forked from extern/smegmesh
Implemented JWT authentication
This commit is contained in:
parent
c819bec63d
commit
94afd68460
3
.vscode/settings.json
vendored
3
.vscode/settings.json
vendored
@ -1,5 +1,4 @@
|
|||||||
{
|
{
|
||||||
"editor.insertSpaces": true,
|
|
||||||
"editor.tabSize": 4,
|
"editor.tabSize": 4,
|
||||||
"editor.detectIndentation": false
|
"editor.detectIndentation": true
|
||||||
}
|
}
|
3
cmd/wgmeshd/configuration.yaml
Normal file
3
cmd/wgmeshd/configuration.yaml
Normal file
@ -0,0 +1,3 @@
|
|||||||
|
certificatePath: "../../cert/cert.pem"
|
||||||
|
privateKeyPath: "../../cert/key.pem"
|
||||||
|
skipCertVerification: true
|
@ -4,8 +4,11 @@ import (
|
|||||||
"log"
|
"log"
|
||||||
"net"
|
"net"
|
||||||
|
|
||||||
|
"github.com/tim-beatham/wgmesh/pkg/conf"
|
||||||
|
"github.com/tim-beatham/wgmesh/pkg/conn"
|
||||||
ctrlserver "github.com/tim-beatham/wgmesh/pkg/ctrlserver"
|
ctrlserver "github.com/tim-beatham/wgmesh/pkg/ctrlserver"
|
||||||
"github.com/tim-beatham/wgmesh/pkg/ipc"
|
"github.com/tim-beatham/wgmesh/pkg/ipc"
|
||||||
|
"github.com/tim-beatham/wgmesh/pkg/middleware"
|
||||||
"github.com/tim-beatham/wgmesh/pkg/robin"
|
"github.com/tim-beatham/wgmesh/pkg/robin"
|
||||||
"github.com/tim-beatham/wgmesh/pkg/rpc"
|
"github.com/tim-beatham/wgmesh/pkg/rpc"
|
||||||
wg "github.com/tim-beatham/wgmesh/pkg/wg"
|
wg "github.com/tim-beatham/wgmesh/pkg/wg"
|
||||||
@ -20,7 +23,21 @@ func main() {
|
|||||||
log.Fatalf("Could not create interface %s\n", ifName)
|
log.Fatalf("Could not create interface %s\n", ifName)
|
||||||
}
|
}
|
||||||
|
|
||||||
ctrlServer := ctrlserver.NewCtrlServer(wgClient, "wgmesh")
|
conf, err := conf.ParseConfiguration("./configuration.yaml")
|
||||||
|
|
||||||
|
newConnParams := conn.NewConnectionsParams{
|
||||||
|
CertificatePath: conf.CertificatePath,
|
||||||
|
PrivateKey: conf.PrivateKeyPath,
|
||||||
|
SkipCertVerification: conf.SkipCertVerification,
|
||||||
|
}
|
||||||
|
|
||||||
|
conn, err := conn.NewConnection(&newConnParams)
|
||||||
|
|
||||||
|
if err != nil {
|
||||||
|
return
|
||||||
|
}
|
||||||
|
|
||||||
|
ctrlServer := ctrlserver.NewCtrlServer(wgClient, conn, "wgmesh")
|
||||||
|
|
||||||
log.Println("Running IPC Handler")
|
log.Println("Running IPC Handler")
|
||||||
|
|
||||||
@ -28,7 +45,9 @@ func main() {
|
|||||||
robinRpc := robin.NewRobinRpc(ctrlServer)
|
robinRpc := robin.NewRobinRpc(ctrlServer)
|
||||||
|
|
||||||
go ipc.RunIpcHandler(robinIpc)
|
go ipc.RunIpcHandler(robinIpc)
|
||||||
grpc := rpc.NewRpcServer(*&robinRpc)
|
|
||||||
|
grpc := conn.Listen(ctrlServer.JwtManager.GetAuthInterceptor())
|
||||||
|
rpc.NewRpcServer(grpc, robinRpc, middleware.NewAuthProvider(ctrlServer))
|
||||||
|
|
||||||
lis, err := net.Listen("tcp", ":8080")
|
lis, err := net.Listen("tcp", ":8080")
|
||||||
if err := grpc.Serve(lis); err != nil {
|
if err := grpc.Serve(lis); err != nil {
|
||||||
|
121
pkg/auth/jwt.go
Normal file
121
pkg/auth/jwt.go
Normal file
@ -0,0 +1,121 @@
|
|||||||
|
package auth
|
||||||
|
|
||||||
|
import (
|
||||||
|
"context"
|
||||||
|
"errors"
|
||||||
|
"time"
|
||||||
|
|
||||||
|
"github.com/golang-jwt/jwt/v5"
|
||||||
|
"google.golang.org/grpc"
|
||||||
|
"google.golang.org/grpc/codes"
|
||||||
|
"google.golang.org/grpc/metadata"
|
||||||
|
"google.golang.org/grpc/status"
|
||||||
|
)
|
||||||
|
|
||||||
|
// JwtMesh contains all the sessions with the mesh network
|
||||||
|
type JwtMesh struct {
|
||||||
|
meshId string
|
||||||
|
// nodes contains a set of nodes with the string being the jwt token
|
||||||
|
nodes map[string]interface{}
|
||||||
|
}
|
||||||
|
|
||||||
|
// JwtManager manages jwt tokens indicating a session
|
||||||
|
// between this host and another within a specific mesh
|
||||||
|
type JwtManager struct {
|
||||||
|
secretKey string
|
||||||
|
tokenDuration time.Duration
|
||||||
|
// meshes contains all the meshes that we have sessions with
|
||||||
|
meshes map[string]*JwtMesh
|
||||||
|
}
|
||||||
|
|
||||||
|
// JwtNode represents a jwt node in the mesh network
|
||||||
|
type JwtNode struct {
|
||||||
|
MeshId string `json:"meshId"`
|
||||||
|
Alias string `json:"alias"`
|
||||||
|
jwt.RegisteredClaims
|
||||||
|
}
|
||||||
|
|
||||||
|
func NewJwtManager(secretKey string, tokenDuration time.Duration) *JwtManager {
|
||||||
|
meshes := make(map[string]*JwtMesh)
|
||||||
|
return &JwtManager{secretKey, tokenDuration, meshes}
|
||||||
|
}
|
||||||
|
|
||||||
|
func (m *JwtManager) CreateClaims(meshId string, alias string) (*string, error) {
|
||||||
|
node := JwtNode{
|
||||||
|
MeshId: meshId,
|
||||||
|
Alias: alias,
|
||||||
|
RegisteredClaims: jwt.RegisteredClaims{
|
||||||
|
ExpiresAt: jwt.NewNumericDate(time.Now().Add(m.tokenDuration)),
|
||||||
|
},
|
||||||
|
}
|
||||||
|
|
||||||
|
mesh, contains := m.meshes[meshId]
|
||||||
|
|
||||||
|
if !contains {
|
||||||
|
return nil, errors.New("The specified mesh does not exist")
|
||||||
|
}
|
||||||
|
|
||||||
|
token := jwt.NewWithClaims(jwt.SigningMethodES256, node)
|
||||||
|
signedString, err := token.SignedString([]byte(m.secretKey))
|
||||||
|
|
||||||
|
if err != nil {
|
||||||
|
return nil, err
|
||||||
|
}
|
||||||
|
|
||||||
|
_, exists := mesh.nodes[signedString]
|
||||||
|
|
||||||
|
if exists {
|
||||||
|
return nil, errors.New("Node already exists")
|
||||||
|
}
|
||||||
|
|
||||||
|
mesh.nodes[signedString] = struct{}{}
|
||||||
|
return &signedString, nil
|
||||||
|
}
|
||||||
|
|
||||||
|
func (m *JwtManager) Verify(accessToken string) (*JwtNode, bool) {
|
||||||
|
token, err := jwt.ParseWithClaims(accessToken, &JwtNode{}, func(t *jwt.Token) (interface{}, error) {
|
||||||
|
return []byte(m.secretKey), nil
|
||||||
|
})
|
||||||
|
|
||||||
|
if err != nil {
|
||||||
|
return nil, false
|
||||||
|
}
|
||||||
|
|
||||||
|
if !token.Valid {
|
||||||
|
return nil, token.Valid
|
||||||
|
}
|
||||||
|
|
||||||
|
claims, ok := token.Claims.(*JwtNode)
|
||||||
|
return claims, ok
|
||||||
|
}
|
||||||
|
|
||||||
|
func (m *JwtManager) GetAuthInterceptor() grpc.UnaryServerInterceptor {
|
||||||
|
return func(
|
||||||
|
ctx context.Context,
|
||||||
|
req interface{},
|
||||||
|
info *grpc.UnaryServerInfo,
|
||||||
|
handler grpc.UnaryHandler,
|
||||||
|
) (interface{}, error) {
|
||||||
|
md, ok := metadata.FromIncomingContext(ctx)
|
||||||
|
|
||||||
|
if !ok {
|
||||||
|
return nil, status.Errorf(codes.Unauthenticated, "metadata is not provided")
|
||||||
|
}
|
||||||
|
|
||||||
|
values := md["authorization"]
|
||||||
|
|
||||||
|
if len(values) == 0 {
|
||||||
|
return nil, status.Errorf(codes.Unauthenticated, "authorization token is not provided")
|
||||||
|
}
|
||||||
|
|
||||||
|
acessToken := values[0]
|
||||||
|
|
||||||
|
_, valid := m.Verify(acessToken)
|
||||||
|
|
||||||
|
if !valid {
|
||||||
|
return nil, status.Errorf(codes.Unauthenticated, "Invalid access token: %s", acessToken)
|
||||||
|
}
|
||||||
|
|
||||||
|
return handler(ctx, req)
|
||||||
|
}
|
||||||
|
}
|
35
pkg/conf/conf.go
Normal file
35
pkg/conf/conf.go
Normal file
@ -0,0 +1,35 @@
|
|||||||
|
// conf defines configuration file parsing for golang
|
||||||
|
package conf
|
||||||
|
|
||||||
|
import (
|
||||||
|
"os"
|
||||||
|
|
||||||
|
logging "github.com/tim-beatham/wgmesh/pkg/log"
|
||||||
|
"gopkg.in/yaml.v3"
|
||||||
|
)
|
||||||
|
|
||||||
|
type WgMeshConfiguration struct {
|
||||||
|
CertificatePath string `yaml:"certificatePath"`
|
||||||
|
PrivateKeyPath string `yaml:"privateKeyPath"`
|
||||||
|
SkipCertVerification bool `yaml:"skipCertVerification"`
|
||||||
|
}
|
||||||
|
|
||||||
|
func ParseConfiguration(filePath string) (*WgMeshConfiguration, error) {
|
||||||
|
var conf WgMeshConfiguration
|
||||||
|
|
||||||
|
yamlBytes, err := os.ReadFile(filePath)
|
||||||
|
|
||||||
|
if err != nil {
|
||||||
|
logging.ErrorLog.Printf("Read file error: %s\n", err.Error())
|
||||||
|
return nil, err
|
||||||
|
}
|
||||||
|
|
||||||
|
err = yaml.Unmarshal(yamlBytes, &conf)
|
||||||
|
|
||||||
|
if err != nil {
|
||||||
|
logging.ErrorLog.Printf("Unmarshal error: %s\n", err.Error())
|
||||||
|
return nil, err
|
||||||
|
}
|
||||||
|
|
||||||
|
return &conf, nil
|
||||||
|
}
|
81
pkg/conn/conn.go
Normal file
81
pkg/conn/conn.go
Normal file
@ -0,0 +1,81 @@
|
|||||||
|
// conn manages gRPC connections between peers.
|
||||||
|
// Includes timers.
|
||||||
|
package conn
|
||||||
|
|
||||||
|
import (
|
||||||
|
"crypto/tls"
|
||||||
|
|
||||||
|
logging "github.com/tim-beatham/wgmesh/pkg/log"
|
||||||
|
"google.golang.org/grpc"
|
||||||
|
"google.golang.org/grpc/credentials"
|
||||||
|
)
|
||||||
|
|
||||||
|
// PeerConnection interfacing for a secure connection between
|
||||||
|
// two peers.
|
||||||
|
type PeerConnection interface {
|
||||||
|
Connect() error
|
||||||
|
}
|
||||||
|
|
||||||
|
type WgCtrlConnection struct {
|
||||||
|
serverConfig *tls.Config
|
||||||
|
clientConfig *tls.Config
|
||||||
|
conn *grpc.ClientConn
|
||||||
|
}
|
||||||
|
|
||||||
|
type NewConnectionsParams struct {
|
||||||
|
CertificatePath string
|
||||||
|
PrivateKey string
|
||||||
|
SkipCertVerification bool
|
||||||
|
}
|
||||||
|
|
||||||
|
func NewConnection(params *NewConnectionsParams) (*WgCtrlConnection, error) {
|
||||||
|
cert, err := tls.LoadX509KeyPair(params.CertificatePath, params.PrivateKey)
|
||||||
|
|
||||||
|
if err != nil {
|
||||||
|
logging.ErrorLog.Printf("Failed to load key pair: %s\n", err.Error())
|
||||||
|
logging.ErrorLog.Printf("Certificate Path: %s\n", params.CertificatePath)
|
||||||
|
logging.ErrorLog.Printf("Private Key Path: %s\n", params.PrivateKey)
|
||||||
|
return nil, err
|
||||||
|
}
|
||||||
|
|
||||||
|
serverAuth := tls.RequireAndVerifyClientCert
|
||||||
|
|
||||||
|
if params.SkipCertVerification {
|
||||||
|
serverAuth = tls.RequireAnyClientCert
|
||||||
|
}
|
||||||
|
|
||||||
|
tlsConfig := &tls.Config{
|
||||||
|
ClientAuth: serverAuth,
|
||||||
|
Certificates: []tls.Certificate{cert},
|
||||||
|
}
|
||||||
|
|
||||||
|
clientConfig := &tls.Config{
|
||||||
|
Certificates: []tls.Certificate{cert},
|
||||||
|
InsecureSkipVerify: params.SkipCertVerification,
|
||||||
|
}
|
||||||
|
|
||||||
|
wgConnection := WgCtrlConnection{serverConfig: tlsConfig, clientConfig: clientConfig}
|
||||||
|
|
||||||
|
return &wgConnection, nil
|
||||||
|
}
|
||||||
|
|
||||||
|
// Connect: Connects to a new gRPC peer given the address of the other server
|
||||||
|
func (c *WgCtrlConnection) Connect(server string) (*grpc.ClientConn, error) {
|
||||||
|
conn, err := grpc.Dial(server, grpc.WithTransportCredentials(credentials.NewTLS(c.clientConfig)))
|
||||||
|
|
||||||
|
if err != nil {
|
||||||
|
logging.ErrorLog.Printf("Could not connect: %s\n", err.Error())
|
||||||
|
return nil, err
|
||||||
|
}
|
||||||
|
|
||||||
|
return conn, nil
|
||||||
|
}
|
||||||
|
|
||||||
|
// Listen: listens to incoming messages
|
||||||
|
func (c *WgCtrlConnection) Listen(i grpc.UnaryServerInterceptor) *grpc.Server {
|
||||||
|
server := grpc.NewServer(
|
||||||
|
grpc.UnaryInterceptor(i),
|
||||||
|
grpc.Creds(credentials.NewTLS(c.serverConfig)),
|
||||||
|
)
|
||||||
|
return server
|
||||||
|
}
|
@ -8,7 +8,10 @@ package ctrlserver
|
|||||||
import (
|
import (
|
||||||
"errors"
|
"errors"
|
||||||
"net"
|
"net"
|
||||||
|
"time"
|
||||||
|
|
||||||
|
"github.com/tim-beatham/wgmesh/pkg/auth"
|
||||||
|
"github.com/tim-beatham/wgmesh/pkg/conn"
|
||||||
"github.com/tim-beatham/wgmesh/pkg/lib"
|
"github.com/tim-beatham/wgmesh/pkg/lib"
|
||||||
"github.com/tim-beatham/wgmesh/pkg/wg"
|
"github.com/tim-beatham/wgmesh/pkg/wg"
|
||||||
"golang.zx2c4.com/wireguard/wgctrl"
|
"golang.zx2c4.com/wireguard/wgctrl"
|
||||||
@ -21,11 +24,13 @@ import (
|
|||||||
* wgClient: Represents the WireGuard control client.
|
* wgClient: Represents the WireGuard control client.
|
||||||
* ifName: WireGuard interface name
|
* ifName: WireGuard interface name
|
||||||
*/
|
*/
|
||||||
func NewCtrlServer(wgClient *wgctrl.Client, ifName string) *MeshCtrlServer {
|
func NewCtrlServer(wgClient *wgctrl.Client, conn *conn.WgCtrlConnection, ifName string) *MeshCtrlServer {
|
||||||
ctrlServer := new(MeshCtrlServer)
|
ctrlServer := new(MeshCtrlServer)
|
||||||
ctrlServer.Meshes = make(map[string]Mesh)
|
ctrlServer.Meshes = make(map[string]Mesh)
|
||||||
ctrlServer.Client = wgClient
|
ctrlServer.Client = wgClient
|
||||||
|
ctrlServer.Conn = conn
|
||||||
ctrlServer.IfName = ifName
|
ctrlServer.IfName = ifName
|
||||||
|
ctrlServer.JwtManager = auth.NewJwtManager("bob123", 24*time.Hour)
|
||||||
return ctrlServer
|
return ctrlServer
|
||||||
}
|
}
|
||||||
|
|
||||||
|
@ -1,6 +1,8 @@
|
|||||||
package ctrlserver
|
package ctrlserver
|
||||||
|
|
||||||
import (
|
import (
|
||||||
|
"github.com/tim-beatham/wgmesh/pkg/auth"
|
||||||
|
"github.com/tim-beatham/wgmesh/pkg/conn"
|
||||||
"golang.zx2c4.com/wireguard/wgctrl"
|
"golang.zx2c4.com/wireguard/wgctrl"
|
||||||
"golang.zx2c4.com/wireguard/wgctrl/wgtypes"
|
"golang.zx2c4.com/wireguard/wgctrl/wgtypes"
|
||||||
)
|
)
|
||||||
@ -28,4 +30,6 @@ type MeshCtrlServer struct {
|
|||||||
Client *wgctrl.Client
|
Client *wgctrl.Client
|
||||||
Meshes map[string]Mesh
|
Meshes map[string]Mesh
|
||||||
IfName string
|
IfName string
|
||||||
|
Conn *conn.WgCtrlConnection
|
||||||
|
JwtManager *auth.JwtManager
|
||||||
}
|
}
|
||||||
|
34
pkg/middleware/auth.go
Normal file
34
pkg/middleware/auth.go
Normal file
@ -0,0 +1,34 @@
|
|||||||
|
package middleware
|
||||||
|
|
||||||
|
import (
|
||||||
|
"context"
|
||||||
|
"errors"
|
||||||
|
|
||||||
|
"github.com/tim-beatham/wgmesh/pkg/ctrlserver"
|
||||||
|
"github.com/tim-beatham/wgmesh/pkg/rpc"
|
||||||
|
)
|
||||||
|
|
||||||
|
type AuthRpcProvider struct {
|
||||||
|
rpc.UnimplementedAuthenticationServer
|
||||||
|
server *ctrlserver.MeshCtrlServer
|
||||||
|
}
|
||||||
|
|
||||||
|
func (a *AuthRpcProvider) JoinMesh(ctx context.Context, in *rpc.JoinAuthMeshRequest) (*rpc.JoinAuthMeshReply, error) {
|
||||||
|
meshId := in.MeshId
|
||||||
|
|
||||||
|
if meshId == "" {
|
||||||
|
return nil, errors.New("Must specify the meshId")
|
||||||
|
}
|
||||||
|
|
||||||
|
token, err := a.server.JwtManager.CreateClaims(in.MeshId, "sharedSecret")
|
||||||
|
|
||||||
|
if err != nil {
|
||||||
|
return nil, err
|
||||||
|
}
|
||||||
|
|
||||||
|
return &rpc.JoinAuthMeshReply{Success: true, Token: token}, nil
|
||||||
|
}
|
||||||
|
|
||||||
|
func NewAuthProvider(ctrlServer *ctrlserver.MeshCtrlServer) *AuthRpcProvider {
|
||||||
|
return &AuthRpcProvider{server: ctrlServer}
|
||||||
|
}
|
@ -15,8 +15,6 @@ import (
|
|||||||
"github.com/tim-beatham/wgmesh/pkg/slaac"
|
"github.com/tim-beatham/wgmesh/pkg/slaac"
|
||||||
"github.com/tim-beatham/wgmesh/pkg/wg"
|
"github.com/tim-beatham/wgmesh/pkg/wg"
|
||||||
"golang.zx2c4.com/wireguard/wgctrl/wgtypes"
|
"golang.zx2c4.com/wireguard/wgctrl/wgtypes"
|
||||||
"google.golang.org/grpc"
|
|
||||||
"google.golang.org/grpc/credentials/insecure"
|
|
||||||
)
|
)
|
||||||
|
|
||||||
type RobinIpc struct {
|
type RobinIpc struct {
|
||||||
@ -57,7 +55,7 @@ func (n *RobinIpc) ListMeshes(name string, reply *map[string]ctrlserver.Mesh) er
|
|||||||
}
|
}
|
||||||
|
|
||||||
func updateMesh(n *RobinIpc, meshId string, endPoint string) error {
|
func updateMesh(n *RobinIpc, meshId string, endPoint string) error {
|
||||||
conn, err := grpc.Dial(endPoint, grpc.WithTransportCredentials(insecure.NewCredentials()))
|
conn, err := n.Server.Conn.Connect(endPoint)
|
||||||
|
|
||||||
if err != nil {
|
if err != nil {
|
||||||
return err
|
return err
|
||||||
@ -105,7 +103,7 @@ func updateMesh(n *RobinIpc, meshId string, endPoint string) error {
|
|||||||
}
|
}
|
||||||
|
|
||||||
func updatePeer(n *RobinIpc, node ctrlserver.MeshNode, wgHost string, meshId string) error {
|
func updatePeer(n *RobinIpc, node ctrlserver.MeshNode, wgHost string, meshId string) error {
|
||||||
conn, err := grpc.Dial(node.HostEndpoint, grpc.WithTransportCredentials(insecure.NewCredentials()))
|
conn, err := n.Server.Conn.Connect(node.HostEndpoint)
|
||||||
|
|
||||||
if err != nil {
|
if err != nil {
|
||||||
return err
|
return err
|
||||||
@ -159,7 +157,7 @@ func updatePeers(n *RobinIpc, meshId string, wgHost string, nodesToExclude []str
|
|||||||
}
|
}
|
||||||
|
|
||||||
func (n *RobinIpc) JoinMesh(args ipc.JoinMeshArgs, reply *string) error {
|
func (n *RobinIpc) JoinMesh(args ipc.JoinMeshArgs, reply *string) error {
|
||||||
conn, err := grpc.Dial(args.IpAdress+":8080", grpc.WithTransportCredentials(insecure.NewCredentials()))
|
conn, err := n.Server.Conn.Connect(args.IpAdress + ":8080")
|
||||||
|
|
||||||
if err != nil {
|
if err != nil {
|
||||||
return err
|
return err
|
||||||
|
236
pkg/rpc/authentication.pb.go
Normal file
236
pkg/rpc/authentication.pb.go
Normal file
@ -0,0 +1,236 @@
|
|||||||
|
// Code generated by protoc-gen-go. DO NOT EDIT.
|
||||||
|
// versions:
|
||||||
|
// protoc-gen-go v1.28.1
|
||||||
|
// protoc v3.21.12
|
||||||
|
// source: pkg/grpc/ctrlserver/authentication.proto
|
||||||
|
|
||||||
|
package rpc
|
||||||
|
|
||||||
|
import (
|
||||||
|
protoreflect "google.golang.org/protobuf/reflect/protoreflect"
|
||||||
|
protoimpl "google.golang.org/protobuf/runtime/protoimpl"
|
||||||
|
reflect "reflect"
|
||||||
|
sync "sync"
|
||||||
|
)
|
||||||
|
|
||||||
|
const (
|
||||||
|
// Verify that this generated code is sufficiently up-to-date.
|
||||||
|
_ = protoimpl.EnforceVersion(20 - protoimpl.MinVersion)
|
||||||
|
// Verify that runtime/protoimpl is sufficiently up-to-date.
|
||||||
|
_ = protoimpl.EnforceVersion(protoimpl.MaxVersion - 20)
|
||||||
|
)
|
||||||
|
|
||||||
|
type JoinAuthMeshRequest struct {
|
||||||
|
state protoimpl.MessageState
|
||||||
|
sizeCache protoimpl.SizeCache
|
||||||
|
unknownFields protoimpl.UnknownFields
|
||||||
|
|
||||||
|
MeshId string `protobuf:"bytes,1,opt,name=meshId,proto3" json:"meshId,omitempty"`
|
||||||
|
SharedSecret string `protobuf:"bytes,2,opt,name=sharedSecret,proto3" json:"sharedSecret,omitempty"`
|
||||||
|
}
|
||||||
|
|
||||||
|
func (x *JoinAuthMeshRequest) Reset() {
|
||||||
|
*x = JoinAuthMeshRequest{}
|
||||||
|
if protoimpl.UnsafeEnabled {
|
||||||
|
mi := &file_pkg_grpc_ctrlserver_authentication_proto_msgTypes[0]
|
||||||
|
ms := protoimpl.X.MessageStateOf(protoimpl.Pointer(x))
|
||||||
|
ms.StoreMessageInfo(mi)
|
||||||
|
}
|
||||||
|
}
|
||||||
|
|
||||||
|
func (x *JoinAuthMeshRequest) String() string {
|
||||||
|
return protoimpl.X.MessageStringOf(x)
|
||||||
|
}
|
||||||
|
|
||||||
|
func (*JoinAuthMeshRequest) ProtoMessage() {}
|
||||||
|
|
||||||
|
func (x *JoinAuthMeshRequest) ProtoReflect() protoreflect.Message {
|
||||||
|
mi := &file_pkg_grpc_ctrlserver_authentication_proto_msgTypes[0]
|
||||||
|
if protoimpl.UnsafeEnabled && x != nil {
|
||||||
|
ms := protoimpl.X.MessageStateOf(protoimpl.Pointer(x))
|
||||||
|
if ms.LoadMessageInfo() == nil {
|
||||||
|
ms.StoreMessageInfo(mi)
|
||||||
|
}
|
||||||
|
return ms
|
||||||
|
}
|
||||||
|
return mi.MessageOf(x)
|
||||||
|
}
|
||||||
|
|
||||||
|
// Deprecated: Use JoinAuthMeshRequest.ProtoReflect.Descriptor instead.
|
||||||
|
func (*JoinAuthMeshRequest) Descriptor() ([]byte, []int) {
|
||||||
|
return file_pkg_grpc_ctrlserver_authentication_proto_rawDescGZIP(), []int{0}
|
||||||
|
}
|
||||||
|
|
||||||
|
func (x *JoinAuthMeshRequest) GetMeshId() string {
|
||||||
|
if x != nil {
|
||||||
|
return x.MeshId
|
||||||
|
}
|
||||||
|
return ""
|
||||||
|
}
|
||||||
|
|
||||||
|
func (x *JoinAuthMeshRequest) GetSharedSecret() string {
|
||||||
|
if x != nil {
|
||||||
|
return x.SharedSecret
|
||||||
|
}
|
||||||
|
return ""
|
||||||
|
}
|
||||||
|
|
||||||
|
type JoinAuthMeshReply struct {
|
||||||
|
state protoimpl.MessageState
|
||||||
|
sizeCache protoimpl.SizeCache
|
||||||
|
unknownFields protoimpl.UnknownFields
|
||||||
|
|
||||||
|
Success bool `protobuf:"varint,1,opt,name=success,proto3" json:"success,omitempty"`
|
||||||
|
Token *string `protobuf:"bytes,2,opt,name=token,proto3,oneof" json:"token,omitempty"`
|
||||||
|
}
|
||||||
|
|
||||||
|
func (x *JoinAuthMeshReply) Reset() {
|
||||||
|
*x = JoinAuthMeshReply{}
|
||||||
|
if protoimpl.UnsafeEnabled {
|
||||||
|
mi := &file_pkg_grpc_ctrlserver_authentication_proto_msgTypes[1]
|
||||||
|
ms := protoimpl.X.MessageStateOf(protoimpl.Pointer(x))
|
||||||
|
ms.StoreMessageInfo(mi)
|
||||||
|
}
|
||||||
|
}
|
||||||
|
|
||||||
|
func (x *JoinAuthMeshReply) String() string {
|
||||||
|
return protoimpl.X.MessageStringOf(x)
|
||||||
|
}
|
||||||
|
|
||||||
|
func (*JoinAuthMeshReply) ProtoMessage() {}
|
||||||
|
|
||||||
|
func (x *JoinAuthMeshReply) ProtoReflect() protoreflect.Message {
|
||||||
|
mi := &file_pkg_grpc_ctrlserver_authentication_proto_msgTypes[1]
|
||||||
|
if protoimpl.UnsafeEnabled && x != nil {
|
||||||
|
ms := protoimpl.X.MessageStateOf(protoimpl.Pointer(x))
|
||||||
|
if ms.LoadMessageInfo() == nil {
|
||||||
|
ms.StoreMessageInfo(mi)
|
||||||
|
}
|
||||||
|
return ms
|
||||||
|
}
|
||||||
|
return mi.MessageOf(x)
|
||||||
|
}
|
||||||
|
|
||||||
|
// Deprecated: Use JoinAuthMeshReply.ProtoReflect.Descriptor instead.
|
||||||
|
func (*JoinAuthMeshReply) Descriptor() ([]byte, []int) {
|
||||||
|
return file_pkg_grpc_ctrlserver_authentication_proto_rawDescGZIP(), []int{1}
|
||||||
|
}
|
||||||
|
|
||||||
|
func (x *JoinAuthMeshReply) GetSuccess() bool {
|
||||||
|
if x != nil {
|
||||||
|
return x.Success
|
||||||
|
}
|
||||||
|
return false
|
||||||
|
}
|
||||||
|
|
||||||
|
func (x *JoinAuthMeshReply) GetToken() string {
|
||||||
|
if x != nil && x.Token != nil {
|
||||||
|
return *x.Token
|
||||||
|
}
|
||||||
|
return ""
|
||||||
|
}
|
||||||
|
|
||||||
|
var File_pkg_grpc_ctrlserver_authentication_proto protoreflect.FileDescriptor
|
||||||
|
|
||||||
|
var file_pkg_grpc_ctrlserver_authentication_proto_rawDesc = []byte{
|
||||||
|
0x0a, 0x28, 0x70, 0x6b, 0x67, 0x2f, 0x67, 0x72, 0x70, 0x63, 0x2f, 0x63, 0x74, 0x72, 0x6c, 0x73,
|
||||||
|
0x65, 0x72, 0x76, 0x65, 0x72, 0x2f, 0x61, 0x75, 0x74, 0x68, 0x65, 0x6e, 0x74, 0x69, 0x63, 0x61,
|
||||||
|
0x74, 0x69, 0x6f, 0x6e, 0x2e, 0x70, 0x72, 0x6f, 0x74, 0x6f, 0x12, 0x08, 0x72, 0x70, 0x63, 0x74,
|
||||||
|
0x79, 0x70, 0x65, 0x73, 0x22, 0x51, 0x0a, 0x13, 0x4a, 0x6f, 0x69, 0x6e, 0x41, 0x75, 0x74, 0x68,
|
||||||
|
0x4d, 0x65, 0x73, 0x68, 0x52, 0x65, 0x71, 0x75, 0x65, 0x73, 0x74, 0x12, 0x16, 0x0a, 0x06, 0x6d,
|
||||||
|
0x65, 0x73, 0x68, 0x49, 0x64, 0x18, 0x01, 0x20, 0x01, 0x28, 0x09, 0x52, 0x06, 0x6d, 0x65, 0x73,
|
||||||
|
0x68, 0x49, 0x64, 0x12, 0x22, 0x0a, 0x0c, 0x73, 0x68, 0x61, 0x72, 0x65, 0x64, 0x53, 0x65, 0x63,
|
||||||
|
0x72, 0x65, 0x74, 0x18, 0x02, 0x20, 0x01, 0x28, 0x09, 0x52, 0x0c, 0x73, 0x68, 0x61, 0x72, 0x65,
|
||||||
|
0x64, 0x53, 0x65, 0x63, 0x72, 0x65, 0x74, 0x22, 0x52, 0x0a, 0x11, 0x4a, 0x6f, 0x69, 0x6e, 0x41,
|
||||||
|
0x75, 0x74, 0x68, 0x4d, 0x65, 0x73, 0x68, 0x52, 0x65, 0x70, 0x6c, 0x79, 0x12, 0x18, 0x0a, 0x07,
|
||||||
|
0x73, 0x75, 0x63, 0x63, 0x65, 0x73, 0x73, 0x18, 0x01, 0x20, 0x01, 0x28, 0x08, 0x52, 0x07, 0x73,
|
||||||
|
0x75, 0x63, 0x63, 0x65, 0x73, 0x73, 0x12, 0x19, 0x0a, 0x05, 0x74, 0x6f, 0x6b, 0x65, 0x6e, 0x18,
|
||||||
|
0x02, 0x20, 0x01, 0x28, 0x09, 0x48, 0x00, 0x52, 0x05, 0x74, 0x6f, 0x6b, 0x65, 0x6e, 0x88, 0x01,
|
||||||
|
0x01, 0x42, 0x08, 0x0a, 0x06, 0x5f, 0x74, 0x6f, 0x6b, 0x65, 0x6e, 0x32, 0x5a, 0x0a, 0x0e, 0x41,
|
||||||
|
0x75, 0x74, 0x68, 0x65, 0x6e, 0x74, 0x69, 0x63, 0x61, 0x74, 0x69, 0x6f, 0x6e, 0x12, 0x48, 0x0a,
|
||||||
|
0x08, 0x4a, 0x6f, 0x69, 0x6e, 0x4d, 0x65, 0x73, 0x68, 0x12, 0x1d, 0x2e, 0x72, 0x70, 0x63, 0x74,
|
||||||
|
0x79, 0x70, 0x65, 0x73, 0x2e, 0x4a, 0x6f, 0x69, 0x6e, 0x41, 0x75, 0x74, 0x68, 0x4d, 0x65, 0x73,
|
||||||
|
0x68, 0x52, 0x65, 0x71, 0x75, 0x65, 0x73, 0x74, 0x1a, 0x1b, 0x2e, 0x72, 0x70, 0x63, 0x74, 0x79,
|
||||||
|
0x70, 0x65, 0x73, 0x2e, 0x4a, 0x6f, 0x69, 0x6e, 0x41, 0x75, 0x74, 0x68, 0x4d, 0x65, 0x73, 0x68,
|
||||||
|
0x52, 0x65, 0x70, 0x6c, 0x79, 0x22, 0x00, 0x42, 0x09, 0x5a, 0x07, 0x70, 0x6b, 0x67, 0x2f, 0x72,
|
||||||
|
0x70, 0x63, 0x62, 0x06, 0x70, 0x72, 0x6f, 0x74, 0x6f, 0x33,
|
||||||
|
}
|
||||||
|
|
||||||
|
var (
|
||||||
|
file_pkg_grpc_ctrlserver_authentication_proto_rawDescOnce sync.Once
|
||||||
|
file_pkg_grpc_ctrlserver_authentication_proto_rawDescData = file_pkg_grpc_ctrlserver_authentication_proto_rawDesc
|
||||||
|
)
|
||||||
|
|
||||||
|
func file_pkg_grpc_ctrlserver_authentication_proto_rawDescGZIP() []byte {
|
||||||
|
file_pkg_grpc_ctrlserver_authentication_proto_rawDescOnce.Do(func() {
|
||||||
|
file_pkg_grpc_ctrlserver_authentication_proto_rawDescData = protoimpl.X.CompressGZIP(file_pkg_grpc_ctrlserver_authentication_proto_rawDescData)
|
||||||
|
})
|
||||||
|
return file_pkg_grpc_ctrlserver_authentication_proto_rawDescData
|
||||||
|
}
|
||||||
|
|
||||||
|
var file_pkg_grpc_ctrlserver_authentication_proto_msgTypes = make([]protoimpl.MessageInfo, 2)
|
||||||
|
var file_pkg_grpc_ctrlserver_authentication_proto_goTypes = []interface{}{
|
||||||
|
(*JoinAuthMeshRequest)(nil), // 0: rpctypes.JoinAuthMeshRequest
|
||||||
|
(*JoinAuthMeshReply)(nil), // 1: rpctypes.JoinAuthMeshReply
|
||||||
|
}
|
||||||
|
var file_pkg_grpc_ctrlserver_authentication_proto_depIdxs = []int32{
|
||||||
|
0, // 0: rpctypes.Authentication.JoinMesh:input_type -> rpctypes.JoinAuthMeshRequest
|
||||||
|
1, // 1: rpctypes.Authentication.JoinMesh:output_type -> rpctypes.JoinAuthMeshReply
|
||||||
|
1, // [1:2] is the sub-list for method output_type
|
||||||
|
0, // [0:1] is the sub-list for method input_type
|
||||||
|
0, // [0:0] is the sub-list for extension type_name
|
||||||
|
0, // [0:0] is the sub-list for extension extendee
|
||||||
|
0, // [0:0] is the sub-list for field type_name
|
||||||
|
}
|
||||||
|
|
||||||
|
func init() { file_pkg_grpc_ctrlserver_authentication_proto_init() }
|
||||||
|
func file_pkg_grpc_ctrlserver_authentication_proto_init() {
|
||||||
|
if File_pkg_grpc_ctrlserver_authentication_proto != nil {
|
||||||
|
return
|
||||||
|
}
|
||||||
|
if !protoimpl.UnsafeEnabled {
|
||||||
|
file_pkg_grpc_ctrlserver_authentication_proto_msgTypes[0].Exporter = func(v interface{}, i int) interface{} {
|
||||||
|
switch v := v.(*JoinAuthMeshRequest); i {
|
||||||
|
case 0:
|
||||||
|
return &v.state
|
||||||
|
case 1:
|
||||||
|
return &v.sizeCache
|
||||||
|
case 2:
|
||||||
|
return &v.unknownFields
|
||||||
|
default:
|
||||||
|
return nil
|
||||||
|
}
|
||||||
|
}
|
||||||
|
file_pkg_grpc_ctrlserver_authentication_proto_msgTypes[1].Exporter = func(v interface{}, i int) interface{} {
|
||||||
|
switch v := v.(*JoinAuthMeshReply); i {
|
||||||
|
case 0:
|
||||||
|
return &v.state
|
||||||
|
case 1:
|
||||||
|
return &v.sizeCache
|
||||||
|
case 2:
|
||||||
|
return &v.unknownFields
|
||||||
|
default:
|
||||||
|
return nil
|
||||||
|
}
|
||||||
|
}
|
||||||
|
}
|
||||||
|
file_pkg_grpc_ctrlserver_authentication_proto_msgTypes[1].OneofWrappers = []interface{}{}
|
||||||
|
type x struct{}
|
||||||
|
out := protoimpl.TypeBuilder{
|
||||||
|
File: protoimpl.DescBuilder{
|
||||||
|
GoPackagePath: reflect.TypeOf(x{}).PkgPath(),
|
||||||
|
RawDescriptor: file_pkg_grpc_ctrlserver_authentication_proto_rawDesc,
|
||||||
|
NumEnums: 0,
|
||||||
|
NumMessages: 2,
|
||||||
|
NumExtensions: 0,
|
||||||
|
NumServices: 1,
|
||||||
|
},
|
||||||
|
GoTypes: file_pkg_grpc_ctrlserver_authentication_proto_goTypes,
|
||||||
|
DependencyIndexes: file_pkg_grpc_ctrlserver_authentication_proto_depIdxs,
|
||||||
|
MessageInfos: file_pkg_grpc_ctrlserver_authentication_proto_msgTypes,
|
||||||
|
}.Build()
|
||||||
|
File_pkg_grpc_ctrlserver_authentication_proto = out.File
|
||||||
|
file_pkg_grpc_ctrlserver_authentication_proto_rawDesc = nil
|
||||||
|
file_pkg_grpc_ctrlserver_authentication_proto_goTypes = nil
|
||||||
|
file_pkg_grpc_ctrlserver_authentication_proto_depIdxs = nil
|
||||||
|
}
|
105
pkg/rpc/authentication_grpc.pb.go
Normal file
105
pkg/rpc/authentication_grpc.pb.go
Normal file
@ -0,0 +1,105 @@
|
|||||||
|
// Code generated by protoc-gen-go-grpc. DO NOT EDIT.
|
||||||
|
// versions:
|
||||||
|
// - protoc-gen-go-grpc v1.2.0
|
||||||
|
// - protoc v3.21.12
|
||||||
|
// source: pkg/grpc/ctrlserver/authentication.proto
|
||||||
|
|
||||||
|
package rpc
|
||||||
|
|
||||||
|
import (
|
||||||
|
context "context"
|
||||||
|
grpc "google.golang.org/grpc"
|
||||||
|
codes "google.golang.org/grpc/codes"
|
||||||
|
status "google.golang.org/grpc/status"
|
||||||
|
)
|
||||||
|
|
||||||
|
// This is a compile-time assertion to ensure that this generated file
|
||||||
|
// is compatible with the grpc package it is being compiled against.
|
||||||
|
// Requires gRPC-Go v1.32.0 or later.
|
||||||
|
const _ = grpc.SupportPackageIsVersion7
|
||||||
|
|
||||||
|
// AuthenticationClient is the client API for Authentication service.
|
||||||
|
//
|
||||||
|
// For semantics around ctx use and closing/ending streaming RPCs, please refer to https://pkg.go.dev/google.golang.org/grpc/?tab=doc#ClientConn.NewStream.
|
||||||
|
type AuthenticationClient interface {
|
||||||
|
JoinMesh(ctx context.Context, in *JoinAuthMeshRequest, opts ...grpc.CallOption) (*JoinAuthMeshReply, error)
|
||||||
|
}
|
||||||
|
|
||||||
|
type authenticationClient struct {
|
||||||
|
cc grpc.ClientConnInterface
|
||||||
|
}
|
||||||
|
|
||||||
|
func NewAuthenticationClient(cc grpc.ClientConnInterface) AuthenticationClient {
|
||||||
|
return &authenticationClient{cc}
|
||||||
|
}
|
||||||
|
|
||||||
|
func (c *authenticationClient) JoinMesh(ctx context.Context, in *JoinAuthMeshRequest, opts ...grpc.CallOption) (*JoinAuthMeshReply, error) {
|
||||||
|
out := new(JoinAuthMeshReply)
|
||||||
|
err := c.cc.Invoke(ctx, "/rpctypes.Authentication/JoinMesh", in, out, opts...)
|
||||||
|
if err != nil {
|
||||||
|
return nil, err
|
||||||
|
}
|
||||||
|
return out, nil
|
||||||
|
}
|
||||||
|
|
||||||
|
// AuthenticationServer is the server API for Authentication service.
|
||||||
|
// All implementations must embed UnimplementedAuthenticationServer
|
||||||
|
// for forward compatibility
|
||||||
|
type AuthenticationServer interface {
|
||||||
|
JoinMesh(context.Context, *JoinAuthMeshRequest) (*JoinAuthMeshReply, error)
|
||||||
|
mustEmbedUnimplementedAuthenticationServer()
|
||||||
|
}
|
||||||
|
|
||||||
|
// UnimplementedAuthenticationServer must be embedded to have forward compatible implementations.
|
||||||
|
type UnimplementedAuthenticationServer struct {
|
||||||
|
}
|
||||||
|
|
||||||
|
func (UnimplementedAuthenticationServer) JoinMesh(context.Context, *JoinAuthMeshRequest) (*JoinAuthMeshReply, error) {
|
||||||
|
return nil, status.Errorf(codes.Unimplemented, "method JoinMesh not implemented")
|
||||||
|
}
|
||||||
|
func (UnimplementedAuthenticationServer) mustEmbedUnimplementedAuthenticationServer() {}
|
||||||
|
|
||||||
|
// UnsafeAuthenticationServer may be embedded to opt out of forward compatibility for this service.
|
||||||
|
// Use of this interface is not recommended, as added methods to AuthenticationServer will
|
||||||
|
// result in compilation errors.
|
||||||
|
type UnsafeAuthenticationServer interface {
|
||||||
|
mustEmbedUnimplementedAuthenticationServer()
|
||||||
|
}
|
||||||
|
|
||||||
|
func RegisterAuthenticationServer(s grpc.ServiceRegistrar, srv AuthenticationServer) {
|
||||||
|
s.RegisterService(&Authentication_ServiceDesc, srv)
|
||||||
|
}
|
||||||
|
|
||||||
|
func _Authentication_JoinMesh_Handler(srv interface{}, ctx context.Context, dec func(interface{}) error, interceptor grpc.UnaryServerInterceptor) (interface{}, error) {
|
||||||
|
in := new(JoinAuthMeshRequest)
|
||||||
|
if err := dec(in); err != nil {
|
||||||
|
return nil, err
|
||||||
|
}
|
||||||
|
if interceptor == nil {
|
||||||
|
return srv.(AuthenticationServer).JoinMesh(ctx, in)
|
||||||
|
}
|
||||||
|
info := &grpc.UnaryServerInfo{
|
||||||
|
Server: srv,
|
||||||
|
FullMethod: "/rpctypes.Authentication/JoinMesh",
|
||||||
|
}
|
||||||
|
handler := func(ctx context.Context, req interface{}) (interface{}, error) {
|
||||||
|
return srv.(AuthenticationServer).JoinMesh(ctx, req.(*JoinAuthMeshRequest))
|
||||||
|
}
|
||||||
|
return interceptor(ctx, in, info, handler)
|
||||||
|
}
|
||||||
|
|
||||||
|
// Authentication_ServiceDesc is the grpc.ServiceDesc for Authentication service.
|
||||||
|
// It's only intended for direct use with grpc.RegisterService,
|
||||||
|
// and not to be introspected or modified (even as a copy)
|
||||||
|
var Authentication_ServiceDesc = grpc.ServiceDesc{
|
||||||
|
ServiceName: "rpctypes.Authentication",
|
||||||
|
HandlerType: (*AuthenticationServer)(nil),
|
||||||
|
Methods: []grpc.MethodDesc{
|
||||||
|
{
|
||||||
|
MethodName: "JoinMesh",
|
||||||
|
Handler: _Authentication_JoinMesh_Handler,
|
||||||
|
},
|
||||||
|
},
|
||||||
|
Streams: []grpc.StreamDesc{},
|
||||||
|
Metadata: "pkg/grpc/ctrlserver/authentication.proto",
|
||||||
|
}
|
@ -372,9 +372,8 @@ var file_pkg_grpc_ctrlserver_ctrlserver_proto_rawDesc = []byte{
|
|||||||
0x65, 0x73, 0x68, 0x12, 0x19, 0x2e, 0x72, 0x70, 0x63, 0x74, 0x79, 0x70, 0x65, 0x73, 0x2e, 0x4a,
|
0x65, 0x73, 0x68, 0x12, 0x19, 0x2e, 0x72, 0x70, 0x63, 0x74, 0x79, 0x70, 0x65, 0x73, 0x2e, 0x4a,
|
||||||
0x6f, 0x69, 0x6e, 0x4d, 0x65, 0x73, 0x68, 0x52, 0x65, 0x71, 0x75, 0x65, 0x73, 0x74, 0x1a, 0x17,
|
0x6f, 0x69, 0x6e, 0x4d, 0x65, 0x73, 0x68, 0x52, 0x65, 0x71, 0x75, 0x65, 0x73, 0x74, 0x1a, 0x17,
|
||||||
0x2e, 0x72, 0x70, 0x63, 0x74, 0x79, 0x70, 0x65, 0x73, 0x2e, 0x4a, 0x6f, 0x69, 0x6e, 0x4d, 0x65,
|
0x2e, 0x72, 0x70, 0x63, 0x74, 0x79, 0x70, 0x65, 0x73, 0x2e, 0x4a, 0x6f, 0x69, 0x6e, 0x4d, 0x65,
|
||||||
0x73, 0x68, 0x52, 0x65, 0x70, 0x6c, 0x79, 0x22, 0x00, 0x42, 0x14, 0x5a, 0x12, 0x70, 0x6b, 0x67,
|
0x73, 0x68, 0x52, 0x65, 0x70, 0x6c, 0x79, 0x22, 0x00, 0x42, 0x09, 0x5a, 0x07, 0x70, 0x6b, 0x67,
|
||||||
0x2f, 0x63, 0x74, 0x72, 0x6c, 0x73, 0x65, 0x72, 0x76, 0x65, 0x72, 0x2f, 0x72, 0x70, 0x63, 0x62,
|
0x2f, 0x72, 0x70, 0x63, 0x62, 0x06, 0x70, 0x72, 0x6f, 0x74, 0x6f, 0x33,
|
||||||
0x06, 0x70, 0x72, 0x6f, 0x74, 0x6f, 0x33,
|
|
||||||
}
|
}
|
||||||
|
|
||||||
var (
|
var (
|
||||||
|
@ -2,8 +2,8 @@ package rpc
|
|||||||
|
|
||||||
import grpc "google.golang.org/grpc"
|
import grpc "google.golang.org/grpc"
|
||||||
|
|
||||||
func NewRpcServer(server MeshCtrlServerServer) *grpc.Server {
|
func NewRpcServer(rpcServer *grpc.Server, server MeshCtrlServerServer, auth AuthenticationServer) *grpc.Server {
|
||||||
grpc := grpc.NewServer()
|
RegisterMeshCtrlServerServer(rpcServer, server)
|
||||||
RegisterMeshCtrlServerServer(grpc, server)
|
RegisterAuthenticationServer(rpcServer, auth)
|
||||||
return grpc
|
return rpcServer
|
||||||
}
|
}
|
||||||
|
Loading…
Reference in New Issue
Block a user