mirror of
https://github.com/semaphoreui/semaphore.git
synced 2024-11-25 06:15:56 +01:00
68c5c49fdc
fixes #350
352 lines
8.3 KiB
Go
352 lines
8.3 KiB
Go
package util
|
|
|
|
import (
|
|
"encoding/base64"
|
|
"encoding/json"
|
|
"flag"
|
|
"fmt"
|
|
"os"
|
|
"path"
|
|
|
|
"net/url"
|
|
|
|
"github.com/gorilla/securecookie"
|
|
"golang.org/x/crypto/bcrypt"
|
|
)
|
|
|
|
var Cookie *securecookie.SecureCookie
|
|
var Migration bool
|
|
var InteractiveSetup bool
|
|
var Upgrade bool
|
|
var WebHostURL *url.URL
|
|
|
|
type mySQLConfig struct {
|
|
Hostname string `json:"host"`
|
|
Username string `json:"user"`
|
|
Password string `json:"pass"`
|
|
DbName string `json:"name"`
|
|
}
|
|
|
|
type ldapMappings struct {
|
|
DN string `json:"dn"`
|
|
Mail string `json:"mail"`
|
|
Uid string `json:"uid"`
|
|
CN string `json:"cn"`
|
|
}
|
|
|
|
type configType struct {
|
|
MySQL mySQLConfig `json:"mysql"`
|
|
// Format `:port_num` eg, :3000
|
|
Port string `json:"port"`
|
|
|
|
// semaphore stores projects here
|
|
TmpPath string `json:"tmp_path"`
|
|
|
|
// cookie hashing & encryption
|
|
CookieHash string `json:"cookie_hash"`
|
|
CookieEncryption string `json:"cookie_encryption"`
|
|
|
|
// email alerting
|
|
EmailAlert bool `json:"email_alert"`
|
|
EmailSender string `json:"email_sender"`
|
|
EmailHost string `json:"email_host"`
|
|
EmailPort string `json:"email_port"`
|
|
|
|
// web host
|
|
WebHost string `json:"web_host"`
|
|
|
|
// ldap settings
|
|
LdapEnable bool `json:"ldap_enable"`
|
|
LdapBindDN string `json:"ldap_binddn"`
|
|
LdapBindPassword string `json:"ldap_bindpassword"`
|
|
LdapServer string `json:"ldap_server"`
|
|
LdapNeedTLS bool `json:"ldap_needtls"`
|
|
LdapSearchDN string `json:"ldap_searchdn"`
|
|
LdapSearchFilter string `json:"ldap_searchfilter"`
|
|
LdapMappings ldapMappings `json:"ldap_mappings"`
|
|
|
|
// telegram alerting
|
|
TelegramAlert bool `json:"telegram_alert"`
|
|
TelegramChat string `json:"telegram_chat"`
|
|
TelegramToken string `json:"telegram_token"`
|
|
}
|
|
|
|
var Config *configType
|
|
|
|
func NewConfig() *configType {
|
|
return &configType{}
|
|
}
|
|
|
|
func init() {
|
|
flag.BoolVar(&InteractiveSetup, "setup", false, "perform interactive setup")
|
|
flag.BoolVar(&Migration, "migrate", false, "execute migrations")
|
|
flag.BoolVar(&Upgrade, "upgrade", false, "upgrade semaphore")
|
|
path := flag.String("config", "", "config path")
|
|
|
|
var pwd string
|
|
flag.StringVar(&pwd, "hash", "", "generate hash of given password")
|
|
|
|
var printConfig bool
|
|
flag.BoolVar(&printConfig, "printConfig", false, "print example configuration")
|
|
|
|
flag.Parse()
|
|
|
|
if printConfig {
|
|
cfg := &configType{
|
|
MySQL: mySQLConfig{
|
|
Hostname: "127.0.0.1:3306",
|
|
Username: "root",
|
|
DbName: "semaphore",
|
|
},
|
|
Port: ":3000",
|
|
TmpPath: "/tmp/semaphore",
|
|
}
|
|
cfg.GenerateCookieSecrets()
|
|
|
|
b, _ := json.MarshalIndent(cfg, "", "\t")
|
|
fmt.Println(string(b))
|
|
|
|
os.Exit(0)
|
|
}
|
|
|
|
if len(pwd) > 0 {
|
|
password, _ := bcrypt.GenerateFromPassword([]byte(pwd), 11)
|
|
fmt.Println("Generated password: ", string(password))
|
|
|
|
os.Exit(0)
|
|
}
|
|
|
|
if path != nil && len(*path) > 0 {
|
|
// load
|
|
file, err := os.Open(*path)
|
|
if err != nil {
|
|
panic(err)
|
|
}
|
|
|
|
if err := json.NewDecoder(file).Decode(&Config); err != nil {
|
|
fmt.Println("Could not decode configuration!")
|
|
panic(err)
|
|
}
|
|
} else {
|
|
configFile, err := Asset("config.json")
|
|
if err != nil {
|
|
fmt.Println("Cannot Find configuration! Use -c parameter to point to a JSON file generated by -setup.\n\n Hint: have you run `-setup` ?")
|
|
os.Exit(1)
|
|
}
|
|
|
|
if err := json.Unmarshal(configFile, &Config); err != nil {
|
|
fmt.Println("Could not decode configuration!")
|
|
panic(err)
|
|
}
|
|
}
|
|
|
|
if len(os.Getenv("PORT")) > 0 {
|
|
Config.Port = ":" + os.Getenv("PORT")
|
|
}
|
|
if len(Config.Port) == 0 {
|
|
Config.Port = ":3000"
|
|
}
|
|
|
|
if len(Config.TmpPath) == 0 {
|
|
Config.TmpPath = "/tmp/semaphore"
|
|
}
|
|
|
|
var encryption []byte
|
|
encryption = nil
|
|
|
|
hash, _ := base64.StdEncoding.DecodeString(Config.CookieHash)
|
|
if len(Config.CookieEncryption) > 0 {
|
|
encryption, _ = base64.StdEncoding.DecodeString(Config.CookieEncryption)
|
|
}
|
|
|
|
Cookie = securecookie.New(hash, encryption)
|
|
WebHostURL, _ = url.Parse(Config.WebHost)
|
|
}
|
|
|
|
func (conf *configType) GenerateCookieSecrets() {
|
|
hash := securecookie.GenerateRandomKey(32)
|
|
encryption := securecookie.GenerateRandomKey(32)
|
|
|
|
conf.CookieHash = base64.StdEncoding.EncodeToString(hash)
|
|
conf.CookieEncryption = base64.StdEncoding.EncodeToString(encryption)
|
|
}
|
|
|
|
func (conf *configType) Scan() {
|
|
fmt.Print(" > DB Hostname (default 127.0.0.1:3306): ")
|
|
fmt.Scanln(&conf.MySQL.Hostname)
|
|
if len(conf.MySQL.Hostname) == 0 {
|
|
conf.MySQL.Hostname = "127.0.0.1:3306"
|
|
}
|
|
|
|
fmt.Print(" > DB User (default root): ")
|
|
fmt.Scanln(&conf.MySQL.Username)
|
|
if len(conf.MySQL.Username) == 0 {
|
|
conf.MySQL.Username = "root"
|
|
}
|
|
|
|
fmt.Print(" > DB Password: ")
|
|
fmt.Scanln(&conf.MySQL.Password)
|
|
|
|
fmt.Print(" > DB Name (default semaphore): ")
|
|
fmt.Scanln(&conf.MySQL.DbName)
|
|
if len(conf.MySQL.DbName) == 0 {
|
|
conf.MySQL.DbName = "semaphore"
|
|
}
|
|
|
|
fmt.Print(" > Playbook path: ")
|
|
fmt.Scanln(&conf.TmpPath)
|
|
|
|
if len(conf.TmpPath) == 0 {
|
|
conf.TmpPath = "/tmp/semaphore"
|
|
}
|
|
conf.TmpPath = path.Clean(conf.TmpPath)
|
|
|
|
fmt.Print(" > Web root URL (default http://localhost:8010/): ")
|
|
fmt.Scanln(&conf.WebHost)
|
|
|
|
if len(conf.WebHost) == 0 {
|
|
conf.WebHost = "http://localhost:8010/"
|
|
}
|
|
|
|
var EmailAlertAnswer string
|
|
fmt.Print(" > Enable email alerts (y/n, default n): ")
|
|
fmt.Scanln(&EmailAlertAnswer)
|
|
if EmailAlertAnswer == "yes" || EmailAlertAnswer == "y" {
|
|
|
|
conf.EmailAlert = true
|
|
|
|
fmt.Print(" > Mail server host (default localhost): ")
|
|
fmt.Scanln(&conf.EmailHost)
|
|
|
|
if len(conf.EmailHost) == 0 {
|
|
conf.EmailHost = "localhost"
|
|
}
|
|
|
|
fmt.Print(" > Mail server port (default 25): ")
|
|
fmt.Scanln(&conf.EmailPort)
|
|
|
|
if len(conf.EmailPort) == 0 {
|
|
conf.EmailPort = "25"
|
|
}
|
|
|
|
fmt.Print(" > Mail sender address (default semaphore@localhost): ")
|
|
fmt.Scanln(&conf.EmailSender)
|
|
|
|
if len(conf.EmailSender) == 0 {
|
|
conf.EmailSender = "semaphore@localhost"
|
|
}
|
|
|
|
} else {
|
|
conf.EmailAlert = false
|
|
}
|
|
|
|
var TelegramAlertAnswer string
|
|
fmt.Print(" > Enable telegram alerts (y/n, default n): ")
|
|
fmt.Scanln(&TelegramAlertAnswer)
|
|
if TelegramAlertAnswer == "yes" || TelegramAlertAnswer == "y" {
|
|
|
|
conf.TelegramAlert = true
|
|
|
|
fmt.Print(" > Telegram bot token (you can get it from @BotFather) (default ''): ")
|
|
fmt.Scanln(&conf.TelegramToken)
|
|
|
|
if len(conf.TelegramToken) == 0 {
|
|
conf.TelegramToken = ""
|
|
}
|
|
|
|
fmt.Print(" > Telegram chat ID (default ''): ")
|
|
fmt.Scanln(&conf.TelegramChat)
|
|
|
|
if len(conf.TelegramChat) == 0 {
|
|
conf.TelegramChat = ""
|
|
}
|
|
|
|
} else {
|
|
conf.TelegramAlert = false
|
|
}
|
|
|
|
var LdapAnswer string
|
|
fmt.Print(" > Enable LDAP authentication (y/n, default n): ")
|
|
fmt.Scanln(&LdapAnswer)
|
|
if LdapAnswer == "yes" || LdapAnswer == "y" {
|
|
|
|
conf.LdapEnable = true
|
|
|
|
fmt.Print(" > LDAP server host (default localhost:389): ")
|
|
fmt.Scanln(&conf.LdapServer)
|
|
|
|
if len(conf.LdapServer) == 0 {
|
|
conf.LdapServer = "localhost:389"
|
|
}
|
|
|
|
var LdapTLSAnswer string
|
|
fmt.Print(" > Enable LDAP TLS connection (y/n, default n): ")
|
|
fmt.Scanln(&LdapTLSAnswer)
|
|
if LdapTLSAnswer == "yes" || LdapTLSAnswer == "y" {
|
|
conf.LdapNeedTLS = true
|
|
} else {
|
|
conf.LdapNeedTLS = false
|
|
}
|
|
|
|
fmt.Print(" > LDAP DN for bind (default cn=user,ou=users,dc=example): ")
|
|
fmt.Scanln(&conf.LdapBindDN)
|
|
|
|
if len(conf.LdapBindDN) == 0 {
|
|
conf.LdapBindDN = "cn=user,ou=users,dc=example"
|
|
}
|
|
|
|
fmt.Print(" > Password for LDAP bind user (default pa55w0rd): ")
|
|
fmt.Scanln(&conf.LdapBindPassword)
|
|
|
|
if len(conf.LdapBindPassword) == 0 {
|
|
conf.LdapBindPassword = "pa55w0rd"
|
|
}
|
|
|
|
fmt.Print(" > LDAP DN for user search (default ou=users,dc=example): ")
|
|
fmt.Scanln(&conf.LdapSearchDN)
|
|
|
|
if len(conf.LdapSearchDN) == 0 {
|
|
conf.LdapSearchDN = "ou=users,dc=example"
|
|
}
|
|
|
|
fmt.Print(" > LDAP search filter (default (uid=" + "%" + "s)): ")
|
|
fmt.Scanln(&conf.LdapSearchFilter)
|
|
|
|
if len(conf.LdapSearchFilter) == 0 {
|
|
conf.LdapSearchFilter = "(uid=%s)"
|
|
}
|
|
|
|
fmt.Print(" > LDAP mapping for DN field (default dn): ")
|
|
fmt.Scanln(&conf.LdapMappings.DN)
|
|
|
|
if len(conf.LdapMappings.DN) == 0 {
|
|
conf.LdapMappings.DN = "dn"
|
|
}
|
|
|
|
fmt.Print(" > LDAP mapping for username field (default uid): ")
|
|
fmt.Scanln(&conf.LdapMappings.Uid)
|
|
|
|
if len(conf.LdapMappings.Uid) == 0 {
|
|
conf.LdapMappings.Uid = "uid"
|
|
}
|
|
|
|
fmt.Print(" > LDAP mapping for full name field (default cn): ")
|
|
fmt.Scanln(&conf.LdapMappings.CN)
|
|
|
|
if len(conf.LdapMappings.CN) == 0 {
|
|
conf.LdapMappings.CN = "cn"
|
|
}
|
|
|
|
fmt.Print(" > LDAP mapping for email field (default mail): ")
|
|
fmt.Scanln(&conf.LdapMappings.Mail)
|
|
|
|
if len(conf.LdapMappings.Mail) == 0 {
|
|
conf.LdapMappings.Mail = "mail"
|
|
}
|
|
|
|
} else {
|
|
conf.LdapEnable = false
|
|
}
|
|
|
|
}
|