// Copyright 2014 The Gogs Authors. All rights reserved. // Use of this source code is governed by a MIT-style // license that can be found in the LICENSE file. package cmd import ( "crypto/tls" "fmt" "io" "net" "net/http" "net/http/fcgi" "os" "path/filepath" "strings" "github.com/go-macaron/binding" "github.com/go-macaron/cache" "github.com/go-macaron/captcha" "github.com/go-macaron/csrf" "github.com/go-macaron/gzip" "github.com/go-macaron/i18n" "github.com/go-macaron/session" "github.com/go-macaron/toolbox" "github.com/prometheus/client_golang/prometheus/promhttp" "github.com/unknwon/com" "github.com/urfave/cli" "gopkg.in/macaron.v1" log "unknwon.dev/clog/v2" embedConf "gogs.io/gogs/conf" "gogs.io/gogs/internal/app" "gogs.io/gogs/internal/conf" "gogs.io/gogs/internal/context" "gogs.io/gogs/internal/database" "gogs.io/gogs/internal/form" "gogs.io/gogs/internal/osutil" "gogs.io/gogs/internal/route" "gogs.io/gogs/internal/route/admin" apiv1 "gogs.io/gogs/internal/route/api/v1" "gogs.io/gogs/internal/route/dev" "gogs.io/gogs/internal/route/lfs" "gogs.io/gogs/internal/route/org" "gogs.io/gogs/internal/route/repo" "gogs.io/gogs/internal/route/user" "gogs.io/gogs/internal/template" "gogs.io/gogs/public" "gogs.io/gogs/templates" ) var Web = cli.Command{ Name: "web", Usage: "Start web server", Description: `Gogs web server is the only thing you need to run, and it takes care of all the other things for you`, Action: runWeb, Flags: []cli.Flag{ stringFlag("port, p", "3000", "Temporary port number to prevent conflict"), stringFlag("config, c", "", "Custom configuration file path"), }, } // newMacaron initializes Macaron instance. func newMacaron() *macaron.Macaron { m := macaron.New() if !conf.Server.DisableRouterLog { m.Use(macaron.Logger()) } m.Use(macaron.Recovery()) if conf.Server.EnableGzip { m.Use(gzip.Gziper()) } if conf.Server.Protocol == "fcgi" { m.SetURLPrefix(conf.Server.Subpath) } // Register custom middleware first to make it possible to override files under "public". m.Use(macaron.Static( filepath.Join(conf.CustomDir(), "public"), macaron.StaticOptions{ SkipLogging: conf.Server.DisableRouterLog, }, )) var publicFs http.FileSystem if !conf.Server.LoadAssetsFromDisk { publicFs = http.FS(public.Files) } m.Use(macaron.Static( filepath.Join(conf.WorkDir(), "public"), macaron.StaticOptions{ ETag: true, SkipLogging: conf.Server.DisableRouterLog, FileSystem: publicFs, }, )) m.Use(macaron.Static( conf.Picture.AvatarUploadPath, macaron.StaticOptions{ ETag: true, Prefix: conf.UsersAvatarPathPrefix, SkipLogging: conf.Server.DisableRouterLog, }, )) m.Use(macaron.Static( conf.Picture.RepositoryAvatarUploadPath, macaron.StaticOptions{ ETag: true, Prefix: database.REPO_AVATAR_URL_PREFIX, SkipLogging: conf.Server.DisableRouterLog, }, )) renderOpt := macaron.RenderOptions{ Directory: filepath.Join(conf.WorkDir(), "templates"), AppendDirectories: []string{filepath.Join(conf.CustomDir(), "templates")}, Funcs: template.FuncMap(), IndentJSON: macaron.Env != macaron.PROD, } if !conf.Server.LoadAssetsFromDisk { renderOpt.TemplateFileSystem = templates.NewTemplateFileSystem("", renderOpt.AppendDirectories[0]) } m.Use(macaron.Renderer(renderOpt)) localeNames, err := embedConf.FileNames("locale") if err != nil { log.Fatal("Failed to list locale files: %v", err) } localeFiles := make(map[string][]byte) for _, name := range localeNames { localeFiles[name], err = embedConf.Files.ReadFile("locale/" + name) if err != nil { log.Fatal("Failed to read locale file %q: %v", name, err) } } m.Use(i18n.I18n(i18n.Options{ SubURL: conf.Server.Subpath, Files: localeFiles, CustomDirectory: filepath.Join(conf.CustomDir(), "conf", "locale"), Langs: conf.I18n.Langs, Names: conf.I18n.Names, DefaultLang: "en-US", Redirect: true, })) m.Use(cache.Cacher(cache.Options{ Adapter: conf.Cache.Adapter, AdapterConfig: conf.Cache.Host, Interval: conf.Cache.Interval, })) m.Use(captcha.Captchaer(captcha.Options{ SubURL: conf.Server.Subpath, })) m.Use(toolbox.Toolboxer(m, toolbox.Options{ HealthCheckFuncs: []*toolbox.HealthCheckFuncDesc{ { Desc: "Database connection", Func: database.Ping, }, }, })) return m } func runWeb(c *cli.Context) error { err := route.GlobalInit(c.String("config")) if err != nil { log.Fatal("Failed to initialize application: %v", err) } m := newMacaron() reqSignIn := context.Toggle(&context.ToggleOptions{SignInRequired: true}) ignSignIn := context.Toggle(&context.ToggleOptions{SignInRequired: conf.Auth.RequireSigninView}) reqSignOut := context.Toggle(&context.ToggleOptions{SignOutRequired: true}) bindIgnErr := binding.BindIgnErr m.SetAutoHead(true) m.Group("", func() { m.Get("/", ignSignIn, route.Home) m.Group("/explore", func() { m.Get("", func(c *context.Context) { c.Redirect(conf.Server.Subpath + "/explore/repos") }) m.Get("/repos", route.ExploreRepos) m.Get("/users", route.ExploreUsers) m.Get("/organizations", route.ExploreOrganizations) }, ignSignIn) m.Combo("/install", route.InstallInit).Get(route.Install). Post(bindIgnErr(form.Install{}), route.InstallPost) m.Get("/^:type(issues|pulls)$", reqSignIn, user.Issues) // ***** START: User ***** m.Group("/user", func() { m.Group("/login", func() { m.Combo("").Get(user.Login). Post(bindIgnErr(form.SignIn{}), user.LoginPost) m.Combo("/two_factor").Get(user.LoginTwoFactor).Post(user.LoginTwoFactorPost) m.Combo("/two_factor_recovery_code").Get(user.LoginTwoFactorRecoveryCode).Post(user.LoginTwoFactorRecoveryCodePost) }) m.Get("/sign_up", user.SignUp) m.Post("/sign_up", bindIgnErr(form.Register{}), user.SignUpPost) m.Get("/reset_password", user.ResetPasswd) m.Post("/reset_password", user.ResetPasswdPost) }, reqSignOut) m.Group("/user/settings", func() { m.Get("", user.Settings) m.Post("", bindIgnErr(form.UpdateProfile{}), user.SettingsPost) m.Combo("/avatar").Get(user.SettingsAvatar). Post(binding.MultipartForm(form.Avatar{}), user.SettingsAvatarPost) m.Post("/avatar/delete", user.SettingsDeleteAvatar) m.Combo("/email").Get(user.SettingsEmails). Post(bindIgnErr(form.AddEmail{}), user.SettingsEmailPost) m.Post("/email/delete", user.DeleteEmail) m.Get("/password", user.SettingsPassword) m.Post("/password", bindIgnErr(form.ChangePassword{}), user.SettingsPasswordPost) m.Combo("/ssh").Get(user.SettingsSSHKeys). Post(bindIgnErr(form.AddSSHKey{}), user.SettingsSSHKeysPost) m.Post("/ssh/delete", user.DeleteSSHKey) m.Group("/security", func() { m.Get("", user.SettingsSecurity) m.Combo("/two_factor_enable").Get(user.SettingsTwoFactorEnable). Post(user.SettingsTwoFactorEnablePost) m.Combo("/two_factor_recovery_codes").Get(user.SettingsTwoFactorRecoveryCodes). Post(user.SettingsTwoFactorRecoveryCodesPost) m.Post("/two_factor_disable", user.SettingsTwoFactorDisable) }) m.Group("/repositories", func() { m.Get("", user.SettingsRepos) m.Post("/leave", user.SettingsLeaveRepo) }) m.Group("/organizations", func() { m.Get("", user.SettingsOrganizations) m.Post("/leave", user.SettingsLeaveOrganization) }) settingsHandler := user.NewSettingsHandler(user.NewSettingsStore()) m.Combo("/applications").Get(settingsHandler.Applications()). Post(bindIgnErr(form.NewAccessToken{}), settingsHandler.ApplicationsPost()) m.Post("/applications/delete", settingsHandler.DeleteApplication()) m.Route("/delete", "GET,POST", user.SettingsDelete) }, reqSignIn, func(c *context.Context) { c.Data["PageIsUserSettings"] = true }) m.Group("/user", func() { m.Any("/activate", user.Activate) m.Any("/activate_email", user.ActivateEmail) m.Get("/email2user", user.Email2User) m.Get("/forget_password", user.ForgotPasswd) m.Post("/forget_password", user.ForgotPasswdPost) m.Post("/logout", user.SignOut) }) // ***** END: User ***** reqAdmin := context.Toggle(&context.ToggleOptions{SignInRequired: true, AdminRequired: true}) // ***** START: Admin ***** m.Group("/admin", func() { m.Combo("").Get(admin.Dashboard).Post(admin.Operation) // "/admin" m.Get("/config", admin.Config) m.Post("/config/test_mail", admin.SendTestMail) m.Get("/monitor", admin.Monitor) m.Group("/users", func() { m.Get("", admin.Users) m.Combo("/new").Get(admin.NewUser).Post(bindIgnErr(form.AdminCrateUser{}), admin.NewUserPost) m.Combo("/:userid").Get(admin.EditUser).Post(bindIgnErr(form.AdminEditUser{}), admin.EditUserPost) m.Post("/:userid/delete", admin.DeleteUser) }) m.Group("/orgs", func() { m.Get("", admin.Organizations) }) m.Group("/repos", func() { m.Get("", admin.Repos) m.Post("/delete", admin.DeleteRepo) }) m.Group("/auths", func() { m.Get("", admin.Authentications) m.Combo("/new").Get(admin.NewAuthSource).Post(bindIgnErr(form.Authentication{}), admin.NewAuthSourcePost) m.Combo("/:authid").Get(admin.EditAuthSource). Post(bindIgnErr(form.Authentication{}), admin.EditAuthSourcePost) m.Post("/:authid/delete", admin.DeleteAuthSource) }) m.Group("/notices", func() { m.Get("", admin.Notices) m.Post("/delete", admin.DeleteNotices) m.Get("/empty", admin.EmptyNotices) }) }, reqAdmin) // ***** END: Admin ***** m.Group("", func() { m.Group("/:username", func() { m.Get("", user.Profile) m.Get("/followers", user.Followers) m.Get("/following", user.Following) m.Get("/stars", user.Stars) }, context.InjectParamsUser()) m.Get("/attachments/:uuid", func(c *context.Context) { attach, err := database.GetAttachmentByUUID(c.Params(":uuid")) if err != nil { c.NotFoundOrError(err, "get attachment by UUID") return } else if !com.IsFile(attach.LocalPath()) { c.NotFound() return } fr, err := os.Open(attach.LocalPath()) if err != nil { c.Error(err, "open attachment file") return } defer fr.Close() c.Header().Set("Content-Security-Policy", "default-src 'none'; style-src 'unsafe-inline'; sandbox") c.Header().Set("Cache-Control", "public,max-age=86400") c.Header().Set("Content-Disposition", fmt.Sprintf(`inline; filename="%s"`, attach.Name)) if _, err = io.Copy(c.Resp, fr); err != nil { c.Error(err, "copy from file to response") return } }) m.Post("/issues/attachments", repo.UploadIssueAttachment) m.Post("/releases/attachments", repo.UploadReleaseAttachment) }, ignSignIn) m.Group("/:username", func() { m.Post("/action/:action", user.Action) }, reqSignIn, context.InjectParamsUser()) if macaron.Env == macaron.DEV { m.Get("/template/*", dev.TemplatePreview) } reqRepoAdmin := context.RequireRepoAdmin() reqRepoWriter := context.RequireRepoWriter() webhookRoutes := func() { m.Group("", func() { m.Get("", repo.Webhooks) m.Post("/delete", repo.DeleteWebhook) m.Get("/:type/new", repo.WebhooksNew) m.Post("/gogs/new", bindIgnErr(form.NewWebhook{}), repo.WebhooksNewPost) m.Post("/slack/new", bindIgnErr(form.NewSlackHook{}), repo.WebhooksSlackNewPost) m.Post("/discord/new", bindIgnErr(form.NewDiscordHook{}), repo.WebhooksDiscordNewPost) m.Post("/dingtalk/new", bindIgnErr(form.NewDingtalkHook{}), repo.WebhooksDingtalkNewPost) m.Get("/:id", repo.WebhooksEdit) m.Post("/gogs/:id", bindIgnErr(form.NewWebhook{}), repo.WebhooksEditPost) m.Post("/slack/:id", bindIgnErr(form.NewSlackHook{}), repo.WebhooksSlackEditPost) m.Post("/discord/:id", bindIgnErr(form.NewDiscordHook{}), repo.WebhooksDiscordEditPost) m.Post("/dingtalk/:id", bindIgnErr(form.NewDingtalkHook{}), repo.WebhooksDingtalkEditPost) }, repo.InjectOrgRepoContext()) } // ***** START: Organization ***** m.Group("/org", func() { m.Group("", func() { m.Get("/create", org.Create) m.Post("/create", bindIgnErr(form.CreateOrg{}), org.CreatePost) }, func(c *context.Context) { if !c.User.CanCreateOrganization() { c.NotFound() } }) m.Group("/:org", func() { m.Get("/dashboard", user.Dashboard) m.Get("/^:type(issues|pulls)$", user.Issues) m.Get("/members", org.Members) m.Get("/members/action/:action", org.MembersAction) m.Get("/teams", org.Teams) }, context.OrgAssignment(true)) m.Group("/:org", func() { m.Get("/teams/:team", org.TeamMembers) m.Get("/teams/:team/repositories", org.TeamRepositories) m.Route("/teams/:team/action/:action", "GET,POST", org.TeamsAction) m.Route("/teams/:team/action/repo/:action", "GET,POST", org.TeamsRepoAction) }, context.OrgAssignment(true, false, true)) m.Group("/:org", func() { m.Get("/teams/new", org.NewTeam) m.Post("/teams/new", bindIgnErr(form.CreateTeam{}), org.NewTeamPost) m.Get("/teams/:team/edit", org.EditTeam) m.Post("/teams/:team/edit", bindIgnErr(form.CreateTeam{}), org.EditTeamPost) m.Post("/teams/:team/delete", org.DeleteTeam) m.Group("/settings", func() { m.Combo("").Get(org.Settings). Post(bindIgnErr(form.UpdateOrgSetting{}), org.SettingsPost) m.Post("/avatar", binding.MultipartForm(form.Avatar{}), org.SettingsAvatar) m.Post("/avatar/delete", org.SettingsDeleteAvatar) m.Group("/hooks", webhookRoutes) m.Route("/delete", "GET,POST", org.SettingsDelete) }) m.Route("/invitations/new", "GET,POST", org.Invitation) }, context.OrgAssignment(true, true)) }, reqSignIn) // ***** END: Organization ***** // ***** START: Repository ***** m.Group("/repo", func() { m.Get("/create", repo.Create) m.Post("/create", bindIgnErr(form.CreateRepo{}), repo.CreatePost) m.Get("/migrate", repo.Migrate) m.Post("/migrate", bindIgnErr(form.MigrateRepo{}), repo.MigratePost) m.Combo("/fork/:repoid").Get(repo.Fork). Post(bindIgnErr(form.CreateRepo{}), repo.ForkPost) }, reqSignIn) m.Group("/:username/:reponame", func() { m.Group("/settings", func() { m.Combo("").Get(repo.Settings). Post(bindIgnErr(form.RepoSetting{}), repo.SettingsPost) m.Combo("/avatar").Get(repo.SettingsAvatar). Post(binding.MultipartForm(form.Avatar{}), repo.SettingsAvatarPost) m.Post("/avatar/delete", repo.SettingsDeleteAvatar) m.Group("/collaboration", func() { m.Combo("").Get(repo.SettingsCollaboration).Post(repo.SettingsCollaborationPost) m.Post("/access_mode", repo.ChangeCollaborationAccessMode) m.Post("/delete", repo.DeleteCollaboration) }) m.Group("/branches", func() { m.Get("", repo.SettingsBranches) m.Post("/default_branch", repo.UpdateDefaultBranch) m.Combo("/*").Get(repo.SettingsProtectedBranch). Post(bindIgnErr(form.ProtectBranch{}), repo.SettingsProtectedBranchPost) }, func(c *context.Context) { if c.Repo.Repository.IsMirror { c.NotFound() return } }) m.Group("/hooks", func() { webhookRoutes() m.Group("/:id", func() { m.Post("/test", repo.TestWebhook) m.Post("/redelivery", repo.RedeliveryWebhook) }) m.Group("/git", func() { m.Get("", repo.SettingsGitHooks) m.Combo("/:name").Get(repo.SettingsGitHooksEdit). Post(repo.SettingsGitHooksEditPost) }, context.GitHookService()) }) m.Group("/keys", func() { m.Combo("").Get(repo.SettingsDeployKeys). Post(bindIgnErr(form.AddSSHKey{}), repo.SettingsDeployKeysPost) m.Post("/delete", repo.DeleteDeployKey) }) }, func(c *context.Context) { c.Data["PageIsSettings"] = true }) }, reqSignIn, context.RepoAssignment(), reqRepoAdmin, context.RepoRef()) m.Post("/:username/:reponame/action/:action", reqSignIn, context.RepoAssignment(), repo.Action) m.Group("/:username/:reponame", func() { m.Get("/issues", repo.RetrieveLabels, repo.Issues) m.Get("/issues/:index", repo.ViewIssue) m.Get("/labels/", repo.RetrieveLabels, repo.Labels) m.Get("/milestones", repo.Milestones) }, ignSignIn, context.RepoAssignment(true)) m.Group("/:username/:reponame", func() { // FIXME: should use different URLs but mostly same logic for comments of issue and pull reuqest. // So they can apply their own enable/disable logic on routers. m.Group("/issues", func() { m.Combo("/new", repo.MustEnableIssues).Get(context.RepoRef(), repo.NewIssue). Post(bindIgnErr(form.NewIssue{}), repo.NewIssuePost) m.Group("/:index", func() { m.Post("/title", repo.UpdateIssueTitle) m.Post("/content", repo.UpdateIssueContent) m.Combo("/comments").Post(bindIgnErr(form.CreateComment{}), repo.NewComment) }) }) m.Group("/comments/:id", func() { m.Post("", repo.UpdateCommentContent) m.Post("/delete", repo.DeleteComment) }) }, reqSignIn, context.RepoAssignment(true)) m.Group("/:username/:reponame", func() { m.Group("/wiki", func() { m.Get("/?:page", repo.Wiki) m.Get("/_pages", repo.WikiPages) }, repo.MustEnableWiki, context.RepoRef()) }, ignSignIn, context.RepoAssignment(false, true)) m.Group("/:username/:reponame", func() { // FIXME: should use different URLs but mostly same logic for comments of issue and pull reuqest. // So they can apply their own enable/disable logic on routers. m.Group("/issues", func() { m.Group("/:index", func() { m.Post("/label", repo.UpdateIssueLabel) m.Post("/milestone", repo.UpdateIssueMilestone) m.Post("/assignee", repo.UpdateIssueAssignee) }, reqRepoWriter) }) m.Group("/labels", func() { m.Post("/new", bindIgnErr(form.CreateLabel{}), repo.NewLabel) m.Post("/edit", bindIgnErr(form.CreateLabel{}), repo.UpdateLabel) m.Post("/delete", repo.DeleteLabel) m.Post("/initialize", bindIgnErr(form.InitializeLabels{}), repo.InitializeLabels) }, reqRepoWriter, context.RepoRef()) m.Group("/milestones", func() { m.Combo("/new").Get(repo.NewMilestone). Post(bindIgnErr(form.CreateMilestone{}), repo.NewMilestonePost) m.Get("/:id/edit", repo.EditMilestone) m.Post("/:id/edit", bindIgnErr(form.CreateMilestone{}), repo.EditMilestonePost) m.Get("/:id/:action", repo.ChangeMilestonStatus) m.Post("/delete", repo.DeleteMilestone) }, reqRepoWriter, context.RepoRef()) m.Group("/releases", func() { m.Get("/new", repo.NewRelease) m.Post("/new", bindIgnErr(form.NewRelease{}), repo.NewReleasePost) m.Post("/delete", repo.DeleteRelease) m.Get("/edit/*", repo.EditRelease) m.Post("/edit/*", bindIgnErr(form.EditRelease{}), repo.EditReleasePost) }, repo.MustBeNotBare, reqRepoWriter, func(c *context.Context) { c.Data["PageIsViewFiles"] = true }) // FIXME: Should use c.Repo.PullRequest to unify template, currently we have inconsistent URL // for PR in same repository. After select branch on the page, the URL contains redundant head user name. // e.g. /org1/test-repo/compare/master...org1:develop // which should be /org1/test-repo/compare/master...develop m.Combo("/compare/*", repo.MustAllowPulls).Get(repo.CompareAndPullRequest). Post(bindIgnErr(form.NewIssue{}), repo.CompareAndPullRequestPost) m.Group("", func() { m.Combo("/_edit/*").Get(repo.EditFile). Post(bindIgnErr(form.EditRepoFile{}), repo.EditFilePost) m.Combo("/_new/*").Get(repo.NewFile). Post(bindIgnErr(form.EditRepoFile{}), repo.NewFilePost) m.Post("/_preview/*", bindIgnErr(form.EditPreviewDiff{}), repo.DiffPreviewPost) m.Combo("/_delete/*").Get(repo.DeleteFile). Post(bindIgnErr(form.DeleteRepoFile{}), repo.DeleteFilePost) m.Group("", func() { m.Combo("/_upload/*").Get(repo.UploadFile). Post(bindIgnErr(form.UploadRepoFile{}), repo.UploadFilePost) m.Post("/upload-file", repo.UploadFileToServer) m.Post("/upload-remove", bindIgnErr(form.RemoveUploadFile{}), repo.RemoveUploadFileFromServer) }, func(c *context.Context) { if !conf.Repository.Upload.Enabled { c.NotFound() return } }) }, repo.MustBeNotBare, reqRepoWriter, context.RepoRef(), func(c *context.Context) { if !c.Repo.CanEnableEditor() { c.NotFound() return } c.Data["PageIsViewFiles"] = true }) }, reqSignIn, context.RepoAssignment()) m.Group("/:username/:reponame", func() { m.Group("", func() { m.Get("/releases", repo.MustBeNotBare, repo.Releases) m.Get("/pulls", repo.RetrieveLabels, repo.Pulls) m.Get("/pulls/:index", repo.ViewPull) }, context.RepoRef()) m.Group("/branches", func() { m.Get("", repo.Branches) m.Get("/all", repo.AllBranches) m.Post("/delete/*", reqSignIn, reqRepoWriter, repo.DeleteBranchPost) }, repo.MustBeNotBare, func(c *context.Context) { c.Data["PageIsViewFiles"] = true }) m.Group("/wiki", func() { m.Group("", func() { m.Combo("/_new").Get(repo.NewWiki). Post(bindIgnErr(form.NewWiki{}), repo.NewWikiPost) m.Combo("/:page/_edit").Get(repo.EditWiki). Post(bindIgnErr(form.NewWiki{}), repo.EditWikiPost) m.Post("/:page/delete", repo.DeleteWikiPagePost) }, reqSignIn, reqRepoWriter) }, repo.MustEnableWiki, context.RepoRef()) m.Get("/archive/*", repo.MustBeNotBare, repo.Download) m.Group("/pulls/:index", func() { m.Get("/commits", context.RepoRef(), repo.ViewPullCommits) m.Get("/files", context.RepoRef(), repo.ViewPullFiles) m.Post("/merge", reqRepoWriter, repo.MergePullRequest) }, repo.MustAllowPulls) m.Group("", func() { m.Get("/src/*", repo.Home) m.Get("/raw/*", repo.SingleDownload) m.Get("/commits/*", repo.RefCommits) m.Get("/commit/:sha([a-f0-9]{7,40})$", repo.Diff) m.Get("/forks", repo.Forks) }, repo.MustBeNotBare, context.RepoRef()) m.Get("/commit/:sha([a-f0-9]{7,40})\\.:ext(patch|diff)", repo.MustBeNotBare, repo.RawDiff) m.Get("/compare/:before([a-z0-9]{40})\\.\\.\\.:after([a-z0-9]{40})", repo.MustBeNotBare, context.RepoRef(), repo.CompareDiff) }, ignSignIn, context.RepoAssignment()) m.Group("/:username/:reponame", func() { m.Get("", repo.Home) m.Get("/stars", repo.Stars) m.Get("/watchers", repo.Watchers) }, context.ServeGoGet(), ignSignIn, context.RepoAssignment(), context.RepoRef()) // ***** END: Repository ***** // ********************** // ----- API routes ----- // ********************** // TODO: Without session and CSRF m.Group("/api", func() { apiv1.RegisterRoutes(m) }, ignSignIn) }, session.Sessioner(session.Options{ Provider: conf.Session.Provider, ProviderConfig: conf.Session.ProviderConfig, CookieName: conf.Session.CookieName, CookiePath: conf.Server.Subpath, Gclifetime: conf.Session.GCInterval, Maxlifetime: conf.Session.MaxLifeTime, Secure: conf.Session.CookieSecure, }), csrf.Csrfer(csrf.Options{ Secret: conf.Security.SecretKey, Header: "X-CSRF-Token", Cookie: conf.Session.CSRFCookieName, CookieDomain: conf.Server.URL.Hostname(), CookiePath: conf.Server.Subpath, CookieHttpOnly: true, SetCookie: true, Secure: conf.Server.URL.Scheme == "https", }), context.Contexter(context.NewStore()), ) // *************************** // ----- HTTP Git routes ----- // *************************** m.Group("/:username/:reponame", func() { m.Get("/tasks/trigger", repo.TriggerTask) m.Group("/info/lfs", func() { lfs.RegisterRoutes(m.Router) }) m.Route("/*", "GET,POST,OPTIONS", context.ServeGoGet(), repo.HTTPContexter(repo.NewStore()), repo.HTTP) }) // *************************** // ----- Internal routes ----- // *************************** m.Group("/-", func() { m.Get("/metrics", app.MetricsFilter(), promhttp.Handler()) // "/-/metrics" m.Group("/api", func() { m.Post("/sanitize_ipynb", app.SanitizeIpynb()) // "/-/api/sanitize_ipynb" }) }) // ********************** // ----- robots.txt ----- // ********************** m.Get("/robots.txt", func(w http.ResponseWriter, r *http.Request) { if conf.HasRobotsTxt { http.ServeFile(w, r, filepath.Join(conf.CustomDir(), "robots.txt")) } else { w.WriteHeader(http.StatusNotFound) } }) m.NotFound(route.NotFound) // Flag for port number in case first time run conflict. if c.IsSet("port") { conf.Server.URL.Host = strings.Replace(conf.Server.URL.Host, ":"+conf.Server.URL.Port(), ":"+c.String("port"), 1) conf.Server.ExternalURL = conf.Server.URL.String() conf.Server.HTTPPort = c.String("port") } var listenAddr string if conf.Server.Protocol == "unix" { listenAddr = conf.Server.HTTPAddr } else { listenAddr = fmt.Sprintf("%s:%s", conf.Server.HTTPAddr, conf.Server.HTTPPort) } log.Info("Available on %s", conf.Server.ExternalURL) switch conf.Server.Protocol { case "http": err = http.ListenAndServe(listenAddr, m) case "https": tlsMinVersion := tls.VersionTLS12 switch conf.Server.TLSMinVersion { case "TLS13": tlsMinVersion = tls.VersionTLS13 case "TLS12": tlsMinVersion = tls.VersionTLS12 case "TLS11": tlsMinVersion = tls.VersionTLS11 case "TLS10": tlsMinVersion = tls.VersionTLS10 } server := &http.Server{ Addr: listenAddr, TLSConfig: &tls.Config{ MinVersion: uint16(tlsMinVersion), CurvePreferences: []tls.CurveID{tls.X25519, tls.CurveP256, tls.CurveP384, tls.CurveP521}, PreferServerCipherSuites: true, CipherSuites: []uint16{ tls.TLS_ECDHE_ECDSA_WITH_AES_256_GCM_SHA384, tls.TLS_ECDHE_RSA_WITH_AES_256_GCM_SHA384, tls.TLS_ECDHE_ECDSA_WITH_AES_128_GCM_SHA256, tls.TLS_ECDHE_RSA_WITH_AES_128_GCM_SHA256, tls.TLS_ECDHE_ECDSA_WITH_CHACHA20_POLY1305, tls.TLS_ECDHE_RSA_WITH_CHACHA20_POLY1305, }, }, Handler: m, } err = server.ListenAndServeTLS(conf.Server.CertFile, conf.Server.KeyFile) case "fcgi": err = fcgi.Serve(nil, m) case "unix": if osutil.IsExist(listenAddr) { err = os.Remove(listenAddr) if err != nil { log.Fatal("Failed to remove existing Unix domain socket: %v", err) } } var listener *net.UnixListener listener, err = net.ListenUnix("unix", &net.UnixAddr{Name: listenAddr, Net: "unix"}) if err != nil { log.Fatal("Failed to listen on Unix networks: %v", err) } // FIXME: add proper implementation of signal capture on all protocols // execute this on SIGTERM or SIGINT: listener.Close() if err = os.Chmod(listenAddr, conf.Server.UnixSocketMode); err != nil { log.Fatal("Failed to change permission of Unix domain socket: %v", err) } err = http.Serve(listener, m) default: log.Fatal("Unexpected server protocol: %s", conf.Server.Protocol) } if err != nil { log.Fatal("Failed to start server: %v", err) } return nil }