Refactor core kernel and infrastructure to support true microservices architecture where services are independently deployable. Phase 1: Core Kernel Cleanup - Remove database provider from CoreModule (services create their own) - Update ProvideHealthRegistry to not depend on database - Add schema support to database client (NewClientWithSchema) - Update main entry point to remove database dependency - Core kernel now provides only: config, logger, error bus, health, metrics, tracer, service registry Phase 2: Service Registry Implementation - Create ServiceRegistry interface (pkg/registry/registry.go) - Implement Consul registry (internal/registry/consul/consul.go) - Add Consul dependency (github.com/hashicorp/consul/api) - Add registry configuration to config/default.yaml - Add ProvideServiceRegistry() to DI container Phase 3: Service Client Interfaces - Create service client interfaces: - pkg/services/auth.go - AuthServiceClient - pkg/services/identity.go - IdentityServiceClient - pkg/services/authz.go - AuthzServiceClient - pkg/services/audit.go - AuditServiceClient - Create ServiceClientFactory (internal/client/factory.go) - Create stub gRPC client implementations (internal/client/grpc/) - Add ProvideServiceClientFactory() to DI container Phase 4: gRPC Service Definitions - Create proto files for all core services: - api/proto/auth.proto - api/proto/identity.proto - api/proto/authz.proto - api/proto/audit.proto - Add generate-proto target to Makefile Phase 5: API Gateway Implementation - Create API Gateway service entry point (cmd/api-gateway/main.go) - Create Gateway implementation (services/gateway/gateway.go) - Add gateway configuration to config/default.yaml - Gateway registers with Consul and routes requests to backend services All code compiles successfully. Core services (Auth, Identity, Authz, Audit) will be implemented in Epic 2 using these foundations.
38 lines
1.3 KiB
Go
38 lines
1.3 KiB
Go
// Package services provides service client interfaces for inter-service communication.
|
|
package services
|
|
|
|
import (
|
|
"context"
|
|
)
|
|
|
|
// AuthServiceClient is the interface for communicating with the Auth Service.
|
|
type AuthServiceClient interface {
|
|
// Login authenticates a user and returns access and refresh tokens.
|
|
Login(ctx context.Context, email, password string) (*TokenResponse, error)
|
|
|
|
// RefreshToken refreshes an access token using a refresh token.
|
|
RefreshToken(ctx context.Context, refreshToken string) (*TokenResponse, error)
|
|
|
|
// ValidateToken validates a JWT token and returns the token claims.
|
|
ValidateToken(ctx context.Context, token string) (*TokenClaims, error)
|
|
|
|
// Logout invalidates a refresh token.
|
|
Logout(ctx context.Context, refreshToken string) error
|
|
}
|
|
|
|
// TokenResponse contains the authentication tokens.
|
|
type TokenResponse struct {
|
|
AccessToken string `json:"access_token"`
|
|
RefreshToken string `json:"refresh_token"`
|
|
ExpiresIn int64 `json:"expires_in"` // seconds
|
|
TokenType string `json:"token_type"` // "Bearer"
|
|
}
|
|
|
|
// TokenClaims contains the claims from a validated JWT token.
|
|
type TokenClaims struct {
|
|
UserID string `json:"user_id"`
|
|
Email string `json:"email"`
|
|
Roles []string `json:"roles"`
|
|
ExpiresAt int64 `json:"expires_at"`
|
|
}
|