##// END OF EJS Templates
admin: fixed problems with generating last change in admin panels....
marcink -
r4000:52837660 default
parent child Browse files
Show More
@@ -1,362 +1,365 b''
1 1 # -*- coding: utf-8 -*-
2 2
3 3 # Copyright (C) 2016-2019 RhodeCode GmbH
4 4 #
5 5 # This program is free software: you can redistribute it and/or modify
6 6 # it under the terms of the GNU Affero General Public License, version 3
7 7 # (only), as published by the Free Software Foundation.
8 8 #
9 9 # This program is distributed in the hope that it will be useful,
10 10 # but WITHOUT ANY WARRANTY; without even the implied warranty of
11 11 # MERCHANTABILITY or FITNESS FOR A PARTICULAR PURPOSE. See the
12 12 # GNU General Public License for more details.
13 13 #
14 14 # You should have received a copy of the GNU Affero General Public License
15 15 # along with this program. If not, see <http://www.gnu.org/licenses/>.
16 16 #
17 17 # This program is dual-licensed. If you wish to learn more about the
18 18 # RhodeCode Enterprise Edition, including its added features, Support services,
19 19 # and proprietary license terms, please see https://rhodecode.com/licenses/
20 20 import datetime
21 21 import logging
22 import time
23
22 24 import formencode
23 25 import formencode.htmlfill
24 26
25 27 from pyramid.httpexceptions import HTTPFound, HTTPForbidden
26 28 from pyramid.view import view_config
27 29 from pyramid.renderers import render
28 30 from pyramid.response import Response
29 31
30 32 from rhodecode import events
31 33 from rhodecode.apps._base import BaseAppView, DataGridAppView
32 34
33 35 from rhodecode.lib.auth import (
34 36 LoginRequired, CSRFRequired, NotAnonymous,
35 37 HasPermissionAny, HasRepoGroupPermissionAny)
36 38 from rhodecode.lib import helpers as h, audit_logger
37 39 from rhodecode.lib.utils2 import safe_int, safe_unicode, datetime_to_time
38 40 from rhodecode.model.forms import RepoGroupForm
39 41 from rhodecode.model.permission import PermissionModel
40 42 from rhodecode.model.repo_group import RepoGroupModel
41 43 from rhodecode.model.scm import RepoGroupList
42 44 from rhodecode.model.db import (
43 45 or_, count, func, in_filter_generator, Session, RepoGroup, User, Repository)
44 46
45 47 log = logging.getLogger(__name__)
46 48
47 49
48 50 class AdminRepoGroupsView(BaseAppView, DataGridAppView):
49 51
50 52 def load_default_context(self):
51 53 c = self._get_local_tmpl_context()
52 54
53 55 return c
54 56
55 57 def _load_form_data(self, c):
56 58 allow_empty_group = False
57 59
58 60 if self._can_create_repo_group():
59 61 # we're global admin, we're ok and we can create TOP level groups
60 62 allow_empty_group = True
61 63
62 64 # override the choices for this form, we need to filter choices
63 65 # and display only those we have ADMIN right
64 66 groups_with_admin_rights = RepoGroupList(
65 67 RepoGroup.query().all(),
66 68 perm_set=['group.admin'])
67 69 c.repo_groups = RepoGroup.groups_choices(
68 70 groups=groups_with_admin_rights,
69 71 show_empty_group=allow_empty_group)
70 72
71 73 def _can_create_repo_group(self, parent_group_id=None):
72 74 is_admin = HasPermissionAny('hg.admin')('group create controller')
73 75 create_repo_group = HasPermissionAny(
74 76 'hg.repogroup.create.true')('group create controller')
75 77 if is_admin or (create_repo_group and not parent_group_id):
76 78 # we're global admin, or we have global repo group create
77 79 # permission
78 80 # we're ok and we can create TOP level groups
79 81 return True
80 82 elif parent_group_id:
81 83 # we check the permission if we can write to parent group
82 84 group = RepoGroup.get(parent_group_id)
83 85 group_name = group.group_name if group else None
84 86 if HasRepoGroupPermissionAny('group.admin')(
85 87 group_name, 'check if user is an admin of group'):
86 88 # we're an admin of passed in group, we're ok.
87 89 return True
88 90 else:
89 91 return False
90 92 return False
91 93
92 94 # permission check in data loading of
93 95 # `repo_group_list_data` via RepoGroupList
94 96 @LoginRequired()
95 97 @NotAnonymous()
96 98 @view_config(
97 99 route_name='repo_groups', request_method='GET',
98 100 renderer='rhodecode:templates/admin/repo_groups/repo_groups.mako')
99 101 def repo_group_list(self):
100 102 c = self.load_default_context()
101 103 return self._get_template_context(c)
102 104
103 105 # permission check inside
104 106 @LoginRequired()
105 107 @NotAnonymous()
106 108 @view_config(
107 109 route_name='repo_groups_data', request_method='GET',
108 110 renderer='json_ext', xhr=True)
109 111 def repo_group_list_data(self):
110 112 self.load_default_context()
111 113 column_map = {
112 114 'name_raw': 'group_name_hash',
113 115 'desc': 'group_description',
114 116 'last_change_raw': 'updated_on',
115 117 'top_level_repos': 'repos_total',
116 118 'owner': 'user_username',
117 119 }
118 120 draw, start, limit = self._extract_chunk(self.request)
119 121 search_q, order_by, order_dir = self._extract_ordering(
120 122 self.request, column_map=column_map)
121 123
122 124 _render = self.request.get_partial_renderer(
123 125 'rhodecode:templates/data_table/_dt_elements.mako')
124 126 c = _render.get_call_context()
125 127
126 128 def quick_menu(repo_group_name):
127 129 return _render('quick_repo_group_menu', repo_group_name)
128 130
129 131 def repo_group_lnk(repo_group_name):
130 132 return _render('repo_group_name', repo_group_name)
131 133
132 134 def last_change(last_change):
133 135 if isinstance(last_change, datetime.datetime) and not last_change.tzinfo:
134 delta = datetime.timedelta(
135 seconds=(datetime.datetime.now() - datetime.datetime.utcnow()).seconds)
136 last_change = last_change + delta
136 ts = time.time()
137 utc_offset = (datetime.datetime.fromtimestamp(ts)
138 - datetime.datetime.utcfromtimestamp(ts)).total_seconds()
139 last_change = last_change + datetime.timedelta(seconds=utc_offset)
137 140 return _render("last_change", last_change)
138 141
139 142 def desc(desc, personal):
140 143 return _render(
141 144 'repo_group_desc', desc, personal, c.visual.stylify_metatags)
142 145
143 146 def repo_group_actions(repo_group_id, repo_group_name, gr_count):
144 147 return _render(
145 148 'repo_group_actions', repo_group_id, repo_group_name, gr_count)
146 149
147 150 def user_profile(username):
148 151 return _render('user_profile', username)
149 152
150 153 auth_repo_group_list = RepoGroupList(
151 154 RepoGroup.query().all(), perm_set=['group.admin'])
152 155
153 156 allowed_ids = [-1]
154 157 for repo_group in auth_repo_group_list:
155 158 allowed_ids.append(repo_group.group_id)
156 159
157 160 repo_groups_data_total_count = RepoGroup.query()\
158 161 .filter(or_(
159 162 # generate multiple IN to fix limitation problems
160 163 *in_filter_generator(RepoGroup.group_id, allowed_ids)
161 164 )) \
162 165 .count()
163 166
164 167 repo_groups_data_total_inactive_count = RepoGroup.query()\
165 168 .filter(RepoGroup.group_id.in_(allowed_ids))\
166 169 .count()
167 170
168 171 repo_count = count(Repository.repo_id)
169 172 base_q = Session.query(
170 173 RepoGroup.group_name,
171 174 RepoGroup.group_name_hash,
172 175 RepoGroup.group_description,
173 176 RepoGroup.group_id,
174 177 RepoGroup.personal,
175 178 RepoGroup.updated_on,
176 179 User,
177 180 repo_count.label('repos_count')
178 181 ) \
179 182 .filter(or_(
180 183 # generate multiple IN to fix limitation problems
181 184 *in_filter_generator(RepoGroup.group_id, allowed_ids)
182 185 )) \
183 186 .outerjoin(Repository, Repository.group_id == RepoGroup.group_id) \
184 187 .join(User, User.user_id == RepoGroup.user_id) \
185 188 .group_by(RepoGroup, User)
186 189
187 190 if search_q:
188 191 like_expression = u'%{}%'.format(safe_unicode(search_q))
189 192 base_q = base_q.filter(or_(
190 193 RepoGroup.group_name.ilike(like_expression),
191 194 ))
192 195
193 196 repo_groups_data_total_filtered_count = base_q.count()
194 197 # the inactive isn't really used, but we still make it same as other data grids
195 198 # which use inactive (users,user groups)
196 199 repo_groups_data_total_filtered_inactive_count = repo_groups_data_total_filtered_count
197 200
198 201 sort_defined = False
199 202 if order_by == 'group_name':
200 203 sort_col = func.lower(RepoGroup.group_name)
201 204 sort_defined = True
202 205 elif order_by == 'repos_total':
203 206 sort_col = repo_count
204 207 sort_defined = True
205 208 elif order_by == 'user_username':
206 209 sort_col = User.username
207 210 else:
208 211 sort_col = getattr(RepoGroup, order_by, None)
209 212
210 213 if sort_defined or sort_col:
211 214 if order_dir == 'asc':
212 215 sort_col = sort_col.asc()
213 216 else:
214 217 sort_col = sort_col.desc()
215 218
216 219 base_q = base_q.order_by(sort_col)
217 220 base_q = base_q.offset(start).limit(limit)
218 221
219 222 # authenticated access to user groups
220 223 auth_repo_group_list = base_q.all()
221 224
222 225 repo_groups_data = []
223 226 for repo_gr in auth_repo_group_list:
224 227 row = {
225 228 "menu": quick_menu(repo_gr.group_name),
226 229 "name": repo_group_lnk(repo_gr.group_name),
227 230 "name_raw": repo_gr.group_name,
228 231 "last_change": last_change(repo_gr.updated_on),
229 232 "last_change_raw": datetime_to_time(repo_gr.updated_on),
230 233
231 234 "last_changeset": "",
232 235 "last_changeset_raw": "",
233 236
234 237 "desc": desc(repo_gr.group_description, repo_gr.personal),
235 238 "owner": user_profile(repo_gr.User.username),
236 239 "top_level_repos": repo_gr.repos_count,
237 240 "action": repo_group_actions(
238 241 repo_gr.group_id, repo_gr.group_name, repo_gr.repos_count),
239 242
240 243 }
241 244
242 245 repo_groups_data.append(row)
243 246
244 247 data = ({
245 248 'draw': draw,
246 249 'data': repo_groups_data,
247 250 'recordsTotal': repo_groups_data_total_count,
248 251 'recordsTotalInactive': repo_groups_data_total_inactive_count,
249 252 'recordsFiltered': repo_groups_data_total_filtered_count,
250 253 'recordsFilteredInactive': repo_groups_data_total_filtered_inactive_count,
251 254 })
252 255
253 256 return data
254 257
255 258 @LoginRequired()
256 259 @NotAnonymous()
257 260 # perm checks inside
258 261 @view_config(
259 262 route_name='repo_group_new', request_method='GET',
260 263 renderer='rhodecode:templates/admin/repo_groups/repo_group_add.mako')
261 264 def repo_group_new(self):
262 265 c = self.load_default_context()
263 266
264 267 # perm check for admin, create_group perm or admin of parent_group
265 268 parent_group_id = safe_int(self.request.GET.get('parent_group'))
266 269 if not self._can_create_repo_group(parent_group_id):
267 270 raise HTTPForbidden()
268 271
269 272 self._load_form_data(c)
270 273
271 274 defaults = {} # Future proof for default of repo group
272 275 data = render(
273 276 'rhodecode:templates/admin/repo_groups/repo_group_add.mako',
274 277 self._get_template_context(c), self.request)
275 278 html = formencode.htmlfill.render(
276 279 data,
277 280 defaults=defaults,
278 281 encoding="UTF-8",
279 282 force_defaults=False
280 283 )
281 284 return Response(html)
282 285
283 286 @LoginRequired()
284 287 @NotAnonymous()
285 288 @CSRFRequired()
286 289 # perm checks inside
287 290 @view_config(
288 291 route_name='repo_group_create', request_method='POST',
289 292 renderer='rhodecode:templates/admin/repo_groups/repo_group_add.mako')
290 293 def repo_group_create(self):
291 294 c = self.load_default_context()
292 295 _ = self.request.translate
293 296
294 297 parent_group_id = safe_int(self.request.POST.get('group_parent_id'))
295 298 can_create = self._can_create_repo_group(parent_group_id)
296 299
297 300 self._load_form_data(c)
298 301 # permissions for can create group based on parent_id are checked
299 302 # here in the Form
300 303 available_groups = map(lambda k: safe_unicode(k[0]), c.repo_groups)
301 304 repo_group_form = RepoGroupForm(
302 305 self.request.translate, available_groups=available_groups,
303 306 can_create_in_root=can_create)()
304 307
305 308 repo_group_name = self.request.POST.get('group_name')
306 309 try:
307 310 owner = self._rhodecode_user
308 311 form_result = repo_group_form.to_python(dict(self.request.POST))
309 312 copy_permissions = form_result.get('group_copy_permissions')
310 313 repo_group = RepoGroupModel().create(
311 314 group_name=form_result['group_name_full'],
312 315 group_description=form_result['group_description'],
313 316 owner=owner.user_id,
314 317 copy_permissions=form_result['group_copy_permissions']
315 318 )
316 319 Session().flush()
317 320
318 321 repo_group_data = repo_group.get_api_data()
319 322 audit_logger.store_web(
320 323 'repo_group.create', action_data={'data': repo_group_data},
321 324 user=self._rhodecode_user)
322 325
323 326 Session().commit()
324 327
325 328 _new_group_name = form_result['group_name_full']
326 329
327 330 repo_group_url = h.link_to(
328 331 _new_group_name,
329 332 h.route_path('repo_group_home', repo_group_name=_new_group_name))
330 333 h.flash(h.literal(_('Created repository group %s')
331 334 % repo_group_url), category='success')
332 335
333 336 except formencode.Invalid as errors:
334 337 data = render(
335 338 'rhodecode:templates/admin/repo_groups/repo_group_add.mako',
336 339 self._get_template_context(c), self.request)
337 340 html = formencode.htmlfill.render(
338 341 data,
339 342 defaults=errors.value,
340 343 errors=errors.error_dict or {},
341 344 prefix_error=False,
342 345 encoding="UTF-8",
343 346 force_defaults=False
344 347 )
345 348 return Response(html)
346 349 except Exception:
347 350 log.exception("Exception during creation of repository group")
348 351 h.flash(_('Error occurred during creation of repository group %s')
349 352 % repo_group_name, category='error')
350 353 raise HTTPFound(h.route_path('home'))
351 354
352 355 affected_user_ids = [self._rhodecode_user.user_id]
353 356 if copy_permissions:
354 357 user_group_perms = repo_group.permissions(expand_from_user_groups=True)
355 358 copy_perms = [perm['user_id'] for perm in user_group_perms]
356 359 # also include those newly created by copy
357 360 affected_user_ids.extend(copy_perms)
358 361 PermissionModel().trigger_permission_flush(affected_user_ids)
359 362
360 363 raise HTTPFound(
361 364 h.route_path('repo_group_home',
362 365 repo_group_name=form_result['group_name_full']))
@@ -1,5376 +1,5380 b''
1 1 # -*- coding: utf-8 -*-
2 2
3 3 # Copyright (C) 2010-2019 RhodeCode GmbH
4 4 #
5 5 # This program is free software: you can redistribute it and/or modify
6 6 # it under the terms of the GNU Affero General Public License, version 3
7 7 # (only), as published by the Free Software Foundation.
8 8 #
9 9 # This program is distributed in the hope that it will be useful,
10 10 # but WITHOUT ANY WARRANTY; without even the implied warranty of
11 11 # MERCHANTABILITY or FITNESS FOR A PARTICULAR PURPOSE. See the
12 12 # GNU General Public License for more details.
13 13 #
14 14 # You should have received a copy of the GNU Affero General Public License
15 15 # along with this program. If not, see <http://www.gnu.org/licenses/>.
16 16 #
17 17 # This program is dual-licensed. If you wish to learn more about the
18 18 # RhodeCode Enterprise Edition, including its added features, Support services,
19 19 # and proprietary license terms, please see https://rhodecode.com/licenses/
20 20
21 21 """
22 22 Database Models for RhodeCode Enterprise
23 23 """
24 24
25 25 import re
26 26 import os
27 27 import time
28 28 import string
29 29 import hashlib
30 30 import logging
31 31 import datetime
32 32 import uuid
33 33 import warnings
34 34 import ipaddress
35 35 import functools
36 36 import traceback
37 37 import collections
38 38
39 39 from sqlalchemy import (
40 40 or_, and_, not_, func, TypeDecorator, event,
41 41 Index, Sequence, UniqueConstraint, ForeignKey, CheckConstraint, Column,
42 42 Boolean, String, Unicode, UnicodeText, DateTime, Integer, LargeBinary,
43 43 Text, Float, PickleType)
44 44 from sqlalchemy.sql.expression import true, false, case
45 45 from sqlalchemy.sql.functions import coalesce, count # pragma: no cover
46 46 from sqlalchemy.orm import (
47 47 relationship, joinedload, class_mapper, validates, aliased)
48 48 from sqlalchemy.ext.declarative import declared_attr
49 49 from sqlalchemy.ext.hybrid import hybrid_property
50 50 from sqlalchemy.exc import IntegrityError # pragma: no cover
51 51 from sqlalchemy.dialects.mysql import LONGTEXT
52 52 from zope.cachedescriptors.property import Lazy as LazyProperty
53 53 from pyramid import compat
54 54 from pyramid.threadlocal import get_current_request
55 55 from webhelpers.text import collapse, remove_formatting
56 56
57 57 from rhodecode.translation import _
58 58 from rhodecode.lib.vcs import get_vcs_instance
59 59 from rhodecode.lib.vcs.backends.base import EmptyCommit, Reference
60 60 from rhodecode.lib.utils2 import (
61 61 str2bool, safe_str, get_commit_safe, safe_unicode, sha1_safe,
62 62 time_to_datetime, aslist, Optional, safe_int, get_clone_url, AttributeDict,
63 63 glob2re, StrictAttributeDict, cleaned_uri, datetime_to_time, OrderedDefaultDict)
64 64 from rhodecode.lib.jsonalchemy import MutationObj, MutationList, JsonType, \
65 65 JsonRaw
66 66 from rhodecode.lib.ext_json import json
67 67 from rhodecode.lib.caching_query import FromCache
68 68 from rhodecode.lib.encrypt import AESCipher, validate_and_get_enc_data
69 69 from rhodecode.lib.encrypt2 import Encryptor
70 70 from rhodecode.lib.exceptions import (
71 71 ArtifactMetadataDuplicate, ArtifactMetadataBadValueType)
72 72 from rhodecode.model.meta import Base, Session
73 73
74 74 URL_SEP = '/'
75 75 log = logging.getLogger(__name__)
76 76
77 77 # =============================================================================
78 78 # BASE CLASSES
79 79 # =============================================================================
80 80
81 81 # this is propagated from .ini file rhodecode.encrypted_values.secret or
82 82 # beaker.session.secret if first is not set.
83 83 # and initialized at environment.py
84 84 ENCRYPTION_KEY = None
85 85
86 86 # used to sort permissions by types, '#' used here is not allowed to be in
87 87 # usernames, and it's very early in sorted string.printable table.
88 88 PERMISSION_TYPE_SORT = {
89 89 'admin': '####',
90 90 'write': '###',
91 91 'read': '##',
92 92 'none': '#',
93 93 }
94 94
95 95
96 96 def display_user_sort(obj):
97 97 """
98 98 Sort function used to sort permissions in .permissions() function of
99 99 Repository, RepoGroup, UserGroup. Also it put the default user in front
100 100 of all other resources
101 101 """
102 102
103 103 if obj.username == User.DEFAULT_USER:
104 104 return '#####'
105 105 prefix = PERMISSION_TYPE_SORT.get(obj.permission.split('.')[-1], '')
106 106 return prefix + obj.username
107 107
108 108
109 109 def display_user_group_sort(obj):
110 110 """
111 111 Sort function used to sort permissions in .permissions() function of
112 112 Repository, RepoGroup, UserGroup. Also it put the default user in front
113 113 of all other resources
114 114 """
115 115
116 116 prefix = PERMISSION_TYPE_SORT.get(obj.permission.split('.')[-1], '')
117 117 return prefix + obj.users_group_name
118 118
119 119
120 120 def _hash_key(k):
121 121 return sha1_safe(k)
122 122
123 123
124 124 def in_filter_generator(qry, items, limit=500):
125 125 """
126 126 Splits IN() into multiple with OR
127 127 e.g.::
128 128 cnt = Repository.query().filter(
129 129 or_(
130 130 *in_filter_generator(Repository.repo_id, range(100000))
131 131 )).count()
132 132 """
133 133 if not items:
134 134 # empty list will cause empty query which might cause security issues
135 135 # this can lead to hidden unpleasant results
136 136 items = [-1]
137 137
138 138 parts = []
139 139 for chunk in xrange(0, len(items), limit):
140 140 parts.append(
141 141 qry.in_(items[chunk: chunk + limit])
142 142 )
143 143
144 144 return parts
145 145
146 146
147 147 base_table_args = {
148 148 'extend_existing': True,
149 149 'mysql_engine': 'InnoDB',
150 150 'mysql_charset': 'utf8',
151 151 'sqlite_autoincrement': True
152 152 }
153 153
154 154
155 155 class EncryptedTextValue(TypeDecorator):
156 156 """
157 157 Special column for encrypted long text data, use like::
158 158
159 159 value = Column("encrypted_value", EncryptedValue(), nullable=False)
160 160
161 161 This column is intelligent so if value is in unencrypted form it return
162 162 unencrypted form, but on save it always encrypts
163 163 """
164 164 impl = Text
165 165
166 166 def process_bind_param(self, value, dialect):
167 167 """
168 168 Setter for storing value
169 169 """
170 170 import rhodecode
171 171 if not value:
172 172 return value
173 173
174 174 # protect against double encrypting if values is already encrypted
175 175 if value.startswith('enc$aes$') \
176 176 or value.startswith('enc$aes_hmac$') \
177 177 or value.startswith('enc2$'):
178 178 raise ValueError('value needs to be in unencrypted format, '
179 179 'ie. not starting with enc$ or enc2$')
180 180
181 181 algo = rhodecode.CONFIG.get('rhodecode.encrypted_values.algorithm') or 'aes'
182 182 if algo == 'aes':
183 183 return 'enc$aes_hmac$%s' % AESCipher(ENCRYPTION_KEY, hmac=True).encrypt(value)
184 184 elif algo == 'fernet':
185 185 return Encryptor(ENCRYPTION_KEY).encrypt(value)
186 186 else:
187 187 ValueError('Bad encryption algorithm, should be fernet or aes, got: {}'.format(algo))
188 188
189 189 def process_result_value(self, value, dialect):
190 190 """
191 191 Getter for retrieving value
192 192 """
193 193
194 194 import rhodecode
195 195 if not value:
196 196 return value
197 197
198 198 algo = rhodecode.CONFIG.get('rhodecode.encrypted_values.algorithm') or 'aes'
199 199 enc_strict_mode = str2bool(rhodecode.CONFIG.get('rhodecode.encrypted_values.strict') or True)
200 200 if algo == 'aes':
201 201 decrypted_data = validate_and_get_enc_data(value, ENCRYPTION_KEY, enc_strict_mode)
202 202 elif algo == 'fernet':
203 203 return Encryptor(ENCRYPTION_KEY).decrypt(value)
204 204 else:
205 205 ValueError('Bad encryption algorithm, should be fernet or aes, got: {}'.format(algo))
206 206 return decrypted_data
207 207
208 208
209 209 class BaseModel(object):
210 210 """
211 211 Base Model for all classes
212 212 """
213 213
214 214 @classmethod
215 215 def _get_keys(cls):
216 216 """return column names for this model """
217 217 return class_mapper(cls).c.keys()
218 218
219 219 def get_dict(self):
220 220 """
221 221 return dict with keys and values corresponding
222 222 to this model data """
223 223
224 224 d = {}
225 225 for k in self._get_keys():
226 226 d[k] = getattr(self, k)
227 227
228 228 # also use __json__() if present to get additional fields
229 229 _json_attr = getattr(self, '__json__', None)
230 230 if _json_attr:
231 231 # update with attributes from __json__
232 232 if callable(_json_attr):
233 233 _json_attr = _json_attr()
234 234 for k, val in _json_attr.iteritems():
235 235 d[k] = val
236 236 return d
237 237
238 238 def get_appstruct(self):
239 239 """return list with keys and values tuples corresponding
240 240 to this model data """
241 241
242 242 lst = []
243 243 for k in self._get_keys():
244 244 lst.append((k, getattr(self, k),))
245 245 return lst
246 246
247 247 def populate_obj(self, populate_dict):
248 248 """populate model with data from given populate_dict"""
249 249
250 250 for k in self._get_keys():
251 251 if k in populate_dict:
252 252 setattr(self, k, populate_dict[k])
253 253
254 254 @classmethod
255 255 def query(cls):
256 256 return Session().query(cls)
257 257
258 258 @classmethod
259 259 def get(cls, id_):
260 260 if id_:
261 261 return cls.query().get(id_)
262 262
263 263 @classmethod
264 264 def get_or_404(cls, id_):
265 265 from pyramid.httpexceptions import HTTPNotFound
266 266
267 267 try:
268 268 id_ = int(id_)
269 269 except (TypeError, ValueError):
270 270 raise HTTPNotFound()
271 271
272 272 res = cls.query().get(id_)
273 273 if not res:
274 274 raise HTTPNotFound()
275 275 return res
276 276
277 277 @classmethod
278 278 def getAll(cls):
279 279 # deprecated and left for backward compatibility
280 280 return cls.get_all()
281 281
282 282 @classmethod
283 283 def get_all(cls):
284 284 return cls.query().all()
285 285
286 286 @classmethod
287 287 def delete(cls, id_):
288 288 obj = cls.query().get(id_)
289 289 Session().delete(obj)
290 290
291 291 @classmethod
292 292 def identity_cache(cls, session, attr_name, value):
293 293 exist_in_session = []
294 294 for (item_cls, pkey), instance in session.identity_map.items():
295 295 if cls == item_cls and getattr(instance, attr_name) == value:
296 296 exist_in_session.append(instance)
297 297 if exist_in_session:
298 298 if len(exist_in_session) == 1:
299 299 return exist_in_session[0]
300 300 log.exception(
301 301 'multiple objects with attr %s and '
302 302 'value %s found with same name: %r',
303 303 attr_name, value, exist_in_session)
304 304
305 305 def __repr__(self):
306 306 if hasattr(self, '__unicode__'):
307 307 # python repr needs to return str
308 308 try:
309 309 return safe_str(self.__unicode__())
310 310 except UnicodeDecodeError:
311 311 pass
312 312 return '<DB:%s>' % (self.__class__.__name__)
313 313
314 314
315 315 class RhodeCodeSetting(Base, BaseModel):
316 316 __tablename__ = 'rhodecode_settings'
317 317 __table_args__ = (
318 318 UniqueConstraint('app_settings_name'),
319 319 base_table_args
320 320 )
321 321
322 322 SETTINGS_TYPES = {
323 323 'str': safe_str,
324 324 'int': safe_int,
325 325 'unicode': safe_unicode,
326 326 'bool': str2bool,
327 327 'list': functools.partial(aslist, sep=',')
328 328 }
329 329 DEFAULT_UPDATE_URL = 'https://rhodecode.com/api/v1/info/versions'
330 330 GLOBAL_CONF_KEY = 'app_settings'
331 331
332 332 app_settings_id = Column("app_settings_id", Integer(), nullable=False, unique=True, default=None, primary_key=True)
333 333 app_settings_name = Column("app_settings_name", String(255), nullable=True, unique=None, default=None)
334 334 _app_settings_value = Column("app_settings_value", String(4096), nullable=True, unique=None, default=None)
335 335 _app_settings_type = Column("app_settings_type", String(255), nullable=True, unique=None, default=None)
336 336
337 337 def __init__(self, key='', val='', type='unicode'):
338 338 self.app_settings_name = key
339 339 self.app_settings_type = type
340 340 self.app_settings_value = val
341 341
342 342 @validates('_app_settings_value')
343 343 def validate_settings_value(self, key, val):
344 344 assert type(val) == unicode
345 345 return val
346 346
347 347 @hybrid_property
348 348 def app_settings_value(self):
349 349 v = self._app_settings_value
350 350 _type = self.app_settings_type
351 351 if _type:
352 352 _type = self.app_settings_type.split('.')[0]
353 353 # decode the encrypted value
354 354 if 'encrypted' in self.app_settings_type:
355 355 cipher = EncryptedTextValue()
356 356 v = safe_unicode(cipher.process_result_value(v, None))
357 357
358 358 converter = self.SETTINGS_TYPES.get(_type) or \
359 359 self.SETTINGS_TYPES['unicode']
360 360 return converter(v)
361 361
362 362 @app_settings_value.setter
363 363 def app_settings_value(self, val):
364 364 """
365 365 Setter that will always make sure we use unicode in app_settings_value
366 366
367 367 :param val:
368 368 """
369 369 val = safe_unicode(val)
370 370 # encode the encrypted value
371 371 if 'encrypted' in self.app_settings_type:
372 372 cipher = EncryptedTextValue()
373 373 val = safe_unicode(cipher.process_bind_param(val, None))
374 374 self._app_settings_value = val
375 375
376 376 @hybrid_property
377 377 def app_settings_type(self):
378 378 return self._app_settings_type
379 379
380 380 @app_settings_type.setter
381 381 def app_settings_type(self, val):
382 382 if val.split('.')[0] not in self.SETTINGS_TYPES:
383 383 raise Exception('type must be one of %s got %s'
384 384 % (self.SETTINGS_TYPES.keys(), val))
385 385 self._app_settings_type = val
386 386
387 387 @classmethod
388 388 def get_by_prefix(cls, prefix):
389 389 return RhodeCodeSetting.query()\
390 390 .filter(RhodeCodeSetting.app_settings_name.startswith(prefix))\
391 391 .all()
392 392
393 393 def __unicode__(self):
394 394 return u"<%s('%s:%s[%s]')>" % (
395 395 self.__class__.__name__,
396 396 self.app_settings_name, self.app_settings_value,
397 397 self.app_settings_type
398 398 )
399 399
400 400
401 401 class RhodeCodeUi(Base, BaseModel):
402 402 __tablename__ = 'rhodecode_ui'
403 403 __table_args__ = (
404 404 UniqueConstraint('ui_key'),
405 405 base_table_args
406 406 )
407 407
408 408 HOOK_REPO_SIZE = 'changegroup.repo_size'
409 409 # HG
410 410 HOOK_PRE_PULL = 'preoutgoing.pre_pull'
411 411 HOOK_PULL = 'outgoing.pull_logger'
412 412 HOOK_PRE_PUSH = 'prechangegroup.pre_push'
413 413 HOOK_PRETX_PUSH = 'pretxnchangegroup.pre_push'
414 414 HOOK_PUSH = 'changegroup.push_logger'
415 415 HOOK_PUSH_KEY = 'pushkey.key_push'
416 416
417 417 HOOKS_BUILTIN = [
418 418 HOOK_PRE_PULL,
419 419 HOOK_PULL,
420 420 HOOK_PRE_PUSH,
421 421 HOOK_PRETX_PUSH,
422 422 HOOK_PUSH,
423 423 HOOK_PUSH_KEY,
424 424 ]
425 425
426 426 # TODO: johbo: Unify way how hooks are configured for git and hg,
427 427 # git part is currently hardcoded.
428 428
429 429 # SVN PATTERNS
430 430 SVN_BRANCH_ID = 'vcs_svn_branch'
431 431 SVN_TAG_ID = 'vcs_svn_tag'
432 432
433 433 ui_id = Column(
434 434 "ui_id", Integer(), nullable=False, unique=True, default=None,
435 435 primary_key=True)
436 436 ui_section = Column(
437 437 "ui_section", String(255), nullable=True, unique=None, default=None)
438 438 ui_key = Column(
439 439 "ui_key", String(255), nullable=True, unique=None, default=None)
440 440 ui_value = Column(
441 441 "ui_value", String(255), nullable=True, unique=None, default=None)
442 442 ui_active = Column(
443 443 "ui_active", Boolean(), nullable=True, unique=None, default=True)
444 444
445 445 def __repr__(self):
446 446 return '<%s[%s]%s=>%s]>' % (self.__class__.__name__, self.ui_section,
447 447 self.ui_key, self.ui_value)
448 448
449 449
450 450 class RepoRhodeCodeSetting(Base, BaseModel):
451 451 __tablename__ = 'repo_rhodecode_settings'
452 452 __table_args__ = (
453 453 UniqueConstraint(
454 454 'app_settings_name', 'repository_id',
455 455 name='uq_repo_rhodecode_setting_name_repo_id'),
456 456 base_table_args
457 457 )
458 458
459 459 repository_id = Column(
460 460 "repository_id", Integer(), ForeignKey('repositories.repo_id'),
461 461 nullable=False)
462 462 app_settings_id = Column(
463 463 "app_settings_id", Integer(), nullable=False, unique=True,
464 464 default=None, primary_key=True)
465 465 app_settings_name = Column(
466 466 "app_settings_name", String(255), nullable=True, unique=None,
467 467 default=None)
468 468 _app_settings_value = Column(
469 469 "app_settings_value", String(4096), nullable=True, unique=None,
470 470 default=None)
471 471 _app_settings_type = Column(
472 472 "app_settings_type", String(255), nullable=True, unique=None,
473 473 default=None)
474 474
475 475 repository = relationship('Repository')
476 476
477 477 def __init__(self, repository_id, key='', val='', type='unicode'):
478 478 self.repository_id = repository_id
479 479 self.app_settings_name = key
480 480 self.app_settings_type = type
481 481 self.app_settings_value = val
482 482
483 483 @validates('_app_settings_value')
484 484 def validate_settings_value(self, key, val):
485 485 assert type(val) == unicode
486 486 return val
487 487
488 488 @hybrid_property
489 489 def app_settings_value(self):
490 490 v = self._app_settings_value
491 491 type_ = self.app_settings_type
492 492 SETTINGS_TYPES = RhodeCodeSetting.SETTINGS_TYPES
493 493 converter = SETTINGS_TYPES.get(type_) or SETTINGS_TYPES['unicode']
494 494 return converter(v)
495 495
496 496 @app_settings_value.setter
497 497 def app_settings_value(self, val):
498 498 """
499 499 Setter that will always make sure we use unicode in app_settings_value
500 500
501 501 :param val:
502 502 """
503 503 self._app_settings_value = safe_unicode(val)
504 504
505 505 @hybrid_property
506 506 def app_settings_type(self):
507 507 return self._app_settings_type
508 508
509 509 @app_settings_type.setter
510 510 def app_settings_type(self, val):
511 511 SETTINGS_TYPES = RhodeCodeSetting.SETTINGS_TYPES
512 512 if val not in SETTINGS_TYPES:
513 513 raise Exception('type must be one of %s got %s'
514 514 % (SETTINGS_TYPES.keys(), val))
515 515 self._app_settings_type = val
516 516
517 517 def __unicode__(self):
518 518 return u"<%s('%s:%s:%s[%s]')>" % (
519 519 self.__class__.__name__, self.repository.repo_name,
520 520 self.app_settings_name, self.app_settings_value,
521 521 self.app_settings_type
522 522 )
523 523
524 524
525 525 class RepoRhodeCodeUi(Base, BaseModel):
526 526 __tablename__ = 'repo_rhodecode_ui'
527 527 __table_args__ = (
528 528 UniqueConstraint(
529 529 'repository_id', 'ui_section', 'ui_key',
530 530 name='uq_repo_rhodecode_ui_repository_id_section_key'),
531 531 base_table_args
532 532 )
533 533
534 534 repository_id = Column(
535 535 "repository_id", Integer(), ForeignKey('repositories.repo_id'),
536 536 nullable=False)
537 537 ui_id = Column(
538 538 "ui_id", Integer(), nullable=False, unique=True, default=None,
539 539 primary_key=True)
540 540 ui_section = Column(
541 541 "ui_section", String(255), nullable=True, unique=None, default=None)
542 542 ui_key = Column(
543 543 "ui_key", String(255), nullable=True, unique=None, default=None)
544 544 ui_value = Column(
545 545 "ui_value", String(255), nullable=True, unique=None, default=None)
546 546 ui_active = Column(
547 547 "ui_active", Boolean(), nullable=True, unique=None, default=True)
548 548
549 549 repository = relationship('Repository')
550 550
551 551 def __repr__(self):
552 552 return '<%s[%s:%s]%s=>%s]>' % (
553 553 self.__class__.__name__, self.repository.repo_name,
554 554 self.ui_section, self.ui_key, self.ui_value)
555 555
556 556
557 557 class User(Base, BaseModel):
558 558 __tablename__ = 'users'
559 559 __table_args__ = (
560 560 UniqueConstraint('username'), UniqueConstraint('email'),
561 561 Index('u_username_idx', 'username'),
562 562 Index('u_email_idx', 'email'),
563 563 base_table_args
564 564 )
565 565
566 566 DEFAULT_USER = 'default'
567 567 DEFAULT_USER_EMAIL = 'anonymous@rhodecode.org'
568 568 DEFAULT_GRAVATAR_URL = 'https://secure.gravatar.com/avatar/{md5email}?d=identicon&s={size}'
569 569
570 570 user_id = Column("user_id", Integer(), nullable=False, unique=True, default=None, primary_key=True)
571 571 username = Column("username", String(255), nullable=True, unique=None, default=None)
572 572 password = Column("password", String(255), nullable=True, unique=None, default=None)
573 573 active = Column("active", Boolean(), nullable=True, unique=None, default=True)
574 574 admin = Column("admin", Boolean(), nullable=True, unique=None, default=False)
575 575 name = Column("firstname", String(255), nullable=True, unique=None, default=None)
576 576 lastname = Column("lastname", String(255), nullable=True, unique=None, default=None)
577 577 _email = Column("email", String(255), nullable=True, unique=None, default=None)
578 578 last_login = Column("last_login", DateTime(timezone=False), nullable=True, unique=None, default=None)
579 579 last_activity = Column('last_activity', DateTime(timezone=False), nullable=True, unique=None, default=None)
580 580
581 581 extern_type = Column("extern_type", String(255), nullable=True, unique=None, default=None)
582 582 extern_name = Column("extern_name", String(255), nullable=True, unique=None, default=None)
583 583 _api_key = Column("api_key", String(255), nullable=True, unique=None, default=None)
584 584 inherit_default_permissions = Column("inherit_default_permissions", Boolean(), nullable=False, unique=None, default=True)
585 585 created_on = Column('created_on', DateTime(timezone=False), nullable=False, default=datetime.datetime.now)
586 586 _user_data = Column("user_data", LargeBinary(), nullable=True) # JSON data
587 587
588 588 user_log = relationship('UserLog')
589 589 user_perms = relationship('UserToPerm', primaryjoin="User.user_id==UserToPerm.user_id", cascade='all, delete-orphan')
590 590
591 591 repositories = relationship('Repository')
592 592 repository_groups = relationship('RepoGroup')
593 593 user_groups = relationship('UserGroup')
594 594
595 595 user_followers = relationship('UserFollowing', primaryjoin='UserFollowing.follows_user_id==User.user_id', cascade='all')
596 596 followings = relationship('UserFollowing', primaryjoin='UserFollowing.user_id==User.user_id', cascade='all')
597 597
598 598 repo_to_perm = relationship('UserRepoToPerm', primaryjoin='UserRepoToPerm.user_id==User.user_id', cascade='all, delete-orphan')
599 599 repo_group_to_perm = relationship('UserRepoGroupToPerm', primaryjoin='UserRepoGroupToPerm.user_id==User.user_id', cascade='all, delete-orphan')
600 600 user_group_to_perm = relationship('UserUserGroupToPerm', primaryjoin='UserUserGroupToPerm.user_id==User.user_id', cascade='all, delete-orphan')
601 601
602 602 group_member = relationship('UserGroupMember', cascade='all')
603 603
604 604 notifications = relationship('UserNotification', cascade='all')
605 605 # notifications assigned to this user
606 606 user_created_notifications = relationship('Notification', cascade='all')
607 607 # comments created by this user
608 608 user_comments = relationship('ChangesetComment', cascade='all')
609 609 # user profile extra info
610 610 user_emails = relationship('UserEmailMap', cascade='all')
611 611 user_ip_map = relationship('UserIpMap', cascade='all')
612 612 user_auth_tokens = relationship('UserApiKeys', cascade='all')
613 613 user_ssh_keys = relationship('UserSshKeys', cascade='all')
614 614
615 615 # gists
616 616 user_gists = relationship('Gist', cascade='all')
617 617 # user pull requests
618 618 user_pull_requests = relationship('PullRequest', cascade='all')
619 619 # external identities
620 620 extenal_identities = relationship(
621 621 'ExternalIdentity',
622 622 primaryjoin="User.user_id==ExternalIdentity.local_user_id",
623 623 cascade='all')
624 624 # review rules
625 625 user_review_rules = relationship('RepoReviewRuleUser', cascade='all')
626 626
627 627 def __unicode__(self):
628 628 return u"<%s('id:%s:%s')>" % (self.__class__.__name__,
629 629 self.user_id, self.username)
630 630
631 631 @hybrid_property
632 632 def email(self):
633 633 return self._email
634 634
635 635 @email.setter
636 636 def email(self, val):
637 637 self._email = val.lower() if val else None
638 638
639 639 @hybrid_property
640 640 def first_name(self):
641 641 from rhodecode.lib import helpers as h
642 642 if self.name:
643 643 return h.escape(self.name)
644 644 return self.name
645 645
646 646 @hybrid_property
647 647 def last_name(self):
648 648 from rhodecode.lib import helpers as h
649 649 if self.lastname:
650 650 return h.escape(self.lastname)
651 651 return self.lastname
652 652
653 653 @hybrid_property
654 654 def api_key(self):
655 655 """
656 656 Fetch if exist an auth-token with role ALL connected to this user
657 657 """
658 658 user_auth_token = UserApiKeys.query()\
659 659 .filter(UserApiKeys.user_id == self.user_id)\
660 660 .filter(or_(UserApiKeys.expires == -1,
661 661 UserApiKeys.expires >= time.time()))\
662 662 .filter(UserApiKeys.role == UserApiKeys.ROLE_ALL).first()
663 663 if user_auth_token:
664 664 user_auth_token = user_auth_token.api_key
665 665
666 666 return user_auth_token
667 667
668 668 @api_key.setter
669 669 def api_key(self, val):
670 670 # don't allow to set API key this is deprecated for now
671 671 self._api_key = None
672 672
673 673 @property
674 674 def reviewer_pull_requests(self):
675 675 return PullRequestReviewers.query() \
676 676 .options(joinedload(PullRequestReviewers.pull_request)) \
677 677 .filter(PullRequestReviewers.user_id == self.user_id) \
678 678 .all()
679 679
680 680 @property
681 681 def firstname(self):
682 682 # alias for future
683 683 return self.name
684 684
685 685 @property
686 686 def emails(self):
687 687 other = UserEmailMap.query()\
688 688 .filter(UserEmailMap.user == self) \
689 689 .order_by(UserEmailMap.email_id.asc()) \
690 690 .all()
691 691 return [self.email] + [x.email for x in other]
692 692
693 693 @property
694 694 def auth_tokens(self):
695 695 auth_tokens = self.get_auth_tokens()
696 696 return [x.api_key for x in auth_tokens]
697 697
698 698 def get_auth_tokens(self):
699 699 return UserApiKeys.query()\
700 700 .filter(UserApiKeys.user == self)\
701 701 .order_by(UserApiKeys.user_api_key_id.asc())\
702 702 .all()
703 703
704 704 @LazyProperty
705 705 def feed_token(self):
706 706 return self.get_feed_token()
707 707
708 708 def get_feed_token(self, cache=True):
709 709 feed_tokens = UserApiKeys.query()\
710 710 .filter(UserApiKeys.user == self)\
711 711 .filter(UserApiKeys.role == UserApiKeys.ROLE_FEED)
712 712 if cache:
713 713 feed_tokens = feed_tokens.options(
714 714 FromCache("sql_cache_short", "get_user_feed_token_%s" % self.user_id))
715 715
716 716 feed_tokens = feed_tokens.all()
717 717 if feed_tokens:
718 718 return feed_tokens[0].api_key
719 719 return 'NO_FEED_TOKEN_AVAILABLE'
720 720
721 721 @classmethod
722 722 def get(cls, user_id, cache=False):
723 723 if not user_id:
724 724 return
725 725
726 726 user = cls.query()
727 727 if cache:
728 728 user = user.options(
729 729 FromCache("sql_cache_short", "get_users_%s" % user_id))
730 730 return user.get(user_id)
731 731
732 732 @classmethod
733 733 def extra_valid_auth_tokens(cls, user, role=None):
734 734 tokens = UserApiKeys.query().filter(UserApiKeys.user == user)\
735 735 .filter(or_(UserApiKeys.expires == -1,
736 736 UserApiKeys.expires >= time.time()))
737 737 if role:
738 738 tokens = tokens.filter(or_(UserApiKeys.role == role,
739 739 UserApiKeys.role == UserApiKeys.ROLE_ALL))
740 740 return tokens.all()
741 741
742 742 def authenticate_by_token(self, auth_token, roles=None, scope_repo_id=None):
743 743 from rhodecode.lib import auth
744 744
745 745 log.debug('Trying to authenticate user: %s via auth-token, '
746 746 'and roles: %s', self, roles)
747 747
748 748 if not auth_token:
749 749 return False
750 750
751 751 roles = (roles or []) + [UserApiKeys.ROLE_ALL]
752 752 tokens_q = UserApiKeys.query()\
753 753 .filter(UserApiKeys.user_id == self.user_id)\
754 754 .filter(or_(UserApiKeys.expires == -1,
755 755 UserApiKeys.expires >= time.time()))
756 756
757 757 tokens_q = tokens_q.filter(UserApiKeys.role.in_(roles))
758 758
759 759 crypto_backend = auth.crypto_backend()
760 760 enc_token_map = {}
761 761 plain_token_map = {}
762 762 for token in tokens_q:
763 763 if token.api_key.startswith(crypto_backend.ENC_PREF):
764 764 enc_token_map[token.api_key] = token
765 765 else:
766 766 plain_token_map[token.api_key] = token
767 767 log.debug(
768 768 'Found %s plain and %s encrypted user tokens to check for authentication',
769 769 len(plain_token_map), len(enc_token_map))
770 770
771 771 # plain token match comes first
772 772 match = plain_token_map.get(auth_token)
773 773
774 774 # check encrypted tokens now
775 775 if not match:
776 776 for token_hash, token in enc_token_map.items():
777 777 # NOTE(marcink): this is expensive to calculate, but most secure
778 778 if crypto_backend.hash_check(auth_token, token_hash):
779 779 match = token
780 780 break
781 781
782 782 if match:
783 783 log.debug('Found matching token %s', match)
784 784 if match.repo_id:
785 785 log.debug('Found scope, checking for scope match of token %s', match)
786 786 if match.repo_id == scope_repo_id:
787 787 return True
788 788 else:
789 789 log.debug(
790 790 'AUTH_TOKEN: scope mismatch, token has a set repo scope: %s, '
791 791 'and calling scope is:%s, skipping further checks',
792 792 match.repo, scope_repo_id)
793 793 return False
794 794 else:
795 795 return True
796 796
797 797 return False
798 798
799 799 @property
800 800 def ip_addresses(self):
801 801 ret = UserIpMap.query().filter(UserIpMap.user == self).all()
802 802 return [x.ip_addr for x in ret]
803 803
804 804 @property
805 805 def username_and_name(self):
806 806 return '%s (%s %s)' % (self.username, self.first_name, self.last_name)
807 807
808 808 @property
809 809 def username_or_name_or_email(self):
810 810 full_name = self.full_name if self.full_name is not ' ' else None
811 811 return self.username or full_name or self.email
812 812
813 813 @property
814 814 def full_name(self):
815 815 return '%s %s' % (self.first_name, self.last_name)
816 816
817 817 @property
818 818 def full_name_or_username(self):
819 819 return ('%s %s' % (self.first_name, self.last_name)
820 820 if (self.first_name and self.last_name) else self.username)
821 821
822 822 @property
823 823 def full_contact(self):
824 824 return '%s %s <%s>' % (self.first_name, self.last_name, self.email)
825 825
826 826 @property
827 827 def short_contact(self):
828 828 return '%s %s' % (self.first_name, self.last_name)
829 829
830 830 @property
831 831 def is_admin(self):
832 832 return self.admin
833 833
834 834 def AuthUser(self, **kwargs):
835 835 """
836 836 Returns instance of AuthUser for this user
837 837 """
838 838 from rhodecode.lib.auth import AuthUser
839 839 return AuthUser(user_id=self.user_id, username=self.username, **kwargs)
840 840
841 841 @hybrid_property
842 842 def user_data(self):
843 843 if not self._user_data:
844 844 return {}
845 845
846 846 try:
847 847 return json.loads(self._user_data)
848 848 except TypeError:
849 849 return {}
850 850
851 851 @user_data.setter
852 852 def user_data(self, val):
853 853 if not isinstance(val, dict):
854 854 raise Exception('user_data must be dict, got %s' % type(val))
855 855 try:
856 856 self._user_data = json.dumps(val)
857 857 except Exception:
858 858 log.error(traceback.format_exc())
859 859
860 860 @classmethod
861 861 def get_by_username(cls, username, case_insensitive=False,
862 862 cache=False, identity_cache=False):
863 863 session = Session()
864 864
865 865 if case_insensitive:
866 866 q = cls.query().filter(
867 867 func.lower(cls.username) == func.lower(username))
868 868 else:
869 869 q = cls.query().filter(cls.username == username)
870 870
871 871 if cache:
872 872 if identity_cache:
873 873 val = cls.identity_cache(session, 'username', username)
874 874 if val:
875 875 return val
876 876 else:
877 877 cache_key = "get_user_by_name_%s" % _hash_key(username)
878 878 q = q.options(
879 879 FromCache("sql_cache_short", cache_key))
880 880
881 881 return q.scalar()
882 882
883 883 @classmethod
884 884 def get_by_auth_token(cls, auth_token, cache=False):
885 885 q = UserApiKeys.query()\
886 886 .filter(UserApiKeys.api_key == auth_token)\
887 887 .filter(or_(UserApiKeys.expires == -1,
888 888 UserApiKeys.expires >= time.time()))
889 889 if cache:
890 890 q = q.options(
891 891 FromCache("sql_cache_short", "get_auth_token_%s" % auth_token))
892 892
893 893 match = q.first()
894 894 if match:
895 895 return match.user
896 896
897 897 @classmethod
898 898 def get_by_email(cls, email, case_insensitive=False, cache=False):
899 899
900 900 if case_insensitive:
901 901 q = cls.query().filter(func.lower(cls.email) == func.lower(email))
902 902
903 903 else:
904 904 q = cls.query().filter(cls.email == email)
905 905
906 906 email_key = _hash_key(email)
907 907 if cache:
908 908 q = q.options(
909 909 FromCache("sql_cache_short", "get_email_key_%s" % email_key))
910 910
911 911 ret = q.scalar()
912 912 if ret is None:
913 913 q = UserEmailMap.query()
914 914 # try fetching in alternate email map
915 915 if case_insensitive:
916 916 q = q.filter(func.lower(UserEmailMap.email) == func.lower(email))
917 917 else:
918 918 q = q.filter(UserEmailMap.email == email)
919 919 q = q.options(joinedload(UserEmailMap.user))
920 920 if cache:
921 921 q = q.options(
922 922 FromCache("sql_cache_short", "get_email_map_key_%s" % email_key))
923 923 ret = getattr(q.scalar(), 'user', None)
924 924
925 925 return ret
926 926
927 927 @classmethod
928 928 def get_from_cs_author(cls, author):
929 929 """
930 930 Tries to get User objects out of commit author string
931 931
932 932 :param author:
933 933 """
934 934 from rhodecode.lib.helpers import email, author_name
935 935 # Valid email in the attribute passed, see if they're in the system
936 936 _email = email(author)
937 937 if _email:
938 938 user = cls.get_by_email(_email, case_insensitive=True)
939 939 if user:
940 940 return user
941 941 # Maybe we can match by username?
942 942 _author = author_name(author)
943 943 user = cls.get_by_username(_author, case_insensitive=True)
944 944 if user:
945 945 return user
946 946
947 947 def update_userdata(self, **kwargs):
948 948 usr = self
949 949 old = usr.user_data
950 950 old.update(**kwargs)
951 951 usr.user_data = old
952 952 Session().add(usr)
953 953 log.debug('updated userdata with %s', kwargs)
954 954
955 955 def update_lastlogin(self):
956 956 """Update user lastlogin"""
957 957 self.last_login = datetime.datetime.now()
958 958 Session().add(self)
959 959 log.debug('updated user %s lastlogin', self.username)
960 960
961 961 def update_password(self, new_password):
962 962 from rhodecode.lib.auth import get_crypt_password
963 963
964 964 self.password = get_crypt_password(new_password)
965 965 Session().add(self)
966 966
967 967 @classmethod
968 968 def get_first_super_admin(cls):
969 969 user = User.query()\
970 970 .filter(User.admin == true()) \
971 971 .order_by(User.user_id.asc()) \
972 972 .first()
973 973
974 974 if user is None:
975 975 raise Exception('FATAL: Missing administrative account!')
976 976 return user
977 977
978 978 @classmethod
979 979 def get_all_super_admins(cls, only_active=False):
980 980 """
981 981 Returns all admin accounts sorted by username
982 982 """
983 983 qry = User.query().filter(User.admin == true()).order_by(User.username.asc())
984 984 if only_active:
985 985 qry = qry.filter(User.active == true())
986 986 return qry.all()
987 987
988 988 @classmethod
989 989 def get_default_user(cls, cache=False, refresh=False):
990 990 user = User.get_by_username(User.DEFAULT_USER, cache=cache)
991 991 if user is None:
992 992 raise Exception('FATAL: Missing default account!')
993 993 if refresh:
994 994 # The default user might be based on outdated state which
995 995 # has been loaded from the cache.
996 996 # A call to refresh() ensures that the
997 997 # latest state from the database is used.
998 998 Session().refresh(user)
999 999 return user
1000 1000
1001 1001 def _get_default_perms(self, user, suffix=''):
1002 1002 from rhodecode.model.permission import PermissionModel
1003 1003 return PermissionModel().get_default_perms(user.user_perms, suffix)
1004 1004
1005 1005 def get_default_perms(self, suffix=''):
1006 1006 return self._get_default_perms(self, suffix)
1007 1007
1008 1008 def get_api_data(self, include_secrets=False, details='full'):
1009 1009 """
1010 1010 Common function for generating user related data for API
1011 1011
1012 1012 :param include_secrets: By default secrets in the API data will be replaced
1013 1013 by a placeholder value to prevent exposing this data by accident. In case
1014 1014 this data shall be exposed, set this flag to ``True``.
1015 1015
1016 1016 :param details: details can be 'basic|full' basic gives only a subset of
1017 1017 the available user information that includes user_id, name and emails.
1018 1018 """
1019 1019 user = self
1020 1020 user_data = self.user_data
1021 1021 data = {
1022 1022 'user_id': user.user_id,
1023 1023 'username': user.username,
1024 1024 'firstname': user.name,
1025 1025 'lastname': user.lastname,
1026 1026 'email': user.email,
1027 1027 'emails': user.emails,
1028 1028 }
1029 1029 if details == 'basic':
1030 1030 return data
1031 1031
1032 1032 auth_token_length = 40
1033 1033 auth_token_replacement = '*' * auth_token_length
1034 1034
1035 1035 extras = {
1036 1036 'auth_tokens': [auth_token_replacement],
1037 1037 'active': user.active,
1038 1038 'admin': user.admin,
1039 1039 'extern_type': user.extern_type,
1040 1040 'extern_name': user.extern_name,
1041 1041 'last_login': user.last_login,
1042 1042 'last_activity': user.last_activity,
1043 1043 'ip_addresses': user.ip_addresses,
1044 1044 'language': user_data.get('language')
1045 1045 }
1046 1046 data.update(extras)
1047 1047
1048 1048 if include_secrets:
1049 1049 data['auth_tokens'] = user.auth_tokens
1050 1050 return data
1051 1051
1052 1052 def __json__(self):
1053 1053 data = {
1054 1054 'full_name': self.full_name,
1055 1055 'full_name_or_username': self.full_name_or_username,
1056 1056 'short_contact': self.short_contact,
1057 1057 'full_contact': self.full_contact,
1058 1058 }
1059 1059 data.update(self.get_api_data())
1060 1060 return data
1061 1061
1062 1062
1063 1063 class UserApiKeys(Base, BaseModel):
1064 1064 __tablename__ = 'user_api_keys'
1065 1065 __table_args__ = (
1066 1066 Index('uak_api_key_idx', 'api_key'),
1067 1067 Index('uak_api_key_expires_idx', 'api_key', 'expires'),
1068 1068 base_table_args
1069 1069 )
1070 1070 __mapper_args__ = {}
1071 1071
1072 1072 # ApiKey role
1073 1073 ROLE_ALL = 'token_role_all'
1074 1074 ROLE_HTTP = 'token_role_http'
1075 1075 ROLE_VCS = 'token_role_vcs'
1076 1076 ROLE_API = 'token_role_api'
1077 1077 ROLE_FEED = 'token_role_feed'
1078 1078 ROLE_PASSWORD_RESET = 'token_password_reset'
1079 1079
1080 1080 ROLES = [ROLE_ALL, ROLE_HTTP, ROLE_VCS, ROLE_API, ROLE_FEED]
1081 1081
1082 1082 user_api_key_id = Column("user_api_key_id", Integer(), nullable=False, unique=True, default=None, primary_key=True)
1083 1083 user_id = Column("user_id", Integer(), ForeignKey('users.user_id'), nullable=True, unique=None, default=None)
1084 1084 api_key = Column("api_key", String(255), nullable=False, unique=True)
1085 1085 description = Column('description', UnicodeText().with_variant(UnicodeText(1024), 'mysql'))
1086 1086 expires = Column('expires', Float(53), nullable=False)
1087 1087 role = Column('role', String(255), nullable=True)
1088 1088 created_on = Column('created_on', DateTime(timezone=False), nullable=False, default=datetime.datetime.now)
1089 1089
1090 1090 # scope columns
1091 1091 repo_id = Column(
1092 1092 'repo_id', Integer(), ForeignKey('repositories.repo_id'),
1093 1093 nullable=True, unique=None, default=None)
1094 1094 repo = relationship('Repository', lazy='joined')
1095 1095
1096 1096 repo_group_id = Column(
1097 1097 'repo_group_id', Integer(), ForeignKey('groups.group_id'),
1098 1098 nullable=True, unique=None, default=None)
1099 1099 repo_group = relationship('RepoGroup', lazy='joined')
1100 1100
1101 1101 user = relationship('User', lazy='joined')
1102 1102
1103 1103 def __unicode__(self):
1104 1104 return u"<%s('%s')>" % (self.__class__.__name__, self.role)
1105 1105
1106 1106 def __json__(self):
1107 1107 data = {
1108 1108 'auth_token': self.api_key,
1109 1109 'role': self.role,
1110 1110 'scope': self.scope_humanized,
1111 1111 'expired': self.expired
1112 1112 }
1113 1113 return data
1114 1114
1115 1115 def get_api_data(self, include_secrets=False):
1116 1116 data = self.__json__()
1117 1117 if include_secrets:
1118 1118 return data
1119 1119 else:
1120 1120 data['auth_token'] = self.token_obfuscated
1121 1121 return data
1122 1122
1123 1123 @hybrid_property
1124 1124 def description_safe(self):
1125 1125 from rhodecode.lib import helpers as h
1126 1126 return h.escape(self.description)
1127 1127
1128 1128 @property
1129 1129 def expired(self):
1130 1130 if self.expires == -1:
1131 1131 return False
1132 1132 return time.time() > self.expires
1133 1133
1134 1134 @classmethod
1135 1135 def _get_role_name(cls, role):
1136 1136 return {
1137 1137 cls.ROLE_ALL: _('all'),
1138 1138 cls.ROLE_HTTP: _('http/web interface'),
1139 1139 cls.ROLE_VCS: _('vcs (git/hg/svn protocol)'),
1140 1140 cls.ROLE_API: _('api calls'),
1141 1141 cls.ROLE_FEED: _('feed access'),
1142 1142 }.get(role, role)
1143 1143
1144 1144 @property
1145 1145 def role_humanized(self):
1146 1146 return self._get_role_name(self.role)
1147 1147
1148 1148 def _get_scope(self):
1149 1149 if self.repo:
1150 1150 return 'Repository: {}'.format(self.repo.repo_name)
1151 1151 if self.repo_group:
1152 1152 return 'RepositoryGroup: {} (recursive)'.format(self.repo_group.group_name)
1153 1153 return 'Global'
1154 1154
1155 1155 @property
1156 1156 def scope_humanized(self):
1157 1157 return self._get_scope()
1158 1158
1159 1159 @property
1160 1160 def token_obfuscated(self):
1161 1161 if self.api_key:
1162 1162 return self.api_key[:4] + "****"
1163 1163
1164 1164
1165 1165 class UserEmailMap(Base, BaseModel):
1166 1166 __tablename__ = 'user_email_map'
1167 1167 __table_args__ = (
1168 1168 Index('uem_email_idx', 'email'),
1169 1169 UniqueConstraint('email'),
1170 1170 base_table_args
1171 1171 )
1172 1172 __mapper_args__ = {}
1173 1173
1174 1174 email_id = Column("email_id", Integer(), nullable=False, unique=True, default=None, primary_key=True)
1175 1175 user_id = Column("user_id", Integer(), ForeignKey('users.user_id'), nullable=True, unique=None, default=None)
1176 1176 _email = Column("email", String(255), nullable=True, unique=False, default=None)
1177 1177 user = relationship('User', lazy='joined')
1178 1178
1179 1179 @validates('_email')
1180 1180 def validate_email(self, key, email):
1181 1181 # check if this email is not main one
1182 1182 main_email = Session().query(User).filter(User.email == email).scalar()
1183 1183 if main_email is not None:
1184 1184 raise AttributeError('email %s is present is user table' % email)
1185 1185 return email
1186 1186
1187 1187 @hybrid_property
1188 1188 def email(self):
1189 1189 return self._email
1190 1190
1191 1191 @email.setter
1192 1192 def email(self, val):
1193 1193 self._email = val.lower() if val else None
1194 1194
1195 1195
1196 1196 class UserIpMap(Base, BaseModel):
1197 1197 __tablename__ = 'user_ip_map'
1198 1198 __table_args__ = (
1199 1199 UniqueConstraint('user_id', 'ip_addr'),
1200 1200 base_table_args
1201 1201 )
1202 1202 __mapper_args__ = {}
1203 1203
1204 1204 ip_id = Column("ip_id", Integer(), nullable=False, unique=True, default=None, primary_key=True)
1205 1205 user_id = Column("user_id", Integer(), ForeignKey('users.user_id'), nullable=True, unique=None, default=None)
1206 1206 ip_addr = Column("ip_addr", String(255), nullable=True, unique=False, default=None)
1207 1207 active = Column("active", Boolean(), nullable=True, unique=None, default=True)
1208 1208 description = Column("description", String(10000), nullable=True, unique=None, default=None)
1209 1209 user = relationship('User', lazy='joined')
1210 1210
1211 1211 @hybrid_property
1212 1212 def description_safe(self):
1213 1213 from rhodecode.lib import helpers as h
1214 1214 return h.escape(self.description)
1215 1215
1216 1216 @classmethod
1217 1217 def _get_ip_range(cls, ip_addr):
1218 1218 net = ipaddress.ip_network(safe_unicode(ip_addr), strict=False)
1219 1219 return [str(net.network_address), str(net.broadcast_address)]
1220 1220
1221 1221 def __json__(self):
1222 1222 return {
1223 1223 'ip_addr': self.ip_addr,
1224 1224 'ip_range': self._get_ip_range(self.ip_addr),
1225 1225 }
1226 1226
1227 1227 def __unicode__(self):
1228 1228 return u"<%s('user_id:%s=>%s')>" % (self.__class__.__name__,
1229 1229 self.user_id, self.ip_addr)
1230 1230
1231 1231
1232 1232 class UserSshKeys(Base, BaseModel):
1233 1233 __tablename__ = 'user_ssh_keys'
1234 1234 __table_args__ = (
1235 1235 Index('usk_ssh_key_fingerprint_idx', 'ssh_key_fingerprint'),
1236 1236
1237 1237 UniqueConstraint('ssh_key_fingerprint'),
1238 1238
1239 1239 base_table_args
1240 1240 )
1241 1241 __mapper_args__ = {}
1242 1242
1243 1243 ssh_key_id = Column('ssh_key_id', Integer(), nullable=False, unique=True, default=None, primary_key=True)
1244 1244 ssh_key_data = Column('ssh_key_data', String(10240), nullable=False, unique=None, default=None)
1245 1245 ssh_key_fingerprint = Column('ssh_key_fingerprint', String(255), nullable=False, unique=None, default=None)
1246 1246
1247 1247 description = Column('description', UnicodeText().with_variant(UnicodeText(1024), 'mysql'))
1248 1248
1249 1249 created_on = Column('created_on', DateTime(timezone=False), nullable=False, default=datetime.datetime.now)
1250 1250 accessed_on = Column('accessed_on', DateTime(timezone=False), nullable=True, default=None)
1251 1251 user_id = Column('user_id', Integer(), ForeignKey('users.user_id'), nullable=True, unique=None, default=None)
1252 1252
1253 1253 user = relationship('User', lazy='joined')
1254 1254
1255 1255 def __json__(self):
1256 1256 data = {
1257 1257 'ssh_fingerprint': self.ssh_key_fingerprint,
1258 1258 'description': self.description,
1259 1259 'created_on': self.created_on
1260 1260 }
1261 1261 return data
1262 1262
1263 1263 def get_api_data(self):
1264 1264 data = self.__json__()
1265 1265 return data
1266 1266
1267 1267
1268 1268 class UserLog(Base, BaseModel):
1269 1269 __tablename__ = 'user_logs'
1270 1270 __table_args__ = (
1271 1271 base_table_args,
1272 1272 )
1273 1273
1274 1274 VERSION_1 = 'v1'
1275 1275 VERSION_2 = 'v2'
1276 1276 VERSIONS = [VERSION_1, VERSION_2]
1277 1277
1278 1278 user_log_id = Column("user_log_id", Integer(), nullable=False, unique=True, default=None, primary_key=True)
1279 1279 user_id = Column("user_id", Integer(), ForeignKey('users.user_id',ondelete='SET NULL'), nullable=True, unique=None, default=None)
1280 1280 username = Column("username", String(255), nullable=True, unique=None, default=None)
1281 1281 repository_id = Column("repository_id", Integer(), ForeignKey('repositories.repo_id', ondelete='SET NULL'), nullable=True, unique=None, default=None)
1282 1282 repository_name = Column("repository_name", String(255), nullable=True, unique=None, default=None)
1283 1283 user_ip = Column("user_ip", String(255), nullable=True, unique=None, default=None)
1284 1284 action = Column("action", Text().with_variant(Text(1200000), 'mysql'), nullable=True, unique=None, default=None)
1285 1285 action_date = Column("action_date", DateTime(timezone=False), nullable=True, unique=None, default=None)
1286 1286
1287 1287 version = Column("version", String(255), nullable=True, default=VERSION_1)
1288 1288 user_data = Column('user_data_json', MutationObj.as_mutable(JsonType(dialect_map=dict(mysql=LONGTEXT()))))
1289 1289 action_data = Column('action_data_json', MutationObj.as_mutable(JsonType(dialect_map=dict(mysql=LONGTEXT()))))
1290 1290
1291 1291 def __unicode__(self):
1292 1292 return u"<%s('id:%s:%s')>" % (
1293 1293 self.__class__.__name__, self.repository_name, self.action)
1294 1294
1295 1295 def __json__(self):
1296 1296 return {
1297 1297 'user_id': self.user_id,
1298 1298 'username': self.username,
1299 1299 'repository_id': self.repository_id,
1300 1300 'repository_name': self.repository_name,
1301 1301 'user_ip': self.user_ip,
1302 1302 'action_date': self.action_date,
1303 1303 'action': self.action,
1304 1304 }
1305 1305
1306 1306 @hybrid_property
1307 1307 def entry_id(self):
1308 1308 return self.user_log_id
1309 1309
1310 1310 @property
1311 1311 def action_as_day(self):
1312 1312 return datetime.date(*self.action_date.timetuple()[:3])
1313 1313
1314 1314 user = relationship('User')
1315 1315 repository = relationship('Repository', cascade='')
1316 1316
1317 1317
1318 1318 class UserGroup(Base, BaseModel):
1319 1319 __tablename__ = 'users_groups'
1320 1320 __table_args__ = (
1321 1321 base_table_args,
1322 1322 )
1323 1323
1324 1324 users_group_id = Column("users_group_id", Integer(), nullable=False, unique=True, default=None, primary_key=True)
1325 1325 users_group_name = Column("users_group_name", String(255), nullable=False, unique=True, default=None)
1326 1326 user_group_description = Column("user_group_description", String(10000), nullable=True, unique=None, default=None)
1327 1327 users_group_active = Column("users_group_active", Boolean(), nullable=True, unique=None, default=None)
1328 1328 inherit_default_permissions = Column("users_group_inherit_default_permissions", Boolean(), nullable=False, unique=None, default=True)
1329 1329 user_id = Column("user_id", Integer(), ForeignKey('users.user_id'), nullable=False, unique=False, default=None)
1330 1330 created_on = Column('created_on', DateTime(timezone=False), nullable=False, default=datetime.datetime.now)
1331 1331 _group_data = Column("group_data", LargeBinary(), nullable=True) # JSON data
1332 1332
1333 1333 members = relationship('UserGroupMember', cascade="all, delete-orphan", lazy="joined")
1334 1334 users_group_to_perm = relationship('UserGroupToPerm', cascade='all')
1335 1335 users_group_repo_to_perm = relationship('UserGroupRepoToPerm', cascade='all')
1336 1336 users_group_repo_group_to_perm = relationship('UserGroupRepoGroupToPerm', cascade='all')
1337 1337 user_user_group_to_perm = relationship('UserUserGroupToPerm', cascade='all')
1338 1338 user_group_user_group_to_perm = relationship('UserGroupUserGroupToPerm ', primaryjoin="UserGroupUserGroupToPerm.target_user_group_id==UserGroup.users_group_id", cascade='all')
1339 1339
1340 1340 user_group_review_rules = relationship('RepoReviewRuleUserGroup', cascade='all')
1341 1341 user = relationship('User', primaryjoin="User.user_id==UserGroup.user_id")
1342 1342
1343 1343 @classmethod
1344 1344 def _load_group_data(cls, column):
1345 1345 if not column:
1346 1346 return {}
1347 1347
1348 1348 try:
1349 1349 return json.loads(column) or {}
1350 1350 except TypeError:
1351 1351 return {}
1352 1352
1353 1353 @hybrid_property
1354 1354 def description_safe(self):
1355 1355 from rhodecode.lib import helpers as h
1356 1356 return h.escape(self.user_group_description)
1357 1357
1358 1358 @hybrid_property
1359 1359 def group_data(self):
1360 1360 return self._load_group_data(self._group_data)
1361 1361
1362 1362 @group_data.expression
1363 1363 def group_data(self, **kwargs):
1364 1364 return self._group_data
1365 1365
1366 1366 @group_data.setter
1367 1367 def group_data(self, val):
1368 1368 try:
1369 1369 self._group_data = json.dumps(val)
1370 1370 except Exception:
1371 1371 log.error(traceback.format_exc())
1372 1372
1373 1373 @classmethod
1374 1374 def _load_sync(cls, group_data):
1375 1375 if group_data:
1376 1376 return group_data.get('extern_type')
1377 1377
1378 1378 @property
1379 1379 def sync(self):
1380 1380 return self._load_sync(self.group_data)
1381 1381
1382 1382 def __unicode__(self):
1383 1383 return u"<%s('id:%s:%s')>" % (self.__class__.__name__,
1384 1384 self.users_group_id,
1385 1385 self.users_group_name)
1386 1386
1387 1387 @classmethod
1388 1388 def get_by_group_name(cls, group_name, cache=False,
1389 1389 case_insensitive=False):
1390 1390 if case_insensitive:
1391 1391 q = cls.query().filter(func.lower(cls.users_group_name) ==
1392 1392 func.lower(group_name))
1393 1393
1394 1394 else:
1395 1395 q = cls.query().filter(cls.users_group_name == group_name)
1396 1396 if cache:
1397 1397 q = q.options(
1398 1398 FromCache("sql_cache_short", "get_group_%s" % _hash_key(group_name)))
1399 1399 return q.scalar()
1400 1400
1401 1401 @classmethod
1402 1402 def get(cls, user_group_id, cache=False):
1403 1403 if not user_group_id:
1404 1404 return
1405 1405
1406 1406 user_group = cls.query()
1407 1407 if cache:
1408 1408 user_group = user_group.options(
1409 1409 FromCache("sql_cache_short", "get_users_group_%s" % user_group_id))
1410 1410 return user_group.get(user_group_id)
1411 1411
1412 1412 def permissions(self, with_admins=True, with_owner=True,
1413 1413 expand_from_user_groups=False):
1414 1414 """
1415 1415 Permissions for user groups
1416 1416 """
1417 1417 _admin_perm = 'usergroup.admin'
1418 1418
1419 1419 owner_row = []
1420 1420 if with_owner:
1421 1421 usr = AttributeDict(self.user.get_dict())
1422 1422 usr.owner_row = True
1423 1423 usr.permission = _admin_perm
1424 1424 owner_row.append(usr)
1425 1425
1426 1426 super_admin_ids = []
1427 1427 super_admin_rows = []
1428 1428 if with_admins:
1429 1429 for usr in User.get_all_super_admins():
1430 1430 super_admin_ids.append(usr.user_id)
1431 1431 # if this admin is also owner, don't double the record
1432 1432 if usr.user_id == owner_row[0].user_id:
1433 1433 owner_row[0].admin_row = True
1434 1434 else:
1435 1435 usr = AttributeDict(usr.get_dict())
1436 1436 usr.admin_row = True
1437 1437 usr.permission = _admin_perm
1438 1438 super_admin_rows.append(usr)
1439 1439
1440 1440 q = UserUserGroupToPerm.query().filter(UserUserGroupToPerm.user_group == self)
1441 1441 q = q.options(joinedload(UserUserGroupToPerm.user_group),
1442 1442 joinedload(UserUserGroupToPerm.user),
1443 1443 joinedload(UserUserGroupToPerm.permission),)
1444 1444
1445 1445 # get owners and admins and permissions. We do a trick of re-writing
1446 1446 # objects from sqlalchemy to named-tuples due to sqlalchemy session
1447 1447 # has a global reference and changing one object propagates to all
1448 1448 # others. This means if admin is also an owner admin_row that change
1449 1449 # would propagate to both objects
1450 1450 perm_rows = []
1451 1451 for _usr in q.all():
1452 1452 usr = AttributeDict(_usr.user.get_dict())
1453 1453 # if this user is also owner/admin, mark as duplicate record
1454 1454 if usr.user_id == owner_row[0].user_id or usr.user_id in super_admin_ids:
1455 1455 usr.duplicate_perm = True
1456 1456 usr.permission = _usr.permission.permission_name
1457 1457 perm_rows.append(usr)
1458 1458
1459 1459 # filter the perm rows by 'default' first and then sort them by
1460 1460 # admin,write,read,none permissions sorted again alphabetically in
1461 1461 # each group
1462 1462 perm_rows = sorted(perm_rows, key=display_user_sort)
1463 1463
1464 1464 user_groups_rows = []
1465 1465 if expand_from_user_groups:
1466 1466 for ug in self.permission_user_groups(with_members=True):
1467 1467 for user_data in ug.members:
1468 1468 user_groups_rows.append(user_data)
1469 1469
1470 1470 return super_admin_rows + owner_row + perm_rows + user_groups_rows
1471 1471
1472 1472 def permission_user_groups(self, with_members=False):
1473 1473 q = UserGroupUserGroupToPerm.query()\
1474 1474 .filter(UserGroupUserGroupToPerm.target_user_group == self)
1475 1475 q = q.options(joinedload(UserGroupUserGroupToPerm.user_group),
1476 1476 joinedload(UserGroupUserGroupToPerm.target_user_group),
1477 1477 joinedload(UserGroupUserGroupToPerm.permission),)
1478 1478
1479 1479 perm_rows = []
1480 1480 for _user_group in q.all():
1481 1481 entry = AttributeDict(_user_group.user_group.get_dict())
1482 1482 entry.permission = _user_group.permission.permission_name
1483 1483 if with_members:
1484 1484 entry.members = [x.user.get_dict()
1485 1485 for x in _user_group.user_group.members]
1486 1486 perm_rows.append(entry)
1487 1487
1488 1488 perm_rows = sorted(perm_rows, key=display_user_group_sort)
1489 1489 return perm_rows
1490 1490
1491 1491 def _get_default_perms(self, user_group, suffix=''):
1492 1492 from rhodecode.model.permission import PermissionModel
1493 1493 return PermissionModel().get_default_perms(user_group.users_group_to_perm, suffix)
1494 1494
1495 1495 def get_default_perms(self, suffix=''):
1496 1496 return self._get_default_perms(self, suffix)
1497 1497
1498 1498 def get_api_data(self, with_group_members=True, include_secrets=False):
1499 1499 """
1500 1500 :param include_secrets: See :meth:`User.get_api_data`, this parameter is
1501 1501 basically forwarded.
1502 1502
1503 1503 """
1504 1504 user_group = self
1505 1505 data = {
1506 1506 'users_group_id': user_group.users_group_id,
1507 1507 'group_name': user_group.users_group_name,
1508 1508 'group_description': user_group.user_group_description,
1509 1509 'active': user_group.users_group_active,
1510 1510 'owner': user_group.user.username,
1511 1511 'sync': user_group.sync,
1512 1512 'owner_email': user_group.user.email,
1513 1513 }
1514 1514
1515 1515 if with_group_members:
1516 1516 users = []
1517 1517 for user in user_group.members:
1518 1518 user = user.user
1519 1519 users.append(user.get_api_data(include_secrets=include_secrets))
1520 1520 data['users'] = users
1521 1521
1522 1522 return data
1523 1523
1524 1524
1525 1525 class UserGroupMember(Base, BaseModel):
1526 1526 __tablename__ = 'users_groups_members'
1527 1527 __table_args__ = (
1528 1528 base_table_args,
1529 1529 )
1530 1530
1531 1531 users_group_member_id = Column("users_group_member_id", Integer(), nullable=False, unique=True, default=None, primary_key=True)
1532 1532 users_group_id = Column("users_group_id", Integer(), ForeignKey('users_groups.users_group_id'), nullable=False, unique=None, default=None)
1533 1533 user_id = Column("user_id", Integer(), ForeignKey('users.user_id'), nullable=False, unique=None, default=None)
1534 1534
1535 1535 user = relationship('User', lazy='joined')
1536 1536 users_group = relationship('UserGroup')
1537 1537
1538 1538 def __init__(self, gr_id='', u_id=''):
1539 1539 self.users_group_id = gr_id
1540 1540 self.user_id = u_id
1541 1541
1542 1542
1543 1543 class RepositoryField(Base, BaseModel):
1544 1544 __tablename__ = 'repositories_fields'
1545 1545 __table_args__ = (
1546 1546 UniqueConstraint('repository_id', 'field_key'), # no-multi field
1547 1547 base_table_args,
1548 1548 )
1549 1549
1550 1550 PREFIX = 'ex_' # prefix used in form to not conflict with already existing fields
1551 1551
1552 1552 repo_field_id = Column("repo_field_id", Integer(), nullable=False, unique=True, default=None, primary_key=True)
1553 1553 repository_id = Column("repository_id", Integer(), ForeignKey('repositories.repo_id'), nullable=False, unique=None, default=None)
1554 1554 field_key = Column("field_key", String(250))
1555 1555 field_label = Column("field_label", String(1024), nullable=False)
1556 1556 field_value = Column("field_value", String(10000), nullable=False)
1557 1557 field_desc = Column("field_desc", String(1024), nullable=False)
1558 1558 field_type = Column("field_type", String(255), nullable=False, unique=None)
1559 1559 created_on = Column('created_on', DateTime(timezone=False), nullable=False, default=datetime.datetime.now)
1560 1560
1561 1561 repository = relationship('Repository')
1562 1562
1563 1563 @property
1564 1564 def field_key_prefixed(self):
1565 1565 return 'ex_%s' % self.field_key
1566 1566
1567 1567 @classmethod
1568 1568 def un_prefix_key(cls, key):
1569 1569 if key.startswith(cls.PREFIX):
1570 1570 return key[len(cls.PREFIX):]
1571 1571 return key
1572 1572
1573 1573 @classmethod
1574 1574 def get_by_key_name(cls, key, repo):
1575 1575 row = cls.query()\
1576 1576 .filter(cls.repository == repo)\
1577 1577 .filter(cls.field_key == key).scalar()
1578 1578 return row
1579 1579
1580 1580
1581 1581 class Repository(Base, BaseModel):
1582 1582 __tablename__ = 'repositories'
1583 1583 __table_args__ = (
1584 1584 Index('r_repo_name_idx', 'repo_name', mysql_length=255),
1585 1585 base_table_args,
1586 1586 )
1587 1587 DEFAULT_CLONE_URI = '{scheme}://{user}@{netloc}/{repo}'
1588 1588 DEFAULT_CLONE_URI_ID = '{scheme}://{user}@{netloc}/_{repoid}'
1589 1589 DEFAULT_CLONE_URI_SSH = 'ssh://{sys_user}@{hostname}/{repo}'
1590 1590
1591 1591 STATE_CREATED = 'repo_state_created'
1592 1592 STATE_PENDING = 'repo_state_pending'
1593 1593 STATE_ERROR = 'repo_state_error'
1594 1594
1595 1595 LOCK_AUTOMATIC = 'lock_auto'
1596 1596 LOCK_API = 'lock_api'
1597 1597 LOCK_WEB = 'lock_web'
1598 1598 LOCK_PULL = 'lock_pull'
1599 1599
1600 1600 NAME_SEP = URL_SEP
1601 1601
1602 1602 repo_id = Column(
1603 1603 "repo_id", Integer(), nullable=False, unique=True, default=None,
1604 1604 primary_key=True)
1605 1605 _repo_name = Column(
1606 1606 "repo_name", Text(), nullable=False, default=None)
1607 1607 _repo_name_hash = Column(
1608 1608 "repo_name_hash", String(255), nullable=False, unique=True)
1609 1609 repo_state = Column("repo_state", String(255), nullable=True)
1610 1610
1611 1611 clone_uri = Column(
1612 1612 "clone_uri", EncryptedTextValue(), nullable=True, unique=False,
1613 1613 default=None)
1614 1614 push_uri = Column(
1615 1615 "push_uri", EncryptedTextValue(), nullable=True, unique=False,
1616 1616 default=None)
1617 1617 repo_type = Column(
1618 1618 "repo_type", String(255), nullable=False, unique=False, default=None)
1619 1619 user_id = Column(
1620 1620 "user_id", Integer(), ForeignKey('users.user_id'), nullable=False,
1621 1621 unique=False, default=None)
1622 1622 private = Column(
1623 1623 "private", Boolean(), nullable=True, unique=None, default=None)
1624 1624 archived = Column(
1625 1625 "archived", Boolean(), nullable=True, unique=None, default=None)
1626 1626 enable_statistics = Column(
1627 1627 "statistics", Boolean(), nullable=True, unique=None, default=True)
1628 1628 enable_downloads = Column(
1629 1629 "downloads", Boolean(), nullable=True, unique=None, default=True)
1630 1630 description = Column(
1631 1631 "description", String(10000), nullable=True, unique=None, default=None)
1632 1632 created_on = Column(
1633 1633 'created_on', DateTime(timezone=False), nullable=True, unique=None,
1634 1634 default=datetime.datetime.now)
1635 1635 updated_on = Column(
1636 1636 'updated_on', DateTime(timezone=False), nullable=True, unique=None,
1637 1637 default=datetime.datetime.now)
1638 1638 _landing_revision = Column(
1639 1639 "landing_revision", String(255), nullable=False, unique=False,
1640 1640 default=None)
1641 1641 enable_locking = Column(
1642 1642 "enable_locking", Boolean(), nullable=False, unique=None,
1643 1643 default=False)
1644 1644 _locked = Column(
1645 1645 "locked", String(255), nullable=True, unique=False, default=None)
1646 1646 _changeset_cache = Column(
1647 1647 "changeset_cache", LargeBinary(), nullable=True) # JSON data
1648 1648
1649 1649 fork_id = Column(
1650 1650 "fork_id", Integer(), ForeignKey('repositories.repo_id'),
1651 1651 nullable=True, unique=False, default=None)
1652 1652 group_id = Column(
1653 1653 "group_id", Integer(), ForeignKey('groups.group_id'), nullable=True,
1654 1654 unique=False, default=None)
1655 1655
1656 1656 user = relationship('User', lazy='joined')
1657 1657 fork = relationship('Repository', remote_side=repo_id, lazy='joined')
1658 1658 group = relationship('RepoGroup', lazy='joined')
1659 1659 repo_to_perm = relationship(
1660 1660 'UserRepoToPerm', cascade='all',
1661 1661 order_by='UserRepoToPerm.repo_to_perm_id')
1662 1662 users_group_to_perm = relationship('UserGroupRepoToPerm', cascade='all')
1663 1663 stats = relationship('Statistics', cascade='all', uselist=False)
1664 1664
1665 1665 followers = relationship(
1666 1666 'UserFollowing',
1667 1667 primaryjoin='UserFollowing.follows_repo_id==Repository.repo_id',
1668 1668 cascade='all')
1669 1669 extra_fields = relationship(
1670 1670 'RepositoryField', cascade="all, delete-orphan")
1671 1671 logs = relationship('UserLog')
1672 1672 comments = relationship(
1673 1673 'ChangesetComment', cascade="all, delete-orphan")
1674 1674 pull_requests_source = relationship(
1675 1675 'PullRequest',
1676 1676 primaryjoin='PullRequest.source_repo_id==Repository.repo_id',
1677 1677 cascade="all, delete-orphan")
1678 1678 pull_requests_target = relationship(
1679 1679 'PullRequest',
1680 1680 primaryjoin='PullRequest.target_repo_id==Repository.repo_id',
1681 1681 cascade="all, delete-orphan")
1682 1682 ui = relationship('RepoRhodeCodeUi', cascade="all")
1683 1683 settings = relationship('RepoRhodeCodeSetting', cascade="all")
1684 1684 integrations = relationship('Integration', cascade="all, delete-orphan")
1685 1685
1686 1686 scoped_tokens = relationship('UserApiKeys', cascade="all")
1687 1687
1688 1688 artifacts = relationship('FileStore', cascade="all")
1689 1689
1690 1690 def __unicode__(self):
1691 1691 return u"<%s('%s:%s')>" % (self.__class__.__name__, self.repo_id,
1692 1692 safe_unicode(self.repo_name))
1693 1693
1694 1694 @hybrid_property
1695 1695 def description_safe(self):
1696 1696 from rhodecode.lib import helpers as h
1697 1697 return h.escape(self.description)
1698 1698
1699 1699 @hybrid_property
1700 1700 def landing_rev(self):
1701 1701 # always should return [rev_type, rev]
1702 1702 if self._landing_revision:
1703 1703 _rev_info = self._landing_revision.split(':')
1704 1704 if len(_rev_info) < 2:
1705 1705 _rev_info.insert(0, 'rev')
1706 1706 return [_rev_info[0], _rev_info[1]]
1707 1707 return [None, None]
1708 1708
1709 1709 @landing_rev.setter
1710 1710 def landing_rev(self, val):
1711 1711 if ':' not in val:
1712 1712 raise ValueError('value must be delimited with `:` and consist '
1713 1713 'of <rev_type>:<rev>, got %s instead' % val)
1714 1714 self._landing_revision = val
1715 1715
1716 1716 @hybrid_property
1717 1717 def locked(self):
1718 1718 if self._locked:
1719 1719 user_id, timelocked, reason = self._locked.split(':')
1720 1720 lock_values = int(user_id), timelocked, reason
1721 1721 else:
1722 1722 lock_values = [None, None, None]
1723 1723 return lock_values
1724 1724
1725 1725 @locked.setter
1726 1726 def locked(self, val):
1727 1727 if val and isinstance(val, (list, tuple)):
1728 1728 self._locked = ':'.join(map(str, val))
1729 1729 else:
1730 1730 self._locked = None
1731 1731
1732 1732 @hybrid_property
1733 1733 def changeset_cache(self):
1734 1734 from rhodecode.lib.vcs.backends.base import EmptyCommit
1735 1735 dummy = EmptyCommit().__json__()
1736 1736 if not self._changeset_cache:
1737 1737 dummy['source_repo_id'] = self.repo_id
1738 1738 return json.loads(json.dumps(dummy))
1739 1739
1740 1740 try:
1741 1741 return json.loads(self._changeset_cache)
1742 1742 except TypeError:
1743 1743 return dummy
1744 1744 except Exception:
1745 1745 log.error(traceback.format_exc())
1746 1746 return dummy
1747 1747
1748 1748 @changeset_cache.setter
1749 1749 def changeset_cache(self, val):
1750 1750 try:
1751 1751 self._changeset_cache = json.dumps(val)
1752 1752 except Exception:
1753 1753 log.error(traceback.format_exc())
1754 1754
1755 1755 @hybrid_property
1756 1756 def repo_name(self):
1757 1757 return self._repo_name
1758 1758
1759 1759 @repo_name.setter
1760 1760 def repo_name(self, value):
1761 1761 self._repo_name = value
1762 1762 self._repo_name_hash = hashlib.sha1(safe_str(value)).hexdigest()
1763 1763
1764 1764 @classmethod
1765 1765 def normalize_repo_name(cls, repo_name):
1766 1766 """
1767 1767 Normalizes os specific repo_name to the format internally stored inside
1768 1768 database using URL_SEP
1769 1769
1770 1770 :param cls:
1771 1771 :param repo_name:
1772 1772 """
1773 1773 return cls.NAME_SEP.join(repo_name.split(os.sep))
1774 1774
1775 1775 @classmethod
1776 1776 def get_by_repo_name(cls, repo_name, cache=False, identity_cache=False):
1777 1777 session = Session()
1778 1778 q = session.query(cls).filter(cls.repo_name == repo_name)
1779 1779
1780 1780 if cache:
1781 1781 if identity_cache:
1782 1782 val = cls.identity_cache(session, 'repo_name', repo_name)
1783 1783 if val:
1784 1784 return val
1785 1785 else:
1786 1786 cache_key = "get_repo_by_name_%s" % _hash_key(repo_name)
1787 1787 q = q.options(
1788 1788 FromCache("sql_cache_short", cache_key))
1789 1789
1790 1790 return q.scalar()
1791 1791
1792 1792 @classmethod
1793 1793 def get_by_id_or_repo_name(cls, repoid):
1794 1794 if isinstance(repoid, (int, long)):
1795 1795 try:
1796 1796 repo = cls.get(repoid)
1797 1797 except ValueError:
1798 1798 repo = None
1799 1799 else:
1800 1800 repo = cls.get_by_repo_name(repoid)
1801 1801 return repo
1802 1802
1803 1803 @classmethod
1804 1804 def get_by_full_path(cls, repo_full_path):
1805 1805 repo_name = repo_full_path.split(cls.base_path(), 1)[-1]
1806 1806 repo_name = cls.normalize_repo_name(repo_name)
1807 1807 return cls.get_by_repo_name(repo_name.strip(URL_SEP))
1808 1808
1809 1809 @classmethod
1810 1810 def get_repo_forks(cls, repo_id):
1811 1811 return cls.query().filter(Repository.fork_id == repo_id)
1812 1812
1813 1813 @classmethod
1814 1814 def base_path(cls):
1815 1815 """
1816 1816 Returns base path when all repos are stored
1817 1817
1818 1818 :param cls:
1819 1819 """
1820 1820 q = Session().query(RhodeCodeUi)\
1821 1821 .filter(RhodeCodeUi.ui_key == cls.NAME_SEP)
1822 1822 q = q.options(FromCache("sql_cache_short", "repository_repo_path"))
1823 1823 return q.one().ui_value
1824 1824
1825 1825 @classmethod
1826 1826 def get_all_repos(cls, user_id=Optional(None), group_id=Optional(None),
1827 1827 case_insensitive=True, archived=False):
1828 1828 q = Repository.query()
1829 1829
1830 1830 if not archived:
1831 1831 q = q.filter(Repository.archived.isnot(true()))
1832 1832
1833 1833 if not isinstance(user_id, Optional):
1834 1834 q = q.filter(Repository.user_id == user_id)
1835 1835
1836 1836 if not isinstance(group_id, Optional):
1837 1837 q = q.filter(Repository.group_id == group_id)
1838 1838
1839 1839 if case_insensitive:
1840 1840 q = q.order_by(func.lower(Repository.repo_name))
1841 1841 else:
1842 1842 q = q.order_by(Repository.repo_name)
1843 1843
1844 1844 return q.all()
1845 1845
1846 1846 @property
1847 1847 def repo_uid(self):
1848 1848 return '_{}'.format(self.repo_id)
1849 1849
1850 1850 @property
1851 1851 def forks(self):
1852 1852 """
1853 1853 Return forks of this repo
1854 1854 """
1855 1855 return Repository.get_repo_forks(self.repo_id)
1856 1856
1857 1857 @property
1858 1858 def parent(self):
1859 1859 """
1860 1860 Returns fork parent
1861 1861 """
1862 1862 return self.fork
1863 1863
1864 1864 @property
1865 1865 def just_name(self):
1866 1866 return self.repo_name.split(self.NAME_SEP)[-1]
1867 1867
1868 1868 @property
1869 1869 def groups_with_parents(self):
1870 1870 groups = []
1871 1871 if self.group is None:
1872 1872 return groups
1873 1873
1874 1874 cur_gr = self.group
1875 1875 groups.insert(0, cur_gr)
1876 1876 while 1:
1877 1877 gr = getattr(cur_gr, 'parent_group', None)
1878 1878 cur_gr = cur_gr.parent_group
1879 1879 if gr is None:
1880 1880 break
1881 1881 groups.insert(0, gr)
1882 1882
1883 1883 return groups
1884 1884
1885 1885 @property
1886 1886 def groups_and_repo(self):
1887 1887 return self.groups_with_parents, self
1888 1888
1889 1889 @LazyProperty
1890 1890 def repo_path(self):
1891 1891 """
1892 1892 Returns base full path for that repository means where it actually
1893 1893 exists on a filesystem
1894 1894 """
1895 1895 q = Session().query(RhodeCodeUi).filter(
1896 1896 RhodeCodeUi.ui_key == self.NAME_SEP)
1897 1897 q = q.options(FromCache("sql_cache_short", "repository_repo_path"))
1898 1898 return q.one().ui_value
1899 1899
1900 1900 @property
1901 1901 def repo_full_path(self):
1902 1902 p = [self.repo_path]
1903 1903 # we need to split the name by / since this is how we store the
1904 1904 # names in the database, but that eventually needs to be converted
1905 1905 # into a valid system path
1906 1906 p += self.repo_name.split(self.NAME_SEP)
1907 1907 return os.path.join(*map(safe_unicode, p))
1908 1908
1909 1909 @property
1910 1910 def cache_keys(self):
1911 1911 """
1912 1912 Returns associated cache keys for that repo
1913 1913 """
1914 1914 invalidation_namespace = CacheKey.REPO_INVALIDATION_NAMESPACE.format(
1915 1915 repo_id=self.repo_id)
1916 1916 return CacheKey.query()\
1917 1917 .filter(CacheKey.cache_args == invalidation_namespace)\
1918 1918 .order_by(CacheKey.cache_key)\
1919 1919 .all()
1920 1920
1921 1921 @property
1922 1922 def cached_diffs_relative_dir(self):
1923 1923 """
1924 1924 Return a relative to the repository store path of cached diffs
1925 1925 used for safe display for users, who shouldn't know the absolute store
1926 1926 path
1927 1927 """
1928 1928 return os.path.join(
1929 1929 os.path.dirname(self.repo_name),
1930 1930 self.cached_diffs_dir.split(os.path.sep)[-1])
1931 1931
1932 1932 @property
1933 1933 def cached_diffs_dir(self):
1934 1934 path = self.repo_full_path
1935 1935 return os.path.join(
1936 1936 os.path.dirname(path),
1937 1937 '.__shadow_diff_cache_repo_{}'.format(self.repo_id))
1938 1938
1939 1939 def cached_diffs(self):
1940 1940 diff_cache_dir = self.cached_diffs_dir
1941 1941 if os.path.isdir(diff_cache_dir):
1942 1942 return os.listdir(diff_cache_dir)
1943 1943 return []
1944 1944
1945 1945 def shadow_repos(self):
1946 1946 shadow_repos_pattern = '.__shadow_repo_{}'.format(self.repo_id)
1947 1947 return [
1948 1948 x for x in os.listdir(os.path.dirname(self.repo_full_path))
1949 1949 if x.startswith(shadow_repos_pattern)]
1950 1950
1951 1951 def get_new_name(self, repo_name):
1952 1952 """
1953 1953 returns new full repository name based on assigned group and new new
1954 1954
1955 1955 :param group_name:
1956 1956 """
1957 1957 path_prefix = self.group.full_path_splitted if self.group else []
1958 1958 return self.NAME_SEP.join(path_prefix + [repo_name])
1959 1959
1960 1960 @property
1961 1961 def _config(self):
1962 1962 """
1963 1963 Returns db based config object.
1964 1964 """
1965 1965 from rhodecode.lib.utils import make_db_config
1966 1966 return make_db_config(clear_session=False, repo=self)
1967 1967
1968 1968 def permissions(self, with_admins=True, with_owner=True,
1969 1969 expand_from_user_groups=False):
1970 1970 """
1971 1971 Permissions for repositories
1972 1972 """
1973 1973 _admin_perm = 'repository.admin'
1974 1974
1975 1975 owner_row = []
1976 1976 if with_owner:
1977 1977 usr = AttributeDict(self.user.get_dict())
1978 1978 usr.owner_row = True
1979 1979 usr.permission = _admin_perm
1980 1980 usr.permission_id = None
1981 1981 owner_row.append(usr)
1982 1982
1983 1983 super_admin_ids = []
1984 1984 super_admin_rows = []
1985 1985 if with_admins:
1986 1986 for usr in User.get_all_super_admins():
1987 1987 super_admin_ids.append(usr.user_id)
1988 1988 # if this admin is also owner, don't double the record
1989 1989 if usr.user_id == owner_row[0].user_id:
1990 1990 owner_row[0].admin_row = True
1991 1991 else:
1992 1992 usr = AttributeDict(usr.get_dict())
1993 1993 usr.admin_row = True
1994 1994 usr.permission = _admin_perm
1995 1995 usr.permission_id = None
1996 1996 super_admin_rows.append(usr)
1997 1997
1998 1998 q = UserRepoToPerm.query().filter(UserRepoToPerm.repository == self)
1999 1999 q = q.options(joinedload(UserRepoToPerm.repository),
2000 2000 joinedload(UserRepoToPerm.user),
2001 2001 joinedload(UserRepoToPerm.permission),)
2002 2002
2003 2003 # get owners and admins and permissions. We do a trick of re-writing
2004 2004 # objects from sqlalchemy to named-tuples due to sqlalchemy session
2005 2005 # has a global reference and changing one object propagates to all
2006 2006 # others. This means if admin is also an owner admin_row that change
2007 2007 # would propagate to both objects
2008 2008 perm_rows = []
2009 2009 for _usr in q.all():
2010 2010 usr = AttributeDict(_usr.user.get_dict())
2011 2011 # if this user is also owner/admin, mark as duplicate record
2012 2012 if usr.user_id == owner_row[0].user_id or usr.user_id in super_admin_ids:
2013 2013 usr.duplicate_perm = True
2014 2014 # also check if this permission is maybe used by branch_permissions
2015 2015 if _usr.branch_perm_entry:
2016 2016 usr.branch_rules = [x.branch_rule_id for x in _usr.branch_perm_entry]
2017 2017
2018 2018 usr.permission = _usr.permission.permission_name
2019 2019 usr.permission_id = _usr.repo_to_perm_id
2020 2020 perm_rows.append(usr)
2021 2021
2022 2022 # filter the perm rows by 'default' first and then sort them by
2023 2023 # admin,write,read,none permissions sorted again alphabetically in
2024 2024 # each group
2025 2025 perm_rows = sorted(perm_rows, key=display_user_sort)
2026 2026
2027 2027 user_groups_rows = []
2028 2028 if expand_from_user_groups:
2029 2029 for ug in self.permission_user_groups(with_members=True):
2030 2030 for user_data in ug.members:
2031 2031 user_groups_rows.append(user_data)
2032 2032
2033 2033 return super_admin_rows + owner_row + perm_rows + user_groups_rows
2034 2034
2035 2035 def permission_user_groups(self, with_members=True):
2036 2036 q = UserGroupRepoToPerm.query()\
2037 2037 .filter(UserGroupRepoToPerm.repository == self)
2038 2038 q = q.options(joinedload(UserGroupRepoToPerm.repository),
2039 2039 joinedload(UserGroupRepoToPerm.users_group),
2040 2040 joinedload(UserGroupRepoToPerm.permission),)
2041 2041
2042 2042 perm_rows = []
2043 2043 for _user_group in q.all():
2044 2044 entry = AttributeDict(_user_group.users_group.get_dict())
2045 2045 entry.permission = _user_group.permission.permission_name
2046 2046 if with_members:
2047 2047 entry.members = [x.user.get_dict()
2048 2048 for x in _user_group.users_group.members]
2049 2049 perm_rows.append(entry)
2050 2050
2051 2051 perm_rows = sorted(perm_rows, key=display_user_group_sort)
2052 2052 return perm_rows
2053 2053
2054 2054 def get_api_data(self, include_secrets=False):
2055 2055 """
2056 2056 Common function for generating repo api data
2057 2057
2058 2058 :param include_secrets: See :meth:`User.get_api_data`.
2059 2059
2060 2060 """
2061 2061 # TODO: mikhail: Here there is an anti-pattern, we probably need to
2062 2062 # move this methods on models level.
2063 2063 from rhodecode.model.settings import SettingsModel
2064 2064 from rhodecode.model.repo import RepoModel
2065 2065
2066 2066 repo = self
2067 2067 _user_id, _time, _reason = self.locked
2068 2068
2069 2069 data = {
2070 2070 'repo_id': repo.repo_id,
2071 2071 'repo_name': repo.repo_name,
2072 2072 'repo_type': repo.repo_type,
2073 2073 'clone_uri': repo.clone_uri or '',
2074 2074 'push_uri': repo.push_uri or '',
2075 2075 'url': RepoModel().get_url(self),
2076 2076 'private': repo.private,
2077 2077 'created_on': repo.created_on,
2078 2078 'description': repo.description_safe,
2079 2079 'landing_rev': repo.landing_rev,
2080 2080 'owner': repo.user.username,
2081 2081 'fork_of': repo.fork.repo_name if repo.fork else None,
2082 2082 'fork_of_id': repo.fork.repo_id if repo.fork else None,
2083 2083 'enable_statistics': repo.enable_statistics,
2084 2084 'enable_locking': repo.enable_locking,
2085 2085 'enable_downloads': repo.enable_downloads,
2086 2086 'last_changeset': repo.changeset_cache,
2087 2087 'locked_by': User.get(_user_id).get_api_data(
2088 2088 include_secrets=include_secrets) if _user_id else None,
2089 2089 'locked_date': time_to_datetime(_time) if _time else None,
2090 2090 'lock_reason': _reason if _reason else None,
2091 2091 }
2092 2092
2093 2093 # TODO: mikhail: should be per-repo settings here
2094 2094 rc_config = SettingsModel().get_all_settings()
2095 2095 repository_fields = str2bool(
2096 2096 rc_config.get('rhodecode_repository_fields'))
2097 2097 if repository_fields:
2098 2098 for f in self.extra_fields:
2099 2099 data[f.field_key_prefixed] = f.field_value
2100 2100
2101 2101 return data
2102 2102
2103 2103 @classmethod
2104 2104 def lock(cls, repo, user_id, lock_time=None, lock_reason=None):
2105 2105 if not lock_time:
2106 2106 lock_time = time.time()
2107 2107 if not lock_reason:
2108 2108 lock_reason = cls.LOCK_AUTOMATIC
2109 2109 repo.locked = [user_id, lock_time, lock_reason]
2110 2110 Session().add(repo)
2111 2111 Session().commit()
2112 2112
2113 2113 @classmethod
2114 2114 def unlock(cls, repo):
2115 2115 repo.locked = None
2116 2116 Session().add(repo)
2117 2117 Session().commit()
2118 2118
2119 2119 @classmethod
2120 2120 def getlock(cls, repo):
2121 2121 return repo.locked
2122 2122
2123 2123 def is_user_lock(self, user_id):
2124 2124 if self.lock[0]:
2125 2125 lock_user_id = safe_int(self.lock[0])
2126 2126 user_id = safe_int(user_id)
2127 2127 # both are ints, and they are equal
2128 2128 return all([lock_user_id, user_id]) and lock_user_id == user_id
2129 2129
2130 2130 return False
2131 2131
2132 2132 def get_locking_state(self, action, user_id, only_when_enabled=True):
2133 2133 """
2134 2134 Checks locking on this repository, if locking is enabled and lock is
2135 2135 present returns a tuple of make_lock, locked, locked_by.
2136 2136 make_lock can have 3 states None (do nothing) True, make lock
2137 2137 False release lock, This value is later propagated to hooks, which
2138 2138 do the locking. Think about this as signals passed to hooks what to do.
2139 2139
2140 2140 """
2141 2141 # TODO: johbo: This is part of the business logic and should be moved
2142 2142 # into the RepositoryModel.
2143 2143
2144 2144 if action not in ('push', 'pull'):
2145 2145 raise ValueError("Invalid action value: %s" % repr(action))
2146 2146
2147 2147 # defines if locked error should be thrown to user
2148 2148 currently_locked = False
2149 2149 # defines if new lock should be made, tri-state
2150 2150 make_lock = None
2151 2151 repo = self
2152 2152 user = User.get(user_id)
2153 2153
2154 2154 lock_info = repo.locked
2155 2155
2156 2156 if repo and (repo.enable_locking or not only_when_enabled):
2157 2157 if action == 'push':
2158 2158 # check if it's already locked !, if it is compare users
2159 2159 locked_by_user_id = lock_info[0]
2160 2160 if user.user_id == locked_by_user_id:
2161 2161 log.debug(
2162 2162 'Got `push` action from user %s, now unlocking', user)
2163 2163 # unlock if we have push from user who locked
2164 2164 make_lock = False
2165 2165 else:
2166 2166 # we're not the same user who locked, ban with
2167 2167 # code defined in settings (default is 423 HTTP Locked) !
2168 2168 log.debug('Repo %s is currently locked by %s', repo, user)
2169 2169 currently_locked = True
2170 2170 elif action == 'pull':
2171 2171 # [0] user [1] date
2172 2172 if lock_info[0] and lock_info[1]:
2173 2173 log.debug('Repo %s is currently locked by %s', repo, user)
2174 2174 currently_locked = True
2175 2175 else:
2176 2176 log.debug('Setting lock on repo %s by %s', repo, user)
2177 2177 make_lock = True
2178 2178
2179 2179 else:
2180 2180 log.debug('Repository %s do not have locking enabled', repo)
2181 2181
2182 2182 log.debug('FINAL locking values make_lock:%s,locked:%s,locked_by:%s',
2183 2183 make_lock, currently_locked, lock_info)
2184 2184
2185 2185 from rhodecode.lib.auth import HasRepoPermissionAny
2186 2186 perm_check = HasRepoPermissionAny('repository.write', 'repository.admin')
2187 2187 if make_lock and not perm_check(repo_name=repo.repo_name, user=user):
2188 2188 # if we don't have at least write permission we cannot make a lock
2189 2189 log.debug('lock state reset back to FALSE due to lack '
2190 2190 'of at least read permission')
2191 2191 make_lock = False
2192 2192
2193 2193 return make_lock, currently_locked, lock_info
2194 2194
2195 2195 @property
2196 2196 def last_commit_cache_update_diff(self):
2197 2197 return time.time() - (safe_int(self.changeset_cache.get('updated_on')) or 0)
2198 2198
2199 2199 @property
2200 2200 def last_commit_change(self):
2201 2201 from rhodecode.lib.vcs.utils.helpers import parse_datetime
2202 2202 empty_date = datetime.datetime.fromtimestamp(0)
2203 2203 date_latest = self.changeset_cache.get('date', empty_date)
2204 2204 try:
2205 2205 return parse_datetime(date_latest)
2206 2206 except Exception:
2207 2207 return empty_date
2208 2208
2209 2209 @property
2210 2210 def last_db_change(self):
2211 2211 return self.updated_on
2212 2212
2213 2213 @property
2214 2214 def clone_uri_hidden(self):
2215 2215 clone_uri = self.clone_uri
2216 2216 if clone_uri:
2217 2217 import urlobject
2218 2218 url_obj = urlobject.URLObject(cleaned_uri(clone_uri))
2219 2219 if url_obj.password:
2220 2220 clone_uri = url_obj.with_password('*****')
2221 2221 return clone_uri
2222 2222
2223 2223 @property
2224 2224 def push_uri_hidden(self):
2225 2225 push_uri = self.push_uri
2226 2226 if push_uri:
2227 2227 import urlobject
2228 2228 url_obj = urlobject.URLObject(cleaned_uri(push_uri))
2229 2229 if url_obj.password:
2230 2230 push_uri = url_obj.with_password('*****')
2231 2231 return push_uri
2232 2232
2233 2233 def clone_url(self, **override):
2234 2234 from rhodecode.model.settings import SettingsModel
2235 2235
2236 2236 uri_tmpl = None
2237 2237 if 'with_id' in override:
2238 2238 uri_tmpl = self.DEFAULT_CLONE_URI_ID
2239 2239 del override['with_id']
2240 2240
2241 2241 if 'uri_tmpl' in override:
2242 2242 uri_tmpl = override['uri_tmpl']
2243 2243 del override['uri_tmpl']
2244 2244
2245 2245 ssh = False
2246 2246 if 'ssh' in override:
2247 2247 ssh = True
2248 2248 del override['ssh']
2249 2249
2250 2250 # we didn't override our tmpl from **overrides
2251 2251 request = get_current_request()
2252 2252 if not uri_tmpl:
2253 2253 if hasattr(request, 'call_context') and hasattr(request.call_context, 'rc_config'):
2254 2254 rc_config = request.call_context.rc_config
2255 2255 else:
2256 2256 rc_config = SettingsModel().get_all_settings(cache=True)
2257 2257 if ssh:
2258 2258 uri_tmpl = rc_config.get(
2259 2259 'rhodecode_clone_uri_ssh_tmpl') or self.DEFAULT_CLONE_URI_SSH
2260 2260 else:
2261 2261 uri_tmpl = rc_config.get(
2262 2262 'rhodecode_clone_uri_tmpl') or self.DEFAULT_CLONE_URI
2263 2263
2264 2264 return get_clone_url(request=request,
2265 2265 uri_tmpl=uri_tmpl,
2266 2266 repo_name=self.repo_name,
2267 2267 repo_id=self.repo_id, **override)
2268 2268
2269 2269 def set_state(self, state):
2270 2270 self.repo_state = state
2271 2271 Session().add(self)
2272 2272 #==========================================================================
2273 2273 # SCM PROPERTIES
2274 2274 #==========================================================================
2275 2275
2276 2276 def get_commit(self, commit_id=None, commit_idx=None, pre_load=None):
2277 2277 return get_commit_safe(
2278 2278 self.scm_instance(), commit_id, commit_idx, pre_load=pre_load)
2279 2279
2280 2280 def get_changeset(self, rev=None, pre_load=None):
2281 2281 warnings.warn("Use get_commit", DeprecationWarning)
2282 2282 commit_id = None
2283 2283 commit_idx = None
2284 2284 if isinstance(rev, compat.string_types):
2285 2285 commit_id = rev
2286 2286 else:
2287 2287 commit_idx = rev
2288 2288 return self.get_commit(commit_id=commit_id, commit_idx=commit_idx,
2289 2289 pre_load=pre_load)
2290 2290
2291 2291 def get_landing_commit(self):
2292 2292 """
2293 2293 Returns landing commit, or if that doesn't exist returns the tip
2294 2294 """
2295 2295 _rev_type, _rev = self.landing_rev
2296 2296 commit = self.get_commit(_rev)
2297 2297 if isinstance(commit, EmptyCommit):
2298 2298 return self.get_commit()
2299 2299 return commit
2300 2300
2301 2301 def flush_commit_cache(self):
2302 2302 self.update_commit_cache(cs_cache={'raw_id':'0'})
2303 2303 self.update_commit_cache()
2304 2304
2305 2305 def update_commit_cache(self, cs_cache=None, config=None):
2306 2306 """
2307 2307 Update cache of last commit for repository, keys should be::
2308 2308
2309 2309 source_repo_id
2310 2310 short_id
2311 2311 raw_id
2312 2312 revision
2313 2313 parents
2314 2314 message
2315 2315 date
2316 2316 author
2317 2317 updated_on
2318 2318
2319 2319 """
2320 2320 from rhodecode.lib.vcs.backends.base import BaseChangeset
2321 2321 if cs_cache is None:
2322 2322 # use no-cache version here
2323 2323 scm_repo = self.scm_instance(cache=False, config=config)
2324 2324
2325 2325 empty = scm_repo is None or scm_repo.is_empty()
2326 2326 if not empty:
2327 2327 cs_cache = scm_repo.get_commit(
2328 2328 pre_load=["author", "date", "message", "parents", "branch"])
2329 2329 else:
2330 2330 cs_cache = EmptyCommit()
2331 2331
2332 2332 if isinstance(cs_cache, BaseChangeset):
2333 2333 cs_cache = cs_cache.__json__()
2334 2334
2335 2335 def is_outdated(new_cs_cache):
2336 2336 if (new_cs_cache['raw_id'] != self.changeset_cache['raw_id'] or
2337 2337 new_cs_cache['revision'] != self.changeset_cache['revision']):
2338 2338 return True
2339 2339 return False
2340 2340
2341 2341 # check if we have maybe already latest cached revision
2342 2342 if is_outdated(cs_cache) or not self.changeset_cache:
2343 2343 _default = datetime.datetime.utcnow()
2344 2344 last_change = cs_cache.get('date') or _default
2345 2345 # we check if last update is newer than the new value
2346 2346 # if yes, we use the current timestamp instead. Imagine you get
2347 2347 # old commit pushed 1y ago, we'd set last update 1y to ago.
2348 2348 last_change_timestamp = datetime_to_time(last_change)
2349 2349 current_timestamp = datetime_to_time(last_change)
2350 2350 if last_change_timestamp > current_timestamp:
2351 2351 cs_cache['date'] = _default
2352 2352
2353 2353 cs_cache['updated_on'] = time.time()
2354 2354 self.changeset_cache = cs_cache
2355 self.updated_on = last_change
2355 2356 Session().add(self)
2356 2357 Session().commit()
2357 2358
2358 2359 log.debug('updated repo `%s` with new commit cache %s',
2359 2360 self.repo_name, cs_cache)
2360 2361 else:
2361 2362 cs_cache = self.changeset_cache
2362 2363 cs_cache['updated_on'] = time.time()
2363 2364 self.changeset_cache = cs_cache
2364 2365 Session().add(self)
2365 2366 Session().commit()
2366 2367
2367 2368 log.debug('Skipping update_commit_cache for repo:`%s` '
2368 2369 'commit already with latest changes', self.repo_name)
2369 2370
2370 2371 @property
2371 2372 def tip(self):
2372 2373 return self.get_commit('tip')
2373 2374
2374 2375 @property
2375 2376 def author(self):
2376 2377 return self.tip.author
2377 2378
2378 2379 @property
2379 2380 def last_change(self):
2380 2381 return self.scm_instance().last_change
2381 2382
2382 2383 def get_comments(self, revisions=None):
2383 2384 """
2384 2385 Returns comments for this repository grouped by revisions
2385 2386
2386 2387 :param revisions: filter query by revisions only
2387 2388 """
2388 2389 cmts = ChangesetComment.query()\
2389 2390 .filter(ChangesetComment.repo == self)
2390 2391 if revisions:
2391 2392 cmts = cmts.filter(ChangesetComment.revision.in_(revisions))
2392 2393 grouped = collections.defaultdict(list)
2393 2394 for cmt in cmts.all():
2394 2395 grouped[cmt.revision].append(cmt)
2395 2396 return grouped
2396 2397
2397 2398 def statuses(self, revisions=None):
2398 2399 """
2399 2400 Returns statuses for this repository
2400 2401
2401 2402 :param revisions: list of revisions to get statuses for
2402 2403 """
2403 2404 statuses = ChangesetStatus.query()\
2404 2405 .filter(ChangesetStatus.repo == self)\
2405 2406 .filter(ChangesetStatus.version == 0)
2406 2407
2407 2408 if revisions:
2408 2409 # Try doing the filtering in chunks to avoid hitting limits
2409 2410 size = 500
2410 2411 status_results = []
2411 2412 for chunk in xrange(0, len(revisions), size):
2412 2413 status_results += statuses.filter(
2413 2414 ChangesetStatus.revision.in_(
2414 2415 revisions[chunk: chunk+size])
2415 2416 ).all()
2416 2417 else:
2417 2418 status_results = statuses.all()
2418 2419
2419 2420 grouped = {}
2420 2421
2421 2422 # maybe we have open new pullrequest without a status?
2422 2423 stat = ChangesetStatus.STATUS_UNDER_REVIEW
2423 2424 status_lbl = ChangesetStatus.get_status_lbl(stat)
2424 2425 for pr in PullRequest.query().filter(PullRequest.source_repo == self).all():
2425 2426 for rev in pr.revisions:
2426 2427 pr_id = pr.pull_request_id
2427 2428 pr_repo = pr.target_repo.repo_name
2428 2429 grouped[rev] = [stat, status_lbl, pr_id, pr_repo]
2429 2430
2430 2431 for stat in status_results:
2431 2432 pr_id = pr_repo = None
2432 2433 if stat.pull_request:
2433 2434 pr_id = stat.pull_request.pull_request_id
2434 2435 pr_repo = stat.pull_request.target_repo.repo_name
2435 2436 grouped[stat.revision] = [str(stat.status), stat.status_lbl,
2436 2437 pr_id, pr_repo]
2437 2438 return grouped
2438 2439
2439 2440 # ==========================================================================
2440 2441 # SCM CACHE INSTANCE
2441 2442 # ==========================================================================
2442 2443
2443 2444 def scm_instance(self, **kwargs):
2444 2445 import rhodecode
2445 2446
2446 2447 # Passing a config will not hit the cache currently only used
2447 2448 # for repo2dbmapper
2448 2449 config = kwargs.pop('config', None)
2449 2450 cache = kwargs.pop('cache', None)
2450 2451 vcs_full_cache = kwargs.pop('vcs_full_cache', None)
2451 2452 if vcs_full_cache is not None:
2452 2453 # allows override global config
2453 2454 full_cache = vcs_full_cache
2454 2455 else:
2455 2456 full_cache = str2bool(rhodecode.CONFIG.get('vcs_full_cache'))
2456 2457 # if cache is NOT defined use default global, else we have a full
2457 2458 # control over cache behaviour
2458 2459 if cache is None and full_cache and not config:
2459 2460 log.debug('Initializing pure cached instance for %s', self.repo_path)
2460 2461 return self._get_instance_cached()
2461 2462
2462 2463 # cache here is sent to the "vcs server"
2463 2464 return self._get_instance(cache=bool(cache), config=config)
2464 2465
2465 2466 def _get_instance_cached(self):
2466 2467 from rhodecode.lib import rc_cache
2467 2468
2468 2469 cache_namespace_uid = 'cache_repo_instance.{}'.format(self.repo_id)
2469 2470 invalidation_namespace = CacheKey.REPO_INVALIDATION_NAMESPACE.format(
2470 2471 repo_id=self.repo_id)
2471 2472 region = rc_cache.get_or_create_region('cache_repo_longterm', cache_namespace_uid)
2472 2473
2473 2474 @region.conditional_cache_on_arguments(namespace=cache_namespace_uid)
2474 2475 def get_instance_cached(repo_id, context_id, _cache_state_uid):
2475 2476 return self._get_instance(repo_state_uid=_cache_state_uid)
2476 2477
2477 2478 # we must use thread scoped cache here,
2478 2479 # because each thread of gevent needs it's own not shared connection and cache
2479 2480 # we also alter `args` so the cache key is individual for every green thread.
2480 2481 inv_context_manager = rc_cache.InvalidationContext(
2481 2482 uid=cache_namespace_uid, invalidation_namespace=invalidation_namespace,
2482 2483 thread_scoped=True)
2483 2484 with inv_context_manager as invalidation_context:
2484 2485 cache_state_uid = invalidation_context.cache_data['cache_state_uid']
2485 2486 args = (self.repo_id, inv_context_manager.cache_key, cache_state_uid)
2486 2487
2487 2488 # re-compute and store cache if we get invalidate signal
2488 2489 if invalidation_context.should_invalidate():
2489 2490 instance = get_instance_cached.refresh(*args)
2490 2491 else:
2491 2492 instance = get_instance_cached(*args)
2492 2493
2493 2494 log.debug('Repo instance fetched in %.4fs', inv_context_manager.compute_time)
2494 2495 return instance
2495 2496
2496 2497 def _get_instance(self, cache=True, config=None, repo_state_uid=None):
2497 2498 log.debug('Initializing %s instance `%s` with cache flag set to: %s',
2498 2499 self.repo_type, self.repo_path, cache)
2499 2500 config = config or self._config
2500 2501 custom_wire = {
2501 2502 'cache': cache, # controls the vcs.remote cache
2502 2503 'repo_state_uid': repo_state_uid
2503 2504 }
2504 2505 repo = get_vcs_instance(
2505 2506 repo_path=safe_str(self.repo_full_path),
2506 2507 config=config,
2507 2508 with_wire=custom_wire,
2508 2509 create=False,
2509 2510 _vcs_alias=self.repo_type)
2510 2511 if repo is not None:
2511 2512 repo.count() # cache rebuild
2512 2513 return repo
2513 2514
2514 2515 def get_shadow_repository_path(self, workspace_id):
2515 2516 from rhodecode.lib.vcs.backends.base import BaseRepository
2516 2517 shadow_repo_path = BaseRepository._get_shadow_repository_path(
2517 2518 self.repo_full_path, self.repo_id, workspace_id)
2518 2519 return shadow_repo_path
2519 2520
2520 2521 def __json__(self):
2521 2522 return {'landing_rev': self.landing_rev}
2522 2523
2523 2524 def get_dict(self):
2524 2525
2525 2526 # Since we transformed `repo_name` to a hybrid property, we need to
2526 2527 # keep compatibility with the code which uses `repo_name` field.
2527 2528
2528 2529 result = super(Repository, self).get_dict()
2529 2530 result['repo_name'] = result.pop('_repo_name', None)
2530 2531 return result
2531 2532
2532 2533
2533 2534 class RepoGroup(Base, BaseModel):
2534 2535 __tablename__ = 'groups'
2535 2536 __table_args__ = (
2536 2537 UniqueConstraint('group_name', 'group_parent_id'),
2537 2538 base_table_args,
2538 2539 )
2539 2540 __mapper_args__ = {'order_by': 'group_name'}
2540 2541
2541 2542 CHOICES_SEPARATOR = '/' # used to generate select2 choices for nested groups
2542 2543
2543 2544 group_id = Column("group_id", Integer(), nullable=False, unique=True, default=None, primary_key=True)
2544 2545 _group_name = Column("group_name", String(255), nullable=False, unique=True, default=None)
2545 2546 group_name_hash = Column("repo_group_name_hash", String(1024), nullable=False, unique=False)
2546 2547 group_parent_id = Column("group_parent_id", Integer(), ForeignKey('groups.group_id'), nullable=True, unique=None, default=None)
2547 2548 group_description = Column("group_description", String(10000), nullable=True, unique=None, default=None)
2548 2549 enable_locking = Column("enable_locking", Boolean(), nullable=False, unique=None, default=False)
2549 2550 user_id = Column("user_id", Integer(), ForeignKey('users.user_id'), nullable=False, unique=False, default=None)
2550 2551 created_on = Column('created_on', DateTime(timezone=False), nullable=False, default=datetime.datetime.now)
2551 2552 updated_on = Column('updated_on', DateTime(timezone=False), nullable=True, unique=None, default=datetime.datetime.now)
2552 2553 personal = Column('personal', Boolean(), nullable=True, unique=None, default=None)
2553 2554 _changeset_cache = Column(
2554 2555 "changeset_cache", LargeBinary(), nullable=True) # JSON data
2555 2556
2556 2557 repo_group_to_perm = relationship('UserRepoGroupToPerm', cascade='all', order_by='UserRepoGroupToPerm.group_to_perm_id')
2557 2558 users_group_to_perm = relationship('UserGroupRepoGroupToPerm', cascade='all')
2558 2559 parent_group = relationship('RepoGroup', remote_side=group_id)
2559 2560 user = relationship('User')
2560 2561 integrations = relationship('Integration', cascade="all, delete-orphan")
2561 2562
2562 2563 def __init__(self, group_name='', parent_group=None):
2563 2564 self.group_name = group_name
2564 2565 self.parent_group = parent_group
2565 2566
2566 2567 def __unicode__(self):
2567 2568 return u"<%s('id:%s:%s')>" % (
2568 2569 self.__class__.__name__, self.group_id, self.group_name)
2569 2570
2570 2571 @hybrid_property
2571 2572 def group_name(self):
2572 2573 return self._group_name
2573 2574
2574 2575 @group_name.setter
2575 2576 def group_name(self, value):
2576 2577 self._group_name = value
2577 2578 self.group_name_hash = self.hash_repo_group_name(value)
2578 2579
2579 2580 @hybrid_property
2580 2581 def changeset_cache(self):
2581 2582 from rhodecode.lib.vcs.backends.base import EmptyCommit
2582 2583 dummy = EmptyCommit().__json__()
2583 2584 if not self._changeset_cache:
2584 2585 dummy['source_repo_id'] = ''
2585 2586 return json.loads(json.dumps(dummy))
2586 2587
2587 2588 try:
2588 2589 return json.loads(self._changeset_cache)
2589 2590 except TypeError:
2590 2591 return dummy
2591 2592 except Exception:
2592 2593 log.error(traceback.format_exc())
2593 2594 return dummy
2594 2595
2595 2596 @changeset_cache.setter
2596 2597 def changeset_cache(self, val):
2597 2598 try:
2598 2599 self._changeset_cache = json.dumps(val)
2599 2600 except Exception:
2600 2601 log.error(traceback.format_exc())
2601 2602
2602 2603 @validates('group_parent_id')
2603 2604 def validate_group_parent_id(self, key, val):
2604 2605 """
2605 2606 Check cycle references for a parent group to self
2606 2607 """
2607 2608 if self.group_id and val:
2608 2609 assert val != self.group_id
2609 2610
2610 2611 return val
2611 2612
2612 2613 @hybrid_property
2613 2614 def description_safe(self):
2614 2615 from rhodecode.lib import helpers as h
2615 2616 return h.escape(self.group_description)
2616 2617
2617 2618 @classmethod
2618 2619 def hash_repo_group_name(cls, repo_group_name):
2619 2620 val = remove_formatting(repo_group_name)
2620 2621 val = safe_str(val).lower()
2621 2622 chars = []
2622 2623 for c in val:
2623 2624 if c not in string.ascii_letters:
2624 2625 c = str(ord(c))
2625 2626 chars.append(c)
2626 2627
2627 2628 return ''.join(chars)
2628 2629
2629 2630 @classmethod
2630 2631 def _generate_choice(cls, repo_group):
2631 2632 from webhelpers.html import literal as _literal
2632 2633 _name = lambda k: _literal(cls.CHOICES_SEPARATOR.join(k))
2633 2634 return repo_group.group_id, _name(repo_group.full_path_splitted)
2634 2635
2635 2636 @classmethod
2636 2637 def groups_choices(cls, groups=None, show_empty_group=True):
2637 2638 if not groups:
2638 2639 groups = cls.query().all()
2639 2640
2640 2641 repo_groups = []
2641 2642 if show_empty_group:
2642 2643 repo_groups = [(-1, u'-- %s --' % _('No parent'))]
2643 2644
2644 2645 repo_groups.extend([cls._generate_choice(x) for x in groups])
2645 2646
2646 2647 repo_groups = sorted(
2647 2648 repo_groups, key=lambda t: t[1].split(cls.CHOICES_SEPARATOR)[0])
2648 2649 return repo_groups
2649 2650
2650 2651 @classmethod
2651 2652 def url_sep(cls):
2652 2653 return URL_SEP
2653 2654
2654 2655 @classmethod
2655 2656 def get_by_group_name(cls, group_name, cache=False, case_insensitive=False):
2656 2657 if case_insensitive:
2657 2658 gr = cls.query().filter(func.lower(cls.group_name)
2658 2659 == func.lower(group_name))
2659 2660 else:
2660 2661 gr = cls.query().filter(cls.group_name == group_name)
2661 2662 if cache:
2662 2663 name_key = _hash_key(group_name)
2663 2664 gr = gr.options(
2664 2665 FromCache("sql_cache_short", "get_group_%s" % name_key))
2665 2666 return gr.scalar()
2666 2667
2667 2668 @classmethod
2668 2669 def get_user_personal_repo_group(cls, user_id):
2669 2670 user = User.get(user_id)
2670 2671 if user.username == User.DEFAULT_USER:
2671 2672 return None
2672 2673
2673 2674 return cls.query()\
2674 2675 .filter(cls.personal == true()) \
2675 2676 .filter(cls.user == user) \
2676 2677 .order_by(cls.group_id.asc()) \
2677 2678 .first()
2678 2679
2679 2680 @classmethod
2680 2681 def get_all_repo_groups(cls, user_id=Optional(None), group_id=Optional(None),
2681 2682 case_insensitive=True):
2682 2683 q = RepoGroup.query()
2683 2684
2684 2685 if not isinstance(user_id, Optional):
2685 2686 q = q.filter(RepoGroup.user_id == user_id)
2686 2687
2687 2688 if not isinstance(group_id, Optional):
2688 2689 q = q.filter(RepoGroup.group_parent_id == group_id)
2689 2690
2690 2691 if case_insensitive:
2691 2692 q = q.order_by(func.lower(RepoGroup.group_name))
2692 2693 else:
2693 2694 q = q.order_by(RepoGroup.group_name)
2694 2695 return q.all()
2695 2696
2696 2697 @property
2697 2698 def parents(self, parents_recursion_limit = 10):
2698 2699 groups = []
2699 2700 if self.parent_group is None:
2700 2701 return groups
2701 2702 cur_gr = self.parent_group
2702 2703 groups.insert(0, cur_gr)
2703 2704 cnt = 0
2704 2705 while 1:
2705 2706 cnt += 1
2706 2707 gr = getattr(cur_gr, 'parent_group', None)
2707 2708 cur_gr = cur_gr.parent_group
2708 2709 if gr is None:
2709 2710 break
2710 2711 if cnt == parents_recursion_limit:
2711 2712 # this will prevent accidental infinit loops
2712 2713 log.error('more than %s parents found for group %s, stopping '
2713 2714 'recursive parent fetching', parents_recursion_limit, self)
2714 2715 break
2715 2716
2716 2717 groups.insert(0, gr)
2717 2718 return groups
2718 2719
2719 2720 @property
2720 2721 def last_commit_cache_update_diff(self):
2721 2722 return time.time() - (safe_int(self.changeset_cache.get('updated_on')) or 0)
2722 2723
2723 2724 @property
2724 2725 def last_commit_change(self):
2725 2726 from rhodecode.lib.vcs.utils.helpers import parse_datetime
2726 2727 empty_date = datetime.datetime.fromtimestamp(0)
2727 2728 date_latest = self.changeset_cache.get('date', empty_date)
2728 2729 try:
2729 2730 return parse_datetime(date_latest)
2730 2731 except Exception:
2731 2732 return empty_date
2732 2733
2733 2734 @property
2734 2735 def last_db_change(self):
2735 2736 return self.updated_on
2736 2737
2737 2738 @property
2738 2739 def children(self):
2739 2740 return RepoGroup.query().filter(RepoGroup.parent_group == self)
2740 2741
2741 2742 @property
2742 2743 def name(self):
2743 2744 return self.group_name.split(RepoGroup.url_sep())[-1]
2744 2745
2745 2746 @property
2746 2747 def full_path(self):
2747 2748 return self.group_name
2748 2749
2749 2750 @property
2750 2751 def full_path_splitted(self):
2751 2752 return self.group_name.split(RepoGroup.url_sep())
2752 2753
2753 2754 @property
2754 2755 def repositories(self):
2755 2756 return Repository.query()\
2756 2757 .filter(Repository.group == self)\
2757 2758 .order_by(Repository.repo_name)
2758 2759
2759 2760 @property
2760 2761 def repositories_recursive_count(self):
2761 2762 cnt = self.repositories.count()
2762 2763
2763 2764 def children_count(group):
2764 2765 cnt = 0
2765 2766 for child in group.children:
2766 2767 cnt += child.repositories.count()
2767 2768 cnt += children_count(child)
2768 2769 return cnt
2769 2770
2770 2771 return cnt + children_count(self)
2771 2772
2772 2773 def _recursive_objects(self, include_repos=True, include_groups=True):
2773 2774 all_ = []
2774 2775
2775 2776 def _get_members(root_gr):
2776 2777 if include_repos:
2777 2778 for r in root_gr.repositories:
2778 2779 all_.append(r)
2779 2780 childs = root_gr.children.all()
2780 2781 if childs:
2781 2782 for gr in childs:
2782 2783 if include_groups:
2783 2784 all_.append(gr)
2784 2785 _get_members(gr)
2785 2786
2786 2787 root_group = []
2787 2788 if include_groups:
2788 2789 root_group = [self]
2789 2790
2790 2791 _get_members(self)
2791 2792 return root_group + all_
2792 2793
2793 2794 def recursive_groups_and_repos(self):
2794 2795 """
2795 2796 Recursive return all groups, with repositories in those groups
2796 2797 """
2797 2798 return self._recursive_objects()
2798 2799
2799 2800 def recursive_groups(self):
2800 2801 """
2801 2802 Returns all children groups for this group including children of children
2802 2803 """
2803 2804 return self._recursive_objects(include_repos=False)
2804 2805
2805 2806 def recursive_repos(self):
2806 2807 """
2807 2808 Returns all children repositories for this group
2808 2809 """
2809 2810 return self._recursive_objects(include_groups=False)
2810 2811
2811 2812 def get_new_name(self, group_name):
2812 2813 """
2813 2814 returns new full group name based on parent and new name
2814 2815
2815 2816 :param group_name:
2816 2817 """
2817 2818 path_prefix = (self.parent_group.full_path_splitted if
2818 2819 self.parent_group else [])
2819 2820 return RepoGroup.url_sep().join(path_prefix + [group_name])
2820 2821
2821 2822 def update_commit_cache(self, config=None):
2822 2823 """
2823 2824 Update cache of last changeset for newest repository inside this group, keys should be::
2824 2825
2825 2826 source_repo_id
2826 2827 short_id
2827 2828 raw_id
2828 2829 revision
2829 2830 parents
2830 2831 message
2831 2832 date
2832 2833 author
2833 2834
2834 2835 """
2835 2836 from rhodecode.lib.vcs.utils.helpers import parse_datetime
2836 2837
2837 2838 def repo_groups_and_repos():
2838 2839 all_entries = OrderedDefaultDict(list)
2839 2840
2840 2841 def _get_members(root_gr, pos=0):
2841 2842
2842 2843 for repo in root_gr.repositories:
2843 2844 all_entries[root_gr].append(repo)
2844 2845
2845 2846 # fill in all parent positions
2846 2847 for parent_group in root_gr.parents:
2847 2848 all_entries[parent_group].extend(all_entries[root_gr])
2848 2849
2849 2850 children_groups = root_gr.children.all()
2850 2851 if children_groups:
2851 2852 for cnt, gr in enumerate(children_groups, 1):
2852 2853 _get_members(gr, pos=pos+cnt)
2853 2854
2854 2855 _get_members(root_gr=self)
2855 2856 return all_entries
2856 2857
2857 2858 empty_date = datetime.datetime.fromtimestamp(0)
2858 2859 for repo_group, repos in repo_groups_and_repos().items():
2859 2860
2860 2861 latest_repo_cs_cache = {}
2862 _date_latest = empty_date
2861 2863 for repo in repos:
2862 2864 repo_cs_cache = repo.changeset_cache
2863 2865 date_latest = latest_repo_cs_cache.get('date', empty_date)
2864 2866 date_current = repo_cs_cache.get('date', empty_date)
2865 2867 current_timestamp = datetime_to_time(parse_datetime(date_latest))
2866 2868 if current_timestamp < datetime_to_time(parse_datetime(date_current)):
2867 2869 latest_repo_cs_cache = repo_cs_cache
2868 2870 latest_repo_cs_cache['source_repo_id'] = repo.repo_id
2871 _date_latest = parse_datetime(latest_repo_cs_cache['date'])
2869 2872
2870 2873 latest_repo_cs_cache['updated_on'] = time.time()
2871 2874 repo_group.changeset_cache = latest_repo_cs_cache
2875 repo_group.updated_on = _date_latest
2872 2876 Session().add(repo_group)
2873 2877 Session().commit()
2874 2878
2875 2879 log.debug('updated repo group `%s` with new commit cache %s',
2876 2880 repo_group.group_name, latest_repo_cs_cache)
2877 2881
2878 2882 def permissions(self, with_admins=True, with_owner=True,
2879 2883 expand_from_user_groups=False):
2880 2884 """
2881 2885 Permissions for repository groups
2882 2886 """
2883 2887 _admin_perm = 'group.admin'
2884 2888
2885 2889 owner_row = []
2886 2890 if with_owner:
2887 2891 usr = AttributeDict(self.user.get_dict())
2888 2892 usr.owner_row = True
2889 2893 usr.permission = _admin_perm
2890 2894 owner_row.append(usr)
2891 2895
2892 2896 super_admin_ids = []
2893 2897 super_admin_rows = []
2894 2898 if with_admins:
2895 2899 for usr in User.get_all_super_admins():
2896 2900 super_admin_ids.append(usr.user_id)
2897 2901 # if this admin is also owner, don't double the record
2898 2902 if usr.user_id == owner_row[0].user_id:
2899 2903 owner_row[0].admin_row = True
2900 2904 else:
2901 2905 usr = AttributeDict(usr.get_dict())
2902 2906 usr.admin_row = True
2903 2907 usr.permission = _admin_perm
2904 2908 super_admin_rows.append(usr)
2905 2909
2906 2910 q = UserRepoGroupToPerm.query().filter(UserRepoGroupToPerm.group == self)
2907 2911 q = q.options(joinedload(UserRepoGroupToPerm.group),
2908 2912 joinedload(UserRepoGroupToPerm.user),
2909 2913 joinedload(UserRepoGroupToPerm.permission),)
2910 2914
2911 2915 # get owners and admins and permissions. We do a trick of re-writing
2912 2916 # objects from sqlalchemy to named-tuples due to sqlalchemy session
2913 2917 # has a global reference and changing one object propagates to all
2914 2918 # others. This means if admin is also an owner admin_row that change
2915 2919 # would propagate to both objects
2916 2920 perm_rows = []
2917 2921 for _usr in q.all():
2918 2922 usr = AttributeDict(_usr.user.get_dict())
2919 2923 # if this user is also owner/admin, mark as duplicate record
2920 2924 if usr.user_id == owner_row[0].user_id or usr.user_id in super_admin_ids:
2921 2925 usr.duplicate_perm = True
2922 2926 usr.permission = _usr.permission.permission_name
2923 2927 perm_rows.append(usr)
2924 2928
2925 2929 # filter the perm rows by 'default' first and then sort them by
2926 2930 # admin,write,read,none permissions sorted again alphabetically in
2927 2931 # each group
2928 2932 perm_rows = sorted(perm_rows, key=display_user_sort)
2929 2933
2930 2934 user_groups_rows = []
2931 2935 if expand_from_user_groups:
2932 2936 for ug in self.permission_user_groups(with_members=True):
2933 2937 for user_data in ug.members:
2934 2938 user_groups_rows.append(user_data)
2935 2939
2936 2940 return super_admin_rows + owner_row + perm_rows + user_groups_rows
2937 2941
2938 2942 def permission_user_groups(self, with_members=False):
2939 2943 q = UserGroupRepoGroupToPerm.query()\
2940 2944 .filter(UserGroupRepoGroupToPerm.group == self)
2941 2945 q = q.options(joinedload(UserGroupRepoGroupToPerm.group),
2942 2946 joinedload(UserGroupRepoGroupToPerm.users_group),
2943 2947 joinedload(UserGroupRepoGroupToPerm.permission),)
2944 2948
2945 2949 perm_rows = []
2946 2950 for _user_group in q.all():
2947 2951 entry = AttributeDict(_user_group.users_group.get_dict())
2948 2952 entry.permission = _user_group.permission.permission_name
2949 2953 if with_members:
2950 2954 entry.members = [x.user.get_dict()
2951 2955 for x in _user_group.users_group.members]
2952 2956 perm_rows.append(entry)
2953 2957
2954 2958 perm_rows = sorted(perm_rows, key=display_user_group_sort)
2955 2959 return perm_rows
2956 2960
2957 2961 def get_api_data(self):
2958 2962 """
2959 2963 Common function for generating api data
2960 2964
2961 2965 """
2962 2966 group = self
2963 2967 data = {
2964 2968 'group_id': group.group_id,
2965 2969 'group_name': group.group_name,
2966 2970 'group_description': group.description_safe,
2967 2971 'parent_group': group.parent_group.group_name if group.parent_group else None,
2968 2972 'repositories': [x.repo_name for x in group.repositories],
2969 2973 'owner': group.user.username,
2970 2974 }
2971 2975 return data
2972 2976
2973 2977 def get_dict(self):
2974 2978 # Since we transformed `group_name` to a hybrid property, we need to
2975 2979 # keep compatibility with the code which uses `group_name` field.
2976 2980 result = super(RepoGroup, self).get_dict()
2977 2981 result['group_name'] = result.pop('_group_name', None)
2978 2982 return result
2979 2983
2980 2984
2981 2985 class Permission(Base, BaseModel):
2982 2986 __tablename__ = 'permissions'
2983 2987 __table_args__ = (
2984 2988 Index('p_perm_name_idx', 'permission_name'),
2985 2989 base_table_args,
2986 2990 )
2987 2991
2988 2992 PERMS = [
2989 2993 ('hg.admin', _('RhodeCode Super Administrator')),
2990 2994
2991 2995 ('repository.none', _('Repository no access')),
2992 2996 ('repository.read', _('Repository read access')),
2993 2997 ('repository.write', _('Repository write access')),
2994 2998 ('repository.admin', _('Repository admin access')),
2995 2999
2996 3000 ('group.none', _('Repository group no access')),
2997 3001 ('group.read', _('Repository group read access')),
2998 3002 ('group.write', _('Repository group write access')),
2999 3003 ('group.admin', _('Repository group admin access')),
3000 3004
3001 3005 ('usergroup.none', _('User group no access')),
3002 3006 ('usergroup.read', _('User group read access')),
3003 3007 ('usergroup.write', _('User group write access')),
3004 3008 ('usergroup.admin', _('User group admin access')),
3005 3009
3006 3010 ('branch.none', _('Branch no permissions')),
3007 3011 ('branch.merge', _('Branch access by web merge')),
3008 3012 ('branch.push', _('Branch access by push')),
3009 3013 ('branch.push_force', _('Branch access by push with force')),
3010 3014
3011 3015 ('hg.repogroup.create.false', _('Repository Group creation disabled')),
3012 3016 ('hg.repogroup.create.true', _('Repository Group creation enabled')),
3013 3017
3014 3018 ('hg.usergroup.create.false', _('User Group creation disabled')),
3015 3019 ('hg.usergroup.create.true', _('User Group creation enabled')),
3016 3020
3017 3021 ('hg.create.none', _('Repository creation disabled')),
3018 3022 ('hg.create.repository', _('Repository creation enabled')),
3019 3023 ('hg.create.write_on_repogroup.true', _('Repository creation enabled with write permission to a repository group')),
3020 3024 ('hg.create.write_on_repogroup.false', _('Repository creation disabled with write permission to a repository group')),
3021 3025
3022 3026 ('hg.fork.none', _('Repository forking disabled')),
3023 3027 ('hg.fork.repository', _('Repository forking enabled')),
3024 3028
3025 3029 ('hg.register.none', _('Registration disabled')),
3026 3030 ('hg.register.manual_activate', _('User Registration with manual account activation')),
3027 3031 ('hg.register.auto_activate', _('User Registration with automatic account activation')),
3028 3032
3029 3033 ('hg.password_reset.enabled', _('Password reset enabled')),
3030 3034 ('hg.password_reset.hidden', _('Password reset hidden')),
3031 3035 ('hg.password_reset.disabled', _('Password reset disabled')),
3032 3036
3033 3037 ('hg.extern_activate.manual', _('Manual activation of external account')),
3034 3038 ('hg.extern_activate.auto', _('Automatic activation of external account')),
3035 3039
3036 3040 ('hg.inherit_default_perms.false', _('Inherit object permissions from default user disabled')),
3037 3041 ('hg.inherit_default_perms.true', _('Inherit object permissions from default user enabled')),
3038 3042 ]
3039 3043
3040 3044 # definition of system default permissions for DEFAULT user, created on
3041 3045 # system setup
3042 3046 DEFAULT_USER_PERMISSIONS = [
3043 3047 # object perms
3044 3048 'repository.read',
3045 3049 'group.read',
3046 3050 'usergroup.read',
3047 3051 # branch, for backward compat we need same value as before so forced pushed
3048 3052 'branch.push_force',
3049 3053 # global
3050 3054 'hg.create.repository',
3051 3055 'hg.repogroup.create.false',
3052 3056 'hg.usergroup.create.false',
3053 3057 'hg.create.write_on_repogroup.true',
3054 3058 'hg.fork.repository',
3055 3059 'hg.register.manual_activate',
3056 3060 'hg.password_reset.enabled',
3057 3061 'hg.extern_activate.auto',
3058 3062 'hg.inherit_default_perms.true',
3059 3063 ]
3060 3064
3061 3065 # defines which permissions are more important higher the more important
3062 3066 # Weight defines which permissions are more important.
3063 3067 # The higher number the more important.
3064 3068 PERM_WEIGHTS = {
3065 3069 'repository.none': 0,
3066 3070 'repository.read': 1,
3067 3071 'repository.write': 3,
3068 3072 'repository.admin': 4,
3069 3073
3070 3074 'group.none': 0,
3071 3075 'group.read': 1,
3072 3076 'group.write': 3,
3073 3077 'group.admin': 4,
3074 3078
3075 3079 'usergroup.none': 0,
3076 3080 'usergroup.read': 1,
3077 3081 'usergroup.write': 3,
3078 3082 'usergroup.admin': 4,
3079 3083
3080 3084 'branch.none': 0,
3081 3085 'branch.merge': 1,
3082 3086 'branch.push': 3,
3083 3087 'branch.push_force': 4,
3084 3088
3085 3089 'hg.repogroup.create.false': 0,
3086 3090 'hg.repogroup.create.true': 1,
3087 3091
3088 3092 'hg.usergroup.create.false': 0,
3089 3093 'hg.usergroup.create.true': 1,
3090 3094
3091 3095 'hg.fork.none': 0,
3092 3096 'hg.fork.repository': 1,
3093 3097 'hg.create.none': 0,
3094 3098 'hg.create.repository': 1
3095 3099 }
3096 3100
3097 3101 permission_id = Column("permission_id", Integer(), nullable=False, unique=True, default=None, primary_key=True)
3098 3102 permission_name = Column("permission_name", String(255), nullable=True, unique=None, default=None)
3099 3103 permission_longname = Column("permission_longname", String(255), nullable=True, unique=None, default=None)
3100 3104
3101 3105 def __unicode__(self):
3102 3106 return u"<%s('%s:%s')>" % (
3103 3107 self.__class__.__name__, self.permission_id, self.permission_name
3104 3108 )
3105 3109
3106 3110 @classmethod
3107 3111 def get_by_key(cls, key):
3108 3112 return cls.query().filter(cls.permission_name == key).scalar()
3109 3113
3110 3114 @classmethod
3111 3115 def get_default_repo_perms(cls, user_id, repo_id=None):
3112 3116 q = Session().query(UserRepoToPerm, Repository, Permission)\
3113 3117 .join((Permission, UserRepoToPerm.permission_id == Permission.permission_id))\
3114 3118 .join((Repository, UserRepoToPerm.repository_id == Repository.repo_id))\
3115 3119 .filter(UserRepoToPerm.user_id == user_id)
3116 3120 if repo_id:
3117 3121 q = q.filter(UserRepoToPerm.repository_id == repo_id)
3118 3122 return q.all()
3119 3123
3120 3124 @classmethod
3121 3125 def get_default_repo_branch_perms(cls, user_id, repo_id=None):
3122 3126 q = Session().query(UserToRepoBranchPermission, UserRepoToPerm, Permission) \
3123 3127 .join(
3124 3128 Permission,
3125 3129 UserToRepoBranchPermission.permission_id == Permission.permission_id) \
3126 3130 .join(
3127 3131 UserRepoToPerm,
3128 3132 UserToRepoBranchPermission.rule_to_perm_id == UserRepoToPerm.repo_to_perm_id) \
3129 3133 .filter(UserRepoToPerm.user_id == user_id)
3130 3134
3131 3135 if repo_id:
3132 3136 q = q.filter(UserToRepoBranchPermission.repository_id == repo_id)
3133 3137 return q.order_by(UserToRepoBranchPermission.rule_order).all()
3134 3138
3135 3139 @classmethod
3136 3140 def get_default_repo_perms_from_user_group(cls, user_id, repo_id=None):
3137 3141 q = Session().query(UserGroupRepoToPerm, Repository, Permission)\
3138 3142 .join(
3139 3143 Permission,
3140 3144 UserGroupRepoToPerm.permission_id == Permission.permission_id)\
3141 3145 .join(
3142 3146 Repository,
3143 3147 UserGroupRepoToPerm.repository_id == Repository.repo_id)\
3144 3148 .join(
3145 3149 UserGroup,
3146 3150 UserGroupRepoToPerm.users_group_id ==
3147 3151 UserGroup.users_group_id)\
3148 3152 .join(
3149 3153 UserGroupMember,
3150 3154 UserGroupRepoToPerm.users_group_id ==
3151 3155 UserGroupMember.users_group_id)\
3152 3156 .filter(
3153 3157 UserGroupMember.user_id == user_id,
3154 3158 UserGroup.users_group_active == true())
3155 3159 if repo_id:
3156 3160 q = q.filter(UserGroupRepoToPerm.repository_id == repo_id)
3157 3161 return q.all()
3158 3162
3159 3163 @classmethod
3160 3164 def get_default_repo_branch_perms_from_user_group(cls, user_id, repo_id=None):
3161 3165 q = Session().query(UserGroupToRepoBranchPermission, UserGroupRepoToPerm, Permission) \
3162 3166 .join(
3163 3167 Permission,
3164 3168 UserGroupToRepoBranchPermission.permission_id == Permission.permission_id) \
3165 3169 .join(
3166 3170 UserGroupRepoToPerm,
3167 3171 UserGroupToRepoBranchPermission.rule_to_perm_id == UserGroupRepoToPerm.users_group_to_perm_id) \
3168 3172 .join(
3169 3173 UserGroup,
3170 3174 UserGroupRepoToPerm.users_group_id == UserGroup.users_group_id) \
3171 3175 .join(
3172 3176 UserGroupMember,
3173 3177 UserGroupRepoToPerm.users_group_id == UserGroupMember.users_group_id) \
3174 3178 .filter(
3175 3179 UserGroupMember.user_id == user_id,
3176 3180 UserGroup.users_group_active == true())
3177 3181
3178 3182 if repo_id:
3179 3183 q = q.filter(UserGroupToRepoBranchPermission.repository_id == repo_id)
3180 3184 return q.order_by(UserGroupToRepoBranchPermission.rule_order).all()
3181 3185
3182 3186 @classmethod
3183 3187 def get_default_group_perms(cls, user_id, repo_group_id=None):
3184 3188 q = Session().query(UserRepoGroupToPerm, RepoGroup, Permission)\
3185 3189 .join(
3186 3190 Permission,
3187 3191 UserRepoGroupToPerm.permission_id == Permission.permission_id)\
3188 3192 .join(
3189 3193 RepoGroup,
3190 3194 UserRepoGroupToPerm.group_id == RepoGroup.group_id)\
3191 3195 .filter(UserRepoGroupToPerm.user_id == user_id)
3192 3196 if repo_group_id:
3193 3197 q = q.filter(UserRepoGroupToPerm.group_id == repo_group_id)
3194 3198 return q.all()
3195 3199
3196 3200 @classmethod
3197 3201 def get_default_group_perms_from_user_group(
3198 3202 cls, user_id, repo_group_id=None):
3199 3203 q = Session().query(UserGroupRepoGroupToPerm, RepoGroup, Permission)\
3200 3204 .join(
3201 3205 Permission,
3202 3206 UserGroupRepoGroupToPerm.permission_id ==
3203 3207 Permission.permission_id)\
3204 3208 .join(
3205 3209 RepoGroup,
3206 3210 UserGroupRepoGroupToPerm.group_id == RepoGroup.group_id)\
3207 3211 .join(
3208 3212 UserGroup,
3209 3213 UserGroupRepoGroupToPerm.users_group_id ==
3210 3214 UserGroup.users_group_id)\
3211 3215 .join(
3212 3216 UserGroupMember,
3213 3217 UserGroupRepoGroupToPerm.users_group_id ==
3214 3218 UserGroupMember.users_group_id)\
3215 3219 .filter(
3216 3220 UserGroupMember.user_id == user_id,
3217 3221 UserGroup.users_group_active == true())
3218 3222 if repo_group_id:
3219 3223 q = q.filter(UserGroupRepoGroupToPerm.group_id == repo_group_id)
3220 3224 return q.all()
3221 3225
3222 3226 @classmethod
3223 3227 def get_default_user_group_perms(cls, user_id, user_group_id=None):
3224 3228 q = Session().query(UserUserGroupToPerm, UserGroup, Permission)\
3225 3229 .join((Permission, UserUserGroupToPerm.permission_id == Permission.permission_id))\
3226 3230 .join((UserGroup, UserUserGroupToPerm.user_group_id == UserGroup.users_group_id))\
3227 3231 .filter(UserUserGroupToPerm.user_id == user_id)
3228 3232 if user_group_id:
3229 3233 q = q.filter(UserUserGroupToPerm.user_group_id == user_group_id)
3230 3234 return q.all()
3231 3235
3232 3236 @classmethod
3233 3237 def get_default_user_group_perms_from_user_group(
3234 3238 cls, user_id, user_group_id=None):
3235 3239 TargetUserGroup = aliased(UserGroup, name='target_user_group')
3236 3240 q = Session().query(UserGroupUserGroupToPerm, UserGroup, Permission)\
3237 3241 .join(
3238 3242 Permission,
3239 3243 UserGroupUserGroupToPerm.permission_id ==
3240 3244 Permission.permission_id)\
3241 3245 .join(
3242 3246 TargetUserGroup,
3243 3247 UserGroupUserGroupToPerm.target_user_group_id ==
3244 3248 TargetUserGroup.users_group_id)\
3245 3249 .join(
3246 3250 UserGroup,
3247 3251 UserGroupUserGroupToPerm.user_group_id ==
3248 3252 UserGroup.users_group_id)\
3249 3253 .join(
3250 3254 UserGroupMember,
3251 3255 UserGroupUserGroupToPerm.user_group_id ==
3252 3256 UserGroupMember.users_group_id)\
3253 3257 .filter(
3254 3258 UserGroupMember.user_id == user_id,
3255 3259 UserGroup.users_group_active == true())
3256 3260 if user_group_id:
3257 3261 q = q.filter(
3258 3262 UserGroupUserGroupToPerm.user_group_id == user_group_id)
3259 3263
3260 3264 return q.all()
3261 3265
3262 3266
3263 3267 class UserRepoToPerm(Base, BaseModel):
3264 3268 __tablename__ = 'repo_to_perm'
3265 3269 __table_args__ = (
3266 3270 UniqueConstraint('user_id', 'repository_id', 'permission_id'),
3267 3271 base_table_args
3268 3272 )
3269 3273
3270 3274 repo_to_perm_id = Column("repo_to_perm_id", Integer(), nullable=False, unique=True, default=None, primary_key=True)
3271 3275 user_id = Column("user_id", Integer(), ForeignKey('users.user_id'), nullable=False, unique=None, default=None)
3272 3276 permission_id = Column("permission_id", Integer(), ForeignKey('permissions.permission_id'), nullable=False, unique=None, default=None)
3273 3277 repository_id = Column("repository_id", Integer(), ForeignKey('repositories.repo_id'), nullable=False, unique=None, default=None)
3274 3278
3275 3279 user = relationship('User')
3276 3280 repository = relationship('Repository')
3277 3281 permission = relationship('Permission')
3278 3282
3279 3283 branch_perm_entry = relationship('UserToRepoBranchPermission', cascade="all, delete-orphan", lazy='joined')
3280 3284
3281 3285 @classmethod
3282 3286 def create(cls, user, repository, permission):
3283 3287 n = cls()
3284 3288 n.user = user
3285 3289 n.repository = repository
3286 3290 n.permission = permission
3287 3291 Session().add(n)
3288 3292 return n
3289 3293
3290 3294 def __unicode__(self):
3291 3295 return u'<%s => %s >' % (self.user, self.repository)
3292 3296
3293 3297
3294 3298 class UserUserGroupToPerm(Base, BaseModel):
3295 3299 __tablename__ = 'user_user_group_to_perm'
3296 3300 __table_args__ = (
3297 3301 UniqueConstraint('user_id', 'user_group_id', 'permission_id'),
3298 3302 base_table_args
3299 3303 )
3300 3304
3301 3305 user_user_group_to_perm_id = Column("user_user_group_to_perm_id", Integer(), nullable=False, unique=True, default=None, primary_key=True)
3302 3306 user_id = Column("user_id", Integer(), ForeignKey('users.user_id'), nullable=False, unique=None, default=None)
3303 3307 permission_id = Column("permission_id", Integer(), ForeignKey('permissions.permission_id'), nullable=False, unique=None, default=None)
3304 3308 user_group_id = Column("user_group_id", Integer(), ForeignKey('users_groups.users_group_id'), nullable=False, unique=None, default=None)
3305 3309
3306 3310 user = relationship('User')
3307 3311 user_group = relationship('UserGroup')
3308 3312 permission = relationship('Permission')
3309 3313
3310 3314 @classmethod
3311 3315 def create(cls, user, user_group, permission):
3312 3316 n = cls()
3313 3317 n.user = user
3314 3318 n.user_group = user_group
3315 3319 n.permission = permission
3316 3320 Session().add(n)
3317 3321 return n
3318 3322
3319 3323 def __unicode__(self):
3320 3324 return u'<%s => %s >' % (self.user, self.user_group)
3321 3325
3322 3326
3323 3327 class UserToPerm(Base, BaseModel):
3324 3328 __tablename__ = 'user_to_perm'
3325 3329 __table_args__ = (
3326 3330 UniqueConstraint('user_id', 'permission_id'),
3327 3331 base_table_args
3328 3332 )
3329 3333
3330 3334 user_to_perm_id = Column("user_to_perm_id", Integer(), nullable=False, unique=True, default=None, primary_key=True)
3331 3335 user_id = Column("user_id", Integer(), ForeignKey('users.user_id'), nullable=False, unique=None, default=None)
3332 3336 permission_id = Column("permission_id", Integer(), ForeignKey('permissions.permission_id'), nullable=False, unique=None, default=None)
3333 3337
3334 3338 user = relationship('User')
3335 3339 permission = relationship('Permission', lazy='joined')
3336 3340
3337 3341 def __unicode__(self):
3338 3342 return u'<%s => %s >' % (self.user, self.permission)
3339 3343
3340 3344
3341 3345 class UserGroupRepoToPerm(Base, BaseModel):
3342 3346 __tablename__ = 'users_group_repo_to_perm'
3343 3347 __table_args__ = (
3344 3348 UniqueConstraint('repository_id', 'users_group_id', 'permission_id'),
3345 3349 base_table_args
3346 3350 )
3347 3351
3348 3352 users_group_to_perm_id = Column("users_group_to_perm_id", Integer(), nullable=False, unique=True, default=None, primary_key=True)
3349 3353 users_group_id = Column("users_group_id", Integer(), ForeignKey('users_groups.users_group_id'), nullable=False, unique=None, default=None)
3350 3354 permission_id = Column("permission_id", Integer(), ForeignKey('permissions.permission_id'), nullable=False, unique=None, default=None)
3351 3355 repository_id = Column("repository_id", Integer(), ForeignKey('repositories.repo_id'), nullable=False, unique=None, default=None)
3352 3356
3353 3357 users_group = relationship('UserGroup')
3354 3358 permission = relationship('Permission')
3355 3359 repository = relationship('Repository')
3356 3360 user_group_branch_perms = relationship('UserGroupToRepoBranchPermission', cascade='all')
3357 3361
3358 3362 @classmethod
3359 3363 def create(cls, users_group, repository, permission):
3360 3364 n = cls()
3361 3365 n.users_group = users_group
3362 3366 n.repository = repository
3363 3367 n.permission = permission
3364 3368 Session().add(n)
3365 3369 return n
3366 3370
3367 3371 def __unicode__(self):
3368 3372 return u'<UserGroupRepoToPerm:%s => %s >' % (self.users_group, self.repository)
3369 3373
3370 3374
3371 3375 class UserGroupUserGroupToPerm(Base, BaseModel):
3372 3376 __tablename__ = 'user_group_user_group_to_perm'
3373 3377 __table_args__ = (
3374 3378 UniqueConstraint('target_user_group_id', 'user_group_id', 'permission_id'),
3375 3379 CheckConstraint('target_user_group_id != user_group_id'),
3376 3380 base_table_args
3377 3381 )
3378 3382
3379 3383 user_group_user_group_to_perm_id = Column("user_group_user_group_to_perm_id", Integer(), nullable=False, unique=True, default=None, primary_key=True)
3380 3384 target_user_group_id = Column("target_user_group_id", Integer(), ForeignKey('users_groups.users_group_id'), nullable=False, unique=None, default=None)
3381 3385 permission_id = Column("permission_id", Integer(), ForeignKey('permissions.permission_id'), nullable=False, unique=None, default=None)
3382 3386 user_group_id = Column("user_group_id", Integer(), ForeignKey('users_groups.users_group_id'), nullable=False, unique=None, default=None)
3383 3387
3384 3388 target_user_group = relationship('UserGroup', primaryjoin='UserGroupUserGroupToPerm.target_user_group_id==UserGroup.users_group_id')
3385 3389 user_group = relationship('UserGroup', primaryjoin='UserGroupUserGroupToPerm.user_group_id==UserGroup.users_group_id')
3386 3390 permission = relationship('Permission')
3387 3391
3388 3392 @classmethod
3389 3393 def create(cls, target_user_group, user_group, permission):
3390 3394 n = cls()
3391 3395 n.target_user_group = target_user_group
3392 3396 n.user_group = user_group
3393 3397 n.permission = permission
3394 3398 Session().add(n)
3395 3399 return n
3396 3400
3397 3401 def __unicode__(self):
3398 3402 return u'<UserGroupUserGroup:%s => %s >' % (self.target_user_group, self.user_group)
3399 3403
3400 3404
3401 3405 class UserGroupToPerm(Base, BaseModel):
3402 3406 __tablename__ = 'users_group_to_perm'
3403 3407 __table_args__ = (
3404 3408 UniqueConstraint('users_group_id', 'permission_id',),
3405 3409 base_table_args
3406 3410 )
3407 3411
3408 3412 users_group_to_perm_id = Column("users_group_to_perm_id", Integer(), nullable=False, unique=True, default=None, primary_key=True)
3409 3413 users_group_id = Column("users_group_id", Integer(), ForeignKey('users_groups.users_group_id'), nullable=False, unique=None, default=None)
3410 3414 permission_id = Column("permission_id", Integer(), ForeignKey('permissions.permission_id'), nullable=False, unique=None, default=None)
3411 3415
3412 3416 users_group = relationship('UserGroup')
3413 3417 permission = relationship('Permission')
3414 3418
3415 3419
3416 3420 class UserRepoGroupToPerm(Base, BaseModel):
3417 3421 __tablename__ = 'user_repo_group_to_perm'
3418 3422 __table_args__ = (
3419 3423 UniqueConstraint('user_id', 'group_id', 'permission_id'),
3420 3424 base_table_args
3421 3425 )
3422 3426
3423 3427 group_to_perm_id = Column("group_to_perm_id", Integer(), nullable=False, unique=True, default=None, primary_key=True)
3424 3428 user_id = Column("user_id", Integer(), ForeignKey('users.user_id'), nullable=False, unique=None, default=None)
3425 3429 group_id = Column("group_id", Integer(), ForeignKey('groups.group_id'), nullable=False, unique=None, default=None)
3426 3430 permission_id = Column("permission_id", Integer(), ForeignKey('permissions.permission_id'), nullable=False, unique=None, default=None)
3427 3431
3428 3432 user = relationship('User')
3429 3433 group = relationship('RepoGroup')
3430 3434 permission = relationship('Permission')
3431 3435
3432 3436 @classmethod
3433 3437 def create(cls, user, repository_group, permission):
3434 3438 n = cls()
3435 3439 n.user = user
3436 3440 n.group = repository_group
3437 3441 n.permission = permission
3438 3442 Session().add(n)
3439 3443 return n
3440 3444
3441 3445
3442 3446 class UserGroupRepoGroupToPerm(Base, BaseModel):
3443 3447 __tablename__ = 'users_group_repo_group_to_perm'
3444 3448 __table_args__ = (
3445 3449 UniqueConstraint('users_group_id', 'group_id'),
3446 3450 base_table_args
3447 3451 )
3448 3452
3449 3453 users_group_repo_group_to_perm_id = Column("users_group_repo_group_to_perm_id", Integer(), nullable=False, unique=True, default=None, primary_key=True)
3450 3454 users_group_id = Column("users_group_id", Integer(), ForeignKey('users_groups.users_group_id'), nullable=False, unique=None, default=None)
3451 3455 group_id = Column("group_id", Integer(), ForeignKey('groups.group_id'), nullable=False, unique=None, default=None)
3452 3456 permission_id = Column("permission_id", Integer(), ForeignKey('permissions.permission_id'), nullable=False, unique=None, default=None)
3453 3457
3454 3458 users_group = relationship('UserGroup')
3455 3459 permission = relationship('Permission')
3456 3460 group = relationship('RepoGroup')
3457 3461
3458 3462 @classmethod
3459 3463 def create(cls, user_group, repository_group, permission):
3460 3464 n = cls()
3461 3465 n.users_group = user_group
3462 3466 n.group = repository_group
3463 3467 n.permission = permission
3464 3468 Session().add(n)
3465 3469 return n
3466 3470
3467 3471 def __unicode__(self):
3468 3472 return u'<UserGroupRepoGroupToPerm:%s => %s >' % (self.users_group, self.group)
3469 3473
3470 3474
3471 3475 class Statistics(Base, BaseModel):
3472 3476 __tablename__ = 'statistics'
3473 3477 __table_args__ = (
3474 3478 base_table_args
3475 3479 )
3476 3480
3477 3481 stat_id = Column("stat_id", Integer(), nullable=False, unique=True, default=None, primary_key=True)
3478 3482 repository_id = Column("repository_id", Integer(), ForeignKey('repositories.repo_id'), nullable=False, unique=True, default=None)
3479 3483 stat_on_revision = Column("stat_on_revision", Integer(), nullable=False)
3480 3484 commit_activity = Column("commit_activity", LargeBinary(1000000), nullable=False)#JSON data
3481 3485 commit_activity_combined = Column("commit_activity_combined", LargeBinary(), nullable=False)#JSON data
3482 3486 languages = Column("languages", LargeBinary(1000000), nullable=False)#JSON data
3483 3487
3484 3488 repository = relationship('Repository', single_parent=True)
3485 3489
3486 3490
3487 3491 class UserFollowing(Base, BaseModel):
3488 3492 __tablename__ = 'user_followings'
3489 3493 __table_args__ = (
3490 3494 UniqueConstraint('user_id', 'follows_repository_id'),
3491 3495 UniqueConstraint('user_id', 'follows_user_id'),
3492 3496 base_table_args
3493 3497 )
3494 3498
3495 3499 user_following_id = Column("user_following_id", Integer(), nullable=False, unique=True, default=None, primary_key=True)
3496 3500 user_id = Column("user_id", Integer(), ForeignKey('users.user_id'), nullable=False, unique=None, default=None)
3497 3501 follows_repo_id = Column("follows_repository_id", Integer(), ForeignKey('repositories.repo_id'), nullable=True, unique=None, default=None)
3498 3502 follows_user_id = Column("follows_user_id", Integer(), ForeignKey('users.user_id'), nullable=True, unique=None, default=None)
3499 3503 follows_from = Column('follows_from', DateTime(timezone=False), nullable=True, unique=None, default=datetime.datetime.now)
3500 3504
3501 3505 user = relationship('User', primaryjoin='User.user_id==UserFollowing.user_id')
3502 3506
3503 3507 follows_user = relationship('User', primaryjoin='User.user_id==UserFollowing.follows_user_id')
3504 3508 follows_repository = relationship('Repository', order_by='Repository.repo_name')
3505 3509
3506 3510 @classmethod
3507 3511 def get_repo_followers(cls, repo_id):
3508 3512 return cls.query().filter(cls.follows_repo_id == repo_id)
3509 3513
3510 3514
3511 3515 class CacheKey(Base, BaseModel):
3512 3516 __tablename__ = 'cache_invalidation'
3513 3517 __table_args__ = (
3514 3518 UniqueConstraint('cache_key'),
3515 3519 Index('key_idx', 'cache_key'),
3516 3520 base_table_args,
3517 3521 )
3518 3522
3519 3523 CACHE_TYPE_FEED = 'FEED'
3520 3524
3521 3525 # namespaces used to register process/thread aware caches
3522 3526 REPO_INVALIDATION_NAMESPACE = 'repo_cache:{repo_id}'
3523 3527 SETTINGS_INVALIDATION_NAMESPACE = 'system_settings'
3524 3528
3525 3529 cache_id = Column("cache_id", Integer(), nullable=False, unique=True, default=None, primary_key=True)
3526 3530 cache_key = Column("cache_key", String(255), nullable=True, unique=None, default=None)
3527 3531 cache_args = Column("cache_args", String(255), nullable=True, unique=None, default=None)
3528 3532 cache_state_uid = Column("cache_state_uid", String(255), nullable=True, unique=None, default=None)
3529 3533 cache_active = Column("cache_active", Boolean(), nullable=True, unique=None, default=False)
3530 3534
3531 3535 def __init__(self, cache_key, cache_args='', cache_state_uid=None):
3532 3536 self.cache_key = cache_key
3533 3537 self.cache_args = cache_args
3534 3538 self.cache_active = False
3535 3539 # first key should be same for all entries, since all workers should share it
3536 3540 self.cache_state_uid = cache_state_uid or self.generate_new_state_uid()
3537 3541
3538 3542 def __unicode__(self):
3539 3543 return u"<%s('%s:%s[%s]')>" % (
3540 3544 self.__class__.__name__,
3541 3545 self.cache_id, self.cache_key, self.cache_active)
3542 3546
3543 3547 def _cache_key_partition(self):
3544 3548 prefix, repo_name, suffix = self.cache_key.partition(self.cache_args)
3545 3549 return prefix, repo_name, suffix
3546 3550
3547 3551 def get_prefix(self):
3548 3552 """
3549 3553 Try to extract prefix from existing cache key. The key could consist
3550 3554 of prefix, repo_name, suffix
3551 3555 """
3552 3556 # this returns prefix, repo_name, suffix
3553 3557 return self._cache_key_partition()[0]
3554 3558
3555 3559 def get_suffix(self):
3556 3560 """
3557 3561 get suffix that might have been used in _get_cache_key to
3558 3562 generate self.cache_key. Only used for informational purposes
3559 3563 in repo_edit.mako.
3560 3564 """
3561 3565 # prefix, repo_name, suffix
3562 3566 return self._cache_key_partition()[2]
3563 3567
3564 3568 @classmethod
3565 3569 def generate_new_state_uid(cls, based_on=None):
3566 3570 if based_on:
3567 3571 return str(uuid.uuid5(uuid.NAMESPACE_URL, safe_str(based_on)))
3568 3572 else:
3569 3573 return str(uuid.uuid4())
3570 3574
3571 3575 @classmethod
3572 3576 def delete_all_cache(cls):
3573 3577 """
3574 3578 Delete all cache keys from database.
3575 3579 Should only be run when all instances are down and all entries
3576 3580 thus stale.
3577 3581 """
3578 3582 cls.query().delete()
3579 3583 Session().commit()
3580 3584
3581 3585 @classmethod
3582 3586 def set_invalidate(cls, cache_uid, delete=False):
3583 3587 """
3584 3588 Mark all caches of a repo as invalid in the database.
3585 3589 """
3586 3590
3587 3591 try:
3588 3592 qry = Session().query(cls).filter(cls.cache_args == cache_uid)
3589 3593 if delete:
3590 3594 qry.delete()
3591 3595 log.debug('cache objects deleted for cache args %s',
3592 3596 safe_str(cache_uid))
3593 3597 else:
3594 3598 qry.update({"cache_active": False,
3595 3599 "cache_state_uid": cls.generate_new_state_uid()})
3596 3600 log.debug('cache objects marked as invalid for cache args %s',
3597 3601 safe_str(cache_uid))
3598 3602
3599 3603 Session().commit()
3600 3604 except Exception:
3601 3605 log.exception(
3602 3606 'Cache key invalidation failed for cache args %s',
3603 3607 safe_str(cache_uid))
3604 3608 Session().rollback()
3605 3609
3606 3610 @classmethod
3607 3611 def get_active_cache(cls, cache_key):
3608 3612 inv_obj = cls.query().filter(cls.cache_key == cache_key).scalar()
3609 3613 if inv_obj:
3610 3614 return inv_obj
3611 3615 return None
3612 3616
3613 3617 @classmethod
3614 3618 def get_namespace_map(cls, namespace):
3615 3619 return {
3616 3620 x.cache_key: x
3617 3621 for x in cls.query().filter(cls.cache_args == namespace)}
3618 3622
3619 3623
3620 3624 class ChangesetComment(Base, BaseModel):
3621 3625 __tablename__ = 'changeset_comments'
3622 3626 __table_args__ = (
3623 3627 Index('cc_revision_idx', 'revision'),
3624 3628 base_table_args,
3625 3629 )
3626 3630
3627 3631 COMMENT_OUTDATED = u'comment_outdated'
3628 3632 COMMENT_TYPE_NOTE = u'note'
3629 3633 COMMENT_TYPE_TODO = u'todo'
3630 3634 COMMENT_TYPES = [COMMENT_TYPE_NOTE, COMMENT_TYPE_TODO]
3631 3635
3632 3636 comment_id = Column('comment_id', Integer(), nullable=False, primary_key=True)
3633 3637 repo_id = Column('repo_id', Integer(), ForeignKey('repositories.repo_id'), nullable=False)
3634 3638 revision = Column('revision', String(40), nullable=True)
3635 3639 pull_request_id = Column("pull_request_id", Integer(), ForeignKey('pull_requests.pull_request_id'), nullable=True)
3636 3640 pull_request_version_id = Column("pull_request_version_id", Integer(), ForeignKey('pull_request_versions.pull_request_version_id'), nullable=True)
3637 3641 line_no = Column('line_no', Unicode(10), nullable=True)
3638 3642 hl_lines = Column('hl_lines', Unicode(512), nullable=True)
3639 3643 f_path = Column('f_path', Unicode(1000), nullable=True)
3640 3644 user_id = Column('user_id', Integer(), ForeignKey('users.user_id'), nullable=False)
3641 3645 text = Column('text', UnicodeText().with_variant(UnicodeText(25000), 'mysql'), nullable=False)
3642 3646 created_on = Column('created_on', DateTime(timezone=False), nullable=False, default=datetime.datetime.now)
3643 3647 modified_at = Column('modified_at', DateTime(timezone=False), nullable=False, default=datetime.datetime.now)
3644 3648 renderer = Column('renderer', Unicode(64), nullable=True)
3645 3649 display_state = Column('display_state', Unicode(128), nullable=True)
3646 3650
3647 3651 comment_type = Column('comment_type', Unicode(128), nullable=True, default=COMMENT_TYPE_NOTE)
3648 3652 resolved_comment_id = Column('resolved_comment_id', Integer(), ForeignKey('changeset_comments.comment_id'), nullable=True)
3649 3653
3650 3654 resolved_comment = relationship('ChangesetComment', remote_side=comment_id, back_populates='resolved_by')
3651 3655 resolved_by = relationship('ChangesetComment', back_populates='resolved_comment')
3652 3656
3653 3657 author = relationship('User', lazy='joined')
3654 3658 repo = relationship('Repository')
3655 3659 status_change = relationship('ChangesetStatus', cascade="all, delete-orphan", lazy='joined')
3656 3660 pull_request = relationship('PullRequest', lazy='joined')
3657 3661 pull_request_version = relationship('PullRequestVersion')
3658 3662
3659 3663 @classmethod
3660 3664 def get_users(cls, revision=None, pull_request_id=None):
3661 3665 """
3662 3666 Returns user associated with this ChangesetComment. ie those
3663 3667 who actually commented
3664 3668
3665 3669 :param cls:
3666 3670 :param revision:
3667 3671 """
3668 3672 q = Session().query(User)\
3669 3673 .join(ChangesetComment.author)
3670 3674 if revision:
3671 3675 q = q.filter(cls.revision == revision)
3672 3676 elif pull_request_id:
3673 3677 q = q.filter(cls.pull_request_id == pull_request_id)
3674 3678 return q.all()
3675 3679
3676 3680 @classmethod
3677 3681 def get_index_from_version(cls, pr_version, versions):
3678 3682 num_versions = [x.pull_request_version_id for x in versions]
3679 3683 try:
3680 3684 return num_versions.index(pr_version) +1
3681 3685 except (IndexError, ValueError):
3682 3686 return
3683 3687
3684 3688 @property
3685 3689 def outdated(self):
3686 3690 return self.display_state == self.COMMENT_OUTDATED
3687 3691
3688 3692 def outdated_at_version(self, version):
3689 3693 """
3690 3694 Checks if comment is outdated for given pull request version
3691 3695 """
3692 3696 return self.outdated and self.pull_request_version_id != version
3693 3697
3694 3698 def older_than_version(self, version):
3695 3699 """
3696 3700 Checks if comment is made from previous version than given
3697 3701 """
3698 3702 if version is None:
3699 3703 return self.pull_request_version_id is not None
3700 3704
3701 3705 return self.pull_request_version_id < version
3702 3706
3703 3707 @property
3704 3708 def resolved(self):
3705 3709 return self.resolved_by[0] if self.resolved_by else None
3706 3710
3707 3711 @property
3708 3712 def is_todo(self):
3709 3713 return self.comment_type == self.COMMENT_TYPE_TODO
3710 3714
3711 3715 @property
3712 3716 def is_inline(self):
3713 3717 return self.line_no and self.f_path
3714 3718
3715 3719 def get_index_version(self, versions):
3716 3720 return self.get_index_from_version(
3717 3721 self.pull_request_version_id, versions)
3718 3722
3719 3723 def __repr__(self):
3720 3724 if self.comment_id:
3721 3725 return '<DB:Comment #%s>' % self.comment_id
3722 3726 else:
3723 3727 return '<DB:Comment at %#x>' % id(self)
3724 3728
3725 3729 def get_api_data(self):
3726 3730 comment = self
3727 3731 data = {
3728 3732 'comment_id': comment.comment_id,
3729 3733 'comment_type': comment.comment_type,
3730 3734 'comment_text': comment.text,
3731 3735 'comment_status': comment.status_change,
3732 3736 'comment_f_path': comment.f_path,
3733 3737 'comment_lineno': comment.line_no,
3734 3738 'comment_author': comment.author,
3735 3739 'comment_created_on': comment.created_on,
3736 3740 'comment_resolved_by': self.resolved
3737 3741 }
3738 3742 return data
3739 3743
3740 3744 def __json__(self):
3741 3745 data = dict()
3742 3746 data.update(self.get_api_data())
3743 3747 return data
3744 3748
3745 3749
3746 3750 class ChangesetStatus(Base, BaseModel):
3747 3751 __tablename__ = 'changeset_statuses'
3748 3752 __table_args__ = (
3749 3753 Index('cs_revision_idx', 'revision'),
3750 3754 Index('cs_version_idx', 'version'),
3751 3755 UniqueConstraint('repo_id', 'revision', 'version'),
3752 3756 base_table_args
3753 3757 )
3754 3758
3755 3759 STATUS_NOT_REVIEWED = DEFAULT = 'not_reviewed'
3756 3760 STATUS_APPROVED = 'approved'
3757 3761 STATUS_REJECTED = 'rejected'
3758 3762 STATUS_UNDER_REVIEW = 'under_review'
3759 3763
3760 3764 STATUSES = [
3761 3765 (STATUS_NOT_REVIEWED, _("Not Reviewed")), # (no icon) and default
3762 3766 (STATUS_APPROVED, _("Approved")),
3763 3767 (STATUS_REJECTED, _("Rejected")),
3764 3768 (STATUS_UNDER_REVIEW, _("Under Review")),
3765 3769 ]
3766 3770
3767 3771 changeset_status_id = Column('changeset_status_id', Integer(), nullable=False, primary_key=True)
3768 3772 repo_id = Column('repo_id', Integer(), ForeignKey('repositories.repo_id'), nullable=False)
3769 3773 user_id = Column("user_id", Integer(), ForeignKey('users.user_id'), nullable=False, unique=None)
3770 3774 revision = Column('revision', String(40), nullable=False)
3771 3775 status = Column('status', String(128), nullable=False, default=DEFAULT)
3772 3776 changeset_comment_id = Column('changeset_comment_id', Integer(), ForeignKey('changeset_comments.comment_id'))
3773 3777 modified_at = Column('modified_at', DateTime(), nullable=False, default=datetime.datetime.now)
3774 3778 version = Column('version', Integer(), nullable=False, default=0)
3775 3779 pull_request_id = Column("pull_request_id", Integer(), ForeignKey('pull_requests.pull_request_id'), nullable=True)
3776 3780
3777 3781 author = relationship('User', lazy='joined')
3778 3782 repo = relationship('Repository')
3779 3783 comment = relationship('ChangesetComment', lazy='joined')
3780 3784 pull_request = relationship('PullRequest', lazy='joined')
3781 3785
3782 3786 def __unicode__(self):
3783 3787 return u"<%s('%s[v%s]:%s')>" % (
3784 3788 self.__class__.__name__,
3785 3789 self.status, self.version, self.author
3786 3790 )
3787 3791
3788 3792 @classmethod
3789 3793 def get_status_lbl(cls, value):
3790 3794 return dict(cls.STATUSES).get(value)
3791 3795
3792 3796 @property
3793 3797 def status_lbl(self):
3794 3798 return ChangesetStatus.get_status_lbl(self.status)
3795 3799
3796 3800 def get_api_data(self):
3797 3801 status = self
3798 3802 data = {
3799 3803 'status_id': status.changeset_status_id,
3800 3804 'status': status.status,
3801 3805 }
3802 3806 return data
3803 3807
3804 3808 def __json__(self):
3805 3809 data = dict()
3806 3810 data.update(self.get_api_data())
3807 3811 return data
3808 3812
3809 3813
3810 3814 class _SetState(object):
3811 3815 """
3812 3816 Context processor allowing changing state for sensitive operation such as
3813 3817 pull request update or merge
3814 3818 """
3815 3819
3816 3820 def __init__(self, pull_request, pr_state, back_state=None):
3817 3821 self._pr = pull_request
3818 3822 self._org_state = back_state or pull_request.pull_request_state
3819 3823 self._pr_state = pr_state
3820 3824 self._current_state = None
3821 3825
3822 3826 def __enter__(self):
3823 3827 log.debug('StateLock: entering set state context, setting state to: `%s`',
3824 3828 self._pr_state)
3825 3829 self.set_pr_state(self._pr_state)
3826 3830 return self
3827 3831
3828 3832 def __exit__(self, exc_type, exc_val, exc_tb):
3829 3833 if exc_val is not None:
3830 3834 log.error(traceback.format_exc(exc_tb))
3831 3835 return None
3832 3836
3833 3837 self.set_pr_state(self._org_state)
3834 3838 log.debug('StateLock: exiting set state context, setting state to: `%s`',
3835 3839 self._org_state)
3836 3840 @property
3837 3841 def state(self):
3838 3842 return self._current_state
3839 3843
3840 3844 def set_pr_state(self, pr_state):
3841 3845 try:
3842 3846 self._pr.pull_request_state = pr_state
3843 3847 Session().add(self._pr)
3844 3848 Session().commit()
3845 3849 self._current_state = pr_state
3846 3850 except Exception:
3847 3851 log.exception('Failed to set PullRequest %s state to %s', self._pr, pr_state)
3848 3852 raise
3849 3853
3850 3854 class _PullRequestBase(BaseModel):
3851 3855 """
3852 3856 Common attributes of pull request and version entries.
3853 3857 """
3854 3858
3855 3859 # .status values
3856 3860 STATUS_NEW = u'new'
3857 3861 STATUS_OPEN = u'open'
3858 3862 STATUS_CLOSED = u'closed'
3859 3863
3860 3864 # available states
3861 3865 STATE_CREATING = u'creating'
3862 3866 STATE_UPDATING = u'updating'
3863 3867 STATE_MERGING = u'merging'
3864 3868 STATE_CREATED = u'created'
3865 3869
3866 3870 title = Column('title', Unicode(255), nullable=True)
3867 3871 description = Column(
3868 3872 'description', UnicodeText().with_variant(UnicodeText(10240), 'mysql'),
3869 3873 nullable=True)
3870 3874 description_renderer = Column('description_renderer', Unicode(64), nullable=True)
3871 3875
3872 3876 # new/open/closed status of pull request (not approve/reject/etc)
3873 3877 status = Column('status', Unicode(255), nullable=False, default=STATUS_NEW)
3874 3878 created_on = Column(
3875 3879 'created_on', DateTime(timezone=False), nullable=False,
3876 3880 default=datetime.datetime.now)
3877 3881 updated_on = Column(
3878 3882 'updated_on', DateTime(timezone=False), nullable=False,
3879 3883 default=datetime.datetime.now)
3880 3884
3881 3885 pull_request_state = Column("pull_request_state", String(255), nullable=True)
3882 3886
3883 3887 @declared_attr
3884 3888 def user_id(cls):
3885 3889 return Column(
3886 3890 "user_id", Integer(), ForeignKey('users.user_id'), nullable=False,
3887 3891 unique=None)
3888 3892
3889 3893 # 500 revisions max
3890 3894 _revisions = Column(
3891 3895 'revisions', UnicodeText().with_variant(UnicodeText(20500), 'mysql'))
3892 3896
3893 3897 @declared_attr
3894 3898 def source_repo_id(cls):
3895 3899 # TODO: dan: rename column to source_repo_id
3896 3900 return Column(
3897 3901 'org_repo_id', Integer(), ForeignKey('repositories.repo_id'),
3898 3902 nullable=False)
3899 3903
3900 3904 _source_ref = Column('org_ref', Unicode(255), nullable=False)
3901 3905
3902 3906 @hybrid_property
3903 3907 def source_ref(self):
3904 3908 return self._source_ref
3905 3909
3906 3910 @source_ref.setter
3907 3911 def source_ref(self, val):
3908 3912 parts = (val or '').split(':')
3909 3913 if len(parts) != 3:
3910 3914 raise ValueError(
3911 3915 'Invalid reference format given: {}, expected X:Y:Z'.format(val))
3912 3916 self._source_ref = safe_unicode(val)
3913 3917
3914 3918 _target_ref = Column('other_ref', Unicode(255), nullable=False)
3915 3919
3916 3920 @hybrid_property
3917 3921 def target_ref(self):
3918 3922 return self._target_ref
3919 3923
3920 3924 @target_ref.setter
3921 3925 def target_ref(self, val):
3922 3926 parts = (val or '').split(':')
3923 3927 if len(parts) != 3:
3924 3928 raise ValueError(
3925 3929 'Invalid reference format given: {}, expected X:Y:Z'.format(val))
3926 3930 self._target_ref = safe_unicode(val)
3927 3931
3928 3932 @declared_attr
3929 3933 def target_repo_id(cls):
3930 3934 # TODO: dan: rename column to target_repo_id
3931 3935 return Column(
3932 3936 'other_repo_id', Integer(), ForeignKey('repositories.repo_id'),
3933 3937 nullable=False)
3934 3938
3935 3939 _shadow_merge_ref = Column('shadow_merge_ref', Unicode(255), nullable=True)
3936 3940
3937 3941 # TODO: dan: rename column to last_merge_source_rev
3938 3942 _last_merge_source_rev = Column(
3939 3943 'last_merge_org_rev', String(40), nullable=True)
3940 3944 # TODO: dan: rename column to last_merge_target_rev
3941 3945 _last_merge_target_rev = Column(
3942 3946 'last_merge_other_rev', String(40), nullable=True)
3943 3947 _last_merge_status = Column('merge_status', Integer(), nullable=True)
3944 3948 merge_rev = Column('merge_rev', String(40), nullable=True)
3945 3949
3946 3950 reviewer_data = Column(
3947 3951 'reviewer_data_json', MutationObj.as_mutable(
3948 3952 JsonType(dialect_map=dict(mysql=UnicodeText(16384)))))
3949 3953
3950 3954 @property
3951 3955 def reviewer_data_json(self):
3952 3956 return json.dumps(self.reviewer_data)
3953 3957
3954 3958 @hybrid_property
3955 3959 def description_safe(self):
3956 3960 from rhodecode.lib import helpers as h
3957 3961 return h.escape(self.description)
3958 3962
3959 3963 @hybrid_property
3960 3964 def revisions(self):
3961 3965 return self._revisions.split(':') if self._revisions else []
3962 3966
3963 3967 @revisions.setter
3964 3968 def revisions(self, val):
3965 3969 self._revisions = u':'.join(val)
3966 3970
3967 3971 @hybrid_property
3968 3972 def last_merge_status(self):
3969 3973 return safe_int(self._last_merge_status)
3970 3974
3971 3975 @last_merge_status.setter
3972 3976 def last_merge_status(self, val):
3973 3977 self._last_merge_status = val
3974 3978
3975 3979 @declared_attr
3976 3980 def author(cls):
3977 3981 return relationship('User', lazy='joined')
3978 3982
3979 3983 @declared_attr
3980 3984 def source_repo(cls):
3981 3985 return relationship(
3982 3986 'Repository',
3983 3987 primaryjoin='%s.source_repo_id==Repository.repo_id' % cls.__name__)
3984 3988
3985 3989 @property
3986 3990 def source_ref_parts(self):
3987 3991 return self.unicode_to_reference(self.source_ref)
3988 3992
3989 3993 @declared_attr
3990 3994 def target_repo(cls):
3991 3995 return relationship(
3992 3996 'Repository',
3993 3997 primaryjoin='%s.target_repo_id==Repository.repo_id' % cls.__name__)
3994 3998
3995 3999 @property
3996 4000 def target_ref_parts(self):
3997 4001 return self.unicode_to_reference(self.target_ref)
3998 4002
3999 4003 @property
4000 4004 def shadow_merge_ref(self):
4001 4005 return self.unicode_to_reference(self._shadow_merge_ref)
4002 4006
4003 4007 @shadow_merge_ref.setter
4004 4008 def shadow_merge_ref(self, ref):
4005 4009 self._shadow_merge_ref = self.reference_to_unicode(ref)
4006 4010
4007 4011 @staticmethod
4008 4012 def unicode_to_reference(raw):
4009 4013 """
4010 4014 Convert a unicode (or string) to a reference object.
4011 4015 If unicode evaluates to False it returns None.
4012 4016 """
4013 4017 if raw:
4014 4018 refs = raw.split(':')
4015 4019 return Reference(*refs)
4016 4020 else:
4017 4021 return None
4018 4022
4019 4023 @staticmethod
4020 4024 def reference_to_unicode(ref):
4021 4025 """
4022 4026 Convert a reference object to unicode.
4023 4027 If reference is None it returns None.
4024 4028 """
4025 4029 if ref:
4026 4030 return u':'.join(ref)
4027 4031 else:
4028 4032 return None
4029 4033
4030 4034 def get_api_data(self, with_merge_state=True):
4031 4035 from rhodecode.model.pull_request import PullRequestModel
4032 4036
4033 4037 pull_request = self
4034 4038 if with_merge_state:
4035 4039 merge_status = PullRequestModel().merge_status(pull_request)
4036 4040 merge_state = {
4037 4041 'status': merge_status[0],
4038 4042 'message': safe_unicode(merge_status[1]),
4039 4043 }
4040 4044 else:
4041 4045 merge_state = {'status': 'not_available',
4042 4046 'message': 'not_available'}
4043 4047
4044 4048 merge_data = {
4045 4049 'clone_url': PullRequestModel().get_shadow_clone_url(pull_request),
4046 4050 'reference': (
4047 4051 pull_request.shadow_merge_ref._asdict()
4048 4052 if pull_request.shadow_merge_ref else None),
4049 4053 }
4050 4054
4051 4055 data = {
4052 4056 'pull_request_id': pull_request.pull_request_id,
4053 4057 'url': PullRequestModel().get_url(pull_request),
4054 4058 'title': pull_request.title,
4055 4059 'description': pull_request.description,
4056 4060 'status': pull_request.status,
4057 4061 'state': pull_request.pull_request_state,
4058 4062 'created_on': pull_request.created_on,
4059 4063 'updated_on': pull_request.updated_on,
4060 4064 'commit_ids': pull_request.revisions,
4061 4065 'review_status': pull_request.calculated_review_status(),
4062 4066 'mergeable': merge_state,
4063 4067 'source': {
4064 4068 'clone_url': pull_request.source_repo.clone_url(),
4065 4069 'repository': pull_request.source_repo.repo_name,
4066 4070 'reference': {
4067 4071 'name': pull_request.source_ref_parts.name,
4068 4072 'type': pull_request.source_ref_parts.type,
4069 4073 'commit_id': pull_request.source_ref_parts.commit_id,
4070 4074 },
4071 4075 },
4072 4076 'target': {
4073 4077 'clone_url': pull_request.target_repo.clone_url(),
4074 4078 'repository': pull_request.target_repo.repo_name,
4075 4079 'reference': {
4076 4080 'name': pull_request.target_ref_parts.name,
4077 4081 'type': pull_request.target_ref_parts.type,
4078 4082 'commit_id': pull_request.target_ref_parts.commit_id,
4079 4083 },
4080 4084 },
4081 4085 'merge': merge_data,
4082 4086 'author': pull_request.author.get_api_data(include_secrets=False,
4083 4087 details='basic'),
4084 4088 'reviewers': [
4085 4089 {
4086 4090 'user': reviewer.get_api_data(include_secrets=False,
4087 4091 details='basic'),
4088 4092 'reasons': reasons,
4089 4093 'review_status': st[0][1].status if st else 'not_reviewed',
4090 4094 }
4091 4095 for obj, reviewer, reasons, mandatory, st in
4092 4096 pull_request.reviewers_statuses()
4093 4097 ]
4094 4098 }
4095 4099
4096 4100 return data
4097 4101
4098 4102 def set_state(self, pull_request_state, final_state=None):
4099 4103 """
4100 4104 # goes from initial state to updating to initial state.
4101 4105 # initial state can be changed by specifying back_state=
4102 4106 with pull_request_obj.set_state(PullRequest.STATE_UPDATING):
4103 4107 pull_request.merge()
4104 4108
4105 4109 :param pull_request_state:
4106 4110 :param final_state:
4107 4111
4108 4112 """
4109 4113
4110 4114 return _SetState(self, pull_request_state, back_state=final_state)
4111 4115
4112 4116
4113 4117 class PullRequest(Base, _PullRequestBase):
4114 4118 __tablename__ = 'pull_requests'
4115 4119 __table_args__ = (
4116 4120 base_table_args,
4117 4121 )
4118 4122
4119 4123 pull_request_id = Column(
4120 4124 'pull_request_id', Integer(), nullable=False, primary_key=True)
4121 4125
4122 4126 def __repr__(self):
4123 4127 if self.pull_request_id:
4124 4128 return '<DB:PullRequest #%s>' % self.pull_request_id
4125 4129 else:
4126 4130 return '<DB:PullRequest at %#x>' % id(self)
4127 4131
4128 4132 reviewers = relationship('PullRequestReviewers',
4129 4133 cascade="all, delete-orphan")
4130 4134 statuses = relationship('ChangesetStatus',
4131 4135 cascade="all, delete-orphan")
4132 4136 comments = relationship('ChangesetComment',
4133 4137 cascade="all, delete-orphan")
4134 4138 versions = relationship('PullRequestVersion',
4135 4139 cascade="all, delete-orphan",
4136 4140 lazy='dynamic')
4137 4141
4138 4142 @classmethod
4139 4143 def get_pr_display_object(cls, pull_request_obj, org_pull_request_obj,
4140 4144 internal_methods=None):
4141 4145
4142 4146 class PullRequestDisplay(object):
4143 4147 """
4144 4148 Special object wrapper for showing PullRequest data via Versions
4145 4149 It mimics PR object as close as possible. This is read only object
4146 4150 just for display
4147 4151 """
4148 4152
4149 4153 def __init__(self, attrs, internal=None):
4150 4154 self.attrs = attrs
4151 4155 # internal have priority over the given ones via attrs
4152 4156 self.internal = internal or ['versions']
4153 4157
4154 4158 def __getattr__(self, item):
4155 4159 if item in self.internal:
4156 4160 return getattr(self, item)
4157 4161 try:
4158 4162 return self.attrs[item]
4159 4163 except KeyError:
4160 4164 raise AttributeError(
4161 4165 '%s object has no attribute %s' % (self, item))
4162 4166
4163 4167 def __repr__(self):
4164 4168 return '<DB:PullRequestDisplay #%s>' % self.attrs.get('pull_request_id')
4165 4169
4166 4170 def versions(self):
4167 4171 return pull_request_obj.versions.order_by(
4168 4172 PullRequestVersion.pull_request_version_id).all()
4169 4173
4170 4174 def is_closed(self):
4171 4175 return pull_request_obj.is_closed()
4172 4176
4173 4177 @property
4174 4178 def pull_request_version_id(self):
4175 4179 return getattr(pull_request_obj, 'pull_request_version_id', None)
4176 4180
4177 4181 attrs = StrictAttributeDict(pull_request_obj.get_api_data(with_merge_state=False))
4178 4182
4179 4183 attrs.author = StrictAttributeDict(
4180 4184 pull_request_obj.author.get_api_data())
4181 4185 if pull_request_obj.target_repo:
4182 4186 attrs.target_repo = StrictAttributeDict(
4183 4187 pull_request_obj.target_repo.get_api_data())
4184 4188 attrs.target_repo.clone_url = pull_request_obj.target_repo.clone_url
4185 4189
4186 4190 if pull_request_obj.source_repo:
4187 4191 attrs.source_repo = StrictAttributeDict(
4188 4192 pull_request_obj.source_repo.get_api_data())
4189 4193 attrs.source_repo.clone_url = pull_request_obj.source_repo.clone_url
4190 4194
4191 4195 attrs.source_ref_parts = pull_request_obj.source_ref_parts
4192 4196 attrs.target_ref_parts = pull_request_obj.target_ref_parts
4193 4197 attrs.revisions = pull_request_obj.revisions
4194 4198
4195 4199 attrs.shadow_merge_ref = org_pull_request_obj.shadow_merge_ref
4196 4200 attrs.reviewer_data = org_pull_request_obj.reviewer_data
4197 4201 attrs.reviewer_data_json = org_pull_request_obj.reviewer_data_json
4198 4202
4199 4203 return PullRequestDisplay(attrs, internal=internal_methods)
4200 4204
4201 4205 def is_closed(self):
4202 4206 return self.status == self.STATUS_CLOSED
4203 4207
4204 4208 def __json__(self):
4205 4209 return {
4206 4210 'revisions': self.revisions,
4207 4211 }
4208 4212
4209 4213 def calculated_review_status(self):
4210 4214 from rhodecode.model.changeset_status import ChangesetStatusModel
4211 4215 return ChangesetStatusModel().calculated_review_status(self)
4212 4216
4213 4217 def reviewers_statuses(self):
4214 4218 from rhodecode.model.changeset_status import ChangesetStatusModel
4215 4219 return ChangesetStatusModel().reviewers_statuses(self)
4216 4220
4217 4221 @property
4218 4222 def workspace_id(self):
4219 4223 from rhodecode.model.pull_request import PullRequestModel
4220 4224 return PullRequestModel()._workspace_id(self)
4221 4225
4222 4226 def get_shadow_repo(self):
4223 4227 workspace_id = self.workspace_id
4224 4228 shadow_repository_path = self.target_repo.get_shadow_repository_path(workspace_id)
4225 4229 if os.path.isdir(shadow_repository_path):
4226 4230 vcs_obj = self.target_repo.scm_instance()
4227 4231 return vcs_obj.get_shadow_instance(shadow_repository_path)
4228 4232
4229 4233
4230 4234 class PullRequestVersion(Base, _PullRequestBase):
4231 4235 __tablename__ = 'pull_request_versions'
4232 4236 __table_args__ = (
4233 4237 base_table_args,
4234 4238 )
4235 4239
4236 4240 pull_request_version_id = Column(
4237 4241 'pull_request_version_id', Integer(), nullable=False, primary_key=True)
4238 4242 pull_request_id = Column(
4239 4243 'pull_request_id', Integer(),
4240 4244 ForeignKey('pull_requests.pull_request_id'), nullable=False)
4241 4245 pull_request = relationship('PullRequest')
4242 4246
4243 4247 def __repr__(self):
4244 4248 if self.pull_request_version_id:
4245 4249 return '<DB:PullRequestVersion #%s>' % self.pull_request_version_id
4246 4250 else:
4247 4251 return '<DB:PullRequestVersion at %#x>' % id(self)
4248 4252
4249 4253 @property
4250 4254 def reviewers(self):
4251 4255 return self.pull_request.reviewers
4252 4256
4253 4257 @property
4254 4258 def versions(self):
4255 4259 return self.pull_request.versions
4256 4260
4257 4261 def is_closed(self):
4258 4262 # calculate from original
4259 4263 return self.pull_request.status == self.STATUS_CLOSED
4260 4264
4261 4265 def calculated_review_status(self):
4262 4266 return self.pull_request.calculated_review_status()
4263 4267
4264 4268 def reviewers_statuses(self):
4265 4269 return self.pull_request.reviewers_statuses()
4266 4270
4267 4271
4268 4272 class PullRequestReviewers(Base, BaseModel):
4269 4273 __tablename__ = 'pull_request_reviewers'
4270 4274 __table_args__ = (
4271 4275 base_table_args,
4272 4276 )
4273 4277
4274 4278 @hybrid_property
4275 4279 def reasons(self):
4276 4280 if not self._reasons:
4277 4281 return []
4278 4282 return self._reasons
4279 4283
4280 4284 @reasons.setter
4281 4285 def reasons(self, val):
4282 4286 val = val or []
4283 4287 if any(not isinstance(x, compat.string_types) for x in val):
4284 4288 raise Exception('invalid reasons type, must be list of strings')
4285 4289 self._reasons = val
4286 4290
4287 4291 pull_requests_reviewers_id = Column(
4288 4292 'pull_requests_reviewers_id', Integer(), nullable=False,
4289 4293 primary_key=True)
4290 4294 pull_request_id = Column(
4291 4295 "pull_request_id", Integer(),
4292 4296 ForeignKey('pull_requests.pull_request_id'), nullable=False)
4293 4297 user_id = Column(
4294 4298 "user_id", Integer(), ForeignKey('users.user_id'), nullable=True)
4295 4299 _reasons = Column(
4296 4300 'reason', MutationList.as_mutable(
4297 4301 JsonType('list', dialect_map=dict(mysql=UnicodeText(16384)))))
4298 4302
4299 4303 mandatory = Column("mandatory", Boolean(), nullable=False, default=False)
4300 4304 user = relationship('User')
4301 4305 pull_request = relationship('PullRequest')
4302 4306
4303 4307 rule_data = Column(
4304 4308 'rule_data_json',
4305 4309 JsonType(dialect_map=dict(mysql=UnicodeText(16384))))
4306 4310
4307 4311 def rule_user_group_data(self):
4308 4312 """
4309 4313 Returns the voting user group rule data for this reviewer
4310 4314 """
4311 4315
4312 4316 if self.rule_data and 'vote_rule' in self.rule_data:
4313 4317 user_group_data = {}
4314 4318 if 'rule_user_group_entry_id' in self.rule_data:
4315 4319 # means a group with voting rules !
4316 4320 user_group_data['id'] = self.rule_data['rule_user_group_entry_id']
4317 4321 user_group_data['name'] = self.rule_data['rule_name']
4318 4322 user_group_data['vote_rule'] = self.rule_data['vote_rule']
4319 4323
4320 4324 return user_group_data
4321 4325
4322 4326 def __unicode__(self):
4323 4327 return u"<%s('id:%s')>" % (self.__class__.__name__,
4324 4328 self.pull_requests_reviewers_id)
4325 4329
4326 4330
4327 4331 class Notification(Base, BaseModel):
4328 4332 __tablename__ = 'notifications'
4329 4333 __table_args__ = (
4330 4334 Index('notification_type_idx', 'type'),
4331 4335 base_table_args,
4332 4336 )
4333 4337
4334 4338 TYPE_CHANGESET_COMMENT = u'cs_comment'
4335 4339 TYPE_MESSAGE = u'message'
4336 4340 TYPE_MENTION = u'mention'
4337 4341 TYPE_REGISTRATION = u'registration'
4338 4342 TYPE_PULL_REQUEST = u'pull_request'
4339 4343 TYPE_PULL_REQUEST_COMMENT = u'pull_request_comment'
4340 4344
4341 4345 notification_id = Column('notification_id', Integer(), nullable=False, primary_key=True)
4342 4346 subject = Column('subject', Unicode(512), nullable=True)
4343 4347 body = Column('body', UnicodeText().with_variant(UnicodeText(50000), 'mysql'), nullable=True)
4344 4348 created_by = Column("created_by", Integer(), ForeignKey('users.user_id'), nullable=True)
4345 4349 created_on = Column('created_on', DateTime(timezone=False), nullable=False, default=datetime.datetime.now)
4346 4350 type_ = Column('type', Unicode(255))
4347 4351
4348 4352 created_by_user = relationship('User')
4349 4353 notifications_to_users = relationship('UserNotification', lazy='joined',
4350 4354 cascade="all, delete-orphan")
4351 4355
4352 4356 @property
4353 4357 def recipients(self):
4354 4358 return [x.user for x in UserNotification.query()\
4355 4359 .filter(UserNotification.notification == self)\
4356 4360 .order_by(UserNotification.user_id.asc()).all()]
4357 4361
4358 4362 @classmethod
4359 4363 def create(cls, created_by, subject, body, recipients, type_=None):
4360 4364 if type_ is None:
4361 4365 type_ = Notification.TYPE_MESSAGE
4362 4366
4363 4367 notification = cls()
4364 4368 notification.created_by_user = created_by
4365 4369 notification.subject = subject
4366 4370 notification.body = body
4367 4371 notification.type_ = type_
4368 4372 notification.created_on = datetime.datetime.now()
4369 4373
4370 4374 # For each recipient link the created notification to his account
4371 4375 for u in recipients:
4372 4376 assoc = UserNotification()
4373 4377 assoc.user_id = u.user_id
4374 4378 assoc.notification = notification
4375 4379
4376 4380 # if created_by is inside recipients mark his notification
4377 4381 # as read
4378 4382 if u.user_id == created_by.user_id:
4379 4383 assoc.read = True
4380 4384 Session().add(assoc)
4381 4385
4382 4386 Session().add(notification)
4383 4387
4384 4388 return notification
4385 4389
4386 4390
4387 4391 class UserNotification(Base, BaseModel):
4388 4392 __tablename__ = 'user_to_notification'
4389 4393 __table_args__ = (
4390 4394 UniqueConstraint('user_id', 'notification_id'),
4391 4395 base_table_args
4392 4396 )
4393 4397
4394 4398 user_id = Column('user_id', Integer(), ForeignKey('users.user_id'), primary_key=True)
4395 4399 notification_id = Column("notification_id", Integer(), ForeignKey('notifications.notification_id'), primary_key=True)
4396 4400 read = Column('read', Boolean, default=False)
4397 4401 sent_on = Column('sent_on', DateTime(timezone=False), nullable=True, unique=None)
4398 4402
4399 4403 user = relationship('User', lazy="joined")
4400 4404 notification = relationship('Notification', lazy="joined",
4401 4405 order_by=lambda: Notification.created_on.desc(),)
4402 4406
4403 4407 def mark_as_read(self):
4404 4408 self.read = True
4405 4409 Session().add(self)
4406 4410
4407 4411
4408 4412 class Gist(Base, BaseModel):
4409 4413 __tablename__ = 'gists'
4410 4414 __table_args__ = (
4411 4415 Index('g_gist_access_id_idx', 'gist_access_id'),
4412 4416 Index('g_created_on_idx', 'created_on'),
4413 4417 base_table_args
4414 4418 )
4415 4419
4416 4420 GIST_PUBLIC = u'public'
4417 4421 GIST_PRIVATE = u'private'
4418 4422 DEFAULT_FILENAME = u'gistfile1.txt'
4419 4423
4420 4424 ACL_LEVEL_PUBLIC = u'acl_public'
4421 4425 ACL_LEVEL_PRIVATE = u'acl_private'
4422 4426
4423 4427 gist_id = Column('gist_id', Integer(), primary_key=True)
4424 4428 gist_access_id = Column('gist_access_id', Unicode(250))
4425 4429 gist_description = Column('gist_description', UnicodeText().with_variant(UnicodeText(1024), 'mysql'))
4426 4430 gist_owner = Column('user_id', Integer(), ForeignKey('users.user_id'), nullable=True)
4427 4431 gist_expires = Column('gist_expires', Float(53), nullable=False)
4428 4432 gist_type = Column('gist_type', Unicode(128), nullable=False)
4429 4433 created_on = Column('created_on', DateTime(timezone=False), nullable=False, default=datetime.datetime.now)
4430 4434 modified_at = Column('modified_at', DateTime(timezone=False), nullable=False, default=datetime.datetime.now)
4431 4435 acl_level = Column('acl_level', Unicode(128), nullable=True)
4432 4436
4433 4437 owner = relationship('User')
4434 4438
4435 4439 def __repr__(self):
4436 4440 return '<Gist:[%s]%s>' % (self.gist_type, self.gist_access_id)
4437 4441
4438 4442 @hybrid_property
4439 4443 def description_safe(self):
4440 4444 from rhodecode.lib import helpers as h
4441 4445 return h.escape(self.gist_description)
4442 4446
4443 4447 @classmethod
4444 4448 def get_or_404(cls, id_):
4445 4449 from pyramid.httpexceptions import HTTPNotFound
4446 4450
4447 4451 res = cls.query().filter(cls.gist_access_id == id_).scalar()
4448 4452 if not res:
4449 4453 raise HTTPNotFound()
4450 4454 return res
4451 4455
4452 4456 @classmethod
4453 4457 def get_by_access_id(cls, gist_access_id):
4454 4458 return cls.query().filter(cls.gist_access_id == gist_access_id).scalar()
4455 4459
4456 4460 def gist_url(self):
4457 4461 from rhodecode.model.gist import GistModel
4458 4462 return GistModel().get_url(self)
4459 4463
4460 4464 @classmethod
4461 4465 def base_path(cls):
4462 4466 """
4463 4467 Returns base path when all gists are stored
4464 4468
4465 4469 :param cls:
4466 4470 """
4467 4471 from rhodecode.model.gist import GIST_STORE_LOC
4468 4472 q = Session().query(RhodeCodeUi)\
4469 4473 .filter(RhodeCodeUi.ui_key == URL_SEP)
4470 4474 q = q.options(FromCache("sql_cache_short", "repository_repo_path"))
4471 4475 return os.path.join(q.one().ui_value, GIST_STORE_LOC)
4472 4476
4473 4477 def get_api_data(self):
4474 4478 """
4475 4479 Common function for generating gist related data for API
4476 4480 """
4477 4481 gist = self
4478 4482 data = {
4479 4483 'gist_id': gist.gist_id,
4480 4484 'type': gist.gist_type,
4481 4485 'access_id': gist.gist_access_id,
4482 4486 'description': gist.gist_description,
4483 4487 'url': gist.gist_url(),
4484 4488 'expires': gist.gist_expires,
4485 4489 'created_on': gist.created_on,
4486 4490 'modified_at': gist.modified_at,
4487 4491 'content': None,
4488 4492 'acl_level': gist.acl_level,
4489 4493 }
4490 4494 return data
4491 4495
4492 4496 def __json__(self):
4493 4497 data = dict(
4494 4498 )
4495 4499 data.update(self.get_api_data())
4496 4500 return data
4497 4501 # SCM functions
4498 4502
4499 4503 def scm_instance(self, **kwargs):
4500 4504 """
4501 4505 Get an instance of VCS Repository
4502 4506
4503 4507 :param kwargs:
4504 4508 """
4505 4509 from rhodecode.model.gist import GistModel
4506 4510 full_repo_path = os.path.join(self.base_path(), self.gist_access_id)
4507 4511 return get_vcs_instance(
4508 4512 repo_path=safe_str(full_repo_path), create=False,
4509 4513 _vcs_alias=GistModel.vcs_backend)
4510 4514
4511 4515
4512 4516 class ExternalIdentity(Base, BaseModel):
4513 4517 __tablename__ = 'external_identities'
4514 4518 __table_args__ = (
4515 4519 Index('local_user_id_idx', 'local_user_id'),
4516 4520 Index('external_id_idx', 'external_id'),
4517 4521 base_table_args
4518 4522 )
4519 4523
4520 4524 external_id = Column('external_id', Unicode(255), default=u'', primary_key=True)
4521 4525 external_username = Column('external_username', Unicode(1024), default=u'')
4522 4526 local_user_id = Column('local_user_id', Integer(), ForeignKey('users.user_id'), primary_key=True)
4523 4527 provider_name = Column('provider_name', Unicode(255), default=u'', primary_key=True)
4524 4528 access_token = Column('access_token', String(1024), default=u'')
4525 4529 alt_token = Column('alt_token', String(1024), default=u'')
4526 4530 token_secret = Column('token_secret', String(1024), default=u'')
4527 4531
4528 4532 @classmethod
4529 4533 def by_external_id_and_provider(cls, external_id, provider_name, local_user_id=None):
4530 4534 """
4531 4535 Returns ExternalIdentity instance based on search params
4532 4536
4533 4537 :param external_id:
4534 4538 :param provider_name:
4535 4539 :return: ExternalIdentity
4536 4540 """
4537 4541 query = cls.query()
4538 4542 query = query.filter(cls.external_id == external_id)
4539 4543 query = query.filter(cls.provider_name == provider_name)
4540 4544 if local_user_id:
4541 4545 query = query.filter(cls.local_user_id == local_user_id)
4542 4546 return query.first()
4543 4547
4544 4548 @classmethod
4545 4549 def user_by_external_id_and_provider(cls, external_id, provider_name):
4546 4550 """
4547 4551 Returns User instance based on search params
4548 4552
4549 4553 :param external_id:
4550 4554 :param provider_name:
4551 4555 :return: User
4552 4556 """
4553 4557 query = User.query()
4554 4558 query = query.filter(cls.external_id == external_id)
4555 4559 query = query.filter(cls.provider_name == provider_name)
4556 4560 query = query.filter(User.user_id == cls.local_user_id)
4557 4561 return query.first()
4558 4562
4559 4563 @classmethod
4560 4564 def by_local_user_id(cls, local_user_id):
4561 4565 """
4562 4566 Returns all tokens for user
4563 4567
4564 4568 :param local_user_id:
4565 4569 :return: ExternalIdentity
4566 4570 """
4567 4571 query = cls.query()
4568 4572 query = query.filter(cls.local_user_id == local_user_id)
4569 4573 return query
4570 4574
4571 4575 @classmethod
4572 4576 def load_provider_plugin(cls, plugin_id):
4573 4577 from rhodecode.authentication.base import loadplugin
4574 4578 _plugin_id = 'egg:rhodecode-enterprise-ee#{}'.format(plugin_id)
4575 4579 auth_plugin = loadplugin(_plugin_id)
4576 4580 return auth_plugin
4577 4581
4578 4582
4579 4583 class Integration(Base, BaseModel):
4580 4584 __tablename__ = 'integrations'
4581 4585 __table_args__ = (
4582 4586 base_table_args
4583 4587 )
4584 4588
4585 4589 integration_id = Column('integration_id', Integer(), primary_key=True)
4586 4590 integration_type = Column('integration_type', String(255))
4587 4591 enabled = Column('enabled', Boolean(), nullable=False)
4588 4592 name = Column('name', String(255), nullable=False)
4589 4593 child_repos_only = Column('child_repos_only', Boolean(), nullable=False,
4590 4594 default=False)
4591 4595
4592 4596 settings = Column(
4593 4597 'settings_json', MutationObj.as_mutable(
4594 4598 JsonType(dialect_map=dict(mysql=UnicodeText(16384)))))
4595 4599 repo_id = Column(
4596 4600 'repo_id', Integer(), ForeignKey('repositories.repo_id'),
4597 4601 nullable=True, unique=None, default=None)
4598 4602 repo = relationship('Repository', lazy='joined')
4599 4603
4600 4604 repo_group_id = Column(
4601 4605 'repo_group_id', Integer(), ForeignKey('groups.group_id'),
4602 4606 nullable=True, unique=None, default=None)
4603 4607 repo_group = relationship('RepoGroup', lazy='joined')
4604 4608
4605 4609 @property
4606 4610 def scope(self):
4607 4611 if self.repo:
4608 4612 return repr(self.repo)
4609 4613 if self.repo_group:
4610 4614 if self.child_repos_only:
4611 4615 return repr(self.repo_group) + ' (child repos only)'
4612 4616 else:
4613 4617 return repr(self.repo_group) + ' (recursive)'
4614 4618 if self.child_repos_only:
4615 4619 return 'root_repos'
4616 4620 return 'global'
4617 4621
4618 4622 def __repr__(self):
4619 4623 return '<Integration(%r, %r)>' % (self.integration_type, self.scope)
4620 4624
4621 4625
4622 4626 class RepoReviewRuleUser(Base, BaseModel):
4623 4627 __tablename__ = 'repo_review_rules_users'
4624 4628 __table_args__ = (
4625 4629 base_table_args
4626 4630 )
4627 4631
4628 4632 repo_review_rule_user_id = Column('repo_review_rule_user_id', Integer(), primary_key=True)
4629 4633 repo_review_rule_id = Column("repo_review_rule_id", Integer(), ForeignKey('repo_review_rules.repo_review_rule_id'))
4630 4634 user_id = Column("user_id", Integer(), ForeignKey('users.user_id'), nullable=False)
4631 4635 mandatory = Column("mandatory", Boolean(), nullable=False, default=False)
4632 4636 user = relationship('User')
4633 4637
4634 4638 def rule_data(self):
4635 4639 return {
4636 4640 'mandatory': self.mandatory
4637 4641 }
4638 4642
4639 4643
4640 4644 class RepoReviewRuleUserGroup(Base, BaseModel):
4641 4645 __tablename__ = 'repo_review_rules_users_groups'
4642 4646 __table_args__ = (
4643 4647 base_table_args
4644 4648 )
4645 4649
4646 4650 VOTE_RULE_ALL = -1
4647 4651
4648 4652 repo_review_rule_users_group_id = Column('repo_review_rule_users_group_id', Integer(), primary_key=True)
4649 4653 repo_review_rule_id = Column("repo_review_rule_id", Integer(), ForeignKey('repo_review_rules.repo_review_rule_id'))
4650 4654 users_group_id = Column("users_group_id", Integer(),ForeignKey('users_groups.users_group_id'), nullable=False)
4651 4655 mandatory = Column("mandatory", Boolean(), nullable=False, default=False)
4652 4656 vote_rule = Column("vote_rule", Integer(), nullable=True, default=VOTE_RULE_ALL)
4653 4657 users_group = relationship('UserGroup')
4654 4658
4655 4659 def rule_data(self):
4656 4660 return {
4657 4661 'mandatory': self.mandatory,
4658 4662 'vote_rule': self.vote_rule
4659 4663 }
4660 4664
4661 4665 @property
4662 4666 def vote_rule_label(self):
4663 4667 if not self.vote_rule or self.vote_rule == self.VOTE_RULE_ALL:
4664 4668 return 'all must vote'
4665 4669 else:
4666 4670 return 'min. vote {}'.format(self.vote_rule)
4667 4671
4668 4672
4669 4673 class RepoReviewRule(Base, BaseModel):
4670 4674 __tablename__ = 'repo_review_rules'
4671 4675 __table_args__ = (
4672 4676 base_table_args
4673 4677 )
4674 4678
4675 4679 repo_review_rule_id = Column(
4676 4680 'repo_review_rule_id', Integer(), primary_key=True)
4677 4681 repo_id = Column(
4678 4682 "repo_id", Integer(), ForeignKey('repositories.repo_id'))
4679 4683 repo = relationship('Repository', backref='review_rules')
4680 4684
4681 4685 review_rule_name = Column('review_rule_name', String(255))
4682 4686 _branch_pattern = Column("branch_pattern", UnicodeText().with_variant(UnicodeText(255), 'mysql'), default=u'*') # glob
4683 4687 _target_branch_pattern = Column("target_branch_pattern", UnicodeText().with_variant(UnicodeText(255), 'mysql'), default=u'*') # glob
4684 4688 _file_pattern = Column("file_pattern", UnicodeText().with_variant(UnicodeText(255), 'mysql'), default=u'*') # glob
4685 4689
4686 4690 use_authors_for_review = Column("use_authors_for_review", Boolean(), nullable=False, default=False)
4687 4691 forbid_author_to_review = Column("forbid_author_to_review", Boolean(), nullable=False, default=False)
4688 4692 forbid_commit_author_to_review = Column("forbid_commit_author_to_review", Boolean(), nullable=False, default=False)
4689 4693 forbid_adding_reviewers = Column("forbid_adding_reviewers", Boolean(), nullable=False, default=False)
4690 4694
4691 4695 rule_users = relationship('RepoReviewRuleUser')
4692 4696 rule_user_groups = relationship('RepoReviewRuleUserGroup')
4693 4697
4694 4698 def _validate_pattern(self, value):
4695 4699 re.compile('^' + glob2re(value) + '$')
4696 4700
4697 4701 @hybrid_property
4698 4702 def source_branch_pattern(self):
4699 4703 return self._branch_pattern or '*'
4700 4704
4701 4705 @source_branch_pattern.setter
4702 4706 def source_branch_pattern(self, value):
4703 4707 self._validate_pattern(value)
4704 4708 self._branch_pattern = value or '*'
4705 4709
4706 4710 @hybrid_property
4707 4711 def target_branch_pattern(self):
4708 4712 return self._target_branch_pattern or '*'
4709 4713
4710 4714 @target_branch_pattern.setter
4711 4715 def target_branch_pattern(self, value):
4712 4716 self._validate_pattern(value)
4713 4717 self._target_branch_pattern = value or '*'
4714 4718
4715 4719 @hybrid_property
4716 4720 def file_pattern(self):
4717 4721 return self._file_pattern or '*'
4718 4722
4719 4723 @file_pattern.setter
4720 4724 def file_pattern(self, value):
4721 4725 self._validate_pattern(value)
4722 4726 self._file_pattern = value or '*'
4723 4727
4724 4728 def matches(self, source_branch, target_branch, files_changed):
4725 4729 """
4726 4730 Check if this review rule matches a branch/files in a pull request
4727 4731
4728 4732 :param source_branch: source branch name for the commit
4729 4733 :param target_branch: target branch name for the commit
4730 4734 :param files_changed: list of file paths changed in the pull request
4731 4735 """
4732 4736
4733 4737 source_branch = source_branch or ''
4734 4738 target_branch = target_branch or ''
4735 4739 files_changed = files_changed or []
4736 4740
4737 4741 branch_matches = True
4738 4742 if source_branch or target_branch:
4739 4743 if self.source_branch_pattern == '*':
4740 4744 source_branch_match = True
4741 4745 else:
4742 4746 if self.source_branch_pattern.startswith('re:'):
4743 4747 source_pattern = self.source_branch_pattern[3:]
4744 4748 else:
4745 4749 source_pattern = '^' + glob2re(self.source_branch_pattern) + '$'
4746 4750 source_branch_regex = re.compile(source_pattern)
4747 4751 source_branch_match = bool(source_branch_regex.search(source_branch))
4748 4752 if self.target_branch_pattern == '*':
4749 4753 target_branch_match = True
4750 4754 else:
4751 4755 if self.target_branch_pattern.startswith('re:'):
4752 4756 target_pattern = self.target_branch_pattern[3:]
4753 4757 else:
4754 4758 target_pattern = '^' + glob2re(self.target_branch_pattern) + '$'
4755 4759 target_branch_regex = re.compile(target_pattern)
4756 4760 target_branch_match = bool(target_branch_regex.search(target_branch))
4757 4761
4758 4762 branch_matches = source_branch_match and target_branch_match
4759 4763
4760 4764 files_matches = True
4761 4765 if self.file_pattern != '*':
4762 4766 files_matches = False
4763 4767 if self.file_pattern.startswith('re:'):
4764 4768 file_pattern = self.file_pattern[3:]
4765 4769 else:
4766 4770 file_pattern = glob2re(self.file_pattern)
4767 4771 file_regex = re.compile(file_pattern)
4768 4772 for filename in files_changed:
4769 4773 if file_regex.search(filename):
4770 4774 files_matches = True
4771 4775 break
4772 4776
4773 4777 return branch_matches and files_matches
4774 4778
4775 4779 @property
4776 4780 def review_users(self):
4777 4781 """ Returns the users which this rule applies to """
4778 4782
4779 4783 users = collections.OrderedDict()
4780 4784
4781 4785 for rule_user in self.rule_users:
4782 4786 if rule_user.user.active:
4783 4787 if rule_user.user not in users:
4784 4788 users[rule_user.user.username] = {
4785 4789 'user': rule_user.user,
4786 4790 'source': 'user',
4787 4791 'source_data': {},
4788 4792 'data': rule_user.rule_data()
4789 4793 }
4790 4794
4791 4795 for rule_user_group in self.rule_user_groups:
4792 4796 source_data = {
4793 4797 'user_group_id': rule_user_group.users_group.users_group_id,
4794 4798 'name': rule_user_group.users_group.users_group_name,
4795 4799 'members': len(rule_user_group.users_group.members)
4796 4800 }
4797 4801 for member in rule_user_group.users_group.members:
4798 4802 if member.user.active:
4799 4803 key = member.user.username
4800 4804 if key in users:
4801 4805 # skip this member as we have him already
4802 4806 # this prevents from override the "first" matched
4803 4807 # users with duplicates in multiple groups
4804 4808 continue
4805 4809
4806 4810 users[key] = {
4807 4811 'user': member.user,
4808 4812 'source': 'user_group',
4809 4813 'source_data': source_data,
4810 4814 'data': rule_user_group.rule_data()
4811 4815 }
4812 4816
4813 4817 return users
4814 4818
4815 4819 def user_group_vote_rule(self, user_id):
4816 4820
4817 4821 rules = []
4818 4822 if not self.rule_user_groups:
4819 4823 return rules
4820 4824
4821 4825 for user_group in self.rule_user_groups:
4822 4826 user_group_members = [x.user_id for x in user_group.users_group.members]
4823 4827 if user_id in user_group_members:
4824 4828 rules.append(user_group)
4825 4829 return rules
4826 4830
4827 4831 def __repr__(self):
4828 4832 return '<RepoReviewerRule(id=%r, repo=%r)>' % (
4829 4833 self.repo_review_rule_id, self.repo)
4830 4834
4831 4835
4832 4836 class ScheduleEntry(Base, BaseModel):
4833 4837 __tablename__ = 'schedule_entries'
4834 4838 __table_args__ = (
4835 4839 UniqueConstraint('schedule_name', name='s_schedule_name_idx'),
4836 4840 UniqueConstraint('task_uid', name='s_task_uid_idx'),
4837 4841 base_table_args,
4838 4842 )
4839 4843
4840 4844 schedule_types = ['crontab', 'timedelta', 'integer']
4841 4845 schedule_entry_id = Column('schedule_entry_id', Integer(), primary_key=True)
4842 4846
4843 4847 schedule_name = Column("schedule_name", String(255), nullable=False, unique=None, default=None)
4844 4848 schedule_description = Column("schedule_description", String(10000), nullable=True, unique=None, default=None)
4845 4849 schedule_enabled = Column("schedule_enabled", Boolean(), nullable=False, unique=None, default=True)
4846 4850
4847 4851 _schedule_type = Column("schedule_type", String(255), nullable=False, unique=None, default=None)
4848 4852 schedule_definition = Column('schedule_definition_json', MutationObj.as_mutable(JsonType(default=lambda: "", dialect_map=dict(mysql=LONGTEXT()))))
4849 4853
4850 4854 schedule_last_run = Column('schedule_last_run', DateTime(timezone=False), nullable=True, unique=None, default=None)
4851 4855 schedule_total_run_count = Column('schedule_total_run_count', Integer(), nullable=True, unique=None, default=0)
4852 4856
4853 4857 # task
4854 4858 task_uid = Column("task_uid", String(255), nullable=False, unique=None, default=None)
4855 4859 task_dot_notation = Column("task_dot_notation", String(4096), nullable=False, unique=None, default=None)
4856 4860 task_args = Column('task_args_json', MutationObj.as_mutable(JsonType(default=list, dialect_map=dict(mysql=LONGTEXT()))))
4857 4861 task_kwargs = Column('task_kwargs_json', MutationObj.as_mutable(JsonType(default=dict, dialect_map=dict(mysql=LONGTEXT()))))
4858 4862
4859 4863 created_on = Column('created_on', DateTime(timezone=False), nullable=False, default=datetime.datetime.now)
4860 4864 updated_on = Column('updated_on', DateTime(timezone=False), nullable=True, unique=None, default=None)
4861 4865
4862 4866 @hybrid_property
4863 4867 def schedule_type(self):
4864 4868 return self._schedule_type
4865 4869
4866 4870 @schedule_type.setter
4867 4871 def schedule_type(self, val):
4868 4872 if val not in self.schedule_types:
4869 4873 raise ValueError('Value must be on of `{}` and got `{}`'.format(
4870 4874 val, self.schedule_type))
4871 4875
4872 4876 self._schedule_type = val
4873 4877
4874 4878 @classmethod
4875 4879 def get_uid(cls, obj):
4876 4880 args = obj.task_args
4877 4881 kwargs = obj.task_kwargs
4878 4882 if isinstance(args, JsonRaw):
4879 4883 try:
4880 4884 args = json.loads(args)
4881 4885 except ValueError:
4882 4886 args = tuple()
4883 4887
4884 4888 if isinstance(kwargs, JsonRaw):
4885 4889 try:
4886 4890 kwargs = json.loads(kwargs)
4887 4891 except ValueError:
4888 4892 kwargs = dict()
4889 4893
4890 4894 dot_notation = obj.task_dot_notation
4891 4895 val = '.'.join(map(safe_str, [
4892 4896 sorted(dot_notation), args, sorted(kwargs.items())]))
4893 4897 return hashlib.sha1(val).hexdigest()
4894 4898
4895 4899 @classmethod
4896 4900 def get_by_schedule_name(cls, schedule_name):
4897 4901 return cls.query().filter(cls.schedule_name == schedule_name).scalar()
4898 4902
4899 4903 @classmethod
4900 4904 def get_by_schedule_id(cls, schedule_id):
4901 4905 return cls.query().filter(cls.schedule_entry_id == schedule_id).scalar()
4902 4906
4903 4907 @property
4904 4908 def task(self):
4905 4909 return self.task_dot_notation
4906 4910
4907 4911 @property
4908 4912 def schedule(self):
4909 4913 from rhodecode.lib.celerylib.utils import raw_2_schedule
4910 4914 schedule = raw_2_schedule(self.schedule_definition, self.schedule_type)
4911 4915 return schedule
4912 4916
4913 4917 @property
4914 4918 def args(self):
4915 4919 try:
4916 4920 return list(self.task_args or [])
4917 4921 except ValueError:
4918 4922 return list()
4919 4923
4920 4924 @property
4921 4925 def kwargs(self):
4922 4926 try:
4923 4927 return dict(self.task_kwargs or {})
4924 4928 except ValueError:
4925 4929 return dict()
4926 4930
4927 4931 def _as_raw(self, val):
4928 4932 if hasattr(val, 'de_coerce'):
4929 4933 val = val.de_coerce()
4930 4934 if val:
4931 4935 val = json.dumps(val)
4932 4936
4933 4937 return val
4934 4938
4935 4939 @property
4936 4940 def schedule_definition_raw(self):
4937 4941 return self._as_raw(self.schedule_definition)
4938 4942
4939 4943 @property
4940 4944 def args_raw(self):
4941 4945 return self._as_raw(self.task_args)
4942 4946
4943 4947 @property
4944 4948 def kwargs_raw(self):
4945 4949 return self._as_raw(self.task_kwargs)
4946 4950
4947 4951 def __repr__(self):
4948 4952 return '<DB:ScheduleEntry({}:{})>'.format(
4949 4953 self.schedule_entry_id, self.schedule_name)
4950 4954
4951 4955
4952 4956 @event.listens_for(ScheduleEntry, 'before_update')
4953 4957 def update_task_uid(mapper, connection, target):
4954 4958 target.task_uid = ScheduleEntry.get_uid(target)
4955 4959
4956 4960
4957 4961 @event.listens_for(ScheduleEntry, 'before_insert')
4958 4962 def set_task_uid(mapper, connection, target):
4959 4963 target.task_uid = ScheduleEntry.get_uid(target)
4960 4964
4961 4965
4962 4966 class _BaseBranchPerms(BaseModel):
4963 4967 @classmethod
4964 4968 def compute_hash(cls, value):
4965 4969 return sha1_safe(value)
4966 4970
4967 4971 @hybrid_property
4968 4972 def branch_pattern(self):
4969 4973 return self._branch_pattern or '*'
4970 4974
4971 4975 @hybrid_property
4972 4976 def branch_hash(self):
4973 4977 return self._branch_hash
4974 4978
4975 4979 def _validate_glob(self, value):
4976 4980 re.compile('^' + glob2re(value) + '$')
4977 4981
4978 4982 @branch_pattern.setter
4979 4983 def branch_pattern(self, value):
4980 4984 self._validate_glob(value)
4981 4985 self._branch_pattern = value or '*'
4982 4986 # set the Hash when setting the branch pattern
4983 4987 self._branch_hash = self.compute_hash(self._branch_pattern)
4984 4988
4985 4989 def matches(self, branch):
4986 4990 """
4987 4991 Check if this the branch matches entry
4988 4992
4989 4993 :param branch: branch name for the commit
4990 4994 """
4991 4995
4992 4996 branch = branch or ''
4993 4997
4994 4998 branch_matches = True
4995 4999 if branch:
4996 5000 branch_regex = re.compile('^' + glob2re(self.branch_pattern) + '$')
4997 5001 branch_matches = bool(branch_regex.search(branch))
4998 5002
4999 5003 return branch_matches
5000 5004
5001 5005
5002 5006 class UserToRepoBranchPermission(Base, _BaseBranchPerms):
5003 5007 __tablename__ = 'user_to_repo_branch_permissions'
5004 5008 __table_args__ = (
5005 5009 base_table_args
5006 5010 )
5007 5011
5008 5012 branch_rule_id = Column('branch_rule_id', Integer(), primary_key=True)
5009 5013
5010 5014 repository_id = Column('repository_id', Integer(), ForeignKey('repositories.repo_id'), nullable=False, unique=None, default=None)
5011 5015 repo = relationship('Repository', backref='user_branch_perms')
5012 5016
5013 5017 permission_id = Column('permission_id', Integer(), ForeignKey('permissions.permission_id'), nullable=False, unique=None, default=None)
5014 5018 permission = relationship('Permission')
5015 5019
5016 5020 rule_to_perm_id = Column('rule_to_perm_id', Integer(), ForeignKey('repo_to_perm.repo_to_perm_id'), nullable=False, unique=None, default=None)
5017 5021 user_repo_to_perm = relationship('UserRepoToPerm')
5018 5022
5019 5023 rule_order = Column('rule_order', Integer(), nullable=False)
5020 5024 _branch_pattern = Column('branch_pattern', UnicodeText().with_variant(UnicodeText(2048), 'mysql'), default=u'*') # glob
5021 5025 _branch_hash = Column('branch_hash', UnicodeText().with_variant(UnicodeText(2048), 'mysql'))
5022 5026
5023 5027 def __unicode__(self):
5024 5028 return u'<UserBranchPermission(%s => %r)>' % (
5025 5029 self.user_repo_to_perm, self.branch_pattern)
5026 5030
5027 5031
5028 5032 class UserGroupToRepoBranchPermission(Base, _BaseBranchPerms):
5029 5033 __tablename__ = 'user_group_to_repo_branch_permissions'
5030 5034 __table_args__ = (
5031 5035 base_table_args
5032 5036 )
5033 5037
5034 5038 branch_rule_id = Column('branch_rule_id', Integer(), primary_key=True)
5035 5039
5036 5040 repository_id = Column('repository_id', Integer(), ForeignKey('repositories.repo_id'), nullable=False, unique=None, default=None)
5037 5041 repo = relationship('Repository', backref='user_group_branch_perms')
5038 5042
5039 5043 permission_id = Column('permission_id', Integer(), ForeignKey('permissions.permission_id'), nullable=False, unique=None, default=None)
5040 5044 permission = relationship('Permission')
5041 5045
5042 5046 rule_to_perm_id = Column('rule_to_perm_id', Integer(), ForeignKey('users_group_repo_to_perm.users_group_to_perm_id'), nullable=False, unique=None, default=None)
5043 5047 user_group_repo_to_perm = relationship('UserGroupRepoToPerm')
5044 5048
5045 5049 rule_order = Column('rule_order', Integer(), nullable=False)
5046 5050 _branch_pattern = Column('branch_pattern', UnicodeText().with_variant(UnicodeText(2048), 'mysql'), default=u'*') # glob
5047 5051 _branch_hash = Column('branch_hash', UnicodeText().with_variant(UnicodeText(2048), 'mysql'))
5048 5052
5049 5053 def __unicode__(self):
5050 5054 return u'<UserBranchPermission(%s => %r)>' % (
5051 5055 self.user_group_repo_to_perm, self.branch_pattern)
5052 5056
5053 5057
5054 5058 class UserBookmark(Base, BaseModel):
5055 5059 __tablename__ = 'user_bookmarks'
5056 5060 __table_args__ = (
5057 5061 UniqueConstraint('user_id', 'bookmark_repo_id'),
5058 5062 UniqueConstraint('user_id', 'bookmark_repo_group_id'),
5059 5063 UniqueConstraint('user_id', 'bookmark_position'),
5060 5064 base_table_args
5061 5065 )
5062 5066
5063 5067 user_bookmark_id = Column("user_bookmark_id", Integer(), nullable=False, unique=True, default=None, primary_key=True)
5064 5068 user_id = Column("user_id", Integer(), ForeignKey('users.user_id'), nullable=False, unique=None, default=None)
5065 5069 position = Column("bookmark_position", Integer(), nullable=False)
5066 5070 title = Column("bookmark_title", String(255), nullable=True, unique=None, default=None)
5067 5071 redirect_url = Column("bookmark_redirect_url", String(10240), nullable=True, unique=None, default=None)
5068 5072 created_on = Column("created_on", DateTime(timezone=False), nullable=False, default=datetime.datetime.now)
5069 5073
5070 5074 bookmark_repo_id = Column("bookmark_repo_id", Integer(), ForeignKey("repositories.repo_id"), nullable=True, unique=None, default=None)
5071 5075 bookmark_repo_group_id = Column("bookmark_repo_group_id", Integer(), ForeignKey("groups.group_id"), nullable=True, unique=None, default=None)
5072 5076
5073 5077 user = relationship("User")
5074 5078
5075 5079 repository = relationship("Repository")
5076 5080 repository_group = relationship("RepoGroup")
5077 5081
5078 5082 @classmethod
5079 5083 def get_by_position_for_user(cls, position, user_id):
5080 5084 return cls.query() \
5081 5085 .filter(UserBookmark.user_id == user_id) \
5082 5086 .filter(UserBookmark.position == position).scalar()
5083 5087
5084 5088 @classmethod
5085 5089 def get_bookmarks_for_user(cls, user_id):
5086 5090 return cls.query() \
5087 5091 .filter(UserBookmark.user_id == user_id) \
5088 5092 .options(joinedload(UserBookmark.repository)) \
5089 5093 .options(joinedload(UserBookmark.repository_group)) \
5090 5094 .order_by(UserBookmark.position.asc()) \
5091 5095 .all()
5092 5096
5093 5097 def __unicode__(self):
5094 5098 return u'<UserBookmark(%s @ %r)>' % (self.position, self.redirect_url)
5095 5099
5096 5100
5097 5101 class FileStore(Base, BaseModel):
5098 5102 __tablename__ = 'file_store'
5099 5103 __table_args__ = (
5100 5104 base_table_args
5101 5105 )
5102 5106
5103 5107 file_store_id = Column('file_store_id', Integer(), primary_key=True)
5104 5108 file_uid = Column('file_uid', String(1024), nullable=False)
5105 5109 file_display_name = Column('file_display_name', UnicodeText().with_variant(UnicodeText(2048), 'mysql'), nullable=True)
5106 5110 file_description = Column('file_description', UnicodeText().with_variant(UnicodeText(10240), 'mysql'), nullable=True)
5107 5111 file_org_name = Column('file_org_name', UnicodeText().with_variant(UnicodeText(10240), 'mysql'), nullable=False)
5108 5112
5109 5113 # sha256 hash
5110 5114 file_hash = Column('file_hash', String(512), nullable=False)
5111 5115 file_size = Column('file_size', Integer(), nullable=False)
5112 5116
5113 5117 created_on = Column('created_on', DateTime(timezone=False), nullable=False, default=datetime.datetime.now)
5114 5118 accessed_on = Column('accessed_on', DateTime(timezone=False), nullable=True)
5115 5119 accessed_count = Column('accessed_count', Integer(), default=0)
5116 5120
5117 5121 enabled = Column('enabled', Boolean(), nullable=False, default=True)
5118 5122
5119 5123 # if repo/repo_group reference is set, check for permissions
5120 5124 check_acl = Column('check_acl', Boolean(), nullable=False, default=True)
5121 5125
5122 5126 # hidden defines an attachment that should be hidden from showing in artifact listing
5123 5127 hidden = Column('hidden', Boolean(), nullable=False, default=False)
5124 5128
5125 5129 user_id = Column('user_id', Integer(), ForeignKey('users.user_id'), nullable=False)
5126 5130 upload_user = relationship('User', lazy='joined', primaryjoin='User.user_id==FileStore.user_id')
5127 5131
5128 5132 file_metadata = relationship('FileStoreMetadata', lazy='joined')
5129 5133
5130 5134 # scope limited to user, which requester have access to
5131 5135 scope_user_id = Column(
5132 5136 'scope_user_id', Integer(), ForeignKey('users.user_id'),
5133 5137 nullable=True, unique=None, default=None)
5134 5138 user = relationship('User', lazy='joined', primaryjoin='User.user_id==FileStore.scope_user_id')
5135 5139
5136 5140 # scope limited to user group, which requester have access to
5137 5141 scope_user_group_id = Column(
5138 5142 'scope_user_group_id', Integer(), ForeignKey('users_groups.users_group_id'),
5139 5143 nullable=True, unique=None, default=None)
5140 5144 user_group = relationship('UserGroup', lazy='joined')
5141 5145
5142 5146 # scope limited to repo, which requester have access to
5143 5147 scope_repo_id = Column(
5144 5148 'scope_repo_id', Integer(), ForeignKey('repositories.repo_id'),
5145 5149 nullable=True, unique=None, default=None)
5146 5150 repo = relationship('Repository', lazy='joined')
5147 5151
5148 5152 # scope limited to repo group, which requester have access to
5149 5153 scope_repo_group_id = Column(
5150 5154 'scope_repo_group_id', Integer(), ForeignKey('groups.group_id'),
5151 5155 nullable=True, unique=None, default=None)
5152 5156 repo_group = relationship('RepoGroup', lazy='joined')
5153 5157
5154 5158 @classmethod
5155 5159 def get_by_store_uid(cls, file_store_uid):
5156 5160 return FileStore.query().filter(FileStore.file_uid == file_store_uid).scalar()
5157 5161
5158 5162 @classmethod
5159 5163 def create(cls, file_uid, filename, file_hash, file_size, file_display_name='',
5160 5164 file_description='', enabled=True, hidden=False, check_acl=True,
5161 5165 user_id=None, scope_user_id=None, scope_repo_id=None, scope_repo_group_id=None):
5162 5166
5163 5167 store_entry = FileStore()
5164 5168 store_entry.file_uid = file_uid
5165 5169 store_entry.file_display_name = file_display_name
5166 5170 store_entry.file_org_name = filename
5167 5171 store_entry.file_size = file_size
5168 5172 store_entry.file_hash = file_hash
5169 5173 store_entry.file_description = file_description
5170 5174
5171 5175 store_entry.check_acl = check_acl
5172 5176 store_entry.enabled = enabled
5173 5177 store_entry.hidden = hidden
5174 5178
5175 5179 store_entry.user_id = user_id
5176 5180 store_entry.scope_user_id = scope_user_id
5177 5181 store_entry.scope_repo_id = scope_repo_id
5178 5182 store_entry.scope_repo_group_id = scope_repo_group_id
5179 5183
5180 5184 return store_entry
5181 5185
5182 5186 @classmethod
5183 5187 def store_metadata(cls, file_store_id, args, commit=True):
5184 5188 file_store = FileStore.get(file_store_id)
5185 5189 if file_store is None:
5186 5190 return
5187 5191
5188 5192 for section, key, value, value_type in args:
5189 5193 has_key = FileStoreMetadata().query() \
5190 5194 .filter(FileStoreMetadata.file_store_id == file_store.file_store_id) \
5191 5195 .filter(FileStoreMetadata.file_store_meta_section == section) \
5192 5196 .filter(FileStoreMetadata.file_store_meta_key == key) \
5193 5197 .scalar()
5194 5198 if has_key:
5195 5199 msg = 'key `{}` already defined under section `{}` for this file.'\
5196 5200 .format(key, section)
5197 5201 raise ArtifactMetadataDuplicate(msg, err_section=section, err_key=key)
5198 5202
5199 5203 # NOTE(marcink): raises ArtifactMetadataBadValueType
5200 5204 FileStoreMetadata.valid_value_type(value_type)
5201 5205
5202 5206 meta_entry = FileStoreMetadata()
5203 5207 meta_entry.file_store = file_store
5204 5208 meta_entry.file_store_meta_section = section
5205 5209 meta_entry.file_store_meta_key = key
5206 5210 meta_entry.file_store_meta_value_type = value_type
5207 5211 meta_entry.file_store_meta_value = value
5208 5212
5209 5213 Session().add(meta_entry)
5210 5214
5211 5215 try:
5212 5216 if commit:
5213 5217 Session().commit()
5214 5218 except IntegrityError:
5215 5219 Session().rollback()
5216 5220 raise ArtifactMetadataDuplicate('Duplicate section/key found for this file.')
5217 5221
5218 5222 @classmethod
5219 5223 def bump_access_counter(cls, file_uid, commit=True):
5220 5224 FileStore().query()\
5221 5225 .filter(FileStore.file_uid == file_uid)\
5222 5226 .update({FileStore.accessed_count: (FileStore.accessed_count + 1),
5223 5227 FileStore.accessed_on: datetime.datetime.now()})
5224 5228 if commit:
5225 5229 Session().commit()
5226 5230
5227 5231 def __json__(self):
5228 5232 data = {
5229 5233 'filename': self.file_display_name,
5230 5234 'filename_org': self.file_org_name,
5231 5235 'file_uid': self.file_uid,
5232 5236 'description': self.file_description,
5233 5237 'hidden': self.hidden,
5234 5238 'size': self.file_size,
5235 5239 'created_on': self.created_on,
5236 5240 'uploaded_by': self.upload_user.get_api_data(details='basic'),
5237 5241 'downloaded_times': self.accessed_count,
5238 5242 'sha256': self.file_hash,
5239 5243 'metadata': self.file_metadata,
5240 5244 }
5241 5245
5242 5246 return data
5243 5247
5244 5248 def __repr__(self):
5245 5249 return '<FileStore({})>'.format(self.file_store_id)
5246 5250
5247 5251
5248 5252 class FileStoreMetadata(Base, BaseModel):
5249 5253 __tablename__ = 'file_store_metadata'
5250 5254 __table_args__ = (
5251 5255 UniqueConstraint('file_store_id', 'file_store_meta_section', 'file_store_meta_key'),
5252 5256 Index('file_store_meta_section_idx', 'file_store_meta_section'),
5253 5257 Index('file_store_meta_key_idx', 'file_store_meta_key'),
5254 5258 base_table_args
5255 5259 )
5256 5260 SETTINGS_TYPES = {
5257 5261 'str': safe_str,
5258 5262 'int': safe_int,
5259 5263 'unicode': safe_unicode,
5260 5264 'bool': str2bool,
5261 5265 'list': functools.partial(aslist, sep=',')
5262 5266 }
5263 5267
5264 5268 file_store_meta_id = Column(
5265 5269 "file_store_meta_id", Integer(), nullable=False, unique=True, default=None,
5266 5270 primary_key=True)
5267 5271 file_store_meta_section = Column(
5268 5272 "file_store_meta_section", UnicodeText().with_variant(UnicodeText(1024), 'mysql'),
5269 5273 nullable=True, unique=None, default=None)
5270 5274 file_store_meta_key = Column(
5271 5275 "file_store_meta_key", UnicodeText().with_variant(UnicodeText(1024), 'mysql'),
5272 5276 nullable=True, unique=None, default=None)
5273 5277 _file_store_meta_value = Column(
5274 5278 "file_store_meta_value", UnicodeText().with_variant(UnicodeText(20480), 'mysql'),
5275 5279 nullable=True, unique=None, default=None)
5276 5280 _file_store_meta_value_type = Column(
5277 5281 "file_store_meta_value_type", String(255), nullable=True, unique=None,
5278 5282 default='unicode')
5279 5283
5280 5284 file_store_id = Column(
5281 5285 'file_store_id', Integer(), ForeignKey('file_store.file_store_id'),
5282 5286 nullable=True, unique=None, default=None)
5283 5287
5284 5288 file_store = relationship('FileStore', lazy='joined')
5285 5289
5286 5290 @classmethod
5287 5291 def valid_value_type(cls, value):
5288 5292 if value.split('.')[0] not in cls.SETTINGS_TYPES:
5289 5293 raise ArtifactMetadataBadValueType(
5290 5294 'value_type must be one of %s got %s' % (cls.SETTINGS_TYPES.keys(), value))
5291 5295
5292 5296 @hybrid_property
5293 5297 def file_store_meta_value(self):
5294 5298 val = self._file_store_meta_value
5295 5299
5296 5300 if self._file_store_meta_value_type:
5297 5301 # e.g unicode.encrypted == unicode
5298 5302 _type = self._file_store_meta_value_type.split('.')[0]
5299 5303 # decode the encrypted value if it's encrypted field type
5300 5304 if '.encrypted' in self._file_store_meta_value_type:
5301 5305 cipher = EncryptedTextValue()
5302 5306 val = safe_unicode(cipher.process_result_value(val, None))
5303 5307 # do final type conversion
5304 5308 converter = self.SETTINGS_TYPES.get(_type) or self.SETTINGS_TYPES['unicode']
5305 5309 val = converter(val)
5306 5310
5307 5311 return val
5308 5312
5309 5313 @file_store_meta_value.setter
5310 5314 def file_store_meta_value(self, val):
5311 5315 val = safe_unicode(val)
5312 5316 # encode the encrypted value
5313 5317 if '.encrypted' in self.file_store_meta_value_type:
5314 5318 cipher = EncryptedTextValue()
5315 5319 val = safe_unicode(cipher.process_bind_param(val, None))
5316 5320 self._file_store_meta_value = val
5317 5321
5318 5322 @hybrid_property
5319 5323 def file_store_meta_value_type(self):
5320 5324 return self._file_store_meta_value_type
5321 5325
5322 5326 @file_store_meta_value_type.setter
5323 5327 def file_store_meta_value_type(self, val):
5324 5328 # e.g unicode.encrypted
5325 5329 self.valid_value_type(val)
5326 5330 self._file_store_meta_value_type = val
5327 5331
5328 5332 def __json__(self):
5329 5333 data = {
5330 5334 'artifact': self.file_store.file_uid,
5331 5335 'section': self.file_store_meta_section,
5332 5336 'key': self.file_store_meta_key,
5333 5337 'value': self.file_store_meta_value,
5334 5338 }
5335 5339
5336 5340 return data
5337 5341
5338 5342 def __repr__(self):
5339 5343 return '<%s[%s]%s=>%s]>' % (self.__class__.__name__, self.file_store_meta_section,
5340 5344 self.file_store_meta_key, self.file_store_meta_value)
5341 5345
5342 5346
5343 5347 class DbMigrateVersion(Base, BaseModel):
5344 5348 __tablename__ = 'db_migrate_version'
5345 5349 __table_args__ = (
5346 5350 base_table_args,
5347 5351 )
5348 5352
5349 5353 repository_id = Column('repository_id', String(250), primary_key=True)
5350 5354 repository_path = Column('repository_path', Text)
5351 5355 version = Column('version', Integer)
5352 5356
5353 5357 @classmethod
5354 5358 def set_version(cls, version):
5355 5359 """
5356 5360 Helper for forcing a different version, usually for debugging purposes via ishell.
5357 5361 """
5358 5362 ver = DbMigrateVersion.query().first()
5359 5363 ver.version = version
5360 5364 Session().commit()
5361 5365
5362 5366
5363 5367 class DbSession(Base, BaseModel):
5364 5368 __tablename__ = 'db_session'
5365 5369 __table_args__ = (
5366 5370 base_table_args,
5367 5371 )
5368 5372
5369 5373 def __repr__(self):
5370 5374 return '<DB:DbSession({})>'.format(self.id)
5371 5375
5372 5376 id = Column('id', Integer())
5373 5377 namespace = Column('namespace', String(255), primary_key=True)
5374 5378 accessed = Column('accessed', DateTime, nullable=False)
5375 5379 created = Column('created', DateTime, nullable=False)
5376 5380 data = Column('data', PickleType, nullable=False)
@@ -1,1074 +1,1077 b''
1 1 # -*- coding: utf-8 -*-
2 2
3 3 # Copyright (C) 2010-2019 RhodeCode GmbH
4 4 #
5 5 # This program is free software: you can redistribute it and/or modify
6 6 # it under the terms of the GNU Affero General Public License, version 3
7 7 # (only), as published by the Free Software Foundation.
8 8 #
9 9 # This program is distributed in the hope that it will be useful,
10 10 # but WITHOUT ANY WARRANTY; without even the implied warranty of
11 11 # MERCHANTABILITY or FITNESS FOR A PARTICULAR PURPOSE. See the
12 12 # GNU General Public License for more details.
13 13 #
14 14 # You should have received a copy of the GNU Affero General Public License
15 15 # along with this program. If not, see <http://www.gnu.org/licenses/>.
16 16 #
17 17 # This program is dual-licensed. If you wish to learn more about the
18 18 # RhodeCode Enterprise Edition, including its added features, Support services,
19 19 # and proprietary license terms, please see https://rhodecode.com/licenses/
20 20
21 21 import os
22 22 import re
23 23 import shutil
24 24 import time
25 25 import logging
26 26 import traceback
27 27 import datetime
28 28
29 29 from pyramid.threadlocal import get_current_request
30 30 from zope.cachedescriptors.property import Lazy as LazyProperty
31 31
32 32 from rhodecode import events
33 33 from rhodecode.lib.auth import HasUserGroupPermissionAny
34 34 from rhodecode.lib.caching_query import FromCache
35 35 from rhodecode.lib.exceptions import AttachedForksError, AttachedPullRequestsError
36 36 from rhodecode.lib.hooks_base import log_delete_repository
37 37 from rhodecode.lib.user_log_filter import user_log_filter
38 38 from rhodecode.lib.utils import make_db_config
39 39 from rhodecode.lib.utils2 import (
40 40 safe_str, safe_unicode, remove_prefix, obfuscate_url_pw,
41 41 get_current_rhodecode_user, safe_int, datetime_to_time,
42 42 action_logger_generic)
43 43 from rhodecode.lib.vcs.backends import get_backend
44 44 from rhodecode.model import BaseModel
45 45 from rhodecode.model.db import (
46 46 _hash_key, joinedload, or_, Repository, UserRepoToPerm, UserGroupRepoToPerm,
47 47 UserRepoGroupToPerm, UserGroupRepoGroupToPerm, User, Permission,
48 48 Statistics, UserGroup, RepoGroup, RepositoryField, UserLog)
49 49
50 50 from rhodecode.model.settings import VcsSettingsModel
51 51
52 52
53 53 log = logging.getLogger(__name__)
54 54
55 55
56 56 class RepoModel(BaseModel):
57 57
58 58 cls = Repository
59 59
60 60 def _get_user_group(self, users_group):
61 61 return self._get_instance(UserGroup, users_group,
62 62 callback=UserGroup.get_by_group_name)
63 63
64 64 def _get_repo_group(self, repo_group):
65 65 return self._get_instance(RepoGroup, repo_group,
66 66 callback=RepoGroup.get_by_group_name)
67 67
68 68 def _create_default_perms(self, repository, private):
69 69 # create default permission
70 70 default = 'repository.read'
71 71 def_user = User.get_default_user()
72 72 for p in def_user.user_perms:
73 73 if p.permission.permission_name.startswith('repository.'):
74 74 default = p.permission.permission_name
75 75 break
76 76
77 77 default_perm = 'repository.none' if private else default
78 78
79 79 repo_to_perm = UserRepoToPerm()
80 80 repo_to_perm.permission = Permission.get_by_key(default_perm)
81 81
82 82 repo_to_perm.repository = repository
83 83 repo_to_perm.user_id = def_user.user_id
84 84
85 85 return repo_to_perm
86 86
87 87 @LazyProperty
88 88 def repos_path(self):
89 89 """
90 90 Gets the repositories root path from database
91 91 """
92 92 settings_model = VcsSettingsModel(sa=self.sa)
93 93 return settings_model.get_repos_location()
94 94
95 95 def get(self, repo_id):
96 96 repo = self.sa.query(Repository) \
97 97 .filter(Repository.repo_id == repo_id)
98 98
99 99 return repo.scalar()
100 100
101 101 def get_repo(self, repository):
102 102 return self._get_repo(repository)
103 103
104 104 def get_by_repo_name(self, repo_name, cache=False):
105 105 repo = self.sa.query(Repository) \
106 106 .filter(Repository.repo_name == repo_name)
107 107
108 108 if cache:
109 109 name_key = _hash_key(repo_name)
110 110 repo = repo.options(
111 111 FromCache("sql_cache_short", "get_repo_%s" % name_key))
112 112 return repo.scalar()
113 113
114 114 def _extract_id_from_repo_name(self, repo_name):
115 115 if repo_name.startswith('/'):
116 116 repo_name = repo_name.lstrip('/')
117 117 by_id_match = re.match(r'^_(\d{1,})', repo_name)
118 118 if by_id_match:
119 119 return by_id_match.groups()[0]
120 120
121 121 def get_repo_by_id(self, repo_name):
122 122 """
123 123 Extracts repo_name by id from special urls.
124 124 Example url is _11/repo_name
125 125
126 126 :param repo_name:
127 127 :return: repo object if matched else None
128 128 """
129 129
130 130 try:
131 131 _repo_id = self._extract_id_from_repo_name(repo_name)
132 132 if _repo_id:
133 133 return self.get(_repo_id)
134 134 except Exception:
135 135 log.exception('Failed to extract repo_name from URL')
136 136
137 137 return None
138 138
139 139 def get_repos_for_root(self, root, traverse=False):
140 140 if traverse:
141 141 like_expression = u'{}%'.format(safe_unicode(root))
142 142 repos = Repository.query().filter(
143 143 Repository.repo_name.like(like_expression)).all()
144 144 else:
145 145 if root and not isinstance(root, RepoGroup):
146 146 raise ValueError(
147 147 'Root must be an instance '
148 148 'of RepoGroup, got:{} instead'.format(type(root)))
149 149 repos = Repository.query().filter(Repository.group == root).all()
150 150 return repos
151 151
152 152 def get_url(self, repo, request=None, permalink=False):
153 153 if not request:
154 154 request = get_current_request()
155 155
156 156 if not request:
157 157 return
158 158
159 159 if permalink:
160 160 return request.route_url(
161 161 'repo_summary', repo_name='_{}'.format(safe_str(repo.repo_id)))
162 162 else:
163 163 return request.route_url(
164 164 'repo_summary', repo_name=safe_str(repo.repo_name))
165 165
166 166 def get_commit_url(self, repo, commit_id, request=None, permalink=False):
167 167 if not request:
168 168 request = get_current_request()
169 169
170 170 if not request:
171 171 return
172 172
173 173 if permalink:
174 174 return request.route_url(
175 175 'repo_commit', repo_name=safe_str(repo.repo_id),
176 176 commit_id=commit_id)
177 177
178 178 else:
179 179 return request.route_url(
180 180 'repo_commit', repo_name=safe_str(repo.repo_name),
181 181 commit_id=commit_id)
182 182
183 183 def get_repo_log(self, repo, filter_term):
184 184 repo_log = UserLog.query()\
185 185 .filter(or_(UserLog.repository_id == repo.repo_id,
186 186 UserLog.repository_name == repo.repo_name))\
187 187 .options(joinedload(UserLog.user))\
188 188 .options(joinedload(UserLog.repository))\
189 189 .order_by(UserLog.action_date.desc())
190 190
191 191 repo_log = user_log_filter(repo_log, filter_term)
192 192 return repo_log
193 193
194 194 @classmethod
195 195 def update_commit_cache(cls, repositories=None):
196 196 if not repositories:
197 197 repositories = Repository.getAll()
198 198 for repo in repositories:
199 199 repo.update_commit_cache()
200 200
201 201 def get_repos_as_dict(self, repo_list=None, admin=False,
202 202 super_user_actions=False, short_name=None):
203 203 _render = get_current_request().get_partial_renderer(
204 204 'rhodecode:templates/data_table/_dt_elements.mako')
205 205 c = _render.get_call_context()
206 206
207 207 def quick_menu(repo_name):
208 208 return _render('quick_menu', repo_name)
209 209
210 210 def repo_lnk(name, rtype, rstate, private, archived, fork_of):
211 211 if short_name is not None:
212 212 short_name_var = short_name
213 213 else:
214 214 short_name_var = not admin
215 215 return _render('repo_name', name, rtype, rstate, private, archived, fork_of,
216 216 short_name=short_name_var, admin=False)
217 217
218 218 def last_change(last_change):
219 219 if admin and isinstance(last_change, datetime.datetime) and not last_change.tzinfo:
220 last_change = last_change + datetime.timedelta(seconds=
221 (datetime.datetime.now() - datetime.datetime.utcnow()).seconds)
220 ts = time.time()
221 utc_offset = (datetime.datetime.fromtimestamp(ts)
222 - datetime.datetime.utcfromtimestamp(ts)).total_seconds()
223 last_change = last_change + datetime.timedelta(seconds=utc_offset)
224
222 225 return _render("last_change", last_change)
223 226
224 227 def rss_lnk(repo_name):
225 228 return _render("rss", repo_name)
226 229
227 230 def atom_lnk(repo_name):
228 231 return _render("atom", repo_name)
229 232
230 233 def last_rev(repo_name, cs_cache):
231 234 return _render('revision', repo_name, cs_cache.get('revision'),
232 235 cs_cache.get('raw_id'), cs_cache.get('author'),
233 236 cs_cache.get('message'), cs_cache.get('date'))
234 237
235 238 def desc(desc):
236 239 return _render('repo_desc', desc, c.visual.stylify_metatags)
237 240
238 241 def state(repo_state):
239 242 return _render("repo_state", repo_state)
240 243
241 244 def repo_actions(repo_name):
242 245 return _render('repo_actions', repo_name, super_user_actions)
243 246
244 247 def user_profile(username):
245 248 return _render('user_profile', username)
246 249
247 250 repos_data = []
248 251 for repo in repo_list:
249 252 cs_cache = repo.changeset_cache
250 253 row = {
251 254 "menu": quick_menu(repo.repo_name),
252 255
253 256 "name": repo_lnk(repo.repo_name, repo.repo_type, repo.repo_state,
254 257 repo.private, repo.archived, repo.fork),
255 258 "name_raw": repo.repo_name.lower(),
256 259
257 260 "last_change": last_change(repo.last_commit_change),
258 261 "last_change_raw": datetime_to_time(repo.last_commit_change),
259 262
260 263 "last_changeset": last_rev(repo.repo_name, cs_cache),
261 264 "last_changeset_raw": cs_cache.get('revision'),
262 265
263 266 "desc": desc(repo.description_safe),
264 267 "owner": user_profile(repo.user.username),
265 268
266 269 "state": state(repo.repo_state),
267 270 "rss": rss_lnk(repo.repo_name),
268 271
269 272 "atom": atom_lnk(repo.repo_name),
270 273 }
271 274 if admin:
272 275 row.update({
273 276 "action": repo_actions(repo.repo_name),
274 277 })
275 278 repos_data.append(row)
276 279
277 280 return repos_data
278 281
279 282 def _get_defaults(self, repo_name):
280 283 """
281 284 Gets information about repository, and returns a dict for
282 285 usage in forms
283 286
284 287 :param repo_name:
285 288 """
286 289
287 290 repo_info = Repository.get_by_repo_name(repo_name)
288 291
289 292 if repo_info is None:
290 293 return None
291 294
292 295 defaults = repo_info.get_dict()
293 296 defaults['repo_name'] = repo_info.just_name
294 297
295 298 groups = repo_info.groups_with_parents
296 299 parent_group = groups[-1] if groups else None
297 300
298 301 # we use -1 as this is how in HTML, we mark an empty group
299 302 defaults['repo_group'] = getattr(parent_group, 'group_id', -1)
300 303
301 304 keys_to_process = (
302 305 {'k': 'repo_type', 'strip': False},
303 306 {'k': 'repo_enable_downloads', 'strip': True},
304 307 {'k': 'repo_description', 'strip': True},
305 308 {'k': 'repo_enable_locking', 'strip': True},
306 309 {'k': 'repo_landing_rev', 'strip': True},
307 310 {'k': 'clone_uri', 'strip': False},
308 311 {'k': 'push_uri', 'strip': False},
309 312 {'k': 'repo_private', 'strip': True},
310 313 {'k': 'repo_enable_statistics', 'strip': True}
311 314 )
312 315
313 316 for item in keys_to_process:
314 317 attr = item['k']
315 318 if item['strip']:
316 319 attr = remove_prefix(item['k'], 'repo_')
317 320
318 321 val = defaults[attr]
319 322 if item['k'] == 'repo_landing_rev':
320 323 val = ':'.join(defaults[attr])
321 324 defaults[item['k']] = val
322 325 if item['k'] == 'clone_uri':
323 326 defaults['clone_uri_hidden'] = repo_info.clone_uri_hidden
324 327 if item['k'] == 'push_uri':
325 328 defaults['push_uri_hidden'] = repo_info.push_uri_hidden
326 329
327 330 # fill owner
328 331 if repo_info.user:
329 332 defaults.update({'user': repo_info.user.username})
330 333 else:
331 334 replacement_user = User.get_first_super_admin().username
332 335 defaults.update({'user': replacement_user})
333 336
334 337 return defaults
335 338
336 339 def update(self, repo, **kwargs):
337 340 try:
338 341 cur_repo = self._get_repo(repo)
339 342 source_repo_name = cur_repo.repo_name
340 343 if 'user' in kwargs:
341 344 cur_repo.user = User.get_by_username(kwargs['user'])
342 345
343 346 if 'repo_group' in kwargs:
344 347 cur_repo.group = RepoGroup.get(kwargs['repo_group'])
345 348 log.debug('Updating repo %s with params:%s', cur_repo, kwargs)
346 349
347 350 update_keys = [
348 351 (1, 'repo_description'),
349 352 (1, 'repo_landing_rev'),
350 353 (1, 'repo_private'),
351 354 (1, 'repo_enable_downloads'),
352 355 (1, 'repo_enable_locking'),
353 356 (1, 'repo_enable_statistics'),
354 357 (0, 'clone_uri'),
355 358 (0, 'push_uri'),
356 359 (0, 'fork_id')
357 360 ]
358 361 for strip, k in update_keys:
359 362 if k in kwargs:
360 363 val = kwargs[k]
361 364 if strip:
362 365 k = remove_prefix(k, 'repo_')
363 366
364 367 setattr(cur_repo, k, val)
365 368
366 369 new_name = cur_repo.get_new_name(kwargs['repo_name'])
367 370 cur_repo.repo_name = new_name
368 371
369 372 # if private flag is set, reset default permission to NONE
370 373 if kwargs.get('repo_private'):
371 374 EMPTY_PERM = 'repository.none'
372 375 RepoModel().grant_user_permission(
373 376 repo=cur_repo, user=User.DEFAULT_USER, perm=EMPTY_PERM
374 377 )
375 378
376 379 # handle extra fields
377 380 for field in filter(lambda k: k.startswith(RepositoryField.PREFIX), kwargs):
378 381 k = RepositoryField.un_prefix_key(field)
379 382 ex_field = RepositoryField.get_by_key_name(
380 383 key=k, repo=cur_repo)
381 384 if ex_field:
382 385 ex_field.field_value = kwargs[field]
383 386 self.sa.add(ex_field)
384 cur_repo.updated_on = datetime.datetime.now()
387
385 388 self.sa.add(cur_repo)
386 389
387 390 if source_repo_name != new_name:
388 391 # rename repository
389 392 self._rename_filesystem_repo(
390 393 old=source_repo_name, new=new_name)
391 394
392 395 return cur_repo
393 396 except Exception:
394 397 log.error(traceback.format_exc())
395 398 raise
396 399
397 400 def _create_repo(self, repo_name, repo_type, description, owner,
398 401 private=False, clone_uri=None, repo_group=None,
399 402 landing_rev='rev:tip', fork_of=None,
400 403 copy_fork_permissions=False, enable_statistics=False,
401 404 enable_locking=False, enable_downloads=False,
402 405 copy_group_permissions=False,
403 406 state=Repository.STATE_PENDING):
404 407 """
405 408 Create repository inside database with PENDING state, this should be
406 409 only executed by create() repo. With exception of importing existing
407 410 repos
408 411 """
409 412 from rhodecode.model.scm import ScmModel
410 413
411 414 owner = self._get_user(owner)
412 415 fork_of = self._get_repo(fork_of)
413 416 repo_group = self._get_repo_group(safe_int(repo_group))
414 417
415 418 try:
416 419 repo_name = safe_unicode(repo_name)
417 420 description = safe_unicode(description)
418 421 # repo name is just a name of repository
419 422 # while repo_name_full is a full qualified name that is combined
420 423 # with name and path of group
421 424 repo_name_full = repo_name
422 425 repo_name = repo_name.split(Repository.NAME_SEP)[-1]
423 426
424 427 new_repo = Repository()
425 428 new_repo.repo_state = state
426 429 new_repo.enable_statistics = False
427 430 new_repo.repo_name = repo_name_full
428 431 new_repo.repo_type = repo_type
429 432 new_repo.user = owner
430 433 new_repo.group = repo_group
431 434 new_repo.description = description or repo_name
432 435 new_repo.private = private
433 436 new_repo.archived = False
434 437 new_repo.clone_uri = clone_uri
435 438 new_repo.landing_rev = landing_rev
436 439
437 440 new_repo.enable_statistics = enable_statistics
438 441 new_repo.enable_locking = enable_locking
439 442 new_repo.enable_downloads = enable_downloads
440 443
441 444 if repo_group:
442 445 new_repo.enable_locking = repo_group.enable_locking
443 446
444 447 if fork_of:
445 448 parent_repo = fork_of
446 449 new_repo.fork = parent_repo
447 450
448 451 events.trigger(events.RepoPreCreateEvent(new_repo))
449 452
450 453 self.sa.add(new_repo)
451 454
452 455 EMPTY_PERM = 'repository.none'
453 456 if fork_of and copy_fork_permissions:
454 457 repo = fork_of
455 458 user_perms = UserRepoToPerm.query() \
456 459 .filter(UserRepoToPerm.repository == repo).all()
457 460 group_perms = UserGroupRepoToPerm.query() \
458 461 .filter(UserGroupRepoToPerm.repository == repo).all()
459 462
460 463 for perm in user_perms:
461 464 UserRepoToPerm.create(
462 465 perm.user, new_repo, perm.permission)
463 466
464 467 for perm in group_perms:
465 468 UserGroupRepoToPerm.create(
466 469 perm.users_group, new_repo, perm.permission)
467 470 # in case we copy permissions and also set this repo to private
468 471 # override the default user permission to make it a private repo
469 472 if private:
470 473 RepoModel(self.sa).grant_user_permission(
471 474 repo=new_repo, user=User.DEFAULT_USER, perm=EMPTY_PERM)
472 475
473 476 elif repo_group and copy_group_permissions:
474 477 user_perms = UserRepoGroupToPerm.query() \
475 478 .filter(UserRepoGroupToPerm.group == repo_group).all()
476 479
477 480 group_perms = UserGroupRepoGroupToPerm.query() \
478 481 .filter(UserGroupRepoGroupToPerm.group == repo_group).all()
479 482
480 483 for perm in user_perms:
481 484 perm_name = perm.permission.permission_name.replace(
482 485 'group.', 'repository.')
483 486 perm_obj = Permission.get_by_key(perm_name)
484 487 UserRepoToPerm.create(perm.user, new_repo, perm_obj)
485 488
486 489 for perm in group_perms:
487 490 perm_name = perm.permission.permission_name.replace(
488 491 'group.', 'repository.')
489 492 perm_obj = Permission.get_by_key(perm_name)
490 493 UserGroupRepoToPerm.create(perm.users_group, new_repo, perm_obj)
491 494
492 495 if private:
493 496 RepoModel(self.sa).grant_user_permission(
494 497 repo=new_repo, user=User.DEFAULT_USER, perm=EMPTY_PERM)
495 498
496 499 else:
497 500 perm_obj = self._create_default_perms(new_repo, private)
498 501 self.sa.add(perm_obj)
499 502
500 503 # now automatically start following this repository as owner
501 504 ScmModel(self.sa).toggle_following_repo(new_repo.repo_id, owner.user_id)
502 505
503 506 # we need to flush here, in order to check if database won't
504 507 # throw any exceptions, create filesystem dirs at the very end
505 508 self.sa.flush()
506 509 events.trigger(events.RepoCreateEvent(new_repo))
507 510 return new_repo
508 511
509 512 except Exception:
510 513 log.error(traceback.format_exc())
511 514 raise
512 515
513 516 def create(self, form_data, cur_user):
514 517 """
515 518 Create repository using celery tasks
516 519
517 520 :param form_data:
518 521 :param cur_user:
519 522 """
520 523 from rhodecode.lib.celerylib import tasks, run_task
521 524 return run_task(tasks.create_repo, form_data, cur_user)
522 525
523 526 def update_permissions(self, repo, perm_additions=None, perm_updates=None,
524 527 perm_deletions=None, check_perms=True,
525 528 cur_user=None):
526 529 if not perm_additions:
527 530 perm_additions = []
528 531 if not perm_updates:
529 532 perm_updates = []
530 533 if not perm_deletions:
531 534 perm_deletions = []
532 535
533 536 req_perms = ('usergroup.read', 'usergroup.write', 'usergroup.admin')
534 537
535 538 changes = {
536 539 'added': [],
537 540 'updated': [],
538 541 'deleted': []
539 542 }
540 543 # update permissions
541 544 for member_id, perm, member_type in perm_updates:
542 545 member_id = int(member_id)
543 546 if member_type == 'user':
544 547 member_name = User.get(member_id).username
545 548 # this updates also current one if found
546 549 self.grant_user_permission(
547 550 repo=repo, user=member_id, perm=perm)
548 551 elif member_type == 'user_group':
549 552 # check if we have permissions to alter this usergroup
550 553 member_name = UserGroup.get(member_id).users_group_name
551 554 if not check_perms or HasUserGroupPermissionAny(
552 555 *req_perms)(member_name, user=cur_user):
553 556 self.grant_user_group_permission(
554 557 repo=repo, group_name=member_id, perm=perm)
555 558 else:
556 559 raise ValueError("member_type must be 'user' or 'user_group' "
557 560 "got {} instead".format(member_type))
558 561 changes['updated'].append({'type': member_type, 'id': member_id,
559 562 'name': member_name, 'new_perm': perm})
560 563
561 564 # set new permissions
562 565 for member_id, perm, member_type in perm_additions:
563 566 member_id = int(member_id)
564 567 if member_type == 'user':
565 568 member_name = User.get(member_id).username
566 569 self.grant_user_permission(
567 570 repo=repo, user=member_id, perm=perm)
568 571 elif member_type == 'user_group':
569 572 # check if we have permissions to alter this usergroup
570 573 member_name = UserGroup.get(member_id).users_group_name
571 574 if not check_perms or HasUserGroupPermissionAny(
572 575 *req_perms)(member_name, user=cur_user):
573 576 self.grant_user_group_permission(
574 577 repo=repo, group_name=member_id, perm=perm)
575 578 else:
576 579 raise ValueError("member_type must be 'user' or 'user_group' "
577 580 "got {} instead".format(member_type))
578 581
579 582 changes['added'].append({'type': member_type, 'id': member_id,
580 583 'name': member_name, 'new_perm': perm})
581 584 # delete permissions
582 585 for member_id, perm, member_type in perm_deletions:
583 586 member_id = int(member_id)
584 587 if member_type == 'user':
585 588 member_name = User.get(member_id).username
586 589 self.revoke_user_permission(repo=repo, user=member_id)
587 590 elif member_type == 'user_group':
588 591 # check if we have permissions to alter this usergroup
589 592 member_name = UserGroup.get(member_id).users_group_name
590 593 if not check_perms or HasUserGroupPermissionAny(
591 594 *req_perms)(member_name, user=cur_user):
592 595 self.revoke_user_group_permission(
593 596 repo=repo, group_name=member_id)
594 597 else:
595 598 raise ValueError("member_type must be 'user' or 'user_group' "
596 599 "got {} instead".format(member_type))
597 600
598 601 changes['deleted'].append({'type': member_type, 'id': member_id,
599 602 'name': member_name, 'new_perm': perm})
600 603 return changes
601 604
602 605 def create_fork(self, form_data, cur_user):
603 606 """
604 607 Simple wrapper into executing celery task for fork creation
605 608
606 609 :param form_data:
607 610 :param cur_user:
608 611 """
609 612 from rhodecode.lib.celerylib import tasks, run_task
610 613 return run_task(tasks.create_repo_fork, form_data, cur_user)
611 614
612 615 def archive(self, repo):
613 616 """
614 617 Archive given repository. Set archive flag.
615 618
616 619 :param repo:
617 620 """
618 621 repo = self._get_repo(repo)
619 622 if repo:
620 623
621 624 try:
622 625 repo.archived = True
623 626 self.sa.add(repo)
624 627 self.sa.commit()
625 628 except Exception:
626 629 log.error(traceback.format_exc())
627 630 raise
628 631
629 632 def delete(self, repo, forks=None, pull_requests=None, fs_remove=True, cur_user=None):
630 633 """
631 634 Delete given repository, forks parameter defines what do do with
632 635 attached forks. Throws AttachedForksError if deleted repo has attached
633 636 forks
634 637
635 638 :param repo:
636 639 :param forks: str 'delete' or 'detach'
637 640 :param pull_requests: str 'delete' or None
638 641 :param fs_remove: remove(archive) repo from filesystem
639 642 """
640 643 if not cur_user:
641 644 cur_user = getattr(get_current_rhodecode_user(), 'username', None)
642 645 repo = self._get_repo(repo)
643 646 if repo:
644 647 if forks == 'detach':
645 648 for r in repo.forks:
646 649 r.fork = None
647 650 self.sa.add(r)
648 651 elif forks == 'delete':
649 652 for r in repo.forks:
650 653 self.delete(r, forks='delete')
651 654 elif [f for f in repo.forks]:
652 655 raise AttachedForksError()
653 656
654 657 # check for pull requests
655 658 pr_sources = repo.pull_requests_source
656 659 pr_targets = repo.pull_requests_target
657 660 if pull_requests != 'delete' and (pr_sources or pr_targets):
658 661 raise AttachedPullRequestsError()
659 662
660 663 old_repo_dict = repo.get_dict()
661 664 events.trigger(events.RepoPreDeleteEvent(repo))
662 665 try:
663 666 self.sa.delete(repo)
664 667 if fs_remove:
665 668 self._delete_filesystem_repo(repo)
666 669 else:
667 670 log.debug('skipping removal from filesystem')
668 671 old_repo_dict.update({
669 672 'deleted_by': cur_user,
670 673 'deleted_on': time.time(),
671 674 })
672 675 log_delete_repository(**old_repo_dict)
673 676 events.trigger(events.RepoDeleteEvent(repo))
674 677 except Exception:
675 678 log.error(traceback.format_exc())
676 679 raise
677 680
678 681 def grant_user_permission(self, repo, user, perm):
679 682 """
680 683 Grant permission for user on given repository, or update existing one
681 684 if found
682 685
683 686 :param repo: Instance of Repository, repository_id, or repository name
684 687 :param user: Instance of User, user_id or username
685 688 :param perm: Instance of Permission, or permission_name
686 689 """
687 690 user = self._get_user(user)
688 691 repo = self._get_repo(repo)
689 692 permission = self._get_perm(perm)
690 693
691 694 # check if we have that permission already
692 695 obj = self.sa.query(UserRepoToPerm) \
693 696 .filter(UserRepoToPerm.user == user) \
694 697 .filter(UserRepoToPerm.repository == repo) \
695 698 .scalar()
696 699 if obj is None:
697 700 # create new !
698 701 obj = UserRepoToPerm()
699 702 obj.repository = repo
700 703 obj.user = user
701 704 obj.permission = permission
702 705 self.sa.add(obj)
703 706 log.debug('Granted perm %s to %s on %s', perm, user, repo)
704 707 action_logger_generic(
705 708 'granted permission: {} to user: {} on repo: {}'.format(
706 709 perm, user, repo), namespace='security.repo')
707 710 return obj
708 711
709 712 def revoke_user_permission(self, repo, user):
710 713 """
711 714 Revoke permission for user on given repository
712 715
713 716 :param repo: Instance of Repository, repository_id, or repository name
714 717 :param user: Instance of User, user_id or username
715 718 """
716 719
717 720 user = self._get_user(user)
718 721 repo = self._get_repo(repo)
719 722
720 723 obj = self.sa.query(UserRepoToPerm) \
721 724 .filter(UserRepoToPerm.repository == repo) \
722 725 .filter(UserRepoToPerm.user == user) \
723 726 .scalar()
724 727 if obj:
725 728 self.sa.delete(obj)
726 729 log.debug('Revoked perm on %s on %s', repo, user)
727 730 action_logger_generic(
728 731 'revoked permission from user: {} on repo: {}'.format(
729 732 user, repo), namespace='security.repo')
730 733
731 734 def grant_user_group_permission(self, repo, group_name, perm):
732 735 """
733 736 Grant permission for user group on given repository, or update
734 737 existing one if found
735 738
736 739 :param repo: Instance of Repository, repository_id, or repository name
737 740 :param group_name: Instance of UserGroup, users_group_id,
738 741 or user group name
739 742 :param perm: Instance of Permission, or permission_name
740 743 """
741 744 repo = self._get_repo(repo)
742 745 group_name = self._get_user_group(group_name)
743 746 permission = self._get_perm(perm)
744 747
745 748 # check if we have that permission already
746 749 obj = self.sa.query(UserGroupRepoToPerm) \
747 750 .filter(UserGroupRepoToPerm.users_group == group_name) \
748 751 .filter(UserGroupRepoToPerm.repository == repo) \
749 752 .scalar()
750 753
751 754 if obj is None:
752 755 # create new
753 756 obj = UserGroupRepoToPerm()
754 757
755 758 obj.repository = repo
756 759 obj.users_group = group_name
757 760 obj.permission = permission
758 761 self.sa.add(obj)
759 762 log.debug('Granted perm %s to %s on %s', perm, group_name, repo)
760 763 action_logger_generic(
761 764 'granted permission: {} to usergroup: {} on repo: {}'.format(
762 765 perm, group_name, repo), namespace='security.repo')
763 766
764 767 return obj
765 768
766 769 def revoke_user_group_permission(self, repo, group_name):
767 770 """
768 771 Revoke permission for user group on given repository
769 772
770 773 :param repo: Instance of Repository, repository_id, or repository name
771 774 :param group_name: Instance of UserGroup, users_group_id,
772 775 or user group name
773 776 """
774 777 repo = self._get_repo(repo)
775 778 group_name = self._get_user_group(group_name)
776 779
777 780 obj = self.sa.query(UserGroupRepoToPerm) \
778 781 .filter(UserGroupRepoToPerm.repository == repo) \
779 782 .filter(UserGroupRepoToPerm.users_group == group_name) \
780 783 .scalar()
781 784 if obj:
782 785 self.sa.delete(obj)
783 786 log.debug('Revoked perm to %s on %s', repo, group_name)
784 787 action_logger_generic(
785 788 'revoked permission from usergroup: {} on repo: {}'.format(
786 789 group_name, repo), namespace='security.repo')
787 790
788 791 def delete_stats(self, repo_name):
789 792 """
790 793 removes stats for given repo
791 794
792 795 :param repo_name:
793 796 """
794 797 repo = self._get_repo(repo_name)
795 798 try:
796 799 obj = self.sa.query(Statistics) \
797 800 .filter(Statistics.repository == repo).scalar()
798 801 if obj:
799 802 self.sa.delete(obj)
800 803 except Exception:
801 804 log.error(traceback.format_exc())
802 805 raise
803 806
804 807 def add_repo_field(self, repo_name, field_key, field_label, field_value='',
805 808 field_type='str', field_desc=''):
806 809
807 810 repo = self._get_repo(repo_name)
808 811
809 812 new_field = RepositoryField()
810 813 new_field.repository = repo
811 814 new_field.field_key = field_key
812 815 new_field.field_type = field_type # python type
813 816 new_field.field_value = field_value
814 817 new_field.field_desc = field_desc
815 818 new_field.field_label = field_label
816 819 self.sa.add(new_field)
817 820 return new_field
818 821
819 822 def delete_repo_field(self, repo_name, field_key):
820 823 repo = self._get_repo(repo_name)
821 824 field = RepositoryField.get_by_key_name(field_key, repo)
822 825 if field:
823 826 self.sa.delete(field)
824 827
825 828 def _create_filesystem_repo(self, repo_name, repo_type, repo_group,
826 829 clone_uri=None, repo_store_location=None,
827 830 use_global_config=False, install_hooks=True):
828 831 """
829 832 makes repository on filesystem. It's group aware means it'll create
830 833 a repository within a group, and alter the paths accordingly of
831 834 group location
832 835
833 836 :param repo_name:
834 837 :param alias:
835 838 :param parent:
836 839 :param clone_uri:
837 840 :param repo_store_location:
838 841 """
839 842 from rhodecode.lib.utils import is_valid_repo, is_valid_repo_group
840 843 from rhodecode.model.scm import ScmModel
841 844
842 845 if Repository.NAME_SEP in repo_name:
843 846 raise ValueError(
844 847 'repo_name must not contain groups got `%s`' % repo_name)
845 848
846 849 if isinstance(repo_group, RepoGroup):
847 850 new_parent_path = os.sep.join(repo_group.full_path_splitted)
848 851 else:
849 852 new_parent_path = repo_group or ''
850 853
851 854 if repo_store_location:
852 855 _paths = [repo_store_location]
853 856 else:
854 857 _paths = [self.repos_path, new_parent_path, repo_name]
855 858 # we need to make it str for mercurial
856 859 repo_path = os.path.join(*map(lambda x: safe_str(x), _paths))
857 860
858 861 # check if this path is not a repository
859 862 if is_valid_repo(repo_path, self.repos_path):
860 863 raise Exception('This path %s is a valid repository' % repo_path)
861 864
862 865 # check if this path is a group
863 866 if is_valid_repo_group(repo_path, self.repos_path):
864 867 raise Exception('This path %s is a valid group' % repo_path)
865 868
866 869 log.info('creating repo %s in %s from url: `%s`',
867 870 repo_name, safe_unicode(repo_path),
868 871 obfuscate_url_pw(clone_uri))
869 872
870 873 backend = get_backend(repo_type)
871 874
872 875 config_repo = None if use_global_config else repo_name
873 876 if config_repo and new_parent_path:
874 877 config_repo = Repository.NAME_SEP.join(
875 878 (new_parent_path, config_repo))
876 879 config = make_db_config(clear_session=False, repo=config_repo)
877 880 config.set('extensions', 'largefiles', '')
878 881
879 882 # patch and reset hooks section of UI config to not run any
880 883 # hooks on creating remote repo
881 884 config.clear_section('hooks')
882 885
883 886 # TODO: johbo: Unify this, hardcoded "bare=True" does not look nice
884 887 if repo_type == 'git':
885 888 repo = backend(
886 889 repo_path, config=config, create=True, src_url=clone_uri, bare=True,
887 890 with_wire={"cache": False})
888 891 else:
889 892 repo = backend(
890 893 repo_path, config=config, create=True, src_url=clone_uri,
891 894 with_wire={"cache": False})
892 895
893 896 if install_hooks:
894 897 repo.install_hooks()
895 898
896 899 log.debug('Created repo %s with %s backend',
897 900 safe_unicode(repo_name), safe_unicode(repo_type))
898 901 return repo
899 902
900 903 def _rename_filesystem_repo(self, old, new):
901 904 """
902 905 renames repository on filesystem
903 906
904 907 :param old: old name
905 908 :param new: new name
906 909 """
907 910 log.info('renaming repo from %s to %s', old, new)
908 911
909 912 old_path = os.path.join(self.repos_path, old)
910 913 new_path = os.path.join(self.repos_path, new)
911 914 if os.path.isdir(new_path):
912 915 raise Exception(
913 916 'Was trying to rename to already existing dir %s' % new_path
914 917 )
915 918 shutil.move(old_path, new_path)
916 919
917 920 def _delete_filesystem_repo(self, repo):
918 921 """
919 922 removes repo from filesystem, the removal is acctually made by
920 923 added rm__ prefix into dir, and rename internat .hg/.git dirs so this
921 924 repository is no longer valid for rhodecode, can be undeleted later on
922 925 by reverting the renames on this repository
923 926
924 927 :param repo: repo object
925 928 """
926 929 rm_path = os.path.join(self.repos_path, repo.repo_name)
927 930 repo_group = repo.group
928 931 log.info("Removing repository %s", rm_path)
929 932 # disable hg/git internal that it doesn't get detected as repo
930 933 alias = repo.repo_type
931 934
932 935 config = make_db_config(clear_session=False)
933 936 config.set('extensions', 'largefiles', '')
934 937 bare = getattr(repo.scm_instance(config=config), 'bare', False)
935 938
936 939 # skip this for bare git repos
937 940 if not bare:
938 941 # disable VCS repo
939 942 vcs_path = os.path.join(rm_path, '.%s' % alias)
940 943 if os.path.exists(vcs_path):
941 944 shutil.move(vcs_path, os.path.join(rm_path, 'rm__.%s' % alias))
942 945
943 946 _now = datetime.datetime.now()
944 947 _ms = str(_now.microsecond).rjust(6, '0')
945 948 _d = 'rm__%s__%s' % (_now.strftime('%Y%m%d_%H%M%S_' + _ms),
946 949 repo.just_name)
947 950 if repo_group:
948 951 # if repository is in group, prefix the removal path with the group
949 952 args = repo_group.full_path_splitted + [_d]
950 953 _d = os.path.join(*args)
951 954
952 955 if os.path.isdir(rm_path):
953 956 shutil.move(rm_path, os.path.join(self.repos_path, _d))
954 957
955 958 # finally cleanup diff-cache if it exists
956 959 cached_diffs_dir = repo.cached_diffs_dir
957 960 if os.path.isdir(cached_diffs_dir):
958 961 shutil.rmtree(cached_diffs_dir)
959 962
960 963
961 964 class ReadmeFinder:
962 965 """
963 966 Utility which knows how to find a readme for a specific commit.
964 967
965 968 The main idea is that this is a configurable algorithm. When creating an
966 969 instance you can define parameters, currently only the `default_renderer`.
967 970 Based on this configuration the method :meth:`search` behaves slightly
968 971 different.
969 972 """
970 973
971 974 readme_re = re.compile(r'^readme(\.[^\.]+)?$', re.IGNORECASE)
972 975 path_re = re.compile(r'^docs?', re.IGNORECASE)
973 976
974 977 default_priorities = {
975 978 None: 0,
976 979 '.text': 2,
977 980 '.txt': 3,
978 981 '.rst': 1,
979 982 '.rest': 2,
980 983 '.md': 1,
981 984 '.mkdn': 2,
982 985 '.mdown': 3,
983 986 '.markdown': 4,
984 987 }
985 988
986 989 path_priority = {
987 990 'doc': 0,
988 991 'docs': 1,
989 992 }
990 993
991 994 FALLBACK_PRIORITY = 99
992 995
993 996 RENDERER_TO_EXTENSION = {
994 997 'rst': ['.rst', '.rest'],
995 998 'markdown': ['.md', 'mkdn', '.mdown', '.markdown'],
996 999 }
997 1000
998 1001 def __init__(self, default_renderer=None):
999 1002 self._default_renderer = default_renderer
1000 1003 self._renderer_extensions = self.RENDERER_TO_EXTENSION.get(
1001 1004 default_renderer, [])
1002 1005
1003 1006 def search(self, commit, path='/'):
1004 1007 """
1005 1008 Find a readme in the given `commit`.
1006 1009 """
1007 1010 nodes = commit.get_nodes(path)
1008 1011 matches = self._match_readmes(nodes)
1009 1012 matches = self._sort_according_to_priority(matches)
1010 1013 if matches:
1011 1014 return matches[0].node
1012 1015
1013 1016 paths = self._match_paths(nodes)
1014 1017 paths = self._sort_paths_according_to_priority(paths)
1015 1018 for path in paths:
1016 1019 match = self.search(commit, path=path)
1017 1020 if match:
1018 1021 return match
1019 1022
1020 1023 return None
1021 1024
1022 1025 def _match_readmes(self, nodes):
1023 1026 for node in nodes:
1024 1027 if not node.is_file():
1025 1028 continue
1026 1029 path = node.path.rsplit('/', 1)[-1]
1027 1030 match = self.readme_re.match(path)
1028 1031 if match:
1029 1032 extension = match.group(1)
1030 1033 yield ReadmeMatch(node, match, self._priority(extension))
1031 1034
1032 1035 def _match_paths(self, nodes):
1033 1036 for node in nodes:
1034 1037 if not node.is_dir():
1035 1038 continue
1036 1039 match = self.path_re.match(node.path)
1037 1040 if match:
1038 1041 yield node.path
1039 1042
1040 1043 def _priority(self, extension):
1041 1044 renderer_priority = (
1042 1045 0 if extension in self._renderer_extensions else 1)
1043 1046 extension_priority = self.default_priorities.get(
1044 1047 extension, self.FALLBACK_PRIORITY)
1045 1048 return (renderer_priority, extension_priority)
1046 1049
1047 1050 def _sort_according_to_priority(self, matches):
1048 1051
1049 1052 def priority_and_path(match):
1050 1053 return (match.priority, match.path)
1051 1054
1052 1055 return sorted(matches, key=priority_and_path)
1053 1056
1054 1057 def _sort_paths_according_to_priority(self, paths):
1055 1058
1056 1059 def priority_and_path(path):
1057 1060 return (self.path_priority.get(path, self.FALLBACK_PRIORITY), path)
1058 1061
1059 1062 return sorted(paths, key=priority_and_path)
1060 1063
1061 1064
1062 1065 class ReadmeMatch:
1063 1066
1064 1067 def __init__(self, node, match, priority):
1065 1068 self.node = node
1066 1069 self._match = match
1067 1070 self.priority = priority
1068 1071
1069 1072 @property
1070 1073 def path(self):
1071 1074 return self.node.path
1072 1075
1073 1076 def __repr__(self):
1074 1077 return '<ReadmeMatch {} priority={}'.format(self.path, self.priority)
@@ -1,797 +1,800 b''
1 1 # -*- coding: utf-8 -*-
2 2
3 3 # Copyright (C) 2011-2019 RhodeCode GmbH
4 4 #
5 5 # This program is free software: you can redistribute it and/or modify
6 6 # it under the terms of the GNU Affero General Public License, version 3
7 7 # (only), as published by the Free Software Foundation.
8 8 #
9 9 # This program is distributed in the hope that it will be useful,
10 10 # but WITHOUT ANY WARRANTY; without even the implied warranty of
11 11 # MERCHANTABILITY or FITNESS FOR A PARTICULAR PURPOSE. See the
12 12 # GNU General Public License for more details.
13 13 #
14 14 # You should have received a copy of the GNU Affero General Public License
15 15 # along with this program. If not, see <http://www.gnu.org/licenses/>.
16 16 #
17 17 # This program is dual-licensed. If you wish to learn more about the
18 18 # RhodeCode Enterprise Edition, including its added features, Support services,
19 19 # and proprietary license terms, please see https://rhodecode.com/licenses/
20 20
21 21
22 22 """
23 23 repo group model for RhodeCode
24 24 """
25 25
26 26 import os
27 27 import datetime
28 28 import itertools
29 29 import logging
30 30 import shutil
31 import time
31 32 import traceback
32 33 import string
33 34
34 35 from zope.cachedescriptors.property import Lazy as LazyProperty
35 36
36 37 from rhodecode import events
37 38 from rhodecode.model import BaseModel
38 39 from rhodecode.model.db import (_hash_key,
39 40 RepoGroup, UserRepoGroupToPerm, User, Permission, UserGroupRepoGroupToPerm,
40 41 UserGroup, Repository)
41 42 from rhodecode.model.settings import VcsSettingsModel, SettingsModel
42 43 from rhodecode.lib.caching_query import FromCache
43 44 from rhodecode.lib.utils2 import action_logger_generic, datetime_to_time
44 45
45 46 log = logging.getLogger(__name__)
46 47
47 48
48 49 class RepoGroupModel(BaseModel):
49 50
50 51 cls = RepoGroup
51 52 PERSONAL_GROUP_DESC = 'personal repo group of user `%(username)s`'
52 53 PERSONAL_GROUP_PATTERN = '${username}' # default
53 54
54 55 def _get_user_group(self, users_group):
55 56 return self._get_instance(UserGroup, users_group,
56 57 callback=UserGroup.get_by_group_name)
57 58
58 59 def _get_repo_group(self, repo_group):
59 60 return self._get_instance(RepoGroup, repo_group,
60 61 callback=RepoGroup.get_by_group_name)
61 62
62 63 @LazyProperty
63 64 def repos_path(self):
64 65 """
65 66 Gets the repositories root path from database
66 67 """
67 68
68 69 settings_model = VcsSettingsModel(sa=self.sa)
69 70 return settings_model.get_repos_location()
70 71
71 72 def get_by_group_name(self, repo_group_name, cache=None):
72 73 repo = self.sa.query(RepoGroup) \
73 74 .filter(RepoGroup.group_name == repo_group_name)
74 75
75 76 if cache:
76 77 name_key = _hash_key(repo_group_name)
77 78 repo = repo.options(
78 79 FromCache("sql_cache_short", "get_repo_group_%s" % name_key))
79 80 return repo.scalar()
80 81
81 82 def get_default_create_personal_repo_group(self):
82 83 value = SettingsModel().get_setting_by_name(
83 84 'create_personal_repo_group')
84 85 return value.app_settings_value if value else None or False
85 86
86 87 def get_personal_group_name_pattern(self):
87 88 value = SettingsModel().get_setting_by_name(
88 89 'personal_repo_group_pattern')
89 90 val = value.app_settings_value if value else None
90 91 group_template = val or self.PERSONAL_GROUP_PATTERN
91 92
92 93 group_template = group_template.lstrip('/')
93 94 return group_template
94 95
95 96 def get_personal_group_name(self, user):
96 97 template = self.get_personal_group_name_pattern()
97 98 return string.Template(template).safe_substitute(
98 99 username=user.username,
99 100 user_id=user.user_id,
100 101 first_name=user.first_name,
101 102 last_name=user.last_name,
102 103 )
103 104
104 105 def create_personal_repo_group(self, user, commit_early=True):
105 106 desc = self.PERSONAL_GROUP_DESC % {'username': user.username}
106 107 personal_repo_group_name = self.get_personal_group_name(user)
107 108
108 109 # create a new one
109 110 RepoGroupModel().create(
110 111 group_name=personal_repo_group_name,
111 112 group_description=desc,
112 113 owner=user.username,
113 114 personal=True,
114 115 commit_early=commit_early)
115 116
116 117 def _create_default_perms(self, new_group):
117 118 # create default permission
118 119 default_perm = 'group.read'
119 120 def_user = User.get_default_user()
120 121 for p in def_user.user_perms:
121 122 if p.permission.permission_name.startswith('group.'):
122 123 default_perm = p.permission.permission_name
123 124 break
124 125
125 126 repo_group_to_perm = UserRepoGroupToPerm()
126 127 repo_group_to_perm.permission = Permission.get_by_key(default_perm)
127 128
128 129 repo_group_to_perm.group = new_group
129 130 repo_group_to_perm.user_id = def_user.user_id
130 131 return repo_group_to_perm
131 132
132 133 def _get_group_name_and_parent(self, group_name_full, repo_in_path=False,
133 134 get_object=False):
134 135 """
135 136 Get's the group name and a parent group name from given group name.
136 137 If repo_in_path is set to truth, we asume the full path also includes
137 138 repo name, in such case we clean the last element.
138 139
139 140 :param group_name_full:
140 141 """
141 142 split_paths = 1
142 143 if repo_in_path:
143 144 split_paths = 2
144 145 _parts = group_name_full.rsplit(RepoGroup.url_sep(), split_paths)
145 146
146 147 if repo_in_path and len(_parts) > 1:
147 148 # such case last element is the repo_name
148 149 _parts.pop(-1)
149 150 group_name_cleaned = _parts[-1] # just the group name
150 151 parent_repo_group_name = None
151 152
152 153 if len(_parts) > 1:
153 154 parent_repo_group_name = _parts[0]
154 155
155 156 parent_group = None
156 157 if parent_repo_group_name:
157 158 parent_group = RepoGroup.get_by_group_name(parent_repo_group_name)
158 159
159 160 if get_object:
160 161 return group_name_cleaned, parent_repo_group_name, parent_group
161 162
162 163 return group_name_cleaned, parent_repo_group_name
163 164
164 165 def check_exist_filesystem(self, group_name, exc_on_failure=True):
165 166 create_path = os.path.join(self.repos_path, group_name)
166 167 log.debug('creating new group in %s', create_path)
167 168
168 169 if os.path.isdir(create_path):
169 170 if exc_on_failure:
170 171 abs_create_path = os.path.abspath(create_path)
171 172 raise Exception('Directory `{}` already exists !'.format(abs_create_path))
172 173 return False
173 174 return True
174 175
175 176 def _create_group(self, group_name):
176 177 """
177 178 makes repository group on filesystem
178 179
179 180 :param repo_name:
180 181 :param parent_id:
181 182 """
182 183
183 184 self.check_exist_filesystem(group_name)
184 185 create_path = os.path.join(self.repos_path, group_name)
185 186 log.debug('creating new group in %s', create_path)
186 187 os.makedirs(create_path, mode=0o755)
187 188 log.debug('created group in %s', create_path)
188 189
189 190 def _rename_group(self, old, new):
190 191 """
191 192 Renames a group on filesystem
192 193
193 194 :param group_name:
194 195 """
195 196
196 197 if old == new:
197 198 log.debug('skipping group rename')
198 199 return
199 200
200 201 log.debug('renaming repository group from %s to %s', old, new)
201 202
202 203 old_path = os.path.join(self.repos_path, old)
203 204 new_path = os.path.join(self.repos_path, new)
204 205
205 206 log.debug('renaming repos paths from %s to %s', old_path, new_path)
206 207
207 208 if os.path.isdir(new_path):
208 209 raise Exception('Was trying to rename to already '
209 210 'existing dir %s' % new_path)
210 211 shutil.move(old_path, new_path)
211 212
212 213 def _delete_filesystem_group(self, group, force_delete=False):
213 214 """
214 215 Deletes a group from a filesystem
215 216
216 217 :param group: instance of group from database
217 218 :param force_delete: use shutil rmtree to remove all objects
218 219 """
219 220 paths = group.full_path.split(RepoGroup.url_sep())
220 221 paths = os.sep.join(paths)
221 222
222 223 rm_path = os.path.join(self.repos_path, paths)
223 224 log.info("Removing group %s", rm_path)
224 225 # delete only if that path really exists
225 226 if os.path.isdir(rm_path):
226 227 if force_delete:
227 228 shutil.rmtree(rm_path)
228 229 else:
229 230 # archive that group`
230 231 _now = datetime.datetime.now()
231 232 _ms = str(_now.microsecond).rjust(6, '0')
232 233 _d = 'rm__%s_GROUP_%s' % (
233 234 _now.strftime('%Y%m%d_%H%M%S_' + _ms), group.name)
234 235 shutil.move(rm_path, os.path.join(self.repos_path, _d))
235 236
236 237 def create(self, group_name, group_description, owner, just_db=False,
237 238 copy_permissions=False, personal=None, commit_early=True):
238 239
239 240 (group_name_cleaned,
240 241 parent_group_name) = RepoGroupModel()._get_group_name_and_parent(group_name)
241 242
242 243 parent_group = None
243 244 if parent_group_name:
244 245 parent_group = self._get_repo_group(parent_group_name)
245 246 if not parent_group:
246 247 # we tried to create a nested group, but the parent is not
247 248 # existing
248 249 raise ValueError(
249 250 'Parent group `%s` given in `%s` group name '
250 251 'is not yet existing.' % (parent_group_name, group_name))
251 252
252 253 # because we are doing a cleanup, we need to check if such directory
253 254 # already exists. If we don't do that we can accidentally delete
254 255 # existing directory via cleanup that can cause data issues, since
255 256 # delete does a folder rename to special syntax later cleanup
256 257 # functions can delete this
257 258 cleanup_group = self.check_exist_filesystem(group_name,
258 259 exc_on_failure=False)
259 260 user = self._get_user(owner)
260 261 if not user:
261 262 raise ValueError('Owner %s not found as rhodecode user', owner)
262 263
263 264 try:
264 265 new_repo_group = RepoGroup()
265 266 new_repo_group.user = user
266 267 new_repo_group.group_description = group_description or group_name
267 268 new_repo_group.parent_group = parent_group
268 269 new_repo_group.group_name = group_name
269 270 new_repo_group.personal = personal
270 271
271 272 self.sa.add(new_repo_group)
272 273
273 274 # create an ADMIN permission for owner except if we're super admin,
274 275 # later owner should go into the owner field of groups
275 276 if not user.is_admin:
276 277 self.grant_user_permission(repo_group=new_repo_group,
277 278 user=owner, perm='group.admin')
278 279
279 280 if parent_group and copy_permissions:
280 281 # copy permissions from parent
281 282 user_perms = UserRepoGroupToPerm.query() \
282 283 .filter(UserRepoGroupToPerm.group == parent_group).all()
283 284
284 285 group_perms = UserGroupRepoGroupToPerm.query() \
285 286 .filter(UserGroupRepoGroupToPerm.group == parent_group).all()
286 287
287 288 for perm in user_perms:
288 289 # don't copy over the permission for user who is creating
289 290 # this group, if he is not super admin he get's admin
290 291 # permission set above
291 292 if perm.user != user or user.is_admin:
292 293 UserRepoGroupToPerm.create(
293 294 perm.user, new_repo_group, perm.permission)
294 295
295 296 for perm in group_perms:
296 297 UserGroupRepoGroupToPerm.create(
297 298 perm.users_group, new_repo_group, perm.permission)
298 299 else:
299 300 perm_obj = self._create_default_perms(new_repo_group)
300 301 self.sa.add(perm_obj)
301 302
302 303 # now commit the changes, earlier so we are sure everything is in
303 304 # the database.
304 305 if commit_early:
305 306 self.sa.commit()
306 307 if not just_db:
307 308 self._create_group(new_repo_group.group_name)
308 309
309 310 # trigger the post hook
310 311 from rhodecode.lib.hooks_base import log_create_repository_group
311 312 repo_group = RepoGroup.get_by_group_name(group_name)
312 313
313 314 # update repo group commit caches initially
314 315 repo_group.update_commit_cache()
315 316
316 317 log_create_repository_group(
317 318 created_by=user.username, **repo_group.get_dict())
318 319
319 320 # Trigger create event.
320 321 events.trigger(events.RepoGroupCreateEvent(repo_group))
321 322
322 323 return new_repo_group
323 324 except Exception:
324 325 self.sa.rollback()
325 326 log.exception('Exception occurred when creating repository group, '
326 327 'doing cleanup...')
327 328 # rollback things manually !
328 329 repo_group = RepoGroup.get_by_group_name(group_name)
329 330 if repo_group:
330 331 RepoGroup.delete(repo_group.group_id)
331 332 self.sa.commit()
332 333 if cleanup_group:
333 334 RepoGroupModel()._delete_filesystem_group(repo_group)
334 335 raise
335 336
336 337 def update_permissions(
337 338 self, repo_group, perm_additions=None, perm_updates=None,
338 339 perm_deletions=None, recursive=None, check_perms=True,
339 340 cur_user=None):
340 341 from rhodecode.model.repo import RepoModel
341 342 from rhodecode.lib.auth import HasUserGroupPermissionAny
342 343
343 344 if not perm_additions:
344 345 perm_additions = []
345 346 if not perm_updates:
346 347 perm_updates = []
347 348 if not perm_deletions:
348 349 perm_deletions = []
349 350
350 351 req_perms = ('usergroup.read', 'usergroup.write', 'usergroup.admin')
351 352
352 353 changes = {
353 354 'added': [],
354 355 'updated': [],
355 356 'deleted': []
356 357 }
357 358
358 359 def _set_perm_user(obj, user, perm):
359 360 if isinstance(obj, RepoGroup):
360 361 self.grant_user_permission(
361 362 repo_group=obj, user=user, perm=perm)
362 363 elif isinstance(obj, Repository):
363 364 # private repos will not allow to change the default
364 365 # permissions using recursive mode
365 366 if obj.private and user == User.DEFAULT_USER:
366 367 return
367 368
368 369 # we set group permission but we have to switch to repo
369 370 # permission
370 371 perm = perm.replace('group.', 'repository.')
371 372 RepoModel().grant_user_permission(
372 373 repo=obj, user=user, perm=perm)
373 374
374 375 def _set_perm_group(obj, users_group, perm):
375 376 if isinstance(obj, RepoGroup):
376 377 self.grant_user_group_permission(
377 378 repo_group=obj, group_name=users_group, perm=perm)
378 379 elif isinstance(obj, Repository):
379 380 # we set group permission but we have to switch to repo
380 381 # permission
381 382 perm = perm.replace('group.', 'repository.')
382 383 RepoModel().grant_user_group_permission(
383 384 repo=obj, group_name=users_group, perm=perm)
384 385
385 386 def _revoke_perm_user(obj, user):
386 387 if isinstance(obj, RepoGroup):
387 388 self.revoke_user_permission(repo_group=obj, user=user)
388 389 elif isinstance(obj, Repository):
389 390 RepoModel().revoke_user_permission(repo=obj, user=user)
390 391
391 392 def _revoke_perm_group(obj, user_group):
392 393 if isinstance(obj, RepoGroup):
393 394 self.revoke_user_group_permission(
394 395 repo_group=obj, group_name=user_group)
395 396 elif isinstance(obj, Repository):
396 397 RepoModel().revoke_user_group_permission(
397 398 repo=obj, group_name=user_group)
398 399
399 400 # start updates
400 401 log.debug('Now updating permissions for %s in recursive mode:%s',
401 402 repo_group, recursive)
402 403
403 404 # initialize check function, we'll call that multiple times
404 405 has_group_perm = HasUserGroupPermissionAny(*req_perms)
405 406
406 407 for obj in repo_group.recursive_groups_and_repos():
407 408 # iterated obj is an instance of a repos group or repository in
408 409 # that group, recursive option can be: none, repos, groups, all
409 410 if recursive == 'all':
410 411 obj = obj
411 412 elif recursive == 'repos':
412 413 # skip groups, other than this one
413 414 if isinstance(obj, RepoGroup) and not obj == repo_group:
414 415 continue
415 416 elif recursive == 'groups':
416 417 # skip repos
417 418 if isinstance(obj, Repository):
418 419 continue
419 420 else: # recursive == 'none':
420 421 # DEFAULT option - don't apply to iterated objects
421 422 # also we do a break at the end of this loop. if we are not
422 423 # in recursive mode
423 424 obj = repo_group
424 425
425 426 change_obj = obj.get_api_data()
426 427
427 428 # update permissions
428 429 for member_id, perm, member_type in perm_updates:
429 430 member_id = int(member_id)
430 431 if member_type == 'user':
431 432 member_name = User.get(member_id).username
432 433 # this updates also current one if found
433 434 _set_perm_user(obj, user=member_id, perm=perm)
434 435 elif member_type == 'user_group':
435 436 member_name = UserGroup.get(member_id).users_group_name
436 437 if not check_perms or has_group_perm(member_name,
437 438 user=cur_user):
438 439 _set_perm_group(obj, users_group=member_id, perm=perm)
439 440 else:
440 441 raise ValueError("member_type must be 'user' or 'user_group' "
441 442 "got {} instead".format(member_type))
442 443
443 444 changes['updated'].append(
444 445 {'change_obj': change_obj, 'type': member_type,
445 446 'id': member_id, 'name': member_name, 'new_perm': perm})
446 447
447 448 # set new permissions
448 449 for member_id, perm, member_type in perm_additions:
449 450 member_id = int(member_id)
450 451 if member_type == 'user':
451 452 member_name = User.get(member_id).username
452 453 _set_perm_user(obj, user=member_id, perm=perm)
453 454 elif member_type == 'user_group':
454 455 # check if we have permissions to alter this usergroup
455 456 member_name = UserGroup.get(member_id).users_group_name
456 457 if not check_perms or has_group_perm(member_name,
457 458 user=cur_user):
458 459 _set_perm_group(obj, users_group=member_id, perm=perm)
459 460 else:
460 461 raise ValueError("member_type must be 'user' or 'user_group' "
461 462 "got {} instead".format(member_type))
462 463
463 464 changes['added'].append(
464 465 {'change_obj': change_obj, 'type': member_type,
465 466 'id': member_id, 'name': member_name, 'new_perm': perm})
466 467
467 468 # delete permissions
468 469 for member_id, perm, member_type in perm_deletions:
469 470 member_id = int(member_id)
470 471 if member_type == 'user':
471 472 member_name = User.get(member_id).username
472 473 _revoke_perm_user(obj, user=member_id)
473 474 elif member_type == 'user_group':
474 475 # check if we have permissions to alter this usergroup
475 476 member_name = UserGroup.get(member_id).users_group_name
476 477 if not check_perms or has_group_perm(member_name,
477 478 user=cur_user):
478 479 _revoke_perm_group(obj, user_group=member_id)
479 480 else:
480 481 raise ValueError("member_type must be 'user' or 'user_group' "
481 482 "got {} instead".format(member_type))
482 483
483 484 changes['deleted'].append(
484 485 {'change_obj': change_obj, 'type': member_type,
485 486 'id': member_id, 'name': member_name, 'new_perm': perm})
486 487
487 488 # if it's not recursive call for all,repos,groups
488 489 # break the loop and don't proceed with other changes
489 490 if recursive not in ['all', 'repos', 'groups']:
490 491 break
491 492
492 493 return changes
493 494
494 495 def update(self, repo_group, form_data):
495 496 try:
496 497 repo_group = self._get_repo_group(repo_group)
497 498 old_path = repo_group.full_path
498 499
499 500 # change properties
500 501 if 'group_description' in form_data:
501 502 repo_group.group_description = form_data['group_description']
502 503
503 504 if 'enable_locking' in form_data:
504 505 repo_group.enable_locking = form_data['enable_locking']
505 506
506 507 if 'group_parent_id' in form_data:
507 508 parent_group = (
508 509 self._get_repo_group(form_data['group_parent_id']))
509 510 repo_group.group_parent_id = (
510 511 parent_group.group_id if parent_group else None)
511 512 repo_group.parent_group = parent_group
512 513
513 514 # mikhail: to update the full_path, we have to explicitly
514 515 # update group_name
515 516 group_name = form_data.get('group_name', repo_group.name)
516 517 repo_group.group_name = repo_group.get_new_name(group_name)
517 518
518 519 new_path = repo_group.full_path
519 520
520 521 if 'user' in form_data:
521 522 repo_group.user = User.get_by_username(form_data['user'])
522 repo_group.updated_on = datetime.datetime.now()
523
523 524 self.sa.add(repo_group)
524 525
525 526 # iterate over all members of this groups and do fixes
526 527 # set locking if given
527 528 # if obj is a repoGroup also fix the name of the group according
528 529 # to the parent
529 530 # if obj is a Repo fix it's name
530 531 # this can be potentially heavy operation
531 532 for obj in repo_group.recursive_groups_and_repos():
532 533 # set the value from it's parent
533 534 obj.enable_locking = repo_group.enable_locking
534 535 if isinstance(obj, RepoGroup):
535 536 new_name = obj.get_new_name(obj.name)
536 537 log.debug('Fixing group %s to new name %s',
537 538 obj.group_name, new_name)
538 539 obj.group_name = new_name
539 obj.updated_on = datetime.datetime.now()
540
540 541 elif isinstance(obj, Repository):
541 542 # we need to get all repositories from this new group and
542 543 # rename them accordingly to new group path
543 544 new_name = obj.get_new_name(obj.just_name)
544 545 log.debug('Fixing repo %s to new name %s',
545 546 obj.repo_name, new_name)
546 547 obj.repo_name = new_name
547 obj.updated_on = datetime.datetime.now()
548
548 549 self.sa.add(obj)
549 550
550 551 self._rename_group(old_path, new_path)
551 552
552 553 # Trigger update event.
553 554 events.trigger(events.RepoGroupUpdateEvent(repo_group))
554 555
555 556 return repo_group
556 557 except Exception:
557 558 log.error(traceback.format_exc())
558 559 raise
559 560
560 561 def delete(self, repo_group, force_delete=False, fs_remove=True):
561 562 repo_group = self._get_repo_group(repo_group)
562 563 if not repo_group:
563 564 return False
564 565 try:
565 566 self.sa.delete(repo_group)
566 567 if fs_remove:
567 568 self._delete_filesystem_group(repo_group, force_delete)
568 569 else:
569 570 log.debug('skipping removal from filesystem')
570 571
571 572 # Trigger delete event.
572 573 events.trigger(events.RepoGroupDeleteEvent(repo_group))
573 574 return True
574 575
575 576 except Exception:
576 577 log.error('Error removing repo_group %s', repo_group)
577 578 raise
578 579
579 580 def grant_user_permission(self, repo_group, user, perm):
580 581 """
581 582 Grant permission for user on given repository group, or update
582 583 existing one if found
583 584
584 585 :param repo_group: Instance of RepoGroup, repositories_group_id,
585 586 or repositories_group name
586 587 :param user: Instance of User, user_id or username
587 588 :param perm: Instance of Permission, or permission_name
588 589 """
589 590
590 591 repo_group = self._get_repo_group(repo_group)
591 592 user = self._get_user(user)
592 593 permission = self._get_perm(perm)
593 594
594 595 # check if we have that permission already
595 596 obj = self.sa.query(UserRepoGroupToPerm)\
596 597 .filter(UserRepoGroupToPerm.user == user)\
597 598 .filter(UserRepoGroupToPerm.group == repo_group)\
598 599 .scalar()
599 600 if obj is None:
600 601 # create new !
601 602 obj = UserRepoGroupToPerm()
602 603 obj.group = repo_group
603 604 obj.user = user
604 605 obj.permission = permission
605 606 self.sa.add(obj)
606 607 log.debug('Granted perm %s to %s on %s', perm, user, repo_group)
607 608 action_logger_generic(
608 609 'granted permission: {} to user: {} on repogroup: {}'.format(
609 610 perm, user, repo_group), namespace='security.repogroup')
610 611 return obj
611 612
612 613 def revoke_user_permission(self, repo_group, user):
613 614 """
614 615 Revoke permission for user on given repository group
615 616
616 617 :param repo_group: Instance of RepoGroup, repositories_group_id,
617 618 or repositories_group name
618 619 :param user: Instance of User, user_id or username
619 620 """
620 621
621 622 repo_group = self._get_repo_group(repo_group)
622 623 user = self._get_user(user)
623 624
624 625 obj = self.sa.query(UserRepoGroupToPerm)\
625 626 .filter(UserRepoGroupToPerm.user == user)\
626 627 .filter(UserRepoGroupToPerm.group == repo_group)\
627 628 .scalar()
628 629 if obj:
629 630 self.sa.delete(obj)
630 631 log.debug('Revoked perm on %s on %s', repo_group, user)
631 632 action_logger_generic(
632 633 'revoked permission from user: {} on repogroup: {}'.format(
633 634 user, repo_group), namespace='security.repogroup')
634 635
635 636 def grant_user_group_permission(self, repo_group, group_name, perm):
636 637 """
637 638 Grant permission for user group on given repository group, or update
638 639 existing one if found
639 640
640 641 :param repo_group: Instance of RepoGroup, repositories_group_id,
641 642 or repositories_group name
642 643 :param group_name: Instance of UserGroup, users_group_id,
643 644 or user group name
644 645 :param perm: Instance of Permission, or permission_name
645 646 """
646 647 repo_group = self._get_repo_group(repo_group)
647 648 group_name = self._get_user_group(group_name)
648 649 permission = self._get_perm(perm)
649 650
650 651 # check if we have that permission already
651 652 obj = self.sa.query(UserGroupRepoGroupToPerm)\
652 653 .filter(UserGroupRepoGroupToPerm.group == repo_group)\
653 654 .filter(UserGroupRepoGroupToPerm.users_group == group_name)\
654 655 .scalar()
655 656
656 657 if obj is None:
657 658 # create new
658 659 obj = UserGroupRepoGroupToPerm()
659 660
660 661 obj.group = repo_group
661 662 obj.users_group = group_name
662 663 obj.permission = permission
663 664 self.sa.add(obj)
664 665 log.debug('Granted perm %s to %s on %s', perm, group_name, repo_group)
665 666 action_logger_generic(
666 667 'granted permission: {} to usergroup: {} on repogroup: {}'.format(
667 668 perm, group_name, repo_group), namespace='security.repogroup')
668 669 return obj
669 670
670 671 def revoke_user_group_permission(self, repo_group, group_name):
671 672 """
672 673 Revoke permission for user group on given repository group
673 674
674 675 :param repo_group: Instance of RepoGroup, repositories_group_id,
675 676 or repositories_group name
676 677 :param group_name: Instance of UserGroup, users_group_id,
677 678 or user group name
678 679 """
679 680 repo_group = self._get_repo_group(repo_group)
680 681 group_name = self._get_user_group(group_name)
681 682
682 683 obj = self.sa.query(UserGroupRepoGroupToPerm)\
683 684 .filter(UserGroupRepoGroupToPerm.group == repo_group)\
684 685 .filter(UserGroupRepoGroupToPerm.users_group == group_name)\
685 686 .scalar()
686 687 if obj:
687 688 self.sa.delete(obj)
688 689 log.debug('Revoked perm to %s on %s', repo_group, group_name)
689 690 action_logger_generic(
690 691 'revoked permission from usergroup: {} on repogroup: {}'.format(
691 692 group_name, repo_group), namespace='security.repogroup')
692 693
693 694 @classmethod
694 695 def update_commit_cache(cls, repo_groups=None):
695 696 if not repo_groups:
696 697 repo_groups = RepoGroup.getAll()
697 698 for repo_group in repo_groups:
698 699 repo_group.update_commit_cache()
699 700
700 701 def get_repo_groups_as_dict(self, repo_group_list=None, admin=False,
701 702 super_user_actions=False):
702 703
703 704 from pyramid.threadlocal import get_current_request
704 705 _render = get_current_request().get_partial_renderer(
705 706 'rhodecode:templates/data_table/_dt_elements.mako')
706 707 c = _render.get_call_context()
707 708 h = _render.get_helpers()
708 709
709 710 def quick_menu(repo_group_name):
710 711 return _render('quick_repo_group_menu', repo_group_name)
711 712
712 713 def repo_group_lnk(repo_group_name):
713 714 return _render('repo_group_name', repo_group_name)
714 715
715 716 def last_change(last_change):
716 717 if admin and isinstance(last_change, datetime.datetime) and not last_change.tzinfo:
717 last_change = last_change + datetime.timedelta(seconds=
718 (datetime.datetime.now() - datetime.datetime.utcnow()).seconds)
718 ts = time.time()
719 utc_offset = (datetime.datetime.fromtimestamp(ts)
720 - datetime.datetime.utcfromtimestamp(ts)).total_seconds()
721 last_change = last_change + datetime.timedelta(seconds=utc_offset)
719 722 return _render("last_change", last_change)
720 723
721 724 def last_rev(repo_name, cs_cache):
722 725 return _render('revision', repo_name, cs_cache.get('revision'),
723 726 cs_cache.get('raw_id'), cs_cache.get('author'),
724 727 cs_cache.get('message'), cs_cache.get('date'))
725 728
726 729 def desc(desc, personal):
727 730 return _render(
728 731 'repo_group_desc', desc, personal, c.visual.stylify_metatags)
729 732
730 733 def repo_group_actions(repo_group_id, repo_group_name, gr_count):
731 734 return _render(
732 735 'repo_group_actions', repo_group_id, repo_group_name, gr_count)
733 736
734 737 def repo_group_name(repo_group_name, children_groups):
735 738 return _render("repo_group_name", repo_group_name, children_groups)
736 739
737 740 def user_profile(username):
738 741 return _render('user_profile', username)
739 742
740 743 repo_group_data = []
741 744 for group in repo_group_list:
742 745 cs_cache = group.changeset_cache
743 746 last_repo_name = cs_cache.get('source_repo_name')
744 747
745 748 row = {
746 749 "menu": quick_menu(group.group_name),
747 750 "name": repo_group_lnk(group.group_name),
748 751 "name_raw": group.group_name,
749 752 "last_change": last_change(group.last_commit_change),
750 753 "last_change_raw": datetime_to_time(group.last_commit_change),
751 754
752 755 "last_changeset": "",
753 756 "last_changeset_raw": "",
754 757
755 758 "desc": desc(group.description_safe, group.personal),
756 759 "top_level_repos": 0,
757 760 "owner": user_profile(group.user.username)
758 761 }
759 762 if admin:
760 763 repo_count = group.repositories.count()
761 764 children_groups = map(
762 765 h.safe_unicode,
763 766 itertools.chain((g.name for g in group.parents),
764 767 (x.name for x in [group])))
765 768 row.update({
766 769 "action": repo_group_actions(
767 770 group.group_id, group.group_name, repo_count),
768 771 "top_level_repos": repo_count,
769 772 "name": repo_group_name(group.group_name, children_groups),
770 773
771 774 })
772 775 repo_group_data.append(row)
773 776
774 777 return repo_group_data
775 778
776 779 def _get_defaults(self, repo_group_name):
777 780 repo_group = RepoGroup.get_by_group_name(repo_group_name)
778 781
779 782 if repo_group is None:
780 783 return None
781 784
782 785 defaults = repo_group.get_dict()
783 786 defaults['repo_group_name'] = repo_group.name
784 787 defaults['repo_group_description'] = repo_group.group_description
785 788 defaults['repo_group_enable_locking'] = repo_group.enable_locking
786 789
787 790 # we use -1 as this is how in HTML, we mark an empty group
788 791 defaults['repo_group'] = defaults['group_parent_id'] or -1
789 792
790 793 # fill owner
791 794 if repo_group.user:
792 795 defaults.update({'user': repo_group.user.username})
793 796 else:
794 797 replacement_user = User.get_first_super_admin().username
795 798 defaults.update({'user': replacement_user})
796 799
797 800 return defaults
General Comments 0
You need to be logged in to leave comments. Login now