123456789101112131415161718192021222324252627282930313233343536373839404142434445464748495051525354555657585960616263646566676869707172737475767778798081828384858687888990919293949596979899100101102103104105106107108109110111112113114115116117118119120121122123124125126127128129130131132133134135136137138139140141142143144145146147148149150151152153154155156157158159160161162163164165166167168169170171172173174175176177178179180181182183184185186187188189190191192193194195196197198199200201202203204205206207208209210211212213214215216217218219220221222223224225226227228229230231232233234235236237238239240241242243244245246247248249250251252253254255256257258259260261262263264265266267268269270271272273274275276277278279280281282283284285286287288289290291292293294295296297298299300301302303304305306307308309310311312313314315316317318319320321322323324325326327328329330331332333334335336 |
- package main
- import (
- "context"
- "crypto/md5"
- "encoding/json"
- "fmt"
- "io/ioutil"
- "net/http"
- "net/url"
- "os"
- "os/signal"
- "path/filepath"
- "strconv"
- "strings"
- "time"
- api "github.com/willie68/schematic-service-go/api"
- "github.com/willie68/schematic-service-go/health"
- "github.com/willie68/schematic-service-go/internal/crypt"
- consulApi "github.com/hashicorp/consul/api"
- config "github.com/willie68/schematic-service-go/config"
- "github.com/willie68/schematic-service-go/dao"
- "github.com/willie68/schematic-service-go/logging"
- "github.com/willie68/schematic-service-go/model"
- "github.com/go-chi/chi"
- "github.com/go-chi/chi/middleware"
- "github.com/go-chi/render"
- flag "github.com/spf13/pflag"
- )
- /*
- apiVersion implementing api version for this service
- */
- const apiVersion = "1"
- const servicename = "gomicro"
- var port int
- var sslport int
- var system string
- var serviceURL string
- var registryURL string
- var apikey string
- var ssl bool
- var configFile string
- var serviceConfig config.Config
- var consulAgent *consulApi.Agent
- var log logging.ServiceLogger
- func init() {
- // variables for parameter override
- ssl = false
- log.Info("init service")
- flag.IntVarP(&port, "port", "p", 0, "port of the http server.")
- flag.IntVarP(&sslport, "sslport", "t", 0, "port of the https server.")
- flag.StringVarP(&system, "systemid", "s", "", "this is the systemid of this service. Used for the apikey generation")
- flag.StringVarP(&configFile, "config", "c", config.File, "this is the path and filename to the config file")
- flag.StringVarP(&serviceURL, "serviceURL", "u", "", "service url from outside")
- flag.StringVarP(®istryURL, "registryURL", "r", "", "registry url where to connect to consul")
- }
- func routes() *chi.Mux {
- myHandler := api.NewSysAPIHandler(serviceConfig.SystemID, apikey)
- baseURL := fmt.Sprintf("/api/v%s", apiVersion)
- router := chi.NewRouter()
- router.Use(
- render.SetContentType(render.ContentTypeJSON),
- middleware.Logger,
- middleware.DefaultCompress,
- middleware.Recoverer,
- myHandler.Handler,
- )
- router.Route("/", func(r chi.Router) {
- r.Mount(baseURL+"/config", api.ConfigRoutes())
- r.Mount("/health", health.Routes())
- })
- return router
- }
- func healthRoutes() *chi.Mux {
- router := chi.NewRouter()
- router.Use(
- render.SetContentType(render.ContentTypeJSON),
- middleware.Logger,
- middleware.DefaultCompress,
- middleware.Recoverer,
- )
- router.Route("/", func(r chi.Router) {
- r.Mount("/health", health.Routes())
- })
- return router
- }
- func main() {
- log.Info("starting server")
- flag.Parse()
- config.File = configFile
- if err := config.Load(); err != nil {
- log.Alertf("can't load config file: %s", err.Error())
- }
- serviceConfig = config.Get()
- initConfig()
- initGraylog()
- healthCheckConfig := health.CheckConfig(serviceConfig.HealthCheck)
- health.InitHealthSystem(healthCheckConfig)
- defer log.Close()
- if serviceConfig.SystemID == "" {
- log.Fatal("system id not given, can't start! Please use config file or -s parameter")
- }
- gc := crypt.GenerateCertificate{
- Organization: "MCS Media Computer Spftware",
- Host: "127.0.0.1",
- ValidFor: 10 * 365 * 24 * time.Hour,
- IsCA: false,
- EcdsaCurve: "P256",
- Ed25519Key: true,
- }
- if serviceConfig.Sslport > 0 {
- ssl = true
- log.Info("ssl active")
- }
- dao.InitDB(config.Get().MongoDB)
- importData()
- api.SystemID = serviceConfig.SystemID
- apikey = getApikey()
- api.APIKey = apikey
- log.Infof("systemid: %s", serviceConfig.SystemID)
- log.Infof("apikey: %s", apikey)
- log.Infof("ssl: %t", ssl)
- log.Infof("serviceURL: %s", serviceConfig.ServiceURL)
- if serviceConfig.RegistryURL != "" {
- log.Infof("registryURL: %s", serviceConfig.RegistryURL)
- }
- router := routes()
- walkFunc := func(method string, route string, handler http.Handler, middlewares ...func(http.Handler) http.Handler) error {
- log.Infof("%s %s", method, route)
- return nil
- }
- if err := chi.Walk(router, walkFunc); err != nil {
- log.Alertf("Logging err: %s", err.Error())
- }
- log.Info("Health routes")
- healthRouter := healthRoutes()
- if err := chi.Walk(healthRouter, walkFunc); err != nil {
- log.Alertf("Logging err: %s", err.Error())
- }
- var sslsrv *http.Server
- if ssl {
- tlsConfig, err := gc.GenerateTLSConfig()
- if err != nil {
- log.Alertf("logging err: %s", err.Error())
- }
- sslsrv = &http.Server{
- Addr: "0.0.0.0:" + strconv.Itoa(serviceConfig.Sslport),
- WriteTimeout: time.Second * 15,
- ReadTimeout: time.Second * 15,
- IdleTimeout: time.Second * 60,
- Handler: router,
- TLSConfig: tlsConfig,
- }
- go func() {
- log.Infof("starting https server on address: %s", sslsrv.Addr)
- if err := sslsrv.ListenAndServeTLS("", ""); err != nil {
- log.Alertf("error starting server: %s", err.Error())
- }
- }()
- }
- // own http server for the healthchecks
- srv := &http.Server{
- Addr: "0.0.0.0:" + strconv.Itoa(serviceConfig.Port),
- WriteTimeout: time.Second * 15,
- ReadTimeout: time.Second * 15,
- IdleTimeout: time.Second * 60,
- Handler: healthRouter,
- }
- go func() {
- log.Infof("starting http server on address: %s", srv.Addr)
- if err := srv.ListenAndServe(); err != nil {
- log.Alertf("error starting server: %s", err.Error())
- }
- }()
- if serviceConfig.RegistryURL != "" {
- initRegistry()
- }
- c := make(chan os.Signal, 1)
- signal.Notify(c, os.Interrupt)
- <-c
- log.Info("waiting for clients")
- ctx, cancel := context.WithTimeout(context.Background(), time.Second*15)
- defer cancel()
- srv.Shutdown(ctx)
- if ssl {
- sslsrv.Shutdown(ctx)
- }
- log.Info("finished")
- os.Exit(0)
- }
- func initGraylog() {
- log.GelfURL = serviceConfig.Logging.Gelfurl
- log.GelfPort = serviceConfig.Logging.Gelfport
- log.SystemID = serviceConfig.SystemID
- log.InitGelf()
- }
- func initRegistry() {
- //register to consul, if configured
- consulConfig := consulApi.DefaultConfig()
- consulURL, err := url.Parse(serviceConfig.RegistryURL)
- consulConfig.Scheme = consulURL.Scheme
- consulConfig.Address = fmt.Sprintf("%s:%s", consulURL.Hostname(), consulURL.Port())
- consulClient, err := consulApi.NewClient(consulConfig)
- if err != nil {
- log.Alertf("can't connect to consul. %v", err)
- }
- consulAgent = consulClient.Agent()
- check := new(consulApi.AgentServiceCheck)
- check.HTTP = fmt.Sprintf("%s/health/health", serviceConfig.ServiceURL)
- check.Timeout = (time.Minute * 1).String()
- check.Interval = (time.Second * 30).String()
- check.TLSSkipVerify = true
- serviceDef := &consulApi.AgentServiceRegistration{
- Name: servicename,
- Check: check,
- }
- err = consulAgent.ServiceRegister(serviceDef)
- if err != nil {
- log.Alertf("can't register to consul. %s", err)
- time.Sleep(time.Second * 60)
- }
- }
- func initConfig() {
- if port > 0 {
- serviceConfig.Port = port
- }
- if sslport > 0 {
- serviceConfig.Sslport = sslport
- }
- if system != "" {
- serviceConfig.SystemID = system
- }
- if serviceURL != "" {
- serviceConfig.ServiceURL = serviceURL
- }
- }
- func getApikey() string {
- value := fmt.Sprintf("%s_%s", servicename, serviceConfig.SystemID)
- apikey := fmt.Sprintf("%x", md5.Sum([]byte(value)))
- return strings.ToLower(apikey)
- }
- func importData() {
- count := 0
- dir := "E:/temp/backup/schematic/LIVE/"
- err := filepath.Walk(dir, func(path string, info os.FileInfo, err error) error {
- if info != nil {
- if info.IsDir() {
- filepath := path + "/schematic.json"
- _, err := os.Stat(filepath)
- if !os.IsNotExist(err) {
- count++
- schematic := getSchematic(filepath)
- fileids := make([]string, 0)
- for _, f := range schematic.Files {
- fileid, err := dao.AddFile(path + "/" + f)
- if err != nil {
- fmt.Printf("%v\n", err)
- } else {
- fmt.Printf("fileid: %s\n", fileid)
- fileids = append(fileids, fileid)
- }
- }
- schematic.Files = fileids
- id, err := dao.CreateSchematic(schematic)
- fmt.Printf("%v\n", err)
- fmt.Printf("%d: found %s: man: %s, model: %s\n", count, id, schematic.Manufacturer, schematic.Model)
- }
- }
- }
- return nil
- })
- if err != nil {
- fmt.Printf("%v\n", err)
- }
- }
- func getSchematic(file string) model.Schematic {
- jsonFile, err := os.Open(file)
- // if we os.Open returns an error then handle it
- if err != nil {
- fmt.Printf("%v\n", err)
- }
- // defer the closing of our jsonFile so that we can parse it later on
- defer jsonFile.Close()
- byteValue, _ := ioutil.ReadAll(jsonFile)
- // fmt.Println(string(byteValue))
- var schematic model.Schematic
- err = json.Unmarshal(byteValue, &schematic)
- if err != nil {
- fmt.Printf("%v\n", err)
- }
- return schematic
- }
|