##// END OF EJS Templates
core: added more accurate time measurement for called functions
marcink -
r3853:5f8c0244 default
parent child Browse files
Show More

The requested changes are too big and content was truncated. Show full diff

@@ -1,154 +1,154 b''
1 """
1 """
2 gunicorn config extension and hooks. Sets additional configuration that is
2 gunicorn config extension and hooks. Sets additional configuration that is
3 available post the .ini config.
3 available post the .ini config.
4
4
5 - workers = ${cpu_number}
5 - workers = ${cpu_number}
6 - threads = 1
6 - threads = 1
7 - proc_name = ${gunicorn_proc_name}
7 - proc_name = ${gunicorn_proc_name}
8 - worker_class = sync
8 - worker_class = sync
9 - worker_connections = 10
9 - worker_connections = 10
10 - max_requests = 1000
10 - max_requests = 1000
11 - max_requests_jitter = 30
11 - max_requests_jitter = 30
12 - timeout = 21600
12 - timeout = 21600
13
13
14 """
14 """
15
15
16 import multiprocessing
16 import multiprocessing
17 import sys
17 import sys
18 import time
18 import time
19 import datetime
19 import datetime
20 import threading
20 import threading
21 import traceback
21 import traceback
22 from gunicorn.glogging import Logger
22 from gunicorn.glogging import Logger
23
23
24
24
25 # GLOBAL
25 # GLOBAL
26 errorlog = '-'
26 errorlog = '-'
27 accesslog = '-'
27 accesslog = '-'
28 loglevel = 'debug'
28 loglevel = 'debug'
29
29
30 # SECURITY
30 # SECURITY
31
31
32 # The maximum size of HTTP request line in bytes.
32 # The maximum size of HTTP request line in bytes.
33 # 0 for unlimited
33 # 0 for unlimited
34 limit_request_line = 0
34 limit_request_line = 0
35
35
36 # Limit the number of HTTP headers fields in a request.
36 # Limit the number of HTTP headers fields in a request.
37 # By default this value is 100 and can’t be larger than 32768.
37 # By default this value is 100 and can’t be larger than 32768.
38 limit_request_fields = 10240
38 limit_request_fields = 10240
39
39
40 # Limit the allowed size of an HTTP request header field.
40 # Limit the allowed size of an HTTP request header field.
41 # Value is a positive number or 0.
41 # Value is a positive number or 0.
42 # Setting it to 0 will allow unlimited header field sizes.
42 # Setting it to 0 will allow unlimited header field sizes.
43 limit_request_field_size = 0
43 limit_request_field_size = 0
44
44
45
45
46 # Timeout for graceful workers restart.
46 # Timeout for graceful workers restart.
47 # After receiving a restart signal, workers have this much time to finish
47 # After receiving a restart signal, workers have this much time to finish
48 # serving requests. Workers still alive after the timeout (starting from the
48 # serving requests. Workers still alive after the timeout (starting from the
49 # receipt of the restart signal) are force killed.
49 # receipt of the restart signal) are force killed.
50 graceful_timeout = 30
50 graceful_timeout = 30
51
51
52
52
53 # The number of seconds to wait for requests on a Keep-Alive connection.
53 # The number of seconds to wait for requests on a Keep-Alive connection.
54 # Generally set in the 1-5 seconds range.
54 # Generally set in the 1-5 seconds range.
55 keepalive = 2
55 keepalive = 2
56
56
57
57
58 # SERVER MECHANICS
58 # SERVER MECHANICS
59 # None == system temp dir
59 # None == system temp dir
60 # worker_tmp_dir is recommended to be set to some tmpfs
60 # worker_tmp_dir is recommended to be set to some tmpfs
61 worker_tmp_dir = None
61 worker_tmp_dir = None
62 tmp_upload_dir = None
62 tmp_upload_dir = None
63
63
64 # Custom log format
64 # Custom log format
65 access_log_format = (
65 access_log_format = (
66 '%(t)s [%(p)-8s] GNCRN %(h)-15s rqt:%(L)s %(s)s %(b)-6s "%(m)s:%(U)s %(q)s" usr:%(u)s "%(f)s" "%(a)s"')
66 '%(t)s [%(p)-8s] GNCRN %(h)-15s rqt:%(L)s %(s)s %(b)-6s "%(m)s:%(U)s %(q)s" usr:%(u)s "%(f)s" "%(a)s"')
67
67
68 # self adjust workers based on CPU count
68 # self adjust workers based on CPU count
69 # workers = multiprocessing.cpu_count() * 2 + 1
69 # workers = multiprocessing.cpu_count() * 2 + 1
70
70
71
71
72 def post_fork(server, worker):
72 def post_fork(server, worker):
73 server.log.info("[<%-10s>] WORKER spawned", worker.pid)
73 server.log.info("[<%-10s>] WORKER spawned", worker.pid)
74
74
75
75
76 def pre_fork(server, worker):
76 def pre_fork(server, worker):
77 pass
77 pass
78
78
79
79
80 def pre_exec(server):
80 def pre_exec(server):
81 server.log.info("Forked child, re-executing.")
81 server.log.info("Forked child, re-executing.")
82
82
83
83
84 def on_starting(server):
84 def on_starting(server):
85 server.log.info("Server is starting.")
85 server.log.info("Server is starting.")
86
86
87
87
88 def when_ready(server):
88 def when_ready(server):
89 server.log.info("Server is ready. Spawning workers")
89 server.log.info("Server is ready. Spawning workers")
90
90
91
91
92 def on_reload(server):
92 def on_reload(server):
93 pass
93 pass
94
94
95
95
96 def worker_int(worker):
96 def worker_int(worker):
97 worker.log.info("[<%-10s>] worker received INT or QUIT signal", worker.pid)
97 worker.log.info("[<%-10s>] worker received INT or QUIT signal", worker.pid)
98
98
99 # get traceback info, on worker crash
99 # get traceback info, on worker crash
100 id2name = dict([(th.ident, th.name) for th in threading.enumerate()])
100 id2name = dict([(th.ident, th.name) for th in threading.enumerate()])
101 code = []
101 code = []
102 for thread_id, stack in sys._current_frames().items():
102 for thread_id, stack in sys._current_frames().items():
103 code.append(
103 code.append(
104 "\n# Thread: %s(%d)" % (id2name.get(thread_id, ""), thread_id))
104 "\n# Thread: %s(%d)" % (id2name.get(thread_id, ""), thread_id))
105 for fname, lineno, name, line in traceback.extract_stack(stack):
105 for fname, lineno, name, line in traceback.extract_stack(stack):
106 code.append('File: "%s", line %d, in %s' % (fname, lineno, name))
106 code.append('File: "%s", line %d, in %s' % (fname, lineno, name))
107 if line:
107 if line:
108 code.append(" %s" % (line.strip()))
108 code.append(" %s" % (line.strip()))
109 worker.log.debug("\n".join(code))
109 worker.log.debug("\n".join(code))
110
110
111
111
112 def worker_abort(worker):
112 def worker_abort(worker):
113 worker.log.info("[<%-10s>] worker received SIGABRT signal", worker.pid)
113 worker.log.info("[<%-10s>] worker received SIGABRT signal", worker.pid)
114
114
115
115
116 def worker_exit(server, worker):
116 def worker_exit(server, worker):
117 worker.log.info("[<%-10s>] worker exit", worker.pid)
117 worker.log.info("[<%-10s>] worker exit", worker.pid)
118
118
119
119
120 def child_exit(server, worker):
120 def child_exit(server, worker):
121 worker.log.info("[<%-10s>] worker child exit", worker.pid)
121 worker.log.info("[<%-10s>] worker child exit", worker.pid)
122
122
123
123
124 def pre_request(worker, req):
124 def pre_request(worker, req):
125 worker.start_time = time.time()
125 worker.start_time = time.time()
126 worker.log.debug(
126 worker.log.debug(
127 "GNCRN PRE WORKER [cnt:%s]: %s %s", worker.nr, req.method, req.path)
127 "GNCRN PRE WORKER [cnt:%s]: %s %s", worker.nr, req.method, req.path)
128
128
129
129
130 def post_request(worker, req, environ, resp):
130 def post_request(worker, req, environ, resp):
131 total_time = time.time() - worker.start_time
131 total_time = time.time() - worker.start_time
132 worker.log.debug(
132 worker.log.debug(
133 "GNCRN POST WORKER [cnt:%s]: %s %s resp: %s, Load Time: %.3fs",
133 "GNCRN POST WORKER [cnt:%s]: %s %s resp: %s, Load Time: %.4fs",
134 worker.nr, req.method, req.path, resp.status_code, total_time)
134 worker.nr, req.method, req.path, resp.status_code, total_time)
135
135
136
136
137 class RhodeCodeLogger(Logger):
137 class RhodeCodeLogger(Logger):
138 """
138 """
139 Custom Logger that allows some customization that gunicorn doesn't allow
139 Custom Logger that allows some customization that gunicorn doesn't allow
140 """
140 """
141
141
142 datefmt = r"%Y-%m-%d %H:%M:%S"
142 datefmt = r"%Y-%m-%d %H:%M:%S"
143
143
144 def __init__(self, cfg):
144 def __init__(self, cfg):
145 Logger.__init__(self, cfg)
145 Logger.__init__(self, cfg)
146
146
147 def now(self):
147 def now(self):
148 """ return date in RhodeCode Log format """
148 """ return date in RhodeCode Log format """
149 now = time.time()
149 now = time.time()
150 msecs = int((now - long(now)) * 1000)
150 msecs = int((now - long(now)) * 1000)
151 return time.strftime(self.datefmt, time.localtime(now)) + '.{0:03d}'.format(msecs)
151 return time.strftime(self.datefmt, time.localtime(now)) + '.{0:03d}'.format(msecs)
152
152
153
153
154 logger_class = RhodeCodeLogger
154 logger_class = RhodeCodeLogger
@@ -1,112 +1,112 b''
1 # -*- coding: utf-8 -*-
1 # -*- coding: utf-8 -*-
2
2
3 # Copyright (C) 2011-2019 RhodeCode GmbH
3 # Copyright (C) 2011-2019 RhodeCode GmbH
4 #
4 #
5 # This program is free software: you can redistribute it and/or modify
5 # This program is free software: you can redistribute it and/or modify
6 # it under the terms of the GNU Affero General Public License, version 3
6 # it under the terms of the GNU Affero General Public License, version 3
7 # (only), as published by the Free Software Foundation.
7 # (only), as published by the Free Software Foundation.
8 #
8 #
9 # This program is distributed in the hope that it will be useful,
9 # This program is distributed in the hope that it will be useful,
10 # but WITHOUT ANY WARRANTY; without even the implied warranty of
10 # but WITHOUT ANY WARRANTY; without even the implied warranty of
11 # MERCHANTABILITY or FITNESS FOR A PARTICULAR PURPOSE. See the
11 # MERCHANTABILITY or FITNESS FOR A PARTICULAR PURPOSE. See the
12 # GNU General Public License for more details.
12 # GNU General Public License for more details.
13 #
13 #
14 # You should have received a copy of the GNU Affero General Public License
14 # You should have received a copy of the GNU Affero General Public License
15 # along with this program. If not, see <http://www.gnu.org/licenses/>.
15 # along with this program. If not, see <http://www.gnu.org/licenses/>.
16 #
16 #
17 # This program is dual-licensed. If you wish to learn more about the
17 # This program is dual-licensed. If you wish to learn more about the
18 # RhodeCode Enterprise Edition, including its added features, Support services,
18 # RhodeCode Enterprise Edition, including its added features, Support services,
19 # and proprietary license terms, please see https://rhodecode.com/licenses/
19 # and proprietary license terms, please see https://rhodecode.com/licenses/
20
20
21
21
22 import logging
22 import logging
23
23
24 from rhodecode.api import jsonrpc_method
24 from rhodecode.api import jsonrpc_method
25 from rhodecode.api.exc import JSONRPCValidationError
25 from rhodecode.api.exc import JSONRPCValidationError
26 from rhodecode.api.utils import Optional
26 from rhodecode.api.utils import Optional
27 from rhodecode.lib.index import searcher_from_config
27 from rhodecode.lib.index import searcher_from_config
28 from rhodecode.model import validation_schema
28 from rhodecode.model import validation_schema
29 from rhodecode.model.validation_schema.schemas import search_schema
29 from rhodecode.model.validation_schema.schemas import search_schema
30
30
31 log = logging.getLogger(__name__)
31 log = logging.getLogger(__name__)
32
32
33
33
34 @jsonrpc_method()
34 @jsonrpc_method()
35 def search(request, apiuser, search_query, search_type, page_limit=Optional(10),
35 def search(request, apiuser, search_query, search_type, page_limit=Optional(10),
36 page=Optional(1), search_sort=Optional('newfirst'),
36 page=Optional(1), search_sort=Optional('newfirst'),
37 repo_name=Optional(None), repo_group_name=Optional(None)):
37 repo_name=Optional(None), repo_group_name=Optional(None)):
38 """
38 """
39 Fetch Full Text Search results using API.
39 Fetch Full Text Search results using API.
40
40
41 :param apiuser: This is filled automatically from the |authtoken|.
41 :param apiuser: This is filled automatically from the |authtoken|.
42 :type apiuser: AuthUser
42 :type apiuser: AuthUser
43 :param search_query: Search query.
43 :param search_query: Search query.
44 :type search_query: str
44 :type search_query: str
45 :param search_type: Search type. The following are valid options:
45 :param search_type: Search type. The following are valid options:
46 * commit
46 * commit
47 * content
47 * content
48 * path
48 * path
49 :type search_type: str
49 :type search_type: str
50 :param page_limit: Page item limit, from 1 to 500. Default 10 items.
50 :param page_limit: Page item limit, from 1 to 500. Default 10 items.
51 :type page_limit: Optional(int)
51 :type page_limit: Optional(int)
52 :param page: Page number. Default first page.
52 :param page: Page number. Default first page.
53 :type page: Optional(int)
53 :type page: Optional(int)
54 :param search_sort: Search sort order. Default newfirst. The following are valid options:
54 :param search_sort: Search sort order. Default newfirst. The following are valid options:
55 * newfirst
55 * newfirst
56 * oldfirst
56 * oldfirst
57 :type search_sort: Optional(str)
57 :type search_sort: Optional(str)
58 :param repo_name: Filter by one repo. Default is all.
58 :param repo_name: Filter by one repo. Default is all.
59 :type repo_name: Optional(str)
59 :type repo_name: Optional(str)
60 :param repo_group_name: Filter by one repo group. Default is all.
60 :param repo_group_name: Filter by one repo group. Default is all.
61 :type repo_group_name: Optional(str)
61 :type repo_group_name: Optional(str)
62 """
62 """
63
63
64 data = {'execution_time': ''}
64 data = {'execution_time': ''}
65 repo_name = Optional.extract(repo_name)
65 repo_name = Optional.extract(repo_name)
66 repo_group_name = Optional.extract(repo_group_name)
66 repo_group_name = Optional.extract(repo_group_name)
67
67
68 schema = search_schema.SearchParamsSchema()
68 schema = search_schema.SearchParamsSchema()
69
69
70 try:
70 try:
71 search_params = schema.deserialize(
71 search_params = schema.deserialize(
72 dict(search_query=search_query,
72 dict(search_query=search_query,
73 search_type=search_type,
73 search_type=search_type,
74 search_sort=Optional.extract(search_sort),
74 search_sort=Optional.extract(search_sort),
75 page_limit=Optional.extract(page_limit),
75 page_limit=Optional.extract(page_limit),
76 requested_page=Optional.extract(page))
76 requested_page=Optional.extract(page))
77 )
77 )
78 except validation_schema.Invalid as err:
78 except validation_schema.Invalid as err:
79 raise JSONRPCValidationError(colander_exc=err)
79 raise JSONRPCValidationError(colander_exc=err)
80
80
81 search_query = search_params.get('search_query')
81 search_query = search_params.get('search_query')
82 search_type = search_params.get('search_type')
82 search_type = search_params.get('search_type')
83 search_sort = search_params.get('search_sort')
83 search_sort = search_params.get('search_sort')
84
84
85 if search_params.get('search_query'):
85 if search_params.get('search_query'):
86 page_limit = search_params['page_limit']
86 page_limit = search_params['page_limit']
87 requested_page = search_params['requested_page']
87 requested_page = search_params['requested_page']
88
88
89 searcher = searcher_from_config(request.registry.settings)
89 searcher = searcher_from_config(request.registry.settings)
90
90
91 try:
91 try:
92 search_result = searcher.search(
92 search_result = searcher.search(
93 search_query, search_type, apiuser, repo_name, repo_group_name,
93 search_query, search_type, apiuser, repo_name, repo_group_name,
94 requested_page=requested_page, page_limit=page_limit, sort=search_sort)
94 requested_page=requested_page, page_limit=page_limit, sort=search_sort)
95
95
96 data.update(dict(
96 data.update(dict(
97 results=list(search_result['results']), page=requested_page,
97 results=list(search_result['results']), page=requested_page,
98 item_count=search_result['count'],
98 item_count=search_result['count'],
99 items_per_page=page_limit))
99 items_per_page=page_limit))
100 finally:
100 finally:
101 searcher.cleanup()
101 searcher.cleanup()
102
102
103 if not search_result['error']:
103 if not search_result['error']:
104 data['execution_time'] = '%s results (%.3f seconds)' % (
104 data['execution_time'] = '%s results (%.4f seconds)' % (
105 search_result['count'],
105 search_result['count'],
106 search_result['runtime'])
106 search_result['runtime'])
107 else:
107 else:
108 node = schema['search_query']
108 node = schema['search_query']
109 raise JSONRPCValidationError(
109 raise JSONRPCValidationError(
110 colander_exc=validation_schema.Invalid(node, search_result['error']))
110 colander_exc=validation_schema.Invalid(node, search_result['error']))
111
111
112 return data
112 return data
@@ -1,242 +1,242 b''
1 # -*- coding: utf-8 -*-
1 # -*- coding: utf-8 -*-
2
2
3 # Copyright (C) 2017-2019 RhodeCode GmbH
3 # Copyright (C) 2017-2019 RhodeCode GmbH
4 #
4 #
5 # This program is free software: you can redistribute it and/or modify
5 # This program is free software: you can redistribute it and/or modify
6 # it under the terms of the GNU Affero General Public License, version 3
6 # it under the terms of the GNU Affero General Public License, version 3
7 # (only), as published by the Free Software Foundation.
7 # (only), as published by the Free Software Foundation.
8 #
8 #
9 # This program is distributed in the hope that it will be useful,
9 # This program is distributed in the hope that it will be useful,
10 # but WITHOUT ANY WARRANTY; without even the implied warranty of
10 # but WITHOUT ANY WARRANTY; without even the implied warranty of
11 # MERCHANTABILITY or FITNESS FOR A PARTICULAR PURPOSE. See the
11 # MERCHANTABILITY or FITNESS FOR A PARTICULAR PURPOSE. See the
12 # GNU General Public License for more details.
12 # GNU General Public License for more details.
13 #
13 #
14 # You should have received a copy of the GNU Affero General Public License
14 # You should have received a copy of the GNU Affero General Public License
15 # along with this program. If not, see <http://www.gnu.org/licenses/>.
15 # along with this program. If not, see <http://www.gnu.org/licenses/>.
16 #
16 #
17 # This program is dual-licensed. If you wish to learn more about the
17 # This program is dual-licensed. If you wish to learn more about the
18 # RhodeCode Enterprise Edition, including its added features, Support services,
18 # RhodeCode Enterprise Edition, including its added features, Support services,
19 # and proprietary license terms, please see https://rhodecode.com/licenses/
19 # and proprietary license terms, please see https://rhodecode.com/licenses/
20 import pytz
20 import pytz
21 import logging
21 import logging
22
22
23 from pyramid.view import view_config
23 from pyramid.view import view_config
24 from pyramid.response import Response
24 from pyramid.response import Response
25 from webhelpers.feedgenerator import Rss201rev2Feed, Atom1Feed
25 from webhelpers.feedgenerator import Rss201rev2Feed, Atom1Feed
26
26
27 from rhodecode.apps._base import RepoAppView
27 from rhodecode.apps._base import RepoAppView
28 from rhodecode.lib import audit_logger
28 from rhodecode.lib import audit_logger
29 from rhodecode.lib import rc_cache
29 from rhodecode.lib import rc_cache
30 from rhodecode.lib import helpers as h
30 from rhodecode.lib import helpers as h
31 from rhodecode.lib.auth import (
31 from rhodecode.lib.auth import (
32 LoginRequired, HasRepoPermissionAnyDecorator)
32 LoginRequired, HasRepoPermissionAnyDecorator)
33 from rhodecode.lib.diffs import DiffProcessor, LimitedDiffContainer
33 from rhodecode.lib.diffs import DiffProcessor, LimitedDiffContainer
34 from rhodecode.lib.utils2 import str2bool, safe_int, md5_safe
34 from rhodecode.lib.utils2 import str2bool, safe_int, md5_safe
35 from rhodecode.model.db import UserApiKeys, CacheKey
35 from rhodecode.model.db import UserApiKeys, CacheKey
36
36
37 log = logging.getLogger(__name__)
37 log = logging.getLogger(__name__)
38
38
39
39
40 class RepoFeedView(RepoAppView):
40 class RepoFeedView(RepoAppView):
41 def load_default_context(self):
41 def load_default_context(self):
42 c = self._get_local_tmpl_context()
42 c = self._get_local_tmpl_context()
43 self._load_defaults()
43 self._load_defaults()
44 return c
44 return c
45
45
46 def _get_config(self):
46 def _get_config(self):
47 import rhodecode
47 import rhodecode
48 config = rhodecode.CONFIG
48 config = rhodecode.CONFIG
49
49
50 return {
50 return {
51 'language': 'en-us',
51 'language': 'en-us',
52 'feed_ttl': '5', # TTL of feed,
52 'feed_ttl': '5', # TTL of feed,
53 'feed_include_diff':
53 'feed_include_diff':
54 str2bool(config.get('rss_include_diff', False)),
54 str2bool(config.get('rss_include_diff', False)),
55 'feed_items_per_page':
55 'feed_items_per_page':
56 safe_int(config.get('rss_items_per_page', 20)),
56 safe_int(config.get('rss_items_per_page', 20)),
57 'feed_diff_limit':
57 'feed_diff_limit':
58 # we need to protect from parsing huge diffs here other way
58 # we need to protect from parsing huge diffs here other way
59 # we can kill the server
59 # we can kill the server
60 safe_int(config.get('rss_cut_off_limit', 32 * 1024)),
60 safe_int(config.get('rss_cut_off_limit', 32 * 1024)),
61 }
61 }
62
62
63 def _load_defaults(self):
63 def _load_defaults(self):
64 _ = self.request.translate
64 _ = self.request.translate
65 config = self._get_config()
65 config = self._get_config()
66 # common values for feeds
66 # common values for feeds
67 self.description = _('Changes on %s repository')
67 self.description = _('Changes on %s repository')
68 self.title = self.title = _('%s %s feed') % (self.db_repo_name, '%s')
68 self.title = self.title = _('%s %s feed') % (self.db_repo_name, '%s')
69 self.language = config["language"]
69 self.language = config["language"]
70 self.ttl = config["feed_ttl"]
70 self.ttl = config["feed_ttl"]
71 self.feed_include_diff = config['feed_include_diff']
71 self.feed_include_diff = config['feed_include_diff']
72 self.feed_diff_limit = config['feed_diff_limit']
72 self.feed_diff_limit = config['feed_diff_limit']
73 self.feed_items_per_page = config['feed_items_per_page']
73 self.feed_items_per_page = config['feed_items_per_page']
74
74
75 def _changes(self, commit):
75 def _changes(self, commit):
76 diff_processor = DiffProcessor(
76 diff_processor = DiffProcessor(
77 commit.diff(), diff_limit=self.feed_diff_limit)
77 commit.diff(), diff_limit=self.feed_diff_limit)
78 _parsed = diff_processor.prepare(inline_diff=False)
78 _parsed = diff_processor.prepare(inline_diff=False)
79 limited_diff = isinstance(_parsed, LimitedDiffContainer)
79 limited_diff = isinstance(_parsed, LimitedDiffContainer)
80
80
81 return diff_processor, _parsed, limited_diff
81 return diff_processor, _parsed, limited_diff
82
82
83 def _get_title(self, commit):
83 def _get_title(self, commit):
84 return h.shorter(commit.message, 160)
84 return h.shorter(commit.message, 160)
85
85
86 def _get_description(self, commit):
86 def _get_description(self, commit):
87 _renderer = self.request.get_partial_renderer(
87 _renderer = self.request.get_partial_renderer(
88 'rhodecode:templates/feed/atom_feed_entry.mako')
88 'rhodecode:templates/feed/atom_feed_entry.mako')
89 diff_processor, parsed_diff, limited_diff = self._changes(commit)
89 diff_processor, parsed_diff, limited_diff = self._changes(commit)
90 filtered_parsed_diff, has_hidden_changes = self.path_filter.filter_patchset(parsed_diff)
90 filtered_parsed_diff, has_hidden_changes = self.path_filter.filter_patchset(parsed_diff)
91 return _renderer(
91 return _renderer(
92 'body',
92 'body',
93 commit=commit,
93 commit=commit,
94 parsed_diff=filtered_parsed_diff,
94 parsed_diff=filtered_parsed_diff,
95 limited_diff=limited_diff,
95 limited_diff=limited_diff,
96 feed_include_diff=self.feed_include_diff,
96 feed_include_diff=self.feed_include_diff,
97 diff_processor=diff_processor,
97 diff_processor=diff_processor,
98 has_hidden_changes=has_hidden_changes
98 has_hidden_changes=has_hidden_changes
99 )
99 )
100
100
101 def _set_timezone(self, date, tzinfo=pytz.utc):
101 def _set_timezone(self, date, tzinfo=pytz.utc):
102 if not getattr(date, "tzinfo", None):
102 if not getattr(date, "tzinfo", None):
103 date.replace(tzinfo=tzinfo)
103 date.replace(tzinfo=tzinfo)
104 return date
104 return date
105
105
106 def _get_commits(self):
106 def _get_commits(self):
107 return list(self.rhodecode_vcs_repo[-self.feed_items_per_page:])
107 return list(self.rhodecode_vcs_repo[-self.feed_items_per_page:])
108
108
109 def uid(self, repo_id, commit_id):
109 def uid(self, repo_id, commit_id):
110 return '{}:{}'.format(md5_safe(repo_id), md5_safe(commit_id))
110 return '{}:{}'.format(md5_safe(repo_id), md5_safe(commit_id))
111
111
112 @LoginRequired(auth_token_access=[UserApiKeys.ROLE_FEED])
112 @LoginRequired(auth_token_access=[UserApiKeys.ROLE_FEED])
113 @HasRepoPermissionAnyDecorator(
113 @HasRepoPermissionAnyDecorator(
114 'repository.read', 'repository.write', 'repository.admin')
114 'repository.read', 'repository.write', 'repository.admin')
115 @view_config(
115 @view_config(
116 route_name='atom_feed_home', request_method='GET',
116 route_name='atom_feed_home', request_method='GET',
117 renderer=None)
117 renderer=None)
118 @view_config(
118 @view_config(
119 route_name='atom_feed_home_old', request_method='GET',
119 route_name='atom_feed_home_old', request_method='GET',
120 renderer=None)
120 renderer=None)
121 def atom(self):
121 def atom(self):
122 """
122 """
123 Produce an atom-1.0 feed via feedgenerator module
123 Produce an atom-1.0 feed via feedgenerator module
124 """
124 """
125 self.load_default_context()
125 self.load_default_context()
126
126
127 cache_namespace_uid = 'cache_repo_instance.{}_{}'.format(
127 cache_namespace_uid = 'cache_repo_instance.{}_{}'.format(
128 self.db_repo.repo_id, CacheKey.CACHE_TYPE_FEED)
128 self.db_repo.repo_id, CacheKey.CACHE_TYPE_FEED)
129 invalidation_namespace = CacheKey.REPO_INVALIDATION_NAMESPACE.format(
129 invalidation_namespace = CacheKey.REPO_INVALIDATION_NAMESPACE.format(
130 repo_id=self.db_repo.repo_id)
130 repo_id=self.db_repo.repo_id)
131
131
132 region = rc_cache.get_or_create_region('cache_repo_longterm',
132 region = rc_cache.get_or_create_region('cache_repo_longterm',
133 cache_namespace_uid)
133 cache_namespace_uid)
134
134
135 condition = not self.path_filter.is_enabled
135 condition = not self.path_filter.is_enabled
136
136
137 @region.conditional_cache_on_arguments(namespace=cache_namespace_uid,
137 @region.conditional_cache_on_arguments(namespace=cache_namespace_uid,
138 condition=condition)
138 condition=condition)
139 def generate_atom_feed(repo_id, _repo_name, _feed_type):
139 def generate_atom_feed(repo_id, _repo_name, _feed_type):
140 feed = Atom1Feed(
140 feed = Atom1Feed(
141 title=self.title % _repo_name,
141 title=self.title % _repo_name,
142 link=h.route_url('repo_summary', repo_name=_repo_name),
142 link=h.route_url('repo_summary', repo_name=_repo_name),
143 description=self.description % _repo_name,
143 description=self.description % _repo_name,
144 language=self.language,
144 language=self.language,
145 ttl=self.ttl
145 ttl=self.ttl
146 )
146 )
147
147
148 for commit in reversed(self._get_commits()):
148 for commit in reversed(self._get_commits()):
149 date = self._set_timezone(commit.date)
149 date = self._set_timezone(commit.date)
150 feed.add_item(
150 feed.add_item(
151 unique_id=self.uid(repo_id, commit.raw_id),
151 unique_id=self.uid(repo_id, commit.raw_id),
152 title=self._get_title(commit),
152 title=self._get_title(commit),
153 author_name=commit.author,
153 author_name=commit.author,
154 description=self._get_description(commit),
154 description=self._get_description(commit),
155 link=h.route_url(
155 link=h.route_url(
156 'repo_commit', repo_name=_repo_name,
156 'repo_commit', repo_name=_repo_name,
157 commit_id=commit.raw_id),
157 commit_id=commit.raw_id),
158 pubdate=date,)
158 pubdate=date,)
159
159
160 return feed.mime_type, feed.writeString('utf-8')
160 return feed.mime_type, feed.writeString('utf-8')
161
161
162 inv_context_manager = rc_cache.InvalidationContext(
162 inv_context_manager = rc_cache.InvalidationContext(
163 uid=cache_namespace_uid, invalidation_namespace=invalidation_namespace)
163 uid=cache_namespace_uid, invalidation_namespace=invalidation_namespace)
164 with inv_context_manager as invalidation_context:
164 with inv_context_manager as invalidation_context:
165 args = (self.db_repo.repo_id, self.db_repo.repo_name, 'atom',)
165 args = (self.db_repo.repo_id, self.db_repo.repo_name, 'atom',)
166 # re-compute and store cache if we get invalidate signal
166 # re-compute and store cache if we get invalidate signal
167 if invalidation_context.should_invalidate():
167 if invalidation_context.should_invalidate():
168 mime_type, feed = generate_atom_feed.refresh(*args)
168 mime_type, feed = generate_atom_feed.refresh(*args)
169 else:
169 else:
170 mime_type, feed = generate_atom_feed(*args)
170 mime_type, feed = generate_atom_feed(*args)
171
171
172 log.debug('Repo ATOM feed computed in %.3fs',
172 log.debug('Repo ATOM feed computed in %.4fs',
173 inv_context_manager.compute_time)
173 inv_context_manager.compute_time)
174
174
175 response = Response(feed)
175 response = Response(feed)
176 response.content_type = mime_type
176 response.content_type = mime_type
177 return response
177 return response
178
178
179 @LoginRequired(auth_token_access=[UserApiKeys.ROLE_FEED])
179 @LoginRequired(auth_token_access=[UserApiKeys.ROLE_FEED])
180 @HasRepoPermissionAnyDecorator(
180 @HasRepoPermissionAnyDecorator(
181 'repository.read', 'repository.write', 'repository.admin')
181 'repository.read', 'repository.write', 'repository.admin')
182 @view_config(
182 @view_config(
183 route_name='rss_feed_home', request_method='GET',
183 route_name='rss_feed_home', request_method='GET',
184 renderer=None)
184 renderer=None)
185 @view_config(
185 @view_config(
186 route_name='rss_feed_home_old', request_method='GET',
186 route_name='rss_feed_home_old', request_method='GET',
187 renderer=None)
187 renderer=None)
188 def rss(self):
188 def rss(self):
189 """
189 """
190 Produce an rss2 feed via feedgenerator module
190 Produce an rss2 feed via feedgenerator module
191 """
191 """
192 self.load_default_context()
192 self.load_default_context()
193
193
194 cache_namespace_uid = 'cache_repo_instance.{}_{}'.format(
194 cache_namespace_uid = 'cache_repo_instance.{}_{}'.format(
195 self.db_repo.repo_id, CacheKey.CACHE_TYPE_FEED)
195 self.db_repo.repo_id, CacheKey.CACHE_TYPE_FEED)
196 invalidation_namespace = CacheKey.REPO_INVALIDATION_NAMESPACE.format(
196 invalidation_namespace = CacheKey.REPO_INVALIDATION_NAMESPACE.format(
197 repo_id=self.db_repo.repo_id)
197 repo_id=self.db_repo.repo_id)
198 region = rc_cache.get_or_create_region('cache_repo_longterm',
198 region = rc_cache.get_or_create_region('cache_repo_longterm',
199 cache_namespace_uid)
199 cache_namespace_uid)
200
200
201 condition = not self.path_filter.is_enabled
201 condition = not self.path_filter.is_enabled
202
202
203 @region.conditional_cache_on_arguments(namespace=cache_namespace_uid,
203 @region.conditional_cache_on_arguments(namespace=cache_namespace_uid,
204 condition=condition)
204 condition=condition)
205 def generate_rss_feed(repo_id, _repo_name, _feed_type):
205 def generate_rss_feed(repo_id, _repo_name, _feed_type):
206 feed = Rss201rev2Feed(
206 feed = Rss201rev2Feed(
207 title=self.title % _repo_name,
207 title=self.title % _repo_name,
208 link=h.route_url('repo_summary', repo_name=_repo_name),
208 link=h.route_url('repo_summary', repo_name=_repo_name),
209 description=self.description % _repo_name,
209 description=self.description % _repo_name,
210 language=self.language,
210 language=self.language,
211 ttl=self.ttl
211 ttl=self.ttl
212 )
212 )
213
213
214 for commit in reversed(self._get_commits()):
214 for commit in reversed(self._get_commits()):
215 date = self._set_timezone(commit.date)
215 date = self._set_timezone(commit.date)
216 feed.add_item(
216 feed.add_item(
217 unique_id=self.uid(repo_id, commit.raw_id),
217 unique_id=self.uid(repo_id, commit.raw_id),
218 title=self._get_title(commit),
218 title=self._get_title(commit),
219 author_name=commit.author,
219 author_name=commit.author,
220 description=self._get_description(commit),
220 description=self._get_description(commit),
221 link=h.route_url(
221 link=h.route_url(
222 'repo_commit', repo_name=_repo_name,
222 'repo_commit', repo_name=_repo_name,
223 commit_id=commit.raw_id),
223 commit_id=commit.raw_id),
224 pubdate=date,)
224 pubdate=date,)
225
225
226 return feed.mime_type, feed.writeString('utf-8')
226 return feed.mime_type, feed.writeString('utf-8')
227
227
228 inv_context_manager = rc_cache.InvalidationContext(
228 inv_context_manager = rc_cache.InvalidationContext(
229 uid=cache_namespace_uid, invalidation_namespace=invalidation_namespace)
229 uid=cache_namespace_uid, invalidation_namespace=invalidation_namespace)
230 with inv_context_manager as invalidation_context:
230 with inv_context_manager as invalidation_context:
231 args = (self.db_repo.repo_id, self.db_repo.repo_name, 'rss',)
231 args = (self.db_repo.repo_id, self.db_repo.repo_name, 'rss',)
232 # re-compute and store cache if we get invalidate signal
232 # re-compute and store cache if we get invalidate signal
233 if invalidation_context.should_invalidate():
233 if invalidation_context.should_invalidate():
234 mime_type, feed = generate_rss_feed.refresh(*args)
234 mime_type, feed = generate_rss_feed.refresh(*args)
235 else:
235 else:
236 mime_type, feed = generate_rss_feed(*args)
236 mime_type, feed = generate_rss_feed(*args)
237 log.debug(
237 log.debug(
238 'Repo RSS feed computed in %.3fs', inv_context_manager.compute_time)
238 'Repo RSS feed computed in %.4fs', inv_context_manager.compute_time)
239
239
240 response = Response(feed)
240 response = Response(feed)
241 response.content_type = mime_type
241 response.content_type = mime_type
242 return response
242 return response
@@ -1,396 +1,396 b''
1 # -*- coding: utf-8 -*-
1 # -*- coding: utf-8 -*-
2
2
3 # Copyright (C) 2011-2019 RhodeCode GmbH
3 # Copyright (C) 2011-2019 RhodeCode GmbH
4 #
4 #
5 # This program is free software: you can redistribute it and/or modify
5 # This program is free software: you can redistribute it and/or modify
6 # it under the terms of the GNU Affero General Public License, version 3
6 # it under the terms of the GNU Affero General Public License, version 3
7 # (only), as published by the Free Software Foundation.
7 # (only), as published by the Free Software Foundation.
8 #
8 #
9 # This program is distributed in the hope that it will be useful,
9 # This program is distributed in the hope that it will be useful,
10 # but WITHOUT ANY WARRANTY; without even the implied warranty of
10 # but WITHOUT ANY WARRANTY; without even the implied warranty of
11 # MERCHANTABILITY or FITNESS FOR A PARTICULAR PURPOSE. See the
11 # MERCHANTABILITY or FITNESS FOR A PARTICULAR PURPOSE. See the
12 # GNU General Public License for more details.
12 # GNU General Public License for more details.
13 #
13 #
14 # You should have received a copy of the GNU Affero General Public License
14 # You should have received a copy of the GNU Affero General Public License
15 # along with this program. If not, see <http://www.gnu.org/licenses/>.
15 # along with this program. If not, see <http://www.gnu.org/licenses/>.
16 #
16 #
17 # This program is dual-licensed. If you wish to learn more about the
17 # This program is dual-licensed. If you wish to learn more about the
18 # RhodeCode Enterprise Edition, including its added features, Support services,
18 # RhodeCode Enterprise Edition, including its added features, Support services,
19 # and proprietary license terms, please see https://rhodecode.com/licenses/
19 # and proprietary license terms, please see https://rhodecode.com/licenses/
20
20
21 import logging
21 import logging
22 import string
22 import string
23 import rhodecode
23 import rhodecode
24
24
25 from pyramid.view import view_config
25 from pyramid.view import view_config
26
26
27 from rhodecode.lib.view_utils import get_format_ref_id
27 from rhodecode.lib.view_utils import get_format_ref_id
28 from rhodecode.apps._base import RepoAppView
28 from rhodecode.apps._base import RepoAppView
29 from rhodecode.config.conf import (LANGUAGES_EXTENSIONS_MAP)
29 from rhodecode.config.conf import (LANGUAGES_EXTENSIONS_MAP)
30 from rhodecode.lib import helpers as h, rc_cache
30 from rhodecode.lib import helpers as h, rc_cache
31 from rhodecode.lib.utils2 import safe_str, safe_int
31 from rhodecode.lib.utils2 import safe_str, safe_int
32 from rhodecode.lib.auth import LoginRequired, HasRepoPermissionAnyDecorator
32 from rhodecode.lib.auth import LoginRequired, HasRepoPermissionAnyDecorator
33 from rhodecode.lib.markup_renderer import MarkupRenderer, relative_links
33 from rhodecode.lib.markup_renderer import MarkupRenderer, relative_links
34 from rhodecode.lib.ext_json import json
34 from rhodecode.lib.ext_json import json
35 from rhodecode.lib.vcs.backends.base import EmptyCommit
35 from rhodecode.lib.vcs.backends.base import EmptyCommit
36 from rhodecode.lib.vcs.exceptions import (
36 from rhodecode.lib.vcs.exceptions import (
37 CommitError, EmptyRepositoryError, CommitDoesNotExistError)
37 CommitError, EmptyRepositoryError, CommitDoesNotExistError)
38 from rhodecode.model.db import Statistics, CacheKey, User
38 from rhodecode.model.db import Statistics, CacheKey, User
39 from rhodecode.model.meta import Session
39 from rhodecode.model.meta import Session
40 from rhodecode.model.repo import ReadmeFinder
40 from rhodecode.model.repo import ReadmeFinder
41 from rhodecode.model.scm import ScmModel
41 from rhodecode.model.scm import ScmModel
42
42
43 log = logging.getLogger(__name__)
43 log = logging.getLogger(__name__)
44
44
45
45
46 class RepoSummaryView(RepoAppView):
46 class RepoSummaryView(RepoAppView):
47
47
48 def load_default_context(self):
48 def load_default_context(self):
49 c = self._get_local_tmpl_context(include_app_defaults=True)
49 c = self._get_local_tmpl_context(include_app_defaults=True)
50 c.rhodecode_repo = None
50 c.rhodecode_repo = None
51 if not c.repository_requirements_missing:
51 if not c.repository_requirements_missing:
52 c.rhodecode_repo = self.rhodecode_vcs_repo
52 c.rhodecode_repo = self.rhodecode_vcs_repo
53 return c
53 return c
54
54
55 def _get_readme_data(self, db_repo, renderer_type):
55 def _get_readme_data(self, db_repo, renderer_type):
56
56
57 log.debug('Looking for README file')
57 log.debug('Looking for README file')
58
58
59 cache_namespace_uid = 'cache_repo_instance.{}_{}'.format(
59 cache_namespace_uid = 'cache_repo_instance.{}_{}'.format(
60 db_repo.repo_id, CacheKey.CACHE_TYPE_README)
60 db_repo.repo_id, CacheKey.CACHE_TYPE_README)
61 invalidation_namespace = CacheKey.REPO_INVALIDATION_NAMESPACE.format(
61 invalidation_namespace = CacheKey.REPO_INVALIDATION_NAMESPACE.format(
62 repo_id=self.db_repo.repo_id)
62 repo_id=self.db_repo.repo_id)
63 region = rc_cache.get_or_create_region('cache_repo_longterm', cache_namespace_uid)
63 region = rc_cache.get_or_create_region('cache_repo_longterm', cache_namespace_uid)
64
64
65 @region.conditional_cache_on_arguments(namespace=cache_namespace_uid)
65 @region.conditional_cache_on_arguments(namespace=cache_namespace_uid)
66 def generate_repo_readme(repo_id, _repo_name, _renderer_type):
66 def generate_repo_readme(repo_id, _repo_name, _renderer_type):
67 readme_data = None
67 readme_data = None
68 readme_node = None
68 readme_node = None
69 readme_filename = None
69 readme_filename = None
70 commit = self._get_landing_commit_or_none(db_repo)
70 commit = self._get_landing_commit_or_none(db_repo)
71 if commit:
71 if commit:
72 log.debug("Searching for a README file.")
72 log.debug("Searching for a README file.")
73 readme_node = ReadmeFinder(_renderer_type).search(commit)
73 readme_node = ReadmeFinder(_renderer_type).search(commit)
74 if readme_node:
74 if readme_node:
75 log.debug('Found README node: %s', readme_node)
75 log.debug('Found README node: %s', readme_node)
76 relative_urls = {
76 relative_urls = {
77 'raw': h.route_path(
77 'raw': h.route_path(
78 'repo_file_raw', repo_name=_repo_name,
78 'repo_file_raw', repo_name=_repo_name,
79 commit_id=commit.raw_id, f_path=readme_node.path),
79 commit_id=commit.raw_id, f_path=readme_node.path),
80 'standard': h.route_path(
80 'standard': h.route_path(
81 'repo_files', repo_name=_repo_name,
81 'repo_files', repo_name=_repo_name,
82 commit_id=commit.raw_id, f_path=readme_node.path),
82 commit_id=commit.raw_id, f_path=readme_node.path),
83 }
83 }
84 readme_data = self._render_readme_or_none(
84 readme_data = self._render_readme_or_none(
85 commit, readme_node, relative_urls)
85 commit, readme_node, relative_urls)
86 readme_filename = readme_node.unicode_path
86 readme_filename = readme_node.unicode_path
87
87
88 return readme_data, readme_filename
88 return readme_data, readme_filename
89
89
90 inv_context_manager = rc_cache.InvalidationContext(
90 inv_context_manager = rc_cache.InvalidationContext(
91 uid=cache_namespace_uid, invalidation_namespace=invalidation_namespace)
91 uid=cache_namespace_uid, invalidation_namespace=invalidation_namespace)
92 with inv_context_manager as invalidation_context:
92 with inv_context_manager as invalidation_context:
93 args = (db_repo.repo_id, db_repo.repo_name, renderer_type,)
93 args = (db_repo.repo_id, db_repo.repo_name, renderer_type,)
94 # re-compute and store cache if we get invalidate signal
94 # re-compute and store cache if we get invalidate signal
95 if invalidation_context.should_invalidate():
95 if invalidation_context.should_invalidate():
96 instance = generate_repo_readme.refresh(*args)
96 instance = generate_repo_readme.refresh(*args)
97 else:
97 else:
98 instance = generate_repo_readme(*args)
98 instance = generate_repo_readme(*args)
99
99
100 log.debug(
100 log.debug(
101 'Repo readme generated and computed in %.3fs',
101 'Repo readme generated and computed in %.4fs',
102 inv_context_manager.compute_time)
102 inv_context_manager.compute_time)
103 return instance
103 return instance
104
104
105 def _get_landing_commit_or_none(self, db_repo):
105 def _get_landing_commit_or_none(self, db_repo):
106 log.debug("Getting the landing commit.")
106 log.debug("Getting the landing commit.")
107 try:
107 try:
108 commit = db_repo.get_landing_commit()
108 commit = db_repo.get_landing_commit()
109 if not isinstance(commit, EmptyCommit):
109 if not isinstance(commit, EmptyCommit):
110 return commit
110 return commit
111 else:
111 else:
112 log.debug("Repository is empty, no README to render.")
112 log.debug("Repository is empty, no README to render.")
113 except CommitError:
113 except CommitError:
114 log.exception(
114 log.exception(
115 "Problem getting commit when trying to render the README.")
115 "Problem getting commit when trying to render the README.")
116
116
117 def _render_readme_or_none(self, commit, readme_node, relative_urls):
117 def _render_readme_or_none(self, commit, readme_node, relative_urls):
118 log.debug(
118 log.debug(
119 'Found README file `%s` rendering...', readme_node.path)
119 'Found README file `%s` rendering...', readme_node.path)
120 renderer = MarkupRenderer()
120 renderer = MarkupRenderer()
121 try:
121 try:
122 html_source = renderer.render(
122 html_source = renderer.render(
123 readme_node.content, filename=readme_node.path)
123 readme_node.content, filename=readme_node.path)
124 if relative_urls:
124 if relative_urls:
125 return relative_links(html_source, relative_urls)
125 return relative_links(html_source, relative_urls)
126 return html_source
126 return html_source
127 except Exception:
127 except Exception:
128 log.exception(
128 log.exception(
129 "Exception while trying to render the README")
129 "Exception while trying to render the README")
130
130
131 def _load_commits_context(self, c):
131 def _load_commits_context(self, c):
132 p = safe_int(self.request.GET.get('page'), 1)
132 p = safe_int(self.request.GET.get('page'), 1)
133 size = safe_int(self.request.GET.get('size'), 10)
133 size = safe_int(self.request.GET.get('size'), 10)
134
134
135 def url_generator(**kw):
135 def url_generator(**kw):
136 query_params = {
136 query_params = {
137 'size': size
137 'size': size
138 }
138 }
139 query_params.update(kw)
139 query_params.update(kw)
140 return h.route_path(
140 return h.route_path(
141 'repo_summary_commits',
141 'repo_summary_commits',
142 repo_name=c.rhodecode_db_repo.repo_name, _query=query_params)
142 repo_name=c.rhodecode_db_repo.repo_name, _query=query_params)
143
143
144 pre_load = ['author', 'branch', 'date', 'message']
144 pre_load = ['author', 'branch', 'date', 'message']
145 try:
145 try:
146 collection = self.rhodecode_vcs_repo.get_commits(
146 collection = self.rhodecode_vcs_repo.get_commits(
147 pre_load=pre_load, translate_tags=False)
147 pre_load=pre_load, translate_tags=False)
148 except EmptyRepositoryError:
148 except EmptyRepositoryError:
149 collection = self.rhodecode_vcs_repo
149 collection = self.rhodecode_vcs_repo
150
150
151 c.repo_commits = h.RepoPage(
151 c.repo_commits = h.RepoPage(
152 collection, page=p, items_per_page=size, url=url_generator)
152 collection, page=p, items_per_page=size, url=url_generator)
153 page_ids = [x.raw_id for x in c.repo_commits]
153 page_ids = [x.raw_id for x in c.repo_commits]
154 c.comments = self.db_repo.get_comments(page_ids)
154 c.comments = self.db_repo.get_comments(page_ids)
155 c.statuses = self.db_repo.statuses(page_ids)
155 c.statuses = self.db_repo.statuses(page_ids)
156
156
157 def _prepare_and_set_clone_url(self, c):
157 def _prepare_and_set_clone_url(self, c):
158 username = ''
158 username = ''
159 if self._rhodecode_user.username != User.DEFAULT_USER:
159 if self._rhodecode_user.username != User.DEFAULT_USER:
160 username = safe_str(self._rhodecode_user.username)
160 username = safe_str(self._rhodecode_user.username)
161
161
162 _def_clone_uri = _def_clone_uri_id = c.clone_uri_tmpl
162 _def_clone_uri = _def_clone_uri_id = c.clone_uri_tmpl
163 _def_clone_uri_ssh = c.clone_uri_ssh_tmpl
163 _def_clone_uri_ssh = c.clone_uri_ssh_tmpl
164
164
165 if '{repo}' in _def_clone_uri:
165 if '{repo}' in _def_clone_uri:
166 _def_clone_uri_id = _def_clone_uri.replace('{repo}', '_{repoid}')
166 _def_clone_uri_id = _def_clone_uri.replace('{repo}', '_{repoid}')
167 elif '{repoid}' in _def_clone_uri:
167 elif '{repoid}' in _def_clone_uri:
168 _def_clone_uri_id = _def_clone_uri.replace('_{repoid}', '{repo}')
168 _def_clone_uri_id = _def_clone_uri.replace('_{repoid}', '{repo}')
169
169
170 c.clone_repo_url = self.db_repo.clone_url(
170 c.clone_repo_url = self.db_repo.clone_url(
171 user=username, uri_tmpl=_def_clone_uri)
171 user=username, uri_tmpl=_def_clone_uri)
172 c.clone_repo_url_id = self.db_repo.clone_url(
172 c.clone_repo_url_id = self.db_repo.clone_url(
173 user=username, uri_tmpl=_def_clone_uri_id)
173 user=username, uri_tmpl=_def_clone_uri_id)
174 c.clone_repo_url_ssh = self.db_repo.clone_url(
174 c.clone_repo_url_ssh = self.db_repo.clone_url(
175 uri_tmpl=_def_clone_uri_ssh, ssh=True)
175 uri_tmpl=_def_clone_uri_ssh, ssh=True)
176
176
177 @LoginRequired()
177 @LoginRequired()
178 @HasRepoPermissionAnyDecorator(
178 @HasRepoPermissionAnyDecorator(
179 'repository.read', 'repository.write', 'repository.admin')
179 'repository.read', 'repository.write', 'repository.admin')
180 @view_config(
180 @view_config(
181 route_name='repo_summary_commits', request_method='GET',
181 route_name='repo_summary_commits', request_method='GET',
182 renderer='rhodecode:templates/summary/summary_commits.mako')
182 renderer='rhodecode:templates/summary/summary_commits.mako')
183 def summary_commits(self):
183 def summary_commits(self):
184 c = self.load_default_context()
184 c = self.load_default_context()
185 self._prepare_and_set_clone_url(c)
185 self._prepare_and_set_clone_url(c)
186 self._load_commits_context(c)
186 self._load_commits_context(c)
187 return self._get_template_context(c)
187 return self._get_template_context(c)
188
188
189 @LoginRequired()
189 @LoginRequired()
190 @HasRepoPermissionAnyDecorator(
190 @HasRepoPermissionAnyDecorator(
191 'repository.read', 'repository.write', 'repository.admin')
191 'repository.read', 'repository.write', 'repository.admin')
192 @view_config(
192 @view_config(
193 route_name='repo_summary', request_method='GET',
193 route_name='repo_summary', request_method='GET',
194 renderer='rhodecode:templates/summary/summary.mako')
194 renderer='rhodecode:templates/summary/summary.mako')
195 @view_config(
195 @view_config(
196 route_name='repo_summary_slash', request_method='GET',
196 route_name='repo_summary_slash', request_method='GET',
197 renderer='rhodecode:templates/summary/summary.mako')
197 renderer='rhodecode:templates/summary/summary.mako')
198 @view_config(
198 @view_config(
199 route_name='repo_summary_explicit', request_method='GET',
199 route_name='repo_summary_explicit', request_method='GET',
200 renderer='rhodecode:templates/summary/summary.mako')
200 renderer='rhodecode:templates/summary/summary.mako')
201 def summary(self):
201 def summary(self):
202 c = self.load_default_context()
202 c = self.load_default_context()
203
203
204 # Prepare the clone URL
204 # Prepare the clone URL
205 self._prepare_and_set_clone_url(c)
205 self._prepare_and_set_clone_url(c)
206
206
207 # update every 5 min
207 # update every 5 min
208 if self.db_repo.last_commit_cache_update_diff > 60 * 5:
208 if self.db_repo.last_commit_cache_update_diff > 60 * 5:
209 self.db_repo.update_commit_cache()
209 self.db_repo.update_commit_cache()
210
210
211 # If enabled, get statistics data
211 # If enabled, get statistics data
212
212
213 c.show_stats = bool(self.db_repo.enable_statistics)
213 c.show_stats = bool(self.db_repo.enable_statistics)
214
214
215 stats = Session().query(Statistics) \
215 stats = Session().query(Statistics) \
216 .filter(Statistics.repository == self.db_repo) \
216 .filter(Statistics.repository == self.db_repo) \
217 .scalar()
217 .scalar()
218
218
219 c.stats_percentage = 0
219 c.stats_percentage = 0
220
220
221 if stats and stats.languages:
221 if stats and stats.languages:
222 c.no_data = False is self.db_repo.enable_statistics
222 c.no_data = False is self.db_repo.enable_statistics
223 lang_stats_d = json.loads(stats.languages)
223 lang_stats_d = json.loads(stats.languages)
224
224
225 # Sort first by decreasing count and second by the file extension,
225 # Sort first by decreasing count and second by the file extension,
226 # so we have a consistent output.
226 # so we have a consistent output.
227 lang_stats_items = sorted(lang_stats_d.iteritems(),
227 lang_stats_items = sorted(lang_stats_d.iteritems(),
228 key=lambda k: (-k[1], k[0]))[:10]
228 key=lambda k: (-k[1], k[0]))[:10]
229 lang_stats = [(x, {"count": y,
229 lang_stats = [(x, {"count": y,
230 "desc": LANGUAGES_EXTENSIONS_MAP.get(x)})
230 "desc": LANGUAGES_EXTENSIONS_MAP.get(x)})
231 for x, y in lang_stats_items]
231 for x, y in lang_stats_items]
232
232
233 c.trending_languages = json.dumps(lang_stats)
233 c.trending_languages = json.dumps(lang_stats)
234 else:
234 else:
235 c.no_data = True
235 c.no_data = True
236 c.trending_languages = json.dumps({})
236 c.trending_languages = json.dumps({})
237
237
238 scm_model = ScmModel()
238 scm_model = ScmModel()
239 c.enable_downloads = self.db_repo.enable_downloads
239 c.enable_downloads = self.db_repo.enable_downloads
240 c.repository_followers = scm_model.get_followers(self.db_repo)
240 c.repository_followers = scm_model.get_followers(self.db_repo)
241 c.repository_forks = scm_model.get_forks(self.db_repo)
241 c.repository_forks = scm_model.get_forks(self.db_repo)
242
242
243 # first interaction with the VCS instance after here...
243 # first interaction with the VCS instance after here...
244 if c.repository_requirements_missing:
244 if c.repository_requirements_missing:
245 self.request.override_renderer = \
245 self.request.override_renderer = \
246 'rhodecode:templates/summary/missing_requirements.mako'
246 'rhodecode:templates/summary/missing_requirements.mako'
247 return self._get_template_context(c)
247 return self._get_template_context(c)
248
248
249 c.readme_data, c.readme_file = \
249 c.readme_data, c.readme_file = \
250 self._get_readme_data(self.db_repo, c.visual.default_renderer)
250 self._get_readme_data(self.db_repo, c.visual.default_renderer)
251
251
252 # loads the summary commits template context
252 # loads the summary commits template context
253 self._load_commits_context(c)
253 self._load_commits_context(c)
254
254
255 return self._get_template_context(c)
255 return self._get_template_context(c)
256
256
257 def get_request_commit_id(self):
257 def get_request_commit_id(self):
258 return self.request.matchdict['commit_id']
258 return self.request.matchdict['commit_id']
259
259
260 @LoginRequired()
260 @LoginRequired()
261 @HasRepoPermissionAnyDecorator(
261 @HasRepoPermissionAnyDecorator(
262 'repository.read', 'repository.write', 'repository.admin')
262 'repository.read', 'repository.write', 'repository.admin')
263 @view_config(
263 @view_config(
264 route_name='repo_stats', request_method='GET',
264 route_name='repo_stats', request_method='GET',
265 renderer='json_ext')
265 renderer='json_ext')
266 def repo_stats(self):
266 def repo_stats(self):
267 commit_id = self.get_request_commit_id()
267 commit_id = self.get_request_commit_id()
268 show_stats = bool(self.db_repo.enable_statistics)
268 show_stats = bool(self.db_repo.enable_statistics)
269 repo_id = self.db_repo.repo_id
269 repo_id = self.db_repo.repo_id
270
270
271 cache_seconds = safe_int(
271 cache_seconds = safe_int(
272 rhodecode.CONFIG.get('rc_cache.cache_repo.expiration_time'))
272 rhodecode.CONFIG.get('rc_cache.cache_repo.expiration_time'))
273 cache_on = cache_seconds > 0
273 cache_on = cache_seconds > 0
274 log.debug(
274 log.debug(
275 'Computing REPO TREE for repo_id %s commit_id `%s` '
275 'Computing REPO TREE for repo_id %s commit_id `%s` '
276 'with caching: %s[TTL: %ss]' % (
276 'with caching: %s[TTL: %ss]' % (
277 repo_id, commit_id, cache_on, cache_seconds or 0))
277 repo_id, commit_id, cache_on, cache_seconds or 0))
278
278
279 cache_namespace_uid = 'cache_repo.{}'.format(repo_id)
279 cache_namespace_uid = 'cache_repo.{}'.format(repo_id)
280 region = rc_cache.get_or_create_region('cache_repo', cache_namespace_uid)
280 region = rc_cache.get_or_create_region('cache_repo', cache_namespace_uid)
281
281
282 @region.conditional_cache_on_arguments(namespace=cache_namespace_uid,
282 @region.conditional_cache_on_arguments(namespace=cache_namespace_uid,
283 condition=cache_on)
283 condition=cache_on)
284 def compute_stats(repo_id, commit_id, show_stats):
284 def compute_stats(repo_id, commit_id, show_stats):
285 code_stats = {}
285 code_stats = {}
286 size = 0
286 size = 0
287 try:
287 try:
288 scm_instance = self.db_repo.scm_instance()
288 scm_instance = self.db_repo.scm_instance()
289 commit = scm_instance.get_commit(commit_id)
289 commit = scm_instance.get_commit(commit_id)
290
290
291 for node in commit.get_filenodes_generator():
291 for node in commit.get_filenodes_generator():
292 size += node.size
292 size += node.size
293 if not show_stats:
293 if not show_stats:
294 continue
294 continue
295 ext = string.lower(node.extension)
295 ext = string.lower(node.extension)
296 ext_info = LANGUAGES_EXTENSIONS_MAP.get(ext)
296 ext_info = LANGUAGES_EXTENSIONS_MAP.get(ext)
297 if ext_info:
297 if ext_info:
298 if ext in code_stats:
298 if ext in code_stats:
299 code_stats[ext]['count'] += 1
299 code_stats[ext]['count'] += 1
300 else:
300 else:
301 code_stats[ext] = {"count": 1, "desc": ext_info}
301 code_stats[ext] = {"count": 1, "desc": ext_info}
302 except (EmptyRepositoryError, CommitDoesNotExistError):
302 except (EmptyRepositoryError, CommitDoesNotExistError):
303 pass
303 pass
304 return {'size': h.format_byte_size_binary(size),
304 return {'size': h.format_byte_size_binary(size),
305 'code_stats': code_stats}
305 'code_stats': code_stats}
306
306
307 stats = compute_stats(self.db_repo.repo_id, commit_id, show_stats)
307 stats = compute_stats(self.db_repo.repo_id, commit_id, show_stats)
308 return stats
308 return stats
309
309
310 @LoginRequired()
310 @LoginRequired()
311 @HasRepoPermissionAnyDecorator(
311 @HasRepoPermissionAnyDecorator(
312 'repository.read', 'repository.write', 'repository.admin')
312 'repository.read', 'repository.write', 'repository.admin')
313 @view_config(
313 @view_config(
314 route_name='repo_refs_data', request_method='GET',
314 route_name='repo_refs_data', request_method='GET',
315 renderer='json_ext')
315 renderer='json_ext')
316 def repo_refs_data(self):
316 def repo_refs_data(self):
317 _ = self.request.translate
317 _ = self.request.translate
318 self.load_default_context()
318 self.load_default_context()
319
319
320 repo = self.rhodecode_vcs_repo
320 repo = self.rhodecode_vcs_repo
321 refs_to_create = [
321 refs_to_create = [
322 (_("Branch"), repo.branches, 'branch'),
322 (_("Branch"), repo.branches, 'branch'),
323 (_("Tag"), repo.tags, 'tag'),
323 (_("Tag"), repo.tags, 'tag'),
324 (_("Bookmark"), repo.bookmarks, 'book'),
324 (_("Bookmark"), repo.bookmarks, 'book'),
325 ]
325 ]
326 res = self._create_reference_data(repo, self.db_repo_name, refs_to_create)
326 res = self._create_reference_data(repo, self.db_repo_name, refs_to_create)
327 data = {
327 data = {
328 'more': False,
328 'more': False,
329 'results': res
329 'results': res
330 }
330 }
331 return data
331 return data
332
332
333 @LoginRequired()
333 @LoginRequired()
334 @HasRepoPermissionAnyDecorator(
334 @HasRepoPermissionAnyDecorator(
335 'repository.read', 'repository.write', 'repository.admin')
335 'repository.read', 'repository.write', 'repository.admin')
336 @view_config(
336 @view_config(
337 route_name='repo_refs_changelog_data', request_method='GET',
337 route_name='repo_refs_changelog_data', request_method='GET',
338 renderer='json_ext')
338 renderer='json_ext')
339 def repo_refs_changelog_data(self):
339 def repo_refs_changelog_data(self):
340 _ = self.request.translate
340 _ = self.request.translate
341 self.load_default_context()
341 self.load_default_context()
342
342
343 repo = self.rhodecode_vcs_repo
343 repo = self.rhodecode_vcs_repo
344
344
345 refs_to_create = [
345 refs_to_create = [
346 (_("Branches"), repo.branches, 'branch'),
346 (_("Branches"), repo.branches, 'branch'),
347 (_("Closed branches"), repo.branches_closed, 'branch_closed'),
347 (_("Closed branches"), repo.branches_closed, 'branch_closed'),
348 # TODO: enable when vcs can handle bookmarks filters
348 # TODO: enable when vcs can handle bookmarks filters
349 # (_("Bookmarks"), repo.bookmarks, "book"),
349 # (_("Bookmarks"), repo.bookmarks, "book"),
350 ]
350 ]
351 res = self._create_reference_data(
351 res = self._create_reference_data(
352 repo, self.db_repo_name, refs_to_create)
352 repo, self.db_repo_name, refs_to_create)
353 data = {
353 data = {
354 'more': False,
354 'more': False,
355 'results': res
355 'results': res
356 }
356 }
357 return data
357 return data
358
358
359 def _create_reference_data(self, repo, full_repo_name, refs_to_create):
359 def _create_reference_data(self, repo, full_repo_name, refs_to_create):
360 format_ref_id = get_format_ref_id(repo)
360 format_ref_id = get_format_ref_id(repo)
361
361
362 result = []
362 result = []
363 for title, refs, ref_type in refs_to_create:
363 for title, refs, ref_type in refs_to_create:
364 if refs:
364 if refs:
365 result.append({
365 result.append({
366 'text': title,
366 'text': title,
367 'children': self._create_reference_items(
367 'children': self._create_reference_items(
368 repo, full_repo_name, refs, ref_type,
368 repo, full_repo_name, refs, ref_type,
369 format_ref_id),
369 format_ref_id),
370 })
370 })
371 return result
371 return result
372
372
373 def _create_reference_items(self, repo, full_repo_name, refs, ref_type, format_ref_id):
373 def _create_reference_items(self, repo, full_repo_name, refs, ref_type, format_ref_id):
374 result = []
374 result = []
375 is_svn = h.is_svn(repo)
375 is_svn = h.is_svn(repo)
376 for ref_name, raw_id in refs.iteritems():
376 for ref_name, raw_id in refs.iteritems():
377 files_url = self._create_files_url(
377 files_url = self._create_files_url(
378 repo, full_repo_name, ref_name, raw_id, is_svn)
378 repo, full_repo_name, ref_name, raw_id, is_svn)
379 result.append({
379 result.append({
380 'text': ref_name,
380 'text': ref_name,
381 'id': format_ref_id(ref_name, raw_id),
381 'id': format_ref_id(ref_name, raw_id),
382 'raw_id': raw_id,
382 'raw_id': raw_id,
383 'type': ref_type,
383 'type': ref_type,
384 'files_url': files_url,
384 'files_url': files_url,
385 'idx': 0,
385 'idx': 0,
386 })
386 })
387 return result
387 return result
388
388
389 def _create_files_url(self, repo, full_repo_name, ref_name, raw_id, is_svn):
389 def _create_files_url(self, repo, full_repo_name, ref_name, raw_id, is_svn):
390 use_commit_id = '/' in ref_name or is_svn
390 use_commit_id = '/' in ref_name or is_svn
391 return h.route_path(
391 return h.route_path(
392 'repo_files',
392 'repo_files',
393 repo_name=full_repo_name,
393 repo_name=full_repo_name,
394 f_path=ref_name if is_svn else '',
394 f_path=ref_name if is_svn else '',
395 commit_id=raw_id if use_commit_id else ref_name,
395 commit_id=raw_id if use_commit_id else ref_name,
396 _query=dict(at=ref_name))
396 _query=dict(at=ref_name))
@@ -1,164 +1,164 b''
1 # -*- coding: utf-8 -*-
1 # -*- coding: utf-8 -*-
2
2
3 # Copyright (C) 2011-2019 RhodeCode GmbH
3 # Copyright (C) 2011-2019 RhodeCode GmbH
4 #
4 #
5 # This program is free software: you can redistribute it and/or modify
5 # This program is free software: you can redistribute it and/or modify
6 # it under the terms of the GNU Affero General Public License, version 3
6 # it under the terms of the GNU Affero General Public License, version 3
7 # (only), as published by the Free Software Foundation.
7 # (only), as published by the Free Software Foundation.
8 #
8 #
9 # This program is distributed in the hope that it will be useful,
9 # This program is distributed in the hope that it will be useful,
10 # but WITHOUT ANY WARRANTY; without even the implied warranty of
10 # but WITHOUT ANY WARRANTY; without even the implied warranty of
11 # MERCHANTABILITY or FITNESS FOR A PARTICULAR PURPOSE. See the
11 # MERCHANTABILITY or FITNESS FOR A PARTICULAR PURPOSE. See the
12 # GNU General Public License for more details.
12 # GNU General Public License for more details.
13 #
13 #
14 # You should have received a copy of the GNU Affero General Public License
14 # You should have received a copy of the GNU Affero General Public License
15 # along with this program. If not, see <http://www.gnu.org/licenses/>.
15 # along with this program. If not, see <http://www.gnu.org/licenses/>.
16 #
16 #
17 # This program is dual-licensed. If you wish to learn more about the
17 # This program is dual-licensed. If you wish to learn more about the
18 # RhodeCode Enterprise Edition, including its added features, Support services,
18 # RhodeCode Enterprise Edition, including its added features, Support services,
19 # and proprietary license terms, please see https://rhodecode.com/licenses/
19 # and proprietary license terms, please see https://rhodecode.com/licenses/
20
20
21 import logging
21 import logging
22 import urllib
22 import urllib
23 from pyramid.view import view_config
23 from pyramid.view import view_config
24 from webhelpers.util import update_params
24 from webhelpers.util import update_params
25
25
26 from rhodecode.apps._base import BaseAppView, RepoAppView, RepoGroupAppView
26 from rhodecode.apps._base import BaseAppView, RepoAppView, RepoGroupAppView
27 from rhodecode.lib.auth import (
27 from rhodecode.lib.auth import (
28 LoginRequired, HasRepoPermissionAnyDecorator, HasRepoGroupPermissionAnyDecorator)
28 LoginRequired, HasRepoPermissionAnyDecorator, HasRepoGroupPermissionAnyDecorator)
29 from rhodecode.lib.helpers import Page
29 from rhodecode.lib.helpers import Page
30 from rhodecode.lib.utils2 import safe_str
30 from rhodecode.lib.utils2 import safe_str
31 from rhodecode.lib.index import searcher_from_config
31 from rhodecode.lib.index import searcher_from_config
32 from rhodecode.model import validation_schema
32 from rhodecode.model import validation_schema
33 from rhodecode.model.validation_schema.schemas import search_schema
33 from rhodecode.model.validation_schema.schemas import search_schema
34
34
35 log = logging.getLogger(__name__)
35 log = logging.getLogger(__name__)
36
36
37
37
38 def perform_search(request, tmpl_context, repo_name=None, repo_group_name=None):
38 def perform_search(request, tmpl_context, repo_name=None, repo_group_name=None):
39 searcher = searcher_from_config(request.registry.settings)
39 searcher = searcher_from_config(request.registry.settings)
40 formatted_results = []
40 formatted_results = []
41 execution_time = ''
41 execution_time = ''
42
42
43 schema = search_schema.SearchParamsSchema()
43 schema = search_schema.SearchParamsSchema()
44 search_tags = []
44 search_tags = []
45 search_params = {}
45 search_params = {}
46 errors = []
46 errors = []
47 try:
47 try:
48 search_params = schema.deserialize(
48 search_params = schema.deserialize(
49 dict(
49 dict(
50 search_query=request.GET.get('q'),
50 search_query=request.GET.get('q'),
51 search_type=request.GET.get('type'),
51 search_type=request.GET.get('type'),
52 search_sort=request.GET.get('sort'),
52 search_sort=request.GET.get('sort'),
53 search_max_lines=request.GET.get('max_lines'),
53 search_max_lines=request.GET.get('max_lines'),
54 page_limit=request.GET.get('page_limit'),
54 page_limit=request.GET.get('page_limit'),
55 requested_page=request.GET.get('page'),
55 requested_page=request.GET.get('page'),
56 )
56 )
57 )
57 )
58 except validation_schema.Invalid as e:
58 except validation_schema.Invalid as e:
59 errors = e.children
59 errors = e.children
60
60
61 def url_generator(**kw):
61 def url_generator(**kw):
62 q = urllib.quote(safe_str(search_query))
62 q = urllib.quote(safe_str(search_query))
63 return update_params(
63 return update_params(
64 "?q=%s&type=%s&max_lines=%s" % (
64 "?q=%s&type=%s&max_lines=%s" % (
65 q, safe_str(search_type), search_max_lines), **kw)
65 q, safe_str(search_type), search_max_lines), **kw)
66
66
67 c = tmpl_context
67 c = tmpl_context
68 search_query = search_params.get('search_query')
68 search_query = search_params.get('search_query')
69 search_type = search_params.get('search_type')
69 search_type = search_params.get('search_type')
70 search_sort = search_params.get('search_sort')
70 search_sort = search_params.get('search_sort')
71 search_max_lines = search_params.get('search_max_lines')
71 search_max_lines = search_params.get('search_max_lines')
72 if search_params.get('search_query'):
72 if search_params.get('search_query'):
73 page_limit = search_params['page_limit']
73 page_limit = search_params['page_limit']
74 requested_page = search_params['requested_page']
74 requested_page = search_params['requested_page']
75
75
76 try:
76 try:
77 search_result = searcher.search(
77 search_result = searcher.search(
78 search_query, search_type, c.auth_user, repo_name, repo_group_name,
78 search_query, search_type, c.auth_user, repo_name, repo_group_name,
79 requested_page=requested_page, page_limit=page_limit, sort=search_sort)
79 requested_page=requested_page, page_limit=page_limit, sort=search_sort)
80
80
81 formatted_results = Page(
81 formatted_results = Page(
82 search_result['results'], page=requested_page,
82 search_result['results'], page=requested_page,
83 item_count=search_result['count'],
83 item_count=search_result['count'],
84 items_per_page=page_limit, url=url_generator)
84 items_per_page=page_limit, url=url_generator)
85 finally:
85 finally:
86 searcher.cleanup()
86 searcher.cleanup()
87
87
88 search_tags = searcher.extract_search_tags(search_query)
88 search_tags = searcher.extract_search_tags(search_query)
89
89
90 if not search_result['error']:
90 if not search_result['error']:
91 execution_time = '%s results (%.3f seconds)' % (
91 execution_time = '%s results (%.4f seconds)' % (
92 search_result['count'],
92 search_result['count'],
93 search_result['runtime'])
93 search_result['runtime'])
94 elif not errors:
94 elif not errors:
95 node = schema['search_query']
95 node = schema['search_query']
96 errors = [
96 errors = [
97 validation_schema.Invalid(node, search_result['error'])]
97 validation_schema.Invalid(node, search_result['error'])]
98
98
99 c.perm_user = c.auth_user
99 c.perm_user = c.auth_user
100 c.repo_name = repo_name
100 c.repo_name = repo_name
101 c.repo_group_name = repo_group_name
101 c.repo_group_name = repo_group_name
102 c.sort = search_sort
102 c.sort = search_sort
103 c.url_generator = url_generator
103 c.url_generator = url_generator
104 c.errors = errors
104 c.errors = errors
105 c.formatted_results = formatted_results
105 c.formatted_results = formatted_results
106 c.runtime = execution_time
106 c.runtime = execution_time
107 c.cur_query = search_query
107 c.cur_query = search_query
108 c.search_type = search_type
108 c.search_type = search_type
109 c.searcher = searcher
109 c.searcher = searcher
110 c.search_tags = search_tags
110 c.search_tags = search_tags
111
111
112
112
113 class SearchView(BaseAppView):
113 class SearchView(BaseAppView):
114 def load_default_context(self):
114 def load_default_context(self):
115 c = self._get_local_tmpl_context()
115 c = self._get_local_tmpl_context()
116 return c
116 return c
117
117
118 @LoginRequired()
118 @LoginRequired()
119 @view_config(
119 @view_config(
120 route_name='search', request_method='GET',
120 route_name='search', request_method='GET',
121 renderer='rhodecode:templates/search/search.mako')
121 renderer='rhodecode:templates/search/search.mako')
122 def search(self):
122 def search(self):
123 c = self.load_default_context()
123 c = self.load_default_context()
124 perform_search(self.request, c)
124 perform_search(self.request, c)
125 return self._get_template_context(c)
125 return self._get_template_context(c)
126
126
127
127
128 class SearchRepoView(RepoAppView):
128 class SearchRepoView(RepoAppView):
129 def load_default_context(self):
129 def load_default_context(self):
130 c = self._get_local_tmpl_context()
130 c = self._get_local_tmpl_context()
131 c.active = 'search'
131 c.active = 'search'
132 return c
132 return c
133
133
134 @LoginRequired()
134 @LoginRequired()
135 @HasRepoPermissionAnyDecorator(
135 @HasRepoPermissionAnyDecorator(
136 'repository.read', 'repository.write', 'repository.admin')
136 'repository.read', 'repository.write', 'repository.admin')
137 @view_config(
137 @view_config(
138 route_name='search_repo', request_method='GET',
138 route_name='search_repo', request_method='GET',
139 renderer='rhodecode:templates/search/search.mako')
139 renderer='rhodecode:templates/search/search.mako')
140 @view_config(
140 @view_config(
141 route_name='search_repo_alt', request_method='GET',
141 route_name='search_repo_alt', request_method='GET',
142 renderer='rhodecode:templates/search/search.mako')
142 renderer='rhodecode:templates/search/search.mako')
143 def search_repo(self):
143 def search_repo(self):
144 c = self.load_default_context()
144 c = self.load_default_context()
145 perform_search(self.request, c, repo_name=self.db_repo_name)
145 perform_search(self.request, c, repo_name=self.db_repo_name)
146 return self._get_template_context(c)
146 return self._get_template_context(c)
147
147
148
148
149 class SearchRepoGroupView(RepoGroupAppView):
149 class SearchRepoGroupView(RepoGroupAppView):
150 def load_default_context(self):
150 def load_default_context(self):
151 c = self._get_local_tmpl_context()
151 c = self._get_local_tmpl_context()
152 c.active = 'search'
152 c.active = 'search'
153 return c
153 return c
154
154
155 @LoginRequired()
155 @LoginRequired()
156 @HasRepoGroupPermissionAnyDecorator(
156 @HasRepoGroupPermissionAnyDecorator(
157 'group.read', 'group.write', 'group.admin')
157 'group.read', 'group.write', 'group.admin')
158 @view_config(
158 @view_config(
159 route_name='search_repo_group', request_method='GET',
159 route_name='search_repo_group', request_method='GET',
160 renderer='rhodecode:templates/search/search.mako')
160 renderer='rhodecode:templates/search/search.mako')
161 def search_repo_group(self):
161 def search_repo_group(self):
162 c = self.load_default_context()
162 c = self.load_default_context()
163 perform_search(self.request, c, repo_group_name=self.db_repo_group_name)
163 perform_search(self.request, c, repo_group_name=self.db_repo_group_name)
164 return self._get_template_context(c)
164 return self._get_template_context(c)
@@ -1,797 +1,797 b''
1 # -*- coding: utf-8 -*-
1 # -*- coding: utf-8 -*-
2
2
3 # Copyright (C) 2010-2019 RhodeCode GmbH
3 # Copyright (C) 2010-2019 RhodeCode GmbH
4 #
4 #
5 # This program is free software: you can redistribute it and/or modify
5 # This program is free software: you can redistribute it and/or modify
6 # it under the terms of the GNU Affero General Public License, version 3
6 # it under the terms of the GNU Affero General Public License, version 3
7 # (only), as published by the Free Software Foundation.
7 # (only), as published by the Free Software Foundation.
8 #
8 #
9 # This program is distributed in the hope that it will be useful,
9 # This program is distributed in the hope that it will be useful,
10 # but WITHOUT ANY WARRANTY; without even the implied warranty of
10 # but WITHOUT ANY WARRANTY; without even the implied warranty of
11 # MERCHANTABILITY or FITNESS FOR A PARTICULAR PURPOSE. See the
11 # MERCHANTABILITY or FITNESS FOR A PARTICULAR PURPOSE. See the
12 # GNU General Public License for more details.
12 # GNU General Public License for more details.
13 #
13 #
14 # You should have received a copy of the GNU Affero General Public License
14 # You should have received a copy of the GNU Affero General Public License
15 # along with this program. If not, see <http://www.gnu.org/licenses/>.
15 # along with this program. If not, see <http://www.gnu.org/licenses/>.
16 #
16 #
17 # This program is dual-licensed. If you wish to learn more about the
17 # This program is dual-licensed. If you wish to learn more about the
18 # RhodeCode Enterprise Edition, including its added features, Support services,
18 # RhodeCode Enterprise Edition, including its added features, Support services,
19 # and proprietary license terms, please see https://rhodecode.com/licenses/
19 # and proprietary license terms, please see https://rhodecode.com/licenses/
20
20
21 """
21 """
22 Authentication modules
22 Authentication modules
23 """
23 """
24 import socket
24 import socket
25 import string
25 import string
26 import colander
26 import colander
27 import copy
27 import copy
28 import logging
28 import logging
29 import time
29 import time
30 import traceback
30 import traceback
31 import warnings
31 import warnings
32 import functools
32 import functools
33
33
34 from pyramid.threadlocal import get_current_registry
34 from pyramid.threadlocal import get_current_registry
35
35
36 from rhodecode.authentication.interface import IAuthnPluginRegistry
36 from rhodecode.authentication.interface import IAuthnPluginRegistry
37 from rhodecode.authentication.schema import AuthnPluginSettingsSchemaBase
37 from rhodecode.authentication.schema import AuthnPluginSettingsSchemaBase
38 from rhodecode.lib import rc_cache
38 from rhodecode.lib import rc_cache
39 from rhodecode.lib.auth import PasswordGenerator, _RhodeCodeCryptoBCrypt
39 from rhodecode.lib.auth import PasswordGenerator, _RhodeCodeCryptoBCrypt
40 from rhodecode.lib.utils2 import safe_int, safe_str
40 from rhodecode.lib.utils2 import safe_int, safe_str
41 from rhodecode.lib.exceptions import LdapConnectionError, LdapUsernameError, \
41 from rhodecode.lib.exceptions import LdapConnectionError, LdapUsernameError, \
42 LdapPasswordError
42 LdapPasswordError
43 from rhodecode.model.db import User
43 from rhodecode.model.db import User
44 from rhodecode.model.meta import Session
44 from rhodecode.model.meta import Session
45 from rhodecode.model.settings import SettingsModel
45 from rhodecode.model.settings import SettingsModel
46 from rhodecode.model.user import UserModel
46 from rhodecode.model.user import UserModel
47 from rhodecode.model.user_group import UserGroupModel
47 from rhodecode.model.user_group import UserGroupModel
48
48
49
49
50 log = logging.getLogger(__name__)
50 log = logging.getLogger(__name__)
51
51
52 # auth types that authenticate() function can receive
52 # auth types that authenticate() function can receive
53 VCS_TYPE = 'vcs'
53 VCS_TYPE = 'vcs'
54 HTTP_TYPE = 'http'
54 HTTP_TYPE = 'http'
55
55
56 external_auth_session_key = 'rhodecode.external_auth'
56 external_auth_session_key = 'rhodecode.external_auth'
57
57
58
58
59 class hybrid_property(object):
59 class hybrid_property(object):
60 """
60 """
61 a property decorator that works both for instance and class
61 a property decorator that works both for instance and class
62 """
62 """
63 def __init__(self, fget, fset=None, fdel=None, expr=None):
63 def __init__(self, fget, fset=None, fdel=None, expr=None):
64 self.fget = fget
64 self.fget = fget
65 self.fset = fset
65 self.fset = fset
66 self.fdel = fdel
66 self.fdel = fdel
67 self.expr = expr or fget
67 self.expr = expr or fget
68 functools.update_wrapper(self, fget)
68 functools.update_wrapper(self, fget)
69
69
70 def __get__(self, instance, owner):
70 def __get__(self, instance, owner):
71 if instance is None:
71 if instance is None:
72 return self.expr(owner)
72 return self.expr(owner)
73 else:
73 else:
74 return self.fget(instance)
74 return self.fget(instance)
75
75
76 def __set__(self, instance, value):
76 def __set__(self, instance, value):
77 self.fset(instance, value)
77 self.fset(instance, value)
78
78
79 def __delete__(self, instance):
79 def __delete__(self, instance):
80 self.fdel(instance)
80 self.fdel(instance)
81
81
82
82
83 class LazyFormencode(object):
83 class LazyFormencode(object):
84 def __init__(self, formencode_obj, *args, **kwargs):
84 def __init__(self, formencode_obj, *args, **kwargs):
85 self.formencode_obj = formencode_obj
85 self.formencode_obj = formencode_obj
86 self.args = args
86 self.args = args
87 self.kwargs = kwargs
87 self.kwargs = kwargs
88
88
89 def __call__(self, *args, **kwargs):
89 def __call__(self, *args, **kwargs):
90 from inspect import isfunction
90 from inspect import isfunction
91 formencode_obj = self.formencode_obj
91 formencode_obj = self.formencode_obj
92 if isfunction(formencode_obj):
92 if isfunction(formencode_obj):
93 # case we wrap validators into functions
93 # case we wrap validators into functions
94 formencode_obj = self.formencode_obj(*args, **kwargs)
94 formencode_obj = self.formencode_obj(*args, **kwargs)
95 return formencode_obj(*self.args, **self.kwargs)
95 return formencode_obj(*self.args, **self.kwargs)
96
96
97
97
98 class RhodeCodeAuthPluginBase(object):
98 class RhodeCodeAuthPluginBase(object):
99 # UID is used to register plugin to the registry
99 # UID is used to register plugin to the registry
100 uid = None
100 uid = None
101
101
102 # cache the authentication request for N amount of seconds. Some kind
102 # cache the authentication request for N amount of seconds. Some kind
103 # of authentication methods are very heavy and it's very efficient to cache
103 # of authentication methods are very heavy and it's very efficient to cache
104 # the result of a call. If it's set to None (default) cache is off
104 # the result of a call. If it's set to None (default) cache is off
105 AUTH_CACHE_TTL = None
105 AUTH_CACHE_TTL = None
106 AUTH_CACHE = {}
106 AUTH_CACHE = {}
107
107
108 auth_func_attrs = {
108 auth_func_attrs = {
109 "username": "unique username",
109 "username": "unique username",
110 "firstname": "first name",
110 "firstname": "first name",
111 "lastname": "last name",
111 "lastname": "last name",
112 "email": "email address",
112 "email": "email address",
113 "groups": '["list", "of", "groups"]',
113 "groups": '["list", "of", "groups"]',
114 "user_group_sync":
114 "user_group_sync":
115 'True|False defines if returned user groups should be synced',
115 'True|False defines if returned user groups should be synced',
116 "extern_name": "name in external source of record",
116 "extern_name": "name in external source of record",
117 "extern_type": "type of external source of record",
117 "extern_type": "type of external source of record",
118 "admin": 'True|False defines if user should be RhodeCode super admin',
118 "admin": 'True|False defines if user should be RhodeCode super admin',
119 "active":
119 "active":
120 'True|False defines active state of user internally for RhodeCode',
120 'True|False defines active state of user internally for RhodeCode',
121 "active_from_extern":
121 "active_from_extern":
122 "True|False|None, active state from the external auth, "
122 "True|False|None, active state from the external auth, "
123 "None means use definition from RhodeCode extern_type active value"
123 "None means use definition from RhodeCode extern_type active value"
124
124
125 }
125 }
126 # set on authenticate() method and via set_auth_type func.
126 # set on authenticate() method and via set_auth_type func.
127 auth_type = None
127 auth_type = None
128
128
129 # set on authenticate() method and via set_calling_scope_repo, this is a
129 # set on authenticate() method and via set_calling_scope_repo, this is a
130 # calling scope repository when doing authentication most likely on VCS
130 # calling scope repository when doing authentication most likely on VCS
131 # operations
131 # operations
132 acl_repo_name = None
132 acl_repo_name = None
133
133
134 # List of setting names to store encrypted. Plugins may override this list
134 # List of setting names to store encrypted. Plugins may override this list
135 # to store settings encrypted.
135 # to store settings encrypted.
136 _settings_encrypted = []
136 _settings_encrypted = []
137
137
138 # Mapping of python to DB settings model types. Plugins may override or
138 # Mapping of python to DB settings model types. Plugins may override or
139 # extend this mapping.
139 # extend this mapping.
140 _settings_type_map = {
140 _settings_type_map = {
141 colander.String: 'unicode',
141 colander.String: 'unicode',
142 colander.Integer: 'int',
142 colander.Integer: 'int',
143 colander.Boolean: 'bool',
143 colander.Boolean: 'bool',
144 colander.List: 'list',
144 colander.List: 'list',
145 }
145 }
146
146
147 # list of keys in settings that are unsafe to be logged, should be passwords
147 # list of keys in settings that are unsafe to be logged, should be passwords
148 # or other crucial credentials
148 # or other crucial credentials
149 _settings_unsafe_keys = []
149 _settings_unsafe_keys = []
150
150
151 def __init__(self, plugin_id):
151 def __init__(self, plugin_id):
152 self._plugin_id = plugin_id
152 self._plugin_id = plugin_id
153
153
154 def __str__(self):
154 def __str__(self):
155 return self.get_id()
155 return self.get_id()
156
156
157 def _get_setting_full_name(self, name):
157 def _get_setting_full_name(self, name):
158 """
158 """
159 Return the full setting name used for storing values in the database.
159 Return the full setting name used for storing values in the database.
160 """
160 """
161 # TODO: johbo: Using the name here is problematic. It would be good to
161 # TODO: johbo: Using the name here is problematic. It would be good to
162 # introduce either new models in the database to hold Plugin and
162 # introduce either new models in the database to hold Plugin and
163 # PluginSetting or to use the plugin id here.
163 # PluginSetting or to use the plugin id here.
164 return 'auth_{}_{}'.format(self.name, name)
164 return 'auth_{}_{}'.format(self.name, name)
165
165
166 def _get_setting_type(self, name):
166 def _get_setting_type(self, name):
167 """
167 """
168 Return the type of a setting. This type is defined by the SettingsModel
168 Return the type of a setting. This type is defined by the SettingsModel
169 and determines how the setting is stored in DB. Optionally the suffix
169 and determines how the setting is stored in DB. Optionally the suffix
170 `.encrypted` is appended to instruct SettingsModel to store it
170 `.encrypted` is appended to instruct SettingsModel to store it
171 encrypted.
171 encrypted.
172 """
172 """
173 schema_node = self.get_settings_schema().get(name)
173 schema_node = self.get_settings_schema().get(name)
174 db_type = self._settings_type_map.get(
174 db_type = self._settings_type_map.get(
175 type(schema_node.typ), 'unicode')
175 type(schema_node.typ), 'unicode')
176 if name in self._settings_encrypted:
176 if name in self._settings_encrypted:
177 db_type = '{}.encrypted'.format(db_type)
177 db_type = '{}.encrypted'.format(db_type)
178 return db_type
178 return db_type
179
179
180 @classmethod
180 @classmethod
181 def docs(cls):
181 def docs(cls):
182 """
182 """
183 Defines documentation url which helps with plugin setup
183 Defines documentation url which helps with plugin setup
184 """
184 """
185 return ''
185 return ''
186
186
187 @classmethod
187 @classmethod
188 def icon(cls):
188 def icon(cls):
189 """
189 """
190 Defines ICON in SVG format for authentication method
190 Defines ICON in SVG format for authentication method
191 """
191 """
192 return ''
192 return ''
193
193
194 def is_enabled(self):
194 def is_enabled(self):
195 """
195 """
196 Returns true if this plugin is enabled. An enabled plugin can be
196 Returns true if this plugin is enabled. An enabled plugin can be
197 configured in the admin interface but it is not consulted during
197 configured in the admin interface but it is not consulted during
198 authentication.
198 authentication.
199 """
199 """
200 auth_plugins = SettingsModel().get_auth_plugins()
200 auth_plugins = SettingsModel().get_auth_plugins()
201 return self.get_id() in auth_plugins
201 return self.get_id() in auth_plugins
202
202
203 def is_active(self, plugin_cached_settings=None):
203 def is_active(self, plugin_cached_settings=None):
204 """
204 """
205 Returns true if the plugin is activated. An activated plugin is
205 Returns true if the plugin is activated. An activated plugin is
206 consulted during authentication, assumed it is also enabled.
206 consulted during authentication, assumed it is also enabled.
207 """
207 """
208 return self.get_setting_by_name(
208 return self.get_setting_by_name(
209 'enabled', plugin_cached_settings=plugin_cached_settings)
209 'enabled', plugin_cached_settings=plugin_cached_settings)
210
210
211 def get_id(self):
211 def get_id(self):
212 """
212 """
213 Returns the plugin id.
213 Returns the plugin id.
214 """
214 """
215 return self._plugin_id
215 return self._plugin_id
216
216
217 def get_display_name(self):
217 def get_display_name(self):
218 """
218 """
219 Returns a translation string for displaying purposes.
219 Returns a translation string for displaying purposes.
220 """
220 """
221 raise NotImplementedError('Not implemented in base class')
221 raise NotImplementedError('Not implemented in base class')
222
222
223 def get_settings_schema(self):
223 def get_settings_schema(self):
224 """
224 """
225 Returns a colander schema, representing the plugin settings.
225 Returns a colander schema, representing the plugin settings.
226 """
226 """
227 return AuthnPluginSettingsSchemaBase()
227 return AuthnPluginSettingsSchemaBase()
228
228
229 def get_settings(self):
229 def get_settings(self):
230 """
230 """
231 Returns the plugin settings as dictionary.
231 Returns the plugin settings as dictionary.
232 """
232 """
233 settings = {}
233 settings = {}
234 raw_settings = SettingsModel().get_all_settings()
234 raw_settings = SettingsModel().get_all_settings()
235 for node in self.get_settings_schema():
235 for node in self.get_settings_schema():
236 settings[node.name] = self.get_setting_by_name(
236 settings[node.name] = self.get_setting_by_name(
237 node.name, plugin_cached_settings=raw_settings)
237 node.name, plugin_cached_settings=raw_settings)
238 return settings
238 return settings
239
239
240 def get_setting_by_name(self, name, default=None, plugin_cached_settings=None):
240 def get_setting_by_name(self, name, default=None, plugin_cached_settings=None):
241 """
241 """
242 Returns a plugin setting by name.
242 Returns a plugin setting by name.
243 """
243 """
244 full_name = 'rhodecode_{}'.format(self._get_setting_full_name(name))
244 full_name = 'rhodecode_{}'.format(self._get_setting_full_name(name))
245 if plugin_cached_settings:
245 if plugin_cached_settings:
246 plugin_settings = plugin_cached_settings
246 plugin_settings = plugin_cached_settings
247 else:
247 else:
248 plugin_settings = SettingsModel().get_all_settings()
248 plugin_settings = SettingsModel().get_all_settings()
249
249
250 if full_name in plugin_settings:
250 if full_name in plugin_settings:
251 return plugin_settings[full_name]
251 return plugin_settings[full_name]
252 else:
252 else:
253 return default
253 return default
254
254
255 def create_or_update_setting(self, name, value):
255 def create_or_update_setting(self, name, value):
256 """
256 """
257 Create or update a setting for this plugin in the persistent storage.
257 Create or update a setting for this plugin in the persistent storage.
258 """
258 """
259 full_name = self._get_setting_full_name(name)
259 full_name = self._get_setting_full_name(name)
260 type_ = self._get_setting_type(name)
260 type_ = self._get_setting_type(name)
261 db_setting = SettingsModel().create_or_update_setting(
261 db_setting = SettingsModel().create_or_update_setting(
262 full_name, value, type_)
262 full_name, value, type_)
263 return db_setting.app_settings_value
263 return db_setting.app_settings_value
264
264
265 def log_safe_settings(self, settings):
265 def log_safe_settings(self, settings):
266 """
266 """
267 returns a log safe representation of settings, without any secrets
267 returns a log safe representation of settings, without any secrets
268 """
268 """
269 settings_copy = copy.deepcopy(settings)
269 settings_copy = copy.deepcopy(settings)
270 for k in self._settings_unsafe_keys:
270 for k in self._settings_unsafe_keys:
271 if k in settings_copy:
271 if k in settings_copy:
272 del settings_copy[k]
272 del settings_copy[k]
273 return settings_copy
273 return settings_copy
274
274
275 @hybrid_property
275 @hybrid_property
276 def name(self):
276 def name(self):
277 """
277 """
278 Returns the name of this authentication plugin.
278 Returns the name of this authentication plugin.
279
279
280 :returns: string
280 :returns: string
281 """
281 """
282 raise NotImplementedError("Not implemented in base class")
282 raise NotImplementedError("Not implemented in base class")
283
283
284 def get_url_slug(self):
284 def get_url_slug(self):
285 """
285 """
286 Returns a slug which should be used when constructing URLs which refer
286 Returns a slug which should be used when constructing URLs which refer
287 to this plugin. By default it returns the plugin name. If the name is
287 to this plugin. By default it returns the plugin name. If the name is
288 not suitable for using it in an URL the plugin should override this
288 not suitable for using it in an URL the plugin should override this
289 method.
289 method.
290 """
290 """
291 return self.name
291 return self.name
292
292
293 @property
293 @property
294 def is_headers_auth(self):
294 def is_headers_auth(self):
295 """
295 """
296 Returns True if this authentication plugin uses HTTP headers as
296 Returns True if this authentication plugin uses HTTP headers as
297 authentication method.
297 authentication method.
298 """
298 """
299 return False
299 return False
300
300
301 @hybrid_property
301 @hybrid_property
302 def is_container_auth(self):
302 def is_container_auth(self):
303 """
303 """
304 Deprecated method that indicates if this authentication plugin uses
304 Deprecated method that indicates if this authentication plugin uses
305 HTTP headers as authentication method.
305 HTTP headers as authentication method.
306 """
306 """
307 warnings.warn(
307 warnings.warn(
308 'Use is_headers_auth instead.', category=DeprecationWarning)
308 'Use is_headers_auth instead.', category=DeprecationWarning)
309 return self.is_headers_auth
309 return self.is_headers_auth
310
310
311 @hybrid_property
311 @hybrid_property
312 def allows_creating_users(self):
312 def allows_creating_users(self):
313 """
313 """
314 Defines if Plugin allows users to be created on-the-fly when
314 Defines if Plugin allows users to be created on-the-fly when
315 authentication is called. Controls how external plugins should behave
315 authentication is called. Controls how external plugins should behave
316 in terms if they are allowed to create new users, or not. Base plugins
316 in terms if they are allowed to create new users, or not. Base plugins
317 should not be allowed to, but External ones should be !
317 should not be allowed to, but External ones should be !
318
318
319 :return: bool
319 :return: bool
320 """
320 """
321 return False
321 return False
322
322
323 def set_auth_type(self, auth_type):
323 def set_auth_type(self, auth_type):
324 self.auth_type = auth_type
324 self.auth_type = auth_type
325
325
326 def set_calling_scope_repo(self, acl_repo_name):
326 def set_calling_scope_repo(self, acl_repo_name):
327 self.acl_repo_name = acl_repo_name
327 self.acl_repo_name = acl_repo_name
328
328
329 def allows_authentication_from(
329 def allows_authentication_from(
330 self, user, allows_non_existing_user=True,
330 self, user, allows_non_existing_user=True,
331 allowed_auth_plugins=None, allowed_auth_sources=None):
331 allowed_auth_plugins=None, allowed_auth_sources=None):
332 """
332 """
333 Checks if this authentication module should accept a request for
333 Checks if this authentication module should accept a request for
334 the current user.
334 the current user.
335
335
336 :param user: user object fetched using plugin's get_user() method.
336 :param user: user object fetched using plugin's get_user() method.
337 :param allows_non_existing_user: if True, don't allow the
337 :param allows_non_existing_user: if True, don't allow the
338 user to be empty, meaning not existing in our database
338 user to be empty, meaning not existing in our database
339 :param allowed_auth_plugins: if provided, users extern_type will be
339 :param allowed_auth_plugins: if provided, users extern_type will be
340 checked against a list of provided extern types, which are plugin
340 checked against a list of provided extern types, which are plugin
341 auth_names in the end
341 auth_names in the end
342 :param allowed_auth_sources: authentication type allowed,
342 :param allowed_auth_sources: authentication type allowed,
343 `http` or `vcs` default is both.
343 `http` or `vcs` default is both.
344 defines if plugin will accept only http authentication vcs
344 defines if plugin will accept only http authentication vcs
345 authentication(git/hg) or both
345 authentication(git/hg) or both
346 :returns: boolean
346 :returns: boolean
347 """
347 """
348 if not user and not allows_non_existing_user:
348 if not user and not allows_non_existing_user:
349 log.debug('User is empty but plugin does not allow empty users,'
349 log.debug('User is empty but plugin does not allow empty users,'
350 'not allowed to authenticate')
350 'not allowed to authenticate')
351 return False
351 return False
352
352
353 expected_auth_plugins = allowed_auth_plugins or [self.name]
353 expected_auth_plugins = allowed_auth_plugins or [self.name]
354 if user and (user.extern_type and
354 if user and (user.extern_type and
355 user.extern_type not in expected_auth_plugins):
355 user.extern_type not in expected_auth_plugins):
356 log.debug(
356 log.debug(
357 'User `%s` is bound to `%s` auth type. Plugin allows only '
357 'User `%s` is bound to `%s` auth type. Plugin allows only '
358 '%s, skipping', user, user.extern_type, expected_auth_plugins)
358 '%s, skipping', user, user.extern_type, expected_auth_plugins)
359
359
360 return False
360 return False
361
361
362 # by default accept both
362 # by default accept both
363 expected_auth_from = allowed_auth_sources or [HTTP_TYPE, VCS_TYPE]
363 expected_auth_from = allowed_auth_sources or [HTTP_TYPE, VCS_TYPE]
364 if self.auth_type not in expected_auth_from:
364 if self.auth_type not in expected_auth_from:
365 log.debug('Current auth source is %s but plugin only allows %s',
365 log.debug('Current auth source is %s but plugin only allows %s',
366 self.auth_type, expected_auth_from)
366 self.auth_type, expected_auth_from)
367 return False
367 return False
368
368
369 return True
369 return True
370
370
371 def get_user(self, username=None, **kwargs):
371 def get_user(self, username=None, **kwargs):
372 """
372 """
373 Helper method for user fetching in plugins, by default it's using
373 Helper method for user fetching in plugins, by default it's using
374 simple fetch by username, but this method can be custimized in plugins
374 simple fetch by username, but this method can be custimized in plugins
375 eg. headers auth plugin to fetch user by environ params
375 eg. headers auth plugin to fetch user by environ params
376
376
377 :param username: username if given to fetch from database
377 :param username: username if given to fetch from database
378 :param kwargs: extra arguments needed for user fetching.
378 :param kwargs: extra arguments needed for user fetching.
379 """
379 """
380 user = None
380 user = None
381 log.debug(
381 log.debug(
382 'Trying to fetch user `%s` from RhodeCode database', username)
382 'Trying to fetch user `%s` from RhodeCode database', username)
383 if username:
383 if username:
384 user = User.get_by_username(username)
384 user = User.get_by_username(username)
385 if not user:
385 if not user:
386 log.debug('User not found, fallback to fetch user in '
386 log.debug('User not found, fallback to fetch user in '
387 'case insensitive mode')
387 'case insensitive mode')
388 user = User.get_by_username(username, case_insensitive=True)
388 user = User.get_by_username(username, case_insensitive=True)
389 else:
389 else:
390 log.debug('provided username:`%s` is empty skipping...', username)
390 log.debug('provided username:`%s` is empty skipping...', username)
391 if not user:
391 if not user:
392 log.debug('User `%s` not found in database', username)
392 log.debug('User `%s` not found in database', username)
393 else:
393 else:
394 log.debug('Got DB user:%s', user)
394 log.debug('Got DB user:%s', user)
395 return user
395 return user
396
396
397 def user_activation_state(self):
397 def user_activation_state(self):
398 """
398 """
399 Defines user activation state when creating new users
399 Defines user activation state when creating new users
400
400
401 :returns: boolean
401 :returns: boolean
402 """
402 """
403 raise NotImplementedError("Not implemented in base class")
403 raise NotImplementedError("Not implemented in base class")
404
404
405 def auth(self, userobj, username, passwd, settings, **kwargs):
405 def auth(self, userobj, username, passwd, settings, **kwargs):
406 """
406 """
407 Given a user object (which may be null), username, a plaintext
407 Given a user object (which may be null), username, a plaintext
408 password, and a settings object (containing all the keys needed as
408 password, and a settings object (containing all the keys needed as
409 listed in settings()), authenticate this user's login attempt.
409 listed in settings()), authenticate this user's login attempt.
410
410
411 Return None on failure. On success, return a dictionary of the form:
411 Return None on failure. On success, return a dictionary of the form:
412
412
413 see: RhodeCodeAuthPluginBase.auth_func_attrs
413 see: RhodeCodeAuthPluginBase.auth_func_attrs
414 This is later validated for correctness
414 This is later validated for correctness
415 """
415 """
416 raise NotImplementedError("not implemented in base class")
416 raise NotImplementedError("not implemented in base class")
417
417
418 def _authenticate(self, userobj, username, passwd, settings, **kwargs):
418 def _authenticate(self, userobj, username, passwd, settings, **kwargs):
419 """
419 """
420 Wrapper to call self.auth() that validates call on it
420 Wrapper to call self.auth() that validates call on it
421
421
422 :param userobj: userobj
422 :param userobj: userobj
423 :param username: username
423 :param username: username
424 :param passwd: plaintext password
424 :param passwd: plaintext password
425 :param settings: plugin settings
425 :param settings: plugin settings
426 """
426 """
427 auth = self.auth(userobj, username, passwd, settings, **kwargs)
427 auth = self.auth(userobj, username, passwd, settings, **kwargs)
428 if auth:
428 if auth:
429 auth['_plugin'] = self.name
429 auth['_plugin'] = self.name
430 auth['_ttl_cache'] = self.get_ttl_cache(settings)
430 auth['_ttl_cache'] = self.get_ttl_cache(settings)
431 # check if hash should be migrated ?
431 # check if hash should be migrated ?
432 new_hash = auth.get('_hash_migrate')
432 new_hash = auth.get('_hash_migrate')
433 if new_hash:
433 if new_hash:
434 self._migrate_hash_to_bcrypt(username, passwd, new_hash)
434 self._migrate_hash_to_bcrypt(username, passwd, new_hash)
435 if 'user_group_sync' not in auth:
435 if 'user_group_sync' not in auth:
436 auth['user_group_sync'] = False
436 auth['user_group_sync'] = False
437 return self._validate_auth_return(auth)
437 return self._validate_auth_return(auth)
438 return auth
438 return auth
439
439
440 def _migrate_hash_to_bcrypt(self, username, password, new_hash):
440 def _migrate_hash_to_bcrypt(self, username, password, new_hash):
441 new_hash_cypher = _RhodeCodeCryptoBCrypt()
441 new_hash_cypher = _RhodeCodeCryptoBCrypt()
442 # extra checks, so make sure new hash is correct.
442 # extra checks, so make sure new hash is correct.
443 password_encoded = safe_str(password)
443 password_encoded = safe_str(password)
444 if new_hash and new_hash_cypher.hash_check(
444 if new_hash and new_hash_cypher.hash_check(
445 password_encoded, new_hash):
445 password_encoded, new_hash):
446 cur_user = User.get_by_username(username)
446 cur_user = User.get_by_username(username)
447 cur_user.password = new_hash
447 cur_user.password = new_hash
448 Session().add(cur_user)
448 Session().add(cur_user)
449 Session().flush()
449 Session().flush()
450 log.info('Migrated user %s hash to bcrypt', cur_user)
450 log.info('Migrated user %s hash to bcrypt', cur_user)
451
451
452 def _validate_auth_return(self, ret):
452 def _validate_auth_return(self, ret):
453 if not isinstance(ret, dict):
453 if not isinstance(ret, dict):
454 raise Exception('returned value from auth must be a dict')
454 raise Exception('returned value from auth must be a dict')
455 for k in self.auth_func_attrs:
455 for k in self.auth_func_attrs:
456 if k not in ret:
456 if k not in ret:
457 raise Exception('Missing %s attribute from returned data' % k)
457 raise Exception('Missing %s attribute from returned data' % k)
458 return ret
458 return ret
459
459
460 def get_ttl_cache(self, settings=None):
460 def get_ttl_cache(self, settings=None):
461 plugin_settings = settings or self.get_settings()
461 plugin_settings = settings or self.get_settings()
462 # we set default to 30, we make a compromise here,
462 # we set default to 30, we make a compromise here,
463 # performance > security, mostly due to LDAP/SVN, majority
463 # performance > security, mostly due to LDAP/SVN, majority
464 # of users pick cache_ttl to be enabled
464 # of users pick cache_ttl to be enabled
465 from rhodecode.authentication import plugin_default_auth_ttl
465 from rhodecode.authentication import plugin_default_auth_ttl
466 cache_ttl = plugin_default_auth_ttl
466 cache_ttl = plugin_default_auth_ttl
467
467
468 if isinstance(self.AUTH_CACHE_TTL, (int, long)):
468 if isinstance(self.AUTH_CACHE_TTL, (int, long)):
469 # plugin cache set inside is more important than the settings value
469 # plugin cache set inside is more important than the settings value
470 cache_ttl = self.AUTH_CACHE_TTL
470 cache_ttl = self.AUTH_CACHE_TTL
471 elif plugin_settings.get('cache_ttl'):
471 elif plugin_settings.get('cache_ttl'):
472 cache_ttl = safe_int(plugin_settings.get('cache_ttl'), 0)
472 cache_ttl = safe_int(plugin_settings.get('cache_ttl'), 0)
473
473
474 plugin_cache_active = bool(cache_ttl and cache_ttl > 0)
474 plugin_cache_active = bool(cache_ttl and cache_ttl > 0)
475 return plugin_cache_active, cache_ttl
475 return plugin_cache_active, cache_ttl
476
476
477
477
478 class RhodeCodeExternalAuthPlugin(RhodeCodeAuthPluginBase):
478 class RhodeCodeExternalAuthPlugin(RhodeCodeAuthPluginBase):
479
479
480 @hybrid_property
480 @hybrid_property
481 def allows_creating_users(self):
481 def allows_creating_users(self):
482 return True
482 return True
483
483
484 def use_fake_password(self):
484 def use_fake_password(self):
485 """
485 """
486 Return a boolean that indicates whether or not we should set the user's
486 Return a boolean that indicates whether or not we should set the user's
487 password to a random value when it is authenticated by this plugin.
487 password to a random value when it is authenticated by this plugin.
488 If your plugin provides authentication, then you will generally
488 If your plugin provides authentication, then you will generally
489 want this.
489 want this.
490
490
491 :returns: boolean
491 :returns: boolean
492 """
492 """
493 raise NotImplementedError("Not implemented in base class")
493 raise NotImplementedError("Not implemented in base class")
494
494
495 def _authenticate(self, userobj, username, passwd, settings, **kwargs):
495 def _authenticate(self, userobj, username, passwd, settings, **kwargs):
496 # at this point _authenticate calls plugin's `auth()` function
496 # at this point _authenticate calls plugin's `auth()` function
497 auth = super(RhodeCodeExternalAuthPlugin, self)._authenticate(
497 auth = super(RhodeCodeExternalAuthPlugin, self)._authenticate(
498 userobj, username, passwd, settings, **kwargs)
498 userobj, username, passwd, settings, **kwargs)
499
499
500 if auth:
500 if auth:
501 # maybe plugin will clean the username ?
501 # maybe plugin will clean the username ?
502 # we should use the return value
502 # we should use the return value
503 username = auth['username']
503 username = auth['username']
504
504
505 # if external source tells us that user is not active, we should
505 # if external source tells us that user is not active, we should
506 # skip rest of the process. This can prevent from creating users in
506 # skip rest of the process. This can prevent from creating users in
507 # RhodeCode when using external authentication, but if it's
507 # RhodeCode when using external authentication, but if it's
508 # inactive user we shouldn't create that user anyway
508 # inactive user we shouldn't create that user anyway
509 if auth['active_from_extern'] is False:
509 if auth['active_from_extern'] is False:
510 log.warning(
510 log.warning(
511 "User %s authenticated against %s, but is inactive",
511 "User %s authenticated against %s, but is inactive",
512 username, self.__module__)
512 username, self.__module__)
513 return None
513 return None
514
514
515 cur_user = User.get_by_username(username, case_insensitive=True)
515 cur_user = User.get_by_username(username, case_insensitive=True)
516 is_user_existing = cur_user is not None
516 is_user_existing = cur_user is not None
517
517
518 if is_user_existing:
518 if is_user_existing:
519 log.debug('Syncing user `%s` from '
519 log.debug('Syncing user `%s` from '
520 '`%s` plugin', username, self.name)
520 '`%s` plugin', username, self.name)
521 else:
521 else:
522 log.debug('Creating non existing user `%s` from '
522 log.debug('Creating non existing user `%s` from '
523 '`%s` plugin', username, self.name)
523 '`%s` plugin', username, self.name)
524
524
525 if self.allows_creating_users:
525 if self.allows_creating_users:
526 log.debug('Plugin `%s` allows to '
526 log.debug('Plugin `%s` allows to '
527 'create new users', self.name)
527 'create new users', self.name)
528 else:
528 else:
529 log.debug('Plugin `%s` does not allow to '
529 log.debug('Plugin `%s` does not allow to '
530 'create new users', self.name)
530 'create new users', self.name)
531
531
532 user_parameters = {
532 user_parameters = {
533 'username': username,
533 'username': username,
534 'email': auth["email"],
534 'email': auth["email"],
535 'firstname': auth["firstname"],
535 'firstname': auth["firstname"],
536 'lastname': auth["lastname"],
536 'lastname': auth["lastname"],
537 'active': auth["active"],
537 'active': auth["active"],
538 'admin': auth["admin"],
538 'admin': auth["admin"],
539 'extern_name': auth["extern_name"],
539 'extern_name': auth["extern_name"],
540 'extern_type': self.name,
540 'extern_type': self.name,
541 'plugin': self,
541 'plugin': self,
542 'allow_to_create_user': self.allows_creating_users,
542 'allow_to_create_user': self.allows_creating_users,
543 }
543 }
544
544
545 if not is_user_existing:
545 if not is_user_existing:
546 if self.use_fake_password():
546 if self.use_fake_password():
547 # Randomize the PW because we don't need it, but don't want
547 # Randomize the PW because we don't need it, but don't want
548 # them blank either
548 # them blank either
549 passwd = PasswordGenerator().gen_password(length=16)
549 passwd = PasswordGenerator().gen_password(length=16)
550 user_parameters['password'] = passwd
550 user_parameters['password'] = passwd
551 else:
551 else:
552 # Since the password is required by create_or_update method of
552 # Since the password is required by create_or_update method of
553 # UserModel, we need to set it explicitly.
553 # UserModel, we need to set it explicitly.
554 # The create_or_update method is smart and recognises the
554 # The create_or_update method is smart and recognises the
555 # password hashes as well.
555 # password hashes as well.
556 user_parameters['password'] = cur_user.password
556 user_parameters['password'] = cur_user.password
557
557
558 # we either create or update users, we also pass the flag
558 # we either create or update users, we also pass the flag
559 # that controls if this method can actually do that.
559 # that controls if this method can actually do that.
560 # raises NotAllowedToCreateUserError if it cannot, and we try to.
560 # raises NotAllowedToCreateUserError if it cannot, and we try to.
561 user = UserModel().create_or_update(**user_parameters)
561 user = UserModel().create_or_update(**user_parameters)
562 Session().flush()
562 Session().flush()
563 # enforce user is just in given groups, all of them has to be ones
563 # enforce user is just in given groups, all of them has to be ones
564 # created from plugins. We store this info in _group_data JSON
564 # created from plugins. We store this info in _group_data JSON
565 # field
565 # field
566
566
567 if auth['user_group_sync']:
567 if auth['user_group_sync']:
568 try:
568 try:
569 groups = auth['groups'] or []
569 groups = auth['groups'] or []
570 log.debug(
570 log.debug(
571 'Performing user_group sync based on set `%s` '
571 'Performing user_group sync based on set `%s` '
572 'returned by `%s` plugin', groups, self.name)
572 'returned by `%s` plugin', groups, self.name)
573 UserGroupModel().enforce_groups(user, groups, self.name)
573 UserGroupModel().enforce_groups(user, groups, self.name)
574 except Exception:
574 except Exception:
575 # for any reason group syncing fails, we should
575 # for any reason group syncing fails, we should
576 # proceed with login
576 # proceed with login
577 log.error(traceback.format_exc())
577 log.error(traceback.format_exc())
578
578
579 Session().commit()
579 Session().commit()
580 return auth
580 return auth
581
581
582
582
583 class AuthLdapBase(object):
583 class AuthLdapBase(object):
584
584
585 @classmethod
585 @classmethod
586 def _build_servers(cls, ldap_server_type, ldap_server, port, use_resolver=True):
586 def _build_servers(cls, ldap_server_type, ldap_server, port, use_resolver=True):
587
587
588 def host_resolver(host, port, full_resolve=True):
588 def host_resolver(host, port, full_resolve=True):
589 """
589 """
590 Main work for this function is to prevent ldap connection issues,
590 Main work for this function is to prevent ldap connection issues,
591 and detect them early using a "greenified" sockets
591 and detect them early using a "greenified" sockets
592 """
592 """
593 host = host.strip()
593 host = host.strip()
594 if not full_resolve:
594 if not full_resolve:
595 return '{}:{}'.format(host, port)
595 return '{}:{}'.format(host, port)
596
596
597 log.debug('LDAP: Resolving IP for LDAP host %s', host)
597 log.debug('LDAP: Resolving IP for LDAP host %s', host)
598 try:
598 try:
599 ip = socket.gethostbyname(host)
599 ip = socket.gethostbyname(host)
600 log.debug('Got LDAP server %s ip %s', host, ip)
600 log.debug('Got LDAP server %s ip %s', host, ip)
601 except Exception:
601 except Exception:
602 raise LdapConnectionError(
602 raise LdapConnectionError(
603 'Failed to resolve host: `{}`'.format(host))
603 'Failed to resolve host: `{}`'.format(host))
604
604
605 log.debug('LDAP: Checking if IP %s is accessible', ip)
605 log.debug('LDAP: Checking if IP %s is accessible', ip)
606 s = socket.socket(socket.AF_INET, socket.SOCK_STREAM)
606 s = socket.socket(socket.AF_INET, socket.SOCK_STREAM)
607 try:
607 try:
608 s.connect((ip, int(port)))
608 s.connect((ip, int(port)))
609 s.shutdown(socket.SHUT_RD)
609 s.shutdown(socket.SHUT_RD)
610 except Exception:
610 except Exception:
611 raise LdapConnectionError(
611 raise LdapConnectionError(
612 'Failed to connect to host: `{}:{}`'.format(host, port))
612 'Failed to connect to host: `{}:{}`'.format(host, port))
613
613
614 return '{}:{}'.format(host, port)
614 return '{}:{}'.format(host, port)
615
615
616 if len(ldap_server) == 1:
616 if len(ldap_server) == 1:
617 # in case of single server use resolver to detect potential
617 # in case of single server use resolver to detect potential
618 # connection issues
618 # connection issues
619 full_resolve = True
619 full_resolve = True
620 else:
620 else:
621 full_resolve = False
621 full_resolve = False
622
622
623 return ', '.join(
623 return ', '.join(
624 ["{}://{}".format(
624 ["{}://{}".format(
625 ldap_server_type,
625 ldap_server_type,
626 host_resolver(host, port, full_resolve=use_resolver and full_resolve))
626 host_resolver(host, port, full_resolve=use_resolver and full_resolve))
627 for host in ldap_server])
627 for host in ldap_server])
628
628
629 @classmethod
629 @classmethod
630 def _get_server_list(cls, servers):
630 def _get_server_list(cls, servers):
631 return map(string.strip, servers.split(','))
631 return map(string.strip, servers.split(','))
632
632
633 @classmethod
633 @classmethod
634 def get_uid(cls, username, server_addresses):
634 def get_uid(cls, username, server_addresses):
635 uid = username
635 uid = username
636 for server_addr in server_addresses:
636 for server_addr in server_addresses:
637 uid = chop_at(username, "@%s" % server_addr)
637 uid = chop_at(username, "@%s" % server_addr)
638 return uid
638 return uid
639
639
640 @classmethod
640 @classmethod
641 def validate_username(cls, username):
641 def validate_username(cls, username):
642 if "," in username:
642 if "," in username:
643 raise LdapUsernameError(
643 raise LdapUsernameError(
644 "invalid character `,` in username: `{}`".format(username))
644 "invalid character `,` in username: `{}`".format(username))
645
645
646 @classmethod
646 @classmethod
647 def validate_password(cls, username, password):
647 def validate_password(cls, username, password):
648 if not password:
648 if not password:
649 msg = "Authenticating user %s with blank password not allowed"
649 msg = "Authenticating user %s with blank password not allowed"
650 log.warning(msg, username)
650 log.warning(msg, username)
651 raise LdapPasswordError(msg)
651 raise LdapPasswordError(msg)
652
652
653
653
654 def loadplugin(plugin_id):
654 def loadplugin(plugin_id):
655 """
655 """
656 Loads and returns an instantiated authentication plugin.
656 Loads and returns an instantiated authentication plugin.
657 Returns the RhodeCodeAuthPluginBase subclass on success,
657 Returns the RhodeCodeAuthPluginBase subclass on success,
658 or None on failure.
658 or None on failure.
659 """
659 """
660 # TODO: Disusing pyramids thread locals to retrieve the registry.
660 # TODO: Disusing pyramids thread locals to retrieve the registry.
661 authn_registry = get_authn_registry()
661 authn_registry = get_authn_registry()
662 plugin = authn_registry.get_plugin(plugin_id)
662 plugin = authn_registry.get_plugin(plugin_id)
663 if plugin is None:
663 if plugin is None:
664 log.error('Authentication plugin not found: "%s"', plugin_id)
664 log.error('Authentication plugin not found: "%s"', plugin_id)
665 return plugin
665 return plugin
666
666
667
667
668 def get_authn_registry(registry=None):
668 def get_authn_registry(registry=None):
669 registry = registry or get_current_registry()
669 registry = registry or get_current_registry()
670 authn_registry = registry.getUtility(IAuthnPluginRegistry)
670 authn_registry = registry.getUtility(IAuthnPluginRegistry)
671 return authn_registry
671 return authn_registry
672
672
673
673
674 def authenticate(username, password, environ=None, auth_type=None,
674 def authenticate(username, password, environ=None, auth_type=None,
675 skip_missing=False, registry=None, acl_repo_name=None):
675 skip_missing=False, registry=None, acl_repo_name=None):
676 """
676 """
677 Authentication function used for access control,
677 Authentication function used for access control,
678 It tries to authenticate based on enabled authentication modules.
678 It tries to authenticate based on enabled authentication modules.
679
679
680 :param username: username can be empty for headers auth
680 :param username: username can be empty for headers auth
681 :param password: password can be empty for headers auth
681 :param password: password can be empty for headers auth
682 :param environ: environ headers passed for headers auth
682 :param environ: environ headers passed for headers auth
683 :param auth_type: type of authentication, either `HTTP_TYPE` or `VCS_TYPE`
683 :param auth_type: type of authentication, either `HTTP_TYPE` or `VCS_TYPE`
684 :param skip_missing: ignores plugins that are in db but not in environment
684 :param skip_missing: ignores plugins that are in db but not in environment
685 :returns: None if auth failed, plugin_user dict if auth is correct
685 :returns: None if auth failed, plugin_user dict if auth is correct
686 """
686 """
687 if not auth_type or auth_type not in [HTTP_TYPE, VCS_TYPE]:
687 if not auth_type or auth_type not in [HTTP_TYPE, VCS_TYPE]:
688 raise ValueError('auth type must be on of http, vcs got "%s" instead'
688 raise ValueError('auth type must be on of http, vcs got "%s" instead'
689 % auth_type)
689 % auth_type)
690 headers_only = environ and not (username and password)
690 headers_only = environ and not (username and password)
691
691
692 authn_registry = get_authn_registry(registry)
692 authn_registry = get_authn_registry(registry)
693 plugins_to_check = authn_registry.get_plugins_for_authentication()
693 plugins_to_check = authn_registry.get_plugins_for_authentication()
694 log.debug('Starting ordered authentication chain using %s plugins',
694 log.debug('Starting ordered authentication chain using %s plugins',
695 [x.name for x in plugins_to_check])
695 [x.name for x in plugins_to_check])
696 for plugin in plugins_to_check:
696 for plugin in plugins_to_check:
697 plugin.set_auth_type(auth_type)
697 plugin.set_auth_type(auth_type)
698 plugin.set_calling_scope_repo(acl_repo_name)
698 plugin.set_calling_scope_repo(acl_repo_name)
699
699
700 if headers_only and not plugin.is_headers_auth:
700 if headers_only and not plugin.is_headers_auth:
701 log.debug('Auth type is for headers only and plugin `%s` is not '
701 log.debug('Auth type is for headers only and plugin `%s` is not '
702 'headers plugin, skipping...', plugin.get_id())
702 'headers plugin, skipping...', plugin.get_id())
703 continue
703 continue
704
704
705 log.debug('Trying authentication using ** %s **', plugin.get_id())
705 log.debug('Trying authentication using ** %s **', plugin.get_id())
706
706
707 # load plugin settings from RhodeCode database
707 # load plugin settings from RhodeCode database
708 plugin_settings = plugin.get_settings()
708 plugin_settings = plugin.get_settings()
709 plugin_sanitized_settings = plugin.log_safe_settings(plugin_settings)
709 plugin_sanitized_settings = plugin.log_safe_settings(plugin_settings)
710 log.debug('Plugin `%s` settings:%s', plugin.get_id(), plugin_sanitized_settings)
710 log.debug('Plugin `%s` settings:%s', plugin.get_id(), plugin_sanitized_settings)
711
711
712 # use plugin's method of user extraction.
712 # use plugin's method of user extraction.
713 user = plugin.get_user(username, environ=environ,
713 user = plugin.get_user(username, environ=environ,
714 settings=plugin_settings)
714 settings=plugin_settings)
715 display_user = user.username if user else username
715 display_user = user.username if user else username
716 log.debug(
716 log.debug(
717 'Plugin %s extracted user is `%s`', plugin.get_id(), display_user)
717 'Plugin %s extracted user is `%s`', plugin.get_id(), display_user)
718
718
719 if not plugin.allows_authentication_from(user):
719 if not plugin.allows_authentication_from(user):
720 log.debug('Plugin %s does not accept user `%s` for authentication',
720 log.debug('Plugin %s does not accept user `%s` for authentication',
721 plugin.get_id(), display_user)
721 plugin.get_id(), display_user)
722 continue
722 continue
723 else:
723 else:
724 log.debug('Plugin %s accepted user `%s` for authentication',
724 log.debug('Plugin %s accepted user `%s` for authentication',
725 plugin.get_id(), display_user)
725 plugin.get_id(), display_user)
726
726
727 log.info('Authenticating user `%s` using %s plugin',
727 log.info('Authenticating user `%s` using %s plugin',
728 display_user, plugin.get_id())
728 display_user, plugin.get_id())
729
729
730 plugin_cache_active, cache_ttl = plugin.get_ttl_cache(plugin_settings)
730 plugin_cache_active, cache_ttl = plugin.get_ttl_cache(plugin_settings)
731
731
732 log.debug('AUTH_CACHE_TTL for plugin `%s` active: %s (TTL: %s)',
732 log.debug('AUTH_CACHE_TTL for plugin `%s` active: %s (TTL: %s)',
733 plugin.get_id(), plugin_cache_active, cache_ttl)
733 plugin.get_id(), plugin_cache_active, cache_ttl)
734
734
735 user_id = user.user_id if user else None
735 user_id = user.user_id if user else None
736 # don't cache for empty users
736 # don't cache for empty users
737 plugin_cache_active = plugin_cache_active and user_id
737 plugin_cache_active = plugin_cache_active and user_id
738 cache_namespace_uid = 'cache_user_auth.{}'.format(user_id)
738 cache_namespace_uid = 'cache_user_auth.{}'.format(user_id)
739 region = rc_cache.get_or_create_region('cache_perms', cache_namespace_uid)
739 region = rc_cache.get_or_create_region('cache_perms', cache_namespace_uid)
740
740
741 @region.conditional_cache_on_arguments(namespace=cache_namespace_uid,
741 @region.conditional_cache_on_arguments(namespace=cache_namespace_uid,
742 expiration_time=cache_ttl,
742 expiration_time=cache_ttl,
743 condition=plugin_cache_active)
743 condition=plugin_cache_active)
744 def compute_auth(
744 def compute_auth(
745 cache_name, plugin_name, username, password):
745 cache_name, plugin_name, username, password):
746
746
747 # _authenticate is a wrapper for .auth() method of plugin.
747 # _authenticate is a wrapper for .auth() method of plugin.
748 # it checks if .auth() sends proper data.
748 # it checks if .auth() sends proper data.
749 # For RhodeCodeExternalAuthPlugin it also maps users to
749 # For RhodeCodeExternalAuthPlugin it also maps users to
750 # Database and maps the attributes returned from .auth()
750 # Database and maps the attributes returned from .auth()
751 # to RhodeCode database. If this function returns data
751 # to RhodeCode database. If this function returns data
752 # then auth is correct.
752 # then auth is correct.
753 log.debug('Running plugin `%s` _authenticate method '
753 log.debug('Running plugin `%s` _authenticate method '
754 'using username and password', plugin.get_id())
754 'using username and password', plugin.get_id())
755 return plugin._authenticate(
755 return plugin._authenticate(
756 user, username, password, plugin_settings,
756 user, username, password, plugin_settings,
757 environ=environ or {})
757 environ=environ or {})
758
758
759 start = time.time()
759 start = time.time()
760 # for environ based auth, password can be empty, but then the validation is
760 # for environ based auth, password can be empty, but then the validation is
761 # on the server that fills in the env data needed for authentication
761 # on the server that fills in the env data needed for authentication
762 plugin_user = compute_auth('auth', plugin.name, username, (password or ''))
762 plugin_user = compute_auth('auth', plugin.name, username, (password or ''))
763
763
764 auth_time = time.time() - start
764 auth_time = time.time() - start
765 log.debug('Authentication for plugin `%s` completed in %.3fs, '
765 log.debug('Authentication for plugin `%s` completed in %.4fs, '
766 'expiration time of fetched cache %.1fs.',
766 'expiration time of fetched cache %.1fs.',
767 plugin.get_id(), auth_time, cache_ttl)
767 plugin.get_id(), auth_time, cache_ttl)
768
768
769 log.debug('PLUGIN USER DATA: %s', plugin_user)
769 log.debug('PLUGIN USER DATA: %s', plugin_user)
770
770
771 if plugin_user:
771 if plugin_user:
772 log.debug('Plugin returned proper authentication data')
772 log.debug('Plugin returned proper authentication data')
773 return plugin_user
773 return plugin_user
774 # we failed to Auth because .auth() method didn't return proper user
774 # we failed to Auth because .auth() method didn't return proper user
775 log.debug("User `%s` failed to authenticate against %s",
775 log.debug("User `%s` failed to authenticate against %s",
776 display_user, plugin.get_id())
776 display_user, plugin.get_id())
777
777
778 # case when we failed to authenticate against all defined plugins
778 # case when we failed to authenticate against all defined plugins
779 return None
779 return None
780
780
781
781
782 def chop_at(s, sub, inclusive=False):
782 def chop_at(s, sub, inclusive=False):
783 """Truncate string ``s`` at the first occurrence of ``sub``.
783 """Truncate string ``s`` at the first occurrence of ``sub``.
784
784
785 If ``inclusive`` is true, truncate just after ``sub`` rather than at it.
785 If ``inclusive`` is true, truncate just after ``sub`` rather than at it.
786
786
787 >>> chop_at("plutocratic brats", "rat")
787 >>> chop_at("plutocratic brats", "rat")
788 'plutoc'
788 'plutoc'
789 >>> chop_at("plutocratic brats", "rat", True)
789 >>> chop_at("plutocratic brats", "rat", True)
790 'plutocrat'
790 'plutocrat'
791 """
791 """
792 pos = s.find(sub)
792 pos = s.find(sub)
793 if pos == -1:
793 if pos == -1:
794 return s
794 return s
795 if inclusive:
795 if inclusive:
796 return s[:pos+len(sub)]
796 return s[:pos+len(sub)]
797 return s[:pos]
797 return s[:pos]
@@ -1,2352 +1,2352 b''
1 # -*- coding: utf-8 -*-
1 # -*- coding: utf-8 -*-
2
2
3 # Copyright (C) 2010-2019 RhodeCode GmbH
3 # Copyright (C) 2010-2019 RhodeCode GmbH
4 #
4 #
5 # This program is free software: you can redistribute it and/or modify
5 # This program is free software: you can redistribute it and/or modify
6 # it under the terms of the GNU Affero General Public License, version 3
6 # it under the terms of the GNU Affero General Public License, version 3
7 # (only), as published by the Free Software Foundation.
7 # (only), as published by the Free Software Foundation.
8 #
8 #
9 # This program is distributed in the hope that it will be useful,
9 # This program is distributed in the hope that it will be useful,
10 # but WITHOUT ANY WARRANTY; without even the implied warranty of
10 # but WITHOUT ANY WARRANTY; without even the implied warranty of
11 # MERCHANTABILITY or FITNESS FOR A PARTICULAR PURPOSE. See the
11 # MERCHANTABILITY or FITNESS FOR A PARTICULAR PURPOSE. See the
12 # GNU General Public License for more details.
12 # GNU General Public License for more details.
13 #
13 #
14 # You should have received a copy of the GNU Affero General Public License
14 # You should have received a copy of the GNU Affero General Public License
15 # along with this program. If not, see <http://www.gnu.org/licenses/>.
15 # along with this program. If not, see <http://www.gnu.org/licenses/>.
16 #
16 #
17 # This program is dual-licensed. If you wish to learn more about the
17 # This program is dual-licensed. If you wish to learn more about the
18 # RhodeCode Enterprise Edition, including its added features, Support services,
18 # RhodeCode Enterprise Edition, including its added features, Support services,
19 # and proprietary license terms, please see https://rhodecode.com/licenses/
19 # and proprietary license terms, please see https://rhodecode.com/licenses/
20
20
21 """
21 """
22 authentication and permission libraries
22 authentication and permission libraries
23 """
23 """
24
24
25 import os
25 import os
26 import time
26 import time
27 import inspect
27 import inspect
28 import collections
28 import collections
29 import fnmatch
29 import fnmatch
30 import hashlib
30 import hashlib
31 import itertools
31 import itertools
32 import logging
32 import logging
33 import random
33 import random
34 import traceback
34 import traceback
35 from functools import wraps
35 from functools import wraps
36
36
37 import ipaddress
37 import ipaddress
38
38
39 from pyramid.httpexceptions import HTTPForbidden, HTTPFound, HTTPNotFound
39 from pyramid.httpexceptions import HTTPForbidden, HTTPFound, HTTPNotFound
40 from sqlalchemy.orm.exc import ObjectDeletedError
40 from sqlalchemy.orm.exc import ObjectDeletedError
41 from sqlalchemy.orm import joinedload
41 from sqlalchemy.orm import joinedload
42 from zope.cachedescriptors.property import Lazy as LazyProperty
42 from zope.cachedescriptors.property import Lazy as LazyProperty
43
43
44 import rhodecode
44 import rhodecode
45 from rhodecode.model import meta
45 from rhodecode.model import meta
46 from rhodecode.model.meta import Session
46 from rhodecode.model.meta import Session
47 from rhodecode.model.user import UserModel
47 from rhodecode.model.user import UserModel
48 from rhodecode.model.db import (
48 from rhodecode.model.db import (
49 User, Repository, Permission, UserToPerm, UserGroupToPerm, UserGroupMember,
49 User, Repository, Permission, UserToPerm, UserGroupToPerm, UserGroupMember,
50 UserIpMap, UserApiKeys, RepoGroup, UserGroup)
50 UserIpMap, UserApiKeys, RepoGroup, UserGroup)
51 from rhodecode.lib import rc_cache
51 from rhodecode.lib import rc_cache
52 from rhodecode.lib.utils2 import safe_unicode, aslist, safe_str, md5, safe_int, sha1
52 from rhodecode.lib.utils2 import safe_unicode, aslist, safe_str, md5, safe_int, sha1
53 from rhodecode.lib.utils import (
53 from rhodecode.lib.utils import (
54 get_repo_slug, get_repo_group_slug, get_user_group_slug)
54 get_repo_slug, get_repo_group_slug, get_user_group_slug)
55 from rhodecode.lib.caching_query import FromCache
55 from rhodecode.lib.caching_query import FromCache
56
56
57
57
58 if rhodecode.is_unix:
58 if rhodecode.is_unix:
59 import bcrypt
59 import bcrypt
60
60
61 log = logging.getLogger(__name__)
61 log = logging.getLogger(__name__)
62
62
63 csrf_token_key = "csrf_token"
63 csrf_token_key = "csrf_token"
64
64
65
65
66 class PasswordGenerator(object):
66 class PasswordGenerator(object):
67 """
67 """
68 This is a simple class for generating password from different sets of
68 This is a simple class for generating password from different sets of
69 characters
69 characters
70 usage::
70 usage::
71 passwd_gen = PasswordGenerator()
71 passwd_gen = PasswordGenerator()
72 #print 8-letter password containing only big and small letters
72 #print 8-letter password containing only big and small letters
73 of alphabet
73 of alphabet
74 passwd_gen.gen_password(8, passwd_gen.ALPHABETS_BIG_SMALL)
74 passwd_gen.gen_password(8, passwd_gen.ALPHABETS_BIG_SMALL)
75 """
75 """
76 ALPHABETS_NUM = r'''1234567890'''
76 ALPHABETS_NUM = r'''1234567890'''
77 ALPHABETS_SMALL = r'''qwertyuiopasdfghjklzxcvbnm'''
77 ALPHABETS_SMALL = r'''qwertyuiopasdfghjklzxcvbnm'''
78 ALPHABETS_BIG = r'''QWERTYUIOPASDFGHJKLZXCVBNM'''
78 ALPHABETS_BIG = r'''QWERTYUIOPASDFGHJKLZXCVBNM'''
79 ALPHABETS_SPECIAL = r'''`-=[]\;',./~!@#$%^&*()_+{}|:"<>?'''
79 ALPHABETS_SPECIAL = r'''`-=[]\;',./~!@#$%^&*()_+{}|:"<>?'''
80 ALPHABETS_FULL = ALPHABETS_BIG + ALPHABETS_SMALL \
80 ALPHABETS_FULL = ALPHABETS_BIG + ALPHABETS_SMALL \
81 + ALPHABETS_NUM + ALPHABETS_SPECIAL
81 + ALPHABETS_NUM + ALPHABETS_SPECIAL
82 ALPHABETS_ALPHANUM = ALPHABETS_BIG + ALPHABETS_SMALL + ALPHABETS_NUM
82 ALPHABETS_ALPHANUM = ALPHABETS_BIG + ALPHABETS_SMALL + ALPHABETS_NUM
83 ALPHABETS_BIG_SMALL = ALPHABETS_BIG + ALPHABETS_SMALL
83 ALPHABETS_BIG_SMALL = ALPHABETS_BIG + ALPHABETS_SMALL
84 ALPHABETS_ALPHANUM_BIG = ALPHABETS_BIG + ALPHABETS_NUM
84 ALPHABETS_ALPHANUM_BIG = ALPHABETS_BIG + ALPHABETS_NUM
85 ALPHABETS_ALPHANUM_SMALL = ALPHABETS_SMALL + ALPHABETS_NUM
85 ALPHABETS_ALPHANUM_SMALL = ALPHABETS_SMALL + ALPHABETS_NUM
86
86
87 def __init__(self, passwd=''):
87 def __init__(self, passwd=''):
88 self.passwd = passwd
88 self.passwd = passwd
89
89
90 def gen_password(self, length, type_=None):
90 def gen_password(self, length, type_=None):
91 if type_ is None:
91 if type_ is None:
92 type_ = self.ALPHABETS_FULL
92 type_ = self.ALPHABETS_FULL
93 self.passwd = ''.join([random.choice(type_) for _ in range(length)])
93 self.passwd = ''.join([random.choice(type_) for _ in range(length)])
94 return self.passwd
94 return self.passwd
95
95
96
96
97 class _RhodeCodeCryptoBase(object):
97 class _RhodeCodeCryptoBase(object):
98 ENC_PREF = None
98 ENC_PREF = None
99
99
100 def hash_create(self, str_):
100 def hash_create(self, str_):
101 """
101 """
102 hash the string using
102 hash the string using
103
103
104 :param str_: password to hash
104 :param str_: password to hash
105 """
105 """
106 raise NotImplementedError
106 raise NotImplementedError
107
107
108 def hash_check_with_upgrade(self, password, hashed):
108 def hash_check_with_upgrade(self, password, hashed):
109 """
109 """
110 Returns tuple in which first element is boolean that states that
110 Returns tuple in which first element is boolean that states that
111 given password matches it's hashed version, and the second is new hash
111 given password matches it's hashed version, and the second is new hash
112 of the password, in case this password should be migrated to new
112 of the password, in case this password should be migrated to new
113 cipher.
113 cipher.
114 """
114 """
115 checked_hash = self.hash_check(password, hashed)
115 checked_hash = self.hash_check(password, hashed)
116 return checked_hash, None
116 return checked_hash, None
117
117
118 def hash_check(self, password, hashed):
118 def hash_check(self, password, hashed):
119 """
119 """
120 Checks matching password with it's hashed value.
120 Checks matching password with it's hashed value.
121
121
122 :param password: password
122 :param password: password
123 :param hashed: password in hashed form
123 :param hashed: password in hashed form
124 """
124 """
125 raise NotImplementedError
125 raise NotImplementedError
126
126
127 def _assert_bytes(self, value):
127 def _assert_bytes(self, value):
128 """
128 """
129 Passing in an `unicode` object can lead to hard to detect issues
129 Passing in an `unicode` object can lead to hard to detect issues
130 if passwords contain non-ascii characters. Doing a type check
130 if passwords contain non-ascii characters. Doing a type check
131 during runtime, so that such mistakes are detected early on.
131 during runtime, so that such mistakes are detected early on.
132 """
132 """
133 if not isinstance(value, str):
133 if not isinstance(value, str):
134 raise TypeError(
134 raise TypeError(
135 "Bytestring required as input, got %r." % (value, ))
135 "Bytestring required as input, got %r." % (value, ))
136
136
137
137
138 class _RhodeCodeCryptoBCrypt(_RhodeCodeCryptoBase):
138 class _RhodeCodeCryptoBCrypt(_RhodeCodeCryptoBase):
139 ENC_PREF = ('$2a$10', '$2b$10')
139 ENC_PREF = ('$2a$10', '$2b$10')
140
140
141 def hash_create(self, str_):
141 def hash_create(self, str_):
142 self._assert_bytes(str_)
142 self._assert_bytes(str_)
143 return bcrypt.hashpw(str_, bcrypt.gensalt(10))
143 return bcrypt.hashpw(str_, bcrypt.gensalt(10))
144
144
145 def hash_check_with_upgrade(self, password, hashed):
145 def hash_check_with_upgrade(self, password, hashed):
146 """
146 """
147 Returns tuple in which first element is boolean that states that
147 Returns tuple in which first element is boolean that states that
148 given password matches it's hashed version, and the second is new hash
148 given password matches it's hashed version, and the second is new hash
149 of the password, in case this password should be migrated to new
149 of the password, in case this password should be migrated to new
150 cipher.
150 cipher.
151
151
152 This implements special upgrade logic which works like that:
152 This implements special upgrade logic which works like that:
153 - check if the given password == bcrypted hash, if yes then we
153 - check if the given password == bcrypted hash, if yes then we
154 properly used password and it was already in bcrypt. Proceed
154 properly used password and it was already in bcrypt. Proceed
155 without any changes
155 without any changes
156 - if bcrypt hash check is not working try with sha256. If hash compare
156 - if bcrypt hash check is not working try with sha256. If hash compare
157 is ok, it means we using correct but old hashed password. indicate
157 is ok, it means we using correct but old hashed password. indicate
158 hash change and proceed
158 hash change and proceed
159 """
159 """
160
160
161 new_hash = None
161 new_hash = None
162
162
163 # regular pw check
163 # regular pw check
164 password_match_bcrypt = self.hash_check(password, hashed)
164 password_match_bcrypt = self.hash_check(password, hashed)
165
165
166 # now we want to know if the password was maybe from sha256
166 # now we want to know if the password was maybe from sha256
167 # basically calling _RhodeCodeCryptoSha256().hash_check()
167 # basically calling _RhodeCodeCryptoSha256().hash_check()
168 if not password_match_bcrypt:
168 if not password_match_bcrypt:
169 if _RhodeCodeCryptoSha256().hash_check(password, hashed):
169 if _RhodeCodeCryptoSha256().hash_check(password, hashed):
170 new_hash = self.hash_create(password) # make new bcrypt hash
170 new_hash = self.hash_create(password) # make new bcrypt hash
171 password_match_bcrypt = True
171 password_match_bcrypt = True
172
172
173 return password_match_bcrypt, new_hash
173 return password_match_bcrypt, new_hash
174
174
175 def hash_check(self, password, hashed):
175 def hash_check(self, password, hashed):
176 """
176 """
177 Checks matching password with it's hashed value.
177 Checks matching password with it's hashed value.
178
178
179 :param password: password
179 :param password: password
180 :param hashed: password in hashed form
180 :param hashed: password in hashed form
181 """
181 """
182 self._assert_bytes(password)
182 self._assert_bytes(password)
183 try:
183 try:
184 return bcrypt.hashpw(password, hashed) == hashed
184 return bcrypt.hashpw(password, hashed) == hashed
185 except ValueError as e:
185 except ValueError as e:
186 # we're having a invalid salt here probably, we should not crash
186 # we're having a invalid salt here probably, we should not crash
187 # just return with False as it would be a wrong password.
187 # just return with False as it would be a wrong password.
188 log.debug('Failed to check password hash using bcrypt %s',
188 log.debug('Failed to check password hash using bcrypt %s',
189 safe_str(e))
189 safe_str(e))
190
190
191 return False
191 return False
192
192
193
193
194 class _RhodeCodeCryptoSha256(_RhodeCodeCryptoBase):
194 class _RhodeCodeCryptoSha256(_RhodeCodeCryptoBase):
195 ENC_PREF = '_'
195 ENC_PREF = '_'
196
196
197 def hash_create(self, str_):
197 def hash_create(self, str_):
198 self._assert_bytes(str_)
198 self._assert_bytes(str_)
199 return hashlib.sha256(str_).hexdigest()
199 return hashlib.sha256(str_).hexdigest()
200
200
201 def hash_check(self, password, hashed):
201 def hash_check(self, password, hashed):
202 """
202 """
203 Checks matching password with it's hashed value.
203 Checks matching password with it's hashed value.
204
204
205 :param password: password
205 :param password: password
206 :param hashed: password in hashed form
206 :param hashed: password in hashed form
207 """
207 """
208 self._assert_bytes(password)
208 self._assert_bytes(password)
209 return hashlib.sha256(password).hexdigest() == hashed
209 return hashlib.sha256(password).hexdigest() == hashed
210
210
211
211
212 class _RhodeCodeCryptoTest(_RhodeCodeCryptoBase):
212 class _RhodeCodeCryptoTest(_RhodeCodeCryptoBase):
213 ENC_PREF = '_'
213 ENC_PREF = '_'
214
214
215 def hash_create(self, str_):
215 def hash_create(self, str_):
216 self._assert_bytes(str_)
216 self._assert_bytes(str_)
217 return sha1(str_)
217 return sha1(str_)
218
218
219 def hash_check(self, password, hashed):
219 def hash_check(self, password, hashed):
220 """
220 """
221 Checks matching password with it's hashed value.
221 Checks matching password with it's hashed value.
222
222
223 :param password: password
223 :param password: password
224 :param hashed: password in hashed form
224 :param hashed: password in hashed form
225 """
225 """
226 self._assert_bytes(password)
226 self._assert_bytes(password)
227 return sha1(password) == hashed
227 return sha1(password) == hashed
228
228
229
229
230 def crypto_backend():
230 def crypto_backend():
231 """
231 """
232 Return the matching crypto backend.
232 Return the matching crypto backend.
233
233
234 Selection is based on if we run tests or not, we pick sha1-test backend to run
234 Selection is based on if we run tests or not, we pick sha1-test backend to run
235 tests faster since BCRYPT is expensive to calculate
235 tests faster since BCRYPT is expensive to calculate
236 """
236 """
237 if rhodecode.is_test:
237 if rhodecode.is_test:
238 RhodeCodeCrypto = _RhodeCodeCryptoTest()
238 RhodeCodeCrypto = _RhodeCodeCryptoTest()
239 else:
239 else:
240 RhodeCodeCrypto = _RhodeCodeCryptoBCrypt()
240 RhodeCodeCrypto = _RhodeCodeCryptoBCrypt()
241
241
242 return RhodeCodeCrypto
242 return RhodeCodeCrypto
243
243
244
244
245 def get_crypt_password(password):
245 def get_crypt_password(password):
246 """
246 """
247 Create the hash of `password` with the active crypto backend.
247 Create the hash of `password` with the active crypto backend.
248
248
249 :param password: The cleartext password.
249 :param password: The cleartext password.
250 :type password: unicode
250 :type password: unicode
251 """
251 """
252 password = safe_str(password)
252 password = safe_str(password)
253 return crypto_backend().hash_create(password)
253 return crypto_backend().hash_create(password)
254
254
255
255
256 def check_password(password, hashed):
256 def check_password(password, hashed):
257 """
257 """
258 Check if the value in `password` matches the hash in `hashed`.
258 Check if the value in `password` matches the hash in `hashed`.
259
259
260 :param password: The cleartext password.
260 :param password: The cleartext password.
261 :type password: unicode
261 :type password: unicode
262
262
263 :param hashed: The expected hashed version of the password.
263 :param hashed: The expected hashed version of the password.
264 :type hashed: The hash has to be passed in in text representation.
264 :type hashed: The hash has to be passed in in text representation.
265 """
265 """
266 password = safe_str(password)
266 password = safe_str(password)
267 return crypto_backend().hash_check(password, hashed)
267 return crypto_backend().hash_check(password, hashed)
268
268
269
269
270 def generate_auth_token(data, salt=None):
270 def generate_auth_token(data, salt=None):
271 """
271 """
272 Generates API KEY from given string
272 Generates API KEY from given string
273 """
273 """
274
274
275 if salt is None:
275 if salt is None:
276 salt = os.urandom(16)
276 salt = os.urandom(16)
277 return hashlib.sha1(safe_str(data) + salt).hexdigest()
277 return hashlib.sha1(safe_str(data) + salt).hexdigest()
278
278
279
279
280 def get_came_from(request):
280 def get_came_from(request):
281 """
281 """
282 get query_string+path from request sanitized after removing auth_token
282 get query_string+path from request sanitized after removing auth_token
283 """
283 """
284 _req = request
284 _req = request
285
285
286 path = _req.path
286 path = _req.path
287 if 'auth_token' in _req.GET:
287 if 'auth_token' in _req.GET:
288 # sanitize the request and remove auth_token for redirection
288 # sanitize the request and remove auth_token for redirection
289 _req.GET.pop('auth_token')
289 _req.GET.pop('auth_token')
290 qs = _req.query_string
290 qs = _req.query_string
291 if qs:
291 if qs:
292 path += '?' + qs
292 path += '?' + qs
293
293
294 return path
294 return path
295
295
296
296
297 class CookieStoreWrapper(object):
297 class CookieStoreWrapper(object):
298
298
299 def __init__(self, cookie_store):
299 def __init__(self, cookie_store):
300 self.cookie_store = cookie_store
300 self.cookie_store = cookie_store
301
301
302 def __repr__(self):
302 def __repr__(self):
303 return 'CookieStore<%s>' % (self.cookie_store)
303 return 'CookieStore<%s>' % (self.cookie_store)
304
304
305 def get(self, key, other=None):
305 def get(self, key, other=None):
306 if isinstance(self.cookie_store, dict):
306 if isinstance(self.cookie_store, dict):
307 return self.cookie_store.get(key, other)
307 return self.cookie_store.get(key, other)
308 elif isinstance(self.cookie_store, AuthUser):
308 elif isinstance(self.cookie_store, AuthUser):
309 return self.cookie_store.__dict__.get(key, other)
309 return self.cookie_store.__dict__.get(key, other)
310
310
311
311
312 def _cached_perms_data(user_id, scope, user_is_admin,
312 def _cached_perms_data(user_id, scope, user_is_admin,
313 user_inherit_default_permissions, explicit, algo,
313 user_inherit_default_permissions, explicit, algo,
314 calculate_super_admin):
314 calculate_super_admin):
315
315
316 permissions = PermissionCalculator(
316 permissions = PermissionCalculator(
317 user_id, scope, user_is_admin, user_inherit_default_permissions,
317 user_id, scope, user_is_admin, user_inherit_default_permissions,
318 explicit, algo, calculate_super_admin)
318 explicit, algo, calculate_super_admin)
319 return permissions.calculate()
319 return permissions.calculate()
320
320
321
321
322 class PermOrigin(object):
322 class PermOrigin(object):
323 SUPER_ADMIN = 'superadmin'
323 SUPER_ADMIN = 'superadmin'
324 ARCHIVED = 'archived'
324 ARCHIVED = 'archived'
325
325
326 REPO_USER = 'user:%s'
326 REPO_USER = 'user:%s'
327 REPO_USERGROUP = 'usergroup:%s'
327 REPO_USERGROUP = 'usergroup:%s'
328 REPO_OWNER = 'repo.owner'
328 REPO_OWNER = 'repo.owner'
329 REPO_DEFAULT = 'repo.default'
329 REPO_DEFAULT = 'repo.default'
330 REPO_DEFAULT_NO_INHERIT = 'repo.default.no.inherit'
330 REPO_DEFAULT_NO_INHERIT = 'repo.default.no.inherit'
331 REPO_PRIVATE = 'repo.private'
331 REPO_PRIVATE = 'repo.private'
332
332
333 REPOGROUP_USER = 'user:%s'
333 REPOGROUP_USER = 'user:%s'
334 REPOGROUP_USERGROUP = 'usergroup:%s'
334 REPOGROUP_USERGROUP = 'usergroup:%s'
335 REPOGROUP_OWNER = 'group.owner'
335 REPOGROUP_OWNER = 'group.owner'
336 REPOGROUP_DEFAULT = 'group.default'
336 REPOGROUP_DEFAULT = 'group.default'
337 REPOGROUP_DEFAULT_NO_INHERIT = 'group.default.no.inherit'
337 REPOGROUP_DEFAULT_NO_INHERIT = 'group.default.no.inherit'
338
338
339 USERGROUP_USER = 'user:%s'
339 USERGROUP_USER = 'user:%s'
340 USERGROUP_USERGROUP = 'usergroup:%s'
340 USERGROUP_USERGROUP = 'usergroup:%s'
341 USERGROUP_OWNER = 'usergroup.owner'
341 USERGROUP_OWNER = 'usergroup.owner'
342 USERGROUP_DEFAULT = 'usergroup.default'
342 USERGROUP_DEFAULT = 'usergroup.default'
343 USERGROUP_DEFAULT_NO_INHERIT = 'usergroup.default.no.inherit'
343 USERGROUP_DEFAULT_NO_INHERIT = 'usergroup.default.no.inherit'
344
344
345
345
346 class PermOriginDict(dict):
346 class PermOriginDict(dict):
347 """
347 """
348 A special dict used for tracking permissions along with their origins.
348 A special dict used for tracking permissions along with their origins.
349
349
350 `__setitem__` has been overridden to expect a tuple(perm, origin)
350 `__setitem__` has been overridden to expect a tuple(perm, origin)
351 `__getitem__` will return only the perm
351 `__getitem__` will return only the perm
352 `.perm_origin_stack` will return the stack of (perm, origin) set per key
352 `.perm_origin_stack` will return the stack of (perm, origin) set per key
353
353
354 >>> perms = PermOriginDict()
354 >>> perms = PermOriginDict()
355 >>> perms['resource'] = 'read', 'default'
355 >>> perms['resource'] = 'read', 'default'
356 >>> perms['resource']
356 >>> perms['resource']
357 'read'
357 'read'
358 >>> perms['resource'] = 'write', 'admin'
358 >>> perms['resource'] = 'write', 'admin'
359 >>> perms['resource']
359 >>> perms['resource']
360 'write'
360 'write'
361 >>> perms.perm_origin_stack
361 >>> perms.perm_origin_stack
362 {'resource': [('read', 'default'), ('write', 'admin')]}
362 {'resource': [('read', 'default'), ('write', 'admin')]}
363 """
363 """
364
364
365 def __init__(self, *args, **kw):
365 def __init__(self, *args, **kw):
366 dict.__init__(self, *args, **kw)
366 dict.__init__(self, *args, **kw)
367 self.perm_origin_stack = collections.OrderedDict()
367 self.perm_origin_stack = collections.OrderedDict()
368
368
369 def __setitem__(self, key, (perm, origin)):
369 def __setitem__(self, key, (perm, origin)):
370 self.perm_origin_stack.setdefault(key, []).append(
370 self.perm_origin_stack.setdefault(key, []).append(
371 (perm, origin))
371 (perm, origin))
372 dict.__setitem__(self, key, perm)
372 dict.__setitem__(self, key, perm)
373
373
374
374
375 class BranchPermOriginDict(PermOriginDict):
375 class BranchPermOriginDict(PermOriginDict):
376 """
376 """
377 Dedicated branch permissions dict, with tracking of patterns and origins.
377 Dedicated branch permissions dict, with tracking of patterns and origins.
378
378
379 >>> perms = BranchPermOriginDict()
379 >>> perms = BranchPermOriginDict()
380 >>> perms['resource'] = '*pattern', 'read', 'default'
380 >>> perms['resource'] = '*pattern', 'read', 'default'
381 >>> perms['resource']
381 >>> perms['resource']
382 {'*pattern': 'read'}
382 {'*pattern': 'read'}
383 >>> perms['resource'] = '*pattern', 'write', 'admin'
383 >>> perms['resource'] = '*pattern', 'write', 'admin'
384 >>> perms['resource']
384 >>> perms['resource']
385 {'*pattern': 'write'}
385 {'*pattern': 'write'}
386 >>> perms.perm_origin_stack
386 >>> perms.perm_origin_stack
387 {'resource': {'*pattern': [('read', 'default'), ('write', 'admin')]}}
387 {'resource': {'*pattern': [('read', 'default'), ('write', 'admin')]}}
388 """
388 """
389 def __setitem__(self, key, (pattern, perm, origin)):
389 def __setitem__(self, key, (pattern, perm, origin)):
390
390
391 self.perm_origin_stack.setdefault(key, {}) \
391 self.perm_origin_stack.setdefault(key, {}) \
392 .setdefault(pattern, []).append((perm, origin))
392 .setdefault(pattern, []).append((perm, origin))
393
393
394 if key in self:
394 if key in self:
395 self[key].__setitem__(pattern, perm)
395 self[key].__setitem__(pattern, perm)
396 else:
396 else:
397 patterns = collections.OrderedDict()
397 patterns = collections.OrderedDict()
398 patterns[pattern] = perm
398 patterns[pattern] = perm
399 dict.__setitem__(self, key, patterns)
399 dict.__setitem__(self, key, patterns)
400
400
401
401
402 class PermissionCalculator(object):
402 class PermissionCalculator(object):
403
403
404 def __init__(
404 def __init__(
405 self, user_id, scope, user_is_admin,
405 self, user_id, scope, user_is_admin,
406 user_inherit_default_permissions, explicit, algo,
406 user_inherit_default_permissions, explicit, algo,
407 calculate_super_admin_as_user=False):
407 calculate_super_admin_as_user=False):
408
408
409 self.user_id = user_id
409 self.user_id = user_id
410 self.user_is_admin = user_is_admin
410 self.user_is_admin = user_is_admin
411 self.inherit_default_permissions = user_inherit_default_permissions
411 self.inherit_default_permissions = user_inherit_default_permissions
412 self.explicit = explicit
412 self.explicit = explicit
413 self.algo = algo
413 self.algo = algo
414 self.calculate_super_admin_as_user = calculate_super_admin_as_user
414 self.calculate_super_admin_as_user = calculate_super_admin_as_user
415
415
416 scope = scope or {}
416 scope = scope or {}
417 self.scope_repo_id = scope.get('repo_id')
417 self.scope_repo_id = scope.get('repo_id')
418 self.scope_repo_group_id = scope.get('repo_group_id')
418 self.scope_repo_group_id = scope.get('repo_group_id')
419 self.scope_user_group_id = scope.get('user_group_id')
419 self.scope_user_group_id = scope.get('user_group_id')
420
420
421 self.default_user_id = User.get_default_user(cache=True).user_id
421 self.default_user_id = User.get_default_user(cache=True).user_id
422
422
423 self.permissions_repositories = PermOriginDict()
423 self.permissions_repositories = PermOriginDict()
424 self.permissions_repository_groups = PermOriginDict()
424 self.permissions_repository_groups = PermOriginDict()
425 self.permissions_user_groups = PermOriginDict()
425 self.permissions_user_groups = PermOriginDict()
426 self.permissions_repository_branches = BranchPermOriginDict()
426 self.permissions_repository_branches = BranchPermOriginDict()
427 self.permissions_global = set()
427 self.permissions_global = set()
428
428
429 self.default_repo_perms = Permission.get_default_repo_perms(
429 self.default_repo_perms = Permission.get_default_repo_perms(
430 self.default_user_id, self.scope_repo_id)
430 self.default_user_id, self.scope_repo_id)
431 self.default_repo_groups_perms = Permission.get_default_group_perms(
431 self.default_repo_groups_perms = Permission.get_default_group_perms(
432 self.default_user_id, self.scope_repo_group_id)
432 self.default_user_id, self.scope_repo_group_id)
433 self.default_user_group_perms = \
433 self.default_user_group_perms = \
434 Permission.get_default_user_group_perms(
434 Permission.get_default_user_group_perms(
435 self.default_user_id, self.scope_user_group_id)
435 self.default_user_id, self.scope_user_group_id)
436
436
437 # default branch perms
437 # default branch perms
438 self.default_branch_repo_perms = \
438 self.default_branch_repo_perms = \
439 Permission.get_default_repo_branch_perms(
439 Permission.get_default_repo_branch_perms(
440 self.default_user_id, self.scope_repo_id)
440 self.default_user_id, self.scope_repo_id)
441
441
442 def calculate(self):
442 def calculate(self):
443 if self.user_is_admin and not self.calculate_super_admin_as_user:
443 if self.user_is_admin and not self.calculate_super_admin_as_user:
444 return self._calculate_admin_permissions()
444 return self._calculate_admin_permissions()
445
445
446 self._calculate_global_default_permissions()
446 self._calculate_global_default_permissions()
447 self._calculate_global_permissions()
447 self._calculate_global_permissions()
448 self._calculate_default_permissions()
448 self._calculate_default_permissions()
449 self._calculate_repository_permissions()
449 self._calculate_repository_permissions()
450 self._calculate_repository_branch_permissions()
450 self._calculate_repository_branch_permissions()
451 self._calculate_repository_group_permissions()
451 self._calculate_repository_group_permissions()
452 self._calculate_user_group_permissions()
452 self._calculate_user_group_permissions()
453 return self._permission_structure()
453 return self._permission_structure()
454
454
455 def _calculate_admin_permissions(self):
455 def _calculate_admin_permissions(self):
456 """
456 """
457 admin user have all default rights for repositories
457 admin user have all default rights for repositories
458 and groups set to admin
458 and groups set to admin
459 """
459 """
460 self.permissions_global.add('hg.admin')
460 self.permissions_global.add('hg.admin')
461 self.permissions_global.add('hg.create.write_on_repogroup.true')
461 self.permissions_global.add('hg.create.write_on_repogroup.true')
462
462
463 # repositories
463 # repositories
464 for perm in self.default_repo_perms:
464 for perm in self.default_repo_perms:
465 r_k = perm.UserRepoToPerm.repository.repo_name
465 r_k = perm.UserRepoToPerm.repository.repo_name
466 archived = perm.UserRepoToPerm.repository.archived
466 archived = perm.UserRepoToPerm.repository.archived
467 p = 'repository.admin'
467 p = 'repository.admin'
468 self.permissions_repositories[r_k] = p, PermOrigin.SUPER_ADMIN
468 self.permissions_repositories[r_k] = p, PermOrigin.SUPER_ADMIN
469 # special case for archived repositories, which we block still even for
469 # special case for archived repositories, which we block still even for
470 # super admins
470 # super admins
471 if archived:
471 if archived:
472 p = 'repository.read'
472 p = 'repository.read'
473 self.permissions_repositories[r_k] = p, PermOrigin.ARCHIVED
473 self.permissions_repositories[r_k] = p, PermOrigin.ARCHIVED
474
474
475 # repository groups
475 # repository groups
476 for perm in self.default_repo_groups_perms:
476 for perm in self.default_repo_groups_perms:
477 rg_k = perm.UserRepoGroupToPerm.group.group_name
477 rg_k = perm.UserRepoGroupToPerm.group.group_name
478 p = 'group.admin'
478 p = 'group.admin'
479 self.permissions_repository_groups[rg_k] = p, PermOrigin.SUPER_ADMIN
479 self.permissions_repository_groups[rg_k] = p, PermOrigin.SUPER_ADMIN
480
480
481 # user groups
481 # user groups
482 for perm in self.default_user_group_perms:
482 for perm in self.default_user_group_perms:
483 u_k = perm.UserUserGroupToPerm.user_group.users_group_name
483 u_k = perm.UserUserGroupToPerm.user_group.users_group_name
484 p = 'usergroup.admin'
484 p = 'usergroup.admin'
485 self.permissions_user_groups[u_k] = p, PermOrigin.SUPER_ADMIN
485 self.permissions_user_groups[u_k] = p, PermOrigin.SUPER_ADMIN
486
486
487 # branch permissions
487 # branch permissions
488 # since super-admin also can have custom rule permissions
488 # since super-admin also can have custom rule permissions
489 # we *always* need to calculate those inherited from default, and also explicit
489 # we *always* need to calculate those inherited from default, and also explicit
490 self._calculate_default_permissions_repository_branches(
490 self._calculate_default_permissions_repository_branches(
491 user_inherit_object_permissions=False)
491 user_inherit_object_permissions=False)
492 self._calculate_repository_branch_permissions()
492 self._calculate_repository_branch_permissions()
493
493
494 return self._permission_structure()
494 return self._permission_structure()
495
495
496 def _calculate_global_default_permissions(self):
496 def _calculate_global_default_permissions(self):
497 """
497 """
498 global permissions taken from the default user
498 global permissions taken from the default user
499 """
499 """
500 default_global_perms = UserToPerm.query()\
500 default_global_perms = UserToPerm.query()\
501 .filter(UserToPerm.user_id == self.default_user_id)\
501 .filter(UserToPerm.user_id == self.default_user_id)\
502 .options(joinedload(UserToPerm.permission))
502 .options(joinedload(UserToPerm.permission))
503
503
504 for perm in default_global_perms:
504 for perm in default_global_perms:
505 self.permissions_global.add(perm.permission.permission_name)
505 self.permissions_global.add(perm.permission.permission_name)
506
506
507 if self.user_is_admin:
507 if self.user_is_admin:
508 self.permissions_global.add('hg.admin')
508 self.permissions_global.add('hg.admin')
509 self.permissions_global.add('hg.create.write_on_repogroup.true')
509 self.permissions_global.add('hg.create.write_on_repogroup.true')
510
510
511 def _calculate_global_permissions(self):
511 def _calculate_global_permissions(self):
512 """
512 """
513 Set global system permissions with user permissions or permissions
513 Set global system permissions with user permissions or permissions
514 taken from the user groups of the current user.
514 taken from the user groups of the current user.
515
515
516 The permissions include repo creating, repo group creating, forking
516 The permissions include repo creating, repo group creating, forking
517 etc.
517 etc.
518 """
518 """
519
519
520 # now we read the defined permissions and overwrite what we have set
520 # now we read the defined permissions and overwrite what we have set
521 # before those can be configured from groups or users explicitly.
521 # before those can be configured from groups or users explicitly.
522
522
523 # In case we want to extend this list we should make sure
523 # In case we want to extend this list we should make sure
524 # this is in sync with User.DEFAULT_USER_PERMISSIONS definitions
524 # this is in sync with User.DEFAULT_USER_PERMISSIONS definitions
525 _configurable = frozenset([
525 _configurable = frozenset([
526 'hg.fork.none', 'hg.fork.repository',
526 'hg.fork.none', 'hg.fork.repository',
527 'hg.create.none', 'hg.create.repository',
527 'hg.create.none', 'hg.create.repository',
528 'hg.usergroup.create.false', 'hg.usergroup.create.true',
528 'hg.usergroup.create.false', 'hg.usergroup.create.true',
529 'hg.repogroup.create.false', 'hg.repogroup.create.true',
529 'hg.repogroup.create.false', 'hg.repogroup.create.true',
530 'hg.create.write_on_repogroup.false', 'hg.create.write_on_repogroup.true',
530 'hg.create.write_on_repogroup.false', 'hg.create.write_on_repogroup.true',
531 'hg.inherit_default_perms.false', 'hg.inherit_default_perms.true'
531 'hg.inherit_default_perms.false', 'hg.inherit_default_perms.true'
532 ])
532 ])
533
533
534 # USER GROUPS comes first user group global permissions
534 # USER GROUPS comes first user group global permissions
535 user_perms_from_users_groups = Session().query(UserGroupToPerm)\
535 user_perms_from_users_groups = Session().query(UserGroupToPerm)\
536 .options(joinedload(UserGroupToPerm.permission))\
536 .options(joinedload(UserGroupToPerm.permission))\
537 .join((UserGroupMember, UserGroupToPerm.users_group_id ==
537 .join((UserGroupMember, UserGroupToPerm.users_group_id ==
538 UserGroupMember.users_group_id))\
538 UserGroupMember.users_group_id))\
539 .filter(UserGroupMember.user_id == self.user_id)\
539 .filter(UserGroupMember.user_id == self.user_id)\
540 .order_by(UserGroupToPerm.users_group_id)\
540 .order_by(UserGroupToPerm.users_group_id)\
541 .all()
541 .all()
542
542
543 # need to group here by groups since user can be in more than
543 # need to group here by groups since user can be in more than
544 # one group, so we get all groups
544 # one group, so we get all groups
545 _explicit_grouped_perms = [
545 _explicit_grouped_perms = [
546 [x, list(y)] for x, y in
546 [x, list(y)] for x, y in
547 itertools.groupby(user_perms_from_users_groups,
547 itertools.groupby(user_perms_from_users_groups,
548 lambda _x: _x.users_group)]
548 lambda _x: _x.users_group)]
549
549
550 for gr, perms in _explicit_grouped_perms:
550 for gr, perms in _explicit_grouped_perms:
551 # since user can be in multiple groups iterate over them and
551 # since user can be in multiple groups iterate over them and
552 # select the lowest permissions first (more explicit)
552 # select the lowest permissions first (more explicit)
553 # TODO(marcink): do this^^
553 # TODO(marcink): do this^^
554
554
555 # group doesn't inherit default permissions so we actually set them
555 # group doesn't inherit default permissions so we actually set them
556 if not gr.inherit_default_permissions:
556 if not gr.inherit_default_permissions:
557 # NEED TO IGNORE all previously set configurable permissions
557 # NEED TO IGNORE all previously set configurable permissions
558 # and replace them with explicitly set from this user
558 # and replace them with explicitly set from this user
559 # group permissions
559 # group permissions
560 self.permissions_global = self.permissions_global.difference(
560 self.permissions_global = self.permissions_global.difference(
561 _configurable)
561 _configurable)
562 for perm in perms:
562 for perm in perms:
563 self.permissions_global.add(perm.permission.permission_name)
563 self.permissions_global.add(perm.permission.permission_name)
564
564
565 # user explicit global permissions
565 # user explicit global permissions
566 user_perms = Session().query(UserToPerm)\
566 user_perms = Session().query(UserToPerm)\
567 .options(joinedload(UserToPerm.permission))\
567 .options(joinedload(UserToPerm.permission))\
568 .filter(UserToPerm.user_id == self.user_id).all()
568 .filter(UserToPerm.user_id == self.user_id).all()
569
569
570 if not self.inherit_default_permissions:
570 if not self.inherit_default_permissions:
571 # NEED TO IGNORE all configurable permissions and
571 # NEED TO IGNORE all configurable permissions and
572 # replace them with explicitly set from this user permissions
572 # replace them with explicitly set from this user permissions
573 self.permissions_global = self.permissions_global.difference(
573 self.permissions_global = self.permissions_global.difference(
574 _configurable)
574 _configurable)
575 for perm in user_perms:
575 for perm in user_perms:
576 self.permissions_global.add(perm.permission.permission_name)
576 self.permissions_global.add(perm.permission.permission_name)
577
577
578 def _calculate_default_permissions_repositories(self, user_inherit_object_permissions):
578 def _calculate_default_permissions_repositories(self, user_inherit_object_permissions):
579 for perm in self.default_repo_perms:
579 for perm in self.default_repo_perms:
580 r_k = perm.UserRepoToPerm.repository.repo_name
580 r_k = perm.UserRepoToPerm.repository.repo_name
581 archived = perm.UserRepoToPerm.repository.archived
581 archived = perm.UserRepoToPerm.repository.archived
582 p = perm.Permission.permission_name
582 p = perm.Permission.permission_name
583 o = PermOrigin.REPO_DEFAULT
583 o = PermOrigin.REPO_DEFAULT
584 self.permissions_repositories[r_k] = p, o
584 self.permissions_repositories[r_k] = p, o
585
585
586 # if we decide this user isn't inheriting permissions from
586 # if we decide this user isn't inheriting permissions from
587 # default user we set him to .none so only explicit
587 # default user we set him to .none so only explicit
588 # permissions work
588 # permissions work
589 if not user_inherit_object_permissions:
589 if not user_inherit_object_permissions:
590 p = 'repository.none'
590 p = 'repository.none'
591 o = PermOrigin.REPO_DEFAULT_NO_INHERIT
591 o = PermOrigin.REPO_DEFAULT_NO_INHERIT
592 self.permissions_repositories[r_k] = p, o
592 self.permissions_repositories[r_k] = p, o
593
593
594 if perm.Repository.private and not (
594 if perm.Repository.private and not (
595 perm.Repository.user_id == self.user_id):
595 perm.Repository.user_id == self.user_id):
596 # disable defaults for private repos,
596 # disable defaults for private repos,
597 p = 'repository.none'
597 p = 'repository.none'
598 o = PermOrigin.REPO_PRIVATE
598 o = PermOrigin.REPO_PRIVATE
599 self.permissions_repositories[r_k] = p, o
599 self.permissions_repositories[r_k] = p, o
600
600
601 elif perm.Repository.user_id == self.user_id:
601 elif perm.Repository.user_id == self.user_id:
602 # set admin if owner
602 # set admin if owner
603 p = 'repository.admin'
603 p = 'repository.admin'
604 o = PermOrigin.REPO_OWNER
604 o = PermOrigin.REPO_OWNER
605 self.permissions_repositories[r_k] = p, o
605 self.permissions_repositories[r_k] = p, o
606
606
607 if self.user_is_admin:
607 if self.user_is_admin:
608 p = 'repository.admin'
608 p = 'repository.admin'
609 o = PermOrigin.SUPER_ADMIN
609 o = PermOrigin.SUPER_ADMIN
610 self.permissions_repositories[r_k] = p, o
610 self.permissions_repositories[r_k] = p, o
611
611
612 # finally in case of archived repositories, we downgrade higher
612 # finally in case of archived repositories, we downgrade higher
613 # permissions to read
613 # permissions to read
614 if archived:
614 if archived:
615 current_perm = self.permissions_repositories[r_k]
615 current_perm = self.permissions_repositories[r_k]
616 if current_perm in ['repository.write', 'repository.admin']:
616 if current_perm in ['repository.write', 'repository.admin']:
617 p = 'repository.read'
617 p = 'repository.read'
618 o = PermOrigin.ARCHIVED
618 o = PermOrigin.ARCHIVED
619 self.permissions_repositories[r_k] = p, o
619 self.permissions_repositories[r_k] = p, o
620
620
621 def _calculate_default_permissions_repository_branches(self, user_inherit_object_permissions):
621 def _calculate_default_permissions_repository_branches(self, user_inherit_object_permissions):
622 for perm in self.default_branch_repo_perms:
622 for perm in self.default_branch_repo_perms:
623
623
624 r_k = perm.UserRepoToPerm.repository.repo_name
624 r_k = perm.UserRepoToPerm.repository.repo_name
625 p = perm.Permission.permission_name
625 p = perm.Permission.permission_name
626 pattern = perm.UserToRepoBranchPermission.branch_pattern
626 pattern = perm.UserToRepoBranchPermission.branch_pattern
627 o = PermOrigin.REPO_USER % perm.UserRepoToPerm.user.username
627 o = PermOrigin.REPO_USER % perm.UserRepoToPerm.user.username
628
628
629 if not self.explicit:
629 if not self.explicit:
630 cur_perm = self.permissions_repository_branches.get(r_k)
630 cur_perm = self.permissions_repository_branches.get(r_k)
631 if cur_perm:
631 if cur_perm:
632 cur_perm = cur_perm[pattern]
632 cur_perm = cur_perm[pattern]
633 cur_perm = cur_perm or 'branch.none'
633 cur_perm = cur_perm or 'branch.none'
634
634
635 p = self._choose_permission(p, cur_perm)
635 p = self._choose_permission(p, cur_perm)
636
636
637 # NOTE(marcink): register all pattern/perm instances in this
637 # NOTE(marcink): register all pattern/perm instances in this
638 # special dict that aggregates entries
638 # special dict that aggregates entries
639 self.permissions_repository_branches[r_k] = pattern, p, o
639 self.permissions_repository_branches[r_k] = pattern, p, o
640
640
641 def _calculate_default_permissions_repository_groups(self, user_inherit_object_permissions):
641 def _calculate_default_permissions_repository_groups(self, user_inherit_object_permissions):
642 for perm in self.default_repo_groups_perms:
642 for perm in self.default_repo_groups_perms:
643 rg_k = perm.UserRepoGroupToPerm.group.group_name
643 rg_k = perm.UserRepoGroupToPerm.group.group_name
644 p = perm.Permission.permission_name
644 p = perm.Permission.permission_name
645 o = PermOrigin.REPOGROUP_DEFAULT
645 o = PermOrigin.REPOGROUP_DEFAULT
646 self.permissions_repository_groups[rg_k] = p, o
646 self.permissions_repository_groups[rg_k] = p, o
647
647
648 # if we decide this user isn't inheriting permissions from default
648 # if we decide this user isn't inheriting permissions from default
649 # user we set him to .none so only explicit permissions work
649 # user we set him to .none so only explicit permissions work
650 if not user_inherit_object_permissions:
650 if not user_inherit_object_permissions:
651 p = 'group.none'
651 p = 'group.none'
652 o = PermOrigin.REPOGROUP_DEFAULT_NO_INHERIT
652 o = PermOrigin.REPOGROUP_DEFAULT_NO_INHERIT
653 self.permissions_repository_groups[rg_k] = p, o
653 self.permissions_repository_groups[rg_k] = p, o
654
654
655 if perm.RepoGroup.user_id == self.user_id:
655 if perm.RepoGroup.user_id == self.user_id:
656 # set admin if owner
656 # set admin if owner
657 p = 'group.admin'
657 p = 'group.admin'
658 o = PermOrigin.REPOGROUP_OWNER
658 o = PermOrigin.REPOGROUP_OWNER
659 self.permissions_repository_groups[rg_k] = p, o
659 self.permissions_repository_groups[rg_k] = p, o
660
660
661 if self.user_is_admin:
661 if self.user_is_admin:
662 p = 'group.admin'
662 p = 'group.admin'
663 o = PermOrigin.SUPER_ADMIN
663 o = PermOrigin.SUPER_ADMIN
664 self.permissions_repository_groups[rg_k] = p, o
664 self.permissions_repository_groups[rg_k] = p, o
665
665
666 def _calculate_default_permissions_user_groups(self, user_inherit_object_permissions):
666 def _calculate_default_permissions_user_groups(self, user_inherit_object_permissions):
667 for perm in self.default_user_group_perms:
667 for perm in self.default_user_group_perms:
668 u_k = perm.UserUserGroupToPerm.user_group.users_group_name
668 u_k = perm.UserUserGroupToPerm.user_group.users_group_name
669 p = perm.Permission.permission_name
669 p = perm.Permission.permission_name
670 o = PermOrigin.USERGROUP_DEFAULT
670 o = PermOrigin.USERGROUP_DEFAULT
671 self.permissions_user_groups[u_k] = p, o
671 self.permissions_user_groups[u_k] = p, o
672
672
673 # if we decide this user isn't inheriting permissions from default
673 # if we decide this user isn't inheriting permissions from default
674 # user we set him to .none so only explicit permissions work
674 # user we set him to .none so only explicit permissions work
675 if not user_inherit_object_permissions:
675 if not user_inherit_object_permissions:
676 p = 'usergroup.none'
676 p = 'usergroup.none'
677 o = PermOrigin.USERGROUP_DEFAULT_NO_INHERIT
677 o = PermOrigin.USERGROUP_DEFAULT_NO_INHERIT
678 self.permissions_user_groups[u_k] = p, o
678 self.permissions_user_groups[u_k] = p, o
679
679
680 if perm.UserGroup.user_id == self.user_id:
680 if perm.UserGroup.user_id == self.user_id:
681 # set admin if owner
681 # set admin if owner
682 p = 'usergroup.admin'
682 p = 'usergroup.admin'
683 o = PermOrigin.USERGROUP_OWNER
683 o = PermOrigin.USERGROUP_OWNER
684 self.permissions_user_groups[u_k] = p, o
684 self.permissions_user_groups[u_k] = p, o
685
685
686 if self.user_is_admin:
686 if self.user_is_admin:
687 p = 'usergroup.admin'
687 p = 'usergroup.admin'
688 o = PermOrigin.SUPER_ADMIN
688 o = PermOrigin.SUPER_ADMIN
689 self.permissions_user_groups[u_k] = p, o
689 self.permissions_user_groups[u_k] = p, o
690
690
691 def _calculate_default_permissions(self):
691 def _calculate_default_permissions(self):
692 """
692 """
693 Set default user permissions for repositories, repository branches,
693 Set default user permissions for repositories, repository branches,
694 repository groups, user groups taken from the default user.
694 repository groups, user groups taken from the default user.
695
695
696 Calculate inheritance of object permissions based on what we have now
696 Calculate inheritance of object permissions based on what we have now
697 in GLOBAL permissions. We check if .false is in GLOBAL since this is
697 in GLOBAL permissions. We check if .false is in GLOBAL since this is
698 explicitly set. Inherit is the opposite of .false being there.
698 explicitly set. Inherit is the opposite of .false being there.
699
699
700 .. note::
700 .. note::
701
701
702 the syntax is little bit odd but what we need to check here is
702 the syntax is little bit odd but what we need to check here is
703 the opposite of .false permission being in the list so even for
703 the opposite of .false permission being in the list so even for
704 inconsistent state when both .true/.false is there
704 inconsistent state when both .true/.false is there
705 .false is more important
705 .false is more important
706
706
707 """
707 """
708 user_inherit_object_permissions = not ('hg.inherit_default_perms.false'
708 user_inherit_object_permissions = not ('hg.inherit_default_perms.false'
709 in self.permissions_global)
709 in self.permissions_global)
710
710
711 # default permissions inherited from `default` user permissions
711 # default permissions inherited from `default` user permissions
712 self._calculate_default_permissions_repositories(
712 self._calculate_default_permissions_repositories(
713 user_inherit_object_permissions)
713 user_inherit_object_permissions)
714
714
715 self._calculate_default_permissions_repository_branches(
715 self._calculate_default_permissions_repository_branches(
716 user_inherit_object_permissions)
716 user_inherit_object_permissions)
717
717
718 self._calculate_default_permissions_repository_groups(
718 self._calculate_default_permissions_repository_groups(
719 user_inherit_object_permissions)
719 user_inherit_object_permissions)
720
720
721 self._calculate_default_permissions_user_groups(
721 self._calculate_default_permissions_user_groups(
722 user_inherit_object_permissions)
722 user_inherit_object_permissions)
723
723
724 def _calculate_repository_permissions(self):
724 def _calculate_repository_permissions(self):
725 """
725 """
726 Repository permissions for the current user.
726 Repository permissions for the current user.
727
727
728 Check if the user is part of user groups for this repository and
728 Check if the user is part of user groups for this repository and
729 fill in the permission from it. `_choose_permission` decides of which
729 fill in the permission from it. `_choose_permission` decides of which
730 permission should be selected based on selected method.
730 permission should be selected based on selected method.
731 """
731 """
732
732
733 # user group for repositories permissions
733 # user group for repositories permissions
734 user_repo_perms_from_user_group = Permission\
734 user_repo_perms_from_user_group = Permission\
735 .get_default_repo_perms_from_user_group(
735 .get_default_repo_perms_from_user_group(
736 self.user_id, self.scope_repo_id)
736 self.user_id, self.scope_repo_id)
737
737
738 multiple_counter = collections.defaultdict(int)
738 multiple_counter = collections.defaultdict(int)
739 for perm in user_repo_perms_from_user_group:
739 for perm in user_repo_perms_from_user_group:
740 r_k = perm.UserGroupRepoToPerm.repository.repo_name
740 r_k = perm.UserGroupRepoToPerm.repository.repo_name
741 multiple_counter[r_k] += 1
741 multiple_counter[r_k] += 1
742 p = perm.Permission.permission_name
742 p = perm.Permission.permission_name
743 o = PermOrigin.REPO_USERGROUP % perm.UserGroupRepoToPerm\
743 o = PermOrigin.REPO_USERGROUP % perm.UserGroupRepoToPerm\
744 .users_group.users_group_name
744 .users_group.users_group_name
745
745
746 if multiple_counter[r_k] > 1:
746 if multiple_counter[r_k] > 1:
747 cur_perm = self.permissions_repositories[r_k]
747 cur_perm = self.permissions_repositories[r_k]
748 p = self._choose_permission(p, cur_perm)
748 p = self._choose_permission(p, cur_perm)
749
749
750 self.permissions_repositories[r_k] = p, o
750 self.permissions_repositories[r_k] = p, o
751
751
752 if perm.Repository.user_id == self.user_id:
752 if perm.Repository.user_id == self.user_id:
753 # set admin if owner
753 # set admin if owner
754 p = 'repository.admin'
754 p = 'repository.admin'
755 o = PermOrigin.REPO_OWNER
755 o = PermOrigin.REPO_OWNER
756 self.permissions_repositories[r_k] = p, o
756 self.permissions_repositories[r_k] = p, o
757
757
758 if self.user_is_admin:
758 if self.user_is_admin:
759 p = 'repository.admin'
759 p = 'repository.admin'
760 o = PermOrigin.SUPER_ADMIN
760 o = PermOrigin.SUPER_ADMIN
761 self.permissions_repositories[r_k] = p, o
761 self.permissions_repositories[r_k] = p, o
762
762
763 # user explicit permissions for repositories, overrides any specified
763 # user explicit permissions for repositories, overrides any specified
764 # by the group permission
764 # by the group permission
765 user_repo_perms = Permission.get_default_repo_perms(
765 user_repo_perms = Permission.get_default_repo_perms(
766 self.user_id, self.scope_repo_id)
766 self.user_id, self.scope_repo_id)
767 for perm in user_repo_perms:
767 for perm in user_repo_perms:
768 r_k = perm.UserRepoToPerm.repository.repo_name
768 r_k = perm.UserRepoToPerm.repository.repo_name
769 p = perm.Permission.permission_name
769 p = perm.Permission.permission_name
770 o = PermOrigin.REPO_USER % perm.UserRepoToPerm.user.username
770 o = PermOrigin.REPO_USER % perm.UserRepoToPerm.user.username
771
771
772 if not self.explicit:
772 if not self.explicit:
773 cur_perm = self.permissions_repositories.get(
773 cur_perm = self.permissions_repositories.get(
774 r_k, 'repository.none')
774 r_k, 'repository.none')
775 p = self._choose_permission(p, cur_perm)
775 p = self._choose_permission(p, cur_perm)
776
776
777 self.permissions_repositories[r_k] = p, o
777 self.permissions_repositories[r_k] = p, o
778
778
779 if perm.Repository.user_id == self.user_id:
779 if perm.Repository.user_id == self.user_id:
780 # set admin if owner
780 # set admin if owner
781 p = 'repository.admin'
781 p = 'repository.admin'
782 o = PermOrigin.REPO_OWNER
782 o = PermOrigin.REPO_OWNER
783 self.permissions_repositories[r_k] = p, o
783 self.permissions_repositories[r_k] = p, o
784
784
785 if self.user_is_admin:
785 if self.user_is_admin:
786 p = 'repository.admin'
786 p = 'repository.admin'
787 o = PermOrigin.SUPER_ADMIN
787 o = PermOrigin.SUPER_ADMIN
788 self.permissions_repositories[r_k] = p, o
788 self.permissions_repositories[r_k] = p, o
789
789
790 def _calculate_repository_branch_permissions(self):
790 def _calculate_repository_branch_permissions(self):
791 # user group for repositories permissions
791 # user group for repositories permissions
792 user_repo_branch_perms_from_user_group = Permission\
792 user_repo_branch_perms_from_user_group = Permission\
793 .get_default_repo_branch_perms_from_user_group(
793 .get_default_repo_branch_perms_from_user_group(
794 self.user_id, self.scope_repo_id)
794 self.user_id, self.scope_repo_id)
795
795
796 multiple_counter = collections.defaultdict(int)
796 multiple_counter = collections.defaultdict(int)
797 for perm in user_repo_branch_perms_from_user_group:
797 for perm in user_repo_branch_perms_from_user_group:
798 r_k = perm.UserGroupRepoToPerm.repository.repo_name
798 r_k = perm.UserGroupRepoToPerm.repository.repo_name
799 p = perm.Permission.permission_name
799 p = perm.Permission.permission_name
800 pattern = perm.UserGroupToRepoBranchPermission.branch_pattern
800 pattern = perm.UserGroupToRepoBranchPermission.branch_pattern
801 o = PermOrigin.REPO_USERGROUP % perm.UserGroupRepoToPerm\
801 o = PermOrigin.REPO_USERGROUP % perm.UserGroupRepoToPerm\
802 .users_group.users_group_name
802 .users_group.users_group_name
803
803
804 multiple_counter[r_k] += 1
804 multiple_counter[r_k] += 1
805 if multiple_counter[r_k] > 1:
805 if multiple_counter[r_k] > 1:
806 cur_perm = self.permissions_repository_branches[r_k][pattern]
806 cur_perm = self.permissions_repository_branches[r_k][pattern]
807 p = self._choose_permission(p, cur_perm)
807 p = self._choose_permission(p, cur_perm)
808
808
809 self.permissions_repository_branches[r_k] = pattern, p, o
809 self.permissions_repository_branches[r_k] = pattern, p, o
810
810
811 # user explicit branch permissions for repositories, overrides
811 # user explicit branch permissions for repositories, overrides
812 # any specified by the group permission
812 # any specified by the group permission
813 user_repo_branch_perms = Permission.get_default_repo_branch_perms(
813 user_repo_branch_perms = Permission.get_default_repo_branch_perms(
814 self.user_id, self.scope_repo_id)
814 self.user_id, self.scope_repo_id)
815
815
816 for perm in user_repo_branch_perms:
816 for perm in user_repo_branch_perms:
817
817
818 r_k = perm.UserRepoToPerm.repository.repo_name
818 r_k = perm.UserRepoToPerm.repository.repo_name
819 p = perm.Permission.permission_name
819 p = perm.Permission.permission_name
820 pattern = perm.UserToRepoBranchPermission.branch_pattern
820 pattern = perm.UserToRepoBranchPermission.branch_pattern
821 o = PermOrigin.REPO_USER % perm.UserRepoToPerm.user.username
821 o = PermOrigin.REPO_USER % perm.UserRepoToPerm.user.username
822
822
823 if not self.explicit:
823 if not self.explicit:
824 cur_perm = self.permissions_repository_branches.get(r_k)
824 cur_perm = self.permissions_repository_branches.get(r_k)
825 if cur_perm:
825 if cur_perm:
826 cur_perm = cur_perm[pattern]
826 cur_perm = cur_perm[pattern]
827 cur_perm = cur_perm or 'branch.none'
827 cur_perm = cur_perm or 'branch.none'
828 p = self._choose_permission(p, cur_perm)
828 p = self._choose_permission(p, cur_perm)
829
829
830 # NOTE(marcink): register all pattern/perm instances in this
830 # NOTE(marcink): register all pattern/perm instances in this
831 # special dict that aggregates entries
831 # special dict that aggregates entries
832 self.permissions_repository_branches[r_k] = pattern, p, o
832 self.permissions_repository_branches[r_k] = pattern, p, o
833
833
834 def _calculate_repository_group_permissions(self):
834 def _calculate_repository_group_permissions(self):
835 """
835 """
836 Repository group permissions for the current user.
836 Repository group permissions for the current user.
837
837
838 Check if the user is part of user groups for repository groups and
838 Check if the user is part of user groups for repository groups and
839 fill in the permissions from it. `_choose_permission` decides of which
839 fill in the permissions from it. `_choose_permission` decides of which
840 permission should be selected based on selected method.
840 permission should be selected based on selected method.
841 """
841 """
842 # user group for repo groups permissions
842 # user group for repo groups permissions
843 user_repo_group_perms_from_user_group = Permission\
843 user_repo_group_perms_from_user_group = Permission\
844 .get_default_group_perms_from_user_group(
844 .get_default_group_perms_from_user_group(
845 self.user_id, self.scope_repo_group_id)
845 self.user_id, self.scope_repo_group_id)
846
846
847 multiple_counter = collections.defaultdict(int)
847 multiple_counter = collections.defaultdict(int)
848 for perm in user_repo_group_perms_from_user_group:
848 for perm in user_repo_group_perms_from_user_group:
849 rg_k = perm.UserGroupRepoGroupToPerm.group.group_name
849 rg_k = perm.UserGroupRepoGroupToPerm.group.group_name
850 multiple_counter[rg_k] += 1
850 multiple_counter[rg_k] += 1
851 o = PermOrigin.REPOGROUP_USERGROUP % perm.UserGroupRepoGroupToPerm\
851 o = PermOrigin.REPOGROUP_USERGROUP % perm.UserGroupRepoGroupToPerm\
852 .users_group.users_group_name
852 .users_group.users_group_name
853 p = perm.Permission.permission_name
853 p = perm.Permission.permission_name
854
854
855 if multiple_counter[rg_k] > 1:
855 if multiple_counter[rg_k] > 1:
856 cur_perm = self.permissions_repository_groups[rg_k]
856 cur_perm = self.permissions_repository_groups[rg_k]
857 p = self._choose_permission(p, cur_perm)
857 p = self._choose_permission(p, cur_perm)
858 self.permissions_repository_groups[rg_k] = p, o
858 self.permissions_repository_groups[rg_k] = p, o
859
859
860 if perm.RepoGroup.user_id == self.user_id:
860 if perm.RepoGroup.user_id == self.user_id:
861 # set admin if owner, even for member of other user group
861 # set admin if owner, even for member of other user group
862 p = 'group.admin'
862 p = 'group.admin'
863 o = PermOrigin.REPOGROUP_OWNER
863 o = PermOrigin.REPOGROUP_OWNER
864 self.permissions_repository_groups[rg_k] = p, o
864 self.permissions_repository_groups[rg_k] = p, o
865
865
866 if self.user_is_admin:
866 if self.user_is_admin:
867 p = 'group.admin'
867 p = 'group.admin'
868 o = PermOrigin.SUPER_ADMIN
868 o = PermOrigin.SUPER_ADMIN
869 self.permissions_repository_groups[rg_k] = p, o
869 self.permissions_repository_groups[rg_k] = p, o
870
870
871 # user explicit permissions for repository groups
871 # user explicit permissions for repository groups
872 user_repo_groups_perms = Permission.get_default_group_perms(
872 user_repo_groups_perms = Permission.get_default_group_perms(
873 self.user_id, self.scope_repo_group_id)
873 self.user_id, self.scope_repo_group_id)
874 for perm in user_repo_groups_perms:
874 for perm in user_repo_groups_perms:
875 rg_k = perm.UserRepoGroupToPerm.group.group_name
875 rg_k = perm.UserRepoGroupToPerm.group.group_name
876 o = PermOrigin.REPOGROUP_USER % perm.UserRepoGroupToPerm\
876 o = PermOrigin.REPOGROUP_USER % perm.UserRepoGroupToPerm\
877 .user.username
877 .user.username
878 p = perm.Permission.permission_name
878 p = perm.Permission.permission_name
879
879
880 if not self.explicit:
880 if not self.explicit:
881 cur_perm = self.permissions_repository_groups.get(rg_k, 'group.none')
881 cur_perm = self.permissions_repository_groups.get(rg_k, 'group.none')
882 p = self._choose_permission(p, cur_perm)
882 p = self._choose_permission(p, cur_perm)
883
883
884 self.permissions_repository_groups[rg_k] = p, o
884 self.permissions_repository_groups[rg_k] = p, o
885
885
886 if perm.RepoGroup.user_id == self.user_id:
886 if perm.RepoGroup.user_id == self.user_id:
887 # set admin if owner
887 # set admin if owner
888 p = 'group.admin'
888 p = 'group.admin'
889 o = PermOrigin.REPOGROUP_OWNER
889 o = PermOrigin.REPOGROUP_OWNER
890 self.permissions_repository_groups[rg_k] = p, o
890 self.permissions_repository_groups[rg_k] = p, o
891
891
892 if self.user_is_admin:
892 if self.user_is_admin:
893 p = 'group.admin'
893 p = 'group.admin'
894 o = PermOrigin.SUPER_ADMIN
894 o = PermOrigin.SUPER_ADMIN
895 self.permissions_repository_groups[rg_k] = p, o
895 self.permissions_repository_groups[rg_k] = p, o
896
896
897 def _calculate_user_group_permissions(self):
897 def _calculate_user_group_permissions(self):
898 """
898 """
899 User group permissions for the current user.
899 User group permissions for the current user.
900 """
900 """
901 # user group for user group permissions
901 # user group for user group permissions
902 user_group_from_user_group = Permission\
902 user_group_from_user_group = Permission\
903 .get_default_user_group_perms_from_user_group(
903 .get_default_user_group_perms_from_user_group(
904 self.user_id, self.scope_user_group_id)
904 self.user_id, self.scope_user_group_id)
905
905
906 multiple_counter = collections.defaultdict(int)
906 multiple_counter = collections.defaultdict(int)
907 for perm in user_group_from_user_group:
907 for perm in user_group_from_user_group:
908 ug_k = perm.UserGroupUserGroupToPerm\
908 ug_k = perm.UserGroupUserGroupToPerm\
909 .target_user_group.users_group_name
909 .target_user_group.users_group_name
910 multiple_counter[ug_k] += 1
910 multiple_counter[ug_k] += 1
911 o = PermOrigin.USERGROUP_USERGROUP % perm.UserGroupUserGroupToPerm\
911 o = PermOrigin.USERGROUP_USERGROUP % perm.UserGroupUserGroupToPerm\
912 .user_group.users_group_name
912 .user_group.users_group_name
913 p = perm.Permission.permission_name
913 p = perm.Permission.permission_name
914
914
915 if multiple_counter[ug_k] > 1:
915 if multiple_counter[ug_k] > 1:
916 cur_perm = self.permissions_user_groups[ug_k]
916 cur_perm = self.permissions_user_groups[ug_k]
917 p = self._choose_permission(p, cur_perm)
917 p = self._choose_permission(p, cur_perm)
918
918
919 self.permissions_user_groups[ug_k] = p, o
919 self.permissions_user_groups[ug_k] = p, o
920
920
921 if perm.UserGroup.user_id == self.user_id:
921 if perm.UserGroup.user_id == self.user_id:
922 # set admin if owner, even for member of other user group
922 # set admin if owner, even for member of other user group
923 p = 'usergroup.admin'
923 p = 'usergroup.admin'
924 o = PermOrigin.USERGROUP_OWNER
924 o = PermOrigin.USERGROUP_OWNER
925 self.permissions_user_groups[ug_k] = p, o
925 self.permissions_user_groups[ug_k] = p, o
926
926
927 if self.user_is_admin:
927 if self.user_is_admin:
928 p = 'usergroup.admin'
928 p = 'usergroup.admin'
929 o = PermOrigin.SUPER_ADMIN
929 o = PermOrigin.SUPER_ADMIN
930 self.permissions_user_groups[ug_k] = p, o
930 self.permissions_user_groups[ug_k] = p, o
931
931
932 # user explicit permission for user groups
932 # user explicit permission for user groups
933 user_user_groups_perms = Permission.get_default_user_group_perms(
933 user_user_groups_perms = Permission.get_default_user_group_perms(
934 self.user_id, self.scope_user_group_id)
934 self.user_id, self.scope_user_group_id)
935 for perm in user_user_groups_perms:
935 for perm in user_user_groups_perms:
936 ug_k = perm.UserUserGroupToPerm.user_group.users_group_name
936 ug_k = perm.UserUserGroupToPerm.user_group.users_group_name
937 o = PermOrigin.USERGROUP_USER % perm.UserUserGroupToPerm\
937 o = PermOrigin.USERGROUP_USER % perm.UserUserGroupToPerm\
938 .user.username
938 .user.username
939 p = perm.Permission.permission_name
939 p = perm.Permission.permission_name
940
940
941 if not self.explicit:
941 if not self.explicit:
942 cur_perm = self.permissions_user_groups.get(ug_k, 'usergroup.none')
942 cur_perm = self.permissions_user_groups.get(ug_k, 'usergroup.none')
943 p = self._choose_permission(p, cur_perm)
943 p = self._choose_permission(p, cur_perm)
944
944
945 self.permissions_user_groups[ug_k] = p, o
945 self.permissions_user_groups[ug_k] = p, o
946
946
947 if perm.UserGroup.user_id == self.user_id:
947 if perm.UserGroup.user_id == self.user_id:
948 # set admin if owner
948 # set admin if owner
949 p = 'usergroup.admin'
949 p = 'usergroup.admin'
950 o = PermOrigin.USERGROUP_OWNER
950 o = PermOrigin.USERGROUP_OWNER
951 self.permissions_user_groups[ug_k] = p, o
951 self.permissions_user_groups[ug_k] = p, o
952
952
953 if self.user_is_admin:
953 if self.user_is_admin:
954 p = 'usergroup.admin'
954 p = 'usergroup.admin'
955 o = PermOrigin.SUPER_ADMIN
955 o = PermOrigin.SUPER_ADMIN
956 self.permissions_user_groups[ug_k] = p, o
956 self.permissions_user_groups[ug_k] = p, o
957
957
958 def _choose_permission(self, new_perm, cur_perm):
958 def _choose_permission(self, new_perm, cur_perm):
959 new_perm_val = Permission.PERM_WEIGHTS[new_perm]
959 new_perm_val = Permission.PERM_WEIGHTS[new_perm]
960 cur_perm_val = Permission.PERM_WEIGHTS[cur_perm]
960 cur_perm_val = Permission.PERM_WEIGHTS[cur_perm]
961 if self.algo == 'higherwin':
961 if self.algo == 'higherwin':
962 if new_perm_val > cur_perm_val:
962 if new_perm_val > cur_perm_val:
963 return new_perm
963 return new_perm
964 return cur_perm
964 return cur_perm
965 elif self.algo == 'lowerwin':
965 elif self.algo == 'lowerwin':
966 if new_perm_val < cur_perm_val:
966 if new_perm_val < cur_perm_val:
967 return new_perm
967 return new_perm
968 return cur_perm
968 return cur_perm
969
969
970 def _permission_structure(self):
970 def _permission_structure(self):
971 return {
971 return {
972 'global': self.permissions_global,
972 'global': self.permissions_global,
973 'repositories': self.permissions_repositories,
973 'repositories': self.permissions_repositories,
974 'repository_branches': self.permissions_repository_branches,
974 'repository_branches': self.permissions_repository_branches,
975 'repositories_groups': self.permissions_repository_groups,
975 'repositories_groups': self.permissions_repository_groups,
976 'user_groups': self.permissions_user_groups,
976 'user_groups': self.permissions_user_groups,
977 }
977 }
978
978
979
979
980 def allowed_auth_token_access(view_name, auth_token, whitelist=None):
980 def allowed_auth_token_access(view_name, auth_token, whitelist=None):
981 """
981 """
982 Check if given controller_name is in whitelist of auth token access
982 Check if given controller_name is in whitelist of auth token access
983 """
983 """
984 if not whitelist:
984 if not whitelist:
985 from rhodecode import CONFIG
985 from rhodecode import CONFIG
986 whitelist = aslist(
986 whitelist = aslist(
987 CONFIG.get('api_access_controllers_whitelist'), sep=',')
987 CONFIG.get('api_access_controllers_whitelist'), sep=',')
988 # backward compat translation
988 # backward compat translation
989 compat = {
989 compat = {
990 # old controller, new VIEW
990 # old controller, new VIEW
991 'ChangesetController:*': 'RepoCommitsView:*',
991 'ChangesetController:*': 'RepoCommitsView:*',
992 'ChangesetController:changeset_patch': 'RepoCommitsView:repo_commit_patch',
992 'ChangesetController:changeset_patch': 'RepoCommitsView:repo_commit_patch',
993 'ChangesetController:changeset_raw': 'RepoCommitsView:repo_commit_raw',
993 'ChangesetController:changeset_raw': 'RepoCommitsView:repo_commit_raw',
994 'FilesController:raw': 'RepoCommitsView:repo_commit_raw',
994 'FilesController:raw': 'RepoCommitsView:repo_commit_raw',
995 'FilesController:archivefile': 'RepoFilesView:repo_archivefile',
995 'FilesController:archivefile': 'RepoFilesView:repo_archivefile',
996 'GistsController:*': 'GistView:*',
996 'GistsController:*': 'GistView:*',
997 }
997 }
998
998
999 log.debug(
999 log.debug(
1000 'Allowed views for AUTH TOKEN access: %s', whitelist)
1000 'Allowed views for AUTH TOKEN access: %s', whitelist)
1001 auth_token_access_valid = False
1001 auth_token_access_valid = False
1002
1002
1003 for entry in whitelist:
1003 for entry in whitelist:
1004 token_match = True
1004 token_match = True
1005 if entry in compat:
1005 if entry in compat:
1006 # translate from old Controllers to Pyramid Views
1006 # translate from old Controllers to Pyramid Views
1007 entry = compat[entry]
1007 entry = compat[entry]
1008
1008
1009 if '@' in entry:
1009 if '@' in entry:
1010 # specific AuthToken
1010 # specific AuthToken
1011 entry, allowed_token = entry.split('@', 1)
1011 entry, allowed_token = entry.split('@', 1)
1012 token_match = auth_token == allowed_token
1012 token_match = auth_token == allowed_token
1013
1013
1014 if fnmatch.fnmatch(view_name, entry) and token_match:
1014 if fnmatch.fnmatch(view_name, entry) and token_match:
1015 auth_token_access_valid = True
1015 auth_token_access_valid = True
1016 break
1016 break
1017
1017
1018 if auth_token_access_valid:
1018 if auth_token_access_valid:
1019 log.debug('view: `%s` matches entry in whitelist: %s',
1019 log.debug('view: `%s` matches entry in whitelist: %s',
1020 view_name, whitelist)
1020 view_name, whitelist)
1021
1021
1022 else:
1022 else:
1023 msg = ('view: `%s` does *NOT* match any entry in whitelist: %s'
1023 msg = ('view: `%s` does *NOT* match any entry in whitelist: %s'
1024 % (view_name, whitelist))
1024 % (view_name, whitelist))
1025 if auth_token:
1025 if auth_token:
1026 # if we use auth token key and don't have access it's a warning
1026 # if we use auth token key and don't have access it's a warning
1027 log.warning(msg)
1027 log.warning(msg)
1028 else:
1028 else:
1029 log.debug(msg)
1029 log.debug(msg)
1030
1030
1031 return auth_token_access_valid
1031 return auth_token_access_valid
1032
1032
1033
1033
1034 class AuthUser(object):
1034 class AuthUser(object):
1035 """
1035 """
1036 A simple object that handles all attributes of user in RhodeCode
1036 A simple object that handles all attributes of user in RhodeCode
1037
1037
1038 It does lookup based on API key,given user, or user present in session
1038 It does lookup based on API key,given user, or user present in session
1039 Then it fills all required information for such user. It also checks if
1039 Then it fills all required information for such user. It also checks if
1040 anonymous access is enabled and if so, it returns default user as logged in
1040 anonymous access is enabled and if so, it returns default user as logged in
1041 """
1041 """
1042 GLOBAL_PERMS = [x[0] for x in Permission.PERMS]
1042 GLOBAL_PERMS = [x[0] for x in Permission.PERMS]
1043
1043
1044 def __init__(self, user_id=None, api_key=None, username=None, ip_addr=None):
1044 def __init__(self, user_id=None, api_key=None, username=None, ip_addr=None):
1045
1045
1046 self.user_id = user_id
1046 self.user_id = user_id
1047 self._api_key = api_key
1047 self._api_key = api_key
1048
1048
1049 self.api_key = None
1049 self.api_key = None
1050 self.username = username
1050 self.username = username
1051 self.ip_addr = ip_addr
1051 self.ip_addr = ip_addr
1052 self.name = ''
1052 self.name = ''
1053 self.lastname = ''
1053 self.lastname = ''
1054 self.first_name = ''
1054 self.first_name = ''
1055 self.last_name = ''
1055 self.last_name = ''
1056 self.email = ''
1056 self.email = ''
1057 self.is_authenticated = False
1057 self.is_authenticated = False
1058 self.admin = False
1058 self.admin = False
1059 self.inherit_default_permissions = False
1059 self.inherit_default_permissions = False
1060 self.password = ''
1060 self.password = ''
1061
1061
1062 self.anonymous_user = None # propagated on propagate_data
1062 self.anonymous_user = None # propagated on propagate_data
1063 self.propagate_data()
1063 self.propagate_data()
1064 self._instance = None
1064 self._instance = None
1065 self._permissions_scoped_cache = {} # used to bind scoped calculation
1065 self._permissions_scoped_cache = {} # used to bind scoped calculation
1066
1066
1067 @LazyProperty
1067 @LazyProperty
1068 def permissions(self):
1068 def permissions(self):
1069 return self.get_perms(user=self, cache=None)
1069 return self.get_perms(user=self, cache=None)
1070
1070
1071 @LazyProperty
1071 @LazyProperty
1072 def permissions_safe(self):
1072 def permissions_safe(self):
1073 """
1073 """
1074 Filtered permissions excluding not allowed repositories
1074 Filtered permissions excluding not allowed repositories
1075 """
1075 """
1076 perms = self.get_perms(user=self, cache=None)
1076 perms = self.get_perms(user=self, cache=None)
1077
1077
1078 perms['repositories'] = {
1078 perms['repositories'] = {
1079 k: v for k, v in perms['repositories'].items()
1079 k: v for k, v in perms['repositories'].items()
1080 if v != 'repository.none'}
1080 if v != 'repository.none'}
1081 perms['repositories_groups'] = {
1081 perms['repositories_groups'] = {
1082 k: v for k, v in perms['repositories_groups'].items()
1082 k: v for k, v in perms['repositories_groups'].items()
1083 if v != 'group.none'}
1083 if v != 'group.none'}
1084 perms['user_groups'] = {
1084 perms['user_groups'] = {
1085 k: v for k, v in perms['user_groups'].items()
1085 k: v for k, v in perms['user_groups'].items()
1086 if v != 'usergroup.none'}
1086 if v != 'usergroup.none'}
1087 perms['repository_branches'] = {
1087 perms['repository_branches'] = {
1088 k: v for k, v in perms['repository_branches'].iteritems()
1088 k: v for k, v in perms['repository_branches'].iteritems()
1089 if v != 'branch.none'}
1089 if v != 'branch.none'}
1090 return perms
1090 return perms
1091
1091
1092 @LazyProperty
1092 @LazyProperty
1093 def permissions_full_details(self):
1093 def permissions_full_details(self):
1094 return self.get_perms(
1094 return self.get_perms(
1095 user=self, cache=None, calculate_super_admin=True)
1095 user=self, cache=None, calculate_super_admin=True)
1096
1096
1097 def permissions_with_scope(self, scope):
1097 def permissions_with_scope(self, scope):
1098 """
1098 """
1099 Call the get_perms function with scoped data. The scope in that function
1099 Call the get_perms function with scoped data. The scope in that function
1100 narrows the SQL calls to the given ID of objects resulting in fetching
1100 narrows the SQL calls to the given ID of objects resulting in fetching
1101 Just particular permission we want to obtain. If scope is an empty dict
1101 Just particular permission we want to obtain. If scope is an empty dict
1102 then it basically narrows the scope to GLOBAL permissions only.
1102 then it basically narrows the scope to GLOBAL permissions only.
1103
1103
1104 :param scope: dict
1104 :param scope: dict
1105 """
1105 """
1106 if 'repo_name' in scope:
1106 if 'repo_name' in scope:
1107 obj = Repository.get_by_repo_name(scope['repo_name'])
1107 obj = Repository.get_by_repo_name(scope['repo_name'])
1108 if obj:
1108 if obj:
1109 scope['repo_id'] = obj.repo_id
1109 scope['repo_id'] = obj.repo_id
1110 _scope = collections.OrderedDict()
1110 _scope = collections.OrderedDict()
1111 _scope['repo_id'] = -1
1111 _scope['repo_id'] = -1
1112 _scope['user_group_id'] = -1
1112 _scope['user_group_id'] = -1
1113 _scope['repo_group_id'] = -1
1113 _scope['repo_group_id'] = -1
1114
1114
1115 for k in sorted(scope.keys()):
1115 for k in sorted(scope.keys()):
1116 _scope[k] = scope[k]
1116 _scope[k] = scope[k]
1117
1117
1118 # store in cache to mimic how the @LazyProperty works,
1118 # store in cache to mimic how the @LazyProperty works,
1119 # the difference here is that we use the unique key calculated
1119 # the difference here is that we use the unique key calculated
1120 # from params and values
1120 # from params and values
1121 return self.get_perms(user=self, cache=None, scope=_scope)
1121 return self.get_perms(user=self, cache=None, scope=_scope)
1122
1122
1123 def get_instance(self):
1123 def get_instance(self):
1124 return User.get(self.user_id)
1124 return User.get(self.user_id)
1125
1125
1126 def propagate_data(self):
1126 def propagate_data(self):
1127 """
1127 """
1128 Fills in user data and propagates values to this instance. Maps fetched
1128 Fills in user data and propagates values to this instance. Maps fetched
1129 user attributes to this class instance attributes
1129 user attributes to this class instance attributes
1130 """
1130 """
1131 log.debug('AuthUser: starting data propagation for new potential user')
1131 log.debug('AuthUser: starting data propagation for new potential user')
1132 user_model = UserModel()
1132 user_model = UserModel()
1133 anon_user = self.anonymous_user = User.get_default_user(cache=True)
1133 anon_user = self.anonymous_user = User.get_default_user(cache=True)
1134 is_user_loaded = False
1134 is_user_loaded = False
1135
1135
1136 # lookup by userid
1136 # lookup by userid
1137 if self.user_id is not None and self.user_id != anon_user.user_id:
1137 if self.user_id is not None and self.user_id != anon_user.user_id:
1138 log.debug('Trying Auth User lookup by USER ID: `%s`', self.user_id)
1138 log.debug('Trying Auth User lookup by USER ID: `%s`', self.user_id)
1139 is_user_loaded = user_model.fill_data(self, user_id=self.user_id)
1139 is_user_loaded = user_model.fill_data(self, user_id=self.user_id)
1140
1140
1141 # try go get user by api key
1141 # try go get user by api key
1142 elif self._api_key and self._api_key != anon_user.api_key:
1142 elif self._api_key and self._api_key != anon_user.api_key:
1143 log.debug('Trying Auth User lookup by API KEY: `%s`', self._api_key)
1143 log.debug('Trying Auth User lookup by API KEY: `%s`', self._api_key)
1144 is_user_loaded = user_model.fill_data(self, api_key=self._api_key)
1144 is_user_loaded = user_model.fill_data(self, api_key=self._api_key)
1145
1145
1146 # lookup by username
1146 # lookup by username
1147 elif self.username:
1147 elif self.username:
1148 log.debug('Trying Auth User lookup by USER NAME: `%s`', self.username)
1148 log.debug('Trying Auth User lookup by USER NAME: `%s`', self.username)
1149 is_user_loaded = user_model.fill_data(self, username=self.username)
1149 is_user_loaded = user_model.fill_data(self, username=self.username)
1150 else:
1150 else:
1151 log.debug('No data in %s that could been used to log in', self)
1151 log.debug('No data in %s that could been used to log in', self)
1152
1152
1153 if not is_user_loaded:
1153 if not is_user_loaded:
1154 log.debug(
1154 log.debug(
1155 'Failed to load user. Fallback to default user %s', anon_user)
1155 'Failed to load user. Fallback to default user %s', anon_user)
1156 # if we cannot authenticate user try anonymous
1156 # if we cannot authenticate user try anonymous
1157 if anon_user.active:
1157 if anon_user.active:
1158 log.debug('default user is active, using it as a session user')
1158 log.debug('default user is active, using it as a session user')
1159 user_model.fill_data(self, user_id=anon_user.user_id)
1159 user_model.fill_data(self, user_id=anon_user.user_id)
1160 # then we set this user is logged in
1160 # then we set this user is logged in
1161 self.is_authenticated = True
1161 self.is_authenticated = True
1162 else:
1162 else:
1163 log.debug('default user is NOT active')
1163 log.debug('default user is NOT active')
1164 # in case of disabled anonymous user we reset some of the
1164 # in case of disabled anonymous user we reset some of the
1165 # parameters so such user is "corrupted", skipping the fill_data
1165 # parameters so such user is "corrupted", skipping the fill_data
1166 for attr in ['user_id', 'username', 'admin', 'active']:
1166 for attr in ['user_id', 'username', 'admin', 'active']:
1167 setattr(self, attr, None)
1167 setattr(self, attr, None)
1168 self.is_authenticated = False
1168 self.is_authenticated = False
1169
1169
1170 if not self.username:
1170 if not self.username:
1171 self.username = 'None'
1171 self.username = 'None'
1172
1172
1173 log.debug('AuthUser: propagated user is now %s', self)
1173 log.debug('AuthUser: propagated user is now %s', self)
1174
1174
1175 def get_perms(self, user, scope=None, explicit=True, algo='higherwin',
1175 def get_perms(self, user, scope=None, explicit=True, algo='higherwin',
1176 calculate_super_admin=False, cache=None):
1176 calculate_super_admin=False, cache=None):
1177 """
1177 """
1178 Fills user permission attribute with permissions taken from database
1178 Fills user permission attribute with permissions taken from database
1179 works for permissions given for repositories, and for permissions that
1179 works for permissions given for repositories, and for permissions that
1180 are granted to groups
1180 are granted to groups
1181
1181
1182 :param user: instance of User object from database
1182 :param user: instance of User object from database
1183 :param explicit: In case there are permissions both for user and a group
1183 :param explicit: In case there are permissions both for user and a group
1184 that user is part of, explicit flag will defiine if user will
1184 that user is part of, explicit flag will defiine if user will
1185 explicitly override permissions from group, if it's False it will
1185 explicitly override permissions from group, if it's False it will
1186 make decision based on the algo
1186 make decision based on the algo
1187 :param algo: algorithm to decide what permission should be choose if
1187 :param algo: algorithm to decide what permission should be choose if
1188 it's multiple defined, eg user in two different groups. It also
1188 it's multiple defined, eg user in two different groups. It also
1189 decides if explicit flag is turned off how to specify the permission
1189 decides if explicit flag is turned off how to specify the permission
1190 for case when user is in a group + have defined separate permission
1190 for case when user is in a group + have defined separate permission
1191 :param calculate_super_admin: calculate permissions for super-admin in the
1191 :param calculate_super_admin: calculate permissions for super-admin in the
1192 same way as for regular user without speedups
1192 same way as for regular user without speedups
1193 :param cache: Use caching for calculation, None = let the cache backend decide
1193 :param cache: Use caching for calculation, None = let the cache backend decide
1194 """
1194 """
1195 user_id = user.user_id
1195 user_id = user.user_id
1196 user_is_admin = user.is_admin
1196 user_is_admin = user.is_admin
1197
1197
1198 # inheritance of global permissions like create repo/fork repo etc
1198 # inheritance of global permissions like create repo/fork repo etc
1199 user_inherit_default_permissions = user.inherit_default_permissions
1199 user_inherit_default_permissions = user.inherit_default_permissions
1200
1200
1201 cache_seconds = safe_int(
1201 cache_seconds = safe_int(
1202 rhodecode.CONFIG.get('rc_cache.cache_perms.expiration_time'))
1202 rhodecode.CONFIG.get('rc_cache.cache_perms.expiration_time'))
1203
1203
1204 if cache is None:
1204 if cache is None:
1205 # let the backend cache decide
1205 # let the backend cache decide
1206 cache_on = cache_seconds > 0
1206 cache_on = cache_seconds > 0
1207 else:
1207 else:
1208 cache_on = cache
1208 cache_on = cache
1209
1209
1210 log.debug(
1210 log.debug(
1211 'Computing PERMISSION tree for user %s scope `%s` '
1211 'Computing PERMISSION tree for user %s scope `%s` '
1212 'with caching: %s[TTL: %ss]', user, scope, cache_on, cache_seconds or 0)
1212 'with caching: %s[TTL: %ss]', user, scope, cache_on, cache_seconds or 0)
1213
1213
1214 cache_namespace_uid = 'cache_user_auth.{}'.format(user_id)
1214 cache_namespace_uid = 'cache_user_auth.{}'.format(user_id)
1215 region = rc_cache.get_or_create_region('cache_perms', cache_namespace_uid)
1215 region = rc_cache.get_or_create_region('cache_perms', cache_namespace_uid)
1216
1216
1217 @region.conditional_cache_on_arguments(namespace=cache_namespace_uid,
1217 @region.conditional_cache_on_arguments(namespace=cache_namespace_uid,
1218 condition=cache_on)
1218 condition=cache_on)
1219 def compute_perm_tree(cache_name,
1219 def compute_perm_tree(cache_name,
1220 user_id, scope, user_is_admin,user_inherit_default_permissions,
1220 user_id, scope, user_is_admin,user_inherit_default_permissions,
1221 explicit, algo, calculate_super_admin):
1221 explicit, algo, calculate_super_admin):
1222 return _cached_perms_data(
1222 return _cached_perms_data(
1223 user_id, scope, user_is_admin, user_inherit_default_permissions,
1223 user_id, scope, user_is_admin, user_inherit_default_permissions,
1224 explicit, algo, calculate_super_admin)
1224 explicit, algo, calculate_super_admin)
1225
1225
1226 start = time.time()
1226 start = time.time()
1227 result = compute_perm_tree(
1227 result = compute_perm_tree(
1228 'permissions', user_id, scope, user_is_admin,
1228 'permissions', user_id, scope, user_is_admin,
1229 user_inherit_default_permissions, explicit, algo,
1229 user_inherit_default_permissions, explicit, algo,
1230 calculate_super_admin)
1230 calculate_super_admin)
1231
1231
1232 result_repr = []
1232 result_repr = []
1233 for k in result:
1233 for k in result:
1234 result_repr.append((k, len(result[k])))
1234 result_repr.append((k, len(result[k])))
1235 total = time.time() - start
1235 total = time.time() - start
1236 log.debug('PERMISSION tree for user %s computed in %.3fs: %s',
1236 log.debug('PERMISSION tree for user %s computed in %.4fs: %s',
1237 user, total, result_repr)
1237 user, total, result_repr)
1238
1238
1239 return result
1239 return result
1240
1240
1241 @property
1241 @property
1242 def is_default(self):
1242 def is_default(self):
1243 return self.username == User.DEFAULT_USER
1243 return self.username == User.DEFAULT_USER
1244
1244
1245 @property
1245 @property
1246 def is_admin(self):
1246 def is_admin(self):
1247 return self.admin
1247 return self.admin
1248
1248
1249 @property
1249 @property
1250 def is_user_object(self):
1250 def is_user_object(self):
1251 return self.user_id is not None
1251 return self.user_id is not None
1252
1252
1253 @property
1253 @property
1254 def repositories_admin(self):
1254 def repositories_admin(self):
1255 """
1255 """
1256 Returns list of repositories you're an admin of
1256 Returns list of repositories you're an admin of
1257 """
1257 """
1258 return [
1258 return [
1259 x[0] for x in self.permissions['repositories'].items()
1259 x[0] for x in self.permissions['repositories'].items()
1260 if x[1] == 'repository.admin']
1260 if x[1] == 'repository.admin']
1261
1261
1262 @property
1262 @property
1263 def repository_groups_admin(self):
1263 def repository_groups_admin(self):
1264 """
1264 """
1265 Returns list of repository groups you're an admin of
1265 Returns list of repository groups you're an admin of
1266 """
1266 """
1267 return [
1267 return [
1268 x[0] for x in self.permissions['repositories_groups'].items()
1268 x[0] for x in self.permissions['repositories_groups'].items()
1269 if x[1] == 'group.admin']
1269 if x[1] == 'group.admin']
1270
1270
1271 @property
1271 @property
1272 def user_groups_admin(self):
1272 def user_groups_admin(self):
1273 """
1273 """
1274 Returns list of user groups you're an admin of
1274 Returns list of user groups you're an admin of
1275 """
1275 """
1276 return [
1276 return [
1277 x[0] for x in self.permissions['user_groups'].items()
1277 x[0] for x in self.permissions['user_groups'].items()
1278 if x[1] == 'usergroup.admin']
1278 if x[1] == 'usergroup.admin']
1279
1279
1280 def repo_acl_ids(self, perms=None, name_filter=None, cache=False):
1280 def repo_acl_ids(self, perms=None, name_filter=None, cache=False):
1281 """
1281 """
1282 Returns list of repository ids that user have access to based on given
1282 Returns list of repository ids that user have access to based on given
1283 perms. The cache flag should be only used in cases that are used for
1283 perms. The cache flag should be only used in cases that are used for
1284 display purposes, NOT IN ANY CASE for permission checks.
1284 display purposes, NOT IN ANY CASE for permission checks.
1285 """
1285 """
1286 from rhodecode.model.scm import RepoList
1286 from rhodecode.model.scm import RepoList
1287 if not perms:
1287 if not perms:
1288 perms = [
1288 perms = [
1289 'repository.read', 'repository.write', 'repository.admin']
1289 'repository.read', 'repository.write', 'repository.admin']
1290
1290
1291 def _cached_repo_acl(user_id, perm_def, _name_filter):
1291 def _cached_repo_acl(user_id, perm_def, _name_filter):
1292 qry = Repository.query()
1292 qry = Repository.query()
1293 if _name_filter:
1293 if _name_filter:
1294 ilike_expression = u'%{}%'.format(safe_unicode(_name_filter))
1294 ilike_expression = u'%{}%'.format(safe_unicode(_name_filter))
1295 qry = qry.filter(
1295 qry = qry.filter(
1296 Repository.repo_name.ilike(ilike_expression))
1296 Repository.repo_name.ilike(ilike_expression))
1297
1297
1298 return [x.repo_id for x in
1298 return [x.repo_id for x in
1299 RepoList(qry, perm_set=perm_def)]
1299 RepoList(qry, perm_set=perm_def)]
1300
1300
1301 return _cached_repo_acl(self.user_id, perms, name_filter)
1301 return _cached_repo_acl(self.user_id, perms, name_filter)
1302
1302
1303 def repo_group_acl_ids(self, perms=None, name_filter=None, cache=False):
1303 def repo_group_acl_ids(self, perms=None, name_filter=None, cache=False):
1304 """
1304 """
1305 Returns list of repository group ids that user have access to based on given
1305 Returns list of repository group ids that user have access to based on given
1306 perms. The cache flag should be only used in cases that are used for
1306 perms. The cache flag should be only used in cases that are used for
1307 display purposes, NOT IN ANY CASE for permission checks.
1307 display purposes, NOT IN ANY CASE for permission checks.
1308 """
1308 """
1309 from rhodecode.model.scm import RepoGroupList
1309 from rhodecode.model.scm import RepoGroupList
1310 if not perms:
1310 if not perms:
1311 perms = [
1311 perms = [
1312 'group.read', 'group.write', 'group.admin']
1312 'group.read', 'group.write', 'group.admin']
1313
1313
1314 def _cached_repo_group_acl(user_id, perm_def, _name_filter):
1314 def _cached_repo_group_acl(user_id, perm_def, _name_filter):
1315 qry = RepoGroup.query()
1315 qry = RepoGroup.query()
1316 if _name_filter:
1316 if _name_filter:
1317 ilike_expression = u'%{}%'.format(safe_unicode(_name_filter))
1317 ilike_expression = u'%{}%'.format(safe_unicode(_name_filter))
1318 qry = qry.filter(
1318 qry = qry.filter(
1319 RepoGroup.group_name.ilike(ilike_expression))
1319 RepoGroup.group_name.ilike(ilike_expression))
1320
1320
1321 return [x.group_id for x in
1321 return [x.group_id for x in
1322 RepoGroupList(qry, perm_set=perm_def)]
1322 RepoGroupList(qry, perm_set=perm_def)]
1323
1323
1324 return _cached_repo_group_acl(self.user_id, perms, name_filter)
1324 return _cached_repo_group_acl(self.user_id, perms, name_filter)
1325
1325
1326 def user_group_acl_ids(self, perms=None, name_filter=None, cache=False):
1326 def user_group_acl_ids(self, perms=None, name_filter=None, cache=False):
1327 """
1327 """
1328 Returns list of user group ids that user have access to based on given
1328 Returns list of user group ids that user have access to based on given
1329 perms. The cache flag should be only used in cases that are used for
1329 perms. The cache flag should be only used in cases that are used for
1330 display purposes, NOT IN ANY CASE for permission checks.
1330 display purposes, NOT IN ANY CASE for permission checks.
1331 """
1331 """
1332 from rhodecode.model.scm import UserGroupList
1332 from rhodecode.model.scm import UserGroupList
1333 if not perms:
1333 if not perms:
1334 perms = [
1334 perms = [
1335 'usergroup.read', 'usergroup.write', 'usergroup.admin']
1335 'usergroup.read', 'usergroup.write', 'usergroup.admin']
1336
1336
1337 def _cached_user_group_acl(user_id, perm_def, name_filter):
1337 def _cached_user_group_acl(user_id, perm_def, name_filter):
1338 qry = UserGroup.query()
1338 qry = UserGroup.query()
1339 if name_filter:
1339 if name_filter:
1340 ilike_expression = u'%{}%'.format(safe_unicode(name_filter))
1340 ilike_expression = u'%{}%'.format(safe_unicode(name_filter))
1341 qry = qry.filter(
1341 qry = qry.filter(
1342 UserGroup.users_group_name.ilike(ilike_expression))
1342 UserGroup.users_group_name.ilike(ilike_expression))
1343
1343
1344 return [x.users_group_id for x in
1344 return [x.users_group_id for x in
1345 UserGroupList(qry, perm_set=perm_def)]
1345 UserGroupList(qry, perm_set=perm_def)]
1346
1346
1347 return _cached_user_group_acl(self.user_id, perms, name_filter)
1347 return _cached_user_group_acl(self.user_id, perms, name_filter)
1348
1348
1349 @property
1349 @property
1350 def ip_allowed(self):
1350 def ip_allowed(self):
1351 """
1351 """
1352 Checks if ip_addr used in constructor is allowed from defined list of
1352 Checks if ip_addr used in constructor is allowed from defined list of
1353 allowed ip_addresses for user
1353 allowed ip_addresses for user
1354
1354
1355 :returns: boolean, True if ip is in allowed ip range
1355 :returns: boolean, True if ip is in allowed ip range
1356 """
1356 """
1357 # check IP
1357 # check IP
1358 inherit = self.inherit_default_permissions
1358 inherit = self.inherit_default_permissions
1359 return AuthUser.check_ip_allowed(self.user_id, self.ip_addr,
1359 return AuthUser.check_ip_allowed(self.user_id, self.ip_addr,
1360 inherit_from_default=inherit)
1360 inherit_from_default=inherit)
1361 @property
1361 @property
1362 def personal_repo_group(self):
1362 def personal_repo_group(self):
1363 return RepoGroup.get_user_personal_repo_group(self.user_id)
1363 return RepoGroup.get_user_personal_repo_group(self.user_id)
1364
1364
1365 @LazyProperty
1365 @LazyProperty
1366 def feed_token(self):
1366 def feed_token(self):
1367 return self.get_instance().feed_token
1367 return self.get_instance().feed_token
1368
1368
1369 @classmethod
1369 @classmethod
1370 def check_ip_allowed(cls, user_id, ip_addr, inherit_from_default):
1370 def check_ip_allowed(cls, user_id, ip_addr, inherit_from_default):
1371 allowed_ips = AuthUser.get_allowed_ips(
1371 allowed_ips = AuthUser.get_allowed_ips(
1372 user_id, cache=True, inherit_from_default=inherit_from_default)
1372 user_id, cache=True, inherit_from_default=inherit_from_default)
1373 if check_ip_access(source_ip=ip_addr, allowed_ips=allowed_ips):
1373 if check_ip_access(source_ip=ip_addr, allowed_ips=allowed_ips):
1374 log.debug('IP:%s for user %s is in range of %s',
1374 log.debug('IP:%s for user %s is in range of %s',
1375 ip_addr, user_id, allowed_ips)
1375 ip_addr, user_id, allowed_ips)
1376 return True
1376 return True
1377 else:
1377 else:
1378 log.info('Access for IP:%s forbidden for user %s, '
1378 log.info('Access for IP:%s forbidden for user %s, '
1379 'not in %s', ip_addr, user_id, allowed_ips)
1379 'not in %s', ip_addr, user_id, allowed_ips)
1380 return False
1380 return False
1381
1381
1382 def get_branch_permissions(self, repo_name, perms=None):
1382 def get_branch_permissions(self, repo_name, perms=None):
1383 perms = perms or self.permissions_with_scope({'repo_name': repo_name})
1383 perms = perms or self.permissions_with_scope({'repo_name': repo_name})
1384 branch_perms = perms.get('repository_branches', {})
1384 branch_perms = perms.get('repository_branches', {})
1385 if not branch_perms:
1385 if not branch_perms:
1386 return {}
1386 return {}
1387 repo_branch_perms = branch_perms.get(repo_name)
1387 repo_branch_perms = branch_perms.get(repo_name)
1388 return repo_branch_perms or {}
1388 return repo_branch_perms or {}
1389
1389
1390 def get_rule_and_branch_permission(self, repo_name, branch_name):
1390 def get_rule_and_branch_permission(self, repo_name, branch_name):
1391 """
1391 """
1392 Check if this AuthUser has defined any permissions for branches. If any of
1392 Check if this AuthUser has defined any permissions for branches. If any of
1393 the rules match in order, we return the matching permissions
1393 the rules match in order, we return the matching permissions
1394 """
1394 """
1395
1395
1396 rule = default_perm = ''
1396 rule = default_perm = ''
1397
1397
1398 repo_branch_perms = self.get_branch_permissions(repo_name=repo_name)
1398 repo_branch_perms = self.get_branch_permissions(repo_name=repo_name)
1399 if not repo_branch_perms:
1399 if not repo_branch_perms:
1400 return rule, default_perm
1400 return rule, default_perm
1401
1401
1402 # now calculate the permissions
1402 # now calculate the permissions
1403 for pattern, branch_perm in repo_branch_perms.items():
1403 for pattern, branch_perm in repo_branch_perms.items():
1404 if fnmatch.fnmatch(branch_name, pattern):
1404 if fnmatch.fnmatch(branch_name, pattern):
1405 rule = '`{}`=>{}'.format(pattern, branch_perm)
1405 rule = '`{}`=>{}'.format(pattern, branch_perm)
1406 return rule, branch_perm
1406 return rule, branch_perm
1407
1407
1408 return rule, default_perm
1408 return rule, default_perm
1409
1409
1410 def __repr__(self):
1410 def __repr__(self):
1411 return "<AuthUser('id:%s[%s] ip:%s auth:%s')>"\
1411 return "<AuthUser('id:%s[%s] ip:%s auth:%s')>"\
1412 % (self.user_id, self.username, self.ip_addr, self.is_authenticated)
1412 % (self.user_id, self.username, self.ip_addr, self.is_authenticated)
1413
1413
1414 def set_authenticated(self, authenticated=True):
1414 def set_authenticated(self, authenticated=True):
1415 if self.user_id != self.anonymous_user.user_id:
1415 if self.user_id != self.anonymous_user.user_id:
1416 self.is_authenticated = authenticated
1416 self.is_authenticated = authenticated
1417
1417
1418 def get_cookie_store(self):
1418 def get_cookie_store(self):
1419 return {
1419 return {
1420 'username': self.username,
1420 'username': self.username,
1421 'password': md5(self.password or ''),
1421 'password': md5(self.password or ''),
1422 'user_id': self.user_id,
1422 'user_id': self.user_id,
1423 'is_authenticated': self.is_authenticated
1423 'is_authenticated': self.is_authenticated
1424 }
1424 }
1425
1425
1426 @classmethod
1426 @classmethod
1427 def from_cookie_store(cls, cookie_store):
1427 def from_cookie_store(cls, cookie_store):
1428 """
1428 """
1429 Creates AuthUser from a cookie store
1429 Creates AuthUser from a cookie store
1430
1430
1431 :param cls:
1431 :param cls:
1432 :param cookie_store:
1432 :param cookie_store:
1433 """
1433 """
1434 user_id = cookie_store.get('user_id')
1434 user_id = cookie_store.get('user_id')
1435 username = cookie_store.get('username')
1435 username = cookie_store.get('username')
1436 api_key = cookie_store.get('api_key')
1436 api_key = cookie_store.get('api_key')
1437 return AuthUser(user_id, api_key, username)
1437 return AuthUser(user_id, api_key, username)
1438
1438
1439 @classmethod
1439 @classmethod
1440 def get_allowed_ips(cls, user_id, cache=False, inherit_from_default=False):
1440 def get_allowed_ips(cls, user_id, cache=False, inherit_from_default=False):
1441 _set = set()
1441 _set = set()
1442
1442
1443 if inherit_from_default:
1443 if inherit_from_default:
1444 def_user_id = User.get_default_user(cache=True).user_id
1444 def_user_id = User.get_default_user(cache=True).user_id
1445 default_ips = UserIpMap.query().filter(UserIpMap.user_id == def_user_id)
1445 default_ips = UserIpMap.query().filter(UserIpMap.user_id == def_user_id)
1446 if cache:
1446 if cache:
1447 default_ips = default_ips.options(
1447 default_ips = default_ips.options(
1448 FromCache("sql_cache_short", "get_user_ips_default"))
1448 FromCache("sql_cache_short", "get_user_ips_default"))
1449
1449
1450 # populate from default user
1450 # populate from default user
1451 for ip in default_ips:
1451 for ip in default_ips:
1452 try:
1452 try:
1453 _set.add(ip.ip_addr)
1453 _set.add(ip.ip_addr)
1454 except ObjectDeletedError:
1454 except ObjectDeletedError:
1455 # since we use heavy caching sometimes it happens that
1455 # since we use heavy caching sometimes it happens that
1456 # we get deleted objects here, we just skip them
1456 # we get deleted objects here, we just skip them
1457 pass
1457 pass
1458
1458
1459 # NOTE:(marcink) we don't want to load any rules for empty
1459 # NOTE:(marcink) we don't want to load any rules for empty
1460 # user_id which is the case of access of non logged users when anonymous
1460 # user_id which is the case of access of non logged users when anonymous
1461 # access is disabled
1461 # access is disabled
1462 user_ips = []
1462 user_ips = []
1463 if user_id:
1463 if user_id:
1464 user_ips = UserIpMap.query().filter(UserIpMap.user_id == user_id)
1464 user_ips = UserIpMap.query().filter(UserIpMap.user_id == user_id)
1465 if cache:
1465 if cache:
1466 user_ips = user_ips.options(
1466 user_ips = user_ips.options(
1467 FromCache("sql_cache_short", "get_user_ips_%s" % user_id))
1467 FromCache("sql_cache_short", "get_user_ips_%s" % user_id))
1468
1468
1469 for ip in user_ips:
1469 for ip in user_ips:
1470 try:
1470 try:
1471 _set.add(ip.ip_addr)
1471 _set.add(ip.ip_addr)
1472 except ObjectDeletedError:
1472 except ObjectDeletedError:
1473 # since we use heavy caching sometimes it happens that we get
1473 # since we use heavy caching sometimes it happens that we get
1474 # deleted objects here, we just skip them
1474 # deleted objects here, we just skip them
1475 pass
1475 pass
1476 return _set or {ip for ip in ['0.0.0.0/0', '::/0']}
1476 return _set or {ip for ip in ['0.0.0.0/0', '::/0']}
1477
1477
1478
1478
1479 def set_available_permissions(settings):
1479 def set_available_permissions(settings):
1480 """
1480 """
1481 This function will propagate pyramid settings with all available defined
1481 This function will propagate pyramid settings with all available defined
1482 permission given in db. We don't want to check each time from db for new
1482 permission given in db. We don't want to check each time from db for new
1483 permissions since adding a new permission also requires application restart
1483 permissions since adding a new permission also requires application restart
1484 ie. to decorate new views with the newly created permission
1484 ie. to decorate new views with the newly created permission
1485
1485
1486 :param settings: current pyramid registry.settings
1486 :param settings: current pyramid registry.settings
1487
1487
1488 """
1488 """
1489 log.debug('auth: getting information about all available permissions')
1489 log.debug('auth: getting information about all available permissions')
1490 try:
1490 try:
1491 sa = meta.Session
1491 sa = meta.Session
1492 all_perms = sa.query(Permission).all()
1492 all_perms = sa.query(Permission).all()
1493 settings.setdefault('available_permissions',
1493 settings.setdefault('available_permissions',
1494 [x.permission_name for x in all_perms])
1494 [x.permission_name for x in all_perms])
1495 log.debug('auth: set available permissions')
1495 log.debug('auth: set available permissions')
1496 except Exception:
1496 except Exception:
1497 log.exception('Failed to fetch permissions from the database.')
1497 log.exception('Failed to fetch permissions from the database.')
1498 raise
1498 raise
1499
1499
1500
1500
1501 def get_csrf_token(session, force_new=False, save_if_missing=True):
1501 def get_csrf_token(session, force_new=False, save_if_missing=True):
1502 """
1502 """
1503 Return the current authentication token, creating one if one doesn't
1503 Return the current authentication token, creating one if one doesn't
1504 already exist and the save_if_missing flag is present.
1504 already exist and the save_if_missing flag is present.
1505
1505
1506 :param session: pass in the pyramid session, else we use the global ones
1506 :param session: pass in the pyramid session, else we use the global ones
1507 :param force_new: force to re-generate the token and store it in session
1507 :param force_new: force to re-generate the token and store it in session
1508 :param save_if_missing: save the newly generated token if it's missing in
1508 :param save_if_missing: save the newly generated token if it's missing in
1509 session
1509 session
1510 """
1510 """
1511 # NOTE(marcink): probably should be replaced with below one from pyramid 1.9
1511 # NOTE(marcink): probably should be replaced with below one from pyramid 1.9
1512 # from pyramid.csrf import get_csrf_token
1512 # from pyramid.csrf import get_csrf_token
1513
1513
1514 if (csrf_token_key not in session and save_if_missing) or force_new:
1514 if (csrf_token_key not in session and save_if_missing) or force_new:
1515 token = hashlib.sha1(str(random.getrandbits(128))).hexdigest()
1515 token = hashlib.sha1(str(random.getrandbits(128))).hexdigest()
1516 session[csrf_token_key] = token
1516 session[csrf_token_key] = token
1517 if hasattr(session, 'save'):
1517 if hasattr(session, 'save'):
1518 session.save()
1518 session.save()
1519 return session.get(csrf_token_key)
1519 return session.get(csrf_token_key)
1520
1520
1521
1521
1522 def get_request(perm_class_instance):
1522 def get_request(perm_class_instance):
1523 from pyramid.threadlocal import get_current_request
1523 from pyramid.threadlocal import get_current_request
1524 pyramid_request = get_current_request()
1524 pyramid_request = get_current_request()
1525 return pyramid_request
1525 return pyramid_request
1526
1526
1527
1527
1528 # CHECK DECORATORS
1528 # CHECK DECORATORS
1529 class CSRFRequired(object):
1529 class CSRFRequired(object):
1530 """
1530 """
1531 Decorator for authenticating a form
1531 Decorator for authenticating a form
1532
1532
1533 This decorator uses an authorization token stored in the client's
1533 This decorator uses an authorization token stored in the client's
1534 session for prevention of certain Cross-site request forgery (CSRF)
1534 session for prevention of certain Cross-site request forgery (CSRF)
1535 attacks (See
1535 attacks (See
1536 http://en.wikipedia.org/wiki/Cross-site_request_forgery for more
1536 http://en.wikipedia.org/wiki/Cross-site_request_forgery for more
1537 information).
1537 information).
1538
1538
1539 For use with the ``webhelpers.secure_form`` helper functions.
1539 For use with the ``webhelpers.secure_form`` helper functions.
1540
1540
1541 """
1541 """
1542 def __init__(self, token=csrf_token_key, header='X-CSRF-Token',
1542 def __init__(self, token=csrf_token_key, header='X-CSRF-Token',
1543 except_methods=None):
1543 except_methods=None):
1544 self.token = token
1544 self.token = token
1545 self.header = header
1545 self.header = header
1546 self.except_methods = except_methods or []
1546 self.except_methods = except_methods or []
1547
1547
1548 def __call__(self, func):
1548 def __call__(self, func):
1549 return get_cython_compat_decorator(self.__wrapper, func)
1549 return get_cython_compat_decorator(self.__wrapper, func)
1550
1550
1551 def _get_csrf(self, _request):
1551 def _get_csrf(self, _request):
1552 return _request.POST.get(self.token, _request.headers.get(self.header))
1552 return _request.POST.get(self.token, _request.headers.get(self.header))
1553
1553
1554 def check_csrf(self, _request, cur_token):
1554 def check_csrf(self, _request, cur_token):
1555 supplied_token = self._get_csrf(_request)
1555 supplied_token = self._get_csrf(_request)
1556 return supplied_token and supplied_token == cur_token
1556 return supplied_token and supplied_token == cur_token
1557
1557
1558 def _get_request(self):
1558 def _get_request(self):
1559 return get_request(self)
1559 return get_request(self)
1560
1560
1561 def __wrapper(self, func, *fargs, **fkwargs):
1561 def __wrapper(self, func, *fargs, **fkwargs):
1562 request = self._get_request()
1562 request = self._get_request()
1563
1563
1564 if request.method in self.except_methods:
1564 if request.method in self.except_methods:
1565 return func(*fargs, **fkwargs)
1565 return func(*fargs, **fkwargs)
1566
1566
1567 cur_token = get_csrf_token(request.session, save_if_missing=False)
1567 cur_token = get_csrf_token(request.session, save_if_missing=False)
1568 if self.check_csrf(request, cur_token):
1568 if self.check_csrf(request, cur_token):
1569 if request.POST.get(self.token):
1569 if request.POST.get(self.token):
1570 del request.POST[self.token]
1570 del request.POST[self.token]
1571 return func(*fargs, **fkwargs)
1571 return func(*fargs, **fkwargs)
1572 else:
1572 else:
1573 reason = 'token-missing'
1573 reason = 'token-missing'
1574 supplied_token = self._get_csrf(request)
1574 supplied_token = self._get_csrf(request)
1575 if supplied_token and cur_token != supplied_token:
1575 if supplied_token and cur_token != supplied_token:
1576 reason = 'token-mismatch [%s:%s]' % (
1576 reason = 'token-mismatch [%s:%s]' % (
1577 cur_token or ''[:6], supplied_token or ''[:6])
1577 cur_token or ''[:6], supplied_token or ''[:6])
1578
1578
1579 csrf_message = \
1579 csrf_message = \
1580 ("Cross-site request forgery detected, request denied. See "
1580 ("Cross-site request forgery detected, request denied. See "
1581 "http://en.wikipedia.org/wiki/Cross-site_request_forgery for "
1581 "http://en.wikipedia.org/wiki/Cross-site_request_forgery for "
1582 "more information.")
1582 "more information.")
1583 log.warn('Cross-site request forgery detected, request %r DENIED: %s '
1583 log.warn('Cross-site request forgery detected, request %r DENIED: %s '
1584 'REMOTE_ADDR:%s, HEADERS:%s' % (
1584 'REMOTE_ADDR:%s, HEADERS:%s' % (
1585 request, reason, request.remote_addr, request.headers))
1585 request, reason, request.remote_addr, request.headers))
1586
1586
1587 raise HTTPForbidden(explanation=csrf_message)
1587 raise HTTPForbidden(explanation=csrf_message)
1588
1588
1589
1589
1590 class LoginRequired(object):
1590 class LoginRequired(object):
1591 """
1591 """
1592 Must be logged in to execute this function else
1592 Must be logged in to execute this function else
1593 redirect to login page
1593 redirect to login page
1594
1594
1595 :param api_access: if enabled this checks only for valid auth token
1595 :param api_access: if enabled this checks only for valid auth token
1596 and grants access based on valid token
1596 and grants access based on valid token
1597 """
1597 """
1598 def __init__(self, auth_token_access=None):
1598 def __init__(self, auth_token_access=None):
1599 self.auth_token_access = auth_token_access
1599 self.auth_token_access = auth_token_access
1600
1600
1601 def __call__(self, func):
1601 def __call__(self, func):
1602 return get_cython_compat_decorator(self.__wrapper, func)
1602 return get_cython_compat_decorator(self.__wrapper, func)
1603
1603
1604 def _get_request(self):
1604 def _get_request(self):
1605 return get_request(self)
1605 return get_request(self)
1606
1606
1607 def __wrapper(self, func, *fargs, **fkwargs):
1607 def __wrapper(self, func, *fargs, **fkwargs):
1608 from rhodecode.lib import helpers as h
1608 from rhodecode.lib import helpers as h
1609 cls = fargs[0]
1609 cls = fargs[0]
1610 user = cls._rhodecode_user
1610 user = cls._rhodecode_user
1611 request = self._get_request()
1611 request = self._get_request()
1612 _ = request.translate
1612 _ = request.translate
1613
1613
1614 loc = "%s:%s" % (cls.__class__.__name__, func.__name__)
1614 loc = "%s:%s" % (cls.__class__.__name__, func.__name__)
1615 log.debug('Starting login restriction checks for user: %s', user)
1615 log.debug('Starting login restriction checks for user: %s', user)
1616 # check if our IP is allowed
1616 # check if our IP is allowed
1617 ip_access_valid = True
1617 ip_access_valid = True
1618 if not user.ip_allowed:
1618 if not user.ip_allowed:
1619 h.flash(h.literal(_('IP %s not allowed' % (user.ip_addr,))),
1619 h.flash(h.literal(_('IP %s not allowed' % (user.ip_addr,))),
1620 category='warning')
1620 category='warning')
1621 ip_access_valid = False
1621 ip_access_valid = False
1622
1622
1623 # check if we used an APIKEY and it's a valid one
1623 # check if we used an APIKEY and it's a valid one
1624 # defined white-list of controllers which API access will be enabled
1624 # defined white-list of controllers which API access will be enabled
1625 _auth_token = request.GET.get(
1625 _auth_token = request.GET.get(
1626 'auth_token', '') or request.GET.get('api_key', '')
1626 'auth_token', '') or request.GET.get('api_key', '')
1627 auth_token_access_valid = allowed_auth_token_access(
1627 auth_token_access_valid = allowed_auth_token_access(
1628 loc, auth_token=_auth_token)
1628 loc, auth_token=_auth_token)
1629
1629
1630 # explicit controller is enabled or API is in our whitelist
1630 # explicit controller is enabled or API is in our whitelist
1631 if self.auth_token_access or auth_token_access_valid:
1631 if self.auth_token_access or auth_token_access_valid:
1632 log.debug('Checking AUTH TOKEN access for %s', cls)
1632 log.debug('Checking AUTH TOKEN access for %s', cls)
1633 db_user = user.get_instance()
1633 db_user = user.get_instance()
1634
1634
1635 if db_user:
1635 if db_user:
1636 if self.auth_token_access:
1636 if self.auth_token_access:
1637 roles = self.auth_token_access
1637 roles = self.auth_token_access
1638 else:
1638 else:
1639 roles = [UserApiKeys.ROLE_HTTP]
1639 roles = [UserApiKeys.ROLE_HTTP]
1640 token_match = db_user.authenticate_by_token(
1640 token_match = db_user.authenticate_by_token(
1641 _auth_token, roles=roles)
1641 _auth_token, roles=roles)
1642 else:
1642 else:
1643 log.debug('Unable to fetch db instance for auth user: %s', user)
1643 log.debug('Unable to fetch db instance for auth user: %s', user)
1644 token_match = False
1644 token_match = False
1645
1645
1646 if _auth_token and token_match:
1646 if _auth_token and token_match:
1647 auth_token_access_valid = True
1647 auth_token_access_valid = True
1648 log.debug('AUTH TOKEN ****%s is VALID', _auth_token[-4:])
1648 log.debug('AUTH TOKEN ****%s is VALID', _auth_token[-4:])
1649 else:
1649 else:
1650 auth_token_access_valid = False
1650 auth_token_access_valid = False
1651 if not _auth_token:
1651 if not _auth_token:
1652 log.debug("AUTH TOKEN *NOT* present in request")
1652 log.debug("AUTH TOKEN *NOT* present in request")
1653 else:
1653 else:
1654 log.warning("AUTH TOKEN ****%s *NOT* valid", _auth_token[-4:])
1654 log.warning("AUTH TOKEN ****%s *NOT* valid", _auth_token[-4:])
1655
1655
1656 log.debug('Checking if %s is authenticated @ %s', user.username, loc)
1656 log.debug('Checking if %s is authenticated @ %s', user.username, loc)
1657 reason = 'RHODECODE_AUTH' if user.is_authenticated \
1657 reason = 'RHODECODE_AUTH' if user.is_authenticated \
1658 else 'AUTH_TOKEN_AUTH'
1658 else 'AUTH_TOKEN_AUTH'
1659
1659
1660 if ip_access_valid and (
1660 if ip_access_valid and (
1661 user.is_authenticated or auth_token_access_valid):
1661 user.is_authenticated or auth_token_access_valid):
1662 log.info('user %s authenticating with:%s IS authenticated on func %s',
1662 log.info('user %s authenticating with:%s IS authenticated on func %s',
1663 user, reason, loc)
1663 user, reason, loc)
1664
1664
1665 return func(*fargs, **fkwargs)
1665 return func(*fargs, **fkwargs)
1666 else:
1666 else:
1667 log.warning(
1667 log.warning(
1668 'user %s authenticating with:%s NOT authenticated on '
1668 'user %s authenticating with:%s NOT authenticated on '
1669 'func: %s: IP_ACCESS:%s AUTH_TOKEN_ACCESS:%s',
1669 'func: %s: IP_ACCESS:%s AUTH_TOKEN_ACCESS:%s',
1670 user, reason, loc, ip_access_valid, auth_token_access_valid)
1670 user, reason, loc, ip_access_valid, auth_token_access_valid)
1671 # we preserve the get PARAM
1671 # we preserve the get PARAM
1672 came_from = get_came_from(request)
1672 came_from = get_came_from(request)
1673
1673
1674 log.debug('redirecting to login page with %s', came_from)
1674 log.debug('redirecting to login page with %s', came_from)
1675 raise HTTPFound(
1675 raise HTTPFound(
1676 h.route_path('login', _query={'came_from': came_from}))
1676 h.route_path('login', _query={'came_from': came_from}))
1677
1677
1678
1678
1679 class NotAnonymous(object):
1679 class NotAnonymous(object):
1680 """
1680 """
1681 Must be logged in to execute this function else
1681 Must be logged in to execute this function else
1682 redirect to login page
1682 redirect to login page
1683 """
1683 """
1684
1684
1685 def __call__(self, func):
1685 def __call__(self, func):
1686 return get_cython_compat_decorator(self.__wrapper, func)
1686 return get_cython_compat_decorator(self.__wrapper, func)
1687
1687
1688 def _get_request(self):
1688 def _get_request(self):
1689 return get_request(self)
1689 return get_request(self)
1690
1690
1691 def __wrapper(self, func, *fargs, **fkwargs):
1691 def __wrapper(self, func, *fargs, **fkwargs):
1692 import rhodecode.lib.helpers as h
1692 import rhodecode.lib.helpers as h
1693 cls = fargs[0]
1693 cls = fargs[0]
1694 self.user = cls._rhodecode_user
1694 self.user = cls._rhodecode_user
1695 request = self._get_request()
1695 request = self._get_request()
1696 _ = request.translate
1696 _ = request.translate
1697 log.debug('Checking if user is not anonymous @%s', cls)
1697 log.debug('Checking if user is not anonymous @%s', cls)
1698
1698
1699 anonymous = self.user.username == User.DEFAULT_USER
1699 anonymous = self.user.username == User.DEFAULT_USER
1700
1700
1701 if anonymous:
1701 if anonymous:
1702 came_from = get_came_from(request)
1702 came_from = get_came_from(request)
1703 h.flash(_('You need to be a registered user to '
1703 h.flash(_('You need to be a registered user to '
1704 'perform this action'),
1704 'perform this action'),
1705 category='warning')
1705 category='warning')
1706 raise HTTPFound(
1706 raise HTTPFound(
1707 h.route_path('login', _query={'came_from': came_from}))
1707 h.route_path('login', _query={'came_from': came_from}))
1708 else:
1708 else:
1709 return func(*fargs, **fkwargs)
1709 return func(*fargs, **fkwargs)
1710
1710
1711
1711
1712 class PermsDecorator(object):
1712 class PermsDecorator(object):
1713 """
1713 """
1714 Base class for controller decorators, we extract the current user from
1714 Base class for controller decorators, we extract the current user from
1715 the class itself, which has it stored in base controllers
1715 the class itself, which has it stored in base controllers
1716 """
1716 """
1717
1717
1718 def __init__(self, *required_perms):
1718 def __init__(self, *required_perms):
1719 self.required_perms = set(required_perms)
1719 self.required_perms = set(required_perms)
1720
1720
1721 def __call__(self, func):
1721 def __call__(self, func):
1722 return get_cython_compat_decorator(self.__wrapper, func)
1722 return get_cython_compat_decorator(self.__wrapper, func)
1723
1723
1724 def _get_request(self):
1724 def _get_request(self):
1725 return get_request(self)
1725 return get_request(self)
1726
1726
1727 def __wrapper(self, func, *fargs, **fkwargs):
1727 def __wrapper(self, func, *fargs, **fkwargs):
1728 import rhodecode.lib.helpers as h
1728 import rhodecode.lib.helpers as h
1729 cls = fargs[0]
1729 cls = fargs[0]
1730 _user = cls._rhodecode_user
1730 _user = cls._rhodecode_user
1731 request = self._get_request()
1731 request = self._get_request()
1732 _ = request.translate
1732 _ = request.translate
1733
1733
1734 log.debug('checking %s permissions %s for %s %s',
1734 log.debug('checking %s permissions %s for %s %s',
1735 self.__class__.__name__, self.required_perms, cls, _user)
1735 self.__class__.__name__, self.required_perms, cls, _user)
1736
1736
1737 if self.check_permissions(_user):
1737 if self.check_permissions(_user):
1738 log.debug('Permission granted for %s %s', cls, _user)
1738 log.debug('Permission granted for %s %s', cls, _user)
1739 return func(*fargs, **fkwargs)
1739 return func(*fargs, **fkwargs)
1740
1740
1741 else:
1741 else:
1742 log.debug('Permission denied for %s %s', cls, _user)
1742 log.debug('Permission denied for %s %s', cls, _user)
1743 anonymous = _user.username == User.DEFAULT_USER
1743 anonymous = _user.username == User.DEFAULT_USER
1744
1744
1745 if anonymous:
1745 if anonymous:
1746 came_from = get_came_from(self._get_request())
1746 came_from = get_came_from(self._get_request())
1747 h.flash(_('You need to be signed in to view this page'),
1747 h.flash(_('You need to be signed in to view this page'),
1748 category='warning')
1748 category='warning')
1749 raise HTTPFound(
1749 raise HTTPFound(
1750 h.route_path('login', _query={'came_from': came_from}))
1750 h.route_path('login', _query={'came_from': came_from}))
1751
1751
1752 else:
1752 else:
1753 # redirect with 404 to prevent resource discovery
1753 # redirect with 404 to prevent resource discovery
1754 raise HTTPNotFound()
1754 raise HTTPNotFound()
1755
1755
1756 def check_permissions(self, user):
1756 def check_permissions(self, user):
1757 """Dummy function for overriding"""
1757 """Dummy function for overriding"""
1758 raise NotImplementedError(
1758 raise NotImplementedError(
1759 'You have to write this function in child class')
1759 'You have to write this function in child class')
1760
1760
1761
1761
1762 class HasPermissionAllDecorator(PermsDecorator):
1762 class HasPermissionAllDecorator(PermsDecorator):
1763 """
1763 """
1764 Checks for access permission for all given predicates. All of them
1764 Checks for access permission for all given predicates. All of them
1765 have to be meet in order to fulfill the request
1765 have to be meet in order to fulfill the request
1766 """
1766 """
1767
1767
1768 def check_permissions(self, user):
1768 def check_permissions(self, user):
1769 perms = user.permissions_with_scope({})
1769 perms = user.permissions_with_scope({})
1770 if self.required_perms.issubset(perms['global']):
1770 if self.required_perms.issubset(perms['global']):
1771 return True
1771 return True
1772 return False
1772 return False
1773
1773
1774
1774
1775 class HasPermissionAnyDecorator(PermsDecorator):
1775 class HasPermissionAnyDecorator(PermsDecorator):
1776 """
1776 """
1777 Checks for access permission for any of given predicates. In order to
1777 Checks for access permission for any of given predicates. In order to
1778 fulfill the request any of predicates must be meet
1778 fulfill the request any of predicates must be meet
1779 """
1779 """
1780
1780
1781 def check_permissions(self, user):
1781 def check_permissions(self, user):
1782 perms = user.permissions_with_scope({})
1782 perms = user.permissions_with_scope({})
1783 if self.required_perms.intersection(perms['global']):
1783 if self.required_perms.intersection(perms['global']):
1784 return True
1784 return True
1785 return False
1785 return False
1786
1786
1787
1787
1788 class HasRepoPermissionAllDecorator(PermsDecorator):
1788 class HasRepoPermissionAllDecorator(PermsDecorator):
1789 """
1789 """
1790 Checks for access permission for all given predicates for specific
1790 Checks for access permission for all given predicates for specific
1791 repository. All of them have to be meet in order to fulfill the request
1791 repository. All of them have to be meet in order to fulfill the request
1792 """
1792 """
1793 def _get_repo_name(self):
1793 def _get_repo_name(self):
1794 _request = self._get_request()
1794 _request = self._get_request()
1795 return get_repo_slug(_request)
1795 return get_repo_slug(_request)
1796
1796
1797 def check_permissions(self, user):
1797 def check_permissions(self, user):
1798 perms = user.permissions
1798 perms = user.permissions
1799 repo_name = self._get_repo_name()
1799 repo_name = self._get_repo_name()
1800
1800
1801 try:
1801 try:
1802 user_perms = {perms['repositories'][repo_name]}
1802 user_perms = {perms['repositories'][repo_name]}
1803 except KeyError:
1803 except KeyError:
1804 log.debug('cannot locate repo with name: `%s` in permissions defs',
1804 log.debug('cannot locate repo with name: `%s` in permissions defs',
1805 repo_name)
1805 repo_name)
1806 return False
1806 return False
1807
1807
1808 log.debug('checking `%s` permissions for repo `%s`',
1808 log.debug('checking `%s` permissions for repo `%s`',
1809 user_perms, repo_name)
1809 user_perms, repo_name)
1810 if self.required_perms.issubset(user_perms):
1810 if self.required_perms.issubset(user_perms):
1811 return True
1811 return True
1812 return False
1812 return False
1813
1813
1814
1814
1815 class HasRepoPermissionAnyDecorator(PermsDecorator):
1815 class HasRepoPermissionAnyDecorator(PermsDecorator):
1816 """
1816 """
1817 Checks for access permission for any of given predicates for specific
1817 Checks for access permission for any of given predicates for specific
1818 repository. In order to fulfill the request any of predicates must be meet
1818 repository. In order to fulfill the request any of predicates must be meet
1819 """
1819 """
1820 def _get_repo_name(self):
1820 def _get_repo_name(self):
1821 _request = self._get_request()
1821 _request = self._get_request()
1822 return get_repo_slug(_request)
1822 return get_repo_slug(_request)
1823
1823
1824 def check_permissions(self, user):
1824 def check_permissions(self, user):
1825 perms = user.permissions
1825 perms = user.permissions
1826 repo_name = self._get_repo_name()
1826 repo_name = self._get_repo_name()
1827
1827
1828 try:
1828 try:
1829 user_perms = {perms['repositories'][repo_name]}
1829 user_perms = {perms['repositories'][repo_name]}
1830 except KeyError:
1830 except KeyError:
1831 log.debug(
1831 log.debug(
1832 'cannot locate repo with name: `%s` in permissions defs',
1832 'cannot locate repo with name: `%s` in permissions defs',
1833 repo_name)
1833 repo_name)
1834 return False
1834 return False
1835
1835
1836 log.debug('checking `%s` permissions for repo `%s`',
1836 log.debug('checking `%s` permissions for repo `%s`',
1837 user_perms, repo_name)
1837 user_perms, repo_name)
1838 if self.required_perms.intersection(user_perms):
1838 if self.required_perms.intersection(user_perms):
1839 return True
1839 return True
1840 return False
1840 return False
1841
1841
1842
1842
1843 class HasRepoGroupPermissionAllDecorator(PermsDecorator):
1843 class HasRepoGroupPermissionAllDecorator(PermsDecorator):
1844 """
1844 """
1845 Checks for access permission for all given predicates for specific
1845 Checks for access permission for all given predicates for specific
1846 repository group. All of them have to be meet in order to
1846 repository group. All of them have to be meet in order to
1847 fulfill the request
1847 fulfill the request
1848 """
1848 """
1849 def _get_repo_group_name(self):
1849 def _get_repo_group_name(self):
1850 _request = self._get_request()
1850 _request = self._get_request()
1851 return get_repo_group_slug(_request)
1851 return get_repo_group_slug(_request)
1852
1852
1853 def check_permissions(self, user):
1853 def check_permissions(self, user):
1854 perms = user.permissions
1854 perms = user.permissions
1855 group_name = self._get_repo_group_name()
1855 group_name = self._get_repo_group_name()
1856 try:
1856 try:
1857 user_perms = {perms['repositories_groups'][group_name]}
1857 user_perms = {perms['repositories_groups'][group_name]}
1858 except KeyError:
1858 except KeyError:
1859 log.debug(
1859 log.debug(
1860 'cannot locate repo group with name: `%s` in permissions defs',
1860 'cannot locate repo group with name: `%s` in permissions defs',
1861 group_name)
1861 group_name)
1862 return False
1862 return False
1863
1863
1864 log.debug('checking `%s` permissions for repo group `%s`',
1864 log.debug('checking `%s` permissions for repo group `%s`',
1865 user_perms, group_name)
1865 user_perms, group_name)
1866 if self.required_perms.issubset(user_perms):
1866 if self.required_perms.issubset(user_perms):
1867 return True
1867 return True
1868 return False
1868 return False
1869
1869
1870
1870
1871 class HasRepoGroupPermissionAnyDecorator(PermsDecorator):
1871 class HasRepoGroupPermissionAnyDecorator(PermsDecorator):
1872 """
1872 """
1873 Checks for access permission for any of given predicates for specific
1873 Checks for access permission for any of given predicates for specific
1874 repository group. In order to fulfill the request any
1874 repository group. In order to fulfill the request any
1875 of predicates must be met
1875 of predicates must be met
1876 """
1876 """
1877 def _get_repo_group_name(self):
1877 def _get_repo_group_name(self):
1878 _request = self._get_request()
1878 _request = self._get_request()
1879 return get_repo_group_slug(_request)
1879 return get_repo_group_slug(_request)
1880
1880
1881 def check_permissions(self, user):
1881 def check_permissions(self, user):
1882 perms = user.permissions
1882 perms = user.permissions
1883 group_name = self._get_repo_group_name()
1883 group_name = self._get_repo_group_name()
1884
1884
1885 try:
1885 try:
1886 user_perms = {perms['repositories_groups'][group_name]}
1886 user_perms = {perms['repositories_groups'][group_name]}
1887 except KeyError:
1887 except KeyError:
1888 log.debug(
1888 log.debug(
1889 'cannot locate repo group with name: `%s` in permissions defs',
1889 'cannot locate repo group with name: `%s` in permissions defs',
1890 group_name)
1890 group_name)
1891 return False
1891 return False
1892
1892
1893 log.debug('checking `%s` permissions for repo group `%s`',
1893 log.debug('checking `%s` permissions for repo group `%s`',
1894 user_perms, group_name)
1894 user_perms, group_name)
1895 if self.required_perms.intersection(user_perms):
1895 if self.required_perms.intersection(user_perms):
1896 return True
1896 return True
1897 return False
1897 return False
1898
1898
1899
1899
1900 class HasUserGroupPermissionAllDecorator(PermsDecorator):
1900 class HasUserGroupPermissionAllDecorator(PermsDecorator):
1901 """
1901 """
1902 Checks for access permission for all given predicates for specific
1902 Checks for access permission for all given predicates for specific
1903 user group. All of them have to be meet in order to fulfill the request
1903 user group. All of them have to be meet in order to fulfill the request
1904 """
1904 """
1905 def _get_user_group_name(self):
1905 def _get_user_group_name(self):
1906 _request = self._get_request()
1906 _request = self._get_request()
1907 return get_user_group_slug(_request)
1907 return get_user_group_slug(_request)
1908
1908
1909 def check_permissions(self, user):
1909 def check_permissions(self, user):
1910 perms = user.permissions
1910 perms = user.permissions
1911 group_name = self._get_user_group_name()
1911 group_name = self._get_user_group_name()
1912 try:
1912 try:
1913 user_perms = {perms['user_groups'][group_name]}
1913 user_perms = {perms['user_groups'][group_name]}
1914 except KeyError:
1914 except KeyError:
1915 return False
1915 return False
1916
1916
1917 if self.required_perms.issubset(user_perms):
1917 if self.required_perms.issubset(user_perms):
1918 return True
1918 return True
1919 return False
1919 return False
1920
1920
1921
1921
1922 class HasUserGroupPermissionAnyDecorator(PermsDecorator):
1922 class HasUserGroupPermissionAnyDecorator(PermsDecorator):
1923 """
1923 """
1924 Checks for access permission for any of given predicates for specific
1924 Checks for access permission for any of given predicates for specific
1925 user group. In order to fulfill the request any of predicates must be meet
1925 user group. In order to fulfill the request any of predicates must be meet
1926 """
1926 """
1927 def _get_user_group_name(self):
1927 def _get_user_group_name(self):
1928 _request = self._get_request()
1928 _request = self._get_request()
1929 return get_user_group_slug(_request)
1929 return get_user_group_slug(_request)
1930
1930
1931 def check_permissions(self, user):
1931 def check_permissions(self, user):
1932 perms = user.permissions
1932 perms = user.permissions
1933 group_name = self._get_user_group_name()
1933 group_name = self._get_user_group_name()
1934 try:
1934 try:
1935 user_perms = {perms['user_groups'][group_name]}
1935 user_perms = {perms['user_groups'][group_name]}
1936 except KeyError:
1936 except KeyError:
1937 return False
1937 return False
1938
1938
1939 if self.required_perms.intersection(user_perms):
1939 if self.required_perms.intersection(user_perms):
1940 return True
1940 return True
1941 return False
1941 return False
1942
1942
1943
1943
1944 # CHECK FUNCTIONS
1944 # CHECK FUNCTIONS
1945 class PermsFunction(object):
1945 class PermsFunction(object):
1946 """Base function for other check functions"""
1946 """Base function for other check functions"""
1947
1947
1948 def __init__(self, *perms):
1948 def __init__(self, *perms):
1949 self.required_perms = set(perms)
1949 self.required_perms = set(perms)
1950 self.repo_name = None
1950 self.repo_name = None
1951 self.repo_group_name = None
1951 self.repo_group_name = None
1952 self.user_group_name = None
1952 self.user_group_name = None
1953
1953
1954 def __bool__(self):
1954 def __bool__(self):
1955 frame = inspect.currentframe()
1955 frame = inspect.currentframe()
1956 stack_trace = traceback.format_stack(frame)
1956 stack_trace = traceback.format_stack(frame)
1957 log.error('Checking bool value on a class instance of perm '
1957 log.error('Checking bool value on a class instance of perm '
1958 'function is not allowed: %s', ''.join(stack_trace))
1958 'function is not allowed: %s', ''.join(stack_trace))
1959 # rather than throwing errors, here we always return False so if by
1959 # rather than throwing errors, here we always return False so if by
1960 # accident someone checks truth for just an instance it will always end
1960 # accident someone checks truth for just an instance it will always end
1961 # up in returning False
1961 # up in returning False
1962 return False
1962 return False
1963 __nonzero__ = __bool__
1963 __nonzero__ = __bool__
1964
1964
1965 def __call__(self, check_location='', user=None):
1965 def __call__(self, check_location='', user=None):
1966 if not user:
1966 if not user:
1967 log.debug('Using user attribute from global request')
1967 log.debug('Using user attribute from global request')
1968 request = self._get_request()
1968 request = self._get_request()
1969 user = request.user
1969 user = request.user
1970
1970
1971 # init auth user if not already given
1971 # init auth user if not already given
1972 if not isinstance(user, AuthUser):
1972 if not isinstance(user, AuthUser):
1973 log.debug('Wrapping user %s into AuthUser', user)
1973 log.debug('Wrapping user %s into AuthUser', user)
1974 user = AuthUser(user.user_id)
1974 user = AuthUser(user.user_id)
1975
1975
1976 cls_name = self.__class__.__name__
1976 cls_name = self.__class__.__name__
1977 check_scope = self._get_check_scope(cls_name)
1977 check_scope = self._get_check_scope(cls_name)
1978 check_location = check_location or 'unspecified location'
1978 check_location = check_location or 'unspecified location'
1979
1979
1980 log.debug('checking cls:%s %s usr:%s %s @ %s', cls_name,
1980 log.debug('checking cls:%s %s usr:%s %s @ %s', cls_name,
1981 self.required_perms, user, check_scope, check_location)
1981 self.required_perms, user, check_scope, check_location)
1982 if not user:
1982 if not user:
1983 log.warning('Empty user given for permission check')
1983 log.warning('Empty user given for permission check')
1984 return False
1984 return False
1985
1985
1986 if self.check_permissions(user):
1986 if self.check_permissions(user):
1987 log.debug('Permission to repo:`%s` GRANTED for user:`%s` @ %s',
1987 log.debug('Permission to repo:`%s` GRANTED for user:`%s` @ %s',
1988 check_scope, user, check_location)
1988 check_scope, user, check_location)
1989 return True
1989 return True
1990
1990
1991 else:
1991 else:
1992 log.debug('Permission to repo:`%s` DENIED for user:`%s` @ %s',
1992 log.debug('Permission to repo:`%s` DENIED for user:`%s` @ %s',
1993 check_scope, user, check_location)
1993 check_scope, user, check_location)
1994 return False
1994 return False
1995
1995
1996 def _get_request(self):
1996 def _get_request(self):
1997 return get_request(self)
1997 return get_request(self)
1998
1998
1999 def _get_check_scope(self, cls_name):
1999 def _get_check_scope(self, cls_name):
2000 return {
2000 return {
2001 'HasPermissionAll': 'GLOBAL',
2001 'HasPermissionAll': 'GLOBAL',
2002 'HasPermissionAny': 'GLOBAL',
2002 'HasPermissionAny': 'GLOBAL',
2003 'HasRepoPermissionAll': 'repo:%s' % self.repo_name,
2003 'HasRepoPermissionAll': 'repo:%s' % self.repo_name,
2004 'HasRepoPermissionAny': 'repo:%s' % self.repo_name,
2004 'HasRepoPermissionAny': 'repo:%s' % self.repo_name,
2005 'HasRepoGroupPermissionAll': 'repo_group:%s' % self.repo_group_name,
2005 'HasRepoGroupPermissionAll': 'repo_group:%s' % self.repo_group_name,
2006 'HasRepoGroupPermissionAny': 'repo_group:%s' % self.repo_group_name,
2006 'HasRepoGroupPermissionAny': 'repo_group:%s' % self.repo_group_name,
2007 'HasUserGroupPermissionAll': 'user_group:%s' % self.user_group_name,
2007 'HasUserGroupPermissionAll': 'user_group:%s' % self.user_group_name,
2008 'HasUserGroupPermissionAny': 'user_group:%s' % self.user_group_name,
2008 'HasUserGroupPermissionAny': 'user_group:%s' % self.user_group_name,
2009 }.get(cls_name, '?:%s' % cls_name)
2009 }.get(cls_name, '?:%s' % cls_name)
2010
2010
2011 def check_permissions(self, user):
2011 def check_permissions(self, user):
2012 """Dummy function for overriding"""
2012 """Dummy function for overriding"""
2013 raise Exception('You have to write this function in child class')
2013 raise Exception('You have to write this function in child class')
2014
2014
2015
2015
2016 class HasPermissionAll(PermsFunction):
2016 class HasPermissionAll(PermsFunction):
2017 def check_permissions(self, user):
2017 def check_permissions(self, user):
2018 perms = user.permissions_with_scope({})
2018 perms = user.permissions_with_scope({})
2019 if self.required_perms.issubset(perms.get('global')):
2019 if self.required_perms.issubset(perms.get('global')):
2020 return True
2020 return True
2021 return False
2021 return False
2022
2022
2023
2023
2024 class HasPermissionAny(PermsFunction):
2024 class HasPermissionAny(PermsFunction):
2025 def check_permissions(self, user):
2025 def check_permissions(self, user):
2026 perms = user.permissions_with_scope({})
2026 perms = user.permissions_with_scope({})
2027 if self.required_perms.intersection(perms.get('global')):
2027 if self.required_perms.intersection(perms.get('global')):
2028 return True
2028 return True
2029 return False
2029 return False
2030
2030
2031
2031
2032 class HasRepoPermissionAll(PermsFunction):
2032 class HasRepoPermissionAll(PermsFunction):
2033 def __call__(self, repo_name=None, check_location='', user=None):
2033 def __call__(self, repo_name=None, check_location='', user=None):
2034 self.repo_name = repo_name
2034 self.repo_name = repo_name
2035 return super(HasRepoPermissionAll, self).__call__(check_location, user)
2035 return super(HasRepoPermissionAll, self).__call__(check_location, user)
2036
2036
2037 def _get_repo_name(self):
2037 def _get_repo_name(self):
2038 if not self.repo_name:
2038 if not self.repo_name:
2039 _request = self._get_request()
2039 _request = self._get_request()
2040 self.repo_name = get_repo_slug(_request)
2040 self.repo_name = get_repo_slug(_request)
2041 return self.repo_name
2041 return self.repo_name
2042
2042
2043 def check_permissions(self, user):
2043 def check_permissions(self, user):
2044 self.repo_name = self._get_repo_name()
2044 self.repo_name = self._get_repo_name()
2045 perms = user.permissions
2045 perms = user.permissions
2046 try:
2046 try:
2047 user_perms = {perms['repositories'][self.repo_name]}
2047 user_perms = {perms['repositories'][self.repo_name]}
2048 except KeyError:
2048 except KeyError:
2049 return False
2049 return False
2050 if self.required_perms.issubset(user_perms):
2050 if self.required_perms.issubset(user_perms):
2051 return True
2051 return True
2052 return False
2052 return False
2053
2053
2054
2054
2055 class HasRepoPermissionAny(PermsFunction):
2055 class HasRepoPermissionAny(PermsFunction):
2056 def __call__(self, repo_name=None, check_location='', user=None):
2056 def __call__(self, repo_name=None, check_location='', user=None):
2057 self.repo_name = repo_name
2057 self.repo_name = repo_name
2058 return super(HasRepoPermissionAny, self).__call__(check_location, user)
2058 return super(HasRepoPermissionAny, self).__call__(check_location, user)
2059
2059
2060 def _get_repo_name(self):
2060 def _get_repo_name(self):
2061 if not self.repo_name:
2061 if not self.repo_name:
2062 _request = self._get_request()
2062 _request = self._get_request()
2063 self.repo_name = get_repo_slug(_request)
2063 self.repo_name = get_repo_slug(_request)
2064 return self.repo_name
2064 return self.repo_name
2065
2065
2066 def check_permissions(self, user):
2066 def check_permissions(self, user):
2067 self.repo_name = self._get_repo_name()
2067 self.repo_name = self._get_repo_name()
2068 perms = user.permissions
2068 perms = user.permissions
2069 try:
2069 try:
2070 user_perms = {perms['repositories'][self.repo_name]}
2070 user_perms = {perms['repositories'][self.repo_name]}
2071 except KeyError:
2071 except KeyError:
2072 return False
2072 return False
2073 if self.required_perms.intersection(user_perms):
2073 if self.required_perms.intersection(user_perms):
2074 return True
2074 return True
2075 return False
2075 return False
2076
2076
2077
2077
2078 class HasRepoGroupPermissionAny(PermsFunction):
2078 class HasRepoGroupPermissionAny(PermsFunction):
2079 def __call__(self, group_name=None, check_location='', user=None):
2079 def __call__(self, group_name=None, check_location='', user=None):
2080 self.repo_group_name = group_name
2080 self.repo_group_name = group_name
2081 return super(HasRepoGroupPermissionAny, self).__call__(check_location, user)
2081 return super(HasRepoGroupPermissionAny, self).__call__(check_location, user)
2082
2082
2083 def check_permissions(self, user):
2083 def check_permissions(self, user):
2084 perms = user.permissions
2084 perms = user.permissions
2085 try:
2085 try:
2086 user_perms = {perms['repositories_groups'][self.repo_group_name]}
2086 user_perms = {perms['repositories_groups'][self.repo_group_name]}
2087 except KeyError:
2087 except KeyError:
2088 return False
2088 return False
2089 if self.required_perms.intersection(user_perms):
2089 if self.required_perms.intersection(user_perms):
2090 return True
2090 return True
2091 return False
2091 return False
2092
2092
2093
2093
2094 class HasRepoGroupPermissionAll(PermsFunction):
2094 class HasRepoGroupPermissionAll(PermsFunction):
2095 def __call__(self, group_name=None, check_location='', user=None):
2095 def __call__(self, group_name=None, check_location='', user=None):
2096 self.repo_group_name = group_name
2096 self.repo_group_name = group_name
2097 return super(HasRepoGroupPermissionAll, self).__call__(check_location, user)
2097 return super(HasRepoGroupPermissionAll, self).__call__(check_location, user)
2098
2098
2099 def check_permissions(self, user):
2099 def check_permissions(self, user):
2100 perms = user.permissions
2100 perms = user.permissions
2101 try:
2101 try:
2102 user_perms = {perms['repositories_groups'][self.repo_group_name]}
2102 user_perms = {perms['repositories_groups'][self.repo_group_name]}
2103 except KeyError:
2103 except KeyError:
2104 return False
2104 return False
2105 if self.required_perms.issubset(user_perms):
2105 if self.required_perms.issubset(user_perms):
2106 return True
2106 return True
2107 return False
2107 return False
2108
2108
2109
2109
2110 class HasUserGroupPermissionAny(PermsFunction):
2110 class HasUserGroupPermissionAny(PermsFunction):
2111 def __call__(self, user_group_name=None, check_location='', user=None):
2111 def __call__(self, user_group_name=None, check_location='', user=None):
2112 self.user_group_name = user_group_name
2112 self.user_group_name = user_group_name
2113 return super(HasUserGroupPermissionAny, self).__call__(check_location, user)
2113 return super(HasUserGroupPermissionAny, self).__call__(check_location, user)
2114
2114
2115 def check_permissions(self, user):
2115 def check_permissions(self, user):
2116 perms = user.permissions
2116 perms = user.permissions
2117 try:
2117 try:
2118 user_perms = {perms['user_groups'][self.user_group_name]}
2118 user_perms = {perms['user_groups'][self.user_group_name]}
2119 except KeyError:
2119 except KeyError:
2120 return False
2120 return False
2121 if self.required_perms.intersection(user_perms):
2121 if self.required_perms.intersection(user_perms):
2122 return True
2122 return True
2123 return False
2123 return False
2124
2124
2125
2125
2126 class HasUserGroupPermissionAll(PermsFunction):
2126 class HasUserGroupPermissionAll(PermsFunction):
2127 def __call__(self, user_group_name=None, check_location='', user=None):
2127 def __call__(self, user_group_name=None, check_location='', user=None):
2128 self.user_group_name = user_group_name
2128 self.user_group_name = user_group_name
2129 return super(HasUserGroupPermissionAll, self).__call__(check_location, user)
2129 return super(HasUserGroupPermissionAll, self).__call__(check_location, user)
2130
2130
2131 def check_permissions(self, user):
2131 def check_permissions(self, user):
2132 perms = user.permissions
2132 perms = user.permissions
2133 try:
2133 try:
2134 user_perms = {perms['user_groups'][self.user_group_name]}
2134 user_perms = {perms['user_groups'][self.user_group_name]}
2135 except KeyError:
2135 except KeyError:
2136 return False
2136 return False
2137 if self.required_perms.issubset(user_perms):
2137 if self.required_perms.issubset(user_perms):
2138 return True
2138 return True
2139 return False
2139 return False
2140
2140
2141
2141
2142 # SPECIAL VERSION TO HANDLE MIDDLEWARE AUTH
2142 # SPECIAL VERSION TO HANDLE MIDDLEWARE AUTH
2143 class HasPermissionAnyMiddleware(object):
2143 class HasPermissionAnyMiddleware(object):
2144 def __init__(self, *perms):
2144 def __init__(self, *perms):
2145 self.required_perms = set(perms)
2145 self.required_perms = set(perms)
2146
2146
2147 def __call__(self, auth_user, repo_name):
2147 def __call__(self, auth_user, repo_name):
2148 # repo_name MUST be unicode, since we handle keys in permission
2148 # repo_name MUST be unicode, since we handle keys in permission
2149 # dict by unicode
2149 # dict by unicode
2150 repo_name = safe_unicode(repo_name)
2150 repo_name = safe_unicode(repo_name)
2151 log.debug(
2151 log.debug(
2152 'Checking VCS protocol permissions %s for user:%s repo:`%s`',
2152 'Checking VCS protocol permissions %s for user:%s repo:`%s`',
2153 self.required_perms, auth_user, repo_name)
2153 self.required_perms, auth_user, repo_name)
2154
2154
2155 if self.check_permissions(auth_user, repo_name):
2155 if self.check_permissions(auth_user, repo_name):
2156 log.debug('Permission to repo:`%s` GRANTED for user:%s @ %s',
2156 log.debug('Permission to repo:`%s` GRANTED for user:%s @ %s',
2157 repo_name, auth_user, 'PermissionMiddleware')
2157 repo_name, auth_user, 'PermissionMiddleware')
2158 return True
2158 return True
2159
2159
2160 else:
2160 else:
2161 log.debug('Permission to repo:`%s` DENIED for user:%s @ %s',
2161 log.debug('Permission to repo:`%s` DENIED for user:%s @ %s',
2162 repo_name, auth_user, 'PermissionMiddleware')
2162 repo_name, auth_user, 'PermissionMiddleware')
2163 return False
2163 return False
2164
2164
2165 def check_permissions(self, user, repo_name):
2165 def check_permissions(self, user, repo_name):
2166 perms = user.permissions_with_scope({'repo_name': repo_name})
2166 perms = user.permissions_with_scope({'repo_name': repo_name})
2167
2167
2168 try:
2168 try:
2169 user_perms = {perms['repositories'][repo_name]}
2169 user_perms = {perms['repositories'][repo_name]}
2170 except Exception:
2170 except Exception:
2171 log.exception('Error while accessing user permissions')
2171 log.exception('Error while accessing user permissions')
2172 return False
2172 return False
2173
2173
2174 if self.required_perms.intersection(user_perms):
2174 if self.required_perms.intersection(user_perms):
2175 return True
2175 return True
2176 return False
2176 return False
2177
2177
2178
2178
2179 # SPECIAL VERSION TO HANDLE API AUTH
2179 # SPECIAL VERSION TO HANDLE API AUTH
2180 class _BaseApiPerm(object):
2180 class _BaseApiPerm(object):
2181 def __init__(self, *perms):
2181 def __init__(self, *perms):
2182 self.required_perms = set(perms)
2182 self.required_perms = set(perms)
2183
2183
2184 def __call__(self, check_location=None, user=None, repo_name=None,
2184 def __call__(self, check_location=None, user=None, repo_name=None,
2185 group_name=None, user_group_name=None):
2185 group_name=None, user_group_name=None):
2186 cls_name = self.__class__.__name__
2186 cls_name = self.__class__.__name__
2187 check_scope = 'global:%s' % (self.required_perms,)
2187 check_scope = 'global:%s' % (self.required_perms,)
2188 if repo_name:
2188 if repo_name:
2189 check_scope += ', repo_name:%s' % (repo_name,)
2189 check_scope += ', repo_name:%s' % (repo_name,)
2190
2190
2191 if group_name:
2191 if group_name:
2192 check_scope += ', repo_group_name:%s' % (group_name,)
2192 check_scope += ', repo_group_name:%s' % (group_name,)
2193
2193
2194 if user_group_name:
2194 if user_group_name:
2195 check_scope += ', user_group_name:%s' % (user_group_name,)
2195 check_scope += ', user_group_name:%s' % (user_group_name,)
2196
2196
2197 log.debug('checking cls:%s %s %s @ %s',
2197 log.debug('checking cls:%s %s %s @ %s',
2198 cls_name, self.required_perms, check_scope, check_location)
2198 cls_name, self.required_perms, check_scope, check_location)
2199 if not user:
2199 if not user:
2200 log.debug('Empty User passed into arguments')
2200 log.debug('Empty User passed into arguments')
2201 return False
2201 return False
2202
2202
2203 # process user
2203 # process user
2204 if not isinstance(user, AuthUser):
2204 if not isinstance(user, AuthUser):
2205 user = AuthUser(user.user_id)
2205 user = AuthUser(user.user_id)
2206 if not check_location:
2206 if not check_location:
2207 check_location = 'unspecified'
2207 check_location = 'unspecified'
2208 if self.check_permissions(user.permissions, repo_name, group_name,
2208 if self.check_permissions(user.permissions, repo_name, group_name,
2209 user_group_name):
2209 user_group_name):
2210 log.debug('Permission to repo:`%s` GRANTED for user:`%s` @ %s',
2210 log.debug('Permission to repo:`%s` GRANTED for user:`%s` @ %s',
2211 check_scope, user, check_location)
2211 check_scope, user, check_location)
2212 return True
2212 return True
2213
2213
2214 else:
2214 else:
2215 log.debug('Permission to repo:`%s` DENIED for user:`%s` @ %s',
2215 log.debug('Permission to repo:`%s` DENIED for user:`%s` @ %s',
2216 check_scope, user, check_location)
2216 check_scope, user, check_location)
2217 return False
2217 return False
2218
2218
2219 def check_permissions(self, perm_defs, repo_name=None, group_name=None,
2219 def check_permissions(self, perm_defs, repo_name=None, group_name=None,
2220 user_group_name=None):
2220 user_group_name=None):
2221 """
2221 """
2222 implement in child class should return True if permissions are ok,
2222 implement in child class should return True if permissions are ok,
2223 False otherwise
2223 False otherwise
2224
2224
2225 :param perm_defs: dict with permission definitions
2225 :param perm_defs: dict with permission definitions
2226 :param repo_name: repo name
2226 :param repo_name: repo name
2227 """
2227 """
2228 raise NotImplementedError()
2228 raise NotImplementedError()
2229
2229
2230
2230
2231 class HasPermissionAllApi(_BaseApiPerm):
2231 class HasPermissionAllApi(_BaseApiPerm):
2232 def check_permissions(self, perm_defs, repo_name=None, group_name=None,
2232 def check_permissions(self, perm_defs, repo_name=None, group_name=None,
2233 user_group_name=None):
2233 user_group_name=None):
2234 if self.required_perms.issubset(perm_defs.get('global')):
2234 if self.required_perms.issubset(perm_defs.get('global')):
2235 return True
2235 return True
2236 return False
2236 return False
2237
2237
2238
2238
2239 class HasPermissionAnyApi(_BaseApiPerm):
2239 class HasPermissionAnyApi(_BaseApiPerm):
2240 def check_permissions(self, perm_defs, repo_name=None, group_name=None,
2240 def check_permissions(self, perm_defs, repo_name=None, group_name=None,
2241 user_group_name=None):
2241 user_group_name=None):
2242 if self.required_perms.intersection(perm_defs.get('global')):
2242 if self.required_perms.intersection(perm_defs.get('global')):
2243 return True
2243 return True
2244 return False
2244 return False
2245
2245
2246
2246
2247 class HasRepoPermissionAllApi(_BaseApiPerm):
2247 class HasRepoPermissionAllApi(_BaseApiPerm):
2248 def check_permissions(self, perm_defs, repo_name=None, group_name=None,
2248 def check_permissions(self, perm_defs, repo_name=None, group_name=None,
2249 user_group_name=None):
2249 user_group_name=None):
2250 try:
2250 try:
2251 _user_perms = {perm_defs['repositories'][repo_name]}
2251 _user_perms = {perm_defs['repositories'][repo_name]}
2252 except KeyError:
2252 except KeyError:
2253 log.warning(traceback.format_exc())
2253 log.warning(traceback.format_exc())
2254 return False
2254 return False
2255 if self.required_perms.issubset(_user_perms):
2255 if self.required_perms.issubset(_user_perms):
2256 return True
2256 return True
2257 return False
2257 return False
2258
2258
2259
2259
2260 class HasRepoPermissionAnyApi(_BaseApiPerm):
2260 class HasRepoPermissionAnyApi(_BaseApiPerm):
2261 def check_permissions(self, perm_defs, repo_name=None, group_name=None,
2261 def check_permissions(self, perm_defs, repo_name=None, group_name=None,
2262 user_group_name=None):
2262 user_group_name=None):
2263 try:
2263 try:
2264 _user_perms = {perm_defs['repositories'][repo_name]}
2264 _user_perms = {perm_defs['repositories'][repo_name]}
2265 except KeyError:
2265 except KeyError:
2266 log.warning(traceback.format_exc())
2266 log.warning(traceback.format_exc())
2267 return False
2267 return False
2268 if self.required_perms.intersection(_user_perms):
2268 if self.required_perms.intersection(_user_perms):
2269 return True
2269 return True
2270 return False
2270 return False
2271
2271
2272
2272
2273 class HasRepoGroupPermissionAnyApi(_BaseApiPerm):
2273 class HasRepoGroupPermissionAnyApi(_BaseApiPerm):
2274 def check_permissions(self, perm_defs, repo_name=None, group_name=None,
2274 def check_permissions(self, perm_defs, repo_name=None, group_name=None,
2275 user_group_name=None):
2275 user_group_name=None):
2276 try:
2276 try:
2277 _user_perms = {perm_defs['repositories_groups'][group_name]}
2277 _user_perms = {perm_defs['repositories_groups'][group_name]}
2278 except KeyError:
2278 except KeyError:
2279 log.warning(traceback.format_exc())
2279 log.warning(traceback.format_exc())
2280 return False
2280 return False
2281 if self.required_perms.intersection(_user_perms):
2281 if self.required_perms.intersection(_user_perms):
2282 return True
2282 return True
2283 return False
2283 return False
2284
2284
2285
2285
2286 class HasRepoGroupPermissionAllApi(_BaseApiPerm):
2286 class HasRepoGroupPermissionAllApi(_BaseApiPerm):
2287 def check_permissions(self, perm_defs, repo_name=None, group_name=None,
2287 def check_permissions(self, perm_defs, repo_name=None, group_name=None,
2288 user_group_name=None):
2288 user_group_name=None):
2289 try:
2289 try:
2290 _user_perms = {perm_defs['repositories_groups'][group_name]}
2290 _user_perms = {perm_defs['repositories_groups'][group_name]}
2291 except KeyError:
2291 except KeyError:
2292 log.warning(traceback.format_exc())
2292 log.warning(traceback.format_exc())
2293 return False
2293 return False
2294 if self.required_perms.issubset(_user_perms):
2294 if self.required_perms.issubset(_user_perms):
2295 return True
2295 return True
2296 return False
2296 return False
2297
2297
2298
2298
2299 class HasUserGroupPermissionAnyApi(_BaseApiPerm):
2299 class HasUserGroupPermissionAnyApi(_BaseApiPerm):
2300 def check_permissions(self, perm_defs, repo_name=None, group_name=None,
2300 def check_permissions(self, perm_defs, repo_name=None, group_name=None,
2301 user_group_name=None):
2301 user_group_name=None):
2302 try:
2302 try:
2303 _user_perms = {perm_defs['user_groups'][user_group_name]}
2303 _user_perms = {perm_defs['user_groups'][user_group_name]}
2304 except KeyError:
2304 except KeyError:
2305 log.warning(traceback.format_exc())
2305 log.warning(traceback.format_exc())
2306 return False
2306 return False
2307 if self.required_perms.intersection(_user_perms):
2307 if self.required_perms.intersection(_user_perms):
2308 return True
2308 return True
2309 return False
2309 return False
2310
2310
2311
2311
2312 def check_ip_access(source_ip, allowed_ips=None):
2312 def check_ip_access(source_ip, allowed_ips=None):
2313 """
2313 """
2314 Checks if source_ip is a subnet of any of allowed_ips.
2314 Checks if source_ip is a subnet of any of allowed_ips.
2315
2315
2316 :param source_ip:
2316 :param source_ip:
2317 :param allowed_ips: list of allowed ips together with mask
2317 :param allowed_ips: list of allowed ips together with mask
2318 """
2318 """
2319 log.debug('checking if ip:%s is subnet of %s', source_ip, allowed_ips)
2319 log.debug('checking if ip:%s is subnet of %s', source_ip, allowed_ips)
2320 source_ip_address = ipaddress.ip_address(safe_unicode(source_ip))
2320 source_ip_address = ipaddress.ip_address(safe_unicode(source_ip))
2321 if isinstance(allowed_ips, (tuple, list, set)):
2321 if isinstance(allowed_ips, (tuple, list, set)):
2322 for ip in allowed_ips:
2322 for ip in allowed_ips:
2323 ip = safe_unicode(ip)
2323 ip = safe_unicode(ip)
2324 try:
2324 try:
2325 network_address = ipaddress.ip_network(ip, strict=False)
2325 network_address = ipaddress.ip_network(ip, strict=False)
2326 if source_ip_address in network_address:
2326 if source_ip_address in network_address:
2327 log.debug('IP %s is network %s', source_ip_address, network_address)
2327 log.debug('IP %s is network %s', source_ip_address, network_address)
2328 return True
2328 return True
2329 # for any case we cannot determine the IP, don't crash just
2329 # for any case we cannot determine the IP, don't crash just
2330 # skip it and log as error, we want to say forbidden still when
2330 # skip it and log as error, we want to say forbidden still when
2331 # sending bad IP
2331 # sending bad IP
2332 except Exception:
2332 except Exception:
2333 log.error(traceback.format_exc())
2333 log.error(traceback.format_exc())
2334 continue
2334 continue
2335 return False
2335 return False
2336
2336
2337
2337
2338 def get_cython_compat_decorator(wrapper, func):
2338 def get_cython_compat_decorator(wrapper, func):
2339 """
2339 """
2340 Creates a cython compatible decorator. The previously used
2340 Creates a cython compatible decorator. The previously used
2341 decorator.decorator() function seems to be incompatible with cython.
2341 decorator.decorator() function seems to be incompatible with cython.
2342
2342
2343 :param wrapper: __wrapper method of the decorator class
2343 :param wrapper: __wrapper method of the decorator class
2344 :param func: decorated function
2344 :param func: decorated function
2345 """
2345 """
2346 @wraps(func)
2346 @wraps(func)
2347 def local_wrapper(*args, **kwds):
2347 def local_wrapper(*args, **kwds):
2348 return wrapper(func, *args, **kwds)
2348 return wrapper(func, *args, **kwds)
2349 local_wrapper.__wrapped__ = func
2349 local_wrapper.__wrapped__ = func
2350 return local_wrapper
2350 return local_wrapper
2351
2351
2352
2352
@@ -1,4758 +1,4758 b''
1 # -*- coding: utf-8 -*-
1 # -*- coding: utf-8 -*-
2
2
3 # Copyright (C) 2010-2019 RhodeCode GmbH
3 # Copyright (C) 2010-2019 RhodeCode GmbH
4 #
4 #
5 # This program is free software: you can redistribute it and/or modify
5 # This program is free software: you can redistribute it and/or modify
6 # it under the terms of the GNU Affero General Public License, version 3
6 # it under the terms of the GNU Affero General Public License, version 3
7 # (only), as published by the Free Software Foundation.
7 # (only), as published by the Free Software Foundation.
8 #
8 #
9 # This program is distributed in the hope that it will be useful,
9 # This program is distributed in the hope that it will be useful,
10 # but WITHOUT ANY WARRANTY; without even the implied warranty of
10 # but WITHOUT ANY WARRANTY; without even the implied warranty of
11 # MERCHANTABILITY or FITNESS FOR A PARTICULAR PURPOSE. See the
11 # MERCHANTABILITY or FITNESS FOR A PARTICULAR PURPOSE. See the
12 # GNU General Public License for more details.
12 # GNU General Public License for more details.
13 #
13 #
14 # You should have received a copy of the GNU Affero General Public License
14 # You should have received a copy of the GNU Affero General Public License
15 # along with this program. If not, see <http://www.gnu.org/licenses/>.
15 # along with this program. If not, see <http://www.gnu.org/licenses/>.
16 #
16 #
17 # This program is dual-licensed. If you wish to learn more about the
17 # This program is dual-licensed. If you wish to learn more about the
18 # RhodeCode Enterprise Edition, including its added features, Support services,
18 # RhodeCode Enterprise Edition, including its added features, Support services,
19 # and proprietary license terms, please see https://rhodecode.com/licenses/
19 # and proprietary license terms, please see https://rhodecode.com/licenses/
20
20
21 """
21 """
22 Database Models for RhodeCode Enterprise
22 Database Models for RhodeCode Enterprise
23 """
23 """
24
24
25 import re
25 import re
26 import os
26 import os
27 import time
27 import time
28 import hashlib
28 import hashlib
29 import logging
29 import logging
30 import datetime
30 import datetime
31 import warnings
31 import warnings
32 import ipaddress
32 import ipaddress
33 import functools
33 import functools
34 import traceback
34 import traceback
35 import collections
35 import collections
36
36
37 from sqlalchemy import (
37 from sqlalchemy import (
38 or_, and_, not_, func, TypeDecorator, event,
38 or_, and_, not_, func, TypeDecorator, event,
39 Index, Sequence, UniqueConstraint, ForeignKey, CheckConstraint, Column,
39 Index, Sequence, UniqueConstraint, ForeignKey, CheckConstraint, Column,
40 Boolean, String, Unicode, UnicodeText, DateTime, Integer, LargeBinary,
40 Boolean, String, Unicode, UnicodeText, DateTime, Integer, LargeBinary,
41 Text, Float, PickleType)
41 Text, Float, PickleType)
42 from sqlalchemy.sql.expression import true, false
42 from sqlalchemy.sql.expression import true, false
43 from sqlalchemy.sql.functions import coalesce, count # pragma: no cover
43 from sqlalchemy.sql.functions import coalesce, count # pragma: no cover
44 from sqlalchemy.orm import (
44 from sqlalchemy.orm import (
45 relationship, joinedload, class_mapper, validates, aliased)
45 relationship, joinedload, class_mapper, validates, aliased)
46 from sqlalchemy.ext.declarative import declared_attr
46 from sqlalchemy.ext.declarative import declared_attr
47 from sqlalchemy.ext.hybrid import hybrid_property
47 from sqlalchemy.ext.hybrid import hybrid_property
48 from sqlalchemy.exc import IntegrityError # pragma: no cover
48 from sqlalchemy.exc import IntegrityError # pragma: no cover
49 from sqlalchemy.dialects.mysql import LONGTEXT
49 from sqlalchemy.dialects.mysql import LONGTEXT
50 from zope.cachedescriptors.property import Lazy as LazyProperty
50 from zope.cachedescriptors.property import Lazy as LazyProperty
51 from pyramid import compat
51 from pyramid import compat
52 from pyramid.threadlocal import get_current_request
52 from pyramid.threadlocal import get_current_request
53
53
54 from rhodecode.translation import _
54 from rhodecode.translation import _
55 from rhodecode.lib.vcs import get_vcs_instance
55 from rhodecode.lib.vcs import get_vcs_instance
56 from rhodecode.lib.vcs.backends.base import EmptyCommit, Reference
56 from rhodecode.lib.vcs.backends.base import EmptyCommit, Reference
57 from rhodecode.lib.utils2 import (
57 from rhodecode.lib.utils2 import (
58 str2bool, safe_str, get_commit_safe, safe_unicode, sha1_safe,
58 str2bool, safe_str, get_commit_safe, safe_unicode, sha1_safe,
59 time_to_datetime, aslist, Optional, safe_int, get_clone_url, AttributeDict,
59 time_to_datetime, aslist, Optional, safe_int, get_clone_url, AttributeDict,
60 glob2re, StrictAttributeDict, cleaned_uri)
60 glob2re, StrictAttributeDict, cleaned_uri)
61 from rhodecode.lib.jsonalchemy import MutationObj, MutationList, JsonType, \
61 from rhodecode.lib.jsonalchemy import MutationObj, MutationList, JsonType, \
62 JsonRaw
62 JsonRaw
63 from rhodecode.lib.ext_json import json
63 from rhodecode.lib.ext_json import json
64 from rhodecode.lib.caching_query import FromCache
64 from rhodecode.lib.caching_query import FromCache
65 from rhodecode.lib.encrypt import AESCipher
65 from rhodecode.lib.encrypt import AESCipher
66
66
67 from rhodecode.model.meta import Base, Session
67 from rhodecode.model.meta import Base, Session
68
68
69 URL_SEP = '/'
69 URL_SEP = '/'
70 log = logging.getLogger(__name__)
70 log = logging.getLogger(__name__)
71
71
72 # =============================================================================
72 # =============================================================================
73 # BASE CLASSES
73 # BASE CLASSES
74 # =============================================================================
74 # =============================================================================
75
75
76 # this is propagated from .ini file rhodecode.encrypted_values.secret or
76 # this is propagated from .ini file rhodecode.encrypted_values.secret or
77 # beaker.session.secret if first is not set.
77 # beaker.session.secret if first is not set.
78 # and initialized at environment.py
78 # and initialized at environment.py
79 ENCRYPTION_KEY = None
79 ENCRYPTION_KEY = None
80
80
81 # used to sort permissions by types, '#' used here is not allowed to be in
81 # used to sort permissions by types, '#' used here is not allowed to be in
82 # usernames, and it's very early in sorted string.printable table.
82 # usernames, and it's very early in sorted string.printable table.
83 PERMISSION_TYPE_SORT = {
83 PERMISSION_TYPE_SORT = {
84 'admin': '####',
84 'admin': '####',
85 'write': '###',
85 'write': '###',
86 'read': '##',
86 'read': '##',
87 'none': '#',
87 'none': '#',
88 }
88 }
89
89
90
90
91 def display_user_sort(obj):
91 def display_user_sort(obj):
92 """
92 """
93 Sort function used to sort permissions in .permissions() function of
93 Sort function used to sort permissions in .permissions() function of
94 Repository, RepoGroup, UserGroup. Also it put the default user in front
94 Repository, RepoGroup, UserGroup. Also it put the default user in front
95 of all other resources
95 of all other resources
96 """
96 """
97
97
98 if obj.username == User.DEFAULT_USER:
98 if obj.username == User.DEFAULT_USER:
99 return '#####'
99 return '#####'
100 prefix = PERMISSION_TYPE_SORT.get(obj.permission.split('.')[-1], '')
100 prefix = PERMISSION_TYPE_SORT.get(obj.permission.split('.')[-1], '')
101 return prefix + obj.username
101 return prefix + obj.username
102
102
103
103
104 def display_user_group_sort(obj):
104 def display_user_group_sort(obj):
105 """
105 """
106 Sort function used to sort permissions in .permissions() function of
106 Sort function used to sort permissions in .permissions() function of
107 Repository, RepoGroup, UserGroup. Also it put the default user in front
107 Repository, RepoGroup, UserGroup. Also it put the default user in front
108 of all other resources
108 of all other resources
109 """
109 """
110
110
111 prefix = PERMISSION_TYPE_SORT.get(obj.permission.split('.')[-1], '')
111 prefix = PERMISSION_TYPE_SORT.get(obj.permission.split('.')[-1], '')
112 return prefix + obj.users_group_name
112 return prefix + obj.users_group_name
113
113
114
114
115 def _hash_key(k):
115 def _hash_key(k):
116 return sha1_safe(k)
116 return sha1_safe(k)
117
117
118
118
119 def in_filter_generator(qry, items, limit=500):
119 def in_filter_generator(qry, items, limit=500):
120 """
120 """
121 Splits IN() into multiple with OR
121 Splits IN() into multiple with OR
122 e.g.::
122 e.g.::
123 cnt = Repository.query().filter(
123 cnt = Repository.query().filter(
124 or_(
124 or_(
125 *in_filter_generator(Repository.repo_id, range(100000))
125 *in_filter_generator(Repository.repo_id, range(100000))
126 )).count()
126 )).count()
127 """
127 """
128 if not items:
128 if not items:
129 # empty list will cause empty query which might cause security issues
129 # empty list will cause empty query which might cause security issues
130 # this can lead to hidden unpleasant results
130 # this can lead to hidden unpleasant results
131 items = [-1]
131 items = [-1]
132
132
133 parts = []
133 parts = []
134 for chunk in xrange(0, len(items), limit):
134 for chunk in xrange(0, len(items), limit):
135 parts.append(
135 parts.append(
136 qry.in_(items[chunk: chunk + limit])
136 qry.in_(items[chunk: chunk + limit])
137 )
137 )
138
138
139 return parts
139 return parts
140
140
141
141
142 base_table_args = {
142 base_table_args = {
143 'extend_existing': True,
143 'extend_existing': True,
144 'mysql_engine': 'InnoDB',
144 'mysql_engine': 'InnoDB',
145 'mysql_charset': 'utf8',
145 'mysql_charset': 'utf8',
146 'sqlite_autoincrement': True
146 'sqlite_autoincrement': True
147 }
147 }
148
148
149
149
150 class EncryptedTextValue(TypeDecorator):
150 class EncryptedTextValue(TypeDecorator):
151 """
151 """
152 Special column for encrypted long text data, use like::
152 Special column for encrypted long text data, use like::
153
153
154 value = Column("encrypted_value", EncryptedValue(), nullable=False)
154 value = Column("encrypted_value", EncryptedValue(), nullable=False)
155
155
156 This column is intelligent so if value is in unencrypted form it return
156 This column is intelligent so if value is in unencrypted form it return
157 unencrypted form, but on save it always encrypts
157 unencrypted form, but on save it always encrypts
158 """
158 """
159 impl = Text
159 impl = Text
160
160
161 def process_bind_param(self, value, dialect):
161 def process_bind_param(self, value, dialect):
162 if not value:
162 if not value:
163 return value
163 return value
164 if value.startswith('enc$aes$') or value.startswith('enc$aes_hmac$'):
164 if value.startswith('enc$aes$') or value.startswith('enc$aes_hmac$'):
165 # protect against double encrypting if someone manually starts
165 # protect against double encrypting if someone manually starts
166 # doing
166 # doing
167 raise ValueError('value needs to be in unencrypted format, ie. '
167 raise ValueError('value needs to be in unencrypted format, ie. '
168 'not starting with enc$aes')
168 'not starting with enc$aes')
169 return 'enc$aes_hmac$%s' % AESCipher(
169 return 'enc$aes_hmac$%s' % AESCipher(
170 ENCRYPTION_KEY, hmac=True).encrypt(value)
170 ENCRYPTION_KEY, hmac=True).encrypt(value)
171
171
172 def process_result_value(self, value, dialect):
172 def process_result_value(self, value, dialect):
173 import rhodecode
173 import rhodecode
174
174
175 if not value:
175 if not value:
176 return value
176 return value
177
177
178 parts = value.split('$', 3)
178 parts = value.split('$', 3)
179 if not len(parts) == 3:
179 if not len(parts) == 3:
180 # probably not encrypted values
180 # probably not encrypted values
181 return value
181 return value
182 else:
182 else:
183 if parts[0] != 'enc':
183 if parts[0] != 'enc':
184 # parts ok but without our header ?
184 # parts ok but without our header ?
185 return value
185 return value
186 enc_strict_mode = str2bool(rhodecode.CONFIG.get(
186 enc_strict_mode = str2bool(rhodecode.CONFIG.get(
187 'rhodecode.encrypted_values.strict') or True)
187 'rhodecode.encrypted_values.strict') or True)
188 # at that stage we know it's our encryption
188 # at that stage we know it's our encryption
189 if parts[1] == 'aes':
189 if parts[1] == 'aes':
190 decrypted_data = AESCipher(ENCRYPTION_KEY).decrypt(parts[2])
190 decrypted_data = AESCipher(ENCRYPTION_KEY).decrypt(parts[2])
191 elif parts[1] == 'aes_hmac':
191 elif parts[1] == 'aes_hmac':
192 decrypted_data = AESCipher(
192 decrypted_data = AESCipher(
193 ENCRYPTION_KEY, hmac=True,
193 ENCRYPTION_KEY, hmac=True,
194 strict_verification=enc_strict_mode).decrypt(parts[2])
194 strict_verification=enc_strict_mode).decrypt(parts[2])
195 else:
195 else:
196 raise ValueError(
196 raise ValueError(
197 'Encryption type part is wrong, must be `aes` '
197 'Encryption type part is wrong, must be `aes` '
198 'or `aes_hmac`, got `%s` instead' % (parts[1]))
198 'or `aes_hmac`, got `%s` instead' % (parts[1]))
199 return decrypted_data
199 return decrypted_data
200
200
201
201
202 class BaseModel(object):
202 class BaseModel(object):
203 """
203 """
204 Base Model for all classes
204 Base Model for all classes
205 """
205 """
206
206
207 @classmethod
207 @classmethod
208 def _get_keys(cls):
208 def _get_keys(cls):
209 """return column names for this model """
209 """return column names for this model """
210 return class_mapper(cls).c.keys()
210 return class_mapper(cls).c.keys()
211
211
212 def get_dict(self):
212 def get_dict(self):
213 """
213 """
214 return dict with keys and values corresponding
214 return dict with keys and values corresponding
215 to this model data """
215 to this model data """
216
216
217 d = {}
217 d = {}
218 for k in self._get_keys():
218 for k in self._get_keys():
219 d[k] = getattr(self, k)
219 d[k] = getattr(self, k)
220
220
221 # also use __json__() if present to get additional fields
221 # also use __json__() if present to get additional fields
222 _json_attr = getattr(self, '__json__', None)
222 _json_attr = getattr(self, '__json__', None)
223 if _json_attr:
223 if _json_attr:
224 # update with attributes from __json__
224 # update with attributes from __json__
225 if callable(_json_attr):
225 if callable(_json_attr):
226 _json_attr = _json_attr()
226 _json_attr = _json_attr()
227 for k, val in _json_attr.iteritems():
227 for k, val in _json_attr.iteritems():
228 d[k] = val
228 d[k] = val
229 return d
229 return d
230
230
231 def get_appstruct(self):
231 def get_appstruct(self):
232 """return list with keys and values tuples corresponding
232 """return list with keys and values tuples corresponding
233 to this model data """
233 to this model data """
234
234
235 lst = []
235 lst = []
236 for k in self._get_keys():
236 for k in self._get_keys():
237 lst.append((k, getattr(self, k),))
237 lst.append((k, getattr(self, k),))
238 return lst
238 return lst
239
239
240 def populate_obj(self, populate_dict):
240 def populate_obj(self, populate_dict):
241 """populate model with data from given populate_dict"""
241 """populate model with data from given populate_dict"""
242
242
243 for k in self._get_keys():
243 for k in self._get_keys():
244 if k in populate_dict:
244 if k in populate_dict:
245 setattr(self, k, populate_dict[k])
245 setattr(self, k, populate_dict[k])
246
246
247 @classmethod
247 @classmethod
248 def query(cls):
248 def query(cls):
249 return Session().query(cls)
249 return Session().query(cls)
250
250
251 @classmethod
251 @classmethod
252 def get(cls, id_):
252 def get(cls, id_):
253 if id_:
253 if id_:
254 return cls.query().get(id_)
254 return cls.query().get(id_)
255
255
256 @classmethod
256 @classmethod
257 def get_or_404(cls, id_):
257 def get_or_404(cls, id_):
258 from pyramid.httpexceptions import HTTPNotFound
258 from pyramid.httpexceptions import HTTPNotFound
259
259
260 try:
260 try:
261 id_ = int(id_)
261 id_ = int(id_)
262 except (TypeError, ValueError):
262 except (TypeError, ValueError):
263 raise HTTPNotFound()
263 raise HTTPNotFound()
264
264
265 res = cls.query().get(id_)
265 res = cls.query().get(id_)
266 if not res:
266 if not res:
267 raise HTTPNotFound()
267 raise HTTPNotFound()
268 return res
268 return res
269
269
270 @classmethod
270 @classmethod
271 def getAll(cls):
271 def getAll(cls):
272 # deprecated and left for backward compatibility
272 # deprecated and left for backward compatibility
273 return cls.get_all()
273 return cls.get_all()
274
274
275 @classmethod
275 @classmethod
276 def get_all(cls):
276 def get_all(cls):
277 return cls.query().all()
277 return cls.query().all()
278
278
279 @classmethod
279 @classmethod
280 def delete(cls, id_):
280 def delete(cls, id_):
281 obj = cls.query().get(id_)
281 obj = cls.query().get(id_)
282 Session().delete(obj)
282 Session().delete(obj)
283
283
284 @classmethod
284 @classmethod
285 def identity_cache(cls, session, attr_name, value):
285 def identity_cache(cls, session, attr_name, value):
286 exist_in_session = []
286 exist_in_session = []
287 for (item_cls, pkey), instance in session.identity_map.items():
287 for (item_cls, pkey), instance in session.identity_map.items():
288 if cls == item_cls and getattr(instance, attr_name) == value:
288 if cls == item_cls and getattr(instance, attr_name) == value:
289 exist_in_session.append(instance)
289 exist_in_session.append(instance)
290 if exist_in_session:
290 if exist_in_session:
291 if len(exist_in_session) == 1:
291 if len(exist_in_session) == 1:
292 return exist_in_session[0]
292 return exist_in_session[0]
293 log.exception(
293 log.exception(
294 'multiple objects with attr %s and '
294 'multiple objects with attr %s and '
295 'value %s found with same name: %r',
295 'value %s found with same name: %r',
296 attr_name, value, exist_in_session)
296 attr_name, value, exist_in_session)
297
297
298 def __repr__(self):
298 def __repr__(self):
299 if hasattr(self, '__unicode__'):
299 if hasattr(self, '__unicode__'):
300 # python repr needs to return str
300 # python repr needs to return str
301 try:
301 try:
302 return safe_str(self.__unicode__())
302 return safe_str(self.__unicode__())
303 except UnicodeDecodeError:
303 except UnicodeDecodeError:
304 pass
304 pass
305 return '<DB:%s>' % (self.__class__.__name__)
305 return '<DB:%s>' % (self.__class__.__name__)
306
306
307
307
308 class RhodeCodeSetting(Base, BaseModel):
308 class RhodeCodeSetting(Base, BaseModel):
309 __tablename__ = 'rhodecode_settings'
309 __tablename__ = 'rhodecode_settings'
310 __table_args__ = (
310 __table_args__ = (
311 UniqueConstraint('app_settings_name'),
311 UniqueConstraint('app_settings_name'),
312 base_table_args
312 base_table_args
313 )
313 )
314
314
315 SETTINGS_TYPES = {
315 SETTINGS_TYPES = {
316 'str': safe_str,
316 'str': safe_str,
317 'int': safe_int,
317 'int': safe_int,
318 'unicode': safe_unicode,
318 'unicode': safe_unicode,
319 'bool': str2bool,
319 'bool': str2bool,
320 'list': functools.partial(aslist, sep=',')
320 'list': functools.partial(aslist, sep=',')
321 }
321 }
322 DEFAULT_UPDATE_URL = 'https://rhodecode.com/api/v1/info/versions'
322 DEFAULT_UPDATE_URL = 'https://rhodecode.com/api/v1/info/versions'
323 GLOBAL_CONF_KEY = 'app_settings'
323 GLOBAL_CONF_KEY = 'app_settings'
324
324
325 app_settings_id = Column("app_settings_id", Integer(), nullable=False, unique=True, default=None, primary_key=True)
325 app_settings_id = Column("app_settings_id", Integer(), nullable=False, unique=True, default=None, primary_key=True)
326 app_settings_name = Column("app_settings_name", String(255), nullable=True, unique=None, default=None)
326 app_settings_name = Column("app_settings_name", String(255), nullable=True, unique=None, default=None)
327 _app_settings_value = Column("app_settings_value", String(4096), nullable=True, unique=None, default=None)
327 _app_settings_value = Column("app_settings_value", String(4096), nullable=True, unique=None, default=None)
328 _app_settings_type = Column("app_settings_type", String(255), nullable=True, unique=None, default=None)
328 _app_settings_type = Column("app_settings_type", String(255), nullable=True, unique=None, default=None)
329
329
330 def __init__(self, key='', val='', type='unicode'):
330 def __init__(self, key='', val='', type='unicode'):
331 self.app_settings_name = key
331 self.app_settings_name = key
332 self.app_settings_type = type
332 self.app_settings_type = type
333 self.app_settings_value = val
333 self.app_settings_value = val
334
334
335 @validates('_app_settings_value')
335 @validates('_app_settings_value')
336 def validate_settings_value(self, key, val):
336 def validate_settings_value(self, key, val):
337 assert type(val) == unicode
337 assert type(val) == unicode
338 return val
338 return val
339
339
340 @hybrid_property
340 @hybrid_property
341 def app_settings_value(self):
341 def app_settings_value(self):
342 v = self._app_settings_value
342 v = self._app_settings_value
343 _type = self.app_settings_type
343 _type = self.app_settings_type
344 if _type:
344 if _type:
345 _type = self.app_settings_type.split('.')[0]
345 _type = self.app_settings_type.split('.')[0]
346 # decode the encrypted value
346 # decode the encrypted value
347 if 'encrypted' in self.app_settings_type:
347 if 'encrypted' in self.app_settings_type:
348 cipher = EncryptedTextValue()
348 cipher = EncryptedTextValue()
349 v = safe_unicode(cipher.process_result_value(v, None))
349 v = safe_unicode(cipher.process_result_value(v, None))
350
350
351 converter = self.SETTINGS_TYPES.get(_type) or \
351 converter = self.SETTINGS_TYPES.get(_type) or \
352 self.SETTINGS_TYPES['unicode']
352 self.SETTINGS_TYPES['unicode']
353 return converter(v)
353 return converter(v)
354
354
355 @app_settings_value.setter
355 @app_settings_value.setter
356 def app_settings_value(self, val):
356 def app_settings_value(self, val):
357 """
357 """
358 Setter that will always make sure we use unicode in app_settings_value
358 Setter that will always make sure we use unicode in app_settings_value
359
359
360 :param val:
360 :param val:
361 """
361 """
362 val = safe_unicode(val)
362 val = safe_unicode(val)
363 # encode the encrypted value
363 # encode the encrypted value
364 if 'encrypted' in self.app_settings_type:
364 if 'encrypted' in self.app_settings_type:
365 cipher = EncryptedTextValue()
365 cipher = EncryptedTextValue()
366 val = safe_unicode(cipher.process_bind_param(val, None))
366 val = safe_unicode(cipher.process_bind_param(val, None))
367 self._app_settings_value = val
367 self._app_settings_value = val
368
368
369 @hybrid_property
369 @hybrid_property
370 def app_settings_type(self):
370 def app_settings_type(self):
371 return self._app_settings_type
371 return self._app_settings_type
372
372
373 @app_settings_type.setter
373 @app_settings_type.setter
374 def app_settings_type(self, val):
374 def app_settings_type(self, val):
375 if val.split('.')[0] not in self.SETTINGS_TYPES:
375 if val.split('.')[0] not in self.SETTINGS_TYPES:
376 raise Exception('type must be one of %s got %s'
376 raise Exception('type must be one of %s got %s'
377 % (self.SETTINGS_TYPES.keys(), val))
377 % (self.SETTINGS_TYPES.keys(), val))
378 self._app_settings_type = val
378 self._app_settings_type = val
379
379
380 @classmethod
380 @classmethod
381 def get_by_prefix(cls, prefix):
381 def get_by_prefix(cls, prefix):
382 return RhodeCodeSetting.query()\
382 return RhodeCodeSetting.query()\
383 .filter(RhodeCodeSetting.app_settings_name.startswith(prefix))\
383 .filter(RhodeCodeSetting.app_settings_name.startswith(prefix))\
384 .all()
384 .all()
385
385
386 def __unicode__(self):
386 def __unicode__(self):
387 return u"<%s('%s:%s[%s]')>" % (
387 return u"<%s('%s:%s[%s]')>" % (
388 self.__class__.__name__,
388 self.__class__.__name__,
389 self.app_settings_name, self.app_settings_value,
389 self.app_settings_name, self.app_settings_value,
390 self.app_settings_type
390 self.app_settings_type
391 )
391 )
392
392
393
393
394 class RhodeCodeUi(Base, BaseModel):
394 class RhodeCodeUi(Base, BaseModel):
395 __tablename__ = 'rhodecode_ui'
395 __tablename__ = 'rhodecode_ui'
396 __table_args__ = (
396 __table_args__ = (
397 UniqueConstraint('ui_key'),
397 UniqueConstraint('ui_key'),
398 base_table_args
398 base_table_args
399 )
399 )
400
400
401 HOOK_REPO_SIZE = 'changegroup.repo_size'
401 HOOK_REPO_SIZE = 'changegroup.repo_size'
402 # HG
402 # HG
403 HOOK_PRE_PULL = 'preoutgoing.pre_pull'
403 HOOK_PRE_PULL = 'preoutgoing.pre_pull'
404 HOOK_PULL = 'outgoing.pull_logger'
404 HOOK_PULL = 'outgoing.pull_logger'
405 HOOK_PRE_PUSH = 'prechangegroup.pre_push'
405 HOOK_PRE_PUSH = 'prechangegroup.pre_push'
406 HOOK_PRETX_PUSH = 'pretxnchangegroup.pre_push'
406 HOOK_PRETX_PUSH = 'pretxnchangegroup.pre_push'
407 HOOK_PUSH = 'changegroup.push_logger'
407 HOOK_PUSH = 'changegroup.push_logger'
408 HOOK_PUSH_KEY = 'pushkey.key_push'
408 HOOK_PUSH_KEY = 'pushkey.key_push'
409
409
410 # TODO: johbo: Unify way how hooks are configured for git and hg,
410 # TODO: johbo: Unify way how hooks are configured for git and hg,
411 # git part is currently hardcoded.
411 # git part is currently hardcoded.
412
412
413 # SVN PATTERNS
413 # SVN PATTERNS
414 SVN_BRANCH_ID = 'vcs_svn_branch'
414 SVN_BRANCH_ID = 'vcs_svn_branch'
415 SVN_TAG_ID = 'vcs_svn_tag'
415 SVN_TAG_ID = 'vcs_svn_tag'
416
416
417 ui_id = Column(
417 ui_id = Column(
418 "ui_id", Integer(), nullable=False, unique=True, default=None,
418 "ui_id", Integer(), nullable=False, unique=True, default=None,
419 primary_key=True)
419 primary_key=True)
420 ui_section = Column(
420 ui_section = Column(
421 "ui_section", String(255), nullable=True, unique=None, default=None)
421 "ui_section", String(255), nullable=True, unique=None, default=None)
422 ui_key = Column(
422 ui_key = Column(
423 "ui_key", String(255), nullable=True, unique=None, default=None)
423 "ui_key", String(255), nullable=True, unique=None, default=None)
424 ui_value = Column(
424 ui_value = Column(
425 "ui_value", String(255), nullable=True, unique=None, default=None)
425 "ui_value", String(255), nullable=True, unique=None, default=None)
426 ui_active = Column(
426 ui_active = Column(
427 "ui_active", Boolean(), nullable=True, unique=None, default=True)
427 "ui_active", Boolean(), nullable=True, unique=None, default=True)
428
428
429 def __repr__(self):
429 def __repr__(self):
430 return '<%s[%s]%s=>%s]>' % (self.__class__.__name__, self.ui_section,
430 return '<%s[%s]%s=>%s]>' % (self.__class__.__name__, self.ui_section,
431 self.ui_key, self.ui_value)
431 self.ui_key, self.ui_value)
432
432
433
433
434 class RepoRhodeCodeSetting(Base, BaseModel):
434 class RepoRhodeCodeSetting(Base, BaseModel):
435 __tablename__ = 'repo_rhodecode_settings'
435 __tablename__ = 'repo_rhodecode_settings'
436 __table_args__ = (
436 __table_args__ = (
437 UniqueConstraint(
437 UniqueConstraint(
438 'app_settings_name', 'repository_id',
438 'app_settings_name', 'repository_id',
439 name='uq_repo_rhodecode_setting_name_repo_id'),
439 name='uq_repo_rhodecode_setting_name_repo_id'),
440 base_table_args
440 base_table_args
441 )
441 )
442
442
443 repository_id = Column(
443 repository_id = Column(
444 "repository_id", Integer(), ForeignKey('repositories.repo_id'),
444 "repository_id", Integer(), ForeignKey('repositories.repo_id'),
445 nullable=False)
445 nullable=False)
446 app_settings_id = Column(
446 app_settings_id = Column(
447 "app_settings_id", Integer(), nullable=False, unique=True,
447 "app_settings_id", Integer(), nullable=False, unique=True,
448 default=None, primary_key=True)
448 default=None, primary_key=True)
449 app_settings_name = Column(
449 app_settings_name = Column(
450 "app_settings_name", String(255), nullable=True, unique=None,
450 "app_settings_name", String(255), nullable=True, unique=None,
451 default=None)
451 default=None)
452 _app_settings_value = Column(
452 _app_settings_value = Column(
453 "app_settings_value", String(4096), nullable=True, unique=None,
453 "app_settings_value", String(4096), nullable=True, unique=None,
454 default=None)
454 default=None)
455 _app_settings_type = Column(
455 _app_settings_type = Column(
456 "app_settings_type", String(255), nullable=True, unique=None,
456 "app_settings_type", String(255), nullable=True, unique=None,
457 default=None)
457 default=None)
458
458
459 repository = relationship('Repository')
459 repository = relationship('Repository')
460
460
461 def __init__(self, repository_id, key='', val='', type='unicode'):
461 def __init__(self, repository_id, key='', val='', type='unicode'):
462 self.repository_id = repository_id
462 self.repository_id = repository_id
463 self.app_settings_name = key
463 self.app_settings_name = key
464 self.app_settings_type = type
464 self.app_settings_type = type
465 self.app_settings_value = val
465 self.app_settings_value = val
466
466
467 @validates('_app_settings_value')
467 @validates('_app_settings_value')
468 def validate_settings_value(self, key, val):
468 def validate_settings_value(self, key, val):
469 assert type(val) == unicode
469 assert type(val) == unicode
470 return val
470 return val
471
471
472 @hybrid_property
472 @hybrid_property
473 def app_settings_value(self):
473 def app_settings_value(self):
474 v = self._app_settings_value
474 v = self._app_settings_value
475 type_ = self.app_settings_type
475 type_ = self.app_settings_type
476 SETTINGS_TYPES = RhodeCodeSetting.SETTINGS_TYPES
476 SETTINGS_TYPES = RhodeCodeSetting.SETTINGS_TYPES
477 converter = SETTINGS_TYPES.get(type_) or SETTINGS_TYPES['unicode']
477 converter = SETTINGS_TYPES.get(type_) or SETTINGS_TYPES['unicode']
478 return converter(v)
478 return converter(v)
479
479
480 @app_settings_value.setter
480 @app_settings_value.setter
481 def app_settings_value(self, val):
481 def app_settings_value(self, val):
482 """
482 """
483 Setter that will always make sure we use unicode in app_settings_value
483 Setter that will always make sure we use unicode in app_settings_value
484
484
485 :param val:
485 :param val:
486 """
486 """
487 self._app_settings_value = safe_unicode(val)
487 self._app_settings_value = safe_unicode(val)
488
488
489 @hybrid_property
489 @hybrid_property
490 def app_settings_type(self):
490 def app_settings_type(self):
491 return self._app_settings_type
491 return self._app_settings_type
492
492
493 @app_settings_type.setter
493 @app_settings_type.setter
494 def app_settings_type(self, val):
494 def app_settings_type(self, val):
495 SETTINGS_TYPES = RhodeCodeSetting.SETTINGS_TYPES
495 SETTINGS_TYPES = RhodeCodeSetting.SETTINGS_TYPES
496 if val not in SETTINGS_TYPES:
496 if val not in SETTINGS_TYPES:
497 raise Exception('type must be one of %s got %s'
497 raise Exception('type must be one of %s got %s'
498 % (SETTINGS_TYPES.keys(), val))
498 % (SETTINGS_TYPES.keys(), val))
499 self._app_settings_type = val
499 self._app_settings_type = val
500
500
501 def __unicode__(self):
501 def __unicode__(self):
502 return u"<%s('%s:%s:%s[%s]')>" % (
502 return u"<%s('%s:%s:%s[%s]')>" % (
503 self.__class__.__name__, self.repository.repo_name,
503 self.__class__.__name__, self.repository.repo_name,
504 self.app_settings_name, self.app_settings_value,
504 self.app_settings_name, self.app_settings_value,
505 self.app_settings_type
505 self.app_settings_type
506 )
506 )
507
507
508
508
509 class RepoRhodeCodeUi(Base, BaseModel):
509 class RepoRhodeCodeUi(Base, BaseModel):
510 __tablename__ = 'repo_rhodecode_ui'
510 __tablename__ = 'repo_rhodecode_ui'
511 __table_args__ = (
511 __table_args__ = (
512 UniqueConstraint(
512 UniqueConstraint(
513 'repository_id', 'ui_section', 'ui_key',
513 'repository_id', 'ui_section', 'ui_key',
514 name='uq_repo_rhodecode_ui_repository_id_section_key'),
514 name='uq_repo_rhodecode_ui_repository_id_section_key'),
515 base_table_args
515 base_table_args
516 )
516 )
517
517
518 repository_id = Column(
518 repository_id = Column(
519 "repository_id", Integer(), ForeignKey('repositories.repo_id'),
519 "repository_id", Integer(), ForeignKey('repositories.repo_id'),
520 nullable=False)
520 nullable=False)
521 ui_id = Column(
521 ui_id = Column(
522 "ui_id", Integer(), nullable=False, unique=True, default=None,
522 "ui_id", Integer(), nullable=False, unique=True, default=None,
523 primary_key=True)
523 primary_key=True)
524 ui_section = Column(
524 ui_section = Column(
525 "ui_section", String(255), nullable=True, unique=None, default=None)
525 "ui_section", String(255), nullable=True, unique=None, default=None)
526 ui_key = Column(
526 ui_key = Column(
527 "ui_key", String(255), nullable=True, unique=None, default=None)
527 "ui_key", String(255), nullable=True, unique=None, default=None)
528 ui_value = Column(
528 ui_value = Column(
529 "ui_value", String(255), nullable=True, unique=None, default=None)
529 "ui_value", String(255), nullable=True, unique=None, default=None)
530 ui_active = Column(
530 ui_active = Column(
531 "ui_active", Boolean(), nullable=True, unique=None, default=True)
531 "ui_active", Boolean(), nullable=True, unique=None, default=True)
532
532
533 repository = relationship('Repository')
533 repository = relationship('Repository')
534
534
535 def __repr__(self):
535 def __repr__(self):
536 return '<%s[%s:%s]%s=>%s]>' % (
536 return '<%s[%s:%s]%s=>%s]>' % (
537 self.__class__.__name__, self.repository.repo_name,
537 self.__class__.__name__, self.repository.repo_name,
538 self.ui_section, self.ui_key, self.ui_value)
538 self.ui_section, self.ui_key, self.ui_value)
539
539
540
540
541 class User(Base, BaseModel):
541 class User(Base, BaseModel):
542 __tablename__ = 'users'
542 __tablename__ = 'users'
543 __table_args__ = (
543 __table_args__ = (
544 UniqueConstraint('username'), UniqueConstraint('email'),
544 UniqueConstraint('username'), UniqueConstraint('email'),
545 Index('u_username_idx', 'username'),
545 Index('u_username_idx', 'username'),
546 Index('u_email_idx', 'email'),
546 Index('u_email_idx', 'email'),
547 base_table_args
547 base_table_args
548 )
548 )
549
549
550 DEFAULT_USER = 'default'
550 DEFAULT_USER = 'default'
551 DEFAULT_USER_EMAIL = 'anonymous@rhodecode.org'
551 DEFAULT_USER_EMAIL = 'anonymous@rhodecode.org'
552 DEFAULT_GRAVATAR_URL = 'https://secure.gravatar.com/avatar/{md5email}?d=identicon&s={size}'
552 DEFAULT_GRAVATAR_URL = 'https://secure.gravatar.com/avatar/{md5email}?d=identicon&s={size}'
553
553
554 user_id = Column("user_id", Integer(), nullable=False, unique=True, default=None, primary_key=True)
554 user_id = Column("user_id", Integer(), nullable=False, unique=True, default=None, primary_key=True)
555 username = Column("username", String(255), nullable=True, unique=None, default=None)
555 username = Column("username", String(255), nullable=True, unique=None, default=None)
556 password = Column("password", String(255), nullable=True, unique=None, default=None)
556 password = Column("password", String(255), nullable=True, unique=None, default=None)
557 active = Column("active", Boolean(), nullable=True, unique=None, default=True)
557 active = Column("active", Boolean(), nullable=True, unique=None, default=True)
558 admin = Column("admin", Boolean(), nullable=True, unique=None, default=False)
558 admin = Column("admin", Boolean(), nullable=True, unique=None, default=False)
559 name = Column("firstname", String(255), nullable=True, unique=None, default=None)
559 name = Column("firstname", String(255), nullable=True, unique=None, default=None)
560 lastname = Column("lastname", String(255), nullable=True, unique=None, default=None)
560 lastname = Column("lastname", String(255), nullable=True, unique=None, default=None)
561 _email = Column("email", String(255), nullable=True, unique=None, default=None)
561 _email = Column("email", String(255), nullable=True, unique=None, default=None)
562 last_login = Column("last_login", DateTime(timezone=False), nullable=True, unique=None, default=None)
562 last_login = Column("last_login", DateTime(timezone=False), nullable=True, unique=None, default=None)
563 last_activity = Column('last_activity', DateTime(timezone=False), nullable=True, unique=None, default=None)
563 last_activity = Column('last_activity', DateTime(timezone=False), nullable=True, unique=None, default=None)
564
564
565 extern_type = Column("extern_type", String(255), nullable=True, unique=None, default=None)
565 extern_type = Column("extern_type", String(255), nullable=True, unique=None, default=None)
566 extern_name = Column("extern_name", String(255), nullable=True, unique=None, default=None)
566 extern_name = Column("extern_name", String(255), nullable=True, unique=None, default=None)
567 _api_key = Column("api_key", String(255), nullable=True, unique=None, default=None)
567 _api_key = Column("api_key", String(255), nullable=True, unique=None, default=None)
568 inherit_default_permissions = Column("inherit_default_permissions", Boolean(), nullable=False, unique=None, default=True)
568 inherit_default_permissions = Column("inherit_default_permissions", Boolean(), nullable=False, unique=None, default=True)
569 created_on = Column('created_on', DateTime(timezone=False), nullable=False, default=datetime.datetime.now)
569 created_on = Column('created_on', DateTime(timezone=False), nullable=False, default=datetime.datetime.now)
570 _user_data = Column("user_data", LargeBinary(), nullable=True) # JSON data
570 _user_data = Column("user_data", LargeBinary(), nullable=True) # JSON data
571
571
572 user_log = relationship('UserLog')
572 user_log = relationship('UserLog')
573 user_perms = relationship('UserToPerm', primaryjoin="User.user_id==UserToPerm.user_id", cascade='all')
573 user_perms = relationship('UserToPerm', primaryjoin="User.user_id==UserToPerm.user_id", cascade='all')
574
574
575 repositories = relationship('Repository')
575 repositories = relationship('Repository')
576 repository_groups = relationship('RepoGroup')
576 repository_groups = relationship('RepoGroup')
577 user_groups = relationship('UserGroup')
577 user_groups = relationship('UserGroup')
578
578
579 user_followers = relationship('UserFollowing', primaryjoin='UserFollowing.follows_user_id==User.user_id', cascade='all')
579 user_followers = relationship('UserFollowing', primaryjoin='UserFollowing.follows_user_id==User.user_id', cascade='all')
580 followings = relationship('UserFollowing', primaryjoin='UserFollowing.user_id==User.user_id', cascade='all')
580 followings = relationship('UserFollowing', primaryjoin='UserFollowing.user_id==User.user_id', cascade='all')
581
581
582 repo_to_perm = relationship('UserRepoToPerm', primaryjoin='UserRepoToPerm.user_id==User.user_id', cascade='all')
582 repo_to_perm = relationship('UserRepoToPerm', primaryjoin='UserRepoToPerm.user_id==User.user_id', cascade='all')
583 repo_group_to_perm = relationship('UserRepoGroupToPerm', primaryjoin='UserRepoGroupToPerm.user_id==User.user_id', cascade='all')
583 repo_group_to_perm = relationship('UserRepoGroupToPerm', primaryjoin='UserRepoGroupToPerm.user_id==User.user_id', cascade='all')
584 user_group_to_perm = relationship('UserUserGroupToPerm', primaryjoin='UserUserGroupToPerm.user_id==User.user_id', cascade='all')
584 user_group_to_perm = relationship('UserUserGroupToPerm', primaryjoin='UserUserGroupToPerm.user_id==User.user_id', cascade='all')
585
585
586 group_member = relationship('UserGroupMember', cascade='all')
586 group_member = relationship('UserGroupMember', cascade='all')
587
587
588 notifications = relationship('UserNotification', cascade='all')
588 notifications = relationship('UserNotification', cascade='all')
589 # notifications assigned to this user
589 # notifications assigned to this user
590 user_created_notifications = relationship('Notification', cascade='all')
590 user_created_notifications = relationship('Notification', cascade='all')
591 # comments created by this user
591 # comments created by this user
592 user_comments = relationship('ChangesetComment', cascade='all')
592 user_comments = relationship('ChangesetComment', cascade='all')
593 # user profile extra info
593 # user profile extra info
594 user_emails = relationship('UserEmailMap', cascade='all')
594 user_emails = relationship('UserEmailMap', cascade='all')
595 user_ip_map = relationship('UserIpMap', cascade='all')
595 user_ip_map = relationship('UserIpMap', cascade='all')
596 user_auth_tokens = relationship('UserApiKeys', cascade='all')
596 user_auth_tokens = relationship('UserApiKeys', cascade='all')
597 user_ssh_keys = relationship('UserSshKeys', cascade='all')
597 user_ssh_keys = relationship('UserSshKeys', cascade='all')
598
598
599 # gists
599 # gists
600 user_gists = relationship('Gist', cascade='all')
600 user_gists = relationship('Gist', cascade='all')
601 # user pull requests
601 # user pull requests
602 user_pull_requests = relationship('PullRequest', cascade='all')
602 user_pull_requests = relationship('PullRequest', cascade='all')
603 # external identities
603 # external identities
604 extenal_identities = relationship(
604 extenal_identities = relationship(
605 'ExternalIdentity',
605 'ExternalIdentity',
606 primaryjoin="User.user_id==ExternalIdentity.local_user_id",
606 primaryjoin="User.user_id==ExternalIdentity.local_user_id",
607 cascade='all')
607 cascade='all')
608 # review rules
608 # review rules
609 user_review_rules = relationship('RepoReviewRuleUser', cascade='all')
609 user_review_rules = relationship('RepoReviewRuleUser', cascade='all')
610
610
611 def __unicode__(self):
611 def __unicode__(self):
612 return u"<%s('id:%s:%s')>" % (self.__class__.__name__,
612 return u"<%s('id:%s:%s')>" % (self.__class__.__name__,
613 self.user_id, self.username)
613 self.user_id, self.username)
614
614
615 @hybrid_property
615 @hybrid_property
616 def email(self):
616 def email(self):
617 return self._email
617 return self._email
618
618
619 @email.setter
619 @email.setter
620 def email(self, val):
620 def email(self, val):
621 self._email = val.lower() if val else None
621 self._email = val.lower() if val else None
622
622
623 @hybrid_property
623 @hybrid_property
624 def first_name(self):
624 def first_name(self):
625 from rhodecode.lib import helpers as h
625 from rhodecode.lib import helpers as h
626 if self.name:
626 if self.name:
627 return h.escape(self.name)
627 return h.escape(self.name)
628 return self.name
628 return self.name
629
629
630 @hybrid_property
630 @hybrid_property
631 def last_name(self):
631 def last_name(self):
632 from rhodecode.lib import helpers as h
632 from rhodecode.lib import helpers as h
633 if self.lastname:
633 if self.lastname:
634 return h.escape(self.lastname)
634 return h.escape(self.lastname)
635 return self.lastname
635 return self.lastname
636
636
637 @hybrid_property
637 @hybrid_property
638 def api_key(self):
638 def api_key(self):
639 """
639 """
640 Fetch if exist an auth-token with role ALL connected to this user
640 Fetch if exist an auth-token with role ALL connected to this user
641 """
641 """
642 user_auth_token = UserApiKeys.query()\
642 user_auth_token = UserApiKeys.query()\
643 .filter(UserApiKeys.user_id == self.user_id)\
643 .filter(UserApiKeys.user_id == self.user_id)\
644 .filter(or_(UserApiKeys.expires == -1,
644 .filter(or_(UserApiKeys.expires == -1,
645 UserApiKeys.expires >= time.time()))\
645 UserApiKeys.expires >= time.time()))\
646 .filter(UserApiKeys.role == UserApiKeys.ROLE_ALL).first()
646 .filter(UserApiKeys.role == UserApiKeys.ROLE_ALL).first()
647 if user_auth_token:
647 if user_auth_token:
648 user_auth_token = user_auth_token.api_key
648 user_auth_token = user_auth_token.api_key
649
649
650 return user_auth_token
650 return user_auth_token
651
651
652 @api_key.setter
652 @api_key.setter
653 def api_key(self, val):
653 def api_key(self, val):
654 # don't allow to set API key this is deprecated for now
654 # don't allow to set API key this is deprecated for now
655 self._api_key = None
655 self._api_key = None
656
656
657 @property
657 @property
658 def reviewer_pull_requests(self):
658 def reviewer_pull_requests(self):
659 return PullRequestReviewers.query() \
659 return PullRequestReviewers.query() \
660 .options(joinedload(PullRequestReviewers.pull_request)) \
660 .options(joinedload(PullRequestReviewers.pull_request)) \
661 .filter(PullRequestReviewers.user_id == self.user_id) \
661 .filter(PullRequestReviewers.user_id == self.user_id) \
662 .all()
662 .all()
663
663
664 @property
664 @property
665 def firstname(self):
665 def firstname(self):
666 # alias for future
666 # alias for future
667 return self.name
667 return self.name
668
668
669 @property
669 @property
670 def emails(self):
670 def emails(self):
671 other = UserEmailMap.query()\
671 other = UserEmailMap.query()\
672 .filter(UserEmailMap.user == self) \
672 .filter(UserEmailMap.user == self) \
673 .order_by(UserEmailMap.email_id.asc()) \
673 .order_by(UserEmailMap.email_id.asc()) \
674 .all()
674 .all()
675 return [self.email] + [x.email for x in other]
675 return [self.email] + [x.email for x in other]
676
676
677 @property
677 @property
678 def auth_tokens(self):
678 def auth_tokens(self):
679 auth_tokens = self.get_auth_tokens()
679 auth_tokens = self.get_auth_tokens()
680 return [x.api_key for x in auth_tokens]
680 return [x.api_key for x in auth_tokens]
681
681
682 def get_auth_tokens(self):
682 def get_auth_tokens(self):
683 return UserApiKeys.query()\
683 return UserApiKeys.query()\
684 .filter(UserApiKeys.user == self)\
684 .filter(UserApiKeys.user == self)\
685 .order_by(UserApiKeys.user_api_key_id.asc())\
685 .order_by(UserApiKeys.user_api_key_id.asc())\
686 .all()
686 .all()
687
687
688 @LazyProperty
688 @LazyProperty
689 def feed_token(self):
689 def feed_token(self):
690 return self.get_feed_token()
690 return self.get_feed_token()
691
691
692 def get_feed_token(self, cache=True):
692 def get_feed_token(self, cache=True):
693 feed_tokens = UserApiKeys.query()\
693 feed_tokens = UserApiKeys.query()\
694 .filter(UserApiKeys.user == self)\
694 .filter(UserApiKeys.user == self)\
695 .filter(UserApiKeys.role == UserApiKeys.ROLE_FEED)
695 .filter(UserApiKeys.role == UserApiKeys.ROLE_FEED)
696 if cache:
696 if cache:
697 feed_tokens = feed_tokens.options(
697 feed_tokens = feed_tokens.options(
698 FromCache("sql_cache_short", "get_user_feed_token_%s" % self.user_id))
698 FromCache("sql_cache_short", "get_user_feed_token_%s" % self.user_id))
699
699
700 feed_tokens = feed_tokens.all()
700 feed_tokens = feed_tokens.all()
701 if feed_tokens:
701 if feed_tokens:
702 return feed_tokens[0].api_key
702 return feed_tokens[0].api_key
703 return 'NO_FEED_TOKEN_AVAILABLE'
703 return 'NO_FEED_TOKEN_AVAILABLE'
704
704
705 @classmethod
705 @classmethod
706 def get(cls, user_id, cache=False):
706 def get(cls, user_id, cache=False):
707 if not user_id:
707 if not user_id:
708 return
708 return
709
709
710 user = cls.query()
710 user = cls.query()
711 if cache:
711 if cache:
712 user = user.options(
712 user = user.options(
713 FromCache("sql_cache_short", "get_users_%s" % user_id))
713 FromCache("sql_cache_short", "get_users_%s" % user_id))
714 return user.get(user_id)
714 return user.get(user_id)
715
715
716 @classmethod
716 @classmethod
717 def extra_valid_auth_tokens(cls, user, role=None):
717 def extra_valid_auth_tokens(cls, user, role=None):
718 tokens = UserApiKeys.query().filter(UserApiKeys.user == user)\
718 tokens = UserApiKeys.query().filter(UserApiKeys.user == user)\
719 .filter(or_(UserApiKeys.expires == -1,
719 .filter(or_(UserApiKeys.expires == -1,
720 UserApiKeys.expires >= time.time()))
720 UserApiKeys.expires >= time.time()))
721 if role:
721 if role:
722 tokens = tokens.filter(or_(UserApiKeys.role == role,
722 tokens = tokens.filter(or_(UserApiKeys.role == role,
723 UserApiKeys.role == UserApiKeys.ROLE_ALL))
723 UserApiKeys.role == UserApiKeys.ROLE_ALL))
724 return tokens.all()
724 return tokens.all()
725
725
726 def authenticate_by_token(self, auth_token, roles=None, scope_repo_id=None):
726 def authenticate_by_token(self, auth_token, roles=None, scope_repo_id=None):
727 from rhodecode.lib import auth
727 from rhodecode.lib import auth
728
728
729 log.debug('Trying to authenticate user: %s via auth-token, '
729 log.debug('Trying to authenticate user: %s via auth-token, '
730 'and roles: %s', self, roles)
730 'and roles: %s', self, roles)
731
731
732 if not auth_token:
732 if not auth_token:
733 return False
733 return False
734
734
735 crypto_backend = auth.crypto_backend()
735 crypto_backend = auth.crypto_backend()
736
736
737 roles = (roles or []) + [UserApiKeys.ROLE_ALL]
737 roles = (roles or []) + [UserApiKeys.ROLE_ALL]
738 tokens_q = UserApiKeys.query()\
738 tokens_q = UserApiKeys.query()\
739 .filter(UserApiKeys.user_id == self.user_id)\
739 .filter(UserApiKeys.user_id == self.user_id)\
740 .filter(or_(UserApiKeys.expires == -1,
740 .filter(or_(UserApiKeys.expires == -1,
741 UserApiKeys.expires >= time.time()))
741 UserApiKeys.expires >= time.time()))
742
742
743 tokens_q = tokens_q.filter(UserApiKeys.role.in_(roles))
743 tokens_q = tokens_q.filter(UserApiKeys.role.in_(roles))
744
744
745 plain_tokens = []
745 plain_tokens = []
746 hash_tokens = []
746 hash_tokens = []
747
747
748 user_tokens = tokens_q.all()
748 user_tokens = tokens_q.all()
749 log.debug('Found %s user tokens to check for authentication', len(user_tokens))
749 log.debug('Found %s user tokens to check for authentication', len(user_tokens))
750 for token in user_tokens:
750 for token in user_tokens:
751 log.debug('AUTH_TOKEN: checking if user token with id `%s` matches',
751 log.debug('AUTH_TOKEN: checking if user token with id `%s` matches',
752 token.user_api_key_id)
752 token.user_api_key_id)
753 # verify scope first, since it's way faster than hash calculation of
753 # verify scope first, since it's way faster than hash calculation of
754 # encrypted tokens
754 # encrypted tokens
755 if token.repo_id:
755 if token.repo_id:
756 # token has a scope, we need to verify it
756 # token has a scope, we need to verify it
757 if scope_repo_id != token.repo_id:
757 if scope_repo_id != token.repo_id:
758 log.debug(
758 log.debug(
759 'AUTH_TOKEN: scope mismatch, token has a set repo scope: %s, '
759 'AUTH_TOKEN: scope mismatch, token has a set repo scope: %s, '
760 'and calling scope is:%s, skipping further checks',
760 'and calling scope is:%s, skipping further checks',
761 token.repo, scope_repo_id)
761 token.repo, scope_repo_id)
762 # token has a scope, and it doesn't match, skip token
762 # token has a scope, and it doesn't match, skip token
763 continue
763 continue
764
764
765 if token.api_key.startswith(crypto_backend.ENC_PREF):
765 if token.api_key.startswith(crypto_backend.ENC_PREF):
766 hash_tokens.append(token.api_key)
766 hash_tokens.append(token.api_key)
767 else:
767 else:
768 plain_tokens.append(token.api_key)
768 plain_tokens.append(token.api_key)
769
769
770 is_plain_match = auth_token in plain_tokens
770 is_plain_match = auth_token in plain_tokens
771 if is_plain_match:
771 if is_plain_match:
772 return True
772 return True
773
773
774 for hashed in hash_tokens:
774 for hashed in hash_tokens:
775 # NOTE(marcink): this is expensive to calculate, but most secure
775 # NOTE(marcink): this is expensive to calculate, but most secure
776 match = crypto_backend.hash_check(auth_token, hashed)
776 match = crypto_backend.hash_check(auth_token, hashed)
777 if match:
777 if match:
778 return True
778 return True
779
779
780 return False
780 return False
781
781
782 @property
782 @property
783 def ip_addresses(self):
783 def ip_addresses(self):
784 ret = UserIpMap.query().filter(UserIpMap.user == self).all()
784 ret = UserIpMap.query().filter(UserIpMap.user == self).all()
785 return [x.ip_addr for x in ret]
785 return [x.ip_addr for x in ret]
786
786
787 @property
787 @property
788 def username_and_name(self):
788 def username_and_name(self):
789 return '%s (%s %s)' % (self.username, self.first_name, self.last_name)
789 return '%s (%s %s)' % (self.username, self.first_name, self.last_name)
790
790
791 @property
791 @property
792 def username_or_name_or_email(self):
792 def username_or_name_or_email(self):
793 full_name = self.full_name if self.full_name is not ' ' else None
793 full_name = self.full_name if self.full_name is not ' ' else None
794 return self.username or full_name or self.email
794 return self.username or full_name or self.email
795
795
796 @property
796 @property
797 def full_name(self):
797 def full_name(self):
798 return '%s %s' % (self.first_name, self.last_name)
798 return '%s %s' % (self.first_name, self.last_name)
799
799
800 @property
800 @property
801 def full_name_or_username(self):
801 def full_name_or_username(self):
802 return ('%s %s' % (self.first_name, self.last_name)
802 return ('%s %s' % (self.first_name, self.last_name)
803 if (self.first_name and self.last_name) else self.username)
803 if (self.first_name and self.last_name) else self.username)
804
804
805 @property
805 @property
806 def full_contact(self):
806 def full_contact(self):
807 return '%s %s <%s>' % (self.first_name, self.last_name, self.email)
807 return '%s %s <%s>' % (self.first_name, self.last_name, self.email)
808
808
809 @property
809 @property
810 def short_contact(self):
810 def short_contact(self):
811 return '%s %s' % (self.first_name, self.last_name)
811 return '%s %s' % (self.first_name, self.last_name)
812
812
813 @property
813 @property
814 def is_admin(self):
814 def is_admin(self):
815 return self.admin
815 return self.admin
816
816
817 def AuthUser(self, **kwargs):
817 def AuthUser(self, **kwargs):
818 """
818 """
819 Returns instance of AuthUser for this user
819 Returns instance of AuthUser for this user
820 """
820 """
821 from rhodecode.lib.auth import AuthUser
821 from rhodecode.lib.auth import AuthUser
822 return AuthUser(user_id=self.user_id, username=self.username, **kwargs)
822 return AuthUser(user_id=self.user_id, username=self.username, **kwargs)
823
823
824 @hybrid_property
824 @hybrid_property
825 def user_data(self):
825 def user_data(self):
826 if not self._user_data:
826 if not self._user_data:
827 return {}
827 return {}
828
828
829 try:
829 try:
830 return json.loads(self._user_data)
830 return json.loads(self._user_data)
831 except TypeError:
831 except TypeError:
832 return {}
832 return {}
833
833
834 @user_data.setter
834 @user_data.setter
835 def user_data(self, val):
835 def user_data(self, val):
836 if not isinstance(val, dict):
836 if not isinstance(val, dict):
837 raise Exception('user_data must be dict, got %s' % type(val))
837 raise Exception('user_data must be dict, got %s' % type(val))
838 try:
838 try:
839 self._user_data = json.dumps(val)
839 self._user_data = json.dumps(val)
840 except Exception:
840 except Exception:
841 log.error(traceback.format_exc())
841 log.error(traceback.format_exc())
842
842
843 @classmethod
843 @classmethod
844 def get_by_username(cls, username, case_insensitive=False,
844 def get_by_username(cls, username, case_insensitive=False,
845 cache=False, identity_cache=False):
845 cache=False, identity_cache=False):
846 session = Session()
846 session = Session()
847
847
848 if case_insensitive:
848 if case_insensitive:
849 q = cls.query().filter(
849 q = cls.query().filter(
850 func.lower(cls.username) == func.lower(username))
850 func.lower(cls.username) == func.lower(username))
851 else:
851 else:
852 q = cls.query().filter(cls.username == username)
852 q = cls.query().filter(cls.username == username)
853
853
854 if cache:
854 if cache:
855 if identity_cache:
855 if identity_cache:
856 val = cls.identity_cache(session, 'username', username)
856 val = cls.identity_cache(session, 'username', username)
857 if val:
857 if val:
858 return val
858 return val
859 else:
859 else:
860 cache_key = "get_user_by_name_%s" % _hash_key(username)
860 cache_key = "get_user_by_name_%s" % _hash_key(username)
861 q = q.options(
861 q = q.options(
862 FromCache("sql_cache_short", cache_key))
862 FromCache("sql_cache_short", cache_key))
863
863
864 return q.scalar()
864 return q.scalar()
865
865
866 @classmethod
866 @classmethod
867 def get_by_auth_token(cls, auth_token, cache=False):
867 def get_by_auth_token(cls, auth_token, cache=False):
868 q = UserApiKeys.query()\
868 q = UserApiKeys.query()\
869 .filter(UserApiKeys.api_key == auth_token)\
869 .filter(UserApiKeys.api_key == auth_token)\
870 .filter(or_(UserApiKeys.expires == -1,
870 .filter(or_(UserApiKeys.expires == -1,
871 UserApiKeys.expires >= time.time()))
871 UserApiKeys.expires >= time.time()))
872 if cache:
872 if cache:
873 q = q.options(
873 q = q.options(
874 FromCache("sql_cache_short", "get_auth_token_%s" % auth_token))
874 FromCache("sql_cache_short", "get_auth_token_%s" % auth_token))
875
875
876 match = q.first()
876 match = q.first()
877 if match:
877 if match:
878 return match.user
878 return match.user
879
879
880 @classmethod
880 @classmethod
881 def get_by_email(cls, email, case_insensitive=False, cache=False):
881 def get_by_email(cls, email, case_insensitive=False, cache=False):
882
882
883 if case_insensitive:
883 if case_insensitive:
884 q = cls.query().filter(func.lower(cls.email) == func.lower(email))
884 q = cls.query().filter(func.lower(cls.email) == func.lower(email))
885
885
886 else:
886 else:
887 q = cls.query().filter(cls.email == email)
887 q = cls.query().filter(cls.email == email)
888
888
889 email_key = _hash_key(email)
889 email_key = _hash_key(email)
890 if cache:
890 if cache:
891 q = q.options(
891 q = q.options(
892 FromCache("sql_cache_short", "get_email_key_%s" % email_key))
892 FromCache("sql_cache_short", "get_email_key_%s" % email_key))
893
893
894 ret = q.scalar()
894 ret = q.scalar()
895 if ret is None:
895 if ret is None:
896 q = UserEmailMap.query()
896 q = UserEmailMap.query()
897 # try fetching in alternate email map
897 # try fetching in alternate email map
898 if case_insensitive:
898 if case_insensitive:
899 q = q.filter(func.lower(UserEmailMap.email) == func.lower(email))
899 q = q.filter(func.lower(UserEmailMap.email) == func.lower(email))
900 else:
900 else:
901 q = q.filter(UserEmailMap.email == email)
901 q = q.filter(UserEmailMap.email == email)
902 q = q.options(joinedload(UserEmailMap.user))
902 q = q.options(joinedload(UserEmailMap.user))
903 if cache:
903 if cache:
904 q = q.options(
904 q = q.options(
905 FromCache("sql_cache_short", "get_email_map_key_%s" % email_key))
905 FromCache("sql_cache_short", "get_email_map_key_%s" % email_key))
906 ret = getattr(q.scalar(), 'user', None)
906 ret = getattr(q.scalar(), 'user', None)
907
907
908 return ret
908 return ret
909
909
910 @classmethod
910 @classmethod
911 def get_from_cs_author(cls, author):
911 def get_from_cs_author(cls, author):
912 """
912 """
913 Tries to get User objects out of commit author string
913 Tries to get User objects out of commit author string
914
914
915 :param author:
915 :param author:
916 """
916 """
917 from rhodecode.lib.helpers import email, author_name
917 from rhodecode.lib.helpers import email, author_name
918 # Valid email in the attribute passed, see if they're in the system
918 # Valid email in the attribute passed, see if they're in the system
919 _email = email(author)
919 _email = email(author)
920 if _email:
920 if _email:
921 user = cls.get_by_email(_email, case_insensitive=True)
921 user = cls.get_by_email(_email, case_insensitive=True)
922 if user:
922 if user:
923 return user
923 return user
924 # Maybe we can match by username?
924 # Maybe we can match by username?
925 _author = author_name(author)
925 _author = author_name(author)
926 user = cls.get_by_username(_author, case_insensitive=True)
926 user = cls.get_by_username(_author, case_insensitive=True)
927 if user:
927 if user:
928 return user
928 return user
929
929
930 def update_userdata(self, **kwargs):
930 def update_userdata(self, **kwargs):
931 usr = self
931 usr = self
932 old = usr.user_data
932 old = usr.user_data
933 old.update(**kwargs)
933 old.update(**kwargs)
934 usr.user_data = old
934 usr.user_data = old
935 Session().add(usr)
935 Session().add(usr)
936 log.debug('updated userdata with ', kwargs)
936 log.debug('updated userdata with ', kwargs)
937
937
938 def update_lastlogin(self):
938 def update_lastlogin(self):
939 """Update user lastlogin"""
939 """Update user lastlogin"""
940 self.last_login = datetime.datetime.now()
940 self.last_login = datetime.datetime.now()
941 Session().add(self)
941 Session().add(self)
942 log.debug('updated user %s lastlogin', self.username)
942 log.debug('updated user %s lastlogin', self.username)
943
943
944 def update_password(self, new_password):
944 def update_password(self, new_password):
945 from rhodecode.lib.auth import get_crypt_password
945 from rhodecode.lib.auth import get_crypt_password
946
946
947 self.password = get_crypt_password(new_password)
947 self.password = get_crypt_password(new_password)
948 Session().add(self)
948 Session().add(self)
949
949
950 @classmethod
950 @classmethod
951 def get_first_super_admin(cls):
951 def get_first_super_admin(cls):
952 user = User.query()\
952 user = User.query()\
953 .filter(User.admin == true()) \
953 .filter(User.admin == true()) \
954 .order_by(User.user_id.asc()) \
954 .order_by(User.user_id.asc()) \
955 .first()
955 .first()
956
956
957 if user is None:
957 if user is None:
958 raise Exception('FATAL: Missing administrative account!')
958 raise Exception('FATAL: Missing administrative account!')
959 return user
959 return user
960
960
961 @classmethod
961 @classmethod
962 def get_all_super_admins(cls):
962 def get_all_super_admins(cls):
963 """
963 """
964 Returns all admin accounts sorted by username
964 Returns all admin accounts sorted by username
965 """
965 """
966 return User.query().filter(User.admin == true())\
966 return User.query().filter(User.admin == true())\
967 .order_by(User.username.asc()).all()
967 .order_by(User.username.asc()).all()
968
968
969 @classmethod
969 @classmethod
970 def get_default_user(cls, cache=False, refresh=False):
970 def get_default_user(cls, cache=False, refresh=False):
971 user = User.get_by_username(User.DEFAULT_USER, cache=cache)
971 user = User.get_by_username(User.DEFAULT_USER, cache=cache)
972 if user is None:
972 if user is None:
973 raise Exception('FATAL: Missing default account!')
973 raise Exception('FATAL: Missing default account!')
974 if refresh:
974 if refresh:
975 # The default user might be based on outdated state which
975 # The default user might be based on outdated state which
976 # has been loaded from the cache.
976 # has been loaded from the cache.
977 # A call to refresh() ensures that the
977 # A call to refresh() ensures that the
978 # latest state from the database is used.
978 # latest state from the database is used.
979 Session().refresh(user)
979 Session().refresh(user)
980 return user
980 return user
981
981
982 def _get_default_perms(self, user, suffix=''):
982 def _get_default_perms(self, user, suffix=''):
983 from rhodecode.model.permission import PermissionModel
983 from rhodecode.model.permission import PermissionModel
984 return PermissionModel().get_default_perms(user.user_perms, suffix)
984 return PermissionModel().get_default_perms(user.user_perms, suffix)
985
985
986 def get_default_perms(self, suffix=''):
986 def get_default_perms(self, suffix=''):
987 return self._get_default_perms(self, suffix)
987 return self._get_default_perms(self, suffix)
988
988
989 def get_api_data(self, include_secrets=False, details='full'):
989 def get_api_data(self, include_secrets=False, details='full'):
990 """
990 """
991 Common function for generating user related data for API
991 Common function for generating user related data for API
992
992
993 :param include_secrets: By default secrets in the API data will be replaced
993 :param include_secrets: By default secrets in the API data will be replaced
994 by a placeholder value to prevent exposing this data by accident. In case
994 by a placeholder value to prevent exposing this data by accident. In case
995 this data shall be exposed, set this flag to ``True``.
995 this data shall be exposed, set this flag to ``True``.
996
996
997 :param details: details can be 'basic|full' basic gives only a subset of
997 :param details: details can be 'basic|full' basic gives only a subset of
998 the available user information that includes user_id, name and emails.
998 the available user information that includes user_id, name and emails.
999 """
999 """
1000 user = self
1000 user = self
1001 user_data = self.user_data
1001 user_data = self.user_data
1002 data = {
1002 data = {
1003 'user_id': user.user_id,
1003 'user_id': user.user_id,
1004 'username': user.username,
1004 'username': user.username,
1005 'firstname': user.name,
1005 'firstname': user.name,
1006 'lastname': user.lastname,
1006 'lastname': user.lastname,
1007 'email': user.email,
1007 'email': user.email,
1008 'emails': user.emails,
1008 'emails': user.emails,
1009 }
1009 }
1010 if details == 'basic':
1010 if details == 'basic':
1011 return data
1011 return data
1012
1012
1013 auth_token_length = 40
1013 auth_token_length = 40
1014 auth_token_replacement = '*' * auth_token_length
1014 auth_token_replacement = '*' * auth_token_length
1015
1015
1016 extras = {
1016 extras = {
1017 'auth_tokens': [auth_token_replacement],
1017 'auth_tokens': [auth_token_replacement],
1018 'active': user.active,
1018 'active': user.active,
1019 'admin': user.admin,
1019 'admin': user.admin,
1020 'extern_type': user.extern_type,
1020 'extern_type': user.extern_type,
1021 'extern_name': user.extern_name,
1021 'extern_name': user.extern_name,
1022 'last_login': user.last_login,
1022 'last_login': user.last_login,
1023 'last_activity': user.last_activity,
1023 'last_activity': user.last_activity,
1024 'ip_addresses': user.ip_addresses,
1024 'ip_addresses': user.ip_addresses,
1025 'language': user_data.get('language')
1025 'language': user_data.get('language')
1026 }
1026 }
1027 data.update(extras)
1027 data.update(extras)
1028
1028
1029 if include_secrets:
1029 if include_secrets:
1030 data['auth_tokens'] = user.auth_tokens
1030 data['auth_tokens'] = user.auth_tokens
1031 return data
1031 return data
1032
1032
1033 def __json__(self):
1033 def __json__(self):
1034 data = {
1034 data = {
1035 'full_name': self.full_name,
1035 'full_name': self.full_name,
1036 'full_name_or_username': self.full_name_or_username,
1036 'full_name_or_username': self.full_name_or_username,
1037 'short_contact': self.short_contact,
1037 'short_contact': self.short_contact,
1038 'full_contact': self.full_contact,
1038 'full_contact': self.full_contact,
1039 }
1039 }
1040 data.update(self.get_api_data())
1040 data.update(self.get_api_data())
1041 return data
1041 return data
1042
1042
1043
1043
1044 class UserApiKeys(Base, BaseModel):
1044 class UserApiKeys(Base, BaseModel):
1045 __tablename__ = 'user_api_keys'
1045 __tablename__ = 'user_api_keys'
1046 __table_args__ = (
1046 __table_args__ = (
1047 Index('uak_api_key_idx', 'api_key', unique=True),
1047 Index('uak_api_key_idx', 'api_key', unique=True),
1048 Index('uak_api_key_expires_idx', 'api_key', 'expires'),
1048 Index('uak_api_key_expires_idx', 'api_key', 'expires'),
1049 base_table_args
1049 base_table_args
1050 )
1050 )
1051 __mapper_args__ = {}
1051 __mapper_args__ = {}
1052
1052
1053 # ApiKey role
1053 # ApiKey role
1054 ROLE_ALL = 'token_role_all'
1054 ROLE_ALL = 'token_role_all'
1055 ROLE_HTTP = 'token_role_http'
1055 ROLE_HTTP = 'token_role_http'
1056 ROLE_VCS = 'token_role_vcs'
1056 ROLE_VCS = 'token_role_vcs'
1057 ROLE_API = 'token_role_api'
1057 ROLE_API = 'token_role_api'
1058 ROLE_FEED = 'token_role_feed'
1058 ROLE_FEED = 'token_role_feed'
1059 ROLE_PASSWORD_RESET = 'token_password_reset'
1059 ROLE_PASSWORD_RESET = 'token_password_reset'
1060
1060
1061 ROLES = [ROLE_ALL, ROLE_HTTP, ROLE_VCS, ROLE_API, ROLE_FEED]
1061 ROLES = [ROLE_ALL, ROLE_HTTP, ROLE_VCS, ROLE_API, ROLE_FEED]
1062
1062
1063 user_api_key_id = Column("user_api_key_id", Integer(), nullable=False, unique=True, default=None, primary_key=True)
1063 user_api_key_id = Column("user_api_key_id", Integer(), nullable=False, unique=True, default=None, primary_key=True)
1064 user_id = Column("user_id", Integer(), ForeignKey('users.user_id'), nullable=True, unique=None, default=None)
1064 user_id = Column("user_id", Integer(), ForeignKey('users.user_id'), nullable=True, unique=None, default=None)
1065 api_key = Column("api_key", String(255), nullable=False, unique=True)
1065 api_key = Column("api_key", String(255), nullable=False, unique=True)
1066 description = Column('description', UnicodeText().with_variant(UnicodeText(1024), 'mysql'))
1066 description = Column('description', UnicodeText().with_variant(UnicodeText(1024), 'mysql'))
1067 expires = Column('expires', Float(53), nullable=False)
1067 expires = Column('expires', Float(53), nullable=False)
1068 role = Column('role', String(255), nullable=True)
1068 role = Column('role', String(255), nullable=True)
1069 created_on = Column('created_on', DateTime(timezone=False), nullable=False, default=datetime.datetime.now)
1069 created_on = Column('created_on', DateTime(timezone=False), nullable=False, default=datetime.datetime.now)
1070
1070
1071 # scope columns
1071 # scope columns
1072 repo_id = Column(
1072 repo_id = Column(
1073 'repo_id', Integer(), ForeignKey('repositories.repo_id'),
1073 'repo_id', Integer(), ForeignKey('repositories.repo_id'),
1074 nullable=True, unique=None, default=None)
1074 nullable=True, unique=None, default=None)
1075 repo = relationship('Repository', lazy='joined')
1075 repo = relationship('Repository', lazy='joined')
1076
1076
1077 repo_group_id = Column(
1077 repo_group_id = Column(
1078 'repo_group_id', Integer(), ForeignKey('groups.group_id'),
1078 'repo_group_id', Integer(), ForeignKey('groups.group_id'),
1079 nullable=True, unique=None, default=None)
1079 nullable=True, unique=None, default=None)
1080 repo_group = relationship('RepoGroup', lazy='joined')
1080 repo_group = relationship('RepoGroup', lazy='joined')
1081
1081
1082 user = relationship('User', lazy='joined')
1082 user = relationship('User', lazy='joined')
1083
1083
1084 def __unicode__(self):
1084 def __unicode__(self):
1085 return u"<%s('%s')>" % (self.__class__.__name__, self.role)
1085 return u"<%s('%s')>" % (self.__class__.__name__, self.role)
1086
1086
1087 def __json__(self):
1087 def __json__(self):
1088 data = {
1088 data = {
1089 'auth_token': self.api_key,
1089 'auth_token': self.api_key,
1090 'role': self.role,
1090 'role': self.role,
1091 'scope': self.scope_humanized,
1091 'scope': self.scope_humanized,
1092 'expired': self.expired
1092 'expired': self.expired
1093 }
1093 }
1094 return data
1094 return data
1095
1095
1096 def get_api_data(self, include_secrets=False):
1096 def get_api_data(self, include_secrets=False):
1097 data = self.__json__()
1097 data = self.__json__()
1098 if include_secrets:
1098 if include_secrets:
1099 return data
1099 return data
1100 else:
1100 else:
1101 data['auth_token'] = self.token_obfuscated
1101 data['auth_token'] = self.token_obfuscated
1102 return data
1102 return data
1103
1103
1104 @hybrid_property
1104 @hybrid_property
1105 def description_safe(self):
1105 def description_safe(self):
1106 from rhodecode.lib import helpers as h
1106 from rhodecode.lib import helpers as h
1107 return h.escape(self.description)
1107 return h.escape(self.description)
1108
1108
1109 @property
1109 @property
1110 def expired(self):
1110 def expired(self):
1111 if self.expires == -1:
1111 if self.expires == -1:
1112 return False
1112 return False
1113 return time.time() > self.expires
1113 return time.time() > self.expires
1114
1114
1115 @classmethod
1115 @classmethod
1116 def _get_role_name(cls, role):
1116 def _get_role_name(cls, role):
1117 return {
1117 return {
1118 cls.ROLE_ALL: _('all'),
1118 cls.ROLE_ALL: _('all'),
1119 cls.ROLE_HTTP: _('http/web interface'),
1119 cls.ROLE_HTTP: _('http/web interface'),
1120 cls.ROLE_VCS: _('vcs (git/hg/svn protocol)'),
1120 cls.ROLE_VCS: _('vcs (git/hg/svn protocol)'),
1121 cls.ROLE_API: _('api calls'),
1121 cls.ROLE_API: _('api calls'),
1122 cls.ROLE_FEED: _('feed access'),
1122 cls.ROLE_FEED: _('feed access'),
1123 }.get(role, role)
1123 }.get(role, role)
1124
1124
1125 @property
1125 @property
1126 def role_humanized(self):
1126 def role_humanized(self):
1127 return self._get_role_name(self.role)
1127 return self._get_role_name(self.role)
1128
1128
1129 def _get_scope(self):
1129 def _get_scope(self):
1130 if self.repo:
1130 if self.repo:
1131 return repr(self.repo)
1131 return repr(self.repo)
1132 if self.repo_group:
1132 if self.repo_group:
1133 return repr(self.repo_group) + ' (recursive)'
1133 return repr(self.repo_group) + ' (recursive)'
1134 return 'global'
1134 return 'global'
1135
1135
1136 @property
1136 @property
1137 def scope_humanized(self):
1137 def scope_humanized(self):
1138 return self._get_scope()
1138 return self._get_scope()
1139
1139
1140 @property
1140 @property
1141 def token_obfuscated(self):
1141 def token_obfuscated(self):
1142 if self.api_key:
1142 if self.api_key:
1143 return self.api_key[:4] + "****"
1143 return self.api_key[:4] + "****"
1144
1144
1145
1145
1146 class UserEmailMap(Base, BaseModel):
1146 class UserEmailMap(Base, BaseModel):
1147 __tablename__ = 'user_email_map'
1147 __tablename__ = 'user_email_map'
1148 __table_args__ = (
1148 __table_args__ = (
1149 Index('uem_email_idx', 'email'),
1149 Index('uem_email_idx', 'email'),
1150 UniqueConstraint('email'),
1150 UniqueConstraint('email'),
1151 base_table_args
1151 base_table_args
1152 )
1152 )
1153 __mapper_args__ = {}
1153 __mapper_args__ = {}
1154
1154
1155 email_id = Column("email_id", Integer(), nullable=False, unique=True, default=None, primary_key=True)
1155 email_id = Column("email_id", Integer(), nullable=False, unique=True, default=None, primary_key=True)
1156 user_id = Column("user_id", Integer(), ForeignKey('users.user_id'), nullable=True, unique=None, default=None)
1156 user_id = Column("user_id", Integer(), ForeignKey('users.user_id'), nullable=True, unique=None, default=None)
1157 _email = Column("email", String(255), nullable=True, unique=False, default=None)
1157 _email = Column("email", String(255), nullable=True, unique=False, default=None)
1158 user = relationship('User', lazy='joined')
1158 user = relationship('User', lazy='joined')
1159
1159
1160 @validates('_email')
1160 @validates('_email')
1161 def validate_email(self, key, email):
1161 def validate_email(self, key, email):
1162 # check if this email is not main one
1162 # check if this email is not main one
1163 main_email = Session().query(User).filter(User.email == email).scalar()
1163 main_email = Session().query(User).filter(User.email == email).scalar()
1164 if main_email is not None:
1164 if main_email is not None:
1165 raise AttributeError('email %s is present is user table' % email)
1165 raise AttributeError('email %s is present is user table' % email)
1166 return email
1166 return email
1167
1167
1168 @hybrid_property
1168 @hybrid_property
1169 def email(self):
1169 def email(self):
1170 return self._email
1170 return self._email
1171
1171
1172 @email.setter
1172 @email.setter
1173 def email(self, val):
1173 def email(self, val):
1174 self._email = val.lower() if val else None
1174 self._email = val.lower() if val else None
1175
1175
1176
1176
1177 class UserIpMap(Base, BaseModel):
1177 class UserIpMap(Base, BaseModel):
1178 __tablename__ = 'user_ip_map'
1178 __tablename__ = 'user_ip_map'
1179 __table_args__ = (
1179 __table_args__ = (
1180 UniqueConstraint('user_id', 'ip_addr'),
1180 UniqueConstraint('user_id', 'ip_addr'),
1181 base_table_args
1181 base_table_args
1182 )
1182 )
1183 __mapper_args__ = {}
1183 __mapper_args__ = {}
1184
1184
1185 ip_id = Column("ip_id", Integer(), nullable=False, unique=True, default=None, primary_key=True)
1185 ip_id = Column("ip_id", Integer(), nullable=False, unique=True, default=None, primary_key=True)
1186 user_id = Column("user_id", Integer(), ForeignKey('users.user_id'), nullable=True, unique=None, default=None)
1186 user_id = Column("user_id", Integer(), ForeignKey('users.user_id'), nullable=True, unique=None, default=None)
1187 ip_addr = Column("ip_addr", String(255), nullable=True, unique=False, default=None)
1187 ip_addr = Column("ip_addr", String(255), nullable=True, unique=False, default=None)
1188 active = Column("active", Boolean(), nullable=True, unique=None, default=True)
1188 active = Column("active", Boolean(), nullable=True, unique=None, default=True)
1189 description = Column("description", String(10000), nullable=True, unique=None, default=None)
1189 description = Column("description", String(10000), nullable=True, unique=None, default=None)
1190 user = relationship('User', lazy='joined')
1190 user = relationship('User', lazy='joined')
1191
1191
1192 @hybrid_property
1192 @hybrid_property
1193 def description_safe(self):
1193 def description_safe(self):
1194 from rhodecode.lib import helpers as h
1194 from rhodecode.lib import helpers as h
1195 return h.escape(self.description)
1195 return h.escape(self.description)
1196
1196
1197 @classmethod
1197 @classmethod
1198 def _get_ip_range(cls, ip_addr):
1198 def _get_ip_range(cls, ip_addr):
1199 net = ipaddress.ip_network(safe_unicode(ip_addr), strict=False)
1199 net = ipaddress.ip_network(safe_unicode(ip_addr), strict=False)
1200 return [str(net.network_address), str(net.broadcast_address)]
1200 return [str(net.network_address), str(net.broadcast_address)]
1201
1201
1202 def __json__(self):
1202 def __json__(self):
1203 return {
1203 return {
1204 'ip_addr': self.ip_addr,
1204 'ip_addr': self.ip_addr,
1205 'ip_range': self._get_ip_range(self.ip_addr),
1205 'ip_range': self._get_ip_range(self.ip_addr),
1206 }
1206 }
1207
1207
1208 def __unicode__(self):
1208 def __unicode__(self):
1209 return u"<%s('user_id:%s=>%s')>" % (self.__class__.__name__,
1209 return u"<%s('user_id:%s=>%s')>" % (self.__class__.__name__,
1210 self.user_id, self.ip_addr)
1210 self.user_id, self.ip_addr)
1211
1211
1212
1212
1213 class UserSshKeys(Base, BaseModel):
1213 class UserSshKeys(Base, BaseModel):
1214 __tablename__ = 'user_ssh_keys'
1214 __tablename__ = 'user_ssh_keys'
1215 __table_args__ = (
1215 __table_args__ = (
1216 Index('usk_ssh_key_fingerprint_idx', 'ssh_key_fingerprint'),
1216 Index('usk_ssh_key_fingerprint_idx', 'ssh_key_fingerprint'),
1217
1217
1218 UniqueConstraint('ssh_key_fingerprint'),
1218 UniqueConstraint('ssh_key_fingerprint'),
1219
1219
1220 base_table_args
1220 base_table_args
1221 )
1221 )
1222 __mapper_args__ = {}
1222 __mapper_args__ = {}
1223
1223
1224 ssh_key_id = Column('ssh_key_id', Integer(), nullable=False, unique=True, default=None, primary_key=True)
1224 ssh_key_id = Column('ssh_key_id', Integer(), nullable=False, unique=True, default=None, primary_key=True)
1225 ssh_key_data = Column('ssh_key_data', String(10240), nullable=False, unique=None, default=None)
1225 ssh_key_data = Column('ssh_key_data', String(10240), nullable=False, unique=None, default=None)
1226 ssh_key_fingerprint = Column('ssh_key_fingerprint', String(255), nullable=False, unique=None, default=None)
1226 ssh_key_fingerprint = Column('ssh_key_fingerprint', String(255), nullable=False, unique=None, default=None)
1227
1227
1228 description = Column('description', UnicodeText().with_variant(UnicodeText(1024), 'mysql'))
1228 description = Column('description', UnicodeText().with_variant(UnicodeText(1024), 'mysql'))
1229
1229
1230 created_on = Column('created_on', DateTime(timezone=False), nullable=False, default=datetime.datetime.now)
1230 created_on = Column('created_on', DateTime(timezone=False), nullable=False, default=datetime.datetime.now)
1231 accessed_on = Column('accessed_on', DateTime(timezone=False), nullable=True, default=None)
1231 accessed_on = Column('accessed_on', DateTime(timezone=False), nullable=True, default=None)
1232 user_id = Column('user_id', Integer(), ForeignKey('users.user_id'), nullable=True, unique=None, default=None)
1232 user_id = Column('user_id', Integer(), ForeignKey('users.user_id'), nullable=True, unique=None, default=None)
1233
1233
1234 user = relationship('User', lazy='joined')
1234 user = relationship('User', lazy='joined')
1235
1235
1236 def __json__(self):
1236 def __json__(self):
1237 data = {
1237 data = {
1238 'ssh_fingerprint': self.ssh_key_fingerprint,
1238 'ssh_fingerprint': self.ssh_key_fingerprint,
1239 'description': self.description,
1239 'description': self.description,
1240 'created_on': self.created_on
1240 'created_on': self.created_on
1241 }
1241 }
1242 return data
1242 return data
1243
1243
1244 def get_api_data(self):
1244 def get_api_data(self):
1245 data = self.__json__()
1245 data = self.__json__()
1246 return data
1246 return data
1247
1247
1248
1248
1249 class UserLog(Base, BaseModel):
1249 class UserLog(Base, BaseModel):
1250 __tablename__ = 'user_logs'
1250 __tablename__ = 'user_logs'
1251 __table_args__ = (
1251 __table_args__ = (
1252 base_table_args,
1252 base_table_args,
1253 )
1253 )
1254
1254
1255 VERSION_1 = 'v1'
1255 VERSION_1 = 'v1'
1256 VERSION_2 = 'v2'
1256 VERSION_2 = 'v2'
1257 VERSIONS = [VERSION_1, VERSION_2]
1257 VERSIONS = [VERSION_1, VERSION_2]
1258
1258
1259 user_log_id = Column("user_log_id", Integer(), nullable=False, unique=True, default=None, primary_key=True)
1259 user_log_id = Column("user_log_id", Integer(), nullable=False, unique=True, default=None, primary_key=True)
1260 user_id = Column("user_id", Integer(), ForeignKey('users.user_id',ondelete='SET NULL'), nullable=True, unique=None, default=None)
1260 user_id = Column("user_id", Integer(), ForeignKey('users.user_id',ondelete='SET NULL'), nullable=True, unique=None, default=None)
1261 username = Column("username", String(255), nullable=True, unique=None, default=None)
1261 username = Column("username", String(255), nullable=True, unique=None, default=None)
1262 repository_id = Column("repository_id", Integer(), ForeignKey('repositories.repo_id', ondelete='SET NULL'), nullable=True, unique=None, default=None)
1262 repository_id = Column("repository_id", Integer(), ForeignKey('repositories.repo_id', ondelete='SET NULL'), nullable=True, unique=None, default=None)
1263 repository_name = Column("repository_name", String(255), nullable=True, unique=None, default=None)
1263 repository_name = Column("repository_name", String(255), nullable=True, unique=None, default=None)
1264 user_ip = Column("user_ip", String(255), nullable=True, unique=None, default=None)
1264 user_ip = Column("user_ip", String(255), nullable=True, unique=None, default=None)
1265 action = Column("action", Text().with_variant(Text(1200000), 'mysql'), nullable=True, unique=None, default=None)
1265 action = Column("action", Text().with_variant(Text(1200000), 'mysql'), nullable=True, unique=None, default=None)
1266 action_date = Column("action_date", DateTime(timezone=False), nullable=True, unique=None, default=None)
1266 action_date = Column("action_date", DateTime(timezone=False), nullable=True, unique=None, default=None)
1267
1267
1268 version = Column("version", String(255), nullable=True, default=VERSION_1)
1268 version = Column("version", String(255), nullable=True, default=VERSION_1)
1269 user_data = Column('user_data_json', MutationObj.as_mutable(JsonType(dialect_map=dict(mysql=LONGTEXT()))))
1269 user_data = Column('user_data_json', MutationObj.as_mutable(JsonType(dialect_map=dict(mysql=LONGTEXT()))))
1270 action_data = Column('action_data_json', MutationObj.as_mutable(JsonType(dialect_map=dict(mysql=LONGTEXT()))))
1270 action_data = Column('action_data_json', MutationObj.as_mutable(JsonType(dialect_map=dict(mysql=LONGTEXT()))))
1271
1271
1272 def __unicode__(self):
1272 def __unicode__(self):
1273 return u"<%s('id:%s:%s')>" % (
1273 return u"<%s('id:%s:%s')>" % (
1274 self.__class__.__name__, self.repository_name, self.action)
1274 self.__class__.__name__, self.repository_name, self.action)
1275
1275
1276 def __json__(self):
1276 def __json__(self):
1277 return {
1277 return {
1278 'user_id': self.user_id,
1278 'user_id': self.user_id,
1279 'username': self.username,
1279 'username': self.username,
1280 'repository_id': self.repository_id,
1280 'repository_id': self.repository_id,
1281 'repository_name': self.repository_name,
1281 'repository_name': self.repository_name,
1282 'user_ip': self.user_ip,
1282 'user_ip': self.user_ip,
1283 'action_date': self.action_date,
1283 'action_date': self.action_date,
1284 'action': self.action,
1284 'action': self.action,
1285 }
1285 }
1286
1286
1287 @hybrid_property
1287 @hybrid_property
1288 def entry_id(self):
1288 def entry_id(self):
1289 return self.user_log_id
1289 return self.user_log_id
1290
1290
1291 @property
1291 @property
1292 def action_as_day(self):
1292 def action_as_day(self):
1293 return datetime.date(*self.action_date.timetuple()[:3])
1293 return datetime.date(*self.action_date.timetuple()[:3])
1294
1294
1295 user = relationship('User')
1295 user = relationship('User')
1296 repository = relationship('Repository', cascade='')
1296 repository = relationship('Repository', cascade='')
1297
1297
1298
1298
1299 class UserGroup(Base, BaseModel):
1299 class UserGroup(Base, BaseModel):
1300 __tablename__ = 'users_groups'
1300 __tablename__ = 'users_groups'
1301 __table_args__ = (
1301 __table_args__ = (
1302 base_table_args,
1302 base_table_args,
1303 )
1303 )
1304
1304
1305 users_group_id = Column("users_group_id", Integer(), nullable=False, unique=True, default=None, primary_key=True)
1305 users_group_id = Column("users_group_id", Integer(), nullable=False, unique=True, default=None, primary_key=True)
1306 users_group_name = Column("users_group_name", String(255), nullable=False, unique=True, default=None)
1306 users_group_name = Column("users_group_name", String(255), nullable=False, unique=True, default=None)
1307 user_group_description = Column("user_group_description", String(10000), nullable=True, unique=None, default=None)
1307 user_group_description = Column("user_group_description", String(10000), nullable=True, unique=None, default=None)
1308 users_group_active = Column("users_group_active", Boolean(), nullable=True, unique=None, default=None)
1308 users_group_active = Column("users_group_active", Boolean(), nullable=True, unique=None, default=None)
1309 inherit_default_permissions = Column("users_group_inherit_default_permissions", Boolean(), nullable=False, unique=None, default=True)
1309 inherit_default_permissions = Column("users_group_inherit_default_permissions", Boolean(), nullable=False, unique=None, default=True)
1310 user_id = Column("user_id", Integer(), ForeignKey('users.user_id'), nullable=False, unique=False, default=None)
1310 user_id = Column("user_id", Integer(), ForeignKey('users.user_id'), nullable=False, unique=False, default=None)
1311 created_on = Column('created_on', DateTime(timezone=False), nullable=False, default=datetime.datetime.now)
1311 created_on = Column('created_on', DateTime(timezone=False), nullable=False, default=datetime.datetime.now)
1312 _group_data = Column("group_data", LargeBinary(), nullable=True) # JSON data
1312 _group_data = Column("group_data", LargeBinary(), nullable=True) # JSON data
1313
1313
1314 members = relationship('UserGroupMember', cascade="all, delete, delete-orphan", lazy="joined")
1314 members = relationship('UserGroupMember', cascade="all, delete, delete-orphan", lazy="joined")
1315 users_group_to_perm = relationship('UserGroupToPerm', cascade='all')
1315 users_group_to_perm = relationship('UserGroupToPerm', cascade='all')
1316 users_group_repo_to_perm = relationship('UserGroupRepoToPerm', cascade='all')
1316 users_group_repo_to_perm = relationship('UserGroupRepoToPerm', cascade='all')
1317 users_group_repo_group_to_perm = relationship('UserGroupRepoGroupToPerm', cascade='all')
1317 users_group_repo_group_to_perm = relationship('UserGroupRepoGroupToPerm', cascade='all')
1318 user_user_group_to_perm = relationship('UserUserGroupToPerm', cascade='all')
1318 user_user_group_to_perm = relationship('UserUserGroupToPerm', cascade='all')
1319 user_group_user_group_to_perm = relationship('UserGroupUserGroupToPerm ', primaryjoin="UserGroupUserGroupToPerm.target_user_group_id==UserGroup.users_group_id", cascade='all')
1319 user_group_user_group_to_perm = relationship('UserGroupUserGroupToPerm ', primaryjoin="UserGroupUserGroupToPerm.target_user_group_id==UserGroup.users_group_id", cascade='all')
1320
1320
1321 user_group_review_rules = relationship('RepoReviewRuleUserGroup', cascade='all')
1321 user_group_review_rules = relationship('RepoReviewRuleUserGroup', cascade='all')
1322 user = relationship('User', primaryjoin="User.user_id==UserGroup.user_id")
1322 user = relationship('User', primaryjoin="User.user_id==UserGroup.user_id")
1323
1323
1324 @classmethod
1324 @classmethod
1325 def _load_group_data(cls, column):
1325 def _load_group_data(cls, column):
1326 if not column:
1326 if not column:
1327 return {}
1327 return {}
1328
1328
1329 try:
1329 try:
1330 return json.loads(column) or {}
1330 return json.loads(column) or {}
1331 except TypeError:
1331 except TypeError:
1332 return {}
1332 return {}
1333
1333
1334 @hybrid_property
1334 @hybrid_property
1335 def description_safe(self):
1335 def description_safe(self):
1336 from rhodecode.lib import helpers as h
1336 from rhodecode.lib import helpers as h
1337 return h.escape(self.user_group_description)
1337 return h.escape(self.user_group_description)
1338
1338
1339 @hybrid_property
1339 @hybrid_property
1340 def group_data(self):
1340 def group_data(self):
1341 return self._load_group_data(self._group_data)
1341 return self._load_group_data(self._group_data)
1342
1342
1343 @group_data.expression
1343 @group_data.expression
1344 def group_data(self, **kwargs):
1344 def group_data(self, **kwargs):
1345 return self._group_data
1345 return self._group_data
1346
1346
1347 @group_data.setter
1347 @group_data.setter
1348 def group_data(self, val):
1348 def group_data(self, val):
1349 try:
1349 try:
1350 self._group_data = json.dumps(val)
1350 self._group_data = json.dumps(val)
1351 except Exception:
1351 except Exception:
1352 log.error(traceback.format_exc())
1352 log.error(traceback.format_exc())
1353
1353
1354 @classmethod
1354 @classmethod
1355 def _load_sync(cls, group_data):
1355 def _load_sync(cls, group_data):
1356 if group_data:
1356 if group_data:
1357 return group_data.get('extern_type')
1357 return group_data.get('extern_type')
1358
1358
1359 @property
1359 @property
1360 def sync(self):
1360 def sync(self):
1361 return self._load_sync(self.group_data)
1361 return self._load_sync(self.group_data)
1362
1362
1363 def __unicode__(self):
1363 def __unicode__(self):
1364 return u"<%s('id:%s:%s')>" % (self.__class__.__name__,
1364 return u"<%s('id:%s:%s')>" % (self.__class__.__name__,
1365 self.users_group_id,
1365 self.users_group_id,
1366 self.users_group_name)
1366 self.users_group_name)
1367
1367
1368 @classmethod
1368 @classmethod
1369 def get_by_group_name(cls, group_name, cache=False,
1369 def get_by_group_name(cls, group_name, cache=False,
1370 case_insensitive=False):
1370 case_insensitive=False):
1371 if case_insensitive:
1371 if case_insensitive:
1372 q = cls.query().filter(func.lower(cls.users_group_name) ==
1372 q = cls.query().filter(func.lower(cls.users_group_name) ==
1373 func.lower(group_name))
1373 func.lower(group_name))
1374
1374
1375 else:
1375 else:
1376 q = cls.query().filter(cls.users_group_name == group_name)
1376 q = cls.query().filter(cls.users_group_name == group_name)
1377 if cache:
1377 if cache:
1378 q = q.options(
1378 q = q.options(
1379 FromCache("sql_cache_short", "get_group_%s" % _hash_key(group_name)))
1379 FromCache("sql_cache_short", "get_group_%s" % _hash_key(group_name)))
1380 return q.scalar()
1380 return q.scalar()
1381
1381
1382 @classmethod
1382 @classmethod
1383 def get(cls, user_group_id, cache=False):
1383 def get(cls, user_group_id, cache=False):
1384 if not user_group_id:
1384 if not user_group_id:
1385 return
1385 return
1386
1386
1387 user_group = cls.query()
1387 user_group = cls.query()
1388 if cache:
1388 if cache:
1389 user_group = user_group.options(
1389 user_group = user_group.options(
1390 FromCache("sql_cache_short", "get_users_group_%s" % user_group_id))
1390 FromCache("sql_cache_short", "get_users_group_%s" % user_group_id))
1391 return user_group.get(user_group_id)
1391 return user_group.get(user_group_id)
1392
1392
1393 def permissions(self, with_admins=True, with_owner=True):
1393 def permissions(self, with_admins=True, with_owner=True):
1394 """
1394 """
1395 Permissions for user groups
1395 Permissions for user groups
1396 """
1396 """
1397 _admin_perm = 'usergroup.admin'
1397 _admin_perm = 'usergroup.admin'
1398
1398
1399 owner_row = []
1399 owner_row = []
1400 if with_owner:
1400 if with_owner:
1401 usr = AttributeDict(self.user.get_dict())
1401 usr = AttributeDict(self.user.get_dict())
1402 usr.owner_row = True
1402 usr.owner_row = True
1403 usr.permission = _admin_perm
1403 usr.permission = _admin_perm
1404 owner_row.append(usr)
1404 owner_row.append(usr)
1405
1405
1406 super_admin_ids = []
1406 super_admin_ids = []
1407 super_admin_rows = []
1407 super_admin_rows = []
1408 if with_admins:
1408 if with_admins:
1409 for usr in User.get_all_super_admins():
1409 for usr in User.get_all_super_admins():
1410 super_admin_ids.append(usr.user_id)
1410 super_admin_ids.append(usr.user_id)
1411 # if this admin is also owner, don't double the record
1411 # if this admin is also owner, don't double the record
1412 if usr.user_id == owner_row[0].user_id:
1412 if usr.user_id == owner_row[0].user_id:
1413 owner_row[0].admin_row = True
1413 owner_row[0].admin_row = True
1414 else:
1414 else:
1415 usr = AttributeDict(usr.get_dict())
1415 usr = AttributeDict(usr.get_dict())
1416 usr.admin_row = True
1416 usr.admin_row = True
1417 usr.permission = _admin_perm
1417 usr.permission = _admin_perm
1418 super_admin_rows.append(usr)
1418 super_admin_rows.append(usr)
1419
1419
1420 q = UserUserGroupToPerm.query().filter(UserUserGroupToPerm.user_group == self)
1420 q = UserUserGroupToPerm.query().filter(UserUserGroupToPerm.user_group == self)
1421 q = q.options(joinedload(UserUserGroupToPerm.user_group),
1421 q = q.options(joinedload(UserUserGroupToPerm.user_group),
1422 joinedload(UserUserGroupToPerm.user),
1422 joinedload(UserUserGroupToPerm.user),
1423 joinedload(UserUserGroupToPerm.permission),)
1423 joinedload(UserUserGroupToPerm.permission),)
1424
1424
1425 # get owners and admins and permissions. We do a trick of re-writing
1425 # get owners and admins and permissions. We do a trick of re-writing
1426 # objects from sqlalchemy to named-tuples due to sqlalchemy session
1426 # objects from sqlalchemy to named-tuples due to sqlalchemy session
1427 # has a global reference and changing one object propagates to all
1427 # has a global reference and changing one object propagates to all
1428 # others. This means if admin is also an owner admin_row that change
1428 # others. This means if admin is also an owner admin_row that change
1429 # would propagate to both objects
1429 # would propagate to both objects
1430 perm_rows = []
1430 perm_rows = []
1431 for _usr in q.all():
1431 for _usr in q.all():
1432 usr = AttributeDict(_usr.user.get_dict())
1432 usr = AttributeDict(_usr.user.get_dict())
1433 # if this user is also owner/admin, mark as duplicate record
1433 # if this user is also owner/admin, mark as duplicate record
1434 if usr.user_id == owner_row[0].user_id or usr.user_id in super_admin_ids:
1434 if usr.user_id == owner_row[0].user_id or usr.user_id in super_admin_ids:
1435 usr.duplicate_perm = True
1435 usr.duplicate_perm = True
1436 usr.permission = _usr.permission.permission_name
1436 usr.permission = _usr.permission.permission_name
1437 perm_rows.append(usr)
1437 perm_rows.append(usr)
1438
1438
1439 # filter the perm rows by 'default' first and then sort them by
1439 # filter the perm rows by 'default' first and then sort them by
1440 # admin,write,read,none permissions sorted again alphabetically in
1440 # admin,write,read,none permissions sorted again alphabetically in
1441 # each group
1441 # each group
1442 perm_rows = sorted(perm_rows, key=display_user_sort)
1442 perm_rows = sorted(perm_rows, key=display_user_sort)
1443
1443
1444 return super_admin_rows + owner_row + perm_rows
1444 return super_admin_rows + owner_row + perm_rows
1445
1445
1446 def permission_user_groups(self):
1446 def permission_user_groups(self):
1447 q = UserGroupUserGroupToPerm.query().filter(UserGroupUserGroupToPerm.target_user_group == self)
1447 q = UserGroupUserGroupToPerm.query().filter(UserGroupUserGroupToPerm.target_user_group == self)
1448 q = q.options(joinedload(UserGroupUserGroupToPerm.user_group),
1448 q = q.options(joinedload(UserGroupUserGroupToPerm.user_group),
1449 joinedload(UserGroupUserGroupToPerm.target_user_group),
1449 joinedload(UserGroupUserGroupToPerm.target_user_group),
1450 joinedload(UserGroupUserGroupToPerm.permission),)
1450 joinedload(UserGroupUserGroupToPerm.permission),)
1451
1451
1452 perm_rows = []
1452 perm_rows = []
1453 for _user_group in q.all():
1453 for _user_group in q.all():
1454 usr = AttributeDict(_user_group.user_group.get_dict())
1454 usr = AttributeDict(_user_group.user_group.get_dict())
1455 usr.permission = _user_group.permission.permission_name
1455 usr.permission = _user_group.permission.permission_name
1456 perm_rows.append(usr)
1456 perm_rows.append(usr)
1457
1457
1458 perm_rows = sorted(perm_rows, key=display_user_group_sort)
1458 perm_rows = sorted(perm_rows, key=display_user_group_sort)
1459 return perm_rows
1459 return perm_rows
1460
1460
1461 def _get_default_perms(self, user_group, suffix=''):
1461 def _get_default_perms(self, user_group, suffix=''):
1462 from rhodecode.model.permission import PermissionModel
1462 from rhodecode.model.permission import PermissionModel
1463 return PermissionModel().get_default_perms(user_group.users_group_to_perm, suffix)
1463 return PermissionModel().get_default_perms(user_group.users_group_to_perm, suffix)
1464
1464
1465 def get_default_perms(self, suffix=''):
1465 def get_default_perms(self, suffix=''):
1466 return self._get_default_perms(self, suffix)
1466 return self._get_default_perms(self, suffix)
1467
1467
1468 def get_api_data(self, with_group_members=True, include_secrets=False):
1468 def get_api_data(self, with_group_members=True, include_secrets=False):
1469 """
1469 """
1470 :param include_secrets: See :meth:`User.get_api_data`, this parameter is
1470 :param include_secrets: See :meth:`User.get_api_data`, this parameter is
1471 basically forwarded.
1471 basically forwarded.
1472
1472
1473 """
1473 """
1474 user_group = self
1474 user_group = self
1475 data = {
1475 data = {
1476 'users_group_id': user_group.users_group_id,
1476 'users_group_id': user_group.users_group_id,
1477 'group_name': user_group.users_group_name,
1477 'group_name': user_group.users_group_name,
1478 'group_description': user_group.user_group_description,
1478 'group_description': user_group.user_group_description,
1479 'active': user_group.users_group_active,
1479 'active': user_group.users_group_active,
1480 'owner': user_group.user.username,
1480 'owner': user_group.user.username,
1481 'sync': user_group.sync,
1481 'sync': user_group.sync,
1482 'owner_email': user_group.user.email,
1482 'owner_email': user_group.user.email,
1483 }
1483 }
1484
1484
1485 if with_group_members:
1485 if with_group_members:
1486 users = []
1486 users = []
1487 for user in user_group.members:
1487 for user in user_group.members:
1488 user = user.user
1488 user = user.user
1489 users.append(user.get_api_data(include_secrets=include_secrets))
1489 users.append(user.get_api_data(include_secrets=include_secrets))
1490 data['users'] = users
1490 data['users'] = users
1491
1491
1492 return data
1492 return data
1493
1493
1494
1494
1495 class UserGroupMember(Base, BaseModel):
1495 class UserGroupMember(Base, BaseModel):
1496 __tablename__ = 'users_groups_members'
1496 __tablename__ = 'users_groups_members'
1497 __table_args__ = (
1497 __table_args__ = (
1498 base_table_args,
1498 base_table_args,
1499 )
1499 )
1500
1500
1501 users_group_member_id = Column("users_group_member_id", Integer(), nullable=False, unique=True, default=None, primary_key=True)
1501 users_group_member_id = Column("users_group_member_id", Integer(), nullable=False, unique=True, default=None, primary_key=True)
1502 users_group_id = Column("users_group_id", Integer(), ForeignKey('users_groups.users_group_id'), nullable=False, unique=None, default=None)
1502 users_group_id = Column("users_group_id", Integer(), ForeignKey('users_groups.users_group_id'), nullable=False, unique=None, default=None)
1503 user_id = Column("user_id", Integer(), ForeignKey('users.user_id'), nullable=False, unique=None, default=None)
1503 user_id = Column("user_id", Integer(), ForeignKey('users.user_id'), nullable=False, unique=None, default=None)
1504
1504
1505 user = relationship('User', lazy='joined')
1505 user = relationship('User', lazy='joined')
1506 users_group = relationship('UserGroup')
1506 users_group = relationship('UserGroup')
1507
1507
1508 def __init__(self, gr_id='', u_id=''):
1508 def __init__(self, gr_id='', u_id=''):
1509 self.users_group_id = gr_id
1509 self.users_group_id = gr_id
1510 self.user_id = u_id
1510 self.user_id = u_id
1511
1511
1512
1512
1513 class RepositoryField(Base, BaseModel):
1513 class RepositoryField(Base, BaseModel):
1514 __tablename__ = 'repositories_fields'
1514 __tablename__ = 'repositories_fields'
1515 __table_args__ = (
1515 __table_args__ = (
1516 UniqueConstraint('repository_id', 'field_key'), # no-multi field
1516 UniqueConstraint('repository_id', 'field_key'), # no-multi field
1517 base_table_args,
1517 base_table_args,
1518 )
1518 )
1519
1519
1520 PREFIX = 'ex_' # prefix used in form to not conflict with already existing fields
1520 PREFIX = 'ex_' # prefix used in form to not conflict with already existing fields
1521
1521
1522 repo_field_id = Column("repo_field_id", Integer(), nullable=False, unique=True, default=None, primary_key=True)
1522 repo_field_id = Column("repo_field_id", Integer(), nullable=False, unique=True, default=None, primary_key=True)
1523 repository_id = Column("repository_id", Integer(), ForeignKey('repositories.repo_id'), nullable=False, unique=None, default=None)
1523 repository_id = Column("repository_id", Integer(), ForeignKey('repositories.repo_id'), nullable=False, unique=None, default=None)
1524 field_key = Column("field_key", String(250))
1524 field_key = Column("field_key", String(250))
1525 field_label = Column("field_label", String(1024), nullable=False)
1525 field_label = Column("field_label", String(1024), nullable=False)
1526 field_value = Column("field_value", String(10000), nullable=False)
1526 field_value = Column("field_value", String(10000), nullable=False)
1527 field_desc = Column("field_desc", String(1024), nullable=False)
1527 field_desc = Column("field_desc", String(1024), nullable=False)
1528 field_type = Column("field_type", String(255), nullable=False, unique=None)
1528 field_type = Column("field_type", String(255), nullable=False, unique=None)
1529 created_on = Column('created_on', DateTime(timezone=False), nullable=False, default=datetime.datetime.now)
1529 created_on = Column('created_on', DateTime(timezone=False), nullable=False, default=datetime.datetime.now)
1530
1530
1531 repository = relationship('Repository')
1531 repository = relationship('Repository')
1532
1532
1533 @property
1533 @property
1534 def field_key_prefixed(self):
1534 def field_key_prefixed(self):
1535 return 'ex_%s' % self.field_key
1535 return 'ex_%s' % self.field_key
1536
1536
1537 @classmethod
1537 @classmethod
1538 def un_prefix_key(cls, key):
1538 def un_prefix_key(cls, key):
1539 if key.startswith(cls.PREFIX):
1539 if key.startswith(cls.PREFIX):
1540 return key[len(cls.PREFIX):]
1540 return key[len(cls.PREFIX):]
1541 return key
1541 return key
1542
1542
1543 @classmethod
1543 @classmethod
1544 def get_by_key_name(cls, key, repo):
1544 def get_by_key_name(cls, key, repo):
1545 row = cls.query()\
1545 row = cls.query()\
1546 .filter(cls.repository == repo)\
1546 .filter(cls.repository == repo)\
1547 .filter(cls.field_key == key).scalar()
1547 .filter(cls.field_key == key).scalar()
1548 return row
1548 return row
1549
1549
1550
1550
1551 class Repository(Base, BaseModel):
1551 class Repository(Base, BaseModel):
1552 __tablename__ = 'repositories'
1552 __tablename__ = 'repositories'
1553 __table_args__ = (
1553 __table_args__ = (
1554 Index('r_repo_name_idx', 'repo_name', mysql_length=255),
1554 Index('r_repo_name_idx', 'repo_name', mysql_length=255),
1555 base_table_args,
1555 base_table_args,
1556 )
1556 )
1557 DEFAULT_CLONE_URI = '{scheme}://{user}@{netloc}/{repo}'
1557 DEFAULT_CLONE_URI = '{scheme}://{user}@{netloc}/{repo}'
1558 DEFAULT_CLONE_URI_ID = '{scheme}://{user}@{netloc}/_{repoid}'
1558 DEFAULT_CLONE_URI_ID = '{scheme}://{user}@{netloc}/_{repoid}'
1559 DEFAULT_CLONE_URI_SSH = 'ssh://{sys_user}@{hostname}/{repo}'
1559 DEFAULT_CLONE_URI_SSH = 'ssh://{sys_user}@{hostname}/{repo}'
1560
1560
1561 STATE_CREATED = 'repo_state_created'
1561 STATE_CREATED = 'repo_state_created'
1562 STATE_PENDING = 'repo_state_pending'
1562 STATE_PENDING = 'repo_state_pending'
1563 STATE_ERROR = 'repo_state_error'
1563 STATE_ERROR = 'repo_state_error'
1564
1564
1565 LOCK_AUTOMATIC = 'lock_auto'
1565 LOCK_AUTOMATIC = 'lock_auto'
1566 LOCK_API = 'lock_api'
1566 LOCK_API = 'lock_api'
1567 LOCK_WEB = 'lock_web'
1567 LOCK_WEB = 'lock_web'
1568 LOCK_PULL = 'lock_pull'
1568 LOCK_PULL = 'lock_pull'
1569
1569
1570 NAME_SEP = URL_SEP
1570 NAME_SEP = URL_SEP
1571
1571
1572 repo_id = Column(
1572 repo_id = Column(
1573 "repo_id", Integer(), nullable=False, unique=True, default=None,
1573 "repo_id", Integer(), nullable=False, unique=True, default=None,
1574 primary_key=True)
1574 primary_key=True)
1575 _repo_name = Column(
1575 _repo_name = Column(
1576 "repo_name", Text(), nullable=False, default=None)
1576 "repo_name", Text(), nullable=False, default=None)
1577 _repo_name_hash = Column(
1577 _repo_name_hash = Column(
1578 "repo_name_hash", String(255), nullable=False, unique=True)
1578 "repo_name_hash", String(255), nullable=False, unique=True)
1579 repo_state = Column("repo_state", String(255), nullable=True)
1579 repo_state = Column("repo_state", String(255), nullable=True)
1580
1580
1581 clone_uri = Column(
1581 clone_uri = Column(
1582 "clone_uri", EncryptedTextValue(), nullable=True, unique=False,
1582 "clone_uri", EncryptedTextValue(), nullable=True, unique=False,
1583 default=None)
1583 default=None)
1584 push_uri = Column(
1584 push_uri = Column(
1585 "push_uri", EncryptedTextValue(), nullable=True, unique=False,
1585 "push_uri", EncryptedTextValue(), nullable=True, unique=False,
1586 default=None)
1586 default=None)
1587 repo_type = Column(
1587 repo_type = Column(
1588 "repo_type", String(255), nullable=False, unique=False, default=None)
1588 "repo_type", String(255), nullable=False, unique=False, default=None)
1589 user_id = Column(
1589 user_id = Column(
1590 "user_id", Integer(), ForeignKey('users.user_id'), nullable=False,
1590 "user_id", Integer(), ForeignKey('users.user_id'), nullable=False,
1591 unique=False, default=None)
1591 unique=False, default=None)
1592 private = Column(
1592 private = Column(
1593 "private", Boolean(), nullable=True, unique=None, default=None)
1593 "private", Boolean(), nullable=True, unique=None, default=None)
1594 archived = Column(
1594 archived = Column(
1595 "archived", Boolean(), nullable=True, unique=None, default=None)
1595 "archived", Boolean(), nullable=True, unique=None, default=None)
1596 enable_statistics = Column(
1596 enable_statistics = Column(
1597 "statistics", Boolean(), nullable=True, unique=None, default=True)
1597 "statistics", Boolean(), nullable=True, unique=None, default=True)
1598 enable_downloads = Column(
1598 enable_downloads = Column(
1599 "downloads", Boolean(), nullable=True, unique=None, default=True)
1599 "downloads", Boolean(), nullable=True, unique=None, default=True)
1600 description = Column(
1600 description = Column(
1601 "description", String(10000), nullable=True, unique=None, default=None)
1601 "description", String(10000), nullable=True, unique=None, default=None)
1602 created_on = Column(
1602 created_on = Column(
1603 'created_on', DateTime(timezone=False), nullable=True, unique=None,
1603 'created_on', DateTime(timezone=False), nullable=True, unique=None,
1604 default=datetime.datetime.now)
1604 default=datetime.datetime.now)
1605 updated_on = Column(
1605 updated_on = Column(
1606 'updated_on', DateTime(timezone=False), nullable=True, unique=None,
1606 'updated_on', DateTime(timezone=False), nullable=True, unique=None,
1607 default=datetime.datetime.now)
1607 default=datetime.datetime.now)
1608 _landing_revision = Column(
1608 _landing_revision = Column(
1609 "landing_revision", String(255), nullable=False, unique=False,
1609 "landing_revision", String(255), nullable=False, unique=False,
1610 default=None)
1610 default=None)
1611 enable_locking = Column(
1611 enable_locking = Column(
1612 "enable_locking", Boolean(), nullable=False, unique=None,
1612 "enable_locking", Boolean(), nullable=False, unique=None,
1613 default=False)
1613 default=False)
1614 _locked = Column(
1614 _locked = Column(
1615 "locked", String(255), nullable=True, unique=False, default=None)
1615 "locked", String(255), nullable=True, unique=False, default=None)
1616 _changeset_cache = Column(
1616 _changeset_cache = Column(
1617 "changeset_cache", LargeBinary(), nullable=True) # JSON data
1617 "changeset_cache", LargeBinary(), nullable=True) # JSON data
1618
1618
1619 fork_id = Column(
1619 fork_id = Column(
1620 "fork_id", Integer(), ForeignKey('repositories.repo_id'),
1620 "fork_id", Integer(), ForeignKey('repositories.repo_id'),
1621 nullable=True, unique=False, default=None)
1621 nullable=True, unique=False, default=None)
1622 group_id = Column(
1622 group_id = Column(
1623 "group_id", Integer(), ForeignKey('groups.group_id'), nullable=True,
1623 "group_id", Integer(), ForeignKey('groups.group_id'), nullable=True,
1624 unique=False, default=None)
1624 unique=False, default=None)
1625
1625
1626 user = relationship('User', lazy='joined')
1626 user = relationship('User', lazy='joined')
1627 fork = relationship('Repository', remote_side=repo_id, lazy='joined')
1627 fork = relationship('Repository', remote_side=repo_id, lazy='joined')
1628 group = relationship('RepoGroup', lazy='joined')
1628 group = relationship('RepoGroup', lazy='joined')
1629 repo_to_perm = relationship(
1629 repo_to_perm = relationship(
1630 'UserRepoToPerm', cascade='all',
1630 'UserRepoToPerm', cascade='all',
1631 order_by='UserRepoToPerm.repo_to_perm_id')
1631 order_by='UserRepoToPerm.repo_to_perm_id')
1632 users_group_to_perm = relationship('UserGroupRepoToPerm', cascade='all')
1632 users_group_to_perm = relationship('UserGroupRepoToPerm', cascade='all')
1633 stats = relationship('Statistics', cascade='all', uselist=False)
1633 stats = relationship('Statistics', cascade='all', uselist=False)
1634
1634
1635 followers = relationship(
1635 followers = relationship(
1636 'UserFollowing',
1636 'UserFollowing',
1637 primaryjoin='UserFollowing.follows_repo_id==Repository.repo_id',
1637 primaryjoin='UserFollowing.follows_repo_id==Repository.repo_id',
1638 cascade='all')
1638 cascade='all')
1639 extra_fields = relationship(
1639 extra_fields = relationship(
1640 'RepositoryField', cascade="all, delete, delete-orphan")
1640 'RepositoryField', cascade="all, delete, delete-orphan")
1641 logs = relationship('UserLog')
1641 logs = relationship('UserLog')
1642 comments = relationship(
1642 comments = relationship(
1643 'ChangesetComment', cascade="all, delete, delete-orphan")
1643 'ChangesetComment', cascade="all, delete, delete-orphan")
1644 pull_requests_source = relationship(
1644 pull_requests_source = relationship(
1645 'PullRequest',
1645 'PullRequest',
1646 primaryjoin='PullRequest.source_repo_id==Repository.repo_id',
1646 primaryjoin='PullRequest.source_repo_id==Repository.repo_id',
1647 cascade="all, delete, delete-orphan")
1647 cascade="all, delete, delete-orphan")
1648 pull_requests_target = relationship(
1648 pull_requests_target = relationship(
1649 'PullRequest',
1649 'PullRequest',
1650 primaryjoin='PullRequest.target_repo_id==Repository.repo_id',
1650 primaryjoin='PullRequest.target_repo_id==Repository.repo_id',
1651 cascade="all, delete, delete-orphan")
1651 cascade="all, delete, delete-orphan")
1652 ui = relationship('RepoRhodeCodeUi', cascade="all")
1652 ui = relationship('RepoRhodeCodeUi', cascade="all")
1653 settings = relationship('RepoRhodeCodeSetting', cascade="all")
1653 settings = relationship('RepoRhodeCodeSetting', cascade="all")
1654 integrations = relationship('Integration',
1654 integrations = relationship('Integration',
1655 cascade="all, delete, delete-orphan")
1655 cascade="all, delete, delete-orphan")
1656
1656
1657 scoped_tokens = relationship('UserApiKeys', cascade="all")
1657 scoped_tokens = relationship('UserApiKeys', cascade="all")
1658
1658
1659 def __unicode__(self):
1659 def __unicode__(self):
1660 return u"<%s('%s:%s')>" % (self.__class__.__name__, self.repo_id,
1660 return u"<%s('%s:%s')>" % (self.__class__.__name__, self.repo_id,
1661 safe_unicode(self.repo_name))
1661 safe_unicode(self.repo_name))
1662
1662
1663 @hybrid_property
1663 @hybrid_property
1664 def description_safe(self):
1664 def description_safe(self):
1665 from rhodecode.lib import helpers as h
1665 from rhodecode.lib import helpers as h
1666 return h.escape(self.description)
1666 return h.escape(self.description)
1667
1667
1668 @hybrid_property
1668 @hybrid_property
1669 def landing_rev(self):
1669 def landing_rev(self):
1670 # always should return [rev_type, rev]
1670 # always should return [rev_type, rev]
1671 if self._landing_revision:
1671 if self._landing_revision:
1672 _rev_info = self._landing_revision.split(':')
1672 _rev_info = self._landing_revision.split(':')
1673 if len(_rev_info) < 2:
1673 if len(_rev_info) < 2:
1674 _rev_info.insert(0, 'rev')
1674 _rev_info.insert(0, 'rev')
1675 return [_rev_info[0], _rev_info[1]]
1675 return [_rev_info[0], _rev_info[1]]
1676 return [None, None]
1676 return [None, None]
1677
1677
1678 @landing_rev.setter
1678 @landing_rev.setter
1679 def landing_rev(self, val):
1679 def landing_rev(self, val):
1680 if ':' not in val:
1680 if ':' not in val:
1681 raise ValueError('value must be delimited with `:` and consist '
1681 raise ValueError('value must be delimited with `:` and consist '
1682 'of <rev_type>:<rev>, got %s instead' % val)
1682 'of <rev_type>:<rev>, got %s instead' % val)
1683 self._landing_revision = val
1683 self._landing_revision = val
1684
1684
1685 @hybrid_property
1685 @hybrid_property
1686 def locked(self):
1686 def locked(self):
1687 if self._locked:
1687 if self._locked:
1688 user_id, timelocked, reason = self._locked.split(':')
1688 user_id, timelocked, reason = self._locked.split(':')
1689 lock_values = int(user_id), timelocked, reason
1689 lock_values = int(user_id), timelocked, reason
1690 else:
1690 else:
1691 lock_values = [None, None, None]
1691 lock_values = [None, None, None]
1692 return lock_values
1692 return lock_values
1693
1693
1694 @locked.setter
1694 @locked.setter
1695 def locked(self, val):
1695 def locked(self, val):
1696 if val and isinstance(val, (list, tuple)):
1696 if val and isinstance(val, (list, tuple)):
1697 self._locked = ':'.join(map(str, val))
1697 self._locked = ':'.join(map(str, val))
1698 else:
1698 else:
1699 self._locked = None
1699 self._locked = None
1700
1700
1701 @hybrid_property
1701 @hybrid_property
1702 def changeset_cache(self):
1702 def changeset_cache(self):
1703 from rhodecode.lib.vcs.backends.base import EmptyCommit
1703 from rhodecode.lib.vcs.backends.base import EmptyCommit
1704 dummy = EmptyCommit().__json__()
1704 dummy = EmptyCommit().__json__()
1705 if not self._changeset_cache:
1705 if not self._changeset_cache:
1706 return dummy
1706 return dummy
1707 try:
1707 try:
1708 return json.loads(self._changeset_cache)
1708 return json.loads(self._changeset_cache)
1709 except TypeError:
1709 except TypeError:
1710 return dummy
1710 return dummy
1711 except Exception:
1711 except Exception:
1712 log.error(traceback.format_exc())
1712 log.error(traceback.format_exc())
1713 return dummy
1713 return dummy
1714
1714
1715 @changeset_cache.setter
1715 @changeset_cache.setter
1716 def changeset_cache(self, val):
1716 def changeset_cache(self, val):
1717 try:
1717 try:
1718 self._changeset_cache = json.dumps(val)
1718 self._changeset_cache = json.dumps(val)
1719 except Exception:
1719 except Exception:
1720 log.error(traceback.format_exc())
1720 log.error(traceback.format_exc())
1721
1721
1722 @hybrid_property
1722 @hybrid_property
1723 def repo_name(self):
1723 def repo_name(self):
1724 return self._repo_name
1724 return self._repo_name
1725
1725
1726 @repo_name.setter
1726 @repo_name.setter
1727 def repo_name(self, value):
1727 def repo_name(self, value):
1728 self._repo_name = value
1728 self._repo_name = value
1729 self._repo_name_hash = hashlib.sha1(safe_str(value)).hexdigest()
1729 self._repo_name_hash = hashlib.sha1(safe_str(value)).hexdigest()
1730
1730
1731 @classmethod
1731 @classmethod
1732 def normalize_repo_name(cls, repo_name):
1732 def normalize_repo_name(cls, repo_name):
1733 """
1733 """
1734 Normalizes os specific repo_name to the format internally stored inside
1734 Normalizes os specific repo_name to the format internally stored inside
1735 database using URL_SEP
1735 database using URL_SEP
1736
1736
1737 :param cls:
1737 :param cls:
1738 :param repo_name:
1738 :param repo_name:
1739 """
1739 """
1740 return cls.NAME_SEP.join(repo_name.split(os.sep))
1740 return cls.NAME_SEP.join(repo_name.split(os.sep))
1741
1741
1742 @classmethod
1742 @classmethod
1743 def get_by_repo_name(cls, repo_name, cache=False, identity_cache=False):
1743 def get_by_repo_name(cls, repo_name, cache=False, identity_cache=False):
1744 session = Session()
1744 session = Session()
1745 q = session.query(cls).filter(cls.repo_name == repo_name)
1745 q = session.query(cls).filter(cls.repo_name == repo_name)
1746
1746
1747 if cache:
1747 if cache:
1748 if identity_cache:
1748 if identity_cache:
1749 val = cls.identity_cache(session, 'repo_name', repo_name)
1749 val = cls.identity_cache(session, 'repo_name', repo_name)
1750 if val:
1750 if val:
1751 return val
1751 return val
1752 else:
1752 else:
1753 cache_key = "get_repo_by_name_%s" % _hash_key(repo_name)
1753 cache_key = "get_repo_by_name_%s" % _hash_key(repo_name)
1754 q = q.options(
1754 q = q.options(
1755 FromCache("sql_cache_short", cache_key))
1755 FromCache("sql_cache_short", cache_key))
1756
1756
1757 return q.scalar()
1757 return q.scalar()
1758
1758
1759 @classmethod
1759 @classmethod
1760 def get_by_id_or_repo_name(cls, repoid):
1760 def get_by_id_or_repo_name(cls, repoid):
1761 if isinstance(repoid, (int, long)):
1761 if isinstance(repoid, (int, long)):
1762 try:
1762 try:
1763 repo = cls.get(repoid)
1763 repo = cls.get(repoid)
1764 except ValueError:
1764 except ValueError:
1765 repo = None
1765 repo = None
1766 else:
1766 else:
1767 repo = cls.get_by_repo_name(repoid)
1767 repo = cls.get_by_repo_name(repoid)
1768 return repo
1768 return repo
1769
1769
1770 @classmethod
1770 @classmethod
1771 def get_by_full_path(cls, repo_full_path):
1771 def get_by_full_path(cls, repo_full_path):
1772 repo_name = repo_full_path.split(cls.base_path(), 1)[-1]
1772 repo_name = repo_full_path.split(cls.base_path(), 1)[-1]
1773 repo_name = cls.normalize_repo_name(repo_name)
1773 repo_name = cls.normalize_repo_name(repo_name)
1774 return cls.get_by_repo_name(repo_name.strip(URL_SEP))
1774 return cls.get_by_repo_name(repo_name.strip(URL_SEP))
1775
1775
1776 @classmethod
1776 @classmethod
1777 def get_repo_forks(cls, repo_id):
1777 def get_repo_forks(cls, repo_id):
1778 return cls.query().filter(Repository.fork_id == repo_id)
1778 return cls.query().filter(Repository.fork_id == repo_id)
1779
1779
1780 @classmethod
1780 @classmethod
1781 def base_path(cls):
1781 def base_path(cls):
1782 """
1782 """
1783 Returns base path when all repos are stored
1783 Returns base path when all repos are stored
1784
1784
1785 :param cls:
1785 :param cls:
1786 """
1786 """
1787 q = Session().query(RhodeCodeUi)\
1787 q = Session().query(RhodeCodeUi)\
1788 .filter(RhodeCodeUi.ui_key == cls.NAME_SEP)
1788 .filter(RhodeCodeUi.ui_key == cls.NAME_SEP)
1789 q = q.options(FromCache("sql_cache_short", "repository_repo_path"))
1789 q = q.options(FromCache("sql_cache_short", "repository_repo_path"))
1790 return q.one().ui_value
1790 return q.one().ui_value
1791
1791
1792 @classmethod
1792 @classmethod
1793 def get_all_repos(cls, user_id=Optional(None), group_id=Optional(None),
1793 def get_all_repos(cls, user_id=Optional(None), group_id=Optional(None),
1794 case_insensitive=True, archived=False):
1794 case_insensitive=True, archived=False):
1795 q = Repository.query()
1795 q = Repository.query()
1796
1796
1797 if not archived:
1797 if not archived:
1798 q = q.filter(Repository.archived.isnot(true()))
1798 q = q.filter(Repository.archived.isnot(true()))
1799
1799
1800 if not isinstance(user_id, Optional):
1800 if not isinstance(user_id, Optional):
1801 q = q.filter(Repository.user_id == user_id)
1801 q = q.filter(Repository.user_id == user_id)
1802
1802
1803 if not isinstance(group_id, Optional):
1803 if not isinstance(group_id, Optional):
1804 q = q.filter(Repository.group_id == group_id)
1804 q = q.filter(Repository.group_id == group_id)
1805
1805
1806 if case_insensitive:
1806 if case_insensitive:
1807 q = q.order_by(func.lower(Repository.repo_name))
1807 q = q.order_by(func.lower(Repository.repo_name))
1808 else:
1808 else:
1809 q = q.order_by(Repository.repo_name)
1809 q = q.order_by(Repository.repo_name)
1810
1810
1811 return q.all()
1811 return q.all()
1812
1812
1813 @property
1813 @property
1814 def forks(self):
1814 def forks(self):
1815 """
1815 """
1816 Return forks of this repo
1816 Return forks of this repo
1817 """
1817 """
1818 return Repository.get_repo_forks(self.repo_id)
1818 return Repository.get_repo_forks(self.repo_id)
1819
1819
1820 @property
1820 @property
1821 def parent(self):
1821 def parent(self):
1822 """
1822 """
1823 Returns fork parent
1823 Returns fork parent
1824 """
1824 """
1825 return self.fork
1825 return self.fork
1826
1826
1827 @property
1827 @property
1828 def just_name(self):
1828 def just_name(self):
1829 return self.repo_name.split(self.NAME_SEP)[-1]
1829 return self.repo_name.split(self.NAME_SEP)[-1]
1830
1830
1831 @property
1831 @property
1832 def groups_with_parents(self):
1832 def groups_with_parents(self):
1833 groups = []
1833 groups = []
1834 if self.group is None:
1834 if self.group is None:
1835 return groups
1835 return groups
1836
1836
1837 cur_gr = self.group
1837 cur_gr = self.group
1838 groups.insert(0, cur_gr)
1838 groups.insert(0, cur_gr)
1839 while 1:
1839 while 1:
1840 gr = getattr(cur_gr, 'parent_group', None)
1840 gr = getattr(cur_gr, 'parent_group', None)
1841 cur_gr = cur_gr.parent_group
1841 cur_gr = cur_gr.parent_group
1842 if gr is None:
1842 if gr is None:
1843 break
1843 break
1844 groups.insert(0, gr)
1844 groups.insert(0, gr)
1845
1845
1846 return groups
1846 return groups
1847
1847
1848 @property
1848 @property
1849 def groups_and_repo(self):
1849 def groups_and_repo(self):
1850 return self.groups_with_parents, self
1850 return self.groups_with_parents, self
1851
1851
1852 @LazyProperty
1852 @LazyProperty
1853 def repo_path(self):
1853 def repo_path(self):
1854 """
1854 """
1855 Returns base full path for that repository means where it actually
1855 Returns base full path for that repository means where it actually
1856 exists on a filesystem
1856 exists on a filesystem
1857 """
1857 """
1858 q = Session().query(RhodeCodeUi).filter(
1858 q = Session().query(RhodeCodeUi).filter(
1859 RhodeCodeUi.ui_key == self.NAME_SEP)
1859 RhodeCodeUi.ui_key == self.NAME_SEP)
1860 q = q.options(FromCache("sql_cache_short", "repository_repo_path"))
1860 q = q.options(FromCache("sql_cache_short", "repository_repo_path"))
1861 return q.one().ui_value
1861 return q.one().ui_value
1862
1862
1863 @property
1863 @property
1864 def repo_full_path(self):
1864 def repo_full_path(self):
1865 p = [self.repo_path]
1865 p = [self.repo_path]
1866 # we need to split the name by / since this is how we store the
1866 # we need to split the name by / since this is how we store the
1867 # names in the database, but that eventually needs to be converted
1867 # names in the database, but that eventually needs to be converted
1868 # into a valid system path
1868 # into a valid system path
1869 p += self.repo_name.split(self.NAME_SEP)
1869 p += self.repo_name.split(self.NAME_SEP)
1870 return os.path.join(*map(safe_unicode, p))
1870 return os.path.join(*map(safe_unicode, p))
1871
1871
1872 @property
1872 @property
1873 def cache_keys(self):
1873 def cache_keys(self):
1874 """
1874 """
1875 Returns associated cache keys for that repo
1875 Returns associated cache keys for that repo
1876 """
1876 """
1877 invalidation_namespace = CacheKey.REPO_INVALIDATION_NAMESPACE.format(
1877 invalidation_namespace = CacheKey.REPO_INVALIDATION_NAMESPACE.format(
1878 repo_id=self.repo_id)
1878 repo_id=self.repo_id)
1879 return CacheKey.query()\
1879 return CacheKey.query()\
1880 .filter(CacheKey.cache_args == invalidation_namespace)\
1880 .filter(CacheKey.cache_args == invalidation_namespace)\
1881 .order_by(CacheKey.cache_key)\
1881 .order_by(CacheKey.cache_key)\
1882 .all()
1882 .all()
1883
1883
1884 @property
1884 @property
1885 def cached_diffs_relative_dir(self):
1885 def cached_diffs_relative_dir(self):
1886 """
1886 """
1887 Return a relative to the repository store path of cached diffs
1887 Return a relative to the repository store path of cached diffs
1888 used for safe display for users, who shouldn't know the absolute store
1888 used for safe display for users, who shouldn't know the absolute store
1889 path
1889 path
1890 """
1890 """
1891 return os.path.join(
1891 return os.path.join(
1892 os.path.dirname(self.repo_name),
1892 os.path.dirname(self.repo_name),
1893 self.cached_diffs_dir.split(os.path.sep)[-1])
1893 self.cached_diffs_dir.split(os.path.sep)[-1])
1894
1894
1895 @property
1895 @property
1896 def cached_diffs_dir(self):
1896 def cached_diffs_dir(self):
1897 path = self.repo_full_path
1897 path = self.repo_full_path
1898 return os.path.join(
1898 return os.path.join(
1899 os.path.dirname(path),
1899 os.path.dirname(path),
1900 '.__shadow_diff_cache_repo_{}'.format(self.repo_id))
1900 '.__shadow_diff_cache_repo_{}'.format(self.repo_id))
1901
1901
1902 def cached_diffs(self):
1902 def cached_diffs(self):
1903 diff_cache_dir = self.cached_diffs_dir
1903 diff_cache_dir = self.cached_diffs_dir
1904 if os.path.isdir(diff_cache_dir):
1904 if os.path.isdir(diff_cache_dir):
1905 return os.listdir(diff_cache_dir)
1905 return os.listdir(diff_cache_dir)
1906 return []
1906 return []
1907
1907
1908 def shadow_repos(self):
1908 def shadow_repos(self):
1909 shadow_repos_pattern = '.__shadow_repo_{}'.format(self.repo_id)
1909 shadow_repos_pattern = '.__shadow_repo_{}'.format(self.repo_id)
1910 return [
1910 return [
1911 x for x in os.listdir(os.path.dirname(self.repo_full_path))
1911 x for x in os.listdir(os.path.dirname(self.repo_full_path))
1912 if x.startswith(shadow_repos_pattern)]
1912 if x.startswith(shadow_repos_pattern)]
1913
1913
1914 def get_new_name(self, repo_name):
1914 def get_new_name(self, repo_name):
1915 """
1915 """
1916 returns new full repository name based on assigned group and new new
1916 returns new full repository name based on assigned group and new new
1917
1917
1918 :param group_name:
1918 :param group_name:
1919 """
1919 """
1920 path_prefix = self.group.full_path_splitted if self.group else []
1920 path_prefix = self.group.full_path_splitted if self.group else []
1921 return self.NAME_SEP.join(path_prefix + [repo_name])
1921 return self.NAME_SEP.join(path_prefix + [repo_name])
1922
1922
1923 @property
1923 @property
1924 def _config(self):
1924 def _config(self):
1925 """
1925 """
1926 Returns db based config object.
1926 Returns db based config object.
1927 """
1927 """
1928 from rhodecode.lib.utils import make_db_config
1928 from rhodecode.lib.utils import make_db_config
1929 return make_db_config(clear_session=False, repo=self)
1929 return make_db_config(clear_session=False, repo=self)
1930
1930
1931 def permissions(self, with_admins=True, with_owner=True):
1931 def permissions(self, with_admins=True, with_owner=True):
1932 """
1932 """
1933 Permissions for repositories
1933 Permissions for repositories
1934 """
1934 """
1935 _admin_perm = 'repository.admin'
1935 _admin_perm = 'repository.admin'
1936
1936
1937 owner_row = []
1937 owner_row = []
1938 if with_owner:
1938 if with_owner:
1939 usr = AttributeDict(self.user.get_dict())
1939 usr = AttributeDict(self.user.get_dict())
1940 usr.owner_row = True
1940 usr.owner_row = True
1941 usr.permission = _admin_perm
1941 usr.permission = _admin_perm
1942 usr.permission_id = None
1942 usr.permission_id = None
1943 owner_row.append(usr)
1943 owner_row.append(usr)
1944
1944
1945 super_admin_ids = []
1945 super_admin_ids = []
1946 super_admin_rows = []
1946 super_admin_rows = []
1947 if with_admins:
1947 if with_admins:
1948 for usr in User.get_all_super_admins():
1948 for usr in User.get_all_super_admins():
1949 super_admin_ids.append(usr.user_id)
1949 super_admin_ids.append(usr.user_id)
1950 # if this admin is also owner, don't double the record
1950 # if this admin is also owner, don't double the record
1951 if usr.user_id == owner_row[0].user_id:
1951 if usr.user_id == owner_row[0].user_id:
1952 owner_row[0].admin_row = True
1952 owner_row[0].admin_row = True
1953 else:
1953 else:
1954 usr = AttributeDict(usr.get_dict())
1954 usr = AttributeDict(usr.get_dict())
1955 usr.admin_row = True
1955 usr.admin_row = True
1956 usr.permission = _admin_perm
1956 usr.permission = _admin_perm
1957 usr.permission_id = None
1957 usr.permission_id = None
1958 super_admin_rows.append(usr)
1958 super_admin_rows.append(usr)
1959
1959
1960 q = UserRepoToPerm.query().filter(UserRepoToPerm.repository == self)
1960 q = UserRepoToPerm.query().filter(UserRepoToPerm.repository == self)
1961 q = q.options(joinedload(UserRepoToPerm.repository),
1961 q = q.options(joinedload(UserRepoToPerm.repository),
1962 joinedload(UserRepoToPerm.user),
1962 joinedload(UserRepoToPerm.user),
1963 joinedload(UserRepoToPerm.permission),)
1963 joinedload(UserRepoToPerm.permission),)
1964
1964
1965 # get owners and admins and permissions. We do a trick of re-writing
1965 # get owners and admins and permissions. We do a trick of re-writing
1966 # objects from sqlalchemy to named-tuples due to sqlalchemy session
1966 # objects from sqlalchemy to named-tuples due to sqlalchemy session
1967 # has a global reference and changing one object propagates to all
1967 # has a global reference and changing one object propagates to all
1968 # others. This means if admin is also an owner admin_row that change
1968 # others. This means if admin is also an owner admin_row that change
1969 # would propagate to both objects
1969 # would propagate to both objects
1970 perm_rows = []
1970 perm_rows = []
1971 for _usr in q.all():
1971 for _usr in q.all():
1972 usr = AttributeDict(_usr.user.get_dict())
1972 usr = AttributeDict(_usr.user.get_dict())
1973 # if this user is also owner/admin, mark as duplicate record
1973 # if this user is also owner/admin, mark as duplicate record
1974 if usr.user_id == owner_row[0].user_id or usr.user_id in super_admin_ids:
1974 if usr.user_id == owner_row[0].user_id or usr.user_id in super_admin_ids:
1975 usr.duplicate_perm = True
1975 usr.duplicate_perm = True
1976 # also check if this permission is maybe used by branch_permissions
1976 # also check if this permission is maybe used by branch_permissions
1977 if _usr.branch_perm_entry:
1977 if _usr.branch_perm_entry:
1978 usr.branch_rules = [x.branch_rule_id for x in _usr.branch_perm_entry]
1978 usr.branch_rules = [x.branch_rule_id for x in _usr.branch_perm_entry]
1979
1979
1980 usr.permission = _usr.permission.permission_name
1980 usr.permission = _usr.permission.permission_name
1981 usr.permission_id = _usr.repo_to_perm_id
1981 usr.permission_id = _usr.repo_to_perm_id
1982 perm_rows.append(usr)
1982 perm_rows.append(usr)
1983
1983
1984 # filter the perm rows by 'default' first and then sort them by
1984 # filter the perm rows by 'default' first and then sort them by
1985 # admin,write,read,none permissions sorted again alphabetically in
1985 # admin,write,read,none permissions sorted again alphabetically in
1986 # each group
1986 # each group
1987 perm_rows = sorted(perm_rows, key=display_user_sort)
1987 perm_rows = sorted(perm_rows, key=display_user_sort)
1988
1988
1989 return super_admin_rows + owner_row + perm_rows
1989 return super_admin_rows + owner_row + perm_rows
1990
1990
1991 def permission_user_groups(self):
1991 def permission_user_groups(self):
1992 q = UserGroupRepoToPerm.query().filter(
1992 q = UserGroupRepoToPerm.query().filter(
1993 UserGroupRepoToPerm.repository == self)
1993 UserGroupRepoToPerm.repository == self)
1994 q = q.options(joinedload(UserGroupRepoToPerm.repository),
1994 q = q.options(joinedload(UserGroupRepoToPerm.repository),
1995 joinedload(UserGroupRepoToPerm.users_group),
1995 joinedload(UserGroupRepoToPerm.users_group),
1996 joinedload(UserGroupRepoToPerm.permission),)
1996 joinedload(UserGroupRepoToPerm.permission),)
1997
1997
1998 perm_rows = []
1998 perm_rows = []
1999 for _user_group in q.all():
1999 for _user_group in q.all():
2000 usr = AttributeDict(_user_group.users_group.get_dict())
2000 usr = AttributeDict(_user_group.users_group.get_dict())
2001 usr.permission = _user_group.permission.permission_name
2001 usr.permission = _user_group.permission.permission_name
2002 perm_rows.append(usr)
2002 perm_rows.append(usr)
2003
2003
2004 perm_rows = sorted(perm_rows, key=display_user_group_sort)
2004 perm_rows = sorted(perm_rows, key=display_user_group_sort)
2005 return perm_rows
2005 return perm_rows
2006
2006
2007 def get_api_data(self, include_secrets=False):
2007 def get_api_data(self, include_secrets=False):
2008 """
2008 """
2009 Common function for generating repo api data
2009 Common function for generating repo api data
2010
2010
2011 :param include_secrets: See :meth:`User.get_api_data`.
2011 :param include_secrets: See :meth:`User.get_api_data`.
2012
2012
2013 """
2013 """
2014 # TODO: mikhail: Here there is an anti-pattern, we probably need to
2014 # TODO: mikhail: Here there is an anti-pattern, we probably need to
2015 # move this methods on models level.
2015 # move this methods on models level.
2016 from rhodecode.model.settings import SettingsModel
2016 from rhodecode.model.settings import SettingsModel
2017 from rhodecode.model.repo import RepoModel
2017 from rhodecode.model.repo import RepoModel
2018
2018
2019 repo = self
2019 repo = self
2020 _user_id, _time, _reason = self.locked
2020 _user_id, _time, _reason = self.locked
2021
2021
2022 data = {
2022 data = {
2023 'repo_id': repo.repo_id,
2023 'repo_id': repo.repo_id,
2024 'repo_name': repo.repo_name,
2024 'repo_name': repo.repo_name,
2025 'repo_type': repo.repo_type,
2025 'repo_type': repo.repo_type,
2026 'clone_uri': repo.clone_uri or '',
2026 'clone_uri': repo.clone_uri or '',
2027 'push_uri': repo.push_uri or '',
2027 'push_uri': repo.push_uri or '',
2028 'url': RepoModel().get_url(self),
2028 'url': RepoModel().get_url(self),
2029 'private': repo.private,
2029 'private': repo.private,
2030 'created_on': repo.created_on,
2030 'created_on': repo.created_on,
2031 'description': repo.description_safe,
2031 'description': repo.description_safe,
2032 'landing_rev': repo.landing_rev,
2032 'landing_rev': repo.landing_rev,
2033 'owner': repo.user.username,
2033 'owner': repo.user.username,
2034 'fork_of': repo.fork.repo_name if repo.fork else None,
2034 'fork_of': repo.fork.repo_name if repo.fork else None,
2035 'fork_of_id': repo.fork.repo_id if repo.fork else None,
2035 'fork_of_id': repo.fork.repo_id if repo.fork else None,
2036 'enable_statistics': repo.enable_statistics,
2036 'enable_statistics': repo.enable_statistics,
2037 'enable_locking': repo.enable_locking,
2037 'enable_locking': repo.enable_locking,
2038 'enable_downloads': repo.enable_downloads,
2038 'enable_downloads': repo.enable_downloads,
2039 'last_changeset': repo.changeset_cache,
2039 'last_changeset': repo.changeset_cache,
2040 'locked_by': User.get(_user_id).get_api_data(
2040 'locked_by': User.get(_user_id).get_api_data(
2041 include_secrets=include_secrets) if _user_id else None,
2041 include_secrets=include_secrets) if _user_id else None,
2042 'locked_date': time_to_datetime(_time) if _time else None,
2042 'locked_date': time_to_datetime(_time) if _time else None,
2043 'lock_reason': _reason if _reason else None,
2043 'lock_reason': _reason if _reason else None,
2044 }
2044 }
2045
2045
2046 # TODO: mikhail: should be per-repo settings here
2046 # TODO: mikhail: should be per-repo settings here
2047 rc_config = SettingsModel().get_all_settings()
2047 rc_config = SettingsModel().get_all_settings()
2048 repository_fields = str2bool(
2048 repository_fields = str2bool(
2049 rc_config.get('rhodecode_repository_fields'))
2049 rc_config.get('rhodecode_repository_fields'))
2050 if repository_fields:
2050 if repository_fields:
2051 for f in self.extra_fields:
2051 for f in self.extra_fields:
2052 data[f.field_key_prefixed] = f.field_value
2052 data[f.field_key_prefixed] = f.field_value
2053
2053
2054 return data
2054 return data
2055
2055
2056 @classmethod
2056 @classmethod
2057 def lock(cls, repo, user_id, lock_time=None, lock_reason=None):
2057 def lock(cls, repo, user_id, lock_time=None, lock_reason=None):
2058 if not lock_time:
2058 if not lock_time:
2059 lock_time = time.time()
2059 lock_time = time.time()
2060 if not lock_reason:
2060 if not lock_reason:
2061 lock_reason = cls.LOCK_AUTOMATIC
2061 lock_reason = cls.LOCK_AUTOMATIC
2062 repo.locked = [user_id, lock_time, lock_reason]
2062 repo.locked = [user_id, lock_time, lock_reason]
2063 Session().add(repo)
2063 Session().add(repo)
2064 Session().commit()
2064 Session().commit()
2065
2065
2066 @classmethod
2066 @classmethod
2067 def unlock(cls, repo):
2067 def unlock(cls, repo):
2068 repo.locked = None
2068 repo.locked = None
2069 Session().add(repo)
2069 Session().add(repo)
2070 Session().commit()
2070 Session().commit()
2071
2071
2072 @classmethod
2072 @classmethod
2073 def getlock(cls, repo):
2073 def getlock(cls, repo):
2074 return repo.locked
2074 return repo.locked
2075
2075
2076 def is_user_lock(self, user_id):
2076 def is_user_lock(self, user_id):
2077 if self.lock[0]:
2077 if self.lock[0]:
2078 lock_user_id = safe_int(self.lock[0])
2078 lock_user_id = safe_int(self.lock[0])
2079 user_id = safe_int(user_id)
2079 user_id = safe_int(user_id)
2080 # both are ints, and they are equal
2080 # both are ints, and they are equal
2081 return all([lock_user_id, user_id]) and lock_user_id == user_id
2081 return all([lock_user_id, user_id]) and lock_user_id == user_id
2082
2082
2083 return False
2083 return False
2084
2084
2085 def get_locking_state(self, action, user_id, only_when_enabled=True):
2085 def get_locking_state(self, action, user_id, only_when_enabled=True):
2086 """
2086 """
2087 Checks locking on this repository, if locking is enabled and lock is
2087 Checks locking on this repository, if locking is enabled and lock is
2088 present returns a tuple of make_lock, locked, locked_by.
2088 present returns a tuple of make_lock, locked, locked_by.
2089 make_lock can have 3 states None (do nothing) True, make lock
2089 make_lock can have 3 states None (do nothing) True, make lock
2090 False release lock, This value is later propagated to hooks, which
2090 False release lock, This value is later propagated to hooks, which
2091 do the locking. Think about this as signals passed to hooks what to do.
2091 do the locking. Think about this as signals passed to hooks what to do.
2092
2092
2093 """
2093 """
2094 # TODO: johbo: This is part of the business logic and should be moved
2094 # TODO: johbo: This is part of the business logic and should be moved
2095 # into the RepositoryModel.
2095 # into the RepositoryModel.
2096
2096
2097 if action not in ('push', 'pull'):
2097 if action not in ('push', 'pull'):
2098 raise ValueError("Invalid action value: %s" % repr(action))
2098 raise ValueError("Invalid action value: %s" % repr(action))
2099
2099
2100 # defines if locked error should be thrown to user
2100 # defines if locked error should be thrown to user
2101 currently_locked = False
2101 currently_locked = False
2102 # defines if new lock should be made, tri-state
2102 # defines if new lock should be made, tri-state
2103 make_lock = None
2103 make_lock = None
2104 repo = self
2104 repo = self
2105 user = User.get(user_id)
2105 user = User.get(user_id)
2106
2106
2107 lock_info = repo.locked
2107 lock_info = repo.locked
2108
2108
2109 if repo and (repo.enable_locking or not only_when_enabled):
2109 if repo and (repo.enable_locking or not only_when_enabled):
2110 if action == 'push':
2110 if action == 'push':
2111 # check if it's already locked !, if it is compare users
2111 # check if it's already locked !, if it is compare users
2112 locked_by_user_id = lock_info[0]
2112 locked_by_user_id = lock_info[0]
2113 if user.user_id == locked_by_user_id:
2113 if user.user_id == locked_by_user_id:
2114 log.debug(
2114 log.debug(
2115 'Got `push` action from user %s, now unlocking', user)
2115 'Got `push` action from user %s, now unlocking', user)
2116 # unlock if we have push from user who locked
2116 # unlock if we have push from user who locked
2117 make_lock = False
2117 make_lock = False
2118 else:
2118 else:
2119 # we're not the same user who locked, ban with
2119 # we're not the same user who locked, ban with
2120 # code defined in settings (default is 423 HTTP Locked) !
2120 # code defined in settings (default is 423 HTTP Locked) !
2121 log.debug('Repo %s is currently locked by %s', repo, user)
2121 log.debug('Repo %s is currently locked by %s', repo, user)
2122 currently_locked = True
2122 currently_locked = True
2123 elif action == 'pull':
2123 elif action == 'pull':
2124 # [0] user [1] date
2124 # [0] user [1] date
2125 if lock_info[0] and lock_info[1]:
2125 if lock_info[0] and lock_info[1]:
2126 log.debug('Repo %s is currently locked by %s', repo, user)
2126 log.debug('Repo %s is currently locked by %s', repo, user)
2127 currently_locked = True
2127 currently_locked = True
2128 else:
2128 else:
2129 log.debug('Setting lock on repo %s by %s', repo, user)
2129 log.debug('Setting lock on repo %s by %s', repo, user)
2130 make_lock = True
2130 make_lock = True
2131
2131
2132 else:
2132 else:
2133 log.debug('Repository %s do not have locking enabled', repo)
2133 log.debug('Repository %s do not have locking enabled', repo)
2134
2134
2135 log.debug('FINAL locking values make_lock:%s,locked:%s,locked_by:%s',
2135 log.debug('FINAL locking values make_lock:%s,locked:%s,locked_by:%s',
2136 make_lock, currently_locked, lock_info)
2136 make_lock, currently_locked, lock_info)
2137
2137
2138 from rhodecode.lib.auth import HasRepoPermissionAny
2138 from rhodecode.lib.auth import HasRepoPermissionAny
2139 perm_check = HasRepoPermissionAny('repository.write', 'repository.admin')
2139 perm_check = HasRepoPermissionAny('repository.write', 'repository.admin')
2140 if make_lock and not perm_check(repo_name=repo.repo_name, user=user):
2140 if make_lock and not perm_check(repo_name=repo.repo_name, user=user):
2141 # if we don't have at least write permission we cannot make a lock
2141 # if we don't have at least write permission we cannot make a lock
2142 log.debug('lock state reset back to FALSE due to lack '
2142 log.debug('lock state reset back to FALSE due to lack '
2143 'of at least read permission')
2143 'of at least read permission')
2144 make_lock = False
2144 make_lock = False
2145
2145
2146 return make_lock, currently_locked, lock_info
2146 return make_lock, currently_locked, lock_info
2147
2147
2148 @property
2148 @property
2149 def last_db_change(self):
2149 def last_db_change(self):
2150 return self.updated_on
2150 return self.updated_on
2151
2151
2152 @property
2152 @property
2153 def clone_uri_hidden(self):
2153 def clone_uri_hidden(self):
2154 clone_uri = self.clone_uri
2154 clone_uri = self.clone_uri
2155 if clone_uri:
2155 if clone_uri:
2156 import urlobject
2156 import urlobject
2157 url_obj = urlobject.URLObject(cleaned_uri(clone_uri))
2157 url_obj = urlobject.URLObject(cleaned_uri(clone_uri))
2158 if url_obj.password:
2158 if url_obj.password:
2159 clone_uri = url_obj.with_password('*****')
2159 clone_uri = url_obj.with_password('*****')
2160 return clone_uri
2160 return clone_uri
2161
2161
2162 @property
2162 @property
2163 def push_uri_hidden(self):
2163 def push_uri_hidden(self):
2164 push_uri = self.push_uri
2164 push_uri = self.push_uri
2165 if push_uri:
2165 if push_uri:
2166 import urlobject
2166 import urlobject
2167 url_obj = urlobject.URLObject(cleaned_uri(push_uri))
2167 url_obj = urlobject.URLObject(cleaned_uri(push_uri))
2168 if url_obj.password:
2168 if url_obj.password:
2169 push_uri = url_obj.with_password('*****')
2169 push_uri = url_obj.with_password('*****')
2170 return push_uri
2170 return push_uri
2171
2171
2172 def clone_url(self, **override):
2172 def clone_url(self, **override):
2173 from rhodecode.model.settings import SettingsModel
2173 from rhodecode.model.settings import SettingsModel
2174
2174
2175 uri_tmpl = None
2175 uri_tmpl = None
2176 if 'with_id' in override:
2176 if 'with_id' in override:
2177 uri_tmpl = self.DEFAULT_CLONE_URI_ID
2177 uri_tmpl = self.DEFAULT_CLONE_URI_ID
2178 del override['with_id']
2178 del override['with_id']
2179
2179
2180 if 'uri_tmpl' in override:
2180 if 'uri_tmpl' in override:
2181 uri_tmpl = override['uri_tmpl']
2181 uri_tmpl = override['uri_tmpl']
2182 del override['uri_tmpl']
2182 del override['uri_tmpl']
2183
2183
2184 ssh = False
2184 ssh = False
2185 if 'ssh' in override:
2185 if 'ssh' in override:
2186 ssh = True
2186 ssh = True
2187 del override['ssh']
2187 del override['ssh']
2188
2188
2189 # we didn't override our tmpl from **overrides
2189 # we didn't override our tmpl from **overrides
2190 if not uri_tmpl:
2190 if not uri_tmpl:
2191 rc_config = SettingsModel().get_all_settings(cache=True)
2191 rc_config = SettingsModel().get_all_settings(cache=True)
2192 if ssh:
2192 if ssh:
2193 uri_tmpl = rc_config.get(
2193 uri_tmpl = rc_config.get(
2194 'rhodecode_clone_uri_ssh_tmpl') or self.DEFAULT_CLONE_URI_SSH
2194 'rhodecode_clone_uri_ssh_tmpl') or self.DEFAULT_CLONE_URI_SSH
2195 else:
2195 else:
2196 uri_tmpl = rc_config.get(
2196 uri_tmpl = rc_config.get(
2197 'rhodecode_clone_uri_tmpl') or self.DEFAULT_CLONE_URI
2197 'rhodecode_clone_uri_tmpl') or self.DEFAULT_CLONE_URI
2198
2198
2199 request = get_current_request()
2199 request = get_current_request()
2200 return get_clone_url(request=request,
2200 return get_clone_url(request=request,
2201 uri_tmpl=uri_tmpl,
2201 uri_tmpl=uri_tmpl,
2202 repo_name=self.repo_name,
2202 repo_name=self.repo_name,
2203 repo_id=self.repo_id, **override)
2203 repo_id=self.repo_id, **override)
2204
2204
2205 def set_state(self, state):
2205 def set_state(self, state):
2206 self.repo_state = state
2206 self.repo_state = state
2207 Session().add(self)
2207 Session().add(self)
2208 #==========================================================================
2208 #==========================================================================
2209 # SCM PROPERTIES
2209 # SCM PROPERTIES
2210 #==========================================================================
2210 #==========================================================================
2211
2211
2212 def get_commit(self, commit_id=None, commit_idx=None, pre_load=None):
2212 def get_commit(self, commit_id=None, commit_idx=None, pre_load=None):
2213 return get_commit_safe(
2213 return get_commit_safe(
2214 self.scm_instance(), commit_id, commit_idx, pre_load=pre_load)
2214 self.scm_instance(), commit_id, commit_idx, pre_load=pre_load)
2215
2215
2216 def get_changeset(self, rev=None, pre_load=None):
2216 def get_changeset(self, rev=None, pre_load=None):
2217 warnings.warn("Use get_commit", DeprecationWarning)
2217 warnings.warn("Use get_commit", DeprecationWarning)
2218 commit_id = None
2218 commit_id = None
2219 commit_idx = None
2219 commit_idx = None
2220 if isinstance(rev, compat.string_types):
2220 if isinstance(rev, compat.string_types):
2221 commit_id = rev
2221 commit_id = rev
2222 else:
2222 else:
2223 commit_idx = rev
2223 commit_idx = rev
2224 return self.get_commit(commit_id=commit_id, commit_idx=commit_idx,
2224 return self.get_commit(commit_id=commit_id, commit_idx=commit_idx,
2225 pre_load=pre_load)
2225 pre_load=pre_load)
2226
2226
2227 def get_landing_commit(self):
2227 def get_landing_commit(self):
2228 """
2228 """
2229 Returns landing commit, or if that doesn't exist returns the tip
2229 Returns landing commit, or if that doesn't exist returns the tip
2230 """
2230 """
2231 _rev_type, _rev = self.landing_rev
2231 _rev_type, _rev = self.landing_rev
2232 commit = self.get_commit(_rev)
2232 commit = self.get_commit(_rev)
2233 if isinstance(commit, EmptyCommit):
2233 if isinstance(commit, EmptyCommit):
2234 return self.get_commit()
2234 return self.get_commit()
2235 return commit
2235 return commit
2236
2236
2237 def update_commit_cache(self, cs_cache=None, config=None):
2237 def update_commit_cache(self, cs_cache=None, config=None):
2238 """
2238 """
2239 Update cache of last changeset for repository, keys should be::
2239 Update cache of last changeset for repository, keys should be::
2240
2240
2241 short_id
2241 short_id
2242 raw_id
2242 raw_id
2243 revision
2243 revision
2244 parents
2244 parents
2245 message
2245 message
2246 date
2246 date
2247 author
2247 author
2248
2248
2249 :param cs_cache:
2249 :param cs_cache:
2250 """
2250 """
2251 from rhodecode.lib.vcs.backends.base import BaseChangeset
2251 from rhodecode.lib.vcs.backends.base import BaseChangeset
2252 if cs_cache is None:
2252 if cs_cache is None:
2253 # use no-cache version here
2253 # use no-cache version here
2254 scm_repo = self.scm_instance(cache=False, config=config)
2254 scm_repo = self.scm_instance(cache=False, config=config)
2255
2255
2256 empty = scm_repo.is_empty()
2256 empty = scm_repo.is_empty()
2257 if not empty:
2257 if not empty:
2258 cs_cache = scm_repo.get_commit(
2258 cs_cache = scm_repo.get_commit(
2259 pre_load=["author", "date", "message", "parents"])
2259 pre_load=["author", "date", "message", "parents"])
2260 else:
2260 else:
2261 cs_cache = EmptyCommit()
2261 cs_cache = EmptyCommit()
2262
2262
2263 if isinstance(cs_cache, BaseChangeset):
2263 if isinstance(cs_cache, BaseChangeset):
2264 cs_cache = cs_cache.__json__()
2264 cs_cache = cs_cache.__json__()
2265
2265
2266 def is_outdated(new_cs_cache):
2266 def is_outdated(new_cs_cache):
2267 if (new_cs_cache['raw_id'] != self.changeset_cache['raw_id'] or
2267 if (new_cs_cache['raw_id'] != self.changeset_cache['raw_id'] or
2268 new_cs_cache['revision'] != self.changeset_cache['revision']):
2268 new_cs_cache['revision'] != self.changeset_cache['revision']):
2269 return True
2269 return True
2270 return False
2270 return False
2271
2271
2272 # check if we have maybe already latest cached revision
2272 # check if we have maybe already latest cached revision
2273 if is_outdated(cs_cache) or not self.changeset_cache:
2273 if is_outdated(cs_cache) or not self.changeset_cache:
2274 _default = datetime.datetime.utcnow()
2274 _default = datetime.datetime.utcnow()
2275 last_change = cs_cache.get('date') or _default
2275 last_change = cs_cache.get('date') or _default
2276 if self.updated_on and self.updated_on > last_change:
2276 if self.updated_on and self.updated_on > last_change:
2277 # we check if last update is newer than the new value
2277 # we check if last update is newer than the new value
2278 # if yes, we use the current timestamp instead. Imagine you get
2278 # if yes, we use the current timestamp instead. Imagine you get
2279 # old commit pushed 1y ago, we'd set last update 1y to ago.
2279 # old commit pushed 1y ago, we'd set last update 1y to ago.
2280 last_change = _default
2280 last_change = _default
2281 log.debug('updated repo %s with new commit cache %s',
2281 log.debug('updated repo %s with new commit cache %s',
2282 self.repo_name, cs_cache)
2282 self.repo_name, cs_cache)
2283 self.updated_on = last_change
2283 self.updated_on = last_change
2284 self.changeset_cache = cs_cache
2284 self.changeset_cache = cs_cache
2285 Session().add(self)
2285 Session().add(self)
2286 Session().commit()
2286 Session().commit()
2287 else:
2287 else:
2288 log.debug('Skipping update_commit_cache for repo:`%s` '
2288 log.debug('Skipping update_commit_cache for repo:`%s` '
2289 'commit already with latest changes', self.repo_name)
2289 'commit already with latest changes', self.repo_name)
2290
2290
2291 @property
2291 @property
2292 def tip(self):
2292 def tip(self):
2293 return self.get_commit('tip')
2293 return self.get_commit('tip')
2294
2294
2295 @property
2295 @property
2296 def author(self):
2296 def author(self):
2297 return self.tip.author
2297 return self.tip.author
2298
2298
2299 @property
2299 @property
2300 def last_change(self):
2300 def last_change(self):
2301 return self.scm_instance().last_change
2301 return self.scm_instance().last_change
2302
2302
2303 def get_comments(self, revisions=None):
2303 def get_comments(self, revisions=None):
2304 """
2304 """
2305 Returns comments for this repository grouped by revisions
2305 Returns comments for this repository grouped by revisions
2306
2306
2307 :param revisions: filter query by revisions only
2307 :param revisions: filter query by revisions only
2308 """
2308 """
2309 cmts = ChangesetComment.query()\
2309 cmts = ChangesetComment.query()\
2310 .filter(ChangesetComment.repo == self)
2310 .filter(ChangesetComment.repo == self)
2311 if revisions:
2311 if revisions:
2312 cmts = cmts.filter(ChangesetComment.revision.in_(revisions))
2312 cmts = cmts.filter(ChangesetComment.revision.in_(revisions))
2313 grouped = collections.defaultdict(list)
2313 grouped = collections.defaultdict(list)
2314 for cmt in cmts.all():
2314 for cmt in cmts.all():
2315 grouped[cmt.revision].append(cmt)
2315 grouped[cmt.revision].append(cmt)
2316 return grouped
2316 return grouped
2317
2317
2318 def statuses(self, revisions=None):
2318 def statuses(self, revisions=None):
2319 """
2319 """
2320 Returns statuses for this repository
2320 Returns statuses for this repository
2321
2321
2322 :param revisions: list of revisions to get statuses for
2322 :param revisions: list of revisions to get statuses for
2323 """
2323 """
2324 statuses = ChangesetStatus.query()\
2324 statuses = ChangesetStatus.query()\
2325 .filter(ChangesetStatus.repo == self)\
2325 .filter(ChangesetStatus.repo == self)\
2326 .filter(ChangesetStatus.version == 0)
2326 .filter(ChangesetStatus.version == 0)
2327
2327
2328 if revisions:
2328 if revisions:
2329 # Try doing the filtering in chunks to avoid hitting limits
2329 # Try doing the filtering in chunks to avoid hitting limits
2330 size = 500
2330 size = 500
2331 status_results = []
2331 status_results = []
2332 for chunk in xrange(0, len(revisions), size):
2332 for chunk in xrange(0, len(revisions), size):
2333 status_results += statuses.filter(
2333 status_results += statuses.filter(
2334 ChangesetStatus.revision.in_(
2334 ChangesetStatus.revision.in_(
2335 revisions[chunk: chunk+size])
2335 revisions[chunk: chunk+size])
2336 ).all()
2336 ).all()
2337 else:
2337 else:
2338 status_results = statuses.all()
2338 status_results = statuses.all()
2339
2339
2340 grouped = {}
2340 grouped = {}
2341
2341
2342 # maybe we have open new pullrequest without a status?
2342 # maybe we have open new pullrequest without a status?
2343 stat = ChangesetStatus.STATUS_UNDER_REVIEW
2343 stat = ChangesetStatus.STATUS_UNDER_REVIEW
2344 status_lbl = ChangesetStatus.get_status_lbl(stat)
2344 status_lbl = ChangesetStatus.get_status_lbl(stat)
2345 for pr in PullRequest.query().filter(PullRequest.source_repo == self).all():
2345 for pr in PullRequest.query().filter(PullRequest.source_repo == self).all():
2346 for rev in pr.revisions:
2346 for rev in pr.revisions:
2347 pr_id = pr.pull_request_id
2347 pr_id = pr.pull_request_id
2348 pr_repo = pr.target_repo.repo_name
2348 pr_repo = pr.target_repo.repo_name
2349 grouped[rev] = [stat, status_lbl, pr_id, pr_repo]
2349 grouped[rev] = [stat, status_lbl, pr_id, pr_repo]
2350
2350
2351 for stat in status_results:
2351 for stat in status_results:
2352 pr_id = pr_repo = None
2352 pr_id = pr_repo = None
2353 if stat.pull_request:
2353 if stat.pull_request:
2354 pr_id = stat.pull_request.pull_request_id
2354 pr_id = stat.pull_request.pull_request_id
2355 pr_repo = stat.pull_request.target_repo.repo_name
2355 pr_repo = stat.pull_request.target_repo.repo_name
2356 grouped[stat.revision] = [str(stat.status), stat.status_lbl,
2356 grouped[stat.revision] = [str(stat.status), stat.status_lbl,
2357 pr_id, pr_repo]
2357 pr_id, pr_repo]
2358 return grouped
2358 return grouped
2359
2359
2360 # ==========================================================================
2360 # ==========================================================================
2361 # SCM CACHE INSTANCE
2361 # SCM CACHE INSTANCE
2362 # ==========================================================================
2362 # ==========================================================================
2363
2363
2364 def scm_instance(self, **kwargs):
2364 def scm_instance(self, **kwargs):
2365 import rhodecode
2365 import rhodecode
2366
2366
2367 # Passing a config will not hit the cache currently only used
2367 # Passing a config will not hit the cache currently only used
2368 # for repo2dbmapper
2368 # for repo2dbmapper
2369 config = kwargs.pop('config', None)
2369 config = kwargs.pop('config', None)
2370 cache = kwargs.pop('cache', None)
2370 cache = kwargs.pop('cache', None)
2371 full_cache = str2bool(rhodecode.CONFIG.get('vcs_full_cache'))
2371 full_cache = str2bool(rhodecode.CONFIG.get('vcs_full_cache'))
2372 # if cache is NOT defined use default global, else we have a full
2372 # if cache is NOT defined use default global, else we have a full
2373 # control over cache behaviour
2373 # control over cache behaviour
2374 if cache is None and full_cache and not config:
2374 if cache is None and full_cache and not config:
2375 return self._get_instance_cached()
2375 return self._get_instance_cached()
2376 return self._get_instance(cache=bool(cache), config=config)
2376 return self._get_instance(cache=bool(cache), config=config)
2377
2377
2378 def _get_instance_cached(self):
2378 def _get_instance_cached(self):
2379 from rhodecode.lib import rc_cache
2379 from rhodecode.lib import rc_cache
2380
2380
2381 cache_namespace_uid = 'cache_repo_instance.{}'.format(self.repo_id)
2381 cache_namespace_uid = 'cache_repo_instance.{}'.format(self.repo_id)
2382 invalidation_namespace = CacheKey.REPO_INVALIDATION_NAMESPACE.format(
2382 invalidation_namespace = CacheKey.REPO_INVALIDATION_NAMESPACE.format(
2383 repo_id=self.repo_id)
2383 repo_id=self.repo_id)
2384 region = rc_cache.get_or_create_region('cache_repo_longterm', cache_namespace_uid)
2384 region = rc_cache.get_or_create_region('cache_repo_longterm', cache_namespace_uid)
2385
2385
2386 @region.conditional_cache_on_arguments(namespace=cache_namespace_uid)
2386 @region.conditional_cache_on_arguments(namespace=cache_namespace_uid)
2387 def get_instance_cached(repo_id, context_id):
2387 def get_instance_cached(repo_id, context_id):
2388 return self._get_instance()
2388 return self._get_instance()
2389
2389
2390 # we must use thread scoped cache here,
2390 # we must use thread scoped cache here,
2391 # because each thread of gevent needs it's own not shared connection and cache
2391 # because each thread of gevent needs it's own not shared connection and cache
2392 # we also alter `args` so the cache key is individual for every green thread.
2392 # we also alter `args` so the cache key is individual for every green thread.
2393 inv_context_manager = rc_cache.InvalidationContext(
2393 inv_context_manager = rc_cache.InvalidationContext(
2394 uid=cache_namespace_uid, invalidation_namespace=invalidation_namespace,
2394 uid=cache_namespace_uid, invalidation_namespace=invalidation_namespace,
2395 thread_scoped=True)
2395 thread_scoped=True)
2396 with inv_context_manager as invalidation_context:
2396 with inv_context_manager as invalidation_context:
2397 args = (self.repo_id, inv_context_manager.cache_key)
2397 args = (self.repo_id, inv_context_manager.cache_key)
2398 # re-compute and store cache if we get invalidate signal
2398 # re-compute and store cache if we get invalidate signal
2399 if invalidation_context.should_invalidate():
2399 if invalidation_context.should_invalidate():
2400 instance = get_instance_cached.refresh(*args)
2400 instance = get_instance_cached.refresh(*args)
2401 else:
2401 else:
2402 instance = get_instance_cached(*args)
2402 instance = get_instance_cached(*args)
2403
2403
2404 log.debug(
2404 log.debug(
2405 'Repo instance fetched in %.3fs', inv_context_manager.compute_time)
2405 'Repo instance fetched in %.4fs', inv_context_manager.compute_time)
2406 return instance
2406 return instance
2407
2407
2408 def _get_instance(self, cache=True, config=None):
2408 def _get_instance(self, cache=True, config=None):
2409 config = config or self._config
2409 config = config or self._config
2410 custom_wire = {
2410 custom_wire = {
2411 'cache': cache # controls the vcs.remote cache
2411 'cache': cache # controls the vcs.remote cache
2412 }
2412 }
2413 repo = get_vcs_instance(
2413 repo = get_vcs_instance(
2414 repo_path=safe_str(self.repo_full_path),
2414 repo_path=safe_str(self.repo_full_path),
2415 config=config,
2415 config=config,
2416 with_wire=custom_wire,
2416 with_wire=custom_wire,
2417 create=False,
2417 create=False,
2418 _vcs_alias=self.repo_type)
2418 _vcs_alias=self.repo_type)
2419
2419
2420 return repo
2420 return repo
2421
2421
2422 def __json__(self):
2422 def __json__(self):
2423 return {'landing_rev': self.landing_rev}
2423 return {'landing_rev': self.landing_rev}
2424
2424
2425 def get_dict(self):
2425 def get_dict(self):
2426
2426
2427 # Since we transformed `repo_name` to a hybrid property, we need to
2427 # Since we transformed `repo_name` to a hybrid property, we need to
2428 # keep compatibility with the code which uses `repo_name` field.
2428 # keep compatibility with the code which uses `repo_name` field.
2429
2429
2430 result = super(Repository, self).get_dict()
2430 result = super(Repository, self).get_dict()
2431 result['repo_name'] = result.pop('_repo_name', None)
2431 result['repo_name'] = result.pop('_repo_name', None)
2432 return result
2432 return result
2433
2433
2434
2434
2435 class RepoGroup(Base, BaseModel):
2435 class RepoGroup(Base, BaseModel):
2436 __tablename__ = 'groups'
2436 __tablename__ = 'groups'
2437 __table_args__ = (
2437 __table_args__ = (
2438 UniqueConstraint('group_name', 'group_parent_id'),
2438 UniqueConstraint('group_name', 'group_parent_id'),
2439 base_table_args,
2439 base_table_args,
2440 )
2440 )
2441 __mapper_args__ = {'order_by': 'group_name'}
2441 __mapper_args__ = {'order_by': 'group_name'}
2442
2442
2443 CHOICES_SEPARATOR = '/' # used to generate select2 choices for nested groups
2443 CHOICES_SEPARATOR = '/' # used to generate select2 choices for nested groups
2444
2444
2445 group_id = Column("group_id", Integer(), nullable=False, unique=True, default=None, primary_key=True)
2445 group_id = Column("group_id", Integer(), nullable=False, unique=True, default=None, primary_key=True)
2446 group_name = Column("group_name", String(255), nullable=False, unique=True, default=None)
2446 group_name = Column("group_name", String(255), nullable=False, unique=True, default=None)
2447 group_parent_id = Column("group_parent_id", Integer(), ForeignKey('groups.group_id'), nullable=True, unique=None, default=None)
2447 group_parent_id = Column("group_parent_id", Integer(), ForeignKey('groups.group_id'), nullable=True, unique=None, default=None)
2448 group_description = Column("group_description", String(10000), nullable=True, unique=None, default=None)
2448 group_description = Column("group_description", String(10000), nullable=True, unique=None, default=None)
2449 enable_locking = Column("enable_locking", Boolean(), nullable=False, unique=None, default=False)
2449 enable_locking = Column("enable_locking", Boolean(), nullable=False, unique=None, default=False)
2450 user_id = Column("user_id", Integer(), ForeignKey('users.user_id'), nullable=False, unique=False, default=None)
2450 user_id = Column("user_id", Integer(), ForeignKey('users.user_id'), nullable=False, unique=False, default=None)
2451 created_on = Column('created_on', DateTime(timezone=False), nullable=False, default=datetime.datetime.now)
2451 created_on = Column('created_on', DateTime(timezone=False), nullable=False, default=datetime.datetime.now)
2452 updated_on = Column('updated_on', DateTime(timezone=False), nullable=True, unique=None, default=datetime.datetime.now)
2452 updated_on = Column('updated_on', DateTime(timezone=False), nullable=True, unique=None, default=datetime.datetime.now)
2453 personal = Column('personal', Boolean(), nullable=True, unique=None, default=None)
2453 personal = Column('personal', Boolean(), nullable=True, unique=None, default=None)
2454
2454
2455 repo_group_to_perm = relationship('UserRepoGroupToPerm', cascade='all', order_by='UserRepoGroupToPerm.group_to_perm_id')
2455 repo_group_to_perm = relationship('UserRepoGroupToPerm', cascade='all', order_by='UserRepoGroupToPerm.group_to_perm_id')
2456 users_group_to_perm = relationship('UserGroupRepoGroupToPerm', cascade='all')
2456 users_group_to_perm = relationship('UserGroupRepoGroupToPerm', cascade='all')
2457 parent_group = relationship('RepoGroup', remote_side=group_id)
2457 parent_group = relationship('RepoGroup', remote_side=group_id)
2458 user = relationship('User')
2458 user = relationship('User')
2459 integrations = relationship('Integration',
2459 integrations = relationship('Integration',
2460 cascade="all, delete, delete-orphan")
2460 cascade="all, delete, delete-orphan")
2461
2461
2462 def __init__(self, group_name='', parent_group=None):
2462 def __init__(self, group_name='', parent_group=None):
2463 self.group_name = group_name
2463 self.group_name = group_name
2464 self.parent_group = parent_group
2464 self.parent_group = parent_group
2465
2465
2466 def __unicode__(self):
2466 def __unicode__(self):
2467 return u"<%s('id:%s:%s')>" % (
2467 return u"<%s('id:%s:%s')>" % (
2468 self.__class__.__name__, self.group_id, self.group_name)
2468 self.__class__.__name__, self.group_id, self.group_name)
2469
2469
2470 @hybrid_property
2470 @hybrid_property
2471 def description_safe(self):
2471 def description_safe(self):
2472 from rhodecode.lib import helpers as h
2472 from rhodecode.lib import helpers as h
2473 return h.escape(self.group_description)
2473 return h.escape(self.group_description)
2474
2474
2475 @classmethod
2475 @classmethod
2476 def _generate_choice(cls, repo_group):
2476 def _generate_choice(cls, repo_group):
2477 from webhelpers.html import literal as _literal
2477 from webhelpers.html import literal as _literal
2478 _name = lambda k: _literal(cls.CHOICES_SEPARATOR.join(k))
2478 _name = lambda k: _literal(cls.CHOICES_SEPARATOR.join(k))
2479 return repo_group.group_id, _name(repo_group.full_path_splitted)
2479 return repo_group.group_id, _name(repo_group.full_path_splitted)
2480
2480
2481 @classmethod
2481 @classmethod
2482 def groups_choices(cls, groups=None, show_empty_group=True):
2482 def groups_choices(cls, groups=None, show_empty_group=True):
2483 if not groups:
2483 if not groups:
2484 groups = cls.query().all()
2484 groups = cls.query().all()
2485
2485
2486 repo_groups = []
2486 repo_groups = []
2487 if show_empty_group:
2487 if show_empty_group:
2488 repo_groups = [(-1, u'-- %s --' % _('No parent'))]
2488 repo_groups = [(-1, u'-- %s --' % _('No parent'))]
2489
2489
2490 repo_groups.extend([cls._generate_choice(x) for x in groups])
2490 repo_groups.extend([cls._generate_choice(x) for x in groups])
2491
2491
2492 repo_groups = sorted(
2492 repo_groups = sorted(
2493 repo_groups, key=lambda t: t[1].split(cls.CHOICES_SEPARATOR)[0])
2493 repo_groups, key=lambda t: t[1].split(cls.CHOICES_SEPARATOR)[0])
2494 return repo_groups
2494 return repo_groups
2495
2495
2496 @classmethod
2496 @classmethod
2497 def url_sep(cls):
2497 def url_sep(cls):
2498 return URL_SEP
2498 return URL_SEP
2499
2499
2500 @classmethod
2500 @classmethod
2501 def get_by_group_name(cls, group_name, cache=False, case_insensitive=False):
2501 def get_by_group_name(cls, group_name, cache=False, case_insensitive=False):
2502 if case_insensitive:
2502 if case_insensitive:
2503 gr = cls.query().filter(func.lower(cls.group_name)
2503 gr = cls.query().filter(func.lower(cls.group_name)
2504 == func.lower(group_name))
2504 == func.lower(group_name))
2505 else:
2505 else:
2506 gr = cls.query().filter(cls.group_name == group_name)
2506 gr = cls.query().filter(cls.group_name == group_name)
2507 if cache:
2507 if cache:
2508 name_key = _hash_key(group_name)
2508 name_key = _hash_key(group_name)
2509 gr = gr.options(
2509 gr = gr.options(
2510 FromCache("sql_cache_short", "get_group_%s" % name_key))
2510 FromCache("sql_cache_short", "get_group_%s" % name_key))
2511 return gr.scalar()
2511 return gr.scalar()
2512
2512
2513 @classmethod
2513 @classmethod
2514 def get_user_personal_repo_group(cls, user_id):
2514 def get_user_personal_repo_group(cls, user_id):
2515 user = User.get(user_id)
2515 user = User.get(user_id)
2516 if user.username == User.DEFAULT_USER:
2516 if user.username == User.DEFAULT_USER:
2517 return None
2517 return None
2518
2518
2519 return cls.query()\
2519 return cls.query()\
2520 .filter(cls.personal == true()) \
2520 .filter(cls.personal == true()) \
2521 .filter(cls.user == user) \
2521 .filter(cls.user == user) \
2522 .order_by(cls.group_id.asc()) \
2522 .order_by(cls.group_id.asc()) \
2523 .first()
2523 .first()
2524
2524
2525 @classmethod
2525 @classmethod
2526 def get_all_repo_groups(cls, user_id=Optional(None), group_id=Optional(None),
2526 def get_all_repo_groups(cls, user_id=Optional(None), group_id=Optional(None),
2527 case_insensitive=True):
2527 case_insensitive=True):
2528 q = RepoGroup.query()
2528 q = RepoGroup.query()
2529
2529
2530 if not isinstance(user_id, Optional):
2530 if not isinstance(user_id, Optional):
2531 q = q.filter(RepoGroup.user_id == user_id)
2531 q = q.filter(RepoGroup.user_id == user_id)
2532
2532
2533 if not isinstance(group_id, Optional):
2533 if not isinstance(group_id, Optional):
2534 q = q.filter(RepoGroup.group_parent_id == group_id)
2534 q = q.filter(RepoGroup.group_parent_id == group_id)
2535
2535
2536 if case_insensitive:
2536 if case_insensitive:
2537 q = q.order_by(func.lower(RepoGroup.group_name))
2537 q = q.order_by(func.lower(RepoGroup.group_name))
2538 else:
2538 else:
2539 q = q.order_by(RepoGroup.group_name)
2539 q = q.order_by(RepoGroup.group_name)
2540 return q.all()
2540 return q.all()
2541
2541
2542 @property
2542 @property
2543 def parents(self):
2543 def parents(self):
2544 parents_recursion_limit = 10
2544 parents_recursion_limit = 10
2545 groups = []
2545 groups = []
2546 if self.parent_group is None:
2546 if self.parent_group is None:
2547 return groups
2547 return groups
2548 cur_gr = self.parent_group
2548 cur_gr = self.parent_group
2549 groups.insert(0, cur_gr)
2549 groups.insert(0, cur_gr)
2550 cnt = 0
2550 cnt = 0
2551 while 1:
2551 while 1:
2552 cnt += 1
2552 cnt += 1
2553 gr = getattr(cur_gr, 'parent_group', None)
2553 gr = getattr(cur_gr, 'parent_group', None)
2554 cur_gr = cur_gr.parent_group
2554 cur_gr = cur_gr.parent_group
2555 if gr is None:
2555 if gr is None:
2556 break
2556 break
2557 if cnt == parents_recursion_limit:
2557 if cnt == parents_recursion_limit:
2558 # this will prevent accidental infinit loops
2558 # this will prevent accidental infinit loops
2559 log.error('more than %s parents found for group %s, stopping '
2559 log.error('more than %s parents found for group %s, stopping '
2560 'recursive parent fetching', parents_recursion_limit, self)
2560 'recursive parent fetching', parents_recursion_limit, self)
2561 break
2561 break
2562
2562
2563 groups.insert(0, gr)
2563 groups.insert(0, gr)
2564 return groups
2564 return groups
2565
2565
2566 @property
2566 @property
2567 def last_db_change(self):
2567 def last_db_change(self):
2568 return self.updated_on
2568 return self.updated_on
2569
2569
2570 @property
2570 @property
2571 def children(self):
2571 def children(self):
2572 return RepoGroup.query().filter(RepoGroup.parent_group == self)
2572 return RepoGroup.query().filter(RepoGroup.parent_group == self)
2573
2573
2574 @property
2574 @property
2575 def name(self):
2575 def name(self):
2576 return self.group_name.split(RepoGroup.url_sep())[-1]
2576 return self.group_name.split(RepoGroup.url_sep())[-1]
2577
2577
2578 @property
2578 @property
2579 def full_path(self):
2579 def full_path(self):
2580 return self.group_name
2580 return self.group_name
2581
2581
2582 @property
2582 @property
2583 def full_path_splitted(self):
2583 def full_path_splitted(self):
2584 return self.group_name.split(RepoGroup.url_sep())
2584 return self.group_name.split(RepoGroup.url_sep())
2585
2585
2586 @property
2586 @property
2587 def repositories(self):
2587 def repositories(self):
2588 return Repository.query()\
2588 return Repository.query()\
2589 .filter(Repository.group == self)\
2589 .filter(Repository.group == self)\
2590 .order_by(Repository.repo_name)
2590 .order_by(Repository.repo_name)
2591
2591
2592 @property
2592 @property
2593 def repositories_recursive_count(self):
2593 def repositories_recursive_count(self):
2594 cnt = self.repositories.count()
2594 cnt = self.repositories.count()
2595
2595
2596 def children_count(group):
2596 def children_count(group):
2597 cnt = 0
2597 cnt = 0
2598 for child in group.children:
2598 for child in group.children:
2599 cnt += child.repositories.count()
2599 cnt += child.repositories.count()
2600 cnt += children_count(child)
2600 cnt += children_count(child)
2601 return cnt
2601 return cnt
2602
2602
2603 return cnt + children_count(self)
2603 return cnt + children_count(self)
2604
2604
2605 def _recursive_objects(self, include_repos=True):
2605 def _recursive_objects(self, include_repos=True):
2606 all_ = []
2606 all_ = []
2607
2607
2608 def _get_members(root_gr):
2608 def _get_members(root_gr):
2609 if include_repos:
2609 if include_repos:
2610 for r in root_gr.repositories:
2610 for r in root_gr.repositories:
2611 all_.append(r)
2611 all_.append(r)
2612 childs = root_gr.children.all()
2612 childs = root_gr.children.all()
2613 if childs:
2613 if childs:
2614 for gr in childs:
2614 for gr in childs:
2615 all_.append(gr)
2615 all_.append(gr)
2616 _get_members(gr)
2616 _get_members(gr)
2617
2617
2618 _get_members(self)
2618 _get_members(self)
2619 return [self] + all_
2619 return [self] + all_
2620
2620
2621 def recursive_groups_and_repos(self):
2621 def recursive_groups_and_repos(self):
2622 """
2622 """
2623 Recursive return all groups, with repositories in those groups
2623 Recursive return all groups, with repositories in those groups
2624 """
2624 """
2625 return self._recursive_objects()
2625 return self._recursive_objects()
2626
2626
2627 def recursive_groups(self):
2627 def recursive_groups(self):
2628 """
2628 """
2629 Returns all children groups for this group including children of children
2629 Returns all children groups for this group including children of children
2630 """
2630 """
2631 return self._recursive_objects(include_repos=False)
2631 return self._recursive_objects(include_repos=False)
2632
2632
2633 def get_new_name(self, group_name):
2633 def get_new_name(self, group_name):
2634 """
2634 """
2635 returns new full group name based on parent and new name
2635 returns new full group name based on parent and new name
2636
2636
2637 :param group_name:
2637 :param group_name:
2638 """
2638 """
2639 path_prefix = (self.parent_group.full_path_splitted if
2639 path_prefix = (self.parent_group.full_path_splitted if
2640 self.parent_group else [])
2640 self.parent_group else [])
2641 return RepoGroup.url_sep().join(path_prefix + [group_name])
2641 return RepoGroup.url_sep().join(path_prefix + [group_name])
2642
2642
2643 def permissions(self, with_admins=True, with_owner=True):
2643 def permissions(self, with_admins=True, with_owner=True):
2644 """
2644 """
2645 Permissions for repository groups
2645 Permissions for repository groups
2646 """
2646 """
2647 _admin_perm = 'group.admin'
2647 _admin_perm = 'group.admin'
2648
2648
2649 owner_row = []
2649 owner_row = []
2650 if with_owner:
2650 if with_owner:
2651 usr = AttributeDict(self.user.get_dict())
2651 usr = AttributeDict(self.user.get_dict())
2652 usr.owner_row = True
2652 usr.owner_row = True
2653 usr.permission = _admin_perm
2653 usr.permission = _admin_perm
2654 owner_row.append(usr)
2654 owner_row.append(usr)
2655
2655
2656 super_admin_ids = []
2656 super_admin_ids = []
2657 super_admin_rows = []
2657 super_admin_rows = []
2658 if with_admins:
2658 if with_admins:
2659 for usr in User.get_all_super_admins():
2659 for usr in User.get_all_super_admins():
2660 super_admin_ids.append(usr.user_id)
2660 super_admin_ids.append(usr.user_id)
2661 # if this admin is also owner, don't double the record
2661 # if this admin is also owner, don't double the record
2662 if usr.user_id == owner_row[0].user_id:
2662 if usr.user_id == owner_row[0].user_id:
2663 owner_row[0].admin_row = True
2663 owner_row[0].admin_row = True
2664 else:
2664 else:
2665 usr = AttributeDict(usr.get_dict())
2665 usr = AttributeDict(usr.get_dict())
2666 usr.admin_row = True
2666 usr.admin_row = True
2667 usr.permission = _admin_perm
2667 usr.permission = _admin_perm
2668 super_admin_rows.append(usr)
2668 super_admin_rows.append(usr)
2669
2669
2670 q = UserRepoGroupToPerm.query().filter(UserRepoGroupToPerm.group == self)
2670 q = UserRepoGroupToPerm.query().filter(UserRepoGroupToPerm.group == self)
2671 q = q.options(joinedload(UserRepoGroupToPerm.group),
2671 q = q.options(joinedload(UserRepoGroupToPerm.group),
2672 joinedload(UserRepoGroupToPerm.user),
2672 joinedload(UserRepoGroupToPerm.user),
2673 joinedload(UserRepoGroupToPerm.permission),)
2673 joinedload(UserRepoGroupToPerm.permission),)
2674
2674
2675 # get owners and admins and permissions. We do a trick of re-writing
2675 # get owners and admins and permissions. We do a trick of re-writing
2676 # objects from sqlalchemy to named-tuples due to sqlalchemy session
2676 # objects from sqlalchemy to named-tuples due to sqlalchemy session
2677 # has a global reference and changing one object propagates to all
2677 # has a global reference and changing one object propagates to all
2678 # others. This means if admin is also an owner admin_row that change
2678 # others. This means if admin is also an owner admin_row that change
2679 # would propagate to both objects
2679 # would propagate to both objects
2680 perm_rows = []
2680 perm_rows = []
2681 for _usr in q.all():
2681 for _usr in q.all():
2682 usr = AttributeDict(_usr.user.get_dict())
2682 usr = AttributeDict(_usr.user.get_dict())
2683 # if this user is also owner/admin, mark as duplicate record
2683 # if this user is also owner/admin, mark as duplicate record
2684 if usr.user_id == owner_row[0].user_id or usr.user_id in super_admin_ids:
2684 if usr.user_id == owner_row[0].user_id or usr.user_id in super_admin_ids:
2685 usr.duplicate_perm = True
2685 usr.duplicate_perm = True
2686 usr.permission = _usr.permission.permission_name
2686 usr.permission = _usr.permission.permission_name
2687 perm_rows.append(usr)
2687 perm_rows.append(usr)
2688
2688
2689 # filter the perm rows by 'default' first and then sort them by
2689 # filter the perm rows by 'default' first and then sort them by
2690 # admin,write,read,none permissions sorted again alphabetically in
2690 # admin,write,read,none permissions sorted again alphabetically in
2691 # each group
2691 # each group
2692 perm_rows = sorted(perm_rows, key=display_user_sort)
2692 perm_rows = sorted(perm_rows, key=display_user_sort)
2693
2693
2694 return super_admin_rows + owner_row + perm_rows
2694 return super_admin_rows + owner_row + perm_rows
2695
2695
2696 def permission_user_groups(self):
2696 def permission_user_groups(self):
2697 q = UserGroupRepoGroupToPerm.query().filter(
2697 q = UserGroupRepoGroupToPerm.query().filter(
2698 UserGroupRepoGroupToPerm.group == self)
2698 UserGroupRepoGroupToPerm.group == self)
2699 q = q.options(joinedload(UserGroupRepoGroupToPerm.group),
2699 q = q.options(joinedload(UserGroupRepoGroupToPerm.group),
2700 joinedload(UserGroupRepoGroupToPerm.users_group),
2700 joinedload(UserGroupRepoGroupToPerm.users_group),
2701 joinedload(UserGroupRepoGroupToPerm.permission),)
2701 joinedload(UserGroupRepoGroupToPerm.permission),)
2702
2702
2703 perm_rows = []
2703 perm_rows = []
2704 for _user_group in q.all():
2704 for _user_group in q.all():
2705 usr = AttributeDict(_user_group.users_group.get_dict())
2705 usr = AttributeDict(_user_group.users_group.get_dict())
2706 usr.permission = _user_group.permission.permission_name
2706 usr.permission = _user_group.permission.permission_name
2707 perm_rows.append(usr)
2707 perm_rows.append(usr)
2708
2708
2709 perm_rows = sorted(perm_rows, key=display_user_group_sort)
2709 perm_rows = sorted(perm_rows, key=display_user_group_sort)
2710 return perm_rows
2710 return perm_rows
2711
2711
2712 def get_api_data(self):
2712 def get_api_data(self):
2713 """
2713 """
2714 Common function for generating api data
2714 Common function for generating api data
2715
2715
2716 """
2716 """
2717 group = self
2717 group = self
2718 data = {
2718 data = {
2719 'group_id': group.group_id,
2719 'group_id': group.group_id,
2720 'group_name': group.group_name,
2720 'group_name': group.group_name,
2721 'group_description': group.description_safe,
2721 'group_description': group.description_safe,
2722 'parent_group': group.parent_group.group_name if group.parent_group else None,
2722 'parent_group': group.parent_group.group_name if group.parent_group else None,
2723 'repositories': [x.repo_name for x in group.repositories],
2723 'repositories': [x.repo_name for x in group.repositories],
2724 'owner': group.user.username,
2724 'owner': group.user.username,
2725 }
2725 }
2726 return data
2726 return data
2727
2727
2728
2728
2729 class Permission(Base, BaseModel):
2729 class Permission(Base, BaseModel):
2730 __tablename__ = 'permissions'
2730 __tablename__ = 'permissions'
2731 __table_args__ = (
2731 __table_args__ = (
2732 Index('p_perm_name_idx', 'permission_name'),
2732 Index('p_perm_name_idx', 'permission_name'),
2733 base_table_args,
2733 base_table_args,
2734 )
2734 )
2735
2735
2736 PERMS = [
2736 PERMS = [
2737 ('hg.admin', _('RhodeCode Super Administrator')),
2737 ('hg.admin', _('RhodeCode Super Administrator')),
2738
2738
2739 ('repository.none', _('Repository no access')),
2739 ('repository.none', _('Repository no access')),
2740 ('repository.read', _('Repository read access')),
2740 ('repository.read', _('Repository read access')),
2741 ('repository.write', _('Repository write access')),
2741 ('repository.write', _('Repository write access')),
2742 ('repository.admin', _('Repository admin access')),
2742 ('repository.admin', _('Repository admin access')),
2743
2743
2744 ('group.none', _('Repository group no access')),
2744 ('group.none', _('Repository group no access')),
2745 ('group.read', _('Repository group read access')),
2745 ('group.read', _('Repository group read access')),
2746 ('group.write', _('Repository group write access')),
2746 ('group.write', _('Repository group write access')),
2747 ('group.admin', _('Repository group admin access')),
2747 ('group.admin', _('Repository group admin access')),
2748
2748
2749 ('usergroup.none', _('User group no access')),
2749 ('usergroup.none', _('User group no access')),
2750 ('usergroup.read', _('User group read access')),
2750 ('usergroup.read', _('User group read access')),
2751 ('usergroup.write', _('User group write access')),
2751 ('usergroup.write', _('User group write access')),
2752 ('usergroup.admin', _('User group admin access')),
2752 ('usergroup.admin', _('User group admin access')),
2753
2753
2754 ('branch.none', _('Branch no permissions')),
2754 ('branch.none', _('Branch no permissions')),
2755 ('branch.merge', _('Branch access by web merge')),
2755 ('branch.merge', _('Branch access by web merge')),
2756 ('branch.push', _('Branch access by push')),
2756 ('branch.push', _('Branch access by push')),
2757 ('branch.push_force', _('Branch access by push with force')),
2757 ('branch.push_force', _('Branch access by push with force')),
2758
2758
2759 ('hg.repogroup.create.false', _('Repository Group creation disabled')),
2759 ('hg.repogroup.create.false', _('Repository Group creation disabled')),
2760 ('hg.repogroup.create.true', _('Repository Group creation enabled')),
2760 ('hg.repogroup.create.true', _('Repository Group creation enabled')),
2761
2761
2762 ('hg.usergroup.create.false', _('User Group creation disabled')),
2762 ('hg.usergroup.create.false', _('User Group creation disabled')),
2763 ('hg.usergroup.create.true', _('User Group creation enabled')),
2763 ('hg.usergroup.create.true', _('User Group creation enabled')),
2764
2764
2765 ('hg.create.none', _('Repository creation disabled')),
2765 ('hg.create.none', _('Repository creation disabled')),
2766 ('hg.create.repository', _('Repository creation enabled')),
2766 ('hg.create.repository', _('Repository creation enabled')),
2767 ('hg.create.write_on_repogroup.true', _('Repository creation enabled with write permission to a repository group')),
2767 ('hg.create.write_on_repogroup.true', _('Repository creation enabled with write permission to a repository group')),
2768 ('hg.create.write_on_repogroup.false', _('Repository creation disabled with write permission to a repository group')),
2768 ('hg.create.write_on_repogroup.false', _('Repository creation disabled with write permission to a repository group')),
2769
2769
2770 ('hg.fork.none', _('Repository forking disabled')),
2770 ('hg.fork.none', _('Repository forking disabled')),
2771 ('hg.fork.repository', _('Repository forking enabled')),
2771 ('hg.fork.repository', _('Repository forking enabled')),
2772
2772
2773 ('hg.register.none', _('Registration disabled')),
2773 ('hg.register.none', _('Registration disabled')),
2774 ('hg.register.manual_activate', _('User Registration with manual account activation')),
2774 ('hg.register.manual_activate', _('User Registration with manual account activation')),
2775 ('hg.register.auto_activate', _('User Registration with automatic account activation')),
2775 ('hg.register.auto_activate', _('User Registration with automatic account activation')),
2776
2776
2777 ('hg.password_reset.enabled', _('Password reset enabled')),
2777 ('hg.password_reset.enabled', _('Password reset enabled')),
2778 ('hg.password_reset.hidden', _('Password reset hidden')),
2778 ('hg.password_reset.hidden', _('Password reset hidden')),
2779 ('hg.password_reset.disabled', _('Password reset disabled')),
2779 ('hg.password_reset.disabled', _('Password reset disabled')),
2780
2780
2781 ('hg.extern_activate.manual', _('Manual activation of external account')),
2781 ('hg.extern_activate.manual', _('Manual activation of external account')),
2782 ('hg.extern_activate.auto', _('Automatic activation of external account')),
2782 ('hg.extern_activate.auto', _('Automatic activation of external account')),
2783
2783
2784 ('hg.inherit_default_perms.false', _('Inherit object permissions from default user disabled')),
2784 ('hg.inherit_default_perms.false', _('Inherit object permissions from default user disabled')),
2785 ('hg.inherit_default_perms.true', _('Inherit object permissions from default user enabled')),
2785 ('hg.inherit_default_perms.true', _('Inherit object permissions from default user enabled')),
2786 ]
2786 ]
2787
2787
2788 # definition of system default permissions for DEFAULT user, created on
2788 # definition of system default permissions for DEFAULT user, created on
2789 # system setup
2789 # system setup
2790 DEFAULT_USER_PERMISSIONS = [
2790 DEFAULT_USER_PERMISSIONS = [
2791 # object perms
2791 # object perms
2792 'repository.read',
2792 'repository.read',
2793 'group.read',
2793 'group.read',
2794 'usergroup.read',
2794 'usergroup.read',
2795 # branch, for backward compat we need same value as before so forced pushed
2795 # branch, for backward compat we need same value as before so forced pushed
2796 'branch.push_force',
2796 'branch.push_force',
2797 # global
2797 # global
2798 'hg.create.repository',
2798 'hg.create.repository',
2799 'hg.repogroup.create.false',
2799 'hg.repogroup.create.false',
2800 'hg.usergroup.create.false',
2800 'hg.usergroup.create.false',
2801 'hg.create.write_on_repogroup.true',
2801 'hg.create.write_on_repogroup.true',
2802 'hg.fork.repository',
2802 'hg.fork.repository',
2803 'hg.register.manual_activate',
2803 'hg.register.manual_activate',
2804 'hg.password_reset.enabled',
2804 'hg.password_reset.enabled',
2805 'hg.extern_activate.auto',
2805 'hg.extern_activate.auto',
2806 'hg.inherit_default_perms.true',
2806 'hg.inherit_default_perms.true',
2807 ]
2807 ]
2808
2808
2809 # defines which permissions are more important higher the more important
2809 # defines which permissions are more important higher the more important
2810 # Weight defines which permissions are more important.
2810 # Weight defines which permissions are more important.
2811 # The higher number the more important.
2811 # The higher number the more important.
2812 PERM_WEIGHTS = {
2812 PERM_WEIGHTS = {
2813 'repository.none': 0,
2813 'repository.none': 0,
2814 'repository.read': 1,
2814 'repository.read': 1,
2815 'repository.write': 3,
2815 'repository.write': 3,
2816 'repository.admin': 4,
2816 'repository.admin': 4,
2817
2817
2818 'group.none': 0,
2818 'group.none': 0,
2819 'group.read': 1,
2819 'group.read': 1,
2820 'group.write': 3,
2820 'group.write': 3,
2821 'group.admin': 4,
2821 'group.admin': 4,
2822
2822
2823 'usergroup.none': 0,
2823 'usergroup.none': 0,
2824 'usergroup.read': 1,
2824 'usergroup.read': 1,
2825 'usergroup.write': 3,
2825 'usergroup.write': 3,
2826 'usergroup.admin': 4,
2826 'usergroup.admin': 4,
2827
2827
2828 'branch.none': 0,
2828 'branch.none': 0,
2829 'branch.merge': 1,
2829 'branch.merge': 1,
2830 'branch.push': 3,
2830 'branch.push': 3,
2831 'branch.push_force': 4,
2831 'branch.push_force': 4,
2832
2832
2833 'hg.repogroup.create.false': 0,
2833 'hg.repogroup.create.false': 0,
2834 'hg.repogroup.create.true': 1,
2834 'hg.repogroup.create.true': 1,
2835
2835
2836 'hg.usergroup.create.false': 0,
2836 'hg.usergroup.create.false': 0,
2837 'hg.usergroup.create.true': 1,
2837 'hg.usergroup.create.true': 1,
2838
2838
2839 'hg.fork.none': 0,
2839 'hg.fork.none': 0,
2840 'hg.fork.repository': 1,
2840 'hg.fork.repository': 1,
2841 'hg.create.none': 0,
2841 'hg.create.none': 0,
2842 'hg.create.repository': 1
2842 'hg.create.repository': 1
2843 }
2843 }
2844
2844
2845 permission_id = Column("permission_id", Integer(), nullable=False, unique=True, default=None, primary_key=True)
2845 permission_id = Column("permission_id", Integer(), nullable=False, unique=True, default=None, primary_key=True)
2846 permission_name = Column("permission_name", String(255), nullable=True, unique=None, default=None)
2846 permission_name = Column("permission_name", String(255), nullable=True, unique=None, default=None)
2847 permission_longname = Column("permission_longname", String(255), nullable=True, unique=None, default=None)
2847 permission_longname = Column("permission_longname", String(255), nullable=True, unique=None, default=None)
2848
2848
2849 def __unicode__(self):
2849 def __unicode__(self):
2850 return u"<%s('%s:%s')>" % (
2850 return u"<%s('%s:%s')>" % (
2851 self.__class__.__name__, self.permission_id, self.permission_name
2851 self.__class__.__name__, self.permission_id, self.permission_name
2852 )
2852 )
2853
2853
2854 @classmethod
2854 @classmethod
2855 def get_by_key(cls, key):
2855 def get_by_key(cls, key):
2856 return cls.query().filter(cls.permission_name == key).scalar()
2856 return cls.query().filter(cls.permission_name == key).scalar()
2857
2857
2858 @classmethod
2858 @classmethod
2859 def get_default_repo_perms(cls, user_id, repo_id=None):
2859 def get_default_repo_perms(cls, user_id, repo_id=None):
2860 q = Session().query(UserRepoToPerm, Repository, Permission)\
2860 q = Session().query(UserRepoToPerm, Repository, Permission)\
2861 .join((Permission, UserRepoToPerm.permission_id == Permission.permission_id))\
2861 .join((Permission, UserRepoToPerm.permission_id == Permission.permission_id))\
2862 .join((Repository, UserRepoToPerm.repository_id == Repository.repo_id))\
2862 .join((Repository, UserRepoToPerm.repository_id == Repository.repo_id))\
2863 .filter(UserRepoToPerm.user_id == user_id)
2863 .filter(UserRepoToPerm.user_id == user_id)
2864 if repo_id:
2864 if repo_id:
2865 q = q.filter(UserRepoToPerm.repository_id == repo_id)
2865 q = q.filter(UserRepoToPerm.repository_id == repo_id)
2866 return q.all()
2866 return q.all()
2867
2867
2868 @classmethod
2868 @classmethod
2869 def get_default_repo_branch_perms(cls, user_id, repo_id=None):
2869 def get_default_repo_branch_perms(cls, user_id, repo_id=None):
2870 q = Session().query(UserToRepoBranchPermission, UserRepoToPerm, Permission) \
2870 q = Session().query(UserToRepoBranchPermission, UserRepoToPerm, Permission) \
2871 .join(
2871 .join(
2872 Permission,
2872 Permission,
2873 UserToRepoBranchPermission.permission_id == Permission.permission_id) \
2873 UserToRepoBranchPermission.permission_id == Permission.permission_id) \
2874 .join(
2874 .join(
2875 UserRepoToPerm,
2875 UserRepoToPerm,
2876 UserToRepoBranchPermission.rule_to_perm_id == UserRepoToPerm.repo_to_perm_id) \
2876 UserToRepoBranchPermission.rule_to_perm_id == UserRepoToPerm.repo_to_perm_id) \
2877 .filter(UserRepoToPerm.user_id == user_id)
2877 .filter(UserRepoToPerm.user_id == user_id)
2878
2878
2879 if repo_id:
2879 if repo_id:
2880 q = q.filter(UserToRepoBranchPermission.repository_id == repo_id)
2880 q = q.filter(UserToRepoBranchPermission.repository_id == repo_id)
2881 return q.order_by(UserToRepoBranchPermission.rule_order).all()
2881 return q.order_by(UserToRepoBranchPermission.rule_order).all()
2882
2882
2883 @classmethod
2883 @classmethod
2884 def get_default_repo_perms_from_user_group(cls, user_id, repo_id=None):
2884 def get_default_repo_perms_from_user_group(cls, user_id, repo_id=None):
2885 q = Session().query(UserGroupRepoToPerm, Repository, Permission)\
2885 q = Session().query(UserGroupRepoToPerm, Repository, Permission)\
2886 .join(
2886 .join(
2887 Permission,
2887 Permission,
2888 UserGroupRepoToPerm.permission_id == Permission.permission_id)\
2888 UserGroupRepoToPerm.permission_id == Permission.permission_id)\
2889 .join(
2889 .join(
2890 Repository,
2890 Repository,
2891 UserGroupRepoToPerm.repository_id == Repository.repo_id)\
2891 UserGroupRepoToPerm.repository_id == Repository.repo_id)\
2892 .join(
2892 .join(
2893 UserGroup,
2893 UserGroup,
2894 UserGroupRepoToPerm.users_group_id ==
2894 UserGroupRepoToPerm.users_group_id ==
2895 UserGroup.users_group_id)\
2895 UserGroup.users_group_id)\
2896 .join(
2896 .join(
2897 UserGroupMember,
2897 UserGroupMember,
2898 UserGroupRepoToPerm.users_group_id ==
2898 UserGroupRepoToPerm.users_group_id ==
2899 UserGroupMember.users_group_id)\
2899 UserGroupMember.users_group_id)\
2900 .filter(
2900 .filter(
2901 UserGroupMember.user_id == user_id,
2901 UserGroupMember.user_id == user_id,
2902 UserGroup.users_group_active == true())
2902 UserGroup.users_group_active == true())
2903 if repo_id:
2903 if repo_id:
2904 q = q.filter(UserGroupRepoToPerm.repository_id == repo_id)
2904 q = q.filter(UserGroupRepoToPerm.repository_id == repo_id)
2905 return q.all()
2905 return q.all()
2906
2906
2907 @classmethod
2907 @classmethod
2908 def get_default_repo_branch_perms_from_user_group(cls, user_id, repo_id=None):
2908 def get_default_repo_branch_perms_from_user_group(cls, user_id, repo_id=None):
2909 q = Session().query(UserGroupToRepoBranchPermission, UserGroupRepoToPerm, Permission) \
2909 q = Session().query(UserGroupToRepoBranchPermission, UserGroupRepoToPerm, Permission) \
2910 .join(
2910 .join(
2911 Permission,
2911 Permission,
2912 UserGroupToRepoBranchPermission.permission_id == Permission.permission_id) \
2912 UserGroupToRepoBranchPermission.permission_id == Permission.permission_id) \
2913 .join(
2913 .join(
2914 UserGroupRepoToPerm,
2914 UserGroupRepoToPerm,
2915 UserGroupToRepoBranchPermission.rule_to_perm_id == UserGroupRepoToPerm.users_group_to_perm_id) \
2915 UserGroupToRepoBranchPermission.rule_to_perm_id == UserGroupRepoToPerm.users_group_to_perm_id) \
2916 .join(
2916 .join(
2917 UserGroup,
2917 UserGroup,
2918 UserGroupRepoToPerm.users_group_id == UserGroup.users_group_id) \
2918 UserGroupRepoToPerm.users_group_id == UserGroup.users_group_id) \
2919 .join(
2919 .join(
2920 UserGroupMember,
2920 UserGroupMember,
2921 UserGroupRepoToPerm.users_group_id == UserGroupMember.users_group_id) \
2921 UserGroupRepoToPerm.users_group_id == UserGroupMember.users_group_id) \
2922 .filter(
2922 .filter(
2923 UserGroupMember.user_id == user_id,
2923 UserGroupMember.user_id == user_id,
2924 UserGroup.users_group_active == true())
2924 UserGroup.users_group_active == true())
2925
2925
2926 if repo_id:
2926 if repo_id:
2927 q = q.filter(UserGroupToRepoBranchPermission.repository_id == repo_id)
2927 q = q.filter(UserGroupToRepoBranchPermission.repository_id == repo_id)
2928 return q.order_by(UserGroupToRepoBranchPermission.rule_order).all()
2928 return q.order_by(UserGroupToRepoBranchPermission.rule_order).all()
2929
2929
2930 @classmethod
2930 @classmethod
2931 def get_default_group_perms(cls, user_id, repo_group_id=None):
2931 def get_default_group_perms(cls, user_id, repo_group_id=None):
2932 q = Session().query(UserRepoGroupToPerm, RepoGroup, Permission)\
2932 q = Session().query(UserRepoGroupToPerm, RepoGroup, Permission)\
2933 .join(
2933 .join(
2934 Permission,
2934 Permission,
2935 UserRepoGroupToPerm.permission_id == Permission.permission_id)\
2935 UserRepoGroupToPerm.permission_id == Permission.permission_id)\
2936 .join(
2936 .join(
2937 RepoGroup,
2937 RepoGroup,
2938 UserRepoGroupToPerm.group_id == RepoGroup.group_id)\
2938 UserRepoGroupToPerm.group_id == RepoGroup.group_id)\
2939 .filter(UserRepoGroupToPerm.user_id == user_id)
2939 .filter(UserRepoGroupToPerm.user_id == user_id)
2940 if repo_group_id:
2940 if repo_group_id:
2941 q = q.filter(UserRepoGroupToPerm.group_id == repo_group_id)
2941 q = q.filter(UserRepoGroupToPerm.group_id == repo_group_id)
2942 return q.all()
2942 return q.all()
2943
2943
2944 @classmethod
2944 @classmethod
2945 def get_default_group_perms_from_user_group(
2945 def get_default_group_perms_from_user_group(
2946 cls, user_id, repo_group_id=None):
2946 cls, user_id, repo_group_id=None):
2947 q = Session().query(UserGroupRepoGroupToPerm, RepoGroup, Permission)\
2947 q = Session().query(UserGroupRepoGroupToPerm, RepoGroup, Permission)\
2948 .join(
2948 .join(
2949 Permission,
2949 Permission,
2950 UserGroupRepoGroupToPerm.permission_id ==
2950 UserGroupRepoGroupToPerm.permission_id ==
2951 Permission.permission_id)\
2951 Permission.permission_id)\
2952 .join(
2952 .join(
2953 RepoGroup,
2953 RepoGroup,
2954 UserGroupRepoGroupToPerm.group_id == RepoGroup.group_id)\
2954 UserGroupRepoGroupToPerm.group_id == RepoGroup.group_id)\
2955 .join(
2955 .join(
2956 UserGroup,
2956 UserGroup,
2957 UserGroupRepoGroupToPerm.users_group_id ==
2957 UserGroupRepoGroupToPerm.users_group_id ==
2958 UserGroup.users_group_id)\
2958 UserGroup.users_group_id)\
2959 .join(
2959 .join(
2960 UserGroupMember,
2960 UserGroupMember,
2961 UserGroupRepoGroupToPerm.users_group_id ==
2961 UserGroupRepoGroupToPerm.users_group_id ==
2962 UserGroupMember.users_group_id)\
2962 UserGroupMember.users_group_id)\
2963 .filter(
2963 .filter(
2964 UserGroupMember.user_id == user_id,
2964 UserGroupMember.user_id == user_id,
2965 UserGroup.users_group_active == true())
2965 UserGroup.users_group_active == true())
2966 if repo_group_id:
2966 if repo_group_id:
2967 q = q.filter(UserGroupRepoGroupToPerm.group_id == repo_group_id)
2967 q = q.filter(UserGroupRepoGroupToPerm.group_id == repo_group_id)
2968 return q.all()
2968 return q.all()
2969
2969
2970 @classmethod
2970 @classmethod
2971 def get_default_user_group_perms(cls, user_id, user_group_id=None):
2971 def get_default_user_group_perms(cls, user_id, user_group_id=None):
2972 q = Session().query(UserUserGroupToPerm, UserGroup, Permission)\
2972 q = Session().query(UserUserGroupToPerm, UserGroup, Permission)\
2973 .join((Permission, UserUserGroupToPerm.permission_id == Permission.permission_id))\
2973 .join((Permission, UserUserGroupToPerm.permission_id == Permission.permission_id))\
2974 .join((UserGroup, UserUserGroupToPerm.user_group_id == UserGroup.users_group_id))\
2974 .join((UserGroup, UserUserGroupToPerm.user_group_id == UserGroup.users_group_id))\
2975 .filter(UserUserGroupToPerm.user_id == user_id)
2975 .filter(UserUserGroupToPerm.user_id == user_id)
2976 if user_group_id:
2976 if user_group_id:
2977 q = q.filter(UserUserGroupToPerm.user_group_id == user_group_id)
2977 q = q.filter(UserUserGroupToPerm.user_group_id == user_group_id)
2978 return q.all()
2978 return q.all()
2979
2979
2980 @classmethod
2980 @classmethod
2981 def get_default_user_group_perms_from_user_group(
2981 def get_default_user_group_perms_from_user_group(
2982 cls, user_id, user_group_id=None):
2982 cls, user_id, user_group_id=None):
2983 TargetUserGroup = aliased(UserGroup, name='target_user_group')
2983 TargetUserGroup = aliased(UserGroup, name='target_user_group')
2984 q = Session().query(UserGroupUserGroupToPerm, UserGroup, Permission)\
2984 q = Session().query(UserGroupUserGroupToPerm, UserGroup, Permission)\
2985 .join(
2985 .join(
2986 Permission,
2986 Permission,
2987 UserGroupUserGroupToPerm.permission_id ==
2987 UserGroupUserGroupToPerm.permission_id ==
2988 Permission.permission_id)\
2988 Permission.permission_id)\
2989 .join(
2989 .join(
2990 TargetUserGroup,
2990 TargetUserGroup,
2991 UserGroupUserGroupToPerm.target_user_group_id ==
2991 UserGroupUserGroupToPerm.target_user_group_id ==
2992 TargetUserGroup.users_group_id)\
2992 TargetUserGroup.users_group_id)\
2993 .join(
2993 .join(
2994 UserGroup,
2994 UserGroup,
2995 UserGroupUserGroupToPerm.user_group_id ==
2995 UserGroupUserGroupToPerm.user_group_id ==
2996 UserGroup.users_group_id)\
2996 UserGroup.users_group_id)\
2997 .join(
2997 .join(
2998 UserGroupMember,
2998 UserGroupMember,
2999 UserGroupUserGroupToPerm.user_group_id ==
2999 UserGroupUserGroupToPerm.user_group_id ==
3000 UserGroupMember.users_group_id)\
3000 UserGroupMember.users_group_id)\
3001 .filter(
3001 .filter(
3002 UserGroupMember.user_id == user_id,
3002 UserGroupMember.user_id == user_id,
3003 UserGroup.users_group_active == true())
3003 UserGroup.users_group_active == true())
3004 if user_group_id:
3004 if user_group_id:
3005 q = q.filter(
3005 q = q.filter(
3006 UserGroupUserGroupToPerm.user_group_id == user_group_id)
3006 UserGroupUserGroupToPerm.user_group_id == user_group_id)
3007
3007
3008 return q.all()
3008 return q.all()
3009
3009
3010
3010
3011 class UserRepoToPerm(Base, BaseModel):
3011 class UserRepoToPerm(Base, BaseModel):
3012 __tablename__ = 'repo_to_perm'
3012 __tablename__ = 'repo_to_perm'
3013 __table_args__ = (
3013 __table_args__ = (
3014 UniqueConstraint('user_id', 'repository_id', 'permission_id'),
3014 UniqueConstraint('user_id', 'repository_id', 'permission_id'),
3015 base_table_args
3015 base_table_args
3016 )
3016 )
3017
3017
3018 repo_to_perm_id = Column("repo_to_perm_id", Integer(), nullable=False, unique=True, default=None, primary_key=True)
3018 repo_to_perm_id = Column("repo_to_perm_id", Integer(), nullable=False, unique=True, default=None, primary_key=True)
3019 user_id = Column("user_id", Integer(), ForeignKey('users.user_id'), nullable=False, unique=None, default=None)
3019 user_id = Column("user_id", Integer(), ForeignKey('users.user_id'), nullable=False, unique=None, default=None)
3020 permission_id = Column("permission_id", Integer(), ForeignKey('permissions.permission_id'), nullable=False, unique=None, default=None)
3020 permission_id = Column("permission_id", Integer(), ForeignKey('permissions.permission_id'), nullable=False, unique=None, default=None)
3021 repository_id = Column("repository_id", Integer(), ForeignKey('repositories.repo_id'), nullable=False, unique=None, default=None)
3021 repository_id = Column("repository_id", Integer(), ForeignKey('repositories.repo_id'), nullable=False, unique=None, default=None)
3022
3022
3023 user = relationship('User')
3023 user = relationship('User')
3024 repository = relationship('Repository')
3024 repository = relationship('Repository')
3025 permission = relationship('Permission')
3025 permission = relationship('Permission')
3026
3026
3027 branch_perm_entry = relationship('UserToRepoBranchPermission', cascade="all, delete, delete-orphan", lazy='joined')
3027 branch_perm_entry = relationship('UserToRepoBranchPermission', cascade="all, delete, delete-orphan", lazy='joined')
3028
3028
3029 @classmethod
3029 @classmethod
3030 def create(cls, user, repository, permission):
3030 def create(cls, user, repository, permission):
3031 n = cls()
3031 n = cls()
3032 n.user = user
3032 n.user = user
3033 n.repository = repository
3033 n.repository = repository
3034 n.permission = permission
3034 n.permission = permission
3035 Session().add(n)
3035 Session().add(n)
3036 return n
3036 return n
3037
3037
3038 def __unicode__(self):
3038 def __unicode__(self):
3039 return u'<%s => %s >' % (self.user, self.repository)
3039 return u'<%s => %s >' % (self.user, self.repository)
3040
3040
3041
3041
3042 class UserUserGroupToPerm(Base, BaseModel):
3042 class UserUserGroupToPerm(Base, BaseModel):
3043 __tablename__ = 'user_user_group_to_perm'
3043 __tablename__ = 'user_user_group_to_perm'
3044 __table_args__ = (
3044 __table_args__ = (
3045 UniqueConstraint('user_id', 'user_group_id', 'permission_id'),
3045 UniqueConstraint('user_id', 'user_group_id', 'permission_id'),
3046 base_table_args
3046 base_table_args
3047 )
3047 )
3048
3048
3049 user_user_group_to_perm_id = Column("user_user_group_to_perm_id", Integer(), nullable=False, unique=True, default=None, primary_key=True)
3049 user_user_group_to_perm_id = Column("user_user_group_to_perm_id", Integer(), nullable=False, unique=True, default=None, primary_key=True)
3050 user_id = Column("user_id", Integer(), ForeignKey('users.user_id'), nullable=False, unique=None, default=None)
3050 user_id = Column("user_id", Integer(), ForeignKey('users.user_id'), nullable=False, unique=None, default=None)
3051 permission_id = Column("permission_id", Integer(), ForeignKey('permissions.permission_id'), nullable=False, unique=None, default=None)
3051 permission_id = Column("permission_id", Integer(), ForeignKey('permissions.permission_id'), nullable=False, unique=None, default=None)
3052 user_group_id = Column("user_group_id", Integer(), ForeignKey('users_groups.users_group_id'), nullable=False, unique=None, default=None)
3052 user_group_id = Column("user_group_id", Integer(), ForeignKey('users_groups.users_group_id'), nullable=False, unique=None, default=None)
3053
3053
3054 user = relationship('User')
3054 user = relationship('User')
3055 user_group = relationship('UserGroup')
3055 user_group = relationship('UserGroup')
3056 permission = relationship('Permission')
3056 permission = relationship('Permission')
3057
3057
3058 @classmethod
3058 @classmethod
3059 def create(cls, user, user_group, permission):
3059 def create(cls, user, user_group, permission):
3060 n = cls()
3060 n = cls()
3061 n.user = user
3061 n.user = user
3062 n.user_group = user_group
3062 n.user_group = user_group
3063 n.permission = permission
3063 n.permission = permission
3064 Session().add(n)
3064 Session().add(n)
3065 return n
3065 return n
3066
3066
3067 def __unicode__(self):
3067 def __unicode__(self):
3068 return u'<%s => %s >' % (self.user, self.user_group)
3068 return u'<%s => %s >' % (self.user, self.user_group)
3069
3069
3070
3070
3071 class UserToPerm(Base, BaseModel):
3071 class UserToPerm(Base, BaseModel):
3072 __tablename__ = 'user_to_perm'
3072 __tablename__ = 'user_to_perm'
3073 __table_args__ = (
3073 __table_args__ = (
3074 UniqueConstraint('user_id', 'permission_id'),
3074 UniqueConstraint('user_id', 'permission_id'),
3075 base_table_args
3075 base_table_args
3076 )
3076 )
3077
3077
3078 user_to_perm_id = Column("user_to_perm_id", Integer(), nullable=False, unique=True, default=None, primary_key=True)
3078 user_to_perm_id = Column("user_to_perm_id", Integer(), nullable=False, unique=True, default=None, primary_key=True)
3079 user_id = Column("user_id", Integer(), ForeignKey('users.user_id'), nullable=False, unique=None, default=None)
3079 user_id = Column("user_id", Integer(), ForeignKey('users.user_id'), nullable=False, unique=None, default=None)
3080 permission_id = Column("permission_id", Integer(), ForeignKey('permissions.permission_id'), nullable=False, unique=None, default=None)
3080 permission_id = Column("permission_id", Integer(), ForeignKey('permissions.permission_id'), nullable=False, unique=None, default=None)
3081
3081
3082 user = relationship('User')
3082 user = relationship('User')
3083 permission = relationship('Permission', lazy='joined')
3083 permission = relationship('Permission', lazy='joined')
3084
3084
3085 def __unicode__(self):
3085 def __unicode__(self):
3086 return u'<%s => %s >' % (self.user, self.permission)
3086 return u'<%s => %s >' % (self.user, self.permission)
3087
3087
3088
3088
3089 class UserGroupRepoToPerm(Base, BaseModel):
3089 class UserGroupRepoToPerm(Base, BaseModel):
3090 __tablename__ = 'users_group_repo_to_perm'
3090 __tablename__ = 'users_group_repo_to_perm'
3091 __table_args__ = (
3091 __table_args__ = (
3092 UniqueConstraint('repository_id', 'users_group_id', 'permission_id'),
3092 UniqueConstraint('repository_id', 'users_group_id', 'permission_id'),
3093 base_table_args
3093 base_table_args
3094 )
3094 )
3095
3095
3096 users_group_to_perm_id = Column("users_group_to_perm_id", Integer(), nullable=False, unique=True, default=None, primary_key=True)
3096 users_group_to_perm_id = Column("users_group_to_perm_id", Integer(), nullable=False, unique=True, default=None, primary_key=True)
3097 users_group_id = Column("users_group_id", Integer(), ForeignKey('users_groups.users_group_id'), nullable=False, unique=None, default=None)
3097 users_group_id = Column("users_group_id", Integer(), ForeignKey('users_groups.users_group_id'), nullable=False, unique=None, default=None)
3098 permission_id = Column("permission_id", Integer(), ForeignKey('permissions.permission_id'), nullable=False, unique=None, default=None)
3098 permission_id = Column("permission_id", Integer(), ForeignKey('permissions.permission_id'), nullable=False, unique=None, default=None)
3099 repository_id = Column("repository_id", Integer(), ForeignKey('repositories.repo_id'), nullable=False, unique=None, default=None)
3099 repository_id = Column("repository_id", Integer(), ForeignKey('repositories.repo_id'), nullable=False, unique=None, default=None)
3100
3100
3101 users_group = relationship('UserGroup')
3101 users_group = relationship('UserGroup')
3102 permission = relationship('Permission')
3102 permission = relationship('Permission')
3103 repository = relationship('Repository')
3103 repository = relationship('Repository')
3104 user_group_branch_perms = relationship('UserGroupToRepoBranchPermission', cascade='all')
3104 user_group_branch_perms = relationship('UserGroupToRepoBranchPermission', cascade='all')
3105
3105
3106 @classmethod
3106 @classmethod
3107 def create(cls, users_group, repository, permission):
3107 def create(cls, users_group, repository, permission):
3108 n = cls()
3108 n = cls()
3109 n.users_group = users_group
3109 n.users_group = users_group
3110 n.repository = repository
3110 n.repository = repository
3111 n.permission = permission
3111 n.permission = permission
3112 Session().add(n)
3112 Session().add(n)
3113 return n
3113 return n
3114
3114
3115 def __unicode__(self):
3115 def __unicode__(self):
3116 return u'<UserGroupRepoToPerm:%s => %s >' % (self.users_group, self.repository)
3116 return u'<UserGroupRepoToPerm:%s => %s >' % (self.users_group, self.repository)
3117
3117
3118
3118
3119 class UserGroupUserGroupToPerm(Base, BaseModel):
3119 class UserGroupUserGroupToPerm(Base, BaseModel):
3120 __tablename__ = 'user_group_user_group_to_perm'
3120 __tablename__ = 'user_group_user_group_to_perm'
3121 __table_args__ = (
3121 __table_args__ = (
3122 UniqueConstraint('target_user_group_id', 'user_group_id', 'permission_id'),
3122 UniqueConstraint('target_user_group_id', 'user_group_id', 'permission_id'),
3123 CheckConstraint('target_user_group_id != user_group_id'),
3123 CheckConstraint('target_user_group_id != user_group_id'),
3124 base_table_args
3124 base_table_args
3125 )
3125 )
3126
3126
3127 user_group_user_group_to_perm_id = Column("user_group_user_group_to_perm_id", Integer(), nullable=False, unique=True, default=None, primary_key=True)
3127 user_group_user_group_to_perm_id = Column("user_group_user_group_to_perm_id", Integer(), nullable=False, unique=True, default=None, primary_key=True)
3128 target_user_group_id = Column("target_user_group_id", Integer(), ForeignKey('users_groups.users_group_id'), nullable=False, unique=None, default=None)
3128 target_user_group_id = Column("target_user_group_id", Integer(), ForeignKey('users_groups.users_group_id'), nullable=False, unique=None, default=None)
3129 permission_id = Column("permission_id", Integer(), ForeignKey('permissions.permission_id'), nullable=False, unique=None, default=None)
3129 permission_id = Column("permission_id", Integer(), ForeignKey('permissions.permission_id'), nullable=False, unique=None, default=None)
3130 user_group_id = Column("user_group_id", Integer(), ForeignKey('users_groups.users_group_id'), nullable=False, unique=None, default=None)
3130 user_group_id = Column("user_group_id", Integer(), ForeignKey('users_groups.users_group_id'), nullable=False, unique=None, default=None)
3131
3131
3132 target_user_group = relationship('UserGroup', primaryjoin='UserGroupUserGroupToPerm.target_user_group_id==UserGroup.users_group_id')
3132 target_user_group = relationship('UserGroup', primaryjoin='UserGroupUserGroupToPerm.target_user_group_id==UserGroup.users_group_id')
3133 user_group = relationship('UserGroup', primaryjoin='UserGroupUserGroupToPerm.user_group_id==UserGroup.users_group_id')
3133 user_group = relationship('UserGroup', primaryjoin='UserGroupUserGroupToPerm.user_group_id==UserGroup.users_group_id')
3134 permission = relationship('Permission')
3134 permission = relationship('Permission')
3135
3135
3136 @classmethod
3136 @classmethod
3137 def create(cls, target_user_group, user_group, permission):
3137 def create(cls, target_user_group, user_group, permission):
3138 n = cls()
3138 n = cls()
3139 n.target_user_group = target_user_group
3139 n.target_user_group = target_user_group
3140 n.user_group = user_group
3140 n.user_group = user_group
3141 n.permission = permission
3141 n.permission = permission
3142 Session().add(n)
3142 Session().add(n)
3143 return n
3143 return n
3144
3144
3145 def __unicode__(self):
3145 def __unicode__(self):
3146 return u'<UserGroupUserGroup:%s => %s >' % (self.target_user_group, self.user_group)
3146 return u'<UserGroupUserGroup:%s => %s >' % (self.target_user_group, self.user_group)
3147
3147
3148
3148
3149 class UserGroupToPerm(Base, BaseModel):
3149 class UserGroupToPerm(Base, BaseModel):
3150 __tablename__ = 'users_group_to_perm'
3150 __tablename__ = 'users_group_to_perm'
3151 __table_args__ = (
3151 __table_args__ = (
3152 UniqueConstraint('users_group_id', 'permission_id',),
3152 UniqueConstraint('users_group_id', 'permission_id',),
3153 base_table_args
3153 base_table_args
3154 )
3154 )
3155
3155
3156 users_group_to_perm_id = Column("users_group_to_perm_id", Integer(), nullable=False, unique=True, default=None, primary_key=True)
3156 users_group_to_perm_id = Column("users_group_to_perm_id", Integer(), nullable=False, unique=True, default=None, primary_key=True)
3157 users_group_id = Column("users_group_id", Integer(), ForeignKey('users_groups.users_group_id'), nullable=False, unique=None, default=None)
3157 users_group_id = Column("users_group_id", Integer(), ForeignKey('users_groups.users_group_id'), nullable=False, unique=None, default=None)
3158 permission_id = Column("permission_id", Integer(), ForeignKey('permissions.permission_id'), nullable=False, unique=None, default=None)
3158 permission_id = Column("permission_id", Integer(), ForeignKey('permissions.permission_id'), nullable=False, unique=None, default=None)
3159
3159
3160 users_group = relationship('UserGroup')
3160 users_group = relationship('UserGroup')
3161 permission = relationship('Permission')
3161 permission = relationship('Permission')
3162
3162
3163
3163
3164 class UserRepoGroupToPerm(Base, BaseModel):
3164 class UserRepoGroupToPerm(Base, BaseModel):
3165 __tablename__ = 'user_repo_group_to_perm'
3165 __tablename__ = 'user_repo_group_to_perm'
3166 __table_args__ = (
3166 __table_args__ = (
3167 UniqueConstraint('user_id', 'group_id', 'permission_id'),
3167 UniqueConstraint('user_id', 'group_id', 'permission_id'),
3168 base_table_args
3168 base_table_args
3169 )
3169 )
3170
3170
3171 group_to_perm_id = Column("group_to_perm_id", Integer(), nullable=False, unique=True, default=None, primary_key=True)
3171 group_to_perm_id = Column("group_to_perm_id", Integer(), nullable=False, unique=True, default=None, primary_key=True)
3172 user_id = Column("user_id", Integer(), ForeignKey('users.user_id'), nullable=False, unique=None, default=None)
3172 user_id = Column("user_id", Integer(), ForeignKey('users.user_id'), nullable=False, unique=None, default=None)
3173 group_id = Column("group_id", Integer(), ForeignKey('groups.group_id'), nullable=False, unique=None, default=None)
3173 group_id = Column("group_id", Integer(), ForeignKey('groups.group_id'), nullable=False, unique=None, default=None)
3174 permission_id = Column("permission_id", Integer(), ForeignKey('permissions.permission_id'), nullable=False, unique=None, default=None)
3174 permission_id = Column("permission_id", Integer(), ForeignKey('permissions.permission_id'), nullable=False, unique=None, default=None)
3175
3175
3176 user = relationship('User')
3176 user = relationship('User')
3177 group = relationship('RepoGroup')
3177 group = relationship('RepoGroup')
3178 permission = relationship('Permission')
3178 permission = relationship('Permission')
3179
3179
3180 @classmethod
3180 @classmethod
3181 def create(cls, user, repository_group, permission):
3181 def create(cls, user, repository_group, permission):
3182 n = cls()
3182 n = cls()
3183 n.user = user
3183 n.user = user
3184 n.group = repository_group
3184 n.group = repository_group
3185 n.permission = permission
3185 n.permission = permission
3186 Session().add(n)
3186 Session().add(n)
3187 return n
3187 return n
3188
3188
3189
3189
3190 class UserGroupRepoGroupToPerm(Base, BaseModel):
3190 class UserGroupRepoGroupToPerm(Base, BaseModel):
3191 __tablename__ = 'users_group_repo_group_to_perm'
3191 __tablename__ = 'users_group_repo_group_to_perm'
3192 __table_args__ = (
3192 __table_args__ = (
3193 UniqueConstraint('users_group_id', 'group_id'),
3193 UniqueConstraint('users_group_id', 'group_id'),
3194 base_table_args
3194 base_table_args
3195 )
3195 )
3196
3196
3197 users_group_repo_group_to_perm_id = Column("users_group_repo_group_to_perm_id", Integer(), nullable=False, unique=True, default=None, primary_key=True)
3197 users_group_repo_group_to_perm_id = Column("users_group_repo_group_to_perm_id", Integer(), nullable=False, unique=True, default=None, primary_key=True)
3198 users_group_id = Column("users_group_id", Integer(), ForeignKey('users_groups.users_group_id'), nullable=False, unique=None, default=None)
3198 users_group_id = Column("users_group_id", Integer(), ForeignKey('users_groups.users_group_id'), nullable=False, unique=None, default=None)
3199 group_id = Column("group_id", Integer(), ForeignKey('groups.group_id'), nullable=False, unique=None, default=None)
3199 group_id = Column("group_id", Integer(), ForeignKey('groups.group_id'), nullable=False, unique=None, default=None)
3200 permission_id = Column("permission_id", Integer(), ForeignKey('permissions.permission_id'), nullable=False, unique=None, default=None)
3200 permission_id = Column("permission_id", Integer(), ForeignKey('permissions.permission_id'), nullable=False, unique=None, default=None)
3201
3201
3202 users_group = relationship('UserGroup')
3202 users_group = relationship('UserGroup')
3203 permission = relationship('Permission')
3203 permission = relationship('Permission')
3204 group = relationship('RepoGroup')
3204 group = relationship('RepoGroup')
3205
3205
3206 @classmethod
3206 @classmethod
3207 def create(cls, user_group, repository_group, permission):
3207 def create(cls, user_group, repository_group, permission):
3208 n = cls()
3208 n = cls()
3209 n.users_group = user_group
3209 n.users_group = user_group
3210 n.group = repository_group
3210 n.group = repository_group
3211 n.permission = permission
3211 n.permission = permission
3212 Session().add(n)
3212 Session().add(n)
3213 return n
3213 return n
3214
3214
3215 def __unicode__(self):
3215 def __unicode__(self):
3216 return u'<UserGroupRepoGroupToPerm:%s => %s >' % (self.users_group, self.group)
3216 return u'<UserGroupRepoGroupToPerm:%s => %s >' % (self.users_group, self.group)
3217
3217
3218
3218
3219 class Statistics(Base, BaseModel):
3219 class Statistics(Base, BaseModel):
3220 __tablename__ = 'statistics'
3220 __tablename__ = 'statistics'
3221 __table_args__ = (
3221 __table_args__ = (
3222 base_table_args
3222 base_table_args
3223 )
3223 )
3224
3224
3225 stat_id = Column("stat_id", Integer(), nullable=False, unique=True, default=None, primary_key=True)
3225 stat_id = Column("stat_id", Integer(), nullable=False, unique=True, default=None, primary_key=True)
3226 repository_id = Column("repository_id", Integer(), ForeignKey('repositories.repo_id'), nullable=False, unique=True, default=None)
3226 repository_id = Column("repository_id", Integer(), ForeignKey('repositories.repo_id'), nullable=False, unique=True, default=None)
3227 stat_on_revision = Column("stat_on_revision", Integer(), nullable=False)
3227 stat_on_revision = Column("stat_on_revision", Integer(), nullable=False)
3228 commit_activity = Column("commit_activity", LargeBinary(1000000), nullable=False)#JSON data
3228 commit_activity = Column("commit_activity", LargeBinary(1000000), nullable=False)#JSON data
3229 commit_activity_combined = Column("commit_activity_combined", LargeBinary(), nullable=False)#JSON data
3229 commit_activity_combined = Column("commit_activity_combined", LargeBinary(), nullable=False)#JSON data
3230 languages = Column("languages", LargeBinary(1000000), nullable=False)#JSON data
3230 languages = Column("languages", LargeBinary(1000000), nullable=False)#JSON data
3231
3231
3232 repository = relationship('Repository', single_parent=True)
3232 repository = relationship('Repository', single_parent=True)
3233
3233
3234
3234
3235 class UserFollowing(Base, BaseModel):
3235 class UserFollowing(Base, BaseModel):
3236 __tablename__ = 'user_followings'
3236 __tablename__ = 'user_followings'
3237 __table_args__ = (
3237 __table_args__ = (
3238 UniqueConstraint('user_id', 'follows_repository_id'),
3238 UniqueConstraint('user_id', 'follows_repository_id'),
3239 UniqueConstraint('user_id', 'follows_user_id'),
3239 UniqueConstraint('user_id', 'follows_user_id'),
3240 base_table_args
3240 base_table_args
3241 )
3241 )
3242
3242
3243 user_following_id = Column("user_following_id", Integer(), nullable=False, unique=True, default=None, primary_key=True)
3243 user_following_id = Column("user_following_id", Integer(), nullable=False, unique=True, default=None, primary_key=True)
3244 user_id = Column("user_id", Integer(), ForeignKey('users.user_id'), nullable=False, unique=None, default=None)
3244 user_id = Column("user_id", Integer(), ForeignKey('users.user_id'), nullable=False, unique=None, default=None)
3245 follows_repo_id = Column("follows_repository_id", Integer(), ForeignKey('repositories.repo_id'), nullable=True, unique=None, default=None)
3245 follows_repo_id = Column("follows_repository_id", Integer(), ForeignKey('repositories.repo_id'), nullable=True, unique=None, default=None)
3246 follows_user_id = Column("follows_user_id", Integer(), ForeignKey('users.user_id'), nullable=True, unique=None, default=None)
3246 follows_user_id = Column("follows_user_id", Integer(), ForeignKey('users.user_id'), nullable=True, unique=None, default=None)
3247 follows_from = Column('follows_from', DateTime(timezone=False), nullable=True, unique=None, default=datetime.datetime.now)
3247 follows_from = Column('follows_from', DateTime(timezone=False), nullable=True, unique=None, default=datetime.datetime.now)
3248
3248
3249 user = relationship('User', primaryjoin='User.user_id==UserFollowing.user_id')
3249 user = relationship('User', primaryjoin='User.user_id==UserFollowing.user_id')
3250
3250
3251 follows_user = relationship('User', primaryjoin='User.user_id==UserFollowing.follows_user_id')
3251 follows_user = relationship('User', primaryjoin='User.user_id==UserFollowing.follows_user_id')
3252 follows_repository = relationship('Repository', order_by='Repository.repo_name')
3252 follows_repository = relationship('Repository', order_by='Repository.repo_name')
3253
3253
3254 @classmethod
3254 @classmethod
3255 def get_repo_followers(cls, repo_id):
3255 def get_repo_followers(cls, repo_id):
3256 return cls.query().filter(cls.follows_repo_id == repo_id)
3256 return cls.query().filter(cls.follows_repo_id == repo_id)
3257
3257
3258
3258
3259 class CacheKey(Base, BaseModel):
3259 class CacheKey(Base, BaseModel):
3260 __tablename__ = 'cache_invalidation'
3260 __tablename__ = 'cache_invalidation'
3261 __table_args__ = (
3261 __table_args__ = (
3262 UniqueConstraint('cache_key'),
3262 UniqueConstraint('cache_key'),
3263 Index('key_idx', 'cache_key'),
3263 Index('key_idx', 'cache_key'),
3264 base_table_args,
3264 base_table_args,
3265 )
3265 )
3266
3266
3267 CACHE_TYPE_FEED = 'FEED'
3267 CACHE_TYPE_FEED = 'FEED'
3268 CACHE_TYPE_README = 'README'
3268 CACHE_TYPE_README = 'README'
3269 # namespaces used to register process/thread aware caches
3269 # namespaces used to register process/thread aware caches
3270 REPO_INVALIDATION_NAMESPACE = 'repo_cache:{repo_id}'
3270 REPO_INVALIDATION_NAMESPACE = 'repo_cache:{repo_id}'
3271 SETTINGS_INVALIDATION_NAMESPACE = 'system_settings'
3271 SETTINGS_INVALIDATION_NAMESPACE = 'system_settings'
3272
3272
3273 cache_id = Column("cache_id", Integer(), nullable=False, unique=True, default=None, primary_key=True)
3273 cache_id = Column("cache_id", Integer(), nullable=False, unique=True, default=None, primary_key=True)
3274 cache_key = Column("cache_key", String(255), nullable=True, unique=None, default=None)
3274 cache_key = Column("cache_key", String(255), nullable=True, unique=None, default=None)
3275 cache_args = Column("cache_args", String(255), nullable=True, unique=None, default=None)
3275 cache_args = Column("cache_args", String(255), nullable=True, unique=None, default=None)
3276 cache_active = Column("cache_active", Boolean(), nullable=True, unique=None, default=False)
3276 cache_active = Column("cache_active", Boolean(), nullable=True, unique=None, default=False)
3277
3277
3278 def __init__(self, cache_key, cache_args=''):
3278 def __init__(self, cache_key, cache_args=''):
3279 self.cache_key = cache_key
3279 self.cache_key = cache_key
3280 self.cache_args = cache_args
3280 self.cache_args = cache_args
3281 self.cache_active = False
3281 self.cache_active = False
3282
3282
3283 def __unicode__(self):
3283 def __unicode__(self):
3284 return u"<%s('%s:%s[%s]')>" % (
3284 return u"<%s('%s:%s[%s]')>" % (
3285 self.__class__.__name__,
3285 self.__class__.__name__,
3286 self.cache_id, self.cache_key, self.cache_active)
3286 self.cache_id, self.cache_key, self.cache_active)
3287
3287
3288 def _cache_key_partition(self):
3288 def _cache_key_partition(self):
3289 prefix, repo_name, suffix = self.cache_key.partition(self.cache_args)
3289 prefix, repo_name, suffix = self.cache_key.partition(self.cache_args)
3290 return prefix, repo_name, suffix
3290 return prefix, repo_name, suffix
3291
3291
3292 def get_prefix(self):
3292 def get_prefix(self):
3293 """
3293 """
3294 Try to extract prefix from existing cache key. The key could consist
3294 Try to extract prefix from existing cache key. The key could consist
3295 of prefix, repo_name, suffix
3295 of prefix, repo_name, suffix
3296 """
3296 """
3297 # this returns prefix, repo_name, suffix
3297 # this returns prefix, repo_name, suffix
3298 return self._cache_key_partition()[0]
3298 return self._cache_key_partition()[0]
3299
3299
3300 def get_suffix(self):
3300 def get_suffix(self):
3301 """
3301 """
3302 get suffix that might have been used in _get_cache_key to
3302 get suffix that might have been used in _get_cache_key to
3303 generate self.cache_key. Only used for informational purposes
3303 generate self.cache_key. Only used for informational purposes
3304 in repo_edit.mako.
3304 in repo_edit.mako.
3305 """
3305 """
3306 # prefix, repo_name, suffix
3306 # prefix, repo_name, suffix
3307 return self._cache_key_partition()[2]
3307 return self._cache_key_partition()[2]
3308
3308
3309 @classmethod
3309 @classmethod
3310 def delete_all_cache(cls):
3310 def delete_all_cache(cls):
3311 """
3311 """
3312 Delete all cache keys from database.
3312 Delete all cache keys from database.
3313 Should only be run when all instances are down and all entries
3313 Should only be run when all instances are down and all entries
3314 thus stale.
3314 thus stale.
3315 """
3315 """
3316 cls.query().delete()
3316 cls.query().delete()
3317 Session().commit()
3317 Session().commit()
3318
3318
3319 @classmethod
3319 @classmethod
3320 def set_invalidate(cls, cache_uid, delete=False):
3320 def set_invalidate(cls, cache_uid, delete=False):
3321 """
3321 """
3322 Mark all caches of a repo as invalid in the database.
3322 Mark all caches of a repo as invalid in the database.
3323 """
3323 """
3324
3324
3325 try:
3325 try:
3326 qry = Session().query(cls).filter(cls.cache_args == cache_uid)
3326 qry = Session().query(cls).filter(cls.cache_args == cache_uid)
3327 if delete:
3327 if delete:
3328 qry.delete()
3328 qry.delete()
3329 log.debug('cache objects deleted for cache args %s',
3329 log.debug('cache objects deleted for cache args %s',
3330 safe_str(cache_uid))
3330 safe_str(cache_uid))
3331 else:
3331 else:
3332 qry.update({"cache_active": False})
3332 qry.update({"cache_active": False})
3333 log.debug('cache objects marked as invalid for cache args %s',
3333 log.debug('cache objects marked as invalid for cache args %s',
3334 safe_str(cache_uid))
3334 safe_str(cache_uid))
3335
3335
3336 Session().commit()
3336 Session().commit()
3337 except Exception:
3337 except Exception:
3338 log.exception(
3338 log.exception(
3339 'Cache key invalidation failed for cache args %s',
3339 'Cache key invalidation failed for cache args %s',
3340 safe_str(cache_uid))
3340 safe_str(cache_uid))
3341 Session().rollback()
3341 Session().rollback()
3342
3342
3343 @classmethod
3343 @classmethod
3344 def get_active_cache(cls, cache_key):
3344 def get_active_cache(cls, cache_key):
3345 inv_obj = cls.query().filter(cls.cache_key == cache_key).scalar()
3345 inv_obj = cls.query().filter(cls.cache_key == cache_key).scalar()
3346 if inv_obj:
3346 if inv_obj:
3347 return inv_obj
3347 return inv_obj
3348 return None
3348 return None
3349
3349
3350
3350
3351 class ChangesetComment(Base, BaseModel):
3351 class ChangesetComment(Base, BaseModel):
3352 __tablename__ = 'changeset_comments'
3352 __tablename__ = 'changeset_comments'
3353 __table_args__ = (
3353 __table_args__ = (
3354 Index('cc_revision_idx', 'revision'),
3354 Index('cc_revision_idx', 'revision'),
3355 base_table_args,
3355 base_table_args,
3356 )
3356 )
3357
3357
3358 COMMENT_OUTDATED = u'comment_outdated'
3358 COMMENT_OUTDATED = u'comment_outdated'
3359 COMMENT_TYPE_NOTE = u'note'
3359 COMMENT_TYPE_NOTE = u'note'
3360 COMMENT_TYPE_TODO = u'todo'
3360 COMMENT_TYPE_TODO = u'todo'
3361 COMMENT_TYPES = [COMMENT_TYPE_NOTE, COMMENT_TYPE_TODO]
3361 COMMENT_TYPES = [COMMENT_TYPE_NOTE, COMMENT_TYPE_TODO]
3362
3362
3363 comment_id = Column('comment_id', Integer(), nullable=False, primary_key=True)
3363 comment_id = Column('comment_id', Integer(), nullable=False, primary_key=True)
3364 repo_id = Column('repo_id', Integer(), ForeignKey('repositories.repo_id'), nullable=False)
3364 repo_id = Column('repo_id', Integer(), ForeignKey('repositories.repo_id'), nullable=False)
3365 revision = Column('revision', String(40), nullable=True)
3365 revision = Column('revision', String(40), nullable=True)
3366 pull_request_id = Column("pull_request_id", Integer(), ForeignKey('pull_requests.pull_request_id'), nullable=True)
3366 pull_request_id = Column("pull_request_id", Integer(), ForeignKey('pull_requests.pull_request_id'), nullable=True)
3367 pull_request_version_id = Column("pull_request_version_id", Integer(), ForeignKey('pull_request_versions.pull_request_version_id'), nullable=True)
3367 pull_request_version_id = Column("pull_request_version_id", Integer(), ForeignKey('pull_request_versions.pull_request_version_id'), nullable=True)
3368 line_no = Column('line_no', Unicode(10), nullable=True)
3368 line_no = Column('line_no', Unicode(10), nullable=True)
3369 hl_lines = Column('hl_lines', Unicode(512), nullable=True)
3369 hl_lines = Column('hl_lines', Unicode(512), nullable=True)
3370 f_path = Column('f_path', Unicode(1000), nullable=True)
3370 f_path = Column('f_path', Unicode(1000), nullable=True)
3371 user_id = Column('user_id', Integer(), ForeignKey('users.user_id'), nullable=False)
3371 user_id = Column('user_id', Integer(), ForeignKey('users.user_id'), nullable=False)
3372 text = Column('text', UnicodeText().with_variant(UnicodeText(25000), 'mysql'), nullable=False)
3372 text = Column('text', UnicodeText().with_variant(UnicodeText(25000), 'mysql'), nullable=False)
3373 created_on = Column('created_on', DateTime(timezone=False), nullable=False, default=datetime.datetime.now)
3373 created_on = Column('created_on', DateTime(timezone=False), nullable=False, default=datetime.datetime.now)
3374 modified_at = Column('modified_at', DateTime(timezone=False), nullable=False, default=datetime.datetime.now)
3374 modified_at = Column('modified_at', DateTime(timezone=False), nullable=False, default=datetime.datetime.now)
3375 renderer = Column('renderer', Unicode(64), nullable=True)
3375 renderer = Column('renderer', Unicode(64), nullable=True)
3376 display_state = Column('display_state', Unicode(128), nullable=True)
3376 display_state = Column('display_state', Unicode(128), nullable=True)
3377
3377
3378 comment_type = Column('comment_type', Unicode(128), nullable=True, default=COMMENT_TYPE_NOTE)
3378 comment_type = Column('comment_type', Unicode(128), nullable=True, default=COMMENT_TYPE_NOTE)
3379 resolved_comment_id = Column('resolved_comment_id', Integer(), ForeignKey('changeset_comments.comment_id'), nullable=True)
3379 resolved_comment_id = Column('resolved_comment_id', Integer(), ForeignKey('changeset_comments.comment_id'), nullable=True)
3380
3380
3381 resolved_comment = relationship('ChangesetComment', remote_side=comment_id, back_populates='resolved_by')
3381 resolved_comment = relationship('ChangesetComment', remote_side=comment_id, back_populates='resolved_by')
3382 resolved_by = relationship('ChangesetComment', back_populates='resolved_comment')
3382 resolved_by = relationship('ChangesetComment', back_populates='resolved_comment')
3383
3383
3384 author = relationship('User', lazy='joined')
3384 author = relationship('User', lazy='joined')
3385 repo = relationship('Repository')
3385 repo = relationship('Repository')
3386 status_change = relationship('ChangesetStatus', cascade="all, delete, delete-orphan", lazy='joined')
3386 status_change = relationship('ChangesetStatus', cascade="all, delete, delete-orphan", lazy='joined')
3387 pull_request = relationship('PullRequest', lazy='joined')
3387 pull_request = relationship('PullRequest', lazy='joined')
3388 pull_request_version = relationship('PullRequestVersion')
3388 pull_request_version = relationship('PullRequestVersion')
3389
3389
3390 @classmethod
3390 @classmethod
3391 def get_users(cls, revision=None, pull_request_id=None):
3391 def get_users(cls, revision=None, pull_request_id=None):
3392 """
3392 """
3393 Returns user associated with this ChangesetComment. ie those
3393 Returns user associated with this ChangesetComment. ie those
3394 who actually commented
3394 who actually commented
3395
3395
3396 :param cls:
3396 :param cls:
3397 :param revision:
3397 :param revision:
3398 """
3398 """
3399 q = Session().query(User)\
3399 q = Session().query(User)\
3400 .join(ChangesetComment.author)
3400 .join(ChangesetComment.author)
3401 if revision:
3401 if revision:
3402 q = q.filter(cls.revision == revision)
3402 q = q.filter(cls.revision == revision)
3403 elif pull_request_id:
3403 elif pull_request_id:
3404 q = q.filter(cls.pull_request_id == pull_request_id)
3404 q = q.filter(cls.pull_request_id == pull_request_id)
3405 return q.all()
3405 return q.all()
3406
3406
3407 @classmethod
3407 @classmethod
3408 def get_index_from_version(cls, pr_version, versions):
3408 def get_index_from_version(cls, pr_version, versions):
3409 num_versions = [x.pull_request_version_id for x in versions]
3409 num_versions = [x.pull_request_version_id for x in versions]
3410 try:
3410 try:
3411 return num_versions.index(pr_version) +1
3411 return num_versions.index(pr_version) +1
3412 except (IndexError, ValueError):
3412 except (IndexError, ValueError):
3413 return
3413 return
3414
3414
3415 @property
3415 @property
3416 def outdated(self):
3416 def outdated(self):
3417 return self.display_state == self.COMMENT_OUTDATED
3417 return self.display_state == self.COMMENT_OUTDATED
3418
3418
3419 def outdated_at_version(self, version):
3419 def outdated_at_version(self, version):
3420 """
3420 """
3421 Checks if comment is outdated for given pull request version
3421 Checks if comment is outdated for given pull request version
3422 """
3422 """
3423 return self.outdated and self.pull_request_version_id != version
3423 return self.outdated and self.pull_request_version_id != version
3424
3424
3425 def older_than_version(self, version):
3425 def older_than_version(self, version):
3426 """
3426 """
3427 Checks if comment is made from previous version than given
3427 Checks if comment is made from previous version than given
3428 """
3428 """
3429 if version is None:
3429 if version is None:
3430 return self.pull_request_version_id is not None
3430 return self.pull_request_version_id is not None
3431
3431
3432 return self.pull_request_version_id < version
3432 return self.pull_request_version_id < version
3433
3433
3434 @property
3434 @property
3435 def resolved(self):
3435 def resolved(self):
3436 return self.resolved_by[0] if self.resolved_by else None
3436 return self.resolved_by[0] if self.resolved_by else None
3437
3437
3438 @property
3438 @property
3439 def is_todo(self):
3439 def is_todo(self):
3440 return self.comment_type == self.COMMENT_TYPE_TODO
3440 return self.comment_type == self.COMMENT_TYPE_TODO
3441
3441
3442 @property
3442 @property
3443 def is_inline(self):
3443 def is_inline(self):
3444 return self.line_no and self.f_path
3444 return self.line_no and self.f_path
3445
3445
3446 def get_index_version(self, versions):
3446 def get_index_version(self, versions):
3447 return self.get_index_from_version(
3447 return self.get_index_from_version(
3448 self.pull_request_version_id, versions)
3448 self.pull_request_version_id, versions)
3449
3449
3450 def __repr__(self):
3450 def __repr__(self):
3451 if self.comment_id:
3451 if self.comment_id:
3452 return '<DB:Comment #%s>' % self.comment_id
3452 return '<DB:Comment #%s>' % self.comment_id
3453 else:
3453 else:
3454 return '<DB:Comment at %#x>' % id(self)
3454 return '<DB:Comment at %#x>' % id(self)
3455
3455
3456 def get_api_data(self):
3456 def get_api_data(self):
3457 comment = self
3457 comment = self
3458 data = {
3458 data = {
3459 'comment_id': comment.comment_id,
3459 'comment_id': comment.comment_id,
3460 'comment_type': comment.comment_type,
3460 'comment_type': comment.comment_type,
3461 'comment_text': comment.text,
3461 'comment_text': comment.text,
3462 'comment_status': comment.status_change,
3462 'comment_status': comment.status_change,
3463 'comment_f_path': comment.f_path,
3463 'comment_f_path': comment.f_path,
3464 'comment_lineno': comment.line_no,
3464 'comment_lineno': comment.line_no,
3465 'comment_author': comment.author,
3465 'comment_author': comment.author,
3466 'comment_created_on': comment.created_on
3466 'comment_created_on': comment.created_on
3467 }
3467 }
3468 return data
3468 return data
3469
3469
3470 def __json__(self):
3470 def __json__(self):
3471 data = dict()
3471 data = dict()
3472 data.update(self.get_api_data())
3472 data.update(self.get_api_data())
3473 return data
3473 return data
3474
3474
3475
3475
3476 class ChangesetStatus(Base, BaseModel):
3476 class ChangesetStatus(Base, BaseModel):
3477 __tablename__ = 'changeset_statuses'
3477 __tablename__ = 'changeset_statuses'
3478 __table_args__ = (
3478 __table_args__ = (
3479 Index('cs_revision_idx', 'revision'),
3479 Index('cs_revision_idx', 'revision'),
3480 Index('cs_version_idx', 'version'),
3480 Index('cs_version_idx', 'version'),
3481 UniqueConstraint('repo_id', 'revision', 'version'),
3481 UniqueConstraint('repo_id', 'revision', 'version'),
3482 base_table_args
3482 base_table_args
3483 )
3483 )
3484
3484
3485 STATUS_NOT_REVIEWED = DEFAULT = 'not_reviewed'
3485 STATUS_NOT_REVIEWED = DEFAULT = 'not_reviewed'
3486 STATUS_APPROVED = 'approved'
3486 STATUS_APPROVED = 'approved'
3487 STATUS_REJECTED = 'rejected'
3487 STATUS_REJECTED = 'rejected'
3488 STATUS_UNDER_REVIEW = 'under_review'
3488 STATUS_UNDER_REVIEW = 'under_review'
3489
3489
3490 STATUSES = [
3490 STATUSES = [
3491 (STATUS_NOT_REVIEWED, _("Not Reviewed")), # (no icon) and default
3491 (STATUS_NOT_REVIEWED, _("Not Reviewed")), # (no icon) and default
3492 (STATUS_APPROVED, _("Approved")),
3492 (STATUS_APPROVED, _("Approved")),
3493 (STATUS_REJECTED, _("Rejected")),
3493 (STATUS_REJECTED, _("Rejected")),
3494 (STATUS_UNDER_REVIEW, _("Under Review")),
3494 (STATUS_UNDER_REVIEW, _("Under Review")),
3495 ]
3495 ]
3496
3496
3497 changeset_status_id = Column('changeset_status_id', Integer(), nullable=False, primary_key=True)
3497 changeset_status_id = Column('changeset_status_id', Integer(), nullable=False, primary_key=True)
3498 repo_id = Column('repo_id', Integer(), ForeignKey('repositories.repo_id'), nullable=False)
3498 repo_id = Column('repo_id', Integer(), ForeignKey('repositories.repo_id'), nullable=False)
3499 user_id = Column("user_id", Integer(), ForeignKey('users.user_id'), nullable=False, unique=None)
3499 user_id = Column("user_id", Integer(), ForeignKey('users.user_id'), nullable=False, unique=None)
3500 revision = Column('revision', String(40), nullable=False)
3500 revision = Column('revision', String(40), nullable=False)
3501 status = Column('status', String(128), nullable=False, default=DEFAULT)
3501 status = Column('status', String(128), nullable=False, default=DEFAULT)
3502 changeset_comment_id = Column('changeset_comment_id', Integer(), ForeignKey('changeset_comments.comment_id'))
3502 changeset_comment_id = Column('changeset_comment_id', Integer(), ForeignKey('changeset_comments.comment_id'))
3503 modified_at = Column('modified_at', DateTime(), nullable=False, default=datetime.datetime.now)
3503 modified_at = Column('modified_at', DateTime(), nullable=False, default=datetime.datetime.now)
3504 version = Column('version', Integer(), nullable=False, default=0)
3504 version = Column('version', Integer(), nullable=False, default=0)
3505 pull_request_id = Column("pull_request_id", Integer(), ForeignKey('pull_requests.pull_request_id'), nullable=True)
3505 pull_request_id = Column("pull_request_id", Integer(), ForeignKey('pull_requests.pull_request_id'), nullable=True)
3506
3506
3507 author = relationship('User', lazy='joined')
3507 author = relationship('User', lazy='joined')
3508 repo = relationship('Repository')
3508 repo = relationship('Repository')
3509 comment = relationship('ChangesetComment', lazy='joined')
3509 comment = relationship('ChangesetComment', lazy='joined')
3510 pull_request = relationship('PullRequest', lazy='joined')
3510 pull_request = relationship('PullRequest', lazy='joined')
3511
3511
3512 def __unicode__(self):
3512 def __unicode__(self):
3513 return u"<%s('%s[v%s]:%s')>" % (
3513 return u"<%s('%s[v%s]:%s')>" % (
3514 self.__class__.__name__,
3514 self.__class__.__name__,
3515 self.status, self.version, self.author
3515 self.status, self.version, self.author
3516 )
3516 )
3517
3517
3518 @classmethod
3518 @classmethod
3519 def get_status_lbl(cls, value):
3519 def get_status_lbl(cls, value):
3520 return dict(cls.STATUSES).get(value)
3520 return dict(cls.STATUSES).get(value)
3521
3521
3522 @property
3522 @property
3523 def status_lbl(self):
3523 def status_lbl(self):
3524 return ChangesetStatus.get_status_lbl(self.status)
3524 return ChangesetStatus.get_status_lbl(self.status)
3525
3525
3526 def get_api_data(self):
3526 def get_api_data(self):
3527 status = self
3527 status = self
3528 data = {
3528 data = {
3529 'status_id': status.changeset_status_id,
3529 'status_id': status.changeset_status_id,
3530 'status': status.status,
3530 'status': status.status,
3531 }
3531 }
3532 return data
3532 return data
3533
3533
3534 def __json__(self):
3534 def __json__(self):
3535 data = dict()
3535 data = dict()
3536 data.update(self.get_api_data())
3536 data.update(self.get_api_data())
3537 return data
3537 return data
3538
3538
3539
3539
3540 class _PullRequestBase(BaseModel):
3540 class _PullRequestBase(BaseModel):
3541 """
3541 """
3542 Common attributes of pull request and version entries.
3542 Common attributes of pull request and version entries.
3543 """
3543 """
3544
3544
3545 # .status values
3545 # .status values
3546 STATUS_NEW = u'new'
3546 STATUS_NEW = u'new'
3547 STATUS_OPEN = u'open'
3547 STATUS_OPEN = u'open'
3548 STATUS_CLOSED = u'closed'
3548 STATUS_CLOSED = u'closed'
3549
3549
3550 # available states
3550 # available states
3551 STATE_CREATING = u'creating'
3551 STATE_CREATING = u'creating'
3552 STATE_UPDATING = u'updating'
3552 STATE_UPDATING = u'updating'
3553 STATE_MERGING = u'merging'
3553 STATE_MERGING = u'merging'
3554 STATE_CREATED = u'created'
3554 STATE_CREATED = u'created'
3555
3555
3556 title = Column('title', Unicode(255), nullable=True)
3556 title = Column('title', Unicode(255), nullable=True)
3557 description = Column(
3557 description = Column(
3558 'description', UnicodeText().with_variant(UnicodeText(10240), 'mysql'),
3558 'description', UnicodeText().with_variant(UnicodeText(10240), 'mysql'),
3559 nullable=True)
3559 nullable=True)
3560 description_renderer = Column('description_renderer', Unicode(64), nullable=True)
3560 description_renderer = Column('description_renderer', Unicode(64), nullable=True)
3561
3561
3562 # new/open/closed status of pull request (not approve/reject/etc)
3562 # new/open/closed status of pull request (not approve/reject/etc)
3563 status = Column('status', Unicode(255), nullable=False, default=STATUS_NEW)
3563 status = Column('status', Unicode(255), nullable=False, default=STATUS_NEW)
3564 created_on = Column(
3564 created_on = Column(
3565 'created_on', DateTime(timezone=False), nullable=False,
3565 'created_on', DateTime(timezone=False), nullable=False,
3566 default=datetime.datetime.now)
3566 default=datetime.datetime.now)
3567 updated_on = Column(
3567 updated_on = Column(
3568 'updated_on', DateTime(timezone=False), nullable=False,
3568 'updated_on', DateTime(timezone=False), nullable=False,
3569 default=datetime.datetime.now)
3569 default=datetime.datetime.now)
3570
3570
3571 pull_request_state = Column("pull_request_state", String(255), nullable=True)
3571 pull_request_state = Column("pull_request_state", String(255), nullable=True)
3572
3572
3573 @declared_attr
3573 @declared_attr
3574 def user_id(cls):
3574 def user_id(cls):
3575 return Column(
3575 return Column(
3576 "user_id", Integer(), ForeignKey('users.user_id'), nullable=False,
3576 "user_id", Integer(), ForeignKey('users.user_id'), nullable=False,
3577 unique=None)
3577 unique=None)
3578
3578
3579 # 500 revisions max
3579 # 500 revisions max
3580 _revisions = Column(
3580 _revisions = Column(
3581 'revisions', UnicodeText().with_variant(UnicodeText(20500), 'mysql'))
3581 'revisions', UnicodeText().with_variant(UnicodeText(20500), 'mysql'))
3582
3582
3583 @declared_attr
3583 @declared_attr
3584 def source_repo_id(cls):
3584 def source_repo_id(cls):
3585 # TODO: dan: rename column to source_repo_id
3585 # TODO: dan: rename column to source_repo_id
3586 return Column(
3586 return Column(
3587 'org_repo_id', Integer(), ForeignKey('repositories.repo_id'),
3587 'org_repo_id', Integer(), ForeignKey('repositories.repo_id'),
3588 nullable=False)
3588 nullable=False)
3589
3589
3590 _source_ref = Column('org_ref', Unicode(255), nullable=False)
3590 _source_ref = Column('org_ref', Unicode(255), nullable=False)
3591
3591
3592 @hybrid_property
3592 @hybrid_property
3593 def source_ref(self):
3593 def source_ref(self):
3594 return self._source_ref
3594 return self._source_ref
3595
3595
3596 @source_ref.setter
3596 @source_ref.setter
3597 def source_ref(self, val):
3597 def source_ref(self, val):
3598 parts = (val or '').split(':')
3598 parts = (val or '').split(':')
3599 if len(parts) != 3:
3599 if len(parts) != 3:
3600 raise ValueError(
3600 raise ValueError(
3601 'Invalid reference format given: {}, expected X:Y:Z'.format(val))
3601 'Invalid reference format given: {}, expected X:Y:Z'.format(val))
3602 self._source_ref = safe_unicode(val)
3602 self._source_ref = safe_unicode(val)
3603
3603
3604 _target_ref = Column('other_ref', Unicode(255), nullable=False)
3604 _target_ref = Column('other_ref', Unicode(255), nullable=False)
3605
3605
3606 @hybrid_property
3606 @hybrid_property
3607 def target_ref(self):
3607 def target_ref(self):
3608 return self._target_ref
3608 return self._target_ref
3609
3609
3610 @target_ref.setter
3610 @target_ref.setter
3611 def target_ref(self, val):
3611 def target_ref(self, val):
3612 parts = (val or '').split(':')
3612 parts = (val or '').split(':')
3613 if len(parts) != 3:
3613 if len(parts) != 3:
3614 raise ValueError(
3614 raise ValueError(
3615 'Invalid reference format given: {}, expected X:Y:Z'.format(val))
3615 'Invalid reference format given: {}, expected X:Y:Z'.format(val))
3616 self._target_ref = safe_unicode(val)
3616 self._target_ref = safe_unicode(val)
3617
3617
3618 @declared_attr
3618 @declared_attr
3619 def target_repo_id(cls):
3619 def target_repo_id(cls):
3620 # TODO: dan: rename column to target_repo_id
3620 # TODO: dan: rename column to target_repo_id
3621 return Column(
3621 return Column(
3622 'other_repo_id', Integer(), ForeignKey('repositories.repo_id'),
3622 'other_repo_id', Integer(), ForeignKey('repositories.repo_id'),
3623 nullable=False)
3623 nullable=False)
3624
3624
3625 _shadow_merge_ref = Column('shadow_merge_ref', Unicode(255), nullable=True)
3625 _shadow_merge_ref = Column('shadow_merge_ref', Unicode(255), nullable=True)
3626
3626
3627 # TODO: dan: rename column to last_merge_source_rev
3627 # TODO: dan: rename column to last_merge_source_rev
3628 _last_merge_source_rev = Column(
3628 _last_merge_source_rev = Column(
3629 'last_merge_org_rev', String(40), nullable=True)
3629 'last_merge_org_rev', String(40), nullable=True)
3630 # TODO: dan: rename column to last_merge_target_rev
3630 # TODO: dan: rename column to last_merge_target_rev
3631 _last_merge_target_rev = Column(
3631 _last_merge_target_rev = Column(
3632 'last_merge_other_rev', String(40), nullable=True)
3632 'last_merge_other_rev', String(40), nullable=True)
3633 _last_merge_status = Column('merge_status', Integer(), nullable=True)
3633 _last_merge_status = Column('merge_status', Integer(), nullable=True)
3634 merge_rev = Column('merge_rev', String(40), nullable=True)
3634 merge_rev = Column('merge_rev', String(40), nullable=True)
3635
3635
3636 reviewer_data = Column(
3636 reviewer_data = Column(
3637 'reviewer_data_json', MutationObj.as_mutable(
3637 'reviewer_data_json', MutationObj.as_mutable(
3638 JsonType(dialect_map=dict(mysql=UnicodeText(16384)))))
3638 JsonType(dialect_map=dict(mysql=UnicodeText(16384)))))
3639
3639
3640 @property
3640 @property
3641 def reviewer_data_json(self):
3641 def reviewer_data_json(self):
3642 return json.dumps(self.reviewer_data)
3642 return json.dumps(self.reviewer_data)
3643
3643
3644 @hybrid_property
3644 @hybrid_property
3645 def description_safe(self):
3645 def description_safe(self):
3646 from rhodecode.lib import helpers as h
3646 from rhodecode.lib import helpers as h
3647 return h.escape(self.description)
3647 return h.escape(self.description)
3648
3648
3649 @hybrid_property
3649 @hybrid_property
3650 def revisions(self):
3650 def revisions(self):
3651 return self._revisions.split(':') if self._revisions else []
3651 return self._revisions.split(':') if self._revisions else []
3652
3652
3653 @revisions.setter
3653 @revisions.setter
3654 def revisions(self, val):
3654 def revisions(self, val):
3655 self._revisions = ':'.join(val)
3655 self._revisions = ':'.join(val)
3656
3656
3657 @hybrid_property
3657 @hybrid_property
3658 def last_merge_status(self):
3658 def last_merge_status(self):
3659 return safe_int(self._last_merge_status)
3659 return safe_int(self._last_merge_status)
3660
3660
3661 @last_merge_status.setter
3661 @last_merge_status.setter
3662 def last_merge_status(self, val):
3662 def last_merge_status(self, val):
3663 self._last_merge_status = val
3663 self._last_merge_status = val
3664
3664
3665 @declared_attr
3665 @declared_attr
3666 def author(cls):
3666 def author(cls):
3667 return relationship('User', lazy='joined')
3667 return relationship('User', lazy='joined')
3668
3668
3669 @declared_attr
3669 @declared_attr
3670 def source_repo(cls):
3670 def source_repo(cls):
3671 return relationship(
3671 return relationship(
3672 'Repository',
3672 'Repository',
3673 primaryjoin='%s.source_repo_id==Repository.repo_id' % cls.__name__)
3673 primaryjoin='%s.source_repo_id==Repository.repo_id' % cls.__name__)
3674
3674
3675 @property
3675 @property
3676 def source_ref_parts(self):
3676 def source_ref_parts(self):
3677 return self.unicode_to_reference(self.source_ref)
3677 return self.unicode_to_reference(self.source_ref)
3678
3678
3679 @declared_attr
3679 @declared_attr
3680 def target_repo(cls):
3680 def target_repo(cls):
3681 return relationship(
3681 return relationship(
3682 'Repository',
3682 'Repository',
3683 primaryjoin='%s.target_repo_id==Repository.repo_id' % cls.__name__)
3683 primaryjoin='%s.target_repo_id==Repository.repo_id' % cls.__name__)
3684
3684
3685 @property
3685 @property
3686 def target_ref_parts(self):
3686 def target_ref_parts(self):
3687 return self.unicode_to_reference(self.target_ref)
3687 return self.unicode_to_reference(self.target_ref)
3688
3688
3689 @property
3689 @property
3690 def shadow_merge_ref(self):
3690 def shadow_merge_ref(self):
3691 return self.unicode_to_reference(self._shadow_merge_ref)
3691 return self.unicode_to_reference(self._shadow_merge_ref)
3692
3692
3693 @shadow_merge_ref.setter
3693 @shadow_merge_ref.setter
3694 def shadow_merge_ref(self, ref):
3694 def shadow_merge_ref(self, ref):
3695 self._shadow_merge_ref = self.reference_to_unicode(ref)
3695 self._shadow_merge_ref = self.reference_to_unicode(ref)
3696
3696
3697 @staticmethod
3697 @staticmethod
3698 def unicode_to_reference(raw):
3698 def unicode_to_reference(raw):
3699 """
3699 """
3700 Convert a unicode (or string) to a reference object.
3700 Convert a unicode (or string) to a reference object.
3701 If unicode evaluates to False it returns None.
3701 If unicode evaluates to False it returns None.
3702 """
3702 """
3703 if raw:
3703 if raw:
3704 refs = raw.split(':')
3704 refs = raw.split(':')
3705 return Reference(*refs)
3705 return Reference(*refs)
3706 else:
3706 else:
3707 return None
3707 return None
3708
3708
3709 @staticmethod
3709 @staticmethod
3710 def reference_to_unicode(ref):
3710 def reference_to_unicode(ref):
3711 """
3711 """
3712 Convert a reference object to unicode.
3712 Convert a reference object to unicode.
3713 If reference is None it returns None.
3713 If reference is None it returns None.
3714 """
3714 """
3715 if ref:
3715 if ref:
3716 return u':'.join(ref)
3716 return u':'.join(ref)
3717 else:
3717 else:
3718 return None
3718 return None
3719
3719
3720 def get_api_data(self, with_merge_state=True):
3720 def get_api_data(self, with_merge_state=True):
3721 from rhodecode.model.pull_request import PullRequestModel
3721 from rhodecode.model.pull_request import PullRequestModel
3722
3722
3723 pull_request = self
3723 pull_request = self
3724 if with_merge_state:
3724 if with_merge_state:
3725 merge_status = PullRequestModel().merge_status(pull_request)
3725 merge_status = PullRequestModel().merge_status(pull_request)
3726 merge_state = {
3726 merge_state = {
3727 'status': merge_status[0],
3727 'status': merge_status[0],
3728 'message': safe_unicode(merge_status[1]),
3728 'message': safe_unicode(merge_status[1]),
3729 }
3729 }
3730 else:
3730 else:
3731 merge_state = {'status': 'not_available',
3731 merge_state = {'status': 'not_available',
3732 'message': 'not_available'}
3732 'message': 'not_available'}
3733
3733
3734 merge_data = {
3734 merge_data = {
3735 'clone_url': PullRequestModel().get_shadow_clone_url(pull_request),
3735 'clone_url': PullRequestModel().get_shadow_clone_url(pull_request),
3736 'reference': (
3736 'reference': (
3737 pull_request.shadow_merge_ref._asdict()
3737 pull_request.shadow_merge_ref._asdict()
3738 if pull_request.shadow_merge_ref else None),
3738 if pull_request.shadow_merge_ref else None),
3739 }
3739 }
3740
3740
3741 data = {
3741 data = {
3742 'pull_request_id': pull_request.pull_request_id,
3742 'pull_request_id': pull_request.pull_request_id,
3743 'url': PullRequestModel().get_url(pull_request),
3743 'url': PullRequestModel().get_url(pull_request),
3744 'title': pull_request.title,
3744 'title': pull_request.title,
3745 'description': pull_request.description,
3745 'description': pull_request.description,
3746 'status': pull_request.status,
3746 'status': pull_request.status,
3747 'created_on': pull_request.created_on,
3747 'created_on': pull_request.created_on,
3748 'updated_on': pull_request.updated_on,
3748 'updated_on': pull_request.updated_on,
3749 'commit_ids': pull_request.revisions,
3749 'commit_ids': pull_request.revisions,
3750 'review_status': pull_request.calculated_review_status(),
3750 'review_status': pull_request.calculated_review_status(),
3751 'mergeable': merge_state,
3751 'mergeable': merge_state,
3752 'source': {
3752 'source': {
3753 'clone_url': pull_request.source_repo.clone_url(),
3753 'clone_url': pull_request.source_repo.clone_url(),
3754 'repository': pull_request.source_repo.repo_name,
3754 'repository': pull_request.source_repo.repo_name,
3755 'reference': {
3755 'reference': {
3756 'name': pull_request.source_ref_parts.name,
3756 'name': pull_request.source_ref_parts.name,
3757 'type': pull_request.source_ref_parts.type,
3757 'type': pull_request.source_ref_parts.type,
3758 'commit_id': pull_request.source_ref_parts.commit_id,
3758 'commit_id': pull_request.source_ref_parts.commit_id,
3759 },
3759 },
3760 },
3760 },
3761 'target': {
3761 'target': {
3762 'clone_url': pull_request.target_repo.clone_url(),
3762 'clone_url': pull_request.target_repo.clone_url(),
3763 'repository': pull_request.target_repo.repo_name,
3763 'repository': pull_request.target_repo.repo_name,
3764 'reference': {
3764 'reference': {
3765 'name': pull_request.target_ref_parts.name,
3765 'name': pull_request.target_ref_parts.name,
3766 'type': pull_request.target_ref_parts.type,
3766 'type': pull_request.target_ref_parts.type,
3767 'commit_id': pull_request.target_ref_parts.commit_id,
3767 'commit_id': pull_request.target_ref_parts.commit_id,
3768 },
3768 },
3769 },
3769 },
3770 'merge': merge_data,
3770 'merge': merge_data,
3771 'author': pull_request.author.get_api_data(include_secrets=False,
3771 'author': pull_request.author.get_api_data(include_secrets=False,
3772 details='basic'),
3772 details='basic'),
3773 'reviewers': [
3773 'reviewers': [
3774 {
3774 {
3775 'user': reviewer.get_api_data(include_secrets=False,
3775 'user': reviewer.get_api_data(include_secrets=False,
3776 details='basic'),
3776 details='basic'),
3777 'reasons': reasons,
3777 'reasons': reasons,
3778 'review_status': st[0][1].status if st else 'not_reviewed',
3778 'review_status': st[0][1].status if st else 'not_reviewed',
3779 }
3779 }
3780 for obj, reviewer, reasons, mandatory, st in
3780 for obj, reviewer, reasons, mandatory, st in
3781 pull_request.reviewers_statuses()
3781 pull_request.reviewers_statuses()
3782 ]
3782 ]
3783 }
3783 }
3784
3784
3785 return data
3785 return data
3786
3786
3787
3787
3788 class PullRequest(Base, _PullRequestBase):
3788 class PullRequest(Base, _PullRequestBase):
3789 __tablename__ = 'pull_requests'
3789 __tablename__ = 'pull_requests'
3790 __table_args__ = (
3790 __table_args__ = (
3791 base_table_args,
3791 base_table_args,
3792 )
3792 )
3793
3793
3794 pull_request_id = Column(
3794 pull_request_id = Column(
3795 'pull_request_id', Integer(), nullable=False, primary_key=True)
3795 'pull_request_id', Integer(), nullable=False, primary_key=True)
3796
3796
3797 def __repr__(self):
3797 def __repr__(self):
3798 if self.pull_request_id:
3798 if self.pull_request_id:
3799 return '<DB:PullRequest #%s>' % self.pull_request_id
3799 return '<DB:PullRequest #%s>' % self.pull_request_id
3800 else:
3800 else:
3801 return '<DB:PullRequest at %#x>' % id(self)
3801 return '<DB:PullRequest at %#x>' % id(self)
3802
3802
3803 reviewers = relationship('PullRequestReviewers',
3803 reviewers = relationship('PullRequestReviewers',
3804 cascade="all, delete, delete-orphan")
3804 cascade="all, delete, delete-orphan")
3805 statuses = relationship('ChangesetStatus',
3805 statuses = relationship('ChangesetStatus',
3806 cascade="all, delete, delete-orphan")
3806 cascade="all, delete, delete-orphan")
3807 comments = relationship('ChangesetComment',
3807 comments = relationship('ChangesetComment',
3808 cascade="all, delete, delete-orphan")
3808 cascade="all, delete, delete-orphan")
3809 versions = relationship('PullRequestVersion',
3809 versions = relationship('PullRequestVersion',
3810 cascade="all, delete, delete-orphan",
3810 cascade="all, delete, delete-orphan",
3811 lazy='dynamic')
3811 lazy='dynamic')
3812
3812
3813 @classmethod
3813 @classmethod
3814 def get_pr_display_object(cls, pull_request_obj, org_pull_request_obj,
3814 def get_pr_display_object(cls, pull_request_obj, org_pull_request_obj,
3815 internal_methods=None):
3815 internal_methods=None):
3816
3816
3817 class PullRequestDisplay(object):
3817 class PullRequestDisplay(object):
3818 """
3818 """
3819 Special object wrapper for showing PullRequest data via Versions
3819 Special object wrapper for showing PullRequest data via Versions
3820 It mimics PR object as close as possible. This is read only object
3820 It mimics PR object as close as possible. This is read only object
3821 just for display
3821 just for display
3822 """
3822 """
3823
3823
3824 def __init__(self, attrs, internal=None):
3824 def __init__(self, attrs, internal=None):
3825 self.attrs = attrs
3825 self.attrs = attrs
3826 # internal have priority over the given ones via attrs
3826 # internal have priority over the given ones via attrs
3827 self.internal = internal or ['versions']
3827 self.internal = internal or ['versions']
3828
3828
3829 def __getattr__(self, item):
3829 def __getattr__(self, item):
3830 if item in self.internal:
3830 if item in self.internal:
3831 return getattr(self, item)
3831 return getattr(self, item)
3832 try:
3832 try:
3833 return self.attrs[item]
3833 return self.attrs[item]
3834 except KeyError:
3834 except KeyError:
3835 raise AttributeError(
3835 raise AttributeError(
3836 '%s object has no attribute %s' % (self, item))
3836 '%s object has no attribute %s' % (self, item))
3837
3837
3838 def __repr__(self):
3838 def __repr__(self):
3839 return '<DB:PullRequestDisplay #%s>' % self.attrs.get('pull_request_id')
3839 return '<DB:PullRequestDisplay #%s>' % self.attrs.get('pull_request_id')
3840
3840
3841 def versions(self):
3841 def versions(self):
3842 return pull_request_obj.versions.order_by(
3842 return pull_request_obj.versions.order_by(
3843 PullRequestVersion.pull_request_version_id).all()
3843 PullRequestVersion.pull_request_version_id).all()
3844
3844
3845 def is_closed(self):
3845 def is_closed(self):
3846 return pull_request_obj.is_closed()
3846 return pull_request_obj.is_closed()
3847
3847
3848 @property
3848 @property
3849 def pull_request_version_id(self):
3849 def pull_request_version_id(self):
3850 return getattr(pull_request_obj, 'pull_request_version_id', None)
3850 return getattr(pull_request_obj, 'pull_request_version_id', None)
3851
3851
3852 attrs = StrictAttributeDict(pull_request_obj.get_api_data())
3852 attrs = StrictAttributeDict(pull_request_obj.get_api_data())
3853
3853
3854 attrs.author = StrictAttributeDict(
3854 attrs.author = StrictAttributeDict(
3855 pull_request_obj.author.get_api_data())
3855 pull_request_obj.author.get_api_data())
3856 if pull_request_obj.target_repo:
3856 if pull_request_obj.target_repo:
3857 attrs.target_repo = StrictAttributeDict(
3857 attrs.target_repo = StrictAttributeDict(
3858 pull_request_obj.target_repo.get_api_data())
3858 pull_request_obj.target_repo.get_api_data())
3859 attrs.target_repo.clone_url = pull_request_obj.target_repo.clone_url
3859 attrs.target_repo.clone_url = pull_request_obj.target_repo.clone_url
3860
3860
3861 if pull_request_obj.source_repo:
3861 if pull_request_obj.source_repo:
3862 attrs.source_repo = StrictAttributeDict(
3862 attrs.source_repo = StrictAttributeDict(
3863 pull_request_obj.source_repo.get_api_data())
3863 pull_request_obj.source_repo.get_api_data())
3864 attrs.source_repo.clone_url = pull_request_obj.source_repo.clone_url
3864 attrs.source_repo.clone_url = pull_request_obj.source_repo.clone_url
3865
3865
3866 attrs.source_ref_parts = pull_request_obj.source_ref_parts
3866 attrs.source_ref_parts = pull_request_obj.source_ref_parts
3867 attrs.target_ref_parts = pull_request_obj.target_ref_parts
3867 attrs.target_ref_parts = pull_request_obj.target_ref_parts
3868 attrs.revisions = pull_request_obj.revisions
3868 attrs.revisions = pull_request_obj.revisions
3869
3869
3870 attrs.shadow_merge_ref = org_pull_request_obj.shadow_merge_ref
3870 attrs.shadow_merge_ref = org_pull_request_obj.shadow_merge_ref
3871 attrs.reviewer_data = org_pull_request_obj.reviewer_data
3871 attrs.reviewer_data = org_pull_request_obj.reviewer_data
3872 attrs.reviewer_data_json = org_pull_request_obj.reviewer_data_json
3872 attrs.reviewer_data_json = org_pull_request_obj.reviewer_data_json
3873
3873
3874 return PullRequestDisplay(attrs, internal=internal_methods)
3874 return PullRequestDisplay(attrs, internal=internal_methods)
3875
3875
3876 def is_closed(self):
3876 def is_closed(self):
3877 return self.status == self.STATUS_CLOSED
3877 return self.status == self.STATUS_CLOSED
3878
3878
3879 def __json__(self):
3879 def __json__(self):
3880 return {
3880 return {
3881 'revisions': self.revisions,
3881 'revisions': self.revisions,
3882 }
3882 }
3883
3883
3884 def calculated_review_status(self):
3884 def calculated_review_status(self):
3885 from rhodecode.model.changeset_status import ChangesetStatusModel
3885 from rhodecode.model.changeset_status import ChangesetStatusModel
3886 return ChangesetStatusModel().calculated_review_status(self)
3886 return ChangesetStatusModel().calculated_review_status(self)
3887
3887
3888 def reviewers_statuses(self):
3888 def reviewers_statuses(self):
3889 from rhodecode.model.changeset_status import ChangesetStatusModel
3889 from rhodecode.model.changeset_status import ChangesetStatusModel
3890 return ChangesetStatusModel().reviewers_statuses(self)
3890 return ChangesetStatusModel().reviewers_statuses(self)
3891
3891
3892 @property
3892 @property
3893 def workspace_id(self):
3893 def workspace_id(self):
3894 from rhodecode.model.pull_request import PullRequestModel
3894 from rhodecode.model.pull_request import PullRequestModel
3895 return PullRequestModel()._workspace_id(self)
3895 return PullRequestModel()._workspace_id(self)
3896
3896
3897 def get_shadow_repo(self):
3897 def get_shadow_repo(self):
3898 workspace_id = self.workspace_id
3898 workspace_id = self.workspace_id
3899 vcs_obj = self.target_repo.scm_instance()
3899 vcs_obj = self.target_repo.scm_instance()
3900 shadow_repository_path = vcs_obj._get_shadow_repository_path(
3900 shadow_repository_path = vcs_obj._get_shadow_repository_path(
3901 self.target_repo.repo_id, workspace_id)
3901 self.target_repo.repo_id, workspace_id)
3902 if os.path.isdir(shadow_repository_path):
3902 if os.path.isdir(shadow_repository_path):
3903 return vcs_obj.get_shadow_instance(shadow_repository_path)
3903 return vcs_obj.get_shadow_instance(shadow_repository_path)
3904
3904
3905
3905
3906 class PullRequestVersion(Base, _PullRequestBase):
3906 class PullRequestVersion(Base, _PullRequestBase):
3907 __tablename__ = 'pull_request_versions'
3907 __tablename__ = 'pull_request_versions'
3908 __table_args__ = (
3908 __table_args__ = (
3909 base_table_args,
3909 base_table_args,
3910 )
3910 )
3911
3911
3912 pull_request_version_id = Column(
3912 pull_request_version_id = Column(
3913 'pull_request_version_id', Integer(), nullable=False, primary_key=True)
3913 'pull_request_version_id', Integer(), nullable=False, primary_key=True)
3914 pull_request_id = Column(
3914 pull_request_id = Column(
3915 'pull_request_id', Integer(),
3915 'pull_request_id', Integer(),
3916 ForeignKey('pull_requests.pull_request_id'), nullable=False)
3916 ForeignKey('pull_requests.pull_request_id'), nullable=False)
3917 pull_request = relationship('PullRequest')
3917 pull_request = relationship('PullRequest')
3918
3918
3919 def __repr__(self):
3919 def __repr__(self):
3920 if self.pull_request_version_id:
3920 if self.pull_request_version_id:
3921 return '<DB:PullRequestVersion #%s>' % self.pull_request_version_id
3921 return '<DB:PullRequestVersion #%s>' % self.pull_request_version_id
3922 else:
3922 else:
3923 return '<DB:PullRequestVersion at %#x>' % id(self)
3923 return '<DB:PullRequestVersion at %#x>' % id(self)
3924
3924
3925 @property
3925 @property
3926 def reviewers(self):
3926 def reviewers(self):
3927 return self.pull_request.reviewers
3927 return self.pull_request.reviewers
3928
3928
3929 @property
3929 @property
3930 def versions(self):
3930 def versions(self):
3931 return self.pull_request.versions
3931 return self.pull_request.versions
3932
3932
3933 def is_closed(self):
3933 def is_closed(self):
3934 # calculate from original
3934 # calculate from original
3935 return self.pull_request.status == self.STATUS_CLOSED
3935 return self.pull_request.status == self.STATUS_CLOSED
3936
3936
3937 def calculated_review_status(self):
3937 def calculated_review_status(self):
3938 return self.pull_request.calculated_review_status()
3938 return self.pull_request.calculated_review_status()
3939
3939
3940 def reviewers_statuses(self):
3940 def reviewers_statuses(self):
3941 return self.pull_request.reviewers_statuses()
3941 return self.pull_request.reviewers_statuses()
3942
3942
3943
3943
3944 class PullRequestReviewers(Base, BaseModel):
3944 class PullRequestReviewers(Base, BaseModel):
3945 __tablename__ = 'pull_request_reviewers'
3945 __tablename__ = 'pull_request_reviewers'
3946 __table_args__ = (
3946 __table_args__ = (
3947 base_table_args,
3947 base_table_args,
3948 )
3948 )
3949
3949
3950 @hybrid_property
3950 @hybrid_property
3951 def reasons(self):
3951 def reasons(self):
3952 if not self._reasons:
3952 if not self._reasons:
3953 return []
3953 return []
3954 return self._reasons
3954 return self._reasons
3955
3955
3956 @reasons.setter
3956 @reasons.setter
3957 def reasons(self, val):
3957 def reasons(self, val):
3958 val = val or []
3958 val = val or []
3959 if any(not isinstance(x, compat.string_types) for x in val):
3959 if any(not isinstance(x, compat.string_types) for x in val):
3960 raise Exception('invalid reasons type, must be list of strings')
3960 raise Exception('invalid reasons type, must be list of strings')
3961 self._reasons = val
3961 self._reasons = val
3962
3962
3963 pull_requests_reviewers_id = Column(
3963 pull_requests_reviewers_id = Column(
3964 'pull_requests_reviewers_id', Integer(), nullable=False,
3964 'pull_requests_reviewers_id', Integer(), nullable=False,
3965 primary_key=True)
3965 primary_key=True)
3966 pull_request_id = Column(
3966 pull_request_id = Column(
3967 "pull_request_id", Integer(),
3967 "pull_request_id", Integer(),
3968 ForeignKey('pull_requests.pull_request_id'), nullable=False)
3968 ForeignKey('pull_requests.pull_request_id'), nullable=False)
3969 user_id = Column(
3969 user_id = Column(
3970 "user_id", Integer(), ForeignKey('users.user_id'), nullable=True)
3970 "user_id", Integer(), ForeignKey('users.user_id'), nullable=True)
3971 _reasons = Column(
3971 _reasons = Column(
3972 'reason', MutationList.as_mutable(
3972 'reason', MutationList.as_mutable(
3973 JsonType('list', dialect_map=dict(mysql=UnicodeText(16384)))))
3973 JsonType('list', dialect_map=dict(mysql=UnicodeText(16384)))))
3974
3974
3975 mandatory = Column("mandatory", Boolean(), nullable=False, default=False)
3975 mandatory = Column("mandatory", Boolean(), nullable=False, default=False)
3976 user = relationship('User')
3976 user = relationship('User')
3977 pull_request = relationship('PullRequest')
3977 pull_request = relationship('PullRequest')
3978
3978
3979 rule_data = Column(
3979 rule_data = Column(
3980 'rule_data_json',
3980 'rule_data_json',
3981 JsonType(dialect_map=dict(mysql=UnicodeText(16384))))
3981 JsonType(dialect_map=dict(mysql=UnicodeText(16384))))
3982
3982
3983 def rule_user_group_data(self):
3983 def rule_user_group_data(self):
3984 """
3984 """
3985 Returns the voting user group rule data for this reviewer
3985 Returns the voting user group rule data for this reviewer
3986 """
3986 """
3987
3987
3988 if self.rule_data and 'vote_rule' in self.rule_data:
3988 if self.rule_data and 'vote_rule' in self.rule_data:
3989 user_group_data = {}
3989 user_group_data = {}
3990 if 'rule_user_group_entry_id' in self.rule_data:
3990 if 'rule_user_group_entry_id' in self.rule_data:
3991 # means a group with voting rules !
3991 # means a group with voting rules !
3992 user_group_data['id'] = self.rule_data['rule_user_group_entry_id']
3992 user_group_data['id'] = self.rule_data['rule_user_group_entry_id']
3993 user_group_data['name'] = self.rule_data['rule_name']
3993 user_group_data['name'] = self.rule_data['rule_name']
3994 user_group_data['vote_rule'] = self.rule_data['vote_rule']
3994 user_group_data['vote_rule'] = self.rule_data['vote_rule']
3995
3995
3996 return user_group_data
3996 return user_group_data
3997
3997
3998 def __unicode__(self):
3998 def __unicode__(self):
3999 return u"<%s('id:%s')>" % (self.__class__.__name__,
3999 return u"<%s('id:%s')>" % (self.__class__.__name__,
4000 self.pull_requests_reviewers_id)
4000 self.pull_requests_reviewers_id)
4001
4001
4002
4002
4003 class Notification(Base, BaseModel):
4003 class Notification(Base, BaseModel):
4004 __tablename__ = 'notifications'
4004 __tablename__ = 'notifications'
4005 __table_args__ = (
4005 __table_args__ = (
4006 Index('notification_type_idx', 'type'),
4006 Index('notification_type_idx', 'type'),
4007 base_table_args,
4007 base_table_args,
4008 )
4008 )
4009
4009
4010 TYPE_CHANGESET_COMMENT = u'cs_comment'
4010 TYPE_CHANGESET_COMMENT = u'cs_comment'
4011 TYPE_MESSAGE = u'message'
4011 TYPE_MESSAGE = u'message'
4012 TYPE_MENTION = u'mention'
4012 TYPE_MENTION = u'mention'
4013 TYPE_REGISTRATION = u'registration'
4013 TYPE_REGISTRATION = u'registration'
4014 TYPE_PULL_REQUEST = u'pull_request'
4014 TYPE_PULL_REQUEST = u'pull_request'
4015 TYPE_PULL_REQUEST_COMMENT = u'pull_request_comment'
4015 TYPE_PULL_REQUEST_COMMENT = u'pull_request_comment'
4016
4016
4017 notification_id = Column('notification_id', Integer(), nullable=False, primary_key=True)
4017 notification_id = Column('notification_id', Integer(), nullable=False, primary_key=True)
4018 subject = Column('subject', Unicode(512), nullable=True)
4018 subject = Column('subject', Unicode(512), nullable=True)
4019 body = Column('body', UnicodeText().with_variant(UnicodeText(50000), 'mysql'), nullable=True)
4019 body = Column('body', UnicodeText().with_variant(UnicodeText(50000), 'mysql'), nullable=True)
4020 created_by = Column("created_by", Integer(), ForeignKey('users.user_id'), nullable=True)
4020 created_by = Column("created_by", Integer(), ForeignKey('users.user_id'), nullable=True)
4021 created_on = Column('created_on', DateTime(timezone=False), nullable=False, default=datetime.datetime.now)
4021 created_on = Column('created_on', DateTime(timezone=False), nullable=False, default=datetime.datetime.now)
4022 type_ = Column('type', Unicode(255))
4022 type_ = Column('type', Unicode(255))
4023
4023
4024 created_by_user = relationship('User')
4024 created_by_user = relationship('User')
4025 notifications_to_users = relationship('UserNotification', lazy='joined',
4025 notifications_to_users = relationship('UserNotification', lazy='joined',
4026 cascade="all, delete, delete-orphan")
4026 cascade="all, delete, delete-orphan")
4027
4027
4028 @property
4028 @property
4029 def recipients(self):
4029 def recipients(self):
4030 return [x.user for x in UserNotification.query()\
4030 return [x.user for x in UserNotification.query()\
4031 .filter(UserNotification.notification == self)\
4031 .filter(UserNotification.notification == self)\
4032 .order_by(UserNotification.user_id.asc()).all()]
4032 .order_by(UserNotification.user_id.asc()).all()]
4033
4033
4034 @classmethod
4034 @classmethod
4035 def create(cls, created_by, subject, body, recipients, type_=None):
4035 def create(cls, created_by, subject, body, recipients, type_=None):
4036 if type_ is None:
4036 if type_ is None:
4037 type_ = Notification.TYPE_MESSAGE
4037 type_ = Notification.TYPE_MESSAGE
4038
4038
4039 notification = cls()
4039 notification = cls()
4040 notification.created_by_user = created_by
4040 notification.created_by_user = created_by
4041 notification.subject = subject
4041 notification.subject = subject
4042 notification.body = body
4042 notification.body = body
4043 notification.type_ = type_
4043 notification.type_ = type_
4044 notification.created_on = datetime.datetime.now()
4044 notification.created_on = datetime.datetime.now()
4045
4045
4046 # For each recipient link the created notification to his account
4046 # For each recipient link the created notification to his account
4047 for u in recipients:
4047 for u in recipients:
4048 assoc = UserNotification()
4048 assoc = UserNotification()
4049 assoc.user_id = u.user_id
4049 assoc.user_id = u.user_id
4050 assoc.notification = notification
4050 assoc.notification = notification
4051
4051
4052 # if created_by is inside recipients mark his notification
4052 # if created_by is inside recipients mark his notification
4053 # as read
4053 # as read
4054 if u.user_id == created_by.user_id:
4054 if u.user_id == created_by.user_id:
4055 assoc.read = True
4055 assoc.read = True
4056 Session().add(assoc)
4056 Session().add(assoc)
4057
4057
4058 Session().add(notification)
4058 Session().add(notification)
4059
4059
4060 return notification
4060 return notification
4061
4061
4062
4062
4063 class UserNotification(Base, BaseModel):
4063 class UserNotification(Base, BaseModel):
4064 __tablename__ = 'user_to_notification'
4064 __tablename__ = 'user_to_notification'
4065 __table_args__ = (
4065 __table_args__ = (
4066 UniqueConstraint('user_id', 'notification_id'),
4066 UniqueConstraint('user_id', 'notification_id'),
4067 base_table_args
4067 base_table_args
4068 )
4068 )
4069
4069
4070 user_id = Column('user_id', Integer(), ForeignKey('users.user_id'), primary_key=True)
4070 user_id = Column('user_id', Integer(), ForeignKey('users.user_id'), primary_key=True)
4071 notification_id = Column("notification_id", Integer(), ForeignKey('notifications.notification_id'), primary_key=True)
4071 notification_id = Column("notification_id", Integer(), ForeignKey('notifications.notification_id'), primary_key=True)
4072 read = Column('read', Boolean, default=False)
4072 read = Column('read', Boolean, default=False)
4073 sent_on = Column('sent_on', DateTime(timezone=False), nullable=True, unique=None)
4073 sent_on = Column('sent_on', DateTime(timezone=False), nullable=True, unique=None)
4074
4074
4075 user = relationship('User', lazy="joined")
4075 user = relationship('User', lazy="joined")
4076 notification = relationship('Notification', lazy="joined",
4076 notification = relationship('Notification', lazy="joined",
4077 order_by=lambda: Notification.created_on.desc(),)
4077 order_by=lambda: Notification.created_on.desc(),)
4078
4078
4079 def mark_as_read(self):
4079 def mark_as_read(self):
4080 self.read = True
4080 self.read = True
4081 Session().add(self)
4081 Session().add(self)
4082
4082
4083
4083
4084 class Gist(Base, BaseModel):
4084 class Gist(Base, BaseModel):
4085 __tablename__ = 'gists'
4085 __tablename__ = 'gists'
4086 __table_args__ = (
4086 __table_args__ = (
4087 Index('g_gist_access_id_idx', 'gist_access_id'),
4087 Index('g_gist_access_id_idx', 'gist_access_id'),
4088 Index('g_created_on_idx', 'created_on'),
4088 Index('g_created_on_idx', 'created_on'),
4089 base_table_args
4089 base_table_args
4090 )
4090 )
4091
4091
4092 GIST_PUBLIC = u'public'
4092 GIST_PUBLIC = u'public'
4093 GIST_PRIVATE = u'private'
4093 GIST_PRIVATE = u'private'
4094 DEFAULT_FILENAME = u'gistfile1.txt'
4094 DEFAULT_FILENAME = u'gistfile1.txt'
4095
4095
4096 ACL_LEVEL_PUBLIC = u'acl_public'
4096 ACL_LEVEL_PUBLIC = u'acl_public'
4097 ACL_LEVEL_PRIVATE = u'acl_private'
4097 ACL_LEVEL_PRIVATE = u'acl_private'
4098
4098
4099 gist_id = Column('gist_id', Integer(), primary_key=True)
4099 gist_id = Column('gist_id', Integer(), primary_key=True)
4100 gist_access_id = Column('gist_access_id', Unicode(250))
4100 gist_access_id = Column('gist_access_id', Unicode(250))
4101 gist_description = Column('gist_description', UnicodeText().with_variant(UnicodeText(1024), 'mysql'))
4101 gist_description = Column('gist_description', UnicodeText().with_variant(UnicodeText(1024), 'mysql'))
4102 gist_owner = Column('user_id', Integer(), ForeignKey('users.user_id'), nullable=True)
4102 gist_owner = Column('user_id', Integer(), ForeignKey('users.user_id'), nullable=True)
4103 gist_expires = Column('gist_expires', Float(53), nullable=False)
4103 gist_expires = Column('gist_expires', Float(53), nullable=False)
4104 gist_type = Column('gist_type', Unicode(128), nullable=False)
4104 gist_type = Column('gist_type', Unicode(128), nullable=False)
4105 created_on = Column('created_on', DateTime(timezone=False), nullable=False, default=datetime.datetime.now)
4105 created_on = Column('created_on', DateTime(timezone=False), nullable=False, default=datetime.datetime.now)
4106 modified_at = Column('modified_at', DateTime(timezone=False), nullable=False, default=datetime.datetime.now)
4106 modified_at = Column('modified_at', DateTime(timezone=False), nullable=False, default=datetime.datetime.now)
4107 acl_level = Column('acl_level', Unicode(128), nullable=True)
4107 acl_level = Column('acl_level', Unicode(128), nullable=True)
4108
4108
4109 owner = relationship('User')
4109 owner = relationship('User')
4110
4110
4111 def __repr__(self):
4111 def __repr__(self):
4112 return '<Gist:[%s]%s>' % (self.gist_type, self.gist_access_id)
4112 return '<Gist:[%s]%s>' % (self.gist_type, self.gist_access_id)
4113
4113
4114 @hybrid_property
4114 @hybrid_property
4115 def description_safe(self):
4115 def description_safe(self):
4116 from rhodecode.lib import helpers as h
4116 from rhodecode.lib import helpers as h
4117 return h.escape(self.gist_description)
4117 return h.escape(self.gist_description)
4118
4118
4119 @classmethod
4119 @classmethod
4120 def get_or_404(cls, id_):
4120 def get_or_404(cls, id_):
4121 from pyramid.httpexceptions import HTTPNotFound
4121 from pyramid.httpexceptions import HTTPNotFound
4122
4122
4123 res = cls.query().filter(cls.gist_access_id == id_).scalar()
4123 res = cls.query().filter(cls.gist_access_id == id_).scalar()
4124 if not res:
4124 if not res:
4125 raise HTTPNotFound()
4125 raise HTTPNotFound()
4126 return res
4126 return res
4127
4127
4128 @classmethod
4128 @classmethod
4129 def get_by_access_id(cls, gist_access_id):
4129 def get_by_access_id(cls, gist_access_id):
4130 return cls.query().filter(cls.gist_access_id == gist_access_id).scalar()
4130 return cls.query().filter(cls.gist_access_id == gist_access_id).scalar()
4131
4131
4132 def gist_url(self):
4132 def gist_url(self):
4133 from rhodecode.model.gist import GistModel
4133 from rhodecode.model.gist import GistModel
4134 return GistModel().get_url(self)
4134 return GistModel().get_url(self)
4135
4135
4136 @classmethod
4136 @classmethod
4137 def base_path(cls):
4137 def base_path(cls):
4138 """
4138 """
4139 Returns base path when all gists are stored
4139 Returns base path when all gists are stored
4140
4140
4141 :param cls:
4141 :param cls:
4142 """
4142 """
4143 from rhodecode.model.gist import GIST_STORE_LOC
4143 from rhodecode.model.gist import GIST_STORE_LOC
4144 q = Session().query(RhodeCodeUi)\
4144 q = Session().query(RhodeCodeUi)\
4145 .filter(RhodeCodeUi.ui_key == URL_SEP)
4145 .filter(RhodeCodeUi.ui_key == URL_SEP)
4146 q = q.options(FromCache("sql_cache_short", "repository_repo_path"))
4146 q = q.options(FromCache("sql_cache_short", "repository_repo_path"))
4147 return os.path.join(q.one().ui_value, GIST_STORE_LOC)
4147 return os.path.join(q.one().ui_value, GIST_STORE_LOC)
4148
4148
4149 def get_api_data(self):
4149 def get_api_data(self):
4150 """
4150 """
4151 Common function for generating gist related data for API
4151 Common function for generating gist related data for API
4152 """
4152 """
4153 gist = self
4153 gist = self
4154 data = {
4154 data = {
4155 'gist_id': gist.gist_id,
4155 'gist_id': gist.gist_id,
4156 'type': gist.gist_type,
4156 'type': gist.gist_type,
4157 'access_id': gist.gist_access_id,
4157 'access_id': gist.gist_access_id,
4158 'description': gist.gist_description,
4158 'description': gist.gist_description,
4159 'url': gist.gist_url(),
4159 'url': gist.gist_url(),
4160 'expires': gist.gist_expires,
4160 'expires': gist.gist_expires,
4161 'created_on': gist.created_on,
4161 'created_on': gist.created_on,
4162 'modified_at': gist.modified_at,
4162 'modified_at': gist.modified_at,
4163 'content': None,
4163 'content': None,
4164 'acl_level': gist.acl_level,
4164 'acl_level': gist.acl_level,
4165 }
4165 }
4166 return data
4166 return data
4167
4167
4168 def __json__(self):
4168 def __json__(self):
4169 data = dict(
4169 data = dict(
4170 )
4170 )
4171 data.update(self.get_api_data())
4171 data.update(self.get_api_data())
4172 return data
4172 return data
4173 # SCM functions
4173 # SCM functions
4174
4174
4175 def scm_instance(self, **kwargs):
4175 def scm_instance(self, **kwargs):
4176 full_repo_path = os.path.join(self.base_path(), self.gist_access_id)
4176 full_repo_path = os.path.join(self.base_path(), self.gist_access_id)
4177 return get_vcs_instance(
4177 return get_vcs_instance(
4178 repo_path=safe_str(full_repo_path), create=False)
4178 repo_path=safe_str(full_repo_path), create=False)
4179
4179
4180
4180
4181 class ExternalIdentity(Base, BaseModel):
4181 class ExternalIdentity(Base, BaseModel):
4182 __tablename__ = 'external_identities'
4182 __tablename__ = 'external_identities'
4183 __table_args__ = (
4183 __table_args__ = (
4184 Index('local_user_id_idx', 'local_user_id'),
4184 Index('local_user_id_idx', 'local_user_id'),
4185 Index('external_id_idx', 'external_id'),
4185 Index('external_id_idx', 'external_id'),
4186 base_table_args
4186 base_table_args
4187 )
4187 )
4188
4188
4189 external_id = Column('external_id', Unicode(255), default=u'', primary_key=True)
4189 external_id = Column('external_id', Unicode(255), default=u'', primary_key=True)
4190 external_username = Column('external_username', Unicode(1024), default=u'')
4190 external_username = Column('external_username', Unicode(1024), default=u'')
4191 local_user_id = Column('local_user_id', Integer(), ForeignKey('users.user_id'), primary_key=True)
4191 local_user_id = Column('local_user_id', Integer(), ForeignKey('users.user_id'), primary_key=True)
4192 provider_name = Column('provider_name', Unicode(255), default=u'', primary_key=True)
4192 provider_name = Column('provider_name', Unicode(255), default=u'', primary_key=True)
4193 access_token = Column('access_token', String(1024), default=u'')
4193 access_token = Column('access_token', String(1024), default=u'')
4194 alt_token = Column('alt_token', String(1024), default=u'')
4194 alt_token = Column('alt_token', String(1024), default=u'')
4195 token_secret = Column('token_secret', String(1024), default=u'')
4195 token_secret = Column('token_secret', String(1024), default=u'')
4196
4196
4197 @classmethod
4197 @classmethod
4198 def by_external_id_and_provider(cls, external_id, provider_name, local_user_id=None):
4198 def by_external_id_and_provider(cls, external_id, provider_name, local_user_id=None):
4199 """
4199 """
4200 Returns ExternalIdentity instance based on search params
4200 Returns ExternalIdentity instance based on search params
4201
4201
4202 :param external_id:
4202 :param external_id:
4203 :param provider_name:
4203 :param provider_name:
4204 :return: ExternalIdentity
4204 :return: ExternalIdentity
4205 """
4205 """
4206 query = cls.query()
4206 query = cls.query()
4207 query = query.filter(cls.external_id == external_id)
4207 query = query.filter(cls.external_id == external_id)
4208 query = query.filter(cls.provider_name == provider_name)
4208 query = query.filter(cls.provider_name == provider_name)
4209 if local_user_id:
4209 if local_user_id:
4210 query = query.filter(cls.local_user_id == local_user_id)
4210 query = query.filter(cls.local_user_id == local_user_id)
4211 return query.first()
4211 return query.first()
4212
4212
4213 @classmethod
4213 @classmethod
4214 def user_by_external_id_and_provider(cls, external_id, provider_name):
4214 def user_by_external_id_and_provider(cls, external_id, provider_name):
4215 """
4215 """
4216 Returns User instance based on search params
4216 Returns User instance based on search params
4217
4217
4218 :param external_id:
4218 :param external_id:
4219 :param provider_name:
4219 :param provider_name:
4220 :return: User
4220 :return: User
4221 """
4221 """
4222 query = User.query()
4222 query = User.query()
4223 query = query.filter(cls.external_id == external_id)
4223 query = query.filter(cls.external_id == external_id)
4224 query = query.filter(cls.provider_name == provider_name)
4224 query = query.filter(cls.provider_name == provider_name)
4225 query = query.filter(User.user_id == cls.local_user_id)
4225 query = query.filter(User.user_id == cls.local_user_id)
4226 return query.first()
4226 return query.first()
4227
4227
4228 @classmethod
4228 @classmethod
4229 def by_local_user_id(cls, local_user_id):
4229 def by_local_user_id(cls, local_user_id):
4230 """
4230 """
4231 Returns all tokens for user
4231 Returns all tokens for user
4232
4232
4233 :param local_user_id:
4233 :param local_user_id:
4234 :return: ExternalIdentity
4234 :return: ExternalIdentity
4235 """
4235 """
4236 query = cls.query()
4236 query = cls.query()
4237 query = query.filter(cls.local_user_id == local_user_id)
4237 query = query.filter(cls.local_user_id == local_user_id)
4238 return query
4238 return query
4239
4239
4240 @classmethod
4240 @classmethod
4241 def load_provider_plugin(cls, plugin_id):
4241 def load_provider_plugin(cls, plugin_id):
4242 from rhodecode.authentication.base import loadplugin
4242 from rhodecode.authentication.base import loadplugin
4243 _plugin_id = 'egg:rhodecode-enterprise-ee#{}'.format(plugin_id)
4243 _plugin_id = 'egg:rhodecode-enterprise-ee#{}'.format(plugin_id)
4244 auth_plugin = loadplugin(_plugin_id)
4244 auth_plugin = loadplugin(_plugin_id)
4245 return auth_plugin
4245 return auth_plugin
4246
4246
4247
4247
4248 class Integration(Base, BaseModel):
4248 class Integration(Base, BaseModel):
4249 __tablename__ = 'integrations'
4249 __tablename__ = 'integrations'
4250 __table_args__ = (
4250 __table_args__ = (
4251 base_table_args
4251 base_table_args
4252 )
4252 )
4253
4253
4254 integration_id = Column('integration_id', Integer(), primary_key=True)
4254 integration_id = Column('integration_id', Integer(), primary_key=True)
4255 integration_type = Column('integration_type', String(255))
4255 integration_type = Column('integration_type', String(255))
4256 enabled = Column('enabled', Boolean(), nullable=False)
4256 enabled = Column('enabled', Boolean(), nullable=False)
4257 name = Column('name', String(255), nullable=False)
4257 name = Column('name', String(255), nullable=False)
4258 child_repos_only = Column('child_repos_only', Boolean(), nullable=False,
4258 child_repos_only = Column('child_repos_only', Boolean(), nullable=False,
4259 default=False)
4259 default=False)
4260
4260
4261 settings = Column(
4261 settings = Column(
4262 'settings_json', MutationObj.as_mutable(
4262 'settings_json', MutationObj.as_mutable(
4263 JsonType(dialect_map=dict(mysql=UnicodeText(16384)))))
4263 JsonType(dialect_map=dict(mysql=UnicodeText(16384)))))
4264 repo_id = Column(
4264 repo_id = Column(
4265 'repo_id', Integer(), ForeignKey('repositories.repo_id'),
4265 'repo_id', Integer(), ForeignKey('repositories.repo_id'),
4266 nullable=True, unique=None, default=None)
4266 nullable=True, unique=None, default=None)
4267 repo = relationship('Repository', lazy='joined')
4267 repo = relationship('Repository', lazy='joined')
4268
4268
4269 repo_group_id = Column(
4269 repo_group_id = Column(
4270 'repo_group_id', Integer(), ForeignKey('groups.group_id'),
4270 'repo_group_id', Integer(), ForeignKey('groups.group_id'),
4271 nullable=True, unique=None, default=None)
4271 nullable=True, unique=None, default=None)
4272 repo_group = relationship('RepoGroup', lazy='joined')
4272 repo_group = relationship('RepoGroup', lazy='joined')
4273
4273
4274 @property
4274 @property
4275 def scope(self):
4275 def scope(self):
4276 if self.repo:
4276 if self.repo:
4277 return repr(self.repo)
4277 return repr(self.repo)
4278 if self.repo_group:
4278 if self.repo_group:
4279 if self.child_repos_only:
4279 if self.child_repos_only:
4280 return repr(self.repo_group) + ' (child repos only)'
4280 return repr(self.repo_group) + ' (child repos only)'
4281 else:
4281 else:
4282 return repr(self.repo_group) + ' (recursive)'
4282 return repr(self.repo_group) + ' (recursive)'
4283 if self.child_repos_only:
4283 if self.child_repos_only:
4284 return 'root_repos'
4284 return 'root_repos'
4285 return 'global'
4285 return 'global'
4286
4286
4287 def __repr__(self):
4287 def __repr__(self):
4288 return '<Integration(%r, %r)>' % (self.integration_type, self.scope)
4288 return '<Integration(%r, %r)>' % (self.integration_type, self.scope)
4289
4289
4290
4290
4291 class RepoReviewRuleUser(Base, BaseModel):
4291 class RepoReviewRuleUser(Base, BaseModel):
4292 __tablename__ = 'repo_review_rules_users'
4292 __tablename__ = 'repo_review_rules_users'
4293 __table_args__ = (
4293 __table_args__ = (
4294 base_table_args
4294 base_table_args
4295 )
4295 )
4296
4296
4297 repo_review_rule_user_id = Column('repo_review_rule_user_id', Integer(), primary_key=True)
4297 repo_review_rule_user_id = Column('repo_review_rule_user_id', Integer(), primary_key=True)
4298 repo_review_rule_id = Column("repo_review_rule_id", Integer(), ForeignKey('repo_review_rules.repo_review_rule_id'))
4298 repo_review_rule_id = Column("repo_review_rule_id", Integer(), ForeignKey('repo_review_rules.repo_review_rule_id'))
4299 user_id = Column("user_id", Integer(), ForeignKey('users.user_id'), nullable=False)
4299 user_id = Column("user_id", Integer(), ForeignKey('users.user_id'), nullable=False)
4300 mandatory = Column("mandatory", Boolean(), nullable=False, default=False)
4300 mandatory = Column("mandatory", Boolean(), nullable=False, default=False)
4301 user = relationship('User')
4301 user = relationship('User')
4302
4302
4303 def rule_data(self):
4303 def rule_data(self):
4304 return {
4304 return {
4305 'mandatory': self.mandatory
4305 'mandatory': self.mandatory
4306 }
4306 }
4307
4307
4308
4308
4309 class RepoReviewRuleUserGroup(Base, BaseModel):
4309 class RepoReviewRuleUserGroup(Base, BaseModel):
4310 __tablename__ = 'repo_review_rules_users_groups'
4310 __tablename__ = 'repo_review_rules_users_groups'
4311 __table_args__ = (
4311 __table_args__ = (
4312 base_table_args
4312 base_table_args
4313 )
4313 )
4314
4314
4315 VOTE_RULE_ALL = -1
4315 VOTE_RULE_ALL = -1
4316
4316
4317 repo_review_rule_users_group_id = Column('repo_review_rule_users_group_id', Integer(), primary_key=True)
4317 repo_review_rule_users_group_id = Column('repo_review_rule_users_group_id', Integer(), primary_key=True)
4318 repo_review_rule_id = Column("repo_review_rule_id", Integer(), ForeignKey('repo_review_rules.repo_review_rule_id'))
4318 repo_review_rule_id = Column("repo_review_rule_id", Integer(), ForeignKey('repo_review_rules.repo_review_rule_id'))
4319 users_group_id = Column("users_group_id", Integer(),ForeignKey('users_groups.users_group_id'), nullable=False)
4319 users_group_id = Column("users_group_id", Integer(),ForeignKey('users_groups.users_group_id'), nullable=False)
4320 mandatory = Column("mandatory", Boolean(), nullable=False, default=False)
4320 mandatory = Column("mandatory", Boolean(), nullable=False, default=False)
4321 vote_rule = Column("vote_rule", Integer(), nullable=True, default=VOTE_RULE_ALL)
4321 vote_rule = Column("vote_rule", Integer(), nullable=True, default=VOTE_RULE_ALL)
4322 users_group = relationship('UserGroup')
4322 users_group = relationship('UserGroup')
4323
4323
4324 def rule_data(self):
4324 def rule_data(self):
4325 return {
4325 return {
4326 'mandatory': self.mandatory,
4326 'mandatory': self.mandatory,
4327 'vote_rule': self.vote_rule
4327 'vote_rule': self.vote_rule
4328 }
4328 }
4329
4329
4330 @property
4330 @property
4331 def vote_rule_label(self):
4331 def vote_rule_label(self):
4332 if not self.vote_rule or self.vote_rule == self.VOTE_RULE_ALL:
4332 if not self.vote_rule or self.vote_rule == self.VOTE_RULE_ALL:
4333 return 'all must vote'
4333 return 'all must vote'
4334 else:
4334 else:
4335 return 'min. vote {}'.format(self.vote_rule)
4335 return 'min. vote {}'.format(self.vote_rule)
4336
4336
4337
4337
4338 class RepoReviewRule(Base, BaseModel):
4338 class RepoReviewRule(Base, BaseModel):
4339 __tablename__ = 'repo_review_rules'
4339 __tablename__ = 'repo_review_rules'
4340 __table_args__ = (
4340 __table_args__ = (
4341 base_table_args
4341 base_table_args
4342 )
4342 )
4343
4343
4344 repo_review_rule_id = Column(
4344 repo_review_rule_id = Column(
4345 'repo_review_rule_id', Integer(), primary_key=True)
4345 'repo_review_rule_id', Integer(), primary_key=True)
4346 repo_id = Column(
4346 repo_id = Column(
4347 "repo_id", Integer(), ForeignKey('repositories.repo_id'))
4347 "repo_id", Integer(), ForeignKey('repositories.repo_id'))
4348 repo = relationship('Repository', backref='review_rules')
4348 repo = relationship('Repository', backref='review_rules')
4349
4349
4350 review_rule_name = Column('review_rule_name', String(255))
4350 review_rule_name = Column('review_rule_name', String(255))
4351 _branch_pattern = Column("branch_pattern", UnicodeText().with_variant(UnicodeText(255), 'mysql'), default=u'*') # glob
4351 _branch_pattern = Column("branch_pattern", UnicodeText().with_variant(UnicodeText(255), 'mysql'), default=u'*') # glob
4352 _target_branch_pattern = Column("target_branch_pattern", UnicodeText().with_variant(UnicodeText(255), 'mysql'), default=u'*') # glob
4352 _target_branch_pattern = Column("target_branch_pattern", UnicodeText().with_variant(UnicodeText(255), 'mysql'), default=u'*') # glob
4353 _file_pattern = Column("file_pattern", UnicodeText().with_variant(UnicodeText(255), 'mysql'), default=u'*') # glob
4353 _file_pattern = Column("file_pattern", UnicodeText().with_variant(UnicodeText(255), 'mysql'), default=u'*') # glob
4354
4354
4355 use_authors_for_review = Column("use_authors_for_review", Boolean(), nullable=False, default=False)
4355 use_authors_for_review = Column("use_authors_for_review", Boolean(), nullable=False, default=False)
4356 forbid_author_to_review = Column("forbid_author_to_review", Boolean(), nullable=False, default=False)
4356 forbid_author_to_review = Column("forbid_author_to_review", Boolean(), nullable=False, default=False)
4357 forbid_commit_author_to_review = Column("forbid_commit_author_to_review", Boolean(), nullable=False, default=False)
4357 forbid_commit_author_to_review = Column("forbid_commit_author_to_review", Boolean(), nullable=False, default=False)
4358 forbid_adding_reviewers = Column("forbid_adding_reviewers", Boolean(), nullable=False, default=False)
4358 forbid_adding_reviewers = Column("forbid_adding_reviewers", Boolean(), nullable=False, default=False)
4359
4359
4360 rule_users = relationship('RepoReviewRuleUser')
4360 rule_users = relationship('RepoReviewRuleUser')
4361 rule_user_groups = relationship('RepoReviewRuleUserGroup')
4361 rule_user_groups = relationship('RepoReviewRuleUserGroup')
4362
4362
4363 def _validate_pattern(self, value):
4363 def _validate_pattern(self, value):
4364 re.compile('^' + glob2re(value) + '$')
4364 re.compile('^' + glob2re(value) + '$')
4365
4365
4366 @hybrid_property
4366 @hybrid_property
4367 def source_branch_pattern(self):
4367 def source_branch_pattern(self):
4368 return self._branch_pattern or '*'
4368 return self._branch_pattern or '*'
4369
4369
4370 @source_branch_pattern.setter
4370 @source_branch_pattern.setter
4371 def source_branch_pattern(self, value):
4371 def source_branch_pattern(self, value):
4372 self._validate_pattern(value)
4372 self._validate_pattern(value)
4373 self._branch_pattern = value or '*'
4373 self._branch_pattern = value or '*'
4374
4374
4375 @hybrid_property
4375 @hybrid_property
4376 def target_branch_pattern(self):
4376 def target_branch_pattern(self):
4377 return self._target_branch_pattern or '*'
4377 return self._target_branch_pattern or '*'
4378
4378
4379 @target_branch_pattern.setter
4379 @target_branch_pattern.setter
4380 def target_branch_pattern(self, value):
4380 def target_branch_pattern(self, value):
4381 self._validate_pattern(value)
4381 self._validate_pattern(value)
4382 self._target_branch_pattern = value or '*'
4382 self._target_branch_pattern = value or '*'
4383
4383
4384 @hybrid_property
4384 @hybrid_property
4385 def file_pattern(self):
4385 def file_pattern(self):
4386 return self._file_pattern or '*'
4386 return self._file_pattern or '*'
4387
4387
4388 @file_pattern.setter
4388 @file_pattern.setter
4389 def file_pattern(self, value):
4389 def file_pattern(self, value):
4390 self._validate_pattern(value)
4390 self._validate_pattern(value)
4391 self._file_pattern = value or '*'
4391 self._file_pattern = value or '*'
4392
4392
4393 def matches(self, source_branch, target_branch, files_changed):
4393 def matches(self, source_branch, target_branch, files_changed):
4394 """
4394 """
4395 Check if this review rule matches a branch/files in a pull request
4395 Check if this review rule matches a branch/files in a pull request
4396
4396
4397 :param source_branch: source branch name for the commit
4397 :param source_branch: source branch name for the commit
4398 :param target_branch: target branch name for the commit
4398 :param target_branch: target branch name for the commit
4399 :param files_changed: list of file paths changed in the pull request
4399 :param files_changed: list of file paths changed in the pull request
4400 """
4400 """
4401
4401
4402 source_branch = source_branch or ''
4402 source_branch = source_branch or ''
4403 target_branch = target_branch or ''
4403 target_branch = target_branch or ''
4404 files_changed = files_changed or []
4404 files_changed = files_changed or []
4405
4405
4406 branch_matches = True
4406 branch_matches = True
4407 if source_branch or target_branch:
4407 if source_branch or target_branch:
4408 if self.source_branch_pattern == '*':
4408 if self.source_branch_pattern == '*':
4409 source_branch_match = True
4409 source_branch_match = True
4410 else:
4410 else:
4411 if self.source_branch_pattern.startswith('re:'):
4411 if self.source_branch_pattern.startswith('re:'):
4412 source_pattern = self.source_branch_pattern[3:]
4412 source_pattern = self.source_branch_pattern[3:]
4413 else:
4413 else:
4414 source_pattern = '^' + glob2re(self.source_branch_pattern) + '$'
4414 source_pattern = '^' + glob2re(self.source_branch_pattern) + '$'
4415 source_branch_regex = re.compile(source_pattern)
4415 source_branch_regex = re.compile(source_pattern)
4416 source_branch_match = bool(source_branch_regex.search(source_branch))
4416 source_branch_match = bool(source_branch_regex.search(source_branch))
4417 if self.target_branch_pattern == '*':
4417 if self.target_branch_pattern == '*':
4418 target_branch_match = True
4418 target_branch_match = True
4419 else:
4419 else:
4420 if self.target_branch_pattern.startswith('re:'):
4420 if self.target_branch_pattern.startswith('re:'):
4421 target_pattern = self.target_branch_pattern[3:]
4421 target_pattern = self.target_branch_pattern[3:]
4422 else:
4422 else:
4423 target_pattern = '^' + glob2re(self.target_branch_pattern) + '$'
4423 target_pattern = '^' + glob2re(self.target_branch_pattern) + '$'
4424 target_branch_regex = re.compile(target_pattern)
4424 target_branch_regex = re.compile(target_pattern)
4425 target_branch_match = bool(target_branch_regex.search(target_branch))
4425 target_branch_match = bool(target_branch_regex.search(target_branch))
4426
4426
4427 branch_matches = source_branch_match and target_branch_match
4427 branch_matches = source_branch_match and target_branch_match
4428
4428
4429 files_matches = True
4429 files_matches = True
4430 if self.file_pattern != '*':
4430 if self.file_pattern != '*':
4431 files_matches = False
4431 files_matches = False
4432 if self.file_pattern.startswith('re:'):
4432 if self.file_pattern.startswith('re:'):
4433 file_pattern = self.file_pattern[3:]
4433 file_pattern = self.file_pattern[3:]
4434 else:
4434 else:
4435 file_pattern = glob2re(self.file_pattern)
4435 file_pattern = glob2re(self.file_pattern)
4436 file_regex = re.compile(file_pattern)
4436 file_regex = re.compile(file_pattern)
4437 for filename in files_changed:
4437 for filename in files_changed:
4438 if file_regex.search(filename):
4438 if file_regex.search(filename):
4439 files_matches = True
4439 files_matches = True
4440 break
4440 break
4441
4441
4442 return branch_matches and files_matches
4442 return branch_matches and files_matches
4443
4443
4444 @property
4444 @property
4445 def review_users(self):
4445 def review_users(self):
4446 """ Returns the users which this rule applies to """
4446 """ Returns the users which this rule applies to """
4447
4447
4448 users = collections.OrderedDict()
4448 users = collections.OrderedDict()
4449
4449
4450 for rule_user in self.rule_users:
4450 for rule_user in self.rule_users:
4451 if rule_user.user.active:
4451 if rule_user.user.active:
4452 if rule_user.user not in users:
4452 if rule_user.user not in users:
4453 users[rule_user.user.username] = {
4453 users[rule_user.user.username] = {
4454 'user': rule_user.user,
4454 'user': rule_user.user,
4455 'source': 'user',
4455 'source': 'user',
4456 'source_data': {},
4456 'source_data': {},
4457 'data': rule_user.rule_data()
4457 'data': rule_user.rule_data()
4458 }
4458 }
4459
4459
4460 for rule_user_group in self.rule_user_groups:
4460 for rule_user_group in self.rule_user_groups:
4461 source_data = {
4461 source_data = {
4462 'user_group_id': rule_user_group.users_group.users_group_id,
4462 'user_group_id': rule_user_group.users_group.users_group_id,
4463 'name': rule_user_group.users_group.users_group_name,
4463 'name': rule_user_group.users_group.users_group_name,
4464 'members': len(rule_user_group.users_group.members)
4464 'members': len(rule_user_group.users_group.members)
4465 }
4465 }
4466 for member in rule_user_group.users_group.members:
4466 for member in rule_user_group.users_group.members:
4467 if member.user.active:
4467 if member.user.active:
4468 key = member.user.username
4468 key = member.user.username
4469 if key in users:
4469 if key in users:
4470 # skip this member as we have him already
4470 # skip this member as we have him already
4471 # this prevents from override the "first" matched
4471 # this prevents from override the "first" matched
4472 # users with duplicates in multiple groups
4472 # users with duplicates in multiple groups
4473 continue
4473 continue
4474
4474
4475 users[key] = {
4475 users[key] = {
4476 'user': member.user,
4476 'user': member.user,
4477 'source': 'user_group',
4477 'source': 'user_group',
4478 'source_data': source_data,
4478 'source_data': source_data,
4479 'data': rule_user_group.rule_data()
4479 'data': rule_user_group.rule_data()
4480 }
4480 }
4481
4481
4482 return users
4482 return users
4483
4483
4484 def user_group_vote_rule(self, user_id):
4484 def user_group_vote_rule(self, user_id):
4485
4485
4486 rules = []
4486 rules = []
4487 if not self.rule_user_groups:
4487 if not self.rule_user_groups:
4488 return rules
4488 return rules
4489
4489
4490 for user_group in self.rule_user_groups:
4490 for user_group in self.rule_user_groups:
4491 user_group_members = [x.user_id for x in user_group.users_group.members]
4491 user_group_members = [x.user_id for x in user_group.users_group.members]
4492 if user_id in user_group_members:
4492 if user_id in user_group_members:
4493 rules.append(user_group)
4493 rules.append(user_group)
4494 return rules
4494 return rules
4495
4495
4496 def __repr__(self):
4496 def __repr__(self):
4497 return '<RepoReviewerRule(id=%r, repo=%r)>' % (
4497 return '<RepoReviewerRule(id=%r, repo=%r)>' % (
4498 self.repo_review_rule_id, self.repo)
4498 self.repo_review_rule_id, self.repo)
4499
4499
4500
4500
4501 class ScheduleEntry(Base, BaseModel):
4501 class ScheduleEntry(Base, BaseModel):
4502 __tablename__ = 'schedule_entries'
4502 __tablename__ = 'schedule_entries'
4503 __table_args__ = (
4503 __table_args__ = (
4504 UniqueConstraint('schedule_name', name='s_schedule_name_idx'),
4504 UniqueConstraint('schedule_name', name='s_schedule_name_idx'),
4505 UniqueConstraint('task_uid', name='s_task_uid_idx'),
4505 UniqueConstraint('task_uid', name='s_task_uid_idx'),
4506 base_table_args,
4506 base_table_args,
4507 )
4507 )
4508
4508
4509 schedule_types = ['crontab', 'timedelta', 'integer']
4509 schedule_types = ['crontab', 'timedelta', 'integer']
4510 schedule_entry_id = Column('schedule_entry_id', Integer(), primary_key=True)
4510 schedule_entry_id = Column('schedule_entry_id', Integer(), primary_key=True)
4511
4511
4512 schedule_name = Column("schedule_name", String(255), nullable=False, unique=None, default=None)
4512 schedule_name = Column("schedule_name", String(255), nullable=False, unique=None, default=None)
4513 schedule_description = Column("schedule_description", String(10000), nullable=True, unique=None, default=None)
4513 schedule_description = Column("schedule_description", String(10000), nullable=True, unique=None, default=None)
4514 schedule_enabled = Column("schedule_enabled", Boolean(), nullable=False, unique=None, default=True)
4514 schedule_enabled = Column("schedule_enabled", Boolean(), nullable=False, unique=None, default=True)
4515
4515
4516 _schedule_type = Column("schedule_type", String(255), nullable=False, unique=None, default=None)
4516 _schedule_type = Column("schedule_type", String(255), nullable=False, unique=None, default=None)
4517 schedule_definition = Column('schedule_definition_json', MutationObj.as_mutable(JsonType(default=lambda: "", dialect_map=dict(mysql=LONGTEXT()))))
4517 schedule_definition = Column('schedule_definition_json', MutationObj.as_mutable(JsonType(default=lambda: "", dialect_map=dict(mysql=LONGTEXT()))))
4518
4518
4519 schedule_last_run = Column('schedule_last_run', DateTime(timezone=False), nullable=True, unique=None, default=None)
4519 schedule_last_run = Column('schedule_last_run', DateTime(timezone=False), nullable=True, unique=None, default=None)
4520 schedule_total_run_count = Column('schedule_total_run_count', Integer(), nullable=True, unique=None, default=0)
4520 schedule_total_run_count = Column('schedule_total_run_count', Integer(), nullable=True, unique=None, default=0)
4521
4521
4522 # task
4522 # task
4523 task_uid = Column("task_uid", String(255), nullable=False, unique=None, default=None)
4523 task_uid = Column("task_uid", String(255), nullable=False, unique=None, default=None)
4524 task_dot_notation = Column("task_dot_notation", String(4096), nullable=False, unique=None, default=None)
4524 task_dot_notation = Column("task_dot_notation", String(4096), nullable=False, unique=None, default=None)
4525 task_args = Column('task_args_json', MutationObj.as_mutable(JsonType(default=list, dialect_map=dict(mysql=LONGTEXT()))))
4525 task_args = Column('task_args_json', MutationObj.as_mutable(JsonType(default=list, dialect_map=dict(mysql=LONGTEXT()))))
4526 task_kwargs = Column('task_kwargs_json', MutationObj.as_mutable(JsonType(default=dict, dialect_map=dict(mysql=LONGTEXT()))))
4526 task_kwargs = Column('task_kwargs_json', MutationObj.as_mutable(JsonType(default=dict, dialect_map=dict(mysql=LONGTEXT()))))
4527
4527
4528 created_on = Column('created_on', DateTime(timezone=False), nullable=False, default=datetime.datetime.now)
4528 created_on = Column('created_on', DateTime(timezone=False), nullable=False, default=datetime.datetime.now)
4529 updated_on = Column('updated_on', DateTime(timezone=False), nullable=True, unique=None, default=None)
4529 updated_on = Column('updated_on', DateTime(timezone=False), nullable=True, unique=None, default=None)
4530
4530
4531 @hybrid_property
4531 @hybrid_property
4532 def schedule_type(self):
4532 def schedule_type(self):
4533 return self._schedule_type
4533 return self._schedule_type
4534
4534
4535 @schedule_type.setter
4535 @schedule_type.setter
4536 def schedule_type(self, val):
4536 def schedule_type(self, val):
4537 if val not in self.schedule_types:
4537 if val not in self.schedule_types:
4538 raise ValueError('Value must be on of `{}` and got `{}`'.format(
4538 raise ValueError('Value must be on of `{}` and got `{}`'.format(
4539 val, self.schedule_type))
4539 val, self.schedule_type))
4540
4540
4541 self._schedule_type = val
4541 self._schedule_type = val
4542
4542
4543 @classmethod
4543 @classmethod
4544 def get_uid(cls, obj):
4544 def get_uid(cls, obj):
4545 args = obj.task_args
4545 args = obj.task_args
4546 kwargs = obj.task_kwargs
4546 kwargs = obj.task_kwargs
4547 if isinstance(args, JsonRaw):
4547 if isinstance(args, JsonRaw):
4548 try:
4548 try:
4549 args = json.loads(args)
4549 args = json.loads(args)
4550 except ValueError:
4550 except ValueError:
4551 args = tuple()
4551 args = tuple()
4552
4552
4553 if isinstance(kwargs, JsonRaw):
4553 if isinstance(kwargs, JsonRaw):
4554 try:
4554 try:
4555 kwargs = json.loads(kwargs)
4555 kwargs = json.loads(kwargs)
4556 except ValueError:
4556 except ValueError:
4557 kwargs = dict()
4557 kwargs = dict()
4558
4558
4559 dot_notation = obj.task_dot_notation
4559 dot_notation = obj.task_dot_notation
4560 val = '.'.join(map(safe_str, [
4560 val = '.'.join(map(safe_str, [
4561 sorted(dot_notation), args, sorted(kwargs.items())]))
4561 sorted(dot_notation), args, sorted(kwargs.items())]))
4562 return hashlib.sha1(val).hexdigest()
4562 return hashlib.sha1(val).hexdigest()
4563
4563
4564 @classmethod
4564 @classmethod
4565 def get_by_schedule_name(cls, schedule_name):
4565 def get_by_schedule_name(cls, schedule_name):
4566 return cls.query().filter(cls.schedule_name == schedule_name).scalar()
4566 return cls.query().filter(cls.schedule_name == schedule_name).scalar()
4567
4567
4568 @classmethod
4568 @classmethod
4569 def get_by_schedule_id(cls, schedule_id):
4569 def get_by_schedule_id(cls, schedule_id):
4570 return cls.query().filter(cls.schedule_entry_id == schedule_id).scalar()
4570 return cls.query().filter(cls.schedule_entry_id == schedule_id).scalar()
4571
4571
4572 @property
4572 @property
4573 def task(self):
4573 def task(self):
4574 return self.task_dot_notation
4574 return self.task_dot_notation
4575
4575
4576 @property
4576 @property
4577 def schedule(self):
4577 def schedule(self):
4578 from rhodecode.lib.celerylib.utils import raw_2_schedule
4578 from rhodecode.lib.celerylib.utils import raw_2_schedule
4579 schedule = raw_2_schedule(self.schedule_definition, self.schedule_type)
4579 schedule = raw_2_schedule(self.schedule_definition, self.schedule_type)
4580 return schedule
4580 return schedule
4581
4581
4582 @property
4582 @property
4583 def args(self):
4583 def args(self):
4584 try:
4584 try:
4585 return list(self.task_args or [])
4585 return list(self.task_args or [])
4586 except ValueError:
4586 except ValueError:
4587 return list()
4587 return list()
4588
4588
4589 @property
4589 @property
4590 def kwargs(self):
4590 def kwargs(self):
4591 try:
4591 try:
4592 return dict(self.task_kwargs or {})
4592 return dict(self.task_kwargs or {})
4593 except ValueError:
4593 except ValueError:
4594 return dict()
4594 return dict()
4595
4595
4596 def _as_raw(self, val):
4596 def _as_raw(self, val):
4597 if hasattr(val, 'de_coerce'):
4597 if hasattr(val, 'de_coerce'):
4598 val = val.de_coerce()
4598 val = val.de_coerce()
4599 if val:
4599 if val:
4600 val = json.dumps(val)
4600 val = json.dumps(val)
4601
4601
4602 return val
4602 return val
4603
4603
4604 @property
4604 @property
4605 def schedule_definition_raw(self):
4605 def schedule_definition_raw(self):
4606 return self._as_raw(self.schedule_definition)
4606 return self._as_raw(self.schedule_definition)
4607
4607
4608 @property
4608 @property
4609 def args_raw(self):
4609 def args_raw(self):
4610 return self._as_raw(self.task_args)
4610 return self._as_raw(self.task_args)
4611
4611
4612 @property
4612 @property
4613 def kwargs_raw(self):
4613 def kwargs_raw(self):
4614 return self._as_raw(self.task_kwargs)
4614 return self._as_raw(self.task_kwargs)
4615
4615
4616 def __repr__(self):
4616 def __repr__(self):
4617 return '<DB:ScheduleEntry({}:{})>'.format(
4617 return '<DB:ScheduleEntry({}:{})>'.format(
4618 self.schedule_entry_id, self.schedule_name)
4618 self.schedule_entry_id, self.schedule_name)
4619
4619
4620
4620
4621 @event.listens_for(ScheduleEntry, 'before_update')
4621 @event.listens_for(ScheduleEntry, 'before_update')
4622 def update_task_uid(mapper, connection, target):
4622 def update_task_uid(mapper, connection, target):
4623 target.task_uid = ScheduleEntry.get_uid(target)
4623 target.task_uid = ScheduleEntry.get_uid(target)
4624
4624
4625
4625
4626 @event.listens_for(ScheduleEntry, 'before_insert')
4626 @event.listens_for(ScheduleEntry, 'before_insert')
4627 def set_task_uid(mapper, connection, target):
4627 def set_task_uid(mapper, connection, target):
4628 target.task_uid = ScheduleEntry.get_uid(target)
4628 target.task_uid = ScheduleEntry.get_uid(target)
4629
4629
4630
4630
4631 class _BaseBranchPerms(BaseModel):
4631 class _BaseBranchPerms(BaseModel):
4632 @classmethod
4632 @classmethod
4633 def compute_hash(cls, value):
4633 def compute_hash(cls, value):
4634 return sha1_safe(value)
4634 return sha1_safe(value)
4635
4635
4636 @hybrid_property
4636 @hybrid_property
4637 def branch_pattern(self):
4637 def branch_pattern(self):
4638 return self._branch_pattern or '*'
4638 return self._branch_pattern or '*'
4639
4639
4640 @hybrid_property
4640 @hybrid_property
4641 def branch_hash(self):
4641 def branch_hash(self):
4642 return self._branch_hash
4642 return self._branch_hash
4643
4643
4644 def _validate_glob(self, value):
4644 def _validate_glob(self, value):
4645 re.compile('^' + glob2re(value) + '$')
4645 re.compile('^' + glob2re(value) + '$')
4646
4646
4647 @branch_pattern.setter
4647 @branch_pattern.setter
4648 def branch_pattern(self, value):
4648 def branch_pattern(self, value):
4649 self._validate_glob(value)
4649 self._validate_glob(value)
4650 self._branch_pattern = value or '*'
4650 self._branch_pattern = value or '*'
4651 # set the Hash when setting the branch pattern
4651 # set the Hash when setting the branch pattern
4652 self._branch_hash = self.compute_hash(self._branch_pattern)
4652 self._branch_hash = self.compute_hash(self._branch_pattern)
4653
4653
4654 def matches(self, branch):
4654 def matches(self, branch):
4655 """
4655 """
4656 Check if this the branch matches entry
4656 Check if this the branch matches entry
4657
4657
4658 :param branch: branch name for the commit
4658 :param branch: branch name for the commit
4659 """
4659 """
4660
4660
4661 branch = branch or ''
4661 branch = branch or ''
4662
4662
4663 branch_matches = True
4663 branch_matches = True
4664 if branch:
4664 if branch:
4665 branch_regex = re.compile('^' + glob2re(self.branch_pattern) + '$')
4665 branch_regex = re.compile('^' + glob2re(self.branch_pattern) + '$')
4666 branch_matches = bool(branch_regex.search(branch))
4666 branch_matches = bool(branch_regex.search(branch))
4667
4667
4668 return branch_matches
4668 return branch_matches
4669
4669
4670
4670
4671 class UserToRepoBranchPermission(Base, _BaseBranchPerms):
4671 class UserToRepoBranchPermission(Base, _BaseBranchPerms):
4672 __tablename__ = 'user_to_repo_branch_permissions'
4672 __tablename__ = 'user_to_repo_branch_permissions'
4673 __table_args__ = (
4673 __table_args__ = (
4674 {'extend_existing': True, 'mysql_engine': 'InnoDB',
4674 {'extend_existing': True, 'mysql_engine': 'InnoDB',
4675 'mysql_charset': 'utf8', 'sqlite_autoincrement': True,}
4675 'mysql_charset': 'utf8', 'sqlite_autoincrement': True,}
4676 )
4676 )
4677
4677
4678 branch_rule_id = Column('branch_rule_id', Integer(), primary_key=True)
4678 branch_rule_id = Column('branch_rule_id', Integer(), primary_key=True)
4679
4679
4680 repository_id = Column('repository_id', Integer(), ForeignKey('repositories.repo_id'), nullable=False, unique=None, default=None)
4680 repository_id = Column('repository_id', Integer(), ForeignKey('repositories.repo_id'), nullable=False, unique=None, default=None)
4681 repo = relationship('Repository', backref='user_branch_perms')
4681 repo = relationship('Repository', backref='user_branch_perms')
4682
4682
4683 permission_id = Column('permission_id', Integer(), ForeignKey('permissions.permission_id'), nullable=False, unique=None, default=None)
4683 permission_id = Column('permission_id', Integer(), ForeignKey('permissions.permission_id'), nullable=False, unique=None, default=None)
4684 permission = relationship('Permission')
4684 permission = relationship('Permission')
4685
4685
4686 rule_to_perm_id = Column('rule_to_perm_id', Integer(), ForeignKey('repo_to_perm.repo_to_perm_id'), nullable=False, unique=None, default=None)
4686 rule_to_perm_id = Column('rule_to_perm_id', Integer(), ForeignKey('repo_to_perm.repo_to_perm_id'), nullable=False, unique=None, default=None)
4687 user_repo_to_perm = relationship('UserRepoToPerm')
4687 user_repo_to_perm = relationship('UserRepoToPerm')
4688
4688
4689 rule_order = Column('rule_order', Integer(), nullable=False)
4689 rule_order = Column('rule_order', Integer(), nullable=False)
4690 _branch_pattern = Column('branch_pattern', UnicodeText().with_variant(UnicodeText(2048), 'mysql'), default=u'*') # glob
4690 _branch_pattern = Column('branch_pattern', UnicodeText().with_variant(UnicodeText(2048), 'mysql'), default=u'*') # glob
4691 _branch_hash = Column('branch_hash', UnicodeText().with_variant(UnicodeText(2048), 'mysql'))
4691 _branch_hash = Column('branch_hash', UnicodeText().with_variant(UnicodeText(2048), 'mysql'))
4692
4692
4693 def __unicode__(self):
4693 def __unicode__(self):
4694 return u'<UserBranchPermission(%s => %r)>' % (
4694 return u'<UserBranchPermission(%s => %r)>' % (
4695 self.user_repo_to_perm, self.branch_pattern)
4695 self.user_repo_to_perm, self.branch_pattern)
4696
4696
4697
4697
4698 class UserGroupToRepoBranchPermission(Base, _BaseBranchPerms):
4698 class UserGroupToRepoBranchPermission(Base, _BaseBranchPerms):
4699 __tablename__ = 'user_group_to_repo_branch_permissions'
4699 __tablename__ = 'user_group_to_repo_branch_permissions'
4700 __table_args__ = (
4700 __table_args__ = (
4701 {'extend_existing': True, 'mysql_engine': 'InnoDB',
4701 {'extend_existing': True, 'mysql_engine': 'InnoDB',
4702 'mysql_charset': 'utf8', 'sqlite_autoincrement': True,}
4702 'mysql_charset': 'utf8', 'sqlite_autoincrement': True,}
4703 )
4703 )
4704
4704
4705 branch_rule_id = Column('branch_rule_id', Integer(), primary_key=True)
4705 branch_rule_id = Column('branch_rule_id', Integer(), primary_key=True)
4706
4706
4707 repository_id = Column('repository_id', Integer(), ForeignKey('repositories.repo_id'), nullable=False, unique=None, default=None)
4707 repository_id = Column('repository_id', Integer(), ForeignKey('repositories.repo_id'), nullable=False, unique=None, default=None)
4708 repo = relationship('Repository', backref='user_group_branch_perms')
4708 repo = relationship('Repository', backref='user_group_branch_perms')
4709
4709
4710 permission_id = Column('permission_id', Integer(), ForeignKey('permissions.permission_id'), nullable=False, unique=None, default=None)
4710 permission_id = Column('permission_id', Integer(), ForeignKey('permissions.permission_id'), nullable=False, unique=None, default=None)
4711 permission = relationship('Permission')
4711 permission = relationship('Permission')
4712
4712
4713 rule_to_perm_id = Column('rule_to_perm_id', Integer(), ForeignKey('users_group_repo_to_perm.users_group_to_perm_id'), nullable=False, unique=None, default=None)
4713 rule_to_perm_id = Column('rule_to_perm_id', Integer(), ForeignKey('users_group_repo_to_perm.users_group_to_perm_id'), nullable=False, unique=None, default=None)
4714 user_group_repo_to_perm = relationship('UserGroupRepoToPerm')
4714 user_group_repo_to_perm = relationship('UserGroupRepoToPerm')
4715
4715
4716 rule_order = Column('rule_order', Integer(), nullable=False)
4716 rule_order = Column('rule_order', Integer(), nullable=False)
4717 _branch_pattern = Column('branch_pattern', UnicodeText().with_variant(UnicodeText(2048), 'mysql'), default=u'*') # glob
4717 _branch_pattern = Column('branch_pattern', UnicodeText().with_variant(UnicodeText(2048), 'mysql'), default=u'*') # glob
4718 _branch_hash = Column('branch_hash', UnicodeText().with_variant(UnicodeText(2048), 'mysql'))
4718 _branch_hash = Column('branch_hash', UnicodeText().with_variant(UnicodeText(2048), 'mysql'))
4719
4719
4720 def __unicode__(self):
4720 def __unicode__(self):
4721 return u'<UserBranchPermission(%s => %r)>' % (
4721 return u'<UserBranchPermission(%s => %r)>' % (
4722 self.user_group_repo_to_perm, self.branch_pattern)
4722 self.user_group_repo_to_perm, self.branch_pattern)
4723
4723
4724
4724
4725 class DbMigrateVersion(Base, BaseModel):
4725 class DbMigrateVersion(Base, BaseModel):
4726 __tablename__ = 'db_migrate_version'
4726 __tablename__ = 'db_migrate_version'
4727 __table_args__ = (
4727 __table_args__ = (
4728 base_table_args,
4728 base_table_args,
4729 )
4729 )
4730
4730
4731 repository_id = Column('repository_id', String(250), primary_key=True)
4731 repository_id = Column('repository_id', String(250), primary_key=True)
4732 repository_path = Column('repository_path', Text)
4732 repository_path = Column('repository_path', Text)
4733 version = Column('version', Integer)
4733 version = Column('version', Integer)
4734
4734
4735 @classmethod
4735 @classmethod
4736 def set_version(cls, version):
4736 def set_version(cls, version):
4737 """
4737 """
4738 Helper for forcing a different version, usually for debugging purposes via ishell.
4738 Helper for forcing a different version, usually for debugging purposes via ishell.
4739 """
4739 """
4740 ver = DbMigrateVersion.query().first()
4740 ver = DbMigrateVersion.query().first()
4741 ver.version = version
4741 ver.version = version
4742 Session().commit()
4742 Session().commit()
4743
4743
4744
4744
4745 class DbSession(Base, BaseModel):
4745 class DbSession(Base, BaseModel):
4746 __tablename__ = 'db_session'
4746 __tablename__ = 'db_session'
4747 __table_args__ = (
4747 __table_args__ = (
4748 base_table_args,
4748 base_table_args,
4749 )
4749 )
4750
4750
4751 def __repr__(self):
4751 def __repr__(self):
4752 return '<DB:DbSession({})>'.format(self.id)
4752 return '<DB:DbSession({})>'.format(self.id)
4753
4753
4754 id = Column('id', Integer())
4754 id = Column('id', Integer())
4755 namespace = Column('namespace', String(255), primary_key=True)
4755 namespace = Column('namespace', String(255), primary_key=True)
4756 accessed = Column('accessed', DateTime, nullable=False)
4756 accessed = Column('accessed', DateTime, nullable=False)
4757 created = Column('created', DateTime, nullable=False)
4757 created = Column('created', DateTime, nullable=False)
4758 data = Column('data', PickleType, nullable=False)
4758 data = Column('data', PickleType, nullable=False)
1 NO CONTENT: modified file
NO CONTENT: modified file
The requested commit or file is too big and content was truncated. Show full diff
1 NO CONTENT: modified file
NO CONTENT: modified file
The requested commit or file is too big and content was truncated. Show full diff
1 NO CONTENT: modified file
NO CONTENT: modified file
The requested commit or file is too big and content was truncated. Show full diff
1 NO CONTENT: modified file
NO CONTENT: modified file
The requested commit or file is too big and content was truncated. Show full diff
1 NO CONTENT: modified file
NO CONTENT: modified file
The requested commit or file is too big and content was truncated. Show full diff
1 NO CONTENT: modified file
NO CONTENT: modified file
The requested commit or file is too big and content was truncated. Show full diff
1 NO CONTENT: modified file
NO CONTENT: modified file
The requested commit or file is too big and content was truncated. Show full diff
1 NO CONTENT: modified file
NO CONTENT: modified file
The requested commit or file is too big and content was truncated. Show full diff
1 NO CONTENT: modified file
NO CONTENT: modified file
The requested commit or file is too big and content was truncated. Show full diff
1 NO CONTENT: modified file
NO CONTENT: modified file
The requested commit or file is too big and content was truncated. Show full diff
1 NO CONTENT: modified file
NO CONTENT: modified file
The requested commit or file is too big and content was truncated. Show full diff
1 NO CONTENT: modified file
NO CONTENT: modified file
The requested commit or file is too big and content was truncated. Show full diff
General Comments 0
You need to be logged in to leave comments. Login now