logs-collector/logs_collector/collector/api/views.py

172 lines
6.1 KiB
Python
Raw Normal View History

2023-08-11 09:38:47 +08:00
from django.core.exceptions import ValidationError, ObjectDoesNotExist
from django.conf import settings
2023-07-29 12:56:42 +08:00
2023-07-31 12:53:39 +08:00
from rest_framework import status
2023-08-11 09:38:47 +08:00
# from rest_framework.decorators import action
from rest_framework.parsers import (
FormParser,
MultiPartParser,
FileUploadParser
)
2023-08-11 09:38:47 +08:00
from rest_framework.permissions import IsAuthenticated
from rest_framework.response import Response
from rest_framework import viewsets
from rest_framework import views
2023-08-11 21:12:51 +08:00
from rest_framework import filters
from django_filters.rest_framework import DjangoFilterBackend
2023-07-31 12:53:39 +08:00
from drf_spectacular.utils import extend_schema, extend_schema_view
2023-08-16 23:53:13 +08:00
from drf_spectacular.openapi import OpenApiParameter
from collector.models import Archive, Ticket, Platform
from collector.utils.helpers import get_mount_fs_info
2023-08-14 15:56:17 +08:00
2023-08-11 21:12:51 +08:00
from .filters import ArchiveFilter, TicketFilter
2023-08-11 09:38:47 +08:00
from .permissions import IsGuestUpload
from .serializers import (
PublicArchiveUploadSerializer,
ArchiveSerializer,
PlatformSerializer,
TicketSerializer,
StorageInfoSerializer,
2023-08-11 09:38:47 +08:00
)
2023-08-08 13:42:57 +08:00
2023-07-25 14:29:17 +08:00
@extend_schema_view(
list=extend_schema(
description='Archives that contains log files for checking',
summary='Show all archives'
),
create=extend_schema(summary='Create (upload) a new archive'),
retrieve=extend_schema(summary='Show archive by id'),
update=extend_schema(summary='Update archive'),
partial_update=extend_schema(summary='Update archive field'),
destroy=extend_schema(summary='Delete archive'),
)
2023-08-11 09:38:47 +08:00
class ArchiveViewSet(viewsets.ModelViewSet):
2023-08-08 13:42:57 +08:00
queryset = Archive.objects.order_by('-time_create')
2023-08-11 09:38:47 +08:00
serializer_class = ArchiveSerializer
parser_classes = (MultiPartParser, FormParser, FileUploadParser)
2023-08-11 09:38:47 +08:00
permission_classes = (IsGuestUpload, )
2023-08-11 21:12:51 +08:00
filter_backends = [DjangoFilterBackend]
filterset_class = ArchiveFilter
2023-08-08 13:42:57 +08:00
2023-08-16 23:53:13 +08:00
@extend_schema(
operation_id='upload_file',
request={
'multipart/form-data': {
'type': 'object',
'properties': {
'file': {
'type': 'string',
'format': 'binary'
}
}
}
},
parameters=[
OpenApiParameter(
name='Upload-Token',
type=str,
location=OpenApiParameter.HEADER,
description="upload permission token",
2023-08-16 23:53:13 +08:00
),
]
)
2023-08-09 19:24:16 +08:00
def create(self, request, *args, **kwargs):
# ! upload-token protection:
upload_token = request.headers.get('upload-token', '')
2023-08-16 23:53:13 +08:00
if upload_token:
2023-08-09 19:24:16 +08:00
try:
bound_ticket = Ticket.objects.get(token=upload_token)
if bound_ticket.resolved:
return Response(
2023-08-16 23:53:13 +08:00
{'error': f'ticket {bound_ticket} already resolved'},
2023-08-09 19:24:16 +08:00
status=status.HTTP_423_LOCKED
)
if bound_ticket.attempts <= 0:
return Response(
{'error': f'token {upload_token} expired'},
status=status.HTTP_423_LOCKED
)
bound_ticket.attempts -= 1
bound_ticket.save()
# ? mixin bound ticket number to request.data from user
2023-08-11 09:38:47 +08:00
request.data['ticket'] = bound_ticket.number
# ? change serializer for guest user
2023-08-16 23:53:13 +08:00
if not request.user.is_authenticated:
self.serializer_class = PublicArchiveUploadSerializer
2023-08-11 09:38:47 +08:00
except (ValidationError, ObjectDoesNotExist,):
2023-08-09 19:24:16 +08:00
return Response(
{'error': f'token {upload_token} is not valid'},
status=status.HTTP_403_FORBIDDEN
)
2023-08-16 23:53:13 +08:00
else:
2023-08-09 19:24:16 +08:00
return Response(
{'error': 'Header Upload-Token is required'},
status=status.HTTP_401_UNAUTHORIZED
)
# ! default create method:
serializer = self.get_serializer(data=request.data)
serializer.is_valid(raise_exception=True)
self.perform_create(serializer)
headers = self.get_success_headers(serializer.data)
return Response(
serializer.data,
status=status.HTTP_201_CREATED,
headers=headers
)
2023-08-08 17:08:53 +08:00
2023-08-11 09:38:47 +08:00
@extend_schema_view(
list=extend_schema(
description='Platforms are needed to relative the ticket and software',
summary='Show all platforms'
),
create=extend_schema(summary='Create a new platform'),
retrieve=extend_schema(summary='Show platform by internal name'),
update=extend_schema(summary='Update platform'),
partial_update=extend_schema(summary='Update platform field'),
destroy=extend_schema(summary='Delete platform'),
)
2023-08-11 09:38:47 +08:00
class PlatformViewSet(viewsets.ModelViewSet):
queryset = Platform.objects.all()
lookup_field = 'name'
serializer_class = PlatformSerializer
permission_classes = (IsAuthenticated, )
@extend_schema_view(
list=extend_schema(
description='Tickets that will be related with the uploaded archive',
summary='Show all tickets'
),
create=extend_schema(summary='Create a new ticket'),
retrieve=extend_schema(summary='Show ticket by number'),
update=extend_schema(summary='Update ticket'),
partial_update=extend_schema(summary='Update ticket field'),
destroy=extend_schema(summary='Delete ticket'),
)
2023-08-11 09:38:47 +08:00
class TicketViewSet(viewsets.ModelViewSet):
queryset = Ticket.objects.order_by('-time_create')
lookup_field = 'number'
serializer_class = TicketSerializer
permission_classes = (IsAuthenticated, )
2023-08-11 21:12:51 +08:00
filter_backends = [DjangoFilterBackend, filters.SearchFilter]
filterset_class = TicketFilter
search_fields = ['number']
def perform_create(self, serializer):
serializer.save(user=self.request.user)
class StorageInfo(views.APIView):
"""Info about storage total/used/free space"""
@extend_schema(
responses=StorageInfoSerializer,
summary='Show storage space in bytes'
)
def get(self, request):
return Response(get_mount_fs_info(settings.MEDIA_ROOT))