Skip to content
New issue

Have a question about this project? Sign up for a free GitHub account to open an issue and contact its maintainers and the community.

By clicking “Sign up for GitHub”, you agree to our terms of service and privacy statement. We’ll occasionally send you account related emails.

Already on GitHub? Sign in to your account

Add protocol helpers to infer procedure and type #756

Closed
wants to merge 8 commits into from

Conversation

emcfarlane
Copy link
Contributor

@emcfarlane emcfarlane commented Jun 25, 2024

Two new methods are added to allow for inferring the procedure and protocol type of a request. These are provided to be used with http middleware. For example, authentication middleware may wish to block on certain protocols or to conditionally allow routes. These new methods pair well with the authn-go middleware.

Two new methods are added to allow for inferring the procedure and
protocol type of a request. These are provided to be used with http
middleware to deduce information about the requests. For example,
authentication middleware may wish to block on certain protocols or
to conditionally allow routes.

Signed-off-by: Edward McFarlane <[email protected]>
@emcfarlane emcfarlane force-pushed the ed/inferProtocolHelpers branch from 23627e1 to 81a58f8 Compare June 26, 2024 22:42
protocol.go Outdated
// HTTP request. It inspects the request's method and headers to determine the
// protocol. If the request doesn't match any known protocol, an empty string
// is returned.
func InferProtocolFromRequest(request *http.Request) string {
Copy link
Member

Choose a reason for hiding this comment

The reason will be displayed to describe this comment to others. Learn more.

  • The rest of the API uses For and not From
  • would this be better named "ProtocolForRequest"?
  • would it be better to return string, bool?

Copy link
Contributor Author

Choose a reason for hiding this comment

The reason will be displayed to describe this comment to others. Learn more.

The For is used to distinguish streams that are to be consumed by the client rather than the handler. So I think the From is better here even tho its not currently in the API.

Copy link
Member

Choose a reason for hiding this comment

The reason will be displayed to describe this comment to others. Learn more.

In my mind they are not necessarily synonyms where you'd always use one over another for consistency.
In my mind, the distinction is that For in a function name is used when the function constructs a new value that corresponds to its input or even wraps its input; From is used when the function extracts a value out of the inputs. In that case, From seems appropriate to me.

As far as returning string vs. (string, bool): another option is to add a ProtocolUnknown constant, so that callers can use a switch and don't need to examine two values. If that approach sounds good, the constant value might need to be the empty string so that an uninitialized Peer object reports ProtocolUnknown. WDYT?

protocol.go Show resolved Hide resolved
protocol.go Outdated Show resolved Hide resolved
@emcfarlane emcfarlane force-pushed the ed/inferProtocolHelpers branch from 5c0f286 to 74290d8 Compare July 29, 2024 15:49
protocol.go Outdated Show resolved Hide resolved
protocol_test.go Show resolved Hide resolved
// HTTP request. It inspects the request's method and headers to determine the
// protocol. If the request doesn't match any known protocol, an empty string
// and false is returned.
func ProtocolFromRequest(request *http.Request) (string, bool) {
Copy link
Member

@jhump jhump Aug 5, 2024

Choose a reason for hiding this comment

The reason will be displayed to describe this comment to others. Learn more.

I've been thinking about if we'd want to ever return something more structured/richer -- like a Protocol type that can inform the caller (for example) if it's connect streaming vs. connect unary or even the version (in the event we ever add a v2 of the protocol), maybe the codec name, etc.

I suppose we can leave this as is for now. In Spec, we'd have to add another accessor -- like maybe ProtocolDetails, and maybe we could then deprecate this and add ProtocolDetailsFromRequest at that time. WDYT?

Copy link
Contributor Author

Choose a reason for hiding this comment

The reason will be displayed to describe this comment to others. Learn more.

The stream is needed by the error writer so it would be nice to expose. It doesn't translate nicely to the grpc or grpc web streaming where we need the descriptor to determine the stream type. These methods are useful, but not that useful so it's annoying for them to clutter the API, they should only be used if the Spec isn't available (maybe that needs to be in the description to avoid misuse?).

My preference would be to move this back to authn-go until we comeup with a better implementation. Maybe we could have a http library in the future that the connect package can utilize with more of these helper methods.

Copy link
Member

Choose a reason for hiding this comment

The reason will be displayed to describe this comment to others. Learn more.

My preference would be to move this back to authn-go until we comeup with a better implementation.

It would be nice to have some canonical implementation that we can also use from vanguard. Admittedly, in the past, we (with @akshayjshah) discussed a possible connectrpc/protocol-go repo where we could put lower-level details of the protocol like this, and connectrpc/connect-go (et al) could then import that. I'm a little concerned with putting it in authn-go if we expect to move it out later. But I guess it's okay as long as we have this figured out before we get to a v1.0 of authn-go 🤷.

protocol_test.go Outdated
Comment on lines 115 to 119
name: "grpcGet",
contentType: "application/grpc+json",
method: http.MethodGet,
want: ProtocolConnect,
valid: true,
Copy link
Contributor Author

Choose a reason for hiding this comment

The reason will be displayed to describe this comment to others. Learn more.

This is an odd result and maybe should be revisited to defaulting to unknown. We allow any application/ prefix to fall-through to be classified as a connect request.

Copy link
Member

Choose a reason for hiding this comment

The reason will be displayed to describe this comment to others. Learn more.

I don't think that's right. I've got an issue in gRPC with some spec issues/clarifications (grpc/grpc#36767), and the discussion there has brought up possible experimental support for other verbs, like GET, in gRPC.

If a content-type is set, we should likely use it to ascertain the protocol and not look at the HTTP method. If there is no content-type, then we'd see if it's GET and if so also check for the presence of required message and encoding query params. Otherwise, it's unknown. How does that sound?

Copy link
Contributor Author

Choose a reason for hiding this comment

The reason will be displayed to describe this comment to others. Learn more.

Sounds good! Now check for query parameters for GET requests. Removed Content-Type from all GET requests as that should not be set for any valid request. Still enforce http method for protocol checks as I do think the spec currently requires it, so these are now otherwise unknown.

Signed-off-by: Edward McFarlane <[email protected]>
@emcfarlane emcfarlane force-pushed the ed/inferProtocolHelpers branch from cbeccdd to 8810d37 Compare August 6, 2024 20:11
@emcfarlane
Copy link
Contributor Author

Closing, talked offline. Can move these helpers to authn-go for now.

@emcfarlane emcfarlane closed this Sep 3, 2024
@emcfarlane emcfarlane deleted the ed/inferProtocolHelpers branch September 3, 2024 22:21
Sign up for free to join this conversation on GitHub. Already have an account? Sign in to comment
Labels
None yet
Projects
None yet
Development

Successfully merging this pull request may close these issues.

3 participants