mirror of
https://github.com/mainflux/mainflux.git
synced 2025-04-29 13:49:28 +08:00
233 lines
6.3 KiB
Go
233 lines
6.3 KiB
Go
![]() |
// Copyright (c) Mainflux
|
||
|
// SPDX-License-Identifier: Apache-2.0
|
||
|
|
||
|
package main
|
||
|
|
||
|
import (
|
||
|
"context"
|
||
|
"fmt"
|
||
|
"io"
|
||
|
"io/ioutil"
|
||
|
"log"
|
||
|
"net/http"
|
||
|
"os"
|
||
|
"strconv"
|
||
|
"time"
|
||
|
|
||
|
kitprometheus "github.com/go-kit/kit/metrics/prometheus"
|
||
|
"github.com/mainflux/mainflux"
|
||
|
"golang.org/x/sync/errgroup"
|
||
|
|
||
|
logger "github.com/mainflux/mainflux/logger"
|
||
|
"github.com/mainflux/mainflux/pkg/errors"
|
||
|
"github.com/mainflux/mainflux/pkg/messaging"
|
||
|
"github.com/mainflux/mainflux/pkg/messaging/brokers"
|
||
|
thingsapi "github.com/mainflux/mainflux/things/api/auth/grpc"
|
||
|
adapter "github.com/mainflux/mainflux/ws"
|
||
|
"github.com/mainflux/mainflux/ws/api"
|
||
|
opentracing "github.com/opentracing/opentracing-go"
|
||
|
stdprometheus "github.com/prometheus/client_golang/prometheus"
|
||
|
jconfig "github.com/uber/jaeger-client-go/config"
|
||
|
"google.golang.org/grpc"
|
||
|
"google.golang.org/grpc/credentials"
|
||
|
"google.golang.org/grpc/credentials/insecure"
|
||
|
)
|
||
|
|
||
|
const (
|
||
|
stopWaitTime = 5 * time.Second
|
||
|
|
||
|
defPort = "8190"
|
||
|
defBrokerURL = "nats://localhost:4222"
|
||
|
defLogLevel = "error"
|
||
|
defClientTLS = "false"
|
||
|
defCACerts = ""
|
||
|
defJaegerURL = ""
|
||
|
defThingsAuthURL = "localhost:8183"
|
||
|
defThingsAuthTimeout = "1s"
|
||
|
|
||
|
envPort = "MF_WS_ADAPTER_PORT"
|
||
|
envBrokerURL = "MF_BROKER_URL"
|
||
|
envLogLevel = "MF_WS_ADAPTER_LOG_LEVEL"
|
||
|
envClientTLS = "MF_WS_ADAPTER_CLIENT_TLS"
|
||
|
envCACerts = "MF_WS_ADAPTER_CA_CERTS"
|
||
|
envJaegerURL = "MF_JAEGER_URL"
|
||
|
envThingsAuthURL = "MF_THINGS_AUTH_GRPC_URL"
|
||
|
envThingsTimeout = "MF_THINGS_AUTH_GRPC_TIMEOUT"
|
||
|
)
|
||
|
|
||
|
type config struct {
|
||
|
port string
|
||
|
brokerURL string
|
||
|
logLevel string
|
||
|
clientTLS bool
|
||
|
caCerts string
|
||
|
jaegerURL string
|
||
|
thingsAuthURL string
|
||
|
thingsAuthTimeout time.Duration
|
||
|
}
|
||
|
|
||
|
func main() {
|
||
|
cfg := loadConfig()
|
||
|
|
||
|
ctx, cancel := context.WithCancel(context.Background())
|
||
|
g, ctx := errgroup.WithContext(ctx)
|
||
|
|
||
|
logger, err := logger.New(os.Stdout, cfg.logLevel)
|
||
|
if err != nil {
|
||
|
log.Fatalf(err.Error())
|
||
|
}
|
||
|
|
||
|
conn := connectToThings(cfg, logger)
|
||
|
defer conn.Close()
|
||
|
|
||
|
thingsTracer, thingsCloser := initJaeger("things", cfg.jaegerURL, logger)
|
||
|
defer thingsCloser.Close()
|
||
|
|
||
|
tc := thingsapi.NewClient(conn, thingsTracer, cfg.thingsAuthTimeout)
|
||
|
|
||
|
nps, err := brokers.NewPubSub(cfg.brokerURL, "", logger)
|
||
|
if err != nil {
|
||
|
logger.Error(fmt.Sprintf("Failed to connect to message broker: %s", err))
|
||
|
os.Exit(1)
|
||
|
}
|
||
|
defer nps.Close()
|
||
|
|
||
|
svc := newService(tc, nps, logger)
|
||
|
|
||
|
g.Go(func() error {
|
||
|
return startWSServer(ctx, cfg, svc, logger)
|
||
|
})
|
||
|
|
||
|
g.Go(func() error {
|
||
|
if sig := errors.SignalHandler(ctx); sig != nil {
|
||
|
cancel()
|
||
|
logger.Info(fmt.Sprintf("WS adapter service shutdown by signal: %s", sig))
|
||
|
}
|
||
|
|
||
|
return nil
|
||
|
})
|
||
|
|
||
|
if err := g.Wait(); err != nil {
|
||
|
logger.Error(fmt.Sprintf("WS adapter service terminated: %s", err))
|
||
|
}
|
||
|
}
|
||
|
|
||
|
func loadConfig() config {
|
||
|
tls, err := strconv.ParseBool(mainflux.Env(envClientTLS, defClientTLS))
|
||
|
if err != nil {
|
||
|
log.Fatalf("Invalid value passed for %s\n", envClientTLS)
|
||
|
}
|
||
|
|
||
|
authTimeout, err := time.ParseDuration(mainflux.Env(envThingsTimeout, defThingsAuthTimeout))
|
||
|
if err != nil {
|
||
|
log.Fatalf("Invalid %s value: %s", envThingsTimeout, err.Error())
|
||
|
}
|
||
|
|
||
|
return config{
|
||
|
brokerURL: mainflux.Env(envBrokerURL, defBrokerURL),
|
||
|
port: mainflux.Env(envPort, defPort),
|
||
|
logLevel: mainflux.Env(envLogLevel, defLogLevel),
|
||
|
clientTLS: tls,
|
||
|
caCerts: mainflux.Env(envCACerts, defCACerts),
|
||
|
jaegerURL: mainflux.Env(envJaegerURL, defJaegerURL),
|
||
|
thingsAuthURL: mainflux.Env(envThingsAuthURL, defThingsAuthURL),
|
||
|
thingsAuthTimeout: authTimeout,
|
||
|
}
|
||
|
}
|
||
|
|
||
|
func connectToThings(cfg config, logger logger.Logger) *grpc.ClientConn {
|
||
|
var opts []grpc.DialOption
|
||
|
if cfg.clientTLS {
|
||
|
if cfg.caCerts != "" {
|
||
|
tpc, err := credentials.NewClientTLSFromFile(cfg.caCerts, "")
|
||
|
if err != nil {
|
||
|
logger.Error(fmt.Sprintf("Failed to load certs: %s", err))
|
||
|
os.Exit(1)
|
||
|
}
|
||
|
opts = append(opts, grpc.WithTransportCredentials(tpc))
|
||
|
}
|
||
|
} else {
|
||
|
logger.Info("gRPC communication is not encrypted")
|
||
|
opts = append(opts, grpc.WithTransportCredentials(insecure.NewCredentials()))
|
||
|
}
|
||
|
|
||
|
conn, err := grpc.Dial(cfg.thingsAuthURL, opts...)
|
||
|
if err != nil {
|
||
|
logger.Error(fmt.Sprintf("Failed to connect to things service: %s", err))
|
||
|
os.Exit(1)
|
||
|
}
|
||
|
|
||
|
return conn
|
||
|
}
|
||
|
|
||
|
func initJaeger(svcName, url string, logger logger.Logger) (opentracing.Tracer, io.Closer) {
|
||
|
if url == "" {
|
||
|
return opentracing.NoopTracer{}, ioutil.NopCloser(nil)
|
||
|
}
|
||
|
|
||
|
tracer, closer, err := jconfig.Configuration{
|
||
|
ServiceName: svcName,
|
||
|
Sampler: &jconfig.SamplerConfig{
|
||
|
Type: "const",
|
||
|
Param: 1,
|
||
|
},
|
||
|
Reporter: &jconfig.ReporterConfig{
|
||
|
LocalAgentHostPort: url,
|
||
|
LogSpans: true,
|
||
|
},
|
||
|
}.NewTracer()
|
||
|
if err != nil {
|
||
|
logger.Error(fmt.Sprintf("Failed to init Jaeger client: %s", err))
|
||
|
os.Exit(1)
|
||
|
}
|
||
|
|
||
|
return tracer, closer
|
||
|
}
|
||
|
|
||
|
func newService(tc mainflux.ThingsServiceClient, nps messaging.PubSub, logger logger.Logger) adapter.Service {
|
||
|
svc := adapter.New(tc, nps)
|
||
|
svc = api.LoggingMiddleware(svc, logger)
|
||
|
svc = api.MetricsMiddleware(
|
||
|
svc,
|
||
|
kitprometheus.NewCounterFrom(stdprometheus.CounterOpts{
|
||
|
Namespace: "ws_adapter",
|
||
|
Subsystem: "api",
|
||
|
Name: "reqeust_count",
|
||
|
Help: "Number of requests received",
|
||
|
}, []string{"method"}),
|
||
|
kitprometheus.NewSummaryFrom(stdprometheus.SummaryOpts{
|
||
|
Namespace: "ws_adapter",
|
||
|
Subsystem: "api",
|
||
|
Name: "request_latency_microsecond",
|
||
|
Help: "Total duration of requests in microseconds",
|
||
|
}, []string{"method"}),
|
||
|
)
|
||
|
|
||
|
return svc
|
||
|
}
|
||
|
|
||
|
func startWSServer(ctx context.Context, cfg config, svc adapter.Service, l logger.Logger) error {
|
||
|
p := fmt.Sprintf(":%s", cfg.port)
|
||
|
errCh := make(chan error, 2)
|
||
|
server := &http.Server{Addr: p, Handler: api.MakeHandler(svc, l)}
|
||
|
l.Info(fmt.Sprintf("WS adapter service started, exposed port %s", cfg.port))
|
||
|
|
||
|
go func() {
|
||
|
errCh <- server.ListenAndServe()
|
||
|
}()
|
||
|
|
||
|
select {
|
||
|
case <-ctx.Done():
|
||
|
ctxShutdown, cancelShutdown := context.WithTimeout(context.Background(), stopWaitTime)
|
||
|
defer cancelShutdown()
|
||
|
if err := server.Shutdown(ctxShutdown); err != nil {
|
||
|
l.Error(fmt.Sprintf("WS adapter service error occurred during shutdown at %s: %s", p, err))
|
||
|
return fmt.Errorf("WS adapter service error occurred during shutdown at %s: %w", p, err)
|
||
|
}
|
||
|
l.Info(fmt.Sprintf("WS adapter service shutdown at %s", p))
|
||
|
return nil
|
||
|
case err := <-errCh:
|
||
|
return err
|
||
|
}
|
||
|
}
|