mirror of
https://github.com/opencloud-eu/opencloud.git
synced 2025-12-26 15:50:47 -05:00
Co-authored-by: Florian Schade <f.schade@opencloud.eu> Signed-off-by: Christian Richter <c.richter@opencloud.eu>
194 lines
7.1 KiB
Go
194 lines
7.1 KiB
Go
package http
|
|
|
|
import (
|
|
"context"
|
|
"errors"
|
|
"fmt"
|
|
stdhttp "net/http"
|
|
|
|
gateway "github.com/cs3org/go-cs3apis/cs3/gateway/v1beta1"
|
|
chimiddleware "github.com/go-chi/chi/v5/middleware"
|
|
"github.com/opencloud-eu/reva/v2/pkg/events/stream"
|
|
"github.com/opencloud-eu/reva/v2/pkg/rgrpc/todo/pool"
|
|
revaMetadata "github.com/opencloud-eu/reva/v2/pkg/storage/utils/metadata"
|
|
"go-micro.dev/v4"
|
|
"go-micro.dev/v4/events"
|
|
|
|
"github.com/opencloud-eu/opencloud/pkg/account"
|
|
"github.com/opencloud-eu/opencloud/pkg/cors"
|
|
"github.com/opencloud-eu/opencloud/pkg/generators"
|
|
"github.com/opencloud-eu/opencloud/pkg/keycloak"
|
|
"github.com/opencloud-eu/opencloud/pkg/middleware"
|
|
"github.com/opencloud-eu/opencloud/pkg/registry"
|
|
"github.com/opencloud-eu/opencloud/pkg/service/grpc"
|
|
"github.com/opencloud-eu/opencloud/pkg/service/http"
|
|
"github.com/opencloud-eu/opencloud/pkg/storage/metadata"
|
|
"github.com/opencloud-eu/opencloud/pkg/version"
|
|
ehsvc "github.com/opencloud-eu/opencloud/protogen/gen/opencloud/services/eventhistory/v0"
|
|
searchsvc "github.com/opencloud-eu/opencloud/protogen/gen/opencloud/services/search/v0"
|
|
settingssvc "github.com/opencloud-eu/opencloud/protogen/gen/opencloud/services/settings/v0"
|
|
graphMiddleware "github.com/opencloud-eu/opencloud/services/graph/pkg/middleware"
|
|
svc "github.com/opencloud-eu/opencloud/services/graph/pkg/service/v0"
|
|
)
|
|
|
|
// Server initializes the http service and server.
|
|
func Server(opts ...Option) (http.Service, error) {
|
|
options := newOptions(opts...)
|
|
|
|
service, err := http.NewService(
|
|
http.TLSConfig(options.Config.HTTP.TLS),
|
|
http.Logger(options.Logger),
|
|
http.Namespace(options.Config.HTTP.Namespace),
|
|
http.Name(options.Config.Service.Name),
|
|
http.Version(version.GetString()),
|
|
http.Address(options.Config.HTTP.Addr),
|
|
http.Context(options.Context),
|
|
http.Flags(options.Flags...),
|
|
http.TraceProvider(options.TraceProvider),
|
|
)
|
|
if err != nil {
|
|
options.Logger.Error().
|
|
Err(err).
|
|
Msg("Error initializing http service")
|
|
return http.Service{}, fmt.Errorf("could not initialize http service: %w", err)
|
|
}
|
|
|
|
var eventsStream events.Stream
|
|
|
|
if options.Config.Events.Endpoint != "" {
|
|
var err error
|
|
connName := generators.GenerateConnectionName(options.Config.Service.Name, generators.NTypeBus)
|
|
eventsStream, err = stream.NatsFromConfig(connName, false, stream.NatsConfig(options.Config.Events))
|
|
if err != nil {
|
|
options.Logger.Error().
|
|
Err(err).
|
|
Msg("Error initializing events publisher")
|
|
return http.Service{}, fmt.Errorf("could not initialize events publisher: %w", err)
|
|
}
|
|
}
|
|
|
|
middlewares := []func(stdhttp.Handler) stdhttp.Handler{
|
|
middleware.TraceContext,
|
|
chimiddleware.RequestID,
|
|
middleware.Version(
|
|
options.Config.Service.Name,
|
|
version.GetString(),
|
|
),
|
|
middleware.Logger(
|
|
options.Logger,
|
|
),
|
|
middleware.Cors(
|
|
cors.Logger(options.Logger),
|
|
cors.AllowedOrigins(options.Config.HTTP.CORS.AllowedOrigins),
|
|
cors.AllowedMethods(options.Config.HTTP.CORS.AllowedMethods),
|
|
cors.AllowedHeaders(options.Config.HTTP.CORS.AllowedHeaders),
|
|
cors.AllowCredentials(options.Config.HTTP.CORS.AllowCredentials),
|
|
),
|
|
}
|
|
// how do we secure the api?
|
|
var requireAdminMiddleware func(stdhttp.Handler) stdhttp.Handler
|
|
var roleService svc.RoleService
|
|
var valueService settingssvc.ValueService
|
|
var gatewaySelector pool.Selectable[gateway.GatewayAPIClient]
|
|
grpcClient, err := grpc.NewClient(append(grpc.GetClientOptions(options.Config.GRPCClientTLS), grpc.WithTraceProvider(options.TraceProvider))...)
|
|
if err != nil {
|
|
return http.Service{}, err
|
|
}
|
|
if options.Config.HTTP.APIToken == "" {
|
|
middlewares = append(middlewares,
|
|
graphMiddleware.Auth(
|
|
account.Logger(options.Logger),
|
|
account.JWTSecret(options.Config.TokenManager.JWTSecret),
|
|
))
|
|
roleService = settingssvc.NewRoleService("eu.opencloud.api.settings", grpcClient)
|
|
valueService = settingssvc.NewValueService("eu.opencloud.api.settings", grpcClient)
|
|
gatewaySelector, err = pool.GatewaySelector(
|
|
options.Config.Reva.Address,
|
|
append(
|
|
options.Config.Reva.GetRevaOptions(),
|
|
pool.WithRegistry(registry.GetRegistry()),
|
|
pool.WithTracerProvider(options.TraceProvider),
|
|
)...)
|
|
if err != nil {
|
|
return http.Service{}, fmt.Errorf("could not initialize gateway selector: %w", err)
|
|
}
|
|
} else {
|
|
middlewares = append(middlewares, graphMiddleware.Token(options.Config.HTTP.APIToken))
|
|
// use a dummy admin middleware for the chi router
|
|
requireAdminMiddleware = func(next stdhttp.Handler) stdhttp.Handler {
|
|
return next
|
|
}
|
|
// no gateway client needed
|
|
}
|
|
|
|
// Keycloak client is optional, so if it stays nil, it's fine.
|
|
var keyCloakClient keycloak.Client
|
|
if options.Config.Keycloak.BasePath != "" {
|
|
kcc := options.Config.Keycloak
|
|
if kcc.ClientID == "" || kcc.ClientSecret == "" || kcc.ClientRealm == "" || kcc.UserRealm == "" {
|
|
return http.Service{}, errors.New("keycloak client id, secret, client realm and user realm must be set")
|
|
}
|
|
keyCloakClient = keycloak.New(kcc.BasePath, kcc.ClientID, kcc.ClientSecret, kcc.ClientRealm, kcc.InsecureSkipVerify)
|
|
}
|
|
|
|
hClient := ehsvc.NewEventHistoryService("eu.opencloud.api.eventhistory", grpcClient)
|
|
|
|
var userProfilePhotoService svc.UsersUserProfilePhotoProvider
|
|
{
|
|
photoStorage, err := revaMetadata.NewCS3Storage(
|
|
options.Config.Metadata.GatewayAddress,
|
|
options.Config.Metadata.StorageAddress,
|
|
options.Config.Metadata.SystemUserID,
|
|
options.Config.Metadata.SystemUserIDP,
|
|
options.Config.Metadata.SystemUserAPIKey,
|
|
)
|
|
if err != nil {
|
|
return http.Service{}, fmt.Errorf("could not initialize reva metadata storage: %w", err)
|
|
}
|
|
|
|
photoStorage, err = metadata.NewLazyStorage(photoStorage)
|
|
if err != nil {
|
|
return http.Service{}, fmt.Errorf("could not initialize lazy metadata storage: %w", err)
|
|
}
|
|
|
|
if err := photoStorage.Init(context.Background(), "f2bdd61a-da7c-49fc-8203-0558109d1b4f"); err != nil {
|
|
return http.Service{}, fmt.Errorf("could not initialize metadata storage: %w", err)
|
|
}
|
|
|
|
userProfilePhotoService, err = svc.NewUsersUserProfilePhotoService(photoStorage)
|
|
if err != nil {
|
|
return http.Service{}, fmt.Errorf("could not initialize user profile photo service: %w", err)
|
|
}
|
|
}
|
|
|
|
var handle svc.Service
|
|
handle, err = svc.NewService(
|
|
svc.Context(options.Context),
|
|
svc.UserProfilePhotoService(userProfilePhotoService),
|
|
svc.Logger(options.Logger),
|
|
svc.Config(options.Config),
|
|
svc.Middleware(middlewares...),
|
|
svc.EventsPublisher(eventsStream),
|
|
svc.EventsConsumer(eventsStream),
|
|
svc.WithRoleService(roleService),
|
|
svc.WithValueService(valueService),
|
|
svc.WithRequireAdminMiddleware(requireAdminMiddleware),
|
|
svc.WithGatewaySelector(gatewaySelector),
|
|
svc.WithSearchService(searchsvc.NewSearchProviderService("eu.opencloud.api.search", grpcClient)),
|
|
svc.KeycloakClient(keyCloakClient),
|
|
svc.EventHistoryClient(hClient),
|
|
svc.TraceProvider(options.TraceProvider),
|
|
svc.WithNatsKeyValue(options.NatsKeyValue),
|
|
)
|
|
|
|
if err != nil {
|
|
return http.Service{}, fmt.Errorf("could not initialize graph service: %w", err)
|
|
}
|
|
|
|
if err := micro.RegisterHandler(service.Server(), handle); err != nil {
|
|
return http.Service{}, fmt.Errorf("could not register graph service handler: %w", err)
|
|
}
|
|
|
|
return service, nil
|
|
}
|