mirror of
https://github.com/mainflux/mainflux.git
synced 2025-04-24 13:48:49 +08:00

* Initial Commit: Sync Env Veriables With Docker Deployment Signed-off-by: rodneyosodo <blackd0t@protonmail.com> * Sync Env Vars With Master Signed-off-by: rodneyosodo <blackd0t@protonmail.com> * Remove Altprefix Signed-off-by: rodneyosodo <blackd0t@protonmail.com> * Rename HttpPort to HTTPPort Signed-off-by: rodneyosodo <blackd0t@protonmail.com> * Fix envPrefixDB After Rebase Signed-off-by: rodneyosodo <blackd0t@protonmail.com> * Remove Server Parse Signed-off-by: rodneyosodo <blackd0t@protonmail.com> * Add Provision For TLS on CoAP Signed-off-by: rodneyosodo <blackd0t@protonmail.com> * Fix Exit After Defer Signed-off-by: rodneyosodo <blackd0t@protonmail.com> * Remove Unused Function Signed-off-by: rodneyosodo <blackd0t@protonmail.com> * Document Undocumentated Env Variables Signed-off-by: rodneyosodo <blackd0t@protonmail.com> --------- Signed-off-by: rodneyosodo <blackd0t@protonmail.com> Co-authored-by: Drasko DRASKOVIC <drasko.draskovic@gmail.com>
286 lines
9.1 KiB
Go
286 lines
9.1 KiB
Go
// Copyright (c) Mainflux
|
|
// SPDX-License-Identifier: Apache-2.0
|
|
|
|
// Package main contains provision main function to start the provision service.
|
|
package main
|
|
|
|
import (
|
|
"context"
|
|
"encoding/json"
|
|
"fmt"
|
|
"log"
|
|
"os"
|
|
"reflect"
|
|
"strconv"
|
|
|
|
chclient "github.com/mainflux/callhome/pkg/client"
|
|
"github.com/mainflux/mainflux"
|
|
"github.com/mainflux/mainflux/internal/server"
|
|
httpserver "github.com/mainflux/mainflux/internal/server/http"
|
|
mflog "github.com/mainflux/mainflux/logger"
|
|
mfclients "github.com/mainflux/mainflux/pkg/clients"
|
|
"github.com/mainflux/mainflux/pkg/errors"
|
|
mfgroups "github.com/mainflux/mainflux/pkg/groups"
|
|
mfSDK "github.com/mainflux/mainflux/pkg/sdk/go"
|
|
"github.com/mainflux/mainflux/pkg/uuid"
|
|
"github.com/mainflux/mainflux/provision"
|
|
"github.com/mainflux/mainflux/provision/api"
|
|
"golang.org/x/sync/errgroup"
|
|
)
|
|
|
|
const (
|
|
svcName = "provision"
|
|
|
|
defLogLevel = "error"
|
|
defConfigFile = "config.toml"
|
|
defTLS = "false"
|
|
defServerCert = ""
|
|
defServerKey = ""
|
|
defThingsURL = "http://localhost"
|
|
defUsersURL = "http://localhost"
|
|
defHTTPPort = "9016"
|
|
defMfUser = "test@example.com"
|
|
defMfPass = "test"
|
|
defMfAPIKey = ""
|
|
defMfBSURL = "http://localhost:9000/things/configs"
|
|
defMfWhiteListURL = "http://localhost:9000/things/state"
|
|
defMfCertsURL = "http://localhost:9019"
|
|
defProvisionCerts = "false"
|
|
defProvisionBS = "true"
|
|
defBSAutoWhitelist = "true"
|
|
defBSContent = ""
|
|
defCertsHoursValid = "2400h"
|
|
defSendTelemetry = "true"
|
|
defInstanceID = ""
|
|
|
|
envConfigFile = "MF_PROVISION_CONFIG_FILE"
|
|
envLogLevel = "MF_PROVISION_LOG_LEVEL"
|
|
envHTTPPort = "MF_PROVISION_HTTP_PORT"
|
|
envTLS = "MF_PROVISION_ENV_CLIENTS_TLS"
|
|
envServerCert = "MF_PROVISION_SERVER_CERT"
|
|
envServerKey = "MF_PROVISION_SERVER_KEY"
|
|
envUsersURL = "MF_PROVISION_USERS_LOCATION"
|
|
envThingsURL = "MF_PROVISION_THINGS_LOCATION"
|
|
envMfUser = "MF_PROVISION_USER"
|
|
envMfPass = "MF_PROVISION_PASS"
|
|
envMfAPIKey = "MF_PROVISION_API_KEY"
|
|
envMfCertsURL = "MF_PROVISION_CERTS_SVC_URL"
|
|
envProvisionCerts = "MF_PROVISION_X509_PROVISIONING"
|
|
envMfBSURL = "MF_PROVISION_BS_SVC_URL"
|
|
envMfBSWhiteListURL = "MF_PROVISION_BS_SVC_WHITELIST_URL"
|
|
envProvisionBS = "MF_PROVISION_BS_CONFIG_PROVISIONING"
|
|
envBSAutoWhiteList = "MF_PROVISION_BS_AUTO_WHITELIST"
|
|
envBSContent = "MF_PROVISION_BS_CONTENT"
|
|
envCertsHoursValid = "MF_PROVISION_CERTS_HOURS_VALID"
|
|
envSendTelemetry = "MF_SEND_TELEMETRY"
|
|
envInstanceID = "MF_PROVISION_INSTANCE_ID"
|
|
|
|
contentType = "application/json"
|
|
)
|
|
|
|
var (
|
|
errMissingConfigFile = errors.New("missing config file setting")
|
|
errFailLoadingConfigFile = errors.New("failed to load config from file")
|
|
errFailGettingAutoWhiteList = errors.New("failed to get auto whitelist setting")
|
|
errFailGettingCertSettings = errors.New("failed to get certificate file setting")
|
|
errFailGettingTLSConf = errors.New("failed to get TLS setting")
|
|
errFailGettingProvBS = errors.New("failed to get BS url setting")
|
|
errFailedToReadBootstrapContent = errors.New("failed to read bootstrap content from envs")
|
|
errFailedToSetupCallHome = errors.New("failed to set up callhome")
|
|
)
|
|
|
|
func main() {
|
|
cfg, err := loadConfig()
|
|
ctx, cancel := context.WithCancel(context.Background())
|
|
g, ctx := errgroup.WithContext(ctx)
|
|
|
|
if err != nil {
|
|
log.Fatalf(err.Error())
|
|
}
|
|
logger, err := mflog.New(os.Stdout, cfg.Server.LogLevel)
|
|
if err != nil {
|
|
log.Fatalf(err.Error())
|
|
}
|
|
|
|
var exitCode int
|
|
defer mflog.ExitWithError(&exitCode)
|
|
|
|
instanceID := mainflux.Env(envInstanceID, defInstanceID)
|
|
if instanceID == "" {
|
|
instanceID, err = uuid.New().ID()
|
|
if err != nil {
|
|
logger.Error(fmt.Sprintf("Failed to init Jaeger: %s", err))
|
|
exitCode = 1
|
|
return
|
|
}
|
|
}
|
|
|
|
if cfgFromFile, err := loadConfigFromFile(cfg.File); err != nil {
|
|
logger.Warn(fmt.Sprintf("Continue with settings from env, failed to load from: %s: %s", cfg.File, err))
|
|
} else {
|
|
// Merge environment variables and file settings.
|
|
mergeConfigs(&cfgFromFile, &cfg)
|
|
cfg = cfgFromFile
|
|
logger.Info("Continue with settings from file: " + cfg.File)
|
|
}
|
|
|
|
SDKCfg := mfSDK.Config{
|
|
UsersURL: cfg.Server.UsersURL,
|
|
ThingsURL: cfg.Server.ThingsURL,
|
|
BootstrapURL: cfg.Server.MfBSURL,
|
|
CertsURL: cfg.Server.MfCertsURL,
|
|
MsgContentType: contentType,
|
|
TLSVerification: cfg.Server.TLS,
|
|
}
|
|
SDK := mfSDK.NewSDK(SDKCfg)
|
|
|
|
svc := provision.New(cfg, SDK, logger)
|
|
svc = api.NewLoggingMiddleware(svc, logger)
|
|
|
|
httpServerConfig := server.Config{Host: "", Port: cfg.Server.HTTPPort, KeyFile: cfg.Server.ServerKey, CertFile: cfg.Server.ServerCert}
|
|
hs := httpserver.New(ctx, cancel, svcName, httpServerConfig, api.MakeHandler(svc, logger, instanceID), logger)
|
|
|
|
if cfg.SendTelemetry {
|
|
chc := chclient.New(svcName, mainflux.Version, logger, cancel)
|
|
go chc.CallHome(ctx)
|
|
}
|
|
|
|
g.Go(func() error {
|
|
return hs.Start()
|
|
})
|
|
|
|
g.Go(func() error {
|
|
return server.StopSignalHandler(ctx, cancel, logger, svcName, hs)
|
|
})
|
|
|
|
if err := g.Wait(); err != nil {
|
|
logger.Error(fmt.Sprintf("Provision service terminated: %s", err))
|
|
}
|
|
|
|
}
|
|
|
|
func loadConfigFromFile(file string) (provision.Config, error) {
|
|
_, err := os.Stat(file)
|
|
if os.IsNotExist(err) {
|
|
return provision.Config{}, errors.Wrap(errMissingConfigFile, err)
|
|
}
|
|
c, err := provision.Read(file)
|
|
if err != nil {
|
|
return provision.Config{}, errors.Wrap(errFailLoadingConfigFile, err)
|
|
}
|
|
return c, nil
|
|
}
|
|
|
|
func loadConfig() (provision.Config, error) {
|
|
tls, err := strconv.ParseBool(mainflux.Env(envTLS, defTLS))
|
|
if err != nil {
|
|
return provision.Config{}, errors.Wrap(errFailGettingTLSConf, err)
|
|
}
|
|
provisionX509, err := strconv.ParseBool(mainflux.Env(envProvisionCerts, defProvisionCerts))
|
|
if err != nil {
|
|
return provision.Config{}, errors.Wrap(errFailGettingCertSettings, err)
|
|
}
|
|
provisionBS, err := strconv.ParseBool(mainflux.Env(envProvisionBS, defProvisionBS))
|
|
if err != nil {
|
|
return provision.Config{}, errors.Wrap(errFailGettingProvBS, fmt.Errorf(" for %s", envProvisionBS))
|
|
}
|
|
|
|
autoWhiteList, err := strconv.ParseBool(mainflux.Env(envBSAutoWhiteList, defBSAutoWhitelist))
|
|
if err != nil {
|
|
return provision.Config{}, errors.Wrap(errFailGettingAutoWhiteList, fmt.Errorf(" for %s", envBSAutoWhiteList))
|
|
}
|
|
if autoWhiteList && !provisionBS {
|
|
return provision.Config{}, errors.New("Can't auto whitelist if auto config save is off")
|
|
}
|
|
|
|
var content map[string]interface{}
|
|
if c := mainflux.Env(envBSContent, defBSContent); c != "" {
|
|
if err = json.Unmarshal([]byte(c), &content); err != nil {
|
|
return provision.Config{}, errFailedToReadBootstrapContent
|
|
}
|
|
}
|
|
|
|
cfg := provision.Config{
|
|
Server: provision.ServiceConf{
|
|
LogLevel: mainflux.Env(envLogLevel, defLogLevel),
|
|
ServerCert: mainflux.Env(envServerCert, defServerCert),
|
|
ServerKey: mainflux.Env(envServerKey, defServerKey),
|
|
HTTPPort: mainflux.Env(envHTTPPort, defHTTPPort),
|
|
MfBSURL: mainflux.Env(envMfBSURL, defMfBSURL),
|
|
MfWhiteListURL: mainflux.Env(envMfBSWhiteListURL, defMfWhiteListURL),
|
|
MfCertsURL: mainflux.Env(envMfCertsURL, defMfCertsURL),
|
|
MfUser: mainflux.Env(envMfUser, defMfUser),
|
|
MfPass: mainflux.Env(envMfPass, defMfPass),
|
|
MfAPIKey: mainflux.Env(envMfAPIKey, defMfAPIKey),
|
|
ThingsURL: mainflux.Env(envThingsURL, defThingsURL),
|
|
UsersURL: mainflux.Env(envUsersURL, defUsersURL),
|
|
TLS: tls,
|
|
},
|
|
Cert: provision.Cert{
|
|
TTL: mainflux.Env(envCertsHoursValid, defCertsHoursValid),
|
|
},
|
|
Bootstrap: provision.Bootstrap{
|
|
X509Provision: provisionX509,
|
|
Provision: provisionBS,
|
|
AutoWhiteList: autoWhiteList,
|
|
Content: content,
|
|
},
|
|
|
|
// This is default conf for provision if there is no config file
|
|
Channels: []mfgroups.Group{
|
|
{
|
|
Name: "control-channel",
|
|
Metadata: map[string]interface{}{"type": "control"},
|
|
}, {
|
|
Name: "data-channel",
|
|
Metadata: map[string]interface{}{"type": "data"},
|
|
},
|
|
},
|
|
Things: []mfclients.Client{
|
|
{
|
|
Name: "thing",
|
|
Metadata: map[string]interface{}{"external_id": "xxxxxx"},
|
|
},
|
|
},
|
|
}
|
|
|
|
cfg.File = mainflux.Env(envConfigFile, defConfigFile)
|
|
cfg.SendTelemetry, err = strconv.ParseBool(mainflux.Env(envSendTelemetry, defSendTelemetry))
|
|
if err != nil {
|
|
return cfg, errors.Wrap(errFailedToSetupCallHome, err)
|
|
}
|
|
return cfg, nil
|
|
}
|
|
|
|
func mergeConfigs(dst, src interface{}) interface{} {
|
|
d := reflect.ValueOf(dst).Elem()
|
|
s := reflect.ValueOf(src).Elem()
|
|
|
|
for i := 0; i < d.NumField(); i++ {
|
|
dField := d.Field(i)
|
|
sField := s.Field(i)
|
|
switch dField.Kind() {
|
|
case reflect.Struct:
|
|
dst := dField.Addr().Interface()
|
|
src := sField.Addr().Interface()
|
|
m := mergeConfigs(dst, src)
|
|
val := reflect.ValueOf(m).Elem().Interface()
|
|
dField.Set(reflect.ValueOf(val))
|
|
case reflect.Slice:
|
|
case reflect.Bool:
|
|
if dField.Interface() == false {
|
|
dField.Set(reflect.ValueOf(sField.Interface()))
|
|
}
|
|
case reflect.Int:
|
|
if dField.Interface() == 0 {
|
|
dField.Set(reflect.ValueOf(sField.Interface()))
|
|
}
|
|
case reflect.String:
|
|
if dField.Interface() == "" {
|
|
dField.Set(reflect.ValueOf(sField.Interface()))
|
|
}
|
|
}
|
|
}
|
|
return dst
|
|
}
|