proxy/server/server.go
2023-10-23 21:20:18 +02:00

193 lines
4.6 KiB
Go

package server
import (
"context"
"encoding/json"
"io"
"log/slog"
"net/http"
"net/url"
"strings"
"time"
"git.t-juice.club/microfilm/auth"
"git.t-juice.club/microfilm/auth/authmw"
"git.t-juice.club/microfilm/proxy"
"github.com/go-chi/chi/v5"
"github.com/go-chi/chi/v5/middleware"
"github.com/nats-io/nats.go"
"go.opentelemetry.io/contrib/instrumentation/net/http/otelhttp"
"go.opentelemetry.io/otel"
"go.opentelemetry.io/otel/exporters/otlp/otlptrace/otlptracehttp"
"go.opentelemetry.io/otel/propagation"
"go.opentelemetry.io/otel/sdk/resource"
tracesdk "go.opentelemetry.io/otel/sdk/trace"
semconv "go.opentelemetry.io/otel/semconv/v1.21.0"
"go.opentelemetry.io/otel/trace"
)
type Service string
const (
ServiceUser Service = "user"
ServiceAuth Service = "auth"
ServiceMovies Service = "movies"
)
type Server struct {
Logger *slog.Logger
config *Config
nats *nats.EncodedConn
http.Server
}
func NewServer(config *Config) (*Server, error) {
srv := &Server{}
srv.config = config
r := chi.NewRouter()
r.Use(middleware.RealIP)
r.Use(middleware.RequestID)
r.Use(srv.MiddlewareTracing)
r.Use(srv.MiddlewareLogging)
r.Get("/info", InfoHandler)
r.Handle("/user/*", srv.ProxyHandler(ServiceUser))
r.Handle("/auth/*", srv.ProxyHandler(ServiceAuth))
r.With(authmw.VerifyToken("http://mf-auth:8082", []string{auth.RoleAdmin})).Get("/testauth/admin", InfoHandler)
srv.Handler = r
srv.Addr = config.ListenAddr
tp, err := tracerProvider("jaeger:4318")
if err != nil {
return nil, err
}
otel.SetTracerProvider(tp)
return srv, nil
}
func tracerProvider(url string) (*tracesdk.TracerProvider, error) {
exp, err := otlptracehttp.New(context.Background(), otlptracehttp.WithEndpoint(url), otlptracehttp.WithInsecure())
if err != nil {
return nil, err
}
res := resource.NewWithAttributes(semconv.SchemaURL,
semconv.ServiceName("mf-proxy"),
semconv.ServiceVersion(proxy.Version),
)
tp := tracesdk.NewTracerProvider(
tracesdk.WithBatcher(exp, tracesdk.WithBatchTimeout(time.Second)),
tracesdk.WithResource(res),
)
otel.SetTracerProvider(tp)
otel.SetTextMapPropagator(propagation.NewCompositeTextMapPropagator(propagation.TraceContext{}, propagation.Baggage{}))
return tp, nil
}
func InfoHandler(w http.ResponseWriter, r *http.Request) {
enc := json.NewEncoder(w)
data := &proxy.InfoResponse{
Version: proxy.Version,
}
_ = enc.Encode(data)
}
func WriteError(w http.ResponseWriter, response proxy.ErrorResponse) {
w.WriteHeader(response.Status)
encoder := json.NewEncoder(w)
_ = encoder.Encode(&response)
}
func (s *Server) ProxyHandler(service Service) http.Handler {
fn := func(w http.ResponseWriter, r *http.Request) {
ctx := r.Context()
client := http.Client{
Transport: otelhttp.NewTransport(http.DefaultTransport),
}
defer r.Body.Close()
newURL := s.convertURL(r.URL, service)
span := trace.SpanFromContext(ctx)
span.AddEvent("Do proxy forward")
req, err := http.NewRequestWithContext(ctx, r.Method, newURL.String(), r.Body)
if err != nil {
s.Logger.Warn("Failed to create forwarding request.", "error", err, "url", newURL)
WriteError(w, proxy.ErrorResponse{
Status: http.StatusInternalServerError,
Message: "Failed to create request.",
})
return
}
for k, h := range r.Header {
for _, v := range h {
req.Header.Add(k, v)
}
}
req.Header.Add("X-Forwarded-For", r.RemoteAddr)
reqID := middleware.GetReqID(r.Context())
req.Header.Add("X-Request-Id", reqID)
resp, err := client.Do(req)
if err != nil {
s.Logger.Warn("Failed to perform forwarding request.", "error", err, "url", newURL)
WriteError(w, proxy.ErrorResponse{
Status: http.StatusInternalServerError,
Message: "Failed to create request.",
})
}
defer resp.Body.Close()
for key, values := range resp.Header {
for _, value := range values {
w.Header().Add(key, value)
}
}
w.WriteHeader(resp.StatusCode)
_, _ = io.Copy(w, resp.Body)
s.Logger.Debug("Performed proxy request.", "new_url", newURL, "original_url", r.URL.String(), "reqID", reqID)
}
return http.HandlerFunc(fn)
}
func (s *Server) convertURL(requestURL *url.URL, service Service) *url.URL {
oldURL := *requestURL
var targetURL *url.URL
var err error
var stripPrefix string
switch service {
case ServiceAuth:
targetURL, err = url.Parse(s.config.AuthServiceBaseURL)
if err != nil {
panic(err)
}
stripPrefix = "/auth"
case ServiceUser:
targetURL, err = url.Parse(s.config.UserServiceBaseURL)
if err != nil {
panic(err)
}
stripPrefix = "/user"
}
oldURL.Scheme = targetURL.Scheme
oldURL.Host = targetURL.Host
oldURL.Path, _ = strings.CutPrefix(oldURL.Path, stripPrefix)
return &oldURL
}