2019-05-07 21:56:10 +00:00
|
|
|
// Copyright 2019 Sorint.lab
|
|
|
|
//
|
|
|
|
// Licensed under the Apache License, Version 2.0 (the "License");
|
|
|
|
// you may not use this file except in compliance with the License.
|
|
|
|
// You may obtain a copy of the License at
|
|
|
|
//
|
|
|
|
// http://www.apache.org/licenses/LICENSE-2.0
|
|
|
|
//
|
|
|
|
// Unless required by applicable law or agreed to in writing, software
|
|
|
|
// distributed under the License is distributed on an "AS IS" BASIS,
|
|
|
|
// WITHOUT WARRANTIES OR CONDITIONS OF ANY KIND, either express or implied
|
|
|
|
// See the License for the specific language governing permissions and
|
|
|
|
// limitations under the License.
|
|
|
|
|
|
|
|
package runservice
|
|
|
|
|
|
|
|
import (
|
|
|
|
"context"
|
|
|
|
"crypto/tls"
|
|
|
|
"net/http"
|
|
|
|
"path/filepath"
|
2019-07-25 13:54:58 +00:00
|
|
|
"sync"
|
2019-05-07 21:56:10 +00:00
|
|
|
"time"
|
|
|
|
|
2019-07-01 09:40:20 +00:00
|
|
|
scommon "agola.io/agola/internal/common"
|
|
|
|
"agola.io/agola/internal/datamanager"
|
|
|
|
"agola.io/agola/internal/etcd"
|
2020-01-15 11:01:46 +00:00
|
|
|
slog "agola.io/agola/internal/log"
|
2019-07-01 09:40:20 +00:00
|
|
|
"agola.io/agola/internal/objectstorage"
|
|
|
|
"agola.io/agola/internal/services/config"
|
|
|
|
"agola.io/agola/internal/services/runservice/action"
|
|
|
|
"agola.io/agola/internal/services/runservice/api"
|
|
|
|
"agola.io/agola/internal/services/runservice/common"
|
|
|
|
"agola.io/agola/internal/services/runservice/readdb"
|
|
|
|
"agola.io/agola/internal/util"
|
2019-07-31 13:39:07 +00:00
|
|
|
"agola.io/agola/services/runservice/types"
|
2019-05-07 21:56:10 +00:00
|
|
|
|
|
|
|
"github.com/gorilla/mux"
|
|
|
|
etcdclientv3 "go.etcd.io/etcd/clientv3"
|
2019-07-25 13:54:58 +00:00
|
|
|
"go.etcd.io/etcd/mvcc/mvccpb"
|
2020-01-15 11:01:46 +00:00
|
|
|
"go.uber.org/zap"
|
2019-05-07 21:56:10 +00:00
|
|
|
"go.uber.org/zap/zapcore"
|
|
|
|
)
|
|
|
|
|
2020-01-15 11:01:46 +00:00
|
|
|
var level = zap.NewAtomicLevelAt(zapcore.InfoLevel)
|
|
|
|
var logger = slog.New(level)
|
|
|
|
var log = logger.Sugar()
|
|
|
|
|
2019-05-07 21:56:10 +00:00
|
|
|
// etcdPingerLoop periodically updates a key.
|
|
|
|
// This is used by watchers to inform the client of the current revision
|
|
|
|
// this is needed since if other users are updating other unwatched keys on
|
|
|
|
// etcd we won't be notified, not updating the known revisions
|
|
|
|
// TODO(sgotti) use upcoming etcd 3.4 watch RequestProgress???
|
|
|
|
func (s *Runservice) etcdPingerLoop(ctx context.Context) {
|
|
|
|
for {
|
|
|
|
if err := s.etcdPinger(ctx); err != nil {
|
|
|
|
log.Errorf("err: %+v", err)
|
|
|
|
}
|
|
|
|
|
2019-07-25 13:53:26 +00:00
|
|
|
sleepCh := time.NewTimer(1 * time.Second).C
|
2019-05-07 21:56:10 +00:00
|
|
|
select {
|
|
|
|
case <-ctx.Done():
|
|
|
|
return
|
2019-07-25 13:53:26 +00:00
|
|
|
case <-sleepCh:
|
2019-05-07 21:56:10 +00:00
|
|
|
}
|
|
|
|
}
|
|
|
|
}
|
|
|
|
|
|
|
|
func (s *Runservice) etcdPinger(ctx context.Context) error {
|
|
|
|
if _, err := s.e.Put(ctx, common.EtcdPingKey, []byte{}, nil); err != nil {
|
|
|
|
return err
|
|
|
|
}
|
|
|
|
return nil
|
|
|
|
}
|
|
|
|
|
2019-07-25 13:54:58 +00:00
|
|
|
func (s *Runservice) maintenanceModeWatcherLoop(ctx context.Context, runCtxCancel context.CancelFunc, maintenanceModeEnabled bool) {
|
|
|
|
for {
|
|
|
|
log.Debugf("maintenanceModeWatcherLoop")
|
|
|
|
|
|
|
|
// at first watch restart from previous processed revision
|
|
|
|
if err := s.maintenanceModeWatcher(ctx, runCtxCancel, maintenanceModeEnabled); err != nil {
|
|
|
|
log.Errorf("err: %+v", err)
|
|
|
|
}
|
|
|
|
|
|
|
|
sleepCh := time.NewTimer(1 * time.Second).C
|
|
|
|
select {
|
|
|
|
case <-ctx.Done():
|
|
|
|
return
|
|
|
|
case <-sleepCh:
|
|
|
|
}
|
|
|
|
}
|
|
|
|
}
|
|
|
|
|
|
|
|
func (s *Runservice) maintenanceModeWatcher(ctx context.Context, runCtxCancel context.CancelFunc, maintenanceModeEnabled bool) error {
|
|
|
|
log.Infof("watcher: maintenance mode enabled: %t", maintenanceModeEnabled)
|
|
|
|
resp, err := s.e.Get(ctx, common.EtcdMaintenanceKey, 0)
|
|
|
|
if err != nil && err != etcd.ErrKeyNotFound {
|
|
|
|
return err
|
|
|
|
}
|
|
|
|
|
|
|
|
if len(resp.Kvs) > 0 {
|
|
|
|
log.Infof("maintenance mode key is present")
|
|
|
|
if !maintenanceModeEnabled {
|
|
|
|
runCtxCancel()
|
|
|
|
}
|
|
|
|
}
|
|
|
|
|
|
|
|
revision := resp.Header.Revision
|
|
|
|
|
|
|
|
wctx := etcdclientv3.WithRequireLeader(ctx)
|
|
|
|
|
|
|
|
// restart from previous processed revision
|
|
|
|
wch := s.e.Watch(wctx, common.EtcdMaintenanceKey, revision)
|
|
|
|
|
|
|
|
for wresp := range wch {
|
|
|
|
if wresp.Canceled {
|
|
|
|
return wresp.Err()
|
|
|
|
}
|
|
|
|
|
|
|
|
for _, ev := range wresp.Events {
|
|
|
|
switch ev.Type {
|
|
|
|
case mvccpb.PUT:
|
|
|
|
log.Infof("maintenance mode key set")
|
|
|
|
if !maintenanceModeEnabled {
|
|
|
|
runCtxCancel()
|
|
|
|
}
|
|
|
|
|
|
|
|
case mvccpb.DELETE:
|
|
|
|
log.Infof("maintenance mode key removed")
|
|
|
|
if maintenanceModeEnabled {
|
|
|
|
runCtxCancel()
|
|
|
|
}
|
|
|
|
}
|
|
|
|
}
|
|
|
|
}
|
|
|
|
|
|
|
|
return nil
|
|
|
|
}
|
|
|
|
|
2019-05-07 21:56:10 +00:00
|
|
|
type Runservice struct {
|
2019-07-25 13:54:58 +00:00
|
|
|
c *config.Runservice
|
|
|
|
e *etcd.Store
|
|
|
|
ost *objectstorage.ObjStorage
|
|
|
|
dm *datamanager.DataManager
|
|
|
|
readDB *readdb.ReadDB
|
|
|
|
ah *action.ActionHandler
|
|
|
|
maintenanceMode bool
|
2019-05-07 21:56:10 +00:00
|
|
|
}
|
|
|
|
|
2020-01-15 11:01:46 +00:00
|
|
|
func NewRunservice(ctx context.Context, l *zap.Logger, c *config.Runservice) (*Runservice, error) {
|
|
|
|
if l != nil {
|
|
|
|
logger = l
|
|
|
|
}
|
2019-05-07 21:56:10 +00:00
|
|
|
if c.Debug {
|
|
|
|
level.SetLevel(zapcore.DebugLevel)
|
|
|
|
}
|
2020-01-15 11:01:46 +00:00
|
|
|
log = logger.Sugar()
|
2019-05-07 21:56:10 +00:00
|
|
|
|
|
|
|
ost, err := scommon.NewObjectStorage(&c.ObjectStorage)
|
|
|
|
if err != nil {
|
|
|
|
return nil, err
|
|
|
|
}
|
|
|
|
e, err := scommon.NewEtcd(&c.Etcd, logger, "runservice")
|
|
|
|
if err != nil {
|
|
|
|
return nil, err
|
|
|
|
}
|
|
|
|
|
|
|
|
s := &Runservice{
|
|
|
|
c: c,
|
|
|
|
e: e,
|
|
|
|
ost: ost,
|
|
|
|
}
|
|
|
|
|
|
|
|
dmConf := &datamanager.DataManagerConfig{
|
2019-07-03 15:18:21 +00:00
|
|
|
BasePath: "rundata",
|
|
|
|
E: e,
|
|
|
|
OST: ost,
|
2019-05-07 21:56:10 +00:00
|
|
|
DataTypes: []string{
|
|
|
|
string(common.DataTypeRun),
|
|
|
|
string(common.DataTypeRunConfig),
|
|
|
|
string(common.DataTypeRunCounter),
|
|
|
|
},
|
|
|
|
}
|
|
|
|
dm, err := datamanager.NewDataManager(ctx, logger, dmConf)
|
|
|
|
if err != nil {
|
|
|
|
return nil, err
|
|
|
|
}
|
|
|
|
s.dm = dm
|
|
|
|
|
|
|
|
readDB, err := readdb.NewReadDB(ctx, logger, filepath.Join(c.DataDir, "readdb"), e, ost, dm)
|
|
|
|
if err != nil {
|
|
|
|
return nil, err
|
|
|
|
}
|
|
|
|
s.readDB = readDB
|
|
|
|
|
|
|
|
ah := action.NewActionHandler(logger, e, readDB, ost, dm)
|
|
|
|
s.ah = ah
|
|
|
|
|
|
|
|
return s, nil
|
|
|
|
}
|
|
|
|
|
|
|
|
func (s *Runservice) InitEtcd(ctx context.Context) error {
|
|
|
|
// Create changegroup min revision if it doesn't exists
|
|
|
|
cmp := []etcdclientv3.Cmp{}
|
|
|
|
then := []etcdclientv3.Op{}
|
|
|
|
|
|
|
|
cmp = append(cmp, etcdclientv3.Compare(etcdclientv3.CreateRevision(common.EtcdChangeGroupMinRevisionKey), "=", 0))
|
|
|
|
then = append(then, etcdclientv3.OpPut(common.EtcdChangeGroupMinRevisionKey, ""))
|
|
|
|
txn := s.e.Client().Txn(ctx).If(cmp...).Then(then...)
|
|
|
|
if _, err := txn.Commit(); err != nil {
|
|
|
|
return etcd.FromEtcdError(err)
|
|
|
|
}
|
|
|
|
|
|
|
|
return nil
|
|
|
|
}
|
|
|
|
|
2019-07-25 13:54:58 +00:00
|
|
|
func (s *Runservice) setupDefaultRouter(etCh chan *types.ExecutorTask) http.Handler {
|
|
|
|
maintenanceModeHandler := api.NewMaintenanceModeHandler(logger, s.ah, s.e)
|
|
|
|
exportHandler := api.NewExportHandler(logger, s.ah)
|
2019-05-07 21:56:10 +00:00
|
|
|
|
|
|
|
// executor dedicated api, only calls from executor should happen on these handlers
|
|
|
|
executorStatusHandler := api.NewExecutorStatusHandler(logger, s.e, s.ah)
|
2019-07-25 13:54:58 +00:00
|
|
|
executorTaskStatusHandler := api.NewExecutorTaskStatusHandler(s.e, etCh)
|
2019-09-12 08:36:45 +00:00
|
|
|
executorTaskHandler := api.NewExecutorTaskHandler(logger, s.ah)
|
|
|
|
executorTasksHandler := api.NewExecutorTasksHandler(logger, s.ah)
|
2019-05-07 21:56:10 +00:00
|
|
|
archivesHandler := api.NewArchivesHandler(logger, s.ost)
|
|
|
|
cacheHandler := api.NewCacheHandler(logger, s.ost)
|
|
|
|
cacheCreateHandler := api.NewCacheCreateHandler(logger, s.ost)
|
|
|
|
|
|
|
|
// api from clients
|
|
|
|
executorDeleteHandler := api.NewExecutorDeleteHandler(logger, s.ah)
|
|
|
|
|
|
|
|
logsHandler := api.NewLogsHandler(logger, s.e, s.ost, s.dm)
|
2019-11-09 10:18:00 +00:00
|
|
|
logsDeleteHandler := api.NewLogsDeleteHandler(logger, s.e, s.ost, s.dm)
|
2019-05-07 21:56:10 +00:00
|
|
|
|
|
|
|
runHandler := api.NewRunHandler(logger, s.e, s.dm, s.readDB)
|
|
|
|
runTaskActionsHandler := api.NewRunTaskActionsHandler(logger, s.ah)
|
|
|
|
runsHandler := api.NewRunsHandler(logger, s.readDB)
|
|
|
|
runActionsHandler := api.NewRunActionsHandler(logger, s.ah)
|
|
|
|
runCreateHandler := api.NewRunCreateHandler(logger, s.ah)
|
2019-05-15 07:46:21 +00:00
|
|
|
runEventsHandler := api.NewRunEventsHandler(logger, s.e, s.ost, s.dm)
|
|
|
|
|
2019-05-07 21:56:10 +00:00
|
|
|
changeGroupsUpdateTokensHandler := api.NewChangeGroupsUpdateTokensHandler(logger, s.readDB)
|
|
|
|
|
|
|
|
router := mux.NewRouter()
|
|
|
|
apirouter := router.PathPrefix("/api/v1alpha").Subrouter()
|
|
|
|
|
|
|
|
// don't return 404 on a call to an undefined handler but 400 to distinguish between a non existent resource and a wrong method
|
|
|
|
apirouter.NotFoundHandler = http.HandlerFunc(func(w http.ResponseWriter, r *http.Request) { w.WriteHeader(http.StatusBadRequest) })
|
|
|
|
|
|
|
|
apirouter.Handle("/executor/{executorid}", executorStatusHandler).Methods("POST")
|
|
|
|
apirouter.Handle("/executor/{executorid}", executorDeleteHandler).Methods("DELETE")
|
|
|
|
apirouter.Handle("/executor/{executorid}/tasks", executorTasksHandler).Methods("GET")
|
|
|
|
apirouter.Handle("/executor/{executorid}/tasks/{taskid}", executorTaskHandler).Methods("GET")
|
|
|
|
apirouter.Handle("/executor/{executorid}/tasks/{taskid}", executorTaskStatusHandler).Methods("POST")
|
|
|
|
apirouter.Handle("/executor/archives", archivesHandler).Methods("GET")
|
|
|
|
apirouter.Handle("/executor/caches/{key}", cacheHandler).Methods("HEAD")
|
|
|
|
apirouter.Handle("/executor/caches/{key}", cacheHandler).Methods("GET")
|
|
|
|
apirouter.Handle("/executor/caches/{key}", cacheCreateHandler).Methods("POST")
|
|
|
|
|
|
|
|
apirouter.Handle("/logs", logsHandler).Methods("GET")
|
2019-11-09 10:18:00 +00:00
|
|
|
apirouter.Handle("/logs", logsDeleteHandler).Methods("DELETE")
|
2019-05-07 21:56:10 +00:00
|
|
|
|
2019-05-15 07:46:21 +00:00
|
|
|
apirouter.Handle("/runs/events", runEventsHandler).Methods("GET")
|
2019-05-07 21:56:10 +00:00
|
|
|
apirouter.Handle("/runs/{runid}", runHandler).Methods("GET")
|
|
|
|
apirouter.Handle("/runs/{runid}/actions", runActionsHandler).Methods("PUT")
|
|
|
|
apirouter.Handle("/runs/{runid}/tasks/{taskid}/actions", runTaskActionsHandler).Methods("PUT")
|
|
|
|
apirouter.Handle("/runs", runsHandler).Methods("GET")
|
|
|
|
apirouter.Handle("/runs", runCreateHandler).Methods("POST")
|
|
|
|
|
|
|
|
apirouter.Handle("/changegroups", changeGroupsUpdateTokensHandler).Methods("GET")
|
|
|
|
|
2019-07-25 13:54:58 +00:00
|
|
|
apirouter.Handle("/maintenance", maintenanceModeHandler).Methods("PUT", "DELETE")
|
|
|
|
|
|
|
|
apirouter.Handle("/export", exportHandler).Methods("GET")
|
|
|
|
|
2019-05-07 21:56:10 +00:00
|
|
|
mainrouter := mux.NewRouter()
|
2019-07-13 21:15:00 +00:00
|
|
|
mainrouter.PathPrefix("/").Handler(router)
|
2019-05-07 21:56:10 +00:00
|
|
|
|
|
|
|
// Return a bad request when it doesn't match any route
|
|
|
|
mainrouter.NotFoundHandler = http.HandlerFunc(func(w http.ResponseWriter, r *http.Request) { w.WriteHeader(http.StatusBadRequest) })
|
|
|
|
|
2019-07-25 13:54:58 +00:00
|
|
|
return mainrouter
|
|
|
|
}
|
2019-05-07 21:56:10 +00:00
|
|
|
|
2019-07-25 13:54:58 +00:00
|
|
|
func (s *Runservice) setupMaintenanceRouter() http.Handler {
|
|
|
|
maintenanceModeHandler := api.NewMaintenanceModeHandler(logger, s.ah, s.e)
|
|
|
|
exportHandler := api.NewExportHandler(logger, s.ah)
|
|
|
|
importHandler := api.NewImportHandler(logger, s.ah)
|
2019-05-07 21:56:10 +00:00
|
|
|
|
2019-07-25 13:54:58 +00:00
|
|
|
router := mux.NewRouter()
|
|
|
|
apirouter := router.PathPrefix("/api/v1alpha").Subrouter().UseEncodedPath()
|
|
|
|
|
|
|
|
apirouter.Handle("/maintenance", maintenanceModeHandler).Methods("PUT", "DELETE")
|
|
|
|
|
|
|
|
apirouter.Handle("/export", exportHandler).Methods("GET")
|
|
|
|
apirouter.Handle("/import", importHandler).Methods("POST")
|
|
|
|
|
|
|
|
mainrouter := mux.NewRouter()
|
|
|
|
mainrouter.PathPrefix("/").Handler(router)
|
|
|
|
|
|
|
|
return mainrouter
|
|
|
|
}
|
|
|
|
|
|
|
|
func (s *Runservice) Run(ctx context.Context) error {
|
|
|
|
for {
|
|
|
|
if err := s.run(ctx); err != nil {
|
|
|
|
log.Errorf("run error: %+v", err)
|
|
|
|
}
|
|
|
|
|
|
|
|
sleepCh := time.NewTimer(1 * time.Second).C
|
|
|
|
select {
|
|
|
|
case <-ctx.Done():
|
|
|
|
log.Infof("runservice exiting")
|
|
|
|
return nil
|
|
|
|
case <-sleepCh:
|
|
|
|
}
|
|
|
|
}
|
|
|
|
}
|
|
|
|
|
|
|
|
func (s *Runservice) run(ctx context.Context) error {
|
2019-05-07 21:56:10 +00:00
|
|
|
var tlsConfig *tls.Config
|
|
|
|
if s.c.Web.TLS {
|
|
|
|
var err error
|
|
|
|
tlsConfig, err = util.NewTLSConfig(s.c.Web.TLSCertFile, s.c.Web.TLSKeyFile, "", false)
|
|
|
|
if err != nil {
|
|
|
|
log.Errorf("err: %+v")
|
|
|
|
return err
|
|
|
|
}
|
|
|
|
}
|
|
|
|
|
2019-07-25 13:54:58 +00:00
|
|
|
resp, err := s.e.Get(ctx, common.EtcdMaintenanceKey, 0)
|
|
|
|
if err != nil && err != etcd.ErrKeyNotFound {
|
|
|
|
return err
|
|
|
|
}
|
|
|
|
|
|
|
|
maintenanceMode := false
|
|
|
|
if len(resp.Kvs) > 0 {
|
|
|
|
log.Infof("maintenance mode key is present")
|
|
|
|
maintenanceMode = true
|
|
|
|
}
|
|
|
|
|
|
|
|
s.maintenanceMode = maintenanceMode
|
|
|
|
s.dm.SetMaintenanceMode(maintenanceMode)
|
|
|
|
s.ah.SetMaintenanceMode(maintenanceMode)
|
|
|
|
|
|
|
|
ctx, cancel := context.WithCancel(ctx)
|
|
|
|
errCh := make(chan error, 100)
|
|
|
|
var wg sync.WaitGroup
|
|
|
|
dmReadyCh := make(chan struct{})
|
|
|
|
|
|
|
|
var mainrouter http.Handler
|
|
|
|
if s.maintenanceMode {
|
|
|
|
mainrouter = s.setupMaintenanceRouter()
|
|
|
|
util.GoWait(&wg, func() { s.maintenanceModeWatcherLoop(ctx, cancel, s.maintenanceMode) })
|
|
|
|
|
|
|
|
} else {
|
|
|
|
ch := make(chan *types.ExecutorTask)
|
|
|
|
mainrouter = s.setupDefaultRouter(ch)
|
|
|
|
|
|
|
|
util.GoWait(&wg, func() { s.maintenanceModeWatcherLoop(ctx, cancel, s.maintenanceMode) })
|
|
|
|
|
|
|
|
// TODO(sgotti) wait for all goroutines exiting
|
|
|
|
util.GoWait(&wg, func() { errCh <- s.dm.Run(ctx, dmReadyCh) })
|
|
|
|
|
|
|
|
// wait for dm to be ready
|
|
|
|
<-dmReadyCh
|
|
|
|
|
|
|
|
for {
|
|
|
|
err := s.InitEtcd(ctx)
|
|
|
|
if err == nil {
|
|
|
|
break
|
|
|
|
}
|
|
|
|
log.Errorf("failed to initialize etcd: %+v", err)
|
|
|
|
|
|
|
|
sleepCh := time.NewTimer(1 * time.Second).C
|
|
|
|
select {
|
|
|
|
case <-ctx.Done():
|
|
|
|
return nil
|
|
|
|
case <-sleepCh:
|
|
|
|
}
|
|
|
|
}
|
|
|
|
|
|
|
|
util.GoWait(&wg, func() { errCh <- s.readDB.Run(ctx) })
|
|
|
|
|
|
|
|
util.GoWait(&wg, func() { s.executorTasksCleanerLoop(ctx) })
|
|
|
|
util.GoWait(&wg, func() { s.runsSchedulerLoop(ctx) })
|
|
|
|
util.GoWait(&wg, func() { s.runTasksUpdaterLoop(ctx) })
|
|
|
|
util.GoWait(&wg, func() { s.fetcherLoop(ctx) })
|
|
|
|
util.GoWait(&wg, func() { s.finishedRunsArchiverLoop(ctx) })
|
|
|
|
util.GoWait(&wg, func() { s.compactChangeGroupsLoop(ctx) })
|
|
|
|
util.GoWait(&wg, func() { s.cacheCleanerLoop(ctx, s.c.RunCacheExpireInterval) })
|
2019-09-09 13:05:13 +00:00
|
|
|
util.GoWait(&wg, func() { s.workspaceCleanerLoop(ctx, s.c.RunWorkspaceExpireInterval) })
|
2019-07-25 13:54:58 +00:00
|
|
|
util.GoWait(&wg, func() { s.executorTaskUpdateHandler(ctx, ch) })
|
|
|
|
util.GoWait(&wg, func() { s.etcdPingerLoop(ctx) })
|
|
|
|
}
|
|
|
|
|
2019-05-07 21:56:10 +00:00
|
|
|
httpServer := http.Server{
|
|
|
|
Addr: s.c.Web.ListenAddress,
|
|
|
|
Handler: mainrouter,
|
|
|
|
TLSConfig: tlsConfig,
|
|
|
|
}
|
|
|
|
|
2019-07-25 13:54:58 +00:00
|
|
|
lerrCh := make(chan error, 1)
|
|
|
|
util.GoWait(&wg, func() {
|
2021-03-19 09:52:32 +00:00
|
|
|
if !s.c.Web.TLS {
|
|
|
|
lerrCh <- httpServer.ListenAndServe()
|
|
|
|
} else {
|
|
|
|
lerrCh <- httpServer.ListenAndServeTLS("", "")
|
|
|
|
}
|
2019-07-25 13:54:58 +00:00
|
|
|
})
|
2019-05-07 21:56:10 +00:00
|
|
|
|
|
|
|
select {
|
|
|
|
case <-ctx.Done():
|
2019-07-25 13:54:58 +00:00
|
|
|
log.Infof("runservice run exiting")
|
|
|
|
case err = <-lerrCh:
|
2019-07-04 13:50:37 +00:00
|
|
|
if err != nil {
|
|
|
|
log.Errorf("http server listen error: %v", err)
|
|
|
|
}
|
2019-05-07 21:56:10 +00:00
|
|
|
case err := <-errCh:
|
2019-07-04 13:50:37 +00:00
|
|
|
if err != nil {
|
|
|
|
log.Errorf("error: %+v", err)
|
|
|
|
}
|
2019-05-07 21:56:10 +00:00
|
|
|
}
|
2019-07-04 13:50:37 +00:00
|
|
|
|
2019-07-25 13:54:58 +00:00
|
|
|
cancel()
|
|
|
|
httpServer.Close()
|
|
|
|
wg.Wait()
|
|
|
|
|
|
|
|
return err
|
2019-05-07 21:56:10 +00:00
|
|
|
}
|