2019-09-05 01:37:13 +02:00
package main
import (
2021-02-06 02:45:28 +01:00
"log"
2019-12-04 22:44:35 +01:00
"os"
2021-02-06 02:45:28 +01:00
"os/signal"
2023-12-25 02:48:43 +01:00
"strconv"
2021-02-06 02:45:28 +01:00
"syscall"
2021-05-19 04:29:15 +02:00
"time"
2020-10-30 16:30:03 +01:00
2022-12-06 07:41:09 +01:00
"github.com/TwiN/gatus/v5/config"
"github.com/TwiN/gatus/v5/controller"
"github.com/TwiN/gatus/v5/storage/store"
"github.com/TwiN/gatus/v5/watchdog"
2019-09-05 01:37:13 +02:00
)
func main ( ) {
2023-12-25 02:48:43 +01:00
if delayInSeconds , _ := strconv . Atoi ( os . Getenv ( "GATUS_DELAY_START_SECONDS" ) ) ; delayInSeconds > 0 {
log . Printf ( "Delaying start by %d seconds" , delayInSeconds )
time . Sleep ( time . Duration ( delayInSeconds ) * time . Second )
}
2021-05-19 04:29:15 +02:00
cfg , err := loadConfiguration ( )
if err != nil {
panic ( err )
}
2021-10-29 01:35:46 +02:00
initializeStorage ( cfg )
2021-05-19 04:29:15 +02:00
start ( cfg )
2021-02-06 02:45:28 +01:00
// Wait for termination signal
2021-05-19 04:29:15 +02:00
signalChannel := make ( chan os . Signal , 1 )
2021-02-06 02:45:28 +01:00
done := make ( chan bool , 1 )
2021-05-19 04:29:15 +02:00
signal . Notify ( signalChannel , os . Interrupt , syscall . SIGTERM )
2021-02-06 02:45:28 +01:00
go func ( ) {
2021-05-19 04:29:15 +02:00
<- signalChannel
2021-03-04 04:31:55 +01:00
log . Println ( "Received termination signal, attempting to gracefully shut down" )
2023-08-05 00:30:15 +02:00
stop ( cfg )
2021-05-19 04:29:15 +02:00
save ( )
2021-02-06 02:45:28 +01:00
done <- true
} ( )
<- done
log . Println ( "Shutting down" )
2019-09-07 03:59:50 +02:00
}
2021-07-09 05:39:12 +02:00
func start ( cfg * config . Config ) {
2022-07-29 02:07:53 +02:00
go controller . Handle ( cfg )
2021-07-09 05:39:12 +02:00
watchdog . Monitor ( cfg )
go listenToConfigurationFileChanges ( cfg )
}
2023-08-05 00:30:15 +02:00
func stop ( cfg * config . Config ) {
watchdog . Shutdown ( cfg )
2021-05-19 04:29:15 +02:00
controller . Shutdown ( )
}
func save ( ) {
2021-10-29 01:35:46 +02:00
if err := store . Get ( ) . Save ( ) ; err != nil {
2021-05-19 04:29:15 +02:00
log . Println ( "Failed to save storage provider:" , err . Error ( ) )
}
}
2023-01-08 23:53:37 +01:00
func loadConfiguration ( ) ( * config . Config , error ) {
configPath := os . Getenv ( "GATUS_CONFIG_PATH" )
// Backwards compatibility
if len ( configPath ) == 0 {
2023-01-11 01:04:19 +01:00
if configPath = os . Getenv ( "GATUS_CONFIG_FILE" ) ; len ( configPath ) > 0 {
log . Println ( "WARNING: GATUS_CONFIG_FILE is deprecated. Please use GATUS_CONFIG_PATH instead." )
}
2019-12-04 22:44:35 +01:00
}
2023-01-08 23:53:37 +01:00
return config . LoadConfiguration ( configPath )
2021-05-19 04:29:15 +02:00
}
2021-10-29 01:35:46 +02:00
// initializeStorage initializes the storage provider
//
// Q: "TwiN, why are you putting this here? Wouldn't it make more sense to have this in the config?!"
// A: Yes. Yes it would make more sense to have it in the config package. But I don't want to import
2022-12-06 07:41:09 +01:00
// the massive SQL dependencies just because I want to import the config, so here we are.
2021-10-29 01:35:46 +02:00
func initializeStorage ( cfg * config . Config ) {
err := store . Initialize ( cfg . Storage )
if err != nil {
panic ( err )
}
// Remove all EndpointStatus that represent endpoints which no longer exist in the configuration
var keys [ ] string
2024-05-10 04:56:16 +02:00
for _ , ep := range cfg . Endpoints {
keys = append ( keys , ep . Key ( ) )
2021-10-29 01:35:46 +02:00
}
2024-05-16 03:29:45 +02:00
for _ , ee := range cfg . ExternalEndpoints {
keys = append ( keys , ee . Key ( ) )
2024-04-09 03:00:40 +02:00
}
2021-10-29 01:35:46 +02:00
numberOfEndpointStatusesDeleted := store . Get ( ) . DeleteAllEndpointStatusesNotInKeys ( keys )
if numberOfEndpointStatusesDeleted > 0 {
2024-04-02 03:47:14 +02:00
log . Printf ( "[main.initializeStorage] Deleted %d endpoint statuses because their matching endpoints no longer existed" , numberOfEndpointStatusesDeleted )
2021-10-29 01:35:46 +02:00
}
2024-05-16 03:29:45 +02:00
// Clean up the triggered alerts from the storage provider and load valid triggered endpoint alerts
numberOfPersistedTriggeredAlertsLoaded := 0
for _ , ep := range cfg . Endpoints {
var checksums [ ] string
for _ , alert := range ep . Alerts {
if alert . IsEnabled ( ) {
checksums = append ( checksums , alert . Checksum ( ) )
}
}
numberOfTriggeredAlertsDeleted := store . Get ( ) . DeleteAllTriggeredAlertsNotInChecksumsByEndpoint ( ep , checksums )
if cfg . Debug && numberOfTriggeredAlertsDeleted > 0 {
log . Printf ( "[main.initializeStorage] Deleted %d triggered alerts for endpoint with key=%s because their configurations have been changed or deleted" , numberOfTriggeredAlertsDeleted , ep . Key ( ) )
}
for _ , alert := range ep . Alerts {
exists , resolveKey , numberOfSuccessesInARow , err := store . Get ( ) . GetTriggeredEndpointAlert ( ep , alert )
if err != nil {
log . Printf ( "[main.initializeStorage] Failed to get triggered alert for endpoint with key=%s: %s" , ep . Key ( ) , err . Error ( ) )
continue
}
if exists {
alert . Triggered , alert . ResolveKey = true , resolveKey
ep . NumberOfSuccessesInARow , ep . NumberOfFailuresInARow = numberOfSuccessesInARow , alert . FailureThreshold
numberOfPersistedTriggeredAlertsLoaded ++
}
}
}
for _ , ee := range cfg . ExternalEndpoints {
var checksums [ ] string
for _ , alert := range ee . Alerts {
if alert . IsEnabled ( ) {
checksums = append ( checksums , alert . Checksum ( ) )
}
}
convertedEndpoint := ee . ToEndpoint ( )
numberOfTriggeredAlertsDeleted := store . Get ( ) . DeleteAllTriggeredAlertsNotInChecksumsByEndpoint ( convertedEndpoint , checksums )
if cfg . Debug && numberOfTriggeredAlertsDeleted > 0 {
log . Printf ( "[main.initializeStorage] Deleted %d triggered alerts for endpoint with key=%s because their configurations have been changed or deleted" , numberOfTriggeredAlertsDeleted , ee . Key ( ) )
}
for _ , alert := range ee . Alerts {
exists , resolveKey , numberOfSuccessesInARow , err := store . Get ( ) . GetTriggeredEndpointAlert ( convertedEndpoint , alert )
if err != nil {
log . Printf ( "[main.initializeStorage] Failed to get triggered alert for endpoint with key=%s: %s" , ee . Key ( ) , err . Error ( ) )
continue
}
if exists {
alert . Triggered , alert . ResolveKey = true , resolveKey
ee . NumberOfSuccessesInARow , ee . NumberOfFailuresInARow = numberOfSuccessesInARow , alert . FailureThreshold
numberOfPersistedTriggeredAlertsLoaded ++
}
}
}
if numberOfPersistedTriggeredAlertsLoaded > 0 {
log . Printf ( "[main.initializeStorage] Loaded %d persisted triggered alerts" , numberOfPersistedTriggeredAlertsLoaded )
}
2021-10-29 01:35:46 +02:00
}
2021-05-19 04:29:15 +02:00
func listenToConfigurationFileChanges ( cfg * config . Config ) {
for {
time . Sleep ( 30 * time . Second )
2023-01-08 23:53:37 +01:00
if cfg . HasLoadedConfigurationBeenModified ( ) {
2024-04-02 03:47:14 +02:00
log . Println ( "[main.listenToConfigurationFileChanges] Configuration file has been modified" )
2023-08-05 00:30:15 +02:00
stop ( cfg )
2021-12-04 00:20:09 +01:00
time . Sleep ( time . Second ) // Wait a bit to make sure everything is done.
2021-05-19 04:29:15 +02:00
save ( )
updatedConfig , err := loadConfiguration ( )
if err != nil {
if cfg . SkipInvalidConfigUpdate {
2024-04-02 03:47:14 +02:00
log . Println ( "[main.listenToConfigurationFileChanges] Failed to load new configuration:" , err . Error ( ) )
log . Println ( "[main.listenToConfigurationFileChanges] The configuration file was updated, but it is not valid. The old configuration will continue being used." )
2021-05-19 04:29:15 +02:00
// Update the last file modification time to avoid trying to process the same invalid configuration again
cfg . UpdateLastFileModTime ( )
continue
} else {
panic ( err )
}
}
2023-08-05 00:30:15 +02:00
store . Get ( ) . Close ( )
2021-12-04 00:20:09 +01:00
initializeStorage ( updatedConfig )
2021-05-19 04:29:15 +02:00
start ( updatedConfig )
return
}
2019-12-04 22:44:35 +01:00
}
}