mirror of
https://github.com/opencloud-eu/opencloud.git
synced 2026-01-21 20:10:30 -06:00
* Introduce TLS Settings for go-micro based grpc services and clients TLS for the services can be configure by setting the OCIS_MICRO_GRPC_TLS_ENABLED" "OCIS_MICRO_GRPC_TLS_CERTIFICATE" and "OCIS_MICRO_GRPC_TLS_KEY" enviroment variables. TLS for the clients can configured by setting the "OCIS_MICRO_GRPC_CLIENT_TLS_MODE" and "OCIS_MICRO_GRPC_CLIENT_TLS_CACERT" variables. By default TLS is disabled. Co-authored-by: Martin <github@diemattels.at> * Unify TLS configuration for all grpc services All grpc service (whether they're based on reva) or go-micro use the same set of config vars now. TLS for the services can be configure by setting the OCIS_GRPC_TLS_ENABLED, OCIS_GRPC_TLS_CERTIFICATE and OCIS_GRPC_TLS_KEY enviroment variables. TLS for the clients can configured by setting the OCIS_GRPC_CLIENT_TLS_MODE and OCIS_MICRO_GRPC_CLIENT_TLS_CACERT variables. There are no individual per service config vars currently. If really needed, per service tls configurations can be specified via config file. Co-authored-by: Martin <github@diemattels.at> Co-authored-by: Martin <github@diemattels.at>
86 lines
3.0 KiB
Go
86 lines
3.0 KiB
Go
package grpc
|
|
|
|
import (
|
|
"context"
|
|
|
|
permissions "github.com/cs3org/go-cs3apis/cs3/permissions/v1beta1"
|
|
"github.com/owncloud/ocis/v2/ocis-pkg/service/grpc"
|
|
"github.com/owncloud/ocis/v2/ocis-pkg/version"
|
|
settingssvc "github.com/owncloud/ocis/v2/protogen/gen/ocis/services/settings/v0"
|
|
svc "github.com/owncloud/ocis/v2/services/settings/pkg/service/v0"
|
|
"go-micro.dev/v4/api"
|
|
"go-micro.dev/v4/server"
|
|
)
|
|
|
|
// Server initializes a new go-micro service ready to run
|
|
func Server(opts ...Option) grpc.Service {
|
|
options := newOptions(opts...)
|
|
|
|
service, err := grpc.NewService(
|
|
grpc.TLSEnabled(options.Config.GRPC.TLS.Enabled),
|
|
grpc.TLSCert(
|
|
options.Config.GRPC.TLS.Cert,
|
|
options.Config.GRPC.TLS.Key,
|
|
),
|
|
grpc.Logger(options.Logger),
|
|
grpc.Name(options.Name),
|
|
grpc.Version(version.GetString()),
|
|
grpc.Address(options.Config.GRPC.Addr),
|
|
grpc.Namespace(options.Config.GRPC.Namespace),
|
|
grpc.Context(options.Context),
|
|
grpc.Flags(options.Flags...),
|
|
)
|
|
if err != nil {
|
|
options.Logger.Fatal().Err(err).Msg("Error creating settings service")
|
|
}
|
|
|
|
handle := svc.NewService(options.Config, options.Logger)
|
|
if err := settingssvc.RegisterBundleServiceHandler(service.Server(), handle); err != nil {
|
|
options.Logger.Fatal().Err(err).Msg("could not register Bundle service handler")
|
|
}
|
|
if err := settingssvc.RegisterValueServiceHandler(service.Server(), handle); err != nil {
|
|
options.Logger.Fatal().Err(err).Msg("could not register Value service handler")
|
|
}
|
|
if err := settingssvc.RegisterRoleServiceHandler(service.Server(), handle); err != nil {
|
|
options.Logger.Fatal().Err(err).Msg("could not register Role service handler")
|
|
}
|
|
if err := settingssvc.RegisterPermissionServiceHandler(service.Server(), handle); err != nil {
|
|
options.Logger.Fatal().Err(err).Msg("could not register Permission service handler")
|
|
}
|
|
|
|
if err := RegisterCS3PermissionsServiceHandler(service.Server(), handle); err != nil {
|
|
options.Logger.Fatal().Err(err).Msg("could not register CS3 Permission service handler")
|
|
}
|
|
|
|
return service
|
|
}
|
|
|
|
func RegisterCS3PermissionsServiceHandler(s server.Server, hdlr permissions.PermissionsAPIServer, opts ...server.HandlerOption) error {
|
|
type permissionsService interface {
|
|
CheckPermission(context.Context, *permissions.CheckPermissionRequest, *permissions.CheckPermissionResponse) error
|
|
}
|
|
type PermissionsAPI struct {
|
|
permissionsService
|
|
}
|
|
h := &permissionsServiceHandler{hdlr}
|
|
opts = append(opts, api.WithEndpoint(&api.Endpoint{
|
|
Name: "PermissionsService.Checkpermission",
|
|
Path: []string{"/api/v0/permissions/check-permission"},
|
|
Method: []string{"POST"},
|
|
Handler: "rpc",
|
|
}))
|
|
return s.Handle(s.NewHandler(&PermissionsAPI{h}, opts...))
|
|
}
|
|
|
|
type permissionsServiceHandler struct {
|
|
api permissions.PermissionsAPIServer
|
|
}
|
|
|
|
func (h *permissionsServiceHandler) CheckPermission(ctx context.Context, req *permissions.CheckPermissionRequest, res *permissions.CheckPermissionResponse) error {
|
|
r, err := h.api.CheckPermission(ctx, req)
|
|
if r != nil {
|
|
*res = *r
|
|
}
|
|
return err
|
|
}
|