2019-11-16 20:48:24 +02:00
|
|
|
package wrapper
|
2015-12-21 01:50:16 +02:00
|
|
|
|
|
|
|
import (
|
2018-03-03 13:53:52 +02:00
|
|
|
"context"
|
2020-02-07 22:58:03 +02:00
|
|
|
"strings"
|
2018-03-03 13:53:52 +02:00
|
|
|
|
2021-10-12 13:55:53 +02:00
|
|
|
"go-micro.dev/v4/auth"
|
|
|
|
"go-micro.dev/v4/client"
|
|
|
|
"go-micro.dev/v4/debug/stats"
|
|
|
|
"go-micro.dev/v4/debug/trace"
|
|
|
|
"go-micro.dev/v4/metadata"
|
|
|
|
"go-micro.dev/v4/server"
|
2022-10-20 13:00:50 +02:00
|
|
|
"go-micro.dev/v4/transport/headers"
|
2015-12-21 01:50:16 +02:00
|
|
|
)
|
|
|
|
|
2020-04-29 16:11:06 +02:00
|
|
|
type fromServiceWrapper struct {
|
2015-12-21 01:50:16 +02:00
|
|
|
client.Client
|
2020-02-26 00:15:44 +02:00
|
|
|
|
|
|
|
// headers to inject
|
2016-01-28 19:55:28 +02:00
|
|
|
headers metadata.Metadata
|
2015-12-21 01:50:16 +02:00
|
|
|
}
|
|
|
|
|
2020-04-29 16:11:06 +02:00
|
|
|
func (f *fromServiceWrapper) setHeaders(ctx context.Context) context.Context {
|
2020-04-08 11:50:19 +02:00
|
|
|
// don't overwrite keys
|
2020-04-29 16:11:06 +02:00
|
|
|
return metadata.MergeContext(ctx, f.headers, false)
|
2015-12-21 01:50:16 +02:00
|
|
|
}
|
|
|
|
|
2020-04-29 16:11:06 +02:00
|
|
|
func (f *fromServiceWrapper) Call(ctx context.Context, req client.Request, rsp interface{}, opts ...client.CallOption) error {
|
|
|
|
ctx = f.setHeaders(ctx)
|
|
|
|
return f.Client.Call(ctx, req, rsp, opts...)
|
2015-12-21 01:50:16 +02:00
|
|
|
}
|
|
|
|
|
2020-04-29 16:11:06 +02:00
|
|
|
func (f *fromServiceWrapper) Stream(ctx context.Context, req client.Request, opts ...client.CallOption) (client.Stream, error) {
|
|
|
|
ctx = f.setHeaders(ctx)
|
|
|
|
return f.Client.Stream(ctx, req, opts...)
|
2015-12-21 01:50:16 +02:00
|
|
|
}
|
2019-11-16 20:48:24 +02:00
|
|
|
|
2020-04-29 16:11:06 +02:00
|
|
|
func (f *fromServiceWrapper) Publish(ctx context.Context, p client.Message, opts ...client.PublishOption) error {
|
|
|
|
ctx = f.setHeaders(ctx)
|
|
|
|
return f.Client.Publish(ctx, p, opts...)
|
2020-01-24 23:58:29 +02:00
|
|
|
}
|
|
|
|
|
2022-09-30 16:27:07 +02:00
|
|
|
// FromService wraps a client to inject service and auth metadata.
|
2020-04-29 16:11:06 +02:00
|
|
|
func FromService(name string, c client.Client) client.Client {
|
|
|
|
return &fromServiceWrapper{
|
2019-11-16 20:52:27 +02:00
|
|
|
c,
|
|
|
|
metadata.Metadata{
|
2022-10-20 13:00:50 +02:00
|
|
|
headers.Prefix + "From-Service": name,
|
2019-11-16 20:52:27 +02:00
|
|
|
},
|
|
|
|
}
|
2019-11-16 20:48:24 +02:00
|
|
|
}
|
2019-12-18 20:36:42 +02:00
|
|
|
|
2022-09-30 16:27:07 +02:00
|
|
|
// HandlerStats wraps a server handler to generate request/error stats.
|
2019-12-18 20:36:42 +02:00
|
|
|
func HandlerStats(stats stats.Stats) server.HandlerWrapper {
|
|
|
|
// return a handler wrapper
|
|
|
|
return func(h server.HandlerFunc) server.HandlerFunc {
|
|
|
|
// return a function that returns a function
|
|
|
|
return func(ctx context.Context, req server.Request, rsp interface{}) error {
|
|
|
|
// execute the handler
|
|
|
|
err := h(ctx, req, rsp)
|
|
|
|
// record the stats
|
|
|
|
stats.Record(err)
|
|
|
|
// return the error
|
|
|
|
return err
|
|
|
|
}
|
|
|
|
}
|
|
|
|
}
|
2020-01-24 23:58:29 +02:00
|
|
|
|
2020-04-29 16:11:06 +02:00
|
|
|
type traceWrapper struct {
|
|
|
|
client.Client
|
|
|
|
|
|
|
|
name string
|
|
|
|
trace trace.Tracer
|
|
|
|
}
|
|
|
|
|
|
|
|
func (c *traceWrapper) Call(ctx context.Context, req client.Request, rsp interface{}, opts ...client.CallOption) error {
|
|
|
|
newCtx, s := c.trace.Start(ctx, req.Service()+"."+req.Endpoint())
|
|
|
|
|
|
|
|
s.Type = trace.SpanTypeRequestOutbound
|
|
|
|
err := c.Client.Call(newCtx, req, rsp, opts...)
|
|
|
|
if err != nil {
|
|
|
|
s.Metadata["error"] = err.Error()
|
|
|
|
}
|
|
|
|
|
|
|
|
// finish the trace
|
|
|
|
c.trace.Finish(s)
|
|
|
|
|
|
|
|
return err
|
|
|
|
}
|
|
|
|
|
2022-09-30 16:27:07 +02:00
|
|
|
// TraceCall is a call tracing wrapper.
|
2020-01-29 17:45:11 +02:00
|
|
|
func TraceCall(name string, t trace.Tracer, c client.Client) client.Client {
|
2020-01-24 23:58:29 +02:00
|
|
|
return &traceWrapper{
|
|
|
|
name: name,
|
|
|
|
trace: t,
|
|
|
|
Client: c,
|
|
|
|
}
|
|
|
|
}
|
|
|
|
|
2022-09-30 16:27:07 +02:00
|
|
|
// TraceHandler wraps a server handler to perform tracing.
|
2020-01-29 17:45:11 +02:00
|
|
|
func TraceHandler(t trace.Tracer) server.HandlerWrapper {
|
2020-01-24 23:58:29 +02:00
|
|
|
// return a handler wrapper
|
|
|
|
return func(h server.HandlerFunc) server.HandlerFunc {
|
|
|
|
// return a function that returns a function
|
|
|
|
return func(ctx context.Context, req server.Request, rsp interface{}) error {
|
2020-02-07 22:58:03 +02:00
|
|
|
// don't store traces for debug
|
|
|
|
if strings.HasPrefix(req.Endpoint(), "Debug.") {
|
|
|
|
return h(ctx, req, rsp)
|
|
|
|
}
|
|
|
|
|
2020-01-24 23:58:29 +02:00
|
|
|
// get the span
|
|
|
|
newCtx, s := t.Start(ctx, req.Service()+"."+req.Endpoint())
|
2020-02-12 12:57:17 +02:00
|
|
|
s.Type = trace.SpanTypeRequestInbound
|
2020-01-24 23:58:29 +02:00
|
|
|
|
|
|
|
err := h(newCtx, req, rsp)
|
|
|
|
if err != nil {
|
|
|
|
s.Metadata["error"] = err.Error()
|
|
|
|
}
|
|
|
|
|
|
|
|
// finish
|
|
|
|
t.Finish(s)
|
|
|
|
|
|
|
|
return err
|
|
|
|
}
|
|
|
|
}
|
|
|
|
}
|
2020-02-10 10:26:28 +02:00
|
|
|
|
2021-09-07 08:13:56 +02:00
|
|
|
func AuthCall(a func() auth.Auth, c client.Client) client.Client {
|
2021-09-24 10:08:39 +02:00
|
|
|
return &authWrapper{Client: c, auth: a}
|
2021-09-07 08:13:56 +02:00
|
|
|
}
|
|
|
|
|
2020-04-29 16:11:06 +02:00
|
|
|
type authWrapper struct {
|
|
|
|
client.Client
|
|
|
|
auth func() auth.Auth
|
|
|
|
}
|
|
|
|
|
|
|
|
func (a *authWrapper) Call(ctx context.Context, req client.Request, rsp interface{}, opts ...client.CallOption) error {
|
|
|
|
// parse the options
|
|
|
|
var options client.CallOptions
|
|
|
|
for _, o := range opts {
|
|
|
|
o(&options)
|
|
|
|
}
|
|
|
|
|
|
|
|
// check to see if the authorization header has already been set.
|
|
|
|
// We dont't override the header unless the ServiceToken option has
|
2020-04-29 16:15:38 +02:00
|
|
|
// been specified or the header wasn't provided
|
2020-04-29 16:11:06 +02:00
|
|
|
if _, ok := metadata.Get(ctx, "Authorization"); ok && !options.ServiceToken {
|
|
|
|
return a.Client.Call(ctx, req, rsp, opts...)
|
|
|
|
}
|
|
|
|
|
|
|
|
// if auth is nil we won't be able to get an access token, so we execute
|
|
|
|
// the request without one.
|
|
|
|
aa := a.auth()
|
2020-05-13 16:13:23 +02:00
|
|
|
if aa == nil {
|
2020-04-29 16:11:06 +02:00
|
|
|
return a.Client.Call(ctx, req, rsp, opts...)
|
|
|
|
}
|
|
|
|
|
2020-05-21 12:35:07 +02:00
|
|
|
// set the namespace header if it has not been set (e.g. on a service to service request)
|
2022-10-20 13:00:50 +02:00
|
|
|
if _, ok := metadata.Get(ctx, headers.Namespace); !ok {
|
|
|
|
ctx = metadata.Set(ctx, headers.Namespace, aa.Options().Namespace)
|
2020-05-21 12:35:07 +02:00
|
|
|
}
|
|
|
|
|
2020-04-29 16:11:06 +02:00
|
|
|
// check to see if we have a valid access token
|
|
|
|
aaOpts := aa.Options()
|
2020-05-21 12:35:07 +02:00
|
|
|
if aaOpts.Token != nil && !aaOpts.Token.Expired() {
|
2020-05-14 12:06:22 +02:00
|
|
|
ctx = metadata.Set(ctx, "Authorization", auth.BearerScheme+aaOpts.Token.AccessToken)
|
2020-05-13 19:17:04 +02:00
|
|
|
return a.Client.Call(ctx, req, rsp, opts...)
|
|
|
|
}
|
|
|
|
|
2020-05-13 14:13:11 +02:00
|
|
|
// call without an auth token
|
|
|
|
return a.Client.Call(ctx, req, rsp, opts...)
|
2020-04-29 16:11:06 +02:00
|
|
|
}
|