2020-09-08 08:45:10 -07:00
|
|
|
// Copyright 2019 The Gitea Authors. All rights reserved.
|
2022-11-27 11:20:29 -07:00
|
|
|
// SPDX-License-Identifier: MIT
|
2020-09-08 08:45:10 -07:00
|
|
|
|
|
|
|
package setting
|
|
|
|
|
|
|
|
import (
|
|
|
|
"encoding/base64"
|
2023-06-13 20:42:38 -07:00
|
|
|
"fmt"
|
2020-09-08 08:45:10 -07:00
|
|
|
"time"
|
|
|
|
|
|
|
|
"code.gitea.io/gitea/modules/generate"
|
|
|
|
)
|
|
|
|
|
|
|
|
// LFS represents the configuration for Git LFS
|
|
|
|
var LFS = struct {
|
|
|
|
StartServer bool `ini:"LFS_START_SERVER"`
|
|
|
|
JWTSecretBase64 string `ini:"LFS_JWT_SECRET"`
|
|
|
|
JWTSecretBytes []byte `ini:"-"`
|
|
|
|
HTTPAuthExpiry time.Duration `ini:"LFS_HTTP_AUTH_EXPIRY"`
|
|
|
|
MaxFileSize int64 `ini:"LFS_MAX_FILE_SIZE"`
|
|
|
|
LocksPagingNum int `ini:"LFS_LOCKS_PAGING_NUM"`
|
|
|
|
|
2023-06-13 20:42:38 -07:00
|
|
|
Storage *Storage
|
2020-09-29 02:05:13 -07:00
|
|
|
}{}
|
2020-09-08 08:45:10 -07:00
|
|
|
|
2023-06-13 20:42:38 -07:00
|
|
|
func loadLFSFrom(rootCfg ConfigProvider) error {
|
2023-02-19 09:12:01 -07:00
|
|
|
sec := rootCfg.Section("server")
|
2020-09-08 08:45:10 -07:00
|
|
|
if err := sec.MapTo(&LFS); err != nil {
|
2023-06-13 20:42:38 -07:00
|
|
|
return fmt.Errorf("failed to map LFS settings: %v", err)
|
2020-09-08 08:45:10 -07:00
|
|
|
}
|
|
|
|
|
2023-06-13 20:42:38 -07:00
|
|
|
lfsSec, _ := rootCfg.GetSection("lfs")
|
2020-09-29 02:05:13 -07:00
|
|
|
|
2020-10-12 20:58:34 -07:00
|
|
|
// Specifically default PATH to LFS_CONTENT_PATH
|
2023-02-20 15:18:26 -07:00
|
|
|
// DEPRECATED should not be removed because users maybe upgrade from lower version to the latest version
|
|
|
|
// if these are removed, the warning will not be shown
|
2023-07-25 20:53:37 -07:00
|
|
|
deprecatedSetting(rootCfg, "server", "LFS_CONTENT_PATH", "lfs", "PATH", "v1.19.0")
|
|
|
|
|
|
|
|
if val := sec.Key("LFS_CONTENT_PATH").String(); val != "" {
|
|
|
|
if lfsSec == nil {
|
|
|
|
lfsSec = rootCfg.Section("lfs")
|
|
|
|
}
|
|
|
|
lfsSec.Key("PATH").MustString(val)
|
|
|
|
}
|
2020-09-29 02:05:13 -07:00
|
|
|
|
2023-06-13 20:42:38 -07:00
|
|
|
var err error
|
|
|
|
LFS.Storage, err = getStorage(rootCfg, "lfs", "", lfsSec)
|
|
|
|
if err != nil {
|
|
|
|
return err
|
|
|
|
}
|
2020-09-29 02:05:13 -07:00
|
|
|
|
2020-10-12 20:58:34 -07:00
|
|
|
// Rest of LFS service settings
|
2020-09-08 08:45:10 -07:00
|
|
|
if LFS.LocksPagingNum == 0 {
|
|
|
|
LFS.LocksPagingNum = 50
|
|
|
|
}
|
|
|
|
|
2023-05-10 07:23:47 -07:00
|
|
|
LFS.HTTPAuthExpiry = sec.Key("LFS_HTTP_AUTH_EXPIRY").MustDuration(24 * time.Hour)
|
2020-09-08 08:45:10 -07:00
|
|
|
|
2023-06-13 20:42:38 -07:00
|
|
|
if !LFS.StartServer {
|
|
|
|
return nil
|
|
|
|
}
|
|
|
|
|
2023-07-24 22:06:31 -07:00
|
|
|
LFS.JWTSecretBase64 = loadSecret(rootCfg.Section("server"), "LFS_JWT_SECRET_URI", "LFS_JWT_SECRET")
|
2023-06-22 17:16:12 -07:00
|
|
|
|
2023-06-13 20:42:38 -07:00
|
|
|
LFS.JWTSecretBytes = make([]byte, 32)
|
|
|
|
n, err := base64.RawURLEncoding.Decode(LFS.JWTSecretBytes, []byte(LFS.JWTSecretBase64))
|
|
|
|
|
2023-07-24 21:03:41 -07:00
|
|
|
if (err != nil || n != 32) && InstallLock {
|
2023-06-13 20:42:38 -07:00
|
|
|
LFS.JWTSecretBase64, err = generate.NewJwtSecretBase64()
|
|
|
|
if err != nil {
|
2023-06-20 19:31:40 -07:00
|
|
|
return fmt.Errorf("error generating JWT Secret for custom config: %v", err)
|
2023-06-13 20:42:38 -07:00
|
|
|
}
|
|
|
|
|
|
|
|
// Save secret
|
2023-06-20 19:31:40 -07:00
|
|
|
saveCfg, err := rootCfg.PrepareSaving()
|
|
|
|
if err != nil {
|
|
|
|
return fmt.Errorf("error saving JWT Secret for custom config: %v", err)
|
|
|
|
}
|
|
|
|
rootCfg.Section("server").Key("LFS_JWT_SECRET").SetValue(LFS.JWTSecretBase64)
|
|
|
|
saveCfg.Section("server").Key("LFS_JWT_SECRET").SetValue(LFS.JWTSecretBase64)
|
|
|
|
if err := saveCfg.Save(); err != nil {
|
|
|
|
return fmt.Errorf("error saving JWT Secret for custom config: %v", err)
|
2020-09-08 08:45:10 -07:00
|
|
|
}
|
|
|
|
}
|
2023-06-13 20:42:38 -07:00
|
|
|
|
|
|
|
return nil
|
2020-09-08 08:45:10 -07:00
|
|
|
}
|