summaryrefslogtreecommitdiff
path: root/cmd/authzd/main.go
blob: 37d2cf5917503810aac77ef08456fe219ecf5a22 (plain)
1
2
3
4
5
6
7
8
9
10
11
12
13
14
15
16
17
18
19
20
21
22
23
24
25
26
27
28
29
30
31
32
33
34
35
36
37
38
39
40
41
42
43
44
45
46
47
48
49
50
51
52
53
54
55
56
57
58
59
60
61
62
63
64
65
66
67
68
69
70
71
72
package main

import (
	"context"
	"crypto/x509"
	"net"
	"os"
	"os/signal"
	"syscall"

	"github.com/xlgmokha/x/pkg/env"
	"github.com/xlgmokha/x/pkg/log"
	"github.com/xlgmokha/x/pkg/x"
	"gitlab.com/gitlab-org/software-supply-chain-security/authorization/sparkled/pkg/authz"
	"gitlab.com/gitlab-org/software-supply-chain-security/authorization/sparkled/pkg/pls"
	"google.golang.org/grpc"
	"google.golang.org/grpc/credentials"
	"google.golang.org/grpc/credentials/insecure"
)

func main() {
	logger := log.New(os.Stdout, log.Fields{"app": "authzd"})
	ctx := logger.WithContext(context.Background())

	host := env.Fetch("AUTHZD_HOST", "localhost:50051")
	connection, err := grpc.NewClient(
		host,
		grpc.WithTransportCredentials(credentialsFor(ctx, host)),
	)
	if err != nil {
		pls.LogErrorNow(ctx, err)
	}
	defer connection.Close()

	server := authz.New(authz.Connection.With(ctx, connection))

	c := make(chan os.Signal, 1)
	signal.Notify(c, syscall.SIGINT, syscall.SIGTERM)
	go func() {
		<-c
		server.GracefulStop()
		logger.Log().Str("status", "goodbye").Send()
	}()

	defer server.GracefulStop()
	logger.Log().Str("status", "ready").Send()
	socket := x.Must(net.Listen("tcp", ":10003"))
	pls.LogErrorNow(ctx, server.Serve(socket))
}

func credentialsFor(ctx context.Context, host string) credentials.TransportCredentials {
	if host == "" {
		return insecure.NewCredentials()
	}

	_, port, err := net.SplitHostPort(host)
	if err != nil {
		pls.LogError(ctx, err)
		return insecure.NewCredentials()
	}

	if port != "443" {
		return insecure.NewCredentials()
	}

	pool, err := x509.SystemCertPool()
	if err != nil {
		return insecure.NewCredentials()
	}

	return credentials.NewClientTLSFromCert(pool, "")
}