Semaphore/util/config.go

495 lines
12 KiB
Go
Raw Normal View History

2016-01-05 00:32:53 +01:00
package util
import (
2021-12-18 14:16:34 +01:00
"context"
"encoding/base64"
2016-01-05 00:32:53 +01:00
"encoding/json"
2020-11-28 22:49:44 +01:00
"errors"
2016-01-05 00:32:53 +01:00
"fmt"
2021-12-18 14:16:34 +01:00
"github.com/google/go-github/github"
"io"
"net/url"
2016-03-16 22:49:43 +01:00
"os"
2021-12-18 14:16:34 +01:00
"os/exec"
2016-04-24 20:11:43 +02:00
"path"
2021-12-18 14:16:34 +01:00
"path/filepath"
"strings"
"github.com/gorilla/securecookie"
2016-01-05 00:32:53 +01:00
)
// Cookie is a runtime generated secure cookie used for authentication
var Cookie *securecookie.SecureCookie
// WebHostURL is the public route to the semaphore server
2017-05-20 16:14:36 +02:00
var WebHostURL *url.URL
2016-01-05 00:32:53 +01:00
type DbDriver string
2020-11-28 22:49:44 +01:00
const (
2021-09-22 05:43:19 +02:00
DbDriverMySQL DbDriver = "mysql"
DbDriverBolt DbDriver = "bolt"
DbDriverPostgres DbDriver = "postgres"
2020-11-28 22:49:44 +01:00
)
type DbConfig struct {
2021-09-22 05:43:19 +02:00
Dialect DbDriver `json:"-"`
Hostname string `json:"host"`
Username string `json:"user"`
Password string `json:"pass"`
DbName string `json:"name"`
Options map[string]string `json:"options"`
2016-01-05 00:32:53 +01:00
}
type ldapMappings struct {
DN string `json:"dn"`
Mail string `json:"mail"`
UID string `json:"uid"`
CN string `json:"cn"`
}
type oidcEndpoint struct {
IssuerURL string `json:"issuer"`
AuthURL string `json:"auth"`
TokenURL string `json:"token"`
UserInfoURL string `json:"userinfo"`
JWKSURL string `json:"jwks"`
Algorithms []string `json:"algorithms"`
}
2023-04-16 23:57:56 +02:00
type oidcProvider struct {
ClientID string `json:"client_id"`
ClientSecret string `json:"client_secret"`
RedirectURL string `json:"redirect_url"`
Scopes []string `json:"scopes"`
DisplayName string `json:"display_name"`
AutoDiscovery string `json:"provider_url"`
Endpoint oidcEndpoint `json:"endpoint"`
UsernameClaim string `json:"username_claim"`
NameClaim string `json:"name_claim"`
EmailClaim string `json:"email_claim"`
2023-04-16 23:57:56 +02:00
}
2023-07-23 16:18:02 +02:00
type GitClientId string
const (
// GoGitClientId is builtin Git client. It is not require external dependencies and is preferred.
// Use it if you don't need external SSH authorization.
GoGitClientId GitClientId = "go_git"
// CmdGitClientId is external Git client.
// Default Git client. It is use external Git binary to clone repositories.
CmdGitClientId GitClientId = "cmd_git"
)
// ConfigType mapping between Config and the json file that sets it
type ConfigType struct {
2021-09-22 05:43:19 +02:00
MySQL DbConfig `json:"mysql"`
BoltDb DbConfig `json:"bolt"`
Postgres DbConfig `json:"postgres"`
2020-11-28 22:49:44 +01:00
Dialect DbDriver `json:"dialect"`
2016-01-05 00:32:53 +01:00
// Format `:port_num` eg, :3000
2018-05-14 21:37:07 +02:00
// if : is missing it will be corrected
2017-05-20 16:14:36 +02:00
Port string `json:"port"`
2016-01-05 00:32:53 +01:00
2018-05-14 21:37:07 +02:00
// Interface ip, put in front of the port.
// defaults to empty
Interface string `json:"interface"`
// semaphore stores ephemeral projects here
2016-01-05 00:32:53 +01:00
TmpPath string `json:"tmp_path"`
2023-07-23 16:18:02 +02:00
// SshConfigPath is a path to the custom SSH config file.
// Default path is ~/.ssh/config.
SshConfigPath string `json:"ssh_config_path"`
2023-07-24 16:04:03 +02:00
GitClientId GitClientId `json:"git_client"`
// web host
WebHost string `json:"web_host"`
// cookie hashing & encryption
2022-01-26 08:14:56 +01:00
CookieHash string `json:"cookie_hash"`
CookieEncryption string `json:"cookie_encryption"`
// AccessKeyEncryption is BASE64 encoded byte array used
// for encrypting and decrypting access keys stored in database.
// Do not use it! Use method GetAccessKeyEncryption instead of it.
2021-09-22 05:43:19 +02:00
AccessKeyEncryption string `json:"access_key_encryption"`
2017-02-22 09:46:42 +01:00
2017-04-18 16:36:09 +02:00
// email alerting
2023-07-24 16:04:03 +02:00
EmailAlert bool `json:"email_alert"`
2021-09-22 05:43:19 +02:00
EmailSender string `json:"email_sender"`
EmailHost string `json:"email_host"`
EmailPort string `json:"email_port"`
EmailUsername string `json:"email_username"`
EmailPassword string `json:"email_password"`
2023-07-24 16:04:03 +02:00
EmailSecure bool `json:"email_secure"`
2017-04-18 16:36:09 +02:00
// ldap settings
2023-07-24 16:04:03 +02:00
LdapEnable bool `json:"ldap_enable"`
LdapBindDN string `json:"ldap_binddn"`
LdapBindPassword string `json:"ldap_bindpassword"`
LdapServer string `json:"ldap_server"`
LdapSearchDN string `json:"ldap_searchdn"`
LdapSearchFilter string `json:"ldap_searchfilter"`
LdapMappings ldapMappings `json:"ldap_mappings"`
2023-07-24 16:04:03 +02:00
LdapNeedTLS bool `json:"ldap_needtls"`
2017-04-04 13:49:00 +02:00
2023-07-24 16:04:03 +02:00
// telegram and slack alerting
TelegramAlert bool `json:"telegram_alert"`
2017-03-22 08:22:09 +01:00
TelegramChat string `json:"telegram_chat"`
TelegramToken string `json:"telegram_token"`
2023-07-24 16:04:03 +02:00
SlackAlert bool `json:"slack_alert"`
2023-07-23 16:18:02 +02:00
SlackUrl string `json:"slack_url"`
2022-04-11 10:29:48 +02:00
2023-07-24 16:04:03 +02:00
// oidc settings
OidcProviders map[string]oidcProvider `json:"oidc_providers"`
// task concurrency
MaxParallelTasks int `json:"max_parallel_tasks"`
RegistrationToken string `json:"registration_token"`
// feature switches
2023-07-24 16:04:03 +02:00
PasswordLoginDisable bool `json:"password_login_disable"`
NonAdminCanCreateProject bool `json:"non_admin_can_create_project"`
2016-01-05 00:32:53 +01:00
}
// Config exposes the application configuration storage for use in the application
var Config *ConfigType
// ToJSON returns a JSON string of the config
2021-08-25 22:12:19 +02:00
func (conf *ConfigType) ToJSON() ([]byte, error) {
return json.MarshalIndent(&conf, " ", "\t")
}
2016-01-05 00:32:53 +01:00
2022-01-26 08:14:56 +01:00
func (conf *ConfigType) GetAccessKeyEncryption() string {
ret := os.Getenv("SEMAPHORE_ACCESS_KEY_ENCRYPTION")
if ret == "" {
ret = conf.AccessKeyEncryption
}
return ret
}
// ConfigInit reads in cli flags, and switches actions appropriately on them
2021-08-25 22:12:19 +02:00
func ConfigInit(configPath string) {
loadConfig(configPath)
validateConfig()
var encryption []byte
hash, _ := base64.StdEncoding.DecodeString(Config.CookieHash)
if len(Config.CookieEncryption) > 0 {
encryption, _ = base64.StdEncoding.DecodeString(Config.CookieEncryption)
}
Cookie = securecookie.New(hash, encryption)
2017-05-20 16:14:36 +02:00
WebHostURL, _ = url.Parse(Config.WebHost)
2017-05-20 16:25:41 +02:00
if len(WebHostURL.String()) == 0 {
WebHostURL = nil
}
2016-01-05 00:32:53 +01:00
}
2021-08-25 22:12:19 +02:00
func loadConfig(configPath string) {
if configPath == "" {
configPath = os.Getenv("SEMAPHORE_CONFIG_PATH")
}
//If the configPath option has been set try to load and decode it
//var usedPath string
if configPath == "" {
cwd, err := os.Getwd()
exitOnConfigError(err)
paths := []string{
path.Join(cwd, "config.json"),
"/usr/local/etc/semaphore/config.json",
}
for _, p := range paths {
_, err = os.Stat(p)
if err != nil {
continue
}
var file *os.File
file, err = os.Open(p)
if err != nil {
continue
}
decodeConfig(file)
break
}
exitOnConfigError(err)
} else {
p := configPath
file, err := os.Open(p)
exitOnConfigError(err)
decodeConfig(file)
}
}
func validateConfig() {
validatePort()
if len(Config.TmpPath) == 0 {
Config.TmpPath = "/tmp/semaphore"
}
if Config.MaxParallelTasks < 1 {
Config.MaxParallelTasks = 10
}
}
func validatePort() {
//TODO - why do we do this only with this variable?
if len(os.Getenv("PORT")) > 0 {
Config.Port = ":" + os.Getenv("PORT")
}
if len(Config.Port) == 0 {
Config.Port = ":3000"
}
if !strings.HasPrefix(Config.Port, ":") {
Config.Port = ":" + Config.Port
}
}
func exitOnConfigError(err error) {
if err != nil {
2021-08-26 11:39:31 +02:00
fmt.Println("Cannot Find configuration! Use --config parameter to point to a JSON file generated by `semaphore setup`.")
os.Exit(1)
}
}
func decodeConfig(file io.Reader) {
if err := json.NewDecoder(file).Decode(&Config); err != nil {
fmt.Println("Could not decode configuration!")
panic(err)
}
}
func mapToQueryString(m map[string]string) (str string) {
for option, value := range m {
if str != "" {
str += "&"
}
str += option + "=" + value
}
if str != "" {
str = "?" + str
}
return
}
2021-12-18 14:16:34 +01:00
// FindSemaphore looks in the PATH for the semaphore variable
// if not found it will attempt to find the absolute path of the first
// os argument, the semaphore command, and return it
func FindSemaphore() string {
cmdPath, _ := exec.LookPath("semaphore") //nolint: gas
if len(cmdPath) == 0 {
cmdPath, _ = filepath.Abs(os.Args[0]) // nolint: gas
}
return cmdPath
}
func AnsibleVersion() string {
bytes, err := exec.Command("ansible", "--version").Output()
if err != nil {
return ""
}
return string(bytes)
}
// CheckUpdate uses the GitHub client to check for new tags in the semaphore repo
func CheckUpdate() (updateAvailable *github.RepositoryRelease, err error) {
// fetch releases
gh := github.NewClient(nil)
releases, _, err := gh.Repositories.ListReleases(context.TODO(), "ansible-semaphore", "semaphore", nil)
if err != nil {
return
}
updateAvailable = nil
if (*releases[0].TagName)[1:] != Version {
updateAvailable = releases[0]
}
return
}
2021-08-24 17:20:34 +02:00
// String returns dialect name for GORP.
2020-11-28 22:49:44 +01:00
func (d DbDriver) String() string {
return string(d)
2020-11-28 22:49:44 +01:00
}
func (d *DbConfig) IsPresent() bool {
return d.GetHostname() != ""
2020-11-28 22:49:44 +01:00
}
func (d *DbConfig) HasSupportMultipleDatabases() bool {
2020-12-04 09:39:56 +01:00
return true
2020-11-28 22:49:44 +01:00
}
func (d *DbConfig) GetDbName() string {
2023-01-27 19:54:46 +01:00
dbName := os.Getenv("SEMAPHORE_DB_NAME")
if dbName != "" {
return dbName
2023-01-27 19:54:46 +01:00
}
return d.DbName
}
2023-01-27 19:54:46 +01:00
func (d *DbConfig) GetUsername() string {
username := os.Getenv("SEMAPHORE_DB_USER")
if username != "" {
return username
2023-01-27 19:54:46 +01:00
}
return d.Username
}
2023-01-27 19:54:46 +01:00
func (d *DbConfig) GetPassword() string {
password := os.Getenv("SEMAPHORE_DB_PASS")
if password != "" {
return password
2023-01-27 19:54:46 +01:00
}
return d.Password
}
2023-01-27 19:54:46 +01:00
func (d *DbConfig) GetHostname() string {
hostname := os.Getenv("SEMAPHORE_DB_HOST")
if hostname != "" {
return hostname
2023-01-27 19:54:46 +01:00
}
return d.Hostname
}
func (d *DbConfig) GetConnectionString(includeDbName bool) (connectionString string, err error) {
dbName := d.GetDbName()
dbUser := d.GetUsername()
dbPass := d.GetPassword()
dbHost := d.GetHostname()
2023-01-27 19:54:46 +01:00
2020-11-28 22:49:44 +01:00
switch d.Dialect {
case DbDriverBolt:
2023-01-27 19:54:46 +01:00
connectionString = dbHost
2020-11-28 22:49:44 +01:00
case DbDriverMySQL:
if includeDbName {
connectionString = fmt.Sprintf(
"%s:%s@tcp(%s)/%s",
2023-01-27 19:54:46 +01:00
dbUser,
dbPass,
dbHost,
dbName)
2020-11-28 22:49:44 +01:00
} else {
connectionString = fmt.Sprintf(
"%s:%s@tcp(%s)/",
2023-01-27 19:54:46 +01:00
dbUser,
dbPass,
dbHost)
2020-11-28 22:49:44 +01:00
}
options := map[string]string{
"parseTime": "true",
"interpolateParams": "true",
}
for v, k := range d.Options {
options[v] = k
}
connectionString += mapToQueryString(options)
2021-08-24 17:20:34 +02:00
case DbDriverPostgres:
if includeDbName {
connectionString = fmt.Sprintf(
"postgres://%s:%s@%s/%s",
2023-01-27 19:54:46 +01:00
dbUser,
url.QueryEscape(dbPass),
dbHost,
dbName)
2021-08-24 17:20:34 +02:00
} else {
connectionString = fmt.Sprintf(
"postgres://%s:%s@%s",
2023-01-27 19:54:46 +01:00
dbUser,
url.QueryEscape(dbPass),
dbHost)
2021-08-24 17:20:34 +02:00
}
connectionString += mapToQueryString(d.Options)
2020-11-28 22:49:44 +01:00
default:
err = fmt.Errorf("unsupported database driver: %s", d.Dialect)
}
return
}
func (conf *ConfigType) PrintDbInfo() {
dialect, err := conf.GetDialect()
if err != nil {
panic(err)
}
switch dialect {
case DbDriverMySQL:
fmt.Printf("MySQL %v@%v %v\n", conf.MySQL.GetUsername(), conf.MySQL.GetHostname(), conf.MySQL.GetDbName())
case DbDriverBolt:
fmt.Printf("BoltDB %v\n", conf.BoltDb.GetHostname())
case DbDriverPostgres:
fmt.Printf("Postgres %v@%v %v\n", conf.Postgres.GetUsername(), conf.Postgres.GetHostname(), conf.Postgres.GetDbName())
default:
panic(fmt.Errorf("database configuration not found"))
}
}
func (conf *ConfigType) GetDialect() (dialect DbDriver, err error) {
if conf.Dialect == "" {
switch {
case conf.MySQL.IsPresent():
dialect = DbDriverMySQL
case conf.BoltDb.IsPresent():
dialect = DbDriverBolt
case conf.Postgres.IsPresent():
dialect = DbDriverPostgres
default:
err = errors.New("database configuration not found")
}
return
}
dialect = conf.Dialect
return
}
2020-11-28 22:49:44 +01:00
func (conf *ConfigType) GetDBConfig() (dbConfig DbConfig, err error) {
var dialect DbDriver
dialect, err = conf.GetDialect()
if err != nil {
return
}
switch dialect {
case DbDriverBolt:
dbConfig = conf.BoltDb
case DbDriverPostgres:
2021-08-24 17:20:34 +02:00
dbConfig = conf.Postgres
case DbDriverMySQL:
dbConfig = conf.MySQL
2020-11-28 22:49:44 +01:00
default:
err = errors.New("database configuration not found")
}
2021-08-28 18:24:54 +02:00
dbConfig.Dialect = dialect
2020-11-28 22:49:44 +01:00
return
}
// GenerateSecrets generates cookie secret during setup
2021-08-31 01:02:41 +02:00
func (conf *ConfigType) GenerateSecrets() {
hash := securecookie.GenerateRandomKey(32)
encryption := securecookie.GenerateRandomKey(32)
2021-08-31 01:02:41 +02:00
accessKeyEncryption := securecookie.GenerateRandomKey(32)
2016-01-05 00:32:53 +01:00
conf.CookieHash = base64.StdEncoding.EncodeToString(hash)
conf.CookieEncryption = base64.StdEncoding.EncodeToString(encryption)
2021-08-31 01:02:41 +02:00
conf.AccessKeyEncryption = base64.StdEncoding.EncodeToString(accessKeyEncryption)
2016-01-05 00:32:53 +01:00
}