github.com/rzurga/go-swagger@v0.28.1-0.20211109195225-5d1f453ffa3a/examples/todo-list/restapi/server.go (about)

     1  // Code generated by go-swagger; DO NOT EDIT.
     2  
     3  package restapi
     4  
     5  import (
     6  	"context"
     7  	"crypto/tls"
     8  	"crypto/x509"
     9  	"errors"
    10  	"fmt"
    11  	"io/ioutil"
    12  	"log"
    13  	"net"
    14  	"net/http"
    15  	"os"
    16  	"os/signal"
    17  	"strconv"
    18  	"sync"
    19  	"sync/atomic"
    20  	"syscall"
    21  	"time"
    22  
    23  	"github.com/go-openapi/runtime/flagext"
    24  	"github.com/go-openapi/swag"
    25  	flag "github.com/spf13/pflag"
    26  	"golang.org/x/net/netutil"
    27  
    28  	"github.com/go-swagger/go-swagger/examples/todo-list/restapi/operations"
    29  )
    30  
    31  const (
    32  	schemeHTTP  = "http"
    33  	schemeHTTPS = "https"
    34  	schemeUnix  = "unix"
    35  )
    36  
    37  var defaultSchemes []string
    38  
    39  func init() {
    40  	defaultSchemes = []string{
    41  		schemeHTTP,
    42  		schemeHTTPS,
    43  		schemeUnix,
    44  	}
    45  }
    46  
    47  var (
    48  	enabledListeners []string
    49  	cleanupTimeout   time.Duration
    50  	gracefulTimeout  time.Duration
    51  	maxHeaderSize    flagext.ByteSize
    52  
    53  	socketPath string
    54  
    55  	host         string
    56  	port         int
    57  	listenLimit  int
    58  	keepAlive    time.Duration
    59  	readTimeout  time.Duration
    60  	writeTimeout time.Duration
    61  
    62  	tlsHost           string
    63  	tlsPort           int
    64  	tlsListenLimit    int
    65  	tlsKeepAlive      time.Duration
    66  	tlsReadTimeout    time.Duration
    67  	tlsWriteTimeout   time.Duration
    68  	tlsCertificate    string
    69  	tlsCertificateKey string
    70  	tlsCACertificate  string
    71  )
    72  
    73  func init() {
    74  	maxHeaderSize = flagext.ByteSize(1000000)
    75  
    76  	flag.StringSliceVar(&enabledListeners, "scheme", defaultSchemes, "the listeners to enable, this can be repeated and defaults to the schemes in the swagger spec")
    77  
    78  	flag.DurationVar(&cleanupTimeout, "cleanup-timeout", 10*time.Second, "grace period for which to wait before killing idle connections")
    79  	flag.DurationVar(&gracefulTimeout, "graceful-timeout", 15*time.Second, "grace period for which to wait before shutting down the server")
    80  	flag.Var(&maxHeaderSize, "max-header-size", "controls the maximum number of bytes the server will read parsing the request header's keys and values, including the request line. It does not limit the size of the request body")
    81  
    82  	flag.StringVar(&socketPath, "socket-path", "/var/run/todo-list.sock", "the unix socket to listen on")
    83  
    84  	flag.StringVar(&host, "host", "localhost", "the IP to listen on")
    85  	flag.IntVar(&port, "port", 0, "the port to listen on for insecure connections, defaults to a random value")
    86  	flag.IntVar(&listenLimit, "listen-limit", 0, "limit the number of outstanding requests")
    87  	flag.DurationVar(&keepAlive, "keep-alive", 3*time.Minute, "sets the TCP keep-alive timeouts on accepted connections. It prunes dead TCP connections ( e.g. closing laptop mid-download)")
    88  	flag.DurationVar(&readTimeout, "read-timeout", 30*time.Second, "maximum duration before timing out read of the request")
    89  	flag.DurationVar(&writeTimeout, "write-timeout", 30*time.Second, "maximum duration before timing out write of the response")
    90  
    91  	flag.StringVar(&tlsHost, "tls-host", "localhost", "the IP to listen on")
    92  	flag.IntVar(&tlsPort, "tls-port", 0, "the port to listen on for secure connections, defaults to a random value")
    93  	flag.StringVar(&tlsCertificate, "tls-certificate", "", "the certificate file to use for secure connections")
    94  	flag.StringVar(&tlsCertificateKey, "tls-key", "", "the private key file to use for secure connections (without passphrase)")
    95  	flag.StringVar(&tlsCACertificate, "tls-ca", "", "the certificate authority certificate file to be used with mutual tls auth")
    96  	flag.IntVar(&tlsListenLimit, "tls-listen-limit", 0, "limit the number of outstanding requests")
    97  	flag.DurationVar(&tlsKeepAlive, "tls-keep-alive", 3*time.Minute, "sets the TCP keep-alive timeouts on accepted connections. It prunes dead TCP connections ( e.g. closing laptop mid-download)")
    98  	flag.DurationVar(&tlsReadTimeout, "tls-read-timeout", 30*time.Second, "maximum duration before timing out read of the request")
    99  	flag.DurationVar(&tlsWriteTimeout, "tls-write-timeout", 30*time.Second, "maximum duration before timing out write of the response")
   100  }
   101  
   102  func stringEnvOverride(orig string, def string, keys ...string) string {
   103  	for _, k := range keys {
   104  		if os.Getenv(k) != "" {
   105  			return os.Getenv(k)
   106  		}
   107  	}
   108  	if def != "" && orig == "" {
   109  		return def
   110  	}
   111  	return orig
   112  }
   113  
   114  func intEnvOverride(orig int, def int, keys ...string) int {
   115  	for _, k := range keys {
   116  		if os.Getenv(k) != "" {
   117  			v, err := strconv.Atoi(os.Getenv(k))
   118  			if err != nil {
   119  				fmt.Fprintln(os.Stderr, k, "is not a valid number")
   120  				os.Exit(1)
   121  			}
   122  			return v
   123  		}
   124  	}
   125  	if def != 0 && orig == 0 {
   126  		return def
   127  	}
   128  	return orig
   129  }
   130  
   131  // NewServer creates a new api todo list server but does not configure it
   132  func NewServer(api *operations.TodoListAPI) *Server {
   133  	s := new(Server)
   134  
   135  	s.EnabledListeners = enabledListeners
   136  	s.CleanupTimeout = cleanupTimeout
   137  	s.GracefulTimeout = gracefulTimeout
   138  	s.MaxHeaderSize = maxHeaderSize
   139  	s.SocketPath = socketPath
   140  	s.Host = stringEnvOverride(host, "", "HOST")
   141  	s.Port = intEnvOverride(port, 0, "PORT")
   142  	s.ListenLimit = listenLimit
   143  	s.KeepAlive = keepAlive
   144  	s.ReadTimeout = readTimeout
   145  	s.WriteTimeout = writeTimeout
   146  	s.TLSHost = stringEnvOverride(tlsHost, s.Host, "TLS_HOST", "HOST")
   147  	s.TLSPort = intEnvOverride(tlsPort, 0, "TLS_PORT")
   148  	s.TLSCertificate = stringEnvOverride(tlsCertificate, "", "TLS_CERTIFICATE")
   149  	s.TLSCertificateKey = stringEnvOverride(tlsCertificateKey, "", "TLS_PRIVATE_KEY")
   150  	s.TLSCACertificate = stringEnvOverride(tlsCACertificate, "", "TLS_CA_CERTIFICATE")
   151  	s.TLSListenLimit = tlsListenLimit
   152  	s.TLSKeepAlive = tlsKeepAlive
   153  	s.TLSReadTimeout = tlsReadTimeout
   154  	s.TLSWriteTimeout = tlsWriteTimeout
   155  	s.shutdown = make(chan struct{})
   156  	s.api = api
   157  	s.interrupt = make(chan os.Signal, 1)
   158  	return s
   159  }
   160  
   161  // ConfigureAPI configures the API and handlers.
   162  func (s *Server) ConfigureAPI() {
   163  	if s.api != nil {
   164  		s.handler = configureAPI(s.api)
   165  	}
   166  }
   167  
   168  // ConfigureFlags configures the additional flags defined by the handlers. Needs to be called before the parser.Parse
   169  func (s *Server) ConfigureFlags() {
   170  	if s.api != nil {
   171  		configureFlags(s.api)
   172  	}
   173  }
   174  
   175  // Server for the todo list API
   176  type Server struct {
   177  	EnabledListeners []string
   178  	CleanupTimeout   time.Duration
   179  	GracefulTimeout  time.Duration
   180  	MaxHeaderSize    flagext.ByteSize
   181  
   182  	SocketPath    string
   183  	domainSocketL net.Listener
   184  
   185  	Host         string
   186  	Port         int
   187  	ListenLimit  int
   188  	KeepAlive    time.Duration
   189  	ReadTimeout  time.Duration
   190  	WriteTimeout time.Duration
   191  	httpServerL  net.Listener
   192  
   193  	TLSHost           string
   194  	TLSPort           int
   195  	TLSCertificate    string
   196  	TLSCertificateKey string
   197  	TLSCACertificate  string
   198  	TLSListenLimit    int
   199  	TLSKeepAlive      time.Duration
   200  	TLSReadTimeout    time.Duration
   201  	TLSWriteTimeout   time.Duration
   202  	httpsServerL      net.Listener
   203  
   204  	api          *operations.TodoListAPI
   205  	handler      http.Handler
   206  	hasListeners bool
   207  	shutdown     chan struct{}
   208  	shuttingDown int32
   209  	interrupted  bool
   210  	interrupt    chan os.Signal
   211  }
   212  
   213  // Logf logs message either via defined user logger or via system one if no user logger is defined.
   214  func (s *Server) Logf(f string, args ...interface{}) {
   215  	if s.api != nil && s.api.Logger != nil {
   216  		s.api.Logger(f, args...)
   217  	} else {
   218  		log.Printf(f, args...)
   219  	}
   220  }
   221  
   222  // Fatalf logs message either via defined user logger or via system one if no user logger is defined.
   223  // Exits with non-zero status after printing
   224  func (s *Server) Fatalf(f string, args ...interface{}) {
   225  	if s.api != nil && s.api.Logger != nil {
   226  		s.api.Logger(f, args...)
   227  		os.Exit(1)
   228  	} else {
   229  		log.Fatalf(f, args...)
   230  	}
   231  }
   232  
   233  // SetAPI configures the server with the specified API. Needs to be called before Serve
   234  func (s *Server) SetAPI(api *operations.TodoListAPI) {
   235  	if api == nil {
   236  		s.api = nil
   237  		s.handler = nil
   238  		return
   239  	}
   240  
   241  	s.api = api
   242  	s.handler = configureAPI(api)
   243  }
   244  
   245  func (s *Server) hasScheme(scheme string) bool {
   246  	schemes := s.EnabledListeners
   247  	if len(schemes) == 0 {
   248  		schemes = defaultSchemes
   249  	}
   250  
   251  	for _, v := range schemes {
   252  		if v == scheme {
   253  			return true
   254  		}
   255  	}
   256  	return false
   257  }
   258  
   259  // Serve the api
   260  func (s *Server) Serve() (err error) {
   261  	if !s.hasListeners {
   262  		if err = s.Listen(); err != nil {
   263  			return err
   264  		}
   265  	}
   266  
   267  	// set default handler, if none is set
   268  	if s.handler == nil {
   269  		if s.api == nil {
   270  			return errors.New("can't create the default handler, as no api is set")
   271  		}
   272  
   273  		s.SetHandler(s.api.Serve(nil))
   274  	}
   275  
   276  	wg := new(sync.WaitGroup)
   277  	once := new(sync.Once)
   278  	signalNotify(s.interrupt)
   279  	go handleInterrupt(once, s)
   280  
   281  	servers := []*http.Server{}
   282  
   283  	if s.hasScheme(schemeUnix) {
   284  		domainSocket := new(http.Server)
   285  		domainSocket.MaxHeaderBytes = int(s.MaxHeaderSize)
   286  		domainSocket.Handler = s.handler
   287  		if int64(s.CleanupTimeout) > 0 {
   288  			domainSocket.IdleTimeout = s.CleanupTimeout
   289  		}
   290  
   291  		configureServer(domainSocket, "unix", string(s.SocketPath))
   292  
   293  		servers = append(servers, domainSocket)
   294  		wg.Add(1)
   295  		s.Logf("Serving todo list at unix://%s", s.SocketPath)
   296  		go func(l net.Listener) {
   297  			defer wg.Done()
   298  			if err := domainSocket.Serve(l); err != nil && err != http.ErrServerClosed {
   299  				s.Fatalf("%v", err)
   300  			}
   301  			s.Logf("Stopped serving todo list at unix://%s", s.SocketPath)
   302  		}(s.domainSocketL)
   303  	}
   304  
   305  	if s.hasScheme(schemeHTTP) {
   306  		httpServer := new(http.Server)
   307  		httpServer.MaxHeaderBytes = int(s.MaxHeaderSize)
   308  		httpServer.ReadTimeout = s.ReadTimeout
   309  		httpServer.WriteTimeout = s.WriteTimeout
   310  		httpServer.SetKeepAlivesEnabled(int64(s.KeepAlive) > 0)
   311  		if s.ListenLimit > 0 {
   312  			s.httpServerL = netutil.LimitListener(s.httpServerL, s.ListenLimit)
   313  		}
   314  
   315  		if int64(s.CleanupTimeout) > 0 {
   316  			httpServer.IdleTimeout = s.CleanupTimeout
   317  		}
   318  
   319  		httpServer.Handler = s.handler
   320  
   321  		configureServer(httpServer, "http", s.httpServerL.Addr().String())
   322  
   323  		servers = append(servers, httpServer)
   324  		wg.Add(1)
   325  		s.Logf("Serving todo list at http://%s", s.httpServerL.Addr())
   326  		go func(l net.Listener) {
   327  			defer wg.Done()
   328  			if err := httpServer.Serve(l); err != nil && err != http.ErrServerClosed {
   329  				s.Fatalf("%v", err)
   330  			}
   331  			s.Logf("Stopped serving todo list at http://%s", l.Addr())
   332  		}(s.httpServerL)
   333  	}
   334  
   335  	if s.hasScheme(schemeHTTPS) {
   336  		httpsServer := new(http.Server)
   337  		httpsServer.MaxHeaderBytes = int(s.MaxHeaderSize)
   338  		httpsServer.ReadTimeout = s.TLSReadTimeout
   339  		httpsServer.WriteTimeout = s.TLSWriteTimeout
   340  		httpsServer.SetKeepAlivesEnabled(int64(s.TLSKeepAlive) > 0)
   341  		if s.TLSListenLimit > 0 {
   342  			s.httpsServerL = netutil.LimitListener(s.httpsServerL, s.TLSListenLimit)
   343  		}
   344  		if int64(s.CleanupTimeout) > 0 {
   345  			httpsServer.IdleTimeout = s.CleanupTimeout
   346  		}
   347  		httpsServer.Handler = s.handler
   348  
   349  		// Inspired by https://blog.bracebin.com/achieving-perfect-ssl-labs-score-with-go
   350  		httpsServer.TLSConfig = &tls.Config{
   351  			// Causes servers to use Go's default ciphersuite preferences,
   352  			// which are tuned to avoid attacks. Does nothing on clients.
   353  			PreferServerCipherSuites: true,
   354  			// Only use curves which have assembly implementations
   355  			// https://github.com/golang/go/tree/master/src/crypto/elliptic
   356  			CurvePreferences: []tls.CurveID{tls.CurveP256},
   357  			// Use modern tls mode https://wiki.mozilla.org/Security/Server_Side_TLS#Modern_compatibility
   358  			NextProtos: []string{"h2", "http/1.1"},
   359  			// https://www.owasp.org/index.php/Transport_Layer_Protection_Cheat_Sheet#Rule_-_Only_Support_Strong_Protocols
   360  			MinVersion: tls.VersionTLS12,
   361  			// These ciphersuites support Forward Secrecy: https://en.wikipedia.org/wiki/Forward_secrecy
   362  			CipherSuites: []uint16{
   363  				tls.TLS_ECDHE_ECDSA_WITH_AES_256_GCM_SHA384,
   364  				tls.TLS_ECDHE_RSA_WITH_AES_256_GCM_SHA384,
   365  				tls.TLS_ECDHE_ECDSA_WITH_AES_128_GCM_SHA256,
   366  				tls.TLS_ECDHE_RSA_WITH_AES_128_GCM_SHA256,
   367  				tls.TLS_ECDHE_ECDSA_WITH_CHACHA20_POLY1305,
   368  				tls.TLS_ECDHE_RSA_WITH_CHACHA20_POLY1305,
   369  			},
   370  		}
   371  
   372  		// build standard config from server options
   373  		if s.TLSCertificate != "" && s.TLSCertificateKey != "" {
   374  			httpsServer.TLSConfig.Certificates = make([]tls.Certificate, 1)
   375  			httpsServer.TLSConfig.Certificates[0], err = tls.LoadX509KeyPair(s.TLSCertificate, s.TLSCertificateKey)
   376  			if err != nil {
   377  				return err
   378  			}
   379  		}
   380  
   381  		if s.TLSCACertificate != "" {
   382  			// include specified CA certificate
   383  			caCert, caCertErr := ioutil.ReadFile(s.TLSCACertificate)
   384  			if caCertErr != nil {
   385  				return caCertErr
   386  			}
   387  			caCertPool := x509.NewCertPool()
   388  			ok := caCertPool.AppendCertsFromPEM(caCert)
   389  			if !ok {
   390  				return fmt.Errorf("cannot parse CA certificate")
   391  			}
   392  			httpsServer.TLSConfig.ClientCAs = caCertPool
   393  			httpsServer.TLSConfig.ClientAuth = tls.RequireAndVerifyClientCert
   394  		}
   395  
   396  		// call custom TLS configurator
   397  		configureTLS(httpsServer.TLSConfig)
   398  
   399  		if len(httpsServer.TLSConfig.Certificates) == 0 && httpsServer.TLSConfig.GetCertificate == nil {
   400  			// after standard and custom config are passed, this ends up with no certificate
   401  			if s.TLSCertificate == "" {
   402  				if s.TLSCertificateKey == "" {
   403  					s.Fatalf("the required flags `--tls-certificate` and `--tls-key` were not specified")
   404  				}
   405  				s.Fatalf("the required flag `--tls-certificate` was not specified")
   406  			}
   407  			if s.TLSCertificateKey == "" {
   408  				s.Fatalf("the required flag `--tls-key` was not specified")
   409  			}
   410  			// this happens with a wrong custom TLS configurator
   411  			s.Fatalf("no certificate was configured for TLS")
   412  		}
   413  
   414  		configureServer(httpsServer, "https", s.httpsServerL.Addr().String())
   415  
   416  		servers = append(servers, httpsServer)
   417  		wg.Add(1)
   418  		s.Logf("Serving todo list at https://%s", s.httpsServerL.Addr())
   419  		go func(l net.Listener) {
   420  			defer wg.Done()
   421  			if err := httpsServer.Serve(l); err != nil && err != http.ErrServerClosed {
   422  				s.Fatalf("%v", err)
   423  			}
   424  			s.Logf("Stopped serving todo list at https://%s", l.Addr())
   425  		}(tls.NewListener(s.httpsServerL, httpsServer.TLSConfig))
   426  	}
   427  
   428  	wg.Add(1)
   429  	go s.handleShutdown(wg, &servers)
   430  
   431  	wg.Wait()
   432  	return nil
   433  }
   434  
   435  // Listen creates the listeners for the server
   436  func (s *Server) Listen() error {
   437  	if s.hasListeners { // already done this
   438  		return nil
   439  	}
   440  
   441  	if s.hasScheme(schemeHTTPS) {
   442  		// Use http host if https host wasn't defined
   443  		if s.TLSHost == "" {
   444  			s.TLSHost = s.Host
   445  		}
   446  		// Use http listen limit if https listen limit wasn't defined
   447  		if s.TLSListenLimit == 0 {
   448  			s.TLSListenLimit = s.ListenLimit
   449  		}
   450  		// Use http tcp keep alive if https tcp keep alive wasn't defined
   451  		if int64(s.TLSKeepAlive) == 0 {
   452  			s.TLSKeepAlive = s.KeepAlive
   453  		}
   454  		// Use http read timeout if https read timeout wasn't defined
   455  		if int64(s.TLSReadTimeout) == 0 {
   456  			s.TLSReadTimeout = s.ReadTimeout
   457  		}
   458  		// Use http write timeout if https write timeout wasn't defined
   459  		if int64(s.TLSWriteTimeout) == 0 {
   460  			s.TLSWriteTimeout = s.WriteTimeout
   461  		}
   462  	}
   463  
   464  	if s.hasScheme(schemeUnix) {
   465  		domSockListener, err := net.Listen("unix", string(s.SocketPath))
   466  		if err != nil {
   467  			return err
   468  		}
   469  		s.domainSocketL = domSockListener
   470  	}
   471  
   472  	if s.hasScheme(schemeHTTP) {
   473  		listener, err := net.Listen("tcp", net.JoinHostPort(s.Host, strconv.Itoa(s.Port)))
   474  		if err != nil {
   475  			return err
   476  		}
   477  
   478  		h, p, err := swag.SplitHostPort(listener.Addr().String())
   479  		if err != nil {
   480  			return err
   481  		}
   482  		s.Host = h
   483  		s.Port = p
   484  		s.httpServerL = listener
   485  	}
   486  
   487  	if s.hasScheme(schemeHTTPS) {
   488  		tlsListener, err := net.Listen("tcp", net.JoinHostPort(s.TLSHost, strconv.Itoa(s.TLSPort)))
   489  		if err != nil {
   490  			return err
   491  		}
   492  
   493  		sh, sp, err := swag.SplitHostPort(tlsListener.Addr().String())
   494  		if err != nil {
   495  			return err
   496  		}
   497  		s.TLSHost = sh
   498  		s.TLSPort = sp
   499  		s.httpsServerL = tlsListener
   500  	}
   501  
   502  	s.hasListeners = true
   503  	return nil
   504  }
   505  
   506  // Shutdown server and clean up resources
   507  func (s *Server) Shutdown() error {
   508  	if atomic.CompareAndSwapInt32(&s.shuttingDown, 0, 1) {
   509  		close(s.shutdown)
   510  	}
   511  	return nil
   512  }
   513  
   514  func (s *Server) handleShutdown(wg *sync.WaitGroup, serversPtr *[]*http.Server) {
   515  	// wg.Done must occur last, after s.api.ServerShutdown()
   516  	// (to preserve old behaviour)
   517  	defer wg.Done()
   518  
   519  	<-s.shutdown
   520  
   521  	servers := *serversPtr
   522  
   523  	ctx, cancel := context.WithTimeout(context.TODO(), s.GracefulTimeout)
   524  	defer cancel()
   525  
   526  	// first execute the pre-shutdown hook
   527  	s.api.PreServerShutdown()
   528  
   529  	shutdownChan := make(chan bool)
   530  	for i := range servers {
   531  		server := servers[i]
   532  		go func() {
   533  			var success bool
   534  			defer func() {
   535  				shutdownChan <- success
   536  			}()
   537  			if err := server.Shutdown(ctx); err != nil {
   538  				// Error from closing listeners, or context timeout:
   539  				s.Logf("HTTP server Shutdown: %v", err)
   540  			} else {
   541  				success = true
   542  			}
   543  		}()
   544  	}
   545  
   546  	// Wait until all listeners have successfully shut down before calling ServerShutdown
   547  	success := true
   548  	for range servers {
   549  		success = success && <-shutdownChan
   550  	}
   551  	if success {
   552  		s.api.ServerShutdown()
   553  	}
   554  }
   555  
   556  // GetHandler returns a handler useful for testing
   557  func (s *Server) GetHandler() http.Handler {
   558  	return s.handler
   559  }
   560  
   561  // SetHandler allows for setting a http handler on this server
   562  func (s *Server) SetHandler(handler http.Handler) {
   563  	s.handler = handler
   564  }
   565  
   566  // UnixListener returns the domain socket listener
   567  func (s *Server) UnixListener() (net.Listener, error) {
   568  	if !s.hasListeners {
   569  		if err := s.Listen(); err != nil {
   570  			return nil, err
   571  		}
   572  	}
   573  	return s.domainSocketL, nil
   574  }
   575  
   576  // HTTPListener returns the http listener
   577  func (s *Server) HTTPListener() (net.Listener, error) {
   578  	if !s.hasListeners {
   579  		if err := s.Listen(); err != nil {
   580  			return nil, err
   581  		}
   582  	}
   583  	return s.httpServerL, nil
   584  }
   585  
   586  // TLSListener returns the https listener
   587  func (s *Server) TLSListener() (net.Listener, error) {
   588  	if !s.hasListeners {
   589  		if err := s.Listen(); err != nil {
   590  			return nil, err
   591  		}
   592  	}
   593  	return s.httpsServerL, nil
   594  }
   595  
   596  func handleInterrupt(once *sync.Once, s *Server) {
   597  	once.Do(func() {
   598  		for range s.interrupt {
   599  			if s.interrupted {
   600  				s.Logf("Server already shutting down")
   601  				continue
   602  			}
   603  			s.interrupted = true
   604  			s.Logf("Shutting down... ")
   605  			if err := s.Shutdown(); err != nil {
   606  				s.Logf("HTTP server Shutdown: %v", err)
   607  			}
   608  		}
   609  	})
   610  }
   611  
   612  func signalNotify(interrupt chan<- os.Signal) {
   613  	signal.Notify(interrupt, syscall.SIGINT, syscall.SIGTERM)
   614  }