# frozen_string_literal: true module Issues class BaseService < ::IssuableBaseService include IncidentManagement::UsageData def hook_data(issue, action, old_associations: {}) hook_data = issue.to_hook_data(current_user, old_associations: old_associations) hook_data[:object_attributes][:action] = action hook_data end def reopen_service Issues::ReopenService end def close_service Issues::CloseService end NO_REBALANCING_NEEDED = ((RelativePositioning::MIN_POSITION * 0.9999)..(RelativePositioning::MAX_POSITION * 0.9999)).freeze def rebalance_if_needed(issue) return unless issue return if issue.relative_position.nil? return if NO_REBALANCING_NEEDED.cover?(issue.relative_position) gates = [issue.project, issue.project.group].compact return unless gates.any? { |gate| Feature.enabled?(:rebalance_issues, gate) } IssueRebalancingWorker.perform_async(nil, *issue.project.self_or_root_group_ids) end private def filter_params(issue) super params.delete(:issue_type) unless issue_type_allowed?(issue) filter_incident_label(issue) if params[:issue_type] moved_issue = params.delete(:moved_issue) # Setting created_at, updated_at and iid is allowed only for admins and owners or # when moving an issue as we preserve the original issue attributes except id and iid. params.delete(:iid) unless current_user.can?(:set_issue_iid, project) params.delete(:created_at) unless moved_issue || current_user.can?(:set_issue_created_at, project) params.delete(:updated_at) unless moved_issue || current_user.can?(:set_issue_updated_at, project) # Only users with permission to handle error data can add it to issues params.delete(:sentry_issue_attributes) unless current_user.can?(:update_sentry_issue, project) issue.system_note_timestamp = params[:created_at] || params[:updated_at] end def create_assignee_note(issue, old_assignees) SystemNoteService.change_issuable_assignees( issue, issue.project, current_user, old_assignees) end def execute_hooks(issue, action = 'open', old_associations: {}) issue_data = Gitlab::Lazy.new { hook_data(issue, action, old_associations: old_associations) } hooks_scope = issue.confidential? ? :confidential_issue_hooks : :issue_hooks issue.project.execute_hooks(issue_data, hooks_scope) issue.project.execute_integrations(issue_data, hooks_scope) end def update_project_counter_caches?(issue) super || issue.confidential_changed? end def delete_milestone_closed_issue_counter_cache(milestone) return unless milestone Milestones::ClosedIssuesCountService.new(milestone).delete_cache end def delete_milestone_total_issue_counter_cache(milestone) return unless milestone Milestones::IssuesCountService.new(milestone).delete_cache end # @param object [Issue, Project] def issue_type_allowed?(object) can?(current_user, :"create_#{params[:issue_type]}", object) end # @param issue [Issue] def filter_incident_label(issue) return unless add_incident_label?(issue) || remove_incident_label?(issue) label = ::IncidentManagement::CreateIncidentLabelService .new(project, current_user) .execute .payload[:label] # These(add_label_ids, remove_label_ids) are being added ahead of time # to be consumed by #process_label_ids, this allows system notes # to be applied correctly alongside the label updates. if add_incident_label?(issue) params[:add_label_ids] ||= [] params[:add_label_ids] << label.id else params[:remove_label_ids] ||= [] params[:remove_label_ids] << label.id end end # @param issue [Issue] def add_incident_label?(issue) issue.incident? end # @param _issue [Issue, nil] def remove_incident_label?(_issue) false end end end Issues::BaseService.prepend_mod_with('Issues::BaseService')