# frozen_string_literal: true class Snippet < ApplicationRecord include Gitlab::VisibilityLevel include Redactable include CacheMarkdownField include Noteable include Participable include Sortable include Awardable include Mentionable include Spammable include Editable include Gitlab::SQL::Pattern include FromUnion include IgnorableColumns include HasRepository extend ::Gitlab::Utils::Override MAX_FILE_COUNT = 1 cache_markdown_field :title, pipeline: :single_line cache_markdown_field :description cache_markdown_field :content redact_field :description # Aliases to make application_helper#edited_time_ago_with_tooltip helper work properly with snippets. # See https://gitlab.com/gitlab-org/gitlab-foss/merge_requests/10392/diffs#note_28719102 alias_attribute :last_edited_at, :updated_at alias_attribute :last_edited_by, :updated_by # If file_name changes, it invalidates content alias_method :default_content_html_invalidator, :content_html_invalidated? def content_html_invalidated? default_content_html_invalidator || file_name_changed? end belongs_to :author, class_name: 'User' belongs_to :project has_many :notes, as: :noteable, dependent: :destroy # rubocop:disable Cop/ActiveRecordDependent has_many :user_mentions, class_name: "SnippetUserMention", dependent: :delete_all # rubocop:disable Cop/ActiveRecordDependent has_one :snippet_repository, inverse_of: :snippet delegate :name, :email, to: :author, prefix: true, allow_nil: true validates :author, presence: true validates :title, presence: true, length: { maximum: 255 } validates :file_name, length: { maximum: 255 } validates :content, presence: true validates :content, length: { maximum: ->(_) { Gitlab::CurrentSettings.snippet_size_limit }, message: -> (_, data) do current_value = ActiveSupport::NumberHelper.number_to_human_size(data[:value].size) max_size = ActiveSupport::NumberHelper.number_to_human_size(Gitlab::CurrentSettings.snippet_size_limit) _("is too long (%{current_value}). The maximum size is %{max_size}.") % { current_value: current_value, max_size: max_size } end }, if: :content_changed? validates :visibility_level, inclusion: { in: Gitlab::VisibilityLevel.values } after_save :store_mentions!, if: :any_mentionable_attributes_changed? # Scopes scope :are_internal, -> { where(visibility_level: Snippet::INTERNAL) } scope :are_private, -> { where(visibility_level: Snippet::PRIVATE) } scope :are_public, -> { public_only } scope :are_secret, -> { public_only.where(secret: true) } scope :fresh, -> { order("created_at DESC") } scope :inc_author, -> { includes(:author) } scope :inc_relations_for_view, -> { includes(author: :status) } attr_mentionable :description participant :author participant :notes_with_associations attr_spammable :title, spam_title: true attr_spammable :content, spam_description: true attr_encrypted :secret_token, key: Settings.attr_encrypted_db_key_base_truncated, mode: :per_attribute_iv, algorithm: 'aes-256-cbc' def self.with_optional_visibility(value = nil) if value where(visibility_level: value) else all end end def self.only_personal_snippets where(project_id: nil) end def self.only_include_projects_visible_to(current_user = nil) levels = Gitlab::VisibilityLevel.levels_for_user(current_user) joins(:project).where('projects.visibility_level IN (?)', levels) end def self.only_include_projects_with_snippets_enabled(include_private: false) column = ProjectFeature.access_level_attribute(:snippets) levels = [ProjectFeature::ENABLED, ProjectFeature::PUBLIC] levels << ProjectFeature::PRIVATE if include_private joins(project: :project_feature) .where(project_features: { column => levels }) end def self.only_include_authorized_projects(current_user) where( 'EXISTS (?)', ProjectAuthorization .select(1) .where('project_id = snippets.project_id') .where(user_id: current_user.id) ) end def self.for_project_with_user(project, user = nil) return none unless project.snippets_visible?(user) if user && project.team.member?(user) project.snippets else project.snippets.public_to_user(user) end end def self.visible_to_or_authored_by(user) query = where(visibility_level: Gitlab::VisibilityLevel.levels_for_user(user)) query.or(where(author_id: user.id)) end def self.reference_prefix '$' end # Pattern used to extract `$123` snippet references from text # # This pattern supports cross-project references. def self.reference_pattern @reference_pattern ||= %r{ (#{Project.reference_pattern})? #{Regexp.escape(reference_prefix)}(?\d+) }x end def self.link_reference_pattern @link_reference_pattern ||= super("snippets", /(?\d+)/) end def self.find_by_id_and_project(id:, project:) Snippet.find_by(id: id, project: project) end def initialize(attributes = {}) # We can't use default_value_for because the database has a default # value of 0 for visibility_level. If someone attempts to create a # private snippet, default_value_for will assume that the # visibility_level hasn't changed and will use the application # setting default, which could be internal or public. # # To fix the problem, we assign the actual snippet default if no # explicit visibility has been initialized. attributes ||= {} unless visibility_attribute_present?(attributes) attributes[:visibility_level] = Gitlab::CurrentSettings.default_snippet_visibility end super end def to_reference(from = nil, full: false) reference = "#{self.class.reference_prefix}#{id}" if project.present? "#{project.to_reference_base(from, full: full)}#{reference}" else reference end end def blob @blob ||= Blob.decorate(SnippetBlob.new(self), self) end def blobs return [] unless repository_exists? repository.ls_files(repository.root_ref).map { |file| Blob.lazy(self, repository.root_ref, file) } end def hook_attrs attributes end def file_name super.to_s end def self.sanitized_file_name(file_name) file_name.gsub(/[^a-zA-Z0-9_\-\.]+/, '') end def visibility_level_field :visibility_level end def embeddable? Ability.allowed?(nil, :read_snippet, self) end def notes_with_associations notes.includes(:author) end def check_for_spam? visibility_level_changed?(to: Snippet::PUBLIC) || (public? && (title_changed? || content_changed?)) end # snippets are the biggest sources of spam override :allow_possible_spam? def allow_possible_spam? false end def spammable_entity_type 'snippet' end def to_ability_name 'snippet' end def valid_secret_token?(token) return false unless token && secret_token ActiveSupport::SecurityUtils.secure_compare(token.to_s, secret_token.to_s) end def as_json(options = {}) options[:except] = Array.wrap(options[:except]) options[:except] << :secret_token super end def repository @repository ||= Repository.new(full_path, self, shard: repository_storage, disk_path: disk_path, repo_type: Gitlab::GlRepository::SNIPPET) end def storage @storage ||= Storage::Hashed.new(self, prefix: Storage::Hashed::SNIPPET_REPOSITORY_PATH_PREFIX) end # This is the full_path used to identify the # the snippet repository. It will be used mostly # for logging purposes. def full_path return unless persisted? @full_path ||= begin components = [] components << project.full_path if project_id? components << '@snippets' components << self.id components.join('/') end end def url_to_repo Gitlab::Shell.url_to_repo(full_path.delete('@')) end def repository_storage snippet_repository&.shard_name || self.class.pick_repository_storage end def create_repository return if repository_exists? && snippet_repository repository.create_if_not_exists track_snippet_repository(repository.storage) end def track_snippet_repository(shard) snippet_repo = snippet_repository || build_snippet_repository snippet_repo.update!(shard_name: shard, disk_path: disk_path) end def can_cache_field?(field) field != :content || MarkupHelper.gitlab_markdown?(file_name) end def hexdigest Digest::SHA256.hexdigest("#{title}#{description}#{created_at}#{updated_at}") end def versioned_enabled_for?(user) ::Feature.enabled?(:version_snippets, user) && repository_exists? end class << self # Searches for snippets with a matching title, description or file name. # # This method uses ILIKE on PostgreSQL and LIKE on MySQL. # # query - The search query as a String. # # Returns an ActiveRecord::Relation. def search(query) fuzzy_search(query, [:title, :description, :file_name]) end # Searches for snippets with matching content. # # This method uses ILIKE on PostgreSQL and LIKE on MySQL. # # query - The search query as a String. # # Returns an ActiveRecord::Relation. def search_code(query) fuzzy_search(query, [:content]) end def parent_class ::Project end end end Snippet.prepend_if_ee('EE::Snippet')