mirror of
https://github.com/opencloud-eu/opencloud.git
synced 2025-12-27 08:10:35 -05:00
135 lines
4.9 KiB
Go
135 lines
4.9 KiB
Go
package command
|
|
|
|
import (
|
|
"context"
|
|
"fmt"
|
|
"os/signal"
|
|
|
|
"github.com/opencloud-eu/opencloud/pkg/broker"
|
|
"github.com/opencloud-eu/opencloud/pkg/config/configlog"
|
|
"github.com/opencloud-eu/opencloud/pkg/registry"
|
|
"github.com/opencloud-eu/opencloud/pkg/runner"
|
|
ohttp "github.com/opencloud-eu/opencloud/pkg/service/http"
|
|
"github.com/opencloud-eu/opencloud/pkg/tracing"
|
|
"github.com/opencloud-eu/opencloud/pkg/version"
|
|
"github.com/opencloud-eu/opencloud/services/ocdav/pkg/config"
|
|
"github.com/opencloud-eu/opencloud/services/ocdav/pkg/config/parser"
|
|
"github.com/opencloud-eu/opencloud/services/ocdav/pkg/logging"
|
|
"github.com/opencloud-eu/opencloud/services/ocdav/pkg/server/debug"
|
|
"github.com/opencloud-eu/reva/v2/pkg/micro/ocdav"
|
|
"github.com/opencloud-eu/reva/v2/pkg/sharedconf"
|
|
|
|
"github.com/spf13/cobra"
|
|
)
|
|
|
|
// Server is the entry point for the server command.
|
|
func Server(cfg *config.Config) *cobra.Command {
|
|
return &cobra.Command{
|
|
Use: "server",
|
|
Short: fmt.Sprintf("start the %s service without runtime (unsupervised mode)", cfg.Service.Name),
|
|
PreRunE: func(cmd *cobra.Command, args []string) error {
|
|
return configlog.ReturnFatal(parser.ParseConfig(cfg))
|
|
},
|
|
RunE: func(cmd *cobra.Command, args []string) error {
|
|
logger := logging.Configure(cfg.Service.Name, cfg.Log)
|
|
traceProvider, err := tracing.GetTraceProvider(cmd.Context(), cfg.Commons.TracesExporter, cfg.Service.Name)
|
|
if err != nil {
|
|
return err
|
|
}
|
|
|
|
var cancel context.CancelFunc
|
|
if cfg.Context == nil {
|
|
cfg.Context, cancel = signal.NotifyContext(context.Background(), runner.StopSignals...)
|
|
defer cancel()
|
|
}
|
|
ctx := cfg.Context
|
|
|
|
gr := runner.NewGroup()
|
|
|
|
// init reva shared config explicitly as the go-micro based ocdav does not use
|
|
// the reva runtime. But we need e.g. the shared client settings to be initialized
|
|
sc := map[string]interface{}{
|
|
"jwt_secret": cfg.TokenManager.JWTSecret,
|
|
"gatewaysvc": cfg.Reva.Address,
|
|
"skip_user_groups_in_token": cfg.SkipUserGroupsInToken,
|
|
"grpc_client_options": cfg.Reva.GetGRPCClientConfig(),
|
|
}
|
|
if err := sharedconf.Decode(sc); err != nil {
|
|
logger.Error().Err(err).Msg("error decoding shared config for ocdav")
|
|
}
|
|
opts := []ocdav.Option{
|
|
ocdav.Name(cfg.HTTP.Namespace + "." + cfg.Service.Name),
|
|
ocdav.Version(version.GetString()),
|
|
ocdav.Context(ctx),
|
|
ocdav.Logger(logger.Logger),
|
|
ocdav.Address(cfg.HTTP.Addr),
|
|
ocdav.AllowCredentials(cfg.HTTP.CORS.AllowCredentials),
|
|
ocdav.AllowedMethods(cfg.HTTP.CORS.AllowedMethods),
|
|
ocdav.AllowedHeaders(cfg.HTTP.CORS.AllowedHeaders),
|
|
ocdav.AllowedOrigins(cfg.HTTP.CORS.AllowedOrigins),
|
|
ocdav.FilesNamespace(cfg.FilesNamespace),
|
|
ocdav.WebdavNamespace(cfg.WebdavNamespace),
|
|
ocdav.OCMNamespace(cfg.OCMNamespace),
|
|
ocdav.AllowDepthInfinity(cfg.AllowPropfindDepthInfinity),
|
|
ocdav.SharesNamespace(cfg.SharesNamespace),
|
|
ocdav.Timeout(cfg.Timeout),
|
|
ocdav.Insecure(cfg.Insecure),
|
|
ocdav.PublicURL(cfg.PublicURL),
|
|
ocdav.Prefix(cfg.HTTP.Prefix),
|
|
ocdav.GatewaySvc(cfg.Reva.Address),
|
|
ocdav.JWTSecret(cfg.TokenManager.JWTSecret),
|
|
ocdav.ProductName(cfg.Status.ProductName),
|
|
ocdav.ProductVersion(cfg.Status.ProductVersion),
|
|
ocdav.Product(cfg.Status.Product),
|
|
ocdav.Version(cfg.Status.Version),
|
|
ocdav.VersionString(cfg.Status.VersionString),
|
|
ocdav.Edition(cfg.Status.Edition),
|
|
ocdav.MachineAuthAPIKey(cfg.MachineAuthAPIKey),
|
|
ocdav.Broker(broker.NoOp{}),
|
|
// ocdav.FavoriteManager() // FIXME needs a proper persistence implementation https://github.com/owncloud/ocis/issues/1228
|
|
// ocdav.LockSystem(), // will default to the CS3 lock system
|
|
// ocdav.TLSConfig() // tls config for the http server
|
|
ocdav.MetricsEnabled(true),
|
|
ocdav.MetricsNamespace("ocis"),
|
|
ocdav.WithTraceProvider(traceProvider),
|
|
ocdav.RegisterTTL(registry.GetRegisterTTL()),
|
|
ocdav.RegisterInterval(registry.GetRegisterInterval()),
|
|
ocdav.URLSigningSharedSecret(cfg.Commons.URLSigningSecret),
|
|
}
|
|
|
|
s, err := ocdav.Service(opts...)
|
|
if err != nil {
|
|
return err
|
|
}
|
|
|
|
// creating a runner for a go-micro service is a bit complex, so we'll
|
|
// wrap the go-micro service with an ocis service the same way as
|
|
// ocis-pkg/service/http is doing in order to reuse the factory.
|
|
gr.Add(runner.NewGoMicroHttpServerRunner(cfg.Service.Name+".http", ohttp.Service{Service: s}))
|
|
|
|
debugServer, err := debug.Server(
|
|
debug.Logger(logger),
|
|
debug.Context(ctx),
|
|
debug.Config(cfg),
|
|
)
|
|
|
|
if err != nil {
|
|
logger.Info().Err(err).Str("server", "debug").Msg("Failed to initialize server")
|
|
return err
|
|
}
|
|
|
|
gr.Add(runner.NewGolangHttpServerRunner(cfg.Service.Name+".debug", debugServer))
|
|
|
|
grResults := gr.Run(ctx)
|
|
|
|
// return the first non-nil error found in the results
|
|
for _, grResult := range grResults {
|
|
if grResult.RunnerError != nil {
|
|
return grResult.RunnerError
|
|
}
|
|
}
|
|
return nil
|
|
},
|
|
}
|
|
}
|