##// END OF EJS Templates
review-rules: extend code to support the forbid commit authors.
marcink -
r1787:bb077306 default
parent child Browse files
Show More
@@ -0,0 +1,33 b''
1 import logging
2
3 from sqlalchemy import *
4 from rhodecode.model import meta
5 from rhodecode.lib.dbmigrate.versions import _reset_base, notify
6
7 log = logging.getLogger(__name__)
8
9
10 def upgrade(migrate_engine):
11 """
12 Upgrade operations go here.
13 Don't create your own engine; bind migrate_engine to your metadata
14 """
15 _reset_base(migrate_engine)
16 from rhodecode.lib.dbmigrate.schema import db_4_7_0_1 as db
17
18 repo_review_rule_table = db.RepoReviewRule.__table__
19
20 forbid_commit_author_to_review = Column(
21 "forbid_commit_author_to_review", Boolean(), nullable=True, default=False)
22 forbid_commit_author_to_review.create(table=repo_review_rule_table)
23
24 fixups(db, meta.Session)
25
26
27 def downgrade(migrate_engine):
28 meta = MetaData()
29 meta.bind = migrate_engine
30
31
32 def fixups(models, _SESSION):
33 pass
@@ -1,63 +1,63 b''
1 1 # -*- coding: utf-8 -*-
2 2
3 3 # Copyright (C) 2010-2017 RhodeCode GmbH
4 4 #
5 5 # This program is free software: you can redistribute it and/or modify
6 6 # it under the terms of the GNU Affero General Public License, version 3
7 7 # (only), as published by the Free Software Foundation.
8 8 #
9 9 # This program is distributed in the hope that it will be useful,
10 10 # but WITHOUT ANY WARRANTY; without even the implied warranty of
11 11 # MERCHANTABILITY or FITNESS FOR A PARTICULAR PURPOSE. See the
12 12 # GNU General Public License for more details.
13 13 #
14 14 # You should have received a copy of the GNU Affero General Public License
15 15 # along with this program. If not, see <http://www.gnu.org/licenses/>.
16 16 #
17 17 # This program is dual-licensed. If you wish to learn more about the
18 18 # RhodeCode Enterprise Edition, including its added features, Support services,
19 19 # and proprietary license terms, please see https://rhodecode.com/licenses/
20 20
21 21 """
22 22
23 23 RhodeCode, a web based repository management software
24 24 versioning implementation: http://www.python.org/dev/peps/pep-0386/
25 25 """
26 26
27 27 import os
28 28 import sys
29 29 import platform
30 30
31 31 VERSION = tuple(open(os.path.join(
32 32 os.path.dirname(__file__), 'VERSION')).read().split('.'))
33 33
34 34 BACKENDS = {
35 35 'hg': 'Mercurial repository',
36 36 'git': 'Git repository',
37 37 'svn': 'Subversion repository',
38 38 }
39 39
40 40 CELERY_ENABLED = False
41 41 CELERY_EAGER = False
42 42
43 43 # link to config for pylons
44 44 CONFIG = {}
45 45
46 46 # Populated with the settings dictionary from application init in
47 47 # rhodecode.conf.environment.load_pyramid_environment
48 48 PYRAMID_SETTINGS = {}
49 49
50 50 # Linked module for extensions
51 51 EXTENSIONS = {}
52 52
53 53 __version__ = ('.'.join((str(each) for each in VERSION[:3])))
54 __dbversion__ = 77 # defines current db version for migrations
54 __dbversion__ = 78 # defines current db version for migrations
55 55 __platform__ = platform.system()
56 56 __license__ = 'AGPLv3, and Commercial License'
57 57 __author__ = 'RhodeCode GmbH'
58 58 __url__ = 'https://code.rhodecode.com'
59 59
60 60 is_windows = __platform__ in ['Windows']
61 61 is_unix = not is_windows
62 62 is_test = False
63 63 disable_error_handler = False
@@ -1,1018 +1,1023 b''
1 1 # -*- coding: utf-8 -*-
2 2
3 3 # Copyright (C) 2012-2017 RhodeCode GmbH
4 4 #
5 5 # This program is free software: you can redistribute it and/or modify
6 6 # it under the terms of the GNU Affero General Public License, version 3
7 7 # (only), as published by the Free Software Foundation.
8 8 #
9 9 # This program is distributed in the hope that it will be useful,
10 10 # but WITHOUT ANY WARRANTY; without even the implied warranty of
11 11 # MERCHANTABILITY or FITNESS FOR A PARTICULAR PURPOSE. See the
12 12 # GNU General Public License for more details.
13 13 #
14 14 # You should have received a copy of the GNU Affero General Public License
15 15 # along with this program. If not, see <http://www.gnu.org/licenses/>.
16 16 #
17 17 # This program is dual-licensed. If you wish to learn more about the
18 18 # RhodeCode Enterprise Edition, including its added features, Support services,
19 19 # and proprietary license terms, please see https://rhodecode.com/licenses/
20 20
21 21 """
22 22 pull requests controller for rhodecode for initializing pull requests
23 23 """
24 24 import types
25 25
26 26 import peppercorn
27 27 import formencode
28 28 import logging
29 29 import collections
30 30
31 31 from webob.exc import HTTPNotFound, HTTPForbidden, HTTPBadRequest
32 32 from pylons import request, tmpl_context as c, url
33 33 from pylons.controllers.util import redirect
34 34 from pylons.i18n.translation import _
35 35 from pyramid.threadlocal import get_current_registry
36 36 from sqlalchemy.sql import func
37 37 from sqlalchemy.sql.expression import or_
38 38
39 39 from rhodecode import events
40 40 from rhodecode.lib import auth, diffs, helpers as h, codeblocks
41 41 from rhodecode.lib.ext_json import json
42 42 from rhodecode.lib.base import (
43 43 BaseRepoController, render, vcs_operation_context)
44 44 from rhodecode.lib.auth import (
45 45 LoginRequired, HasRepoPermissionAnyDecorator, NotAnonymous,
46 46 HasAcceptedRepoType, XHRRequired)
47 47 from rhodecode.lib.channelstream import channelstream_request
48 48 from rhodecode.lib.utils import jsonify
49 49 from rhodecode.lib.utils2 import (
50 50 safe_int, safe_str, str2bool, safe_unicode)
51 51 from rhodecode.lib.vcs.backends.base import (
52 52 EmptyCommit, UpdateFailureReason, EmptyRepository)
53 53 from rhodecode.lib.vcs.exceptions import (
54 54 EmptyRepositoryError, CommitDoesNotExistError, RepositoryRequirementError,
55 55 NodeDoesNotExistError)
56 56
57 57 from rhodecode.model.changeset_status import ChangesetStatusModel
58 58 from rhodecode.model.comment import CommentsModel
59 59 from rhodecode.model.db import (PullRequest, ChangesetStatus, ChangesetComment,
60 60 Repository, PullRequestVersion)
61 61 from rhodecode.model.forms import PullRequestForm
62 62 from rhodecode.model.meta import Session
63 63 from rhodecode.model.pull_request import PullRequestModel, MergeCheck
64 64
65 65 log = logging.getLogger(__name__)
66 66
67 67
68 68 class PullrequestsController(BaseRepoController):
69 69
70 70 def __before__(self):
71 71 super(PullrequestsController, self).__before__()
72 72 c.REVIEW_STATUS_APPROVED = ChangesetStatus.STATUS_APPROVED
73 73 c.REVIEW_STATUS_REJECTED = ChangesetStatus.STATUS_REJECTED
74 74
75 75 @LoginRequired()
76 76 @NotAnonymous()
77 77 @HasRepoPermissionAnyDecorator('repository.read', 'repository.write',
78 78 'repository.admin')
79 79 @HasAcceptedRepoType('git', 'hg')
80 80 def index(self):
81 81 source_repo = c.rhodecode_db_repo
82 82
83 83 try:
84 84 source_repo.scm_instance().get_commit()
85 85 except EmptyRepositoryError:
86 86 h.flash(h.literal(_('There are no commits yet')),
87 87 category='warning')
88 88 redirect(h.route_path('repo_summary', repo_name=source_repo.repo_name))
89 89
90 90 commit_id = request.GET.get('commit')
91 91 branch_ref = request.GET.get('branch')
92 92 bookmark_ref = request.GET.get('bookmark')
93 93
94 94 try:
95 95 source_repo_data = PullRequestModel().generate_repo_data(
96 96 source_repo, commit_id=commit_id,
97 97 branch=branch_ref, bookmark=bookmark_ref)
98 98 except CommitDoesNotExistError as e:
99 99 log.exception(e)
100 100 h.flash(_('Commit does not exist'), 'error')
101 101 redirect(url('pullrequest_home', repo_name=source_repo.repo_name))
102 102
103 103 default_target_repo = source_repo
104 104
105 105 if source_repo.parent:
106 106 parent_vcs_obj = source_repo.parent.scm_instance()
107 107 if parent_vcs_obj and not parent_vcs_obj.is_empty():
108 108 # change default if we have a parent repo
109 109 default_target_repo = source_repo.parent
110 110
111 111 target_repo_data = PullRequestModel().generate_repo_data(
112 112 default_target_repo)
113 113
114 114 selected_source_ref = source_repo_data['refs']['selected_ref']
115 115
116 116 title_source_ref = selected_source_ref.split(':', 2)[1]
117 117 c.default_title = PullRequestModel().generate_pullrequest_title(
118 118 source=source_repo.repo_name,
119 119 source_ref=title_source_ref,
120 120 target=default_target_repo.repo_name
121 121 )
122 122
123 123 c.default_repo_data = {
124 124 'source_repo_name': source_repo.repo_name,
125 125 'source_refs_json': json.dumps(source_repo_data),
126 126 'target_repo_name': default_target_repo.repo_name,
127 127 'target_refs_json': json.dumps(target_repo_data),
128 128 }
129 129 c.default_source_ref = selected_source_ref
130 130
131 131 return render('/pullrequests/pullrequest.mako')
132 132
133 133 @LoginRequired()
134 134 @NotAnonymous()
135 135 @XHRRequired()
136 136 @HasRepoPermissionAnyDecorator('repository.read', 'repository.write',
137 137 'repository.admin')
138 138 @jsonify
139 139 def get_repo_refs(self, repo_name, target_repo_name):
140 140 repo = Repository.get_by_repo_name(target_repo_name)
141 141 if not repo:
142 142 raise HTTPNotFound
143 143 return PullRequestModel().generate_repo_data(repo)
144 144
145 145 @LoginRequired()
146 146 @NotAnonymous()
147 147 @XHRRequired()
148 148 @HasRepoPermissionAnyDecorator('repository.read', 'repository.write',
149 149 'repository.admin')
150 150 @jsonify
151 151 def get_repo_destinations(self, repo_name):
152 152 repo = Repository.get_by_repo_name(repo_name)
153 153 if not repo:
154 154 raise HTTPNotFound
155 155 filter_query = request.GET.get('query')
156 156
157 157 query = Repository.query() \
158 158 .order_by(func.length(Repository.repo_name)) \
159 159 .filter(or_(
160 160 Repository.repo_name == repo.repo_name,
161 161 Repository.fork_id == repo.repo_id))
162 162
163 163 if filter_query:
164 164 ilike_expression = u'%{}%'.format(safe_unicode(filter_query))
165 165 query = query.filter(
166 166 Repository.repo_name.ilike(ilike_expression))
167 167
168 168 add_parent = False
169 169 if repo.parent:
170 170 if filter_query in repo.parent.repo_name:
171 171 parent_vcs_obj = repo.parent.scm_instance()
172 172 if parent_vcs_obj and not parent_vcs_obj.is_empty():
173 173 add_parent = True
174 174
175 175 limit = 20 - 1 if add_parent else 20
176 176 all_repos = query.limit(limit).all()
177 177 if add_parent:
178 178 all_repos += [repo.parent]
179 179
180 180 repos = []
181 181 for obj in self.scm_model.get_repos(all_repos):
182 182 repos.append({
183 183 'id': obj['name'],
184 184 'text': obj['name'],
185 185 'type': 'repo',
186 186 'obj': obj['dbrepo']
187 187 })
188 188
189 189 data = {
190 190 'more': False,
191 191 'results': [{
192 192 'text': _('Repositories'),
193 193 'children': repos
194 194 }] if repos else []
195 195 }
196 196 return data
197 197
198 198 @LoginRequired()
199 199 @NotAnonymous()
200 200 @HasRepoPermissionAnyDecorator('repository.read', 'repository.write',
201 201 'repository.admin')
202 202 @HasAcceptedRepoType('git', 'hg')
203 203 @auth.CSRFRequired()
204 204 def create(self, repo_name):
205 205 repo = Repository.get_by_repo_name(repo_name)
206 206 if not repo:
207 207 raise HTTPNotFound
208 208
209 209 controls = peppercorn.parse(request.POST.items())
210 210
211 211 try:
212 212 _form = PullRequestForm(repo.repo_id)().to_python(controls)
213 213 except formencode.Invalid as errors:
214 214 if errors.error_dict.get('revisions'):
215 215 msg = 'Revisions: %s' % errors.error_dict['revisions']
216 216 elif errors.error_dict.get('pullrequest_title'):
217 217 msg = _('Pull request requires a title with min. 3 chars')
218 218 else:
219 219 msg = _('Error creating pull request: {}').format(errors)
220 220 log.exception(msg)
221 221 h.flash(msg, 'error')
222 222
223 223 # would rather just go back to form ...
224 224 return redirect(url('pullrequest_home', repo_name=repo_name))
225 225
226 226 source_repo = _form['source_repo']
227 227 source_ref = _form['source_ref']
228 228 target_repo = _form['target_repo']
229 229 target_ref = _form['target_ref']
230 230 commit_ids = _form['revisions'][::-1]
231 231
232 232 # find the ancestor for this pr
233 233 source_db_repo = Repository.get_by_repo_name(_form['source_repo'])
234 234 target_db_repo = Repository.get_by_repo_name(_form['target_repo'])
235 235
236 236 source_scm = source_db_repo.scm_instance()
237 237 target_scm = target_db_repo.scm_instance()
238 238
239 239 source_commit = source_scm.get_commit(source_ref.split(':')[-1])
240 240 target_commit = target_scm.get_commit(target_ref.split(':')[-1])
241 241
242 242 ancestor = source_scm.get_common_ancestor(
243 243 source_commit.raw_id, target_commit.raw_id, target_scm)
244 244
245 245 target_ref_type, target_ref_name, __ = _form['target_ref'].split(':')
246 246 target_ref = ':'.join((target_ref_type, target_ref_name, ancestor))
247 247
248 248 pullrequest_title = _form['pullrequest_title']
249 249 title_source_ref = source_ref.split(':', 2)[1]
250 250 if not pullrequest_title:
251 251 pullrequest_title = PullRequestModel().generate_pullrequest_title(
252 252 source=source_repo,
253 253 source_ref=title_source_ref,
254 254 target=target_repo
255 255 )
256 256
257 257 description = _form['pullrequest_desc']
258 258
259 259 get_default_reviewers_data, validate_default_reviewers = \
260 260 PullRequestModel().get_reviewer_functions()
261 261
262 262 # recalculate reviewers logic, to make sure we can validate this
263 263 reviewer_rules = get_default_reviewers_data(
264 c.rhodecode_user, source_db_repo, source_commit, target_db_repo,
265 target_commit)
264 c.rhodecode_user.get_instance(), source_db_repo,
265 source_commit, target_db_repo, target_commit)
266 266
267 267 reviewers = validate_default_reviewers(
268 268 _form['review_members'], reviewer_rules)
269 269
270 270 try:
271 271 pull_request = PullRequestModel().create(
272 272 c.rhodecode_user.user_id, source_repo, source_ref, target_repo,
273 273 target_ref, commit_ids, reviewers, pullrequest_title,
274 274 description, reviewer_rules
275 275 )
276 276 Session().commit()
277 277 h.flash(_('Successfully opened new pull request'),
278 278 category='success')
279 279 except Exception as e:
280 280 msg = _('Error occurred during creation of this pull request.')
281 281 log.exception(msg)
282 282 h.flash(msg, category='error')
283 283 return redirect(url('pullrequest_home', repo_name=repo_name))
284 284
285 285 return redirect(url('pullrequest_show', repo_name=target_repo,
286 286 pull_request_id=pull_request.pull_request_id))
287 287
288 288 @LoginRequired()
289 289 @NotAnonymous()
290 290 @HasRepoPermissionAnyDecorator('repository.read', 'repository.write',
291 291 'repository.admin')
292 292 @auth.CSRFRequired()
293 293 @jsonify
294 294 def update(self, repo_name, pull_request_id):
295 295 pull_request_id = safe_int(pull_request_id)
296 296 pull_request = PullRequest.get_or_404(pull_request_id)
297 297 # only owner or admin can update it
298 298 allowed_to_update = PullRequestModel().check_user_update(
299 299 pull_request, c.rhodecode_user)
300 300 if allowed_to_update:
301 301 controls = peppercorn.parse(request.POST.items())
302 302
303 303 if 'review_members' in controls:
304 304 self._update_reviewers(
305 305 pull_request_id, controls['review_members'],
306 306 pull_request.reviewer_data)
307 307 elif str2bool(request.POST.get('update_commits', 'false')):
308 308 self._update_commits(pull_request)
309 309 elif str2bool(request.POST.get('close_pull_request', 'false')):
310 310 self._reject_close(pull_request)
311 311 elif str2bool(request.POST.get('edit_pull_request', 'false')):
312 312 self._edit_pull_request(pull_request)
313 313 else:
314 314 raise HTTPBadRequest()
315 315 return True
316 316 raise HTTPForbidden()
317 317
318 318 def _edit_pull_request(self, pull_request):
319 319 try:
320 320 PullRequestModel().edit(
321 321 pull_request, request.POST.get('title'),
322 322 request.POST.get('description'))
323 323 except ValueError:
324 324 msg = _(u'Cannot update closed pull requests.')
325 325 h.flash(msg, category='error')
326 326 return
327 327 else:
328 328 Session().commit()
329 329
330 330 msg = _(u'Pull request title & description updated.')
331 331 h.flash(msg, category='success')
332 332 return
333 333
334 334 def _update_commits(self, pull_request):
335 335 resp = PullRequestModel().update_commits(pull_request)
336 336
337 337 if resp.executed:
338 338
339 339 if resp.target_changed and resp.source_changed:
340 340 changed = 'target and source repositories'
341 341 elif resp.target_changed and not resp.source_changed:
342 342 changed = 'target repository'
343 343 elif not resp.target_changed and resp.source_changed:
344 344 changed = 'source repository'
345 345 else:
346 346 changed = 'nothing'
347 347
348 348 msg = _(
349 349 u'Pull request updated to "{source_commit_id}" with '
350 350 u'{count_added} added, {count_removed} removed commits. '
351 351 u'Source of changes: {change_source}')
352 352 msg = msg.format(
353 353 source_commit_id=pull_request.source_ref_parts.commit_id,
354 354 count_added=len(resp.changes.added),
355 355 count_removed=len(resp.changes.removed),
356 356 change_source=changed)
357 357 h.flash(msg, category='success')
358 358
359 359 registry = get_current_registry()
360 360 rhodecode_plugins = getattr(registry, 'rhodecode_plugins', {})
361 361 channelstream_config = rhodecode_plugins.get('channelstream', {})
362 362 if channelstream_config.get('enabled'):
363 363 message = msg + (
364 364 ' - <a onclick="window.location.reload()">'
365 365 '<strong>{}</strong></a>'.format(_('Reload page')))
366 366 channel = '/repo${}$/pr/{}'.format(
367 367 pull_request.target_repo.repo_name,
368 368 pull_request.pull_request_id
369 369 )
370 370 payload = {
371 371 'type': 'message',
372 372 'user': 'system',
373 373 'exclude_users': [request.user.username],
374 374 'channel': channel,
375 375 'message': {
376 376 'message': message,
377 377 'level': 'success',
378 378 'topic': '/notifications'
379 379 }
380 380 }
381 381 channelstream_request(
382 382 channelstream_config, [payload], '/message',
383 383 raise_exc=False)
384 384 else:
385 385 msg = PullRequestModel.UPDATE_STATUS_MESSAGES[resp.reason]
386 386 warning_reasons = [
387 387 UpdateFailureReason.NO_CHANGE,
388 388 UpdateFailureReason.WRONG_REF_TYPE,
389 389 ]
390 390 category = 'warning' if resp.reason in warning_reasons else 'error'
391 391 h.flash(msg, category=category)
392 392
393 393 @auth.CSRFRequired()
394 394 @LoginRequired()
395 395 @NotAnonymous()
396 396 @HasRepoPermissionAnyDecorator('repository.read', 'repository.write',
397 397 'repository.admin')
398 398 def merge(self, repo_name, pull_request_id):
399 399 """
400 400 POST /{repo_name}/pull-request/{pull_request_id}
401 401
402 402 Merge will perform a server-side merge of the specified
403 403 pull request, if the pull request is approved and mergeable.
404 404 After successful merging, the pull request is automatically
405 405 closed, with a relevant comment.
406 406 """
407 407 pull_request_id = safe_int(pull_request_id)
408 408 pull_request = PullRequest.get_or_404(pull_request_id)
409 409 user = c.rhodecode_user
410 410
411 411 check = MergeCheck.validate(pull_request, user)
412 412 merge_possible = not check.failed
413 413
414 414 for err_type, error_msg in check.errors:
415 415 h.flash(error_msg, category=err_type)
416 416
417 417 if merge_possible:
418 418 log.debug("Pre-conditions checked, trying to merge.")
419 419 extras = vcs_operation_context(
420 420 request.environ, repo_name=pull_request.target_repo.repo_name,
421 421 username=user.username, action='push',
422 422 scm=pull_request.target_repo.repo_type)
423 423 self._merge_pull_request(pull_request, user, extras)
424 424
425 425 return redirect(url(
426 426 'pullrequest_show',
427 427 repo_name=pull_request.target_repo.repo_name,
428 428 pull_request_id=pull_request.pull_request_id))
429 429
430 430 def _merge_pull_request(self, pull_request, user, extras):
431 431 merge_resp = PullRequestModel().merge(
432 432 pull_request, user, extras=extras)
433 433
434 434 if merge_resp.executed:
435 435 log.debug("The merge was successful, closing the pull request.")
436 436 PullRequestModel().close_pull_request(
437 437 pull_request.pull_request_id, user)
438 438 Session().commit()
439 439 msg = _('Pull request was successfully merged and closed.')
440 440 h.flash(msg, category='success')
441 441 else:
442 442 log.debug(
443 443 "The merge was not successful. Merge response: %s",
444 444 merge_resp)
445 445 msg = PullRequestModel().merge_status_message(
446 446 merge_resp.failure_reason)
447 447 h.flash(msg, category='error')
448 448
449 449 def _update_reviewers(self, pull_request_id, review_members, reviewer_rules):
450 450
451 451 get_default_reviewers_data, validate_default_reviewers = \
452 452 PullRequestModel().get_reviewer_functions()
453 453
454 454 try:
455 455 reviewers = validate_default_reviewers(review_members, reviewer_rules)
456 456 except ValueError as e:
457 457 log.error('Reviewers Validation:{}'.format(e))
458 458 h.flash(e, category='error')
459 459 return
460 460
461 461 PullRequestModel().update_reviewers(pull_request_id, reviewers)
462 462 h.flash(_('Pull request reviewers updated.'), category='success')
463 463 Session().commit()
464 464
465 465 def _reject_close(self, pull_request):
466 466 if pull_request.is_closed():
467 467 raise HTTPForbidden()
468 468
469 469 PullRequestModel().close_pull_request_with_comment(
470 470 pull_request, c.rhodecode_user, c.rhodecode_db_repo)
471 471 Session().commit()
472 472
473 473 @LoginRequired()
474 474 @NotAnonymous()
475 475 @HasRepoPermissionAnyDecorator('repository.read', 'repository.write',
476 476 'repository.admin')
477 477 @auth.CSRFRequired()
478 478 @jsonify
479 479 def delete(self, repo_name, pull_request_id):
480 480 pull_request_id = safe_int(pull_request_id)
481 481 pull_request = PullRequest.get_or_404(pull_request_id)
482 482
483 483 pr_closed = pull_request.is_closed()
484 484 allowed_to_delete = PullRequestModel().check_user_delete(
485 485 pull_request, c.rhodecode_user) and not pr_closed
486 486
487 487 # only owner can delete it !
488 488 if allowed_to_delete:
489 489 PullRequestModel().delete(pull_request)
490 490 Session().commit()
491 491 h.flash(_('Successfully deleted pull request'),
492 492 category='success')
493 493 return redirect(url('my_account_pullrequests'))
494 494
495 495 h.flash(_('Your are not allowed to delete this pull request'),
496 496 category='error')
497 497 raise HTTPForbidden()
498 498
499 499 def _get_pr_version(self, pull_request_id, version=None):
500 500 pull_request_id = safe_int(pull_request_id)
501 501 at_version = None
502 502
503 503 if version and version == 'latest':
504 504 pull_request_ver = PullRequest.get(pull_request_id)
505 505 pull_request_obj = pull_request_ver
506 506 _org_pull_request_obj = pull_request_obj
507 507 at_version = 'latest'
508 508 elif version:
509 509 pull_request_ver = PullRequestVersion.get_or_404(version)
510 510 pull_request_obj = pull_request_ver
511 511 _org_pull_request_obj = pull_request_ver.pull_request
512 512 at_version = pull_request_ver.pull_request_version_id
513 513 else:
514 514 _org_pull_request_obj = pull_request_obj = PullRequest.get_or_404(
515 515 pull_request_id)
516 516
517 517 pull_request_display_obj = PullRequest.get_pr_display_object(
518 518 pull_request_obj, _org_pull_request_obj)
519 519
520 520 return _org_pull_request_obj, pull_request_obj, \
521 521 pull_request_display_obj, at_version
522 522
523 523 def _get_diffset(
524 524 self, source_repo, source_ref_id, target_ref_id, target_commit,
525 525 source_commit, diff_limit, file_limit, display_inline_comments):
526 526 vcs_diff = PullRequestModel().get_diff(
527 527 source_repo, source_ref_id, target_ref_id)
528 528
529 529 diff_processor = diffs.DiffProcessor(
530 530 vcs_diff, format='newdiff', diff_limit=diff_limit,
531 531 file_limit=file_limit, show_full_diff=c.fulldiff)
532 532
533 533 _parsed = diff_processor.prepare()
534 534
535 535 def _node_getter(commit):
536 536 def get_node(fname):
537 537 try:
538 538 return commit.get_node(fname)
539 539 except NodeDoesNotExistError:
540 540 return None
541 541
542 542 return get_node
543 543
544 544 diffset = codeblocks.DiffSet(
545 545 repo_name=c.repo_name,
546 546 source_repo_name=c.source_repo.repo_name,
547 547 source_node_getter=_node_getter(target_commit),
548 548 target_node_getter=_node_getter(source_commit),
549 549 comments=display_inline_comments
550 550 )
551 551 diffset = diffset.render_patchset(
552 552 _parsed, target_commit.raw_id, source_commit.raw_id)
553 553
554 554 return diffset
555 555
556 556 @LoginRequired()
557 557 @HasRepoPermissionAnyDecorator('repository.read', 'repository.write',
558 558 'repository.admin')
559 559 def show(self, repo_name, pull_request_id):
560 560 pull_request_id = safe_int(pull_request_id)
561 561 version = request.GET.get('version')
562 562 from_version = request.GET.get('from_version') or version
563 563 merge_checks = request.GET.get('merge_checks')
564 564 c.fulldiff = str2bool(request.GET.get('fulldiff'))
565 565
566 566 (pull_request_latest,
567 567 pull_request_at_ver,
568 568 pull_request_display_obj,
569 569 at_version) = self._get_pr_version(
570 570 pull_request_id, version=version)
571 571 pr_closed = pull_request_latest.is_closed()
572 572
573 573 if pr_closed and (version or from_version):
574 574 # not allow to browse versions
575 575 return redirect(h.url('pullrequest_show', repo_name=repo_name,
576 576 pull_request_id=pull_request_id))
577 577
578 578 versions = pull_request_display_obj.versions()
579 579
580 580 c.at_version = at_version
581 581 c.at_version_num = (at_version
582 582 if at_version and at_version != 'latest'
583 583 else None)
584 584 c.at_version_pos = ChangesetComment.get_index_from_version(
585 585 c.at_version_num, versions)
586 586
587 587 (prev_pull_request_latest,
588 588 prev_pull_request_at_ver,
589 589 prev_pull_request_display_obj,
590 590 prev_at_version) = self._get_pr_version(
591 591 pull_request_id, version=from_version)
592 592
593 593 c.from_version = prev_at_version
594 594 c.from_version_num = (prev_at_version
595 595 if prev_at_version and prev_at_version != 'latest'
596 596 else None)
597 597 c.from_version_pos = ChangesetComment.get_index_from_version(
598 598 c.from_version_num, versions)
599 599
600 600 # define if we're in COMPARE mode or VIEW at version mode
601 601 compare = at_version != prev_at_version
602 602
603 603 # pull_requests repo_name we opened it against
604 604 # ie. target_repo must match
605 605 if repo_name != pull_request_at_ver.target_repo.repo_name:
606 606 raise HTTPNotFound
607 607
608 608 c.shadow_clone_url = PullRequestModel().get_shadow_clone_url(
609 609 pull_request_at_ver)
610 610
611 611 c.pull_request = pull_request_display_obj
612 612 c.pull_request_latest = pull_request_latest
613 613
614 614 if compare or (at_version and not at_version == 'latest'):
615 615 c.allowed_to_change_status = False
616 616 c.allowed_to_update = False
617 617 c.allowed_to_merge = False
618 618 c.allowed_to_delete = False
619 619 c.allowed_to_comment = False
620 620 c.allowed_to_close = False
621 621 else:
622 622 can_change_status = PullRequestModel().check_user_change_status(
623 623 pull_request_at_ver, c.rhodecode_user)
624 624 c.allowed_to_change_status = can_change_status and not pr_closed
625 625
626 626 c.allowed_to_update = PullRequestModel().check_user_update(
627 627 pull_request_latest, c.rhodecode_user) and not pr_closed
628 628 c.allowed_to_merge = PullRequestModel().check_user_merge(
629 629 pull_request_latest, c.rhodecode_user) and not pr_closed
630 630 c.allowed_to_delete = PullRequestModel().check_user_delete(
631 631 pull_request_latest, c.rhodecode_user) and not pr_closed
632 632 c.allowed_to_comment = not pr_closed
633 633 c.allowed_to_close = c.allowed_to_merge and not pr_closed
634 634
635 635 c.forbid_adding_reviewers = False
636 636 c.forbid_author_to_review = False
637 c.forbid_commit_author_to_review = False
637 638
638 639 if pull_request_latest.reviewer_data and \
639 640 'rules' in pull_request_latest.reviewer_data:
640 641 rules = pull_request_latest.reviewer_data['rules'] or {}
641 642 try:
642 c.forbid_adding_reviewers = rules.get('forbid_adding_reviewers')
643 c.forbid_author_to_review = rules.get('forbid_author_to_review')
643 c.forbid_adding_reviewers = rules.get(
644 'forbid_adding_reviewers')
645 c.forbid_author_to_review = rules.get(
646 'forbid_author_to_review')
647 c.forbid_commit_author_to_review = rules.get(
648 'forbid_commit_author_to_review')
644 649 except Exception:
645 650 pass
646 651
647 652 # check merge capabilities
648 653 _merge_check = MergeCheck.validate(
649 654 pull_request_latest, user=c.rhodecode_user)
650 655 c.pr_merge_errors = _merge_check.error_details
651 656 c.pr_merge_possible = not _merge_check.failed
652 657 c.pr_merge_message = _merge_check.merge_msg
653 658
654 659 c.pull_request_review_status = _merge_check.review_status
655 660 if merge_checks:
656 661 return render('/pullrequests/pullrequest_merge_checks.mako')
657 662
658 663 comments_model = CommentsModel()
659 664
660 665 # reviewers and statuses
661 666 c.pull_request_reviewers = pull_request_at_ver.reviewers_statuses()
662 667 allowed_reviewers = [x[0].user_id for x in c.pull_request_reviewers]
663 668
664 669 # GENERAL COMMENTS with versions #
665 670 q = comments_model._all_general_comments_of_pull_request(pull_request_latest)
666 671 q = q.order_by(ChangesetComment.comment_id.asc())
667 672 general_comments = q
668 673
669 674 # pick comments we want to render at current version
670 675 c.comment_versions = comments_model.aggregate_comments(
671 676 general_comments, versions, c.at_version_num)
672 677 c.comments = c.comment_versions[c.at_version_num]['until']
673 678
674 679 # INLINE COMMENTS with versions #
675 680 q = comments_model._all_inline_comments_of_pull_request(pull_request_latest)
676 681 q = q.order_by(ChangesetComment.comment_id.asc())
677 682 inline_comments = q
678 683
679 684 c.inline_versions = comments_model.aggregate_comments(
680 685 inline_comments, versions, c.at_version_num, inline=True)
681 686
682 687 # inject latest version
683 688 latest_ver = PullRequest.get_pr_display_object(
684 689 pull_request_latest, pull_request_latest)
685 690
686 691 c.versions = versions + [latest_ver]
687 692
688 693 # if we use version, then do not show later comments
689 694 # than current version
690 695 display_inline_comments = collections.defaultdict(
691 696 lambda: collections.defaultdict(list))
692 697 for co in inline_comments:
693 698 if c.at_version_num:
694 699 # pick comments that are at least UPTO given version, so we
695 700 # don't render comments for higher version
696 701 should_render = co.pull_request_version_id and \
697 702 co.pull_request_version_id <= c.at_version_num
698 703 else:
699 704 # showing all, for 'latest'
700 705 should_render = True
701 706
702 707 if should_render:
703 708 display_inline_comments[co.f_path][co.line_no].append(co)
704 709
705 710 # load diff data into template context, if we use compare mode then
706 711 # diff is calculated based on changes between versions of PR
707 712
708 713 source_repo = pull_request_at_ver.source_repo
709 714 source_ref_id = pull_request_at_ver.source_ref_parts.commit_id
710 715
711 716 target_repo = pull_request_at_ver.target_repo
712 717 target_ref_id = pull_request_at_ver.target_ref_parts.commit_id
713 718
714 719 if compare:
715 720 # in compare switch the diff base to latest commit from prev version
716 721 target_ref_id = prev_pull_request_display_obj.revisions[0]
717 722
718 723 # despite opening commits for bookmarks/branches/tags, we always
719 724 # convert this to rev to prevent changes after bookmark or branch change
720 725 c.source_ref_type = 'rev'
721 726 c.source_ref = source_ref_id
722 727
723 728 c.target_ref_type = 'rev'
724 729 c.target_ref = target_ref_id
725 730
726 731 c.source_repo = source_repo
727 732 c.target_repo = target_repo
728 733
729 734 # diff_limit is the old behavior, will cut off the whole diff
730 735 # if the limit is applied otherwise will just hide the
731 736 # big files from the front-end
732 737 diff_limit = self.cut_off_limit_diff
733 738 file_limit = self.cut_off_limit_file
734 739
735 740 c.commit_ranges = []
736 741 source_commit = EmptyCommit()
737 742 target_commit = EmptyCommit()
738 743 c.missing_requirements = False
739 744
740 745 source_scm = source_repo.scm_instance()
741 746 target_scm = target_repo.scm_instance()
742 747
743 748 # try first shadow repo, fallback to regular repo
744 749 try:
745 750 commits_source_repo = pull_request_latest.get_shadow_repo()
746 751 except Exception:
747 752 log.debug('Failed to get shadow repo', exc_info=True)
748 753 commits_source_repo = source_scm
749 754
750 755 c.commits_source_repo = commits_source_repo
751 756 commit_cache = {}
752 757 try:
753 758 pre_load = ["author", "branch", "date", "message"]
754 759 show_revs = pull_request_at_ver.revisions
755 760 for rev in show_revs:
756 761 comm = commits_source_repo.get_commit(
757 762 commit_id=rev, pre_load=pre_load)
758 763 c.commit_ranges.append(comm)
759 764 commit_cache[comm.raw_id] = comm
760 765
761 766 # Order here matters, we first need to get target, and then
762 767 # the source
763 768 target_commit = commits_source_repo.get_commit(
764 769 commit_id=safe_str(target_ref_id))
765 770
766 771 source_commit = commits_source_repo.get_commit(
767 772 commit_id=safe_str(source_ref_id))
768 773
769 774 except CommitDoesNotExistError:
770 775 log.warning(
771 776 'Failed to get commit from `{}` repo'.format(
772 777 commits_source_repo), exc_info=True)
773 778 except RepositoryRequirementError:
774 779 log.warning(
775 780 'Failed to get all required data from repo', exc_info=True)
776 781 c.missing_requirements = True
777 782
778 783 c.ancestor = None # set it to None, to hide it from PR view
779 784
780 785 try:
781 786 ancestor_id = source_scm.get_common_ancestor(
782 787 source_commit.raw_id, target_commit.raw_id, target_scm)
783 788 c.ancestor_commit = source_scm.get_commit(ancestor_id)
784 789 except Exception:
785 790 c.ancestor_commit = None
786 791
787 792 c.statuses = source_repo.statuses(
788 793 [x.raw_id for x in c.commit_ranges])
789 794
790 795 # auto collapse if we have more than limit
791 796 collapse_limit = diffs.DiffProcessor._collapse_commits_over
792 797 c.collapse_all_commits = len(c.commit_ranges) > collapse_limit
793 798 c.compare_mode = compare
794 799
795 800 c.missing_commits = False
796 801 if (c.missing_requirements or isinstance(source_commit, EmptyCommit)
797 802 or source_commit == target_commit):
798 803
799 804 c.missing_commits = True
800 805 else:
801 806
802 807 c.diffset = self._get_diffset(
803 808 commits_source_repo, source_ref_id, target_ref_id,
804 809 target_commit, source_commit,
805 810 diff_limit, file_limit, display_inline_comments)
806 811
807 812 c.limited_diff = c.diffset.limited_diff
808 813
809 814 # calculate removed files that are bound to comments
810 815 comment_deleted_files = [
811 816 fname for fname in display_inline_comments
812 817 if fname not in c.diffset.file_stats]
813 818
814 819 c.deleted_files_comments = collections.defaultdict(dict)
815 820 for fname, per_line_comments in display_inline_comments.items():
816 821 if fname in comment_deleted_files:
817 822 c.deleted_files_comments[fname]['stats'] = 0
818 823 c.deleted_files_comments[fname]['comments'] = list()
819 824 for lno, comments in per_line_comments.items():
820 825 c.deleted_files_comments[fname]['comments'].extend(
821 826 comments)
822 827
823 828 # this is a hack to properly display links, when creating PR, the
824 829 # compare view and others uses different notation, and
825 830 # compare_commits.mako renders links based on the target_repo.
826 831 # We need to swap that here to generate it properly on the html side
827 832 c.target_repo = c.source_repo
828 833
829 834 c.commit_statuses = ChangesetStatus.STATUSES
830 835
831 836 c.show_version_changes = not pr_closed
832 837 if c.show_version_changes:
833 838 cur_obj = pull_request_at_ver
834 839 prev_obj = prev_pull_request_at_ver
835 840
836 841 old_commit_ids = prev_obj.revisions
837 842 new_commit_ids = cur_obj.revisions
838 843 commit_changes = PullRequestModel()._calculate_commit_id_changes(
839 844 old_commit_ids, new_commit_ids)
840 845 c.commit_changes_summary = commit_changes
841 846
842 847 # calculate the diff for commits between versions
843 848 c.commit_changes = []
844 849 mark = lambda cs, fw: list(
845 850 h.itertools.izip_longest([], cs, fillvalue=fw))
846 851 for c_type, raw_id in mark(commit_changes.added, 'a') \
847 852 + mark(commit_changes.removed, 'r') \
848 853 + mark(commit_changes.common, 'c'):
849 854
850 855 if raw_id in commit_cache:
851 856 commit = commit_cache[raw_id]
852 857 else:
853 858 try:
854 859 commit = commits_source_repo.get_commit(raw_id)
855 860 except CommitDoesNotExistError:
856 861 # in case we fail extracting still use "dummy" commit
857 862 # for display in commit diff
858 863 commit = h.AttributeDict(
859 864 {'raw_id': raw_id,
860 865 'message': 'EMPTY or MISSING COMMIT'})
861 866 c.commit_changes.append([c_type, commit])
862 867
863 868 # current user review statuses for each version
864 869 c.review_versions = {}
865 870 if c.rhodecode_user.user_id in allowed_reviewers:
866 871 for co in general_comments:
867 872 if co.author.user_id == c.rhodecode_user.user_id:
868 873 # each comment has a status change
869 874 status = co.status_change
870 875 if status:
871 876 _ver_pr = status[0].comment.pull_request_version_id
872 877 c.review_versions[_ver_pr] = status[0]
873 878
874 879 return render('/pullrequests/pullrequest_show.mako')
875 880
876 881 @LoginRequired()
877 882 @NotAnonymous()
878 883 @HasRepoPermissionAnyDecorator(
879 884 'repository.read', 'repository.write', 'repository.admin')
880 885 @auth.CSRFRequired()
881 886 @jsonify
882 887 def comment(self, repo_name, pull_request_id):
883 888 pull_request_id = safe_int(pull_request_id)
884 889 pull_request = PullRequest.get_or_404(pull_request_id)
885 890 if pull_request.is_closed():
886 891 raise HTTPForbidden()
887 892
888 893 status = request.POST.get('changeset_status', None)
889 894 text = request.POST.get('text')
890 895 comment_type = request.POST.get('comment_type')
891 896 resolves_comment_id = request.POST.get('resolves_comment_id', None)
892 897 close_pull_request = request.POST.get('close_pull_request')
893 898
894 899 close_pr = False
895 900 # only owner or admin or person with write permissions
896 901 allowed_to_close = PullRequestModel().check_user_update(
897 902 pull_request, c.rhodecode_user)
898 903
899 904 if close_pull_request and allowed_to_close:
900 905 close_pr = True
901 906 pull_request_review_status = pull_request.calculated_review_status()
902 907 if pull_request_review_status == ChangesetStatus.STATUS_APPROVED:
903 908 # approved only if we have voting consent
904 909 status = ChangesetStatus.STATUS_APPROVED
905 910 else:
906 911 status = ChangesetStatus.STATUS_REJECTED
907 912
908 913 allowed_to_change_status = PullRequestModel().check_user_change_status(
909 914 pull_request, c.rhodecode_user)
910 915
911 916 if status and allowed_to_change_status:
912 917 message = (_('Status change %(transition_icon)s %(status)s')
913 918 % {'transition_icon': '>',
914 919 'status': ChangesetStatus.get_status_lbl(status)})
915 920 if close_pr:
916 921 message = _('Closing with') + ' ' + message
917 922 text = text or message
918 923 comm = CommentsModel().create(
919 924 text=text,
920 925 repo=c.rhodecode_db_repo.repo_id,
921 926 user=c.rhodecode_user.user_id,
922 927 pull_request=pull_request_id,
923 928 f_path=request.POST.get('f_path'),
924 929 line_no=request.POST.get('line'),
925 930 status_change=(ChangesetStatus.get_status_lbl(status)
926 931 if status and allowed_to_change_status else None),
927 932 status_change_type=(status
928 933 if status and allowed_to_change_status else None),
929 934 closing_pr=close_pr,
930 935 comment_type=comment_type,
931 936 resolves_comment_id=resolves_comment_id
932 937 )
933 938
934 939 if allowed_to_change_status:
935 940 old_calculated_status = pull_request.calculated_review_status()
936 941 # get status if set !
937 942 if status:
938 943 ChangesetStatusModel().set_status(
939 944 c.rhodecode_db_repo.repo_id,
940 945 status,
941 946 c.rhodecode_user.user_id,
942 947 comm,
943 948 pull_request=pull_request_id
944 949 )
945 950
946 951 Session().flush()
947 952 events.trigger(events.PullRequestCommentEvent(pull_request, comm))
948 953 # we now calculate the status of pull request, and based on that
949 954 # calculation we set the commits status
950 955 calculated_status = pull_request.calculated_review_status()
951 956 if old_calculated_status != calculated_status:
952 957 PullRequestModel()._trigger_pull_request_hook(
953 958 pull_request, c.rhodecode_user, 'review_status_change')
954 959
955 960 calculated_status_lbl = ChangesetStatus.get_status_lbl(
956 961 calculated_status)
957 962
958 963 if close_pr:
959 964 status_completed = (
960 965 calculated_status in [ChangesetStatus.STATUS_APPROVED,
961 966 ChangesetStatus.STATUS_REJECTED])
962 967 if close_pull_request or status_completed:
963 968 PullRequestModel().close_pull_request(
964 969 pull_request_id, c.rhodecode_user)
965 970 else:
966 971 h.flash(_('Closing pull request on other statuses than '
967 972 'rejected or approved is forbidden. '
968 973 'Calculated status from all reviewers '
969 974 'is currently: %s') % calculated_status_lbl,
970 975 category='warning')
971 976
972 977 Session().commit()
973 978
974 979 if not request.is_xhr:
975 980 return redirect(h.url('pullrequest_show', repo_name=repo_name,
976 981 pull_request_id=pull_request_id))
977 982
978 983 data = {
979 984 'target_id': h.safeid(h.safe_unicode(request.POST.get('f_path'))),
980 985 }
981 986 if comm:
982 987 c.co = comm
983 988 c.inline_comment = True if comm.line_no else False
984 989 data.update(comm.get_dict())
985 990 data.update({'rendered_text':
986 991 render('changeset/changeset_comment_block.mako')})
987 992
988 993 return data
989 994
990 995 @LoginRequired()
991 996 @NotAnonymous()
992 997 @HasRepoPermissionAnyDecorator('repository.read', 'repository.write',
993 998 'repository.admin')
994 999 @auth.CSRFRequired()
995 1000 @jsonify
996 1001 def delete_comment(self, repo_name, comment_id):
997 1002 return self._delete_comment(comment_id)
998 1003
999 1004 def _delete_comment(self, comment_id):
1000 1005 comment_id = safe_int(comment_id)
1001 1006 co = ChangesetComment.get_or_404(comment_id)
1002 1007 if co.pull_request.is_closed():
1003 1008 # don't allow deleting comments on closed pull request
1004 1009 raise HTTPForbidden()
1005 1010
1006 1011 is_owner = co.author.user_id == c.rhodecode_user.user_id
1007 1012 is_repo_admin = h.HasRepoPermissionAny('repository.admin')(c.repo_name)
1008 1013 if h.HasPermissionAny('hg.admin')() or is_repo_admin or is_owner:
1009 1014 old_calculated_status = co.pull_request.calculated_review_status()
1010 1015 CommentsModel().delete(comment=co)
1011 1016 Session().commit()
1012 1017 calculated_status = co.pull_request.calculated_review_status()
1013 1018 if old_calculated_status != calculated_status:
1014 1019 PullRequestModel()._trigger_pull_request_hook(
1015 1020 co.pull_request, c.rhodecode_user, 'review_status_change')
1016 1021 return True
1017 1022 else:
1018 1023 raise HTTPForbidden()
@@ -1,4025 +1,4026 b''
1 1 # -*- coding: utf-8 -*-
2 2
3 3 # Copyright (C) 2010-2017 RhodeCode GmbH
4 4 #
5 5 # This program is free software: you can redistribute it and/or modify
6 6 # it under the terms of the GNU Affero General Public License, version 3
7 7 # (only), as published by the Free Software Foundation.
8 8 #
9 9 # This program is distributed in the hope that it will be useful,
10 10 # but WITHOUT ANY WARRANTY; without even the implied warranty of
11 11 # MERCHANTABILITY or FITNESS FOR A PARTICULAR PURPOSE. See the
12 12 # GNU General Public License for more details.
13 13 #
14 14 # You should have received a copy of the GNU Affero General Public License
15 15 # along with this program. If not, see <http://www.gnu.org/licenses/>.
16 16 #
17 17 # This program is dual-licensed. If you wish to learn more about the
18 18 # RhodeCode Enterprise Edition, including its added features, Support services,
19 19 # and proprietary license terms, please see https://rhodecode.com/licenses/
20 20
21 21 """
22 22 Database Models for RhodeCode Enterprise
23 23 """
24 24
25 25 import re
26 26 import os
27 27 import time
28 28 import hashlib
29 29 import logging
30 30 import datetime
31 31 import warnings
32 32 import ipaddress
33 33 import functools
34 34 import traceback
35 35 import collections
36 36
37 37
38 38 from sqlalchemy import *
39 39 from sqlalchemy.ext.declarative import declared_attr
40 40 from sqlalchemy.ext.hybrid import hybrid_property
41 41 from sqlalchemy.orm import (
42 42 relationship, joinedload, class_mapper, validates, aliased)
43 43 from sqlalchemy.sql.expression import true
44 44 from beaker.cache import cache_region
45 45 from zope.cachedescriptors.property import Lazy as LazyProperty
46 46
47 47 from pylons.i18n.translation import lazy_ugettext as _
48 48 from pyramid.threadlocal import get_current_request
49 49
50 50 from rhodecode.lib.vcs import get_vcs_instance
51 51 from rhodecode.lib.vcs.backends.base import EmptyCommit, Reference
52 52 from rhodecode.lib.utils2 import (
53 53 str2bool, safe_str, get_commit_safe, safe_unicode, md5_safe,
54 54 time_to_datetime, aslist, Optional, safe_int, get_clone_url, AttributeDict,
55 55 glob2re, StrictAttributeDict, cleaned_uri)
56 56 from rhodecode.lib.jsonalchemy import MutationObj, MutationList, JsonType
57 57 from rhodecode.lib.ext_json import json
58 58 from rhodecode.lib.caching_query import FromCache
59 59 from rhodecode.lib.encrypt import AESCipher
60 60
61 61 from rhodecode.model.meta import Base, Session
62 62
63 63 URL_SEP = '/'
64 64 log = logging.getLogger(__name__)
65 65
66 66 # =============================================================================
67 67 # BASE CLASSES
68 68 # =============================================================================
69 69
70 70 # this is propagated from .ini file rhodecode.encrypted_values.secret or
71 71 # beaker.session.secret if first is not set.
72 72 # and initialized at environment.py
73 73 ENCRYPTION_KEY = None
74 74
75 75 # used to sort permissions by types, '#' used here is not allowed to be in
76 76 # usernames, and it's very early in sorted string.printable table.
77 77 PERMISSION_TYPE_SORT = {
78 78 'admin': '####',
79 79 'write': '###',
80 80 'read': '##',
81 81 'none': '#',
82 82 }
83 83
84 84
85 85 def display_sort(obj):
86 86 """
87 87 Sort function used to sort permissions in .permissions() function of
88 88 Repository, RepoGroup, UserGroup. Also it put the default user in front
89 89 of all other resources
90 90 """
91 91
92 92 if obj.username == User.DEFAULT_USER:
93 93 return '#####'
94 94 prefix = PERMISSION_TYPE_SORT.get(obj.permission.split('.')[-1], '')
95 95 return prefix + obj.username
96 96
97 97
98 98 def _hash_key(k):
99 99 return md5_safe(k)
100 100
101 101
102 102 class EncryptedTextValue(TypeDecorator):
103 103 """
104 104 Special column for encrypted long text data, use like::
105 105
106 106 value = Column("encrypted_value", EncryptedValue(), nullable=False)
107 107
108 108 This column is intelligent so if value is in unencrypted form it return
109 109 unencrypted form, but on save it always encrypts
110 110 """
111 111 impl = Text
112 112
113 113 def process_bind_param(self, value, dialect):
114 114 if not value:
115 115 return value
116 116 if value.startswith('enc$aes$') or value.startswith('enc$aes_hmac$'):
117 117 # protect against double encrypting if someone manually starts
118 118 # doing
119 119 raise ValueError('value needs to be in unencrypted format, ie. '
120 120 'not starting with enc$aes')
121 121 return 'enc$aes_hmac$%s' % AESCipher(
122 122 ENCRYPTION_KEY, hmac=True).encrypt(value)
123 123
124 124 def process_result_value(self, value, dialect):
125 125 import rhodecode
126 126
127 127 if not value:
128 128 return value
129 129
130 130 parts = value.split('$', 3)
131 131 if not len(parts) == 3:
132 132 # probably not encrypted values
133 133 return value
134 134 else:
135 135 if parts[0] != 'enc':
136 136 # parts ok but without our header ?
137 137 return value
138 138 enc_strict_mode = str2bool(rhodecode.CONFIG.get(
139 139 'rhodecode.encrypted_values.strict') or True)
140 140 # at that stage we know it's our encryption
141 141 if parts[1] == 'aes':
142 142 decrypted_data = AESCipher(ENCRYPTION_KEY).decrypt(parts[2])
143 143 elif parts[1] == 'aes_hmac':
144 144 decrypted_data = AESCipher(
145 145 ENCRYPTION_KEY, hmac=True,
146 146 strict_verification=enc_strict_mode).decrypt(parts[2])
147 147 else:
148 148 raise ValueError(
149 149 'Encryption type part is wrong, must be `aes` '
150 150 'or `aes_hmac`, got `%s` instead' % (parts[1]))
151 151 return decrypted_data
152 152
153 153
154 154 class BaseModel(object):
155 155 """
156 156 Base Model for all classes
157 157 """
158 158
159 159 @classmethod
160 160 def _get_keys(cls):
161 161 """return column names for this model """
162 162 return class_mapper(cls).c.keys()
163 163
164 164 def get_dict(self):
165 165 """
166 166 return dict with keys and values corresponding
167 167 to this model data """
168 168
169 169 d = {}
170 170 for k in self._get_keys():
171 171 d[k] = getattr(self, k)
172 172
173 173 # also use __json__() if present to get additional fields
174 174 _json_attr = getattr(self, '__json__', None)
175 175 if _json_attr:
176 176 # update with attributes from __json__
177 177 if callable(_json_attr):
178 178 _json_attr = _json_attr()
179 179 for k, val in _json_attr.iteritems():
180 180 d[k] = val
181 181 return d
182 182
183 183 def get_appstruct(self):
184 184 """return list with keys and values tuples corresponding
185 185 to this model data """
186 186
187 187 l = []
188 188 for k in self._get_keys():
189 189 l.append((k, getattr(self, k),))
190 190 return l
191 191
192 192 def populate_obj(self, populate_dict):
193 193 """populate model with data from given populate_dict"""
194 194
195 195 for k in self._get_keys():
196 196 if k in populate_dict:
197 197 setattr(self, k, populate_dict[k])
198 198
199 199 @classmethod
200 200 def query(cls):
201 201 return Session().query(cls)
202 202
203 203 @classmethod
204 204 def get(cls, id_):
205 205 if id_:
206 206 return cls.query().get(id_)
207 207
208 208 @classmethod
209 209 def get_or_404(cls, id_, pyramid_exc=False):
210 210 if pyramid_exc:
211 211 # NOTE(marcink): backward compat, once migration to pyramid
212 212 # this should only use pyramid exceptions
213 213 from pyramid.httpexceptions import HTTPNotFound
214 214 else:
215 215 from webob.exc import HTTPNotFound
216 216
217 217 try:
218 218 id_ = int(id_)
219 219 except (TypeError, ValueError):
220 220 raise HTTPNotFound
221 221
222 222 res = cls.query().get(id_)
223 223 if not res:
224 224 raise HTTPNotFound
225 225 return res
226 226
227 227 @classmethod
228 228 def getAll(cls):
229 229 # deprecated and left for backward compatibility
230 230 return cls.get_all()
231 231
232 232 @classmethod
233 233 def get_all(cls):
234 234 return cls.query().all()
235 235
236 236 @classmethod
237 237 def delete(cls, id_):
238 238 obj = cls.query().get(id_)
239 239 Session().delete(obj)
240 240
241 241 @classmethod
242 242 def identity_cache(cls, session, attr_name, value):
243 243 exist_in_session = []
244 244 for (item_cls, pkey), instance in session.identity_map.items():
245 245 if cls == item_cls and getattr(instance, attr_name) == value:
246 246 exist_in_session.append(instance)
247 247 if exist_in_session:
248 248 if len(exist_in_session) == 1:
249 249 return exist_in_session[0]
250 250 log.exception(
251 251 'multiple objects with attr %s and '
252 252 'value %s found with same name: %r',
253 253 attr_name, value, exist_in_session)
254 254
255 255 def __repr__(self):
256 256 if hasattr(self, '__unicode__'):
257 257 # python repr needs to return str
258 258 try:
259 259 return safe_str(self.__unicode__())
260 260 except UnicodeDecodeError:
261 261 pass
262 262 return '<DB:%s>' % (self.__class__.__name__)
263 263
264 264
265 265 class RhodeCodeSetting(Base, BaseModel):
266 266 __tablename__ = 'rhodecode_settings'
267 267 __table_args__ = (
268 268 UniqueConstraint('app_settings_name'),
269 269 {'extend_existing': True, 'mysql_engine': 'InnoDB',
270 270 'mysql_charset': 'utf8', 'sqlite_autoincrement': True}
271 271 )
272 272
273 273 SETTINGS_TYPES = {
274 274 'str': safe_str,
275 275 'int': safe_int,
276 276 'unicode': safe_unicode,
277 277 'bool': str2bool,
278 278 'list': functools.partial(aslist, sep=',')
279 279 }
280 280 DEFAULT_UPDATE_URL = 'https://rhodecode.com/api/v1/info/versions'
281 281 GLOBAL_CONF_KEY = 'app_settings'
282 282
283 283 app_settings_id = Column("app_settings_id", Integer(), nullable=False, unique=True, default=None, primary_key=True)
284 284 app_settings_name = Column("app_settings_name", String(255), nullable=True, unique=None, default=None)
285 285 _app_settings_value = Column("app_settings_value", String(4096), nullable=True, unique=None, default=None)
286 286 _app_settings_type = Column("app_settings_type", String(255), nullable=True, unique=None, default=None)
287 287
288 288 def __init__(self, key='', val='', type='unicode'):
289 289 self.app_settings_name = key
290 290 self.app_settings_type = type
291 291 self.app_settings_value = val
292 292
293 293 @validates('_app_settings_value')
294 294 def validate_settings_value(self, key, val):
295 295 assert type(val) == unicode
296 296 return val
297 297
298 298 @hybrid_property
299 299 def app_settings_value(self):
300 300 v = self._app_settings_value
301 301 _type = self.app_settings_type
302 302 if _type:
303 303 _type = self.app_settings_type.split('.')[0]
304 304 # decode the encrypted value
305 305 if 'encrypted' in self.app_settings_type:
306 306 cipher = EncryptedTextValue()
307 307 v = safe_unicode(cipher.process_result_value(v, None))
308 308
309 309 converter = self.SETTINGS_TYPES.get(_type) or \
310 310 self.SETTINGS_TYPES['unicode']
311 311 return converter(v)
312 312
313 313 @app_settings_value.setter
314 314 def app_settings_value(self, val):
315 315 """
316 316 Setter that will always make sure we use unicode in app_settings_value
317 317
318 318 :param val:
319 319 """
320 320 val = safe_unicode(val)
321 321 # encode the encrypted value
322 322 if 'encrypted' in self.app_settings_type:
323 323 cipher = EncryptedTextValue()
324 324 val = safe_unicode(cipher.process_bind_param(val, None))
325 325 self._app_settings_value = val
326 326
327 327 @hybrid_property
328 328 def app_settings_type(self):
329 329 return self._app_settings_type
330 330
331 331 @app_settings_type.setter
332 332 def app_settings_type(self, val):
333 333 if val.split('.')[0] not in self.SETTINGS_TYPES:
334 334 raise Exception('type must be one of %s got %s'
335 335 % (self.SETTINGS_TYPES.keys(), val))
336 336 self._app_settings_type = val
337 337
338 338 def __unicode__(self):
339 339 return u"<%s('%s:%s[%s]')>" % (
340 340 self.__class__.__name__,
341 341 self.app_settings_name, self.app_settings_value,
342 342 self.app_settings_type
343 343 )
344 344
345 345
346 346 class RhodeCodeUi(Base, BaseModel):
347 347 __tablename__ = 'rhodecode_ui'
348 348 __table_args__ = (
349 349 UniqueConstraint('ui_key'),
350 350 {'extend_existing': True, 'mysql_engine': 'InnoDB',
351 351 'mysql_charset': 'utf8', 'sqlite_autoincrement': True}
352 352 )
353 353
354 354 HOOK_REPO_SIZE = 'changegroup.repo_size'
355 355 # HG
356 356 HOOK_PRE_PULL = 'preoutgoing.pre_pull'
357 357 HOOK_PULL = 'outgoing.pull_logger'
358 358 HOOK_PRE_PUSH = 'prechangegroup.pre_push'
359 359 HOOK_PRETX_PUSH = 'pretxnchangegroup.pre_push'
360 360 HOOK_PUSH = 'changegroup.push_logger'
361 361 HOOK_PUSH_KEY = 'pushkey.key_push'
362 362
363 363 # TODO: johbo: Unify way how hooks are configured for git and hg,
364 364 # git part is currently hardcoded.
365 365
366 366 # SVN PATTERNS
367 367 SVN_BRANCH_ID = 'vcs_svn_branch'
368 368 SVN_TAG_ID = 'vcs_svn_tag'
369 369
370 370 ui_id = Column(
371 371 "ui_id", Integer(), nullable=False, unique=True, default=None,
372 372 primary_key=True)
373 373 ui_section = Column(
374 374 "ui_section", String(255), nullable=True, unique=None, default=None)
375 375 ui_key = Column(
376 376 "ui_key", String(255), nullable=True, unique=None, default=None)
377 377 ui_value = Column(
378 378 "ui_value", String(255), nullable=True, unique=None, default=None)
379 379 ui_active = Column(
380 380 "ui_active", Boolean(), nullable=True, unique=None, default=True)
381 381
382 382 def __repr__(self):
383 383 return '<%s[%s]%s=>%s]>' % (self.__class__.__name__, self.ui_section,
384 384 self.ui_key, self.ui_value)
385 385
386 386
387 387 class RepoRhodeCodeSetting(Base, BaseModel):
388 388 __tablename__ = 'repo_rhodecode_settings'
389 389 __table_args__ = (
390 390 UniqueConstraint(
391 391 'app_settings_name', 'repository_id',
392 392 name='uq_repo_rhodecode_setting_name_repo_id'),
393 393 {'extend_existing': True, 'mysql_engine': 'InnoDB',
394 394 'mysql_charset': 'utf8', 'sqlite_autoincrement': True}
395 395 )
396 396
397 397 repository_id = Column(
398 398 "repository_id", Integer(), ForeignKey('repositories.repo_id'),
399 399 nullable=False)
400 400 app_settings_id = Column(
401 401 "app_settings_id", Integer(), nullable=False, unique=True,
402 402 default=None, primary_key=True)
403 403 app_settings_name = Column(
404 404 "app_settings_name", String(255), nullable=True, unique=None,
405 405 default=None)
406 406 _app_settings_value = Column(
407 407 "app_settings_value", String(4096), nullable=True, unique=None,
408 408 default=None)
409 409 _app_settings_type = Column(
410 410 "app_settings_type", String(255), nullable=True, unique=None,
411 411 default=None)
412 412
413 413 repository = relationship('Repository')
414 414
415 415 def __init__(self, repository_id, key='', val='', type='unicode'):
416 416 self.repository_id = repository_id
417 417 self.app_settings_name = key
418 418 self.app_settings_type = type
419 419 self.app_settings_value = val
420 420
421 421 @validates('_app_settings_value')
422 422 def validate_settings_value(self, key, val):
423 423 assert type(val) == unicode
424 424 return val
425 425
426 426 @hybrid_property
427 427 def app_settings_value(self):
428 428 v = self._app_settings_value
429 429 type_ = self.app_settings_type
430 430 SETTINGS_TYPES = RhodeCodeSetting.SETTINGS_TYPES
431 431 converter = SETTINGS_TYPES.get(type_) or SETTINGS_TYPES['unicode']
432 432 return converter(v)
433 433
434 434 @app_settings_value.setter
435 435 def app_settings_value(self, val):
436 436 """
437 437 Setter that will always make sure we use unicode in app_settings_value
438 438
439 439 :param val:
440 440 """
441 441 self._app_settings_value = safe_unicode(val)
442 442
443 443 @hybrid_property
444 444 def app_settings_type(self):
445 445 return self._app_settings_type
446 446
447 447 @app_settings_type.setter
448 448 def app_settings_type(self, val):
449 449 SETTINGS_TYPES = RhodeCodeSetting.SETTINGS_TYPES
450 450 if val not in SETTINGS_TYPES:
451 451 raise Exception('type must be one of %s got %s'
452 452 % (SETTINGS_TYPES.keys(), val))
453 453 self._app_settings_type = val
454 454
455 455 def __unicode__(self):
456 456 return u"<%s('%s:%s:%s[%s]')>" % (
457 457 self.__class__.__name__, self.repository.repo_name,
458 458 self.app_settings_name, self.app_settings_value,
459 459 self.app_settings_type
460 460 )
461 461
462 462
463 463 class RepoRhodeCodeUi(Base, BaseModel):
464 464 __tablename__ = 'repo_rhodecode_ui'
465 465 __table_args__ = (
466 466 UniqueConstraint(
467 467 'repository_id', 'ui_section', 'ui_key',
468 468 name='uq_repo_rhodecode_ui_repository_id_section_key'),
469 469 {'extend_existing': True, 'mysql_engine': 'InnoDB',
470 470 'mysql_charset': 'utf8', 'sqlite_autoincrement': True}
471 471 )
472 472
473 473 repository_id = Column(
474 474 "repository_id", Integer(), ForeignKey('repositories.repo_id'),
475 475 nullable=False)
476 476 ui_id = Column(
477 477 "ui_id", Integer(), nullable=False, unique=True, default=None,
478 478 primary_key=True)
479 479 ui_section = Column(
480 480 "ui_section", String(255), nullable=True, unique=None, default=None)
481 481 ui_key = Column(
482 482 "ui_key", String(255), nullable=True, unique=None, default=None)
483 483 ui_value = Column(
484 484 "ui_value", String(255), nullable=True, unique=None, default=None)
485 485 ui_active = Column(
486 486 "ui_active", Boolean(), nullable=True, unique=None, default=True)
487 487
488 488 repository = relationship('Repository')
489 489
490 490 def __repr__(self):
491 491 return '<%s[%s:%s]%s=>%s]>' % (
492 492 self.__class__.__name__, self.repository.repo_name,
493 493 self.ui_section, self.ui_key, self.ui_value)
494 494
495 495
496 496 class User(Base, BaseModel):
497 497 __tablename__ = 'users'
498 498 __table_args__ = (
499 499 UniqueConstraint('username'), UniqueConstraint('email'),
500 500 Index('u_username_idx', 'username'),
501 501 Index('u_email_idx', 'email'),
502 502 {'extend_existing': True, 'mysql_engine': 'InnoDB',
503 503 'mysql_charset': 'utf8', 'sqlite_autoincrement': True}
504 504 )
505 505 DEFAULT_USER = 'default'
506 506 DEFAULT_USER_EMAIL = 'anonymous@rhodecode.org'
507 507 DEFAULT_GRAVATAR_URL = 'https://secure.gravatar.com/avatar/{md5email}?d=identicon&s={size}'
508 508
509 509 user_id = Column("user_id", Integer(), nullable=False, unique=True, default=None, primary_key=True)
510 510 username = Column("username", String(255), nullable=True, unique=None, default=None)
511 511 password = Column("password", String(255), nullable=True, unique=None, default=None)
512 512 active = Column("active", Boolean(), nullable=True, unique=None, default=True)
513 513 admin = Column("admin", Boolean(), nullable=True, unique=None, default=False)
514 514 name = Column("firstname", String(255), nullable=True, unique=None, default=None)
515 515 lastname = Column("lastname", String(255), nullable=True, unique=None, default=None)
516 516 _email = Column("email", String(255), nullable=True, unique=None, default=None)
517 517 last_login = Column("last_login", DateTime(timezone=False), nullable=True, unique=None, default=None)
518 518 last_activity = Column('last_activity', DateTime(timezone=False), nullable=True, unique=None, default=None)
519 519
520 520 extern_type = Column("extern_type", String(255), nullable=True, unique=None, default=None)
521 521 extern_name = Column("extern_name", String(255), nullable=True, unique=None, default=None)
522 522 _api_key = Column("api_key", String(255), nullable=True, unique=None, default=None)
523 523 inherit_default_permissions = Column("inherit_default_permissions", Boolean(), nullable=False, unique=None, default=True)
524 524 created_on = Column('created_on', DateTime(timezone=False), nullable=False, default=datetime.datetime.now)
525 525 _user_data = Column("user_data", LargeBinary(), nullable=True) # JSON data
526 526
527 527 user_log = relationship('UserLog')
528 528 user_perms = relationship('UserToPerm', primaryjoin="User.user_id==UserToPerm.user_id", cascade='all')
529 529
530 530 repositories = relationship('Repository')
531 531 repository_groups = relationship('RepoGroup')
532 532 user_groups = relationship('UserGroup')
533 533
534 534 user_followers = relationship('UserFollowing', primaryjoin='UserFollowing.follows_user_id==User.user_id', cascade='all')
535 535 followings = relationship('UserFollowing', primaryjoin='UserFollowing.user_id==User.user_id', cascade='all')
536 536
537 537 repo_to_perm = relationship('UserRepoToPerm', primaryjoin='UserRepoToPerm.user_id==User.user_id', cascade='all')
538 538 repo_group_to_perm = relationship('UserRepoGroupToPerm', primaryjoin='UserRepoGroupToPerm.user_id==User.user_id', cascade='all')
539 539 user_group_to_perm = relationship('UserUserGroupToPerm', primaryjoin='UserUserGroupToPerm.user_id==User.user_id', cascade='all')
540 540
541 541 group_member = relationship('UserGroupMember', cascade='all')
542 542
543 543 notifications = relationship('UserNotification', cascade='all')
544 544 # notifications assigned to this user
545 545 user_created_notifications = relationship('Notification', cascade='all')
546 546 # comments created by this user
547 547 user_comments = relationship('ChangesetComment', cascade='all')
548 548 # user profile extra info
549 549 user_emails = relationship('UserEmailMap', cascade='all')
550 550 user_ip_map = relationship('UserIpMap', cascade='all')
551 551 user_auth_tokens = relationship('UserApiKeys', cascade='all')
552 552 # gists
553 553 user_gists = relationship('Gist', cascade='all')
554 554 # user pull requests
555 555 user_pull_requests = relationship('PullRequest', cascade='all')
556 556 # external identities
557 557 extenal_identities = relationship(
558 558 'ExternalIdentity',
559 559 primaryjoin="User.user_id==ExternalIdentity.local_user_id",
560 560 cascade='all')
561 561
562 562 def __unicode__(self):
563 563 return u"<%s('id:%s:%s')>" % (self.__class__.__name__,
564 564 self.user_id, self.username)
565 565
566 566 @hybrid_property
567 567 def email(self):
568 568 return self._email
569 569
570 570 @email.setter
571 571 def email(self, val):
572 572 self._email = val.lower() if val else None
573 573
574 574 @hybrid_property
575 575 def api_key(self):
576 576 """
577 577 Fetch if exist an auth-token with role ALL connected to this user
578 578 """
579 579 user_auth_token = UserApiKeys.query()\
580 580 .filter(UserApiKeys.user_id == self.user_id)\
581 581 .filter(or_(UserApiKeys.expires == -1,
582 582 UserApiKeys.expires >= time.time()))\
583 583 .filter(UserApiKeys.role == UserApiKeys.ROLE_ALL).first()
584 584 if user_auth_token:
585 585 user_auth_token = user_auth_token.api_key
586 586
587 587 return user_auth_token
588 588
589 589 @api_key.setter
590 590 def api_key(self, val):
591 591 # don't allow to set API key this is deprecated for now
592 592 self._api_key = None
593 593
594 594 @property
595 595 def firstname(self):
596 596 # alias for future
597 597 return self.name
598 598
599 599 @property
600 600 def emails(self):
601 601 other = UserEmailMap.query().filter(UserEmailMap.user==self).all()
602 602 return [self.email] + [x.email for x in other]
603 603
604 604 @property
605 605 def auth_tokens(self):
606 606 return [x.api_key for x in self.extra_auth_tokens]
607 607
608 608 @property
609 609 def extra_auth_tokens(self):
610 610 return UserApiKeys.query().filter(UserApiKeys.user == self).all()
611 611
612 612 @property
613 613 def feed_token(self):
614 614 return self.get_feed_token()
615 615
616 616 def get_feed_token(self):
617 617 feed_tokens = UserApiKeys.query()\
618 618 .filter(UserApiKeys.user == self)\
619 619 .filter(UserApiKeys.role == UserApiKeys.ROLE_FEED)\
620 620 .all()
621 621 if feed_tokens:
622 622 return feed_tokens[0].api_key
623 623 return 'NO_FEED_TOKEN_AVAILABLE'
624 624
625 625 @classmethod
626 626 def extra_valid_auth_tokens(cls, user, role=None):
627 627 tokens = UserApiKeys.query().filter(UserApiKeys.user == user)\
628 628 .filter(or_(UserApiKeys.expires == -1,
629 629 UserApiKeys.expires >= time.time()))
630 630 if role:
631 631 tokens = tokens.filter(or_(UserApiKeys.role == role,
632 632 UserApiKeys.role == UserApiKeys.ROLE_ALL))
633 633 return tokens.all()
634 634
635 635 def authenticate_by_token(self, auth_token, roles=None, scope_repo_id=None):
636 636 from rhodecode.lib import auth
637 637
638 638 log.debug('Trying to authenticate user: %s via auth-token, '
639 639 'and roles: %s', self, roles)
640 640
641 641 if not auth_token:
642 642 return False
643 643
644 644 crypto_backend = auth.crypto_backend()
645 645
646 646 roles = (roles or []) + [UserApiKeys.ROLE_ALL]
647 647 tokens_q = UserApiKeys.query()\
648 648 .filter(UserApiKeys.user_id == self.user_id)\
649 649 .filter(or_(UserApiKeys.expires == -1,
650 650 UserApiKeys.expires >= time.time()))
651 651
652 652 tokens_q = tokens_q.filter(UserApiKeys.role.in_(roles))
653 653
654 654 plain_tokens = []
655 655 hash_tokens = []
656 656
657 657 for token in tokens_q.all():
658 658 # verify scope first
659 659 if token.repo_id:
660 660 # token has a scope, we need to verify it
661 661 if scope_repo_id != token.repo_id:
662 662 log.debug(
663 663 'Scope mismatch: token has a set repo scope: %s, '
664 664 'and calling scope is:%s, skipping further checks',
665 665 token.repo, scope_repo_id)
666 666 # token has a scope, and it doesn't match, skip token
667 667 continue
668 668
669 669 if token.api_key.startswith(crypto_backend.ENC_PREF):
670 670 hash_tokens.append(token.api_key)
671 671 else:
672 672 plain_tokens.append(token.api_key)
673 673
674 674 is_plain_match = auth_token in plain_tokens
675 675 if is_plain_match:
676 676 return True
677 677
678 678 for hashed in hash_tokens:
679 679 # TODO(marcink): this is expensive to calculate, but most secure
680 680 match = crypto_backend.hash_check(auth_token, hashed)
681 681 if match:
682 682 return True
683 683
684 684 return False
685 685
686 686 @property
687 687 def ip_addresses(self):
688 688 ret = UserIpMap.query().filter(UserIpMap.user == self).all()
689 689 return [x.ip_addr for x in ret]
690 690
691 691 @property
692 692 def username_and_name(self):
693 693 return '%s (%s %s)' % (self.username, self.firstname, self.lastname)
694 694
695 695 @property
696 696 def username_or_name_or_email(self):
697 697 full_name = self.full_name if self.full_name is not ' ' else None
698 698 return self.username or full_name or self.email
699 699
700 700 @property
701 701 def full_name(self):
702 702 return '%s %s' % (self.firstname, self.lastname)
703 703
704 704 @property
705 705 def full_name_or_username(self):
706 706 return ('%s %s' % (self.firstname, self.lastname)
707 707 if (self.firstname and self.lastname) else self.username)
708 708
709 709 @property
710 710 def full_contact(self):
711 711 return '%s %s <%s>' % (self.firstname, self.lastname, self.email)
712 712
713 713 @property
714 714 def short_contact(self):
715 715 return '%s %s' % (self.firstname, self.lastname)
716 716
717 717 @property
718 718 def is_admin(self):
719 719 return self.admin
720 720
721 721 @property
722 722 def AuthUser(self):
723 723 """
724 724 Returns instance of AuthUser for this user
725 725 """
726 726 from rhodecode.lib.auth import AuthUser
727 727 return AuthUser(user_id=self.user_id, username=self.username)
728 728
729 729 @hybrid_property
730 730 def user_data(self):
731 731 if not self._user_data:
732 732 return {}
733 733
734 734 try:
735 735 return json.loads(self._user_data)
736 736 except TypeError:
737 737 return {}
738 738
739 739 @user_data.setter
740 740 def user_data(self, val):
741 741 if not isinstance(val, dict):
742 742 raise Exception('user_data must be dict, got %s' % type(val))
743 743 try:
744 744 self._user_data = json.dumps(val)
745 745 except Exception:
746 746 log.error(traceback.format_exc())
747 747
748 748 @classmethod
749 749 def get_by_username(cls, username, case_insensitive=False,
750 750 cache=False, identity_cache=False):
751 751 session = Session()
752 752
753 753 if case_insensitive:
754 754 q = cls.query().filter(
755 755 func.lower(cls.username) == func.lower(username))
756 756 else:
757 757 q = cls.query().filter(cls.username == username)
758 758
759 759 if cache:
760 760 if identity_cache:
761 761 val = cls.identity_cache(session, 'username', username)
762 762 if val:
763 763 return val
764 764 else:
765 765 cache_key = "get_user_by_name_%s" % _hash_key(username)
766 766 q = q.options(
767 767 FromCache("sql_cache_short", cache_key))
768 768
769 769 return q.scalar()
770 770
771 771 @classmethod
772 772 def get_by_auth_token(cls, auth_token, cache=False):
773 773 q = UserApiKeys.query()\
774 774 .filter(UserApiKeys.api_key == auth_token)\
775 775 .filter(or_(UserApiKeys.expires == -1,
776 776 UserApiKeys.expires >= time.time()))
777 777 if cache:
778 778 q = q.options(
779 779 FromCache("sql_cache_short", "get_auth_token_%s" % auth_token))
780 780
781 781 match = q.first()
782 782 if match:
783 783 return match.user
784 784
785 785 @classmethod
786 786 def get_by_email(cls, email, case_insensitive=False, cache=False):
787 787
788 788 if case_insensitive:
789 789 q = cls.query().filter(func.lower(cls.email) == func.lower(email))
790 790
791 791 else:
792 792 q = cls.query().filter(cls.email == email)
793 793
794 794 email_key = _hash_key(email)
795 795 if cache:
796 796 q = q.options(
797 797 FromCache("sql_cache_short", "get_email_key_%s" % email_key))
798 798
799 799 ret = q.scalar()
800 800 if ret is None:
801 801 q = UserEmailMap.query()
802 802 # try fetching in alternate email map
803 803 if case_insensitive:
804 804 q = q.filter(func.lower(UserEmailMap.email) == func.lower(email))
805 805 else:
806 806 q = q.filter(UserEmailMap.email == email)
807 807 q = q.options(joinedload(UserEmailMap.user))
808 808 if cache:
809 809 q = q.options(
810 810 FromCache("sql_cache_short", "get_email_map_key_%s" % email_key))
811 811 ret = getattr(q.scalar(), 'user', None)
812 812
813 813 return ret
814 814
815 815 @classmethod
816 816 def get_from_cs_author(cls, author):
817 817 """
818 818 Tries to get User objects out of commit author string
819 819
820 820 :param author:
821 821 """
822 822 from rhodecode.lib.helpers import email, author_name
823 823 # Valid email in the attribute passed, see if they're in the system
824 824 _email = email(author)
825 825 if _email:
826 826 user = cls.get_by_email(_email, case_insensitive=True)
827 827 if user:
828 828 return user
829 829 # Maybe we can match by username?
830 830 _author = author_name(author)
831 831 user = cls.get_by_username(_author, case_insensitive=True)
832 832 if user:
833 833 return user
834 834
835 835 def update_userdata(self, **kwargs):
836 836 usr = self
837 837 old = usr.user_data
838 838 old.update(**kwargs)
839 839 usr.user_data = old
840 840 Session().add(usr)
841 841 log.debug('updated userdata with ', kwargs)
842 842
843 843 def update_lastlogin(self):
844 844 """Update user lastlogin"""
845 845 self.last_login = datetime.datetime.now()
846 846 Session().add(self)
847 847 log.debug('updated user %s lastlogin', self.username)
848 848
849 849 def update_lastactivity(self):
850 850 """Update user lastactivity"""
851 851 self.last_activity = datetime.datetime.now()
852 852 Session().add(self)
853 853 log.debug('updated user %s lastactivity', self.username)
854 854
855 855 def update_password(self, new_password):
856 856 from rhodecode.lib.auth import get_crypt_password
857 857
858 858 self.password = get_crypt_password(new_password)
859 859 Session().add(self)
860 860
861 861 @classmethod
862 862 def get_first_super_admin(cls):
863 863 user = User.query().filter(User.admin == true()).first()
864 864 if user is None:
865 865 raise Exception('FATAL: Missing administrative account!')
866 866 return user
867 867
868 868 @classmethod
869 869 def get_all_super_admins(cls):
870 870 """
871 871 Returns all admin accounts sorted by username
872 872 """
873 873 return User.query().filter(User.admin == true())\
874 874 .order_by(User.username.asc()).all()
875 875
876 876 @classmethod
877 877 def get_default_user(cls, cache=False, refresh=False):
878 878 user = User.get_by_username(User.DEFAULT_USER, cache=cache)
879 879 if user is None:
880 880 raise Exception('FATAL: Missing default account!')
881 881 if refresh:
882 882 # The default user might be based on outdated state which
883 883 # has been loaded from the cache.
884 884 # A call to refresh() ensures that the
885 885 # latest state from the database is used.
886 886 Session().refresh(user)
887 887 return user
888 888
889 889 def _get_default_perms(self, user, suffix=''):
890 890 from rhodecode.model.permission import PermissionModel
891 891 return PermissionModel().get_default_perms(user.user_perms, suffix)
892 892
893 893 def get_default_perms(self, suffix=''):
894 894 return self._get_default_perms(self, suffix)
895 895
896 896 def get_api_data(self, include_secrets=False, details='full'):
897 897 """
898 898 Common function for generating user related data for API
899 899
900 900 :param include_secrets: By default secrets in the API data will be replaced
901 901 by a placeholder value to prevent exposing this data by accident. In case
902 902 this data shall be exposed, set this flag to ``True``.
903 903
904 904 :param details: details can be 'basic|full' basic gives only a subset of
905 905 the available user information that includes user_id, name and emails.
906 906 """
907 907 user = self
908 908 user_data = self.user_data
909 909 data = {
910 910 'user_id': user.user_id,
911 911 'username': user.username,
912 912 'firstname': user.name,
913 913 'lastname': user.lastname,
914 914 'email': user.email,
915 915 'emails': user.emails,
916 916 }
917 917 if details == 'basic':
918 918 return data
919 919
920 920 api_key_length = 40
921 921 api_key_replacement = '*' * api_key_length
922 922
923 923 extras = {
924 924 'api_keys': [api_key_replacement],
925 925 'auth_tokens': [api_key_replacement],
926 926 'active': user.active,
927 927 'admin': user.admin,
928 928 'extern_type': user.extern_type,
929 929 'extern_name': user.extern_name,
930 930 'last_login': user.last_login,
931 931 'last_activity': user.last_activity,
932 932 'ip_addresses': user.ip_addresses,
933 933 'language': user_data.get('language')
934 934 }
935 935 data.update(extras)
936 936
937 937 if include_secrets:
938 938 data['api_keys'] = user.auth_tokens
939 939 data['auth_tokens'] = user.extra_auth_tokens
940 940 return data
941 941
942 942 def __json__(self):
943 943 data = {
944 944 'full_name': self.full_name,
945 945 'full_name_or_username': self.full_name_or_username,
946 946 'short_contact': self.short_contact,
947 947 'full_contact': self.full_contact,
948 948 }
949 949 data.update(self.get_api_data())
950 950 return data
951 951
952 952
953 953 class UserApiKeys(Base, BaseModel):
954 954 __tablename__ = 'user_api_keys'
955 955 __table_args__ = (
956 956 Index('uak_api_key_idx', 'api_key'),
957 957 Index('uak_api_key_expires_idx', 'api_key', 'expires'),
958 958 UniqueConstraint('api_key'),
959 959 {'extend_existing': True, 'mysql_engine': 'InnoDB',
960 960 'mysql_charset': 'utf8', 'sqlite_autoincrement': True}
961 961 )
962 962 __mapper_args__ = {}
963 963
964 964 # ApiKey role
965 965 ROLE_ALL = 'token_role_all'
966 966 ROLE_HTTP = 'token_role_http'
967 967 ROLE_VCS = 'token_role_vcs'
968 968 ROLE_API = 'token_role_api'
969 969 ROLE_FEED = 'token_role_feed'
970 970 ROLE_PASSWORD_RESET = 'token_password_reset'
971 971
972 972 ROLES = [ROLE_ALL, ROLE_HTTP, ROLE_VCS, ROLE_API, ROLE_FEED]
973 973
974 974 user_api_key_id = Column("user_api_key_id", Integer(), nullable=False, unique=True, default=None, primary_key=True)
975 975 user_id = Column("user_id", Integer(), ForeignKey('users.user_id'), nullable=True, unique=None, default=None)
976 976 api_key = Column("api_key", String(255), nullable=False, unique=True)
977 977 description = Column('description', UnicodeText().with_variant(UnicodeText(1024), 'mysql'))
978 978 expires = Column('expires', Float(53), nullable=False)
979 979 role = Column('role', String(255), nullable=True)
980 980 created_on = Column('created_on', DateTime(timezone=False), nullable=False, default=datetime.datetime.now)
981 981
982 982 # scope columns
983 983 repo_id = Column(
984 984 'repo_id', Integer(), ForeignKey('repositories.repo_id'),
985 985 nullable=True, unique=None, default=None)
986 986 repo = relationship('Repository', lazy='joined')
987 987
988 988 repo_group_id = Column(
989 989 'repo_group_id', Integer(), ForeignKey('groups.group_id'),
990 990 nullable=True, unique=None, default=None)
991 991 repo_group = relationship('RepoGroup', lazy='joined')
992 992
993 993 user = relationship('User', lazy='joined')
994 994
995 995 def __unicode__(self):
996 996 return u"<%s('%s')>" % (self.__class__.__name__, self.role)
997 997
998 998 def __json__(self):
999 999 data = {
1000 1000 'auth_token': self.api_key,
1001 1001 'role': self.role,
1002 1002 'scope': self.scope_humanized,
1003 1003 'expired': self.expired
1004 1004 }
1005 1005 return data
1006 1006
1007 1007 @property
1008 1008 def expired(self):
1009 1009 if self.expires == -1:
1010 1010 return False
1011 1011 return time.time() > self.expires
1012 1012
1013 1013 @classmethod
1014 1014 def _get_role_name(cls, role):
1015 1015 return {
1016 1016 cls.ROLE_ALL: _('all'),
1017 1017 cls.ROLE_HTTP: _('http/web interface'),
1018 1018 cls.ROLE_VCS: _('vcs (git/hg/svn protocol)'),
1019 1019 cls.ROLE_API: _('api calls'),
1020 1020 cls.ROLE_FEED: _('feed access'),
1021 1021 }.get(role, role)
1022 1022
1023 1023 @property
1024 1024 def role_humanized(self):
1025 1025 return self._get_role_name(self.role)
1026 1026
1027 1027 def _get_scope(self):
1028 1028 if self.repo:
1029 1029 return repr(self.repo)
1030 1030 if self.repo_group:
1031 1031 return repr(self.repo_group) + ' (recursive)'
1032 1032 return 'global'
1033 1033
1034 1034 @property
1035 1035 def scope_humanized(self):
1036 1036 return self._get_scope()
1037 1037
1038 1038
1039 1039 class UserEmailMap(Base, BaseModel):
1040 1040 __tablename__ = 'user_email_map'
1041 1041 __table_args__ = (
1042 1042 Index('uem_email_idx', 'email'),
1043 1043 UniqueConstraint('email'),
1044 1044 {'extend_existing': True, 'mysql_engine': 'InnoDB',
1045 1045 'mysql_charset': 'utf8', 'sqlite_autoincrement': True}
1046 1046 )
1047 1047 __mapper_args__ = {}
1048 1048
1049 1049 email_id = Column("email_id", Integer(), nullable=False, unique=True, default=None, primary_key=True)
1050 1050 user_id = Column("user_id", Integer(), ForeignKey('users.user_id'), nullable=True, unique=None, default=None)
1051 1051 _email = Column("email", String(255), nullable=True, unique=False, default=None)
1052 1052 user = relationship('User', lazy='joined')
1053 1053
1054 1054 @validates('_email')
1055 1055 def validate_email(self, key, email):
1056 1056 # check if this email is not main one
1057 1057 main_email = Session().query(User).filter(User.email == email).scalar()
1058 1058 if main_email is not None:
1059 1059 raise AttributeError('email %s is present is user table' % email)
1060 1060 return email
1061 1061
1062 1062 @hybrid_property
1063 1063 def email(self):
1064 1064 return self._email
1065 1065
1066 1066 @email.setter
1067 1067 def email(self, val):
1068 1068 self._email = val.lower() if val else None
1069 1069
1070 1070
1071 1071 class UserIpMap(Base, BaseModel):
1072 1072 __tablename__ = 'user_ip_map'
1073 1073 __table_args__ = (
1074 1074 UniqueConstraint('user_id', 'ip_addr'),
1075 1075 {'extend_existing': True, 'mysql_engine': 'InnoDB',
1076 1076 'mysql_charset': 'utf8', 'sqlite_autoincrement': True}
1077 1077 )
1078 1078 __mapper_args__ = {}
1079 1079
1080 1080 ip_id = Column("ip_id", Integer(), nullable=False, unique=True, default=None, primary_key=True)
1081 1081 user_id = Column("user_id", Integer(), ForeignKey('users.user_id'), nullable=True, unique=None, default=None)
1082 1082 ip_addr = Column("ip_addr", String(255), nullable=True, unique=False, default=None)
1083 1083 active = Column("active", Boolean(), nullable=True, unique=None, default=True)
1084 1084 description = Column("description", String(10000), nullable=True, unique=None, default=None)
1085 1085 user = relationship('User', lazy='joined')
1086 1086
1087 1087 @classmethod
1088 1088 def _get_ip_range(cls, ip_addr):
1089 1089 net = ipaddress.ip_network(ip_addr, strict=False)
1090 1090 return [str(net.network_address), str(net.broadcast_address)]
1091 1091
1092 1092 def __json__(self):
1093 1093 return {
1094 1094 'ip_addr': self.ip_addr,
1095 1095 'ip_range': self._get_ip_range(self.ip_addr),
1096 1096 }
1097 1097
1098 1098 def __unicode__(self):
1099 1099 return u"<%s('user_id:%s=>%s')>" % (self.__class__.__name__,
1100 1100 self.user_id, self.ip_addr)
1101 1101
1102 1102
1103 1103 class UserLog(Base, BaseModel):
1104 1104 __tablename__ = 'user_logs'
1105 1105 __table_args__ = (
1106 1106 {'extend_existing': True, 'mysql_engine': 'InnoDB',
1107 1107 'mysql_charset': 'utf8', 'sqlite_autoincrement': True},
1108 1108 )
1109 1109 VERSION_1 = 'v1'
1110 1110 VERSION_2 = 'v2'
1111 1111 VERSIONS = [VERSION_1, VERSION_2]
1112 1112
1113 1113 user_log_id = Column("user_log_id", Integer(), nullable=False, unique=True, default=None, primary_key=True)
1114 1114 user_id = Column("user_id", Integer(), ForeignKey('users.user_id'), nullable=True, unique=None, default=None)
1115 1115 username = Column("username", String(255), nullable=True, unique=None, default=None)
1116 1116 repository_id = Column("repository_id", Integer(), ForeignKey('repositories.repo_id'), nullable=True)
1117 1117 repository_name = Column("repository_name", String(255), nullable=True, unique=None, default=None)
1118 1118 user_ip = Column("user_ip", String(255), nullable=True, unique=None, default=None)
1119 1119 action = Column("action", Text().with_variant(Text(1200000), 'mysql'), nullable=True, unique=None, default=None)
1120 1120 action_date = Column("action_date", DateTime(timezone=False), nullable=True, unique=None, default=None)
1121 1121
1122 1122 version = Column("version", String(255), nullable=True, default=VERSION_1)
1123 1123 user_data = Column('user_data_json', MutationObj.as_mutable(JsonType(dialect_map=dict(mysql=UnicodeText(16384)))))
1124 1124 action_data = Column('action_data_json', MutationObj.as_mutable(JsonType(dialect_map=dict(mysql=UnicodeText(16384)))))
1125 1125
1126 1126 def __unicode__(self):
1127 1127 return u"<%s('id:%s:%s')>" % (
1128 1128 self.__class__.__name__, self.repository_name, self.action)
1129 1129
1130 1130 def __json__(self):
1131 1131 return {
1132 1132 'user_id': self.user_id,
1133 1133 'username': self.username,
1134 1134 'repository_id': self.repository_id,
1135 1135 'repository_name': self.repository_name,
1136 1136 'user_ip': self.user_ip,
1137 1137 'action_date': self.action_date,
1138 1138 'action': self.action,
1139 1139 }
1140 1140
1141 1141 @property
1142 1142 def action_as_day(self):
1143 1143 return datetime.date(*self.action_date.timetuple()[:3])
1144 1144
1145 1145 user = relationship('User')
1146 1146 repository = relationship('Repository', cascade='')
1147 1147
1148 1148
1149 1149 class UserGroup(Base, BaseModel):
1150 1150 __tablename__ = 'users_groups'
1151 1151 __table_args__ = (
1152 1152 {'extend_existing': True, 'mysql_engine': 'InnoDB',
1153 1153 'mysql_charset': 'utf8', 'sqlite_autoincrement': True},
1154 1154 )
1155 1155
1156 1156 users_group_id = Column("users_group_id", Integer(), nullable=False, unique=True, default=None, primary_key=True)
1157 1157 users_group_name = Column("users_group_name", String(255), nullable=False, unique=True, default=None)
1158 1158 user_group_description = Column("user_group_description", String(10000), nullable=True, unique=None, default=None)
1159 1159 users_group_active = Column("users_group_active", Boolean(), nullable=True, unique=None, default=None)
1160 1160 inherit_default_permissions = Column("users_group_inherit_default_permissions", Boolean(), nullable=False, unique=None, default=True)
1161 1161 user_id = Column("user_id", Integer(), ForeignKey('users.user_id'), nullable=False, unique=False, default=None)
1162 1162 created_on = Column('created_on', DateTime(timezone=False), nullable=False, default=datetime.datetime.now)
1163 1163 _group_data = Column("group_data", LargeBinary(), nullable=True) # JSON data
1164 1164
1165 1165 members = relationship('UserGroupMember', cascade="all, delete, delete-orphan", lazy="joined")
1166 1166 users_group_to_perm = relationship('UserGroupToPerm', cascade='all')
1167 1167 users_group_repo_to_perm = relationship('UserGroupRepoToPerm', cascade='all')
1168 1168 users_group_repo_group_to_perm = relationship('UserGroupRepoGroupToPerm', cascade='all')
1169 1169 user_user_group_to_perm = relationship('UserUserGroupToPerm', cascade='all')
1170 1170 user_group_user_group_to_perm = relationship('UserGroupUserGroupToPerm ', primaryjoin="UserGroupUserGroupToPerm.target_user_group_id==UserGroup.users_group_id", cascade='all')
1171 1171
1172 1172 user = relationship('User')
1173 1173
1174 1174 @hybrid_property
1175 1175 def group_data(self):
1176 1176 if not self._group_data:
1177 1177 return {}
1178 1178
1179 1179 try:
1180 1180 return json.loads(self._group_data)
1181 1181 except TypeError:
1182 1182 return {}
1183 1183
1184 1184 @group_data.setter
1185 1185 def group_data(self, val):
1186 1186 try:
1187 1187 self._group_data = json.dumps(val)
1188 1188 except Exception:
1189 1189 log.error(traceback.format_exc())
1190 1190
1191 1191 def __unicode__(self):
1192 1192 return u"<%s('id:%s:%s')>" % (self.__class__.__name__,
1193 1193 self.users_group_id,
1194 1194 self.users_group_name)
1195 1195
1196 1196 @classmethod
1197 1197 def get_by_group_name(cls, group_name, cache=False,
1198 1198 case_insensitive=False):
1199 1199 if case_insensitive:
1200 1200 q = cls.query().filter(func.lower(cls.users_group_name) ==
1201 1201 func.lower(group_name))
1202 1202
1203 1203 else:
1204 1204 q = cls.query().filter(cls.users_group_name == group_name)
1205 1205 if cache:
1206 1206 q = q.options(
1207 1207 FromCache("sql_cache_short", "get_group_%s" % _hash_key(group_name)))
1208 1208 return q.scalar()
1209 1209
1210 1210 @classmethod
1211 1211 def get(cls, user_group_id, cache=False):
1212 1212 user_group = cls.query()
1213 1213 if cache:
1214 1214 user_group = user_group.options(
1215 1215 FromCache("sql_cache_short", "get_users_group_%s" % user_group_id))
1216 1216 return user_group.get(user_group_id)
1217 1217
1218 1218 def permissions(self, with_admins=True, with_owner=True):
1219 1219 q = UserUserGroupToPerm.query().filter(UserUserGroupToPerm.user_group == self)
1220 1220 q = q.options(joinedload(UserUserGroupToPerm.user_group),
1221 1221 joinedload(UserUserGroupToPerm.user),
1222 1222 joinedload(UserUserGroupToPerm.permission),)
1223 1223
1224 1224 # get owners and admins and permissions. We do a trick of re-writing
1225 1225 # objects from sqlalchemy to named-tuples due to sqlalchemy session
1226 1226 # has a global reference and changing one object propagates to all
1227 1227 # others. This means if admin is also an owner admin_row that change
1228 1228 # would propagate to both objects
1229 1229 perm_rows = []
1230 1230 for _usr in q.all():
1231 1231 usr = AttributeDict(_usr.user.get_dict())
1232 1232 usr.permission = _usr.permission.permission_name
1233 1233 perm_rows.append(usr)
1234 1234
1235 1235 # filter the perm rows by 'default' first and then sort them by
1236 1236 # admin,write,read,none permissions sorted again alphabetically in
1237 1237 # each group
1238 1238 perm_rows = sorted(perm_rows, key=display_sort)
1239 1239
1240 1240 _admin_perm = 'usergroup.admin'
1241 1241 owner_row = []
1242 1242 if with_owner:
1243 1243 usr = AttributeDict(self.user.get_dict())
1244 1244 usr.owner_row = True
1245 1245 usr.permission = _admin_perm
1246 1246 owner_row.append(usr)
1247 1247
1248 1248 super_admin_rows = []
1249 1249 if with_admins:
1250 1250 for usr in User.get_all_super_admins():
1251 1251 # if this admin is also owner, don't double the record
1252 1252 if usr.user_id == owner_row[0].user_id:
1253 1253 owner_row[0].admin_row = True
1254 1254 else:
1255 1255 usr = AttributeDict(usr.get_dict())
1256 1256 usr.admin_row = True
1257 1257 usr.permission = _admin_perm
1258 1258 super_admin_rows.append(usr)
1259 1259
1260 1260 return super_admin_rows + owner_row + perm_rows
1261 1261
1262 1262 def permission_user_groups(self):
1263 1263 q = UserGroupUserGroupToPerm.query().filter(UserGroupUserGroupToPerm.target_user_group == self)
1264 1264 q = q.options(joinedload(UserGroupUserGroupToPerm.user_group),
1265 1265 joinedload(UserGroupUserGroupToPerm.target_user_group),
1266 1266 joinedload(UserGroupUserGroupToPerm.permission),)
1267 1267
1268 1268 perm_rows = []
1269 1269 for _user_group in q.all():
1270 1270 usr = AttributeDict(_user_group.user_group.get_dict())
1271 1271 usr.permission = _user_group.permission.permission_name
1272 1272 perm_rows.append(usr)
1273 1273
1274 1274 return perm_rows
1275 1275
1276 1276 def _get_default_perms(self, user_group, suffix=''):
1277 1277 from rhodecode.model.permission import PermissionModel
1278 1278 return PermissionModel().get_default_perms(user_group.users_group_to_perm, suffix)
1279 1279
1280 1280 def get_default_perms(self, suffix=''):
1281 1281 return self._get_default_perms(self, suffix)
1282 1282
1283 1283 def get_api_data(self, with_group_members=True, include_secrets=False):
1284 1284 """
1285 1285 :param include_secrets: See :meth:`User.get_api_data`, this parameter is
1286 1286 basically forwarded.
1287 1287
1288 1288 """
1289 1289 user_group = self
1290 1290 data = {
1291 1291 'users_group_id': user_group.users_group_id,
1292 1292 'group_name': user_group.users_group_name,
1293 1293 'group_description': user_group.user_group_description,
1294 1294 'active': user_group.users_group_active,
1295 1295 'owner': user_group.user.username,
1296 1296 'owner_email': user_group.user.email,
1297 1297 }
1298 1298
1299 1299 if with_group_members:
1300 1300 users = []
1301 1301 for user in user_group.members:
1302 1302 user = user.user
1303 1303 users.append(user.get_api_data(include_secrets=include_secrets))
1304 1304 data['users'] = users
1305 1305
1306 1306 return data
1307 1307
1308 1308
1309 1309 class UserGroupMember(Base, BaseModel):
1310 1310 __tablename__ = 'users_groups_members'
1311 1311 __table_args__ = (
1312 1312 {'extend_existing': True, 'mysql_engine': 'InnoDB',
1313 1313 'mysql_charset': 'utf8', 'sqlite_autoincrement': True},
1314 1314 )
1315 1315
1316 1316 users_group_member_id = Column("users_group_member_id", Integer(), nullable=False, unique=True, default=None, primary_key=True)
1317 1317 users_group_id = Column("users_group_id", Integer(), ForeignKey('users_groups.users_group_id'), nullable=False, unique=None, default=None)
1318 1318 user_id = Column("user_id", Integer(), ForeignKey('users.user_id'), nullable=False, unique=None, default=None)
1319 1319
1320 1320 user = relationship('User', lazy='joined')
1321 1321 users_group = relationship('UserGroup')
1322 1322
1323 1323 def __init__(self, gr_id='', u_id=''):
1324 1324 self.users_group_id = gr_id
1325 1325 self.user_id = u_id
1326 1326
1327 1327
1328 1328 class RepositoryField(Base, BaseModel):
1329 1329 __tablename__ = 'repositories_fields'
1330 1330 __table_args__ = (
1331 1331 UniqueConstraint('repository_id', 'field_key'), # no-multi field
1332 1332 {'extend_existing': True, 'mysql_engine': 'InnoDB',
1333 1333 'mysql_charset': 'utf8', 'sqlite_autoincrement': True},
1334 1334 )
1335 1335 PREFIX = 'ex_' # prefix used in form to not conflict with already existing fields
1336 1336
1337 1337 repo_field_id = Column("repo_field_id", Integer(), nullable=False, unique=True, default=None, primary_key=True)
1338 1338 repository_id = Column("repository_id", Integer(), ForeignKey('repositories.repo_id'), nullable=False, unique=None, default=None)
1339 1339 field_key = Column("field_key", String(250))
1340 1340 field_label = Column("field_label", String(1024), nullable=False)
1341 1341 field_value = Column("field_value", String(10000), nullable=False)
1342 1342 field_desc = Column("field_desc", String(1024), nullable=False)
1343 1343 field_type = Column("field_type", String(255), nullable=False, unique=None)
1344 1344 created_on = Column('created_on', DateTime(timezone=False), nullable=False, default=datetime.datetime.now)
1345 1345
1346 1346 repository = relationship('Repository')
1347 1347
1348 1348 @property
1349 1349 def field_key_prefixed(self):
1350 1350 return 'ex_%s' % self.field_key
1351 1351
1352 1352 @classmethod
1353 1353 def un_prefix_key(cls, key):
1354 1354 if key.startswith(cls.PREFIX):
1355 1355 return key[len(cls.PREFIX):]
1356 1356 return key
1357 1357
1358 1358 @classmethod
1359 1359 def get_by_key_name(cls, key, repo):
1360 1360 row = cls.query()\
1361 1361 .filter(cls.repository == repo)\
1362 1362 .filter(cls.field_key == key).scalar()
1363 1363 return row
1364 1364
1365 1365
1366 1366 class Repository(Base, BaseModel):
1367 1367 __tablename__ = 'repositories'
1368 1368 __table_args__ = (
1369 1369 Index('r_repo_name_idx', 'repo_name', mysql_length=255),
1370 1370 {'extend_existing': True, 'mysql_engine': 'InnoDB',
1371 1371 'mysql_charset': 'utf8', 'sqlite_autoincrement': True},
1372 1372 )
1373 1373 DEFAULT_CLONE_URI = '{scheme}://{user}@{netloc}/{repo}'
1374 1374 DEFAULT_CLONE_URI_ID = '{scheme}://{user}@{netloc}/_{repoid}'
1375 1375
1376 1376 STATE_CREATED = 'repo_state_created'
1377 1377 STATE_PENDING = 'repo_state_pending'
1378 1378 STATE_ERROR = 'repo_state_error'
1379 1379
1380 1380 LOCK_AUTOMATIC = 'lock_auto'
1381 1381 LOCK_API = 'lock_api'
1382 1382 LOCK_WEB = 'lock_web'
1383 1383 LOCK_PULL = 'lock_pull'
1384 1384
1385 1385 NAME_SEP = URL_SEP
1386 1386
1387 1387 repo_id = Column(
1388 1388 "repo_id", Integer(), nullable=False, unique=True, default=None,
1389 1389 primary_key=True)
1390 1390 _repo_name = Column(
1391 1391 "repo_name", Text(), nullable=False, default=None)
1392 1392 _repo_name_hash = Column(
1393 1393 "repo_name_hash", String(255), nullable=False, unique=True)
1394 1394 repo_state = Column("repo_state", String(255), nullable=True)
1395 1395
1396 1396 clone_uri = Column(
1397 1397 "clone_uri", EncryptedTextValue(), nullable=True, unique=False,
1398 1398 default=None)
1399 1399 repo_type = Column(
1400 1400 "repo_type", String(255), nullable=False, unique=False, default=None)
1401 1401 user_id = Column(
1402 1402 "user_id", Integer(), ForeignKey('users.user_id'), nullable=False,
1403 1403 unique=False, default=None)
1404 1404 private = Column(
1405 1405 "private", Boolean(), nullable=True, unique=None, default=None)
1406 1406 enable_statistics = Column(
1407 1407 "statistics", Boolean(), nullable=True, unique=None, default=True)
1408 1408 enable_downloads = Column(
1409 1409 "downloads", Boolean(), nullable=True, unique=None, default=True)
1410 1410 description = Column(
1411 1411 "description", String(10000), nullable=True, unique=None, default=None)
1412 1412 created_on = Column(
1413 1413 'created_on', DateTime(timezone=False), nullable=True, unique=None,
1414 1414 default=datetime.datetime.now)
1415 1415 updated_on = Column(
1416 1416 'updated_on', DateTime(timezone=False), nullable=True, unique=None,
1417 1417 default=datetime.datetime.now)
1418 1418 _landing_revision = Column(
1419 1419 "landing_revision", String(255), nullable=False, unique=False,
1420 1420 default=None)
1421 1421 enable_locking = Column(
1422 1422 "enable_locking", Boolean(), nullable=False, unique=None,
1423 1423 default=False)
1424 1424 _locked = Column(
1425 1425 "locked", String(255), nullable=True, unique=False, default=None)
1426 1426 _changeset_cache = Column(
1427 1427 "changeset_cache", LargeBinary(), nullable=True) # JSON data
1428 1428
1429 1429 fork_id = Column(
1430 1430 "fork_id", Integer(), ForeignKey('repositories.repo_id'),
1431 1431 nullable=True, unique=False, default=None)
1432 1432 group_id = Column(
1433 1433 "group_id", Integer(), ForeignKey('groups.group_id'), nullable=True,
1434 1434 unique=False, default=None)
1435 1435
1436 1436 user = relationship('User', lazy='joined')
1437 1437 fork = relationship('Repository', remote_side=repo_id, lazy='joined')
1438 1438 group = relationship('RepoGroup', lazy='joined')
1439 1439 repo_to_perm = relationship(
1440 1440 'UserRepoToPerm', cascade='all',
1441 1441 order_by='UserRepoToPerm.repo_to_perm_id')
1442 1442 users_group_to_perm = relationship('UserGroupRepoToPerm', cascade='all')
1443 1443 stats = relationship('Statistics', cascade='all', uselist=False)
1444 1444
1445 1445 followers = relationship(
1446 1446 'UserFollowing',
1447 1447 primaryjoin='UserFollowing.follows_repo_id==Repository.repo_id',
1448 1448 cascade='all')
1449 1449 extra_fields = relationship(
1450 1450 'RepositoryField', cascade="all, delete, delete-orphan")
1451 1451 logs = relationship('UserLog')
1452 1452 comments = relationship(
1453 1453 'ChangesetComment', cascade="all, delete, delete-orphan")
1454 1454 pull_requests_source = relationship(
1455 1455 'PullRequest',
1456 1456 primaryjoin='PullRequest.source_repo_id==Repository.repo_id',
1457 1457 cascade="all, delete, delete-orphan")
1458 1458 pull_requests_target = relationship(
1459 1459 'PullRequest',
1460 1460 primaryjoin='PullRequest.target_repo_id==Repository.repo_id',
1461 1461 cascade="all, delete, delete-orphan")
1462 1462 ui = relationship('RepoRhodeCodeUi', cascade="all")
1463 1463 settings = relationship('RepoRhodeCodeSetting', cascade="all")
1464 1464 integrations = relationship('Integration',
1465 1465 cascade="all, delete, delete-orphan")
1466 1466
1467 1467 def __unicode__(self):
1468 1468 return u"<%s('%s:%s')>" % (self.__class__.__name__, self.repo_id,
1469 1469 safe_unicode(self.repo_name))
1470 1470
1471 1471 @hybrid_property
1472 1472 def landing_rev(self):
1473 1473 # always should return [rev_type, rev]
1474 1474 if self._landing_revision:
1475 1475 _rev_info = self._landing_revision.split(':')
1476 1476 if len(_rev_info) < 2:
1477 1477 _rev_info.insert(0, 'rev')
1478 1478 return [_rev_info[0], _rev_info[1]]
1479 1479 return [None, None]
1480 1480
1481 1481 @landing_rev.setter
1482 1482 def landing_rev(self, val):
1483 1483 if ':' not in val:
1484 1484 raise ValueError('value must be delimited with `:` and consist '
1485 1485 'of <rev_type>:<rev>, got %s instead' % val)
1486 1486 self._landing_revision = val
1487 1487
1488 1488 @hybrid_property
1489 1489 def locked(self):
1490 1490 if self._locked:
1491 1491 user_id, timelocked, reason = self._locked.split(':')
1492 1492 lock_values = int(user_id), timelocked, reason
1493 1493 else:
1494 1494 lock_values = [None, None, None]
1495 1495 return lock_values
1496 1496
1497 1497 @locked.setter
1498 1498 def locked(self, val):
1499 1499 if val and isinstance(val, (list, tuple)):
1500 1500 self._locked = ':'.join(map(str, val))
1501 1501 else:
1502 1502 self._locked = None
1503 1503
1504 1504 @hybrid_property
1505 1505 def changeset_cache(self):
1506 1506 from rhodecode.lib.vcs.backends.base import EmptyCommit
1507 1507 dummy = EmptyCommit().__json__()
1508 1508 if not self._changeset_cache:
1509 1509 return dummy
1510 1510 try:
1511 1511 return json.loads(self._changeset_cache)
1512 1512 except TypeError:
1513 1513 return dummy
1514 1514 except Exception:
1515 1515 log.error(traceback.format_exc())
1516 1516 return dummy
1517 1517
1518 1518 @changeset_cache.setter
1519 1519 def changeset_cache(self, val):
1520 1520 try:
1521 1521 self._changeset_cache = json.dumps(val)
1522 1522 except Exception:
1523 1523 log.error(traceback.format_exc())
1524 1524
1525 1525 @hybrid_property
1526 1526 def repo_name(self):
1527 1527 return self._repo_name
1528 1528
1529 1529 @repo_name.setter
1530 1530 def repo_name(self, value):
1531 1531 self._repo_name = value
1532 1532 self._repo_name_hash = hashlib.sha1(safe_str(value)).hexdigest()
1533 1533
1534 1534 @classmethod
1535 1535 def normalize_repo_name(cls, repo_name):
1536 1536 """
1537 1537 Normalizes os specific repo_name to the format internally stored inside
1538 1538 database using URL_SEP
1539 1539
1540 1540 :param cls:
1541 1541 :param repo_name:
1542 1542 """
1543 1543 return cls.NAME_SEP.join(repo_name.split(os.sep))
1544 1544
1545 1545 @classmethod
1546 1546 def get_by_repo_name(cls, repo_name, cache=False, identity_cache=False):
1547 1547 session = Session()
1548 1548 q = session.query(cls).filter(cls.repo_name == repo_name)
1549 1549
1550 1550 if cache:
1551 1551 if identity_cache:
1552 1552 val = cls.identity_cache(session, 'repo_name', repo_name)
1553 1553 if val:
1554 1554 return val
1555 1555 else:
1556 1556 cache_key = "get_repo_by_name_%s" % _hash_key(repo_name)
1557 1557 q = q.options(
1558 1558 FromCache("sql_cache_short", cache_key))
1559 1559
1560 1560 return q.scalar()
1561 1561
1562 1562 @classmethod
1563 1563 def get_by_full_path(cls, repo_full_path):
1564 1564 repo_name = repo_full_path.split(cls.base_path(), 1)[-1]
1565 1565 repo_name = cls.normalize_repo_name(repo_name)
1566 1566 return cls.get_by_repo_name(repo_name.strip(URL_SEP))
1567 1567
1568 1568 @classmethod
1569 1569 def get_repo_forks(cls, repo_id):
1570 1570 return cls.query().filter(Repository.fork_id == repo_id)
1571 1571
1572 1572 @classmethod
1573 1573 def base_path(cls):
1574 1574 """
1575 1575 Returns base path when all repos are stored
1576 1576
1577 1577 :param cls:
1578 1578 """
1579 1579 q = Session().query(RhodeCodeUi)\
1580 1580 .filter(RhodeCodeUi.ui_key == cls.NAME_SEP)
1581 1581 q = q.options(FromCache("sql_cache_short", "repository_repo_path"))
1582 1582 return q.one().ui_value
1583 1583
1584 1584 @classmethod
1585 1585 def is_valid(cls, repo_name):
1586 1586 """
1587 1587 returns True if given repo name is a valid filesystem repository
1588 1588
1589 1589 :param cls:
1590 1590 :param repo_name:
1591 1591 """
1592 1592 from rhodecode.lib.utils import is_valid_repo
1593 1593
1594 1594 return is_valid_repo(repo_name, cls.base_path())
1595 1595
1596 1596 @classmethod
1597 1597 def get_all_repos(cls, user_id=Optional(None), group_id=Optional(None),
1598 1598 case_insensitive=True):
1599 1599 q = Repository.query()
1600 1600
1601 1601 if not isinstance(user_id, Optional):
1602 1602 q = q.filter(Repository.user_id == user_id)
1603 1603
1604 1604 if not isinstance(group_id, Optional):
1605 1605 q = q.filter(Repository.group_id == group_id)
1606 1606
1607 1607 if case_insensitive:
1608 1608 q = q.order_by(func.lower(Repository.repo_name))
1609 1609 else:
1610 1610 q = q.order_by(Repository.repo_name)
1611 1611 return q.all()
1612 1612
1613 1613 @property
1614 1614 def forks(self):
1615 1615 """
1616 1616 Return forks of this repo
1617 1617 """
1618 1618 return Repository.get_repo_forks(self.repo_id)
1619 1619
1620 1620 @property
1621 1621 def parent(self):
1622 1622 """
1623 1623 Returns fork parent
1624 1624 """
1625 1625 return self.fork
1626 1626
1627 1627 @property
1628 1628 def just_name(self):
1629 1629 return self.repo_name.split(self.NAME_SEP)[-1]
1630 1630
1631 1631 @property
1632 1632 def groups_with_parents(self):
1633 1633 groups = []
1634 1634 if self.group is None:
1635 1635 return groups
1636 1636
1637 1637 cur_gr = self.group
1638 1638 groups.insert(0, cur_gr)
1639 1639 while 1:
1640 1640 gr = getattr(cur_gr, 'parent_group', None)
1641 1641 cur_gr = cur_gr.parent_group
1642 1642 if gr is None:
1643 1643 break
1644 1644 groups.insert(0, gr)
1645 1645
1646 1646 return groups
1647 1647
1648 1648 @property
1649 1649 def groups_and_repo(self):
1650 1650 return self.groups_with_parents, self
1651 1651
1652 1652 @LazyProperty
1653 1653 def repo_path(self):
1654 1654 """
1655 1655 Returns base full path for that repository means where it actually
1656 1656 exists on a filesystem
1657 1657 """
1658 1658 q = Session().query(RhodeCodeUi).filter(
1659 1659 RhodeCodeUi.ui_key == self.NAME_SEP)
1660 1660 q = q.options(FromCache("sql_cache_short", "repository_repo_path"))
1661 1661 return q.one().ui_value
1662 1662
1663 1663 @property
1664 1664 def repo_full_path(self):
1665 1665 p = [self.repo_path]
1666 1666 # we need to split the name by / since this is how we store the
1667 1667 # names in the database, but that eventually needs to be converted
1668 1668 # into a valid system path
1669 1669 p += self.repo_name.split(self.NAME_SEP)
1670 1670 return os.path.join(*map(safe_unicode, p))
1671 1671
1672 1672 @property
1673 1673 def cache_keys(self):
1674 1674 """
1675 1675 Returns associated cache keys for that repo
1676 1676 """
1677 1677 return CacheKey.query()\
1678 1678 .filter(CacheKey.cache_args == self.repo_name)\
1679 1679 .order_by(CacheKey.cache_key)\
1680 1680 .all()
1681 1681
1682 1682 def get_new_name(self, repo_name):
1683 1683 """
1684 1684 returns new full repository name based on assigned group and new new
1685 1685
1686 1686 :param group_name:
1687 1687 """
1688 1688 path_prefix = self.group.full_path_splitted if self.group else []
1689 1689 return self.NAME_SEP.join(path_prefix + [repo_name])
1690 1690
1691 1691 @property
1692 1692 def _config(self):
1693 1693 """
1694 1694 Returns db based config object.
1695 1695 """
1696 1696 from rhodecode.lib.utils import make_db_config
1697 1697 return make_db_config(clear_session=False, repo=self)
1698 1698
1699 1699 def permissions(self, with_admins=True, with_owner=True):
1700 1700 q = UserRepoToPerm.query().filter(UserRepoToPerm.repository == self)
1701 1701 q = q.options(joinedload(UserRepoToPerm.repository),
1702 1702 joinedload(UserRepoToPerm.user),
1703 1703 joinedload(UserRepoToPerm.permission),)
1704 1704
1705 1705 # get owners and admins and permissions. We do a trick of re-writing
1706 1706 # objects from sqlalchemy to named-tuples due to sqlalchemy session
1707 1707 # has a global reference and changing one object propagates to all
1708 1708 # others. This means if admin is also an owner admin_row that change
1709 1709 # would propagate to both objects
1710 1710 perm_rows = []
1711 1711 for _usr in q.all():
1712 1712 usr = AttributeDict(_usr.user.get_dict())
1713 1713 usr.permission = _usr.permission.permission_name
1714 1714 perm_rows.append(usr)
1715 1715
1716 1716 # filter the perm rows by 'default' first and then sort them by
1717 1717 # admin,write,read,none permissions sorted again alphabetically in
1718 1718 # each group
1719 1719 perm_rows = sorted(perm_rows, key=display_sort)
1720 1720
1721 1721 _admin_perm = 'repository.admin'
1722 1722 owner_row = []
1723 1723 if with_owner:
1724 1724 usr = AttributeDict(self.user.get_dict())
1725 1725 usr.owner_row = True
1726 1726 usr.permission = _admin_perm
1727 1727 owner_row.append(usr)
1728 1728
1729 1729 super_admin_rows = []
1730 1730 if with_admins:
1731 1731 for usr in User.get_all_super_admins():
1732 1732 # if this admin is also owner, don't double the record
1733 1733 if usr.user_id == owner_row[0].user_id:
1734 1734 owner_row[0].admin_row = True
1735 1735 else:
1736 1736 usr = AttributeDict(usr.get_dict())
1737 1737 usr.admin_row = True
1738 1738 usr.permission = _admin_perm
1739 1739 super_admin_rows.append(usr)
1740 1740
1741 1741 return super_admin_rows + owner_row + perm_rows
1742 1742
1743 1743 def permission_user_groups(self):
1744 1744 q = UserGroupRepoToPerm.query().filter(
1745 1745 UserGroupRepoToPerm.repository == self)
1746 1746 q = q.options(joinedload(UserGroupRepoToPerm.repository),
1747 1747 joinedload(UserGroupRepoToPerm.users_group),
1748 1748 joinedload(UserGroupRepoToPerm.permission),)
1749 1749
1750 1750 perm_rows = []
1751 1751 for _user_group in q.all():
1752 1752 usr = AttributeDict(_user_group.users_group.get_dict())
1753 1753 usr.permission = _user_group.permission.permission_name
1754 1754 perm_rows.append(usr)
1755 1755
1756 1756 return perm_rows
1757 1757
1758 1758 def get_api_data(self, include_secrets=False):
1759 1759 """
1760 1760 Common function for generating repo api data
1761 1761
1762 1762 :param include_secrets: See :meth:`User.get_api_data`.
1763 1763
1764 1764 """
1765 1765 # TODO: mikhail: Here there is an anti-pattern, we probably need to
1766 1766 # move this methods on models level.
1767 1767 from rhodecode.model.settings import SettingsModel
1768 1768 from rhodecode.model.repo import RepoModel
1769 1769
1770 1770 repo = self
1771 1771 _user_id, _time, _reason = self.locked
1772 1772
1773 1773 data = {
1774 1774 'repo_id': repo.repo_id,
1775 1775 'repo_name': repo.repo_name,
1776 1776 'repo_type': repo.repo_type,
1777 1777 'clone_uri': repo.clone_uri or '',
1778 1778 'url': RepoModel().get_url(self),
1779 1779 'private': repo.private,
1780 1780 'created_on': repo.created_on,
1781 1781 'description': repo.description,
1782 1782 'landing_rev': repo.landing_rev,
1783 1783 'owner': repo.user.username,
1784 1784 'fork_of': repo.fork.repo_name if repo.fork else None,
1785 1785 'enable_statistics': repo.enable_statistics,
1786 1786 'enable_locking': repo.enable_locking,
1787 1787 'enable_downloads': repo.enable_downloads,
1788 1788 'last_changeset': repo.changeset_cache,
1789 1789 'locked_by': User.get(_user_id).get_api_data(
1790 1790 include_secrets=include_secrets) if _user_id else None,
1791 1791 'locked_date': time_to_datetime(_time) if _time else None,
1792 1792 'lock_reason': _reason if _reason else None,
1793 1793 }
1794 1794
1795 1795 # TODO: mikhail: should be per-repo settings here
1796 1796 rc_config = SettingsModel().get_all_settings()
1797 1797 repository_fields = str2bool(
1798 1798 rc_config.get('rhodecode_repository_fields'))
1799 1799 if repository_fields:
1800 1800 for f in self.extra_fields:
1801 1801 data[f.field_key_prefixed] = f.field_value
1802 1802
1803 1803 return data
1804 1804
1805 1805 @classmethod
1806 1806 def lock(cls, repo, user_id, lock_time=None, lock_reason=None):
1807 1807 if not lock_time:
1808 1808 lock_time = time.time()
1809 1809 if not lock_reason:
1810 1810 lock_reason = cls.LOCK_AUTOMATIC
1811 1811 repo.locked = [user_id, lock_time, lock_reason]
1812 1812 Session().add(repo)
1813 1813 Session().commit()
1814 1814
1815 1815 @classmethod
1816 1816 def unlock(cls, repo):
1817 1817 repo.locked = None
1818 1818 Session().add(repo)
1819 1819 Session().commit()
1820 1820
1821 1821 @classmethod
1822 1822 def getlock(cls, repo):
1823 1823 return repo.locked
1824 1824
1825 1825 def is_user_lock(self, user_id):
1826 1826 if self.lock[0]:
1827 1827 lock_user_id = safe_int(self.lock[0])
1828 1828 user_id = safe_int(user_id)
1829 1829 # both are ints, and they are equal
1830 1830 return all([lock_user_id, user_id]) and lock_user_id == user_id
1831 1831
1832 1832 return False
1833 1833
1834 1834 def get_locking_state(self, action, user_id, only_when_enabled=True):
1835 1835 """
1836 1836 Checks locking on this repository, if locking is enabled and lock is
1837 1837 present returns a tuple of make_lock, locked, locked_by.
1838 1838 make_lock can have 3 states None (do nothing) True, make lock
1839 1839 False release lock, This value is later propagated to hooks, which
1840 1840 do the locking. Think about this as signals passed to hooks what to do.
1841 1841
1842 1842 """
1843 1843 # TODO: johbo: This is part of the business logic and should be moved
1844 1844 # into the RepositoryModel.
1845 1845
1846 1846 if action not in ('push', 'pull'):
1847 1847 raise ValueError("Invalid action value: %s" % repr(action))
1848 1848
1849 1849 # defines if locked error should be thrown to user
1850 1850 currently_locked = False
1851 1851 # defines if new lock should be made, tri-state
1852 1852 make_lock = None
1853 1853 repo = self
1854 1854 user = User.get(user_id)
1855 1855
1856 1856 lock_info = repo.locked
1857 1857
1858 1858 if repo and (repo.enable_locking or not only_when_enabled):
1859 1859 if action == 'push':
1860 1860 # check if it's already locked !, if it is compare users
1861 1861 locked_by_user_id = lock_info[0]
1862 1862 if user.user_id == locked_by_user_id:
1863 1863 log.debug(
1864 1864 'Got `push` action from user %s, now unlocking', user)
1865 1865 # unlock if we have push from user who locked
1866 1866 make_lock = False
1867 1867 else:
1868 1868 # we're not the same user who locked, ban with
1869 1869 # code defined in settings (default is 423 HTTP Locked) !
1870 1870 log.debug('Repo %s is currently locked by %s', repo, user)
1871 1871 currently_locked = True
1872 1872 elif action == 'pull':
1873 1873 # [0] user [1] date
1874 1874 if lock_info[0] and lock_info[1]:
1875 1875 log.debug('Repo %s is currently locked by %s', repo, user)
1876 1876 currently_locked = True
1877 1877 else:
1878 1878 log.debug('Setting lock on repo %s by %s', repo, user)
1879 1879 make_lock = True
1880 1880
1881 1881 else:
1882 1882 log.debug('Repository %s do not have locking enabled', repo)
1883 1883
1884 1884 log.debug('FINAL locking values make_lock:%s,locked:%s,locked_by:%s',
1885 1885 make_lock, currently_locked, lock_info)
1886 1886
1887 1887 from rhodecode.lib.auth import HasRepoPermissionAny
1888 1888 perm_check = HasRepoPermissionAny('repository.write', 'repository.admin')
1889 1889 if make_lock and not perm_check(repo_name=repo.repo_name, user=user):
1890 1890 # if we don't have at least write permission we cannot make a lock
1891 1891 log.debug('lock state reset back to FALSE due to lack '
1892 1892 'of at least read permission')
1893 1893 make_lock = False
1894 1894
1895 1895 return make_lock, currently_locked, lock_info
1896 1896
1897 1897 @property
1898 1898 def last_db_change(self):
1899 1899 return self.updated_on
1900 1900
1901 1901 @property
1902 1902 def clone_uri_hidden(self):
1903 1903 clone_uri = self.clone_uri
1904 1904 if clone_uri:
1905 1905 import urlobject
1906 1906 url_obj = urlobject.URLObject(cleaned_uri(clone_uri))
1907 1907 if url_obj.password:
1908 1908 clone_uri = url_obj.with_password('*****')
1909 1909 return clone_uri
1910 1910
1911 1911 def clone_url(self, **override):
1912 1912
1913 1913 uri_tmpl = None
1914 1914 if 'with_id' in override:
1915 1915 uri_tmpl = self.DEFAULT_CLONE_URI_ID
1916 1916 del override['with_id']
1917 1917
1918 1918 if 'uri_tmpl' in override:
1919 1919 uri_tmpl = override['uri_tmpl']
1920 1920 del override['uri_tmpl']
1921 1921
1922 1922 # we didn't override our tmpl from **overrides
1923 1923 if not uri_tmpl:
1924 1924 uri_tmpl = self.DEFAULT_CLONE_URI
1925 1925 try:
1926 1926 from pylons import tmpl_context as c
1927 1927 uri_tmpl = c.clone_uri_tmpl
1928 1928 except Exception:
1929 1929 # in any case if we call this outside of request context,
1930 1930 # ie, not having tmpl_context set up
1931 1931 pass
1932 1932
1933 1933 request = get_current_request()
1934 1934 return get_clone_url(request=request,
1935 1935 uri_tmpl=uri_tmpl,
1936 1936 repo_name=self.repo_name,
1937 1937 repo_id=self.repo_id, **override)
1938 1938
1939 1939 def set_state(self, state):
1940 1940 self.repo_state = state
1941 1941 Session().add(self)
1942 1942 #==========================================================================
1943 1943 # SCM PROPERTIES
1944 1944 #==========================================================================
1945 1945
1946 1946 def get_commit(self, commit_id=None, commit_idx=None, pre_load=None):
1947 1947 return get_commit_safe(
1948 1948 self.scm_instance(), commit_id, commit_idx, pre_load=pre_load)
1949 1949
1950 1950 def get_changeset(self, rev=None, pre_load=None):
1951 1951 warnings.warn("Use get_commit", DeprecationWarning)
1952 1952 commit_id = None
1953 1953 commit_idx = None
1954 1954 if isinstance(rev, basestring):
1955 1955 commit_id = rev
1956 1956 else:
1957 1957 commit_idx = rev
1958 1958 return self.get_commit(commit_id=commit_id, commit_idx=commit_idx,
1959 1959 pre_load=pre_load)
1960 1960
1961 1961 def get_landing_commit(self):
1962 1962 """
1963 1963 Returns landing commit, or if that doesn't exist returns the tip
1964 1964 """
1965 1965 _rev_type, _rev = self.landing_rev
1966 1966 commit = self.get_commit(_rev)
1967 1967 if isinstance(commit, EmptyCommit):
1968 1968 return self.get_commit()
1969 1969 return commit
1970 1970
1971 1971 def update_commit_cache(self, cs_cache=None, config=None):
1972 1972 """
1973 1973 Update cache of last changeset for repository, keys should be::
1974 1974
1975 1975 short_id
1976 1976 raw_id
1977 1977 revision
1978 1978 parents
1979 1979 message
1980 1980 date
1981 1981 author
1982 1982
1983 1983 :param cs_cache:
1984 1984 """
1985 1985 from rhodecode.lib.vcs.backends.base import BaseChangeset
1986 1986 if cs_cache is None:
1987 1987 # use no-cache version here
1988 1988 scm_repo = self.scm_instance(cache=False, config=config)
1989 1989 if scm_repo:
1990 1990 cs_cache = scm_repo.get_commit(
1991 1991 pre_load=["author", "date", "message", "parents"])
1992 1992 else:
1993 1993 cs_cache = EmptyCommit()
1994 1994
1995 1995 if isinstance(cs_cache, BaseChangeset):
1996 1996 cs_cache = cs_cache.__json__()
1997 1997
1998 1998 def is_outdated(new_cs_cache):
1999 1999 if (new_cs_cache['raw_id'] != self.changeset_cache['raw_id'] or
2000 2000 new_cs_cache['revision'] != self.changeset_cache['revision']):
2001 2001 return True
2002 2002 return False
2003 2003
2004 2004 # check if we have maybe already latest cached revision
2005 2005 if is_outdated(cs_cache) or not self.changeset_cache:
2006 2006 _default = datetime.datetime.fromtimestamp(0)
2007 2007 last_change = cs_cache.get('date') or _default
2008 2008 log.debug('updated repo %s with new cs cache %s',
2009 2009 self.repo_name, cs_cache)
2010 2010 self.updated_on = last_change
2011 2011 self.changeset_cache = cs_cache
2012 2012 Session().add(self)
2013 2013 Session().commit()
2014 2014 else:
2015 2015 log.debug('Skipping update_commit_cache for repo:`%s` '
2016 2016 'commit already with latest changes', self.repo_name)
2017 2017
2018 2018 @property
2019 2019 def tip(self):
2020 2020 return self.get_commit('tip')
2021 2021
2022 2022 @property
2023 2023 def author(self):
2024 2024 return self.tip.author
2025 2025
2026 2026 @property
2027 2027 def last_change(self):
2028 2028 return self.scm_instance().last_change
2029 2029
2030 2030 def get_comments(self, revisions=None):
2031 2031 """
2032 2032 Returns comments for this repository grouped by revisions
2033 2033
2034 2034 :param revisions: filter query by revisions only
2035 2035 """
2036 2036 cmts = ChangesetComment.query()\
2037 2037 .filter(ChangesetComment.repo == self)
2038 2038 if revisions:
2039 2039 cmts = cmts.filter(ChangesetComment.revision.in_(revisions))
2040 2040 grouped = collections.defaultdict(list)
2041 2041 for cmt in cmts.all():
2042 2042 grouped[cmt.revision].append(cmt)
2043 2043 return grouped
2044 2044
2045 2045 def statuses(self, revisions=None):
2046 2046 """
2047 2047 Returns statuses for this repository
2048 2048
2049 2049 :param revisions: list of revisions to get statuses for
2050 2050 """
2051 2051 statuses = ChangesetStatus.query()\
2052 2052 .filter(ChangesetStatus.repo == self)\
2053 2053 .filter(ChangesetStatus.version == 0)
2054 2054
2055 2055 if revisions:
2056 2056 # Try doing the filtering in chunks to avoid hitting limits
2057 2057 size = 500
2058 2058 status_results = []
2059 2059 for chunk in xrange(0, len(revisions), size):
2060 2060 status_results += statuses.filter(
2061 2061 ChangesetStatus.revision.in_(
2062 2062 revisions[chunk: chunk+size])
2063 2063 ).all()
2064 2064 else:
2065 2065 status_results = statuses.all()
2066 2066
2067 2067 grouped = {}
2068 2068
2069 2069 # maybe we have open new pullrequest without a status?
2070 2070 stat = ChangesetStatus.STATUS_UNDER_REVIEW
2071 2071 status_lbl = ChangesetStatus.get_status_lbl(stat)
2072 2072 for pr in PullRequest.query().filter(PullRequest.source_repo == self).all():
2073 2073 for rev in pr.revisions:
2074 2074 pr_id = pr.pull_request_id
2075 2075 pr_repo = pr.target_repo.repo_name
2076 2076 grouped[rev] = [stat, status_lbl, pr_id, pr_repo]
2077 2077
2078 2078 for stat in status_results:
2079 2079 pr_id = pr_repo = None
2080 2080 if stat.pull_request:
2081 2081 pr_id = stat.pull_request.pull_request_id
2082 2082 pr_repo = stat.pull_request.target_repo.repo_name
2083 2083 grouped[stat.revision] = [str(stat.status), stat.status_lbl,
2084 2084 pr_id, pr_repo]
2085 2085 return grouped
2086 2086
2087 2087 # ==========================================================================
2088 2088 # SCM CACHE INSTANCE
2089 2089 # ==========================================================================
2090 2090
2091 2091 def scm_instance(self, **kwargs):
2092 2092 import rhodecode
2093 2093
2094 2094 # Passing a config will not hit the cache currently only used
2095 2095 # for repo2dbmapper
2096 2096 config = kwargs.pop('config', None)
2097 2097 cache = kwargs.pop('cache', None)
2098 2098 full_cache = str2bool(rhodecode.CONFIG.get('vcs_full_cache'))
2099 2099 # if cache is NOT defined use default global, else we have a full
2100 2100 # control over cache behaviour
2101 2101 if cache is None and full_cache and not config:
2102 2102 return self._get_instance_cached()
2103 2103 return self._get_instance(cache=bool(cache), config=config)
2104 2104
2105 2105 def _get_instance_cached(self):
2106 2106 @cache_region('long_term')
2107 2107 def _get_repo(cache_key):
2108 2108 return self._get_instance()
2109 2109
2110 2110 invalidator_context = CacheKey.repo_context_cache(
2111 2111 _get_repo, self.repo_name, None, thread_scoped=True)
2112 2112
2113 2113 with invalidator_context as context:
2114 2114 context.invalidate()
2115 2115 repo = context.compute()
2116 2116
2117 2117 return repo
2118 2118
2119 2119 def _get_instance(self, cache=True, config=None):
2120 2120 config = config or self._config
2121 2121 custom_wire = {
2122 2122 'cache': cache # controls the vcs.remote cache
2123 2123 }
2124 2124 repo = get_vcs_instance(
2125 2125 repo_path=safe_str(self.repo_full_path),
2126 2126 config=config,
2127 2127 with_wire=custom_wire,
2128 2128 create=False,
2129 2129 _vcs_alias=self.repo_type)
2130 2130
2131 2131 return repo
2132 2132
2133 2133 def __json__(self):
2134 2134 return {'landing_rev': self.landing_rev}
2135 2135
2136 2136 def get_dict(self):
2137 2137
2138 2138 # Since we transformed `repo_name` to a hybrid property, we need to
2139 2139 # keep compatibility with the code which uses `repo_name` field.
2140 2140
2141 2141 result = super(Repository, self).get_dict()
2142 2142 result['repo_name'] = result.pop('_repo_name', None)
2143 2143 return result
2144 2144
2145 2145
2146 2146 class RepoGroup(Base, BaseModel):
2147 2147 __tablename__ = 'groups'
2148 2148 __table_args__ = (
2149 2149 UniqueConstraint('group_name', 'group_parent_id'),
2150 2150 CheckConstraint('group_id != group_parent_id'),
2151 2151 {'extend_existing': True, 'mysql_engine': 'InnoDB',
2152 2152 'mysql_charset': 'utf8', 'sqlite_autoincrement': True},
2153 2153 )
2154 2154 __mapper_args__ = {'order_by': 'group_name'}
2155 2155
2156 2156 CHOICES_SEPARATOR = '/' # used to generate select2 choices for nested groups
2157 2157
2158 2158 group_id = Column("group_id", Integer(), nullable=False, unique=True, default=None, primary_key=True)
2159 2159 group_name = Column("group_name", String(255), nullable=False, unique=True, default=None)
2160 2160 group_parent_id = Column("group_parent_id", Integer(), ForeignKey('groups.group_id'), nullable=True, unique=None, default=None)
2161 2161 group_description = Column("group_description", String(10000), nullable=True, unique=None, default=None)
2162 2162 enable_locking = Column("enable_locking", Boolean(), nullable=False, unique=None, default=False)
2163 2163 user_id = Column("user_id", Integer(), ForeignKey('users.user_id'), nullable=False, unique=False, default=None)
2164 2164 created_on = Column('created_on', DateTime(timezone=False), nullable=False, default=datetime.datetime.now)
2165 2165 personal = Column('personal', Boolean(), nullable=True, unique=None, default=None)
2166 2166
2167 2167 repo_group_to_perm = relationship('UserRepoGroupToPerm', cascade='all', order_by='UserRepoGroupToPerm.group_to_perm_id')
2168 2168 users_group_to_perm = relationship('UserGroupRepoGroupToPerm', cascade='all')
2169 2169 parent_group = relationship('RepoGroup', remote_side=group_id)
2170 2170 user = relationship('User')
2171 2171 integrations = relationship('Integration',
2172 2172 cascade="all, delete, delete-orphan")
2173 2173
2174 2174 def __init__(self, group_name='', parent_group=None):
2175 2175 self.group_name = group_name
2176 2176 self.parent_group = parent_group
2177 2177
2178 2178 def __unicode__(self):
2179 2179 return u"<%s('id:%s:%s')>" % (self.__class__.__name__, self.group_id,
2180 2180 self.group_name)
2181 2181
2182 2182 @classmethod
2183 2183 def _generate_choice(cls, repo_group):
2184 2184 from webhelpers.html import literal as _literal
2185 2185 _name = lambda k: _literal(cls.CHOICES_SEPARATOR.join(k))
2186 2186 return repo_group.group_id, _name(repo_group.full_path_splitted)
2187 2187
2188 2188 @classmethod
2189 2189 def groups_choices(cls, groups=None, show_empty_group=True):
2190 2190 if not groups:
2191 2191 groups = cls.query().all()
2192 2192
2193 2193 repo_groups = []
2194 2194 if show_empty_group:
2195 2195 repo_groups = [(-1, u'-- %s --' % _('No parent'))]
2196 2196
2197 2197 repo_groups.extend([cls._generate_choice(x) for x in groups])
2198 2198
2199 2199 repo_groups = sorted(
2200 2200 repo_groups, key=lambda t: t[1].split(cls.CHOICES_SEPARATOR)[0])
2201 2201 return repo_groups
2202 2202
2203 2203 @classmethod
2204 2204 def url_sep(cls):
2205 2205 return URL_SEP
2206 2206
2207 2207 @classmethod
2208 2208 def get_by_group_name(cls, group_name, cache=False, case_insensitive=False):
2209 2209 if case_insensitive:
2210 2210 gr = cls.query().filter(func.lower(cls.group_name)
2211 2211 == func.lower(group_name))
2212 2212 else:
2213 2213 gr = cls.query().filter(cls.group_name == group_name)
2214 2214 if cache:
2215 2215 name_key = _hash_key(group_name)
2216 2216 gr = gr.options(
2217 2217 FromCache("sql_cache_short", "get_group_%s" % name_key))
2218 2218 return gr.scalar()
2219 2219
2220 2220 @classmethod
2221 2221 def get_user_personal_repo_group(cls, user_id):
2222 2222 user = User.get(user_id)
2223 2223 if user.username == User.DEFAULT_USER:
2224 2224 return None
2225 2225
2226 2226 return cls.query()\
2227 2227 .filter(cls.personal == true()) \
2228 2228 .filter(cls.user == user).scalar()
2229 2229
2230 2230 @classmethod
2231 2231 def get_all_repo_groups(cls, user_id=Optional(None), group_id=Optional(None),
2232 2232 case_insensitive=True):
2233 2233 q = RepoGroup.query()
2234 2234
2235 2235 if not isinstance(user_id, Optional):
2236 2236 q = q.filter(RepoGroup.user_id == user_id)
2237 2237
2238 2238 if not isinstance(group_id, Optional):
2239 2239 q = q.filter(RepoGroup.group_parent_id == group_id)
2240 2240
2241 2241 if case_insensitive:
2242 2242 q = q.order_by(func.lower(RepoGroup.group_name))
2243 2243 else:
2244 2244 q = q.order_by(RepoGroup.group_name)
2245 2245 return q.all()
2246 2246
2247 2247 @property
2248 2248 def parents(self):
2249 2249 parents_recursion_limit = 10
2250 2250 groups = []
2251 2251 if self.parent_group is None:
2252 2252 return groups
2253 2253 cur_gr = self.parent_group
2254 2254 groups.insert(0, cur_gr)
2255 2255 cnt = 0
2256 2256 while 1:
2257 2257 cnt += 1
2258 2258 gr = getattr(cur_gr, 'parent_group', None)
2259 2259 cur_gr = cur_gr.parent_group
2260 2260 if gr is None:
2261 2261 break
2262 2262 if cnt == parents_recursion_limit:
2263 2263 # this will prevent accidental infinit loops
2264 2264 log.error(('more than %s parents found for group %s, stopping '
2265 2265 'recursive parent fetching' % (parents_recursion_limit, self)))
2266 2266 break
2267 2267
2268 2268 groups.insert(0, gr)
2269 2269 return groups
2270 2270
2271 2271 @property
2272 2272 def children(self):
2273 2273 return RepoGroup.query().filter(RepoGroup.parent_group == self)
2274 2274
2275 2275 @property
2276 2276 def name(self):
2277 2277 return self.group_name.split(RepoGroup.url_sep())[-1]
2278 2278
2279 2279 @property
2280 2280 def full_path(self):
2281 2281 return self.group_name
2282 2282
2283 2283 @property
2284 2284 def full_path_splitted(self):
2285 2285 return self.group_name.split(RepoGroup.url_sep())
2286 2286
2287 2287 @property
2288 2288 def repositories(self):
2289 2289 return Repository.query()\
2290 2290 .filter(Repository.group == self)\
2291 2291 .order_by(Repository.repo_name)
2292 2292
2293 2293 @property
2294 2294 def repositories_recursive_count(self):
2295 2295 cnt = self.repositories.count()
2296 2296
2297 2297 def children_count(group):
2298 2298 cnt = 0
2299 2299 for child in group.children:
2300 2300 cnt += child.repositories.count()
2301 2301 cnt += children_count(child)
2302 2302 return cnt
2303 2303
2304 2304 return cnt + children_count(self)
2305 2305
2306 2306 def _recursive_objects(self, include_repos=True):
2307 2307 all_ = []
2308 2308
2309 2309 def _get_members(root_gr):
2310 2310 if include_repos:
2311 2311 for r in root_gr.repositories:
2312 2312 all_.append(r)
2313 2313 childs = root_gr.children.all()
2314 2314 if childs:
2315 2315 for gr in childs:
2316 2316 all_.append(gr)
2317 2317 _get_members(gr)
2318 2318
2319 2319 _get_members(self)
2320 2320 return [self] + all_
2321 2321
2322 2322 def recursive_groups_and_repos(self):
2323 2323 """
2324 2324 Recursive return all groups, with repositories in those groups
2325 2325 """
2326 2326 return self._recursive_objects()
2327 2327
2328 2328 def recursive_groups(self):
2329 2329 """
2330 2330 Returns all children groups for this group including children of children
2331 2331 """
2332 2332 return self._recursive_objects(include_repos=False)
2333 2333
2334 2334 def get_new_name(self, group_name):
2335 2335 """
2336 2336 returns new full group name based on parent and new name
2337 2337
2338 2338 :param group_name:
2339 2339 """
2340 2340 path_prefix = (self.parent_group.full_path_splitted if
2341 2341 self.parent_group else [])
2342 2342 return RepoGroup.url_sep().join(path_prefix + [group_name])
2343 2343
2344 2344 def permissions(self, with_admins=True, with_owner=True):
2345 2345 q = UserRepoGroupToPerm.query().filter(UserRepoGroupToPerm.group == self)
2346 2346 q = q.options(joinedload(UserRepoGroupToPerm.group),
2347 2347 joinedload(UserRepoGroupToPerm.user),
2348 2348 joinedload(UserRepoGroupToPerm.permission),)
2349 2349
2350 2350 # get owners and admins and permissions. We do a trick of re-writing
2351 2351 # objects from sqlalchemy to named-tuples due to sqlalchemy session
2352 2352 # has a global reference and changing one object propagates to all
2353 2353 # others. This means if admin is also an owner admin_row that change
2354 2354 # would propagate to both objects
2355 2355 perm_rows = []
2356 2356 for _usr in q.all():
2357 2357 usr = AttributeDict(_usr.user.get_dict())
2358 2358 usr.permission = _usr.permission.permission_name
2359 2359 perm_rows.append(usr)
2360 2360
2361 2361 # filter the perm rows by 'default' first and then sort them by
2362 2362 # admin,write,read,none permissions sorted again alphabetically in
2363 2363 # each group
2364 2364 perm_rows = sorted(perm_rows, key=display_sort)
2365 2365
2366 2366 _admin_perm = 'group.admin'
2367 2367 owner_row = []
2368 2368 if with_owner:
2369 2369 usr = AttributeDict(self.user.get_dict())
2370 2370 usr.owner_row = True
2371 2371 usr.permission = _admin_perm
2372 2372 owner_row.append(usr)
2373 2373
2374 2374 super_admin_rows = []
2375 2375 if with_admins:
2376 2376 for usr in User.get_all_super_admins():
2377 2377 # if this admin is also owner, don't double the record
2378 2378 if usr.user_id == owner_row[0].user_id:
2379 2379 owner_row[0].admin_row = True
2380 2380 else:
2381 2381 usr = AttributeDict(usr.get_dict())
2382 2382 usr.admin_row = True
2383 2383 usr.permission = _admin_perm
2384 2384 super_admin_rows.append(usr)
2385 2385
2386 2386 return super_admin_rows + owner_row + perm_rows
2387 2387
2388 2388 def permission_user_groups(self):
2389 2389 q = UserGroupRepoGroupToPerm.query().filter(UserGroupRepoGroupToPerm.group == self)
2390 2390 q = q.options(joinedload(UserGroupRepoGroupToPerm.group),
2391 2391 joinedload(UserGroupRepoGroupToPerm.users_group),
2392 2392 joinedload(UserGroupRepoGroupToPerm.permission),)
2393 2393
2394 2394 perm_rows = []
2395 2395 for _user_group in q.all():
2396 2396 usr = AttributeDict(_user_group.users_group.get_dict())
2397 2397 usr.permission = _user_group.permission.permission_name
2398 2398 perm_rows.append(usr)
2399 2399
2400 2400 return perm_rows
2401 2401
2402 2402 def get_api_data(self):
2403 2403 """
2404 2404 Common function for generating api data
2405 2405
2406 2406 """
2407 2407 group = self
2408 2408 data = {
2409 2409 'group_id': group.group_id,
2410 2410 'group_name': group.group_name,
2411 2411 'group_description': group.group_description,
2412 2412 'parent_group': group.parent_group.group_name if group.parent_group else None,
2413 2413 'repositories': [x.repo_name for x in group.repositories],
2414 2414 'owner': group.user.username,
2415 2415 }
2416 2416 return data
2417 2417
2418 2418
2419 2419 class Permission(Base, BaseModel):
2420 2420 __tablename__ = 'permissions'
2421 2421 __table_args__ = (
2422 2422 Index('p_perm_name_idx', 'permission_name'),
2423 2423 {'extend_existing': True, 'mysql_engine': 'InnoDB',
2424 2424 'mysql_charset': 'utf8', 'sqlite_autoincrement': True},
2425 2425 )
2426 2426 PERMS = [
2427 2427 ('hg.admin', _('RhodeCode Super Administrator')),
2428 2428
2429 2429 ('repository.none', _('Repository no access')),
2430 2430 ('repository.read', _('Repository read access')),
2431 2431 ('repository.write', _('Repository write access')),
2432 2432 ('repository.admin', _('Repository admin access')),
2433 2433
2434 2434 ('group.none', _('Repository group no access')),
2435 2435 ('group.read', _('Repository group read access')),
2436 2436 ('group.write', _('Repository group write access')),
2437 2437 ('group.admin', _('Repository group admin access')),
2438 2438
2439 2439 ('usergroup.none', _('User group no access')),
2440 2440 ('usergroup.read', _('User group read access')),
2441 2441 ('usergroup.write', _('User group write access')),
2442 2442 ('usergroup.admin', _('User group admin access')),
2443 2443
2444 2444 ('hg.repogroup.create.false', _('Repository Group creation disabled')),
2445 2445 ('hg.repogroup.create.true', _('Repository Group creation enabled')),
2446 2446
2447 2447 ('hg.usergroup.create.false', _('User Group creation disabled')),
2448 2448 ('hg.usergroup.create.true', _('User Group creation enabled')),
2449 2449
2450 2450 ('hg.create.none', _('Repository creation disabled')),
2451 2451 ('hg.create.repository', _('Repository creation enabled')),
2452 2452 ('hg.create.write_on_repogroup.true', _('Repository creation enabled with write permission to a repository group')),
2453 2453 ('hg.create.write_on_repogroup.false', _('Repository creation disabled with write permission to a repository group')),
2454 2454
2455 2455 ('hg.fork.none', _('Repository forking disabled')),
2456 2456 ('hg.fork.repository', _('Repository forking enabled')),
2457 2457
2458 2458 ('hg.register.none', _('Registration disabled')),
2459 2459 ('hg.register.manual_activate', _('User Registration with manual account activation')),
2460 2460 ('hg.register.auto_activate', _('User Registration with automatic account activation')),
2461 2461
2462 2462 ('hg.password_reset.enabled', _('Password reset enabled')),
2463 2463 ('hg.password_reset.hidden', _('Password reset hidden')),
2464 2464 ('hg.password_reset.disabled', _('Password reset disabled')),
2465 2465
2466 2466 ('hg.extern_activate.manual', _('Manual activation of external account')),
2467 2467 ('hg.extern_activate.auto', _('Automatic activation of external account')),
2468 2468
2469 2469 ('hg.inherit_default_perms.false', _('Inherit object permissions from default user disabled')),
2470 2470 ('hg.inherit_default_perms.true', _('Inherit object permissions from default user enabled')),
2471 2471 ]
2472 2472
2473 2473 # definition of system default permissions for DEFAULT user
2474 2474 DEFAULT_USER_PERMISSIONS = [
2475 2475 'repository.read',
2476 2476 'group.read',
2477 2477 'usergroup.read',
2478 2478 'hg.create.repository',
2479 2479 'hg.repogroup.create.false',
2480 2480 'hg.usergroup.create.false',
2481 2481 'hg.create.write_on_repogroup.true',
2482 2482 'hg.fork.repository',
2483 2483 'hg.register.manual_activate',
2484 2484 'hg.password_reset.enabled',
2485 2485 'hg.extern_activate.auto',
2486 2486 'hg.inherit_default_perms.true',
2487 2487 ]
2488 2488
2489 2489 # defines which permissions are more important higher the more important
2490 2490 # Weight defines which permissions are more important.
2491 2491 # The higher number the more important.
2492 2492 PERM_WEIGHTS = {
2493 2493 'repository.none': 0,
2494 2494 'repository.read': 1,
2495 2495 'repository.write': 3,
2496 2496 'repository.admin': 4,
2497 2497
2498 2498 'group.none': 0,
2499 2499 'group.read': 1,
2500 2500 'group.write': 3,
2501 2501 'group.admin': 4,
2502 2502
2503 2503 'usergroup.none': 0,
2504 2504 'usergroup.read': 1,
2505 2505 'usergroup.write': 3,
2506 2506 'usergroup.admin': 4,
2507 2507
2508 2508 'hg.repogroup.create.false': 0,
2509 2509 'hg.repogroup.create.true': 1,
2510 2510
2511 2511 'hg.usergroup.create.false': 0,
2512 2512 'hg.usergroup.create.true': 1,
2513 2513
2514 2514 'hg.fork.none': 0,
2515 2515 'hg.fork.repository': 1,
2516 2516 'hg.create.none': 0,
2517 2517 'hg.create.repository': 1
2518 2518 }
2519 2519
2520 2520 permission_id = Column("permission_id", Integer(), nullable=False, unique=True, default=None, primary_key=True)
2521 2521 permission_name = Column("permission_name", String(255), nullable=True, unique=None, default=None)
2522 2522 permission_longname = Column("permission_longname", String(255), nullable=True, unique=None, default=None)
2523 2523
2524 2524 def __unicode__(self):
2525 2525 return u"<%s('%s:%s')>" % (
2526 2526 self.__class__.__name__, self.permission_id, self.permission_name
2527 2527 )
2528 2528
2529 2529 @classmethod
2530 2530 def get_by_key(cls, key):
2531 2531 return cls.query().filter(cls.permission_name == key).scalar()
2532 2532
2533 2533 @classmethod
2534 2534 def get_default_repo_perms(cls, user_id, repo_id=None):
2535 2535 q = Session().query(UserRepoToPerm, Repository, Permission)\
2536 2536 .join((Permission, UserRepoToPerm.permission_id == Permission.permission_id))\
2537 2537 .join((Repository, UserRepoToPerm.repository_id == Repository.repo_id))\
2538 2538 .filter(UserRepoToPerm.user_id == user_id)
2539 2539 if repo_id:
2540 2540 q = q.filter(UserRepoToPerm.repository_id == repo_id)
2541 2541 return q.all()
2542 2542
2543 2543 @classmethod
2544 2544 def get_default_repo_perms_from_user_group(cls, user_id, repo_id=None):
2545 2545 q = Session().query(UserGroupRepoToPerm, Repository, Permission)\
2546 2546 .join(
2547 2547 Permission,
2548 2548 UserGroupRepoToPerm.permission_id == Permission.permission_id)\
2549 2549 .join(
2550 2550 Repository,
2551 2551 UserGroupRepoToPerm.repository_id == Repository.repo_id)\
2552 2552 .join(
2553 2553 UserGroup,
2554 2554 UserGroupRepoToPerm.users_group_id ==
2555 2555 UserGroup.users_group_id)\
2556 2556 .join(
2557 2557 UserGroupMember,
2558 2558 UserGroupRepoToPerm.users_group_id ==
2559 2559 UserGroupMember.users_group_id)\
2560 2560 .filter(
2561 2561 UserGroupMember.user_id == user_id,
2562 2562 UserGroup.users_group_active == true())
2563 2563 if repo_id:
2564 2564 q = q.filter(UserGroupRepoToPerm.repository_id == repo_id)
2565 2565 return q.all()
2566 2566
2567 2567 @classmethod
2568 2568 def get_default_group_perms(cls, user_id, repo_group_id=None):
2569 2569 q = Session().query(UserRepoGroupToPerm, RepoGroup, Permission)\
2570 2570 .join((Permission, UserRepoGroupToPerm.permission_id == Permission.permission_id))\
2571 2571 .join((RepoGroup, UserRepoGroupToPerm.group_id == RepoGroup.group_id))\
2572 2572 .filter(UserRepoGroupToPerm.user_id == user_id)
2573 2573 if repo_group_id:
2574 2574 q = q.filter(UserRepoGroupToPerm.group_id == repo_group_id)
2575 2575 return q.all()
2576 2576
2577 2577 @classmethod
2578 2578 def get_default_group_perms_from_user_group(
2579 2579 cls, user_id, repo_group_id=None):
2580 2580 q = Session().query(UserGroupRepoGroupToPerm, RepoGroup, Permission)\
2581 2581 .join(
2582 2582 Permission,
2583 2583 UserGroupRepoGroupToPerm.permission_id ==
2584 2584 Permission.permission_id)\
2585 2585 .join(
2586 2586 RepoGroup,
2587 2587 UserGroupRepoGroupToPerm.group_id == RepoGroup.group_id)\
2588 2588 .join(
2589 2589 UserGroup,
2590 2590 UserGroupRepoGroupToPerm.users_group_id ==
2591 2591 UserGroup.users_group_id)\
2592 2592 .join(
2593 2593 UserGroupMember,
2594 2594 UserGroupRepoGroupToPerm.users_group_id ==
2595 2595 UserGroupMember.users_group_id)\
2596 2596 .filter(
2597 2597 UserGroupMember.user_id == user_id,
2598 2598 UserGroup.users_group_active == true())
2599 2599 if repo_group_id:
2600 2600 q = q.filter(UserGroupRepoGroupToPerm.group_id == repo_group_id)
2601 2601 return q.all()
2602 2602
2603 2603 @classmethod
2604 2604 def get_default_user_group_perms(cls, user_id, user_group_id=None):
2605 2605 q = Session().query(UserUserGroupToPerm, UserGroup, Permission)\
2606 2606 .join((Permission, UserUserGroupToPerm.permission_id == Permission.permission_id))\
2607 2607 .join((UserGroup, UserUserGroupToPerm.user_group_id == UserGroup.users_group_id))\
2608 2608 .filter(UserUserGroupToPerm.user_id == user_id)
2609 2609 if user_group_id:
2610 2610 q = q.filter(UserUserGroupToPerm.user_group_id == user_group_id)
2611 2611 return q.all()
2612 2612
2613 2613 @classmethod
2614 2614 def get_default_user_group_perms_from_user_group(
2615 2615 cls, user_id, user_group_id=None):
2616 2616 TargetUserGroup = aliased(UserGroup, name='target_user_group')
2617 2617 q = Session().query(UserGroupUserGroupToPerm, UserGroup, Permission)\
2618 2618 .join(
2619 2619 Permission,
2620 2620 UserGroupUserGroupToPerm.permission_id ==
2621 2621 Permission.permission_id)\
2622 2622 .join(
2623 2623 TargetUserGroup,
2624 2624 UserGroupUserGroupToPerm.target_user_group_id ==
2625 2625 TargetUserGroup.users_group_id)\
2626 2626 .join(
2627 2627 UserGroup,
2628 2628 UserGroupUserGroupToPerm.user_group_id ==
2629 2629 UserGroup.users_group_id)\
2630 2630 .join(
2631 2631 UserGroupMember,
2632 2632 UserGroupUserGroupToPerm.user_group_id ==
2633 2633 UserGroupMember.users_group_id)\
2634 2634 .filter(
2635 2635 UserGroupMember.user_id == user_id,
2636 2636 UserGroup.users_group_active == true())
2637 2637 if user_group_id:
2638 2638 q = q.filter(
2639 2639 UserGroupUserGroupToPerm.user_group_id == user_group_id)
2640 2640
2641 2641 return q.all()
2642 2642
2643 2643
2644 2644 class UserRepoToPerm(Base, BaseModel):
2645 2645 __tablename__ = 'repo_to_perm'
2646 2646 __table_args__ = (
2647 2647 UniqueConstraint('user_id', 'repository_id', 'permission_id'),
2648 2648 {'extend_existing': True, 'mysql_engine': 'InnoDB',
2649 2649 'mysql_charset': 'utf8', 'sqlite_autoincrement': True}
2650 2650 )
2651 2651 repo_to_perm_id = Column("repo_to_perm_id", Integer(), nullable=False, unique=True, default=None, primary_key=True)
2652 2652 user_id = Column("user_id", Integer(), ForeignKey('users.user_id'), nullable=False, unique=None, default=None)
2653 2653 permission_id = Column("permission_id", Integer(), ForeignKey('permissions.permission_id'), nullable=False, unique=None, default=None)
2654 2654 repository_id = Column("repository_id", Integer(), ForeignKey('repositories.repo_id'), nullable=False, unique=None, default=None)
2655 2655
2656 2656 user = relationship('User')
2657 2657 repository = relationship('Repository')
2658 2658 permission = relationship('Permission')
2659 2659
2660 2660 @classmethod
2661 2661 def create(cls, user, repository, permission):
2662 2662 n = cls()
2663 2663 n.user = user
2664 2664 n.repository = repository
2665 2665 n.permission = permission
2666 2666 Session().add(n)
2667 2667 return n
2668 2668
2669 2669 def __unicode__(self):
2670 2670 return u'<%s => %s >' % (self.user, self.repository)
2671 2671
2672 2672
2673 2673 class UserUserGroupToPerm(Base, BaseModel):
2674 2674 __tablename__ = 'user_user_group_to_perm'
2675 2675 __table_args__ = (
2676 2676 UniqueConstraint('user_id', 'user_group_id', 'permission_id'),
2677 2677 {'extend_existing': True, 'mysql_engine': 'InnoDB',
2678 2678 'mysql_charset': 'utf8', 'sqlite_autoincrement': True}
2679 2679 )
2680 2680 user_user_group_to_perm_id = Column("user_user_group_to_perm_id", Integer(), nullable=False, unique=True, default=None, primary_key=True)
2681 2681 user_id = Column("user_id", Integer(), ForeignKey('users.user_id'), nullable=False, unique=None, default=None)
2682 2682 permission_id = Column("permission_id", Integer(), ForeignKey('permissions.permission_id'), nullable=False, unique=None, default=None)
2683 2683 user_group_id = Column("user_group_id", Integer(), ForeignKey('users_groups.users_group_id'), nullable=False, unique=None, default=None)
2684 2684
2685 2685 user = relationship('User')
2686 2686 user_group = relationship('UserGroup')
2687 2687 permission = relationship('Permission')
2688 2688
2689 2689 @classmethod
2690 2690 def create(cls, user, user_group, permission):
2691 2691 n = cls()
2692 2692 n.user = user
2693 2693 n.user_group = user_group
2694 2694 n.permission = permission
2695 2695 Session().add(n)
2696 2696 return n
2697 2697
2698 2698 def __unicode__(self):
2699 2699 return u'<%s => %s >' % (self.user, self.user_group)
2700 2700
2701 2701
2702 2702 class UserToPerm(Base, BaseModel):
2703 2703 __tablename__ = 'user_to_perm'
2704 2704 __table_args__ = (
2705 2705 UniqueConstraint('user_id', 'permission_id'),
2706 2706 {'extend_existing': True, 'mysql_engine': 'InnoDB',
2707 2707 'mysql_charset': 'utf8', 'sqlite_autoincrement': True}
2708 2708 )
2709 2709 user_to_perm_id = Column("user_to_perm_id", Integer(), nullable=False, unique=True, default=None, primary_key=True)
2710 2710 user_id = Column("user_id", Integer(), ForeignKey('users.user_id'), nullable=False, unique=None, default=None)
2711 2711 permission_id = Column("permission_id", Integer(), ForeignKey('permissions.permission_id'), nullable=False, unique=None, default=None)
2712 2712
2713 2713 user = relationship('User')
2714 2714 permission = relationship('Permission', lazy='joined')
2715 2715
2716 2716 def __unicode__(self):
2717 2717 return u'<%s => %s >' % (self.user, self.permission)
2718 2718
2719 2719
2720 2720 class UserGroupRepoToPerm(Base, BaseModel):
2721 2721 __tablename__ = 'users_group_repo_to_perm'
2722 2722 __table_args__ = (
2723 2723 UniqueConstraint('repository_id', 'users_group_id', 'permission_id'),
2724 2724 {'extend_existing': True, 'mysql_engine': 'InnoDB',
2725 2725 'mysql_charset': 'utf8', 'sqlite_autoincrement': True}
2726 2726 )
2727 2727 users_group_to_perm_id = Column("users_group_to_perm_id", Integer(), nullable=False, unique=True, default=None, primary_key=True)
2728 2728 users_group_id = Column("users_group_id", Integer(), ForeignKey('users_groups.users_group_id'), nullable=False, unique=None, default=None)
2729 2729 permission_id = Column("permission_id", Integer(), ForeignKey('permissions.permission_id'), nullable=False, unique=None, default=None)
2730 2730 repository_id = Column("repository_id", Integer(), ForeignKey('repositories.repo_id'), nullable=False, unique=None, default=None)
2731 2731
2732 2732 users_group = relationship('UserGroup')
2733 2733 permission = relationship('Permission')
2734 2734 repository = relationship('Repository')
2735 2735
2736 2736 @classmethod
2737 2737 def create(cls, users_group, repository, permission):
2738 2738 n = cls()
2739 2739 n.users_group = users_group
2740 2740 n.repository = repository
2741 2741 n.permission = permission
2742 2742 Session().add(n)
2743 2743 return n
2744 2744
2745 2745 def __unicode__(self):
2746 2746 return u'<UserGroupRepoToPerm:%s => %s >' % (self.users_group, self.repository)
2747 2747
2748 2748
2749 2749 class UserGroupUserGroupToPerm(Base, BaseModel):
2750 2750 __tablename__ = 'user_group_user_group_to_perm'
2751 2751 __table_args__ = (
2752 2752 UniqueConstraint('target_user_group_id', 'user_group_id', 'permission_id'),
2753 2753 CheckConstraint('target_user_group_id != user_group_id'),
2754 2754 {'extend_existing': True, 'mysql_engine': 'InnoDB',
2755 2755 'mysql_charset': 'utf8', 'sqlite_autoincrement': True}
2756 2756 )
2757 2757 user_group_user_group_to_perm_id = Column("user_group_user_group_to_perm_id", Integer(), nullable=False, unique=True, default=None, primary_key=True)
2758 2758 target_user_group_id = Column("target_user_group_id", Integer(), ForeignKey('users_groups.users_group_id'), nullable=False, unique=None, default=None)
2759 2759 permission_id = Column("permission_id", Integer(), ForeignKey('permissions.permission_id'), nullable=False, unique=None, default=None)
2760 2760 user_group_id = Column("user_group_id", Integer(), ForeignKey('users_groups.users_group_id'), nullable=False, unique=None, default=None)
2761 2761
2762 2762 target_user_group = relationship('UserGroup', primaryjoin='UserGroupUserGroupToPerm.target_user_group_id==UserGroup.users_group_id')
2763 2763 user_group = relationship('UserGroup', primaryjoin='UserGroupUserGroupToPerm.user_group_id==UserGroup.users_group_id')
2764 2764 permission = relationship('Permission')
2765 2765
2766 2766 @classmethod
2767 2767 def create(cls, target_user_group, user_group, permission):
2768 2768 n = cls()
2769 2769 n.target_user_group = target_user_group
2770 2770 n.user_group = user_group
2771 2771 n.permission = permission
2772 2772 Session().add(n)
2773 2773 return n
2774 2774
2775 2775 def __unicode__(self):
2776 2776 return u'<UserGroupUserGroup:%s => %s >' % (self.target_user_group, self.user_group)
2777 2777
2778 2778
2779 2779 class UserGroupToPerm(Base, BaseModel):
2780 2780 __tablename__ = 'users_group_to_perm'
2781 2781 __table_args__ = (
2782 2782 UniqueConstraint('users_group_id', 'permission_id',),
2783 2783 {'extend_existing': True, 'mysql_engine': 'InnoDB',
2784 2784 'mysql_charset': 'utf8', 'sqlite_autoincrement': True}
2785 2785 )
2786 2786 users_group_to_perm_id = Column("users_group_to_perm_id", Integer(), nullable=False, unique=True, default=None, primary_key=True)
2787 2787 users_group_id = Column("users_group_id", Integer(), ForeignKey('users_groups.users_group_id'), nullable=False, unique=None, default=None)
2788 2788 permission_id = Column("permission_id", Integer(), ForeignKey('permissions.permission_id'), nullable=False, unique=None, default=None)
2789 2789
2790 2790 users_group = relationship('UserGroup')
2791 2791 permission = relationship('Permission')
2792 2792
2793 2793
2794 2794 class UserRepoGroupToPerm(Base, BaseModel):
2795 2795 __tablename__ = 'user_repo_group_to_perm'
2796 2796 __table_args__ = (
2797 2797 UniqueConstraint('user_id', 'group_id', 'permission_id'),
2798 2798 {'extend_existing': True, 'mysql_engine': 'InnoDB',
2799 2799 'mysql_charset': 'utf8', 'sqlite_autoincrement': True}
2800 2800 )
2801 2801
2802 2802 group_to_perm_id = Column("group_to_perm_id", Integer(), nullable=False, unique=True, default=None, primary_key=True)
2803 2803 user_id = Column("user_id", Integer(), ForeignKey('users.user_id'), nullable=False, unique=None, default=None)
2804 2804 group_id = Column("group_id", Integer(), ForeignKey('groups.group_id'), nullable=False, unique=None, default=None)
2805 2805 permission_id = Column("permission_id", Integer(), ForeignKey('permissions.permission_id'), nullable=False, unique=None, default=None)
2806 2806
2807 2807 user = relationship('User')
2808 2808 group = relationship('RepoGroup')
2809 2809 permission = relationship('Permission')
2810 2810
2811 2811 @classmethod
2812 2812 def create(cls, user, repository_group, permission):
2813 2813 n = cls()
2814 2814 n.user = user
2815 2815 n.group = repository_group
2816 2816 n.permission = permission
2817 2817 Session().add(n)
2818 2818 return n
2819 2819
2820 2820
2821 2821 class UserGroupRepoGroupToPerm(Base, BaseModel):
2822 2822 __tablename__ = 'users_group_repo_group_to_perm'
2823 2823 __table_args__ = (
2824 2824 UniqueConstraint('users_group_id', 'group_id'),
2825 2825 {'extend_existing': True, 'mysql_engine': 'InnoDB',
2826 2826 'mysql_charset': 'utf8', 'sqlite_autoincrement': True}
2827 2827 )
2828 2828
2829 2829 users_group_repo_group_to_perm_id = Column("users_group_repo_group_to_perm_id", Integer(), nullable=False, unique=True, default=None, primary_key=True)
2830 2830 users_group_id = Column("users_group_id", Integer(), ForeignKey('users_groups.users_group_id'), nullable=False, unique=None, default=None)
2831 2831 group_id = Column("group_id", Integer(), ForeignKey('groups.group_id'), nullable=False, unique=None, default=None)
2832 2832 permission_id = Column("permission_id", Integer(), ForeignKey('permissions.permission_id'), nullable=False, unique=None, default=None)
2833 2833
2834 2834 users_group = relationship('UserGroup')
2835 2835 permission = relationship('Permission')
2836 2836 group = relationship('RepoGroup')
2837 2837
2838 2838 @classmethod
2839 2839 def create(cls, user_group, repository_group, permission):
2840 2840 n = cls()
2841 2841 n.users_group = user_group
2842 2842 n.group = repository_group
2843 2843 n.permission = permission
2844 2844 Session().add(n)
2845 2845 return n
2846 2846
2847 2847 def __unicode__(self):
2848 2848 return u'<UserGroupRepoGroupToPerm:%s => %s >' % (self.users_group, self.group)
2849 2849
2850 2850
2851 2851 class Statistics(Base, BaseModel):
2852 2852 __tablename__ = 'statistics'
2853 2853 __table_args__ = (
2854 2854 UniqueConstraint('repository_id'),
2855 2855 {'extend_existing': True, 'mysql_engine': 'InnoDB',
2856 2856 'mysql_charset': 'utf8', 'sqlite_autoincrement': True}
2857 2857 )
2858 2858 stat_id = Column("stat_id", Integer(), nullable=False, unique=True, default=None, primary_key=True)
2859 2859 repository_id = Column("repository_id", Integer(), ForeignKey('repositories.repo_id'), nullable=False, unique=True, default=None)
2860 2860 stat_on_revision = Column("stat_on_revision", Integer(), nullable=False)
2861 2861 commit_activity = Column("commit_activity", LargeBinary(1000000), nullable=False)#JSON data
2862 2862 commit_activity_combined = Column("commit_activity_combined", LargeBinary(), nullable=False)#JSON data
2863 2863 languages = Column("languages", LargeBinary(1000000), nullable=False)#JSON data
2864 2864
2865 2865 repository = relationship('Repository', single_parent=True)
2866 2866
2867 2867
2868 2868 class UserFollowing(Base, BaseModel):
2869 2869 __tablename__ = 'user_followings'
2870 2870 __table_args__ = (
2871 2871 UniqueConstraint('user_id', 'follows_repository_id'),
2872 2872 UniqueConstraint('user_id', 'follows_user_id'),
2873 2873 {'extend_existing': True, 'mysql_engine': 'InnoDB',
2874 2874 'mysql_charset': 'utf8', 'sqlite_autoincrement': True}
2875 2875 )
2876 2876
2877 2877 user_following_id = Column("user_following_id", Integer(), nullable=False, unique=True, default=None, primary_key=True)
2878 2878 user_id = Column("user_id", Integer(), ForeignKey('users.user_id'), nullable=False, unique=None, default=None)
2879 2879 follows_repo_id = Column("follows_repository_id", Integer(), ForeignKey('repositories.repo_id'), nullable=True, unique=None, default=None)
2880 2880 follows_user_id = Column("follows_user_id", Integer(), ForeignKey('users.user_id'), nullable=True, unique=None, default=None)
2881 2881 follows_from = Column('follows_from', DateTime(timezone=False), nullable=True, unique=None, default=datetime.datetime.now)
2882 2882
2883 2883 user = relationship('User', primaryjoin='User.user_id==UserFollowing.user_id')
2884 2884
2885 2885 follows_user = relationship('User', primaryjoin='User.user_id==UserFollowing.follows_user_id')
2886 2886 follows_repository = relationship('Repository', order_by='Repository.repo_name')
2887 2887
2888 2888 @classmethod
2889 2889 def get_repo_followers(cls, repo_id):
2890 2890 return cls.query().filter(cls.follows_repo_id == repo_id)
2891 2891
2892 2892
2893 2893 class CacheKey(Base, BaseModel):
2894 2894 __tablename__ = 'cache_invalidation'
2895 2895 __table_args__ = (
2896 2896 UniqueConstraint('cache_key'),
2897 2897 Index('key_idx', 'cache_key'),
2898 2898 {'extend_existing': True, 'mysql_engine': 'InnoDB',
2899 2899 'mysql_charset': 'utf8', 'sqlite_autoincrement': True},
2900 2900 )
2901 2901 CACHE_TYPE_ATOM = 'ATOM'
2902 2902 CACHE_TYPE_RSS = 'RSS'
2903 2903 CACHE_TYPE_README = 'README'
2904 2904
2905 2905 cache_id = Column("cache_id", Integer(), nullable=False, unique=True, default=None, primary_key=True)
2906 2906 cache_key = Column("cache_key", String(255), nullable=True, unique=None, default=None)
2907 2907 cache_args = Column("cache_args", String(255), nullable=True, unique=None, default=None)
2908 2908 cache_active = Column("cache_active", Boolean(), nullable=True, unique=None, default=False)
2909 2909
2910 2910 def __init__(self, cache_key, cache_args=''):
2911 2911 self.cache_key = cache_key
2912 2912 self.cache_args = cache_args
2913 2913 self.cache_active = False
2914 2914
2915 2915 def __unicode__(self):
2916 2916 return u"<%s('%s:%s[%s]')>" % (
2917 2917 self.__class__.__name__,
2918 2918 self.cache_id, self.cache_key, self.cache_active)
2919 2919
2920 2920 def _cache_key_partition(self):
2921 2921 prefix, repo_name, suffix = self.cache_key.partition(self.cache_args)
2922 2922 return prefix, repo_name, suffix
2923 2923
2924 2924 def get_prefix(self):
2925 2925 """
2926 2926 Try to extract prefix from existing cache key. The key could consist
2927 2927 of prefix, repo_name, suffix
2928 2928 """
2929 2929 # this returns prefix, repo_name, suffix
2930 2930 return self._cache_key_partition()[0]
2931 2931
2932 2932 def get_suffix(self):
2933 2933 """
2934 2934 get suffix that might have been used in _get_cache_key to
2935 2935 generate self.cache_key. Only used for informational purposes
2936 2936 in repo_edit.mako.
2937 2937 """
2938 2938 # prefix, repo_name, suffix
2939 2939 return self._cache_key_partition()[2]
2940 2940
2941 2941 @classmethod
2942 2942 def delete_all_cache(cls):
2943 2943 """
2944 2944 Delete all cache keys from database.
2945 2945 Should only be run when all instances are down and all entries
2946 2946 thus stale.
2947 2947 """
2948 2948 cls.query().delete()
2949 2949 Session().commit()
2950 2950
2951 2951 @classmethod
2952 2952 def get_cache_key(cls, repo_name, cache_type):
2953 2953 """
2954 2954
2955 2955 Generate a cache key for this process of RhodeCode instance.
2956 2956 Prefix most likely will be process id or maybe explicitly set
2957 2957 instance_id from .ini file.
2958 2958 """
2959 2959 import rhodecode
2960 2960 prefix = safe_unicode(rhodecode.CONFIG.get('instance_id') or '')
2961 2961
2962 2962 repo_as_unicode = safe_unicode(repo_name)
2963 2963 key = u'{}_{}'.format(repo_as_unicode, cache_type) \
2964 2964 if cache_type else repo_as_unicode
2965 2965
2966 2966 return u'{}{}'.format(prefix, key)
2967 2967
2968 2968 @classmethod
2969 2969 def set_invalidate(cls, repo_name, delete=False):
2970 2970 """
2971 2971 Mark all caches of a repo as invalid in the database.
2972 2972 """
2973 2973
2974 2974 try:
2975 2975 qry = Session().query(cls).filter(cls.cache_args == repo_name)
2976 2976 if delete:
2977 2977 log.debug('cache objects deleted for repo %s',
2978 2978 safe_str(repo_name))
2979 2979 qry.delete()
2980 2980 else:
2981 2981 log.debug('cache objects marked as invalid for repo %s',
2982 2982 safe_str(repo_name))
2983 2983 qry.update({"cache_active": False})
2984 2984
2985 2985 Session().commit()
2986 2986 except Exception:
2987 2987 log.exception(
2988 2988 'Cache key invalidation failed for repository %s',
2989 2989 safe_str(repo_name))
2990 2990 Session().rollback()
2991 2991
2992 2992 @classmethod
2993 2993 def get_active_cache(cls, cache_key):
2994 2994 inv_obj = cls.query().filter(cls.cache_key == cache_key).scalar()
2995 2995 if inv_obj:
2996 2996 return inv_obj
2997 2997 return None
2998 2998
2999 2999 @classmethod
3000 3000 def repo_context_cache(cls, compute_func, repo_name, cache_type,
3001 3001 thread_scoped=False):
3002 3002 """
3003 3003 @cache_region('long_term')
3004 3004 def _heavy_calculation(cache_key):
3005 3005 return 'result'
3006 3006
3007 3007 cache_context = CacheKey.repo_context_cache(
3008 3008 _heavy_calculation, repo_name, cache_type)
3009 3009
3010 3010 with cache_context as context:
3011 3011 context.invalidate()
3012 3012 computed = context.compute()
3013 3013
3014 3014 assert computed == 'result'
3015 3015 """
3016 3016 from rhodecode.lib import caches
3017 3017 return caches.InvalidationContext(
3018 3018 compute_func, repo_name, cache_type, thread_scoped=thread_scoped)
3019 3019
3020 3020
3021 3021 class ChangesetComment(Base, BaseModel):
3022 3022 __tablename__ = 'changeset_comments'
3023 3023 __table_args__ = (
3024 3024 Index('cc_revision_idx', 'revision'),
3025 3025 {'extend_existing': True, 'mysql_engine': 'InnoDB',
3026 3026 'mysql_charset': 'utf8', 'sqlite_autoincrement': True},
3027 3027 )
3028 3028
3029 3029 COMMENT_OUTDATED = u'comment_outdated'
3030 3030 COMMENT_TYPE_NOTE = u'note'
3031 3031 COMMENT_TYPE_TODO = u'todo'
3032 3032 COMMENT_TYPES = [COMMENT_TYPE_NOTE, COMMENT_TYPE_TODO]
3033 3033
3034 3034 comment_id = Column('comment_id', Integer(), nullable=False, primary_key=True)
3035 3035 repo_id = Column('repo_id', Integer(), ForeignKey('repositories.repo_id'), nullable=False)
3036 3036 revision = Column('revision', String(40), nullable=True)
3037 3037 pull_request_id = Column("pull_request_id", Integer(), ForeignKey('pull_requests.pull_request_id'), nullable=True)
3038 3038 pull_request_version_id = Column("pull_request_version_id", Integer(), ForeignKey('pull_request_versions.pull_request_version_id'), nullable=True)
3039 3039 line_no = Column('line_no', Unicode(10), nullable=True)
3040 3040 hl_lines = Column('hl_lines', Unicode(512), nullable=True)
3041 3041 f_path = Column('f_path', Unicode(1000), nullable=True)
3042 3042 user_id = Column('user_id', Integer(), ForeignKey('users.user_id'), nullable=False)
3043 3043 text = Column('text', UnicodeText().with_variant(UnicodeText(25000), 'mysql'), nullable=False)
3044 3044 created_on = Column('created_on', DateTime(timezone=False), nullable=False, default=datetime.datetime.now)
3045 3045 modified_at = Column('modified_at', DateTime(timezone=False), nullable=False, default=datetime.datetime.now)
3046 3046 renderer = Column('renderer', Unicode(64), nullable=True)
3047 3047 display_state = Column('display_state', Unicode(128), nullable=True)
3048 3048
3049 3049 comment_type = Column('comment_type', Unicode(128), nullable=True, default=COMMENT_TYPE_NOTE)
3050 3050 resolved_comment_id = Column('resolved_comment_id', Integer(), ForeignKey('changeset_comments.comment_id'), nullable=True)
3051 3051 resolved_comment = relationship('ChangesetComment', remote_side=comment_id, backref='resolved_by')
3052 3052 author = relationship('User', lazy='joined')
3053 3053 repo = relationship('Repository')
3054 3054 status_change = relationship('ChangesetStatus', cascade="all, delete, delete-orphan", lazy='joined')
3055 3055 pull_request = relationship('PullRequest', lazy='joined')
3056 3056 pull_request_version = relationship('PullRequestVersion')
3057 3057
3058 3058 @classmethod
3059 3059 def get_users(cls, revision=None, pull_request_id=None):
3060 3060 """
3061 3061 Returns user associated with this ChangesetComment. ie those
3062 3062 who actually commented
3063 3063
3064 3064 :param cls:
3065 3065 :param revision:
3066 3066 """
3067 3067 q = Session().query(User)\
3068 3068 .join(ChangesetComment.author)
3069 3069 if revision:
3070 3070 q = q.filter(cls.revision == revision)
3071 3071 elif pull_request_id:
3072 3072 q = q.filter(cls.pull_request_id == pull_request_id)
3073 3073 return q.all()
3074 3074
3075 3075 @classmethod
3076 3076 def get_index_from_version(cls, pr_version, versions):
3077 3077 num_versions = [x.pull_request_version_id for x in versions]
3078 3078 try:
3079 3079 return num_versions.index(pr_version) +1
3080 3080 except (IndexError, ValueError):
3081 3081 return
3082 3082
3083 3083 @property
3084 3084 def outdated(self):
3085 3085 return self.display_state == self.COMMENT_OUTDATED
3086 3086
3087 3087 def outdated_at_version(self, version):
3088 3088 """
3089 3089 Checks if comment is outdated for given pull request version
3090 3090 """
3091 3091 return self.outdated and self.pull_request_version_id != version
3092 3092
3093 3093 def older_than_version(self, version):
3094 3094 """
3095 3095 Checks if comment is made from previous version than given
3096 3096 """
3097 3097 if version is None:
3098 3098 return self.pull_request_version_id is not None
3099 3099
3100 3100 return self.pull_request_version_id < version
3101 3101
3102 3102 @property
3103 3103 def resolved(self):
3104 3104 return self.resolved_by[0] if self.resolved_by else None
3105 3105
3106 3106 @property
3107 3107 def is_todo(self):
3108 3108 return self.comment_type == self.COMMENT_TYPE_TODO
3109 3109
3110 3110 def get_index_version(self, versions):
3111 3111 return self.get_index_from_version(
3112 3112 self.pull_request_version_id, versions)
3113 3113
3114 3114 def __repr__(self):
3115 3115 if self.comment_id:
3116 3116 return '<DB:Comment #%s>' % self.comment_id
3117 3117 else:
3118 3118 return '<DB:Comment at %#x>' % id(self)
3119 3119
3120 3120
3121 3121 class ChangesetStatus(Base, BaseModel):
3122 3122 __tablename__ = 'changeset_statuses'
3123 3123 __table_args__ = (
3124 3124 Index('cs_revision_idx', 'revision'),
3125 3125 Index('cs_version_idx', 'version'),
3126 3126 UniqueConstraint('repo_id', 'revision', 'version'),
3127 3127 {'extend_existing': True, 'mysql_engine': 'InnoDB',
3128 3128 'mysql_charset': 'utf8', 'sqlite_autoincrement': True}
3129 3129 )
3130 3130 STATUS_NOT_REVIEWED = DEFAULT = 'not_reviewed'
3131 3131 STATUS_APPROVED = 'approved'
3132 3132 STATUS_REJECTED = 'rejected'
3133 3133 STATUS_UNDER_REVIEW = 'under_review'
3134 3134
3135 3135 STATUSES = [
3136 3136 (STATUS_NOT_REVIEWED, _("Not Reviewed")), # (no icon) and default
3137 3137 (STATUS_APPROVED, _("Approved")),
3138 3138 (STATUS_REJECTED, _("Rejected")),
3139 3139 (STATUS_UNDER_REVIEW, _("Under Review")),
3140 3140 ]
3141 3141
3142 3142 changeset_status_id = Column('changeset_status_id', Integer(), nullable=False, primary_key=True)
3143 3143 repo_id = Column('repo_id', Integer(), ForeignKey('repositories.repo_id'), nullable=False)
3144 3144 user_id = Column("user_id", Integer(), ForeignKey('users.user_id'), nullable=False, unique=None)
3145 3145 revision = Column('revision', String(40), nullable=False)
3146 3146 status = Column('status', String(128), nullable=False, default=DEFAULT)
3147 3147 changeset_comment_id = Column('changeset_comment_id', Integer(), ForeignKey('changeset_comments.comment_id'))
3148 3148 modified_at = Column('modified_at', DateTime(), nullable=False, default=datetime.datetime.now)
3149 3149 version = Column('version', Integer(), nullable=False, default=0)
3150 3150 pull_request_id = Column("pull_request_id", Integer(), ForeignKey('pull_requests.pull_request_id'), nullable=True)
3151 3151
3152 3152 author = relationship('User', lazy='joined')
3153 3153 repo = relationship('Repository')
3154 3154 comment = relationship('ChangesetComment', lazy='joined')
3155 3155 pull_request = relationship('PullRequest', lazy='joined')
3156 3156
3157 3157 def __unicode__(self):
3158 3158 return u"<%s('%s[v%s]:%s')>" % (
3159 3159 self.__class__.__name__,
3160 3160 self.status, self.version, self.author
3161 3161 )
3162 3162
3163 3163 @classmethod
3164 3164 def get_status_lbl(cls, value):
3165 3165 return dict(cls.STATUSES).get(value)
3166 3166
3167 3167 @property
3168 3168 def status_lbl(self):
3169 3169 return ChangesetStatus.get_status_lbl(self.status)
3170 3170
3171 3171
3172 3172 class _PullRequestBase(BaseModel):
3173 3173 """
3174 3174 Common attributes of pull request and version entries.
3175 3175 """
3176 3176
3177 3177 # .status values
3178 3178 STATUS_NEW = u'new'
3179 3179 STATUS_OPEN = u'open'
3180 3180 STATUS_CLOSED = u'closed'
3181 3181
3182 3182 title = Column('title', Unicode(255), nullable=True)
3183 3183 description = Column(
3184 3184 'description', UnicodeText().with_variant(UnicodeText(10240), 'mysql'),
3185 3185 nullable=True)
3186 3186 # new/open/closed status of pull request (not approve/reject/etc)
3187 3187 status = Column('status', Unicode(255), nullable=False, default=STATUS_NEW)
3188 3188 created_on = Column(
3189 3189 'created_on', DateTime(timezone=False), nullable=False,
3190 3190 default=datetime.datetime.now)
3191 3191 updated_on = Column(
3192 3192 'updated_on', DateTime(timezone=False), nullable=False,
3193 3193 default=datetime.datetime.now)
3194 3194
3195 3195 @declared_attr
3196 3196 def user_id(cls):
3197 3197 return Column(
3198 3198 "user_id", Integer(), ForeignKey('users.user_id'), nullable=False,
3199 3199 unique=None)
3200 3200
3201 3201 # 500 revisions max
3202 3202 _revisions = Column(
3203 3203 'revisions', UnicodeText().with_variant(UnicodeText(20500), 'mysql'))
3204 3204
3205 3205 @declared_attr
3206 3206 def source_repo_id(cls):
3207 3207 # TODO: dan: rename column to source_repo_id
3208 3208 return Column(
3209 3209 'org_repo_id', Integer(), ForeignKey('repositories.repo_id'),
3210 3210 nullable=False)
3211 3211
3212 3212 source_ref = Column('org_ref', Unicode(255), nullable=False)
3213 3213
3214 3214 @declared_attr
3215 3215 def target_repo_id(cls):
3216 3216 # TODO: dan: rename column to target_repo_id
3217 3217 return Column(
3218 3218 'other_repo_id', Integer(), ForeignKey('repositories.repo_id'),
3219 3219 nullable=False)
3220 3220
3221 3221 target_ref = Column('other_ref', Unicode(255), nullable=False)
3222 3222 _shadow_merge_ref = Column('shadow_merge_ref', Unicode(255), nullable=True)
3223 3223
3224 3224 # TODO: dan: rename column to last_merge_source_rev
3225 3225 _last_merge_source_rev = Column(
3226 3226 'last_merge_org_rev', String(40), nullable=True)
3227 3227 # TODO: dan: rename column to last_merge_target_rev
3228 3228 _last_merge_target_rev = Column(
3229 3229 'last_merge_other_rev', String(40), nullable=True)
3230 3230 _last_merge_status = Column('merge_status', Integer(), nullable=True)
3231 3231 merge_rev = Column('merge_rev', String(40), nullable=True)
3232 3232
3233 3233 reviewer_data = Column(
3234 3234 'reviewer_data_json', MutationObj.as_mutable(
3235 3235 JsonType(dialect_map=dict(mysql=UnicodeText(16384)))))
3236 3236
3237 3237 @property
3238 3238 def reviewer_data_json(self):
3239 3239 return json.dumps(self.reviewer_data)
3240 3240
3241 3241 @hybrid_property
3242 3242 def revisions(self):
3243 3243 return self._revisions.split(':') if self._revisions else []
3244 3244
3245 3245 @revisions.setter
3246 3246 def revisions(self, val):
3247 3247 self._revisions = ':'.join(val)
3248 3248
3249 3249 @declared_attr
3250 3250 def author(cls):
3251 3251 return relationship('User', lazy='joined')
3252 3252
3253 3253 @declared_attr
3254 3254 def source_repo(cls):
3255 3255 return relationship(
3256 3256 'Repository',
3257 3257 primaryjoin='%s.source_repo_id==Repository.repo_id' % cls.__name__)
3258 3258
3259 3259 @property
3260 3260 def source_ref_parts(self):
3261 3261 return self.unicode_to_reference(self.source_ref)
3262 3262
3263 3263 @declared_attr
3264 3264 def target_repo(cls):
3265 3265 return relationship(
3266 3266 'Repository',
3267 3267 primaryjoin='%s.target_repo_id==Repository.repo_id' % cls.__name__)
3268 3268
3269 3269 @property
3270 3270 def target_ref_parts(self):
3271 3271 return self.unicode_to_reference(self.target_ref)
3272 3272
3273 3273 @property
3274 3274 def shadow_merge_ref(self):
3275 3275 return self.unicode_to_reference(self._shadow_merge_ref)
3276 3276
3277 3277 @shadow_merge_ref.setter
3278 3278 def shadow_merge_ref(self, ref):
3279 3279 self._shadow_merge_ref = self.reference_to_unicode(ref)
3280 3280
3281 3281 def unicode_to_reference(self, raw):
3282 3282 """
3283 3283 Convert a unicode (or string) to a reference object.
3284 3284 If unicode evaluates to False it returns None.
3285 3285 """
3286 3286 if raw:
3287 3287 refs = raw.split(':')
3288 3288 return Reference(*refs)
3289 3289 else:
3290 3290 return None
3291 3291
3292 3292 def reference_to_unicode(self, ref):
3293 3293 """
3294 3294 Convert a reference object to unicode.
3295 3295 If reference is None it returns None.
3296 3296 """
3297 3297 if ref:
3298 3298 return u':'.join(ref)
3299 3299 else:
3300 3300 return None
3301 3301
3302 3302 def get_api_data(self):
3303 3303 from pylons import url
3304 3304 from rhodecode.model.pull_request import PullRequestModel
3305 3305 pull_request = self
3306 3306 merge_status = PullRequestModel().merge_status(pull_request)
3307 3307
3308 3308 pull_request_url = url(
3309 3309 'pullrequest_show', repo_name=self.target_repo.repo_name,
3310 3310 pull_request_id=self.pull_request_id, qualified=True)
3311 3311
3312 3312 merge_data = {
3313 3313 'clone_url': PullRequestModel().get_shadow_clone_url(pull_request),
3314 3314 'reference': (
3315 3315 pull_request.shadow_merge_ref._asdict()
3316 3316 if pull_request.shadow_merge_ref else None),
3317 3317 }
3318 3318
3319 3319 data = {
3320 3320 'pull_request_id': pull_request.pull_request_id,
3321 3321 'url': pull_request_url,
3322 3322 'title': pull_request.title,
3323 3323 'description': pull_request.description,
3324 3324 'status': pull_request.status,
3325 3325 'created_on': pull_request.created_on,
3326 3326 'updated_on': pull_request.updated_on,
3327 3327 'commit_ids': pull_request.revisions,
3328 3328 'review_status': pull_request.calculated_review_status(),
3329 3329 'mergeable': {
3330 3330 'status': merge_status[0],
3331 3331 'message': unicode(merge_status[1]),
3332 3332 },
3333 3333 'source': {
3334 3334 'clone_url': pull_request.source_repo.clone_url(),
3335 3335 'repository': pull_request.source_repo.repo_name,
3336 3336 'reference': {
3337 3337 'name': pull_request.source_ref_parts.name,
3338 3338 'type': pull_request.source_ref_parts.type,
3339 3339 'commit_id': pull_request.source_ref_parts.commit_id,
3340 3340 },
3341 3341 },
3342 3342 'target': {
3343 3343 'clone_url': pull_request.target_repo.clone_url(),
3344 3344 'repository': pull_request.target_repo.repo_name,
3345 3345 'reference': {
3346 3346 'name': pull_request.target_ref_parts.name,
3347 3347 'type': pull_request.target_ref_parts.type,
3348 3348 'commit_id': pull_request.target_ref_parts.commit_id,
3349 3349 },
3350 3350 },
3351 3351 'merge': merge_data,
3352 3352 'author': pull_request.author.get_api_data(include_secrets=False,
3353 3353 details='basic'),
3354 3354 'reviewers': [
3355 3355 {
3356 3356 'user': reviewer.get_api_data(include_secrets=False,
3357 3357 details='basic'),
3358 3358 'reasons': reasons,
3359 3359 'review_status': st[0][1].status if st else 'not_reviewed',
3360 3360 }
3361 3361 for reviewer, reasons, mandatory, st in
3362 3362 pull_request.reviewers_statuses()
3363 3363 ]
3364 3364 }
3365 3365
3366 3366 return data
3367 3367
3368 3368
3369 3369 class PullRequest(Base, _PullRequestBase):
3370 3370 __tablename__ = 'pull_requests'
3371 3371 __table_args__ = (
3372 3372 {'extend_existing': True, 'mysql_engine': 'InnoDB',
3373 3373 'mysql_charset': 'utf8', 'sqlite_autoincrement': True},
3374 3374 )
3375 3375
3376 3376 pull_request_id = Column(
3377 3377 'pull_request_id', Integer(), nullable=False, primary_key=True)
3378 3378
3379 3379 def __repr__(self):
3380 3380 if self.pull_request_id:
3381 3381 return '<DB:PullRequest #%s>' % self.pull_request_id
3382 3382 else:
3383 3383 return '<DB:PullRequest at %#x>' % id(self)
3384 3384
3385 3385 reviewers = relationship('PullRequestReviewers',
3386 3386 cascade="all, delete, delete-orphan")
3387 3387 statuses = relationship('ChangesetStatus')
3388 3388 comments = relationship('ChangesetComment',
3389 3389 cascade="all, delete, delete-orphan")
3390 3390 versions = relationship('PullRequestVersion',
3391 3391 cascade="all, delete, delete-orphan",
3392 3392 lazy='dynamic')
3393 3393
3394 3394 @classmethod
3395 3395 def get_pr_display_object(cls, pull_request_obj, org_pull_request_obj,
3396 3396 internal_methods=None):
3397 3397
3398 3398 class PullRequestDisplay(object):
3399 3399 """
3400 3400 Special object wrapper for showing PullRequest data via Versions
3401 3401 It mimics PR object as close as possible. This is read only object
3402 3402 just for display
3403 3403 """
3404 3404
3405 3405 def __init__(self, attrs, internal=None):
3406 3406 self.attrs = attrs
3407 3407 # internal have priority over the given ones via attrs
3408 3408 self.internal = internal or ['versions']
3409 3409
3410 3410 def __getattr__(self, item):
3411 3411 if item in self.internal:
3412 3412 return getattr(self, item)
3413 3413 try:
3414 3414 return self.attrs[item]
3415 3415 except KeyError:
3416 3416 raise AttributeError(
3417 3417 '%s object has no attribute %s' % (self, item))
3418 3418
3419 3419 def __repr__(self):
3420 3420 return '<DB:PullRequestDisplay #%s>' % self.attrs.get('pull_request_id')
3421 3421
3422 3422 def versions(self):
3423 3423 return pull_request_obj.versions.order_by(
3424 3424 PullRequestVersion.pull_request_version_id).all()
3425 3425
3426 3426 def is_closed(self):
3427 3427 return pull_request_obj.is_closed()
3428 3428
3429 3429 @property
3430 3430 def pull_request_version_id(self):
3431 3431 return getattr(pull_request_obj, 'pull_request_version_id', None)
3432 3432
3433 3433 attrs = StrictAttributeDict(pull_request_obj.get_api_data())
3434 3434
3435 3435 attrs.author = StrictAttributeDict(
3436 3436 pull_request_obj.author.get_api_data())
3437 3437 if pull_request_obj.target_repo:
3438 3438 attrs.target_repo = StrictAttributeDict(
3439 3439 pull_request_obj.target_repo.get_api_data())
3440 3440 attrs.target_repo.clone_url = pull_request_obj.target_repo.clone_url
3441 3441
3442 3442 if pull_request_obj.source_repo:
3443 3443 attrs.source_repo = StrictAttributeDict(
3444 3444 pull_request_obj.source_repo.get_api_data())
3445 3445 attrs.source_repo.clone_url = pull_request_obj.source_repo.clone_url
3446 3446
3447 3447 attrs.source_ref_parts = pull_request_obj.source_ref_parts
3448 3448 attrs.target_ref_parts = pull_request_obj.target_ref_parts
3449 3449 attrs.revisions = pull_request_obj.revisions
3450 3450
3451 3451 attrs.shadow_merge_ref = org_pull_request_obj.shadow_merge_ref
3452 3452 attrs.reviewer_data = org_pull_request_obj.reviewer_data
3453 3453 attrs.reviewer_data_json = org_pull_request_obj.reviewer_data_json
3454 3454
3455 3455 return PullRequestDisplay(attrs, internal=internal_methods)
3456 3456
3457 3457 def is_closed(self):
3458 3458 return self.status == self.STATUS_CLOSED
3459 3459
3460 3460 def __json__(self):
3461 3461 return {
3462 3462 'revisions': self.revisions,
3463 3463 }
3464 3464
3465 3465 def calculated_review_status(self):
3466 3466 from rhodecode.model.changeset_status import ChangesetStatusModel
3467 3467 return ChangesetStatusModel().calculated_review_status(self)
3468 3468
3469 3469 def reviewers_statuses(self):
3470 3470 from rhodecode.model.changeset_status import ChangesetStatusModel
3471 3471 return ChangesetStatusModel().reviewers_statuses(self)
3472 3472
3473 3473 @property
3474 3474 def workspace_id(self):
3475 3475 from rhodecode.model.pull_request import PullRequestModel
3476 3476 return PullRequestModel()._workspace_id(self)
3477 3477
3478 3478 def get_shadow_repo(self):
3479 3479 workspace_id = self.workspace_id
3480 3480 vcs_obj = self.target_repo.scm_instance()
3481 3481 shadow_repository_path = vcs_obj._get_shadow_repository_path(
3482 3482 workspace_id)
3483 3483 return vcs_obj._get_shadow_instance(shadow_repository_path)
3484 3484
3485 3485
3486 3486 class PullRequestVersion(Base, _PullRequestBase):
3487 3487 __tablename__ = 'pull_request_versions'
3488 3488 __table_args__ = (
3489 3489 {'extend_existing': True, 'mysql_engine': 'InnoDB',
3490 3490 'mysql_charset': 'utf8', 'sqlite_autoincrement': True},
3491 3491 )
3492 3492
3493 3493 pull_request_version_id = Column(
3494 3494 'pull_request_version_id', Integer(), nullable=False, primary_key=True)
3495 3495 pull_request_id = Column(
3496 3496 'pull_request_id', Integer(),
3497 3497 ForeignKey('pull_requests.pull_request_id'), nullable=False)
3498 3498 pull_request = relationship('PullRequest')
3499 3499
3500 3500 def __repr__(self):
3501 3501 if self.pull_request_version_id:
3502 3502 return '<DB:PullRequestVersion #%s>' % self.pull_request_version_id
3503 3503 else:
3504 3504 return '<DB:PullRequestVersion at %#x>' % id(self)
3505 3505
3506 3506 @property
3507 3507 def reviewers(self):
3508 3508 return self.pull_request.reviewers
3509 3509
3510 3510 @property
3511 3511 def versions(self):
3512 3512 return self.pull_request.versions
3513 3513
3514 3514 def is_closed(self):
3515 3515 # calculate from original
3516 3516 return self.pull_request.status == self.STATUS_CLOSED
3517 3517
3518 3518 def calculated_review_status(self):
3519 3519 return self.pull_request.calculated_review_status()
3520 3520
3521 3521 def reviewers_statuses(self):
3522 3522 return self.pull_request.reviewers_statuses()
3523 3523
3524 3524
3525 3525 class PullRequestReviewers(Base, BaseModel):
3526 3526 __tablename__ = 'pull_request_reviewers'
3527 3527 __table_args__ = (
3528 3528 {'extend_existing': True, 'mysql_engine': 'InnoDB',
3529 3529 'mysql_charset': 'utf8', 'sqlite_autoincrement': True},
3530 3530 )
3531 3531
3532 3532 @hybrid_property
3533 3533 def reasons(self):
3534 3534 if not self._reasons:
3535 3535 return []
3536 3536 return self._reasons
3537 3537
3538 3538 @reasons.setter
3539 3539 def reasons(self, val):
3540 3540 val = val or []
3541 3541 if any(not isinstance(x, basestring) for x in val):
3542 3542 raise Exception('invalid reasons type, must be list of strings')
3543 3543 self._reasons = val
3544 3544
3545 3545 pull_requests_reviewers_id = Column(
3546 3546 'pull_requests_reviewers_id', Integer(), nullable=False,
3547 3547 primary_key=True)
3548 3548 pull_request_id = Column(
3549 3549 "pull_request_id", Integer(),
3550 3550 ForeignKey('pull_requests.pull_request_id'), nullable=False)
3551 3551 user_id = Column(
3552 3552 "user_id", Integer(), ForeignKey('users.user_id'), nullable=True)
3553 3553 _reasons = Column(
3554 3554 'reason', MutationList.as_mutable(
3555 3555 JsonType('list', dialect_map=dict(mysql=UnicodeText(16384)))))
3556 3556 mandatory = Column("mandatory", Boolean(), nullable=False, default=False)
3557 3557 user = relationship('User')
3558 3558 pull_request = relationship('PullRequest')
3559 3559
3560 3560
3561 3561 class Notification(Base, BaseModel):
3562 3562 __tablename__ = 'notifications'
3563 3563 __table_args__ = (
3564 3564 Index('notification_type_idx', 'type'),
3565 3565 {'extend_existing': True, 'mysql_engine': 'InnoDB',
3566 3566 'mysql_charset': 'utf8', 'sqlite_autoincrement': True},
3567 3567 )
3568 3568
3569 3569 TYPE_CHANGESET_COMMENT = u'cs_comment'
3570 3570 TYPE_MESSAGE = u'message'
3571 3571 TYPE_MENTION = u'mention'
3572 3572 TYPE_REGISTRATION = u'registration'
3573 3573 TYPE_PULL_REQUEST = u'pull_request'
3574 3574 TYPE_PULL_REQUEST_COMMENT = u'pull_request_comment'
3575 3575
3576 3576 notification_id = Column('notification_id', Integer(), nullable=False, primary_key=True)
3577 3577 subject = Column('subject', Unicode(512), nullable=True)
3578 3578 body = Column('body', UnicodeText().with_variant(UnicodeText(50000), 'mysql'), nullable=True)
3579 3579 created_by = Column("created_by", Integer(), ForeignKey('users.user_id'), nullable=True)
3580 3580 created_on = Column('created_on', DateTime(timezone=False), nullable=False, default=datetime.datetime.now)
3581 3581 type_ = Column('type', Unicode(255))
3582 3582
3583 3583 created_by_user = relationship('User')
3584 3584 notifications_to_users = relationship('UserNotification', lazy='joined',
3585 3585 cascade="all, delete, delete-orphan")
3586 3586
3587 3587 @property
3588 3588 def recipients(self):
3589 3589 return [x.user for x in UserNotification.query()\
3590 3590 .filter(UserNotification.notification == self)\
3591 3591 .order_by(UserNotification.user_id.asc()).all()]
3592 3592
3593 3593 @classmethod
3594 3594 def create(cls, created_by, subject, body, recipients, type_=None):
3595 3595 if type_ is None:
3596 3596 type_ = Notification.TYPE_MESSAGE
3597 3597
3598 3598 notification = cls()
3599 3599 notification.created_by_user = created_by
3600 3600 notification.subject = subject
3601 3601 notification.body = body
3602 3602 notification.type_ = type_
3603 3603 notification.created_on = datetime.datetime.now()
3604 3604
3605 3605 for u in recipients:
3606 3606 assoc = UserNotification()
3607 3607 assoc.notification = notification
3608 3608
3609 3609 # if created_by is inside recipients mark his notification
3610 3610 # as read
3611 3611 if u.user_id == created_by.user_id:
3612 3612 assoc.read = True
3613 3613
3614 3614 u.notifications.append(assoc)
3615 3615 Session().add(notification)
3616 3616
3617 3617 return notification
3618 3618
3619 3619 @property
3620 3620 def description(self):
3621 3621 from rhodecode.model.notification import NotificationModel
3622 3622 return NotificationModel().make_description(self)
3623 3623
3624 3624
3625 3625 class UserNotification(Base, BaseModel):
3626 3626 __tablename__ = 'user_to_notification'
3627 3627 __table_args__ = (
3628 3628 UniqueConstraint('user_id', 'notification_id'),
3629 3629 {'extend_existing': True, 'mysql_engine': 'InnoDB',
3630 3630 'mysql_charset': 'utf8', 'sqlite_autoincrement': True}
3631 3631 )
3632 3632 user_id = Column('user_id', Integer(), ForeignKey('users.user_id'), primary_key=True)
3633 3633 notification_id = Column("notification_id", Integer(), ForeignKey('notifications.notification_id'), primary_key=True)
3634 3634 read = Column('read', Boolean, default=False)
3635 3635 sent_on = Column('sent_on', DateTime(timezone=False), nullable=True, unique=None)
3636 3636
3637 3637 user = relationship('User', lazy="joined")
3638 3638 notification = relationship('Notification', lazy="joined",
3639 3639 order_by=lambda: Notification.created_on.desc(),)
3640 3640
3641 3641 def mark_as_read(self):
3642 3642 self.read = True
3643 3643 Session().add(self)
3644 3644
3645 3645
3646 3646 class Gist(Base, BaseModel):
3647 3647 __tablename__ = 'gists'
3648 3648 __table_args__ = (
3649 3649 Index('g_gist_access_id_idx', 'gist_access_id'),
3650 3650 Index('g_created_on_idx', 'created_on'),
3651 3651 {'extend_existing': True, 'mysql_engine': 'InnoDB',
3652 3652 'mysql_charset': 'utf8', 'sqlite_autoincrement': True}
3653 3653 )
3654 3654 GIST_PUBLIC = u'public'
3655 3655 GIST_PRIVATE = u'private'
3656 3656 DEFAULT_FILENAME = u'gistfile1.txt'
3657 3657
3658 3658 ACL_LEVEL_PUBLIC = u'acl_public'
3659 3659 ACL_LEVEL_PRIVATE = u'acl_private'
3660 3660
3661 3661 gist_id = Column('gist_id', Integer(), primary_key=True)
3662 3662 gist_access_id = Column('gist_access_id', Unicode(250))
3663 3663 gist_description = Column('gist_description', UnicodeText().with_variant(UnicodeText(1024), 'mysql'))
3664 3664 gist_owner = Column('user_id', Integer(), ForeignKey('users.user_id'), nullable=True)
3665 3665 gist_expires = Column('gist_expires', Float(53), nullable=False)
3666 3666 gist_type = Column('gist_type', Unicode(128), nullable=False)
3667 3667 created_on = Column('created_on', DateTime(timezone=False), nullable=False, default=datetime.datetime.now)
3668 3668 modified_at = Column('modified_at', DateTime(timezone=False), nullable=False, default=datetime.datetime.now)
3669 3669 acl_level = Column('acl_level', Unicode(128), nullable=True)
3670 3670
3671 3671 owner = relationship('User')
3672 3672
3673 3673 def __repr__(self):
3674 3674 return '<Gist:[%s]%s>' % (self.gist_type, self.gist_access_id)
3675 3675
3676 3676 @classmethod
3677 3677 def get_or_404(cls, id_, pyramid_exc=False):
3678 3678
3679 3679 if pyramid_exc:
3680 3680 from pyramid.httpexceptions import HTTPNotFound
3681 3681 else:
3682 3682 from webob.exc import HTTPNotFound
3683 3683
3684 3684 res = cls.query().filter(cls.gist_access_id == id_).scalar()
3685 3685 if not res:
3686 3686 raise HTTPNotFound
3687 3687 return res
3688 3688
3689 3689 @classmethod
3690 3690 def get_by_access_id(cls, gist_access_id):
3691 3691 return cls.query().filter(cls.gist_access_id == gist_access_id).scalar()
3692 3692
3693 3693 def gist_url(self):
3694 3694 import rhodecode
3695 3695 from pylons import url
3696 3696
3697 3697 alias_url = rhodecode.CONFIG.get('gist_alias_url')
3698 3698 if alias_url:
3699 3699 return alias_url.replace('{gistid}', self.gist_access_id)
3700 3700
3701 3701 return url('gist', gist_id=self.gist_access_id, qualified=True)
3702 3702
3703 3703 @classmethod
3704 3704 def base_path(cls):
3705 3705 """
3706 3706 Returns base path when all gists are stored
3707 3707
3708 3708 :param cls:
3709 3709 """
3710 3710 from rhodecode.model.gist import GIST_STORE_LOC
3711 3711 q = Session().query(RhodeCodeUi)\
3712 3712 .filter(RhodeCodeUi.ui_key == URL_SEP)
3713 3713 q = q.options(FromCache("sql_cache_short", "repository_repo_path"))
3714 3714 return os.path.join(q.one().ui_value, GIST_STORE_LOC)
3715 3715
3716 3716 def get_api_data(self):
3717 3717 """
3718 3718 Common function for generating gist related data for API
3719 3719 """
3720 3720 gist = self
3721 3721 data = {
3722 3722 'gist_id': gist.gist_id,
3723 3723 'type': gist.gist_type,
3724 3724 'access_id': gist.gist_access_id,
3725 3725 'description': gist.gist_description,
3726 3726 'url': gist.gist_url(),
3727 3727 'expires': gist.gist_expires,
3728 3728 'created_on': gist.created_on,
3729 3729 'modified_at': gist.modified_at,
3730 3730 'content': None,
3731 3731 'acl_level': gist.acl_level,
3732 3732 }
3733 3733 return data
3734 3734
3735 3735 def __json__(self):
3736 3736 data = dict(
3737 3737 )
3738 3738 data.update(self.get_api_data())
3739 3739 return data
3740 3740 # SCM functions
3741 3741
3742 3742 def scm_instance(self, **kwargs):
3743 3743 full_repo_path = os.path.join(self.base_path(), self.gist_access_id)
3744 3744 return get_vcs_instance(
3745 3745 repo_path=safe_str(full_repo_path), create=False)
3746 3746
3747 3747
3748 3748 class ExternalIdentity(Base, BaseModel):
3749 3749 __tablename__ = 'external_identities'
3750 3750 __table_args__ = (
3751 3751 Index('local_user_id_idx', 'local_user_id'),
3752 3752 Index('external_id_idx', 'external_id'),
3753 3753 {'extend_existing': True, 'mysql_engine': 'InnoDB',
3754 3754 'mysql_charset': 'utf8'})
3755 3755
3756 3756 external_id = Column('external_id', Unicode(255), default=u'',
3757 3757 primary_key=True)
3758 3758 external_username = Column('external_username', Unicode(1024), default=u'')
3759 3759 local_user_id = Column('local_user_id', Integer(),
3760 3760 ForeignKey('users.user_id'), primary_key=True)
3761 3761 provider_name = Column('provider_name', Unicode(255), default=u'',
3762 3762 primary_key=True)
3763 3763 access_token = Column('access_token', String(1024), default=u'')
3764 3764 alt_token = Column('alt_token', String(1024), default=u'')
3765 3765 token_secret = Column('token_secret', String(1024), default=u'')
3766 3766
3767 3767 @classmethod
3768 3768 def by_external_id_and_provider(cls, external_id, provider_name,
3769 3769 local_user_id=None):
3770 3770 """
3771 3771 Returns ExternalIdentity instance based on search params
3772 3772
3773 3773 :param external_id:
3774 3774 :param provider_name:
3775 3775 :return: ExternalIdentity
3776 3776 """
3777 3777 query = cls.query()
3778 3778 query = query.filter(cls.external_id == external_id)
3779 3779 query = query.filter(cls.provider_name == provider_name)
3780 3780 if local_user_id:
3781 3781 query = query.filter(cls.local_user_id == local_user_id)
3782 3782 return query.first()
3783 3783
3784 3784 @classmethod
3785 3785 def user_by_external_id_and_provider(cls, external_id, provider_name):
3786 3786 """
3787 3787 Returns User instance based on search params
3788 3788
3789 3789 :param external_id:
3790 3790 :param provider_name:
3791 3791 :return: User
3792 3792 """
3793 3793 query = User.query()
3794 3794 query = query.filter(cls.external_id == external_id)
3795 3795 query = query.filter(cls.provider_name == provider_name)
3796 3796 query = query.filter(User.user_id == cls.local_user_id)
3797 3797 return query.first()
3798 3798
3799 3799 @classmethod
3800 3800 def by_local_user_id(cls, local_user_id):
3801 3801 """
3802 3802 Returns all tokens for user
3803 3803
3804 3804 :param local_user_id:
3805 3805 :return: ExternalIdentity
3806 3806 """
3807 3807 query = cls.query()
3808 3808 query = query.filter(cls.local_user_id == local_user_id)
3809 3809 return query
3810 3810
3811 3811
3812 3812 class Integration(Base, BaseModel):
3813 3813 __tablename__ = 'integrations'
3814 3814 __table_args__ = (
3815 3815 {'extend_existing': True, 'mysql_engine': 'InnoDB',
3816 3816 'mysql_charset': 'utf8', 'sqlite_autoincrement': True}
3817 3817 )
3818 3818
3819 3819 integration_id = Column('integration_id', Integer(), primary_key=True)
3820 3820 integration_type = Column('integration_type', String(255))
3821 3821 enabled = Column('enabled', Boolean(), nullable=False)
3822 3822 name = Column('name', String(255), nullable=False)
3823 3823 child_repos_only = Column('child_repos_only', Boolean(), nullable=False,
3824 3824 default=False)
3825 3825
3826 3826 settings = Column(
3827 3827 'settings_json', MutationObj.as_mutable(
3828 3828 JsonType(dialect_map=dict(mysql=UnicodeText(16384)))))
3829 3829 repo_id = Column(
3830 3830 'repo_id', Integer(), ForeignKey('repositories.repo_id'),
3831 3831 nullable=True, unique=None, default=None)
3832 3832 repo = relationship('Repository', lazy='joined')
3833 3833
3834 3834 repo_group_id = Column(
3835 3835 'repo_group_id', Integer(), ForeignKey('groups.group_id'),
3836 3836 nullable=True, unique=None, default=None)
3837 3837 repo_group = relationship('RepoGroup', lazy='joined')
3838 3838
3839 3839 @property
3840 3840 def scope(self):
3841 3841 if self.repo:
3842 3842 return repr(self.repo)
3843 3843 if self.repo_group:
3844 3844 if self.child_repos_only:
3845 3845 return repr(self.repo_group) + ' (child repos only)'
3846 3846 else:
3847 3847 return repr(self.repo_group) + ' (recursive)'
3848 3848 if self.child_repos_only:
3849 3849 return 'root_repos'
3850 3850 return 'global'
3851 3851
3852 3852 def __repr__(self):
3853 3853 return '<Integration(%r, %r)>' % (self.integration_type, self.scope)
3854 3854
3855 3855
3856 3856 class RepoReviewRuleUser(Base, BaseModel):
3857 3857 __tablename__ = 'repo_review_rules_users'
3858 3858 __table_args__ = (
3859 3859 {'extend_existing': True, 'mysql_engine': 'InnoDB',
3860 3860 'mysql_charset': 'utf8', 'sqlite_autoincrement': True,}
3861 3861 )
3862 3862 repo_review_rule_user_id = Column('repo_review_rule_user_id', Integer(), primary_key=True)
3863 3863 repo_review_rule_id = Column("repo_review_rule_id", Integer(), ForeignKey('repo_review_rules.repo_review_rule_id'))
3864 3864 user_id = Column("user_id", Integer(), ForeignKey('users.user_id'), nullable=False)
3865 3865 mandatory = Column("mandatory", Boolean(), nullable=False, default=False)
3866 3866 user = relationship('User')
3867 3867
3868 3868 def rule_data(self):
3869 3869 return {
3870 3870 'mandatory': self.mandatory
3871 3871 }
3872 3872
3873 3873
3874 3874 class RepoReviewRuleUserGroup(Base, BaseModel):
3875 3875 __tablename__ = 'repo_review_rules_users_groups'
3876 3876 __table_args__ = (
3877 3877 {'extend_existing': True, 'mysql_engine': 'InnoDB',
3878 3878 'mysql_charset': 'utf8', 'sqlite_autoincrement': True,}
3879 3879 )
3880 3880 repo_review_rule_users_group_id = Column('repo_review_rule_users_group_id', Integer(), primary_key=True)
3881 3881 repo_review_rule_id = Column("repo_review_rule_id", Integer(), ForeignKey('repo_review_rules.repo_review_rule_id'))
3882 3882 users_group_id = Column("users_group_id", Integer(),ForeignKey('users_groups.users_group_id'), nullable=False)
3883 3883 mandatory = Column("mandatory", Boolean(), nullable=False, default=False)
3884 3884 users_group = relationship('UserGroup')
3885 3885
3886 3886 def rule_data(self):
3887 3887 return {
3888 3888 'mandatory': self.mandatory
3889 3889 }
3890 3890
3891 3891
3892 3892 class RepoReviewRule(Base, BaseModel):
3893 3893 __tablename__ = 'repo_review_rules'
3894 3894 __table_args__ = (
3895 3895 {'extend_existing': True, 'mysql_engine': 'InnoDB',
3896 3896 'mysql_charset': 'utf8', 'sqlite_autoincrement': True,}
3897 3897 )
3898 3898
3899 3899 repo_review_rule_id = Column(
3900 3900 'repo_review_rule_id', Integer(), primary_key=True)
3901 3901 repo_id = Column(
3902 3902 "repo_id", Integer(), ForeignKey('repositories.repo_id'))
3903 3903 repo = relationship('Repository', backref='review_rules')
3904 3904
3905 3905 _branch_pattern = Column("branch_pattern", UnicodeText().with_variant(UnicodeText(255), 'mysql'), default=u'*') # glob
3906 3906 _file_pattern = Column("file_pattern", UnicodeText().with_variant(UnicodeText(255), 'mysql'), default=u'*') # glob
3907 3907
3908 3908 use_authors_for_review = Column("use_authors_for_review", Boolean(), nullable=False, default=False)
3909 3909 forbid_author_to_review = Column("forbid_author_to_review", Boolean(), nullable=False, default=False)
3910 forbid_commit_author_to_review = Column("forbid_commit_author_to_review", Boolean(), nullable=False, default=False)
3910 3911 forbid_adding_reviewers = Column("forbid_adding_reviewers", Boolean(), nullable=False, default=False)
3911 3912
3912 3913 rule_users = relationship('RepoReviewRuleUser')
3913 3914 rule_user_groups = relationship('RepoReviewRuleUserGroup')
3914 3915
3915 3916 @hybrid_property
3916 3917 def branch_pattern(self):
3917 3918 return self._branch_pattern or '*'
3918 3919
3919 3920 def _validate_glob(self, value):
3920 3921 re.compile('^' + glob2re(value) + '$')
3921 3922
3922 3923 @branch_pattern.setter
3923 3924 def branch_pattern(self, value):
3924 3925 self._validate_glob(value)
3925 3926 self._branch_pattern = value or '*'
3926 3927
3927 3928 @hybrid_property
3928 3929 def file_pattern(self):
3929 3930 return self._file_pattern or '*'
3930 3931
3931 3932 @file_pattern.setter
3932 3933 def file_pattern(self, value):
3933 3934 self._validate_glob(value)
3934 3935 self._file_pattern = value or '*'
3935 3936
3936 3937 def matches(self, branch, files_changed):
3937 3938 """
3938 3939 Check if this review rule matches a branch/files in a pull request
3939 3940
3940 3941 :param branch: branch name for the commit
3941 3942 :param files_changed: list of file paths changed in the pull request
3942 3943 """
3943 3944
3944 3945 branch = branch or ''
3945 3946 files_changed = files_changed or []
3946 3947
3947 3948 branch_matches = True
3948 3949 if branch:
3949 3950 branch_regex = re.compile('^' + glob2re(self.branch_pattern) + '$')
3950 3951 branch_matches = bool(branch_regex.search(branch))
3951 3952
3952 3953 files_matches = True
3953 3954 if self.file_pattern != '*':
3954 3955 files_matches = False
3955 3956 file_regex = re.compile(glob2re(self.file_pattern))
3956 3957 for filename in files_changed:
3957 3958 if file_regex.search(filename):
3958 3959 files_matches = True
3959 3960 break
3960 3961
3961 3962 return branch_matches and files_matches
3962 3963
3963 3964 @property
3964 3965 def review_users(self):
3965 3966 """ Returns the users which this rule applies to """
3966 3967
3967 3968 users = collections.OrderedDict()
3968 3969
3969 3970 for rule_user in self.rule_users:
3970 3971 if rule_user.user.active:
3971 3972 if rule_user.user not in users:
3972 3973 users[rule_user.user.username] = {
3973 3974 'user': rule_user.user,
3974 3975 'source': 'user',
3975 3976 'source_data': {},
3976 3977 'data': rule_user.rule_data()
3977 3978 }
3978 3979
3979 3980 for rule_user_group in self.rule_user_groups:
3980 3981 source_data = {
3981 3982 'name': rule_user_group.users_group.users_group_name,
3982 3983 'members': len(rule_user_group.users_group.members)
3983 3984 }
3984 3985 for member in rule_user_group.users_group.members:
3985 3986 if member.user.active:
3986 3987 users[member.user.username] = {
3987 3988 'user': member.user,
3988 3989 'source': 'user_group',
3989 3990 'source_data': source_data,
3990 3991 'data': rule_user_group.rule_data()
3991 3992 }
3992 3993
3993 3994 return users
3994 3995
3995 3996 def __repr__(self):
3996 3997 return '<RepoReviewerRule(id=%r, repo=%r)>' % (
3997 3998 self.repo_review_rule_id, self.repo)
3998 3999
3999 4000
4000 4001 class DbMigrateVersion(Base, BaseModel):
4001 4002 __tablename__ = 'db_migrate_version'
4002 4003 __table_args__ = (
4003 4004 {'extend_existing': True, 'mysql_engine': 'InnoDB',
4004 4005 'mysql_charset': 'utf8', 'sqlite_autoincrement': True},
4005 4006 )
4006 4007 repository_id = Column('repository_id', String(250), primary_key=True)
4007 4008 repository_path = Column('repository_path', Text)
4008 4009 version = Column('version', Integer)
4009 4010
4010 4011
4011 4012 class DbSession(Base, BaseModel):
4012 4013 __tablename__ = 'db_session'
4013 4014 __table_args__ = (
4014 4015 {'extend_existing': True, 'mysql_engine': 'InnoDB',
4015 4016 'mysql_charset': 'utf8', 'sqlite_autoincrement': True},
4016 4017 )
4017 4018
4018 4019 def __repr__(self):
4019 4020 return '<DB:DbSession({})>'.format(self.id)
4020 4021
4021 4022 id = Column('id', Integer())
4022 4023 namespace = Column('namespace', String(255), primary_key=True)
4023 4024 accessed = Column('accessed', DateTime, nullable=False)
4024 4025 created = Column('created', DateTime, nullable=False)
4025 4026 data = Column('data', PickleType, nullable=False)
@@ -1,600 +1,615 b''
1 1 // # Copyright (C) 2010-2017 RhodeCode GmbH
2 2 // #
3 3 // # This program is free software: you can redistribute it and/or modify
4 4 // # it under the terms of the GNU Affero General Public License, version 3
5 5 // # (only), as published by the Free Software Foundation.
6 6 // #
7 7 // # This program is distributed in the hope that it will be useful,
8 8 // # but WITHOUT ANY WARRANTY; without even the implied warranty of
9 9 // # MERCHANTABILITY or FITNESS FOR A PARTICULAR PURPOSE. See the
10 10 // # GNU General Public License for more details.
11 11 // #
12 12 // # You should have received a copy of the GNU Affero General Public License
13 13 // # along with this program. If not, see <http://www.gnu.org/licenses/>.
14 14 // #
15 15 // # This program is dual-licensed. If you wish to learn more about the
16 16 // # RhodeCode Enterprise Edition, including its added features, Support services,
17 17 // # and proprietary license terms, please see https://rhodecode.com/licenses/
18 18
19 19
20 20 var prButtonLockChecks = {
21 21 'compare': false,
22 22 'reviewers': false
23 23 };
24 24
25 25 /**
26 26 * lock button until all checks and loads are made. E.g reviewer calculation
27 27 * should prevent from submitting a PR
28 28 * @param lockEnabled
29 29 * @param msg
30 30 * @param scope
31 31 */
32 32 var prButtonLock = function(lockEnabled, msg, scope) {
33 33 scope = scope || 'all';
34 34 if (scope == 'all'){
35 35 prButtonLockChecks['compare'] = !lockEnabled;
36 36 prButtonLockChecks['reviewers'] = !lockEnabled;
37 37 } else if (scope == 'compare') {
38 38 prButtonLockChecks['compare'] = !lockEnabled;
39 39 } else if (scope == 'reviewers'){
40 40 prButtonLockChecks['reviewers'] = !lockEnabled;
41 41 }
42 42 var checksMeet = prButtonLockChecks.compare && prButtonLockChecks.reviewers;
43 43 if (lockEnabled) {
44 44 $('#save').attr('disabled', 'disabled');
45 45 }
46 46 else if (checksMeet) {
47 47 $('#save').removeAttr('disabled');
48 48 }
49 49
50 50 if (msg) {
51 51 $('#pr_open_message').html(msg);
52 52 }
53 53 };
54 54
55 55
56 56 /**
57 57 Generate Title and Description for a PullRequest.
58 58 In case of 1 commits, the title and description is that one commit
59 59 in case of multiple commits, we iterate on them with max N number of commits,
60 60 and build description in a form
61 61 - commitN
62 62 - commitN+1
63 63 ...
64 64
65 65 Title is then constructed from branch names, or other references,
66 66 replacing '-' and '_' into spaces
67 67
68 68 * @param sourceRef
69 69 * @param elements
70 70 * @param limit
71 71 * @returns {*[]}
72 72 */
73 73 var getTitleAndDescription = function(sourceRef, elements, limit) {
74 74 var title = '';
75 75 var desc = '';
76 76
77 77 $.each($(elements).get().reverse().slice(0, limit), function(idx, value) {
78 78 var rawMessage = $(value).find('td.td-description .message').data('messageRaw');
79 79 desc += '- ' + rawMessage.split('\n')[0].replace(/\n+$/, "") + '\n';
80 80 });
81 81 // only 1 commit, use commit message as title
82 82 if (elements.length === 1) {
83 83 title = $(elements[0]).find('td.td-description .message').data('messageRaw').split('\n')[0];
84 84 }
85 85 else {
86 86 // use reference name
87 87 title = sourceRef.replace(/-/g, ' ').replace(/_/g, ' ').capitalizeFirstLetter();
88 88 }
89 89
90 90 return [title, desc]
91 91 };
92 92
93 93
94 94
95 95 ReviewersController = function () {
96 96 var self = this;
97 97 this.$reviewRulesContainer = $('#review_rules');
98 98 this.$rulesList = this.$reviewRulesContainer.find('.pr-reviewer-rules');
99 99 this.forbidReviewUsers = undefined;
100 100 this.$reviewMembers = $('#review_members');
101 101 this.currentRequest = null;
102 102
103 103 this.defaultForbidReviewUsers = function() {
104 104 return [
105 105 {'username': 'default',
106 106 'user_id': templateContext.default_user.user_id}
107 107 ];
108 108 };
109 109
110 110 this.hideReviewRules = function() {
111 111 self.$reviewRulesContainer.hide();
112 112 };
113 113
114 114 this.showReviewRules = function() {
115 115 self.$reviewRulesContainer.show();
116 116 };
117 117
118 118 this.addRule = function(ruleText) {
119 119 self.showReviewRules();
120 120 return '<div>- {0}</div>'.format(ruleText)
121 121 };
122 122
123 123 this.loadReviewRules = function(data) {
124 124 // reset forbidden Users
125 125 this.forbidReviewUsers = self.defaultForbidReviewUsers();
126 126
127 127 // reset state of review rules
128 128 self.$rulesList.html('');
129 129
130 130 if (!data || data.rules === undefined || $.isEmptyObject(data.rules)) {
131 131 // default rule, case for older repo that don't have any rules stored
132 132 self.$rulesList.append(
133 133 self.addRule(
134 134 _gettext('All reviewers must vote.'))
135 135 );
136 136 return self.forbidReviewUsers
137 137 }
138 138
139 139 if (data.rules.voting !== undefined) {
140 140 if (data.rules.voting < 0){
141 141 self.$rulesList.append(
142 142 self.addRule(
143 143 _gettext('All reviewers must vote.'))
144 144 )
145 145 } else if (data.rules.voting === 1) {
146 146 self.$rulesList.append(
147 147 self.addRule(
148 148 _gettext('At least {0} reviewer must vote.').format(data.rules.voting))
149 149 )
150 150
151 151 } else {
152 152 self.$rulesList.append(
153 153 self.addRule(
154 154 _gettext('At least {0} reviewers must vote.').format(data.rules.voting))
155 155 )
156 156 }
157 157 }
158 158 if (data.rules.use_code_authors_for_review) {
159 159 self.$rulesList.append(
160 160 self.addRule(
161 161 _gettext('Reviewers picked from source code changes.'))
162 162 )
163 163 }
164 164 if (data.rules.forbid_adding_reviewers) {
165 165 $('#add_reviewer_input').remove();
166 166 self.$rulesList.append(
167 167 self.addRule(
168 168 _gettext('Adding new reviewers is forbidden.'))
169 169 )
170 170 }
171 171 if (data.rules.forbid_author_to_review) {
172 172 self.forbidReviewUsers.push(data.rules_data.pr_author);
173 173 self.$rulesList.append(
174 174 self.addRule(
175 175 _gettext('Author is not allowed to be a reviewer.'))
176 176 )
177 177 }
178 if (data.rules.forbid_commit_author_to_review) {
179
180 if (data.rules_data.forbidden_users) {
181 $.each(data.rules_data.forbidden_users, function(index, member_data) {
182 self.forbidReviewUsers.push(member_data)
183 });
184
185 }
186
187 self.$rulesList.append(
188 self.addRule(
189 _gettext('Commit Authors are not allowed to be a reviewer.'))
190 )
191 }
192
178 193 return self.forbidReviewUsers
179 194 };
180 195
181 196 this.loadDefaultReviewers = function(sourceRepo, sourceRef, targetRepo, targetRef) {
182 197
183 198 if (self.currentRequest) {
184 199 // make sure we cleanup old running requests before triggering this
185 200 // again
186 201 self.currentRequest.abort();
187 202 }
188 203
189 204 $('.calculate-reviewers').show();
190 205 // reset reviewer members
191 206 self.$reviewMembers.empty();
192 207
193 208 prButtonLock(true, null, 'reviewers');
194 209 $('#user').hide(); // hide user autocomplete before load
195 210
196 211 var url = pyroutes.url('repo_default_reviewers_data',
197 212 {
198 213 'repo_name': templateContext.repo_name,
199 214 'source_repo': sourceRepo,
200 215 'source_ref': sourceRef[2],
201 216 'target_repo': targetRepo,
202 217 'target_ref': targetRef[2]
203 218 });
204 219
205 220 self.currentRequest = $.get(url)
206 221 .done(function(data) {
207 222 self.currentRequest = null;
208 223
209 224 // review rules
210 225 self.loadReviewRules(data);
211 226
212 227 for (var i = 0; i < data.reviewers.length; i++) {
213 228 var reviewer = data.reviewers[i];
214 229 self.addReviewMember(
215 230 reviewer.user_id, reviewer.firstname,
216 231 reviewer.lastname, reviewer.username,
217 232 reviewer.gravatar_link, reviewer.reasons,
218 233 reviewer.mandatory);
219 234 }
220 235 $('.calculate-reviewers').hide();
221 236 prButtonLock(false, null, 'reviewers');
222 237 $('#user').show(); // show user autocomplete after load
223 238 });
224 239 };
225 240
226 241 // check those, refactor
227 242 this.removeReviewMember = function(reviewer_id, mark_delete) {
228 243 var reviewer = $('#reviewer_{0}'.format(reviewer_id));
229 244
230 245 if(typeof(mark_delete) === undefined){
231 246 mark_delete = false;
232 247 }
233 248
234 249 if(mark_delete === true){
235 250 if (reviewer){
236 251 // now delete the input
237 252 $('#reviewer_{0} input'.format(reviewer_id)).remove();
238 253 // mark as to-delete
239 254 var obj = $('#reviewer_{0}_name'.format(reviewer_id));
240 255 obj.addClass('to-delete');
241 256 obj.css({"text-decoration":"line-through", "opacity": 0.5});
242 257 }
243 258 }
244 259 else{
245 260 $('#reviewer_{0}'.format(reviewer_id)).remove();
246 261 }
247 262 };
248 263
249 264 this.addReviewMember = function(id, fname, lname, nname, gravatar_link, reasons, mandatory) {
250 265 var members = self.$reviewMembers.get(0);
251 266 var reasons_html = '';
252 267 var reasons_inputs = '';
253 268 var reasons = reasons || [];
254 269 var mandatory = mandatory || false;
255 270
256 271 if (reasons) {
257 272 for (var i = 0; i < reasons.length; i++) {
258 273 reasons_html += '<div class="reviewer_reason">- {0}</div>'.format(reasons[i]);
259 274 reasons_inputs += '<input type="hidden" name="reason" value="' + escapeHtml(reasons[i]) + '">';
260 275 }
261 276 }
262 277 var tmpl = '' +
263 278 '<li id="reviewer_{2}" class="reviewer_entry">'+
264 279 '<input type="hidden" name="__start__" value="reviewer:mapping">'+
265 280 '<div class="reviewer_status">'+
266 281 '<div class="flag_status not_reviewed pull-left reviewer_member_status"></div>'+
267 282 '</div>'+
268 283 '<img alt="gravatar" class="gravatar" src="{0}"/>'+
269 284 '<span class="reviewer_name user">{1}</span>'+
270 285 reasons_html +
271 286 '<input type="hidden" name="user_id" value="{2}">'+
272 287 '<input type="hidden" name="__start__" value="reasons:sequence">'+
273 288 '{3}'+
274 289 '<input type="hidden" name="__end__" value="reasons:sequence">';
275 290
276 291 if (mandatory) {
277 292 tmpl += ''+
278 293 '<div class="reviewer_member_mandatory_remove">' +
279 294 '<i class="icon-remove-sign"></i>'+
280 295 '</div>' +
281 296 '<input type="hidden" name="mandatory" value="true">'+
282 297 '<div class="reviewer_member_mandatory">' +
283 298 '<i class="icon-lock" title="Mandatory reviewer"></i>'+
284 299 '</div>';
285 300
286 301 } else {
287 302 tmpl += ''+
288 303 '<input type="hidden" name="mandatory" value="false">'+
289 304 '<div class="reviewer_member_remove action_button" onclick="reviewersController.removeReviewMember({2})">' +
290 305 '<i class="icon-remove-sign"></i>'+
291 306 '</div>';
292 307 }
293 308 // continue template
294 309 tmpl += ''+
295 310 '<input type="hidden" name="__end__" value="reviewer:mapping">'+
296 311 '</li>' ;
297 312
298 313 var displayname = "{0} ({1} {2})".format(
299 314 nname, escapeHtml(fname), escapeHtml(lname));
300 315 var element = tmpl.format(gravatar_link,displayname,id,reasons_inputs);
301 316 // check if we don't have this ID already in
302 317 var ids = [];
303 318 var _els = self.$reviewMembers.find('li').toArray();
304 319 for (el in _els){
305 320 ids.push(_els[el].id)
306 321 }
307 322
308 323 var userAllowedReview = function(userId) {
309 324 var allowed = true;
310 325 $.each(self.forbidReviewUsers, function(index, member_data) {
311 326 if (parseInt(userId) === member_data['user_id']) {
312 327 allowed = false;
313 328 return false // breaks the loop
314 329 }
315 330 });
316 331 return allowed
317 332 };
318 333
319 334 var userAllowed = userAllowedReview(id);
320 335 if (!userAllowed){
321 336 alert(_gettext('User `{0}` not allowed to be a reviewer').format(nname));
322 337 }
323 338 var shouldAdd = userAllowed && ids.indexOf('reviewer_'+id) == -1;
324 339
325 340 if(shouldAdd) {
326 341 // only add if it's not there
327 342 members.innerHTML += element;
328 343 }
329 344
330 345 };
331 346
332 347 this.updateReviewers = function(repo_name, pull_request_id){
333 348 var postData = '_method=put&' + $('#reviewers input').serialize();
334 349 _updatePullRequest(repo_name, pull_request_id, postData);
335 350 };
336 351
337 352 };
338 353
339 354
340 355 var _updatePullRequest = function(repo_name, pull_request_id, postData) {
341 356 var url = pyroutes.url(
342 357 'pullrequest_update',
343 358 {"repo_name": repo_name, "pull_request_id": pull_request_id});
344 359 if (typeof postData === 'string' ) {
345 360 postData += '&csrf_token=' + CSRF_TOKEN;
346 361 } else {
347 362 postData.csrf_token = CSRF_TOKEN;
348 363 }
349 364 var success = function(o) {
350 365 window.location.reload();
351 366 };
352 367 ajaxPOST(url, postData, success);
353 368 };
354 369
355 370 /**
356 371 * PULL REQUEST reject & close
357 372 */
358 373 var closePullRequest = function(repo_name, pull_request_id) {
359 374 var postData = {
360 375 '_method': 'put',
361 376 'close_pull_request': true};
362 377 _updatePullRequest(repo_name, pull_request_id, postData);
363 378 };
364 379
365 380 /**
366 381 * PULL REQUEST update commits
367 382 */
368 383 var updateCommits = function(repo_name, pull_request_id) {
369 384 var postData = {
370 385 '_method': 'put',
371 386 'update_commits': true};
372 387 _updatePullRequest(repo_name, pull_request_id, postData);
373 388 };
374 389
375 390
376 391 /**
377 392 * PULL REQUEST edit info
378 393 */
379 394 var editPullRequest = function(repo_name, pull_request_id, title, description) {
380 395 var url = pyroutes.url(
381 396 'pullrequest_update',
382 397 {"repo_name": repo_name, "pull_request_id": pull_request_id});
383 398
384 399 var postData = {
385 400 '_method': 'put',
386 401 'title': title,
387 402 'description': description,
388 403 'edit_pull_request': true,
389 404 'csrf_token': CSRF_TOKEN
390 405 };
391 406 var success = function(o) {
392 407 window.location.reload();
393 408 };
394 409 ajaxPOST(url, postData, success);
395 410 };
396 411
397 412 var initPullRequestsCodeMirror = function (textAreaId) {
398 413 var ta = $(textAreaId).get(0);
399 414 var initialHeight = '100px';
400 415
401 416 // default options
402 417 var codeMirrorOptions = {
403 418 mode: "text",
404 419 lineNumbers: false,
405 420 indentUnit: 4,
406 421 theme: 'rc-input'
407 422 };
408 423
409 424 var codeMirrorInstance = CodeMirror.fromTextArea(ta, codeMirrorOptions);
410 425 // marker for manually set description
411 426 codeMirrorInstance._userDefinedDesc = false;
412 427 codeMirrorInstance.setSize(null, initialHeight);
413 428 codeMirrorInstance.on("change", function(instance, changeObj) {
414 429 var height = initialHeight;
415 430 var lines = instance.lineCount();
416 431 if (lines > 6 && lines < 20) {
417 432 height = "auto"
418 433 }
419 434 else if (lines >= 20) {
420 435 height = 20 * 15;
421 436 }
422 437 instance.setSize(null, height);
423 438
424 439 // detect if the change was trigger by auto desc, or user input
425 440 changeOrigin = changeObj.origin;
426 441
427 442 if (changeOrigin === "setValue") {
428 443 cmLog.debug('Change triggered by setValue');
429 444 }
430 445 else {
431 446 cmLog.debug('user triggered change !');
432 447 // set special marker to indicate user has created an input.
433 448 instance._userDefinedDesc = true;
434 449 }
435 450
436 451 });
437 452
438 453 return codeMirrorInstance
439 454 };
440 455
441 456 /**
442 457 * Reviewer autocomplete
443 458 */
444 459 var ReviewerAutoComplete = function(inputId) {
445 460 $(inputId).autocomplete({
446 461 serviceUrl: pyroutes.url('user_autocomplete_data'),
447 462 minChars:2,
448 463 maxHeight:400,
449 464 deferRequestBy: 300, //miliseconds
450 465 showNoSuggestionNotice: true,
451 466 tabDisabled: true,
452 467 autoSelectFirst: true,
453 468 params: { user_id: templateContext.rhodecode_user.user_id, user_groups:true, user_groups_expand:true, skip_default_user:true },
454 469 formatResult: autocompleteFormatResult,
455 470 lookupFilter: autocompleteFilterResult,
456 471 onSelect: function(element, data) {
457 472
458 473 var reasons = [_gettext('added manually by "{0}"').format(templateContext.rhodecode_user.username)];
459 474 if (data.value_type == 'user_group') {
460 475 reasons.push(_gettext('member of "{0}"').format(data.value_display));
461 476
462 477 $.each(data.members, function(index, member_data) {
463 478 reviewersController.addReviewMember(
464 479 member_data.id, member_data.first_name, member_data.last_name,
465 480 member_data.username, member_data.icon_link, reasons);
466 481 })
467 482
468 483 } else {
469 484 reviewersController.addReviewMember(
470 485 data.id, data.first_name, data.last_name,
471 486 data.username, data.icon_link, reasons);
472 487 }
473 488
474 489 $(inputId).val('');
475 490 }
476 491 });
477 492 };
478 493
479 494
480 495 VersionController = function () {
481 496 var self = this;
482 497 this.$verSource = $('input[name=ver_source]');
483 498 this.$verTarget = $('input[name=ver_target]');
484 499 this.$showVersionDiff = $('#show-version-diff');
485 500
486 501 this.adjustRadioSelectors = function (curNode) {
487 502 var getVal = function (item) {
488 503 if (item == 'latest') {
489 504 return Number.MAX_SAFE_INTEGER
490 505 }
491 506 else {
492 507 return parseInt(item)
493 508 }
494 509 };
495 510
496 511 var curVal = getVal($(curNode).val());
497 512 var cleared = false;
498 513
499 514 $.each(self.$verSource, function (index, value) {
500 515 var elVal = getVal($(value).val());
501 516
502 517 if (elVal > curVal) {
503 518 if ($(value).is(':checked')) {
504 519 cleared = true;
505 520 }
506 521 $(value).attr('disabled', 'disabled');
507 522 $(value).removeAttr('checked');
508 523 $(value).css({'opacity': 0.1});
509 524 }
510 525 else {
511 526 $(value).css({'opacity': 1});
512 527 $(value).removeAttr('disabled');
513 528 }
514 529 });
515 530
516 531 if (cleared) {
517 532 // if we unchecked an active, set the next one to same loc.
518 533 $(this.$verSource).filter('[value={0}]'.format(
519 534 curVal)).attr('checked', 'checked');
520 535 }
521 536
522 537 self.setLockAction(false,
523 538 $(curNode).data('verPos'),
524 539 $(this.$verSource).filter(':checked').data('verPos')
525 540 );
526 541 };
527 542
528 543
529 544 this.attachVersionListener = function () {
530 545 self.$verTarget.change(function (e) {
531 546 self.adjustRadioSelectors(this)
532 547 });
533 548 self.$verSource.change(function (e) {
534 549 self.adjustRadioSelectors(self.$verTarget.filter(':checked'))
535 550 });
536 551 };
537 552
538 553 this.init = function () {
539 554
540 555 var curNode = self.$verTarget.filter(':checked');
541 556 self.adjustRadioSelectors(curNode);
542 557 self.setLockAction(true);
543 558 self.attachVersionListener();
544 559
545 560 };
546 561
547 562 this.setLockAction = function (state, selectedVersion, otherVersion) {
548 563 var $showVersionDiff = this.$showVersionDiff;
549 564
550 565 if (state) {
551 566 $showVersionDiff.attr('disabled', 'disabled');
552 567 $showVersionDiff.addClass('disabled');
553 568 $showVersionDiff.html($showVersionDiff.data('labelTextLocked'));
554 569 }
555 570 else {
556 571 $showVersionDiff.removeAttr('disabled');
557 572 $showVersionDiff.removeClass('disabled');
558 573
559 574 if (selectedVersion == otherVersion) {
560 575 $showVersionDiff.html($showVersionDiff.data('labelTextShow'));
561 576 } else {
562 577 $showVersionDiff.html($showVersionDiff.data('labelTextDiff'));
563 578 }
564 579 }
565 580
566 581 };
567 582
568 583 this.showVersionDiff = function () {
569 584 var target = self.$verTarget.filter(':checked');
570 585 var source = self.$verSource.filter(':checked');
571 586
572 587 if (target.val() && source.val()) {
573 588 var params = {
574 589 'pull_request_id': templateContext.pull_request_data.pull_request_id,
575 590 'repo_name': templateContext.repo_name,
576 591 'version': target.val(),
577 592 'from_version': source.val()
578 593 };
579 594 window.location = pyroutes.url('pullrequest_show', params)
580 595 }
581 596
582 597 return false;
583 598 };
584 599
585 600 this.toggleVersionView = function (elem) {
586 601
587 602 if (this.$showVersionDiff.is(':visible')) {
588 603 $('.version-pr').hide();
589 604 this.$showVersionDiff.hide();
590 605 $(elem).html($(elem).data('toggleOn'))
591 606 } else {
592 607 $('.version-pr').show();
593 608 this.$showVersionDiff.show();
594 609 $(elem).html($(elem).data('toggleOff'))
595 610 }
596 611
597 612 return false
598 613 }
599 614
600 615 }; No newline at end of file
General Comments 0
You need to be logged in to leave comments. Login now