mirror of
https://github.com/1Panel-dev/1Panel.git
synced 2024-12-14 08:39:30 +08:00
252 lines
7.0 KiB
Go
252 lines
7.0 KiB
Go
package migrations
|
|
|
|
import (
|
|
"encoding/base64"
|
|
"encoding/json"
|
|
"time"
|
|
|
|
"github.com/1Panel-dev/1Panel/backend/app/dto/request"
|
|
"github.com/1Panel-dev/1Panel/backend/app/model"
|
|
"github.com/1Panel-dev/1Panel/backend/app/repo"
|
|
"github.com/1Panel-dev/1Panel/backend/app/service"
|
|
"github.com/1Panel-dev/1Panel/backend/constant"
|
|
"github.com/1Panel-dev/1Panel/backend/global"
|
|
"github.com/1Panel-dev/1Panel/backend/utils/cloud_storage/client"
|
|
"github.com/go-gormigrate/gormigrate/v2"
|
|
"gorm.io/gorm"
|
|
)
|
|
|
|
var UpdateAcmeAccount = &gormigrate.Migration{
|
|
ID: "20231117-update-acme-account",
|
|
Migrate: func(tx *gorm.DB) error {
|
|
if err := tx.AutoMigrate(&model.WebsiteAcmeAccount{}); err != nil {
|
|
return err
|
|
}
|
|
return nil
|
|
},
|
|
}
|
|
|
|
var AddWebsiteCA = &gormigrate.Migration{
|
|
ID: "20231125-add-website-ca",
|
|
Migrate: func(tx *gorm.DB) error {
|
|
if err := tx.AutoMigrate(&model.WebsiteCA{}); err != nil {
|
|
return err
|
|
}
|
|
return nil
|
|
},
|
|
}
|
|
|
|
var UpdateWebsiteSSL = &gormigrate.Migration{
|
|
ID: "20231128-update-website-ssl",
|
|
Migrate: func(tx *gorm.DB) error {
|
|
if err := tx.AutoMigrate(&model.WebsiteSSL{}); err != nil {
|
|
return err
|
|
}
|
|
return nil
|
|
},
|
|
}
|
|
|
|
var AddDockerSockPath = &gormigrate.Migration{
|
|
ID: "20231128-add-docker-sock-path",
|
|
Migrate: func(tx *gorm.DB) error {
|
|
if err := tx.Create(&model.Setting{Key: "DockerSockPath", Value: "unix:///var/run/docker.sock"}).Error; err != nil {
|
|
return err
|
|
}
|
|
return nil
|
|
},
|
|
}
|
|
|
|
var AddDatabaseSSL = &gormigrate.Migration{
|
|
ID: "20231126-add-database-ssl",
|
|
Migrate: func(tx *gorm.DB) error {
|
|
if err := tx.AutoMigrate(&model.Database{}); err != nil {
|
|
return err
|
|
}
|
|
return nil
|
|
},
|
|
}
|
|
|
|
var AddDefaultCA = &gormigrate.Migration{
|
|
ID: "20231129-add-default-ca",
|
|
Migrate: func(tx *gorm.DB) error {
|
|
caService := service.NewIWebsiteCAService()
|
|
if _, err := caService.Create(request.WebsiteCACreate{
|
|
CommonName: "1Panel-CA",
|
|
Country: "CN",
|
|
KeyType: "P256",
|
|
Name: "1Panel",
|
|
Organization: "FIT2CLOUD",
|
|
OrganizationUint: "1Panel",
|
|
Province: "Beijing",
|
|
City: "Beijing",
|
|
}); err != nil {
|
|
return err
|
|
}
|
|
return nil
|
|
},
|
|
}
|
|
|
|
var AddSettingRecycleBin = &gormigrate.Migration{
|
|
ID: "20231129-add-setting-recycle-bin",
|
|
Migrate: func(tx *gorm.DB) error {
|
|
if err := tx.Create(&model.Setting{Key: "FileRecycleBin", Value: "enable"}).Error; err != nil {
|
|
return err
|
|
}
|
|
return nil
|
|
},
|
|
}
|
|
|
|
var UpdateWebsiteBackupRecord = &gormigrate.Migration{
|
|
ID: "20231218-update-backup-record-for-website",
|
|
Migrate: func(tx *gorm.DB) error {
|
|
backupRepo := repo.NewIBackupRepo()
|
|
websitesBackups, _ := backupRepo.ListRecord(repo.NewCommonRepo().WithByType("website"))
|
|
if len(websitesBackups) > 0 {
|
|
for _, backup := range websitesBackups {
|
|
backup.DetailName = backup.Name
|
|
_ = backupRepo.UpdateRecord(&backup)
|
|
}
|
|
}
|
|
return nil
|
|
},
|
|
}
|
|
|
|
var AddTablePHPExtensions = &gormigrate.Migration{
|
|
ID: "20240102-add-php-extensions",
|
|
Migrate: func(tx *gorm.DB) error {
|
|
if err := tx.AutoMigrate(&model.PHPExtensions{}); err != nil {
|
|
return err
|
|
}
|
|
if err := tx.Create(&model.PHPExtensions{Name: "默认", Extensions: "bcmath,gd,gettext,intl,pcntl,shmop,soap,sockets,sysvsem,xmlrpc,zip"}).Error; err != nil {
|
|
return err
|
|
}
|
|
return nil
|
|
},
|
|
}
|
|
|
|
var AddTableDatabasePostgresql = &gormigrate.Migration{
|
|
ID: "20231225-add-table-database_postgresql",
|
|
Migrate: func(tx *gorm.DB) error {
|
|
if err := tx.AutoMigrate(&model.DatabasePostgresql{}); err != nil {
|
|
return err
|
|
}
|
|
if err := tx.AutoMigrate(&model.Cronjob{}); err != nil {
|
|
return err
|
|
}
|
|
var jobs []model.Cronjob
|
|
if err := tx.Where("type == ?", "database").Find(&jobs).Error; err != nil {
|
|
return err
|
|
}
|
|
for _, job := range jobs {
|
|
if job.DBName == "all" {
|
|
if err := tx.Model(&model.Cronjob{}).Where("id = ?", job.ID).Update("db_type", "mysql").Error; err != nil {
|
|
global.LOG.Errorf("update db type of cronjob %s failed, err: %v", job.Name, err)
|
|
continue
|
|
}
|
|
}
|
|
var db model.DatabaseMysql
|
|
if err := tx.Where("id == ?", job.DBName).First(&db).Error; err != nil {
|
|
continue
|
|
}
|
|
var database model.Database
|
|
if err := tx.Where("name == ?", db.MysqlName).First(&database).Error; err != nil {
|
|
continue
|
|
}
|
|
if err := tx.Model(&model.Cronjob{}).Where("id = ?", job.ID).Update("db_type", database.Type).Error; err != nil {
|
|
global.LOG.Errorf("update db type of cronjob %s failed, err: %v", job.Name, err)
|
|
continue
|
|
}
|
|
}
|
|
return nil
|
|
},
|
|
}
|
|
|
|
var AddPostgresqlSuperUser = &gormigrate.Migration{
|
|
ID: "20231225-add-postgresql-super_user",
|
|
Migrate: func(tx *gorm.DB) error {
|
|
if err := tx.AutoMigrate(&model.DatabasePostgresql{}); err != nil {
|
|
return err
|
|
}
|
|
return nil
|
|
},
|
|
}
|
|
|
|
var UpdateCronjobWithWebsite = &gormigrate.Migration{
|
|
ID: "20230809-update-cronjob-with-website",
|
|
Migrate: func(tx *gorm.DB) error {
|
|
var cronjobs []model.Cronjob
|
|
if err := tx.Where("(type = ? OR type = ?) AND website != ?", "website", "cutWebsiteLog", "all").Find(&cronjobs).Error; err != nil {
|
|
return err
|
|
}
|
|
|
|
for _, job := range cronjobs {
|
|
var web model.Website
|
|
if err := tx.Where("primary_domain = ?", job.Website).First(&web).Error; err != nil {
|
|
continue
|
|
}
|
|
if err := tx.Model(&model.Cronjob{}).
|
|
Where("id = ?", job.ID).
|
|
Updates(map[string]interface{}{"website": web.ID}).Error; err != nil {
|
|
continue
|
|
}
|
|
}
|
|
|
|
return nil
|
|
},
|
|
}
|
|
|
|
var UpdateOneDriveToken = &gormigrate.Migration{
|
|
ID: "20240117-update-onedrive-token",
|
|
Migrate: func(tx *gorm.DB) error {
|
|
var (
|
|
backup model.BackupAccount
|
|
clientSetting model.Setting
|
|
secretSetting model.Setting
|
|
)
|
|
_ = tx.Where("type = ?", "OneDrive").First(&backup).Error
|
|
if backup.ID == 0 {
|
|
return nil
|
|
}
|
|
if len(backup.Credential) == 0 {
|
|
global.LOG.Error("OneDrive configuration lacks token information, please rebind.")
|
|
return nil
|
|
}
|
|
|
|
_ = tx.Where("key = ?", "OneDriveID").First(&clientSetting).Error
|
|
if clientSetting.ID == 0 {
|
|
global.LOG.Error("system configuration lacks clientID information, please retry.")
|
|
return nil
|
|
}
|
|
_ = tx.Where("key = ?", "OneDriveSc").First(&secretSetting).Error
|
|
if secretSetting.ID == 0 {
|
|
global.LOG.Error("system configuration lacks clientID information, please retry.")
|
|
return nil
|
|
}
|
|
idItem, _ := base64.StdEncoding.DecodeString(clientSetting.Value)
|
|
global.CONF.System.OneDriveID = string(idItem)
|
|
scItem, _ := base64.StdEncoding.DecodeString(secretSetting.Value)
|
|
global.CONF.System.OneDriveSc = string(scItem)
|
|
|
|
varMap := make(map[string]interface{})
|
|
token, refreshToken, err := client.RefreshToken("refresh_token", backup.Credential)
|
|
varMap["refresh_status"] = constant.StatusSuccess
|
|
varMap["refresh_time"] = time.Now().Format("2006-01-02 15:04:05")
|
|
if err != nil {
|
|
varMap["refresh_msg"] = err.Error()
|
|
varMap["refresh_status"] = constant.StatusFailed
|
|
}
|
|
varMap["refresh_token"] = refreshToken
|
|
itemVars, _ := json.Marshal(varMap)
|
|
if err := tx.Model(&model.BackupAccount{}).
|
|
Where("id = ?", backup.ID).
|
|
Updates(map[string]interface{}{
|
|
"credential": token,
|
|
"vars": string(itemVars),
|
|
}).Error; err != nil {
|
|
return err
|
|
}
|
|
|
|
return nil
|
|
},
|
|
}
|