Show More
@@ -1,194 +1,189 b'' | |||
|
1 | 1 | # -*- coding: utf-8 -*- |
|
2 | 2 | |
|
3 | 3 | # Copyright (C) 2016-2019 RhodeCode GmbH |
|
4 | 4 | # |
|
5 | 5 | # This program is free software: you can redistribute it and/or modify |
|
6 | 6 | # it under the terms of the GNU Affero General Public License, version 3 |
|
7 | 7 | # (only), as published by the Free Software Foundation. |
|
8 | 8 | # |
|
9 | 9 | # This program is distributed in the hope that it will be useful, |
|
10 | 10 | # but WITHOUT ANY WARRANTY; without even the implied warranty of |
|
11 | 11 | # MERCHANTABILITY or FITNESS FOR A PARTICULAR PURPOSE. See the |
|
12 | 12 | # GNU General Public License for more details. |
|
13 | 13 | # |
|
14 | 14 | # You should have received a copy of the GNU Affero General Public License |
|
15 | 15 | # along with this program. If not, see <http://www.gnu.org/licenses/>. |
|
16 | 16 | # |
|
17 | 17 | # This program is dual-licensed. If you wish to learn more about the |
|
18 | 18 | # RhodeCode Enterprise Edition, including its added features, Support services, |
|
19 | 19 | # and proprietary license terms, please see https://rhodecode.com/licenses/ |
|
20 | 20 | |
|
21 | 21 | import logging |
|
22 | 22 | import formencode |
|
23 | 23 | import formencode.htmlfill |
|
24 | 24 | |
|
25 | 25 | from pyramid.httpexceptions import HTTPFound, HTTPForbidden |
|
26 | 26 | from pyramid.view import view_config |
|
27 | 27 | from pyramid.renderers import render |
|
28 | 28 | from pyramid.response import Response |
|
29 | 29 | |
|
30 | 30 | from rhodecode import events |
|
31 | 31 | from rhodecode.apps._base import BaseAppView, DataGridAppView |
|
32 | 32 | from rhodecode.lib.celerylib.utils import get_task_id |
|
33 | 33 | |
|
34 | 34 | from rhodecode.lib.ext_json import json |
|
35 | 35 | from rhodecode.lib.auth import ( |
|
36 | 36 | LoginRequired, CSRFRequired, NotAnonymous, |
|
37 | 37 | HasPermissionAny, HasRepoGroupPermissionAny) |
|
38 | 38 | from rhodecode.lib import helpers as h |
|
39 | 39 | from rhodecode.lib.utils import repo_name_slug |
|
40 | 40 | from rhodecode.lib.utils2 import safe_int, safe_unicode |
|
41 | 41 | from rhodecode.model.forms import RepoForm |
|
42 | 42 | from rhodecode.model.repo import RepoModel |
|
43 | 43 | from rhodecode.model.scm import RepoList, RepoGroupList, ScmModel |
|
44 | 44 | from rhodecode.model.settings import SettingsModel |
|
45 | 45 | from rhodecode.model.db import Repository, RepoGroup |
|
46 | 46 | |
|
47 | 47 | log = logging.getLogger(__name__) |
|
48 | 48 | |
|
49 | 49 | |
|
50 | 50 | class AdminReposView(BaseAppView, DataGridAppView): |
|
51 | 51 | |
|
52 | 52 | def load_default_context(self): |
|
53 | 53 | c = self._get_local_tmpl_context() |
|
54 | 54 | |
|
55 | 55 | return c |
|
56 | 56 | |
|
57 | 57 | def _load_form_data(self, c): |
|
58 | 58 | acl_groups = RepoGroupList(RepoGroup.query().all(), |
|
59 | 59 | perm_set=['group.write', 'group.admin']) |
|
60 | 60 | c.repo_groups = RepoGroup.groups_choices(groups=acl_groups) |
|
61 | 61 | c.repo_groups_choices = map(lambda k: safe_unicode(k[0]), c.repo_groups) |
|
62 | 62 | c.landing_revs_choices, c.landing_revs = \ |
|
63 | 63 | ScmModel().get_repo_landing_revs(self.request.translate) |
|
64 | 64 | c.personal_repo_group = self._rhodecode_user.personal_repo_group |
|
65 | 65 | |
|
66 | 66 | @LoginRequired() |
|
67 | 67 | @NotAnonymous() |
|
68 | 68 | # perms check inside |
|
69 | 69 | @view_config( |
|
70 | 70 | route_name='repos', request_method='GET', |
|
71 | 71 | renderer='rhodecode:templates/admin/repos/repos.mako') |
|
72 | 72 | def repository_list(self): |
|
73 | 73 | c = self.load_default_context() |
|
74 | 74 | |
|
75 | 75 | repo_list = Repository.get_all_repos() |
|
76 | 76 | c.repo_list = RepoList(repo_list, perm_set=['repository.admin']) |
|
77 | 77 | repos_data = RepoModel().get_repos_as_dict( |
|
78 | 78 | repo_list=c.repo_list, admin=True, super_user_actions=True) |
|
79 | 79 | # json used to render the grid |
|
80 | 80 | c.data = json.dumps(repos_data) |
|
81 | 81 | |
|
82 | 82 | return self._get_template_context(c) |
|
83 | 83 | |
|
84 | 84 | @LoginRequired() |
|
85 | 85 | @NotAnonymous() |
|
86 | 86 | # perms check inside |
|
87 | 87 | @view_config( |
|
88 | 88 | route_name='repo_new', request_method='GET', |
|
89 | 89 | renderer='rhodecode:templates/admin/repos/repo_add.mako') |
|
90 | 90 | def repository_new(self): |
|
91 | 91 | c = self.load_default_context() |
|
92 | 92 | |
|
93 | 93 | new_repo = self.request.GET.get('repo', '') |
|
94 | 94 | parent_group = safe_int(self.request.GET.get('parent_group')) |
|
95 | 95 | _gr = RepoGroup.get(parent_group) |
|
96 | 96 | |
|
97 | 97 | if not HasPermissionAny('hg.admin', 'hg.create.repository')(): |
|
98 | 98 | # you're not super admin nor have global create permissions, |
|
99 | 99 | # but maybe you have at least write permission to a parent group ? |
|
100 | 100 | |
|
101 | 101 | gr_name = _gr.group_name if _gr else None |
|
102 | 102 | # create repositories with write permission on group is set to true |
|
103 | 103 | create_on_write = HasPermissionAny('hg.create.write_on_repogroup.true')() |
|
104 | 104 | group_admin = HasRepoGroupPermissionAny('group.admin')(group_name=gr_name) |
|
105 | 105 | group_write = HasRepoGroupPermissionAny('group.write')(group_name=gr_name) |
|
106 | 106 | if not (group_admin or (group_write and create_on_write)): |
|
107 | 107 | raise HTTPForbidden() |
|
108 | 108 | |
|
109 | 109 | self._load_form_data(c) |
|
110 | 110 | c.new_repo = repo_name_slug(new_repo) |
|
111 | 111 | |
|
112 | 112 | # apply the defaults from defaults page |
|
113 | 113 | defaults = SettingsModel().get_default_repo_settings(strip_prefix=True) |
|
114 | 114 | # set checkbox to autochecked |
|
115 | 115 | defaults['repo_copy_permissions'] = True |
|
116 | 116 | |
|
117 | 117 | parent_group_choice = '-1' |
|
118 | 118 | if not self._rhodecode_user.is_admin and self._rhodecode_user.personal_repo_group: |
|
119 | 119 | parent_group_choice = self._rhodecode_user.personal_repo_group |
|
120 | 120 | |
|
121 | 121 | if parent_group and _gr: |
|
122 | 122 | if parent_group in [x[0] for x in c.repo_groups]: |
|
123 | 123 | parent_group_choice = safe_unicode(parent_group) |
|
124 | 124 | |
|
125 | 125 | defaults.update({'repo_group': parent_group_choice}) |
|
126 | 126 | |
|
127 | 127 | data = render('rhodecode:templates/admin/repos/repo_add.mako', |
|
128 | 128 | self._get_template_context(c), self.request) |
|
129 | 129 | html = formencode.htmlfill.render( |
|
130 | 130 | data, |
|
131 | 131 | defaults=defaults, |
|
132 | 132 | encoding="UTF-8", |
|
133 | 133 | force_defaults=False |
|
134 | 134 | ) |
|
135 | 135 | return Response(html) |
|
136 | 136 | |
|
137 | 137 | @LoginRequired() |
|
138 | 138 | @NotAnonymous() |
|
139 | 139 | @CSRFRequired() |
|
140 | 140 | # perms check inside |
|
141 | 141 | @view_config( |
|
142 | 142 | route_name='repo_create', request_method='POST', |
|
143 | 143 | renderer='rhodecode:templates/admin/repos/repos.mako') |
|
144 | 144 | def repository_create(self): |
|
145 | 145 | c = self.load_default_context() |
|
146 | 146 | |
|
147 | 147 | form_result = {} |
|
148 | 148 | self._load_form_data(c) |
|
149 | 149 | |
|
150 | 150 | try: |
|
151 | 151 | # CanWriteToGroup validators checks permissions of this POST |
|
152 | 152 | form = RepoForm( |
|
153 | 153 | self.request.translate, repo_groups=c.repo_groups_choices, |
|
154 | 154 | landing_revs=c.landing_revs_choices)() |
|
155 | 155 | form_result = form.to_python(dict(self.request.POST)) |
|
156 | 156 | copy_permissions = form_result.get('repo_copy_permissions') |
|
157 | 157 | # create is done sometimes async on celery, db transaction |
|
158 | 158 | # management is handled there. |
|
159 | 159 | task = RepoModel().create(form_result, self._rhodecode_user.user_id) |
|
160 | 160 | task_id = get_task_id(task) |
|
161 | 161 | except formencode.Invalid as errors: |
|
162 | 162 | data = render('rhodecode:templates/admin/repos/repo_add.mako', |
|
163 | 163 | self._get_template_context(c), self.request) |
|
164 | 164 | html = formencode.htmlfill.render( |
|
165 | 165 | data, |
|
166 | 166 | defaults=errors.value, |
|
167 | 167 | errors=errors.error_dict or {}, |
|
168 | 168 | prefix_error=False, |
|
169 | 169 | encoding="UTF-8", |
|
170 | 170 | force_defaults=False |
|
171 | 171 | ) |
|
172 | 172 | return Response(html) |
|
173 | 173 | |
|
174 | 174 | except Exception as e: |
|
175 | 175 | msg = self._log_creation_exception(e, form_result.get('repo_name')) |
|
176 | 176 | h.flash(msg, category='error') |
|
177 | 177 | raise HTTPFound(h.route_path('home')) |
|
178 | 178 | |
|
179 | 179 | repo_name = form_result.get('repo_name_full') |
|
180 | 180 | |
|
181 | 181 | affected_user_ids = [self._rhodecode_user.user_id] |
|
182 | 182 | if copy_permissions: |
|
183 | repository = Repository.get_by_repo_name(repo_name) | |
|
184 | # also include those newly created by copy | |
|
185 | user_group_perms = repository.permissions(expand_from_user_groups=True) | |
|
186 | copy_perms = [perm['user_id'] for perm in user_group_perms] | |
|
187 | # also include those newly created by copy | |
|
188 | affected_user_ids.extend(copy_perms) | |
|
189 | ||
|
183 | # permission flush is done in repo creating | |
|
184 | pass | |
|
190 | 185 | events.trigger(events.UserPermissionsChange(affected_user_ids)) |
|
191 | 186 | |
|
192 | 187 | raise HTTPFound( |
|
193 | 188 | h.route_path('repo_creating', repo_name=repo_name, |
|
194 | 189 | _query=dict(task_id=task_id))) |
@@ -1,114 +1,125 b'' | |||
|
1 | 1 | # -*- coding: utf-8 -*- |
|
2 | 2 | |
|
3 | 3 | # Copyright (C) 2011-2019 RhodeCode GmbH |
|
4 | 4 | # |
|
5 | 5 | # This program is free software: you can redistribute it and/or modify |
|
6 | 6 | # it under the terms of the GNU Affero General Public License, version 3 |
|
7 | 7 | # (only), as published by the Free Software Foundation. |
|
8 | 8 | # |
|
9 | 9 | # This program is distributed in the hope that it will be useful, |
|
10 | 10 | # but WITHOUT ANY WARRANTY; without even the implied warranty of |
|
11 | 11 | # MERCHANTABILITY or FITNESS FOR A PARTICULAR PURPOSE. See the |
|
12 | 12 | # GNU General Public License for more details. |
|
13 | 13 | # |
|
14 | 14 | # You should have received a copy of the GNU Affero General Public License |
|
15 | 15 | # along with this program. If not, see <http://www.gnu.org/licenses/>. |
|
16 | 16 | # |
|
17 | 17 | # This program is dual-licensed. If you wish to learn more about the |
|
18 | 18 | # RhodeCode Enterprise Edition, including its added features, Support services, |
|
19 | 19 | # and proprietary license terms, please see https://rhodecode.com/licenses/ |
|
20 | 20 | |
|
21 | 21 | import logging |
|
22 | 22 | |
|
23 | 23 | from pyramid.view import view_config |
|
24 | 24 | from pyramid.httpexceptions import HTTPFound, HTTPNotFound |
|
25 | 25 | |
|
26 | from rhodecode import events | |
|
26 | 27 | from rhodecode.apps._base import BaseAppView |
|
27 | 28 | from rhodecode.lib import helpers as h |
|
28 | 29 | from rhodecode.lib.auth import (NotAnonymous, HasRepoPermissionAny) |
|
29 | 30 | from rhodecode.model.db import Repository |
|
30 | 31 | from rhodecode.model.validation_schema.types import RepoNameType |
|
31 | 32 | |
|
32 | 33 | log = logging.getLogger(__name__) |
|
33 | 34 | |
|
34 | 35 | |
|
35 | 36 | class RepoChecksView(BaseAppView): |
|
36 | 37 | def load_default_context(self): |
|
37 | 38 | c = self._get_local_tmpl_context() |
|
38 | 39 | |
|
39 | 40 | return c |
|
40 | 41 | |
|
41 | 42 | @NotAnonymous() |
|
42 | 43 | @view_config( |
|
43 | 44 | route_name='repo_creating', request_method='GET', |
|
44 | 45 | renderer='rhodecode:templates/admin/repos/repo_creating.mako') |
|
45 | 46 | def repo_creating(self): |
|
46 | 47 | c = self.load_default_context() |
|
47 | 48 | repo_name = self.request.matchdict['repo_name'] |
|
48 | 49 | repo_name = RepoNameType().deserialize(None, repo_name) |
|
49 | 50 | db_repo = Repository.get_by_repo_name(repo_name) |
|
50 | 51 | |
|
51 | 52 | # check if maybe repo is already created |
|
52 | 53 | if db_repo and db_repo.repo_state in [Repository.STATE_CREATED]: |
|
54 | self.flush_permissions_on_creation(db_repo) | |
|
55 | ||
|
53 | 56 | # re-check permissions before redirecting to prevent resource |
|
54 | 57 | # discovery by checking the 302 code |
|
55 | 58 | perm_set = ['repository.read', 'repository.write', 'repository.admin'] |
|
56 | 59 | has_perm = HasRepoPermissionAny(*perm_set)( |
|
57 | 60 | db_repo.repo_name, 'Repo Creating check') |
|
58 | 61 | if not has_perm: |
|
59 | 62 | raise HTTPNotFound() |
|
60 | 63 | |
|
61 | 64 | raise HTTPFound(h.route_path( |
|
62 | 65 | 'repo_summary', repo_name=db_repo.repo_name)) |
|
63 | 66 | |
|
64 | 67 | c.task_id = self.request.GET.get('task_id') |
|
65 | 68 | c.repo_name = repo_name |
|
66 | 69 | |
|
67 | 70 | return self._get_template_context(c) |
|
68 | 71 | |
|
69 | 72 | @NotAnonymous() |
|
70 | 73 | @view_config( |
|
71 | 74 | route_name='repo_creating_check', request_method='GET', |
|
72 | 75 | renderer='json_ext') |
|
73 | 76 | def repo_creating_check(self): |
|
74 | 77 | _ = self.request.translate |
|
75 | 78 | task_id = self.request.GET.get('task_id') |
|
76 | 79 | self.load_default_context() |
|
77 | 80 | |
|
78 | 81 | repo_name = self.request.matchdict['repo_name'] |
|
79 | 82 | |
|
80 | 83 | if task_id and task_id not in ['None']: |
|
81 | 84 | import rhodecode |
|
82 | 85 | from rhodecode.lib.celerylib.loader import celery_app, exceptions |
|
83 | 86 | if rhodecode.CELERY_ENABLED: |
|
84 | 87 | log.debug('celery: checking result for task:%s', task_id) |
|
85 | 88 | task = celery_app.AsyncResult(task_id) |
|
86 | 89 | try: |
|
87 | 90 | task.get(timeout=10) |
|
88 | 91 | except exceptions.TimeoutError: |
|
89 | 92 | task = None |
|
90 | 93 | if task and task.failed(): |
|
91 | 94 | msg = self._log_creation_exception(task.result, repo_name) |
|
92 | 95 | h.flash(msg, category='error') |
|
93 | 96 | raise HTTPFound(h.route_path('home'), code=501) |
|
94 | 97 | |
|
95 | 98 | db_repo = Repository.get_by_repo_name(repo_name) |
|
96 | 99 | if db_repo and db_repo.repo_state == Repository.STATE_CREATED: |
|
97 | 100 | if db_repo.clone_uri: |
|
98 | 101 | clone_uri = db_repo.clone_uri_hidden |
|
99 | 102 | h.flash(_('Created repository %s from %s') |
|
100 | 103 | % (db_repo.repo_name, clone_uri), category='success') |
|
101 | 104 | else: |
|
102 | 105 | repo_url = h.link_to( |
|
103 | 106 | db_repo.repo_name, |
|
104 | 107 | h.route_path('repo_summary', repo_name=db_repo.repo_name)) |
|
105 | 108 | fork = db_repo.fork |
|
106 | 109 | if fork: |
|
107 | 110 | fork_name = fork.repo_name |
|
108 | 111 | h.flash(h.literal(_('Forked repository %s as %s') |
|
109 | 112 | % (fork_name, repo_url)), category='success') |
|
110 | 113 | else: |
|
111 | 114 | h.flash(h.literal(_('Created repository %s') % repo_url), |
|
112 | 115 | category='success') |
|
116 | self.flush_permissions_on_creation(db_repo) | |
|
117 | ||
|
113 | 118 | return {'result': True} |
|
114 | 119 | return {'result': False} |
|
120 | ||
|
121 | def flush_permissions_on_creation(self, db_repo): | |
|
122 | # repo is finished and created, we flush the permissions now | |
|
123 | user_group_perms = db_repo.permissions(expand_from_user_groups=True) | |
|
124 | affected_user_ids = [perm['user_id'] for perm in user_group_perms] | |
|
125 | events.trigger(events.UserPermissionsChange(affected_user_ids)) |
@@ -1,270 +1,266 b'' | |||
|
1 | 1 | # -*- coding: utf-8 -*- |
|
2 | 2 | |
|
3 | 3 | # Copyright (C) 2011-2019 RhodeCode GmbH |
|
4 | 4 | # |
|
5 | 5 | # This program is free software: you can redistribute it and/or modify |
|
6 | 6 | # it under the terms of the GNU Affero General Public License, version 3 |
|
7 | 7 | # (only), as published by the Free Software Foundation. |
|
8 | 8 | # |
|
9 | 9 | # This program is distributed in the hope that it will be useful, |
|
10 | 10 | # but WITHOUT ANY WARRANTY; without even the implied warranty of |
|
11 | 11 | # MERCHANTABILITY or FITNESS FOR A PARTICULAR PURPOSE. See the |
|
12 | 12 | # GNU General Public License for more details. |
|
13 | 13 | # |
|
14 | 14 | # You should have received a copy of the GNU Affero General Public License |
|
15 | 15 | # along with this program. If not, see <http://www.gnu.org/licenses/>. |
|
16 | 16 | # |
|
17 | 17 | # This program is dual-licensed. If you wish to learn more about the |
|
18 | 18 | # RhodeCode Enterprise Edition, including its added features, Support services, |
|
19 | 19 | # and proprietary license terms, please see https://rhodecode.com/licenses/ |
|
20 | 20 | |
|
21 | 21 | import logging |
|
22 | 22 | import datetime |
|
23 | 23 | import formencode |
|
24 | 24 | import formencode.htmlfill |
|
25 | 25 | |
|
26 | 26 | from pyramid.httpexceptions import HTTPFound |
|
27 | 27 | from pyramid.view import view_config |
|
28 | 28 | from pyramid.renderers import render |
|
29 | 29 | from pyramid.response import Response |
|
30 | 30 | |
|
31 | 31 | from rhodecode import events |
|
32 | 32 | from rhodecode.apps._base import RepoAppView, DataGridAppView |
|
33 | 33 | from rhodecode.lib.auth import ( |
|
34 | 34 | LoginRequired, HasRepoPermissionAnyDecorator, NotAnonymous, |
|
35 | 35 | HasRepoPermissionAny, HasPermissionAnyDecorator, CSRFRequired) |
|
36 | 36 | import rhodecode.lib.helpers as h |
|
37 | 37 | from rhodecode.lib.celerylib.utils import get_task_id |
|
38 | 38 | from rhodecode.model.db import coalesce, or_, Repository, RepoGroup |
|
39 | 39 | from rhodecode.model.repo import RepoModel |
|
40 | 40 | from rhodecode.model.forms import RepoForkForm |
|
41 | 41 | from rhodecode.model.scm import ScmModel, RepoGroupList |
|
42 | 42 | from rhodecode.lib.utils2 import safe_int, safe_unicode |
|
43 | 43 | |
|
44 | 44 | log = logging.getLogger(__name__) |
|
45 | 45 | |
|
46 | 46 | |
|
47 | 47 | class RepoForksView(RepoAppView, DataGridAppView): |
|
48 | 48 | |
|
49 | 49 | def load_default_context(self): |
|
50 | 50 | c = self._get_local_tmpl_context(include_app_defaults=True) |
|
51 | 51 | c.rhodecode_repo = self.rhodecode_vcs_repo |
|
52 | 52 | |
|
53 | 53 | acl_groups = RepoGroupList( |
|
54 | 54 | RepoGroup.query().all(), |
|
55 | 55 | perm_set=['group.write', 'group.admin']) |
|
56 | 56 | c.repo_groups = RepoGroup.groups_choices(groups=acl_groups) |
|
57 | 57 | c.repo_groups_choices = map(lambda k: safe_unicode(k[0]), c.repo_groups) |
|
58 | 58 | choices, c.landing_revs = ScmModel().get_repo_landing_revs( |
|
59 | 59 | self.request.translate) |
|
60 | 60 | c.landing_revs_choices = choices |
|
61 | 61 | c.personal_repo_group = c.rhodecode_user.personal_repo_group |
|
62 | 62 | |
|
63 | 63 | return c |
|
64 | 64 | |
|
65 | 65 | @LoginRequired() |
|
66 | 66 | @HasRepoPermissionAnyDecorator( |
|
67 | 67 | 'repository.read', 'repository.write', 'repository.admin') |
|
68 | 68 | @view_config( |
|
69 | 69 | route_name='repo_forks_show_all', request_method='GET', |
|
70 | 70 | renderer='rhodecode:templates/forks/forks.mako') |
|
71 | 71 | def repo_forks_show_all(self): |
|
72 | 72 | c = self.load_default_context() |
|
73 | 73 | return self._get_template_context(c) |
|
74 | 74 | |
|
75 | 75 | @LoginRequired() |
|
76 | 76 | @HasRepoPermissionAnyDecorator( |
|
77 | 77 | 'repository.read', 'repository.write', 'repository.admin') |
|
78 | 78 | @view_config( |
|
79 | 79 | route_name='repo_forks_data', request_method='GET', |
|
80 | 80 | renderer='json_ext', xhr=True) |
|
81 | 81 | def repo_forks_data(self): |
|
82 | 82 | _ = self.request.translate |
|
83 | 83 | self.load_default_context() |
|
84 | 84 | column_map = { |
|
85 | 85 | 'fork_name': 'repo_name', |
|
86 | 86 | 'fork_date': 'created_on', |
|
87 | 87 | 'last_activity': 'updated_on' |
|
88 | 88 | } |
|
89 | 89 | draw, start, limit = self._extract_chunk(self.request) |
|
90 | 90 | search_q, order_by, order_dir = self._extract_ordering( |
|
91 | 91 | self.request, column_map=column_map) |
|
92 | 92 | |
|
93 | 93 | acl_check = HasRepoPermissionAny( |
|
94 | 94 | 'repository.read', 'repository.write', 'repository.admin') |
|
95 | 95 | repo_id = self.db_repo.repo_id |
|
96 | 96 | allowed_ids = [-1] |
|
97 | 97 | for f in Repository.query().filter(Repository.fork_id == repo_id): |
|
98 | 98 | if acl_check(f.repo_name, 'get forks check'): |
|
99 | 99 | allowed_ids.append(f.repo_id) |
|
100 | 100 | |
|
101 | 101 | forks_data_total_count = Repository.query()\ |
|
102 | 102 | .filter(Repository.fork_id == repo_id)\ |
|
103 | 103 | .filter(Repository.repo_id.in_(allowed_ids))\ |
|
104 | 104 | .count() |
|
105 | 105 | |
|
106 | 106 | # json generate |
|
107 | 107 | base_q = Repository.query()\ |
|
108 | 108 | .filter(Repository.fork_id == repo_id)\ |
|
109 | 109 | .filter(Repository.repo_id.in_(allowed_ids))\ |
|
110 | 110 | |
|
111 | 111 | if search_q: |
|
112 | 112 | like_expression = u'%{}%'.format(safe_unicode(search_q)) |
|
113 | 113 | base_q = base_q.filter(or_( |
|
114 | 114 | Repository.repo_name.ilike(like_expression), |
|
115 | 115 | Repository.description.ilike(like_expression), |
|
116 | 116 | )) |
|
117 | 117 | |
|
118 | 118 | forks_data_total_filtered_count = base_q.count() |
|
119 | 119 | |
|
120 | 120 | sort_col = getattr(Repository, order_by, None) |
|
121 | 121 | if sort_col: |
|
122 | 122 | if order_dir == 'asc': |
|
123 | 123 | # handle null values properly to order by NULL last |
|
124 | 124 | if order_by in ['last_activity']: |
|
125 | 125 | sort_col = coalesce(sort_col, datetime.date.max) |
|
126 | 126 | sort_col = sort_col.asc() |
|
127 | 127 | else: |
|
128 | 128 | # handle null values properly to order by NULL last |
|
129 | 129 | if order_by in ['last_activity']: |
|
130 | 130 | sort_col = coalesce(sort_col, datetime.date.min) |
|
131 | 131 | sort_col = sort_col.desc() |
|
132 | 132 | |
|
133 | 133 | base_q = base_q.order_by(sort_col) |
|
134 | 134 | base_q = base_q.offset(start).limit(limit) |
|
135 | 135 | |
|
136 | 136 | fork_list = base_q.all() |
|
137 | 137 | |
|
138 | 138 | def fork_actions(fork): |
|
139 | 139 | url_link = h.route_path( |
|
140 | 140 | 'repo_compare', |
|
141 | 141 | repo_name=fork.repo_name, |
|
142 | 142 | source_ref_type=self.db_repo.landing_rev[0], |
|
143 | 143 | source_ref=self.db_repo.landing_rev[1], |
|
144 | 144 | target_ref_type=self.db_repo.landing_rev[0], |
|
145 | 145 | target_ref=self.db_repo.landing_rev[1], |
|
146 | 146 | _query=dict(merge=1, target_repo=f.repo_name)) |
|
147 | 147 | return h.link_to(_('Compare fork'), url_link, class_='btn-link') |
|
148 | 148 | |
|
149 | 149 | def fork_name(fork): |
|
150 | 150 | return h.link_to(fork.repo_name, |
|
151 | 151 | h.route_path('repo_summary', repo_name=fork.repo_name)) |
|
152 | 152 | |
|
153 | 153 | forks_data = [] |
|
154 | 154 | for fork in fork_list: |
|
155 | 155 | forks_data.append({ |
|
156 | 156 | "username": h.gravatar_with_user(self.request, fork.user.username), |
|
157 | 157 | "fork_name": fork_name(fork), |
|
158 | 158 | "description": fork.description_safe, |
|
159 | 159 | "fork_date": h.age_component(fork.created_on, time_is_local=True), |
|
160 | 160 | "last_activity": h.format_date(fork.updated_on), |
|
161 | 161 | "action": fork_actions(fork), |
|
162 | 162 | }) |
|
163 | 163 | |
|
164 | 164 | data = ({ |
|
165 | 165 | 'draw': draw, |
|
166 | 166 | 'data': forks_data, |
|
167 | 167 | 'recordsTotal': forks_data_total_count, |
|
168 | 168 | 'recordsFiltered': forks_data_total_filtered_count, |
|
169 | 169 | }) |
|
170 | 170 | |
|
171 | 171 | return data |
|
172 | 172 | |
|
173 | 173 | @LoginRequired() |
|
174 | 174 | @NotAnonymous() |
|
175 | 175 | @HasPermissionAnyDecorator('hg.admin', 'hg.fork.repository') |
|
176 | 176 | @HasRepoPermissionAnyDecorator( |
|
177 | 177 | 'repository.read', 'repository.write', 'repository.admin') |
|
178 | 178 | @view_config( |
|
179 | 179 | route_name='repo_fork_new', request_method='GET', |
|
180 | 180 | renderer='rhodecode:templates/forks/forks.mako') |
|
181 | 181 | def repo_fork_new(self): |
|
182 | 182 | c = self.load_default_context() |
|
183 | 183 | |
|
184 | 184 | defaults = RepoModel()._get_defaults(self.db_repo_name) |
|
185 | 185 | # alter the description to indicate a fork |
|
186 | 186 | defaults['description'] = ( |
|
187 | 187 | 'fork of repository: %s \n%s' % ( |
|
188 | 188 | defaults['repo_name'], defaults['description'])) |
|
189 | 189 | # add suffix to fork |
|
190 | 190 | defaults['repo_name'] = '%s-fork' % defaults['repo_name'] |
|
191 | 191 | |
|
192 | 192 | data = render('rhodecode:templates/forks/fork.mako', |
|
193 | 193 | self._get_template_context(c), self.request) |
|
194 | 194 | html = formencode.htmlfill.render( |
|
195 | 195 | data, |
|
196 | 196 | defaults=defaults, |
|
197 | 197 | encoding="UTF-8", |
|
198 | 198 | force_defaults=False |
|
199 | 199 | ) |
|
200 | 200 | return Response(html) |
|
201 | 201 | |
|
202 | 202 | @LoginRequired() |
|
203 | 203 | @NotAnonymous() |
|
204 | 204 | @HasPermissionAnyDecorator('hg.admin', 'hg.fork.repository') |
|
205 | 205 | @HasRepoPermissionAnyDecorator( |
|
206 | 206 | 'repository.read', 'repository.write', 'repository.admin') |
|
207 | 207 | @CSRFRequired() |
|
208 | 208 | @view_config( |
|
209 | 209 | route_name='repo_fork_create', request_method='POST', |
|
210 | 210 | renderer='rhodecode:templates/forks/fork.mako') |
|
211 | 211 | def repo_fork_create(self): |
|
212 | 212 | _ = self.request.translate |
|
213 | 213 | c = self.load_default_context() |
|
214 | 214 | |
|
215 | 215 | _form = RepoForkForm(self.request.translate, old_data={'repo_type': self.db_repo.repo_type}, |
|
216 | 216 | repo_groups=c.repo_groups_choices, |
|
217 | 217 | landing_revs=c.landing_revs_choices)() |
|
218 | 218 | post_data = dict(self.request.POST) |
|
219 | 219 | |
|
220 | 220 | # forbid injecting other repo by forging a request |
|
221 | 221 | post_data['fork_parent_id'] = self.db_repo.repo_id |
|
222 | 222 | |
|
223 | 223 | form_result = {} |
|
224 | 224 | task_id = None |
|
225 | 225 | try: |
|
226 | 226 | form_result = _form.to_python(post_data) |
|
227 | 227 | copy_permissions = form_result.get('copy_permissions') |
|
228 | 228 | # create fork is done sometimes async on celery, db transaction |
|
229 | 229 | # management is handled there. |
|
230 | 230 | task = RepoModel().create_fork( |
|
231 | 231 | form_result, c.rhodecode_user.user_id) |
|
232 | 232 | |
|
233 | 233 | task_id = get_task_id(task) |
|
234 | 234 | except formencode.Invalid as errors: |
|
235 | 235 | c.rhodecode_db_repo = self.db_repo |
|
236 | 236 | |
|
237 | 237 | data = render('rhodecode:templates/forks/fork.mako', |
|
238 | 238 | self._get_template_context(c), self.request) |
|
239 | 239 | html = formencode.htmlfill.render( |
|
240 | 240 | data, |
|
241 | 241 | defaults=errors.value, |
|
242 | 242 | errors=errors.error_dict or {}, |
|
243 | 243 | prefix_error=False, |
|
244 | 244 | encoding="UTF-8", |
|
245 | 245 | force_defaults=False |
|
246 | 246 | ) |
|
247 | 247 | return Response(html) |
|
248 | 248 | except Exception: |
|
249 | 249 | log.exception( |
|
250 | 250 | u'Exception while trying to fork the repository %s', self.db_repo_name) |
|
251 | 251 | msg = _('An error occurred during repository forking %s') % (self.db_repo_name, ) |
|
252 | 252 | h.flash(msg, category='error') |
|
253 | 253 | raise HTTPFound(h.route_path('home')) |
|
254 | 254 | |
|
255 | 255 | repo_name = form_result.get('repo_name_full', self.db_repo_name) |
|
256 | 256 | |
|
257 | 257 | affected_user_ids = [self._rhodecode_user.user_id] |
|
258 | 258 | if copy_permissions: |
|
259 | repository = Repository.get_by_repo_name(repo_name) | |
|
260 | # also include those newly created by copy | |
|
261 | user_group_perms = repository.permissions(expand_from_user_groups=True) | |
|
262 | copy_perms = [perm['user_id'] for perm in user_group_perms] | |
|
263 | # also include those newly created by copy | |
|
264 | affected_user_ids.extend(copy_perms) | |
|
259 | # permission flush is done in repo creating | |
|
260 | pass | |
|
265 | 261 | |
|
266 | 262 | events.trigger(events.UserPermissionsChange(affected_user_ids)) |
|
267 | 263 | |
|
268 | 264 | raise HTTPFound( |
|
269 | 265 | h.route_path('repo_creating', repo_name=repo_name, |
|
270 | 266 | _query=dict(task_id=task_id))) |
General Comments 0
You need to be logged in to leave comments.
Login now