2018-02-20 00:24:10 +02:00
|
|
|
// Copyright 2018 Drone.IO Inc.
|
2018-03-21 15:02:17 +02:00
|
|
|
//
|
2018-02-20 00:24:10 +02:00
|
|
|
// Licensed under the Apache License, Version 2.0 (the "License");
|
|
|
|
// you may not use this file except in compliance with the License.
|
|
|
|
// You may obtain a copy of the License at
|
2018-03-21 15:02:17 +02:00
|
|
|
//
|
2018-02-20 00:24:10 +02:00
|
|
|
// http://www.apache.org/licenses/LICENSE-2.0
|
2018-03-21 15:02:17 +02:00
|
|
|
//
|
2018-02-20 00:24:10 +02:00
|
|
|
// Unless required by applicable law or agreed to in writing, software
|
|
|
|
// distributed under the License is distributed on an "AS IS" BASIS,
|
|
|
|
// WITHOUT WARRANTIES OR CONDITIONS OF ANY KIND, either express or implied.
|
|
|
|
// See the License for the specific language governing permissions and
|
|
|
|
// limitations under the License.
|
|
|
|
|
2017-06-30 00:51:22 +02:00
|
|
|
package main
|
|
|
|
|
|
|
|
import (
|
2017-07-25 01:15:25 +02:00
|
|
|
"crypto/tls"
|
2023-11-01 12:44:08 +02:00
|
|
|
"errors"
|
2024-01-10 16:34:44 +02:00
|
|
|
"fmt"
|
2017-06-30 00:51:22 +02:00
|
|
|
"net"
|
|
|
|
"net/http"
|
2021-09-27 00:22:23 +02:00
|
|
|
"net/http/httputil"
|
2017-06-30 00:51:22 +02:00
|
|
|
"net/url"
|
|
|
|
"strings"
|
|
|
|
"time"
|
|
|
|
|
2022-09-04 03:24:42 +02:00
|
|
|
"github.com/caddyserver/certmagic"
|
2021-12-12 23:49:30 +02:00
|
|
|
"github.com/gin-gonic/gin"
|
2024-06-04 08:30:54 +02:00
|
|
|
prometheus_http "github.com/prometheus/client_golang/prometheus/promhttp"
|
2021-10-12 09:25:13 +02:00
|
|
|
"github.com/rs/zerolog"
|
|
|
|
"github.com/rs/zerolog/log"
|
2021-10-27 21:03:14 +02:00
|
|
|
"github.com/urfave/cli/v2"
|
2021-10-12 09:25:13 +02:00
|
|
|
"golang.org/x/sync/errgroup"
|
2017-06-30 00:51:22 +02:00
|
|
|
"google.golang.org/grpc"
|
2018-01-08 22:46:44 +02:00
|
|
|
"google.golang.org/grpc/keepalive"
|
2017-06-30 00:51:22 +02:00
|
|
|
|
2023-12-08 09:15:08 +02:00
|
|
|
"go.woodpecker-ci.org/woodpecker/v2/pipeline/rpc/proto"
|
|
|
|
"go.woodpecker-ci.org/woodpecker/v2/server"
|
|
|
|
"go.woodpecker-ci.org/woodpecker/v2/server/cron"
|
|
|
|
woodpeckerGrpcServer "go.woodpecker-ci.org/woodpecker/v2/server/grpc"
|
|
|
|
"go.woodpecker-ci.org/woodpecker/v2/server/router"
|
|
|
|
"go.woodpecker-ci.org/woodpecker/v2/server/router/middleware"
|
|
|
|
"go.woodpecker-ci.org/woodpecker/v2/server/web"
|
2024-01-01 00:29:56 +02:00
|
|
|
"go.woodpecker-ci.org/woodpecker/v2/shared/logger"
|
2023-12-08 09:15:08 +02:00
|
|
|
"go.woodpecker-ci.org/woodpecker/v2/version"
|
2017-06-30 00:51:22 +02:00
|
|
|
)
|
|
|
|
|
2021-11-23 16:36:52 +02:00
|
|
|
func run(c *cli.Context) error {
|
2024-01-10 16:34:44 +02:00
|
|
|
if err := logger.SetupGlobalLogger(c, true); err != nil {
|
|
|
|
return err
|
|
|
|
}
|
2017-06-30 00:51:22 +02:00
|
|
|
|
2023-08-07 20:47:30 +02:00
|
|
|
// set gin mode based on log level
|
|
|
|
if zerolog.GlobalLevel() > zerolog.DebugLevel {
|
2021-12-12 23:49:30 +02:00
|
|
|
gin.SetMode(gin.ReleaseMode)
|
2021-12-09 00:40:00 +02:00
|
|
|
}
|
2021-10-17 00:41:36 +02:00
|
|
|
|
2017-07-12 20:48:56 +02:00
|
|
|
if c.String("server-host") == "" {
|
2024-01-10 16:34:44 +02:00
|
|
|
return fmt.Errorf("WOODPECKER_HOST is not properly configured")
|
2017-07-12 20:48:56 +02:00
|
|
|
}
|
|
|
|
|
2017-12-20 04:08:55 +02:00
|
|
|
if !strings.Contains(c.String("server-host"), "://") {
|
2024-01-10 16:34:44 +02:00
|
|
|
return fmt.Errorf("WOODPECKER_HOST must be <scheme>://<hostname> format")
|
2017-12-20 04:08:55 +02:00
|
|
|
}
|
|
|
|
|
2023-09-23 07:54:23 +02:00
|
|
|
if _, err := url.Parse(c.String("server-host")); err != nil {
|
2024-01-10 16:34:44 +02:00
|
|
|
return fmt.Errorf("could not parse WOODPECKER_HOST: %w", err)
|
2023-09-23 07:54:23 +02:00
|
|
|
}
|
|
|
|
|
2021-08-20 16:32:52 +02:00
|
|
|
if strings.Contains(c.String("server-host"), "://localhost") {
|
2021-10-12 09:25:13 +02:00
|
|
|
log.Warn().Msg(
|
Clean up config environment variables for server and agent (#218)
The goal here is to make consistent use of configuration environment variables prefixed `WOODPECKER_`. Where several variants existed, this PR aims to remove all but one option, leaving the most explicit.
This PR only changes server and agent code, but not documentation, in order to keep the PR digestible. Once we have consensus that this is correct, I'll change docs accordingly.
User (rather: admin) facing changes in this PR:
- In general, support for all server and agent config environment variables (env vars) starting with `DRONE_` is removed. The according `WOODPECKER_*` variables must be used instead.
- The env var `WOODPECKER_HOST` replaces `DRONE_HOST`, and `DRONE_SERVER_HOST`.
- The env var `WOODPECKER_AGENT_SECRET` is used to configure the shared secret which agents use to authenticate against the server. It replaces `WOODPECKER_SECRET`, `DRONE_SECRET`, `WOODPECKER_PASSWORD`, `DRONE_PASSWORD`, and `DRONE_AGENT_SECRET`.
- The env var `WOODPECKER_DATABASE_DRIVER` replaces `DRONE_DATABASE_DRIVER` and `DATABASE_DRIVER`.
- The env var `WOODPECKER_DATABASE_DATASOURCE` replaces `DRONE_DATABASE_DATASOURCE` and `DATABASE_CONFIG`.
2021-09-28 15:43:44 +02:00
|
|
|
"WOODPECKER_HOST should probably be publicly accessible (not localhost)",
|
2021-08-20 16:32:52 +02:00
|
|
|
)
|
|
|
|
}
|
|
|
|
|
2024-01-10 16:34:44 +02:00
|
|
|
_store, err := setupStore(c)
|
|
|
|
if err != nil {
|
|
|
|
return fmt.Errorf("can't setup store: %w", err)
|
|
|
|
}
|
2021-11-13 21:18:06 +02:00
|
|
|
defer func() {
|
2021-12-01 15:22:06 +02:00
|
|
|
if err := _store.Close(); err != nil {
|
2021-11-13 21:18:06 +02:00
|
|
|
log.Error().Err(err).Msg("could not close store")
|
|
|
|
}
|
|
|
|
}()
|
2021-10-19 11:44:49 +02:00
|
|
|
|
2024-04-16 08:04:55 +02:00
|
|
|
err = setupEvilGlobals(c, _store)
|
2023-12-24 14:26:23 +02:00
|
|
|
if err != nil {
|
2024-01-10 16:34:44 +02:00
|
|
|
return fmt.Errorf("can't setup globals: %w", err)
|
2023-12-24 14:26:23 +02:00
|
|
|
}
|
2017-06-30 00:51:22 +02:00
|
|
|
|
2022-09-03 20:41:23 +02:00
|
|
|
var g errgroup.Group
|
2017-07-31 21:15:05 +02:00
|
|
|
|
2022-09-03 20:41:23 +02:00
|
|
|
setupMetrics(&g, _store)
|
2017-06-30 00:51:22 +02:00
|
|
|
|
2022-09-03 20:41:23 +02:00
|
|
|
g.Go(func() error {
|
2024-04-16 08:04:55 +02:00
|
|
|
return cron.Start(c.Context, _store)
|
2022-09-03 20:41:23 +02:00
|
|
|
})
|
2017-06-30 00:51:22 +02:00
|
|
|
|
|
|
|
// start the grpc server
|
|
|
|
g.Go(func() error {
|
2021-09-09 18:34:29 +02:00
|
|
|
lis, err := net.Listen("tcp", c.String("grpc-addr"))
|
2017-06-30 00:51:22 +02:00
|
|
|
if err != nil {
|
2024-01-10 16:34:44 +02:00
|
|
|
log.Fatal().Err(err).Msg("failed to listen on grpc-addr") //nolint:forbidigo
|
2017-06-30 00:51:22 +02:00
|
|
|
}
|
2023-01-28 15:13:04 +02:00
|
|
|
|
2023-03-19 21:24:43 +02:00
|
|
|
jwtSecret := c.String("grpc-secret")
|
2023-01-28 15:13:04 +02:00
|
|
|
jwtManager := woodpeckerGrpcServer.NewJWTManager(jwtSecret)
|
|
|
|
|
|
|
|
authorizer := woodpeckerGrpcServer.NewAuthorizer(jwtManager)
|
2019-06-28 14:23:52 +02:00
|
|
|
grpcServer := grpc.NewServer(
|
2023-01-28 15:13:04 +02:00
|
|
|
grpc.StreamInterceptor(authorizer.StreamInterceptor),
|
|
|
|
grpc.UnaryInterceptor(authorizer.UnaryInterceptor),
|
2018-01-08 22:46:44 +02:00
|
|
|
grpc.KeepaliveEnforcementPolicy(keepalive.EnforcementPolicy{
|
|
|
|
MinTime: c.Duration("keepalive-min-time"),
|
|
|
|
}),
|
2017-06-30 01:35:38 +02:00
|
|
|
)
|
2023-01-28 15:13:04 +02:00
|
|
|
|
2021-09-29 02:10:09 +02:00
|
|
|
woodpeckerServer := woodpeckerGrpcServer.NewWoodpeckerServer(
|
2021-09-22 20:48:01 +02:00
|
|
|
server.Config.Services.Queue,
|
|
|
|
server.Config.Services.Logs,
|
|
|
|
server.Config.Services.Pubsub,
|
2021-12-01 15:22:06 +02:00
|
|
|
_store,
|
2021-09-22 20:48:01 +02:00
|
|
|
)
|
2021-09-29 02:10:09 +02:00
|
|
|
proto.RegisterWoodpeckerServer(grpcServer, woodpeckerServer)
|
2017-06-30 00:51:22 +02:00
|
|
|
|
2023-01-28 15:13:04 +02:00
|
|
|
woodpeckerAuthServer := woodpeckerGrpcServer.NewWoodpeckerAuthServer(
|
|
|
|
jwtManager,
|
|
|
|
server.Config.Server.AgentToken,
|
|
|
|
_store,
|
|
|
|
)
|
|
|
|
proto.RegisterWoodpeckerAuthServer(grpcServer, woodpeckerAuthServer)
|
|
|
|
|
2019-06-28 14:23:52 +02:00
|
|
|
err = grpcServer.Serve(lis)
|
2017-06-30 00:51:22 +02:00
|
|
|
if err != nil {
|
2024-01-10 16:34:44 +02:00
|
|
|
log.Fatal().Err(err).Msg("failed to serve grpc server") //nolint:forbidigo
|
2017-06-30 00:51:22 +02:00
|
|
|
}
|
|
|
|
return nil
|
|
|
|
})
|
|
|
|
|
2022-09-03 20:41:23 +02:00
|
|
|
proxyWebUI := c.String("www-proxy")
|
|
|
|
var webUIServe func(w http.ResponseWriter, r *http.Request)
|
2019-05-30 12:15:29 +02:00
|
|
|
|
2022-09-03 20:41:23 +02:00
|
|
|
if proxyWebUI == "" {
|
2023-03-21 01:48:15 +02:00
|
|
|
webEngine, err := web.New()
|
|
|
|
if err != nil {
|
2024-01-10 16:34:44 +02:00
|
|
|
log.Error().Err(err).Msg("failed to create web engine")
|
|
|
|
return err
|
2023-03-21 01:48:15 +02:00
|
|
|
}
|
|
|
|
webUIServe = webEngine.ServeHTTP
|
2022-09-03 20:41:23 +02:00
|
|
|
} else {
|
|
|
|
origin, _ := url.Parse(proxyWebUI)
|
|
|
|
|
|
|
|
director := func(req *http.Request) {
|
|
|
|
req.Header.Add("X-Forwarded-Host", req.Host)
|
|
|
|
req.Header.Add("X-Origin-Host", origin.Host)
|
|
|
|
req.URL.Scheme = origin.Scheme
|
|
|
|
req.URL.Host = origin.Host
|
|
|
|
}
|
|
|
|
|
|
|
|
proxy := &httputil.ReverseProxy{Director: director}
|
|
|
|
webUIServe = proxy.ServeHTTP
|
|
|
|
}
|
|
|
|
|
|
|
|
// setup the server and start the listener
|
|
|
|
handler := router.Load(
|
|
|
|
webUIServe,
|
|
|
|
middleware.Logger(time.RFC3339, true),
|
|
|
|
middleware.Version,
|
2024-01-19 17:20:35 +02:00
|
|
|
middleware.Store(_store),
|
2022-09-03 20:41:23 +02:00
|
|
|
)
|
2022-09-01 00:36:32 +02:00
|
|
|
|
2024-01-10 16:34:44 +02:00
|
|
|
switch {
|
|
|
|
case c.String("server-cert") != "":
|
2022-09-03 20:41:23 +02:00
|
|
|
// start the server with tls enabled
|
2017-07-26 16:44:38 +02:00
|
|
|
g.Go(func() error {
|
2017-09-20 00:30:31 +02:00
|
|
|
serve := &http.Server{
|
2023-05-11 06:11:10 +02:00
|
|
|
Addr: server.Config.Server.PortTLS,
|
2017-09-20 00:30:31 +02:00
|
|
|
Handler: handler,
|
|
|
|
TLSConfig: &tls.Config{
|
2021-10-19 11:44:49 +02:00
|
|
|
NextProtos: []string{"h2", "http/1.1"},
|
2017-09-20 00:30:31 +02:00
|
|
|
},
|
|
|
|
}
|
2023-11-01 12:44:08 +02:00
|
|
|
err = serve.ListenAndServeTLS(
|
2017-07-26 16:44:38 +02:00
|
|
|
c.String("server-cert"),
|
|
|
|
c.String("server-key"),
|
|
|
|
)
|
2023-11-01 12:44:08 +02:00
|
|
|
if err != nil && !errors.Is(err, http.ErrServerClosed) {
|
2024-01-10 16:34:44 +02:00
|
|
|
log.Fatal().Err(err).Msg("failed to start server with tls") //nolint:forbidigo
|
2023-11-01 12:44:08 +02:00
|
|
|
}
|
|
|
|
return err
|
2017-07-26 16:44:38 +02:00
|
|
|
})
|
2017-06-30 00:51:22 +02:00
|
|
|
|
2022-09-03 20:41:23 +02:00
|
|
|
// http to https redirect
|
2022-09-04 03:24:42 +02:00
|
|
|
redirect := func(w http.ResponseWriter, req *http.Request) {
|
2023-09-23 07:54:23 +02:00
|
|
|
serverURL, _ := url.Parse(server.Config.Server.Host)
|
2022-09-04 03:24:42 +02:00
|
|
|
req.URL.Scheme = "https"
|
2023-09-23 07:54:23 +02:00
|
|
|
req.URL.Host = serverURL.Host
|
2022-09-04 03:24:42 +02:00
|
|
|
|
|
|
|
w.Header().Set("Strict-Transport-Security", "max-age=31536000")
|
|
|
|
|
|
|
|
http.Redirect(w, req, req.URL.String(), http.StatusMovedPermanently)
|
|
|
|
}
|
|
|
|
|
2022-09-03 20:41:23 +02:00
|
|
|
g.Go(func() error {
|
2023-11-01 12:44:08 +02:00
|
|
|
err := http.ListenAndServe(server.Config.Server.Port, http.HandlerFunc(redirect))
|
|
|
|
if err != nil && !errors.Is(err, http.ErrServerClosed) {
|
2024-01-10 16:34:44 +02:00
|
|
|
log.Fatal().Err(err).Msg("unable to start server to redirect from http to https") //nolint:forbidigo
|
2023-11-01 12:44:08 +02:00
|
|
|
}
|
|
|
|
return err
|
2022-09-03 20:41:23 +02:00
|
|
|
})
|
2024-01-10 16:34:44 +02:00
|
|
|
case c.Bool("lets-encrypt"):
|
2022-09-03 20:41:23 +02:00
|
|
|
// start the server with lets-encrypt
|
2022-09-04 03:24:42 +02:00
|
|
|
certmagic.DefaultACME.Email = c.String("lets-encrypt-email")
|
|
|
|
certmagic.DefaultACME.Agreed = true
|
|
|
|
|
2023-10-07 15:39:19 +02:00
|
|
|
address, err := url.Parse(strings.TrimSuffix(c.String("server-host"), "/"))
|
2022-09-03 20:41:23 +02:00
|
|
|
if err != nil {
|
|
|
|
return err
|
|
|
|
}
|
2017-06-30 00:51:22 +02:00
|
|
|
|
2022-09-03 20:41:23 +02:00
|
|
|
g.Go(func() error {
|
2022-09-04 03:24:42 +02:00
|
|
|
if err := certmagic.HTTPS([]string{address.Host}, handler); err != nil {
|
2024-01-10 16:34:44 +02:00
|
|
|
log.Fatal().Err(err).Msg("certmagic does not work") //nolint:forbidigo
|
2022-09-03 20:41:23 +02:00
|
|
|
}
|
2022-09-04 03:24:42 +02:00
|
|
|
return nil
|
2022-09-03 20:41:23 +02:00
|
|
|
})
|
2024-01-10 16:34:44 +02:00
|
|
|
default:
|
2022-09-03 20:41:23 +02:00
|
|
|
// start the server without tls
|
|
|
|
g.Go(func() error {
|
2023-11-01 12:44:08 +02:00
|
|
|
err := http.ListenAndServe(
|
2022-09-03 20:41:23 +02:00
|
|
|
c.String("server-addr"),
|
|
|
|
handler,
|
|
|
|
)
|
2023-11-01 12:44:08 +02:00
|
|
|
if err != nil && !errors.Is(err, http.ErrServerClosed) {
|
2024-01-10 16:34:44 +02:00
|
|
|
log.Fatal().Err(err).Msg("could not start server") //nolint:forbidigo
|
2023-11-01 12:44:08 +02:00
|
|
|
}
|
|
|
|
return err
|
2022-09-03 20:41:23 +02:00
|
|
|
})
|
2018-01-13 06:54:49 +02:00
|
|
|
}
|
2022-09-03 20:41:23 +02:00
|
|
|
|
2023-03-12 10:41:10 +02:00
|
|
|
if metricsServerAddr := c.String("metrics-server-addr"); metricsServerAddr != "" {
|
|
|
|
g.Go(func() error {
|
|
|
|
metricsRouter := gin.New()
|
2024-06-04 08:30:54 +02:00
|
|
|
metricsRouter.GET("/metrics", gin.WrapH(prometheus_http.Handler()))
|
2023-11-01 12:44:08 +02:00
|
|
|
err := http.ListenAndServe(metricsServerAddr, metricsRouter)
|
|
|
|
if err != nil && !errors.Is(err, http.ErrServerClosed) {
|
2024-01-10 16:34:44 +02:00
|
|
|
log.Fatal().Err(err).Msg("could not start metrics server") //nolint:forbidigo
|
2023-11-01 12:44:08 +02:00
|
|
|
}
|
|
|
|
return err
|
2023-03-12 10:41:10 +02:00
|
|
|
})
|
|
|
|
}
|
|
|
|
|
2024-01-11 20:17:07 +02:00
|
|
|
log.Info().Msgf("starting Woodpecker server with version '%s'", version.String())
|
2017-06-30 00:51:22 +02:00
|
|
|
|
|
|
|
return g.Wait()
|
|
|
|
}
|