hetty/pkg/api/resolvers.go

1006 lines
25 KiB
Go
Raw Permalink Normal View History

package api
//go:generate go run github.com/99designs/gqlgen
import (
2022-03-23 13:31:27 +00:00
"bytes"
"context"
2021-04-25 14:23:53 +00:00
"errors"
"fmt"
2022-03-23 13:31:27 +00:00
"io"
"io/ioutil"
2022-02-22 13:10:39 +00:00
"net/http"
2020-10-29 19:54:17 +00:00
"regexp"
2022-03-31 10:07:35 +00:00
"sort"
"strings"
2020-10-11 15:09:39 +00:00
"github.com/99designs/gqlgen/graphql"
2022-01-21 10:45:54 +00:00
"github.com/oklog/ulid"
2021-04-25 14:23:53 +00:00
"github.com/vektah/gqlparser/v2/gqlerror"
"github.com/dstotijn/hetty/pkg/filter"
2020-10-11 15:09:39 +00:00
"github.com/dstotijn/hetty/pkg/proj"
2022-03-23 13:31:27 +00:00
"github.com/dstotijn/hetty/pkg/proxy"
"github.com/dstotijn/hetty/pkg/proxy/intercept"
2020-09-22 16:33:02 +00:00
"github.com/dstotijn/hetty/pkg/reqlog"
2020-10-29 19:54:17 +00:00
"github.com/dstotijn/hetty/pkg/scope"
2022-02-22 13:10:39 +00:00
"github.com/dstotijn/hetty/pkg/sender"
)
2022-02-22 13:10:39 +00:00
var httpProtocolMap = map[string]HTTPProtocol{
2022-02-27 16:55:41 +00:00
sender.HTTPProto10: HTTPProtocolHTTP10,
sender.HTTPProto11: HTTPProtocolHTTP11,
sender.HTTPProto20: HTTPProtocolHTTP20,
2022-02-22 13:10:39 +00:00
}
var revHTTPProtocolMap = map[HTTPProtocol]string{
2022-02-27 16:55:41 +00:00
HTTPProtocolHTTP10: sender.HTTPProto10,
HTTPProtocolHTTP11: sender.HTTPProto11,
HTTPProtocolHTTP20: sender.HTTPProto20,
2022-02-22 13:10:39 +00:00
}
type Resolver struct {
2022-01-01 15:11:49 +00:00
ProjectService proj.Service
2022-02-22 13:10:39 +00:00
RequestLogService reqlog.Service
2022-03-23 13:31:27 +00:00
InterceptService *intercept.Service
2022-02-22 13:10:39 +00:00
SenderService sender.Service
}
2021-04-25 14:23:53 +00:00
type (
queryResolver struct{ *Resolver }
mutationResolver struct{ *Resolver }
)
2020-10-11 15:09:39 +00:00
func (r *Resolver) Query() QueryResolver { return &queryResolver{r} }
func (r *Resolver) Mutation() MutationResolver { return &mutationResolver{r} }
func (r *queryResolver) HTTPRequestLogs(ctx context.Context) ([]HTTPRequestLog, error) {
2020-10-29 19:54:17 +00:00
reqs, err := r.RequestLogService.FindRequests(ctx)
2021-04-25 14:23:53 +00:00
if errors.Is(err, proj.ErrNoProject) {
return nil, noActiveProjectErr(ctx)
2021-04-25 14:23:53 +00:00
} else if err != nil {
return nil, fmt.Errorf("could not query repository for requests: %w", err)
2020-10-11 15:09:39 +00:00
}
2021-04-25 14:23:53 +00:00
logs := make([]HTTPRequestLog, len(reqs))
for i, req := range reqs {
req, err := parseRequestLog(req)
if err != nil {
return nil, err
}
2021-04-25 14:23:53 +00:00
logs[i] = req
}
return logs, nil
}
2022-02-22 13:10:39 +00:00
func (r *queryResolver) HTTPRequestLog(ctx context.Context, id ulid.ULID) (*HTTPRequestLog, error) {
log, err := r.RequestLogService.FindRequestLogByID(ctx, id)
2021-04-25 14:23:53 +00:00
if errors.Is(err, reqlog.ErrRequestNotFound) {
return nil, nil
2021-04-25 14:23:53 +00:00
} else if err != nil {
return nil, fmt.Errorf("could not get request by ID: %w", err)
}
2021-04-25 14:23:53 +00:00
req, err := parseRequestLog(log)
if err != nil {
return nil, err
}
return &req, nil
}
2022-01-21 10:45:54 +00:00
func parseRequestLog(reqLog reqlog.RequestLog) (HTTPRequestLog, error) {
method := HTTPMethod(reqLog.Method)
if method != "" && !method.IsValid() {
return HTTPRequestLog{}, fmt.Errorf("request has invalid method: %v", method)
}
log := HTTPRequestLog{
2022-02-22 13:10:39 +00:00
ID: reqLog.ID,
2022-01-21 10:45:54 +00:00
Proto: reqLog.Proto,
Method: method,
2022-01-21 10:45:54 +00:00
Timestamp: ulid.Time(reqLog.ID.Time()),
}
2022-01-21 10:45:54 +00:00
if reqLog.URL != nil {
log.URL = reqLog.URL.String()
}
2022-01-21 10:45:54 +00:00
if len(reqLog.Body) > 0 {
bodyStr := string(reqLog.Body)
log.Body = &bodyStr
}
2022-01-21 10:45:54 +00:00
if reqLog.Header != nil {
log.Headers = make([]HTTPHeader, 0)
2021-04-25 14:23:53 +00:00
2022-01-21 10:45:54 +00:00
for key, values := range reqLog.Header {
for _, value := range values {
log.Headers = append(log.Headers, HTTPHeader{
Key: key,
Value: value,
})
}
}
2022-03-31 10:07:35 +00:00
sort.Sort(HTTPHeaders(log.Headers))
}
2022-01-21 10:45:54 +00:00
if reqLog.Response != nil {
2022-02-22 13:10:39 +00:00
resLog, err := parseResponseLog(*reqLog.Response)
if err != nil {
return HTTPRequestLog{}, err
}
2021-04-25 14:23:53 +00:00
2022-02-22 13:10:39 +00:00
resLog.ID = reqLog.ID
2021-04-25 14:23:53 +00:00
2022-02-22 13:10:39 +00:00
log.Response = &resLog
}
return log, nil
}
func parseResponseLog(resLog reqlog.ResponseLog) (HTTPResponseLog, error) {
proto := httpProtocolMap[resLog.Proto]
if !proto.IsValid() {
return HTTPResponseLog{}, fmt.Errorf("sender response has invalid protocol: %v", resLog.Proto)
}
httpResLog := HTTPResponseLog{
Proto: proto,
StatusCode: resLog.StatusCode,
}
statusReasonSubs := strings.SplitN(resLog.Status, " ", 2)
if len(statusReasonSubs) == 2 {
httpResLog.StatusReason = statusReasonSubs[1]
}
if len(resLog.Body) > 0 {
bodyStr := string(resLog.Body)
httpResLog.Body = &bodyStr
}
2021-04-25 14:23:53 +00:00
2022-02-22 13:10:39 +00:00
if resLog.Header != nil {
httpResLog.Headers = make([]HTTPHeader, 0)
2021-04-25 14:23:53 +00:00
2022-02-22 13:10:39 +00:00
for key, values := range resLog.Header {
for _, value := range values {
httpResLog.Headers = append(httpResLog.Headers, HTTPHeader{
Key: key,
Value: value,
})
}
}
2022-03-31 10:07:35 +00:00
sort.Sort(HTTPHeaders(httpResLog.Headers))
}
2022-02-22 13:10:39 +00:00
return httpResLog, nil
}
2020-10-11 15:09:39 +00:00
2022-01-21 10:45:54 +00:00
func (r *mutationResolver) CreateProject(ctx context.Context, name string) (*Project, error) {
p, err := r.ProjectService.CreateProject(ctx, name)
2021-04-25 14:23:53 +00:00
if errors.Is(err, proj.ErrInvalidName) {
2020-10-11 15:09:39 +00:00
return nil, gqlerror.Errorf("Project name must only contain alphanumeric or space chars.")
2021-04-25 14:23:53 +00:00
} else if err != nil {
return nil, fmt.Errorf("could not open project: %w", err)
2020-10-11 15:09:39 +00:00
}
2021-04-25 14:23:53 +00:00
2022-03-23 13:31:27 +00:00
project := parseProject(r.ProjectService, p)
return &project, nil
2022-01-21 10:45:54 +00:00
}
2022-02-22 13:10:39 +00:00
func (r *mutationResolver) OpenProject(ctx context.Context, id ulid.ULID) (*Project, error) {
p, err := r.ProjectService.OpenProject(ctx, id)
2022-01-21 10:45:54 +00:00
if errors.Is(err, proj.ErrInvalidName) {
return nil, gqlerror.Errorf("Project name must only contain alphanumeric or space chars.")
} else if err != nil {
return nil, fmt.Errorf("could not open project: %w", err)
}
2022-03-23 13:31:27 +00:00
project := parseProject(r.ProjectService, p)
return &project, nil
2020-10-11 15:09:39 +00:00
}
func (r *queryResolver) ActiveProject(ctx context.Context) (*Project, error) {
2022-01-21 10:45:54 +00:00
p, err := r.ProjectService.ActiveProject(ctx)
2021-04-25 14:23:53 +00:00
if errors.Is(err, proj.ErrNoProject) {
2020-10-11 15:09:39 +00:00
return nil, nil
2021-04-25 14:23:53 +00:00
} else if err != nil {
return nil, fmt.Errorf("could not open project: %w", err)
2020-10-11 15:09:39 +00:00
}
2022-03-23 13:31:27 +00:00
project := parseProject(r.ProjectService, p)
return &project, nil
2020-10-11 15:09:39 +00:00
}
func (r *queryResolver) Projects(ctx context.Context) ([]Project, error) {
2022-01-21 10:45:54 +00:00
p, err := r.ProjectService.Projects(ctx)
2020-10-11 15:09:39 +00:00
if err != nil {
2021-04-25 14:23:53 +00:00
return nil, fmt.Errorf("could not get projects: %w", err)
2020-10-11 15:09:39 +00:00
}
projects := make([]Project, len(p))
for i, proj := range p {
2022-03-23 13:31:27 +00:00
projects[i] = parseProject(r.ProjectService, proj)
2020-10-11 15:09:39 +00:00
}
return projects, nil
}
2020-10-29 19:54:17 +00:00
func (r *queryResolver) Scope(ctx context.Context) ([]ScopeRule, error) {
2022-01-21 10:45:54 +00:00
rules := r.ProjectService.Scope().Rules()
2020-10-29 19:54:17 +00:00
return scopeToScopeRules(rules), nil
}
func regexpToStringPtr(r *regexp.Regexp) *string {
if r == nil {
return nil
}
2021-04-25 14:23:53 +00:00
2020-10-29 19:54:17 +00:00
s := r.String()
2021-04-25 14:23:53 +00:00
2020-10-29 19:54:17 +00:00
return &s
}
2020-10-11 15:09:39 +00:00
func (r *mutationResolver) CloseProject(ctx context.Context) (*CloseProjectResult, error) {
2022-01-21 10:45:54 +00:00
if err := r.ProjectService.CloseProject(); err != nil {
2021-04-25 14:23:53 +00:00
return nil, fmt.Errorf("could not close project: %w", err)
2020-10-11 15:09:39 +00:00
}
2021-04-25 14:23:53 +00:00
2020-10-11 15:09:39 +00:00
return &CloseProjectResult{true}, nil
}
2022-02-22 13:10:39 +00:00
func (r *mutationResolver) DeleteProject(ctx context.Context, id ulid.ULID) (*DeleteProjectResult, error) {
if err := r.ProjectService.DeleteProject(ctx, id); err != nil {
2021-04-25 14:23:53 +00:00
return nil, fmt.Errorf("could not delete project: %w", err)
2020-10-11 15:09:39 +00:00
}
2021-04-25 14:23:53 +00:00
2020-10-11 15:09:39 +00:00
return &DeleteProjectResult{
Success: true,
}, nil
}
2020-10-29 19:54:17 +00:00
func (r *mutationResolver) ClearHTTPRequestLog(ctx context.Context) (*ClearHTTPRequestLogResult, error) {
2022-01-21 10:45:54 +00:00
project, err := r.ProjectService.ActiveProject(ctx)
if errors.Is(err, proj.ErrNoProject) {
return nil, noActiveProjectErr(ctx)
} else if err != nil {
return nil, fmt.Errorf("could not get active project: %w", err)
}
if err := r.RequestLogService.ClearRequests(ctx, project.ID); err != nil {
2021-04-25 14:23:53 +00:00
return nil, fmt.Errorf("could not clear request log: %w", err)
}
2021-04-25 14:23:53 +00:00
return &ClearHTTPRequestLogResult{true}, nil
}
2020-10-29 19:54:17 +00:00
func (r *mutationResolver) SetScope(ctx context.Context, input []ScopeRuleInput) ([]ScopeRule, error) {
rules := make([]scope.Rule, len(input))
2021-04-25 14:23:53 +00:00
2020-10-29 19:54:17 +00:00
for i, rule := range input {
u, err := stringPtrToRegexp(rule.URL)
if err != nil {
2021-04-25 14:23:53 +00:00
return nil, fmt.Errorf("invalid URL in scope rule: %w", err)
2020-10-29 19:54:17 +00:00
}
2021-04-25 14:23:53 +00:00
2020-10-29 19:54:17 +00:00
var headerKey, headerValue *regexp.Regexp
2021-04-25 14:23:53 +00:00
2020-10-29 19:54:17 +00:00
if rule.Header != nil {
headerKey, err = stringPtrToRegexp(rule.Header.Key)
if err != nil {
2021-04-25 14:23:53 +00:00
return nil, fmt.Errorf("invalid header key in scope rule: %w", err)
2020-10-29 19:54:17 +00:00
}
2021-04-25 14:23:53 +00:00
2020-10-29 19:54:17 +00:00
headerValue, err = stringPtrToRegexp(rule.Header.Key)
if err != nil {
2021-04-25 14:23:53 +00:00
return nil, fmt.Errorf("invalid header value in scope rule: %w", err)
2020-10-29 19:54:17 +00:00
}
}
2021-04-25 14:23:53 +00:00
2020-10-29 19:54:17 +00:00
body, err := stringPtrToRegexp(rule.Body)
if err != nil {
2021-04-25 14:23:53 +00:00
return nil, fmt.Errorf("invalid body in scope rule: %w", err)
2020-10-29 19:54:17 +00:00
}
2021-04-25 14:23:53 +00:00
2020-10-29 19:54:17 +00:00
rules[i] = scope.Rule{
URL: u,
Header: scope.Header{
Key: headerKey,
Value: headerValue,
},
Body: body,
}
}
2022-01-21 10:45:54 +00:00
err := r.ProjectService.SetScopeRules(ctx, rules)
if err != nil {
return nil, fmt.Errorf("could not set scope rules: %w", err)
2020-10-29 19:54:17 +00:00
}
return scopeToScopeRules(rules), nil
}
func (r *queryResolver) HTTPRequestLogFilter(ctx context.Context) (*HTTPRequestLogFilter, error) {
2022-02-22 13:10:39 +00:00
return findReqFilterToHTTPReqLogFilter(r.RequestLogService.FindReqsFilter()), nil
2020-10-29 19:54:17 +00:00
}
func (r *mutationResolver) SetHTTPRequestLogFilter(
ctx context.Context,
input *HTTPRequestLogFilterInput,
) (*HTTPRequestLogFilter, error) {
filter, err := findRequestsFilterFromInput(input)
if err != nil {
2021-04-25 14:23:53 +00:00
return nil, fmt.Errorf("could not parse request log filter: %w", err)
}
2021-04-25 14:23:53 +00:00
2022-01-21 10:45:54 +00:00
err = r.ProjectService.SetRequestLogFindFilter(ctx, filter)
2021-04-25 14:23:53 +00:00
if errors.Is(err, proj.ErrNoProject) {
return nil, noActiveProjectErr(ctx)
2021-04-25 14:23:53 +00:00
} else if err != nil {
return nil, fmt.Errorf("could not set request log filter: %w", err)
2020-10-29 19:54:17 +00:00
}
return findReqFilterToHTTPReqLogFilter(filter), nil
}
2022-02-22 13:10:39 +00:00
func (r *queryResolver) SenderRequest(ctx context.Context, id ulid.ULID) (*SenderRequest, error) {
senderReq, err := r.SenderService.FindRequestByID(ctx, id)
if errors.Is(err, sender.ErrRequestNotFound) {
return nil, nil
} else if err != nil {
return nil, fmt.Errorf("could not get request by ID: %w", err)
}
req, err := parseSenderRequest(senderReq)
if err != nil {
return nil, err
}
return &req, nil
}
func (r *queryResolver) SenderRequests(ctx context.Context) ([]SenderRequest, error) {
reqs, err := r.SenderService.FindRequests(ctx)
if errors.Is(err, proj.ErrNoProject) {
return nil, noActiveProjectErr(ctx)
} else if err != nil {
return nil, fmt.Errorf("failed to find sender requests: %w", err)
}
senderReqs := make([]SenderRequest, len(reqs))
for i, req := range reqs {
req, err := parseSenderRequest(req)
if err != nil {
return nil, err
}
senderReqs[i] = req
}
return senderReqs, nil
}
func (r *mutationResolver) SetSenderRequestFilter(
ctx context.Context,
input *SenderRequestFilterInput,
) (*SenderRequestFilter, error) {
filter, err := findSenderRequestsFilterFromInput(input)
if err != nil {
return nil, fmt.Errorf("could not parse request log filter: %w", err)
}
err = r.ProjectService.SetSenderRequestFindFilter(ctx, filter)
if errors.Is(err, proj.ErrNoProject) {
return nil, noActiveProjectErr(ctx)
} else if err != nil {
return nil, fmt.Errorf("could not set request log filter: %w", err)
}
return findReqFilterToSenderReqFilter(filter), nil
}
2022-02-28 15:21:01 +00:00
func (r *mutationResolver) CreateOrUpdateSenderRequest(
ctx context.Context,
input SenderRequestInput,
) (*SenderRequest, error) {
2022-02-22 13:10:39 +00:00
req := sender.Request{
URL: input.URL,
Header: make(http.Header),
}
if input.ID != nil {
req.ID = *input.ID
}
if input.Method != nil {
req.Method = input.Method.String()
}
if input.Proto != nil {
req.Proto = revHTTPProtocolMap[*input.Proto]
}
for _, header := range input.Headers {
req.Header.Add(header.Key, header.Value)
}
if input.Body != nil {
req.Body = []byte(*input.Body)
}
req, err := r.SenderService.CreateOrUpdateRequest(ctx, req)
if errors.Is(err, proj.ErrNoProject) {
return nil, noActiveProjectErr(ctx)
} else if err != nil {
return nil, fmt.Errorf("could not create sender request: %w", err)
}
senderReq, err := parseSenderRequest(req)
if err != nil {
return nil, err
}
return &senderReq, nil
}
2022-02-28 15:21:01 +00:00
func (r *mutationResolver) CreateSenderRequestFromHTTPRequestLog(
ctx context.Context,
id ulid.ULID,
) (*SenderRequest, error) {
2022-02-22 13:10:39 +00:00
req, err := r.SenderService.CloneFromRequestLog(ctx, id)
if errors.Is(err, proj.ErrNoProject) {
return nil, noActiveProjectErr(ctx)
} else if err != nil {
return nil, fmt.Errorf("could not create sender request from http request log: %w", err)
}
senderReq, err := parseSenderRequest(req)
if err != nil {
return nil, err
}
return &senderReq, nil
}
func (r *mutationResolver) SendRequest(ctx context.Context, id ulid.ULID) (*SenderRequest, error) {
// Use new context, because we don't want to risk interrupting sending the request
// or the subsequent storing of the response, e.g. if ctx gets cancelled or
// times out.
ctx2 := context.Background()
var sendErr *sender.SendError
2022-02-28 15:21:01 +00:00
//nolint:contextcheck
2022-02-22 13:10:39 +00:00
req, err := r.SenderService.SendRequest(ctx2, id)
2022-02-28 15:21:01 +00:00
switch {
case errors.Is(err, proj.ErrNoProject):
2022-02-22 13:10:39 +00:00
return nil, noActiveProjectErr(ctx)
2022-02-28 15:21:01 +00:00
case errors.As(err, &sendErr):
2022-02-22 13:10:39 +00:00
return nil, &gqlerror.Error{
Path: graphql.GetPath(ctx),
Message: fmt.Sprintf("Sending request failed: %v", sendErr.Unwrap()),
Extensions: map[string]interface{}{
"code": "send_request_failed",
},
}
2022-02-28 15:21:01 +00:00
case err != nil:
2022-02-22 13:10:39 +00:00
return nil, fmt.Errorf("could not send request: %w", err)
}
senderReq, err := parseSenderRequest(req)
if err != nil {
return nil, err
}
return &senderReq, nil
}
func (r *mutationResolver) DeleteSenderRequests(ctx context.Context) (*DeleteSenderRequestsResult, error) {
project, err := r.ProjectService.ActiveProject(ctx)
if errors.Is(err, proj.ErrNoProject) {
return nil, noActiveProjectErr(ctx)
} else if err != nil {
return nil, fmt.Errorf("could not get active project: %w", err)
}
if err := r.SenderService.DeleteRequests(ctx, project.ID); err != nil {
return nil, fmt.Errorf("could not clear request log: %w", err)
}
return &DeleteSenderRequestsResult{true}, nil
}
2022-03-23 13:31:27 +00:00
func (r *queryResolver) InterceptedRequests(ctx context.Context) (httpReqs []HTTPRequest, err error) {
items := r.InterceptService.Items()
for _, item := range items {
req, err := parseInterceptItem(item)
if err != nil {
return nil, err
}
httpReqs = append(httpReqs, req)
}
return httpReqs, nil
}
func (r *queryResolver) InterceptedRequest(ctx context.Context, id ulid.ULID) (*HTTPRequest, error) {
item, err := r.InterceptService.ItemByID(id)
if errors.Is(err, intercept.ErrRequestNotFound) {
return nil, nil
} else if err != nil {
return nil, fmt.Errorf("could not get request by ID: %w", err)
}
req, err := parseInterceptItem(item)
if err != nil {
return nil, err
}
return &req, nil
}
func (r *mutationResolver) ModifyRequest(ctx context.Context, input ModifyRequestInput) (*ModifyRequestResult, error) {
body := ""
if input.Body != nil {
body = *input.Body
}
//nolint:noctx
req, err := http.NewRequest(input.Method.String(), input.URL.String(), strings.NewReader(body))
if err != nil {
return nil, fmt.Errorf("failed to construct HTTP request: %w", err)
}
for _, header := range input.Headers {
req.Header.Add(header.Key, header.Value)
}
err = r.InterceptService.ModifyRequest(input.ID, req, input.ModifyResponse)
if err != nil {
return nil, fmt.Errorf("could not modify http request: %w", err)
}
return &ModifyRequestResult{Success: true}, nil
}
func (r *mutationResolver) CancelRequest(ctx context.Context, id ulid.ULID) (*CancelRequestResult, error) {
err := r.InterceptService.CancelRequest(id)
if err != nil {
return nil, fmt.Errorf("could not cancel http request: %w", err)
}
return &CancelRequestResult{Success: true}, nil
}
func (r *mutationResolver) ModifyResponse(
ctx context.Context,
input ModifyResponseInput,
) (*ModifyResponseResult, error) {
res := &http.Response{
Header: make(http.Header),
Status: fmt.Sprintf("%v %v", input.StatusCode, input.StatusReason),
StatusCode: input.StatusCode,
Proto: revHTTPProtocolMap[input.Proto],
}
var ok bool
if res.ProtoMajor, res.ProtoMinor, ok = http.ParseHTTPVersion(res.Proto); !ok {
return nil, fmt.Errorf("malformed HTTP version: %q", res.Proto)
}
var body string
if input.Body != nil {
body = *input.Body
}
res.Body = io.NopCloser(strings.NewReader(body))
for _, header := range input.Headers {
res.Header.Add(header.Key, header.Value)
}
err := r.InterceptService.ModifyResponse(input.RequestID, res)
if err != nil {
return nil, fmt.Errorf("could not modify http request: %w", err)
}
return &ModifyResponseResult{Success: true}, nil
}
func (r *mutationResolver) CancelResponse(ctx context.Context, requestID ulid.ULID) (*CancelResponseResult, error) {
err := r.InterceptService.CancelResponse(requestID)
if err != nil {
return nil, fmt.Errorf("could not cancel http response: %w", err)
}
return &CancelResponseResult{Success: true}, nil
}
func (r *mutationResolver) UpdateInterceptSettings(
ctx context.Context,
input UpdateInterceptSettingsInput,
) (*InterceptSettings, error) {
settings := intercept.Settings{
RequestsEnabled: input.RequestsEnabled,
ResponsesEnabled: input.ResponsesEnabled,
}
if input.RequestFilter != nil && *input.RequestFilter != "" {
expr, err := filter.ParseQuery(*input.RequestFilter)
2022-03-23 13:31:27 +00:00
if err != nil {
return nil, fmt.Errorf("could not parse request filter: %w", err)
}
settings.RequestFilter = expr
}
if input.ResponseFilter != nil && *input.ResponseFilter != "" {
expr, err := filter.ParseQuery(*input.ResponseFilter)
2022-03-23 13:31:27 +00:00
if err != nil {
return nil, fmt.Errorf("could not parse response filter: %w", err)
}
settings.ResponseFilter = expr
}
err := r.ProjectService.UpdateInterceptSettings(ctx, settings)
if errors.Is(err, proj.ErrNoProject) {
return nil, noActiveProjectErr(ctx)
} else if err != nil {
return nil, fmt.Errorf("could not update intercept settings: %w", err)
}
updated := &InterceptSettings{
RequestsEnabled: settings.RequestsEnabled,
ResponsesEnabled: settings.ResponsesEnabled,
}
if settings.RequestFilter != nil {
reqFilter := settings.RequestFilter.String()
updated.RequestFilter = &reqFilter
}
if settings.ResponseFilter != nil {
resFilter := settings.ResponseFilter.String()
updated.ResponseFilter = &resFilter
}
return updated, nil
}
2022-02-22 13:10:39 +00:00
func parseSenderRequest(req sender.Request) (SenderRequest, error) {
method := HTTPMethod(req.Method)
if method != "" && !method.IsValid() {
return SenderRequest{}, fmt.Errorf("sender request has invalid method: %v", method)
}
reqProto := httpProtocolMap[req.Proto]
if !reqProto.IsValid() {
return SenderRequest{}, fmt.Errorf("sender request has invalid protocol: %v", req.Proto)
}
senderReq := SenderRequest{
ID: req.ID,
URL: req.URL,
Method: method,
Proto: HTTPProtocol(req.Proto),
Timestamp: ulid.Time(req.ID.Time()),
}
if req.SourceRequestLogID.Compare(ulid.ULID{}) != 0 {
senderReq.SourceRequestLogID = &req.SourceRequestLogID
}
if req.Header != nil {
senderReq.Headers = make([]HTTPHeader, 0)
for key, values := range req.Header {
for _, value := range values {
senderReq.Headers = append(senderReq.Headers, HTTPHeader{
Key: key,
Value: value,
})
}
}
2022-03-31 10:07:35 +00:00
sort.Sort(HTTPHeaders(senderReq.Headers))
2022-02-22 13:10:39 +00:00
}
if len(req.Body) > 0 {
bodyStr := string(req.Body)
senderReq.Body = &bodyStr
}
if req.Response != nil {
resLog, err := parseResponseLog(*req.Response)
if err != nil {
return SenderRequest{}, err
}
resLog.ID = req.ID
senderReq.Response = &resLog
}
return senderReq, nil
}
2022-03-23 13:31:27 +00:00
func parseHTTPRequest(req *http.Request) (HTTPRequest, error) {
method := HTTPMethod(req.Method)
if method != "" && !method.IsValid() {
return HTTPRequest{}, fmt.Errorf("http request has invalid method: %v", method)
}
reqProto := httpProtocolMap[req.Proto]
if !reqProto.IsValid() {
return HTTPRequest{}, fmt.Errorf("http request has invalid protocol: %v", req.Proto)
}
id, ok := proxy.RequestIDFromContext(req.Context())
if !ok {
return HTTPRequest{}, errors.New("http request has missing ID")
}
httpReq := HTTPRequest{
ID: id,
URL: req.URL,
Method: method,
Proto: HTTPProtocol(req.Proto),
}
if req.Header != nil {
httpReq.Headers = make([]HTTPHeader, 0)
for key, values := range req.Header {
for _, value := range values {
httpReq.Headers = append(httpReq.Headers, HTTPHeader{
Key: key,
Value: value,
})
}
}
2022-03-31 10:07:35 +00:00
sort.Sort(HTTPHeaders(httpReq.Headers))
2022-03-23 13:31:27 +00:00
}
if req.Body != nil {
body, err := ioutil.ReadAll(req.Body)
if err != nil {
return HTTPRequest{}, fmt.Errorf("failed to read request body: %w", err)
}
req.Body = ioutil.NopCloser(bytes.NewBuffer(body))
bodyStr := string(body)
httpReq.Body = &bodyStr
}
return httpReq, nil
}
func parseHTTPResponse(res *http.Response) (HTTPResponse, error) {
resProto := httpProtocolMap[res.Proto]
if !resProto.IsValid() {
return HTTPResponse{}, fmt.Errorf("http response has invalid protocol: %v", res.Proto)
}
id, ok := proxy.RequestIDFromContext(res.Request.Context())
if !ok {
return HTTPResponse{}, errors.New("http response has missing ID")
}
httpRes := HTTPResponse{
ID: id,
Proto: resProto,
StatusCode: res.StatusCode,
}
statusReasonSubs := strings.SplitN(res.Status, " ", 2)
if len(statusReasonSubs) == 2 {
httpRes.StatusReason = statusReasonSubs[1]
}
if res.Header != nil {
httpRes.Headers = make([]HTTPHeader, 0)
for key, values := range res.Header {
for _, value := range values {
httpRes.Headers = append(httpRes.Headers, HTTPHeader{
Key: key,
Value: value,
})
}
}
2022-03-31 10:07:35 +00:00
sort.Sort(HTTPHeaders(httpRes.Headers))
2022-03-23 13:31:27 +00:00
}
if res.Body != nil {
body, err := ioutil.ReadAll(res.Body)
if err != nil {
return HTTPResponse{}, fmt.Errorf("failed to read response body: %w", err)
}
res.Body = ioutil.NopCloser(bytes.NewBuffer(body))
bodyStr := string(body)
httpRes.Body = &bodyStr
}
return httpRes, nil
}
func parseInterceptItem(item intercept.Item) (req HTTPRequest, err error) {
if item.Response != nil {
req, err = parseHTTPRequest(item.Response.Request)
if err != nil {
return HTTPRequest{}, err
}
res, err := parseHTTPResponse(item.Response)
if err != nil {
return HTTPRequest{}, err
}
req.Response = &res
} else if item.Request != nil {
req, err = parseHTTPRequest(item.Request)
if err != nil {
return HTTPRequest{}, err
}
}
return req, nil
}
func parseProject(projSvc proj.Service, p proj.Project) Project {
project := Project{
ID: p.ID,
Name: p.Name,
IsActive: projSvc.IsProjectActive(p.ID),
Settings: &ProjectSettings{
Intercept: &InterceptSettings{
RequestsEnabled: p.Settings.InterceptRequests,
ResponsesEnabled: p.Settings.InterceptResponses,
},
},
}
if p.Settings.InterceptRequestFilter != nil {
interceptReqFilter := p.Settings.InterceptRequestFilter.String()
project.Settings.Intercept.RequestFilter = &interceptReqFilter
}
if p.Settings.InterceptResponseFilter != nil {
interceptResFilter := p.Settings.InterceptResponseFilter.String()
project.Settings.Intercept.ResponseFilter = &interceptResFilter
}
return project
}
2020-10-29 19:54:17 +00:00
func stringPtrToRegexp(s *string) (*regexp.Regexp, error) {
if s == nil {
return nil, nil
}
2021-04-25 14:23:53 +00:00
2020-10-29 19:54:17 +00:00
return regexp.Compile(*s)
}
func scopeToScopeRules(rules []scope.Rule) []ScopeRule {
scopeRules := make([]ScopeRule, len(rules))
for i, rule := range rules {
scopeRules[i].URL = regexpToStringPtr(rule.URL)
if rule.Header.Key != nil || rule.Header.Value != nil {
scopeRules[i].Header = &ScopeHeader{
Key: regexpToStringPtr(rule.Header.Key),
Value: regexpToStringPtr(rule.Header.Value),
}
}
2021-04-25 14:23:53 +00:00
2020-10-29 19:54:17 +00:00
scopeRules[i].Body = regexpToStringPtr(rule.Body)
}
2021-04-25 14:23:53 +00:00
2020-10-29 19:54:17 +00:00
return scopeRules
}
func findRequestsFilterFromInput(input *HTTPRequestLogFilterInput) (findFilter reqlog.FindRequestsFilter, err error) {
2020-10-29 19:54:17 +00:00
if input == nil {
return
}
2021-04-25 14:23:53 +00:00
2020-10-29 19:54:17 +00:00
if input.OnlyInScope != nil {
findFilter.OnlyInScope = *input.OnlyInScope
2020-10-29 19:54:17 +00:00
}
2021-04-25 14:23:53 +00:00
if input.SearchExpression != nil && *input.SearchExpression != "" {
expr, err := filter.ParseQuery(*input.SearchExpression)
if err != nil {
2021-04-25 14:23:53 +00:00
return reqlog.FindRequestsFilter{}, fmt.Errorf("could not parse search query: %w", err)
}
2021-04-25 14:23:53 +00:00
findFilter.SearchExpr = expr
}
2020-10-29 19:54:17 +00:00
return
}
func findSenderRequestsFilterFromInput(input *SenderRequestFilterInput) (findFilter sender.FindRequestsFilter, err error) {
2022-02-22 13:10:39 +00:00
if input == nil {
return
}
if input.OnlyInScope != nil {
findFilter.OnlyInScope = *input.OnlyInScope
2022-02-22 13:10:39 +00:00
}
if input.SearchExpression != nil && *input.SearchExpression != "" {
expr, err := filter.ParseQuery(*input.SearchExpression)
2022-02-22 13:10:39 +00:00
if err != nil {
return sender.FindRequestsFilter{}, fmt.Errorf("could not parse search query: %w", err)
}
findFilter.SearchExpr = expr
2022-02-22 13:10:39 +00:00
}
return
}
2020-10-29 19:54:17 +00:00
func findReqFilterToHTTPReqLogFilter(findReqFilter reqlog.FindRequestsFilter) *HTTPRequestLogFilter {
empty := reqlog.FindRequestsFilter{}
if findReqFilter == empty {
return nil
}
2021-04-25 14:23:53 +00:00
2020-10-29 19:54:17 +00:00
httpReqLogFilter := &HTTPRequestLogFilter{
OnlyInScope: findReqFilter.OnlyInScope,
}
2022-01-21 10:45:54 +00:00
if findReqFilter.SearchExpr != nil {
searchExpr := findReqFilter.SearchExpr.String()
httpReqLogFilter.SearchExpression = &searchExpr
}
2020-10-29 19:54:17 +00:00
return httpReqLogFilter
}
2022-02-22 13:10:39 +00:00
func findReqFilterToSenderReqFilter(findReqFilter sender.FindRequestsFilter) *SenderRequestFilter {
empty := sender.FindRequestsFilter{}
if findReqFilter == empty {
return nil
}
senderReqFilter := &SenderRequestFilter{
OnlyInScope: findReqFilter.OnlyInScope,
}
if findReqFilter.SearchExpr != nil {
searchExpr := findReqFilter.SearchExpr.String()
senderReqFilter.SearchExpression = &searchExpr
}
return senderReqFilter
}
func noActiveProjectErr(ctx context.Context) error {
return &gqlerror.Error{
Path: graphql.GetPath(ctx),
Message: "No active project.",
Extensions: map[string]interface{}{
"code": "no_active_project",
},
}
}