app/helpers/projects_helper.rb (894 lines of code) (raw):
# frozen_string_literal: true
module ProjectsHelper
include Gitlab::Utils::StrongMemoize
include CompareHelper
include Gitlab::Allowable
def project_incident_management_setting
@project_incident_management_setting ||= @project.incident_management_setting ||
@project.build_incident_management_setting
end
def link_to_project(project)
link_to namespace_project_path(namespace_id: project.namespace, id: project),
title: h(project.name),
class: 'gl-link' do
title = content_tag(:span, project.name, class: 'project-name')
if project.namespace
namespace = content_tag(:span, "#{project.namespace.human_name} / ", class: 'namespace-name')
title = namespace + title
end
title
end
end
def link_to_member_avatar(author, opts = {})
default_opts = { size: 16 }
opts = default_opts.merge(opts)
classes = %W[avatar avatar-inline s#{opts[:size]}]
classes << opts[:avatar_class] if opts[:avatar_class]
avatar = avatar_icon_for_user(author, opts[:size])
image_tag(avatar, width: opts[:size], class: classes, alt: '')
end
def author_content_tag(author, opts = {})
default_opts = { author_class: 'author', tooltip: false, by_username: false }
opts = default_opts.merge(opts)
has_tooltip = !opts[:by_username] && opts[:tooltip]
username = opts[:by_username] ? author.to_reference : author.name
name_tag_options = { class: [opts[:author_class]] }
if has_tooltip
name_tag_options[:title] = author.to_reference
name_tag_options[:data] = { placement: 'top' }
name_tag_options[:class] << 'has-tooltip'
end
# NOTE: ActionView::Helpers::TagHelper#content_tag HTML escapes username
content_tag(:span, username, name_tag_options)
end
def link_to_member(author, opts = {}, &block)
default_opts = { avatar: true, name: true, title: ":name" }
opts = default_opts.merge(opts)
return "(deleted)" unless author
data_attrs = {
user_id: author.id,
username: author.username,
name: author.name,
testid: "author-link"
}
inject_classes = ["author-link gl-text-link", opts[:extra_class]]
if opts[:name]
inject_classes.concat(["js-user-link", opts[:mobile_classes]])
else
inject_classes.append("has-tooltip")
end
inject_classes = inject_classes.compact.join(" ")
author_html = []
# Build avatar image tag
author_html << link_to_member_avatar(author, opts) if opts[:avatar]
# Build name span tag
author_html << author_content_tag(author, opts) if opts[:name]
author_html << capture(&block) if block
author_html = author_html.join.html_safe
if opts[:name]
link_to(author_html, user_path(author), class: inject_classes, data: data_attrs).html_safe
else
title = opts[:title].sub(":name", sanitize(author.name))
link_to(
author_html,
user_path(author),
class: inject_classes,
title: title,
data: { container: 'body' }
).html_safe
end
end
def push_project_breadcrumbs(project)
if project.group
push_group_breadcrumbs(project.group)
else
owner = project.namespace.owner
name = sanitize(owner.name, tags: [])
url = user_path(owner)
push_to_schema_breadcrumb(name, url)
end
push_to_schema_breadcrumb(simple_sanitize(project.name), project_path(project), project.try(:avatar_url))
end
def remove_project_message(project)
if project.delayed_deletion_ready?
format(
_("Deleting a project places it into a read-only state until %{date}, " \
"at which point the project will be permanently deleted. Are you ABSOLUTELY sure?"),
date: permanent_deletion_date_formatted(Date.current)
)
else
format(
_("You are going to delete %{project_full_name}. Deleted projects " \
"CANNOT be restored! Are you ABSOLUTELY sure?"),
project_full_name: project.full_name
)
end
end
def link_to_namespace_change_doc
link_to _('project\'s path'),
help_page_path('user/group/manage.md', anchor: 'change-a-groups-path'),
target: '_blank',
rel: 'noopener'
end
def link_to_data_loss_doc
link_to _('data loss'), help_page_path('user/project/repository/_index.md', anchor: 'repository-path-changes'),
target: '_blank', rel: 'noopener'
end
def transfer_project_message(project)
_("You are about to transfer %{code_start}%{project_full_name}%{code_end} to another namespace. This action " \
"changes the %{link_to_namespace_change_doc} and can lead to %{link_to_data_loss_doc}.") % {
project_full_name: project.full_name,
code_start: '<code>',
code_end: '</code>',
link_to_namespace_change_doc: link_to_namespace_change_doc,
link_to_data_loss_doc: link_to_data_loss_doc
}
end
def transfer_project_confirm_button
_("Transfer project")
end
def remove_fork_project_description_message(project)
source = visible_fork_source(project)
if source
msg = _('This will remove the fork relationship between this project and %{fork_source}.') % {
fork_source: link_to(source.full_name, project_path(source))
}
msg.html_safe
else
_('This will remove the fork relationship between this project and other projects in the fork network.')
end
end
def vue_fork_divergence_data(project, ref)
source_project = visible_fork_source(project)
return {} unless source_project
source_default_branch = source_project.default_branch
merge_request =
MergeRequest.opened
.from_project(project).of_projects(source_project.id).from_source_branches(ref).first
{
project_path: project.full_path,
selected_branch: ref,
source_name: source_project.full_name,
source_path: project_path(source_project),
source_default_branch: source_default_branch,
can_sync_branch: can_sync_branch?(project, ref).to_s,
ahead_compare_path: project_compare_path(
project, from: source_default_branch, to: ref, from_project_id: source_project.id
),
create_mr_path: create_merge_request_path(project, source_project, ref, merge_request),
view_mr_path: merge_request && project_merge_request_path(source_project, merge_request),
behind_compare_path: project_compare_path(
source_project, from: ref, to: source_default_branch, from_project_id: project.id
)
}
end
def remove_fork_project_warning_message(project)
_("You are going to remove the fork relationship from %{project_full_name}. Are you ABSOLUTELY sure?") % {
project_full_name: project.full_name
}
end
def remove_fork_project_confirm_json(project, remove_form_id)
{
remove_form_id: remove_form_id,
button_text: _('Remove fork relationship'),
confirm_danger_message: remove_fork_project_warning_message(project),
phrase: @project.path
}
end
def visible_fork_source(project)
project.fork_source if project.fork_source && can?(current_user, :read_project, project.fork_source)
end
def can_change_visibility_level?(project, current_user)
can?(current_user, :change_visibility_level, project)
end
def can_disable_emails?(project, current_user)
return false if project.group&.emails_disabled?
can?(current_user, :set_emails_disabled, project)
end
def can_set_diff_preview_in_email?(project, current_user)
return false if project.group&.show_diff_preview_in_email?.equal?(false)
can?(current_user, :set_show_diff_preview_in_email, project)
end
def last_push_event
current_user&.recent_push(@project)
end
def link_to_autodeploy_doc
link_to _('About auto deploy'),
help_page_path('topics/autodevops/stages.md', anchor: 'auto-deploy'),
target: '_blank',
rel: 'noopener'
end
def autodeploy_flash_notice(branch_name)
ERB::Util.html_escape(
_("Branch %{branch_name} was created. To set up auto deploy, choose a GitLab CI " \
"Yaml template and commit your changes. %{link_to_autodeploy_doc}")
) % {
branch_name: tag.strong(truncate(sanitize(branch_name))),
link_to_autodeploy_doc: link_to_autodeploy_doc
}
end
def load_pipeline_status(projects)
Gitlab::Cache::Ci::ProjectPipelineStatus
.load_in_batch_for_projects(projects)
end
def load_catalog_resources(projects)
ActiveRecord::Associations::Preloader.new(records: projects, associations: :catalog_resource).call
end
def last_pipeline_from_status_cache(project)
if Feature.enabled?(:last_pipeline_from_pipeline_status, project)
pipeline_status = project.pipeline_status
return unless pipeline_status.has_status?
# commits have far more attributes than id, but last_pipeline only requires sha
return Commit.from_hash({ id: pipeline_status.sha }, project).last_pipeline
end
project.last_pipeline
end
def show_no_ssh_key_message?(project)
Gitlab::CurrentSettings.user_show_add_ssh_key_message? &&
cookies[:hide_no_ssh_message].blank? &&
!current_user.hide_no_ssh_key &&
current_user.require_ssh_key?
end
def show_invalid_gpg_key_message?(project)
return false unless project.beyond_identity_integration&.active?
return false if current_user.gpg_keys.externally_valid.exists?
true
end
def show_no_password_message?
cookies[:hide_no_password_message].blank? && !current_user.hide_no_password &&
current_user.require_extra_setup_for_git_auth?
end
def show_auto_devops_implicitly_enabled_banner?(project, user)
return false unless user_can_see_auto_devops_implicitly_enabled_banner?(project, user)
cookies["hide_auto_devops_implicitly_enabled_banner_#{project.id}".to_sym].blank?
end
def show_mobile_devops_project_promo?(project)
return false unless (project.project_setting.target_platforms & ::ProjectSetting::ALLOWED_TARGET_PLATFORMS).any?
cookies["hide_mobile_devops_promo_#{project.id}".to_sym].blank?
end
def no_password_message
set_password_link_start = '<a href="%{url}">'.html_safe % { url: edit_user_settings_password_path }
set_up_pat_link_start = '<a href="%{url}">'.html_safe % { url: user_settings_personal_access_tokens_path }
message = if current_user.require_password_creation_for_git?
_(
'Your account is authenticated with SSO or SAML. To push and pull over %{protocol} ' \
'with Git using this account, you must %{set_password_link_start}set a password%{link_end} ' \
'or %{set_up_pat_link_start}set up a personal access token%{link_end} to use instead of a password.'
)
else
_(
'Your account is authenticated with SSO or SAML. To push and pull over %{protocol} with Git using ' \
'this account, you must %{set_up_pat_link_start}set up a personal access token%{link_end} to use ' \
'instead of a password.'
)
end
ERB::Util.html_escape(message) % {
protocol: gitlab_config.protocol.upcase,
set_password_link_start: set_password_link_start,
set_up_pat_link_start: set_up_pat_link_start,
link_end: '</a>'.html_safe
}
end
# Returns true if any projects are present.
#
# If the relation has a LIMIT applied we'll cast the relation to an Array
# since repeated any? checks would otherwise result in multiple COUNT queries
# being executed.
#
# If no limit is applied we'll just issue a COUNT since the result set could
# be too large to load into memory.
def any_projects?(projects)
return projects.any? if projects.is_a?(Array)
if projects.limit_value
projects.to_a.any?
else
projects.except(:offset).any?
end
end
def show_projects?(projects, params)
!!(
params[:personal] ||
params[:name] ||
params[:language] ||
params[:archived] == 'only' ||
any_projects?(projects)
)
end
def push_to_create_project_command(user = current_user)
repository_url =
if Gitlab::CurrentSettings.current_application_settings.enabled_git_access_protocol == 'http'
user_url(user)
else
Gitlab.config.gitlab_shell.ssh_path_prefix + user.username
end
"git push --set-upstream #{repository_url}/$(git rev-parse --show-toplevel | xargs basename).git " \
"$(git rev-parse --abbrev-ref HEAD)"
end
def show_xcode_link?(project = @project)
browser.platform.mac? && project.repository.xcode_project?
end
def xcode_uri_to_repo(project = @project)
"xcode://clone?repo=#{CGI.escape(default_url_to_repo(project))}"
end
def explore_projects_tab?
current_page?(explore_projects_path) ||
current_page?(trending_explore_projects_path) ||
current_page?(starred_explore_projects_path)
end
def show_count?(disabled: false, compact_mode: false)
!disabled && !compact_mode
end
def error_tracking_setting_project_json
setting = @project.error_tracking_setting
return if setting.blank? || setting.project_slug.blank? ||
setting.organization_slug.blank?
{
sentry_project_id: setting.sentry_project_id,
name: setting.project_name,
organization_name: setting.organization_name,
organization_slug: setting.organization_slug,
slug: setting.project_slug
}.to_json
end
def directory?
@path.present?
end
def external_classification_label_help_message
default_label = ::Gitlab::CurrentSettings.current_application_settings
.external_authorization_service_default_label
s_(
"ExternalAuthorizationService|When no classification label is set the "\
"default label `%{default_label}` will be used."
) % { default_label: default_label }
end
def can_admin_project_member?(project)
Ability.allowed?(current_user, :admin_project_member, project) && !membership_locked?
end
def project_can_be_shared?
!membership_locked? || @project.allowed_to_share_with_group?
end
def membership_locked?
false
end
def project_license_name(project)
key = "project:#{project.id}:license_name"
Gitlab::SafeRequestStore.fetch(key) { project.repository.license&.name }
rescue GRPC::Unavailable, GRPC::DeadlineExceeded, Gitlab::Git::CommandError => e
Gitlab::ErrorTracking.track_exception(e)
Gitlab::SafeRequestStore[key] = nil
nil
end
def show_terraform_banner?(project)
Feature.enabled?(:show_terraform_banner, type: :ops) &&
project.repository_languages.with_programming_language('HCL').exists? && project.terraform_states.empty?
end
def show_lfs_misconfiguration_banner?(project)
return false unless project.repository && project.lfs_enabled?
Rails.cache.fetch("show_lfs_misconfiguration_banner_#{project.id}", expires_in: 5.minutes) do
project.lfs_objects_projects.project_repository_type.any? && !project.repository.has_gitattributes?
end
end
def project_permissions_panel_data(project)
{
packagesAvailable: ::Gitlab.config.packages.enabled,
packagesHelpPath: help_page_path('user/packages/_index.md'),
currentSettings: project_permissions_settings(project),
canAddCatalogResource: can_add_catalog_resource?(project),
canSetDiffPreviewInEmail: can_set_diff_preview_in_email?(project, current_user),
canChangeVisibilityLevel: can_change_visibility_level?(project, current_user),
canDisableEmails: can_disable_emails?(project, current_user),
allowedVisibilityOptions: project_allowed_visibility_levels(project),
visibilityHelpPath: help_page_path('user/public_access.md'),
registryAvailable: Gitlab.config.registry.enabled,
registryHelpPath: help_page_path('user/packages/container_registry/_index.md'),
lfsAvailable: Gitlab.config.lfs.enabled,
lfsHelpPath: help_page_path('topics/git/lfs/_index.md'),
lfsObjectsExist: project.lfs_objects.exists?,
lfsObjectsRemovalHelpPath: help_page_path('topics/git/lfs/_index.md',
anchor: 'delete-a-git-lfs-file-from-repository-history'),
pagesAvailable: Gitlab.config.pages.enabled,
pagesAccessControlEnabled: Gitlab.config.pages.access_control,
pagesAccessControlForced: project.pages_access_control_forced_by_ancestor?,
pagesHelpPath: help_page_path('user/project/pages/pages_access_control.md'),
issuesHelpPath: help_page_path('user/project/issues/_index.md'),
membersPagePath: project_project_members_path(project),
environmentsHelpPath: help_page_path('ci/environments/_index.md'),
featureFlagsHelpPath: help_page_path('operations/feature_flags.md'),
releasesHelpPath: help_page_path('user/project/releases/_index.md'),
infrastructureHelpPath: help_page_path('user/infrastructure/_index.md')
}
end
def project_classes(project)
return "project-highlight-puc" if project.warn_about_potentially_unwanted_characters?
""
end
# Returns the confirm phrase the user needs to type in order to delete the project
#
# Thus the phrase should include the namespace to make it very clear to the
# user which project is subject to deletion.
# Relevant issue: https://gitlab.com/gitlab-org/gitlab/-/issues/343591
def delete_confirm_phrase(project)
project.path_with_namespace
end
def able_to_see_issues?(project, user)
project.issues_enabled? && can?(user, :read_issue, project)
end
def able_to_see_merge_requests?(project, user)
project.merge_requests_enabled? && can?(user, :read_merge_request, project)
end
def able_to_see_forks_count?(project, user)
project.forking_enabled? && can?(user, :read_code, project)
end
def fork_button_data_attributes(project)
return unless current_user
return if project.empty_repo?
if current_user.already_forked?(project) && !current_user.has_forkable_groups?
user_fork_url = namespace_project_path(current_user, current_user.fork_of(project))
end
{
can_fork_project: can?(current_user, :fork_project, project).to_s,
can_read_code: can?(current_user, :read_code, project).to_s,
forks_count: project.forks_count,
new_fork_url: new_project_fork_path(project),
project_forks_url: project_forks_path(project),
project_full_path: project.full_path,
user_fork_url: user_fork_url
}
end
def star_count_data_attributes(project)
starred = current_user ? current_user.starred?(project) : false
{
project_id: project.id,
sign_in_path: new_session_path(:user, redirect_to_referer: 'yes'),
star_count: project.star_count,
starred: starred.to_s,
starrers_path: project_starrers_path(project)
}
end
def notification_data_attributes(project)
return unless current_user
notification_setting = current_user.notification_settings_for(project)
dropdown_items = notification_dropdown_items(notification_setting).to_json if notification_setting
notification_level = notification_setting.level if notification_setting
{
emails_disabled: project.emails_disabled?.to_s,
notification_dropdown_items: dropdown_items,
notification_help_page_path: help_page_path('user/profile/notifications.md'),
notification_level: notification_level
}
end
def home_panel_data_attributes
project = @project.is_a?(ProjectPresenter) ? @project.project : @project
dropdown_attributes = groups_projects_more_actions_dropdown_data(project) || {}
fork_button_attributes = fork_button_data_attributes(project) || {}
notification_attributes = notification_data_attributes(project) || {}
star_count_attributes = star_count_data_attributes(project)
admin_path = admin_project_path(project) if current_user&.can_admin_all_resources?
cicd_catalog_path = explore_catalog_path(project.catalog_resource) if project.catalog_resource
{
admin_path: admin_path,
can_read_project: can?(current_user, :read_project, project).to_s,
cicd_catalog_path: cicd_catalog_path,
is_project_archived: project.archived.to_s,
is_project_empty: project.empty_repo?.to_s,
is_project_marked_for_deletion: project.marked_for_deletion?.to_s,
project_avatar: project.avatar_url,
project_name: project.name,
project_id: project.id,
project_visibility_level: Gitlab::VisibilityLevel.string_level(project.visibility_level)
}.merge(
dropdown_attributes,
fork_button_attributes,
notification_attributes,
star_count_attributes
)
end
def import_from_bitbucket_message
configure_oauth_import_message('Bitbucket', help_page_path("integration/bitbucket.md"))
end
def archiving_available?(project)
return false unless project
project.persisted? && !project.marked_for_deletion? && can?(current_user, :archive_project, project)
end
def show_archived_project_banner?(project)
return false unless project
project.persisted? && project.archived?
end
def show_inactive_project_deletion_banner?(project)
return false unless project
return false unless delete_inactive_projects?
project.persisted? && project.inactive?
end
def inactive_project_deletion_date(project)
Gitlab::InactiveProjectsDeletionWarningTracker.new(project.id).scheduled_deletion_date
end
def show_clusters_alert?(project)
Gitlab.com? && can_admin_associated_clusters?(project)
end
def clusters_deprecation_alert_message
if has_active_license?
s_(
'ClusterIntegration|The certificate-based Kubernetes integration is deprecated and ' \
'will be removed in the future. You should %{linkStart}migrate to the GitLab agent ' \
'for Kubernetes%{linkEnd}. For more information, see the %{deprecationLinkStart}' \
'deprecation epic%{deprecationLinkEnd}, or contact GitLab support.'
)
else
s_(
'ClusterIntegration|The certificate-based Kubernetes integration is deprecated and ' \
'will be removed in the future. You should %{linkStart}migrate to the GitLab agent ' \
'for Kubernetes%{linkEnd}. For more information, see the %{deprecationLinkStart}' \
'deprecation epic%{deprecationLinkEnd}.'
)
end
end
def project_coverage_chart_data_attributes(daily_coverage_options, ref)
{
graph_endpoint: "#{daily_coverage_options[:graph_api_path]}?#{daily_coverage_options[:base_params].to_query}",
graph_start_date: daily_coverage_options[:base_params][:start_date].strftime('%b %d'),
graph_end_date: daily_coverage_options[:base_params][:end_date].strftime('%b %d'),
graph_ref: ref.to_s,
graph_csv_path: "#{daily_coverage_options[:download_path]}?#{daily_coverage_options[:base_params].to_query}"
}
end
def localized_project_human_access(access)
localized_access_names[access] || Gitlab::Access.human_access(access)
end
def project_delete_delayed_button_data(project, button_text = nil)
project_delete_button_shared_data(project, button_text).merge({
restore_help_path: help_page_path('user/project/working_with_projects.md', anchor: 'restore-a-project'),
delayed_deletion_date: permanent_deletion_date_formatted,
form_path: project_path(project)
})
end
def badge_count(number)
format_cached_count(1000, number)
end
def remote_mirror_setting_enabled?
false
end
def http_clone_url_to_repo(project)
project.http_url_to_repo
end
def ssh_clone_url_to_repo(project)
project.ssh_url_to_repo
end
def can_view_branch_rules?
can?(current_user, :maintainer_access, @project)
end
def can_push_code?
current_user&.can?(:push_code, @project)
end
def can_admin_associated_clusters?(project)
can_admin_project_clusters?(project) || can_admin_group_clusters?(project)
end
def branch_rules_path
project_settings_repository_path(@project, anchor: 'js-branch-rules')
end
def visibility_level_content(project, css_class: nil, icon_css_class: nil, icon_variant: nil)
title = visibility_icon_description(project)
container_class = [
'has-tooltip gl-border-0 gl-bg-transparent gl-p-0 gl-leading-0 gl-text-inherit',
css_class
].compact.join(' ')
data = { container: 'body', placement: 'top' }
content_tag(
:button,
class: container_class,
data: data,
title: title,
type: 'button',
aria: { label: title }) do
visibility_level_icon(project.visibility_level, options: { class: icon_css_class, variant: icon_variant })
end
end
def hidden_issue_icon(issue)
return unless issue_hidden?(issue)
hidden_resource_icon(issue)
end
def issue_css_classes(issue)
classes = ["issue"]
classes << "closed" if issue.closed?
classes << "gl-cursor-grab" if @sort == 'relative_position'
classes.join(' ')
end
def issue_manual_ordering_class
return unless @sort == 'relative_position' && !issue_repositioning_disabled?
'manual-ordering'
end
def projects_filtered_search_and_sort_app_data
{
initial_sort: project_list_sort_by,
programming_languages: programming_languages,
paths_to_exclude_sort_on: [starred_explore_projects_path, explore_root_path]
}.to_json
end
def dashboard_projects_app_data
{
initial_sort: project_list_sort_by,
programming_languages: programming_languages
}.to_json
end
def show_dashboard_projects_welcome_page?
dashboard_projects_landing_paths = [
root_path,
root_dashboard_path,
dashboard_projects_path,
contributed_dashboard_projects_path
]
dashboard_projects_landing_paths.include?(request.path) && !current_user.authorized_projects.exists?
end
def delete_delayed_project_message(project)
safe_format(
_("This action will place this project, including all its resources, in a pending deletion state " \
"for %{deletion_adjourned_period} days, and delete it permanently on %{date}."),
deletion_adjourned_period: project.deletion_adjourned_period,
date: tag.strong(permanent_deletion_date_formatted)
)
end
def delete_immediately_project_scheduled_for_deletion_message(project)
safe_format(
_('This project is scheduled for deletion on %{date}. ' \
'This action will permanently delete this project, ' \
'including all its resources, %{strongOpen}immediately%{strongClose}. This action cannot be undone.'),
date: tag.strong(permanent_deletion_date_formatted(project)),
strongOpen: '<strong>'.html_safe,
strongClose: '</strong>'.html_safe
)
end
def project_delete_immediately_button_data(project, button_text = nil)
project_delete_button_shared_data(project, button_text).merge({
form_path: project_path(project, permanently_delete: true)
})
end
def project_pages_domain_choices
pages_url = build_pages_url(@project)
blank_option = [[s_('GitLabPages|Don’t enforce a primary domain'), '']]
gitlab_default_option = [[pages_url, pages_url]]
domain_options = @project.pages_domains.map { |domain| [domain.url, domain.url] } || []
options_for_select(
blank_option + domain_options + gitlab_default_option,
selected: @project.project_setting.pages_primary_domain
)
end
private
def project_delete_button_shared_data(project, button_text = nil)
merge_requests_count = Projects::AllMergeRequestsCountService.new(project).count
issues_count = Projects::AllIssuesCountService.new(project).count
forks_count = Projects::ForksCountService.new(project).count
{
confirm_phrase: delete_confirm_phrase(project),
name_with_namespace: project.name_with_namespace,
is_fork: project.forked? ? 'true' : 'false',
issues_count: number_with_delimiter(issues_count),
merge_requests_count: number_with_delimiter(merge_requests_count),
forks_count: number_with_delimiter(forks_count),
stars_count: number_with_delimiter(project.star_count),
button_text: button_text.presence || _('Delete project')
}
end
def can_admin_project_clusters?(project)
project.clusters.any? && can?(current_user, :admin_cluster, project)
end
def can_admin_group_clusters?(project)
project.group && project.group.clusters.any? && can?(current_user, :admin_cluster, project.group)
end
def create_merge_request_path(project, source_project, ref, merge_request)
return if merge_request.present?
return unless can?(current_user, :create_merge_request_from, project)
return unless can?(current_user, :create_merge_request_in, source_project)
create_mr_path(
from: ref,
source_project: project,
to: source_project.default_branch,
target_project: source_project)
end
def can_sync_branch?(project, ref)
return false unless project.repository.branch_exists?(ref)
::Gitlab::UserAccess.new(current_user, container: project).can_push_to_branch?(ref)
end
def localized_access_names
{
Gitlab::Access::NO_ACCESS => _('No access'),
Gitlab::Access::MINIMAL_ACCESS => _("Minimal Access"),
Gitlab::Access::GUEST => _('Guest'),
Gitlab::Access::PLANNER => _('Planner'),
Gitlab::Access::REPORTER => _('Reporter'),
Gitlab::Access::DEVELOPER => _('Developer'),
Gitlab::Access::MAINTAINER => _('Maintainer'),
Gitlab::Access::OWNER => _('Owner')
}
end
def configure_oauth_import_message(provider, help_url)
str = if current_user.can_admin_all_resources?
'ImportProjects|To enable importing projects from %{provider}, as administrator you need to ' \
'configure %{link_start}OAuth integration%{link_end}'
else
'ImportProjects|To enable importing projects from %{provider}, ask your GitLab administrator to ' \
'configure %{link_start}OAuth integration%{link_end}'
end
link_start = '<a href="%{url}" target="_blank" rel="noopener noreferrer">'.html_safe % { url: help_url }
safe_format(s_(str), provider: provider, link_start: link_start, link_end: '</a>'.html_safe)
end
def project_lfs_status(project)
if project.lfs_enabled?
content_tag(:span, class: 'lfs-enabled') do
s_('LFSStatus|Enabled')
end
else
content_tag(:span, class: 'lfs-disabled') do
s_('LFSStatus|Disabled')
end
end
end
def git_user_name
if current_user
current_user.name.gsub('"', '\"')
else
_("Your name")
end
end
def git_user_email
if current_user
current_user.commit_email_or_default
else
"your@email.com"
end
end
def default_url_to_repo(project = @project)
case default_clone_protocol
when 'ssh'
project.ssh_url_to_repo
else
project.http_url_to_repo
end
end
def default_clone_label
_("Copy %{protocol} clone URL") % { protocol: default_clone_protocol.upcase }
end
def default_clone_protocol
if allowed_protocols_present?
enabled_protocol
else
extra_default_clone_protocol
end
end
def extra_default_clone_protocol
if !current_user || current_user.require_ssh_key?
gitlab_config.protocol
else
'ssh'
end
end
def current_ref
@ref || @repository.try(:root_ref)
end
def project_child_container_class(view_path)
view_path == "projects/issues" ? "gl-mt-3" : "project-show-#{view_path}"
end
def project_issues(project)
IssuesFinder.new(current_user, project_id: project.id).execute
end
def project_merge_requests(project)
MergeRequestsFinder.new(current_user, project_id: project.id).execute
end
def restricted_levels
return [] if current_user.can_admin_all_resources?
Gitlab::CurrentSettings.restricted_visibility_levels || []
end
def project_permissions_settings(project)
feature = project.project_feature
{
packagesEnabled: !!project.packages_enabled,
packageRegistryAccessLevel: feature.package_registry_access_level,
packageRegistryAllowAnyoneToPullOption: ::Gitlab::CurrentSettings.package_registry_allow_anyone_to_pull_option,
visibilityLevel: project.visibility_level,
requestAccessEnabled: !!project.request_access_enabled,
issuesAccessLevel: feature.issues_access_level,
repositoryAccessLevel: feature.repository_access_level,
forkingAccessLevel: feature.forking_access_level,
mergeRequestsAccessLevel: feature.merge_requests_access_level,
buildsAccessLevel: feature.builds_access_level,
wikiAccessLevel: feature.wiki_access_level,
snippetsAccessLevel: feature.snippets_access_level,
pagesAccessLevel: feature.pages_access_level,
analyticsAccessLevel: feature.analytics_access_level,
containerRegistryEnabled: !!project.container_registry_enabled,
lfsEnabled: !!project.lfs_enabled,
emailsEnabled: project.emails_enabled?,
extendedPratExpiryWebhooksExecute: project.extended_prat_expiry_webhooks_execute?,
showDiffPreviewInEmail: project.show_diff_preview_in_email?,
monitorAccessLevel: feature.monitor_access_level,
showDefaultAwardEmojis: project.show_default_award_emojis?,
warnAboutPotentiallyUnwantedCharacters: project.warn_about_potentially_unwanted_characters?,
enforceAuthChecksOnUploads: project.enforce_auth_checks_on_uploads?,
securityAndComplianceAccessLevel: project.security_and_compliance_access_level,
containerRegistryAccessLevel: feature.container_registry_access_level,
environmentsAccessLevel: feature.environments_access_level,
featureFlagsAccessLevel: feature.feature_flags_access_level,
releasesAccessLevel: feature.releases_access_level,
infrastructureAccessLevel: feature.infrastructure_access_level,
modelExperimentsAccessLevel: feature.model_experiments_access_level,
modelRegistryAccessLevel: feature.model_registry_access_level
}
end
def project_allowed_visibility_levels(project)
Gitlab::VisibilityLevel.values.select do |level|
project.visibility_level_allowed?(level) && restricted_levels.exclude?(level)
end
end
def can_show_last_commit_in_list?(project)
can?(current_user, :read_cross_project) &&
can?(current_user, :read_commit_status, project) &&
project.commit
end
def pages_https_only_disabled?
!@project.pages_domains.all?(&:https?)
end
def pages_https_only_title
return unless pages_https_only_disabled?
"You must enable HTTPS for all your domains first"
end
def filter_starrer_path(options = {})
options = params.slice(:sort).merge(options).permit!
"#{request.path}?#{options.to_param}"
end
def sidebar_operations_paths
%w[
environments
clusters
cluster_agents
functions
error_tracking
alert_management
incidents
incident_management
user
gcp
logs
product_analytics
metrics_dashboard
feature_flags
terraform
]
end
def user_can_see_auto_devops_implicitly_enabled_banner?(project, user)
Ability.allowed?(user, :admin_project, project) &&
project.has_auto_devops_implicitly_enabled? &&
project.builds_enabled? &&
!project.has_ci_config_file?
end
def show_visibility_confirm_modal?(project)
project.visibility_level > Gitlab::VisibilityLevel::PRIVATE && project.forks_count > 0
end
def confirm_reduce_visibility_message(project)
strong_start = "<strong>".html_safe
strong_end = "</strong>".html_safe
message = _("You're about to reduce the visibility of the project %{strong_start}%{project_name}%{strong_end}.")
if project.group
message = _(
"You're about to reduce the visibility of the project " \
"%{strong_start}%{project_name}%{strong_end} in %{strong_start}%{group_name}%{strong_end}."
)
end
ERB::Util.html_escape(message) % {
strong_start: strong_start,
strong_end: strong_end,
project_name: project.name,
group_name: project.group ? project.group.name : nil
}
end
def project_permissions_data(project, target_form_id = nil)
data = visibility_confirm_modal_data(project, target_form_id)
cascading_settings_data = project_cascading_namespace_settings_tooltip_data(
:duo_features_enabled,
project,
method(:edit_group_path)
).to_json
data.merge!(
{
cascading_settings_data: cascading_settings_data
}
)
end
def visibility_confirm_modal_data(project, target_form_id = nil)
{
target_form_id: target_form_id,
button_testid: 'reduce-project-visibility-button',
confirm_button_text: _('Reduce project visibility'),
confirm_danger_message: confirm_reduce_visibility_message(project),
phrase: project.full_path,
additional_information: _('Note: current forks will keep their visibility level.'),
html_confirmation_message: true.to_s,
show_visibility_confirm_modal: show_visibility_confirm_modal?(project).to_s
}
end
def delete_inactive_projects?
strong_memoize(:delete_inactive_projects_setting) do
::Gitlab::CurrentSettings.delete_inactive_projects?
end
end
end
ProjectsHelper.prepend_mod_with('ProjectsHelper')