removed previous agent innards (#748)

This commit is contained in:
Michael Quigley 2024-09-12 13:07:27 -04:00
parent 42c3ec48b0
commit cf7cce0e70
No known key found for this signature in database
GPG Key ID: 9B60314A9DD20A62
3 changed files with 7 additions and 130 deletions

View File

@ -7,9 +7,8 @@ import (
) )
type share struct { type share struct {
shr *sdk.Share token string
target string target string
basicAuth []string basicAuth []string
frontendSelection []string frontendSelection []string
shareMode sdk.ShareMode shareMode sdk.ShareMode

View File

@ -4,11 +4,7 @@ import (
"context" "context"
"errors" "errors"
"github.com/openziti/zrok/agent/agentGrpc" "github.com/openziti/zrok/agent/agentGrpc"
"github.com/openziti/zrok/endpoints/proxy"
"github.com/openziti/zrok/environment" "github.com/openziti/zrok/environment"
"github.com/openziti/zrok/sdk/golang/sdk"
"github.com/sirupsen/logrus"
"time"
) )
func (i *agentGrpcImpl) PublicShare(_ context.Context, req *agentGrpc.PublicShareRequest) (*agentGrpc.PublicShareReply, error) { func (i *agentGrpcImpl) PublicShare(_ context.Context, req *agentGrpc.PublicShareRequest) (*agentGrpc.PublicShareReply, error) {
@ -21,108 +17,5 @@ func (i *agentGrpcImpl) PublicShare(_ context.Context, req *agentGrpc.PublicShar
return nil, errors.New("unable to load environment; did you 'zrok enable'?") return nil, errors.New("unable to load environment; did you 'zrok enable'?")
} }
zif, err := root.ZitiIdentityNamed(root.EnvironmentIdentityName()) return &agentGrpc.PublicShareReply{}, nil
if err != nil {
return nil, err
}
shrReq := &sdk.ShareRequest{
BackendMode: sdk.BackendMode(req.BackendMode),
ShareMode: sdk.PublicShareMode,
Frontends: req.FrontendSelection,
BasicAuth: req.BasicAuth,
Target: req.Target,
}
if req.Closed {
shrReq.PermissionMode = sdk.ClosedPermissionMode
shrReq.AccessGrants = req.AccessGrants
}
if req.OauthProvider != "" {
shrReq.OauthProvider = req.OauthProvider
shrReq.OauthEmailAddressPatterns = req.OauthEmailAddressPatterns
checkInterval, err := time.ParseDuration(req.GetOauthCheckInterval())
if err != nil {
return nil, err
}
shrReq.OauthAuthorizationCheckInterval = checkInterval
}
shr, err := sdk.CreateShare(root, shrReq)
if err != nil {
return nil, err
}
switch req.BackendMode {
case "proxy":
cfg := &proxy.BackendConfig{
IdentityPath: zif,
EndpointAddress: req.Target,
ShrToken: shr.Token,
Insecure: req.Insecure,
}
be, err := proxy.NewBackend(cfg)
if err != nil {
return nil, err
}
agentShr := &share{
shr: shr,
target: req.Target,
basicAuth: req.BasicAuth,
frontendSelection: shr.FrontendEndpoints,
shareMode: sdk.PublicShareMode,
backendMode: sdk.BackendMode(req.BackendMode),
insecure: req.Insecure,
oauthProvider: req.OauthProvider,
oauthEmailAddressPatterns: req.OauthEmailAddressPatterns,
oauthCheckInterval: shrReq.OauthAuthorizationCheckInterval,
closed: req.Closed,
accessGrants: req.AccessGrants,
handler: be,
}
i.a.shares[shr.Token] = agentShr
go func() {
if err := agentShr.handler.Run(); err != nil {
logrus.Errorf("error running proxy backend: %v", err)
}
}()
case "web":
cfg := &proxy.CaddyWebBackendConfig{
IdentityPath: zif,
WebRoot: req.Target,
ShrToken: shr.Token,
}
be, err := proxy.NewCaddyWebBackend(cfg)
if err != nil {
return nil, err
}
agentShr := &share{
shr: shr,
target: req.Target,
basicAuth: req.BasicAuth,
frontendSelection: shr.FrontendEndpoints,
shareMode: sdk.PublicShareMode,
backendMode: sdk.BackendMode(req.BackendMode),
insecure: req.Insecure,
oauthProvider: req.OauthProvider,
oauthEmailAddressPatterns: req.OauthEmailAddressPatterns,
oauthCheckInterval: shrReq.OauthAuthorizationCheckInterval,
closed: req.Closed,
accessGrants: req.AccessGrants,
handler: be,
}
i.a.shares[shr.Token] = agentShr
go func() {
if err := agentShr.handler.Run(); err != nil {
logrus.Errorf("error running web backend: %v", err)
}
}()
}
return &agentGrpc.PublicShareReply{Token: shr.Token}, nil
} }

View File

@ -3,34 +3,19 @@ package agent
import ( import (
"context" "context"
"github.com/openziti/zrok/agent/agentGrpc" "github.com/openziti/zrok/agent/agentGrpc"
"github.com/openziti/zrok/environment"
"github.com/openziti/zrok/sdk/golang/sdk"
"github.com/pkg/errors" "github.com/pkg/errors"
"github.com/sirupsen/logrus" "github.com/sirupsen/logrus"
) )
func (i *agentGrpcImpl) ReleaseShare(_ context.Context, req *agentGrpc.ReleaseShareRequest) (*agentGrpc.ReleaseShareReply, error) { func (i *agentGrpcImpl) ReleaseShare(_ context.Context, req *agentGrpc.ReleaseShareRequest) (*agentGrpc.ReleaseShareReply, error) {
if shr, found := i.a.shares[req.Token]; found { if shr, found := i.a.shares[req.Token]; found {
logrus.Infof("stopping share '%v'", shr.shr.Token) logrus.Infof("stopping share '%v'", shr.token)
if err := shr.handler.Stop(); err != nil { if err := shr.handler.Stop(); err != nil {
logrus.Errorf("error stopping share '%v': %v", shr.shr.Token, err) logrus.Errorf("error stopping share '%v': %v", shr.token, err)
} }
root, err := environment.LoadRoot() delete(i.a.shares, shr.token)
if err != nil { logrus.Infof("released share '%v'", shr.token)
return nil, err
}
if !root.IsEnabled() {
return nil, errors.New("unable to load environment; did you 'zrok enable'?")
}
if err := sdk.DeleteShare(root, shr.shr); err != nil {
logrus.Errorf("error releasing share '%v': %v", shr.shr.Token, err)
}
delete(i.a.shares, shr.shr.Token)
logrus.Infof("released share '%v'", shr.shr.Token)
} else { } else {
return nil, errors.Errorf("agent has no share with token '%v'", req.Token) return nil, errors.Errorf("agent has no share with token '%v'", req.Token)
} }