1785 usr.permission = _admin_perm
1786 1786 super_admin_rows.append(usr)
1787 1787
1788 1788 return super_admin_rows + owner_row + perm_rows
1789 1789
1790 1790 def permission_user_groups(self):
1791 1791 q = UserGroupRepoToPerm.query().filter(
1792 1792 UserGroupRepoToPerm.repository == self)
1793 1793 q = q.options(joinedload(UserGroupRepoToPerm.repository),
1794 1794 joinedload(UserGroupRepoToPerm.users_group),
1795 1795 joinedload(UserGroupRepoToPerm.permission),)
1796 1796
1797 1797 perm_rows = []
1798 1798 for _user_group in q.all():
1799 1799 usr = AttributeDict(_user_group.users_group.get_dict())
1800 1800 usr.permission = _user_group.permission.permission_name
1801 1801 perm_rows.append(usr)
1802 1802
1803 1803 return perm_rows
1804 1804
1805 1805 def get_api_data(self, include_secrets=False):
1806 1806 """
1807 1807 Common function for generating repo api data
1808 1808
1809 1809 :param include_secrets: See :meth:`User.get_api_data`.
1810 1810
1811 1811 """
1812 1812 # TODO: mikhail: Here there is an anti-pattern, we probably need to
1813 1813 # move this methods on models level.
1814 1814 from rhodecode.model.settings import SettingsModel
1815 1815 from rhodecode.model.repo import RepoModel
1816 1816
1817 1817 repo = self
1818 1818 _user_id, _time, _reason = self.locked
1819 1819
1820 1820 data = {
1821 1821 'repo_id': repo.repo_id,
1822 1822 'repo_name': repo.repo_name,
1823 1823 'repo_type': repo.repo_type,
1824 1824 'clone_uri': repo.clone_uri or '',
1825 1825 'url': RepoModel().get_url(self),
1826 1826 'private': repo.private,
1827 1827 'created_on': repo.created_on,
1828 1828 'description': repo.description_safe,
1829 1829 'landing_rev': repo.landing_rev,
1830 1830 'owner': repo.user.username,
1831 1831 'fork_of': repo.fork.repo_name if repo.fork else None,
1832 1832 'fork_of_id': repo.fork.repo_id if repo.fork else None,
1833 1833 'enable_statistics': repo.enable_statistics,
1834 1834 'enable_locking': repo.enable_locking,
1835 1835 'enable_downloads': repo.enable_downloads,
1836 1836 'last_changeset': repo.changeset_cache,
1837 1837 'locked_by': User.get(_user_id).get_api_data(
1838 1838 include_secrets=include_secrets) if _user_id else None,
1839 1839 'locked_date': time_to_datetime(_time) if _time else None,
1840 1840 'lock_reason': _reason if _reason else None,
1841 1841 }
1842 1842
1843 1843 # TODO: mikhail: should be per-repo settings here
1844 1844 rc_config = SettingsModel().get_all_settings()
1845 1845 repository_fields = str2bool(
1846 1846 rc_config.get('rhodecode_repository_fields'))
1847 1847 if repository_fields:
1848 1848 for f in self.extra_fields:
1849 1849 data[f.field_key_prefixed] = f.field_value
1850 1850
1851 1851 return data
1852 1852
1853 1853 @classmethod
1854 1854 def lock(cls, repo, user_id, lock_time=None, lock_reason=None):
1855 1855 if not lock_time:
1856 1856 lock_time = time.time()
1857 1857 if not lock_reason:
1858 1858 lock_reason = cls.LOCK_AUTOMATIC
1859 1859 repo.locked = [user_id, lock_time, lock_reason]
1860 1860 Session().add(repo)
1861 1861 Session().commit()
1862 1862
1863 1863 @classmethod
1864 1864 def unlock(cls, repo):
1865 1865 repo.locked = None
1866 1866 Session().add(repo)
1867 1867 Session().commit()
1868 1868
1869 1869 @classmethod
1870 1870 def getlock(cls, repo):
1871 1871 return repo.locked
1872 1872
1873 1873 def is_user_lock(self, user_id):
1874 1874 if self.lock[0]:
1875 1875 lock_user_id = safe_int(self.lock[0])
1876 1876 user_id = safe_int(user_id)
1877 1877 # both are ints, and they are equal
1878 1878 return all([lock_user_id, user_id]) and lock_user_id == user_id
1879 1879
1880 1880 return False
1881 1881
1882 1882 def get_locking_state(self, action, user_id, only_when_enabled=True):
1883 1883 """
1884 1884 Checks locking on this repository, if locking is enabled and lock is
1885 1885 present returns a tuple of make_lock, locked, locked_by.
1886 1886 make_lock can have 3 states None (do nothing) True, make lock
1887 1887 False release lock, This value is later propagated to hooks, which
1888 1888 do the locking. Think about this as signals passed to hooks what to do.
1889 1889
1890 1890 """
1891 1891 # TODO: johbo: This is part of the business logic and should be moved
1892 1892 # into the RepositoryModel.
1893 1893
1894 1894 if action not in ('push', 'pull'):
1895 1895 raise ValueError("Invalid action value: %s" % repr(action))
1896 1896
1897 1897 # defines if locked error should be thrown to user
1898 1898 currently_locked = False
1899 1899 # defines if new lock should be made, tri-state
1900 1900 make_lock = None
1901 1901 repo = self
1902 1902 user = User.get(user_id)
1903 1903
1904 1904 lock_info = repo.locked
1905 1905
1906 1906 if repo and (repo.enable_locking or not only_when_enabled):
1907 1907 if action == 'push':
1908 1908 # check if it's already locked !, if it is compare users
1909 1909 locked_by_user_id = lock_info[0]
1910 1910 if user.user_id == locked_by_user_id:
1911 1911 log.debug(
1912 1912 'Got `push` action from user %s, now unlocking', user)
1913 1913 # unlock if we have push from user who locked
1914 1914 make_lock = False
1915 1915 else:
1916 1916 # we're not the same user who locked, ban with
1917 1917 # code defined in settings (default is 423 HTTP Locked) !
1918 1918 log.debug('Repo %s is currently locked by %s', repo, user)
1919 1919 currently_locked = True
1920 1920 elif action == 'pull':
1921 1921 # [0] user [1] date
1922 1922 if lock_info[0] and lock_info[1]:
1923 1923 log.debug('Repo %s is currently locked by %s', repo, user)
1924 1924 currently_locked = True
1925 1925 else:
1926 1926 log.debug('Setting lock on repo %s by %s', repo, user)
1927 1927 make_lock = True
1928 1928
1929 1929 else:
1930 1930 log.debug('Repository %s do not have locking enabled', repo)
1931 1931
1932 1932 log.debug('FINAL locking values make_lock:%s,locked:%s,locked_by:%s',
1933 1933 make_lock, currently_locked, lock_info)
1934 1934
1935 1935 from rhodecode.lib.auth import HasRepoPermissionAny
1936 1936 perm_check = HasRepoPermissionAny('repository.write', 'repository.admin')
1937 1937 if make_lock and not perm_check(repo_name=repo.repo_name, user=user):
1938 1938 # if we don't have at least write permission we cannot make a lock
1939 1939 log.debug('lock state reset back to FALSE due to lack '
1940 1940 'of at least read permission')
1941 1941 make_lock = False
1942 1942
1943 1943 return make_lock, currently_locked, lock_info
1944 1944
1945 1945 @property
1946 1946 def last_db_change(self):
1947 1947 return self.updated_on
1948 1948
1949 1949 @property
1950 1950 def clone_uri_hidden(self):
1951 1951 clone_uri = self.clone_uri
1952 1952 if clone_uri:
1953 1953 import urlobject
1954 1954 url_obj = urlobject.URLObject(cleaned_uri(clone_uri))
1955 1955 if url_obj.password:
1956 1956 clone_uri = url_obj.with_password('*****')
1957 1957 return clone_uri
1958 1958
1959 1959 def clone_url(self, **override):
1960 1960 from rhodecode.model.settings import SettingsModel
1961 1961
1962 1962 uri_tmpl = None
1963 1963 if 'with_id' in override:
1964 1964 uri_tmpl = self.DEFAULT_CLONE_URI_ID
1965 1965 del override['with_id']
1966 1966
1967 1967 if 'uri_tmpl' in override:
1968 1968 uri_tmpl = override['uri_tmpl']
1969 1969 del override['uri_tmpl']
1970 1970
1971 1971 # we didn't override our tmpl from **overrides
1972 1972 if not uri_tmpl:
1973 1973 rc_config = SettingsModel().get_all_settings(cache=True)
1974 1974 uri_tmpl = rc_config.get(
1975 1975 'rhodecode_clone_uri_tmpl') or self.DEFAULT_CLONE_URI
1976 1976
1977 1977 request = get_current_request()
1978 1978 return get_clone_url(request=request,
1979 1979 uri_tmpl=uri_tmpl,
1980 1980 repo_name=self.repo_name,
1981 1981 repo_id=self.repo_id, **override)
1982 1982
1983 1983 def set_state(self, state):
1984 1984 self.repo_state = state
1985 1985 Session().add(self)
1986 1986 #==========================================================================
1987 1987 # SCM PROPERTIES
1988 1988 #==========================================================================
1989 1989
1990 1990 def get_commit(self, commit_id=None, commit_idx=None, pre_load=None):
1991 1991 return get_commit_safe(
1992 1992 self.scm_instance(), commit_id, commit_idx, pre_load=pre_load)
1993 1993
1994 1994 def get_changeset(self, rev=None, pre_load=None):
1995 1995 warnings.warn("Use get_commit", DeprecationWarning)
1996 1996 commit_id = None
1997 1997 commit_idx = None
1998 1998 if isinstance(rev, basestring):
1999 1999 commit_id = rev
2000 2000 else:
2001 2001 commit_idx = rev
2002 2002 return self.get_commit(commit_id=commit_id, commit_idx=commit_idx,
2003 2003 pre_load=pre_load)
2004 2004
2005 2005 def get_landing_commit(self):
2006 2006 """
2007 2007 Returns landing commit, or if that doesn't exist returns the tip
2008 2008 """
2009 2009 _rev_type, _rev = self.landing_rev
2010 2010 commit = self.get_commit(_rev)
2011 2011 if isinstance(commit, EmptyCommit):
2012 2012 return self.get_commit()
2013 2013 return commit
2014 2014
2015 2015 def update_commit_cache(self, cs_cache=None, config=None):
2016 2016 """
2017 2017 Update cache of last changeset for repository, keys should be::
2018 2018
2019 2019 short_id
2020 2020 raw_id
2021 2021 revision
2022 2022 parents
2023 2023 message
2024 2024 date
2025 2025 author
2026 2026
2027 2027 :param cs_cache:
2028 2028 """
2029 2029 from rhodecode.lib.vcs.backends.base import BaseChangeset
2030 2030 if cs_cache is None:
2031 2031 # use no-cache version here
2032 2032 scm_repo = self.scm_instance(cache=False, config=config)
2033 2033 if scm_repo:
2034 2034 cs_cache = scm_repo.get_commit(
2035 2035 pre_load=["author", "date", "message", "parents"])
2036 2036 else:
2037 2037 cs_cache = EmptyCommit()
2038 2038
2039 2039 if isinstance(cs_cache, BaseChangeset):
2040 2040 cs_cache = cs_cache.__json__()
2041 2041
2042 2042 def is_outdated(new_cs_cache):
2043 2043 if (new_cs_cache['raw_id'] != self.changeset_cache['raw_id'] or
2044 2044 new_cs_cache['revision'] != self.changeset_cache['revision']):
2045 2045 return True
2046 2046 return False
2047 2047
2048 2048 # check if we have maybe already latest cached revision
2049 2049 if is_outdated(cs_cache) or not self.changeset_cache:
2050 2050 _default = datetime.datetime.fromtimestamp(0)
2051 2051 last_change = cs_cache.get('date') or _default
2052 2052 log.debug('updated repo %s with new cs cache %s',
2053 2053 self.repo_name, cs_cache)
2054 2054 self.updated_on = last_change
2055 2055 self.changeset_cache = cs_cache
2056 2056 Session().add(self)
2057 2057 Session().commit()
2058 2058 else:
2059 2059 log.debug('Skipping update_commit_cache for repo:`%s` '
2060 2060 'commit already with latest changes', self.repo_name)
2061 2061
2062 2062 @property
2063 2063 def tip(self):
2064 2064 return self.get_commit('tip')
2065 2065
2066 2066 @property
2067 2067 def author(self):
2068 2068 return self.tip.author
2069 2069
2070 2070 @property
2071 2071 def last_change(self):
2072 2072 return self.scm_instance().last_change
2073 2073
2074 2074 def get_comments(self, revisions=None):
2075 2075 """
2076 2076 Returns comments for this repository grouped by revisions
2077 2077
2078 2078 :param revisions: filter query by revisions only
2079 2079 """
2080 2080 cmts = ChangesetComment.query()\
2081 2081 .filter(ChangesetComment.repo == self)
2082 2082 if revisions:
2083 2083 cmts = cmts.filter(ChangesetComment.revision.in_(revisions))
2084 2084 grouped = collections.defaultdict(list)
2085 2085 for cmt in cmts.all():
2086 2086 grouped[cmt.revision].append(cmt)
2087 2087 return grouped
2088 2088
2089 2089 def statuses(self, revisions=None):
2090 2090 """
2091 2091 Returns statuses for this repository
2092 2092
2093 2093 :param revisions: list of revisions to get statuses for
2094 2094 """
2095 2095 statuses = ChangesetStatus.query()\
2096 2096 .filter(ChangesetStatus.repo == self)\
2097 2097 .filter(ChangesetStatus.version == 0)
2098 2098
2099 2099 if revisions:
2100 2100 # Try doing the filtering in chunks to avoid hitting limits
2101 2101 size = 500
2102 2102 status_results = []
2103 2103 for chunk in xrange(0, len(revisions), size):
2104 2104 status_results += statuses.filter(
2105 2105 ChangesetStatus.revision.in_(
2106 2106 revisions[chunk: chunk+size])
2107 2107 ).all()
2108 2108 else:
2109 2109 status_results = statuses.all()
2110 2110
2111 2111 grouped = {}
2112 2112
2113 2113 # maybe we have open new pullrequest without a status?
2114 2114 stat = ChangesetStatus.STATUS_UNDER_REVIEW
2115 2115 status_lbl = ChangesetStatus.get_status_lbl(stat)
2116 2116 for pr in PullRequest.query().filter(PullRequest.source_repo == self).all():
2117 2117 for rev in pr.revisions:
2118 2118 pr_id = pr.pull_request_id
2119 2119 pr_repo = pr.target_repo.repo_name
2120 2120 grouped[rev] = [stat, status_lbl, pr_id, pr_repo]
2121 2121
2122 2122 for stat in status_results:
2123 2123 pr_id = pr_repo = None
2124 2124 if stat.pull_request:
2125 2125 pr_id = stat.pull_request.pull_request_id
2126 2126 pr_repo = stat.pull_request.target_repo.repo_name
2127 2127 grouped[stat.revision] = [str(stat.status), stat.status_lbl,
2128 2128 pr_id, pr_repo]
2129 2129 return grouped
2130 2130
2131 2131 # ==========================================================================
2132 2132 # SCM CACHE INSTANCE
2133 2133 # ==========================================================================
2134 2134
2135 2135 def scm_instance(self, **kwargs):
2136 2136 import rhodecode
2137 2137
2138 2138 # Passing a config will not hit the cache currently only used
2139 2139 # for repo2dbmapper
2140 2140 config = kwargs.pop('config', None)
2141 2141 cache = kwargs.pop('cache', None)
2142 2142 full_cache = str2bool(rhodecode.CONFIG.get('vcs_full_cache'))
2143 2143 # if cache is NOT defined use default global, else we have a full
2144 2144 # control over cache behaviour
2145 2145 if cache is None and full_cache and not config:
2146 2146 return self._get_instance_cached()
2147 2147 return self._get_instance(cache=bool(cache), config=config)
2148 2148
2149 2149 def _get_instance_cached(self):
2150 2150 @cache_region('long_term')
2151 2151 def _get_repo(cache_key):
2152 2152 return self._get_instance()
2153 2153
2154 2154 invalidator_context = CacheKey.repo_context_cache(
2155 2155 _get_repo, self.repo_name, None, thread_scoped=True)
2156 2156
2157 2157 with invalidator_context as context:
2158 2158 context.invalidate()
2159 2159 repo = context.compute()
2160 2160
2161 2161 return repo
2162 2162
2163 2163 def _get_instance(self, cache=True, config=None):
2164 2164 config = config or self._config
2165 2165 custom_wire = {
2166 2166 'cache': cache # controls the vcs.remote cache
2167 2167 }
2168 2168 repo = get_vcs_instance(
2169 2169 repo_path=safe_str(self.repo_full_path),
2170 2170 config=config,
2171 2171 with_wire=custom_wire,
2172 2172 create=False,
2173 2173 _vcs_alias=self.repo_type)
2174 2174
2175 2175 return repo
2176 2176
2177 2177 def __json__(self):
2178 2178 return {'landing_rev': self.landing_rev}
2179 2179
2180 2180 def get_dict(self):
2181 2181
2182 2182 # Since we transformed `repo_name` to a hybrid property, we need to
2183 2183 # keep compatibility with the code which uses `repo_name` field.
2184 2184
2185 2185 result = super(Repository, self).get_dict()
2186 2186 result['repo_name'] = result.pop('_repo_name', None)
2187 2187 return result
2188 2188
2189 2189
2190 2190 class RepoGroup(Base, BaseModel):
2191 2191 __tablename__ = 'groups'
2192 2192 __table_args__ = (
2193 2193 UniqueConstraint('group_name', 'group_parent_id'),
2194 2194 CheckConstraint('group_id != group_parent_id'),
2195 2195 {'extend_existing': True, 'mysql_engine': 'InnoDB',
2196 2196 'mysql_charset': 'utf8', 'sqlite_autoincrement': True},
2197 2197 )
2198 2198 __mapper_args__ = {'order_by': 'group_name'}
2199 2199
2200 2200 CHOICES_SEPARATOR = '/' # used to generate select2 choices for nested groups
2201 2201
2202 2202 group_id = Column("group_id", Integer(), nullable=False, unique=True, default=None, primary_key=True)
2203 2203 group_name = Column("group_name", String(255), nullable=False, unique=True, default=None)
2204 2204 group_parent_id = Column("group_parent_id", Integer(), ForeignKey('groups.group_id'), nullable=True, unique=None, default=None)
2205 2205 group_description = Column("group_description", String(10000), nullable=True, unique=None, default=None)
2206 2206 enable_locking = Column("enable_locking", Boolean(), nullable=False, unique=None, default=False)
2207 2207 user_id = Column("user_id", Integer(), ForeignKey('users.user_id'), nullable=False, unique=False, default=None)
2208 2208 created_on = Column('created_on', DateTime(timezone=False), nullable=False, default=datetime.datetime.now)
2209 2209 personal = Column('personal', Boolean(), nullable=True, unique=None, default=None)
2210 2210
2211 2211 repo_group_to_perm = relationship('UserRepoGroupToPerm', cascade='all', order_by='UserRepoGroupToPerm.group_to_perm_id')
2212 2212 users_group_to_perm = relationship('UserGroupRepoGroupToPerm', cascade='all')
2213 2213 parent_group = relationship('RepoGroup', remote_side=group_id)
2214 2214 user = relationship('User')
2215 2215 integrations = relationship('Integration',
2216 2216 cascade="all, delete, delete-orphan")
2217 2217
2218 2218 def __init__(self, group_name='', parent_group=None):
2219 2219 self.group_name = group_name
2220 2220 self.parent_group = parent_group
2221 2221
2222 2222 def __unicode__(self):
2223 2223 return u"<%s('id:%s:%s')>" % (
2224 2224 self.__class__.__name__, self.group_id, self.group_name)
2225 2225
2226 2226 @hybrid_property
2227 2227 def description_safe(self):
2228 2228 from rhodecode.lib import helpers as h
2229 2229 return h.escape(self.group_description)
2230 2230
2231 2231 @classmethod
2232 2232 def _generate_choice(cls, repo_group):
2233 2233 from webhelpers.html import literal as _literal
2234 2234 _name = lambda k: _literal(cls.CHOICES_SEPARATOR.join(k))
2235 2235 return repo_group.group_id, _name(repo_group.full_path_splitted)
2236 2236
2237 2237 @classmethod
2238 2238 def groups_choices(cls, groups=None, show_empty_group=True):
2239 2239 if not groups:
2240 2240 groups = cls.query().all()
2241 2241
2242 2242 repo_groups = []
2243 2243 if show_empty_group:
2244 2244 repo_groups = [(-1, u'-- %s --' % _('No parent'))]
2245 2245
2246 2246 repo_groups.extend([cls._generate_choice(x) for x in groups])
2247 2247
2248 2248 repo_groups = sorted(
2249 2249 repo_groups, key=lambda t: t[1].split(cls.CHOICES_SEPARATOR)[0])
2250 2250 return repo_groups
2251 2251
2252 2252 @classmethod
2253 2253 def url_sep(cls):
2254 2254 return URL_SEP
2255 2255
2256 2256 @classmethod
2257 2257 def get_by_group_name(cls, group_name, cache=False, case_insensitive=False):
2258 2258 if case_insensitive:
2259 2259 gr = cls.query().filter(func.lower(cls.group_name)
2260 2260 == func.lower(group_name))
2261 2261 else:
2262 2262 gr = cls.query().filter(cls.group_name == group_name)
2263 2263 if cache:
2264 2264 name_key = _hash_key(group_name)
2265 2265 gr = gr.options(
2266 2266 FromCache("sql_cache_short", "get_group_%s" % name_key))
2267 2267 return gr.scalar()
2268 2268
2269 2269 @classmethod
2270 2270 def get_user_personal_repo_group(cls, user_id):
2271 2271 user = User.get(user_id)
2272 2272 if user.username == User.DEFAULT_USER:
2273 2273 return None
2274 2274
2275 2275 return cls.query()\
2276 2276 .filter(cls.personal == true()) \
2277 2277 .filter(cls.user == user).scalar()
2278 2278
2279 2279 @classmethod
2280 2280 def get_all_repo_groups(cls, user_id=Optional(None), group_id=Optional(None),
2281 2281 case_insensitive=True):
2282 2282 q = RepoGroup.query()
2283 2283
2284 2284 if not isinstance(user_id, Optional):
2285 2285 q = q.filter(RepoGroup.user_id == user_id)
2286 2286
2287 2287 if not isinstance(group_id, Optional):
2288 2288 q = q.filter(RepoGroup.group_parent_id == group_id)
2289 2289
2290 2290 if case_insensitive:
2291 2291 q = q.order_by(func.lower(RepoGroup.group_name))
2292 2292 else:
2293 2293 q = q.order_by(RepoGroup.group_name)
2294 2294 return q.all()
2295 2295
2296 2296 @property
2297 2297 def parents(self):
2298 2298 parents_recursion_limit = 10
2299 2299 groups = []
2300 2300 if self.parent_group is None:
2301 2301 return groups
2302 2302 cur_gr = self.parent_group
2303 2303 groups.insert(0, cur_gr)
2304 2304 cnt = 0
2305 2305 while 1:
2306 2306 cnt += 1
2307 2307 gr = getattr(cur_gr, 'parent_group', None)
2308 2308 cur_gr = cur_gr.parent_group
2309 2309 if gr is None:
2310 2310 break
2311 2311 if cnt == parents_recursion_limit:
2312 2312 # this will prevent accidental infinit loops
2313 2313 log.error(('more than %s parents found for group %s, stopping '
2314 2314 'recursive parent fetching' % (parents_recursion_limit, self)))
2315 2315 break
2316 2316
2317 2317 groups.insert(0, gr)
2318 2318 return groups
2319 2319
2320 2320 @property
2321 2321 def children(self):
2322 2322 return RepoGroup.query().filter(RepoGroup.parent_group == self)
2323 2323
2324 2324 @property
2325 2325 def name(self):
2326 2326 return self.group_name.split(RepoGroup.url_sep())[-1]
2327 2327
2328 2328 @property
2329 2329 def full_path(self):
2330 2330 return self.group_name
2331 2331
2332 2332 @property
2333 2333 def full_path_splitted(self):
2334 2334 return self.group_name.split(RepoGroup.url_sep())
2335 2335
2336 2336 @property
2337 2337 def repositories(self):
2338 2338 return Repository.query()\
2339 2339 .filter(Repository.group == self)\
2340 2340 .order_by(Repository.repo_name)
2341 2341
2342 2342 @property
2343 2343 def repositories_recursive_count(self):
2344 2344 cnt = self.repositories.count()
2345 2345
2346 2346 def children_count(group):
2347 2347 cnt = 0
2348 2348 for child in group.children:
2349 2349 cnt += child.repositories.count()
2350 2350 cnt += children_count(child)
2351 2351 return cnt
2352 2352
2353 2353 return cnt + children_count(self)
2354 2354
2355 2355 def _recursive_objects(self, include_repos=True):
2356 2356 all_ = []
2357 2357
2358 2358 def _get_members(root_gr):
2359 2359 if include_repos:
2360 2360 for r in root_gr.repositories:
2361 2361 all_.append(r)
2362 2362 childs = root_gr.children.all()
2363 2363 if childs:
2364 2364 for gr in childs:
2365 2365 all_.append(gr)
2366 2366 _get_members(gr)
2367 2367
2368 2368 _get_members(self)
2369 2369 return [self] + all_
2370 2370
2371 2371 def recursive_groups_and_repos(self):
2372 2372 """
2373 2373 Recursive return all groups, with repositories in those groups
2374 2374 """
2375 2375 return self._recursive_objects()
2376 2376
2377 2377 def recursive_groups(self):
2378 2378 """
2379 2379 Returns all children groups for this group including children of children
2380 2380 """
2381 2381 return self._recursive_objects(include_repos=False)
2382 2382
2383 2383 def get_new_name(self, group_name):
2384 2384 """
2385 2385 returns new full group name based on parent and new name
2386 2386
2387 2387 :param group_name:
2388 2388 """
2389 2389 path_prefix = (self.parent_group.full_path_splitted if
2390 2390 self.parent_group else [])
2391 2391 return RepoGroup.url_sep().join(path_prefix + [group_name])
2392 2392
2393 2393 def permissions(self, with_admins=True, with_owner=True):
2394 2394 q = UserRepoGroupToPerm.query().filter(UserRepoGroupToPerm.group == self)
2395 2395 q = q.options(joinedload(UserRepoGroupToPerm.group),
2396 2396 joinedload(UserRepoGroupToPerm.user),
2397 2397 joinedload(UserRepoGroupToPerm.permission),)
2398 2398
2399 2399 # get owners and admins and permissions. We do a trick of re-writing
2400 2400 # objects from sqlalchemy to named-tuples due to sqlalchemy session
2401 2401 # has a global reference and changing one object propagates to all
2402 2402 # others. This means if admin is also an owner admin_row that change
2403 2403 # would propagate to both objects
2404 2404 perm_rows = []
2405 2405 for _usr in q.all():
2406 2406 usr = AttributeDict(_usr.user.get_dict())
2407 2407 usr.permission = _usr.permission.permission_name
2408 2408 perm_rows.append(usr)
2409 2409
2410 2410 # filter the perm rows by 'default' first and then sort them by
2411 2411 # admin,write,read,none permissions sorted again alphabetically in
2412 2412 # each group
2413 2413 perm_rows = sorted(perm_rows, key=display_sort)
2414 2414
2415 2415 _admin_perm = 'group.admin'
2416 2416 owner_row = []
2417 2417 if with_owner:
2418 2418 usr = AttributeDict(self.user.get_dict())
2419 2419 usr.owner_row = True
2420 2420 usr.permission = _admin_perm
2421 2421 owner_row.append(usr)
2422 2422
2423 2423 super_admin_rows = []
2424 2424 if with_admins:
2425 2425 for usr in User.get_all_super_admins():
2426 2426 # if this admin is also owner, don't double the record
2427 2427 if usr.user_id == owner_row[0].user_id:
2428 2428 owner_row[0].admin_row = True
2429 2429 else:
2430 2430 usr = AttributeDict(usr.get_dict())
2431 2431 usr.admin_row = True
2432 2432 usr.permission = _admin_perm
2433 2433 super_admin_rows.append(usr)
2434 2434
2435 2435 return super_admin_rows + owner_row + perm_rows
2436 2436
2437 2437 def permission_user_groups(self):
2438 2438 q = UserGroupRepoGroupToPerm.query().filter(UserGroupRepoGroupToPerm.group == self)
2439 2439 q = q.options(joinedload(UserGroupRepoGroupToPerm.group),
2440 2440 joinedload(UserGroupRepoGroupToPerm.users_group),
2441 2441 joinedload(UserGroupRepoGroupToPerm.permission),)
2442 2442
2443 2443 perm_rows = []
2444 2444 for _user_group in q.all():
2445 2445 usr = AttributeDict(_user_group.users_group.get_dict())
2446 2446 usr.permission = _user_group.permission.permission_name
2447 2447 perm_rows.append(usr)
2448 2448
2449 2449 return perm_rows
2450 2450
2451 2451 def get_api_data(self):
2452 2452 """
2453 2453 Common function for generating api data
2454 2454
2455 2455 """
2456 2456 group = self
2457 2457 data = {
2458 2458 'group_id': group.group_id,
2459 2459 'group_name': group.group_name,
2460 2460 'group_description': group.description_safe,
2461 2461 'parent_group': group.parent_group.group_name if group.parent_group else None,
2462 2462 'repositories': [x.repo_name for x in group.repositories],
2463 2463 'owner': group.user.username,
2464 2464 }
2465 2465 return data
2466 2466
2467 2467
2468 2468 class Permission(Base, BaseModel):
2469 2469 __tablename__ = 'permissions'
2470 2470 __table_args__ = (
2471 2471 Index('p_perm_name_idx', 'permission_name'),
2472 2472 {'extend_existing': True, 'mysql_engine': 'InnoDB',
2473 2473 'mysql_charset': 'utf8', 'sqlite_autoincrement': True},
2474 2474 )
2475 2475 PERMS = [
2476 2476 ('hg.admin', _('RhodeCode Super Administrator')),
2477 2477
2478 2478 ('repository.none', _('Repository no access')),
2479 2479 ('repository.read', _('Repository read access')),
2480 2480 ('repository.write', _('Repository write access')),
2481 2481 ('repository.admin', _('Repository admin access')),
2482 2482
2483 2483 ('group.none', _('Repository group no access')),
2484 2484 ('group.read', _('Repository group read access')),
2485 2485 ('group.write', _('Repository group write access')),
2486 2486 ('group.admin', _('Repository group admin access')),
2487 2487
2488 2488 ('usergroup.none', _('User group no access')),
2489 2489 ('usergroup.read', _('User group read access')),
2490 2490 ('usergroup.write', _('User group write access')),
2491 2491 ('usergroup.admin', _('User group admin access')),
2492 2492
2493 2493 ('hg.repogroup.create.false', _('Repository Group creation disabled')),
2494 2494 ('hg.repogroup.create.true', _('Repository Group creation enabled')),
2495 2495
2496 2496 ('hg.usergroup.create.false', _('User Group creation disabled')),
2497 2497 ('hg.usergroup.create.true', _('User Group creation enabled')),
2498 2498
2499 2499 ('hg.create.none', _('Repository creation disabled')),
2500 2500 ('hg.create.repository', _('Repository creation enabled')),
2501 2501 ('hg.create.write_on_repogroup.true', _('Repository creation enabled with write permission to a repository group')),
2502 2502 ('hg.create.write_on_repogroup.false', _('Repository creation disabled with write permission to a repository group')),
2503 2503
2504 2504 ('hg.fork.none', _('Repository forking disabled')),
2505 2505 ('hg.fork.repository', _('Repository forking enabled')),
2506 2506
2507 2507 ('hg.register.none', _('Registration disabled')),
2508 2508 ('hg.register.manual_activate', _('User Registration with manual account activation')),
2509 2509 ('hg.register.auto_activate', _('User Registration with automatic account activation')),
2510 2510
2511 2511 ('hg.password_reset.enabled', _('Password reset enabled')),
2512 2512 ('hg.password_reset.hidden', _('Password reset hidden')),
2513 2513 ('hg.password_reset.disabled', _('Password reset disabled')),
2514 2514
2515 2515 ('hg.extern_activate.manual', _('Manual activation of external account')),
2516 2516 ('hg.extern_activate.auto', _('Automatic activation of external account')),
2517 2517
2518 2518 ('hg.inherit_default_perms.false', _('Inherit object permissions from default user disabled')),
2519 2519 ('hg.inherit_default_perms.true', _('Inherit object permissions from default user enabled')),
2520 2520 ]
2521 2521
2522 2522 # definition of system default permissions for DEFAULT user
2523 2523 DEFAULT_USER_PERMISSIONS = [
2524 2524 'repository.read',
2525 2525 'group.read',
2526 2526 'usergroup.read',
2527 2527 'hg.create.repository',
2528 2528 'hg.repogroup.create.false',
2529 2529 'hg.usergroup.create.false',
2530 2530 'hg.create.write_on_repogroup.true',
2531 2531 'hg.fork.repository',
2532 2532 'hg.register.manual_activate',
2533 2533 'hg.password_reset.enabled',
2534 2534 'hg.extern_activate.auto',
2535 2535 'hg.inherit_default_perms.true',
2536 2536 ]
2537 2537
2538 2538 # defines which permissions are more important higher the more important
2539 2539 # Weight defines which permissions are more important.
2540 2540 # The higher number the more important.
2541 2541 PERM_WEIGHTS = {
2542 2542 'repository.none': 0,
2543 2543 'repository.read': 1,
2544 2544 'repository.write': 3,
2545 2545 'repository.admin': 4,
2546 2546
2547 2547 'group.none': 0,
2548 2548 'group.read': 1,
2549 2549 'group.write': 3,
2550 2550 'group.admin': 4,
2551 2551
2552 2552 'usergroup.none': 0,
2553 2553 'usergroup.read': 1,
2554 2554 'usergroup.write': 3,
2555 2555 'usergroup.admin': 4,
2556 2556
2557 2557 'hg.repogroup.create.false': 0,
2558 2558 'hg.repogroup.create.true': 1,
2559 2559
2560 2560 'hg.usergroup.create.false': 0,
2561 2561 'hg.usergroup.create.true': 1,
2562 2562
2563 2563 'hg.fork.none': 0,
2564 2564 'hg.fork.repository': 1,
2565 2565 'hg.create.none': 0,
2566 2566 'hg.create.repository': 1
2567 2567 }
2568 2568
2569 2569 permission_id = Column("permission_id", Integer(), nullable=False, unique=True, default=None, primary_key=True)
2570 2570 permission_name = Column("permission_name", String(255), nullable=True, unique=None, default=None)
2571 2571 permission_longname = Column("permission_longname", String(255), nullable=True, unique=None, default=None)
2572 2572
2573 2573 def __unicode__(self):
2574 2574 return u"<%s('%s:%s')>" % (
2575 2575 self.__class__.__name__, self.permission_id, self.permission_name
2576 2576 )
2577 2577
2578 2578 @classmethod
2579 2579 def get_by_key(cls, key):
2580 2580 return cls.query().filter(cls.permission_name == key).scalar()
2581 2581
2582 2582 @classmethod
2583 2583 def get_default_repo_perms(cls, user_id, repo_id=None):
2584 2584 q = Session().query(UserRepoToPerm, Repository, Permission)\
2585 2585 .join((Permission, UserRepoToPerm.permission_id == Permission.permission_id))\
2586 2586 .join((Repository, UserRepoToPerm.repository_id == Repository.repo_id))\
2587 2587 .filter(UserRepoToPerm.user_id == user_id)
2588 2588 if repo_id:
2589 2589 q = q.filter(UserRepoToPerm.repository_id == repo_id)
2590 2590 return q.all()
2591 2591
2592 2592 @classmethod
2593 2593 def get_default_repo_perms_from_user_group(cls, user_id, repo_id=None):
2594 2594 q = Session().query(UserGroupRepoToPerm, Repository, Permission)\
2595 2595 .join(
2596 2596 Permission,
2597 2597 UserGroupRepoToPerm.permission_id == Permission.permission_id)\
2598 2598 .join(
2599 2599 Repository,
2600 2600 UserGroupRepoToPerm.repository_id == Repository.repo_id)\
2601 2601 .join(
2602 2602 UserGroup,
2603 2603 UserGroupRepoToPerm.users_group_id ==
2604 2604 UserGroup.users_group_id)\
2605 2605 .join(
2606 2606 UserGroupMember,
2607 2607 UserGroupRepoToPerm.users_group_id ==
2608 2608 UserGroupMember.users_group_id)\
2609 2609 .filter(
2610 2610 UserGroupMember.user_id == user_id,
2611 2611 UserGroup.users_group_active == true())
2612 2612 if repo_id:
2613 2613 q = q.filter(UserGroupRepoToPerm.repository_id == repo_id)
2614 2614 return q.all()
2615 2615
2616 2616 @classmethod
2617 2617 def get_default_group_perms(cls, user_id, repo_group_id=None):
2618 2618 q = Session().query(UserRepoGroupToPerm, RepoGroup, Permission)\
2619 2619 .join((Permission, UserRepoGroupToPerm.permission_id == Permission.permission_id))\
2620 2620 .join((RepoGroup, UserRepoGroupToPerm.group_id == RepoGroup.group_id))\
2621 2621 .filter(UserRepoGroupToPerm.user_id == user_id)
2622 2622 if repo_group_id:
2623 2623 q = q.filter(UserRepoGroupToPerm.group_id == repo_group_id)
2624 2624 return q.all()
2625 2625
2626 2626 @classmethod
2627 2627 def get_default_group_perms_from_user_group(
2628 2628 cls, user_id, repo_group_id=None):
2629 2629 q = Session().query(UserGroupRepoGroupToPerm, RepoGroup, Permission)\
2630 2630 .join(
2631 2631 Permission,
2632 2632 UserGroupRepoGroupToPerm.permission_id ==
2633 2633 Permission.permission_id)\
2634 2634 .join(
2635 2635 RepoGroup,
2636 2636 UserGroupRepoGroupToPerm.group_id == RepoGroup.group_id)\
2637 2637 .join(
2638 2638 UserGroup,
2639 2639 UserGroupRepoGroupToPerm.users_group_id ==
2640 2640 UserGroup.users_group_id)\
2641 2641 .join(
2642 2642 UserGroupMember,
2643 2643 UserGroupRepoGroupToPerm.users_group_id ==
2644 2644 UserGroupMember.users_group_id)\
2645 2645 .filter(
2646 2646 UserGroupMember.user_id == user_id,
2647 2647 UserGroup.users_group_active == true())
2648 2648 if repo_group_id:
2649 2649 q = q.filter(UserGroupRepoGroupToPerm.group_id == repo_group_id)
2650 2650 return q.all()
2651 2651
2652 2652 @classmethod
2653 2653 def get_default_user_group_perms(cls, user_id, user_group_id=None):
2654 2654 q = Session().query(UserUserGroupToPerm, UserGroup, Permission)\
2655 2655 .join((Permission, UserUserGroupToPerm.permission_id == Permission.permission_id))\
2656 2656 .join((UserGroup, UserUserGroupToPerm.user_group_id == UserGroup.users_group_id))\
2657 2657 .filter(UserUserGroupToPerm.user_id == user_id)
2658 2658 if user_group_id:
2659 2659 q = q.filter(UserUserGroupToPerm.user_group_id == user_group_id)
2660 2660 return q.all()
2661 2661
2662 2662 @classmethod
2663 2663 def get_default_user_group_perms_from_user_group(
2664 2664 cls, user_id, user_group_id=None):
2665 2665 TargetUserGroup = aliased(UserGroup, name='target_user_group')
2666 2666 q = Session().query(UserGroupUserGroupToPerm, UserGroup, Permission)\
2667 2667 .join(
2668 2668 Permission,
2669 2669 UserGroupUserGroupToPerm.permission_id ==
2670 2670 Permission.permission_id)\
2671 2671 .join(
2672 2672 TargetUserGroup,
2673 2673 UserGroupUserGroupToPerm.target_user_group_id ==
2674 2674 TargetUserGroup.users_group_id)\
2675 2675 .join(
2676 2676 UserGroup,
2677 2677 UserGroupUserGroupToPerm.user_group_id ==
2678 2678 UserGroup.users_group_id)\
2679 2679 .join(
2680 2680 UserGroupMember,
2681 2681 UserGroupUserGroupToPerm.user_group_id ==
2682 2682 UserGroupMember.users_group_id)\
2683 2683 .filter(
2684 2684 UserGroupMember.user_id == user_id,
2685 2685 UserGroup.users_group_active == true())
2686 2686 if user_group_id:
2687 2687 q = q.filter(
2688 2688 UserGroupUserGroupToPerm.user_group_id == user_group_id)
2689 2689
2690 2690 return q.all()
2691 2691
2692 2692
2693 2693 class UserRepoToPerm(Base, BaseModel):
2694 2694 __tablename__ = 'repo_to_perm'
2695 2695 __table_args__ = (
2696 2696 UniqueConstraint('user_id', 'repository_id', 'permission_id'),
2697 2697 {'extend_existing': True, 'mysql_engine': 'InnoDB',
2698 2698 'mysql_charset': 'utf8', 'sqlite_autoincrement': True}
2699 2699 )
2700 2700 repo_to_perm_id = Column("repo_to_perm_id", Integer(), nullable=False, unique=True, default=None, primary_key=True)
2701 2701 user_id = Column("user_id", Integer(), ForeignKey('users.user_id'), nullable=False, unique=None, default=None)
2702 2702 permission_id = Column("permission_id", Integer(), ForeignKey('permissions.permission_id'), nullable=False, unique=None, default=None)
2703 2703 repository_id = Column("repository_id", Integer(), ForeignKey('repositories.repo_id'), nullable=False, unique=None, default=None)
2704 2704
2705 2705 user = relationship('User')
2706 2706 repository = relationship('Repository')
2707 2707 permission = relationship('Permission')
2708 2708
2709 2709 @classmethod
2710 2710 def create(cls, user, repository, permission):
2711 2711 n = cls()
2712 2712 n.user = user
2713 2713 n.repository = repository
2714 2714 n.permission = permission
2715 2715 Session().add(n)
2716 2716 return n
2717 2717
2718 2718 def __unicode__(self):
2719 2719 return u'<%s => %s >' % (self.user, self.repository)
2720 2720
2721 2721
2722 2722 class UserUserGroupToPerm(Base, BaseModel):
2723 2723 __tablename__ = 'user_user_group_to_perm'
2724 2724 __table_args__ = (
2725 2725 UniqueConstraint('user_id', 'user_group_id', 'permission_id'),
2726 2726 {'extend_existing': True, 'mysql_engine': 'InnoDB',
2727 2727 'mysql_charset': 'utf8', 'sqlite_autoincrement': True}
2728 2728 )
2729 2729 user_user_group_to_perm_id = Column("user_user_group_to_perm_id", Integer(), nullable=False, unique=True, default=None, primary_key=True)
2730 2730 user_id = Column("user_id", Integer(), ForeignKey('users.user_id'), nullable=False, unique=None, default=None)
2731 2731 permission_id = Column("permission_id", Integer(), ForeignKey('permissions.permission_id'), nullable=False, unique=None, default=None)
2732 2732 user_group_id = Column("user_group_id", Integer(), ForeignKey('users_groups.users_group_id'), nullable=False, unique=None, default=None)
2733 2733
2734 2734 user = relationship('User')
2735 2735 user_group = relationship('UserGroup')
2736 2736 permission = relationship('Permission')
2737 2737
2738 2738 @classmethod
2739 2739 def create(cls, user, user_group, permission):
2740 2740 n = cls()
2741 2741 n.user = user
2742 2742 n.user_group = user_group
2743 2743 n.permission = permission
2744 2744 Session().add(n)
2745 2745 return n
2746 2746
2747 2747 def __unicode__(self):
2748 2748 return u'<%s => %s >' % (self.user, self.user_group)
2749 2749
2750 2750
2751 2751 class UserToPerm(Base, BaseModel):
2752 2752 __tablename__ = 'user_to_perm'
2753 2753 __table_args__ = (
2754 2754 UniqueConstraint('user_id', 'permission_id'),
2755 2755 {'extend_existing': True, 'mysql_engine': 'InnoDB',
2756 2756 'mysql_charset': 'utf8', 'sqlite_autoincrement': True}
2757 2757 )
2758 2758 user_to_perm_id = Column("user_to_perm_id", Integer(), nullable=False, unique=True, default=None, primary_key=True)
2759 2759 user_id = Column("user_id", Integer(), ForeignKey('users.user_id'), nullable=False, unique=None, default=None)
2760 2760 permission_id = Column("permission_id", Integer(), ForeignKey('permissions.permission_id'), nullable=False, unique=None, default=None)
2761 2761
2762 2762 user = relationship('User')
2763 2763 permission = relationship('Permission', lazy='joined')
2764 2764
2765 2765 def __unicode__(self):
2766 2766 return u'<%s => %s >' % (self.user, self.permission)
2767 2767
2768 2768
2769 2769 class UserGroupRepoToPerm(Base, BaseModel):
2770 2770 __tablename__ = 'users_group_repo_to_perm'
2771 2771 __table_args__ = (
2772 2772 UniqueConstraint('repository_id', 'users_group_id', 'permission_id'),
2773 2773 {'extend_existing': True, 'mysql_engine': 'InnoDB',
2774 2774 'mysql_charset': 'utf8', 'sqlite_autoincrement': True}
2775 2775 )
2776 2776 users_group_to_perm_id = Column("users_group_to_perm_id", Integer(), nullable=False, unique=True, default=None, primary_key=True)
2777 2777 users_group_id = Column("users_group_id", Integer(), ForeignKey('users_groups.users_group_id'), nullable=False, unique=None, default=None)
2778 2778 permission_id = Column("permission_id", Integer(), ForeignKey('permissions.permission_id'), nullable=False, unique=None, default=None)
2779 2779 repository_id = Column("repository_id", Integer(), ForeignKey('repositories.repo_id'), nullable=False, unique=None, default=None)
2780 2780
2781 2781 users_group = relationship('UserGroup')
2782 2782 permission = relationship('Permission')
2783 2783 repository = relationship('Repository')
2784 2784
2785 2785 @classmethod
2786 2786 def create(cls, users_group, repository, permission):
2787 2787 n = cls()
2788 2788 n.users_group = users_group
2789 2789 n.repository = repository
2790 2790 n.permission = permission
2791 2791 Session().add(n)
2792 2792 return n
2793 2793
2794 2794 def __unicode__(self):
2795 2795 return u'<UserGroupRepoToPerm:%s => %s >' % (self.users_group, self.repository)
2796 2796
2797 2797
2798 2798 class UserGroupUserGroupToPerm(Base, BaseModel):
2799 2799 __tablename__ = 'user_group_user_group_to_perm'
2800 2800 __table_args__ = (
2801 2801 UniqueConstraint('target_user_group_id', 'user_group_id', 'permission_id'),
2802 2802 CheckConstraint('target_user_group_id != user_group_id'),
2803 2803 {'extend_existing': True, 'mysql_engine': 'InnoDB',
2804 2804 'mysql_charset': 'utf8', 'sqlite_autoincrement': True}
2805 2805 )
2806 2806 user_group_user_group_to_perm_id = Column("user_group_user_group_to_perm_id", Integer(), nullable=False, unique=True, default=None, primary_key=True)
2807 2807 target_user_group_id = Column("target_user_group_id", Integer(), ForeignKey('users_groups.users_group_id'), nullable=False, unique=None, default=None)
2808 2808 permission_id = Column("permission_id", Integer(), ForeignKey('permissions.permission_id'), nullable=False, unique=None, default=None)
2809 2809 user_group_id = Column("user_group_id", Integer(), ForeignKey('users_groups.users_group_id'), nullable=False, unique=None, default=None)
2810 2810
2811 2811 target_user_group = relationship('UserGroup', primaryjoin='UserGroupUserGroupToPerm.target_user_group_id==UserGroup.users_group_id')
2812 2812 user_group = relationship('UserGroup', primaryjoin='UserGroupUserGroupToPerm.user_group_id==UserGroup.users_group_id')
2813 2813 permission = relationship('Permission')
2814 2814
2815 2815 @classmethod
2816 2816 def create(cls, target_user_group, user_group, permission):
2817 2817 n = cls()
2818 2818 n.target_user_group = target_user_group
2819 2819 n.user_group = user_group
2820 2820 n.permission = permission
2821 2821 Session().add(n)
2822 2822 return n
2823 2823
2824 2824 def __unicode__(self):
2825 2825 return u'<UserGroupUserGroup:%s => %s >' % (self.target_user_group, self.user_group)
2826 2826
2827 2827
2828 2828 class UserGroupToPerm(Base, BaseModel):
2829 2829 __tablename__ = 'users_group_to_perm'
2830 2830 __table_args__ = (
2831 2831 UniqueConstraint('users_group_id', 'permission_id',),
2832 2832 {'extend_existing': True, 'mysql_engine': 'InnoDB',
2833 2833 'mysql_charset': 'utf8', 'sqlite_autoincrement': True}
2834 2834 )
2835 2835 users_group_to_perm_id = Column("users_group_to_perm_id", Integer(), nullable=False, unique=True, default=None, primary_key=True)
2836 2836 users_group_id = Column("users_group_id", Integer(), ForeignKey('users_groups.users_group_id'), nullable=False, unique=None, default=None)
2837 2837 permission_id = Column("permission_id", Integer(), ForeignKey('permissions.permission_id'), nullable=False, unique=None, default=None)
2838 2838
2839 2839 users_group = relationship('UserGroup')
2840 2840 permission = relationship('Permission')
2841 2841
2842 2842
2843 2843 class UserRepoGroupToPerm(Base, BaseModel):
2844 2844 __tablename__ = 'user_repo_group_to_perm'
2845 2845 __table_args__ = (
2846 2846 UniqueConstraint('user_id', 'group_id', 'permission_id'),
2847 2847 {'extend_existing': True, 'mysql_engine': 'InnoDB',
2848 2848 'mysql_charset': 'utf8', 'sqlite_autoincrement': True}
2849 2849 )
2850 2850
2851 2851 group_to_perm_id = Column("group_to_perm_id", Integer(), nullable=False, unique=True, default=None, primary_key=True)
2852 2852 user_id = Column("user_id", Integer(), ForeignKey('users.user_id'), nullable=False, unique=None, default=None)
2853 2853 group_id = Column("group_id", Integer(), ForeignKey('groups.group_id'), nullable=False, unique=None, default=None)
2854 2854 permission_id = Column("permission_id", Integer(), ForeignKey('permissions.permission_id'), nullable=False, unique=None, default=None)
2855 2855
2856 2856 user = relationship('User')
2857 2857 group = relationship('RepoGroup')
2858 2858 permission = relationship('Permission')
2859 2859
2860 2860 @classmethod
2861 2861 def create(cls, user, repository_group, permission):
2862 2862 n = cls()
2863 2863 n.user = user
2864 2864 n.group = repository_group
2865 2865 n.permission = permission
2866 2866 Session().add(n)
2867 2867 return n
2868 2868
2869 2869
2870 2870 class UserGroupRepoGroupToPerm(Base, BaseModel):
2871 2871 __tablename__ = 'users_group_repo_group_to_perm'
2872 2872 __table_args__ = (
2873 2873 UniqueConstraint('users_group_id', 'group_id'),
2874 2874 {'extend_existing': True, 'mysql_engine': 'InnoDB',
2875 2875 'mysql_charset': 'utf8', 'sqlite_autoincrement': True}
2876 2876 )
2877 2877
2878 2878 users_group_repo_group_to_perm_id = Column("users_group_repo_group_to_perm_id", Integer(), nullable=False, unique=True, default=None, primary_key=True)
2879 2879 users_group_id = Column("users_group_id", Integer(), ForeignKey('users_groups.users_group_id'), nullable=False, unique=None, default=None)
2880 2880 group_id = Column("group_id", Integer(), ForeignKey('groups.group_id'), nullable=False, unique=None, default=None)
2881 2881 permission_id = Column("permission_id", Integer(), ForeignKey('permissions.permission_id'), nullable=False, unique=None, default=None)
2882 2882
2883 2883 users_group = relationship('UserGroup')
2884 2884 permission = relationship('Permission')
2885 2885 group = relationship('RepoGroup')
2886 2886
2887 2887 @classmethod
2888 2888 def create(cls, user_group, repository_group, permission):
2889 2889 n = cls()
2890 2890 n.users_group = user_group
2891 2891 n.group = repository_group
2892 2892 n.permission = permission
2893 2893 Session().add(n)
2894 2894 return n
2895 2895
2896 2896 def __unicode__(self):
2897 2897 return u'<UserGroupRepoGroupToPerm:%s => %s >' % (self.users_group, self.group)
2898 2898
2899 2899
2900 2900 class Statistics(Base, BaseModel):
2901 2901 __tablename__ = 'statistics'
2902 2902 __table_args__ = (
2903 2903 UniqueConstraint('repository_id'),
2904 2904 {'extend_existing': True, 'mysql_engine': 'InnoDB',
2905 2905 'mysql_charset': 'utf8', 'sqlite_autoincrement': True}
2906 2906 )
2907 2907 stat_id = Column("stat_id", Integer(), nullable=False, unique=True, default=None, primary_key=True)
2908 2908 repository_id = Column("repository_id", Integer(), ForeignKey('repositories.repo_id'), nullable=False, unique=True, default=None)
2909 2909 stat_on_revision = Column("stat_on_revision", Integer(), nullable=False)
2910 2910 commit_activity = Column("commit_activity", LargeBinary(1000000), nullable=False)#JSON data
2911 2911 commit_activity_combined = Column("commit_activity_combined", LargeBinary(), nullable=False)#JSON data
2912 2912 languages = Column("languages", LargeBinary(1000000), nullable=False)#JSON data
2913 2913
2914 2914 repository = relationship('Repository', single_parent=True)
2915 2915
2916 2916
2917 2917 class UserFollowing(Base, BaseModel):
2918 2918 __tablename__ = 'user_followings'
2919 2919 __table_args__ = (
2920 2920 UniqueConstraint('user_id', 'follows_repository_id'),
2921 2921 UniqueConstraint('user_id', 'follows_user_id'),
2922 2922 {'extend_existing': True, 'mysql_engine': 'InnoDB',
2923 2923 'mysql_charset': 'utf8', 'sqlite_autoincrement': True}
2924 2924 )
2925 2925
2926 2926 user_following_id = Column("user_following_id", Integer(), nullable=False, unique=True, default=None, primary_key=True)
2927 2927 user_id = Column("user_id", Integer(), ForeignKey('users.user_id'), nullable=False, unique=None, default=None)
2928 2928 follows_repo_id = Column("follows_repository_id", Integer(), ForeignKey('repositories.repo_id'), nullable=True, unique=None, default=None)
2929 2929 follows_user_id = Column("follows_user_id", Integer(), ForeignKey('users.user_id'), nullable=True, unique=None, default=None)
2930 2930 follows_from = Column('follows_from', DateTime(timezone=False), nullable=True, unique=None, default=datetime.datetime.now)
2931 2931
2932 2932 user = relationship('User', primaryjoin='User.user_id==UserFollowing.user_id')
2933 2933
2934 2934 follows_user = relationship('User', primaryjoin='User.user_id==UserFollowing.follows_user_id')
2935 2935 follows_repository = relationship('Repository', order_by='Repository.repo_name')
2936 2936
2937 2937 @classmethod
2938 2938 def get_repo_followers(cls, repo_id):
2939 2939 return cls.query().filter(cls.follows_repo_id == repo_id)
2940 2940
2941 2941
2942 2942 class CacheKey(Base, BaseModel):
2943 2943 __tablename__ = 'cache_invalidation'
2944 2944 __table_args__ = (
2945 2945 UniqueConstraint('cache_key'),
2946 2946 Index('key_idx', 'cache_key'),
2947 2947 {'extend_existing': True, 'mysql_engine': 'InnoDB',
2948 2948 'mysql_charset': 'utf8', 'sqlite_autoincrement': True},
2949 2949 )
2950 2950 CACHE_TYPE_ATOM = 'ATOM'
2951 2951 CACHE_TYPE_RSS = 'RSS'
2952 2952 CACHE_TYPE_README = 'README'
2953 2953
2954 2954 cache_id = Column("cache_id", Integer(), nullable=False, unique=True, default=None, primary_key=True)
2955 2955 cache_key = Column("cache_key", String(255), nullable=True, unique=None, default=None)
2956 2956 cache_args = Column("cache_args", String(255), nullable=True, unique=None, default=None)
2957 2957 cache_active = Column("cache_active", Boolean(), nullable=True, unique=None, default=False)
2958 2958
2959 2959 def __init__(self, cache_key, cache_args=''):
2960 2960 self.cache_key = cache_key
2961 2961 self.cache_args = cache_args
2962 2962 self.cache_active = False
2963 2963
2964 2964 def __unicode__(self):
2965 2965 return u"<%s('%s:%s[%s]')>" % (
2966 2966 self.__class__.__name__,
2967 2967 self.cache_id, self.cache_key, self.cache_active)
2968 2968
2969 2969 def _cache_key_partition(self):
2970 2970 prefix, repo_name, suffix = self.cache_key.partition(self.cache_args)
2971 2971 return prefix, repo_name, suffix
2972 2972
2973 2973 def get_prefix(self):
2974 2974 """
2975 2975 Try to extract prefix from existing cache key. The key could consist
2976 2976 of prefix, repo_name, suffix
2977 2977 """
2978 2978 # this returns prefix, repo_name, suffix
2979 2979 return self._cache_key_partition()[0]
2980 2980
2981 2981 def get_suffix(self):
2982 2982 """
2983 2983 get suffix that might have been used in _get_cache_key to
2984 2984 generate self.cache_key. Only used for informational purposes
2985 2985 in repo_edit.mako.
2986 2986 """
2987 2987 # prefix, repo_name, suffix
2988 2988 return self._cache_key_partition()[2]
2989 2989
2990 2990 @classmethod
2991 2991 def delete_all_cache(cls):
2992 2992 """
2993 2993 Delete all cache keys from database.
2994 2994 Should only be run when all instances are down and all entries
2995 2995 thus stale.
2996 2996 """
2997 2997 cls.query().delete()
2998 2998 Session().commit()
2999 2999
3000 3000 @classmethod
3001 3001 def get_cache_key(cls, repo_name, cache_type):
3002 3002 """
3003 3003
3004 3004 Generate a cache key for this process of RhodeCode instance.
3005 3005 Prefix most likely will be process id or maybe explicitly set
3006 3006 instance_id from .ini file.
3007 3007 """
3008 3008 import rhodecode
3009 3009 prefix = safe_unicode(rhodecode.CONFIG.get('instance_id') or '')
3010 3010
3011 3011 repo_as_unicode = safe_unicode(repo_name)
3012 3012 key = u'{}_{}'.format(repo_as_unicode, cache_type) \
3013 3013 if cache_type else repo_as_unicode
3014 3014
3015 3015 return u'{}{}'.format(prefix, key)
3016 3016
3017 3017 @classmethod
3018 3018 def set_invalidate(cls, repo_name, delete=False):
3019 3019 """
3020 3020 Mark all caches of a repo as invalid in the database.
3021 3021 """
3022 3022
3023 3023 try:
3024 3024 qry = Session().query(cls).filter(cls.cache_args == repo_name)
3025 3025 if delete:
3026 3026 log.debug('cache objects deleted for repo %s',
3027 3027 safe_str(repo_name))
3028 3028 qry.delete()
3029 3029 else:
3030 3030 log.debug('cache objects marked as invalid for repo %s',
3031 3031 safe_str(repo_name))
3032 3032 qry.update({"cache_active": False})
3033 3033
3034 3034 Session().commit()
3035 3035 except Exception:
3036 3036 log.exception(
3037 3037 'Cache key invalidation failed for repository %s',
3038 3038 safe_str(repo_name))
3039 3039 Session().rollback()
3040 3040
3041 3041 @classmethod
3042 3042 def get_active_cache(cls, cache_key):
3043 3043 inv_obj = cls.query().filter(cls.cache_key == cache_key).scalar()
3044 3044 if inv_obj:
3045 3045 return inv_obj
3046 3046 return None
3047 3047
3048 3048 @classmethod
3049 3049 def repo_context_cache(cls, compute_func, repo_name, cache_type,
3050 3050 thread_scoped=False):
3051 3051 """
3052 3052 @cache_region('long_term')
3053 3053 def _heavy_calculation(cache_key):
3054 3054 return 'result'
3055 3055
3056 3056 cache_context = CacheKey.repo_context_cache(
3057 3057 _heavy_calculation, repo_name, cache_type)
3058 3058
3059 3059 with cache_context as context:
3060 3060 context.invalidate()
3061 3061 computed = context.compute()
3062 3062
3063 3063 assert computed == 'result'
3064 3064 """
3065 3065 from rhodecode.lib import caches
3066 3066 return caches.InvalidationContext(
3067 3067 compute_func, repo_name, cache_type, thread_scoped=thread_scoped)
3068 3068
3069 3069
3070 3070 class ChangesetComment(Base, BaseModel):
3071 3071 __tablename__ = 'changeset_comments'
3072 3072 __table_args__ = (
3073 3073 Index('cc_revision_idx', 'revision'),
3074 3074 {'extend_existing': True, 'mysql_engine': 'InnoDB',
3075 3075 'mysql_charset': 'utf8', 'sqlite_autoincrement': True},
3076 3076 )
3077 3077
3078 3078 COMMENT_OUTDATED = u'comment_outdated'
3079 3079 COMMENT_TYPE_NOTE = u'note'
3080 3080 COMMENT_TYPE_TODO = u'todo'
3081 3081 COMMENT_TYPES = [COMMENT_TYPE_NOTE, COMMENT_TYPE_TODO]
3082 3082
3083 3083 comment_id = Column('comment_id', Integer(), nullable=False, primary_key=True)
3084 3084 repo_id = Column('repo_id', Integer(), ForeignKey('repositories.repo_id'), nullable=False)
3085 3085 revision = Column('revision', String(40), nullable=True)
3086 3086 pull_request_id = Column("pull_request_id", Integer(), ForeignKey('pull_requests.pull_request_id'), nullable=True)
3087 3087 pull_request_version_id = Column("pull_request_version_id", Integer(), ForeignKey('pull_request_versions.pull_request_version_id'), nullable=True)
3088 3088 line_no = Column('line_no', Unicode(10), nullable=True)
3089 3089 hl_lines = Column('hl_lines', Unicode(512), nullable=True)
3090 3090 f_path = Column('f_path', Unicode(1000), nullable=True)
3091 3091 user_id = Column('user_id', Integer(), ForeignKey('users.user_id'), nullable=False)
3092 3092 text = Column('text', UnicodeText().with_variant(UnicodeText(25000), 'mysql'), nullable=False)
3093 3093 created_on = Column('created_on', DateTime(timezone=False), nullable=False, default=datetime.datetime.now)
3094 3094 modified_at = Column('modified_at', DateTime(timezone=False), nullable=False, default=datetime.datetime.now)
3095 3095 renderer = Column('renderer', Unicode(64), nullable=True)
3096 3096 display_state = Column('display_state', Unicode(128), nullable=True)
3097 3097
3098 3098 comment_type = Column('comment_type', Unicode(128), nullable=True, default=COMMENT_TYPE_NOTE)
3099 3099 resolved_comment_id = Column('resolved_comment_id', Integer(), ForeignKey('changeset_comments.comment_id'), nullable=True)
3100 3100 resolved_comment = relationship('ChangesetComment', remote_side=comment_id, backref='resolved_by')
3101 3101 author = relationship('User', lazy='joined')
3102 3102 repo = relationship('Repository')
3103 3103 status_change = relationship('ChangesetStatus', cascade="all, delete, delete-orphan", lazy='joined')
3104 3104 pull_request = relationship('PullRequest', lazy='joined')
3105 3105 pull_request_version = relationship('PullRequestVersion')
3106 3106
3107 3107 @classmethod
3108 3108 def get_users(cls, revision=None, pull_request_id=None):
3109 3109 """
3110 3110 Returns user associated with this ChangesetComment. ie those
3111 3111 who actually commented
3112 3112
3113 3113 :param cls:
3114 3114 :param revision:
3115 3115 """
3116 3116 q = Session().query(User)\
3117 3117 .join(ChangesetComment.author)
3118 3118 if revision:
3119 3119 q = q.filter(cls.revision == revision)
3120 3120 elif pull_request_id:
3121 3121 q = q.filter(cls.pull_request_id == pull_request_id)
3122 3122 return q.all()
3123 3123
3124 3124 @classmethod
3125 3125 def get_index_from_version(cls, pr_version, versions):
3126 3126 num_versions = [x.pull_request_version_id for x in versions]
3127 3127 try:
3128 3128 return num_versions.index(pr_version) +1
3129 3129 except (IndexError, ValueError):
3130 3130 return
3131 3131
3132 3132 @property
3133 3133 def outdated(self):
3134 3134 return self.display_state == self.COMMENT_OUTDATED
3135 3135
3136 3136 def outdated_at_version(self, version):
3137 3137 """
3138 3138 Checks if comment is outdated for given pull request version
3139 3139 """
3140 3140 return self.outdated and self.pull_request_version_id != version
3141 3141
3142 3142 def older_than_version(self, version):
3143 3143 """
3144 3144 Checks if comment is made from previous version than given
3145 3145 """
3146 3146 if version is None:
3147 3147 return self.pull_request_version_id is not None
3148 3148
3149 3149 return self.pull_request_version_id < version
3150 3150
3151 3151 @property
3152 3152 def resolved(self):
3153 3153 return self.resolved_by[0] if self.resolved_by else None
3154 3154
3155 3155 @property
3156 3156 def is_todo(self):
3157 3157 return self.comment_type == self.COMMENT_TYPE_TODO
3158 3158
3159 3159 @property
3160 3160 def is_inline(self):
3161 3161 return self.line_no and self.f_path
3162 3162
3163 3163 def get_index_version(self, versions):
3164 3164 return self.get_index_from_version(
3165 3165 self.pull_request_version_id, versions)
3166 3166
3167 3167 def __repr__(self):
3168 3168 if self.comment_id:
3169 3169 return '<DB:Comment #%s>' % self.comment_id
3170 3170 else:
3171 3171 return '<DB:Comment at %#x>' % id(self)
3172 3172
3173 3173 def get_api_data(self):
3174 3174 comment = self
3175 3175 data = {
3176 3176 'comment_id': comment.comment_id,
3177 3177 'comment_type': comment.comment_type,
3178 3178 'comment_text': comment.text,
3179 3179 'comment_status': comment.status_change,
3180 3180 'comment_f_path': comment.f_path,
3181 3181 'comment_lineno': comment.line_no,
3182 3182 'comment_author': comment.author,
3183 3183 'comment_created_on': comment.created_on
3184 3184 }
3185 3185 return data
3186 3186
3187 3187 def __json__(self):
3188 3188 data = dict()
3189 3189 data.update(self.get_api_data())
3190 3190 return data
3191 3191
3192 3192
3193 3193 class ChangesetStatus(Base, BaseModel):
3194 3194 __tablename__ = 'changeset_statuses'
3195 3195 __table_args__ = (
3196 3196 Index('cs_revision_idx', 'revision'),
3197 3197 Index('cs_version_idx', 'version'),
3198 3198 UniqueConstraint('repo_id', 'revision', 'version'),
3199 3199 {'extend_existing': True, 'mysql_engine': 'InnoDB',
3200 3200 'mysql_charset': 'utf8', 'sqlite_autoincrement': True}
3201 3201 )
3202 3202 STATUS_NOT_REVIEWED = DEFAULT = 'not_reviewed'
3203 3203 STATUS_APPROVED = 'approved'
3204 3204 STATUS_REJECTED = 'rejected'
3205 3205 STATUS_UNDER_REVIEW = 'under_review'
3206 3206
3207 3207 STATUSES = [
3208 3208 (STATUS_NOT_REVIEWED, _("Not Reviewed")), # (no icon) and default
3209 3209 (STATUS_APPROVED, _("Approved")),
3210 3210 (STATUS_REJECTED, _("Rejected")),
3211 3211 (STATUS_UNDER_REVIEW, _("Under Review")),
3212 3212 ]
3213 3213
3214 3214 changeset_status_id = Column('changeset_status_id', Integer(), nullable=False, primary_key=True)
3215 3215 repo_id = Column('repo_id', Integer(), ForeignKey('repositories.repo_id'), nullable=False)
3216 3216 user_id = Column("user_id", Integer(), ForeignKey('users.user_id'), nullable=False, unique=None)
3217 3217 revision = Column('revision', String(40), nullable=False)
3218 3218 status = Column('status', String(128), nullable=False, default=DEFAULT)
3219 3219 changeset_comment_id = Column('changeset_comment_id', Integer(), ForeignKey('changeset_comments.comment_id'))
3220 3220 modified_at = Column('modified_at', DateTime(), nullable=False, default=datetime.datetime.now)
3221 3221 version = Column('version', Integer(), nullable=False, default=0)
3222 3222 pull_request_id = Column("pull_request_id", Integer(), ForeignKey('pull_requests.pull_request_id'), nullable=True)
3223 3223
3224 3224 author = relationship('User', lazy='joined')
3225 3225 repo = relationship('Repository')
3226 3226 comment = relationship('ChangesetComment', lazy='joined')
3227 3227 pull_request = relationship('PullRequest', lazy='joined')
3228 3228
3229 3229 def __unicode__(self):
3230 3230 return u"<%s('%s[v%s]:%s')>" % (
3231 3231 self.__class__.__name__,
3232 3232 self.status, self.version, self.author
3233 3233 )
3234 3234
3235 3235 @classmethod
3236 3236 def get_status_lbl(cls, value):
3237 3237 return dict(cls.STATUSES).get(value)
3238 3238
3239 3239 @property
3240 3240 def status_lbl(self):
3241 3241 return ChangesetStatus.get_status_lbl(self.status)
3242 3242
3243 3243 def get_api_data(self):
3244 3244 status = self
3245 3245 data = {
3246 3246 'status_id': status.changeset_status_id,
3247 3247 'status': status.status,
3248 3248 }
3249 3249 return data
3250 3250
3251 3251 def __json__(self):
3252 3252 data = dict()
3253 3253 data.update(self.get_api_data())
3254 3254 return data
3255 3255
3256 3256
3257 3257 class _PullRequestBase(BaseModel):
3258 3258 """
3259 3259 Common attributes of pull request and version entries.
3260 3260 """
3261 3261
3262 3262 # .status values
3263 3263 STATUS_NEW = u'new'
3264 3264 STATUS_OPEN = u'open'
3265 3265 STATUS_CLOSED = u'closed'
3266 3266
3267 3267 title = Column('title', Unicode(255), nullable=True)
3268 3268 description = Column(
3269 3269 'description', UnicodeText().with_variant(UnicodeText(10240), 'mysql'),
3270 3270 nullable=True)
3271 3271 # new/open/closed status of pull request (not approve/reject/etc)
3272 3272 status = Column('status', Unicode(255), nullable=False, default=STATUS_NEW)
3273 3273 created_on = Column(
3274 3274 'created_on', DateTime(timezone=False), nullable=False,
3275 3275 default=datetime.datetime.now)
3276 3276 updated_on = Column(
3277 3277 'updated_on', DateTime(timezone=False), nullable=False,
3278 3278 default=datetime.datetime.now)
3279 3279
3280 3280 @declared_attr
3281 3281 def user_id(cls):
3282 3282 return Column(
3283 3283 "user_id", Integer(), ForeignKey('users.user_id'), nullable=False,
3284 3284 unique=None)
3285 3285
3286 3286 # 500 revisions max
3287 3287 _revisions = Column(
3288 3288 'revisions', UnicodeText().with_variant(UnicodeText(20500), 'mysql'))
3289 3289
3290 3290 @declared_attr
3291 3291 def source_repo_id(cls):
3292 3292 # TODO: dan: rename column to source_repo_id
3293 3293 return Column(
3294 3294 'org_repo_id', Integer(), ForeignKey('repositories.repo_id'),
3295 3295 nullable=False)
3296 3296
3297 3297 source_ref = Column('org_ref', Unicode(255), nullable=False)
3298 3298
3299 3299 @declared_attr
3300 3300 def target_repo_id(cls):
3301 3301 # TODO: dan: rename column to target_repo_id
3302 3302 return Column(
3303 3303 'other_repo_id', Integer(), ForeignKey('repositories.repo_id'),
3304 3304 nullable=False)
3305 3305
3306 3306 target_ref = Column('other_ref', Unicode(255), nullable=False)
3307 3307 _shadow_merge_ref = Column('shadow_merge_ref', Unicode(255), nullable=True)
3308 3308
3309 3309 # TODO: dan: rename column to last_merge_source_rev
3310 3310 _last_merge_source_rev = Column(
3311 3311 'last_merge_org_rev', String(40), nullable=True)
3312 3312 # TODO: dan: rename column to last_merge_target_rev
3313 3313 _last_merge_target_rev = Column(
3314 3314 'last_merge_other_rev', String(40), nullable=True)
3315 3315 _last_merge_status = Column('merge_status', Integer(), nullable=True)
3316 3316 merge_rev = Column('merge_rev', String(40), nullable=True)
3317 3317
3318 3318 reviewer_data = Column(
3319 3319 'reviewer_data_json', MutationObj.as_mutable(
3320 3320 JsonType(dialect_map=dict(mysql=UnicodeText(16384)))))
3321 3321
3322 3322 @property
3323 3323 def reviewer_data_json(self):
3324 3324 return json.dumps(self.reviewer_data)
3325 3325
3326 3326 @hybrid_property
3327 3327 def description_safe(self):
3328 3328 from rhodecode.lib import helpers as h
3329 3329 return h.escape(self.description)
3330 3330
3331 3331 @hybrid_property
3332 3332 def revisions(self):
3333 3333 return self._revisions.split(':') if self._revisions else []
3334 3334
3335 3335 @revisions.setter
3336 3336 def revisions(self, val):
3337 3337 self._revisions = ':'.join(val)
3338 3338
3339 3339 @declared_attr
3340 3340 def author(cls):
3341 3341 return relationship('User', lazy='joined')
3342 3342
3343 3343 @declared_attr
3344 3344 def source_repo(cls):
3345 3345 return relationship(
3346 3346 'Repository',
3347 3347 primaryjoin='%s.source_repo_id==Repository.repo_id' % cls.__name__)
3348 3348
3349 3349 @property
3350 3350 def source_ref_parts(self):
3351 3351 return self.unicode_to_reference(self.source_ref)
3352 3352
3353 3353 @declared_attr
3354 3354 def target_repo(cls):
3355 3355 return relationship(
3356 3356 'Repository',
3357 3357 primaryjoin='%s.target_repo_id==Repository.repo_id' % cls.__name__)
3358 3358
3359 3359 @property
3360 3360 def target_ref_parts(self):
3361 3361 return self.unicode_to_reference(self.target_ref)
3362 3362
3363 3363 @property
3364 3364 def shadow_merge_ref(self):
3365 3365 return self.unicode_to_reference(self._shadow_merge_ref)
3366 3366
3367 3367 @shadow_merge_ref.setter
3368 3368 def shadow_merge_ref(self, ref):
3369 3369 self._shadow_merge_ref = self.reference_to_unicode(ref)
3370 3370
3371 3371 def unicode_to_reference(self, raw):
3372 3372 """
3373 3373 Convert a unicode (or string) to a reference object.
3374 3374 If unicode evaluates to False it returns None.
3375 3375 """
3376 3376 if raw:
3377 3377 refs = raw.split(':')
3378 3378 return Reference(*refs)
3379 3379 else:
3380 3380 return None
3381 3381
3382 3382 def reference_to_unicode(self, ref):
3383 3383 """
3384 3384 Convert a reference object to unicode.
3385 3385 If reference is None it returns None.
3386 3386 """
3387 3387 if ref:
3388 3388 return u':'.join(ref)
3389 3389 else:
3390 3390 return None
3391 3391
3392 3392 def get_api_data(self, with_merge_state=True):
3393 3393 from rhodecode.model.pull_request import PullRequestModel
3394 3394
3395 3395 pull_request = self
3396 3396 if with_merge_state:
3397 3397 merge_status = PullRequestModel().merge_status(pull_request)
3398 3398 merge_state = {
3399 3399 'status': merge_status[0],
3400 3400 'message': safe_unicode(merge_status[1]),
3401 3401 }
3402 3402 else:
3403 3403 merge_state = {'status': 'not_available',
3404 3404 'message': 'not_available'}
3405 3405
3406 3406 merge_data = {
3407 3407 'clone_url': PullRequestModel().get_shadow_clone_url(pull_request),
3408 3408 'reference': (
3409 3409 pull_request.shadow_merge_ref._asdict()
3410 3410 if pull_request.shadow_merge_ref else None),
3411 3411 }
3412 3412
3413 3413 data = {
3414 3414 'pull_request_id': pull_request.pull_request_id,
3415 3415 'url': PullRequestModel().get_url(pull_request),
3416 3416 'title': pull_request.title,
3417 3417 'description': pull_request.description,
3418 3418 'status': pull_request.status,
3419 3419 'created_on': pull_request.created_on,
3420 3420 'updated_on': pull_request.updated_on,
3421 3421 'commit_ids': pull_request.revisions,
3422 3422 'review_status': pull_request.calculated_review_status(),
3423 3423 'mergeable': merge_state,
3424 3424 'source': {
3425 3425 'clone_url': pull_request.source_repo.clone_url(),
3426 3426 'repository': pull_request.source_repo.repo_name,
3427 3427 'reference': {
3428 3428 'name': pull_request.source_ref_parts.name,
3429 3429 'type': pull_request.source_ref_parts.type,
3430 3430 'commit_id': pull_request.source_ref_parts.commit_id,
3431 3431 },
3432 3432 },
3433 3433 'target': {
3434 3434 'clone_url': pull_request.target_repo.clone_url(),
3435 3435 'repository': pull_request.target_repo.repo_name,
3436 3436 'reference': {
3437 3437 'name': pull_request.target_ref_parts.name,
3438 3438 'type': pull_request.target_ref_parts.type,
3439 3439 'commit_id': pull_request.target_ref_parts.commit_id,
3440 3440 },
3441 3441 },
3442 3442 'merge': merge_data,
3443 3443 'author': pull_request.author.get_api_data(include_secrets=False,
3444 3444 details='basic'),
3445 3445 'reviewers': [
3446 3446 {
3447 3447 'user': reviewer.get_api_data(include_secrets=False,
3448 3448 details='basic'),
3449 3449 'reasons': reasons,
3450 3450 'review_status': st[0][1].status if st else 'not_reviewed',
3451 3451 }
3452 3452 for reviewer, reasons, mandatory, st in
3453 3453 pull_request.reviewers_statuses()
3454 3454 ]
3455 3455 }
3456 3456
3457 3457 return data
3458 3458
3459 3459
3460 3460 class PullRequest(Base, _PullRequestBase):
3461 3461 __tablename__ = 'pull_requests'
3462 3462 __table_args__ = (
3463 3463 {'extend_existing': True, 'mysql_engine': 'InnoDB',
3464 3464 'mysql_charset': 'utf8', 'sqlite_autoincrement': True},
3465 3465 )
3466 3466
3467 3467 pull_request_id = Column(
3468 3468 'pull_request_id', Integer(), nullable=False, primary_key=True)
3469 3469
3470 3470 def __repr__(self):
3471 3471 if self.pull_request_id:
3472 3472 return '<DB:PullRequest #%s>' % self.pull_request_id
3473 3473 else:
3474 3474 return '<DB:PullRequest at %#x>' % id(self)
3475 3475
3476 3476 reviewers = relationship('PullRequestReviewers',
3477 3477 cascade="all, delete, delete-orphan")
3478 3478 statuses = relationship('ChangesetStatus',
3479 3479 cascade="all, delete, delete-orphan")
3480 3480 comments = relationship('ChangesetComment',
3481 3481 cascade="all, delete, delete-orphan")
3482 3482 versions = relationship('PullRequestVersion',
3483 3483 cascade="all, delete, delete-orphan",
3484 3484 lazy='dynamic')
3485 3485
3486 3486 @classmethod
3487 3487 def get_pr_display_object(cls, pull_request_obj, org_pull_request_obj,
3488 3488 internal_methods=None):
3489 3489
3490 3490 class PullRequestDisplay(object):
3491 3491 """
3492 3492 Special object wrapper for showing PullRequest data via Versions
3493 3493 It mimics PR object as close as possible. This is read only object
3494 3494 just for display
3495 3495 """
3496 3496
3497 3497 def __init__(self, attrs, internal=None):
3498 3498 self.attrs = attrs
3499 3499 # internal have priority over the given ones via attrs
3500 3500 self.internal = internal or ['versions']
3501 3501
3502 3502 def __getattr__(self, item):
3503 3503 if item in self.internal:
3504 3504 return getattr(self, item)
3505 3505 try:
3506 3506 return self.attrs[item]
3507 3507 except KeyError:
3508 3508 raise AttributeError(
3509 3509 '%s object has no attribute %s' % (self, item))
3510 3510
3511 3511 def __repr__(self):
3512 3512 return '<DB:PullRequestDisplay #%s>' % self.attrs.get('pull_request_id')
3513 3513
3514 3514 def versions(self):
3515 3515 return pull_request_obj.versions.order_by(
3516 3516 PullRequestVersion.pull_request_version_id).all()
3517 3517
3518 3518 def is_closed(self):
3519 3519 return pull_request_obj.is_closed()
3520 3520
3521 3521 @property
3522 3522 def pull_request_version_id(self):
3523 3523 return getattr(pull_request_obj, 'pull_request_version_id', None)
3524 3524
3525 3525 attrs = StrictAttributeDict(pull_request_obj.get_api_data())
3526 3526
3527 3527 attrs.author = StrictAttributeDict(
3528 3528 pull_request_obj.author.get_api_data())
3529 3529 if pull_request_obj.target_repo:
3530 3530 attrs.target_repo = StrictAttributeDict(
3531 3531 pull_request_obj.target_repo.get_api_data())
3532 3532 attrs.target_repo.clone_url = pull_request_obj.target_repo.clone_url
3533 3533
3534 3534 if pull_request_obj.source_repo:
3535 3535 attrs.source_repo = StrictAttributeDict(
3536 3536 pull_request_obj.source_repo.get_api_data())
3537 3537 attrs.source_repo.clone_url = pull_request_obj.source_repo.clone_url
3538 3538
3539 3539 attrs.source_ref_parts = pull_request_obj.source_ref_parts
3540 3540 attrs.target_ref_parts = pull_request_obj.target_ref_parts
3541 3541 attrs.revisions = pull_request_obj.revisions
3542 3542
3543 3543 attrs.shadow_merge_ref = org_pull_request_obj.shadow_merge_ref
3544 3544 attrs.reviewer_data = org_pull_request_obj.reviewer_data
3545 3545 attrs.reviewer_data_json = org_pull_request_obj.reviewer_data_json
3546 3546
3547 3547 return PullRequestDisplay(attrs, internal=internal_methods)
3548 3548
3549 3549 def is_closed(self):
3550 3550 return self.status == self.STATUS_CLOSED
3551 3551
3552 3552 def __json__(self):
3553 3553 return {
3554 3554 'revisions': self.revisions,
3555 3555 }
3556 3556
3557 3557 def calculated_review_status(self):
3558 3558 from rhodecode.model.changeset_status import ChangesetStatusModel
3559 3559 return ChangesetStatusModel().calculated_review_status(self)
3560 3560
3561 3561 def reviewers_statuses(self):
3562 3562 from rhodecode.model.changeset_status import ChangesetStatusModel
3563 3563 return ChangesetStatusModel().reviewers_statuses(self)
3564 3564
3565 3565 @property
3566 3566 def workspace_id(self):
3567 3567 from rhodecode.model.pull_request import PullRequestModel
3568 3568 return PullRequestModel()._workspace_id(self)
3569 3569
3570 3570 def get_shadow_repo(self):
3571 3571 workspace_id = self.workspace_id
3572 3572 vcs_obj = self.target_repo.scm_instance()
3573 3573 shadow_repository_path = vcs_obj._get_shadow_repository_path(
3574 3574 workspace_id)
3575 3575 return vcs_obj._get_shadow_instance(shadow_repository_path)
3576 3576
3577 3577
3578 3578 class PullRequestVersion(Base, _PullRequestBase):
3579 3579 __tablename__ = 'pull_request_versions'
3580 3580 __table_args__ = (
3581 3581 {'extend_existing': True, 'mysql_engine': 'InnoDB',
3582 3582 'mysql_charset': 'utf8', 'sqlite_autoincrement': True},
3583 3583 )
3584 3584
3585 3585 pull_request_version_id = Column(
3586 3586 'pull_request_version_id', Integer(), nullable=False, primary_key=True)
3587 3587 pull_request_id = Column(
3588 3588 'pull_request_id', Integer(),
3589 3589 ForeignKey('pull_requests.pull_request_id'), nullable=False)
3590 3590 pull_request = relationship('PullRequest')
3591 3591
3592 3592 def __repr__(self):
3593 3593 if self.pull_request_version_id:
3594 3594 return '<DB:PullRequestVersion #%s>' % self.pull_request_version_id
3595 3595 else:
3596 3596 return '<DB:PullRequestVersion at %#x>' % id(self)
3597 3597
3598 3598 @property
3599 3599 def reviewers(self):
3600 3600 return self.pull_request.reviewers
3601 3601
3602 3602 @property
3603 3603 def versions(self):
3604 3604 return self.pull_request.versions
3605 3605
3606 3606 def is_closed(self):
3607 3607 # calculate from original
3608 3608 return self.pull_request.status == self.STATUS_CLOSED
3609 3609
3610 3610 def calculated_review_status(self):
3611 3611 return self.pull_request.calculated_review_status()
3612 3612
3613 3613 def reviewers_statuses(self):
3614 3614 return self.pull_request.reviewers_statuses()
3615 3615
3616 3616
3617 3617 class PullRequestReviewers(Base, BaseModel):
3618 3618 __tablename__ = 'pull_request_reviewers'
3619 3619 __table_args__ = (
3620 3620 {'extend_existing': True, 'mysql_engine': 'InnoDB',
3621 3621 'mysql_charset': 'utf8', 'sqlite_autoincrement': True},
3622 3622 )
3623 3623
3624 3624 @hybrid_property
3625 3625 def reasons(self):
3626 3626 if not self._reasons:
3627 3627 return []
3628 3628 return self._reasons
3629 3629
3630 3630 @reasons.setter
3631 3631 def reasons(self, val):
3632 3632 val = val or []
3633 3633 if any(not isinstance(x, basestring) for x in val):
3634 3634 raise Exception('invalid reasons type, must be list of strings')
3635 3635 self._reasons = val
3636 3636
3637 3637 pull_requests_reviewers_id = Column(
3638 3638 'pull_requests_reviewers_id', Integer(), nullable=False,
3639 3639 primary_key=True)
3640 3640 pull_request_id = Column(
3641 3641 "pull_request_id", Integer(),
3642 3642 ForeignKey('pull_requests.pull_request_id'), nullable=False)
3643 3643 user_id = Column(
3644 3644 "user_id", Integer(), ForeignKey('users.user_id'), nullable=True)
3645 3645 _reasons = Column(
3646 3646 'reason', MutationList.as_mutable(
3647 3647 JsonType('list', dialect_map=dict(mysql=UnicodeText(16384)))))
3648 3648 mandatory = Column("mandatory", Boolean(), nullable=False, default=False)
3649 3649 user = relationship('User')
3650 3650 pull_request = relationship('PullRequest')
3651 3651
3652 3652
3653 3653 class Notification(Base, BaseModel):
3654 3654 __tablename__ = 'notifications'
3655 3655 __table_args__ = (
3656 3656 Index('notification_type_idx', 'type'),
3657 3657 {'extend_existing': True, 'mysql_engine': 'InnoDB',
3658 3658 'mysql_charset': 'utf8', 'sqlite_autoincrement': True},
3659 3659 )
3660 3660
3661 3661 TYPE_CHANGESET_COMMENT = u'cs_comment'
3662 3662 TYPE_MESSAGE = u'message'
3663 3663 TYPE_MENTION = u'mention'
3664 3664 TYPE_REGISTRATION = u'registration'
3665 3665 TYPE_PULL_REQUEST = u'pull_request'
3666 3666 TYPE_PULL_REQUEST_COMMENT = u'pull_request_comment'
3667 3667
3668 3668 notification_id = Column('notification_id', Integer(), nullable=False, primary_key=True)
3669 3669 subject = Column('subject', Unicode(512), nullable=True)
3670 3670 body = Column('body', UnicodeText().with_variant(UnicodeText(50000), 'mysql'), nullable=True)
3671 3671 created_by = Column("created_by", Integer(), ForeignKey('users.user_id'), nullable=True)
3672 3672 created_on = Column('created_on', DateTime(timezone=False), nullable=False, default=datetime.datetime.now)
3673 3673 type_ = Column('type', Unicode(255))
3674 3674
3675 3675 created_by_user = relationship('User')
3676 3676 notifications_to_users = relationship('UserNotification', lazy='joined',
3677 3677 cascade="all, delete, delete-orphan")
3678 3678
3679 3679 @property
3680 3680 def recipients(self):
3681 3681 return [x.user for x in UserNotification.query()\
3682 3682 .filter(UserNotification.notification == self)\
3683 3683 .order_by(UserNotification.user_id.asc()).all()]
3684 3684
3685 3685 @classmethod
3686 3686 def create(cls, created_by, subject, body, recipients, type_=None):
3687 3687 if type_ is None:
3688 3688 type_ = Notification.TYPE_MESSAGE
3689 3689
3690 3690 notification = cls()
3691 3691 notification.created_by_user = created_by
3692 3692 notification.subject = subject
3693 3693 notification.body = body
3694 3694 notification.type_ = type_
3695 3695 notification.created_on = datetime.datetime.now()
3696 3696
3697 3697 for u in recipients:
3698 3698 assoc = UserNotification()
3699 3699 assoc.notification = notification
3700 3700
3701 3701 # if created_by is inside recipients mark his notification
3702 3702 # as read
3703 3703 if u.user_id == created_by.user_id:
3704 3704 assoc.read = True
3705 3705
3706 3706 u.notifications.append(assoc)
3707 3707 Session().add(notification)
3708 3708
3709 3709 return notification
3710 3710
3711 3711 @property
3712 3712 def description(self):
3713 3713 from rhodecode.model.notification import NotificationModel
3714 3714 return NotificationModel().make_description(self)
3715 3715
3716 3716
3717 3717 class UserNotification(Base, BaseModel):
3718 3718 __tablename__ = 'user_to_notification'
3719 3719 __table_args__ = (
3720 3720 UniqueConstraint('user_id', 'notification_id'),
3721 3721 {'extend_existing': True, 'mysql_engine': 'InnoDB',
3722 3722 'mysql_charset': 'utf8', 'sqlite_autoincrement': True}
3723 3723 )
3724 3724 user_id = Column('user_id', Integer(), ForeignKey('users.user_id'), primary_key=True)
3725 3725 notification_id = Column("notification_id", Integer(), ForeignKey('notifications.notification_id'), primary_key=True)
3726 3726 read = Column('read', Boolean, default=False)
3727 3727 sent_on = Column('sent_on', DateTime(timezone=False), nullable=True, unique=None)
3728 3728
3729 3729 user = relationship('User', lazy="joined")
3730 3730 notification = relationship('Notification', lazy="joined",
3731 3731 order_by=lambda: Notification.created_on.desc(),)
3732 3732
3733 3733 def mark_as_read(self):
3734 3734 self.read = True
3735 3735 Session().add(self)
3736 3736
3737 3737
3738 3738 class Gist(Base, BaseModel):
3739 3739 __tablename__ = 'gists'
3740 3740 __table_args__ = (
3741 3741 Index('g_gist_access_id_idx', 'gist_access_id'),
3742 3742 Index('g_created_on_idx', 'created_on'),
3743 3743 {'extend_existing': True, 'mysql_engine': 'InnoDB',
3744 3744 'mysql_charset': 'utf8', 'sqlite_autoincrement': True}
3745 3745 )
3746 3746 GIST_PUBLIC = u'public'
3747 3747 GIST_PRIVATE = u'private'
3748 3748 DEFAULT_FILENAME = u'gistfile1.txt'
3749 3749
3750 3750 ACL_LEVEL_PUBLIC = u'acl_public'
3751 3751 ACL_LEVEL_PRIVATE = u'acl_private'
3752 3752
3753 3753 gist_id = Column('gist_id', Integer(), primary_key=True)
3754 3754 gist_access_id = Column('gist_access_id', Unicode(250))
3755 3755 gist_description = Column('gist_description', UnicodeText().with_variant(UnicodeText(1024), 'mysql'))
3756 3756 gist_owner = Column('user_id', Integer(), ForeignKey('users.user_id'), nullable=True)
3757 3757 gist_expires = Column('gist_expires', Float(53), nullable=False)
3758 3758 gist_type = Column('gist_type', Unicode(128), nullable=False)
3759 3759 created_on = Column('created_on', DateTime(timezone=False), nullable=False, default=datetime.datetime.now)
3760 3760 modified_at = Column('modified_at', DateTime(timezone=False), nullable=False, default=datetime.datetime.now)
3761 3761 acl_level = Column('acl_level', Unicode(128), nullable=True)
3762 3762
3763 3763 owner = relationship('User')
3764 3764
3765 3765 def __repr__(self):
3766 3766 return '<Gist:[%s]%s>' % (self.gist_type, self.gist_access_id)
3767 3767
3768 3768 @hybrid_property
3769 3769 def description_safe(self):
3770 3770 from rhodecode.lib import helpers as h
3771 3771 return h.escape(self.gist_description)
3772 3772
3773 3773 @classmethod
3774 3774 def get_or_404(cls, id_, pyramid_exc=False):
3775 3775
3776 3776 if pyramid_exc:
3777 3777 from pyramid.httpexceptions import HTTPNotFound
3778 3778 else:
3779 3779 from webob.exc import HTTPNotFound
3780 3780
3781 3781 res = cls.query().filter(cls.gist_access_id == id_).scalar()
3782 3782 if not res:
3783 3783 raise HTTPNotFound
3784 3784 return res
3785 3785
3786 3786 @classmethod
3787 3787 def get_by_access_id(cls, gist_access_id):
3788 3788 return cls.query().filter(cls.gist_access_id == gist_access_id).scalar()
3789 3789
3790 3790 def gist_url(self):
3791 import rhodecode
3792 from pylons import url
3793
3794 alias_url = rhodecode.CONFIG.get('gist_alias_url')
3795 if alias_url:
3796 return alias_url.replace('{gistid}', self.gist_access_id)
3797
3798 return url('gist', gist_id=self.gist_access_id, qualified=True)
3791 from rhodecode.model.gist import GistModel
3792 return GistModel().get_url(self)
3799 3793
3800 3794 @classmethod
3801 3795 def base_path(cls):
3802 3796 """
3803 3797 Returns base path when all gists are stored
3804 3798
3805 3799 :param cls:
3806 3800 """
3807 3801 from rhodecode.model.gist import GIST_STORE_LOC
3808 3802 q = Session().query(RhodeCodeUi)\
3809 3803 .filter(RhodeCodeUi.ui_key == URL_SEP)
3810 3804 q = q.options(FromCache("sql_cache_short", "repository_repo_path"))
3811 3805 return os.path.join(q.one().ui_value, GIST_STORE_LOC)
3812 3806
3813 3807 def get_api_data(self):
3814 3808 """
3815 3809 Common function for generating gist related data for API
3816 3810 """
3817 3811 gist = self
3818 3812 data = {
3819 3813 'gist_id': gist.gist_id,
3820 3814 'type': gist.gist_type,
3821 3815 'access_id': gist.gist_access_id,
3822 3816 'description': gist.gist_description,
3823 3817 'url': gist.gist_url(),
3824 3818 'expires': gist.gist_expires,
3825 3819 'created_on': gist.created_on,
3826 3820 'modified_at': gist.modified_at,
3827 3821 'content': None,
3828 3822 'acl_level': gist.acl_level,
3829 3823 }
3830 3824 return data
3831 3825
3832 3826 def __json__(self):
3833 3827 data = dict(
3834 3828 )
3835 3829 data.update(self.get_api_data())
3836 3830 return data
3837 3831 # SCM functions
3838 3832
3839 3833 def scm_instance(self, **kwargs):
3840 3834 full_repo_path = os.path.join(self.base_path(), self.gist_access_id)
3841 3835 return get_vcs_instance(
3842 3836 repo_path=safe_str(full_repo_path), create=False)
3843 3837
3844 3838
3845 3839 class ExternalIdentity(Base, BaseModel):
3846 3840 __tablename__ = 'external_identities'
3847 3841 __table_args__ = (
3848 3842 Index('local_user_id_idx', 'local_user_id'),
3849 3843 Index('external_id_idx', 'external_id'),
3850 3844 {'extend_existing': True, 'mysql_engine': 'InnoDB',
3851 3845 'mysql_charset': 'utf8'})
3852 3846
3853 3847 external_id = Column('external_id', Unicode(255), default=u'',
3854 3848 primary_key=True)
3855 3849 external_username = Column('external_username', Unicode(1024), default=u'')
3856 3850 local_user_id = Column('local_user_id', Integer(),
3857 3851 ForeignKey('users.user_id'), primary_key=True)
3858 3852 provider_name = Column('provider_name', Unicode(255), default=u'',
3859 3853 primary_key=True)
3860 3854 access_token = Column('access_token', String(1024), default=u'')
3861 3855 alt_token = Column('alt_token', String(1024), default=u'')
3862 3856 token_secret = Column('token_secret', String(1024), default=u'')
3863 3857
3864 3858 @classmethod
3865 3859 def by_external_id_and_provider(cls, external_id, provider_name,
3866 3860 local_user_id=None):
3867 3861 """
3868 3862 Returns ExternalIdentity instance based on search params
3869 3863
3870 3864 :param external_id:
3871 3865 :param provider_name:
3872 3866 :return: ExternalIdentity
3873 3867 """
3874 3868 query = cls.query()
3875 3869 query = query.filter(cls.external_id == external_id)
3876 3870 query = query.filter(cls.provider_name == provider_name)
3877 3871 if local_user_id:
3878 3872 query = query.filter(cls.local_user_id == local_user_id)
3879 3873 return query.first()
3880 3874
3881 3875 @classmethod
3882 3876 def user_by_external_id_and_provider(cls, external_id, provider_name):
3883 3877 """
3884 3878 Returns User instance based on search params
3885 3879
3886 3880 :param external_id:
3887 3881 :param provider_name:
3888 3882 :return: User
3889 3883 """
3890 3884 query = User.query()
3891 3885 query = query.filter(cls.external_id == external_id)
3892 3886 query = query.filter(cls.provider_name == provider_name)
3893 3887 query = query.filter(User.user_id == cls.local_user_id)
3894 3888 return query.first()
3895 3889
3896 3890 @classmethod
3897 3891 def by_local_user_id(cls, local_user_id):
3898 3892 """
3899 3893 Returns all tokens for user
3900 3894
3901 3895 :param local_user_id:
3902 3896 :return: ExternalIdentity
3903 3897 """
3904 3898 query = cls.query()
3905 3899 query = query.filter(cls.local_user_id == local_user_id)
3906 3900 return query
3907 3901
3908 3902
3909 3903 class Integration(Base, BaseModel):
3910 3904 __tablename__ = 'integrations'
3911 3905 __table_args__ = (
3912 3906 {'extend_existing': True, 'mysql_engine': 'InnoDB',
3913 3907 'mysql_charset': 'utf8', 'sqlite_autoincrement': True}
3914 3908 )
3915 3909
3916 3910 integration_id = Column('integration_id', Integer(), primary_key=True)
3917 3911 integration_type = Column('integration_type', String(255))
3918 3912 enabled = Column('enabled', Boolean(), nullable=False)
3919 3913 name = Column('name', String(255), nullable=False)
3920 3914 child_repos_only = Column('child_repos_only', Boolean(), nullable=False,
3921 3915 default=False)
3922 3916
3923 3917 settings = Column(
3924 3918 'settings_json', MutationObj.as_mutable(
3925 3919 JsonType(dialect_map=dict(mysql=UnicodeText(16384)))))
3926 3920 repo_id = Column(
3927 3921 'repo_id', Integer(), ForeignKey('repositories.repo_id'),
3928 3922 nullable=True, unique=None, default=None)
3929 3923 repo = relationship('Repository', lazy='joined')
3930 3924
3931 3925 repo_group_id = Column(
3932 3926 'repo_group_id', Integer(), ForeignKey('groups.group_id'),
3933 3927 nullable=True, unique=None, default=None)
3934 3928 repo_group = relationship('RepoGroup', lazy='joined')
3935 3929
3936 3930 @property
3937 3931 def scope(self):
3938 3932 if self.repo:
3939 3933 return repr(self.repo)
3940 3934 if self.repo_group:
3941 3935 if self.child_repos_only:
3942 3936 return repr(self.repo_group) + ' (child repos only)'
3943 3937 else:
3944 3938 return repr(self.repo_group) + ' (recursive)'
3945 3939 if self.child_repos_only:
3946 3940 return 'root_repos'
3947 3941 return 'global'
3948 3942
3949 3943 def __repr__(self):
3950 3944 return '<Integration(%r, %r)>' % (self.integration_type, self.scope)
3951 3945
3952 3946
3953 3947 class RepoReviewRuleUser(Base, BaseModel):
3954 3948 __tablename__ = 'repo_review_rules_users'
3955 3949 __table_args__ = (
3956 3950 {'extend_existing': True, 'mysql_engine': 'InnoDB',
3957 3951 'mysql_charset': 'utf8', 'sqlite_autoincrement': True,}
3958 3952 )
3959 3953 repo_review_rule_user_id = Column('repo_review_rule_user_id', Integer(), primary_key=True)
3960 3954 repo_review_rule_id = Column("repo_review_rule_id", Integer(), ForeignKey('repo_review_rules.repo_review_rule_id'))
3961 3955 user_id = Column("user_id", Integer(), ForeignKey('users.user_id'), nullable=False)
3962 3956 mandatory = Column("mandatory", Boolean(), nullable=False, default=False)
3963 3957 user = relationship('User')
3964 3958
3965 3959 def rule_data(self):
3966 3960 return {
3967 3961 'mandatory': self.mandatory
3968 3962 }
3969 3963
3970 3964
3971 3965 class RepoReviewRuleUserGroup(Base, BaseModel):
3972 3966 __tablename__ = 'repo_review_rules_users_groups'
3973 3967 __table_args__ = (
3974 3968 {'extend_existing': True, 'mysql_engine': 'InnoDB',
3975 3969 'mysql_charset': 'utf8', 'sqlite_autoincrement': True,}
3976 3970 )
3977 3971 repo_review_rule_users_group_id = Column('repo_review_rule_users_group_id', Integer(), primary_key=True)
3978 3972 repo_review_rule_id = Column("repo_review_rule_id", Integer(), ForeignKey('repo_review_rules.repo_review_rule_id'))
3979 3973 users_group_id = Column("users_group_id", Integer(),ForeignKey('users_groups.users_group_id'), nullable=False)
3980 3974 mandatory = Column("mandatory", Boolean(), nullable=False, default=False)
3981 3975 users_group = relationship('UserGroup')
3982 3976
3983 3977 def rule_data(self):
3984 3978 return {
3985 3979 'mandatory': self.mandatory
3986 3980 }
3987 3981
3988 3982
3989 3983 class RepoReviewRule(Base, BaseModel):
3990 3984 __tablename__ = 'repo_review_rules'
3991 3985 __table_args__ = (
3992 3986 {'extend_existing': True, 'mysql_engine': 'InnoDB',
3993 3987 'mysql_charset': 'utf8', 'sqlite_autoincrement': True,}
3994 3988 )
3995 3989
3996 3990 repo_review_rule_id = Column(
3997 3991 'repo_review_rule_id', Integer(), primary_key=True)
3998 3992 repo_id = Column(
3999 3993 "repo_id", Integer(), ForeignKey('repositories.repo_id'))
4000 3994 repo = relationship('Repository', backref='review_rules')
4001 3995
4002 3996 _branch_pattern = Column("branch_pattern", UnicodeText().with_variant(UnicodeText(255), 'mysql'), default=u'*') # glob
4003 3997 _file_pattern = Column("file_pattern", UnicodeText().with_variant(UnicodeText(255), 'mysql'), default=u'*') # glob
4004 3998
4005 3999 use_authors_for_review = Column("use_authors_for_review", Boolean(), nullable=False, default=False)
4006 4000 forbid_author_to_review = Column("forbid_author_to_review", Boolean(), nullable=False, default=False)
4007 4001 forbid_commit_author_to_review = Column("forbid_commit_author_to_review", Boolean(), nullable=False, default=False)
4008 4002 forbid_adding_reviewers = Column("forbid_adding_reviewers", Boolean(), nullable=False, default=False)
4009 4003
4010 4004 rule_users = relationship('RepoReviewRuleUser')
4011 4005 rule_user_groups = relationship('RepoReviewRuleUserGroup')
4012 4006
4013 4007 @hybrid_property
4014 4008 def branch_pattern(self):
4015 4009 return self._branch_pattern or '*'
4016 4010
4017 4011 def _validate_glob(self, value):
4018 4012 re.compile('^' + glob2re(value) + '$')
4019 4013
4020 4014 @branch_pattern.setter
4021 4015 def branch_pattern(self, value):
4022 4016 self._validate_glob(value)
4023 4017 self._branch_pattern = value or '*'
4024 4018
4025 4019 @hybrid_property
4026 4020 def file_pattern(self):
4027 4021 return self._file_pattern or '*'
4028 4022
4029 4023 @file_pattern.setter
4030 4024 def file_pattern(self, value):
4031 4025 self._validate_glob(value)
4032 4026 self._file_pattern = value or '*'
4033 4027
4034 4028 def matches(self, branch, files_changed):
4035 4029 """
4036 4030 Check if this review rule matches a branch/files in a pull request
4037 4031
4038 4032 :param branch: branch name for the commit
4039 4033 :param files_changed: list of file paths changed in the pull request
4040 4034 """
4041 4035
4042 4036 branch = branch or ''
4043 4037 files_changed = files_changed or []
4044 4038
4045 4039 branch_matches = True
4046 4040 if branch:
4047 4041 branch_regex = re.compile('^' + glob2re(self.branch_pattern) + '$')
4048 4042 branch_matches = bool(branch_regex.search(branch))
4049 4043
4050 4044 files_matches = True
4051 4045 if self.file_pattern != '*':
4052 4046 files_matches = False
4053 4047 file_regex = re.compile(glob2re(self.file_pattern))
4054 4048 for filename in files_changed:
4055 4049 if file_regex.search(filename):
4056 4050 files_matches = True
4057 4051 break
4058 4052
4059 4053 return branch_matches and files_matches
4060 4054
4061 4055 @property
4062 4056 def review_users(self):
4063 4057 """ Returns the users which this rule applies to """
4064 4058
4065 4059 users = collections.OrderedDict()
4066 4060
4067 4061 for rule_user in self.rule_users:
4068 4062 if rule_user.user.active:
4069 4063 if rule_user.user not in users:
4070 4064 users[rule_user.user.username] = {
4071 4065 'user': rule_user.user,
4072 4066 'source': 'user',
4073 4067 'source_data': {},
4074 4068 'data': rule_user.rule_data()
4075 4069 }
4076 4070
4077 4071 for rule_user_group in self.rule_user_groups:
4078 4072 source_data = {
4079 4073 'name': rule_user_group.users_group.users_group_name,
4080 4074 'members': len(rule_user_group.users_group.members)
4081 4075 }
4082 4076 for member in rule_user_group.users_group.members:
4083 4077 if member.user.active:
4084 4078 users[member.user.username] = {
4085 4079 'user': member.user,
4086 4080 'source': 'user_group',
4087 4081 'source_data': source_data,
4088 4082 'data': rule_user_group.rule_data()
4089 4083 }
4090 4084
4091 4085 return users
4092 4086
4093 4087 def __repr__(self):
4094 4088 return '<RepoReviewerRule(id=%r, repo=%r)>' % (
4095 4089 self.repo_review_rule_id, self.repo)
4096 4090
4097 4091
4098 4092 class DbMigrateVersion(Base, BaseModel):
4099 4093 __tablename__ = 'db_migrate_version'
4100 4094 __table_args__ = (
4101 4095 {'extend_existing': True, 'mysql_engine': 'InnoDB',
4102 4096 'mysql_charset': 'utf8', 'sqlite_autoincrement': True},
4103 4097 )
4104 4098 repository_id = Column('repository_id', String(250), primary_key=True)
4105 4099 repository_path = Column('repository_path', Text)
4106 4100 version = Column('version', Integer)
4107 4101
4108 4102
4109 4103 class DbSession(Base, BaseModel):
4110 4104 __tablename__ = 'db_session'
4111 4105 __table_args__ = (
4112 4106 {'extend_existing': True, 'mysql_engine': 'InnoDB',
4113 4107 'mysql_charset': 'utf8', 'sqlite_autoincrement': True},
4114 4108 )
4115 4109
4116 4110 def __repr__(self):
4117 4111 return '<DB:DbSession({})>'.format(self.id)
4118 4112
4119 4113 id = Column('id', Integer())
4120 4114 namespace = Column('namespace', String(255), primary_key=True)
4121 4115 accessed = Column('accessed', DateTime, nullable=False)
4122 4116 created = Column('created', DateTime, nullable=False)
4123 4117 data = Column('data', PickleType, nullable=False)
@@ -1,235 +1,250 b''
1 1 # -*- coding: utf-8 -*-
2 2
3 3 # Copyright (C) 2013-2017 RhodeCode GmbH
4 4 #
5 5 # This program is free software: you can redistribute it and/or modify
6 6 # it under the terms of the GNU Affero General Public License, version 3
7 7 # (only), as published by the Free Software Foundation.
8 8 #
9 9 # This program is distributed in the hope that it will be useful,
10 10 # but WITHOUT ANY WARRANTY; without even the implied warranty of
11 11 # MERCHANTABILITY or FITNESS FOR A PARTICULAR PURPOSE. See the
12 12 # GNU General Public License for more details.
13 13 #
14 14 # You should have received a copy of the GNU Affero General Public License
15 15 # along with this program. If not, see <http://www.gnu.org/licenses/>.
16 16 #
17 17 # This program is dual-licensed. If you wish to learn more about the
18 18 # RhodeCode Enterprise Edition, including its added features, Support services,
19 19 # and proprietary license terms, please see https://rhodecode.com/licenses/
20 20
21 21 """
22 22 gist model for RhodeCode
23 23 """
24 24
25 25 import os
26 26 import time
27 27 import logging
28 28 import traceback
29 29 import shutil
30 30
31 from pyramid.threadlocal import get_current_request
32
31 33 from rhodecode.lib.utils2 import (
32 34 safe_unicode, unique_id, safe_int, time_to_datetime, AttributeDict)
33 35 from rhodecode.lib.ext_json import json
34 36 from rhodecode.model import BaseModel
35 37 from rhodecode.model.db import Gist
36 38 from rhodecode.model.repo import RepoModel
37 39 from rhodecode.model.scm import ScmModel
38 40
39 41 log = logging.getLogger(__name__)
40 42
41 43 GIST_STORE_LOC = '.rc_gist_store'
42 44 GIST_METADATA_FILE = '.rc_gist_metadata'
43 45
44 46
45 47 class GistModel(BaseModel):
46 48 cls = Gist
47 49
48 50 def _get_gist(self, gist):
49 51 """
50 52 Helper method to get gist by ID, or gist_access_id as a fallback
51 53
52 54 :param gist: GistID, gist_access_id, or Gist instance
53 55 """
54 56 return self._get_instance(Gist, gist, callback=Gist.get_by_access_id)
55 57
56 58 def __delete_gist(self, gist):
57 59 """
58 60 removes gist from filesystem
59 61
60 62 :param gist: gist object
61 63 """
62 64 root_path = RepoModel().repos_path
63 65 rm_path = os.path.join(root_path, GIST_STORE_LOC, gist.gist_access_id)
64 66 log.info("Removing %s", rm_path)
65 67 shutil.rmtree(rm_path)
66 68
67 69 def _store_metadata(self, repo, gist_id, gist_access_id, user_id, username,
68 70 gist_type, gist_expires, gist_acl_level):
69 71 """
70 72 store metadata inside the gist repo, this can be later used for imports
71 73 or gist identification. Currently we use this inside RhodeCode tools
72 74 to do cleanup of gists that are in storage but not in database.
73 75 """
74 76 metadata = {
75 77 'metadata_version': '2',
76 78 'gist_db_id': gist_id,
77 79 'gist_access_id': gist_access_id,
78 80 'gist_owner_id': user_id,
79 81 'gist_owner_username': username,
80 82 'gist_type': gist_type,
81 83 'gist_expires': gist_expires,
82 84 'gist_updated': time.time(),
83 85 'gist_acl_level': gist_acl_level,
84 86 }
85 87 metadata_file = os.path.join(repo.path, '.hg', GIST_METADATA_FILE)
86 88 with open(metadata_file, 'wb') as f:
87 89 f.write(json.dumps(metadata))
88 90
89 91 def get_gist(self, gist):
90 92 return self._get_gist(gist)
91 93
92 94 def get_gist_files(self, gist_access_id, revision=None):
93 95 """
94 96 Get files for given gist
95 97
96 98 :param gist_access_id:
97 99 """
98 100 repo = Gist.get_by_access_id(gist_access_id)
99 101 commit = repo.scm_instance().get_commit(commit_id=revision)
100 102 return commit, [n for n in commit.get_node('/')]
101 103
102 104 def create(self, description, owner, gist_mapping,
103 105 gist_type=Gist.GIST_PUBLIC, lifetime=-1, gist_id=None,
104 106 gist_acl_level=Gist.ACL_LEVEL_PRIVATE):
105 107 """
106 108 Create a gist
107 109
108 110 :param description: description of the gist
109 111 :param owner: user who created this gist
110 112 :param gist_mapping: mapping [{'filename': 'file1.txt', 'content': content}, ...}]
111 113 :param gist_type: type of gist private/public
112 114 :param lifetime: in minutes, -1 == forever
113 115 :param gist_acl_level: acl level for this gist
114 116 """
115 117 owner = self._get_user(owner)
116 118 gist_id = safe_unicode(gist_id or unique_id(20))
117 119 lifetime = safe_int(lifetime, -1)
118 120 gist_expires = time.time() + (lifetime * 60) if lifetime != -1 else -1
119 121 expiration = (time_to_datetime(gist_expires)
120 122 if gist_expires != -1 else 'forever')
121 123 log.debug('set GIST expiration date to: %s', expiration)
122 124 # create the Database version
123 125 gist = Gist()
124 126 gist.gist_description = description
125 127 gist.gist_access_id = gist_id
126 128 gist.gist_owner = owner.user_id
127 129 gist.gist_expires = gist_expires
128 130 gist.gist_type = safe_unicode(gist_type)
129 131 gist.acl_level = gist_acl_level
130 132 self.sa.add(gist)
131 133 self.sa.flush()
132 134 if gist_type == Gist.GIST_PUBLIC:
133 135 # use DB ID for easy to use GIST ID
134 136 gist_id = safe_unicode(gist.gist_id)
135 137 gist.gist_access_id = gist_id
136 138 self.sa.add(gist)
137 139
138 140 gist_repo_path = os.path.join(GIST_STORE_LOC, gist_id)
139 141 log.debug('Creating new %s GIST repo in %s', gist_type, gist_repo_path)
140 142 repo = RepoModel()._create_filesystem_repo(
141 143 repo_name=gist_id, repo_type='hg', repo_group=GIST_STORE_LOC,
142 144 use_global_config=True)
143 145
144 146 # now create single multifile commit
145 147 message = 'added file'
146 148 message += 's: ' if len(gist_mapping) > 1 else ': '
147 149 message += ', '.join([x for x in gist_mapping])
148 150
149 151 # fake RhodeCode Repository object
150 152 fake_repo = AttributeDict({
151 153 'repo_name': gist_repo_path,
152 154 'scm_instance': lambda *args, **kwargs: repo,
153 155 })
154 156
155 157 ScmModel().create_nodes(
156 158 user=owner.user_id, repo=fake_repo,
157 159 message=message,
158 160 nodes=gist_mapping,
159 161 trigger_push_hook=False
160 162 )
161 163
162 164 self._store_metadata(repo, gist.gist_id, gist.gist_access_id,
163 165 owner.user_id, owner.username, gist.gist_type,
164 166 gist.gist_expires, gist_acl_level)
165 167 return gist
166 168
167 169 def delete(self, gist, fs_remove=True):
168 170 gist = self._get_gist(gist)
169 171 try:
170 172 self.sa.delete(gist)
171 173 if fs_remove:
172 174 self.__delete_gist(gist)
173 175 else:
174 176 log.debug('skipping removal from filesystem')
175 177 except Exception:
176 178 log.error(traceback.format_exc())
177 179 raise
178 180
179 181 def update(self, gist, description, owner, gist_mapping, lifetime,
180 182 gist_acl_level):
181 183 gist = self._get_gist(gist)
182 184 gist_repo = gist.scm_instance()
183 185
184 186 if lifetime == 0: # preserve old value
185 187 gist_expires = gist.gist_expires
186 188 else:
187 189 gist_expires = (
188 190 time.time() + (lifetime * 60) if lifetime != -1 else -1)
189 191
190 192 # calculate operation type based on given data
191 193 gist_mapping_op = {}
192 194 for k, v in gist_mapping.items():
193 195 # add, mod, del
194 196 if not v['filename_org'] and v['filename']:
195 197 op = 'add'
196 198 elif v['filename_org'] and not v['filename']:
197 199 op = 'del'
198 200 else:
199 201 op = 'mod'
200 202
201 203 v['op'] = op
202 204 gist_mapping_op[k] = v
203 205
204 206 gist.gist_description = description
205 207 gist.gist_expires = gist_expires
206 208 gist.owner = owner
207 209 gist.acl_level = gist_acl_level
208 210 self.sa.add(gist)
209 211 self.sa.flush()
210 212
211 213 message = 'updated file'
212 214 message += 's: ' if len(gist_mapping) > 1 else ': '
213 215 message += ', '.join([x for x in gist_mapping])
214 216
215 217 # fake RhodeCode Repository object
216 218 fake_repo = AttributeDict({
217 219 'repo_name': gist_repo.path,
218 220 'scm_instance': lambda *args, **kwargs: gist_repo,
219 221 })
220 222
221 223 self._store_metadata(gist_repo, gist.gist_id, gist.gist_access_id,
222 224 owner.user_id, owner.username, gist.gist_type,
223 225 gist.gist_expires, gist_acl_level)
224 226
225 227 # this can throw NodeNotChangedError, if changes we're trying to commit
226 228 # are not actually changes...
227 229 ScmModel().update_nodes(
228 230 user=owner.user_id,
229 231 repo=fake_repo,
230 232 message=message,
231 233 nodes=gist_mapping_op,
232 234 trigger_push_hook=False
233 235 )
234 236
235 237 return gist
238
239 def get_url(self, gist, request=None):
240 import rhodecode
241
242 if not request:
243 request = get_current_request()
244
245 alias_url = rhodecode.CONFIG.get('gist_alias_url')
246 if alias_url:
247 return alias_url.replace('{gistid}', gist.gist_access_id)
248
249 return request.route_url('gist_show', gist_id=gist.gist_access_id)
250
@@ -1,101 +1,101 b''
1 1 // Global keyboard bindings
2 2
3 3 function setRCMouseBindings(repoName, repoLandingRev) {
4 4
5 5 /** custom callback for supressing mousetrap from firing */
6 6 Mousetrap.stopCallback = function(e, element) {
7 7 // if the element has the class "mousetrap" then no need to stop
8 8 if ((' ' + element.className + ' ').indexOf(' mousetrap ') > -1) {
9 9 return false;
10 10 }
11 11
12 12 // stop for input, select, and textarea
13 13 return element.tagName == 'INPUT' || element.tagName == 'SELECT' || element.tagName == 'TEXTAREA' || element.isContentEditable;
14 14 };
15 15
16 16 // general help "?"
17 17 Mousetrap.bind(['?'], function(e) {
18 18 $('#help_kb').modal({});
19 19 });
20 20
21 21 // / open the quick filter
22 22 Mousetrap.bind(['/'], function(e) {
23 23 $('#repo_switcher').select2('open');
24 24
25 25 // return false to prevent default browser behavior
26 26 // and stop event from bubbling
27 27 return false;
28 28 });
29 29
30 30 // ctrl/command+b, show the the main bar
31 31 Mousetrap.bind(['command+b', 'ctrl+b'], function(e) {
32 32 var $headerInner = $('#header-inner'),
33 33 $content = $('#content');
34 34 if ($headerInner.hasClass('hover') && $content.hasClass('hover')) {
35 35 $headerInner.removeClass('hover');
36 36 $content.removeClass('hover');
37 37 } else {
38 38 $headerInner.addClass('hover');
39 39 $content.addClass('hover');
40 40 }
41 41 return false;
42 42 });
43 43
44 44 // general nav g + action
45 45 Mousetrap.bind(['g h'], function(e) {
46 46 window.location = pyroutes.url('home');
47 47 });
48 48 Mousetrap.bind(['g g'], function(e) {
49 window.location = pyroutes.url('gists', {'private': 1});
49 window.location = pyroutes.url('gists_show', {'private': 1});
50 50 });
51 51 Mousetrap.bind(['g G'], function(e) {
52 window.location = pyroutes.url('gists', {'public': 1});
52 window.location = pyroutes.url('gists_show', {'public': 1});
53 53 });
54 54 Mousetrap.bind(['n g'], function(e) {
55 window.location = pyroutes.url('new_gist');
55 window.location = pyroutes.url('gists_new');
56 56 });
57 57 Mousetrap.bind(['n r'], function(e) {
58 58 window.location = pyroutes.url('new_repo');
59 59 });
60 60
61 61 if (repoName && repoName != '') {
62 62 // nav in repo context
63 63 Mousetrap.bind(['g s'], function(e) {
64 64 window.location = pyroutes.url(
65 65 'repo_summary', {'repo_name': repoName});
66 66 });
67 67 Mousetrap.bind(['g c'], function(e) {
68 68 window.location = pyroutes.url(
69 69 'changelog_home', {'repo_name': repoName});
70 70 });
71 71 Mousetrap.bind(['g F'], function(e) {
72 72 window.location = pyroutes.url(
73 73 'files_home',
74 74 {
75 75 'repo_name': repoName,
76 76 'revision': repoLandingRev,
77 77 'f_path': '',
78 78 'search': '1'
79 79 });
80 80 });
81 81 Mousetrap.bind(['g f'], function(e) {
82 82 window.location = pyroutes.url(
83 83 'files_home',
84 84 {
85 85 'repo_name': repoName,
86 86 'revision': repoLandingRev,
87 87 'f_path': ''
88 88 });
89 89 });
90 90 Mousetrap.bind(['g o'], function(e) {
91 91 window.location = pyroutes.url(
92 92 'edit_repo', {'repo_name': repoName});
93 93 });
94 94 Mousetrap.bind(['g O'], function(e) {
95 95 window.location = pyroutes.url(
96 96 'edit_repo_perms', {'repo_name': repoName});
97 97 });
98 98 }
99 99 }
100 100
101 101 setRCMouseBindings(templateContext.repo_name, templateContext.repo_landing_commit);
@@ -1,156 +1,165 b''
1 1
2 2 /******************************************************************************
3 3 * *
4 4 * DO NOT CHANGE THIS FILE MANUALLY *
5 5 * *
6 6 * *
7 7 * This file is automatically generated when the app starts up with *
8 8 * generate_js_files = true *
9 9 * *
10 10 * To add a route here pass jsroute=True to the route definition in the app *
11 11 * *
12 12 ******************************************************************************/
13 13 function registerRCRoutes() {
14 14 // routes registration
15 15 pyroutes.register('new_repo', '/_admin/create_repository', []);
16 16 pyroutes.register('edit_user', '/_admin/users/%(user_id)s/edit', ['user_id']);
17 17 pyroutes.register('edit_user_group_members', '/_admin/user_groups/%(user_group_id)s/edit/members', ['user_group_id']);
18 pyroutes.register('gists', '/_admin/gists', []);
19 pyroutes.register('new_gist', '/_admin/gists/new', []);
20 18 pyroutes.register('toggle_following', '/_admin/toggle_following', []);
21 19 pyroutes.register('changeset_home', '/%(repo_name)s/changeset/%(revision)s', ['repo_name', 'revision']);
22 20 pyroutes.register('changeset_comment', '/%(repo_name)s/changeset/%(revision)s/comment', ['repo_name', 'revision']);
23 21 pyroutes.register('changeset_comment_preview', '/%(repo_name)s/changeset/comment/preview', ['repo_name']);
24 22 pyroutes.register('changeset_comment_delete', '/%(repo_name)s/changeset/comment/%(comment_id)s/delete', ['repo_name', 'comment_id']);
25 23 pyroutes.register('changeset_info', '/%(repo_name)s/changeset_info/%(revision)s', ['repo_name', 'revision']);
26 24 pyroutes.register('compare_url', '/%(repo_name)s/compare/%(source_ref_type)s@%(source_ref)s...%(target_ref_type)s@%(target_ref)s', ['repo_name', 'source_ref_type', 'source_ref', 'target_ref_type', 'target_ref']);
27 25 pyroutes.register('pullrequest_home', '/%(repo_name)s/pull-request/new', ['repo_name']);
28 26 pyroutes.register('pullrequest', '/%(repo_name)s/pull-request/new', ['repo_name']);
29 27 pyroutes.register('pullrequest_repo_refs', '/%(repo_name)s/pull-request/refs/%(target_repo_name)s', ['repo_name', 'target_repo_name']);
30 28 pyroutes.register('pullrequest_repo_destinations', '/%(repo_name)s/pull-request/repo-destinations', ['repo_name']);
31 29 pyroutes.register('pullrequest_show', '/%(repo_name)s/pull-request/%(pull_request_id)s', ['repo_name', 'pull_request_id']);
32 30 pyroutes.register('pullrequest_update', '/%(repo_name)s/pull-request/%(pull_request_id)s', ['repo_name', 'pull_request_id']);
33 31 pyroutes.register('pullrequest_comment', '/%(repo_name)s/pull-request-comment/%(pull_request_id)s', ['repo_name', 'pull_request_id']);
34 32 pyroutes.register('pullrequest_comment_delete', '/%(repo_name)s/pull-request-comment/%(comment_id)s/delete', ['repo_name', 'comment_id']);
35 33 pyroutes.register('changelog_home', '/%(repo_name)s/changelog', ['repo_name']);
36 34 pyroutes.register('changelog_file_home', '/%(repo_name)s/changelog/%(revision)s/%(f_path)s', ['repo_name', 'revision', 'f_path']);
37 35 pyroutes.register('changelog_elements', '/%(repo_name)s/changelog_details', ['repo_name']);
38 36 pyroutes.register('files_home', '/%(repo_name)s/files/%(revision)s/%(f_path)s', ['repo_name', 'revision', 'f_path']);
39 37 pyroutes.register('files_history_home', '/%(repo_name)s/history/%(revision)s/%(f_path)s', ['repo_name', 'revision', 'f_path']);
40 38 pyroutes.register('files_authors_home', '/%(repo_name)s/authors/%(revision)s/%(f_path)s', ['repo_name', 'revision', 'f_path']);
41 39 pyroutes.register('files_annotate_home', '/%(repo_name)s/annotate/%(revision)s/%(f_path)s', ['repo_name', 'revision', 'f_path']);
42 40 pyroutes.register('files_annotate_previous', '/%(repo_name)s/annotate-previous/%(revision)s/%(f_path)s', ['repo_name', 'revision', 'f_path']);
43 41 pyroutes.register('files_archive_home', '/%(repo_name)s/archive/%(fname)s', ['repo_name', 'fname']);
44 42 pyroutes.register('files_nodelist_home', '/%(repo_name)s/nodelist/%(revision)s/%(f_path)s', ['repo_name', 'revision', 'f_path']);
45 43 pyroutes.register('files_nodetree_full', '/%(repo_name)s/nodetree_full/%(commit_id)s/%(f_path)s', ['repo_name', 'commit_id', 'f_path']);
46 44 pyroutes.register('favicon', '/favicon.ico', []);
47 45 pyroutes.register('robots', '/robots.txt', []);
48 46 pyroutes.register('auth_home', '/_admin/auth*traverse', []);
49 47 pyroutes.register('global_integrations_new', '/_admin/integrations/new', []);
50 48 pyroutes.register('global_integrations_home', '/_admin/integrations', []);
51 49 pyroutes.register('global_integrations_list', '/_admin/integrations/%(integration)s', ['integration']);
52 50 pyroutes.register('global_integrations_create', '/_admin/integrations/%(integration)s/new', ['integration']);
53 51 pyroutes.register('global_integrations_edit', '/_admin/integrations/%(integration)s/%(integration_id)s', ['integration', 'integration_id']);
54 52 pyroutes.register('repo_group_integrations_home', '/%(repo_group_name)s/settings/integrations', ['repo_group_name']);
55 53 pyroutes.register('repo_group_integrations_list', '/%(repo_group_name)s/settings/integrations/%(integration)s', ['repo_group_name', 'integration']);
56 54 pyroutes.register('repo_group_integrations_new', '/%(repo_group_name)s/settings/integrations/new', ['repo_group_name']);
57 55 pyroutes.register('repo_group_integrations_create', '/%(repo_group_name)s/settings/integrations/%(integration)s/new', ['repo_group_name', 'integration']);
58 56 pyroutes.register('repo_group_integrations_edit', '/%(repo_group_name)s/settings/integrations/%(integration)s/%(integration_id)s', ['repo_group_name', 'integration', 'integration_id']);
59 57 pyroutes.register('repo_integrations_home', '/%(repo_name)s/settings/integrations', ['repo_name']);
60 58 pyroutes.register('repo_integrations_list', '/%(repo_name)s/settings/integrations/%(integration)s', ['repo_name', 'integration']);
61 59 pyroutes.register('repo_integrations_new', '/%(repo_name)s/settings/integrations/new', ['repo_name']);
62 60 pyroutes.register('repo_integrations_create', '/%(repo_name)s/settings/integrations/%(integration)s/new', ['repo_name', 'integration']);
63 61 pyroutes.register('repo_integrations_edit', '/%(repo_name)s/settings/integrations/%(integration)s/%(integration_id)s', ['repo_name', 'integration', 'integration_id']);
64 62 pyroutes.register('ops_ping', '/_admin/ops/ping', []);
65 63 pyroutes.register('admin_home', '/_admin', []);
66 64 pyroutes.register('admin_audit_logs', '/_admin/audit_logs', []);
67 65 pyroutes.register('pull_requests_global_0', '/_admin/pull_requests/%(pull_request_id)s', ['pull_request_id']);
68 66 pyroutes.register('pull_requests_global_1', '/_admin/pull-requests/%(pull_request_id)s', ['pull_request_id']);
69 67 pyroutes.register('pull_requests_global', '/_admin/pull-request/%(pull_request_id)s', ['pull_request_id']);
70 68 pyroutes.register('admin_settings_open_source', '/_admin/settings/open_source', []);
71 69 pyroutes.register('admin_settings_vcs_svn_generate_cfg', '/_admin/settings/vcs/svn_generate_cfg', []);
72 70 pyroutes.register('admin_settings_system', '/_admin/settings/system', []);
73 71 pyroutes.register('admin_settings_system_update', '/_admin/settings/system/updates', []);
74 72 pyroutes.register('admin_settings_sessions', '/_admin/settings/sessions', []);
75 73 pyroutes.register('admin_settings_sessions_cleanup', '/_admin/settings/sessions/cleanup', []);
76 74 pyroutes.register('admin_settings_process_management', '/_admin/settings/process_management', []);
77 75 pyroutes.register('admin_settings_process_management_signal', '/_admin/settings/process_management/signal', []);
78 76 pyroutes.register('admin_permissions_ips', '/_admin/permissions/ips', []);
79 77 pyroutes.register('users', '/_admin/users', []);
80 78 pyroutes.register('users_data', '/_admin/users_data', []);
81 79 pyroutes.register('edit_user_auth_tokens', '/_admin/users/%(user_id)s/edit/auth_tokens', ['user_id']);
82 80 pyroutes.register('edit_user_auth_tokens_add', '/_admin/users/%(user_id)s/edit/auth_tokens/new', ['user_id']);
83 81 pyroutes.register('edit_user_auth_tokens_delete', '/_admin/users/%(user_id)s/edit/auth_tokens/delete', ['user_id']);
84 82 pyroutes.register('edit_user_emails', '/_admin/users/%(user_id)s/edit/emails', ['user_id']);
85 83 pyroutes.register('edit_user_emails_add', '/_admin/users/%(user_id)s/edit/emails/new', ['user_id']);
86 84 pyroutes.register('edit_user_emails_delete', '/_admin/users/%(user_id)s/edit/emails/delete', ['user_id']);
87 85 pyroutes.register('edit_user_ips', '/_admin/users/%(user_id)s/edit/ips', ['user_id']);
88 86 pyroutes.register('edit_user_ips_add', '/_admin/users/%(user_id)s/edit/ips/new', ['user_id']);
89 87 pyroutes.register('edit_user_ips_delete', '/_admin/users/%(user_id)s/edit/ips/delete', ['user_id']);
90 88 pyroutes.register('edit_user_groups_management', '/_admin/users/%(user_id)s/edit/groups_management', ['user_id']);
91 89 pyroutes.register('edit_user_groups_management_updates', '/_admin/users/%(user_id)s/edit/edit_user_groups_management/updates', ['user_id']);
92 90 pyroutes.register('edit_user_audit_logs', '/_admin/users/%(user_id)s/edit/audit', ['user_id']);
93 91 pyroutes.register('channelstream_connect', '/_admin/channelstream/connect', []);
94 92 pyroutes.register('channelstream_subscribe', '/_admin/channelstream/subscribe', []);
95 93 pyroutes.register('channelstream_proxy', '/_channelstream', []);
96 94 pyroutes.register('login', '/_admin/login', []);
97 95 pyroutes.register('logout', '/_admin/logout', []);
98 96 pyroutes.register('register', '/_admin/register', []);
99 97 pyroutes.register('reset_password', '/_admin/password_reset', []);
100 98 pyroutes.register('reset_password_confirmation', '/_admin/password_reset_confirmation', []);
101 99 pyroutes.register('home', '/', []);
102 100 pyroutes.register('user_autocomplete_data', '/_users', []);
103 101 pyroutes.register('user_group_autocomplete_data', '/_user_groups', []);
104 102 pyroutes.register('repo_list_data', '/_repos', []);
105 103 pyroutes.register('goto_switcher_data', '/_goto_data', []);
106 104 pyroutes.register('repo_summary_explicit', '/%(repo_name)s/summary', ['repo_name']);
107 105 pyroutes.register('repo_summary_commits', '/%(repo_name)s/summary-commits', ['repo_name']);
108 106 pyroutes.register('repo_commit', '/%(repo_name)s/changeset/%(commit_id)s', ['repo_name', 'commit_id']);
109 107 pyroutes.register('repo_refs_data', '/%(repo_name)s/refs-data', ['repo_name']);
110 108 pyroutes.register('repo_refs_changelog_data', '/%(repo_name)s/refs-data-changelog', ['repo_name']);
111 109 pyroutes.register('repo_stats', '/%(repo_name)s/repo_stats/%(commit_id)s', ['repo_name', 'commit_id']);
112 110 pyroutes.register('tags_home', '/%(repo_name)s/tags', ['repo_name']);
113 111 pyroutes.register('branches_home', '/%(repo_name)s/branches', ['repo_name']);
114 112 pyroutes.register('bookmarks_home', '/%(repo_name)s/bookmarks', ['repo_name']);
115 113 pyroutes.register('pullrequest_show', '/%(repo_name)s/pull-request/%(pull_request_id)s', ['repo_name', 'pull_request_id']);
116 114 pyroutes.register('pullrequest_show_all', '/%(repo_name)s/pull-request', ['repo_name']);
117 115 pyroutes.register('pullrequest_show_all_data', '/%(repo_name)s/pull-request-data', ['repo_name']);
118 116 pyroutes.register('edit_repo', '/%(repo_name)s/settings', ['repo_name']);
119 117 pyroutes.register('edit_repo_advanced', '/%(repo_name)s/settings/advanced', ['repo_name']);
120 118 pyroutes.register('edit_repo_advanced_delete', '/%(repo_name)s/settings/advanced/delete', ['repo_name']);
121 119 pyroutes.register('edit_repo_advanced_locking', '/%(repo_name)s/settings/advanced/locking', ['repo_name']);
122 120 pyroutes.register('edit_repo_advanced_journal', '/%(repo_name)s/settings/advanced/journal', ['repo_name']);
123 121 pyroutes.register('edit_repo_advanced_fork', '/%(repo_name)s/settings/advanced/fork', ['repo_name']);
124 122 pyroutes.register('edit_repo_caches', '/%(repo_name)s/settings/caches', ['repo_name']);
125 123 pyroutes.register('edit_repo_perms', '/%(repo_name)s/settings/permissions', ['repo_name']);
126 124 pyroutes.register('repo_reviewers', '/%(repo_name)s/settings/review/rules', ['repo_name']);
127 125 pyroutes.register('repo_default_reviewers_data', '/%(repo_name)s/settings/review/default-reviewers', ['repo_name']);
128 126 pyroutes.register('repo_maintenance', '/%(repo_name)s/settings/maintenance', ['repo_name']);
129 127 pyroutes.register('repo_maintenance_execute', '/%(repo_name)s/settings/maintenance/execute', ['repo_name']);
130 128 pyroutes.register('strip', '/%(repo_name)s/settings/strip', ['repo_name']);
131 129 pyroutes.register('strip_check', '/%(repo_name)s/settings/strip_check', ['repo_name']);
132 130 pyroutes.register('strip_execute', '/%(repo_name)s/settings/strip_execute', ['repo_name']);
133 131 pyroutes.register('repo_summary', '/%(repo_name)s', ['repo_name']);
134 132 pyroutes.register('repo_summary_slash', '/%(repo_name)s/', ['repo_name']);
135 133 pyroutes.register('repo_group_home', '/%(repo_group_name)s', ['repo_group_name']);
136 134 pyroutes.register('repo_group_home_slash', '/%(repo_group_name)s/', ['repo_group_name']);
137 135 pyroutes.register('search', '/_admin/search', []);
138 136 pyroutes.register('search_repo', '/%(repo_name)s/search', ['repo_name']);
139 137 pyroutes.register('user_profile', '/_profiles/%(username)s', ['username']);
140 138 pyroutes.register('my_account_profile', '/_admin/my_account/profile', []);
141 139 pyroutes.register('my_account_password', '/_admin/my_account/password', []);
142 140 pyroutes.register('my_account_password_update', '/_admin/my_account/password', []);
143 141 pyroutes.register('my_account_auth_tokens', '/_admin/my_account/auth_tokens', []);
144 142 pyroutes.register('my_account_auth_tokens_add', '/_admin/my_account/auth_tokens/new', []);
145 143 pyroutes.register('my_account_auth_tokens_delete', '/_admin/my_account/auth_tokens/delete', []);
146 144 pyroutes.register('my_account_emails', '/_admin/my_account/emails', []);
147 145 pyroutes.register('my_account_emails_add', '/_admin/my_account/emails/new', []);
148 146 pyroutes.register('my_account_emails_delete', '/_admin/my_account/emails/delete', []);
149 147 pyroutes.register('my_account_repos', '/_admin/my_account/repos', []);
150 148 pyroutes.register('my_account_watched', '/_admin/my_account/watched', []);
151 149 pyroutes.register('my_account_perms', '/_admin/my_account/perms', []);
152 150 pyroutes.register('my_account_notifications', '/_admin/my_account/notifications', []);
153 151 pyroutes.register('my_account_notifications_toggle_visibility', '/_admin/my_account/toggle_visibility', []);
154 152 pyroutes.register('my_account_notifications_test_channelstream', '/_admin/my_account/test_channelstream', []);
153 pyroutes.register('gists_show', '/_admin/gists', []);
154 pyroutes.register('gists_new', '/_admin/gists/new', []);
155 pyroutes.register('gists_create', '/_admin/gists/create', []);
156 pyroutes.register('gist_show', '/_admin/gists/%(gist_id)s', ['gist_id']);
157 pyroutes.register('gist_delete', '/_admin/gists/%(gist_id)s/delete', ['gist_id']);
158 pyroutes.register('gist_edit', '/_admin/gists/%(gist_id)s/edit', ['gist_id']);
159 pyroutes.register('gist_edit_check_revision', '/_admin/gists/%(gist_id)s/edit/check_revision', ['gist_id']);
160 pyroutes.register('gist_update', '/_admin/gists/%(gist_id)s/update', ['gist_id']);
161 pyroutes.register('gist_show_rev', '/_admin/gists/%(gist_id)s/%(revision)s', ['gist_id', 'revision']);
162 pyroutes.register('gist_show_formatted', '/_admin/gists/%(gist_id)s/%(revision)s/%(format)s', ['gist_id', 'revision', 'format']);
163 pyroutes.register('gist_show_formatted_path', '/_admin/gists/%(gist_id)s/%(revision)s/%(format)s/%(f_path)s', ['gist_id', 'revision', 'format', 'f_path']);
155 164 pyroutes.register('apiv2', '/_admin/api', []);
156 165 }
@@ -1,136 +1,139 b''
1 1 ## -*- coding: utf-8 -*-
2 2 <%inherit file="/base/base.mako"/>
3 3
4 4 <%def name="title()">
5 5 ${_('Edit Gist')} &middot; ${c.gist.gist_access_id}
6 6 %if c.rhodecode_name:
7 7 &middot; ${h.branding(c.rhodecode_name)}
8 8 %endif
9 9 </%def>
10 10
11 11 <%def name="breadcrumbs_links()">
12 12 ${_('Edit Gist')} &middot; ${c.gist.gist_access_id}
13 13 </%def>
14 14
15 15 <%def name="menu_bar_nav()">
16 16 ${self.menu_items(active='gists')}
17 17 </%def>
18 18
19 19 <%def name="main()">
20 20 <div class="box">
21 21 <!-- box / title -->
22 22 <div class="title">
23 23 ${self.breadcrumbs()}
24 24 </div>
25 25
26 26 <div class="table">
27 27
28 28 <div id="files_data">
29 ${h.secure_form(h.url('edit_gist', gist_id=c.gist.gist_access_id), method='post', id='eform')}
29 ${h.secure_form(h.route_path('gist_update', gist_id=c.gist.gist_access_id), id='eform', method='POST')}
30 30 <div>
31 31 <input type="hidden" value="${c.file_last_commit.raw_id}" name="parent_hash">
32 32 <textarea id="description" name="description"
33 33 placeholder="${_('Gist description ...')}">${c.gist.gist_description}</textarea>
34 34 <div>
35 35 <span class="gist-gravatar">
36 36 ${self.gravatar(h.email_or_none(c.rhodecode_user.full_contact), 30)}
37 37 </span>
38 38 <label for='lifetime'>${_('Gist lifetime')}</label>
39 39 ${h.dropdownmenu('lifetime', '0', c.lifetime_options)}
40 40
41 41 <label for='gist_acl_level'>${_('Gist access level')}</label>
42 42 ${h.dropdownmenu('gist_acl_level', c.gist.acl_level, c.acl_options)}
43 43 </div>
44 44 </div>
45 45
46 46 ## peppercorn schema
47 47 <input type="hidden" name="__start__" value="nodes:sequence"/>
48 48 % for cnt, file in enumerate(c.files):
49 49 <input type="hidden" name="__start__" value="file:mapping"/>
50 50 <div id="codeblock" class="codeblock" >
51 51 <div class="code-header">
52 52 <div class="form">
53 53 <div class="fields">
54 54 <input type="hidden" name="filename_org" value="${file.path}" >
55 55 <input id="filename_${h.FID('f',file.path)}" name="filename" size="30" type="text" value="${file.path}">
56 56 ${h.dropdownmenu('mimetype' ,'plain',[('plain',_('plain'))],enable_filter=True, id='mimetype_'+h.FID('f',file.path))}
57 57 </div>
58 58 </div>
59 59 </div>
60 60 <div class="editor_container">
61 61 <pre id="editor_pre"></pre>
62 62 <textarea id="editor_${h.FID('f',file.path)}" name="content" >${file.content}</textarea>
63 63 </div>
64 64 </div>
65 65 <input type="hidden" name="__end__" />
66 66
67 67 ## dynamic edit box.
68 68 <script type="text/javascript">
69 69 $(document).ready(function(){
70 70 var myCodeMirror = initCodeMirror(
71 71 "editor_${h.FID('f',file.path)}", '');
72 72
73 73 var modes_select = $("#mimetype_${h.FID('f',file.path)}");
74 74 fillCodeMirrorOptions(modes_select);
75 75
76 76 // try to detect the mode based on the file we edit
77 77 var mimetype = "${file.mimetype}";
78 78 var detected_mode = detectCodeMirrorMode(
79 79 "${file.path}", mimetype);
80 80
81 81 if(detected_mode){
82 82 $(modes_select).select2("val", mimetype);
83 83 $(modes_select).change();
84 84 setCodeMirrorMode(myCodeMirror, detected_mode);
85 85 }
86 86
87 87 var filename_selector = "#filename_${h.FID('f',file.path)}";
88 88 // on change of select field set mode
89 89 setCodeMirrorModeFromSelect(
90 90 modes_select, filename_selector, myCodeMirror, null);
91 91
92 92 // on entering the new filename set mode, from given extension
93 93 setCodeMirrorModeFromInput(
94 94 modes_select, filename_selector, myCodeMirror, null);
95 95 });
96 96 </script>
97 97 %endfor
98 98 <input type="hidden" name="__end__" />
99 99
100 100 <div class="pull-right">
101 101 ${h.submit('update',_('Update Gist'),class_="btn btn-success")}
102 <a class="btn" href="${h.url('gist', gist_id=c.gist.gist_access_id)}">${_('Cancel')}</a>
102 <a class="btn" href="${h.route_path('gist_show', gist_id=c.gist.gist_access_id)}">${_('Cancel')}</a>
103 103 </div>
104 104 ${h.end_form()}
105 105 </div>
106 106 </div>
107 107
108 108 </div>
109 109 <script>
110 110 $('#update').on('click', function(e){
111 111 e.preventDefault();
112
113 $(this).val('Updating...');
114 $(this).attr('disabled', 'disabled');
112 115 // check for newer version.
113 116 $.ajax({
114 url: "${h.url('edit_gist_check_revision', gist_id=c.gist.gist_access_id)}",
117 url: "${h.route_path('gist_edit_check_revision', gist_id=c.gist.gist_access_id)}",
115 118 data: {
116 119 'revision': '${c.file_last_commit.raw_id}'
117 120 },
118 121 dataType: 'json',
119 122 type: 'GET',
120 123 success: function(data) {
121 124 if(data.success === false){
122 125 message = '${h.literal(_('Gist was updated since you started editing. Copy your changes and click %(here)s to reload the new version.')
123 % {'here': h.link_to('here',h.url('edit_gist', gist_id=c.gist.gist_access_id))})}'
126 % {'here': h.link_to('here', h.route_path('gist_edit', gist_id=c.gist.gist_access_id))})}'
124 127 alertMessage = [{"message": {
125 128 "message": message, "force": "true", "level": "warning"}}];
126 129 $.Topic('/notifications').publish(alertMessage[0]);
127 130 }
128 131 else{
129 132 $('#eform').submit();
130 133 }
131 134 }
132 135 });
133 136 })
134 137
135 138 </script>
136 139 </%def>
@@ -1,150 +1,150 b''
1 1 ## -*- coding: utf-8 -*-
2 2 <%inherit file="/base/base.mako"/>
3 3
4 4 <%def name="title()">
5 5 %if c.show_private:
6 6 ${_('Private Gists for user %s') % c.rhodecode_user.username}
7 7 %elif c.show_public:
8 8 ${_('Public Gists for user %s') % c.rhodecode_user.username}
9 9 %else:
10 10 ${_('Public Gists')}
11 11 %endif
12 12 %if c.rhodecode_name:
13 13 &middot; ${h.branding(c.rhodecode_name)}
14 14 %endif
15 15 </%def>
16 16
17 17 <%def name="breadcrumbs_links()">
18 18 <input class="q_filter_box" id="q_filter" size="15" type="text" name="filter" placeholder="${_('quick filter...')}" value=""/>
19 19 %if c.show_private and not c.show_public:
20 20 ${_('Private Gists for user %s') % c.rhodecode_user.username}
21 21 %elif c.show_public and not c.show_private:
22 22 ${_('Public Gists for user %s') % c.rhodecode_user.username}
23 23 %elif c.show_public and c.show_private:
24 24 ${_('All Gists for user %s') % c.rhodecode_user.username}
25 25 %else:
26 26 ${_('All Public Gists')}
27 27 %endif
28 28 - <span id="gists_count">0</span>
29 29 </%def>
30 30
31 31 <%def name="menu_bar_nav()">
32 32 ${self.menu_items(active='gists')}
33 33 </%def>
34 34
35 35
36 36
37 37 <%def name="main()">
38 38 <div class="box">
39 39 <div class="title">
40 40 ${self.breadcrumbs(class_="breadcrumbs block-left")}
41 41 %if c.rhodecode_user.username != h.DEFAULT_USER:
42 42 <ul class="links block-right">
43 43 <li>
44 <a href="${h.url('new_gist')}" class="btn btn-primary">${_(u'Create New Gist')}</a>
44 <a href="${h.route_path('gists_new')}" class="btn btn-primary">${_(u'Create New Gist')}</a>
45 45 </li>
46 46 </ul>
47 47 %endif
48 48 </div>
49 49
50 50
51 51 <div class="sidebar-col-wrapper scw-small">
52 52 ##main
53 53 <div class="sidebar">
54 54 <ul class="nav nav-pills nav-stacked">
55 55 % if h.HasPermissionAll('hg.admin')('access admin gists page'):
56 <li class="${'active' if c.active=='all' else ''}"><a href="${h.url('gists', all=1)}">${_('All gists')}</a></li>
56 <li class="${'active' if c.active=='all' else ''}"><a href="${h.route_path('gists_show', _query={'all': 1})}">${_('All gists')}</a></li>
57 57 %endif
58 <li class="${'active' if c.active=='public' else ''}"><a href="${h.url('gists')}">${_('All public')}</a></li>
58 <li class="${'active' if c.active=='public' else ''}"><a href="${h.route_path('gists_show')}">${_('All public')}</a></li>
59 59 %if c.rhodecode_user.username != h.DEFAULT_USER:
60 <li class="${'active' if c.active=='my_all' else ''}"><a href="${h.url('gists', public=1, private=1)}">${_('My gists')}</a></li>
61 <li class="${'active' if c.active=='my_private' else ''}"><a href="${h.url('gists', private=1)}">${_('My private')}</a></li>
62 <li class="${'active' if c.active=='my_public' else ''}"><a href="${h.url('gists', public=1)}">${_('My public')}</a></li>
60 <li class="${'active' if c.active=='my_all' else ''}"><a href="${h.route_path('gists_show', _query={'public':1, 'private': 1})}">${_('My gists')}</a></li>
61 <li class="${'active' if c.active=='my_private' else ''}"><a href="${h.route_path('gists_show', _query={'private': 1})}">${_('My private')}</a></li>
62 <li class="${'active' if c.active=='my_public' else ''}"><a href="${h.route_path('gists_show', _query={'public': 1})}">${_('My public')}</a></li>
63 63 %endif
64 64 </ul>
65 65 </div>
66 66
67 67 <div class="main-content">
68 68 <div id="repos_list_wrap">
69 69 <table id="gist_list_table" class="display"></table>
70 70 </div>
71 71 </div>
72 72 </div>
73 73 </div>
74 74 <script>
75 75 $(document).ready(function() {
76 76
77 77 var get_datatable_count = function(){
78 78 var api = $('#gist_list_table').dataTable().api();
79 79 $('#gists_count').text(api.page.info().recordsDisplay);
80 80 };
81 81
82 82
83 83 // custom filter that filters by access_id, description or author
84 84 $.fn.dataTable.ext.search.push(
85 85 function( settings, data, dataIndex ) {
86 86 var query = $('#q_filter').val();
87 87 var author = data[0].strip();
88 88 var access_id = data[2].strip();
89 89 var description = data[3].strip();
90 90
91 91 var query_str = (access_id + " " + author + " " + description).toLowerCase();
92 92
93 93 if(query_str.indexOf(query.toLowerCase()) !== -1){
94 94 return true;
95 95 }
96 96 return false;
97 97 }
98 98 );
99 99
100 100 // gists list
101 101 $('#gist_list_table').DataTable({
102 102 data: ${c.data|n},
103 103 dom: 'rtp',
104 104 pageLength: ${c.visual.dashboard_items},
105 105 order: [[ 4, "desc" ]],
106 106 columns: [
107 107 { data: {"_": "author",
108 108 "sort": "author_raw"}, title: "${_("Author")}", width: "250px", className: "td-user" },
109 109 { data: {"_": "type",
110 110 "sort": "type"}, title: "${_("Type")}", width: "70px", className: "td-tags" },
111 111 { data: {"_": "access_id",
112 112 "sort": "access_id"}, title: "${_("Name")}", width:"150px", className: "td-componentname" },
113 113 { data: {"_": "description",
114 114 "sort": "description"}, title: "${_("Description")}", width: "250px", className: "td-description" },
115 115 { data: {"_": "created_on",
116 116 "sort": "created_on_raw"}, title: "${_("Created on")}", className: "td-time" },
117 117 { data: {"_": "expires",
118 118 "sort": "expires"}, title: "${_("Expires")}", className: "td-exp" }
119 119 ],
120 120 language: {
121 121 paginate: DEFAULT_GRID_PAGINATION,
122 122 emptyTable: _gettext("No gists available yet.")
123 123 },
124 124 "initComplete": function( settings, json ) {
125 125 timeagoActivate();
126 126 get_datatable_count();
127 127 }
128 128 });
129 129
130 130 // update the counter when things change
131 131 $('#gist_list_table').on('draw.dt', function() {
132 132 timeagoActivate();
133 133 get_datatable_count();
134 134 });
135 135
136 136 // filter, filter both grids
137 137 $('#q_filter').on( 'keyup', function () {
138 138 var repo_api = $('#gist_list_table').dataTable().api();
139 139 repo_api
140 140 .draw();
141 141 });
142 142
143 143 // refilter table if page load via back button
144 144 $("#q_filter").trigger('keyup');
145 145
146 146 });
147 147
148 148 </script>
149 149 </%def>
150 150
@@ -1,86 +1,86 b''
1 1 ## -*- coding: utf-8 -*-
2 2 <%inherit file="/base/base.mako"/>
3 3
4 4 <%def name="title()">
5 5 ${_('New Gist')}
6 6 %if c.rhodecode_name:
7 7 &middot; ${h.branding(c.rhodecode_name)}
8 8 %endif
9 9 </%def>
10 10
11 11 <%def name="breadcrumbs_links()">
12 12 ${_('New Gist')}
13 13 </%def>
14 14
15 15 <%def name="menu_bar_nav()">
16 16 ${self.menu_items(active='gists')}
17 17 </%def>
18 18
19 19 <%def name="main()">
20 20 <div class="box">
21 21 <!-- box / title -->
22 22 <div class="title">
23 23 ${self.breadcrumbs()}
24 24 </div>
25 25
26 26 <div class="table">
27 27 <div id="files_data">
28 ${h.secure_form(h.url('gists'), method='post',id='eform')}
28 ${h.secure_form(h.route_path('gists_create'), id='eform', method='POST')}
29 29 <div>
30 30 <textarea id="description" name="description" placeholder="${_('Gist description ...')}"></textarea>
31 31
32 32 <span class="gist-gravatar">
33 33 ${self.gravatar(c.rhodecode_user.email, 30)}
34 34 </span>
35 35 <label for='gistid'>${_('Gist id')}</label>
36 36 ${h.text('gistid', placeholder=_('Auto generated'))}
37 37
38 38 <label for='lifetime'>${_('Gist lifetime')}</label>
39 39 ${h.dropdownmenu('lifetime', '', c.lifetime_options)}
40 40
41 41 <label for='acl_level'>${_('Gist access level')}</label>
42 42 ${h.dropdownmenu('gist_acl_level', '', c.acl_options)}
43 43
44 44 </div>
45 45 <div id="codeblock" class="codeblock">
46 46 <div class="code-header">
47 47 <div class="form">
48 48 <div class="fields">
49 49 ${h.text('filename', size=30, placeholder=_('name this file...'))}
50 50 ${h.dropdownmenu('mimetype','plain',[('plain',_('plain'))],enable_filter=True)}
51 51 </div>
52 52 </div>
53 53 </div>
54 54 <div id="editor_container">
55 55 <div id="editor_pre"></div>
56 56 <textarea id="editor" name="content" ></textarea>
57 57 </div>
58 58 </div>
59 59 <div class="pull-right">
60 60 ${h.submit('private',_('Create Private Gist'),class_="btn")}
61 61 ${h.submit('public',_('Create Public Gist'),class_="btn")}
62 62 ${h.reset('reset',_('Reset'),class_="btn")}
63 63 </div>
64 64 ${h.end_form()}
65 65 </div>
66 66 </div>
67 67
68 68 </div>
69 69
70 70 <script type="text/javascript">
71 71 var myCodeMirror = initCodeMirror('editor', '');
72 72
73 73 var modes_select = $('#mimetype');
74 74 fillCodeMirrorOptions(modes_select);
75 75
76 76 var filename_selector = '#filename';
77 77 // on change of select field set mode
78 78 setCodeMirrorModeFromSelect(
79 79 modes_select, filename_selector, myCodeMirror, null);
80 80
81 81 // on entering the new filename set mode, from given extension
82 82 setCodeMirrorModeFromInput(
83 83 modes_select, filename_selector, myCodeMirror, null);
84 84
85 85 </script>
86 86 </%def>
@@ -1,108 +1,110 b''
1 1 ## -*- coding: utf-8 -*-
2 2 <%inherit file="/base/base.mako"/>
3 3
4 4 <%def name="robots()">
5 5 %if c.gist.gist_type != 'public':
6 6 <meta name="robots" content="noindex, nofollow">
7 7 %else:
8 8 ${parent.robots()}
9 9 %endif
10 10 </%def>
11 11
12 12 <%def name="title()">
13 13 ${_('Gist')} &middot; ${c.gist.gist_access_id}
14 14 %if c.rhodecode_name:
15 15 &middot; ${h.branding(c.rhodecode_name)}
16 16 %endif
17 17 </%def>
18 18
19 19 <%def name="breadcrumbs_links()">
20 20 ${_('Gist')} &middot; ${c.gist.gist_access_id}
21 / ${_('URL')}: ${c.gist.gist_url()}
22 21 </%def>
23 22
24 23 <%def name="menu_bar_nav()">
25 24 ${self.menu_items(active='gists')}
26 25 </%def>
27 26
28 27 <%def name="main()">
29 28 <div class="box">
30 29 <!-- box / title -->
31 30 <div class="title">
32 31 ${self.breadcrumbs()}
33 32 %if c.rhodecode_user.username != h.DEFAULT_USER:
34 33 <ul class="links">
35 34 <li>
36 <a href="${h.url('new_gist')}" class="btn btn-primary">${_(u'Create New Gist')}</a>
35 <a href="${h.route_path('gists_new')}" class="btn btn-primary">${_(u'Create New Gist')}</a>
37 36 </li>
38 37 </ul>
39 38 %endif
40 39 </div>
40 <code>${c.gist.gist_url()}</code>
41 41 <div class="table">
42 42 <div id="files_data">
43 43 <div id="codeblock" class="codeblock">
44 44 <div class="code-header">
45 45 <div class="stats">
46 46 %if h.HasPermissionAny('hg.admin')() or c.gist.gist_owner == c.rhodecode_user.user_id:
47 47 <div class="remove_gist">
48 ${h.secure_form(url('gist', gist_id=c.gist.gist_access_id),method='delete')}
48 ${h.secure_form(h.route_path('gist_delete', gist_id=c.gist.gist_access_id), method='POST')}
49 49 ${h.submit('remove_gist', _('Delete'),class_="btn btn-mini btn-danger",onclick="return confirm('"+_('Confirm to delete this Gist')+"');")}
50 50 ${h.end_form()}
51 51 </div>
52 52 %endif
53 53 <div class="buttons">
54 54 ## only owner should see that
55 55 %if h.HasPermissionAny('hg.admin')() or c.gist.gist_owner == c.rhodecode_user.user_id:
56 ${h.link_to(_('Edit'),h.url('edit_gist', gist_id=c.gist.gist_access_id),class_="btn btn-mini")}
56 ${h.link_to(_('Edit'), h.route_path('gist_edit', gist_id=c.gist.gist_access_id), class_="btn btn-mini")}
57 57 %endif
58 ${h.link_to(_('Show as Raw'),h.url('formatted_gist', gist_id=c.gist.gist_access_id, format='raw'),class_="btn btn-mini")}
58 ${h.link_to(_('Show as Raw'), h.route_path('gist_show_formatted', gist_id=c.gist.gist_access_id, revision='tip', format='raw'), class_="btn btn-mini")}
59 59 </div>
60 60 <div class="left" >
61 61 %if c.gist.gist_type != 'public':
62 62 <span class="tag tag-ok disabled">${_('Private Gist')}</span>
63 63 %endif
64 64 <span> ${c.gist.gist_description}</span>
65 65 <span>${_('Expires')}:
66 66 %if c.gist.gist_expires == -1:
67 67 ${_('never')}
68 68 %else:
69 69 ${h.age_component(h.time_to_utcdatetime(c.gist.gist_expires))}
70 70 %endif
71 71 </span>
72 72 </div>
73 73 </div>
74 74
75 75 <div class="author">
76 76 <div title="${h.tooltip(c.file_last_commit.author)}">
77 77 ${self.gravatar_with_user(c.file_last_commit.author, 16)} - ${_('created')} ${h.age_component(c.file_last_commit.date)}
78 78 </div>
79 79
80 80 </div>
81 <div class="commit">${h.urlify_commit_message(c.file_last_commit.message,c.repo_name)}</div>
81 <div class="commit">${h.urlify_commit_message(c.file_last_commit.message, None)}</div>
82 82 </div>
83 83
84 84 ## iterate over the files
85 85 % for file in c.files:
86 86 <% renderer = c.render and h.renderer_from_filename(file.path, exclude=['.txt', '.TXT'])%>
87 <!-- <div id="${h.FID('G', file.path)}" class="stats" >
87 <!--
88 <div id="${h.FID('G', file.path)}" class="stats" >
88 89 <a href="${c.gist.gist_url()}">¶</a>
89 90 <b >${file.path}</b>
90 91 <div>
91 ${h.link_to(_('Show as raw'),h.url('formatted_gist_file', gist_id=c.gist.gist_access_id, format='raw', revision=file.commit.raw_id, f_path=file.path),class_="btn btn-mini")}
92 ${h.link_to(_('Show as raw'), h.route_path('gist_show_formatted_path', gist_id=c.gist.gist_access_id, revision=file.commit.raw_id, format='raw', f_path=file.path), class_="btn btn-mini")}
92 93 </div>
93 </div> -->
94 </div>
95 -->
94 96 <div class="code-body textarea text-area editor">
95 97 %if renderer:
96 98 ${h.render(file.content, renderer=renderer)}
97 99 %else:
98 100 ${h.pygmentize(file,linenos=True,anchorlinenos=True,lineanchors='L',cssclass="code-highlight")}
99 101 %endif
100 102 </div>
101 103 %endfor
102 104 </div>
103 105 </div>
104 106 </div>
105 107
106 108
107 109 </div>
108 110 </%def>
@@ -1,604 +1,604 b''
1 1 ## -*- coding: utf-8 -*-
2 2 <%inherit file="root.mako"/>
3 3
4 4 <div class="outerwrapper">
5 5 <!-- HEADER -->
6 6 <div class="header">
7 7 <div id="header-inner" class="wrapper">
8 8 <div id="logo">
9 9 <div class="logo-wrapper">
10 10 <a href="${h.route_path('home')}"><img src="${h.asset('images/rhodecode-logo-white-216x60.png')}" alt="RhodeCode"/></a>
11 11 </div>
12 12 %if c.rhodecode_name:
13 13 <div class="branding">- ${h.branding(c.rhodecode_name)}</div>
14 14 %endif
15 15 </div>
16 16 <!-- MENU BAR NAV -->
17 17 ${self.menu_bar_nav()}
18 18 <!-- END MENU BAR NAV -->
19 19 </div>
20 20 </div>
21 21 ${self.menu_bar_subnav()}
22 22 <!-- END HEADER -->
23 23
24 24 <!-- CONTENT -->
25 25 <div id="content" class="wrapper">
26 26
27 27 <rhodecode-toast id="notifications"></rhodecode-toast>
28 28
29 29 <div class="main">
30 30 ${next.main()}
31 31 </div>
32 32 </div>
33 33 <!-- END CONTENT -->
34 34
35 35 </div>
36 36 <!-- FOOTER -->
37 37 <div id="footer">
38 38 <div id="footer-inner" class="title wrapper">
39 39 <div>
40 40 <p class="footer-link-right">
41 41 % if c.visual.show_version:
42 42 RhodeCode Enterprise ${c.rhodecode_version} ${c.rhodecode_edition}
43 43 % endif
44 44 &copy; 2010-${h.datetime.today().year}, <a href="${h.route_url('rhodecode_official')}" target="_blank">RhodeCode GmbH</a>. All rights reserved.
45 45 % if c.visual.rhodecode_support_url:
46 46 <a href="${c.visual.rhodecode_support_url}" target="_blank">${_('Support')}</a>
47 47 % endif
48 48 </p>
49 49 <% sid = 'block' if request.GET.get('showrcid') else 'none' %>
50 50 <p class="server-instance" style="display:${sid}">
51 51 ## display hidden instance ID if specially defined
52 52 % if c.rhodecode_instanceid:
53 53 ${_('RhodeCode instance id: %s') % c.rhodecode_instanceid}
54 54 % endif
55 55 </p>
56 56 </div>
57 57 </div>
58 58 </div>
59 59
60 60 <!-- END FOOTER -->
61 61
62 62 ### MAKO DEFS ###
63 63
64 64 <%def name="menu_bar_subnav()">
65 65 </%def>
66 66
67 67 <%def name="breadcrumbs(class_='breadcrumbs')">
68 68 <div class="${class_}">
69 69 ${self.breadcrumbs_links()}
70 70 </div>
71 71 </%def>
72 72
73 73 <%def name="admin_menu()">
74 74 <ul class="admin_menu submenu">
75 75 <li><a href="${h.route_path('admin_audit_logs')}">${_('Admin audit logs')}</a></li>
76 76 <li><a href="${h.url('repos')}">${_('Repositories')}</a></li>
77 77 <li><a href="${h.url('repo_groups')}">${_('Repository groups')}</a></li>
78 78 <li><a href="${h.route_path('users')}">${_('Users')}</a></li>
79 79 <li><a href="${h.url('users_groups')}">${_('User groups')}</a></li>
80 80 <li><a href="${h.url('admin_permissions_application')}">${_('Permissions')}</a></li>
81 81 <li><a href="${h.route_path('auth_home', traverse='')}">${_('Authentication')}</a></li>
82 82 <li><a href="${h.route_path('global_integrations_home')}">${_('Integrations')}</a></li>
83 83 <li><a href="${h.url('admin_defaults_repositories')}">${_('Defaults')}</a></li>
84 84 <li class="last"><a href="${h.url('admin_settings')}">${_('Settings')}</a></li>
85 85 </ul>
86 86 </%def>
87 87
88 88
89 89 <%def name="dt_info_panel(elements)">
90 90 <dl class="dl-horizontal">
91 91 %for dt, dd, title, show_items in elements:
92 92 <dt>${dt}:</dt>
93 93 <dd title="${h.tooltip(title)}">
94 94 %if callable(dd):
95 95 ## allow lazy evaluation of elements
96 96 ${dd()}
97 97 %else:
98 98 ${dd}
99 99 %endif
100 100 %if show_items:
101 101 <span class="btn-collapse" data-toggle="item-${h.md5_safe(dt)[:6]}-details">${_('Show More')} </span>
102 102 %endif
103 103 </dd>
104 104
105 105 %if show_items:
106 106 <div class="collapsable-content" data-toggle="item-${h.md5_safe(dt)[:6]}-details" style="display: none">
107 107 %for item in show_items:
108 108 <dt></dt>
109 109 <dd>${item}</dd>
110 110 %endfor
111 111 </div>
112 112 %endif
113 113
114 114 %endfor
115 115 </dl>
116 116 </%def>
117 117
118 118
119 119 <%def name="gravatar(email, size=16)">
120 120 <%
121 121 if (size > 16):
122 122 gravatar_class = 'gravatar gravatar-large'
123 123 else:
124 124 gravatar_class = 'gravatar'
125 125 %>
126 126 <%doc>
127 127 TODO: johbo: For now we serve double size images to make it smooth
128 128 for retina. This is how it worked until now. Should be replaced
129 129 with a better solution at some point.
130 130 </%doc>
131 131 <img class="${gravatar_class}" src="${h.gravatar_url(email, size * 2)}" height="${size}" width="${size}">
132 132 </%def>
133 133
134 134
135 135 <%def name="gravatar_with_user(contact, size=16, show_disabled=False)">
136 136 <% email = h.email_or_none(contact) %>
137 137 <div class="rc-user tooltip" title="${h.tooltip(h.author_string(email))}">
138 138 ${self.gravatar(email, size)}
139 139 <span class="${'user user-disabled' if show_disabled else 'user'}"> ${h.link_to_user(contact)}</span>
140 140 </div>
141 141 </%def>
142 142
143 143
144 144 ## admin menu used for people that have some admin resources
145 145 <%def name="admin_menu_simple(repositories=None, repository_groups=None, user_groups=None)">
146 146 <ul class="submenu">
147 147 %if repositories:
148 148 <li class="local-admin-repos"><a href="${h.url('repos')}">${_('Repositories')}</a></li>
149 149 %endif
150 150 %if repository_groups:
151 151 <li class="local-admin-repo-groups"><a href="${h.url('repo_groups')}">${_('Repository groups')}</a></li>
152 152 %endif
153 153 %if user_groups:
154 154 <li class="local-admin-user-groups"><a href="${h.url('users_groups')}">${_('User groups')}</a></li>
155 155 %endif
156 156 </ul>
157 157 </%def>
158 158
159 159 <%def name="repo_page_title(repo_instance)">
160 160 <div class="title-content">
161 161 <div class="title-main">
162 162 ## SVN/HG/GIT icons
163 163 %if h.is_hg(repo_instance):
164 164 <i class="icon-hg"></i>
165 165 %endif
166 166 %if h.is_git(repo_instance):
167 167 <i class="icon-git"></i>
168 168 %endif
169 169 %if h.is_svn(repo_instance):
170 170 <i class="icon-svn"></i>
171 171 %endif
172 172
173 173 ## public/private
174 174 %if repo_instance.private:
175 175 <i class="icon-repo-private"></i>
176 176 %else:
177 177 <i class="icon-repo-public"></i>
178 178 %endif
179 179
180 180 ## repo name with group name
181 181 ${h.breadcrumb_repo_link(c.rhodecode_db_repo)}
182 182
183 183 </div>
184 184
185 185 ## FORKED
186 186 %if repo_instance.fork:
187 187 <p>
188 188 <i class="icon-code-fork"></i> ${_('Fork of')}
189 189 <a href="${h.route_path('repo_summary',repo_name=repo_instance.fork.repo_name)}">${repo_instance.fork.repo_name}</a>
190 190 </p>
191 191 %endif
192 192
193 193 ## IMPORTED FROM REMOTE
194 194 %if repo_instance.clone_uri:
195 195 <p>
196 196 <i class="icon-code-fork"></i> ${_('Clone from')}
197 197 <a href="${h.url(h.safe_str(h.hide_credentials(repo_instance.clone_uri)))}">${h.hide_credentials(repo_instance.clone_uri)}</a>
198 198 </p>
199 199 %endif
200 200
201 201 ## LOCKING STATUS
202 202 %if repo_instance.locked[0]:
203 203 <p class="locking_locked">
204 204 <i class="icon-repo-lock"></i>
205 205 ${_('Repository locked by %(user)s') % {'user': h.person_by_id(repo_instance.locked[0])}}
206 206 </p>
207 207 %elif repo_instance.enable_locking:
208 208 <p class="locking_unlocked">
209 209 <i class="icon-repo-unlock"></i>
210 210 ${_('Repository not locked. Pull repository to lock it.')}
211 211 </p>
212 212 %endif
213 213
214 214 </div>
215 215 </%def>
216 216
217 217 <%def name="repo_menu(active=None)">
218 218 <%
219 219 def is_active(selected):
220 220 if selected == active:
221 221 return "active"
222 222 %>
223 223
224 224 <!--- CONTEXT BAR -->
225 225 <div id="context-bar">
226 226 <div class="wrapper">
227 227 <ul id="context-pages" class="horizontal-list navigation">
228 228 <li class="${is_active('summary')}"><a class="menulink" href="${h.route_path('repo_summary', repo_name=c.repo_name)}"><div class="menulabel">${_('Summary')}</div></a></li>
229 229 <li class="${is_active('changelog')}"><a class="menulink" href="${h.url('changelog_home', repo_name=c.repo_name)}"><div class="menulabel">${_('Changelog')}</div></a></li>
230 230 <li class="${is_active('files')}"><a class="menulink" href="${h.url('files_home', repo_name=c.repo_name, revision=c.rhodecode_db_repo.landing_rev[1])}"><div class="menulabel">${_('Files')}</div></a></li>
231 231 <li class="${is_active('compare')}">
232 232 <a class="menulink" href="${h.url('compare_home',repo_name=c.repo_name)}"><div class="menulabel">${_('Compare')}</div></a>
233 233 </li>
234 234 ## TODO: anderson: ideally it would have a function on the scm_instance "enable_pullrequest() and enable_fork()"
235 235 %if c.rhodecode_db_repo.repo_type in ['git','hg']:
236 236 <li class="${is_active('showpullrequest')}">
237 237 <a class="menulink" href="${h.route_path('pullrequest_show_all', repo_name=c.repo_name)}" title="${h.tooltip(_('Show Pull Requests for %s') % c.repo_name)}">
238 238 %if c.repository_pull_requests:
239 239 <span class="pr_notifications">${c.repository_pull_requests}</span>
240 240 %endif
241 241 <div class="menulabel">${_('Pull Requests')}</div>
242 242 </a>
243 243 </li>
244 244 %endif
245 245 <li class="${is_active('options')}">
246 246 <a class="menulink dropdown">
247 247 <div class="menulabel">${_('Options')} <div class="show_more"></div></div>
248 248 </a>
249 249 <ul class="submenu">
250 250 %if h.HasRepoPermissionAll('repository.admin')(c.repo_name):
251 251 <li><a href="${h.route_path('edit_repo',repo_name=c.repo_name)}">${_('Settings')}</a></li>
252 252 %endif
253 253 %if c.rhodecode_db_repo.fork:
254 254 <li><a href="${h.url('compare_url',repo_name=c.rhodecode_db_repo.fork.repo_name,source_ref_type=c.rhodecode_db_repo.landing_rev[0],source_ref=c.rhodecode_db_repo.landing_rev[1], target_repo=c.repo_name,target_ref_type='branch' if request.GET.get('branch') else c.rhodecode_db_repo.landing_rev[0],target_ref=request.GET.get('branch') or c.rhodecode_db_repo.landing_rev[1], merge=1)}">
255 255 ${_('Compare fork')}</a></li>
256 256 %endif
257 257
258 258 <li><a href="${h.route_path('search_repo',repo_name=c.repo_name)}">${_('Search')}</a></li>
259 259
260 260 %if h.HasRepoPermissionAny('repository.write','repository.admin')(c.repo_name) and c.rhodecode_db_repo.enable_locking:
261 261 %if c.rhodecode_db_repo.locked[0]:
262 262 <li><a class="locking_del" href="${h.url('toggle_locking',repo_name=c.repo_name)}">${_('Unlock')}</a></li>
263 263 %else:
264 264 <li><a class="locking_add" href="${h.url('toggle_locking',repo_name=c.repo_name)}">${_('Lock')}</a></li>
265 265 %endif
266 266 %endif
267 267 %if c.rhodecode_user.username != h.DEFAULT_USER:
268 268 %if c.rhodecode_db_repo.repo_type in ['git','hg']:
269 269 <li><a href="${h.url('repo_fork_home',repo_name=c.repo_name)}">${_('Fork')}</a></li>
270 270 <li><a href="${h.url('pullrequest_home',repo_name=c.repo_name)}">${_('Create Pull Request')}</a></li>
271 271 %endif
272 272 %endif
273 273 </ul>
274 274 </li>
275 275 </ul>
276 276 </div>
277 277 <div class="clear"></div>
278 278 </div>
279 279 <!--- END CONTEXT BAR -->
280 280
281 281 </%def>
282 282
283 283 <%def name="usermenu(active=False)">
284 284 ## USER MENU
285 285 <li id="quick_login_li" class="${'active' if active else ''}">
286 286 <a id="quick_login_link" class="menulink childs">
287 287 ${gravatar(c.rhodecode_user.email, 20)}
288 288 <span class="user">
289 289 %if c.rhodecode_user.username != h.DEFAULT_USER:
290 290 <span class="menu_link_user">${c.rhodecode_user.username}</span><div class="show_more"></div>
291 291 %else:
292 292 <span>${_('Sign in')}</span>
293 293 %endif
294 294 </span>
295 295 </a>
296 296
297 297 <div class="user-menu submenu">
298 298 <div id="quick_login">
299 299 %if c.rhodecode_user.username == h.DEFAULT_USER:
300 300 <h4>${_('Sign in to your account')}</h4>
301 301 ${h.form(h.route_path('login', _query={'came_from': h.url.current()}), needs_csrf_token=False)}
302 302 <div class="form form-vertical">
303 303 <div class="fields">
304 304 <div class="field">
305 305 <div class="label">
306 306 <label for="username">${_('Username')}:</label>
307 307 </div>
308 308 <div class="input">
309 309 ${h.text('username',class_='focus',tabindex=1)}
310 310 </div>
311 311
312 312 </div>
313 313 <div class="field">
314 314 <div class="label">
315 315 <label for="password">${_('Password')}:</label>
316 316 %if h.HasPermissionAny('hg.password_reset.enabled')():
317 317 <span class="forgot_password">${h.link_to(_('(Forgot password?)'),h.route_path('reset_password'), class_='pwd_reset')}</span>
318 318 %endif
319 319 </div>
320 320 <div class="input">
321 321 ${h.password('password',class_='focus',tabindex=2)}
322 322 </div>
323 323 </div>
324 324 <div class="buttons">
325 325 <div class="register">
326 326 %if h.HasPermissionAny('hg.admin', 'hg.register.auto_activate', 'hg.register.manual_activate')():
327 327 ${h.link_to(_("Don't have an account?"),h.route_path('register'))} <br/>
328 328 %endif
329 329 ${h.link_to(_("Using external auth? Sign In here."),h.route_path('login'))}
330 330 </div>
331 331 <div class="submit">
332 332 ${h.submit('sign_in',_('Sign In'),class_="btn btn-small",tabindex=3)}
333 333 </div>
334 334 </div>
335 335 </div>
336 336 </div>
337 337 ${h.end_form()}
338 338 %else:
339 339 <div class="">
340 340 <div class="big_gravatar">${gravatar(c.rhodecode_user.email, 48)}</div>
341 341 <div class="full_name">${c.rhodecode_user.full_name_or_username}</div>
342 342 <div class="email">${c.rhodecode_user.email}</div>
343 343 </div>
344 344 <div class="">
345 345 <ol class="links">
346 346 <li>${h.link_to(_(u'My account'),h.route_path('my_account_profile'))}</li>
347 347 % if c.rhodecode_user.personal_repo_group:
348 348 <li>${h.link_to(_(u'My personal group'), h.route_path('repo_group_home', repo_group_name=c.rhodecode_user.personal_repo_group.group_name))}</li>
349 349 % endif
350 350 <li class="logout">
351 351 ${h.secure_form(h.route_path('logout'))}
352 352 ${h.submit('log_out', _(u'Sign Out'),class_="btn btn-primary")}
353 353 ${h.end_form()}
354 354 </li>
355 355 </ol>
356 356 </div>
357 357 %endif
358 358 </div>
359 359 </div>
360 360 %if c.rhodecode_user.username != h.DEFAULT_USER:
361 361 <div class="pill_container">
362 362 % if c.unread_notifications == 0:
363 363 <a class="menu_link_notifications empty" href="${h.url('notifications')}">${c.unread_notifications}</a>
364 364 % else:
365 365 <a class="menu_link_notifications" href="${h.url('notifications')}">${c.unread_notifications}</a>
366 366 % endif
367 367 </div>
368 368 % endif
369 369 </li>
370 370 </%def>
371 371
372 372 <%def name="menu_items(active=None)">
373 373 <%
374 374 def is_active(selected):
375 375 if selected == active:
376 376 return "active"
377 377 return ""
378 378 %>
379 379 <ul id="quick" class="main_nav navigation horizontal-list">
380 380 <!-- repo switcher -->
381 381 <li class="${is_active('repositories')} repo_switcher_li has_select2">
382 382 <input id="repo_switcher" name="repo_switcher" type="hidden">
383 383 </li>
384 384
385 385 ## ROOT MENU
386 386 %if c.rhodecode_user.username != h.DEFAULT_USER:
387 387 <li class="${is_active('journal')}">
388 388 <a class="menulink" title="${_('Show activity journal')}" href="${h.url('journal')}">
389 389 <div class="menulabel">${_('Journal')}</div>
390 390 </a>
391 391 </li>
392 392 %else:
393 393 <li class="${is_active('journal')}">
394 394 <a class="menulink" title="${_('Show Public activity journal')}" href="${h.url('public_journal')}">
395 395 <div class="menulabel">${_('Public journal')}</div>
396 396 </a>
397 397 </li>
398 398 %endif
399 399 <li class="${is_active('gists')}">
400 <a class="menulink childs" title="${_('Show Gists')}" href="${h.url('gists')}">
400 <a class="menulink childs" title="${_('Show Gists')}" href="${h.route_path('gists_show')}">
401 401 <div class="menulabel">${_('Gists')}</div>
402 402 </a>
403 403 </li>
404 404 <li class="${is_active('search')}">
405 405 <a class="menulink" title="${_('Search in repositories you have access to')}" href="${h.route_path('search')}">
406 406 <div class="menulabel">${_('Search')}</div>
407 407 </a>
408 408 </li>
409 409 % if h.HasPermissionAll('hg.admin')('access admin main page'):
410 410 <li class="${is_active('admin')}">
411 411 <a class="menulink childs" title="${_('Admin settings')}" href="#" onclick="return false;">
412 412 <div class="menulabel">${_('Admin')} <div class="show_more"></div></div>
413 413 </a>
414 414 ${admin_menu()}
415 415 </li>
416 416 % elif c.rhodecode_user.repositories_admin or c.rhodecode_user.repository_groups_admin or c.rhodecode_user.user_groups_admin:
417 417 <li class="${is_active('admin')}">
418 418 <a class="menulink childs" title="${_('Delegated Admin settings')}">
419 419 <div class="menulabel">${_('Admin')} <div class="show_more"></div></div>
420 420 </a>
421 421 ${admin_menu_simple(c.rhodecode_user.repositories_admin,
422 422 c.rhodecode_user.repository_groups_admin,
423 423 c.rhodecode_user.user_groups_admin or h.HasPermissionAny('hg.usergroup.create.true')())}
424 424 </li>
425 425 % endif
426 426 % if c.debug_style:
427 427 <li class="${is_active('debug_style')}">
428 428 <a class="menulink" title="${_('Style')}" href="${h.url('debug_style_home')}">
429 429 <div class="menulabel">${_('Style')}</div>
430 430 </a>
431 431 </li>
432 432 % endif
433 433 ## render extra user menu
434 434 ${usermenu(active=(active=='my_account'))}
435 435 </ul>
436 436
437 437 <script type="text/javascript">
438 438 var visual_show_public_icon = "${c.visual.show_public_icon}" == "True";
439 439
440 440 /*format the look of items in the list*/
441 441 var format = function(state, escapeMarkup){
442 442 if (!state.id){
443 443 return state.text; // optgroup
444 444 }
445 445 var obj_dict = state.obj;
446 446 var tmpl = '';
447 447
448 448 if(obj_dict && state.type == 'repo'){
449 449 if(obj_dict['repo_type'] === 'hg'){
450 450 tmpl += '<i class="icon-hg"></i> ';
451 451 }
452 452 else if(obj_dict['repo_type'] === 'git'){
453 453 tmpl += '<i class="icon-git"></i> ';
454 454 }
455 455 else if(obj_dict['repo_type'] === 'svn'){
456 456 tmpl += '<i class="icon-svn"></i> ';
457 457 }
458 458 if(obj_dict['private']){
459 459 tmpl += '<i class="icon-lock" ></i> ';
460 460 }
461 461 else if(visual_show_public_icon){
462 462 tmpl += '<i class="icon-unlock-alt"></i> ';
463 463 }
464 464 }
465 465 if(obj_dict && state.type == 'commit') {
466 466 tmpl += '<i class="icon-tag"></i>';
467 467 }
468 468 if(obj_dict && state.type == 'group'){
469 469 tmpl += '<i class="icon-folder-close"></i> ';
470 470 }
471 471 tmpl += escapeMarkup(state.text);
472 472 return tmpl;
473 473 };
474 474
475 475 var formatResult = function(result, container, query, escapeMarkup) {
476 476 return format(result, escapeMarkup);
477 477 };
478 478
479 479 var formatSelection = function(data, container, escapeMarkup) {
480 480 return format(data, escapeMarkup);
481 481 };
482 482
483 483 $("#repo_switcher").select2({
484 484 cachedDataSource: {},
485 485 minimumInputLength: 2,
486 486 placeholder: '<div class="menulabel">${_('Go to')} <div class="show_more"></div></div>',
487 487 dropdownAutoWidth: true,
488 488 formatResult: formatResult,
489 489 formatSelection: formatSelection,
490 490 containerCssClass: "repo-switcher",
491 491 dropdownCssClass: "repo-switcher-dropdown",
492 492 escapeMarkup: function(m){
493 493 // don't escape our custom placeholder
494 494 if(m.substr(0,23) == '<div class="menulabel">'){
495 495 return m;
496 496 }
497 497
498 498 return Select2.util.escapeMarkup(m);
499 499 },
500 500 query: $.debounce(250, function(query){
501 501 self = this;
502 502 var cacheKey = query.term;
503 503 var cachedData = self.cachedDataSource[cacheKey];
504 504
505 505 if (cachedData) {
506 506 query.callback({results: cachedData.results});
507 507 } else {
508 508 $.ajax({
509 509 url: pyroutes.url('goto_switcher_data'),
510 510 data: {'query': query.term},
511 511 dataType: 'json',
512 512 type: 'GET',
513 513 success: function(data) {
514 514 self.cachedDataSource[cacheKey] = data;
515 515 query.callback({results: data.results});
516 516 },
517 517 error: function(data, textStatus, errorThrown) {
518 518 alert("Error while fetching entries.\nError code {0} ({1}).".format(data.status, data.statusText));
519 519 }
520 520 })
521 521 }
522 522 })
523 523 });
524 524
525 525 $("#repo_switcher").on('select2-selecting', function(e){
526 526 e.preventDefault();
527 527 window.location = e.choice.url;
528 528 });
529 529
530 530 </script>
531 531 <script src="${h.asset('js/rhodecode/base/keyboard-bindings.js', ver=c.rhodecode_version_hash)}"></script>
532 532 </%def>
533 533
534 534 <div class="modal" id="help_kb" tabindex="-1" role="dialog" aria-labelledby="myModalLabel" aria-hidden="true">
535 535 <div class="modal-dialog">
536 536 <div class="modal-content">
537 537 <div class="modal-header">
538 538 <button type="button" class="close" data-dismiss="modal" aria-hidden="true">&times;</button>
539 539 <h4 class="modal-title" id="myModalLabel">${_('Keyboard shortcuts')}</h4>
540 540 </div>
541 541 <div class="modal-body">
542 542 <div class="block-left">
543 543 <table class="keyboard-mappings">
544 544 <tbody>
545 545 <tr>
546 546 <th></th>
547 547 <th>${_('Site-wide shortcuts')}</th>
548 548 </tr>
549 549 <%
550 550 elems = [
551 551 ('/', 'Open quick search box'),
552 552 ('g h', 'Goto home page'),
553 553 ('g g', 'Goto my private gists page'),
554 554 ('g G', 'Goto my public gists page'),
555 555 ('n r', 'New repository page'),
556 556 ('n g', 'New gist page'),
557 557 ]
558 558 %>
559 559 %for key, desc in elems:
560 560 <tr>
561 561 <td class="keys">
562 562 <span class="key tag">${key}</span>
563 563 </td>
564 564 <td>${desc}</td>
565 565 </tr>
566 566 %endfor
567 567 </tbody>
568 568 </table>
569 569 </div>
570 570 <div class="block-left">
571 571 <table class="keyboard-mappings">
572 572 <tbody>
573 573 <tr>
574 574 <th></th>
575 575 <th>${_('Repositories')}</th>
576 576 </tr>
577 577 <%
578 578 elems = [
579 579 ('g s', 'Goto summary page'),
580 580 ('g c', 'Goto changelog page'),
581 581 ('g f', 'Goto files page'),
582 582 ('g F', 'Goto files page with file search activated'),
583 583 ('g p', 'Goto pull requests page'),
584 584 ('g o', 'Goto repository settings'),
585 585 ('g O', 'Goto repository permissions settings'),
586 586 ]
587 587 %>
588 588 %for key, desc in elems:
589 589 <tr>
590 590 <td class="keys">
591 591 <span class="key tag">${key}</span>
592 592 </td>
593 593 <td>${desc}</td>
594 594 </tr>
595 595 %endfor
596 596 </tbody>
597 597 </table>
598 598 </div>
599 599 </div>
600 600 <div class="modal-footer">
601 601 </div>
602 602 </div><!-- /.modal-content -->
603 603 </div><!-- /.modal-dialog -->
604 604 </div><!-- /.modal -->
@@ -1,317 +1,317 b''
1 1 ## DATA TABLE RE USABLE ELEMENTS
2 2 ## usage:
3 3 ## <%namespace name="dt" file="/data_table/_dt_elements.mako"/>
4 4 <%namespace name="base" file="/base/base.mako"/>
5 5
6 6 ## REPOSITORY RENDERERS
7 7 <%def name="quick_menu(repo_name)">
8 8 <i class="pointer icon-more"></i>
9 9 <div class="menu_items_container hidden">
10 10 <ul class="menu_items">
11 11 <li>
12 12 <a title="${_('Summary')}" href="${h.route_path('repo_summary',repo_name=repo_name)}">
13 13 <span>${_('Summary')}</span>
14 14 </a>
15 15 </li>
16 16 <li>
17 17 <a title="${_('Changelog')}" href="${h.url('changelog_home',repo_name=repo_name)}">
18 18 <span>${_('Changelog')}</span>
19 19 </a>
20 20 </li>
21 21 <li>
22 22 <a title="${_('Files')}" href="${h.url('files_home',repo_name=repo_name)}">
23 23 <span>${_('Files')}</span>
24 24 </a>
25 25 </li>
26 26 <li>
27 27 <a title="${_('Fork')}" href="${h.url('repo_fork_home',repo_name=repo_name)}">
28 28 <span>${_('Fork')}</span>
29 29 </a>
30 30 </li>
31 31 </ul>
32 32 </div>
33 33 </%def>
34 34
35 35 <%def name="repo_name(name,rtype,rstate,private,fork_of,short_name=False,admin=False)">
36 36 <%
37 37 def get_name(name,short_name=short_name):
38 38 if short_name:
39 39 return name.split('/')[-1]
40 40 else:
41 41 return name
42 42 %>
43 43 <div class="${'repo_state_pending' if rstate == 'repo_state_pending' else ''} truncate">
44 44 ##NAME
45 45 <a href="${h.route_path('edit_repo',repo_name=name) if admin else h.route_path('repo_summary',repo_name=name)}">
46 46
47 47 ##TYPE OF REPO
48 48 %if h.is_hg(rtype):
49 49 <span title="${_('Mercurial repository')}"><i class="icon-hg"></i></span>
50 50 %elif h.is_git(rtype):
51 51 <span title="${_('Git repository')}"><i class="icon-git"></i></span>
52 52 %elif h.is_svn(rtype):
53 53 <span title="${_('Subversion repository')}"><i class="icon-svn"></i></span>
54 54 %endif
55 55
56 56 ##PRIVATE/PUBLIC
57 57 %if private and c.visual.show_private_icon:
58 58 <i class="icon-lock" title="${_('Private repository')}"></i>
59 59 %elif not private and c.visual.show_public_icon:
60 60 <i class="icon-unlock-alt" title="${_('Public repository')}"></i>
61 61 %else:
62 62 <span></span>
63 63 %endif
64 64 ${get_name(name)}
65 65 </a>
66 66 %if fork_of:
67 67 <a href="${h.route_path('repo_summary',repo_name=fork_of.repo_name)}"><i class="icon-code-fork"></i></a>
68 68 %endif
69 69 %if rstate == 'repo_state_pending':
70 70 <i class="icon-cogs" title="${_('Repository creating in progress...')}"></i>
71 71 %endif
72 72 </div>
73 73 </%def>
74 74
75 75 <%def name="repo_desc(description)">
76 76 <div class="truncate-wrap">${description}</div>
77 77 </%def>
78 78
79 79 <%def name="last_change(last_change)">
80 80 ${h.age_component(last_change)}
81 81 </%def>
82 82
83 83 <%def name="revision(name,rev,tip,author,last_msg)">
84 84 <div>
85 85 %if rev >= 0:
86 86 <code><a title="${h.tooltip('%s:\n\n%s' % (author,last_msg))}" class="tooltip" href="${h.url('changeset_home',repo_name=name,revision=tip)}">${'r%s:%s' % (rev,h.short_id(tip))}</a></code>
87 87 %else:
88 88 ${_('No commits yet')}
89 89 %endif
90 90 </div>
91 91 </%def>
92 92
93 93 <%def name="rss(name)">
94 94 %if c.rhodecode_user.username != h.DEFAULT_USER:
95 95 <a title="${h.tooltip(_('Subscribe to %s rss feed')% name)}" href="${h.url('rss_feed_home',repo_name=name,auth_token=c.rhodecode_user.feed_token)}"><i class="icon-rss-sign"></i></a>
96 96 %else:
97 97 <a title="${h.tooltip(_('Subscribe to %s rss feed')% name)}" href="${h.url('rss_feed_home',repo_name=name)}"><i class="icon-rss-sign"></i></a>
98 98 %endif
99 99 </%def>
100 100
101 101 <%def name="atom(name)">
102 102 %if c.rhodecode_user.username != h.DEFAULT_USER:
103 103 <a title="${h.tooltip(_('Subscribe to %s atom feed')% name)}" href="${h.url('atom_feed_home',repo_name=name,auth_token=c.rhodecode_user.feed_token)}"><i class="icon-rss-sign"></i></a>
104 104 %else:
105 105 <a title="${h.tooltip(_('Subscribe to %s atom feed')% name)}" href="${h.url('atom_feed_home',repo_name=name)}"><i class="icon-rss-sign"></i></a>
106 106 %endif
107 107 </%def>
108 108
109 109 <%def name="user_gravatar(email, size=16)">
110 110 <div class="rc-user tooltip" title="${h.tooltip(h.author_string(email))}">
111 111 ${base.gravatar(email, 16)}
112 112 </div>
113 113 </%def>
114 114
115 115 <%def name="repo_actions(repo_name, super_user=True)">
116 116 <div>
117 117 <div class="grid_edit">
118 118 <a href="${h.route_path('edit_repo',repo_name=repo_name)}" title="${_('Edit')}">
119 119 <i class="icon-pencil"></i>Edit</a>
120 120 </div>
121 121 <div class="grid_delete">
122 122 ${h.secure_form(h.route_path('edit_repo_advanced_delete', repo_name=repo_name), method='POST')}
123 123 ${h.submit('remove_%s' % repo_name,_('Delete'),class_="btn btn-link btn-danger",
124 124 onclick="return confirm('"+_('Confirm to delete this repository: %s') % repo_name+"');")}
125 125 ${h.end_form()}
126 126 </div>
127 127 </div>
128 128 </%def>
129 129
130 130 <%def name="repo_state(repo_state)">
131 131 <div>
132 132 %if repo_state == 'repo_state_pending':
133 133 <div class="tag tag4">${_('Creating')}</div>
134 134 %elif repo_state == 'repo_state_created':
135 135 <div class="tag tag1">${_('Created')}</div>
136 136 %else:
137 137 <div class="tag alert2" title="${h.tooltip(repo_state)}">invalid</div>
138 138 %endif
139 139 </div>
140 140 </%def>
141 141
142 142
143 143 ## REPO GROUP RENDERERS
144 144 <%def name="quick_repo_group_menu(repo_group_name)">
145 145 <i class="pointer icon-more"></i>
146 146 <div class="menu_items_container hidden">
147 147 <ul class="menu_items">
148 148 <li>
149 149 <a href="${h.route_path('repo_group_home', repo_group_name=repo_group_name)}">
150 150 <span class="icon">
151 151 <i class="icon-file-text"></i>
152 152 </span>
153 153 <span>${_('Summary')}</span>
154 154 </a>
155 155 </li>
156 156
157 157 </ul>
158 158 </div>
159 159 </%def>
160 160
161 161 <%def name="repo_group_name(repo_group_name, children_groups=None)">
162 162 <div>
163 163 <a href="${h.route_path('repo_group_home', repo_group_name=repo_group_name)}">
164 164 <i class="icon-folder-close" title="${_('Repository group')}"></i>
165 165 %if children_groups:
166 166 ${h.literal(' &raquo; '.join(children_groups))}
167 167 %else:
168 168 ${repo_group_name}
169 169 %endif
170 170 </a>
171 171 </div>
172 172 </%def>
173 173
174 174 <%def name="repo_group_desc(description)">
175 175 <div class="truncate-wrap">${description}</div>
176 176 </%def>
177 177
178 178 <%def name="repo_group_actions(repo_group_id, repo_group_name, gr_count)">
179 179 <div class="grid_edit">
180 180 <a href="${h.url('edit_repo_group',group_name=repo_group_name)}" title="${_('Edit')}">Edit</a>
181 181 </div>
182 182 <div class="grid_delete">
183 183 ${h.secure_form(h.url('delete_repo_group', group_name=repo_group_name),method='delete')}
184 184 ${h.submit('remove_%s' % repo_group_name,_('Delete'),class_="btn btn-link btn-danger",
185 185 onclick="return confirm('"+ungettext('Confirm to delete this group: %s with %s repository','Confirm to delete this group: %s with %s repositories',gr_count) % (repo_group_name, gr_count)+"');")}
186 186 ${h.end_form()}
187 187 </div>
188 188 </%def>
189 189
190 190
191 191 <%def name="user_actions(user_id, username)">
192 192 <div class="grid_edit">
193 193 <a href="${h.url('edit_user',user_id=user_id)}" title="${_('Edit')}">
194 194 <i class="icon-pencil"></i>Edit</a>
195 195 </div>
196 196 <div class="grid_delete">
197 197 ${h.secure_form(h.url('delete_user', user_id=user_id),method='delete')}
198 198 ${h.submit('remove_',_('Delete'),id="remove_user_%s" % user_id, class_="btn btn-link btn-danger",
199 199 onclick="return confirm('"+_('Confirm to delete this user: %s') % username+"');")}
200 200 ${h.end_form()}
201 201 </div>
202 202 </%def>
203 203
204 204 <%def name="user_group_actions(user_group_id, user_group_name)">
205 205 <div class="grid_edit">
206 206 <a href="${h.url('edit_users_group', user_group_id=user_group_id)}" title="${_('Edit')}">Edit</a>
207 207 </div>
208 208 <div class="grid_delete">
209 209 ${h.secure_form(h.url('delete_users_group', user_group_id=user_group_id),method='delete')}
210 210 ${h.submit('remove_',_('Delete'),id="remove_group_%s" % user_group_id, class_="btn btn-link btn-danger",
211 211 onclick="return confirm('"+_('Confirm to delete this user group: %s') % user_group_name+"');")}
212 212 ${h.end_form()}
213 213 </div>
214 214 </%def>
215 215
216 216
217 217 <%def name="user_name(user_id, username)">
218 218 ${h.link_to(h.person(username, 'username_or_name_or_email'), h.url('edit_user', user_id=user_id))}
219 219 </%def>
220 220
221 221 <%def name="user_profile(username)">
222 222 ${base.gravatar_with_user(username, 16)}
223 223 </%def>
224 224
225 225 <%def name="user_group_name(user_group_id, user_group_name)">
226 226 <div>
227 227 <a href="${h.url('edit_users_group', user_group_id=user_group_id)}">
228 228 <i class="icon-group" title="${_('User group')}"></i> ${user_group_name}</a>
229 229 </div>
230 230 </%def>
231 231
232 232
233 233 ## GISTS
234 234
235 235 <%def name="gist_gravatar(full_contact)">
236 236 <div class="gist_gravatar">
237 237 ${base.gravatar(full_contact, 30)}
238 238 </div>
239 239 </%def>
240 240
241 241 <%def name="gist_access_id(gist_access_id, full_contact)">
242 242 <div>
243 243 <b>
244 <a href="${h.url('gist',gist_id=gist_access_id)}">gist: ${gist_access_id}</a>
244 <a href="${h.route_path('gist_show', gist_id=gist_access_id)}">gist: ${gist_access_id}</a>
245 245 </b>
246 246 </div>
247 247 </%def>
248 248
249 249 <%def name="gist_author(full_contact, created_on, expires)">
250 250 ${base.gravatar_with_user(full_contact, 16)}
251 251 </%def>
252 252
253 253
254 254 <%def name="gist_created(created_on)">
255 255 <div class="created">
256 256 ${h.age_component(created_on, time_is_local=True)}
257 257 </div>
258 258 </%def>
259 259
260 260 <%def name="gist_expires(expires)">
261 261 <div class="created">
262 262 %if expires == -1:
263 263 ${_('never')}
264 264 %else:
265 265 ${h.age_component(h.time_to_utcdatetime(expires))}
266 266 %endif
267 267 </div>
268 268 </%def>
269 269
270 270 <%def name="gist_type(gist_type)">
271 271 %if gist_type != 'public':
272 272 <div class="tag">${_('Private')}</div>
273 273 %endif
274 274 </%def>
275 275
276 276 <%def name="gist_description(gist_description)">
277 277 ${gist_description}
278 278 </%def>
279 279
280 280
281 281 ## PULL REQUESTS GRID RENDERERS
282 282
283 283 <%def name="pullrequest_target_repo(repo_name)">
284 284 <div class="truncate">
285 285 ${h.link_to(repo_name,h.route_path('repo_summary',repo_name=repo_name))}
286 286 </div>
287 287 </%def>
288 288 <%def name="pullrequest_status(status)">
289 289 <div class="${'flag_status %s' % status} pull-left"></div>
290 290 </%def>
291 291
292 292 <%def name="pullrequest_title(title, description)">
293 293 ${title} <br/>
294 294 ${h.shorter(description, 40)}
295 295 </%def>
296 296
297 297 <%def name="pullrequest_comments(comments_nr)">
298 298 <i class="icon-comment"></i> ${comments_nr}
299 299 </%def>
300 300
301 301 <%def name="pullrequest_name(pull_request_id, target_repo_name, short=False)">
302 302 <a href="${h.route_path('pullrequest_show',repo_name=target_repo_name,pull_request_id=pull_request_id)}">
303 303 % if short:
304 304 #${pull_request_id}
305 305 % else:
306 306 ${_('Pull request #%(pr_number)s') % {'pr_number': pull_request_id,}}
307 307 % endif
308 308 </a>
309 309 </%def>
310 310
311 311 <%def name="pullrequest_updated_on(updated_on)">
312 312 ${h.age_component(h.time_to_utcdatetime(updated_on))}
313 313 </%def>
314 314
315 315 <%def name="pullrequest_author(full_contact)">
316 316 ${base.gravatar_with_user(full_contact, 16)}
317 317 </%def>
1 NO CONTENT: file was removed
General Comments 0
You need to be logged in to leave comments. Login now