2024-05-04 09:55:57 +00:00
|
|
|
package execution
|
|
|
|
|
|
|
|
import (
|
|
|
|
"bytes"
|
|
|
|
"context"
|
2024-08-16 09:26:15 +00:00
|
|
|
"encoding/json"
|
2024-05-04 09:55:57 +00:00
|
|
|
"io"
|
|
|
|
"net/http"
|
|
|
|
"time"
|
|
|
|
|
|
|
|
"github.com/zitadel/logging"
|
|
|
|
|
2024-08-16 09:26:15 +00:00
|
|
|
zhttp "github.com/zitadel/zitadel/internal/api/http"
|
2024-05-04 09:55:57 +00:00
|
|
|
"github.com/zitadel/zitadel/internal/domain"
|
|
|
|
"github.com/zitadel/zitadel/internal/telemetry/tracing"
|
|
|
|
"github.com/zitadel/zitadel/internal/zerrors"
|
2024-11-28 10:06:52 +00:00
|
|
|
"github.com/zitadel/zitadel/pkg/actions"
|
2024-05-04 09:55:57 +00:00
|
|
|
)
|
|
|
|
|
|
|
|
type ContextInfo interface {
|
|
|
|
GetHTTPRequestBody() []byte
|
|
|
|
GetContent() interface{}
|
|
|
|
SetHTTPResponseBody([]byte) error
|
|
|
|
}
|
|
|
|
|
|
|
|
type Target interface {
|
|
|
|
GetTargetID() string
|
|
|
|
IsInterruptOnError() bool
|
|
|
|
GetEndpoint() string
|
|
|
|
GetTargetType() domain.TargetType
|
|
|
|
GetTimeout() time.Duration
|
2024-11-28 10:06:52 +00:00
|
|
|
GetSigningKey() string
|
2024-05-04 09:55:57 +00:00
|
|
|
}
|
|
|
|
|
|
|
|
// CallTargets call a list of targets in order with handling of error and responses
|
|
|
|
func CallTargets(
|
|
|
|
ctx context.Context,
|
|
|
|
targets []Target,
|
|
|
|
info ContextInfo,
|
|
|
|
) (_ interface{}, err error) {
|
|
|
|
ctx, span := tracing.NewSpan(ctx)
|
|
|
|
defer span.EndWithError(err)
|
|
|
|
|
|
|
|
for _, target := range targets {
|
|
|
|
// call the type of target
|
|
|
|
resp, err := CallTarget(ctx, target, info)
|
|
|
|
// handle error if interrupt is set
|
|
|
|
if err != nil && target.IsInterruptOnError() {
|
|
|
|
return nil, err
|
|
|
|
}
|
|
|
|
if len(resp) > 0 {
|
|
|
|
// error in unmarshalling
|
2024-07-31 12:42:12 +00:00
|
|
|
if err := info.SetHTTPResponseBody(resp); err != nil && target.IsInterruptOnError() {
|
2024-05-04 09:55:57 +00:00
|
|
|
return nil, err
|
|
|
|
}
|
|
|
|
}
|
|
|
|
}
|
|
|
|
return info.GetContent(), nil
|
|
|
|
}
|
|
|
|
|
|
|
|
type ContextInfoRequest interface {
|
|
|
|
GetHTTPRequestBody() []byte
|
|
|
|
}
|
|
|
|
|
|
|
|
// CallTarget call the desired type of target with handling of responses
|
|
|
|
func CallTarget(
|
|
|
|
ctx context.Context,
|
|
|
|
target Target,
|
|
|
|
info ContextInfoRequest,
|
|
|
|
) (res []byte, err error) {
|
|
|
|
ctx, span := tracing.NewSpan(ctx)
|
|
|
|
defer span.EndWithError(err)
|
|
|
|
|
|
|
|
switch target.GetTargetType() {
|
|
|
|
// get request, ignore response and return request and error for handling in list of targets
|
|
|
|
case domain.TargetTypeWebhook:
|
2024-11-28 10:06:52 +00:00
|
|
|
return nil, webhook(ctx, target.GetEndpoint(), target.GetTimeout(), info.GetHTTPRequestBody(), target.GetSigningKey())
|
2024-05-04 09:55:57 +00:00
|
|
|
// get request, return response and error
|
|
|
|
case domain.TargetTypeCall:
|
2024-11-28 10:06:52 +00:00
|
|
|
return Call(ctx, target.GetEndpoint(), target.GetTimeout(), info.GetHTTPRequestBody(), target.GetSigningKey())
|
2024-05-04 09:55:57 +00:00
|
|
|
case domain.TargetTypeAsync:
|
|
|
|
go func(target Target, info ContextInfoRequest) {
|
2024-11-28 10:06:52 +00:00
|
|
|
if _, err := Call(ctx, target.GetEndpoint(), target.GetTimeout(), info.GetHTTPRequestBody(), target.GetSigningKey()); err != nil {
|
2024-05-04 09:55:57 +00:00
|
|
|
logging.WithFields("target", target.GetTargetID()).OnError(err).Info(err)
|
|
|
|
}
|
|
|
|
}(target, info)
|
|
|
|
return nil, nil
|
|
|
|
default:
|
|
|
|
return nil, zerrors.ThrowInternal(nil, "EXEC-auqnansr2m", "Errors.Execution.Unknown")
|
|
|
|
}
|
|
|
|
}
|
|
|
|
|
|
|
|
// webhook call a webhook, ignore the response but return the errror
|
2024-11-28 10:06:52 +00:00
|
|
|
func webhook(ctx context.Context, url string, timeout time.Duration, body []byte, signingKey string) error {
|
|
|
|
_, err := Call(ctx, url, timeout, body, signingKey)
|
2024-05-04 09:55:57 +00:00
|
|
|
return err
|
|
|
|
}
|
|
|
|
|
2024-07-31 12:42:12 +00:00
|
|
|
// Call function to do a post HTTP request to a desired url with timeout
|
2024-11-28 10:06:52 +00:00
|
|
|
func Call(ctx context.Context, url string, timeout time.Duration, body []byte, signingKey string) (_ []byte, err error) {
|
2024-05-04 09:55:57 +00:00
|
|
|
ctx, cancel := context.WithTimeout(ctx, timeout)
|
|
|
|
ctx, span := tracing.NewSpan(ctx)
|
|
|
|
defer func() {
|
|
|
|
cancel()
|
|
|
|
span.EndWithError(err)
|
|
|
|
}()
|
|
|
|
|
|
|
|
req, err := http.NewRequestWithContext(ctx, http.MethodPost, url, bytes.NewBuffer(body))
|
|
|
|
if err != nil {
|
|
|
|
return nil, err
|
|
|
|
}
|
|
|
|
req.Header.Set("Content-Type", "application/json")
|
2024-11-28 10:06:52 +00:00
|
|
|
if signingKey != "" {
|
|
|
|
req.Header.Set(actions.SigningHeader, actions.ComputeSignatureHeader(time.Now(), body, signingKey))
|
|
|
|
}
|
2024-05-04 09:55:57 +00:00
|
|
|
|
|
|
|
client := http.DefaultClient
|
|
|
|
resp, err := client.Do(req)
|
|
|
|
if err != nil {
|
|
|
|
return nil, err
|
|
|
|
}
|
|
|
|
defer resp.Body.Close()
|
|
|
|
|
2024-08-16 09:26:15 +00:00
|
|
|
return HandleResponse(resp)
|
|
|
|
}
|
|
|
|
|
|
|
|
func HandleResponse(resp *http.Response) ([]byte, error) {
|
|
|
|
data, err := io.ReadAll(resp.Body)
|
|
|
|
if err != nil {
|
|
|
|
return nil, err
|
|
|
|
}
|
2024-05-04 09:55:57 +00:00
|
|
|
// Check for success between 200 and 299, redirect 300 to 399 is handled by the client, return error with statusCode >= 400
|
|
|
|
if resp.StatusCode >= 200 && resp.StatusCode <= 299 {
|
2024-08-16 09:26:15 +00:00
|
|
|
var errorBody ErrorBody
|
|
|
|
if err := json.Unmarshal(data, &errorBody); err != nil {
|
|
|
|
// if json unmarshal fails, body has no ErrorBody information, so will be taken as successful response
|
|
|
|
return data, nil
|
|
|
|
}
|
|
|
|
if errorBody.ForwardedStatusCode != 0 || errorBody.ForwardedErrorMessage != "" {
|
|
|
|
if errorBody.ForwardedStatusCode >= 400 && errorBody.ForwardedStatusCode < 500 {
|
|
|
|
return nil, zhttp.HTTPStatusCodeToZitadelError(nil, errorBody.ForwardedStatusCode, "EXEC-reUaUZCzCp", errorBody.ForwardedErrorMessage)
|
|
|
|
}
|
|
|
|
return nil, zerrors.ThrowPreconditionFailed(nil, "EXEC-bmhNhpcqpF", errorBody.ForwardedErrorMessage)
|
|
|
|
}
|
|
|
|
// no ErrorBody filled in response, so will be taken as successful response
|
|
|
|
return data, nil
|
2024-05-04 09:55:57 +00:00
|
|
|
}
|
2024-08-16 09:26:15 +00:00
|
|
|
|
|
|
|
return nil, zerrors.ThrowPreconditionFailed(nil, "EXEC-dra6yamk98", "Errors.Execution.Failed")
|
|
|
|
}
|
|
|
|
|
|
|
|
type ErrorBody struct {
|
|
|
|
ForwardedStatusCode int `json:"forwardedStatusCode,omitempty"`
|
|
|
|
ForwardedErrorMessage string `json:"forwardedErrorMessage,omitempty"`
|
2024-05-04 09:55:57 +00:00
|
|
|
}
|