2020-02-23 22:07:46 +01:00
|
|
|
package api
|
|
|
|
|
2020-09-19 01:27:55 +02:00
|
|
|
//go:generate go run github.com/99designs/gqlgen
|
|
|
|
|
2020-02-23 22:07:46 +01:00
|
|
|
import (
|
|
|
|
"context"
|
2021-04-25 16:23:53 +02:00
|
|
|
"errors"
|
2020-02-23 22:07:46 +01:00
|
|
|
"fmt"
|
2022-02-22 14:10:39 +01:00
|
|
|
"net/http"
|
2020-10-29 20:54:17 +01:00
|
|
|
"regexp"
|
2020-10-05 18:34:41 +02:00
|
|
|
"strings"
|
2020-02-23 22:07:46 +01:00
|
|
|
|
2020-10-11 17:09:39 +02:00
|
|
|
"github.com/99designs/gqlgen/graphql"
|
2022-01-21 11:45:54 +01:00
|
|
|
"github.com/oklog/ulid"
|
2021-04-25 16:23:53 +02:00
|
|
|
"github.com/vektah/gqlparser/v2/gqlerror"
|
|
|
|
|
2020-10-11 17:09:39 +02:00
|
|
|
"github.com/dstotijn/hetty/pkg/proj"
|
2020-09-22 18:33:02 +02:00
|
|
|
"github.com/dstotijn/hetty/pkg/reqlog"
|
2020-10-29 20:54:17 +01:00
|
|
|
"github.com/dstotijn/hetty/pkg/scope"
|
2020-12-21 12:50:09 +01:00
|
|
|
"github.com/dstotijn/hetty/pkg/search"
|
2022-02-22 14:10:39 +01:00
|
|
|
"github.com/dstotijn/hetty/pkg/sender"
|
2020-02-23 22:07:46 +01:00
|
|
|
)
|
|
|
|
|
2022-02-22 14:10:39 +01:00
|
|
|
var httpProtocolMap = map[string]HTTPProtocol{
|
|
|
|
sender.HTTPProto1: HTTPProtocolHTTP1,
|
|
|
|
sender.HTTPProto2: HTTPProtocolHTTP2,
|
|
|
|
}
|
|
|
|
|
|
|
|
var revHTTPProtocolMap = map[HTTPProtocol]string{
|
|
|
|
HTTPProtocolHTTP1: sender.HTTPProto1,
|
|
|
|
HTTPProtocolHTTP2: sender.HTTPProto2,
|
|
|
|
}
|
|
|
|
|
2020-02-23 22:07:46 +01:00
|
|
|
type Resolver struct {
|
2022-01-01 16:11:49 +01:00
|
|
|
ProjectService proj.Service
|
2022-02-22 14:10:39 +01:00
|
|
|
RequestLogService reqlog.Service
|
|
|
|
SenderService sender.Service
|
2020-02-23 22:07:46 +01:00
|
|
|
}
|
|
|
|
|
2021-04-25 16:23:53 +02:00
|
|
|
type (
|
|
|
|
queryResolver struct{ *Resolver }
|
|
|
|
mutationResolver struct{ *Resolver }
|
|
|
|
)
|
2020-02-23 22:07:46 +01:00
|
|
|
|
2020-10-11 17:09:39 +02:00
|
|
|
func (r *Resolver) Query() QueryResolver { return &queryResolver{r} }
|
|
|
|
func (r *Resolver) Mutation() MutationResolver { return &mutationResolver{r} }
|
2020-02-23 22:07:46 +01:00
|
|
|
|
2020-09-20 22:30:17 +02:00
|
|
|
func (r *queryResolver) HTTPRequestLogs(ctx context.Context) ([]HTTPRequestLog, error) {
|
2020-10-29 20:54:17 +01:00
|
|
|
reqs, err := r.RequestLogService.FindRequests(ctx)
|
2021-04-25 16:23:53 +02:00
|
|
|
if errors.Is(err, proj.ErrNoProject) {
|
2020-12-29 20:46:42 +01:00
|
|
|
return nil, noActiveProjectErr(ctx)
|
2021-04-25 16:23:53 +02:00
|
|
|
} else if err != nil {
|
|
|
|
return nil, fmt.Errorf("could not query repository for requests: %w", err)
|
2020-10-11 17:09:39 +02:00
|
|
|
}
|
2021-04-25 16:23:53 +02:00
|
|
|
|
2020-09-20 22:30:17 +02:00
|
|
|
logs := make([]HTTPRequestLog, len(reqs))
|
2020-02-23 22:07:46 +01:00
|
|
|
|
2020-09-20 22:30:17 +02:00
|
|
|
for i, req := range reqs {
|
|
|
|
req, err := parseRequestLog(req)
|
|
|
|
if err != nil {
|
|
|
|
return nil, err
|
2020-02-23 22:07:46 +01:00
|
|
|
}
|
2021-04-25 16:23:53 +02:00
|
|
|
|
2020-09-20 22:30:17 +02:00
|
|
|
logs[i] = req
|
|
|
|
}
|
2020-09-19 01:27:55 +02:00
|
|
|
|
2020-09-20 22:30:17 +02:00
|
|
|
return logs, nil
|
|
|
|
}
|
2020-09-19 01:27:55 +02:00
|
|
|
|
2022-02-22 14:10:39 +01:00
|
|
|
func (r *queryResolver) HTTPRequestLog(ctx context.Context, id ulid.ULID) (*HTTPRequestLog, error) {
|
|
|
|
log, err := r.RequestLogService.FindRequestLogByID(ctx, id)
|
2021-04-25 16:23:53 +02:00
|
|
|
if errors.Is(err, reqlog.ErrRequestNotFound) {
|
2020-09-20 22:30:17 +02:00
|
|
|
return nil, nil
|
2021-04-25 16:23:53 +02:00
|
|
|
} else if err != nil {
|
|
|
|
return nil, fmt.Errorf("could not get request by ID: %w", err)
|
2020-09-20 22:30:17 +02:00
|
|
|
}
|
2021-04-25 16:23:53 +02:00
|
|
|
|
2020-09-20 22:30:17 +02:00
|
|
|
req, err := parseRequestLog(log)
|
|
|
|
if err != nil {
|
|
|
|
return nil, err
|
|
|
|
}
|
|
|
|
|
|
|
|
return &req, nil
|
|
|
|
}
|
|
|
|
|
2022-01-21 11:45:54 +01:00
|
|
|
func parseRequestLog(reqLog reqlog.RequestLog) (HTTPRequestLog, error) {
|
|
|
|
method := HTTPMethod(reqLog.Method)
|
2020-10-05 18:34:41 +02:00
|
|
|
if method != "" && !method.IsValid() {
|
2020-09-20 22:30:17 +02:00
|
|
|
return HTTPRequestLog{}, fmt.Errorf("request has invalid method: %v", method)
|
|
|
|
}
|
|
|
|
|
|
|
|
log := HTTPRequestLog{
|
2022-02-22 14:10:39 +01:00
|
|
|
ID: reqLog.ID,
|
2022-01-21 11:45:54 +01:00
|
|
|
Proto: reqLog.Proto,
|
2020-09-20 22:30:17 +02:00
|
|
|
Method: method,
|
2022-01-21 11:45:54 +01:00
|
|
|
Timestamp: ulid.Time(reqLog.ID.Time()),
|
2020-09-20 22:30:17 +02:00
|
|
|
}
|
|
|
|
|
2022-01-21 11:45:54 +01:00
|
|
|
if reqLog.URL != nil {
|
|
|
|
log.URL = reqLog.URL.String()
|
2020-10-05 18:34:41 +02:00
|
|
|
}
|
|
|
|
|
2022-01-21 11:45:54 +01:00
|
|
|
if len(reqLog.Body) > 0 {
|
|
|
|
bodyStr := string(reqLog.Body)
|
|
|
|
log.Body = &bodyStr
|
2020-09-20 22:30:17 +02:00
|
|
|
}
|
2020-09-19 01:27:55 +02:00
|
|
|
|
2022-01-21 11:45:54 +01:00
|
|
|
if reqLog.Header != nil {
|
2020-09-24 00:13:14 +02:00
|
|
|
log.Headers = make([]HTTPHeader, 0)
|
2021-04-25 16:23:53 +02:00
|
|
|
|
2022-01-21 11:45:54 +01:00
|
|
|
for key, values := range reqLog.Header {
|
2020-09-24 00:13:14 +02:00
|
|
|
for _, value := range values {
|
|
|
|
log.Headers = append(log.Headers, HTTPHeader{
|
|
|
|
Key: key,
|
|
|
|
Value: value,
|
|
|
|
})
|
|
|
|
}
|
|
|
|
}
|
|
|
|
}
|
|
|
|
|
2022-01-21 11:45:54 +01:00
|
|
|
if reqLog.Response != nil {
|
2022-02-22 14:10:39 +01:00
|
|
|
resLog, err := parseResponseLog(*reqLog.Response)
|
|
|
|
if err != nil {
|
|
|
|
return HTTPRequestLog{}, err
|
2020-09-20 22:30:17 +02:00
|
|
|
}
|
2021-04-25 16:23:53 +02:00
|
|
|
|
2022-02-22 14:10:39 +01:00
|
|
|
resLog.ID = reqLog.ID
|
2021-04-25 16:23:53 +02:00
|
|
|
|
2022-02-22 14:10:39 +01:00
|
|
|
log.Response = &resLog
|
|
|
|
}
|
|
|
|
|
|
|
|
return log, nil
|
|
|
|
}
|
|
|
|
|
|
|
|
func parseResponseLog(resLog reqlog.ResponseLog) (HTTPResponseLog, error) {
|
|
|
|
proto := httpProtocolMap[resLog.Proto]
|
|
|
|
if !proto.IsValid() {
|
|
|
|
return HTTPResponseLog{}, fmt.Errorf("sender response has invalid protocol: %v", resLog.Proto)
|
|
|
|
}
|
|
|
|
|
|
|
|
httpResLog := HTTPResponseLog{
|
|
|
|
Proto: proto,
|
|
|
|
StatusCode: resLog.StatusCode,
|
|
|
|
}
|
|
|
|
statusReasonSubs := strings.SplitN(resLog.Status, " ", 2)
|
|
|
|
|
|
|
|
if len(statusReasonSubs) == 2 {
|
|
|
|
httpResLog.StatusReason = statusReasonSubs[1]
|
|
|
|
}
|
|
|
|
|
|
|
|
if len(resLog.Body) > 0 {
|
|
|
|
bodyStr := string(resLog.Body)
|
|
|
|
httpResLog.Body = &bodyStr
|
|
|
|
}
|
2021-04-25 16:23:53 +02:00
|
|
|
|
2022-02-22 14:10:39 +01:00
|
|
|
if resLog.Header != nil {
|
|
|
|
httpResLog.Headers = make([]HTTPHeader, 0)
|
2021-04-25 16:23:53 +02:00
|
|
|
|
2022-02-22 14:10:39 +01:00
|
|
|
for key, values := range resLog.Header {
|
|
|
|
for _, value := range values {
|
|
|
|
httpResLog.Headers = append(httpResLog.Headers, HTTPHeader{
|
|
|
|
Key: key,
|
|
|
|
Value: value,
|
|
|
|
})
|
2020-09-24 00:13:14 +02:00
|
|
|
}
|
|
|
|
}
|
2020-02-23 22:07:46 +01:00
|
|
|
}
|
|
|
|
|
2022-02-22 14:10:39 +01:00
|
|
|
return httpResLog, nil
|
2020-02-23 22:07:46 +01:00
|
|
|
}
|
2020-10-11 17:09:39 +02:00
|
|
|
|
2022-01-21 11:45:54 +01:00
|
|
|
func (r *mutationResolver) CreateProject(ctx context.Context, name string) (*Project, error) {
|
|
|
|
p, err := r.ProjectService.CreateProject(ctx, name)
|
2021-04-25 16:23:53 +02:00
|
|
|
if errors.Is(err, proj.ErrInvalidName) {
|
2020-10-11 17:09:39 +02:00
|
|
|
return nil, gqlerror.Errorf("Project name must only contain alphanumeric or space chars.")
|
2021-04-25 16:23:53 +02:00
|
|
|
} else if err != nil {
|
|
|
|
return nil, fmt.Errorf("could not open project: %w", err)
|
2020-10-11 17:09:39 +02:00
|
|
|
}
|
2021-04-25 16:23:53 +02:00
|
|
|
|
2020-10-11 17:09:39 +02:00
|
|
|
return &Project{
|
2022-02-22 14:10:39 +01:00
|
|
|
ID: p.ID,
|
2020-10-11 17:09:39 +02:00
|
|
|
Name: p.Name,
|
2022-01-21 11:45:54 +01:00
|
|
|
IsActive: r.ProjectService.IsProjectActive(p.ID),
|
|
|
|
}, nil
|
|
|
|
}
|
|
|
|
|
2022-02-22 14:10:39 +01:00
|
|
|
func (r *mutationResolver) OpenProject(ctx context.Context, id ulid.ULID) (*Project, error) {
|
|
|
|
p, err := r.ProjectService.OpenProject(ctx, id)
|
2022-01-21 11:45:54 +01:00
|
|
|
if errors.Is(err, proj.ErrInvalidName) {
|
|
|
|
return nil, gqlerror.Errorf("Project name must only contain alphanumeric or space chars.")
|
|
|
|
} else if err != nil {
|
|
|
|
return nil, fmt.Errorf("could not open project: %w", err)
|
|
|
|
}
|
|
|
|
|
|
|
|
return &Project{
|
2022-02-22 14:10:39 +01:00
|
|
|
ID: p.ID,
|
2022-01-21 11:45:54 +01:00
|
|
|
Name: p.Name,
|
|
|
|
IsActive: r.ProjectService.IsProjectActive(p.ID),
|
2020-10-11 17:09:39 +02:00
|
|
|
}, nil
|
|
|
|
}
|
|
|
|
|
|
|
|
func (r *queryResolver) ActiveProject(ctx context.Context) (*Project, error) {
|
2022-01-21 11:45:54 +01:00
|
|
|
p, err := r.ProjectService.ActiveProject(ctx)
|
2021-04-25 16:23:53 +02:00
|
|
|
if errors.Is(err, proj.ErrNoProject) {
|
2020-10-11 17:09:39 +02:00
|
|
|
return nil, nil
|
2021-04-25 16:23:53 +02:00
|
|
|
} else if err != nil {
|
|
|
|
return nil, fmt.Errorf("could not open project: %w", err)
|
2020-10-11 17:09:39 +02:00
|
|
|
}
|
|
|
|
|
|
|
|
return &Project{
|
2022-02-22 14:10:39 +01:00
|
|
|
ID: p.ID,
|
2020-10-11 17:09:39 +02:00
|
|
|
Name: p.Name,
|
2022-01-21 11:45:54 +01:00
|
|
|
IsActive: r.ProjectService.IsProjectActive(p.ID),
|
2020-10-11 17:09:39 +02:00
|
|
|
}, nil
|
|
|
|
}
|
|
|
|
|
|
|
|
func (r *queryResolver) Projects(ctx context.Context) ([]Project, error) {
|
2022-01-21 11:45:54 +01:00
|
|
|
p, err := r.ProjectService.Projects(ctx)
|
2020-10-11 17:09:39 +02:00
|
|
|
if err != nil {
|
2021-04-25 16:23:53 +02:00
|
|
|
return nil, fmt.Errorf("could not get projects: %w", err)
|
2020-10-11 17:09:39 +02:00
|
|
|
}
|
|
|
|
|
|
|
|
projects := make([]Project, len(p))
|
|
|
|
for i, proj := range p {
|
|
|
|
projects[i] = Project{
|
2022-02-22 14:10:39 +01:00
|
|
|
ID: proj.ID,
|
2020-10-11 17:09:39 +02:00
|
|
|
Name: proj.Name,
|
2022-01-21 11:45:54 +01:00
|
|
|
IsActive: r.ProjectService.IsProjectActive(proj.ID),
|
2020-10-11 17:09:39 +02:00
|
|
|
}
|
|
|
|
}
|
|
|
|
|
|
|
|
return projects, nil
|
|
|
|
}
|
|
|
|
|
2020-10-29 20:54:17 +01:00
|
|
|
func (r *queryResolver) Scope(ctx context.Context) ([]ScopeRule, error) {
|
2022-01-21 11:45:54 +01:00
|
|
|
rules := r.ProjectService.Scope().Rules()
|
2020-10-29 20:54:17 +01:00
|
|
|
return scopeToScopeRules(rules), nil
|
|
|
|
}
|
|
|
|
|
|
|
|
func regexpToStringPtr(r *regexp.Regexp) *string {
|
|
|
|
if r == nil {
|
|
|
|
return nil
|
|
|
|
}
|
2021-04-25 16:23:53 +02:00
|
|
|
|
2020-10-29 20:54:17 +01:00
|
|
|
s := r.String()
|
2021-04-25 16:23:53 +02:00
|
|
|
|
2020-10-29 20:54:17 +01:00
|
|
|
return &s
|
|
|
|
}
|
|
|
|
|
2020-10-11 17:09:39 +02:00
|
|
|
func (r *mutationResolver) CloseProject(ctx context.Context) (*CloseProjectResult, error) {
|
2022-01-21 11:45:54 +01:00
|
|
|
if err := r.ProjectService.CloseProject(); err != nil {
|
2021-04-25 16:23:53 +02:00
|
|
|
return nil, fmt.Errorf("could not close project: %w", err)
|
2020-10-11 17:09:39 +02:00
|
|
|
}
|
2021-04-25 16:23:53 +02:00
|
|
|
|
2020-10-11 17:09:39 +02:00
|
|
|
return &CloseProjectResult{true}, nil
|
|
|
|
}
|
|
|
|
|
2022-02-22 14:10:39 +01:00
|
|
|
func (r *mutationResolver) DeleteProject(ctx context.Context, id ulid.ULID) (*DeleteProjectResult, error) {
|
|
|
|
if err := r.ProjectService.DeleteProject(ctx, id); err != nil {
|
2021-04-25 16:23:53 +02:00
|
|
|
return nil, fmt.Errorf("could not delete project: %w", err)
|
2020-10-11 17:09:39 +02:00
|
|
|
}
|
2021-04-25 16:23:53 +02:00
|
|
|
|
2020-10-11 17:09:39 +02:00
|
|
|
return &DeleteProjectResult{
|
|
|
|
Success: true,
|
|
|
|
}, nil
|
|
|
|
}
|
2020-10-29 20:54:17 +01:00
|
|
|
|
2020-11-28 15:48:19 +01:00
|
|
|
func (r *mutationResolver) ClearHTTPRequestLog(ctx context.Context) (*ClearHTTPRequestLogResult, error) {
|
2022-01-21 11:45:54 +01:00
|
|
|
project, err := r.ProjectService.ActiveProject(ctx)
|
|
|
|
if errors.Is(err, proj.ErrNoProject) {
|
|
|
|
return nil, noActiveProjectErr(ctx)
|
|
|
|
} else if err != nil {
|
|
|
|
return nil, fmt.Errorf("could not get active project: %w", err)
|
|
|
|
}
|
|
|
|
|
|
|
|
if err := r.RequestLogService.ClearRequests(ctx, project.ID); err != nil {
|
2021-04-25 16:23:53 +02:00
|
|
|
return nil, fmt.Errorf("could not clear request log: %w", err)
|
2020-11-28 15:48:19 +01:00
|
|
|
}
|
2021-04-25 16:23:53 +02:00
|
|
|
|
2020-11-28 15:48:19 +01:00
|
|
|
return &ClearHTTPRequestLogResult{true}, nil
|
|
|
|
}
|
|
|
|
|
2020-10-29 20:54:17 +01:00
|
|
|
func (r *mutationResolver) SetScope(ctx context.Context, input []ScopeRuleInput) ([]ScopeRule, error) {
|
|
|
|
rules := make([]scope.Rule, len(input))
|
2021-04-25 16:23:53 +02:00
|
|
|
|
2020-10-29 20:54:17 +01:00
|
|
|
for i, rule := range input {
|
|
|
|
u, err := stringPtrToRegexp(rule.URL)
|
|
|
|
if err != nil {
|
2021-04-25 16:23:53 +02:00
|
|
|
return nil, fmt.Errorf("invalid URL in scope rule: %w", err)
|
2020-10-29 20:54:17 +01:00
|
|
|
}
|
2021-04-25 16:23:53 +02:00
|
|
|
|
2020-10-29 20:54:17 +01:00
|
|
|
var headerKey, headerValue *regexp.Regexp
|
2021-04-25 16:23:53 +02:00
|
|
|
|
2020-10-29 20:54:17 +01:00
|
|
|
if rule.Header != nil {
|
|
|
|
headerKey, err = stringPtrToRegexp(rule.Header.Key)
|
|
|
|
if err != nil {
|
2021-04-25 16:23:53 +02:00
|
|
|
return nil, fmt.Errorf("invalid header key in scope rule: %w", err)
|
2020-10-29 20:54:17 +01:00
|
|
|
}
|
2021-04-25 16:23:53 +02:00
|
|
|
|
2020-10-29 20:54:17 +01:00
|
|
|
headerValue, err = stringPtrToRegexp(rule.Header.Key)
|
|
|
|
if err != nil {
|
2021-04-25 16:23:53 +02:00
|
|
|
return nil, fmt.Errorf("invalid header value in scope rule: %w", err)
|
2020-10-29 20:54:17 +01:00
|
|
|
}
|
|
|
|
}
|
2021-04-25 16:23:53 +02:00
|
|
|
|
2020-10-29 20:54:17 +01:00
|
|
|
body, err := stringPtrToRegexp(rule.Body)
|
|
|
|
if err != nil {
|
2021-04-25 16:23:53 +02:00
|
|
|
return nil, fmt.Errorf("invalid body in scope rule: %w", err)
|
2020-10-29 20:54:17 +01:00
|
|
|
}
|
2021-04-25 16:23:53 +02:00
|
|
|
|
2020-10-29 20:54:17 +01:00
|
|
|
rules[i] = scope.Rule{
|
|
|
|
URL: u,
|
|
|
|
Header: scope.Header{
|
|
|
|
Key: headerKey,
|
|
|
|
Value: headerValue,
|
|
|
|
},
|
|
|
|
Body: body,
|
|
|
|
}
|
|
|
|
}
|
|
|
|
|
2022-01-21 11:45:54 +01:00
|
|
|
err := r.ProjectService.SetScopeRules(ctx, rules)
|
|
|
|
if err != nil {
|
|
|
|
return nil, fmt.Errorf("could not set scope rules: %w", err)
|
2020-10-29 20:54:17 +01:00
|
|
|
}
|
|
|
|
|
|
|
|
return scopeToScopeRules(rules), nil
|
|
|
|
}
|
|
|
|
|
|
|
|
func (r *queryResolver) HTTPRequestLogFilter(ctx context.Context) (*HTTPRequestLogFilter, error) {
|
2022-02-22 14:10:39 +01:00
|
|
|
return findReqFilterToHTTPReqLogFilter(r.RequestLogService.FindReqsFilter()), nil
|
2020-10-29 20:54:17 +01:00
|
|
|
}
|
|
|
|
|
|
|
|
func (r *mutationResolver) SetHTTPRequestLogFilter(
|
|
|
|
ctx context.Context,
|
|
|
|
input *HTTPRequestLogFilterInput,
|
|
|
|
) (*HTTPRequestLogFilter, error) {
|
2020-12-21 12:50:09 +01:00
|
|
|
filter, err := findRequestsFilterFromInput(input)
|
|
|
|
if err != nil {
|
2021-04-25 16:23:53 +02:00
|
|
|
return nil, fmt.Errorf("could not parse request log filter: %w", err)
|
2020-12-21 12:50:09 +01:00
|
|
|
}
|
2021-04-25 16:23:53 +02:00
|
|
|
|
2022-01-21 11:45:54 +01:00
|
|
|
err = r.ProjectService.SetRequestLogFindFilter(ctx, filter)
|
2021-04-25 16:23:53 +02:00
|
|
|
if errors.Is(err, proj.ErrNoProject) {
|
2020-12-29 20:46:42 +01:00
|
|
|
return nil, noActiveProjectErr(ctx)
|
2021-04-25 16:23:53 +02:00
|
|
|
} else if err != nil {
|
|
|
|
return nil, fmt.Errorf("could not set request log filter: %w", err)
|
2020-10-29 20:54:17 +01:00
|
|
|
}
|
|
|
|
|
|
|
|
return findReqFilterToHTTPReqLogFilter(filter), nil
|
|
|
|
}
|
|
|
|
|
2022-02-22 14:10:39 +01:00
|
|
|
func (r *queryResolver) SenderRequest(ctx context.Context, id ulid.ULID) (*SenderRequest, error) {
|
|
|
|
senderReq, err := r.SenderService.FindRequestByID(ctx, id)
|
|
|
|
if errors.Is(err, sender.ErrRequestNotFound) {
|
|
|
|
return nil, nil
|
|
|
|
} else if err != nil {
|
|
|
|
return nil, fmt.Errorf("could not get request by ID: %w", err)
|
|
|
|
}
|
|
|
|
|
|
|
|
req, err := parseSenderRequest(senderReq)
|
|
|
|
if err != nil {
|
|
|
|
return nil, err
|
|
|
|
}
|
|
|
|
|
|
|
|
return &req, nil
|
|
|
|
}
|
|
|
|
|
|
|
|
func (r *queryResolver) SenderRequests(ctx context.Context) ([]SenderRequest, error) {
|
|
|
|
reqs, err := r.SenderService.FindRequests(ctx)
|
|
|
|
if errors.Is(err, proj.ErrNoProject) {
|
|
|
|
return nil, noActiveProjectErr(ctx)
|
|
|
|
} else if err != nil {
|
|
|
|
return nil, fmt.Errorf("failed to find sender requests: %w", err)
|
|
|
|
}
|
|
|
|
|
|
|
|
senderReqs := make([]SenderRequest, len(reqs))
|
|
|
|
|
|
|
|
for i, req := range reqs {
|
|
|
|
req, err := parseSenderRequest(req)
|
|
|
|
if err != nil {
|
|
|
|
return nil, err
|
|
|
|
}
|
|
|
|
|
|
|
|
senderReqs[i] = req
|
|
|
|
}
|
|
|
|
|
|
|
|
return senderReqs, nil
|
|
|
|
}
|
|
|
|
|
|
|
|
func (r *mutationResolver) SetSenderRequestFilter(
|
|
|
|
ctx context.Context,
|
|
|
|
input *SenderRequestFilterInput,
|
|
|
|
) (*SenderRequestFilter, error) {
|
|
|
|
filter, err := findSenderRequestsFilterFromInput(input)
|
|
|
|
if err != nil {
|
|
|
|
return nil, fmt.Errorf("could not parse request log filter: %w", err)
|
|
|
|
}
|
|
|
|
|
|
|
|
err = r.ProjectService.SetSenderRequestFindFilter(ctx, filter)
|
|
|
|
if errors.Is(err, proj.ErrNoProject) {
|
|
|
|
return nil, noActiveProjectErr(ctx)
|
|
|
|
} else if err != nil {
|
|
|
|
return nil, fmt.Errorf("could not set request log filter: %w", err)
|
|
|
|
}
|
|
|
|
|
|
|
|
return findReqFilterToSenderReqFilter(filter), nil
|
|
|
|
}
|
|
|
|
|
|
|
|
func (r *mutationResolver) CreateOrUpdateSenderRequest(ctx context.Context, input SenderRequestInput) (*SenderRequest, error) {
|
|
|
|
req := sender.Request{
|
|
|
|
URL: input.URL,
|
|
|
|
Header: make(http.Header),
|
|
|
|
}
|
|
|
|
|
|
|
|
if input.ID != nil {
|
|
|
|
req.ID = *input.ID
|
|
|
|
}
|
|
|
|
|
|
|
|
if input.Method != nil {
|
|
|
|
req.Method = input.Method.String()
|
|
|
|
}
|
|
|
|
|
|
|
|
if input.Proto != nil {
|
|
|
|
req.Proto = revHTTPProtocolMap[*input.Proto]
|
|
|
|
}
|
|
|
|
|
|
|
|
for _, header := range input.Headers {
|
|
|
|
req.Header.Add(header.Key, header.Value)
|
|
|
|
}
|
|
|
|
|
|
|
|
if input.Body != nil {
|
|
|
|
req.Body = []byte(*input.Body)
|
|
|
|
}
|
|
|
|
|
|
|
|
req, err := r.SenderService.CreateOrUpdateRequest(ctx, req)
|
|
|
|
if errors.Is(err, proj.ErrNoProject) {
|
|
|
|
return nil, noActiveProjectErr(ctx)
|
|
|
|
} else if err != nil {
|
|
|
|
return nil, fmt.Errorf("could not create sender request: %w", err)
|
|
|
|
}
|
|
|
|
|
|
|
|
senderReq, err := parseSenderRequest(req)
|
|
|
|
if err != nil {
|
|
|
|
return nil, err
|
|
|
|
}
|
|
|
|
|
|
|
|
return &senderReq, nil
|
|
|
|
}
|
|
|
|
|
|
|
|
func (r *mutationResolver) CreateSenderRequestFromHTTPRequestLog(ctx context.Context, id ulid.ULID) (*SenderRequest, error) {
|
|
|
|
req, err := r.SenderService.CloneFromRequestLog(ctx, id)
|
|
|
|
if errors.Is(err, proj.ErrNoProject) {
|
|
|
|
return nil, noActiveProjectErr(ctx)
|
|
|
|
} else if err != nil {
|
|
|
|
return nil, fmt.Errorf("could not create sender request from http request log: %w", err)
|
|
|
|
}
|
|
|
|
|
|
|
|
senderReq, err := parseSenderRequest(req)
|
|
|
|
if err != nil {
|
|
|
|
return nil, err
|
|
|
|
}
|
|
|
|
|
|
|
|
return &senderReq, nil
|
|
|
|
}
|
|
|
|
|
|
|
|
func (r *mutationResolver) SendRequest(ctx context.Context, id ulid.ULID) (*SenderRequest, error) {
|
|
|
|
// Use new context, because we don't want to risk interrupting sending the request
|
|
|
|
// or the subsequent storing of the response, e.g. if ctx gets cancelled or
|
|
|
|
// times out.
|
|
|
|
ctx2 := context.Background()
|
|
|
|
|
|
|
|
var sendErr *sender.SendError
|
|
|
|
|
|
|
|
req, err := r.SenderService.SendRequest(ctx2, id)
|
|
|
|
if errors.Is(err, proj.ErrNoProject) {
|
|
|
|
return nil, noActiveProjectErr(ctx)
|
|
|
|
} else if errors.As(err, &sendErr) {
|
|
|
|
return nil, &gqlerror.Error{
|
|
|
|
Path: graphql.GetPath(ctx),
|
|
|
|
Message: fmt.Sprintf("Sending request failed: %v", sendErr.Unwrap()),
|
|
|
|
Extensions: map[string]interface{}{
|
|
|
|
"code": "send_request_failed",
|
|
|
|
},
|
|
|
|
}
|
|
|
|
} else if err != nil {
|
|
|
|
return nil, fmt.Errorf("could not send request: %w", err)
|
|
|
|
}
|
|
|
|
|
|
|
|
senderReq, err := parseSenderRequest(req)
|
|
|
|
if err != nil {
|
|
|
|
return nil, err
|
|
|
|
}
|
|
|
|
|
|
|
|
return &senderReq, nil
|
|
|
|
}
|
|
|
|
|
|
|
|
func (r *mutationResolver) DeleteSenderRequests(ctx context.Context) (*DeleteSenderRequestsResult, error) {
|
|
|
|
project, err := r.ProjectService.ActiveProject(ctx)
|
|
|
|
if errors.Is(err, proj.ErrNoProject) {
|
|
|
|
return nil, noActiveProjectErr(ctx)
|
|
|
|
} else if err != nil {
|
|
|
|
return nil, fmt.Errorf("could not get active project: %w", err)
|
|
|
|
}
|
|
|
|
|
|
|
|
if err := r.SenderService.DeleteRequests(ctx, project.ID); err != nil {
|
|
|
|
return nil, fmt.Errorf("could not clear request log: %w", err)
|
|
|
|
}
|
|
|
|
|
|
|
|
return &DeleteSenderRequestsResult{true}, nil
|
|
|
|
}
|
|
|
|
|
|
|
|
func parseSenderRequest(req sender.Request) (SenderRequest, error) {
|
|
|
|
method := HTTPMethod(req.Method)
|
|
|
|
if method != "" && !method.IsValid() {
|
|
|
|
return SenderRequest{}, fmt.Errorf("sender request has invalid method: %v", method)
|
|
|
|
}
|
|
|
|
|
|
|
|
reqProto := httpProtocolMap[req.Proto]
|
|
|
|
if !reqProto.IsValid() {
|
|
|
|
return SenderRequest{}, fmt.Errorf("sender request has invalid protocol: %v", req.Proto)
|
|
|
|
}
|
|
|
|
|
|
|
|
senderReq := SenderRequest{
|
|
|
|
ID: req.ID,
|
|
|
|
URL: req.URL,
|
|
|
|
Method: method,
|
|
|
|
Proto: HTTPProtocol(req.Proto),
|
|
|
|
Timestamp: ulid.Time(req.ID.Time()),
|
|
|
|
}
|
|
|
|
|
|
|
|
if req.SourceRequestLogID.Compare(ulid.ULID{}) != 0 {
|
|
|
|
senderReq.SourceRequestLogID = &req.SourceRequestLogID
|
|
|
|
}
|
|
|
|
|
|
|
|
if req.Header != nil {
|
|
|
|
senderReq.Headers = make([]HTTPHeader, 0)
|
|
|
|
|
|
|
|
for key, values := range req.Header {
|
|
|
|
for _, value := range values {
|
|
|
|
senderReq.Headers = append(senderReq.Headers, HTTPHeader{
|
|
|
|
Key: key,
|
|
|
|
Value: value,
|
|
|
|
})
|
|
|
|
}
|
|
|
|
}
|
|
|
|
}
|
|
|
|
|
|
|
|
if len(req.Body) > 0 {
|
|
|
|
bodyStr := string(req.Body)
|
|
|
|
senderReq.Body = &bodyStr
|
|
|
|
}
|
|
|
|
|
|
|
|
if req.Response != nil {
|
|
|
|
resLog, err := parseResponseLog(*req.Response)
|
|
|
|
if err != nil {
|
|
|
|
return SenderRequest{}, err
|
|
|
|
}
|
|
|
|
|
|
|
|
resLog.ID = req.ID
|
|
|
|
|
|
|
|
senderReq.Response = &resLog
|
|
|
|
}
|
|
|
|
|
|
|
|
return senderReq, nil
|
|
|
|
}
|
|
|
|
|
2020-10-29 20:54:17 +01:00
|
|
|
func stringPtrToRegexp(s *string) (*regexp.Regexp, error) {
|
|
|
|
if s == nil {
|
|
|
|
return nil, nil
|
|
|
|
}
|
2021-04-25 16:23:53 +02:00
|
|
|
|
2020-10-29 20:54:17 +01:00
|
|
|
return regexp.Compile(*s)
|
|
|
|
}
|
|
|
|
|
|
|
|
func scopeToScopeRules(rules []scope.Rule) []ScopeRule {
|
|
|
|
scopeRules := make([]ScopeRule, len(rules))
|
|
|
|
for i, rule := range rules {
|
|
|
|
scopeRules[i].URL = regexpToStringPtr(rule.URL)
|
|
|
|
if rule.Header.Key != nil || rule.Header.Value != nil {
|
|
|
|
scopeRules[i].Header = &ScopeHeader{
|
|
|
|
Key: regexpToStringPtr(rule.Header.Key),
|
|
|
|
Value: regexpToStringPtr(rule.Header.Value),
|
|
|
|
}
|
|
|
|
}
|
2021-04-25 16:23:53 +02:00
|
|
|
|
2020-10-29 20:54:17 +01:00
|
|
|
scopeRules[i].Body = regexpToStringPtr(rule.Body)
|
|
|
|
}
|
2021-04-25 16:23:53 +02:00
|
|
|
|
2020-10-29 20:54:17 +01:00
|
|
|
return scopeRules
|
|
|
|
}
|
|
|
|
|
2020-12-21 12:50:09 +01:00
|
|
|
func findRequestsFilterFromInput(input *HTTPRequestLogFilterInput) (filter reqlog.FindRequestsFilter, err error) {
|
2020-10-29 20:54:17 +01:00
|
|
|
if input == nil {
|
|
|
|
return
|
|
|
|
}
|
2021-04-25 16:23:53 +02:00
|
|
|
|
2020-10-29 20:54:17 +01:00
|
|
|
if input.OnlyInScope != nil {
|
|
|
|
filter.OnlyInScope = *input.OnlyInScope
|
|
|
|
}
|
2021-04-25 16:23:53 +02:00
|
|
|
|
2020-12-21 12:50:09 +01:00
|
|
|
if input.SearchExpression != nil && *input.SearchExpression != "" {
|
|
|
|
expr, err := search.ParseQuery(*input.SearchExpression)
|
|
|
|
if err != nil {
|
2021-04-25 16:23:53 +02:00
|
|
|
return reqlog.FindRequestsFilter{}, fmt.Errorf("could not parse search query: %w", err)
|
2020-12-21 12:50:09 +01:00
|
|
|
}
|
2021-04-25 16:23:53 +02:00
|
|
|
|
2020-12-21 12:50:09 +01:00
|
|
|
filter.SearchExpr = expr
|
|
|
|
}
|
2020-10-29 20:54:17 +01:00
|
|
|
|
|
|
|
return
|
|
|
|
}
|
|
|
|
|
2022-02-22 14:10:39 +01:00
|
|
|
func findSenderRequestsFilterFromInput(input *SenderRequestFilterInput) (filter sender.FindRequestsFilter, err error) {
|
|
|
|
if input == nil {
|
|
|
|
return
|
|
|
|
}
|
|
|
|
|
|
|
|
if input.OnlyInScope != nil {
|
|
|
|
filter.OnlyInScope = *input.OnlyInScope
|
|
|
|
}
|
|
|
|
|
|
|
|
if input.SearchExpression != nil && *input.SearchExpression != "" {
|
|
|
|
expr, err := search.ParseQuery(*input.SearchExpression)
|
|
|
|
if err != nil {
|
|
|
|
return sender.FindRequestsFilter{}, fmt.Errorf("could not parse search query: %w", err)
|
|
|
|
}
|
|
|
|
|
|
|
|
filter.SearchExpr = expr
|
|
|
|
}
|
|
|
|
|
|
|
|
return
|
|
|
|
}
|
|
|
|
|
2020-10-29 20:54:17 +01:00
|
|
|
func findReqFilterToHTTPReqLogFilter(findReqFilter reqlog.FindRequestsFilter) *HTTPRequestLogFilter {
|
|
|
|
empty := reqlog.FindRequestsFilter{}
|
|
|
|
if findReqFilter == empty {
|
|
|
|
return nil
|
|
|
|
}
|
2021-04-25 16:23:53 +02:00
|
|
|
|
2020-10-29 20:54:17 +01:00
|
|
|
httpReqLogFilter := &HTTPRequestLogFilter{
|
|
|
|
OnlyInScope: findReqFilter.OnlyInScope,
|
|
|
|
}
|
|
|
|
|
2022-01-21 11:45:54 +01:00
|
|
|
if findReqFilter.SearchExpr != nil {
|
|
|
|
searchExpr := findReqFilter.SearchExpr.String()
|
|
|
|
httpReqLogFilter.SearchExpression = &searchExpr
|
2020-12-21 12:50:09 +01:00
|
|
|
}
|
|
|
|
|
2020-10-29 20:54:17 +01:00
|
|
|
return httpReqLogFilter
|
|
|
|
}
|
2020-12-29 20:46:42 +01:00
|
|
|
|
2022-02-22 14:10:39 +01:00
|
|
|
func findReqFilterToSenderReqFilter(findReqFilter sender.FindRequestsFilter) *SenderRequestFilter {
|
|
|
|
empty := sender.FindRequestsFilter{}
|
|
|
|
if findReqFilter == empty {
|
|
|
|
return nil
|
|
|
|
}
|
|
|
|
|
|
|
|
senderReqFilter := &SenderRequestFilter{
|
|
|
|
OnlyInScope: findReqFilter.OnlyInScope,
|
|
|
|
}
|
|
|
|
|
|
|
|
if findReqFilter.SearchExpr != nil {
|
|
|
|
searchExpr := findReqFilter.SearchExpr.String()
|
|
|
|
senderReqFilter.SearchExpression = &searchExpr
|
|
|
|
}
|
|
|
|
|
|
|
|
return senderReqFilter
|
|
|
|
}
|
|
|
|
|
2020-12-29 20:46:42 +01:00
|
|
|
func noActiveProjectErr(ctx context.Context) error {
|
|
|
|
return &gqlerror.Error{
|
|
|
|
Path: graphql.GetPath(ctx),
|
|
|
|
Message: "No active project.",
|
|
|
|
Extensions: map[string]interface{}{
|
|
|
|
"code": "no_active_project",
|
|
|
|
},
|
|
|
|
}
|
|
|
|
}
|