mirror of
https://github.com/moghtech/komodo.git
synced 2025-12-05 19:17:36 -06:00
* start 1.18.5 * prevent empty additional permission check (ie for new resources) * dev-2 * bump rust to 1.88 * tweaks * repo based stack commit happens from core repo cache rather than on server to simplify * clippy auto fix * clippy lints periphery * clippy fix komodo_client * dev-3 * emphasize ferret version pinning * bump svi with PR fix * dev-4 * webhook disabled early return * Fix missing alert types for whitelist * add "ScheduleRun" * fix status cache not cleaning on resource delete * dev-5 * forgot to pipe through poll in previous refactor * refetch given in ms * fix configure build extra args * reorder resource sync config * Implement ability to run actions at startup (#664) * Implement ability to run actions at startup * run post-startup actions after server is listening * startup use action query * fmt * Fix Google Login enabled message (#668) - it was showing "Github Login" instead of "Google Login" * Allow CIDR ranges in Allowed IPs (#666) * Allow CIDR ranges in Allowed IPs * Catch mixed IPv4/IPv6 mappings that are probably intended to match * forgiving vec * dev-6 * forgiving vec log. allowed ips docs * server stats UI: move current disk breakdown above charts * searchable container stats, toggle collaple container / disk sections * Add Clear repo cache method * fix execute usage docs * Komodo managed env-file should take precedence in all cases (ie come last in env file list) * tag include unused flag for future use * combine users page search * util backup / restore * refactor backup/restore duplication * cleanup restore * core image include util binary * dev-7 * back to LinesCodec * dev-8 * clean up * clean up logs * rename to komodo-util * dev-9 * enable_fance_toml * dev-10 enable fancy toml * add user agent to oidc requests (#701) Co-authored-by: eleith <online-github@eleith.com> * fmt * use database library * clippy lint * consolidate and standardize cli * dev-11 * dev-12 implement backup using cli * dev-13 logs * command variant fields need to be #[arg] * tweak cli * gen client * fix terminal reconnect issue * rename cli to `km` * tweaks for the cli logs * wait for enter on --yes empty println * fix --yes * dev-15 * bump deps * update croner to latest, use static parser * dev-16 * cli execute polls updates until complete before logging * remove repo cache mount * cli nice * /backup -> /backups * dev-17 config loading preserves CONFIG_PATHS precedence * update dockerfile default docker cli config keywords * dev-18 * support .kmignore * add ignores log * Implement automatic backup pruning, default 14 backups before prune * db copy / restore uses idempotent upsert * cli update variable - "km set var VAR value" * improve cli initial logs * time the executions * implement update for most resources * dev 20 * add update page * dev 21 support cli update link * dev-22 test the deploy * dev-23 use indexmap * install-cli.py * Frontend mobile fixes (#714) * Allow ResourcePageHeader items to wrap * Allow CardHeader items to wrap * Increase z-index of sticky TableHeader, fixes #690 * Remove fixed widths from ActionButton, let them flex more to fit more layouts * Make Section scroll overflow * Remove grid class from Tabs, seems to prevent them from overflowing at small sizes * deploy 1.18.5-dev-24 * auto version increment and deploy * cli: profiles support aliases and merge on top of Default (root) config * fix page set titles * rust 1.89 and improve config logs * skip serializing for proper merge * fix clippy lints re 1.89 * remove layouts overflow-x-scroll * deploy 1.18.5-dev-25 * 1.89 docker images not ready yet * km cfg -a (print all profiles) * include commit variables * skip serializing profiles when empty * skip serialize default db / log configs * km cfg --debug print mode * correct defaults for CLI and only can pass restore folder from cli arg * some more skip serialization * db restore / copy index optional * add runfile command aliases * remove second schedule updating loop, can causes some schedules to be missed * deploy 1.18.5-dev-26 * add log when target db indexing disabled * cli: user password reset, update user super admin * Add manual network interface configuration for multi-NIC Docker environments (#719) * Add iproute2 to debian-debs * feat: Add manual network interface configuration for multi-NIC support Complete implementation of manual interface configuration: - Add internet_interface config option - Implement manual gateway routing - Add NET_ADMIN capability requirement - Clean up codebase changes * fix: Update internet interface handling for multi-NIC support * refactor: Enhance error messages and logging in networking module * refactor: Simplify interface argument handling and improve logging in network configuration and cleanup * refactor(network): simplify startup integration and improve error handling - Move config access and error handling into network::configure_internet_gateway() - Simplify startup.rs to single function call without parameters - Remove redundant check_network_privileges() function - Improve error handling by checking actual command output instead of pre-validation - Better separation of concerns between startup and network modules Addresses feedback from PR discussion: https://github.com/moghtech/komodo/pull/719#discussion_r2261542921 * fix(config): update default internet interface setting Addresses feedback from PR discussion: https://github.com/moghtech/komodo/pull/719#discussion_r2261552279 * fix(config): remove custom default for internet interface in CoreConfig * move mod.rs -> network.rs Addresses feedback from PR discussion: https://github.com/moghtech/komodo/pull/719#discussion_r2261558332 * add internet interface example * docs(build-images): document multi-platform builds with Docker Buildx (#721) * docs(build-images): add multi-platform buildx guide to builders.md * docs(build-images): add multi-platform buildx guide and clarify platform selection in Komodo UI Extra Args field * move to 1.19.0 * core support reading from multiple config files * config support yaml * deploy 1.19.0-dev-1 * deploy 1.19.0-dev-2 * add default komodo cli config * better config merge with base * no need to panic if empty config paths * improve km --help * prog on cli docs * tweak cli docs * tweak doc * split the runfile commands * update docsite deps * km ps initial * km ls * list resource apis * km con inspect * deploy 1.19.0-dev-3 * fix: need serde default * dev-4 fix container parsing issue * tweak * use include-based file finding for much faster discovery * just move to standard config dir .config/komodo/komodo.cli.* * update fe w/ new contianer info minimal serialization * add links to table names * deploy 1.19.0-dev-5 * links in tables * backend for Action arguments * deploy 1.19.0-dev-6 * deploy 1.19.0-dev-7 * deploy 1.19.0-dev-8 * no space at front of KeyValue default args * webhook branch / body optional * The incoming arguments * deploy 1.19.0-dev-9 * con -> cn * add config -> cf alias * .kmignore * .peripheryinclude * outdated * optional links, configurable table format * table_format -> table_borders * get types * include docsite in yarn install * update runnables command in docs * tweak * improve km ls only show important stuff * Add BackupCoreDatabase * deploy 1.19.0-dev-10 * backup command needs "--yes" * deploy 1.19.0-dev-11 * update rustc 1.89.0 * cli tweak * try chef * Fix chef (after dependencies) * try other compile command * fix * fix comment * cleanup stats page * ensure database backup procedure * UI allow configure Backup Core Database in Procedures * procedure description * deploy 1.19.0-dev-12 * deploy 1.19.0-dev-13 * GlobalAutoUpdate * deploy 1.19.0-dev-14 * default tags and global auto update procedure * deploy 1.19.0-dev-15 * trim the default procedure descriptions * deploy 1.19.0-dev-16 * in "system" theme, also poll for updates to the theme based on time. * Add next run to Action / Procedure column * km ls support filter by templates * fix procedure toml serialization when params = {} * deploy 1.19.0-dev-17 * KOMODO_INIT_ADMIN_USERNAME * KOMODO_FIRST_SERVER_NAME * add server.config.external_address for use with links * deploy 1.19.0-dev-18 * improve auto prune * fix system theme auto update * deploy 1.19.0-dev-19 * rename auth/CreateLocalUser -> SignUpLocalUser. Add write/CreateLocalUser for in-ui initialization. * deploy 1.19.0-dev-20 * UI can handle multiple active logins * deploy 1.19.0-dev-21 * fix * add logout function * fix oauth redirect * fix multi user exchange token function * default external address * just Add * style account switcher * backup and restore docs * rework docsite file / sidebar structure, start auto update docs * auto update docs * tweak * fix doc links * only pull / update running stacks / deployments images * deploy 1.19.0-dev-22 * deploy 1.19.0-dev-23 * fix #737 * community docs * add BackupCoreDatabase link to docs * update ferret v2 update guide using komodo-cli * fix data table headers overlapping topbar * don't alert when deploying * CommitSync returns Update * deploy 1.19.0-dev-24 * trim the decoded branch * action uses file contents deserializer * deploy 1.19.0-dev-25 * remove Toml from action args format * clarify External Address purpose * Fix podman compatibility in `get_container_stats` (#739) * Add podman compability for querying stats Podman and docker stats differ in results in significant ways but this filter change they will output the same stats * syntax fix * feat(dashboard): display CPU, memory, and disk usage on server cards (#729) * feat: mini-stats-card: Expose Server CPU , Memory, Disk Usage to Dashboard View * comment: resolved * Feat: fix overflow card , DRY stats-mini, add unreachable mini stats * lint: fix * deploy 1.19.0-dev-26 * 1.19.0 * linux, macos container install * cli main config --------- Co-authored-by: Brian Bradley <brian.bradley.p@gmail.com> Co-authored-by: Daniel <daniel.barabasa@gmail.com> Co-authored-by: eleith <eleith@users.noreply.github.com> Co-authored-by: eleith <online-github@eleith.com> Co-authored-by: Sam Edwards <sam@samedwards.ca> Co-authored-by: Marcel Pfennig <82059270+MP-Tool@users.noreply.github.com> Co-authored-by: itsmesid <693151+arevindh@users.noreply.github.com> Co-authored-by: mbecker20 <max@mogh.tech> Co-authored-by: Rhyn <Rhyn@users.noreply.github.com> Co-authored-by: Anh Nguyen <tuananh131001@gmail.com>
496 lines
13 KiB
Rust
496 lines
13 KiB
Rust
use std::{
|
|
collections::HashMap,
|
|
str::FromStr,
|
|
sync::{Arc, OnceLock},
|
|
};
|
|
|
|
use anyhow::{Context, anyhow};
|
|
use async_timing_util::{ONE_MIN_MS, unix_timestamp_ms};
|
|
use database::mungos::{
|
|
find::find_collect,
|
|
mongodb::{
|
|
bson::{Document, doc, oid::ObjectId},
|
|
options::FindOneOptions,
|
|
},
|
|
};
|
|
use komodo_client::entities::{
|
|
Operation, ResourceTarget, ResourceTargetVariant,
|
|
action::{Action, ActionState},
|
|
alerter::Alerter,
|
|
build::Build,
|
|
builder::Builder,
|
|
deployment::{Deployment, DeploymentState},
|
|
docker::container::{ContainerListItem, ContainerStateStatusEnum},
|
|
permission::{PermissionLevel, PermissionLevelAndSpecifics},
|
|
procedure::{Procedure, ProcedureState},
|
|
repo::Repo,
|
|
server::{Server, ServerState},
|
|
stack::{Stack, StackServiceNames, StackState},
|
|
stats::SystemInformation,
|
|
sync::ResourceSync,
|
|
tag::Tag,
|
|
update::Update,
|
|
user::{User, admin_service_user},
|
|
user_group::UserGroup,
|
|
variable::Variable,
|
|
};
|
|
use periphery_client::api::stats;
|
|
use tokio::sync::Mutex;
|
|
|
|
use crate::{
|
|
config::core_config,
|
|
permission::get_user_permission_on_resource,
|
|
resource::{self, KomodoResource},
|
|
stack::compose_container_match_regex,
|
|
state::{
|
|
action_state_cache, action_states, db_client,
|
|
deployment_status_cache, procedure_state_cache,
|
|
stack_status_cache,
|
|
},
|
|
};
|
|
|
|
use super::periphery_client;
|
|
|
|
// user: Id or username
|
|
#[instrument(level = "debug")]
|
|
pub async fn get_user(user: &str) -> anyhow::Result<User> {
|
|
if let Some(user) = admin_service_user(user) {
|
|
return Ok(user);
|
|
}
|
|
db_client()
|
|
.users
|
|
.find_one(id_or_username_filter(user))
|
|
.await
|
|
.context("failed to query mongo for user")?
|
|
.with_context(|| format!("no user found with {user}"))
|
|
}
|
|
|
|
#[instrument(level = "debug")]
|
|
pub async fn get_server_with_state(
|
|
server_id_or_name: &str,
|
|
) -> anyhow::Result<(Server, ServerState)> {
|
|
let server = resource::get::<Server>(server_id_or_name).await?;
|
|
let state = get_server_state(&server).await;
|
|
Ok((server, state))
|
|
}
|
|
|
|
#[instrument(level = "debug")]
|
|
pub async fn get_server_state(server: &Server) -> ServerState {
|
|
if !server.config.enabled {
|
|
return ServerState::Disabled;
|
|
}
|
|
// Unwrap ok: Server disabled check above
|
|
match super::periphery_client(server)
|
|
.unwrap()
|
|
.request(periphery_client::api::GetHealth {})
|
|
.await
|
|
{
|
|
Ok(_) => ServerState::Ok,
|
|
Err(_) => ServerState::NotOk,
|
|
}
|
|
}
|
|
|
|
#[instrument(level = "debug")]
|
|
pub async fn get_deployment_state(
|
|
id: &String,
|
|
) -> anyhow::Result<DeploymentState> {
|
|
if action_states()
|
|
.deployment
|
|
.get(id)
|
|
.await
|
|
.map(|s| s.get().map(|s| s.deploying))
|
|
.transpose()
|
|
.ok()
|
|
.flatten()
|
|
.unwrap_or_default()
|
|
{
|
|
return Ok(DeploymentState::Deploying);
|
|
}
|
|
let state = deployment_status_cache()
|
|
.get(id)
|
|
.await
|
|
.unwrap_or_default()
|
|
.curr
|
|
.state;
|
|
Ok(state)
|
|
}
|
|
|
|
/// Can pass all the containers from the same server
|
|
pub fn get_stack_state_from_containers(
|
|
ignore_services: &[String],
|
|
services: &[StackServiceNames],
|
|
containers: &[ContainerListItem],
|
|
) -> StackState {
|
|
// first filter the containers to only ones which match the service
|
|
let services = services
|
|
.iter()
|
|
.filter(|service| {
|
|
!ignore_services.contains(&service.service_name)
|
|
})
|
|
.collect::<Vec<_>>();
|
|
let containers = containers.iter().filter(|container| {
|
|
services.iter().any(|StackServiceNames { service_name, container_name, .. }| {
|
|
match compose_container_match_regex(container_name)
|
|
.with_context(|| format!("failed to construct container name matching regex for service {service_name}"))
|
|
{
|
|
Ok(regex) => regex,
|
|
Err(e) => {
|
|
warn!("{e:#}");
|
|
return false
|
|
}
|
|
}.is_match(&container.name)
|
|
})
|
|
}).collect::<Vec<_>>();
|
|
if containers.is_empty() {
|
|
return StackState::Down;
|
|
}
|
|
if services.len() > containers.len() {
|
|
return StackState::Unhealthy;
|
|
}
|
|
let running = containers.iter().all(|container| {
|
|
container.state == ContainerStateStatusEnum::Running
|
|
});
|
|
if running {
|
|
return StackState::Running;
|
|
}
|
|
let paused = containers.iter().all(|container| {
|
|
container.state == ContainerStateStatusEnum::Paused
|
|
});
|
|
if paused {
|
|
return StackState::Paused;
|
|
}
|
|
let stopped = containers.iter().all(|container| {
|
|
container.state == ContainerStateStatusEnum::Exited
|
|
});
|
|
if stopped {
|
|
return StackState::Stopped;
|
|
}
|
|
let restarting = containers.iter().all(|container| {
|
|
container.state == ContainerStateStatusEnum::Restarting
|
|
});
|
|
if restarting {
|
|
return StackState::Restarting;
|
|
}
|
|
let dead = containers.iter().all(|container| {
|
|
container.state == ContainerStateStatusEnum::Dead
|
|
});
|
|
if dead {
|
|
return StackState::Dead;
|
|
}
|
|
let removing = containers.iter().all(|container| {
|
|
container.state == ContainerStateStatusEnum::Removing
|
|
});
|
|
if removing {
|
|
return StackState::Removing;
|
|
}
|
|
StackState::Unhealthy
|
|
}
|
|
|
|
#[instrument(level = "debug")]
|
|
pub async fn get_stack_state(
|
|
stack: &Stack,
|
|
) -> anyhow::Result<StackState> {
|
|
if stack.config.server_id.is_empty() {
|
|
return Ok(StackState::Down);
|
|
}
|
|
let state = stack_status_cache()
|
|
.get(&stack.id)
|
|
.await
|
|
.unwrap_or_default()
|
|
.curr
|
|
.state;
|
|
Ok(state)
|
|
}
|
|
|
|
#[instrument(level = "debug")]
|
|
pub async fn get_tag(id_or_name: &str) -> anyhow::Result<Tag> {
|
|
let query = match ObjectId::from_str(id_or_name) {
|
|
Ok(id) => doc! { "_id": id },
|
|
Err(_) => doc! { "name": id_or_name },
|
|
};
|
|
db_client()
|
|
.tags
|
|
.find_one(query)
|
|
.await
|
|
.context("failed to query mongo for tag")?
|
|
.with_context(|| format!("no tag found matching {id_or_name}"))
|
|
}
|
|
|
|
#[instrument(level = "debug")]
|
|
pub async fn get_tag_check_owner(
|
|
id_or_name: &str,
|
|
user: &User,
|
|
) -> anyhow::Result<Tag> {
|
|
let tag = get_tag(id_or_name).await?;
|
|
if user.admin || tag.owner == user.id {
|
|
return Ok(tag);
|
|
}
|
|
Err(anyhow!("user must be tag owner or admin"))
|
|
}
|
|
|
|
pub async fn get_all_tags(
|
|
filter: impl Into<Option<Document>>,
|
|
) -> anyhow::Result<Vec<Tag>> {
|
|
find_collect(&db_client().tags, filter, None)
|
|
.await
|
|
.context("failed to query db for tags")
|
|
}
|
|
|
|
pub async fn get_id_to_tags(
|
|
filter: impl Into<Option<Document>>,
|
|
) -> anyhow::Result<HashMap<String, Tag>> {
|
|
let res = find_collect(&db_client().tags, filter, None)
|
|
.await
|
|
.context("failed to query db for tags")?
|
|
.into_iter()
|
|
.map(|tag| (tag.id.clone(), tag))
|
|
.collect();
|
|
Ok(res)
|
|
}
|
|
|
|
#[instrument(level = "debug")]
|
|
pub async fn get_user_user_groups(
|
|
user_id: &str,
|
|
) -> anyhow::Result<Vec<UserGroup>> {
|
|
find_collect(
|
|
&db_client().user_groups,
|
|
doc! {
|
|
"$or": [
|
|
{ "everyone": true },
|
|
{ "users": user_id },
|
|
]
|
|
},
|
|
None,
|
|
)
|
|
.await
|
|
.context("failed to query db for user groups")
|
|
}
|
|
|
|
#[instrument(level = "debug")]
|
|
pub async fn get_user_user_group_ids(
|
|
user_id: &str,
|
|
) -> anyhow::Result<Vec<String>> {
|
|
let res = get_user_user_groups(user_id)
|
|
.await?
|
|
.into_iter()
|
|
.map(|ug| ug.id)
|
|
.collect();
|
|
Ok(res)
|
|
}
|
|
|
|
pub fn user_target_query(
|
|
user_id: &str,
|
|
user_groups: &[UserGroup],
|
|
) -> anyhow::Result<Vec<Document>> {
|
|
let mut user_target_query = vec![
|
|
doc! { "user_target.type": "User", "user_target.id": user_id },
|
|
];
|
|
let user_groups = user_groups.iter().map(|ug| {
|
|
doc! {
|
|
"user_target.type": "UserGroup", "user_target.id": &ug.id,
|
|
}
|
|
});
|
|
user_target_query.extend(user_groups);
|
|
Ok(user_target_query)
|
|
}
|
|
|
|
pub async fn get_user_permission_on_target(
|
|
user: &User,
|
|
target: &ResourceTarget,
|
|
) -> anyhow::Result<PermissionLevelAndSpecifics> {
|
|
match target {
|
|
ResourceTarget::System(_) => Ok(PermissionLevel::None.into()),
|
|
ResourceTarget::Build(id) => {
|
|
get_user_permission_on_resource::<Build>(user, id).await
|
|
}
|
|
ResourceTarget::Builder(id) => {
|
|
get_user_permission_on_resource::<Builder>(user, id).await
|
|
}
|
|
ResourceTarget::Deployment(id) => {
|
|
get_user_permission_on_resource::<Deployment>(user, id).await
|
|
}
|
|
ResourceTarget::Server(id) => {
|
|
get_user_permission_on_resource::<Server>(user, id).await
|
|
}
|
|
ResourceTarget::Repo(id) => {
|
|
get_user_permission_on_resource::<Repo>(user, id).await
|
|
}
|
|
ResourceTarget::Alerter(id) => {
|
|
get_user_permission_on_resource::<Alerter>(user, id).await
|
|
}
|
|
ResourceTarget::Procedure(id) => {
|
|
get_user_permission_on_resource::<Procedure>(user, id).await
|
|
}
|
|
ResourceTarget::Action(id) => {
|
|
get_user_permission_on_resource::<Action>(user, id).await
|
|
}
|
|
ResourceTarget::ResourceSync(id) => {
|
|
get_user_permission_on_resource::<ResourceSync>(user, id).await
|
|
}
|
|
ResourceTarget::Stack(id) => {
|
|
get_user_permission_on_resource::<Stack>(user, id).await
|
|
}
|
|
}
|
|
}
|
|
|
|
pub fn id_or_name_filter(id_or_name: &str) -> Document {
|
|
match ObjectId::from_str(id_or_name) {
|
|
Ok(id) => doc! { "_id": id },
|
|
Err(_) => doc! { "name": id_or_name },
|
|
}
|
|
}
|
|
|
|
pub fn id_or_username_filter(id_or_username: &str) -> Document {
|
|
match ObjectId::from_str(id_or_username) {
|
|
Ok(id) => doc! { "_id": id },
|
|
Err(_) => doc! { "username": id_or_username },
|
|
}
|
|
}
|
|
|
|
pub async fn get_variable(name: &str) -> anyhow::Result<Variable> {
|
|
db_client()
|
|
.variables
|
|
.find_one(doc! { "name": &name })
|
|
.await
|
|
.context("failed at call to db")?
|
|
.with_context(|| {
|
|
format!("no variable found with given name: {name}")
|
|
})
|
|
}
|
|
|
|
pub async fn get_latest_update(
|
|
resource_type: ResourceTargetVariant,
|
|
id: &str,
|
|
operation: Operation,
|
|
) -> anyhow::Result<Option<Update>> {
|
|
db_client()
|
|
.updates
|
|
.find_one(doc! {
|
|
"target.type": resource_type.as_ref(),
|
|
"target.id": id,
|
|
"operation": operation.as_ref()
|
|
})
|
|
.with_options(
|
|
FindOneOptions::builder()
|
|
.sort(doc! { "start_ts": -1 })
|
|
.build(),
|
|
)
|
|
.await
|
|
.context("failed to query db for latest update")
|
|
}
|
|
|
|
pub struct VariablesAndSecrets {
|
|
pub variables: HashMap<String, String>,
|
|
pub secrets: HashMap<String, String>,
|
|
}
|
|
|
|
pub async fn get_variables_and_secrets()
|
|
-> anyhow::Result<VariablesAndSecrets> {
|
|
let variables = find_collect(&db_client().variables, None, None)
|
|
.await
|
|
.context("failed to get all variables from db")?;
|
|
let mut secrets = core_config().secrets.clone();
|
|
|
|
// extend secrets with secret variables
|
|
secrets.extend(
|
|
variables.iter().filter(|variable| variable.is_secret).map(
|
|
|variable| (variable.name.clone(), variable.value.clone()),
|
|
),
|
|
);
|
|
|
|
// collect non secret variables
|
|
let variables = variables
|
|
.into_iter()
|
|
.filter(|variable| !variable.is_secret)
|
|
.map(|variable| (variable.name, variable.value))
|
|
.collect();
|
|
|
|
Ok(VariablesAndSecrets { variables, secrets })
|
|
}
|
|
|
|
// This protects the peripheries from spam requests
|
|
const SYSTEM_INFO_EXPIRY: u128 = ONE_MIN_MS;
|
|
type SystemInfoCache =
|
|
Mutex<HashMap<String, Arc<(SystemInformation, u128)>>>;
|
|
fn system_info_cache() -> &'static SystemInfoCache {
|
|
static SYSTEM_INFO_CACHE: OnceLock<SystemInfoCache> =
|
|
OnceLock::new();
|
|
SYSTEM_INFO_CACHE.get_or_init(Default::default)
|
|
}
|
|
|
|
pub async fn get_system_info(
|
|
server: &Server,
|
|
) -> anyhow::Result<SystemInformation> {
|
|
let mut lock = system_info_cache().lock().await;
|
|
let res = match lock.get(&server.id) {
|
|
Some(cached) if cached.1 > unix_timestamp_ms() => {
|
|
cached.0.clone()
|
|
}
|
|
_ => {
|
|
let stats = periphery_client(server)?
|
|
.request(stats::GetSystemInformation {})
|
|
.await?;
|
|
lock.insert(
|
|
server.id.clone(),
|
|
(stats.clone(), unix_timestamp_ms() + SYSTEM_INFO_EXPIRY)
|
|
.into(),
|
|
);
|
|
stats
|
|
}
|
|
};
|
|
Ok(res)
|
|
}
|
|
|
|
/// Get last time procedure / action was run using Update query.
|
|
/// Ignored whether run was successful.
|
|
pub async fn get_last_run_at<R: KomodoResource>(
|
|
id: &String,
|
|
) -> anyhow::Result<Option<i64>> {
|
|
let resource_type = R::resource_type();
|
|
let res = db_client()
|
|
.updates
|
|
.find_one(doc! {
|
|
"target.type": resource_type.as_ref(),
|
|
"target.id": id,
|
|
"operation": format!("Run{resource_type}"),
|
|
"status": "Complete"
|
|
})
|
|
.sort(doc! { "start_ts": -1 })
|
|
.await
|
|
.context("Failed to query updates collection for last run time")?
|
|
.map(|u| u.start_ts);
|
|
Ok(res)
|
|
}
|
|
|
|
pub async fn get_action_state(id: &String) -> ActionState {
|
|
if action_states()
|
|
.action
|
|
.get(id)
|
|
.await
|
|
.map(|s| s.get().map(|s| s.running))
|
|
.transpose()
|
|
.ok()
|
|
.flatten()
|
|
.unwrap_or_default()
|
|
{
|
|
return ActionState::Running;
|
|
}
|
|
action_state_cache().get(id).await.unwrap_or_default()
|
|
}
|
|
|
|
pub async fn get_procedure_state(id: &String) -> ProcedureState {
|
|
if action_states()
|
|
.procedure
|
|
.get(id)
|
|
.await
|
|
.map(|s| s.get().map(|s| s.running))
|
|
.transpose()
|
|
.ok()
|
|
.flatten()
|
|
.unwrap_or_default()
|
|
{
|
|
return ProcedureState::Running;
|
|
}
|
|
procedure_state_cache().get(id).await.unwrap_or_default()
|
|
}
|