// Copyright (c) Mainflux // SPDX-License-Identifier: Apache-2.0 package main import ( "context" "fmt" "io" "io/ioutil" "log" "net/http" "os" "strconv" "time" "google.golang.org/grpc/credentials" kitprometheus "github.com/go-kit/kit/metrics/prometheus" "github.com/mainflux/mainflux" adapter "github.com/mainflux/mainflux/http" "github.com/mainflux/mainflux/http/api" "github.com/mainflux/mainflux/logger" "github.com/mainflux/mainflux/pkg/errors" "github.com/mainflux/mainflux/pkg/messaging/brokers" thingsapi "github.com/mainflux/mainflux/things/api/auth/grpc" "github.com/opentracing/opentracing-go" stdprometheus "github.com/prometheus/client_golang/prometheus" jconfig "github.com/uber/jaeger-client-go/config" "golang.org/x/sync/errgroup" "google.golang.org/grpc" ) const ( stopWaitTime = 5 * time.Second defLogLevel = "error" defClientTLS = "false" defCACerts = "" defPort = "8180" defBrokerURL = "nats://localhost:4222" defJaegerURL = "" defThingsAuthURL = "localhost:8183" defThingsAuthTimeout = "1s" envLogLevel = "MF_HTTP_ADAPTER_LOG_LEVEL" envClientTLS = "MF_HTTP_ADAPTER_CLIENT_TLS" envCACerts = "MF_HTTP_ADAPTER_CA_CERTS" envPort = "MF_HTTP_ADAPTER_PORT" envBrokerURL = "MF_BROKER_URL" envJaegerURL = "MF_JAEGER_URL" envThingsAuthURL = "MF_THINGS_AUTH_GRPC_URL" envThingsAuthTimeout = "MF_THINGS_AUTH_GRPC_TIMEOUT" ) type config struct { brokerURL string logLevel string port string clientTLS bool caCerts string jaegerURL string thingsAuthURL string thingsAuthTimeout time.Duration } func main() { cfg := loadConfig() ctx, cancel := context.WithCancel(context.Background()) g, ctx := errgroup.WithContext(ctx) logger, err := logger.New(os.Stdout, cfg.logLevel) if err != nil { log.Fatalf(err.Error()) } conn := connectToThings(cfg, logger) defer conn.Close() tracer, closer := initJaeger("http_adapter", cfg.jaegerURL, logger) defer closer.Close() thingsTracer, thingsCloser := initJaeger("things", cfg.jaegerURL, logger) defer thingsCloser.Close() pub, err := brokers.NewPublisher(cfg.brokerURL) if err != nil { logger.Error(fmt.Sprintf("Failed to connect to message broker: %s", err)) os.Exit(1) } defer pub.Close() tc := thingsapi.NewClient(conn, thingsTracer, cfg.thingsAuthTimeout) svc := adapter.New(pub, tc) svc = api.LoggingMiddleware(svc, logger) svc = api.MetricsMiddleware( svc, kitprometheus.NewCounterFrom(stdprometheus.CounterOpts{ Namespace: "http_adapter", Subsystem: "api", Name: "request_count", Help: "Number of requests received.", }, []string{"method"}), kitprometheus.NewSummaryFrom(stdprometheus.SummaryOpts{ Namespace: "http_adapter", Subsystem: "api", Name: "request_latency_microseconds", Help: "Total duration of requests in microseconds.", }, []string{"method"}), ) g.Go(func() error { return startHTTPServer(ctx, svc, cfg, logger, tracer) }) g.Go(func() error { if sig := errors.SignalHandler(ctx); sig != nil { cancel() logger.Info(fmt.Sprintf("HTTP adapter service shutdown by signal: %s", sig)) } return nil }) if err := g.Wait(); err != nil { logger.Error(fmt.Sprintf("HTTP adapter service terminated: %s", err)) } } func loadConfig() config { tls, err := strconv.ParseBool(mainflux.Env(envClientTLS, defClientTLS)) if err != nil { log.Fatalf("Invalid value passed for %s\n", envClientTLS) } authTimeout, err := time.ParseDuration(mainflux.Env(envThingsAuthTimeout, defThingsAuthTimeout)) if err != nil { log.Fatalf("Invalid %s value: %s", envThingsAuthTimeout, err.Error()) } return config{ brokerURL: mainflux.Env(envBrokerURL, defBrokerURL), logLevel: mainflux.Env(envLogLevel, defLogLevel), port: mainflux.Env(envPort, defPort), clientTLS: tls, caCerts: mainflux.Env(envCACerts, defCACerts), jaegerURL: mainflux.Env(envJaegerURL, defJaegerURL), thingsAuthURL: mainflux.Env(envThingsAuthURL, defThingsAuthURL), thingsAuthTimeout: authTimeout, } } func initJaeger(svcName, url string, logger logger.Logger) (opentracing.Tracer, io.Closer) { if url == "" { return opentracing.NoopTracer{}, ioutil.NopCloser(nil) } tracer, closer, err := jconfig.Configuration{ ServiceName: svcName, Sampler: &jconfig.SamplerConfig{ Type: "const", Param: 1, }, Reporter: &jconfig.ReporterConfig{ LocalAgentHostPort: url, LogSpans: true, }, }.NewTracer() if err != nil { logger.Error(fmt.Sprintf("Failed to init Jaeger client: %s", err)) os.Exit(1) } return tracer, closer } func connectToThings(cfg config, logger logger.Logger) *grpc.ClientConn { var opts []grpc.DialOption if cfg.clientTLS { if cfg.caCerts != "" { tpc, err := credentials.NewClientTLSFromFile(cfg.caCerts, "") if err != nil { logger.Error(fmt.Sprintf("Failed to load certs: %s", err)) os.Exit(1) } opts = append(opts, grpc.WithTransportCredentials(tpc)) } } else { logger.Info("gRPC communication is not encrypted") opts = append(opts, grpc.WithInsecure()) } conn, err := grpc.Dial(cfg.thingsAuthURL, opts...) if err != nil { logger.Error(fmt.Sprintf("Failed to connect to things service: %s", err)) os.Exit(1) } return conn } func startHTTPServer(ctx context.Context, svc adapter.Service, cfg config, logger logger.Logger, tracer opentracing.Tracer) error { p := fmt.Sprintf(":%s", cfg.port) errCh := make(chan error) server := &http.Server{Addr: p, Handler: api.MakeHandler(svc, tracer, logger)} logger.Info(fmt.Sprintf("HTTP adapter service started on port %s", cfg.port)) go func() { errCh <- server.ListenAndServe() }() select { case <-ctx.Done(): ctxShutdown, cancelShutdown := context.WithTimeout(context.Background(), stopWaitTime) defer cancelShutdown() if err := server.Shutdown(ctxShutdown); err != nil { logger.Error(fmt.Sprintf("HTTP adapter service error occurred during shutdown at %s: %s", p, err)) return fmt.Errorf("http adapter service error occurred during shutdown at %s: %w", p, err) } logger.Info(fmt.Sprintf("HTTP adapter service shutdown of http at %s", p)) return nil case err := <-errCh: return err } }