332 lines
12 KiB
Rust
Raw Normal View History

2020-12-22 14:02:41 +01:00
use std::env;
2024-02-15 14:25:25 +01:00
use std::io::{stderr, LineWriter, Write};
use std::num::NonZeroUsize;
2022-09-19 18:16:28 +02:00
use std::path::PathBuf;
2024-01-23 09:43:48 +01:00
use std::str::FromStr;
use std::sync::Arc;
use std::thread::available_parallelism;
use std::time::Duration;
2020-12-12 13:32:06 +01:00
2022-06-07 03:38:23 +08:00
use actix_web::http::KeepAlive;
2022-09-27 16:33:37 +02:00
use actix_web::web::Data;
use actix_web::HttpServer;
2022-09-27 16:33:37 +02:00
use index_scheduler::IndexScheduler;
use is_terminal::IsTerminal;
use meilisearch::analytics::Analytics;
use meilisearch::option::LogMode;
use meilisearch::search_queue::SearchQueue;
2024-01-30 16:31:42 +01:00
use meilisearch::{
analytics, create_app, setup_meilisearch, LogRouteHandle, LogRouteType, LogStderrHandle,
LogStderrType, Opt, SubscriberForSecondLayer,
2024-01-30 16:31:42 +01:00
};
2022-12-22 11:57:44 +01:00
use meilisearch_auth::{generate_master_key, AuthController, MASTER_KEY_MIN_SIZE};
2024-01-18 18:14:47 +01:00
use mimalloc::MiMalloc;
use termcolor::{Color, ColorChoice, ColorSpec, StandardStream, WriteColor};
2024-01-29 18:45:55 +01:00
use tracing::level_filters::LevelFilter;
use tracing_subscriber::layer::SubscriberExt as _;
2024-01-23 09:43:48 +01:00
use tracing_subscriber::Layer;
2020-12-12 13:32:06 +01:00
#[global_allocator]
2024-01-18 18:14:47 +01:00
static ALLOC: MiMalloc = MiMalloc;
fn default_log_route_layer() -> LogRouteType {
2024-01-30 16:31:42 +01:00
None.with_filter(tracing_subscriber::filter::Targets::new().with_target("", LevelFilter::OFF))
2024-01-29 13:36:10 +01:00
}
fn default_log_stderr_layer(opt: &Opt) -> LogStderrType {
let layer = tracing_subscriber::fmt::layer()
2024-02-15 14:25:25 +01:00
.with_writer(|| LineWriter::new(std::io::stderr()))
.with_span_events(tracing_subscriber::fmt::format::FmtSpan::CLOSE);
let layer = match opt.experimental_logs_mode {
LogMode::Human => Box::new(layer)
as Box<dyn tracing_subscriber::Layer<SubscriberForSecondLayer> + Send + Sync>,
LogMode::Json => Box::new(layer.json())
as Box<dyn tracing_subscriber::Layer<SubscriberForSecondLayer> + Send + Sync>,
};
layer.with_filter(
tracing_subscriber::filter::Targets::new()
.with_target("", LevelFilter::from_str(&opt.log_level.to_string()).unwrap()),
)
}
2021-09-27 16:48:03 +02:00
/// does all the setup before meilisearch is launched
fn setup(opt: &Opt) -> anyhow::Result<(LogRouteHandle, LogStderrHandle)> {
let (route_layer, route_layer_handle) =
tracing_subscriber::reload::Layer::new(default_log_route_layer());
2024-01-29 13:36:10 +01:00
let route_layer: tracing_subscriber::reload::Layer<_, _> = route_layer;
let (stderr_layer, stderr_layer_handle) =
tracing_subscriber::reload::Layer::new(default_log_stderr_layer(opt));
let route_layer: tracing_subscriber::reload::Layer<_, _> = route_layer;
let subscriber = tracing_subscriber::registry().with(route_layer).with(stderr_layer);
2020-12-12 13:32:06 +01:00
2024-01-23 09:43:48 +01:00
// set the subscriber as the default for the application
tracing::subscriber::set_global_default(subscriber).unwrap();
2021-08-24 12:27:30 +02:00
Ok((route_layer_handle, stderr_layer_handle))
2021-09-27 16:48:03 +02:00
}
2024-02-07 17:29:40 +01:00
fn on_panic(info: &std::panic::PanicInfo) {
let info = info.to_string().replace('\n', " ");
tracing::error!(%info);
}
2021-09-14 18:39:02 +02:00
#[actix_web::main]
async fn main() -> anyhow::Result<()> {
2024-07-29 14:58:39 +02:00
try_main().await.inspect_err(|error| {
tracing::error!(%error);
let mut current = error.source();
let mut depth = 0;
while let Some(source) = current {
tracing::info!(%source, depth, "Error caused by");
current = source.source();
depth += 1;
}
})
}
async fn try_main() -> anyhow::Result<()> {
2022-09-19 18:16:28 +02:00
let (opt, config_read_from) = Opt::try_build()?;
2022-09-06 09:23:16 +02:00
2024-02-07 17:29:40 +01:00
std::panic::set_hook(Box::new(on_panic));
anyhow::ensure!(
!(cfg!(windows) && opt.experimental_reduce_indexing_memory_usage),
"The `experimental-reduce-indexing-memory-usage` flag is not supported on Windows"
);
2024-01-29 17:56:43 +01:00
let log_handle = setup(&opt)?;
2021-09-14 18:39:02 +02:00
2022-12-22 11:57:44 +01:00
match (opt.env.as_ref(), &opt.master_key) {
("production", Some(master_key)) if master_key.len() < MASTER_KEY_MIN_SIZE => {
anyhow::bail!(
"The master key must be at least {MASTER_KEY_MIN_SIZE} bytes in a production environment. The provided key is only {} bytes.
2022-12-22 11:57:44 +01:00
{}",
2022-12-22 11:57:44 +01:00
master_key.len(),
generated_master_key_message(),
2022-12-22 11:57:44 +01:00
)
2020-12-12 13:32:06 +01:00
}
2022-12-22 11:57:44 +01:00
("production", None) => {
anyhow::bail!(
"You must provide a master key to secure your instance in a production environment. It can be specified via the MEILI_MASTER_KEY environment variable or the --master-key launch option.
2022-12-22 11:57:44 +01:00
{}",
generated_master_key_message()
2022-12-22 11:57:44 +01:00
)
}
// No error; continue
_ => (),
2020-12-12 13:32:06 +01:00
}
let (index_scheduler, auth_controller) = setup_meilisearch(&opt)?;
2024-10-17 08:38:11 +02:00
let analytics =
analytics::Analytics::new(&opt, index_scheduler.clone(), auth_controller.clone()).await;
2020-12-12 13:32:06 +01:00
2022-10-13 15:02:59 +02:00
print_launch_resume(&opt, analytics.clone(), config_read_from);
2020-12-12 13:32:06 +01:00
2024-10-17 08:38:11 +02:00
run_http(index_scheduler, auth_controller, opt, log_handle, Arc::new(analytics)).await?;
2021-02-26 09:10:04 +01:00
Ok(())
}
async fn run_http(
2022-10-18 12:45:06 +02:00
index_scheduler: Arc<IndexScheduler>,
auth_controller: Arc<AuthController>,
opt: Opt,
logs: (LogRouteHandle, LogStderrHandle),
2024-10-17 08:38:11 +02:00
analytics: Arc<Analytics>,
) -> anyhow::Result<()> {
2022-09-27 16:33:37 +02:00
let enable_dashboard = &opt.env == "development";
2021-09-20 15:31:03 +02:00
let opt_clone = opt.clone();
2022-10-18 12:45:06 +02:00
let index_scheduler = Data::from(index_scheduler);
let auth_controller = Data::from(auth_controller);
2024-10-17 08:38:11 +02:00
let analytics = Data::from(analytics);
let search_queue = SearchQueue::new(
opt.experimental_search_queue_size,
available_parallelism()
.unwrap_or(NonZeroUsize::new(2).unwrap())
.checked_mul(opt.experimental_nb_searches_per_core)
.unwrap_or(NonZeroUsize::MAX),
)
.with_time_to_abort(Duration::from_secs(
usize::from(opt.experimental_drop_search_after) as u64
));
let search_queue = Data::new(search_queue);
2022-09-27 16:33:37 +02:00
let http_server = HttpServer::new(move || {
create_app(
index_scheduler.clone(),
auth_controller.clone(),
search_queue.clone(),
opt.clone(),
2024-01-29 17:56:43 +01:00
logs.clone(),
analytics.clone(),
enable_dashboard,
)
})
// Disable signals allows the server to terminate immediately when a user enter CTRL-C
2022-06-07 03:38:23 +08:00
.disable_signals()
.keep_alive(KeepAlive::Os);
2020-12-12 13:32:06 +01:00
2022-09-27 16:33:37 +02:00
if let Some(config) = opt_clone.get_ssl_config()? {
2024-07-17 14:27:29 +02:00
http_server.bind_rustls_0_23(opt_clone.http_addr, config)?.run().await?;
2021-06-23 14:48:33 +02:00
} else {
2022-09-27 16:33:37 +02:00
http_server.bind(&opt_clone.http_addr)?.run().await?;
2020-12-12 13:32:06 +01:00
}
Ok(())
}
2024-10-17 08:38:11 +02:00
pub fn print_launch_resume(opt: &Opt, analytics: Analytics, config_read_from: Option<PathBuf>) {
let build_info = build_info::BuildInfo::from_build();
2022-10-20 18:00:07 +02:00
let protocol =
if opt.ssl_cert_path.is_some() && opt.ssl_key_path.is_some() { "https" } else { "http" };
2020-12-12 13:32:06 +01:00
let ascii_name = r#"
888b d888 d8b 888 d8b 888
8888b d8888 Y8P 888 Y8P 888
88888b.d88888 888 888
888Y88888P888 .d88b. 888 888 888 .d8888b .d88b. 8888b. 888d888 .d8888b 88888b.
888 Y888P 888 d8P Y8b 888 888 888 88K d8P Y8b "88b 888P" d88P" 888 "88b
888 Y8P 888 88888888 888 888 888 "Y8888b. 88888888 .d888888 888 888 888 888
888 " 888 Y8b. 888 888 888 X88 Y8b. 888 888 888 Y88b. 888 888
888 888 "Y8888 888 888 888 88888P' "Y8888 "Y888888 888 "Y8888P 888 888
2020-12-12 13:32:06 +01:00
"#;
eprintln!("{}", ascii_name);
2022-09-19 18:16:28 +02:00
eprintln!(
"Config file path:\t{:?}",
2022-09-19 18:16:28 +02:00
config_read_from
.map(|config_file_path| config_file_path.display().to_string())
.unwrap_or_else(|| "none".to_string())
);
2020-12-12 13:32:06 +01:00
eprintln!("Database path:\t\t{:?}", opt.db_path);
2022-08-12 16:16:23 +08:00
eprintln!("Server listening on:\t\"{}://{}\"", protocol, opt.http_addr);
2020-12-12 13:32:06 +01:00
eprintln!("Environment:\t\t{:?}", opt.env);
eprintln!("Commit SHA:\t\t{:?}", build_info.commit_sha1.unwrap_or("unknown"));
eprintln!(
"Commit date:\t\t{:?}",
build_info
.commit_timestamp
.and_then(|commit_timestamp| commit_timestamp
2024-03-05 14:56:48 +01:00
.format(&time::format_description::well_known::Rfc3339)
.ok())
.unwrap_or("unknown".into())
);
2022-10-20 18:00:07 +02:00
eprintln!("Package version:\t{:?}", env!("CARGO_PKG_VERSION").to_string());
if let Some(prototype) = build_info.describe.and_then(|describe| describe.as_prototype()) {
eprintln!("Prototype:\t\t{:?}", prototype);
}
2020-12-12 13:32:06 +01:00
{
2022-01-12 15:57:31 +01:00
if !opt.no_analytics {
eprintln!(
"
Thank you for using Meilisearch!
2023-05-03 19:14:57 +02:00
\nWe collect anonymized analytics to improve our product and your experience. To learn more, including how to turn off analytics, visit our dedicated documentation page: https://www.meilisearch.com/docs/learn/what_is_meilisearch/telemetry
Anonymous telemetry:\t\"Enabled\""
);
} else {
eprintln!("Anonymous telemetry:\t\"Disabled\"");
2020-12-12 13:32:06 +01:00
}
}
2022-10-13 15:02:59 +02:00
if let Some(instance_uid) = analytics.instance_uid() {
2022-10-22 16:35:42 +02:00
eprintln!("Instance UID:\t\t\"{}\"", instance_uid);
}
2020-12-12 13:32:06 +01:00
eprintln!();
2022-12-22 11:57:44 +01:00
match (opt.env.as_ref(), &opt.master_key) {
("production", Some(_)) => {
2023-01-03 14:45:23 +01:00
eprintln!("A master key has been set. Requests to Meilisearch won't be authorized unless you provide an authentication key.");
2022-12-22 11:57:44 +01:00
}
("development", Some(master_key)) => {
2023-01-03 14:45:23 +01:00
eprintln!("A master key has been set. Requests to Meilisearch won't be authorized unless you provide an authentication key.");
2022-12-22 11:57:44 +01:00
if master_key.len() < MASTER_KEY_MIN_SIZE {
print_master_key_too_short_warning()
2022-12-22 11:57:44 +01:00
}
}
("development", None) => print_missing_master_key_warning(),
2022-12-22 11:57:44 +01:00
// unreachable because Opt::try_build above would have failed already if any other value had been produced
_ => unreachable!(),
2020-12-12 13:32:06 +01:00
}
eprintln!();
2023-07-26 15:54:43 +02:00
eprintln!("Check out Meilisearch Cloud!\thttps://www.meilisearch.com/cloud?utm_campaign=oss&utm_source=engine&utm_medium=cli");
eprintln!("Documentation:\t\t\thttps://www.meilisearch.com/docs");
eprintln!("Source code:\t\t\thttps://github.com/meilisearch/meilisearch");
eprintln!("Discord:\t\t\thttps://discord.meilisearch.com");
2020-12-12 13:32:06 +01:00
eprintln!();
}
const WARNING_BG_COLOR: Option<Color> = Some(Color::Ansi256(178));
const WARNING_FG_COLOR: Option<Color> = Some(Color::Ansi256(0));
fn print_master_key_too_short_warning() {
let choice = if stderr().is_terminal() { ColorChoice::Auto } else { ColorChoice::Never };
let mut stderr = StandardStream::stderr(choice);
stderr
.set_color(
ColorSpec::new().set_bg(WARNING_BG_COLOR).set_fg(WARNING_FG_COLOR).set_bold(true),
)
.unwrap();
writeln!(stderr, "\n").unwrap();
writeln!(
stderr,
" Meilisearch started with a master key considered unsafe for use in a production environment.
A master key of at least {MASTER_KEY_MIN_SIZE} bytes will be required when switching to a production environment."
)
.unwrap();
stderr.reset().unwrap();
writeln!(stderr).unwrap();
eprintln!("\n{}", generated_master_key_message());
eprintln!(
"\nRestart Meilisearch with the argument above to use this new and secure master key."
)
}
fn print_missing_master_key_warning() {
let choice = if stderr().is_terminal() { ColorChoice::Auto } else { ColorChoice::Never };
let mut stderr = StandardStream::stderr(choice);
stderr
.set_color(
ColorSpec::new().set_bg(WARNING_BG_COLOR).set_fg(WARNING_FG_COLOR).set_bold(true),
)
.unwrap();
writeln!(stderr, "\n").unwrap();
writeln!(
stderr,
" No master key was found. The server will accept unidentified requests.
A master key of at least {MASTER_KEY_MIN_SIZE} bytes will be required when switching to a production environment."
)
.unwrap();
stderr.reset().unwrap();
writeln!(stderr).unwrap();
eprintln!("\n{}", generated_master_key_message());
eprintln!(
"\nRestart Meilisearch with the argument above to use this new and secure master key."
)
}
fn generated_master_key_message() -> String {
format!(
"We generated a new secure master key for you (you can safely use this token):
>> --master-key {} <<",
generate_master_key()
)
}