mirror of
https://github.com/goharbor/harbor.git
synced 2024-12-25 18:18:04 +01:00
123 lines
3.0 KiB
Go
123 lines
3.0 KiB
Go
package api
|
|
|
|
import (
|
|
"fmt"
|
|
|
|
"net/http"
|
|
"strconv"
|
|
|
|
"github.com/vmware/harbor/dao"
|
|
"github.com/vmware/harbor/models"
|
|
"github.com/vmware/harbor/utils/log"
|
|
)
|
|
|
|
type RepPolicyAPI struct {
|
|
BaseAPI
|
|
policyID int64
|
|
policy *models.RepPolicy
|
|
}
|
|
|
|
func (pa *RepPolicyAPI) Prepare() {
|
|
uid := pa.ValidateUser()
|
|
var err error
|
|
isAdmin, err := dao.IsAdminRole(uid)
|
|
if err != nil {
|
|
log.Errorf("Failed to Check if the user is admin, error: %v, uid: %d", err, uid)
|
|
}
|
|
if !isAdmin {
|
|
pa.CustomAbort(http.StatusForbidden, "")
|
|
}
|
|
idStr := pa.Ctx.Input.Param(":id")
|
|
if len(idStr) > 0 {
|
|
pa.policyID, err = strconv.ParseInt(idStr, 10, 64)
|
|
if err != nil {
|
|
log.Errorf("Error parsing policy id: %s, error: %v", idStr, err)
|
|
pa.CustomAbort(http.StatusBadRequest, "invalid policy id")
|
|
}
|
|
p, err := dao.GetRepPolicy(pa.policyID)
|
|
if err != nil {
|
|
log.Errorf("Error occurred in GetRepPolicy, error: %v", err)
|
|
pa.CustomAbort(http.StatusInternalServerError, "Internal error.")
|
|
}
|
|
if p == nil {
|
|
pa.CustomAbort(http.StatusNotFound, fmt.Sprintf("policy does not exist, id: %v", pa.policyID))
|
|
}
|
|
pa.policy = p
|
|
}
|
|
}
|
|
|
|
// Get ...
|
|
func (pa *RepPolicyAPI) Get() {
|
|
projectID, err := pa.GetInt64("project_id")
|
|
if err != nil {
|
|
log.Errorf("Failed to get project id, error: %v", err)
|
|
pa.RenderError(http.StatusBadRequest, "Invalid project id")
|
|
return
|
|
}
|
|
policies, err := dao.GetRepPolicyByProject(projectID)
|
|
if err != nil {
|
|
log.Errorf("Failed to query policies from db, error: %v", err)
|
|
pa.RenderError(http.StatusInternalServerError, "Failed to query policies")
|
|
return
|
|
}
|
|
pa.Data["json"] = policies
|
|
pa.ServeJSON()
|
|
}
|
|
|
|
// Post ...
|
|
func (pa *RepPolicyAPI) Post() {
|
|
policy := models.RepPolicy{}
|
|
pa.DecodeJSONReq(&policy)
|
|
pid, err := dao.AddRepPolicy(policy)
|
|
if err != nil {
|
|
log.Errorf("Failed to add policy to DB, error: %v", err)
|
|
pa.RenderError(http.StatusInternalServerError, "Internal Error")
|
|
return
|
|
}
|
|
|
|
if policy.Enabled == 1 {
|
|
go func() {
|
|
if err := TriggerReplication(pid, "", nil, models.RepOpTransfer); err != nil {
|
|
log.Errorf("failed to trigger replication of %d: %v", pid, err)
|
|
} else {
|
|
log.Infof("replication of %d triggered", pid)
|
|
}
|
|
}()
|
|
}
|
|
|
|
pa.Redirect(http.StatusCreated, strconv.FormatInt(pid, 10))
|
|
}
|
|
|
|
type enablementReq struct {
|
|
Enabled int `json:"enabled"`
|
|
}
|
|
|
|
func (pa *RepPolicyAPI) UpdateEnablement() {
|
|
e := enablementReq{}
|
|
pa.DecodeJSONReq(&e)
|
|
if e.Enabled != 0 && e.Enabled != 1 {
|
|
pa.RenderError(http.StatusBadRequest, "invalid enabled value")
|
|
return
|
|
}
|
|
|
|
if pa.policy.Enabled == e.Enabled {
|
|
return
|
|
}
|
|
|
|
if err := dao.UpdateRepPolicyEnablement(pa.policyID, e.Enabled); err != nil {
|
|
log.Errorf("Failed to update policy enablement in DB, error: %v", err)
|
|
pa.RenderError(http.StatusInternalServerError, "Internal Error")
|
|
return
|
|
}
|
|
|
|
if e.Enabled == 1 {
|
|
go func() {
|
|
if err := TriggerReplication(pa.policyID, "", nil, models.RepOpTransfer); err != nil {
|
|
log.Errorf("failed to trigger replication of %d: %v", pa.policyID, err)
|
|
} else {
|
|
log.Infof("replication of %d triggered", pa.policyID)
|
|
}
|
|
}()
|
|
}
|
|
}
|