v1.7.2
This commit is contained in:
204
client_bvs.go
204
client_bvs.go
@@ -13,9 +13,11 @@ import (
|
||||
"strconv"
|
||||
"strings"
|
||||
"sync"
|
||||
"time"
|
||||
|
||||
"github.com/google/go-querystring/query"
|
||||
"repository.basistech.ru/BASIS/decort-golang-sdk/config"
|
||||
"repository.basistech.ru/BASIS/decort-golang-sdk/internal/constants"
|
||||
"repository.basistech.ru/BASIS/decort-golang-sdk/pkg/cloudapi"
|
||||
k8s_ca "repository.basistech.ru/BASIS/decort-golang-sdk/pkg/cloudapi/k8s"
|
||||
"repository.basistech.ru/BASIS/decort-golang-sdk/pkg/cloudbroker"
|
||||
@@ -30,11 +32,21 @@ type BVSDecortClient struct {
|
||||
decortURL string
|
||||
}
|
||||
|
||||
type tokenJSON struct {
|
||||
AccessToken string `json:"access_token"`
|
||||
TokenType string `json:"token_type"`
|
||||
RefreshToken string `json:"refresh_token"`
|
||||
ExpiresIn uint64 `json:"expires_in"`
|
||||
}
|
||||
|
||||
// Сlient builder
|
||||
func NewBVS(cfg config.BVSConfig) *BVSDecortClient {
|
||||
if cfg.Retries == 0 {
|
||||
cfg.Retries = 5
|
||||
}
|
||||
if cfg.TimeToRefresh == 0 {
|
||||
cfg.TimeToRefresh = 1
|
||||
}
|
||||
|
||||
return &BVSDecortClient{
|
||||
decortURL: cfg.DecortURL,
|
||||
@@ -80,18 +92,42 @@ func (bdc *BVSDecortClient) DecortApiCall(ctx context.Context, method, url strin
|
||||
body = bytes.NewBufferString(values.Encode())
|
||||
}
|
||||
|
||||
req, err := http.NewRequestWithContext(ctx, method, bdc.decortURL+restmachine+url, body)
|
||||
req, err := http.NewRequestWithContext(ctx, method, bdc.decortURL+constants.Restmachine+url, body)
|
||||
if err != nil {
|
||||
return nil, err
|
||||
}
|
||||
|
||||
if err = bdc.getToken(ctx); err != nil {
|
||||
return nil, err
|
||||
if bdc.cfg.Token.AccessToken == "" {
|
||||
if _, err = bdc.GetToken(ctx); err != nil {
|
||||
return nil, err
|
||||
}
|
||||
}
|
||||
|
||||
if bdc.cfg.Token.RefreshToken != "" && bdc.cfg.Token.Expiry.Add(-time.Duration(bdc.cfg.TimeToRefresh)*time.Minute).Before(time.Now()) {
|
||||
if _, err := bdc.RefreshToken(ctx); err != nil {
|
||||
if _, err = bdc.GetToken(ctx); err != nil {
|
||||
return nil, err
|
||||
}
|
||||
}
|
||||
}
|
||||
reqCopy := req.Clone(ctx)
|
||||
//nolint:bodyclose
|
||||
//work defer, error lint
|
||||
resp, err := bdc.do(req, ctype)
|
||||
if err != nil {
|
||||
return nil, err
|
||||
if err.Error() == "access is denied" {
|
||||
if _, err = bdc.GetToken(ctx); err != nil {
|
||||
return nil, err
|
||||
}
|
||||
//nolint:bodyclose
|
||||
//we close the body in case of any error
|
||||
resp, err = bdc.do(reqCopy, ctype)
|
||||
if err != nil {
|
||||
return nil, err
|
||||
}
|
||||
} else {
|
||||
return nil, err
|
||||
}
|
||||
}
|
||||
defer resp.Body.Close()
|
||||
|
||||
@@ -107,39 +143,117 @@ func (bdc *BVSDecortClient) DecortApiCall(ctx context.Context, method, url strin
|
||||
return respBytes, nil
|
||||
}
|
||||
|
||||
func (bdc *BVSDecortClient) getToken(ctx context.Context) error {
|
||||
// GetToken allows you to get a token and returns the token structure, when specifying the PathCfg variable,
|
||||
// the token and configuration will be written to a file,
|
||||
// when specifying the PathToken variable, the token will be written to a file
|
||||
func (bdc *BVSDecortClient) GetToken(ctx context.Context) (config.Token, error) {
|
||||
bdc.mutex.Lock()
|
||||
defer bdc.mutex.Unlock()
|
||||
|
||||
if !bdc.cfg.Token.Valid() {
|
||||
body := fmt.Sprintf("grant_type=password&client_id=%s&client_secret=%s&username=%s&password=%s&response_type=token&scope=openid", bdc.cfg.AppID, bdc.cfg.AppSecret, bdc.cfg.Username, bdc.cfg.Password)
|
||||
bodyReader := strings.NewReader(body)
|
||||
|
||||
body := fmt.Sprintf("grant_type=password&client_id=%s&client_secret=%s&username=%s&password=%s&response_type=token&scope=openid", bdc.cfg.AppID, bdc.cfg.AppSecret, bdc.cfg.Username, bdc.cfg.Password)
|
||||
bodyReader := strings.NewReader(body)
|
||||
bdc.cfg.SSOURL = strings.TrimSuffix(bdc.cfg.SSOURL, "/")
|
||||
|
||||
bdc.cfg.SSOURL = strings.TrimSuffix(bdc.cfg.SSOURL, "/")
|
||||
req, _ := http.NewRequestWithContext(ctx, "POST", bdc.cfg.SSOURL+"/realms/"+bdc.cfg.Domain+"/protocol/openid-connect/token", bodyReader)
|
||||
req.Header.Add("Content-Type", "application/x-www-form-urlencoded")
|
||||
|
||||
req, _ := http.NewRequestWithContext(ctx, "POST", bdc.cfg.SSOURL+"/realms/"+bdc.cfg.Domain+"/protocol/openid-connect/token", bodyReader)
|
||||
req.Header.Add("Content-Type", "application/x-www-form-urlencoded")
|
||||
|
||||
resp, err := bdc.client.Do(req)
|
||||
if err != nil {
|
||||
return fmt.Errorf("cannot get token: %w", err)
|
||||
}
|
||||
|
||||
tokenBytes, _ := io.ReadAll(resp.Body)
|
||||
resp.Body.Close()
|
||||
|
||||
if resp.StatusCode != 200 {
|
||||
return fmt.Errorf("cannot get token: %s", tokenBytes)
|
||||
}
|
||||
|
||||
err = json.Unmarshal(tokenBytes, &bdc.cfg.Token)
|
||||
if err != nil {
|
||||
return fmt.Errorf("cannot unmarshal token: %s", tokenBytes)
|
||||
}
|
||||
resp, err := bdc.client.Do(req)
|
||||
if err != nil {
|
||||
return config.Token{}, fmt.Errorf("cannot get token: %w", err)
|
||||
}
|
||||
|
||||
return nil
|
||||
tokenBytes, _ := io.ReadAll(resp.Body)
|
||||
resp.Body.Close()
|
||||
|
||||
if resp.StatusCode != 200 {
|
||||
return config.Token{}, fmt.Errorf("cannot get token: %s", tokenBytes)
|
||||
}
|
||||
|
||||
var tj tokenJSON
|
||||
|
||||
if err = json.Unmarshal(tokenBytes, &tj); err != nil {
|
||||
return config.Token{}, fmt.Errorf("cannot unmarshal token: %w", err)
|
||||
}
|
||||
|
||||
bdc.cfg.Token = config.Token{
|
||||
AccessToken: tj.AccessToken,
|
||||
TokenType: tj.TokenType,
|
||||
RefreshToken: tj.RefreshToken,
|
||||
Expiry: tj.expiry(),
|
||||
}
|
||||
|
||||
if bdc.cfg.PathCfg != "" {
|
||||
ser, _ := bdc.cfg.Serialize("", " ")
|
||||
_ = ser.WriteToFile(bdc.cfg.PathCfg)
|
||||
}
|
||||
|
||||
if bdc.cfg.PathToken != "" {
|
||||
ser, _ := bdc.cfg.Token.Serialize("", " ")
|
||||
_ = ser.WriteToFile(bdc.cfg.PathToken)
|
||||
}
|
||||
|
||||
return bdc.cfg.Token, nil
|
||||
}
|
||||
|
||||
// RefreshToken allows you to refresh a token and returns the token structure, when specifying the PathCfg variable,
|
||||
// the token and configuration will be written to a file,
|
||||
// when specifying the PathToken variable, the token will be written to a file
|
||||
func (bdc *BVSDecortClient) RefreshToken(ctx context.Context) (config.Token, error) {
|
||||
bdc.mutex.Lock()
|
||||
defer bdc.mutex.Unlock()
|
||||
|
||||
body := fmt.Sprintf("grant_type=refresh_token&client_id=%s&client_secret=%s&refresh_token=%s&scope=openid", bdc.cfg.AppID, bdc.cfg.AppSecret, bdc.cfg.Token.RefreshToken)
|
||||
bodyReader := strings.NewReader(body)
|
||||
|
||||
bdc.cfg.SSOURL = strings.TrimSuffix(bdc.cfg.SSOURL, "/")
|
||||
|
||||
req, _ := http.NewRequestWithContext(ctx, "POST", bdc.cfg.SSOURL+"/realms/"+bdc.cfg.Domain+"/protocol/openid-connect/token", bodyReader)
|
||||
req.Header.Add("Content-Type", "application/x-www-form-urlencoded")
|
||||
|
||||
resp, err := bdc.client.Do(req)
|
||||
if err != nil {
|
||||
return config.Token{}, fmt.Errorf("cannot refresh token: %w", err)
|
||||
}
|
||||
|
||||
tokenBytes, _ := io.ReadAll(resp.Body)
|
||||
resp.Body.Close()
|
||||
|
||||
if resp.StatusCode != 200 {
|
||||
return config.Token{}, fmt.Errorf("cannot refresh token: %s", tokenBytes)
|
||||
}
|
||||
|
||||
var tj tokenJSON
|
||||
|
||||
if err = json.Unmarshal(tokenBytes, &tj); err != nil {
|
||||
return config.Token{}, fmt.Errorf("cannot unmarshal after refresh token: %w", err)
|
||||
}
|
||||
|
||||
bdc.cfg.Token = config.Token{
|
||||
AccessToken: tj.AccessToken,
|
||||
TokenType: tj.TokenType,
|
||||
RefreshToken: tj.RefreshToken,
|
||||
Expiry: tj.expiry(),
|
||||
}
|
||||
|
||||
if bdc.cfg.PathCfg != "" {
|
||||
ser, _ := bdc.cfg.Serialize("", " ")
|
||||
_ = ser.WriteToFile(bdc.cfg.PathCfg)
|
||||
}
|
||||
|
||||
if bdc.cfg.PathToken != "" {
|
||||
ser, _ := bdc.cfg.Token.Serialize("", " ")
|
||||
_ = ser.WriteToFile(bdc.cfg.PathToken)
|
||||
}
|
||||
|
||||
return bdc.cfg.Token, nil
|
||||
}
|
||||
|
||||
func (e *tokenJSON) expiry() (t time.Time) {
|
||||
if v := e.ExpiresIn; v != 0 {
|
||||
return time.Now().Add(time.Duration(v) * time.Second)
|
||||
}
|
||||
return
|
||||
}
|
||||
|
||||
func (bdc *BVSDecortClient) do(req *http.Request, ctype string) (*http.Response, error) {
|
||||
@@ -148,28 +262,32 @@ func (bdc *BVSDecortClient) do(req *http.Request, ctype string) (*http.Response,
|
||||
} else {
|
||||
req.Header.Add("Content-Type", "application/x-www-form-urlencoded")
|
||||
}
|
||||
bdc.cfg.Token.SetAuthHeader(req)
|
||||
req.Header.Add("Authorization", "bearer "+bdc.cfg.Token.AccessToken)
|
||||
req.Header.Set("Accept", "application/json")
|
||||
|
||||
// var resp *http.Response
|
||||
// var err error
|
||||
buf, _ := io.ReadAll(req.Body)
|
||||
|
||||
// for i := uint64(0); i < bdc.cfg.Retries; i++ {
|
||||
// req = req.Clone(req.Context())
|
||||
req.Body = io.NopCloser(bytes.NewBuffer(buf))
|
||||
resp, err := bdc.client.Do(req)
|
||||
if err == nil {
|
||||
if resp.StatusCode == 200 {
|
||||
return resp, err
|
||||
}
|
||||
if err != nil || resp == nil {
|
||||
return resp, err
|
||||
}
|
||||
// }
|
||||
respBytes, _ := io.ReadAll(resp.Body)
|
||||
err = fmt.Errorf("%s", respBytes)
|
||||
resp.Body.Close()
|
||||
|
||||
return nil, fmt.Errorf("could not execute request: %w", err)
|
||||
if resp.StatusCode == 401 {
|
||||
resp.Body.Close()
|
||||
return resp, errors.New("access is denied")
|
||||
}
|
||||
|
||||
if resp.StatusCode == 200 {
|
||||
return resp, err
|
||||
}
|
||||
|
||||
respBytes, err := io.ReadAll(resp.Body)
|
||||
if err != nil {
|
||||
return nil, err
|
||||
}
|
||||
resp.Body.Close()
|
||||
return resp, errors.New(string(respBytes))
|
||||
}
|
||||
|
||||
func createK8sCloudApiBVS(req k8s_ca.CreateRequest) (*bytes.Buffer, string) {
|
||||
|
||||
Reference in New Issue
Block a user