Documentation: - Add detailed README files for all services (auth, character, database, launcher, packet, utils, world) - Create API documentation for the database service with detailed endpoint specifications - Document database schema and relationships - Add service architecture overviews and configuration instructions Unit Tests: - Implement comprehensive test suite for database repositories (user, character, session) - Add gRPC service tests for database interactions - Create tests for packet service components (bufferpool, connection, packets) - Add utility service tests (health check, logging, load balancer, redis cache, service discovery) - Implement auth service user tests - Add character service tests Code Structure: - Reorganize test files into a more consistent structure - Create a dedicated tests crate for integration testing - Add test helpers and mock implementations for easier testing
104 lines
3.4 KiB
Rust
104 lines
3.4 KiB
Rust
use crate::auth::auth_service_server::AuthService;
|
|
use crate::auth::{
|
|
LoginRequest, LoginResponse, LogoutRequest, RefreshSessionResponse, ValidateSessionRequest,
|
|
ValidateSessionResponse, ValidateTokenRequest, ValidateTokenResponse,
|
|
};
|
|
use crate::common::Empty;
|
|
use crate::database_client::{DatabaseClient};
|
|
use crate::session::session_service_client::SessionServiceClient;
|
|
use crate::session::{GetSessionRequest, RefreshSessionRequest};
|
|
use std::sync::Arc;
|
|
use tonic::{Request, Response, Status};
|
|
use tracing::{debug, error, info, warn};
|
|
|
|
pub struct MyAuthService {
|
|
pub db_client: Arc<DatabaseClient>,
|
|
pub session_client: Arc<SessionServiceClient<tonic::transport::Channel>>,
|
|
}
|
|
|
|
#[tonic::async_trait]
|
|
impl AuthService for MyAuthService {
|
|
async fn login(&self, _request: Request<LoginRequest>) -> Result<Response<LoginResponse>, Status> {
|
|
Err(Status::unimplemented("login not implemented due to changes"))
|
|
}
|
|
|
|
async fn logout(&self, request: Request<LogoutRequest>) -> Result<Response<Empty>, Status> {
|
|
let _req = request.into_inner();
|
|
|
|
Ok(Response::new(Empty {}))
|
|
}
|
|
|
|
async fn validate_token(
|
|
&self,
|
|
_request: Request<ValidateTokenRequest>,
|
|
) -> Result<Response<ValidateTokenResponse>, Status> {
|
|
Ok(Response::new(ValidateTokenResponse {
|
|
valid: false,
|
|
user_id: "".to_string(),
|
|
session_id: "".to_string(),
|
|
}))
|
|
}
|
|
|
|
async fn validate_session(
|
|
&self,
|
|
request: Request<ValidateSessionRequest>,
|
|
) -> Result<Response<ValidateSessionResponse>, Status> {
|
|
let req = request.into_inner();
|
|
let response = self
|
|
.session_client
|
|
.as_ref()
|
|
.clone()
|
|
.get_session(GetSessionRequest {
|
|
session_id: req.session_id,
|
|
})
|
|
.await;
|
|
|
|
match response {
|
|
Ok(res) => {
|
|
let res = res.into_inner();
|
|
debug!("Session valid: {:?}", res);
|
|
Ok(Response::new(ValidateSessionResponse {
|
|
valid: true,
|
|
session_id: res.session_id.to_string(),
|
|
user_id: res.user_id.to_string(),
|
|
}))
|
|
}
|
|
Err(error) => {
|
|
debug!("Session invalid or not found: {error}");
|
|
Ok(Response::new(ValidateSessionResponse {
|
|
valid: false,
|
|
session_id: "".to_string(),
|
|
user_id: "".to_string(),
|
|
}))
|
|
}
|
|
}
|
|
}
|
|
|
|
async fn refresh_session(
|
|
&self,
|
|
request: Request<ValidateSessionRequest>,
|
|
) -> Result<Response<RefreshSessionResponse>, Status> {
|
|
let req = request.into_inner();
|
|
let response = self
|
|
.session_client
|
|
.as_ref()
|
|
.clone()
|
|
.refresh_session(RefreshSessionRequest {
|
|
session_id: req.session_id,
|
|
})
|
|
.await;
|
|
|
|
match response {
|
|
Ok(res) => {
|
|
let res = res.into_inner();
|
|
debug!("Session valid: {:?}", res);
|
|
Ok(Response::new(RefreshSessionResponse { valid: res.valid }))
|
|
}
|
|
Err(_) => {
|
|
debug!("Unable to refresh session");
|
|
Ok(Response::new(RefreshSessionResponse { valid: false }))
|
|
}
|
|
}
|
|
}
|
|
}
|