feat: edge gateway service
This commit is contained in:
@@ -0,0 +1,145 @@
|
||||
package grpcapi
|
||||
|
||||
import (
|
||||
"bytes"
|
||||
"context"
|
||||
"crypto/sha256"
|
||||
"errors"
|
||||
"strings"
|
||||
"time"
|
||||
|
||||
"galaxy/gateway/internal/authn"
|
||||
"galaxy/gateway/internal/clock"
|
||||
"galaxy/gateway/internal/downstream"
|
||||
gatewayv1 "galaxy/gateway/proto/galaxy/gateway/v1"
|
||||
|
||||
"google.golang.org/grpc"
|
||||
"google.golang.org/grpc/codes"
|
||||
"google.golang.org/grpc/status"
|
||||
)
|
||||
|
||||
// commandRoutingService translates the verified authenticated request context
|
||||
// into an internal downstream command and signs successful unary responses.
|
||||
type commandRoutingService struct {
|
||||
gatewayv1.UnimplementedEdgeGatewayServer
|
||||
|
||||
subscribeDelegate gatewayv1.EdgeGatewayServer
|
||||
router downstream.Router
|
||||
responseSigner authn.ResponseSigner
|
||||
clock clock.Clock
|
||||
downstreamTimeout time.Duration
|
||||
}
|
||||
|
||||
// ExecuteCommand builds a verified downstream command, routes it by exact
|
||||
// message_type, executes it, and signs the resulting unary response.
|
||||
func (s commandRoutingService) ExecuteCommand(ctx context.Context, _ *gatewayv1.ExecuteCommandRequest) (*gatewayv1.ExecuteCommandResponse, error) {
|
||||
command, err := authenticatedCommandFromContext(ctx)
|
||||
if err != nil {
|
||||
return nil, err
|
||||
}
|
||||
|
||||
client, err := s.router.Route(command.MessageType)
|
||||
switch {
|
||||
case err == nil:
|
||||
case errors.Is(err, downstream.ErrRouteNotFound):
|
||||
return nil, status.Error(codes.Unimplemented, "message_type is not routed")
|
||||
case errors.Is(err, downstream.ErrDownstreamUnavailable):
|
||||
return nil, status.Error(codes.Unavailable, "downstream service is unavailable")
|
||||
default:
|
||||
return nil, status.Error(codes.Internal, "downstream route resolution failed")
|
||||
}
|
||||
|
||||
downstreamCtx, cancel := context.WithTimeout(ctx, s.downstreamTimeout)
|
||||
defer cancel()
|
||||
|
||||
result, err := client.ExecuteCommand(downstreamCtx, command)
|
||||
switch {
|
||||
case err == nil:
|
||||
case errors.Is(err, downstream.ErrDownstreamUnavailable),
|
||||
errors.Is(err, context.DeadlineExceeded),
|
||||
errors.Is(err, context.Canceled):
|
||||
return nil, status.Error(codes.Unavailable, "downstream service is unavailable")
|
||||
default:
|
||||
return nil, status.Error(codes.Internal, "downstream execution failed")
|
||||
}
|
||||
|
||||
if strings.TrimSpace(result.ResultCode) == "" {
|
||||
return nil, status.Error(codes.Internal, "downstream response is invalid")
|
||||
}
|
||||
|
||||
responseTimestampMS := s.clock.Now().UTC().UnixMilli()
|
||||
payloadHash := sha256.Sum256(result.PayloadBytes)
|
||||
signature, err := s.responseSigner.SignResponse(authn.ResponseSigningFields{
|
||||
ProtocolVersion: command.ProtocolVersion,
|
||||
RequestID: command.RequestID,
|
||||
TimestampMS: responseTimestampMS,
|
||||
ResultCode: result.ResultCode,
|
||||
PayloadHash: payloadHash[:],
|
||||
})
|
||||
if err != nil {
|
||||
return nil, status.Error(codes.Unavailable, "response signer is unavailable")
|
||||
}
|
||||
|
||||
return &gatewayv1.ExecuteCommandResponse{
|
||||
ProtocolVersion: command.ProtocolVersion,
|
||||
RequestId: command.RequestID,
|
||||
TimestampMs: responseTimestampMS,
|
||||
ResultCode: result.ResultCode,
|
||||
PayloadBytes: bytes.Clone(result.PayloadBytes),
|
||||
PayloadHash: bytes.Clone(payloadHash[:]),
|
||||
Signature: signature,
|
||||
}, nil
|
||||
}
|
||||
|
||||
// SubscribeEvents delegates to the authenticated streaming service
|
||||
// implementation selected during server construction.
|
||||
func (s commandRoutingService) SubscribeEvents(req *gatewayv1.SubscribeEventsRequest, stream grpc.ServerStreamingServer[gatewayv1.GatewayEvent]) error {
|
||||
return s.subscribeDelegate.SubscribeEvents(req, stream)
|
||||
}
|
||||
|
||||
// newCommandRoutingService constructs the final authenticated service that
|
||||
// owns verified unary routing while preserving the delegated streaming path.
|
||||
func newCommandRoutingService(subscribeDelegate gatewayv1.EdgeGatewayServer, router downstream.Router, responseSigner authn.ResponseSigner, clk clock.Clock, downstreamTimeout time.Duration) gatewayv1.EdgeGatewayServer {
|
||||
return commandRoutingService{
|
||||
subscribeDelegate: subscribeDelegate,
|
||||
router: router,
|
||||
responseSigner: responseSigner,
|
||||
clock: clk,
|
||||
downstreamTimeout: downstreamTimeout,
|
||||
}
|
||||
}
|
||||
|
||||
func authenticatedCommandFromContext(ctx context.Context) (downstream.AuthenticatedCommand, error) {
|
||||
envelope, ok := parsedEnvelopeFromContext(ctx)
|
||||
if !ok {
|
||||
return downstream.AuthenticatedCommand{}, status.Error(codes.Internal, "authenticated request context is incomplete")
|
||||
}
|
||||
|
||||
record, ok := resolvedSessionFromContext(ctx)
|
||||
if !ok {
|
||||
return downstream.AuthenticatedCommand{}, status.Error(codes.Internal, "authenticated request context is incomplete")
|
||||
}
|
||||
|
||||
return downstream.AuthenticatedCommand{
|
||||
ProtocolVersion: envelope.ProtocolVersion,
|
||||
UserID: record.UserID,
|
||||
DeviceSessionID: record.DeviceSessionID,
|
||||
MessageType: envelope.MessageType,
|
||||
TimestampMS: envelope.TimestampMS,
|
||||
RequestID: envelope.RequestID,
|
||||
TraceID: envelope.TraceID,
|
||||
PayloadBytes: bytes.Clone(envelope.PayloadBytes),
|
||||
}, nil
|
||||
}
|
||||
|
||||
type unavailableResponseSigner struct{}
|
||||
|
||||
func (unavailableResponseSigner) SignResponse(authn.ResponseSigningFields) ([]byte, error) {
|
||||
return nil, errors.New("response signer is unavailable")
|
||||
}
|
||||
|
||||
func (unavailableResponseSigner) SignEvent(authn.EventSigningFields) ([]byte, error) {
|
||||
return nil, errors.New("response signer is unavailable")
|
||||
}
|
||||
|
||||
var _ gatewayv1.EdgeGatewayServer = commandRoutingService{}
|
||||
Reference in New Issue
Block a user