Refactor startup deprecation messages (#30305)
It doesn't change logic, it only does: 1. Rename the variable and function names 2. Use more consistent format when mentioning config section&key 3. Improve some messages
This commit is contained in:
parent
48223909be
commit
bbe5cd7c92
|
@ -315,21 +315,25 @@ func mustMapSetting(rootCfg ConfigProvider, sectionName string, setting any) {
|
||||||
}
|
}
|
||||||
}
|
}
|
||||||
|
|
||||||
// DeprecatedWarnings contains the warning message for various deprecations, including: setting option, file/folder, etc
|
// StartupProblems contains the messages for various startup problems, including: setting option, file/folder, etc
|
||||||
var DeprecatedWarnings []string
|
var StartupProblems []string
|
||||||
|
|
||||||
|
func logStartupProblem(skip int, level log.Level, format string, args ...any) {
|
||||||
|
msg := fmt.Sprintf(format, args...)
|
||||||
|
log.Log(skip+1, level, "%s", msg)
|
||||||
|
StartupProblems = append(StartupProblems, msg)
|
||||||
|
}
|
||||||
|
|
||||||
func deprecatedSetting(rootCfg ConfigProvider, oldSection, oldKey, newSection, newKey, version string) {
|
func deprecatedSetting(rootCfg ConfigProvider, oldSection, oldKey, newSection, newKey, version string) {
|
||||||
if rootCfg.Section(oldSection).HasKey(oldKey) {
|
if rootCfg.Section(oldSection).HasKey(oldKey) {
|
||||||
msg := fmt.Sprintf("Deprecated config option `[%s]` `%s` present. Use `[%s]` `%s` instead. This fallback will be/has been removed in %s", oldSection, oldKey, newSection, newKey, version)
|
logStartupProblem(1, log.ERROR, "Deprecation: config option `[%s].%s` presents, please use `[%s].%s` instead because this fallback will be/has been removed in %s", oldSection, oldKey, newSection, newKey, version)
|
||||||
log.Error("%v", msg)
|
|
||||||
DeprecatedWarnings = append(DeprecatedWarnings, msg)
|
|
||||||
}
|
}
|
||||||
}
|
}
|
||||||
|
|
||||||
// deprecatedSettingDB add a hint that the configuration has been moved to database but still kept in app.ini
|
// deprecatedSettingDB add a hint that the configuration has been moved to database but still kept in app.ini
|
||||||
func deprecatedSettingDB(rootCfg ConfigProvider, oldSection, oldKey string) {
|
func deprecatedSettingDB(rootCfg ConfigProvider, oldSection, oldKey string) {
|
||||||
if rootCfg.Section(oldSection).HasKey(oldKey) {
|
if rootCfg.Section(oldSection).HasKey(oldKey) {
|
||||||
log.Error("Deprecated `[%s]` `%s` present which has been copied to database table sys_setting", oldSection, oldKey)
|
logStartupProblem(1, log.ERROR, "Deprecation: config option `[%s].%s` presents but it won't take effect because it has been moved to admin panel -> config setting", oldSection, oldKey)
|
||||||
}
|
}
|
||||||
}
|
}
|
||||||
|
|
||||||
|
|
|
@ -58,7 +58,7 @@ func loadIndexerFrom(rootCfg ConfigProvider) {
|
||||||
if !filepath.IsAbs(Indexer.IssuePath) {
|
if !filepath.IsAbs(Indexer.IssuePath) {
|
||||||
Indexer.IssuePath = filepath.ToSlash(filepath.Join(AppWorkPath, Indexer.IssuePath))
|
Indexer.IssuePath = filepath.ToSlash(filepath.Join(AppWorkPath, Indexer.IssuePath))
|
||||||
}
|
}
|
||||||
checkOverlappedPath("indexer.ISSUE_INDEXER_PATH", Indexer.IssuePath)
|
checkOverlappedPath("[indexer].ISSUE_INDEXER_PATH", Indexer.IssuePath)
|
||||||
} else {
|
} else {
|
||||||
Indexer.IssueConnStr = sec.Key("ISSUE_INDEXER_CONN_STR").MustString(Indexer.IssueConnStr)
|
Indexer.IssueConnStr = sec.Key("ISSUE_INDEXER_CONN_STR").MustString(Indexer.IssueConnStr)
|
||||||
if Indexer.IssueType == "meilisearch" {
|
if Indexer.IssueType == "meilisearch" {
|
||||||
|
|
|
@ -168,7 +168,7 @@ func GetGeneralTokenSigningSecret() []byte {
|
||||||
}
|
}
|
||||||
if generalSigningSecret.CompareAndSwap(old, &jwtSecret) {
|
if generalSigningSecret.CompareAndSwap(old, &jwtSecret) {
|
||||||
// FIXME: in main branch, the signing token should be refactored (eg: one unique for LFS/OAuth2/etc ...)
|
// FIXME: in main branch, the signing token should be refactored (eg: one unique for LFS/OAuth2/etc ...)
|
||||||
log.Warn("OAuth2 is not enabled, unable to use a persistent signing secret, a new one is generated, which is not persistent between restarts and cluster nodes")
|
logStartupProblem(1, log.WARN, "OAuth2 is not enabled, unable to use a persistent signing secret, a new one is generated, which is not persistent between restarts and cluster nodes")
|
||||||
return jwtSecret
|
return jwtSecret
|
||||||
}
|
}
|
||||||
return *generalSigningSecret.Load()
|
return *generalSigningSecret.Load()
|
||||||
|
|
|
@ -286,7 +286,7 @@ func loadRepositoryFrom(rootCfg ConfigProvider) {
|
||||||
RepoRootPath = filepath.Clean(RepoRootPath)
|
RepoRootPath = filepath.Clean(RepoRootPath)
|
||||||
}
|
}
|
||||||
|
|
||||||
checkOverlappedPath("repository.ROOT", RepoRootPath)
|
checkOverlappedPath("[repository].ROOT", RepoRootPath)
|
||||||
|
|
||||||
defaultDetectedCharsetsOrder := make([]string, 0, len(Repository.DetectedCharsetsOrder))
|
defaultDetectedCharsetsOrder := make([]string, 0, len(Repository.DetectedCharsetsOrder))
|
||||||
for _, charset := range Repository.DetectedCharsetsOrder {
|
for _, charset := range Repository.DetectedCharsetsOrder {
|
||||||
|
|
|
@ -331,7 +331,7 @@ func loadServerFrom(rootCfg ConfigProvider) {
|
||||||
if !filepath.IsAbs(PprofDataPath) {
|
if !filepath.IsAbs(PprofDataPath) {
|
||||||
PprofDataPath = filepath.Join(AppWorkPath, PprofDataPath)
|
PprofDataPath = filepath.Join(AppWorkPath, PprofDataPath)
|
||||||
}
|
}
|
||||||
checkOverlappedPath("server.PPROF_DATA_PATH", PprofDataPath)
|
checkOverlappedPath("[server].PPROF_DATA_PATH", PprofDataPath)
|
||||||
|
|
||||||
landingPage := sec.Key("LANDING_PAGE").MustString("home")
|
landingPage := sec.Key("LANDING_PAGE").MustString("home")
|
||||||
switch landingPage {
|
switch landingPage {
|
||||||
|
|
|
@ -46,7 +46,7 @@ func loadSessionFrom(rootCfg ConfigProvider) {
|
||||||
SessionConfig.ProviderConfig = strings.Trim(sec.Key("PROVIDER_CONFIG").MustString(filepath.Join(AppDataPath, "sessions")), "\" ")
|
SessionConfig.ProviderConfig = strings.Trim(sec.Key("PROVIDER_CONFIG").MustString(filepath.Join(AppDataPath, "sessions")), "\" ")
|
||||||
if SessionConfig.Provider == "file" && !filepath.IsAbs(SessionConfig.ProviderConfig) {
|
if SessionConfig.Provider == "file" && !filepath.IsAbs(SessionConfig.ProviderConfig) {
|
||||||
SessionConfig.ProviderConfig = filepath.Join(AppWorkPath, SessionConfig.ProviderConfig)
|
SessionConfig.ProviderConfig = filepath.Join(AppWorkPath, SessionConfig.ProviderConfig)
|
||||||
checkOverlappedPath("session.PROVIDER_CONFIG", SessionConfig.ProviderConfig)
|
checkOverlappedPath("[session].PROVIDER_CONFIG", SessionConfig.ProviderConfig)
|
||||||
}
|
}
|
||||||
SessionConfig.CookieName = sec.Key("COOKIE_NAME").MustString("i_like_gitea")
|
SessionConfig.CookieName = sec.Key("COOKIE_NAME").MustString("i_like_gitea")
|
||||||
SessionConfig.CookiePath = AppSubURL
|
SessionConfig.CookiePath = AppSubURL
|
||||||
|
|
|
@ -235,9 +235,7 @@ var configuredPaths = make(map[string]string)
|
||||||
func checkOverlappedPath(name, path string) {
|
func checkOverlappedPath(name, path string) {
|
||||||
// TODO: some paths shouldn't overlap (storage.xxx.path), while some could (data path is the base path for storage path)
|
// TODO: some paths shouldn't overlap (storage.xxx.path), while some could (data path is the base path for storage path)
|
||||||
if targetName, ok := configuredPaths[path]; ok && targetName != name {
|
if targetName, ok := configuredPaths[path]; ok && targetName != name {
|
||||||
msg := fmt.Sprintf("Configured path %q is used by %q and %q at the same time. The paths must be unique to prevent data loss.", path, targetName, name)
|
logStartupProblem(1, log.ERROR, "Configured path %q is used by %q and %q at the same time. The paths must be unique to prevent data loss.", path, targetName, name)
|
||||||
log.Error("%s", msg)
|
|
||||||
DeprecatedWarnings = append(DeprecatedWarnings, msg)
|
|
||||||
}
|
}
|
||||||
configuredPaths[path] = name
|
configuredPaths[path] = name
|
||||||
}
|
}
|
||||||
|
|
|
@ -240,7 +240,7 @@ func getStorageForLocal(targetSec, overrideSec ConfigSection, tp targetSecType,
|
||||||
}
|
}
|
||||||
}
|
}
|
||||||
|
|
||||||
checkOverlappedPath("storage."+name+".PATH", storage.Path)
|
checkOverlappedPath("[storage."+name+"].PATH", storage.Path)
|
||||||
|
|
||||||
return &storage, nil
|
return &storage, nil
|
||||||
}
|
}
|
||||||
|
|
|
@ -117,11 +117,11 @@ func updateSystemStatus() {
|
||||||
sysStatus.NumGC = m.NumGC
|
sysStatus.NumGC = m.NumGC
|
||||||
}
|
}
|
||||||
|
|
||||||
func prepareDeprecatedWarningsAlert(ctx *context.Context) {
|
func prepareStartupProblemsAlert(ctx *context.Context) {
|
||||||
if len(setting.DeprecatedWarnings) > 0 {
|
if len(setting.StartupProblems) > 0 {
|
||||||
content := setting.DeprecatedWarnings[0]
|
content := setting.StartupProblems[0]
|
||||||
if len(setting.DeprecatedWarnings) > 1 {
|
if len(setting.StartupProblems) > 1 {
|
||||||
content += fmt.Sprintf(" (and %d more)", len(setting.DeprecatedWarnings)-1)
|
content += fmt.Sprintf(" (and %d more)", len(setting.StartupProblems)-1)
|
||||||
}
|
}
|
||||||
ctx.Flash.Error(content, true)
|
ctx.Flash.Error(content, true)
|
||||||
}
|
}
|
||||||
|
@ -136,7 +136,7 @@ func Dashboard(ctx *context.Context) {
|
||||||
updateSystemStatus()
|
updateSystemStatus()
|
||||||
ctx.Data["SysStatus"] = sysStatus
|
ctx.Data["SysStatus"] = sysStatus
|
||||||
ctx.Data["SSH"] = setting.SSH
|
ctx.Data["SSH"] = setting.SSH
|
||||||
prepareDeprecatedWarningsAlert(ctx)
|
prepareStartupProblemsAlert(ctx)
|
||||||
ctx.HTML(http.StatusOK, tplDashboard)
|
ctx.HTML(http.StatusOK, tplDashboard)
|
||||||
}
|
}
|
||||||
|
|
||||||
|
@ -191,10 +191,10 @@ func DashboardPost(ctx *context.Context) {
|
||||||
func SelfCheck(ctx *context.Context) {
|
func SelfCheck(ctx *context.Context) {
|
||||||
ctx.Data["PageIsAdminSelfCheck"] = true
|
ctx.Data["PageIsAdminSelfCheck"] = true
|
||||||
|
|
||||||
ctx.Data["DeprecatedWarnings"] = setting.DeprecatedWarnings
|
ctx.Data["StartupProblems"] = setting.StartupProblems
|
||||||
if len(setting.DeprecatedWarnings) == 0 && !setting.IsProd {
|
if len(setting.StartupProblems) == 0 && !setting.IsProd {
|
||||||
if time.Now().Unix()%2 == 0 {
|
if time.Now().Unix()%2 == 0 {
|
||||||
ctx.Data["DeprecatedWarnings"] = []string{"This is a test warning message in dev mode"}
|
ctx.Data["StartupProblems"] = []string{"This is a test warning message in dev mode"}
|
||||||
}
|
}
|
||||||
}
|
}
|
||||||
|
|
||||||
|
|
|
@ -165,7 +165,7 @@ func Config(ctx *context.Context) {
|
||||||
|
|
||||||
ctx.Data["Loggers"] = log.GetManager().DumpLoggers()
|
ctx.Data["Loggers"] = log.GetManager().DumpLoggers()
|
||||||
config.GetDynGetter().InvalidateCache()
|
config.GetDynGetter().InvalidateCache()
|
||||||
prepareDeprecatedWarningsAlert(ctx)
|
prepareStartupProblemsAlert(ctx)
|
||||||
|
|
||||||
ctx.HTML(http.StatusOK, tplConfig)
|
ctx.HTML(http.StatusOK, tplConfig)
|
||||||
}
|
}
|
||||||
|
|
|
@ -5,11 +5,11 @@
|
||||||
{{ctx.Locale.Tr "admin.self_check"}}
|
{{ctx.Locale.Tr "admin.self_check"}}
|
||||||
</h4>
|
</h4>
|
||||||
|
|
||||||
{{if .DeprecatedWarnings}}
|
{{if .StartupProblems}}
|
||||||
<div class="ui attached segment">
|
<div class="ui attached segment">
|
||||||
<div class="ui warning message">
|
<div class="ui warning message">
|
||||||
<div>{{ctx.Locale.Tr "admin.self_check.startup_warnings"}}</div>
|
<div>{{ctx.Locale.Tr "admin.self_check.startup_warnings"}}</div>
|
||||||
<ul class="tw-w-full">{{range .DeprecatedWarnings}}<li>{{.}}</li>{{end}}</ul>
|
<ul class="tw-w-full">{{range .StartupProblems}}<li>{{.}}</li>{{end}}</ul>
|
||||||
</div>
|
</div>
|
||||||
</div>
|
</div>
|
||||||
{{end}}
|
{{end}}
|
||||||
|
@ -40,7 +40,7 @@
|
||||||
</div>
|
</div>
|
||||||
{{end}}
|
{{end}}
|
||||||
|
|
||||||
{{if and (not .DeprecatedWarnings) (not .DatabaseCheckHasProblems)}}
|
{{if and (not .StartupProblems) (not .DatabaseCheckHasProblems)}}
|
||||||
<div class="ui attached segment">
|
<div class="ui attached segment">
|
||||||
{{ctx.Locale.Tr "admin.self_check.no_problem_found"}}
|
{{ctx.Locale.Tr "admin.self_check.no_problem_found"}}
|
||||||
</div>
|
</div>
|
||||||
|
|
Loading…
Reference in New Issue
Block a user