use axum::extract::{Extension, State}; use axum::http::StatusCode; use axum::Json; use axum::{ routing::{get, post}, Router, }; use dotenvy::dotenv; use log::{error, info, trace, warn}; use std::collections::HashMap; use std::net::SocketAddr; use std::sync::Arc; use tower_http::cors::CorsLayer; use tower_http::trace::TraceLayer; use botserver::basic; use botserver::core; use botserver::shared; #[cfg(feature = "console")] use botserver::console; // Re-exports from core use botserver::core::automation; use botserver::core::bootstrap; use botserver::core::bot; use botserver::core::config; use botserver::core::package_manager; use botserver::core::session; // Feature-gated modules #[cfg(feature = "attendance")] mod attendance; #[cfg(feature = "calendar")] mod calendar; #[cfg(feature = "compliance")] mod compliance; #[cfg(feature = "directory")] mod directory; #[cfg(feature = "drive")] mod drive; #[cfg(feature = "email")] mod email; #[cfg(feature = "instagram")] mod instagram; #[cfg(feature = "llm")] mod llm; #[cfg(feature = "meet")] mod meet; #[cfg(feature = "msteams")] mod msteams; #[cfg(feature = "nvidia")] mod nvidia; #[cfg(feature = "vectordb")] mod vector_db; #[cfg(feature = "weba")] mod weba; #[cfg(feature = "whatsapp")] mod whatsapp; use crate::automation::AutomationService; use crate::bootstrap::BootstrapManager; #[cfg(feature = "email")] use crate::email::{ add_email_account, delete_email_account, get_emails, get_latest_email_from, list_email_accounts, list_emails, list_folders, save_click, save_draft, send_email, }; use botserver::core::bot::channels::{VoiceAdapter, WebChannelAdapter}; use botserver::core::bot::websocket_handler; use botserver::core::bot::BotOrchestrator; use botserver::core::config::AppConfig; // use crate::file::upload_file; // Module doesn't exist #[cfg(feature = "directory")] use crate::directory::auth_handler; #[cfg(feature = "meet")] use crate::meet::{voice_start, voice_stop}; use crate::package_manager::InstallMode; use crate::session::{create_session, get_session_history, get_sessions, start_session}; use crate::shared::state::AppState; use crate::shared::utils::create_conn; use crate::shared::utils::create_s3_operator; // Use BootstrapProgress from lib.rs use botserver::BootstrapProgress; /// Health check endpoint handler /// Returns server health status for monitoring and load balancers async fn health_check(State(state): State>) -> (StatusCode, Json) { // Check database connectivity let db_ok = state.conn.get().is_ok(); let status = if db_ok { "healthy" } else { "degraded" }; let code = if db_ok { StatusCode::OK } else { StatusCode::SERVICE_UNAVAILABLE }; ( code, Json(serde_json::json!({ "status": status, "service": "botserver", "version": env!("CARGO_PKG_VERSION"), "database": db_ok })), ) } /// Simple health check without state (for basic liveness probes) async fn health_check_simple() -> (StatusCode, Json) { ( StatusCode::OK, Json(serde_json::json!({ "status": "ok", "service": "botserver", "version": env!("CARGO_PKG_VERSION") })), ) } async fn run_axum_server( app_state: Arc, port: u16, _worker_count: usize, ) -> std::io::Result<()> { // CORS configuration let cors = CorsLayer::new() .allow_origin(tower_http::cors::Any) .allow_methods(tower_http::cors::Any) .allow_headers(tower_http::cors::Any) .max_age(std::time::Duration::from_secs(3600)); use crate::core::urls::ApiUrls; // Build API router with module-specific routes let mut api_router = Router::new() // Health check endpoints - both /health and /api/health for compatibility .route("/health", get(health_check_simple)) .route(ApiUrls::HEALTH, get(health_check)) .route(ApiUrls::SESSIONS, post(create_session)) .route(ApiUrls::SESSIONS, get(get_sessions)) .route( &ApiUrls::SESSION_HISTORY.replace(":id", "{session_id}"), get(get_session_history), ) .route( &ApiUrls::SESSION_START.replace(":id", "{session_id}"), post(start_session), ) // WebSocket route .route(ApiUrls::WS, get(websocket_handler)) // Merge drive routes using the configure() function .merge(botserver::drive::configure()); // Add feature-specific routes #[cfg(feature = "directory")] { api_router = api_router .route(ApiUrls::AUTH, get(auth_handler)) .merge(crate::core::directory::api::configure_user_routes()); } #[cfg(feature = "meet")] { api_router = api_router .route(ApiUrls::VOICE_START, post(voice_start)) .route(ApiUrls::VOICE_STOP, post(voice_stop)) .route(ApiUrls::WS_MEET, get(crate::meet::meeting_websocket)) .merge(crate::meet::configure()); } #[cfg(feature = "email")] { api_router = api_router.merge(crate::email::configure()); } // Add calendar routes with CalDAV if feature is enabled #[cfg(feature = "calendar")] { let calendar_engine = Arc::new(crate::calendar::CalendarEngine::new(app_state.conn.clone())); // Start reminder job let reminder_engine = Arc::clone(&calendar_engine); tokio::spawn(async move { crate::calendar::start_reminder_job(reminder_engine).await; }); // Add CalDAV router api_router = api_router.merge(crate::calendar::caldav::create_caldav_router( calendar_engine, )); } // Add task engine routes api_router = api_router.merge(botserver::tasks::configure_task_routes()); // Add calendar routes if calendar feature is enabled #[cfg(feature = "calendar")] { api_router = api_router.merge(crate::calendar::configure_calendar_routes()); } // Add suite application routes (gap analysis implementations) api_router = api_router.merge(botserver::analytics::configure_analytics_routes()); api_router = api_router.merge(botserver::paper::configure_paper_routes()); api_router = api_router.merge(botserver::research::configure_research_routes()); api_router = api_router.merge(botserver::sources::configure_sources_routes()); api_router = api_router.merge(botserver::designer::configure_designer_routes()); // Add WhatsApp webhook routes if feature is enabled #[cfg(feature = "whatsapp")] { api_router = api_router.merge(crate::whatsapp::configure()); } // Add attendance/CRM routes for human handoff #[cfg(feature = "attendance")] { api_router = api_router.merge(crate::attendance::configure_attendance_routes()); } // Add OAuth authentication routes api_router = api_router.merge(crate::core::oauth::routes::configure()); let app = Router::new() // API routes .merge(api_router.with_state(app_state.clone())) .layer(Extension(app_state.clone())) // Layers .layer(cors) .layer(TraceLayer::new_for_http()); // Always use HTTPS - load certificates from botserver-stack let cert_dir = std::path::Path::new("./botserver-stack/conf/system/certificates"); let cert_path = cert_dir.join("api/server.crt"); let key_path = cert_dir.join("api/server.key"); // Bind to address let addr = SocketAddr::from(([0, 0, 0, 0], port)); // Check if TLS is disabled via environment variable (for local development) let disable_tls = std::env::var("BOTSERVER_DISABLE_TLS") .map(|v| v == "true" || v == "1") .unwrap_or(false); // Check if certificates exist and TLS is not disabled if !disable_tls && cert_path.exists() && key_path.exists() { // Use HTTPS with existing certificates let tls_config = axum_server::tls_rustls::RustlsConfig::from_pem_file(cert_path, key_path) .await .map_err(|e| std::io::Error::new(std::io::ErrorKind::Other, e))?; info!("HTTPS server listening on {} with TLS", addr); let handle = axum_server::Handle::new(); axum_server::bind_rustls(addr, tls_config) .handle(handle) .serve(app.into_make_service()) .await } else { // Use HTTP - either TLS is disabled or certificates don't exist if disable_tls { info!("TLS disabled via BOTSERVER_DISABLE_TLS environment variable"); } else { warn!("TLS certificates not found, using HTTP"); } let listener = tokio::net::TcpListener::bind(addr).await?; info!("HTTP server listening on {}", addr); axum::serve(listener, app.into_make_service()) .await .map_err(|e| std::io::Error::new(std::io::ErrorKind::Other, e)) } } #[tokio::main] async fn main() -> std::io::Result<()> { // Install rustls crypto provider (ring) before any TLS operations // This must be done before any code that might use rustls let _ = rustls::crypto::ring::default_provider().install_default(); // Load .env for VAULT_* variables only (all other secrets come from Vault) dotenvy::dotenv().ok(); // Initialize SecretsManager early - this connects to Vault if configured // Only VAULT_ADDR, VAULT_TOKEN, and VAULT_SKIP_VERIFY should be in .env if let Err(e) = crate::shared::utils::init_secrets_manager().await { warn!( "Failed to initialize SecretsManager: {}. Falling back to env vars.", e ); } else { info!("SecretsManager initialized - fetching secrets from Vault"); } // Initialize logger early to capture all logs with filters for noisy libraries let rust_log = { // Default log level for botserver and suppress all other crates // Note: r2d2 is set to warn to see database connection pool warnings "info,botserver=info,\ aws_sigv4=off,aws_smithy_checksums=off,aws_runtime=off,aws_smithy_http_client=off,\ aws_smithy_runtime=off,aws_smithy_runtime_api=off,aws_sdk_s3=off,aws_config=off,\ aws_credential_types=off,aws_http=off,aws_sig_auth=off,aws_types=off,\ mio=off,tokio=off,tokio_util=off,tower=off,tower_http=off,\ reqwest=off,hyper=off,hyper_util=off,h2=off,\ rustls=off,rustls_pemfile=off,tokio_rustls=off,\ tracing=off,tracing_core=off,tracing_subscriber=off,\ diesel=off,diesel_migrations=off,r2d2=warn,\ serde=off,serde_json=off,\ axum=off,axum_core=off,\ tonic=off,prost=off,\ lettre=off,imap=off,mailparse=off,\ crossterm=off,ratatui=off,\ tauri=off,tauri_runtime=off,tauri_utils=off,\ notify=off,ignore=off,walkdir=off,\ want=off,try_lock=off,futures=off,\ base64=off,bytes=off,encoding_rs=off,\ url=off,percent_encoding=off,\ ring=off,webpki=off,\ hickory_resolver=off,hickory_proto=off" .to_string() }; // Set the RUST_LOG env var if not already set std::env::set_var("RUST_LOG", &rust_log); env_logger::Builder::from_env(env_logger::Env::default()) .write_style(env_logger::WriteStyle::Always) .init(); println!( "Starting {} {}...", "General Bots".to_string(), env!("CARGO_PKG_VERSION") ); use crate::llm::local::ensure_llama_servers_running; use botserver::config::ConfigManager; let args: Vec = std::env::args().collect(); let no_ui = args.contains(&"--noui".to_string()); let no_console = args.contains(&"--noconsole".to_string()); // Configuration comes from Directory service, not .env files let (progress_tx, _progress_rx) = tokio::sync::mpsc::unbounded_channel::(); let (state_tx, _state_rx) = tokio::sync::mpsc::channel::>(1); // Handle CLI commands if args.len() > 1 { let command = &args[1]; match command.as_str() { "install" | "remove" | "list" | "status" | "start" | "stop" | "restart" | "--help" | "-h" => match package_manager::cli::run().await { Ok(_) => return Ok(()), Err(e) => { eprintln!("CLI error: {}", e); return Err(std::io::Error::new( std::io::ErrorKind::Other, format!("CLI command failed: {}", e), )); } }, _ => {} } } // Start UI thread if console is enabled (default) and not disabled by --noconsole or --noui let ui_handle: Option> = if !no_console && !no_ui { #[cfg(feature = "console")] { let progress_rx = Arc::new(tokio::sync::Mutex::new(_progress_rx)); let state_rx = Arc::new(tokio::sync::Mutex::new(_state_rx)); Some( std::thread::Builder::new() .name("ui-thread".to_string()) .spawn(move || { let mut ui = botserver::console::XtreeUI::new(); ui.set_progress_channel(progress_rx.clone()); let rt = tokio::runtime::Builder::new_current_thread() .enable_all() .build() .expect("Failed to create UI runtime"); rt.block_on(async { tokio::select! { result = async { let mut rx = state_rx.lock().await; rx.recv().await } => { if let Some(app_state) = result { ui.set_app_state(app_state); } } _ = tokio::time::sleep(tokio::time::Duration::from_secs(300)) => { eprintln!("UI initialization timeout"); } } }); if let Err(e) = ui.start_ui() { eprintln!("UI error: {}", e); } }) .expect("Failed to spawn UI thread"), ) } #[cfg(not(feature = "console"))] { if !no_console { eprintln!("Console feature not compiled. Rebuild with --features console or use --noconsole to suppress this message"); } None } } else { None }; let install_mode = if args.contains(&"--container".to_string()) { InstallMode::Container } else { InstallMode::Local }; let tenant = if let Some(idx) = args.iter().position(|a| a == "--tenant") { args.get(idx + 1).cloned() } else { None }; // Set custom stack path if provided (for testing) if let Some(idx) = args.iter().position(|a| a == "--stack-path") { if let Some(path) = args.get(idx + 1) { std::env::set_var("BOTSERVER_STACK_PATH", path); info!("Using custom stack path: {}", path); } } // Bootstrap trace!("Starting bootstrap process..."); let progress_tx_clone = progress_tx.clone(); let cfg = { progress_tx_clone .send(BootstrapProgress::StartingBootstrap) .ok(); trace!("Creating BootstrapManager..."); let mut bootstrap = BootstrapManager::new(install_mode.clone(), tenant.clone()).await; // Check if bootstrap has completed by looking for: // 1. .env with VAULT_TOKEN // 2. Vault init.json exists (actual credentials) // Both must exist for bootstrap to be considered complete let env_path = std::path::Path::new("./.env"); let vault_init_path = std::path::Path::new("./botserver-stack/conf/vault/init.json"); let bootstrap_completed = env_path.exists() && vault_init_path.exists() && { // Check if .env contains VAULT_TOKEN (not just exists) std::fs::read_to_string(env_path) .map(|content| content.contains("VAULT_TOKEN=")) .unwrap_or(false) }; let cfg = if bootstrap_completed { trace!("Services already configured, ensuring all are running..."); info!("Ensuring database and drive services are running..."); progress_tx_clone .send(BootstrapProgress::StartingComponent( "all services".to_string(), )) .ok(); trace!("Calling bootstrap.start_all()..."); // Ensure critical services are started if let Err(e) = bootstrap.ensure_services_running().await { warn!("Some services might not be running: {}", e); } bootstrap .start_all() .await .map_err(|e| std::io::Error::new(std::io::ErrorKind::Other, e))?; trace!("bootstrap.start_all() completed"); trace!("Connecting to database..."); progress_tx_clone .send(BootstrapProgress::ConnectingDatabase) .ok(); trace!("Creating database connection..."); match create_conn() { Ok(pool) => { trace!("Database connection successful, loading config from database"); AppConfig::from_database(&pool) .unwrap_or_else(|_| AppConfig::from_env().expect("Failed to load config")) } Err(e) => { trace!( "Database connection failed: {:?}, loading config from env", e ); AppConfig::from_env().expect("Failed to load config from env") } } } else { trace!(".env file not found, running bootstrap.bootstrap()..."); _ = bootstrap.bootstrap().await; trace!("bootstrap.bootstrap() completed"); progress_tx_clone .send(BootstrapProgress::StartingComponent( "all services".to_string(), )) .ok(); bootstrap .start_all() .await .map_err(|e| std::io::Error::new(std::io::ErrorKind::Other, e))?; match create_conn() { Ok(pool) => AppConfig::from_database(&pool) .unwrap_or_else(|_| AppConfig::from_env().expect("Failed to load config")), Err(_) => AppConfig::from_env().expect("Failed to load config from env"), } }; trace!("Config loaded, syncing templates to database..."); progress_tx_clone .send(BootstrapProgress::UploadingTemplates) .ok(); // First sync config.csv to database (fast, no S3 needed) if let Err(e) = bootstrap.sync_templates_to_database() { warn!("Failed to sync templates to database: {}", e); } else { trace!("Templates synced to database"); } // Then upload to drive with timeout to prevent blocking on MinIO issues match tokio::time::timeout( std::time::Duration::from_secs(30), bootstrap.upload_templates_to_drive(&cfg), ) .await { Ok(Ok(_)) => { trace!("Templates uploaded to drive successfully"); } Ok(Err(e)) => { warn!("Template drive upload error (non-blocking): {}", e); } Err(_) => { warn!("Template drive upload timed out after 30s, continuing startup..."); } } Ok::(cfg) }; trace!("Bootstrap config phase complete"); let cfg = cfg?; trace!("Reloading dotenv..."); dotenv().ok(); trace!("Creating database pool again..."); progress_tx.send(BootstrapProgress::ConnectingDatabase).ok(); let pool = match create_conn() { Ok(pool) => { // Run automatic migrations trace!("Running database migrations..."); info!("Running database migrations..."); if let Err(e) = crate::shared::utils::run_migrations(&pool) { error!("Failed to run migrations: {}", e); // Continue anyway as some migrations might have already been applied warn!("Continuing despite migration errors - database might be partially migrated"); } else { info!("Database migrations completed successfully"); } pool } Err(e) => { error!("Failed to create database pool: {}", e); progress_tx .send(BootstrapProgress::BootstrapError(format!( "Database pool creation failed: {}", e ))) .ok(); return Err(std::io::Error::new( std::io::ErrorKind::ConnectionRefused, format!("Database pool creation failed: {}", e), )); } }; // Load config from database (which now has values from config.csv) info!("Loading config from database after template sync..."); let refreshed_cfg = AppConfig::from_database(&pool).unwrap_or_else(|e| { warn!( "Failed to load config from database: {}, falling back to env", e ); AppConfig::from_env().expect("Failed to load config from env") }); let config = std::sync::Arc::new(refreshed_cfg.clone()); info!( "Server configured to listen on {}:{}", config.server.host, config.server.port ); let cache_url = "rediss://localhost:6379".to_string(); let redis_client = match redis::Client::open(cache_url.as_str()) { Ok(client) => Some(Arc::new(client)), Err(e) => { log::warn!("Failed to connect to Redis: {}", e); None } }; let web_adapter = Arc::new(WebChannelAdapter::new()); let voice_adapter = Arc::new(VoiceAdapter::new()); let drive = create_s3_operator(&config.drive) .await .expect("Failed to initialize Drive"); let session_manager = Arc::new(tokio::sync::Mutex::new(session::SessionManager::new( pool.get().unwrap(), redis_client.clone(), ))); // Create default Zitadel config (can be overridden with env vars) #[cfg(feature = "directory")] let zitadel_config = botserver::directory::client::ZitadelConfig { issuer_url: "https://localhost:8080".to_string(), issuer: "https://localhost:8080".to_string(), client_id: "client_id".to_string(), client_secret: "client_secret".to_string(), redirect_uri: "https://localhost:8080/callback".to_string(), project_id: "default".to_string(), api_url: "https://localhost:8080".to_string(), service_account_key: None, }; #[cfg(feature = "directory")] let auth_service = Arc::new(tokio::sync::Mutex::new( botserver::directory::AuthService::new(zitadel_config) .await .unwrap(), )); let config_manager = ConfigManager::new(pool.clone()); let mut bot_conn = pool.get().expect("Failed to get database connection"); let (default_bot_id, default_bot_name) = crate::bot::get_default_bot(&mut bot_conn); info!( "Using default bot: {} (id: {})", default_bot_name, default_bot_id ); let llm_url = config_manager .get_config(&default_bot_id, "llm-url", Some("http://localhost:8081")) .unwrap_or_else(|_| "http://localhost:8081".to_string()); info!("LLM URL: {}", llm_url); // Create base LLM provider let base_llm_provider = Arc::new(botserver::llm::OpenAIClient::new( "empty".to_string(), Some(llm_url.clone()), )) as Arc; // Wrap with cache if redis is available let llm_provider: Arc = if let Some(ref cache) = redis_client { // Set up embedding service for semantic matching let embedding_url = config_manager .get_config( &default_bot_id, "embedding-url", Some("http://localhost:8082"), ) .unwrap_or_else(|_| "http://localhost:8082".to_string()); let embedding_model = config_manager .get_config(&default_bot_id, "embedding-model", Some("all-MiniLM-L6-v2")) .unwrap_or_else(|_| "all-MiniLM-L6-v2".to_string()); info!("Embedding URL: {}", embedding_url); info!("Embedding Model: {}", embedding_model); let embedding_service = Some(Arc::new(botserver::llm::cache::LocalEmbeddingService::new( embedding_url, embedding_model, )) as Arc); // Create cache config let cache_config = botserver::llm::cache::CacheConfig { ttl: 3600, // 1 hour TTL semantic_matching: true, similarity_threshold: 0.85, // 85% similarity threshold max_similarity_checks: 100, key_prefix: "llm_cache".to_string(), }; Arc::new(botserver::llm::cache::CachedLLMProvider::with_db_pool( base_llm_provider, cache.clone(), cache_config, embedding_service, pool.clone(), )) } else { base_llm_provider }; // Initialize Knowledge Base Manager let kb_manager = Arc::new(botserver::core::kb::KnowledgeBaseManager::new("work")); // Initialize TaskEngine let task_engine = Arc::new(botserver::tasks::TaskEngine::new(pool.clone())); // Initialize MetricsCollector let metrics_collector = botserver::core::shared::analytics::MetricsCollector::new(); // Initialize TaskScheduler (will be set after AppState creation) let task_scheduler = None; // Create broadcast channel for attendant notifications (human handoff) let (attendant_tx, _attendant_rx) = tokio::sync::broadcast::channel::< botserver::core::shared::state::AttendantNotification, >(1000); let app_state = Arc::new(AppState { drive: Some(drive.clone()), s3_client: Some(drive), config: Some(cfg.clone()), conn: pool.clone(), database_url: crate::shared::utils::get_database_url_sync().unwrap_or_default(), bucket_name: "default.gbai".to_string(), cache: redis_client.clone(), session_manager: session_manager.clone(), metrics_collector, task_scheduler, llm_provider: llm_provider.clone(), #[cfg(feature = "directory")] auth_service: auth_service.clone(), channels: Arc::new(tokio::sync::Mutex::new({ let mut map = HashMap::new(); map.insert( "web".to_string(), web_adapter.clone() as Arc, ); map })), response_channels: Arc::new(tokio::sync::Mutex::new(HashMap::new())), web_adapter: web_adapter.clone(), voice_adapter: voice_adapter.clone(), kb_manager: Some(kb_manager.clone()), task_engine: task_engine, extensions: botserver::core::shared::state::Extensions::new(), attendant_broadcast: Some(attendant_tx), }); // Initialize TaskScheduler with the AppState let task_scheduler = Arc::new(botserver::tasks::scheduler::TaskScheduler::new( app_state.clone(), )); // Update AppState with the task scheduler using Arc::get_mut (requires mutable reference) // Since we can't mutate Arc directly, we'll need to use unsafe or recreate AppState // For now, we'll start the scheduler without updating the field task_scheduler.start().await; // Start website crawler service if let Err(e) = botserver::core::kb::ensure_crawler_service_running(app_state.clone()).await { log::warn!("Failed to start website crawler service: {}", e); } state_tx.send(app_state.clone()).await.ok(); progress_tx.send(BootstrapProgress::BootstrapComplete).ok(); info!( "Starting HTTP server on {}:{}", config.server.host, config.server.port ); let worker_count = std::thread::available_parallelism() .map(|n| n.get()) .unwrap_or(4); // Initialize automation service for episodic memory let _automation_service = botserver::core::automation::AutomationService::new(app_state.clone()); info!("Automation service initialized with episodic memory scheduler"); // Mount bots let bot_orchestrator = BotOrchestrator::new(app_state.clone()); tokio::spawn(async move { if let Err(e) = bot_orchestrator.mount_all_bots().await { error!("Failed to mount bots: {}", e); } }); // Start automation service let automation_state = app_state.clone(); tokio::spawn(async move { let automation = AutomationService::new(automation_state); automation.spawn().await.ok(); }); // Start LLM servers let app_state_for_llm = app_state.clone(); tokio::spawn(async move { if let Err(e) = ensure_llama_servers_running(app_state_for_llm).await { error!("Failed to start LLM servers: {}", e); } }); trace!("Initial data setup task spawned"); // Run HTTP server directly trace!("Starting HTTP server on port {}...", config.server.port); run_axum_server(app_state, config.server.port, worker_count).await?; // Wait for UI thread to finish if it was started if let Some(handle) = ui_handle { handle.join().ok(); } Ok(()) }