| 123456789101112131415161718192021222324252627282930313233343536373839404142434445464748495051525354555657585960616263646566676869707172737475767778798081828384858687888990919293949596979899 |
- // Copyright 2019 Yunion
- //
- // Licensed under the Apache License, Version 2.0 (the "License");
- // you may not use this file except in compliance with the License.
- // You may obtain a copy of the License at
- //
- // http://www.apache.org/licenses/LICENSE-2.0
- //
- // Unless required by applicable law or agreed to in writing, software
- // distributed under the License is distributed on an "AS IS" BASIS,
- // WITHOUT WARRANTIES OR CONDITIONS OF ANY KIND, either express or implied.
- // See the License for the specific language governing permissions and
- // limitations under the License.
- package usages
- import (
- "context"
- "fmt"
- "net/http"
- "yunion.io/x/jsonutils"
- "yunion.io/x/pkg/util/rbacscope"
- "yunion.io/x/onecloud/pkg/appsrv"
- "yunion.io/x/onecloud/pkg/cloudcommon/consts"
- "yunion.io/x/onecloud/pkg/cloudcommon/db"
- "yunion.io/x/onecloud/pkg/cloudcommon/policy"
- "yunion.io/x/onecloud/pkg/httperrors"
- "yunion.io/x/onecloud/pkg/keystone/models"
- "yunion.io/x/onecloud/pkg/mcclient/auth"
- "yunion.io/x/onecloud/pkg/util/tagutils"
- )
- func AddUsageHandler(prefix string, app *appsrv.Application) {
- prefix = fmt.Sprintf("%s/usages", prefix)
- app.AddHandler2("GET", prefix, auth.Authenticate(ReportGeneralUsage), nil, "get_usage", nil)
- }
- func ReportGeneralUsage(ctx context.Context, w http.ResponseWriter, r *http.Request) {
- _, query, _ := appsrv.FetchEnv(ctx, w, r)
- userCred := auth.FetchUserCredential(ctx, policy.FilterPolicyCredential)
- _, _, err, result := db.FetchUsageOwnerScope(ctx, userCred, query)
- if err != nil {
- httperrors.GeneralServerError(ctx, w, err)
- return
- }
- projectTags := &tagutils.TTagSetList{}
- query.Unmarshal(projectTags, "project_tags")
- for i := range result.ProjectTags {
- projectTags.Append(result.ProjectTags[i])
- }
- result.ProjectTags = *projectTags
- isAdmin := false
- if policy.PolicyManager.Allow(rbacscope.ScopeSystem, userCred, consts.GetServiceType(),
- "usages", policy.PolicyActionGet).Result.IsAllow() {
- isAdmin = true
- }
- var adminUsage map[string]int
- // var projectUsage map[string]int64
- if isAdmin {
- adminUsage = models.Usage(ctx, result)
- }
- /*isProject := false
- if policy.PolicyManager.Allow(false, userCred, consts.GetServiceType(),
- "usages", policy.PolicyActionGet) == rbacutils.Deny {
- isProject = false
- } else {
- isProject = true
- }
- if isProject {
- projectUsage = models.Usage(userCred.GetProjectId(), "")
- }*/
- // if !isAdmin && !isProject {
- if !isAdmin {
- httperrors.ForbiddenError(ctx, w, "not allow to get usage")
- return
- }
- usages := jsonutils.NewDict()
- // if isProject {
- // usages.Update(jsonutils.Marshal(projectUsage))
- // }
- if isAdmin {
- usages.Update(jsonutils.Marshal(adminUsage))
- }
- body := jsonutils.NewDict()
- body.Add(usages, "usage")
- appsrv.SendJSON(w, body)
- }
|