spikard 0.7.4 → 0.8.0

This diff represents the content of publicly available package versions that have been released to one of the supported registries. The information contained in this diff is provided for informational purposes only and reflects changes between package versions as they appear in their respective public registries.
Files changed (31) hide show
  1. checksums.yaml +4 -4
  2. data/ext/spikard_rb/Cargo.lock +583 -201
  3. data/ext/spikard_rb/Cargo.toml +1 -1
  4. data/lib/spikard/grpc.rb +182 -0
  5. data/lib/spikard/version.rb +1 -1
  6. data/lib/spikard.rb +1 -1
  7. data/vendor/crates/spikard-bindings-shared/Cargo.toml +2 -1
  8. data/vendor/crates/spikard-bindings-shared/src/grpc_metadata.rs +197 -0
  9. data/vendor/crates/spikard-bindings-shared/src/lib.rs +2 -0
  10. data/vendor/crates/spikard-core/Cargo.toml +1 -1
  11. data/vendor/crates/spikard-http/Cargo.toml +5 -1
  12. data/vendor/crates/spikard-http/src/grpc/handler.rs +260 -0
  13. data/vendor/crates/spikard-http/src/grpc/mod.rs +342 -0
  14. data/vendor/crates/spikard-http/src/grpc/service.rs +392 -0
  15. data/vendor/crates/spikard-http/src/grpc/streaming.rs +237 -0
  16. data/vendor/crates/spikard-http/src/lib.rs +14 -0
  17. data/vendor/crates/spikard-http/src/server/grpc_routing.rs +288 -0
  18. data/vendor/crates/spikard-http/src/server/mod.rs +1 -0
  19. data/vendor/crates/spikard-http/tests/common/grpc_helpers.rs +1023 -0
  20. data/vendor/crates/spikard-http/tests/common/mod.rs +8 -0
  21. data/vendor/crates/spikard-http/tests/grpc_error_handling_test.rs +653 -0
  22. data/vendor/crates/spikard-http/tests/grpc_integration_test.rs +332 -0
  23. data/vendor/crates/spikard-http/tests/grpc_metadata_test.rs +518 -0
  24. data/vendor/crates/spikard-http/tests/grpc_server_integration.rs +476 -0
  25. data/vendor/crates/spikard-rb/Cargo.toml +2 -1
  26. data/vendor/crates/spikard-rb/src/config/server_config.rs +1 -0
  27. data/vendor/crates/spikard-rb/src/grpc/handler.rs +352 -0
  28. data/vendor/crates/spikard-rb/src/grpc/mod.rs +9 -0
  29. data/vendor/crates/spikard-rb/src/lib.rs +4 -0
  30. data/vendor/crates/spikard-rb-macros/Cargo.toml +1 -1
  31. metadata +15 -1
@@ -0,0 +1,518 @@
1
+ //! Comprehensive gRPC metadata handling tests
2
+ //!
3
+ //! Tests metadata extraction, setting, and manipulation including:
4
+ //! - Metadata extraction from requests
5
+ //! - Metadata setting in responses
6
+ //! - Authentication headers (Bearer tokens)
7
+ //! - Custom headers
8
+ //! - Metadata case sensitivity
9
+ //! - Special characters in metadata values
10
+
11
+ use crate::common::grpc_helpers::*;
12
+ use bytes::Bytes;
13
+ use std::collections::HashMap;
14
+ use std::sync::Arc;
15
+ use tonic::metadata::MetadataMap;
16
+
17
+ mod common;
18
+
19
+ /// Test metadata extraction from request
20
+ #[tokio::test]
21
+ async fn test_metadata_extraction_from_request() {
22
+ let mut server = GrpcTestServer::new();
23
+
24
+ struct MetadataCheckHandler;
25
+ impl spikard_http::grpc::GrpcHandler for MetadataCheckHandler {
26
+ fn call(&self, request: spikard_http::grpc::GrpcRequestData)
27
+ -> std::pin::Pin<Box<dyn std::future::Future<Output = spikard_http::grpc::GrpcHandlerResult> + Send>>
28
+ {
29
+ // Extract and verify metadata
30
+ let has_user_agent = request.metadata.get("user-agent").is_some();
31
+ let has_content_type = request.metadata.get("content-type").is_some();
32
+
33
+ let response = if has_user_agent && has_content_type {
34
+ Bytes::from(r#"{"extracted": true}"#)
35
+ } else {
36
+ Bytes::from(r#"{"extracted": false}"#)
37
+ };
38
+
39
+ Box::pin(async move {
40
+ Ok(spikard_http::grpc::GrpcResponseData {
41
+ payload: response,
42
+ metadata: MetadataMap::new(),
43
+ })
44
+ })
45
+ }
46
+ fn service_name(&self) -> &'static str {
47
+ "test.MetadataCheckService"
48
+ }
49
+ }
50
+
51
+ server.register_service(Arc::new(MetadataCheckHandler));
52
+
53
+ let metadata = create_test_metadata();
54
+
55
+ let response = send_unary_request(
56
+ &server,
57
+ "test.MetadataCheckService",
58
+ "Check",
59
+ Bytes::from("{}"),
60
+ metadata,
61
+ )
62
+ .await
63
+ .expect("Failed to send request with metadata");
64
+
65
+ assert_grpc_response(response, serde_json::json!({"extracted": true}));
66
+ }
67
+
68
+ /// Test Bearer token authentication metadata
69
+ #[tokio::test]
70
+ async fn test_authentication_bearer_token_metadata() {
71
+ let mut server = GrpcTestServer::new();
72
+
73
+ struct AuthServiceHandler;
74
+ impl spikard_http::grpc::GrpcHandler for AuthServiceHandler {
75
+ fn call(&self, request: spikard_http::grpc::GrpcRequestData)
76
+ -> std::pin::Pin<Box<dyn std::future::Future<Output = spikard_http::grpc::GrpcHandlerResult> + Send>>
77
+ {
78
+ let token_present = request
79
+ .metadata
80
+ .get("authorization")
81
+ .map(|v| v.to_str().unwrap_or("").starts_with("Bearer "))
82
+ .unwrap_or(false);
83
+
84
+ let response = if token_present {
85
+ Bytes::from(r#"{"authenticated": true, "user": "alice"}"#)
86
+ } else {
87
+ Bytes::from(r#"{"authenticated": false}"#)
88
+ };
89
+
90
+ Box::pin(async move {
91
+ Ok(spikard_http::grpc::GrpcResponseData {
92
+ payload: response,
93
+ metadata: MetadataMap::new(),
94
+ })
95
+ })
96
+ }
97
+ fn service_name(&self) -> &'static str {
98
+ "api.AuthService"
99
+ }
100
+ }
101
+
102
+ server.register_service(Arc::new(AuthServiceHandler));
103
+
104
+ let mut metadata = create_test_metadata();
105
+ add_auth_metadata(&mut metadata, "secret_token_abc123").unwrap();
106
+
107
+ let response = send_unary_request(
108
+ &server,
109
+ "api.AuthService",
110
+ "Authenticate",
111
+ Bytes::from("{}"),
112
+ metadata,
113
+ )
114
+ .await
115
+ .expect("Failed to authenticate");
116
+
117
+ assert_grpc_response(response, serde_json::json!({
118
+ "authenticated": true,
119
+ "user": "alice"
120
+ }));
121
+ }
122
+
123
+ /// Test custom header metadata
124
+ #[tokio::test]
125
+ async fn test_custom_header_metadata() {
126
+ let mut server = GrpcTestServer::new();
127
+
128
+ struct CustomHeaderHandler;
129
+ impl spikard_http::grpc::GrpcHandler for CustomHeaderHandler {
130
+ fn call(&self, request: spikard_http::grpc::GrpcRequestData)
131
+ -> std::pin::Pin<Box<dyn std::future::Future<Output = spikard_http::grpc::GrpcHandlerResult> + Send>>
132
+ {
133
+ let custom_value = request
134
+ .metadata
135
+ .get("x-custom-header")
136
+ .and_then(|v| v.to_str().ok())
137
+ .unwrap_or("missing")
138
+ .to_string();
139
+
140
+ let response = format!(r#"{{"custom_value": "{}"}}"#, custom_value);
141
+
142
+ Box::pin(async move {
143
+ Ok(spikard_http::grpc::GrpcResponseData {
144
+ payload: Bytes::from(response),
145
+ metadata: MetadataMap::new(),
146
+ })
147
+ })
148
+ }
149
+ fn service_name(&self) -> &'static str {
150
+ "test.CustomHeaderService"
151
+ }
152
+ }
153
+
154
+ server.register_service(Arc::new(CustomHeaderHandler));
155
+
156
+ let mut metadata = create_test_metadata();
157
+ add_metadata_header(&mut metadata, "x-custom-header", "custom_value_123").unwrap();
158
+
159
+ let response = send_unary_request(
160
+ &server,
161
+ "test.CustomHeaderService",
162
+ "GetCustom",
163
+ Bytes::from("{}"),
164
+ metadata,
165
+ )
166
+ .await
167
+ .expect("Failed to send custom header");
168
+
169
+ assert_grpc_response(response, serde_json::json!({"custom_value": "custom_value_123"}));
170
+ }
171
+
172
+ /// Test multiple custom headers
173
+ #[tokio::test]
174
+ async fn test_multiple_custom_headers() {
175
+ let mut server = GrpcTestServer::new();
176
+
177
+ struct MultiHeaderHandler;
178
+ impl spikard_http::grpc::GrpcHandler for MultiHeaderHandler {
179
+ fn call(&self, request: spikard_http::grpc::GrpcRequestData)
180
+ -> std::pin::Pin<Box<dyn std::future::Future<Output = spikard_http::grpc::GrpcHandlerResult> + Send>>
181
+ {
182
+ let req_id = request
183
+ .metadata
184
+ .get("x-request-id")
185
+ .and_then(|v| v.to_str().ok())
186
+ .unwrap_or("missing")
187
+ .to_string();
188
+
189
+ let trace_id = request
190
+ .metadata
191
+ .get("x-trace-id")
192
+ .and_then(|v| v.to_str().ok())
193
+ .unwrap_or("missing")
194
+ .to_string();
195
+
196
+ let response = format!(
197
+ r#"{{"request_id": "{}", "trace_id": "{}"}}"#,
198
+ req_id, trace_id
199
+ );
200
+
201
+ Box::pin(async move {
202
+ Ok(spikard_http::grpc::GrpcResponseData {
203
+ payload: Bytes::from(response),
204
+ metadata: MetadataMap::new(),
205
+ })
206
+ })
207
+ }
208
+ fn service_name(&self) -> &'static str {
209
+ "test.MultiHeaderService"
210
+ }
211
+ }
212
+
213
+ server.register_service(Arc::new(MultiHeaderHandler));
214
+
215
+ let mut metadata = create_test_metadata();
216
+ add_metadata_header(&mut metadata, "x-request-id", "req-12345").unwrap();
217
+ add_metadata_header(&mut metadata, "x-trace-id", "trace-67890").unwrap();
218
+
219
+ let response = send_unary_request(
220
+ &server,
221
+ "test.MultiHeaderService",
222
+ "Process",
223
+ Bytes::from("{}"),
224
+ metadata,
225
+ )
226
+ .await
227
+ .expect("Failed to send multiple headers");
228
+
229
+ assert_grpc_response(response, serde_json::json!({
230
+ "request_id": "req-12345",
231
+ "trace_id": "trace-67890"
232
+ }));
233
+ }
234
+
235
+ /// Test metadata with special characters in values
236
+ #[tokio::test]
237
+ async fn test_metadata_special_characters() {
238
+ let mut server = GrpcTestServer::new();
239
+
240
+ struct SpecialCharHandler;
241
+ impl spikard_http::grpc::GrpcHandler for SpecialCharHandler {
242
+ fn call(&self, request: spikard_http::grpc::GrpcRequestData)
243
+ -> std::pin::Pin<Box<dyn std::future::Future<Output = spikard_http::grpc::GrpcHandlerResult> + Send>>
244
+ {
245
+ let special_header = request
246
+ .metadata
247
+ .get("x-special")
248
+ .and_then(|v| v.to_str().ok())
249
+ .unwrap_or("")
250
+ .to_string();
251
+
252
+ let response = format!(r#"{{"received": "{}"}}"#, special_header);
253
+
254
+ Box::pin(async move {
255
+ Ok(spikard_http::grpc::GrpcResponseData {
256
+ payload: Bytes::from(response),
257
+ metadata: MetadataMap::new(),
258
+ })
259
+ })
260
+ }
261
+ fn service_name(&self) -> &'static str {
262
+ "test.SpecialCharService"
263
+ }
264
+ }
265
+
266
+ server.register_service(Arc::new(SpecialCharHandler));
267
+
268
+ let mut metadata = create_test_metadata();
269
+ // Test with special characters that are URL-safe but uncommon
270
+ add_metadata_header(&mut metadata, "x-special", "value-with_underscore.and.dots").unwrap();
271
+
272
+ let response = send_unary_request(
273
+ &server,
274
+ "test.SpecialCharService",
275
+ "Process",
276
+ Bytes::from("{}"),
277
+ metadata,
278
+ )
279
+ .await
280
+ .expect("Failed to send special chars");
281
+
282
+ assert_grpc_response(response, serde_json::json!({
283
+ "received": "value-with_underscore.and.dots"
284
+ }));
285
+ }
286
+
287
+ /// Test metadata creation with HashMap
288
+ #[test]
289
+ fn test_create_metadata_with_headers_map() {
290
+ let mut headers = HashMap::new();
291
+ headers.insert("authorization".to_string(), "Bearer token123".to_string());
292
+ headers.insert("x-custom-header".to_string(), "custom_value".to_string());
293
+ headers.insert("x-request-id".to_string(), "req-456".to_string());
294
+
295
+ let metadata = create_test_metadata_with_headers(&headers).expect("Failed to create metadata");
296
+
297
+ assert!(metadata.get("authorization").is_some());
298
+ assert!(metadata.get("x-custom-header").is_some());
299
+ assert!(metadata.get("x-request-id").is_some());
300
+ }
301
+
302
+ /// Test default metadata contains expected headers
303
+ #[test]
304
+ fn test_default_metadata_headers() {
305
+ let metadata = create_test_metadata();
306
+
307
+ let user_agent = metadata.get("user-agent").expect("Missing user-agent");
308
+ assert_eq!(user_agent.to_str().unwrap(), "spikard-test/1.0");
309
+
310
+ let content_type = metadata.get("content-type").expect("Missing content-type");
311
+ assert_eq!(content_type.to_str().unwrap(), "application/grpc");
312
+ }
313
+
314
+ /// Test response metadata is preserved
315
+ #[tokio::test]
316
+ async fn test_response_metadata_preservation() {
317
+ let mut server = GrpcTestServer::new();
318
+
319
+ struct ResponseMetadataHandler;
320
+ impl spikard_http::grpc::GrpcHandler for ResponseMetadataHandler {
321
+ fn call(&self, _request: spikard_http::grpc::GrpcRequestData)
322
+ -> std::pin::Pin<Box<dyn std::future::Future<Output = spikard_http::grpc::GrpcHandlerResult> + Send>>
323
+ {
324
+ let mut response_metadata = MetadataMap::new();
325
+ response_metadata.insert("x-response-header", "response-value".parse().unwrap());
326
+
327
+ Box::pin(async {
328
+ Ok(spikard_http::grpc::GrpcResponseData {
329
+ payload: Bytes::from(r#"{"status": "ok"}"#),
330
+ metadata: response_metadata,
331
+ })
332
+ })
333
+ }
334
+ fn service_name(&self) -> &'static str {
335
+ "test.ResponseMetadataService"
336
+ }
337
+ }
338
+
339
+ server.register_service(Arc::new(ResponseMetadataHandler));
340
+
341
+ let response = send_unary_request(
342
+ &server,
343
+ "test.ResponseMetadataService",
344
+ "Check",
345
+ Bytes::from("{}"),
346
+ create_test_metadata(),
347
+ )
348
+ .await
349
+ .expect("Failed to get response with metadata");
350
+
351
+ // Verify metadata is in response
352
+ assert!(!response.metadata.is_empty());
353
+ assert!(response.metadata.get("x-response-header").is_some());
354
+ }
355
+
356
+ /// Test Bearer token format
357
+ #[test]
358
+ fn test_bearer_token_format() {
359
+ let mut metadata = create_test_metadata();
360
+ let token = "my_secret_token_xyz";
361
+
362
+ add_auth_metadata(&mut metadata, token).expect("Failed to add auth");
363
+
364
+ let auth_header = metadata.get("authorization").expect("Missing authorization");
365
+ let auth_str = auth_header.to_str().unwrap();
366
+
367
+ assert!(auth_str.starts_with("Bearer "));
368
+ assert!(auth_str.contains("my_secret_token_xyz"));
369
+ assert_eq!(auth_str, "Bearer my_secret_token_xyz");
370
+ }
371
+
372
+ /// Test metadata extraction with no headers
373
+ #[tokio::test]
374
+ async fn test_metadata_extraction_empty_metadata() {
375
+ let mut server = GrpcTestServer::new();
376
+
377
+ struct EmptyMetadataHandler;
378
+ impl spikard_http::grpc::GrpcHandler for EmptyMetadataHandler {
379
+ fn call(&self, request: spikard_http::grpc::GrpcRequestData)
380
+ -> std::pin::Pin<Box<dyn std::future::Future<Output = spikard_http::grpc::GrpcHandlerResult> + Send>>
381
+ {
382
+ let is_empty = request.metadata.is_empty();
383
+
384
+ let response = if is_empty {
385
+ Bytes::from(r#"{"metadata_empty": true}"#)
386
+ } else {
387
+ Bytes::from(r#"{"metadata_empty": false}"#)
388
+ };
389
+
390
+ Box::pin(async move {
391
+ Ok(spikard_http::grpc::GrpcResponseData {
392
+ payload: response,
393
+ metadata: MetadataMap::new(),
394
+ })
395
+ })
396
+ }
397
+ fn service_name(&self) -> &'static str {
398
+ "test.EmptyMetadataService"
399
+ }
400
+ }
401
+
402
+ server.register_service(Arc::new(EmptyMetadataHandler));
403
+
404
+ let empty_metadata = MetadataMap::new();
405
+
406
+ let response = send_unary_request(
407
+ &server,
408
+ "test.EmptyMetadataService",
409
+ "Check",
410
+ Bytes::from("{}"),
411
+ empty_metadata,
412
+ )
413
+ .await
414
+ .expect("Failed to send with empty metadata");
415
+
416
+ assert_grpc_response(response, serde_json::json!({"metadata_empty": true}));
417
+ }
418
+
419
+ /// Test metadata header with numeric value
420
+ #[tokio::test]
421
+ async fn test_metadata_numeric_value() {
422
+ let mut server = GrpcTestServer::new();
423
+
424
+ struct NumericHeaderHandler;
425
+ impl spikard_http::grpc::GrpcHandler for NumericHeaderHandler {
426
+ fn call(&self, request: spikard_http::grpc::GrpcRequestData)
427
+ -> std::pin::Pin<Box<dyn std::future::Future<Output = spikard_http::grpc::GrpcHandlerResult> + Send>>
428
+ {
429
+ let count = request
430
+ .metadata
431
+ .get("x-count")
432
+ .and_then(|v| v.to_str().ok())
433
+ .unwrap_or("0")
434
+ .to_string();
435
+
436
+ let response = format!(r#"{{"count": {}}}"#, count);
437
+
438
+ Box::pin(async move {
439
+ Ok(spikard_http::grpc::GrpcResponseData {
440
+ payload: Bytes::from(response),
441
+ metadata: MetadataMap::new(),
442
+ })
443
+ })
444
+ }
445
+ fn service_name(&self) -> &'static str {
446
+ "test.NumericHeaderService"
447
+ }
448
+ }
449
+
450
+ server.register_service(Arc::new(NumericHeaderHandler));
451
+
452
+ let mut metadata = create_test_metadata();
453
+ add_metadata_header(&mut metadata, "x-count", "42").unwrap();
454
+
455
+ let response = send_unary_request(
456
+ &server,
457
+ "test.NumericHeaderService",
458
+ "Process",
459
+ Bytes::from("{}"),
460
+ metadata,
461
+ )
462
+ .await
463
+ .expect("Failed to send numeric header");
464
+
465
+ assert_grpc_response(response, serde_json::json!({"count": 42}));
466
+ }
467
+
468
+ /// Test metadata with UUID value
469
+ #[tokio::test]
470
+ async fn test_metadata_uuid_value() {
471
+ let mut server = GrpcTestServer::new();
472
+
473
+ struct UuidHeaderHandler;
474
+ impl spikard_http::grpc::GrpcHandler for UuidHeaderHandler {
475
+ fn call(&self, request: spikard_http::grpc::GrpcRequestData)
476
+ -> std::pin::Pin<Box<dyn std::future::Future<Output = spikard_http::grpc::GrpcHandlerResult> + Send>>
477
+ {
478
+ let uuid = request
479
+ .metadata
480
+ .get("x-request-uuid")
481
+ .and_then(|v| v.to_str().ok())
482
+ .unwrap_or("invalid")
483
+ .to_string();
484
+
485
+ let response = format!(r#"{{"uuid": "{}"}}"#, uuid);
486
+
487
+ Box::pin(async move {
488
+ Ok(spikard_http::grpc::GrpcResponseData {
489
+ payload: Bytes::from(response),
490
+ metadata: MetadataMap::new(),
491
+ })
492
+ })
493
+ }
494
+ fn service_name(&self) -> &'static str {
495
+ "test.UuidService"
496
+ }
497
+ }
498
+
499
+ server.register_service(Arc::new(UuidHeaderHandler));
500
+
501
+ let mut metadata = create_test_metadata();
502
+ let uuid = "550e8400-e29b-41d4-a716-446655440000";
503
+ add_metadata_header(&mut metadata, "x-request-uuid", uuid).unwrap();
504
+
505
+ let response = send_unary_request(
506
+ &server,
507
+ "test.UuidService",
508
+ "Process",
509
+ Bytes::from("{}"),
510
+ metadata,
511
+ )
512
+ .await
513
+ .expect("Failed to send UUID header");
514
+
515
+ assert_grpc_response(response, serde_json::json!({
516
+ "uuid": "550e8400-e29b-41d4-a716-446655440000"
517
+ }));
518
+ }