##// END OF EJS Templates
audit-logs: allow showing individual entries for audit log.
marcink -
r2110:56ff7f71 default
parent child Browse files
Show More
@@ -0,0 +1,112 b''
1 ## -*- coding: utf-8 -*-
2 <%inherit file="/base/base.mako"/>
3 <%namespace name="base" file="/base/base.mako"/>
4
5 <%def name="title()">
6 ${_('Admin audit log entry')}
7 %if c.rhodecode_name:
8 &middot; ${h.branding(c.rhodecode_name)}
9 %endif
10 </%def>
11
12 <%def name="breadcrumbs_links()">
13 ${_('Audit long entry')} ${c.audit_log_entry.entry_id}
14 </%def>
15
16 <%def name="menu_bar_nav()">
17 ${self.menu_items(active='admin')}
18 </%def>
19 <%def name="main()">
20 <div class="box">
21 <!-- box / title -->
22 <div class="title">
23 ${self.breadcrumbs()}
24 </div>
25 <!-- end box / title -->
26 <div class="table">
27 <div id="user_log">
28 <table class="rctable audit-log">
29 <tr>
30 <td>
31 ${_('User')}:
32 </td>
33 <td>
34 %if c.audit_log_entry.user is not None:
35 ${base.gravatar_with_user(c.audit_log_entry.user.email)}
36 %else:
37 ${c.audit_log_entry.username}
38 %endif
39 </td>
40 </tr>
41 <tr>
42 <td>
43 ${_('Date')}:
44 </td>
45 <td>
46 ${h.format_date(c.audit_log_entry.action_date)}
47 </td>
48 </tr>
49 <tr>
50 <td>
51 ${_('IP')}:
52 </td>
53 <td>
54 ${c.audit_log_entry.user_ip}
55 </td>
56 </tr>
57
58 <tr>
59 <td>
60 ${_('Action')}:
61 </td>
62 <td>
63 % if c.audit_log_entry.version == c.audit_log_entry.VERSION_1:
64 ${h.action_parser(l)[0]()}
65 % else:
66 ${h.literal(c.audit_log_entry.action)}
67 % endif
68
69 <div class="journal_action_params">
70 % if c.audit_log_entry.version == c.audit_log_entry.VERSION_1:
71 ${h.literal(h.action_parser(l)[1]())}
72 % endif
73 </div>
74 </td>
75 </tr>
76 <tr>
77 <td>
78 ${_('Action Data')}:
79 </td>
80 <td class="td-journalaction">
81 % if c.audit_log_entry.version == c.audit_log_entry.VERSION_2:
82 <div>
83 <pre>${h.json.dumps(c.audit_log_entry.action_data, indent=4, sort_keys=True)}</pre>
84 </div>
85 % else:
86 <pre title="${_('data not available for v1 entries type')}">-</pre>
87 % endif
88 </td>
89 </tr>
90 <tr>
91 <td>
92 ${_('Repository')}:
93 </td>
94 <td class="td-journalaction">
95 %if c.audit_log_entry.repository is not None:
96 ${h.link_to(c.audit_log_entry.repository.repo_name, h.route_path('repo_summary',repo_name=c.audit_log_entry.repository.repo_name))}
97 %else:
98 ${c.audit_log_entry.repository_name or '-'}
99 %endif
100 </td>
101 </tr>
102
103 </table>
104
105 </div>
106 </div>
107 </div>
108
109 <script>
110 $('#j_filter').autoGrowInput();
111 </script>
112 </%def>
@@ -1,249 +1,253 b''
1 1 # -*- coding: utf-8 -*-
2 2
3 3 # Copyright (C) 2016-2017 RhodeCode GmbH
4 4 #
5 5 # This program is free software: you can redistribute it and/or modify
6 6 # it under the terms of the GNU Affero General Public License, version 3
7 7 # (only), as published by the Free Software Foundation.
8 8 #
9 9 # This program is distributed in the hope that it will be useful,
10 10 # but WITHOUT ANY WARRANTY; without even the implied warranty of
11 11 # MERCHANTABILITY or FITNESS FOR A PARTICULAR PURPOSE. See the
12 12 # GNU General Public License for more details.
13 13 #
14 14 # You should have received a copy of the GNU Affero General Public License
15 15 # along with this program. If not, see <http://www.gnu.org/licenses/>.
16 16 #
17 17 # This program is dual-licensed. If you wish to learn more about the
18 18 # RhodeCode Enterprise Edition, including its added features, Support services,
19 19 # and proprietary license terms, please see https://rhodecode.com/licenses/
20 20
21 21
22 22 from rhodecode.apps.admin.navigation import NavigationRegistry
23 23 from rhodecode.config.routing import ADMIN_PREFIX
24 24 from rhodecode.lib.utils2 import str2bool
25 25
26 26
27 27 def admin_routes(config):
28 28 """
29 29 Admin prefixed routes
30 30 """
31 31
32 32 config.add_route(
33 33 name='admin_audit_logs',
34 34 pattern='/audit_logs')
35 35
36 36 config.add_route(
37 name='admin_audit_log_entry',
38 pattern='/audit_logs/{audit_log_id}')
39
40 config.add_route(
37 41 name='pull_requests_global_0', # backward compat
38 42 pattern='/pull_requests/{pull_request_id:\d+}')
39 43 config.add_route(
40 44 name='pull_requests_global_1', # backward compat
41 45 pattern='/pull-requests/{pull_request_id:\d+}')
42 46 config.add_route(
43 47 name='pull_requests_global',
44 48 pattern='/pull-request/{pull_request_id:\d+}')
45 49
46 50 config.add_route(
47 51 name='admin_settings_open_source',
48 52 pattern='/settings/open_source')
49 53 config.add_route(
50 54 name='admin_settings_vcs_svn_generate_cfg',
51 55 pattern='/settings/vcs/svn_generate_cfg')
52 56
53 57 config.add_route(
54 58 name='admin_settings_system',
55 59 pattern='/settings/system')
56 60 config.add_route(
57 61 name='admin_settings_system_update',
58 62 pattern='/settings/system/updates')
59 63
60 64 config.add_route(
61 65 name='admin_settings_sessions',
62 66 pattern='/settings/sessions')
63 67 config.add_route(
64 68 name='admin_settings_sessions_cleanup',
65 69 pattern='/settings/sessions/cleanup')
66 70
67 71 config.add_route(
68 72 name='admin_settings_process_management',
69 73 pattern='/settings/process_management')
70 74 config.add_route(
71 75 name='admin_settings_process_management_signal',
72 76 pattern='/settings/process_management/signal')
73 77
74 78 # default settings
75 79 config.add_route(
76 80 name='admin_defaults_repositories',
77 81 pattern='/defaults/repositories')
78 82 config.add_route(
79 83 name='admin_defaults_repositories_update',
80 84 pattern='/defaults/repositories/update')
81 85
82 86 # global permissions
83 87
84 88 config.add_route(
85 89 name='admin_permissions_application',
86 90 pattern='/permissions/application')
87 91 config.add_route(
88 92 name='admin_permissions_application_update',
89 93 pattern='/permissions/application/update')
90 94
91 95 config.add_route(
92 96 name='admin_permissions_global',
93 97 pattern='/permissions/global')
94 98 config.add_route(
95 99 name='admin_permissions_global_update',
96 100 pattern='/permissions/global/update')
97 101
98 102 config.add_route(
99 103 name='admin_permissions_object',
100 104 pattern='/permissions/object')
101 105 config.add_route(
102 106 name='admin_permissions_object_update',
103 107 pattern='/permissions/object/update')
104 108
105 109 config.add_route(
106 110 name='admin_permissions_ips',
107 111 pattern='/permissions/ips')
108 112
109 113 config.add_route(
110 114 name='admin_permissions_overview',
111 115 pattern='/permissions/overview')
112 116
113 117 config.add_route(
114 118 name='admin_permissions_auth_token_access',
115 119 pattern='/permissions/auth_token_access')
116 120
117 121 config.add_route(
118 122 name='admin_permissions_ssh_keys',
119 123 pattern='/permissions/ssh_keys')
120 124 config.add_route(
121 125 name='admin_permissions_ssh_keys_data',
122 126 pattern='/permissions/ssh_keys/data')
123 127 config.add_route(
124 128 name='admin_permissions_ssh_keys_update',
125 129 pattern='/permissions/ssh_keys/update')
126 130
127 131 # users admin
128 132 config.add_route(
129 133 name='users',
130 134 pattern='/users')
131 135
132 136 config.add_route(
133 137 name='users_data',
134 138 pattern='/users_data')
135 139
136 140 # user auth tokens
137 141 config.add_route(
138 142 name='edit_user_auth_tokens',
139 143 pattern='/users/{user_id:\d+}/edit/auth_tokens')
140 144 config.add_route(
141 145 name='edit_user_auth_tokens_add',
142 146 pattern='/users/{user_id:\d+}/edit/auth_tokens/new')
143 147 config.add_route(
144 148 name='edit_user_auth_tokens_delete',
145 149 pattern='/users/{user_id:\d+}/edit/auth_tokens/delete')
146 150
147 151 # user ssh keys
148 152 config.add_route(
149 153 name='edit_user_ssh_keys',
150 154 pattern='/users/{user_id:\d+}/edit/ssh_keys')
151 155 config.add_route(
152 156 name='edit_user_ssh_keys_generate_keypair',
153 157 pattern='/users/{user_id:\d+}/edit/ssh_keys/generate')
154 158 config.add_route(
155 159 name='edit_user_ssh_keys_add',
156 160 pattern='/users/{user_id:\d+}/edit/ssh_keys/new')
157 161 config.add_route(
158 162 name='edit_user_ssh_keys_delete',
159 163 pattern='/users/{user_id:\d+}/edit/ssh_keys/delete')
160 164
161 165 # user emails
162 166 config.add_route(
163 167 name='edit_user_emails',
164 168 pattern='/users/{user_id:\d+}/edit/emails')
165 169 config.add_route(
166 170 name='edit_user_emails_add',
167 171 pattern='/users/{user_id:\d+}/edit/emails/new')
168 172 config.add_route(
169 173 name='edit_user_emails_delete',
170 174 pattern='/users/{user_id:\d+}/edit/emails/delete')
171 175
172 176 # user IPs
173 177 config.add_route(
174 178 name='edit_user_ips',
175 179 pattern='/users/{user_id:\d+}/edit/ips')
176 180 config.add_route(
177 181 name='edit_user_ips_add',
178 182 pattern='/users/{user_id:\d+}/edit/ips/new')
179 183 config.add_route(
180 184 name='edit_user_ips_delete',
181 185 pattern='/users/{user_id:\d+}/edit/ips/delete')
182 186
183 187 # user perms
184 188 config.add_route(
185 189 name='edit_user_perms_summary',
186 190 pattern='/users/{user_id:\d+}/edit/permissions_summary')
187 191 config.add_route(
188 192 name='edit_user_perms_summary_json',
189 193 pattern='/users/{user_id:\d+}/edit/permissions_summary/json')
190 194
191 195 # user user groups management
192 196 config.add_route(
193 197 name='edit_user_groups_management',
194 198 pattern='/users/{user_id:\d+}/edit/groups_management')
195 199
196 200 config.add_route(
197 201 name='edit_user_groups_management_updates',
198 202 pattern='/users/{user_id:\d+}/edit/edit_user_groups_management/updates')
199 203
200 204 # user audit logs
201 205 config.add_route(
202 206 name='edit_user_audit_logs',
203 207 pattern='/users/{user_id:\d+}/edit/audit')
204 208
205 209 # user-groups admin
206 210 config.add_route(
207 211 name='user_groups',
208 212 pattern='/user_groups')
209 213
210 214 config.add_route(
211 215 name='user_groups_data',
212 216 pattern='/user_groups_data')
213 217
214 218 config.add_route(
215 219 name='user_groups_new',
216 220 pattern='/user_groups/new')
217 221
218 222 config.add_route(
219 223 name='user_groups_create',
220 224 pattern='/user_groups/create')
221 225
222 226 # repos admin
223 227 config.add_route(
224 228 name='repos',
225 229 pattern='/repos')
226 230
227 231 config.add_route(
228 232 name='repo_new',
229 233 pattern='/repos/new')
230 234
231 235 config.add_route(
232 236 name='repo_create',
233 237 pattern='/repos/create')
234 238
235 239
236 240 def includeme(config):
237 241 settings = config.get_settings()
238 242
239 243 # Create admin navigation registry and add it to the pyramid registry.
240 244 labs_active = str2bool(settings.get('labs_settings_active', False))
241 245 navigation_registry = NavigationRegistry(labs_active=labs_active)
242 246 config.registry.registerUtility(navigation_registry)
243 247
244 248 # main admin routes
245 249 config.add_route(name='admin_home', pattern=ADMIN_PREFIX)
246 250 config.include(admin_routes, route_prefix=ADMIN_PREFIX)
247 251
248 252 # Scan module for configuration decorators.
249 253 config.scan('.views', ignore='.tests')
@@ -1,72 +1,91 b''
1 1 # -*- coding: utf-8 -*-
2 2
3 3 # Copyright (C) 2016-2017 RhodeCode GmbH
4 4 #
5 5 # This program is free software: you can redistribute it and/or modify
6 6 # it under the terms of the GNU Affero General Public License, version 3
7 7 # (only), as published by the Free Software Foundation.
8 8 #
9 9 # This program is distributed in the hope that it will be useful,
10 10 # but WITHOUT ANY WARRANTY; without even the implied warranty of
11 11 # MERCHANTABILITY or FITNESS FOR A PARTICULAR PURPOSE. See the
12 12 # GNU General Public License for more details.
13 13 #
14 14 # You should have received a copy of the GNU Affero General Public License
15 15 # along with this program. If not, see <http://www.gnu.org/licenses/>.
16 16 #
17 17 # This program is dual-licensed. If you wish to learn more about the
18 18 # RhodeCode Enterprise Edition, including its added features, Support services,
19 19 # and proprietary license terms, please see https://rhodecode.com/licenses/
20 20
21 21 import logging
22 22
23 from pyramid.httpexceptions import HTTPNotFound
23 24 from pyramid.view import view_config
24 25
25 26 from rhodecode.apps._base import BaseAppView
26 27 from rhodecode.model.db import joinedload, UserLog
27 28 from rhodecode.lib.user_log_filter import user_log_filter
28 29 from rhodecode.lib.auth import LoginRequired, HasPermissionAllDecorator
29 30 from rhodecode.lib.utils2 import safe_int
30 31 from rhodecode.lib.helpers import Page
31 32
32 33 log = logging.getLogger(__name__)
33 34
34 35
35 36 class AdminAuditLogsView(BaseAppView):
36 37 def load_default_context(self):
37 38 c = self._get_local_tmpl_context()
38 39 self._register_global_c(c)
39 40 return c
40 41
41 42 @LoginRequired()
42 43 @HasPermissionAllDecorator('hg.admin')
43 44 @view_config(
44 45 route_name='admin_audit_logs', request_method='GET',
45 46 renderer='rhodecode:templates/admin/admin_audit_logs.mako')
46 47 def admin_audit_logs(self):
47 48 c = self.load_default_context()
48 49
49 50 users_log = UserLog.query()\
50 51 .options(joinedload(UserLog.user))\
51 52 .options(joinedload(UserLog.repository))
52 53
53 54 # FILTERING
54 55 c.search_term = self.request.GET.get('filter')
55 56 try:
56 57 users_log = user_log_filter(users_log, c.search_term)
57 58 except Exception:
58 59 # we want this to crash for now
59 60 raise
60 61
61 62 users_log = users_log.order_by(UserLog.action_date.desc())
62 63
63 64 p = safe_int(self.request.GET.get('page', 1), 1)
64 65
65 66 def url_generator(**kw):
66 67 if c.search_term:
67 68 kw['filter'] = c.search_term
68 69 return self.request.current_route_path(_query=kw)
69 70
70 71 c.audit_logs = Page(users_log, page=p, items_per_page=10,
71 72 url=url_generator)
72 73 return self._get_template_context(c)
74
75 @LoginRequired()
76 @HasPermissionAllDecorator('hg.admin')
77 @view_config(
78 route_name='admin_audit_log_entry', request_method='GET',
79 renderer='rhodecode:templates/admin/admin_audit_log_entry.mako')
80 def admin_audit_log_entry(self):
81 c = self.load_default_context()
82 audit_log_id = self.request.matchdict['audit_log_id']
83
84 c.audit_log_entry = UserLog.query()\
85 .options(joinedload(UserLog.user))\
86 .options(joinedload(UserLog.repository))\
87 .filter(UserLog.user_log_id == audit_log_id).scalar()
88 if not c.audit_log_entry:
89 raise HTTPNotFound()
90
91 return self._get_template_context(c)
@@ -1,257 +1,262 b''
1 1 # -*- coding: utf-8 -*-
2 2
3 3 # Copyright (C) 2017-2017 RhodeCode GmbH
4 4 #
5 5 # This program is free software: you can redistribute it and/or modify
6 6 # it under the terms of the GNU Affero General Public License, version 3
7 7 # (only), as published by the Free Software Foundation.
8 8 #
9 9 # This program is distributed in the hope that it will be useful,
10 10 # but WITHOUT ANY WARRANTY; without even the implied warranty of
11 11 # MERCHANTABILITY or FITNESS FOR A PARTICULAR PURPOSE. See the
12 12 # GNU General Public License for more details.
13 13 #
14 14 # You should have received a copy of the GNU Affero General Public License
15 15 # along with this program. If not, see <http://www.gnu.org/licenses/>.
16 16 #
17 17 # This program is dual-licensed. If you wish to learn more about the
18 18 # RhodeCode Enterprise Edition, including its added features, Support services,
19 19 # and proprietary license terms, please see https://rhodecode.com/licenses/
20 20
21 21 import logging
22 22 import datetime
23 23
24 24 from rhodecode.model import meta
25 25 from rhodecode.model.db import User, UserLog, Repository
26 26
27 27
28 28 log = logging.getLogger(__name__)
29 29
30 30 # action as key, and expected action_data as value
31 31 ACTIONS_V1 = {
32 32 'user.login.success': {'user_agent': ''},
33 33 'user.login.failure': {'user_agent': ''},
34 34 'user.logout': {'user_agent': ''},
35 35 'user.password.reset_request': {},
36 36 'user.push': {'user_agent': '', 'commit_ids': []},
37 37 'user.pull': {'user_agent': ''},
38 38
39 39 'user.create': {'data': {}},
40 40 'user.delete': {'old_data': {}},
41 41 'user.edit': {'old_data': {}},
42 42 'user.edit.permissions': {},
43 43 'user.edit.ip.add': {'ip': {}, 'user': {}},
44 44 'user.edit.ip.delete': {'ip': {}, 'user': {}},
45 45 'user.edit.token.add': {'token': {}, 'user': {}},
46 46 'user.edit.token.delete': {'token': {}, 'user': {}},
47 47 'user.edit.email.add': {'email': ''},
48 48 'user.edit.email.delete': {'email': ''},
49 49 'user.edit.ssh_key.add': {'token': {}, 'user': {}},
50 50 'user.edit.ssh_key.delete': {'token': {}, 'user': {}},
51 51 'user.edit.password_reset.enabled': {},
52 52 'user.edit.password_reset.disabled': {},
53 53
54 54 'user_group.create': {'data': {}},
55 55 'user_group.delete': {'old_data': {}},
56 56 'user_group.edit': {'old_data': {}},
57 57 'user_group.edit.permissions': {},
58 58 'user_group.edit.member.add': {'user': {}},
59 59 'user_group.edit.member.delete': {'user': {}},
60 60
61 61 'repo.create': {'data': {}},
62 62 'repo.fork': {'data': {}},
63 63 'repo.edit': {'old_data': {}},
64 64 'repo.edit.permissions': {},
65 65 'repo.delete': {'old_data': {}},
66 66 'repo.commit.strip': {'commit_id': ''},
67 67 'repo.archive.download': {'user_agent': '', 'archive_name': '',
68 68 'archive_spec': '', 'archive_cached': ''},
69 69 'repo.pull_request.create': '',
70 70 'repo.pull_request.edit': '',
71 71 'repo.pull_request.delete': '',
72 72 'repo.pull_request.close': '',
73 73 'repo.pull_request.merge': '',
74 74 'repo.pull_request.vote': '',
75 75 'repo.pull_request.comment.create': '',
76 76 'repo.pull_request.comment.delete': '',
77 77
78 78 'repo.pull_request.reviewer.add': '',
79 79 'repo.pull_request.reviewer.delete': '',
80 80
81 81 'repo.commit.comment.create': {'data': {}},
82 82 'repo.commit.comment.delete': {'data': {}},
83 83 'repo.commit.vote': '',
84 84
85 85 'repo_group.create': {'data': {}},
86 86 'repo_group.edit': {'old_data': {}},
87 87 'repo_group.edit.permissions': {},
88 88 'repo_group.delete': {'old_data': {}},
89 89 }
90 90 ACTIONS = ACTIONS_V1
91 91
92 92 SOURCE_WEB = 'source_web'
93 93 SOURCE_API = 'source_api'
94 94
95 95
96 96 class UserWrap(object):
97 97 """
98 98 Fake object used to imitate AuthUser
99 99 """
100 100
101 101 def __init__(self, user_id=None, username=None, ip_addr=None):
102 102 self.user_id = user_id
103 103 self.username = username
104 104 self.ip_addr = ip_addr
105 105
106 106
107 107 class RepoWrap(object):
108 108 """
109 109 Fake object used to imitate RepoObject that audit logger requires
110 110 """
111 111
112 112 def __init__(self, repo_id=None, repo_name=None):
113 113 self.repo_id = repo_id
114 114 self.repo_name = repo_name
115 115
116 116
117 117 def _store_log(action_name, action_data, user_id, username, user_data,
118 118 ip_address, repository_id, repository_name):
119 119 user_log = UserLog()
120 120 user_log.version = UserLog.VERSION_2
121 121
122 122 user_log.action = action_name
123 123 user_log.action_data = action_data
124 124
125 125 user_log.user_ip = ip_address
126 126
127 127 user_log.user_id = user_id
128 128 user_log.username = username
129 129 user_log.user_data = user_data
130 130
131 131 user_log.repository_id = repository_id
132 132 user_log.repository_name = repository_name
133 133
134 134 user_log.action_date = datetime.datetime.now()
135 135
136 log.info('AUDIT: Logging action: `%s` by user:id:%s[%s] ip:%s',
137 action_name, user_id, username, ip_address)
138
139 136 return user_log
140 137
141 138
142 139 def store_web(*args, **kwargs):
143 140 if 'action_data' not in kwargs:
144 141 kwargs['action_data'] = {}
145 142 kwargs['action_data'].update({
146 143 'source': SOURCE_WEB
147 144 })
148 145 return store(*args, **kwargs)
149 146
150 147
151 148 def store_api(*args, **kwargs):
152 149 if 'action_data' not in kwargs:
153 150 kwargs['action_data'] = {}
154 151 kwargs['action_data'].update({
155 152 'source': SOURCE_API
156 153 })
157 154 return store(*args, **kwargs)
158 155
159 156
160 157 def store(action, user, action_data=None, user_data=None, ip_addr=None,
161 158 repo=None, sa_session=None, commit=False):
162 159 """
163 160 Audit logger for various actions made by users, typically this
164 161 results in a call such::
165 162
166 163 from rhodecode.lib import audit_logger
167 164
168 165 audit_logger.store(
169 166 'repo.edit', user=self._rhodecode_user)
170 167 audit_logger.store(
171 168 'repo.delete', action_data={'data': repo_data},
172 169 user=audit_logger.UserWrap(username='itried-login', ip_addr='8.8.8.8'))
173 170
174 171 # repo action
175 172 audit_logger.store(
176 173 'repo.delete',
177 174 user=audit_logger.UserWrap(username='itried-login', ip_addr='8.8.8.8'),
178 175 repo=audit_logger.RepoWrap(repo_name='some-repo'))
179 176
180 177 # repo action, when we know and have the repository object already
181 178 audit_logger.store(
182 179 'repo.delete', action_data={'source': audit_logger.SOURCE_WEB, },
183 180 user=self._rhodecode_user,
184 181 repo=repo_object)
185 182
186 183 # alternative wrapper to the above
187 184 audit_logger.store_web(
188 185 'repo.delete', action_data={},
189 186 user=self._rhodecode_user,
190 187 repo=repo_object)
191 188
192 189 # without an user ?
193 190 audit_logger.store(
194 191 'user.login.failure',
195 192 user=audit_logger.UserWrap(
196 193 username=self.request.params.get('username'),
197 194 ip_addr=self.request.remote_addr))
198 195
199 196 """
200 197 from rhodecode.lib.utils2 import safe_unicode
201 198 from rhodecode.lib.auth import AuthUser
202 199
203 200 action_spec = ACTIONS.get(action, None)
204 201 if action_spec is None:
205 202 raise ValueError('Action `{}` is not supported'.format(action))
206 203
207 204 if not sa_session:
208 205 sa_session = meta.Session()
209 206
210 207 try:
211 208 username = getattr(user, 'username', None)
212 209 if not username:
213 210 pass
214 211
215 212 user_id = getattr(user, 'user_id', None)
216 213 if not user_id:
217 214 # maybe we have username ? Try to figure user_id from username
218 215 if username:
219 216 user_id = getattr(
220 217 User.get_by_username(username), 'user_id', None)
221 218
222 219 ip_addr = ip_addr or getattr(user, 'ip_addr', None)
223 220 if not ip_addr:
224 221 pass
225 222
226 223 if not user_data:
227 224 # try to get this from the auth user
228 225 if isinstance(user, AuthUser):
229 226 user_data = {
230 227 'username': user.username,
231 228 'email': user.email,
232 229 }
233 230
234 231 repository_name = getattr(repo, 'repo_name', None)
235 232 repository_id = getattr(repo, 'repo_id', None)
236 233 if not repository_id:
237 234 # maybe we have repo_name ? Try to figure repo_id from repo_name
238 235 if repository_name:
239 236 repository_id = getattr(
240 237 Repository.get_by_repo_name(repository_name), 'repo_id', None)
241 238
239 action_name = safe_unicode(action)
240 ip_address = safe_unicode(ip_addr)
241
242 242 user_log = _store_log(
243 action_name=safe_unicode(action),
243 action_name=action_name,
244 244 action_data=action_data or {},
245 245 user_id=user_id,
246 246 username=username,
247 247 user_data=user_data or {},
248 ip_address=safe_unicode(ip_addr),
248 ip_address=ip_address,
249 249 repository_id=repository_id,
250 250 repository_name=repository_name
251 251 )
252
252 253 sa_session.add(user_log)
253 254 if commit:
254 255 sa_session.commit()
255 256
257 entry_id = user_log.entry_id or ''
258 log.info('AUDIT[%s]: Logging action: `%s` by user:id:%s[%s] ip:%s',
259 entry_id, action_name, user_id, username, ip_address)
260
256 261 except Exception:
257 262 log.exception('AUDIT: failed to store audit log')
@@ -1,4209 +1,4213 b''
1 1 # -*- coding: utf-8 -*-
2 2
3 3 # Copyright (C) 2010-2017 RhodeCode GmbH
4 4 #
5 5 # This program is free software: you can redistribute it and/or modify
6 6 # it under the terms of the GNU Affero General Public License, version 3
7 7 # (only), as published by the Free Software Foundation.
8 8 #
9 9 # This program is distributed in the hope that it will be useful,
10 10 # but WITHOUT ANY WARRANTY; without even the implied warranty of
11 11 # MERCHANTABILITY or FITNESS FOR A PARTICULAR PURPOSE. See the
12 12 # GNU General Public License for more details.
13 13 #
14 14 # You should have received a copy of the GNU Affero General Public License
15 15 # along with this program. If not, see <http://www.gnu.org/licenses/>.
16 16 #
17 17 # This program is dual-licensed. If you wish to learn more about the
18 18 # RhodeCode Enterprise Edition, including its added features, Support services,
19 19 # and proprietary license terms, please see https://rhodecode.com/licenses/
20 20
21 21 """
22 22 Database Models for RhodeCode Enterprise
23 23 """
24 24
25 25 import re
26 26 import os
27 27 import time
28 28 import hashlib
29 29 import logging
30 30 import datetime
31 31 import warnings
32 32 import ipaddress
33 33 import functools
34 34 import traceback
35 35 import collections
36 36
37 37
38 38 from sqlalchemy import *
39 39 from sqlalchemy.ext.declarative import declared_attr
40 40 from sqlalchemy.ext.hybrid import hybrid_property
41 41 from sqlalchemy.orm import (
42 42 relationship, joinedload, class_mapper, validates, aliased)
43 43 from sqlalchemy.sql.expression import true
44 44 from sqlalchemy.sql.functions import coalesce, count # noqa
45 45 from sqlalchemy.exc import IntegrityError # noqa
46 46 from sqlalchemy.dialects.mysql import LONGTEXT
47 47 from beaker.cache import cache_region
48 48 from zope.cachedescriptors.property import Lazy as LazyProperty
49 49
50 50 from pyramid.threadlocal import get_current_request
51 51
52 52 from rhodecode.translation import _
53 53 from rhodecode.lib.vcs import get_vcs_instance
54 54 from rhodecode.lib.vcs.backends.base import EmptyCommit, Reference
55 55 from rhodecode.lib.utils2 import (
56 56 str2bool, safe_str, get_commit_safe, safe_unicode, md5_safe,
57 57 time_to_datetime, aslist, Optional, safe_int, get_clone_url, AttributeDict,
58 58 glob2re, StrictAttributeDict, cleaned_uri)
59 59 from rhodecode.lib.jsonalchemy import MutationObj, MutationList, JsonType
60 60 from rhodecode.lib.ext_json import json
61 61 from rhodecode.lib.caching_query import FromCache
62 62 from rhodecode.lib.encrypt import AESCipher
63 63
64 64 from rhodecode.model.meta import Base, Session
65 65
66 66 URL_SEP = '/'
67 67 log = logging.getLogger(__name__)
68 68
69 69 # =============================================================================
70 70 # BASE CLASSES
71 71 # =============================================================================
72 72
73 73 # this is propagated from .ini file rhodecode.encrypted_values.secret or
74 74 # beaker.session.secret if first is not set.
75 75 # and initialized at environment.py
76 76 ENCRYPTION_KEY = None
77 77
78 78 # used to sort permissions by types, '#' used here is not allowed to be in
79 79 # usernames, and it's very early in sorted string.printable table.
80 80 PERMISSION_TYPE_SORT = {
81 81 'admin': '####',
82 82 'write': '###',
83 83 'read': '##',
84 84 'none': '#',
85 85 }
86 86
87 87
88 88 def display_user_sort(obj):
89 89 """
90 90 Sort function used to sort permissions in .permissions() function of
91 91 Repository, RepoGroup, UserGroup. Also it put the default user in front
92 92 of all other resources
93 93 """
94 94
95 95 if obj.username == User.DEFAULT_USER:
96 96 return '#####'
97 97 prefix = PERMISSION_TYPE_SORT.get(obj.permission.split('.')[-1], '')
98 98 return prefix + obj.username
99 99
100 100
101 101 def display_user_group_sort(obj):
102 102 """
103 103 Sort function used to sort permissions in .permissions() function of
104 104 Repository, RepoGroup, UserGroup. Also it put the default user in front
105 105 of all other resources
106 106 """
107 107
108 108 prefix = PERMISSION_TYPE_SORT.get(obj.permission.split('.')[-1], '')
109 109 return prefix + obj.users_group_name
110 110
111 111
112 112 def _hash_key(k):
113 113 return md5_safe(k)
114 114
115 115
116 116 def in_filter_generator(qry, items, limit=500):
117 117 """
118 118 Splits IN() into multiple with OR
119 119 e.g.::
120 120 cnt = Repository.query().filter(
121 121 or_(
122 122 *in_filter_generator(Repository.repo_id, range(100000))
123 123 )).count()
124 124 """
125 125 parts = []
126 126 for chunk in xrange(0, len(items), limit):
127 127 parts.append(
128 128 qry.in_(items[chunk: chunk + limit])
129 129 )
130 130
131 131 return parts
132 132
133 133
134 134 class EncryptedTextValue(TypeDecorator):
135 135 """
136 136 Special column for encrypted long text data, use like::
137 137
138 138 value = Column("encrypted_value", EncryptedValue(), nullable=False)
139 139
140 140 This column is intelligent so if value is in unencrypted form it return
141 141 unencrypted form, but on save it always encrypts
142 142 """
143 143 impl = Text
144 144
145 145 def process_bind_param(self, value, dialect):
146 146 if not value:
147 147 return value
148 148 if value.startswith('enc$aes$') or value.startswith('enc$aes_hmac$'):
149 149 # protect against double encrypting if someone manually starts
150 150 # doing
151 151 raise ValueError('value needs to be in unencrypted format, ie. '
152 152 'not starting with enc$aes')
153 153 return 'enc$aes_hmac$%s' % AESCipher(
154 154 ENCRYPTION_KEY, hmac=True).encrypt(value)
155 155
156 156 def process_result_value(self, value, dialect):
157 157 import rhodecode
158 158
159 159 if not value:
160 160 return value
161 161
162 162 parts = value.split('$', 3)
163 163 if not len(parts) == 3:
164 164 # probably not encrypted values
165 165 return value
166 166 else:
167 167 if parts[0] != 'enc':
168 168 # parts ok but without our header ?
169 169 return value
170 170 enc_strict_mode = str2bool(rhodecode.CONFIG.get(
171 171 'rhodecode.encrypted_values.strict') or True)
172 172 # at that stage we know it's our encryption
173 173 if parts[1] == 'aes':
174 174 decrypted_data = AESCipher(ENCRYPTION_KEY).decrypt(parts[2])
175 175 elif parts[1] == 'aes_hmac':
176 176 decrypted_data = AESCipher(
177 177 ENCRYPTION_KEY, hmac=True,
178 178 strict_verification=enc_strict_mode).decrypt(parts[2])
179 179 else:
180 180 raise ValueError(
181 181 'Encryption type part is wrong, must be `aes` '
182 182 'or `aes_hmac`, got `%s` instead' % (parts[1]))
183 183 return decrypted_data
184 184
185 185
186 186 class BaseModel(object):
187 187 """
188 188 Base Model for all classes
189 189 """
190 190
191 191 @classmethod
192 192 def _get_keys(cls):
193 193 """return column names for this model """
194 194 return class_mapper(cls).c.keys()
195 195
196 196 def get_dict(self):
197 197 """
198 198 return dict with keys and values corresponding
199 199 to this model data """
200 200
201 201 d = {}
202 202 for k in self._get_keys():
203 203 d[k] = getattr(self, k)
204 204
205 205 # also use __json__() if present to get additional fields
206 206 _json_attr = getattr(self, '__json__', None)
207 207 if _json_attr:
208 208 # update with attributes from __json__
209 209 if callable(_json_attr):
210 210 _json_attr = _json_attr()
211 211 for k, val in _json_attr.iteritems():
212 212 d[k] = val
213 213 return d
214 214
215 215 def get_appstruct(self):
216 216 """return list with keys and values tuples corresponding
217 217 to this model data """
218 218
219 219 l = []
220 220 for k in self._get_keys():
221 221 l.append((k, getattr(self, k),))
222 222 return l
223 223
224 224 def populate_obj(self, populate_dict):
225 225 """populate model with data from given populate_dict"""
226 226
227 227 for k in self._get_keys():
228 228 if k in populate_dict:
229 229 setattr(self, k, populate_dict[k])
230 230
231 231 @classmethod
232 232 def query(cls):
233 233 return Session().query(cls)
234 234
235 235 @classmethod
236 236 def get(cls, id_):
237 237 if id_:
238 238 return cls.query().get(id_)
239 239
240 240 @classmethod
241 241 def get_or_404(cls, id_):
242 242 from pyramid.httpexceptions import HTTPNotFound
243 243
244 244 try:
245 245 id_ = int(id_)
246 246 except (TypeError, ValueError):
247 247 raise HTTPNotFound()
248 248
249 249 res = cls.query().get(id_)
250 250 if not res:
251 251 raise HTTPNotFound()
252 252 return res
253 253
254 254 @classmethod
255 255 def getAll(cls):
256 256 # deprecated and left for backward compatibility
257 257 return cls.get_all()
258 258
259 259 @classmethod
260 260 def get_all(cls):
261 261 return cls.query().all()
262 262
263 263 @classmethod
264 264 def delete(cls, id_):
265 265 obj = cls.query().get(id_)
266 266 Session().delete(obj)
267 267
268 268 @classmethod
269 269 def identity_cache(cls, session, attr_name, value):
270 270 exist_in_session = []
271 271 for (item_cls, pkey), instance in session.identity_map.items():
272 272 if cls == item_cls and getattr(instance, attr_name) == value:
273 273 exist_in_session.append(instance)
274 274 if exist_in_session:
275 275 if len(exist_in_session) == 1:
276 276 return exist_in_session[0]
277 277 log.exception(
278 278 'multiple objects with attr %s and '
279 279 'value %s found with same name: %r',
280 280 attr_name, value, exist_in_session)
281 281
282 282 def __repr__(self):
283 283 if hasattr(self, '__unicode__'):
284 284 # python repr needs to return str
285 285 try:
286 286 return safe_str(self.__unicode__())
287 287 except UnicodeDecodeError:
288 288 pass
289 289 return '<DB:%s>' % (self.__class__.__name__)
290 290
291 291
292 292 class RhodeCodeSetting(Base, BaseModel):
293 293 __tablename__ = 'rhodecode_settings'
294 294 __table_args__ = (
295 295 UniqueConstraint('app_settings_name'),
296 296 {'extend_existing': True, 'mysql_engine': 'InnoDB',
297 297 'mysql_charset': 'utf8', 'sqlite_autoincrement': True}
298 298 )
299 299
300 300 SETTINGS_TYPES = {
301 301 'str': safe_str,
302 302 'int': safe_int,
303 303 'unicode': safe_unicode,
304 304 'bool': str2bool,
305 305 'list': functools.partial(aslist, sep=',')
306 306 }
307 307 DEFAULT_UPDATE_URL = 'https://rhodecode.com/api/v1/info/versions'
308 308 GLOBAL_CONF_KEY = 'app_settings'
309 309
310 310 app_settings_id = Column("app_settings_id", Integer(), nullable=False, unique=True, default=None, primary_key=True)
311 311 app_settings_name = Column("app_settings_name", String(255), nullable=True, unique=None, default=None)
312 312 _app_settings_value = Column("app_settings_value", String(4096), nullable=True, unique=None, default=None)
313 313 _app_settings_type = Column("app_settings_type", String(255), nullable=True, unique=None, default=None)
314 314
315 315 def __init__(self, key='', val='', type='unicode'):
316 316 self.app_settings_name = key
317 317 self.app_settings_type = type
318 318 self.app_settings_value = val
319 319
320 320 @validates('_app_settings_value')
321 321 def validate_settings_value(self, key, val):
322 322 assert type(val) == unicode
323 323 return val
324 324
325 325 @hybrid_property
326 326 def app_settings_value(self):
327 327 v = self._app_settings_value
328 328 _type = self.app_settings_type
329 329 if _type:
330 330 _type = self.app_settings_type.split('.')[0]
331 331 # decode the encrypted value
332 332 if 'encrypted' in self.app_settings_type:
333 333 cipher = EncryptedTextValue()
334 334 v = safe_unicode(cipher.process_result_value(v, None))
335 335
336 336 converter = self.SETTINGS_TYPES.get(_type) or \
337 337 self.SETTINGS_TYPES['unicode']
338 338 return converter(v)
339 339
340 340 @app_settings_value.setter
341 341 def app_settings_value(self, val):
342 342 """
343 343 Setter that will always make sure we use unicode in app_settings_value
344 344
345 345 :param val:
346 346 """
347 347 val = safe_unicode(val)
348 348 # encode the encrypted value
349 349 if 'encrypted' in self.app_settings_type:
350 350 cipher = EncryptedTextValue()
351 351 val = safe_unicode(cipher.process_bind_param(val, None))
352 352 self._app_settings_value = val
353 353
354 354 @hybrid_property
355 355 def app_settings_type(self):
356 356 return self._app_settings_type
357 357
358 358 @app_settings_type.setter
359 359 def app_settings_type(self, val):
360 360 if val.split('.')[0] not in self.SETTINGS_TYPES:
361 361 raise Exception('type must be one of %s got %s'
362 362 % (self.SETTINGS_TYPES.keys(), val))
363 363 self._app_settings_type = val
364 364
365 365 def __unicode__(self):
366 366 return u"<%s('%s:%s[%s]')>" % (
367 367 self.__class__.__name__,
368 368 self.app_settings_name, self.app_settings_value,
369 369 self.app_settings_type
370 370 )
371 371
372 372
373 373 class RhodeCodeUi(Base, BaseModel):
374 374 __tablename__ = 'rhodecode_ui'
375 375 __table_args__ = (
376 376 UniqueConstraint('ui_key'),
377 377 {'extend_existing': True, 'mysql_engine': 'InnoDB',
378 378 'mysql_charset': 'utf8', 'sqlite_autoincrement': True}
379 379 )
380 380
381 381 HOOK_REPO_SIZE = 'changegroup.repo_size'
382 382 # HG
383 383 HOOK_PRE_PULL = 'preoutgoing.pre_pull'
384 384 HOOK_PULL = 'outgoing.pull_logger'
385 385 HOOK_PRE_PUSH = 'prechangegroup.pre_push'
386 386 HOOK_PRETX_PUSH = 'pretxnchangegroup.pre_push'
387 387 HOOK_PUSH = 'changegroup.push_logger'
388 388 HOOK_PUSH_KEY = 'pushkey.key_push'
389 389
390 390 # TODO: johbo: Unify way how hooks are configured for git and hg,
391 391 # git part is currently hardcoded.
392 392
393 393 # SVN PATTERNS
394 394 SVN_BRANCH_ID = 'vcs_svn_branch'
395 395 SVN_TAG_ID = 'vcs_svn_tag'
396 396
397 397 ui_id = Column(
398 398 "ui_id", Integer(), nullable=False, unique=True, default=None,
399 399 primary_key=True)
400 400 ui_section = Column(
401 401 "ui_section", String(255), nullable=True, unique=None, default=None)
402 402 ui_key = Column(
403 403 "ui_key", String(255), nullable=True, unique=None, default=None)
404 404 ui_value = Column(
405 405 "ui_value", String(255), nullable=True, unique=None, default=None)
406 406 ui_active = Column(
407 407 "ui_active", Boolean(), nullable=True, unique=None, default=True)
408 408
409 409 def __repr__(self):
410 410 return '<%s[%s]%s=>%s]>' % (self.__class__.__name__, self.ui_section,
411 411 self.ui_key, self.ui_value)
412 412
413 413
414 414 class RepoRhodeCodeSetting(Base, BaseModel):
415 415 __tablename__ = 'repo_rhodecode_settings'
416 416 __table_args__ = (
417 417 UniqueConstraint(
418 418 'app_settings_name', 'repository_id',
419 419 name='uq_repo_rhodecode_setting_name_repo_id'),
420 420 {'extend_existing': True, 'mysql_engine': 'InnoDB',
421 421 'mysql_charset': 'utf8', 'sqlite_autoincrement': True}
422 422 )
423 423
424 424 repository_id = Column(
425 425 "repository_id", Integer(), ForeignKey('repositories.repo_id'),
426 426 nullable=False)
427 427 app_settings_id = Column(
428 428 "app_settings_id", Integer(), nullable=False, unique=True,
429 429 default=None, primary_key=True)
430 430 app_settings_name = Column(
431 431 "app_settings_name", String(255), nullable=True, unique=None,
432 432 default=None)
433 433 _app_settings_value = Column(
434 434 "app_settings_value", String(4096), nullable=True, unique=None,
435 435 default=None)
436 436 _app_settings_type = Column(
437 437 "app_settings_type", String(255), nullable=True, unique=None,
438 438 default=None)
439 439
440 440 repository = relationship('Repository')
441 441
442 442 def __init__(self, repository_id, key='', val='', type='unicode'):
443 443 self.repository_id = repository_id
444 444 self.app_settings_name = key
445 445 self.app_settings_type = type
446 446 self.app_settings_value = val
447 447
448 448 @validates('_app_settings_value')
449 449 def validate_settings_value(self, key, val):
450 450 assert type(val) == unicode
451 451 return val
452 452
453 453 @hybrid_property
454 454 def app_settings_value(self):
455 455 v = self._app_settings_value
456 456 type_ = self.app_settings_type
457 457 SETTINGS_TYPES = RhodeCodeSetting.SETTINGS_TYPES
458 458 converter = SETTINGS_TYPES.get(type_) or SETTINGS_TYPES['unicode']
459 459 return converter(v)
460 460
461 461 @app_settings_value.setter
462 462 def app_settings_value(self, val):
463 463 """
464 464 Setter that will always make sure we use unicode in app_settings_value
465 465
466 466 :param val:
467 467 """
468 468 self._app_settings_value = safe_unicode(val)
469 469
470 470 @hybrid_property
471 471 def app_settings_type(self):
472 472 return self._app_settings_type
473 473
474 474 @app_settings_type.setter
475 475 def app_settings_type(self, val):
476 476 SETTINGS_TYPES = RhodeCodeSetting.SETTINGS_TYPES
477 477 if val not in SETTINGS_TYPES:
478 478 raise Exception('type must be one of %s got %s'
479 479 % (SETTINGS_TYPES.keys(), val))
480 480 self._app_settings_type = val
481 481
482 482 def __unicode__(self):
483 483 return u"<%s('%s:%s:%s[%s]')>" % (
484 484 self.__class__.__name__, self.repository.repo_name,
485 485 self.app_settings_name, self.app_settings_value,
486 486 self.app_settings_type
487 487 )
488 488
489 489
490 490 class RepoRhodeCodeUi(Base, BaseModel):
491 491 __tablename__ = 'repo_rhodecode_ui'
492 492 __table_args__ = (
493 493 UniqueConstraint(
494 494 'repository_id', 'ui_section', 'ui_key',
495 495 name='uq_repo_rhodecode_ui_repository_id_section_key'),
496 496 {'extend_existing': True, 'mysql_engine': 'InnoDB',
497 497 'mysql_charset': 'utf8', 'sqlite_autoincrement': True}
498 498 )
499 499
500 500 repository_id = Column(
501 501 "repository_id", Integer(), ForeignKey('repositories.repo_id'),
502 502 nullable=False)
503 503 ui_id = Column(
504 504 "ui_id", Integer(), nullable=False, unique=True, default=None,
505 505 primary_key=True)
506 506 ui_section = Column(
507 507 "ui_section", String(255), nullable=True, unique=None, default=None)
508 508 ui_key = Column(
509 509 "ui_key", String(255), nullable=True, unique=None, default=None)
510 510 ui_value = Column(
511 511 "ui_value", String(255), nullable=True, unique=None, default=None)
512 512 ui_active = Column(
513 513 "ui_active", Boolean(), nullable=True, unique=None, default=True)
514 514
515 515 repository = relationship('Repository')
516 516
517 517 def __repr__(self):
518 518 return '<%s[%s:%s]%s=>%s]>' % (
519 519 self.__class__.__name__, self.repository.repo_name,
520 520 self.ui_section, self.ui_key, self.ui_value)
521 521
522 522
523 523 class User(Base, BaseModel):
524 524 __tablename__ = 'users'
525 525 __table_args__ = (
526 526 UniqueConstraint('username'), UniqueConstraint('email'),
527 527 Index('u_username_idx', 'username'),
528 528 Index('u_email_idx', 'email'),
529 529 {'extend_existing': True, 'mysql_engine': 'InnoDB',
530 530 'mysql_charset': 'utf8', 'sqlite_autoincrement': True}
531 531 )
532 532 DEFAULT_USER = 'default'
533 533 DEFAULT_USER_EMAIL = 'anonymous@rhodecode.org'
534 534 DEFAULT_GRAVATAR_URL = 'https://secure.gravatar.com/avatar/{md5email}?d=identicon&s={size}'
535 535
536 536 user_id = Column("user_id", Integer(), nullable=False, unique=True, default=None, primary_key=True)
537 537 username = Column("username", String(255), nullable=True, unique=None, default=None)
538 538 password = Column("password", String(255), nullable=True, unique=None, default=None)
539 539 active = Column("active", Boolean(), nullable=True, unique=None, default=True)
540 540 admin = Column("admin", Boolean(), nullable=True, unique=None, default=False)
541 541 name = Column("firstname", String(255), nullable=True, unique=None, default=None)
542 542 lastname = Column("lastname", String(255), nullable=True, unique=None, default=None)
543 543 _email = Column("email", String(255), nullable=True, unique=None, default=None)
544 544 last_login = Column("last_login", DateTime(timezone=False), nullable=True, unique=None, default=None)
545 545 last_activity = Column('last_activity', DateTime(timezone=False), nullable=True, unique=None, default=None)
546 546
547 547 extern_type = Column("extern_type", String(255), nullable=True, unique=None, default=None)
548 548 extern_name = Column("extern_name", String(255), nullable=True, unique=None, default=None)
549 549 _api_key = Column("api_key", String(255), nullable=True, unique=None, default=None)
550 550 inherit_default_permissions = Column("inherit_default_permissions", Boolean(), nullable=False, unique=None, default=True)
551 551 created_on = Column('created_on', DateTime(timezone=False), nullable=False, default=datetime.datetime.now)
552 552 _user_data = Column("user_data", LargeBinary(), nullable=True) # JSON data
553 553
554 554 user_log = relationship('UserLog')
555 555 user_perms = relationship('UserToPerm', primaryjoin="User.user_id==UserToPerm.user_id", cascade='all')
556 556
557 557 repositories = relationship('Repository')
558 558 repository_groups = relationship('RepoGroup')
559 559 user_groups = relationship('UserGroup')
560 560
561 561 user_followers = relationship('UserFollowing', primaryjoin='UserFollowing.follows_user_id==User.user_id', cascade='all')
562 562 followings = relationship('UserFollowing', primaryjoin='UserFollowing.user_id==User.user_id', cascade='all')
563 563
564 564 repo_to_perm = relationship('UserRepoToPerm', primaryjoin='UserRepoToPerm.user_id==User.user_id', cascade='all')
565 565 repo_group_to_perm = relationship('UserRepoGroupToPerm', primaryjoin='UserRepoGroupToPerm.user_id==User.user_id', cascade='all')
566 566 user_group_to_perm = relationship('UserUserGroupToPerm', primaryjoin='UserUserGroupToPerm.user_id==User.user_id', cascade='all')
567 567
568 568 group_member = relationship('UserGroupMember', cascade='all')
569 569
570 570 notifications = relationship('UserNotification', cascade='all')
571 571 # notifications assigned to this user
572 572 user_created_notifications = relationship('Notification', cascade='all')
573 573 # comments created by this user
574 574 user_comments = relationship('ChangesetComment', cascade='all')
575 575 # user profile extra info
576 576 user_emails = relationship('UserEmailMap', cascade='all')
577 577 user_ip_map = relationship('UserIpMap', cascade='all')
578 578 user_auth_tokens = relationship('UserApiKeys', cascade='all')
579 579 user_ssh_keys = relationship('UserSshKeys', cascade='all')
580 580
581 581 # gists
582 582 user_gists = relationship('Gist', cascade='all')
583 583 # user pull requests
584 584 user_pull_requests = relationship('PullRequest', cascade='all')
585 585 # external identities
586 586 extenal_identities = relationship(
587 587 'ExternalIdentity',
588 588 primaryjoin="User.user_id==ExternalIdentity.local_user_id",
589 589 cascade='all')
590 590 # review rules
591 591 user_review_rules = relationship('RepoReviewRuleUser', cascade='all')
592 592
593 593 def __unicode__(self):
594 594 return u"<%s('id:%s:%s')>" % (self.__class__.__name__,
595 595 self.user_id, self.username)
596 596
597 597 @hybrid_property
598 598 def email(self):
599 599 return self._email
600 600
601 601 @email.setter
602 602 def email(self, val):
603 603 self._email = val.lower() if val else None
604 604
605 605 @hybrid_property
606 606 def first_name(self):
607 607 from rhodecode.lib import helpers as h
608 608 if self.name:
609 609 return h.escape(self.name)
610 610 return self.name
611 611
612 612 @hybrid_property
613 613 def last_name(self):
614 614 from rhodecode.lib import helpers as h
615 615 if self.lastname:
616 616 return h.escape(self.lastname)
617 617 return self.lastname
618 618
619 619 @hybrid_property
620 620 def api_key(self):
621 621 """
622 622 Fetch if exist an auth-token with role ALL connected to this user
623 623 """
624 624 user_auth_token = UserApiKeys.query()\
625 625 .filter(UserApiKeys.user_id == self.user_id)\
626 626 .filter(or_(UserApiKeys.expires == -1,
627 627 UserApiKeys.expires >= time.time()))\
628 628 .filter(UserApiKeys.role == UserApiKeys.ROLE_ALL).first()
629 629 if user_auth_token:
630 630 user_auth_token = user_auth_token.api_key
631 631
632 632 return user_auth_token
633 633
634 634 @api_key.setter
635 635 def api_key(self, val):
636 636 # don't allow to set API key this is deprecated for now
637 637 self._api_key = None
638 638
639 639 @property
640 640 def reviewer_pull_requests(self):
641 641 return PullRequestReviewers.query() \
642 642 .options(joinedload(PullRequestReviewers.pull_request)) \
643 643 .filter(PullRequestReviewers.user_id == self.user_id) \
644 644 .all()
645 645
646 646 @property
647 647 def firstname(self):
648 648 # alias for future
649 649 return self.name
650 650
651 651 @property
652 652 def emails(self):
653 653 other = UserEmailMap.query()\
654 654 .filter(UserEmailMap.user == self) \
655 655 .order_by(UserEmailMap.email_id.asc()) \
656 656 .all()
657 657 return [self.email] + [x.email for x in other]
658 658
659 659 @property
660 660 def auth_tokens(self):
661 661 auth_tokens = self.get_auth_tokens()
662 662 return [x.api_key for x in auth_tokens]
663 663
664 664 def get_auth_tokens(self):
665 665 return UserApiKeys.query()\
666 666 .filter(UserApiKeys.user == self)\
667 667 .order_by(UserApiKeys.user_api_key_id.asc())\
668 668 .all()
669 669
670 670 @property
671 671 def feed_token(self):
672 672 return self.get_feed_token()
673 673
674 674 def get_feed_token(self):
675 675 feed_tokens = UserApiKeys.query()\
676 676 .filter(UserApiKeys.user == self)\
677 677 .filter(UserApiKeys.role == UserApiKeys.ROLE_FEED)\
678 678 .all()
679 679 if feed_tokens:
680 680 return feed_tokens[0].api_key
681 681 return 'NO_FEED_TOKEN_AVAILABLE'
682 682
683 683 @classmethod
684 684 def extra_valid_auth_tokens(cls, user, role=None):
685 685 tokens = UserApiKeys.query().filter(UserApiKeys.user == user)\
686 686 .filter(or_(UserApiKeys.expires == -1,
687 687 UserApiKeys.expires >= time.time()))
688 688 if role:
689 689 tokens = tokens.filter(or_(UserApiKeys.role == role,
690 690 UserApiKeys.role == UserApiKeys.ROLE_ALL))
691 691 return tokens.all()
692 692
693 693 def authenticate_by_token(self, auth_token, roles=None, scope_repo_id=None):
694 694 from rhodecode.lib import auth
695 695
696 696 log.debug('Trying to authenticate user: %s via auth-token, '
697 697 'and roles: %s', self, roles)
698 698
699 699 if not auth_token:
700 700 return False
701 701
702 702 crypto_backend = auth.crypto_backend()
703 703
704 704 roles = (roles or []) + [UserApiKeys.ROLE_ALL]
705 705 tokens_q = UserApiKeys.query()\
706 706 .filter(UserApiKeys.user_id == self.user_id)\
707 707 .filter(or_(UserApiKeys.expires == -1,
708 708 UserApiKeys.expires >= time.time()))
709 709
710 710 tokens_q = tokens_q.filter(UserApiKeys.role.in_(roles))
711 711
712 712 plain_tokens = []
713 713 hash_tokens = []
714 714
715 715 for token in tokens_q.all():
716 716 # verify scope first
717 717 if token.repo_id:
718 718 # token has a scope, we need to verify it
719 719 if scope_repo_id != token.repo_id:
720 720 log.debug(
721 721 'Scope mismatch: token has a set repo scope: %s, '
722 722 'and calling scope is:%s, skipping further checks',
723 723 token.repo, scope_repo_id)
724 724 # token has a scope, and it doesn't match, skip token
725 725 continue
726 726
727 727 if token.api_key.startswith(crypto_backend.ENC_PREF):
728 728 hash_tokens.append(token.api_key)
729 729 else:
730 730 plain_tokens.append(token.api_key)
731 731
732 732 is_plain_match = auth_token in plain_tokens
733 733 if is_plain_match:
734 734 return True
735 735
736 736 for hashed in hash_tokens:
737 737 # TODO(marcink): this is expensive to calculate, but most secure
738 738 match = crypto_backend.hash_check(auth_token, hashed)
739 739 if match:
740 740 return True
741 741
742 742 return False
743 743
744 744 @property
745 745 def ip_addresses(self):
746 746 ret = UserIpMap.query().filter(UserIpMap.user == self).all()
747 747 return [x.ip_addr for x in ret]
748 748
749 749 @property
750 750 def username_and_name(self):
751 751 return '%s (%s %s)' % (self.username, self.first_name, self.last_name)
752 752
753 753 @property
754 754 def username_or_name_or_email(self):
755 755 full_name = self.full_name if self.full_name is not ' ' else None
756 756 return self.username or full_name or self.email
757 757
758 758 @property
759 759 def full_name(self):
760 760 return '%s %s' % (self.first_name, self.last_name)
761 761
762 762 @property
763 763 def full_name_or_username(self):
764 764 return ('%s %s' % (self.first_name, self.last_name)
765 765 if (self.first_name and self.last_name) else self.username)
766 766
767 767 @property
768 768 def full_contact(self):
769 769 return '%s %s <%s>' % (self.first_name, self.last_name, self.email)
770 770
771 771 @property
772 772 def short_contact(self):
773 773 return '%s %s' % (self.first_name, self.last_name)
774 774
775 775 @property
776 776 def is_admin(self):
777 777 return self.admin
778 778
779 779 def AuthUser(self, **kwargs):
780 780 """
781 781 Returns instance of AuthUser for this user
782 782 """
783 783 from rhodecode.lib.auth import AuthUser
784 784 return AuthUser(user_id=self.user_id, username=self.username, **kwargs)
785 785
786 786 @hybrid_property
787 787 def user_data(self):
788 788 if not self._user_data:
789 789 return {}
790 790
791 791 try:
792 792 return json.loads(self._user_data)
793 793 except TypeError:
794 794 return {}
795 795
796 796 @user_data.setter
797 797 def user_data(self, val):
798 798 if not isinstance(val, dict):
799 799 raise Exception('user_data must be dict, got %s' % type(val))
800 800 try:
801 801 self._user_data = json.dumps(val)
802 802 except Exception:
803 803 log.error(traceback.format_exc())
804 804
805 805 @classmethod
806 806 def get_by_username(cls, username, case_insensitive=False,
807 807 cache=False, identity_cache=False):
808 808 session = Session()
809 809
810 810 if case_insensitive:
811 811 q = cls.query().filter(
812 812 func.lower(cls.username) == func.lower(username))
813 813 else:
814 814 q = cls.query().filter(cls.username == username)
815 815
816 816 if cache:
817 817 if identity_cache:
818 818 val = cls.identity_cache(session, 'username', username)
819 819 if val:
820 820 return val
821 821 else:
822 822 cache_key = "get_user_by_name_%s" % _hash_key(username)
823 823 q = q.options(
824 824 FromCache("sql_cache_short", cache_key))
825 825
826 826 return q.scalar()
827 827
828 828 @classmethod
829 829 def get_by_auth_token(cls, auth_token, cache=False):
830 830 q = UserApiKeys.query()\
831 831 .filter(UserApiKeys.api_key == auth_token)\
832 832 .filter(or_(UserApiKeys.expires == -1,
833 833 UserApiKeys.expires >= time.time()))
834 834 if cache:
835 835 q = q.options(
836 836 FromCache("sql_cache_short", "get_auth_token_%s" % auth_token))
837 837
838 838 match = q.first()
839 839 if match:
840 840 return match.user
841 841
842 842 @classmethod
843 843 def get_by_email(cls, email, case_insensitive=False, cache=False):
844 844
845 845 if case_insensitive:
846 846 q = cls.query().filter(func.lower(cls.email) == func.lower(email))
847 847
848 848 else:
849 849 q = cls.query().filter(cls.email == email)
850 850
851 851 email_key = _hash_key(email)
852 852 if cache:
853 853 q = q.options(
854 854 FromCache("sql_cache_short", "get_email_key_%s" % email_key))
855 855
856 856 ret = q.scalar()
857 857 if ret is None:
858 858 q = UserEmailMap.query()
859 859 # try fetching in alternate email map
860 860 if case_insensitive:
861 861 q = q.filter(func.lower(UserEmailMap.email) == func.lower(email))
862 862 else:
863 863 q = q.filter(UserEmailMap.email == email)
864 864 q = q.options(joinedload(UserEmailMap.user))
865 865 if cache:
866 866 q = q.options(
867 867 FromCache("sql_cache_short", "get_email_map_key_%s" % email_key))
868 868 ret = getattr(q.scalar(), 'user', None)
869 869
870 870 return ret
871 871
872 872 @classmethod
873 873 def get_from_cs_author(cls, author):
874 874 """
875 875 Tries to get User objects out of commit author string
876 876
877 877 :param author:
878 878 """
879 879 from rhodecode.lib.helpers import email, author_name
880 880 # Valid email in the attribute passed, see if they're in the system
881 881 _email = email(author)
882 882 if _email:
883 883 user = cls.get_by_email(_email, case_insensitive=True)
884 884 if user:
885 885 return user
886 886 # Maybe we can match by username?
887 887 _author = author_name(author)
888 888 user = cls.get_by_username(_author, case_insensitive=True)
889 889 if user:
890 890 return user
891 891
892 892 def update_userdata(self, **kwargs):
893 893 usr = self
894 894 old = usr.user_data
895 895 old.update(**kwargs)
896 896 usr.user_data = old
897 897 Session().add(usr)
898 898 log.debug('updated userdata with ', kwargs)
899 899
900 900 def update_lastlogin(self):
901 901 """Update user lastlogin"""
902 902 self.last_login = datetime.datetime.now()
903 903 Session().add(self)
904 904 log.debug('updated user %s lastlogin', self.username)
905 905
906 906 def update_lastactivity(self):
907 907 """Update user lastactivity"""
908 908 self.last_activity = datetime.datetime.now()
909 909 Session().add(self)
910 910 log.debug('updated user %s lastactivity', self.username)
911 911
912 912 def update_password(self, new_password):
913 913 from rhodecode.lib.auth import get_crypt_password
914 914
915 915 self.password = get_crypt_password(new_password)
916 916 Session().add(self)
917 917
918 918 @classmethod
919 919 def get_first_super_admin(cls):
920 920 user = User.query().filter(User.admin == true()).first()
921 921 if user is None:
922 922 raise Exception('FATAL: Missing administrative account!')
923 923 return user
924 924
925 925 @classmethod
926 926 def get_all_super_admins(cls):
927 927 """
928 928 Returns all admin accounts sorted by username
929 929 """
930 930 return User.query().filter(User.admin == true())\
931 931 .order_by(User.username.asc()).all()
932 932
933 933 @classmethod
934 934 def get_default_user(cls, cache=False, refresh=False):
935 935 user = User.get_by_username(User.DEFAULT_USER, cache=cache)
936 936 if user is None:
937 937 raise Exception('FATAL: Missing default account!')
938 938 if refresh:
939 939 # The default user might be based on outdated state which
940 940 # has been loaded from the cache.
941 941 # A call to refresh() ensures that the
942 942 # latest state from the database is used.
943 943 Session().refresh(user)
944 944 return user
945 945
946 946 def _get_default_perms(self, user, suffix=''):
947 947 from rhodecode.model.permission import PermissionModel
948 948 return PermissionModel().get_default_perms(user.user_perms, suffix)
949 949
950 950 def get_default_perms(self, suffix=''):
951 951 return self._get_default_perms(self, suffix)
952 952
953 953 def get_api_data(self, include_secrets=False, details='full'):
954 954 """
955 955 Common function for generating user related data for API
956 956
957 957 :param include_secrets: By default secrets in the API data will be replaced
958 958 by a placeholder value to prevent exposing this data by accident. In case
959 959 this data shall be exposed, set this flag to ``True``.
960 960
961 961 :param details: details can be 'basic|full' basic gives only a subset of
962 962 the available user information that includes user_id, name and emails.
963 963 """
964 964 user = self
965 965 user_data = self.user_data
966 966 data = {
967 967 'user_id': user.user_id,
968 968 'username': user.username,
969 969 'firstname': user.name,
970 970 'lastname': user.lastname,
971 971 'email': user.email,
972 972 'emails': user.emails,
973 973 }
974 974 if details == 'basic':
975 975 return data
976 976
977 977 auth_token_length = 40
978 978 auth_token_replacement = '*' * auth_token_length
979 979
980 980 extras = {
981 981 'auth_tokens': [auth_token_replacement],
982 982 'active': user.active,
983 983 'admin': user.admin,
984 984 'extern_type': user.extern_type,
985 985 'extern_name': user.extern_name,
986 986 'last_login': user.last_login,
987 987 'last_activity': user.last_activity,
988 988 'ip_addresses': user.ip_addresses,
989 989 'language': user_data.get('language')
990 990 }
991 991 data.update(extras)
992 992
993 993 if include_secrets:
994 994 data['auth_tokens'] = user.auth_tokens
995 995 return data
996 996
997 997 def __json__(self):
998 998 data = {
999 999 'full_name': self.full_name,
1000 1000 'full_name_or_username': self.full_name_or_username,
1001 1001 'short_contact': self.short_contact,
1002 1002 'full_contact': self.full_contact,
1003 1003 }
1004 1004 data.update(self.get_api_data())
1005 1005 return data
1006 1006
1007 1007
1008 1008 class UserApiKeys(Base, BaseModel):
1009 1009 __tablename__ = 'user_api_keys'
1010 1010 __table_args__ = (
1011 1011 Index('uak_api_key_idx', 'api_key', unique=True),
1012 1012 Index('uak_api_key_expires_idx', 'api_key', 'expires'),
1013 1013 {'extend_existing': True, 'mysql_engine': 'InnoDB',
1014 1014 'mysql_charset': 'utf8', 'sqlite_autoincrement': True}
1015 1015 )
1016 1016 __mapper_args__ = {}
1017 1017
1018 1018 # ApiKey role
1019 1019 ROLE_ALL = 'token_role_all'
1020 1020 ROLE_HTTP = 'token_role_http'
1021 1021 ROLE_VCS = 'token_role_vcs'
1022 1022 ROLE_API = 'token_role_api'
1023 1023 ROLE_FEED = 'token_role_feed'
1024 1024 ROLE_PASSWORD_RESET = 'token_password_reset'
1025 1025
1026 1026 ROLES = [ROLE_ALL, ROLE_HTTP, ROLE_VCS, ROLE_API, ROLE_FEED]
1027 1027
1028 1028 user_api_key_id = Column("user_api_key_id", Integer(), nullable=False, unique=True, default=None, primary_key=True)
1029 1029 user_id = Column("user_id", Integer(), ForeignKey('users.user_id'), nullable=True, unique=None, default=None)
1030 1030 api_key = Column("api_key", String(255), nullable=False, unique=True)
1031 1031 description = Column('description', UnicodeText().with_variant(UnicodeText(1024), 'mysql'))
1032 1032 expires = Column('expires', Float(53), nullable=False)
1033 1033 role = Column('role', String(255), nullable=True)
1034 1034 created_on = Column('created_on', DateTime(timezone=False), nullable=False, default=datetime.datetime.now)
1035 1035
1036 1036 # scope columns
1037 1037 repo_id = Column(
1038 1038 'repo_id', Integer(), ForeignKey('repositories.repo_id'),
1039 1039 nullable=True, unique=None, default=None)
1040 1040 repo = relationship('Repository', lazy='joined')
1041 1041
1042 1042 repo_group_id = Column(
1043 1043 'repo_group_id', Integer(), ForeignKey('groups.group_id'),
1044 1044 nullable=True, unique=None, default=None)
1045 1045 repo_group = relationship('RepoGroup', lazy='joined')
1046 1046
1047 1047 user = relationship('User', lazy='joined')
1048 1048
1049 1049 def __unicode__(self):
1050 1050 return u"<%s('%s')>" % (self.__class__.__name__, self.role)
1051 1051
1052 1052 def __json__(self):
1053 1053 data = {
1054 1054 'auth_token': self.api_key,
1055 1055 'role': self.role,
1056 1056 'scope': self.scope_humanized,
1057 1057 'expired': self.expired
1058 1058 }
1059 1059 return data
1060 1060
1061 1061 def get_api_data(self, include_secrets=False):
1062 1062 data = self.__json__()
1063 1063 if include_secrets:
1064 1064 return data
1065 1065 else:
1066 1066 data['auth_token'] = self.token_obfuscated
1067 1067 return data
1068 1068
1069 1069 @hybrid_property
1070 1070 def description_safe(self):
1071 1071 from rhodecode.lib import helpers as h
1072 1072 return h.escape(self.description)
1073 1073
1074 1074 @property
1075 1075 def expired(self):
1076 1076 if self.expires == -1:
1077 1077 return False
1078 1078 return time.time() > self.expires
1079 1079
1080 1080 @classmethod
1081 1081 def _get_role_name(cls, role):
1082 1082 return {
1083 1083 cls.ROLE_ALL: _('all'),
1084 1084 cls.ROLE_HTTP: _('http/web interface'),
1085 1085 cls.ROLE_VCS: _('vcs (git/hg/svn protocol)'),
1086 1086 cls.ROLE_API: _('api calls'),
1087 1087 cls.ROLE_FEED: _('feed access'),
1088 1088 }.get(role, role)
1089 1089
1090 1090 @property
1091 1091 def role_humanized(self):
1092 1092 return self._get_role_name(self.role)
1093 1093
1094 1094 def _get_scope(self):
1095 1095 if self.repo:
1096 1096 return repr(self.repo)
1097 1097 if self.repo_group:
1098 1098 return repr(self.repo_group) + ' (recursive)'
1099 1099 return 'global'
1100 1100
1101 1101 @property
1102 1102 def scope_humanized(self):
1103 1103 return self._get_scope()
1104 1104
1105 1105 @property
1106 1106 def token_obfuscated(self):
1107 1107 if self.api_key:
1108 1108 return self.api_key[:4] + "****"
1109 1109
1110 1110
1111 1111 class UserEmailMap(Base, BaseModel):
1112 1112 __tablename__ = 'user_email_map'
1113 1113 __table_args__ = (
1114 1114 Index('uem_email_idx', 'email'),
1115 1115 UniqueConstraint('email'),
1116 1116 {'extend_existing': True, 'mysql_engine': 'InnoDB',
1117 1117 'mysql_charset': 'utf8', 'sqlite_autoincrement': True}
1118 1118 )
1119 1119 __mapper_args__ = {}
1120 1120
1121 1121 email_id = Column("email_id", Integer(), nullable=False, unique=True, default=None, primary_key=True)
1122 1122 user_id = Column("user_id", Integer(), ForeignKey('users.user_id'), nullable=True, unique=None, default=None)
1123 1123 _email = Column("email", String(255), nullable=True, unique=False, default=None)
1124 1124 user = relationship('User', lazy='joined')
1125 1125
1126 1126 @validates('_email')
1127 1127 def validate_email(self, key, email):
1128 1128 # check if this email is not main one
1129 1129 main_email = Session().query(User).filter(User.email == email).scalar()
1130 1130 if main_email is not None:
1131 1131 raise AttributeError('email %s is present is user table' % email)
1132 1132 return email
1133 1133
1134 1134 @hybrid_property
1135 1135 def email(self):
1136 1136 return self._email
1137 1137
1138 1138 @email.setter
1139 1139 def email(self, val):
1140 1140 self._email = val.lower() if val else None
1141 1141
1142 1142
1143 1143 class UserIpMap(Base, BaseModel):
1144 1144 __tablename__ = 'user_ip_map'
1145 1145 __table_args__ = (
1146 1146 UniqueConstraint('user_id', 'ip_addr'),
1147 1147 {'extend_existing': True, 'mysql_engine': 'InnoDB',
1148 1148 'mysql_charset': 'utf8', 'sqlite_autoincrement': True}
1149 1149 )
1150 1150 __mapper_args__ = {}
1151 1151
1152 1152 ip_id = Column("ip_id", Integer(), nullable=False, unique=True, default=None, primary_key=True)
1153 1153 user_id = Column("user_id", Integer(), ForeignKey('users.user_id'), nullable=True, unique=None, default=None)
1154 1154 ip_addr = Column("ip_addr", String(255), nullable=True, unique=False, default=None)
1155 1155 active = Column("active", Boolean(), nullable=True, unique=None, default=True)
1156 1156 description = Column("description", String(10000), nullable=True, unique=None, default=None)
1157 1157 user = relationship('User', lazy='joined')
1158 1158
1159 1159 @hybrid_property
1160 1160 def description_safe(self):
1161 1161 from rhodecode.lib import helpers as h
1162 1162 return h.escape(self.description)
1163 1163
1164 1164 @classmethod
1165 1165 def _get_ip_range(cls, ip_addr):
1166 1166 net = ipaddress.ip_network(safe_unicode(ip_addr), strict=False)
1167 1167 return [str(net.network_address), str(net.broadcast_address)]
1168 1168
1169 1169 def __json__(self):
1170 1170 return {
1171 1171 'ip_addr': self.ip_addr,
1172 1172 'ip_range': self._get_ip_range(self.ip_addr),
1173 1173 }
1174 1174
1175 1175 def __unicode__(self):
1176 1176 return u"<%s('user_id:%s=>%s')>" % (self.__class__.__name__,
1177 1177 self.user_id, self.ip_addr)
1178 1178
1179 1179
1180 1180 class UserSshKeys(Base, BaseModel):
1181 1181 __tablename__ = 'user_ssh_keys'
1182 1182 __table_args__ = (
1183 1183 Index('usk_ssh_key_fingerprint_idx', 'ssh_key_fingerprint'),
1184 1184
1185 1185 UniqueConstraint('ssh_key_fingerprint'),
1186 1186
1187 1187 {'extend_existing': True, 'mysql_engine': 'InnoDB',
1188 1188 'mysql_charset': 'utf8', 'sqlite_autoincrement': True}
1189 1189 )
1190 1190 __mapper_args__ = {}
1191 1191
1192 1192 ssh_key_id = Column('ssh_key_id', Integer(), nullable=False, unique=True, default=None, primary_key=True)
1193 1193 ssh_key_data = Column('ssh_key_data', String(10240), nullable=False, unique=None, default=None)
1194 1194 ssh_key_fingerprint = Column('ssh_key_fingerprint', String(1024), nullable=False, unique=None, default=None)
1195 1195
1196 1196 description = Column('description', UnicodeText().with_variant(UnicodeText(1024), 'mysql'))
1197 1197
1198 1198 created_on = Column('created_on', DateTime(timezone=False), nullable=False, default=datetime.datetime.now)
1199 1199 accessed_on = Column('accessed_on', DateTime(timezone=False), nullable=True, default=None)
1200 1200 user_id = Column('user_id', Integer(), ForeignKey('users.user_id'), nullable=True, unique=None, default=None)
1201 1201
1202 1202 user = relationship('User', lazy='joined')
1203 1203
1204 1204 def __json__(self):
1205 1205 data = {
1206 1206 'ssh_fingerprint': self.ssh_key_fingerprint,
1207 1207 'description': self.description,
1208 1208 'created_on': self.created_on
1209 1209 }
1210 1210 return data
1211 1211
1212 1212 def get_api_data(self):
1213 1213 data = self.__json__()
1214 1214 return data
1215 1215
1216 1216
1217 1217 class UserLog(Base, BaseModel):
1218 1218 __tablename__ = 'user_logs'
1219 1219 __table_args__ = (
1220 1220 {'extend_existing': True, 'mysql_engine': 'InnoDB',
1221 1221 'mysql_charset': 'utf8', 'sqlite_autoincrement': True},
1222 1222 )
1223 1223 VERSION_1 = 'v1'
1224 1224 VERSION_2 = 'v2'
1225 1225 VERSIONS = [VERSION_1, VERSION_2]
1226 1226
1227 1227 user_log_id = Column("user_log_id", Integer(), nullable=False, unique=True, default=None, primary_key=True)
1228 1228 user_id = Column("user_id", Integer(), ForeignKey('users.user_id'), nullable=True, unique=None, default=None)
1229 1229 username = Column("username", String(255), nullable=True, unique=None, default=None)
1230 1230 repository_id = Column("repository_id", Integer(), ForeignKey('repositories.repo_id'), nullable=True)
1231 1231 repository_name = Column("repository_name", String(255), nullable=True, unique=None, default=None)
1232 1232 user_ip = Column("user_ip", String(255), nullable=True, unique=None, default=None)
1233 1233 action = Column("action", Text().with_variant(Text(1200000), 'mysql'), nullable=True, unique=None, default=None)
1234 1234 action_date = Column("action_date", DateTime(timezone=False), nullable=True, unique=None, default=None)
1235 1235
1236 1236 version = Column("version", String(255), nullable=True, default=VERSION_1)
1237 1237 user_data = Column('user_data_json', MutationObj.as_mutable(JsonType(dialect_map=dict(mysql=LONGTEXT()))))
1238 1238 action_data = Column('action_data_json', MutationObj.as_mutable(JsonType(dialect_map=dict(mysql=LONGTEXT()))))
1239 1239
1240 1240 def __unicode__(self):
1241 1241 return u"<%s('id:%s:%s')>" % (
1242 1242 self.__class__.__name__, self.repository_name, self.action)
1243 1243
1244 1244 def __json__(self):
1245 1245 return {
1246 1246 'user_id': self.user_id,
1247 1247 'username': self.username,
1248 1248 'repository_id': self.repository_id,
1249 1249 'repository_name': self.repository_name,
1250 1250 'user_ip': self.user_ip,
1251 1251 'action_date': self.action_date,
1252 1252 'action': self.action,
1253 1253 }
1254 1254
1255 @hybrid_property
1256 def entry_id(self):
1257 return self.user_log_id
1258
1255 1259 @property
1256 1260 def action_as_day(self):
1257 1261 return datetime.date(*self.action_date.timetuple()[:3])
1258 1262
1259 1263 user = relationship('User')
1260 1264 repository = relationship('Repository', cascade='')
1261 1265
1262 1266
1263 1267 class UserGroup(Base, BaseModel):
1264 1268 __tablename__ = 'users_groups'
1265 1269 __table_args__ = (
1266 1270 {'extend_existing': True, 'mysql_engine': 'InnoDB',
1267 1271 'mysql_charset': 'utf8', 'sqlite_autoincrement': True},
1268 1272 )
1269 1273
1270 1274 users_group_id = Column("users_group_id", Integer(), nullable=False, unique=True, default=None, primary_key=True)
1271 1275 users_group_name = Column("users_group_name", String(255), nullable=False, unique=True, default=None)
1272 1276 user_group_description = Column("user_group_description", String(10000), nullable=True, unique=None, default=None)
1273 1277 users_group_active = Column("users_group_active", Boolean(), nullable=True, unique=None, default=None)
1274 1278 inherit_default_permissions = Column("users_group_inherit_default_permissions", Boolean(), nullable=False, unique=None, default=True)
1275 1279 user_id = Column("user_id", Integer(), ForeignKey('users.user_id'), nullable=False, unique=False, default=None)
1276 1280 created_on = Column('created_on', DateTime(timezone=False), nullable=False, default=datetime.datetime.now)
1277 1281 _group_data = Column("group_data", LargeBinary(), nullable=True) # JSON data
1278 1282
1279 1283 members = relationship('UserGroupMember', cascade="all, delete, delete-orphan", lazy="joined")
1280 1284 users_group_to_perm = relationship('UserGroupToPerm', cascade='all')
1281 1285 users_group_repo_to_perm = relationship('UserGroupRepoToPerm', cascade='all')
1282 1286 users_group_repo_group_to_perm = relationship('UserGroupRepoGroupToPerm', cascade='all')
1283 1287 user_user_group_to_perm = relationship('UserUserGroupToPerm', cascade='all')
1284 1288 user_group_user_group_to_perm = relationship('UserGroupUserGroupToPerm ', primaryjoin="UserGroupUserGroupToPerm.target_user_group_id==UserGroup.users_group_id", cascade='all')
1285 1289
1286 1290 user_group_review_rules = relationship('RepoReviewRuleUserGroup', cascade='all')
1287 1291 user = relationship('User', primaryjoin="User.user_id==UserGroup.user_id")
1288 1292
1289 1293 @classmethod
1290 1294 def _load_group_data(cls, column):
1291 1295 if not column:
1292 1296 return {}
1293 1297
1294 1298 try:
1295 1299 return json.loads(column) or {}
1296 1300 except TypeError:
1297 1301 return {}
1298 1302
1299 1303 @hybrid_property
1300 1304 def description_safe(self):
1301 1305 from rhodecode.lib import helpers as h
1302 1306 return h.escape(self.description)
1303 1307
1304 1308 @hybrid_property
1305 1309 def group_data(self):
1306 1310 return self._load_group_data(self._group_data)
1307 1311
1308 1312 @group_data.expression
1309 1313 def group_data(self, **kwargs):
1310 1314 return self._group_data
1311 1315
1312 1316 @group_data.setter
1313 1317 def group_data(self, val):
1314 1318 try:
1315 1319 self._group_data = json.dumps(val)
1316 1320 except Exception:
1317 1321 log.error(traceback.format_exc())
1318 1322
1319 1323 def __unicode__(self):
1320 1324 return u"<%s('id:%s:%s')>" % (self.__class__.__name__,
1321 1325 self.users_group_id,
1322 1326 self.users_group_name)
1323 1327
1324 1328 @classmethod
1325 1329 def get_by_group_name(cls, group_name, cache=False,
1326 1330 case_insensitive=False):
1327 1331 if case_insensitive:
1328 1332 q = cls.query().filter(func.lower(cls.users_group_name) ==
1329 1333 func.lower(group_name))
1330 1334
1331 1335 else:
1332 1336 q = cls.query().filter(cls.users_group_name == group_name)
1333 1337 if cache:
1334 1338 q = q.options(
1335 1339 FromCache("sql_cache_short", "get_group_%s" % _hash_key(group_name)))
1336 1340 return q.scalar()
1337 1341
1338 1342 @classmethod
1339 1343 def get(cls, user_group_id, cache=False):
1340 1344 user_group = cls.query()
1341 1345 if cache:
1342 1346 user_group = user_group.options(
1343 1347 FromCache("sql_cache_short", "get_users_group_%s" % user_group_id))
1344 1348 return user_group.get(user_group_id)
1345 1349
1346 1350 def permissions(self, with_admins=True, with_owner=True):
1347 1351 q = UserUserGroupToPerm.query().filter(UserUserGroupToPerm.user_group == self)
1348 1352 q = q.options(joinedload(UserUserGroupToPerm.user_group),
1349 1353 joinedload(UserUserGroupToPerm.user),
1350 1354 joinedload(UserUserGroupToPerm.permission),)
1351 1355
1352 1356 # get owners and admins and permissions. We do a trick of re-writing
1353 1357 # objects from sqlalchemy to named-tuples due to sqlalchemy session
1354 1358 # has a global reference and changing one object propagates to all
1355 1359 # others. This means if admin is also an owner admin_row that change
1356 1360 # would propagate to both objects
1357 1361 perm_rows = []
1358 1362 for _usr in q.all():
1359 1363 usr = AttributeDict(_usr.user.get_dict())
1360 1364 usr.permission = _usr.permission.permission_name
1361 1365 perm_rows.append(usr)
1362 1366
1363 1367 # filter the perm rows by 'default' first and then sort them by
1364 1368 # admin,write,read,none permissions sorted again alphabetically in
1365 1369 # each group
1366 1370 perm_rows = sorted(perm_rows, key=display_user_sort)
1367 1371
1368 1372 _admin_perm = 'usergroup.admin'
1369 1373 owner_row = []
1370 1374 if with_owner:
1371 1375 usr = AttributeDict(self.user.get_dict())
1372 1376 usr.owner_row = True
1373 1377 usr.permission = _admin_perm
1374 1378 owner_row.append(usr)
1375 1379
1376 1380 super_admin_rows = []
1377 1381 if with_admins:
1378 1382 for usr in User.get_all_super_admins():
1379 1383 # if this admin is also owner, don't double the record
1380 1384 if usr.user_id == owner_row[0].user_id:
1381 1385 owner_row[0].admin_row = True
1382 1386 else:
1383 1387 usr = AttributeDict(usr.get_dict())
1384 1388 usr.admin_row = True
1385 1389 usr.permission = _admin_perm
1386 1390 super_admin_rows.append(usr)
1387 1391
1388 1392 return super_admin_rows + owner_row + perm_rows
1389 1393
1390 1394 def permission_user_groups(self):
1391 1395 q = UserGroupUserGroupToPerm.query().filter(UserGroupUserGroupToPerm.target_user_group == self)
1392 1396 q = q.options(joinedload(UserGroupUserGroupToPerm.user_group),
1393 1397 joinedload(UserGroupUserGroupToPerm.target_user_group),
1394 1398 joinedload(UserGroupUserGroupToPerm.permission),)
1395 1399
1396 1400 perm_rows = []
1397 1401 for _user_group in q.all():
1398 1402 usr = AttributeDict(_user_group.user_group.get_dict())
1399 1403 usr.permission = _user_group.permission.permission_name
1400 1404 perm_rows.append(usr)
1401 1405
1402 1406 perm_rows = sorted(perm_rows, key=display_user_group_sort)
1403 1407 return perm_rows
1404 1408
1405 1409 def _get_default_perms(self, user_group, suffix=''):
1406 1410 from rhodecode.model.permission import PermissionModel
1407 1411 return PermissionModel().get_default_perms(user_group.users_group_to_perm, suffix)
1408 1412
1409 1413 def get_default_perms(self, suffix=''):
1410 1414 return self._get_default_perms(self, suffix)
1411 1415
1412 1416 def get_api_data(self, with_group_members=True, include_secrets=False):
1413 1417 """
1414 1418 :param include_secrets: See :meth:`User.get_api_data`, this parameter is
1415 1419 basically forwarded.
1416 1420
1417 1421 """
1418 1422 user_group = self
1419 1423 data = {
1420 1424 'users_group_id': user_group.users_group_id,
1421 1425 'group_name': user_group.users_group_name,
1422 1426 'group_description': user_group.user_group_description,
1423 1427 'active': user_group.users_group_active,
1424 1428 'owner': user_group.user.username,
1425 1429 'owner_email': user_group.user.email,
1426 1430 }
1427 1431
1428 1432 if with_group_members:
1429 1433 users = []
1430 1434 for user in user_group.members:
1431 1435 user = user.user
1432 1436 users.append(user.get_api_data(include_secrets=include_secrets))
1433 1437 data['users'] = users
1434 1438
1435 1439 return data
1436 1440
1437 1441
1438 1442 class UserGroupMember(Base, BaseModel):
1439 1443 __tablename__ = 'users_groups_members'
1440 1444 __table_args__ = (
1441 1445 {'extend_existing': True, 'mysql_engine': 'InnoDB',
1442 1446 'mysql_charset': 'utf8', 'sqlite_autoincrement': True},
1443 1447 )
1444 1448
1445 1449 users_group_member_id = Column("users_group_member_id", Integer(), nullable=False, unique=True, default=None, primary_key=True)
1446 1450 users_group_id = Column("users_group_id", Integer(), ForeignKey('users_groups.users_group_id'), nullable=False, unique=None, default=None)
1447 1451 user_id = Column("user_id", Integer(), ForeignKey('users.user_id'), nullable=False, unique=None, default=None)
1448 1452
1449 1453 user = relationship('User', lazy='joined')
1450 1454 users_group = relationship('UserGroup')
1451 1455
1452 1456 def __init__(self, gr_id='', u_id=''):
1453 1457 self.users_group_id = gr_id
1454 1458 self.user_id = u_id
1455 1459
1456 1460
1457 1461 class RepositoryField(Base, BaseModel):
1458 1462 __tablename__ = 'repositories_fields'
1459 1463 __table_args__ = (
1460 1464 UniqueConstraint('repository_id', 'field_key'), # no-multi field
1461 1465 {'extend_existing': True, 'mysql_engine': 'InnoDB',
1462 1466 'mysql_charset': 'utf8', 'sqlite_autoincrement': True},
1463 1467 )
1464 1468 PREFIX = 'ex_' # prefix used in form to not conflict with already existing fields
1465 1469
1466 1470 repo_field_id = Column("repo_field_id", Integer(), nullable=False, unique=True, default=None, primary_key=True)
1467 1471 repository_id = Column("repository_id", Integer(), ForeignKey('repositories.repo_id'), nullable=False, unique=None, default=None)
1468 1472 field_key = Column("field_key", String(250))
1469 1473 field_label = Column("field_label", String(1024), nullable=False)
1470 1474 field_value = Column("field_value", String(10000), nullable=False)
1471 1475 field_desc = Column("field_desc", String(1024), nullable=False)
1472 1476 field_type = Column("field_type", String(255), nullable=False, unique=None)
1473 1477 created_on = Column('created_on', DateTime(timezone=False), nullable=False, default=datetime.datetime.now)
1474 1478
1475 1479 repository = relationship('Repository')
1476 1480
1477 1481 @property
1478 1482 def field_key_prefixed(self):
1479 1483 return 'ex_%s' % self.field_key
1480 1484
1481 1485 @classmethod
1482 1486 def un_prefix_key(cls, key):
1483 1487 if key.startswith(cls.PREFIX):
1484 1488 return key[len(cls.PREFIX):]
1485 1489 return key
1486 1490
1487 1491 @classmethod
1488 1492 def get_by_key_name(cls, key, repo):
1489 1493 row = cls.query()\
1490 1494 .filter(cls.repository == repo)\
1491 1495 .filter(cls.field_key == key).scalar()
1492 1496 return row
1493 1497
1494 1498
1495 1499 class Repository(Base, BaseModel):
1496 1500 __tablename__ = 'repositories'
1497 1501 __table_args__ = (
1498 1502 Index('r_repo_name_idx', 'repo_name', mysql_length=255),
1499 1503 {'extend_existing': True, 'mysql_engine': 'InnoDB',
1500 1504 'mysql_charset': 'utf8', 'sqlite_autoincrement': True},
1501 1505 )
1502 1506 DEFAULT_CLONE_URI = '{scheme}://{user}@{netloc}/{repo}'
1503 1507 DEFAULT_CLONE_URI_ID = '{scheme}://{user}@{netloc}/_{repoid}'
1504 1508
1505 1509 STATE_CREATED = 'repo_state_created'
1506 1510 STATE_PENDING = 'repo_state_pending'
1507 1511 STATE_ERROR = 'repo_state_error'
1508 1512
1509 1513 LOCK_AUTOMATIC = 'lock_auto'
1510 1514 LOCK_API = 'lock_api'
1511 1515 LOCK_WEB = 'lock_web'
1512 1516 LOCK_PULL = 'lock_pull'
1513 1517
1514 1518 NAME_SEP = URL_SEP
1515 1519
1516 1520 repo_id = Column(
1517 1521 "repo_id", Integer(), nullable=False, unique=True, default=None,
1518 1522 primary_key=True)
1519 1523 _repo_name = Column(
1520 1524 "repo_name", Text(), nullable=False, default=None)
1521 1525 _repo_name_hash = Column(
1522 1526 "repo_name_hash", String(255), nullable=False, unique=True)
1523 1527 repo_state = Column("repo_state", String(255), nullable=True)
1524 1528
1525 1529 clone_uri = Column(
1526 1530 "clone_uri", EncryptedTextValue(), nullable=True, unique=False,
1527 1531 default=None)
1528 1532 repo_type = Column(
1529 1533 "repo_type", String(255), nullable=False, unique=False, default=None)
1530 1534 user_id = Column(
1531 1535 "user_id", Integer(), ForeignKey('users.user_id'), nullable=False,
1532 1536 unique=False, default=None)
1533 1537 private = Column(
1534 1538 "private", Boolean(), nullable=True, unique=None, default=None)
1535 1539 enable_statistics = Column(
1536 1540 "statistics", Boolean(), nullable=True, unique=None, default=True)
1537 1541 enable_downloads = Column(
1538 1542 "downloads", Boolean(), nullable=True, unique=None, default=True)
1539 1543 description = Column(
1540 1544 "description", String(10000), nullable=True, unique=None, default=None)
1541 1545 created_on = Column(
1542 1546 'created_on', DateTime(timezone=False), nullable=True, unique=None,
1543 1547 default=datetime.datetime.now)
1544 1548 updated_on = Column(
1545 1549 'updated_on', DateTime(timezone=False), nullable=True, unique=None,
1546 1550 default=datetime.datetime.now)
1547 1551 _landing_revision = Column(
1548 1552 "landing_revision", String(255), nullable=False, unique=False,
1549 1553 default=None)
1550 1554 enable_locking = Column(
1551 1555 "enable_locking", Boolean(), nullable=False, unique=None,
1552 1556 default=False)
1553 1557 _locked = Column(
1554 1558 "locked", String(255), nullable=True, unique=False, default=None)
1555 1559 _changeset_cache = Column(
1556 1560 "changeset_cache", LargeBinary(), nullable=True) # JSON data
1557 1561
1558 1562 fork_id = Column(
1559 1563 "fork_id", Integer(), ForeignKey('repositories.repo_id'),
1560 1564 nullable=True, unique=False, default=None)
1561 1565 group_id = Column(
1562 1566 "group_id", Integer(), ForeignKey('groups.group_id'), nullable=True,
1563 1567 unique=False, default=None)
1564 1568
1565 1569 user = relationship('User', lazy='joined')
1566 1570 fork = relationship('Repository', remote_side=repo_id, lazy='joined')
1567 1571 group = relationship('RepoGroup', lazy='joined')
1568 1572 repo_to_perm = relationship(
1569 1573 'UserRepoToPerm', cascade='all',
1570 1574 order_by='UserRepoToPerm.repo_to_perm_id')
1571 1575 users_group_to_perm = relationship('UserGroupRepoToPerm', cascade='all')
1572 1576 stats = relationship('Statistics', cascade='all', uselist=False)
1573 1577
1574 1578 followers = relationship(
1575 1579 'UserFollowing',
1576 1580 primaryjoin='UserFollowing.follows_repo_id==Repository.repo_id',
1577 1581 cascade='all')
1578 1582 extra_fields = relationship(
1579 1583 'RepositoryField', cascade="all, delete, delete-orphan")
1580 1584 logs = relationship('UserLog')
1581 1585 comments = relationship(
1582 1586 'ChangesetComment', cascade="all, delete, delete-orphan")
1583 1587 pull_requests_source = relationship(
1584 1588 'PullRequest',
1585 1589 primaryjoin='PullRequest.source_repo_id==Repository.repo_id',
1586 1590 cascade="all, delete, delete-orphan")
1587 1591 pull_requests_target = relationship(
1588 1592 'PullRequest',
1589 1593 primaryjoin='PullRequest.target_repo_id==Repository.repo_id',
1590 1594 cascade="all, delete, delete-orphan")
1591 1595 ui = relationship('RepoRhodeCodeUi', cascade="all")
1592 1596 settings = relationship('RepoRhodeCodeSetting', cascade="all")
1593 1597 integrations = relationship('Integration',
1594 1598 cascade="all, delete, delete-orphan")
1595 1599
1596 1600 def __unicode__(self):
1597 1601 return u"<%s('%s:%s')>" % (self.__class__.__name__, self.repo_id,
1598 1602 safe_unicode(self.repo_name))
1599 1603
1600 1604 @hybrid_property
1601 1605 def description_safe(self):
1602 1606 from rhodecode.lib import helpers as h
1603 1607 return h.escape(self.description)
1604 1608
1605 1609 @hybrid_property
1606 1610 def landing_rev(self):
1607 1611 # always should return [rev_type, rev]
1608 1612 if self._landing_revision:
1609 1613 _rev_info = self._landing_revision.split(':')
1610 1614 if len(_rev_info) < 2:
1611 1615 _rev_info.insert(0, 'rev')
1612 1616 return [_rev_info[0], _rev_info[1]]
1613 1617 return [None, None]
1614 1618
1615 1619 @landing_rev.setter
1616 1620 def landing_rev(self, val):
1617 1621 if ':' not in val:
1618 1622 raise ValueError('value must be delimited with `:` and consist '
1619 1623 'of <rev_type>:<rev>, got %s instead' % val)
1620 1624 self._landing_revision = val
1621 1625
1622 1626 @hybrid_property
1623 1627 def locked(self):
1624 1628 if self._locked:
1625 1629 user_id, timelocked, reason = self._locked.split(':')
1626 1630 lock_values = int(user_id), timelocked, reason
1627 1631 else:
1628 1632 lock_values = [None, None, None]
1629 1633 return lock_values
1630 1634
1631 1635 @locked.setter
1632 1636 def locked(self, val):
1633 1637 if val and isinstance(val, (list, tuple)):
1634 1638 self._locked = ':'.join(map(str, val))
1635 1639 else:
1636 1640 self._locked = None
1637 1641
1638 1642 @hybrid_property
1639 1643 def changeset_cache(self):
1640 1644 from rhodecode.lib.vcs.backends.base import EmptyCommit
1641 1645 dummy = EmptyCommit().__json__()
1642 1646 if not self._changeset_cache:
1643 1647 return dummy
1644 1648 try:
1645 1649 return json.loads(self._changeset_cache)
1646 1650 except TypeError:
1647 1651 return dummy
1648 1652 except Exception:
1649 1653 log.error(traceback.format_exc())
1650 1654 return dummy
1651 1655
1652 1656 @changeset_cache.setter
1653 1657 def changeset_cache(self, val):
1654 1658 try:
1655 1659 self._changeset_cache = json.dumps(val)
1656 1660 except Exception:
1657 1661 log.error(traceback.format_exc())
1658 1662
1659 1663 @hybrid_property
1660 1664 def repo_name(self):
1661 1665 return self._repo_name
1662 1666
1663 1667 @repo_name.setter
1664 1668 def repo_name(self, value):
1665 1669 self._repo_name = value
1666 1670 self._repo_name_hash = hashlib.sha1(safe_str(value)).hexdigest()
1667 1671
1668 1672 @classmethod
1669 1673 def normalize_repo_name(cls, repo_name):
1670 1674 """
1671 1675 Normalizes os specific repo_name to the format internally stored inside
1672 1676 database using URL_SEP
1673 1677
1674 1678 :param cls:
1675 1679 :param repo_name:
1676 1680 """
1677 1681 return cls.NAME_SEP.join(repo_name.split(os.sep))
1678 1682
1679 1683 @classmethod
1680 1684 def get_by_repo_name(cls, repo_name, cache=False, identity_cache=False):
1681 1685 session = Session()
1682 1686 q = session.query(cls).filter(cls.repo_name == repo_name)
1683 1687
1684 1688 if cache:
1685 1689 if identity_cache:
1686 1690 val = cls.identity_cache(session, 'repo_name', repo_name)
1687 1691 if val:
1688 1692 return val
1689 1693 else:
1690 1694 cache_key = "get_repo_by_name_%s" % _hash_key(repo_name)
1691 1695 q = q.options(
1692 1696 FromCache("sql_cache_short", cache_key))
1693 1697
1694 1698 return q.scalar()
1695 1699
1696 1700 @classmethod
1697 1701 def get_by_full_path(cls, repo_full_path):
1698 1702 repo_name = repo_full_path.split(cls.base_path(), 1)[-1]
1699 1703 repo_name = cls.normalize_repo_name(repo_name)
1700 1704 return cls.get_by_repo_name(repo_name.strip(URL_SEP))
1701 1705
1702 1706 @classmethod
1703 1707 def get_repo_forks(cls, repo_id):
1704 1708 return cls.query().filter(Repository.fork_id == repo_id)
1705 1709
1706 1710 @classmethod
1707 1711 def base_path(cls):
1708 1712 """
1709 1713 Returns base path when all repos are stored
1710 1714
1711 1715 :param cls:
1712 1716 """
1713 1717 q = Session().query(RhodeCodeUi)\
1714 1718 .filter(RhodeCodeUi.ui_key == cls.NAME_SEP)
1715 1719 q = q.options(FromCache("sql_cache_short", "repository_repo_path"))
1716 1720 return q.one().ui_value
1717 1721
1718 1722 @classmethod
1719 1723 def is_valid(cls, repo_name):
1720 1724 """
1721 1725 returns True if given repo name is a valid filesystem repository
1722 1726
1723 1727 :param cls:
1724 1728 :param repo_name:
1725 1729 """
1726 1730 from rhodecode.lib.utils import is_valid_repo
1727 1731
1728 1732 return is_valid_repo(repo_name, cls.base_path())
1729 1733
1730 1734 @classmethod
1731 1735 def get_all_repos(cls, user_id=Optional(None), group_id=Optional(None),
1732 1736 case_insensitive=True):
1733 1737 q = Repository.query()
1734 1738
1735 1739 if not isinstance(user_id, Optional):
1736 1740 q = q.filter(Repository.user_id == user_id)
1737 1741
1738 1742 if not isinstance(group_id, Optional):
1739 1743 q = q.filter(Repository.group_id == group_id)
1740 1744
1741 1745 if case_insensitive:
1742 1746 q = q.order_by(func.lower(Repository.repo_name))
1743 1747 else:
1744 1748 q = q.order_by(Repository.repo_name)
1745 1749 return q.all()
1746 1750
1747 1751 @property
1748 1752 def forks(self):
1749 1753 """
1750 1754 Return forks of this repo
1751 1755 """
1752 1756 return Repository.get_repo_forks(self.repo_id)
1753 1757
1754 1758 @property
1755 1759 def parent(self):
1756 1760 """
1757 1761 Returns fork parent
1758 1762 """
1759 1763 return self.fork
1760 1764
1761 1765 @property
1762 1766 def just_name(self):
1763 1767 return self.repo_name.split(self.NAME_SEP)[-1]
1764 1768
1765 1769 @property
1766 1770 def groups_with_parents(self):
1767 1771 groups = []
1768 1772 if self.group is None:
1769 1773 return groups
1770 1774
1771 1775 cur_gr = self.group
1772 1776 groups.insert(0, cur_gr)
1773 1777 while 1:
1774 1778 gr = getattr(cur_gr, 'parent_group', None)
1775 1779 cur_gr = cur_gr.parent_group
1776 1780 if gr is None:
1777 1781 break
1778 1782 groups.insert(0, gr)
1779 1783
1780 1784 return groups
1781 1785
1782 1786 @property
1783 1787 def groups_and_repo(self):
1784 1788 return self.groups_with_parents, self
1785 1789
1786 1790 @LazyProperty
1787 1791 def repo_path(self):
1788 1792 """
1789 1793 Returns base full path for that repository means where it actually
1790 1794 exists on a filesystem
1791 1795 """
1792 1796 q = Session().query(RhodeCodeUi).filter(
1793 1797 RhodeCodeUi.ui_key == self.NAME_SEP)
1794 1798 q = q.options(FromCache("sql_cache_short", "repository_repo_path"))
1795 1799 return q.one().ui_value
1796 1800
1797 1801 @property
1798 1802 def repo_full_path(self):
1799 1803 p = [self.repo_path]
1800 1804 # we need to split the name by / since this is how we store the
1801 1805 # names in the database, but that eventually needs to be converted
1802 1806 # into a valid system path
1803 1807 p += self.repo_name.split(self.NAME_SEP)
1804 1808 return os.path.join(*map(safe_unicode, p))
1805 1809
1806 1810 @property
1807 1811 def cache_keys(self):
1808 1812 """
1809 1813 Returns associated cache keys for that repo
1810 1814 """
1811 1815 return CacheKey.query()\
1812 1816 .filter(CacheKey.cache_args == self.repo_name)\
1813 1817 .order_by(CacheKey.cache_key)\
1814 1818 .all()
1815 1819
1816 1820 def get_new_name(self, repo_name):
1817 1821 """
1818 1822 returns new full repository name based on assigned group and new new
1819 1823
1820 1824 :param group_name:
1821 1825 """
1822 1826 path_prefix = self.group.full_path_splitted if self.group else []
1823 1827 return self.NAME_SEP.join(path_prefix + [repo_name])
1824 1828
1825 1829 @property
1826 1830 def _config(self):
1827 1831 """
1828 1832 Returns db based config object.
1829 1833 """
1830 1834 from rhodecode.lib.utils import make_db_config
1831 1835 return make_db_config(clear_session=False, repo=self)
1832 1836
1833 1837 def permissions(self, with_admins=True, with_owner=True):
1834 1838 q = UserRepoToPerm.query().filter(UserRepoToPerm.repository == self)
1835 1839 q = q.options(joinedload(UserRepoToPerm.repository),
1836 1840 joinedload(UserRepoToPerm.user),
1837 1841 joinedload(UserRepoToPerm.permission),)
1838 1842
1839 1843 # get owners and admins and permissions. We do a trick of re-writing
1840 1844 # objects from sqlalchemy to named-tuples due to sqlalchemy session
1841 1845 # has a global reference and changing one object propagates to all
1842 1846 # others. This means if admin is also an owner admin_row that change
1843 1847 # would propagate to both objects
1844 1848 perm_rows = []
1845 1849 for _usr in q.all():
1846 1850 usr = AttributeDict(_usr.user.get_dict())
1847 1851 usr.permission = _usr.permission.permission_name
1848 1852 perm_rows.append(usr)
1849 1853
1850 1854 # filter the perm rows by 'default' first and then sort them by
1851 1855 # admin,write,read,none permissions sorted again alphabetically in
1852 1856 # each group
1853 1857 perm_rows = sorted(perm_rows, key=display_user_sort)
1854 1858
1855 1859 _admin_perm = 'repository.admin'
1856 1860 owner_row = []
1857 1861 if with_owner:
1858 1862 usr = AttributeDict(self.user.get_dict())
1859 1863 usr.owner_row = True
1860 1864 usr.permission = _admin_perm
1861 1865 owner_row.append(usr)
1862 1866
1863 1867 super_admin_rows = []
1864 1868 if with_admins:
1865 1869 for usr in User.get_all_super_admins():
1866 1870 # if this admin is also owner, don't double the record
1867 1871 if usr.user_id == owner_row[0].user_id:
1868 1872 owner_row[0].admin_row = True
1869 1873 else:
1870 1874 usr = AttributeDict(usr.get_dict())
1871 1875 usr.admin_row = True
1872 1876 usr.permission = _admin_perm
1873 1877 super_admin_rows.append(usr)
1874 1878
1875 1879 return super_admin_rows + owner_row + perm_rows
1876 1880
1877 1881 def permission_user_groups(self):
1878 1882 q = UserGroupRepoToPerm.query().filter(
1879 1883 UserGroupRepoToPerm.repository == self)
1880 1884 q = q.options(joinedload(UserGroupRepoToPerm.repository),
1881 1885 joinedload(UserGroupRepoToPerm.users_group),
1882 1886 joinedload(UserGroupRepoToPerm.permission),)
1883 1887
1884 1888 perm_rows = []
1885 1889 for _user_group in q.all():
1886 1890 usr = AttributeDict(_user_group.users_group.get_dict())
1887 1891 usr.permission = _user_group.permission.permission_name
1888 1892 perm_rows.append(usr)
1889 1893
1890 1894 perm_rows = sorted(perm_rows, key=display_user_group_sort)
1891 1895 return perm_rows
1892 1896
1893 1897 def get_api_data(self, include_secrets=False):
1894 1898 """
1895 1899 Common function for generating repo api data
1896 1900
1897 1901 :param include_secrets: See :meth:`User.get_api_data`.
1898 1902
1899 1903 """
1900 1904 # TODO: mikhail: Here there is an anti-pattern, we probably need to
1901 1905 # move this methods on models level.
1902 1906 from rhodecode.model.settings import SettingsModel
1903 1907 from rhodecode.model.repo import RepoModel
1904 1908
1905 1909 repo = self
1906 1910 _user_id, _time, _reason = self.locked
1907 1911
1908 1912 data = {
1909 1913 'repo_id': repo.repo_id,
1910 1914 'repo_name': repo.repo_name,
1911 1915 'repo_type': repo.repo_type,
1912 1916 'clone_uri': repo.clone_uri or '',
1913 1917 'url': RepoModel().get_url(self),
1914 1918 'private': repo.private,
1915 1919 'created_on': repo.created_on,
1916 1920 'description': repo.description_safe,
1917 1921 'landing_rev': repo.landing_rev,
1918 1922 'owner': repo.user.username,
1919 1923 'fork_of': repo.fork.repo_name if repo.fork else None,
1920 1924 'fork_of_id': repo.fork.repo_id if repo.fork else None,
1921 1925 'enable_statistics': repo.enable_statistics,
1922 1926 'enable_locking': repo.enable_locking,
1923 1927 'enable_downloads': repo.enable_downloads,
1924 1928 'last_changeset': repo.changeset_cache,
1925 1929 'locked_by': User.get(_user_id).get_api_data(
1926 1930 include_secrets=include_secrets) if _user_id else None,
1927 1931 'locked_date': time_to_datetime(_time) if _time else None,
1928 1932 'lock_reason': _reason if _reason else None,
1929 1933 }
1930 1934
1931 1935 # TODO: mikhail: should be per-repo settings here
1932 1936 rc_config = SettingsModel().get_all_settings()
1933 1937 repository_fields = str2bool(
1934 1938 rc_config.get('rhodecode_repository_fields'))
1935 1939 if repository_fields:
1936 1940 for f in self.extra_fields:
1937 1941 data[f.field_key_prefixed] = f.field_value
1938 1942
1939 1943 return data
1940 1944
1941 1945 @classmethod
1942 1946 def lock(cls, repo, user_id, lock_time=None, lock_reason=None):
1943 1947 if not lock_time:
1944 1948 lock_time = time.time()
1945 1949 if not lock_reason:
1946 1950 lock_reason = cls.LOCK_AUTOMATIC
1947 1951 repo.locked = [user_id, lock_time, lock_reason]
1948 1952 Session().add(repo)
1949 1953 Session().commit()
1950 1954
1951 1955 @classmethod
1952 1956 def unlock(cls, repo):
1953 1957 repo.locked = None
1954 1958 Session().add(repo)
1955 1959 Session().commit()
1956 1960
1957 1961 @classmethod
1958 1962 def getlock(cls, repo):
1959 1963 return repo.locked
1960 1964
1961 1965 def is_user_lock(self, user_id):
1962 1966 if self.lock[0]:
1963 1967 lock_user_id = safe_int(self.lock[0])
1964 1968 user_id = safe_int(user_id)
1965 1969 # both are ints, and they are equal
1966 1970 return all([lock_user_id, user_id]) and lock_user_id == user_id
1967 1971
1968 1972 return False
1969 1973
1970 1974 def get_locking_state(self, action, user_id, only_when_enabled=True):
1971 1975 """
1972 1976 Checks locking on this repository, if locking is enabled and lock is
1973 1977 present returns a tuple of make_lock, locked, locked_by.
1974 1978 make_lock can have 3 states None (do nothing) True, make lock
1975 1979 False release lock, This value is later propagated to hooks, which
1976 1980 do the locking. Think about this as signals passed to hooks what to do.
1977 1981
1978 1982 """
1979 1983 # TODO: johbo: This is part of the business logic and should be moved
1980 1984 # into the RepositoryModel.
1981 1985
1982 1986 if action not in ('push', 'pull'):
1983 1987 raise ValueError("Invalid action value: %s" % repr(action))
1984 1988
1985 1989 # defines if locked error should be thrown to user
1986 1990 currently_locked = False
1987 1991 # defines if new lock should be made, tri-state
1988 1992 make_lock = None
1989 1993 repo = self
1990 1994 user = User.get(user_id)
1991 1995
1992 1996 lock_info = repo.locked
1993 1997
1994 1998 if repo and (repo.enable_locking or not only_when_enabled):
1995 1999 if action == 'push':
1996 2000 # check if it's already locked !, if it is compare users
1997 2001 locked_by_user_id = lock_info[0]
1998 2002 if user.user_id == locked_by_user_id:
1999 2003 log.debug(
2000 2004 'Got `push` action from user %s, now unlocking', user)
2001 2005 # unlock if we have push from user who locked
2002 2006 make_lock = False
2003 2007 else:
2004 2008 # we're not the same user who locked, ban with
2005 2009 # code defined in settings (default is 423 HTTP Locked) !
2006 2010 log.debug('Repo %s is currently locked by %s', repo, user)
2007 2011 currently_locked = True
2008 2012 elif action == 'pull':
2009 2013 # [0] user [1] date
2010 2014 if lock_info[0] and lock_info[1]:
2011 2015 log.debug('Repo %s is currently locked by %s', repo, user)
2012 2016 currently_locked = True
2013 2017 else:
2014 2018 log.debug('Setting lock on repo %s by %s', repo, user)
2015 2019 make_lock = True
2016 2020
2017 2021 else:
2018 2022 log.debug('Repository %s do not have locking enabled', repo)
2019 2023
2020 2024 log.debug('FINAL locking values make_lock:%s,locked:%s,locked_by:%s',
2021 2025 make_lock, currently_locked, lock_info)
2022 2026
2023 2027 from rhodecode.lib.auth import HasRepoPermissionAny
2024 2028 perm_check = HasRepoPermissionAny('repository.write', 'repository.admin')
2025 2029 if make_lock and not perm_check(repo_name=repo.repo_name, user=user):
2026 2030 # if we don't have at least write permission we cannot make a lock
2027 2031 log.debug('lock state reset back to FALSE due to lack '
2028 2032 'of at least read permission')
2029 2033 make_lock = False
2030 2034
2031 2035 return make_lock, currently_locked, lock_info
2032 2036
2033 2037 @property
2034 2038 def last_db_change(self):
2035 2039 return self.updated_on
2036 2040
2037 2041 @property
2038 2042 def clone_uri_hidden(self):
2039 2043 clone_uri = self.clone_uri
2040 2044 if clone_uri:
2041 2045 import urlobject
2042 2046 url_obj = urlobject.URLObject(cleaned_uri(clone_uri))
2043 2047 if url_obj.password:
2044 2048 clone_uri = url_obj.with_password('*****')
2045 2049 return clone_uri
2046 2050
2047 2051 def clone_url(self, **override):
2048 2052 from rhodecode.model.settings import SettingsModel
2049 2053
2050 2054 uri_tmpl = None
2051 2055 if 'with_id' in override:
2052 2056 uri_tmpl = self.DEFAULT_CLONE_URI_ID
2053 2057 del override['with_id']
2054 2058
2055 2059 if 'uri_tmpl' in override:
2056 2060 uri_tmpl = override['uri_tmpl']
2057 2061 del override['uri_tmpl']
2058 2062
2059 2063 # we didn't override our tmpl from **overrides
2060 2064 if not uri_tmpl:
2061 2065 rc_config = SettingsModel().get_all_settings(cache=True)
2062 2066 uri_tmpl = rc_config.get(
2063 2067 'rhodecode_clone_uri_tmpl') or self.DEFAULT_CLONE_URI
2064 2068
2065 2069 request = get_current_request()
2066 2070 return get_clone_url(request=request,
2067 2071 uri_tmpl=uri_tmpl,
2068 2072 repo_name=self.repo_name,
2069 2073 repo_id=self.repo_id, **override)
2070 2074
2071 2075 def set_state(self, state):
2072 2076 self.repo_state = state
2073 2077 Session().add(self)
2074 2078 #==========================================================================
2075 2079 # SCM PROPERTIES
2076 2080 #==========================================================================
2077 2081
2078 2082 def get_commit(self, commit_id=None, commit_idx=None, pre_load=None):
2079 2083 return get_commit_safe(
2080 2084 self.scm_instance(), commit_id, commit_idx, pre_load=pre_load)
2081 2085
2082 2086 def get_changeset(self, rev=None, pre_load=None):
2083 2087 warnings.warn("Use get_commit", DeprecationWarning)
2084 2088 commit_id = None
2085 2089 commit_idx = None
2086 2090 if isinstance(rev, basestring):
2087 2091 commit_id = rev
2088 2092 else:
2089 2093 commit_idx = rev
2090 2094 return self.get_commit(commit_id=commit_id, commit_idx=commit_idx,
2091 2095 pre_load=pre_load)
2092 2096
2093 2097 def get_landing_commit(self):
2094 2098 """
2095 2099 Returns landing commit, or if that doesn't exist returns the tip
2096 2100 """
2097 2101 _rev_type, _rev = self.landing_rev
2098 2102 commit = self.get_commit(_rev)
2099 2103 if isinstance(commit, EmptyCommit):
2100 2104 return self.get_commit()
2101 2105 return commit
2102 2106
2103 2107 def update_commit_cache(self, cs_cache=None, config=None):
2104 2108 """
2105 2109 Update cache of last changeset for repository, keys should be::
2106 2110
2107 2111 short_id
2108 2112 raw_id
2109 2113 revision
2110 2114 parents
2111 2115 message
2112 2116 date
2113 2117 author
2114 2118
2115 2119 :param cs_cache:
2116 2120 """
2117 2121 from rhodecode.lib.vcs.backends.base import BaseChangeset
2118 2122 if cs_cache is None:
2119 2123 # use no-cache version here
2120 2124 scm_repo = self.scm_instance(cache=False, config=config)
2121 2125 if scm_repo:
2122 2126 cs_cache = scm_repo.get_commit(
2123 2127 pre_load=["author", "date", "message", "parents"])
2124 2128 else:
2125 2129 cs_cache = EmptyCommit()
2126 2130
2127 2131 if isinstance(cs_cache, BaseChangeset):
2128 2132 cs_cache = cs_cache.__json__()
2129 2133
2130 2134 def is_outdated(new_cs_cache):
2131 2135 if (new_cs_cache['raw_id'] != self.changeset_cache['raw_id'] or
2132 2136 new_cs_cache['revision'] != self.changeset_cache['revision']):
2133 2137 return True
2134 2138 return False
2135 2139
2136 2140 # check if we have maybe already latest cached revision
2137 2141 if is_outdated(cs_cache) or not self.changeset_cache:
2138 2142 _default = datetime.datetime.fromtimestamp(0)
2139 2143 last_change = cs_cache.get('date') or _default
2140 2144 log.debug('updated repo %s with new cs cache %s',
2141 2145 self.repo_name, cs_cache)
2142 2146 self.updated_on = last_change
2143 2147 self.changeset_cache = cs_cache
2144 2148 Session().add(self)
2145 2149 Session().commit()
2146 2150 else:
2147 2151 log.debug('Skipping update_commit_cache for repo:`%s` '
2148 2152 'commit already with latest changes', self.repo_name)
2149 2153
2150 2154 @property
2151 2155 def tip(self):
2152 2156 return self.get_commit('tip')
2153 2157
2154 2158 @property
2155 2159 def author(self):
2156 2160 return self.tip.author
2157 2161
2158 2162 @property
2159 2163 def last_change(self):
2160 2164 return self.scm_instance().last_change
2161 2165
2162 2166 def get_comments(self, revisions=None):
2163 2167 """
2164 2168 Returns comments for this repository grouped by revisions
2165 2169
2166 2170 :param revisions: filter query by revisions only
2167 2171 """
2168 2172 cmts = ChangesetComment.query()\
2169 2173 .filter(ChangesetComment.repo == self)
2170 2174 if revisions:
2171 2175 cmts = cmts.filter(ChangesetComment.revision.in_(revisions))
2172 2176 grouped = collections.defaultdict(list)
2173 2177 for cmt in cmts.all():
2174 2178 grouped[cmt.revision].append(cmt)
2175 2179 return grouped
2176 2180
2177 2181 def statuses(self, revisions=None):
2178 2182 """
2179 2183 Returns statuses for this repository
2180 2184
2181 2185 :param revisions: list of revisions to get statuses for
2182 2186 """
2183 2187 statuses = ChangesetStatus.query()\
2184 2188 .filter(ChangesetStatus.repo == self)\
2185 2189 .filter(ChangesetStatus.version == 0)
2186 2190
2187 2191 if revisions:
2188 2192 # Try doing the filtering in chunks to avoid hitting limits
2189 2193 size = 500
2190 2194 status_results = []
2191 2195 for chunk in xrange(0, len(revisions), size):
2192 2196 status_results += statuses.filter(
2193 2197 ChangesetStatus.revision.in_(
2194 2198 revisions[chunk: chunk+size])
2195 2199 ).all()
2196 2200 else:
2197 2201 status_results = statuses.all()
2198 2202
2199 2203 grouped = {}
2200 2204
2201 2205 # maybe we have open new pullrequest without a status?
2202 2206 stat = ChangesetStatus.STATUS_UNDER_REVIEW
2203 2207 status_lbl = ChangesetStatus.get_status_lbl(stat)
2204 2208 for pr in PullRequest.query().filter(PullRequest.source_repo == self).all():
2205 2209 for rev in pr.revisions:
2206 2210 pr_id = pr.pull_request_id
2207 2211 pr_repo = pr.target_repo.repo_name
2208 2212 grouped[rev] = [stat, status_lbl, pr_id, pr_repo]
2209 2213
2210 2214 for stat in status_results:
2211 2215 pr_id = pr_repo = None
2212 2216 if stat.pull_request:
2213 2217 pr_id = stat.pull_request.pull_request_id
2214 2218 pr_repo = stat.pull_request.target_repo.repo_name
2215 2219 grouped[stat.revision] = [str(stat.status), stat.status_lbl,
2216 2220 pr_id, pr_repo]
2217 2221 return grouped
2218 2222
2219 2223 # ==========================================================================
2220 2224 # SCM CACHE INSTANCE
2221 2225 # ==========================================================================
2222 2226
2223 2227 def scm_instance(self, **kwargs):
2224 2228 import rhodecode
2225 2229
2226 2230 # Passing a config will not hit the cache currently only used
2227 2231 # for repo2dbmapper
2228 2232 config = kwargs.pop('config', None)
2229 2233 cache = kwargs.pop('cache', None)
2230 2234 full_cache = str2bool(rhodecode.CONFIG.get('vcs_full_cache'))
2231 2235 # if cache is NOT defined use default global, else we have a full
2232 2236 # control over cache behaviour
2233 2237 if cache is None and full_cache and not config:
2234 2238 return self._get_instance_cached()
2235 2239 return self._get_instance(cache=bool(cache), config=config)
2236 2240
2237 2241 def _get_instance_cached(self):
2238 2242 @cache_region('long_term')
2239 2243 def _get_repo(cache_key):
2240 2244 return self._get_instance()
2241 2245
2242 2246 invalidator_context = CacheKey.repo_context_cache(
2243 2247 _get_repo, self.repo_name, None, thread_scoped=True)
2244 2248
2245 2249 with invalidator_context as context:
2246 2250 context.invalidate()
2247 2251 repo = context.compute()
2248 2252
2249 2253 return repo
2250 2254
2251 2255 def _get_instance(self, cache=True, config=None):
2252 2256 config = config or self._config
2253 2257 custom_wire = {
2254 2258 'cache': cache # controls the vcs.remote cache
2255 2259 }
2256 2260 repo = get_vcs_instance(
2257 2261 repo_path=safe_str(self.repo_full_path),
2258 2262 config=config,
2259 2263 with_wire=custom_wire,
2260 2264 create=False,
2261 2265 _vcs_alias=self.repo_type)
2262 2266
2263 2267 return repo
2264 2268
2265 2269 def __json__(self):
2266 2270 return {'landing_rev': self.landing_rev}
2267 2271
2268 2272 def get_dict(self):
2269 2273
2270 2274 # Since we transformed `repo_name` to a hybrid property, we need to
2271 2275 # keep compatibility with the code which uses `repo_name` field.
2272 2276
2273 2277 result = super(Repository, self).get_dict()
2274 2278 result['repo_name'] = result.pop('_repo_name', None)
2275 2279 return result
2276 2280
2277 2281
2278 2282 class RepoGroup(Base, BaseModel):
2279 2283 __tablename__ = 'groups'
2280 2284 __table_args__ = (
2281 2285 UniqueConstraint('group_name', 'group_parent_id'),
2282 2286 CheckConstraint('group_id != group_parent_id'),
2283 2287 {'extend_existing': True, 'mysql_engine': 'InnoDB',
2284 2288 'mysql_charset': 'utf8', 'sqlite_autoincrement': True},
2285 2289 )
2286 2290 __mapper_args__ = {'order_by': 'group_name'}
2287 2291
2288 2292 CHOICES_SEPARATOR = '/' # used to generate select2 choices for nested groups
2289 2293
2290 2294 group_id = Column("group_id", Integer(), nullable=False, unique=True, default=None, primary_key=True)
2291 2295 group_name = Column("group_name", String(255), nullable=False, unique=True, default=None)
2292 2296 group_parent_id = Column("group_parent_id", Integer(), ForeignKey('groups.group_id'), nullable=True, unique=None, default=None)
2293 2297 group_description = Column("group_description", String(10000), nullable=True, unique=None, default=None)
2294 2298 enable_locking = Column("enable_locking", Boolean(), nullable=False, unique=None, default=False)
2295 2299 user_id = Column("user_id", Integer(), ForeignKey('users.user_id'), nullable=False, unique=False, default=None)
2296 2300 created_on = Column('created_on', DateTime(timezone=False), nullable=False, default=datetime.datetime.now)
2297 2301 updated_on = Column('updated_on', DateTime(timezone=False), nullable=True, unique=None, default=datetime.datetime.now)
2298 2302 personal = Column('personal', Boolean(), nullable=True, unique=None, default=None)
2299 2303
2300 2304 repo_group_to_perm = relationship('UserRepoGroupToPerm', cascade='all', order_by='UserRepoGroupToPerm.group_to_perm_id')
2301 2305 users_group_to_perm = relationship('UserGroupRepoGroupToPerm', cascade='all')
2302 2306 parent_group = relationship('RepoGroup', remote_side=group_id)
2303 2307 user = relationship('User')
2304 2308 integrations = relationship('Integration',
2305 2309 cascade="all, delete, delete-orphan")
2306 2310
2307 2311 def __init__(self, group_name='', parent_group=None):
2308 2312 self.group_name = group_name
2309 2313 self.parent_group = parent_group
2310 2314
2311 2315 def __unicode__(self):
2312 2316 return u"<%s('id:%s:%s')>" % (
2313 2317 self.__class__.__name__, self.group_id, self.group_name)
2314 2318
2315 2319 @hybrid_property
2316 2320 def description_safe(self):
2317 2321 from rhodecode.lib import helpers as h
2318 2322 return h.escape(self.group_description)
2319 2323
2320 2324 @classmethod
2321 2325 def _generate_choice(cls, repo_group):
2322 2326 from webhelpers.html import literal as _literal
2323 2327 _name = lambda k: _literal(cls.CHOICES_SEPARATOR.join(k))
2324 2328 return repo_group.group_id, _name(repo_group.full_path_splitted)
2325 2329
2326 2330 @classmethod
2327 2331 def groups_choices(cls, groups=None, show_empty_group=True):
2328 2332 if not groups:
2329 2333 groups = cls.query().all()
2330 2334
2331 2335 repo_groups = []
2332 2336 if show_empty_group:
2333 2337 repo_groups = [(-1, u'-- %s --' % _('No parent'))]
2334 2338
2335 2339 repo_groups.extend([cls._generate_choice(x) for x in groups])
2336 2340
2337 2341 repo_groups = sorted(
2338 2342 repo_groups, key=lambda t: t[1].split(cls.CHOICES_SEPARATOR)[0])
2339 2343 return repo_groups
2340 2344
2341 2345 @classmethod
2342 2346 def url_sep(cls):
2343 2347 return URL_SEP
2344 2348
2345 2349 @classmethod
2346 2350 def get_by_group_name(cls, group_name, cache=False, case_insensitive=False):
2347 2351 if case_insensitive:
2348 2352 gr = cls.query().filter(func.lower(cls.group_name)
2349 2353 == func.lower(group_name))
2350 2354 else:
2351 2355 gr = cls.query().filter(cls.group_name == group_name)
2352 2356 if cache:
2353 2357 name_key = _hash_key(group_name)
2354 2358 gr = gr.options(
2355 2359 FromCache("sql_cache_short", "get_group_%s" % name_key))
2356 2360 return gr.scalar()
2357 2361
2358 2362 @classmethod
2359 2363 def get_user_personal_repo_group(cls, user_id):
2360 2364 user = User.get(user_id)
2361 2365 if user.username == User.DEFAULT_USER:
2362 2366 return None
2363 2367
2364 2368 return cls.query()\
2365 2369 .filter(cls.personal == true()) \
2366 2370 .filter(cls.user == user).scalar()
2367 2371
2368 2372 @classmethod
2369 2373 def get_all_repo_groups(cls, user_id=Optional(None), group_id=Optional(None),
2370 2374 case_insensitive=True):
2371 2375 q = RepoGroup.query()
2372 2376
2373 2377 if not isinstance(user_id, Optional):
2374 2378 q = q.filter(RepoGroup.user_id == user_id)
2375 2379
2376 2380 if not isinstance(group_id, Optional):
2377 2381 q = q.filter(RepoGroup.group_parent_id == group_id)
2378 2382
2379 2383 if case_insensitive:
2380 2384 q = q.order_by(func.lower(RepoGroup.group_name))
2381 2385 else:
2382 2386 q = q.order_by(RepoGroup.group_name)
2383 2387 return q.all()
2384 2388
2385 2389 @property
2386 2390 def parents(self):
2387 2391 parents_recursion_limit = 10
2388 2392 groups = []
2389 2393 if self.parent_group is None:
2390 2394 return groups
2391 2395 cur_gr = self.parent_group
2392 2396 groups.insert(0, cur_gr)
2393 2397 cnt = 0
2394 2398 while 1:
2395 2399 cnt += 1
2396 2400 gr = getattr(cur_gr, 'parent_group', None)
2397 2401 cur_gr = cur_gr.parent_group
2398 2402 if gr is None:
2399 2403 break
2400 2404 if cnt == parents_recursion_limit:
2401 2405 # this will prevent accidental infinit loops
2402 2406 log.error(('more than %s parents found for group %s, stopping '
2403 2407 'recursive parent fetching' % (parents_recursion_limit, self)))
2404 2408 break
2405 2409
2406 2410 groups.insert(0, gr)
2407 2411 return groups
2408 2412
2409 2413 @property
2410 2414 def last_db_change(self):
2411 2415 return self.updated_on
2412 2416
2413 2417 @property
2414 2418 def children(self):
2415 2419 return RepoGroup.query().filter(RepoGroup.parent_group == self)
2416 2420
2417 2421 @property
2418 2422 def name(self):
2419 2423 return self.group_name.split(RepoGroup.url_sep())[-1]
2420 2424
2421 2425 @property
2422 2426 def full_path(self):
2423 2427 return self.group_name
2424 2428
2425 2429 @property
2426 2430 def full_path_splitted(self):
2427 2431 return self.group_name.split(RepoGroup.url_sep())
2428 2432
2429 2433 @property
2430 2434 def repositories(self):
2431 2435 return Repository.query()\
2432 2436 .filter(Repository.group == self)\
2433 2437 .order_by(Repository.repo_name)
2434 2438
2435 2439 @property
2436 2440 def repositories_recursive_count(self):
2437 2441 cnt = self.repositories.count()
2438 2442
2439 2443 def children_count(group):
2440 2444 cnt = 0
2441 2445 for child in group.children:
2442 2446 cnt += child.repositories.count()
2443 2447 cnt += children_count(child)
2444 2448 return cnt
2445 2449
2446 2450 return cnt + children_count(self)
2447 2451
2448 2452 def _recursive_objects(self, include_repos=True):
2449 2453 all_ = []
2450 2454
2451 2455 def _get_members(root_gr):
2452 2456 if include_repos:
2453 2457 for r in root_gr.repositories:
2454 2458 all_.append(r)
2455 2459 childs = root_gr.children.all()
2456 2460 if childs:
2457 2461 for gr in childs:
2458 2462 all_.append(gr)
2459 2463 _get_members(gr)
2460 2464
2461 2465 _get_members(self)
2462 2466 return [self] + all_
2463 2467
2464 2468 def recursive_groups_and_repos(self):
2465 2469 """
2466 2470 Recursive return all groups, with repositories in those groups
2467 2471 """
2468 2472 return self._recursive_objects()
2469 2473
2470 2474 def recursive_groups(self):
2471 2475 """
2472 2476 Returns all children groups for this group including children of children
2473 2477 """
2474 2478 return self._recursive_objects(include_repos=False)
2475 2479
2476 2480 def get_new_name(self, group_name):
2477 2481 """
2478 2482 returns new full group name based on parent and new name
2479 2483
2480 2484 :param group_name:
2481 2485 """
2482 2486 path_prefix = (self.parent_group.full_path_splitted if
2483 2487 self.parent_group else [])
2484 2488 return RepoGroup.url_sep().join(path_prefix + [group_name])
2485 2489
2486 2490 def permissions(self, with_admins=True, with_owner=True):
2487 2491 q = UserRepoGroupToPerm.query().filter(UserRepoGroupToPerm.group == self)
2488 2492 q = q.options(joinedload(UserRepoGroupToPerm.group),
2489 2493 joinedload(UserRepoGroupToPerm.user),
2490 2494 joinedload(UserRepoGroupToPerm.permission),)
2491 2495
2492 2496 # get owners and admins and permissions. We do a trick of re-writing
2493 2497 # objects from sqlalchemy to named-tuples due to sqlalchemy session
2494 2498 # has a global reference and changing one object propagates to all
2495 2499 # others. This means if admin is also an owner admin_row that change
2496 2500 # would propagate to both objects
2497 2501 perm_rows = []
2498 2502 for _usr in q.all():
2499 2503 usr = AttributeDict(_usr.user.get_dict())
2500 2504 usr.permission = _usr.permission.permission_name
2501 2505 perm_rows.append(usr)
2502 2506
2503 2507 # filter the perm rows by 'default' first and then sort them by
2504 2508 # admin,write,read,none permissions sorted again alphabetically in
2505 2509 # each group
2506 2510 perm_rows = sorted(perm_rows, key=display_user_sort)
2507 2511
2508 2512 _admin_perm = 'group.admin'
2509 2513 owner_row = []
2510 2514 if with_owner:
2511 2515 usr = AttributeDict(self.user.get_dict())
2512 2516 usr.owner_row = True
2513 2517 usr.permission = _admin_perm
2514 2518 owner_row.append(usr)
2515 2519
2516 2520 super_admin_rows = []
2517 2521 if with_admins:
2518 2522 for usr in User.get_all_super_admins():
2519 2523 # if this admin is also owner, don't double the record
2520 2524 if usr.user_id == owner_row[0].user_id:
2521 2525 owner_row[0].admin_row = True
2522 2526 else:
2523 2527 usr = AttributeDict(usr.get_dict())
2524 2528 usr.admin_row = True
2525 2529 usr.permission = _admin_perm
2526 2530 super_admin_rows.append(usr)
2527 2531
2528 2532 return super_admin_rows + owner_row + perm_rows
2529 2533
2530 2534 def permission_user_groups(self):
2531 2535 q = UserGroupRepoGroupToPerm.query().filter(UserGroupRepoGroupToPerm.group == self)
2532 2536 q = q.options(joinedload(UserGroupRepoGroupToPerm.group),
2533 2537 joinedload(UserGroupRepoGroupToPerm.users_group),
2534 2538 joinedload(UserGroupRepoGroupToPerm.permission),)
2535 2539
2536 2540 perm_rows = []
2537 2541 for _user_group in q.all():
2538 2542 usr = AttributeDict(_user_group.users_group.get_dict())
2539 2543 usr.permission = _user_group.permission.permission_name
2540 2544 perm_rows.append(usr)
2541 2545
2542 2546 perm_rows = sorted(perm_rows, key=display_user_group_sort)
2543 2547 return perm_rows
2544 2548
2545 2549 def get_api_data(self):
2546 2550 """
2547 2551 Common function for generating api data
2548 2552
2549 2553 """
2550 2554 group = self
2551 2555 data = {
2552 2556 'group_id': group.group_id,
2553 2557 'group_name': group.group_name,
2554 2558 'group_description': group.description_safe,
2555 2559 'parent_group': group.parent_group.group_name if group.parent_group else None,
2556 2560 'repositories': [x.repo_name for x in group.repositories],
2557 2561 'owner': group.user.username,
2558 2562 }
2559 2563 return data
2560 2564
2561 2565
2562 2566 class Permission(Base, BaseModel):
2563 2567 __tablename__ = 'permissions'
2564 2568 __table_args__ = (
2565 2569 Index('p_perm_name_idx', 'permission_name'),
2566 2570 {'extend_existing': True, 'mysql_engine': 'InnoDB',
2567 2571 'mysql_charset': 'utf8', 'sqlite_autoincrement': True},
2568 2572 )
2569 2573 PERMS = [
2570 2574 ('hg.admin', _('RhodeCode Super Administrator')),
2571 2575
2572 2576 ('repository.none', _('Repository no access')),
2573 2577 ('repository.read', _('Repository read access')),
2574 2578 ('repository.write', _('Repository write access')),
2575 2579 ('repository.admin', _('Repository admin access')),
2576 2580
2577 2581 ('group.none', _('Repository group no access')),
2578 2582 ('group.read', _('Repository group read access')),
2579 2583 ('group.write', _('Repository group write access')),
2580 2584 ('group.admin', _('Repository group admin access')),
2581 2585
2582 2586 ('usergroup.none', _('User group no access')),
2583 2587 ('usergroup.read', _('User group read access')),
2584 2588 ('usergroup.write', _('User group write access')),
2585 2589 ('usergroup.admin', _('User group admin access')),
2586 2590
2587 2591 ('hg.repogroup.create.false', _('Repository Group creation disabled')),
2588 2592 ('hg.repogroup.create.true', _('Repository Group creation enabled')),
2589 2593
2590 2594 ('hg.usergroup.create.false', _('User Group creation disabled')),
2591 2595 ('hg.usergroup.create.true', _('User Group creation enabled')),
2592 2596
2593 2597 ('hg.create.none', _('Repository creation disabled')),
2594 2598 ('hg.create.repository', _('Repository creation enabled')),
2595 2599 ('hg.create.write_on_repogroup.true', _('Repository creation enabled with write permission to a repository group')),
2596 2600 ('hg.create.write_on_repogroup.false', _('Repository creation disabled with write permission to a repository group')),
2597 2601
2598 2602 ('hg.fork.none', _('Repository forking disabled')),
2599 2603 ('hg.fork.repository', _('Repository forking enabled')),
2600 2604
2601 2605 ('hg.register.none', _('Registration disabled')),
2602 2606 ('hg.register.manual_activate', _('User Registration with manual account activation')),
2603 2607 ('hg.register.auto_activate', _('User Registration with automatic account activation')),
2604 2608
2605 2609 ('hg.password_reset.enabled', _('Password reset enabled')),
2606 2610 ('hg.password_reset.hidden', _('Password reset hidden')),
2607 2611 ('hg.password_reset.disabled', _('Password reset disabled')),
2608 2612
2609 2613 ('hg.extern_activate.manual', _('Manual activation of external account')),
2610 2614 ('hg.extern_activate.auto', _('Automatic activation of external account')),
2611 2615
2612 2616 ('hg.inherit_default_perms.false', _('Inherit object permissions from default user disabled')),
2613 2617 ('hg.inherit_default_perms.true', _('Inherit object permissions from default user enabled')),
2614 2618 ]
2615 2619
2616 2620 # definition of system default permissions for DEFAULT user
2617 2621 DEFAULT_USER_PERMISSIONS = [
2618 2622 'repository.read',
2619 2623 'group.read',
2620 2624 'usergroup.read',
2621 2625 'hg.create.repository',
2622 2626 'hg.repogroup.create.false',
2623 2627 'hg.usergroup.create.false',
2624 2628 'hg.create.write_on_repogroup.true',
2625 2629 'hg.fork.repository',
2626 2630 'hg.register.manual_activate',
2627 2631 'hg.password_reset.enabled',
2628 2632 'hg.extern_activate.auto',
2629 2633 'hg.inherit_default_perms.true',
2630 2634 ]
2631 2635
2632 2636 # defines which permissions are more important higher the more important
2633 2637 # Weight defines which permissions are more important.
2634 2638 # The higher number the more important.
2635 2639 PERM_WEIGHTS = {
2636 2640 'repository.none': 0,
2637 2641 'repository.read': 1,
2638 2642 'repository.write': 3,
2639 2643 'repository.admin': 4,
2640 2644
2641 2645 'group.none': 0,
2642 2646 'group.read': 1,
2643 2647 'group.write': 3,
2644 2648 'group.admin': 4,
2645 2649
2646 2650 'usergroup.none': 0,
2647 2651 'usergroup.read': 1,
2648 2652 'usergroup.write': 3,
2649 2653 'usergroup.admin': 4,
2650 2654
2651 2655 'hg.repogroup.create.false': 0,
2652 2656 'hg.repogroup.create.true': 1,
2653 2657
2654 2658 'hg.usergroup.create.false': 0,
2655 2659 'hg.usergroup.create.true': 1,
2656 2660
2657 2661 'hg.fork.none': 0,
2658 2662 'hg.fork.repository': 1,
2659 2663 'hg.create.none': 0,
2660 2664 'hg.create.repository': 1
2661 2665 }
2662 2666
2663 2667 permission_id = Column("permission_id", Integer(), nullable=False, unique=True, default=None, primary_key=True)
2664 2668 permission_name = Column("permission_name", String(255), nullable=True, unique=None, default=None)
2665 2669 permission_longname = Column("permission_longname", String(255), nullable=True, unique=None, default=None)
2666 2670
2667 2671 def __unicode__(self):
2668 2672 return u"<%s('%s:%s')>" % (
2669 2673 self.__class__.__name__, self.permission_id, self.permission_name
2670 2674 )
2671 2675
2672 2676 @classmethod
2673 2677 def get_by_key(cls, key):
2674 2678 return cls.query().filter(cls.permission_name == key).scalar()
2675 2679
2676 2680 @classmethod
2677 2681 def get_default_repo_perms(cls, user_id, repo_id=None):
2678 2682 q = Session().query(UserRepoToPerm, Repository, Permission)\
2679 2683 .join((Permission, UserRepoToPerm.permission_id == Permission.permission_id))\
2680 2684 .join((Repository, UserRepoToPerm.repository_id == Repository.repo_id))\
2681 2685 .filter(UserRepoToPerm.user_id == user_id)
2682 2686 if repo_id:
2683 2687 q = q.filter(UserRepoToPerm.repository_id == repo_id)
2684 2688 return q.all()
2685 2689
2686 2690 @classmethod
2687 2691 def get_default_repo_perms_from_user_group(cls, user_id, repo_id=None):
2688 2692 q = Session().query(UserGroupRepoToPerm, Repository, Permission)\
2689 2693 .join(
2690 2694 Permission,
2691 2695 UserGroupRepoToPerm.permission_id == Permission.permission_id)\
2692 2696 .join(
2693 2697 Repository,
2694 2698 UserGroupRepoToPerm.repository_id == Repository.repo_id)\
2695 2699 .join(
2696 2700 UserGroup,
2697 2701 UserGroupRepoToPerm.users_group_id ==
2698 2702 UserGroup.users_group_id)\
2699 2703 .join(
2700 2704 UserGroupMember,
2701 2705 UserGroupRepoToPerm.users_group_id ==
2702 2706 UserGroupMember.users_group_id)\
2703 2707 .filter(
2704 2708 UserGroupMember.user_id == user_id,
2705 2709 UserGroup.users_group_active == true())
2706 2710 if repo_id:
2707 2711 q = q.filter(UserGroupRepoToPerm.repository_id == repo_id)
2708 2712 return q.all()
2709 2713
2710 2714 @classmethod
2711 2715 def get_default_group_perms(cls, user_id, repo_group_id=None):
2712 2716 q = Session().query(UserRepoGroupToPerm, RepoGroup, Permission)\
2713 2717 .join((Permission, UserRepoGroupToPerm.permission_id == Permission.permission_id))\
2714 2718 .join((RepoGroup, UserRepoGroupToPerm.group_id == RepoGroup.group_id))\
2715 2719 .filter(UserRepoGroupToPerm.user_id == user_id)
2716 2720 if repo_group_id:
2717 2721 q = q.filter(UserRepoGroupToPerm.group_id == repo_group_id)
2718 2722 return q.all()
2719 2723
2720 2724 @classmethod
2721 2725 def get_default_group_perms_from_user_group(
2722 2726 cls, user_id, repo_group_id=None):
2723 2727 q = Session().query(UserGroupRepoGroupToPerm, RepoGroup, Permission)\
2724 2728 .join(
2725 2729 Permission,
2726 2730 UserGroupRepoGroupToPerm.permission_id ==
2727 2731 Permission.permission_id)\
2728 2732 .join(
2729 2733 RepoGroup,
2730 2734 UserGroupRepoGroupToPerm.group_id == RepoGroup.group_id)\
2731 2735 .join(
2732 2736 UserGroup,
2733 2737 UserGroupRepoGroupToPerm.users_group_id ==
2734 2738 UserGroup.users_group_id)\
2735 2739 .join(
2736 2740 UserGroupMember,
2737 2741 UserGroupRepoGroupToPerm.users_group_id ==
2738 2742 UserGroupMember.users_group_id)\
2739 2743 .filter(
2740 2744 UserGroupMember.user_id == user_id,
2741 2745 UserGroup.users_group_active == true())
2742 2746 if repo_group_id:
2743 2747 q = q.filter(UserGroupRepoGroupToPerm.group_id == repo_group_id)
2744 2748 return q.all()
2745 2749
2746 2750 @classmethod
2747 2751 def get_default_user_group_perms(cls, user_id, user_group_id=None):
2748 2752 q = Session().query(UserUserGroupToPerm, UserGroup, Permission)\
2749 2753 .join((Permission, UserUserGroupToPerm.permission_id == Permission.permission_id))\
2750 2754 .join((UserGroup, UserUserGroupToPerm.user_group_id == UserGroup.users_group_id))\
2751 2755 .filter(UserUserGroupToPerm.user_id == user_id)
2752 2756 if user_group_id:
2753 2757 q = q.filter(UserUserGroupToPerm.user_group_id == user_group_id)
2754 2758 return q.all()
2755 2759
2756 2760 @classmethod
2757 2761 def get_default_user_group_perms_from_user_group(
2758 2762 cls, user_id, user_group_id=None):
2759 2763 TargetUserGroup = aliased(UserGroup, name='target_user_group')
2760 2764 q = Session().query(UserGroupUserGroupToPerm, UserGroup, Permission)\
2761 2765 .join(
2762 2766 Permission,
2763 2767 UserGroupUserGroupToPerm.permission_id ==
2764 2768 Permission.permission_id)\
2765 2769 .join(
2766 2770 TargetUserGroup,
2767 2771 UserGroupUserGroupToPerm.target_user_group_id ==
2768 2772 TargetUserGroup.users_group_id)\
2769 2773 .join(
2770 2774 UserGroup,
2771 2775 UserGroupUserGroupToPerm.user_group_id ==
2772 2776 UserGroup.users_group_id)\
2773 2777 .join(
2774 2778 UserGroupMember,
2775 2779 UserGroupUserGroupToPerm.user_group_id ==
2776 2780 UserGroupMember.users_group_id)\
2777 2781 .filter(
2778 2782 UserGroupMember.user_id == user_id,
2779 2783 UserGroup.users_group_active == true())
2780 2784 if user_group_id:
2781 2785 q = q.filter(
2782 2786 UserGroupUserGroupToPerm.user_group_id == user_group_id)
2783 2787
2784 2788 return q.all()
2785 2789
2786 2790
2787 2791 class UserRepoToPerm(Base, BaseModel):
2788 2792 __tablename__ = 'repo_to_perm'
2789 2793 __table_args__ = (
2790 2794 UniqueConstraint('user_id', 'repository_id', 'permission_id'),
2791 2795 {'extend_existing': True, 'mysql_engine': 'InnoDB',
2792 2796 'mysql_charset': 'utf8', 'sqlite_autoincrement': True}
2793 2797 )
2794 2798 repo_to_perm_id = Column("repo_to_perm_id", Integer(), nullable=False, unique=True, default=None, primary_key=True)
2795 2799 user_id = Column("user_id", Integer(), ForeignKey('users.user_id'), nullable=False, unique=None, default=None)
2796 2800 permission_id = Column("permission_id", Integer(), ForeignKey('permissions.permission_id'), nullable=False, unique=None, default=None)
2797 2801 repository_id = Column("repository_id", Integer(), ForeignKey('repositories.repo_id'), nullable=False, unique=None, default=None)
2798 2802
2799 2803 user = relationship('User')
2800 2804 repository = relationship('Repository')
2801 2805 permission = relationship('Permission')
2802 2806
2803 2807 @classmethod
2804 2808 def create(cls, user, repository, permission):
2805 2809 n = cls()
2806 2810 n.user = user
2807 2811 n.repository = repository
2808 2812 n.permission = permission
2809 2813 Session().add(n)
2810 2814 return n
2811 2815
2812 2816 def __unicode__(self):
2813 2817 return u'<%s => %s >' % (self.user, self.repository)
2814 2818
2815 2819
2816 2820 class UserUserGroupToPerm(Base, BaseModel):
2817 2821 __tablename__ = 'user_user_group_to_perm'
2818 2822 __table_args__ = (
2819 2823 UniqueConstraint('user_id', 'user_group_id', 'permission_id'),
2820 2824 {'extend_existing': True, 'mysql_engine': 'InnoDB',
2821 2825 'mysql_charset': 'utf8', 'sqlite_autoincrement': True}
2822 2826 )
2823 2827 user_user_group_to_perm_id = Column("user_user_group_to_perm_id", Integer(), nullable=False, unique=True, default=None, primary_key=True)
2824 2828 user_id = Column("user_id", Integer(), ForeignKey('users.user_id'), nullable=False, unique=None, default=None)
2825 2829 permission_id = Column("permission_id", Integer(), ForeignKey('permissions.permission_id'), nullable=False, unique=None, default=None)
2826 2830 user_group_id = Column("user_group_id", Integer(), ForeignKey('users_groups.users_group_id'), nullable=False, unique=None, default=None)
2827 2831
2828 2832 user = relationship('User')
2829 2833 user_group = relationship('UserGroup')
2830 2834 permission = relationship('Permission')
2831 2835
2832 2836 @classmethod
2833 2837 def create(cls, user, user_group, permission):
2834 2838 n = cls()
2835 2839 n.user = user
2836 2840 n.user_group = user_group
2837 2841 n.permission = permission
2838 2842 Session().add(n)
2839 2843 return n
2840 2844
2841 2845 def __unicode__(self):
2842 2846 return u'<%s => %s >' % (self.user, self.user_group)
2843 2847
2844 2848
2845 2849 class UserToPerm(Base, BaseModel):
2846 2850 __tablename__ = 'user_to_perm'
2847 2851 __table_args__ = (
2848 2852 UniqueConstraint('user_id', 'permission_id'),
2849 2853 {'extend_existing': True, 'mysql_engine': 'InnoDB',
2850 2854 'mysql_charset': 'utf8', 'sqlite_autoincrement': True}
2851 2855 )
2852 2856 user_to_perm_id = Column("user_to_perm_id", Integer(), nullable=False, unique=True, default=None, primary_key=True)
2853 2857 user_id = Column("user_id", Integer(), ForeignKey('users.user_id'), nullable=False, unique=None, default=None)
2854 2858 permission_id = Column("permission_id", Integer(), ForeignKey('permissions.permission_id'), nullable=False, unique=None, default=None)
2855 2859
2856 2860 user = relationship('User')
2857 2861 permission = relationship('Permission', lazy='joined')
2858 2862
2859 2863 def __unicode__(self):
2860 2864 return u'<%s => %s >' % (self.user, self.permission)
2861 2865
2862 2866
2863 2867 class UserGroupRepoToPerm(Base, BaseModel):
2864 2868 __tablename__ = 'users_group_repo_to_perm'
2865 2869 __table_args__ = (
2866 2870 UniqueConstraint('repository_id', 'users_group_id', 'permission_id'),
2867 2871 {'extend_existing': True, 'mysql_engine': 'InnoDB',
2868 2872 'mysql_charset': 'utf8', 'sqlite_autoincrement': True}
2869 2873 )
2870 2874 users_group_to_perm_id = Column("users_group_to_perm_id", Integer(), nullable=False, unique=True, default=None, primary_key=True)
2871 2875 users_group_id = Column("users_group_id", Integer(), ForeignKey('users_groups.users_group_id'), nullable=False, unique=None, default=None)
2872 2876 permission_id = Column("permission_id", Integer(), ForeignKey('permissions.permission_id'), nullable=False, unique=None, default=None)
2873 2877 repository_id = Column("repository_id", Integer(), ForeignKey('repositories.repo_id'), nullable=False, unique=None, default=None)
2874 2878
2875 2879 users_group = relationship('UserGroup')
2876 2880 permission = relationship('Permission')
2877 2881 repository = relationship('Repository')
2878 2882
2879 2883 @classmethod
2880 2884 def create(cls, users_group, repository, permission):
2881 2885 n = cls()
2882 2886 n.users_group = users_group
2883 2887 n.repository = repository
2884 2888 n.permission = permission
2885 2889 Session().add(n)
2886 2890 return n
2887 2891
2888 2892 def __unicode__(self):
2889 2893 return u'<UserGroupRepoToPerm:%s => %s >' % (self.users_group, self.repository)
2890 2894
2891 2895
2892 2896 class UserGroupUserGroupToPerm(Base, BaseModel):
2893 2897 __tablename__ = 'user_group_user_group_to_perm'
2894 2898 __table_args__ = (
2895 2899 UniqueConstraint('target_user_group_id', 'user_group_id', 'permission_id'),
2896 2900 CheckConstraint('target_user_group_id != user_group_id'),
2897 2901 {'extend_existing': True, 'mysql_engine': 'InnoDB',
2898 2902 'mysql_charset': 'utf8', 'sqlite_autoincrement': True}
2899 2903 )
2900 2904 user_group_user_group_to_perm_id = Column("user_group_user_group_to_perm_id", Integer(), nullable=False, unique=True, default=None, primary_key=True)
2901 2905 target_user_group_id = Column("target_user_group_id", Integer(), ForeignKey('users_groups.users_group_id'), nullable=False, unique=None, default=None)
2902 2906 permission_id = Column("permission_id", Integer(), ForeignKey('permissions.permission_id'), nullable=False, unique=None, default=None)
2903 2907 user_group_id = Column("user_group_id", Integer(), ForeignKey('users_groups.users_group_id'), nullable=False, unique=None, default=None)
2904 2908
2905 2909 target_user_group = relationship('UserGroup', primaryjoin='UserGroupUserGroupToPerm.target_user_group_id==UserGroup.users_group_id')
2906 2910 user_group = relationship('UserGroup', primaryjoin='UserGroupUserGroupToPerm.user_group_id==UserGroup.users_group_id')
2907 2911 permission = relationship('Permission')
2908 2912
2909 2913 @classmethod
2910 2914 def create(cls, target_user_group, user_group, permission):
2911 2915 n = cls()
2912 2916 n.target_user_group = target_user_group
2913 2917 n.user_group = user_group
2914 2918 n.permission = permission
2915 2919 Session().add(n)
2916 2920 return n
2917 2921
2918 2922 def __unicode__(self):
2919 2923 return u'<UserGroupUserGroup:%s => %s >' % (self.target_user_group, self.user_group)
2920 2924
2921 2925
2922 2926 class UserGroupToPerm(Base, BaseModel):
2923 2927 __tablename__ = 'users_group_to_perm'
2924 2928 __table_args__ = (
2925 2929 UniqueConstraint('users_group_id', 'permission_id',),
2926 2930 {'extend_existing': True, 'mysql_engine': 'InnoDB',
2927 2931 'mysql_charset': 'utf8', 'sqlite_autoincrement': True}
2928 2932 )
2929 2933 users_group_to_perm_id = Column("users_group_to_perm_id", Integer(), nullable=False, unique=True, default=None, primary_key=True)
2930 2934 users_group_id = Column("users_group_id", Integer(), ForeignKey('users_groups.users_group_id'), nullable=False, unique=None, default=None)
2931 2935 permission_id = Column("permission_id", Integer(), ForeignKey('permissions.permission_id'), nullable=False, unique=None, default=None)
2932 2936
2933 2937 users_group = relationship('UserGroup')
2934 2938 permission = relationship('Permission')
2935 2939
2936 2940
2937 2941 class UserRepoGroupToPerm(Base, BaseModel):
2938 2942 __tablename__ = 'user_repo_group_to_perm'
2939 2943 __table_args__ = (
2940 2944 UniqueConstraint('user_id', 'group_id', 'permission_id'),
2941 2945 {'extend_existing': True, 'mysql_engine': 'InnoDB',
2942 2946 'mysql_charset': 'utf8', 'sqlite_autoincrement': True}
2943 2947 )
2944 2948
2945 2949 group_to_perm_id = Column("group_to_perm_id", Integer(), nullable=False, unique=True, default=None, primary_key=True)
2946 2950 user_id = Column("user_id", Integer(), ForeignKey('users.user_id'), nullable=False, unique=None, default=None)
2947 2951 group_id = Column("group_id", Integer(), ForeignKey('groups.group_id'), nullable=False, unique=None, default=None)
2948 2952 permission_id = Column("permission_id", Integer(), ForeignKey('permissions.permission_id'), nullable=False, unique=None, default=None)
2949 2953
2950 2954 user = relationship('User')
2951 2955 group = relationship('RepoGroup')
2952 2956 permission = relationship('Permission')
2953 2957
2954 2958 @classmethod
2955 2959 def create(cls, user, repository_group, permission):
2956 2960 n = cls()
2957 2961 n.user = user
2958 2962 n.group = repository_group
2959 2963 n.permission = permission
2960 2964 Session().add(n)
2961 2965 return n
2962 2966
2963 2967
2964 2968 class UserGroupRepoGroupToPerm(Base, BaseModel):
2965 2969 __tablename__ = 'users_group_repo_group_to_perm'
2966 2970 __table_args__ = (
2967 2971 UniqueConstraint('users_group_id', 'group_id'),
2968 2972 {'extend_existing': True, 'mysql_engine': 'InnoDB',
2969 2973 'mysql_charset': 'utf8', 'sqlite_autoincrement': True}
2970 2974 )
2971 2975
2972 2976 users_group_repo_group_to_perm_id = Column("users_group_repo_group_to_perm_id", Integer(), nullable=False, unique=True, default=None, primary_key=True)
2973 2977 users_group_id = Column("users_group_id", Integer(), ForeignKey('users_groups.users_group_id'), nullable=False, unique=None, default=None)
2974 2978 group_id = Column("group_id", Integer(), ForeignKey('groups.group_id'), nullable=False, unique=None, default=None)
2975 2979 permission_id = Column("permission_id", Integer(), ForeignKey('permissions.permission_id'), nullable=False, unique=None, default=None)
2976 2980
2977 2981 users_group = relationship('UserGroup')
2978 2982 permission = relationship('Permission')
2979 2983 group = relationship('RepoGroup')
2980 2984
2981 2985 @classmethod
2982 2986 def create(cls, user_group, repository_group, permission):
2983 2987 n = cls()
2984 2988 n.users_group = user_group
2985 2989 n.group = repository_group
2986 2990 n.permission = permission
2987 2991 Session().add(n)
2988 2992 return n
2989 2993
2990 2994 def __unicode__(self):
2991 2995 return u'<UserGroupRepoGroupToPerm:%s => %s >' % (self.users_group, self.group)
2992 2996
2993 2997
2994 2998 class Statistics(Base, BaseModel):
2995 2999 __tablename__ = 'statistics'
2996 3000 __table_args__ = (
2997 3001 {'extend_existing': True, 'mysql_engine': 'InnoDB',
2998 3002 'mysql_charset': 'utf8', 'sqlite_autoincrement': True}
2999 3003 )
3000 3004 stat_id = Column("stat_id", Integer(), nullable=False, unique=True, default=None, primary_key=True)
3001 3005 repository_id = Column("repository_id", Integer(), ForeignKey('repositories.repo_id'), nullable=False, unique=True, default=None)
3002 3006 stat_on_revision = Column("stat_on_revision", Integer(), nullable=False)
3003 3007 commit_activity = Column("commit_activity", LargeBinary(1000000), nullable=False)#JSON data
3004 3008 commit_activity_combined = Column("commit_activity_combined", LargeBinary(), nullable=False)#JSON data
3005 3009 languages = Column("languages", LargeBinary(1000000), nullable=False)#JSON data
3006 3010
3007 3011 repository = relationship('Repository', single_parent=True)
3008 3012
3009 3013
3010 3014 class UserFollowing(Base, BaseModel):
3011 3015 __tablename__ = 'user_followings'
3012 3016 __table_args__ = (
3013 3017 UniqueConstraint('user_id', 'follows_repository_id'),
3014 3018 UniqueConstraint('user_id', 'follows_user_id'),
3015 3019 {'extend_existing': True, 'mysql_engine': 'InnoDB',
3016 3020 'mysql_charset': 'utf8', 'sqlite_autoincrement': True}
3017 3021 )
3018 3022
3019 3023 user_following_id = Column("user_following_id", Integer(), nullable=False, unique=True, default=None, primary_key=True)
3020 3024 user_id = Column("user_id", Integer(), ForeignKey('users.user_id'), nullable=False, unique=None, default=None)
3021 3025 follows_repo_id = Column("follows_repository_id", Integer(), ForeignKey('repositories.repo_id'), nullable=True, unique=None, default=None)
3022 3026 follows_user_id = Column("follows_user_id", Integer(), ForeignKey('users.user_id'), nullable=True, unique=None, default=None)
3023 3027 follows_from = Column('follows_from', DateTime(timezone=False), nullable=True, unique=None, default=datetime.datetime.now)
3024 3028
3025 3029 user = relationship('User', primaryjoin='User.user_id==UserFollowing.user_id')
3026 3030
3027 3031 follows_user = relationship('User', primaryjoin='User.user_id==UserFollowing.follows_user_id')
3028 3032 follows_repository = relationship('Repository', order_by='Repository.repo_name')
3029 3033
3030 3034 @classmethod
3031 3035 def get_repo_followers(cls, repo_id):
3032 3036 return cls.query().filter(cls.follows_repo_id == repo_id)
3033 3037
3034 3038
3035 3039 class CacheKey(Base, BaseModel):
3036 3040 __tablename__ = 'cache_invalidation'
3037 3041 __table_args__ = (
3038 3042 UniqueConstraint('cache_key'),
3039 3043 Index('key_idx', 'cache_key'),
3040 3044 {'extend_existing': True, 'mysql_engine': 'InnoDB',
3041 3045 'mysql_charset': 'utf8', 'sqlite_autoincrement': True},
3042 3046 )
3043 3047 CACHE_TYPE_ATOM = 'ATOM'
3044 3048 CACHE_TYPE_RSS = 'RSS'
3045 3049 CACHE_TYPE_README = 'README'
3046 3050
3047 3051 cache_id = Column("cache_id", Integer(), nullable=False, unique=True, default=None, primary_key=True)
3048 3052 cache_key = Column("cache_key", String(255), nullable=True, unique=None, default=None)
3049 3053 cache_args = Column("cache_args", String(255), nullable=True, unique=None, default=None)
3050 3054 cache_active = Column("cache_active", Boolean(), nullable=True, unique=None, default=False)
3051 3055
3052 3056 def __init__(self, cache_key, cache_args=''):
3053 3057 self.cache_key = cache_key
3054 3058 self.cache_args = cache_args
3055 3059 self.cache_active = False
3056 3060
3057 3061 def __unicode__(self):
3058 3062 return u"<%s('%s:%s[%s]')>" % (
3059 3063 self.__class__.__name__,
3060 3064 self.cache_id, self.cache_key, self.cache_active)
3061 3065
3062 3066 def _cache_key_partition(self):
3063 3067 prefix, repo_name, suffix = self.cache_key.partition(self.cache_args)
3064 3068 return prefix, repo_name, suffix
3065 3069
3066 3070 def get_prefix(self):
3067 3071 """
3068 3072 Try to extract prefix from existing cache key. The key could consist
3069 3073 of prefix, repo_name, suffix
3070 3074 """
3071 3075 # this returns prefix, repo_name, suffix
3072 3076 return self._cache_key_partition()[0]
3073 3077
3074 3078 def get_suffix(self):
3075 3079 """
3076 3080 get suffix that might have been used in _get_cache_key to
3077 3081 generate self.cache_key. Only used for informational purposes
3078 3082 in repo_edit.mako.
3079 3083 """
3080 3084 # prefix, repo_name, suffix
3081 3085 return self._cache_key_partition()[2]
3082 3086
3083 3087 @classmethod
3084 3088 def delete_all_cache(cls):
3085 3089 """
3086 3090 Delete all cache keys from database.
3087 3091 Should only be run when all instances are down and all entries
3088 3092 thus stale.
3089 3093 """
3090 3094 cls.query().delete()
3091 3095 Session().commit()
3092 3096
3093 3097 @classmethod
3094 3098 def get_cache_key(cls, repo_name, cache_type):
3095 3099 """
3096 3100
3097 3101 Generate a cache key for this process of RhodeCode instance.
3098 3102 Prefix most likely will be process id or maybe explicitly set
3099 3103 instance_id from .ini file.
3100 3104 """
3101 3105 import rhodecode
3102 3106 prefix = safe_unicode(rhodecode.CONFIG.get('instance_id') or '')
3103 3107
3104 3108 repo_as_unicode = safe_unicode(repo_name)
3105 3109 key = u'{}_{}'.format(repo_as_unicode, cache_type) \
3106 3110 if cache_type else repo_as_unicode
3107 3111
3108 3112 return u'{}{}'.format(prefix, key)
3109 3113
3110 3114 @classmethod
3111 3115 def set_invalidate(cls, repo_name, delete=False):
3112 3116 """
3113 3117 Mark all caches of a repo as invalid in the database.
3114 3118 """
3115 3119
3116 3120 try:
3117 3121 qry = Session().query(cls).filter(cls.cache_args == repo_name)
3118 3122 if delete:
3119 3123 log.debug('cache objects deleted for repo %s',
3120 3124 safe_str(repo_name))
3121 3125 qry.delete()
3122 3126 else:
3123 3127 log.debug('cache objects marked as invalid for repo %s',
3124 3128 safe_str(repo_name))
3125 3129 qry.update({"cache_active": False})
3126 3130
3127 3131 Session().commit()
3128 3132 except Exception:
3129 3133 log.exception(
3130 3134 'Cache key invalidation failed for repository %s',
3131 3135 safe_str(repo_name))
3132 3136 Session().rollback()
3133 3137
3134 3138 @classmethod
3135 3139 def get_active_cache(cls, cache_key):
3136 3140 inv_obj = cls.query().filter(cls.cache_key == cache_key).scalar()
3137 3141 if inv_obj:
3138 3142 return inv_obj
3139 3143 return None
3140 3144
3141 3145 @classmethod
3142 3146 def repo_context_cache(cls, compute_func, repo_name, cache_type,
3143 3147 thread_scoped=False):
3144 3148 """
3145 3149 @cache_region('long_term')
3146 3150 def _heavy_calculation(cache_key):
3147 3151 return 'result'
3148 3152
3149 3153 cache_context = CacheKey.repo_context_cache(
3150 3154 _heavy_calculation, repo_name, cache_type)
3151 3155
3152 3156 with cache_context as context:
3153 3157 context.invalidate()
3154 3158 computed = context.compute()
3155 3159
3156 3160 assert computed == 'result'
3157 3161 """
3158 3162 from rhodecode.lib import caches
3159 3163 return caches.InvalidationContext(
3160 3164 compute_func, repo_name, cache_type, thread_scoped=thread_scoped)
3161 3165
3162 3166
3163 3167 class ChangesetComment(Base, BaseModel):
3164 3168 __tablename__ = 'changeset_comments'
3165 3169 __table_args__ = (
3166 3170 Index('cc_revision_idx', 'revision'),
3167 3171 {'extend_existing': True, 'mysql_engine': 'InnoDB',
3168 3172 'mysql_charset': 'utf8', 'sqlite_autoincrement': True},
3169 3173 )
3170 3174
3171 3175 COMMENT_OUTDATED = u'comment_outdated'
3172 3176 COMMENT_TYPE_NOTE = u'note'
3173 3177 COMMENT_TYPE_TODO = u'todo'
3174 3178 COMMENT_TYPES = [COMMENT_TYPE_NOTE, COMMENT_TYPE_TODO]
3175 3179
3176 3180 comment_id = Column('comment_id', Integer(), nullable=False, primary_key=True)
3177 3181 repo_id = Column('repo_id', Integer(), ForeignKey('repositories.repo_id'), nullable=False)
3178 3182 revision = Column('revision', String(40), nullable=True)
3179 3183 pull_request_id = Column("pull_request_id", Integer(), ForeignKey('pull_requests.pull_request_id'), nullable=True)
3180 3184 pull_request_version_id = Column("pull_request_version_id", Integer(), ForeignKey('pull_request_versions.pull_request_version_id'), nullable=True)
3181 3185 line_no = Column('line_no', Unicode(10), nullable=True)
3182 3186 hl_lines = Column('hl_lines', Unicode(512), nullable=True)
3183 3187 f_path = Column('f_path', Unicode(1000), nullable=True)
3184 3188 user_id = Column('user_id', Integer(), ForeignKey('users.user_id'), nullable=False)
3185 3189 text = Column('text', UnicodeText().with_variant(UnicodeText(25000), 'mysql'), nullable=False)
3186 3190 created_on = Column('created_on', DateTime(timezone=False), nullable=False, default=datetime.datetime.now)
3187 3191 modified_at = Column('modified_at', DateTime(timezone=False), nullable=False, default=datetime.datetime.now)
3188 3192 renderer = Column('renderer', Unicode(64), nullable=True)
3189 3193 display_state = Column('display_state', Unicode(128), nullable=True)
3190 3194
3191 3195 comment_type = Column('comment_type', Unicode(128), nullable=True, default=COMMENT_TYPE_NOTE)
3192 3196 resolved_comment_id = Column('resolved_comment_id', Integer(), ForeignKey('changeset_comments.comment_id'), nullable=True)
3193 3197 resolved_comment = relationship('ChangesetComment', remote_side=comment_id, backref='resolved_by')
3194 3198 author = relationship('User', lazy='joined')
3195 3199 repo = relationship('Repository')
3196 3200 status_change = relationship('ChangesetStatus', cascade="all, delete, delete-orphan", lazy='joined')
3197 3201 pull_request = relationship('PullRequest', lazy='joined')
3198 3202 pull_request_version = relationship('PullRequestVersion')
3199 3203
3200 3204 @classmethod
3201 3205 def get_users(cls, revision=None, pull_request_id=None):
3202 3206 """
3203 3207 Returns user associated with this ChangesetComment. ie those
3204 3208 who actually commented
3205 3209
3206 3210 :param cls:
3207 3211 :param revision:
3208 3212 """
3209 3213 q = Session().query(User)\
3210 3214 .join(ChangesetComment.author)
3211 3215 if revision:
3212 3216 q = q.filter(cls.revision == revision)
3213 3217 elif pull_request_id:
3214 3218 q = q.filter(cls.pull_request_id == pull_request_id)
3215 3219 return q.all()
3216 3220
3217 3221 @classmethod
3218 3222 def get_index_from_version(cls, pr_version, versions):
3219 3223 num_versions = [x.pull_request_version_id for x in versions]
3220 3224 try:
3221 3225 return num_versions.index(pr_version) +1
3222 3226 except (IndexError, ValueError):
3223 3227 return
3224 3228
3225 3229 @property
3226 3230 def outdated(self):
3227 3231 return self.display_state == self.COMMENT_OUTDATED
3228 3232
3229 3233 def outdated_at_version(self, version):
3230 3234 """
3231 3235 Checks if comment is outdated for given pull request version
3232 3236 """
3233 3237 return self.outdated and self.pull_request_version_id != version
3234 3238
3235 3239 def older_than_version(self, version):
3236 3240 """
3237 3241 Checks if comment is made from previous version than given
3238 3242 """
3239 3243 if version is None:
3240 3244 return self.pull_request_version_id is not None
3241 3245
3242 3246 return self.pull_request_version_id < version
3243 3247
3244 3248 @property
3245 3249 def resolved(self):
3246 3250 return self.resolved_by[0] if self.resolved_by else None
3247 3251
3248 3252 @property
3249 3253 def is_todo(self):
3250 3254 return self.comment_type == self.COMMENT_TYPE_TODO
3251 3255
3252 3256 @property
3253 3257 def is_inline(self):
3254 3258 return self.line_no and self.f_path
3255 3259
3256 3260 def get_index_version(self, versions):
3257 3261 return self.get_index_from_version(
3258 3262 self.pull_request_version_id, versions)
3259 3263
3260 3264 def __repr__(self):
3261 3265 if self.comment_id:
3262 3266 return '<DB:Comment #%s>' % self.comment_id
3263 3267 else:
3264 3268 return '<DB:Comment at %#x>' % id(self)
3265 3269
3266 3270 def get_api_data(self):
3267 3271 comment = self
3268 3272 data = {
3269 3273 'comment_id': comment.comment_id,
3270 3274 'comment_type': comment.comment_type,
3271 3275 'comment_text': comment.text,
3272 3276 'comment_status': comment.status_change,
3273 3277 'comment_f_path': comment.f_path,
3274 3278 'comment_lineno': comment.line_no,
3275 3279 'comment_author': comment.author,
3276 3280 'comment_created_on': comment.created_on
3277 3281 }
3278 3282 return data
3279 3283
3280 3284 def __json__(self):
3281 3285 data = dict()
3282 3286 data.update(self.get_api_data())
3283 3287 return data
3284 3288
3285 3289
3286 3290 class ChangesetStatus(Base, BaseModel):
3287 3291 __tablename__ = 'changeset_statuses'
3288 3292 __table_args__ = (
3289 3293 Index('cs_revision_idx', 'revision'),
3290 3294 Index('cs_version_idx', 'version'),
3291 3295 UniqueConstraint('repo_id', 'revision', 'version'),
3292 3296 {'extend_existing': True, 'mysql_engine': 'InnoDB',
3293 3297 'mysql_charset': 'utf8', 'sqlite_autoincrement': True}
3294 3298 )
3295 3299 STATUS_NOT_REVIEWED = DEFAULT = 'not_reviewed'
3296 3300 STATUS_APPROVED = 'approved'
3297 3301 STATUS_REJECTED = 'rejected'
3298 3302 STATUS_UNDER_REVIEW = 'under_review'
3299 3303
3300 3304 STATUSES = [
3301 3305 (STATUS_NOT_REVIEWED, _("Not Reviewed")), # (no icon) and default
3302 3306 (STATUS_APPROVED, _("Approved")),
3303 3307 (STATUS_REJECTED, _("Rejected")),
3304 3308 (STATUS_UNDER_REVIEW, _("Under Review")),
3305 3309 ]
3306 3310
3307 3311 changeset_status_id = Column('changeset_status_id', Integer(), nullable=False, primary_key=True)
3308 3312 repo_id = Column('repo_id', Integer(), ForeignKey('repositories.repo_id'), nullable=False)
3309 3313 user_id = Column("user_id", Integer(), ForeignKey('users.user_id'), nullable=False, unique=None)
3310 3314 revision = Column('revision', String(40), nullable=False)
3311 3315 status = Column('status', String(128), nullable=False, default=DEFAULT)
3312 3316 changeset_comment_id = Column('changeset_comment_id', Integer(), ForeignKey('changeset_comments.comment_id'))
3313 3317 modified_at = Column('modified_at', DateTime(), nullable=False, default=datetime.datetime.now)
3314 3318 version = Column('version', Integer(), nullable=False, default=0)
3315 3319 pull_request_id = Column("pull_request_id", Integer(), ForeignKey('pull_requests.pull_request_id'), nullable=True)
3316 3320
3317 3321 author = relationship('User', lazy='joined')
3318 3322 repo = relationship('Repository')
3319 3323 comment = relationship('ChangesetComment', lazy='joined')
3320 3324 pull_request = relationship('PullRequest', lazy='joined')
3321 3325
3322 3326 def __unicode__(self):
3323 3327 return u"<%s('%s[v%s]:%s')>" % (
3324 3328 self.__class__.__name__,
3325 3329 self.status, self.version, self.author
3326 3330 )
3327 3331
3328 3332 @classmethod
3329 3333 def get_status_lbl(cls, value):
3330 3334 return dict(cls.STATUSES).get(value)
3331 3335
3332 3336 @property
3333 3337 def status_lbl(self):
3334 3338 return ChangesetStatus.get_status_lbl(self.status)
3335 3339
3336 3340 def get_api_data(self):
3337 3341 status = self
3338 3342 data = {
3339 3343 'status_id': status.changeset_status_id,
3340 3344 'status': status.status,
3341 3345 }
3342 3346 return data
3343 3347
3344 3348 def __json__(self):
3345 3349 data = dict()
3346 3350 data.update(self.get_api_data())
3347 3351 return data
3348 3352
3349 3353
3350 3354 class _PullRequestBase(BaseModel):
3351 3355 """
3352 3356 Common attributes of pull request and version entries.
3353 3357 """
3354 3358
3355 3359 # .status values
3356 3360 STATUS_NEW = u'new'
3357 3361 STATUS_OPEN = u'open'
3358 3362 STATUS_CLOSED = u'closed'
3359 3363
3360 3364 title = Column('title', Unicode(255), nullable=True)
3361 3365 description = Column(
3362 3366 'description', UnicodeText().with_variant(UnicodeText(10240), 'mysql'),
3363 3367 nullable=True)
3364 3368 # new/open/closed status of pull request (not approve/reject/etc)
3365 3369 status = Column('status', Unicode(255), nullable=False, default=STATUS_NEW)
3366 3370 created_on = Column(
3367 3371 'created_on', DateTime(timezone=False), nullable=False,
3368 3372 default=datetime.datetime.now)
3369 3373 updated_on = Column(
3370 3374 'updated_on', DateTime(timezone=False), nullable=False,
3371 3375 default=datetime.datetime.now)
3372 3376
3373 3377 @declared_attr
3374 3378 def user_id(cls):
3375 3379 return Column(
3376 3380 "user_id", Integer(), ForeignKey('users.user_id'), nullable=False,
3377 3381 unique=None)
3378 3382
3379 3383 # 500 revisions max
3380 3384 _revisions = Column(
3381 3385 'revisions', UnicodeText().with_variant(UnicodeText(20500), 'mysql'))
3382 3386
3383 3387 @declared_attr
3384 3388 def source_repo_id(cls):
3385 3389 # TODO: dan: rename column to source_repo_id
3386 3390 return Column(
3387 3391 'org_repo_id', Integer(), ForeignKey('repositories.repo_id'),
3388 3392 nullable=False)
3389 3393
3390 3394 source_ref = Column('org_ref', Unicode(255), nullable=False)
3391 3395
3392 3396 @declared_attr
3393 3397 def target_repo_id(cls):
3394 3398 # TODO: dan: rename column to target_repo_id
3395 3399 return Column(
3396 3400 'other_repo_id', Integer(), ForeignKey('repositories.repo_id'),
3397 3401 nullable=False)
3398 3402
3399 3403 target_ref = Column('other_ref', Unicode(255), nullable=False)
3400 3404 _shadow_merge_ref = Column('shadow_merge_ref', Unicode(255), nullable=True)
3401 3405
3402 3406 # TODO: dan: rename column to last_merge_source_rev
3403 3407 _last_merge_source_rev = Column(
3404 3408 'last_merge_org_rev', String(40), nullable=True)
3405 3409 # TODO: dan: rename column to last_merge_target_rev
3406 3410 _last_merge_target_rev = Column(
3407 3411 'last_merge_other_rev', String(40), nullable=True)
3408 3412 _last_merge_status = Column('merge_status', Integer(), nullable=True)
3409 3413 merge_rev = Column('merge_rev', String(40), nullable=True)
3410 3414
3411 3415 reviewer_data = Column(
3412 3416 'reviewer_data_json', MutationObj.as_mutable(
3413 3417 JsonType(dialect_map=dict(mysql=UnicodeText(16384)))))
3414 3418
3415 3419 @property
3416 3420 def reviewer_data_json(self):
3417 3421 return json.dumps(self.reviewer_data)
3418 3422
3419 3423 @hybrid_property
3420 3424 def description_safe(self):
3421 3425 from rhodecode.lib import helpers as h
3422 3426 return h.escape(self.description)
3423 3427
3424 3428 @hybrid_property
3425 3429 def revisions(self):
3426 3430 return self._revisions.split(':') if self._revisions else []
3427 3431
3428 3432 @revisions.setter
3429 3433 def revisions(self, val):
3430 3434 self._revisions = ':'.join(val)
3431 3435
3432 3436 @hybrid_property
3433 3437 def last_merge_status(self):
3434 3438 return safe_int(self._last_merge_status)
3435 3439
3436 3440 @last_merge_status.setter
3437 3441 def last_merge_status(self, val):
3438 3442 self._last_merge_status = val
3439 3443
3440 3444 @declared_attr
3441 3445 def author(cls):
3442 3446 return relationship('User', lazy='joined')
3443 3447
3444 3448 @declared_attr
3445 3449 def source_repo(cls):
3446 3450 return relationship(
3447 3451 'Repository',
3448 3452 primaryjoin='%s.source_repo_id==Repository.repo_id' % cls.__name__)
3449 3453
3450 3454 @property
3451 3455 def source_ref_parts(self):
3452 3456 return self.unicode_to_reference(self.source_ref)
3453 3457
3454 3458 @declared_attr
3455 3459 def target_repo(cls):
3456 3460 return relationship(
3457 3461 'Repository',
3458 3462 primaryjoin='%s.target_repo_id==Repository.repo_id' % cls.__name__)
3459 3463
3460 3464 @property
3461 3465 def target_ref_parts(self):
3462 3466 return self.unicode_to_reference(self.target_ref)
3463 3467
3464 3468 @property
3465 3469 def shadow_merge_ref(self):
3466 3470 return self.unicode_to_reference(self._shadow_merge_ref)
3467 3471
3468 3472 @shadow_merge_ref.setter
3469 3473 def shadow_merge_ref(self, ref):
3470 3474 self._shadow_merge_ref = self.reference_to_unicode(ref)
3471 3475
3472 3476 def unicode_to_reference(self, raw):
3473 3477 """
3474 3478 Convert a unicode (or string) to a reference object.
3475 3479 If unicode evaluates to False it returns None.
3476 3480 """
3477 3481 if raw:
3478 3482 refs = raw.split(':')
3479 3483 return Reference(*refs)
3480 3484 else:
3481 3485 return None
3482 3486
3483 3487 def reference_to_unicode(self, ref):
3484 3488 """
3485 3489 Convert a reference object to unicode.
3486 3490 If reference is None it returns None.
3487 3491 """
3488 3492 if ref:
3489 3493 return u':'.join(ref)
3490 3494 else:
3491 3495 return None
3492 3496
3493 3497 def get_api_data(self, with_merge_state=True):
3494 3498 from rhodecode.model.pull_request import PullRequestModel
3495 3499
3496 3500 pull_request = self
3497 3501 if with_merge_state:
3498 3502 merge_status = PullRequestModel().merge_status(pull_request)
3499 3503 merge_state = {
3500 3504 'status': merge_status[0],
3501 3505 'message': safe_unicode(merge_status[1]),
3502 3506 }
3503 3507 else:
3504 3508 merge_state = {'status': 'not_available',
3505 3509 'message': 'not_available'}
3506 3510
3507 3511 merge_data = {
3508 3512 'clone_url': PullRequestModel().get_shadow_clone_url(pull_request),
3509 3513 'reference': (
3510 3514 pull_request.shadow_merge_ref._asdict()
3511 3515 if pull_request.shadow_merge_ref else None),
3512 3516 }
3513 3517
3514 3518 data = {
3515 3519 'pull_request_id': pull_request.pull_request_id,
3516 3520 'url': PullRequestModel().get_url(pull_request),
3517 3521 'title': pull_request.title,
3518 3522 'description': pull_request.description,
3519 3523 'status': pull_request.status,
3520 3524 'created_on': pull_request.created_on,
3521 3525 'updated_on': pull_request.updated_on,
3522 3526 'commit_ids': pull_request.revisions,
3523 3527 'review_status': pull_request.calculated_review_status(),
3524 3528 'mergeable': merge_state,
3525 3529 'source': {
3526 3530 'clone_url': pull_request.source_repo.clone_url(),
3527 3531 'repository': pull_request.source_repo.repo_name,
3528 3532 'reference': {
3529 3533 'name': pull_request.source_ref_parts.name,
3530 3534 'type': pull_request.source_ref_parts.type,
3531 3535 'commit_id': pull_request.source_ref_parts.commit_id,
3532 3536 },
3533 3537 },
3534 3538 'target': {
3535 3539 'clone_url': pull_request.target_repo.clone_url(),
3536 3540 'repository': pull_request.target_repo.repo_name,
3537 3541 'reference': {
3538 3542 'name': pull_request.target_ref_parts.name,
3539 3543 'type': pull_request.target_ref_parts.type,
3540 3544 'commit_id': pull_request.target_ref_parts.commit_id,
3541 3545 },
3542 3546 },
3543 3547 'merge': merge_data,
3544 3548 'author': pull_request.author.get_api_data(include_secrets=False,
3545 3549 details='basic'),
3546 3550 'reviewers': [
3547 3551 {
3548 3552 'user': reviewer.get_api_data(include_secrets=False,
3549 3553 details='basic'),
3550 3554 'reasons': reasons,
3551 3555 'review_status': st[0][1].status if st else 'not_reviewed',
3552 3556 }
3553 3557 for reviewer, reasons, mandatory, st in
3554 3558 pull_request.reviewers_statuses()
3555 3559 ]
3556 3560 }
3557 3561
3558 3562 return data
3559 3563
3560 3564
3561 3565 class PullRequest(Base, _PullRequestBase):
3562 3566 __tablename__ = 'pull_requests'
3563 3567 __table_args__ = (
3564 3568 {'extend_existing': True, 'mysql_engine': 'InnoDB',
3565 3569 'mysql_charset': 'utf8', 'sqlite_autoincrement': True},
3566 3570 )
3567 3571
3568 3572 pull_request_id = Column(
3569 3573 'pull_request_id', Integer(), nullable=False, primary_key=True)
3570 3574
3571 3575 def __repr__(self):
3572 3576 if self.pull_request_id:
3573 3577 return '<DB:PullRequest #%s>' % self.pull_request_id
3574 3578 else:
3575 3579 return '<DB:PullRequest at %#x>' % id(self)
3576 3580
3577 3581 reviewers = relationship('PullRequestReviewers',
3578 3582 cascade="all, delete, delete-orphan")
3579 3583 statuses = relationship('ChangesetStatus',
3580 3584 cascade="all, delete, delete-orphan")
3581 3585 comments = relationship('ChangesetComment',
3582 3586 cascade="all, delete, delete-orphan")
3583 3587 versions = relationship('PullRequestVersion',
3584 3588 cascade="all, delete, delete-orphan",
3585 3589 lazy='dynamic')
3586 3590
3587 3591 @classmethod
3588 3592 def get_pr_display_object(cls, pull_request_obj, org_pull_request_obj,
3589 3593 internal_methods=None):
3590 3594
3591 3595 class PullRequestDisplay(object):
3592 3596 """
3593 3597 Special object wrapper for showing PullRequest data via Versions
3594 3598 It mimics PR object as close as possible. This is read only object
3595 3599 just for display
3596 3600 """
3597 3601
3598 3602 def __init__(self, attrs, internal=None):
3599 3603 self.attrs = attrs
3600 3604 # internal have priority over the given ones via attrs
3601 3605 self.internal = internal or ['versions']
3602 3606
3603 3607 def __getattr__(self, item):
3604 3608 if item in self.internal:
3605 3609 return getattr(self, item)
3606 3610 try:
3607 3611 return self.attrs[item]
3608 3612 except KeyError:
3609 3613 raise AttributeError(
3610 3614 '%s object has no attribute %s' % (self, item))
3611 3615
3612 3616 def __repr__(self):
3613 3617 return '<DB:PullRequestDisplay #%s>' % self.attrs.get('pull_request_id')
3614 3618
3615 3619 def versions(self):
3616 3620 return pull_request_obj.versions.order_by(
3617 3621 PullRequestVersion.pull_request_version_id).all()
3618 3622
3619 3623 def is_closed(self):
3620 3624 return pull_request_obj.is_closed()
3621 3625
3622 3626 @property
3623 3627 def pull_request_version_id(self):
3624 3628 return getattr(pull_request_obj, 'pull_request_version_id', None)
3625 3629
3626 3630 attrs = StrictAttributeDict(pull_request_obj.get_api_data())
3627 3631
3628 3632 attrs.author = StrictAttributeDict(
3629 3633 pull_request_obj.author.get_api_data())
3630 3634 if pull_request_obj.target_repo:
3631 3635 attrs.target_repo = StrictAttributeDict(
3632 3636 pull_request_obj.target_repo.get_api_data())
3633 3637 attrs.target_repo.clone_url = pull_request_obj.target_repo.clone_url
3634 3638
3635 3639 if pull_request_obj.source_repo:
3636 3640 attrs.source_repo = StrictAttributeDict(
3637 3641 pull_request_obj.source_repo.get_api_data())
3638 3642 attrs.source_repo.clone_url = pull_request_obj.source_repo.clone_url
3639 3643
3640 3644 attrs.source_ref_parts = pull_request_obj.source_ref_parts
3641 3645 attrs.target_ref_parts = pull_request_obj.target_ref_parts
3642 3646 attrs.revisions = pull_request_obj.revisions
3643 3647
3644 3648 attrs.shadow_merge_ref = org_pull_request_obj.shadow_merge_ref
3645 3649 attrs.reviewer_data = org_pull_request_obj.reviewer_data
3646 3650 attrs.reviewer_data_json = org_pull_request_obj.reviewer_data_json
3647 3651
3648 3652 return PullRequestDisplay(attrs, internal=internal_methods)
3649 3653
3650 3654 def is_closed(self):
3651 3655 return self.status == self.STATUS_CLOSED
3652 3656
3653 3657 def __json__(self):
3654 3658 return {
3655 3659 'revisions': self.revisions,
3656 3660 }
3657 3661
3658 3662 def calculated_review_status(self):
3659 3663 from rhodecode.model.changeset_status import ChangesetStatusModel
3660 3664 return ChangesetStatusModel().calculated_review_status(self)
3661 3665
3662 3666 def reviewers_statuses(self):
3663 3667 from rhodecode.model.changeset_status import ChangesetStatusModel
3664 3668 return ChangesetStatusModel().reviewers_statuses(self)
3665 3669
3666 3670 @property
3667 3671 def workspace_id(self):
3668 3672 from rhodecode.model.pull_request import PullRequestModel
3669 3673 return PullRequestModel()._workspace_id(self)
3670 3674
3671 3675 def get_shadow_repo(self):
3672 3676 workspace_id = self.workspace_id
3673 3677 vcs_obj = self.target_repo.scm_instance()
3674 3678 shadow_repository_path = vcs_obj._get_shadow_repository_path(
3675 3679 workspace_id)
3676 3680 return vcs_obj._get_shadow_instance(shadow_repository_path)
3677 3681
3678 3682
3679 3683 class PullRequestVersion(Base, _PullRequestBase):
3680 3684 __tablename__ = 'pull_request_versions'
3681 3685 __table_args__ = (
3682 3686 {'extend_existing': True, 'mysql_engine': 'InnoDB',
3683 3687 'mysql_charset': 'utf8', 'sqlite_autoincrement': True},
3684 3688 )
3685 3689
3686 3690 pull_request_version_id = Column(
3687 3691 'pull_request_version_id', Integer(), nullable=False, primary_key=True)
3688 3692 pull_request_id = Column(
3689 3693 'pull_request_id', Integer(),
3690 3694 ForeignKey('pull_requests.pull_request_id'), nullable=False)
3691 3695 pull_request = relationship('PullRequest')
3692 3696
3693 3697 def __repr__(self):
3694 3698 if self.pull_request_version_id:
3695 3699 return '<DB:PullRequestVersion #%s>' % self.pull_request_version_id
3696 3700 else:
3697 3701 return '<DB:PullRequestVersion at %#x>' % id(self)
3698 3702
3699 3703 @property
3700 3704 def reviewers(self):
3701 3705 return self.pull_request.reviewers
3702 3706
3703 3707 @property
3704 3708 def versions(self):
3705 3709 return self.pull_request.versions
3706 3710
3707 3711 def is_closed(self):
3708 3712 # calculate from original
3709 3713 return self.pull_request.status == self.STATUS_CLOSED
3710 3714
3711 3715 def calculated_review_status(self):
3712 3716 return self.pull_request.calculated_review_status()
3713 3717
3714 3718 def reviewers_statuses(self):
3715 3719 return self.pull_request.reviewers_statuses()
3716 3720
3717 3721
3718 3722 class PullRequestReviewers(Base, BaseModel):
3719 3723 __tablename__ = 'pull_request_reviewers'
3720 3724 __table_args__ = (
3721 3725 {'extend_existing': True, 'mysql_engine': 'InnoDB',
3722 3726 'mysql_charset': 'utf8', 'sqlite_autoincrement': True},
3723 3727 )
3724 3728
3725 3729 @hybrid_property
3726 3730 def reasons(self):
3727 3731 if not self._reasons:
3728 3732 return []
3729 3733 return self._reasons
3730 3734
3731 3735 @reasons.setter
3732 3736 def reasons(self, val):
3733 3737 val = val or []
3734 3738 if any(not isinstance(x, basestring) for x in val):
3735 3739 raise Exception('invalid reasons type, must be list of strings')
3736 3740 self._reasons = val
3737 3741
3738 3742 pull_requests_reviewers_id = Column(
3739 3743 'pull_requests_reviewers_id', Integer(), nullable=False,
3740 3744 primary_key=True)
3741 3745 pull_request_id = Column(
3742 3746 "pull_request_id", Integer(),
3743 3747 ForeignKey('pull_requests.pull_request_id'), nullable=False)
3744 3748 user_id = Column(
3745 3749 "user_id", Integer(), ForeignKey('users.user_id'), nullable=True)
3746 3750 _reasons = Column(
3747 3751 'reason', MutationList.as_mutable(
3748 3752 JsonType('list', dialect_map=dict(mysql=UnicodeText(16384)))))
3749 3753 mandatory = Column("mandatory", Boolean(), nullable=False, default=False)
3750 3754 user = relationship('User')
3751 3755 pull_request = relationship('PullRequest')
3752 3756
3753 3757
3754 3758 class Notification(Base, BaseModel):
3755 3759 __tablename__ = 'notifications'
3756 3760 __table_args__ = (
3757 3761 Index('notification_type_idx', 'type'),
3758 3762 {'extend_existing': True, 'mysql_engine': 'InnoDB',
3759 3763 'mysql_charset': 'utf8', 'sqlite_autoincrement': True},
3760 3764 )
3761 3765
3762 3766 TYPE_CHANGESET_COMMENT = u'cs_comment'
3763 3767 TYPE_MESSAGE = u'message'
3764 3768 TYPE_MENTION = u'mention'
3765 3769 TYPE_REGISTRATION = u'registration'
3766 3770 TYPE_PULL_REQUEST = u'pull_request'
3767 3771 TYPE_PULL_REQUEST_COMMENT = u'pull_request_comment'
3768 3772
3769 3773 notification_id = Column('notification_id', Integer(), nullable=False, primary_key=True)
3770 3774 subject = Column('subject', Unicode(512), nullable=True)
3771 3775 body = Column('body', UnicodeText().with_variant(UnicodeText(50000), 'mysql'), nullable=True)
3772 3776 created_by = Column("created_by", Integer(), ForeignKey('users.user_id'), nullable=True)
3773 3777 created_on = Column('created_on', DateTime(timezone=False), nullable=False, default=datetime.datetime.now)
3774 3778 type_ = Column('type', Unicode(255))
3775 3779
3776 3780 created_by_user = relationship('User')
3777 3781 notifications_to_users = relationship('UserNotification', lazy='joined',
3778 3782 cascade="all, delete, delete-orphan")
3779 3783
3780 3784 @property
3781 3785 def recipients(self):
3782 3786 return [x.user for x in UserNotification.query()\
3783 3787 .filter(UserNotification.notification == self)\
3784 3788 .order_by(UserNotification.user_id.asc()).all()]
3785 3789
3786 3790 @classmethod
3787 3791 def create(cls, created_by, subject, body, recipients, type_=None):
3788 3792 if type_ is None:
3789 3793 type_ = Notification.TYPE_MESSAGE
3790 3794
3791 3795 notification = cls()
3792 3796 notification.created_by_user = created_by
3793 3797 notification.subject = subject
3794 3798 notification.body = body
3795 3799 notification.type_ = type_
3796 3800 notification.created_on = datetime.datetime.now()
3797 3801
3798 3802 for u in recipients:
3799 3803 assoc = UserNotification()
3800 3804 assoc.notification = notification
3801 3805
3802 3806 # if created_by is inside recipients mark his notification
3803 3807 # as read
3804 3808 if u.user_id == created_by.user_id:
3805 3809 assoc.read = True
3806 3810
3807 3811 u.notifications.append(assoc)
3808 3812 Session().add(notification)
3809 3813
3810 3814 return notification
3811 3815
3812 3816
3813 3817 class UserNotification(Base, BaseModel):
3814 3818 __tablename__ = 'user_to_notification'
3815 3819 __table_args__ = (
3816 3820 UniqueConstraint('user_id', 'notification_id'),
3817 3821 {'extend_existing': True, 'mysql_engine': 'InnoDB',
3818 3822 'mysql_charset': 'utf8', 'sqlite_autoincrement': True}
3819 3823 )
3820 3824 user_id = Column('user_id', Integer(), ForeignKey('users.user_id'), primary_key=True)
3821 3825 notification_id = Column("notification_id", Integer(), ForeignKey('notifications.notification_id'), primary_key=True)
3822 3826 read = Column('read', Boolean, default=False)
3823 3827 sent_on = Column('sent_on', DateTime(timezone=False), nullable=True, unique=None)
3824 3828
3825 3829 user = relationship('User', lazy="joined")
3826 3830 notification = relationship('Notification', lazy="joined",
3827 3831 order_by=lambda: Notification.created_on.desc(),)
3828 3832
3829 3833 def mark_as_read(self):
3830 3834 self.read = True
3831 3835 Session().add(self)
3832 3836
3833 3837
3834 3838 class Gist(Base, BaseModel):
3835 3839 __tablename__ = 'gists'
3836 3840 __table_args__ = (
3837 3841 Index('g_gist_access_id_idx', 'gist_access_id'),
3838 3842 Index('g_created_on_idx', 'created_on'),
3839 3843 {'extend_existing': True, 'mysql_engine': 'InnoDB',
3840 3844 'mysql_charset': 'utf8', 'sqlite_autoincrement': True}
3841 3845 )
3842 3846 GIST_PUBLIC = u'public'
3843 3847 GIST_PRIVATE = u'private'
3844 3848 DEFAULT_FILENAME = u'gistfile1.txt'
3845 3849
3846 3850 ACL_LEVEL_PUBLIC = u'acl_public'
3847 3851 ACL_LEVEL_PRIVATE = u'acl_private'
3848 3852
3849 3853 gist_id = Column('gist_id', Integer(), primary_key=True)
3850 3854 gist_access_id = Column('gist_access_id', Unicode(250))
3851 3855 gist_description = Column('gist_description', UnicodeText().with_variant(UnicodeText(1024), 'mysql'))
3852 3856 gist_owner = Column('user_id', Integer(), ForeignKey('users.user_id'), nullable=True)
3853 3857 gist_expires = Column('gist_expires', Float(53), nullable=False)
3854 3858 gist_type = Column('gist_type', Unicode(128), nullable=False)
3855 3859 created_on = Column('created_on', DateTime(timezone=False), nullable=False, default=datetime.datetime.now)
3856 3860 modified_at = Column('modified_at', DateTime(timezone=False), nullable=False, default=datetime.datetime.now)
3857 3861 acl_level = Column('acl_level', Unicode(128), nullable=True)
3858 3862
3859 3863 owner = relationship('User')
3860 3864
3861 3865 def __repr__(self):
3862 3866 return '<Gist:[%s]%s>' % (self.gist_type, self.gist_access_id)
3863 3867
3864 3868 @hybrid_property
3865 3869 def description_safe(self):
3866 3870 from rhodecode.lib import helpers as h
3867 3871 return h.escape(self.gist_description)
3868 3872
3869 3873 @classmethod
3870 3874 def get_or_404(cls, id_):
3871 3875 from pyramid.httpexceptions import HTTPNotFound
3872 3876
3873 3877 res = cls.query().filter(cls.gist_access_id == id_).scalar()
3874 3878 if not res:
3875 3879 raise HTTPNotFound()
3876 3880 return res
3877 3881
3878 3882 @classmethod
3879 3883 def get_by_access_id(cls, gist_access_id):
3880 3884 return cls.query().filter(cls.gist_access_id == gist_access_id).scalar()
3881 3885
3882 3886 def gist_url(self):
3883 3887 from rhodecode.model.gist import GistModel
3884 3888 return GistModel().get_url(self)
3885 3889
3886 3890 @classmethod
3887 3891 def base_path(cls):
3888 3892 """
3889 3893 Returns base path when all gists are stored
3890 3894
3891 3895 :param cls:
3892 3896 """
3893 3897 from rhodecode.model.gist import GIST_STORE_LOC
3894 3898 q = Session().query(RhodeCodeUi)\
3895 3899 .filter(RhodeCodeUi.ui_key == URL_SEP)
3896 3900 q = q.options(FromCache("sql_cache_short", "repository_repo_path"))
3897 3901 return os.path.join(q.one().ui_value, GIST_STORE_LOC)
3898 3902
3899 3903 def get_api_data(self):
3900 3904 """
3901 3905 Common function for generating gist related data for API
3902 3906 """
3903 3907 gist = self
3904 3908 data = {
3905 3909 'gist_id': gist.gist_id,
3906 3910 'type': gist.gist_type,
3907 3911 'access_id': gist.gist_access_id,
3908 3912 'description': gist.gist_description,
3909 3913 'url': gist.gist_url(),
3910 3914 'expires': gist.gist_expires,
3911 3915 'created_on': gist.created_on,
3912 3916 'modified_at': gist.modified_at,
3913 3917 'content': None,
3914 3918 'acl_level': gist.acl_level,
3915 3919 }
3916 3920 return data
3917 3921
3918 3922 def __json__(self):
3919 3923 data = dict(
3920 3924 )
3921 3925 data.update(self.get_api_data())
3922 3926 return data
3923 3927 # SCM functions
3924 3928
3925 3929 def scm_instance(self, **kwargs):
3926 3930 full_repo_path = os.path.join(self.base_path(), self.gist_access_id)
3927 3931 return get_vcs_instance(
3928 3932 repo_path=safe_str(full_repo_path), create=False)
3929 3933
3930 3934
3931 3935 class ExternalIdentity(Base, BaseModel):
3932 3936 __tablename__ = 'external_identities'
3933 3937 __table_args__ = (
3934 3938 Index('local_user_id_idx', 'local_user_id'),
3935 3939 Index('external_id_idx', 'external_id'),
3936 3940 {'extend_existing': True, 'mysql_engine': 'InnoDB',
3937 3941 'mysql_charset': 'utf8'})
3938 3942
3939 3943 external_id = Column('external_id', Unicode(255), default=u'',
3940 3944 primary_key=True)
3941 3945 external_username = Column('external_username', Unicode(1024), default=u'')
3942 3946 local_user_id = Column('local_user_id', Integer(),
3943 3947 ForeignKey('users.user_id'), primary_key=True)
3944 3948 provider_name = Column('provider_name', Unicode(255), default=u'',
3945 3949 primary_key=True)
3946 3950 access_token = Column('access_token', String(1024), default=u'')
3947 3951 alt_token = Column('alt_token', String(1024), default=u'')
3948 3952 token_secret = Column('token_secret', String(1024), default=u'')
3949 3953
3950 3954 @classmethod
3951 3955 def by_external_id_and_provider(cls, external_id, provider_name,
3952 3956 local_user_id=None):
3953 3957 """
3954 3958 Returns ExternalIdentity instance based on search params
3955 3959
3956 3960 :param external_id:
3957 3961 :param provider_name:
3958 3962 :return: ExternalIdentity
3959 3963 """
3960 3964 query = cls.query()
3961 3965 query = query.filter(cls.external_id == external_id)
3962 3966 query = query.filter(cls.provider_name == provider_name)
3963 3967 if local_user_id:
3964 3968 query = query.filter(cls.local_user_id == local_user_id)
3965 3969 return query.first()
3966 3970
3967 3971 @classmethod
3968 3972 def user_by_external_id_and_provider(cls, external_id, provider_name):
3969 3973 """
3970 3974 Returns User instance based on search params
3971 3975
3972 3976 :param external_id:
3973 3977 :param provider_name:
3974 3978 :return: User
3975 3979 """
3976 3980 query = User.query()
3977 3981 query = query.filter(cls.external_id == external_id)
3978 3982 query = query.filter(cls.provider_name == provider_name)
3979 3983 query = query.filter(User.user_id == cls.local_user_id)
3980 3984 return query.first()
3981 3985
3982 3986 @classmethod
3983 3987 def by_local_user_id(cls, local_user_id):
3984 3988 """
3985 3989 Returns all tokens for user
3986 3990
3987 3991 :param local_user_id:
3988 3992 :return: ExternalIdentity
3989 3993 """
3990 3994 query = cls.query()
3991 3995 query = query.filter(cls.local_user_id == local_user_id)
3992 3996 return query
3993 3997
3994 3998
3995 3999 class Integration(Base, BaseModel):
3996 4000 __tablename__ = 'integrations'
3997 4001 __table_args__ = (
3998 4002 {'extend_existing': True, 'mysql_engine': 'InnoDB',
3999 4003 'mysql_charset': 'utf8', 'sqlite_autoincrement': True}
4000 4004 )
4001 4005
4002 4006 integration_id = Column('integration_id', Integer(), primary_key=True)
4003 4007 integration_type = Column('integration_type', String(255))
4004 4008 enabled = Column('enabled', Boolean(), nullable=False)
4005 4009 name = Column('name', String(255), nullable=False)
4006 4010 child_repos_only = Column('child_repos_only', Boolean(), nullable=False,
4007 4011 default=False)
4008 4012
4009 4013 settings = Column(
4010 4014 'settings_json', MutationObj.as_mutable(
4011 4015 JsonType(dialect_map=dict(mysql=UnicodeText(16384)))))
4012 4016 repo_id = Column(
4013 4017 'repo_id', Integer(), ForeignKey('repositories.repo_id'),
4014 4018 nullable=True, unique=None, default=None)
4015 4019 repo = relationship('Repository', lazy='joined')
4016 4020
4017 4021 repo_group_id = Column(
4018 4022 'repo_group_id', Integer(), ForeignKey('groups.group_id'),
4019 4023 nullable=True, unique=None, default=None)
4020 4024 repo_group = relationship('RepoGroup', lazy='joined')
4021 4025
4022 4026 @property
4023 4027 def scope(self):
4024 4028 if self.repo:
4025 4029 return repr(self.repo)
4026 4030 if self.repo_group:
4027 4031 if self.child_repos_only:
4028 4032 return repr(self.repo_group) + ' (child repos only)'
4029 4033 else:
4030 4034 return repr(self.repo_group) + ' (recursive)'
4031 4035 if self.child_repos_only:
4032 4036 return 'root_repos'
4033 4037 return 'global'
4034 4038
4035 4039 def __repr__(self):
4036 4040 return '<Integration(%r, %r)>' % (self.integration_type, self.scope)
4037 4041
4038 4042
4039 4043 class RepoReviewRuleUser(Base, BaseModel):
4040 4044 __tablename__ = 'repo_review_rules_users'
4041 4045 __table_args__ = (
4042 4046 {'extend_existing': True, 'mysql_engine': 'InnoDB',
4043 4047 'mysql_charset': 'utf8', 'sqlite_autoincrement': True,}
4044 4048 )
4045 4049 repo_review_rule_user_id = Column('repo_review_rule_user_id', Integer(), primary_key=True)
4046 4050 repo_review_rule_id = Column("repo_review_rule_id", Integer(), ForeignKey('repo_review_rules.repo_review_rule_id'))
4047 4051 user_id = Column("user_id", Integer(), ForeignKey('users.user_id'), nullable=False)
4048 4052 mandatory = Column("mandatory", Boolean(), nullable=False, default=False)
4049 4053 user = relationship('User')
4050 4054
4051 4055 def rule_data(self):
4052 4056 return {
4053 4057 'mandatory': self.mandatory
4054 4058 }
4055 4059
4056 4060
4057 4061 class RepoReviewRuleUserGroup(Base, BaseModel):
4058 4062 __tablename__ = 'repo_review_rules_users_groups'
4059 4063 __table_args__ = (
4060 4064 {'extend_existing': True, 'mysql_engine': 'InnoDB',
4061 4065 'mysql_charset': 'utf8', 'sqlite_autoincrement': True,}
4062 4066 )
4063 4067 repo_review_rule_users_group_id = Column('repo_review_rule_users_group_id', Integer(), primary_key=True)
4064 4068 repo_review_rule_id = Column("repo_review_rule_id", Integer(), ForeignKey('repo_review_rules.repo_review_rule_id'))
4065 4069 users_group_id = Column("users_group_id", Integer(),ForeignKey('users_groups.users_group_id'), nullable=False)
4066 4070 mandatory = Column("mandatory", Boolean(), nullable=False, default=False)
4067 4071 users_group = relationship('UserGroup')
4068 4072
4069 4073 def rule_data(self):
4070 4074 return {
4071 4075 'mandatory': self.mandatory
4072 4076 }
4073 4077
4074 4078
4075 4079 class RepoReviewRule(Base, BaseModel):
4076 4080 __tablename__ = 'repo_review_rules'
4077 4081 __table_args__ = (
4078 4082 {'extend_existing': True, 'mysql_engine': 'InnoDB',
4079 4083 'mysql_charset': 'utf8', 'sqlite_autoincrement': True,}
4080 4084 )
4081 4085
4082 4086 repo_review_rule_id = Column(
4083 4087 'repo_review_rule_id', Integer(), primary_key=True)
4084 4088 repo_id = Column(
4085 4089 "repo_id", Integer(), ForeignKey('repositories.repo_id'))
4086 4090 repo = relationship('Repository', backref='review_rules')
4087 4091
4088 4092 _branch_pattern = Column("branch_pattern", UnicodeText().with_variant(UnicodeText(255), 'mysql'), default=u'*') # glob
4089 4093 _file_pattern = Column("file_pattern", UnicodeText().with_variant(UnicodeText(255), 'mysql'), default=u'*') # glob
4090 4094
4091 4095 use_authors_for_review = Column("use_authors_for_review", Boolean(), nullable=False, default=False)
4092 4096 forbid_author_to_review = Column("forbid_author_to_review", Boolean(), nullable=False, default=False)
4093 4097 forbid_commit_author_to_review = Column("forbid_commit_author_to_review", Boolean(), nullable=False, default=False)
4094 4098 forbid_adding_reviewers = Column("forbid_adding_reviewers", Boolean(), nullable=False, default=False)
4095 4099
4096 4100 rule_users = relationship('RepoReviewRuleUser')
4097 4101 rule_user_groups = relationship('RepoReviewRuleUserGroup')
4098 4102
4099 4103 @hybrid_property
4100 4104 def branch_pattern(self):
4101 4105 return self._branch_pattern or '*'
4102 4106
4103 4107 def _validate_glob(self, value):
4104 4108 re.compile('^' + glob2re(value) + '$')
4105 4109
4106 4110 @branch_pattern.setter
4107 4111 def branch_pattern(self, value):
4108 4112 self._validate_glob(value)
4109 4113 self._branch_pattern = value or '*'
4110 4114
4111 4115 @hybrid_property
4112 4116 def file_pattern(self):
4113 4117 return self._file_pattern or '*'
4114 4118
4115 4119 @file_pattern.setter
4116 4120 def file_pattern(self, value):
4117 4121 self._validate_glob(value)
4118 4122 self._file_pattern = value or '*'
4119 4123
4120 4124 def matches(self, branch, files_changed):
4121 4125 """
4122 4126 Check if this review rule matches a branch/files in a pull request
4123 4127
4124 4128 :param branch: branch name for the commit
4125 4129 :param files_changed: list of file paths changed in the pull request
4126 4130 """
4127 4131
4128 4132 branch = branch or ''
4129 4133 files_changed = files_changed or []
4130 4134
4131 4135 branch_matches = True
4132 4136 if branch:
4133 4137 branch_regex = re.compile('^' + glob2re(self.branch_pattern) + '$')
4134 4138 branch_matches = bool(branch_regex.search(branch))
4135 4139
4136 4140 files_matches = True
4137 4141 if self.file_pattern != '*':
4138 4142 files_matches = False
4139 4143 file_regex = re.compile(glob2re(self.file_pattern))
4140 4144 for filename in files_changed:
4141 4145 if file_regex.search(filename):
4142 4146 files_matches = True
4143 4147 break
4144 4148
4145 4149 return branch_matches and files_matches
4146 4150
4147 4151 @property
4148 4152 def review_users(self):
4149 4153 """ Returns the users which this rule applies to """
4150 4154
4151 4155 users = collections.OrderedDict()
4152 4156
4153 4157 for rule_user in self.rule_users:
4154 4158 if rule_user.user.active:
4155 4159 if rule_user.user not in users:
4156 4160 users[rule_user.user.username] = {
4157 4161 'user': rule_user.user,
4158 4162 'source': 'user',
4159 4163 'source_data': {},
4160 4164 'data': rule_user.rule_data()
4161 4165 }
4162 4166
4163 4167 for rule_user_group in self.rule_user_groups:
4164 4168 source_data = {
4165 4169 'name': rule_user_group.users_group.users_group_name,
4166 4170 'members': len(rule_user_group.users_group.members)
4167 4171 }
4168 4172 for member in rule_user_group.users_group.members:
4169 4173 if member.user.active:
4170 4174 users[member.user.username] = {
4171 4175 'user': member.user,
4172 4176 'source': 'user_group',
4173 4177 'source_data': source_data,
4174 4178 'data': rule_user_group.rule_data()
4175 4179 }
4176 4180
4177 4181 return users
4178 4182
4179 4183 def __repr__(self):
4180 4184 return '<RepoReviewerRule(id=%r, repo=%r)>' % (
4181 4185 self.repo_review_rule_id, self.repo)
4182 4186
4183 4187
4184 4188 class DbMigrateVersion(Base, BaseModel):
4185 4189 __tablename__ = 'db_migrate_version'
4186 4190 __table_args__ = (
4187 4191 {'extend_existing': True, 'mysql_engine': 'InnoDB',
4188 4192 'mysql_charset': 'utf8', 'sqlite_autoincrement': True},
4189 4193 )
4190 4194 repository_id = Column('repository_id', String(250), primary_key=True)
4191 4195 repository_path = Column('repository_path', Text)
4192 4196 version = Column('version', Integer)
4193 4197
4194 4198
4195 4199 class DbSession(Base, BaseModel):
4196 4200 __tablename__ = 'db_session'
4197 4201 __table_args__ = (
4198 4202 {'extend_existing': True, 'mysql_engine': 'InnoDB',
4199 4203 'mysql_charset': 'utf8', 'sqlite_autoincrement': True},
4200 4204 )
4201 4205
4202 4206 def __repr__(self):
4203 4207 return '<DB:DbSession({})>'.format(self.id)
4204 4208
4205 4209 id = Column('id', Integer())
4206 4210 namespace = Column('namespace', String(255), primary_key=True)
4207 4211 accessed = Column('accessed', DateTime, nullable=False)
4208 4212 created = Column('created', DateTime, nullable=False)
4209 4213 data = Column('data', PickleType, nullable=False)
@@ -1,550 +1,555 b''
1 1
2 2 // tables.less
3 3 // For use in RhodeCode application tables;
4 4 // see style guide documentation for guidelines.
5 5
6 6 // TABLES
7 7
8 8 .rctable,
9 9 table.rctable,
10 10 table.dataTable {
11 11 clear:both;
12 12 width: 100%;
13 13 margin: 0 auto @padding;
14 14 padding: 0;
15 15 vertical-align: baseline;
16 16 line-height:1.5em;
17 17 border: none;
18 18 outline: none;
19 19 border-collapse: collapse;
20 20 border-spacing: 0;
21 21 color: @grey2;
22 22
23 23 b {
24 24 font-weight: normal;
25 25 }
26 26
27 27 em {
28 28 font-weight: bold;
29 29 font-style: normal;
30 30 }
31 31
32 32 th,
33 33 td {
34 34 height: auto;
35 35 max-width: 20%;
36 36 padding: .65em 1em .65em 0;
37 37 vertical-align: middle;
38 38 border-bottom: @border-thickness solid @grey5;
39 39 white-space: normal;
40 40
41 41 &.td-radio,
42 42 &.td-checkbox {
43 43 padding-right: 0;
44 44 text-align: center;
45 45
46 46 input {
47 47 margin: 0 1em;
48 48 }
49 49 }
50 50
51 51 &.truncate-wrap {
52 52 white-space: nowrap !important;
53 53 }
54 54
55 55 pre {
56 56 margin: 0;
57 57 }
58 58
59 59 .show_more {
60 60 height: inherit;
61 61 }
62 62 }
63 63
64 64 .expired td {
65 65 background-color: @grey7;
66 66 }
67 67
68 68 .td-radio + .td-owner {
69 69 padding-left: 1em;
70 70 }
71 71
72 72
73 73 th {
74 74 text-align: left;
75 75 font-family: @text-semibold;
76 76 }
77 77
78 78 .hl {
79 79 td {
80 80 background-color: lighten(@alert4,25%);
81 81 }
82 82 }
83 83
84 84 // Special Data Cell Types
85 85 // See style guide for desciptions and examples.
86 86
87 87 td {
88 88
89 89 &.user {
90 90 padding-left: 1em;
91 91 }
92 92
93 93 &.td-rss {
94 94 width: 20px;
95 95 min-width: 0;
96 96 margin: 0;
97 97 }
98 98
99 99 &.quick_repo_menu {
100 100 width: 15px;
101 101 text-align: center;
102 102
103 103 &:hover {
104 104 background-color: @grey5;
105 105 }
106 106 }
107 107
108 108 &.td-hash {
109 109 min-width: 80px;
110 110 width: 200px;
111 111
112 112 .obsolete {
113 113 text-decoration: line-through;
114 114 color: lighten(@grey2,25%);
115 115 }
116 116 }
117 117
118 118 &.td-time {
119 119 width: 160px;
120 120 white-space: nowrap;
121 121 }
122 122
123 123 &.annotate{
124 124 padding-right: 0;
125 125
126 126 div.annotatediv{
127 127 margin: 0 0.7em;
128 128 }
129 129 }
130 130
131 131 &.tags-col {
132 132 padding-right: 0;
133 133 }
134 134
135 135 &.td-description {
136 136 min-width: 350px;
137 137
138 138 &.truncate, .truncate-wrap {
139 139 white-space: nowrap;
140 140 overflow: hidden;
141 141 text-overflow: ellipsis;
142 142 max-width: 450px;
143 143 }
144 144 }
145 145
146 146 &.td-componentname {
147 147 white-space: nowrap;
148 148 }
149 149
150 150 &.td-name {
151 151
152 152 }
153 153
154 154 &.td-journalaction {
155 155 min-width: 300px;
156 156
157 157 .journal_action_params {
158 158 // waiting for feedback
159 159 }
160 160 }
161 161
162 162 &.td-active {
163 163 padding-left: .65em;
164 164 }
165 165
166 166 &.td-url {
167 167 white-space: nowrap;
168 168 }
169 169
170 170 &.td-comments {
171 171 min-width: 3em;
172 172 }
173 173
174 174 &.td-buttons {
175 175 padding: .3em 0;
176 176 }
177 177
178 178 &.td-action {
179 179 // this is for the remove/delete/edit buttons
180 180 padding-right: 0;
181 181 min-width: 95px;
182 182 text-transform: capitalize;
183 183
184 184 i {
185 185 display: none;
186 186 }
187 187 }
188 188
189 189 // TODO: lisa: this needs to be cleaned up with the buttons
190 190 .grid_edit,
191 191 .grid_delete {
192 192 display: inline-block;
193 193 margin: 0 @padding/3 0 0;
194 194 font-family: @text-light;
195 195
196 196 i {
197 197 display: none;
198 198 }
199 199 }
200 200
201 201 .grid_edit + .grid_delete {
202 202 border-left: @border-thickness solid @grey5;
203 203 padding-left: @padding/2;
204 204 }
205 205
206 206 &.td-compare {
207 207
208 208 input {
209 209 margin-right: 1em;
210 210 }
211 211
212 212 .compare-radio-button {
213 213 margin: 0 1em 0 0;
214 214 }
215 215
216 216
217 217 }
218 218
219 219 &.td-tags {
220 220 padding: .5em 1em .5em 0;
221 221 width: 140px;
222 222
223 223 .tag {
224 224 margin: 1px;
225 225 float: left;
226 226 }
227 227 }
228 228
229 229 .icon-svn, .icon-hg, .icon-git {
230 230 font-size: 1.4em;
231 231 }
232 232
233 233 &.collapse_commit,
234 234 &.expand_commit {
235 235 padding-right: 0;
236 236 padding-left: 1em;
237 237 }
238 238 }
239 239
240 240 .perm_admin_row {
241 241 color: @grey4;
242 242 background-color: @grey6;
243 243 }
244 244
245 245 .noborder {
246 246 border: none;
247 247
248 248 td {
249 249 border: none;
250 250 }
251 251 }
252 252 }
253 .rctable.audit-log {
254 td {
255 vertical-align: top;
256 }
257 }
253 258
254 259 // TRUNCATING
255 260 // TODO: lisaq: should this possibly be moved out of tables.less?
256 261 // for truncated text
257 262 // used inside of table cells and in code block headers
258 263 .truncate-wrap {
259 264 white-space: nowrap !important;
260 265
261 266 //truncated text
262 267 .truncate {
263 268 max-width: 450px;
264 269 width: 300px;
265 270 overflow: hidden;
266 271 text-overflow: ellipsis;
267 272 -o-text-overflow: ellipsis;
268 273 -ms-text-overflow: ellipsis;
269 274
270 275 &.autoexpand {
271 276 width: 120px;
272 277 margin-right: 200px;
273 278 }
274 279 }
275 280 &:hover .truncate.autoexpand {
276 281 overflow: visible;
277 282 }
278 283
279 284 .tags-truncate {
280 285 width: 150px;
281 286 height: 22px;
282 287 overflow: hidden;
283 288
284 289 .tag {
285 290 display: inline-block;
286 291 }
287 292
288 293 &.truncate {
289 294 height: 22px;
290 295 max-height:2em;
291 296 width: 140px;
292 297 }
293 298 }
294 299 }
295 300
296 301 .apikeys_wrap {
297 302 margin-bottom: @padding;
298 303
299 304 table.rctable td:first-child {
300 305 width: 340px;
301 306 }
302 307 }
303 308
304 309
305 310
306 311 // SPECIAL CASES
307 312
308 313 // Repository Followers
309 314 table.rctable.followers_data {
310 315 width: 75%;
311 316 margin: 0;
312 317 }
313 318
314 319 // Repository List
315 320 // Group Members List
316 321 table.rctable.group_members,
317 322 table#repo_list_table {
318 323 min-width: 600px;
319 324 }
320 325
321 326 // Keyboard mappings
322 327 table.keyboard-mappings {
323 328 th {
324 329 text-align: left;
325 330 font-family: @text-semibold;
326 331 }
327 332 }
328 333
329 334 // Branches, Tags, and Bookmarks
330 335 #obj_list_table.dataTable {
331 336 td.td-time {
332 337 padding-right: 1em;
333 338 }
334 339 }
335 340
336 341 // User Admin
337 342 .rctable.useremails,
338 343 .rctable.account_emails {
339 344 .tag,
340 345 .btn {
341 346 float: right;
342 347 }
343 348 .btn { //to line up with tags
344 349 margin-right: 1.65em;
345 350 }
346 351 }
347 352
348 353 // User List
349 354 #user_list_table {
350 355
351 356 td.td-user {
352 357 min-width: 100px;
353 358 }
354 359 }
355 360
356 361 // Pull Request List Table
357 362 #pull_request_list_table.dataTable {
358 363
359 364 //TODO: lisa: This needs to be removed once the description is adjusted
360 365 // for using an expand_commit button (see issue 765)
361 366 td {
362 367 vertical-align: middle;
363 368 }
364 369 }
365 370
366 371 // Settings (no border)
367 372 table.rctable.dl-settings {
368 373 td {
369 374 border: none;
370 375 }
371 376 }
372 377
373 378
374 379 // Statistics
375 380 table.trending_language_tbl {
376 381 width: 100%;
377 382 line-height: 1em;
378 383
379 384 td div {
380 385 overflow: visible;
381 386 }
382 387 }
383 388
384 389 .trending_language_tbl, .trending_language_tbl td {
385 390 border: 0;
386 391 margin: 0;
387 392 padding: 0;
388 393 background: transparent;
389 394 }
390 395
391 396 .trending_language_tbl, .trending_language_tbl tr {
392 397 border-spacing: 0 3px;
393 398 }
394 399
395 400 .trending_language {
396 401 position: relative;
397 402 width: 100%;
398 403 height: 19px;
399 404 overflow: hidden;
400 405 background-color: @grey6;
401 406
402 407 span, b{
403 408 position: absolute;
404 409 display: block;
405 410 height: 12px;
406 411 margin-bottom: 0px;
407 412 white-space: pre;
408 413 padding: floor(@basefontsize/4);
409 414 top: 0;
410 415 left: 0;
411 416 }
412 417
413 418 span{
414 419 color: @text-color;
415 420 z-index: 0;
416 421 min-width: 20px;
417 422 }
418 423
419 424 b {
420 425 z-index: 1;
421 426 overflow: hidden;
422 427 background-color: @rcblue;
423 428 color: #FFF;
424 429 text-decoration: none;
425 430 }
426 431
427 432 }
428 433
429 434 // Changesets
430 435 #changesets.rctable {
431 436
432 437 // td must be fixed height for graph
433 438 td {
434 439 height: 32px;
435 440 padding: 0 1em 0 0;
436 441 vertical-align: middle;
437 442 white-space: nowrap;
438 443
439 444 &.td-description {
440 445 white-space: normal;
441 446 }
442 447
443 448 &.expand_commit {
444 449 padding-right: 0;
445 450 }
446 451 }
447 452 }
448 453
449 454 // Compare
450 455 table.compare_view_commits {
451 456 margin-top: @space;
452 457
453 458 td.td-time {
454 459 padding-left: .5em;
455 460 }
456 461
457 462 // special case to not show hover actions on hidden indicator
458 463 tr.compare_select_hidden:hover {
459 464 cursor: inherit;
460 465
461 466 td {
462 467 background-color: inherit;
463 468 }
464 469 }
465 470
466 471 tr:hover {
467 472 cursor: pointer;
468 473
469 474 td {
470 475 background-color: lighten(@alert4,25%);
471 476 }
472 477 }
473 478
474 479
475 480 }
476 481
477 482 .file_history {
478 483 td.td-actions {
479 484 text-align: right;
480 485 }
481 486 }
482 487
483 488 .compare_view_files {
484 489
485 490 td.td-actions {
486 491 text-align: right;
487 492 }
488 493
489 494 .flag_status {
490 495 margin: 0 0 0 5px;
491 496 }
492 497
493 498 td.injected_diff {
494 499
495 500 .code-difftable {
496 501 border:none;
497 502 }
498 503
499 504 .diff-container {
500 505 border: @border-thickness solid @border-default-color;
501 506 .border-radius(@border-radius);
502 507 }
503 508
504 509 div.diffblock {
505 510 border:none;
506 511 }
507 512
508 513 div.code-body {
509 514 max-width: 1152px;
510 515 }
511 516 }
512 517
513 518 .rctable {
514 519
515 520 td {
516 521 padding-top: @space;
517 522 }
518 523
519 524 &:first-child td {
520 525 padding-top: 0;
521 526 }
522 527 }
523 528
524 529 .comment-bubble,
525 530 .show_comments {
526 531 float: right;
527 532 visibility: hidden;
528 533 padding: 0 1em 0 0;
529 534 }
530 535
531 536 .injected_diff {
532 537 padding-bottom: @padding;
533 538 }
534 539 }
535 540
536 541 // Gist List
537 542 #gist_list_table {
538 543 td {
539 544 vertical-align: middle;
540 545
541 546 div{
542 547 display: inline-block;
543 548 vertical-align: middle;
544 549 }
545 550
546 551 img{
547 552 vertical-align: middle;
548 553 }
549 554 }
550 555 }
@@ -1,273 +1,274 b''
1 1
2 2 /******************************************************************************
3 3 * *
4 4 * DO NOT CHANGE THIS FILE MANUALLY *
5 5 * *
6 6 * *
7 7 * This file is automatically generated when the app starts up with *
8 8 * generate_js_files = true *
9 9 * *
10 10 * To add a route here pass jsroute=True to the route definition in the app *
11 11 * *
12 12 ******************************************************************************/
13 13 function registerRCRoutes() {
14 14 // routes registration
15 15 pyroutes.register('edit_user', '/_admin/users/%(user_id)s/edit', ['user_id']);
16 16 pyroutes.register('favicon', '/favicon.ico', []);
17 17 pyroutes.register('robots', '/robots.txt', []);
18 18 pyroutes.register('auth_home', '/_admin/auth*traverse', []);
19 19 pyroutes.register('global_integrations_new', '/_admin/integrations/new', []);
20 20 pyroutes.register('global_integrations_home', '/_admin/integrations', []);
21 21 pyroutes.register('global_integrations_list', '/_admin/integrations/%(integration)s', ['integration']);
22 22 pyroutes.register('global_integrations_create', '/_admin/integrations/%(integration)s/new', ['integration']);
23 23 pyroutes.register('global_integrations_edit', '/_admin/integrations/%(integration)s/%(integration_id)s', ['integration', 'integration_id']);
24 24 pyroutes.register('repo_group_integrations_home', '/%(repo_group_name)s/settings/integrations', ['repo_group_name']);
25 25 pyroutes.register('repo_group_integrations_new', '/%(repo_group_name)s/settings/integrations/new', ['repo_group_name']);
26 26 pyroutes.register('repo_group_integrations_list', '/%(repo_group_name)s/settings/integrations/%(integration)s', ['repo_group_name', 'integration']);
27 27 pyroutes.register('repo_group_integrations_create', '/%(repo_group_name)s/settings/integrations/%(integration)s/new', ['repo_group_name', 'integration']);
28 28 pyroutes.register('repo_group_integrations_edit', '/%(repo_group_name)s/settings/integrations/%(integration)s/%(integration_id)s', ['repo_group_name', 'integration', 'integration_id']);
29 29 pyroutes.register('repo_integrations_home', '/%(repo_name)s/settings/integrations', ['repo_name']);
30 30 pyroutes.register('repo_integrations_new', '/%(repo_name)s/settings/integrations/new', ['repo_name']);
31 31 pyroutes.register('repo_integrations_list', '/%(repo_name)s/settings/integrations/%(integration)s', ['repo_name', 'integration']);
32 32 pyroutes.register('repo_integrations_create', '/%(repo_name)s/settings/integrations/%(integration)s/new', ['repo_name', 'integration']);
33 33 pyroutes.register('repo_integrations_edit', '/%(repo_name)s/settings/integrations/%(integration)s/%(integration_id)s', ['repo_name', 'integration', 'integration_id']);
34 34 pyroutes.register('ops_ping', '/_admin/ops/ping', []);
35 35 pyroutes.register('ops_error_test', '/_admin/ops/error', []);
36 36 pyroutes.register('ops_redirect_test', '/_admin/ops/redirect', []);
37 37 pyroutes.register('ops_ping_legacy', '/_admin/ping', []);
38 38 pyroutes.register('ops_error_test_legacy', '/_admin/error_test', []);
39 39 pyroutes.register('admin_home', '/_admin', []);
40 40 pyroutes.register('admin_audit_logs', '/_admin/audit_logs', []);
41 pyroutes.register('admin_audit_log_entry', '/_admin/audit_logs/%(audit_log_id)s', ['audit_log_id']);
41 42 pyroutes.register('pull_requests_global_0', '/_admin/pull_requests/%(pull_request_id)s', ['pull_request_id']);
42 43 pyroutes.register('pull_requests_global_1', '/_admin/pull-requests/%(pull_request_id)s', ['pull_request_id']);
43 44 pyroutes.register('pull_requests_global', '/_admin/pull-request/%(pull_request_id)s', ['pull_request_id']);
44 45 pyroutes.register('admin_settings_open_source', '/_admin/settings/open_source', []);
45 46 pyroutes.register('admin_settings_vcs_svn_generate_cfg', '/_admin/settings/vcs/svn_generate_cfg', []);
46 47 pyroutes.register('admin_settings_system', '/_admin/settings/system', []);
47 48 pyroutes.register('admin_settings_system_update', '/_admin/settings/system/updates', []);
48 49 pyroutes.register('admin_settings_sessions', '/_admin/settings/sessions', []);
49 50 pyroutes.register('admin_settings_sessions_cleanup', '/_admin/settings/sessions/cleanup', []);
50 51 pyroutes.register('admin_settings_process_management', '/_admin/settings/process_management', []);
51 52 pyroutes.register('admin_settings_process_management_signal', '/_admin/settings/process_management/signal', []);
52 53 pyroutes.register('admin_defaults_repositories', '/_admin/defaults/repositories', []);
53 54 pyroutes.register('admin_defaults_repositories_update', '/_admin/defaults/repositories/update', []);
54 55 pyroutes.register('admin_permissions_application', '/_admin/permissions/application', []);
55 56 pyroutes.register('admin_permissions_application_update', '/_admin/permissions/application/update', []);
56 57 pyroutes.register('admin_permissions_global', '/_admin/permissions/global', []);
57 58 pyroutes.register('admin_permissions_global_update', '/_admin/permissions/global/update', []);
58 59 pyroutes.register('admin_permissions_object', '/_admin/permissions/object', []);
59 60 pyroutes.register('admin_permissions_object_update', '/_admin/permissions/object/update', []);
60 61 pyroutes.register('admin_permissions_ips', '/_admin/permissions/ips', []);
61 62 pyroutes.register('admin_permissions_overview', '/_admin/permissions/overview', []);
62 63 pyroutes.register('admin_permissions_auth_token_access', '/_admin/permissions/auth_token_access', []);
63 64 pyroutes.register('admin_permissions_ssh_keys', '/_admin/permissions/ssh_keys', []);
64 65 pyroutes.register('admin_permissions_ssh_keys_data', '/_admin/permissions/ssh_keys/data', []);
65 66 pyroutes.register('admin_permissions_ssh_keys_update', '/_admin/permissions/ssh_keys/update', []);
66 67 pyroutes.register('users', '/_admin/users', []);
67 68 pyroutes.register('users_data', '/_admin/users_data', []);
68 69 pyroutes.register('edit_user_auth_tokens', '/_admin/users/%(user_id)s/edit/auth_tokens', ['user_id']);
69 70 pyroutes.register('edit_user_auth_tokens_add', '/_admin/users/%(user_id)s/edit/auth_tokens/new', ['user_id']);
70 71 pyroutes.register('edit_user_auth_tokens_delete', '/_admin/users/%(user_id)s/edit/auth_tokens/delete', ['user_id']);
71 72 pyroutes.register('edit_user_ssh_keys', '/_admin/users/%(user_id)s/edit/ssh_keys', ['user_id']);
72 73 pyroutes.register('edit_user_ssh_keys_generate_keypair', '/_admin/users/%(user_id)s/edit/ssh_keys/generate', ['user_id']);
73 74 pyroutes.register('edit_user_ssh_keys_add', '/_admin/users/%(user_id)s/edit/ssh_keys/new', ['user_id']);
74 75 pyroutes.register('edit_user_ssh_keys_delete', '/_admin/users/%(user_id)s/edit/ssh_keys/delete', ['user_id']);
75 76 pyroutes.register('edit_user_emails', '/_admin/users/%(user_id)s/edit/emails', ['user_id']);
76 77 pyroutes.register('edit_user_emails_add', '/_admin/users/%(user_id)s/edit/emails/new', ['user_id']);
77 78 pyroutes.register('edit_user_emails_delete', '/_admin/users/%(user_id)s/edit/emails/delete', ['user_id']);
78 79 pyroutes.register('edit_user_ips', '/_admin/users/%(user_id)s/edit/ips', ['user_id']);
79 80 pyroutes.register('edit_user_ips_add', '/_admin/users/%(user_id)s/edit/ips/new', ['user_id']);
80 81 pyroutes.register('edit_user_ips_delete', '/_admin/users/%(user_id)s/edit/ips/delete', ['user_id']);
81 82 pyroutes.register('edit_user_perms_summary', '/_admin/users/%(user_id)s/edit/permissions_summary', ['user_id']);
82 83 pyroutes.register('edit_user_perms_summary_json', '/_admin/users/%(user_id)s/edit/permissions_summary/json', ['user_id']);
83 84 pyroutes.register('edit_user_groups_management', '/_admin/users/%(user_id)s/edit/groups_management', ['user_id']);
84 85 pyroutes.register('edit_user_groups_management_updates', '/_admin/users/%(user_id)s/edit/edit_user_groups_management/updates', ['user_id']);
85 86 pyroutes.register('edit_user_audit_logs', '/_admin/users/%(user_id)s/edit/audit', ['user_id']);
86 87 pyroutes.register('user_groups', '/_admin/user_groups', []);
87 88 pyroutes.register('user_groups_data', '/_admin/user_groups_data', []);
88 89 pyroutes.register('user_groups_new', '/_admin/user_groups/new', []);
89 90 pyroutes.register('user_groups_create', '/_admin/user_groups/create', []);
90 91 pyroutes.register('repos', '/_admin/repos', []);
91 92 pyroutes.register('repo_new', '/_admin/repos/new', []);
92 93 pyroutes.register('repo_create', '/_admin/repos/create', []);
93 94 pyroutes.register('channelstream_connect', '/_admin/channelstream/connect', []);
94 95 pyroutes.register('channelstream_subscribe', '/_admin/channelstream/subscribe', []);
95 96 pyroutes.register('channelstream_proxy', '/_channelstream', []);
96 97 pyroutes.register('login', '/_admin/login', []);
97 98 pyroutes.register('logout', '/_admin/logout', []);
98 99 pyroutes.register('register', '/_admin/register', []);
99 100 pyroutes.register('reset_password', '/_admin/password_reset', []);
100 101 pyroutes.register('reset_password_confirmation', '/_admin/password_reset_confirmation', []);
101 102 pyroutes.register('home', '/', []);
102 103 pyroutes.register('user_autocomplete_data', '/_users', []);
103 104 pyroutes.register('user_group_autocomplete_data', '/_user_groups', []);
104 105 pyroutes.register('repo_list_data', '/_repos', []);
105 106 pyroutes.register('goto_switcher_data', '/_goto_data', []);
106 107 pyroutes.register('journal', '/_admin/journal', []);
107 108 pyroutes.register('journal_rss', '/_admin/journal/rss', []);
108 109 pyroutes.register('journal_atom', '/_admin/journal/atom', []);
109 110 pyroutes.register('journal_public', '/_admin/public_journal', []);
110 111 pyroutes.register('journal_public_atom', '/_admin/public_journal/atom', []);
111 112 pyroutes.register('journal_public_atom_old', '/_admin/public_journal_atom', []);
112 113 pyroutes.register('journal_public_rss', '/_admin/public_journal/rss', []);
113 114 pyroutes.register('journal_public_rss_old', '/_admin/public_journal_rss', []);
114 115 pyroutes.register('toggle_following', '/_admin/toggle_following', []);
115 116 pyroutes.register('repo_creating', '/%(repo_name)s/repo_creating', ['repo_name']);
116 117 pyroutes.register('repo_creating_check', '/%(repo_name)s/repo_creating_check', ['repo_name']);
117 118 pyroutes.register('repo_summary_explicit', '/%(repo_name)s/summary', ['repo_name']);
118 119 pyroutes.register('repo_summary_commits', '/%(repo_name)s/summary-commits', ['repo_name']);
119 120 pyroutes.register('repo_commit', '/%(repo_name)s/changeset/%(commit_id)s', ['repo_name', 'commit_id']);
120 121 pyroutes.register('repo_commit_children', '/%(repo_name)s/changeset_children/%(commit_id)s', ['repo_name', 'commit_id']);
121 122 pyroutes.register('repo_commit_parents', '/%(repo_name)s/changeset_parents/%(commit_id)s', ['repo_name', 'commit_id']);
122 123 pyroutes.register('repo_commit_raw', '/%(repo_name)s/changeset-diff/%(commit_id)s', ['repo_name', 'commit_id']);
123 124 pyroutes.register('repo_commit_patch', '/%(repo_name)s/changeset-patch/%(commit_id)s', ['repo_name', 'commit_id']);
124 125 pyroutes.register('repo_commit_download', '/%(repo_name)s/changeset-download/%(commit_id)s', ['repo_name', 'commit_id']);
125 126 pyroutes.register('repo_commit_data', '/%(repo_name)s/changeset-data/%(commit_id)s', ['repo_name', 'commit_id']);
126 127 pyroutes.register('repo_commit_comment_create', '/%(repo_name)s/changeset/%(commit_id)s/comment/create', ['repo_name', 'commit_id']);
127 128 pyroutes.register('repo_commit_comment_preview', '/%(repo_name)s/changeset/%(commit_id)s/comment/preview', ['repo_name', 'commit_id']);
128 129 pyroutes.register('repo_commit_comment_delete', '/%(repo_name)s/changeset/%(commit_id)s/comment/%(comment_id)s/delete', ['repo_name', 'commit_id', 'comment_id']);
129 130 pyroutes.register('repo_commit_raw_deprecated', '/%(repo_name)s/raw-changeset/%(commit_id)s', ['repo_name', 'commit_id']);
130 131 pyroutes.register('repo_archivefile', '/%(repo_name)s/archive/%(fname)s', ['repo_name', 'fname']);
131 132 pyroutes.register('repo_files_diff', '/%(repo_name)s/diff/%(f_path)s', ['repo_name', 'f_path']);
132 133 pyroutes.register('repo_files_diff_2way_redirect', '/%(repo_name)s/diff-2way/%(f_path)s', ['repo_name', 'f_path']);
133 134 pyroutes.register('repo_files', '/%(repo_name)s/files/%(commit_id)s/%(f_path)s', ['repo_name', 'commit_id', 'f_path']);
134 135 pyroutes.register('repo_files:default_path', '/%(repo_name)s/files/%(commit_id)s/', ['repo_name', 'commit_id']);
135 136 pyroutes.register('repo_files:default_commit', '/%(repo_name)s/files', ['repo_name']);
136 137 pyroutes.register('repo_files:rendered', '/%(repo_name)s/render/%(commit_id)s/%(f_path)s', ['repo_name', 'commit_id', 'f_path']);
137 138 pyroutes.register('repo_files:annotated', '/%(repo_name)s/annotate/%(commit_id)s/%(f_path)s', ['repo_name', 'commit_id', 'f_path']);
138 139 pyroutes.register('repo_files:annotated_previous', '/%(repo_name)s/annotate-previous/%(commit_id)s/%(f_path)s', ['repo_name', 'commit_id', 'f_path']);
139 140 pyroutes.register('repo_nodetree_full', '/%(repo_name)s/nodetree_full/%(commit_id)s/%(f_path)s', ['repo_name', 'commit_id', 'f_path']);
140 141 pyroutes.register('repo_nodetree_full:default_path', '/%(repo_name)s/nodetree_full/%(commit_id)s/', ['repo_name', 'commit_id']);
141 142 pyroutes.register('repo_files_nodelist', '/%(repo_name)s/nodelist/%(commit_id)s/%(f_path)s', ['repo_name', 'commit_id', 'f_path']);
142 143 pyroutes.register('repo_file_raw', '/%(repo_name)s/raw/%(commit_id)s/%(f_path)s', ['repo_name', 'commit_id', 'f_path']);
143 144 pyroutes.register('repo_file_download', '/%(repo_name)s/download/%(commit_id)s/%(f_path)s', ['repo_name', 'commit_id', 'f_path']);
144 145 pyroutes.register('repo_file_download:legacy', '/%(repo_name)s/rawfile/%(commit_id)s/%(f_path)s', ['repo_name', 'commit_id', 'f_path']);
145 146 pyroutes.register('repo_file_history', '/%(repo_name)s/history/%(commit_id)s/%(f_path)s', ['repo_name', 'commit_id', 'f_path']);
146 147 pyroutes.register('repo_file_authors', '/%(repo_name)s/authors/%(commit_id)s/%(f_path)s', ['repo_name', 'commit_id', 'f_path']);
147 148 pyroutes.register('repo_files_remove_file', '/%(repo_name)s/remove_file/%(commit_id)s/%(f_path)s', ['repo_name', 'commit_id', 'f_path']);
148 149 pyroutes.register('repo_files_delete_file', '/%(repo_name)s/delete_file/%(commit_id)s/%(f_path)s', ['repo_name', 'commit_id', 'f_path']);
149 150 pyroutes.register('repo_files_edit_file', '/%(repo_name)s/edit_file/%(commit_id)s/%(f_path)s', ['repo_name', 'commit_id', 'f_path']);
150 151 pyroutes.register('repo_files_update_file', '/%(repo_name)s/update_file/%(commit_id)s/%(f_path)s', ['repo_name', 'commit_id', 'f_path']);
151 152 pyroutes.register('repo_files_add_file', '/%(repo_name)s/add_file/%(commit_id)s/%(f_path)s', ['repo_name', 'commit_id', 'f_path']);
152 153 pyroutes.register('repo_files_create_file', '/%(repo_name)s/create_file/%(commit_id)s/%(f_path)s', ['repo_name', 'commit_id', 'f_path']);
153 154 pyroutes.register('repo_refs_data', '/%(repo_name)s/refs-data', ['repo_name']);
154 155 pyroutes.register('repo_refs_changelog_data', '/%(repo_name)s/refs-data-changelog', ['repo_name']);
155 156 pyroutes.register('repo_stats', '/%(repo_name)s/repo_stats/%(commit_id)s', ['repo_name', 'commit_id']);
156 157 pyroutes.register('repo_changelog', '/%(repo_name)s/changelog', ['repo_name']);
157 158 pyroutes.register('repo_changelog_file', '/%(repo_name)s/changelog/%(commit_id)s/%(f_path)s', ['repo_name', 'commit_id', 'f_path']);
158 159 pyroutes.register('repo_changelog_elements', '/%(repo_name)s/changelog_elements', ['repo_name']);
159 160 pyroutes.register('repo_compare_select', '/%(repo_name)s/compare', ['repo_name']);
160 161 pyroutes.register('repo_compare', '/%(repo_name)s/compare/%(source_ref_type)s@%(source_ref)s...%(target_ref_type)s@%(target_ref)s', ['repo_name', 'source_ref_type', 'source_ref', 'target_ref_type', 'target_ref']);
161 162 pyroutes.register('tags_home', '/%(repo_name)s/tags', ['repo_name']);
162 163 pyroutes.register('branches_home', '/%(repo_name)s/branches', ['repo_name']);
163 164 pyroutes.register('bookmarks_home', '/%(repo_name)s/bookmarks', ['repo_name']);
164 165 pyroutes.register('repo_fork_new', '/%(repo_name)s/fork', ['repo_name']);
165 166 pyroutes.register('repo_fork_create', '/%(repo_name)s/fork/create', ['repo_name']);
166 167 pyroutes.register('repo_forks_show_all', '/%(repo_name)s/forks', ['repo_name']);
167 168 pyroutes.register('repo_forks_data', '/%(repo_name)s/forks/data', ['repo_name']);
168 169 pyroutes.register('pullrequest_show', '/%(repo_name)s/pull-request/%(pull_request_id)s', ['repo_name', 'pull_request_id']);
169 170 pyroutes.register('pullrequest_show_all', '/%(repo_name)s/pull-request', ['repo_name']);
170 171 pyroutes.register('pullrequest_show_all_data', '/%(repo_name)s/pull-request-data', ['repo_name']);
171 172 pyroutes.register('pullrequest_repo_refs', '/%(repo_name)s/pull-request/refs/%(target_repo_name)s', ['repo_name', 'target_repo_name']);
172 173 pyroutes.register('pullrequest_repo_destinations', '/%(repo_name)s/pull-request/repo-destinations', ['repo_name']);
173 174 pyroutes.register('pullrequest_new', '/%(repo_name)s/pull-request/new', ['repo_name']);
174 175 pyroutes.register('pullrequest_create', '/%(repo_name)s/pull-request/create', ['repo_name']);
175 176 pyroutes.register('pullrequest_update', '/%(repo_name)s/pull-request/%(pull_request_id)s/update', ['repo_name', 'pull_request_id']);
176 177 pyroutes.register('pullrequest_merge', '/%(repo_name)s/pull-request/%(pull_request_id)s/merge', ['repo_name', 'pull_request_id']);
177 178 pyroutes.register('pullrequest_delete', '/%(repo_name)s/pull-request/%(pull_request_id)s/delete', ['repo_name', 'pull_request_id']);
178 179 pyroutes.register('pullrequest_comment_create', '/%(repo_name)s/pull-request/%(pull_request_id)s/comment', ['repo_name', 'pull_request_id']);
179 180 pyroutes.register('pullrequest_comment_delete', '/%(repo_name)s/pull-request/%(pull_request_id)s/comment/%(comment_id)s/delete', ['repo_name', 'pull_request_id', 'comment_id']);
180 181 pyroutes.register('edit_repo', '/%(repo_name)s/settings', ['repo_name']);
181 182 pyroutes.register('edit_repo_advanced', '/%(repo_name)s/settings/advanced', ['repo_name']);
182 183 pyroutes.register('edit_repo_advanced_delete', '/%(repo_name)s/settings/advanced/delete', ['repo_name']);
183 184 pyroutes.register('edit_repo_advanced_locking', '/%(repo_name)s/settings/advanced/locking', ['repo_name']);
184 185 pyroutes.register('edit_repo_advanced_journal', '/%(repo_name)s/settings/advanced/journal', ['repo_name']);
185 186 pyroutes.register('edit_repo_advanced_fork', '/%(repo_name)s/settings/advanced/fork', ['repo_name']);
186 187 pyroutes.register('edit_repo_caches', '/%(repo_name)s/settings/caches', ['repo_name']);
187 188 pyroutes.register('edit_repo_perms', '/%(repo_name)s/settings/permissions', ['repo_name']);
188 189 pyroutes.register('edit_repo_maintenance', '/%(repo_name)s/settings/maintenance', ['repo_name']);
189 190 pyroutes.register('edit_repo_maintenance_execute', '/%(repo_name)s/settings/maintenance/execute', ['repo_name']);
190 191 pyroutes.register('edit_repo_fields', '/%(repo_name)s/settings/fields', ['repo_name']);
191 192 pyroutes.register('edit_repo_fields_create', '/%(repo_name)s/settings/fields/create', ['repo_name']);
192 193 pyroutes.register('edit_repo_fields_delete', '/%(repo_name)s/settings/fields/%(field_id)s/delete', ['repo_name', 'field_id']);
193 194 pyroutes.register('repo_edit_toggle_locking', '/%(repo_name)s/settings/toggle_locking', ['repo_name']);
194 195 pyroutes.register('edit_repo_remote', '/%(repo_name)s/settings/remote', ['repo_name']);
195 196 pyroutes.register('edit_repo_remote_pull', '/%(repo_name)s/settings/remote/pull', ['repo_name']);
196 197 pyroutes.register('edit_repo_statistics', '/%(repo_name)s/settings/statistics', ['repo_name']);
197 198 pyroutes.register('edit_repo_statistics_reset', '/%(repo_name)s/settings/statistics/update', ['repo_name']);
198 199 pyroutes.register('edit_repo_issuetracker', '/%(repo_name)s/settings/issue_trackers', ['repo_name']);
199 200 pyroutes.register('edit_repo_issuetracker_test', '/%(repo_name)s/settings/issue_trackers/test', ['repo_name']);
200 201 pyroutes.register('edit_repo_issuetracker_delete', '/%(repo_name)s/settings/issue_trackers/delete', ['repo_name']);
201 202 pyroutes.register('edit_repo_issuetracker_update', '/%(repo_name)s/settings/issue_trackers/update', ['repo_name']);
202 203 pyroutes.register('edit_repo_vcs', '/%(repo_name)s/settings/vcs', ['repo_name']);
203 204 pyroutes.register('edit_repo_vcs_update', '/%(repo_name)s/settings/vcs/update', ['repo_name']);
204 205 pyroutes.register('edit_repo_vcs_svn_pattern_delete', '/%(repo_name)s/settings/vcs/svn_pattern/delete', ['repo_name']);
205 206 pyroutes.register('repo_reviewers', '/%(repo_name)s/settings/review/rules', ['repo_name']);
206 207 pyroutes.register('repo_default_reviewers_data', '/%(repo_name)s/settings/review/default-reviewers', ['repo_name']);
207 208 pyroutes.register('edit_repo_strip', '/%(repo_name)s/settings/strip', ['repo_name']);
208 209 pyroutes.register('strip_check', '/%(repo_name)s/settings/strip_check', ['repo_name']);
209 210 pyroutes.register('strip_execute', '/%(repo_name)s/settings/strip_execute', ['repo_name']);
210 211 pyroutes.register('rss_feed_home', '/%(repo_name)s/feed/rss', ['repo_name']);
211 212 pyroutes.register('atom_feed_home', '/%(repo_name)s/feed/atom', ['repo_name']);
212 213 pyroutes.register('repo_summary', '/%(repo_name)s', ['repo_name']);
213 214 pyroutes.register('repo_summary_slash', '/%(repo_name)s/', ['repo_name']);
214 215 pyroutes.register('repo_group_home', '/%(repo_group_name)s', ['repo_group_name']);
215 216 pyroutes.register('repo_group_home_slash', '/%(repo_group_name)s/', ['repo_group_name']);
216 217 pyroutes.register('user_group_members_data', '/_admin/user_groups/%(user_group_id)s/members', ['user_group_id']);
217 218 pyroutes.register('edit_user_group_perms_summary', '/_admin/user_groups/%(user_group_id)s/edit/permissions_summary', ['user_group_id']);
218 219 pyroutes.register('edit_user_group_perms_summary_json', '/_admin/user_groups/%(user_group_id)s/edit/permissions_summary/json', ['user_group_id']);
219 220 pyroutes.register('edit_user_group', '/_admin/user_groups/%(user_group_id)s/edit', ['user_group_id']);
220 221 pyroutes.register('user_groups_update', '/_admin/user_groups/%(user_group_id)s/update', ['user_group_id']);
221 222 pyroutes.register('edit_user_group_global_perms', '/_admin/user_groups/%(user_group_id)s/edit/global_permissions', ['user_group_id']);
222 223 pyroutes.register('edit_user_group_global_perms_update', '/_admin/user_groups/%(user_group_id)s/edit/global_permissions/update', ['user_group_id']);
223 224 pyroutes.register('edit_user_group_perms', '/_admin/user_groups/%(user_group_id)s/edit/permissions', ['user_group_id']);
224 225 pyroutes.register('edit_user_group_perms_update', '/_admin/user_groups/%(user_group_id)s/edit/permissions/update', ['user_group_id']);
225 226 pyroutes.register('edit_user_group_advanced', '/_admin/user_groups/%(user_group_id)s/edit/advanced', ['user_group_id']);
226 227 pyroutes.register('edit_user_group_advanced_sync', '/_admin/user_groups/%(user_group_id)s/edit/advanced/sync', ['user_group_id']);
227 228 pyroutes.register('user_groups_delete', '/_admin/user_groups/%(user_group_id)s/delete', ['user_group_id']);
228 229 pyroutes.register('search', '/_admin/search', []);
229 230 pyroutes.register('search_repo', '/%(repo_name)s/search', ['repo_name']);
230 231 pyroutes.register('user_profile', '/_profiles/%(username)s', ['username']);
231 232 pyroutes.register('my_account_profile', '/_admin/my_account/profile', []);
232 233 pyroutes.register('my_account_edit', '/_admin/my_account/edit', []);
233 234 pyroutes.register('my_account_update', '/_admin/my_account/update', []);
234 235 pyroutes.register('my_account_password', '/_admin/my_account/password', []);
235 236 pyroutes.register('my_account_password_update', '/_admin/my_account/password/update', []);
236 237 pyroutes.register('my_account_auth_tokens', '/_admin/my_account/auth_tokens', []);
237 238 pyroutes.register('my_account_auth_tokens_add', '/_admin/my_account/auth_tokens/new', []);
238 239 pyroutes.register('my_account_auth_tokens_delete', '/_admin/my_account/auth_tokens/delete', []);
239 240 pyroutes.register('my_account_ssh_keys', '/_admin/my_account/ssh_keys', []);
240 241 pyroutes.register('my_account_ssh_keys_generate', '/_admin/my_account/ssh_keys/generate', []);
241 242 pyroutes.register('my_account_ssh_keys_add', '/_admin/my_account/ssh_keys/new', []);
242 243 pyroutes.register('my_account_ssh_keys_delete', '/_admin/my_account/ssh_keys/delete', []);
243 244 pyroutes.register('my_account_emails', '/_admin/my_account/emails', []);
244 245 pyroutes.register('my_account_emails_add', '/_admin/my_account/emails/new', []);
245 246 pyroutes.register('my_account_emails_delete', '/_admin/my_account/emails/delete', []);
246 247 pyroutes.register('my_account_repos', '/_admin/my_account/repos', []);
247 248 pyroutes.register('my_account_watched', '/_admin/my_account/watched', []);
248 249 pyroutes.register('my_account_perms', '/_admin/my_account/perms', []);
249 250 pyroutes.register('my_account_notifications', '/_admin/my_account/notifications', []);
250 251 pyroutes.register('my_account_notifications_toggle_visibility', '/_admin/my_account/toggle_visibility', []);
251 252 pyroutes.register('my_account_pullrequests', '/_admin/my_account/pull_requests', []);
252 253 pyroutes.register('my_account_pullrequests_data', '/_admin/my_account/pull_requests/data', []);
253 254 pyroutes.register('notifications_show_all', '/_admin/notifications', []);
254 255 pyroutes.register('notifications_mark_all_read', '/_admin/notifications/mark_all_read', []);
255 256 pyroutes.register('notifications_show', '/_admin/notifications/%(notification_id)s', ['notification_id']);
256 257 pyroutes.register('notifications_update', '/_admin/notifications/%(notification_id)s/update', ['notification_id']);
257 258 pyroutes.register('notifications_delete', '/_admin/notifications/%(notification_id)s/delete', ['notification_id']);
258 259 pyroutes.register('my_account_notifications_test_channelstream', '/_admin/my_account/test_channelstream', []);
259 260 pyroutes.register('gists_show', '/_admin/gists', []);
260 261 pyroutes.register('gists_new', '/_admin/gists/new', []);
261 262 pyroutes.register('gists_create', '/_admin/gists/create', []);
262 263 pyroutes.register('gist_show', '/_admin/gists/%(gist_id)s', ['gist_id']);
263 264 pyroutes.register('gist_delete', '/_admin/gists/%(gist_id)s/delete', ['gist_id']);
264 265 pyroutes.register('gist_edit', '/_admin/gists/%(gist_id)s/edit', ['gist_id']);
265 266 pyroutes.register('gist_edit_check_revision', '/_admin/gists/%(gist_id)s/edit/check_revision', ['gist_id']);
266 267 pyroutes.register('gist_update', '/_admin/gists/%(gist_id)s/update', ['gist_id']);
267 268 pyroutes.register('gist_show_rev', '/_admin/gists/%(gist_id)s/%(revision)s', ['gist_id', 'revision']);
268 269 pyroutes.register('gist_show_formatted', '/_admin/gists/%(gist_id)s/%(revision)s/%(format)s', ['gist_id', 'revision', 'format']);
269 270 pyroutes.register('gist_show_formatted_path', '/_admin/gists/%(gist_id)s/%(revision)s/%(format)s/%(f_path)s', ['gist_id', 'revision', 'format', 'f_path']);
270 271 pyroutes.register('debug_style_home', '/_admin/debug_style', []);
271 272 pyroutes.register('debug_style_template', '/_admin/debug_style/t/%(t_path)s', ['t_path']);
272 273 pyroutes.register('apiv2', '/_admin/api', []);
273 274 }
@@ -1,65 +1,69 b''
1 1 <%namespace name="base" file="/base/base.mako"/>
2 2
3 3 %if c.audit_logs:
4 4 <table class="rctable admin_log">
5 5 <tr>
6 <th>${_('Uid')}</th>
6 7 <th>${_('Username')}</th>
7 8 <th>${_('Action')}</th>
8 9 <th>${_('Action Data')}</th>
9 10 <th>${_('Repository')}</th>
10 11 <th>${_('Date')}</th>
11 12 <th>${_('IP')}</th>
12 13 </tr>
13 14
14 15 %for cnt,l in enumerate(c.audit_logs):
15 16 <tr class="parity${cnt%2}">
17 <td class="td-col">
18 <a href="${h.route_path('admin_audit_log_entry', audit_log_id=l.entry_id)}">${l.entry_id}</a>
19 </td>
16 20 <td class="td-user">
17 21 %if l.user is not None:
18 22 ${base.gravatar_with_user(l.user.email)}
19 23 %else:
20 24 ${l.username}
21 25 %endif
22 26 </td>
23 27 <td class="td-journalaction">
24 28 % if l.version == l.VERSION_1:
25 29 ${h.action_parser(l)[0]()}
26 30 % else:
27 31 ${h.literal(l.action)}
28 32 % endif
29 33
30 34 <div class="journal_action_params">
31 35 % if l.version == l.VERSION_1:
32 36 ${h.literal(h.action_parser(l)[1]())}
33 37 % endif
34 38 </div>
35 39 </td>
36 40 <td>
37 41 % if l.version == l.VERSION_2:
38 42 <a href="#" onclick="$('#entry-'+${l.user_log_id}).toggle();return false">${_('toggle')}</a>
39 43 <div id="entry-${l.user_log_id}" style="display: none">
40 44 <pre>${h.json.dumps(l.action_data, indent=4, sort_keys=True)}</pre>
41 45 </div>
42 46 % else:
43 47 <pre title="${_('data not available for v1 entries type')}">-</pre>
44 48 % endif
45 49 </td>
46 50 <td class="td-componentname">
47 51 %if l.repository is not None:
48 52 ${h.link_to(l.repository.repo_name, h.route_path('repo_summary',repo_name=l.repository.repo_name))}
49 53 %else:
50 54 ${l.repository_name}
51 55 %endif
52 56 </td>
53 57
54 58 <td class="td-time">${h.format_date(l.action_date)}</td>
55 59 <td class="td-ip">${l.user_ip}</td>
56 60 </tr>
57 61 %endfor
58 62 </table>
59 63
60 64 <div class="pagination-wh pagination-left">
61 65 ${c.audit_logs.pager('$link_previous ~2~ $link_next')}
62 66 </div>
63 67 %else:
64 68 ${_('No actions yet')}
65 69 %endif No newline at end of file
General Comments 0
You need to be logged in to leave comments. Login now