mirror of
https://github.com/yunionio/cloudpods.git
synced 2026-05-07 22:24:32 +08:00
* notify: log with context info * region: guests: log with context info * region: hosts: log with context info * region: misc: remove redundant log * region: skus: use NewInternalServerError instead of NewGeneralError * appsrv: dispatcher: preserve text id * appsrv: dispatcher: remove commented-out code * cloudcommon: db_dispatcher: note errors that won't be translated * cloudcommon: db: rbac: preserve text id * cloudcommon: caller: preserve text id * treewide: fix fmt string * region: guest_actions: preserve text id * region: guest_actions: fix fmt string * region: usages: fix fmt string * mcclient: hosts: remove redundant return value * cloudcommon: fetch: preserve text id * region: guest_template: preserve text id * cloudcommon: db: db_dispatcher: preserve text id * region: guest_actions: preserve text id * httperrors: add funcs for wrap lang tag into context * vendor: golang.org/x/text * httperrors: error with context * httperrors: HTTPError * treewide: fix typo * treewide: use en in source code * locales: initial version
94 lines
2.5 KiB
Go
94 lines
2.5 KiB
Go
// Copyright 2019 Yunion
|
|
//
|
|
// Licensed under the Apache License, Version 2.0 (the "License");
|
|
// you may not use this file except in compliance with the License.
|
|
// You may obtain a copy of the License at
|
|
//
|
|
// http://www.apache.org/licenses/LICENSE-2.0
|
|
//
|
|
// Unless required by applicable law or agreed to in writing, software
|
|
// distributed under the License is distributed on an "AS IS" BASIS,
|
|
// WITHOUT WARRANTIES OR CONDITIONS OF ANY KIND, either express or implied.
|
|
// See the License for the specific language governing permissions and
|
|
// limitations under the License.
|
|
|
|
package usages
|
|
|
|
import (
|
|
"context"
|
|
"fmt"
|
|
"net/http"
|
|
|
|
"yunion.io/x/jsonutils"
|
|
|
|
"yunion.io/x/onecloud/pkg/appsrv"
|
|
"yunion.io/x/onecloud/pkg/cloudcommon/consts"
|
|
"yunion.io/x/onecloud/pkg/cloudcommon/policy"
|
|
"yunion.io/x/onecloud/pkg/httperrors"
|
|
"yunion.io/x/onecloud/pkg/keystone/models"
|
|
"yunion.io/x/onecloud/pkg/mcclient/auth"
|
|
"yunion.io/x/onecloud/pkg/util/rbacutils"
|
|
)
|
|
|
|
func AddUsageHandler(prefix string, app *appsrv.Application) {
|
|
prefix = fmt.Sprintf("%s/usages", prefix)
|
|
app.AddHandler2("GET", prefix, auth.Authenticate(ReportGeneralUsage), nil, "get_usage", nil)
|
|
}
|
|
|
|
func ReportGeneralUsage(ctx context.Context, w http.ResponseWriter, r *http.Request) {
|
|
// _, query, _ := appsrv.FetchEnv(ctx, w, r)
|
|
userCred := auth.FetchUserCredential(ctx, policy.FilterPolicyCredential)
|
|
|
|
isAdmin := false
|
|
if consts.IsRbacEnabled() {
|
|
if policy.PolicyManager.Allow(rbacutils.ScopeSystem, userCred, consts.GetServiceType(),
|
|
"usages", policy.PolicyActionGet) == rbacutils.Allow {
|
|
isAdmin = true
|
|
}
|
|
} else {
|
|
isAdmin = userCred.IsAllow(rbacutils.ScopeSystem, consts.GetServiceType(), "usages", policy.PolicyActionGet)
|
|
}
|
|
|
|
var adminUsage map[string]int
|
|
// var projectUsage map[string]int64
|
|
if isAdmin {
|
|
adminUsage = models.Usage()
|
|
}
|
|
|
|
/* isProject := false
|
|
if consts.IsRbacEnabled() {
|
|
if policy.PolicyManager.Allow(false, userCred, consts.GetServiceType(),
|
|
"usages", policy.PolicyActionGet) == rbacutils.Deny {
|
|
isProject = false
|
|
} else {
|
|
isProject = true
|
|
}
|
|
} else {
|
|
isProject = true
|
|
}
|
|
|
|
if isProject {
|
|
projectUsage = models.Usage(userCred.GetProjectId(), "")
|
|
}
|
|
*/
|
|
|
|
// if !isAdmin && !isProject {
|
|
if !isAdmin {
|
|
httperrors.ForbiddenError(ctx, w, "not allow to get usage")
|
|
return
|
|
}
|
|
|
|
usages := jsonutils.NewDict()
|
|
// if isProject {
|
|
// usages.Update(jsonutils.Marshal(projectUsage))
|
|
// }
|
|
|
|
if isAdmin {
|
|
usages.Update(jsonutils.Marshal(adminUsage))
|
|
}
|
|
|
|
body := jsonutils.NewDict()
|
|
body.Add(usages, "usage")
|
|
appsrv.SendJSON(w, body)
|
|
}
|