jonson

package module
v0.0.0-...-8f05e0b Latest Latest
Warning

This package is not in the latest version of its module.

Go to latest
Published: Oct 25, 2024 License: MIT Imports: 22 Imported by: 2

README

Jonson

A library allowing you to expose API endpoints using JSON-RPC 2.0.

You will be able to expose functions either using:

  • a http endpoint per rpc
  • a single http endpoint serving all calls
  • websocket

In order to do so, Jonson consists of:

  • a server which exposes either the http endpoint(s) and/or a websocket connection
  • a factory which allows you to provide functionality to your API endpoints
  • parameter validation (coming soon)
  • error message encryption/decryption to hide sensitive information from the client

Project structure

Jonson thinks in systems. A system is a set of things that, as a whole, form emergence. Systems also tend to interact with other systems. As a result, we would be talking of a system of systems.

Let's assume an auth service (a system by itself). An auth system consists of authorization and authentication (system of systems). The ideal folder structure for a Jonson project, following the systemic approach, would look something like this:

/<project-name>
  /cmd
    /server
      main.go
  /internal
    /systems
      /authorization
        authorization.go
      /authentication
        authentication.go 
/go.mod

Remote procedure calls

When following the systemic approach, we can now start implementing our remote procedure calls. Let's follow the example of an auth service. The authentication endpoint might need functions like register, login and logout. Within the autentication/authentication.go folder, we can now set up our remote procedure calls.

The remote procedure calls will be generated by the server (explained later). In order to expose the endpoints properly, we need to follow a naming scheme: <MethodName>V<version>.

A remote procedure call accepts parameters (optional) and returns a result (optional) or an error.

To detect parameters which need to be marshaled/unmarshaled during the request, add a jonson.Params interface within your parameters which you will be sending.

In order to validate parameters, make the RegisterV1Params implement jonson.ValidatedParams interface. By doing so, before each function call Jonson will make sure that the JonsonValidate() function will be called. In case any errors have been added to the v *Validator, Jonson won't execute the given function.


// Authentication is our authentication system
type Authentication struct {
}

func NewAuthentication() *Authentication {
  return &Authentication{}
}

type RegisterV1Params {
  jonson.Params
  Username string `json:"username"`
  Password string `json:"password"`
}

func(r *RegisterV1Params) JonsonValidate(v *jonson.Validator){
  if len(r.Username) > 20 || len(r.Username) < 5{
    v.Path("username").Code(10000).Message("insufficient length")
  }
  if len(r.Password)  < 8{
    v.Path("password").Code(10001).Message("insufficient length")
  }
}

type RegisterV1Result struct {
  Uuid string `json:"uuid"`
}

// RegisterV1 allows us to register a new account
func (a *Authentication) RegisterV1(ctx *jonson.Context, params *RegisterV1Params) (*RegisterV1Result, error) {
  if (len(params.Username) <= 5){
    return nil, jonson.ErrInvalidParams
  }
  // put your register logic here
  return &RegisterV1Result {
    Uuid: "27fd79d0-e776-41c4-809a-3d1865b4f729",
  }, nil
}

type LoginV1Params struct {
  Username string `json:"username"`
  Password string `json:"password"`
}

// LoginV1 allows an account to log in
func (a *Authentication) LoginV1(ctx *jonson.Context, params *LoginV1Params) error {
  // put your login logic here
  return nil
}

// LoginV1 allows an account to log in
func (a *Authentication) LogoutV1(ctx *jonson.Context) error {
  // put your logout logic here
  return nil
}

For more complicated parameters and their validation, you can also provide validators on nested structs, such as:

type Profile struct {
  Name string
  Address *Address `json:"address,omitempty"`
}

func(p *Profile) JonsonValidate(v *jonson.Validator){
  if len(a.Name) < 2{
    v.Path("name").Message("name insufficient")
  }
  if (p.Address != nil){
    v.Path("address").Validate(p.Address)
  }
}

type Address struct {
  Street string `json:"street"`
  Zip string `json:"zip"`
}

func(a *Address) JonsonValidate(v *jonson.Validator){
  if len(a.Street) < 2{
    v.Path("street").Message("street insufficient")
  }
  if len(a.zip) < 2{
    v.Path("zip").Message("zip insufficient")
  }
}

The validator allows you to optionally set Debug(msg string) and Code(code int) to the error. In case code is not available, jonson.ErrInvalidParams' code will be used. The debug message will be encrypted and added to the error details using jonson.Secret.

Factory

Let's assume, the account wants to have access to a database or the current time. We could provide the database to the Authentication system itself (by passing a parameter to the constructor and keeping a reference within the Authentication struct) or we start diving into the possibility of using a factory. A factory allows us to define certain infrastructure or functional components during startup and provide those functional components at runtime.

Going back to the "auth service" example, let's see how to add a component that provides database access and one that provides the curent time. First, we would create a new folder internal/infra which will contain all files that implement our infrastructure setup. We can now create a new InfrastructureProvider:

type InfrastructureProvider struct {
  db *sql.Db
  newTime func() time.Time
}

func NewInfrastructureProvider(db *sql.Db, newTime func() time.Time) *InfrastructureProvider {
  return &InfrastructureProvider{
    db: db,
    newTime: newTime,
  }
}

// @generate
type DB struct {
  *sql.DB
}

func (i *InfrastructureProvider) NewDB(ctx *jonson.Context) *DB {
  return &DB{
    DB: i.db,
  }
}

// @generate
type Time struct {
  time.Time
}

func (i *InfrastructureProvider) NewTime(ctx *jonson.Context) *Time {
  return &Time{
    Time: i.newTime()
  }
}

In order for the providers to work, Jonson needs you to follow a specific naming scheme: the functions providing a type need to start with the keyword "New" followed by the type the provider instantiates, such as: NewTime returning *Time.

NOTE: your providers need to return either a pointer to a struct or an interface.

You might have noticed the // @generate tag: these are used to mark the types that we want to be able to 'inject' and use in our systems through the use of a Require<type> function that will be generated by the script jonson-generate. Since we tagged Time and DB in the example above, jonson-generate will create two functions for us:

func RequireTime(ctx *jonson.Context) *Time {
  // ...
}

func RequireDB(ctx *jonson.Context) *DB {
  // ...
}

To register the providers in the factory, use factory.RegisterProvider passing the pointer to the InfrastructureProvider. For details, check out the section "Putting it all together";

In case our provider is really simple, we can also use a single function:

// @generate
type ServiceName struct {
  Name string
}

func ProvideServiceName(ctx *jonson.Context) *ServiceName {
  return &ServiceName {
    Name: "auth",
  }
}

To register a simple provider function, use factory.RegisterProviderFunc passing the pointer to the InfrastructureProvider. Again, for details, check out the section "Putting it all together";

Once the types are provided by the factory, you can access them in your remote procedure calls:

// LoginV1 allows an account to log in
func (a *Authentication) LoginV1(ctx *jonson.Context, params *LoginV1Params) error {
  // the factory provides the database and we can now access it here in the code
  db := infra.RequireDB(ctx)

  // put your logic here
  return nil
}

The generated types will be instantiated once per API call and then stored within the context. In case a provider becomes invalid (e.g. we were storing a session provider and the account logged out), we can call the context.Invalidate method passing the type which we need to invalidate. The context allows us to also store new values on the fly (e.g. the user logged in and we want to provide a session) by calling context.StoreValue. NOTE: as a security feature, context.StoreValue will panic in case a provided value already exists;

In case you're calling a remote procedure from within a remote procedure, a new context will be created. However, some contexts you will want to share between those calls, such as time, http request/responses and more. For those contexts that are shareable between contexts, Jonson allows you to specify a provided type as jonson.Shareable:

// @generate
type Time struct {
  jonson.Shareable
  time.Time
}

Time will now be passed between contexts.

In case you also want to make your provided values shareable across impersonation calls, mark them with jonson.ShareableAcrossImpersonation. Only values that are explicitly marked with jonson.ShareableAcrossImpersonation will be taken across the impersonation boundaries.

Some context values want to be finalized. Jonson allows you to specify a Finalize(err[]error) method on your provided types. In case a finalize method is found, it will be called after the remote procedure call within the context has been completed. You can e.g. clean up certain open connections within Finalize().


type Time struct {
  jonson.Shareable
  time.Time
}

func (t *Time) Finalize(err []error)error {
  t.Time = nil
  return nil
}

The Factory allows for specifying a Logger which will be used to output certain debug logging information. Per default a no-op-logger will be used which won't output any logging information. In case you woul like to inspect certain information from jonson, provide a logger:


logger := slog.New(slog.NewJSONHandler(os.Stdout, nil))
factory := jonson.NewFactory(logger)

The logger will be provided to the underlying remote procedure calls using the factory by mounting a logger provider. Use jonson.RequireLogger(ctx) to get access to the logger.

Method handler

The method handler parses all remote procedure calls from registered systems using reflection and exposes methods to call those remote procedure calls. To register a system with the method handler use the function methodHandler.RegisterSystem().

For each call, the method handler will also make sure that the factory's providers will be provided to the called functions.

Besides those functions provided by the factory, the method handler will provide a few infrastructure related providers, such as:


func RequireHttpRequest(ctx *jonson.Context) *http.Request{}
func RequireHttpResponseWriter(ctx *jonson.Context) http.ResponseWriter{}
func RequireWSClient(ctx *jonson.Context) *jonson.WSClient{}
func RequireRpcMeta(ctx *jonson.Context) *jonson.RpcMeta{}
func RequireSecret(ctx *jonson.Context) jonson.Secret{}

The method handler will be passed to the exposing technology during startup, such as:

  • websocket
  • http
  • a combination of the above

In most cases, you shouldn't need to use the method handler. Check out "Putting it all together" to see the method handler in action.

The method handler allows for setting optional (nil) options. You can specify the missing parameter validation level:

logger := slog.New(slog.NewJSONHandler(os.Stdout, nil))
handler := jonson.NewMethodHandler(factory, secret, &jonson.MethodHandlerOptions{
  MissingValidationLevel: jonson.MissingValidationLevelError,
})

By setting a different value (MissingValidationLevelIgnore, MissingValidationLevelInfo, MissingValidationLevelWarn, MissingValidationLevelError, MissingValidationLevelFatal), you can modify the method handler's startup behaviour. In case of MissingValidationLevelIgnore, the validation on rpc params will be ignored. In case of MissingValidationLevelFatal, the application will panic during startup. All other states will log to the logger according to their level (info, warn, error).

Server

The server implements the standard http.Handler interface. You can either use the server.ListenAndServe() method directly or alternatively write your own server which can use the http.Handler interface provided by the server.

NewServer() accepts multiple Handlers which can be one of:

  • rpc over http (using a single endpoint): jonson.HttpRpcHandler
  • rpc over websocket: jonson.WebsocketHandler
  • a single http endpoint per rpc: jonson.HttpMethodHandler
  • default http handlers which use the http.Request and http.ResponseWriter functionality: jonson.HttpRegexpHandler

During startup, you can decide which endpoints you want to provide.

RPC over HTTP

The NewHttpRpcHandler will handle all registered remote procedure calls within a single endpoint which can be defined by the software developer.

The exposed http endpoint will only accept POST requests.

RPC over HTTP: one endpoint per method

The NewHttpMethodHandler will expose each remote procedure call as its own endpoint. By default, none of the endpoints will check for the correct http method. In case you want to enforce the usage of GET or POST, use jonson.HttpGet and jonson.HttpPost as parameters within your remote procedure call:

// LoginV1 allows an account to log in
func (a *Authentication) LoginV1(ctx *jonson.Context, _ jonson.HttpPost, params *LoginV1Params) error {
  // the factory provides the database and we can now access it here in the code
  db := infra.RequireDB(ctx)

  // put your logic here
  return nil
}

Now, the endpoint will only accept http calls using POST. In case the endpoint is called using a single endpoint for rpc or websocket, the required jonson.HttpPost has no effect.

Secret

In order to encrypt/decrypt server errors that should not be exposed to the client, jonson.Secret allows you to implement either your own encryption/decryption or use the built-in one with jonson.NewAESSecret(). For the AES secret, consider a key with 16, 24 or 32 bytes in length. In case the key does not have any of the above mentioned lengths, your program will panic.

For debugging purposes, you might want to use the jonson.NewDebugSecret() that will not encrypt/decrypt but simply pass the error to the rpc response.

Putting it all together

In our main, we can now spin up our remote procedure calls:

func main(){
  // in order to encrypt/decrypt our messages, we need a secret.
  secret := jonson.NewDebugSecret()

  // connect to mysql
  db := sql.MustConnect("")

  // let's initialize our providers first
  factory := jonson.NewFactory()

  // register a provider defining multiple provider instantiation methods
  factory.RegisterProvider(infrastructure.NewInfrastructureProvider(db, func(){
    return time.Now()
  }))

  // register a simple provider function
  factory.RegisterProviderFunc(infrastructure.ProvideServiceName)

  // let's instantiate our systems
  authentication := authentication.NewAuthentication()
  authorization := authorization.NewAuthorization()

  // let's expose the system's remote procedure calls to the method handler
  methodHandler := jonson.NewMethodHandler(factory, secret, nil)

  // let's register our systems with the method handler
  methodHandler.RegisterSystem(authentication)
  methodHandler.RegisterSystem(authorization)

  // right now, our systems are parsed by the method handler but not yet exposed.

  // the rpc handler will serve all remote procedure calls from the method handler
  // once calling the /rpc http endpoint
  rpcHandler := jonson.NewHttpRpcHandler(methodHandler, "/rpc")

  // the http method handler will expose all remote procedure calls
  // as their own endpoint, such as:
  // /authentication/login.v1
  // /authentication/logout.v1
  // ...
  httpHandler := jonson.NewHttpMethodHandler(methodHandler)

  // the ws handler will handle all incoming requests using websocket on the
  // http endpoint /ws
  wsHandler := jonson.NewWebsocketHandler(methodHandler, "/ws", jonson.NewWebsocketOptions())

  // the regexp handler allows us to define
  // regular expressions which will be handled
  // using the default http.Request and http.ResponseWriter.
  regexHandler := jonson.NewHttpRegexpHandler(methodHandler)
  regexpHandler.RegisterRegexp("/health", func(ctx *jonson.Context, w http.ResponseWriter, r *http.Request, parts []string){
    w.Write("UP")
  })


  // create a new server and handle all the technologies previously defined.
  server := jonson.NewServer(
    rpcHandler,
    httpHandler,
    wsHandler,
    regexpHandler,
  );

  // last step: let's listen and serve ;-)
  server.ListenAndServe(":8080")
}

NOTE: the server will ask each registered handler (rpc, ws, ...) whether they are eligible to serve a given endpoint in the order they were passed. The first one that returns "true", wins. In case your application is mostly used with websocket connections, it might be a good idea to pass the wsHandler as the first argument when calling jonson.NewServer().

Exposed paths

The methods a client will try to call can be exposed with different technologies as mentioned above (websocket, http rpc or http methods).

In case you are using http methods, the paths exposed will look like this: //.v. The system- and method names will be converted to kebab-case: account.GetProfileV1 will result in account/get-profile.v1. The params you send (body) needs to match the json specification of your rpc's params. The result will be returned within the body as json following your rpc's return value's json schema.

For successful remote procedure calls, the http status code will be 200. For errors during the call, the http status code will be in the 4xx and 5xx range - depending on the error that occured. The response body will contain the json rpc error as per specification.

In case you are using rpc over websocket or http, your methods will look the same. However, you will have to wrap the request in the jsonRpc request object.

{
  "jsonrpc": 2.0,
  "id": 1,
  "method": "<systemName>/<methodName>.v<version>",
  "params": {},
}

The response will reflect the id sent in the request. Each request should use its unique id per client to map the request to the response on the client's side.

{
  "jsonrpc": 2.0,
  "id": 1,
  "result": {}
}

In case of an error response, the client will receive no result but an error in the response.

{
  "jsonrpc": 2.0,
  "id": 1,
  "error": {
    "code": -32000,
    "message": "Internal server error"
  }
}

Error handling

Jonson predefines a few jsonRpc default errors which are described in the spec. You can either clone those and add your own data by calling e.g. jonson.ErrInvalidParams.CloneWithData(yourData) or define your own errors by using jonson.Error. A jsonRpc error consists of a message, a code and optional data. For further details on error messages, have a look at: jsonRpc error object

Advanced factory features

In most cases, you will use the providers using their generated RequireXXX functions, such as:

// LoginV1 allows an account to log in
func (a *Authentication) LoginV1(ctx *jonson.Context, params *LoginV1Params) error {
  // the factory provides the database and we can now access it here in the code
  db := infra.RequireDB(ctx)
  // put your logic here
  return nil
}

Additionally, Jonson allows you to use any provided type in your remote procedure call's parameters. In case the parameter is not providable and not of type jonson.Context or a remote procedure call jonson.Params, the function will not be called.

You can for example directly define the db as a parameter in your function and access it within your logic.

// LoginV1 allows an account to log in
func (a *Authentication) LoginV1(ctx *jonson.Context, db *infra.DB, params *LoginV1Params) error{
  // put your login logic here
  return nil
}

This feature comes in very handy in case you want to check whether an account is authenticated or not.


type AuthenticationProvider struct {

}

// @generate
type Private struct {}

func (a *AuthenticationProvider) NewPrivate(ctx *jonson.Context) *Private{
  req := jonson.RequireHttpRequest(ctx)
  sessionId := req.Cookie("sessionId")
  if (sessionId == ""){
    panic(jonson.ErrUnauthenticated)
  }
  // more logic here

  return &Private{}
}

Within your endpoint, you can now use Private as a safeguard. In case the calling user does not possess a valid session, the provider will panic and the function will never be callable.


type MeV1Result struct {
  Name string
}

// MeV1 returns my profile
func (a *Authentication) MeV1(ctx *jonson.Context, private *Private) (*MeV1Result, error) {
  // By now, we know that the user does possess a valid session.
  // We cano now safely proceed with the function's flow
  return &MeV1Result {
    Name: "Silvio"
  }, nil
}

Impersonation

In certain cases, you might have to impersonate another caller: Alice needs to perform certain operation in the scope of user Bob. Therefore, you can use the Impersonator. By providing the jonson.ImpersonatorProvider() to the factory during initialization, you can use jonson's impersonator to make calls on behalf of other accounts. The impersonator can impersonate multiple accounts: In case Alice calls on behalf of Bob which calls in behalf of Charly, the Impersonator will create a new context for all three calls; Impersonated, which is stored in the context, will take care to trace all nested impersonations and make them available with a call towards impersonated.TracedAccountUuids(). The impersonation of the current scope is accessible through impersonated.AccountUuid().

fac := jonson.NewFactory()
fac.RegisterProvider(jonson.NewImpersonatorProvider())

type DoOnUsersBehalfV1Params struct {
  OtherAccountUuid uuid
}

func (a *Authentication) DoOnUsersBehalfV1(ctx *jonson.Context, params *DoOnUsersBehalfV1Params) error {
  return jonson.RequireImpersonator(params).Impersonate(params.OtherAccountUuid, func(ctx *jonson.Context) error {
    // perform any logic inside the scope of OtherAccountUuid
    return nil
  })
}

Within your IsAuthenticated(ctx) and IsAuthorized(ctx) implementations, you should access the impersonated values which have or have not been set by a function:

func IsAuthorized(ctx *jonson.Context)(*string, error){
  impersonated := jonson.RequireOptionalImpersonated(ctx)
  if impersonated != nil {
    // perform the logic for impersonated accounts
    allImpersonatedUuids := impersonated.TracedAccountUuids()
    currentImpersonatedAccount := impersonated.AccountUuid()
    return nil, nil
  }
  // perform the logic for non-impersonated accounts

  return nil, nil
}

Time provider

Since it's used in basically all applications, jonson comes with a pre-defined time provider.

The time provider allows you to also mock a timing instance during your tests (see: testing).

For production purposes, you will potentially want to use a real time provided to your remote procedure calls. Use jonson.RealTime to provide a real timestamp.

timeProvider := jonson.NewTimeProvider(func()jonson.Time{
  return jonson.NewRealTime()
})

Auth provider

Most applications need some sort of authentication. You can use the jonson.AuthProvider to create an authentication provider.

NewAuthProvider requires you to pass an auth client which implements IsAuthenticated and IsAuthorized.

IsAuthenticated: the account is logged in; IsAuthorized: the account is logged in and has access rights to the called route.

You will probably implement the client similar to the example below:


type AuthClient struct {
}

var _ jonson.AuthClient = (&AuthClient{})

func(a *AuthClient) IsAuthenticated(ctx *jonson.Context)(*string, error){
  req := jonson.RequireHttpRequest(ctx)
  cookie, err := req.Cookie("session")
  if err != nil{
    // missing session cookie
    return nil, nil
  }
  value := string(cookie.Value)
  // look up the session in your database or remote system
  var accountUuid string
  err := db.Get(&accountUuid, `...`)
  if err != nil {
     // db connection error?
    return nil, err
  }
  return &accountUuid, nil
}

func(a *AuthClient) IsAuthorized(ctx *jonson.Context)(*string, error){
  req := jonson.RequireHttpRequest(ctx)
  // we need the meta from the request to check whether
  // the account is able to call the underlying method
  meta := jonson.ReuqireRpcMeta(ctx)
  cookie, err := req.Cookie("session")
  if err != nil{
    // missing session cookie
    return nil, nil
  }
  value := string(cookie.Value)
  // look up the session in your database or remote system
  // _and_ make sure the account can access the current method
  var accountUuid string
  var canAccess bool
  canAccess, err := db.Get(&accountUuid, `...`, meta.Method)
  if err != nil {
     // db connection error?
    return nil, err
  }
  if (!canAccess){
    return nil, nil
  }
  return &accountUuid, nil
}

For nested in-process-calls of methods (e.g. method A calls method B using generated remote procedure calls), a new context is being forked. The new context makes sure to only copy values from context A to context B that have been explicitly marked as shareable. Let's assume method A is private an method B is private: caller Alice can access method A but cannot access method B; Since method A now tries to call method B, we must make sure to not provide jonson.Private to the context forked for the call towards method B; In case we would make private shareable, Alice (since she obtained access to method A) would implicitly gain access to method B. This could call a potential security risk.

Public, however, can be shared between forked contexts: a logged in user will remain authenticated (logged in) across contexts.

Testing

Jonson provides a package github.com/doejon/jonson/jonsontest which allows you to quickly spin up a test context boundary. Within your test contexts, you will be able to call any API endpoint.

factory := jonson.NewFactory()
factory.RegisterProvider(NewAuthenticationProvider())
secret := jonson.NewDebugSecret()
methodHandler := jonson.NewMethodHandler(factory, secret, nil)
methodHandler.RegisterSystem(NewAccount())

t.Run("gets profile", func(t *testing.T) {
  contextBoundary := jonsontest.NewContextBoundary(t, factory, methodHandler)
  var p *GetProfileV1Result
  contextBoundary.MustRun(func(ctx *jonson.Context) (err error) {
    p, err = GetProfileV1(ctx, &GetProfileV1Params{
      Uuid: testUuid,
    })
    return err
  })
  if p.Name != "Silvio" {
    t.Fatalf("expected name to equal Silvio, got: %s", p.Name)
  }
})

The test context boundary is pre-equipped with functions to provide a http.Request and http.ResponseWriters by using contextBoundary.WithHttpSource(). In case needed, you can also specify your RpcMeta by using contextBoundary.WithRpcMeta().

In case you want to mock a time during testing, use jonsontest.NewFrozenTime() or jonsontest.NewReferenceTime():

factory := jonson.NewFactory()
factory.RegisterProvider(NewAuthenticationProvider())

frozenTime := jonsontest.NewFrozenTime()

factory.RegisterProvider(jonson.NewTimeProvider(func(){
  return frozenTime
}))

secret := jonson.NewDebugSecret()
methodHandler := jonson.NewMethodHandler(factory, secret, nil)
methodHandler.RegisterSystem(NewAccount())

t.Run("gets profile", func(t *testing.T) {
  // do something
  frozenTime.Add(time.Second * 10)
  // do something 10 seconds later
})
Testing auth

For projects relying on jonson.Private and jonson.Public for authorization and authentication, you can use jonsontest.AuthClientMock to mock callers towards your remote procedure calls.

fac := jonson.NewFactory()

// create a new auth client mock and pass the mock
// towards the auth provider
mock := jonsontest.NewAuthClientMock()
fac.RegisterProvider(jonson.NewAuthProvider(mock))

mtd := jonson.NewMethodHandler(fac, jonson.NewDebugSecret(), nil)
mtd.RegisterSystem(&System{})

// create a new account (super user in this case) which has access
// to everything
accSuperUser := mock.NewAccount("e6dd1e60-8969-4f08-a854-80a29b69d7f3").Authorized()

t.Run("accSuperUser can access set and get", func(t *testing.T) {
  // provide the super user to the context boundary - the account will now be the calling account
  // of your tests
  NewContextBoundary(t, fac, mtd, accSuperUser.Provide).MustRun(func(ctx *jonson.Context) error {
    // call your generated remote procedure call methods
    return GetV1(ctx)
  })
  NewContextBoundary(t, fac, mtd, accSuperUser.Provide).MustRun(func(ctx *jonson.Context) error {
    return SetV1(ctx)
  })
})

Feel free to create as many test accounts as necessary. The test account allows you to specify the behavior of the created account:

// generate an account that is neither authenticated nor authorized
acc1 := mock.NewAccount("e6dd1e60-8969-4f08-a854-80a29b69d7f3")

// generate an authenticated account (logged in)
acc2 := mock.NewAccount("e6dd1e60-8969-4f08-a854-80a29b69d7f3").Authenticated()

// generate an account that has access to everything
acc3 := mock.NewAccount("e6dd1e60-8969-4f08-a854-80a29b69d7f3").Authorized()

// generate an account that has access to specific methods only
acc4 := mock.NewAccount("e6dd1e60-8969-4f08-a854-80a29b69d7f3").Authorized(&jonsontest.RpcMethod{
  RpcHttpMethod: jonson.RpcHttpMethodPost,
  method: "/user/get.v1"
})

Authorized accounts are also authenticated (logged in). No need

Code generation

To create types for internal remote procedure calls (in between systems) as well as to generate the RequireProvider() functions, use the jonson generator.

To generate types in a system (or provider), add the following line to one of your system's files.

package example

//go:generate go run github.com/doejon/jonson/cmd/generate

For projects forking jonson, you can provide your own jonson import as a flag during code generation:

//go:generate go run github.com/doejon/jonson/cmd/generate -jonson=github.com/doejon/jonson

Using go generate ./..., you should now see two new files being created within your system containing providers and remote procedure calls: jonson.procedure-calls.gen.go and jonson.providers.gen.go.

The procedure calls file contains all remote procedure calls specified within the current system. These helper methods allow us to call another system's procedure without doing an http round trip.

In order to trigger code generation, tag the types that should be requirable with // @generate.

Current generation limitations: The generator currently only works with the default method name used within jonson.

Dedication

The whole idea for this library was born after a long iteration period with dear friends. It is heavily influenced by one of the best mentors of my (professional) life.

Documentation

Index

Constants

This section is empty.

Variables

View Source
var (
	ErrParse                  = &Error{Code: -32700, Message: "Parse error"}
	ErrMethodNotFound         = &Error{Code: -32601, Message: "Method not found"}
	ErrInvalidParams          = &Error{Code: -32602, Message: "Invalid params"}
	ErrInternal               = &Error{Code: -32603, Message: "Internal error"}
	ErrServerMethodNotAllowed = &Error{Code: -32000, Message: "Server error: method not allowed"}
	ErrUnauthorized           = &Error{Code: -32001, Message: "Not authorized"}
	ErrUnauthenticated        = &Error{Code: -32002, Message: "Not authenticated"}
)

Rpc internal errors

View Source
var TypeContext = reflect.TypeOf((**Context)(nil)).Elem()
View Source
var TypeHttpRequest = reflect.TypeOf((**HttpRequest)(nil)).Elem()
View Source
var TypeHttpResponseWriter = reflect.TypeOf((**HttpResponseWriter)(nil)).Elem()
View Source
var TypeImpersonated = reflect.TypeOf((**Impersonated)(nil)).Elem()
View Source
var TypeImpersonator = reflect.TypeOf((**Impersonator)(nil)).Elem()
View Source
var TypeLogger = reflect.TypeOf((**slog.Logger)(nil)).Elem()
View Source
var TypePrivate = reflect.TypeOf((**Private)(nil)).Elem()
View Source
var TypePublic = reflect.TypeOf((**Public)(nil)).Elem()
View Source
var TypeRpcMeta = reflect.TypeOf((**RpcMeta)(nil)).Elem()
View Source
var TypeSecret = reflect.TypeOf((*Secret)(nil)).Elem()
View Source
var TypeTime = reflect.TypeOf((*Time)(nil)).Elem()
View Source
var TypeWSClient = reflect.TypeOf((**WSClient)(nil)).Elem()

Functions

func GetDefaultMethodName

func GetDefaultMethodName(system string, method string, version uint64) string

func IPAddress

func IPAddress(r *http.Request) string

IPAddress returns the request's ip address

func NewNoOpLogger

func NewNoOpLogger() *slog.Logger

func RequireLogger

func RequireLogger(ctx *Context) *slog.Logger

RequireLogger allows you to require the logger provided during initialization. In case no logger was provided, a NoOpLogger will be returned. The logger will be available by default.

func SplitMethodName

func SplitMethodName(method string) (string, uint64)

func ToKebabCase

func ToKebabCase(input string) string

ToKebabCase converts the provided string to kebab-case

func ToPascalCase

func ToPascalCase(input string) string

ToPascalCase converts the provided string to PascalCase

Types

type AESSecret

type AESSecret struct {
	Shareable
	ShareableAcrossImpersonation
	// contains filtered or unexported fields
}

func NewAESSecret

func NewAESSecret(aesKeyHex string) *AESSecret

func (*AESSecret) Decode

func (e *AESSecret) Decode(in string) (string, error)

func (*AESSecret) Encode

func (e *AESSecret) Encode(in string) string

Encode may be used to embed sensitive information

type AuthClient

type AuthClient interface {

	// IsAuthenticated: does the caller possess a valid session - hence do we know who them is?
	// In case an error occurs (networking issues or others), IsAuthorized should return (nil, err);
	// In case of a missing authentication, the function should return (nil, nil)
	// In case of a valid authentication, the function should return (account's uuid, nil)
	IsAuthenticated(ctx *Context) (*string, error)
	// IsAuthorized: does the caller possess a valid session _and_ cann the caller access the current method?
	// In case an error occurs (networking issues or others), IsAuthorized should return (nil, err);
	// In case of a missing authorization, the function should return (nil, nil)
	// In case of a valid authorization, the function should return (account's uuid, nil)
	IsAuthorized(ctx *Context) (*string, error)
}

AuthClient can be implemented by any backend which can check for IsAuthenticated or IsAuthorized.

type AuthProvider

type AuthProvider struct {
	// contains filtered or unexported fields
}

AuthProvider allows us to enable authentication within our calls.

func NewAuthProvider

func NewAuthProvider(
	client AuthClient,
) *AuthProvider

NewAuthProvider returns a new instance of an auth provider

func (*AuthProvider) NewPrivate

func (p *AuthProvider) NewPrivate(ctx *Context) *Private

NewPrivate returns a new private instance

func (*AuthProvider) NewPublic

func (p *AuthProvider) NewPublic(ctx *Context) *Public

NewPublic returns a new public instance

type Context

type Context struct {
	// contains filtered or unexported fields
}

func NewContext

func NewContext(parent context.Context, factory *Factory, methodHandler *MethodHandler) *Context

func (*Context) CallMethod

func (c *Context) CallMethod(method string, rpcHttpMethod RpcHttpMethod, payload any, bindata []byte) (any, error)

func (*Context) Deadline

func (c *Context) Deadline() (time.Time, bool)

func (*Context) Done

func (c *Context) Done() <-chan struct{}

func (*Context) Err

func (c *Context) Err() error

func (*Context) Finalize

func (c *Context) Finalize(err error) error

func (*Context) Fork

func (c *Context) Fork() *Context

func (*Context) GetValue

func (c *Context) GetValue(inst reflect.Type) (any, error)

GetValue returns a value that's been previously required; In case the value does _not_ exist, an error will be returned; This method is usually not needed but can be necessary in case you're implementing new providers in the need to access previously initialized values _without_ explicitly initializing one (calling Require) checking for existance.

func (*Context) Invalidate

func (c *Context) Invalidate(rt ...reflect.Type)

func (*Context) Require

func (c *Context) Require(inst reflect.Type) any

func (c *Context) Require[T any]() T {

func (*Context) StoreValue

func (c *Context) StoreValue(rt reflect.Type, val any)

func (*Context) Value

func (c *Context) Value(key any) any

type DebugSecret

type DebugSecret struct {
	Shareable
	ShareableAcrossImpersonation
}

DebugSecret implements the Secret interface without actually encrypting the passed data: the data will be returned as-is. The functionality can be helpful for debugging certain error messages during development.

func NewDebugSecret

func NewDebugSecret() *DebugSecret

func (*DebugSecret) Decode

func (e *DebugSecret) Decode(in string) (string, error)

func (*DebugSecret) Encode

func (e *DebugSecret) Encode(in string) string

Encode may be used to embed sensitive information

type Error

type Error struct {
	Code    int        `json:"code"`
	Message string     `json:"message"`
	Data    *ErrorData `json:"data,omitempty"`
}

Error object

func Validate

func Validate(secret Secret, validateable ValidatedParams, basePath ...string) *Error

Validate validates the handled interface

func (Error) CloneWithData

func (e Error) CloneWithData(data *ErrorData) *Error

CloneWithData returns a copy with the supplied data set

func (*Error) Error

func (e *Error) Error() string

func (Error) String

func (e Error) String() string

type ErrorData

type ErrorData struct {
	Path    []string `json:"path,omitempty"`
	Details []*Error `json:"details,omitempty"`
	Debug   string   `json:"debug,omitempty"`
}

ErrorData object

func (ErrorData) String

func (e ErrorData) String() string

type Factory

type Factory struct {
	// contains filtered or unexported fields
}

func NewFactory

func NewFactory(logger ...*slog.Logger) *Factory

func (*Factory) Provide

func (f *Factory) Provide(ctx *Context, rt reflect.Type) any

Provide provides a registered type. The returned type is of type rt.

func (*Factory) RegisterProvider

func (f *Factory) RegisterProvider(provider any)

RegisterProvider registers a new Provider and panics on error The provider needs to be a pointer to a struct which provides methods accepting *jonson.Context and returning a single type. The method's name needs to be equal to the returned type's name and start with New. Example:

type Provider struct {}

type Time struct {}

func (p *Provider) NewTime() *Time{
	return &Time{}
}

type DB struct {}

func(p *Provider) NewDB() *DB {
	return &DB{}
}

fac := jonson.NewFactory()
fac.RegisterProvider(&Provider{})

func (*Factory) RegisterProviderFunc

func (f *Factory) RegisterProviderFunc(fn any)

RegisterProviderFunc allows us to register a single function returning a provider. Example:

 func ProvideDB(ctx *jonson.Context)*sql.DB{
	  return &sql.NewDB()
 }

 fac := jonson.NewFactory()
 fac.RegisterProviderFunc(ProvideDB)

func (*Factory) Types

func (f *Factory) Types() []reflect.Type

type Finalizeable

type Finalizeable interface {
	Finalize([]error) error
}

type Handler

type Handler interface {
	Handle(w http.ResponseWriter, req *http.Request) bool
}

A handler will be handled by the server. You can decide which handler you feel like mounting, such as default http handlers, websocket handlers, an ajax rpc endpoint or exposing each rpc method as its own http endpoint.

type HttpGet

type HttpGet interface {
	// contains filtered or unexported methods
}

HttpGet can be used in case you want to enforce GET within your remote procedures served over http. In case you're using websockets or http rpc, GET cannot be enforced. For rpc over http (single endpoint), POST will be enforced by default. Example: func (s *System) GetProfileV1(ctx *jonson.Context, _ jonson.HttpGet) error{}

type HttpMethodHandler

type HttpMethodHandler struct {
	// contains filtered or unexported fields
}

HttpMethodHandler will register all methods within the methodHandler as separate http endpoints, such as: system/method.v1, system/another-method.v1 in case the method accepts params, POST is enforced, otherwise GET will be used as the accepting http method.

func NewHttpMethodHandler

func NewHttpMethodHandler(methodHandler *MethodHandler) *HttpMethodHandler

func (*HttpMethodHandler) Handle

Handle handles the incoming http request and parses the payload. Since we do not need the json rpc wrapper for these calls (method is the http path), we only expect a _single_ data json object inside the body. in case

type HttpPost

type HttpPost interface {
	// contains filtered or unexported methods
}

HttpPost can be used in case you want to enforce POST within your remote procedures served over http. In case you're using websockets or http rpc, POST cannot be enforced. For rpc over http (single endpoint), POST will be enforced by default. func (s *System) UpdateProfileV1(ctx *jonson.Context, _ jonson.HttpPost) error{}

type HttpRegexpHandler

type HttpRegexpHandler struct {
	// contains filtered or unexported fields
}

The HttpRegexpHandler will accept regular expressions and will register those as default http endpoints. Those methods cannot be called within the rpc world

func NewHttpRegexpHandler

func NewHttpRegexpHandler(factory *Factory, methodHandler *MethodHandler) *HttpRegexpHandler

func (*HttpRegexpHandler) Handle

Handle will handle an incoming http request

func (*HttpRegexpHandler) RegisterRegexp

func (h *HttpRegexpHandler) RegisterRegexp(pattern *regexp.Regexp, handler func(ctx *Context, w http.ResponseWriter, r *http.Request, parts []string))

RegisterRegexp registers a direct http func for a given regexp

type HttpRequest

type HttpRequest struct {
	Shareable
	ShareableAcrossImpersonation
	*http.Request
}

func RequireHttpRequest

func RequireHttpRequest(ctx *Context) *HttpRequest

RequireHttpRequest returns the current http request. In case the connection was created using websockets, the underlying http.Request opening the connection will be returned.

type HttpResponseWriter

type HttpResponseWriter struct {
	Shareable
	ShareableAcrossImpersonation
	http.ResponseWriter
}

func RequireHttpResponseWriter

func RequireHttpResponseWriter(ctx *Context) *HttpResponseWriter

RequireHttpResponseWriter returns the current http response writer which is used to handle the ongoing request's response.

type HttpRpcHandler

type HttpRpcHandler struct {
	// contains filtered or unexported fields
}

func NewHttpRpcHandler

func NewHttpRpcHandler(methodHandler *MethodHandler, path string) *HttpRpcHandler

func (*HttpRpcHandler) Handle

func (h *HttpRpcHandler) Handle(w http.ResponseWriter, req *http.Request) bool

Handle will handle an incoming http request

type Impersonated

type Impersonated struct {
	// The value needs to be shared
	// across calls done within a scope of an impersonation
	Shareable
	// contains filtered or unexported fields
}

Impersonated will be stored once an account has been impersonated. Use RequireImpersonated to gain access to the impersonated account.

func RequireImpersonated

func RequireImpersonated(ctx *Context) *Impersonated

RequireImpersonated returns the current impersonated setting; In case no impersonation has been set, RequireImpersonated will panic

func RequireOptionalImpersonated

func RequireOptionalImpersonated(ctx *Context) *Impersonated

RequireOptionalImpersonated returns impersonated in case it exists; In case no impersonation is taking place, RequireOptionalImpersonated will return nil

func (*Impersonated) AccountUuid

func (i *Impersonated) AccountUuid() string

func (*Impersonated) TracedAccountUuids

func (i *Impersonated) TracedAccountUuids() []string

TracedAccountUuids returns _all_ impersonated account uuids of the current scope: in case Account Alice impersonates Account Bob who impersonates Account Charly, TracedAccountUuids() will return [BobUuid, CharlyUuid]

type Impersonator

type Impersonator struct {
	// contains filtered or unexported fields
}

func RequireImpersonator

func RequireImpersonator(ctx *Context) *Impersonator

RequireImpersonator returns the impersonator

func (*Impersonator) Impersonate

func (i *Impersonator) Impersonate(accountUuid string, fn func(ctx *Context) error) error

Impersonate will impersonate an account. Once the impersonation happened, a new context will be created and the context will be in the scope of the impersonated account.

type ImpersonatorProvider

type ImpersonatorProvider struct {
}

ImpersonatorProvider allows us to provide impersonation functionality to jonson. Impersonation can be used to make calls towards the API on behalf of another user.

func NewImpersonatorProvider

func NewImpersonatorProvider() *ImpersonatorProvider

func (*ImpersonatorProvider) NewImpersonator

func (i *ImpersonatorProvider) NewImpersonator(ctx *Context) *Impersonator

NewImpersonator instantiates a new impersonator instance

type MethodDefinition

type MethodDefinition struct {
	System      string
	Method      string
	Version     uint64
	HandlerFunc any
	// contains filtered or unexported fields
}

MethodDefinition is used by MustRegisterAPI

type MethodHandler

type MethodHandler struct {
	// contains filtered or unexported fields
}

func NewMethodHandler

func NewMethodHandler(
	factory *Factory,
	errorEncoder Secret,
	opts *MethodHandlerOptions,
) *MethodHandler

func (*MethodHandler) CallMethod

func (m *MethodHandler) CallMethod(_ctx *Context, method string, rpcHttpMethod RpcHttpMethod, payload any, bindata []byte) (any, error)

func (*MethodHandler) GetSystem

func (m *MethodHandler) GetSystem(sys any) any

GetSystem returns a system. The function will panic in case system does not exist

func (*MethodHandler) RegisterMethod

func (m *MethodHandler) RegisterMethod(def *MethodDefinition)

RegisterMethod registers a new method

func (*MethodHandler) RegisterSystem

func (m *MethodHandler) RegisterSystem(sys any, routeDebugger ...func(s string))

RegisterSystem registers an entire system using reflect based method lookups

type MethodHandlerOptions

type MethodHandlerOptions struct {
	MissingValidationLevel MissingValidationLevel
}

type MissingValidationLevel

type MissingValidationLevel string

MissingValidationLevel allows us to set a validation level within the method handlers to enforce parameter validation or ignore validation if not present

const (
	MissingValidationLevelIgnore MissingValidationLevel = "ignore"
	MissingValidationLevelInfo   MissingValidationLevel = "info"
	MissingValidationLevelWarn   MissingValidationLevel = "warn"
	MissingValidationLevelError  MissingValidationLevel = "error"
	MissingValidationLevelFatal  MissingValidationLevel = "fatal"
)

type Params

type Params struct {
}

Params must be embedded as first element in all value containers

type Private

type Private struct {
	// contains filtered or unexported fields
}

Private references endpoints which are private NOTE: The private provider must never be shared across contexts: Assume requestor calling method /user/set.v1 which calls /user/get.v1 internally; In case the requestor does have permission to call /user/set.v1 but not /user/get.v1, we need to make sure to re-evaluate the authorization permissions - hence, recreate a Private instance upon in-memory method calls. This is being ensured by calling context.CallMethod which will internally fork a context and only copy those values to the new forked context explicitly marked as shareable. Therefore: never make Private shareable to keep the authorization working as expected

func RequirePrivate

func RequirePrivate(ctx *Context) *Private

func (*Private) AccountUuid

func (p *Private) AccountUuid() string

type Public

type Public struct {

	// Public is shareable:
	// in case the requestor calls /user/get.v1 which is public and
	// then requests /user/get-image.v1 which is public will
	// still resolve to the same requestor. We can
	// safe ourselves a round trip to the authenticator and
	// pass the initial resolved value to the forked context
	Shareable
	// contains filtered or unexported fields
}

Public references endpoints which are public

func RequirePublic

func RequirePublic(ctx *Context) *Public

RequirePublic returns a public caller

func (*Public) AccountUuid

func (p *Public) AccountUuid(ctx *Context) (*string, error)

AccountUuid gets the underlying account uuid. The call towards AccountUuid is protected with a mutex: in case two callers try to access the account uuid at the same time, only one will do the request; Possible return values: nil, err --> the client had an error nil, nil --> no error, not authenticated account uuid, nil -> no error, authenticated

type RealTime

type RealTime struct {
	Shareable
	ShareableAcrossImpersonation
}

RealTime implements time

func NewRealTime

func NewRealTime() *RealTime

NewTime returns a time instance which provides us with real time information. You will probably use this time instance for your production build.

func (*RealTime) Now

func (t *RealTime) Now() time.Time

Now returns current time as UTC

func (*RealTime) Sleep

func (t *RealTime) Sleep(dur time.Duration)

Sleep for duration

type RpcErrorResponse

type RpcErrorResponse struct {
	RpcResponseHeader
	Error *Error `json:"error"`
}

RpcErrorResponse object

func NewRpcErrorResponse

func NewRpcErrorResponse(id json.RawMessage, e *Error) *RpcErrorResponse

NewRpcErrorResponse returns a new ErrorResponse

type RpcHttpMethod

type RpcHttpMethod string
const (
	RpcHttpMethodGet     RpcHttpMethod = "GET"
	RpcHttpMethodPost    RpcHttpMethod = "POST"
	RpcHttpMethodUnknown RpcHttpMethod = "UNKNOWN"
)

type RpcMeta

type RpcMeta struct {
	Method     string
	HttpMethod RpcHttpMethod
	Source     RpcSource
}

RpcMeta contains Rpc call meta data information that has been set whenever a call towards an Rpc method happened

func RequireRpcMeta

func RequireRpcMeta(ctx *Context) *RpcMeta

type RpcNotification

type RpcNotification struct {
	Version string          `json:"jsonrpc"`
	Method  string          `json:"method"`
	Params  json.RawMessage `json:"params,omitempty"`
}

RpcNotification object

func NewRpcNotification

func NewRpcNotification(method string, payload any) *RpcNotification

type RpcRequest

type RpcRequest struct {
	Version string          `json:"jsonrpc"`
	ID      json.RawMessage `json:"id"`
	Method  string          `json:"method"`
	Params  json.RawMessage `json:"params"`
}

RpcRequest object

func (*RpcRequest) UnmarshalAndValidate

func (r *RpcRequest) UnmarshalAndValidate(errEncoder Secret, out any, bindata []byte) error

UnmarshalAndValidate fills the given interface with the supplied params

type RpcResponseHeader

type RpcResponseHeader struct {
	Version string          `json:"jsonrpc"`
	ID      json.RawMessage `json:"id"`
}

RpcResponseHeader object

func NewRpcResponseHeader

func NewRpcResponseHeader(id json.RawMessage) RpcResponseHeader

NewRpcResponseHeader returns a new ResponseHeader

type RpcResultResponse

type RpcResultResponse struct {
	RpcResponseHeader
	Result any `json:"result"`
}

RpcResultResponse object

func NewRpcResultResponse

func NewRpcResultResponse(id json.RawMessage, result any) *RpcResultResponse

NewRpcResultResponse returns a new ResultResponse

type RpcSource

type RpcSource string
const (
	RpcSourceHttp    RpcSource = "http"
	RpcSourceHttpRpc RpcSource = "httpRpc"
	RpcSourceWs      RpcSource = "ws"

	// This rpc call will be set in case
	// one rpc calls another rpc
	RpcSourceInternal RpcSource = "internal"
)

type Secret

type Secret interface {
	Shareable
	ShareableAcrossImpersonation
	Encode(in string) string
	Decode(in string) (string, error)
}

func RequireSecret

func RequireSecret(ctx *Context) Secret

type Server

type Server struct {
	// contains filtered or unexported fields
}

Server ...

func NewServer

func NewServer(handlers ...Handler) *Server

NewServer returns a new Server. The handlers provided to the server will be handled through iteration of provided handlers: the first handler returning "true" will stop the iteration through the handlers and the request will be seen as served.

func (*Server) ListenAndServe

func (s *Server) ListenAndServe(addr string) error

ListenAndServe will start listening on http on the given addr

func (*Server) ServeHTTP

func (s *Server) ServeHTTP(w http.ResponseWriter, r *http.Request)

ServeHTTP implements the http.Handler interface

type Shareable

type Shareable interface {
	// contains filtered or unexported methods
}

Shareable defines objects that can be shared between contexts and will be passed to new contexts created within existing contexts. In case you do have a provided method that needs to be forwarded to new contexts created in the current scope, mark them as Shareable:

type Time struct {
  jonson.Shareable
  time.Time
}

type ShareableAcrossImpersonation

type ShareableAcrossImpersonation interface {
	// contains filtered or unexported methods
}

ShareableAcrossImpersonation marks provided entities as shareable across the impersonation context.

type Time

type Time interface {
	Shareable
	ShareableAcrossImpersonation
	Now() time.Time
	Sleep(time.Duration)
}

Time is the interface that can be used within your application. You can mock this interface within your tests.

func RequireTime

func RequireTime(ctx *Context) Time

RequireHttpResponseWriter returns the current http response writer which is used to handle the ongoing request's response.

type TimeProvider

type TimeProvider struct {
	// contains filtered or unexported fields
}

TimeProvider allows us to provide a time within our application. In order to allow for mocking times, we can use this pre-defined provider to allow for specifying a pre-defined time in our tests which will allow us to move forward/backwards (if needed)

func NewTimeProvider

func NewTimeProvider(inst ...func() Time) *TimeProvider

NewTimeProvider returns a new TimeProvider

func (*TimeProvider) NewTime

func (t *TimeProvider) NewTime(ctx *Context) Time

type ValidatedParams

type ValidatedParams interface {
	JonsonValidate(validator *Validator)
}

type Validator

type Validator struct {
	// contains filtered or unexported fields
}

func NewValidator

func NewValidator(secret Secret, basePath ...string) *Validator

func (*Validator) Error

func (e *Validator) Error() *Error

Error returns a single error which combines all the errors that have been collected. In case no error has been collected, Error returns nil

func (*Validator) Index

func (e *Validator) Index(idx int) *validatorIndex

func (*Validator) Path

func (e *Validator) Path(_path ...any) *validatorError

Path sets the current path that's been validated

type WSClient

type WSClient struct {
	Shareable
	ShareableAcrossImpersonation
	// contains filtered or unexported fields
}

func NewWSClient

func NewWSClient(ws *WebsocketHandler, methodHandler *MethodHandler, conn *websocket.Conn, r *http.Request) *WSClient

func RequireWSClient

func RequireWSClient(ctx *Context) *WSClient

func (*WSClient) IPAddress

func (w *WSClient) IPAddress() string

IPAddress returns the underlying ip address which has been used when opening websocket connection

func (*WSClient) SendNotification

func (w *WSClient) SendNotification(msg *RpcNotification) (err error)

func (*WSClient) UserAgent

func (w *WSClient) UserAgent() string

UserAgent returns the underlying user agent which was sent with the initial opening request

type WebsocketHandler

type WebsocketHandler struct {
	// contains filtered or unexported fields
}

The websocket handler allows us to provide websocket functionality to the server.

func NewWebsocketHandler

func NewWebsocketHandler(
	methodHandler *MethodHandler,
	path string,
	options *WebsocketOptions,
) *WebsocketHandler

func (*WebsocketHandler) Handle

func (wb *WebsocketHandler) Handle(w http.ResponseWriter, req *http.Request) bool

Handle will compare the defined path within the websocket handler to the requested url path. In case paths match, a new websocket client will be registered.

type WebsocketOptions

type WebsocketOptions struct {
	Upgrader       *websocket.Upgrader
	MaxMessageSize int64
	PingPeriod     time.Duration
	PongWait       time.Duration
	WriteWait      time.Duration
}

func NewWebsocketOptions

func NewWebsocketOptions() *WebsocketOptions

Directories

Path Synopsis
cmd
internal

Jump to

Keyboard shortcuts

? : This menu
/ : Search site
f or F : Jump to
y or Y : Canonical URL