module Users class DestroyService attr_accessor :current_user def initialize(current_user) @current_user = current_user end def execute(user, options = {}) unless Ability.allowed?(current_user, :destroy_user, user) raise Gitlab::Access::AccessDeniedError, "#{current_user} tried to destroy user #{user}!" end if !options[:delete_solo_owned_groups] && user.solo_owned_groups.present? user.errors[:base] << 'You must transfer ownership or delete groups before you can remove user' return user end user.solo_owned_groups.each do |group| Groups::DestroyService.new(group, current_user).execute end user.personal_projects.each do |project| # Skip repository removal because we remove directory with namespace # that contain all this repositories ::Projects::DestroyService.new(project, current_user, skip_repo: true).async_execute end move_issues_to_ghost_user(user) # Destroy the namespace after destroying the user since certain methods may depend on the namespace existing namespace = user.namespace user_data = user.destroy namespace.really_destroy! user_data end private def move_issues_to_ghost_user(user) # Block the user before moving issues to prevent a data race. # If the user creates an issue after `move_issues_to_ghost_user` # runs and before the user is destroyed, the destroy will fail with # an exception. We block the user so that issues can't be created # after `move_issues_to_ghost_user` runs and before the destroy happens. user.block ghost_user = User.ghost user.issues.update_all(author_id: ghost_user.id) user.reload end end end