123456789101112131415161718192021222324252627282930313233343536373839404142434445464748495051525354555657585960616263646566676869707172737475767778798081828384858687888990919293949596979899100101102103104105106107108109110111112113114115116117118119120121122123124125126127128129130131132133134135136137138139140141142143144145146147148149150151152153154155156157158159160161162163164165166167168169170171172173174175176177178179180181182183184185186187188189190191192193194195196197198199200201202203204205206207208209210211212213214215216217 |
- package rest
- import (
- "log"
- "net/http"
- "github.com/tal-tech/go-zero/core/logx"
- "github.com/tal-tech/go-zero/rest/handler"
- "github.com/tal-tech/go-zero/rest/httpx"
- "github.com/tal-tech/go-zero/rest/router"
- )
- type (
- runOptions struct {
- start func(*engine) error
- }
- // RunOption defines the method to customize a Server.
- RunOption func(*Server)
- // A Server is a http server.
- Server struct {
- ngin *engine
- opts runOptions
- }
- )
- // MustNewServer returns a server with given config of c and options defined in opts.
- // Be aware that later RunOption might overwrite previous one that write the same option.
- // The process will exit if error occurs.
- func MustNewServer(c RestConf, opts ...RunOption) *Server {
- engine, err := NewServer(c, opts...)
- if err != nil {
- log.Fatal(err)
- }
- return engine
- }
- // NewServer returns a server with given config of c and options defined in opts.
- // Be aware that later RunOption might overwrite previous one that write the same option.
- func NewServer(c RestConf, opts ...RunOption) (*Server, error) {
- if err := c.SetUp(); err != nil {
- return nil, err
- }
- server := &Server{
- ngin: newEngine(c),
- opts: runOptions{
- start: func(srv *engine) error {
- return srv.Start()
- },
- },
- }
- for _, opt := range opts {
- opt(server)
- }
- return server, nil
- }
- // AddRoutes add given routes into the Server.
- func (e *Server) AddRoutes(rs []Route, opts ...RouteOption) {
- r := featuredRoutes{
- routes: rs,
- }
- for _, opt := range opts {
- opt(&r)
- }
- e.ngin.AddRoutes(r)
- }
- // AddRoute adds given route into the Server.
- func (e *Server) AddRoute(r Route, opts ...RouteOption) {
- e.AddRoutes([]Route{r}, opts...)
- }
- // Start starts the Server.
- // Graceful shutdown is enabled by default.
- // Use proc.SetTimeToForceQuit to customize the graceful shutdown period.
- func (e *Server) Start() {
- handleError(e.opts.start(e.ngin))
- }
- // Stop stops the Server.
- func (e *Server) Stop() {
- logx.Close()
- }
- // Use adds the given middleware in the Server.
- func (e *Server) Use(middleware Middleware) {
- e.ngin.use(middleware)
- }
- // ToMiddleware converts the given handler to a Middleware.
- func ToMiddleware(handler func(next http.Handler) http.Handler) Middleware {
- return func(handle http.HandlerFunc) http.HandlerFunc {
- return handler(handle).ServeHTTP
- }
- }
- // WithJwt returns a func to enable jwt authentication in given route.
- func WithJwt(secret string) RouteOption {
- return func(r *featuredRoutes) {
- validateSecret(secret)
- r.jwt.enabled = true
- r.jwt.secret = secret
- }
- }
- // WithJwtTransition returns a func to enable jwt authentication as well as jwt secret transition.
- // Which means old and new jwt secrets work together for a period.
- func WithJwtTransition(secret, prevSecret string) RouteOption {
- return func(r *featuredRoutes) {
- // why not validate prevSecret, because prevSecret is an already used one,
- // even it not meet our requirement, we still need to allow the transition.
- validateSecret(secret)
- r.jwt.enabled = true
- r.jwt.secret = secret
- r.jwt.prevSecret = prevSecret
- }
- }
- // WithMiddlewares adds given middlewares to given routes.
- func WithMiddlewares(ms []Middleware, rs ...Route) []Route {
- for i := len(ms) - 1; i >= 0; i-- {
- rs = WithMiddleware(ms[i], rs...)
- }
- return rs
- }
- // WithMiddleware adds given middleware to given route.
- func WithMiddleware(middleware Middleware, rs ...Route) []Route {
- routes := make([]Route, len(rs))
- for i := range rs {
- route := rs[i]
- routes[i] = Route{
- Method: route.Method,
- Path: route.Path,
- Handler: middleware(route.Handler),
- }
- }
- return routes
- }
- // WithNotFoundHandler returns a RunOption with not found handler set to given handler.
- func WithNotFoundHandler(handler http.Handler) RunOption {
- rt := router.NewRouter()
- rt.SetNotFoundHandler(handler)
- return WithRouter(rt)
- }
- // WithNotAllowedHandler returns a RunOption with not allowed handler set to given handler.
- func WithNotAllowedHandler(handler http.Handler) RunOption {
- rt := router.NewRouter()
- rt.SetNotAllowedHandler(handler)
- return WithRouter(rt)
- }
- // WithPriority returns a RunOption with priority.
- func WithPriority() RouteOption {
- return func(r *featuredRoutes) {
- r.priority = true
- }
- }
- // WithRouter returns a RunOption that make server run with given router.
- func WithRouter(router httpx.Router) RunOption {
- return func(server *Server) {
- server.opts.start = func(srv *engine) error {
- return srv.StartWithRouter(router)
- }
- }
- }
- // WithSignature returns a RouteOption to enable signature verification.
- func WithSignature(signature SignatureConf) RouteOption {
- return func(r *featuredRoutes) {
- r.signature.enabled = true
- r.signature.Strict = signature.Strict
- r.signature.Expiry = signature.Expiry
- r.signature.PrivateKeys = signature.PrivateKeys
- }
- }
- // WithUnauthorizedCallback returns a RunOption that with given unauthorized callback set.
- func WithUnauthorizedCallback(callback handler.UnauthorizedCallback) RunOption {
- return func(engine *Server) {
- engine.ngin.SetUnauthorizedCallback(callback)
- }
- }
- // WithUnsignedCallback returns a RunOption that with given unsigned callback set.
- func WithUnsignedCallback(callback handler.UnsignedCallback) RunOption {
- return func(engine *Server) {
- engine.ngin.SetUnsignedCallback(callback)
- }
- }
- func handleError(err error) {
- // ErrServerClosed means the server is closed manually
- if err == nil || err == http.ErrServerClosed {
- return
- }
- logx.Error(err)
- panic(err)
- }
- func validateSecret(secret string) {
- if len(secret) < 8 {
- panic("secret's length can't be less than 8")
- }
- }
|