mirror of https://github.com/gogits/gogs.git
You can not select more than 25 topics
Topics must start with a letter or number, can include dashes ('-') and can be up to 35 characters long.
443 lines
13 KiB
443 lines
13 KiB
// Copyright 2014 The Gogs Authors. All rights reserved. |
|
// Use of this source code is governed by a MIT-style |
|
// license that can be found in the LICENSE file. |
|
|
|
package setting |
|
|
|
import ( |
|
"fmt" |
|
"os" |
|
"os/exec" |
|
"path" |
|
"path/filepath" |
|
"strings" |
|
|
|
"github.com/Unknwon/com" |
|
"github.com/Unknwon/goconfig" |
|
|
|
"github.com/gogits/cache" |
|
"github.com/gogits/session" |
|
|
|
"github.com/gogits/gogs/modules/bin" |
|
"github.com/gogits/gogs/modules/log" |
|
) |
|
|
|
type Scheme string |
|
|
|
const ( |
|
HTTP Scheme = "http" |
|
HTTPS Scheme = "https" |
|
) |
|
|
|
var ( |
|
// App settings. |
|
AppVer string |
|
AppName string |
|
AppLogo string |
|
AppUrl string |
|
|
|
// Server settings. |
|
Protocol Scheme |
|
Domain string |
|
HttpAddr, HttpPort string |
|
SshPort int |
|
OfflineMode bool |
|
DisableRouterLog bool |
|
CertFile, KeyFile string |
|
StaticRootPath string |
|
|
|
// Security settings. |
|
InstallLock bool |
|
SecretKey string |
|
LogInRememberDays int |
|
CookieUserName string |
|
CookieRememberName string |
|
ReverseProxyAuthUser string |
|
|
|
// Webhook settings. |
|
WebhookTaskInterval int |
|
WebhookDeliverTimeout int |
|
|
|
// Repository settings. |
|
RepoRootPath string |
|
ScriptType string |
|
|
|
// Picture settings. |
|
PictureService string |
|
DisableGravatar bool |
|
|
|
// Log settings. |
|
LogRootPath string |
|
LogModes []string |
|
LogConfigs []string |
|
|
|
// Attachment settings. |
|
AttachmentPath string |
|
AttachmentAllowedTypes string |
|
AttachmentMaxSize int64 |
|
AttachmentMaxFiles int |
|
AttachmentEnabled bool |
|
|
|
// Cache settings. |
|
Cache cache.Cache |
|
CacheAdapter string |
|
CacheConfig string |
|
|
|
EnableRedis bool |
|
EnableMemcache bool |
|
|
|
// Session settings. |
|
SessionProvider string |
|
SessionConfig *session.Config |
|
SessionManager *session.Manager |
|
|
|
// Global setting objects. |
|
Cfg *goconfig.ConfigFile |
|
CustomPath string // Custom directory path. |
|
ProdMode bool |
|
RunUser string |
|
) |
|
|
|
func ExecPath() (string, error) { |
|
file, err := exec.LookPath(os.Args[0]) |
|
if err != nil { |
|
return "", err |
|
} |
|
p, err := filepath.Abs(file) |
|
if err != nil { |
|
return "", err |
|
} |
|
return p, nil |
|
} |
|
|
|
// WorkDir returns absolute path of work directory. |
|
func WorkDir() (string, error) { |
|
execPath, err := ExecPath() |
|
return path.Dir(strings.Replace(execPath, "\\", "/", -1)), err |
|
} |
|
|
|
// NewConfigContext initializes configuration context. |
|
// NOTE: do not print any log except error. |
|
func NewConfigContext() { |
|
workDir, err := WorkDir() |
|
if err != nil { |
|
log.Fatal("Fail to get work directory: %v", err) |
|
} |
|
|
|
data, err := bin.Asset("conf/app.ini") |
|
if err != nil { |
|
log.Fatal("Fail to read 'conf/app.ini': %v", err) |
|
} |
|
Cfg, err = goconfig.LoadFromData(data) |
|
if err != nil { |
|
log.Fatal("Fail to parse 'conf/app.ini': %v", err) |
|
} |
|
|
|
CustomPath = os.Getenv("GOGS_CUSTOM") |
|
if len(CustomPath) == 0 { |
|
CustomPath = path.Join(workDir, "custom") |
|
} |
|
|
|
cfgPath := path.Join(CustomPath, "conf/app.ini") |
|
if com.IsFile(cfgPath) { |
|
if err = Cfg.AppendFiles(cfgPath); err != nil { |
|
log.Fatal("Fail to load custom 'conf/app.ini': %v", err) |
|
} |
|
} else { |
|
log.Warn("No custom 'conf/app.ini' found") |
|
} |
|
|
|
AppName = Cfg.MustValue("", "APP_NAME", "Gogs: Go Git Service") |
|
AppLogo = Cfg.MustValue("", "APP_LOGO", "img/favicon.png") |
|
AppUrl = Cfg.MustValue("server", "ROOT_URL", "http://localhost:3000") |
|
|
|
Protocol = HTTP |
|
if Cfg.MustValue("server", "PROTOCOL") == "https" { |
|
Protocol = HTTPS |
|
CertFile = Cfg.MustValue("server", "CERT_FILE") |
|
KeyFile = Cfg.MustValue("server", "KEY_FILE") |
|
} |
|
Domain = Cfg.MustValue("server", "DOMAIN", "localhost") |
|
HttpAddr = Cfg.MustValue("server", "HTTP_ADDR", "0.0.0.0") |
|
HttpPort = Cfg.MustValue("server", "HTTP_PORT", "3000") |
|
SshPort = Cfg.MustInt("server", "SSH_PORT", 22) |
|
OfflineMode = Cfg.MustBool("server", "OFFLINE_MODE") |
|
DisableRouterLog = Cfg.MustBool("server", "DISABLE_ROUTER_LOG") |
|
StaticRootPath = Cfg.MustValue("server", "STATIC_ROOT_PATH", workDir) |
|
LogRootPath = Cfg.MustValue("log", "ROOT_PATH", path.Join(workDir, "log")) |
|
|
|
InstallLock = Cfg.MustBool("security", "INSTALL_LOCK") |
|
SecretKey = Cfg.MustValue("security", "SECRET_KEY") |
|
LogInRememberDays = Cfg.MustInt("security", "LOGIN_REMEMBER_DAYS") |
|
CookieUserName = Cfg.MustValue("security", "COOKIE_USERNAME") |
|
CookieRememberName = Cfg.MustValue("security", "COOKIE_REMEMBER_NAME") |
|
ReverseProxyAuthUser = Cfg.MustValue("security", "REVERSE_PROXY_AUTHENTICATION_USER", "X-WEBAUTH-USER") |
|
|
|
AttachmentPath = Cfg.MustValue("attachment", "PATH", "files/attachments") |
|
AttachmentAllowedTypes = Cfg.MustValue("attachment", "ALLOWED_TYPES", "*/*") |
|
AttachmentMaxSize = Cfg.MustInt64("attachment", "MAX_SIZE", 32) |
|
AttachmentMaxFiles = Cfg.MustInt("attachment", "MAX_FILES", 10) |
|
AttachmentEnabled = Cfg.MustBool("attachment", "ENABLE", true) |
|
|
|
if err = os.MkdirAll(AttachmentPath, os.ModePerm); err != nil { |
|
log.Fatal("Could not create directory %s: %s", AttachmentPath, err) |
|
} |
|
|
|
RunUser = Cfg.MustValue("", "RUN_USER") |
|
curUser := os.Getenv("USER") |
|
if len(curUser) == 0 { |
|
curUser = os.Getenv("USERNAME") |
|
} |
|
// Does not check run user when the install lock is off. |
|
if InstallLock && RunUser != curUser { |
|
log.Fatal("Expect user(%s) but current user is: %s", RunUser, curUser) |
|
} |
|
|
|
// Determine and create root git reposiroty path. |
|
homeDir, err := com.HomeDir() |
|
if err != nil { |
|
log.Fatal("Fail to get home directory: %v", err) |
|
} |
|
RepoRootPath = Cfg.MustValue("repository", "ROOT", filepath.Join(homeDir, "gogs-repositories")) |
|
if !filepath.IsAbs(RepoRootPath) { |
|
RepoRootPath = filepath.Join(workDir, RepoRootPath) |
|
} else { |
|
RepoRootPath = filepath.Clean(RepoRootPath) |
|
} |
|
|
|
if err = os.MkdirAll(RepoRootPath, os.ModePerm); err != nil { |
|
log.Fatal("Fail to create repository root path(%s): %v", RepoRootPath, err) |
|
} |
|
ScriptType = Cfg.MustValue("repository", "SCRIPT_TYPE", "bash") |
|
|
|
PictureService = Cfg.MustValueRange("picture", "SERVICE", "server", |
|
[]string{"server"}) |
|
DisableGravatar = Cfg.MustBool("picture", "DISABLE_GRAVATAR") |
|
} |
|
|
|
var Service struct { |
|
RegisterEmailConfirm bool |
|
DisableRegistration bool |
|
RequireSignInView bool |
|
EnableCacheAvatar bool |
|
EnableNotifyMail bool |
|
EnableReverseProxyAuth bool |
|
LdapAuth bool |
|
ActiveCodeLives int |
|
ResetPwdCodeLives int |
|
} |
|
|
|
func newService() { |
|
Service.ActiveCodeLives = Cfg.MustInt("service", "ACTIVE_CODE_LIVE_MINUTES", 180) |
|
Service.ResetPwdCodeLives = Cfg.MustInt("service", "RESET_PASSWD_CODE_LIVE_MINUTES", 180) |
|
Service.DisableRegistration = Cfg.MustBool("service", "DISABLE_REGISTRATION") |
|
Service.RequireSignInView = Cfg.MustBool("service", "REQUIRE_SIGNIN_VIEW") |
|
Service.EnableCacheAvatar = Cfg.MustBool("service", "ENABLE_CACHE_AVATAR") |
|
Service.EnableReverseProxyAuth = Cfg.MustBool("service", "ENABLE_REVERSE_PROXY_AUTHENTICATION") |
|
} |
|
|
|
var logLevels = map[string]string{ |
|
"Trace": "0", |
|
"Debug": "1", |
|
"Info": "2", |
|
"Warn": "3", |
|
"Error": "4", |
|
"Critical": "5", |
|
} |
|
|
|
func newLogService() { |
|
log.Info("%s %s", AppName, AppVer) |
|
|
|
// Get and check log mode. |
|
LogModes = strings.Split(Cfg.MustValue("log", "MODE", "console"), ",") |
|
LogConfigs = make([]string, len(LogModes)) |
|
for i, mode := range LogModes { |
|
mode = strings.TrimSpace(mode) |
|
modeSec := "log." + mode |
|
if _, err := Cfg.GetSection(modeSec); err != nil { |
|
log.Fatal("Unknown log mode: %s", mode) |
|
} |
|
|
|
// Log level. |
|
levelName := Cfg.MustValueRange("log."+mode, "LEVEL", "Trace", |
|
[]string{"Trace", "Debug", "Info", "Warn", "Error", "Critical"}) |
|
level, ok := logLevels[levelName] |
|
if !ok { |
|
log.Fatal("Unknown log level: %s", levelName) |
|
} |
|
|
|
// Generate log configuration. |
|
switch mode { |
|
case "console": |
|
LogConfigs[i] = fmt.Sprintf(`{"level":%s}`, level) |
|
case "file": |
|
logPath := Cfg.MustValue(modeSec, "FILE_NAME", path.Join(LogRootPath, "gogs.log")) |
|
os.MkdirAll(path.Dir(logPath), os.ModePerm) |
|
LogConfigs[i] = fmt.Sprintf( |
|
`{"level":%s,"filename":"%s","rotate":%v,"maxlines":%d,"maxsize":%d,"daily":%v,"maxdays":%d}`, level, |
|
logPath, |
|
Cfg.MustBool(modeSec, "LOG_ROTATE", true), |
|
Cfg.MustInt(modeSec, "MAX_LINES", 1000000), |
|
1<<uint(Cfg.MustInt(modeSec, "MAX_SIZE_SHIFT", 28)), |
|
Cfg.MustBool(modeSec, "DAILY_ROTATE", true), |
|
Cfg.MustInt(modeSec, "MAX_DAYS", 7)) |
|
case "conn": |
|
LogConfigs[i] = fmt.Sprintf(`{"level":%s,"reconnectOnMsg":%v,"reconnect":%v,"net":"%s","addr":"%s"}`, level, |
|
Cfg.MustBool(modeSec, "RECONNECT_ON_MSG"), |
|
Cfg.MustBool(modeSec, "RECONNECT"), |
|
Cfg.MustValueRange(modeSec, "PROTOCOL", "tcp", []string{"tcp", "unix", "udp"}), |
|
Cfg.MustValue(modeSec, "ADDR", ":7020")) |
|
case "smtp": |
|
LogConfigs[i] = fmt.Sprintf(`{"level":%s,"username":"%s","password":"%s","host":"%s","sendTos":"%s","subject":"%s"}`, level, |
|
Cfg.MustValue(modeSec, "USER", "example@example.com"), |
|
Cfg.MustValue(modeSec, "PASSWD", "******"), |
|
Cfg.MustValue(modeSec, "HOST", "127.0.0.1:25"), |
|
Cfg.MustValue(modeSec, "RECEIVERS", "[]"), |
|
Cfg.MustValue(modeSec, "SUBJECT", "Diagnostic message from serve")) |
|
case "database": |
|
LogConfigs[i] = fmt.Sprintf(`{"level":%s,"driver":"%s","conn":"%s"}`, level, |
|
Cfg.MustValue(modeSec, "DRIVER"), |
|
Cfg.MustValue(modeSec, "CONN")) |
|
} |
|
|
|
log.NewLogger(Cfg.MustInt64("log", "BUFFER_LEN", 10000), mode, LogConfigs[i]) |
|
log.Info("Log Mode: %s(%s)", strings.Title(mode), levelName) |
|
} |
|
} |
|
|
|
func newCacheService() { |
|
CacheAdapter = Cfg.MustValueRange("cache", "ADAPTER", "memory", []string{"memory", "redis", "memcache"}) |
|
if EnableRedis { |
|
log.Info("Redis Enabled") |
|
} |
|
if EnableMemcache { |
|
log.Info("Memcache Enabled") |
|
} |
|
|
|
switch CacheAdapter { |
|
case "memory": |
|
CacheConfig = fmt.Sprintf(`{"interval":%d}`, Cfg.MustInt("cache", "INTERVAL", 60)) |
|
case "redis", "memcache": |
|
CacheConfig = fmt.Sprintf(`{"conn":"%s"}`, Cfg.MustValue("cache", "HOST")) |
|
default: |
|
log.Fatal("Unknown cache adapter: %s", CacheAdapter) |
|
} |
|
|
|
var err error |
|
Cache, err = cache.NewCache(CacheAdapter, CacheConfig) |
|
if err != nil { |
|
log.Fatal("Init cache system failed, adapter: %s, config: %s, %v\n", |
|
CacheAdapter, CacheConfig, err) |
|
} |
|
|
|
log.Info("Cache Service Enabled") |
|
} |
|
|
|
func newSessionService() { |
|
SessionProvider = Cfg.MustValueRange("session", "PROVIDER", "memory", |
|
[]string{"memory", "file", "redis", "mysql"}) |
|
|
|
SessionConfig = new(session.Config) |
|
SessionConfig.ProviderConfig = Cfg.MustValue("session", "PROVIDER_CONFIG") |
|
SessionConfig.CookieName = Cfg.MustValue("session", "COOKIE_NAME", "i_like_gogits") |
|
SessionConfig.CookieSecure = Cfg.MustBool("session", "COOKIE_SECURE") |
|
SessionConfig.EnableSetCookie = Cfg.MustBool("session", "ENABLE_SET_COOKIE", true) |
|
SessionConfig.GcIntervalTime = Cfg.MustInt64("session", "GC_INTERVAL_TIME", 86400) |
|
SessionConfig.SessionLifeTime = Cfg.MustInt64("session", "SESSION_LIFE_TIME", 86400) |
|
SessionConfig.SessionIDHashFunc = Cfg.MustValueRange("session", "SESSION_ID_HASHFUNC", |
|
"sha1", []string{"sha1", "sha256", "md5"}) |
|
SessionConfig.SessionIDHashKey = Cfg.MustValue("session", "SESSION_ID_HASHKEY") |
|
|
|
if SessionProvider == "file" { |
|
os.MkdirAll(path.Dir(SessionConfig.ProviderConfig), os.ModePerm) |
|
} |
|
|
|
var err error |
|
SessionManager, err = session.NewManager(SessionProvider, *SessionConfig) |
|
if err != nil { |
|
log.Fatal("Init session system failed, provider: %s, %v", |
|
SessionProvider, err) |
|
} |
|
|
|
log.Info("Session Service Enabled") |
|
} |
|
|
|
// Mailer represents mail service. |
|
type Mailer struct { |
|
Name string |
|
Host string |
|
From string |
|
User, Passwd string |
|
} |
|
|
|
type OauthInfo struct { |
|
ClientId, ClientSecret string |
|
Scopes string |
|
AuthUrl, TokenUrl string |
|
} |
|
|
|
// Oauther represents oauth service. |
|
type Oauther struct { |
|
GitHub, Google, Tencent, |
|
Twitter, Weibo bool |
|
OauthInfos map[string]*OauthInfo |
|
} |
|
|
|
var ( |
|
MailService *Mailer |
|
OauthService *Oauther |
|
) |
|
|
|
func newMailService() { |
|
// Check mailer setting. |
|
if !Cfg.MustBool("mailer", "ENABLED") { |
|
return |
|
} |
|
|
|
MailService = &Mailer{ |
|
Name: Cfg.MustValue("mailer", "NAME", AppName), |
|
Host: Cfg.MustValue("mailer", "HOST"), |
|
User: Cfg.MustValue("mailer", "USER"), |
|
Passwd: Cfg.MustValue("mailer", "PASSWD"), |
|
} |
|
MailService.From = Cfg.MustValue("mailer", "FROM", MailService.User) |
|
log.Info("Mail Service Enabled") |
|
} |
|
|
|
func newRegisterMailService() { |
|
if !Cfg.MustBool("service", "REGISTER_EMAIL_CONFIRM") { |
|
return |
|
} else if MailService == nil { |
|
log.Warn("Register Mail Service: Mail Service is not enabled") |
|
return |
|
} |
|
Service.RegisterEmailConfirm = true |
|
log.Info("Register Mail Service Enabled") |
|
} |
|
|
|
func newNotifyMailService() { |
|
if !Cfg.MustBool("service", "ENABLE_NOTIFY_MAIL") { |
|
return |
|
} else if MailService == nil { |
|
log.Warn("Notify Mail Service: Mail Service is not enabled") |
|
return |
|
} |
|
Service.EnableNotifyMail = true |
|
log.Info("Notify Mail Service Enabled") |
|
} |
|
|
|
func newWebhookService() { |
|
WebhookTaskInterval = Cfg.MustInt("webhook", "TASK_INTERVAL", 1) |
|
WebhookDeliverTimeout = Cfg.MustInt("webhook", "DELIVER_TIMEOUT", 5) |
|
} |
|
|
|
func NewServices() { |
|
newService() |
|
newLogService() |
|
newCacheService() |
|
newSessionService() |
|
newMailService() |
|
newRegisterMailService() |
|
newNotifyMailService() |
|
newWebhookService() |
|
}
|
|
|