2014-03-25 14:21:42 +05:30
|
|
|
// Copyright 2014 The Gogs Authors. All rights reserved.
|
2021-06-09 05:03:54 +05:30
|
|
|
// Copyright 2021 The Gitea Authors. All rights reserved.
|
2022-11-27 23:50:29 +05:30
|
|
|
// SPDX-License-Identifier: MIT
|
2014-03-25 14:21:42 +05:30
|
|
|
|
2021-06-09 05:03:54 +05:30
|
|
|
package install
|
2014-03-25 14:21:42 +05:30
|
|
|
|
2014-03-28 16:56:22 +05:30
|
|
|
import (
|
2022-08-28 15:13:25 +05:30
|
|
|
goctx "context"
|
2020-12-25 15:29:32 +05:30
|
|
|
"fmt"
|
2020-10-20 02:33:08 +05:30
|
|
|
"net/http"
|
2014-03-30 03:20:51 +05:30
|
|
|
"os"
|
2014-04-09 00:57:35 +05:30
|
|
|
"os/exec"
|
2015-02-05 15:42:37 +05:30
|
|
|
"path/filepath"
|
2022-10-17 04:59:26 +05:30
|
|
|
"strconv"
|
2014-03-30 03:20:51 +05:30
|
|
|
"strings"
|
2021-01-26 21:06:53 +05:30
|
|
|
"time"
|
2014-03-30 03:20:51 +05:30
|
|
|
|
2021-09-19 17:19:59 +05:30
|
|
|
"code.gitea.io/gitea/models/db"
|
2021-12-01 13:20:01 +05:30
|
|
|
db_install "code.gitea.io/gitea/models/db/install"
|
2021-10-29 13:53:10 +05:30
|
|
|
"code.gitea.io/gitea/models/migrations"
|
2022-10-17 04:59:26 +05:30
|
|
|
system_model "code.gitea.io/gitea/models/system"
|
2021-11-24 15:19:20 +05:30
|
|
|
user_model "code.gitea.io/gitea/models/user"
|
2016-11-10 21:54:48 +05:30
|
|
|
"code.gitea.io/gitea/modules/base"
|
|
|
|
"code.gitea.io/gitea/modules/context"
|
2018-02-18 23:44:37 +05:30
|
|
|
"code.gitea.io/gitea/modules/generate"
|
2019-12-15 15:21:28 +05:30
|
|
|
"code.gitea.io/gitea/modules/graceful"
|
2016-11-10 21:54:48 +05:30
|
|
|
"code.gitea.io/gitea/modules/log"
|
|
|
|
"code.gitea.io/gitea/modules/setting"
|
2021-01-26 21:06:53 +05:30
|
|
|
"code.gitea.io/gitea/modules/templates"
|
2021-06-02 00:42:50 +05:30
|
|
|
"code.gitea.io/gitea/modules/translation"
|
2016-11-10 21:54:48 +05:30
|
|
|
"code.gitea.io/gitea/modules/user"
|
2020-11-28 08:12:08 +05:30
|
|
|
"code.gitea.io/gitea/modules/util"
|
2021-01-26 21:06:53 +05:30
|
|
|
"code.gitea.io/gitea/modules/web"
|
2021-01-30 14:25:53 +05:30
|
|
|
"code.gitea.io/gitea/modules/web/middleware"
|
2021-04-07 01:14:05 +05:30
|
|
|
"code.gitea.io/gitea/services/forms"
|
2019-08-23 22:10:30 +05:30
|
|
|
|
2021-01-26 21:06:53 +05:30
|
|
|
"gitea.com/go-chi/session"
|
2019-08-23 22:10:30 +05:30
|
|
|
"gopkg.in/ini.v1"
|
2014-03-28 16:56:22 +05:30
|
|
|
)
|
|
|
|
|
2014-06-22 22:44:03 +05:30
|
|
|
const (
|
2016-11-18 08:33:03 +05:30
|
|
|
// tplInstall template for installation page
|
2020-10-20 02:33:08 +05:30
|
|
|
tplInstall base.TplName = "install"
|
|
|
|
tplPostInstall base.TplName = "post-install"
|
2014-06-22 22:44:03 +05:30
|
|
|
)
|
|
|
|
|
2022-04-01 13:30:26 +05:30
|
|
|
// getSupportedDbTypeNames returns a slice for supported database types and names. The slice is used to keep the order
|
|
|
|
func getSupportedDbTypeNames() (dbTypeNames []map[string]string) {
|
|
|
|
for _, t := range setting.SupportedDatabaseTypes {
|
|
|
|
dbTypeNames = append(dbTypeNames, map[string]string{"type": t, "name": setting.DatabaseTypeNames[t]})
|
2021-12-07 11:14:08 +05:30
|
|
|
}
|
2022-04-01 13:30:26 +05:30
|
|
|
return dbTypeNames
|
2021-12-07 11:14:08 +05:30
|
|
|
}
|
|
|
|
|
2021-06-09 05:03:54 +05:30
|
|
|
// Init prepare for rendering installation page
|
2022-08-28 15:13:25 +05:30
|
|
|
func Init(ctx goctx.Context) func(next http.Handler) http.Handler {
|
|
|
|
_, rnd := templates.HTMLRenderer(ctx)
|
2022-04-01 13:30:26 +05:30
|
|
|
dbTypeNames := getSupportedDbTypeNames()
|
2022-08-28 15:13:25 +05:30
|
|
|
return func(next http.Handler) http.Handler {
|
|
|
|
return http.HandlerFunc(func(resp http.ResponseWriter, req *http.Request) {
|
|
|
|
if setting.InstallLock {
|
|
|
|
resp.Header().Add("Refresh", "1; url="+setting.AppURL+"user/login")
|
|
|
|
_ = rnd.HTML(resp, http.StatusOK, string(tplPostInstall), nil)
|
|
|
|
return
|
|
|
|
}
|
|
|
|
locale := middleware.Locale(resp, req)
|
|
|
|
startTime := time.Now()
|
|
|
|
ctx := context.Context{
|
|
|
|
Resp: context.NewResponse(resp),
|
|
|
|
Flash: &middleware.Flash{},
|
|
|
|
Locale: locale,
|
|
|
|
Render: rnd,
|
|
|
|
Session: session.GetSession(req),
|
|
|
|
Data: map[string]interface{}{
|
|
|
|
"locale": locale,
|
|
|
|
"Title": locale.Tr("install.install"),
|
|
|
|
"PageIsInstall": true,
|
|
|
|
"DbTypeNames": dbTypeNames,
|
|
|
|
"AllLangs": translation.AllLangs(),
|
|
|
|
"PageStartTime": startTime,
|
2021-12-15 12:29:57 +05:30
|
|
|
|
2022-08-28 15:13:25 +05:30
|
|
|
"PasswordHashAlgorithms": user_model.AvailableHashAlgorithms,
|
|
|
|
},
|
|
|
|
}
|
|
|
|
defer ctx.Close()
|
2022-05-05 19:43:23 +05:30
|
|
|
|
2022-08-28 15:13:25 +05:30
|
|
|
ctx.Req = context.WithContext(req, &ctx)
|
|
|
|
next.ServeHTTP(resp, ctx.Req)
|
|
|
|
})
|
|
|
|
}
|
2015-02-01 23:11:03 +05:30
|
|
|
}
|
2014-03-30 03:20:51 +05:30
|
|
|
|
2016-11-18 08:33:03 +05:30
|
|
|
// Install render installation page
|
2016-03-11 22:26:52 +05:30
|
|
|
func Install(ctx *context.Context) {
|
2021-04-07 01:14:05 +05:30
|
|
|
form := forms.InstallForm{}
|
2015-02-01 23:11:03 +05:30
|
|
|
|
2015-07-09 10:47:48 +05:30
|
|
|
// Database settings
|
2019-08-24 14:54:45 +05:30
|
|
|
form.DbHost = setting.Database.Host
|
|
|
|
form.DbUser = setting.Database.User
|
|
|
|
form.DbPasswd = setting.Database.Passwd
|
|
|
|
form.DbName = setting.Database.Name
|
|
|
|
form.DbPath = setting.Database.Path
|
2020-01-20 21:15:14 +05:30
|
|
|
form.DbSchema = setting.Database.Schema
|
2019-08-24 14:54:45 +05:30
|
|
|
form.Charset = setting.Database.Charset
|
2015-02-01 23:11:03 +05:30
|
|
|
|
2021-12-07 11:14:08 +05:30
|
|
|
curDBType := setting.Database.Type
|
|
|
|
var isCurDBTypeSupported bool
|
|
|
|
for _, dbType := range setting.SupportedDatabaseTypes {
|
|
|
|
if dbType == curDBType {
|
|
|
|
isCurDBTypeSupported = true
|
|
|
|
break
|
2015-09-13 01:01:36 +05:30
|
|
|
}
|
2015-07-09 10:47:48 +05:30
|
|
|
}
|
2021-12-07 11:14:08 +05:30
|
|
|
if !isCurDBTypeSupported {
|
|
|
|
curDBType = "mysql"
|
|
|
|
}
|
|
|
|
ctx.Data["CurDbType"] = curDBType
|
2020-11-16 13:03:41 +05:30
|
|
|
|
2015-07-09 10:47:48 +05:30
|
|
|
// Application general settings
|
|
|
|
form.AppName = setting.AppName
|
2015-02-01 23:11:03 +05:30
|
|
|
form.RepoRootPath = setting.RepoRootPath
|
2020-09-29 14:35:13 +05:30
|
|
|
form.LFSRootPath = setting.LFS.Path
|
2015-02-01 23:11:03 +05:30
|
|
|
|
2017-06-18 06:00:04 +05:30
|
|
|
// Note(unknown): it's hard for Windows users change a running user,
|
2015-02-01 23:11:03 +05:30
|
|
|
// so just use current one if config says default.
|
|
|
|
if setting.IsWindows && setting.RunUser == "git" {
|
2015-07-31 12:20:11 +05:30
|
|
|
form.RunUser = user.CurrentUsername()
|
2015-02-01 23:11:03 +05:30
|
|
|
} else {
|
|
|
|
form.RunUser = setting.RunUser
|
2014-04-11 00:07:43 +05:30
|
|
|
}
|
2014-03-30 03:20:51 +05:30
|
|
|
|
2015-02-01 23:11:03 +05:30
|
|
|
form.Domain = setting.Domain
|
2016-02-28 07:18:39 +05:30
|
|
|
form.SSHPort = setting.SSH.Port
|
2016-08-12 03:25:10 +05:30
|
|
|
form.HTTPPort = setting.HTTPPort
|
2016-11-27 11:33:59 +05:30
|
|
|
form.AppURL = setting.AppURL
|
2016-02-12 19:49:45 +05:30
|
|
|
form.LogRootPath = setting.LogRootPath
|
2015-02-01 23:11:03 +05:30
|
|
|
|
2015-07-09 10:47:48 +05:30
|
|
|
// E-mail service settings
|
|
|
|
if setting.MailService != nil {
|
Rework mailer settings (#18982)
* `PROTOCOL`: can be smtp, smtps, smtp+startls, smtp+unix, sendmail, dummy
* `SMTP_ADDR`: domain for SMTP, or path to unix socket
* `SMTP_PORT`: port for SMTP; defaults to 25 for `smtp`, 465 for `smtps`, and 587 for `smtp+startls`
* `ENABLE_HELO`, `HELO_HOSTNAME`: reverse `DISABLE_HELO` to `ENABLE_HELO`; default to false + system hostname
* `FORCE_TRUST_SERVER_CERT`: replace the unclear `SKIP_VERIFY`
* `CLIENT_CERT_FILE`, `CLIENT_KEY_FILE`, `USE_CLIENT_CERT`: clarify client certificates here
Co-authored-by: wxiaoguang <wxiaoguang@gmail.com>
Co-authored-by: Lunny Xiao <xiaolunwen@gmail.com>
2022-08-02 10:54:18 +05:30
|
|
|
form.SMTPAddr = setting.MailService.SMTPAddr
|
|
|
|
form.SMTPPort = setting.MailService.SMTPPort
|
2015-07-09 13:40:31 +05:30
|
|
|
form.SMTPFrom = setting.MailService.From
|
2017-02-24 07:07:13 +05:30
|
|
|
form.SMTPUser = setting.MailService.User
|
2022-05-02 14:15:23 +05:30
|
|
|
form.SMTPPasswd = setting.MailService.Passwd
|
2014-04-27 10:04:48 +05:30
|
|
|
}
|
2015-07-09 10:47:48 +05:30
|
|
|
form.RegisterConfirm = setting.Service.RegisterEmailConfirm
|
|
|
|
form.MailNotify = setting.Service.EnableNotifyMail
|
|
|
|
|
|
|
|
// Server and other services settings
|
|
|
|
form.OfflineMode = setting.OfflineMode
|
2022-10-18 20:46:58 +05:30
|
|
|
form.DisableGravatar = false // when installing, there is no database connection so that given a default value
|
|
|
|
form.EnableFederatedAvatar = false // when installing, there is no database connection so that given a default value
|
2022-10-17 04:59:26 +05:30
|
|
|
|
2017-11-29 18:17:42 +05:30
|
|
|
form.EnableOpenIDSignIn = setting.Service.EnableOpenIDSignIn
|
|
|
|
form.EnableOpenIDSignUp = setting.Service.EnableOpenIDSignUp
|
2015-07-09 10:47:48 +05:30
|
|
|
form.DisableRegistration = setting.Service.DisableRegistration
|
2018-05-13 13:21:16 +05:30
|
|
|
form.AllowOnlyExternalRegistration = setting.Service.AllowOnlyExternalRegistration
|
2015-09-13 21:44:32 +05:30
|
|
|
form.EnableCaptcha = setting.Service.EnableCaptcha
|
2015-07-09 10:47:48 +05:30
|
|
|
form.RequireSignInView = setting.Service.RequireSignInView
|
2017-01-08 08:42:03 +05:30
|
|
|
form.DefaultKeepEmailPrivate = setting.Service.DefaultKeepEmailPrivate
|
2017-05-09 01:21:53 +05:30
|
|
|
form.DefaultAllowCreateOrganization = setting.Service.DefaultAllowCreateOrganization
|
2017-09-12 12:18:13 +05:30
|
|
|
form.DefaultEnableTimetracking = setting.Service.DefaultEnableTimetracking
|
2017-01-08 08:42:03 +05:30
|
|
|
form.NoReplyAddress = setting.Service.NoReplyAddress
|
2021-02-17 04:07:20 +05:30
|
|
|
form.PasswordAlgorithm = setting.PasswordHashAlgo
|
2014-04-27 10:04:48 +05:30
|
|
|
|
2021-01-30 14:25:53 +05:30
|
|
|
middleware.AssignForm(form, ctx.Data)
|
2021-04-05 21:00:52 +05:30
|
|
|
ctx.HTML(http.StatusOK, tplInstall)
|
2014-04-11 00:07:43 +05:30
|
|
|
}
|
|
|
|
|
2021-12-01 13:20:01 +05:30
|
|
|
func checkDatabase(ctx *context.Context, form *forms.InstallForm) bool {
|
|
|
|
var err error
|
|
|
|
|
|
|
|
if (setting.Database.Type == "sqlite3") &&
|
|
|
|
len(setting.Database.Path) == 0 {
|
|
|
|
ctx.Data["Err_DbPath"] = true
|
|
|
|
ctx.RenderWithErr(ctx.Tr("install.err_empty_db_path"), tplInstall, form)
|
|
|
|
return false
|
|
|
|
}
|
|
|
|
|
|
|
|
// Check if the user is trying to re-install in an installed database
|
|
|
|
db.UnsetDefaultEngine()
|
|
|
|
defer db.UnsetDefaultEngine()
|
|
|
|
|
|
|
|
if err = db.InitEngine(ctx); err != nil {
|
|
|
|
if strings.Contains(err.Error(), `Unknown database type: sqlite3`) {
|
|
|
|
ctx.Data["Err_DbType"] = true
|
|
|
|
ctx.RenderWithErr(ctx.Tr("install.sqlite3_not_available", "https://docs.gitea.io/en-us/install-from-binary/"), tplInstall, form)
|
|
|
|
} else {
|
|
|
|
ctx.Data["Err_DbSetting"] = true
|
|
|
|
ctx.RenderWithErr(ctx.Tr("install.invalid_db_setting", err), tplInstall, form)
|
|
|
|
}
|
|
|
|
return false
|
|
|
|
}
|
|
|
|
|
|
|
|
err = db_install.CheckDatabaseConnection()
|
|
|
|
if err != nil {
|
|
|
|
ctx.Data["Err_DbSetting"] = true
|
|
|
|
ctx.RenderWithErr(ctx.Tr("install.invalid_db_setting", err), tplInstall, form)
|
|
|
|
return false
|
|
|
|
}
|
|
|
|
|
|
|
|
hasPostInstallationUser, err := db_install.HasPostInstallationUsers()
|
|
|
|
if err != nil {
|
|
|
|
ctx.Data["Err_DbSetting"] = true
|
|
|
|
ctx.RenderWithErr(ctx.Tr("install.invalid_db_table", "user", err), tplInstall, form)
|
|
|
|
return false
|
|
|
|
}
|
|
|
|
dbMigrationVersion, err := db_install.GetMigrationVersion()
|
|
|
|
if err != nil {
|
|
|
|
ctx.Data["Err_DbSetting"] = true
|
|
|
|
ctx.RenderWithErr(ctx.Tr("install.invalid_db_table", "version", err), tplInstall, form)
|
|
|
|
return false
|
|
|
|
}
|
|
|
|
|
|
|
|
if hasPostInstallationUser && dbMigrationVersion > 0 {
|
|
|
|
log.Error("The database is likely to have been used by Gitea before, database migration version=%d", dbMigrationVersion)
|
|
|
|
confirmed := form.ReinstallConfirmFirst && form.ReinstallConfirmSecond && form.ReinstallConfirmThird
|
|
|
|
if !confirmed {
|
|
|
|
ctx.Data["Err_DbInstalledBefore"] = true
|
|
|
|
ctx.RenderWithErr(ctx.Tr("install.reinstall_error"), tplInstall, form)
|
|
|
|
return false
|
|
|
|
}
|
|
|
|
|
|
|
|
log.Info("User confirmed reinstallation of Gitea into a pre-existing database")
|
|
|
|
}
|
|
|
|
|
|
|
|
if hasPostInstallationUser || dbMigrationVersion > 0 {
|
|
|
|
log.Info("Gitea will be installed in a database with: hasPostInstallationUser=%v, dbMigrationVersion=%v", hasPostInstallationUser, dbMigrationVersion)
|
|
|
|
}
|
|
|
|
|
|
|
|
return true
|
|
|
|
}
|
|
|
|
|
2021-06-09 05:03:54 +05:30
|
|
|
// SubmitInstall response for submit install items
|
|
|
|
func SubmitInstall(ctx *context.Context) {
|
2016-12-20 18:02:02 +05:30
|
|
|
var err error
|
2021-12-01 13:20:01 +05:30
|
|
|
|
|
|
|
form := *web.GetForm(ctx).(*forms.InstallForm)
|
|
|
|
|
|
|
|
// fix form values
|
|
|
|
if form.AppURL != "" && form.AppURL[len(form.AppURL)-1] != '/' {
|
|
|
|
form.AppURL += "/"
|
|
|
|
}
|
|
|
|
|
2021-12-07 11:14:08 +05:30
|
|
|
ctx.Data["CurDbType"] = form.DbType
|
2014-04-27 10:04:48 +05:30
|
|
|
|
2014-03-30 03:20:51 +05:30
|
|
|
if ctx.HasError() {
|
2017-02-24 07:07:13 +05:30
|
|
|
if ctx.HasValue("Err_SMTPUser") {
|
2015-07-08 17:17:56 +05:30
|
|
|
ctx.Data["Err_SMTP"] = true
|
|
|
|
}
|
|
|
|
if ctx.HasValue("Err_AdminName") ||
|
|
|
|
ctx.HasValue("Err_AdminPasswd") ||
|
|
|
|
ctx.HasValue("Err_AdminEmail") {
|
|
|
|
ctx.Data["Err_Admin"] = true
|
|
|
|
}
|
|
|
|
|
2021-04-05 21:00:52 +05:30
|
|
|
ctx.HTML(http.StatusOK, tplInstall)
|
2014-03-30 03:20:51 +05:30
|
|
|
return
|
|
|
|
}
|
|
|
|
|
2016-12-20 18:02:02 +05:30
|
|
|
if _, err = exec.LookPath("git"); err != nil {
|
2016-11-18 08:33:03 +05:30
|
|
|
ctx.RenderWithErr(ctx.Tr("install.test_git_failed", err), tplInstall, &form)
|
2014-04-09 00:57:35 +05:30
|
|
|
return
|
|
|
|
}
|
|
|
|
|
2021-12-01 13:20:01 +05:30
|
|
|
// ---- Basic checks are passed, now test configuration.
|
2019-08-24 14:54:45 +05:30
|
|
|
|
2021-12-01 13:20:01 +05:30
|
|
|
// Test database setting.
|
2021-12-07 11:14:08 +05:30
|
|
|
setting.Database.Type = form.DbType
|
2019-08-24 14:54:45 +05:30
|
|
|
setting.Database.Host = form.DbHost
|
|
|
|
setting.Database.User = form.DbUser
|
|
|
|
setting.Database.Passwd = form.DbPasswd
|
|
|
|
setting.Database.Name = form.DbName
|
2020-01-20 21:15:14 +05:30
|
|
|
setting.Database.Schema = form.DbSchema
|
2019-08-24 14:54:45 +05:30
|
|
|
setting.Database.SSLMode = form.SSLMode
|
|
|
|
setting.Database.Charset = form.Charset
|
|
|
|
setting.Database.Path = form.DbPath
|
2021-11-07 08:41:27 +05:30
|
|
|
setting.Database.LogSQL = !setting.IsProd
|
2021-02-17 04:07:20 +05:30
|
|
|
setting.PasswordHashAlgo = form.PasswordAlgorithm
|
|
|
|
|
2021-12-01 13:20:01 +05:30
|
|
|
if !checkDatabase(ctx, &form) {
|
2015-09-13 01:01:36 +05:30
|
|
|
return
|
2015-07-08 17:17:56 +05:30
|
|
|
}
|
|
|
|
|
2021-12-01 13:20:01 +05:30
|
|
|
// Prepare AppDataPath, it is very important for Gitea
|
|
|
|
if err = setting.PrepareAppDataPath(); err != nil {
|
|
|
|
ctx.RenderWithErr(ctx.Tr("install.invalid_app_data_path", err), tplInstall, &form)
|
2014-03-30 03:20:51 +05:30
|
|
|
return
|
|
|
|
}
|
|
|
|
|
|
|
|
// Test repository root path.
|
2020-10-12 01:57:20 +05:30
|
|
|
form.RepoRootPath = strings.ReplaceAll(form.RepoRootPath, "\\", "/")
|
2016-12-20 18:02:02 +05:30
|
|
|
if err = os.MkdirAll(form.RepoRootPath, os.ModePerm); err != nil {
|
2014-09-15 04:52:52 +05:30
|
|
|
ctx.Data["Err_RepoRootPath"] = true
|
2016-11-18 08:33:03 +05:30
|
|
|
ctx.RenderWithErr(ctx.Tr("install.invalid_repo_path", err), tplInstall, &form)
|
2014-03-30 03:20:51 +05:30
|
|
|
return
|
|
|
|
}
|
|
|
|
|
2016-12-26 06:46:37 +05:30
|
|
|
// Test LFS root path if not empty, empty meaning disable LFS
|
|
|
|
if form.LFSRootPath != "" {
|
2020-10-12 01:57:20 +05:30
|
|
|
form.LFSRootPath = strings.ReplaceAll(form.LFSRootPath, "\\", "/")
|
2016-12-26 06:46:37 +05:30
|
|
|
if err := os.MkdirAll(form.LFSRootPath, os.ModePerm); err != nil {
|
|
|
|
ctx.Data["Err_LFSRootPath"] = true
|
|
|
|
ctx.RenderWithErr(ctx.Tr("install.invalid_lfs_path", err), tplInstall, &form)
|
|
|
|
return
|
|
|
|
}
|
|
|
|
}
|
|
|
|
|
2016-02-12 19:49:45 +05:30
|
|
|
// Test log root path.
|
2020-10-12 01:57:20 +05:30
|
|
|
form.LogRootPath = strings.ReplaceAll(form.LogRootPath, "\\", "/")
|
2016-12-20 18:02:02 +05:30
|
|
|
if err = os.MkdirAll(form.LogRootPath, os.ModePerm); err != nil {
|
2016-02-12 19:49:45 +05:30
|
|
|
ctx.Data["Err_LogRootPath"] = true
|
2016-11-18 08:33:03 +05:30
|
|
|
ctx.RenderWithErr(ctx.Tr("install.invalid_log_root_path", err), tplInstall, &form)
|
2016-02-12 19:49:45 +05:30
|
|
|
return
|
|
|
|
}
|
|
|
|
|
2016-08-10 06:11:18 +05:30
|
|
|
currentUser, match := setting.IsRunUserMatchCurrentUser(form.RunUser)
|
|
|
|
if !match {
|
2014-09-15 04:52:52 +05:30
|
|
|
ctx.Data["Err_RunUser"] = true
|
2016-11-18 08:33:03 +05:30
|
|
|
ctx.RenderWithErr(ctx.Tr("install.run_user_not_match", form.RunUser, currentUser), tplInstall, &form)
|
2014-09-08 04:32:58 +05:30
|
|
|
return
|
|
|
|
}
|
|
|
|
|
2015-09-13 01:01:36 +05:30
|
|
|
// Check logic loophole between disable self-registration and no admin account.
|
|
|
|
if form.DisableRegistration && len(form.AdminName) == 0 {
|
|
|
|
ctx.Data["Err_Services"] = true
|
|
|
|
ctx.Data["Err_Admin"] = true
|
2016-11-18 08:33:03 +05:30
|
|
|
ctx.RenderWithErr(ctx.Tr("install.no_admin_and_disable_registration"), tplInstall, form)
|
2015-09-13 01:01:36 +05:30
|
|
|
return
|
|
|
|
}
|
|
|
|
|
2019-05-28 11:48:40 +05:30
|
|
|
// Check admin user creation
|
|
|
|
if len(form.AdminName) > 0 {
|
|
|
|
// Ensure AdminName is valid
|
2021-11-24 15:19:20 +05:30
|
|
|
if err := user_model.IsUsableUsername(form.AdminName); err != nil {
|
2019-05-28 11:48:40 +05:30
|
|
|
ctx.Data["Err_Admin"] = true
|
|
|
|
ctx.Data["Err_AdminName"] = true
|
2021-11-24 15:19:20 +05:30
|
|
|
if db.IsErrNameReserved(err) {
|
2019-05-28 11:48:40 +05:30
|
|
|
ctx.RenderWithErr(ctx.Tr("install.err_admin_name_is_reserved"), tplInstall, form)
|
|
|
|
return
|
2021-11-24 15:19:20 +05:30
|
|
|
} else if db.IsErrNamePatternNotAllowed(err) {
|
2019-05-28 11:48:40 +05:30
|
|
|
ctx.RenderWithErr(ctx.Tr("install.err_admin_name_pattern_not_allowed"), tplInstall, form)
|
|
|
|
return
|
|
|
|
}
|
|
|
|
ctx.RenderWithErr(ctx.Tr("install.err_admin_name_is_invalid"), tplInstall, form)
|
|
|
|
return
|
|
|
|
}
|
|
|
|
// Check Admin email
|
|
|
|
if len(form.AdminEmail) == 0 {
|
|
|
|
ctx.Data["Err_Admin"] = true
|
|
|
|
ctx.Data["Err_AdminEmail"] = true
|
|
|
|
ctx.RenderWithErr(ctx.Tr("install.err_empty_admin_email"), tplInstall, form)
|
|
|
|
return
|
|
|
|
}
|
|
|
|
// Check admin password.
|
|
|
|
if len(form.AdminPasswd) == 0 {
|
|
|
|
ctx.Data["Err_Admin"] = true
|
|
|
|
ctx.Data["Err_AdminPasswd"] = true
|
|
|
|
ctx.RenderWithErr(ctx.Tr("install.err_empty_admin_password"), tplInstall, form)
|
|
|
|
return
|
|
|
|
}
|
|
|
|
if form.AdminPasswd != form.AdminConfirmPasswd {
|
|
|
|
ctx.Data["Err_Admin"] = true
|
|
|
|
ctx.Data["Err_AdminPasswd"] = true
|
|
|
|
ctx.RenderWithErr(ctx.Tr("form.password_not_match"), tplInstall, form)
|
|
|
|
return
|
|
|
|
}
|
2014-03-30 21:28:21 +05:30
|
|
|
}
|
|
|
|
|
2021-12-01 13:20:01 +05:30
|
|
|
// Init the engine with migration
|
|
|
|
if err = db.InitEngineWithMigration(ctx, migrations.Migrate); err != nil {
|
|
|
|
db.UnsetDefaultEngine()
|
|
|
|
ctx.Data["Err_DbSetting"] = true
|
|
|
|
ctx.RenderWithErr(ctx.Tr("install.invalid_db_setting", err), tplInstall, &form)
|
|
|
|
return
|
2015-02-01 23:11:03 +05:30
|
|
|
}
|
|
|
|
|
2014-03-30 03:20:51 +05:30
|
|
|
// Save settings.
|
2015-02-02 01:09:58 +05:30
|
|
|
cfg := ini.Empty()
|
2020-11-28 08:12:08 +05:30
|
|
|
isFile, err := util.IsFile(setting.CustomConf)
|
|
|
|
if err != nil {
|
|
|
|
log.Error("Unable to check if %s is a file. Error: %v", setting.CustomConf, err)
|
|
|
|
}
|
|
|
|
if isFile {
|
2015-02-14 03:18:23 +05:30
|
|
|
// Keeps custom settings if there is already something.
|
2016-12-20 18:02:02 +05:30
|
|
|
if err = cfg.Append(setting.CustomConf); err != nil {
|
2019-04-02 13:18:31 +05:30
|
|
|
log.Error("Failed to load custom conf '%s': %v", setting.CustomConf, err)
|
2015-02-14 03:18:23 +05:30
|
|
|
}
|
|
|
|
}
|
2019-08-24 14:54:45 +05:30
|
|
|
cfg.Section("database").Key("DB_TYPE").SetValue(setting.Database.Type)
|
|
|
|
cfg.Section("database").Key("HOST").SetValue(setting.Database.Host)
|
|
|
|
cfg.Section("database").Key("NAME").SetValue(setting.Database.Name)
|
|
|
|
cfg.Section("database").Key("USER").SetValue(setting.Database.User)
|
|
|
|
cfg.Section("database").Key("PASSWD").SetValue(setting.Database.Passwd)
|
2020-01-20 21:15:14 +05:30
|
|
|
cfg.Section("database").Key("SCHEMA").SetValue(setting.Database.Schema)
|
2019-08-24 14:54:45 +05:30
|
|
|
cfg.Section("database").Key("SSL_MODE").SetValue(setting.Database.SSLMode)
|
|
|
|
cfg.Section("database").Key("CHARSET").SetValue(setting.Database.Charset)
|
|
|
|
cfg.Section("database").Key("PATH").SetValue(setting.Database.Path)
|
2020-10-10 20:49:50 +05:30
|
|
|
cfg.Section("database").Key("LOG_SQL").SetValue("false") // LOG_SQL is rarely helpful
|
2015-02-02 01:09:58 +05:30
|
|
|
|
2015-07-09 10:47:48 +05:30
|
|
|
cfg.Section("").Key("APP_NAME").SetValue(form.AppName)
|
2015-02-02 01:09:58 +05:30
|
|
|
cfg.Section("repository").Key("ROOT").SetValue(form.RepoRootPath)
|
|
|
|
cfg.Section("").Key("RUN_USER").SetValue(form.RunUser)
|
2016-12-27 13:04:34 +05:30
|
|
|
cfg.Section("server").Key("SSH_DOMAIN").SetValue(form.Domain)
|
2017-04-21 08:13:29 +05:30
|
|
|
cfg.Section("server").Key("DOMAIN").SetValue(form.Domain)
|
2015-02-02 01:09:58 +05:30
|
|
|
cfg.Section("server").Key("HTTP_PORT").SetValue(form.HTTPPort)
|
2016-11-27 11:33:59 +05:30
|
|
|
cfg.Section("server").Key("ROOT_URL").SetValue(form.AppURL)
|
2014-03-30 03:20:51 +05:30
|
|
|
|
2015-08-19 18:06:19 +05:30
|
|
|
if form.SSHPort == 0 {
|
|
|
|
cfg.Section("server").Key("DISABLE_SSH").SetValue("true")
|
|
|
|
} else {
|
|
|
|
cfg.Section("server").Key("DISABLE_SSH").SetValue("false")
|
2020-12-25 15:29:32 +05:30
|
|
|
cfg.Section("server").Key("SSH_PORT").SetValue(fmt.Sprint(form.SSHPort))
|
2015-08-19 18:06:19 +05:30
|
|
|
}
|
|
|
|
|
2016-12-26 06:46:37 +05:30
|
|
|
if form.LFSRootPath != "" {
|
|
|
|
cfg.Section("server").Key("LFS_START_SERVER").SetValue("true")
|
2022-01-24 00:32:29 +05:30
|
|
|
cfg.Section("lfs").Key("PATH").SetValue(form.LFSRootPath)
|
2021-12-01 13:20:01 +05:30
|
|
|
var lfsJwtSecret string
|
|
|
|
if lfsJwtSecret, err = generate.NewJwtSecretBase64(); err != nil {
|
2018-02-18 23:44:37 +05:30
|
|
|
ctx.RenderWithErr(ctx.Tr("install.lfs_jwt_secret_failed", err), tplInstall, &form)
|
|
|
|
return
|
|
|
|
}
|
2021-12-01 13:20:01 +05:30
|
|
|
cfg.Section("server").Key("LFS_JWT_SECRET").SetValue(lfsJwtSecret)
|
2016-12-26 06:46:37 +05:30
|
|
|
} else {
|
|
|
|
cfg.Section("server").Key("LFS_START_SERVER").SetValue("false")
|
|
|
|
}
|
|
|
|
|
Rework mailer settings (#18982)
* `PROTOCOL`: can be smtp, smtps, smtp+startls, smtp+unix, sendmail, dummy
* `SMTP_ADDR`: domain for SMTP, or path to unix socket
* `SMTP_PORT`: port for SMTP; defaults to 25 for `smtp`, 465 for `smtps`, and 587 for `smtp+startls`
* `ENABLE_HELO`, `HELO_HOSTNAME`: reverse `DISABLE_HELO` to `ENABLE_HELO`; default to false + system hostname
* `FORCE_TRUST_SERVER_CERT`: replace the unclear `SKIP_VERIFY`
* `CLIENT_CERT_FILE`, `CLIENT_KEY_FILE`, `USE_CLIENT_CERT`: clarify client certificates here
Co-authored-by: wxiaoguang <wxiaoguang@gmail.com>
Co-authored-by: Lunny Xiao <xiaolunwen@gmail.com>
2022-08-02 10:54:18 +05:30
|
|
|
if len(strings.TrimSpace(form.SMTPAddr)) > 0 {
|
2015-02-02 01:09:58 +05:30
|
|
|
cfg.Section("mailer").Key("ENABLED").SetValue("true")
|
Rework mailer settings (#18982)
* `PROTOCOL`: can be smtp, smtps, smtp+startls, smtp+unix, sendmail, dummy
* `SMTP_ADDR`: domain for SMTP, or path to unix socket
* `SMTP_PORT`: port for SMTP; defaults to 25 for `smtp`, 465 for `smtps`, and 587 for `smtp+startls`
* `ENABLE_HELO`, `HELO_HOSTNAME`: reverse `DISABLE_HELO` to `ENABLE_HELO`; default to false + system hostname
* `FORCE_TRUST_SERVER_CERT`: replace the unclear `SKIP_VERIFY`
* `CLIENT_CERT_FILE`, `CLIENT_KEY_FILE`, `USE_CLIENT_CERT`: clarify client certificates here
Co-authored-by: wxiaoguang <wxiaoguang@gmail.com>
Co-authored-by: Lunny Xiao <xiaolunwen@gmail.com>
2022-08-02 10:54:18 +05:30
|
|
|
cfg.Section("mailer").Key("SMTP_ADDR").SetValue(form.SMTPAddr)
|
|
|
|
cfg.Section("mailer").Key("SMTP_PORT").SetValue(form.SMTPPort)
|
2015-07-09 13:40:31 +05:30
|
|
|
cfg.Section("mailer").Key("FROM").SetValue(form.SMTPFrom)
|
2017-02-24 07:07:13 +05:30
|
|
|
cfg.Section("mailer").Key("USER").SetValue(form.SMTPUser)
|
2015-02-02 01:09:58 +05:30
|
|
|
cfg.Section("mailer").Key("PASSWD").SetValue(form.SMTPPasswd)
|
2015-07-09 10:47:48 +05:30
|
|
|
} else {
|
|
|
|
cfg.Section("mailer").Key("ENABLED").SetValue("false")
|
2014-03-30 03:20:51 +05:30
|
|
|
}
|
2020-12-25 15:29:32 +05:30
|
|
|
cfg.Section("service").Key("REGISTER_EMAIL_CONFIRM").SetValue(fmt.Sprint(form.RegisterConfirm))
|
|
|
|
cfg.Section("service").Key("ENABLE_NOTIFY_MAIL").SetValue(fmt.Sprint(form.MailNotify))
|
|
|
|
|
|
|
|
cfg.Section("server").Key("OFFLINE_MODE").SetValue(fmt.Sprint(form.OfflineMode))
|
2022-10-17 04:59:26 +05:30
|
|
|
// if you are reinstalling, this maybe not right because of missing version
|
|
|
|
if err := system_model.SetSettingNoVersion(system_model.KeyPictureDisableGravatar, strconv.FormatBool(form.DisableGravatar)); err != nil {
|
|
|
|
ctx.RenderWithErr(ctx.Tr("install.secret_key_failed", err), tplInstall, &form)
|
|
|
|
return
|
|
|
|
}
|
2020-12-25 15:29:32 +05:30
|
|
|
cfg.Section("picture").Key("ENABLE_FEDERATED_AVATAR").SetValue(fmt.Sprint(form.EnableFederatedAvatar))
|
|
|
|
cfg.Section("openid").Key("ENABLE_OPENID_SIGNIN").SetValue(fmt.Sprint(form.EnableOpenIDSignIn))
|
|
|
|
cfg.Section("openid").Key("ENABLE_OPENID_SIGNUP").SetValue(fmt.Sprint(form.EnableOpenIDSignUp))
|
|
|
|
cfg.Section("service").Key("DISABLE_REGISTRATION").SetValue(fmt.Sprint(form.DisableRegistration))
|
|
|
|
cfg.Section("service").Key("ALLOW_ONLY_EXTERNAL_REGISTRATION").SetValue(fmt.Sprint(form.AllowOnlyExternalRegistration))
|
|
|
|
cfg.Section("service").Key("ENABLE_CAPTCHA").SetValue(fmt.Sprint(form.EnableCaptcha))
|
|
|
|
cfg.Section("service").Key("REQUIRE_SIGNIN_VIEW").SetValue(fmt.Sprint(form.RequireSignInView))
|
|
|
|
cfg.Section("service").Key("DEFAULT_KEEP_EMAIL_PRIVATE").SetValue(fmt.Sprint(form.DefaultKeepEmailPrivate))
|
|
|
|
cfg.Section("service").Key("DEFAULT_ALLOW_CREATE_ORGANIZATION").SetValue(fmt.Sprint(form.DefaultAllowCreateOrganization))
|
|
|
|
cfg.Section("service").Key("DEFAULT_ENABLE_TIMETRACKING").SetValue(fmt.Sprint(form.DefaultEnableTimetracking))
|
|
|
|
cfg.Section("service").Key("NO_REPLY_ADDRESS").SetValue(fmt.Sprint(form.NoReplyAddress))
|
2022-11-02 00:53:56 +05:30
|
|
|
cfg.Section("cron.update_checker").Key("ENABLED").SetValue(fmt.Sprint(form.EnableUpdateChecker))
|
2014-03-30 03:20:51 +05:30
|
|
|
|
2015-02-02 01:09:58 +05:30
|
|
|
cfg.Section("").Key("RUN_MODE").SetValue("prod")
|
2014-03-30 21:28:21 +05:30
|
|
|
|
2015-02-02 01:09:58 +05:30
|
|
|
cfg.Section("session").Key("PROVIDER").SetValue("file")
|
2014-12-21 09:21:16 +05:30
|
|
|
|
2020-10-10 20:49:50 +05:30
|
|
|
cfg.Section("log").Key("MODE").SetValue("console")
|
2021-03-29 00:38:19 +05:30
|
|
|
cfg.Section("log").Key("LEVEL").SetValue(setting.LogLevel.String())
|
2016-02-12 19:49:45 +05:30
|
|
|
cfg.Section("log").Key("ROOT_PATH").SetValue(form.LogRootPath)
|
2020-10-10 20:49:50 +05:30
|
|
|
cfg.Section("log").Key("ROUTER").SetValue("console")
|
2014-08-27 14:09:36 +05:30
|
|
|
|
2022-06-03 09:15:54 +05:30
|
|
|
cfg.Section("repository.pull-request").Key("DEFAULT_MERGE_STYLE").SetValue("merge")
|
|
|
|
|
2022-01-20 08:11:59 +05:30
|
|
|
cfg.Section("repository.signing").Key("DEFAULT_TRUST_MODEL").SetValue("committer")
|
|
|
|
|
2015-02-02 01:09:58 +05:30
|
|
|
cfg.Section("security").Key("INSTALL_LOCK").SetValue("true")
|
2021-12-01 13:20:01 +05:30
|
|
|
|
2022-11-04 02:25:09 +05:30
|
|
|
// the internal token could be read from INTERNAL_TOKEN or INTERNAL_TOKEN_URI (the file is guaranteed to be non-empty)
|
|
|
|
// if there is no InternalToken, generate one and save to security.INTERNAL_TOKEN
|
|
|
|
if setting.InternalToken == "" {
|
|
|
|
var internalToken string
|
|
|
|
if internalToken, err = generate.NewInternalToken(); err != nil {
|
|
|
|
ctx.RenderWithErr(ctx.Tr("install.internal_token_failed", err), tplInstall, &form)
|
|
|
|
return
|
|
|
|
}
|
|
|
|
cfg.Section("security").Key("INTERNAL_TOKEN").SetValue(internalToken)
|
2016-12-20 18:02:02 +05:30
|
|
|
}
|
2021-12-01 13:20:01 +05:30
|
|
|
|
|
|
|
// if there is already a SECRET_KEY, we should not overwrite it, otherwise the encrypted data will not be able to be decrypted
|
|
|
|
if setting.SecretKey == "" {
|
|
|
|
var secretKey string
|
|
|
|
if secretKey, err = generate.NewSecretKey(); err != nil {
|
|
|
|
ctx.RenderWithErr(ctx.Tr("install.secret_key_failed", err), tplInstall, &form)
|
|
|
|
return
|
|
|
|
}
|
|
|
|
cfg.Section("security").Key("SECRET_KEY").SetValue(secretKey)
|
|
|
|
}
|
|
|
|
|
2021-02-17 04:07:20 +05:30
|
|
|
if len(form.PasswordAlgorithm) > 0 {
|
|
|
|
cfg.Section("security").Key("PASSWORD_HASH_ALGO").SetValue(form.PasswordAlgorithm)
|
|
|
|
}
|
2014-03-30 03:20:51 +05:30
|
|
|
|
2021-12-01 13:20:01 +05:30
|
|
|
log.Info("Save settings to custom config file %s", setting.CustomConf)
|
|
|
|
|
2016-12-20 18:02:02 +05:30
|
|
|
err = os.MkdirAll(filepath.Dir(setting.CustomConf), os.ModePerm)
|
2016-11-10 15:32:01 +05:30
|
|
|
if err != nil {
|
2016-11-18 08:33:03 +05:30
|
|
|
ctx.RenderWithErr(ctx.Tr("install.save_config_failed", err), tplInstall, &form)
|
2016-11-10 15:32:01 +05:30
|
|
|
return
|
|
|
|
}
|
|
|
|
|
2016-12-20 18:02:02 +05:30
|
|
|
if err = cfg.SaveTo(setting.CustomConf); err != nil {
|
2016-11-18 08:33:03 +05:30
|
|
|
ctx.RenderWithErr(ctx.Tr("install.save_config_failed", err), tplInstall, &form)
|
2014-03-30 03:20:51 +05:30
|
|
|
return
|
|
|
|
}
|
|
|
|
|
2022-10-18 20:46:58 +05:30
|
|
|
// unset default engine before reload database setting
|
|
|
|
db.UnsetDefaultEngine()
|
|
|
|
|
2021-12-01 13:20:01 +05:30
|
|
|
// ---- All checks are passed
|
|
|
|
|
|
|
|
// Reload settings (and re-initialize database connection)
|
|
|
|
reloadSettings(ctx)
|
2014-03-30 03:20:51 +05:30
|
|
|
|
2015-12-08 11:29:14 +05:30
|
|
|
// Create admin account
|
2015-07-08 17:17:56 +05:30
|
|
|
if len(form.AdminName) > 0 {
|
2021-11-24 15:19:20 +05:30
|
|
|
u := &user_model.User{
|
2022-04-30 01:08:11 +05:30
|
|
|
Name: form.AdminName,
|
|
|
|
Email: form.AdminEmail,
|
|
|
|
Passwd: form.AdminPasswd,
|
|
|
|
IsAdmin: true,
|
2015-12-08 11:29:14 +05:30
|
|
|
}
|
2022-04-30 01:08:11 +05:30
|
|
|
overwriteDefault := &user_model.CreateUserOverwriteOptions{
|
|
|
|
IsRestricted: util.OptionalBoolFalse,
|
|
|
|
IsActive: util.OptionalBoolTrue,
|
|
|
|
}
|
|
|
|
|
|
|
|
if err = user_model.CreateUser(u, overwriteDefault); err != nil {
|
2021-11-24 15:19:20 +05:30
|
|
|
if !user_model.IsErrUserAlreadyExist(err) {
|
2015-07-08 17:17:56 +05:30
|
|
|
setting.InstallLock = false
|
|
|
|
ctx.Data["Err_AdminName"] = true
|
|
|
|
ctx.Data["Err_AdminEmail"] = true
|
2016-11-18 08:33:03 +05:30
|
|
|
ctx.RenderWithErr(ctx.Tr("install.invalid_admin_setting", err), tplInstall, &form)
|
2015-07-08 17:17:56 +05:30
|
|
|
return
|
|
|
|
}
|
|
|
|
log.Info("Admin account already exist")
|
2022-05-20 19:38:52 +05:30
|
|
|
u, _ = user_model.GetUserByName(ctx, u.Name)
|
2014-03-30 20:39:59 +05:30
|
|
|
}
|
2015-12-08 11:29:14 +05:30
|
|
|
|
2020-10-20 02:33:08 +05:30
|
|
|
days := 86400 * setting.LogInRememberDays
|
2021-03-07 13:42:43 +05:30
|
|
|
ctx.SetCookie(setting.CookieUserName, u.Name, days)
|
|
|
|
|
2020-10-20 02:33:08 +05:30
|
|
|
ctx.SetSuperSecureCookie(base.EncodeMD5(u.Rands+u.Passwd),
|
2021-03-07 13:42:43 +05:30
|
|
|
setting.CookieRememberName, u.Name, days)
|
2020-10-20 02:33:08 +05:30
|
|
|
|
2015-12-08 11:29:14 +05:30
|
|
|
// Auto-login for admin
|
2016-12-20 18:02:02 +05:30
|
|
|
if err = ctx.Session.Set("uid", u.ID); err != nil {
|
2016-11-18 08:33:03 +05:30
|
|
|
ctx.RenderWithErr(ctx.Tr("install.save_config_failed", err), tplInstall, &form)
|
2016-11-10 15:32:01 +05:30
|
|
|
return
|
|
|
|
}
|
2016-12-20 18:02:02 +05:30
|
|
|
if err = ctx.Session.Set("uname", u.Name); err != nil {
|
2016-11-18 08:33:03 +05:30
|
|
|
ctx.RenderWithErr(ctx.Tr("install.save_config_failed", err), tplInstall, &form)
|
2016-11-10 15:32:01 +05:30
|
|
|
return
|
|
|
|
}
|
2020-05-17 18:13:29 +05:30
|
|
|
|
|
|
|
if err = ctx.Session.Release(); err != nil {
|
|
|
|
ctx.RenderWithErr(ctx.Tr("install.save_config_failed", err), tplInstall, &form)
|
|
|
|
return
|
|
|
|
}
|
2014-03-30 20:39:59 +05:30
|
|
|
}
|
|
|
|
|
2014-03-30 03:20:51 +05:30
|
|
|
log.Info("First-time run install finished!")
|
2020-10-20 02:33:08 +05:30
|
|
|
|
2014-09-08 04:32:58 +05:30
|
|
|
ctx.Flash.Success(ctx.Tr("install.install_success"))
|
2020-10-20 02:33:08 +05:30
|
|
|
|
2021-12-15 12:29:57 +05:30
|
|
|
ctx.RespHeader().Add("Refresh", "1; url="+setting.AppURL+"user/login")
|
2021-04-05 21:00:52 +05:30
|
|
|
ctx.HTML(http.StatusOK, tplPostInstall)
|
2020-10-20 02:33:08 +05:30
|
|
|
|
|
|
|
// Now get the http.Server from this request and shut it down
|
|
|
|
// NB: This is not our hammerable graceful shutdown this is http.Server.Shutdown
|
2021-05-31 11:48:11 +05:30
|
|
|
srv := ctx.Value(http.ServerContextKey).(*http.Server)
|
2020-10-20 02:33:08 +05:30
|
|
|
go func() {
|
|
|
|
if err := srv.Shutdown(graceful.GetManager().HammerContext()); err != nil {
|
|
|
|
log.Error("Unable to shutdown the install server! Error: %v", err)
|
|
|
|
}
|
|
|
|
}()
|
2014-03-25 14:21:42 +05:30
|
|
|
}
|