package command import ( "context" "fmt" glauthcfg "github.com/glauth/glauth/v2/pkg/config" "github.com/oklog/run" accounts "github.com/owncloud/ocis/accounts/pkg/proto/v0" "github.com/owncloud/ocis/glauth/pkg/config" "github.com/owncloud/ocis/glauth/pkg/config/parser" "github.com/owncloud/ocis/glauth/pkg/logging" "github.com/owncloud/ocis/glauth/pkg/metrics" "github.com/owncloud/ocis/glauth/pkg/server/debug" "github.com/owncloud/ocis/glauth/pkg/server/glauth" "github.com/owncloud/ocis/glauth/pkg/tracing" pkgcrypto "github.com/owncloud/ocis/ocis-pkg/crypto" "github.com/owncloud/ocis/ocis-pkg/service/grpc" "github.com/owncloud/ocis/ocis-pkg/version" "github.com/urfave/cli/v2" ) // Server is the entrypoint for the server command. func Server(cfg *config.Config) *cli.Command { return &cli.Command{ Name: "server", Usage: fmt.Sprintf("start %s extension without runtime (unsupervised mode)", cfg.Service.Name), Category: "server", Before: func(c *cli.Context) error { return parser.ParseConfig(cfg) }, Action: func(c *cli.Context) error { logger := logging.Configure(cfg.Service.Name, cfg.Log) err := tracing.Configure(cfg) if err != nil { return err } gr := run.Group{} ctx, cancel := func() (context.Context, context.CancelFunc) { if cfg.Context == nil { return context.WithCancel(context.Background()) } return context.WithCancel(cfg.Context) }() metrics := metrics.New() defer cancel() metrics.BuildInfo.WithLabelValues(version.String).Set(1) { lcfg := glauthcfg.LDAP{ Enabled: cfg.Ldap.Enabled, Listen: cfg.Ldap.Addr, } lscfg := glauthcfg.LDAPS{ Enabled: cfg.Ldaps.Enabled, Listen: cfg.Ldaps.Addr, Cert: cfg.Ldaps.Cert, Key: cfg.Ldaps.Key, } bcfg := glauthcfg.Config{ LDAP: lcfg, // TODO remove LDAP from the backend config upstream LDAPS: lscfg, // TODO remove LDAP from the backend config upstream Backend: glauthcfg.Backend{ Datastore: cfg.Backend.Datastore, BaseDN: cfg.Backend.BaseDN, Insecure: cfg.Backend.Insecure, NameFormat: cfg.Backend.NameFormat, GroupFormat: cfg.Backend.GroupFormat, Servers: cfg.Backend.Servers, SSHKeyAttr: cfg.Backend.SSHKeyAttr, UseGraphAPI: cfg.Backend.UseGraphAPI, }, } fcfg := glauthcfg.Config{ LDAP: lcfg, // TODO remove LDAP from the backend config upstream LDAPS: lscfg, // TODO remove LDAP from the backend config upstream Backend: glauthcfg.Backend{ Datastore: cfg.Fallback.Datastore, BaseDN: cfg.Fallback.BaseDN, Insecure: cfg.Fallback.Insecure, NameFormat: cfg.Fallback.NameFormat, GroupFormat: cfg.Fallback.GroupFormat, Servers: cfg.Fallback.Servers, SSHKeyAttr: cfg.Fallback.SSHKeyAttr, UseGraphAPI: cfg.Fallback.UseGraphAPI, }, } if lscfg.Enabled { if err := pkgcrypto.GenCert(cfg.Ldaps.Cert, cfg.Ldaps.Key, logger); err != nil { logger.Fatal().Err(err).Msgf("Could not generate test-certificate") } } as, gs := getAccountsServices() server, err := glauth.Server( glauth.AccountsService(as), glauth.GroupsService(gs), glauth.Logger(logger), glauth.LDAP(&lcfg), glauth.LDAPS(&lscfg), glauth.Backend(&bcfg), glauth.Fallback(&fcfg), glauth.RoleBundleUUID(cfg.RoleBundleUUID), ) if err != nil { logger.Info(). Err(err). Str("transport", "ldap"). Msg("Failed to initialize server") return err } gr.Add(func() error { err := make(chan error) select { case <-ctx.Done(): return nil case err <- server.ListenAndServe(): return <-err } }, func(_ error) { logger.Info(). Str("transport", "ldap"). Msg("Shutting down server") server.Shutdown() cancel() }) gr.Add(func() error { err := make(chan error) select { case <-ctx.Done(): return nil case err <- server.ListenAndServeTLS(): return <-err } }, func(_ error) { logger.Info(). Str("transport", "ldaps"). Msg("Shutting down server") server.Shutdown() cancel() }) } { server, err := debug.Server( debug.Logger(logger), debug.Context(ctx), debug.Config(cfg), ) if err != nil { logger.Info().Err(err).Str("transport", "debug").Msg("Failed to initialize server") return err } gr.Add(server.ListenAndServe, func(_ error) { _ = server.Shutdown(ctx) cancel() }) } return gr.Run() }, } } // getAccountsServices returns an ocis-accounts service func getAccountsServices() (accounts.AccountsService, accounts.GroupsService) { return accounts.NewAccountsService("com.owncloud.api.accounts", grpc.DefaultClient), accounts.NewGroupsService("com.owncloud.api.accounts", grpc.DefaultClient) }