12345678910111213141516171819202122232425262728293031323334353637383940414243444546474849505152535455565758596061626364656667686970717273747576777879808182838485868788899091929394 |
- package functions
- import (
- "bytes"
- "encoding/json"
- "io"
- "log"
- "net/http"
- "github.com/gravitl/netmaker/cli/config"
- "github.com/gravitl/netmaker/models"
- )
- func getAuthToken(ctx config.Context, force bool) string {
- if !force && ctx.AuthToken != "" {
- return ctx.AuthToken
- }
- authParams := &models.UserAuthParams{UserName: ctx.Username, Password: ctx.Password}
- payload, err := json.Marshal(authParams)
- if err != nil {
- log.Fatal(err)
- }
- res, err := http.Post(ctx.Endpoint+"/api/users/adm/authenticate", "application/json", bytes.NewReader(payload))
- if err != nil {
- log.Fatal(err)
- }
- resBodyBytes, err := io.ReadAll(res.Body)
- if err != nil {
- log.Fatalf("Client could not read response body: %s", err)
- }
- if res.StatusCode != http.StatusOK {
- log.Fatalf("Error response: %s", string(resBodyBytes))
- }
- body := new(models.SuccessResponse)
- if err := json.Unmarshal(resBodyBytes, body); err != nil {
- log.Fatalf("Error unmarshalling JSON: %s", err)
- }
- authToken := body.Response.(map[string]any)["AuthToken"].(string)
- config.SetAuthToken(authToken)
- return authToken
- }
- func request[T any](method, route string, payload any) *T {
- var (
- _, ctx = config.GetCurrentContext()
- req *http.Request
- err error
- )
- if payload == nil {
- req, err = http.NewRequest(method, ctx.Endpoint+route, nil)
- if err != nil {
- log.Fatalf("Client could not create request: %s", err)
- }
- } else {
- payloadBytes, jsonErr := json.Marshal(payload)
- if jsonErr != nil {
- log.Fatalf("Error in request JSON marshalling: %s", err)
- }
- req, err = http.NewRequest(method, ctx.Endpoint+route, bytes.NewReader(payloadBytes))
- if err != nil {
- log.Fatalf("Client could not create request: %s", err)
- }
- req.Header.Set("Content-Type", "application/json")
- }
- if ctx.MasterKey != "" {
- req.Header.Set("Authorization", "Bearer "+ctx.MasterKey)
- } else {
- req.Header.Set("Authorization", "Bearer "+getAuthToken(ctx, false))
- }
- retry:
- res, err := http.DefaultClient.Do(req)
- if err != nil {
- log.Fatalf("Client error making http request: %s", err)
- }
- // refresh JWT token
- if res.StatusCode == http.StatusUnauthorized {
- req.Header.Set("Authorization", "Bearer "+getAuthToken(ctx, true))
- goto retry
- }
- resBodyBytes, err := io.ReadAll(res.Body)
- if err != nil {
- log.Fatalf("Client could not read response body: %s", err)
- }
- if res.StatusCode != http.StatusOK {
- log.Fatalf("Error Status: %d Response: %s", http.StatusOK, string(resBodyBytes))
- }
- body := new(T)
- if len(resBodyBytes) > 0 {
- if err := json.Unmarshal(resBodyBytes, body); err != nil {
- log.Fatalf("Error unmarshalling JSON: %s", err)
- }
- }
- return body
- }
|