2020-09-08 18:45:10 +03:00
// Copyright 2019 The Gitea Authors. All rights reserved.
2022-11-27 21:20:29 +03:00
// SPDX-License-Identifier: MIT
2020-09-08 18:45:10 +03:00
package setting
import (
"encoding/base64"
2023-06-14 06:42:38 +03:00
"fmt"
2020-09-08 18:45:10 +03:00
"time"
"code.gitea.io/gitea/modules/generate"
)
// LFS represents the configuration for Git LFS
var LFS = struct {
StartServer bool ` ini:"LFS_START_SERVER" `
JWTSecretBase64 string ` ini:"LFS_JWT_SECRET" `
JWTSecretBytes [ ] byte ` ini:"-" `
HTTPAuthExpiry time . Duration ` ini:"LFS_HTTP_AUTH_EXPIRY" `
MaxFileSize int64 ` ini:"LFS_MAX_FILE_SIZE" `
LocksPagingNum int ` ini:"LFS_LOCKS_PAGING_NUM" `
2023-06-14 06:42:38 +03:00
Storage * Storage
2020-09-29 12:05:13 +03:00
} { }
2020-09-08 18:45:10 +03:00
2023-06-14 06:42:38 +03:00
func loadLFSFrom ( rootCfg ConfigProvider ) error {
2023-02-19 19:12:01 +03:00
sec := rootCfg . Section ( "server" )
2020-09-08 18:45:10 +03:00
if err := sec . MapTo ( & LFS ) ; err != nil {
2023-06-14 06:42:38 +03:00
return fmt . Errorf ( "failed to map LFS settings: %v" , err )
2020-09-08 18:45:10 +03:00
}
2023-06-14 06:42:38 +03:00
lfsSec , _ := rootCfg . GetSection ( "lfs" )
2020-09-29 12:05:13 +03:00
2020-10-13 06:58:34 +03:00
// Specifically default PATH to LFS_CONTENT_PATH
2023-02-21 01:18:26 +03:00
// DEPRECATED should not be removed because users maybe upgrade from lower version to the latest version
// if these are removed, the warning will not be shown
2023-06-14 06:42:38 +03:00
deprecatedSettingFatal ( rootCfg , "server" , "LFS_CONTENT_PATH" , "lfs" , "PATH" , "v1.19.0" )
2020-09-29 12:05:13 +03:00
2023-06-14 06:42:38 +03:00
var err error
LFS . Storage , err = getStorage ( rootCfg , "lfs" , "" , lfsSec )
if err != nil {
return err
}
2020-09-29 12:05:13 +03:00
2020-10-13 06:58:34 +03:00
// Rest of LFS service settings
2020-09-08 18:45:10 +03:00
if LFS . LocksPagingNum == 0 {
LFS . LocksPagingNum = 50
}
2023-05-10 17:23:47 +03:00
LFS . HTTPAuthExpiry = sec . Key ( "LFS_HTTP_AUTH_EXPIRY" ) . MustDuration ( 24 * time . Hour )
2020-09-08 18:45:10 +03:00
2023-06-14 06:42:38 +03:00
if ! LFS . StartServer {
return nil
}
2023-07-25 08:06:31 +03:00
LFS . JWTSecretBase64 = loadSecret ( rootCfg . Section ( "server" ) , "LFS_JWT_SECRET_URI" , "LFS_JWT_SECRET" )
2023-06-23 03:16:12 +03:00
2023-06-14 06:42:38 +03:00
LFS . JWTSecretBytes = make ( [ ] byte , 32 )
n , err := base64 . RawURLEncoding . Decode ( LFS . JWTSecretBytes , [ ] byte ( LFS . JWTSecretBase64 ) )
2023-07-25 07:03:41 +03:00
if ( err != nil || n != 32 ) && InstallLock {
2023-06-14 06:42:38 +03:00
LFS . JWTSecretBase64 , err = generate . NewJwtSecretBase64 ( )
if err != nil {
2023-06-21 05:31:40 +03:00
return fmt . Errorf ( "error generating JWT Secret for custom config: %v" , err )
2023-06-14 06:42:38 +03:00
}
// Save secret
2023-06-21 05:31:40 +03:00
saveCfg , err := rootCfg . PrepareSaving ( )
if err != nil {
return fmt . Errorf ( "error saving JWT Secret for custom config: %v" , err )
}
rootCfg . Section ( "server" ) . Key ( "LFS_JWT_SECRET" ) . SetValue ( LFS . JWTSecretBase64 )
saveCfg . Section ( "server" ) . Key ( "LFS_JWT_SECRET" ) . SetValue ( LFS . JWTSecretBase64 )
if err := saveCfg . Save ( ) ; err != nil {
return fmt . Errorf ( "error saving JWT Secret for custom config: %v" , err )
2020-09-08 18:45:10 +03:00
}
}
2023-06-14 06:42:38 +03:00
return nil
2020-09-08 18:45:10 +03:00
}