|
|
# -*- coding: utf-8 -*-
|
|
|
|
|
|
# Copyright (C) 2010-2017 RhodeCode GmbH
|
|
|
#
|
|
|
# This program is free software: you can redistribute it and/or modify
|
|
|
# it under the terms of the GNU Affero General Public License, version 3
|
|
|
# (only), as published by the Free Software Foundation.
|
|
|
#
|
|
|
# This program is distributed in the hope that it will be useful,
|
|
|
# but WITHOUT ANY WARRANTY; without even the implied warranty of
|
|
|
# MERCHANTABILITY or FITNESS FOR A PARTICULAR PURPOSE. See the
|
|
|
# GNU General Public License for more details.
|
|
|
#
|
|
|
# You should have received a copy of the GNU Affero General Public License
|
|
|
# along with this program. If not, see <http://www.gnu.org/licenses/>.
|
|
|
#
|
|
|
# This program is dual-licensed. If you wish to learn more about the
|
|
|
# RhodeCode Enterprise Edition, including its added features, Support services,
|
|
|
# and proprietary license terms, please see https://rhodecode.com/licenses/
|
|
|
|
|
|
"""
|
|
|
The base Controller API
|
|
|
Provides the BaseController class for subclassing. And usage in different
|
|
|
controllers
|
|
|
"""
|
|
|
|
|
|
import logging
|
|
|
import socket
|
|
|
|
|
|
import markupsafe
|
|
|
import ipaddress
|
|
|
import pyramid.threadlocal
|
|
|
|
|
|
from paste.auth.basic import AuthBasicAuthenticator
|
|
|
from paste.httpexceptions import HTTPUnauthorized, HTTPForbidden, get_exception
|
|
|
from paste.httpheaders import WWW_AUTHENTICATE, AUTHORIZATION
|
|
|
from pylons import config, tmpl_context as c, request, url
|
|
|
from pylons.controllers import WSGIController
|
|
|
from pylons.controllers.util import redirect
|
|
|
from pylons.i18n import translation
|
|
|
# marcink: don't remove this import
|
|
|
from pylons.templating import render_mako, pylons_globals, literal, cached_template
|
|
|
from pylons.i18n.translation import _
|
|
|
from webob.exc import HTTPFound
|
|
|
|
|
|
|
|
|
import rhodecode
|
|
|
from rhodecode.authentication.base import VCS_TYPE
|
|
|
from rhodecode.lib import auth, utils2
|
|
|
from rhodecode.lib import helpers as h
|
|
|
from rhodecode.lib.auth import AuthUser, CookieStoreWrapper
|
|
|
from rhodecode.lib.exceptions import UserCreationError
|
|
|
from rhodecode.lib.utils import (
|
|
|
get_repo_slug, set_rhodecode_config, password_changed,
|
|
|
get_enabled_hook_classes)
|
|
|
from rhodecode.lib.utils2 import (
|
|
|
str2bool, safe_unicode, AttributeDict, safe_int, md5, aslist)
|
|
|
from rhodecode.lib.vcs.exceptions import RepositoryRequirementError
|
|
|
from rhodecode.model import meta
|
|
|
from rhodecode.model.db import Repository, User, ChangesetComment
|
|
|
from rhodecode.model.notification import NotificationModel
|
|
|
from rhodecode.model.scm import ScmModel
|
|
|
from rhodecode.model.settings import VcsSettingsModel, SettingsModel
|
|
|
|
|
|
|
|
|
log = logging.getLogger(__name__)
|
|
|
|
|
|
|
|
|
# hack to make the migration to pyramid easier
|
|
|
def render(template_name, extra_vars=None, cache_key=None,
|
|
|
cache_type=None, cache_expire=None):
|
|
|
"""Render a template with Mako
|
|
|
|
|
|
Accepts the cache options ``cache_key``, ``cache_type``, and
|
|
|
``cache_expire``.
|
|
|
|
|
|
"""
|
|
|
# Create a render callable for the cache function
|
|
|
def render_template():
|
|
|
# Pull in extra vars if needed
|
|
|
globs = extra_vars or {}
|
|
|
|
|
|
# Second, get the globals
|
|
|
globs.update(pylons_globals())
|
|
|
|
|
|
globs['_ungettext'] = globs['ungettext']
|
|
|
# Grab a template reference
|
|
|
template = globs['app_globals'].mako_lookup.get_template(template_name)
|
|
|
|
|
|
return literal(template.render_unicode(**globs))
|
|
|
|
|
|
return cached_template(template_name, render_template, cache_key=cache_key,
|
|
|
cache_type=cache_type, cache_expire=cache_expire)
|
|
|
|
|
|
def _filter_proxy(ip):
|
|
|
"""
|
|
|
Passed in IP addresses in HEADERS can be in a special format of multiple
|
|
|
ips. Those comma separated IPs are passed from various proxies in the
|
|
|
chain of request processing. The left-most being the original client.
|
|
|
We only care about the first IP which came from the org. client.
|
|
|
|
|
|
:param ip: ip string from headers
|
|
|
"""
|
|
|
if ',' in ip:
|
|
|
_ips = ip.split(',')
|
|
|
_first_ip = _ips[0].strip()
|
|
|
log.debug('Got multiple IPs %s, using %s', ','.join(_ips), _first_ip)
|
|
|
return _first_ip
|
|
|
return ip
|
|
|
|
|
|
|
|
|
def _filter_port(ip):
|
|
|
"""
|
|
|
Removes a port from ip, there are 4 main cases to handle here.
|
|
|
- ipv4 eg. 127.0.0.1
|
|
|
- ipv6 eg. ::1
|
|
|
- ipv4+port eg. 127.0.0.1:8080
|
|
|
- ipv6+port eg. [::1]:8080
|
|
|
|
|
|
:param ip:
|
|
|
"""
|
|
|
def is_ipv6(ip_addr):
|
|
|
if hasattr(socket, 'inet_pton'):
|
|
|
try:
|
|
|
socket.inet_pton(socket.AF_INET6, ip_addr)
|
|
|
except socket.error:
|
|
|
return False
|
|
|
else:
|
|
|
# fallback to ipaddress
|
|
|
try:
|
|
|
ipaddress.IPv6Address(safe_unicode(ip_addr))
|
|
|
except Exception:
|
|
|
return False
|
|
|
return True
|
|
|
|
|
|
if ':' not in ip: # must be ipv4 pure ip
|
|
|
return ip
|
|
|
|
|
|
if '[' in ip and ']' in ip: # ipv6 with port
|
|
|
return ip.split(']')[0][1:].lower()
|
|
|
|
|
|
# must be ipv6 or ipv4 with port
|
|
|
if is_ipv6(ip):
|
|
|
return ip
|
|
|
else:
|
|
|
ip, _port = ip.split(':')[:2] # means ipv4+port
|
|
|
return ip
|
|
|
|
|
|
|
|
|
def get_ip_addr(environ):
|
|
|
proxy_key = 'HTTP_X_REAL_IP'
|
|
|
proxy_key2 = 'HTTP_X_FORWARDED_FOR'
|
|
|
def_key = 'REMOTE_ADDR'
|
|
|
_filters = lambda x: _filter_port(_filter_proxy(x))
|
|
|
|
|
|
ip = environ.get(proxy_key)
|
|
|
if ip:
|
|
|
return _filters(ip)
|
|
|
|
|
|
ip = environ.get(proxy_key2)
|
|
|
if ip:
|
|
|
return _filters(ip)
|
|
|
|
|
|
ip = environ.get(def_key, '0.0.0.0')
|
|
|
return _filters(ip)
|
|
|
|
|
|
|
|
|
def get_server_ip_addr(environ, log_errors=True):
|
|
|
hostname = environ.get('SERVER_NAME')
|
|
|
try:
|
|
|
return socket.gethostbyname(hostname)
|
|
|
except Exception as e:
|
|
|
if log_errors:
|
|
|
# in some cases this lookup is not possible, and we don't want to
|
|
|
# make it an exception in logs
|
|
|
log.exception('Could not retrieve server ip address: %s', e)
|
|
|
return hostname
|
|
|
|
|
|
|
|
|
def get_server_port(environ):
|
|
|
return environ.get('SERVER_PORT')
|
|
|
|
|
|
|
|
|
def get_access_path(environ):
|
|
|
path = environ.get('PATH_INFO')
|
|
|
org_req = environ.get('pylons.original_request')
|
|
|
if org_req:
|
|
|
path = org_req.environ.get('PATH_INFO')
|
|
|
return path
|
|
|
|
|
|
|
|
|
def get_user_agent(environ):
|
|
|
return environ.get('HTTP_USER_AGENT')
|
|
|
|
|
|
|
|
|
def vcs_operation_context(
|
|
|
environ, repo_name, username, action, scm, check_locking=True,
|
|
|
is_shadow_repo=False):
|
|
|
"""
|
|
|
Generate the context for a vcs operation, e.g. push or pull.
|
|
|
|
|
|
This context is passed over the layers so that hooks triggered by the
|
|
|
vcs operation know details like the user, the user's IP address etc.
|
|
|
|
|
|
:param check_locking: Allows to switch of the computation of the locking
|
|
|
data. This serves mainly the need of the simplevcs middleware to be
|
|
|
able to disable this for certain operations.
|
|
|
|
|
|
"""
|
|
|
# Tri-state value: False: unlock, None: nothing, True: lock
|
|
|
make_lock = None
|
|
|
locked_by = [None, None, None]
|
|
|
is_anonymous = username == User.DEFAULT_USER
|
|
|
if not is_anonymous and check_locking:
|
|
|
log.debug('Checking locking on repository "%s"', repo_name)
|
|
|
user = User.get_by_username(username)
|
|
|
repo = Repository.get_by_repo_name(repo_name)
|
|
|
make_lock, __, locked_by = repo.get_locking_state(
|
|
|
action, user.user_id)
|
|
|
|
|
|
settings_model = VcsSettingsModel(repo=repo_name)
|
|
|
ui_settings = settings_model.get_ui_settings()
|
|
|
|
|
|
extras = {
|
|
|
'ip': get_ip_addr(environ),
|
|
|
'username': username,
|
|
|
'action': action,
|
|
|
'repository': repo_name,
|
|
|
'scm': scm,
|
|
|
'config': rhodecode.CONFIG['__file__'],
|
|
|
'make_lock': make_lock,
|
|
|
'locked_by': locked_by,
|
|
|
'server_url': utils2.get_server_url(environ),
|
|
|
'user_agent': get_user_agent(environ),
|
|
|
'hooks': get_enabled_hook_classes(ui_settings),
|
|
|
'is_shadow_repo': is_shadow_repo,
|
|
|
}
|
|
|
return extras
|
|
|
|
|
|
|
|
|
class BasicAuth(AuthBasicAuthenticator):
|
|
|
|
|
|
def __init__(self, realm, authfunc, registry, auth_http_code=None,
|
|
|
initial_call_detection=False, acl_repo_name=None):
|
|
|
self.realm = realm
|
|
|
self.initial_call = initial_call_detection
|
|
|
self.authfunc = authfunc
|
|
|
self.registry = registry
|
|
|
self.acl_repo_name = acl_repo_name
|
|
|
self._rc_auth_http_code = auth_http_code
|
|
|
|
|
|
def _get_response_from_code(self, http_code):
|
|
|
try:
|
|
|
return get_exception(safe_int(http_code))
|
|
|
except Exception:
|
|
|
log.exception('Failed to fetch response for code %s' % http_code)
|
|
|
return HTTPForbidden
|
|
|
|
|
|
def build_authentication(self):
|
|
|
head = WWW_AUTHENTICATE.tuples('Basic realm="%s"' % self.realm)
|
|
|
if self._rc_auth_http_code and not self.initial_call:
|
|
|
# return alternative HTTP code if alternative http return code
|
|
|
# is specified in RhodeCode config, but ONLY if it's not the
|
|
|
# FIRST call
|
|
|
custom_response_klass = self._get_response_from_code(
|
|
|
self._rc_auth_http_code)
|
|
|
return custom_response_klass(headers=head)
|
|
|
return HTTPUnauthorized(headers=head)
|
|
|
|
|
|
def authenticate(self, environ):
|
|
|
authorization = AUTHORIZATION(environ)
|
|
|
if not authorization:
|
|
|
return self.build_authentication()
|
|
|
(authmeth, auth) = authorization.split(' ', 1)
|
|
|
if 'basic' != authmeth.lower():
|
|
|
return self.build_authentication()
|
|
|
auth = auth.strip().decode('base64')
|
|
|
_parts = auth.split(':', 1)
|
|
|
if len(_parts) == 2:
|
|
|
username, password = _parts
|
|
|
if self.authfunc(
|
|
|
username, password, environ, VCS_TYPE,
|
|
|
registry=self.registry, acl_repo_name=self.acl_repo_name):
|
|
|
return username
|
|
|
if username and password:
|
|
|
# we mark that we actually executed authentication once, at
|
|
|
# that point we can use the alternative auth code
|
|
|
self.initial_call = False
|
|
|
|
|
|
return self.build_authentication()
|
|
|
|
|
|
__call__ = authenticate
|
|
|
|
|
|
|
|
|
def calculate_version_hash():
|
|
|
return md5(
|
|
|
config.get('beaker.session.secret', '') +
|
|
|
rhodecode.__version__)[:8]
|
|
|
|
|
|
|
|
|
def get_current_lang(request):
|
|
|
# NOTE(marcink): remove after pyramid move
|
|
|
try:
|
|
|
return translation.get_lang()[0]
|
|
|
except:
|
|
|
pass
|
|
|
|
|
|
return getattr(request, '_LOCALE_', request.locale_name)
|
|
|
|
|
|
|
|
|
def attach_context_attributes(context, request, user_id):
|
|
|
"""
|
|
|
Attach variables into template context called `c`, please note that
|
|
|
request could be pylons or pyramid request in here.
|
|
|
"""
|
|
|
|
|
|
rc_config = SettingsModel().get_all_settings(cache=True)
|
|
|
|
|
|
context.rhodecode_version = rhodecode.__version__
|
|
|
context.rhodecode_edition = config.get('rhodecode.edition')
|
|
|
# unique secret + version does not leak the version but keep consistency
|
|
|
context.rhodecode_version_hash = calculate_version_hash()
|
|
|
|
|
|
# Default language set for the incoming request
|
|
|
context.language = get_current_lang(request)
|
|
|
|
|
|
# Visual options
|
|
|
context.visual = AttributeDict({})
|
|
|
|
|
|
# DB stored Visual Items
|
|
|
context.visual.show_public_icon = str2bool(
|
|
|
rc_config.get('rhodecode_show_public_icon'))
|
|
|
context.visual.show_private_icon = str2bool(
|
|
|
rc_config.get('rhodecode_show_private_icon'))
|
|
|
context.visual.stylify_metatags = str2bool(
|
|
|
rc_config.get('rhodecode_stylify_metatags'))
|
|
|
context.visual.dashboard_items = safe_int(
|
|
|
rc_config.get('rhodecode_dashboard_items', 100))
|
|
|
context.visual.admin_grid_items = safe_int(
|
|
|
rc_config.get('rhodecode_admin_grid_items', 100))
|
|
|
context.visual.repository_fields = str2bool(
|
|
|
rc_config.get('rhodecode_repository_fields'))
|
|
|
context.visual.show_version = str2bool(
|
|
|
rc_config.get('rhodecode_show_version'))
|
|
|
context.visual.use_gravatar = str2bool(
|
|
|
rc_config.get('rhodecode_use_gravatar'))
|
|
|
context.visual.gravatar_url = rc_config.get('rhodecode_gravatar_url')
|
|
|
context.visual.default_renderer = rc_config.get(
|
|
|
'rhodecode_markup_renderer', 'rst')
|
|
|
context.visual.comment_types = ChangesetComment.COMMENT_TYPES
|
|
|
context.visual.rhodecode_support_url = \
|
|
|
rc_config.get('rhodecode_support_url') or h.route_url('rhodecode_support')
|
|
|
|
|
|
context.visual.affected_files_cut_off = 60
|
|
|
|
|
|
context.pre_code = rc_config.get('rhodecode_pre_code')
|
|
|
context.post_code = rc_config.get('rhodecode_post_code')
|
|
|
context.rhodecode_name = rc_config.get('rhodecode_title')
|
|
|
context.default_encodings = aslist(config.get('default_encoding'), sep=',')
|
|
|
# if we have specified default_encoding in the request, it has more
|
|
|
# priority
|
|
|
if request.GET.get('default_encoding'):
|
|
|
context.default_encodings.insert(0, request.GET.get('default_encoding'))
|
|
|
context.clone_uri_tmpl = rc_config.get('rhodecode_clone_uri_tmpl')
|
|
|
|
|
|
# INI stored
|
|
|
context.labs_active = str2bool(
|
|
|
config.get('labs_settings_active', 'false'))
|
|
|
context.visual.allow_repo_location_change = str2bool(
|
|
|
config.get('allow_repo_location_change', True))
|
|
|
context.visual.allow_custom_hooks_settings = str2bool(
|
|
|
config.get('allow_custom_hooks_settings', True))
|
|
|
context.debug_style = str2bool(config.get('debug_style', False))
|
|
|
|
|
|
context.rhodecode_instanceid = config.get('instance_id')
|
|
|
|
|
|
context.visual.cut_off_limit_diff = safe_int(
|
|
|
config.get('cut_off_limit_diff'))
|
|
|
context.visual.cut_off_limit_file = safe_int(
|
|
|
config.get('cut_off_limit_file'))
|
|
|
|
|
|
# AppEnlight
|
|
|
context.appenlight_enabled = str2bool(config.get('appenlight', 'false'))
|
|
|
context.appenlight_api_public_key = config.get(
|
|
|
'appenlight.api_public_key', '')
|
|
|
context.appenlight_server_url = config.get('appenlight.server_url', '')
|
|
|
|
|
|
# JS template context
|
|
|
context.template_context = {
|
|
|
'repo_name': None,
|
|
|
'repo_type': None,
|
|
|
'repo_landing_commit': None,
|
|
|
'rhodecode_user': {
|
|
|
'username': None,
|
|
|
'email': None,
|
|
|
'notification_status': False
|
|
|
},
|
|
|
'visual': {
|
|
|
'default_renderer': None
|
|
|
},
|
|
|
'commit_data': {
|
|
|
'commit_id': None
|
|
|
},
|
|
|
'pull_request_data': {'pull_request_id': None},
|
|
|
'timeago': {
|
|
|
'refresh_time': 120 * 1000,
|
|
|
'cutoff_limit': 1000 * 60 * 60 * 24 * 7
|
|
|
},
|
|
|
'pylons_dispatch': {
|
|
|
# 'controller': request.environ['pylons.routes_dict']['controller'],
|
|
|
# 'action': request.environ['pylons.routes_dict']['action'],
|
|
|
},
|
|
|
'pyramid_dispatch': {
|
|
|
|
|
|
},
|
|
|
'extra': {'plugins': {}}
|
|
|
}
|
|
|
# END CONFIG VARS
|
|
|
|
|
|
# TODO: This dosn't work when called from pylons compatibility tween.
|
|
|
# Fix this and remove it from base controller.
|
|
|
# context.repo_name = get_repo_slug(request) # can be empty
|
|
|
|
|
|
diffmode = 'sideside'
|
|
|
if request.GET.get('diffmode'):
|
|
|
if request.GET['diffmode'] == 'unified':
|
|
|
diffmode = 'unified'
|
|
|
elif request.session.get('diffmode'):
|
|
|
diffmode = request.session['diffmode']
|
|
|
|
|
|
context.diffmode = diffmode
|
|
|
|
|
|
if request.session.get('diffmode') != diffmode:
|
|
|
request.session['diffmode'] = diffmode
|
|
|
|
|
|
context.csrf_token = auth.get_csrf_token(session=request.session)
|
|
|
context.backends = rhodecode.BACKENDS.keys()
|
|
|
context.backends.sort()
|
|
|
context.unread_notifications = NotificationModel().get_unread_cnt_for_user(user_id)
|
|
|
|
|
|
# NOTE(marcink): when migrated to pyramid we don't need to set this anymore,
|
|
|
# given request will ALWAYS be pyramid one
|
|
|
pyramid_request = pyramid.threadlocal.get_current_request()
|
|
|
context.pyramid_request = pyramid_request
|
|
|
|
|
|
# web case
|
|
|
if hasattr(pyramid_request, 'user'):
|
|
|
context.auth_user = pyramid_request.user
|
|
|
context.rhodecode_user = pyramid_request.user
|
|
|
|
|
|
# api case
|
|
|
if hasattr(pyramid_request, 'rpc_user'):
|
|
|
context.auth_user = pyramid_request.rpc_user
|
|
|
context.rhodecode_user = pyramid_request.rpc_user
|
|
|
|
|
|
# attach the whole call context to the request
|
|
|
request.call_context = context
|
|
|
|
|
|
|
|
|
def get_auth_user(request):
|
|
|
environ = request.environ
|
|
|
session = request.session
|
|
|
|
|
|
ip_addr = get_ip_addr(environ)
|
|
|
# make sure that we update permissions each time we call controller
|
|
|
_auth_token = (request.GET.get('auth_token', '') or
|
|
|
request.GET.get('api_key', ''))
|
|
|
|
|
|
if _auth_token:
|
|
|
# when using API_KEY we assume user exists, and
|
|
|
# doesn't need auth based on cookies.
|
|
|
auth_user = AuthUser(api_key=_auth_token, ip_addr=ip_addr)
|
|
|
authenticated = False
|
|
|
else:
|
|
|
cookie_store = CookieStoreWrapper(session.get('rhodecode_user'))
|
|
|
try:
|
|
|
auth_user = AuthUser(user_id=cookie_store.get('user_id', None),
|
|
|
ip_addr=ip_addr)
|
|
|
except UserCreationError as e:
|
|
|
h.flash(e, 'error')
|
|
|
# container auth or other auth functions that create users
|
|
|
# on the fly can throw this exception signaling that there's
|
|
|
# issue with user creation, explanation should be provided
|
|
|
# in Exception itself. We then create a simple blank
|
|
|
# AuthUser
|
|
|
auth_user = AuthUser(ip_addr=ip_addr)
|
|
|
|
|
|
if password_changed(auth_user, session):
|
|
|
session.invalidate()
|
|
|
cookie_store = CookieStoreWrapper(session.get('rhodecode_user'))
|
|
|
auth_user = AuthUser(ip_addr=ip_addr)
|
|
|
|
|
|
authenticated = cookie_store.get('is_authenticated')
|
|
|
|
|
|
if not auth_user.is_authenticated and auth_user.is_user_object:
|
|
|
# user is not authenticated and not empty
|
|
|
auth_user.set_authenticated(authenticated)
|
|
|
|
|
|
return auth_user
|
|
|
|
|
|
|
|
|
class BaseController(WSGIController):
|
|
|
|
|
|
def __before__(self):
|
|
|
"""
|
|
|
__before__ is called before controller methods and after __call__
|
|
|
"""
|
|
|
# on each call propagate settings calls into global settings.
|
|
|
set_rhodecode_config(config)
|
|
|
attach_context_attributes(c, request, self._rhodecode_user.user_id)
|
|
|
|
|
|
# TODO: Remove this when fixed in attach_context_attributes()
|
|
|
c.repo_name = get_repo_slug(request) # can be empty
|
|
|
|
|
|
self.cut_off_limit_diff = safe_int(config.get('cut_off_limit_diff'))
|
|
|
self.cut_off_limit_file = safe_int(config.get('cut_off_limit_file'))
|
|
|
self.sa = meta.Session
|
|
|
self.scm_model = ScmModel(self.sa)
|
|
|
|
|
|
# set user language
|
|
|
user_lang = getattr(c.pyramid_request, '_LOCALE_', None)
|
|
|
if user_lang:
|
|
|
translation.set_lang(user_lang)
|
|
|
log.debug('set language to %s for user %s',
|
|
|
user_lang, self._rhodecode_user)
|
|
|
|
|
|
def _dispatch_redirect(self, with_url, environ, start_response):
|
|
|
resp = HTTPFound(with_url)
|
|
|
environ['SCRIPT_NAME'] = '' # handle prefix middleware
|
|
|
environ['PATH_INFO'] = with_url
|
|
|
return resp(environ, start_response)
|
|
|
|
|
|
def __call__(self, environ, start_response):
|
|
|
"""Invoke the Controller"""
|
|
|
# WSGIController.__call__ dispatches to the Controller method
|
|
|
# the request is routed to. This routing information is
|
|
|
# available in environ['pylons.routes_dict']
|
|
|
from rhodecode.lib import helpers as h
|
|
|
|
|
|
# Provide the Pylons context to Pyramid's debugtoolbar if it asks
|
|
|
if environ.get('debugtoolbar.wants_pylons_context', False):
|
|
|
environ['debugtoolbar.pylons_context'] = c._current_obj()
|
|
|
|
|
|
_route_name = '.'.join([environ['pylons.routes_dict']['controller'],
|
|
|
environ['pylons.routes_dict']['action']])
|
|
|
|
|
|
self.rc_config = SettingsModel().get_all_settings(cache=True)
|
|
|
self.ip_addr = get_ip_addr(environ)
|
|
|
|
|
|
# The rhodecode auth user is looked up and passed through the
|
|
|
# environ by the pylons compatibility tween in pyramid.
|
|
|
# So we can just grab it from there.
|
|
|
auth_user = environ['rc_auth_user']
|
|
|
|
|
|
# set globals for auth user
|
|
|
request.user = auth_user
|
|
|
self._rhodecode_user = auth_user
|
|
|
|
|
|
log.info('IP: %s User: %s accessed %s [%s]' % (
|
|
|
self.ip_addr, auth_user, safe_unicode(get_access_path(environ)),
|
|
|
_route_name)
|
|
|
)
|
|
|
|
|
|
user_obj = auth_user.get_instance()
|
|
|
if user_obj and user_obj.user_data.get('force_password_change'):
|
|
|
h.flash('You are required to change your password', 'warning',
|
|
|
ignore_duplicate=True)
|
|
|
return self._dispatch_redirect(
|
|
|
url('my_account_password'), environ, start_response)
|
|
|
|
|
|
return WSGIController.__call__(self, environ, start_response)
|
|
|
|
|
|
|
|
|
def h_filter(s):
|
|
|
"""
|
|
|
Custom filter for Mako templates. Mako by standard uses `markupsafe.escape`
|
|
|
we wrap this with additional functionality that converts None to empty
|
|
|
strings
|
|
|
"""
|
|
|
if s is None:
|
|
|
return markupsafe.Markup()
|
|
|
return markupsafe.escape(s)
|
|
|
|
|
|
|
|
|
class BaseRepoController(BaseController):
|
|
|
"""
|
|
|
Base class for controllers responsible for loading all needed data for
|
|
|
repository loaded items are
|
|
|
|
|
|
c.rhodecode_repo: instance of scm repository
|
|
|
c.rhodecode_db_repo: instance of db
|
|
|
c.repository_requirements_missing: shows that repository specific data
|
|
|
could not be displayed due to the missing requirements
|
|
|
c.repository_pull_requests: show number of open pull requests
|
|
|
"""
|
|
|
|
|
|
def __before__(self):
|
|
|
super(BaseRepoController, self).__before__()
|
|
|
if c.repo_name: # extracted from routes
|
|
|
db_repo = Repository.get_by_repo_name(c.repo_name)
|
|
|
if not db_repo:
|
|
|
return
|
|
|
|
|
|
log.debug(
|
|
|
'Found repository in database %s with state `%s`',
|
|
|
safe_unicode(db_repo), safe_unicode(db_repo.repo_state))
|
|
|
route = getattr(request.environ.get('routes.route'), 'name', '')
|
|
|
|
|
|
# allow to delete repos that are somehow damages in filesystem
|
|
|
if route in ['delete_repo']:
|
|
|
return
|
|
|
|
|
|
if db_repo.repo_state in [Repository.STATE_PENDING]:
|
|
|
if route in ['repo_creating_home']:
|
|
|
return
|
|
|
check_url = url('repo_creating_home', repo_name=c.repo_name)
|
|
|
return redirect(check_url)
|
|
|
|
|
|
self.rhodecode_db_repo = db_repo
|
|
|
|
|
|
missing_requirements = False
|
|
|
try:
|
|
|
self.rhodecode_repo = self.rhodecode_db_repo.scm_instance()
|
|
|
except RepositoryRequirementError as e:
|
|
|
missing_requirements = True
|
|
|
self._handle_missing_requirements(e)
|
|
|
|
|
|
if self.rhodecode_repo is None and not missing_requirements:
|
|
|
log.error('%s this repository is present in database but it '
|
|
|
'cannot be created as an scm instance', c.repo_name)
|
|
|
|
|
|
h.flash(_(
|
|
|
"The repository at %(repo_name)s cannot be located.") %
|
|
|
{'repo_name': c.repo_name},
|
|
|
category='error', ignore_duplicate=True)
|
|
|
redirect(h.route_path('home'))
|
|
|
|
|
|
# update last change according to VCS data
|
|
|
if not missing_requirements:
|
|
|
commit = db_repo.get_commit(
|
|
|
pre_load=["author", "date", "message", "parents"])
|
|
|
db_repo.update_commit_cache(commit)
|
|
|
|
|
|
# Prepare context
|
|
|
c.rhodecode_db_repo = db_repo
|
|
|
c.rhodecode_repo = self.rhodecode_repo
|
|
|
c.repository_requirements_missing = missing_requirements
|
|
|
|
|
|
self._update_global_counters(self.scm_model, db_repo)
|
|
|
|
|
|
def _update_global_counters(self, scm_model, db_repo):
|
|
|
"""
|
|
|
Base variables that are exposed to every page of repository
|
|
|
"""
|
|
|
c.repository_pull_requests = scm_model.get_pull_requests(db_repo)
|
|
|
|
|
|
def _handle_missing_requirements(self, error):
|
|
|
self.rhodecode_repo = None
|
|
|
log.error(
|
|
|
'Requirements are missing for repository %s: %s',
|
|
|
c.repo_name, error.message)
|
|
|
|
|
|
summary_url = h.route_path('repo_summary', repo_name=c.repo_name)
|
|
|
statistics_url = url('edit_repo_statistics', repo_name=c.repo_name)
|
|
|
settings_update_url = url('repo', repo_name=c.repo_name)
|
|
|
path = request.path
|
|
|
should_redirect = (
|
|
|
path not in (summary_url, settings_update_url)
|
|
|
and '/settings' not in path or path == statistics_url
|
|
|
)
|
|
|
if should_redirect:
|
|
|
redirect(summary_url)
|
|
|
|