##// END OF EJS Templates
audit-logs: moved async tasks from old deprecated action_logger.
marcink -
r1803:907f9b5c default
parent child Browse files
Show More
@@ -1,190 +1,192 b''
1 1 # -*- coding: utf-8 -*-
2 2
3 3 # Copyright (C) 2010-2017 RhodeCode GmbH
4 4 #
5 5 # This program is free software: you can redistribute it and/or modify
6 6 # it under the terms of the GNU Affero General Public License, version 3
7 7 # (only), as published by the Free Software Foundation.
8 8 #
9 9 # This program is distributed in the hope that it will be useful,
10 10 # but WITHOUT ANY WARRANTY; without even the implied warranty of
11 11 # MERCHANTABILITY or FITNESS FOR A PARTICULAR PURPOSE. See the
12 12 # GNU General Public License for more details.
13 13 #
14 14 # You should have received a copy of the GNU Affero General Public License
15 15 # along with this program. If not, see <http://www.gnu.org/licenses/>.
16 16 #
17 17 # This program is dual-licensed. If you wish to learn more about the
18 18 # RhodeCode Enterprise Edition, including its added features, Support services,
19 19 # and proprietary license terms, please see https://rhodecode.com/licenses/
20 20
21 21 import mock
22 22 import pytest
23 23
24 24 from rhodecode.model.repo import RepoModel
25 25 from rhodecode.tests import TEST_USER_ADMIN_LOGIN, TEST_USER_REGULAR_LOGIN
26 26 from rhodecode.api.tests.utils import (
27 27 build_data, api_call, assert_error, assert_ok, crash, jsonify)
28 28 from rhodecode.tests.fixture import Fixture
29 29 from rhodecode.tests.plugin import http_host_stub, http_host_only_stub
30 30
31 31 fixture = Fixture()
32 32
33 33 UPDATE_REPO_NAME = 'api_update_me'
34 34
35 35
36 36 class SAME_AS_UPDATES(object):
37 37 """ Constant used for tests below """
38 38
39 39
40 40 @pytest.mark.usefixtures("testuser_api", "app")
41 41 class TestApiUpdateRepo(object):
42 42
43 43 @pytest.mark.parametrize("updates, expected", [
44 44 ({'owner': TEST_USER_REGULAR_LOGIN},
45 45 SAME_AS_UPDATES),
46 46
47 47 ({'description': 'new description'},
48 48 SAME_AS_UPDATES),
49 49
50 50 ({'clone_uri': 'http://foo.com/repo'},
51 51 SAME_AS_UPDATES),
52 52
53 53 ({'clone_uri': None},
54 54 {'clone_uri': ''}),
55 55
56 56 ({'clone_uri': ''},
57 57 {'clone_uri': ''}),
58 58
59 59 ({'landing_rev': 'rev:tip'},
60 60 {'landing_rev': ['rev', 'tip']}),
61 61
62 62 ({'enable_statistics': True},
63 63 SAME_AS_UPDATES),
64 64
65 65 ({'enable_locking': True},
66 66 SAME_AS_UPDATES),
67 67
68 68 ({'enable_downloads': True},
69 69 SAME_AS_UPDATES),
70 70
71 71 ({'repo_name': 'new_repo_name'},
72 72 {
73 73 'repo_name': 'new_repo_name',
74 74 'url': 'http://{}/new_repo_name'.format(http_host_only_stub())
75 75 }),
76 76
77 77 ({'repo_name': 'test_group_for_update/{}'.format(UPDATE_REPO_NAME),
78 78 '_group': 'test_group_for_update'},
79 79 {
80 80 'repo_name': 'test_group_for_update/{}'.format(UPDATE_REPO_NAME),
81 81 'url': 'http://{}/test_group_for_update/{}'.format(
82 82 http_host_only_stub(), UPDATE_REPO_NAME)
83 83 }),
84 84 ])
85 85 def test_api_update_repo(self, updates, expected, backend):
86 86 repo_name = UPDATE_REPO_NAME
87 87 repo = fixture.create_repo(repo_name, repo_type=backend.alias)
88 88 if updates.get('_group'):
89 89 fixture.create_repo_group(updates['_group'])
90 90
91 91 expected_api_data = repo.get_api_data(include_secrets=True)
92 92 if expected is SAME_AS_UPDATES:
93 93 expected_api_data.update(updates)
94 94 else:
95 95 expected_api_data.update(expected)
96 96
97 97 id_, params = build_data(
98 98 self.apikey, 'update_repo', repoid=repo_name, **updates)
99 99 response = api_call(self.app, params)
100 100
101 101 if updates.get('repo_name'):
102 102 repo_name = updates['repo_name']
103 103
104 104 try:
105 105 expected = {
106 106 'msg': 'updated repo ID:%s %s' % (repo.repo_id, repo_name),
107 107 'repository': jsonify(expected_api_data)
108 108 }
109 109 assert_ok(id_, expected, given=response.body)
110 110 finally:
111 111 fixture.destroy_repo(repo_name)
112 112 if updates.get('_group'):
113 113 fixture.destroy_repo_group(updates['_group'])
114 114
115 115 def test_api_update_repo_fork_of_field(self, backend):
116 116 master_repo = backend.create_repo()
117 117 repo = backend.create_repo()
118 118 updates = {
119 'fork_of': master_repo.repo_name
119 'fork_of': master_repo.repo_name,
120 'fork_of_id': master_repo.repo_id
120 121 }
121 122 expected_api_data = repo.get_api_data(include_secrets=True)
122 123 expected_api_data.update(updates)
123 124
124 125 id_, params = build_data(
125 126 self.apikey, 'update_repo', repoid=repo.repo_name, **updates)
126 127 response = api_call(self.app, params)
127 128 expected = {
128 129 'msg': 'updated repo ID:%s %s' % (repo.repo_id, repo.repo_name),
129 130 'repository': jsonify(expected_api_data)
130 131 }
131 132 assert_ok(id_, expected, given=response.body)
132 133 result = response.json['result']['repository']
133 134 assert result['fork_of'] == master_repo.repo_name
135 assert result['fork_of_id'] == master_repo.repo_id
134 136
135 137 def test_api_update_repo_fork_of_not_found(self, backend):
136 138 master_repo_name = 'fake-parent-repo'
137 139 repo = backend.create_repo()
138 140 updates = {
139 141 'fork_of': master_repo_name
140 142 }
141 143 id_, params = build_data(
142 144 self.apikey, 'update_repo', repoid=repo.repo_name, **updates)
143 145 response = api_call(self.app, params)
144 146 expected = {
145 147 'repo_fork_of': 'Fork with id `{}` does not exists'.format(
146 148 master_repo_name)}
147 149 assert_error(id_, expected, given=response.body)
148 150
149 151 def test_api_update_repo_with_repo_group_not_existing(self):
150 152 repo_name = 'admin_owned'
151 153 fake_repo_group = 'test_group_for_update'
152 154 fixture.create_repo(repo_name)
153 155 updates = {'repo_name': '{}/{}'.format(fake_repo_group, repo_name)}
154 156 id_, params = build_data(
155 157 self.apikey, 'update_repo', repoid=repo_name, **updates)
156 158 response = api_call(self.app, params)
157 159 try:
158 160 expected = {
159 161 'repo_group': 'Repository group `{}` does not exist'.format(fake_repo_group)
160 162 }
161 163 assert_error(id_, expected, given=response.body)
162 164 finally:
163 165 fixture.destroy_repo(repo_name)
164 166
165 167 def test_api_update_repo_regular_user_not_allowed(self):
166 168 repo_name = 'admin_owned'
167 169 fixture.create_repo(repo_name)
168 170 updates = {'active': False}
169 171 id_, params = build_data(
170 172 self.apikey_regular, 'update_repo', repoid=repo_name, **updates)
171 173 response = api_call(self.app, params)
172 174 try:
173 175 expected = 'repository `%s` does not exist' % (repo_name,)
174 176 assert_error(id_, expected, given=response.body)
175 177 finally:
176 178 fixture.destroy_repo(repo_name)
177 179
178 180 @mock.patch.object(RepoModel, 'update', crash)
179 181 def test_api_update_repo_exception_occurred(self, backend):
180 182 repo_name = UPDATE_REPO_NAME
181 183 fixture.create_repo(repo_name, repo_type=backend.alias)
182 184 id_, params = build_data(
183 185 self.apikey, 'update_repo', repoid=repo_name,
184 186 owner=TEST_USER_ADMIN_LOGIN,)
185 187 response = api_call(self.app, params)
186 188 try:
187 189 expected = 'failed to update repo `%s`' % (repo_name,)
188 190 assert_error(id_, expected, given=response.body)
189 191 finally:
190 192 fixture.destroy_repo(repo_name)
@@ -1,232 +1,233 b''
1 1 # -*- coding: utf-8 -*-
2 2
3 3 # Copyright (C) 2017-2017 RhodeCode GmbH
4 4 #
5 5 # This program is free software: you can redistribute it and/or modify
6 6 # it under the terms of the GNU Affero General Public License, version 3
7 7 # (only), as published by the Free Software Foundation.
8 8 #
9 9 # This program is distributed in the hope that it will be useful,
10 10 # but WITHOUT ANY WARRANTY; without even the implied warranty of
11 11 # MERCHANTABILITY or FITNESS FOR A PARTICULAR PURPOSE. See the
12 12 # GNU General Public License for more details.
13 13 #
14 14 # You should have received a copy of the GNU Affero General Public License
15 15 # along with this program. If not, see <http://www.gnu.org/licenses/>.
16 16 #
17 17 # This program is dual-licensed. If you wish to learn more about the
18 18 # RhodeCode Enterprise Edition, including its added features, Support services,
19 19 # and proprietary license terms, please see https://rhodecode.com/licenses/
20 20
21 21 import logging
22 22 import datetime
23 23
24 24 from rhodecode.model import meta
25 25 from rhodecode.model.db import User, UserLog, Repository
26 26
27 27
28 28 log = logging.getLogger(__name__)
29 29
30 30 # action as key, and expected action_data as value
31 31 ACTIONS = {
32 32 'user.login.success': {'user_agent': ''},
33 33 'user.login.failure': {'user_agent': ''},
34 34 'user.logout': {'user_agent': ''},
35 35 'user.password.reset_request': {},
36 36 'user.push': {'user_agent': '', 'commit_ids': []},
37 37 'user.pull': {'user_agent': ''},
38 38
39 39 'user.create': {'data': {}},
40 40 'user.delete': {'old_data': {}},
41 41 'user.edit': {'old_data': {}},
42 42 'user.edit.permissions': {},
43 43 'user.edit.ip.add': {},
44 44 'user.edit.ip.delete': {},
45 45 'user.edit.token.add': {},
46 46 'user.edit.token.delete': {},
47 47 'user.edit.email.add': {},
48 48 'user.edit.email.delete': {},
49 49 'user.edit.password_reset.enabled': {},
50 50 'user.edit.password_reset.disabled': {},
51 51
52 52 'repo.create': {'data': {}},
53 'repo.fork': {'data': {}},
53 54 'repo.edit': {'old_data': {}},
54 55 'repo.edit.permissions': {},
55 56 'repo.delete': {'old_data': {}},
56 57 'repo.commit.strip': {},
57 58 'repo.archive.download': {},
58 59
59 60 'repo_group.create': {'data': {}},
60 61 'repo_group.edit': {'old_data': {}},
61 62 'repo_group.edit.permissions': {},
62 63 'repo_group.delete': {'old_data': {}},
63 64 }
64 65
65 66 SOURCE_WEB = 'source_web'
66 67 SOURCE_API = 'source_api'
67 68
68 69
69 70 class UserWrap(object):
70 71 """
71 72 Fake object used to imitate AuthUser
72 73 """
73 74
74 75 def __init__(self, user_id=None, username=None, ip_addr=None):
75 76 self.user_id = user_id
76 77 self.username = username
77 78 self.ip_addr = ip_addr
78 79
79 80
80 81 class RepoWrap(object):
81 82 """
82 83 Fake object used to imitate RepoObject that audit logger requires
83 84 """
84 85
85 86 def __init__(self, repo_id=None, repo_name=None):
86 87 self.repo_id = repo_id
87 88 self.repo_name = repo_name
88 89
89 90
90 91 def _store_log(action_name, action_data, user_id, username, user_data,
91 92 ip_address, repository_id, repository_name):
92 93 user_log = UserLog()
93 94 user_log.version = UserLog.VERSION_2
94 95
95 96 user_log.action = action_name
96 97 user_log.action_data = action_data
97 98
98 99 user_log.user_ip = ip_address
99 100
100 101 user_log.user_id = user_id
101 102 user_log.username = username
102 103 user_log.user_data = user_data
103 104
104 105 user_log.repository_id = repository_id
105 106 user_log.repository_name = repository_name
106 107
107 108 user_log.action_date = datetime.datetime.now()
108 109
109 110 log.info('AUDIT: Logging action: `%s` by user:id:%s[%s] ip:%s',
110 111 action_name, user_id, username, ip_address)
111 112
112 113 return user_log
113 114
114 115
115 116 def store_web(*args, **kwargs):
116 117 if 'action_data' not in kwargs:
117 118 kwargs['action_data'] = {}
118 119 kwargs['action_data'].update({
119 120 'source': SOURCE_WEB
120 121 })
121 122 return store(*args, **kwargs)
122 123
123 124
124 125 def store_api(*args, **kwargs):
125 126 if 'action_data' not in kwargs:
126 127 kwargs['action_data'] = {}
127 128 kwargs['action_data'].update({
128 129 'source': SOURCE_API
129 130 })
130 131 return store(*args, **kwargs)
131 132
132 133
133 134 def store(action, user, action_data=None, user_data=None, ip_addr=None,
134 135 repo=None, sa_session=None, commit=False):
135 136 """
136 137 Audit logger for various actions made by users, typically this
137 138 results in a call such::
138 139
139 140 from rhodecode.lib import audit_logger
140 141
141 142 audit_logger.store(
142 143 action='repo.edit', user=self._rhodecode_user)
143 144 audit_logger.store(
144 145 action='repo.delete', action_data={'repo_data': repo_data},
145 146 user=audit_logger.UserWrap(username='itried-login', ip_addr='8.8.8.8'))
146 147
147 148 # repo action
148 149 audit_logger.store(
149 150 action='repo.delete',
150 151 user=audit_logger.UserWrap(username='itried-login', ip_addr='8.8.8.8'),
151 152 repo=audit_logger.RepoWrap(repo_name='some-repo'))
152 153
153 154 # repo action, when we know and have the repository object already
154 155 audit_logger.store(
155 156 action='repo.delete',
156 157 action_data={'source': audit_logger.SOURCE_WEB, },
157 158 user=self._rhodecode_user,
158 159 repo=repo_object)
159 160
160 161 # alternative wrapper to the above
161 162 audit_logger.store_web(
162 163 action='repo.delete',
163 164 action_data={},
164 165 user=self._rhodecode_user,
165 166 repo=repo_object)
166 167
167 168 # without an user ?
168 169 audit_logger.store(
169 170 action='user.login.failure',
170 171 user=audit_logger.UserWrap(
171 172 username=self.request.params.get('username'),
172 173 ip_addr=self.request.remote_addr))
173 174
174 175 """
175 176 from rhodecode.lib.utils2 import safe_unicode
176 177 from rhodecode.lib.auth import AuthUser
177 178
178 179 action_spec = ACTIONS.get(action, None)
179 180 if action_spec is None:
180 181 raise ValueError('Action `{}` is not supported'.format(action))
181 182
182 183 if not sa_session:
183 184 sa_session = meta.Session()
184 185
185 186 try:
186 187 username = getattr(user, 'username', None)
187 188 if not username:
188 189 pass
189 190
190 191 user_id = getattr(user, 'user_id', None)
191 192 if not user_id:
192 193 # maybe we have username ? Try to figure user_id from username
193 194 if username:
194 195 user_id = getattr(
195 196 User.get_by_username(username), 'user_id', None)
196 197
197 198 ip_addr = ip_addr or getattr(user, 'ip_addr', None)
198 199 if not ip_addr:
199 200 pass
200 201
201 202 if not user_data:
202 203 # try to get this from the auth user
203 204 if isinstance(user, AuthUser):
204 205 user_data = {
205 206 'username': user.username,
206 207 'email': user.email,
207 208 }
208 209
209 210 repository_name = getattr(repo, 'repo_name', None)
210 211 repository_id = getattr(repo, 'repo_id', None)
211 212 if not repository_id:
212 213 # maybe we have repo_name ? Try to figure repo_id from repo_name
213 214 if repository_name:
214 215 repository_id = getattr(
215 216 Repository.get_by_repo_name(repository_name), 'repo_id', None)
216 217
217 218 user_log = _store_log(
218 219 action_name=safe_unicode(action),
219 220 action_data=action_data or {},
220 221 user_id=user_id,
221 222 username=username,
222 223 user_data=user_data or {},
223 224 ip_address=safe_unicode(ip_addr),
224 225 repository_id=repository_id,
225 226 repository_name=repository_name
226 227 )
227 228 sa_session.add(user_log)
228 229 if commit:
229 230 sa_session.commit()
230 231
231 232 except Exception:
232 233 log.exception('AUDIT: failed to store audit log')
@@ -1,283 +1,299 b''
1 1 # -*- coding: utf-8 -*-
2 2
3 3 # Copyright (C) 2012-2017 RhodeCode GmbH
4 4 #
5 5 # This program is free software: you can redistribute it and/or modify
6 6 # it under the terms of the GNU Affero General Public License, version 3
7 7 # (only), as published by the Free Software Foundation.
8 8 #
9 9 # This program is distributed in the hope that it will be useful,
10 10 # but WITHOUT ANY WARRANTY; without even the implied warranty of
11 11 # MERCHANTABILITY or FITNESS FOR A PARTICULAR PURPOSE. See the
12 12 # GNU General Public License for more details.
13 13 #
14 14 # You should have received a copy of the GNU Affero General Public License
15 15 # along with this program. If not, see <http://www.gnu.org/licenses/>.
16 16 #
17 17 # This program is dual-licensed. If you wish to learn more about the
18 18 # RhodeCode Enterprise Edition, including its added features, Support services,
19 19 # and proprietary license terms, please see https://rhodecode.com/licenses/
20 20
21 21 """
22 22 RhodeCode task modules, containing all task that suppose to be run
23 23 by celery daemon
24 24 """
25 25
26 26
27 27 import os
28 28 import logging
29 29
30 30 from celery.task import task
31 31 from pylons import config
32 32
33 33 import rhodecode
34 from rhodecode.lib import audit_logger
34 35 from rhodecode.lib.celerylib import (
35 36 run_task, dbsession, __get_lockkey, LockHeld, DaemonLock,
36 37 get_session, vcsconnection, RhodecodeCeleryTask)
37 38 from rhodecode.lib.hooks_base import log_create_repository
38 39 from rhodecode.lib.rcmail.smtp_mailer import SmtpMailer
39 from rhodecode.lib.utils import add_cache, action_logger
40 from rhodecode.lib.utils import add_cache
40 41 from rhodecode.lib.utils2 import safe_int, str2bool
41 42 from rhodecode.model.db import Repository, User
42 43
43 44
44 45 add_cache(config) # pragma: no cover
45 46
46 47
47 48 def get_logger(cls):
48 49 if rhodecode.CELERY_ENABLED:
49 50 try:
50 51 log = cls.get_logger()
51 52 except Exception:
52 53 log = logging.getLogger(__name__)
53 54 else:
54 55 log = logging.getLogger(__name__)
55 56
56 57 return log
57 58
58 59
59 60 @task(ignore_result=True, base=RhodecodeCeleryTask)
60 61 @dbsession
61 62 def send_email(recipients, subject, body='', html_body='', email_config=None):
62 63 """
63 64 Sends an email with defined parameters from the .ini files.
64 65
65 66 :param recipients: list of recipients, it this is empty the defined email
66 67 address from field 'email_to' is used instead
67 68 :param subject: subject of the mail
68 69 :param body: body of the mail
69 70 :param html_body: html version of body
70 71 """
71 72 log = get_logger(send_email)
72 73
73 74 email_config = email_config or rhodecode.CONFIG
74 75 subject = "%s %s" % (email_config.get('email_prefix', ''), subject)
75 76 if not recipients:
76 77 # if recipients are not defined we send to email_config + all admins
77 78 admins = [
78 79 u.email for u in User.query().filter(User.admin == True).all()]
79 80 recipients = [email_config.get('email_to')] + admins
80 81
81 82 mail_server = email_config.get('smtp_server') or None
82 83 if mail_server is None:
83 84 log.error("SMTP server information missing. Sending email failed. "
84 85 "Make sure that `smtp_server` variable is configured "
85 86 "inside the .ini file")
86 87 return False
87 88
88 89 mail_from = email_config.get('app_email_from', 'RhodeCode')
89 90 user = email_config.get('smtp_username')
90 91 passwd = email_config.get('smtp_password')
91 92 mail_port = email_config.get('smtp_port')
92 93 tls = str2bool(email_config.get('smtp_use_tls'))
93 94 ssl = str2bool(email_config.get('smtp_use_ssl'))
94 95 debug = str2bool(email_config.get('debug'))
95 96 smtp_auth = email_config.get('smtp_auth')
96 97
97 98 try:
98 99 m = SmtpMailer(mail_from, user, passwd, mail_server, smtp_auth,
99 100 mail_port, ssl, tls, debug=debug)
100 101 m.send(recipients, subject, body, html_body)
101 102 except Exception:
102 103 log.exception('Mail sending failed')
103 104 return False
104 105 return True
105 106
106 107
107 108 @task(ignore_result=True, base=RhodecodeCeleryTask)
108 109 @dbsession
109 110 @vcsconnection
110 111 def create_repo(form_data, cur_user):
111 112 from rhodecode.model.repo import RepoModel
112 113 from rhodecode.model.user import UserModel
113 114 from rhodecode.model.settings import SettingsModel
114 115
115 116 log = get_logger(create_repo)
116 117 DBS = get_session()
117 118
118 119 cur_user = UserModel(DBS)._get_user(cur_user)
119 120 owner = cur_user
120 121
121 122 repo_name = form_data['repo_name']
122 123 repo_name_full = form_data['repo_name_full']
123 124 repo_type = form_data['repo_type']
124 125 description = form_data['repo_description']
125 126 private = form_data['repo_private']
126 127 clone_uri = form_data.get('clone_uri')
127 128 repo_group = safe_int(form_data['repo_group'])
128 129 landing_rev = form_data['repo_landing_rev']
129 130 copy_fork_permissions = form_data.get('copy_permissions')
130 131 copy_group_permissions = form_data.get('repo_copy_permissions')
131 132 fork_of = form_data.get('fork_parent_id')
132 133 state = form_data.get('repo_state', Repository.STATE_PENDING)
133 134
134 135 # repo creation defaults, private and repo_type are filled in form
135 136 defs = SettingsModel().get_default_repo_settings(strip_prefix=True)
136 137 enable_statistics = form_data.get(
137 138 'enable_statistics', defs.get('repo_enable_statistics'))
138 139 enable_locking = form_data.get(
139 140 'enable_locking', defs.get('repo_enable_locking'))
140 141 enable_downloads = form_data.get(
141 142 'enable_downloads', defs.get('repo_enable_downloads'))
142 143
143 144 try:
144 RepoModel(DBS)._create_repo(
145 repo = RepoModel(DBS)._create_repo(
145 146 repo_name=repo_name_full,
146 147 repo_type=repo_type,
147 148 description=description,
148 149 owner=owner,
149 150 private=private,
150 151 clone_uri=clone_uri,
151 152 repo_group=repo_group,
152 153 landing_rev=landing_rev,
153 154 fork_of=fork_of,
154 155 copy_fork_permissions=copy_fork_permissions,
155 156 copy_group_permissions=copy_group_permissions,
156 157 enable_statistics=enable_statistics,
157 158 enable_locking=enable_locking,
158 159 enable_downloads=enable_downloads,
159 160 state=state
160 161 )
161
162 action_logger(cur_user, 'user_created_repo', repo_name_full, '', DBS)
163 162 DBS.commit()
164 163
165 164 # now create this repo on Filesystem
166 165 RepoModel(DBS)._create_filesystem_repo(
167 166 repo_name=repo_name,
168 167 repo_type=repo_type,
169 168 repo_group=RepoModel(DBS)._get_repo_group(repo_group),
170 169 clone_uri=clone_uri,
171 170 )
172 171 repo = Repository.get_by_repo_name(repo_name_full)
173 172 log_create_repository(created_by=owner.username, **repo.get_dict())
174 173
175 174 # update repo commit caches initially
176 175 repo.update_commit_cache()
177 176
178 177 # set new created state
179 178 repo.set_state(Repository.STATE_CREATED)
179 repo_id = repo.repo_id
180 repo_data = repo.get_api_data()
181
182 audit_logger.store(
183 action='repo.create',
184 action_data={'data': repo_data},
185 user=cur_user,
186 repo=audit_logger.RepoWrap(repo_name=repo_name, repo_id=repo_id))
187
180 188 DBS.commit()
181 189 except Exception:
182 190 log.warning('Exception occurred when creating repository, '
183 191 'doing cleanup...', exc_info=True)
184 192 # rollback things manually !
185 193 repo = Repository.get_by_repo_name(repo_name_full)
186 194 if repo:
187 195 Repository.delete(repo.repo_id)
188 196 DBS.commit()
189 197 RepoModel(DBS)._delete_filesystem_repo(repo)
190 198 raise
191 199
192 200 # it's an odd fix to make celery fail task when exception occurs
193 201 def on_failure(self, *args, **kwargs):
194 202 pass
195 203
196 204 return True
197 205
198 206
199 207 @task(ignore_result=True, base=RhodecodeCeleryTask)
200 208 @dbsession
201 209 @vcsconnection
202 210 def create_repo_fork(form_data, cur_user):
203 211 """
204 212 Creates a fork of repository using internal VCS methods
205 213
206 214 :param form_data:
207 215 :param cur_user:
208 216 """
209 217 from rhodecode.model.repo import RepoModel
210 218 from rhodecode.model.user import UserModel
211 219
212 220 log = get_logger(create_repo_fork)
213 221 DBS = get_session()
214 222
215 223 cur_user = UserModel(DBS)._get_user(cur_user)
216 224 owner = cur_user
217 225
218 226 repo_name = form_data['repo_name'] # fork in this case
219 227 repo_name_full = form_data['repo_name_full']
220 228 repo_type = form_data['repo_type']
221 229 description = form_data['description']
222 230 private = form_data['private']
223 231 clone_uri = form_data.get('clone_uri')
224 232 repo_group = safe_int(form_data['repo_group'])
225 233 landing_rev = form_data['landing_rev']
226 234 copy_fork_permissions = form_data.get('copy_permissions')
227 235 fork_id = safe_int(form_data.get('fork_parent_id'))
228 236
229 237 try:
230 238 fork_of = RepoModel(DBS)._get_repo(fork_id)
231 239 RepoModel(DBS)._create_repo(
232 240 repo_name=repo_name_full,
233 241 repo_type=repo_type,
234 242 description=description,
235 243 owner=owner,
236 244 private=private,
237 245 clone_uri=clone_uri,
238 246 repo_group=repo_group,
239 247 landing_rev=landing_rev,
240 248 fork_of=fork_of,
241 249 copy_fork_permissions=copy_fork_permissions
242 250 )
243 action_logger(cur_user, 'user_forked_repo:%s' % repo_name_full,
244 fork_of.repo_name, '', DBS)
251
245 252 DBS.commit()
246 253
247 254 base_path = Repository.base_path()
248 255 source_repo_path = os.path.join(base_path, fork_of.repo_name)
249 256
250 257 # now create this repo on Filesystem
251 258 RepoModel(DBS)._create_filesystem_repo(
252 259 repo_name=repo_name,
253 260 repo_type=repo_type,
254 261 repo_group=RepoModel(DBS)._get_repo_group(repo_group),
255 262 clone_uri=source_repo_path,
256 263 )
257 264 repo = Repository.get_by_repo_name(repo_name_full)
258 265 log_create_repository(created_by=owner.username, **repo.get_dict())
259 266
260 267 # update repo commit caches initially
261 268 config = repo._config
262 269 config.set('extensions', 'largefiles', '')
263 270 repo.update_commit_cache(config=config)
264 271
265 272 # set new created state
266 273 repo.set_state(Repository.STATE_CREATED)
274
275 repo_id = repo.repo_id
276 repo_data = repo.get_api_data()
277 audit_logger.store(
278 action='repo.fork',
279 action_data={'data': repo_data},
280 user=cur_user,
281 repo=audit_logger.RepoWrap(repo_name=repo_name, repo_id=repo_id))
282
267 283 DBS.commit()
268 284 except Exception as e:
269 285 log.warning('Exception %s occurred when forking repository, '
270 286 'doing cleanup...', e)
271 287 # rollback things manually !
272 288 repo = Repository.get_by_repo_name(repo_name_full)
273 289 if repo:
274 290 Repository.delete(repo.repo_id)
275 291 DBS.commit()
276 292 RepoModel(DBS)._delete_filesystem_repo(repo)
277 293 raise
278 294
279 295 # it's an odd fix to make celery fail task when exception occurs
280 296 def on_failure(self, *args, **kwargs):
281 297 pass
282 298
283 299 return True
@@ -1,4030 +1,4031 b''
1 1 # -*- coding: utf-8 -*-
2 2
3 3 # Copyright (C) 2010-2017 RhodeCode GmbH
4 4 #
5 5 # This program is free software: you can redistribute it and/or modify
6 6 # it under the terms of the GNU Affero General Public License, version 3
7 7 # (only), as published by the Free Software Foundation.
8 8 #
9 9 # This program is distributed in the hope that it will be useful,
10 10 # but WITHOUT ANY WARRANTY; without even the implied warranty of
11 11 # MERCHANTABILITY or FITNESS FOR A PARTICULAR PURPOSE. See the
12 12 # GNU General Public License for more details.
13 13 #
14 14 # You should have received a copy of the GNU Affero General Public License
15 15 # along with this program. If not, see <http://www.gnu.org/licenses/>.
16 16 #
17 17 # This program is dual-licensed. If you wish to learn more about the
18 18 # RhodeCode Enterprise Edition, including its added features, Support services,
19 19 # and proprietary license terms, please see https://rhodecode.com/licenses/
20 20
21 21 """
22 22 Database Models for RhodeCode Enterprise
23 23 """
24 24
25 25 import re
26 26 import os
27 27 import time
28 28 import hashlib
29 29 import logging
30 30 import datetime
31 31 import warnings
32 32 import ipaddress
33 33 import functools
34 34 import traceback
35 35 import collections
36 36
37 37
38 38 from sqlalchemy import *
39 39 from sqlalchemy.ext.declarative import declared_attr
40 40 from sqlalchemy.ext.hybrid import hybrid_property
41 41 from sqlalchemy.orm import (
42 42 relationship, joinedload, class_mapper, validates, aliased)
43 43 from sqlalchemy.sql.expression import true
44 44 from beaker.cache import cache_region
45 45 from zope.cachedescriptors.property import Lazy as LazyProperty
46 46
47 47 from pylons.i18n.translation import lazy_ugettext as _
48 48 from pyramid.threadlocal import get_current_request
49 49
50 50 from rhodecode.lib.vcs import get_vcs_instance
51 51 from rhodecode.lib.vcs.backends.base import EmptyCommit, Reference
52 52 from rhodecode.lib.utils2 import (
53 53 str2bool, safe_str, get_commit_safe, safe_unicode, md5_safe,
54 54 time_to_datetime, aslist, Optional, safe_int, get_clone_url, AttributeDict,
55 55 glob2re, StrictAttributeDict, cleaned_uri)
56 56 from rhodecode.lib.jsonalchemy import MutationObj, MutationList, JsonType
57 57 from rhodecode.lib.ext_json import json
58 58 from rhodecode.lib.caching_query import FromCache
59 59 from rhodecode.lib.encrypt import AESCipher
60 60
61 61 from rhodecode.model.meta import Base, Session
62 62
63 63 URL_SEP = '/'
64 64 log = logging.getLogger(__name__)
65 65
66 66 # =============================================================================
67 67 # BASE CLASSES
68 68 # =============================================================================
69 69
70 70 # this is propagated from .ini file rhodecode.encrypted_values.secret or
71 71 # beaker.session.secret if first is not set.
72 72 # and initialized at environment.py
73 73 ENCRYPTION_KEY = None
74 74
75 75 # used to sort permissions by types, '#' used here is not allowed to be in
76 76 # usernames, and it's very early in sorted string.printable table.
77 77 PERMISSION_TYPE_SORT = {
78 78 'admin': '####',
79 79 'write': '###',
80 80 'read': '##',
81 81 'none': '#',
82 82 }
83 83
84 84
85 85 def display_sort(obj):
86 86 """
87 87 Sort function used to sort permissions in .permissions() function of
88 88 Repository, RepoGroup, UserGroup. Also it put the default user in front
89 89 of all other resources
90 90 """
91 91
92 92 if obj.username == User.DEFAULT_USER:
93 93 return '#####'
94 94 prefix = PERMISSION_TYPE_SORT.get(obj.permission.split('.')[-1], '')
95 95 return prefix + obj.username
96 96
97 97
98 98 def _hash_key(k):
99 99 return md5_safe(k)
100 100
101 101
102 102 class EncryptedTextValue(TypeDecorator):
103 103 """
104 104 Special column for encrypted long text data, use like::
105 105
106 106 value = Column("encrypted_value", EncryptedValue(), nullable=False)
107 107
108 108 This column is intelligent so if value is in unencrypted form it return
109 109 unencrypted form, but on save it always encrypts
110 110 """
111 111 impl = Text
112 112
113 113 def process_bind_param(self, value, dialect):
114 114 if not value:
115 115 return value
116 116 if value.startswith('enc$aes$') or value.startswith('enc$aes_hmac$'):
117 117 # protect against double encrypting if someone manually starts
118 118 # doing
119 119 raise ValueError('value needs to be in unencrypted format, ie. '
120 120 'not starting with enc$aes')
121 121 return 'enc$aes_hmac$%s' % AESCipher(
122 122 ENCRYPTION_KEY, hmac=True).encrypt(value)
123 123
124 124 def process_result_value(self, value, dialect):
125 125 import rhodecode
126 126
127 127 if not value:
128 128 return value
129 129
130 130 parts = value.split('$', 3)
131 131 if not len(parts) == 3:
132 132 # probably not encrypted values
133 133 return value
134 134 else:
135 135 if parts[0] != 'enc':
136 136 # parts ok but without our header ?
137 137 return value
138 138 enc_strict_mode = str2bool(rhodecode.CONFIG.get(
139 139 'rhodecode.encrypted_values.strict') or True)
140 140 # at that stage we know it's our encryption
141 141 if parts[1] == 'aes':
142 142 decrypted_data = AESCipher(ENCRYPTION_KEY).decrypt(parts[2])
143 143 elif parts[1] == 'aes_hmac':
144 144 decrypted_data = AESCipher(
145 145 ENCRYPTION_KEY, hmac=True,
146 146 strict_verification=enc_strict_mode).decrypt(parts[2])
147 147 else:
148 148 raise ValueError(
149 149 'Encryption type part is wrong, must be `aes` '
150 150 'or `aes_hmac`, got `%s` instead' % (parts[1]))
151 151 return decrypted_data
152 152
153 153
154 154 class BaseModel(object):
155 155 """
156 156 Base Model for all classes
157 157 """
158 158
159 159 @classmethod
160 160 def _get_keys(cls):
161 161 """return column names for this model """
162 162 return class_mapper(cls).c.keys()
163 163
164 164 def get_dict(self):
165 165 """
166 166 return dict with keys and values corresponding
167 167 to this model data """
168 168
169 169 d = {}
170 170 for k in self._get_keys():
171 171 d[k] = getattr(self, k)
172 172
173 173 # also use __json__() if present to get additional fields
174 174 _json_attr = getattr(self, '__json__', None)
175 175 if _json_attr:
176 176 # update with attributes from __json__
177 177 if callable(_json_attr):
178 178 _json_attr = _json_attr()
179 179 for k, val in _json_attr.iteritems():
180 180 d[k] = val
181 181 return d
182 182
183 183 def get_appstruct(self):
184 184 """return list with keys and values tuples corresponding
185 185 to this model data """
186 186
187 187 l = []
188 188 for k in self._get_keys():
189 189 l.append((k, getattr(self, k),))
190 190 return l
191 191
192 192 def populate_obj(self, populate_dict):
193 193 """populate model with data from given populate_dict"""
194 194
195 195 for k in self._get_keys():
196 196 if k in populate_dict:
197 197 setattr(self, k, populate_dict[k])
198 198
199 199 @classmethod
200 200 def query(cls):
201 201 return Session().query(cls)
202 202
203 203 @classmethod
204 204 def get(cls, id_):
205 205 if id_:
206 206 return cls.query().get(id_)
207 207
208 208 @classmethod
209 209 def get_or_404(cls, id_, pyramid_exc=False):
210 210 if pyramid_exc:
211 211 # NOTE(marcink): backward compat, once migration to pyramid
212 212 # this should only use pyramid exceptions
213 213 from pyramid.httpexceptions import HTTPNotFound
214 214 else:
215 215 from webob.exc import HTTPNotFound
216 216
217 217 try:
218 218 id_ = int(id_)
219 219 except (TypeError, ValueError):
220 220 raise HTTPNotFound
221 221
222 222 res = cls.query().get(id_)
223 223 if not res:
224 224 raise HTTPNotFound
225 225 return res
226 226
227 227 @classmethod
228 228 def getAll(cls):
229 229 # deprecated and left for backward compatibility
230 230 return cls.get_all()
231 231
232 232 @classmethod
233 233 def get_all(cls):
234 234 return cls.query().all()
235 235
236 236 @classmethod
237 237 def delete(cls, id_):
238 238 obj = cls.query().get(id_)
239 239 Session().delete(obj)
240 240
241 241 @classmethod
242 242 def identity_cache(cls, session, attr_name, value):
243 243 exist_in_session = []
244 244 for (item_cls, pkey), instance in session.identity_map.items():
245 245 if cls == item_cls and getattr(instance, attr_name) == value:
246 246 exist_in_session.append(instance)
247 247 if exist_in_session:
248 248 if len(exist_in_session) == 1:
249 249 return exist_in_session[0]
250 250 log.exception(
251 251 'multiple objects with attr %s and '
252 252 'value %s found with same name: %r',
253 253 attr_name, value, exist_in_session)
254 254
255 255 def __repr__(self):
256 256 if hasattr(self, '__unicode__'):
257 257 # python repr needs to return str
258 258 try:
259 259 return safe_str(self.__unicode__())
260 260 except UnicodeDecodeError:
261 261 pass
262 262 return '<DB:%s>' % (self.__class__.__name__)
263 263
264 264
265 265 class RhodeCodeSetting(Base, BaseModel):
266 266 __tablename__ = 'rhodecode_settings'
267 267 __table_args__ = (
268 268 UniqueConstraint('app_settings_name'),
269 269 {'extend_existing': True, 'mysql_engine': 'InnoDB',
270 270 'mysql_charset': 'utf8', 'sqlite_autoincrement': True}
271 271 )
272 272
273 273 SETTINGS_TYPES = {
274 274 'str': safe_str,
275 275 'int': safe_int,
276 276 'unicode': safe_unicode,
277 277 'bool': str2bool,
278 278 'list': functools.partial(aslist, sep=',')
279 279 }
280 280 DEFAULT_UPDATE_URL = 'https://rhodecode.com/api/v1/info/versions'
281 281 GLOBAL_CONF_KEY = 'app_settings'
282 282
283 283 app_settings_id = Column("app_settings_id", Integer(), nullable=False, unique=True, default=None, primary_key=True)
284 284 app_settings_name = Column("app_settings_name", String(255), nullable=True, unique=None, default=None)
285 285 _app_settings_value = Column("app_settings_value", String(4096), nullable=True, unique=None, default=None)
286 286 _app_settings_type = Column("app_settings_type", String(255), nullable=True, unique=None, default=None)
287 287
288 288 def __init__(self, key='', val='', type='unicode'):
289 289 self.app_settings_name = key
290 290 self.app_settings_type = type
291 291 self.app_settings_value = val
292 292
293 293 @validates('_app_settings_value')
294 294 def validate_settings_value(self, key, val):
295 295 assert type(val) == unicode
296 296 return val
297 297
298 298 @hybrid_property
299 299 def app_settings_value(self):
300 300 v = self._app_settings_value
301 301 _type = self.app_settings_type
302 302 if _type:
303 303 _type = self.app_settings_type.split('.')[0]
304 304 # decode the encrypted value
305 305 if 'encrypted' in self.app_settings_type:
306 306 cipher = EncryptedTextValue()
307 307 v = safe_unicode(cipher.process_result_value(v, None))
308 308
309 309 converter = self.SETTINGS_TYPES.get(_type) or \
310 310 self.SETTINGS_TYPES['unicode']
311 311 return converter(v)
312 312
313 313 @app_settings_value.setter
314 314 def app_settings_value(self, val):
315 315 """
316 316 Setter that will always make sure we use unicode in app_settings_value
317 317
318 318 :param val:
319 319 """
320 320 val = safe_unicode(val)
321 321 # encode the encrypted value
322 322 if 'encrypted' in self.app_settings_type:
323 323 cipher = EncryptedTextValue()
324 324 val = safe_unicode(cipher.process_bind_param(val, None))
325 325 self._app_settings_value = val
326 326
327 327 @hybrid_property
328 328 def app_settings_type(self):
329 329 return self._app_settings_type
330 330
331 331 @app_settings_type.setter
332 332 def app_settings_type(self, val):
333 333 if val.split('.')[0] not in self.SETTINGS_TYPES:
334 334 raise Exception('type must be one of %s got %s'
335 335 % (self.SETTINGS_TYPES.keys(), val))
336 336 self._app_settings_type = val
337 337
338 338 def __unicode__(self):
339 339 return u"<%s('%s:%s[%s]')>" % (
340 340 self.__class__.__name__,
341 341 self.app_settings_name, self.app_settings_value,
342 342 self.app_settings_type
343 343 )
344 344
345 345
346 346 class RhodeCodeUi(Base, BaseModel):
347 347 __tablename__ = 'rhodecode_ui'
348 348 __table_args__ = (
349 349 UniqueConstraint('ui_key'),
350 350 {'extend_existing': True, 'mysql_engine': 'InnoDB',
351 351 'mysql_charset': 'utf8', 'sqlite_autoincrement': True}
352 352 )
353 353
354 354 HOOK_REPO_SIZE = 'changegroup.repo_size'
355 355 # HG
356 356 HOOK_PRE_PULL = 'preoutgoing.pre_pull'
357 357 HOOK_PULL = 'outgoing.pull_logger'
358 358 HOOK_PRE_PUSH = 'prechangegroup.pre_push'
359 359 HOOK_PRETX_PUSH = 'pretxnchangegroup.pre_push'
360 360 HOOK_PUSH = 'changegroup.push_logger'
361 361 HOOK_PUSH_KEY = 'pushkey.key_push'
362 362
363 363 # TODO: johbo: Unify way how hooks are configured for git and hg,
364 364 # git part is currently hardcoded.
365 365
366 366 # SVN PATTERNS
367 367 SVN_BRANCH_ID = 'vcs_svn_branch'
368 368 SVN_TAG_ID = 'vcs_svn_tag'
369 369
370 370 ui_id = Column(
371 371 "ui_id", Integer(), nullable=False, unique=True, default=None,
372 372 primary_key=True)
373 373 ui_section = Column(
374 374 "ui_section", String(255), nullable=True, unique=None, default=None)
375 375 ui_key = Column(
376 376 "ui_key", String(255), nullable=True, unique=None, default=None)
377 377 ui_value = Column(
378 378 "ui_value", String(255), nullable=True, unique=None, default=None)
379 379 ui_active = Column(
380 380 "ui_active", Boolean(), nullable=True, unique=None, default=True)
381 381
382 382 def __repr__(self):
383 383 return '<%s[%s]%s=>%s]>' % (self.__class__.__name__, self.ui_section,
384 384 self.ui_key, self.ui_value)
385 385
386 386
387 387 class RepoRhodeCodeSetting(Base, BaseModel):
388 388 __tablename__ = 'repo_rhodecode_settings'
389 389 __table_args__ = (
390 390 UniqueConstraint(
391 391 'app_settings_name', 'repository_id',
392 392 name='uq_repo_rhodecode_setting_name_repo_id'),
393 393 {'extend_existing': True, 'mysql_engine': 'InnoDB',
394 394 'mysql_charset': 'utf8', 'sqlite_autoincrement': True}
395 395 )
396 396
397 397 repository_id = Column(
398 398 "repository_id", Integer(), ForeignKey('repositories.repo_id'),
399 399 nullable=False)
400 400 app_settings_id = Column(
401 401 "app_settings_id", Integer(), nullable=False, unique=True,
402 402 default=None, primary_key=True)
403 403 app_settings_name = Column(
404 404 "app_settings_name", String(255), nullable=True, unique=None,
405 405 default=None)
406 406 _app_settings_value = Column(
407 407 "app_settings_value", String(4096), nullable=True, unique=None,
408 408 default=None)
409 409 _app_settings_type = Column(
410 410 "app_settings_type", String(255), nullable=True, unique=None,
411 411 default=None)
412 412
413 413 repository = relationship('Repository')
414 414
415 415 def __init__(self, repository_id, key='', val='', type='unicode'):
416 416 self.repository_id = repository_id
417 417 self.app_settings_name = key
418 418 self.app_settings_type = type
419 419 self.app_settings_value = val
420 420
421 421 @validates('_app_settings_value')
422 422 def validate_settings_value(self, key, val):
423 423 assert type(val) == unicode
424 424 return val
425 425
426 426 @hybrid_property
427 427 def app_settings_value(self):
428 428 v = self._app_settings_value
429 429 type_ = self.app_settings_type
430 430 SETTINGS_TYPES = RhodeCodeSetting.SETTINGS_TYPES
431 431 converter = SETTINGS_TYPES.get(type_) or SETTINGS_TYPES['unicode']
432 432 return converter(v)
433 433
434 434 @app_settings_value.setter
435 435 def app_settings_value(self, val):
436 436 """
437 437 Setter that will always make sure we use unicode in app_settings_value
438 438
439 439 :param val:
440 440 """
441 441 self._app_settings_value = safe_unicode(val)
442 442
443 443 @hybrid_property
444 444 def app_settings_type(self):
445 445 return self._app_settings_type
446 446
447 447 @app_settings_type.setter
448 448 def app_settings_type(self, val):
449 449 SETTINGS_TYPES = RhodeCodeSetting.SETTINGS_TYPES
450 450 if val not in SETTINGS_TYPES:
451 451 raise Exception('type must be one of %s got %s'
452 452 % (SETTINGS_TYPES.keys(), val))
453 453 self._app_settings_type = val
454 454
455 455 def __unicode__(self):
456 456 return u"<%s('%s:%s:%s[%s]')>" % (
457 457 self.__class__.__name__, self.repository.repo_name,
458 458 self.app_settings_name, self.app_settings_value,
459 459 self.app_settings_type
460 460 )
461 461
462 462
463 463 class RepoRhodeCodeUi(Base, BaseModel):
464 464 __tablename__ = 'repo_rhodecode_ui'
465 465 __table_args__ = (
466 466 UniqueConstraint(
467 467 'repository_id', 'ui_section', 'ui_key',
468 468 name='uq_repo_rhodecode_ui_repository_id_section_key'),
469 469 {'extend_existing': True, 'mysql_engine': 'InnoDB',
470 470 'mysql_charset': 'utf8', 'sqlite_autoincrement': True}
471 471 )
472 472
473 473 repository_id = Column(
474 474 "repository_id", Integer(), ForeignKey('repositories.repo_id'),
475 475 nullable=False)
476 476 ui_id = Column(
477 477 "ui_id", Integer(), nullable=False, unique=True, default=None,
478 478 primary_key=True)
479 479 ui_section = Column(
480 480 "ui_section", String(255), nullable=True, unique=None, default=None)
481 481 ui_key = Column(
482 482 "ui_key", String(255), nullable=True, unique=None, default=None)
483 483 ui_value = Column(
484 484 "ui_value", String(255), nullable=True, unique=None, default=None)
485 485 ui_active = Column(
486 486 "ui_active", Boolean(), nullable=True, unique=None, default=True)
487 487
488 488 repository = relationship('Repository')
489 489
490 490 def __repr__(self):
491 491 return '<%s[%s:%s]%s=>%s]>' % (
492 492 self.__class__.__name__, self.repository.repo_name,
493 493 self.ui_section, self.ui_key, self.ui_value)
494 494
495 495
496 496 class User(Base, BaseModel):
497 497 __tablename__ = 'users'
498 498 __table_args__ = (
499 499 UniqueConstraint('username'), UniqueConstraint('email'),
500 500 Index('u_username_idx', 'username'),
501 501 Index('u_email_idx', 'email'),
502 502 {'extend_existing': True, 'mysql_engine': 'InnoDB',
503 503 'mysql_charset': 'utf8', 'sqlite_autoincrement': True}
504 504 )
505 505 DEFAULT_USER = 'default'
506 506 DEFAULT_USER_EMAIL = 'anonymous@rhodecode.org'
507 507 DEFAULT_GRAVATAR_URL = 'https://secure.gravatar.com/avatar/{md5email}?d=identicon&s={size}'
508 508
509 509 user_id = Column("user_id", Integer(), nullable=False, unique=True, default=None, primary_key=True)
510 510 username = Column("username", String(255), nullable=True, unique=None, default=None)
511 511 password = Column("password", String(255), nullable=True, unique=None, default=None)
512 512 active = Column("active", Boolean(), nullable=True, unique=None, default=True)
513 513 admin = Column("admin", Boolean(), nullable=True, unique=None, default=False)
514 514 name = Column("firstname", String(255), nullable=True, unique=None, default=None)
515 515 lastname = Column("lastname", String(255), nullable=True, unique=None, default=None)
516 516 _email = Column("email", String(255), nullable=True, unique=None, default=None)
517 517 last_login = Column("last_login", DateTime(timezone=False), nullable=True, unique=None, default=None)
518 518 last_activity = Column('last_activity', DateTime(timezone=False), nullable=True, unique=None, default=None)
519 519
520 520 extern_type = Column("extern_type", String(255), nullable=True, unique=None, default=None)
521 521 extern_name = Column("extern_name", String(255), nullable=True, unique=None, default=None)
522 522 _api_key = Column("api_key", String(255), nullable=True, unique=None, default=None)
523 523 inherit_default_permissions = Column("inherit_default_permissions", Boolean(), nullable=False, unique=None, default=True)
524 524 created_on = Column('created_on', DateTime(timezone=False), nullable=False, default=datetime.datetime.now)
525 525 _user_data = Column("user_data", LargeBinary(), nullable=True) # JSON data
526 526
527 527 user_log = relationship('UserLog')
528 528 user_perms = relationship('UserToPerm', primaryjoin="User.user_id==UserToPerm.user_id", cascade='all')
529 529
530 530 repositories = relationship('Repository')
531 531 repository_groups = relationship('RepoGroup')
532 532 user_groups = relationship('UserGroup')
533 533
534 534 user_followers = relationship('UserFollowing', primaryjoin='UserFollowing.follows_user_id==User.user_id', cascade='all')
535 535 followings = relationship('UserFollowing', primaryjoin='UserFollowing.user_id==User.user_id', cascade='all')
536 536
537 537 repo_to_perm = relationship('UserRepoToPerm', primaryjoin='UserRepoToPerm.user_id==User.user_id', cascade='all')
538 538 repo_group_to_perm = relationship('UserRepoGroupToPerm', primaryjoin='UserRepoGroupToPerm.user_id==User.user_id', cascade='all')
539 539 user_group_to_perm = relationship('UserUserGroupToPerm', primaryjoin='UserUserGroupToPerm.user_id==User.user_id', cascade='all')
540 540
541 541 group_member = relationship('UserGroupMember', cascade='all')
542 542
543 543 notifications = relationship('UserNotification', cascade='all')
544 544 # notifications assigned to this user
545 545 user_created_notifications = relationship('Notification', cascade='all')
546 546 # comments created by this user
547 547 user_comments = relationship('ChangesetComment', cascade='all')
548 548 # user profile extra info
549 549 user_emails = relationship('UserEmailMap', cascade='all')
550 550 user_ip_map = relationship('UserIpMap', cascade='all')
551 551 user_auth_tokens = relationship('UserApiKeys', cascade='all')
552 552 # gists
553 553 user_gists = relationship('Gist', cascade='all')
554 554 # user pull requests
555 555 user_pull_requests = relationship('PullRequest', cascade='all')
556 556 # external identities
557 557 extenal_identities = relationship(
558 558 'ExternalIdentity',
559 559 primaryjoin="User.user_id==ExternalIdentity.local_user_id",
560 560 cascade='all')
561 561
562 562 def __unicode__(self):
563 563 return u"<%s('id:%s:%s')>" % (self.__class__.__name__,
564 564 self.user_id, self.username)
565 565
566 566 @hybrid_property
567 567 def email(self):
568 568 return self._email
569 569
570 570 @email.setter
571 571 def email(self, val):
572 572 self._email = val.lower() if val else None
573 573
574 574 @hybrid_property
575 575 def api_key(self):
576 576 """
577 577 Fetch if exist an auth-token with role ALL connected to this user
578 578 """
579 579 user_auth_token = UserApiKeys.query()\
580 580 .filter(UserApiKeys.user_id == self.user_id)\
581 581 .filter(or_(UserApiKeys.expires == -1,
582 582 UserApiKeys.expires >= time.time()))\
583 583 .filter(UserApiKeys.role == UserApiKeys.ROLE_ALL).first()
584 584 if user_auth_token:
585 585 user_auth_token = user_auth_token.api_key
586 586
587 587 return user_auth_token
588 588
589 589 @api_key.setter
590 590 def api_key(self, val):
591 591 # don't allow to set API key this is deprecated for now
592 592 self._api_key = None
593 593
594 594 @property
595 595 def firstname(self):
596 596 # alias for future
597 597 return self.name
598 598
599 599 @property
600 600 def emails(self):
601 601 other = UserEmailMap.query().filter(UserEmailMap.user==self).all()
602 602 return [self.email] + [x.email for x in other]
603 603
604 604 @property
605 605 def auth_tokens(self):
606 606 return [x.api_key for x in self.extra_auth_tokens]
607 607
608 608 @property
609 609 def extra_auth_tokens(self):
610 610 return UserApiKeys.query().filter(UserApiKeys.user == self).all()
611 611
612 612 @property
613 613 def feed_token(self):
614 614 return self.get_feed_token()
615 615
616 616 def get_feed_token(self):
617 617 feed_tokens = UserApiKeys.query()\
618 618 .filter(UserApiKeys.user == self)\
619 619 .filter(UserApiKeys.role == UserApiKeys.ROLE_FEED)\
620 620 .all()
621 621 if feed_tokens:
622 622 return feed_tokens[0].api_key
623 623 return 'NO_FEED_TOKEN_AVAILABLE'
624 624
625 625 @classmethod
626 626 def extra_valid_auth_tokens(cls, user, role=None):
627 627 tokens = UserApiKeys.query().filter(UserApiKeys.user == user)\
628 628 .filter(or_(UserApiKeys.expires == -1,
629 629 UserApiKeys.expires >= time.time()))
630 630 if role:
631 631 tokens = tokens.filter(or_(UserApiKeys.role == role,
632 632 UserApiKeys.role == UserApiKeys.ROLE_ALL))
633 633 return tokens.all()
634 634
635 635 def authenticate_by_token(self, auth_token, roles=None, scope_repo_id=None):
636 636 from rhodecode.lib import auth
637 637
638 638 log.debug('Trying to authenticate user: %s via auth-token, '
639 639 'and roles: %s', self, roles)
640 640
641 641 if not auth_token:
642 642 return False
643 643
644 644 crypto_backend = auth.crypto_backend()
645 645
646 646 roles = (roles or []) + [UserApiKeys.ROLE_ALL]
647 647 tokens_q = UserApiKeys.query()\
648 648 .filter(UserApiKeys.user_id == self.user_id)\
649 649 .filter(or_(UserApiKeys.expires == -1,
650 650 UserApiKeys.expires >= time.time()))
651 651
652 652 tokens_q = tokens_q.filter(UserApiKeys.role.in_(roles))
653 653
654 654 plain_tokens = []
655 655 hash_tokens = []
656 656
657 657 for token in tokens_q.all():
658 658 # verify scope first
659 659 if token.repo_id:
660 660 # token has a scope, we need to verify it
661 661 if scope_repo_id != token.repo_id:
662 662 log.debug(
663 663 'Scope mismatch: token has a set repo scope: %s, '
664 664 'and calling scope is:%s, skipping further checks',
665 665 token.repo, scope_repo_id)
666 666 # token has a scope, and it doesn't match, skip token
667 667 continue
668 668
669 669 if token.api_key.startswith(crypto_backend.ENC_PREF):
670 670 hash_tokens.append(token.api_key)
671 671 else:
672 672 plain_tokens.append(token.api_key)
673 673
674 674 is_plain_match = auth_token in plain_tokens
675 675 if is_plain_match:
676 676 return True
677 677
678 678 for hashed in hash_tokens:
679 679 # TODO(marcink): this is expensive to calculate, but most secure
680 680 match = crypto_backend.hash_check(auth_token, hashed)
681 681 if match:
682 682 return True
683 683
684 684 return False
685 685
686 686 @property
687 687 def ip_addresses(self):
688 688 ret = UserIpMap.query().filter(UserIpMap.user == self).all()
689 689 return [x.ip_addr for x in ret]
690 690
691 691 @property
692 692 def username_and_name(self):
693 693 return '%s (%s %s)' % (self.username, self.firstname, self.lastname)
694 694
695 695 @property
696 696 def username_or_name_or_email(self):
697 697 full_name = self.full_name if self.full_name is not ' ' else None
698 698 return self.username or full_name or self.email
699 699
700 700 @property
701 701 def full_name(self):
702 702 return '%s %s' % (self.firstname, self.lastname)
703 703
704 704 @property
705 705 def full_name_or_username(self):
706 706 return ('%s %s' % (self.firstname, self.lastname)
707 707 if (self.firstname and self.lastname) else self.username)
708 708
709 709 @property
710 710 def full_contact(self):
711 711 return '%s %s <%s>' % (self.firstname, self.lastname, self.email)
712 712
713 713 @property
714 714 def short_contact(self):
715 715 return '%s %s' % (self.firstname, self.lastname)
716 716
717 717 @property
718 718 def is_admin(self):
719 719 return self.admin
720 720
721 721 @property
722 722 def AuthUser(self):
723 723 """
724 724 Returns instance of AuthUser for this user
725 725 """
726 726 from rhodecode.lib.auth import AuthUser
727 727 return AuthUser(user_id=self.user_id, username=self.username)
728 728
729 729 @hybrid_property
730 730 def user_data(self):
731 731 if not self._user_data:
732 732 return {}
733 733
734 734 try:
735 735 return json.loads(self._user_data)
736 736 except TypeError:
737 737 return {}
738 738
739 739 @user_data.setter
740 740 def user_data(self, val):
741 741 if not isinstance(val, dict):
742 742 raise Exception('user_data must be dict, got %s' % type(val))
743 743 try:
744 744 self._user_data = json.dumps(val)
745 745 except Exception:
746 746 log.error(traceback.format_exc())
747 747
748 748 @classmethod
749 749 def get_by_username(cls, username, case_insensitive=False,
750 750 cache=False, identity_cache=False):
751 751 session = Session()
752 752
753 753 if case_insensitive:
754 754 q = cls.query().filter(
755 755 func.lower(cls.username) == func.lower(username))
756 756 else:
757 757 q = cls.query().filter(cls.username == username)
758 758
759 759 if cache:
760 760 if identity_cache:
761 761 val = cls.identity_cache(session, 'username', username)
762 762 if val:
763 763 return val
764 764 else:
765 765 cache_key = "get_user_by_name_%s" % _hash_key(username)
766 766 q = q.options(
767 767 FromCache("sql_cache_short", cache_key))
768 768
769 769 return q.scalar()
770 770
771 771 @classmethod
772 772 def get_by_auth_token(cls, auth_token, cache=False):
773 773 q = UserApiKeys.query()\
774 774 .filter(UserApiKeys.api_key == auth_token)\
775 775 .filter(or_(UserApiKeys.expires == -1,
776 776 UserApiKeys.expires >= time.time()))
777 777 if cache:
778 778 q = q.options(
779 779 FromCache("sql_cache_short", "get_auth_token_%s" % auth_token))
780 780
781 781 match = q.first()
782 782 if match:
783 783 return match.user
784 784
785 785 @classmethod
786 786 def get_by_email(cls, email, case_insensitive=False, cache=False):
787 787
788 788 if case_insensitive:
789 789 q = cls.query().filter(func.lower(cls.email) == func.lower(email))
790 790
791 791 else:
792 792 q = cls.query().filter(cls.email == email)
793 793
794 794 email_key = _hash_key(email)
795 795 if cache:
796 796 q = q.options(
797 797 FromCache("sql_cache_short", "get_email_key_%s" % email_key))
798 798
799 799 ret = q.scalar()
800 800 if ret is None:
801 801 q = UserEmailMap.query()
802 802 # try fetching in alternate email map
803 803 if case_insensitive:
804 804 q = q.filter(func.lower(UserEmailMap.email) == func.lower(email))
805 805 else:
806 806 q = q.filter(UserEmailMap.email == email)
807 807 q = q.options(joinedload(UserEmailMap.user))
808 808 if cache:
809 809 q = q.options(
810 810 FromCache("sql_cache_short", "get_email_map_key_%s" % email_key))
811 811 ret = getattr(q.scalar(), 'user', None)
812 812
813 813 return ret
814 814
815 815 @classmethod
816 816 def get_from_cs_author(cls, author):
817 817 """
818 818 Tries to get User objects out of commit author string
819 819
820 820 :param author:
821 821 """
822 822 from rhodecode.lib.helpers import email, author_name
823 823 # Valid email in the attribute passed, see if they're in the system
824 824 _email = email(author)
825 825 if _email:
826 826 user = cls.get_by_email(_email, case_insensitive=True)
827 827 if user:
828 828 return user
829 829 # Maybe we can match by username?
830 830 _author = author_name(author)
831 831 user = cls.get_by_username(_author, case_insensitive=True)
832 832 if user:
833 833 return user
834 834
835 835 def update_userdata(self, **kwargs):
836 836 usr = self
837 837 old = usr.user_data
838 838 old.update(**kwargs)
839 839 usr.user_data = old
840 840 Session().add(usr)
841 841 log.debug('updated userdata with ', kwargs)
842 842
843 843 def update_lastlogin(self):
844 844 """Update user lastlogin"""
845 845 self.last_login = datetime.datetime.now()
846 846 Session().add(self)
847 847 log.debug('updated user %s lastlogin', self.username)
848 848
849 849 def update_lastactivity(self):
850 850 """Update user lastactivity"""
851 851 self.last_activity = datetime.datetime.now()
852 852 Session().add(self)
853 853 log.debug('updated user %s lastactivity', self.username)
854 854
855 855 def update_password(self, new_password):
856 856 from rhodecode.lib.auth import get_crypt_password
857 857
858 858 self.password = get_crypt_password(new_password)
859 859 Session().add(self)
860 860
861 861 @classmethod
862 862 def get_first_super_admin(cls):
863 863 user = User.query().filter(User.admin == true()).first()
864 864 if user is None:
865 865 raise Exception('FATAL: Missing administrative account!')
866 866 return user
867 867
868 868 @classmethod
869 869 def get_all_super_admins(cls):
870 870 """
871 871 Returns all admin accounts sorted by username
872 872 """
873 873 return User.query().filter(User.admin == true())\
874 874 .order_by(User.username.asc()).all()
875 875
876 876 @classmethod
877 877 def get_default_user(cls, cache=False, refresh=False):
878 878 user = User.get_by_username(User.DEFAULT_USER, cache=cache)
879 879 if user is None:
880 880 raise Exception('FATAL: Missing default account!')
881 881 if refresh:
882 882 # The default user might be based on outdated state which
883 883 # has been loaded from the cache.
884 884 # A call to refresh() ensures that the
885 885 # latest state from the database is used.
886 886 Session().refresh(user)
887 887 return user
888 888
889 889 def _get_default_perms(self, user, suffix=''):
890 890 from rhodecode.model.permission import PermissionModel
891 891 return PermissionModel().get_default_perms(user.user_perms, suffix)
892 892
893 893 def get_default_perms(self, suffix=''):
894 894 return self._get_default_perms(self, suffix)
895 895
896 896 def get_api_data(self, include_secrets=False, details='full'):
897 897 """
898 898 Common function for generating user related data for API
899 899
900 900 :param include_secrets: By default secrets in the API data will be replaced
901 901 by a placeholder value to prevent exposing this data by accident. In case
902 902 this data shall be exposed, set this flag to ``True``.
903 903
904 904 :param details: details can be 'basic|full' basic gives only a subset of
905 905 the available user information that includes user_id, name and emails.
906 906 """
907 907 user = self
908 908 user_data = self.user_data
909 909 data = {
910 910 'user_id': user.user_id,
911 911 'username': user.username,
912 912 'firstname': user.name,
913 913 'lastname': user.lastname,
914 914 'email': user.email,
915 915 'emails': user.emails,
916 916 }
917 917 if details == 'basic':
918 918 return data
919 919
920 920 api_key_length = 40
921 921 api_key_replacement = '*' * api_key_length
922 922
923 923 extras = {
924 924 'api_keys': [api_key_replacement],
925 925 'auth_tokens': [api_key_replacement],
926 926 'active': user.active,
927 927 'admin': user.admin,
928 928 'extern_type': user.extern_type,
929 929 'extern_name': user.extern_name,
930 930 'last_login': user.last_login,
931 931 'last_activity': user.last_activity,
932 932 'ip_addresses': user.ip_addresses,
933 933 'language': user_data.get('language')
934 934 }
935 935 data.update(extras)
936 936
937 937 if include_secrets:
938 938 data['api_keys'] = user.auth_tokens
939 939 data['auth_tokens'] = user.extra_auth_tokens
940 940 return data
941 941
942 942 def __json__(self):
943 943 data = {
944 944 'full_name': self.full_name,
945 945 'full_name_or_username': self.full_name_or_username,
946 946 'short_contact': self.short_contact,
947 947 'full_contact': self.full_contact,
948 948 }
949 949 data.update(self.get_api_data())
950 950 return data
951 951
952 952
953 953 class UserApiKeys(Base, BaseModel):
954 954 __tablename__ = 'user_api_keys'
955 955 __table_args__ = (
956 956 Index('uak_api_key_idx', 'api_key'),
957 957 Index('uak_api_key_expires_idx', 'api_key', 'expires'),
958 958 UniqueConstraint('api_key'),
959 959 {'extend_existing': True, 'mysql_engine': 'InnoDB',
960 960 'mysql_charset': 'utf8', 'sqlite_autoincrement': True}
961 961 )
962 962 __mapper_args__ = {}
963 963
964 964 # ApiKey role
965 965 ROLE_ALL = 'token_role_all'
966 966 ROLE_HTTP = 'token_role_http'
967 967 ROLE_VCS = 'token_role_vcs'
968 968 ROLE_API = 'token_role_api'
969 969 ROLE_FEED = 'token_role_feed'
970 970 ROLE_PASSWORD_RESET = 'token_password_reset'
971 971
972 972 ROLES = [ROLE_ALL, ROLE_HTTP, ROLE_VCS, ROLE_API, ROLE_FEED]
973 973
974 974 user_api_key_id = Column("user_api_key_id", Integer(), nullable=False, unique=True, default=None, primary_key=True)
975 975 user_id = Column("user_id", Integer(), ForeignKey('users.user_id'), nullable=True, unique=None, default=None)
976 976 api_key = Column("api_key", String(255), nullable=False, unique=True)
977 977 description = Column('description', UnicodeText().with_variant(UnicodeText(1024), 'mysql'))
978 978 expires = Column('expires', Float(53), nullable=False)
979 979 role = Column('role', String(255), nullable=True)
980 980 created_on = Column('created_on', DateTime(timezone=False), nullable=False, default=datetime.datetime.now)
981 981
982 982 # scope columns
983 983 repo_id = Column(
984 984 'repo_id', Integer(), ForeignKey('repositories.repo_id'),
985 985 nullable=True, unique=None, default=None)
986 986 repo = relationship('Repository', lazy='joined')
987 987
988 988 repo_group_id = Column(
989 989 'repo_group_id', Integer(), ForeignKey('groups.group_id'),
990 990 nullable=True, unique=None, default=None)
991 991 repo_group = relationship('RepoGroup', lazy='joined')
992 992
993 993 user = relationship('User', lazy='joined')
994 994
995 995 def __unicode__(self):
996 996 return u"<%s('%s')>" % (self.__class__.__name__, self.role)
997 997
998 998 def __json__(self):
999 999 data = {
1000 1000 'auth_token': self.api_key,
1001 1001 'role': self.role,
1002 1002 'scope': self.scope_humanized,
1003 1003 'expired': self.expired
1004 1004 }
1005 1005 return data
1006 1006
1007 1007 @property
1008 1008 def expired(self):
1009 1009 if self.expires == -1:
1010 1010 return False
1011 1011 return time.time() > self.expires
1012 1012
1013 1013 @classmethod
1014 1014 def _get_role_name(cls, role):
1015 1015 return {
1016 1016 cls.ROLE_ALL: _('all'),
1017 1017 cls.ROLE_HTTP: _('http/web interface'),
1018 1018 cls.ROLE_VCS: _('vcs (git/hg/svn protocol)'),
1019 1019 cls.ROLE_API: _('api calls'),
1020 1020 cls.ROLE_FEED: _('feed access'),
1021 1021 }.get(role, role)
1022 1022
1023 1023 @property
1024 1024 def role_humanized(self):
1025 1025 return self._get_role_name(self.role)
1026 1026
1027 1027 def _get_scope(self):
1028 1028 if self.repo:
1029 1029 return repr(self.repo)
1030 1030 if self.repo_group:
1031 1031 return repr(self.repo_group) + ' (recursive)'
1032 1032 return 'global'
1033 1033
1034 1034 @property
1035 1035 def scope_humanized(self):
1036 1036 return self._get_scope()
1037 1037
1038 1038
1039 1039 class UserEmailMap(Base, BaseModel):
1040 1040 __tablename__ = 'user_email_map'
1041 1041 __table_args__ = (
1042 1042 Index('uem_email_idx', 'email'),
1043 1043 UniqueConstraint('email'),
1044 1044 {'extend_existing': True, 'mysql_engine': 'InnoDB',
1045 1045 'mysql_charset': 'utf8', 'sqlite_autoincrement': True}
1046 1046 )
1047 1047 __mapper_args__ = {}
1048 1048
1049 1049 email_id = Column("email_id", Integer(), nullable=False, unique=True, default=None, primary_key=True)
1050 1050 user_id = Column("user_id", Integer(), ForeignKey('users.user_id'), nullable=True, unique=None, default=None)
1051 1051 _email = Column("email", String(255), nullable=True, unique=False, default=None)
1052 1052 user = relationship('User', lazy='joined')
1053 1053
1054 1054 @validates('_email')
1055 1055 def validate_email(self, key, email):
1056 1056 # check if this email is not main one
1057 1057 main_email = Session().query(User).filter(User.email == email).scalar()
1058 1058 if main_email is not None:
1059 1059 raise AttributeError('email %s is present is user table' % email)
1060 1060 return email
1061 1061
1062 1062 @hybrid_property
1063 1063 def email(self):
1064 1064 return self._email
1065 1065
1066 1066 @email.setter
1067 1067 def email(self, val):
1068 1068 self._email = val.lower() if val else None
1069 1069
1070 1070
1071 1071 class UserIpMap(Base, BaseModel):
1072 1072 __tablename__ = 'user_ip_map'
1073 1073 __table_args__ = (
1074 1074 UniqueConstraint('user_id', 'ip_addr'),
1075 1075 {'extend_existing': True, 'mysql_engine': 'InnoDB',
1076 1076 'mysql_charset': 'utf8', 'sqlite_autoincrement': True}
1077 1077 )
1078 1078 __mapper_args__ = {}
1079 1079
1080 1080 ip_id = Column("ip_id", Integer(), nullable=False, unique=True, default=None, primary_key=True)
1081 1081 user_id = Column("user_id", Integer(), ForeignKey('users.user_id'), nullable=True, unique=None, default=None)
1082 1082 ip_addr = Column("ip_addr", String(255), nullable=True, unique=False, default=None)
1083 1083 active = Column("active", Boolean(), nullable=True, unique=None, default=True)
1084 1084 description = Column("description", String(10000), nullable=True, unique=None, default=None)
1085 1085 user = relationship('User', lazy='joined')
1086 1086
1087 1087 @classmethod
1088 1088 def _get_ip_range(cls, ip_addr):
1089 1089 net = ipaddress.ip_network(ip_addr, strict=False)
1090 1090 return [str(net.network_address), str(net.broadcast_address)]
1091 1091
1092 1092 def __json__(self):
1093 1093 return {
1094 1094 'ip_addr': self.ip_addr,
1095 1095 'ip_range': self._get_ip_range(self.ip_addr),
1096 1096 }
1097 1097
1098 1098 def __unicode__(self):
1099 1099 return u"<%s('user_id:%s=>%s')>" % (self.__class__.__name__,
1100 1100 self.user_id, self.ip_addr)
1101 1101
1102 1102
1103 1103 class UserLog(Base, BaseModel):
1104 1104 __tablename__ = 'user_logs'
1105 1105 __table_args__ = (
1106 1106 {'extend_existing': True, 'mysql_engine': 'InnoDB',
1107 1107 'mysql_charset': 'utf8', 'sqlite_autoincrement': True},
1108 1108 )
1109 1109 VERSION_1 = 'v1'
1110 1110 VERSION_2 = 'v2'
1111 1111 VERSIONS = [VERSION_1, VERSION_2]
1112 1112
1113 1113 user_log_id = Column("user_log_id", Integer(), nullable=False, unique=True, default=None, primary_key=True)
1114 1114 user_id = Column("user_id", Integer(), ForeignKey('users.user_id'), nullable=True, unique=None, default=None)
1115 1115 username = Column("username", String(255), nullable=True, unique=None, default=None)
1116 1116 repository_id = Column("repository_id", Integer(), ForeignKey('repositories.repo_id'), nullable=True)
1117 1117 repository_name = Column("repository_name", String(255), nullable=True, unique=None, default=None)
1118 1118 user_ip = Column("user_ip", String(255), nullable=True, unique=None, default=None)
1119 1119 action = Column("action", Text().with_variant(Text(1200000), 'mysql'), nullable=True, unique=None, default=None)
1120 1120 action_date = Column("action_date", DateTime(timezone=False), nullable=True, unique=None, default=None)
1121 1121
1122 1122 version = Column("version", String(255), nullable=True, default=VERSION_1)
1123 1123 user_data = Column('user_data_json', MutationObj.as_mutable(JsonType(dialect_map=dict(mysql=UnicodeText(16384)))))
1124 1124 action_data = Column('action_data_json', MutationObj.as_mutable(JsonType(dialect_map=dict(mysql=UnicodeText(16384)))))
1125 1125
1126 1126 def __unicode__(self):
1127 1127 return u"<%s('id:%s:%s')>" % (
1128 1128 self.__class__.__name__, self.repository_name, self.action)
1129 1129
1130 1130 def __json__(self):
1131 1131 return {
1132 1132 'user_id': self.user_id,
1133 1133 'username': self.username,
1134 1134 'repository_id': self.repository_id,
1135 1135 'repository_name': self.repository_name,
1136 1136 'user_ip': self.user_ip,
1137 1137 'action_date': self.action_date,
1138 1138 'action': self.action,
1139 1139 }
1140 1140
1141 1141 @property
1142 1142 def action_as_day(self):
1143 1143 return datetime.date(*self.action_date.timetuple()[:3])
1144 1144
1145 1145 user = relationship('User')
1146 1146 repository = relationship('Repository', cascade='')
1147 1147
1148 1148
1149 1149 class UserGroup(Base, BaseModel):
1150 1150 __tablename__ = 'users_groups'
1151 1151 __table_args__ = (
1152 1152 {'extend_existing': True, 'mysql_engine': 'InnoDB',
1153 1153 'mysql_charset': 'utf8', 'sqlite_autoincrement': True},
1154 1154 )
1155 1155
1156 1156 users_group_id = Column("users_group_id", Integer(), nullable=False, unique=True, default=None, primary_key=True)
1157 1157 users_group_name = Column("users_group_name", String(255), nullable=False, unique=True, default=None)
1158 1158 user_group_description = Column("user_group_description", String(10000), nullable=True, unique=None, default=None)
1159 1159 users_group_active = Column("users_group_active", Boolean(), nullable=True, unique=None, default=None)
1160 1160 inherit_default_permissions = Column("users_group_inherit_default_permissions", Boolean(), nullable=False, unique=None, default=True)
1161 1161 user_id = Column("user_id", Integer(), ForeignKey('users.user_id'), nullable=False, unique=False, default=None)
1162 1162 created_on = Column('created_on', DateTime(timezone=False), nullable=False, default=datetime.datetime.now)
1163 1163 _group_data = Column("group_data", LargeBinary(), nullable=True) # JSON data
1164 1164
1165 1165 members = relationship('UserGroupMember', cascade="all, delete, delete-orphan", lazy="joined")
1166 1166 users_group_to_perm = relationship('UserGroupToPerm', cascade='all')
1167 1167 users_group_repo_to_perm = relationship('UserGroupRepoToPerm', cascade='all')
1168 1168 users_group_repo_group_to_perm = relationship('UserGroupRepoGroupToPerm', cascade='all')
1169 1169 user_user_group_to_perm = relationship('UserUserGroupToPerm', cascade='all')
1170 1170 user_group_user_group_to_perm = relationship('UserGroupUserGroupToPerm ', primaryjoin="UserGroupUserGroupToPerm.target_user_group_id==UserGroup.users_group_id", cascade='all')
1171 1171
1172 1172 user = relationship('User')
1173 1173
1174 1174 @hybrid_property
1175 1175 def group_data(self):
1176 1176 if not self._group_data:
1177 1177 return {}
1178 1178
1179 1179 try:
1180 1180 return json.loads(self._group_data)
1181 1181 except TypeError:
1182 1182 return {}
1183 1183
1184 1184 @group_data.setter
1185 1185 def group_data(self, val):
1186 1186 try:
1187 1187 self._group_data = json.dumps(val)
1188 1188 except Exception:
1189 1189 log.error(traceback.format_exc())
1190 1190
1191 1191 def __unicode__(self):
1192 1192 return u"<%s('id:%s:%s')>" % (self.__class__.__name__,
1193 1193 self.users_group_id,
1194 1194 self.users_group_name)
1195 1195
1196 1196 @classmethod
1197 1197 def get_by_group_name(cls, group_name, cache=False,
1198 1198 case_insensitive=False):
1199 1199 if case_insensitive:
1200 1200 q = cls.query().filter(func.lower(cls.users_group_name) ==
1201 1201 func.lower(group_name))
1202 1202
1203 1203 else:
1204 1204 q = cls.query().filter(cls.users_group_name == group_name)
1205 1205 if cache:
1206 1206 q = q.options(
1207 1207 FromCache("sql_cache_short", "get_group_%s" % _hash_key(group_name)))
1208 1208 return q.scalar()
1209 1209
1210 1210 @classmethod
1211 1211 def get(cls, user_group_id, cache=False):
1212 1212 user_group = cls.query()
1213 1213 if cache:
1214 1214 user_group = user_group.options(
1215 1215 FromCache("sql_cache_short", "get_users_group_%s" % user_group_id))
1216 1216 return user_group.get(user_group_id)
1217 1217
1218 1218 def permissions(self, with_admins=True, with_owner=True):
1219 1219 q = UserUserGroupToPerm.query().filter(UserUserGroupToPerm.user_group == self)
1220 1220 q = q.options(joinedload(UserUserGroupToPerm.user_group),
1221 1221 joinedload(UserUserGroupToPerm.user),
1222 1222 joinedload(UserUserGroupToPerm.permission),)
1223 1223
1224 1224 # get owners and admins and permissions. We do a trick of re-writing
1225 1225 # objects from sqlalchemy to named-tuples due to sqlalchemy session
1226 1226 # has a global reference and changing one object propagates to all
1227 1227 # others. This means if admin is also an owner admin_row that change
1228 1228 # would propagate to both objects
1229 1229 perm_rows = []
1230 1230 for _usr in q.all():
1231 1231 usr = AttributeDict(_usr.user.get_dict())
1232 1232 usr.permission = _usr.permission.permission_name
1233 1233 perm_rows.append(usr)
1234 1234
1235 1235 # filter the perm rows by 'default' first and then sort them by
1236 1236 # admin,write,read,none permissions sorted again alphabetically in
1237 1237 # each group
1238 1238 perm_rows = sorted(perm_rows, key=display_sort)
1239 1239
1240 1240 _admin_perm = 'usergroup.admin'
1241 1241 owner_row = []
1242 1242 if with_owner:
1243 1243 usr = AttributeDict(self.user.get_dict())
1244 1244 usr.owner_row = True
1245 1245 usr.permission = _admin_perm
1246 1246 owner_row.append(usr)
1247 1247
1248 1248 super_admin_rows = []
1249 1249 if with_admins:
1250 1250 for usr in User.get_all_super_admins():
1251 1251 # if this admin is also owner, don't double the record
1252 1252 if usr.user_id == owner_row[0].user_id:
1253 1253 owner_row[0].admin_row = True
1254 1254 else:
1255 1255 usr = AttributeDict(usr.get_dict())
1256 1256 usr.admin_row = True
1257 1257 usr.permission = _admin_perm
1258 1258 super_admin_rows.append(usr)
1259 1259
1260 1260 return super_admin_rows + owner_row + perm_rows
1261 1261
1262 1262 def permission_user_groups(self):
1263 1263 q = UserGroupUserGroupToPerm.query().filter(UserGroupUserGroupToPerm.target_user_group == self)
1264 1264 q = q.options(joinedload(UserGroupUserGroupToPerm.user_group),
1265 1265 joinedload(UserGroupUserGroupToPerm.target_user_group),
1266 1266 joinedload(UserGroupUserGroupToPerm.permission),)
1267 1267
1268 1268 perm_rows = []
1269 1269 for _user_group in q.all():
1270 1270 usr = AttributeDict(_user_group.user_group.get_dict())
1271 1271 usr.permission = _user_group.permission.permission_name
1272 1272 perm_rows.append(usr)
1273 1273
1274 1274 return perm_rows
1275 1275
1276 1276 def _get_default_perms(self, user_group, suffix=''):
1277 1277 from rhodecode.model.permission import PermissionModel
1278 1278 return PermissionModel().get_default_perms(user_group.users_group_to_perm, suffix)
1279 1279
1280 1280 def get_default_perms(self, suffix=''):
1281 1281 return self._get_default_perms(self, suffix)
1282 1282
1283 1283 def get_api_data(self, with_group_members=True, include_secrets=False):
1284 1284 """
1285 1285 :param include_secrets: See :meth:`User.get_api_data`, this parameter is
1286 1286 basically forwarded.
1287 1287
1288 1288 """
1289 1289 user_group = self
1290 1290 data = {
1291 1291 'users_group_id': user_group.users_group_id,
1292 1292 'group_name': user_group.users_group_name,
1293 1293 'group_description': user_group.user_group_description,
1294 1294 'active': user_group.users_group_active,
1295 1295 'owner': user_group.user.username,
1296 1296 'owner_email': user_group.user.email,
1297 1297 }
1298 1298
1299 1299 if with_group_members:
1300 1300 users = []
1301 1301 for user in user_group.members:
1302 1302 user = user.user
1303 1303 users.append(user.get_api_data(include_secrets=include_secrets))
1304 1304 data['users'] = users
1305 1305
1306 1306 return data
1307 1307
1308 1308
1309 1309 class UserGroupMember(Base, BaseModel):
1310 1310 __tablename__ = 'users_groups_members'
1311 1311 __table_args__ = (
1312 1312 {'extend_existing': True, 'mysql_engine': 'InnoDB',
1313 1313 'mysql_charset': 'utf8', 'sqlite_autoincrement': True},
1314 1314 )
1315 1315
1316 1316 users_group_member_id = Column("users_group_member_id", Integer(), nullable=False, unique=True, default=None, primary_key=True)
1317 1317 users_group_id = Column("users_group_id", Integer(), ForeignKey('users_groups.users_group_id'), nullable=False, unique=None, default=None)
1318 1318 user_id = Column("user_id", Integer(), ForeignKey('users.user_id'), nullable=False, unique=None, default=None)
1319 1319
1320 1320 user = relationship('User', lazy='joined')
1321 1321 users_group = relationship('UserGroup')
1322 1322
1323 1323 def __init__(self, gr_id='', u_id=''):
1324 1324 self.users_group_id = gr_id
1325 1325 self.user_id = u_id
1326 1326
1327 1327
1328 1328 class RepositoryField(Base, BaseModel):
1329 1329 __tablename__ = 'repositories_fields'
1330 1330 __table_args__ = (
1331 1331 UniqueConstraint('repository_id', 'field_key'), # no-multi field
1332 1332 {'extend_existing': True, 'mysql_engine': 'InnoDB',
1333 1333 'mysql_charset': 'utf8', 'sqlite_autoincrement': True},
1334 1334 )
1335 1335 PREFIX = 'ex_' # prefix used in form to not conflict with already existing fields
1336 1336
1337 1337 repo_field_id = Column("repo_field_id", Integer(), nullable=False, unique=True, default=None, primary_key=True)
1338 1338 repository_id = Column("repository_id", Integer(), ForeignKey('repositories.repo_id'), nullable=False, unique=None, default=None)
1339 1339 field_key = Column("field_key", String(250))
1340 1340 field_label = Column("field_label", String(1024), nullable=False)
1341 1341 field_value = Column("field_value", String(10000), nullable=False)
1342 1342 field_desc = Column("field_desc", String(1024), nullable=False)
1343 1343 field_type = Column("field_type", String(255), nullable=False, unique=None)
1344 1344 created_on = Column('created_on', DateTime(timezone=False), nullable=False, default=datetime.datetime.now)
1345 1345
1346 1346 repository = relationship('Repository')
1347 1347
1348 1348 @property
1349 1349 def field_key_prefixed(self):
1350 1350 return 'ex_%s' % self.field_key
1351 1351
1352 1352 @classmethod
1353 1353 def un_prefix_key(cls, key):
1354 1354 if key.startswith(cls.PREFIX):
1355 1355 return key[len(cls.PREFIX):]
1356 1356 return key
1357 1357
1358 1358 @classmethod
1359 1359 def get_by_key_name(cls, key, repo):
1360 1360 row = cls.query()\
1361 1361 .filter(cls.repository == repo)\
1362 1362 .filter(cls.field_key == key).scalar()
1363 1363 return row
1364 1364
1365 1365
1366 1366 class Repository(Base, BaseModel):
1367 1367 __tablename__ = 'repositories'
1368 1368 __table_args__ = (
1369 1369 Index('r_repo_name_idx', 'repo_name', mysql_length=255),
1370 1370 {'extend_existing': True, 'mysql_engine': 'InnoDB',
1371 1371 'mysql_charset': 'utf8', 'sqlite_autoincrement': True},
1372 1372 )
1373 1373 DEFAULT_CLONE_URI = '{scheme}://{user}@{netloc}/{repo}'
1374 1374 DEFAULT_CLONE_URI_ID = '{scheme}://{user}@{netloc}/_{repoid}'
1375 1375
1376 1376 STATE_CREATED = 'repo_state_created'
1377 1377 STATE_PENDING = 'repo_state_pending'
1378 1378 STATE_ERROR = 'repo_state_error'
1379 1379
1380 1380 LOCK_AUTOMATIC = 'lock_auto'
1381 1381 LOCK_API = 'lock_api'
1382 1382 LOCK_WEB = 'lock_web'
1383 1383 LOCK_PULL = 'lock_pull'
1384 1384
1385 1385 NAME_SEP = URL_SEP
1386 1386
1387 1387 repo_id = Column(
1388 1388 "repo_id", Integer(), nullable=False, unique=True, default=None,
1389 1389 primary_key=True)
1390 1390 _repo_name = Column(
1391 1391 "repo_name", Text(), nullable=False, default=None)
1392 1392 _repo_name_hash = Column(
1393 1393 "repo_name_hash", String(255), nullable=False, unique=True)
1394 1394 repo_state = Column("repo_state", String(255), nullable=True)
1395 1395
1396 1396 clone_uri = Column(
1397 1397 "clone_uri", EncryptedTextValue(), nullable=True, unique=False,
1398 1398 default=None)
1399 1399 repo_type = Column(
1400 1400 "repo_type", String(255), nullable=False, unique=False, default=None)
1401 1401 user_id = Column(
1402 1402 "user_id", Integer(), ForeignKey('users.user_id'), nullable=False,
1403 1403 unique=False, default=None)
1404 1404 private = Column(
1405 1405 "private", Boolean(), nullable=True, unique=None, default=None)
1406 1406 enable_statistics = Column(
1407 1407 "statistics", Boolean(), nullable=True, unique=None, default=True)
1408 1408 enable_downloads = Column(
1409 1409 "downloads", Boolean(), nullable=True, unique=None, default=True)
1410 1410 description = Column(
1411 1411 "description", String(10000), nullable=True, unique=None, default=None)
1412 1412 created_on = Column(
1413 1413 'created_on', DateTime(timezone=False), nullable=True, unique=None,
1414 1414 default=datetime.datetime.now)
1415 1415 updated_on = Column(
1416 1416 'updated_on', DateTime(timezone=False), nullable=True, unique=None,
1417 1417 default=datetime.datetime.now)
1418 1418 _landing_revision = Column(
1419 1419 "landing_revision", String(255), nullable=False, unique=False,
1420 1420 default=None)
1421 1421 enable_locking = Column(
1422 1422 "enable_locking", Boolean(), nullable=False, unique=None,
1423 1423 default=False)
1424 1424 _locked = Column(
1425 1425 "locked", String(255), nullable=True, unique=False, default=None)
1426 1426 _changeset_cache = Column(
1427 1427 "changeset_cache", LargeBinary(), nullable=True) # JSON data
1428 1428
1429 1429 fork_id = Column(
1430 1430 "fork_id", Integer(), ForeignKey('repositories.repo_id'),
1431 1431 nullable=True, unique=False, default=None)
1432 1432 group_id = Column(
1433 1433 "group_id", Integer(), ForeignKey('groups.group_id'), nullable=True,
1434 1434 unique=False, default=None)
1435 1435
1436 1436 user = relationship('User', lazy='joined')
1437 1437 fork = relationship('Repository', remote_side=repo_id, lazy='joined')
1438 1438 group = relationship('RepoGroup', lazy='joined')
1439 1439 repo_to_perm = relationship(
1440 1440 'UserRepoToPerm', cascade='all',
1441 1441 order_by='UserRepoToPerm.repo_to_perm_id')
1442 1442 users_group_to_perm = relationship('UserGroupRepoToPerm', cascade='all')
1443 1443 stats = relationship('Statistics', cascade='all', uselist=False)
1444 1444
1445 1445 followers = relationship(
1446 1446 'UserFollowing',
1447 1447 primaryjoin='UserFollowing.follows_repo_id==Repository.repo_id',
1448 1448 cascade='all')
1449 1449 extra_fields = relationship(
1450 1450 'RepositoryField', cascade="all, delete, delete-orphan")
1451 1451 logs = relationship('UserLog')
1452 1452 comments = relationship(
1453 1453 'ChangesetComment', cascade="all, delete, delete-orphan")
1454 1454 pull_requests_source = relationship(
1455 1455 'PullRequest',
1456 1456 primaryjoin='PullRequest.source_repo_id==Repository.repo_id',
1457 1457 cascade="all, delete, delete-orphan")
1458 1458 pull_requests_target = relationship(
1459 1459 'PullRequest',
1460 1460 primaryjoin='PullRequest.target_repo_id==Repository.repo_id',
1461 1461 cascade="all, delete, delete-orphan")
1462 1462 ui = relationship('RepoRhodeCodeUi', cascade="all")
1463 1463 settings = relationship('RepoRhodeCodeSetting', cascade="all")
1464 1464 integrations = relationship('Integration',
1465 1465 cascade="all, delete, delete-orphan")
1466 1466
1467 1467 def __unicode__(self):
1468 1468 return u"<%s('%s:%s')>" % (self.__class__.__name__, self.repo_id,
1469 1469 safe_unicode(self.repo_name))
1470 1470
1471 1471 @hybrid_property
1472 1472 def landing_rev(self):
1473 1473 # always should return [rev_type, rev]
1474 1474 if self._landing_revision:
1475 1475 _rev_info = self._landing_revision.split(':')
1476 1476 if len(_rev_info) < 2:
1477 1477 _rev_info.insert(0, 'rev')
1478 1478 return [_rev_info[0], _rev_info[1]]
1479 1479 return [None, None]
1480 1480
1481 1481 @landing_rev.setter
1482 1482 def landing_rev(self, val):
1483 1483 if ':' not in val:
1484 1484 raise ValueError('value must be delimited with `:` and consist '
1485 1485 'of <rev_type>:<rev>, got %s instead' % val)
1486 1486 self._landing_revision = val
1487 1487
1488 1488 @hybrid_property
1489 1489 def locked(self):
1490 1490 if self._locked:
1491 1491 user_id, timelocked, reason = self._locked.split(':')
1492 1492 lock_values = int(user_id), timelocked, reason
1493 1493 else:
1494 1494 lock_values = [None, None, None]
1495 1495 return lock_values
1496 1496
1497 1497 @locked.setter
1498 1498 def locked(self, val):
1499 1499 if val and isinstance(val, (list, tuple)):
1500 1500 self._locked = ':'.join(map(str, val))
1501 1501 else:
1502 1502 self._locked = None
1503 1503
1504 1504 @hybrid_property
1505 1505 def changeset_cache(self):
1506 1506 from rhodecode.lib.vcs.backends.base import EmptyCommit
1507 1507 dummy = EmptyCommit().__json__()
1508 1508 if not self._changeset_cache:
1509 1509 return dummy
1510 1510 try:
1511 1511 return json.loads(self._changeset_cache)
1512 1512 except TypeError:
1513 1513 return dummy
1514 1514 except Exception:
1515 1515 log.error(traceback.format_exc())
1516 1516 return dummy
1517 1517
1518 1518 @changeset_cache.setter
1519 1519 def changeset_cache(self, val):
1520 1520 try:
1521 1521 self._changeset_cache = json.dumps(val)
1522 1522 except Exception:
1523 1523 log.error(traceback.format_exc())
1524 1524
1525 1525 @hybrid_property
1526 1526 def repo_name(self):
1527 1527 return self._repo_name
1528 1528
1529 1529 @repo_name.setter
1530 1530 def repo_name(self, value):
1531 1531 self._repo_name = value
1532 1532 self._repo_name_hash = hashlib.sha1(safe_str(value)).hexdigest()
1533 1533
1534 1534 @classmethod
1535 1535 def normalize_repo_name(cls, repo_name):
1536 1536 """
1537 1537 Normalizes os specific repo_name to the format internally stored inside
1538 1538 database using URL_SEP
1539 1539
1540 1540 :param cls:
1541 1541 :param repo_name:
1542 1542 """
1543 1543 return cls.NAME_SEP.join(repo_name.split(os.sep))
1544 1544
1545 1545 @classmethod
1546 1546 def get_by_repo_name(cls, repo_name, cache=False, identity_cache=False):
1547 1547 session = Session()
1548 1548 q = session.query(cls).filter(cls.repo_name == repo_name)
1549 1549
1550 1550 if cache:
1551 1551 if identity_cache:
1552 1552 val = cls.identity_cache(session, 'repo_name', repo_name)
1553 1553 if val:
1554 1554 return val
1555 1555 else:
1556 1556 cache_key = "get_repo_by_name_%s" % _hash_key(repo_name)
1557 1557 q = q.options(
1558 1558 FromCache("sql_cache_short", cache_key))
1559 1559
1560 1560 return q.scalar()
1561 1561
1562 1562 @classmethod
1563 1563 def get_by_full_path(cls, repo_full_path):
1564 1564 repo_name = repo_full_path.split(cls.base_path(), 1)[-1]
1565 1565 repo_name = cls.normalize_repo_name(repo_name)
1566 1566 return cls.get_by_repo_name(repo_name.strip(URL_SEP))
1567 1567
1568 1568 @classmethod
1569 1569 def get_repo_forks(cls, repo_id):
1570 1570 return cls.query().filter(Repository.fork_id == repo_id)
1571 1571
1572 1572 @classmethod
1573 1573 def base_path(cls):
1574 1574 """
1575 1575 Returns base path when all repos are stored
1576 1576
1577 1577 :param cls:
1578 1578 """
1579 1579 q = Session().query(RhodeCodeUi)\
1580 1580 .filter(RhodeCodeUi.ui_key == cls.NAME_SEP)
1581 1581 q = q.options(FromCache("sql_cache_short", "repository_repo_path"))
1582 1582 return q.one().ui_value
1583 1583
1584 1584 @classmethod
1585 1585 def is_valid(cls, repo_name):
1586 1586 """
1587 1587 returns True if given repo name is a valid filesystem repository
1588 1588
1589 1589 :param cls:
1590 1590 :param repo_name:
1591 1591 """
1592 1592 from rhodecode.lib.utils import is_valid_repo
1593 1593
1594 1594 return is_valid_repo(repo_name, cls.base_path())
1595 1595
1596 1596 @classmethod
1597 1597 def get_all_repos(cls, user_id=Optional(None), group_id=Optional(None),
1598 1598 case_insensitive=True):
1599 1599 q = Repository.query()
1600 1600
1601 1601 if not isinstance(user_id, Optional):
1602 1602 q = q.filter(Repository.user_id == user_id)
1603 1603
1604 1604 if not isinstance(group_id, Optional):
1605 1605 q = q.filter(Repository.group_id == group_id)
1606 1606
1607 1607 if case_insensitive:
1608 1608 q = q.order_by(func.lower(Repository.repo_name))
1609 1609 else:
1610 1610 q = q.order_by(Repository.repo_name)
1611 1611 return q.all()
1612 1612
1613 1613 @property
1614 1614 def forks(self):
1615 1615 """
1616 1616 Return forks of this repo
1617 1617 """
1618 1618 return Repository.get_repo_forks(self.repo_id)
1619 1619
1620 1620 @property
1621 1621 def parent(self):
1622 1622 """
1623 1623 Returns fork parent
1624 1624 """
1625 1625 return self.fork
1626 1626
1627 1627 @property
1628 1628 def just_name(self):
1629 1629 return self.repo_name.split(self.NAME_SEP)[-1]
1630 1630
1631 1631 @property
1632 1632 def groups_with_parents(self):
1633 1633 groups = []
1634 1634 if self.group is None:
1635 1635 return groups
1636 1636
1637 1637 cur_gr = self.group
1638 1638 groups.insert(0, cur_gr)
1639 1639 while 1:
1640 1640 gr = getattr(cur_gr, 'parent_group', None)
1641 1641 cur_gr = cur_gr.parent_group
1642 1642 if gr is None:
1643 1643 break
1644 1644 groups.insert(0, gr)
1645 1645
1646 1646 return groups
1647 1647
1648 1648 @property
1649 1649 def groups_and_repo(self):
1650 1650 return self.groups_with_parents, self
1651 1651
1652 1652 @LazyProperty
1653 1653 def repo_path(self):
1654 1654 """
1655 1655 Returns base full path for that repository means where it actually
1656 1656 exists on a filesystem
1657 1657 """
1658 1658 q = Session().query(RhodeCodeUi).filter(
1659 1659 RhodeCodeUi.ui_key == self.NAME_SEP)
1660 1660 q = q.options(FromCache("sql_cache_short", "repository_repo_path"))
1661 1661 return q.one().ui_value
1662 1662
1663 1663 @property
1664 1664 def repo_full_path(self):
1665 1665 p = [self.repo_path]
1666 1666 # we need to split the name by / since this is how we store the
1667 1667 # names in the database, but that eventually needs to be converted
1668 1668 # into a valid system path
1669 1669 p += self.repo_name.split(self.NAME_SEP)
1670 1670 return os.path.join(*map(safe_unicode, p))
1671 1671
1672 1672 @property
1673 1673 def cache_keys(self):
1674 1674 """
1675 1675 Returns associated cache keys for that repo
1676 1676 """
1677 1677 return CacheKey.query()\
1678 1678 .filter(CacheKey.cache_args == self.repo_name)\
1679 1679 .order_by(CacheKey.cache_key)\
1680 1680 .all()
1681 1681
1682 1682 def get_new_name(self, repo_name):
1683 1683 """
1684 1684 returns new full repository name based on assigned group and new new
1685 1685
1686 1686 :param group_name:
1687 1687 """
1688 1688 path_prefix = self.group.full_path_splitted if self.group else []
1689 1689 return self.NAME_SEP.join(path_prefix + [repo_name])
1690 1690
1691 1691 @property
1692 1692 def _config(self):
1693 1693 """
1694 1694 Returns db based config object.
1695 1695 """
1696 1696 from rhodecode.lib.utils import make_db_config
1697 1697 return make_db_config(clear_session=False, repo=self)
1698 1698
1699 1699 def permissions(self, with_admins=True, with_owner=True):
1700 1700 q = UserRepoToPerm.query().filter(UserRepoToPerm.repository == self)
1701 1701 q = q.options(joinedload(UserRepoToPerm.repository),
1702 1702 joinedload(UserRepoToPerm.user),
1703 1703 joinedload(UserRepoToPerm.permission),)
1704 1704
1705 1705 # get owners and admins and permissions. We do a trick of re-writing
1706 1706 # objects from sqlalchemy to named-tuples due to sqlalchemy session
1707 1707 # has a global reference and changing one object propagates to all
1708 1708 # others. This means if admin is also an owner admin_row that change
1709 1709 # would propagate to both objects
1710 1710 perm_rows = []
1711 1711 for _usr in q.all():
1712 1712 usr = AttributeDict(_usr.user.get_dict())
1713 1713 usr.permission = _usr.permission.permission_name
1714 1714 perm_rows.append(usr)
1715 1715
1716 1716 # filter the perm rows by 'default' first and then sort them by
1717 1717 # admin,write,read,none permissions sorted again alphabetically in
1718 1718 # each group
1719 1719 perm_rows = sorted(perm_rows, key=display_sort)
1720 1720
1721 1721 _admin_perm = 'repository.admin'
1722 1722 owner_row = []
1723 1723 if with_owner:
1724 1724 usr = AttributeDict(self.user.get_dict())
1725 1725 usr.owner_row = True
1726 1726 usr.permission = _admin_perm
1727 1727 owner_row.append(usr)
1728 1728
1729 1729 super_admin_rows = []
1730 1730 if with_admins:
1731 1731 for usr in User.get_all_super_admins():
1732 1732 # if this admin is also owner, don't double the record
1733 1733 if usr.user_id == owner_row[0].user_id:
1734 1734 owner_row[0].admin_row = True
1735 1735 else:
1736 1736 usr = AttributeDict(usr.get_dict())
1737 1737 usr.admin_row = True
1738 1738 usr.permission = _admin_perm
1739 1739 super_admin_rows.append(usr)
1740 1740
1741 1741 return super_admin_rows + owner_row + perm_rows
1742 1742
1743 1743 def permission_user_groups(self):
1744 1744 q = UserGroupRepoToPerm.query().filter(
1745 1745 UserGroupRepoToPerm.repository == self)
1746 1746 q = q.options(joinedload(UserGroupRepoToPerm.repository),
1747 1747 joinedload(UserGroupRepoToPerm.users_group),
1748 1748 joinedload(UserGroupRepoToPerm.permission),)
1749 1749
1750 1750 perm_rows = []
1751 1751 for _user_group in q.all():
1752 1752 usr = AttributeDict(_user_group.users_group.get_dict())
1753 1753 usr.permission = _user_group.permission.permission_name
1754 1754 perm_rows.append(usr)
1755 1755
1756 1756 return perm_rows
1757 1757
1758 1758 def get_api_data(self, include_secrets=False):
1759 1759 """
1760 1760 Common function for generating repo api data
1761 1761
1762 1762 :param include_secrets: See :meth:`User.get_api_data`.
1763 1763
1764 1764 """
1765 1765 # TODO: mikhail: Here there is an anti-pattern, we probably need to
1766 1766 # move this methods on models level.
1767 1767 from rhodecode.model.settings import SettingsModel
1768 1768 from rhodecode.model.repo import RepoModel
1769 1769
1770 1770 repo = self
1771 1771 _user_id, _time, _reason = self.locked
1772 1772
1773 1773 data = {
1774 1774 'repo_id': repo.repo_id,
1775 1775 'repo_name': repo.repo_name,
1776 1776 'repo_type': repo.repo_type,
1777 1777 'clone_uri': repo.clone_uri or '',
1778 1778 'url': RepoModel().get_url(self),
1779 1779 'private': repo.private,
1780 1780 'created_on': repo.created_on,
1781 1781 'description': repo.description,
1782 1782 'landing_rev': repo.landing_rev,
1783 1783 'owner': repo.user.username,
1784 1784 'fork_of': repo.fork.repo_name if repo.fork else None,
1785 'fork_of_id': repo.fork.repo_id if repo.fork else None,
1785 1786 'enable_statistics': repo.enable_statistics,
1786 1787 'enable_locking': repo.enable_locking,
1787 1788 'enable_downloads': repo.enable_downloads,
1788 1789 'last_changeset': repo.changeset_cache,
1789 1790 'locked_by': User.get(_user_id).get_api_data(
1790 1791 include_secrets=include_secrets) if _user_id else None,
1791 1792 'locked_date': time_to_datetime(_time) if _time else None,
1792 1793 'lock_reason': _reason if _reason else None,
1793 1794 }
1794 1795
1795 1796 # TODO: mikhail: should be per-repo settings here
1796 1797 rc_config = SettingsModel().get_all_settings()
1797 1798 repository_fields = str2bool(
1798 1799 rc_config.get('rhodecode_repository_fields'))
1799 1800 if repository_fields:
1800 1801 for f in self.extra_fields:
1801 1802 data[f.field_key_prefixed] = f.field_value
1802 1803
1803 1804 return data
1804 1805
1805 1806 @classmethod
1806 1807 def lock(cls, repo, user_id, lock_time=None, lock_reason=None):
1807 1808 if not lock_time:
1808 1809 lock_time = time.time()
1809 1810 if not lock_reason:
1810 1811 lock_reason = cls.LOCK_AUTOMATIC
1811 1812 repo.locked = [user_id, lock_time, lock_reason]
1812 1813 Session().add(repo)
1813 1814 Session().commit()
1814 1815
1815 1816 @classmethod
1816 1817 def unlock(cls, repo):
1817 1818 repo.locked = None
1818 1819 Session().add(repo)
1819 1820 Session().commit()
1820 1821
1821 1822 @classmethod
1822 1823 def getlock(cls, repo):
1823 1824 return repo.locked
1824 1825
1825 1826 def is_user_lock(self, user_id):
1826 1827 if self.lock[0]:
1827 1828 lock_user_id = safe_int(self.lock[0])
1828 1829 user_id = safe_int(user_id)
1829 1830 # both are ints, and they are equal
1830 1831 return all([lock_user_id, user_id]) and lock_user_id == user_id
1831 1832
1832 1833 return False
1833 1834
1834 1835 def get_locking_state(self, action, user_id, only_when_enabled=True):
1835 1836 """
1836 1837 Checks locking on this repository, if locking is enabled and lock is
1837 1838 present returns a tuple of make_lock, locked, locked_by.
1838 1839 make_lock can have 3 states None (do nothing) True, make lock
1839 1840 False release lock, This value is later propagated to hooks, which
1840 1841 do the locking. Think about this as signals passed to hooks what to do.
1841 1842
1842 1843 """
1843 1844 # TODO: johbo: This is part of the business logic and should be moved
1844 1845 # into the RepositoryModel.
1845 1846
1846 1847 if action not in ('push', 'pull'):
1847 1848 raise ValueError("Invalid action value: %s" % repr(action))
1848 1849
1849 1850 # defines if locked error should be thrown to user
1850 1851 currently_locked = False
1851 1852 # defines if new lock should be made, tri-state
1852 1853 make_lock = None
1853 1854 repo = self
1854 1855 user = User.get(user_id)
1855 1856
1856 1857 lock_info = repo.locked
1857 1858
1858 1859 if repo and (repo.enable_locking or not only_when_enabled):
1859 1860 if action == 'push':
1860 1861 # check if it's already locked !, if it is compare users
1861 1862 locked_by_user_id = lock_info[0]
1862 1863 if user.user_id == locked_by_user_id:
1863 1864 log.debug(
1864 1865 'Got `push` action from user %s, now unlocking', user)
1865 1866 # unlock if we have push from user who locked
1866 1867 make_lock = False
1867 1868 else:
1868 1869 # we're not the same user who locked, ban with
1869 1870 # code defined in settings (default is 423 HTTP Locked) !
1870 1871 log.debug('Repo %s is currently locked by %s', repo, user)
1871 1872 currently_locked = True
1872 1873 elif action == 'pull':
1873 1874 # [0] user [1] date
1874 1875 if lock_info[0] and lock_info[1]:
1875 1876 log.debug('Repo %s is currently locked by %s', repo, user)
1876 1877 currently_locked = True
1877 1878 else:
1878 1879 log.debug('Setting lock on repo %s by %s', repo, user)
1879 1880 make_lock = True
1880 1881
1881 1882 else:
1882 1883 log.debug('Repository %s do not have locking enabled', repo)
1883 1884
1884 1885 log.debug('FINAL locking values make_lock:%s,locked:%s,locked_by:%s',
1885 1886 make_lock, currently_locked, lock_info)
1886 1887
1887 1888 from rhodecode.lib.auth import HasRepoPermissionAny
1888 1889 perm_check = HasRepoPermissionAny('repository.write', 'repository.admin')
1889 1890 if make_lock and not perm_check(repo_name=repo.repo_name, user=user):
1890 1891 # if we don't have at least write permission we cannot make a lock
1891 1892 log.debug('lock state reset back to FALSE due to lack '
1892 1893 'of at least read permission')
1893 1894 make_lock = False
1894 1895
1895 1896 return make_lock, currently_locked, lock_info
1896 1897
1897 1898 @property
1898 1899 def last_db_change(self):
1899 1900 return self.updated_on
1900 1901
1901 1902 @property
1902 1903 def clone_uri_hidden(self):
1903 1904 clone_uri = self.clone_uri
1904 1905 if clone_uri:
1905 1906 import urlobject
1906 1907 url_obj = urlobject.URLObject(cleaned_uri(clone_uri))
1907 1908 if url_obj.password:
1908 1909 clone_uri = url_obj.with_password('*****')
1909 1910 return clone_uri
1910 1911
1911 1912 def clone_url(self, **override):
1912 1913
1913 1914 uri_tmpl = None
1914 1915 if 'with_id' in override:
1915 1916 uri_tmpl = self.DEFAULT_CLONE_URI_ID
1916 1917 del override['with_id']
1917 1918
1918 1919 if 'uri_tmpl' in override:
1919 1920 uri_tmpl = override['uri_tmpl']
1920 1921 del override['uri_tmpl']
1921 1922
1922 1923 # we didn't override our tmpl from **overrides
1923 1924 if not uri_tmpl:
1924 1925 uri_tmpl = self.DEFAULT_CLONE_URI
1925 1926 try:
1926 1927 from pylons import tmpl_context as c
1927 1928 uri_tmpl = c.clone_uri_tmpl
1928 1929 except Exception:
1929 1930 # in any case if we call this outside of request context,
1930 1931 # ie, not having tmpl_context set up
1931 1932 pass
1932 1933
1933 1934 request = get_current_request()
1934 1935 return get_clone_url(request=request,
1935 1936 uri_tmpl=uri_tmpl,
1936 1937 repo_name=self.repo_name,
1937 1938 repo_id=self.repo_id, **override)
1938 1939
1939 1940 def set_state(self, state):
1940 1941 self.repo_state = state
1941 1942 Session().add(self)
1942 1943 #==========================================================================
1943 1944 # SCM PROPERTIES
1944 1945 #==========================================================================
1945 1946
1946 1947 def get_commit(self, commit_id=None, commit_idx=None, pre_load=None):
1947 1948 return get_commit_safe(
1948 1949 self.scm_instance(), commit_id, commit_idx, pre_load=pre_load)
1949 1950
1950 1951 def get_changeset(self, rev=None, pre_load=None):
1951 1952 warnings.warn("Use get_commit", DeprecationWarning)
1952 1953 commit_id = None
1953 1954 commit_idx = None
1954 1955 if isinstance(rev, basestring):
1955 1956 commit_id = rev
1956 1957 else:
1957 1958 commit_idx = rev
1958 1959 return self.get_commit(commit_id=commit_id, commit_idx=commit_idx,
1959 1960 pre_load=pre_load)
1960 1961
1961 1962 def get_landing_commit(self):
1962 1963 """
1963 1964 Returns landing commit, or if that doesn't exist returns the tip
1964 1965 """
1965 1966 _rev_type, _rev = self.landing_rev
1966 1967 commit = self.get_commit(_rev)
1967 1968 if isinstance(commit, EmptyCommit):
1968 1969 return self.get_commit()
1969 1970 return commit
1970 1971
1971 1972 def update_commit_cache(self, cs_cache=None, config=None):
1972 1973 """
1973 1974 Update cache of last changeset for repository, keys should be::
1974 1975
1975 1976 short_id
1976 1977 raw_id
1977 1978 revision
1978 1979 parents
1979 1980 message
1980 1981 date
1981 1982 author
1982 1983
1983 1984 :param cs_cache:
1984 1985 """
1985 1986 from rhodecode.lib.vcs.backends.base import BaseChangeset
1986 1987 if cs_cache is None:
1987 1988 # use no-cache version here
1988 1989 scm_repo = self.scm_instance(cache=False, config=config)
1989 1990 if scm_repo:
1990 1991 cs_cache = scm_repo.get_commit(
1991 1992 pre_load=["author", "date", "message", "parents"])
1992 1993 else:
1993 1994 cs_cache = EmptyCommit()
1994 1995
1995 1996 if isinstance(cs_cache, BaseChangeset):
1996 1997 cs_cache = cs_cache.__json__()
1997 1998
1998 1999 def is_outdated(new_cs_cache):
1999 2000 if (new_cs_cache['raw_id'] != self.changeset_cache['raw_id'] or
2000 2001 new_cs_cache['revision'] != self.changeset_cache['revision']):
2001 2002 return True
2002 2003 return False
2003 2004
2004 2005 # check if we have maybe already latest cached revision
2005 2006 if is_outdated(cs_cache) or not self.changeset_cache:
2006 2007 _default = datetime.datetime.fromtimestamp(0)
2007 2008 last_change = cs_cache.get('date') or _default
2008 2009 log.debug('updated repo %s with new cs cache %s',
2009 2010 self.repo_name, cs_cache)
2010 2011 self.updated_on = last_change
2011 2012 self.changeset_cache = cs_cache
2012 2013 Session().add(self)
2013 2014 Session().commit()
2014 2015 else:
2015 2016 log.debug('Skipping update_commit_cache for repo:`%s` '
2016 2017 'commit already with latest changes', self.repo_name)
2017 2018
2018 2019 @property
2019 2020 def tip(self):
2020 2021 return self.get_commit('tip')
2021 2022
2022 2023 @property
2023 2024 def author(self):
2024 2025 return self.tip.author
2025 2026
2026 2027 @property
2027 2028 def last_change(self):
2028 2029 return self.scm_instance().last_change
2029 2030
2030 2031 def get_comments(self, revisions=None):
2031 2032 """
2032 2033 Returns comments for this repository grouped by revisions
2033 2034
2034 2035 :param revisions: filter query by revisions only
2035 2036 """
2036 2037 cmts = ChangesetComment.query()\
2037 2038 .filter(ChangesetComment.repo == self)
2038 2039 if revisions:
2039 2040 cmts = cmts.filter(ChangesetComment.revision.in_(revisions))
2040 2041 grouped = collections.defaultdict(list)
2041 2042 for cmt in cmts.all():
2042 2043 grouped[cmt.revision].append(cmt)
2043 2044 return grouped
2044 2045
2045 2046 def statuses(self, revisions=None):
2046 2047 """
2047 2048 Returns statuses for this repository
2048 2049
2049 2050 :param revisions: list of revisions to get statuses for
2050 2051 """
2051 2052 statuses = ChangesetStatus.query()\
2052 2053 .filter(ChangesetStatus.repo == self)\
2053 2054 .filter(ChangesetStatus.version == 0)
2054 2055
2055 2056 if revisions:
2056 2057 # Try doing the filtering in chunks to avoid hitting limits
2057 2058 size = 500
2058 2059 status_results = []
2059 2060 for chunk in xrange(0, len(revisions), size):
2060 2061 status_results += statuses.filter(
2061 2062 ChangesetStatus.revision.in_(
2062 2063 revisions[chunk: chunk+size])
2063 2064 ).all()
2064 2065 else:
2065 2066 status_results = statuses.all()
2066 2067
2067 2068 grouped = {}
2068 2069
2069 2070 # maybe we have open new pullrequest without a status?
2070 2071 stat = ChangesetStatus.STATUS_UNDER_REVIEW
2071 2072 status_lbl = ChangesetStatus.get_status_lbl(stat)
2072 2073 for pr in PullRequest.query().filter(PullRequest.source_repo == self).all():
2073 2074 for rev in pr.revisions:
2074 2075 pr_id = pr.pull_request_id
2075 2076 pr_repo = pr.target_repo.repo_name
2076 2077 grouped[rev] = [stat, status_lbl, pr_id, pr_repo]
2077 2078
2078 2079 for stat in status_results:
2079 2080 pr_id = pr_repo = None
2080 2081 if stat.pull_request:
2081 2082 pr_id = stat.pull_request.pull_request_id
2082 2083 pr_repo = stat.pull_request.target_repo.repo_name
2083 2084 grouped[stat.revision] = [str(stat.status), stat.status_lbl,
2084 2085 pr_id, pr_repo]
2085 2086 return grouped
2086 2087
2087 2088 # ==========================================================================
2088 2089 # SCM CACHE INSTANCE
2089 2090 # ==========================================================================
2090 2091
2091 2092 def scm_instance(self, **kwargs):
2092 2093 import rhodecode
2093 2094
2094 2095 # Passing a config will not hit the cache currently only used
2095 2096 # for repo2dbmapper
2096 2097 config = kwargs.pop('config', None)
2097 2098 cache = kwargs.pop('cache', None)
2098 2099 full_cache = str2bool(rhodecode.CONFIG.get('vcs_full_cache'))
2099 2100 # if cache is NOT defined use default global, else we have a full
2100 2101 # control over cache behaviour
2101 2102 if cache is None and full_cache and not config:
2102 2103 return self._get_instance_cached()
2103 2104 return self._get_instance(cache=bool(cache), config=config)
2104 2105
2105 2106 def _get_instance_cached(self):
2106 2107 @cache_region('long_term')
2107 2108 def _get_repo(cache_key):
2108 2109 return self._get_instance()
2109 2110
2110 2111 invalidator_context = CacheKey.repo_context_cache(
2111 2112 _get_repo, self.repo_name, None, thread_scoped=True)
2112 2113
2113 2114 with invalidator_context as context:
2114 2115 context.invalidate()
2115 2116 repo = context.compute()
2116 2117
2117 2118 return repo
2118 2119
2119 2120 def _get_instance(self, cache=True, config=None):
2120 2121 config = config or self._config
2121 2122 custom_wire = {
2122 2123 'cache': cache # controls the vcs.remote cache
2123 2124 }
2124 2125 repo = get_vcs_instance(
2125 2126 repo_path=safe_str(self.repo_full_path),
2126 2127 config=config,
2127 2128 with_wire=custom_wire,
2128 2129 create=False,
2129 2130 _vcs_alias=self.repo_type)
2130 2131
2131 2132 return repo
2132 2133
2133 2134 def __json__(self):
2134 2135 return {'landing_rev': self.landing_rev}
2135 2136
2136 2137 def get_dict(self):
2137 2138
2138 2139 # Since we transformed `repo_name` to a hybrid property, we need to
2139 2140 # keep compatibility with the code which uses `repo_name` field.
2140 2141
2141 2142 result = super(Repository, self).get_dict()
2142 2143 result['repo_name'] = result.pop('_repo_name', None)
2143 2144 return result
2144 2145
2145 2146
2146 2147 class RepoGroup(Base, BaseModel):
2147 2148 __tablename__ = 'groups'
2148 2149 __table_args__ = (
2149 2150 UniqueConstraint('group_name', 'group_parent_id'),
2150 2151 CheckConstraint('group_id != group_parent_id'),
2151 2152 {'extend_existing': True, 'mysql_engine': 'InnoDB',
2152 2153 'mysql_charset': 'utf8', 'sqlite_autoincrement': True},
2153 2154 )
2154 2155 __mapper_args__ = {'order_by': 'group_name'}
2155 2156
2156 2157 CHOICES_SEPARATOR = '/' # used to generate select2 choices for nested groups
2157 2158
2158 2159 group_id = Column("group_id", Integer(), nullable=False, unique=True, default=None, primary_key=True)
2159 2160 group_name = Column("group_name", String(255), nullable=False, unique=True, default=None)
2160 2161 group_parent_id = Column("group_parent_id", Integer(), ForeignKey('groups.group_id'), nullable=True, unique=None, default=None)
2161 2162 group_description = Column("group_description", String(10000), nullable=True, unique=None, default=None)
2162 2163 enable_locking = Column("enable_locking", Boolean(), nullable=False, unique=None, default=False)
2163 2164 user_id = Column("user_id", Integer(), ForeignKey('users.user_id'), nullable=False, unique=False, default=None)
2164 2165 created_on = Column('created_on', DateTime(timezone=False), nullable=False, default=datetime.datetime.now)
2165 2166 personal = Column('personal', Boolean(), nullable=True, unique=None, default=None)
2166 2167
2167 2168 repo_group_to_perm = relationship('UserRepoGroupToPerm', cascade='all', order_by='UserRepoGroupToPerm.group_to_perm_id')
2168 2169 users_group_to_perm = relationship('UserGroupRepoGroupToPerm', cascade='all')
2169 2170 parent_group = relationship('RepoGroup', remote_side=group_id)
2170 2171 user = relationship('User')
2171 2172 integrations = relationship('Integration',
2172 2173 cascade="all, delete, delete-orphan")
2173 2174
2174 2175 def __init__(self, group_name='', parent_group=None):
2175 2176 self.group_name = group_name
2176 2177 self.parent_group = parent_group
2177 2178
2178 2179 def __unicode__(self):
2179 2180 return u"<%s('id:%s:%s')>" % (self.__class__.__name__, self.group_id,
2180 2181 self.group_name)
2181 2182
2182 2183 @classmethod
2183 2184 def _generate_choice(cls, repo_group):
2184 2185 from webhelpers.html import literal as _literal
2185 2186 _name = lambda k: _literal(cls.CHOICES_SEPARATOR.join(k))
2186 2187 return repo_group.group_id, _name(repo_group.full_path_splitted)
2187 2188
2188 2189 @classmethod
2189 2190 def groups_choices(cls, groups=None, show_empty_group=True):
2190 2191 if not groups:
2191 2192 groups = cls.query().all()
2192 2193
2193 2194 repo_groups = []
2194 2195 if show_empty_group:
2195 2196 repo_groups = [(-1, u'-- %s --' % _('No parent'))]
2196 2197
2197 2198 repo_groups.extend([cls._generate_choice(x) for x in groups])
2198 2199
2199 2200 repo_groups = sorted(
2200 2201 repo_groups, key=lambda t: t[1].split(cls.CHOICES_SEPARATOR)[0])
2201 2202 return repo_groups
2202 2203
2203 2204 @classmethod
2204 2205 def url_sep(cls):
2205 2206 return URL_SEP
2206 2207
2207 2208 @classmethod
2208 2209 def get_by_group_name(cls, group_name, cache=False, case_insensitive=False):
2209 2210 if case_insensitive:
2210 2211 gr = cls.query().filter(func.lower(cls.group_name)
2211 2212 == func.lower(group_name))
2212 2213 else:
2213 2214 gr = cls.query().filter(cls.group_name == group_name)
2214 2215 if cache:
2215 2216 name_key = _hash_key(group_name)
2216 2217 gr = gr.options(
2217 2218 FromCache("sql_cache_short", "get_group_%s" % name_key))
2218 2219 return gr.scalar()
2219 2220
2220 2221 @classmethod
2221 2222 def get_user_personal_repo_group(cls, user_id):
2222 2223 user = User.get(user_id)
2223 2224 if user.username == User.DEFAULT_USER:
2224 2225 return None
2225 2226
2226 2227 return cls.query()\
2227 2228 .filter(cls.personal == true()) \
2228 2229 .filter(cls.user == user).scalar()
2229 2230
2230 2231 @classmethod
2231 2232 def get_all_repo_groups(cls, user_id=Optional(None), group_id=Optional(None),
2232 2233 case_insensitive=True):
2233 2234 q = RepoGroup.query()
2234 2235
2235 2236 if not isinstance(user_id, Optional):
2236 2237 q = q.filter(RepoGroup.user_id == user_id)
2237 2238
2238 2239 if not isinstance(group_id, Optional):
2239 2240 q = q.filter(RepoGroup.group_parent_id == group_id)
2240 2241
2241 2242 if case_insensitive:
2242 2243 q = q.order_by(func.lower(RepoGroup.group_name))
2243 2244 else:
2244 2245 q = q.order_by(RepoGroup.group_name)
2245 2246 return q.all()
2246 2247
2247 2248 @property
2248 2249 def parents(self):
2249 2250 parents_recursion_limit = 10
2250 2251 groups = []
2251 2252 if self.parent_group is None:
2252 2253 return groups
2253 2254 cur_gr = self.parent_group
2254 2255 groups.insert(0, cur_gr)
2255 2256 cnt = 0
2256 2257 while 1:
2257 2258 cnt += 1
2258 2259 gr = getattr(cur_gr, 'parent_group', None)
2259 2260 cur_gr = cur_gr.parent_group
2260 2261 if gr is None:
2261 2262 break
2262 2263 if cnt == parents_recursion_limit:
2263 2264 # this will prevent accidental infinit loops
2264 2265 log.error(('more than %s parents found for group %s, stopping '
2265 2266 'recursive parent fetching' % (parents_recursion_limit, self)))
2266 2267 break
2267 2268
2268 2269 groups.insert(0, gr)
2269 2270 return groups
2270 2271
2271 2272 @property
2272 2273 def children(self):
2273 2274 return RepoGroup.query().filter(RepoGroup.parent_group == self)
2274 2275
2275 2276 @property
2276 2277 def name(self):
2277 2278 return self.group_name.split(RepoGroup.url_sep())[-1]
2278 2279
2279 2280 @property
2280 2281 def full_path(self):
2281 2282 return self.group_name
2282 2283
2283 2284 @property
2284 2285 def full_path_splitted(self):
2285 2286 return self.group_name.split(RepoGroup.url_sep())
2286 2287
2287 2288 @property
2288 2289 def repositories(self):
2289 2290 return Repository.query()\
2290 2291 .filter(Repository.group == self)\
2291 2292 .order_by(Repository.repo_name)
2292 2293
2293 2294 @property
2294 2295 def repositories_recursive_count(self):
2295 2296 cnt = self.repositories.count()
2296 2297
2297 2298 def children_count(group):
2298 2299 cnt = 0
2299 2300 for child in group.children:
2300 2301 cnt += child.repositories.count()
2301 2302 cnt += children_count(child)
2302 2303 return cnt
2303 2304
2304 2305 return cnt + children_count(self)
2305 2306
2306 2307 def _recursive_objects(self, include_repos=True):
2307 2308 all_ = []
2308 2309
2309 2310 def _get_members(root_gr):
2310 2311 if include_repos:
2311 2312 for r in root_gr.repositories:
2312 2313 all_.append(r)
2313 2314 childs = root_gr.children.all()
2314 2315 if childs:
2315 2316 for gr in childs:
2316 2317 all_.append(gr)
2317 2318 _get_members(gr)
2318 2319
2319 2320 _get_members(self)
2320 2321 return [self] + all_
2321 2322
2322 2323 def recursive_groups_and_repos(self):
2323 2324 """
2324 2325 Recursive return all groups, with repositories in those groups
2325 2326 """
2326 2327 return self._recursive_objects()
2327 2328
2328 2329 def recursive_groups(self):
2329 2330 """
2330 2331 Returns all children groups for this group including children of children
2331 2332 """
2332 2333 return self._recursive_objects(include_repos=False)
2333 2334
2334 2335 def get_new_name(self, group_name):
2335 2336 """
2336 2337 returns new full group name based on parent and new name
2337 2338
2338 2339 :param group_name:
2339 2340 """
2340 2341 path_prefix = (self.parent_group.full_path_splitted if
2341 2342 self.parent_group else [])
2342 2343 return RepoGroup.url_sep().join(path_prefix + [group_name])
2343 2344
2344 2345 def permissions(self, with_admins=True, with_owner=True):
2345 2346 q = UserRepoGroupToPerm.query().filter(UserRepoGroupToPerm.group == self)
2346 2347 q = q.options(joinedload(UserRepoGroupToPerm.group),
2347 2348 joinedload(UserRepoGroupToPerm.user),
2348 2349 joinedload(UserRepoGroupToPerm.permission),)
2349 2350
2350 2351 # get owners and admins and permissions. We do a trick of re-writing
2351 2352 # objects from sqlalchemy to named-tuples due to sqlalchemy session
2352 2353 # has a global reference and changing one object propagates to all
2353 2354 # others. This means if admin is also an owner admin_row that change
2354 2355 # would propagate to both objects
2355 2356 perm_rows = []
2356 2357 for _usr in q.all():
2357 2358 usr = AttributeDict(_usr.user.get_dict())
2358 2359 usr.permission = _usr.permission.permission_name
2359 2360 perm_rows.append(usr)
2360 2361
2361 2362 # filter the perm rows by 'default' first and then sort them by
2362 2363 # admin,write,read,none permissions sorted again alphabetically in
2363 2364 # each group
2364 2365 perm_rows = sorted(perm_rows, key=display_sort)
2365 2366
2366 2367 _admin_perm = 'group.admin'
2367 2368 owner_row = []
2368 2369 if with_owner:
2369 2370 usr = AttributeDict(self.user.get_dict())
2370 2371 usr.owner_row = True
2371 2372 usr.permission = _admin_perm
2372 2373 owner_row.append(usr)
2373 2374
2374 2375 super_admin_rows = []
2375 2376 if with_admins:
2376 2377 for usr in User.get_all_super_admins():
2377 2378 # if this admin is also owner, don't double the record
2378 2379 if usr.user_id == owner_row[0].user_id:
2379 2380 owner_row[0].admin_row = True
2380 2381 else:
2381 2382 usr = AttributeDict(usr.get_dict())
2382 2383 usr.admin_row = True
2383 2384 usr.permission = _admin_perm
2384 2385 super_admin_rows.append(usr)
2385 2386
2386 2387 return super_admin_rows + owner_row + perm_rows
2387 2388
2388 2389 def permission_user_groups(self):
2389 2390 q = UserGroupRepoGroupToPerm.query().filter(UserGroupRepoGroupToPerm.group == self)
2390 2391 q = q.options(joinedload(UserGroupRepoGroupToPerm.group),
2391 2392 joinedload(UserGroupRepoGroupToPerm.users_group),
2392 2393 joinedload(UserGroupRepoGroupToPerm.permission),)
2393 2394
2394 2395 perm_rows = []
2395 2396 for _user_group in q.all():
2396 2397 usr = AttributeDict(_user_group.users_group.get_dict())
2397 2398 usr.permission = _user_group.permission.permission_name
2398 2399 perm_rows.append(usr)
2399 2400
2400 2401 return perm_rows
2401 2402
2402 2403 def get_api_data(self):
2403 2404 """
2404 2405 Common function for generating api data
2405 2406
2406 2407 """
2407 2408 group = self
2408 2409 data = {
2409 2410 'group_id': group.group_id,
2410 2411 'group_name': group.group_name,
2411 2412 'group_description': group.group_description,
2412 2413 'parent_group': group.parent_group.group_name if group.parent_group else None,
2413 2414 'repositories': [x.repo_name for x in group.repositories],
2414 2415 'owner': group.user.username,
2415 2416 }
2416 2417 return data
2417 2418
2418 2419
2419 2420 class Permission(Base, BaseModel):
2420 2421 __tablename__ = 'permissions'
2421 2422 __table_args__ = (
2422 2423 Index('p_perm_name_idx', 'permission_name'),
2423 2424 {'extend_existing': True, 'mysql_engine': 'InnoDB',
2424 2425 'mysql_charset': 'utf8', 'sqlite_autoincrement': True},
2425 2426 )
2426 2427 PERMS = [
2427 2428 ('hg.admin', _('RhodeCode Super Administrator')),
2428 2429
2429 2430 ('repository.none', _('Repository no access')),
2430 2431 ('repository.read', _('Repository read access')),
2431 2432 ('repository.write', _('Repository write access')),
2432 2433 ('repository.admin', _('Repository admin access')),
2433 2434
2434 2435 ('group.none', _('Repository group no access')),
2435 2436 ('group.read', _('Repository group read access')),
2436 2437 ('group.write', _('Repository group write access')),
2437 2438 ('group.admin', _('Repository group admin access')),
2438 2439
2439 2440 ('usergroup.none', _('User group no access')),
2440 2441 ('usergroup.read', _('User group read access')),
2441 2442 ('usergroup.write', _('User group write access')),
2442 2443 ('usergroup.admin', _('User group admin access')),
2443 2444
2444 2445 ('hg.repogroup.create.false', _('Repository Group creation disabled')),
2445 2446 ('hg.repogroup.create.true', _('Repository Group creation enabled')),
2446 2447
2447 2448 ('hg.usergroup.create.false', _('User Group creation disabled')),
2448 2449 ('hg.usergroup.create.true', _('User Group creation enabled')),
2449 2450
2450 2451 ('hg.create.none', _('Repository creation disabled')),
2451 2452 ('hg.create.repository', _('Repository creation enabled')),
2452 2453 ('hg.create.write_on_repogroup.true', _('Repository creation enabled with write permission to a repository group')),
2453 2454 ('hg.create.write_on_repogroup.false', _('Repository creation disabled with write permission to a repository group')),
2454 2455
2455 2456 ('hg.fork.none', _('Repository forking disabled')),
2456 2457 ('hg.fork.repository', _('Repository forking enabled')),
2457 2458
2458 2459 ('hg.register.none', _('Registration disabled')),
2459 2460 ('hg.register.manual_activate', _('User Registration with manual account activation')),
2460 2461 ('hg.register.auto_activate', _('User Registration with automatic account activation')),
2461 2462
2462 2463 ('hg.password_reset.enabled', _('Password reset enabled')),
2463 2464 ('hg.password_reset.hidden', _('Password reset hidden')),
2464 2465 ('hg.password_reset.disabled', _('Password reset disabled')),
2465 2466
2466 2467 ('hg.extern_activate.manual', _('Manual activation of external account')),
2467 2468 ('hg.extern_activate.auto', _('Automatic activation of external account')),
2468 2469
2469 2470 ('hg.inherit_default_perms.false', _('Inherit object permissions from default user disabled')),
2470 2471 ('hg.inherit_default_perms.true', _('Inherit object permissions from default user enabled')),
2471 2472 ]
2472 2473
2473 2474 # definition of system default permissions for DEFAULT user
2474 2475 DEFAULT_USER_PERMISSIONS = [
2475 2476 'repository.read',
2476 2477 'group.read',
2477 2478 'usergroup.read',
2478 2479 'hg.create.repository',
2479 2480 'hg.repogroup.create.false',
2480 2481 'hg.usergroup.create.false',
2481 2482 'hg.create.write_on_repogroup.true',
2482 2483 'hg.fork.repository',
2483 2484 'hg.register.manual_activate',
2484 2485 'hg.password_reset.enabled',
2485 2486 'hg.extern_activate.auto',
2486 2487 'hg.inherit_default_perms.true',
2487 2488 ]
2488 2489
2489 2490 # defines which permissions are more important higher the more important
2490 2491 # Weight defines which permissions are more important.
2491 2492 # The higher number the more important.
2492 2493 PERM_WEIGHTS = {
2493 2494 'repository.none': 0,
2494 2495 'repository.read': 1,
2495 2496 'repository.write': 3,
2496 2497 'repository.admin': 4,
2497 2498
2498 2499 'group.none': 0,
2499 2500 'group.read': 1,
2500 2501 'group.write': 3,
2501 2502 'group.admin': 4,
2502 2503
2503 2504 'usergroup.none': 0,
2504 2505 'usergroup.read': 1,
2505 2506 'usergroup.write': 3,
2506 2507 'usergroup.admin': 4,
2507 2508
2508 2509 'hg.repogroup.create.false': 0,
2509 2510 'hg.repogroup.create.true': 1,
2510 2511
2511 2512 'hg.usergroup.create.false': 0,
2512 2513 'hg.usergroup.create.true': 1,
2513 2514
2514 2515 'hg.fork.none': 0,
2515 2516 'hg.fork.repository': 1,
2516 2517 'hg.create.none': 0,
2517 2518 'hg.create.repository': 1
2518 2519 }
2519 2520
2520 2521 permission_id = Column("permission_id", Integer(), nullable=False, unique=True, default=None, primary_key=True)
2521 2522 permission_name = Column("permission_name", String(255), nullable=True, unique=None, default=None)
2522 2523 permission_longname = Column("permission_longname", String(255), nullable=True, unique=None, default=None)
2523 2524
2524 2525 def __unicode__(self):
2525 2526 return u"<%s('%s:%s')>" % (
2526 2527 self.__class__.__name__, self.permission_id, self.permission_name
2527 2528 )
2528 2529
2529 2530 @classmethod
2530 2531 def get_by_key(cls, key):
2531 2532 return cls.query().filter(cls.permission_name == key).scalar()
2532 2533
2533 2534 @classmethod
2534 2535 def get_default_repo_perms(cls, user_id, repo_id=None):
2535 2536 q = Session().query(UserRepoToPerm, Repository, Permission)\
2536 2537 .join((Permission, UserRepoToPerm.permission_id == Permission.permission_id))\
2537 2538 .join((Repository, UserRepoToPerm.repository_id == Repository.repo_id))\
2538 2539 .filter(UserRepoToPerm.user_id == user_id)
2539 2540 if repo_id:
2540 2541 q = q.filter(UserRepoToPerm.repository_id == repo_id)
2541 2542 return q.all()
2542 2543
2543 2544 @classmethod
2544 2545 def get_default_repo_perms_from_user_group(cls, user_id, repo_id=None):
2545 2546 q = Session().query(UserGroupRepoToPerm, Repository, Permission)\
2546 2547 .join(
2547 2548 Permission,
2548 2549 UserGroupRepoToPerm.permission_id == Permission.permission_id)\
2549 2550 .join(
2550 2551 Repository,
2551 2552 UserGroupRepoToPerm.repository_id == Repository.repo_id)\
2552 2553 .join(
2553 2554 UserGroup,
2554 2555 UserGroupRepoToPerm.users_group_id ==
2555 2556 UserGroup.users_group_id)\
2556 2557 .join(
2557 2558 UserGroupMember,
2558 2559 UserGroupRepoToPerm.users_group_id ==
2559 2560 UserGroupMember.users_group_id)\
2560 2561 .filter(
2561 2562 UserGroupMember.user_id == user_id,
2562 2563 UserGroup.users_group_active == true())
2563 2564 if repo_id:
2564 2565 q = q.filter(UserGroupRepoToPerm.repository_id == repo_id)
2565 2566 return q.all()
2566 2567
2567 2568 @classmethod
2568 2569 def get_default_group_perms(cls, user_id, repo_group_id=None):
2569 2570 q = Session().query(UserRepoGroupToPerm, RepoGroup, Permission)\
2570 2571 .join((Permission, UserRepoGroupToPerm.permission_id == Permission.permission_id))\
2571 2572 .join((RepoGroup, UserRepoGroupToPerm.group_id == RepoGroup.group_id))\
2572 2573 .filter(UserRepoGroupToPerm.user_id == user_id)
2573 2574 if repo_group_id:
2574 2575 q = q.filter(UserRepoGroupToPerm.group_id == repo_group_id)
2575 2576 return q.all()
2576 2577
2577 2578 @classmethod
2578 2579 def get_default_group_perms_from_user_group(
2579 2580 cls, user_id, repo_group_id=None):
2580 2581 q = Session().query(UserGroupRepoGroupToPerm, RepoGroup, Permission)\
2581 2582 .join(
2582 2583 Permission,
2583 2584 UserGroupRepoGroupToPerm.permission_id ==
2584 2585 Permission.permission_id)\
2585 2586 .join(
2586 2587 RepoGroup,
2587 2588 UserGroupRepoGroupToPerm.group_id == RepoGroup.group_id)\
2588 2589 .join(
2589 2590 UserGroup,
2590 2591 UserGroupRepoGroupToPerm.users_group_id ==
2591 2592 UserGroup.users_group_id)\
2592 2593 .join(
2593 2594 UserGroupMember,
2594 2595 UserGroupRepoGroupToPerm.users_group_id ==
2595 2596 UserGroupMember.users_group_id)\
2596 2597 .filter(
2597 2598 UserGroupMember.user_id == user_id,
2598 2599 UserGroup.users_group_active == true())
2599 2600 if repo_group_id:
2600 2601 q = q.filter(UserGroupRepoGroupToPerm.group_id == repo_group_id)
2601 2602 return q.all()
2602 2603
2603 2604 @classmethod
2604 2605 def get_default_user_group_perms(cls, user_id, user_group_id=None):
2605 2606 q = Session().query(UserUserGroupToPerm, UserGroup, Permission)\
2606 2607 .join((Permission, UserUserGroupToPerm.permission_id == Permission.permission_id))\
2607 2608 .join((UserGroup, UserUserGroupToPerm.user_group_id == UserGroup.users_group_id))\
2608 2609 .filter(UserUserGroupToPerm.user_id == user_id)
2609 2610 if user_group_id:
2610 2611 q = q.filter(UserUserGroupToPerm.user_group_id == user_group_id)
2611 2612 return q.all()
2612 2613
2613 2614 @classmethod
2614 2615 def get_default_user_group_perms_from_user_group(
2615 2616 cls, user_id, user_group_id=None):
2616 2617 TargetUserGroup = aliased(UserGroup, name='target_user_group')
2617 2618 q = Session().query(UserGroupUserGroupToPerm, UserGroup, Permission)\
2618 2619 .join(
2619 2620 Permission,
2620 2621 UserGroupUserGroupToPerm.permission_id ==
2621 2622 Permission.permission_id)\
2622 2623 .join(
2623 2624 TargetUserGroup,
2624 2625 UserGroupUserGroupToPerm.target_user_group_id ==
2625 2626 TargetUserGroup.users_group_id)\
2626 2627 .join(
2627 2628 UserGroup,
2628 2629 UserGroupUserGroupToPerm.user_group_id ==
2629 2630 UserGroup.users_group_id)\
2630 2631 .join(
2631 2632 UserGroupMember,
2632 2633 UserGroupUserGroupToPerm.user_group_id ==
2633 2634 UserGroupMember.users_group_id)\
2634 2635 .filter(
2635 2636 UserGroupMember.user_id == user_id,
2636 2637 UserGroup.users_group_active == true())
2637 2638 if user_group_id:
2638 2639 q = q.filter(
2639 2640 UserGroupUserGroupToPerm.user_group_id == user_group_id)
2640 2641
2641 2642 return q.all()
2642 2643
2643 2644
2644 2645 class UserRepoToPerm(Base, BaseModel):
2645 2646 __tablename__ = 'repo_to_perm'
2646 2647 __table_args__ = (
2647 2648 UniqueConstraint('user_id', 'repository_id', 'permission_id'),
2648 2649 {'extend_existing': True, 'mysql_engine': 'InnoDB',
2649 2650 'mysql_charset': 'utf8', 'sqlite_autoincrement': True}
2650 2651 )
2651 2652 repo_to_perm_id = Column("repo_to_perm_id", Integer(), nullable=False, unique=True, default=None, primary_key=True)
2652 2653 user_id = Column("user_id", Integer(), ForeignKey('users.user_id'), nullable=False, unique=None, default=None)
2653 2654 permission_id = Column("permission_id", Integer(), ForeignKey('permissions.permission_id'), nullable=False, unique=None, default=None)
2654 2655 repository_id = Column("repository_id", Integer(), ForeignKey('repositories.repo_id'), nullable=False, unique=None, default=None)
2655 2656
2656 2657 user = relationship('User')
2657 2658 repository = relationship('Repository')
2658 2659 permission = relationship('Permission')
2659 2660
2660 2661 @classmethod
2661 2662 def create(cls, user, repository, permission):
2662 2663 n = cls()
2663 2664 n.user = user
2664 2665 n.repository = repository
2665 2666 n.permission = permission
2666 2667 Session().add(n)
2667 2668 return n
2668 2669
2669 2670 def __unicode__(self):
2670 2671 return u'<%s => %s >' % (self.user, self.repository)
2671 2672
2672 2673
2673 2674 class UserUserGroupToPerm(Base, BaseModel):
2674 2675 __tablename__ = 'user_user_group_to_perm'
2675 2676 __table_args__ = (
2676 2677 UniqueConstraint('user_id', 'user_group_id', 'permission_id'),
2677 2678 {'extend_existing': True, 'mysql_engine': 'InnoDB',
2678 2679 'mysql_charset': 'utf8', 'sqlite_autoincrement': True}
2679 2680 )
2680 2681 user_user_group_to_perm_id = Column("user_user_group_to_perm_id", Integer(), nullable=False, unique=True, default=None, primary_key=True)
2681 2682 user_id = Column("user_id", Integer(), ForeignKey('users.user_id'), nullable=False, unique=None, default=None)
2682 2683 permission_id = Column("permission_id", Integer(), ForeignKey('permissions.permission_id'), nullable=False, unique=None, default=None)
2683 2684 user_group_id = Column("user_group_id", Integer(), ForeignKey('users_groups.users_group_id'), nullable=False, unique=None, default=None)
2684 2685
2685 2686 user = relationship('User')
2686 2687 user_group = relationship('UserGroup')
2687 2688 permission = relationship('Permission')
2688 2689
2689 2690 @classmethod
2690 2691 def create(cls, user, user_group, permission):
2691 2692 n = cls()
2692 2693 n.user = user
2693 2694 n.user_group = user_group
2694 2695 n.permission = permission
2695 2696 Session().add(n)
2696 2697 return n
2697 2698
2698 2699 def __unicode__(self):
2699 2700 return u'<%s => %s >' % (self.user, self.user_group)
2700 2701
2701 2702
2702 2703 class UserToPerm(Base, BaseModel):
2703 2704 __tablename__ = 'user_to_perm'
2704 2705 __table_args__ = (
2705 2706 UniqueConstraint('user_id', 'permission_id'),
2706 2707 {'extend_existing': True, 'mysql_engine': 'InnoDB',
2707 2708 'mysql_charset': 'utf8', 'sqlite_autoincrement': True}
2708 2709 )
2709 2710 user_to_perm_id = Column("user_to_perm_id", Integer(), nullable=False, unique=True, default=None, primary_key=True)
2710 2711 user_id = Column("user_id", Integer(), ForeignKey('users.user_id'), nullable=False, unique=None, default=None)
2711 2712 permission_id = Column("permission_id", Integer(), ForeignKey('permissions.permission_id'), nullable=False, unique=None, default=None)
2712 2713
2713 2714 user = relationship('User')
2714 2715 permission = relationship('Permission', lazy='joined')
2715 2716
2716 2717 def __unicode__(self):
2717 2718 return u'<%s => %s >' % (self.user, self.permission)
2718 2719
2719 2720
2720 2721 class UserGroupRepoToPerm(Base, BaseModel):
2721 2722 __tablename__ = 'users_group_repo_to_perm'
2722 2723 __table_args__ = (
2723 2724 UniqueConstraint('repository_id', 'users_group_id', 'permission_id'),
2724 2725 {'extend_existing': True, 'mysql_engine': 'InnoDB',
2725 2726 'mysql_charset': 'utf8', 'sqlite_autoincrement': True}
2726 2727 )
2727 2728 users_group_to_perm_id = Column("users_group_to_perm_id", Integer(), nullable=False, unique=True, default=None, primary_key=True)
2728 2729 users_group_id = Column("users_group_id", Integer(), ForeignKey('users_groups.users_group_id'), nullable=False, unique=None, default=None)
2729 2730 permission_id = Column("permission_id", Integer(), ForeignKey('permissions.permission_id'), nullable=False, unique=None, default=None)
2730 2731 repository_id = Column("repository_id", Integer(), ForeignKey('repositories.repo_id'), nullable=False, unique=None, default=None)
2731 2732
2732 2733 users_group = relationship('UserGroup')
2733 2734 permission = relationship('Permission')
2734 2735 repository = relationship('Repository')
2735 2736
2736 2737 @classmethod
2737 2738 def create(cls, users_group, repository, permission):
2738 2739 n = cls()
2739 2740 n.users_group = users_group
2740 2741 n.repository = repository
2741 2742 n.permission = permission
2742 2743 Session().add(n)
2743 2744 return n
2744 2745
2745 2746 def __unicode__(self):
2746 2747 return u'<UserGroupRepoToPerm:%s => %s >' % (self.users_group, self.repository)
2747 2748
2748 2749
2749 2750 class UserGroupUserGroupToPerm(Base, BaseModel):
2750 2751 __tablename__ = 'user_group_user_group_to_perm'
2751 2752 __table_args__ = (
2752 2753 UniqueConstraint('target_user_group_id', 'user_group_id', 'permission_id'),
2753 2754 CheckConstraint('target_user_group_id != user_group_id'),
2754 2755 {'extend_existing': True, 'mysql_engine': 'InnoDB',
2755 2756 'mysql_charset': 'utf8', 'sqlite_autoincrement': True}
2756 2757 )
2757 2758 user_group_user_group_to_perm_id = Column("user_group_user_group_to_perm_id", Integer(), nullable=False, unique=True, default=None, primary_key=True)
2758 2759 target_user_group_id = Column("target_user_group_id", Integer(), ForeignKey('users_groups.users_group_id'), nullable=False, unique=None, default=None)
2759 2760 permission_id = Column("permission_id", Integer(), ForeignKey('permissions.permission_id'), nullable=False, unique=None, default=None)
2760 2761 user_group_id = Column("user_group_id", Integer(), ForeignKey('users_groups.users_group_id'), nullable=False, unique=None, default=None)
2761 2762
2762 2763 target_user_group = relationship('UserGroup', primaryjoin='UserGroupUserGroupToPerm.target_user_group_id==UserGroup.users_group_id')
2763 2764 user_group = relationship('UserGroup', primaryjoin='UserGroupUserGroupToPerm.user_group_id==UserGroup.users_group_id')
2764 2765 permission = relationship('Permission')
2765 2766
2766 2767 @classmethod
2767 2768 def create(cls, target_user_group, user_group, permission):
2768 2769 n = cls()
2769 2770 n.target_user_group = target_user_group
2770 2771 n.user_group = user_group
2771 2772 n.permission = permission
2772 2773 Session().add(n)
2773 2774 return n
2774 2775
2775 2776 def __unicode__(self):
2776 2777 return u'<UserGroupUserGroup:%s => %s >' % (self.target_user_group, self.user_group)
2777 2778
2778 2779
2779 2780 class UserGroupToPerm(Base, BaseModel):
2780 2781 __tablename__ = 'users_group_to_perm'
2781 2782 __table_args__ = (
2782 2783 UniqueConstraint('users_group_id', 'permission_id',),
2783 2784 {'extend_existing': True, 'mysql_engine': 'InnoDB',
2784 2785 'mysql_charset': 'utf8', 'sqlite_autoincrement': True}
2785 2786 )
2786 2787 users_group_to_perm_id = Column("users_group_to_perm_id", Integer(), nullable=False, unique=True, default=None, primary_key=True)
2787 2788 users_group_id = Column("users_group_id", Integer(), ForeignKey('users_groups.users_group_id'), nullable=False, unique=None, default=None)
2788 2789 permission_id = Column("permission_id", Integer(), ForeignKey('permissions.permission_id'), nullable=False, unique=None, default=None)
2789 2790
2790 2791 users_group = relationship('UserGroup')
2791 2792 permission = relationship('Permission')
2792 2793
2793 2794
2794 2795 class UserRepoGroupToPerm(Base, BaseModel):
2795 2796 __tablename__ = 'user_repo_group_to_perm'
2796 2797 __table_args__ = (
2797 2798 UniqueConstraint('user_id', 'group_id', 'permission_id'),
2798 2799 {'extend_existing': True, 'mysql_engine': 'InnoDB',
2799 2800 'mysql_charset': 'utf8', 'sqlite_autoincrement': True}
2800 2801 )
2801 2802
2802 2803 group_to_perm_id = Column("group_to_perm_id", Integer(), nullable=False, unique=True, default=None, primary_key=True)
2803 2804 user_id = Column("user_id", Integer(), ForeignKey('users.user_id'), nullable=False, unique=None, default=None)
2804 2805 group_id = Column("group_id", Integer(), ForeignKey('groups.group_id'), nullable=False, unique=None, default=None)
2805 2806 permission_id = Column("permission_id", Integer(), ForeignKey('permissions.permission_id'), nullable=False, unique=None, default=None)
2806 2807
2807 2808 user = relationship('User')
2808 2809 group = relationship('RepoGroup')
2809 2810 permission = relationship('Permission')
2810 2811
2811 2812 @classmethod
2812 2813 def create(cls, user, repository_group, permission):
2813 2814 n = cls()
2814 2815 n.user = user
2815 2816 n.group = repository_group
2816 2817 n.permission = permission
2817 2818 Session().add(n)
2818 2819 return n
2819 2820
2820 2821
2821 2822 class UserGroupRepoGroupToPerm(Base, BaseModel):
2822 2823 __tablename__ = 'users_group_repo_group_to_perm'
2823 2824 __table_args__ = (
2824 2825 UniqueConstraint('users_group_id', 'group_id'),
2825 2826 {'extend_existing': True, 'mysql_engine': 'InnoDB',
2826 2827 'mysql_charset': 'utf8', 'sqlite_autoincrement': True}
2827 2828 )
2828 2829
2829 2830 users_group_repo_group_to_perm_id = Column("users_group_repo_group_to_perm_id", Integer(), nullable=False, unique=True, default=None, primary_key=True)
2830 2831 users_group_id = Column("users_group_id", Integer(), ForeignKey('users_groups.users_group_id'), nullable=False, unique=None, default=None)
2831 2832 group_id = Column("group_id", Integer(), ForeignKey('groups.group_id'), nullable=False, unique=None, default=None)
2832 2833 permission_id = Column("permission_id", Integer(), ForeignKey('permissions.permission_id'), nullable=False, unique=None, default=None)
2833 2834
2834 2835 users_group = relationship('UserGroup')
2835 2836 permission = relationship('Permission')
2836 2837 group = relationship('RepoGroup')
2837 2838
2838 2839 @classmethod
2839 2840 def create(cls, user_group, repository_group, permission):
2840 2841 n = cls()
2841 2842 n.users_group = user_group
2842 2843 n.group = repository_group
2843 2844 n.permission = permission
2844 2845 Session().add(n)
2845 2846 return n
2846 2847
2847 2848 def __unicode__(self):
2848 2849 return u'<UserGroupRepoGroupToPerm:%s => %s >' % (self.users_group, self.group)
2849 2850
2850 2851
2851 2852 class Statistics(Base, BaseModel):
2852 2853 __tablename__ = 'statistics'
2853 2854 __table_args__ = (
2854 2855 UniqueConstraint('repository_id'),
2855 2856 {'extend_existing': True, 'mysql_engine': 'InnoDB',
2856 2857 'mysql_charset': 'utf8', 'sqlite_autoincrement': True}
2857 2858 )
2858 2859 stat_id = Column("stat_id", Integer(), nullable=False, unique=True, default=None, primary_key=True)
2859 2860 repository_id = Column("repository_id", Integer(), ForeignKey('repositories.repo_id'), nullable=False, unique=True, default=None)
2860 2861 stat_on_revision = Column("stat_on_revision", Integer(), nullable=False)
2861 2862 commit_activity = Column("commit_activity", LargeBinary(1000000), nullable=False)#JSON data
2862 2863 commit_activity_combined = Column("commit_activity_combined", LargeBinary(), nullable=False)#JSON data
2863 2864 languages = Column("languages", LargeBinary(1000000), nullable=False)#JSON data
2864 2865
2865 2866 repository = relationship('Repository', single_parent=True)
2866 2867
2867 2868
2868 2869 class UserFollowing(Base, BaseModel):
2869 2870 __tablename__ = 'user_followings'
2870 2871 __table_args__ = (
2871 2872 UniqueConstraint('user_id', 'follows_repository_id'),
2872 2873 UniqueConstraint('user_id', 'follows_user_id'),
2873 2874 {'extend_existing': True, 'mysql_engine': 'InnoDB',
2874 2875 'mysql_charset': 'utf8', 'sqlite_autoincrement': True}
2875 2876 )
2876 2877
2877 2878 user_following_id = Column("user_following_id", Integer(), nullable=False, unique=True, default=None, primary_key=True)
2878 2879 user_id = Column("user_id", Integer(), ForeignKey('users.user_id'), nullable=False, unique=None, default=None)
2879 2880 follows_repo_id = Column("follows_repository_id", Integer(), ForeignKey('repositories.repo_id'), nullable=True, unique=None, default=None)
2880 2881 follows_user_id = Column("follows_user_id", Integer(), ForeignKey('users.user_id'), nullable=True, unique=None, default=None)
2881 2882 follows_from = Column('follows_from', DateTime(timezone=False), nullable=True, unique=None, default=datetime.datetime.now)
2882 2883
2883 2884 user = relationship('User', primaryjoin='User.user_id==UserFollowing.user_id')
2884 2885
2885 2886 follows_user = relationship('User', primaryjoin='User.user_id==UserFollowing.follows_user_id')
2886 2887 follows_repository = relationship('Repository', order_by='Repository.repo_name')
2887 2888
2888 2889 @classmethod
2889 2890 def get_repo_followers(cls, repo_id):
2890 2891 return cls.query().filter(cls.follows_repo_id == repo_id)
2891 2892
2892 2893
2893 2894 class CacheKey(Base, BaseModel):
2894 2895 __tablename__ = 'cache_invalidation'
2895 2896 __table_args__ = (
2896 2897 UniqueConstraint('cache_key'),
2897 2898 Index('key_idx', 'cache_key'),
2898 2899 {'extend_existing': True, 'mysql_engine': 'InnoDB',
2899 2900 'mysql_charset': 'utf8', 'sqlite_autoincrement': True},
2900 2901 )
2901 2902 CACHE_TYPE_ATOM = 'ATOM'
2902 2903 CACHE_TYPE_RSS = 'RSS'
2903 2904 CACHE_TYPE_README = 'README'
2904 2905
2905 2906 cache_id = Column("cache_id", Integer(), nullable=False, unique=True, default=None, primary_key=True)
2906 2907 cache_key = Column("cache_key", String(255), nullable=True, unique=None, default=None)
2907 2908 cache_args = Column("cache_args", String(255), nullable=True, unique=None, default=None)
2908 2909 cache_active = Column("cache_active", Boolean(), nullable=True, unique=None, default=False)
2909 2910
2910 2911 def __init__(self, cache_key, cache_args=''):
2911 2912 self.cache_key = cache_key
2912 2913 self.cache_args = cache_args
2913 2914 self.cache_active = False
2914 2915
2915 2916 def __unicode__(self):
2916 2917 return u"<%s('%s:%s[%s]')>" % (
2917 2918 self.__class__.__name__,
2918 2919 self.cache_id, self.cache_key, self.cache_active)
2919 2920
2920 2921 def _cache_key_partition(self):
2921 2922 prefix, repo_name, suffix = self.cache_key.partition(self.cache_args)
2922 2923 return prefix, repo_name, suffix
2923 2924
2924 2925 def get_prefix(self):
2925 2926 """
2926 2927 Try to extract prefix from existing cache key. The key could consist
2927 2928 of prefix, repo_name, suffix
2928 2929 """
2929 2930 # this returns prefix, repo_name, suffix
2930 2931 return self._cache_key_partition()[0]
2931 2932
2932 2933 def get_suffix(self):
2933 2934 """
2934 2935 get suffix that might have been used in _get_cache_key to
2935 2936 generate self.cache_key. Only used for informational purposes
2936 2937 in repo_edit.mako.
2937 2938 """
2938 2939 # prefix, repo_name, suffix
2939 2940 return self._cache_key_partition()[2]
2940 2941
2941 2942 @classmethod
2942 2943 def delete_all_cache(cls):
2943 2944 """
2944 2945 Delete all cache keys from database.
2945 2946 Should only be run when all instances are down and all entries
2946 2947 thus stale.
2947 2948 """
2948 2949 cls.query().delete()
2949 2950 Session().commit()
2950 2951
2951 2952 @classmethod
2952 2953 def get_cache_key(cls, repo_name, cache_type):
2953 2954 """
2954 2955
2955 2956 Generate a cache key for this process of RhodeCode instance.
2956 2957 Prefix most likely will be process id or maybe explicitly set
2957 2958 instance_id from .ini file.
2958 2959 """
2959 2960 import rhodecode
2960 2961 prefix = safe_unicode(rhodecode.CONFIG.get('instance_id') or '')
2961 2962
2962 2963 repo_as_unicode = safe_unicode(repo_name)
2963 2964 key = u'{}_{}'.format(repo_as_unicode, cache_type) \
2964 2965 if cache_type else repo_as_unicode
2965 2966
2966 2967 return u'{}{}'.format(prefix, key)
2967 2968
2968 2969 @classmethod
2969 2970 def set_invalidate(cls, repo_name, delete=False):
2970 2971 """
2971 2972 Mark all caches of a repo as invalid in the database.
2972 2973 """
2973 2974
2974 2975 try:
2975 2976 qry = Session().query(cls).filter(cls.cache_args == repo_name)
2976 2977 if delete:
2977 2978 log.debug('cache objects deleted for repo %s',
2978 2979 safe_str(repo_name))
2979 2980 qry.delete()
2980 2981 else:
2981 2982 log.debug('cache objects marked as invalid for repo %s',
2982 2983 safe_str(repo_name))
2983 2984 qry.update({"cache_active": False})
2984 2985
2985 2986 Session().commit()
2986 2987 except Exception:
2987 2988 log.exception(
2988 2989 'Cache key invalidation failed for repository %s',
2989 2990 safe_str(repo_name))
2990 2991 Session().rollback()
2991 2992
2992 2993 @classmethod
2993 2994 def get_active_cache(cls, cache_key):
2994 2995 inv_obj = cls.query().filter(cls.cache_key == cache_key).scalar()
2995 2996 if inv_obj:
2996 2997 return inv_obj
2997 2998 return None
2998 2999
2999 3000 @classmethod
3000 3001 def repo_context_cache(cls, compute_func, repo_name, cache_type,
3001 3002 thread_scoped=False):
3002 3003 """
3003 3004 @cache_region('long_term')
3004 3005 def _heavy_calculation(cache_key):
3005 3006 return 'result'
3006 3007
3007 3008 cache_context = CacheKey.repo_context_cache(
3008 3009 _heavy_calculation, repo_name, cache_type)
3009 3010
3010 3011 with cache_context as context:
3011 3012 context.invalidate()
3012 3013 computed = context.compute()
3013 3014
3014 3015 assert computed == 'result'
3015 3016 """
3016 3017 from rhodecode.lib import caches
3017 3018 return caches.InvalidationContext(
3018 3019 compute_func, repo_name, cache_type, thread_scoped=thread_scoped)
3019 3020
3020 3021
3021 3022 class ChangesetComment(Base, BaseModel):
3022 3023 __tablename__ = 'changeset_comments'
3023 3024 __table_args__ = (
3024 3025 Index('cc_revision_idx', 'revision'),
3025 3026 {'extend_existing': True, 'mysql_engine': 'InnoDB',
3026 3027 'mysql_charset': 'utf8', 'sqlite_autoincrement': True},
3027 3028 )
3028 3029
3029 3030 COMMENT_OUTDATED = u'comment_outdated'
3030 3031 COMMENT_TYPE_NOTE = u'note'
3031 3032 COMMENT_TYPE_TODO = u'todo'
3032 3033 COMMENT_TYPES = [COMMENT_TYPE_NOTE, COMMENT_TYPE_TODO]
3033 3034
3034 3035 comment_id = Column('comment_id', Integer(), nullable=False, primary_key=True)
3035 3036 repo_id = Column('repo_id', Integer(), ForeignKey('repositories.repo_id'), nullable=False)
3036 3037 revision = Column('revision', String(40), nullable=True)
3037 3038 pull_request_id = Column("pull_request_id", Integer(), ForeignKey('pull_requests.pull_request_id'), nullable=True)
3038 3039 pull_request_version_id = Column("pull_request_version_id", Integer(), ForeignKey('pull_request_versions.pull_request_version_id'), nullable=True)
3039 3040 line_no = Column('line_no', Unicode(10), nullable=True)
3040 3041 hl_lines = Column('hl_lines', Unicode(512), nullable=True)
3041 3042 f_path = Column('f_path', Unicode(1000), nullable=True)
3042 3043 user_id = Column('user_id', Integer(), ForeignKey('users.user_id'), nullable=False)
3043 3044 text = Column('text', UnicodeText().with_variant(UnicodeText(25000), 'mysql'), nullable=False)
3044 3045 created_on = Column('created_on', DateTime(timezone=False), nullable=False, default=datetime.datetime.now)
3045 3046 modified_at = Column('modified_at', DateTime(timezone=False), nullable=False, default=datetime.datetime.now)
3046 3047 renderer = Column('renderer', Unicode(64), nullable=True)
3047 3048 display_state = Column('display_state', Unicode(128), nullable=True)
3048 3049
3049 3050 comment_type = Column('comment_type', Unicode(128), nullable=True, default=COMMENT_TYPE_NOTE)
3050 3051 resolved_comment_id = Column('resolved_comment_id', Integer(), ForeignKey('changeset_comments.comment_id'), nullable=True)
3051 3052 resolved_comment = relationship('ChangesetComment', remote_side=comment_id, backref='resolved_by')
3052 3053 author = relationship('User', lazy='joined')
3053 3054 repo = relationship('Repository')
3054 3055 status_change = relationship('ChangesetStatus', cascade="all, delete, delete-orphan", lazy='joined')
3055 3056 pull_request = relationship('PullRequest', lazy='joined')
3056 3057 pull_request_version = relationship('PullRequestVersion')
3057 3058
3058 3059 @classmethod
3059 3060 def get_users(cls, revision=None, pull_request_id=None):
3060 3061 """
3061 3062 Returns user associated with this ChangesetComment. ie those
3062 3063 who actually commented
3063 3064
3064 3065 :param cls:
3065 3066 :param revision:
3066 3067 """
3067 3068 q = Session().query(User)\
3068 3069 .join(ChangesetComment.author)
3069 3070 if revision:
3070 3071 q = q.filter(cls.revision == revision)
3071 3072 elif pull_request_id:
3072 3073 q = q.filter(cls.pull_request_id == pull_request_id)
3073 3074 return q.all()
3074 3075
3075 3076 @classmethod
3076 3077 def get_index_from_version(cls, pr_version, versions):
3077 3078 num_versions = [x.pull_request_version_id for x in versions]
3078 3079 try:
3079 3080 return num_versions.index(pr_version) +1
3080 3081 except (IndexError, ValueError):
3081 3082 return
3082 3083
3083 3084 @property
3084 3085 def outdated(self):
3085 3086 return self.display_state == self.COMMENT_OUTDATED
3086 3087
3087 3088 def outdated_at_version(self, version):
3088 3089 """
3089 3090 Checks if comment is outdated for given pull request version
3090 3091 """
3091 3092 return self.outdated and self.pull_request_version_id != version
3092 3093
3093 3094 def older_than_version(self, version):
3094 3095 """
3095 3096 Checks if comment is made from previous version than given
3096 3097 """
3097 3098 if version is None:
3098 3099 return self.pull_request_version_id is not None
3099 3100
3100 3101 return self.pull_request_version_id < version
3101 3102
3102 3103 @property
3103 3104 def resolved(self):
3104 3105 return self.resolved_by[0] if self.resolved_by else None
3105 3106
3106 3107 @property
3107 3108 def is_todo(self):
3108 3109 return self.comment_type == self.COMMENT_TYPE_TODO
3109 3110
3110 3111 @property
3111 3112 def is_inline(self):
3112 3113 return self.line_no and self.f_path
3113 3114
3114 3115 def get_index_version(self, versions):
3115 3116 return self.get_index_from_version(
3116 3117 self.pull_request_version_id, versions)
3117 3118
3118 3119 def __repr__(self):
3119 3120 if self.comment_id:
3120 3121 return '<DB:Comment #%s>' % self.comment_id
3121 3122 else:
3122 3123 return '<DB:Comment at %#x>' % id(self)
3123 3124
3124 3125
3125 3126 class ChangesetStatus(Base, BaseModel):
3126 3127 __tablename__ = 'changeset_statuses'
3127 3128 __table_args__ = (
3128 3129 Index('cs_revision_idx', 'revision'),
3129 3130 Index('cs_version_idx', 'version'),
3130 3131 UniqueConstraint('repo_id', 'revision', 'version'),
3131 3132 {'extend_existing': True, 'mysql_engine': 'InnoDB',
3132 3133 'mysql_charset': 'utf8', 'sqlite_autoincrement': True}
3133 3134 )
3134 3135 STATUS_NOT_REVIEWED = DEFAULT = 'not_reviewed'
3135 3136 STATUS_APPROVED = 'approved'
3136 3137 STATUS_REJECTED = 'rejected'
3137 3138 STATUS_UNDER_REVIEW = 'under_review'
3138 3139
3139 3140 STATUSES = [
3140 3141 (STATUS_NOT_REVIEWED, _("Not Reviewed")), # (no icon) and default
3141 3142 (STATUS_APPROVED, _("Approved")),
3142 3143 (STATUS_REJECTED, _("Rejected")),
3143 3144 (STATUS_UNDER_REVIEW, _("Under Review")),
3144 3145 ]
3145 3146
3146 3147 changeset_status_id = Column('changeset_status_id', Integer(), nullable=False, primary_key=True)
3147 3148 repo_id = Column('repo_id', Integer(), ForeignKey('repositories.repo_id'), nullable=False)
3148 3149 user_id = Column("user_id", Integer(), ForeignKey('users.user_id'), nullable=False, unique=None)
3149 3150 revision = Column('revision', String(40), nullable=False)
3150 3151 status = Column('status', String(128), nullable=False, default=DEFAULT)
3151 3152 changeset_comment_id = Column('changeset_comment_id', Integer(), ForeignKey('changeset_comments.comment_id'))
3152 3153 modified_at = Column('modified_at', DateTime(), nullable=False, default=datetime.datetime.now)
3153 3154 version = Column('version', Integer(), nullable=False, default=0)
3154 3155 pull_request_id = Column("pull_request_id", Integer(), ForeignKey('pull_requests.pull_request_id'), nullable=True)
3155 3156
3156 3157 author = relationship('User', lazy='joined')
3157 3158 repo = relationship('Repository')
3158 3159 comment = relationship('ChangesetComment', lazy='joined')
3159 3160 pull_request = relationship('PullRequest', lazy='joined')
3160 3161
3161 3162 def __unicode__(self):
3162 3163 return u"<%s('%s[v%s]:%s')>" % (
3163 3164 self.__class__.__name__,
3164 3165 self.status, self.version, self.author
3165 3166 )
3166 3167
3167 3168 @classmethod
3168 3169 def get_status_lbl(cls, value):
3169 3170 return dict(cls.STATUSES).get(value)
3170 3171
3171 3172 @property
3172 3173 def status_lbl(self):
3173 3174 return ChangesetStatus.get_status_lbl(self.status)
3174 3175
3175 3176
3176 3177 class _PullRequestBase(BaseModel):
3177 3178 """
3178 3179 Common attributes of pull request and version entries.
3179 3180 """
3180 3181
3181 3182 # .status values
3182 3183 STATUS_NEW = u'new'
3183 3184 STATUS_OPEN = u'open'
3184 3185 STATUS_CLOSED = u'closed'
3185 3186
3186 3187 title = Column('title', Unicode(255), nullable=True)
3187 3188 description = Column(
3188 3189 'description', UnicodeText().with_variant(UnicodeText(10240), 'mysql'),
3189 3190 nullable=True)
3190 3191 # new/open/closed status of pull request (not approve/reject/etc)
3191 3192 status = Column('status', Unicode(255), nullable=False, default=STATUS_NEW)
3192 3193 created_on = Column(
3193 3194 'created_on', DateTime(timezone=False), nullable=False,
3194 3195 default=datetime.datetime.now)
3195 3196 updated_on = Column(
3196 3197 'updated_on', DateTime(timezone=False), nullable=False,
3197 3198 default=datetime.datetime.now)
3198 3199
3199 3200 @declared_attr
3200 3201 def user_id(cls):
3201 3202 return Column(
3202 3203 "user_id", Integer(), ForeignKey('users.user_id'), nullable=False,
3203 3204 unique=None)
3204 3205
3205 3206 # 500 revisions max
3206 3207 _revisions = Column(
3207 3208 'revisions', UnicodeText().with_variant(UnicodeText(20500), 'mysql'))
3208 3209
3209 3210 @declared_attr
3210 3211 def source_repo_id(cls):
3211 3212 # TODO: dan: rename column to source_repo_id
3212 3213 return Column(
3213 3214 'org_repo_id', Integer(), ForeignKey('repositories.repo_id'),
3214 3215 nullable=False)
3215 3216
3216 3217 source_ref = Column('org_ref', Unicode(255), nullable=False)
3217 3218
3218 3219 @declared_attr
3219 3220 def target_repo_id(cls):
3220 3221 # TODO: dan: rename column to target_repo_id
3221 3222 return Column(
3222 3223 'other_repo_id', Integer(), ForeignKey('repositories.repo_id'),
3223 3224 nullable=False)
3224 3225
3225 3226 target_ref = Column('other_ref', Unicode(255), nullable=False)
3226 3227 _shadow_merge_ref = Column('shadow_merge_ref', Unicode(255), nullable=True)
3227 3228
3228 3229 # TODO: dan: rename column to last_merge_source_rev
3229 3230 _last_merge_source_rev = Column(
3230 3231 'last_merge_org_rev', String(40), nullable=True)
3231 3232 # TODO: dan: rename column to last_merge_target_rev
3232 3233 _last_merge_target_rev = Column(
3233 3234 'last_merge_other_rev', String(40), nullable=True)
3234 3235 _last_merge_status = Column('merge_status', Integer(), nullable=True)
3235 3236 merge_rev = Column('merge_rev', String(40), nullable=True)
3236 3237
3237 3238 reviewer_data = Column(
3238 3239 'reviewer_data_json', MutationObj.as_mutable(
3239 3240 JsonType(dialect_map=dict(mysql=UnicodeText(16384)))))
3240 3241
3241 3242 @property
3242 3243 def reviewer_data_json(self):
3243 3244 return json.dumps(self.reviewer_data)
3244 3245
3245 3246 @hybrid_property
3246 3247 def revisions(self):
3247 3248 return self._revisions.split(':') if self._revisions else []
3248 3249
3249 3250 @revisions.setter
3250 3251 def revisions(self, val):
3251 3252 self._revisions = ':'.join(val)
3252 3253
3253 3254 @declared_attr
3254 3255 def author(cls):
3255 3256 return relationship('User', lazy='joined')
3256 3257
3257 3258 @declared_attr
3258 3259 def source_repo(cls):
3259 3260 return relationship(
3260 3261 'Repository',
3261 3262 primaryjoin='%s.source_repo_id==Repository.repo_id' % cls.__name__)
3262 3263
3263 3264 @property
3264 3265 def source_ref_parts(self):
3265 3266 return self.unicode_to_reference(self.source_ref)
3266 3267
3267 3268 @declared_attr
3268 3269 def target_repo(cls):
3269 3270 return relationship(
3270 3271 'Repository',
3271 3272 primaryjoin='%s.target_repo_id==Repository.repo_id' % cls.__name__)
3272 3273
3273 3274 @property
3274 3275 def target_ref_parts(self):
3275 3276 return self.unicode_to_reference(self.target_ref)
3276 3277
3277 3278 @property
3278 3279 def shadow_merge_ref(self):
3279 3280 return self.unicode_to_reference(self._shadow_merge_ref)
3280 3281
3281 3282 @shadow_merge_ref.setter
3282 3283 def shadow_merge_ref(self, ref):
3283 3284 self._shadow_merge_ref = self.reference_to_unicode(ref)
3284 3285
3285 3286 def unicode_to_reference(self, raw):
3286 3287 """
3287 3288 Convert a unicode (or string) to a reference object.
3288 3289 If unicode evaluates to False it returns None.
3289 3290 """
3290 3291 if raw:
3291 3292 refs = raw.split(':')
3292 3293 return Reference(*refs)
3293 3294 else:
3294 3295 return None
3295 3296
3296 3297 def reference_to_unicode(self, ref):
3297 3298 """
3298 3299 Convert a reference object to unicode.
3299 3300 If reference is None it returns None.
3300 3301 """
3301 3302 if ref:
3302 3303 return u':'.join(ref)
3303 3304 else:
3304 3305 return None
3305 3306
3306 3307 def get_api_data(self):
3307 3308 from pylons import url
3308 3309 from rhodecode.model.pull_request import PullRequestModel
3309 3310 pull_request = self
3310 3311 merge_status = PullRequestModel().merge_status(pull_request)
3311 3312
3312 3313 pull_request_url = url(
3313 3314 'pullrequest_show', repo_name=self.target_repo.repo_name,
3314 3315 pull_request_id=self.pull_request_id, qualified=True)
3315 3316
3316 3317 merge_data = {
3317 3318 'clone_url': PullRequestModel().get_shadow_clone_url(pull_request),
3318 3319 'reference': (
3319 3320 pull_request.shadow_merge_ref._asdict()
3320 3321 if pull_request.shadow_merge_ref else None),
3321 3322 }
3322 3323
3323 3324 data = {
3324 3325 'pull_request_id': pull_request.pull_request_id,
3325 3326 'url': pull_request_url,
3326 3327 'title': pull_request.title,
3327 3328 'description': pull_request.description,
3328 3329 'status': pull_request.status,
3329 3330 'created_on': pull_request.created_on,
3330 3331 'updated_on': pull_request.updated_on,
3331 3332 'commit_ids': pull_request.revisions,
3332 3333 'review_status': pull_request.calculated_review_status(),
3333 3334 'mergeable': {
3334 3335 'status': merge_status[0],
3335 3336 'message': unicode(merge_status[1]),
3336 3337 },
3337 3338 'source': {
3338 3339 'clone_url': pull_request.source_repo.clone_url(),
3339 3340 'repository': pull_request.source_repo.repo_name,
3340 3341 'reference': {
3341 3342 'name': pull_request.source_ref_parts.name,
3342 3343 'type': pull_request.source_ref_parts.type,
3343 3344 'commit_id': pull_request.source_ref_parts.commit_id,
3344 3345 },
3345 3346 },
3346 3347 'target': {
3347 3348 'clone_url': pull_request.target_repo.clone_url(),
3348 3349 'repository': pull_request.target_repo.repo_name,
3349 3350 'reference': {
3350 3351 'name': pull_request.target_ref_parts.name,
3351 3352 'type': pull_request.target_ref_parts.type,
3352 3353 'commit_id': pull_request.target_ref_parts.commit_id,
3353 3354 },
3354 3355 },
3355 3356 'merge': merge_data,
3356 3357 'author': pull_request.author.get_api_data(include_secrets=False,
3357 3358 details='basic'),
3358 3359 'reviewers': [
3359 3360 {
3360 3361 'user': reviewer.get_api_data(include_secrets=False,
3361 3362 details='basic'),
3362 3363 'reasons': reasons,
3363 3364 'review_status': st[0][1].status if st else 'not_reviewed',
3364 3365 }
3365 3366 for reviewer, reasons, mandatory, st in
3366 3367 pull_request.reviewers_statuses()
3367 3368 ]
3368 3369 }
3369 3370
3370 3371 return data
3371 3372
3372 3373
3373 3374 class PullRequest(Base, _PullRequestBase):
3374 3375 __tablename__ = 'pull_requests'
3375 3376 __table_args__ = (
3376 3377 {'extend_existing': True, 'mysql_engine': 'InnoDB',
3377 3378 'mysql_charset': 'utf8', 'sqlite_autoincrement': True},
3378 3379 )
3379 3380
3380 3381 pull_request_id = Column(
3381 3382 'pull_request_id', Integer(), nullable=False, primary_key=True)
3382 3383
3383 3384 def __repr__(self):
3384 3385 if self.pull_request_id:
3385 3386 return '<DB:PullRequest #%s>' % self.pull_request_id
3386 3387 else:
3387 3388 return '<DB:PullRequest at %#x>' % id(self)
3388 3389
3389 3390 reviewers = relationship('PullRequestReviewers',
3390 3391 cascade="all, delete, delete-orphan")
3391 3392 statuses = relationship('ChangesetStatus')
3392 3393 comments = relationship('ChangesetComment',
3393 3394 cascade="all, delete, delete-orphan")
3394 3395 versions = relationship('PullRequestVersion',
3395 3396 cascade="all, delete, delete-orphan",
3396 3397 lazy='dynamic')
3397 3398
3398 3399 @classmethod
3399 3400 def get_pr_display_object(cls, pull_request_obj, org_pull_request_obj,
3400 3401 internal_methods=None):
3401 3402
3402 3403 class PullRequestDisplay(object):
3403 3404 """
3404 3405 Special object wrapper for showing PullRequest data via Versions
3405 3406 It mimics PR object as close as possible. This is read only object
3406 3407 just for display
3407 3408 """
3408 3409
3409 3410 def __init__(self, attrs, internal=None):
3410 3411 self.attrs = attrs
3411 3412 # internal have priority over the given ones via attrs
3412 3413 self.internal = internal or ['versions']
3413 3414
3414 3415 def __getattr__(self, item):
3415 3416 if item in self.internal:
3416 3417 return getattr(self, item)
3417 3418 try:
3418 3419 return self.attrs[item]
3419 3420 except KeyError:
3420 3421 raise AttributeError(
3421 3422 '%s object has no attribute %s' % (self, item))
3422 3423
3423 3424 def __repr__(self):
3424 3425 return '<DB:PullRequestDisplay #%s>' % self.attrs.get('pull_request_id')
3425 3426
3426 3427 def versions(self):
3427 3428 return pull_request_obj.versions.order_by(
3428 3429 PullRequestVersion.pull_request_version_id).all()
3429 3430
3430 3431 def is_closed(self):
3431 3432 return pull_request_obj.is_closed()
3432 3433
3433 3434 @property
3434 3435 def pull_request_version_id(self):
3435 3436 return getattr(pull_request_obj, 'pull_request_version_id', None)
3436 3437
3437 3438 attrs = StrictAttributeDict(pull_request_obj.get_api_data())
3438 3439
3439 3440 attrs.author = StrictAttributeDict(
3440 3441 pull_request_obj.author.get_api_data())
3441 3442 if pull_request_obj.target_repo:
3442 3443 attrs.target_repo = StrictAttributeDict(
3443 3444 pull_request_obj.target_repo.get_api_data())
3444 3445 attrs.target_repo.clone_url = pull_request_obj.target_repo.clone_url
3445 3446
3446 3447 if pull_request_obj.source_repo:
3447 3448 attrs.source_repo = StrictAttributeDict(
3448 3449 pull_request_obj.source_repo.get_api_data())
3449 3450 attrs.source_repo.clone_url = pull_request_obj.source_repo.clone_url
3450 3451
3451 3452 attrs.source_ref_parts = pull_request_obj.source_ref_parts
3452 3453 attrs.target_ref_parts = pull_request_obj.target_ref_parts
3453 3454 attrs.revisions = pull_request_obj.revisions
3454 3455
3455 3456 attrs.shadow_merge_ref = org_pull_request_obj.shadow_merge_ref
3456 3457 attrs.reviewer_data = org_pull_request_obj.reviewer_data
3457 3458 attrs.reviewer_data_json = org_pull_request_obj.reviewer_data_json
3458 3459
3459 3460 return PullRequestDisplay(attrs, internal=internal_methods)
3460 3461
3461 3462 def is_closed(self):
3462 3463 return self.status == self.STATUS_CLOSED
3463 3464
3464 3465 def __json__(self):
3465 3466 return {
3466 3467 'revisions': self.revisions,
3467 3468 }
3468 3469
3469 3470 def calculated_review_status(self):
3470 3471 from rhodecode.model.changeset_status import ChangesetStatusModel
3471 3472 return ChangesetStatusModel().calculated_review_status(self)
3472 3473
3473 3474 def reviewers_statuses(self):
3474 3475 from rhodecode.model.changeset_status import ChangesetStatusModel
3475 3476 return ChangesetStatusModel().reviewers_statuses(self)
3476 3477
3477 3478 @property
3478 3479 def workspace_id(self):
3479 3480 from rhodecode.model.pull_request import PullRequestModel
3480 3481 return PullRequestModel()._workspace_id(self)
3481 3482
3482 3483 def get_shadow_repo(self):
3483 3484 workspace_id = self.workspace_id
3484 3485 vcs_obj = self.target_repo.scm_instance()
3485 3486 shadow_repository_path = vcs_obj._get_shadow_repository_path(
3486 3487 workspace_id)
3487 3488 return vcs_obj._get_shadow_instance(shadow_repository_path)
3488 3489
3489 3490
3490 3491 class PullRequestVersion(Base, _PullRequestBase):
3491 3492 __tablename__ = 'pull_request_versions'
3492 3493 __table_args__ = (
3493 3494 {'extend_existing': True, 'mysql_engine': 'InnoDB',
3494 3495 'mysql_charset': 'utf8', 'sqlite_autoincrement': True},
3495 3496 )
3496 3497
3497 3498 pull_request_version_id = Column(
3498 3499 'pull_request_version_id', Integer(), nullable=False, primary_key=True)
3499 3500 pull_request_id = Column(
3500 3501 'pull_request_id', Integer(),
3501 3502 ForeignKey('pull_requests.pull_request_id'), nullable=False)
3502 3503 pull_request = relationship('PullRequest')
3503 3504
3504 3505 def __repr__(self):
3505 3506 if self.pull_request_version_id:
3506 3507 return '<DB:PullRequestVersion #%s>' % self.pull_request_version_id
3507 3508 else:
3508 3509 return '<DB:PullRequestVersion at %#x>' % id(self)
3509 3510
3510 3511 @property
3511 3512 def reviewers(self):
3512 3513 return self.pull_request.reviewers
3513 3514
3514 3515 @property
3515 3516 def versions(self):
3516 3517 return self.pull_request.versions
3517 3518
3518 3519 def is_closed(self):
3519 3520 # calculate from original
3520 3521 return self.pull_request.status == self.STATUS_CLOSED
3521 3522
3522 3523 def calculated_review_status(self):
3523 3524 return self.pull_request.calculated_review_status()
3524 3525
3525 3526 def reviewers_statuses(self):
3526 3527 return self.pull_request.reviewers_statuses()
3527 3528
3528 3529
3529 3530 class PullRequestReviewers(Base, BaseModel):
3530 3531 __tablename__ = 'pull_request_reviewers'
3531 3532 __table_args__ = (
3532 3533 {'extend_existing': True, 'mysql_engine': 'InnoDB',
3533 3534 'mysql_charset': 'utf8', 'sqlite_autoincrement': True},
3534 3535 )
3535 3536
3536 3537 @hybrid_property
3537 3538 def reasons(self):
3538 3539 if not self._reasons:
3539 3540 return []
3540 3541 return self._reasons
3541 3542
3542 3543 @reasons.setter
3543 3544 def reasons(self, val):
3544 3545 val = val or []
3545 3546 if any(not isinstance(x, basestring) for x in val):
3546 3547 raise Exception('invalid reasons type, must be list of strings')
3547 3548 self._reasons = val
3548 3549
3549 3550 pull_requests_reviewers_id = Column(
3550 3551 'pull_requests_reviewers_id', Integer(), nullable=False,
3551 3552 primary_key=True)
3552 3553 pull_request_id = Column(
3553 3554 "pull_request_id", Integer(),
3554 3555 ForeignKey('pull_requests.pull_request_id'), nullable=False)
3555 3556 user_id = Column(
3556 3557 "user_id", Integer(), ForeignKey('users.user_id'), nullable=True)
3557 3558 _reasons = Column(
3558 3559 'reason', MutationList.as_mutable(
3559 3560 JsonType('list', dialect_map=dict(mysql=UnicodeText(16384)))))
3560 3561 mandatory = Column("mandatory", Boolean(), nullable=False, default=False)
3561 3562 user = relationship('User')
3562 3563 pull_request = relationship('PullRequest')
3563 3564
3564 3565
3565 3566 class Notification(Base, BaseModel):
3566 3567 __tablename__ = 'notifications'
3567 3568 __table_args__ = (
3568 3569 Index('notification_type_idx', 'type'),
3569 3570 {'extend_existing': True, 'mysql_engine': 'InnoDB',
3570 3571 'mysql_charset': 'utf8', 'sqlite_autoincrement': True},
3571 3572 )
3572 3573
3573 3574 TYPE_CHANGESET_COMMENT = u'cs_comment'
3574 3575 TYPE_MESSAGE = u'message'
3575 3576 TYPE_MENTION = u'mention'
3576 3577 TYPE_REGISTRATION = u'registration'
3577 3578 TYPE_PULL_REQUEST = u'pull_request'
3578 3579 TYPE_PULL_REQUEST_COMMENT = u'pull_request_comment'
3579 3580
3580 3581 notification_id = Column('notification_id', Integer(), nullable=False, primary_key=True)
3581 3582 subject = Column('subject', Unicode(512), nullable=True)
3582 3583 body = Column('body', UnicodeText().with_variant(UnicodeText(50000), 'mysql'), nullable=True)
3583 3584 created_by = Column("created_by", Integer(), ForeignKey('users.user_id'), nullable=True)
3584 3585 created_on = Column('created_on', DateTime(timezone=False), nullable=False, default=datetime.datetime.now)
3585 3586 type_ = Column('type', Unicode(255))
3586 3587
3587 3588 created_by_user = relationship('User')
3588 3589 notifications_to_users = relationship('UserNotification', lazy='joined',
3589 3590 cascade="all, delete, delete-orphan")
3590 3591
3591 3592 @property
3592 3593 def recipients(self):
3593 3594 return [x.user for x in UserNotification.query()\
3594 3595 .filter(UserNotification.notification == self)\
3595 3596 .order_by(UserNotification.user_id.asc()).all()]
3596 3597
3597 3598 @classmethod
3598 3599 def create(cls, created_by, subject, body, recipients, type_=None):
3599 3600 if type_ is None:
3600 3601 type_ = Notification.TYPE_MESSAGE
3601 3602
3602 3603 notification = cls()
3603 3604 notification.created_by_user = created_by
3604 3605 notification.subject = subject
3605 3606 notification.body = body
3606 3607 notification.type_ = type_
3607 3608 notification.created_on = datetime.datetime.now()
3608 3609
3609 3610 for u in recipients:
3610 3611 assoc = UserNotification()
3611 3612 assoc.notification = notification
3612 3613
3613 3614 # if created_by is inside recipients mark his notification
3614 3615 # as read
3615 3616 if u.user_id == created_by.user_id:
3616 3617 assoc.read = True
3617 3618
3618 3619 u.notifications.append(assoc)
3619 3620 Session().add(notification)
3620 3621
3621 3622 return notification
3622 3623
3623 3624 @property
3624 3625 def description(self):
3625 3626 from rhodecode.model.notification import NotificationModel
3626 3627 return NotificationModel().make_description(self)
3627 3628
3628 3629
3629 3630 class UserNotification(Base, BaseModel):
3630 3631 __tablename__ = 'user_to_notification'
3631 3632 __table_args__ = (
3632 3633 UniqueConstraint('user_id', 'notification_id'),
3633 3634 {'extend_existing': True, 'mysql_engine': 'InnoDB',
3634 3635 'mysql_charset': 'utf8', 'sqlite_autoincrement': True}
3635 3636 )
3636 3637 user_id = Column('user_id', Integer(), ForeignKey('users.user_id'), primary_key=True)
3637 3638 notification_id = Column("notification_id", Integer(), ForeignKey('notifications.notification_id'), primary_key=True)
3638 3639 read = Column('read', Boolean, default=False)
3639 3640 sent_on = Column('sent_on', DateTime(timezone=False), nullable=True, unique=None)
3640 3641
3641 3642 user = relationship('User', lazy="joined")
3642 3643 notification = relationship('Notification', lazy="joined",
3643 3644 order_by=lambda: Notification.created_on.desc(),)
3644 3645
3645 3646 def mark_as_read(self):
3646 3647 self.read = True
3647 3648 Session().add(self)
3648 3649
3649 3650
3650 3651 class Gist(Base, BaseModel):
3651 3652 __tablename__ = 'gists'
3652 3653 __table_args__ = (
3653 3654 Index('g_gist_access_id_idx', 'gist_access_id'),
3654 3655 Index('g_created_on_idx', 'created_on'),
3655 3656 {'extend_existing': True, 'mysql_engine': 'InnoDB',
3656 3657 'mysql_charset': 'utf8', 'sqlite_autoincrement': True}
3657 3658 )
3658 3659 GIST_PUBLIC = u'public'
3659 3660 GIST_PRIVATE = u'private'
3660 3661 DEFAULT_FILENAME = u'gistfile1.txt'
3661 3662
3662 3663 ACL_LEVEL_PUBLIC = u'acl_public'
3663 3664 ACL_LEVEL_PRIVATE = u'acl_private'
3664 3665
3665 3666 gist_id = Column('gist_id', Integer(), primary_key=True)
3666 3667 gist_access_id = Column('gist_access_id', Unicode(250))
3667 3668 gist_description = Column('gist_description', UnicodeText().with_variant(UnicodeText(1024), 'mysql'))
3668 3669 gist_owner = Column('user_id', Integer(), ForeignKey('users.user_id'), nullable=True)
3669 3670 gist_expires = Column('gist_expires', Float(53), nullable=False)
3670 3671 gist_type = Column('gist_type', Unicode(128), nullable=False)
3671 3672 created_on = Column('created_on', DateTime(timezone=False), nullable=False, default=datetime.datetime.now)
3672 3673 modified_at = Column('modified_at', DateTime(timezone=False), nullable=False, default=datetime.datetime.now)
3673 3674 acl_level = Column('acl_level', Unicode(128), nullable=True)
3674 3675
3675 3676 owner = relationship('User')
3676 3677
3677 3678 def __repr__(self):
3678 3679 return '<Gist:[%s]%s>' % (self.gist_type, self.gist_access_id)
3679 3680
3680 3681 @classmethod
3681 3682 def get_or_404(cls, id_, pyramid_exc=False):
3682 3683
3683 3684 if pyramid_exc:
3684 3685 from pyramid.httpexceptions import HTTPNotFound
3685 3686 else:
3686 3687 from webob.exc import HTTPNotFound
3687 3688
3688 3689 res = cls.query().filter(cls.gist_access_id == id_).scalar()
3689 3690 if not res:
3690 3691 raise HTTPNotFound
3691 3692 return res
3692 3693
3693 3694 @classmethod
3694 3695 def get_by_access_id(cls, gist_access_id):
3695 3696 return cls.query().filter(cls.gist_access_id == gist_access_id).scalar()
3696 3697
3697 3698 def gist_url(self):
3698 3699 import rhodecode
3699 3700 from pylons import url
3700 3701
3701 3702 alias_url = rhodecode.CONFIG.get('gist_alias_url')
3702 3703 if alias_url:
3703 3704 return alias_url.replace('{gistid}', self.gist_access_id)
3704 3705
3705 3706 return url('gist', gist_id=self.gist_access_id, qualified=True)
3706 3707
3707 3708 @classmethod
3708 3709 def base_path(cls):
3709 3710 """
3710 3711 Returns base path when all gists are stored
3711 3712
3712 3713 :param cls:
3713 3714 """
3714 3715 from rhodecode.model.gist import GIST_STORE_LOC
3715 3716 q = Session().query(RhodeCodeUi)\
3716 3717 .filter(RhodeCodeUi.ui_key == URL_SEP)
3717 3718 q = q.options(FromCache("sql_cache_short", "repository_repo_path"))
3718 3719 return os.path.join(q.one().ui_value, GIST_STORE_LOC)
3719 3720
3720 3721 def get_api_data(self):
3721 3722 """
3722 3723 Common function for generating gist related data for API
3723 3724 """
3724 3725 gist = self
3725 3726 data = {
3726 3727 'gist_id': gist.gist_id,
3727 3728 'type': gist.gist_type,
3728 3729 'access_id': gist.gist_access_id,
3729 3730 'description': gist.gist_description,
3730 3731 'url': gist.gist_url(),
3731 3732 'expires': gist.gist_expires,
3732 3733 'created_on': gist.created_on,
3733 3734 'modified_at': gist.modified_at,
3734 3735 'content': None,
3735 3736 'acl_level': gist.acl_level,
3736 3737 }
3737 3738 return data
3738 3739
3739 3740 def __json__(self):
3740 3741 data = dict(
3741 3742 )
3742 3743 data.update(self.get_api_data())
3743 3744 return data
3744 3745 # SCM functions
3745 3746
3746 3747 def scm_instance(self, **kwargs):
3747 3748 full_repo_path = os.path.join(self.base_path(), self.gist_access_id)
3748 3749 return get_vcs_instance(
3749 3750 repo_path=safe_str(full_repo_path), create=False)
3750 3751
3751 3752
3752 3753 class ExternalIdentity(Base, BaseModel):
3753 3754 __tablename__ = 'external_identities'
3754 3755 __table_args__ = (
3755 3756 Index('local_user_id_idx', 'local_user_id'),
3756 3757 Index('external_id_idx', 'external_id'),
3757 3758 {'extend_existing': True, 'mysql_engine': 'InnoDB',
3758 3759 'mysql_charset': 'utf8'})
3759 3760
3760 3761 external_id = Column('external_id', Unicode(255), default=u'',
3761 3762 primary_key=True)
3762 3763 external_username = Column('external_username', Unicode(1024), default=u'')
3763 3764 local_user_id = Column('local_user_id', Integer(),
3764 3765 ForeignKey('users.user_id'), primary_key=True)
3765 3766 provider_name = Column('provider_name', Unicode(255), default=u'',
3766 3767 primary_key=True)
3767 3768 access_token = Column('access_token', String(1024), default=u'')
3768 3769 alt_token = Column('alt_token', String(1024), default=u'')
3769 3770 token_secret = Column('token_secret', String(1024), default=u'')
3770 3771
3771 3772 @classmethod
3772 3773 def by_external_id_and_provider(cls, external_id, provider_name,
3773 3774 local_user_id=None):
3774 3775 """
3775 3776 Returns ExternalIdentity instance based on search params
3776 3777
3777 3778 :param external_id:
3778 3779 :param provider_name:
3779 3780 :return: ExternalIdentity
3780 3781 """
3781 3782 query = cls.query()
3782 3783 query = query.filter(cls.external_id == external_id)
3783 3784 query = query.filter(cls.provider_name == provider_name)
3784 3785 if local_user_id:
3785 3786 query = query.filter(cls.local_user_id == local_user_id)
3786 3787 return query.first()
3787 3788
3788 3789 @classmethod
3789 3790 def user_by_external_id_and_provider(cls, external_id, provider_name):
3790 3791 """
3791 3792 Returns User instance based on search params
3792 3793
3793 3794 :param external_id:
3794 3795 :param provider_name:
3795 3796 :return: User
3796 3797 """
3797 3798 query = User.query()
3798 3799 query = query.filter(cls.external_id == external_id)
3799 3800 query = query.filter(cls.provider_name == provider_name)
3800 3801 query = query.filter(User.user_id == cls.local_user_id)
3801 3802 return query.first()
3802 3803
3803 3804 @classmethod
3804 3805 def by_local_user_id(cls, local_user_id):
3805 3806 """
3806 3807 Returns all tokens for user
3807 3808
3808 3809 :param local_user_id:
3809 3810 :return: ExternalIdentity
3810 3811 """
3811 3812 query = cls.query()
3812 3813 query = query.filter(cls.local_user_id == local_user_id)
3813 3814 return query
3814 3815
3815 3816
3816 3817 class Integration(Base, BaseModel):
3817 3818 __tablename__ = 'integrations'
3818 3819 __table_args__ = (
3819 3820 {'extend_existing': True, 'mysql_engine': 'InnoDB',
3820 3821 'mysql_charset': 'utf8', 'sqlite_autoincrement': True}
3821 3822 )
3822 3823
3823 3824 integration_id = Column('integration_id', Integer(), primary_key=True)
3824 3825 integration_type = Column('integration_type', String(255))
3825 3826 enabled = Column('enabled', Boolean(), nullable=False)
3826 3827 name = Column('name', String(255), nullable=False)
3827 3828 child_repos_only = Column('child_repos_only', Boolean(), nullable=False,
3828 3829 default=False)
3829 3830
3830 3831 settings = Column(
3831 3832 'settings_json', MutationObj.as_mutable(
3832 3833 JsonType(dialect_map=dict(mysql=UnicodeText(16384)))))
3833 3834 repo_id = Column(
3834 3835 'repo_id', Integer(), ForeignKey('repositories.repo_id'),
3835 3836 nullable=True, unique=None, default=None)
3836 3837 repo = relationship('Repository', lazy='joined')
3837 3838
3838 3839 repo_group_id = Column(
3839 3840 'repo_group_id', Integer(), ForeignKey('groups.group_id'),
3840 3841 nullable=True, unique=None, default=None)
3841 3842 repo_group = relationship('RepoGroup', lazy='joined')
3842 3843
3843 3844 @property
3844 3845 def scope(self):
3845 3846 if self.repo:
3846 3847 return repr(self.repo)
3847 3848 if self.repo_group:
3848 3849 if self.child_repos_only:
3849 3850 return repr(self.repo_group) + ' (child repos only)'
3850 3851 else:
3851 3852 return repr(self.repo_group) + ' (recursive)'
3852 3853 if self.child_repos_only:
3853 3854 return 'root_repos'
3854 3855 return 'global'
3855 3856
3856 3857 def __repr__(self):
3857 3858 return '<Integration(%r, %r)>' % (self.integration_type, self.scope)
3858 3859
3859 3860
3860 3861 class RepoReviewRuleUser(Base, BaseModel):
3861 3862 __tablename__ = 'repo_review_rules_users'
3862 3863 __table_args__ = (
3863 3864 {'extend_existing': True, 'mysql_engine': 'InnoDB',
3864 3865 'mysql_charset': 'utf8', 'sqlite_autoincrement': True,}
3865 3866 )
3866 3867 repo_review_rule_user_id = Column('repo_review_rule_user_id', Integer(), primary_key=True)
3867 3868 repo_review_rule_id = Column("repo_review_rule_id", Integer(), ForeignKey('repo_review_rules.repo_review_rule_id'))
3868 3869 user_id = Column("user_id", Integer(), ForeignKey('users.user_id'), nullable=False)
3869 3870 mandatory = Column("mandatory", Boolean(), nullable=False, default=False)
3870 3871 user = relationship('User')
3871 3872
3872 3873 def rule_data(self):
3873 3874 return {
3874 3875 'mandatory': self.mandatory
3875 3876 }
3876 3877
3877 3878
3878 3879 class RepoReviewRuleUserGroup(Base, BaseModel):
3879 3880 __tablename__ = 'repo_review_rules_users_groups'
3880 3881 __table_args__ = (
3881 3882 {'extend_existing': True, 'mysql_engine': 'InnoDB',
3882 3883 'mysql_charset': 'utf8', 'sqlite_autoincrement': True,}
3883 3884 )
3884 3885 repo_review_rule_users_group_id = Column('repo_review_rule_users_group_id', Integer(), primary_key=True)
3885 3886 repo_review_rule_id = Column("repo_review_rule_id", Integer(), ForeignKey('repo_review_rules.repo_review_rule_id'))
3886 3887 users_group_id = Column("users_group_id", Integer(),ForeignKey('users_groups.users_group_id'), nullable=False)
3887 3888 mandatory = Column("mandatory", Boolean(), nullable=False, default=False)
3888 3889 users_group = relationship('UserGroup')
3889 3890
3890 3891 def rule_data(self):
3891 3892 return {
3892 3893 'mandatory': self.mandatory
3893 3894 }
3894 3895
3895 3896
3896 3897 class RepoReviewRule(Base, BaseModel):
3897 3898 __tablename__ = 'repo_review_rules'
3898 3899 __table_args__ = (
3899 3900 {'extend_existing': True, 'mysql_engine': 'InnoDB',
3900 3901 'mysql_charset': 'utf8', 'sqlite_autoincrement': True,}
3901 3902 )
3902 3903
3903 3904 repo_review_rule_id = Column(
3904 3905 'repo_review_rule_id', Integer(), primary_key=True)
3905 3906 repo_id = Column(
3906 3907 "repo_id", Integer(), ForeignKey('repositories.repo_id'))
3907 3908 repo = relationship('Repository', backref='review_rules')
3908 3909
3909 3910 _branch_pattern = Column("branch_pattern", UnicodeText().with_variant(UnicodeText(255), 'mysql'), default=u'*') # glob
3910 3911 _file_pattern = Column("file_pattern", UnicodeText().with_variant(UnicodeText(255), 'mysql'), default=u'*') # glob
3911 3912
3912 3913 use_authors_for_review = Column("use_authors_for_review", Boolean(), nullable=False, default=False)
3913 3914 forbid_author_to_review = Column("forbid_author_to_review", Boolean(), nullable=False, default=False)
3914 3915 forbid_commit_author_to_review = Column("forbid_commit_author_to_review", Boolean(), nullable=False, default=False)
3915 3916 forbid_adding_reviewers = Column("forbid_adding_reviewers", Boolean(), nullable=False, default=False)
3916 3917
3917 3918 rule_users = relationship('RepoReviewRuleUser')
3918 3919 rule_user_groups = relationship('RepoReviewRuleUserGroup')
3919 3920
3920 3921 @hybrid_property
3921 3922 def branch_pattern(self):
3922 3923 return self._branch_pattern or '*'
3923 3924
3924 3925 def _validate_glob(self, value):
3925 3926 re.compile('^' + glob2re(value) + '$')
3926 3927
3927 3928 @branch_pattern.setter
3928 3929 def branch_pattern(self, value):
3929 3930 self._validate_glob(value)
3930 3931 self._branch_pattern = value or '*'
3931 3932
3932 3933 @hybrid_property
3933 3934 def file_pattern(self):
3934 3935 return self._file_pattern or '*'
3935 3936
3936 3937 @file_pattern.setter
3937 3938 def file_pattern(self, value):
3938 3939 self._validate_glob(value)
3939 3940 self._file_pattern = value or '*'
3940 3941
3941 3942 def matches(self, branch, files_changed):
3942 3943 """
3943 3944 Check if this review rule matches a branch/files in a pull request
3944 3945
3945 3946 :param branch: branch name for the commit
3946 3947 :param files_changed: list of file paths changed in the pull request
3947 3948 """
3948 3949
3949 3950 branch = branch or ''
3950 3951 files_changed = files_changed or []
3951 3952
3952 3953 branch_matches = True
3953 3954 if branch:
3954 3955 branch_regex = re.compile('^' + glob2re(self.branch_pattern) + '$')
3955 3956 branch_matches = bool(branch_regex.search(branch))
3956 3957
3957 3958 files_matches = True
3958 3959 if self.file_pattern != '*':
3959 3960 files_matches = False
3960 3961 file_regex = re.compile(glob2re(self.file_pattern))
3961 3962 for filename in files_changed:
3962 3963 if file_regex.search(filename):
3963 3964 files_matches = True
3964 3965 break
3965 3966
3966 3967 return branch_matches and files_matches
3967 3968
3968 3969 @property
3969 3970 def review_users(self):
3970 3971 """ Returns the users which this rule applies to """
3971 3972
3972 3973 users = collections.OrderedDict()
3973 3974
3974 3975 for rule_user in self.rule_users:
3975 3976 if rule_user.user.active:
3976 3977 if rule_user.user not in users:
3977 3978 users[rule_user.user.username] = {
3978 3979 'user': rule_user.user,
3979 3980 'source': 'user',
3980 3981 'source_data': {},
3981 3982 'data': rule_user.rule_data()
3982 3983 }
3983 3984
3984 3985 for rule_user_group in self.rule_user_groups:
3985 3986 source_data = {
3986 3987 'name': rule_user_group.users_group.users_group_name,
3987 3988 'members': len(rule_user_group.users_group.members)
3988 3989 }
3989 3990 for member in rule_user_group.users_group.members:
3990 3991 if member.user.active:
3991 3992 users[member.user.username] = {
3992 3993 'user': member.user,
3993 3994 'source': 'user_group',
3994 3995 'source_data': source_data,
3995 3996 'data': rule_user_group.rule_data()
3996 3997 }
3997 3998
3998 3999 return users
3999 4000
4000 4001 def __repr__(self):
4001 4002 return '<RepoReviewerRule(id=%r, repo=%r)>' % (
4002 4003 self.repo_review_rule_id, self.repo)
4003 4004
4004 4005
4005 4006 class DbMigrateVersion(Base, BaseModel):
4006 4007 __tablename__ = 'db_migrate_version'
4007 4008 __table_args__ = (
4008 4009 {'extend_existing': True, 'mysql_engine': 'InnoDB',
4009 4010 'mysql_charset': 'utf8', 'sqlite_autoincrement': True},
4010 4011 )
4011 4012 repository_id = Column('repository_id', String(250), primary_key=True)
4012 4013 repository_path = Column('repository_path', Text)
4013 4014 version = Column('version', Integer)
4014 4015
4015 4016
4016 4017 class DbSession(Base, BaseModel):
4017 4018 __tablename__ = 'db_session'
4018 4019 __table_args__ = (
4019 4020 {'extend_existing': True, 'mysql_engine': 'InnoDB',
4020 4021 'mysql_charset': 'utf8', 'sqlite_autoincrement': True},
4021 4022 )
4022 4023
4023 4024 def __repr__(self):
4024 4025 return '<DB:DbSession({})>'.format(self.id)
4025 4026
4026 4027 id = Column('id', Integer())
4027 4028 namespace = Column('namespace', String(255), primary_key=True)
4028 4029 accessed = Column('accessed', DateTime, nullable=False)
4029 4030 created = Column('created', DateTime, nullable=False)
4030 4031 data = Column('data', PickleType, nullable=False)
General Comments 0
You need to be logged in to leave comments. Login now