2014-02-19 15:20:53 +05:30
// Copyright 2014 The Gogs Authors. All rights reserved.
// Use of this source code is governed by a MIT-style
// license that can be found in the LICENSE file.
2014-05-02 06:51:46 +05:30
package cmd
2014-02-19 15:20:53 +05:30
import (
2018-08-21 19:26:50 +05:30
"crypto/tls"
2014-02-19 15:20:53 +05:30
"fmt"
2016-08-12 03:16:33 +05:30
"net"
2014-02-19 15:20:53 +05:30
"net/http"
2014-11-04 07:16:53 +05:30
"net/http/fcgi"
2017-02-05 18:36:25 +05:30
_ "net/http/pprof" // Used for debugging if enabled and a web server is running
2014-04-16 05:31:20 +05:30
"os"
2014-09-29 15:08:46 +05:30
"strings"
2014-02-19 15:20:53 +05:30
2016-11-10 21:54:48 +05:30
"code.gitea.io/gitea/modules/log"
2017-11-07 12:03:06 +05:30
"code.gitea.io/gitea/modules/markup/external"
2016-11-10 21:54:48 +05:30
"code.gitea.io/gitea/modules/setting"
"code.gitea.io/gitea/routers"
2017-04-25 12:54:51 +05:30
"code.gitea.io/gitea/routers/routes"
2016-12-26 06:46:37 +05:30
2017-12-13 14:27:28 +05:30
"github.com/Unknwon/com"
2017-02-27 07:19:05 +05:30
context2 "github.com/gorilla/context"
2016-11-05 22:26:35 +05:30
"github.com/urfave/cli"
2018-08-21 19:26:50 +05:30
"golang.org/x/crypto/acme/autocert"
2017-12-13 14:27:28 +05:30
ini "gopkg.in/ini.v1"
2014-02-19 15:20:53 +05:30
)
2016-11-04 17:12:18 +05:30
// CmdWeb represents the available web sub-command.
2014-02-19 15:20:53 +05:30
var CmdWeb = cli . Command {
Name : "web" ,
2016-12-21 17:43:17 +05:30
Usage : "Start Gitea web server" ,
Description : ` Gitea web server is the only thing you need to run ,
2014-03-24 17:06:38 +05:30
and it takes care of all the other things for you ` ,
2014-02-19 15:20:53 +05:30
Action : runWeb ,
2015-02-01 23:11:03 +05:30
Flags : [ ] cli . Flag {
2016-11-10 03:48:22 +05:30
cli . StringFlag {
Name : "port, p" ,
Value : "3000" ,
Usage : "Temporary port number to prevent conflict" ,
} ,
2017-01-09 17:24:57 +05:30
cli . StringFlag {
Name : "pid, P" ,
2017-01-14 07:45:43 +05:30
Value : "/var/run/gitea.pid" ,
2017-01-09 17:24:57 +05:30
Usage : "Custom pid file path" ,
} ,
2015-02-01 23:11:03 +05:30
} ,
2014-02-19 15:20:53 +05:30
}
2017-12-26 03:53:43 +05:30
func runHTTPRedirector ( ) {
source := fmt . Sprintf ( "%s:%s" , setting . HTTPAddr , setting . PortToRedirect )
dest := strings . TrimSuffix ( setting . AppURL , "/" )
log . Info ( "Redirecting: %s to %s" , source , dest )
handler := http . HandlerFunc ( func ( w http . ResponseWriter , r * http . Request ) {
target := dest + r . URL . Path
if len ( r . URL . RawQuery ) > 0 {
target += "?" + r . URL . RawQuery
}
http . Redirect ( w , r , target , http . StatusTemporaryRedirect )
} )
var err = runHTTP ( source , context2 . ClearHandler ( handler ) )
if err != nil {
2019-04-02 13:18:31 +05:30
log . Fatal ( "Failed to start port redirection: %v" , err )
2017-12-26 03:53:43 +05:30
}
}
2018-08-21 19:26:50 +05:30
func runLetsEncrypt ( listenAddr , domain , directory , email string , m http . Handler ) error {
certManager := autocert . Manager {
Prompt : autocert . AcceptTOS ,
HostPolicy : autocert . HostWhitelist ( domain ) ,
Cache : autocert . DirCache ( directory ) ,
Email : email ,
}
2018-12-11 21:16:12 +05:30
go func ( ) {
log . Info ( "Running Let's Encrypt handler on %s" , setting . HTTPAddr + ":" + setting . PortToRedirect )
var err = http . ListenAndServe ( setting . HTTPAddr + ":" + setting . PortToRedirect , certManager . HTTPHandler ( http . HandlerFunc ( runLetsEncryptFallbackHandler ) ) ) // all traffic coming into HTTP will be redirect to HTTPS automatically (LE HTTP-01 validation happens here)
if err != nil {
2019-04-02 13:18:31 +05:30
log . Fatal ( "Failed to start the Let's Encrypt handler on port %s: %v" , setting . PortToRedirect , err )
2018-12-11 21:16:12 +05:30
}
} ( )
2018-08-21 19:26:50 +05:30
server := & http . Server {
Addr : listenAddr ,
Handler : m ,
TLSConfig : & tls . Config {
GetCertificate : certManager . GetCertificate ,
} ,
}
return server . ListenAndServeTLS ( "" , "" )
}
func runLetsEncryptFallbackHandler ( w http . ResponseWriter , r * http . Request ) {
if r . Method != "GET" && r . Method != "HEAD" {
http . Error ( w , "Use HTTPS" , http . StatusBadRequest )
return
}
2018-12-13 02:30:24 +05:30
// Remove the trailing slash at the end of setting.AppURL, the request
// URI always contains a leading slash, which would result in a double
// slash
target := strings . TrimRight ( setting . AppURL , "/" ) + r . URL . RequestURI ( )
2018-08-21 19:26:50 +05:30
http . Redirect ( w , r , target , http . StatusFound )
}
2016-05-13 00:02:28 +05:30
func runWeb ( ctx * cli . Context ) error {
2017-01-09 17:24:57 +05:30
if ctx . IsSet ( "pid" ) {
setting . CustomPID = ctx . String ( "pid" )
}
2014-03-30 03:20:51 +05:30
routers . GlobalInit ( )
2014-02-19 15:20:53 +05:30
2017-11-07 12:03:06 +05:30
external . RegisterParsers ( )
2017-04-25 12:54:51 +05:30
m := routes . NewMacaron ( )
routes . RegisterRoutes ( m )
2014-03-23 11:18:01 +05:30
2015-02-01 23:11:03 +05:30
// Flag for port number in case first time run conflict.
if ctx . IsSet ( "port" ) {
2016-11-27 15:44:25 +05:30
setting . AppURL = strings . Replace ( setting . AppURL , setting . HTTPPort , ctx . String ( "port" ) , 1 )
2016-08-12 03:25:10 +05:30
setting . HTTPPort = ctx . String ( "port" )
2017-12-13 14:27:28 +05:30
switch setting . Protocol {
case setting . UnixSocket :
case setting . FCGI :
default :
// Save LOCAL_ROOT_URL if port changed
cfg := ini . Empty ( )
if com . IsFile ( setting . CustomConf ) {
// Keeps custom settings if there is already something.
if err := cfg . Append ( setting . CustomConf ) ; err != nil {
return fmt . Errorf ( "Failed to load custom conf '%s': %v" , setting . CustomConf , err )
}
}
defaultLocalURL := string ( setting . Protocol ) + "://"
if setting . HTTPAddr == "0.0.0.0" {
defaultLocalURL += "localhost"
} else {
defaultLocalURL += setting . HTTPAddr
}
defaultLocalURL += ":" + setting . HTTPPort + "/"
cfg . Section ( "server" ) . Key ( "LOCAL_ROOT_URL" ) . SetValue ( defaultLocalURL )
if err := cfg . SaveTo ( setting . CustomConf ) ; err != nil {
return fmt . Errorf ( "Error saving generated JWT Secret to custom config: %v" , err )
}
}
2015-02-01 23:11:03 +05:30
}
2018-01-13 03:46:49 +05:30
listenAddr := setting . HTTPAddr
if setting . Protocol != setting . UnixSocket {
listenAddr += ":" + setting . HTTPPort
2016-08-12 03:16:33 +05:30
}
2016-11-27 15:44:25 +05:30
log . Info ( "Listen: %v://%s%s" , setting . Protocol , listenAddr , setting . AppSubURL )
2016-08-12 03:25:10 +05:30
2016-12-26 06:46:37 +05:30
if setting . LFS . StartServer {
log . Info ( "LFS server enabled" )
}
2017-02-05 18:36:25 +05:30
if setting . EnablePprof {
go func ( ) {
2018-01-13 03:46:49 +05:30
log . Info ( "Starting pprof server on localhost:6060" )
2017-02-05 18:36:25 +05:30
log . Info ( "%v" , http . ListenAndServe ( "localhost:6060" , nil ) )
} ( )
}
2016-08-12 03:25:10 +05:30
var err error
2014-05-26 05:41:25 +05:30
switch setting . Protocol {
case setting . HTTP :
2017-02-22 12:44:37 +05:30
err = runHTTP ( listenAddr , context2 . ClearHandler ( m ) )
2014-05-26 05:41:25 +05:30
case setting . HTTPS :
2018-08-21 19:26:50 +05:30
if setting . EnableLetsEncrypt {
err = runLetsEncrypt ( listenAddr , setting . Domain , setting . LetsEncryptDirectory , setting . LetsEncryptEmail , context2 . ClearHandler ( m ) )
break
}
2017-12-26 03:53:43 +05:30
if setting . RedirectOtherPort {
go runHTTPRedirector ( )
}
2017-02-22 12:44:37 +05:30
err = runHTTPS ( listenAddr , setting . CertFile , setting . KeyFile , context2 . ClearHandler ( m ) )
2014-11-04 07:16:53 +05:30
case setting . FCGI :
2017-03-23 13:27:43 +05:30
listener , err := net . Listen ( "tcp" , listenAddr )
if err != nil {
2019-04-02 13:18:31 +05:30
log . Fatal ( "Failed to bind %s: %v" , listenAddr , err )
2017-03-23 13:27:43 +05:30
}
defer listener . Close ( )
err = fcgi . Serve ( listener , context2 . ClearHandler ( m ) )
2016-11-27 15:44:25 +05:30
case setting . UnixSocket :
2017-02-05 17:57:37 +05:30
if err := os . Remove ( listenAddr ) ; err != nil && ! os . IsNotExist ( err ) {
2019-04-02 13:18:31 +05:30
log . Fatal ( "Failed to remove unix socket directory %s: %v" , listenAddr , err )
2016-12-01 05:26:15 +05:30
}
2016-08-12 03:25:10 +05:30
var listener * net . UnixListener
2016-11-04 18:45:55 +05:30
listener , err = net . ListenUnix ( "unix" , & net . UnixAddr { Name : listenAddr , Net : "unix" } )
2016-08-12 03:16:33 +05:30
if err != nil {
2016-08-12 03:25:10 +05:30
break // Handle error after switch
2016-08-12 03:16:33 +05:30
}
2016-08-12 03:25:10 +05:30
// FIXME: add proper implementation of signal capture on all protocols
2016-08-12 03:16:33 +05:30
// execute this on SIGTERM or SIGINT: listener.Close()
2016-08-12 03:25:10 +05:30
if err = os . Chmod ( listenAddr , os . FileMode ( setting . UnixSocketPermission ) ) ; err != nil {
2019-04-02 13:18:31 +05:30
log . Fatal ( "Failed to set permission of unix socket: %v" , err )
2016-08-12 03:16:33 +05:30
}
2017-02-22 12:44:37 +05:30
err = http . Serve ( listener , context2 . ClearHandler ( m ) )
2014-05-26 05:41:25 +05:30
default :
2019-04-02 13:18:31 +05:30
log . Fatal ( "Invalid protocol: %s" , setting . Protocol )
2014-05-26 05:41:25 +05:30
}
if err != nil {
2019-04-02 13:18:31 +05:30
log . Fatal ( "Failed to start server: %v" , err )
2014-03-18 19:28:58 +05:30
}
2016-05-13 00:02:28 +05:30
return nil
2014-02-19 15:20:53 +05:30
}