0
0
Fork 0
mirror of https://github.com/go-gitea/gitea synced 2024-11-17 23:41:49 +01:00
gitea/services/task/migrate.go

155 lines
4.9 KiB
Go
Raw Normal View History

2019-10-13 15:23:14 +02:00
// Copyright 2019 Gitea. All rights reserved.
// SPDX-License-Identifier: MIT
2019-10-13 15:23:14 +02:00
package task
import (
"context"
2019-10-13 15:23:14 +02:00
"errors"
"fmt"
"strings"
"time"
2019-10-13 15:23:14 +02:00
admin_model "code.gitea.io/gitea/models/admin"
"code.gitea.io/gitea/models/db"
repo_model "code.gitea.io/gitea/models/repo"
user_model "code.gitea.io/gitea/models/user"
"code.gitea.io/gitea/modules/graceful"
"code.gitea.io/gitea/modules/json"
2019-10-13 15:23:14 +02:00
"code.gitea.io/gitea/modules/log"
"code.gitea.io/gitea/modules/migration"
"code.gitea.io/gitea/modules/process"
2019-10-13 15:23:14 +02:00
"code.gitea.io/gitea/modules/structs"
"code.gitea.io/gitea/modules/timeutil"
"code.gitea.io/gitea/modules/util"
"code.gitea.io/gitea/services/migrations"
notify_service "code.gitea.io/gitea/services/notify"
2019-10-13 15:23:14 +02:00
)
func handleCreateError(owner *user_model.User, err error) error {
2019-10-13 15:23:14 +02:00
switch {
case repo_model.IsErrReachLimitOfRepo(err):
return fmt.Errorf("you have already reached your limit of %d repositories", owner.MaxCreationLimit())
case repo_model.IsErrRepoAlreadyExist(err):
return errors.New("the repository name is already used")
case db.IsErrNameReserved(err):
return fmt.Errorf("the repository name '%s' is reserved", err.(db.ErrNameReserved).Name)
case db.IsErrNamePatternNotAllowed(err):
return fmt.Errorf("the pattern '%s' is not allowed in a repository name", err.(db.ErrNamePatternNotAllowed).Pattern)
2019-10-13 15:23:14 +02:00
default:
return err
}
}
func runMigrateTask(ctx context.Context, t *admin_model.Task) (err error) {
defer func(ctx context.Context) {
2019-10-13 15:23:14 +02:00
if e := recover(); e != nil {
err = fmt.Errorf("PANIC whilst trying to do migrate task: %v", e)
log.Critical("PANIC during runMigrateTask[%d] by DoerID[%d] to RepoID[%d] for OwnerID[%d]: %v\nStacktrace: %v", t.ID, t.DoerID, t.RepoID, t.OwnerID, e, log.Stack(2))
2019-10-13 15:23:14 +02:00
}
if err == nil {
err = admin_model.FinishMigrateTask(ctx, t)
2019-10-13 15:23:14 +02:00
if err == nil {
notify_service.MigrateRepository(ctx, t.Doer, t.Owner, t.Repo)
2019-10-13 15:23:14 +02:00
return
}
log.Error("FinishMigrateTask[%d] by DoerID[%d] to RepoID[%d] for OwnerID[%d] failed: %v", t.ID, t.DoerID, t.RepoID, t.OwnerID, err)
2019-10-13 15:23:14 +02:00
}
log.Error("runMigrateTask[%d] by DoerID[%d] to RepoID[%d] for OwnerID[%d] failed: %v", t.ID, t.DoerID, t.RepoID, t.OwnerID, err)
2019-10-13 15:23:14 +02:00
t.EndTime = timeutil.TimeStampNow()
t.Status = structs.TaskStatusFailed
t.Message = err.Error()
if err := t.UpdateCols(ctx, "status", "message", "end_time"); err != nil {
log.Error("Task UpdateCols failed: %v", err)
2019-10-13 15:23:14 +02:00
}
// then, do not delete the repository, otherwise the users won't be able to see the last error
}(graceful.GetManager().ShutdownContext()) // even if the parent ctx is canceled, this defer-function still needs to update the task record in database
2019-10-13 15:23:14 +02:00
if err = t.LoadRepo(ctx); err != nil {
return err
2019-10-13 15:23:14 +02:00
}
// if repository is ready, then just finish the task
if t.Repo.Status == repo_model.RepositoryReady {
2019-10-13 15:23:14 +02:00
return nil
}
if err = t.LoadDoer(ctx); err != nil {
return err
2019-10-13 15:23:14 +02:00
}
if err = t.LoadOwner(ctx); err != nil {
return err
2019-10-13 15:23:14 +02:00
}
var opts *migration.MigrateOptions
2019-10-13 15:23:14 +02:00
opts, err = t.MigrateConfig()
if err != nil {
return err
2019-10-13 15:23:14 +02:00
}
opts.MigrateToRepoID = t.RepoID
pm := process.GetManager()
ctx, cancel, finished := pm.AddContext(graceful.GetManager().ShutdownContext(), fmt.Sprintf("MigrateTask: %s/%s", t.Owner.Name, opts.RepoName))
defer finished()
t.StartTime = timeutil.TimeStampNow()
t.Status = structs.TaskStatusRunning
if err = t.UpdateCols(ctx, "start_time", "status"); err != nil {
return err
}
// check whether the task should be canceled, this goroutine is also managed by process manager
go func() {
for {
select {
case <-time.After(2 * time.Second):
case <-ctx.Done():
return
}
task, _ := admin_model.GetMigratingTask(ctx, t.RepoID)
if task != nil && task.Status != structs.TaskStatusRunning {
log.Debug("MigrateTask[%d] by DoerID[%d] to RepoID[%d] for OwnerID[%d] is canceled due to status is not 'running'", t.ID, t.DoerID, t.RepoID, t.OwnerID)
cancel()
return
}
}
}()
t.Repo, err = migrations.MigrateRepository(ctx, t.Doer, t.Owner.Name, *opts, func(format string, args ...any) {
message := admin_model.TranslatableMessage{
Format: format,
Args: args,
}
bs, _ := json.Marshal(message)
t.Message = string(bs)
_ = t.UpdateCols(ctx, "message")
})
2019-10-13 15:23:14 +02:00
if err == nil {
log.Trace("Repository migrated [%d]: %s/%s", t.Repo.ID, t.Owner.Name, t.Repo.Name)
return nil
2019-10-13 15:23:14 +02:00
}
if repo_model.IsErrRepoAlreadyExist(err) {
return errors.New("the repository name is already used")
2019-10-13 15:23:14 +02:00
}
// remoteAddr may contain credentials, so we sanitize it
err = util.SanitizeErrorCredentialURLs(err)
2019-10-13 15:23:14 +02:00
if strings.Contains(err.Error(), "Authentication failed") ||
strings.Contains(err.Error(), "could not read Username") {
return fmt.Errorf("authentication failed: %w", err)
2019-10-13 15:23:14 +02:00
} else if strings.Contains(err.Error(), "fatal:") {
return fmt.Errorf("migration failed: %w", err)
2019-10-13 15:23:14 +02:00
}
// do not be tempted to coalesce this line with the return
err = handleCreateError(t.Owner, err)
return err
2019-10-13 15:23:14 +02:00
}