1213 lines
51 KiB
Java
1213 lines
51 KiB
Java
package org.gcube.application.geoportal.service.engine.mongo;
|
||
|
||
import static org.gcube.application.cms.serialization.Serialization.asDocumentWithId;
|
||
import static org.gcube.application.cms.serialization.Serialization.convert;
|
||
|
||
import java.io.IOException;
|
||
import java.io.InputStream;
|
||
import java.net.URL;
|
||
import java.security.InvalidParameterException;
|
||
import java.time.LocalDateTime;
|
||
import java.util.ArrayList;
|
||
import java.util.Arrays;
|
||
import java.util.Collections;
|
||
import java.util.Iterator;
|
||
import java.util.List;
|
||
import java.util.UUID;
|
||
import java.util.concurrent.LinkedBlockingQueue;
|
||
import java.util.function.Consumer;
|
||
import java.util.stream.Collectors;
|
||
|
||
import javax.ws.rs.WebApplicationException;
|
||
import javax.ws.rs.core.Response;
|
||
|
||
import org.apache.commons.io.IOUtils;
|
||
import org.bson.Document;
|
||
import org.bson.types.ObjectId;
|
||
import org.gcube.application.cms.implementations.ImplementationProvider;
|
||
import org.gcube.application.cms.implementations.WorkspaceManager;
|
||
import org.gcube.application.cms.implementations.faults.DeletionException;
|
||
import org.gcube.application.cms.implementations.faults.InvalidLockException;
|
||
import org.gcube.application.cms.implementations.faults.InvalidUserRoleException;
|
||
import org.gcube.application.cms.implementations.faults.ProjectLockedException;
|
||
import org.gcube.application.cms.implementations.faults.ProjectNotFoundException;
|
||
import org.gcube.application.cms.implementations.faults.RegistrationException;
|
||
import org.gcube.application.cms.implementations.faults.UnauthorizedAccess;
|
||
import org.gcube.application.cms.implementations.utils.UserUtils;
|
||
import org.gcube.application.cms.plugins.LifecycleManager;
|
||
import org.gcube.application.cms.plugins.faults.EventException;
|
||
import org.gcube.application.cms.plugins.faults.InsufficientPrivileges;
|
||
import org.gcube.application.cms.plugins.faults.StepException;
|
||
import org.gcube.application.cms.plugins.faults.UnrecognizedStepException;
|
||
import org.gcube.application.cms.plugins.reports.DocumentHandlingReport;
|
||
import org.gcube.application.cms.plugins.reports.StepExecutionReport;
|
||
import org.gcube.application.cms.plugins.requests.BaseRequest;
|
||
import org.gcube.application.cms.plugins.requests.EventExecutionRequest;
|
||
import org.gcube.application.cms.plugins.requests.StepExecutionRequest;
|
||
import org.gcube.application.cms.serialization.Serialization;
|
||
import org.gcube.application.geoportal.common.faults.StorageException;
|
||
import org.gcube.application.geoportal.common.model.JSONPathWrapper;
|
||
import org.gcube.application.geoportal.common.model.configuration.Archive;
|
||
import org.gcube.application.geoportal.common.model.configuration.Configuration;
|
||
import org.gcube.application.geoportal.common.model.configuration.Index;
|
||
import org.gcube.application.geoportal.common.model.document.Lock;
|
||
import org.gcube.application.geoportal.common.model.document.Project;
|
||
import org.gcube.application.geoportal.common.model.document.access.Access;
|
||
import org.gcube.application.geoportal.common.model.document.access.AccessPolicy;
|
||
import org.gcube.application.geoportal.common.model.document.accounting.AccountingInfo;
|
||
import org.gcube.application.geoportal.common.model.document.accounting.PublicationInfo;
|
||
import org.gcube.application.geoportal.common.model.document.accounting.User;
|
||
import org.gcube.application.geoportal.common.model.document.filesets.RegisteredFile;
|
||
import org.gcube.application.geoportal.common.model.document.filesets.RegisteredFileSet;
|
||
import org.gcube.application.geoportal.common.model.document.lifecycle.LifecycleInformation;
|
||
import org.gcube.application.geoportal.common.model.document.relationships.Relationship;
|
||
import org.gcube.application.geoportal.common.model.plugins.LifecycleManagerDescriptor;
|
||
import org.gcube.application.geoportal.common.model.rest.ConfigurationException;
|
||
import org.gcube.application.geoportal.common.model.rest.QueryRequest;
|
||
import org.gcube.application.geoportal.common.model.rest.RegisterFileSetRequest;
|
||
import org.gcube.application.geoportal.common.model.rest.TempFile;
|
||
import org.gcube.application.geoportal.common.model.useCaseDescriptor.DataAccessPolicy;
|
||
import org.gcube.application.geoportal.common.model.useCaseDescriptor.Field;
|
||
import org.gcube.application.geoportal.common.model.useCaseDescriptor.HandlerDeclaration;
|
||
import org.gcube.application.geoportal.common.model.useCaseDescriptor.RelationshipDefinition;
|
||
import org.gcube.application.geoportal.common.model.useCaseDescriptor.UseCaseDescriptor;
|
||
import org.gcube.application.geoportal.common.utils.StorageUtils;
|
||
import org.gcube.application.geoportal.service.engine.providers.PluginManager;
|
||
import org.gcube.common.storagehub.client.dsl.FolderContainer;
|
||
import org.gcube.common.storagehub.model.exceptions.StorageHubException;
|
||
|
||
import com.fasterxml.jackson.core.JsonProcessingException;
|
||
import com.mongodb.client.MongoCollection;
|
||
import com.mongodb.client.model.FindOneAndReplaceOptions;
|
||
import com.mongodb.client.model.FindOneAndUpdateOptions;
|
||
import com.mongodb.client.model.ReturnDocument;
|
||
import com.vdurmont.semver4j.Semver;
|
||
|
||
import lombok.Getter;
|
||
import lombok.extern.slf4j.Slf4j;
|
||
|
||
@Slf4j
|
||
public class ProfiledMongoManager extends MongoManager implements MongoManagerI<Project> {
|
||
|
||
@Getter
|
||
UseCaseDescriptor useCaseDescriptor;
|
||
|
||
@Override
|
||
protected String mongoIDFieldName() {
|
||
return ID;
|
||
}
|
||
|
||
public ProfiledMongoManager(String profileId) throws ConfigurationException, RegistrationException {
|
||
// Check UseCaseDescriptor ID
|
||
log.info("Loading useCaseDescriptor ID {} ", profileId);
|
||
if (profileId == null)
|
||
throw new InvalidParameterException("UseCaseDescriptor ID cannot be null");
|
||
useCaseDescriptor = ImplementationProvider.get().getProvidedObjectByClass(UCDManagerI.class).getById(profileId);
|
||
if (useCaseDescriptor == null)
|
||
throw new WebApplicationException("UseCaseDescriptor " + profileId + " not registered",
|
||
Response.Status.NOT_FOUND);
|
||
|
||
// Connect to DB
|
||
init(getToUseCollectionName());
|
||
|
||
}
|
||
|
||
private String getToUseCollectionName() {
|
||
// TODO collection name in UCD
|
||
return useCaseDescriptor.getId();
|
||
}
|
||
|
||
protected Project lock(String id, String op) throws ProjectNotFoundException, ProjectLockedException,
|
||
JsonProcessingException, InvalidUserRoleException, UnauthorizedAccess {
|
||
log.trace("Locking {} cause {} ", id, op);
|
||
|
||
Lock lock = new Lock();
|
||
lock.setId(UUID.randomUUID().toString());
|
||
lock.setInfo(UserUtils.getCurrent().asInfo());
|
||
lock.setOperation(op);
|
||
|
||
// find one and update
|
||
// filter : id, lock == null
|
||
// update with new Lock object
|
||
Document filter = new Document(mongoIDFieldName(), asId(id)).append("$or",
|
||
Arrays.asList(new Document(Project.LOCK, new Document("$exists", false)),
|
||
new Document(Project.LOCK, new Document("$type", "null"))));
|
||
log.debug("Lock filter is {} ", filter.toJson());
|
||
Object obj = getCollection().findOneAndUpdate(
|
||
// filter by id and missing lock
|
||
filter,
|
||
// update lock info
|
||
new Document("$set", new Document(Project.LOCK, Serialization.asDocument(lock))),
|
||
new FindOneAndUpdateOptions().returnDocument(ReturnDocument.AFTER));
|
||
|
||
if (obj == null) {
|
||
// unable to lock, verify cause
|
||
Project p = getByID(id);
|
||
if (p.getLock() != null)
|
||
throw new ProjectLockedException("Project already locked : " + p.getLock());
|
||
else {
|
||
log.error("Unable to lock {} ", id);
|
||
log.debug("Existing project is {} ", p);
|
||
throw new RuntimeException("Unable to lock unlocked project " + id);
|
||
}
|
||
} else
|
||
return Serialization.convert(obj, Project.class);
|
||
}
|
||
|
||
protected Project unlockAndUpdate(Project proj) throws InvalidLockException, ProjectNotFoundException,
|
||
JsonProcessingException, InvalidUserRoleException, UnauthorizedAccess {
|
||
log.trace("Unlocking for update {} lock is {} ", proj.getId(), proj.getLock());
|
||
// find one and update
|
||
Lock oldLock = proj.getLock();
|
||
proj.setLock(null);
|
||
|
||
Document filter = new Document(mongoIDFieldName(), asId(proj.getId())).append(Project.LOCK + "." + Lock.ID,
|
||
oldLock.getId());
|
||
|
||
Object obj = getCollection().findOneAndReplace(
|
||
// filter by id and missing lock
|
||
filter,
|
||
// update lock info
|
||
asDocumentWithId(proj), new FindOneAndReplaceOptions().returnDocument(ReturnDocument.AFTER));
|
||
|
||
if (obj == null) {
|
||
// can-t unlock, check cause
|
||
Project p = getByID(proj.getId());
|
||
throw new InvalidLockException(
|
||
"Found lock for " + p.getId() + " is " + p.getLock() + ", expected is " + oldLock);
|
||
}
|
||
return Serialization.convert(obj, Project.class);
|
||
}
|
||
|
||
protected Project unlockAndPatch(Project proj) throws InvalidLockException, ProjectNotFoundException,
|
||
JsonProcessingException, InvalidUserRoleException, UnauthorizedAccess {
|
||
log.trace("Unlocking for patching {} lock is {} ", proj.getId(), proj.getLock());
|
||
// find one and update
|
||
Lock oldLock = proj.getLock();
|
||
proj.setLock(null);
|
||
|
||
Document filter = new Document(mongoIDFieldName(), asId(proj.getId())).append(Project.LOCK + "." + Lock.ID,
|
||
oldLock.getId());
|
||
|
||
Object obj = getCollection().findOneAndUpdate(
|
||
// filter by id and missing lock
|
||
filter,
|
||
// update lock info
|
||
asDocumentWithId(proj), new FindOneAndUpdateOptions().returnDocument(ReturnDocument.AFTER));
|
||
|
||
if (obj == null) {
|
||
// can-t unlock, check cause
|
||
Project p = getByID(proj.getId());
|
||
throw new InvalidLockException(
|
||
"Found lock for " + p.getId() + " is " + p.getLock() + ", expected is " + oldLock);
|
||
}
|
||
return Serialization.convert(obj, Project.class);
|
||
}
|
||
|
||
protected Project unlock(Project proj)
|
||
throws InvalidLockException, InvalidUserRoleException, ProjectNotFoundException, UnauthorizedAccess {
|
||
log.trace("Unlocking for update {} lock is {} ", proj.getId(), proj.getLock());
|
||
// find one and update
|
||
Lock oldLock = proj.getLock();
|
||
Document filter = new Document(mongoIDFieldName(), asId(proj.getId())).append(Project.LOCK + "." + Lock.ID,
|
||
oldLock.getId());
|
||
|
||
Object obj = getCollection().findOneAndUpdate(
|
||
// filter by id and missing lock
|
||
filter,
|
||
// update lock info
|
||
new Document("$set", new Document(Project.LOCK, null)),
|
||
new FindOneAndUpdateOptions().returnDocument(ReturnDocument.AFTER));
|
||
|
||
if (obj == null) {
|
||
// can-t unlock, check cause
|
||
Project p = getByID(proj.getId());
|
||
throw new InvalidLockException(
|
||
"Found lock for " + p.getId() + " is " + p.getLock() + ", expected is " + oldLock);
|
||
}
|
||
return Serialization.convert(obj, Project.class);
|
||
}
|
||
|
||
@Getter(lazy = true)
|
||
private final LifecycleManager manager = getLCManager();
|
||
|
||
private LifecycleManager getLCManager() {
|
||
try {
|
||
LifecycleManager toReturn = null;
|
||
// Getting Lifecycle Manager declaration from UseCaseDescriptor
|
||
List<HandlerDeclaration> handlerDeclarations = useCaseDescriptor.getHandlersMapByType()
|
||
.get(LifecycleManagerDescriptor.LIFECYCLE_MANAGER_TYPE);
|
||
if (handlerDeclarations == null || handlerDeclarations.isEmpty())
|
||
throw new ConfigurationException(
|
||
"No Lifecycle Handler defined for useCaseDescriptor ID " + useCaseDescriptor.getId());
|
||
if (handlerDeclarations.size() > 1)
|
||
throw new ConfigurationException("Too many Lifecycle Handlers defined (" + handlerDeclarations
|
||
+ ") in useCaseDescriptor ID " + useCaseDescriptor.getId());
|
||
|
||
HandlerDeclaration lcHandlerDeclaration = handlerDeclarations.get(0);
|
||
|
||
// Loading Lifecycle Manager
|
||
log.debug("Looking for handler {} ", lcHandlerDeclaration);
|
||
toReturn = (LifecycleManager) ImplementationProvider.get()
|
||
.getProvidedObjectByClass(PluginManager.PluginMap.class).get(lcHandlerDeclaration.getId());
|
||
if (toReturn == null)
|
||
throw new ConfigurationException(
|
||
"Unable to find Lifecycle Manager Plugin. ID " + lcHandlerDeclaration.getId());
|
||
|
||
return toReturn;
|
||
} catch (Throwable t) {
|
||
log.warn("Unable to load LC Manager ", t);
|
||
return null;
|
||
}
|
||
}
|
||
|
||
@Override
|
||
public Project registerNew(Document toRegisterDoc) throws IOException, InvalidUserRoleException {
|
||
log.info("Registering new document in {} ", useCaseDescriptor.getId());
|
||
log.trace("Going to register {}", toRegisterDoc.toJson());
|
||
|
||
User u = UserUtils.getCurrent().asInfo().getUser();
|
||
final DataAccessPolicy policy = useCaseDescriptor.getMatching(u);
|
||
log.trace("Access policy for user {} is {} ", u, policy);
|
||
|
||
if (policy == null) {
|
||
log.warn("No policy found for {}. Returning empty ", u);
|
||
throw new InvalidUserRoleException("No policy defined for current user roles " + u.getRoles());
|
||
}
|
||
if (policy.getPolicy().getWrite().equals(DataAccessPolicy.Policy.Type.none))
|
||
throw new InvalidUserRoleException("User doesn't have write privileges " + u.getRoles());
|
||
|
||
Project toRegister = new Project();
|
||
toRegister.setTheDocument(toRegisterDoc);
|
||
|
||
PublicationInfo pubInfo = new PublicationInfo();
|
||
pubInfo.setCreationInfo(UserUtils.getCurrent().asInfo());
|
||
|
||
// TODO Set Access From UseCaseDescriptor
|
||
Access access = new Access();
|
||
access.setLicense("CC-BY-4.0");
|
||
access.setPolicy(AccessPolicy.OPEN);
|
||
pubInfo.setAccess(access);
|
||
|
||
toRegister.setInfo(pubInfo);
|
||
|
||
toRegister.setProfileID(useCaseDescriptor.getId());
|
||
toRegister.setProfileVersion(useCaseDescriptor.getVersion());
|
||
toRegister.setVersion(new Semver("1.0.0"));
|
||
|
||
LifecycleInformation draftInfo = new LifecycleInformation().cleanState();
|
||
draftInfo.setPhase(LifecycleInformation.CommonPhases.DRAFT_PHASE);
|
||
draftInfo.setLastOperationStatus(LifecycleInformation.Status.OK);
|
||
toRegister.setLifecycleInformation(draftInfo);
|
||
|
||
// Apply Lifecycle
|
||
toRegister = triggerEvent(toRegister, EventExecutionRequest.Events.ON_INIT_DOCUMENT, null);
|
||
|
||
log.debug("Going to register {} ", toRegister);
|
||
|
||
// Insert object
|
||
ObjectId id = insertDoc(asDocumentWithId(toRegister));
|
||
|
||
log.info("Obtained id {} ", id);
|
||
try {
|
||
return getByID(id.toHexString());
|
||
} catch (ProjectNotFoundException | InvalidUserRoleException | UnauthorizedAccess e) {
|
||
throw new WebApplicationException("Unexpected exception while registering project ", e);
|
||
}
|
||
}
|
||
|
||
@Override
|
||
public Project update(String id, Document toSet) throws IOException, EventException, ProjectLockedException,
|
||
ProjectNotFoundException, InvalidLockException, InvalidUserRoleException, UnauthorizedAccess {
|
||
log.trace("Updating {} ", toSet);
|
||
Project toUpdate = lock(id, "Manual update");
|
||
try {
|
||
|
||
User u = UserUtils.getCurrent().asInfo().getUser();
|
||
final DataAccessPolicy policy = useCaseDescriptor.getMatching(u);
|
||
log.info("Registering Fileset for {} [{}] , policy for {} is {} ", id, useCaseDescriptor.getId(), u,
|
||
policy);
|
||
|
||
if (policy == null) {
|
||
log.warn("No policy found for {}. Returning empty ", u);
|
||
throw new InvalidUserRoleException("No policy defined for current user roles " + u.getRoles());
|
||
}
|
||
if (!policy.canWrite(toUpdate, u))
|
||
throw new UnauthorizedAccess("No edit rights on project " + id);
|
||
|
||
toUpdate.setTheDocument(toSet);
|
||
toUpdate.getLifecycleInformation().cleanState();
|
||
toUpdate = onUpdate(toUpdate);
|
||
return unlockAndUpdate(toUpdate);
|
||
} catch (Throwable t) {
|
||
log.error("Unexpected exception ", t);
|
||
unlock(toUpdate);
|
||
throw t;
|
||
}
|
||
}
|
||
|
||
@Override
|
||
public Project patch(String id, Document toSet) throws IOException, EventException, ProjectLockedException,
|
||
ProjectNotFoundException, InvalidLockException, InvalidUserRoleException, UnauthorizedAccess {
|
||
log.trace("Patching {} ", toSet);
|
||
Project toUpdate = lock(id, "Manual patch");
|
||
try {
|
||
|
||
User u = UserUtils.getCurrent().asInfo().getUser();
|
||
final DataAccessPolicy policy = useCaseDescriptor.getMatching(u);
|
||
log.info("Registering Fileset for {} [{}] , policy for {} is {} ", id, useCaseDescriptor.getId(), u,
|
||
policy);
|
||
|
||
if (policy == null) {
|
||
log.warn("No policy found for {}. Returning empty ", u);
|
||
throw new InvalidUserRoleException("No policy defined for current user roles " + u.getRoles());
|
||
}
|
||
if (!policy.canWrite(toUpdate, u))
|
||
throw new UnauthorizedAccess("No edit rights on project " + id);
|
||
|
||
toUpdate.setTheDocument(toSet);
|
||
toUpdate.getLifecycleInformation().cleanState();
|
||
toUpdate = onPatch(toUpdate);
|
||
return unlockAndPatch(toUpdate);
|
||
} catch (Throwable t) {
|
||
log.error("Unexpected exception ", t);
|
||
unlock(toUpdate);
|
||
throw t;
|
||
}
|
||
}
|
||
|
||
@Override
|
||
public Project setRelation(String id, String relation, String targetUCD, String targetId)
|
||
throws IOException, EventException, ProjectLockedException, ProjectNotFoundException, InvalidLockException,
|
||
InvalidUserRoleException, UnauthorizedAccess, RegistrationException, ConfigurationException {
|
||
Project toUpdate = lock(id, "Set Relation " + relation + " toward " + targetUCD + ":" + targetId);
|
||
try {
|
||
log.info(getUseCaseDescriptor().getId() + ":" + id + " setting relation " + relation + " toward "
|
||
+ targetUCD + ":" + targetId);
|
||
// Check if relation is defined
|
||
String toSetReverseRelation = null;
|
||
List<RelationshipDefinition> existingDefinitions = getUseCaseDescriptor().getRelationshipDefinitions();
|
||
for (RelationshipDefinition def : existingDefinitions)
|
||
if (def.getId().equals(relation))
|
||
toSetReverseRelation = def.getReverseRelationId();
|
||
|
||
log.debug("{} reverse relation for {} is {}", getUseCaseDescriptor().getId(), relation,
|
||
toSetReverseRelation);
|
||
|
||
// check if relation existing
|
||
List<Relationship> relations = toUpdate.getRelationshipsByName(relation);
|
||
if (!relations.isEmpty()) {
|
||
// check if targetUCD+targetID already present
|
||
List matching = relations.stream()
|
||
.filter(r -> r.getTargetID().equals(targetId) && r.getTargetUCD().equals(targetUCD))
|
||
.collect(Collectors.toList());
|
||
if (matching.size() > 0)
|
||
throw new WebApplicationException(
|
||
"Relationship " + relation + " -> " + targetUCD + " : " + targetId + " already set",
|
||
Response.Status.EXPECTATION_FAILED);
|
||
}
|
||
// check if target exists
|
||
ProfiledMongoManager otherManager = (targetUCD.equals(this.useCaseDescriptor.getId())) ? this
|
||
: new ProfiledMongoManager(targetUCD);
|
||
Project other = getByID(targetId);
|
||
|
||
// add relation
|
||
Relationship rel = new Relationship();
|
||
rel.setRelationshipName(relation);
|
||
rel.setTargetID(targetId);
|
||
rel.setTargetUCD(targetUCD);
|
||
toUpdate = onUpdate(toUpdate.addRelation(rel));
|
||
|
||
// set reverse relation
|
||
if (toSetReverseRelation != null) {
|
||
Relationship reverseRel = new Relationship();
|
||
reverseRel.setRelationshipName(toSetReverseRelation);
|
||
reverseRel.setTargetID(id);
|
||
reverseRel.setTargetUCD(getUseCaseDescriptor().getId());
|
||
log.info("Setting reverse relation {} ", reverseRel);
|
||
other = otherManager.lock(other.getId(), "Setting reverse relation " + reverseRel);
|
||
other.addRelation(reverseRel);
|
||
otherManager.unlockAndUpdate(other);
|
||
}
|
||
|
||
return unlockAndUpdate(toUpdate);
|
||
} catch (Throwable t) {
|
||
log.error("Unexpected exception ", t);
|
||
unlock(toUpdate);
|
||
throw t;
|
||
}
|
||
}
|
||
|
||
@Override
|
||
public Project deleteRelation(String id, String relation, String targetUCD, String targetId)
|
||
throws IOException, EventException, ProjectLockedException, ProjectNotFoundException, InvalidLockException,
|
||
InvalidUserRoleException, UnauthorizedAccess, RegistrationException, ConfigurationException {
|
||
log.info("Delete relation {}:{}--{}-->{}:{} ", getUseCaseDescriptor().getId(), id, relation, targetUCD,
|
||
targetId);
|
||
Project toUpdate = lock(id, "Delete Relation");
|
||
|
||
try {
|
||
// SET target UCD to present UCD as default
|
||
final String toUseTargetUCD = (targetUCD == null || targetUCD.equals("")) ? getUseCaseDescriptor().getId()
|
||
: targetUCD;
|
||
|
||
String toDeleteReverseRelation = null;
|
||
List<RelationshipDefinition> existingDefinitions = getUseCaseDescriptor().getRelationshipDefinitions();
|
||
for (RelationshipDefinition def : existingDefinitions)
|
||
if (def.getId().equals(relation))
|
||
toDeleteReverseRelation = def.getReverseRelationId();
|
||
|
||
log.debug("{} reverse relation for {} is {}", getUseCaseDescriptor().getId(), relation,
|
||
toDeleteReverseRelation);
|
||
|
||
// check if relation existing
|
||
List<Relationship> relations = toUpdate.getRelationships();
|
||
if (relations != null && !relations.isEmpty()) {
|
||
int beforeSize = relations.size();
|
||
|
||
ArrayList<Relationship> toRemove = new ArrayList<>();
|
||
for (Relationship r : toUpdate.getRelationships()) {
|
||
if (r.getRelationshipName().equals(relation) && r.getTargetUCD().equals(toUseTargetUCD)
|
||
&& r.getTargetID().equals(targetId)) {
|
||
// set to be remove
|
||
log.debug("Removing {} ", r);
|
||
toRemove.add(r);
|
||
|
||
// delete reverse relation
|
||
if (toDeleteReverseRelation != null) {
|
||
log.debug("Removing reverse of {} ", r);
|
||
ProfiledMongoManager otherManager = (toUseTargetUCD.equals(this.useCaseDescriptor.getId()))
|
||
? this
|
||
: new ProfiledMongoManager(targetUCD);
|
||
Project other = getByID(targetId);
|
||
other = otherManager.lock(other.getId(), "Remove reverse relation "
|
||
+ toDeleteReverseRelation + " toward " + getUseCaseDescriptor().getId() + ":" + id);
|
||
final String finalToDeleteReverseRelation = toDeleteReverseRelation;
|
||
other.getRelationships().removeIf(
|
||
revRel -> revRel.getRelationshipName().equals(finalToDeleteReverseRelation)
|
||
&& revRel.getTargetID().equals(id)
|
||
&& revRel.getTargetUCD().equals(getUseCaseDescriptor().getId()));
|
||
otherManager.unlockAndUpdate(other);
|
||
}
|
||
|
||
}
|
||
}
|
||
|
||
toUpdate.getRelationships().removeAll(toRemove);
|
||
|
||
// update only if something changed
|
||
if (toUpdate.getRelationships().size() != beforeSize) {
|
||
log.debug("Removed {} relations from {} ", (toUpdate.getRelationships().size() != beforeSize), id);
|
||
return unlockAndUpdate(toUpdate);
|
||
}
|
||
}
|
||
log.debug("Relationship not found. Unlocking.. ");
|
||
return unlock(toUpdate);
|
||
} catch (Throwable t) {
|
||
log.error("Unexpected exception ", t);
|
||
unlock(toUpdate);
|
||
throw t;
|
||
}
|
||
}
|
||
|
||
private Project onUpdate(Project toUpdate) throws EventException {
|
||
UserUtils.AuthenticatedUser u = UserUtils.getCurrent();
|
||
toUpdate.getInfo().setLastEditInfo(u.asInfo());
|
||
toUpdate.setVersion(toUpdate.getVersion().withIncPatch());
|
||
return triggerEvent(toUpdate, EventExecutionRequest.Events.ON_INIT_DOCUMENT, null);
|
||
}
|
||
|
||
private Project onPatch(Project toUpdate) throws EventException {
|
||
UserUtils.AuthenticatedUser u = UserUtils.getCurrent();
|
||
toUpdate.getInfo().setLastEditInfo(u.asInfo());
|
||
toUpdate.setVersion(toUpdate.getVersion().withIncPatch());
|
||
return triggerEvent(toUpdate, EventExecutionRequest.Events.ON_UPDATE_DOCUMENT, null);
|
||
}
|
||
|
||
@Override
|
||
public void delete(String id, boolean force)
|
||
throws DeletionException, InvalidUserRoleException, ProjectLockedException, ProjectNotFoundException,
|
||
UnauthorizedAccess, JsonProcessingException, InvalidLockException {
|
||
log.info("Deleting by ID {}, force {}", id, force);
|
||
Project doc = lock(id, "Deletion { force : " + force + "}");
|
||
boolean deleted = false;
|
||
try {
|
||
User u = UserUtils.getCurrent().asInfo().getUser();
|
||
final DataAccessPolicy policy = useCaseDescriptor.getMatching(u);
|
||
log.debug("Delete project {} [{}] , policy for {} is {} ", id, useCaseDescriptor.getId(), u, policy);
|
||
if (policy == null)
|
||
throw new InvalidUserRoleException("No policy defined for current user roles " + u.getRoles());
|
||
if (!policy.canWrite(doc, u))
|
||
throw new UnauthorizedAccess("No edit rights on project " + id);
|
||
|
||
doc = triggerEvent(doc, EventExecutionRequest.Events.ON_DELETE_DOCUMENT, new Document("force", force));
|
||
// Only continue deleting if event was ok
|
||
if (doc.getLifecycleInformation().getLastOperationStatus().equals(LifecycleInformation.Status.OK)) {
|
||
try {
|
||
WorkspaceManager ws = new WorkspaceManager();
|
||
// Get All registered Filesets with payloads
|
||
JSONPathWrapper wrapper = new JSONPathWrapper(useCaseDescriptor.getSchema().toJson());
|
||
for (Object obj : wrapper.getByPath("$..[?(@." + RegisteredFileSet.PAYLOADS + ")]")) {
|
||
Document fs = Serialization.asDocument(obj);
|
||
log.debug("Deleting {}", obj);
|
||
String folderId = fs.getString(RegisteredFileSet.FOLDER_ID);
|
||
ws.deleteItem(folderId);
|
||
}
|
||
} finally {
|
||
super.deleteDoc(asId(id));
|
||
deleted = true;
|
||
}
|
||
}
|
||
} catch (ConfigurationException | StorageHubException e) {
|
||
log.error("Exception while trying to delete {} [UCID {}]", id, useCaseDescriptor.getId());
|
||
throw new DeletionException("Unable to contact Storage ", e);
|
||
} finally {
|
||
if (doc != null && !deleted)
|
||
unlockAndUpdate(doc);
|
||
}
|
||
}
|
||
|
||
@Override
|
||
public Project getByID(String id) throws ProjectNotFoundException, InvalidUserRoleException, UnauthorizedAccess {
|
||
User u = UserUtils.getCurrent().asInfo().getUser();
|
||
DataAccessPolicy policy = useCaseDescriptor.getMatching(u);
|
||
log.info("Accessing Project {} [{}] , policy for {} is {} ", id, useCaseDescriptor.getId(), u, policy);
|
||
|
||
if (policy == null) {
|
||
log.warn("No policy found for {}. Returning empty ", u);
|
||
throw new InvalidUserRoleException("No policy defined for current user roles " + u.getRoles());
|
||
}
|
||
|
||
Document doc = getDocById(asId(id),
|
||
(policy == null || policy.getEnforcer() == null) ? null : policy.getEnforcer().getFilterDocument());
|
||
if (doc == null)
|
||
throw new ProjectNotFoundException("No document with ID " + id);
|
||
|
||
Project p = convert(doc, Project.class);
|
||
if (!policy.canRead(p, u))
|
||
throw new UnauthorizedAccess("No access rights on " + id);
|
||
return p;
|
||
}
|
||
|
||
@Override
|
||
public Iterable<Document> query(QueryRequest queryRequest) throws InvalidUserRoleException {
|
||
LinkedBlockingQueue queue = new LinkedBlockingQueue<Project>();
|
||
User u = UserUtils.getCurrent().asInfo().getUser();
|
||
final DataAccessPolicy policy = useCaseDescriptor.getMatching(u);
|
||
log.info("Querying {} [{}] , policy for {} is {} ", queryRequest, useCaseDescriptor.getId(), u, policy);
|
||
// NB cannot check ownership on returned values, must specify filter
|
||
if (policy == null) {
|
||
log.warn("No policy found for {}. Returning empty ", u);
|
||
throw new InvalidUserRoleException("No policy defined for current user roles " + u.getRoles());
|
||
}
|
||
if (policy.getPolicy().getRead().equals(DataAccessPolicy.Policy.Type.none)) {
|
||
log.info("Read is NONE : Returning empty collection");
|
||
return queue;
|
||
}
|
||
|
||
// NB cannot check ownership on returned values, must specify filter
|
||
Document finalFilter = new Document();
|
||
if (queryRequest.getFilter() != null)
|
||
finalFilter.putAll(queryRequest.getFilter());
|
||
if (policy.getEnforcer() != null)
|
||
finalFilter.putAll(policy.getEnforcer().getFilterDocument());
|
||
if (policy.getPolicy().getRead().equals(DataAccessPolicy.Policy.Type.own))
|
||
finalFilter.put(Project.INFO + "." + PublicationInfo.CREATION_INFO + "." + AccountingInfo.USER + "."
|
||
+ User.USERNAME, u.getUsername());
|
||
queryRequest.setFilter(finalFilter);
|
||
|
||
log.debug("Final filter is {}", queryRequest.getFilter());
|
||
|
||
queryDoc(queryRequest).forEach((Consumer<? super Document>) (Document d) -> {
|
||
try {
|
||
queue.put(d);
|
||
} catch (Throwable t) {
|
||
log.warn("Unable to translate " + d);
|
||
}
|
||
});
|
||
log.info("Returned {} elements ", queue.size());
|
||
return queue;
|
||
}
|
||
|
||
@Override
|
||
public Iterable<Project> filter(QueryRequest queryRequest) throws InvalidUserRoleException {
|
||
LinkedBlockingQueue queue = new LinkedBlockingQueue<Project>();
|
||
User u = UserUtils.getCurrent().asInfo().getUser();
|
||
final DataAccessPolicy policy = useCaseDescriptor.getMatching(u);
|
||
log.info("Querying {} [{}] , policy for {} is {} ", queryRequest, useCaseDescriptor.getId(), u, policy);
|
||
// NB cannot check ownership on returned values, must specify filter
|
||
if (policy == null) {
|
||
log.warn("No policy found for {}. Returning empty ", u);
|
||
throw new InvalidUserRoleException("No policy defined for current user roles " + u.getRoles());
|
||
}
|
||
if (policy.getPolicy().getRead().equals(DataAccessPolicy.Policy.Type.none)) {
|
||
log.info("Read is NONE : Returning empty collection");
|
||
return queue;
|
||
}
|
||
|
||
// NB cannot check ownership on returned values, must specify filter
|
||
Document finalFilter = new Document();
|
||
if (queryRequest.getFilter() != null)
|
||
finalFilter.putAll(queryRequest.getFilter());
|
||
if (policy.getEnforcer() != null)
|
||
finalFilter.putAll(policy.getEnforcer().getFilterDocument());
|
||
if (policy.getPolicy().getRead().equals(DataAccessPolicy.Policy.Type.own))
|
||
finalFilter.put(Project.INFO + "." + PublicationInfo.CREATION_INFO + "." + AccountingInfo.USER + "."
|
||
+ User.USERNAME, u.getUsername());
|
||
queryRequest.setFilter(finalFilter);
|
||
|
||
log.debug("Final filter is {}", queryRequest.getFilter());
|
||
|
||
queryDoc(queryRequest).forEach((Consumer<? super Document>) (Document d) -> {
|
||
try {
|
||
queue.put(d);
|
||
} catch (Throwable t) {
|
||
log.warn("Unable to translate " + d);
|
||
}
|
||
});
|
||
log.info("Returned {} elements ", queue.size());
|
||
return queue;
|
||
}
|
||
|
||
@Override
|
||
public Project performStep(String id, String step, Document options) throws StepException, JsonProcessingException,
|
||
ProjectLockedException, ProjectNotFoundException, InvalidLockException, InvalidUserRoleException,
|
||
UnauthorizedAccess, ConfigurationException, InsufficientPrivileges {
|
||
Project document = lock(id, "Step " + step + " execution");
|
||
try {
|
||
|
||
User u = UserUtils.getCurrent().asInfo().getUser();
|
||
final DataAccessPolicy policy = useCaseDescriptor.getMatching(u);
|
||
log.info("Registering Fileset for {} [{}] , policy for {} is {} ", id, useCaseDescriptor.getId(), u,
|
||
policy);
|
||
// NB cannot check ownership on returned values, must specify filter
|
||
if (policy == null) {
|
||
log.warn("No policy found for {}. Returning empty ", u);
|
||
throw new InvalidUserRoleException("No policy defined for current user roles " + u.getRoles());
|
||
}
|
||
if (!policy.canWrite(document, u))
|
||
throw new UnauthorizedAccess("No edit rights on project " + id);
|
||
|
||
document.getLifecycleInformation().cleanState();
|
||
document = step(document, step, options);
|
||
return unlockAndUpdate(document);
|
||
} catch (UnrecognizedStepException | ConfigurationException | InsufficientPrivileges e) {
|
||
log.debug("Unable to perform step ", e);
|
||
unlock(document);
|
||
throw e;
|
||
} catch (Throwable t) {
|
||
log.error("[UseCaseDescriptor {} ] ERROR Invoking Step {} on document {}", useCaseDescriptor.getId(), step,
|
||
id, t);
|
||
LifecycleInformation info = new LifecycleInformation();
|
||
info.setPhase(document.getLifecycleInformation().getPhase());
|
||
info.setLastOperationStatus(LifecycleInformation.Status.ERROR);
|
||
info.addErrorMessage(t.getMessage());
|
||
info.setLastInvokedStep(step);
|
||
document.setLifecycleInformation(info);
|
||
return unlockAndUpdate(document);
|
||
}
|
||
}
|
||
|
||
/**
|
||
* NB Put at path :
|
||
*
|
||
* Path Examples artifact images images[1] layers[?(@.name = 'myName')].fileset
|
||
*
|
||
*
|
||
*
|
||
*/
|
||
@Override
|
||
public Project registerFileSet(String id, RegisterFileSetRequest request) throws ConfigurationException,
|
||
StorageHubException, StorageException, JsonProcessingException, EventException, ProjectLockedException,
|
||
ProjectNotFoundException, InvalidLockException, InvalidUserRoleException, UnauthorizedAccess {
|
||
log.info("Registering Fileset for {} [useCaseDescriptor ID {}], Request is {} ", id, useCaseDescriptor.getId(),
|
||
request);
|
||
|
||
List<TempFile> files = request.getStreams();
|
||
Document attributes = request.getAttributes();
|
||
Project doc = lock(id, "Register Fileset");
|
||
try {
|
||
|
||
// Checking user rights on proj
|
||
User u = UserUtils.getCurrent().asInfo().getUser();
|
||
final DataAccessPolicy policy = useCaseDescriptor.getMatching(u);
|
||
log.info("Registering Fileset for {} [{}] , policy for {} is {} ", id, useCaseDescriptor.getId(), u,
|
||
policy);
|
||
// NB cannot check ownership on returned values, must specify filter
|
||
if (policy == null) {
|
||
log.warn("No policy found for {}. Returning empty ", u);
|
||
throw new InvalidUserRoleException("No policy defined for current user roles " + u.getRoles());
|
||
}
|
||
if (!policy.canWrite(doc, u))
|
||
throw new UnauthorizedAccess("No edit rights on project " + id);
|
||
|
||
doc.getLifecycleInformation().cleanState();
|
||
doc.getLifecycleInformation().setLastOperationStatus(LifecycleInformation.Status.OK);
|
||
|
||
WorkspaceManager ws = new WorkspaceManager();
|
||
StorageUtils storage = ImplementationProvider.get().getProvidedObjectByClass(StorageUtils.class);
|
||
|
||
log.debug("Checking field {} definition in {}", request.getFieldDefinitionPath(),
|
||
useCaseDescriptor.getId());
|
||
Field fieldDefinition = getFieldDefinition(useCaseDescriptor, request.getFieldDefinitionPath());
|
||
|
||
JSONPathWrapper docWrapper = new JSONPathWrapper(doc.getTheDocument().toJson());
|
||
|
||
List<String> matchingPaths = docWrapper.getMatchingPaths(request.getParentPath());
|
||
if (matchingPaths.size() > 1)
|
||
throw new WebApplicationException(
|
||
"Multiple Destination matching parent path " + request.getParentPath(),
|
||
Response.Status.BAD_REQUEST);
|
||
if (matchingPaths.isEmpty())
|
||
throw new WebApplicationException("PArent path not found at " + request.getParentPath(),
|
||
Response.Status.BAD_REQUEST);
|
||
|
||
String parentMatchingPath = matchingPaths.get(0);
|
||
List<Object> foundElementsByMatchingPaths = docWrapper.getByPath(parentMatchingPath);
|
||
if (foundElementsByMatchingPaths == null || foundElementsByMatchingPaths.isEmpty())
|
||
throw new WebApplicationException("No element found at " + parentMatchingPath,
|
||
Response.Status.BAD_REQUEST);
|
||
|
||
Document parent = Serialization.asDocument(foundElementsByMatchingPaths.get(0));
|
||
|
||
Access toSetAccess = new Access(doc.getInfo().getAccess().getPolicy(),
|
||
doc.getInfo().getAccess().getLicense());
|
||
if (request.getToSetAccess() != null) {
|
||
// TODO validate specified Access
|
||
String requestedLicense = request.getToSetAccess().getLicense();
|
||
if (requestedLicense != null)
|
||
toSetAccess.setLicense(requestedLicense);
|
||
|
||
AccessPolicy requestedPolicy = request.getToSetAccess().getPolicy();
|
||
if (requestedPolicy != null)
|
||
toSetAccess.setPolicy(requestedPolicy);
|
||
}
|
||
|
||
// PREPARE REGISTERED FS
|
||
|
||
// MANAGE CLASH
|
||
switch (request.getClashOption()) {
|
||
case REPLACE_EXISTING: {
|
||
if (fieldDefinition.isCollection())
|
||
throw new WebApplicationException(
|
||
"Cannot replace repeatable field " + request.getFieldDefinitionPath() + ".",
|
||
Response.Status.BAD_REQUEST);
|
||
// DELETE EXISTING AND PUT
|
||
RegisteredFileSet toDelete = Serialization.convert(parent.get(request.getFieldName()),
|
||
RegisteredFileSet.class);
|
||
if (!(toDelete == null) && !(toDelete.isEmpty())) {
|
||
String path = parentMatchingPath + "." + request.getFieldName();
|
||
deleteFileSetRoutine(doc, false, path);
|
||
|
||
}
|
||
RegisteredFileSet fs = prepareRegisteredFileSet(toSetAccess, doc.getId(), useCaseDescriptor.getId(),
|
||
request.getAttributes(), files, storage, ws);
|
||
log.debug("Registered Fileset for [ID {} useCaseDescriptor {}] is {} ", fs, doc.getId(),
|
||
doc.getProfileID());
|
||
docWrapper.putElement(parentMatchingPath, request.getFieldName(), fs);
|
||
break;
|
||
}
|
||
case MERGE_EXISTING: {
|
||
if (fieldDefinition.isCollection())
|
||
throw new WebApplicationException(
|
||
"Cannot merge repeatable field " + request.getFieldDefinitionPath() + ".",
|
||
Response.Status.BAD_REQUEST);
|
||
RegisteredFileSet original = Serialization.convert(parent.get(request.getFieldName()),
|
||
RegisteredFileSet.class);
|
||
// MERGE ATTRIBUTES AND PUT
|
||
Document toUseAttributes = request.getAttributes();
|
||
if (original != null)
|
||
toUseAttributes.putAll(original);
|
||
RegisteredFileSet fs = prepareRegisteredFileSet(toSetAccess, doc.getId(), useCaseDescriptor.getId(),
|
||
toUseAttributes, files, storage, ws);
|
||
log.debug("Registered Fileset for [ID {} useCaseDescriptor {}] is {} ", fs, doc.getId(),
|
||
doc.getProfileID());
|
||
docWrapper.putElement(parentMatchingPath, request.getFieldName(), fs);
|
||
break;
|
||
}
|
||
case APPEND: {
|
||
if (!fieldDefinition.isCollection())
|
||
throw new WebApplicationException(
|
||
"Cannot add to single field " + request.getFieldDefinitionPath() + ".",
|
||
Response.Status.BAD_REQUEST);
|
||
RegisteredFileSet fs = prepareRegisteredFileSet(toSetAccess, doc.getId(), useCaseDescriptor.getId(),
|
||
request.getAttributes(), files, storage, ws);
|
||
log.debug("Registered Fileset for [ID {} useCaseDescriptor {}] is {} ", fs, doc.getId(),
|
||
doc.getProfileID());
|
||
|
||
docWrapper.addElementToArray(String.format("%1ds['%2$s']", parentMatchingPath, request.getFieldName()),
|
||
fs);
|
||
break;
|
||
}
|
||
default: {
|
||
throw new WebApplicationException("Unexpected clash policy " + request.getClashOption(),
|
||
Response.Status.BAD_REQUEST);
|
||
}
|
||
}
|
||
|
||
log.debug("Setting result on profiled document");
|
||
doc.setTheDocument(Document.parse(docWrapper.getValueCTX().jsonString()));
|
||
|
||
doc = onUpdate(doc);
|
||
return unlockAndUpdate(doc);
|
||
} catch (Throwable t) {
|
||
log.warn("Unexpected Exception while trying to registering fileset on {}.", id, t);
|
||
log.debug("Request was {}", request);
|
||
log.debug("Complete doc was {} ", doc);
|
||
unlock(doc);
|
||
throw t;
|
||
}
|
||
}
|
||
|
||
@Override
|
||
public Project deleteFileSet(String id, String path, Boolean force) throws ConfigurationException,
|
||
StorageHubException, JsonProcessingException, DeletionException, EventException, ProjectLockedException,
|
||
ProjectNotFoundException, InvalidLockException, InvalidUserRoleException, UnauthorizedAccess {
|
||
log.info("Deleting Fileset for {} [useCaseDescriptor ID {}], at {} [force {} ]", id, useCaseDescriptor.getId(),
|
||
path, force);
|
||
Project doc = lock(id, "Fileset Deletion");
|
||
try {
|
||
User u = UserUtils.getCurrent().asInfo().getUser();
|
||
final DataAccessPolicy policy = useCaseDescriptor.getMatching(u);
|
||
log.debug("Deleting Fileset for {} [{}] , policy for {} is {} ", doc.getId(), useCaseDescriptor.getId(), u,
|
||
policy);
|
||
// NB cannot check ownership on returned values, must specify filter
|
||
if (policy == null) {
|
||
log.warn("No policy found for {}. Returning empty ", u);
|
||
throw new InvalidUserRoleException("No policy defined for current user roles " + u.getRoles());
|
||
}
|
||
if (!policy.canWrite(doc, u))
|
||
throw new UnauthorizedAccess("No edit rights on project " + doc.getId());
|
||
|
||
doc.getLifecycleInformation().cleanState();
|
||
doc.getLifecycleInformation().cleanState().setLastOperationStatus(LifecycleInformation.Status.OK);
|
||
|
||
doc = deleteFileSetRoutine(doc, force, path);
|
||
return unlockAndUpdate(doc);
|
||
} catch (Throwable t) {
|
||
log.warn("Unexpected Exception while trying to delete fileset on {}.", id, t);
|
||
unlock(doc);
|
||
throw t;
|
||
}
|
||
}
|
||
|
||
@Override
|
||
public Project forceUnlock(String id) throws InvalidUserRoleException, ProjectNotFoundException, UnauthorizedAccess,
|
||
JsonProcessingException, InvalidLockException {
|
||
Project toUnlock = null;
|
||
try {
|
||
toUnlock = lock(id, "Check locked for force unlock");
|
||
throw new WebApplicationException("Project " + id + " not locked", Response.Status.EXPECTATION_FAILED);
|
||
} catch (ProjectLockedException e) {
|
||
// expected exception
|
||
toUnlock = getByID(id);
|
||
} finally {
|
||
if (toUnlock != null)
|
||
return unlock(toUnlock);
|
||
else
|
||
throw new WebApplicationException("Unable to get Project " + id, Response.Status.EXPECTATION_FAILED);
|
||
}
|
||
}
|
||
|
||
@Override
|
||
public Project setAccessPolicy(String id, Access access)
|
||
throws InvalidUserRoleException, ProjectLockedException, ProjectNotFoundException, UnauthorizedAccess,
|
||
JsonProcessingException, InvalidLockException, EventException {
|
||
log.trace("UCD {}, Project {} : Setting Access {}", useCaseDescriptor.getId(), id, access);
|
||
Project toUpdate = lock(id, "Set Access policy");
|
||
try {
|
||
|
||
User u = UserUtils.getCurrent().asInfo().getUser();
|
||
final DataAccessPolicy policy = useCaseDescriptor.getMatching(u);
|
||
|
||
if (policy == null) {
|
||
log.warn("No policy found for {}. Returning empty ", u);
|
||
throw new InvalidUserRoleException("No policy defined for current user roles " + u.getRoles());
|
||
}
|
||
if (!policy.canWrite(toUpdate, u))
|
||
throw new UnauthorizedAccess("No edit rights on project " + id);
|
||
|
||
toUpdate.getInfo().setAccess(access);
|
||
toUpdate.getLifecycleInformation().cleanState();
|
||
toUpdate = onUpdate(toUpdate);
|
||
return unlockAndUpdate(toUpdate);
|
||
} catch (Throwable t) {
|
||
log.error("Unexpected exception ", t);
|
||
unlock(toUpdate);
|
||
throw t;
|
||
}
|
||
}
|
||
|
||
private Project deleteFileSetRoutine(Project doc, Boolean force, String path)
|
||
throws ConfigurationException, StorageHubException {
|
||
log.info("Delete[force : {}] FS at {} for {}:{}", force, path, doc.getProfileID(), doc.getId());
|
||
JSONPathWrapper wrapper = new JSONPathWrapper(doc.getTheDocument().toJson());
|
||
List<String> matchingPaths = wrapper.getMatchingPaths(path);
|
||
if (matchingPaths.isEmpty())
|
||
throw new WebApplicationException("No Registered FileSet found at " + path, Response.Status.BAD_REQUEST);
|
||
if (matchingPaths.size() > 1)
|
||
throw new WebApplicationException("Multiple Fileset (" + matchingPaths.size() + ") matching " + path,
|
||
Response.Status.BAD_REQUEST);
|
||
|
||
RegisteredFileSet fs = Serialization.convert(wrapper.getByPath(path).get(0), RegisteredFileSet.class);
|
||
log.debug("Going to delete {}", fs);
|
||
|
||
// Updated by Francesco. See #24902
|
||
doc = triggerEvent(doc, EventExecutionRequest.Events.ON_DELETE_FILESET,
|
||
new Document("force", force).append("path", path).append("fileSetPath", path));
|
||
// reloading the document in the wrapper
|
||
wrapper = new JSONPathWrapper(doc.getTheDocument().toJson());
|
||
|
||
// Actually delete only if event was ok
|
||
if (doc.getLifecycleInformation().getLastOperationStatus().equals(LifecycleInformation.Status.OK)) {
|
||
// Delete from storage
|
||
if (fs.getFolderId() != null) {
|
||
try {
|
||
log.info("Deleting Fileset Folder ID {} ", fs.getFolderId());
|
||
new WorkspaceManager().deleteItem(fs.getFolderId());
|
||
} catch (Exception e) {
|
||
// Updated by Francesco. See #24902
|
||
LifecycleInformation info = doc.getLifecycleInformation();
|
||
if (info == null) {
|
||
info = new LifecycleInformation();
|
||
}
|
||
info.addErrorMessage("Unable to delete the Folder ID " + fs.getFolderId() + " in the VRE Folder");
|
||
info.setLastOperationStatus(LifecycleInformation.Status.WARNING);
|
||
log.warn("Error on deleting the Folder ID {} in the VRE Folder", fs.getFolderId(), e);
|
||
}
|
||
}
|
||
log.debug("Removing FS from document [ID : ] by path {}", doc.getId(), path);
|
||
// Delete from document
|
||
wrapper.setElement(path, null);
|
||
|
||
}
|
||
// Updated by Francesco. See #24902
|
||
log.debug("Setting result on profiled document");
|
||
doc.setTheDocument(Document.parse(wrapper.getValueCTX().jsonString()));
|
||
return doc;
|
||
}
|
||
|
||
@Override
|
||
public Configuration getConfiguration() throws ConfigurationException {
|
||
String context = UserUtils.getCurrent().getContext();
|
||
log.debug("Asking configuration for {} in {} ", useCaseDescriptor.getId(), context);
|
||
Configuration toReturn = new Configuration();
|
||
List<Archive> archives = new ArrayList<>();
|
||
toReturn.setArchives(archives);
|
||
List<Index> indexes = new ArrayList<>();
|
||
toReturn.setIndexes(indexes);
|
||
// Set Basic Info
|
||
toReturn.setProfileId(this.getUseCaseDescriptor().getId());
|
||
toReturn.setContext(context);
|
||
toReturn.setLastUpdatedTime(LocalDateTime.now());
|
||
|
||
// Add Mongo Info
|
||
Archive mongoArchive = new Archive("DOCUMENT-STORE-COLLECTION");
|
||
MongoCollection coll = getCollection();
|
||
mongoArchive.put("count", coll.count());
|
||
mongoArchive.put("collection_name", getToUseCollectionName());
|
||
|
||
// Get counts by PHASE, Status
|
||
try {
|
||
ArrayList<Document> counts = new ArrayList<>();
|
||
|
||
coll.aggregate(Collections.singletonList(Document.parse("{\"$group\" : "
|
||
+ "{\"_id\":{\"phase\":\"$_lifecycleInformation._phase\",\"status\":\"$_lifecycleInformation._lastOperationStatus\"}, "
|
||
+ "\"count\":{\"$sum\":1}}}"))).forEach((Consumer) doc -> {
|
||
try {
|
||
counts.add(Serialization.asDocument(doc));
|
||
} catch (JsonProcessingException e) {
|
||
log.warn("Unable to write aggregated results ", e);
|
||
}
|
||
});
|
||
|
||
mongoArchive.put("countByPhase", counts);
|
||
} catch (Throwable t) {
|
||
toReturn.addErrorMessage("Unable to get PHASE statistics " + t.getMessage());
|
||
log.error("Unable to get PHASE statistics", t);
|
||
}
|
||
archives.add(mongoArchive);
|
||
|
||
// TODO ADD TEXT INDEXES
|
||
|
||
// Set WS Info
|
||
try {
|
||
archives.add(new WorkspaceManager().getConfiguration());
|
||
} catch (Exception e) {
|
||
toReturn.addErrorMessage("Unable to get WS info " + e.getMessage());
|
||
log.error("Unable to get WS Configuration", e);
|
||
}
|
||
|
||
// ADD LC Infos
|
||
|
||
AccountingInfo user = UserUtils.getCurrent().asInfo();
|
||
try {
|
||
Configuration lcConfig = getLCManager()
|
||
.getCurrentConfiguration(new BaseRequest(useCaseDescriptor, user.getUser(), user.getContext()));
|
||
log.info("Configuration is {} ", lcConfig);
|
||
if (lcConfig.getArchives() != null)
|
||
archives.addAll(lcConfig.getArchives());
|
||
|
||
if (lcConfig.getIndexes() != null)
|
||
indexes.addAll(lcConfig.getIndexes());
|
||
} catch (Throwable e) {
|
||
toReturn.addErrorMessage("Unable to get Lifecycle info " + e.getMessage());
|
||
log.error("Unable to get Lifecycle info ", e);
|
||
}
|
||
|
||
log.debug("Returning current configuration {}", toReturn);
|
||
return toReturn;
|
||
}
|
||
|
||
private Project step(Project theDocument, String step, Document callParameters)
|
||
throws InsufficientPrivileges, ConfigurationException, StepException {
|
||
try {
|
||
log.info("[UseCaseDescriptor {}] Invoking Step {} on {}", useCaseDescriptor.getId(), step,
|
||
getManager().getDescriptor());
|
||
AccountingInfo user = UserUtils.getCurrent().asInfo();
|
||
|
||
StepExecutionRequest request = new StepExecutionRequest(useCaseDescriptor, user.getUser(),
|
||
user.getContext(), theDocument, step);
|
||
request.setCallParameters(callParameters);
|
||
|
||
log.debug("Requesting Step Execution {}", request);
|
||
StepExecutionReport report = getManager().performStep(request);
|
||
Project toReturn = report.prepareResult();
|
||
|
||
// EVENTS
|
||
if (report.getToTriggerEvents() != null) {
|
||
Iterator<EventExecutionRequest> eventIT = report.getToTriggerEvents().listIterator();
|
||
while (!toReturn.getLifecycleInformation().getLastOperationStatus()
|
||
.equals(LifecycleInformation.Status.ERROR) && eventIT.hasNext()) {
|
||
EventExecutionRequest triggerRequest = eventIT.next();
|
||
log.info("Triggering {} ", triggerRequest);
|
||
toReturn = triggerEvent(toReturn, triggerRequest.getEvent(), triggerRequest.getCallParameters());
|
||
}
|
||
}
|
||
|
||
// STEPS
|
||
if (report.getCascadeSteps() != null) {
|
||
Iterator<StepExecutionRequest> stepIT = report.getCascadeSteps().listIterator();
|
||
while (!toReturn.getLifecycleInformation().getLastOperationStatus()
|
||
.equals(LifecycleInformation.Status.ERROR) && stepIT.hasNext()) {
|
||
StepExecutionRequest triggerRequest = stepIT.next();
|
||
log.info("Triggering {} ", triggerRequest);
|
||
toReturn = step(toReturn, triggerRequest.getStep(), triggerRequest.getCallParameters());
|
||
}
|
||
}
|
||
return report.prepareResult();
|
||
} catch (InsufficientPrivileges | ConfigurationException | UnrecognizedStepException e) {
|
||
throw e;
|
||
} catch (Throwable t) {
|
||
log.error("Unable to perform step " + step, t);
|
||
theDocument.getLifecycleInformation()
|
||
.addErrorMessage("Unable to perform step " + step + " cause : " + t.getMessage());
|
||
theDocument.getLifecycleInformation().setLastOperationStatus(LifecycleInformation.Status.ERROR);
|
||
return theDocument;
|
||
}
|
||
}
|
||
|
||
private Project triggerEvent(Project project, String event, Document parameters) {
|
||
try {
|
||
log.info("[UseCaseDescriptor {}] triggering event {} on {}", useCaseDescriptor.getId(), event,
|
||
getManager().getDescriptor());
|
||
AccountingInfo user = UserUtils.getCurrent().asInfo();
|
||
EventExecutionRequest request = new EventExecutionRequest(useCaseDescriptor, user.getUser(),
|
||
user.getContext(), project, event);
|
||
request.setCallParameters(parameters);
|
||
log.debug("Triggering {}", request);
|
||
DocumentHandlingReport report = getManager().onEvent(request);
|
||
return report.prepareResult();
|
||
} catch (Throwable t) {
|
||
log.error("Unable to trigger event " + event, t);
|
||
project.getLifecycleInformation()
|
||
.addErrorMessage("Unable to trigger " + event + " cause : " + t.getMessage());
|
||
project.getLifecycleInformation().setLastOperationStatus(LifecycleInformation.Status.ERROR);
|
||
return project;
|
||
}
|
||
}
|
||
|
||
private static final RegisteredFileSet prepareRegisteredFileSet(Access toSetAccess, String docID, String profileID,
|
||
Document attributes, List<TempFile> files, StorageUtils storage, WorkspaceManager ws)
|
||
throws StorageHubException, StorageException {
|
||
log.debug("Preparing Registered FileSet {}");
|
||
RegisteredFileSet toReturn = new RegisteredFileSet();
|
||
if (attributes != null)
|
||
toReturn.putAll(attributes);
|
||
String uuid = UUID.randomUUID().toString();
|
||
toReturn.putIfAbsent(RegisteredFileSet.UUID, uuid);
|
||
toReturn.putIfAbsent(RegisteredFileSet.CREATION_INFO, UserUtils.getCurrent().asInfo());
|
||
toReturn.putIfAbsent(RegisteredFileSet.ACCESS, toSetAccess);
|
||
|
||
// FOLDER
|
||
String folderID = toReturn.getFolderId();
|
||
log.trace("Folder ID is {} ", folderID);
|
||
FolderContainer sectionFolder = null;
|
||
if (folderID == null || folderID.isEmpty()) {
|
||
|
||
// Get BASE Folder for project
|
||
FolderContainer base = ws.getSubFolder(ws.getAppBase(), docID,
|
||
"Base Folder for profiled document. UseCaseDescriptor " + profileID);
|
||
// Create Folder for FileSet
|
||
sectionFolder = ws.createFolder(
|
||
new WorkspaceManager.FolderOptions(docID + "_" + uuid, "Registered Fileset uuid " + uuid, base));
|
||
toReturn.put(RegisteredFileSet.FOLDER_ID, sectionFolder.getId());
|
||
} else {
|
||
sectionFolder = ws.getFolderById(folderID);
|
||
}
|
||
|
||
ArrayList<RegisteredFile> registeredFiles = new ArrayList<>();
|
||
|
||
if (toReturn.containsKey(RegisteredFileSet.PAYLOADS))
|
||
registeredFiles.addAll(toReturn.getPayloads());
|
||
|
||
for (TempFile f : files) {
|
||
InputStream is = null;
|
||
try {
|
||
log.debug("Opening temp file {}", f);
|
||
String fileUrl = null;
|
||
if (f.getId() == null || f.getId().isEmpty())
|
||
fileUrl = f.getUrl();
|
||
else
|
||
fileUrl = storage.getURL(f.getId());
|
||
|
||
log.debug("Got URL {} from ID {}", fileUrl, f.getId());
|
||
is = new URL(fileUrl).openStream();
|
||
RegisteredFile registered = ws.registerFile(new WorkspaceManager.FileOptions(f.getFilename(), is,
|
||
"Imported via gcube CMS service ", sectionFolder));
|
||
log.debug("Registered " + registered);
|
||
registeredFiles.add(registered);
|
||
} catch (StorageHubException | IOException e) {
|
||
throw new StorageException("Unable to store " + f, e);
|
||
} finally {
|
||
if (is != null)
|
||
IOUtils.closeQuietly(is);
|
||
}
|
||
}
|
||
toReturn.put(RegisteredFileSet.PAYLOADS, registeredFiles);
|
||
// TODO MERGE
|
||
// toReturn.remove(RegisteredFileSet.MATERIALIZATIONS);
|
||
return toReturn;
|
||
}
|
||
|
||
private static Field getFieldDefinition(UseCaseDescriptor useCaseDescriptor, String fieldPath)
|
||
throws WebApplicationException {
|
||
JSONPathWrapper schemaWrapper = new JSONPathWrapper(useCaseDescriptor.getSchema().toJson());
|
||
List<Field> fieldDefinitions = schemaWrapper.getByPath(fieldPath, Field.class);
|
||
if (fieldDefinitions == null || fieldDefinitions.isEmpty())
|
||
throw new WebApplicationException(
|
||
"No Field found in schema " + useCaseDescriptor.getId() + " at " + fieldPath,
|
||
Response.Status.BAD_REQUEST);
|
||
if (fieldDefinitions.size() > 1)
|
||
throw new WebApplicationException("Multiple field definitions (" + fieldDefinitions.size() + ") found in "
|
||
+ useCaseDescriptor.getId() + " for " + fieldPath, Response.Status.BAD_REQUEST);
|
||
Field fieldDefinition = Serialization.convert(fieldDefinitions.get(0), Field.class);
|
||
if (fieldDefinition == null)
|
||
throw new WebApplicationException(
|
||
"Found field is null [" + useCaseDescriptor.getId() + " for " + fieldPath + "]",
|
||
Response.Status.BAD_REQUEST);
|
||
log.trace("Field definition is {}", fieldDefinition);
|
||
return fieldDefinition;
|
||
}
|
||
}
|