mirror of
https://github.com/lordmathis/lemma.git
synced 2025-11-06 07:54:22 +00:00
Split main into app package
This commit is contained in:
@@ -1,26 +1,11 @@
|
|||||||
// Package main contains the main entry point for the application. It sets up the server, database, and other services, and starts the server.
|
// Package main provides the entry point for the application. It loads the configuration, initializes the server, and starts the server.
|
||||||
package main
|
package main
|
||||||
|
|
||||||
import (
|
import (
|
||||||
"log"
|
"log"
|
||||||
"net/http"
|
|
||||||
"os"
|
|
||||||
"time"
|
|
||||||
|
|
||||||
"github.com/go-chi/chi/v5"
|
"novamd/internal/app"
|
||||||
"github.com/go-chi/chi/v5/middleware"
|
|
||||||
"github.com/go-chi/cors"
|
|
||||||
"github.com/go-chi/httprate"
|
|
||||||
|
|
||||||
"github.com/unrolled/secure"
|
|
||||||
|
|
||||||
"novamd/internal/api"
|
|
||||||
"novamd/internal/auth"
|
|
||||||
"novamd/internal/config"
|
"novamd/internal/config"
|
||||||
"novamd/internal/db"
|
|
||||||
"novamd/internal/handlers"
|
|
||||||
"novamd/internal/secrets"
|
|
||||||
"novamd/internal/storage"
|
|
||||||
)
|
)
|
||||||
|
|
||||||
func main() {
|
func main() {
|
||||||
@@ -30,99 +15,19 @@ func main() {
|
|||||||
log.Fatal("Failed to load configuration:", err)
|
log.Fatal("Failed to load configuration:", err)
|
||||||
}
|
}
|
||||||
|
|
||||||
// Initialize secrets service
|
// Initialize and start server
|
||||||
secretsService, err := secrets.NewService(cfg.EncryptionKey)
|
server, err := app.NewServer(cfg)
|
||||||
if err != nil {
|
if err != nil {
|
||||||
log.Fatal("Failed to initialize secrets service:", err)
|
log.Fatal("Failed to initialize server:", err)
|
||||||
}
|
|
||||||
|
|
||||||
// Initialize database
|
|
||||||
database, err := db.Init(cfg.DBPath, secretsService)
|
|
||||||
if err != nil {
|
|
||||||
log.Fatal(err)
|
|
||||||
}
|
|
||||||
err = database.Migrate()
|
|
||||||
if err != nil {
|
|
||||||
log.Fatal("Failed to apply database migrations:", err)
|
|
||||||
}
|
}
|
||||||
defer func() {
|
defer func() {
|
||||||
if err := database.Close(); err != nil {
|
if err := server.Close(); err != nil {
|
||||||
log.Printf("Error closing database: %v", err)
|
log.Println("Error closing server:", err)
|
||||||
}
|
}
|
||||||
}()
|
}()
|
||||||
|
|
||||||
// Get or generate JWT signing key
|
|
||||||
signingKey := cfg.JWTSigningKey
|
|
||||||
if signingKey == "" {
|
|
||||||
signingKey, err = database.EnsureJWTSecret()
|
|
||||||
if err != nil {
|
|
||||||
log.Fatal("Failed to ensure JWT secret:", err)
|
|
||||||
}
|
|
||||||
}
|
|
||||||
|
|
||||||
// Initialize filesystem
|
|
||||||
s := storage.NewService(cfg.WorkDir)
|
|
||||||
|
|
||||||
// Initialize JWT service
|
|
||||||
jwtManager, err := auth.NewJWTService(auth.JWTConfig{
|
|
||||||
SigningKey: signingKey,
|
|
||||||
AccessTokenExpiry: 15 * time.Minute,
|
|
||||||
RefreshTokenExpiry: 7 * 24 * time.Hour,
|
|
||||||
})
|
|
||||||
if err != nil {
|
|
||||||
log.Fatal("Failed to initialize JWT service:", err)
|
|
||||||
}
|
|
||||||
|
|
||||||
// Initialize auth middleware
|
|
||||||
authMiddleware := auth.NewMiddleware(jwtManager)
|
|
||||||
|
|
||||||
// Initialize session service
|
|
||||||
sessionService := auth.NewSessionService(database, jwtManager)
|
|
||||||
|
|
||||||
// Set up router
|
|
||||||
r := chi.NewRouter()
|
|
||||||
|
|
||||||
// Middleware
|
|
||||||
r.Use(middleware.Logger)
|
|
||||||
r.Use(middleware.Recoverer)
|
|
||||||
r.Use(middleware.RequestID)
|
|
||||||
r.Use(middleware.RealIP)
|
|
||||||
|
|
||||||
// Security headers
|
|
||||||
r.Use(secure.New(secure.Options{
|
|
||||||
SSLRedirect: false, // Let proxy handle HTTPS
|
|
||||||
SSLProxyHeaders: map[string]string{"X-Forwarded-Proto": "https"},
|
|
||||||
IsDevelopment: cfg.IsDevelopment,
|
|
||||||
}).Handler)
|
|
||||||
|
|
||||||
// CORS if origins are configured
|
|
||||||
if len(cfg.CORSOrigins) > 0 {
|
|
||||||
r.Use(cors.Handler(cors.Options{
|
|
||||||
AllowedOrigins: cfg.CORSOrigins,
|
|
||||||
AllowedMethods: []string{"GET", "POST", "PUT", "DELETE", "OPTIONS"},
|
|
||||||
AllowedHeaders: []string{"Accept", "Authorization", "Content-Type", "X-Requested-With"},
|
|
||||||
AllowCredentials: true,
|
|
||||||
MaxAge: 300, // Maximum value not ignored by any major browser
|
|
||||||
}))
|
|
||||||
}
|
|
||||||
|
|
||||||
r.Use(middleware.Timeout(30 * time.Second))
|
|
||||||
|
|
||||||
// Set up routes
|
|
||||||
r.Route("/api/v1", func(r chi.Router) {
|
|
||||||
r.Use(httprate.LimitByIP(cfg.RateLimitRequests, cfg.RateLimitWindow))
|
|
||||||
api.SetupRoutes(r, database, s, authMiddleware, sessionService)
|
|
||||||
})
|
|
||||||
|
|
||||||
// Handle all other routes with static file server
|
|
||||||
r.Get("/*", handlers.NewStaticHandler(cfg.StaticPath).ServeHTTP)
|
|
||||||
|
|
||||||
// Start server
|
// Start server
|
||||||
port := os.Getenv("PORT")
|
if err := server.Start(); err != nil {
|
||||||
if port == "" {
|
log.Fatal("Server error:", err)
|
||||||
port = "8080"
|
|
||||||
}
|
}
|
||||||
|
|
||||||
log.Printf("Server starting on port %s", port)
|
|
||||||
log.Fatal(http.ListenAndServe(":"+port, r))
|
|
||||||
}
|
}
|
||||||
|
|||||||
170
server/internal/app/app.go
Normal file
170
server/internal/app/app.go
Normal file
@@ -0,0 +1,170 @@
|
|||||||
|
// Package app provides application-level functionality for initializing and running the server
|
||||||
|
package app
|
||||||
|
|
||||||
|
import (
|
||||||
|
"fmt"
|
||||||
|
"log"
|
||||||
|
"net/http"
|
||||||
|
"time"
|
||||||
|
|
||||||
|
"github.com/go-chi/chi/v5"
|
||||||
|
"github.com/go-chi/chi/v5/middleware"
|
||||||
|
"github.com/go-chi/cors"
|
||||||
|
"github.com/go-chi/httprate"
|
||||||
|
"github.com/unrolled/secure"
|
||||||
|
|
||||||
|
"novamd/internal/api"
|
||||||
|
"novamd/internal/auth"
|
||||||
|
"novamd/internal/config"
|
||||||
|
"novamd/internal/db"
|
||||||
|
"novamd/internal/handlers"
|
||||||
|
"novamd/internal/secrets"
|
||||||
|
"novamd/internal/storage"
|
||||||
|
)
|
||||||
|
|
||||||
|
// Server represents the HTTP server and its dependencies
|
||||||
|
type Server struct {
|
||||||
|
router *chi.Mux
|
||||||
|
config *config.Config
|
||||||
|
db db.Database
|
||||||
|
storage storage.Manager
|
||||||
|
}
|
||||||
|
|
||||||
|
// NewServer initializes a new server instance with all dependencies
|
||||||
|
func NewServer(cfg *config.Config) (*Server, error) {
|
||||||
|
// Initialize secrets service
|
||||||
|
secretsService, err := secrets.NewService(cfg.EncryptionKey)
|
||||||
|
if err != nil {
|
||||||
|
return nil, fmt.Errorf("failed to initialize secrets service: %w", err)
|
||||||
|
}
|
||||||
|
|
||||||
|
// Initialize database
|
||||||
|
database, err := initDatabase(cfg, secretsService)
|
||||||
|
if err != nil {
|
||||||
|
return nil, fmt.Errorf("failed to initialize database: %w", err)
|
||||||
|
}
|
||||||
|
|
||||||
|
// Initialize filesystem
|
||||||
|
storageManager := storage.NewService(cfg.WorkDir)
|
||||||
|
|
||||||
|
// Initialize router
|
||||||
|
router := initRouter(cfg)
|
||||||
|
|
||||||
|
return &Server{
|
||||||
|
router: router,
|
||||||
|
config: cfg,
|
||||||
|
db: database,
|
||||||
|
storage: storageManager,
|
||||||
|
}, nil
|
||||||
|
}
|
||||||
|
|
||||||
|
// Start configures and starts the HTTP server
|
||||||
|
func (s *Server) Start() error {
|
||||||
|
// Set up authentication
|
||||||
|
jwtManager, sessionService, err := s.setupAuth()
|
||||||
|
if err != nil {
|
||||||
|
return fmt.Errorf("failed to setup authentication: %w", err)
|
||||||
|
}
|
||||||
|
|
||||||
|
// Set up routes
|
||||||
|
s.setupRoutes(jwtManager, sessionService)
|
||||||
|
|
||||||
|
// Start server
|
||||||
|
addr := ":" + s.config.Port
|
||||||
|
log.Printf("Server starting on port %s", s.config.Port)
|
||||||
|
return http.ListenAndServe(addr, s.router)
|
||||||
|
}
|
||||||
|
|
||||||
|
// Close handles graceful shutdown of server dependencies
|
||||||
|
func (s *Server) Close() error {
|
||||||
|
return s.db.Close()
|
||||||
|
}
|
||||||
|
|
||||||
|
// initDatabase initializes and migrates the database
|
||||||
|
func initDatabase(cfg *config.Config, secretsService secrets.Service) (db.Database, error) {
|
||||||
|
database, err := db.Init(cfg.DBPath, secretsService)
|
||||||
|
if err != nil {
|
||||||
|
return nil, fmt.Errorf("failed to initialize database: %w", err)
|
||||||
|
}
|
||||||
|
|
||||||
|
if err := database.Migrate(); err != nil {
|
||||||
|
return nil, fmt.Errorf("failed to apply database migrations: %w", err)
|
||||||
|
}
|
||||||
|
|
||||||
|
return database, nil
|
||||||
|
}
|
||||||
|
|
||||||
|
// initRouter creates and configures the chi router with middleware
|
||||||
|
func initRouter(cfg *config.Config) *chi.Mux {
|
||||||
|
r := chi.NewRouter()
|
||||||
|
|
||||||
|
// Basic middleware
|
||||||
|
r.Use(middleware.Logger)
|
||||||
|
r.Use(middleware.Recoverer)
|
||||||
|
r.Use(middleware.RequestID)
|
||||||
|
r.Use(middleware.RealIP)
|
||||||
|
r.Use(middleware.Timeout(30 * time.Second))
|
||||||
|
|
||||||
|
// Security headers
|
||||||
|
r.Use(secure.New(secure.Options{
|
||||||
|
SSLRedirect: false, // Let proxy handle HTTPS
|
||||||
|
SSLProxyHeaders: map[string]string{"X-Forwarded-Proto": "https"},
|
||||||
|
IsDevelopment: cfg.IsDevelopment,
|
||||||
|
}).Handler)
|
||||||
|
|
||||||
|
// CORS if origins are configured
|
||||||
|
if len(cfg.CORSOrigins) > 0 {
|
||||||
|
r.Use(cors.Handler(cors.Options{
|
||||||
|
AllowedOrigins: cfg.CORSOrigins,
|
||||||
|
AllowedMethods: []string{"GET", "POST", "PUT", "DELETE", "OPTIONS"},
|
||||||
|
AllowedHeaders: []string{"Accept", "Authorization", "Content-Type", "X-Requested-With"},
|
||||||
|
AllowCredentials: true,
|
||||||
|
MaxAge: 300,
|
||||||
|
}))
|
||||||
|
}
|
||||||
|
|
||||||
|
return r
|
||||||
|
}
|
||||||
|
|
||||||
|
// setupAuth initializes JWT and session services
|
||||||
|
func (s *Server) setupAuth() (auth.JWTManager, *auth.SessionService, error) {
|
||||||
|
// Get or generate JWT signing key
|
||||||
|
signingKey := s.config.JWTSigningKey
|
||||||
|
if signingKey == "" {
|
||||||
|
var err error
|
||||||
|
signingKey, err = s.db.EnsureJWTSecret()
|
||||||
|
if err != nil {
|
||||||
|
return nil, nil, fmt.Errorf("failed to ensure JWT secret: %w", err)
|
||||||
|
}
|
||||||
|
}
|
||||||
|
|
||||||
|
// Initialize JWT service
|
||||||
|
jwtManager, err := auth.NewJWTService(auth.JWTConfig{
|
||||||
|
SigningKey: signingKey,
|
||||||
|
AccessTokenExpiry: 15 * time.Minute,
|
||||||
|
RefreshTokenExpiry: 7 * 24 * time.Hour,
|
||||||
|
})
|
||||||
|
if err != nil {
|
||||||
|
return nil, nil, fmt.Errorf("failed to initialize JWT service: %w", err)
|
||||||
|
}
|
||||||
|
|
||||||
|
// Initialize session service
|
||||||
|
sessionService := auth.NewSessionService(s.db, jwtManager)
|
||||||
|
|
||||||
|
return jwtManager, sessionService, nil
|
||||||
|
}
|
||||||
|
|
||||||
|
// setupRoutes configures all application routes
|
||||||
|
func (s *Server) setupRoutes(jwtManager auth.JWTManager, sessionService *auth.SessionService) {
|
||||||
|
// Initialize auth middleware
|
||||||
|
authMiddleware := auth.NewMiddleware(jwtManager)
|
||||||
|
|
||||||
|
// Set up API routes
|
||||||
|
s.router.Route("/api/v1", func(r chi.Router) {
|
||||||
|
r.Use(httprate.LimitByIP(s.config.RateLimitRequests, s.config.RateLimitWindow))
|
||||||
|
api.SetupRoutes(r, s.db, s.storage, authMiddleware, sessionService)
|
||||||
|
})
|
||||||
|
|
||||||
|
// Handle all other routes with static file server
|
||||||
|
s.router.Get("/*", handlers.NewStaticHandler(s.config.StaticPath).ServeHTTP)
|
||||||
|
}
|
||||||
Reference in New Issue
Block a user