042cac5fed
* Improve install code to avoid low-level mistakes. If a user tries to do a re-install in a Gitea database, they gets a warning and double check. When Gitea runs, it never create empty app.ini automatically. Also some small (related) refactoring: * Refactor db.InitEngine related logic make it more clean (especially for the install code) * Move some i18n strings out from setting.go to make the setting.go can be easily maintained. * Show errors in CLI code if an incorrect app.ini is used. * APP_DATA_PATH is created when installing, and checked when starting (no empty directory is created any more).
59 lines
1.6 KiB
Go
59 lines
1.6 KiB
Go
// Copyright 2017 The Gitea Authors. All rights reserved.
|
|
// Use of this source code is governed by a MIT-style
|
|
// license that can be found in the LICENSE file.
|
|
|
|
package private
|
|
|
|
import (
|
|
"context"
|
|
"crypto/tls"
|
|
"fmt"
|
|
"net"
|
|
"net/http"
|
|
|
|
"code.gitea.io/gitea/modules/httplib"
|
|
"code.gitea.io/gitea/modules/json"
|
|
"code.gitea.io/gitea/modules/log"
|
|
"code.gitea.io/gitea/modules/setting"
|
|
)
|
|
|
|
func newRequest(ctx context.Context, url, method string) *httplib.Request {
|
|
if setting.InternalToken == "" {
|
|
log.Fatal(`The INTERNAL_TOKEN setting is missing from the configuration file: %q.
|
|
Ensure you are running in the correct environment or set the correct configuration file with -c.`, setting.CustomConf)
|
|
}
|
|
return httplib.NewRequest(url, method).
|
|
SetContext(ctx).
|
|
Header("Authorization", fmt.Sprintf("Bearer %s", setting.InternalToken))
|
|
}
|
|
|
|
// Response internal request response
|
|
type Response struct {
|
|
Err string `json:"err"`
|
|
}
|
|
|
|
func decodeJSONError(resp *http.Response) *Response {
|
|
var res Response
|
|
err := json.NewDecoder(resp.Body).Decode(&res)
|
|
if err != nil {
|
|
res.Err = err.Error()
|
|
}
|
|
return &res
|
|
}
|
|
|
|
func newInternalRequest(ctx context.Context, url, method string) *httplib.Request {
|
|
req := newRequest(ctx, url, method).SetTLSClientConfig(&tls.Config{
|
|
InsecureSkipVerify: true,
|
|
ServerName: setting.Domain,
|
|
})
|
|
if setting.Protocol == setting.UnixSocket {
|
|
req.SetTransport(&http.Transport{
|
|
DialContext: func(ctx context.Context, _, _ string) (net.Conn, error) {
|
|
var d net.Dialer
|
|
return d.DialContext(ctx, "unix", setting.HTTPAddr)
|
|
},
|
|
})
|
|
}
|
|
return req
|
|
}
|