gRPC、Go 和 Cloud Run - 如何优雅地处理客户端授权?

如何解决gRPC、Go 和 Cloud Run - 如何优雅地处理客户端授权?

我们在 Google Cloud Run 实例上部署了一个 gRPC 服务器,我们希望从其他 Google Cloud 环境(特别是 GKE 和 Cloud Run)访问该实例。

我们有以下代码来获取连接对象以及从 Google 默认凭据流生成的不记名令牌的上下文:

import (
    "context"
    "crypto/tls"
    "crypto/x509"
    "fmt"
    "os"
    "regexp"

    "google.golang.org/api/idtoken"
    "google.golang.org/grpc"
    "google.golang.org/grpc/credentials"
    grpcMetadata "google.golang.org/grpc/metadata"
)

type ServerConnection struct {
    Conn   *grpc.ClientConn
    Ctx    context.Context
}

// NewServerConnection creates a new gRPC connection and request a Token to be used in the context.
//
// The host should be the domain where the Service is hosted,e.g.,my-cloudrun-url-v1-inb33tjqiq-ew.a.run.app
//
// This method also uses the Google Default Credentials workflow.  To run this locally ensure that you have the
// environmental variable GOOGLE_APPLICATION_CREDENTIALS = ../key.json set.
//
// Best practise is to create a new connection at global level,which could be used to run many methods.  This avoids
// unnecessary api calls to retrieve the required ID tokens each time a single method is called.
func NewServerConnection(ctx context.Context,host string) (*ServerConnection,error) {

    // Establishes a connection
    var opts []grpc.DialOption
    if host != "" {
        opts = append(opts,grpc.WithAuthority(host+":443"))
    }

    systemRoots,err := x509.SystemCertPool()
    if err != nil {
        return nil,err
    }

    cred := credentials.NewTLS(&tls.Config{
        RootCAs: systemRoots,})
    opts = append(opts,grpc.WithTransportCredentials(cred))
    opts = append(opts,grpc.WithPerRPCCredentials())

    conn,err := grpc.Dial(host+":443",opts...)

    // Creates an identity token.
    // A given TokenSource is specific to the audience.
    tokenSource,err := idtoken.NewTokenSource(ctx,"https://"+host)
    if err != nil {
        return nil,err
    }
    token,err := tokenSource.Token()
    if err != nil {
        return nil,err
    }

    // Add token to gRPC Request.
    ctx = grpcMetadata.AppendToOutgoingContext(ctx,"authorization","Bearer "+token.AccessToken)

    return &ServerConnection{
        Conn: conn,Ctx:  ctx,},nil
}

然后使用上面的:

// Declare Globally
var myServer *ServerConnection

func TestNewServerConnection(t *testing.T) {
    // Connects to the server and add token to ctx.
    // In cloud run this is done once,populating the global variable
    ctx := context.Background()
    var err error;
    myServer,_ = NewServerConnection(ctx,"my-cloudrun-url-v1-inb33tjqiq-ew.a.run.app")

    // Now that we have a connection as well as a Context object with the Token 
    // we would like to make many client calls.
    client := pb.NewBookstoreClient(myServer.Conn)
    result,err := client.CreateBook(myServer.Ctx,&pb.Book{})
    if err != nil {
        // TODO: handle error
    }
    // Use result
    _ = result
    
    // ... make more client procedure calls here...
}

要强调的几点:

问题:

  • 以上是访问 Cloud Run 的一种优雅方式吗?
  • 目前我们必须将 myServer.Ctx 添加到我们所有的客户端过程调用中 - 有没有办法将它“嵌入”到 myServer.Conn 中? WithPerRPCCredentials 在这里有用吗?
  • 如何处理过期的令牌?令牌的默认到期时间为 1 小时,任何从初始实例化开始超过 1 小时的客户端过程调用都将失败。是否有一种优雅的方式来“刷新”或生成新令牌?

希望这一切都有意义!在 Google Cloud 上运行服务时,用于管理访问权限的 Cloudrun、gRPC 和 IAM 可能是一个非常优雅的设置。

解决方法

这里有一些相当优雅的东西。它使用 Google 应用程序凭据并将 lstStudents = thisStudents.Cast(Of Student)().ToList() 对象附加到 gRPC 连接对象。我的理解是,如果需要,这将允许在每次 gRPC 调用时自动刷新令牌。

NewTokenSource

可以如下使用:

// NewServerConnection creates a new gRPC connection.
//
// The host should be the domain where the Cloud Run Service is hosted
//
// This method also uses the Google Default Credentials workflow.  To run this locally ensure that you have the
// environmental variable GOOGLE_APPLICATION_CREDENTIALS = ../key.json set.
//
// Best practise is to create a new connection at global level,which could be used to run many methods.  This avoids
// unnecessary api calls to retrieve the required ID tokens each time a single method is called.
func NewServerConnection(ctx context.Context,host string) (*grpc.ClientConn,error) {

    // Creates an identity token.
    // With a global TokenSource tokens would be reused and auto-refreshed at need.
    // A given TokenSource is specific to the audience.
    tokenSource,err := idtoken.NewTokenSource(ctx,"https://"+host)
    if err != nil {
        return nil,status.Errorf(
            codes.Unauthenticated,"NewTokenSource: %s",err,)
    }

    // Establishes a connection
    var opts []grpc.DialOption
    if host != "" {
        opts = append(opts,grpc.WithAuthority(host+":443"))
    }

    systemRoots,err := x509.SystemCertPool()
    if err != nil {
        return nil,err
    }

    cred := credentials.NewTLS(&tls.Config{
        RootCAs: systemRoots,})
    opts = append(opts,grpc.WithTransportCredentials(cred))
    opts = append(opts,grpc.WithPerRPCCredentials(grpcTokenSource{
        TokenSource: oauth.TokenSource{
            tokenSource,},}))

    conn,err := grpc.Dial(host+":443",opts...)
    if err != nil {
        return nil,"grpc.Dail: %s",)
    }

    return conn,nil
}

版权声明:本文内容由互联网用户自发贡献,该文观点与技术仅代表作者本人。本站仅提供信息存储空间服务,不拥有所有权,不承担相关法律责任。如发现本站有涉嫌侵权/违法违规的内容, 请发送邮件至 dio@foxmail.com 举报,一经查实,本站将立刻删除。

相关推荐


使用本地python环境可以成功执行 import pandas as pd import matplotlib.pyplot as plt # 设置字体 plt.rcParams['font.sans-serif'] = ['SimHei'] # 能正确显示负号 p
错误1:Request method ‘DELETE‘ not supported 错误还原:controller层有一个接口,访问该接口时报错:Request method ‘DELETE‘ not supported 错误原因:没有接收到前端传入的参数,修改为如下 参考 错误2:cannot r
错误1:启动docker镜像时报错:Error response from daemon: driver failed programming external connectivity on endpoint quirky_allen 解决方法:重启docker -> systemctl r
错误1:private field ‘xxx‘ is never assigned 按Altʾnter快捷键,选择第2项 参考:https://blog.csdn.net/shi_hong_fei_hei/article/details/88814070 错误2:启动时报错,不能找到主启动类 #
报错如下,通过源不能下载,最后警告pip需升级版本 Requirement already satisfied: pip in c:\users\ychen\appdata\local\programs\python\python310\lib\site-packages (22.0.4) Coll
错误1:maven打包报错 错误还原:使用maven打包项目时报错如下 [ERROR] Failed to execute goal org.apache.maven.plugins:maven-resources-plugin:3.2.0:resources (default-resources)
错误1:服务调用时报错 服务消费者模块assess通过openFeign调用服务提供者模块hires 如下为服务提供者模块hires的控制层接口 @RestController @RequestMapping("/hires") public class FeignControl
错误1:运行项目后报如下错误 解决方案 报错2:Failed to execute goal org.apache.maven.plugins:maven-compiler-plugin:3.8.1:compile (default-compile) on project sb 解决方案:在pom.
参考 错误原因 过滤器或拦截器在生效时,redisTemplate还没有注入 解决方案:在注入容器时就生效 @Component //项目运行时就注入Spring容器 public class RedisBean { @Resource private RedisTemplate<String
使用vite构建项目报错 C:\Users\ychen\work>npm init @vitejs/app @vitejs/create-app is deprecated, use npm init vite instead C:\Users\ychen\AppData\Local\npm-
参考1 参考2 解决方案 # 点击安装源 协议选择 http:// 路径填写 mirrors.aliyun.com/centos/8.3.2011/BaseOS/x86_64/os URL类型 软件库URL 其他路径 # 版本 7 mirrors.aliyun.com/centos/7/os/x86
报错1 [root@slave1 data_mocker]# kafka-console-consumer.sh --bootstrap-server slave1:9092 --topic topic_db [2023-12-19 18:31:12,770] WARN [Consumer clie
错误1 # 重写数据 hive (edu)> insert overwrite table dwd_trade_cart_add_inc > select data.id, > data.user_id, > data.course_id, > date_format(
错误1 hive (edu)> insert into huanhuan values(1,'haoge'); Query ID = root_20240110071417_fe1517ad-3607-41f4-bdcf-d00b98ac443e Total jobs = 1
报错1:执行到如下就不执行了,没有显示Successfully registered new MBean. [root@slave1 bin]# /usr/local/software/flume-1.9.0/bin/flume-ng agent -n a1 -c /usr/local/softwa
虚拟及没有启动任何服务器查看jps会显示jps,如果没有显示任何东西 [root@slave2 ~]# jps 9647 Jps 解决方案 # 进入/tmp查看 [root@slave1 dfs]# cd /tmp [root@slave1 tmp]# ll 总用量 48 drwxr-xr-x. 2
报错1 hive> show databases; OK Failed with exception java.io.IOException:java.lang.RuntimeException: Error in configuring object Time taken: 0.474 se
报错1 [root@localhost ~]# vim -bash: vim: 未找到命令 安装vim yum -y install vim* # 查看是否安装成功 [root@hadoop01 hadoop]# rpm -qa |grep vim vim-X11-7.4.629-8.el7_9.x
修改hadoop配置 vi /usr/local/software/hadoop-2.9.2/etc/hadoop/yarn-site.xml # 添加如下 <configuration> <property> <name>yarn.nodemanager.res