Merge pull request #70 from gabriel-samfira/move-some-code-around
Move some code around
This commit is contained in:
commit
1867bbaad6
9 changed files with 193 additions and 79 deletions
|
|
@ -24,6 +24,7 @@ import (
|
|||
"garm/apiserver/params"
|
||||
"garm/auth"
|
||||
gErrors "garm/errors"
|
||||
"garm/metrics"
|
||||
runnerParams "garm/params"
|
||||
"garm/runner"
|
||||
"garm/util"
|
||||
|
|
@ -31,28 +32,25 @@ import (
|
|||
|
||||
"github.com/gorilla/websocket"
|
||||
"github.com/pkg/errors"
|
||||
"github.com/prometheus/client_golang/prometheus"
|
||||
)
|
||||
|
||||
func NewAPIController(r *runner.Runner, auth *auth.Authenticator, hub *wsWriter.Hub, controllerInfo runnerParams.ControllerInfo) (*APIController, error) {
|
||||
func NewAPIController(r *runner.Runner, authenticator *auth.Authenticator, hub *wsWriter.Hub) (*APIController, error) {
|
||||
return &APIController{
|
||||
r: r,
|
||||
auth: auth,
|
||||
auth: authenticator,
|
||||
hub: hub,
|
||||
upgrader: websocket.Upgrader{
|
||||
ReadBufferSize: 1024,
|
||||
WriteBufferSize: 16384,
|
||||
},
|
||||
controllerInfo: controllerInfo,
|
||||
}, nil
|
||||
}
|
||||
|
||||
type APIController struct {
|
||||
r *runner.Runner
|
||||
auth *auth.Authenticator
|
||||
hub *wsWriter.Hub
|
||||
upgrader websocket.Upgrader
|
||||
controllerInfo runnerParams.ControllerInfo
|
||||
r *runner.Runner
|
||||
auth *auth.Authenticator
|
||||
hub *wsWriter.Hub
|
||||
upgrader websocket.Upgrader
|
||||
}
|
||||
|
||||
func handleError(w http.ResponseWriter, err error) {
|
||||
|
|
@ -89,18 +87,16 @@ func handleError(w http.ResponseWriter, err error) {
|
|||
}
|
||||
}
|
||||
|
||||
// metric to count total webhooks received
|
||||
// at this point the webhook is not yet authenticated and
|
||||
// we don't know if it's meant for us or not
|
||||
var webhooksReceived = prometheus.NewCounterVec(prometheus.CounterOpts{
|
||||
Name: "garm_webhooks_received",
|
||||
Help: "The total number of webhooks received",
|
||||
}, []string{"valid", "reason", "hostname", "controller_id"})
|
||||
|
||||
func init() {
|
||||
err := prometheus.Register(webhooksReceived)
|
||||
func (a *APIController) webhookMetricLabelValues(valid, reason string) []string {
|
||||
controllerInfo, err := a.r.GetControllerInfo(auth.GetAdminContext())
|
||||
if err != nil {
|
||||
log.Printf("error registering prometheus metric: %q", err)
|
||||
log.Printf("failed to get controller info: %s", err)
|
||||
// If labels are empty, not attempt will be made to record webhook.
|
||||
return []string{}
|
||||
}
|
||||
return []string{
|
||||
valid, reason,
|
||||
controllerInfo.Hostname, controllerInfo.ControllerID.String(),
|
||||
}
|
||||
}
|
||||
|
||||
|
|
@ -115,23 +111,31 @@ func (a *APIController) handleWorkflowJobEvent(w http.ResponseWriter, r *http.Re
|
|||
signature := r.Header.Get("X-Hub-Signature-256")
|
||||
hookType := r.Header.Get("X-Github-Hook-Installation-Target-Type")
|
||||
|
||||
controllerInfo := a.r.GetControllerInfo(r.Context())
|
||||
var labelValues []string
|
||||
defer func() {
|
||||
if len(labelValues) == 0 {
|
||||
return
|
||||
}
|
||||
if err := metrics.RecordWebhookWithLabels(labelValues...); err != nil {
|
||||
log.Printf("failed to record metric: %s", err)
|
||||
}
|
||||
}()
|
||||
|
||||
if err := a.r.DispatchWorkflowJob(hookType, signature, body); err != nil {
|
||||
if errors.Is(err, gErrors.ErrNotFound) {
|
||||
webhooksReceived.WithLabelValues("false", "owner_unknown", controllerInfo.Hostname, controllerInfo.ControllerID.String()).Inc()
|
||||
labelValues = a.webhookMetricLabelValues("false", "owner_unknown")
|
||||
log.Printf("got not found error from DispatchWorkflowJob. webhook not meant for us?: %q", err)
|
||||
return
|
||||
} else if strings.Contains(err.Error(), "signature") { // TODO: check error type
|
||||
webhooksReceived.WithLabelValues("false", "signature_invalid", controllerInfo.Hostname, controllerInfo.ControllerID.String()).Inc()
|
||||
labelValues = a.webhookMetricLabelValues("false", "signature_invalid")
|
||||
} else {
|
||||
webhooksReceived.WithLabelValues("false", "unknown", controllerInfo.Hostname, controllerInfo.ControllerID.String()).Inc()
|
||||
labelValues = a.webhookMetricLabelValues("false", "unknown")
|
||||
}
|
||||
|
||||
handleError(w, err)
|
||||
return
|
||||
}
|
||||
webhooksReceived.WithLabelValues("true", "", controllerInfo.Hostname, controllerInfo.ControllerID.String()).Inc()
|
||||
labelValues = a.webhookMetricLabelValues("true", "")
|
||||
}
|
||||
|
||||
func (a *APIController) CatchAll(w http.ResponseWriter, r *http.Request) {
|
||||
|
|
|
|||
|
|
@ -23,24 +23,28 @@ import (
|
|||
|
||||
"garm/apiserver/controllers"
|
||||
"garm/auth"
|
||||
"garm/config"
|
||||
"garm/util"
|
||||
)
|
||||
|
||||
func NewAPIRouter(han *controllers.APIController, logWriter io.Writer, cfg *config.Config, authMiddleware, initMiddleware, instanceMiddleware, metricsMiddlerware auth.Middleware) *mux.Router {
|
||||
func WithMetricsRouter(parentRouter *mux.Router, disableAuth bool, metricsMiddlerware auth.Middleware) *mux.Router {
|
||||
if parentRouter == nil {
|
||||
return nil
|
||||
}
|
||||
|
||||
metricsRouter := parentRouter.PathPrefix("/metrics").Subrouter()
|
||||
if !disableAuth {
|
||||
metricsRouter.Use(metricsMiddlerware.Middleware)
|
||||
}
|
||||
metricsRouter.Handle("/", promhttp.Handler()).Methods("GET", "OPTIONS")
|
||||
metricsRouter.Handle("", promhttp.Handler()).Methods("GET", "OPTIONS")
|
||||
return parentRouter
|
||||
}
|
||||
|
||||
func NewAPIRouter(han *controllers.APIController, logWriter io.Writer, authMiddleware, initMiddleware, instanceMiddleware auth.Middleware) *mux.Router {
|
||||
router := mux.NewRouter()
|
||||
logMiddleware := util.NewLoggingMiddleware(logWriter)
|
||||
router.Use(logMiddleware)
|
||||
|
||||
if cfg.Metrics.Enable {
|
||||
metricsRouter := router.PathPrefix("/metrics").Subrouter()
|
||||
if !cfg.Metrics.DisableAuth {
|
||||
metricsRouter.Use(metricsMiddlerware.Middleware)
|
||||
}
|
||||
metricsRouter.Handle("/", promhttp.Handler()).Methods("GET", "OPTIONS")
|
||||
metricsRouter.Handle("", promhttp.Handler()).Methods("GET", "OPTIONS")
|
||||
}
|
||||
|
||||
// Handles github webhooks
|
||||
webhookRouter := router.PathPrefix("/webhooks").Subrouter()
|
||||
webhookRouter.PathPrefix("/").Handler(http.HandlerFunc(han.CatchAll))
|
||||
|
|
|
|||
|
|
@ -274,7 +274,7 @@ func formatPools(pools []params.Pool) {
|
|||
belongsTo = pool.EnterpriseName
|
||||
level = "enterprise"
|
||||
}
|
||||
t.AppendRow(table.Row{pool.ID, pool.Image, pool.Flavor, strings.Join(tags, " "), belongsTo, level, pool.Enabled, pool.RunnerPrefix})
|
||||
t.AppendRow(table.Row{pool.ID, pool.Image, pool.Flavor, strings.Join(tags, " "), belongsTo, level, pool.Enabled, pool.GetRunnerPrefix()})
|
||||
t.AppendSeparator()
|
||||
}
|
||||
fmt.Println(t.Render())
|
||||
|
|
@ -319,7 +319,7 @@ func formatOnePool(pool params.Pool) {
|
|||
t.AppendRow(table.Row{"Belongs to", belongsTo})
|
||||
t.AppendRow(table.Row{"Level", level})
|
||||
t.AppendRow(table.Row{"Enabled", pool.Enabled})
|
||||
t.AppendRow(table.Row{"Runner Prefix", pool.RunnerPrefix})
|
||||
t.AppendRow(table.Row{"Runner Prefix", pool.GetRunnerPrefix()})
|
||||
|
||||
if len(pool.Instances) > 0 {
|
||||
for _, instance := range pool.Instances {
|
||||
|
|
|
|||
|
|
@ -32,6 +32,7 @@ import (
|
|||
"garm/config"
|
||||
"garm/database"
|
||||
"garm/database/common"
|
||||
"garm/metrics"
|
||||
"garm/runner"
|
||||
"garm/util"
|
||||
"garm/websocket"
|
||||
|
|
@ -39,7 +40,6 @@ import (
|
|||
"github.com/gorilla/handlers"
|
||||
"github.com/gorilla/mux"
|
||||
"github.com/pkg/errors"
|
||||
"github.com/prometheus/client_golang/prometheus"
|
||||
)
|
||||
|
||||
var (
|
||||
|
|
@ -111,19 +111,13 @@ func main() {
|
|||
log.Fatalf("failed to create controller: %+v", err)
|
||||
}
|
||||
|
||||
controllerInfo, err := db.ControllerInfo()
|
||||
if err != nil {
|
||||
log.Fatal(err)
|
||||
}
|
||||
|
||||
// If there are many repos/pools, this may take a long time.
|
||||
// TODO: start pool managers in the background and log errors.
|
||||
if err := runner.Start(); err != nil {
|
||||
log.Fatal(err)
|
||||
}
|
||||
|
||||
authenticator := auth.NewAuthenticator(cfg.JWTAuth, db)
|
||||
controller, err := controllers.NewAPIController(runner, authenticator, hub, controllerInfo)
|
||||
controller, err := controllers.NewAPIController(runner, authenticator, hub)
|
||||
if err != nil {
|
||||
log.Fatalf("failed to create controller: %+v", err)
|
||||
}
|
||||
|
|
@ -147,12 +141,18 @@ func main() {
|
|||
if err != nil {
|
||||
log.Fatal(err)
|
||||
}
|
||||
err = prometheus.Register(controllers.NewGarmCollector(runner))
|
||||
if err != nil {
|
||||
log.Println("failed to register garm collector in prometheus", err)
|
||||
|
||||
router := routers.NewAPIRouter(controller, multiWriter, jwtMiddleware, initMiddleware, instanceMiddleware)
|
||||
|
||||
if cfg.Metrics.Enable {
|
||||
log.Printf("registering prometheus metrics collectors")
|
||||
if err := metrics.RegisterCollectors(runner); err != nil {
|
||||
log.Fatal(err)
|
||||
}
|
||||
log.Printf("setting up metric routes")
|
||||
router = routers.WithMetricsRouter(router, cfg.Metrics.DisableAuth, metricsMiddleware)
|
||||
}
|
||||
|
||||
router := routers.NewAPIRouter(controller, multiWriter, cfg, jwtMiddleware, initMiddleware, instanceMiddleware, metricsMiddleware)
|
||||
corsMw := mux.CORSMethodMiddleware(router)
|
||||
router.Use(corsMw)
|
||||
|
||||
|
|
|
|||
|
|
@ -1,21 +1,69 @@
|
|||
package controllers
|
||||
package metrics
|
||||
|
||||
import (
|
||||
"log"
|
||||
|
||||
"garm/auth"
|
||||
"garm/params"
|
||||
"garm/runner"
|
||||
|
||||
"github.com/pkg/errors"
|
||||
"github.com/prometheus/client_golang/prometheus"
|
||||
)
|
||||
|
||||
type GarmCollector struct {
|
||||
healthMetric *prometheus.Desc
|
||||
instanceMetric *prometheus.Desc
|
||||
runner *runner.Runner
|
||||
var webhooksReceived *prometheus.CounterVec = nil
|
||||
|
||||
// RecordWebhookWithLabels will increment a webhook metric identified by specific
|
||||
// values. If metrics are disabled, this function is a noop.
|
||||
func RecordWebhookWithLabels(lvs ...string) error {
|
||||
if webhooksReceived == nil {
|
||||
// not registered. Noop
|
||||
return nil
|
||||
}
|
||||
|
||||
counter, err := webhooksReceived.GetMetricWithLabelValues(lvs...)
|
||||
if err != nil {
|
||||
return errors.Wrap(err, "recording metric")
|
||||
}
|
||||
counter.Inc()
|
||||
return nil
|
||||
}
|
||||
|
||||
func NewGarmCollector(r *runner.Runner) *GarmCollector {
|
||||
func RegisterCollectors(runner *runner.Runner) error {
|
||||
if webhooksReceived != nil {
|
||||
// Already registered.
|
||||
return nil
|
||||
}
|
||||
|
||||
garmCollector, err := NewGarmCollector(runner)
|
||||
if err != nil {
|
||||
return errors.Wrap(err, "getting collector")
|
||||
}
|
||||
|
||||
if err := prometheus.Register(garmCollector); err != nil {
|
||||
return errors.Wrap(err, "registering collector")
|
||||
}
|
||||
|
||||
// metric to count total webhooks received
|
||||
// at this point the webhook is not yet authenticated and
|
||||
// we don't know if it's meant for us or not
|
||||
webhooksReceived = prometheus.NewCounterVec(prometheus.CounterOpts{
|
||||
Name: "garm_webhooks_received",
|
||||
Help: "The total number of webhooks received",
|
||||
}, []string{"valid", "reason", "hostname", "controller_id"})
|
||||
|
||||
err = prometheus.Register(webhooksReceived)
|
||||
if err != nil {
|
||||
return errors.Wrap(err, "registering webhooks recv counter")
|
||||
}
|
||||
return nil
|
||||
}
|
||||
|
||||
func NewGarmCollector(r *runner.Runner) (*GarmCollector, error) {
|
||||
controllerInfo, err := r.GetControllerInfo(auth.GetAdminContext())
|
||||
if err != nil {
|
||||
return nil, errors.Wrap(err, "fetching controller info")
|
||||
}
|
||||
return &GarmCollector{
|
||||
runner: r,
|
||||
instanceMetric: prometheus.NewDesc(
|
||||
|
|
@ -28,7 +76,15 @@ func NewGarmCollector(r *runner.Runner) *GarmCollector {
|
|||
"Health of the runner",
|
||||
[]string{"hostname", "controller_id"}, nil,
|
||||
),
|
||||
}
|
||||
cachedControllerInfo: controllerInfo,
|
||||
}, nil
|
||||
}
|
||||
|
||||
type GarmCollector struct {
|
||||
healthMetric *prometheus.Desc
|
||||
instanceMetric *prometheus.Desc
|
||||
runner *runner.Runner
|
||||
cachedControllerInfo params.ControllerInfo
|
||||
}
|
||||
|
||||
func (c *GarmCollector) Describe(ch chan<- *prometheus.Desc) {
|
||||
|
|
@ -37,8 +93,11 @@ func (c *GarmCollector) Describe(ch chan<- *prometheus.Desc) {
|
|||
}
|
||||
|
||||
func (c *GarmCollector) Collect(ch chan<- prometheus.Metric) {
|
||||
controllerInfo := c.runner.GetControllerInfo(auth.GetAdminContext())
|
||||
|
||||
controllerInfo, err := c.runner.GetControllerInfo(auth.GetAdminContext())
|
||||
if err != nil {
|
||||
log.Printf("failed to get controller info: %s", err)
|
||||
return
|
||||
}
|
||||
c.CollectInstanceMetric(ch, controllerInfo.Hostname, controllerInfo.ControllerID.String())
|
||||
c.CollectHealthMetric(ch, controllerInfo.Hostname, controllerInfo.ControllerID.String())
|
||||
}
|
||||
|
|
@ -61,7 +120,6 @@ func (c *GarmCollector) CollectHealthMetric(ch chan<- prometheus.Metric, hostnam
|
|||
// CollectInstanceMetric collects the metrics for the runner instances
|
||||
// reflecting the statuses and the pool they belong to.
|
||||
func (c *GarmCollector) CollectInstanceMetric(ch chan<- prometheus.Metric, hostname string, controllerID string) {
|
||||
|
||||
ctx := auth.GetAdminContext()
|
||||
|
||||
instances, err := c.runner.ListAllInstances(ctx)
|
||||
|
|
@ -33,9 +33,7 @@ import (
|
|||
"garm/util"
|
||||
|
||||
"github.com/google/go-github/v48/github"
|
||||
"github.com/google/uuid"
|
||||
"github.com/pkg/errors"
|
||||
"github.com/teris-io/shortid"
|
||||
)
|
||||
|
||||
var (
|
||||
|
|
@ -396,11 +394,7 @@ func (r *basePoolManager) AddRunner(ctx context.Context, poolID string) error {
|
|||
return errors.Wrap(err, "fetching pool")
|
||||
}
|
||||
|
||||
suffix, err := shortid.Generate()
|
||||
if err != nil {
|
||||
suffix = uuid.New().String()
|
||||
}
|
||||
name := fmt.Sprintf("%s-%s", pool.GetRunnerPrefix(), suffix)
|
||||
name := fmt.Sprintf("%s-%s", pool.GetRunnerPrefix(), util.NewID())
|
||||
|
||||
createParams := params.CreateInstanceParams{
|
||||
Name: name,
|
||||
|
|
|
|||
|
|
@ -41,7 +41,10 @@ import (
|
|||
providerCommon "garm/runner/providers/common"
|
||||
"garm/util"
|
||||
|
||||
"github.com/juju/clock"
|
||||
"github.com/juju/retry"
|
||||
"github.com/pkg/errors"
|
||||
uuid "github.com/satori/go.uuid"
|
||||
)
|
||||
|
||||
func NewRunner(ctx context.Context, cfg config.Config) (*Runner, error) {
|
||||
|
|
@ -66,10 +69,6 @@ func NewRunner(ctx context.Context, cfg config.Config) (*Runner, error) {
|
|||
creds[ghcreds.Name] = ghcreds
|
||||
}
|
||||
|
||||
controllerInfo := params.ControllerInfo{
|
||||
ControllerID: ctrlId.ControllerID,
|
||||
}
|
||||
|
||||
poolManagerCtrl := &poolManagerCtrl{
|
||||
controllerID: ctrlId.ControllerID.String(),
|
||||
config: cfg,
|
||||
|
|
@ -85,7 +84,7 @@ func NewRunner(ctx context.Context, cfg config.Config) (*Runner, error) {
|
|||
poolManagerCtrl: poolManagerCtrl,
|
||||
providers: providers,
|
||||
credentials: creds,
|
||||
controllerInfo: controllerInfo,
|
||||
controllerID: ctrlId.ControllerID,
|
||||
}
|
||||
|
||||
if err := runner.loadReposOrgsAndEnterprises(); err != nil {
|
||||
|
|
@ -271,19 +270,45 @@ type Runner struct {
|
|||
credentials map[string]config.Github
|
||||
|
||||
controllerInfo params.ControllerInfo
|
||||
controllerID uuid.UUID
|
||||
}
|
||||
|
||||
// GetControllerInfo returns the controller id and the hostname.
|
||||
// This data might be used in metrics and logging.
|
||||
func (r *Runner) GetControllerInfo(ctx context.Context) params.ControllerInfo {
|
||||
// hostname could change
|
||||
hostname, err := os.Hostname()
|
||||
func (r *Runner) GetControllerInfo(ctx context.Context) (params.ControllerInfo, error) {
|
||||
if !auth.IsAdmin(ctx) {
|
||||
return params.ControllerInfo{}, runnerErrors.ErrUnauthorized
|
||||
}
|
||||
// It is unlikely that fetching the hostname will encounter an error on a standard
|
||||
// linux (or Windows) system, but if os.Hostname() can fail, we need to at least retry
|
||||
// a few times before giving up.
|
||||
// This retries 10 times within one second. While it has the potential to give us a
|
||||
// one second delay before returning either the hostname or an error, I expect this
|
||||
// to succeed on the first try.
|
||||
// As a side note, Windows requires a reboot for the hostname change to take effect,
|
||||
// so if we'll ever support Windows as a target system, the hostname can be cached.
|
||||
var hostname string
|
||||
err := retry.Call(retry.CallArgs{
|
||||
Func: func() error {
|
||||
var err error
|
||||
hostname, err = os.Hostname()
|
||||
if err != nil {
|
||||
return errors.Wrap(err, "fetching hostname")
|
||||
}
|
||||
return nil
|
||||
},
|
||||
Attempts: 10,
|
||||
Delay: 100 * time.Millisecond,
|
||||
Clock: clock.WallClock,
|
||||
})
|
||||
if err != nil {
|
||||
log.Printf("error getting hostname: %v", err)
|
||||
//not much choice but to continue
|
||||
return params.ControllerInfo{}, errors.Wrap(err, "fetching hostname")
|
||||
}
|
||||
r.controllerInfo.Hostname = hostname
|
||||
return r.controllerInfo
|
||||
return params.ControllerInfo{
|
||||
ControllerID: r.controllerID,
|
||||
Hostname: hostname,
|
||||
}, nil
|
||||
}
|
||||
|
||||
func (r *Runner) ListCredentials(ctx context.Context) ([]params.GithubCredentials, error) {
|
||||
|
|
|
|||
13
testdata/config.toml
vendored
13
testdata/config.toml
vendored
|
|
@ -21,6 +21,16 @@ config_dir = "/etc/garm"
|
|||
# Enable streaming logs via web sockets. Use garm-cli debug-log.
|
||||
enable_log_streamer = false
|
||||
|
||||
[metrics]
|
||||
# Toggle metrics. If set to false, the API endpoint for metrics collection will
|
||||
# be disabled.
|
||||
enable = true
|
||||
# Toggle to disable authentication (not recommended) on the metrics endpoint.
|
||||
# If you do disable authentication, I encourage you to put a reverse proxy in front
|
||||
# of garm and limit which systems can access that particular endpoint. Ideally, you
|
||||
# would enable some kind of authentication using the reverse proxy.
|
||||
disable_auth = false
|
||||
|
||||
[jwt_auth]
|
||||
# A JWT token secret used to sign tokens.
|
||||
# Obviously, this needs to be changed :).
|
||||
|
|
@ -29,7 +39,8 @@ secret = ")9gk_4A6KrXz9D2u`0@MPea*sd6W`%@5MAWpWWJ3P3EqW~qB!!(Vd$FhNc*eU4vG"
|
|||
# Time to live for tokens. Both the instances and you will use JWT tokens to
|
||||
# authenticate against the API. However, this TTL is applied only to tokens you
|
||||
# get when logging into the API. The tokens issued to the instances we manage,
|
||||
# have a hardcoded TTL of 15 minutes. The minimum TTL for this token is 24h.
|
||||
# have a TTL based on the runner bootstrap timeout set on each pool. The minimum
|
||||
# TTL for this token is 24h.
|
||||
time_to_live = "8760h"
|
||||
|
||||
[apiserver]
|
||||
|
|
|
|||
18
util/util.go
18
util/util.go
|
|
@ -24,6 +24,7 @@ import (
|
|||
"encoding/base64"
|
||||
"fmt"
|
||||
"io"
|
||||
"math/big"
|
||||
"net/http"
|
||||
"os"
|
||||
"path"
|
||||
|
|
@ -38,8 +39,10 @@ import (
|
|||
"garm/runner/common"
|
||||
|
||||
"github.com/google/go-github/v48/github"
|
||||
"github.com/google/uuid"
|
||||
gorillaHandlers "github.com/gorilla/handlers"
|
||||
"github.com/pkg/errors"
|
||||
"github.com/teris-io/shortid"
|
||||
"golang.org/x/crypto/bcrypt"
|
||||
"golang.org/x/oauth2"
|
||||
lumberjack "gopkg.in/natefinch/lumberjack.v2"
|
||||
|
|
@ -331,3 +334,18 @@ func NewLoggingMiddleware(writer io.Writer) func(http.Handler) http.Handler {
|
|||
func SanitizeLogEntry(entry string) string {
|
||||
return strings.Replace(strings.Replace(entry, "\n", "", -1), "\r", "", -1)
|
||||
}
|
||||
|
||||
func toBase62(uuid []byte) string {
|
||||
var i big.Int
|
||||
i.SetBytes(uuid[:])
|
||||
return i.Text(62)
|
||||
}
|
||||
|
||||
func NewID() string {
|
||||
short, err := shortid.Generate()
|
||||
if err == nil {
|
||||
return toBase62([]byte(short))
|
||||
}
|
||||
newUUID := uuid.New()
|
||||
return toBase62(newUUID[:])
|
||||
}
|
||||
|
|
|
|||
Loading…
Add table
Add a link
Reference in a new issue