2014-03-20 19:50:26 +08:00
|
|
|
// Copyright 2014 The Gogs Authors. All rights reserved.
|
2019-06-27 00:12:38 +08:00
|
|
|
// Copyright 2019 The Gitea Authors. All rights reserved.
|
2014-03-20 19:50:26 +08:00
|
|
|
// Use of this source code is governed by a MIT-style
|
|
|
|
// license that can be found in the LICENSE file.
|
|
|
|
|
|
|
|
package admin
|
|
|
|
|
|
|
|
import (
|
2014-03-22 19:42:24 +08:00
|
|
|
"fmt"
|
2021-04-05 23:30:52 +08:00
|
|
|
"net/http"
|
2019-06-27 00:12:38 +08:00
|
|
|
"net/url"
|
2019-03-20 06:40:13 +08:00
|
|
|
"os"
|
2014-03-22 19:42:24 +08:00
|
|
|
"runtime"
|
2020-01-07 19:23:09 +08:00
|
|
|
"strconv"
|
2014-03-21 15:27:59 +08:00
|
|
|
"strings"
|
2014-03-22 19:42:24 +08:00
|
|
|
"time"
|
2014-03-21 15:27:59 +08:00
|
|
|
|
2016-11-11 00:24:48 +08:00
|
|
|
"code.gitea.io/gitea/models"
|
|
|
|
"code.gitea.io/gitea/modules/base"
|
|
|
|
"code.gitea.io/gitea/modules/context"
|
2019-05-15 09:57:00 +08:00
|
|
|
"code.gitea.io/gitea/modules/git"
|
2021-07-25 00:03:58 +08:00
|
|
|
"code.gitea.io/gitea/modules/json"
|
2019-06-27 00:12:38 +08:00
|
|
|
"code.gitea.io/gitea/modules/log"
|
2016-11-11 00:24:48 +08:00
|
|
|
"code.gitea.io/gitea/modules/process"
|
2020-01-07 19:23:09 +08:00
|
|
|
"code.gitea.io/gitea/modules/queue"
|
2016-11-11 00:24:48 +08:00
|
|
|
"code.gitea.io/gitea/modules/setting"
|
2019-08-15 22:46:21 +08:00
|
|
|
"code.gitea.io/gitea/modules/timeutil"
|
2021-10-22 00:10:49 +08:00
|
|
|
"code.gitea.io/gitea/modules/updatechecker"
|
2021-01-26 23:36:53 +08:00
|
|
|
"code.gitea.io/gitea/modules/web"
|
2021-11-16 21:30:11 +08:00
|
|
|
"code.gitea.io/gitea/services/cron"
|
2021-04-07 03:44:05 +08:00
|
|
|
"code.gitea.io/gitea/services/forms"
|
2019-09-24 13:02:49 +08:00
|
|
|
"code.gitea.io/gitea/services/mailer"
|
2019-08-24 00:40:30 +08:00
|
|
|
|
2021-01-26 23:36:53 +08:00
|
|
|
"gitea.com/go-chi/session"
|
2014-03-20 19:50:26 +08:00
|
|
|
)
|
|
|
|
|
2014-06-23 01:14:03 +08:00
|
|
|
const (
|
2022-04-01 01:01:43 +08:00
|
|
|
tplDashboard base.TplName = "admin/dashboard"
|
|
|
|
tplConfig base.TplName = "admin/config"
|
|
|
|
tplMonitor base.TplName = "admin/monitor"
|
|
|
|
tplStacktrace base.TplName = "admin/stacktrace"
|
|
|
|
tplQueue base.TplName = "admin/queue"
|
2014-06-23 01:14:03 +08:00
|
|
|
)
|
|
|
|
|
2014-03-22 19:42:24 +08:00
|
|
|
var sysStatus struct {
|
2014-03-22 21:21:57 +08:00
|
|
|
Uptime string
|
2014-03-22 19:42:24 +08:00
|
|
|
NumGoroutine int
|
|
|
|
|
|
|
|
// General statistics.
|
|
|
|
MemAllocated string // bytes allocated and still in use
|
|
|
|
MemTotal string // bytes allocated (even if freed)
|
|
|
|
MemSys string // bytes obtained from system (sum of XxxSys below)
|
|
|
|
Lookups uint64 // number of pointer lookups
|
|
|
|
MemMallocs uint64 // number of mallocs
|
|
|
|
MemFrees uint64 // number of frees
|
|
|
|
|
|
|
|
// Main allocation heap statistics.
|
|
|
|
HeapAlloc string // bytes allocated and still in use
|
|
|
|
HeapSys string // bytes obtained from system
|
|
|
|
HeapIdle string // bytes in idle spans
|
|
|
|
HeapInuse string // bytes in non-idle span
|
|
|
|
HeapReleased string // bytes released to the OS
|
|
|
|
HeapObjects uint64 // total number of allocated objects
|
|
|
|
|
|
|
|
// Low-level fixed-size structure allocator statistics.
|
|
|
|
// Inuse is bytes used now.
|
|
|
|
// Sys is bytes obtained from system.
|
|
|
|
StackInuse string // bootstrap stacks
|
|
|
|
StackSys string
|
|
|
|
MSpanInuse string // mspan structures
|
|
|
|
MSpanSys string
|
|
|
|
MCacheInuse string // mcache structures
|
|
|
|
MCacheSys string
|
|
|
|
BuckHashSys string // profiling bucket hash table
|
|
|
|
GCSys string // GC metadata
|
|
|
|
OtherSys string // other system allocations
|
|
|
|
|
|
|
|
// Garbage collector statistics.
|
|
|
|
NextGC string // next run in HeapAlloc time (bytes)
|
|
|
|
LastGC string // last run in absolute time (ns)
|
|
|
|
PauseTotalNs string
|
|
|
|
PauseNs string // circular buffer of recent GC pause times, most recent at [(NumGC+255)%256]
|
|
|
|
NumGC uint32
|
|
|
|
}
|
|
|
|
|
|
|
|
func updateSystemStatus() {
|
2020-12-22 19:13:50 +08:00
|
|
|
sysStatus.Uptime = timeutil.TimeSincePro(setting.AppStartTime, "en")
|
2014-03-22 21:21:57 +08:00
|
|
|
|
2014-03-22 19:42:24 +08:00
|
|
|
m := new(runtime.MemStats)
|
|
|
|
runtime.ReadMemStats(m)
|
|
|
|
sysStatus.NumGoroutine = runtime.NumGoroutine()
|
|
|
|
|
|
|
|
sysStatus.MemAllocated = base.FileSize(int64(m.Alloc))
|
|
|
|
sysStatus.MemTotal = base.FileSize(int64(m.TotalAlloc))
|
|
|
|
sysStatus.MemSys = base.FileSize(int64(m.Sys))
|
|
|
|
sysStatus.Lookups = m.Lookups
|
|
|
|
sysStatus.MemMallocs = m.Mallocs
|
|
|
|
sysStatus.MemFrees = m.Frees
|
|
|
|
|
|
|
|
sysStatus.HeapAlloc = base.FileSize(int64(m.HeapAlloc))
|
|
|
|
sysStatus.HeapSys = base.FileSize(int64(m.HeapSys))
|
|
|
|
sysStatus.HeapIdle = base.FileSize(int64(m.HeapIdle))
|
|
|
|
sysStatus.HeapInuse = base.FileSize(int64(m.HeapInuse))
|
|
|
|
sysStatus.HeapReleased = base.FileSize(int64(m.HeapReleased))
|
|
|
|
sysStatus.HeapObjects = m.HeapObjects
|
|
|
|
|
|
|
|
sysStatus.StackInuse = base.FileSize(int64(m.StackInuse))
|
|
|
|
sysStatus.StackSys = base.FileSize(int64(m.StackSys))
|
|
|
|
sysStatus.MSpanInuse = base.FileSize(int64(m.MSpanInuse))
|
|
|
|
sysStatus.MSpanSys = base.FileSize(int64(m.MSpanSys))
|
|
|
|
sysStatus.MCacheInuse = base.FileSize(int64(m.MCacheInuse))
|
|
|
|
sysStatus.MCacheSys = base.FileSize(int64(m.MCacheSys))
|
|
|
|
sysStatus.BuckHashSys = base.FileSize(int64(m.BuckHashSys))
|
|
|
|
sysStatus.GCSys = base.FileSize(int64(m.GCSys))
|
|
|
|
sysStatus.OtherSys = base.FileSize(int64(m.OtherSys))
|
|
|
|
|
|
|
|
sysStatus.NextGC = base.FileSize(int64(m.NextGC))
|
|
|
|
sysStatus.LastGC = fmt.Sprintf("%.1fs", float64(time.Now().UnixNano()-int64(m.LastGC))/1000/1000/1000)
|
2014-03-22 21:21:57 +08:00
|
|
|
sysStatus.PauseTotalNs = fmt.Sprintf("%.1fs", float64(m.PauseTotalNs)/1000/1000/1000)
|
|
|
|
sysStatus.PauseNs = fmt.Sprintf("%.3fs", float64(m.PauseNs[(m.NumGC+255)%256])/1000/1000/1000)
|
2014-03-22 19:42:24 +08:00
|
|
|
sysStatus.NumGC = m.NumGC
|
|
|
|
}
|
|
|
|
|
2016-11-21 11:21:24 +08:00
|
|
|
// Dashboard show admin panel dashboard
|
2016-03-12 00:56:52 +08:00
|
|
|
func Dashboard(ctx *context.Context) {
|
2014-08-28 22:29:00 +08:00
|
|
|
ctx.Data["Title"] = ctx.Tr("admin.dashboard")
|
|
|
|
ctx.Data["PageIsAdmin"] = true
|
|
|
|
ctx.Data["PageIsAdminDashboard"] = true
|
2020-02-26 06:54:13 +08:00
|
|
|
ctx.Data["Stats"] = models.GetStatistic()
|
2021-10-22 00:10:49 +08:00
|
|
|
ctx.Data["NeedUpdate"] = updatechecker.GetNeedUpdate()
|
|
|
|
ctx.Data["RemoteVersion"] = updatechecker.GetRemoteVersion()
|
2020-02-26 06:54:13 +08:00
|
|
|
// FIXME: update periodically
|
|
|
|
updateSystemStatus()
|
|
|
|
ctx.Data["SysStatus"] = sysStatus
|
2020-10-09 00:43:15 +08:00
|
|
|
ctx.Data["SSH"] = setting.SSH
|
2021-04-05 23:30:52 +08:00
|
|
|
ctx.HTML(http.StatusOK, tplDashboard)
|
2020-02-26 06:54:13 +08:00
|
|
|
}
|
|
|
|
|
|
|
|
// DashboardPost run an admin operation
|
2021-01-26 23:36:53 +08:00
|
|
|
func DashboardPost(ctx *context.Context) {
|
2021-04-07 03:44:05 +08:00
|
|
|
form := web.GetForm(ctx).(*forms.AdminDashboardForm)
|
2020-02-26 06:54:13 +08:00
|
|
|
ctx.Data["Title"] = ctx.Tr("admin.dashboard")
|
|
|
|
ctx.Data["PageIsAdmin"] = true
|
|
|
|
ctx.Data["PageIsAdminDashboard"] = true
|
|
|
|
ctx.Data["Stats"] = models.GetStatistic()
|
|
|
|
updateSystemStatus()
|
|
|
|
ctx.Data["SysStatus"] = sysStatus
|
2014-05-07 01:47:47 +08:00
|
|
|
|
|
|
|
// Run operation.
|
2020-05-17 07:31:38 +08:00
|
|
|
if form.Op != "" {
|
|
|
|
task := cron.GetTask(form.Op)
|
|
|
|
if task != nil {
|
2022-03-22 15:03:22 +08:00
|
|
|
go task.RunWithUser(ctx.Doer, nil)
|
2020-05-17 07:31:38 +08:00
|
|
|
ctx.Flash.Success(ctx.Tr("admin.dashboard.task.started", ctx.Tr("admin.dashboard."+form.Op)))
|
2014-05-07 01:47:47 +08:00
|
|
|
} else {
|
2020-05-17 07:31:38 +08:00
|
|
|
ctx.Flash.Error(ctx.Tr("admin.dashboard.task.unknown", form.Op))
|
2014-05-07 01:47:47 +08:00
|
|
|
}
|
|
|
|
}
|
2020-07-06 03:38:03 +08:00
|
|
|
if form.From == "monitor" {
|
|
|
|
ctx.Redirect(setting.AppSubURL + "/admin/monitor")
|
|
|
|
} else {
|
|
|
|
ctx.Redirect(setting.AppSubURL + "/admin")
|
|
|
|
}
|
2014-03-20 19:50:26 +08:00
|
|
|
}
|
|
|
|
|
2016-11-21 11:21:24 +08:00
|
|
|
// SendTestMail send test mail to confirm mail service is OK
|
2016-03-12 00:56:52 +08:00
|
|
|
func SendTestMail(ctx *context.Context) {
|
2021-08-11 08:31:13 +08:00
|
|
|
email := ctx.FormString("email")
|
2016-02-25 12:59:17 +08:00
|
|
|
// Send a test email to the user's email address and redirect back to Config
|
2019-09-24 13:02:49 +08:00
|
|
|
if err := mailer.SendTestMail(email); err != nil {
|
2016-02-25 12:59:17 +08:00
|
|
|
ctx.Flash.Error(ctx.Tr("admin.config.test_mail_failed", email, err))
|
|
|
|
} else {
|
|
|
|
ctx.Flash.Info(ctx.Tr("admin.config.test_mail_sent", email))
|
|
|
|
}
|
2016-02-19 06:13:12 +08:00
|
|
|
|
2016-11-27 18:14:25 +08:00
|
|
|
ctx.Redirect(setting.AppSubURL + "/admin/config")
|
2016-02-19 06:13:12 +08:00
|
|
|
}
|
|
|
|
|
2019-11-15 04:06:02 +08:00
|
|
|
func shadowPasswordKV(cfgItem, splitter string) string {
|
2019-06-27 00:12:38 +08:00
|
|
|
fields := strings.Split(cfgItem, splitter)
|
|
|
|
for i := 0; i < len(fields); i++ {
|
|
|
|
if strings.HasPrefix(fields[i], "password=") {
|
|
|
|
fields[i] = "password=******"
|
|
|
|
break
|
|
|
|
}
|
|
|
|
}
|
|
|
|
return strings.Join(fields, splitter)
|
|
|
|
}
|
|
|
|
|
2019-11-15 04:06:02 +08:00
|
|
|
func shadowURL(provider, cfgItem string) string {
|
2019-06-27 00:12:38 +08:00
|
|
|
u, err := url.Parse(cfgItem)
|
|
|
|
if err != nil {
|
2019-11-15 04:06:02 +08:00
|
|
|
log.Error("Shadowing Password for %v failed: %v", provider, err)
|
2019-06-27 00:12:38 +08:00
|
|
|
return cfgItem
|
|
|
|
}
|
|
|
|
if u.User != nil {
|
|
|
|
atIdx := strings.Index(cfgItem, "@")
|
|
|
|
if atIdx > 0 {
|
|
|
|
colonIdx := strings.LastIndex(cfgItem[:atIdx], ":")
|
|
|
|
if colonIdx > 0 {
|
|
|
|
return cfgItem[:colonIdx+1] + "******" + cfgItem[atIdx:]
|
|
|
|
}
|
|
|
|
}
|
|
|
|
}
|
|
|
|
return cfgItem
|
|
|
|
}
|
|
|
|
|
|
|
|
func shadowPassword(provider, cfgItem string) string {
|
|
|
|
switch provider {
|
|
|
|
case "redis":
|
2019-11-15 04:06:02 +08:00
|
|
|
return shadowPasswordKV(cfgItem, ",")
|
2019-06-27 00:12:38 +08:00
|
|
|
case "mysql":
|
2022-01-21 01:46:10 +08:00
|
|
|
// root:@tcp(localhost:3306)/macaron?charset=utf8
|
2019-06-27 00:12:38 +08:00
|
|
|
atIdx := strings.Index(cfgItem, "@")
|
|
|
|
if atIdx > 0 {
|
|
|
|
colonIdx := strings.Index(cfgItem[:atIdx], ":")
|
|
|
|
if colonIdx > 0 {
|
|
|
|
return cfgItem[:colonIdx+1] + "******" + cfgItem[atIdx:]
|
|
|
|
}
|
|
|
|
}
|
|
|
|
return cfgItem
|
|
|
|
case "postgres":
|
|
|
|
// user=jiahuachen dbname=macaron port=5432 sslmode=disable
|
|
|
|
if !strings.HasPrefix(cfgItem, "postgres://") {
|
2019-11-15 04:06:02 +08:00
|
|
|
return shadowPasswordKV(cfgItem, " ")
|
2019-06-27 00:12:38 +08:00
|
|
|
}
|
2019-11-15 04:06:02 +08:00
|
|
|
fallthrough
|
|
|
|
case "couchbase":
|
|
|
|
return shadowURL(provider, cfgItem)
|
2019-06-27 00:12:38 +08:00
|
|
|
// postgres://pqgotest:password@localhost/pqgotest?sslmode=verify-full
|
2019-11-15 04:06:02 +08:00
|
|
|
// Notice: use shadowURL
|
2019-06-27 00:12:38 +08:00
|
|
|
}
|
2019-11-15 04:06:02 +08:00
|
|
|
return cfgItem
|
2019-06-27 00:12:38 +08:00
|
|
|
}
|
|
|
|
|
2016-11-21 11:21:24 +08:00
|
|
|
// Config show admin config page
|
2016-03-12 00:56:52 +08:00
|
|
|
func Config(ctx *context.Context) {
|
2015-09-12 21:21:09 +08:00
|
|
|
ctx.Data["Title"] = ctx.Tr("admin.config")
|
2014-08-30 20:49:51 +08:00
|
|
|
ctx.Data["PageIsAdmin"] = true
|
|
|
|
ctx.Data["PageIsAdminConfig"] = true
|
2014-03-21 15:27:59 +08:00
|
|
|
|
2017-06-22 21:21:56 +08:00
|
|
|
ctx.Data["CustomConf"] = setting.CustomConf
|
2016-11-27 18:14:25 +08:00
|
|
|
ctx.Data["AppUrl"] = setting.AppURL
|
2014-05-26 08:11:25 +08:00
|
|
|
ctx.Data["Domain"] = setting.Domain
|
|
|
|
ctx.Data["OfflineMode"] = setting.OfflineMode
|
|
|
|
ctx.Data["DisableRouterLog"] = setting.DisableRouterLog
|
|
|
|
ctx.Data["RunUser"] = setting.RunUser
|
2021-01-26 23:36:53 +08:00
|
|
|
ctx.Data["RunMode"] = strings.Title(setting.RunMode)
|
2020-09-06 00:42:58 +08:00
|
|
|
if version, err := git.LocalVersion(); err == nil {
|
|
|
|
ctx.Data["GitVersion"] = version.Original()
|
|
|
|
}
|
2014-05-26 08:11:25 +08:00
|
|
|
ctx.Data["RepoRootPath"] = setting.RepoRootPath
|
2019-03-20 06:40:13 +08:00
|
|
|
ctx.Data["CustomRootPath"] = setting.CustomPath
|
2014-05-28 13:53:06 +08:00
|
|
|
ctx.Data["StaticRootPath"] = setting.StaticRootPath
|
|
|
|
ctx.Data["LogRootPath"] = setting.LogRootPath
|
2014-05-26 08:11:25 +08:00
|
|
|
ctx.Data["ScriptType"] = setting.ScriptType
|
2014-06-25 01:55:47 +08:00
|
|
|
ctx.Data["ReverseProxyAuthUser"] = setting.ReverseProxyAuthUser
|
2018-12-19 01:05:48 +08:00
|
|
|
ctx.Data["ReverseProxyAuthEmail"] = setting.ReverseProxyAuthEmail
|
2014-03-21 15:27:59 +08:00
|
|
|
|
2016-02-28 09:48:39 +08:00
|
|
|
ctx.Data["SSH"] = setting.SSH
|
2019-06-17 02:24:49 +08:00
|
|
|
ctx.Data["LFS"] = setting.LFS
|
2016-02-28 09:48:39 +08:00
|
|
|
|
2014-05-26 08:11:25 +08:00
|
|
|
ctx.Data["Service"] = setting.Service
|
2019-08-24 17:24:45 +08:00
|
|
|
ctx.Data["DbCfg"] = setting.Database
|
2015-02-11 10:06:59 +08:00
|
|
|
ctx.Data["Webhook"] = setting.Webhook
|
2014-06-08 16:45:34 +08:00
|
|
|
|
2014-03-21 16:13:32 +08:00
|
|
|
ctx.Data["MailerEnabled"] = false
|
2014-05-26 08:11:25 +08:00
|
|
|
if setting.MailService != nil {
|
2014-03-21 16:13:32 +08:00
|
|
|
ctx.Data["MailerEnabled"] = true
|
2014-05-26 08:11:25 +08:00
|
|
|
ctx.Data["Mailer"] = setting.MailService
|
2014-03-21 16:13:32 +08:00
|
|
|
}
|
2014-03-21 15:27:59 +08:00
|
|
|
|
2017-10-26 09:37:33 +08:00
|
|
|
ctx.Data["CacheAdapter"] = setting.CacheService.Adapter
|
|
|
|
ctx.Data["CacheInterval"] = setting.CacheService.Interval
|
2019-06-27 00:12:38 +08:00
|
|
|
|
|
|
|
ctx.Data["CacheConn"] = shadowPassword(setting.CacheService.Adapter, setting.CacheService.Conn)
|
2019-05-06 22:35:11 +08:00
|
|
|
ctx.Data["CacheItemTTL"] = setting.CacheService.TTL
|
2014-03-21 22:09:57 +08:00
|
|
|
|
2019-06-27 00:12:38 +08:00
|
|
|
sessionCfg := setting.SessionConfig
|
2019-11-29 01:35:41 +08:00
|
|
|
if sessionCfg.Provider == "VirtualSession" {
|
|
|
|
var realSession session.Options
|
|
|
|
if err := json.Unmarshal([]byte(sessionCfg.ProviderConfig), &realSession); err != nil {
|
|
|
|
log.Error("Unable to unmarshall session config for virtualed provider config: %s\nError: %v", sessionCfg.ProviderConfig, err)
|
|
|
|
}
|
2020-01-29 15:47:46 +08:00
|
|
|
sessionCfg.Provider = realSession.Provider
|
|
|
|
sessionCfg.ProviderConfig = realSession.ProviderConfig
|
|
|
|
sessionCfg.CookieName = realSession.CookieName
|
|
|
|
sessionCfg.CookiePath = realSession.CookiePath
|
|
|
|
sessionCfg.Gclifetime = realSession.Gclifetime
|
|
|
|
sessionCfg.Maxlifetime = realSession.Maxlifetime
|
|
|
|
sessionCfg.Secure = realSession.Secure
|
|
|
|
sessionCfg.Domain = realSession.Domain
|
2019-11-29 01:35:41 +08:00
|
|
|
}
|
2019-06-27 00:12:38 +08:00
|
|
|
sessionCfg.ProviderConfig = shadowPassword(sessionCfg.Provider, sessionCfg.ProviderConfig)
|
|
|
|
ctx.Data["SessionConfig"] = sessionCfg
|
2014-03-22 21:21:57 +08:00
|
|
|
|
2014-05-26 08:11:25 +08:00
|
|
|
ctx.Data["DisableGravatar"] = setting.DisableGravatar
|
2016-08-08 01:27:38 +08:00
|
|
|
ctx.Data["EnableFederatedAvatar"] = setting.EnableFederatedAvatar
|
2014-03-22 18:42:19 +08:00
|
|
|
|
2016-08-11 02:01:42 +08:00
|
|
|
ctx.Data["Git"] = setting.Git
|
|
|
|
|
2019-03-20 06:40:13 +08:00
|
|
|
type envVar struct {
|
|
|
|
Name, Value string
|
|
|
|
}
|
|
|
|
|
|
|
|
envVars := map[string]*envVar{}
|
|
|
|
if len(os.Getenv("GITEA_WORK_DIR")) > 0 {
|
|
|
|
envVars["GITEA_WORK_DIR"] = &envVar{"GITEA_WORK_DIR", os.Getenv("GITEA_WORK_DIR")}
|
|
|
|
}
|
|
|
|
if len(os.Getenv("GITEA_CUSTOM")) > 0 {
|
|
|
|
envVars["GITEA_CUSTOM"] = &envVar{"GITEA_CUSTOM", os.Getenv("GITEA_CUSTOM")}
|
|
|
|
}
|
|
|
|
|
|
|
|
ctx.Data["EnvVars"] = envVars
|
2020-07-06 08:07:07 +08:00
|
|
|
ctx.Data["Loggers"] = setting.GetLogDescriptions()
|
2019-04-02 15:48:31 +08:00
|
|
|
ctx.Data["EnableAccessLog"] = setting.EnableAccessLog
|
|
|
|
ctx.Data["AccessLogTemplate"] = setting.AccessLogTemplate
|
|
|
|
ctx.Data["DisableRouterLog"] = setting.DisableRouterLog
|
|
|
|
ctx.Data["EnableXORMLog"] = setting.EnableXORMLog
|
2019-08-24 17:24:45 +08:00
|
|
|
ctx.Data["LogSQL"] = setting.Database.LogSQL
|
2014-03-22 00:13:13 +08:00
|
|
|
|
2021-04-05 23:30:52 +08:00
|
|
|
ctx.HTML(http.StatusOK, tplConfig)
|
2014-03-21 13:48:10 +08:00
|
|
|
}
|
2014-06-14 01:01:52 +08:00
|
|
|
|
2016-11-21 11:21:24 +08:00
|
|
|
// Monitor show admin monitor page
|
2016-03-12 00:56:52 +08:00
|
|
|
func Monitor(ctx *context.Context) {
|
2014-08-30 20:49:51 +08:00
|
|
|
ctx.Data["Title"] = ctx.Tr("admin.monitor")
|
|
|
|
ctx.Data["PageIsAdmin"] = true
|
|
|
|
ctx.Data["PageIsAdminMonitor"] = true
|
2022-04-01 01:01:43 +08:00
|
|
|
ctx.Data["Processes"], ctx.Data["ProcessCount"] = process.GetManager().Processes(false, true)
|
2015-08-18 02:19:29 +08:00
|
|
|
ctx.Data["Entries"] = cron.ListTasks()
|
2020-01-07 19:23:09 +08:00
|
|
|
ctx.Data["Queues"] = queue.GetManager().ManagedQueues()
|
2022-04-01 01:01:43 +08:00
|
|
|
|
2021-04-05 23:30:52 +08:00
|
|
|
ctx.HTML(http.StatusOK, tplMonitor)
|
2014-06-14 01:01:52 +08:00
|
|
|
}
|
2019-11-30 22:40:22 +08:00
|
|
|
|
2022-04-01 01:01:43 +08:00
|
|
|
// GoroutineStacktrace show admin monitor goroutines page
|
|
|
|
func GoroutineStacktrace(ctx *context.Context) {
|
|
|
|
ctx.Data["Title"] = ctx.Tr("admin.monitor")
|
|
|
|
ctx.Data["PageIsAdmin"] = true
|
|
|
|
ctx.Data["PageIsAdminMonitor"] = true
|
|
|
|
|
|
|
|
processStacks, processCount, goroutineCount, err := process.GetManager().ProcessStacktraces(false, false)
|
|
|
|
if err != nil {
|
|
|
|
ctx.ServerError("GoroutineStacktrace", err)
|
|
|
|
return
|
|
|
|
}
|
|
|
|
|
|
|
|
ctx.Data["ProcessStacks"] = processStacks
|
|
|
|
|
|
|
|
ctx.Data["GoroutineCount"] = goroutineCount
|
|
|
|
ctx.Data["ProcessCount"] = processCount
|
|
|
|
|
|
|
|
ctx.HTML(http.StatusOK, tplStacktrace)
|
|
|
|
}
|
|
|
|
|
2019-11-30 22:40:22 +08:00
|
|
|
// MonitorCancel cancels a process
|
|
|
|
func MonitorCancel(ctx *context.Context) {
|
2021-12-01 04:06:32 +08:00
|
|
|
pid := ctx.Params("pid")
|
|
|
|
process.GetManager().Cancel(process.IDType(pid))
|
2021-04-05 23:30:52 +08:00
|
|
|
ctx.JSON(http.StatusOK, map[string]interface{}{
|
2020-07-06 03:38:03 +08:00
|
|
|
"redirect": setting.AppSubURL + "/admin/monitor",
|
2019-11-30 22:40:22 +08:00
|
|
|
})
|
|
|
|
}
|
2020-01-07 19:23:09 +08:00
|
|
|
|
|
|
|
// Queue shows details for a specific queue
|
|
|
|
func Queue(ctx *context.Context) {
|
|
|
|
qid := ctx.ParamsInt64("qid")
|
|
|
|
mq := queue.GetManager().GetManagedQueue(qid)
|
|
|
|
if mq == nil {
|
2022-03-23 12:54:07 +08:00
|
|
|
ctx.Status(http.StatusNotFound)
|
2020-01-07 19:23:09 +08:00
|
|
|
return
|
|
|
|
}
|
|
|
|
ctx.Data["Title"] = ctx.Tr("admin.monitor.queue", mq.Name)
|
|
|
|
ctx.Data["PageIsAdmin"] = true
|
|
|
|
ctx.Data["PageIsAdminMonitor"] = true
|
|
|
|
ctx.Data["Queue"] = mq
|
2021-04-05 23:30:52 +08:00
|
|
|
ctx.HTML(http.StatusOK, tplQueue)
|
2020-01-07 19:23:09 +08:00
|
|
|
}
|
|
|
|
|
|
|
|
// WorkerCancel cancels a worker group
|
|
|
|
func WorkerCancel(ctx *context.Context) {
|
|
|
|
qid := ctx.ParamsInt64("qid")
|
|
|
|
mq := queue.GetManager().GetManagedQueue(qid)
|
|
|
|
if mq == nil {
|
2022-03-23 12:54:07 +08:00
|
|
|
ctx.Status(http.StatusNotFound)
|
2020-01-07 19:23:09 +08:00
|
|
|
return
|
|
|
|
}
|
|
|
|
pid := ctx.ParamsInt64("pid")
|
|
|
|
mq.CancelWorkers(pid)
|
|
|
|
ctx.Flash.Info(ctx.Tr("admin.monitor.queue.pool.cancelling"))
|
2021-04-05 23:30:52 +08:00
|
|
|
ctx.JSON(http.StatusOK, map[string]interface{}{
|
2021-02-20 05:36:43 +08:00
|
|
|
"redirect": setting.AppSubURL + "/admin/monitor/queue/" + strconv.FormatInt(qid, 10),
|
2020-01-07 19:23:09 +08:00
|
|
|
})
|
|
|
|
}
|
|
|
|
|
2020-01-29 09:01:06 +08:00
|
|
|
// Flush flushes a queue
|
|
|
|
func Flush(ctx *context.Context) {
|
|
|
|
qid := ctx.ParamsInt64("qid")
|
|
|
|
mq := queue.GetManager().GetManagedQueue(qid)
|
|
|
|
if mq == nil {
|
2022-03-23 12:54:07 +08:00
|
|
|
ctx.Status(http.StatusNotFound)
|
2020-01-29 09:01:06 +08:00
|
|
|
return
|
|
|
|
}
|
2021-08-11 08:31:13 +08:00
|
|
|
timeout, err := time.ParseDuration(ctx.FormString("timeout"))
|
2020-01-29 09:01:06 +08:00
|
|
|
if err != nil {
|
|
|
|
timeout = -1
|
|
|
|
}
|
|
|
|
ctx.Flash.Info(ctx.Tr("admin.monitor.queue.pool.flush.added", mq.Name))
|
|
|
|
go func() {
|
|
|
|
err := mq.Flush(timeout)
|
|
|
|
if err != nil {
|
|
|
|
log.Error("Flushing failure for %s: Error %v", mq.Name, err)
|
|
|
|
}
|
|
|
|
}()
|
2021-02-20 05:36:43 +08:00
|
|
|
ctx.Redirect(setting.AppSubURL + "/admin/monitor/queue/" + strconv.FormatInt(qid, 10))
|
2022-01-23 05:22:14 +08:00
|
|
|
}
|
|
|
|
|
|
|
|
// Pause pauses a queue
|
|
|
|
func Pause(ctx *context.Context) {
|
|
|
|
qid := ctx.ParamsInt64("qid")
|
|
|
|
mq := queue.GetManager().GetManagedQueue(qid)
|
|
|
|
if mq == nil {
|
|
|
|
ctx.Status(404)
|
|
|
|
return
|
|
|
|
}
|
|
|
|
mq.Pause()
|
|
|
|
ctx.Redirect(setting.AppSubURL + "/admin/monitor/queue/" + strconv.FormatInt(qid, 10))
|
|
|
|
}
|
|
|
|
|
|
|
|
// Resume resumes a queue
|
|
|
|
func Resume(ctx *context.Context) {
|
|
|
|
qid := ctx.ParamsInt64("qid")
|
|
|
|
mq := queue.GetManager().GetManagedQueue(qid)
|
|
|
|
if mq == nil {
|
|
|
|
ctx.Status(404)
|
|
|
|
return
|
|
|
|
}
|
|
|
|
mq.Resume()
|
|
|
|
ctx.Redirect(setting.AppSubURL + "/admin/monitor/queue/" + strconv.FormatInt(qid, 10))
|
2020-01-29 09:01:06 +08:00
|
|
|
}
|
|
|
|
|
2020-01-07 19:23:09 +08:00
|
|
|
// AddWorkers adds workers to a worker group
|
|
|
|
func AddWorkers(ctx *context.Context) {
|
|
|
|
qid := ctx.ParamsInt64("qid")
|
|
|
|
mq := queue.GetManager().GetManagedQueue(qid)
|
|
|
|
if mq == nil {
|
2022-03-23 12:54:07 +08:00
|
|
|
ctx.Status(http.StatusNotFound)
|
2020-01-07 19:23:09 +08:00
|
|
|
return
|
|
|
|
}
|
2021-07-29 09:42:15 +08:00
|
|
|
number := ctx.FormInt("number")
|
2020-01-07 19:23:09 +08:00
|
|
|
if number < 1 {
|
|
|
|
ctx.Flash.Error(ctx.Tr("admin.monitor.queue.pool.addworkers.mustnumbergreaterzero"))
|
2021-02-20 05:36:43 +08:00
|
|
|
ctx.Redirect(setting.AppSubURL + "/admin/monitor/queue/" + strconv.FormatInt(qid, 10))
|
2020-01-07 19:23:09 +08:00
|
|
|
return
|
|
|
|
}
|
2021-08-11 08:31:13 +08:00
|
|
|
timeout, err := time.ParseDuration(ctx.FormString("timeout"))
|
2020-01-07 19:23:09 +08:00
|
|
|
if err != nil {
|
|
|
|
ctx.Flash.Error(ctx.Tr("admin.monitor.queue.pool.addworkers.musttimeoutduration"))
|
2021-02-20 05:36:43 +08:00
|
|
|
ctx.Redirect(setting.AppSubURL + "/admin/monitor/queue/" + strconv.FormatInt(qid, 10))
|
2020-01-07 19:23:09 +08:00
|
|
|
return
|
|
|
|
}
|
2020-01-29 09:01:06 +08:00
|
|
|
if _, ok := mq.Managed.(queue.ManagedPool); !ok {
|
2020-01-07 19:23:09 +08:00
|
|
|
ctx.Flash.Error(ctx.Tr("admin.monitor.queue.pool.none"))
|
2021-02-20 05:36:43 +08:00
|
|
|
ctx.Redirect(setting.AppSubURL + "/admin/monitor/queue/" + strconv.FormatInt(qid, 10))
|
2020-01-07 19:23:09 +08:00
|
|
|
return
|
|
|
|
}
|
|
|
|
mq.AddWorkers(number, timeout)
|
|
|
|
ctx.Flash.Success(ctx.Tr("admin.monitor.queue.pool.added"))
|
2021-02-20 05:36:43 +08:00
|
|
|
ctx.Redirect(setting.AppSubURL + "/admin/monitor/queue/" + strconv.FormatInt(qid, 10))
|
2020-01-07 19:23:09 +08:00
|
|
|
}
|
|
|
|
|
|
|
|
// SetQueueSettings sets the maximum number of workers and other settings for this queue
|
|
|
|
func SetQueueSettings(ctx *context.Context) {
|
|
|
|
qid := ctx.ParamsInt64("qid")
|
|
|
|
mq := queue.GetManager().GetManagedQueue(qid)
|
|
|
|
if mq == nil {
|
2022-03-23 12:54:07 +08:00
|
|
|
ctx.Status(http.StatusNotFound)
|
2020-01-07 19:23:09 +08:00
|
|
|
return
|
|
|
|
}
|
2020-01-29 09:01:06 +08:00
|
|
|
if _, ok := mq.Managed.(queue.ManagedPool); !ok {
|
2020-01-07 19:23:09 +08:00
|
|
|
ctx.Flash.Error(ctx.Tr("admin.monitor.queue.pool.none"))
|
2021-02-20 05:36:43 +08:00
|
|
|
ctx.Redirect(setting.AppSubURL + "/admin/monitor/queue/" + strconv.FormatInt(qid, 10))
|
2020-01-07 19:23:09 +08:00
|
|
|
return
|
|
|
|
}
|
|
|
|
|
2021-08-11 08:31:13 +08:00
|
|
|
maxNumberStr := ctx.FormString("max-number")
|
|
|
|
numberStr := ctx.FormString("number")
|
|
|
|
timeoutStr := ctx.FormString("timeout")
|
2020-01-07 19:23:09 +08:00
|
|
|
|
|
|
|
var err error
|
|
|
|
var maxNumber, number int
|
|
|
|
var timeout time.Duration
|
|
|
|
if len(maxNumberStr) > 0 {
|
|
|
|
maxNumber, err = strconv.Atoi(maxNumberStr)
|
|
|
|
if err != nil {
|
|
|
|
ctx.Flash.Error(ctx.Tr("admin.monitor.queue.settings.maxnumberworkers.error"))
|
2021-02-20 05:36:43 +08:00
|
|
|
ctx.Redirect(setting.AppSubURL + "/admin/monitor/queue/" + strconv.FormatInt(qid, 10))
|
2020-01-07 19:23:09 +08:00
|
|
|
return
|
|
|
|
}
|
|
|
|
if maxNumber < -1 {
|
|
|
|
maxNumber = -1
|
|
|
|
}
|
|
|
|
} else {
|
|
|
|
maxNumber = mq.MaxNumberOfWorkers()
|
|
|
|
}
|
|
|
|
|
|
|
|
if len(numberStr) > 0 {
|
|
|
|
number, err = strconv.Atoi(numberStr)
|
|
|
|
if err != nil || number < 0 {
|
|
|
|
ctx.Flash.Error(ctx.Tr("admin.monitor.queue.settings.numberworkers.error"))
|
2021-02-20 05:36:43 +08:00
|
|
|
ctx.Redirect(setting.AppSubURL + "/admin/monitor/queue/" + strconv.FormatInt(qid, 10))
|
2020-01-07 19:23:09 +08:00
|
|
|
return
|
|
|
|
}
|
|
|
|
} else {
|
|
|
|
number = mq.BoostWorkers()
|
|
|
|
}
|
|
|
|
|
|
|
|
if len(timeoutStr) > 0 {
|
|
|
|
timeout, err = time.ParseDuration(timeoutStr)
|
|
|
|
if err != nil {
|
|
|
|
ctx.Flash.Error(ctx.Tr("admin.monitor.queue.settings.timeout.error"))
|
2021-02-20 05:36:43 +08:00
|
|
|
ctx.Redirect(setting.AppSubURL + "/admin/monitor/queue/" + strconv.FormatInt(qid, 10))
|
2020-01-07 19:23:09 +08:00
|
|
|
return
|
|
|
|
}
|
|
|
|
} else {
|
2020-01-29 09:01:06 +08:00
|
|
|
timeout = mq.BoostTimeout()
|
2020-01-07 19:23:09 +08:00
|
|
|
}
|
|
|
|
|
2020-01-29 09:01:06 +08:00
|
|
|
mq.SetPoolSettings(maxNumber, number, timeout)
|
2020-01-07 19:23:09 +08:00
|
|
|
ctx.Flash.Success(ctx.Tr("admin.monitor.queue.settings.changed"))
|
2021-02-20 05:36:43 +08:00
|
|
|
ctx.Redirect(setting.AppSubURL + "/admin/monitor/queue/" + strconv.FormatInt(qid, 10))
|
2020-01-07 19:23:09 +08:00
|
|
|
}
|