-
Notifications
You must be signed in to change notification settings - Fork 29
Expand file tree
/
Copy pathserver.go
More file actions
253 lines (224 loc) · 9 KB
/
server.go
File metadata and controls
253 lines (224 loc) · 9 KB
1
2
3
4
5
6
7
8
9
10
11
12
13
14
15
16
17
18
19
20
21
22
23
24
25
26
27
28
29
30
31
32
33
34
35
36
37
38
39
40
41
42
43
44
45
46
47
48
49
50
51
52
53
54
55
56
57
58
59
60
61
62
63
64
65
66
67
68
69
70
71
72
73
74
75
76
77
78
79
80
81
82
83
84
85
86
87
88
89
90
91
92
93
94
95
96
97
98
99
100
101
102
103
104
105
106
107
108
109
110
111
112
113
114
115
116
117
118
119
120
121
122
123
124
125
126
127
128
129
130
131
132
133
134
135
136
137
138
139
140
141
142
143
144
145
146
147
148
149
150
151
152
153
154
155
156
157
158
159
160
161
162
163
164
165
166
167
168
169
170
171
172
173
174
175
176
177
178
179
180
181
182
183
184
185
186
187
188
189
190
191
192
193
194
195
196
197
198
199
200
201
202
203
204
205
206
207
208
209
210
211
212
213
214
215
216
217
218
219
220
221
222
223
224
225
226
227
228
229
230
231
232
233
234
235
236
237
238
239
240
241
242
243
244
245
246
247
248
249
250
251
252
253
package loop
import (
"context"
"fmt"
"os"
"os/signal"
"time"
"github.com/jmoiron/sqlx"
"go.opentelemetry.io/otel/attribute"
sdkmetric "go.opentelemetry.io/otel/sdk/metric"
semconv "go.opentelemetry.io/otel/semconv/v1.17.0"
"github.com/smartcontractkit/chainlink-common/pkg/beholder"
"github.com/smartcontractkit/chainlink-common/pkg/config/build"
"github.com/smartcontractkit/chainlink-common/pkg/logger"
"github.com/smartcontractkit/chainlink-common/pkg/services"
"github.com/smartcontractkit/chainlink-common/pkg/services/otelhealth"
"github.com/smartcontractkit/chainlink-common/pkg/services/promhealth"
"github.com/smartcontractkit/chainlink-common/pkg/settings/limits"
"github.com/smartcontractkit/chainlink-common/pkg/sqlutil"
"github.com/smartcontractkit/chainlink-common/pkg/sqlutil/pg"
)
// NewStartedServer returns a started Server.
// The caller is responsible for calling Server.Stop().
func NewStartedServer(loggerName string) (*Server, error) {
return NewStartedServerWithOtelViews(loggerName, nil)
}
// MustNewStartedServer returns a new started Server like NewStartedServer, but logs and exits in the event of error.
// The caller is responsible for calling Server.Stop().
func MustNewStartedServer(loggerName string) *Server {
return MustNewStartedServerWithOtelViews(loggerName, nil)
}
// NewStartedServerWithOtelViews returns a started Server with otel views registered on the beholder client.
// The caller is responsible for calling Server.Stop().
func NewStartedServerWithOtelViews(loggerName string, otelViews []sdkmetric.View) (*Server, error) {
s, err := newServer(loggerName, otelViews)
if err != nil {
return nil, err
}
err = s.start()
if err != nil {
return nil, err
}
return s, nil
}
// MustNewStartedServerWithOtelViews returns a new started Server like NewStartedServerWithOtelViews, but logs and exits in the event of error.
// The caller is responsible for calling Server.Stop().
func MustNewStartedServerWithOtelViews(loggerName string, otelViews []sdkmetric.View) *Server {
s, err := newServer(loggerName, otelViews)
if err != nil {
fmt.Fprintf(os.Stderr, "Failed to start server: %s\n", err)
os.Exit(1)
}
err = s.start()
if err != nil {
s.Logger.Fatalf("Failed to start server: %s", err)
}
return s
}
// Server holds common plugin server fields.
type Server struct {
EnvConfig EnvConfig
GRPCOpts GRPCOpts
Logger logger.SugaredLogger
db *sqlx.DB // optional
dbStatsReporter *pg.StatsReporter // optional
DataSource sqlutil.DataSource // optional
promServer *PromServer
checker *services.HealthChecker
LimitsFactory limits.Factory
otelViews []sdkmetric.View
}
func newServer(loggerName string, otelViews []sdkmetric.View) (*Server, error) {
lggr, err := NewLogger()
if err != nil {
return nil, fmt.Errorf("error creating logger: %w", err)
}
lggr = logger.Named(lggr, loggerName)
return &Server{
GRPCOpts: NewGRPCOpts(nil), // default prometheus.Registerer
Logger: logger.Sugared(lggr),
otelViews: otelViews,
}, nil
}
func (s *Server) start() error {
ctx, stopSig := signal.NotifyContext(context.Background(), os.Interrupt)
defer stopSig()
stopAfter := context.AfterFunc(ctx, stopSig)
defer stopAfter()
if err := s.EnvConfig.parse(); err != nil {
return fmt.Errorf("error getting environment configuration: %w", err)
}
tracingAttrs := s.EnvConfig.TracingAttributes
if tracingAttrs == nil {
tracingAttrs = make(map[string]string, 1)
}
tracingAttrs[string(semconv.ServiceInstanceIDKey)] = s.EnvConfig.AppID
tracingConfig := TracingConfig{
Enabled: s.EnvConfig.TracingEnabled,
CollectorTarget: s.EnvConfig.TracingCollectorTarget,
SamplingRatio: s.EnvConfig.TracingSamplingRatio,
TLSCertPath: s.EnvConfig.TracingTLSCertPath,
NodeAttributes: tracingAttrs,
OnDialError: func(err error) { s.Logger.Errorw("Failed to dial", "err", err) },
}
if s.EnvConfig.TelemetryEndpoint == "" {
err := SetupTracing(tracingConfig)
if err != nil {
return fmt.Errorf("failed to setup tracing: %w", err)
}
} else {
var attributes []attribute.KeyValue
if tracingConfig.Enabled {
attributes = tracingConfig.Attributes()
}
beholderCfg := beholder.Config{
InsecureConnection: s.EnvConfig.TelemetryInsecureConnection,
CACertFile: s.EnvConfig.TelemetryCACertFile,
OtelExporterGRPCEndpoint: s.EnvConfig.TelemetryEndpoint,
ResourceAttributes: append(attributes, s.EnvConfig.TelemetryAttributes.AsStringAttributes()...),
TraceSampleRatio: s.EnvConfig.TelemetryTraceSampleRatio,
AuthHeaders: s.EnvConfig.TelemetryAuthHeaders,
AuthPublicKeyHex: s.EnvConfig.TelemetryAuthPubKeyHex,
EmitterBatchProcessor: s.EnvConfig.TelemetryEmitterBatchProcessor,
EmitterExportTimeout: s.EnvConfig.TelemetryEmitterExportTimeout,
EmitterExportInterval: s.EnvConfig.TelemetryEmitterExportInterval,
EmitterExportMaxBatchSize: s.EnvConfig.TelemetryEmitterExportMaxBatchSize,
EmitterMaxQueueSize: s.EnvConfig.TelemetryEmitterMaxQueueSize,
LogStreamingEnabled: s.EnvConfig.TelemetryLogStreamingEnabled,
LogLevel: s.EnvConfig.TelemetryLogLevel,
ChipIngressEmitterEnabled: s.EnvConfig.ChipIngressEndpoint != "",
ChipIngressEmitterGRPCEndpoint: s.EnvConfig.ChipIngressEndpoint,
ChipIngressInsecureConnection: s.EnvConfig.ChipIngressInsecureConnection,
}
// note: due to the OTEL specification, all histogram buckets
// must be defined when the beholder client is created
beholderCfg.MetricViews = append(beholderCfg.MetricViews, s.otelViews...)
if tracingConfig.Enabled {
if beholderCfg.AuthHeaders != nil {
tracingConfig.AuthHeaders = beholderCfg.AuthHeaders
}
exporter, err := tracingConfig.NewSpanExporter()
if err != nil {
return fmt.Errorf("failed to setup tracing exporter: %w", err)
}
beholderCfg.TraceSpanExporter = exporter
}
beholderClient, err := beholder.NewClient(beholderCfg)
if err != nil {
return fmt.Errorf("failed to create beholder client: %w", err)
}
beholder.SetClient(beholderClient)
beholder.SetGlobalOtelProviders()
if beholderCfg.LogStreamingEnabled {
otelLogger, err := NewOtelLogger(beholderClient.Logger, beholderCfg.LogLevel)
if err != nil {
return fmt.Errorf("failed to enable log streaming: %w", err)
}
s.Logger = logger.Sugared(logger.Named(otelLogger, s.Logger.Name()))
}
}
s.promServer = NewPromServer(s.EnvConfig.PrometheusPort, s.Logger)
if err := s.promServer.Start(); err != nil {
return fmt.Errorf("error starting prometheus server: %w", err)
}
var healthCfg services.HealthCheckerConfig
healthCfg = promhealth.ConfigureHooks(healthCfg)
if bc := beholder.GetClient(); bc != nil {
var err error
healthCfg, err = otelhealth.ConfigureHooks(healthCfg, bc.Meter)
if err != nil {
return fmt.Errorf("failed to configure health checker otel hooks: %w", err)
}
}
s.checker = healthCfg.New()
if err := s.checker.Start(); err != nil {
return fmt.Errorf("error starting health checker: %w", err)
}
if s.EnvConfig.DatabaseURL != nil {
pg.SetApplicationName(s.EnvConfig.DatabaseURL.URL(), build.Program)
dbURL := s.EnvConfig.DatabaseURL.URL().String()
var err error
s.db, err = pg.DBConfig{
IdleInTxSessionTimeout: s.EnvConfig.DatabaseIdleInTxSessionTimeout,
LockTimeout: s.EnvConfig.DatabaseLockTimeout,
MaxOpenConns: s.EnvConfig.DatabaseMaxOpenConns,
MaxIdleConns: s.EnvConfig.DatabaseMaxIdleConns,
EnableTracing: s.EnvConfig.DatabaseTracingEnabled,
}.New(ctx, dbURL, pg.DriverPostgres)
if err != nil {
return fmt.Errorf("error connecting to DataBase: %w", err)
}
s.DataSource = sqlutil.WrapDataSource(s.db, s.Logger,
sqlutil.TimeoutHook(func() time.Duration { return s.EnvConfig.DatabaseQueryTimeout }),
sqlutil.MonitorHook(func() bool { return s.EnvConfig.DatabaseLogSQL }))
s.dbStatsReporter = pg.NewStatsReporter(s.db.Stats, s.Logger)
s.dbStatsReporter.Start()
}
s.LimitsFactory.Logger = s.Logger.Named("LimitsFactory")
if bc := beholder.GetClient(); bc != nil {
s.LimitsFactory.Meter = bc.Meter
}
return nil
}
// MustRegister registers the HealthReporter with services.HealthChecker, or exits upon failure.
func (s *Server) MustRegister(c services.HealthReporter) {
if err := s.Register(c); err != nil {
s.Logger.Fatalf("Failed to register %s with health checker: %v", c.Name(), err)
}
}
func (s *Server) Register(c services.HealthReporter) error { return s.checker.Register(c) }
// Stop closes resources and flushes logs.
func (s *Server) Stop() {
if s.dbStatsReporter != nil {
s.dbStatsReporter.Stop()
}
if s.db != nil {
s.Logger.ErrorIfFn(s.db.Close, "Failed to close database connection")
}
s.Logger.ErrorIfFn(s.checker.Close, "Failed to close health checker")
s.Logger.ErrorIfFn(s.promServer.Close, "Failed to close prometheus server")
if err := s.Logger.Sync(); err != nil {
fmt.Println("Failed to sync logger:", err)
}
}