budibase/packages/worker/src/index.ts

132 lines
2.9 KiB
TypeScript
Raw Normal View History

if (process.env.DD_APM_ENABLED) {
require("./ddApm")
}
2022-08-30 11:59:27 +02:00
if (process.env.ELASTIC_APM_ENABLED) {
require("./elasticApm")
2022-08-30 11:59:27 +02:00
}
// need to load environment first
import env from "./environment"
2022-01-20 09:15:46 +01:00
import { Scope } from "@sentry/node"
import { Event } from "@sentry/types/dist/event"
import Application from "koa"
import { bootstrap } from "global-agent"
import * as db from "./db"
import { sdk as proSdk } from "@budibase/pro"
import {
auth,
logging,
events,
middleware,
queue,
env as coreEnv,
timers,
} from "@budibase/backend-core"
db.init()
import Koa from "koa"
import koaBody from "koa-body"
import http from "http"
import api from "./api"
import * as redis from "./utilities/redis"
2022-11-29 16:38:25 +01:00
const Sentry = require("@sentry/node")
2021-06-27 16:46:04 +02:00
const koaSession = require("koa-session")
const logger = require("koa-pino-logger")
const { userAgent } = require("koa-useragent")
import destroyable from "server-destroy"
2023-03-13 14:25:19 +01:00
import { initPro } from "./initPro"
2023-03-15 12:23:55 +01:00
import { handleScimBody } from "./middleware/handleScimBody"
// configure events to use the pro audit log write
// can't integrate directly into backend-core due to cyclic issues
events.processors.init(proSdk.auditLogs.write)
if (coreEnv.ENABLE_SSO_MAINTENANCE_MODE) {
console.warn(
"Warning: ENABLE_SSO_MAINTENANCE_MODE is set. It is recommended this flag is disabled if maintenance is not in progress"
)
}
// this will setup http and https proxies form env variables
bootstrap()
2022-01-20 09:15:46 +01:00
const app: Application = new Koa()
app.keys = ["secret", "key"]
2021-06-27 16:46:04 +02:00
// set up top level koa middleware
2023-03-15 12:23:55 +01:00
app.use(handleScimBody)
app.use(koaBody({ multipart: true, jsonStrict: false }))
2021-06-27 16:46:04 +02:00
app.use(koaSession(app))
app.use(middleware.logging)
app.use(logger(logging.pinoSettings()))
app.use(userAgent)
// authentication
app.use(auth.passport.initialize())
app.use(auth.passport.session())
// api routes
app.use(api.routes())
2021-10-18 15:57:30 +02:00
// sentry
2022-11-29 16:43:44 +01:00
if (env.isProd()) {
Sentry.init()
app.on("error", (err, ctx) => {
Sentry.withScope(function (scope: Scope) {
scope.addEventProcessor(function (event: Event) {
return Sentry.Handlers.parseRequest(event, ctx.request)
})
Sentry.captureException(err)
2021-10-18 15:57:30 +02:00
})
})
2022-11-29 16:43:44 +01:00
}
2021-10-18 15:57:30 +02:00
const server = http.createServer(app.callback())
destroyable(server)
2022-05-31 11:16:22 +02:00
let shuttingDown = false,
errCode = 0
server.on("close", async () => {
if (shuttingDown) {
return
}
shuttingDown = true
2022-08-31 11:47:41 +02:00
console.log("Server Closed")
timers.cleanup()
await redis.shutdown()
await events.shutdown()
await queue.shutdown()
2022-05-31 11:16:22 +02:00
if (!env.isTest()) {
process.exit(errCode)
}
})
const shutdown = () => {
server.close()
server.destroy()
}
export default server.listen(parseInt(env.PORT || "4002"), async () => {
console.log(`Worker running on ${JSON.stringify(server.address())}`)
2023-03-13 14:25:19 +01:00
await initPro()
await redis.init()
})
process.on("uncaughtException", err => {
2022-05-31 11:16:22 +02:00
errCode = -1
logging.logAlert("Uncaught exception.", err)
shutdown()
})
process.on("SIGTERM", () => {
shutdown()
})
process.on("SIGINT", () => {
shutdown()
})