forked from onlyLTY/dockerCopilot
-
Notifications
You must be signed in to change notification settings - Fork 0
Expand file tree
/
Copy pathdockercopilot.go
More file actions
244 lines (218 loc) · 7.35 KB
/
dockercopilot.go
File metadata and controls
244 lines (218 loc) · 7.35 KB
1
2
3
4
5
6
7
8
9
10
11
12
13
14
15
16
17
18
19
20
21
22
23
24
25
26
27
28
29
30
31
32
33
34
35
36
37
38
39
40
41
42
43
44
45
46
47
48
49
50
51
52
53
54
55
56
57
58
59
60
61
62
63
64
65
66
67
68
69
70
71
72
73
74
75
76
77
78
79
80
81
82
83
84
85
86
87
88
89
90
91
92
93
94
95
96
97
98
99
100
101
102
103
104
105
106
107
108
109
110
111
112
113
114
115
116
117
118
119
120
121
122
123
124
125
126
127
128
129
130
131
132
133
134
135
136
137
138
139
140
141
142
143
144
145
146
147
148
149
150
151
152
153
154
155
156
157
158
159
160
161
162
163
164
165
166
167
168
169
170
171
172
173
174
175
176
177
178
179
180
181
182
183
184
185
186
187
188
189
190
191
192
193
194
195
196
197
198
199
200
201
202
203
204
205
206
207
208
209
210
211
212
213
214
215
216
217
218
219
220
221
222
223
224
225
226
227
228
229
230
231
232
233
234
235
236
237
238
239
240
241
242
243
244
package main
import (
"embed"
"flag"
"fmt"
"io/fs"
"log"
"net/http"
"os"
"go/types"
"github.com/robfig/cron/v3"
"github.com/xcz1997/dockerCopilot/internal/config"
"github.com/xcz1997/dockerCopilot/internal/handler"
"github.com/xcz1997/dockerCopilot/internal/middleware"
"github.com/xcz1997/dockerCopilot/internal/svc"
"github.com/xcz1997/dockerCopilot/internal/utiles"
"github.com/zeromicro/go-zero/core/conf"
"github.com/zeromicro/go-zero/core/logx"
"github.com/zeromicro/go-zero/rest"
"github.com/zeromicro/go-zero/rest/httpx"
"github.com/zeromicro/x/errors"
xhttp "github.com/zeromicro/x/http"
)
//go:embed front/*
var embeddedFront embed.FS
var configFile = flag.String("f", "etc/dockerCopilot.yaml", "the config file")
type UnauthorizedResponse struct {
Code int `json:"code"`
Msg string `json:"msg"`
Data map[string]interface{} `json:"data"`
}
func main() {
logDir := "./logs"
ErrSetupLog := SetupLog(logDir)
if ErrSetupLog != nil {
logx.Errorf("failed to setup log: %v", ErrSetupLog)
os.Exit(1)
}
logx.SetLevel(logx.InfoLevel)
logx.DisableStat() // 禁用请求统计日志
flag.Parse()
var c config.Config
err := conf.Load(*configFile, &c, conf.UseEnv())
if err != nil {
logx.Errorf("无法加载配置文件出错: %v", err)
logx.Errorf("请确认secretKey设置正确,要求非纯数字且大于八位")
os.Exit(1)
}
server := rest.MustNewServer(c.RestConf, rest.WithCors("*"), rest.WithUnauthorizedCallback(
func(w http.ResponseWriter, r *http.Request, err error) {
response := UnauthorizedResponse{
Code: http.StatusUnauthorized, // 401
Msg: "未授权",
Data: map[string]interface{}{},
}
httpx.WriteJson(w, http.StatusUnauthorized, response)
}))
defer server.Stop()
ctx := svc.NewServiceContext(c)
// 应用性能配置(从数据库加载,环境变量优先级最高)
perfConfig := ctx.PerformanceConfig
maxConcurrent := perfConfig.GetEffectiveMaxConcurrent()
checkInterval := perfConfig.GetEffectiveCheckInterval()
if perfConfig.LowPowerMode {
logx.Info("=== 低性能模式已启用 ===")
logx.Infof(" - 镜像检查并发数: %d (单线程)", maxConcurrent)
logx.Infof(" - 镜像检查间隔: %d 分钟", checkInterval)
logx.Infof(" - 启动时检查: %v", !perfConfig.DisableAutoCheck)
} else {
logx.Infof("性能配置: 并发数=%d, 检查间隔=%d分钟", maxConcurrent, checkInterval)
}
// 设置镜像检查并发数
ctx.HubImageInfo.SetMaxConcurrent(maxConcurrent)
// 启动群组调度器
if ctx.GroupScheduler != nil {
// 设置进度更新器,让群组更新操作能在任务列表中显示
ctx.GroupScheduler.SetProgressUpdater(svc.NewProgressAdapter(ctx))
if err := ctx.GroupScheduler.Start(); err != nil {
logx.Errorf("启动群组调度器失败: %v", err)
}
defer ctx.GroupScheduler.Stop()
}
// 启动容器事件监听器
if ctx.EventWatcher != nil {
ctx.EventWatcher.Start()
defer ctx.EventWatcher.Stop()
}
// 启动时检查镜像更新(可配置禁用)
if !perfConfig.DisableAutoCheck {
list, err := utiles.GetImagesList(ctx)
if err != nil {
logx.Errorf("获取镜像列表出错: %v", err)
} else {
if perfConfig.LowPowerMode {
// 低性能模式:同步执行,避免启动时资源竞争
logx.Info("低性能模式:同步检查镜像更新...")
ctx.HubImageInfo.CheckUpdate(list)
} else {
// 正常模式:异步执行
go ctx.HubImageInfo.CheckUpdate(list)
}
}
} else {
logx.Info("启动时镜像更新检查已禁用")
}
// 定时镜像检查任务(可配置间隔或禁用)
var corndanmu *cron.Cron
if checkInterval > 0 {
corndanmu = cron.New(cron.WithParser(cron.NewParser(
cron.Minute | cron.Hour | cron.Dom | cron.Month | cron.Dow,
)))
// 构建 cron 表达式:每 N 分钟执行
cronExpr := fmt.Sprintf("*/%d * * * *", checkInterval)
if checkInterval >= 60 {
// 如果间隔大于等于60分钟,改为每 N 小时执行
hours := checkInterval / 60
cronExpr = fmt.Sprintf("0 */%d * * *", hours)
}
_, err = corndanmu.AddFunc(cronExpr, func() {
list, err := utiles.GetImagesList(ctx)
if err != nil {
logx.Errorf("定时任务获取镜像列表出错: %v", err)
return
}
ctx.HubImageInfo.CheckUpdate(list)
})
if err != nil {
logx.Errorf("添加镜像检查定时任务出错: %v", err)
} else {
corndanmu.Start()
logx.Infof("镜像检查定时任务已启动: %s", cronExpr)
}
defer func() {
if corndanmu != nil {
corndanmu.Stop()
}
}()
} else {
logx.Info("镜像自动检查定时任务已禁用 (CheckIntervalMinutes=0)")
}
httpx.SetErrorHandler(func(err error) (int, any) {
switch e := err.(type) {
case *errors.CodeMsg:
return http.StatusOK, xhttp.BaseResponse[types.Nil]{
Code: e.Code,
Msg: e.Msg,
}
default:
return http.StatusOK, xhttp.BaseResponse[types.Nil]{
Code: 50000,
Msg: err.Error(),
}
}
})
// 添加远程代理中间件(在远程环境时自动代理请求)
remoteProxyMiddleware := middleware.NewRemoteProxyMiddleware(ctx)
server.Use(remoteProxyMiddleware.Handle)
handler.RegisterHandlers(server, ctx)
RegisterHandlers(server)
fmt.Printf("Starting server at %s:%d...\n", c.Host, c.Port)
logx.Info("程序版本" + config.Version)
server.Start()
}
func RegisterHandlers(engine *rest.Server) {
// 创建静态资源处理器
frontFS, err := fs.Sub(embeddedFront, "front")
if err != nil {
log.Fatal(err)
}
fileServer := http.FileServer(http.FS(frontFS))
indexHTML, _ := fs.ReadFile(frontFS, "index.html")
// SPA 处理器
spaHandler := func(w http.ResponseWriter, r *http.Request) {
w.Header().Set("Content-Type", "text/html; charset=utf-8")
w.Write(indexHTML)
}
// 静态资源处理器
assetsHandler := func(w http.ResponseWriter, r *http.Request) {
fileServer.ServeHTTP(w, r)
}
// favicon 处理器
faviconHandler := func(w http.ResponseWriter, r *http.Request) {
r.URL.Path = "/favicon.png"
fileServer.ServeHTTP(w, r)
}
// 注册 SPA 路由
spaRoutes := []string{"/manager", "/manager/containers", "/manager/images", "/manager/groups", "/manager/backups", "/manager/settings", "/manager/login", "/manager/tasks", "/manager/projects", "/manager/environments"}
for _, path := range spaRoutes {
engine.AddRoute(rest.Route{Method: http.MethodGet, Path: path, Handler: spaHandler})
}
// 注册静态资源路由
engine.AddRoute(rest.Route{Method: http.MethodGet, Path: "/assets/:file", Handler: assetsHandler})
engine.AddRoute(rest.Route{Method: http.MethodGet, Path: "/favicon.png", Handler: faviconHandler})
engine.AddRoute(rest.Route{Method: http.MethodGet, Path: "/manager/favicon.png", Handler: faviconHandler})
}
// 检查并创建日志目录
func ensureLogDirectory(logDir string) error {
if _, err := os.Stat(logDir); os.IsNotExist(err) {
return os.MkdirAll(logDir, 0755) // 创建目录并设置权限
}
return nil
}
// SetupLog 初始化日志设置
func SetupLog(logDir string) error {
// 检查日志目录是否存在
if err := ensureLogDirectory(logDir); err != nil {
return fmt.Errorf("failed to create log directory: %v", err)
}
logConf := logx.LogConf{
Level: "info",
Mode: "console",
}
logx.MustSetup(logConf)
// 创建统一的过滤 Writer,同时输出到控制台和文件
unifiedWriter := middleware.NewUnifiedLogWriter(logDir, os.Stdout)
logx.SetWriter(logx.NewWriter(unifiedWriter))
return nil
}