// Copyright (c) Mainflux // SPDX-License-Identifier: Apache-2.0 package grpc import ( "context" kitgrpc "github.com/go-kit/kit/transport/grpc" mainflux "github.com/mainflux/mainflux" "github.com/mainflux/mainflux/auth" "github.com/mainflux/mainflux/internal/apiutil" "github.com/mainflux/mainflux/pkg/errors" "github.com/mainflux/mainflux/things" "google.golang.org/grpc/codes" "google.golang.org/grpc/status" ) var _ mainflux.AuthzServiceServer = (*grpcServer)(nil) type grpcServer struct { mainflux.UnimplementedAuthzServiceServer authorize kitgrpc.Handler } // NewServer returns new AuthServiceServer instance. func NewServer(svc things.Service) mainflux.AuthzServiceServer { return &grpcServer{ authorize: kitgrpc.NewServer( (authorizeEndpoint(svc)), decodeAuthorizeRequest, encodeAuthorizeResponse, ), } } func (s *grpcServer) Authorize(ctx context.Context, req *mainflux.AuthorizeReq) (*mainflux.AuthorizeRes, error) { _, res, err := s.authorize.ServeGRPC(ctx, req) if err != nil { return nil, encodeError(err) } return res.(*mainflux.AuthorizeRes), nil } func decodeAuthorizeRequest(_ context.Context, grpcReq interface{}) (interface{}, error) { req := grpcReq.(*mainflux.AuthorizeReq) return req, nil } func encodeAuthorizeResponse(_ context.Context, grpcRes interface{}) (interface{}, error) { res := grpcRes.(authorizeRes) return &mainflux.AuthorizeRes{Authorized: res.authorized, Id: res.id}, nil } func encodeError(err error) error { switch { case errors.Contains(err, nil): return nil case errors.Contains(err, errors.ErrMalformedEntity), err == apiutil.ErrInvalidAuthKey, err == apiutil.ErrMissingID, err == apiutil.ErrMissingMemberType, err == apiutil.ErrMissingPolicySub, err == apiutil.ErrMissingPolicyObj, err == apiutil.ErrMalformedPolicyAct: return status.Error(codes.InvalidArgument, err.Error()) case errors.Contains(err, errors.ErrAuthentication), errors.Contains(err, auth.ErrKeyExpired), err == apiutil.ErrMissingEmail, err == apiutil.ErrBearerToken: return status.Error(codes.Unauthenticated, err.Error()) case errors.Contains(err, errors.ErrAuthorization): return status.Error(codes.PermissionDenied, err.Error()) default: return status.Error(codes.Internal, err.Error()) } }