2019-10-13 21:23:14 +08:00
// Copyright 2019 Gitea. All rights reserved.
2022-11-28 02:20:29 +08:00
// SPDX-License-Identifier: MIT
2019-10-13 21:23:14 +08:00
package task
import (
2023-09-16 22:39:12 +08:00
"context"
2019-10-13 21:23:14 +08:00
"errors"
"fmt"
"strings"
2023-05-11 16:25:46 +08:00
"time"
2019-10-13 21:23:14 +08:00
2022-08-25 10:31:57 +08:00
admin_model "code.gitea.io/gitea/models/admin"
2021-11-24 17:49:20 +08:00
"code.gitea.io/gitea/models/db"
2021-12-10 09:27:50 +08:00
repo_model "code.gitea.io/gitea/models/repo"
2021-11-24 17:49:20 +08:00
user_model "code.gitea.io/gitea/models/user"
2019-12-17 12:16:54 +08:00
"code.gitea.io/gitea/modules/graceful"
2021-07-25 00:03:58 +08:00
"code.gitea.io/gitea/modules/json"
2019-10-13 21:23:14 +08:00
"code.gitea.io/gitea/modules/log"
2021-11-16 23:25:33 +08:00
"code.gitea.io/gitea/modules/migration"
2020-12-03 02:36:06 +08:00
"code.gitea.io/gitea/modules/process"
2019-10-13 21:23:14 +08:00
"code.gitea.io/gitea/modules/structs"
"code.gitea.io/gitea/modules/timeutil"
"code.gitea.io/gitea/modules/util"
2021-11-16 23:25:33 +08:00
"code.gitea.io/gitea/services/migrations"
2023-09-06 02:37:47 +08:00
notify_service "code.gitea.io/gitea/services/notify"
2019-10-13 21:23:14 +08:00
)
2021-11-24 17:49:20 +08:00
func handleCreateError ( owner * user_model . User , err error ) error {
2019-10-13 21:23:14 +08:00
switch {
2021-12-12 23:48:20 +08:00
case repo_model . IsErrReachLimitOfRepo ( err ) :
2023-05-11 16:25:46 +08:00
return fmt . Errorf ( "you have already reached your limit of %d repositories" , owner . MaxCreationLimit ( ) )
2021-12-12 23:48:20 +08:00
case repo_model . IsErrRepoAlreadyExist ( err ) :
2023-05-11 16:25:46 +08:00
return errors . New ( "the repository name is already used" )
2021-11-24 17:49:20 +08:00
case db . IsErrNameReserved ( err ) :
2023-05-11 16:25:46 +08:00
return fmt . Errorf ( "the repository name '%s' is reserved" , err . ( db . ErrNameReserved ) . Name )
2021-11-24 17:49:20 +08:00
case db . IsErrNamePatternNotAllowed ( err ) :
2023-05-11 16:25:46 +08:00
return fmt . Errorf ( "the pattern '%s' is not allowed in a repository name" , err . ( db . ErrNamePatternNotAllowed ) . Pattern )
2019-10-13 21:23:14 +08:00
default :
return err
}
}
2023-09-16 22:39:12 +08:00
func runMigrateTask ( ctx context . Context , t * admin_model . Task ) ( err error ) {
2019-10-13 21:23:14 +08:00
defer func ( ) {
if e := recover ( ) ; e != nil {
2020-10-24 07:46:35 +08:00
err = fmt . Errorf ( "PANIC whilst trying to do migrate task: %v" , e )
log . Critical ( "PANIC during runMigrateTask[%d] by DoerID[%d] to RepoID[%d] for OwnerID[%d]: %v\nStacktrace: %v" , t . ID , t . DoerID , t . RepoID , t . OwnerID , e , log . Stack ( 2 ) )
2019-10-13 21:23:14 +08:00
}
2023-10-01 20:04:35 +08:00
// fixme: Because ctx is canceled here, so the db.DefaultContext is needed.
2019-10-13 21:23:14 +08:00
if err == nil {
2023-10-01 20:04:35 +08:00
err = admin_model . FinishMigrateTask ( db . DefaultContext , t )
2019-10-13 21:23:14 +08:00
if err == nil {
2023-10-01 20:04:35 +08:00
notify_service . MigrateRepository ( db . DefaultContext , t . Doer , t . Owner , t . Repo )
2019-10-13 21:23:14 +08:00
return
}
2020-10-12 02:51:13 +08:00
log . Error ( "FinishMigrateTask[%d] by DoerID[%d] to RepoID[%d] for OwnerID[%d] failed: %v" , t . ID , t . DoerID , t . RepoID , t . OwnerID , err )
2019-10-13 21:23:14 +08:00
}
2023-05-11 16:25:46 +08:00
log . Error ( "runMigrateTask[%d] by DoerID[%d] to RepoID[%d] for OwnerID[%d] failed: %v" , t . ID , t . DoerID , t . RepoID , t . OwnerID , err )
2019-10-13 21:23:14 +08:00
t . EndTime = timeutil . TimeStampNow ( )
t . Status = structs . TaskStatusFailed
2021-06-17 06:02:24 +08:00
t . Message = err . Error ( )
2023-10-01 20:04:35 +08:00
// fixme: Because ctx is canceled here, so the db.DefaultContext is needed.
if err := t . UpdateCols ( db . DefaultContext , "status" , "message" , "end_time" ) ; err != nil {
2020-10-12 02:51:13 +08:00
log . Error ( "Task UpdateCols failed: %v" , err )
2019-10-13 21:23:14 +08:00
}
2023-05-11 16:25:46 +08:00
// then, do not delete the repository, otherwise the users won't be able to see the last error
2019-10-13 21:23:14 +08:00
} ( )
2023-09-16 22:39:12 +08:00
if err = t . LoadRepo ( ctx ) ; err != nil {
2023-07-09 19:58:06 +08:00
return err
2019-10-13 21:23:14 +08:00
}
2021-07-08 19:38:13 +08:00
// if repository is ready, then just finish the task
2021-12-10 09:27:50 +08:00
if t . Repo . Status == repo_model . RepositoryReady {
2019-10-13 21:23:14 +08:00
return nil
}
2023-09-16 22:39:12 +08:00
if err = t . LoadDoer ( ctx ) ; err != nil {
2023-07-09 19:58:06 +08:00
return err
2019-10-13 21:23:14 +08:00
}
2023-09-16 22:39:12 +08:00
if err = t . LoadOwner ( ctx ) ; err != nil {
2023-07-09 19:58:06 +08:00
return err
2019-10-13 21:23:14 +08:00
}
2020-09-11 06:29:19 +08:00
var opts * migration . MigrateOptions
2019-10-13 21:23:14 +08:00
opts , err = t . MigrateConfig ( )
if err != nil {
2023-07-09 19:58:06 +08:00
return err
2019-10-13 21:23:14 +08:00
}
opts . MigrateToRepoID = t . RepoID
2020-12-03 02:36:06 +08:00
pm := process . GetManager ( )
2023-05-11 16:25:46 +08:00
ctx , cancel , finished := pm . AddContext ( graceful . GetManager ( ) . ShutdownContext ( ) , fmt . Sprintf ( "MigrateTask: %s/%s" , t . Owner . Name , opts . RepoName ) )
2021-12-01 04:06:32 +08:00
defer finished ( )
2020-12-03 02:36:06 +08:00
t . StartTime = timeutil . TimeStampNow ( )
t . Status = structs . TaskStatusRunning
2023-09-16 22:39:12 +08:00
if err = t . UpdateCols ( ctx , "start_time" , "status" ) ; err != nil {
2023-07-09 19:58:06 +08:00
return err
2020-12-03 02:36:06 +08:00
}
2023-05-11 16:25:46 +08:00
// check whether the task should be canceled, this goroutine is also managed by process manager
go func ( ) {
for {
select {
case <- time . After ( 2 * time . Second ) :
case <- ctx . Done ( ) :
return
}
2023-09-16 22:39:12 +08:00
task , _ := admin_model . GetMigratingTask ( ctx , t . RepoID )
2023-05-11 16:25:46 +08:00
if task != nil && task . Status != structs . TaskStatusRunning {
log . Debug ( "MigrateTask[%d] by DoerID[%d] to RepoID[%d] for OwnerID[%d] is canceled due to status is not 'running'" , t . ID , t . DoerID , t . RepoID , t . OwnerID )
cancel ( )
return
}
}
} ( )
2023-07-05 02:36:08 +08:00
t . Repo , err = migrations . MigrateRepository ( ctx , t . Doer , t . Owner . Name , * opts , func ( format string , args ... any ) {
2022-08-25 10:31:57 +08:00
message := admin_model . TranslatableMessage {
2021-06-17 06:02:24 +08:00
Format : format ,
Args : args ,
}
bs , _ := json . Marshal ( message )
t . Message = string ( bs )
2023-09-16 22:39:12 +08:00
_ = t . UpdateCols ( ctx , "message" )
2021-06-17 06:02:24 +08:00
} )
2023-05-11 16:25:46 +08:00
2019-10-13 21:23:14 +08:00
if err == nil {
2021-09-09 01:43:19 +08:00
log . Trace ( "Repository migrated [%d]: %s/%s" , t . Repo . ID , t . Owner . Name , t . Repo . Name )
2023-07-09 19:58:06 +08:00
return nil
2019-10-13 21:23:14 +08:00
}
2021-12-12 23:48:20 +08:00
if repo_model . IsErrRepoAlreadyExist ( err ) {
2023-07-09 19:58:06 +08:00
return errors . New ( "the repository name is already used" )
2019-10-13 21:23:14 +08:00
}
// remoteAddr may contain credentials, so we sanitize it
2022-03-31 10:25:40 +08:00
err = util . SanitizeErrorCredentialURLs ( err )
2019-10-13 21:23:14 +08:00
if strings . Contains ( err . Error ( ) , "Authentication failed" ) ||
strings . Contains ( err . Error ( ) , "could not read Username" ) {
2023-05-11 16:25:46 +08:00
return fmt . Errorf ( "authentication failed: %w" , err )
2019-10-13 21:23:14 +08:00
} else if strings . Contains ( err . Error ( ) , "fatal:" ) {
2023-05-11 16:25:46 +08:00
return fmt . Errorf ( "migration failed: %w" , err )
2019-10-13 21:23:14 +08:00
}
2020-10-24 07:46:35 +08:00
// do not be tempted to coalesce this line with the return
err = handleCreateError ( t . Owner , err )
2022-06-20 18:02:49 +08:00
return err
2019-10-13 21:23:14 +08:00
}