backend/helpers/pluginhelper/api/api_client.go (409 lines of code) (raw):

/* Licensed to the Apache Software Foundation (ASF) under one or more contributor license agreements. See the NOTICE file distributed with this work for additional information regarding copyright ownership. The ASF licenses this file to You under the Apache License, Version 2.0 (the "License"); you may not use this file except in compliance with the License. You may obtain a copy of the License at http://www.apache.org/licenses/LICENSE-2.0 Unless required by applicable law or agreed to in writing, software distributed under the License is distributed on an "AS IS" BASIS, WITHOUT WARRANTIES OR CONDITIONS OF ANY KIND, either express or implied. See the License for the specific language governing permissions and limitations under the License. */ package api import ( "bytes" gocontext "context" "crypto/tls" "encoding/json" "encoding/xml" "fmt" "io" "net" "net/http" "net/url" "reflect" "regexp" "strings" "sync" "time" "unicode/utf8" "github.com/apache/incubator-devlake/core/plugin" "github.com/apache/incubator-devlake/core/context" "github.com/apache/incubator-devlake/core/errors" "github.com/apache/incubator-devlake/core/log" "github.com/apache/incubator-devlake/core/utils" ) // ErrIgnoreAndContinue is a error which should be ignored var ( ErrIgnoreAndContinue = errors.Default.New("ignore and continue") ErrEmptyResponse = errors.Default.New("empty response") ErrRedirectionNotAllowed = errors.BadInput.New("redirection is not allowed") ErrInvalidURL = errors.Default.New("Invalid URL") ErrInvalidCIDR = errors.Default.New("Invalid CIDR") ErrHostNotAllowed = errors.Default.New("Host is not allowed") _ plugin.ApiClient = (*ApiClient)(nil) ) // ApiClient is designed for simple api requests type ApiClient struct { client *http.Client endpoint string headers map[string]string data map[string]interface{} data_mutex sync.Mutex authFunc plugin.ApiClientBeforeRequest beforeRequest plugin.ApiClientBeforeRequest afterResponse plugin.ApiClientAfterResponse ctx gocontext.Context logger log.Logger } // NewApiClientFromConnection creates ApiClient based on given connection. func NewApiClientFromConnection( ctx gocontext.Context, br context.BasicRes, connection plugin.ApiConnection, ) (*ApiClient, errors.Error) { if reflect.ValueOf(connection).Kind() != reflect.Ptr { panic(fmt.Errorf("connection is not a pointer")) } apiClient, err := NewApiClient(ctx, connection.GetEndpoint(), nil, 0, connection.GetProxy(), br) if err != nil { return nil, err } // if connection needs to prepare the ApiClient, i.e. fetch token for future requests if prepareApiClient, ok := connection.(plugin.PrepareApiClient); ok { err = prepareApiClient.PrepareApiClient(apiClient) if err != nil { return nil, err } } // if connection requires authorization if authenticator, ok := connection.(plugin.ApiAuthenticator); ok { apiClient.SetAuthFunction(func(req *http.Request) errors.Error { return authenticator.SetupAuthentication(req) }) } return apiClient, nil } // NewApiClient creates a new synchronize ApiClient func NewApiClient( ctx gocontext.Context, endpoint string, headers map[string]string, timeout time.Duration, proxy string, br context.BasicRes, ) (*ApiClient, errors.Error) { cfg := br.GetConfigReader() log := br.GetLogger() // endpoint blacklist endpointCidrBlacklist := cfg.GetString("ENDPOINT_CIDR_BLACKLIST") if endpointCidrBlacklist != "" { err := checkCidrBlacklist(endpointCidrBlacklist, endpoint, log) if err != nil { return nil, err } } apiClient := &ApiClient{} apiClient.Setup( endpoint, headers, timeout, ) // create the Transport apiClient.client.Transport = &http.Transport{} // set insecureSkipVerify insecureSkipVerify := cfg.GetBool("IN_SECURE_SKIP_VERIFY") if insecureSkipVerify { apiClient.client.Transport.(*http.Transport).TLSClientConfig = &tls.Config{InsecureSkipVerify: true} } if proxy != "" { err := apiClient.SetProxy(proxy) if err != nil { return nil, errors.Convert(err) } // check connectivity res, err := apiClient.Get("/", nil, nil) if err != nil { return nil, err } if res.StatusCode == http.StatusBadGateway { return nil, errors.BadInput.New(fmt.Sprintf("fail to connect to %v via %v", endpoint, proxy)) } } else { // check connectivity parsedUrl, err := url.Parse(endpoint) if err != nil { return nil, errors.BadInput.Wrap(err, fmt.Sprintf("Invalid URL: %s", endpoint)) } if parsedUrl.Scheme == "" { return nil, errors.BadInput.New("Invalid URL scheme") } err = utils.CheckDNS(parsedUrl.Hostname()) if err != nil { return nil, errors.Default.Wrap(err, "Failed to resolve DNS") } port, err := utils.ResolvePort(parsedUrl.Port(), parsedUrl.Scheme) if err != nil { return nil, errors.Default.New("Failed to resolve Port") } err = utils.CheckNetwork(parsedUrl.Hostname(), port, 10*time.Second) if err != nil { return nil, errors.Default.Wrap(err, "Failed to connect") } } apiClient.SetContext(ctx) // apply global security settings forbidRedirection := cfg.GetBool("FORBID_REDIRECTION") if forbidRedirection { apiClient.client.CheckRedirect = func(req *http.Request, via []*http.Request) error { return ErrRedirectionNotAllowed } } return apiClient, nil } // Setup FIXME ... func (apiClient *ApiClient) Setup( endpoint string, headers map[string]string, timeout time.Duration, ) { apiClient.client = &http.Client{Timeout: timeout} apiClient.SetEndpoint(endpoint) apiClient.SetHeaders(headers) apiClient.data = map[string]interface{}{} } // SetEndpoint FIXME ... func (apiClient *ApiClient) SetEndpoint(endpoint string) { apiClient.endpoint = endpoint } // GetEndpoint FIXME ... func (apiClient *ApiClient) GetEndpoint() string { return apiClient.endpoint } // SetTimeout FIXME ... func (apiClient *ApiClient) SetTimeout(timeout time.Duration) { apiClient.client.Timeout = timeout } // GetTimeout FIXME ... func (apiClient *ApiClient) GetTimeout() time.Duration { return apiClient.client.Timeout } // SetData FIXME ... func (apiClient *ApiClient) SetData(name string, data interface{}) { apiClient.data_mutex.Lock() defer apiClient.data_mutex.Unlock() apiClient.data[name] = data } // GetData FIXME ... func (apiClient *ApiClient) GetData(name string) interface{} { apiClient.data_mutex.Lock() defer apiClient.data_mutex.Unlock() data := apiClient.data[name] return data } // SetHeaders FIXME ... func (apiClient *ApiClient) SetHeaders(headers map[string]string) { apiClient.headers = headers } // GetHeaders FIXME ... func (apiClient *ApiClient) GetHeaders() map[string]string { return apiClient.headers } // GetBeforeFunction return beforeResponseFunction func (apiClient *ApiClient) GetBeforeFunction() plugin.ApiClientBeforeRequest { return apiClient.beforeRequest } // SetBeforeFunction will set beforeResponseFunction func (apiClient *ApiClient) SetBeforeFunction(callback plugin.ApiClientBeforeRequest) { apiClient.beforeRequest = callback } // GetAuthFunction func (apiClient *ApiClient) GetAuthFunction() plugin.ApiClientBeforeRequest { return apiClient.authFunc } // SetAuthFunction func (apiClient *ApiClient) SetAuthFunction(callback plugin.ApiClientBeforeRequest) { apiClient.authFunc = callback } // GetAfterFunction return afterResponseFunction func (apiClient *ApiClient) GetAfterFunction() plugin.ApiClientAfterResponse { return apiClient.afterResponse } // SetAfterFunction will set afterResponseFunction // don't call this function directly in collector, use Collector.AfterResponse instead. func (apiClient *ApiClient) SetAfterFunction(callback plugin.ApiClientAfterResponse) { apiClient.afterResponse = callback } // SetContext FIXME ... func (apiClient *ApiClient) SetContext(ctx gocontext.Context) { apiClient.ctx = ctx } // SetProxy FIXME ... func (apiClient *ApiClient) SetProxy(proxyUrl string) errors.Error { pu, err := url.Parse(proxyUrl) if err != nil { return errors.Convert(err) } if pu.Scheme == "http" || pu.Scheme == "socks5" { apiClient.client.Transport.(*http.Transport).Proxy = http.ProxyURL(pu) } return nil } // SetLogger FIXME ... func (apiClient *ApiClient) SetLogger(logger log.Logger) { apiClient.logger = logger } func (apiClient *ApiClient) logDebug(format string, a ...interface{}) { if apiClient.logger != nil { apiClient.logger.Debug(format, a...) } } func (apiClient *ApiClient) logError(err error, format string, a ...interface{}) { if apiClient.logger != nil { apiClient.logger.Error(err, format, a...) } } // Do FIXME ... func (apiClient *ApiClient) Do( method string, path string, query url.Values, body interface{}, headers http.Header, ) (*http.Response, errors.Error) { uri, err := GetURIStringPointer(apiClient.endpoint, path, query) if err != nil { return nil, errors.Default.Wrap(err, fmt.Sprintf("Unable to construct URI from %s, %s, %s", apiClient.endpoint, path, query)) } // process body var reqBody io.Reader if body != nil { reqJson, err := json.Marshal(body) if err != nil { return nil, errors.Default.Wrap(err, fmt.Sprintf("unable to serialize API request body for %s", *uri)) } reqBody = bytes.NewBuffer(reqJson) } var req *http.Request if apiClient.ctx != nil { req, err = errors.Convert01(http.NewRequestWithContext(apiClient.ctx, method, *uri, reqBody)) } else { req, err = errors.Convert01(http.NewRequest(method, *uri, reqBody)) } if err != nil { return nil, errors.Default.Wrap(err, fmt.Sprintf("unable to create API request for %s", *uri)) } req.Header.Set("Content-Type", "application/json") // populate headers if apiClient.headers != nil { for name, value := range apiClient.headers { req.Header.Set(name, value) } } for name, values := range headers { for _, value := range values { req.Header.Add(name, value) } } var res *http.Response // authFunc if apiClient.authFunc != nil { err = apiClient.authFunc(req) if err != nil { apiClient.logError(err, "[api-client] authFunc returned error for %s", req.URL.String()) return nil, err } } // before send if apiClient.beforeRequest != nil { err = apiClient.beforeRequest(req) if err != nil { apiClient.logError(err, "[api-client] beforeRequest returned error for %s", req.URL.String()) return nil, err } } apiClient.logDebug("[api-client] %v %v", method, *uri) res, err = errors.Convert01(apiClient.client.Do(req)) if err != nil { apiClient.logError(err, "[api-client] failed to request %s with error", req.URL.String()) return nil, err } // after receive if apiClient.afterResponse != nil { err = apiClient.afterResponse(res) if err == ErrIgnoreAndContinue { res.Body.Close() return res, err } if err != nil { res.Body.Close() apiClient.logError(err, "[api-client] afterResponse returned error for %s", req.URL.String()) return nil, err } } return res, nil } // Get FIXME ... func (apiClient *ApiClient) Get( path string, query url.Values, headers http.Header, ) (*http.Response, errors.Error) { return apiClient.Do(http.MethodGet, path, query, nil, headers) } // Post FIXME ... func (apiClient *ApiClient) Post( path string, query url.Values, body interface{}, headers http.Header, ) (*http.Response, errors.Error) { return apiClient.Do(http.MethodPost, path, query, body, headers) } // UnmarshalResponse FIXME ... func UnmarshalResponse(res *http.Response, v interface{}) errors.Error { defer res.Body.Close() resBody, err := io.ReadAll(res.Body) if err != nil { return errors.Default.Wrap(err, fmt.Sprintf("error reading response from %s", res.Request.URL.String())) } if len(resBody) == 0 { return ErrEmptyResponse } err = errors.Convert(json.Unmarshal(resBody, &v)) if err != nil { statusCode := res.StatusCode if statusCode == http.StatusUnauthorized || statusCode == http.StatusForbidden { statusCode = http.StatusBadRequest // to avoid Basic Auth Dialog poping up } return errors.HttpStatus(statusCode).Wrap(err, fmt.Sprintf("error decoding response from %s: raw response: %s", res.Request.URL.String(), string(resBody))) } return nil } // UnmarshalResponseXML FIXME ... func UnmarshalResponseXML(res *http.Response, v interface{}) errors.Error { defer res.Body.Close() resBody, err := io.ReadAll(res.Body) if err != nil { return errors.Default.Wrap(err, fmt.Sprintf("error reading response from %s", res.Request.URL.String())) } err = errors.Convert(xml.Unmarshal(resBody, &v)) if err != nil { return errors.Default.Wrap(err, fmt.Sprintf("error decoding XML response from %s: raw response: %s", res.Request.URL.String(), string(resBody))) } return nil } // GetURIStringPointer FIXME ... func GetURIStringPointer(baseUrl string, relativePath string, query url.Values) (*string, errors.Error) { // If the base URL doesn't end with a slash, and has a relative path attached // the values will be removed by the Go package, therefore we need to add a missing slash. AddMissingSlashToURL(&baseUrl) base, err := url.Parse(baseUrl) if err != nil { return nil, errors.Convert(err) } // If the relative path starts with a '/', we need to remove it or the values will be removed by the Go package. relativePath = RemoveStartingSlashFromPath(relativePath) u, err := url.Parse(relativePath) if err != nil { return nil, errors.Convert(err) } if query != nil { queryString := u.Query() for key, values := range query { for _, v := range values { queryString.Add(key, v) } } u.RawQuery = queryString.Encode() } uri := base.ResolveReference(u).String() return &uri, nil } // AddMissingSlashToURL FIXME ... func AddMissingSlashToURL(baseUrl *string) { pattern := `\/$` isMatch, _ := regexp.Match(pattern, []byte(*baseUrl)) if !isMatch { *baseUrl += "/" } } // RemoveStartingSlashFromPath FIXME ... func RemoveStartingSlashFromPath(relativePath string) string { pattern := `^\/` byteArrayOfPath := []byte(relativePath) isMatch, _ := regexp.Match(pattern, byteArrayOfPath) if isMatch { // Remove the slash. // This is basically the trimFirstRune function found: https://stackoverflow.com/questions/48798588/how-do-you-remove-the-first-character-of-a-string/48798712 _, i := utf8.DecodeRuneInString(relativePath) return relativePath[i:] } return relativePath } func checkCidrBlacklist(blacklist, endpoint string, log log.Logger) errors.Error { // only if blacklist is given and the host of the endpoint is an IP address parsedEp, err := url.Parse(endpoint) if err != nil { return ErrInvalidURL } endpointHost := parsedEp.Hostname() if endpointHost == "" { return ErrInvalidURL } endpointIp := net.ParseIP(endpointHost) if endpointIp != nil { // check if the IP is in the blacklist cidrs := strings.Split(blacklist, ",") for _, cidr := range cidrs { // CIDR format : 10.0.0.1/24 // check the net.ParseCIDR for details cidr = strings.TrimSpace(cidr) _, ipnet, err := net.ParseCIDR(cidr) if err != nil { // the CIDR is invalid log.Error(err, "Invalid CIDR", "cidr", cidr) return ErrInvalidCIDR } if ipnet.Contains(endpointIp) { return ErrHostNotAllowed } } } return nil }