mirror of
https://github.com/gitlabhq/gitlabhq.git
synced 2025-07-23 00:45:28 +00:00
207 lines
7.3 KiB
Ruby
207 lines
7.3 KiB
Ruby
# frozen_string_literal: true
|
|
|
|
class NamespaceSetting < ApplicationRecord
|
|
include CascadingNamespaceSettingAttribute
|
|
include Sanitizable
|
|
include ChronicDurationAttribute
|
|
include EachBatch
|
|
include SafelyChangeColumnDefault
|
|
|
|
columns_changing_default :require_dpop_for_manage_api_endpoints
|
|
|
|
ignore_column :token_expiry_notify_inherited, remove_with: '17.9', remove_after: '2025-01-11'
|
|
enum :pipeline_variables_default_role, ProjectCiCdSetting::PIPELINE_VARIABLES_OVERRIDE_ROLES, prefix: true
|
|
|
|
ignore_column :third_party_ai_features_enabled, remove_with: '16.11', remove_after: '2024-04-18'
|
|
ignore_column :code_suggestions, remove_with: '17.8', remove_after: '2024-05-16'
|
|
ignore_column :job_token_policies_enabled, remove_with: '18.5', remove_after: '2025-09-13'
|
|
|
|
cascading_attr :math_rendering_limits_enabled, :resource_access_token_notify_inherited, :web_based_commit_signing_enabled
|
|
|
|
scope :for_namespaces, ->(namespaces) { where(namespace: namespaces) }
|
|
|
|
scope :with_ancestors_inherited_settings, -> {
|
|
# Get all columns except 'archived' since we're overriding it
|
|
other_columns = column_names.reject { |col| col == 'archived' }.map { |col| "#{table_name}.#{col}" }.join(', ')
|
|
|
|
select(<<-SQL)
|
|
#{other_columns},
|
|
CASE WHEN EXISTS (
|
|
SELECT 1 FROM #{table_name} ns2
|
|
JOIN namespaces n ON n.id = ns2.namespace_id
|
|
WHERE ns2.archived = true
|
|
AND n.id = ANY(
|
|
SELECT unnest(namespaces.traversal_ids)
|
|
FROM namespaces
|
|
WHERE namespaces.id = #{table_name}.namespace_id
|
|
)
|
|
) THEN true
|
|
ELSE #{table_name}.archived
|
|
END AS archived
|
|
SQL
|
|
.joins(:namespace)
|
|
}
|
|
|
|
belongs_to :namespace, inverse_of: :namespace_settings
|
|
|
|
enum :jobs_to_be_done, { basics: 0, move_repository: 1, code_storage: 2, exploring: 3, ci: 4, other: 5 }, suffix: true
|
|
enum :enabled_git_access_protocol, { all: 0, ssh: 1, http: 2 }, suffix: true
|
|
enum :seat_control, { off: 0, user_cap: 1, block_overages: 2 }, prefix: true
|
|
|
|
attribute :default_branch_protection_defaults, default: -> { {} }
|
|
|
|
validates :enabled_git_access_protocol, inclusion: { in: enabled_git_access_protocols.keys }
|
|
validates :default_branch_protection_defaults, json_schema: { filename: 'default_branch_protection_defaults' }
|
|
validates :default_branch_protection_defaults, bytesize: { maximum: -> { DEFAULT_BRANCH_PROTECTIONS_DEFAULT_MAX_SIZE } }
|
|
validate :validate_enterprise_bypass_expires_at, if: ->(record) {
|
|
record.allow_enterprise_bypass_placeholder_confirmation? && (record.new_record? || record.will_save_change_to_enterprise_bypass_expires_at?)
|
|
}
|
|
sanitizes! :default_branch_name
|
|
|
|
before_validation :set_pipeline_variables_default_role, on: :create
|
|
|
|
before_validation :normalize_default_branch_name
|
|
|
|
after_update :invalidate_namespace_descendants_cache, if: -> { saved_change_to_archived? }
|
|
|
|
chronic_duration_attr :runner_token_expiration_interval_human_readable, :runner_token_expiration_interval
|
|
chronic_duration_attr :subgroup_runner_token_expiration_interval_human_readable, :subgroup_runner_token_expiration_interval
|
|
chronic_duration_attr :project_runner_token_expiration_interval_human_readable, :project_runner_token_expiration_interval
|
|
|
|
NAMESPACE_SETTINGS_PARAMS = %i[
|
|
emails_enabled
|
|
default_branch_name
|
|
resource_access_token_creation_allowed
|
|
prevent_sharing_groups_outside_hierarchy
|
|
new_user_signups_cap
|
|
setup_for_company
|
|
seat_control
|
|
jobs_to_be_done
|
|
runner_token_expiration_interval
|
|
enabled_git_access_protocol
|
|
subgroup_runner_token_expiration_interval
|
|
project_runner_token_expiration_interval
|
|
default_branch_protection_defaults
|
|
math_rendering_limits_enabled
|
|
lock_math_rendering_limits_enabled
|
|
jwt_ci_cd_job_token_enabled
|
|
].freeze
|
|
|
|
# matches the size set in the database constraint
|
|
DEFAULT_BRANCH_PROTECTIONS_DEFAULT_MAX_SIZE = 1.kilobyte
|
|
|
|
self.primary_key = :namespace_id
|
|
|
|
def self.declarative_policy_class
|
|
"Ci::NamespaceSettingPolicy"
|
|
end
|
|
|
|
def self.allowed_namespace_settings_params
|
|
NAMESPACE_SETTINGS_PARAMS
|
|
end
|
|
|
|
def prevent_sharing_groups_outside_hierarchy
|
|
return super if namespace.root?
|
|
|
|
namespace.root_ancestor.prevent_sharing_groups_outside_hierarchy
|
|
end
|
|
|
|
def pipeline_variables_default_role
|
|
# We consider only the root namespace setting to cascade the default value to all projects.
|
|
# By ignoring settings from sub-groups we don't need to deal with complexities from
|
|
# hierarchical settings.
|
|
return namespace.root_ancestor.pipeline_variables_default_role unless namespace.root?
|
|
|
|
super
|
|
end
|
|
|
|
def emails_enabled?
|
|
return emails_enabled unless namespace.has_parent?
|
|
|
|
all_ancestors_have_emails_enabled?
|
|
end
|
|
|
|
# Where this function is used, a returned "nil" is considered a truthy value
|
|
def show_diff_preview_in_email?
|
|
return show_diff_preview_in_email unless namespace.has_parent?
|
|
|
|
all_ancestors_allow_diff_preview_in_email?
|
|
end
|
|
|
|
def runner_registration_enabled?
|
|
runner_registration_enabled && all_ancestors_have_runner_registration_enabled?
|
|
end
|
|
|
|
def all_ancestors_have_runner_registration_enabled?
|
|
return false unless Gitlab::CurrentSettings.valid_runner_registrars.include?('group')
|
|
|
|
return true unless namespace.has_parent?
|
|
|
|
!self.class.where(namespace_id: namespace.ancestors, runner_registration_enabled: false).exists?
|
|
end
|
|
|
|
def allow_runner_registration_token?
|
|
settings = Gitlab::CurrentSettings.current_application_settings
|
|
|
|
settings.allow_runner_registration_token && namespace.root_ancestor.allow_runner_registration_token
|
|
end
|
|
|
|
def jwt_ci_cd_job_token_enabled?
|
|
return true if Feature.enabled?(:ci_job_token_jwt, namespace) && !jwt_ci_cd_job_token_opted_out?
|
|
|
|
super
|
|
end
|
|
|
|
def enterprise_placeholder_bypass_enabled?
|
|
allow_enterprise_bypass_placeholder_confirmation? && enterprise_bypass_expires_at.present? && enterprise_bypass_expires_at.future?
|
|
end
|
|
|
|
private
|
|
|
|
def validate_enterprise_bypass_expires_at
|
|
if enterprise_bypass_expires_at.blank?
|
|
errors.add(:enterprise_bypass_expires_at, 'An expiry date is required when bypass is enabled.')
|
|
return
|
|
end
|
|
|
|
min_date = Date.current.tomorrow.beginning_of_day
|
|
max_date = Date.current.advance(years: 1, days: -1).end_of_day
|
|
|
|
if enterprise_bypass_expires_at < min_date
|
|
errors.add(:enterprise_bypass_expires_at, 'The expiry date must be a future date.')
|
|
elsif enterprise_bypass_expires_at > max_date
|
|
errors.add(:enterprise_bypass_expires_at, 'The expiry date must be within one year from today.')
|
|
end
|
|
end
|
|
|
|
def set_pipeline_variables_default_role
|
|
return if Gitlab::CurrentSettings.pipeline_variables_default_allowed
|
|
|
|
self.pipeline_variables_default_role = ProjectCiCdSetting::NO_ONE_ALLOWED_ROLE
|
|
end
|
|
|
|
def all_ancestors_have_emails_enabled?
|
|
self.class.where(namespace_id: namespace.self_and_ancestors, emails_enabled: false).none?
|
|
end
|
|
|
|
def all_ancestors_allow_diff_preview_in_email?
|
|
!self.class.where(namespace_id: namespace.self_and_ancestors, show_diff_preview_in_email: false).exists?
|
|
end
|
|
|
|
def normalize_default_branch_name
|
|
self.default_branch_name = default_branch_name.presence
|
|
end
|
|
|
|
def subgroup?
|
|
!!namespace&.subgroup?
|
|
end
|
|
|
|
def invalidate_namespace_descendants_cache
|
|
return if namespace.is_a?(Namespaces::UserNamespace)
|
|
|
|
Namespaces::Descendants.expire_recursive_for(namespace)
|
|
end
|
|
end
|
|
|
|
NamespaceSetting.prepend_mod_with('NamespaceSetting')
|