Security: - Replace all binding: tags with validate: + c.Validate() in admin handlers - Add rate limiting to auth endpoints (login, register, password reset) - Add security headers (HSTS, XSS protection, nosniff, frame options) - Wire Google Pub/Sub token verification into webhook handler - Replace ParseUnverified with proper OIDC/JWKS key verification - Verify inner Apple JWS signatures in webhook handler - Add io.LimitReader (1MB) to all webhook body reads - Add ownership verification to file deletion - Move hardcoded admin credentials to env vars - Add uniqueIndex to User.Email - Hide ConfirmationCode from JSON serialization - Mask confirmation codes in admin responses - Use http.DetectContentType for upload validation - Fix path traversal in storage service - Replace os.Getenv with Viper in stripe service - Sanitize Redis URLs before logging - Separate DEBUG_FIXED_CODES from DEBUG flag - Reject weak SECRET_KEY in production - Add host check on /_next/* proxy routes - Use explicit localhost CORS origins in debug mode - Replace err.Error() with generic messages in all admin error responses Critical fixes: - Rewrite FCM to HTTP v1 API with OAuth 2.0 service account auth - Fix user_customuser -> auth_user table names in raw SQL - Fix dashboard verified query to use UserProfile model - Add escapeLikeWildcards() to prevent SQL wildcard injection Bug fixes: - Add bounds checks for days/expiring_soon query params (1-3650) - Add receipt_data/transaction_id empty-check to RestoreSubscription - Change Active bool -> *bool in device handler - Check all unchecked GORM/FindByIDWithProfile errors - Add validation for notification hour fields (0-23) - Add max=10000 validation on task description updates Transactions & data integrity: - Wrap registration flow in transaction - Wrap QuickComplete in transaction - Move image creation inside completion transaction - Wrap SetSpecialties in transaction - Wrap GetOrCreateToken in transaction - Wrap completion+image deletion in transaction Performance: - Batch completion summaries (2 queries vs 2N) - Reuse single http.Client in IAP validation - Cache dashboard counts (30s TTL) - Batch COUNT queries in admin user list - Add Limit(500) to document queries - Add reminder_stage+due_date filters to reminder queries - Parse AllowedTypes once at init - In-memory user cache in auth middleware (30s TTL) - Timezone change detection cache - Optimize P95 with per-endpoint sorted buffers - Replace crypto/md5 with hash/fnv for ETags Code quality: - Add sync.Once to all monitoring Stop()/Close() methods - Replace 8 fmt.Printf with zerolog in auth service - Log previously discarded errors - Standardize delete response shapes - Route hardcoded English through i18n - Remove FileURL from DocumentResponse (keep MediaURL only) - Thread user timezone through kanban board responses - Initialize empty slices to prevent null JSON - Extract shared field map for task Update/UpdateTx - Delete unused SoftDeleteModel, min(), formatCron, legacy handlers Worker & jobs: - Wire Asynq email infrastructure into worker - Register HandleReminderLogCleanup with daily 3AM cron - Use per-user timezone in HandleSmartReminder - Replace direct DB queries with repository calls - Delete legacy reminder handlers (~200 lines) - Delete unused task type constants Dependencies: - Replace archived jung-kurt/gofpdf with go-pdf/fpdf - Replace unmaintained gomail.v2 with wneessen/go-mail - Add TODO for Echo jwt v3 transitive dep removal Test infrastructure: - Fix MakeRequest/SeedLookupData error handling - Replace os.Exit(0) with t.Skip() in scope/consistency tests - Add 11 new FCM v1 tests Co-Authored-By: Claude Opus 4.6 (1M context) <noreply@anthropic.com>
206 lines
5.9 KiB
Go
206 lines
5.9 KiB
Go
package main
|
|
|
|
import (
|
|
"context"
|
|
"fmt"
|
|
"net/http"
|
|
"os"
|
|
"os/signal"
|
|
"syscall"
|
|
"time"
|
|
|
|
"github.com/rs/zerolog/log"
|
|
"gorm.io/gorm"
|
|
|
|
"github.com/treytartt/honeydue-api/internal/config"
|
|
"github.com/treytartt/honeydue-api/internal/database"
|
|
"github.com/treytartt/honeydue-api/internal/i18n"
|
|
"github.com/treytartt/honeydue-api/internal/monitoring"
|
|
"github.com/treytartt/honeydue-api/internal/push"
|
|
"github.com/treytartt/honeydue-api/internal/router"
|
|
"github.com/treytartt/honeydue-api/internal/services"
|
|
"github.com/treytartt/honeydue-api/pkg/utils"
|
|
)
|
|
|
|
func main() {
|
|
// Load configuration
|
|
cfg, err := config.Load()
|
|
if err != nil {
|
|
fmt.Printf("Failed to load configuration: %v\n", err)
|
|
os.Exit(1)
|
|
}
|
|
|
|
// Initialize basic logger first (will be enhanced after Redis connects)
|
|
utils.InitLogger(cfg.Server.Debug)
|
|
|
|
// Initialize i18n
|
|
if err := i18n.Init(); err != nil {
|
|
log.Warn().Err(err).Msg("Failed to initialize i18n - using English only")
|
|
} else {
|
|
log.Info().Strs("languages", i18n.SupportedLanguages).Msg("i18n initialized")
|
|
}
|
|
|
|
log.Info().
|
|
Bool("debug", cfg.Server.Debug).
|
|
Int("port", cfg.Server.Port).
|
|
Str("db_host", cfg.Database.Host).
|
|
Int("db_port", cfg.Database.Port).
|
|
Str("db_name", cfg.Database.Database).
|
|
Str("db_user", cfg.Database.User).
|
|
Str("redis_url", config.MaskURLCredentials(cfg.Redis.URL)).
|
|
Msg("Starting HoneyDue API server")
|
|
|
|
// Connect to database (retry with backoff)
|
|
var db *gorm.DB
|
|
var dbErr error
|
|
for i := 0; i < 3; i++ {
|
|
db, dbErr = database.Connect(&cfg.Database, cfg.Server.Debug)
|
|
if dbErr == nil {
|
|
break
|
|
}
|
|
log.Warn().Err(dbErr).Int("attempt", i+1).Msg("Failed to connect to database, retrying...")
|
|
time.Sleep(time.Duration(i+1) * time.Second)
|
|
}
|
|
if dbErr != nil {
|
|
log.Error().Err(dbErr).Msg("Failed to connect to database - API will start but database operations will fail")
|
|
} else {
|
|
defer database.Close()
|
|
// Run database migrations only if connected
|
|
if err := database.Migrate(); err != nil {
|
|
log.Error().Err(err).Msg("Failed to run database migrations")
|
|
}
|
|
}
|
|
|
|
// Connect to Redis (optional - don't fail if unavailable)
|
|
var cache *services.CacheService
|
|
cache, err = services.NewCacheService(&cfg.Redis)
|
|
if err != nil {
|
|
log.Warn().Err(err).Msg("Failed to connect to Redis - caching disabled")
|
|
cache = nil
|
|
} else {
|
|
defer cache.Close()
|
|
}
|
|
|
|
// Initialize monitoring service (if Redis is available)
|
|
var monitoringService *monitoring.Service
|
|
if cache != nil {
|
|
monitoringService = monitoring.NewService(monitoring.Config{
|
|
Process: "api",
|
|
RedisClient: cache.Client(),
|
|
DB: db, // Pass database for enable_monitoring setting sync
|
|
})
|
|
|
|
// Reinitialize logger with monitoring writer
|
|
utils.InitLoggerWithWriter(cfg.Server.Debug, monitoringService.LogWriter())
|
|
|
|
// Start stats collection
|
|
monitoringService.Start()
|
|
defer monitoringService.Stop()
|
|
|
|
log.Info().
|
|
Bool("log_capture_enabled", monitoringService.IsEnabled()).
|
|
Msg("Monitoring service initialized")
|
|
}
|
|
|
|
// Initialize email service
|
|
var emailService *services.EmailService
|
|
log.Info().
|
|
Str("email_host", cfg.Email.Host).
|
|
Str("email_user", cfg.Email.User).
|
|
Str("email_from", cfg.Email.From).
|
|
Int("email_port", cfg.Email.Port).
|
|
Msg("Email config loaded")
|
|
if cfg.Email.Host != "" && cfg.Email.User != "" {
|
|
emailService = services.NewEmailService(&cfg.Email, cfg.Features.EmailEnabled)
|
|
log.Info().
|
|
Str("host", cfg.Email.Host).
|
|
Msg("Email service initialized")
|
|
} else {
|
|
log.Warn().
|
|
Str("host", cfg.Email.Host).
|
|
Str("user", cfg.Email.User).
|
|
Msg("Email service not configured - emails will not be sent")
|
|
}
|
|
|
|
// Initialize storage service for file uploads
|
|
var storageService *services.StorageService
|
|
if cfg.Storage.UploadDir != "" {
|
|
storageService, err = services.NewStorageService(&cfg.Storage)
|
|
if err != nil {
|
|
log.Warn().Err(err).Msg("Failed to initialize storage service - uploads disabled")
|
|
} else {
|
|
log.Info().
|
|
Str("upload_dir", cfg.Storage.UploadDir).
|
|
Str("base_url", cfg.Storage.BaseURL).
|
|
Int64("max_file_size", cfg.Storage.MaxFileSize).
|
|
Msg("Storage service initialized")
|
|
}
|
|
}
|
|
|
|
// Initialize PDF service for report generation
|
|
pdfService := services.NewPDFService()
|
|
log.Info().Msg("PDF service initialized")
|
|
|
|
// Initialize push notification client (APNs + FCM)
|
|
var pushClient *push.Client
|
|
pushClient, err = push.NewClient(&cfg.Push, cfg.Features.PushEnabled)
|
|
if err != nil {
|
|
log.Warn().Err(err).Msg("Failed to initialize push client - push notifications disabled")
|
|
} else {
|
|
log.Info().
|
|
Bool("ios_enabled", pushClient.IsIOSEnabled()).
|
|
Bool("android_enabled", pushClient.IsAndroidEnabled()).
|
|
Msg("Push notification client initialized")
|
|
}
|
|
|
|
// Setup router with dependencies (includes admin panel at /admin)
|
|
deps := &router.Dependencies{
|
|
DB: db,
|
|
Cache: cache,
|
|
Config: cfg,
|
|
EmailService: emailService,
|
|
PDFService: pdfService,
|
|
PushClient: pushClient,
|
|
StorageService: storageService,
|
|
MonitoringService: monitoringService,
|
|
}
|
|
e := router.SetupRouter(deps)
|
|
|
|
// Create HTTP server
|
|
srv := &http.Server{
|
|
Addr: fmt.Sprintf(":%d", cfg.Server.Port),
|
|
Handler: e,
|
|
ReadTimeout: 30 * time.Second,
|
|
WriteTimeout: 30 * time.Second,
|
|
IdleTimeout: 60 * time.Second,
|
|
}
|
|
|
|
// Start server in goroutine
|
|
go func() {
|
|
log.Info().
|
|
Str("addr", srv.Addr).
|
|
Msg("HTTP server listening")
|
|
|
|
if err := srv.ListenAndServe(); err != nil && err != http.ErrServerClosed {
|
|
log.Fatal().Err(err).Msg("Failed to start HTTP server")
|
|
}
|
|
}()
|
|
|
|
// Wait for interrupt signal for graceful shutdown
|
|
quit := make(chan os.Signal, 1)
|
|
signal.Notify(quit, syscall.SIGINT, syscall.SIGTERM)
|
|
<-quit
|
|
|
|
log.Info().Msg("Shutting down server...")
|
|
|
|
// Graceful shutdown with timeout
|
|
ctx, cancel := context.WithTimeout(context.Background(), 30*time.Second)
|
|
defer cancel()
|
|
|
|
if err := srv.Shutdown(ctx); err != nil {
|
|
log.Fatal().Err(err).Msg("Server forced to shutdown")
|
|
}
|
|
|
|
log.Info().Msg("Server exited")
|
|
}
|