A Vivox authentication service is essential for integrating AccelByte Gaming Services (AGS), Vivox, and game clients. It generates the signed Vivox token that game clients need to interact with Vivox. This token is valid for 90 seconds, so game clients must regularly call the service to obtain a new token.
sequenceDiagram
autonumber
participant GC as Game Client<br>(or Game Server)
box YOU ARE HERE
participant ESE as Vivox Authentication Service<br>(Extend Service Extension app)
end
participant V as Vivox
note over GC, V: A. Vivox login
GC ->> ESE: Get Vivox login token
activate ESE
ESE -->> GC: Return Vivox login token
deactivate ESE
GC ->> V : Vivox login (login token, user id)
activate V
V -->> GC: Vivox login success
deactivate V
note over GC, V: B. Vivox join
GC ->> ESE: Get Vivox join token
activate ESE
ESE -->> GC: Return Vivox join token
deactivate ESE
GC ->> V : Vivox join (join token, channel id)
activate V
V -->> GC: Vivox join success
deactivate V
note over GC, V: C. Vivox join muted
GC ->> ESE: Get Vivox join muted token
activate ESE
ESE -->> GC: Return Vivox join muted token
deactivate ESE
GC ->> V : Vivox join muted (join muted token, channel id)
activate V
V -->> GC: Vivox join muted success
deactivate V
note over GC, V: D. Vivox kick
GC ->> ESE: Get Vivox kick token
activate ESE
ESE -->> GC: Return Vivox kick token
deactivate ESE
GC ->> V : Vivox kick (kick token, channel id)
activate V
V -->> GC: Vivox kick success
deactivate V
This repository provides a project template for an Vivox Authorization Service
Extend Service Extension app written in Go
. It includes a ready to use service to generate Vivox access token. This web service created using a stack that includes a gRPC Server
and the gRPC Gateway. Additionally, it comes with built-in instrumentation for observability, ensuring that metrics, traces, and logs are available upon deployment.
You can clone this repository to modify and develop your own
Vivox Authorization Service
Extend app. Simply modify this project by defining your
endpoints in service.proto
file and implementing the handlers for those
endpoints.
If you need to customize this app, please refer to our Extend Service Extension documentation.
-
Windows 11 WSL2 or Linux Ubuntu 22.04 or macOS 14+ with the following tools installed:
a. Bash
-
On Windows WSL2 or Linux Ubuntu:
bash --version GNU bash, version 5.1.16(1)-release (x86_64-pc-linux-gnu) ...
-
On macOS:
bash --version GNU bash, version 3.2.57(1)-release (arm64-apple-darwin23) ...
b. Make
-
On Windows WSL2 or Linux Ubuntu:
To install from the Ubuntu repository, run
sudo apt update && sudo apt install make
.make --version GNU Make 4.3 ...
-
On macOS:
make --version GNU Make 3.81 ...
c. Docker (Docker Desktop 4.30+/Docker Engine v23.0+)
-
On Linux Ubuntu:
- To install from the Ubuntu repository, run
sudo apt update && sudo apt install docker.io docker-buildx docker-compose-v2
. - Add your user to the
docker
group:sudo usermod -aG docker $USER
. - Log out and log back in to allow the changes to take effect.
- To install from the Ubuntu repository, run
-
On Windows or macOS:
Follow Docker's documentation on installing the Docker Desktop on Windows or macOS.
docker version ... Server: Docker Desktop Engine: Version: 24.0.5 ...
d. Go v1.20
- Follow Go's installation guide.
go version go version go1.20.0 ...
e. Postman
- Use binary available here
- Use the available binary from extend-helper-cli.
❗ In macOS, you may use Homebrew to easily install some of the tools above.
-
-
Access to AGS environment.
a. Base URL:
- Sample URL for AGS Shared Cloud customers:
https://spaceshooter.prod.gamingservices.accelbyte.io
- Sample URL for AGS Private Cloud customers:
https://dev.accelbyte.io
b. Create a Game Namespace if you don't have one yet. Keep the
Namespace ID
. Make sure this namespace is in active status.c. Create an OAuth Client with confidential client type with the following permissions. Keep the
Client ID
andClient Secret
.- For AGS Private Cloud customers:
ADMIN:ROLE [READ]
to validate access token and permissionsADMIN:NAMESPACE:{namespace}:NAMESPACE [READ]
to validate access namespace
- For AGS Shared Cloud customers:
- IAM -> Roles (Read)
- Basic -> Namespace (Read)
- Sample URL for AGS Shared Cloud customers:
-
Your Vivox configuration.
- Vivox application-specific issuer name
- Vivox domain name
- Vivox signing key
To be able to run this app, you will need to follow these setup steps.
-
Create a docker compose
.env
file by copying the content of .env.template file.⚠️ The host OS environment variables have higher precedence compared to.env
file variables: If the variables in.env
file do not seem to take effect properly, check if there are host OS environment variables with the same name. See documentation about docker compose environment variables precedence for more details. -
Fill in the required environment variables in
.env
file as shown below.AB_BASE_URL='http://test.accelbyte.io' # Your environment's domain Base URL AB_CLIENT_ID='xxxxxxxxxx' # Client ID from the Prerequisites section AB_CLIENT_SECRET='xxxxxxxxxx' # Client Secret from the Prerequisites section AB_NAMESPACE='xxxxxxxxxx' # Namespace ID from the Prerequisites section PLUGIN_GRPC_SERVER_AUTH_ENABLED=true # Enable or disable access token and permission validation BASE_PATH='/vivoxauth' # The base path used for the app VIVOX_ISSUER='xxxx' # Replace with your Vivox application-specific issuer name VIVOX_DOMAIN='tla.vivox.com' # Replace with Vivox domain default to `tla.vivox.com` VIVOX_SIGNING_KEY='xxxxxxx' # Replace with your Vivox signing key
❗ In this app, PLUGIN_GRPC_SERVER_AUTH_ENABLED is
true
by default: If it is set tofalse
, the endpointpermission.action
andpermission.resource
validation will be disabled and the endpoint can be accessed without a valid access token. This option is provided for development purpose only.For more options, create
src/AccelByte.Extend.Vivox.Authentication.Server/appsettings.Development.json
and fill in the required configuration.{ "EnableAuthorization": true, // Enable or disable access token and permission check (env var: PLUGIN_GRPC_SERVER_AUTH_ENABLED) "RevocationListRefreshPeriod": 60, "AccelByte": { "BaseUrl": "http://test.accelbyte.io", // Your environment's domain Base URL (env var: AB_BASE_URL) "ClientId": "xxxxxxxxxx", // Client ID (env var: AB_CLIENT_ID) "ClientSecret": "xxxxxxxxxx", // Client Secret (env var: AB_CLIENT_SECRET) "AppName": "EXTENDSERVICEEXTENSIONSERVICE", "TraceIdVersion": "1", "Namespace": "xxxxxxxxxx", // Namespace ID (env var: AB_NAMESPACE) "EnableTraceId": true, "EnableUserAgentInfo": true, "ResourceName": "EXTENDSERVICEEXTENSIONSERVICE" }, "Vivox": { "Issuer": "xxxx", // Vivox issuer (env var: VIVOX_ISSUER) "Domain": "tla.vivox.com", // Vivox domain (env var: VIVOX_DOMAIN) "SigningKey": "xxxxxxx" // Vivox signing key (env var: VIVOX_SIGNING_KEY) } }
⚠️ Environment variable values will override related configuration values in this file.
To build this app, use the following command.
make build
The build output will be available in .output
directory.
To (build and) run this app in a container, use the following command.
docker compose up --build
The unit test for the example included in this project is available in src/AccelByte.Extend.Vivox.Authentication.Tests
.
Run this command to execute unit test.
make test
This app can be tested locally through the Swagger UI.
-
Run this app by using the command below.
docker compose up --build
-
If PLUGIN_GRPC_SERVER_AUTH_ENABLED is
true
: Get an access token to be able to access the REST API service.To get a user access access token, you can use get-user-access-token.postman_collection.json. Import the Postman collection to your Postman workspace and create a Postman environment containing the following variables.
AB_BASE_URL
For example, https://test.accelbyte.ioAB_CLIENT_ID
A confidential IAM OAuth client IDAB_CLIENT_SECRET
The corresponding confidential IAM OAuth client secretAB_USERNAME
The username or e-mail of the userAB_PASSWORD
The corresponding user password
To get the user access token, open the
POST get-user-access-token
request in this collection and clickSend
. If successful, you will get a200 OK
response and the user access token will be available in access_token property in the response body. In the example below, the user token iseyJhbGciOi...
.{ "access_token": "eyJhbGciOi...", ... }
:info: Make sure the user has a role which contains this permission:
ADMIN:NAMESPACE:{namespace}:VIVOX:TOKEN [READ]
. -
The REST API service can then be tested by opening Swagger UI at
http://localhost:8000/vivoxauth/apidocs/
. Use this to create an API request to try the endpoints.:info: Depending on the envar you set for
BASE_PATH
, the service will have different service URL. This how it's the formattedhttp://localhost:8000/<base_path>
To authorize Swagger UI, click on "Authorize" button on right side.
Popup will show, input "Bearer " in
Value
field forBearer (apiKey)
. Then click "Authorize" to save the user's access token.
To be able to see the how the observability works in this template project in local development environment, there are few things that need be setup before performing test.
-
Uncomment loki logging driver in docker-compose.yaml
# logging: # driver: loki # options: # loki-url: http://host.docker.internal:3100/loki/api/v1/push # mode: non-blocking # max-buffer-size: 4m # loki-retries: "3"
⚠️ Make sure to install docker loki plugin beforehand: Otherwise, this app will not be able to run. This is required so that container logs can flow to theloki
service withingrpc-plugin-dependencies
stack. Use this command to install docker loki plugin:docker plugin install grafana/loki-docker-driver:latest --alias loki --grant-all-permissions
. -
Clone and run grpc-plugin-dependencies stack alongside this app. After this, Grafana will be accessible at http://localhost:3000.
git clone https://github.com/AccelByte/grpc-plugin-dependencies.git cd grpc-plugin-dependencies docker compose up
❗ More information about grpc-plugin-dependencies is available here.
-
Perform testing. For example, by following Test in Local Development Environment.
To deploy this app to AGS, follow the steps below.
-
Create a new Extend Service Extension App on Admin Portal. Keep the
Repository URI
. -
Download and setup extend-helper-cli (only if it has not been done previously).
-
Perform docker login with
extend-helper-cli
using the following command.extend-helper-cli dockerlogin --namespace <my-game> --app <my-app> --login
❗ For your convenience, the above
extend-helper-cli
command can also be copied fromRepository Authentication Command
under the corresponding app detail page. -
Build and push this app docker image to AccelByte ECR using the following command.
extend-helper-cli image-upload --work-dir <my-project-dir> --namespace <my-game> --app <my-app> --image-tag v0.0.1
⚠️ Make sure to perform docker login (step 3) before executing the above command. -
Open Admin Portal, go to Extend -> Service Extension. And then select the extend app.
-
To deploy selected image tag, click Image Version History and select desired image tag to be deployed.
-
Click Deploy Image, confirm the deployment and go back to App Detail by clicking Cancel.
-
Wait until app status is running.
For more information on how to deploy an Extend Service Extension
app, see
here.