summaryrefslogtreecommitdiff
path: root/workhorse/internal/config/config.go
diff options
context:
space:
mode:
Diffstat (limited to 'workhorse/internal/config/config.go')
-rw-r--r--workhorse/internal/config/config.go154
1 files changed, 154 insertions, 0 deletions
diff --git a/workhorse/internal/config/config.go b/workhorse/internal/config/config.go
new file mode 100644
index 00000000000..84849c72744
--- /dev/null
+++ b/workhorse/internal/config/config.go
@@ -0,0 +1,154 @@
+package config
+
+import (
+ "math"
+ "net/url"
+ "runtime"
+ "strings"
+ "time"
+
+ "github.com/Azure/azure-storage-blob-go/azblob"
+ "github.com/BurntSushi/toml"
+ "gitlab.com/gitlab-org/labkit/log"
+ "gocloud.dev/blob"
+ "gocloud.dev/blob/azureblob"
+)
+
+type TomlURL struct {
+ url.URL
+}
+
+func (u *TomlURL) UnmarshalText(text []byte) error {
+ temp, err := url.Parse(string(text))
+ u.URL = *temp
+ return err
+}
+
+type TomlDuration struct {
+ time.Duration
+}
+
+func (d *TomlDuration) UnmarshalTest(text []byte) error {
+ temp, err := time.ParseDuration(string(text))
+ d.Duration = temp
+ return err
+}
+
+type ObjectStorageCredentials struct {
+ Provider string
+
+ S3Credentials S3Credentials `toml:"s3"`
+ AzureCredentials AzureCredentials `toml:"azurerm"`
+}
+
+type ObjectStorageConfig struct {
+ URLMux *blob.URLMux `toml:"-"`
+}
+
+type S3Credentials struct {
+ AwsAccessKeyID string `toml:"aws_access_key_id"`
+ AwsSecretAccessKey string `toml:"aws_secret_access_key"`
+}
+
+type S3Config struct {
+ Region string `toml:"-"`
+ Bucket string `toml:"-"`
+ PathStyle bool `toml:"-"`
+ Endpoint string `toml:"-"`
+ UseIamProfile bool `toml:"-"`
+ ServerSideEncryption string `toml:"-"` // Server-side encryption mode (e.g. AES256, aws:kms)
+ SSEKMSKeyID string `toml:"-"` // Server-side encryption key-management service key ID (e.g. arn:aws:xxx)
+}
+
+type GoCloudConfig struct {
+ URL string `toml:"-"`
+}
+
+type AzureCredentials struct {
+ AccountName string `toml:"azure_storage_account_name"`
+ AccountKey string `toml:"azure_storage_access_key"`
+}
+
+type RedisConfig struct {
+ URL TomlURL
+ Sentinel []TomlURL
+ SentinelMaster string
+ Password string
+ DB *int
+ ReadTimeout *TomlDuration
+ WriteTimeout *TomlDuration
+ KeepAlivePeriod *TomlDuration
+ MaxIdle *int
+ MaxActive *int
+}
+
+type ImageResizerConfig struct {
+ MaxScalerProcs uint32 `toml:"max_scaler_procs"`
+ MaxFilesize uint64 `toml:"max_filesize"`
+}
+
+type Config struct {
+ Redis *RedisConfig `toml:"redis"`
+ Backend *url.URL `toml:"-"`
+ CableBackend *url.URL `toml:"-"`
+ Version string `toml:"-"`
+ DocumentRoot string `toml:"-"`
+ DevelopmentMode bool `toml:"-"`
+ Socket string `toml:"-"`
+ CableSocket string `toml:"-"`
+ ProxyHeadersTimeout time.Duration `toml:"-"`
+ APILimit uint `toml:"-"`
+ APIQueueLimit uint `toml:"-"`
+ APIQueueTimeout time.Duration `toml:"-"`
+ APICILongPollingDuration time.Duration `toml:"-"`
+ ObjectStorageConfig ObjectStorageConfig `toml:"-"`
+ ObjectStorageCredentials ObjectStorageCredentials `toml:"object_storage"`
+ PropagateCorrelationID bool `toml:"-"`
+ ImageResizerConfig ImageResizerConfig `toml:"image_resizer"`
+ AltDocumentRoot string `toml:"alt_document_root"`
+}
+
+var DefaultImageResizerConfig = ImageResizerConfig{
+ MaxScalerProcs: uint32(math.Max(2, float64(runtime.NumCPU())/2)),
+ MaxFilesize: 250 * 1000, // 250kB,
+}
+
+func LoadConfig(data string) (*Config, error) {
+ cfg := &Config{ImageResizerConfig: DefaultImageResizerConfig}
+
+ if _, err := toml.Decode(data, cfg); err != nil {
+ return nil, err
+ }
+
+ return cfg, nil
+}
+
+func (c *Config) RegisterGoCloudURLOpeners() error {
+ c.ObjectStorageConfig.URLMux = new(blob.URLMux)
+
+ creds := c.ObjectStorageCredentials
+ if strings.EqualFold(creds.Provider, "AzureRM") && creds.AzureCredentials.AccountName != "" && creds.AzureCredentials.AccountKey != "" {
+ accountName := azureblob.AccountName(creds.AzureCredentials.AccountName)
+ accountKey := azureblob.AccountKey(creds.AzureCredentials.AccountKey)
+
+ credential, err := azureblob.NewCredential(accountName, accountKey)
+ if err != nil {
+ log.WithError(err).Error("error creating Azure credentials")
+ return err
+ }
+
+ pipeline := azureblob.NewPipeline(credential, azblob.PipelineOptions{})
+
+ azureURLOpener := &azureURLOpener{
+ &azureblob.URLOpener{
+ AccountName: accountName,
+ Pipeline: pipeline,
+ Options: azureblob.Options{Credential: credential},
+ },
+ }
+
+ c.ObjectStorageConfig.URLMux.RegisterBucket(azureblob.Scheme, azureURLOpener)
+ }
+
+ return nil
+}