Swarm stack - Resource limits on all services, stop_grace_period 60s on api/worker/admin - Dozzle bound to manager loopback only (ssh -L required for access) - Worker health server on :6060, admin /api/health endpoint - Redis 200M LRU cap, B2/S3 env vars wired through to api service Deploy script - DRY_RUN=1 prints plan + exits - Auto-rollback on failed healthcheck, docker logout at end - Versioned-secret pruning keeps last SECRET_KEEP_VERSIONS (default 3) - PUSH_LATEST_TAG default flipped to false - B2 all-or-none validation before deploy Code - cmd/api takes pg_advisory_lock on a dedicated connection before AutoMigrate, serialising boot-time migrations across replicas - cmd/worker exposes an HTTP /health endpoint with graceful shutdown Docs - deploy/DEPLOYING.md: step-by-step walkthrough for a real deploy - deploy/shit_deploy_cant_do.md: manual prerequisites + recurring ops - deploy/README.md updated with storage toggle, worker-replica caveat, multi-arch recipe, connection-pool tuning, renumbered sections Co-Authored-By: Claude Opus 4.6 (1M context) <noreply@anthropic.com>
213 lines
6.4 KiB
Go
213 lines
6.4 KiB
Go
package main
|
|
|
|
import (
|
|
"context"
|
|
"fmt"
|
|
"net/http"
|
|
"os"
|
|
"os/signal"
|
|
"syscall"
|
|
"time"
|
|
|
|
"github.com/rs/zerolog/log"
|
|
"gorm.io/gorm"
|
|
|
|
"github.com/treytartt/honeydue-api/internal/config"
|
|
"github.com/treytartt/honeydue-api/internal/database"
|
|
"github.com/treytartt/honeydue-api/internal/i18n"
|
|
"github.com/treytartt/honeydue-api/internal/monitoring"
|
|
"github.com/treytartt/honeydue-api/internal/push"
|
|
"github.com/treytartt/honeydue-api/internal/router"
|
|
"github.com/treytartt/honeydue-api/internal/services"
|
|
"github.com/treytartt/honeydue-api/pkg/utils"
|
|
)
|
|
|
|
func main() {
|
|
// Load configuration
|
|
cfg, err := config.Load()
|
|
if err != nil {
|
|
fmt.Printf("Failed to load configuration: %v\n", err)
|
|
os.Exit(1)
|
|
}
|
|
|
|
// Initialize basic logger first (will be enhanced after Redis connects)
|
|
utils.InitLogger(cfg.Server.Debug)
|
|
|
|
// Initialize i18n
|
|
if err := i18n.Init(); err != nil {
|
|
log.Warn().Err(err).Msg("Failed to initialize i18n - using English only")
|
|
} else {
|
|
log.Info().Strs("languages", i18n.SupportedLanguages).Msg("i18n initialized")
|
|
}
|
|
|
|
log.Info().
|
|
Bool("debug", cfg.Server.Debug).
|
|
Int("port", cfg.Server.Port).
|
|
Str("db_host", cfg.Database.Host).
|
|
Int("db_port", cfg.Database.Port).
|
|
Str("db_name", cfg.Database.Database).
|
|
Str("db_user", cfg.Database.User).
|
|
Str("redis_url", config.MaskURLCredentials(cfg.Redis.URL)).
|
|
Msg("Starting HoneyDue API server")
|
|
|
|
// Connect to database (retry with backoff)
|
|
var db *gorm.DB
|
|
var dbErr error
|
|
for i := 0; i < 3; i++ {
|
|
db, dbErr = database.Connect(&cfg.Database, cfg.Server.Debug)
|
|
if dbErr == nil {
|
|
break
|
|
}
|
|
log.Warn().Err(dbErr).Int("attempt", i+1).Msg("Failed to connect to database, retrying...")
|
|
time.Sleep(time.Duration(i+1) * time.Second)
|
|
}
|
|
if dbErr != nil {
|
|
log.Error().Err(dbErr).Msg("Failed to connect to database - API will start but database operations will fail")
|
|
} else {
|
|
defer database.Close()
|
|
// Run database migrations only if connected.
|
|
// MigrateWithLock serialises parallel replica starts via a Postgres
|
|
// advisory lock so concurrent AutoMigrate calls don't race on DDL.
|
|
if err := database.MigrateWithLock(); err != nil {
|
|
log.Error().Err(err).Msg("Failed to run database migrations")
|
|
}
|
|
}
|
|
|
|
// Connect to Redis (optional - don't fail if unavailable)
|
|
var cache *services.CacheService
|
|
cache, err = services.NewCacheService(&cfg.Redis)
|
|
if err != nil {
|
|
log.Warn().Err(err).Msg("Failed to connect to Redis - caching disabled")
|
|
cache = nil
|
|
} else {
|
|
defer cache.Close()
|
|
}
|
|
|
|
// Initialize monitoring service (if Redis is available)
|
|
var monitoringService *monitoring.Service
|
|
if cache != nil {
|
|
monitoringService = monitoring.NewService(monitoring.Config{
|
|
Process: "api",
|
|
RedisClient: cache.Client(),
|
|
DB: db, // Pass database for enable_monitoring setting sync
|
|
})
|
|
|
|
// Reinitialize logger with monitoring writer
|
|
utils.InitLoggerWithWriter(cfg.Server.Debug, monitoringService.LogWriter())
|
|
|
|
// Start stats collection
|
|
monitoringService.Start()
|
|
defer monitoringService.Stop()
|
|
|
|
log.Info().
|
|
Bool("log_capture_enabled", monitoringService.IsEnabled()).
|
|
Msg("Monitoring service initialized")
|
|
}
|
|
|
|
// Initialize email service
|
|
var emailService *services.EmailService
|
|
log.Info().
|
|
Str("email_host", cfg.Email.Host).
|
|
Str("email_user", cfg.Email.User).
|
|
Str("email_from", cfg.Email.From).
|
|
Int("email_port", cfg.Email.Port).
|
|
Msg("Email config loaded")
|
|
if cfg.Email.Host != "" && cfg.Email.User != "" {
|
|
emailService = services.NewEmailService(&cfg.Email, cfg.Features.EmailEnabled)
|
|
log.Info().
|
|
Str("host", cfg.Email.Host).
|
|
Msg("Email service initialized")
|
|
} else {
|
|
log.Warn().
|
|
Str("host", cfg.Email.Host).
|
|
Str("user", cfg.Email.User).
|
|
Msg("Email service not configured - emails will not be sent")
|
|
}
|
|
|
|
// Initialize storage service for file uploads (local filesystem or S3-compatible)
|
|
var storageService *services.StorageService
|
|
if cfg.Storage.UploadDir != "" || cfg.Storage.IsS3() {
|
|
storageService, err = services.NewStorageService(&cfg.Storage)
|
|
if err != nil {
|
|
log.Warn().Err(err).Msg("Failed to initialize storage service - uploads disabled")
|
|
} else {
|
|
// Initialize file encryption at rest if configured
|
|
if cfg.Storage.EncryptionKey != "" {
|
|
encSvc, encErr := services.NewEncryptionService(cfg.Storage.EncryptionKey)
|
|
if encErr != nil {
|
|
log.Error().Err(encErr).Msg("Failed to initialize encryption service - files will NOT be encrypted")
|
|
} else {
|
|
storageService.SetEncryptionService(encSvc)
|
|
log.Info().Msg("File encryption at rest enabled")
|
|
}
|
|
}
|
|
}
|
|
}
|
|
|
|
// Initialize PDF service for report generation
|
|
pdfService := services.NewPDFService()
|
|
log.Info().Msg("PDF service initialized")
|
|
|
|
// Initialize push notification client (APNs + FCM)
|
|
var pushClient *push.Client
|
|
pushClient, err = push.NewClient(&cfg.Push, cfg.Features.PushEnabled)
|
|
if err != nil {
|
|
log.Warn().Err(err).Msg("Failed to initialize push client - push notifications disabled")
|
|
} else {
|
|
log.Info().
|
|
Bool("ios_enabled", pushClient.IsIOSEnabled()).
|
|
Bool("android_enabled", pushClient.IsAndroidEnabled()).
|
|
Msg("Push notification client initialized")
|
|
}
|
|
|
|
// Setup router with dependencies (includes admin panel at /admin)
|
|
deps := &router.Dependencies{
|
|
DB: db,
|
|
Cache: cache,
|
|
Config: cfg,
|
|
EmailService: emailService,
|
|
PDFService: pdfService,
|
|
PushClient: pushClient,
|
|
StorageService: storageService,
|
|
MonitoringService: monitoringService,
|
|
}
|
|
e := router.SetupRouter(deps)
|
|
|
|
// Create HTTP server
|
|
srv := &http.Server{
|
|
Addr: fmt.Sprintf(":%d", cfg.Server.Port),
|
|
Handler: e,
|
|
ReadTimeout: 30 * time.Second,
|
|
WriteTimeout: 30 * time.Second,
|
|
IdleTimeout: 60 * time.Second,
|
|
}
|
|
|
|
// Start server in goroutine
|
|
go func() {
|
|
log.Info().
|
|
Str("addr", srv.Addr).
|
|
Msg("HTTP server listening")
|
|
|
|
if err := srv.ListenAndServe(); err != nil && err != http.ErrServerClosed {
|
|
log.Fatal().Err(err).Msg("Failed to start HTTP server")
|
|
}
|
|
}()
|
|
|
|
// Wait for interrupt signal for graceful shutdown
|
|
quit := make(chan os.Signal, 1)
|
|
signal.Notify(quit, syscall.SIGINT, syscall.SIGTERM)
|
|
<-quit
|
|
|
|
log.Info().Msg("Shutting down server...")
|
|
|
|
// Graceful shutdown with timeout
|
|
ctx, cancel := context.WithTimeout(context.Background(), 30*time.Second)
|
|
defer cancel()
|
|
|
|
if err := srv.Shutdown(ctx); err != nil {
|
|
log.Fatal().Err(err).Msg("Server forced to shutdown")
|
|
}
|
|
|
|
log.Info().Msg("Server exited")
|
|
}
|