// Copyright 2018 Project Harbor Authors // // Licensed under the Apache License, Version 2.0 (the "License"); // you may not use this file except in compliance with the License. // You may obtain a copy of the License at // // http://www.apache.org/licenses/LICENSE-2.0 // // Unless required by applicable law or agreed to in writing, software // distributed under the License is distributed on an "AS IS" BASIS, // WITHOUT WARRANTIES OR CONDITIONS OF ANY KIND, either express or implied. // See the License for the specific language governing permissions and // limitations under the License. package main import ( "context" "encoding/gob" "fmt" "net/url" "os" "os/signal" "strconv" "strings" "syscall" "time" "github.com/astaxie/beego" _ "github.com/astaxie/beego/session/redis" _ "github.com/astaxie/beego/session/redis_sentinel" "github.com/goharbor/harbor/src/common/dao" common_http "github.com/goharbor/harbor/src/common/http" "github.com/goharbor/harbor/src/common/models" configCtl "github.com/goharbor/harbor/src/controller/config" _ "github.com/goharbor/harbor/src/controller/event/handler" "github.com/goharbor/harbor/src/controller/health" "github.com/goharbor/harbor/src/controller/registry" "github.com/goharbor/harbor/src/core/api" _ "github.com/goharbor/harbor/src/core/auth/authproxy" _ "github.com/goharbor/harbor/src/core/auth/db" _ "github.com/goharbor/harbor/src/core/auth/ldap" _ "github.com/goharbor/harbor/src/core/auth/oidc" _ "github.com/goharbor/harbor/src/core/auth/uaa" "github.com/goharbor/harbor/src/core/middlewares" "github.com/goharbor/harbor/src/core/service/token" "github.com/goharbor/harbor/src/lib/cache" _ "github.com/goharbor/harbor/src/lib/cache/memory" // memory cache _ "github.com/goharbor/harbor/src/lib/cache/redis" // redis cache "github.com/goharbor/harbor/src/lib/config" "github.com/goharbor/harbor/src/lib/log" "github.com/goharbor/harbor/src/lib/metric" "github.com/goharbor/harbor/src/lib/orm" tracelib "github.com/goharbor/harbor/src/lib/trace" "github.com/goharbor/harbor/src/migration" _ "github.com/goharbor/harbor/src/pkg/config/inmemory" "github.com/goharbor/harbor/src/pkg/notification" _ "github.com/goharbor/harbor/src/pkg/notifier/topic" "github.com/goharbor/harbor/src/pkg/oidc" "github.com/goharbor/harbor/src/pkg/scan" "github.com/goharbor/harbor/src/pkg/scan/dao/scanner" pkguser "github.com/goharbor/harbor/src/pkg/user" "github.com/goharbor/harbor/src/pkg/version" "github.com/goharbor/harbor/src/server" ) const ( adminUserID = 1 ) func updateInitPassword(ctx context.Context, userID int, password string) error { userMgr := pkguser.Mgr user, err := userMgr.Get(ctx, userID) if err != nil { return fmt.Errorf("failed to get user, userID: %d %v", userID, err) } if user.Salt == "" { err = userMgr.UpdatePassword(ctx, userID, password) if err != nil { return fmt.Errorf("failed to update user encrypted password, userID: %d, err: %v", userID, err) } log.Infof("User id: %d updated its encrypted password successfully.", userID) } else { log.Infof("User id: %d already has its encrypted password.", userID) } return nil } func gracefulShutdown(closing, done chan struct{}, shutdowns ...func()) { signals := make(chan os.Signal, 1) signal.Notify(signals, syscall.SIGINT, syscall.SIGTERM, syscall.SIGQUIT) log.Infof("capture system signal %s, to close \"closing\" channel", <-signals) close(closing) shutdownChan := make(chan struct{}, 1) go func() { for _, s := range shutdowns { s() } <-done log.Infof("Goroutines exited normally") shutdownChan <- struct{}{} }() select { case <-shutdownChan: log.Infof("all shutdown jobs done") case <-time.After(time.Second * 3): log.Infof("Timeout waiting goroutines to exit") } os.Exit(0) } func main() { beego.BConfig.WebConfig.Session.SessionOn = true beego.BConfig.WebConfig.Session.SessionName = config.SessionCookieName redisURL := os.Getenv("_REDIS_URL_CORE") if len(redisURL) > 0 { u, err := url.Parse(redisURL) if err != nil { panic("bad _REDIS_URL:" + redisURL) } gob.Register(models.User{}) if u.Scheme == "redis+sentinel" { ps := strings.Split(u.Path, "/") if len(ps) < 2 { panic("bad redis sentinel url: no master name") } ss := make([]string, 5) ss[0] = strings.Join(strings.Split(u.Host, ","), ";") // host ss[1] = "100" // pool if u.User != nil { password, isSet := u.User.Password() if isSet { ss[2] = password } } if len(ps) > 2 { db, err := strconv.Atoi(ps[2]) if err != nil { panic("bad redis sentinel url: bad db") } if db != 0 { ss[3] = ps[2] } } ss[4] = ps[1] // monitor name beego.BConfig.WebConfig.Session.SessionProvider = "redis_sentinel" beego.BConfig.WebConfig.Session.SessionProviderConfig = strings.Join(ss, ",") } else { ss := make([]string, 5) ss[0] = u.Host // host ss[1] = "100" // pool if u.User != nil { password, isSet := u.User.Password() if isSet { ss[2] = password } } if len(u.Path) > 1 { if _, err := strconv.Atoi(u.Path[1:]); err != nil { panic("bad redis url: bad db") } ss[3] = u.Path[1:] } ss[4] = u.Query().Get("idle_timeout_seconds") beego.BConfig.WebConfig.Session.SessionProvider = "redis" beego.BConfig.WebConfig.Session.SessionProviderConfig = strings.Join(ss, ",") } log.Info("initializing cache ...") if err := cache.Initialize(u.Scheme, redisURL); err != nil { log.Fatalf("failed to initialize cache: %v", err) } } beego.AddTemplateExt("htm") log.Info("initializing configurations...") config.Init() log.Info("configurations initialization completed") metricCfg := config.Metric() if metricCfg.Enabled { metric.RegisterCollectors() go metric.ServeProm(metricCfg.Path, metricCfg.Port) } ctx := context.Background() config.InitTraceConfig(ctx) shutdownTracerProvider := tracelib.InitGlobalTracer(ctx) token.InitCreators() database, err := config.Database() if err != nil { log.Fatalf("failed to get database configuration: %v", err) } if err := dao.InitDatabase(database); err != nil { log.Fatalf("failed to initialize database: %v", err) } if err = migration.Migrate(database); err != nil { log.Fatalf("failed to migrate: %v", err) } ctx = orm.Clone(ctx) if err := config.Load(ctx); err != nil { log.Fatalf("failed to load config: %v", err) } if err := configCtl.Ctl.OverwriteConfig(ctx); err != nil { log.Fatalf("failed to init config from CONFIG_OVERWRITE_JSON, error %v", err) } password, err := config.InitialAdminPassword() if err != nil { log.Fatalf("failed to get admin's initial password: %v", err) } if err := updateInitPassword(ctx, adminUserID, password); err != nil { log.Error(err) } // Init API handler if err := api.Init(); err != nil { log.Fatalf("Failed to initialize API handlers with error: %s", err.Error()) } health.RegisterHealthCheckers() registerScanners(orm.Context()) closing := make(chan struct{}) done := make(chan struct{}) go gracefulShutdown(closing, done, shutdownTracerProvider) // Start health checker for registries go registry.Ctl.StartRegularHealthCheck(orm.Context(), closing, done) log.Info("initializing notification...") notification.Init() server.RegisterRoutes() if common_http.InternalTLSEnabled() { log.Info("internal TLS enabled, Init TLS ...") iTLSKeyPath := os.Getenv("INTERNAL_TLS_KEY_PATH") iTLSCertPath := os.Getenv("INTERNAL_TLS_CERT_PATH") log.Infof("load client key: %s client cert: %s", iTLSKeyPath, iTLSCertPath) beego.BConfig.Listen.EnableHTTP = false beego.BConfig.Listen.EnableHTTPS = true beego.BConfig.Listen.HTTPSPort = 8443 beego.BConfig.Listen.HTTPSKeyFile = iTLSKeyPath beego.BConfig.Listen.HTTPSCertFile = iTLSCertPath beego.BeeApp.Server.TLSConfig = common_http.NewServerTLSConfig() } log.Infof("Version: %s, Git commit: %s", version.ReleaseVersion, version.GitCommit) log.Info("Fix empty subiss for meta info data.") oidc.FixEmptySubIss(orm.Context()) beego.RunWithMiddleWares("", middlewares.MiddleWares()...) } const ( trivyScanner = "Trivy" ) func registerScanners(ctx context.Context) { wantedScanners := make([]scanner.Registration, 0) uninstallScannerNames := make([]string, 0) if config.WithTrivy() { log.Info("Registering Trivy scanner") wantedScanners = append(wantedScanners, scanner.Registration{ Name: trivyScanner, Description: "The Trivy scanner adapter", URL: config.TrivyAdapterURL(), UseInternalAddr: true, Immutable: true, }) } else { log.Info("Removing Trivy scanner") uninstallScannerNames = append(uninstallScannerNames, trivyScanner) } if err := scan.RemoveImmutableScanners(ctx, uninstallScannerNames); err != nil { log.Warningf("failed to remove scanners: %v", err) } if err := scan.EnsureScanners(ctx, wantedScanners); err != nil { log.Fatalf("failed to register scanners: %v", err) } if defaultScannerName := getDefaultScannerName(); defaultScannerName != "" { log.Infof("Setting %s as default scanner", defaultScannerName) if err := scan.EnsureDefaultScanner(ctx, defaultScannerName); err != nil { log.Fatalf("failed to set default scanner: %v", err) } } } func getDefaultScannerName() string { if config.WithTrivy() { return trivyScanner } return "" }