mirror of
https://github.com/onepanelio/onepanel.git
synced 2025-09-27 01:56:03 +08:00
148 lines
4.7 KiB
Go
148 lines
4.7 KiB
Go
package main
|
|
|
|
import (
|
|
"context"
|
|
"flag"
|
|
"fmt"
|
|
"net"
|
|
"net/http"
|
|
|
|
"google.golang.org/grpc/codes"
|
|
"google.golang.org/grpc/status"
|
|
|
|
"github.com/gorilla/handlers"
|
|
grpc_middleware "github.com/grpc-ecosystem/go-grpc-middleware"
|
|
grpc_logrus "github.com/grpc-ecosystem/go-grpc-middleware/logging/logrus"
|
|
grpc_recovery "github.com/grpc-ecosystem/go-grpc-middleware/recovery"
|
|
"github.com/grpc-ecosystem/grpc-gateway/runtime"
|
|
"github.com/jmoiron/sqlx"
|
|
"github.com/onepanelio/core/api"
|
|
v1 "github.com/onepanelio/core/pkg"
|
|
"github.com/onepanelio/core/pkg/util/env"
|
|
"github.com/onepanelio/core/server"
|
|
"github.com/onepanelio/core/server/auth"
|
|
"github.com/pressly/goose"
|
|
log "github.com/sirupsen/logrus"
|
|
"github.com/tmc/grpc-websocket-proxy/wsproxy"
|
|
"google.golang.org/grpc"
|
|
)
|
|
|
|
var (
|
|
rpcPort = flag.String("rpc-port", ":8887", "RPC Port")
|
|
httpPort = flag.String("http-port", ":8888", "RPC Port")
|
|
recoveryFunc grpc_recovery.RecoveryHandlerFunc
|
|
)
|
|
|
|
func main() {
|
|
flag.Parse()
|
|
|
|
kubeConfig := v1.NewConfig()
|
|
client, err := v1.NewClient(kubeConfig, nil)
|
|
if err != nil {
|
|
return
|
|
}
|
|
config, err := client.GetSystemConfig()
|
|
if err != nil {
|
|
log.Fatalf("Failed to get system config: %v", err)
|
|
}
|
|
|
|
databaseDataSourceName := fmt.Sprintf("host=%v user=%v password=%v dbname=%v sslmode=disable",
|
|
config["databaseHost"], config["databaseUsername"], config["databasePassword"], config["databaseName"])
|
|
db := sqlx.MustConnect(config["databaseDriverName"], databaseDataSourceName)
|
|
if err := goose.Run("up", db.DB, "db"); err != nil {
|
|
log.Fatalf("Failed to run database migrations: %v", err)
|
|
}
|
|
|
|
go startRPCServer(db, kubeConfig)
|
|
startHTTPProxy()
|
|
}
|
|
|
|
func startRPCServer(db *v1.DB, kubeConfig *v1.Config) {
|
|
log.Printf("Starting RPC server on port %v", *rpcPort)
|
|
lis, err := net.Listen("tcp", *rpcPort)
|
|
if err != nil {
|
|
log.Fatalf("Failed to start RPC listener: %v", err)
|
|
}
|
|
|
|
// Recovery settings
|
|
recoveryFunc = func(p interface{}) (err error) {
|
|
return status.Errorf(codes.Unknown, "panic triggered: %v", p)
|
|
}
|
|
recoveryOpts := []grpc_recovery.Option{
|
|
grpc_recovery.WithRecoveryHandler(recoveryFunc),
|
|
}
|
|
|
|
// Logger settings
|
|
stdLogger := log.StandardLogger()
|
|
reportCaller := env.GetEnv("LOGGING_ENABLE_CALLER_TRACE", "false")
|
|
if reportCaller == "true" {
|
|
stdLogger.SetReportCaller(true)
|
|
}
|
|
logEntry := log.NewEntry(stdLogger)
|
|
|
|
s := grpc.NewServer(grpc.UnaryInterceptor(
|
|
grpc_middleware.ChainUnaryServer(
|
|
grpc_logrus.UnaryServerInterceptor(logEntry),
|
|
grpc_recovery.UnaryServerInterceptor(recoveryOpts...),
|
|
auth.AuthUnaryInterceptor(kubeConfig, db)),
|
|
), grpc.StreamInterceptor(
|
|
grpc_middleware.ChainStreamServer(
|
|
grpc_logrus.StreamServerInterceptor(logEntry),
|
|
grpc_recovery.StreamServerInterceptor(recoveryOpts...),
|
|
auth.AuthStreamingInterceptor(kubeConfig, db)),
|
|
))
|
|
api.RegisterWorkflowServiceServer(s, server.NewWorkflowServer())
|
|
api.RegisterSecretServiceServer(s, server.NewSecretServer())
|
|
api.RegisterNamespaceServiceServer(s, server.NewNamespaceServer())
|
|
|
|
if err := s.Serve(lis); err != nil {
|
|
log.Fatalf("Failed to serve RPC server: %v", err)
|
|
}
|
|
}
|
|
|
|
func startHTTPProxy() {
|
|
endpoint := "localhost" + *rpcPort
|
|
ctx := context.Background()
|
|
ctx, cancel := context.WithCancel(ctx)
|
|
defer cancel()
|
|
|
|
// Register gRPC server endpoint
|
|
// Note: Make sure the gRPC server is running properly and accessible
|
|
mux := runtime.NewServeMux()
|
|
opts := []grpc.DialOption{grpc.WithInsecure()}
|
|
|
|
registerHandler(api.RegisterWorkflowServiceHandlerFromEndpoint, ctx, mux, endpoint, opts)
|
|
registerHandler(api.RegisterSecretServiceHandlerFromEndpoint, ctx, mux, endpoint, opts)
|
|
registerHandler(api.RegisterNamespaceServiceHandlerFromEndpoint, ctx, mux, endpoint, opts)
|
|
|
|
log.Printf("Starting HTTP proxy on port %v", *httpPort)
|
|
|
|
// Allow all origins
|
|
ogValidator := func(str string) bool {
|
|
return true
|
|
}
|
|
|
|
// Allow Content-Type for JSON
|
|
allowedHeaders := handlers.AllowedHeaders([]string{"Content-Type", "Authorization"})
|
|
|
|
// Allow PUT. Have to include all others as it clears them out.
|
|
allowedMethods := handlers.AllowedMethods([]string{"HEAD", "GET", "POST", "PUT", "DELETE", "PATCH"})
|
|
|
|
if err := http.ListenAndServe(*httpPort, wsproxy.WebsocketProxy(
|
|
handlers.CORS(
|
|
handlers.AllowedOriginValidator(ogValidator), allowedHeaders, allowedMethods)(mux),
|
|
wsproxy.WithTokenCookieName("auth-token"),
|
|
)); err != nil {
|
|
log.Fatalf("Failed to serve HTTP listener: %v", err)
|
|
}
|
|
}
|
|
|
|
type registerFunc func(ctx context.Context, mux *runtime.ServeMux, endpoint string, opts []grpc.DialOption) error
|
|
|
|
func registerHandler(register registerFunc, ctx context.Context, mux *runtime.ServeMux, endpoint string, opts []grpc.DialOption) {
|
|
err := register(ctx, mux, endpoint, opts)
|
|
if err != nil {
|
|
log.Fatalf("Failed to register handler: %v", err)
|
|
}
|
|
}
|