/
middlewares.go
120 lines (104 loc) · 3.35 KB
/
middlewares.go
1
2
3
4
5
6
7
8
9
10
11
12
13
14
15
16
17
18
19
20
21
22
23
24
25
26
27
28
29
30
31
32
33
34
35
36
37
38
39
40
41
42
43
44
45
46
47
48
49
50
51
52
53
54
55
56
57
58
59
60
61
62
63
64
65
66
67
68
69
70
71
72
73
74
75
76
77
78
79
80
81
82
83
84
85
86
87
88
89
90
91
92
93
94
95
96
97
98
99
100
101
102
103
104
105
106
107
108
109
110
111
112
113
114
115
116
117
118
119
120
package server
import (
"runtime/debug"
"strings"
log "github.com/Sirupsen/logrus"
context "golang.org/x/net/context"
"github.com/luizalabs/teresa/pkg/server/auth"
"github.com/luizalabs/teresa/pkg/server/database"
"github.com/luizalabs/teresa/pkg/server/teresa_errors"
"github.com/luizalabs/teresa/pkg/server/user"
"google.golang.org/grpc"
"google.golang.org/grpc/codes"
"google.golang.org/grpc/metadata"
"google.golang.org/grpc/status"
)
type serverStreamWrapper struct {
grpc.ServerStream
ctx context.Context
}
func (w *serverStreamWrapper) Context() context.Context {
return w.ctx
}
func loginStreamInterceptor(a auth.Auth, uOps user.Operations) grpc.StreamServerInterceptor {
return func(srv interface{}, stream grpc.ServerStream, info *grpc.StreamServerInfo, handler grpc.StreamHandler) error {
if strings.HasSuffix(info.FullMethod, "Login") {
return handler(srv, stream)
}
ctx := stream.Context()
user, err := authorize(ctx, a, uOps)
if err != nil {
return err
}
ctx = context.WithValue(ctx, "user", user)
wrap := &serverStreamWrapper{stream, ctx}
return handler(srv, wrap)
}
}
func loginUnaryInterceptor(a auth.Auth, uOps user.Operations) grpc.UnaryServerInterceptor {
return func(ctx context.Context, req interface{}, info *grpc.UnaryServerInfo, handler grpc.UnaryHandler) (interface{}, error) {
if strings.HasSuffix(info.FullMethod, "Login") {
return handler(ctx, req)
}
user, err := authorize(ctx, a, uOps)
if err != nil {
return nil, err
}
ctx = context.WithValue(ctx, "user", user)
return handler(ctx, req)
}
}
func authorize(ctx context.Context, a auth.Auth, uOps user.Operations) (*database.User, error) {
md, ok := metadata.FromContext(ctx)
if !ok {
return nil, auth.ErrPermissionDenied
}
if len(md["token"]) < 1 || md["token"][0] == "" {
return nil, auth.ErrPermissionDenied
}
email, err := a.ValidateToken(md["token"][0])
if err != nil {
return nil, err
}
return uOps.GetUser(email)
}
func buildRecFunc(dbg bool) func(p interface{}) error {
return func(p interface{}) error {
if dbg {
log.Error(string(debug.Stack()))
}
log.WithField("panic", p).Error("teresa-server recovered")
return status.Errorf(codes.Unknown, "Internal Server Error")
}
}
func isLoginOrUserCreate(method string) bool {
return strings.HasSuffix(method, "Login") || strings.HasSuffix(method, "User/Create")
}
func logUnaryInterceptor(ctx context.Context, req interface{}, info *grpc.UnaryServerInfo, handler grpc.UnaryHandler) (interface{}, error) {
resp, err := handler(ctx, req)
if err != nil {
logger := log.WithField("route", info.FullMethod)
if !isLoginOrUserCreate(info.FullMethod) {
logger = logger.WithField("request", req).WithError(err)
}
if u, ok := ctx.Value("user").(*database.User); ok {
logger = logger.WithField("user", u.Email)
}
logger.Error("Log Interceptor got an Error")
return resp, teresa_errors.Get(err)
}
return resp, nil
}
func logStreamInterceptor(srv interface{}, stream grpc.ServerStream, info *grpc.StreamServerInfo, handler grpc.StreamHandler) error {
err := handler(srv, stream)
if err != nil {
logger := log.WithField("route", info.FullMethod).WithError(err)
u, ok := stream.Context().Value("user").(*database.User)
if ok {
logger = logger.WithField("user", u.Email)
}
logger.Error("Log Interceptor got an Error")
return teresa_errors.Get(err)
}
return nil
}