157 lines
		
	
	
		
			4.7 KiB
		
	
	
	
		
			Go
		
	
	
	
			
		
		
	
	
			157 lines
		
	
	
		
			4.7 KiB
		
	
	
	
		
			Go
		
	
	
	
// Copyright 2019 Gitea. All rights reserved.
 | 
						|
// SPDX-License-Identifier: MIT
 | 
						|
 | 
						|
package task
 | 
						|
 | 
						|
import (
 | 
						|
	"errors"
 | 
						|
	"fmt"
 | 
						|
	"strings"
 | 
						|
	"time"
 | 
						|
 | 
						|
	admin_model "code.gitea.io/gitea/models/admin"
 | 
						|
	"code.gitea.io/gitea/models/db"
 | 
						|
	repo_model "code.gitea.io/gitea/models/repo"
 | 
						|
	user_model "code.gitea.io/gitea/models/user"
 | 
						|
	"code.gitea.io/gitea/modules/graceful"
 | 
						|
	"code.gitea.io/gitea/modules/json"
 | 
						|
	"code.gitea.io/gitea/modules/log"
 | 
						|
	"code.gitea.io/gitea/modules/migration"
 | 
						|
	"code.gitea.io/gitea/modules/notification"
 | 
						|
	"code.gitea.io/gitea/modules/process"
 | 
						|
	"code.gitea.io/gitea/modules/structs"
 | 
						|
	"code.gitea.io/gitea/modules/timeutil"
 | 
						|
	"code.gitea.io/gitea/modules/util"
 | 
						|
	"code.gitea.io/gitea/services/migrations"
 | 
						|
)
 | 
						|
 | 
						|
func handleCreateError(owner *user_model.User, err error) error {
 | 
						|
	switch {
 | 
						|
	case repo_model.IsErrReachLimitOfRepo(err):
 | 
						|
		return fmt.Errorf("you have already reached your limit of %d repositories", owner.MaxCreationLimit())
 | 
						|
	case repo_model.IsErrRepoAlreadyExist(err):
 | 
						|
		return errors.New("the repository name is already used")
 | 
						|
	case db.IsErrNameReserved(err):
 | 
						|
		return fmt.Errorf("the repository name '%s' is reserved", err.(db.ErrNameReserved).Name)
 | 
						|
	case db.IsErrNamePatternNotAllowed(err):
 | 
						|
		return fmt.Errorf("the pattern '%s' is not allowed in a repository name", err.(db.ErrNamePatternNotAllowed).Pattern)
 | 
						|
	default:
 | 
						|
		return err
 | 
						|
	}
 | 
						|
}
 | 
						|
 | 
						|
func runMigrateTask(t *admin_model.Task) (err error) {
 | 
						|
	defer func() {
 | 
						|
		if e := recover(); e != nil {
 | 
						|
			err = fmt.Errorf("PANIC whilst trying to do migrate task: %v", e)
 | 
						|
			log.Critical("PANIC during runMigrateTask[%d] by DoerID[%d] to RepoID[%d] for OwnerID[%d]: %v\nStacktrace: %v", t.ID, t.DoerID, t.RepoID, t.OwnerID, e, log.Stack(2))
 | 
						|
		}
 | 
						|
 | 
						|
		if err == nil {
 | 
						|
			err = admin_model.FinishMigrateTask(t)
 | 
						|
			if err == nil {
 | 
						|
				notification.NotifyMigrateRepository(db.DefaultContext, t.Doer, t.Owner, t.Repo)
 | 
						|
				return
 | 
						|
			}
 | 
						|
 | 
						|
			log.Error("FinishMigrateTask[%d] by DoerID[%d] to RepoID[%d] for OwnerID[%d] failed: %v", t.ID, t.DoerID, t.RepoID, t.OwnerID, err)
 | 
						|
		}
 | 
						|
 | 
						|
		log.Error("runMigrateTask[%d] by DoerID[%d] to RepoID[%d] for OwnerID[%d] failed: %v", t.ID, t.DoerID, t.RepoID, t.OwnerID, err)
 | 
						|
 | 
						|
		t.EndTime = timeutil.TimeStampNow()
 | 
						|
		t.Status = structs.TaskStatusFailed
 | 
						|
		t.Message = err.Error()
 | 
						|
 | 
						|
		if err := t.UpdateCols("status", "message", "end_time"); err != nil {
 | 
						|
			log.Error("Task UpdateCols failed: %v", err)
 | 
						|
		}
 | 
						|
 | 
						|
		// then, do not delete the repository, otherwise the users won't be able to see the last error
 | 
						|
	}()
 | 
						|
 | 
						|
	if err = t.LoadRepo(); err != nil {
 | 
						|
		return
 | 
						|
	}
 | 
						|
 | 
						|
	// if repository is ready, then just finish the task
 | 
						|
	if t.Repo.Status == repo_model.RepositoryReady {
 | 
						|
		return nil
 | 
						|
	}
 | 
						|
 | 
						|
	if err = t.LoadDoer(); err != nil {
 | 
						|
		return
 | 
						|
	}
 | 
						|
	if err = t.LoadOwner(); err != nil {
 | 
						|
		return
 | 
						|
	}
 | 
						|
 | 
						|
	var opts *migration.MigrateOptions
 | 
						|
	opts, err = t.MigrateConfig()
 | 
						|
	if err != nil {
 | 
						|
		return
 | 
						|
	}
 | 
						|
 | 
						|
	opts.MigrateToRepoID = t.RepoID
 | 
						|
 | 
						|
	pm := process.GetManager()
 | 
						|
	ctx, cancel, finished := pm.AddContext(graceful.GetManager().ShutdownContext(), fmt.Sprintf("MigrateTask: %s/%s", t.Owner.Name, opts.RepoName))
 | 
						|
	defer finished()
 | 
						|
 | 
						|
	t.StartTime = timeutil.TimeStampNow()
 | 
						|
	t.Status = structs.TaskStatusRunning
 | 
						|
	if err = t.UpdateCols("start_time", "status"); err != nil {
 | 
						|
		return
 | 
						|
	}
 | 
						|
 | 
						|
	// check whether the task should be canceled, this goroutine is also managed by process manager
 | 
						|
	go func() {
 | 
						|
		for {
 | 
						|
			select {
 | 
						|
			case <-time.After(2 * time.Second):
 | 
						|
			case <-ctx.Done():
 | 
						|
				return
 | 
						|
			}
 | 
						|
			task, _ := admin_model.GetMigratingTask(t.RepoID)
 | 
						|
			if task != nil && task.Status != structs.TaskStatusRunning {
 | 
						|
				log.Debug("MigrateTask[%d] by DoerID[%d] to RepoID[%d] for OwnerID[%d] is canceled due to status is not 'running'", t.ID, t.DoerID, t.RepoID, t.OwnerID)
 | 
						|
				cancel()
 | 
						|
				return
 | 
						|
			}
 | 
						|
		}
 | 
						|
	}()
 | 
						|
 | 
						|
	t.Repo, err = migrations.MigrateRepository(ctx, t.Doer, t.Owner.Name, *opts, func(format string, args ...interface{}) {
 | 
						|
		message := admin_model.TranslatableMessage{
 | 
						|
			Format: format,
 | 
						|
			Args:   args,
 | 
						|
		}
 | 
						|
		bs, _ := json.Marshal(message)
 | 
						|
		t.Message = string(bs)
 | 
						|
		_ = t.UpdateCols("message")
 | 
						|
	})
 | 
						|
 | 
						|
	if err == nil {
 | 
						|
		log.Trace("Repository migrated [%d]: %s/%s", t.Repo.ID, t.Owner.Name, t.Repo.Name)
 | 
						|
		return
 | 
						|
	}
 | 
						|
 | 
						|
	if repo_model.IsErrRepoAlreadyExist(err) {
 | 
						|
		err = errors.New("the repository name is already used")
 | 
						|
		return
 | 
						|
	}
 | 
						|
 | 
						|
	// remoteAddr may contain credentials, so we sanitize it
 | 
						|
	err = util.SanitizeErrorCredentialURLs(err)
 | 
						|
	if strings.Contains(err.Error(), "Authentication failed") ||
 | 
						|
		strings.Contains(err.Error(), "could not read Username") {
 | 
						|
		return fmt.Errorf("authentication failed: %w", err)
 | 
						|
	} else if strings.Contains(err.Error(), "fatal:") {
 | 
						|
		return fmt.Errorf("migration failed: %w", err)
 | 
						|
	}
 | 
						|
 | 
						|
	// do not be tempted to coalesce this line with the return
 | 
						|
	err = handleCreateError(t.Owner, err)
 | 
						|
	return err
 | 
						|
}
 |