mirror of
https://github.com/mainflux/mainflux.git
synced 2025-04-27 13:48:49 +08:00

* Fix CI script Signed-off-by: dusanb94 <dusan.borovcanin@mainflux.com> * Fix linter errors Signed-off-by: dusanb94 <dusan.borovcanin@mainflux.com> * Add timeout to linter Signed-off-by: dusanb94 <dusan.borovcanin@mainflux.com>
342 lines
11 KiB
Go
342 lines
11 KiB
Go
package main
|
|
|
|
import (
|
|
"context"
|
|
"fmt"
|
|
"io"
|
|
"io/ioutil"
|
|
"log"
|
|
"net"
|
|
"net/http"
|
|
"os"
|
|
"time"
|
|
|
|
kitprometheus "github.com/go-kit/kit/metrics/prometheus"
|
|
"github.com/jmoiron/sqlx"
|
|
"github.com/mainflux/mainflux"
|
|
"github.com/mainflux/mainflux/auth"
|
|
api "github.com/mainflux/mainflux/auth/api"
|
|
grpcapi "github.com/mainflux/mainflux/auth/api/grpc"
|
|
httpapi "github.com/mainflux/mainflux/auth/api/http"
|
|
"github.com/mainflux/mainflux/auth/jwt"
|
|
"github.com/mainflux/mainflux/auth/keto"
|
|
"github.com/mainflux/mainflux/auth/postgres"
|
|
"github.com/mainflux/mainflux/auth/tracing"
|
|
"github.com/mainflux/mainflux/logger"
|
|
"github.com/mainflux/mainflux/pkg/errors"
|
|
"github.com/mainflux/mainflux/pkg/uuid"
|
|
"github.com/opentracing/opentracing-go"
|
|
acl "github.com/ory/keto/proto/ory/keto/acl/v1alpha1"
|
|
stdprometheus "github.com/prometheus/client_golang/prometheus"
|
|
jconfig "github.com/uber/jaeger-client-go/config"
|
|
"golang.org/x/sync/errgroup"
|
|
"google.golang.org/grpc"
|
|
"google.golang.org/grpc/credentials"
|
|
)
|
|
|
|
const (
|
|
stopWaitTime = 5 * time.Second
|
|
httpProtocol = "http"
|
|
httpsProtocol = "https"
|
|
|
|
defLogLevel = "error"
|
|
defDBHost = "localhost"
|
|
defDBPort = "5432"
|
|
defDBUser = "mainflux"
|
|
defDBPass = "mainflux"
|
|
defDB = "auth"
|
|
defDBSSLMode = "disable"
|
|
defDBSSLCert = ""
|
|
defDBSSLKey = ""
|
|
defDBSSLRootCert = ""
|
|
defHTTPPort = "8180"
|
|
defGRPCPort = "8181"
|
|
defSecret = "auth"
|
|
defServerCert = ""
|
|
defServerKey = ""
|
|
defJaegerURL = ""
|
|
defKetoReadHost = "mainflux-keto"
|
|
defKetoWriteHost = "mainflux-keto"
|
|
defKetoReadPort = "4466"
|
|
defKetoWritePort = "4467"
|
|
defLoginDuration = "10h"
|
|
|
|
envLogLevel = "MF_AUTH_LOG_LEVEL"
|
|
envDBHost = "MF_AUTH_DB_HOST"
|
|
envDBPort = "MF_AUTH_DB_PORT"
|
|
envDBUser = "MF_AUTH_DB_USER"
|
|
envDBPass = "MF_AUTH_DB_PASS"
|
|
envDB = "MF_AUTH_DB"
|
|
envDBSSLMode = "MF_AUTH_DB_SSL_MODE"
|
|
envDBSSLCert = "MF_AUTH_DB_SSL_CERT"
|
|
envDBSSLKey = "MF_AUTH_DB_SSL_KEY"
|
|
envDBSSLRootCert = "MF_AUTH_DB_SSL_ROOT_CERT"
|
|
envHTTPPort = "MF_AUTH_HTTP_PORT"
|
|
envGRPCPort = "MF_AUTH_GRPC_PORT"
|
|
envSecret = "MF_AUTH_SECRET"
|
|
envServerCert = "MF_AUTH_SERVER_CERT"
|
|
envServerKey = "MF_AUTH_SERVER_KEY"
|
|
envJaegerURL = "MF_JAEGER_URL"
|
|
envKetoReadHost = "MF_KETO_READ_REMOTE_HOST"
|
|
envKetoWriteHost = "MF_KETO_WRITE_REMOTE_HOST"
|
|
envKetoReadPort = "MF_KETO_READ_REMOTE_PORT"
|
|
envKetoWritePort = "MF_KETO_WRITE_REMOTE_PORT"
|
|
envLoginDuration = "MF_AUTH_LOGIN_TOKEN_DURATION"
|
|
)
|
|
|
|
type config struct {
|
|
logLevel string
|
|
dbConfig postgres.Config
|
|
httpPort string
|
|
grpcPort string
|
|
secret string
|
|
serverCert string
|
|
serverKey string
|
|
jaegerURL string
|
|
ketoReadHost string
|
|
ketoWriteHost string
|
|
ketoWritePort string
|
|
ketoReadPort string
|
|
loginDuration time.Duration
|
|
}
|
|
|
|
func main() {
|
|
cfg := loadConfig()
|
|
ctx, cancel := context.WithCancel(context.Background())
|
|
g, ctx := errgroup.WithContext(ctx)
|
|
logger, err := logger.New(os.Stdout, cfg.logLevel)
|
|
if err != nil {
|
|
log.Fatalf(err.Error())
|
|
}
|
|
|
|
db := connectToDB(cfg.dbConfig, logger)
|
|
defer db.Close()
|
|
|
|
tracer, closer := initJaeger("auth", cfg.jaegerURL, logger)
|
|
defer closer.Close()
|
|
|
|
dbTracer, dbCloser := initJaeger("auth_db", cfg.jaegerURL, logger)
|
|
defer dbCloser.Close()
|
|
|
|
readerConn, writerConn := initKeto(cfg.ketoReadHost, cfg.ketoReadPort, cfg.ketoWriteHost, cfg.ketoWritePort, logger)
|
|
|
|
svc := newService(db, dbTracer, cfg.secret, logger, readerConn, writerConn, cfg.loginDuration)
|
|
|
|
g.Go(func() error {
|
|
return startHTTPServer(ctx, tracer, svc, cfg.httpPort, cfg.serverCert, cfg.serverKey, logger)
|
|
})
|
|
g.Go(func() error {
|
|
return startGRPCServer(ctx, tracer, svc, cfg.grpcPort, cfg.serverCert, cfg.serverKey, logger)
|
|
})
|
|
|
|
g.Go(func() error {
|
|
if sig := errors.SignalHandler(ctx); sig != nil {
|
|
cancel()
|
|
logger.Info(fmt.Sprintf("Authentication service shutdown by signal: %s", sig))
|
|
}
|
|
return nil
|
|
})
|
|
if err := g.Wait(); err != nil {
|
|
logger.Error(fmt.Sprintf("Authentication service terminated: %s", err))
|
|
}
|
|
}
|
|
|
|
func loadConfig() config {
|
|
dbConfig := postgres.Config{
|
|
Host: mainflux.Env(envDBHost, defDBHost),
|
|
Port: mainflux.Env(envDBPort, defDBPort),
|
|
User: mainflux.Env(envDBUser, defDBUser),
|
|
Pass: mainflux.Env(envDBPass, defDBPass),
|
|
Name: mainflux.Env(envDB, defDB),
|
|
SSLMode: mainflux.Env(envDBSSLMode, defDBSSLMode),
|
|
SSLCert: mainflux.Env(envDBSSLCert, defDBSSLCert),
|
|
SSLKey: mainflux.Env(envDBSSLKey, defDBSSLKey),
|
|
SSLRootCert: mainflux.Env(envDBSSLRootCert, defDBSSLRootCert),
|
|
}
|
|
|
|
loginDuration, err := time.ParseDuration(mainflux.Env(envLoginDuration, defLoginDuration))
|
|
if err != nil {
|
|
log.Fatal(err)
|
|
}
|
|
|
|
return config{
|
|
logLevel: mainflux.Env(envLogLevel, defLogLevel),
|
|
dbConfig: dbConfig,
|
|
httpPort: mainflux.Env(envHTTPPort, defHTTPPort),
|
|
grpcPort: mainflux.Env(envGRPCPort, defGRPCPort),
|
|
secret: mainflux.Env(envSecret, defSecret),
|
|
serverCert: mainflux.Env(envServerCert, defServerCert),
|
|
serverKey: mainflux.Env(envServerKey, defServerKey),
|
|
jaegerURL: mainflux.Env(envJaegerURL, defJaegerURL),
|
|
ketoReadHost: mainflux.Env(envKetoReadHost, defKetoReadHost),
|
|
ketoWriteHost: mainflux.Env(envKetoWriteHost, defKetoWriteHost),
|
|
ketoReadPort: mainflux.Env(envKetoReadPort, defKetoReadPort),
|
|
ketoWritePort: mainflux.Env(envKetoWritePort, defKetoWritePort),
|
|
loginDuration: loginDuration,
|
|
}
|
|
|
|
}
|
|
|
|
func initJaeger(svcName, url string, logger logger.Logger) (opentracing.Tracer, io.Closer) {
|
|
if url == "" {
|
|
return opentracing.NoopTracer{}, ioutil.NopCloser(nil)
|
|
}
|
|
|
|
tracer, closer, err := jconfig.Configuration{
|
|
ServiceName: svcName,
|
|
Sampler: &jconfig.SamplerConfig{
|
|
Type: "const",
|
|
Param: 1,
|
|
},
|
|
Reporter: &jconfig.ReporterConfig{
|
|
LocalAgentHostPort: url,
|
|
LogSpans: true,
|
|
},
|
|
}.NewTracer()
|
|
if err != nil {
|
|
logger.Error(fmt.Sprintf("Failed to init Jaeger: %s", err))
|
|
os.Exit(1)
|
|
}
|
|
|
|
return tracer, closer
|
|
}
|
|
|
|
func initKeto(hostReadAddress, readPort, hostWriteAddress, writePort string, logger logger.Logger) (readerConnection, writerConnection *grpc.ClientConn) {
|
|
readConn, err := grpc.Dial(fmt.Sprintf("%s:%s", hostReadAddress, readPort), grpc.WithInsecure())
|
|
if err != nil {
|
|
logger.Error(fmt.Sprintf("Failed to dial %s:%s for Keto Read Service: %s", hostReadAddress, readPort, err))
|
|
os.Exit(1)
|
|
}
|
|
|
|
writeConn, err := grpc.Dial(fmt.Sprintf("%s:%s", hostWriteAddress, writePort), grpc.WithInsecure())
|
|
if err != nil {
|
|
logger.Error(fmt.Sprintf("Failed to dial %s:%s for Keto Write Service: %s", hostWriteAddress, writePort, err))
|
|
os.Exit(1)
|
|
}
|
|
|
|
return readConn, writeConn
|
|
}
|
|
|
|
func connectToDB(dbConfig postgres.Config, logger logger.Logger) *sqlx.DB {
|
|
db, err := postgres.Connect(dbConfig)
|
|
if err != nil {
|
|
logger.Error(fmt.Sprintf("Failed to connect to postgres: %s", err))
|
|
os.Exit(1)
|
|
}
|
|
return db
|
|
}
|
|
|
|
func newService(db *sqlx.DB, tracer opentracing.Tracer, secret string, logger logger.Logger, readerConn, writerConn *grpc.ClientConn, duration time.Duration) auth.Service {
|
|
database := postgres.NewDatabase(db)
|
|
keysRepo := tracing.New(postgres.New(database), tracer)
|
|
|
|
groupsRepo := postgres.NewGroupRepo(database)
|
|
groupsRepo = tracing.GroupRepositoryMiddleware(tracer, groupsRepo)
|
|
|
|
pa := keto.NewPolicyAgent(acl.NewCheckServiceClient(readerConn), acl.NewWriteServiceClient(writerConn), acl.NewReadServiceClient(readerConn))
|
|
|
|
idProvider := uuid.New()
|
|
t := jwt.New(secret)
|
|
|
|
svc := auth.New(keysRepo, groupsRepo, idProvider, t, pa, duration)
|
|
svc = api.LoggingMiddleware(svc, logger)
|
|
svc = api.MetricsMiddleware(
|
|
svc,
|
|
kitprometheus.NewCounterFrom(stdprometheus.CounterOpts{
|
|
Namespace: "auth",
|
|
Subsystem: "api",
|
|
Name: "request_count",
|
|
Help: "Number of requests received.",
|
|
}, []string{"method"}),
|
|
kitprometheus.NewSummaryFrom(stdprometheus.SummaryOpts{
|
|
Namespace: "auth",
|
|
Subsystem: "api",
|
|
Name: "request_latency_microseconds",
|
|
Help: "Total duration of requests in microseconds.",
|
|
}, []string{"method"}),
|
|
)
|
|
|
|
return svc
|
|
}
|
|
|
|
func startHTTPServer(ctx context.Context, tracer opentracing.Tracer, svc auth.Service, port string, certFile string, keyFile string, logger logger.Logger) error {
|
|
p := fmt.Sprintf(":%s", port)
|
|
server := &http.Server{Addr: p, Handler: httpapi.MakeHandler(svc, tracer, logger)}
|
|
errCh := make(chan error)
|
|
protocol := httpProtocol
|
|
switch {
|
|
case certFile != "" || keyFile != "":
|
|
logger.Info(fmt.Sprintf("Authentication service started using https, cert %s key %s, exposed port %s", certFile, keyFile, port))
|
|
go func() {
|
|
errCh <- server.ListenAndServeTLS(certFile, keyFile)
|
|
}()
|
|
protocol = httpsProtocol
|
|
default:
|
|
logger.Info(fmt.Sprintf("Authentication service started using http, exposed port %s", port))
|
|
go func() {
|
|
errCh <- server.ListenAndServe()
|
|
}()
|
|
}
|
|
|
|
select {
|
|
case <-ctx.Done():
|
|
ctxShutdown, cancelShutdown := context.WithTimeout(context.Background(), stopWaitTime)
|
|
defer cancelShutdown()
|
|
if err := server.Shutdown(ctxShutdown); err != nil {
|
|
logger.Error(fmt.Sprintf("Authentication %s service error occurred during shutdown at %s: %s", protocol, p, err))
|
|
return fmt.Errorf("Authentication %s service error occurred during shutdown at %s: %w", protocol, p, err)
|
|
}
|
|
logger.Info(fmt.Sprintf("Authentication %s service shutdown of http at %s", protocol, p))
|
|
return nil
|
|
case err := <-errCh:
|
|
return err
|
|
}
|
|
}
|
|
|
|
func startGRPCServer(ctx context.Context, tracer opentracing.Tracer, svc auth.Service, port string, certFile string, keyFile string, logger logger.Logger) error {
|
|
p := fmt.Sprintf(":%s", port)
|
|
errCh := make(chan error)
|
|
|
|
listener, err := net.Listen("tcp", p)
|
|
if err != nil {
|
|
return fmt.Errorf("failed to listen on port %s: %w", port, err)
|
|
}
|
|
|
|
var server *grpc.Server
|
|
switch {
|
|
case certFile != "" || keyFile != "":
|
|
creds, err := credentials.NewServerTLSFromFile(certFile, keyFile)
|
|
if err != nil {
|
|
return fmt.Errorf("failed to load auth certificates: %w", err)
|
|
}
|
|
logger.Info(fmt.Sprintf("Authentication gRPC service started using https on port %s with cert %s key %s", port, certFile, keyFile))
|
|
server = grpc.NewServer(grpc.Creds(creds))
|
|
default:
|
|
logger.Info(fmt.Sprintf("Authentication gRPC service started using http on port %s", port))
|
|
server = grpc.NewServer()
|
|
}
|
|
|
|
mainflux.RegisterAuthServiceServer(server, grpcapi.NewServer(tracer, svc))
|
|
logger.Info(fmt.Sprintf("Authentication gRPC service started, exposed port %s", port))
|
|
go func() {
|
|
errCh <- server.Serve(listener)
|
|
}()
|
|
|
|
select {
|
|
case <-ctx.Done():
|
|
c := make(chan bool)
|
|
go func() {
|
|
defer close(c)
|
|
server.GracefulStop()
|
|
}()
|
|
select {
|
|
case <-c:
|
|
case <-time.After(stopWaitTime):
|
|
}
|
|
logger.Info(fmt.Sprintf("Authentication gRPC service shutdown at %s", p))
|
|
return nil
|
|
case err := <-errCh:
|
|
return err
|
|
}
|
|
}
|