updated documentation for Monitor API calls.
[monitor.git] / web / MonitorWeb / monitorweb / monitor_xmlrpc.py
index a0c5052..45f5c01 100644 (file)
@@ -5,8 +5,52 @@ import turbogears
 from datetime import datetime, timedelta
 import time
 
-from monitor.database.info.model import *
-from monitor.database.info.interface import *
+try:
+       from monitor.database.info.model import *
+       from monitor.database.info.interface import *
+except:
+       pass
+
+try:
+    from PLC.Parameter import Parameter, Mixed
+except:
+    def Parameter(a = None, b = None): pass
+    def Mixed(a = None, b = None, c = None): pass
+
+def export_to_docbook(**kwargs):
+
+    keywords = {
+        "group" : "Monitor",
+        "status" : "current",
+        "name": None,
+        "args": None,
+        "roles": [],
+        "accepts": [],
+        "returns": [],
+    }
+    def export(method):
+        def args():
+            # Inspect method. Remove self from the argument list.
+            max_args = method.func_code.co_varnames[0:method.func_code.co_argcount]
+            defaults = method.func_defaults
+            if defaults is None:
+                defaults = ()
+            min_args = max_args[0:len(max_args) - len(defaults)]
+
+            defaults = tuple([None for arg in min_args]) + defaults
+            return (min_args, max_args, defaults)
+
+        keywords['name'] = method.__name__
+        keywords['args'] = args
+        for arg in keywords:
+            method.__setattr__(arg, keywords[arg])
+
+        for arg in kwargs:
+            method.__setattr__(arg, kwargs[arg])
+        return method
+
+    return export
+
 
 class MonitorXmlrpcServerMethods:
        @cherrypy.expose
@@ -75,13 +119,24 @@ class MonitorXmlrpcServer(object):
        # User-defined functions must use cherrypy.expose; turbogears.expose
        #       does additional checking of the response type that we don't want.
        @cherrypy.expose
+       @export_to_docbook(roles=['tech', 'user', 'pi', 'admin'],
+                          accepts=[],
+                                          returns=Parameter(bool, 'True if successful'))
        def upAndRunning(self):
+               """ This call can indicate to a script whether the server is up
+               and running before trying any more sophisticated operations. """
                return True
 
        # SITES ------------------------------------------------------------
 
        @cherrypy.expose
+       @export_to_docbook(roles=['tech', 'user', 'pi', 'admin'],
+                          accepts=[Parameter(dict, "Auth struct")],
+                                          returns=Parameter(list, 'array of SiteStatus records'))
        def getSiteStatus(self, auth):
+               """ This call returns a list that includes the status and observations 
+               of all sites, including those blacklisted.  At this time, there is no
+               indication which sites are blacklisted from this list. """
                ret_list = []
                sites = HistorySiteRecord.query.all()
                for q in sites:
@@ -91,7 +146,12 @@ class MonitorXmlrpcServer(object):
                return ret_list
 
        @cherrypy.expose
+       @export_to_docbook(roles=['admin'],
+                          accepts=[Parameter(dict, "Auth struct")],
+                                          returns=Parameter(bool, 'True on success.'))
        def clearSitePenalty(self, auth, loginbase):
+               """ Rather than waiting for monitor to run automatically, this call
+                       will manually clear a site's penalties. """
                sitehist = SiteInterface.get_or_make(loginbase=loginbase)
                sitehist.clearPenalty()
                #sitehist.applyPenalty()
@@ -100,7 +160,12 @@ class MonitorXmlrpcServer(object):
                return True
 
        @cherrypy.expose
+       @export_to_docbook(roles=['admin'],
+                          accepts=[Parameter(dict, "Auth struct")],
+                                          returns=Parameter(bool, 'True on success.'))
        def increaseSitePenalty(self, auth, loginbase):
+               """ Rather than waiting for monitor to run automatically, this call
+                       will manually increase a site's penalties."""
                sitehist = SiteInterface.get_or_make(loginbase=loginbase)
                sitehist.increasePenalty()
                #sitehist.applyPenalty()
@@ -110,7 +175,13 @@ class MonitorXmlrpcServer(object):
        # NODES ------------------------------------------------------------
 
        @cherrypy.expose
+       @export_to_docbook(roles=['tech', 'user', 'pi', 'admin'],
+                          accepts=[Parameter(dict, "Auth struct")],
+                                          returns=Parameter(list, 'array of NodeStatus records.'))
        def getNodeStatus(self, auth):
+               """ This call returns a list of all nodes, including those
+                       blacklisted.  The current observation and recorded status of each node
+                       is returned."""
                ret_list = []
                sites = HistoryNodeRecord.query.all()
                for q in sites:
@@ -120,14 +191,28 @@ class MonitorXmlrpcServer(object):
                return ret_list
 
        @cherrypy.expose
+       @export_to_docbook(roles=['tech', 'user', 'pi', 'admin'],
+                          accepts=[Parameter(dict, "Auth struct")],
+                                          returns=Parameter(bool, 'True on success.'))
        def getRecentActions(self, auth, loginbase=None, hostname=None):
+               """ Monitor takes various actions on sites (such as applying
+                       penalties) and nodes (such as repairing a node installation via
+                       BootManager).  As well, it makes a log of every email message sent
+                       out, or believed to be sent.  This call returns a list of all actions,
+                       filtered on site or for a specific node. """
                ret_list = []
                return ret_list
 
        # BLACKLIST ------------------------------------------------------------
 
        @cherrypy.expose
+       @export_to_docbook(roles=['tech', 'user', 'pi', 'admin'],
+                          accepts=[Parameter(dict, "Auth struct")],
+                                          returns=Parameter(bool, 'True on success.'))
        def getBlacklist(self, auth):
+               """ Return a list of all nodes and sites that are excluded from
+               penalties.  Currently there is no way to exclude a node or site 
+               from being monitored. """
                bl = BlacklistRecord.query.all()
                ret_list = []
                for q in bl:
@@ -136,20 +221,37 @@ class MonitorXmlrpcServer(object):
                        ret_list.append(d)
 
                return ret_list
-               # datetime.datetime.fromtimestamp(time.mktime(time.strptime(mytime, time_format)))
        
        @cherrypy.expose
+       @export_to_docbook(roles=['admin'],
+                          accepts=[Parameter(dict, "Auth struct"), 
+                                                               Parameter(str, "hostname"), 
+                                                               Parameter(int, "expires number of seconds from time.now()")],
+                                          returns=Parameter(bool, 'True on success.'))
        def addHostToBlacklist(self, auth, hostname, expires=0):
+               """ Add a host to the blacklist, with an optional expiration time"""
                bl = BlacklistRecord.findby_or_create(hostname=hostname, expires=expires)
                return True
 
        @cherrypy.expose
+       @export_to_docbook(roles=['admin'],
+                          accepts=[Parameter(dict, "Auth struct"),
+                                                               Parameter(str, "loginbase"), 
+                                                               Parameter(int, "expires number of seconds from time.now()")],
+                                          returns=Parameter(bool, 'True on success.'))
        def addSiteToBlacklist(self, auth, loginbase, expires=0):
+               """ Add a site to the blacklist, with an optional expiration time"""
                bl = BlacklistRecord.findby_or_create(hostname=hostname, expires=expires)
                return True
 
        @cherrypy.expose
+       @export_to_docbook(roles=['admin'],
+                          accepts=[Parameter(dict, "Auth struct"),
+                                                               Parameter(str, "loginbase"), 
+                                                               Parameter(str, "hostname"),],
+                                          returns=Parameter(bool, 'True on success.'))
        def deleteFromBlacklist(self, auth, loginbase=None, hostname=None):
+               """ Remove a host or site from the blacklist """
                if (loginbase==None and hostname == None) or (loginbase != None and hostname != None):
                        raise Exception("Please specify a single record to delete: either hostname or loginbase")
                elif loginbase != None: