这篇文章会介绍如何将后端、前端和网关通通使用 Docker 容器进行运行,并最终使用 DockerCompose 进行容器编排。
技术栈
前端
- React
- Ant Design
后端
- Go
- Iris
网关
- Nginx
- OpenResty
- Lua
- 企业微信
后端构建 api
这里虽然我们写了 EXPOSE 4182,这个只用在测试的时候,生产环境实际上我们不会将后端接口端口进行暴露,
而是通过容器间的网络进行互相访问,以及最终会使用 Nginx 进行转发。
1
2
3
4
5
6
7
8
9
10
11
12
13
14
15
16
17
18
|
FROM golang:1.15.5 LABEL maintainer= "K8sCat <k8scat@gmail.com>" EXPOSE 4182 ENV GOPROXY=https: //goproxy .cn,direct \ GO111MODULE=on WORKDIR /go/src/github .com /k8scat/containerized-app/api COPY . . RUN go mod download && \ go build -o api main.go && \ chmod +x api ENTRYPOINT [ "./api" ] |
前端构建 web
这里值得一提的是,因为前端肯定会去调用后端接口,而且这个接口地址是根据部署而改变,
所以这里我们使用了 ARG 指令进行设置后端的接口地址,这样我们只需要在构建镜像的时候传入 --build-arg REACT_APP_BASE_URL=https://example.com/api
就可以调整后端接口地址了,而不是去改动代码。
还有一点,有朋友肯定会发现这里同时使用到了 Entrypoint 和 CMD,这是为了可以在运行的时候调整前端的端口,但实际上我们这里没必要去调整,因为这里最终也是用 Nginx 进行转发。
1
2
3
4
5
6
7
8
9
10
11
12
13
14
15
16
17
|
FROM node:lts LABEL maintainer= "K8sCat <k8scat@gmail.com>" WORKDIR /web COPY . . ARG REACT_APP_BASE_URL RUN npm config set registry https: //registry .npm.taobao.org && \ npm install && \ npm run build && \ npm install -g serve ENTRYPOINT [ "serve" , "-s" , "build" ] CMD [ "-l" , "3214" ] |
网关构建 gateway
Nginx 配置
这里我们就分别设置了后端和前端的上游,然后设置 location 规则进行转发。
这里有几个点可以说一下:
- 通过 set_by_lua 获取容器的环境变量,最终在运行的时候通过设置 environment 设置这些环境变量,更加灵活
- server_name 使用到了 $hostname,运行时需要设置容器的 hostname
- ssl_certificate 和 ssl_certificate_key 不能使用变量设置
- 加载 gateway.lua 脚本实现企业微信的网关认证
1
2
3
4
5
6
7
8
9
10
11
12
13
14
15
16
17
18
19
20
21
22
23
24
25
26
27
28
29
30
31
32
33
34
35
36
37
38
39
40
41
42
43
44
45
46
47
48
49
50
51
52
53
54
55
56
57
58
59
60
61
62
63
64
65
66
67
68
69
70
71
72
73
74
75
76
77
78
79
80
81
82
83
84
85
|
upstream web { server ca-web:3214; } upstream api { server ca-api:4182; } server { set_by_lua $corp_id 'return os.getenv("CORP_ID")' ; set_by_lua $agent_id 'return os.getenv("AGENT_ID")' ; set_by_lua $secret 'return os.getenv("SECRET")' ; set_by_lua $callback_host 'return os.getenv("CALLBACK_HOST")' ; set_by_lua $callback_schema 'return os.getenv("CALLBACK_SCHEMA")' ; set_by_lua $callback_uri 'return os.getenv("CALLBACK_URI")' ; set_by_lua $logout_uri 'return os.getenv("LOGOUT_URI")' ; set_by_lua $token_expires 'return os.getenv("TOKEN_EXPIRES")' ; set_by_lua $use_secure_cookie 'return os.getenv("USE_SECURE_COOKIE")' ; listen 443 ssl http2; server_name $ hostname ; resolver 8.8.8.8; ssl_certificate /certs/cert .crt; ssl_certificate_key /certs/cert .key; ssl_session_cache shared:SSL:1m; ssl_session_timeout 5m; ssl_protocols TLSv1 TLSv1.1 TLSv1.2; ssl_ciphers AESGCM:HIGH:!aNULL:!MD5; ssl_prefer_server_ciphers on; lua_ssl_verify_depth 2; lua_ssl_trusted_certificate /etc/pki/tls/certs/ca-bundle .crt; if ($time_iso8601 ~ "^(\d{4})-(\d{2})-(\d{2})T(\d{2})" ) { set $year $1; set $month $2; set $day $3; } access_log logs /access_ $year$month$day.log main; error_log logs /error .log; access_by_lua_file "/usr/local/openresty/nginx/conf/gateway.lua" ; location ^~ /gateway { root html; index index.html index.htm; } location ^~ /api { proxy_pass http: //api ; proxy_read_timeout 3600; proxy_http_version 1.1; proxy_set_header X_FORWARDED_PROTO https; proxy_set_header X-Real-IP $remote_addr; proxy_set_header X-Forwarded-For $remote_addr; proxy_set_header X-Forwarded-For $proxy_add_x_forwarded_for; proxy_set_header Host $host; proxy_set_header Connection "" ; } location ^~ / { proxy_pass http: //web ; proxy_read_timeout 3600; proxy_http_version 1.1; proxy_set_header X_FORWARDED_PROTO https; proxy_set_header X-Real-IP $remote_addr; proxy_set_header X-Forwarded-For $remote_addr; proxy_set_header X-Forwarded-For $proxy_add_x_forwarded_for; proxy_set_header Host $host; proxy_set_header Connection "" ; } error_page 500 502 503 504 /50x .html; location = /50x .html { root html; } } server { listen 80; server_name $ hostname ; location / { rewrite ^/(.*) https: // $server_name/$1 redirect; } } |
Dockerfile
1
2
3
4
5
6
7
8
9
10
|
FROM openresty /openresty :1.19.3.1-centos LABEL maintainer= "K8sCat <k8scat@gmail.com>" COPY gateway.conf /etc/nginx/conf .d /gateway .conf COPY gateway.lua /usr/local/openresty/nginx/conf/gateway .lua COPY nginx.conf /usr/local/openresty/nginx/conf/nginx .conf # Install lua-resty-http RUN /usr/local/openresty/luajit/bin/luarocks install lua-resty-http |
Lua 实现基于企业微信的网关认证
这里面的一些配置参数都是通过获取 Nginx 设置的变量。
1
2
3
4
5
6
7
8
9
10
11
12
13
14
15
16
17
18
19
20
21
22
23
24
25
26
27
28
29
30
31
32
33
34
35
36
37
38
39
40
41
42
43
44
45
46
47
48
49
50
51
52
53
54
55
56
57
58
59
60
61
62
63
64
65
66
67
68
69
70
71
72
73
74
75
76
77
78
79
80
81
82
83
84
85
86
87
88
89
90
91
92
93
94
95
96
97
98
99
100
101
102
103
104
105
106
107
108
109
110
111
112
113
114
115
116
117
118
119
120
121
122
123
124
125
126
127
128
129
130
131
132
133
134
135
136
137
138
139
140
141
142
143
144
145
146
147
148
149
150
151
152
153
154
155
156
157
158
159
160
161
162
163
164
165
166
167
168
169
170
171
172
173
174
175
176
177
178
179
|
local json = require( "cjson" ) local http = require( "resty.http" ) local uri = ngx.var.uri local uri_args = ngx.req.get_uri_args() local scheme = ngx.var.scheme local corp_id = ngx.var.corp_id local agent_id = ngx.var.agent_id local secret = ngx.var.secret local callback_scheme = ngx.var.callback_scheme or scheme local callback_host = ngx.var.callback_host local callback_uri = ngx.var.callback_uri local use_secure_cookie = ngx.var.use_secure_cookie == "true" or false local callback_url = callback_scheme .. "://" .. callback_host .. callback_uri local redirect_url = callback_scheme .. "://" .. callback_host .. ngx.var.request_uri local logout_uri = ngx.var.logout_uri or "/logout" local token_expires = ngx.var.token_expires or "7200" token_expires = tonumber(token_expires) local function request_access_token(code) local request = http.new() request:set_timeout(7000) local res, err = request:request_uri( "https://qyapi.weixin.qq.com/cgi-bin/gettoken" , { method = "GET" , query = { corpid = corp_id, corpsecret = secret, }, ssl_verify = true , }) if not res then return nil, (err or "access token request failed: " .. (err or "unknown reason" )) end if res.status ~= 200 then return nil, "received " .. res.status .. " from https://qyapi.weixin.qq.com/cgi-bin/gettoken: " .. res.body end local data = json.decode(res.body) if data[ "errcode" ] ~= 0 then return nil, data[ "errmsg" ] else return data[ "access_token" ] end end local function request_user(access_token, code) local request = http.new() request:set_timeout(7000) local res, err = request:request_uri( "https://qyapi.weixin.qq.com/cgi-bin/user/getuserinfo" , { method = "GET" , query = { access_token = access_token, code = code, }, ssl_verify = true , }) if not res then return nil, "get profile request failed: " .. (err or "unknown reason" ) end if res.status ~= 200 then return nil, "received " .. res.status .. " from https://qyapi.weixin.qq.com/cgi-bin/user/getuserinfo" end local userinfo = json.decode(res.body) if userinfo[ "errcode" ] == 0 then if userinfo[ "UserId" ] then res, err = request:request_uri( "https://qyapi.weixin.qq.com/cgi-bin/user/get" , { method = "GET" , query = { access_token = access_token, userid = userinfo[ "UserId" ], }, ssl_verify = true , }) if not res then return nil, "get user request failed: " .. (err or "unknown reason" ) end if res.status ~= 200 then return nil, "received " .. res.status .. " from https://qyapi.weixin.qq.com/cgi-bin/user/get" end local user = json.decode(res.body) if user[ "errcode" ] == 0 then return user else return nil, user[ "errmsg" ] end else return nil, "UserId not exists" end else return nil, userinfo[ "errmsg" ] end end local function is_authorized() local headers = ngx.req.get_headers() local expires = tonumber(ngx.var.cookie_OauthExpires) or 0 local user_id = ngx.unescape_uri(ngx.var.cookie_OauthUserID or "" ) local token = ngx.var.cookie_OauthAccessToken or "" if expires == 0 and headers[ "OauthExpires" ] then expires = tonumber(headers[ "OauthExpires" ]) end if user_id:len() == 0 and headers[ "OauthUserID" ] then user_id = headers[ "OauthUserID" ] end if token:len() == 0 and headers[ "OauthAccessToken" ] then token = headers[ "OauthAccessToken" ] end local expect_token = callback_host .. user_id .. expires if token == expect_token and expires then if expires > ngx. time () then return true else return false end else return false end end local function redirect_to_auth() return ngx.redirect( "https://open.work.weixin.qq.com/wwopen/sso/qrConnect?" .. ngx.encode_args({ appid = corp_id, agentid = agent_id, redirect_uri = callback_url, state = redirect_url })) end local function authorize() if uri ~= callback_uri then return redirect_to_auth() end local code = uri_args[ "code" ] if not code then ngx.log(ngx.ERR, "not received code from https://open.work.weixin.qq.com/wwopen/sso/qrConnect" ) return ngx. exit (ngx.HTTP_FORBIDDEN) end local access_token, request_access_token_err = request_access_token(code) if not access_token then ngx.log(ngx.ERR, "got error during access token request: " .. request_access_token_err) return ngx. exit (ngx.HTTP_FORBIDDEN) end local user, request_user_err = request_user(access_token, code) if not user then ngx.log(ngx.ERR, "got error during profile request: " .. request_user_err) return ngx. exit (ngx.HTTP_FORBIDDEN) end ngx.log(ngx.ERR, "user id: " .. user[ "userid" ]) local expires = ngx. time () + token_expires local cookie_tail = "; version=1; path=/; Max-Age=" .. expires if use_secure_cookie then cookie_tail = cookie_tail .. "; secure" end local user_id = user[ "userid" ] local user_token = callback_host .. user_id .. expires ngx.header[ "Set-Cookie" ] = { "OauthUserID=" .. ngx.escape_uri(user_id) .. cookie_tail, "OauthAccessToken=" .. ngx.escape_uri(user_token) .. cookie_tail, "OauthExpires=" .. expires .. cookie_tail, } return ngx.redirect(uri_args[ "state" ]) end local function handle_logout() if uri == logout_uri then ngx.header[ "Set-Cookie" ] = "OauthAccessToken==deleted; path=/; expires=Thu, 01 Jan 1970 00:00:00 GMT" -- return ngx.redirect( "/" ) end end handle_logout() if (not is_authorized()) then authorize() end |
使用 DockerCompose 进行容器编排
这里需要讲几个点:
- 设置前端的 args 可以在前端构建时传入后端接口地址
- 设置网关的 hostname 可以设置网关容器的 hostname
- 设置网关的 environment 可以传入相关配置
- 最终运行时只有网关层进行暴露端口
1
2
3
4
5
6
7
8
9
10
11
12
13
14
15
16
17
18
19
20
21
22
23
24
25
26
27
28
29
30
31
32
33
34
35
36
37
|
version: "3.8" services: api: build: ./api image: ca-api:latest container_name: ca-api web: build: context: ./web args: REACT_APP_BASE_URL: https://example.com/api image: ca-web:latest container_name: ca-web gateway: build: ./gateway image: ca-gateway:latest hostname: example.com volumes: - ./gateway/certs/fullchain.pem:/certs/cert.crt - ./gateway/certs/privkey.pem:/certs/cert.key ports: - 80:80 - 443:443 environment: - CORP_ID= - AGENT_ID= - SECRET= - CALLBACK_HOST=example.com - CALLBACK_SCHEMA=https - CALLBACK_URI=/gateway/oauth_wechat - LOGOUT_URI=/gateway/oauth_logout - TOKEN_EXPIRES=7200 - USE_SECURE_COOKIE=true container_name: ca-gateway |
开源代码
GitHub https://github.com/k8scat/containerized-app
Gitee https://gitee.com/k8scat/containerized-app
到此这篇关于Docker+DockerCompose封装web应用的文章就介绍到这了,更多相关Docker+DockerCompose封装web应用内容请搜索服务器之家以前的文章或继续浏览下面的相关文章希望大家以后多多支持服务器之家!
原文链接:https://juejin.cn/post/6933778061280149517