1
2
3
4
5
6
7
8
9
10
11
12
13
14
15
16
17
18
19
20
21
22
23
24
25
26
27
28
29
30
31
32
33
34
35
36
37
38
39
40
41
42
43
44
45
46
47
48
49
50
51
52
53
54
55
56
57
58
59
60
61
62
63
64
65
66
67
68
69
70
71
72
73
74
75
76
package service
import (
"os"
"path"
"path/filepath"
"time"
"cocogo/pkg/common"
"cocogo/pkg/config"
"cocogo/pkg/logger"
)
var client = common.NewClient(30, "")
var authClient = common.NewClient(30, "")
func Initial() {
keyPath := config.Conf.AccessKeyFile
client.BaseHost = config.Conf.CoreHost
authClient.BaseHost = config.Conf.CoreHost
if !path.IsAbs(config.Conf.AccessKeyFile) {
keyPath = filepath.Join(config.Conf.RootPath, keyPath)
}
ak := AccessKey{Value: config.Conf.AccessKey, Path: keyPath}
_ = ak.Load()
authClient.Auth = ak
validateAccessAuth()
go KeepSyncConfigWithServer()
}
func validateAccessAuth() {
maxTry := 30
count := 0
for {
user, err := GetProfile()
if err == nil && user.Role == "App" {
break
}
if err != nil {
msg := "Connect server error or access key is invalid, remove %s run again"
logger.Errorf(msg, config.Conf.AccessKeyFile)
} else if user.Role != "App" {
logger.Error("Access role is not App, is: ", user.Role)
}
count++
time.Sleep(3 * time.Second)
if count >= maxTry {
os.Exit(1)
}
}
}
func MustLoadServerConfigOnce() {
}
func LoadConfigFromServer(conf *config.Config) (err error) {
conf.Mux.Lock()
defer conf.Mux.Unlock()
err = authClient.Get(TerminalConfigURL, conf)
if err != nil {
logger.Warn("Sync config with server error: ", err)
}
return err
}
func KeepSyncConfigWithServer() {
for {
err := LoadConfigFromServer(config.Conf)
if err != nil {
logger.Warn("Sync config with server error: ", err)
}
time.Sleep(60 * time.Second)
}
}