move NewGRPCClientConn to public package (#2826)

This commit is contained in:
Denis Mishin 2021-12-19 22:10:24 -05:00 committed by GitHub
parent 8f62b06425
commit 5e8fcf8d20
No known key found for this signature in database
GPG key ID: 4AEE18F83AFDEB23
2 changed files with 6 additions and 11 deletions

View file

@ -25,6 +25,7 @@ import (
"github.com/pomerium/pomerium/internal/tests/xdserr"
"github.com/pomerium/pomerium/pkg/grpc/config"
"github.com/pomerium/pomerium/pkg/grpc/databroker"
"github.com/pomerium/pomerium/pkg/grpcutil"
"github.com/pomerium/pomerium/pkg/protoutil"
)
@ -136,9 +137,8 @@ func grpcConn(ctx context.Context, addr, keyTxt string) (*grpc.ClientConn, error
return nil, err
}
fmt.Println(keyTxt)
return xdserr.NewGRPCClientConn(ctx, &xdserr.Options{
return grpcutil.NewGRPCClientConn(ctx, &grpcutil.Options{
Address: u,
WithInsecure: u.Scheme == "http",
InsecureSkipVerify: true,
SignedJWTKey: key,
})

View file

@ -1,4 +1,4 @@
package xdserr
package grpcutil
import (
"context"
@ -12,7 +12,6 @@ import (
"google.golang.org/grpc/credentials"
"github.com/pomerium/pomerium/pkg/cryptutil"
"github.com/pomerium/pomerium/pkg/grpcutil"
)
const (
@ -37,10 +36,6 @@ type Options struct {
// ClientDNSRoundRobin enables or disables DNS resolver based load balancing
ClientDNSRoundRobin bool
// WithInsecure disables transport security for this ClientConn.
// Note that transport security is required unless WithInsecure is set.
WithInsecure bool
// InsecureSkipVerify skips destination hostname and ca check
InsecureSkipVerify bool
@ -68,8 +63,8 @@ func NewGRPCClientConn(ctx context.Context, opts *Options, other ...grpc.DialOpt
}
streamClientInterceptors := []grpc.StreamClientInterceptor{}
if opts.SignedJWTKey != nil {
unaryClientInterceptors = append(unaryClientInterceptors, grpcutil.WithUnarySignedJWT(opts.SignedJWTKey))
streamClientInterceptors = append(streamClientInterceptors, grpcutil.WithStreamSignedJWT(opts.SignedJWTKey))
unaryClientInterceptors = append(unaryClientInterceptors, WithUnarySignedJWT(opts.SignedJWTKey))
streamClientInterceptors = append(streamClientInterceptors, WithStreamSignedJWT(opts.SignedJWTKey))
}
dialOptions := []grpc.DialOption{
@ -81,7 +76,7 @@ func NewGRPCClientConn(ctx context.Context, opts *Options, other ...grpc.DialOpt
dialOptions = append(dialOptions, other...)
if opts.WithInsecure {
if opts.Address.Scheme == "http" {
dialOptions = append(dialOptions, grpc.WithInsecure())
} else {
rootCAs, err := cryptutil.GetCertPool(opts.CA, opts.CAFile)