micro/util/wrapper/wrapper.go

209 lines
5.2 KiB
Go
Raw Normal View History

package wrapper
2015-12-20 23:50:16 +00:00
import (
2018-03-03 11:53:52 +00:00
"context"
2020-02-07 20:58:03 +00:00
"strings"
2018-03-03 11:53:52 +00:00
"github.com/micro/go-micro/v2/auth"
"github.com/micro/go-micro/v2/client"
"github.com/micro/go-micro/v2/debug/stats"
"github.com/micro/go-micro/v2/debug/trace"
"github.com/micro/go-micro/v2/errors"
"github.com/micro/go-micro/v2/metadata"
"github.com/micro/go-micro/v2/server"
2015-12-20 23:50:16 +00:00
)
2015-12-23 00:02:42 +00:00
type clientWrapper struct {
2015-12-20 23:50:16 +00:00
client.Client
// Auth interface
auth func() auth.Auth
// headers to inject
2016-01-28 17:55:28 +00:00
headers metadata.Metadata
2015-12-20 23:50:16 +00:00
}
2020-01-24 21:58:29 +00:00
type traceWrapper struct {
client.Client
name string
2020-01-29 15:45:11 +00:00
trace trace.Tracer
2020-01-24 21:58:29 +00:00
}
var (
HeaderPrefix = "Micro-"
BearerScheme = "Bearer "
)
func (c *clientWrapper) setHeaders(ctx context.Context) context.Context {
2019-01-17 09:40:49 +00:00
// copy metadata
mda, _ := metadata.FromContext(ctx)
md := metadata.Copy(mda)
2016-11-02 17:21:53 +00:00
// get auth token
if a := c.auth(); a != nil {
tk := a.Options().Token
// if the token if exists and auth header isn't set then set it
if len(tk) > 0 && len(md["Authorization"]) == 0 {
md["Authorization"] = BearerScheme + tk
}
}
2019-01-17 09:40:49 +00:00
// set headers
for k, v := range c.headers {
if _, ok := md[k]; !ok {
md[k] = v
}
}
2016-11-02 17:21:53 +00:00
return metadata.NewContext(ctx, md)
}
2015-12-23 00:02:42 +00:00
func (c *clientWrapper) Call(ctx context.Context, req client.Request, rsp interface{}, opts ...client.CallOption) error {
ctx = c.setHeaders(ctx)
2015-12-20 23:50:16 +00:00
return c.Client.Call(ctx, req, rsp, opts...)
}
2018-04-14 18:15:09 +01:00
func (c *clientWrapper) Stream(ctx context.Context, req client.Request, opts ...client.CallOption) (client.Stream, error) {
ctx = c.setHeaders(ctx)
2015-12-20 23:50:16 +00:00
return c.Client.Stream(ctx, req, opts...)
}
2018-04-14 18:15:09 +01:00
func (c *clientWrapper) Publish(ctx context.Context, p client.Message, opts ...client.PublishOption) error {
ctx = c.setHeaders(ctx)
2015-12-20 23:50:16 +00:00
return c.Client.Publish(ctx, p, opts...)
}
2020-01-24 21:58:29 +00:00
func (c *traceWrapper) Call(ctx context.Context, req client.Request, rsp interface{}, opts ...client.CallOption) error {
newCtx, s := c.trace.Start(ctx, req.Service()+"."+req.Endpoint())
s.Type = trace.SpanTypeRequestOutbound
2020-01-24 21:58:29 +00:00
err := c.Client.Call(newCtx, req, rsp, opts...)
if err != nil {
s.Metadata["error"] = err.Error()
}
// finish the trace
c.trace.Finish(s)
return err
}
// FromService wraps a client to inject service and auth metadata
func FromService(name string, c client.Client, fn func() auth.Auth) client.Client {
return &clientWrapper{
2019-11-16 18:52:27 +00:00
c,
fn,
2019-11-16 18:52:27 +00:00
metadata.Metadata{
HeaderPrefix + "From-Service": name,
},
}
}
2019-12-18 18:36:42 +00:00
// HandlerStats wraps a server handler to generate request/error stats
func HandlerStats(stats stats.Stats) server.HandlerWrapper {
// return a handler wrapper
return func(h server.HandlerFunc) server.HandlerFunc {
// return a function that returns a function
return func(ctx context.Context, req server.Request, rsp interface{}) error {
// execute the handler
err := h(ctx, req, rsp)
// record the stats
stats.Record(err)
// return the error
return err
}
}
}
2020-01-24 21:58:29 +00:00
// TraceCall is a call tracing wrapper
2020-01-29 15:45:11 +00:00
func TraceCall(name string, t trace.Tracer, c client.Client) client.Client {
2020-01-24 21:58:29 +00:00
return &traceWrapper{
name: name,
trace: t,
Client: c,
}
}
// TraceHandler wraps a server handler to perform tracing
2020-01-29 15:45:11 +00:00
func TraceHandler(t trace.Tracer) server.HandlerWrapper {
2020-01-24 21:58:29 +00:00
// return a handler wrapper
return func(h server.HandlerFunc) server.HandlerFunc {
// return a function that returns a function
return func(ctx context.Context, req server.Request, rsp interface{}) error {
2020-02-07 20:58:03 +00:00
// don't store traces for debug
if strings.HasPrefix(req.Endpoint(), "Debug.") {
return h(ctx, req, rsp)
}
2020-01-24 21:58:29 +00:00
// get the span
newCtx, s := t.Start(ctx, req.Service()+"."+req.Endpoint())
s.Type = trace.SpanTypeRequestInbound
2020-01-24 21:58:29 +00:00
err := h(newCtx, req, rsp)
if err != nil {
s.Metadata["error"] = err.Error()
}
// finish
t.Finish(s)
return err
}
}
}
// AuthHandler wraps a server handler to perform auth
func AuthHandler(fn func() auth.Auth) server.HandlerWrapper {
return func(h server.HandlerFunc) server.HandlerFunc {
return func(ctx context.Context, req server.Request, rsp interface{}) error {
// get the auth.Auth interface
a := fn()
// Check for debug endpoints which should be excluded from auth
if strings.HasPrefix(req.Endpoint(), "Debug.") {
return h(ctx, req, rsp)
}
// Extract the token if present. Note: if noop is being used
// then the token can be blank without erroring
var token string
if header, ok := metadata.Get(ctx, "Authorization"); ok {
// Ensure the correct scheme is being used
if !strings.HasPrefix(header, BearerScheme) {
return errors.Unauthorized("go.micro.auth", "invalid authorization header. expected Bearer schema")
}
token = header[len(BearerScheme):]
}
// Verify the token
2020-03-04 09:54:52 +00:00
account, authErr := a.Verify(token)
// If there is an account, set it in the context
if authErr == nil {
var err error
ctx, err = auth.ContextWithAccount(ctx, account)
if err != nil {
return err
}
}
// Return if the user disabled auth on this endpoint
for _, e := range a.Options().Exclude {
if e == req.Endpoint() {
return h(ctx, req, rsp)
}
}
// If the authErr is set, prevent the user from calling the endpoint
if authErr != nil {
return errors.Unauthorized("go.micro.auth", authErr.Error())
}
2020-03-04 09:54:52 +00:00
// The user is authorised, allow the call
return h(ctx, req, rsp)
}
}
}