2019-10-13 18:53:14 +05:30
// Copyright 2019 Gitea. All rights reserved.
// Use of this source code is governed by a MIT-style
// license that can be found in the LICENSE file.
package task
import (
2020-12-03 00:06:06 +05:30
"context"
2019-10-13 18:53:14 +05:30
"errors"
"fmt"
"strings"
"code.gitea.io/gitea/models"
2021-11-24 15:19:20 +05:30
"code.gitea.io/gitea/models/db"
user_model "code.gitea.io/gitea/models/user"
2019-12-17 09:46:54 +05:30
"code.gitea.io/gitea/modules/graceful"
2021-07-24 21:33:58 +05:30
"code.gitea.io/gitea/modules/json"
2019-10-13 18:53:14 +05:30
"code.gitea.io/gitea/modules/log"
2021-11-16 20:55:33 +05:30
"code.gitea.io/gitea/modules/migration"
2019-10-13 18:53:14 +05:30
"code.gitea.io/gitea/modules/notification"
2020-12-03 00:06:06 +05:30
"code.gitea.io/gitea/modules/process"
2019-10-13 18:53:14 +05:30
"code.gitea.io/gitea/modules/structs"
"code.gitea.io/gitea/modules/timeutil"
"code.gitea.io/gitea/modules/util"
2021-11-16 20:55:33 +05:30
"code.gitea.io/gitea/services/migrations"
2019-10-13 18:53:14 +05:30
)
2021-11-24 15:19:20 +05:30
func handleCreateError ( owner * user_model . User , err error ) error {
2019-10-13 18:53:14 +05:30
switch {
case models . IsErrReachLimitOfRepo ( err ) :
return fmt . Errorf ( "You have already reached your limit of %d repositories" , owner . MaxCreationLimit ( ) )
case models . IsErrRepoAlreadyExist ( err ) :
return errors . New ( "The repository name is already used" )
2021-11-24 15:19:20 +05:30
case db . IsErrNameReserved ( err ) :
return fmt . Errorf ( "The repository name '%s' is reserved" , err . ( db . ErrNameReserved ) . Name )
case db . IsErrNamePatternNotAllowed ( err ) :
return fmt . Errorf ( "The pattern '%s' is not allowed in a repository name" , err . ( db . ErrNamePatternNotAllowed ) . Pattern )
2019-10-13 18:53:14 +05:30
default :
return err
}
}
func runMigrateTask ( t * models . Task ) ( err error ) {
defer func ( ) {
if e := recover ( ) ; e != nil {
2020-10-24 05:16:35 +05:30
err = fmt . Errorf ( "PANIC whilst trying to do migrate task: %v" , e )
log . Critical ( "PANIC during runMigrateTask[%d] by DoerID[%d] to RepoID[%d] for OwnerID[%d]: %v\nStacktrace: %v" , t . ID , t . DoerID , t . RepoID , t . OwnerID , e , log . Stack ( 2 ) )
2019-10-13 18:53:14 +05:30
}
if err == nil {
err = models . FinishMigrateTask ( t )
if err == nil {
notification . NotifyMigrateRepository ( t . Doer , t . Owner , t . Repo )
return
}
2020-10-12 00:21:13 +05:30
log . Error ( "FinishMigrateTask[%d] by DoerID[%d] to RepoID[%d] for OwnerID[%d] failed: %v" , t . ID , t . DoerID , t . RepoID , t . OwnerID , err )
2019-10-13 18:53:14 +05:30
}
t . EndTime = timeutil . TimeStampNow ( )
t . Status = structs . TaskStatusFailed
2021-06-17 03:32:24 +05:30
t . Message = err . Error ( )
2021-11-13 16:58:50 +05:30
// Ensure that the repo loaded before we zero out the repo ID from the task - thus ensuring that we can delete it
_ = t . LoadRepo ( )
2020-10-24 05:16:35 +05:30
t . RepoID = 0
if err := t . UpdateCols ( "status" , "errors" , "repo_id" , "end_time" ) ; err != nil {
2020-10-12 00:21:13 +05:30
log . Error ( "Task UpdateCols failed: %v" , err )
2019-10-13 18:53:14 +05:30
}
if t . Repo != nil {
if errDelete := models . DeleteRepository ( t . Doer , t . OwnerID , t . Repo . ID ) ; errDelete != nil {
log . Error ( "DeleteRepository: %v" , errDelete )
}
}
} ( )
2020-10-24 05:16:35 +05:30
if err = t . LoadRepo ( ) ; err != nil {
return
2019-10-13 18:53:14 +05:30
}
2021-07-08 17:08:13 +05:30
// if repository is ready, then just finish the task
2019-10-13 18:53:14 +05:30
if t . Repo . Status == models . RepositoryReady {
return nil
}
2020-10-24 05:16:35 +05:30
if err = t . LoadDoer ( ) ; err != nil {
return
2019-10-13 18:53:14 +05:30
}
2020-10-24 05:16:35 +05:30
if err = t . LoadOwner ( ) ; err != nil {
return
2019-10-13 18:53:14 +05:30
}
2020-09-11 03:59:19 +05:30
var opts * migration . MigrateOptions
2019-10-13 18:53:14 +05:30
opts , err = t . MigrateConfig ( )
if err != nil {
2020-10-24 05:16:35 +05:30
return
2019-10-13 18:53:14 +05:30
}
opts . MigrateToRepoID = t . RepoID
2020-12-03 00:06:06 +05:30
ctx , cancel := context . WithCancel ( graceful . GetManager ( ) . ShutdownContext ( ) )
defer cancel ( )
pm := process . GetManager ( )
pid := pm . Add ( fmt . Sprintf ( "MigrateTask: %s/%s" , t . Owner . Name , opts . RepoName ) , cancel )
defer pm . Remove ( pid )
t . StartTime = timeutil . TimeStampNow ( )
t . Status = structs . TaskStatusRunning
if err = t . UpdateCols ( "start_time" , "status" ) ; err != nil {
return
}
2021-09-08 23:13:19 +05:30
t . Repo , err = migrations . MigrateRepository ( ctx , t . Doer , t . Owner . Name , * opts , func ( format string , args ... interface { } ) {
2021-06-17 03:32:24 +05:30
message := models . TranslatableMessage {
Format : format ,
Args : args ,
}
bs , _ := json . Marshal ( message )
t . Message = string ( bs )
_ = t . UpdateCols ( "message" )
} )
2019-10-13 18:53:14 +05:30
if err == nil {
2021-09-08 23:13:19 +05:30
log . Trace ( "Repository migrated [%d]: %s/%s" , t . Repo . ID , t . Owner . Name , t . Repo . Name )
2020-10-24 05:16:35 +05:30
return
2019-10-13 18:53:14 +05:30
}
if models . IsErrRepoAlreadyExist ( err ) {
2020-10-24 05:16:35 +05:30
err = errors . New ( "The repository name is already used" )
return
2019-10-13 18:53:14 +05:30
}
// remoteAddr may contain credentials, so we sanitize it
2021-06-14 22:50:43 +05:30
err = util . NewStringURLSanitizedError ( err , opts . CloneAddr , true )
2019-10-13 18:53:14 +05:30
if strings . Contains ( err . Error ( ) , "Authentication failed" ) ||
strings . Contains ( err . Error ( ) , "could not read Username" ) {
return fmt . Errorf ( "Authentication failed: %v" , err . Error ( ) )
} else if strings . Contains ( err . Error ( ) , "fatal:" ) {
return fmt . Errorf ( "Migration failed: %v" , err . Error ( ) )
}
2020-10-24 05:16:35 +05:30
// do not be tempted to coalesce this line with the return
err = handleCreateError ( t . Owner , err )
return
2019-10-13 18:53:14 +05:30
}