| 123456789101112131415161718192021222324252627282930313233343536373839404142434445464748495051525354555657585960616263646566676869707172737475767778798081828384858687888990919293949596979899100101102103104105106107108109110111112113114115116117118119120121122123124125126127128129130131132133134135136137138139140141142143144145146147148149150151152153154155156157158159160161162163164165166167168169170171172173174175176177178179180181182183184185186187188189 | package functionsimport (	"bytes"	"encoding/json"	"fmt"	"io"	"log"	"net/http"	"net/url"	"os"	"os/signal"	"strings"	"github.com/gorilla/websocket"	"github.com/gravitl/netmaker/cli/config"	"github.com/gravitl/netmaker/logger"	"github.com/gravitl/netmaker/models")func ssoLogin(endpoint string) string {	var (		authToken string		interrupt = make(chan os.Signal, 1)		url, _    = url.Parse(endpoint)		socketURL = fmt.Sprintf("wss://%s/api/oauth/headless", url.Host)	)	signal.Notify(interrupt, os.Interrupt)	conn, _, err := websocket.DefaultDialer.Dial(socketURL, nil)	if err != nil {		log.Fatal("error connecting to endpoint ", socketURL, err.Error())	}	defer conn.Close()	_, msg, err := conn.ReadMessage()	if err != nil {		log.Fatal("error reading from server: ", err.Error())	}	fmt.Printf("Please visit:\n %s \n to authenticate\n", string(msg))	done := make(chan struct{})	defer close(done)	go func() {		for {			msgType, msg, err := conn.ReadMessage()			if err != nil {				if msgType < 0 {					done <- struct{}{}					return				}				if !strings.Contains(err.Error(), "normal") {					log.Fatal("read error: ", err.Error())				}				return			}			if msgType == websocket.CloseMessage {				done <- struct{}{}				return			}			if strings.Contains(string(msg), "JWT: ") {				authToken = strings.TrimPrefix(string(msg), "JWT: ")			} else {				logger.Log(0, "Message from server:", string(msg))				return			}		}	}()	for {		select {		case <-done:			return authToken		case <-interrupt:			err := conn.WriteMessage(websocket.CloseMessage, websocket.FormatCloseMessage(websocket.CloseNormalClosure, ""))			if err != nil {				logger.Log(0, "write close:", err.Error())			}			return authToken		}	}}func getAuthToken(ctx config.Context, force bool) string {	if !force && ctx.AuthToken != "" {		return ctx.AuthToken	}	if ctx.SSO {		authToken := ssoLogin(ctx.Endpoint)		config.SetAuthToken(authToken)		return authToken	}	authParams := &models.UserAuthParams{UserName: ctx.Username, Password: ctx.Password}	payload, err := json.Marshal(authParams)	if err != nil {		log.Fatal(err)	}	res, err := http.Post(ctx.Endpoint+"/api/users/adm/authenticate", "application/json", bytes.NewReader(payload))	if err != nil {		log.Fatal(err)	}	resBodyBytes, err := io.ReadAll(res.Body)	if err != nil {		log.Fatalf("Client could not read response body: %s", err)	}	if res.StatusCode != http.StatusOK {		log.Fatalf("Error Status: %d Response: %s", res.StatusCode, string(resBodyBytes))	}	body := new(models.SuccessResponse)	if err := json.Unmarshal(resBodyBytes, body); err != nil {		log.Fatalf("Error unmarshalling JSON: %s", err)	}	authToken := body.Response.(map[string]any)["AuthToken"].(string)	config.SetAuthToken(authToken)	return authToken}func request[T any](method, route string, payload any) *T {	var (		_, ctx = config.GetCurrentContext()		req    *http.Request		err    error	)	if payload == nil {		req, err = http.NewRequest(method, ctx.Endpoint+route, nil)		if err != nil {			log.Fatalf("Client could not create request: %s", err)		}	} else {		payloadBytes, jsonErr := json.Marshal(payload)		if jsonErr != nil {			log.Fatalf("Error in request JSON marshalling: %s", err)		}		req, err = http.NewRequest(method, ctx.Endpoint+route, bytes.NewReader(payloadBytes))		if err != nil {			log.Fatalf("Client could not create request: %s", err)		}		req.Header.Set("Content-Type", "application/json")	}	if ctx.MasterKey != "" {		req.Header.Set("Authorization", "Bearer "+ctx.MasterKey)	} else {		req.Header.Set("Authorization", "Bearer "+getAuthToken(ctx, false))	}	retried := falseretry:	res, err := http.DefaultClient.Do(req)	if err != nil {		log.Fatalf("Client error making http request: %s", err)	}	// refresh JWT token	if res.StatusCode == http.StatusUnauthorized && !retried && ctx.MasterKey == "" {		req.Header.Set("Authorization", "Bearer "+getAuthToken(ctx, true))		retried = true		goto retry	}	resBodyBytes, err := io.ReadAll(res.Body)	if err != nil {		log.Fatalf("Client could not read response body: %s", err)	}	if res.StatusCode != http.StatusOK {		log.Fatalf("Error Status: %d Response: %s", res.StatusCode, string(resBodyBytes))	}	body := new(T)	if len(resBodyBytes) > 0 {		if err := json.Unmarshal(resBodyBytes, body); err != nil {			log.Fatalf("Error unmarshalling JSON: %s", err)		}	}	return body}func get(route string) string {	_, ctx := config.GetCurrentContext()	req, err := http.NewRequest(http.MethodGet, ctx.Endpoint+route, nil)	if err != nil {		log.Fatal(err)	}	if ctx.MasterKey != "" {		req.Header.Set("Authorization", "Bearer "+ctx.MasterKey)	} else {		req.Header.Set("Authorization", "Bearer "+getAuthToken(ctx, true))	}	res, err := http.DefaultClient.Do(req)	if err != nil {		log.Fatal(err)	}	bodyBytes, err := io.ReadAll(res.Body)	if err != nil {		log.Fatal(err)	}	return string(bodyBytes)}
 |