1
0
mirror of https://github.com/go-micro/go-micro.git synced 2024-12-18 08:26:38 +02:00
go-micro/util/wrapper/wrapper.go

286 lines
8.1 KiB
Go
Raw Normal View History

package wrapper
2015-12-21 01:50:16 +02:00
import (
2018-03-03 13:53:52 +02:00
"context"
2020-04-29 16:27:18 +02:00
"fmt"
2020-02-07 22:58:03 +02:00
"strings"
2020-04-29 16:11:06 +02:00
"time"
2018-03-03 13:53:52 +02:00
"github.com/micro/go-micro/v2/auth"
"github.com/micro/go-micro/v2/client"
"github.com/micro/go-micro/v2/debug/stats"
"github.com/micro/go-micro/v2/debug/trace"
"github.com/micro/go-micro/v2/errors"
"github.com/micro/go-micro/v2/metadata"
"github.com/micro/go-micro/v2/server"
2020-04-29 16:11:06 +02:00
"github.com/micro/go-micro/v2/util/config"
2015-12-21 01:50:16 +02:00
)
2020-04-29 16:11:06 +02:00
type fromServiceWrapper struct {
2015-12-21 01:50:16 +02:00
client.Client
// headers to inject
2016-01-28 19:55:28 +02:00
headers metadata.Metadata
2015-12-21 01:50:16 +02:00
}
var (
HeaderPrefix = "Micro-"
)
2020-04-29 16:11:06 +02:00
func (f *fromServiceWrapper) setHeaders(ctx context.Context) context.Context {
// don't overwrite keys
2020-04-29 16:11:06 +02:00
return metadata.MergeContext(ctx, f.headers, false)
2015-12-21 01:50:16 +02:00
}
2020-04-29 16:11:06 +02:00
func (f *fromServiceWrapper) Call(ctx context.Context, req client.Request, rsp interface{}, opts ...client.CallOption) error {
ctx = f.setHeaders(ctx)
return f.Client.Call(ctx, req, rsp, opts...)
2015-12-21 01:50:16 +02:00
}
2020-04-29 16:11:06 +02:00
func (f *fromServiceWrapper) Stream(ctx context.Context, req client.Request, opts ...client.CallOption) (client.Stream, error) {
ctx = f.setHeaders(ctx)
return f.Client.Stream(ctx, req, opts...)
2015-12-21 01:50:16 +02:00
}
2020-04-29 16:11:06 +02:00
func (f *fromServiceWrapper) Publish(ctx context.Context, p client.Message, opts ...client.PublishOption) error {
ctx = f.setHeaders(ctx)
return f.Client.Publish(ctx, p, opts...)
2020-01-24 23:58:29 +02:00
}
// FromService wraps a client to inject service and auth metadata
2020-04-29 16:11:06 +02:00
func FromService(name string, c client.Client) client.Client {
return &fromServiceWrapper{
2019-11-16 20:52:27 +02:00
c,
metadata.Metadata{
HeaderPrefix + "From-Service": name,
},
}
}
2019-12-18 20:36:42 +02:00
// HandlerStats wraps a server handler to generate request/error stats
func HandlerStats(stats stats.Stats) server.HandlerWrapper {
// return a handler wrapper
return func(h server.HandlerFunc) server.HandlerFunc {
// return a function that returns a function
return func(ctx context.Context, req server.Request, rsp interface{}) error {
// execute the handler
err := h(ctx, req, rsp)
// record the stats
stats.Record(err)
// return the error
return err
}
}
}
2020-01-24 23:58:29 +02:00
2020-04-29 16:11:06 +02:00
type traceWrapper struct {
client.Client
name string
trace trace.Tracer
}
func (c *traceWrapper) Call(ctx context.Context, req client.Request, rsp interface{}, opts ...client.CallOption) error {
newCtx, s := c.trace.Start(ctx, req.Service()+"."+req.Endpoint())
s.Type = trace.SpanTypeRequestOutbound
err := c.Client.Call(newCtx, req, rsp, opts...)
if err != nil {
s.Metadata["error"] = err.Error()
}
// finish the trace
c.trace.Finish(s)
return err
}
2020-01-24 23:58:29 +02:00
// TraceCall is a call tracing wrapper
2020-01-29 17:45:11 +02:00
func TraceCall(name string, t trace.Tracer, c client.Client) client.Client {
2020-01-24 23:58:29 +02:00
return &traceWrapper{
name: name,
trace: t,
Client: c,
}
}
// TraceHandler wraps a server handler to perform tracing
2020-01-29 17:45:11 +02:00
func TraceHandler(t trace.Tracer) server.HandlerWrapper {
2020-01-24 23:58:29 +02:00
// return a handler wrapper
return func(h server.HandlerFunc) server.HandlerFunc {
// return a function that returns a function
return func(ctx context.Context, req server.Request, rsp interface{}) error {
2020-02-07 22:58:03 +02:00
// don't store traces for debug
if strings.HasPrefix(req.Endpoint(), "Debug.") {
return h(ctx, req, rsp)
}
2020-01-24 23:58:29 +02:00
// get the span
newCtx, s := t.Start(ctx, req.Service()+"."+req.Endpoint())
s.Type = trace.SpanTypeRequestInbound
2020-01-24 23:58:29 +02:00
err := h(newCtx, req, rsp)
if err != nil {
s.Metadata["error"] = err.Error()
}
// finish
t.Finish(s)
return err
}
}
}
2020-04-29 16:11:06 +02:00
type authWrapper struct {
client.Client
name string
2020-04-29 16:27:18 +02:00
id string
2020-04-29 16:11:06 +02:00
auth func() auth.Auth
}
func (a *authWrapper) Call(ctx context.Context, req client.Request, rsp interface{}, opts ...client.CallOption) error {
// parse the options
var options client.CallOptions
for _, o := range opts {
o(&options)
}
// check to see if the authorization header has already been set.
// We dont't override the header unless the ServiceToken option has
2020-04-29 16:15:38 +02:00
// been specified or the header wasn't provided
2020-04-29 16:11:06 +02:00
if _, ok := metadata.Get(ctx, "Authorization"); ok && !options.ServiceToken {
return a.Client.Call(ctx, req, rsp, opts...)
}
// if auth is nil we won't be able to get an access token, so we execute
// the request without one.
aa := a.auth()
if a == nil {
return a.Client.Call(ctx, req, rsp, opts...)
}
2020-04-29 16:15:38 +02:00
// performs the call with the authorization token provided
2020-04-29 16:11:06 +02:00
callWithToken := func(token string) error {
ctx := metadata.Set(ctx, "Authorization", auth.BearerScheme+token)
return a.Client.Call(ctx, req, rsp, opts...)
}
// check to see if we have a valid access token
aaOpts := aa.Options()
if aaOpts.Token != nil && aaOpts.Token.Expiry.Unix() > time.Now().Unix() {
return callWithToken(aaOpts.Token.AccessToken)
}
// if we have a refresh token we can use this to generate another access token
if aaOpts.Token != nil {
tok, err := aa.Token(auth.WithToken(aaOpts.Token.RefreshToken))
if err != nil {
return err
}
aa.Init(auth.ClientToken(tok))
return callWithToken(tok.AccessToken)
}
2020-04-29 16:15:38 +02:00
// if we have credentials we can generate a new token for the account
2020-04-29 16:11:06 +02:00
if len(aaOpts.ID) > 0 && len(aaOpts.Secret) > 0 {
tok, err := aa.Token(auth.WithCredentials(aaOpts.ID, aaOpts.Secret))
if err != nil {
return err
}
aa.Init(auth.ClientToken(tok))
return callWithToken(tok.AccessToken)
}
2020-04-29 16:15:38 +02:00
// check to see if a token was provided in config, this is normally used for
// setting the token when calling via the cli
2020-04-29 16:11:06 +02:00
if token, err := config.Get("micro", "auth", "token"); err == nil && len(token) > 0 {
return callWithToken(token)
}
// determine the type of service from the name. we do this so we can allocate
// different roles depending on the type of services. e.g. we don't want web
// services talking directly to the runtime. TODO: find a better way to determine
// the type of service
serviceType := "service"
if strings.Contains(a.name, "api") {
serviceType = "api"
} else if strings.Contains(a.name, "web") {
serviceType = "web"
}
// generate a new auth account for the service
2020-04-29 16:27:18 +02:00
name := fmt.Sprintf("%v-%v", a.name, a.id)
acc, err := aa.Generate(name, auth.WithNamespace(aaOpts.Namespace), auth.WithRoles(serviceType))
2020-04-29 16:11:06 +02:00
if err != nil {
return err
}
token, err := aa.Token(auth.WithCredentials(acc.ID, acc.Secret))
if err != nil {
return err
}
aa.Init(auth.ClientToken(token))
// use the token to execute the request
return callWithToken(token.AccessToken)
}
// AuthClient wraps requests with the auth header
2020-04-29 16:27:18 +02:00
func AuthClient(name string, id string, auth func() auth.Auth, c client.Client) client.Client {
return &authWrapper{c, name, id, auth}
2020-04-29 16:11:06 +02:00
}
// AuthHandler wraps a server handler to perform auth
2020-03-25 22:59:37 +02:00
func AuthHandler(fn func() auth.Auth) server.HandlerWrapper {
return func(h server.HandlerFunc) server.HandlerFunc {
return func(ctx context.Context, req server.Request, rsp interface{}) error {
// get the auth.Auth interface
a := fn()
// Check for debug endpoints which should be excluded from auth
if strings.HasPrefix(req.Endpoint(), "Debug.") {
return h(ctx, req, rsp)
}
// Extract the token if present. Note: if noop is being used
// then the token can be blank without erroring
var token string
if header, ok := metadata.Get(ctx, "Authorization"); ok {
// Ensure the correct scheme is being used
if !strings.HasPrefix(header, auth.BearerScheme) {
2020-04-02 19:41:06 +02:00
return errors.Unauthorized(req.Service(), "invalid authorization header. expected Bearer schema")
}
token = header[len(auth.BearerScheme):]
}
// Inspect the token and get the account
account, err := a.Inspect(token)
if err != nil {
2020-04-14 10:14:07 +02:00
account = &auth.Account{Namespace: a.Options().Namespace}
2020-04-02 19:41:06 +02:00
}
// construct the resource
res := &auth.Resource{
2020-04-07 17:24:51 +02:00
Type: "service",
Name: req.Service(),
Endpoint: req.Endpoint(),
}
// Verify the caller has access to the resource
2020-04-02 19:41:06 +02:00
err = a.Verify(account, res)
if err != nil && len(account.ID) > 0 {
2020-04-02 19:41:06 +02:00
return errors.Forbidden(req.Service(), "Forbidden call made to %v:%v by %v", req.Service(), req.Endpoint(), account.ID)
} else if err != nil {
2020-04-02 19:41:06 +02:00
return errors.Unauthorized(req.Service(), "Unauthorised call made to %v:%v", req.Service(), req.Endpoint())
2020-03-04 11:54:52 +02:00
}
// There is an account, set it in the context
ctx = auth.ContextWithAccount(ctx, account)
2020-03-04 11:54:52 +02:00
// The user is authorised, allow the call
return h(ctx, req, rsp)
}
}
}