commit 88f803692a2245b44f52a1fe5c506938b9189e6b Author: Ryan Cavicchioni Date: Mon Jul 26 09:00:25 2021 -0500 Initial commit diff --git a/cmd/client/main.go b/cmd/client/main.go new file mode 100644 index 0000000..b9aef0a --- /dev/null +++ b/cmd/client/main.go @@ -0,0 +1,35 @@ +package main + +import ( + "context" + "fmt" + "net/http" + "os" + + "haberdasher-twirp/haberdasher" +) + +func main() { + var host string = "http://localhost:8080" + if len(os.Args) > 1 { + host = os.Args[1] + } + + client := haberdasher.NewHaberdasherProtobufClient(host, &http.Client{}) + + hat, err := client.MakeHat(context.Background(), &haberdasher.Size{Inches: 12}) + if err != nil { + fmt.Printf("oh no: %v\n", err) + os.Exit(1) + } + fmt.Printf("I have a nice new hat: %+v\n", hat) + + hats, err := client.ListHats(context.Background(), &haberdasher.HatQuery{Limit: 20}) + if err != nil { + fmt.Printf("oh no: %v\n", err) + os.Exit(1) + } + for i, h := range hats.Hats { + fmt.Printf("%d: %+v\n", i, h) + } +} diff --git a/cmd/main.go b/cmd/main.go new file mode 100644 index 0000000..d1b30db --- /dev/null +++ b/cmd/main.go @@ -0,0 +1,20 @@ +package main + +import ( + "net/http" + "os" + + "haberdasher-twirp/haberdasher" + "haberdasher-twirp/internal/haberdasherserver" +) + +func main() { + var bind string = ":8080" + if len(os.Args) > 1 { + bind = os.Args[1] + } + server := &haberdasherserver.Server{} + twirpHandler := haberdasher.NewHaberdasherServer(server) + + http.ListenAndServe(bind, twirpHandler) +} diff --git a/go.mod b/go.mod new file mode 100644 index 0000000..2f319f2 --- /dev/null +++ b/go.mod @@ -0,0 +1,11 @@ +module haberdasher-twirp + +go 1.16 + +require ( + github.com/boltdb/bolt v1.3.1 // indirect + github.com/pkg/errors v0.9.1 // indirect + github.com/twitchtv/twirp v8.1.0+incompatible // indirect + golang.org/x/sys v0.0.0-20210630005230-0f9fa26af87c // indirect + google.golang.org/protobuf v1.27.1 // indirect +) diff --git a/go.sum b/go.sum new file mode 100644 index 0000000..dbff40e --- /dev/null +++ b/go.sum @@ -0,0 +1,14 @@ +github.com/boltdb/bolt v1.3.1 h1:JQmyP4ZBrce+ZQu0dY660FMfatumYDLun9hBCUVIkF4= +github.com/boltdb/bolt v1.3.1/go.mod h1:clJnj/oiGkjum5o1McbSZDSLxVThjynRyGBgiAx27Ps= +github.com/golang/protobuf v1.5.0/go.mod h1:FsONVRAS9T7sI+LIUmWTfcYkHO4aIWwzhcaSAoJOfIk= +github.com/google/go-cmp v0.5.5/go.mod h1:v8dTdLbMG2kIc/vJvl+f65V22dbkXbowE6jgT/gNBxE= +github.com/pkg/errors v0.9.1 h1:FEBLx1zS214owpjy7qsBeixbURkuhQAwrK5UwLGTwt4= +github.com/pkg/errors v0.9.1/go.mod h1:bwawxfHBFNV+L2hUp1rHADufV3IMtnDRdf1r5NINEl0= +github.com/twitchtv/twirp v8.1.0+incompatible h1:KGXanpa9LXdVE/V5P/tA27rkKFmXRGCtSNT7zdeeVOY= +github.com/twitchtv/twirp v8.1.0+incompatible/go.mod h1:RRJoFSAmTEh2weEqWtpPE3vFK5YBhA6bqp2l1kfCC5A= +golang.org/x/sys v0.0.0-20210630005230-0f9fa26af87c h1:F1jZWGFhYfh0Ci55sIpILtKKK8p3i2/krTr0H1rg74I= +golang.org/x/sys v0.0.0-20210630005230-0f9fa26af87c/go.mod h1:oPkhp1MJrh7nUepCBck5+mAzfO9JrbApNNgaTdGDITg= +golang.org/x/xerrors v0.0.0-20191204190536-9bdfabe68543/go.mod h1:I/5z698sn9Ka8TeJc9MKroUUfqBBauWjQqLJ2OPfmY0= +google.golang.org/protobuf v1.26.0-rc.1/go.mod h1:jlhhOSvTdKEhbULTjvd4ARK9grFBp09yW+WbY/TyQbw= +google.golang.org/protobuf v1.27.1 h1:SnqbnDw1V7RiZcXPx5MEeqPv2s79L9i7BJUlG/+RurQ= +google.golang.org/protobuf v1.27.1/go.mod h1:9q0QmTI4eRPtz6boOQmLYwt+qCgq0jsYwAQnmE0givc= diff --git a/haberdasher/service.pb.go b/haberdasher/service.pb.go new file mode 100644 index 0000000..8522400 --- /dev/null +++ b/haberdasher/service.pb.go @@ -0,0 +1,369 @@ +// Code generated by protoc-gen-go. DO NOT EDIT. +// versions: +// protoc-gen-go v1.27.1 +// protoc v3.14.0 +// source: haberdasher/service.proto + +package haberdasher + +import ( + protoreflect "google.golang.org/protobuf/reflect/protoreflect" + protoimpl "google.golang.org/protobuf/runtime/protoimpl" + reflect "reflect" + sync "sync" +) + +const ( + // Verify that this generated code is sufficiently up-to-date. + _ = protoimpl.EnforceVersion(20 - protoimpl.MinVersion) + // Verify that runtime/protoimpl is sufficiently up-to-date. + _ = protoimpl.EnforceVersion(protoimpl.MaxVersion - 20) +) + +type HatQuery struct { + state protoimpl.MessageState + sizeCache protoimpl.SizeCache + unknownFields protoimpl.UnknownFields + + Limit int32 `protobuf:"varint,1,opt,name=limit,proto3" json:"limit,omitempty"` +} + +func (x *HatQuery) Reset() { + *x = HatQuery{} + if protoimpl.UnsafeEnabled { + mi := &file_haberdasher_service_proto_msgTypes[0] + ms := protoimpl.X.MessageStateOf(protoimpl.Pointer(x)) + ms.StoreMessageInfo(mi) + } +} + +func (x *HatQuery) String() string { + return protoimpl.X.MessageStringOf(x) +} + +func (*HatQuery) ProtoMessage() {} + +func (x *HatQuery) ProtoReflect() protoreflect.Message { + mi := &file_haberdasher_service_proto_msgTypes[0] + if protoimpl.UnsafeEnabled && x != nil { + ms := protoimpl.X.MessageStateOf(protoimpl.Pointer(x)) + if ms.LoadMessageInfo() == nil { + ms.StoreMessageInfo(mi) + } + return ms + } + return mi.MessageOf(x) +} + +// Deprecated: Use HatQuery.ProtoReflect.Descriptor instead. +func (*HatQuery) Descriptor() ([]byte, []int) { + return file_haberdasher_service_proto_rawDescGZIP(), []int{0} +} + +func (x *HatQuery) GetLimit() int32 { + if x != nil { + return x.Limit + } + return 0 +} + +// Size of a Hat, in inches. +type Size struct { + state protoimpl.MessageState + sizeCache protoimpl.SizeCache + unknownFields protoimpl.UnknownFields + + Inches int32 `protobuf:"varint,1,opt,name=inches,proto3" json:"inches,omitempty"` // must be > 0 +} + +func (x *Size) Reset() { + *x = Size{} + if protoimpl.UnsafeEnabled { + mi := &file_haberdasher_service_proto_msgTypes[1] + ms := protoimpl.X.MessageStateOf(protoimpl.Pointer(x)) + ms.StoreMessageInfo(mi) + } +} + +func (x *Size) String() string { + return protoimpl.X.MessageStringOf(x) +} + +func (*Size) ProtoMessage() {} + +func (x *Size) ProtoReflect() protoreflect.Message { + mi := &file_haberdasher_service_proto_msgTypes[1] + if protoimpl.UnsafeEnabled && x != nil { + ms := protoimpl.X.MessageStateOf(protoimpl.Pointer(x)) + if ms.LoadMessageInfo() == nil { + ms.StoreMessageInfo(mi) + } + return ms + } + return mi.MessageOf(x) +} + +// Deprecated: Use Size.ProtoReflect.Descriptor instead. +func (*Size) Descriptor() ([]byte, []int) { + return file_haberdasher_service_proto_rawDescGZIP(), []int{1} +} + +func (x *Size) GetInches() int32 { + if x != nil { + return x.Inches + } + return 0 +} + +// A Hat is a piece of headwear made by a Haberdasher. +type Hat struct { + state protoimpl.MessageState + sizeCache protoimpl.SizeCache + unknownFields protoimpl.UnknownFields + + Inches int32 `protobuf:"varint,1,opt,name=inches,proto3" json:"inches,omitempty"` + Color string `protobuf:"bytes,2,opt,name=color,proto3" json:"color,omitempty"` // anything but "invisible" + Name string `protobuf:"bytes,3,opt,name=name,proto3" json:"name,omitempty"` // i.e. "bowler" +} + +func (x *Hat) Reset() { + *x = Hat{} + if protoimpl.UnsafeEnabled { + mi := &file_haberdasher_service_proto_msgTypes[2] + ms := protoimpl.X.MessageStateOf(protoimpl.Pointer(x)) + ms.StoreMessageInfo(mi) + } +} + +func (x *Hat) String() string { + return protoimpl.X.MessageStringOf(x) +} + +func (*Hat) ProtoMessage() {} + +func (x *Hat) ProtoReflect() protoreflect.Message { + mi := &file_haberdasher_service_proto_msgTypes[2] + if protoimpl.UnsafeEnabled && x != nil { + ms := protoimpl.X.MessageStateOf(protoimpl.Pointer(x)) + if ms.LoadMessageInfo() == nil { + ms.StoreMessageInfo(mi) + } + return ms + } + return mi.MessageOf(x) +} + +// Deprecated: Use Hat.ProtoReflect.Descriptor instead. +func (*Hat) Descriptor() ([]byte, []int) { + return file_haberdasher_service_proto_rawDescGZIP(), []int{2} +} + +func (x *Hat) GetInches() int32 { + if x != nil { + return x.Inches + } + return 0 +} + +func (x *Hat) GetColor() string { + if x != nil { + return x.Color + } + return "" +} + +func (x *Hat) GetName() string { + if x != nil { + return x.Name + } + return "" +} + +type Hats struct { + state protoimpl.MessageState + sizeCache protoimpl.SizeCache + unknownFields protoimpl.UnknownFields + + Hats []*Hat `protobuf:"bytes,1,rep,name=hats,proto3" json:"hats,omitempty"` +} + +func (x *Hats) Reset() { + *x = Hats{} + if protoimpl.UnsafeEnabled { + mi := &file_haberdasher_service_proto_msgTypes[3] + ms := protoimpl.X.MessageStateOf(protoimpl.Pointer(x)) + ms.StoreMessageInfo(mi) + } +} + +func (x *Hats) String() string { + return protoimpl.X.MessageStringOf(x) +} + +func (*Hats) ProtoMessage() {} + +func (x *Hats) ProtoReflect() protoreflect.Message { + mi := &file_haberdasher_service_proto_msgTypes[3] + if protoimpl.UnsafeEnabled && x != nil { + ms := protoimpl.X.MessageStateOf(protoimpl.Pointer(x)) + if ms.LoadMessageInfo() == nil { + ms.StoreMessageInfo(mi) + } + return ms + } + return mi.MessageOf(x) +} + +// Deprecated: Use Hats.ProtoReflect.Descriptor instead. +func (*Hats) Descriptor() ([]byte, []int) { + return file_haberdasher_service_proto_rawDescGZIP(), []int{3} +} + +func (x *Hats) GetHats() []*Hat { + if x != nil { + return x.Hats + } + return nil +} + +var File_haberdasher_service_proto protoreflect.FileDescriptor + +var file_haberdasher_service_proto_rawDesc = []byte{ + 0x0a, 0x19, 0x68, 0x61, 0x62, 0x65, 0x72, 0x64, 0x61, 0x73, 0x68, 0x65, 0x72, 0x2f, 0x73, 0x65, + 0x72, 0x76, 0x69, 0x63, 0x65, 0x2e, 0x70, 0x72, 0x6f, 0x74, 0x6f, 0x12, 0x19, 0x74, 0x77, 0x69, + 0x72, 0x70, 0x2e, 0x65, 0x78, 0x61, 0x6d, 0x70, 0x6c, 0x65, 0x2e, 0x68, 0x61, 0x62, 0x65, 0x72, + 0x64, 0x61, 0x73, 0x68, 0x65, 0x72, 0x22, 0x20, 0x0a, 0x08, 0x48, 0x61, 0x74, 0x51, 0x75, 0x65, + 0x72, 0x79, 0x12, 0x14, 0x0a, 0x05, 0x6c, 0x69, 0x6d, 0x69, 0x74, 0x18, 0x01, 0x20, 0x01, 0x28, + 0x05, 0x52, 0x05, 0x6c, 0x69, 0x6d, 0x69, 0x74, 0x22, 0x1e, 0x0a, 0x04, 0x53, 0x69, 0x7a, 0x65, + 0x12, 0x16, 0x0a, 0x06, 0x69, 0x6e, 0x63, 0x68, 0x65, 0x73, 0x18, 0x01, 0x20, 0x01, 0x28, 0x05, + 0x52, 0x06, 0x69, 0x6e, 0x63, 0x68, 0x65, 0x73, 0x22, 0x47, 0x0a, 0x03, 0x48, 0x61, 0x74, 0x12, + 0x16, 0x0a, 0x06, 0x69, 0x6e, 0x63, 0x68, 0x65, 0x73, 0x18, 0x01, 0x20, 0x01, 0x28, 0x05, 0x52, + 0x06, 0x69, 0x6e, 0x63, 0x68, 0x65, 0x73, 0x12, 0x14, 0x0a, 0x05, 0x63, 0x6f, 0x6c, 0x6f, 0x72, + 0x18, 0x02, 0x20, 0x01, 0x28, 0x09, 0x52, 0x05, 0x63, 0x6f, 0x6c, 0x6f, 0x72, 0x12, 0x12, 0x0a, + 0x04, 0x6e, 0x61, 0x6d, 0x65, 0x18, 0x03, 0x20, 0x01, 0x28, 0x09, 0x52, 0x04, 0x6e, 0x61, 0x6d, + 0x65, 0x22, 0x3a, 0x0a, 0x04, 0x48, 0x61, 0x74, 0x73, 0x12, 0x32, 0x0a, 0x04, 0x68, 0x61, 0x74, + 0x73, 0x18, 0x01, 0x20, 0x03, 0x28, 0x0b, 0x32, 0x1e, 0x2e, 0x74, 0x77, 0x69, 0x72, 0x70, 0x2e, + 0x65, 0x78, 0x61, 0x6d, 0x70, 0x6c, 0x65, 0x2e, 0x68, 0x61, 0x62, 0x65, 0x72, 0x64, 0x61, 0x73, + 0x68, 0x65, 0x72, 0x2e, 0x48, 0x61, 0x74, 0x52, 0x04, 0x68, 0x61, 0x74, 0x73, 0x32, 0xab, 0x01, + 0x0a, 0x0b, 0x48, 0x61, 0x62, 0x65, 0x72, 0x64, 0x61, 0x73, 0x68, 0x65, 0x72, 0x12, 0x4a, 0x0a, + 0x07, 0x4d, 0x61, 0x6b, 0x65, 0x48, 0x61, 0x74, 0x12, 0x1f, 0x2e, 0x74, 0x77, 0x69, 0x72, 0x70, + 0x2e, 0x65, 0x78, 0x61, 0x6d, 0x70, 0x6c, 0x65, 0x2e, 0x68, 0x61, 0x62, 0x65, 0x72, 0x64, 0x61, + 0x73, 0x68, 0x65, 0x72, 0x2e, 0x53, 0x69, 0x7a, 0x65, 0x1a, 0x1e, 0x2e, 0x74, 0x77, 0x69, 0x72, + 0x70, 0x2e, 0x65, 0x78, 0x61, 0x6d, 0x70, 0x6c, 0x65, 0x2e, 0x68, 0x61, 0x62, 0x65, 0x72, 0x64, + 0x61, 0x73, 0x68, 0x65, 0x72, 0x2e, 0x48, 0x61, 0x74, 0x12, 0x50, 0x0a, 0x08, 0x4c, 0x69, 0x73, + 0x74, 0x48, 0x61, 0x74, 0x73, 0x12, 0x23, 0x2e, 0x74, 0x77, 0x69, 0x72, 0x70, 0x2e, 0x65, 0x78, + 0x61, 0x6d, 0x70, 0x6c, 0x65, 0x2e, 0x68, 0x61, 0x62, 0x65, 0x72, 0x64, 0x61, 0x73, 0x68, 0x65, + 0x72, 0x2e, 0x48, 0x61, 0x74, 0x51, 0x75, 0x65, 0x72, 0x79, 0x1a, 0x1f, 0x2e, 0x74, 0x77, 0x69, + 0x72, 0x70, 0x2e, 0x65, 0x78, 0x61, 0x6d, 0x70, 0x6c, 0x65, 0x2e, 0x68, 0x61, 0x62, 0x65, 0x72, + 0x64, 0x61, 0x73, 0x68, 0x65, 0x72, 0x2e, 0x48, 0x61, 0x74, 0x73, 0x42, 0x1f, 0x5a, 0x1d, 0x68, + 0x61, 0x62, 0x65, 0x72, 0x64, 0x61, 0x73, 0x68, 0x65, 0x72, 0x2d, 0x74, 0x77, 0x69, 0x72, 0x70, + 0x2f, 0x68, 0x61, 0x62, 0x65, 0x72, 0x64, 0x61, 0x73, 0x68, 0x65, 0x72, 0x62, 0x06, 0x70, 0x72, + 0x6f, 0x74, 0x6f, 0x33, +} + +var ( + file_haberdasher_service_proto_rawDescOnce sync.Once + file_haberdasher_service_proto_rawDescData = file_haberdasher_service_proto_rawDesc +) + +func file_haberdasher_service_proto_rawDescGZIP() []byte { + file_haberdasher_service_proto_rawDescOnce.Do(func() { + file_haberdasher_service_proto_rawDescData = protoimpl.X.CompressGZIP(file_haberdasher_service_proto_rawDescData) + }) + return file_haberdasher_service_proto_rawDescData +} + +var file_haberdasher_service_proto_msgTypes = make([]protoimpl.MessageInfo, 4) +var file_haberdasher_service_proto_goTypes = []interface{}{ + (*HatQuery)(nil), // 0: twirp.example.haberdasher.HatQuery + (*Size)(nil), // 1: twirp.example.haberdasher.Size + (*Hat)(nil), // 2: twirp.example.haberdasher.Hat + (*Hats)(nil), // 3: twirp.example.haberdasher.Hats +} +var file_haberdasher_service_proto_depIdxs = []int32{ + 2, // 0: twirp.example.haberdasher.Hats.hats:type_name -> twirp.example.haberdasher.Hat + 1, // 1: twirp.example.haberdasher.Haberdasher.MakeHat:input_type -> twirp.example.haberdasher.Size + 0, // 2: twirp.example.haberdasher.Haberdasher.ListHats:input_type -> twirp.example.haberdasher.HatQuery + 2, // 3: twirp.example.haberdasher.Haberdasher.MakeHat:output_type -> twirp.example.haberdasher.Hat + 3, // 4: twirp.example.haberdasher.Haberdasher.ListHats:output_type -> twirp.example.haberdasher.Hats + 3, // [3:5] is the sub-list for method output_type + 1, // [1:3] is the sub-list for method input_type + 1, // [1:1] is the sub-list for extension type_name + 1, // [1:1] is the sub-list for extension extendee + 0, // [0:1] is the sub-list for field type_name +} + +func init() { file_haberdasher_service_proto_init() } +func file_haberdasher_service_proto_init() { + if File_haberdasher_service_proto != nil { + return + } + if !protoimpl.UnsafeEnabled { + file_haberdasher_service_proto_msgTypes[0].Exporter = func(v interface{}, i int) interface{} { + switch v := v.(*HatQuery); i { + case 0: + return &v.state + case 1: + return &v.sizeCache + case 2: + return &v.unknownFields + default: + return nil + } + } + file_haberdasher_service_proto_msgTypes[1].Exporter = func(v interface{}, i int) interface{} { + switch v := v.(*Size); i { + case 0: + return &v.state + case 1: + return &v.sizeCache + case 2: + return &v.unknownFields + default: + return nil + } + } + file_haberdasher_service_proto_msgTypes[2].Exporter = func(v interface{}, i int) interface{} { + switch v := v.(*Hat); i { + case 0: + return &v.state + case 1: + return &v.sizeCache + case 2: + return &v.unknownFields + default: + return nil + } + } + file_haberdasher_service_proto_msgTypes[3].Exporter = func(v interface{}, i int) interface{} { + switch v := v.(*Hats); i { + case 0: + return &v.state + case 1: + return &v.sizeCache + case 2: + return &v.unknownFields + default: + return nil + } + } + } + type x struct{} + out := protoimpl.TypeBuilder{ + File: protoimpl.DescBuilder{ + GoPackagePath: reflect.TypeOf(x{}).PkgPath(), + RawDescriptor: file_haberdasher_service_proto_rawDesc, + NumEnums: 0, + NumMessages: 4, + NumExtensions: 0, + NumServices: 1, + }, + GoTypes: file_haberdasher_service_proto_goTypes, + DependencyIndexes: file_haberdasher_service_proto_depIdxs, + MessageInfos: file_haberdasher_service_proto_msgTypes, + }.Build() + File_haberdasher_service_proto = out.File + file_haberdasher_service_proto_rawDesc = nil + file_haberdasher_service_proto_goTypes = nil + file_haberdasher_service_proto_depIdxs = nil +} diff --git a/haberdasher/service.proto b/haberdasher/service.proto new file mode 100644 index 0000000..6c63e8f --- /dev/null +++ b/haberdasher/service.proto @@ -0,0 +1,32 @@ +syntax = "proto3"; + +package twirp.example.haberdasher; +option go_package = "haberdasher-twirp/haberdasher"; + +// Haberdasher service makes hats for clients. +service Haberdasher { + // MakeHat produces a hat of mysterious, randomly-selected color! + rpc MakeHat(Size) returns (Hat); + + rpc ListHats(HatQuery) returns (Hats); +} + +message HatQuery { + int32 limit = 1; +} + +// Size of a Hat, in inches. +message Size { + int32 inches = 1; // must be > 0 +} + +// A Hat is a piece of headwear made by a Haberdasher. +message Hat { + int32 inches = 1; + string color = 2; // anything but "invisible" + string name = 3; // i.e. "bowler" +} + +message Hats { + repeated Hat hats = 1; +} diff --git a/haberdasher/service.twirp.go b/haberdasher/service.twirp.go new file mode 100644 index 0000000..7246fef --- /dev/null +++ b/haberdasher/service.twirp.go @@ -0,0 +1,1392 @@ +// Code generated by protoc-gen-twirp v8.1.0, DO NOT EDIT. +// source: haberdasher/service.proto + +package haberdasher + +import context "context" +import fmt "fmt" +import http "net/http" +import ioutil "io/ioutil" +import json "encoding/json" +import strconv "strconv" +import strings "strings" + +import protojson "google.golang.org/protobuf/encoding/protojson" +import proto "google.golang.org/protobuf/proto" +import twirp "github.com/twitchtv/twirp" +import ctxsetters "github.com/twitchtv/twirp/ctxsetters" + +import bytes "bytes" +import errors "errors" +import io "io" +import path "path" +import url "net/url" + +// Version compatibility assertion. +// If the constant is not defined in the package, that likely means +// the package needs to be updated to work with this generated code. +// See https://twitchtv.github.io/twirp/docs/version_matrix.html +const _ = twirp.TwirpPackageMinVersion_8_1_0 + +// ===================== +// Haberdasher Interface +// ===================== + +// Haberdasher service makes hats for clients. +type Haberdasher interface { + // MakeHat produces a hat of mysterious, randomly-selected color! + MakeHat(context.Context, *Size) (*Hat, error) + + ListHats(context.Context, *HatQuery) (*Hats, error) +} + +// =========================== +// Haberdasher Protobuf Client +// =========================== + +type haberdasherProtobufClient struct { + client HTTPClient + urls [2]string + interceptor twirp.Interceptor + opts twirp.ClientOptions +} + +// NewHaberdasherProtobufClient creates a Protobuf client that implements the Haberdasher interface. +// It communicates using Protobuf and can be configured with a custom HTTPClient. +func NewHaberdasherProtobufClient(baseURL string, client HTTPClient, opts ...twirp.ClientOption) Haberdasher { + if c, ok := client.(*http.Client); ok { + client = withoutRedirects(c) + } + + clientOpts := twirp.ClientOptions{} + for _, o := range opts { + o(&clientOpts) + } + + // Using ReadOpt allows backwards and forwads compatibility with new options in the future + literalURLs := false + _ = clientOpts.ReadOpt("literalURLs", &literalURLs) + var pathPrefix string + if ok := clientOpts.ReadOpt("pathPrefix", &pathPrefix); !ok { + pathPrefix = "/twirp" // default prefix + } + + // Build method URLs: []/./ + serviceURL := sanitizeBaseURL(baseURL) + serviceURL += baseServicePath(pathPrefix, "twirp.example.haberdasher", "Haberdasher") + urls := [2]string{ + serviceURL + "MakeHat", + serviceURL + "ListHats", + } + + return &haberdasherProtobufClient{ + client: client, + urls: urls, + interceptor: twirp.ChainInterceptors(clientOpts.Interceptors...), + opts: clientOpts, + } +} + +func (c *haberdasherProtobufClient) MakeHat(ctx context.Context, in *Size) (*Hat, error) { + ctx = ctxsetters.WithPackageName(ctx, "twirp.example.haberdasher") + ctx = ctxsetters.WithServiceName(ctx, "Haberdasher") + ctx = ctxsetters.WithMethodName(ctx, "MakeHat") + caller := c.callMakeHat + if c.interceptor != nil { + caller = func(ctx context.Context, req *Size) (*Hat, error) { + resp, err := c.interceptor( + func(ctx context.Context, req interface{}) (interface{}, error) { + typedReq, ok := req.(*Size) + if !ok { + return nil, twirp.InternalError("failed type assertion req.(*Size) when calling interceptor") + } + return c.callMakeHat(ctx, typedReq) + }, + )(ctx, req) + if resp != nil { + typedResp, ok := resp.(*Hat) + if !ok { + return nil, twirp.InternalError("failed type assertion resp.(*Hat) when calling interceptor") + } + return typedResp, err + } + return nil, err + } + } + return caller(ctx, in) +} + +func (c *haberdasherProtobufClient) callMakeHat(ctx context.Context, in *Size) (*Hat, error) { + out := new(Hat) + ctx, err := doProtobufRequest(ctx, c.client, c.opts.Hooks, c.urls[0], in, out) + if err != nil { + twerr, ok := err.(twirp.Error) + if !ok { + twerr = twirp.InternalErrorWith(err) + } + callClientError(ctx, c.opts.Hooks, twerr) + return nil, err + } + + callClientResponseReceived(ctx, c.opts.Hooks) + + return out, nil +} + +func (c *haberdasherProtobufClient) ListHats(ctx context.Context, in *HatQuery) (*Hats, error) { + ctx = ctxsetters.WithPackageName(ctx, "twirp.example.haberdasher") + ctx = ctxsetters.WithServiceName(ctx, "Haberdasher") + ctx = ctxsetters.WithMethodName(ctx, "ListHats") + caller := c.callListHats + if c.interceptor != nil { + caller = func(ctx context.Context, req *HatQuery) (*Hats, error) { + resp, err := c.interceptor( + func(ctx context.Context, req interface{}) (interface{}, error) { + typedReq, ok := req.(*HatQuery) + if !ok { + return nil, twirp.InternalError("failed type assertion req.(*HatQuery) when calling interceptor") + } + return c.callListHats(ctx, typedReq) + }, + )(ctx, req) + if resp != nil { + typedResp, ok := resp.(*Hats) + if !ok { + return nil, twirp.InternalError("failed type assertion resp.(*Hats) when calling interceptor") + } + return typedResp, err + } + return nil, err + } + } + return caller(ctx, in) +} + +func (c *haberdasherProtobufClient) callListHats(ctx context.Context, in *HatQuery) (*Hats, error) { + out := new(Hats) + ctx, err := doProtobufRequest(ctx, c.client, c.opts.Hooks, c.urls[1], in, out) + if err != nil { + twerr, ok := err.(twirp.Error) + if !ok { + twerr = twirp.InternalErrorWith(err) + } + callClientError(ctx, c.opts.Hooks, twerr) + return nil, err + } + + callClientResponseReceived(ctx, c.opts.Hooks) + + return out, nil +} + +// ======================= +// Haberdasher JSON Client +// ======================= + +type haberdasherJSONClient struct { + client HTTPClient + urls [2]string + interceptor twirp.Interceptor + opts twirp.ClientOptions +} + +// NewHaberdasherJSONClient creates a JSON client that implements the Haberdasher interface. +// It communicates using JSON and can be configured with a custom HTTPClient. +func NewHaberdasherJSONClient(baseURL string, client HTTPClient, opts ...twirp.ClientOption) Haberdasher { + if c, ok := client.(*http.Client); ok { + client = withoutRedirects(c) + } + + clientOpts := twirp.ClientOptions{} + for _, o := range opts { + o(&clientOpts) + } + + // Using ReadOpt allows backwards and forwads compatibility with new options in the future + literalURLs := false + _ = clientOpts.ReadOpt("literalURLs", &literalURLs) + var pathPrefix string + if ok := clientOpts.ReadOpt("pathPrefix", &pathPrefix); !ok { + pathPrefix = "/twirp" // default prefix + } + + // Build method URLs: []/./ + serviceURL := sanitizeBaseURL(baseURL) + serviceURL += baseServicePath(pathPrefix, "twirp.example.haberdasher", "Haberdasher") + urls := [2]string{ + serviceURL + "MakeHat", + serviceURL + "ListHats", + } + + return &haberdasherJSONClient{ + client: client, + urls: urls, + interceptor: twirp.ChainInterceptors(clientOpts.Interceptors...), + opts: clientOpts, + } +} + +func (c *haberdasherJSONClient) MakeHat(ctx context.Context, in *Size) (*Hat, error) { + ctx = ctxsetters.WithPackageName(ctx, "twirp.example.haberdasher") + ctx = ctxsetters.WithServiceName(ctx, "Haberdasher") + ctx = ctxsetters.WithMethodName(ctx, "MakeHat") + caller := c.callMakeHat + if c.interceptor != nil { + caller = func(ctx context.Context, req *Size) (*Hat, error) { + resp, err := c.interceptor( + func(ctx context.Context, req interface{}) (interface{}, error) { + typedReq, ok := req.(*Size) + if !ok { + return nil, twirp.InternalError("failed type assertion req.(*Size) when calling interceptor") + } + return c.callMakeHat(ctx, typedReq) + }, + )(ctx, req) + if resp != nil { + typedResp, ok := resp.(*Hat) + if !ok { + return nil, twirp.InternalError("failed type assertion resp.(*Hat) when calling interceptor") + } + return typedResp, err + } + return nil, err + } + } + return caller(ctx, in) +} + +func (c *haberdasherJSONClient) callMakeHat(ctx context.Context, in *Size) (*Hat, error) { + out := new(Hat) + ctx, err := doJSONRequest(ctx, c.client, c.opts.Hooks, c.urls[0], in, out) + if err != nil { + twerr, ok := err.(twirp.Error) + if !ok { + twerr = twirp.InternalErrorWith(err) + } + callClientError(ctx, c.opts.Hooks, twerr) + return nil, err + } + + callClientResponseReceived(ctx, c.opts.Hooks) + + return out, nil +} + +func (c *haberdasherJSONClient) ListHats(ctx context.Context, in *HatQuery) (*Hats, error) { + ctx = ctxsetters.WithPackageName(ctx, "twirp.example.haberdasher") + ctx = ctxsetters.WithServiceName(ctx, "Haberdasher") + ctx = ctxsetters.WithMethodName(ctx, "ListHats") + caller := c.callListHats + if c.interceptor != nil { + caller = func(ctx context.Context, req *HatQuery) (*Hats, error) { + resp, err := c.interceptor( + func(ctx context.Context, req interface{}) (interface{}, error) { + typedReq, ok := req.(*HatQuery) + if !ok { + return nil, twirp.InternalError("failed type assertion req.(*HatQuery) when calling interceptor") + } + return c.callListHats(ctx, typedReq) + }, + )(ctx, req) + if resp != nil { + typedResp, ok := resp.(*Hats) + if !ok { + return nil, twirp.InternalError("failed type assertion resp.(*Hats) when calling interceptor") + } + return typedResp, err + } + return nil, err + } + } + return caller(ctx, in) +} + +func (c *haberdasherJSONClient) callListHats(ctx context.Context, in *HatQuery) (*Hats, error) { + out := new(Hats) + ctx, err := doJSONRequest(ctx, c.client, c.opts.Hooks, c.urls[1], in, out) + if err != nil { + twerr, ok := err.(twirp.Error) + if !ok { + twerr = twirp.InternalErrorWith(err) + } + callClientError(ctx, c.opts.Hooks, twerr) + return nil, err + } + + callClientResponseReceived(ctx, c.opts.Hooks) + + return out, nil +} + +// ========================== +// Haberdasher Server Handler +// ========================== + +type haberdasherServer struct { + Haberdasher + interceptor twirp.Interceptor + hooks *twirp.ServerHooks + pathPrefix string // prefix for routing + jsonSkipDefaults bool // do not include unpopulated fields (default values) in the response + jsonCamelCase bool // JSON fields are serialized as lowerCamelCase rather than keeping the original proto names +} + +// NewHaberdasherServer builds a TwirpServer that can be used as an http.Handler to handle +// HTTP requests that are routed to the right method in the provided svc implementation. +// The opts are twirp.ServerOption modifiers, for example twirp.WithServerHooks(hooks). +func NewHaberdasherServer(svc Haberdasher, opts ...interface{}) TwirpServer { + serverOpts := newServerOpts(opts) + + // Using ReadOpt allows backwards and forwads compatibility with new options in the future + jsonSkipDefaults := false + _ = serverOpts.ReadOpt("jsonSkipDefaults", &jsonSkipDefaults) + jsonCamelCase := false + _ = serverOpts.ReadOpt("jsonCamelCase", &jsonCamelCase) + var pathPrefix string + if ok := serverOpts.ReadOpt("pathPrefix", &pathPrefix); !ok { + pathPrefix = "/twirp" // default prefix + } + + return &haberdasherServer{ + Haberdasher: svc, + hooks: serverOpts.Hooks, + interceptor: twirp.ChainInterceptors(serverOpts.Interceptors...), + pathPrefix: pathPrefix, + jsonSkipDefaults: jsonSkipDefaults, + jsonCamelCase: jsonCamelCase, + } +} + +// writeError writes an HTTP response with a valid Twirp error format, and triggers hooks. +// If err is not a twirp.Error, it will get wrapped with twirp.InternalErrorWith(err) +func (s *haberdasherServer) writeError(ctx context.Context, resp http.ResponseWriter, err error) { + writeError(ctx, resp, err, s.hooks) +} + +// handleRequestBodyError is used to handle error when the twirp server cannot read request +func (s *haberdasherServer) handleRequestBodyError(ctx context.Context, resp http.ResponseWriter, msg string, err error) { + if context.Canceled == ctx.Err() { + s.writeError(ctx, resp, twirp.NewError(twirp.Canceled, "failed to read request: context canceled")) + return + } + if context.DeadlineExceeded == ctx.Err() { + s.writeError(ctx, resp, twirp.NewError(twirp.DeadlineExceeded, "failed to read request: deadline exceeded")) + return + } + s.writeError(ctx, resp, twirp.WrapError(malformedRequestError(msg), err)) +} + +// HaberdasherPathPrefix is a convenience constant that may identify URL paths. +// Should be used with caution, it only matches routes generated by Twirp Go clients, +// with the default "/twirp" prefix and default CamelCase service and method names. +// More info: https://twitchtv.github.io/twirp/docs/routing.html +const HaberdasherPathPrefix = "/twirp/twirp.example.haberdasher.Haberdasher/" + +func (s *haberdasherServer) ServeHTTP(resp http.ResponseWriter, req *http.Request) { + ctx := req.Context() + ctx = ctxsetters.WithPackageName(ctx, "twirp.example.haberdasher") + ctx = ctxsetters.WithServiceName(ctx, "Haberdasher") + ctx = ctxsetters.WithResponseWriter(ctx, resp) + + var err error + ctx, err = callRequestReceived(ctx, s.hooks) + if err != nil { + s.writeError(ctx, resp, err) + return + } + + if req.Method != "POST" { + msg := fmt.Sprintf("unsupported method %q (only POST is allowed)", req.Method) + s.writeError(ctx, resp, badRouteError(msg, req.Method, req.URL.Path)) + return + } + + // Verify path format: []/./ + prefix, pkgService, method := parseTwirpPath(req.URL.Path) + if pkgService != "twirp.example.haberdasher.Haberdasher" { + msg := fmt.Sprintf("no handler for path %q", req.URL.Path) + s.writeError(ctx, resp, badRouteError(msg, req.Method, req.URL.Path)) + return + } + if prefix != s.pathPrefix { + msg := fmt.Sprintf("invalid path prefix %q, expected %q, on path %q", prefix, s.pathPrefix, req.URL.Path) + s.writeError(ctx, resp, badRouteError(msg, req.Method, req.URL.Path)) + return + } + + switch method { + case "MakeHat": + s.serveMakeHat(ctx, resp, req) + return + case "ListHats": + s.serveListHats(ctx, resp, req) + return + default: + msg := fmt.Sprintf("no handler for path %q", req.URL.Path) + s.writeError(ctx, resp, badRouteError(msg, req.Method, req.URL.Path)) + return + } +} + +func (s *haberdasherServer) serveMakeHat(ctx context.Context, resp http.ResponseWriter, req *http.Request) { + header := req.Header.Get("Content-Type") + i := strings.Index(header, ";") + if i == -1 { + i = len(header) + } + switch strings.TrimSpace(strings.ToLower(header[:i])) { + case "application/json": + s.serveMakeHatJSON(ctx, resp, req) + case "application/protobuf": + s.serveMakeHatProtobuf(ctx, resp, req) + default: + msg := fmt.Sprintf("unexpected Content-Type: %q", req.Header.Get("Content-Type")) + twerr := badRouteError(msg, req.Method, req.URL.Path) + s.writeError(ctx, resp, twerr) + } +} + +func (s *haberdasherServer) serveMakeHatJSON(ctx context.Context, resp http.ResponseWriter, req *http.Request) { + var err error + ctx = ctxsetters.WithMethodName(ctx, "MakeHat") + ctx, err = callRequestRouted(ctx, s.hooks) + if err != nil { + s.writeError(ctx, resp, err) + return + } + + d := json.NewDecoder(req.Body) + rawReqBody := json.RawMessage{} + if err := d.Decode(&rawReqBody); err != nil { + s.handleRequestBodyError(ctx, resp, "the json request could not be decoded", err) + return + } + reqContent := new(Size) + unmarshaler := protojson.UnmarshalOptions{DiscardUnknown: true} + if err = unmarshaler.Unmarshal(rawReqBody, reqContent); err != nil { + s.handleRequestBodyError(ctx, resp, "the json request could not be decoded", err) + return + } + + handler := s.Haberdasher.MakeHat + if s.interceptor != nil { + handler = func(ctx context.Context, req *Size) (*Hat, error) { + resp, err := s.interceptor( + func(ctx context.Context, req interface{}) (interface{}, error) { + typedReq, ok := req.(*Size) + if !ok { + return nil, twirp.InternalError("failed type assertion req.(*Size) when calling interceptor") + } + return s.Haberdasher.MakeHat(ctx, typedReq) + }, + )(ctx, req) + if resp != nil { + typedResp, ok := resp.(*Hat) + if !ok { + return nil, twirp.InternalError("failed type assertion resp.(*Hat) when calling interceptor") + } + return typedResp, err + } + return nil, err + } + } + + // Call service method + var respContent *Hat + func() { + defer ensurePanicResponses(ctx, resp, s.hooks) + respContent, err = handler(ctx, reqContent) + }() + + if err != nil { + s.writeError(ctx, resp, err) + return + } + if respContent == nil { + s.writeError(ctx, resp, twirp.InternalError("received a nil *Hat and nil error while calling MakeHat. nil responses are not supported")) + return + } + + ctx = callResponsePrepared(ctx, s.hooks) + + marshaler := &protojson.MarshalOptions{UseProtoNames: !s.jsonCamelCase, EmitUnpopulated: !s.jsonSkipDefaults} + respBytes, err := marshaler.Marshal(respContent) + if err != nil { + s.writeError(ctx, resp, wrapInternal(err, "failed to marshal json response")) + return + } + + ctx = ctxsetters.WithStatusCode(ctx, http.StatusOK) + resp.Header().Set("Content-Type", "application/json") + resp.Header().Set("Content-Length", strconv.Itoa(len(respBytes))) + resp.WriteHeader(http.StatusOK) + + if n, err := resp.Write(respBytes); err != nil { + msg := fmt.Sprintf("failed to write response, %d of %d bytes written: %s", n, len(respBytes), err.Error()) + twerr := twirp.NewError(twirp.Unknown, msg) + ctx = callError(ctx, s.hooks, twerr) + } + callResponseSent(ctx, s.hooks) +} + +func (s *haberdasherServer) serveMakeHatProtobuf(ctx context.Context, resp http.ResponseWriter, req *http.Request) { + var err error + ctx = ctxsetters.WithMethodName(ctx, "MakeHat") + ctx, err = callRequestRouted(ctx, s.hooks) + if err != nil { + s.writeError(ctx, resp, err) + return + } + + buf, err := ioutil.ReadAll(req.Body) + if err != nil { + s.handleRequestBodyError(ctx, resp, "failed to read request body", err) + return + } + reqContent := new(Size) + if err = proto.Unmarshal(buf, reqContent); err != nil { + s.writeError(ctx, resp, malformedRequestError("the protobuf request could not be decoded")) + return + } + + handler := s.Haberdasher.MakeHat + if s.interceptor != nil { + handler = func(ctx context.Context, req *Size) (*Hat, error) { + resp, err := s.interceptor( + func(ctx context.Context, req interface{}) (interface{}, error) { + typedReq, ok := req.(*Size) + if !ok { + return nil, twirp.InternalError("failed type assertion req.(*Size) when calling interceptor") + } + return s.Haberdasher.MakeHat(ctx, typedReq) + }, + )(ctx, req) + if resp != nil { + typedResp, ok := resp.(*Hat) + if !ok { + return nil, twirp.InternalError("failed type assertion resp.(*Hat) when calling interceptor") + } + return typedResp, err + } + return nil, err + } + } + + // Call service method + var respContent *Hat + func() { + defer ensurePanicResponses(ctx, resp, s.hooks) + respContent, err = handler(ctx, reqContent) + }() + + if err != nil { + s.writeError(ctx, resp, err) + return + } + if respContent == nil { + s.writeError(ctx, resp, twirp.InternalError("received a nil *Hat and nil error while calling MakeHat. nil responses are not supported")) + return + } + + ctx = callResponsePrepared(ctx, s.hooks) + + respBytes, err := proto.Marshal(respContent) + if err != nil { + s.writeError(ctx, resp, wrapInternal(err, "failed to marshal proto response")) + return + } + + ctx = ctxsetters.WithStatusCode(ctx, http.StatusOK) + resp.Header().Set("Content-Type", "application/protobuf") + resp.Header().Set("Content-Length", strconv.Itoa(len(respBytes))) + resp.WriteHeader(http.StatusOK) + if n, err := resp.Write(respBytes); err != nil { + msg := fmt.Sprintf("failed to write response, %d of %d bytes written: %s", n, len(respBytes), err.Error()) + twerr := twirp.NewError(twirp.Unknown, msg) + ctx = callError(ctx, s.hooks, twerr) + } + callResponseSent(ctx, s.hooks) +} + +func (s *haberdasherServer) serveListHats(ctx context.Context, resp http.ResponseWriter, req *http.Request) { + header := req.Header.Get("Content-Type") + i := strings.Index(header, ";") + if i == -1 { + i = len(header) + } + switch strings.TrimSpace(strings.ToLower(header[:i])) { + case "application/json": + s.serveListHatsJSON(ctx, resp, req) + case "application/protobuf": + s.serveListHatsProtobuf(ctx, resp, req) + default: + msg := fmt.Sprintf("unexpected Content-Type: %q", req.Header.Get("Content-Type")) + twerr := badRouteError(msg, req.Method, req.URL.Path) + s.writeError(ctx, resp, twerr) + } +} + +func (s *haberdasherServer) serveListHatsJSON(ctx context.Context, resp http.ResponseWriter, req *http.Request) { + var err error + ctx = ctxsetters.WithMethodName(ctx, "ListHats") + ctx, err = callRequestRouted(ctx, s.hooks) + if err != nil { + s.writeError(ctx, resp, err) + return + } + + d := json.NewDecoder(req.Body) + rawReqBody := json.RawMessage{} + if err := d.Decode(&rawReqBody); err != nil { + s.handleRequestBodyError(ctx, resp, "the json request could not be decoded", err) + return + } + reqContent := new(HatQuery) + unmarshaler := protojson.UnmarshalOptions{DiscardUnknown: true} + if err = unmarshaler.Unmarshal(rawReqBody, reqContent); err != nil { + s.handleRequestBodyError(ctx, resp, "the json request could not be decoded", err) + return + } + + handler := s.Haberdasher.ListHats + if s.interceptor != nil { + handler = func(ctx context.Context, req *HatQuery) (*Hats, error) { + resp, err := s.interceptor( + func(ctx context.Context, req interface{}) (interface{}, error) { + typedReq, ok := req.(*HatQuery) + if !ok { + return nil, twirp.InternalError("failed type assertion req.(*HatQuery) when calling interceptor") + } + return s.Haberdasher.ListHats(ctx, typedReq) + }, + )(ctx, req) + if resp != nil { + typedResp, ok := resp.(*Hats) + if !ok { + return nil, twirp.InternalError("failed type assertion resp.(*Hats) when calling interceptor") + } + return typedResp, err + } + return nil, err + } + } + + // Call service method + var respContent *Hats + func() { + defer ensurePanicResponses(ctx, resp, s.hooks) + respContent, err = handler(ctx, reqContent) + }() + + if err != nil { + s.writeError(ctx, resp, err) + return + } + if respContent == nil { + s.writeError(ctx, resp, twirp.InternalError("received a nil *Hats and nil error while calling ListHats. nil responses are not supported")) + return + } + + ctx = callResponsePrepared(ctx, s.hooks) + + marshaler := &protojson.MarshalOptions{UseProtoNames: !s.jsonCamelCase, EmitUnpopulated: !s.jsonSkipDefaults} + respBytes, err := marshaler.Marshal(respContent) + if err != nil { + s.writeError(ctx, resp, wrapInternal(err, "failed to marshal json response")) + return + } + + ctx = ctxsetters.WithStatusCode(ctx, http.StatusOK) + resp.Header().Set("Content-Type", "application/json") + resp.Header().Set("Content-Length", strconv.Itoa(len(respBytes))) + resp.WriteHeader(http.StatusOK) + + if n, err := resp.Write(respBytes); err != nil { + msg := fmt.Sprintf("failed to write response, %d of %d bytes written: %s", n, len(respBytes), err.Error()) + twerr := twirp.NewError(twirp.Unknown, msg) + ctx = callError(ctx, s.hooks, twerr) + } + callResponseSent(ctx, s.hooks) +} + +func (s *haberdasherServer) serveListHatsProtobuf(ctx context.Context, resp http.ResponseWriter, req *http.Request) { + var err error + ctx = ctxsetters.WithMethodName(ctx, "ListHats") + ctx, err = callRequestRouted(ctx, s.hooks) + if err != nil { + s.writeError(ctx, resp, err) + return + } + + buf, err := ioutil.ReadAll(req.Body) + if err != nil { + s.handleRequestBodyError(ctx, resp, "failed to read request body", err) + return + } + reqContent := new(HatQuery) + if err = proto.Unmarshal(buf, reqContent); err != nil { + s.writeError(ctx, resp, malformedRequestError("the protobuf request could not be decoded")) + return + } + + handler := s.Haberdasher.ListHats + if s.interceptor != nil { + handler = func(ctx context.Context, req *HatQuery) (*Hats, error) { + resp, err := s.interceptor( + func(ctx context.Context, req interface{}) (interface{}, error) { + typedReq, ok := req.(*HatQuery) + if !ok { + return nil, twirp.InternalError("failed type assertion req.(*HatQuery) when calling interceptor") + } + return s.Haberdasher.ListHats(ctx, typedReq) + }, + )(ctx, req) + if resp != nil { + typedResp, ok := resp.(*Hats) + if !ok { + return nil, twirp.InternalError("failed type assertion resp.(*Hats) when calling interceptor") + } + return typedResp, err + } + return nil, err + } + } + + // Call service method + var respContent *Hats + func() { + defer ensurePanicResponses(ctx, resp, s.hooks) + respContent, err = handler(ctx, reqContent) + }() + + if err != nil { + s.writeError(ctx, resp, err) + return + } + if respContent == nil { + s.writeError(ctx, resp, twirp.InternalError("received a nil *Hats and nil error while calling ListHats. nil responses are not supported")) + return + } + + ctx = callResponsePrepared(ctx, s.hooks) + + respBytes, err := proto.Marshal(respContent) + if err != nil { + s.writeError(ctx, resp, wrapInternal(err, "failed to marshal proto response")) + return + } + + ctx = ctxsetters.WithStatusCode(ctx, http.StatusOK) + resp.Header().Set("Content-Type", "application/protobuf") + resp.Header().Set("Content-Length", strconv.Itoa(len(respBytes))) + resp.WriteHeader(http.StatusOK) + if n, err := resp.Write(respBytes); err != nil { + msg := fmt.Sprintf("failed to write response, %d of %d bytes written: %s", n, len(respBytes), err.Error()) + twerr := twirp.NewError(twirp.Unknown, msg) + ctx = callError(ctx, s.hooks, twerr) + } + callResponseSent(ctx, s.hooks) +} + +func (s *haberdasherServer) ServiceDescriptor() ([]byte, int) { + return twirpFileDescriptor0, 0 +} + +func (s *haberdasherServer) ProtocGenTwirpVersion() string { + return "v8.1.0" +} + +// PathPrefix returns the base service path, in the form: "//./" +// that is everything in a Twirp route except for the . This can be used for routing, +// for example to identify the requests that are targeted to this service in a mux. +func (s *haberdasherServer) PathPrefix() string { + return baseServicePath(s.pathPrefix, "twirp.example.haberdasher", "Haberdasher") +} + +// ===== +// Utils +// ===== + +// HTTPClient is the interface used by generated clients to send HTTP requests. +// It is fulfilled by *(net/http).Client, which is sufficient for most users. +// Users can provide their own implementation for special retry policies. +// +// HTTPClient implementations should not follow redirects. Redirects are +// automatically disabled if *(net/http).Client is passed to client +// constructors. See the withoutRedirects function in this file for more +// details. +type HTTPClient interface { + Do(req *http.Request) (*http.Response, error) +} + +// TwirpServer is the interface generated server structs will support: they're +// HTTP handlers with additional methods for accessing metadata about the +// service. Those accessors are a low-level API for building reflection tools. +// Most people can think of TwirpServers as just http.Handlers. +type TwirpServer interface { + http.Handler + + // ServiceDescriptor returns gzipped bytes describing the .proto file that + // this service was generated from. Once unzipped, the bytes can be + // unmarshalled as a + // google.golang.org/protobuf/types/descriptorpb.FileDescriptorProto. + // + // The returned integer is the index of this particular service within that + // FileDescriptorProto's 'Service' slice of ServiceDescriptorProtos. This is a + // low-level field, expected to be used for reflection. + ServiceDescriptor() ([]byte, int) + + // ProtocGenTwirpVersion is the semantic version string of the version of + // twirp used to generate this file. + ProtocGenTwirpVersion() string + + // PathPrefix returns the HTTP URL path prefix for all methods handled by this + // service. This can be used with an HTTP mux to route Twirp requests. + // The path prefix is in the form: "//./" + // that is, everything in a Twirp route except for the at the end. + PathPrefix() string +} + +func newServerOpts(opts []interface{}) *twirp.ServerOptions { + serverOpts := &twirp.ServerOptions{} + for _, opt := range opts { + switch o := opt.(type) { + case twirp.ServerOption: + o(serverOpts) + case *twirp.ServerHooks: // backwards compatibility, allow to specify hooks as an argument + twirp.WithServerHooks(o)(serverOpts) + case nil: // backwards compatibility, allow nil value for the argument + continue + default: + panic(fmt.Sprintf("Invalid option type %T, please use a twirp.ServerOption", o)) + } + } + return serverOpts +} + +// WriteError writes an HTTP response with a valid Twirp error format (code, msg, meta). +// Useful outside of the Twirp server (e.g. http middleware), but does not trigger hooks. +// If err is not a twirp.Error, it will get wrapped with twirp.InternalErrorWith(err) +func WriteError(resp http.ResponseWriter, err error) { + writeError(context.Background(), resp, err, nil) +} + +// writeError writes Twirp errors in the response and triggers hooks. +func writeError(ctx context.Context, resp http.ResponseWriter, err error, hooks *twirp.ServerHooks) { + // Convert to a twirp.Error. Non-twirp errors are converted to internal errors. + var twerr twirp.Error + if !errors.As(err, &twerr) { + twerr = twirp.InternalErrorWith(err) + } + + statusCode := twirp.ServerHTTPStatusFromErrorCode(twerr.Code()) + ctx = ctxsetters.WithStatusCode(ctx, statusCode) + ctx = callError(ctx, hooks, twerr) + + respBody := marshalErrorToJSON(twerr) + + resp.Header().Set("Content-Type", "application/json") // Error responses are always JSON + resp.Header().Set("Content-Length", strconv.Itoa(len(respBody))) + resp.WriteHeader(statusCode) // set HTTP status code and send response + + _, writeErr := resp.Write(respBody) + if writeErr != nil { + // We have three options here. We could log the error, call the Error + // hook, or just silently ignore the error. + // + // Logging is unacceptable because we don't have a user-controlled + // logger; writing out to stderr without permission is too rude. + // + // Calling the Error hook would confuse users: it would mean the Error + // hook got called twice for one request, which is likely to lead to + // duplicated log messages and metrics, no matter how well we document + // the behavior. + // + // Silently ignoring the error is our least-bad option. It's highly + // likely that the connection is broken and the original 'err' says + // so anyway. + _ = writeErr + } + + callResponseSent(ctx, hooks) +} + +// sanitizeBaseURL parses the the baseURL, and adds the "http" scheme if needed. +// If the URL is unparsable, the baseURL is returned unchaged. +func sanitizeBaseURL(baseURL string) string { + u, err := url.Parse(baseURL) + if err != nil { + return baseURL // invalid URL will fail later when making requests + } + if u.Scheme == "" { + u.Scheme = "http" + } + return u.String() +} + +// baseServicePath composes the path prefix for the service (without ). +// e.g.: baseServicePath("/twirp", "my.pkg", "MyService") +// returns => "/twirp/my.pkg.MyService/" +// e.g.: baseServicePath("", "", "MyService") +// returns => "/MyService/" +func baseServicePath(prefix, pkg, service string) string { + fullServiceName := service + if pkg != "" { + fullServiceName = pkg + "." + service + } + return path.Join("/", prefix, fullServiceName) + "/" +} + +// parseTwirpPath extracts path components form a valid Twirp route. +// Expected format: "[]/./" +// e.g.: prefix, pkgService, method := parseTwirpPath("/twirp/pkg.Svc/MakeHat") +func parseTwirpPath(path string) (string, string, string) { + parts := strings.Split(path, "/") + if len(parts) < 2 { + return "", "", "" + } + method := parts[len(parts)-1] + pkgService := parts[len(parts)-2] + prefix := strings.Join(parts[0:len(parts)-2], "/") + return prefix, pkgService, method +} + +// getCustomHTTPReqHeaders retrieves a copy of any headers that are set in +// a context through the twirp.WithHTTPRequestHeaders function. +// If there are no headers set, or if they have the wrong type, nil is returned. +func getCustomHTTPReqHeaders(ctx context.Context) http.Header { + header, ok := twirp.HTTPRequestHeaders(ctx) + if !ok || header == nil { + return nil + } + copied := make(http.Header) + for k, vv := range header { + if vv == nil { + copied[k] = nil + continue + } + copied[k] = make([]string, len(vv)) + copy(copied[k], vv) + } + return copied +} + +// newRequest makes an http.Request from a client, adding common headers. +func newRequest(ctx context.Context, url string, reqBody io.Reader, contentType string) (*http.Request, error) { + req, err := http.NewRequest("POST", url, reqBody) + if err != nil { + return nil, err + } + req = req.WithContext(ctx) + if customHeader := getCustomHTTPReqHeaders(ctx); customHeader != nil { + req.Header = customHeader + } + req.Header.Set("Accept", contentType) + req.Header.Set("Content-Type", contentType) + req.Header.Set("Twirp-Version", "v8.1.0") + return req, nil +} + +// JSON serialization for errors +type twerrJSON struct { + Code string `json:"code"` + Msg string `json:"msg"` + Meta map[string]string `json:"meta,omitempty"` +} + +// marshalErrorToJSON returns JSON from a twirp.Error, that can be used as HTTP error response body. +// If serialization fails, it will use a descriptive Internal error instead. +func marshalErrorToJSON(twerr twirp.Error) []byte { + // make sure that msg is not too large + msg := twerr.Msg() + if len(msg) > 1e6 { + msg = msg[:1e6] + } + + tj := twerrJSON{ + Code: string(twerr.Code()), + Msg: msg, + Meta: twerr.MetaMap(), + } + + buf, err := json.Marshal(&tj) + if err != nil { + buf = []byte("{\"type\": \"" + twirp.Internal + "\", \"msg\": \"There was an error but it could not be serialized into JSON\"}") // fallback + } + + return buf +} + +// errorFromResponse builds a twirp.Error from a non-200 HTTP response. +// If the response has a valid serialized Twirp error, then it's returned. +// If not, the response status code is used to generate a similar twirp +// error. See twirpErrorFromIntermediary for more info on intermediary errors. +func errorFromResponse(resp *http.Response) twirp.Error { + statusCode := resp.StatusCode + statusText := http.StatusText(statusCode) + + if isHTTPRedirect(statusCode) { + // Unexpected redirect: it must be an error from an intermediary. + // Twirp clients don't follow redirects automatically, Twirp only handles + // POST requests, redirects should only happen on GET and HEAD requests. + location := resp.Header.Get("Location") + msg := fmt.Sprintf("unexpected HTTP status code %d %q received, Location=%q", statusCode, statusText, location) + return twirpErrorFromIntermediary(statusCode, msg, location) + } + + respBodyBytes, err := ioutil.ReadAll(resp.Body) + if err != nil { + return wrapInternal(err, "failed to read server error response body") + } + + var tj twerrJSON + dec := json.NewDecoder(bytes.NewReader(respBodyBytes)) + dec.DisallowUnknownFields() + if err := dec.Decode(&tj); err != nil || tj.Code == "" { + // Invalid JSON response; it must be an error from an intermediary. + msg := fmt.Sprintf("Error from intermediary with HTTP status code %d %q", statusCode, statusText) + return twirpErrorFromIntermediary(statusCode, msg, string(respBodyBytes)) + } + + errorCode := twirp.ErrorCode(tj.Code) + if !twirp.IsValidErrorCode(errorCode) { + msg := "invalid type returned from server error response: " + tj.Code + return twirp.InternalError(msg).WithMeta("body", string(respBodyBytes)) + } + + twerr := twirp.NewError(errorCode, tj.Msg) + for k, v := range tj.Meta { + twerr = twerr.WithMeta(k, v) + } + return twerr +} + +// twirpErrorFromIntermediary maps HTTP errors from non-twirp sources to twirp errors. +// The mapping is similar to gRPC: https://github.com/grpc/grpc/blob/master/doc/http-grpc-status-mapping.md. +// Returned twirp Errors have some additional metadata for inspection. +func twirpErrorFromIntermediary(status int, msg string, bodyOrLocation string) twirp.Error { + var code twirp.ErrorCode + if isHTTPRedirect(status) { // 3xx + code = twirp.Internal + } else { + switch status { + case 400: // Bad Request + code = twirp.Internal + case 401: // Unauthorized + code = twirp.Unauthenticated + case 403: // Forbidden + code = twirp.PermissionDenied + case 404: // Not Found + code = twirp.BadRoute + case 429: // Too Many Requests + code = twirp.ResourceExhausted + case 502, 503, 504: // Bad Gateway, Service Unavailable, Gateway Timeout + code = twirp.Unavailable + default: // All other codes + code = twirp.Unknown + } + } + + twerr := twirp.NewError(code, msg) + twerr = twerr.WithMeta("http_error_from_intermediary", "true") // to easily know if this error was from intermediary + twerr = twerr.WithMeta("status_code", strconv.Itoa(status)) + if isHTTPRedirect(status) { + twerr = twerr.WithMeta("location", bodyOrLocation) + } else { + twerr = twerr.WithMeta("body", bodyOrLocation) + } + return twerr +} + +func isHTTPRedirect(status int) bool { + return status >= 300 && status <= 399 +} + +// wrapInternal wraps an error with a prefix as an Internal error. +// The original error cause is accessible by github.com/pkg/errors.Cause. +func wrapInternal(err error, prefix string) twirp.Error { + return twirp.InternalErrorWith(&wrappedError{prefix: prefix, cause: err}) +} + +type wrappedError struct { + prefix string + cause error +} + +func (e *wrappedError) Error() string { return e.prefix + ": " + e.cause.Error() } +func (e *wrappedError) Unwrap() error { return e.cause } // for go1.13 + errors.Is/As +func (e *wrappedError) Cause() error { return e.cause } // for github.com/pkg/errors + +// ensurePanicResponses makes sure that rpc methods causing a panic still result in a Twirp Internal +// error response (status 500), and error hooks are properly called with the panic wrapped as an error. +// The panic is re-raised so it can be handled normally with middleware. +func ensurePanicResponses(ctx context.Context, resp http.ResponseWriter, hooks *twirp.ServerHooks) { + if r := recover(); r != nil { + // Wrap the panic as an error so it can be passed to error hooks. + // The original error is accessible from error hooks, but not visible in the response. + err := errFromPanic(r) + twerr := &internalWithCause{msg: "Internal service panic", cause: err} + // Actually write the error + writeError(ctx, resp, twerr, hooks) + // If possible, flush the error to the wire. + f, ok := resp.(http.Flusher) + if ok { + f.Flush() + } + + panic(r) + } +} + +// errFromPanic returns the typed error if the recovered panic is an error, otherwise formats as error. +func errFromPanic(p interface{}) error { + if err, ok := p.(error); ok { + return err + } + return fmt.Errorf("panic: %v", p) +} + +// internalWithCause is a Twirp Internal error wrapping an original error cause, +// but the original error message is not exposed on Msg(). The original error +// can be checked with go1.13+ errors.Is/As, and also by (github.com/pkg/errors).Unwrap +type internalWithCause struct { + msg string + cause error +} + +func (e *internalWithCause) Unwrap() error { return e.cause } // for go1.13 + errors.Is/As +func (e *internalWithCause) Cause() error { return e.cause } // for github.com/pkg/errors +func (e *internalWithCause) Error() string { return e.msg + ": " + e.cause.Error() } +func (e *internalWithCause) Code() twirp.ErrorCode { return twirp.Internal } +func (e *internalWithCause) Msg() string { return e.msg } +func (e *internalWithCause) Meta(key string) string { return "" } +func (e *internalWithCause) MetaMap() map[string]string { return nil } +func (e *internalWithCause) WithMeta(key string, val string) twirp.Error { return e } + +// malformedRequestError is used when the twirp server cannot unmarshal a request +func malformedRequestError(msg string) twirp.Error { + return twirp.NewError(twirp.Malformed, msg) +} + +// badRouteError is used when the twirp server cannot route a request +func badRouteError(msg string, method, url string) twirp.Error { + err := twirp.NewError(twirp.BadRoute, msg) + err = err.WithMeta("twirp_invalid_route", method+" "+url) + return err +} + +// withoutRedirects makes sure that the POST request can not be redirected. +// The standard library will, by default, redirect requests (including POSTs) if it gets a 302 or +// 303 response, and also 301s in go1.8. It redirects by making a second request, changing the +// method to GET and removing the body. This produces very confusing error messages, so instead we +// set a redirect policy that always errors. This stops Go from executing the redirect. +// +// We have to be a little careful in case the user-provided http.Client has its own CheckRedirect +// policy - if so, we'll run through that policy first. +// +// Because this requires modifying the http.Client, we make a new copy of the client and return it. +func withoutRedirects(in *http.Client) *http.Client { + copy := *in + copy.CheckRedirect = func(req *http.Request, via []*http.Request) error { + if in.CheckRedirect != nil { + // Run the input's redirect if it exists, in case it has side effects, but ignore any error it + // returns, since we want to use ErrUseLastResponse. + err := in.CheckRedirect(req, via) + _ = err // Silly, but this makes sure generated code passes errcheck -blank, which some people use. + } + return http.ErrUseLastResponse + } + return © +} + +// doProtobufRequest makes a Protobuf request to the remote Twirp service. +func doProtobufRequest(ctx context.Context, client HTTPClient, hooks *twirp.ClientHooks, url string, in, out proto.Message) (_ context.Context, err error) { + reqBodyBytes, err := proto.Marshal(in) + if err != nil { + return ctx, wrapInternal(err, "failed to marshal proto request") + } + reqBody := bytes.NewBuffer(reqBodyBytes) + if err = ctx.Err(); err != nil { + return ctx, wrapInternal(err, "aborted because context was done") + } + + req, err := newRequest(ctx, url, reqBody, "application/protobuf") + if err != nil { + return ctx, wrapInternal(err, "could not build request") + } + ctx, err = callClientRequestPrepared(ctx, hooks, req) + if err != nil { + return ctx, err + } + + req = req.WithContext(ctx) + resp, err := client.Do(req) + if err != nil { + return ctx, wrapInternal(err, "failed to do request") + } + + defer func() { + cerr := resp.Body.Close() + if err == nil && cerr != nil { + err = wrapInternal(cerr, "failed to close response body") + } + }() + + if err = ctx.Err(); err != nil { + return ctx, wrapInternal(err, "aborted because context was done") + } + + if resp.StatusCode != 200 { + return ctx, errorFromResponse(resp) + } + + respBodyBytes, err := ioutil.ReadAll(resp.Body) + if err != nil { + return ctx, wrapInternal(err, "failed to read response body") + } + if err = ctx.Err(); err != nil { + return ctx, wrapInternal(err, "aborted because context was done") + } + + if err = proto.Unmarshal(respBodyBytes, out); err != nil { + return ctx, wrapInternal(err, "failed to unmarshal proto response") + } + return ctx, nil +} + +// doJSONRequest makes a JSON request to the remote Twirp service. +func doJSONRequest(ctx context.Context, client HTTPClient, hooks *twirp.ClientHooks, url string, in, out proto.Message) (_ context.Context, err error) { + marshaler := &protojson.MarshalOptions{UseProtoNames: true} + reqBytes, err := marshaler.Marshal(in) + if err != nil { + return ctx, wrapInternal(err, "failed to marshal json request") + } + if err = ctx.Err(); err != nil { + return ctx, wrapInternal(err, "aborted because context was done") + } + + req, err := newRequest(ctx, url, bytes.NewReader(reqBytes), "application/json") + if err != nil { + return ctx, wrapInternal(err, "could not build request") + } + ctx, err = callClientRequestPrepared(ctx, hooks, req) + if err != nil { + return ctx, err + } + + req = req.WithContext(ctx) + resp, err := client.Do(req) + if err != nil { + return ctx, wrapInternal(err, "failed to do request") + } + + defer func() { + cerr := resp.Body.Close() + if err == nil && cerr != nil { + err = wrapInternal(cerr, "failed to close response body") + } + }() + + if err = ctx.Err(); err != nil { + return ctx, wrapInternal(err, "aborted because context was done") + } + + if resp.StatusCode != 200 { + return ctx, errorFromResponse(resp) + } + + d := json.NewDecoder(resp.Body) + rawRespBody := json.RawMessage{} + if err := d.Decode(&rawRespBody); err != nil { + return ctx, wrapInternal(err, "failed to unmarshal json response") + } + unmarshaler := protojson.UnmarshalOptions{DiscardUnknown: true} + if err = unmarshaler.Unmarshal(rawRespBody, out); err != nil { + return ctx, wrapInternal(err, "failed to unmarshal json response") + } + if err = ctx.Err(); err != nil { + return ctx, wrapInternal(err, "aborted because context was done") + } + return ctx, nil +} + +// Call twirp.ServerHooks.RequestReceived if the hook is available +func callRequestReceived(ctx context.Context, h *twirp.ServerHooks) (context.Context, error) { + if h == nil || h.RequestReceived == nil { + return ctx, nil + } + return h.RequestReceived(ctx) +} + +// Call twirp.ServerHooks.RequestRouted if the hook is available +func callRequestRouted(ctx context.Context, h *twirp.ServerHooks) (context.Context, error) { + if h == nil || h.RequestRouted == nil { + return ctx, nil + } + return h.RequestRouted(ctx) +} + +// Call twirp.ServerHooks.ResponsePrepared if the hook is available +func callResponsePrepared(ctx context.Context, h *twirp.ServerHooks) context.Context { + if h == nil || h.ResponsePrepared == nil { + return ctx + } + return h.ResponsePrepared(ctx) +} + +// Call twirp.ServerHooks.ResponseSent if the hook is available +func callResponseSent(ctx context.Context, h *twirp.ServerHooks) { + if h == nil || h.ResponseSent == nil { + return + } + h.ResponseSent(ctx) +} + +// Call twirp.ServerHooks.Error if the hook is available +func callError(ctx context.Context, h *twirp.ServerHooks, err twirp.Error) context.Context { + if h == nil || h.Error == nil { + return ctx + } + return h.Error(ctx, err) +} + +func callClientResponseReceived(ctx context.Context, h *twirp.ClientHooks) { + if h == nil || h.ResponseReceived == nil { + return + } + h.ResponseReceived(ctx) +} + +func callClientRequestPrepared(ctx context.Context, h *twirp.ClientHooks, req *http.Request) (context.Context, error) { + if h == nil || h.RequestPrepared == nil { + return ctx, nil + } + return h.RequestPrepared(ctx, req) +} + +func callClientError(ctx context.Context, h *twirp.ClientHooks, err twirp.Error) { + if h == nil || h.Error == nil { + return + } + h.Error(ctx, err) +} + +var twirpFileDescriptor0 = []byte{ + // 254 bytes of a gzipped FileDescriptorProto + 0x1f, 0x8b, 0x08, 0x00, 0x00, 0x00, 0x00, 0x00, 0x02, 0xff, 0x84, 0x91, 0x4f, 0x4f, 0x83, 0x40, + 0x14, 0xc4, 0x83, 0xd0, 0x5a, 0x5f, 0x6f, 0x1b, 0x63, 0x68, 0x13, 0x0b, 0xc1, 0x0b, 0x17, 0xb7, + 0x09, 0xde, 0x3c, 0x7a, 0x71, 0x63, 0x34, 0x51, 0xbc, 0x79, 0x7b, 0xc5, 0x97, 0xb0, 0x11, 0x0a, + 0xd9, 0x7d, 0xfe, 0xfd, 0x4a, 0x7e, 0x49, 0xc3, 0xb6, 0x89, 0x5c, 0xa0, 0x37, 0x66, 0xe6, 0x97, + 0x61, 0x76, 0x17, 0x16, 0x25, 0x6e, 0xc8, 0xbc, 0xa2, 0x2d, 0xc9, 0xac, 0x2d, 0x99, 0x0f, 0x5d, + 0x90, 0x6c, 0x4d, 0xc3, 0x8d, 0x58, 0xf0, 0xa7, 0x36, 0xad, 0xa4, 0x2f, 0xac, 0xdb, 0x8a, 0x64, + 0x0f, 0x4c, 0x62, 0x98, 0x29, 0xe4, 0xa7, 0x77, 0x32, 0xdf, 0xe2, 0x14, 0x26, 0x95, 0xae, 0x35, + 0x87, 0x5e, 0xec, 0xa5, 0x93, 0x7c, 0x27, 0x92, 0x15, 0x04, 0xcf, 0xfa, 0x87, 0xc4, 0x19, 0x4c, + 0xf5, 0xb6, 0x28, 0xc9, 0xee, 0xe3, 0xbd, 0x4a, 0x6e, 0xc1, 0x57, 0xc8, 0x43, 0x71, 0x57, 0x5a, + 0x34, 0x55, 0x63, 0xc2, 0xa3, 0xd8, 0x4b, 0x4f, 0xf2, 0x9d, 0x10, 0x02, 0x82, 0x2d, 0xd6, 0x14, + 0xfa, 0xce, 0x74, 0xdf, 0xc9, 0x35, 0x04, 0x0a, 0xd9, 0x8a, 0x0c, 0x82, 0x12, 0xb9, 0xeb, 0xf1, + 0xd3, 0x79, 0xb6, 0x92, 0x83, 0xe3, 0xa5, 0x42, 0xce, 0x1d, 0x9b, 0xfd, 0x7a, 0x30, 0x57, 0xff, + 0x89, 0xb8, 0x83, 0xe3, 0x07, 0x7c, 0xa3, 0x6e, 0x58, 0x34, 0x52, 0xd0, 0x1d, 0x6c, 0x79, 0xe0, + 0x0f, 0xe2, 0x11, 0x66, 0xf7, 0xda, 0xb2, 0xdb, 0x76, 0x31, 0xce, 0xba, 0x7b, 0x5c, 0x46, 0xe3, + 0x90, 0xbd, 0x89, 0x5e, 0xce, 0x7b, 0xde, 0xa5, 0xa3, 0xd7, 0x3d, 0x67, 0x33, 0x75, 0xef, 0x76, + 0xf5, 0x17, 0x00, 0x00, 0xff, 0xff, 0x20, 0xf4, 0xdc, 0xaa, 0xd4, 0x01, 0x00, 0x00, +} diff --git a/internal/haberdasherserver/server.go b/internal/haberdasherserver/server.go new file mode 100644 index 0000000..5a20220 --- /dev/null +++ b/internal/haberdasherserver/server.go @@ -0,0 +1,179 @@ +package haberdasherserver + +import ( + "context" + "encoding/binary" + "encoding/json" + "fmt" + "math/rand" + "os" + + "github.com/boltdb/bolt" + "github.com/twitchtv/twirp" + + pb "haberdasher-twirp/haberdasher" +) + +const dbBucket = "hats" + +type Server struct{} + +type Hat struct { + Inches int32 `json:"inchues"` + Color string `json:"color"` + Name string `json:"name"` +} + +type HatQuery struct { + Limit int32 +} + +type Store struct { + db *bolt.DB +} + +func HatToHatModel(h *pb.Hat) Hat { + return Hat{ + Inches: h.Inches, + Color: h.Color, + Name: h.Name, + } +} + +func HatModelToHat(h Hat) *pb.Hat { + return &pb.Hat{ + Inches: h.Inches, + Color: h.Color, + Name: h.Name, + } +} + +func HatsModelToHats(hs []Hat) (hats *pb.Hats) { + hats = &pb.Hats{} + for _, h := range hs { + hat := HatModelToHat(h) + hats.Hats = append(hats.Hats, hat) + } + return hats +} + +func HatQueryToHatQueryModel(q *pb.HatQuery) HatQuery { + return HatQuery{ + Limit: q.Limit, + } +} + +func (s *Server) MakeHat(ctx context.Context, size *pb.Size) (hat *pb.Hat, err error) { + st, _ := NewStore("hat.db", 0600, nil) + defer st.Close() + + if size.Inches <= 0 { + return nil, twirp.InvalidArgumentError("inches", "I can't make a hat that small!") + } + + h := Hat{ + Inches: size.Inches, + Color: []string{"white", "black", "red", "blue"}[rand.Intn(4)], + Name: []string{"bowler", "baseball cap", "top hat", "derby"}[rand.Intn(3)], + } + + fmt.Printf("made hat: %+v\n", h) + + st.SaveHat(h) + + return HatModelToHat(h), nil +} + +func (s *Server) ListHats(ctx context.Context, q *pb.HatQuery) (hats *pb.Hats, err error) { + /* + var hat *pb.Hat + + hats = &pb.Hats{} + + for i := 0; i < 10; i++ { + hat = &pb.Hat{ + Inches: int32(rand.Intn(12)), + Color: []string{"white", "black", "red", "blue"}[rand.Intn(4)], + Name: []string{"bowler", "baseball cap", "top hat", "derby"}[rand.Intn(3)], + } + hats.Hats = append(hats.Hats, hat) + } + */ + + st, _ := NewStore("hat.db", 0600, nil) + defer st.Close() + + hs, err := st.ListHats(HatQueryToHatQueryModel(q)) + + return HatsModelToHats(hs), nil +} + +func itob(v uint64) []byte { + b := make([]byte, 8) + binary.BigEndian.PutUint64(b, uint64(v)) + return b +} + +func btoi(b []byte) uint64 { + return binary.BigEndian.Uint64(b) +} + +func NewStore(path string, mode os.FileMode, options *bolt.Options) (s *Store, err error) { + s = &Store{} + s.db, err = bolt.Open(path, mode, options) + if err != nil { + fmt.Printf("bolt open: %s", err) + } + + s.db.Update(func(tx *bolt.Tx) error { + if _, err := tx.CreateBucket([]byte(dbBucket)); err != nil { + return fmt.Errorf("create bucket: %s", err) + } + return nil + }) + + return s, err +} + +func (s *Store) SaveHat(h Hat) (err error) { + return s.db.Update(func(tx *bolt.Tx) error { + b := tx.Bucket([]byte("hats")) + + id, _ := b.NextSequence() + + buf, err := json.Marshal(h) + if err != nil { + return fmt.Errorf("json marshal: %s", err) + } + + return b.Put(itob(id), buf) + }) +} + +func (s *Store) ListHats(q HatQuery) (hats []Hat, err error) { + var hat Hat + var i int + + s.db.View(func(tx *bolt.Tx) error { + b := tx.Bucket([]byte("hats")) + + c := b.Cursor() + + for k, v := c.Last(); k != nil && i < int(q.Limit); k, v = c.Prev() { + if err := json.Unmarshal(v, &hat); err != nil { + return fmt.Errorf("json unmarshal: %s", err) + } + h := hat + hats = append(hats, h) + i++ + } + + return nil + }) + + return hats, nil +} + +func (s *Store) Close() (err error) { + return s.db.Close() +} diff --git a/tools.go b/tools.go new file mode 100644 index 0000000..f1a60f8 --- /dev/null +++ b/tools.go @@ -0,0 +1,8 @@ +// +build tools + +package tools + +import ( + _ "google.golang.org/protobuf/cmd/protoc-gen-go" + _ "github.com/twitchtv/twirp/protoc-gen-twirp" +)