2017-04-29 17:03:45 +00:00
|
|
|
package server
|
2016-04-29 19:39:56 +00:00
|
|
|
|
|
|
|
import (
|
2017-05-03 21:25:33 +00:00
|
|
|
"context"
|
2016-04-29 19:39:56 +00:00
|
|
|
"net/http"
|
2017-04-29 17:41:19 +00:00
|
|
|
"net/url"
|
2016-04-29 19:39:56 +00:00
|
|
|
"time"
|
|
|
|
|
2017-04-29 17:41:19 +00:00
|
|
|
"golang.org/x/crypto/acme/autocert"
|
|
|
|
"golang.org/x/sync/errgroup"
|
|
|
|
|
2017-05-03 21:25:33 +00:00
|
|
|
"github.com/cncd/logging"
|
|
|
|
"github.com/cncd/pubsub"
|
|
|
|
"github.com/drone/drone/plugins/registry"
|
|
|
|
"github.com/drone/drone/plugins/secrets"
|
|
|
|
"github.com/drone/drone/plugins/sender"
|
2016-05-02 19:21:25 +00:00
|
|
|
"github.com/drone/drone/router"
|
|
|
|
"github.com/drone/drone/router/middleware"
|
2017-05-03 21:25:33 +00:00
|
|
|
droneserver "github.com/drone/drone/server"
|
|
|
|
"github.com/drone/drone/store"
|
2016-04-29 19:39:56 +00:00
|
|
|
|
|
|
|
"github.com/Sirupsen/logrus"
|
2016-09-28 00:33:13 +00:00
|
|
|
"github.com/gin-gonic/contrib/ginrus"
|
2017-03-16 10:14:02 +00:00
|
|
|
"github.com/urfave/cli"
|
2016-04-29 19:39:56 +00:00
|
|
|
)
|
|
|
|
|
2017-04-29 17:03:45 +00:00
|
|
|
// Command exports the server command.
|
|
|
|
var Command = cli.Command{
|
2017-03-16 10:14:02 +00:00
|
|
|
Name: "server",
|
|
|
|
Usage: "starts the drone server daemon",
|
|
|
|
Action: server,
|
2016-04-29 19:39:56 +00:00
|
|
|
Flags: []cli.Flag{
|
|
|
|
cli.BoolFlag{
|
|
|
|
EnvVar: "DRONE_DEBUG",
|
|
|
|
Name: "debug",
|
|
|
|
Usage: "start the server in debug mode",
|
|
|
|
},
|
2017-04-11 17:06:45 +00:00
|
|
|
cli.StringFlag{
|
2017-04-21 13:36:45 +00:00
|
|
|
EnvVar: "DRONE_SERVER_HOST,DRONE_HOST",
|
2017-04-11 17:06:45 +00:00
|
|
|
Name: "server-host",
|
|
|
|
Usage: "server host",
|
2016-11-11 09:48:01 +00:00
|
|
|
},
|
2016-04-29 19:39:56 +00:00
|
|
|
cli.StringFlag{
|
|
|
|
EnvVar: "DRONE_SERVER_ADDR",
|
|
|
|
Name: "server-addr",
|
|
|
|
Usage: "server address",
|
|
|
|
Value: ":8000",
|
|
|
|
},
|
|
|
|
cli.StringFlag{
|
|
|
|
EnvVar: "DRONE_SERVER_CERT",
|
|
|
|
Name: "server-cert",
|
|
|
|
Usage: "server ssl cert",
|
|
|
|
},
|
|
|
|
cli.StringFlag{
|
|
|
|
EnvVar: "DRONE_SERVER_KEY",
|
|
|
|
Name: "server-key",
|
|
|
|
Usage: "server ssl key",
|
|
|
|
},
|
2017-04-29 17:41:19 +00:00
|
|
|
cli.BoolFlag{
|
|
|
|
EnvVar: "DRONE_LETS_ENCRYPT",
|
|
|
|
Name: "lets-encrypt",
|
|
|
|
Usage: "lets encrypt enabled",
|
|
|
|
},
|
2016-04-29 19:39:56 +00:00
|
|
|
cli.StringSliceFlag{
|
|
|
|
EnvVar: "DRONE_ADMIN",
|
|
|
|
Name: "admin",
|
|
|
|
Usage: "list of admin users",
|
|
|
|
},
|
|
|
|
cli.StringSliceFlag{
|
|
|
|
EnvVar: "DRONE_ORGS",
|
|
|
|
Name: "orgs",
|
|
|
|
Usage: "list of approved organizations",
|
|
|
|
},
|
|
|
|
cli.BoolFlag{
|
|
|
|
EnvVar: "DRONE_OPEN",
|
|
|
|
Name: "open",
|
|
|
|
Usage: "open user registration",
|
|
|
|
},
|
|
|
|
cli.DurationFlag{
|
2016-11-18 01:45:23 +00:00
|
|
|
EnvVar: "DRONE_CACHE_TTL",
|
|
|
|
Name: "cache-ttl",
|
2016-04-29 19:39:56 +00:00
|
|
|
Usage: "cache duration",
|
|
|
|
Value: time.Minute * 15,
|
|
|
|
},
|
2017-04-14 08:41:24 +00:00
|
|
|
cli.StringSliceFlag{
|
|
|
|
EnvVar: "DRONE_ESCALATE",
|
|
|
|
Name: "escalate",
|
|
|
|
Value: &cli.StringSlice{
|
|
|
|
"plugins/docker",
|
|
|
|
"plugins/gcr",
|
|
|
|
"plugins/ecr",
|
|
|
|
},
|
|
|
|
},
|
|
|
|
cli.StringSliceFlag{
|
|
|
|
EnvVar: "DRONE_VOLUME",
|
|
|
|
Name: "volume",
|
|
|
|
},
|
|
|
|
cli.StringSliceFlag{
|
|
|
|
EnvVar: "DRONE_NETWORK",
|
|
|
|
Name: "network",
|
|
|
|
},
|
2016-04-29 19:39:56 +00:00
|
|
|
cli.StringFlag{
|
2016-05-24 01:47:44 +00:00
|
|
|
EnvVar: "DRONE_AGENT_SECRET,DRONE_SECRET",
|
2016-04-29 19:39:56 +00:00
|
|
|
Name: "agent-secret",
|
|
|
|
Usage: "agent secret passcode",
|
|
|
|
},
|
2017-04-11 17:06:45 +00:00
|
|
|
cli.StringFlag{
|
|
|
|
EnvVar: "DRONE_SECRET_ENDPOINT",
|
|
|
|
Name: "secret-service",
|
|
|
|
Usage: "secret plugin endpoint",
|
|
|
|
},
|
|
|
|
cli.StringFlag{
|
|
|
|
EnvVar: "DRONE_REGISTRY_ENDPOINT",
|
|
|
|
Name: "registry-service",
|
|
|
|
Usage: "registry plugin endpoint",
|
|
|
|
},
|
|
|
|
cli.StringFlag{
|
|
|
|
EnvVar: "DRONE_GATEKEEPER_ENDPOINT",
|
|
|
|
Name: "gating-service",
|
|
|
|
Usage: "gated build endpoint",
|
|
|
|
},
|
2016-04-29 19:39:56 +00:00
|
|
|
cli.StringFlag{
|
|
|
|
EnvVar: "DRONE_DATABASE_DRIVER,DATABASE_DRIVER",
|
|
|
|
Name: "driver",
|
|
|
|
Usage: "database driver",
|
2016-05-08 00:29:31 +00:00
|
|
|
Value: "sqlite3",
|
2016-04-29 19:39:56 +00:00
|
|
|
},
|
|
|
|
cli.StringFlag{
|
|
|
|
EnvVar: "DRONE_DATABASE_DATASOURCE,DATABASE_CONFIG",
|
|
|
|
Name: "datasource",
|
|
|
|
Usage: "database driver configuration string",
|
|
|
|
Value: "drone.sqlite",
|
|
|
|
},
|
|
|
|
cli.BoolFlag{
|
|
|
|
EnvVar: "DRONE_GITHUB",
|
|
|
|
Name: "github",
|
|
|
|
Usage: "github driver is enabled",
|
|
|
|
},
|
|
|
|
cli.StringFlag{
|
|
|
|
EnvVar: "DRONE_GITHUB_URL",
|
|
|
|
Name: "github-server",
|
|
|
|
Usage: "github server address",
|
|
|
|
Value: "https://github.com",
|
|
|
|
},
|
2016-05-27 18:22:32 +00:00
|
|
|
cli.StringFlag{
|
|
|
|
EnvVar: "DRONE_GITHUB_CONTEXT",
|
|
|
|
Name: "github-context",
|
|
|
|
Usage: "github status context",
|
|
|
|
Value: "continuous-integration/drone",
|
|
|
|
},
|
2016-04-29 19:39:56 +00:00
|
|
|
cli.StringFlag{
|
|
|
|
EnvVar: "DRONE_GITHUB_CLIENT",
|
|
|
|
Name: "github-client",
|
|
|
|
Usage: "github oauth2 client id",
|
|
|
|
},
|
|
|
|
cli.StringFlag{
|
|
|
|
EnvVar: "DRONE_GITHUB_SECRET",
|
2016-07-21 19:17:54 +00:00
|
|
|
Name: "github-secret",
|
2016-04-29 19:39:56 +00:00
|
|
|
Usage: "github oauth2 client secret",
|
|
|
|
},
|
|
|
|
cli.StringSliceFlag{
|
|
|
|
EnvVar: "DRONE_GITHUB_SCOPE",
|
|
|
|
Name: "github-scope",
|
|
|
|
Usage: "github oauth scope",
|
|
|
|
Value: &cli.StringSlice{
|
|
|
|
"repo",
|
|
|
|
"repo:status",
|
|
|
|
"user:email",
|
|
|
|
"read:org",
|
|
|
|
},
|
|
|
|
},
|
2016-08-01 17:54:47 +00:00
|
|
|
cli.StringFlag{
|
|
|
|
EnvVar: "DRONE_GITHUB_GIT_USERNAME",
|
|
|
|
Name: "github-git-username",
|
|
|
|
Usage: "github machine user username",
|
|
|
|
},
|
|
|
|
cli.StringFlag{
|
|
|
|
EnvVar: "DRONE_GITHUB_GIT_PASSWORD",
|
|
|
|
Name: "github-git-password",
|
|
|
|
Usage: "github machine user password",
|
|
|
|
},
|
2016-04-29 19:39:56 +00:00
|
|
|
cli.BoolTFlag{
|
|
|
|
EnvVar: "DRONE_GITHUB_MERGE_REF",
|
|
|
|
Name: "github-merge-ref",
|
|
|
|
Usage: "github pull requests use merge ref",
|
|
|
|
},
|
|
|
|
cli.BoolFlag{
|
|
|
|
EnvVar: "DRONE_GITHUB_PRIVATE_MODE",
|
|
|
|
Name: "github-private-mode",
|
|
|
|
Usage: "github is running in private mode",
|
|
|
|
},
|
|
|
|
cli.BoolFlag{
|
|
|
|
EnvVar: "DRONE_GITHUB_SKIP_VERIFY",
|
|
|
|
Name: "github-skip-verify",
|
|
|
|
Usage: "github skip ssl verification",
|
|
|
|
},
|
|
|
|
cli.BoolFlag{
|
|
|
|
EnvVar: "DRONE_GOGS",
|
|
|
|
Name: "gogs",
|
|
|
|
Usage: "gogs driver is enabled",
|
|
|
|
},
|
|
|
|
cli.StringFlag{
|
|
|
|
EnvVar: "DRONE_GOGS_URL",
|
|
|
|
Name: "gogs-server",
|
|
|
|
Usage: "gogs server address",
|
|
|
|
Value: "https://github.com",
|
|
|
|
},
|
2016-05-01 23:30:00 +00:00
|
|
|
cli.StringFlag{
|
|
|
|
EnvVar: "DRONE_GOGS_GIT_USERNAME",
|
|
|
|
Name: "gogs-git-username",
|
|
|
|
Usage: "gogs service account username",
|
|
|
|
},
|
|
|
|
cli.StringFlag{
|
|
|
|
EnvVar: "DRONE_GOGS_GIT_PASSWORD",
|
|
|
|
Name: "gogs-git-password",
|
|
|
|
Usage: "gogs service account password",
|
|
|
|
},
|
2016-04-29 19:39:56 +00:00
|
|
|
cli.BoolFlag{
|
|
|
|
EnvVar: "DRONE_GOGS_PRIVATE_MODE",
|
|
|
|
Name: "gogs-private-mode",
|
|
|
|
Usage: "gogs private mode enabled",
|
|
|
|
},
|
|
|
|
cli.BoolFlag{
|
|
|
|
EnvVar: "DRONE_GOGS_SKIP_VERIFY",
|
|
|
|
Name: "gogs-skip-verify",
|
|
|
|
Usage: "gogs skip ssl verification",
|
|
|
|
},
|
|
|
|
cli.BoolFlag{
|
|
|
|
EnvVar: "DRONE_BITBUCKET",
|
|
|
|
Name: "bitbucket",
|
|
|
|
Usage: "bitbucket driver is enabled",
|
|
|
|
},
|
|
|
|
cli.StringFlag{
|
|
|
|
EnvVar: "DRONE_BITBUCKET_CLIENT",
|
|
|
|
Name: "bitbucket-client",
|
|
|
|
Usage: "bitbucket oauth2 client id",
|
|
|
|
},
|
|
|
|
cli.StringFlag{
|
|
|
|
EnvVar: "DRONE_BITBUCKET_SECRET",
|
|
|
|
Name: "bitbucket-secret",
|
|
|
|
Usage: "bitbucket oauth2 client secret",
|
|
|
|
},
|
|
|
|
cli.BoolFlag{
|
|
|
|
EnvVar: "DRONE_GITLAB",
|
|
|
|
Name: "gitlab",
|
|
|
|
Usage: "gitlab driver is enabled",
|
|
|
|
},
|
|
|
|
cli.StringFlag{
|
|
|
|
EnvVar: "DRONE_GITLAB_URL",
|
|
|
|
Name: "gitlab-server",
|
|
|
|
Usage: "gitlab server address",
|
|
|
|
Value: "https://gitlab.com",
|
|
|
|
},
|
|
|
|
cli.StringFlag{
|
|
|
|
EnvVar: "DRONE_GITLAB_CLIENT",
|
|
|
|
Name: "gitlab-client",
|
|
|
|
Usage: "gitlab oauth2 client id",
|
|
|
|
},
|
|
|
|
cli.StringFlag{
|
|
|
|
EnvVar: "DRONE_GITLAB_SECRET",
|
2016-07-21 19:17:54 +00:00
|
|
|
Name: "gitlab-secret",
|
2016-04-29 19:39:56 +00:00
|
|
|
Usage: "gitlab oauth2 client secret",
|
|
|
|
},
|
2016-05-01 23:30:00 +00:00
|
|
|
cli.StringFlag{
|
|
|
|
EnvVar: "DRONE_GITLAB_GIT_USERNAME",
|
|
|
|
Name: "gitlab-git-username",
|
|
|
|
Usage: "gitlab service account username",
|
|
|
|
},
|
|
|
|
cli.StringFlag{
|
|
|
|
EnvVar: "DRONE_GITLAB_GIT_PASSWORD",
|
|
|
|
Name: "gitlab-git-password",
|
|
|
|
Usage: "gitlab service account password",
|
|
|
|
},
|
2016-04-29 19:39:56 +00:00
|
|
|
cli.BoolFlag{
|
|
|
|
EnvVar: "DRONE_GITLAB_SKIP_VERIFY",
|
|
|
|
Name: "gitlab-skip-verify",
|
|
|
|
Usage: "gitlab skip ssl verification",
|
|
|
|
},
|
|
|
|
cli.BoolFlag{
|
|
|
|
EnvVar: "DRONE_GITLAB_PRIVATE_MODE",
|
|
|
|
Name: "gitlab-private-mode",
|
|
|
|
Usage: "gitlab is running in private mode",
|
|
|
|
},
|
|
|
|
cli.BoolFlag{
|
|
|
|
EnvVar: "DRONE_STASH",
|
|
|
|
Name: "stash",
|
|
|
|
Usage: "stash driver is enabled",
|
|
|
|
},
|
|
|
|
cli.StringFlag{
|
|
|
|
EnvVar: "DRONE_STASH_URL",
|
|
|
|
Name: "stash-server",
|
|
|
|
Usage: "stash server address",
|
|
|
|
},
|
|
|
|
cli.StringFlag{
|
|
|
|
EnvVar: "DRONE_STASH_CONSUMER_KEY",
|
|
|
|
Name: "stash-consumer-key",
|
|
|
|
Usage: "stash oauth1 consumer key",
|
|
|
|
},
|
|
|
|
cli.StringFlag{
|
|
|
|
EnvVar: "DRONE_STASH_CONSUMER_RSA",
|
|
|
|
Name: "stash-consumer-rsa",
|
|
|
|
Usage: "stash oauth1 private key file",
|
|
|
|
},
|
2017-02-01 21:41:45 +00:00
|
|
|
cli.StringFlag{
|
|
|
|
EnvVar: "DRONE_STASH_CONSUMER_RSA_STRING",
|
2017-02-01 21:49:26 +00:00
|
|
|
Name: "stash-consumer-rsa-string",
|
|
|
|
Usage: "stash oauth1 private key string",
|
2017-02-01 21:41:45 +00:00
|
|
|
},
|
2016-04-29 19:39:56 +00:00
|
|
|
cli.StringFlag{
|
|
|
|
EnvVar: "DRONE_STASH_GIT_USERNAME",
|
|
|
|
Name: "stash-git-username",
|
|
|
|
Usage: "stash service account username",
|
|
|
|
},
|
|
|
|
cli.StringFlag{
|
|
|
|
EnvVar: "DRONE_STASH_GIT_PASSWORD",
|
|
|
|
Name: "stash-git-password",
|
|
|
|
Usage: "stash service account password",
|
|
|
|
},
|
2016-05-01 23:30:00 +00:00
|
|
|
cli.BoolFlag{
|
|
|
|
EnvVar: "DRONE_STASH_SKIP_VERIFY",
|
|
|
|
Name: "stash-skip-verify",
|
|
|
|
Usage: "stash skip ssl verification",
|
|
|
|
},
|
2016-04-29 19:39:56 +00:00
|
|
|
},
|
|
|
|
}
|
|
|
|
|
2016-05-06 17:59:36 +00:00
|
|
|
func server(c *cli.Context) error {
|
2016-04-29 19:39:56 +00:00
|
|
|
|
|
|
|
// debug level if requested by user
|
|
|
|
if c.Bool("debug") {
|
|
|
|
logrus.SetLevel(logrus.DebugLevel)
|
|
|
|
} else {
|
|
|
|
logrus.SetLevel(logrus.WarnLevel)
|
|
|
|
}
|
|
|
|
|
2017-05-03 21:25:33 +00:00
|
|
|
s := setupStore(c)
|
|
|
|
setupEvilGlobals(c, s)
|
|
|
|
|
2016-04-29 19:39:56 +00:00
|
|
|
// setup the server and start the listener
|
2016-05-02 19:21:25 +00:00
|
|
|
handler := router.Load(
|
|
|
|
ginrus.Ginrus(logrus.StandardLogger(), time.RFC3339, true),
|
|
|
|
middleware.Version,
|
|
|
|
middleware.Config(c),
|
|
|
|
middleware.Cache(c),
|
2017-05-03 21:25:33 +00:00
|
|
|
middleware.Store(c, s),
|
2016-05-02 19:21:25 +00:00
|
|
|
middleware.Remote(c),
|
|
|
|
)
|
2016-04-29 19:39:56 +00:00
|
|
|
|
|
|
|
// start the server with tls enabled
|
|
|
|
if c.String("server-cert") != "" {
|
|
|
|
return http.ListenAndServeTLS(
|
|
|
|
c.String("server-addr"),
|
|
|
|
c.String("server-cert"),
|
|
|
|
c.String("server-key"),
|
2016-05-02 19:21:25 +00:00
|
|
|
handler,
|
2016-04-29 19:39:56 +00:00
|
|
|
)
|
|
|
|
}
|
|
|
|
|
|
|
|
// start the server without tls enabled
|
2017-04-29 17:41:19 +00:00
|
|
|
if !c.Bool("lets-encrypt") {
|
|
|
|
return http.ListenAndServe(
|
|
|
|
c.String("server-addr"),
|
|
|
|
handler,
|
|
|
|
)
|
|
|
|
}
|
|
|
|
|
|
|
|
// start the server with lets encrypt enabled
|
|
|
|
// listen on ports 443 and 80
|
|
|
|
var g errgroup.Group
|
|
|
|
g.Go(func() error {
|
|
|
|
return http.ListenAndServe(":http", handler)
|
|
|
|
})
|
|
|
|
|
|
|
|
g.Go(func() error {
|
|
|
|
address, err := url.Parse(c.String("server-host"))
|
|
|
|
if err != nil {
|
|
|
|
return err
|
|
|
|
}
|
|
|
|
return http.Serve(autocert.NewListener(address.Host), handler)
|
|
|
|
})
|
|
|
|
|
|
|
|
return g.Wait()
|
2016-04-29 19:39:56 +00:00
|
|
|
}
|
2017-05-03 21:25:33 +00:00
|
|
|
|
|
|
|
// HACK please excuse the message during this period of heavy refactoring.
|
|
|
|
// We are currently transitioning from storing services (ie database, queue)
|
|
|
|
// in the gin.Context to storing them in a struct. We are also moving away
|
|
|
|
// from gin to gorilla. We will temporarily use global during our refactoring
|
|
|
|
// which will be removing in the final implementation.
|
|
|
|
func setupEvilGlobals(c *cli.Context, v store.Store) {
|
|
|
|
|
|
|
|
// storage
|
|
|
|
droneserver.Config.Storage.Files = v
|
2017-05-05 16:59:37 +00:00
|
|
|
droneserver.Config.Storage.Config = v
|
2017-05-03 21:25:33 +00:00
|
|
|
|
|
|
|
// services
|
2017-05-04 00:02:08 +00:00
|
|
|
droneserver.Config.Services.Queue = setupQueue(c, v)
|
2017-05-03 21:25:33 +00:00
|
|
|
droneserver.Config.Services.Logs = logging.New()
|
|
|
|
droneserver.Config.Services.Pubsub = pubsub.New()
|
|
|
|
droneserver.Config.Services.Pubsub.Create(context.Background(), "topic/events")
|
|
|
|
droneserver.Config.Services.Registries = registry.New(v)
|
|
|
|
droneserver.Config.Services.Secrets = secrets.New(v)
|
2017-05-05 18:05:42 +00:00
|
|
|
droneserver.Config.Services.Senders = sender.New(v, v)
|
2017-05-03 21:25:33 +00:00
|
|
|
if endpoint := c.String("registry-service"); endpoint != "" {
|
|
|
|
droneserver.Config.Services.Registries = registry.NewRemote(endpoint)
|
|
|
|
}
|
|
|
|
if endpoint := c.String("secret-service"); endpoint != "" {
|
|
|
|
droneserver.Config.Services.Secrets = secrets.NewRemote(endpoint)
|
|
|
|
}
|
|
|
|
if endpoint := c.String("gating-service"); endpoint != "" {
|
|
|
|
droneserver.Config.Services.Senders = sender.NewRemote(endpoint)
|
|
|
|
}
|
|
|
|
|
|
|
|
// server configuration
|
|
|
|
droneserver.Config.Server.Cert = c.String("server-cert")
|
|
|
|
droneserver.Config.Server.Key = c.String("server-key")
|
|
|
|
droneserver.Config.Server.Pass = c.String("agent-secret")
|
|
|
|
droneserver.Config.Server.Host = c.String("server-host")
|
|
|
|
droneserver.Config.Server.Port = c.String("server-addr")
|
|
|
|
droneserver.Config.Pipeline.Networks = c.StringSlice("network")
|
|
|
|
droneserver.Config.Pipeline.Volumes = c.StringSlice("volumes")
|
|
|
|
droneserver.Config.Pipeline.Privileged = c.StringSlice("escalate")
|
|
|
|
// droneserver.Config.Server.Open = cli.Bool("open")
|
|
|
|
// droneserver.Config.Server.Orgs = sliceToMap(cli.StringSlice("orgs"))
|
|
|
|
// droneserver.Config.Server.Admins = sliceToMap(cli.StringSlice("admin"))
|
|
|
|
}
|