You've already forked woodpecker
							
							
				mirror of
				https://github.com/woodpecker-ci/woodpecker.git
				synced 2025-10-30 23:27:39 +02:00 
			
		
		
		
	Co-authored-by: Robert Kaussow <xoxys@rknet.org> Co-authored-by: Robert Kaussow <mail@thegeeklab.de>
		
			
				
	
	
		
			273 lines
		
	
	
		
			9.0 KiB
		
	
	
	
		
			Go
		
	
	
	
	
	
			
		
		
	
	
			273 lines
		
	
	
		
			9.0 KiB
		
	
	
	
		
			Go
		
	
	
	
	
	
| // Copyright 2022 Woodpecker Authors
 | |
| // Copyright 2018 Drone.IO Inc.
 | |
| //
 | |
| // Licensed under the Apache License, Version 2.0 (the "License");
 | |
| // you may not use this file except in compliance with the License.
 | |
| // You may obtain a copy of the License at
 | |
| //
 | |
| //      http://www.apache.org/licenses/LICENSE-2.0
 | |
| //
 | |
| // Unless required by applicable law or agreed to in writing, software
 | |
| // distributed under the License is distributed on an "AS IS" BASIS,
 | |
| // WITHOUT WARRANTIES OR CONDITIONS OF ANY KIND, either express or implied.
 | |
| // See the License for the specific language governing permissions and
 | |
| // limitations under the License.
 | |
| 
 | |
| package main
 | |
| 
 | |
| import (
 | |
| 	"context"
 | |
| 	"encoding/base32"
 | |
| 	"errors"
 | |
| 	"fmt"
 | |
| 	"net/url"
 | |
| 	"os"
 | |
| 	"strings"
 | |
| 	"time"
 | |
| 
 | |
| 	"github.com/google/tink/go/subtle/random"
 | |
| 	"github.com/rs/zerolog/log"
 | |
| 	"github.com/urfave/cli/v3"
 | |
| 
 | |
| 	"go.woodpecker-ci.org/woodpecker/v3/server"
 | |
| 	"go.woodpecker-ci.org/woodpecker/v3/server/cache"
 | |
| 	"go.woodpecker-ci.org/woodpecker/v3/server/forge/setup"
 | |
| 	"go.woodpecker-ci.org/woodpecker/v3/server/logging"
 | |
| 	"go.woodpecker-ci.org/woodpecker/v3/server/model"
 | |
| 	"go.woodpecker-ci.org/woodpecker/v3/server/pubsub"
 | |
| 	"go.woodpecker-ci.org/woodpecker/v3/server/queue"
 | |
| 	"go.woodpecker-ci.org/woodpecker/v3/server/services"
 | |
| 	logService "go.woodpecker-ci.org/woodpecker/v3/server/services/log"
 | |
| 	"go.woodpecker-ci.org/woodpecker/v3/server/services/log/addon"
 | |
| 	"go.woodpecker-ci.org/woodpecker/v3/server/services/log/file"
 | |
| 	"go.woodpecker-ci.org/woodpecker/v3/server/services/permissions"
 | |
| 	"go.woodpecker-ci.org/woodpecker/v3/server/store"
 | |
| 	"go.woodpecker-ci.org/woodpecker/v3/server/store/datastore"
 | |
| 	"go.woodpecker-ci.org/woodpecker/v3/server/store/types"
 | |
| )
 | |
| 
 | |
| const (
 | |
| 	queueInfoRefreshInterval = 500 * time.Millisecond
 | |
| 	storeInfoRefreshInterval = 10 * time.Second
 | |
| )
 | |
| 
 | |
| func setupStore(ctx context.Context, c *cli.Command) (store.Store, error) {
 | |
| 	datasource := c.String("db-datasource")
 | |
| 	driver := c.String("db-driver")
 | |
| 	xorm := store.XORM{
 | |
| 		Log:             c.Bool("db-log"),
 | |
| 		ShowSQL:         c.Bool("db-log-sql"),
 | |
| 		MaxOpenConns:    c.Int("db-max-open-connections"),
 | |
| 		MaxIdleConns:    c.Int("db-max-idle-connections"),
 | |
| 		ConnMaxLifetime: c.Duration("db-max-connection-timeout"),
 | |
| 	}
 | |
| 
 | |
| 	if driver == "sqlite3" {
 | |
| 		if datastore.SupportedDriver("sqlite3") {
 | |
| 			log.Debug().Msg("server has sqlite3 support")
 | |
| 		} else {
 | |
| 			log.Debug().Msg("server was built without sqlite3 support!")
 | |
| 		}
 | |
| 	}
 | |
| 
 | |
| 	if !datastore.SupportedDriver(driver) {
 | |
| 		return nil, fmt.Errorf("database driver '%s' not supported", driver)
 | |
| 	}
 | |
| 
 | |
| 	if driver == "sqlite3" {
 | |
| 		if err := checkSqliteFileExist(datasource); err != nil {
 | |
| 			return nil, fmt.Errorf("check sqlite file: %w", err)
 | |
| 		}
 | |
| 	}
 | |
| 
 | |
| 	opts := &store.Opts{
 | |
| 		Driver: driver,
 | |
| 		Config: datasource,
 | |
| 		XORM:   xorm,
 | |
| 	}
 | |
| 	log.Debug().Str("driver", driver).Any("xorm", xorm).Msg("setting up datastore")
 | |
| 	store, err := datastore.NewEngine(opts)
 | |
| 	if err != nil {
 | |
| 		return nil, fmt.Errorf("could not open datastore: %w", err)
 | |
| 	}
 | |
| 
 | |
| 	if err = store.Ping(); err != nil {
 | |
| 		return nil, err
 | |
| 	}
 | |
| 
 | |
| 	if err := store.Migrate(ctx, c.Bool("migrations-allow-long")); err != nil {
 | |
| 		return nil, fmt.Errorf("could not migrate datastore: %w", err)
 | |
| 	}
 | |
| 
 | |
| 	return store, nil
 | |
| }
 | |
| 
 | |
| func checkSqliteFileExist(path string) error {
 | |
| 	_, err := os.Stat(path)
 | |
| 	if err != nil && os.IsNotExist(err) {
 | |
| 		log.Warn().Msgf("no sqlite3 file found, will create one at '%s'", path)
 | |
| 		return nil
 | |
| 	}
 | |
| 	return err
 | |
| }
 | |
| 
 | |
| func setupQueue(ctx context.Context, s store.Store) (queue.Queue, error) {
 | |
| 	return queue.New(ctx, queue.Config{
 | |
| 		Backend: queue.TypeMemory,
 | |
| 		Store:   s,
 | |
| 	})
 | |
| }
 | |
| 
 | |
| func setupMembershipService(_ context.Context, _store store.Store) cache.MembershipService {
 | |
| 	return cache.NewMembershipService(_store)
 | |
| }
 | |
| 
 | |
| func setupLogStore(c *cli.Command, s store.Store) (logService.Service, error) {
 | |
| 	switch c.String("log-store") {
 | |
| 	case "file":
 | |
| 		return file.NewLogStore(c.String("log-store-file-path"))
 | |
| 	case "addon":
 | |
| 		return addon.Load(c.String("log-store-file-path"))
 | |
| 	default:
 | |
| 		return s, nil
 | |
| 	}
 | |
| }
 | |
| 
 | |
| const jwtSecretID = "jwt-secret"
 | |
| 
 | |
| func setupJWTSecret(_store store.Store) (string, error) {
 | |
| 	jwtSecret, err := _store.ServerConfigGet(jwtSecretID)
 | |
| 	if errors.Is(err, types.RecordNotExist) {
 | |
| 		jwtSecret := base32.StdEncoding.EncodeToString(
 | |
| 			random.GetRandomBytes(32),
 | |
| 		)
 | |
| 		err = _store.ServerConfigSet(jwtSecretID, jwtSecret)
 | |
| 		if err != nil {
 | |
| 			return "", err
 | |
| 		}
 | |
| 		log.Debug().Msg("created jwt secret")
 | |
| 		return jwtSecret, nil
 | |
| 	}
 | |
| 
 | |
| 	if err != nil {
 | |
| 		return "", err
 | |
| 	}
 | |
| 
 | |
| 	return jwtSecret, nil
 | |
| }
 | |
| 
 | |
| func setupEvilGlobals(ctx context.Context, c *cli.Command, s store.Store) (err error) {
 | |
| 	// services
 | |
| 	server.Config.Services.Logs = logging.New()
 | |
| 	server.Config.Services.Pubsub = pubsub.New()
 | |
| 	server.Config.Services.Membership = setupMembershipService(ctx, s)
 | |
| 	server.Config.Services.Queue, err = setupQueue(ctx, s)
 | |
| 	if err != nil {
 | |
| 		return fmt.Errorf("could not setup queue: %w", err)
 | |
| 	}
 | |
| 	server.Config.Services.Manager, err = services.NewManager(c, s, setup.Forge)
 | |
| 	if err != nil {
 | |
| 		return fmt.Errorf("could not setup service manager: %w", err)
 | |
| 	}
 | |
| 	server.Config.Services.LogStore, err = setupLogStore(c, s)
 | |
| 	if err != nil {
 | |
| 		return fmt.Errorf("could not setup log store: %w", err)
 | |
| 	}
 | |
| 
 | |
| 	// agents
 | |
| 	server.Config.Agent.DisableUserRegisteredAgentRegistration = c.Bool("disable-user-agent-registration")
 | |
| 
 | |
| 	// authentication
 | |
| 	server.Config.Pipeline.AuthenticatePublicRepos = c.Bool("authenticate-public-repos")
 | |
| 
 | |
| 	// Pull requests
 | |
| 	server.Config.Pipeline.DefaultAllowPullRequests = c.Bool("default-allow-pull-requests")
 | |
| 
 | |
| 	// Approval mode
 | |
| 	approvalMode := model.ApprovalMode(c.String("default-approval-mode"))
 | |
| 	if !approvalMode.Valid() {
 | |
| 		return fmt.Errorf("approval mode %s is not valid", approvalMode)
 | |
| 	}
 | |
| 	server.Config.Pipeline.DefaultApprovalMode = approvalMode
 | |
| 
 | |
| 	// Cloning
 | |
| 	server.Config.Pipeline.DefaultClonePlugin = c.String("default-clone-plugin")
 | |
| 	server.Config.Pipeline.TrustedClonePlugins = c.StringSlice("plugins-trusted-clone")
 | |
| 	server.Config.Pipeline.TrustedClonePlugins = append(server.Config.Pipeline.TrustedClonePlugins, server.Config.Pipeline.DefaultClonePlugin)
 | |
| 
 | |
| 	// Execution
 | |
| 	_events := c.StringSlice("default-cancel-previous-pipeline-events")
 | |
| 	events := make([]model.WebhookEvent, 0, len(_events))
 | |
| 	for _, v := range _events {
 | |
| 		e := model.WebhookEvent(v)
 | |
| 		if err := e.Validate(); err != nil {
 | |
| 			return err
 | |
| 		}
 | |
| 		events = append(events, e)
 | |
| 	}
 | |
| 	server.Config.Pipeline.DefaultCancelPreviousPipelineEvents = events
 | |
| 	server.Config.Pipeline.DefaultTimeout = c.Int64("default-pipeline-timeout")
 | |
| 	server.Config.Pipeline.MaxTimeout = c.Int64("max-pipeline-timeout")
 | |
| 
 | |
| 	_labels := c.StringSlice("default-workflow-labels")
 | |
| 	labels := make(map[string]string, len(_labels))
 | |
| 	for _, v := range _labels {
 | |
| 		name, value, ok := strings.Cut(v, "=")
 | |
| 		if !ok {
 | |
| 			return fmt.Errorf("invalid label filter: %s", v)
 | |
| 		}
 | |
| 		labels[name] = value
 | |
| 	}
 | |
| 	server.Config.Pipeline.DefaultWorkflowLabels = labels
 | |
| 
 | |
| 	// backend options for pipeline compiler
 | |
| 	server.Config.Pipeline.Proxy.No = c.String("backend-no-proxy")
 | |
| 	server.Config.Pipeline.Proxy.HTTP = c.String("backend-http-proxy")
 | |
| 	server.Config.Pipeline.Proxy.HTTPS = c.String("backend-https-proxy")
 | |
| 
 | |
| 	// server configuration
 | |
| 	server.Config.Server.JWTSecret, err = setupJWTSecret(s)
 | |
| 	if err != nil {
 | |
| 		return fmt.Errorf("could not setup jwt secret: %w", err)
 | |
| 	}
 | |
| 	server.Config.Server.Cert = c.String("server-cert")
 | |
| 	server.Config.Server.Key = c.String("server-key")
 | |
| 	server.Config.Server.AgentToken = c.String("agent-secret")
 | |
| 	serverHost := strings.TrimSuffix(c.String("server-host"), "/")
 | |
| 	server.Config.Server.Host = serverHost
 | |
| 	if c.IsSet("server-webhook-host") {
 | |
| 		server.Config.Server.WebhookHost = c.String("server-webhook-host")
 | |
| 	} else {
 | |
| 		server.Config.Server.WebhookHost = serverHost
 | |
| 	}
 | |
| 	server.Config.Server.OAuthHost = serverHost
 | |
| 	server.Config.Server.Port = c.String("server-addr")
 | |
| 	server.Config.Server.PortTLS = c.String("server-addr-tls")
 | |
| 	server.Config.Server.StatusContext = c.String("status-context")
 | |
| 	server.Config.Server.StatusContextFormat = c.String("status-context-format")
 | |
| 	server.Config.Server.SessionExpires = c.Duration("session-expires")
 | |
| 	u, _ := url.Parse(server.Config.Server.Host)
 | |
| 	rootPath := strings.TrimSuffix(u.Path, "/")
 | |
| 	if rootPath != "" && !strings.HasPrefix(rootPath, "/") {
 | |
| 		rootPath = "/" + rootPath
 | |
| 	}
 | |
| 	server.Config.Server.RootPath = rootPath
 | |
| 	server.Config.Server.CustomCSSFile = strings.TrimSpace(c.String("custom-css-file"))
 | |
| 	server.Config.Server.CustomJsFile = strings.TrimSpace(c.String("custom-js-file"))
 | |
| 	server.Config.Pipeline.Networks = c.StringSlice("network")
 | |
| 	server.Config.Pipeline.Volumes = c.StringSlice("volume")
 | |
| 	server.Config.WebUI.EnableSwagger = c.Bool("enable-swagger")
 | |
| 	server.Config.WebUI.SkipVersionCheck = c.Bool("skip-version-check")
 | |
| 	server.Config.Pipeline.PrivilegedPlugins = c.StringSlice("plugins-privileged")
 | |
| 
 | |
| 	// prometheus
 | |
| 	server.Config.Prometheus.AuthToken = c.String("prometheus-auth-token")
 | |
| 
 | |
| 	// permissions
 | |
| 	server.Config.Permissions.Open = c.Bool("open")
 | |
| 	server.Config.Permissions.Admins = permissions.NewAdmins(c.StringSlice("admin"))
 | |
| 	server.Config.Permissions.Orgs = permissions.NewOrgs(c.StringSlice("orgs"))
 | |
| 	server.Config.Permissions.OwnersAllowlist = permissions.NewOwnersAllowlist(c.StringSlice("repo-owners"))
 | |
| 	return nil
 | |
| }
 |