| | |
| | | import java.io.File;
|
| | | import java.io.FileWriter;
|
| | | import java.io.IOException;
|
| | | import java.io.InputStream;
|
| | | import java.io.InputStreamReader;
|
| | | import java.io.OutputStream;
|
| | | import java.net.InetAddress;
|
| | |
| | | import java.util.ArrayList;
|
| | | import java.util.Date;
|
| | | import java.util.List;
|
| | | import java.util.Properties;
|
| | | import java.util.Scanner;
|
| | |
|
| | | import org.apache.log4j.PropertyConfigurator;
|
| | | import org.eclipse.jetty.ajp.Ajp13SocketConnector;
|
| | | import org.eclipse.jetty.security.ConstraintMapping;
|
| | | import org.eclipse.jetty.security.ConstraintSecurityHandler;
|
| | | import org.eclipse.jetty.server.Connector;
|
| | | import org.eclipse.jetty.server.Server;
|
| | | import org.eclipse.jetty.server.bio.SocketConnector;
|
| | |
| | | import org.eclipse.jetty.server.ssl.SslConnector;
|
| | | import org.eclipse.jetty.server.ssl.SslSelectChannelConnector;
|
| | | import org.eclipse.jetty.server.ssl.SslSocketConnector;
|
| | | import org.eclipse.jetty.util.security.Constraint;
|
| | | import org.eclipse.jetty.util.thread.QueuedThreadPool;
|
| | | import org.eclipse.jetty.webapp.WebAppContext;
|
| | | import org.eclipse.jgit.storage.file.FileBasedConfig;
|
| | |
| | | import com.beust.jcommander.Parameters;
|
| | | import com.gitblit.authority.GitblitAuthority;
|
| | | import com.gitblit.authority.NewCertificateConfig;
|
| | | import com.gitblit.servlet.GitblitContext;
|
| | | import com.gitblit.utils.StringUtils;
|
| | | import com.gitblit.utils.TimeUtils;
|
| | | import com.gitblit.utils.X509Utils;
|
| | |
| | | * simplify command line parameter processing. This class also automatically
|
| | | * generates a self-signed certificate for localhost, if the keystore does not
|
| | | * already exist.
|
| | | * |
| | | *
|
| | | * @author James Moger
|
| | | * |
| | | *
|
| | | */
|
| | | public class GitBlitServer {
|
| | |
|
| | |
| | |
|
| | | public static void main(String... args) {
|
| | | GitBlitServer server = new GitBlitServer();
|
| | | |
| | |
|
| | | // filter out the baseFolder parameter
|
| | | List<String> filtered = new ArrayList<String>();
|
| | | String folder = "data";
|
| | |
| | | if (i + 1 == args.length) {
|
| | | System.out.println("Invalid --baseFolder parameter!");
|
| | | System.exit(-1);
|
| | | } else if (args[i + 1] != ".") {
|
| | | } else if (!".".equals(args[i + 1])) {
|
| | | folder = args[i + 1];
|
| | | }
|
| | | i = i + 1;
|
| | |
| | | filtered.add(arg);
|
| | | }
|
| | | }
|
| | | |
| | |
|
| | | Params.baseFolder = folder;
|
| | | Params params = new Params();
|
| | | JCommander jc = new JCommander(params);
|
| | |
| | |
|
| | | /**
|
| | | * Display the command line usage of Gitblit GO.
|
| | | * |
| | | *
|
| | | * @param jc
|
| | | * @param t
|
| | | */
|
| | |
| | | FileSettings settings = params.FILESETTINGS;
|
| | | if (!StringUtils.isEmpty(params.settingsfile)) {
|
| | | if (new File(params.settingsfile).exists()) {
|
| | | settings = new FileSettings(params.settingsfile); |
| | | settings = new FileSettings(params.settingsfile);
|
| | | }
|
| | | }
|
| | |
|
| | | if (params.dailyLogFile) {
|
| | | // Configure log4j for daily log file generation
|
| | | InputStream is = null;
|
| | | try {
|
| | | is = getClass().getResourceAsStream("/log4j.properties");
|
| | | Properties loggingProperties = new Properties();
|
| | | loggingProperties.load(is);
|
| | |
|
| | | loggingProperties.put("log4j.appender.R.File", new File(baseFolder, "logs/gitblit.log").getAbsolutePath());
|
| | | loggingProperties.put("log4j.rootCategory", "INFO, R");
|
| | |
|
| | | if (settings.getBoolean(Keys.web.debugMode, false)) {
|
| | | loggingProperties.put("log4j.logger.com.gitblit", "DEBUG");
|
| | | }
|
| | |
|
| | | PropertyConfigurator.configure(loggingProperties);
|
| | | } catch (Exception e) {
|
| | | e.printStackTrace();
|
| | | } finally {
|
| | | try {
|
| | | is.close();
|
| | | } catch (IOException e) {
|
| | | e.printStackTrace();
|
| | | }
|
| | | }
|
| | | }
|
| | |
|
| | | logger = LoggerFactory.getLogger(GitBlitServer.class);
|
| | | logger.info(Constants.BORDER);
|
| | | logger.info(" _____ _ _ _ _ _ _");
|
| | |
| | | String osname = System.getProperty("os.name");
|
| | | String osversion = System.getProperty("os.version");
|
| | | logger.info("Running on " + osname + " (" + osversion + ")");
|
| | | |
| | |
|
| | | List<Connector> connectors = new ArrayList<Connector>();
|
| | |
|
| | | // conditionally configure the http connector
|
| | | if (params.port > 0) {
|
| | | Connector httpConnector = createConnector(params.useNIO, params.port);
|
| | | Connector httpConnector = createConnector(params.useNIO, params.port, settings.getInteger(Keys.server.threadPoolSize, 50));
|
| | | String bindInterface = settings.getString(Keys.server.httpBindInterface, null);
|
| | | if (!StringUtils.isEmpty(bindInterface)) {
|
| | | logger.warn(MessageFormat.format("Binding connector on port {0,number,0} to {1}",
|
| | |
| | | }
|
| | | if (params.port < 1024 && !isWindows()) {
|
| | | logger.warn("Gitblit needs to run with ROOT permissions for ports < 1024!");
|
| | | }
|
| | | if (params.port > 0 && params.securePort > 0 && settings.getBoolean(Keys.server.redirectToHttpsPort, true)) {
|
| | | // redirect HTTP requests to HTTPS
|
| | | if (httpConnector instanceof SelectChannelConnector) {
|
| | | ((SelectChannelConnector) httpConnector).setConfidentialPort(params.securePort);
|
| | | } else {
|
| | | ((SocketConnector) httpConnector).setConfidentialPort(params.securePort);
|
| | | }
|
| | | }
|
| | | connectors.add(httpConnector);
|
| | | }
|
| | |
| | | NewCertificateConfig certificateConfig = NewCertificateConfig.KEY.parse(config);
|
| | | certificateConfig.update(metadata);
|
| | | }
|
| | | |
| | |
|
| | | metadata.notAfter = new Date(System.currentTimeMillis() + 10*TimeUtils.ONEYEAR);
|
| | | X509Utils.prepareX509Infrastructure(metadata, baseFolder, new X509Log() {
|
| | | @Override
|
| | |
| | | }
|
| | | });
|
| | |
|
| | | if (serverKeyStore.exists()) { |
| | | if (serverKeyStore.exists()) {
|
| | | Connector secureConnector = createSSLConnector(params.alias, serverKeyStore, serverTrustStore, params.storePassword,
|
| | | caRevocationList, params.useNIO, params.securePort, params.requireClientCertificates);
|
| | | caRevocationList, params.useNIO, params.securePort, settings.getInteger(Keys.server.threadPoolSize, 50), params.requireClientCertificates);
|
| | | String bindInterface = settings.getString(Keys.server.httpsBindInterface, null);
|
| | | if (!StringUtils.isEmpty(bindInterface)) {
|
| | | logger.warn(MessageFormat.format(
|
| | |
| | |
|
| | | // tempDir is where the embedded Gitblit web application is expanded and
|
| | | // where Jetty creates any necessary temporary files
|
| | | File tempDir = com.gitblit.utils.FileUtils.resolveParameter(Constants.baseFolder$, baseFolder, params.temp); |
| | | File tempDir = com.gitblit.utils.FileUtils.resolveParameter(Constants.baseFolder$, baseFolder, params.temp);
|
| | | if (tempDir.exists()) {
|
| | | try {
|
| | | FileUtils.delete(tempDir, FileUtils.RECURSIVE | FileUtils.RETRY);
|
| | |
| | | HashSessionManager sessionManager = new HashSessionManager();
|
| | | sessionManager.setHttpOnly(true);
|
| | | // Use secure cookies if only serving https
|
| | | sessionManager.setSecureCookies(params.port <= 0 && params.securePort > 0);
|
| | | sessionManager.setSecureRequestOnly(params.port <= 0 && params.securePort > 0);
|
| | | rootContext.getSessionHandler().setSessionManager(sessionManager);
|
| | |
|
| | | // Ensure there is a defined User Service
|
| | |
| | | settings.overrideSetting(Keys.realm.userService, params.userService);
|
| | | settings.overrideSetting(Keys.git.repositoriesFolder, params.repositoriesFolder);
|
| | | settings.overrideSetting(Keys.git.daemonPort, params.gitPort);
|
| | | |
| | |
|
| | | // Start up an in-memory LDAP server, if configured
|
| | | try {
|
| | | if (StringUtils.isEmpty(params.ldapLdifFile) == false) {
|
| | | if (!StringUtils.isEmpty(params.ldapLdifFile)) {
|
| | | File ldifFile = new File(params.ldapLdifFile);
|
| | | if (ldifFile != null && ldifFile.exists()) {
|
| | | URI ldapUrl = new URI(settings.getRequiredString(Keys.realm.ldap.server));
|
| | |
| | | String rootDN = firstLine.substring(4);
|
| | | String bindUserName = settings.getString(Keys.realm.ldap.username, "");
|
| | | String bindPassword = settings.getString(Keys.realm.ldap.password, "");
|
| | | |
| | |
|
| | | // Get the port
|
| | | int port = ldapUrl.getPort();
|
| | | if (port == -1)
|
| | | port = 389;
|
| | | |
| | |
|
| | | InMemoryDirectoryServerConfig config = new InMemoryDirectoryServerConfig(rootDN);
|
| | | config.addAdditionalBindCredentials(bindUserName, bindPassword);
|
| | | config.setListenerConfigs(InMemoryListenerConfig.createLDAPConfig("default", port));
|
| | | config.setSchema(null);
|
| | | |
| | |
|
| | | InMemoryDirectoryServer ds = new InMemoryDirectoryServer(config);
|
| | | ds.importFromLDIF(true, new LDIFReader(ldifFile));
|
| | | ds.startListening();
|
| | | |
| | |
|
| | | logger.info("LDAP Server started at ldap://localhost:" + port);
|
| | | }
|
| | | }
|
| | |
| | | // Set the server's contexts
|
| | | server.setHandler(rootContext);
|
| | |
|
| | | // Setup the GitBlit context
|
| | | GitBlit gitblit = getGitBlitInstance();
|
| | | gitblit.configureContext(settings, baseFolder, true);
|
| | | // redirect HTTP requests to HTTPS
|
| | | if (params.port > 0 && params.securePort > 0 && settings.getBoolean(Keys.server.redirectToHttpsPort, true)) {
|
| | | logger.info(String.format("Configuring automatic http(%1$s) -> https(%2$s) redirects", params.port, params.securePort));
|
| | | // Create the internal mechanisms to handle secure connections and redirects
|
| | | Constraint constraint = new Constraint();
|
| | | constraint.setDataConstraint(Constraint.DC_CONFIDENTIAL);
|
| | |
|
| | | ConstraintMapping cm = new ConstraintMapping();
|
| | | cm.setConstraint(constraint);
|
| | | cm.setPathSpec("/*");
|
| | |
|
| | | ConstraintSecurityHandler sh = new ConstraintSecurityHandler();
|
| | | sh.setConstraintMappings(new ConstraintMapping[] { cm });
|
| | |
|
| | | // Configure this context to use the Security Handler defined before
|
| | | rootContext.setHandler(sh);
|
| | | }
|
| | |
|
| | | // Setup the Gitblit context
|
| | | GitblitContext gitblit = newGitblit(settings, baseFolder);
|
| | | rootContext.addEventListener(gitblit);
|
| | |
|
| | | try {
|
| | |
| | | System.exit(100);
|
| | | }
|
| | | }
|
| | | |
| | | protected GitBlit getGitBlitInstance() {
|
| | | return GitBlit.self();
|
| | |
|
| | | protected GitblitContext newGitblit(IStoredSettings settings, File baseFolder) {
|
| | | return new GitblitContext(settings, baseFolder);
|
| | | }
|
| | |
|
| | | /**
|
| | | * Creates an http connector.
|
| | | * |
| | | *
|
| | | * @param useNIO
|
| | | * @param port
|
| | | * @param threadPoolSize
|
| | | * @return an http connector
|
| | | */
|
| | | private Connector createConnector(boolean useNIO, int port) {
|
| | | private Connector createConnector(boolean useNIO, int port, int threadPoolSize) {
|
| | | Connector connector;
|
| | | if (useNIO) {
|
| | | logger.info("Setting up NIO SelectChannelConnector on port " + port);
|
| | | SelectChannelConnector nioconn = new SelectChannelConnector();
|
| | | nioconn.setSoLingerTime(-1);
|
| | | nioconn.setThreadPool(new QueuedThreadPool(20));
|
| | | if (threadPoolSize > 0) {
|
| | | nioconn.setThreadPool(new QueuedThreadPool(threadPoolSize));
|
| | | }
|
| | | connector = nioconn;
|
| | | } else {
|
| | | logger.info("Setting up SocketConnector on port " + port);
|
| | | SocketConnector sockconn = new SocketConnector();
|
| | | if (threadPoolSize > 0) {
|
| | | sockconn.setThreadPool(new QueuedThreadPool(threadPoolSize));
|
| | | }
|
| | | connector = sockconn;
|
| | | }
|
| | |
|
| | |
| | |
|
| | | /**
|
| | | * Creates an https connector.
|
| | | * |
| | | *
|
| | | * SSL renegotiation will be enabled if the JVM is 1.6.0_22 or later.
|
| | | * oracle.com/technetwork/java/javase/documentation/tlsreadme2-176330.html
|
| | | * |
| | | *
|
| | | * @param certAlias
|
| | | * @param keyStore
|
| | | * @param clientTrustStore
|
| | |
| | | * @param caRevocationList
|
| | | * @param useNIO
|
| | | * @param port
|
| | | * @param threadPoolSize
|
| | | * @param requireClientCertificates
|
| | | * @return an https connector
|
| | | */
|
| | | private Connector createSSLConnector(String certAlias, File keyStore, File clientTrustStore,
|
| | | String storePassword, File caRevocationList, boolean useNIO, int port, |
| | | String storePassword, File caRevocationList, boolean useNIO, int port, int threadPoolSize,
|
| | | boolean requireClientCertificates) {
|
| | | GitblitSslContextFactory factory = new GitblitSslContextFactory(certAlias,
|
| | | keyStore, clientTrustStore, storePassword, caRevocationList);
|
| | |
| | | } else {
|
| | | factory.setWantClientAuth(true);
|
| | | }
|
| | | ssl.setThreadPool(new QueuedThreadPool(20));
|
| | | if (threadPoolSize > 0) {
|
| | | ssl.setThreadPool(new QueuedThreadPool(threadPoolSize));
|
| | | }
|
| | | connector = ssl;
|
| | | } else {
|
| | | logger.info("Setting up NIO SslSocketConnector on port " + port);
|
| | | SslSocketConnector ssl = new SslSocketConnector(factory);
|
| | | if (threadPoolSize > 0) {
|
| | | ssl.setThreadPool(new QueuedThreadPool(threadPoolSize));
|
| | | }
|
| | | connector = ssl;
|
| | | }
|
| | | connector.setPort(port);
|
| | |
| | |
|
| | | return connector;
|
| | | }
|
| | | |
| | |
|
| | | /**
|
| | | * Creates an ajp connector.
|
| | | * |
| | | *
|
| | | * @param port
|
| | | * @return an ajp connector
|
| | | */
|
| | |
| | |
|
| | | /**
|
| | | * Tests to see if the operating system is Windows.
|
| | | * |
| | | *
|
| | | * @return true if this is a windows machine
|
| | | */
|
| | | private boolean isWindows() {
|
| | |
| | | * The ShutdownMonitorThread opens a socket on a specified port and waits
|
| | | * for an incoming connection. When that connection is accepted a shutdown
|
| | | * message is issued to the running Jetty server.
|
| | | * |
| | | *
|
| | | * @author James Moger
|
| | | * |
| | | *
|
| | | */
|
| | | private static class ShutdownMonitorThread extends Thread {
|
| | |
|
| | |
| | | @Parameter(names = { "--tempFolder" }, description = "Folder for server to extract built-in webapp")
|
| | | public String temp = FILESETTINGS.getString(Keys.server.tempFolder, "temp");
|
| | |
|
| | | @Parameter(names = { "--dailyLogFile" }, description = "Log to a rolling daily log file INSTEAD of stdout.")
|
| | | public Boolean dailyLogFile = false;
|
| | |
|
| | | /*
|
| | | * GIT Servlet Parameters
|
| | | */
|
| | |
| | | */
|
| | | @Parameter(names = { "--settings" }, description = "Path to alternative settings")
|
| | | public String settingsfile;
|
| | | |
| | |
|
| | | @Parameter(names = { "--ldapLdifFile" }, description = "Path to LDIF file. This will cause an in-memory LDAP server to be started according to gitblit settings")
|
| | | public String ldapLdifFile;
|
| | |
|