Files
huskies/server/src/gateway_relay.rs
T

268 lines
9.9 KiB
Rust
Raw Normal View History

2026-04-28 01:06:02 +00:00
//! Gateway relay task — pushes project status events to the gateway via WebSocket.
//!
//! When `gateway_url` is configured in `project.toml` (or the
//! `HUSKIES_GATEWAY_URL` environment variable is set), this module spawns a
//! background task that:
//!
//! 1. Obtains a one-time join token from the gateway via `POST /gateway/tokens`.
//! 2. Connects to the gateway's `/gateway/events/push` WebSocket endpoint.
//! 3. Forwards every [`StatusEvent`] from the local broadcaster as a
//! JSON-encoded [`StoredEvent`] text frame.
//! 4. Reconnects with exponential back-off when the connection drops.
use crate::service::events::StoredEvent;
use crate::service::status::{StatusBroadcaster, StatusEvent};
use crate::slog;
use futures::SinkExt as _;
use futures::StreamExt as _;
use std::sync::Arc;
use tokio_tungstenite::tungstenite::Message as WsMessage;
// ── Back-off constants ────────────────────────────────────────────────────────
/// Initial reconnect delay in seconds.
const INITIAL_BACKOFF_SECS: u64 = 1;
/// Maximum reconnect delay cap in seconds.
const MAX_BACKOFF_SECS: u64 = 60;
/// Multiplier applied after each failed attempt.
const BACKOFF_MULTIPLIER: u64 = 2;
// ── Public API ────────────────────────────────────────────────────────────────
/// Spawn the gateway relay background task.
///
/// Does nothing when `gateway_url` is empty. When running, the task holds a
/// persistent WebSocket connection to `{gateway_url}/gateway/events/push` and
/// forwards every [`StatusEvent`] the local broadcaster emits as a
/// JSON-encoded [`StoredEvent`] text frame. On disconnect the task
/// reconnects automatically with exponential back-off (initial 1 s, cap 60 s).
pub fn spawn_relay_task(
gateway_url: String,
project_name: String,
broadcaster: Arc<StatusBroadcaster>,
client: reqwest::Client,
) {
if gateway_url.is_empty() {
return;
}
slog!("[relay] Spawning gateway relay task (project={project_name}, gateway={gateway_url})");
tokio::spawn(async move {
let mut backoff = INITIAL_BACKOFF_SECS;
loop {
match relay_once(&gateway_url, &project_name, &broadcaster, &client).await {
Ok(()) => {
slog!("[relay] Gateway connection closed cleanly; reconnecting in {backoff}s");
}
Err(e) => {
slog!("[relay] Relay error: {e}; reconnecting in {backoff}s");
}
}
tokio::time::sleep(std::time::Duration::from_secs(backoff)).await;
// Exponential back-off with a hard cap.
backoff = (backoff.saturating_mul(BACKOFF_MULTIPLIER)).min(MAX_BACKOFF_SECS);
}
});
}
// ── Private helpers ───────────────────────────────────────────────────────────
/// Run a single relay session: obtain a token, connect, forward events until
/// disconnect or broadcaster close.
async fn relay_once(
gateway_url: &str,
project_name: &str,
broadcaster: &StatusBroadcaster,
client: &reqwest::Client,
) -> Result<(), String> {
// Subscribe before initiating the network round-trip so no events are
// missed during the connection setup window.
let mut sub = broadcaster.subscribe();
// Step 1: obtain a one-time join token from the gateway.
let token_url = format!("{}/gateway/tokens", gateway_url.trim_end_matches('/'));
let resp = client
.post(&token_url)
.send()
.await
.map_err(|e| format!("token request: {e}"))?;
if !resp.status().is_success() {
return Err(format!("token request returned HTTP {}", resp.status()));
}
let body: serde_json::Value = resp.json().await.map_err(|e| format!("token parse: {e}"))?;
let token = body
.get("token")
.and_then(|t| t.as_str())
.ok_or_else(|| "no 'token' field in gateway response".to_string())?
.to_string();
// Step 2: connect to the WebSocket push endpoint.
let ws_base = to_ws_url(gateway_url.trim_end_matches('/'));
let ws_url = format!("{ws_base}/gateway/events/push?token={token}&project={project_name}");
slog!("[relay] Connecting to gateway events endpoint (project={project_name})");
let (ws_stream, _) = tokio_tungstenite::connect_async(ws_url.as_str())
.await
.map_err(|e| format!("WebSocket connect: {e}"))?;
let (mut sink, _rx) = ws_stream.split();
slog!("[relay] Connected to gateway events endpoint (project={project_name})");
// Step 3: forward StatusEvents until the broadcaster or connection closes.
loop {
match sub.recv().await {
None => {
// Broadcaster was dropped — server is shutting down.
return Ok(());
}
Some(event) => {
let Some(stored) = status_to_stored(event) else {
continue;
};
let text = serde_json::to_string(&stored).map_err(|e| format!("serialise: {e}"))?;
sink.send(WsMessage::Text(text.into()))
.await
.map_err(|e| format!("WebSocket send: {e}"))?;
}
}
}
}
/// Convert a [`StatusEvent`] to a [`StoredEvent`] stamped with the current
/// wall-clock time, or `None` when the event has no `StoredEvent` equivalent
/// (e.g. rate-limit variants).
fn status_to_stored(event: StatusEvent) -> Option<StoredEvent> {
let now_ms = std::time::SystemTime::now()
.duration_since(std::time::UNIX_EPOCH)
.unwrap_or_default()
.as_millis() as u64;
match event {
StatusEvent::StageTransition {
story_id,
from_stage,
to_stage,
..
} => Some(StoredEvent::StageTransition {
story_id,
from_stage,
to_stage,
timestamp_ms: now_ms,
}),
StatusEvent::MergeFailure {
story_id, reason, ..
} => Some(StoredEvent::MergeFailure {
story_id,
reason,
timestamp_ms: now_ms,
}),
StatusEvent::StoryBlocked {
story_id, reason, ..
} => Some(StoredEvent::StoryBlocked {
story_id,
reason,
timestamp_ms: now_ms,
}),
// Rate-limit events have no StoredEvent equivalent — skip them.
StatusEvent::RateLimitWarning { .. } | StatusEvent::RateLimitHardBlock { .. } => None,
}
}
/// Convert an `http://` or `https://` base URL to its `ws://` / `wss://`
/// equivalent. Returns the input unchanged if it does not start with `http`.
fn to_ws_url(base: &str) -> String {
if let Some(rest) = base.strip_prefix("https://") {
format!("wss://{rest}")
} else if let Some(rest) = base.strip_prefix("http://") {
format!("ws://{rest}")
} else {
base.to_string()
}
}
// ── Tests ─────────────────────────────────────────────────────────────────────
#[cfg(test)]
mod tests {
use super::*;
#[test]
fn to_ws_url_converts_http() {
assert_eq!(to_ws_url("http://gateway:3000"), "ws://gateway:3000");
}
#[test]
fn to_ws_url_converts_https() {
assert_eq!(to_ws_url("https://gateway:3000"), "wss://gateway:3000");
}
#[test]
fn to_ws_url_passes_through_ws() {
assert_eq!(to_ws_url("ws://already:3000"), "ws://already:3000");
}
#[test]
fn status_to_stored_stage_transition() {
let ev = StatusEvent::StageTransition {
story_id: "42".into(),
story_name: None,
from_stage: "1_backlog".into(),
to_stage: "2_current".into(),
};
let stored = status_to_stored(ev).unwrap();
assert!(
matches!(stored, StoredEvent::StageTransition { story_id, .. } if story_id == "42")
);
}
#[test]
fn status_to_stored_merge_failure() {
let ev = StatusEvent::MergeFailure {
story_id: "7".into(),
story_name: None,
reason: "conflict".into(),
};
let stored = status_to_stored(ev).unwrap();
assert!(matches!(stored, StoredEvent::MergeFailure { story_id, .. } if story_id == "7"));
}
#[test]
fn status_to_stored_story_blocked() {
let ev = StatusEvent::StoryBlocked {
story_id: "3".into(),
story_name: None,
reason: "retry limit".into(),
};
let stored = status_to_stored(ev).unwrap();
assert!(matches!(stored, StoredEvent::StoryBlocked { story_id, .. } if story_id == "3"));
}
#[test]
fn status_to_stored_rate_limit_warning_is_none() {
let ev = StatusEvent::RateLimitWarning {
story_id: "1".into(),
story_name: None,
agent_name: "coder".into(),
};
assert!(status_to_stored(ev).is_none());
}
#[test]
fn status_to_stored_rate_limit_hard_block_is_none() {
let ev = StatusEvent::RateLimitHardBlock {
story_id: "2".into(),
story_name: None,
agent_name: "coder".into(),
reset_at: chrono::Utc::now(),
};
assert!(status_to_stored(ev).is_none());
}
#[test]
fn spawn_relay_task_noop_when_url_empty() {
// Should not panic or spawn anything meaningful.
let broadcaster = Arc::new(StatusBroadcaster::new());
let client = reqwest::Client::new();
spawn_relay_task(String::new(), "test".into(), broadcaster, client);
// If we reach here without panic, the guard worked.
}
}