2014-02-07 10:10:01 +00:00
|
|
|
package main
|
|
|
|
|
|
|
|
import (
|
|
|
|
"flag"
|
|
|
|
"log"
|
|
|
|
"net/http"
|
2014-02-26 01:10:04 +00:00
|
|
|
"runtime"
|
2014-02-07 10:10:01 +00:00
|
|
|
"strings"
|
2014-02-26 01:10:04 +00:00
|
|
|
"time"
|
2014-02-07 10:10:01 +00:00
|
|
|
|
|
|
|
"code.google.com/p/go.net/websocket"
|
|
|
|
"github.com/GeertJohan/go.rice"
|
|
|
|
"github.com/bmizerany/pat"
|
|
|
|
|
2014-02-26 01:10:04 +00:00
|
|
|
"github.com/drone/drone/pkg/build/docker"
|
2014-02-07 10:10:01 +00:00
|
|
|
"github.com/drone/drone/pkg/channel"
|
|
|
|
"github.com/drone/drone/pkg/database"
|
|
|
|
"github.com/drone/drone/pkg/handler"
|
2014-02-26 01:10:04 +00:00
|
|
|
"github.com/drone/drone/pkg/queue"
|
2014-02-07 10:10:01 +00:00
|
|
|
)
|
|
|
|
|
|
|
|
var (
|
|
|
|
// port the server will run on
|
|
|
|
port string
|
|
|
|
|
|
|
|
// database driver used to connect to the database
|
|
|
|
driver string
|
|
|
|
|
|
|
|
// driver specific connection information. In this
|
|
|
|
// case, it should be the location of the SQLite file
|
|
|
|
datasource string
|
2014-02-25 12:46:05 +00:00
|
|
|
|
|
|
|
// optional flags for tls listener
|
|
|
|
sslcert string
|
|
|
|
sslkey string
|
2014-02-26 21:20:47 +00:00
|
|
|
|
|
|
|
// build will timeout after N milliseconds.
|
|
|
|
// this will default to 500 minutes (6 hours)
|
|
|
|
timeout time.Duration
|
2014-03-02 03:46:10 +00:00
|
|
|
|
|
|
|
// commit sha for the current build.
|
|
|
|
version string
|
2014-03-20 22:58:06 +00:00
|
|
|
|
|
|
|
// Number of concurrent build workers to run
|
|
|
|
// default to number of CPUs on machine
|
|
|
|
workers int
|
2014-02-07 10:10:01 +00:00
|
|
|
)
|
|
|
|
|
|
|
|
func main() {
|
|
|
|
// parse command line flags
|
|
|
|
flag.StringVar(&port, "port", ":8080", "")
|
|
|
|
flag.StringVar(&driver, "driver", "sqlite3", "")
|
|
|
|
flag.StringVar(&datasource, "datasource", "drone.sqlite", "")
|
2014-02-25 12:46:05 +00:00
|
|
|
flag.StringVar(&sslcert, "sslcert", "", "")
|
|
|
|
flag.StringVar(&sslkey, "sslkey", "", "")
|
2014-02-26 21:20:47 +00:00
|
|
|
flag.DurationVar(&timeout, "timeout", 300*time.Minute, "")
|
2014-03-20 22:58:06 +00:00
|
|
|
flag.IntVar(&workers, "workers", runtime.NumCPU(), "")
|
2014-02-07 10:10:01 +00:00
|
|
|
flag.Parse()
|
|
|
|
|
2014-02-25 12:46:05 +00:00
|
|
|
// validate the TLS arguments
|
|
|
|
checkTLSFlags()
|
|
|
|
|
2014-02-07 10:10:01 +00:00
|
|
|
// setup database and handlers
|
2014-03-08 05:19:28 +00:00
|
|
|
if err := database.Init(driver, datasource); err != nil {
|
2014-03-08 11:12:43 +00:00
|
|
|
log.Fatal("Can't initialize database: ", err)
|
2014-03-08 05:19:28 +00:00
|
|
|
}
|
2014-03-12 04:30:00 +00:00
|
|
|
discardOldBuilds()
|
2014-02-07 10:10:01 +00:00
|
|
|
setupStatic()
|
|
|
|
setupHandlers()
|
|
|
|
|
2014-03-02 03:46:10 +00:00
|
|
|
// debug
|
|
|
|
log.Printf("starting drone version %s on port %s\n", version, port)
|
|
|
|
|
2014-02-25 12:46:05 +00:00
|
|
|
// start webserver using HTTPS or HTTP
|
|
|
|
if sslcert != "" && sslkey != "" {
|
|
|
|
panic(http.ListenAndServeTLS(port, sslcert, sslkey, nil))
|
|
|
|
} else {
|
|
|
|
panic(http.ListenAndServe(port, nil))
|
|
|
|
}
|
|
|
|
}
|
|
|
|
|
|
|
|
// checking if the TLS flags where supplied correctly.
|
|
|
|
func checkTLSFlags() {
|
|
|
|
|
|
|
|
if sslcert != "" && sslkey == "" {
|
|
|
|
log.Fatal("invalid configuration: -sslkey unspecified, but -sslcert was specified.")
|
|
|
|
} else if sslcert == "" && sslkey != "" {
|
|
|
|
log.Fatal("invalid configuration: -sslcert unspecified, but -sslkey was specified.")
|
|
|
|
}
|
|
|
|
|
2014-02-07 10:10:01 +00:00
|
|
|
}
|
|
|
|
|
2014-03-12 04:30:00 +00:00
|
|
|
// discardOldBuilds sets builds that are in the 'Started'
|
|
|
|
// state to 'Failure' on startup. The assumption is that
|
|
|
|
// the drone process was shut down mid-build and thus the
|
|
|
|
// builds will never complete.
|
|
|
|
func discardOldBuilds() {
|
2014-03-24 04:21:33 +00:00
|
|
|
err := database.FailUnfinishedBuilds()
|
2014-03-12 04:30:00 +00:00
|
|
|
if err != nil {
|
|
|
|
log.Fatal(err)
|
|
|
|
}
|
|
|
|
|
2014-03-24 04:21:33 +00:00
|
|
|
err = database.FailUnfinishedCommits()
|
2014-03-12 04:30:00 +00:00
|
|
|
if err != nil {
|
|
|
|
log.Fatal(err)
|
|
|
|
}
|
|
|
|
}
|
|
|
|
|
2014-02-07 10:10:01 +00:00
|
|
|
// setup routes for static assets. These assets may
|
|
|
|
// be directly embedded inside the application using
|
|
|
|
// the `rice embed` command, else they are served from disk.
|
|
|
|
func setupStatic() {
|
|
|
|
box := rice.MustFindBox("assets")
|
|
|
|
http.Handle("/css/", http.FileServer(box.HTTPBox()))
|
2014-03-02 05:43:20 +00:00
|
|
|
http.Handle("/js/", http.FileServer(box.HTTPBox()))
|
2014-02-14 20:24:12 +00:00
|
|
|
|
|
|
|
// we need to intercept all attempts to serve images
|
|
|
|
// so that we can add a cache-control settings
|
|
|
|
var images = http.FileServer(box.HTTPBox())
|
|
|
|
http.HandleFunc("/img/", func(w http.ResponseWriter, r *http.Request) {
|
|
|
|
if strings.HasPrefix(r.URL.Path, "/img/build_") {
|
|
|
|
w.Header().Add("Cache-Control", "no-cache")
|
|
|
|
}
|
|
|
|
|
|
|
|
// serce images
|
|
|
|
images.ServeHTTP(w, r)
|
|
|
|
})
|
2014-02-07 10:10:01 +00:00
|
|
|
}
|
|
|
|
|
|
|
|
// setup routes for serving dynamic content.
|
|
|
|
func setupHandlers() {
|
2014-02-26 21:20:47 +00:00
|
|
|
queueRunner := queue.NewBuildRunner(docker.New(), timeout)
|
2014-03-20 22:58:06 +00:00
|
|
|
queue := queue.Start(workers, queueRunner)
|
2014-02-26 01:10:04 +00:00
|
|
|
|
|
|
|
hookHandler := handler.NewHookHandler(queue)
|
2014-03-29 06:37:50 +00:00
|
|
|
gitlab := handler.NewGitlabHandler(queue)
|
2014-02-26 01:10:04 +00:00
|
|
|
|
2014-02-07 10:10:01 +00:00
|
|
|
m := pat.New()
|
|
|
|
m.Get("/login", handler.ErrorHandler(handler.Login))
|
|
|
|
m.Post("/login", handler.ErrorHandler(handler.Authorize))
|
|
|
|
m.Get("/logout", handler.ErrorHandler(handler.Logout))
|
|
|
|
m.Get("/forgot", handler.ErrorHandler(handler.Forgot))
|
|
|
|
m.Post("/forgot", handler.ErrorHandler(handler.ForgotPost))
|
|
|
|
m.Get("/reset", handler.ErrorHandler(handler.Reset))
|
|
|
|
m.Post("/reset", handler.ErrorHandler(handler.ResetPost))
|
2014-02-13 09:08:20 +00:00
|
|
|
m.Get("/signup", handler.ErrorHandler(handler.SignUp))
|
|
|
|
m.Post("/signup", handler.ErrorHandler(handler.SignUpPost))
|
2014-02-07 10:10:01 +00:00
|
|
|
m.Get("/register", handler.ErrorHandler(handler.Register))
|
|
|
|
m.Post("/register", handler.ErrorHandler(handler.RegisterPost))
|
|
|
|
m.Get("/accept", handler.UserHandler(handler.TeamMemberAccept))
|
|
|
|
|
|
|
|
// handlers for setting up your GitHub repository
|
|
|
|
m.Post("/new/github.com", handler.UserHandler(handler.RepoCreateGithub))
|
2014-03-28 18:40:26 +00:00
|
|
|
m.Get("/new/github.com", handler.UserHandler(handler.RepoAddGithub))
|
|
|
|
|
2014-02-07 10:10:01 +00:00
|
|
|
// handlers for linking your GitHub account
|
|
|
|
m.Get("/auth/login/github", handler.UserHandler(handler.LinkGithub))
|
|
|
|
|
2014-03-28 18:40:26 +00:00
|
|
|
// handlers for setting up your Bitbucket repository
|
|
|
|
m.Post("/new/bitbucket.org", handler.UserHandler(handler.RepoCreateBitbucket))
|
|
|
|
m.Get("/new/bitbucket.org", handler.UserHandler(handler.RepoAddBitbucket))
|
2014-02-07 10:10:01 +00:00
|
|
|
|
2014-03-28 18:40:26 +00:00
|
|
|
// handlers for linking your Bitbucket account
|
|
|
|
m.Get("/auth/login/bitbucket", handler.UserHandler(handler.LinkBitbucket))
|
|
|
|
|
2014-03-29 06:37:50 +00:00
|
|
|
// handlers for setting up your GitLab repository
|
|
|
|
m.Post("/new/gitlab", handler.UserHandler(gitlab.Create))
|
|
|
|
m.Get("/new/gitlab", handler.UserHandler(gitlab.Add))
|
|
|
|
|
|
|
|
// handler for linking GitLab account
|
|
|
|
m.Post("/link/gitlab", handler.UserHandler(gitlab.Link))
|
2014-03-31 06:53:47 +00:00
|
|
|
m.Get("/link/gitlab", handler.UserHandler(gitlab.ReLink))
|
2014-03-29 06:37:50 +00:00
|
|
|
|
2014-02-07 10:10:01 +00:00
|
|
|
// handlers for dashboard pages
|
|
|
|
m.Get("/dashboard/team/:team", handler.UserHandler(handler.TeamShow))
|
|
|
|
m.Get("/dashboard", handler.UserHandler(handler.UserShow))
|
|
|
|
|
|
|
|
// handlers for user account management
|
|
|
|
m.Get("/account/user/profile", handler.UserHandler(handler.UserEdit))
|
|
|
|
m.Post("/account/user/profile", handler.UserHandler(handler.UserUpdate))
|
|
|
|
m.Get("/account/user/delete", handler.UserHandler(handler.UserDeleteConfirm))
|
|
|
|
m.Post("/account/user/delete", handler.UserHandler(handler.UserDelete))
|
|
|
|
m.Get("/account/user/password", handler.UserHandler(handler.UserPass))
|
|
|
|
m.Post("/account/user/password", handler.UserHandler(handler.UserPassUpdate))
|
|
|
|
m.Get("/account/user/teams/add", handler.UserHandler(handler.TeamAdd))
|
|
|
|
m.Post("/account/user/teams/add", handler.UserHandler(handler.TeamCreate))
|
|
|
|
m.Get("/account/user/teams", handler.UserHandler(handler.UserTeams))
|
|
|
|
|
|
|
|
// handlers for team managements
|
|
|
|
m.Get("/account/team/:team/profile", handler.UserHandler(handler.TeamEdit))
|
|
|
|
m.Post("/account/team/:team/profile", handler.UserHandler(handler.TeamUpdate))
|
|
|
|
m.Get("/account/team/:team/delete", handler.UserHandler(handler.TeamDeleteConfirm))
|
|
|
|
m.Post("/account/team/:team/delete", handler.UserHandler(handler.TeamDelete))
|
|
|
|
m.Get("/account/team/:team/members/add", handler.UserHandler(handler.TeamMemberAdd))
|
|
|
|
m.Post("/account/team/:team/members/add", handler.UserHandler(handler.TeamMemberInvite))
|
|
|
|
m.Get("/account/team/:team/members/edit", handler.UserHandler(handler.TeamMemberEdit))
|
|
|
|
m.Post("/account/team/:team/members/edit", handler.UserHandler(handler.TeamMemberUpdate))
|
|
|
|
m.Post("/account/team/:team/members/delete", handler.UserHandler(handler.TeamMemberDelete))
|
|
|
|
m.Get("/account/team/:team/members", handler.UserHandler(handler.TeamMembers))
|
|
|
|
|
|
|
|
// handlers for system administration
|
|
|
|
m.Get("/account/admin/settings", handler.AdminHandler(handler.AdminSettings))
|
|
|
|
m.Post("/account/admin/settings", handler.AdminHandler(handler.AdminSettingsUpdate))
|
|
|
|
m.Get("/account/admin/users/edit", handler.AdminHandler(handler.AdminUserEdit))
|
|
|
|
m.Post("/account/admin/users/edit", handler.AdminHandler(handler.AdminUserUpdate))
|
|
|
|
m.Post("/account/admin/users/delete", handler.AdminHandler(handler.AdminUserDelete))
|
|
|
|
m.Get("/account/admin/users/add", handler.AdminHandler(handler.AdminUserAdd))
|
|
|
|
m.Post("/account/admin/users", handler.AdminHandler(handler.AdminUserInvite))
|
|
|
|
m.Get("/account/admin/users", handler.AdminHandler(handler.AdminUserList))
|
|
|
|
|
|
|
|
// handlers for GitHub post-commit hooks
|
2014-03-28 18:40:26 +00:00
|
|
|
m.Post("/hook/github.com", handler.ErrorHandler(hookHandler.HookGithub))
|
|
|
|
|
|
|
|
// handlers for Bitbucket post-commit hooks
|
|
|
|
m.Post("/hook/bitbucket.org", handler.ErrorHandler(hookHandler.HookBitbucket))
|
2014-02-07 10:10:01 +00:00
|
|
|
|
2014-03-27 11:19:36 +00:00
|
|
|
// handlers for GitLab post-commit hooks
|
2014-03-30 16:26:53 +00:00
|
|
|
m.Post("/hook/gitlab", handler.ErrorHandler(gitlab.Hook))
|
2014-03-27 11:19:36 +00:00
|
|
|
|
2014-02-07 10:10:01 +00:00
|
|
|
// handlers for first-time installation
|
|
|
|
m.Get("/install", handler.ErrorHandler(handler.Install))
|
|
|
|
m.Post("/install", handler.ErrorHandler(handler.InstallPost))
|
|
|
|
|
|
|
|
// handlers for repository, commits and build details
|
2014-03-17 06:08:53 +00:00
|
|
|
m.Get("/:host/:owner/:name/commit/:commit/build/:label/out.txt", handler.RepoHandler(handler.BuildOut))
|
|
|
|
m.Get("/:host/:owner/:name/commit/:commit/build/:label", handler.RepoHandler(handler.CommitShow))
|
|
|
|
m.Get("/:host/:owner/:name/commit/:commit", handler.RepoHandler(handler.CommitShow))
|
2014-02-12 19:22:56 +00:00
|
|
|
m.Get("/:host/:owner/:name/tree", handler.RepoHandler(handler.RepoDashboard))
|
2014-03-11 19:02:39 +00:00
|
|
|
m.Get("/:host/:owner/:name/status.svg", handler.ErrorHandler(handler.Badge))
|
2014-02-07 10:10:01 +00:00
|
|
|
m.Get("/:host/:owner/:name/settings", handler.RepoAdminHandler(handler.RepoSettingsForm))
|
|
|
|
m.Get("/:host/:owner/:name/params", handler.RepoAdminHandler(handler.RepoParamsForm))
|
|
|
|
m.Get("/:host/:owner/:name/badges", handler.RepoAdminHandler(handler.RepoBadges))
|
|
|
|
m.Get("/:host/:owner/:name/keys", handler.RepoAdminHandler(handler.RepoKeys))
|
|
|
|
m.Get("/:host/:owner/:name/delete", handler.RepoAdminHandler(handler.RepoDeleteForm))
|
|
|
|
m.Post("/:host/:owner/:name/delete", handler.RepoAdminHandler(handler.RepoDelete))
|
|
|
|
m.Get("/:host/:owner/:name", handler.RepoHandler(handler.RepoDashboard))
|
|
|
|
m.Post("/:host/:owner/:name", handler.RepoHandler(handler.RepoUpdate))
|
|
|
|
http.Handle("/feed", websocket.Handler(channel.Read))
|
|
|
|
|
|
|
|
// no routes are served at the root URL. Instead we will
|
|
|
|
// redirect the user to his/her dashboard page.
|
|
|
|
m.Get("/", http.RedirectHandler("/dashboard", http.StatusSeeOther))
|
|
|
|
|
|
|
|
// the first time a page is requested we should record
|
|
|
|
// the scheme and hostname.
|
|
|
|
http.HandleFunc("/", func(w http.ResponseWriter, r *http.Request) {
|
|
|
|
// our multiplexer is a bit finnicky and therefore requires
|
|
|
|
// us to strip any trailing slashes in order to correctly
|
|
|
|
// find and match a route.
|
|
|
|
if r.URL.Path != "/" && strings.HasSuffix(r.URL.Path, "/") {
|
|
|
|
http.Redirect(w, r, r.URL.Path[:len(r.URL.Path)-1], http.StatusSeeOther)
|
|
|
|
return
|
|
|
|
}
|
|
|
|
|
|
|
|
// standard header variables that should be set, for good measure.
|
|
|
|
w.Header().Add("Cache-Control", "no-cache, no-store, max-age=0, must-revalidate")
|
|
|
|
w.Header().Add("X-Frame-Options", "DENY")
|
|
|
|
w.Header().Add("X-Content-Type-Options", "nosniff")
|
|
|
|
w.Header().Add("X-XSS-Protection", "1; mode=block")
|
|
|
|
|
|
|
|
// ok, now we're ready to serve the request.
|
|
|
|
m.ServeHTTP(w, r)
|
|
|
|
})
|
|
|
|
}
|