main.go 5.3 KB

123456789101112131415161718192021222324252627282930313233343536373839404142434445464748495051525354555657585960616263646566676869707172737475767778798081828384858687888990919293949596979899100101102103104105106107108109110111112113114115116117118119120121122123124125126127128129130131132133134135136137138139140141142143144145146147148149150151152153154155156157158159160161162163164165
  1. package main
  2. import (
  3. "context"
  4. "fmt"
  5. grpcc "github.com/go-micro/plugins/v4/client/grpc"
  6. "github.com/go-micro/plugins/v4/registry/consul"
  7. grpcs "github.com/go-micro/plugins/v4/server/grpc"
  8. "github.com/go-micro/plugins/v4/wrapper/trace/opentelemetry"
  9. "github.com/google/uuid"
  10. "github.com/redis/go-redis/v9"
  11. "github.com/sirupsen/logrus"
  12. "go-micro.dev/v4"
  13. "go-micro.dev/v4/auth"
  14. "go-micro.dev/v4/registry"
  15. "go-micro.dev/v4/server"
  16. "go.opentelemetry.io/otel"
  17. "go.opentelemetry.io/otel/propagation"
  18. "gorm.io/driver/mysql"
  19. "gorm.io/gorm"
  20. "gorm.io/gorm/schema"
  21. "sghgogs.com/micro/auth-service/config"
  22. req "sghgogs.com/micro/auth-service/domain/model/request"
  23. "sghgogs.com/micro/auth-service/domain/repository"
  24. "sghgogs.com/micro/auth-service/domain/service"
  25. admin_common "sghgogs.com/micro/auth-service/handler/admin/common"
  26. admin_permission "sghgogs.com/micro/auth-service/handler/admin/permission"
  27. admin_role "sghgogs.com/micro/auth-service/handler/admin/role"
  28. "sghgogs.com/micro/auth-service/handler/admin/team"
  29. admin_user "sghgogs.com/micro/auth-service/handler/admin/user"
  30. pb "sghgogs.com/micro/auth-service/proto"
  31. "sghgogs.com/micro/auth-service/utils/authutil"
  32. "sghgogs.com/micro/auth-service/utils/middleware"
  33. "sghgogs.com/micro/auth-service/utils/tracing"
  34. "strings"
  35. "time"
  36. )
  37. var (
  38. name = "authorizationservice"
  39. version = "1.0.0"
  40. )
  41. func main() {
  42. // Load conigurations
  43. if err := config.Load(); err != nil {
  44. logrus.Fatal(err)
  45. }
  46. // 1. 连接数据库
  47. var db *gorm.DB
  48. if cfg := config.DataBase(); cfg.Enable {
  49. address := fmt.Sprintf("%v:%v@(%v:%v)/%v?charset=utf8mb4,utf8&parseTime=True&loc=Local", cfg.Mysql.User, cfg.Mysql.Password, cfg.Mysql.Host, cfg.Mysql.Port, cfg.Mysql.DataBase)
  50. db, _ = gorm.Open(mysql.Open(address), &gorm.Config{
  51. // Logger: logger.Default.LogMode(logger.Info),
  52. NamingStrategy: schema.NamingStrategy{
  53. SingularTable: true,
  54. }})
  55. } else {
  56. // 没有配置数据库
  57. logrus.Info("There is no database configured")
  58. }
  59. if cfg := config.RedisAddress(); cfg.Enable {
  60. // UpdateRulesItems
  61. roles := make([]req.AdminRole, 0)
  62. db.Model(&req.AdminRole{}).Where("status = ?", pb.StatusEnum_ENABLED).Preload("Permissions", "status = ?", pb.StatusEnum_ENABLED).Find(&roles)
  63. authutil.NewJWTAuth(redis.NewClient(&redis.Options{
  64. Addr: cfg.URL, // Redis 服务器地址
  65. Password: cfg.Password, // Redis 密码,如果有的话
  66. DB: 0, // 默认数据库
  67. }), name, cfg.Enable)
  68. // cfg.Password
  69. authutil.JWTAuthService.SetRuleItems(UpdateRulesItems(roles))
  70. }
  71. // 2. Create service
  72. srv := micro.NewService(
  73. micro.Server(grpcs.NewServer()),
  74. micro.Client(grpcc.NewClient()),
  75. )
  76. authService := authutil.JWTAuthService.Auth
  77. opts := []micro.Option{
  78. micro.Name(name),
  79. micro.Version(version),
  80. micro.Address(config.Address()),
  81. micro.Auth(
  82. authService,
  83. ),
  84. }
  85. // 3.添加注册中心
  86. if cfg := config.Registry(); cfg.Enable {
  87. logrus.Info("添加注册中心")
  88. consul := consul.NewRegistry(func(options *registry.Options) {
  89. options.Addrs = []string{
  90. cfg.Consul.URL,
  91. }
  92. })
  93. opts = append(opts, micro.Registry(consul))
  94. }
  95. // 4.添加链路追踪
  96. if cfg := config.Tracing(); cfg.Enable {
  97. fmt.Println("加入进来了")
  98. tp, err := tracing.NewTracerProvider(name, version, srv.Server().Options().Id, cfg.Jaeger.URL)
  99. if err != nil {
  100. logrus.Fatal(err)
  101. }
  102. defer func() {
  103. ctx, cancel := context.WithTimeout(context.Background(), time.Second*5)
  104. defer cancel()
  105. if err := tp.Shutdown(ctx); err != nil {
  106. logrus.Fatal(err)
  107. }
  108. }()
  109. otel.SetTracerProvider(tp)
  110. otel.SetTextMapPropagator(propagation.NewCompositeTextMapPropagator(propagation.TraceContext{}, propagation.Baggage{}))
  111. traceOpts := []opentelemetry.Option{
  112. opentelemetry.WithHandleFilter(func(ctx context.Context, r server.Request) bool {
  113. if e := r.Endpoint(); strings.HasPrefix(e, "Health.") {
  114. return true
  115. }
  116. return false
  117. }),
  118. }
  119. opts = append(opts, micro.WrapHandler(opentelemetry.NewHandlerWrapper(traceOpts...)))
  120. }
  121. opts = append(opts, micro.WrapHandler(middleware.NewAuthWrapper(srv)))
  122. srv.Init(opts...)
  123. // authutil.JWTAuthService.Client
  124. // 5. 初始化数据库
  125. newRepository := repository.NewRepository(db)
  126. newRepository.InitTable()
  127. // 6.初始化 service
  128. newService := service.NewService(newRepository, name)
  129. // 注册 Register handler
  130. pb.RegisterCommonServiceHandler(srv.Server(), &admin_common.Common{Service: newService})
  131. pb.RegisterAdminRoleServiceHandler(srv.Server(), &admin_role.Role{Service: newService})
  132. pb.RegisterAdminUserServiceHandler(srv.Server(), &admin_user.User{Service: newService})
  133. pb.RegisterAdminPermissionServiceHandler(srv.Server(), &admin_permission.Permission{Service: newService})
  134. pb.RegisterTeamServiceHandler(srv.Server(), &team.Team{Service: newService})
  135. // Run service
  136. logrus.Info("Run service")
  137. if err := srv.Run(); err != nil {
  138. logrus.Fatal(err)
  139. }
  140. }
  141. func UpdateRulesItems(roles []req.AdminRole) []*auth.Rule {
  142. rules := make([]*auth.Rule, 0)
  143. for _, role := range roles {
  144. for _, permission := range role.Permissions {
  145. rules = append(rules, &auth.Rule{
  146. Resource: &auth.Resource{
  147. Name: permission.Name,
  148. Type: "user",
  149. Endpoint: permission.Endpoint,
  150. },
  151. ID: uuid.New().String(),
  152. Scope: role.Name,
  153. Priority: 1,
  154. })
  155. }
  156. }
  157. return rules
  158. }