mirror of
https://github.com/onepanelio/onepanel.git
synced 2025-09-27 10:02:10 +08:00
update: cache system config for entire application and not just per request
This commit is contained in:
2
db/db.go
2
db/db.go
@@ -8,7 +8,7 @@ import (
|
||||
|
||||
func getClient() (*v1.Client, error) {
|
||||
kubeConfig := v1.NewConfig()
|
||||
client, err := v1.NewClient(kubeConfig, nil)
|
||||
client, err := v1.NewClient(kubeConfig, nil, nil)
|
||||
if err != nil {
|
||||
return nil, err
|
||||
}
|
||||
|
14
main.go
14
main.go
@@ -38,11 +38,11 @@ func main() {
|
||||
flag.Parse()
|
||||
|
||||
kubeConfig := v1.NewConfig()
|
||||
client, err := v1.NewClient(kubeConfig, nil)
|
||||
client, err := v1.NewClient(kubeConfig, nil, nil)
|
||||
if err != nil {
|
||||
log.Fatalf("Failed to connect to Kubernetes cluster: %v", err)
|
||||
}
|
||||
config, err := client.GetSystemConfig()
|
||||
sysConfig, err := client.GetSystemConfig()
|
||||
if err != nil {
|
||||
log.Fatalf("Failed to get system config: %v", err)
|
||||
}
|
||||
@@ -50,16 +50,16 @@ func main() {
|
||||
databaseDataSourceName := fmt.Sprintf("host=%v user=%v password=%v dbname=%v sslmode=disable",
|
||||
config["databaseHost"], config["databaseUsername"], config["databasePassword"], config["databaseName"])
|
||||
|
||||
db := sqlx.MustConnect(config["databaseDriverName"], databaseDataSourceName)
|
||||
db := sqlx.MustConnect(sysConfig["databaseDriverName"], databaseDataSourceName)
|
||||
if err := goose.Run("up", db.DB, "db"); err != nil {
|
||||
log.Fatalf("Failed to run database migrations: %v", err)
|
||||
}
|
||||
|
||||
go startRPCServer(db, kubeConfig)
|
||||
go startRPCServer(db, kubeConfig, sysConfig)
|
||||
startHTTPProxy()
|
||||
}
|
||||
|
||||
func startRPCServer(db *v1.DB, kubeConfig *v1.Config) {
|
||||
func startRPCServer(db *v1.DB, kubeConfig *v1.Config, sysConfig v1.SystemConfig) {
|
||||
log.Printf("Starting RPC server on port %v", *rpcPort)
|
||||
lis, err := net.Listen("tcp", *rpcPort)
|
||||
if err != nil {
|
||||
@@ -86,12 +86,12 @@ func startRPCServer(db *v1.DB, kubeConfig *v1.Config) {
|
||||
grpc_middleware.ChainUnaryServer(
|
||||
grpc_logrus.UnaryServerInterceptor(logEntry),
|
||||
grpc_recovery.UnaryServerInterceptor(recoveryOpts...),
|
||||
auth.UnaryInterceptor(kubeConfig, db)),
|
||||
auth.UnaryInterceptor(kubeConfig, db, sysConfig)),
|
||||
), grpc.StreamInterceptor(
|
||||
grpc_middleware.ChainStreamServer(
|
||||
grpc_logrus.StreamServerInterceptor(logEntry),
|
||||
grpc_recovery.StreamServerInterceptor(recoveryOpts...),
|
||||
auth.StreamingInterceptor(kubeConfig, db)),
|
||||
auth.StreamingInterceptor(kubeConfig, db, sysConfig)),
|
||||
))
|
||||
api.RegisterWorkflowTemplateServiceServer(s, server.NewWorkflowTemplateServer())
|
||||
api.RegisterCronWorkflowServiceServer(s, server.NewCronWorkflowServer())
|
||||
|
@@ -21,7 +21,7 @@ type Client struct {
|
||||
kubernetes.Interface
|
||||
argoprojV1alpha1 argoprojv1alpha1.ArgoprojV1alpha1Interface
|
||||
*DB
|
||||
systemConfig map[string]string // cache of SystemConfig
|
||||
systemConfig SystemConfig
|
||||
}
|
||||
|
||||
func (c *Client) ArgoprojV1alpha1() argoprojv1alpha1.ArgoprojV1alpha1Interface {
|
||||
@@ -38,7 +38,7 @@ func NewConfig() (config *Config) {
|
||||
return
|
||||
}
|
||||
|
||||
func NewClient(config *Config, db *sqlx.DB) (client *Client, err error) {
|
||||
func NewClient(config *Config, db *sqlx.DB, systemConfig SystemConfig) (client *Client, err error) {
|
||||
if config.BearerToken != "" {
|
||||
config.BearerTokenFile = ""
|
||||
config.Username = ""
|
||||
@@ -57,7 +57,12 @@ func NewClient(config *Config, db *sqlx.DB) (client *Client, err error) {
|
||||
return
|
||||
}
|
||||
|
||||
return &Client{Interface: kubeClient, argoprojV1alpha1: argoClient, DB: db}, nil
|
||||
return &Client{
|
||||
Interface: kubeClient,
|
||||
argoprojV1alpha1: argoClient,
|
||||
DB: db,
|
||||
systemConfig: systemConfig,
|
||||
}, nil
|
||||
}
|
||||
|
||||
func (c *Client) GetS3Client(namespace string, config *ArtifactRepositoryS3Config) (s3Client *s3.Client, err error) {
|
||||
|
@@ -9,6 +9,8 @@ import (
|
||||
"sigs.k8s.io/yaml"
|
||||
)
|
||||
|
||||
type SystemConfig = map[string]string
|
||||
|
||||
func (c *Client) getConfigMap(namespace, name string) (configMap *ConfigMap, err error) {
|
||||
cm, err := c.CoreV1().ConfigMaps(namespace).Get(name, metav1.GetOptions{})
|
||||
if err != nil {
|
||||
|
@@ -46,14 +46,14 @@ func getBearerToken(ctx context.Context) (*string, bool) {
|
||||
return nil, false
|
||||
}
|
||||
|
||||
func getClient(ctx context.Context, kubeConfig *v1.Config, db *v1.DB) (context.Context, error) {
|
||||
func getClient(ctx context.Context, kubeConfig *v1.Config, db *v1.DB, sysConfig v1.SystemConfig) (context.Context, error) {
|
||||
bearerToken, ok := getBearerToken(ctx)
|
||||
if !ok {
|
||||
return nil, status.Error(codes.Unauthenticated, `Missing or invalid "authorization" header.`)
|
||||
}
|
||||
|
||||
kubeConfig.BearerToken = *bearerToken
|
||||
client, err := v1.NewClient(kubeConfig, db)
|
||||
client, err := v1.NewClient(kubeConfig, db, sysConfig)
|
||||
if err != nil {
|
||||
return nil, err
|
||||
}
|
||||
@@ -89,7 +89,7 @@ func IsAuthorized(c *v1.Client, namespace, verb, group, resource, name string) (
|
||||
// The two main cases are:
|
||||
// 1. Is the token valid? This is used for logging in.
|
||||
// 2. Is there a token? There should be a token for everything except logging in.
|
||||
func UnaryInterceptor(kubeConfig *v1.Config, db *v1.DB) grpc.UnaryServerInterceptor {
|
||||
func UnaryInterceptor(kubeConfig *v1.Config, db *v1.DB, sysConfig v1.SystemConfig) grpc.UnaryServerInterceptor {
|
||||
return func(ctx context.Context, req interface{}, info *grpc.UnaryServerInfo, handler grpc.UnaryHandler) (resp interface{}, err error) {
|
||||
if info.FullMethod == "/api.AuthService/IsValidToken" {
|
||||
md, ok := metadata.FromIncomingContext(ctx)
|
||||
@@ -104,7 +104,7 @@ func UnaryInterceptor(kubeConfig *v1.Config, db *v1.DB) grpc.UnaryServerIntercep
|
||||
|
||||
md.Set("authorization", tokenRequest.Token.Token)
|
||||
|
||||
ctx, err = getClient(ctx, kubeConfig, db)
|
||||
ctx, err = getClient(ctx, kubeConfig, db, sysConfig)
|
||||
if err != nil {
|
||||
ctx = nil
|
||||
}
|
||||
@@ -141,7 +141,7 @@ func UnaryInterceptor(kubeConfig *v1.Config, db *v1.DB) grpc.UnaryServerIntercep
|
||||
}
|
||||
|
||||
// This guy checks for the token
|
||||
ctx, err = getClient(ctx, kubeConfig, db)
|
||||
ctx, err = getClient(ctx, kubeConfig, db, sysConfig)
|
||||
if err != nil {
|
||||
return
|
||||
}
|
||||
@@ -150,9 +150,9 @@ func UnaryInterceptor(kubeConfig *v1.Config, db *v1.DB) grpc.UnaryServerIntercep
|
||||
}
|
||||
}
|
||||
|
||||
func StreamingInterceptor(kubeConfig *v1.Config, db *v1.DB) grpc.StreamServerInterceptor {
|
||||
func StreamingInterceptor(kubeConfig *v1.Config, db *v1.DB, sysConfig v1.SystemConfig) grpc.StreamServerInterceptor {
|
||||
return func(srv interface{}, ss grpc.ServerStream, info *grpc.StreamServerInfo, handler grpc.StreamHandler) (err error) {
|
||||
ctx, err := getClient(ss.Context(), kubeConfig, db)
|
||||
ctx, err := getClient(ss.Context(), kubeConfig, db, sysConfig)
|
||||
if err != nil {
|
||||
return
|
||||
}
|
||||
|
Reference in New Issue
Block a user