harbor/api/replication_job.go

184 lines
5.3 KiB
Go
Raw Normal View History

2016-06-16 08:57:45 +02:00
/*
Copyright (c) 2016 VMware, Inc. All Rights Reserved.
Licensed under the Apache License, Version 2.0 (the "License");
you may not use this file except in compliance with the License.
You may obtain a copy of the License at
http://www.apache.org/licenses/LICENSE-2.0
Unless required by applicable law or agreed to in writing, software
distributed under the License is distributed on an "AS IS" BASIS,
WITHOUT WARRANTIES OR CONDITIONS OF ANY KIND, either express or implied.
See the License for the specific language governing permissions and
limitations under the License.
2016-06-16 08:57:45 +02:00
*/
2016-05-17 12:49:02 +02:00
package api
import (
2016-05-27 12:46:07 +02:00
"fmt"
"io"
"io/ioutil"
"net/http"
2016-05-27 09:04:20 +02:00
"strconv"
2016-06-29 10:58:16 +02:00
"time"
2016-05-17 12:49:02 +02:00
"github.com/vmware/harbor/dao"
2016-05-27 12:46:07 +02:00
"github.com/vmware/harbor/models"
2016-05-17 12:49:02 +02:00
"github.com/vmware/harbor/utils/log"
)
2016-05-27 12:46:07 +02:00
// RepJobAPI handles request to /api/replicationJobs /api/replicationJobs/:id/log
2016-05-17 12:49:02 +02:00
type RepJobAPI struct {
BaseAPI
2016-05-27 12:46:07 +02:00
jobID int64
2016-05-17 12:49:02 +02:00
}
2016-05-27 12:46:07 +02:00
// Prepare validates that whether user has system admin role
func (ra *RepJobAPI) Prepare() {
uid := ra.ValidateUser()
2016-05-17 12:49:02 +02:00
isAdmin, err := dao.IsAdminRole(uid)
if err != nil {
log.Errorf("Failed to Check if the user is admin, error: %v, uid: %d", err, uid)
}
if !isAdmin {
2016-05-27 12:46:07 +02:00
ra.CustomAbort(http.StatusForbidden, "")
}
idStr := ra.Ctx.Input.Param(":id")
if len(idStr) != 0 {
id, err := strconv.ParseInt(idStr, 10, 64)
if err != nil {
ra.CustomAbort(http.StatusBadRequest, "ID is invalid")
}
ra.jobID = id
2016-05-17 12:49:02 +02:00
}
2016-05-17 12:49:02 +02:00
}
// List filters jobs according to the parameters
func (ra *RepJobAPI) List() {
policyID, err := ra.GetInt64("policy_id")
if err != nil || policyID <= 0 {
ra.CustomAbort(http.StatusBadRequest, "invalid policy_id")
2016-07-06 08:12:16 +02:00
}
policy, err := dao.GetRepPolicy(policyID)
if err != nil {
log.Errorf("failed to get policy %d: %v", policyID, err)
ra.CustomAbort(http.StatusInternalServerError, "")
2016-07-06 08:12:16 +02:00
}
if policy == nil {
ra.CustomAbort(http.StatusNotFound, fmt.Sprintf("policy %d not found", policyID))
2016-06-29 10:58:16 +02:00
}
repository := ra.GetString("repository")
status := ra.GetString("status")
var startTime *time.Time
2016-06-29 10:58:16 +02:00
startTimeStr := ra.GetString("start_time")
if len(startTimeStr) != 0 {
i, err := strconv.ParseInt(startTimeStr, 10, 64)
if err != nil {
ra.CustomAbort(http.StatusBadRequest, "invalid start_time")
}
t := time.Unix(i, 0)
startTime = &t
}
var endTime *time.Time
endTimeStr := ra.GetString("end_time")
if len(endTimeStr) != 0 {
i, err := strconv.ParseInt(endTimeStr, 10, 64)
if err != nil {
ra.CustomAbort(http.StatusBadRequest, "invalid end_time")
}
t := time.Unix(i, 0)
endTime = &t
2016-06-29 10:58:16 +02:00
}
page, pageSize := ra.getPaginationParams()
jobs, total, err := dao.FilterRepJobs(policyID, repository, status,
startTime, endTime, pageSize, pageSize*(page-1))
2016-05-17 12:49:02 +02:00
if err != nil {
log.Errorf("failed to filter jobs according policy ID %d, repository %s, status %s, start time %v, end time %v: %v",
policyID, repository, status, startTime, endTime, err)
ra.CustomAbort(http.StatusInternalServerError, "")
2016-05-17 12:49:02 +02:00
}
ra.setPaginationHeader(total, page, pageSize)
2016-05-27 12:46:07 +02:00
ra.Data["json"] = jobs
ra.ServeJSON()
2016-05-17 12:49:02 +02:00
}
2016-05-27 12:46:07 +02:00
// Delete ...
func (ra *RepJobAPI) Delete() {
if ra.jobID == 0 {
ra.CustomAbort(http.StatusBadRequest, "id is nil")
}
2016-05-27 12:46:07 +02:00
job, err := dao.GetRepJob(ra.jobID)
if err != nil {
2016-05-27 12:46:07 +02:00
log.Errorf("failed to get job %d: %v", ra.jobID, err)
ra.CustomAbort(http.StatusInternalServerError, http.StatusText(http.StatusInternalServerError))
}
2016-07-31 14:21:19 +02:00
if job == nil {
ra.CustomAbort(http.StatusNotFound, fmt.Sprintf("job %d not found", ra.jobID))
}
2016-05-27 12:46:07 +02:00
if job.Status == models.JobPending || job.Status == models.JobRunning {
ra.CustomAbort(http.StatusBadRequest, fmt.Sprintf("job is %s, can not be deleted", job.Status))
}
if err = dao.DeleteRepJob(ra.jobID); err != nil {
log.Errorf("failed to deleted job %d: %v", ra.jobID, err)
ra.CustomAbort(http.StatusInternalServerError, http.StatusText(http.StatusInternalServerError))
}
}
// GetLog ...
func (ra *RepJobAPI) GetLog() {
if ra.jobID == 0 {
ra.CustomAbort(http.StatusBadRequest, "id is nil")
}
req, err := http.NewRequest("GET", buildJobLogURL(strconv.FormatInt(ra.jobID, 10)), nil)
if err != nil {
log.Errorf("failed to create a request: %v", err)
ra.CustomAbort(http.StatusInternalServerError, "")
}
addAuthentication(req)
client := &http.Client{}
resp, err := client.Do(req)
if err != nil {
2016-05-27 12:46:07 +02:00
log.Errorf("failed to get log for job %d: %v", ra.jobID, err)
ra.CustomAbort(http.StatusInternalServerError, http.StatusText(http.StatusInternalServerError))
}
defer resp.Body.Close()
if resp.StatusCode == http.StatusOK {
ra.Ctx.ResponseWriter.Header().Set(http.CanonicalHeaderKey("Content-Length"), resp.Header.Get(http.CanonicalHeaderKey("Content-Length")))
ra.Ctx.ResponseWriter.Header().Set(http.CanonicalHeaderKey("Content-Type"), "text/plain")
2016-05-27 12:46:07 +02:00
if _, err = io.Copy(ra.Ctx.ResponseWriter, resp.Body); err != nil {
log.Errorf("failed to write log to response; %v", err)
2016-05-27 12:46:07 +02:00
ra.CustomAbort(http.StatusInternalServerError, http.StatusText(http.StatusInternalServerError))
}
return
}
2016-05-27 12:46:07 +02:00
b, err := ioutil.ReadAll(resp.Body)
if err != nil {
log.Errorf("failed to read reponse body: %v", err)
ra.CustomAbort(http.StatusInternalServerError, http.StatusText(http.StatusInternalServerError))
}
ra.CustomAbort(resp.StatusCode, string(b))
}
2016-05-17 12:49:02 +02:00
//TODO:add Post handler to call job service API to submit jobs by policy