mirror of https://github.com/grafana/grafana
CloudMigration: Create authapi service (#96581)
parent
c8bc1f8637
commit
e9fae5bd7f
@ -0,0 +1,398 @@ |
||||
// Package authapi contains the connector for Grafana internal auth service. This can be used instead of the GCOM service
|
||||
// to create access policies and access tokens
|
||||
package authapi |
||||
|
||||
import ( |
||||
"bytes" |
||||
"context" |
||||
"encoding/json" |
||||
"errors" |
||||
"fmt" |
||||
"io" |
||||
"net/http" |
||||
"net/url" |
||||
"time" |
||||
|
||||
"github.com/grafana/grafana/pkg/infra/log" |
||||
) |
||||
|
||||
const LogPrefix = "auth-api.service" |
||||
|
||||
var ErrTokenNotFound = errors.New("auth-api: token not found") |
||||
|
||||
type Service interface { |
||||
CreateAccessPolicy(ctx context.Context, params CreateAccessPolicyParams, payload CreateAccessPolicyPayload) (AccessPolicy, error) |
||||
ListAccessPolicies(ctx context.Context, params ListAccessPoliciesParams) ([]AccessPolicy, error) |
||||
DeleteAccessPolicy(ctx context.Context, params DeleteAccessPolicyParams) (bool, error) |
||||
ListTokens(ctx context.Context, params ListTokenParams) ([]TokenView, error) |
||||
CreateToken(ctx context.Context, params CreateTokenParams, payload CreateTokenPayload) (Token, error) |
||||
DeleteToken(ctx context.Context, params DeleteTokenParams) error |
||||
} |
||||
|
||||
type CreateAccessPolicyParams struct { |
||||
RequestID string |
||||
// this is needed until we fully migrate from gcom to authapi
|
||||
Region string |
||||
} |
||||
|
||||
type CreateAccessPolicyPayload struct { |
||||
Name string `json:"name"` |
||||
DisplayName string `json:"displayName"` |
||||
Realms []Realm `json:"realms"` |
||||
Scopes []string `json:"scopes"` |
||||
} |
||||
|
||||
type Realm struct { |
||||
Identifier string `json:"identifier"` |
||||
LabelPolicies []LabelPolicy `json:"labelPolicies"` |
||||
Type string `json:"type"` |
||||
} |
||||
|
||||
type LabelPolicy struct { |
||||
Selector string `json:"selector"` |
||||
} |
||||
|
||||
type createAccessPolicyResponse struct { |
||||
Data AccessPolicy `json:"data"` |
||||
} |
||||
|
||||
type AccessPolicy struct { |
||||
ID string `json:"id"` |
||||
Name string `json:"name"` |
||||
} |
||||
|
||||
type ListAccessPoliciesParams struct { |
||||
RequestID string |
||||
Name string |
||||
// this is needed until we fully migrate from gcom to authapi
|
||||
Region string |
||||
} |
||||
|
||||
type listAccessPoliciesResponse struct { |
||||
Data []AccessPolicy `json:"data"` |
||||
} |
||||
|
||||
type DeleteAccessPolicyParams struct { |
||||
RequestID string |
||||
AccessPolicyID string |
||||
// this is needed until we fully migrate from gcom to authapi
|
||||
Region string |
||||
} |
||||
|
||||
type ListTokenParams struct { |
||||
RequestID string |
||||
AccessPolicyName string |
||||
TokenName string |
||||
// this is needed until we fully migrate from gcom to authapi
|
||||
Region string |
||||
} |
||||
|
||||
type CreateTokenParams struct { |
||||
RequestID string |
||||
// this is needed until we fully migrate from gcom to authapi
|
||||
Region string |
||||
} |
||||
|
||||
type CreateTokenPayload struct { |
||||
AccessPolicyID string `json:"accessPolicyId"` |
||||
DisplayName string `json:"displayName"` |
||||
Name string `json:"name"` |
||||
ExpiresAt time.Time `json:"expiresAt"` |
||||
} |
||||
|
||||
type createTokenResponse struct { |
||||
Data Token `json:"data"` |
||||
} |
||||
|
||||
// Token returned by authapi api when a token gets created.
|
||||
type Token struct { |
||||
ID string `json:"id"` |
||||
AccessPolicyID string `json:"accessPolicyId"` |
||||
Name string `json:"name"` |
||||
Token string `json:"token"` |
||||
} |
||||
|
||||
type DeleteTokenParams struct { |
||||
RequestID string |
||||
TokenID string |
||||
// this is needed until we fully migrate from gcom to authapi
|
||||
Region string |
||||
} |
||||
|
||||
// TokenView returned by authapi api for a GET token request.
|
||||
type TokenView struct { |
||||
ID string `json:"id"` |
||||
AccessPolicyID string `json:"accessPolicyId"` |
||||
Name string `json:"name"` |
||||
DisplayName string `json:"displayName"` |
||||
ExpiresAt string `json:"expiresAt"` |
||||
FirstUsedAt string `json:"firstUsedAt"` |
||||
LastUsedAt string `json:"lastUsedAt"` |
||||
CreatedAt string `json:"createdAt"` |
||||
} |
||||
|
||||
type listTokensResponse struct { |
||||
Data []TokenView `json:"data"` |
||||
} |
||||
|
||||
var _ Service = (*AuthApiClient)(nil) |
||||
|
||||
type AuthApiClient struct { |
||||
log log.Logger |
||||
cfg Config |
||||
httpClient *http.Client |
||||
} |
||||
|
||||
type Config struct { |
||||
ApiURL string |
||||
Token string |
||||
} |
||||
|
||||
func New(cfg Config, httpClient *http.Client) Service { |
||||
return &AuthApiClient{ |
||||
log: log.New(LogPrefix), |
||||
cfg: cfg, |
||||
httpClient: httpClient, |
||||
} |
||||
} |
||||
|
||||
func (client *AuthApiClient) CreateAccessPolicy(ctx context.Context, params CreateAccessPolicyParams, payload CreateAccessPolicyPayload) (AccessPolicy, error) { |
||||
endpoint, err := url.JoinPath(client.cfg.ApiURL, "/v1/accesspolicies") |
||||
if err != nil { |
||||
return AccessPolicy{}, fmt.Errorf("building authapi access policy url: %w", err) |
||||
} |
||||
|
||||
body, err := json.Marshal(&payload) |
||||
if err != nil { |
||||
return AccessPolicy{}, fmt.Errorf("marshaling request body: %w", err) |
||||
} |
||||
|
||||
request, err := http.NewRequestWithContext(ctx, http.MethodPost, endpoint, bytes.NewReader(body)) |
||||
if err != nil { |
||||
return AccessPolicy{}, fmt.Errorf("creating http request: %w", err) |
||||
} |
||||
|
||||
request.Header.Set("x-request-id", params.RequestID) |
||||
request.Header.Set("Content-Type", "application/json") |
||||
request.Header.Set("Authorization", fmt.Sprintf("Bearer %s", client.cfg.Token)) |
||||
|
||||
response, err := client.httpClient.Do(request) |
||||
if err != nil { |
||||
return AccessPolicy{}, fmt.Errorf("sending http request to create access policy: %w", err) |
||||
} |
||||
defer func() { |
||||
if err := response.Body.Close(); err != nil { |
||||
client.log.Error("closing http response body", "err", err.Error()) |
||||
} |
||||
}() |
||||
|
||||
if response.StatusCode != http.StatusOK { |
||||
body, _ := io.ReadAll(response.Body) |
||||
return AccessPolicy{}, fmt.Errorf("unexpected response when creating access policy: code=%d body=%s", response.StatusCode, body) |
||||
} |
||||
|
||||
var capResp createAccessPolicyResponse |
||||
if err := json.NewDecoder(response.Body).Decode(&capResp); err != nil { |
||||
return AccessPolicy{}, fmt.Errorf("unmarshaling response body: %w", err) |
||||
} |
||||
|
||||
return capResp.Data, nil |
||||
} |
||||
|
||||
func (client *AuthApiClient) DeleteAccessPolicy(ctx context.Context, params DeleteAccessPolicyParams) (bool, error) { |
||||
endpoint, err := url.JoinPath(client.cfg.ApiURL, "/v1/accesspolicies/", params.AccessPolicyID) |
||||
if err != nil { |
||||
return false, fmt.Errorf("building authapi access policy url: %w", err) |
||||
} |
||||
|
||||
request, err := http.NewRequestWithContext(ctx, http.MethodDelete, endpoint, nil) |
||||
if err != nil { |
||||
return false, fmt.Errorf("creating http request: %w", err) |
||||
} |
||||
|
||||
request.Header.Set("x-request-id", params.RequestID) |
||||
request.Header.Set("Authorization", fmt.Sprintf("Bearer %s", client.cfg.Token)) |
||||
|
||||
response, err := client.httpClient.Do(request) |
||||
if err != nil { |
||||
return false, fmt.Errorf("sending http request to create access policy: %w", err) |
||||
} |
||||
defer func() { |
||||
if err := response.Body.Close(); err != nil { |
||||
client.log.Error("closing http response body", "err", err.Error()) |
||||
} |
||||
}() |
||||
|
||||
if response.StatusCode == http.StatusNotFound { |
||||
return false, nil |
||||
} |
||||
|
||||
if response.StatusCode == http.StatusOK || response.StatusCode == http.StatusNoContent { |
||||
return true, nil |
||||
} |
||||
|
||||
body, _ := io.ReadAll(response.Body) |
||||
return false, fmt.Errorf("unexpected response when deleting access policy: code=%d body=%s", response.StatusCode, body) |
||||
} |
||||
|
||||
func (client *AuthApiClient) ListAccessPolicies(ctx context.Context, params ListAccessPoliciesParams) ([]AccessPolicy, error) { |
||||
endpoint, err := url.JoinPath(client.cfg.ApiURL, "/v1/accesspolicies") |
||||
if err != nil { |
||||
return nil, fmt.Errorf("building authapi access policy url: %w", err) |
||||
} |
||||
|
||||
request, err := http.NewRequestWithContext(ctx, http.MethodGet, endpoint, nil) |
||||
if err != nil { |
||||
return nil, fmt.Errorf("creating http request: %w", err) |
||||
} |
||||
|
||||
query := url.Values{} |
||||
query.Set("name", params.Name) |
||||
request.URL.RawQuery = query.Encode() |
||||
request.Header.Set("x-request-id", params.RequestID) |
||||
request.Header.Set("Accept", "application/json") |
||||
request.Header.Set("Authorization", fmt.Sprintf("Bearer %s", client.cfg.Token)) |
||||
|
||||
response, err := client.httpClient.Do(request) |
||||
if err != nil { |
||||
return nil, fmt.Errorf("sending http request to create access policy: %w", err) |
||||
} |
||||
defer func() { |
||||
if err := response.Body.Close(); err != nil { |
||||
client.log.Error("closing http response body", "err", err.Error()) |
||||
} |
||||
}() |
||||
|
||||
if response.StatusCode != http.StatusOK { |
||||
body, _ := io.ReadAll(response.Body) |
||||
return nil, fmt.Errorf("unexpected response when listing access policies: code=%d body=%s", response.StatusCode, body) |
||||
} |
||||
|
||||
var lapResp listAccessPoliciesResponse |
||||
if err := json.NewDecoder(response.Body).Decode(&lapResp); err != nil { |
||||
return lapResp.Data, fmt.Errorf("unmarshaling response body: %w", err) |
||||
} |
||||
return lapResp.Data, nil |
||||
} |
||||
|
||||
func (client *AuthApiClient) ListTokens(ctx context.Context, params ListTokenParams) ([]TokenView, error) { |
||||
endpoint, err := url.JoinPath(client.cfg.ApiURL, "/v1/tokens") |
||||
if err != nil { |
||||
return nil, fmt.Errorf("building authapi tokens url: %w", err) |
||||
} |
||||
|
||||
request, err := http.NewRequestWithContext(ctx, http.MethodGet, endpoint, nil) |
||||
if err != nil { |
||||
return nil, fmt.Errorf("creating http request: %w", err) |
||||
} |
||||
|
||||
query := url.Values{} |
||||
query.Set("accessPolicyName", params.AccessPolicyName) |
||||
query.Set("name", params.TokenName) |
||||
|
||||
request.URL.RawQuery = query.Encode() |
||||
request.Header.Set("x-request-id", params.RequestID) |
||||
request.Header.Set("Content-Type", "application/json") |
||||
request.Header.Set("Authorization", fmt.Sprintf("Bearer %s", client.cfg.Token)) |
||||
|
||||
response, err := client.httpClient.Do(request) |
||||
if err != nil { |
||||
return nil, fmt.Errorf("sending http request to list access tokens: %w", err) |
||||
} |
||||
defer func() { |
||||
if err := response.Body.Close(); err != nil { |
||||
client.log.Error("closing http response body", "err", err.Error()) |
||||
} |
||||
}() |
||||
|
||||
if response.StatusCode != http.StatusOK { |
||||
body, _ := io.ReadAll(response.Body) |
||||
return nil, fmt.Errorf("unexpected response when fetching access tokens: code=%d body=%s", response.StatusCode, body) |
||||
} |
||||
|
||||
var body listTokensResponse |
||||
if err := json.NewDecoder(response.Body).Decode(&body); err != nil { |
||||
return nil, fmt.Errorf("unmarshaling response body: %w", err) |
||||
} |
||||
return body.Data, nil |
||||
} |
||||
|
||||
func (client *AuthApiClient) CreateToken(ctx context.Context, params CreateTokenParams, payload CreateTokenPayload) (Token, error) { |
||||
endpoint, err := url.JoinPath(client.cfg.ApiURL, "/v1/tokens") |
||||
if err != nil { |
||||
return Token{}, fmt.Errorf("building authapi tokens url: %w", err) |
||||
} |
||||
|
||||
body, err := json.Marshal(&payload) |
||||
if err != nil { |
||||
return Token{}, fmt.Errorf("marshaling request body: %w", err) |
||||
} |
||||
|
||||
request, err := http.NewRequestWithContext(ctx, http.MethodPost, endpoint, bytes.NewReader(body)) |
||||
if err != nil { |
||||
return Token{}, fmt.Errorf("creating http request: %w", err) |
||||
} |
||||
|
||||
request.Header.Set("x-request-id", params.RequestID) |
||||
request.Header.Set("Content-Type", "application/json") |
||||
|
||||
request.Header.Set("Authorization", fmt.Sprintf("Bearer %s", client.cfg.Token)) |
||||
|
||||
response, err := client.httpClient.Do(request) |
||||
if err != nil { |
||||
return Token{}, fmt.Errorf("sending http request to create access token: %w", err) |
||||
} |
||||
defer func() { |
||||
if err := response.Body.Close(); err != nil { |
||||
client.log.Error("closing http response body", "err", err.Error()) |
||||
} |
||||
}() |
||||
|
||||
if response.StatusCode != http.StatusOK { |
||||
body, _ := io.ReadAll(response.Body) |
||||
return Token{}, fmt.Errorf("unexpected response when creating access token: code=%d body=%s", response.StatusCode, body) |
||||
} |
||||
|
||||
var ctResp createTokenResponse |
||||
if err := json.NewDecoder(response.Body).Decode(&ctResp); err != nil { |
||||
return Token{}, fmt.Errorf("unmarshaling response body: %w", err) |
||||
} |
||||
|
||||
return ctResp.Data, nil |
||||
} |
||||
|
||||
func (client *AuthApiClient) DeleteToken(ctx context.Context, params DeleteTokenParams) error { |
||||
endpoint, err := url.JoinPath(client.cfg.ApiURL, "/v1/tokens", params.TokenID) |
||||
if err != nil { |
||||
return fmt.Errorf("building authapi tokens url: %w", err) |
||||
} |
||||
|
||||
request, err := http.NewRequestWithContext(ctx, http.MethodDelete, endpoint, nil) |
||||
if err != nil { |
||||
return fmt.Errorf("creating http request: %w", err) |
||||
} |
||||
|
||||
request.Header.Set("x-request-id", params.RequestID) |
||||
request.Header.Set("Authorization", fmt.Sprintf("Bearer %s", client.cfg.Token)) |
||||
|
||||
response, err := client.httpClient.Do(request) |
||||
if err != nil { |
||||
return fmt.Errorf("sending http request to delete access token: %w", err) |
||||
} |
||||
defer func() { |
||||
if err := response.Body.Close(); err != nil { |
||||
client.log.Error("closing http response body", "err", err.Error()) |
||||
} |
||||
}() |
||||
|
||||
if response.StatusCode == http.StatusNotFound { |
||||
return fmt.Errorf("token id: %s %w", params.TokenID, ErrTokenNotFound) |
||||
} |
||||
|
||||
if response.StatusCode != http.StatusOK && response.StatusCode != http.StatusNoContent { |
||||
body, _ := io.ReadAll(response.Body) |
||||
return fmt.Errorf("unexpected response when deleting access token: code=%d body=%s", response.StatusCode, body) |
||||
} |
||||
|
||||
return nil |
||||
} |
@ -0,0 +1,69 @@ |
||||
package fake |
||||
|
||||
import ( |
||||
"context" |
||||
"fmt" |
||||
|
||||
"github.com/grafana/grafana/pkg/services/authapi" |
||||
"github.com/grafana/grafana/pkg/util" |
||||
) |
||||
|
||||
var _ authapi.Service = (*AuthapiStub)(nil) |
||||
|
||||
type AuthapiStub struct { |
||||
// The cloud migration token created by this stub.
|
||||
Token *authapi.TokenView |
||||
Policies map[string]authapi.AccessPolicy |
||||
} |
||||
|
||||
func (client *AuthapiStub) CreateAccessPolicy(_ context.Context, _ authapi.CreateAccessPolicyParams, _ authapi.CreateAccessPolicyPayload) (authapi.AccessPolicy, error) { |
||||
randStr := fmt.Sprintf("random-policy-%s", util.GenerateShortUID()) |
||||
policy := authapi.AccessPolicy{ |
||||
ID: randStr, |
||||
Name: randStr, |
||||
} |
||||
client.Policies[policy.ID] = policy |
||||
return policy, nil |
||||
} |
||||
|
||||
func (client *AuthapiStub) DeleteAccessPolicy(_ context.Context, params authapi.DeleteAccessPolicyParams) (bool, error) { |
||||
delete(client.Policies, params.AccessPolicyID) |
||||
return true, nil |
||||
} |
||||
|
||||
func (client *AuthapiStub) ListAccessPolicies(_ context.Context, _ authapi.ListAccessPoliciesParams) ([]authapi.AccessPolicy, error) { |
||||
items := make([]authapi.AccessPolicy, 0) |
||||
for _, v := range client.Policies { |
||||
items = append(items, v) |
||||
} |
||||
return items, nil |
||||
} |
||||
|
||||
func (client *AuthapiStub) ListTokens(_ context.Context, _ authapi.ListTokenParams) ([]authapi.TokenView, error) { |
||||
if client.Token == nil { |
||||
return []authapi.TokenView{}, nil |
||||
} |
||||
|
||||
return []authapi.TokenView{*client.Token}, nil |
||||
} |
||||
|
||||
func (client *AuthapiStub) CreateToken(_ context.Context, _ authapi.CreateTokenParams, payload authapi.CreateTokenPayload) (authapi.Token, error) { |
||||
token := authapi.Token{ |
||||
ID: fmt.Sprintf("random-token-%s", util.GenerateShortUID()), |
||||
Name: payload.Name, |
||||
AccessPolicyID: payload.AccessPolicyID, |
||||
Token: fmt.Sprintf("completely_fake_token_%s", util.GenerateShortUID()), |
||||
} |
||||
client.Token = &authapi.TokenView{ |
||||
ID: token.ID, |
||||
Name: token.Name, |
||||
AccessPolicyID: token.AccessPolicyID, |
||||
DisplayName: token.Name, |
||||
} |
||||
return token, nil |
||||
} |
||||
|
||||
func (client *AuthapiStub) DeleteToken(_ context.Context, _ authapi.DeleteTokenParams) error { |
||||
client.Token = nil |
||||
return nil |
||||
} |
|
@ -0,0 +1,289 @@ |
||||
package gcom |
||||
|
||||
import ( |
||||
"bytes" |
||||
"context" |
||||
"encoding/json" |
||||
"fmt" |
||||
"io" |
||||
"net/http" |
||||
"net/url" |
||||
|
||||
"github.com/grafana/grafana/pkg/services/authapi" |
||||
) |
||||
|
||||
// this will be removed when service in authapi is fully enabled
|
||||
|
||||
type listTokensResponse struct { |
||||
Items []authapi.TokenView `json:"items"` |
||||
} |
||||
|
||||
type listAccessPoliciesResponse struct { |
||||
Items []authapi.AccessPolicy `json:"items"` |
||||
} |
||||
|
||||
var _ authapi.Service = (*GcomClient)(nil) |
||||
|
||||
func (client *GcomClient) CreateAccessPolicy(ctx context.Context, params authapi.CreateAccessPolicyParams, payload authapi.CreateAccessPolicyPayload) (authapi.AccessPolicy, error) { |
||||
endpoint, err := url.JoinPath(client.cfg.ApiURL, "/v1/accesspolicies") |
||||
if err != nil { |
||||
return authapi.AccessPolicy{}, fmt.Errorf("building gcom access policy url: %w", err) |
||||
} |
||||
|
||||
body, err := json.Marshal(&payload) |
||||
if err != nil { |
||||
return authapi.AccessPolicy{}, fmt.Errorf("marshaling request body: %w", err) |
||||
} |
||||
|
||||
request, err := http.NewRequestWithContext(ctx, http.MethodPost, endpoint, bytes.NewReader(body)) |
||||
if err != nil { |
||||
return authapi.AccessPolicy{}, fmt.Errorf("creating http request: %w", err) |
||||
} |
||||
|
||||
query := url.Values{} |
||||
query.Set("region", params.Region) |
||||
|
||||
request.URL.RawQuery = query.Encode() |
||||
request.Header.Set("x-request-id", params.RequestID) |
||||
request.Header.Set("Content-Type", "application/json") |
||||
|
||||
request.Header.Set("Authorization", fmt.Sprintf("Bearer %s", client.cfg.Token)) |
||||
|
||||
response, err := client.httpClient.Do(request) |
||||
if err != nil { |
||||
return authapi.AccessPolicy{}, fmt.Errorf("sending http request to create access policy: %w", err) |
||||
} |
||||
defer func() { |
||||
if err := response.Body.Close(); err != nil { |
||||
client.log.Error("closing http response body", "err", err.Error()) |
||||
} |
||||
}() |
||||
|
||||
if response.StatusCode != http.StatusOK { |
||||
body, _ := io.ReadAll(response.Body) |
||||
return authapi.AccessPolicy{}, fmt.Errorf("unexpected response when creating access policy: code=%d body=%s", response.StatusCode, body) |
||||
} |
||||
|
||||
var accessPolicy authapi.AccessPolicy |
||||
if err := json.NewDecoder(response.Body).Decode(&accessPolicy); err != nil { |
||||
return accessPolicy, fmt.Errorf("unmarshaling response body: %w", err) |
||||
} |
||||
|
||||
return accessPolicy, nil |
||||
} |
||||
|
||||
func (client *GcomClient) DeleteAccessPolicy(ctx context.Context, params authapi.DeleteAccessPolicyParams) (bool, error) { |
||||
endpoint, err := url.JoinPath(client.cfg.ApiURL, "/v1/accesspolicies/", params.AccessPolicyID) |
||||
if err != nil { |
||||
return false, fmt.Errorf("building gcom access policy url: %w", err) |
||||
} |
||||
|
||||
request, err := http.NewRequestWithContext(ctx, http.MethodDelete, endpoint, nil) |
||||
if err != nil { |
||||
return false, fmt.Errorf("creating http request: %w", err) |
||||
} |
||||
|
||||
query := url.Values{} |
||||
query.Set("region", params.Region) |
||||
|
||||
request.URL.RawQuery = query.Encode() |
||||
request.Header.Set("x-request-id", params.RequestID) |
||||
request.Header.Set("Authorization", fmt.Sprintf("Bearer %s", client.cfg.Token)) |
||||
|
||||
response, err := client.httpClient.Do(request) |
||||
if err != nil { |
||||
return false, fmt.Errorf("sending http request to create access policy: %w", err) |
||||
} |
||||
defer func() { |
||||
if err := response.Body.Close(); err != nil { |
||||
client.log.Error("closing http response body", "err", err.Error()) |
||||
} |
||||
}() |
||||
|
||||
if response.StatusCode == http.StatusNotFound { |
||||
return false, nil |
||||
} |
||||
|
||||
if response.StatusCode == http.StatusOK || response.StatusCode == http.StatusNoContent { |
||||
return true, nil |
||||
} |
||||
|
||||
body, _ := io.ReadAll(response.Body) |
||||
return false, fmt.Errorf("unexpected response when deleting access policy: code=%d body=%s", response.StatusCode, body) |
||||
} |
||||
|
||||
func (client *GcomClient) ListAccessPolicies(ctx context.Context, params authapi.ListAccessPoliciesParams) ([]authapi.AccessPolicy, error) { |
||||
endpoint, err := url.JoinPath(client.cfg.ApiURL, "/v1/accesspolicies") |
||||
if err != nil { |
||||
return nil, fmt.Errorf("building gcom access policy url: %w", err) |
||||
} |
||||
|
||||
request, err := http.NewRequestWithContext(ctx, http.MethodGet, endpoint, nil) |
||||
if err != nil { |
||||
return nil, fmt.Errorf("creating http request: %w", err) |
||||
} |
||||
|
||||
query := url.Values{} |
||||
query.Set("region", params.Region) |
||||
query.Set("name", params.Name) |
||||
request.URL.RawQuery = query.Encode() |
||||
request.Header.Set("x-request-id", params.RequestID) |
||||
request.Header.Set("Accept", "application/json") |
||||
|
||||
request.Header.Set("Authorization", fmt.Sprintf("Bearer %s", client.cfg.Token)) |
||||
|
||||
response, err := client.httpClient.Do(request) |
||||
if err != nil { |
||||
return nil, fmt.Errorf("sending http request to create access policy: %w", err) |
||||
} |
||||
defer func() { |
||||
if err := response.Body.Close(); err != nil { |
||||
client.log.Error("closing http response body", "err", err.Error()) |
||||
} |
||||
}() |
||||
|
||||
if response.StatusCode != http.StatusOK { |
||||
body, _ := io.ReadAll(response.Body) |
||||
return nil, fmt.Errorf("unexpected response when listing access policies: code=%d body=%s", response.StatusCode, body) |
||||
} |
||||
|
||||
var responseBody listAccessPoliciesResponse |
||||
if err := json.NewDecoder(response.Body).Decode(&responseBody); err != nil { |
||||
return responseBody.Items, fmt.Errorf("unmarshaling response body: %w", err) |
||||
} |
||||
|
||||
return responseBody.Items, nil |
||||
} |
||||
|
||||
func (client *GcomClient) ListTokens(ctx context.Context, params authapi.ListTokenParams) ([]authapi.TokenView, error) { |
||||
endpoint, err := url.JoinPath(client.cfg.ApiURL, "/v1/tokens") |
||||
if err != nil { |
||||
return nil, fmt.Errorf("building gcom tokens url: %w", err) |
||||
} |
||||
|
||||
request, err := http.NewRequestWithContext(ctx, http.MethodGet, endpoint, nil) |
||||
if err != nil { |
||||
return nil, fmt.Errorf("creating http request: %w", err) |
||||
} |
||||
|
||||
query := url.Values{} |
||||
query.Set("region", params.Region) |
||||
query.Set("accessPolicyName", params.AccessPolicyName) |
||||
query.Set("name", params.TokenName) |
||||
|
||||
request.URL.RawQuery = query.Encode() |
||||
request.Header.Set("x-request-id", params.RequestID) |
||||
request.Header.Set("Content-Type", "application/json") |
||||
|
||||
request.Header.Set("Authorization", fmt.Sprintf("Bearer %s", client.cfg.Token)) |
||||
|
||||
response, err := client.httpClient.Do(request) |
||||
if err != nil { |
||||
return nil, fmt.Errorf("sending http request to list access tokens: %w", err) |
||||
} |
||||
defer func() { |
||||
if err := response.Body.Close(); err != nil { |
||||
client.log.Error("closing http response body", "err", err.Error()) |
||||
} |
||||
}() |
||||
|
||||
if response.StatusCode != http.StatusOK { |
||||
body, _ := io.ReadAll(response.Body) |
||||
return nil, fmt.Errorf("unexpected response when fetching access tokens: code=%d body=%s", response.StatusCode, body) |
||||
} |
||||
|
||||
var body listTokensResponse |
||||
if err := json.NewDecoder(response.Body).Decode(&body); err != nil { |
||||
return nil, fmt.Errorf("unmarshaling response body: %w", err) |
||||
} |
||||
|
||||
return body.Items, nil |
||||
} |
||||
|
||||
func (client *GcomClient) CreateToken(ctx context.Context, params authapi.CreateTokenParams, payload authapi.CreateTokenPayload) (authapi.Token, error) { |
||||
endpoint, err := url.JoinPath(client.cfg.ApiURL, "/v1/tokens") |
||||
if err != nil { |
||||
return authapi.Token{}, fmt.Errorf("building gcom tokens url: %w", err) |
||||
} |
||||
|
||||
body, err := json.Marshal(&payload) |
||||
if err != nil { |
||||
return authapi.Token{}, fmt.Errorf("marshaling request body: %w", err) |
||||
} |
||||
|
||||
request, err := http.NewRequestWithContext(ctx, http.MethodPost, endpoint, bytes.NewReader(body)) |
||||
if err != nil { |
||||
return authapi.Token{}, fmt.Errorf("creating http request: %w", err) |
||||
} |
||||
|
||||
query := url.Values{} |
||||
query.Set("region", params.Region) |
||||
|
||||
request.URL.RawQuery = query.Encode() |
||||
request.Header.Set("x-request-id", params.RequestID) |
||||
request.Header.Set("Content-Type", "application/json") |
||||
|
||||
request.Header.Set("Authorization", fmt.Sprintf("Bearer %s", client.cfg.Token)) |
||||
|
||||
response, err := client.httpClient.Do(request) |
||||
if err != nil { |
||||
return authapi.Token{}, fmt.Errorf("sending http request to create access token: %w", err) |
||||
} |
||||
defer func() { |
||||
if err := response.Body.Close(); err != nil { |
||||
client.log.Error("closing http response body", "err", err.Error()) |
||||
} |
||||
}() |
||||
|
||||
if response.StatusCode != http.StatusOK { |
||||
body, _ := io.ReadAll(response.Body) |
||||
return authapi.Token{}, fmt.Errorf("unexpected response when creating access token: code=%d body=%s", response.StatusCode, body) |
||||
} |
||||
|
||||
var token authapi.Token |
||||
if err := json.NewDecoder(response.Body).Decode(&token); err != nil { |
||||
return token, fmt.Errorf("unmarshaling response body: %w", err) |
||||
} |
||||
|
||||
return token, nil |
||||
} |
||||
|
||||
func (client *GcomClient) DeleteToken(ctx context.Context, params authapi.DeleteTokenParams) error { |
||||
endpoint, err := url.JoinPath(client.cfg.ApiURL, "/v1/tokens", params.TokenID) |
||||
if err != nil { |
||||
return fmt.Errorf("building gcom tokens url: %w", err) |
||||
} |
||||
|
||||
request, err := http.NewRequestWithContext(ctx, http.MethodDelete, endpoint, nil) |
||||
if err != nil { |
||||
return fmt.Errorf("creating http request: %w", err) |
||||
} |
||||
|
||||
query := url.Values{} |
||||
query.Set("region", params.Region) |
||||
|
||||
request.URL.RawQuery = query.Encode() |
||||
request.Header.Set("x-request-id", params.RequestID) |
||||
request.Header.Set("Authorization", fmt.Sprintf("Bearer %s", client.cfg.Token)) |
||||
|
||||
response, err := client.httpClient.Do(request) |
||||
if err != nil { |
||||
return fmt.Errorf("sending http request to delete access token: %w", err) |
||||
} |
||||
defer func() { |
||||
if err := response.Body.Close(); err != nil { |
||||
client.log.Error("closing http response body", "err", err.Error()) |
||||
} |
||||
}() |
||||
|
||||
if response.StatusCode == http.StatusNotFound { |
||||
return fmt.Errorf("token id: %s %w", params.TokenID, ErrTokenNotFound) |
||||
} |
||||
|
||||
if response.StatusCode != http.StatusOK && response.StatusCode != http.StatusNoContent { |
||||
body, _ := io.ReadAll(response.Body) |
||||
return fmt.Errorf("unexpected response when deleting access token: code=%d body=%s", response.StatusCode, body) |
||||
} |
||||
|
||||
return nil |
||||
} |
Loading…
Reference in new issue