merge(development): integrate session edge

This commit is contained in:
José René White Enciso 2026-03-08 14:54:59 -06:00
commit 81070d0571
14 changed files with 514 additions and 18 deletions

View File

@ -7,13 +7,22 @@
## Entrypoints ## Entrypoints
- `POST /api/identity/token` - Canonical session endpoints:
- `POST /api/identity/session/login`
- `POST /api/identity/session/refresh` - `POST /api/identity/session/refresh`
- `POST /api/identity/session/logout`
- `GET /api/identity/session/me`
- Compatibility endpoint:
- `POST /api/identity/token`
- `POST /api/identity/login`
- `POST /api/identity/token/refresh`
- `POST /api/identity/logout`
## Boundary Notes ## Boundary Notes
- Endpoint handlers perform edge validation and permission checks. - Endpoint handlers perform edge validation and permission checks.
- Token issuance and policy evaluation requests are mapped to thalos-service identity contracts. - Session login and refresh call canonical thalos-service session gRPC operations.
- Session refresh requests are mapped through edge contract adapters before downstream calls. - Session cookies are managed at the BFF edge (`thalos_session`, `thalos_refresh`) with env-driven secure flag.
- Token issuance and policy evaluation contracts remain available for compatibility calls.
- Business orchestration remains in thalos-service. - Business orchestration remains in thalos-service.
- Identity abstractions remain owned by Thalos repositories. - Identity abstractions remain owned by Thalos repositories.

View File

@ -9,3 +9,7 @@
- Permission checks happen at BFF entrypoints using thalos-service policy responses. - Permission checks happen at BFF entrypoints using thalos-service policy responses.
- Authorization decisions are explicit and traceable at edge boundaries. - Authorization decisions are explicit and traceable at edge boundaries.
- Auth failure payload shape is standardized as `{ code, message, correlationId }`.
- HTTP semantics:
- `401`: no valid session or failed session issuance/refresh.
- `403`: authenticated but denied by permission policy.

View File

@ -1,5 +1,6 @@
using BuildingBlock.Identity.Contracts.Requests; using BuildingBlock.Identity.Contracts.Requests;
using BuildingBlock.Identity.Contracts.Responses; using BuildingBlock.Identity.Contracts.Responses;
using Thalos.Bff.Application.Sessions;
namespace Thalos.Bff.Application.Adapters; namespace Thalos.Bff.Application.Adapters;
@ -8,6 +9,14 @@ namespace Thalos.Bff.Application.Adapters;
/// </summary> /// </summary>
public interface IThalosServiceClient public interface IThalosServiceClient
{ {
/// <summary>
/// Starts canonical session flow in thalos-service.
/// </summary>
/// <param name="request">Identity token issuance request.</param>
/// <param name="correlationId">Request correlation identifier.</param>
/// <returns>Session token bundle.</returns>
Task<SessionTokensResult> StartSessionAsync(IssueIdentityTokenRequest request, string correlationId);
/// <summary> /// <summary>
/// Requests token issuance from thalos-service. /// Requests token issuance from thalos-service.
/// </summary> /// </summary>
@ -28,4 +37,11 @@ public interface IThalosServiceClient
/// <param name="request">Session refresh request.</param> /// <param name="request">Session refresh request.</param>
/// <returns>Session refresh response.</returns> /// <returns>Session refresh response.</returns>
Task<RefreshIdentitySessionResponse> RefreshSessionAsync(RefreshIdentitySessionRequest request); Task<RefreshIdentitySessionResponse> RefreshSessionAsync(RefreshIdentitySessionRequest request);
/// <summary>
/// Refreshes canonical session flow in thalos-service.
/// </summary>
/// <param name="request">Session refresh request.</param>
/// <returns>Session token bundle.</returns>
Task<SessionTokensResult> RefreshSessionTokensAsync(RefreshIdentitySessionRequest request);
} }

View File

@ -0,0 +1,14 @@
using BuildingBlock.Identity.Contracts.Conventions;
namespace Thalos.Bff.Application.Sessions;
/// <summary>
/// Session token payload returned by thalos-service session operations.
/// </summary>
public sealed record SessionTokensResult(
string AccessToken,
string RefreshToken,
int ExpiresInSeconds,
string SubjectId,
string TenantId,
IdentityAuthProvider Provider);

View File

@ -0,0 +1,9 @@
namespace Thalos.Bff.Contracts.Api;
/// <summary>
/// Standardized API error payload.
/// </summary>
/// <param name="Code">Stable machine-readable error code.</param>
/// <param name="Message">Human-readable error message.</param>
/// <param name="CorrelationId">Request correlation identifier.</param>
public sealed record ApiErrorResponse(string Code, string Message, string CorrelationId);

View File

@ -0,0 +1,18 @@
using BuildingBlock.Identity.Contracts.Conventions;
namespace Thalos.Bff.Contracts.Api;
/// <summary>
/// Canonical API request for session login.
/// </summary>
/// <param name="SubjectId">Identity subject identifier.</param>
/// <param name="TenantId">Tenant identifier.</param>
/// <param name="CorrelationId">Request correlation identifier.</param>
/// <param name="Provider">Identity auth provider.</param>
/// <param name="ExternalToken">External provider token when applicable.</param>
public sealed record SessionLoginApiRequest(
string SubjectId,
string TenantId,
string CorrelationId,
IdentityAuthProvider Provider = IdentityAuthProvider.InternalJwt,
string ExternalToken = "");

View File

@ -0,0 +1,16 @@
using BuildingBlock.Identity.Contracts.Conventions;
namespace Thalos.Bff.Contracts.Api;
/// <summary>
/// Canonical API response for session login and refresh.
/// </summary>
/// <param name="SubjectId">Identity subject identifier.</param>
/// <param name="TenantId">Tenant identifier.</param>
/// <param name="Provider">Identity auth provider.</param>
/// <param name="ExpiresInSeconds">Access token expiration in seconds.</param>
public sealed record SessionLoginApiResponse(
string SubjectId,
string TenantId,
IdentityAuthProvider Provider,
int ExpiresInSeconds);

View File

@ -0,0 +1,16 @@
using BuildingBlock.Identity.Contracts.Conventions;
namespace Thalos.Bff.Contracts.Api;
/// <summary>
/// API response contract for current authenticated session details.
/// </summary>
/// <param name="IsAuthenticated">Indicates whether the caller has an authenticated session.</param>
/// <param name="SubjectId">Identity subject identifier.</param>
/// <param name="TenantId">Tenant identifier.</param>
/// <param name="Provider">Identity auth provider.</param>
public sealed record SessionMeApiResponse(
bool IsAuthenticated,
string SubjectId,
string TenantId,
IdentityAuthProvider Provider);

View File

@ -1,6 +1,7 @@
using Grpc.Core; using Grpc.Core;
using Microsoft.Extensions.Primitives; using Microsoft.Extensions.Primitives;
using Thalos.Bff.Application.Adapters; using Thalos.Bff.Application.Adapters;
using Thalos.Bff.Application.Sessions;
using Thalos.Service.Grpc; using Thalos.Service.Grpc;
using BuildingBlock.Identity.Contracts.Requests; using BuildingBlock.Identity.Contracts.Requests;
using BuildingBlock.Identity.Contracts.Responses; using BuildingBlock.Identity.Contracts.Responses;
@ -12,11 +13,35 @@ namespace Thalos.Bff.Rest.Adapters;
/// </summary> /// </summary>
public sealed class ThalosServiceGrpcClientAdapter( public sealed class ThalosServiceGrpcClientAdapter(
IdentityRuntime.IdentityRuntimeClient grpcClient, IdentityRuntime.IdentityRuntimeClient grpcClient,
IHttpContextAccessor httpContextAccessor, IHttpContextAccessor httpContextAccessor) : IThalosServiceClient
IConfiguration configuration) : IThalosServiceClient
{ {
private const string CorrelationHeaderName = "x-correlation-id"; private const string CorrelationHeaderName = "x-correlation-id";
private readonly string refreshTenantId = configuration["ThalosService:RefreshTenantId"] ?? "refresh";
/// <inheritdoc />
public async Task<SessionTokensResult> StartSessionAsync(IssueIdentityTokenRequest request, string correlationId)
{
var resolvedCorrelationId = ResolveCorrelationId(correlationId);
var grpcRequest = new StartIdentitySessionGrpcRequest
{
SubjectId = request.SubjectId,
TenantId = request.TenantId,
Provider = request.Provider.ToString(),
ExternalToken = request.ExternalToken,
CorrelationId = resolvedCorrelationId
};
var grpcResponse = await grpcClient.StartIdentitySessionAsync(
grpcRequest,
headers: CreateHeaders(resolvedCorrelationId));
return new SessionTokensResult(
grpcResponse.AccessToken,
grpcResponse.RefreshToken,
grpcResponse.ExpiresInSeconds,
grpcResponse.SubjectId,
grpcResponse.TenantId,
ParseProvider(grpcResponse.Provider));
}
/// <inheritdoc /> /// <inheritdoc />
public async Task<IssueIdentityTokenResponse> IssueTokenAsync(IssueIdentityTokenRequest request) public async Task<IssueIdentityTokenResponse> IssueTokenAsync(IssueIdentityTokenRequest request)
@ -62,19 +87,32 @@ public sealed class ThalosServiceGrpcClientAdapter(
/// <inheritdoc /> /// <inheritdoc />
public async Task<RefreshIdentitySessionResponse> RefreshSessionAsync(RefreshIdentitySessionRequest request) public async Task<RefreshIdentitySessionResponse> RefreshSessionAsync(RefreshIdentitySessionRequest request)
{ {
var correlationId = ResolveCorrelationId(request.CorrelationId); var sessionTokens = await RefreshSessionTokensAsync(request);
var grpcRequest = new IssueIdentityTokenGrpcRequest return new RefreshIdentitySessionResponse(sessionTokens.AccessToken, sessionTokens.ExpiresInSeconds);
}
/// <inheritdoc />
public async Task<SessionTokensResult> RefreshSessionTokensAsync(RefreshIdentitySessionRequest request)
{ {
SubjectId = request.RefreshToken, var correlationId = ResolveCorrelationId(request.CorrelationId);
TenantId = refreshTenantId, var grpcRequest = new RefreshIdentitySessionGrpcRequest
{
RefreshToken = request.RefreshToken,
CorrelationId = correlationId,
Provider = request.Provider.ToString() Provider = request.Provider.ToString()
}; };
var grpcResponse = await grpcClient.IssueIdentityTokenAsync( var grpcResponse = await grpcClient.RefreshIdentitySessionAsync(
grpcRequest, grpcRequest,
headers: CreateHeaders(correlationId)); headers: CreateHeaders(correlationId));
return new RefreshIdentitySessionResponse(grpcResponse.Token, grpcResponse.ExpiresInSeconds); return new SessionTokensResult(
grpcResponse.AccessToken,
string.IsNullOrWhiteSpace(grpcResponse.RefreshToken) ? request.RefreshToken : grpcResponse.RefreshToken,
grpcResponse.ExpiresInSeconds,
grpcResponse.SubjectId,
grpcResponse.TenantId,
ParseProvider(grpcResponse.Provider));
} }
private string ResolveCorrelationId(string? preferred = null) private string ResolveCorrelationId(string? preferred = null)
@ -108,4 +146,11 @@ public sealed class ThalosServiceGrpcClientAdapter(
{ CorrelationHeaderName, correlationId } { CorrelationHeaderName, correlationId }
}; };
} }
private static BuildingBlock.Identity.Contracts.Conventions.IdentityAuthProvider ParseProvider(string provider)
{
return Enum.TryParse<BuildingBlock.Identity.Contracts.Conventions.IdentityAuthProvider>(provider, true, out var parsedProvider)
? parsedProvider
: BuildingBlock.Identity.Contracts.Conventions.IdentityAuthProvider.InternalJwt;
}
} }

View File

@ -1,14 +1,20 @@
using BuildingBlock.Identity.Contracts.Conventions;
using BuildingBlock.Identity.Contracts.Requests;
using Core.Blueprint.Common.DependencyInjection; using Core.Blueprint.Common.DependencyInjection;
using Microsoft.AspNetCore.Http;
using Microsoft.Extensions.Primitives; using Microsoft.Extensions.Primitives;
using Thalos.Bff.Application.Adapters; using Thalos.Bff.Application.Adapters;
using Thalos.Bff.Application.DependencyInjection; using Thalos.Bff.Application.DependencyInjection;
using Thalos.Bff.Application.Handlers; using Thalos.Bff.Application.Handlers;
using Thalos.Bff.Application.Security;
using Thalos.Bff.Contracts.Api; using Thalos.Bff.Contracts.Api;
using Thalos.Bff.Rest.Adapters; using Thalos.Bff.Rest.Adapters;
using Thalos.Bff.Rest.Endpoints; using Thalos.Bff.Rest.Endpoints;
using Thalos.Service.Grpc; using Thalos.Service.Grpc;
const string CorrelationHeaderName = "x-correlation-id"; const string CorrelationHeaderName = "x-correlation-id";
const string SessionAccessCookieName = "thalos_session";
const string SessionRefreshCookieName = "thalos_refresh";
var builder = WebApplication.CreateBuilder(args); var builder = WebApplication.CreateBuilder(args);
var edgeProtocol = builder.Configuration["ThalosBff:EdgeProtocol"] ?? "rest"; var edgeProtocol = builder.Configuration["ThalosBff:EdgeProtocol"] ?? "rest";
@ -40,6 +46,90 @@ app.Use(async (context, next) =>
await next(); await next();
}); });
app.MapPost($"{EndpointConventions.ApiPrefix}/session/login", async (
SessionLoginApiRequest request,
HttpContext context,
IThalosServiceClient serviceClient,
IIdentityEdgeContractAdapter contractAdapter,
IPermissionGuard permissionGuard) =>
{
var correlationId = ResolveCorrelationId(context, request.CorrelationId);
var issueRequest = new IssueTokenApiRequest(
request.SubjectId,
request.TenantId,
correlationId,
request.Provider,
request.ExternalToken);
var policyRequest = contractAdapter.ToPolicyRequest(issueRequest, "identity.token.issue");
var policyResponse = await serviceClient.EvaluatePolicyAsync(policyRequest);
if (!permissionGuard.CanAccess(policyResponse))
{
return ErrorResult(StatusCodes.Status403Forbidden, "forbidden", "Permission denied.", correlationId);
}
var serviceRequest = contractAdapter.ToIssueTokenRequest(issueRequest);
var sessionTokens = await serviceClient.StartSessionAsync(serviceRequest, correlationId);
if (string.IsNullOrWhiteSpace(sessionTokens.AccessToken) || string.IsNullOrWhiteSpace(sessionTokens.RefreshToken))
{
return ErrorResult(StatusCodes.Status401Unauthorized, "session_login_failed", "Unable to issue session.", correlationId);
}
WriteSessionCookies(context, sessionTokens, builder.Configuration);
var response = new SessionLoginApiResponse(
sessionTokens.SubjectId,
sessionTokens.TenantId,
sessionTokens.Provider,
sessionTokens.ExpiresInSeconds);
return Results.Ok(response);
});
// Compatibility alias kept for existing token-based callers.
app.MapPost($"{EndpointConventions.ApiPrefix}/login", async (
SessionLoginApiRequest request,
HttpContext context,
IThalosServiceClient serviceClient,
IIdentityEdgeContractAdapter contractAdapter,
IPermissionGuard permissionGuard) =>
{
var correlationId = ResolveCorrelationId(context, request.CorrelationId);
var issueRequest = new IssueTokenApiRequest(
request.SubjectId,
request.TenantId,
correlationId,
request.Provider,
request.ExternalToken);
var policyRequest = contractAdapter.ToPolicyRequest(issueRequest, "identity.token.issue");
var policyResponse = await serviceClient.EvaluatePolicyAsync(policyRequest);
if (!permissionGuard.CanAccess(policyResponse))
{
return ErrorResult(StatusCodes.Status403Forbidden, "forbidden", "Permission denied.", correlationId);
}
var serviceRequest = contractAdapter.ToIssueTokenRequest(issueRequest);
var sessionTokens = await serviceClient.StartSessionAsync(serviceRequest, correlationId);
if (string.IsNullOrWhiteSpace(sessionTokens.AccessToken) || string.IsNullOrWhiteSpace(sessionTokens.RefreshToken))
{
return ErrorResult(StatusCodes.Status401Unauthorized, "session_login_failed", "Unable to issue session.", correlationId);
}
WriteSessionCookies(context, sessionTokens, builder.Configuration);
var response = new SessionLoginApiResponse(
sessionTokens.SubjectId,
sessionTokens.TenantId,
sessionTokens.Provider,
sessionTokens.ExpiresInSeconds);
return Results.Ok(response);
});
// Compatibility alias kept for existing token-based callers.
app.MapPost($"{EndpointConventions.ApiPrefix}/token", async ( app.MapPost($"{EndpointConventions.ApiPrefix}/token", async (
IssueTokenApiRequest request, IssueTokenApiRequest request,
HttpContext context, HttpContext context,
@ -54,18 +144,105 @@ app.MapPost($"{EndpointConventions.ApiPrefix}/token", async (
} }
catch (UnauthorizedAccessException) catch (UnauthorizedAccessException)
{ {
return Results.Unauthorized(); var correlationId = ResolveCorrelationId(context, normalizedRequest.CorrelationId);
return ErrorResult(StatusCodes.Status401Unauthorized, "unauthorized", "Unauthorized request.", correlationId);
} }
}); });
app.MapPost($"{EndpointConventions.ApiPrefix}/session/refresh", async ( app.MapPost($"{EndpointConventions.ApiPrefix}/session/refresh", async (
RefreshSessionApiRequest request, RefreshSessionApiRequest? request,
HttpContext context, HttpContext context,
IRefreshSessionHandler handler) => IThalosServiceClient serviceClient) =>
{ {
var normalizedRequest = request with { CorrelationId = ResolveCorrelationId(context, request.CorrelationId) }; var correlationId = ResolveCorrelationId(context, request?.CorrelationId);
var response = await handler.HandleAsync(normalizedRequest); var refreshToken = request?.RefreshToken;
return Results.Ok(response); if (string.IsNullOrWhiteSpace(refreshToken))
{
context.Request.Cookies.TryGetValue(SessionRefreshCookieName, out refreshToken);
}
if (string.IsNullOrWhiteSpace(refreshToken))
{
return ErrorResult(StatusCodes.Status401Unauthorized, "session_missing", "Session refresh token is required.", correlationId);
}
var provider = request?.Provider ?? IdentityAuthProvider.InternalJwt;
var refreshResponse = await serviceClient.RefreshSessionTokensAsync(
new RefreshIdentitySessionRequest(refreshToken, correlationId, provider));
if (string.IsNullOrWhiteSpace(refreshResponse.AccessToken))
{
return ErrorResult(StatusCodes.Status401Unauthorized, "session_refresh_failed", "Session refresh failed.", correlationId);
}
WriteSessionCookies(context, refreshResponse, builder.Configuration);
return Results.Ok(new SessionLoginApiResponse(
refreshResponse.SubjectId,
refreshResponse.TenantId,
refreshResponse.Provider,
refreshResponse.ExpiresInSeconds));
});
// Compatibility alias kept for token-first refresh callers.
app.MapPost($"{EndpointConventions.ApiPrefix}/token/refresh", async (
RefreshSessionApiRequest? request,
HttpContext context,
IThalosServiceClient serviceClient) =>
{
var correlationId = ResolveCorrelationId(context, request?.CorrelationId);
var refreshToken = request?.RefreshToken;
if (string.IsNullOrWhiteSpace(refreshToken))
{
context.Request.Cookies.TryGetValue(SessionRefreshCookieName, out refreshToken);
}
if (string.IsNullOrWhiteSpace(refreshToken))
{
return ErrorResult(StatusCodes.Status401Unauthorized, "session_missing", "Session refresh token is required.", correlationId);
}
var provider = request?.Provider ?? IdentityAuthProvider.InternalJwt;
var refreshResponse = await serviceClient.RefreshSessionTokensAsync(
new RefreshIdentitySessionRequest(refreshToken, correlationId, provider));
if (string.IsNullOrWhiteSpace(refreshResponse.AccessToken))
{
return ErrorResult(StatusCodes.Status401Unauthorized, "session_refresh_failed", "Session refresh failed.", correlationId);
}
WriteSessionCookies(context, refreshResponse, builder.Configuration);
return Results.Ok(new RefreshSessionApiResponse(refreshResponse.AccessToken, refreshResponse.ExpiresInSeconds));
});
app.MapPost($"{EndpointConventions.ApiPrefix}/session/logout", (HttpContext context) =>
{
DeleteSessionCookies(context, builder.Configuration);
return Results.NoContent();
});
// Compatibility alias for logout callers.
app.MapPost($"{EndpointConventions.ApiPrefix}/logout", (HttpContext context) =>
{
DeleteSessionCookies(context, builder.Configuration);
return Results.NoContent();
});
app.MapGet($"{EndpointConventions.ApiPrefix}/session/me", (HttpContext context) =>
{
var correlationId = ResolveCorrelationId(context);
if (!context.Request.Cookies.TryGetValue(SessionAccessCookieName, out var accessToken) ||
string.IsNullOrWhiteSpace(accessToken))
{
return ErrorResult(StatusCodes.Status401Unauthorized, "session_missing", "No active session.", correlationId);
}
if (!TryParseSessionProfile(accessToken, out var meResponse))
{
return ErrorResult(StatusCodes.Status401Unauthorized, "session_invalid", "Invalid session token.", correlationId);
}
return Results.Ok(meResponse);
}); });
app.MapHealthChecks("/healthz"); app.MapHealthChecks("/healthz");
@ -73,6 +250,11 @@ app.MapHealthChecks("/health");
app.Run(); app.Run();
IResult ErrorResult(int statusCode, string code, string message, string correlationId)
{
return Results.Json(new ApiErrorResponse(code, message, correlationId), statusCode: statusCode);
}
string ResolveCorrelationId(HttpContext context, string? preferred = null) string ResolveCorrelationId(HttpContext context, string? preferred = null)
{ {
if (!string.IsNullOrWhiteSpace(preferred)) if (!string.IsNullOrWhiteSpace(preferred))
@ -98,3 +280,79 @@ string ResolveCorrelationId(HttpContext context, string? preferred = null)
return context.TraceIdentifier; return context.TraceIdentifier;
} }
void WriteSessionCookies(HttpContext context, Thalos.Bff.Application.Sessions.SessionTokensResult tokens, IConfiguration configuration)
{
var secureCookie = configuration.GetValue("ThalosBff:SessionCookieSecure", false);
var cookieOptions = CreateCookieOptions(secureCookie, tokens.ExpiresInSeconds);
context.Response.Cookies.Append(SessionAccessCookieName, tokens.AccessToken, cookieOptions);
var refreshCookieSeconds = Math.Max(tokens.ExpiresInSeconds, 8 * 60 * 60);
context.Response.Cookies.Append(
SessionRefreshCookieName,
tokens.RefreshToken,
CreateCookieOptions(secureCookie, refreshCookieSeconds));
}
void DeleteSessionCookies(HttpContext context, IConfiguration configuration)
{
var secureCookie = configuration.GetValue("ThalosBff:SessionCookieSecure", false);
var options = CreateCookieOptions(secureCookie, 0);
context.Response.Cookies.Delete(SessionAccessCookieName, options);
context.Response.Cookies.Delete(SessionRefreshCookieName, options);
}
static CookieOptions CreateCookieOptions(bool secure, int expiresInSeconds)
{
return new CookieOptions
{
HttpOnly = true,
Secure = secure,
SameSite = SameSiteMode.Lax,
Path = "/",
MaxAge = TimeSpan.FromSeconds(Math.Max(0, expiresInSeconds))
};
}
static bool TryParseSessionProfile(string accessToken, out SessionMeApiResponse response)
{
response = new SessionMeApiResponse(false, string.Empty, string.Empty, IdentityAuthProvider.InternalJwt);
if (string.IsNullOrWhiteSpace(accessToken))
{
return false;
}
var parts = accessToken.Split(':', StringSplitOptions.RemoveEmptyEntries | StringSplitOptions.TrimEntries);
if (parts.Length < 3)
{
return false;
}
IdentityAuthProvider provider;
string subjectId;
string tenantId;
if (parts[0].Equals("azure", StringComparison.OrdinalIgnoreCase) && parts.Length >= 4)
{
provider = IdentityAuthProvider.AzureAd;
subjectId = parts[1];
tenantId = parts[2];
}
else if (parts[0].Equals("google", StringComparison.OrdinalIgnoreCase) && parts.Length >= 4)
{
provider = IdentityAuthProvider.Google;
subjectId = parts[1];
tenantId = parts[2];
}
else
{
provider = IdentityAuthProvider.InternalJwt;
subjectId = parts[0];
tenantId = parts[1];
}
response = new SessionMeApiResponse(true, subjectId, tenantId, provider);
return true;
}

View File

@ -5,10 +5,44 @@ option csharp_namespace = "Thalos.Service.Grpc";
package thalos.service.grpc; package thalos.service.grpc;
service IdentityRuntime { service IdentityRuntime {
rpc StartIdentitySession (StartIdentitySessionGrpcRequest) returns (StartIdentitySessionGrpcResponse);
rpc RefreshIdentitySession (RefreshIdentitySessionGrpcRequest) returns (RefreshIdentitySessionGrpcResponse);
rpc IssueIdentityToken (IssueIdentityTokenGrpcRequest) returns (IssueIdentityTokenGrpcResponse); rpc IssueIdentityToken (IssueIdentityTokenGrpcRequest) returns (IssueIdentityTokenGrpcResponse);
rpc EvaluateIdentityPolicy (EvaluateIdentityPolicyGrpcRequest) returns (EvaluateIdentityPolicyGrpcResponse); rpc EvaluateIdentityPolicy (EvaluateIdentityPolicyGrpcRequest) returns (EvaluateIdentityPolicyGrpcResponse);
} }
message StartIdentitySessionGrpcRequest {
string subject_id = 1;
string tenant_id = 2;
string provider = 3;
string external_token = 4;
string correlation_id = 5;
}
message StartIdentitySessionGrpcResponse {
string access_token = 1;
string refresh_token = 2;
int32 expires_in_seconds = 3;
string subject_id = 4;
string tenant_id = 5;
string provider = 6;
}
message RefreshIdentitySessionGrpcRequest {
string refresh_token = 1;
string correlation_id = 2;
string provider = 3;
}
message RefreshIdentitySessionGrpcResponse {
string access_token = 1;
string refresh_token = 2;
int32 expires_in_seconds = 3;
string subject_id = 4;
string tenant_id = 5;
string provider = 6;
}
message IssueIdentityTokenGrpcRequest { message IssueIdentityTokenGrpcRequest {
string subject_id = 1; string subject_id = 1;
string tenant_id = 2; string tenant_id = 2;

View File

@ -18,6 +18,17 @@ public class ContractShapeTests
Assert.Equal(IdentityAuthProvider.InternalJwt, request.Provider); Assert.Equal(IdentityAuthProvider.InternalJwt, request.Provider);
} }
[Fact]
public void SessionLoginApiRequest_WhenCreated_UsesProviderDefault()
{
var request = new SessionLoginApiRequest("user-2", "tenant-2", "corr-456");
Assert.Equal("user-2", request.SubjectId);
Assert.Equal("tenant-2", request.TenantId);
Assert.Equal("corr-456", request.CorrelationId);
Assert.Equal(IdentityAuthProvider.InternalJwt, request.Provider);
}
[Fact] [Fact]
public void ThalosBffPackageContract_WhenCreated_UsesBlueprintDescriptorContract() public void ThalosBffPackageContract_WhenCreated_UsesBlueprintDescriptorContract()
{ {

View File

@ -1,5 +1,6 @@
using Thalos.Bff.Application.Adapters; using Thalos.Bff.Application.Adapters;
using Thalos.Bff.Application.Handlers; using Thalos.Bff.Application.Handlers;
using Thalos.Bff.Application.Sessions;
using Thalos.Bff.Application.Security; using Thalos.Bff.Application.Security;
using Thalos.Bff.Contracts.Api; using Thalos.Bff.Contracts.Api;
using BuildingBlock.Identity.Contracts.Requests; using BuildingBlock.Identity.Contracts.Requests;
@ -25,6 +26,17 @@ public class IssueTokenHandlerTests
private sealed class FakeThalosServiceClient : IThalosServiceClient private sealed class FakeThalosServiceClient : IThalosServiceClient
{ {
public Task<SessionTokensResult> StartSessionAsync(IssueIdentityTokenRequest request, string correlationId)
{
return Task.FromResult(new SessionTokensResult(
"token-xyz",
"refresh-xyz",
1800,
request.SubjectId,
request.TenantId,
request.Provider));
}
public Task<IssueIdentityTokenResponse> IssueTokenAsync(IssueIdentityTokenRequest request) public Task<IssueIdentityTokenResponse> IssueTokenAsync(IssueIdentityTokenRequest request)
{ {
return Task.FromResult(new IssueIdentityTokenResponse("token-xyz", 1800)); return Task.FromResult(new IssueIdentityTokenResponse("token-xyz", 1800));
@ -39,6 +51,17 @@ public class IssueTokenHandlerTests
{ {
return Task.FromResult(new RefreshIdentitySessionResponse("token-refreshed", 1800)); return Task.FromResult(new RefreshIdentitySessionResponse("token-refreshed", 1800));
} }
public Task<SessionTokensResult> RefreshSessionTokensAsync(RefreshIdentitySessionRequest request)
{
return Task.FromResult(new SessionTokensResult(
"token-refreshed",
request.RefreshToken,
1800,
"user-1",
"tenant-1",
request.Provider));
}
} }
private sealed class FakeIdentityEdgeContractAdapter : IIdentityEdgeContractAdapter private sealed class FakeIdentityEdgeContractAdapter : IIdentityEdgeContractAdapter

View File

@ -1,5 +1,6 @@
using Thalos.Bff.Application.Adapters; using Thalos.Bff.Application.Adapters;
using Thalos.Bff.Application.Handlers; using Thalos.Bff.Application.Handlers;
using Thalos.Bff.Application.Sessions;
using Thalos.Bff.Contracts.Api; using Thalos.Bff.Contracts.Api;
using BuildingBlock.Identity.Contracts.Requests; using BuildingBlock.Identity.Contracts.Requests;
using BuildingBlock.Identity.Contracts.Responses; using BuildingBlock.Identity.Contracts.Responses;
@ -21,6 +22,17 @@ public class RefreshSessionHandlerTests
private sealed class FakeThalosServiceClient : IThalosServiceClient private sealed class FakeThalosServiceClient : IThalosServiceClient
{ {
public Task<SessionTokensResult> StartSessionAsync(IssueIdentityTokenRequest request, string correlationId)
{
return Task.FromResult(new SessionTokensResult(
"token-xyz",
"refresh-xyz",
1800,
request.SubjectId,
request.TenantId,
request.Provider));
}
public Task<IssueIdentityTokenResponse> IssueTokenAsync(IssueIdentityTokenRequest request) public Task<IssueIdentityTokenResponse> IssueTokenAsync(IssueIdentityTokenRequest request)
{ {
return Task.FromResult(new IssueIdentityTokenResponse("token-xyz", 1800)); return Task.FromResult(new IssueIdentityTokenResponse("token-xyz", 1800));
@ -35,6 +47,17 @@ public class RefreshSessionHandlerTests
{ {
return Task.FromResult(new RefreshIdentitySessionResponse("token-refreshed", 1800)); return Task.FromResult(new RefreshIdentitySessionResponse("token-refreshed", 1800));
} }
public Task<SessionTokensResult> RefreshSessionTokensAsync(RefreshIdentitySessionRequest request)
{
return Task.FromResult(new SessionTokensResult(
"token-refreshed",
request.RefreshToken,
1800,
"user-1",
"tenant-1",
request.Provider));
}
} }
private sealed class FakeIdentityEdgeContractAdapter : IIdentityEdgeContractAdapter private sealed class FakeIdentityEdgeContractAdapter : IIdentityEdgeContractAdapter