logs-collector/logs_collector/collector/api/views.py

213 lines
7.3 KiB
Python
Raw Normal View History

2023-08-11 03:38:47 +02:00
from django.core.exceptions import ValidationError, ObjectDoesNotExist
from django.conf import settings
2023-07-29 06:56:42 +02:00
2023-07-31 06:53:39 +02:00
from rest_framework import status
2023-08-11 03:38:47 +02:00
# from rest_framework.decorators import action
from rest_framework.parsers import (
FormParser,
MultiPartParser,
FileUploadParser
)
2023-08-11 03:38:47 +02:00
from rest_framework.permissions import IsAuthenticated
from rest_framework.response import Response
from rest_framework import filters, generics, views, viewsets
2023-08-11 15:12:51 +02:00
from django_filters.rest_framework import DjangoFilterBackend
2023-07-31 06:53:39 +02:00
from drf_spectacular.utils import extend_schema, extend_schema_view
2023-08-16 17:53:13 +02:00
from drf_spectacular.openapi import OpenApiParameter
from collector.models import Archive, Ticket, Platform
from collector.utils.helpers import get_mount_fs_info
2023-08-14 09:56:17 +02:00
2023-08-11 15:12:51 +02:00
from .filters import ArchiveFilter, TicketFilter
from .permissions import IsGuestUpload, IsGuestCheckUrls
2023-08-11 03:38:47 +02:00
from .serializers import (
PublicArchiveUploadSerializer,
ArchiveSerializer,
PlatformSerializer,
TicketSerializer,
StorageInfoSerializer,
TokenStateSerializer,
AppHealthInfoSerializer,
TokenStateRootSerializer,
2023-08-11 03:38:47 +02:00
)
2023-08-08 07:42:57 +02:00
2023-07-25 08:29:17 +02:00
@extend_schema_view(
list=extend_schema(
description='Archives that contains log files for checking',
summary='Show all archives'
),
create=extend_schema(summary='Create (upload) a new archive'),
retrieve=extend_schema(summary='Show archive by id'),
update=extend_schema(summary='Update archive'),
partial_update=extend_schema(summary='Update archive field'),
destroy=extend_schema(summary='Delete archive'),
)
2023-08-11 03:38:47 +02:00
class ArchiveViewSet(viewsets.ModelViewSet):
2023-08-08 07:42:57 +02:00
queryset = Archive.objects.order_by('-time_create')
2023-08-11 03:38:47 +02:00
serializer_class = ArchiveSerializer
parser_classes = (MultiPartParser, FormParser, FileUploadParser)
2023-08-11 03:38:47 +02:00
permission_classes = (IsGuestUpload, )
2023-08-11 15:12:51 +02:00
filter_backends = [DjangoFilterBackend]
filterset_class = ArchiveFilter
2023-08-08 07:42:57 +02:00
2023-08-16 17:53:13 +02:00
@extend_schema(
operation_id='upload_file',
request={
'multipart/form-data': {
'type': 'object',
'properties': {
'file': {
'type': 'string',
'format': 'binary'
}
}
}
},
parameters=[
OpenApiParameter(
name='Upload-Token',
type=str,
location=OpenApiParameter.HEADER,
description="upload permission token",
2023-08-16 17:53:13 +02:00
),
]
)
2023-08-09 13:24:16 +02:00
def create(self, request, *args, **kwargs):
# ! upload-token protection:
upload_token = request.headers.get('upload-token', '')
2023-08-16 17:53:13 +02:00
if upload_token:
2023-08-09 13:24:16 +02:00
try:
bound_ticket = Ticket.objects.get(token=upload_token)
if bound_ticket.resolved:
return Response(
2023-08-16 17:53:13 +02:00
{'error': f'ticket {bound_ticket} already resolved'},
2023-08-09 13:24:16 +02:00
status=status.HTTP_423_LOCKED
)
if bound_ticket.attempts <= 0:
return Response(
{'error': f'token {upload_token} expired'},
status=status.HTTP_423_LOCKED
)
bound_ticket.attempts -= 1
bound_ticket.save()
# ? mixin bound ticket number to request.data from user
2023-08-11 03:38:47 +02:00
request.data['ticket'] = bound_ticket.number
# ? change serializer for guest user
2023-08-16 17:53:13 +02:00
if not request.user.is_authenticated:
self.serializer_class = PublicArchiveUploadSerializer
2023-08-11 03:38:47 +02:00
except (ValidationError, ObjectDoesNotExist,):
2023-08-09 13:24:16 +02:00
return Response(
{'error': f'token {upload_token} is not valid'},
status=status.HTTP_403_FORBIDDEN
)
2023-08-16 17:53:13 +02:00
else:
2023-08-09 13:24:16 +02:00
return Response(
{'error': 'Header Upload-Token is required'},
status=status.HTTP_401_UNAUTHORIZED
)
# ! default create method:
serializer = self.get_serializer(data=request.data)
serializer.is_valid(raise_exception=True)
self.perform_create(serializer)
headers = self.get_success_headers(serializer.data)
return Response(
serializer.data,
status=status.HTTP_201_CREATED,
headers=headers
)
2023-08-08 11:08:53 +02:00
2023-08-11 03:38:47 +02:00
@extend_schema_view(
list=extend_schema(
description='Platforms are needed to relative the ticket and software',
summary='Show all platforms'
),
create=extend_schema(summary='Create a new platform'),
retrieve=extend_schema(summary='Show platform by internal name'),
update=extend_schema(summary='Update platform'),
partial_update=extend_schema(summary='Update platform field'),
destroy=extend_schema(summary='Delete platform'),
)
2023-08-11 03:38:47 +02:00
class PlatformViewSet(viewsets.ModelViewSet):
queryset = Platform.objects.all()
lookup_field = 'name'
serializer_class = PlatformSerializer
permission_classes = (IsAuthenticated, )
@extend_schema_view(
list=extend_schema(
description='Tickets that will be related with the uploaded archive',
summary='Show all tickets'
),
create=extend_schema(summary='Create a new ticket'),
retrieve=extend_schema(summary='Show ticket by number'),
update=extend_schema(summary='Update ticket'),
partial_update=extend_schema(summary='Update ticket field'),
destroy=extend_schema(summary='Delete ticket'),
)
2023-08-11 03:38:47 +02:00
class TicketViewSet(viewsets.ModelViewSet):
queryset = Ticket.objects.order_by('-time_create')
lookup_field = 'number'
serializer_class = TicketSerializer
permission_classes = (IsAuthenticated, )
2023-08-11 15:12:51 +02:00
filter_backends = [DjangoFilterBackend, filters.SearchFilter]
filterset_class = TicketFilter
search_fields = ['number']
def perform_create(self, serializer):
serializer.save(user=self.request.user)
class StorageInfo(views.APIView):
"""Info about storage total/used/free space"""
permission_classes = (IsAuthenticated, )
@extend_schema(
responses=StorageInfoSerializer,
summary='Show storage space in bytes'
)
def get(self, request):
return Response(get_mount_fs_info(settings.DATA_DIR))
class TokenStateRoot(views.APIView):
""" Show the message of a specific upload token URL"""
permission_classes = (IsGuestCheckUrls,)
@extend_schema(
responses=TokenStateRootSerializer,
summary='Show info message how get token status'
)
def get(self, request):
message = "to find out the status of the token, place it in the URL"
return Response({"detail": message}, status=status.HTTP_303_SEE_OTHER)
@extend_schema_view(
get=extend_schema(
summary='Show the status of a specific upload token'
)
)
class TokenStateInfo(generics.RetrieveAPIView):
""" Show the status of a specific upload token"""
queryset = Ticket.objects.order_by('-time_create')
lookup_field = 'token'
serializer_class = TokenStateSerializer
permission_classes = (IsGuestCheckUrls,)
class AppHealthInfo(views.APIView):
permission_classes = (IsGuestCheckUrls,)
@extend_schema(
responses=AppHealthInfoSerializer,
summary='Show app status'
)
def get(self, request):
return Response({'status': 'ok'}, status=status.HTTP_200_OK)