mirror of
https://github.com/fnproject/fn.git
synced 2022-10-28 21:29:17 +03:00
* Adding a way to inject a request ID It is very useful to associate a request ID to each incoming request, this change allows to provide a function to do that via Server Option. The change comes with a default function which will generate a new request ID. The request ID is put in the request context along with a common logger which always logs the request-id We add gRPC interceptors to the server so it can get the request ID out of the gRPC metadata and put it in the common logger stored in the context so as all the log lines using the common logger from the context will have the request ID logged
39 lines
1.3 KiB
Go
39 lines
1.3 KiB
Go
// Copyright 2016 Michal Witkowski. All Rights Reserved.
|
|
// See LICENSE for licensing terms.
|
|
|
|
package grpc_auth
|
|
|
|
import (
|
|
"strings"
|
|
|
|
"github.com/grpc-ecosystem/go-grpc-middleware/util/metautils"
|
|
"golang.org/x/net/context"
|
|
"google.golang.org/grpc"
|
|
"google.golang.org/grpc/codes"
|
|
)
|
|
|
|
var (
|
|
headerAuthorize = "authorization"
|
|
)
|
|
|
|
// AuthFromMD is a helper function for extracting the :authorization header from the gRPC metadata of the request.
|
|
//
|
|
// It expects the `:authorization` header to be of a certain scheme (e.g. `basic`, `bearer`), in a
|
|
// case-insensitive format (see rfc2617, sec 1.2). If no such authorization is found, or the token
|
|
// is of wrong scheme, an error with gRPC status `Unauthenticated` is returned.
|
|
func AuthFromMD(ctx context.Context, expectedScheme string) (string, error) {
|
|
val := metautils.ExtractIncoming(ctx).Get(headerAuthorize)
|
|
if val == "" {
|
|
return "", grpc.Errorf(codes.Unauthenticated, "Request unauthenticated with "+expectedScheme)
|
|
|
|
}
|
|
splits := strings.SplitN(val, " ", 2)
|
|
if len(splits) < 2 {
|
|
return "", grpc.Errorf(codes.Unauthenticated, "Bad authorization string")
|
|
}
|
|
if strings.ToLower(splits[0]) != strings.ToLower(expectedScheme) {
|
|
return "", grpc.Errorf(codes.Unauthenticated, "Request unauthenticated with "+expectedScheme)
|
|
}
|
|
return splits[1], nil
|
|
}
|