mirror of
https://github.com/woodpecker-ci/woodpecker.git
synced 2024-11-30 13:51:30 +00:00
2ccf7c6f1a
Gogs support is broken (and we won't fix it because we don't care about
it...) because it does not support OAuth, at least after we introduced
the new Vue UI.
See:
77d830d5b5/server/forge/gogs/gogs.go (L84)
This route is not present in the new UI.
362 lines
11 KiB
Go
362 lines
11 KiB
Go
// Copyright 2022 Woodpecker Authors
|
|
// Copyright 2018 Drone.IO Inc.
|
|
//
|
|
// Licensed under the Apache License, Version 2.0 (the "License");
|
|
// you may not use this file except in compliance with the License.
|
|
// You may obtain a copy of the License at
|
|
//
|
|
// http://www.apache.org/licenses/LICENSE-2.0
|
|
//
|
|
// Unless required by applicable law or agreed to in writing, software
|
|
// distributed under the License is distributed on an "AS IS" BASIS,
|
|
// WITHOUT WARRANTIES OR CONDITIONS OF ANY KIND, either express or implied.
|
|
// See the License for the specific language governing permissions and
|
|
// limitations under the License.
|
|
|
|
package main
|
|
|
|
import (
|
|
"context"
|
|
"crypto"
|
|
"crypto/ed25519"
|
|
"crypto/rand"
|
|
"encoding/hex"
|
|
"errors"
|
|
"fmt"
|
|
"net/url"
|
|
"os"
|
|
"strings"
|
|
"time"
|
|
|
|
"github.com/prometheus/client_golang/prometheus"
|
|
"github.com/prometheus/client_golang/prometheus/promauto"
|
|
"github.com/rs/zerolog/log"
|
|
"github.com/urfave/cli/v2"
|
|
"golang.org/x/sync/errgroup"
|
|
|
|
"github.com/woodpecker-ci/woodpecker/server"
|
|
"github.com/woodpecker-ci/woodpecker/server/cache"
|
|
"github.com/woodpecker-ci/woodpecker/server/forge"
|
|
"github.com/woodpecker-ci/woodpecker/server/forge/bitbucket"
|
|
"github.com/woodpecker-ci/woodpecker/server/forge/bitbucketserver"
|
|
"github.com/woodpecker-ci/woodpecker/server/forge/gitea"
|
|
"github.com/woodpecker-ci/woodpecker/server/forge/github"
|
|
"github.com/woodpecker-ci/woodpecker/server/forge/gitlab"
|
|
"github.com/woodpecker-ci/woodpecker/server/model"
|
|
"github.com/woodpecker-ci/woodpecker/server/plugins/environments"
|
|
"github.com/woodpecker-ci/woodpecker/server/plugins/registry"
|
|
"github.com/woodpecker-ci/woodpecker/server/plugins/secrets"
|
|
"github.com/woodpecker-ci/woodpecker/server/queue"
|
|
"github.com/woodpecker-ci/woodpecker/server/store"
|
|
"github.com/woodpecker-ci/woodpecker/server/store/datastore"
|
|
"github.com/woodpecker-ci/woodpecker/server/store/types"
|
|
)
|
|
|
|
func setupStore(c *cli.Context) (store.Store, error) {
|
|
datasource := c.String("datasource")
|
|
driver := c.String("driver")
|
|
|
|
if driver == "sqlite3" {
|
|
if datastore.SupportedDriver("sqlite3") {
|
|
log.Debug().Msgf("server has sqlite3 support")
|
|
} else {
|
|
log.Debug().Msgf("server was built without sqlite3 support!")
|
|
}
|
|
}
|
|
|
|
if !datastore.SupportedDriver(driver) {
|
|
log.Fatal().Msgf("database driver '%s' not supported", driver)
|
|
}
|
|
|
|
if driver == "sqlite3" {
|
|
if newDatasource, err := fallbackSqlite3File(datasource); err != nil {
|
|
log.Fatal().Err(err).Msg("fallback to old sqlite3 file failed")
|
|
} else {
|
|
datasource = newDatasource
|
|
}
|
|
}
|
|
|
|
opts := &store.Opts{
|
|
Driver: driver,
|
|
Config: datasource,
|
|
}
|
|
log.Trace().Msgf("setup datastore: %#v", *opts)
|
|
store, err := datastore.NewEngine(opts)
|
|
if err != nil {
|
|
log.Fatal().Err(err).Msg("could not open datastore")
|
|
}
|
|
|
|
if err := store.Migrate(); err != nil {
|
|
log.Fatal().Err(err).Msg("could not migrate datastore")
|
|
}
|
|
|
|
return store, nil
|
|
}
|
|
|
|
// TODO: remove it in v1.1.0
|
|
// TODO: add it to the "how to migrate from drone docs"
|
|
func fallbackSqlite3File(path string) (string, error) {
|
|
const dockerDefaultPath = "/var/lib/woodpecker/woodpecker.sqlite"
|
|
const dockerDefaultDir = "/var/lib/woodpecker/drone.sqlite"
|
|
const dockerOldPath = "/var/lib/drone/drone.sqlite"
|
|
const standaloneDefault = "woodpecker.sqlite"
|
|
const standaloneOld = "drone.sqlite"
|
|
|
|
// custom location was set, use that one
|
|
if path != dockerDefaultPath && path != standaloneDefault {
|
|
return path, nil
|
|
}
|
|
|
|
// file is at new default("/var/lib/woodpecker/woodpecker.sqlite")
|
|
_, err := os.Stat(dockerDefaultPath)
|
|
if err != nil && !os.IsNotExist(err) {
|
|
return "", err
|
|
}
|
|
if err == nil {
|
|
return dockerDefaultPath, nil
|
|
}
|
|
|
|
// file is at new default("woodpecker.sqlite")
|
|
_, err = os.Stat(standaloneDefault)
|
|
if err != nil && !os.IsNotExist(err) {
|
|
return "", err
|
|
}
|
|
if err == nil {
|
|
return standaloneDefault, nil
|
|
}
|
|
|
|
// woodpecker run in standalone mode, file is in same folder but not renamed
|
|
_, err = os.Stat(standaloneOld)
|
|
if err != nil && !os.IsNotExist(err) {
|
|
return "", err
|
|
}
|
|
if err == nil {
|
|
// rename in same folder should be fine as it should be same docker volume
|
|
log.Warn().Msgf("found sqlite3 file at '%s' and moved to '%s'", standaloneOld, standaloneDefault)
|
|
return standaloneDefault, os.Rename(standaloneOld, standaloneDefault)
|
|
}
|
|
|
|
// file is in new folder but not renamed
|
|
_, err = os.Stat(dockerDefaultDir)
|
|
if err != nil && !os.IsNotExist(err) {
|
|
return "", err
|
|
}
|
|
if err == nil {
|
|
// rename in same folder should be fine as it should be same docker volume
|
|
log.Warn().Msgf("found sqlite3 file at '%s' and moved to '%s'", dockerDefaultDir, dockerDefaultPath)
|
|
return dockerDefaultPath, os.Rename(dockerDefaultDir, dockerDefaultPath)
|
|
}
|
|
|
|
// file is still at old location
|
|
_, err = os.Stat(dockerOldPath)
|
|
if err == nil {
|
|
log.Fatal().Msgf("found sqlite3 file at old path '%s', please move it to '%s' and update your volume path if necessary", dockerOldPath, dockerDefaultPath)
|
|
}
|
|
|
|
// file does not exist at all
|
|
log.Warn().Msgf("no sqlite3 file found, will create one at '%s'", path)
|
|
return path, nil
|
|
}
|
|
|
|
func setupQueue(c *cli.Context, s store.Store) queue.Queue {
|
|
return queue.WithTaskStore(queue.New(c.Context), s)
|
|
}
|
|
|
|
func setupSecretService(c *cli.Context, s model.SecretStore) model.SecretService {
|
|
return secrets.New(c.Context, s)
|
|
}
|
|
|
|
func setupRegistryService(c *cli.Context, s store.Store) model.RegistryService {
|
|
if c.String("docker-config") != "" {
|
|
return registry.Combined(
|
|
registry.New(s),
|
|
registry.Filesystem(c.String("docker-config")),
|
|
)
|
|
}
|
|
return registry.New(s)
|
|
}
|
|
|
|
func setupEnvironService(c *cli.Context, _ store.Store) model.EnvironService {
|
|
return environments.Parse(c.StringSlice("environment"))
|
|
}
|
|
|
|
func setupMembershipService(_ *cli.Context, r forge.Forge) cache.MembershipService {
|
|
return cache.NewMembershipService(r)
|
|
}
|
|
|
|
// setupForge helper function to setup the forge from the CLI arguments.
|
|
func setupForge(c *cli.Context) (forge.Forge, error) {
|
|
switch {
|
|
case c.Bool("github"):
|
|
return setupGitHub(c)
|
|
case c.Bool("gitlab"):
|
|
return setupGitLab(c)
|
|
case c.Bool("bitbucket"):
|
|
return setupBitbucket(c)
|
|
case c.Bool("stash"):
|
|
return setupStash(c)
|
|
case c.Bool("gitea"):
|
|
return setupGitea(c)
|
|
default:
|
|
return nil, fmt.Errorf("version control system not configured")
|
|
}
|
|
}
|
|
|
|
// setupBitbucket helper function to setup the Bitbucket forge from the CLI arguments.
|
|
func setupBitbucket(c *cli.Context) (forge.Forge, error) {
|
|
opts := &bitbucket.Opts{
|
|
Client: c.String("bitbucket-client"),
|
|
Secret: c.String("bitbucket-secret"),
|
|
}
|
|
log.Trace().Msgf("Forge (bitbucket) opts: %#v", opts)
|
|
return bitbucket.New(opts)
|
|
}
|
|
|
|
// setupGitea helper function to setup the Gitea forge from the CLI arguments.
|
|
func setupGitea(c *cli.Context) (forge.Forge, error) {
|
|
server, err := url.Parse(c.String("gitea-server"))
|
|
if err != nil {
|
|
return nil, err
|
|
}
|
|
opts := gitea.Opts{
|
|
URL: strings.TrimRight(server.String(), "/"),
|
|
Client: c.String("gitea-client"),
|
|
Secret: c.String("gitea-secret"),
|
|
SkipVerify: c.Bool("gitea-skip-verify"),
|
|
}
|
|
if len(opts.URL) == 0 {
|
|
log.Fatal().Msg("WOODPECKER_GITEA_URL must be set")
|
|
}
|
|
log.Trace().Msgf("Forge (gitea) opts: %#v", opts)
|
|
return gitea.New(opts)
|
|
}
|
|
|
|
// setupStash helper function to setup the Stash forge from the CLI arguments.
|
|
func setupStash(c *cli.Context) (forge.Forge, error) {
|
|
opts := bitbucketserver.Opts{
|
|
URL: c.String("stash-server"),
|
|
Username: c.String("stash-git-username"),
|
|
Password: c.String("stash-git-password"),
|
|
ConsumerKey: c.String("stash-consumer-key"),
|
|
ConsumerRSA: c.String("stash-consumer-rsa"),
|
|
ConsumerRSAString: c.String("stash-consumer-rsa-string"),
|
|
SkipVerify: c.Bool("stash-skip-verify"),
|
|
}
|
|
log.Trace().Msgf("Forge (bitbucketserver) opts: %#v", opts)
|
|
return bitbucketserver.New(opts)
|
|
}
|
|
|
|
// setupGitLab helper function to setup the GitLab forge from the CLI arguments.
|
|
func setupGitLab(c *cli.Context) (forge.Forge, error) {
|
|
return gitlab.New(gitlab.Opts{
|
|
URL: c.String("gitlab-server"),
|
|
ClientID: c.String("gitlab-client"),
|
|
ClientSecret: c.String("gitlab-secret"),
|
|
SkipVerify: c.Bool("gitlab-skip-verify"),
|
|
})
|
|
}
|
|
|
|
// setupGitHub helper function to setup the GitHub forge from the CLI arguments.
|
|
func setupGitHub(c *cli.Context) (forge.Forge, error) {
|
|
opts := github.Opts{
|
|
URL: c.String("github-server"),
|
|
Client: c.String("github-client"),
|
|
Secret: c.String("github-secret"),
|
|
SkipVerify: c.Bool("github-skip-verify"),
|
|
MergeRef: c.Bool("github-merge-ref"),
|
|
}
|
|
log.Trace().Msgf("Forge (github) opts: %#v", opts)
|
|
return github.New(opts)
|
|
}
|
|
|
|
func setupMetrics(g *errgroup.Group, _store store.Store) {
|
|
pendingSteps := promauto.NewGauge(prometheus.GaugeOpts{
|
|
Namespace: "woodpecker",
|
|
Name: "pending_steps",
|
|
Help: "Total number of pending pipeline steps.",
|
|
})
|
|
waitingSteps := promauto.NewGauge(prometheus.GaugeOpts{
|
|
Namespace: "woodpecker",
|
|
Name: "waiting_steps",
|
|
Help: "Total number of pipeline waiting on deps.",
|
|
})
|
|
runningSteps := promauto.NewGauge(prometheus.GaugeOpts{
|
|
Namespace: "woodpecker",
|
|
Name: "running_steps",
|
|
Help: "Total number of running pipeline steps.",
|
|
})
|
|
workers := promauto.NewGauge(prometheus.GaugeOpts{
|
|
Namespace: "woodpecker",
|
|
Name: "worker_count",
|
|
Help: "Total number of workers.",
|
|
})
|
|
pipelines := promauto.NewGauge(prometheus.GaugeOpts{
|
|
Namespace: "woodpecker",
|
|
Name: "pipeline_total_count",
|
|
Help: "Total number of pipelines.",
|
|
})
|
|
users := promauto.NewGauge(prometheus.GaugeOpts{
|
|
Namespace: "woodpecker",
|
|
Name: "user_count",
|
|
Help: "Total number of users.",
|
|
})
|
|
repos := promauto.NewGauge(prometheus.GaugeOpts{
|
|
Namespace: "woodpecker",
|
|
Name: "repo_count",
|
|
Help: "Total number of repos.",
|
|
})
|
|
|
|
g.Go(func() error {
|
|
for {
|
|
stats := server.Config.Services.Queue.Info(context.TODO())
|
|
pendingSteps.Set(float64(stats.Stats.Pending))
|
|
waitingSteps.Set(float64(stats.Stats.WaitingOnDeps))
|
|
runningSteps.Set(float64(stats.Stats.Running))
|
|
workers.Set(float64(stats.Stats.Workers))
|
|
time.Sleep(500 * time.Millisecond)
|
|
}
|
|
})
|
|
g.Go(func() error {
|
|
for {
|
|
repoCount, _ := _store.GetRepoCount()
|
|
userCount, _ := _store.GetUserCount()
|
|
pipelineCount, _ := _store.GetPipelineCount()
|
|
pipelines.Set(float64(pipelineCount))
|
|
users.Set(float64(userCount))
|
|
repos.Set(float64(repoCount))
|
|
time.Sleep(10 * time.Second)
|
|
}
|
|
})
|
|
}
|
|
|
|
// setupSignatureKeys generate or load key pair to sign webhooks requests (i.e. used for extensions)
|
|
func setupSignatureKeys(_store store.Store) (crypto.PrivateKey, crypto.PublicKey) {
|
|
privKeyID := "signature-private-key"
|
|
|
|
privKey, err := _store.ServerConfigGet(privKeyID)
|
|
if errors.Is(err, types.RecordNotExist) {
|
|
_, privKey, err := ed25519.GenerateKey(rand.Reader)
|
|
if err != nil {
|
|
log.Fatal().Err(err).Msgf("Failed to generate private key")
|
|
return nil, nil
|
|
}
|
|
err = _store.ServerConfigSet(privKeyID, hex.EncodeToString(privKey))
|
|
if err != nil {
|
|
log.Fatal().Err(err).Msgf("Failed to generate private key")
|
|
return nil, nil
|
|
}
|
|
log.Debug().Msg("Created private key")
|
|
return privKey, privKey.Public()
|
|
} else if err != nil {
|
|
log.Fatal().Err(err).Msgf("Failed to load private key")
|
|
return nil, nil
|
|
} else {
|
|
privKeyStr, err := hex.DecodeString(privKey)
|
|
if err != nil {
|
|
log.Fatal().Err(err).Msgf("Failed to decode private key")
|
|
return nil, nil
|
|
}
|
|
privKey := ed25519.PrivateKey(privKeyStr)
|
|
return privKey, privKey.Public()
|
|
}
|
|
}
|