2024-11-26 01:22:45 +00:00
|
|
|
// Code generated by ogen, DO NOT EDIT.
|
|
|
|
|
|
|
|
package api
|
|
|
|
|
|
|
|
import (
|
|
|
|
"context"
|
|
|
|
"net/http"
|
|
|
|
"time"
|
|
|
|
|
|
|
|
"github.com/go-faster/errors"
|
|
|
|
"go.opentelemetry.io/otel/attribute"
|
|
|
|
"go.opentelemetry.io/otel/codes"
|
|
|
|
"go.opentelemetry.io/otel/metric"
|
2024-11-26 20:39:10 +00:00
|
|
|
semconv "go.opentelemetry.io/otel/semconv/v1.26.0"
|
2024-11-26 01:22:45 +00:00
|
|
|
"go.opentelemetry.io/otel/trace"
|
|
|
|
|
|
|
|
ht "github.com/ogen-go/ogen/http"
|
|
|
|
"github.com/ogen-go/ogen/middleware"
|
|
|
|
"github.com/ogen-go/ogen/ogenerrors"
|
|
|
|
"github.com/ogen-go/ogen/otelogen"
|
|
|
|
)
|
|
|
|
|
2024-12-06 00:36:15 +00:00
|
|
|
type codeRecorder struct {
|
|
|
|
http.ResponseWriter
|
|
|
|
status int
|
|
|
|
}
|
|
|
|
|
|
|
|
func (c *codeRecorder) WriteHeader(status int) {
|
|
|
|
c.status = status
|
|
|
|
c.ResponseWriter.WriteHeader(status)
|
|
|
|
}
|
|
|
|
|
2024-11-28 01:46:54 +00:00
|
|
|
// handleActionSubmissionPublishRequest handles actionSubmissionPublish operation.
|
|
|
|
//
|
|
|
|
// Role Validator changes status from Publishing -> Published.
|
|
|
|
//
|
|
|
|
// PATCH /submissions/{SubmissionID}/status/publish
|
|
|
|
func (s *Server) handleActionSubmissionPublishRequest(args [1]string, argsEscaped bool, w http.ResponseWriter, r *http.Request) {
|
2024-12-06 00:36:15 +00:00
|
|
|
statusWriter := &codeRecorder{ResponseWriter: w}
|
|
|
|
w = statusWriter
|
2024-11-28 01:46:54 +00:00
|
|
|
otelAttrs := []attribute.KeyValue{
|
|
|
|
otelogen.OperationID("actionSubmissionPublish"),
|
|
|
|
semconv.HTTPRequestMethodKey.String("PATCH"),
|
|
|
|
semconv.HTTPRouteKey.String("/submissions/{SubmissionID}/status/publish"),
|
|
|
|
}
|
|
|
|
|
|
|
|
// Start a span for this request.
|
2024-11-29 22:33:48 +00:00
|
|
|
ctx, span := s.cfg.Tracer.Start(r.Context(), ActionSubmissionPublishOperation,
|
2024-11-28 01:46:54 +00:00
|
|
|
trace.WithAttributes(otelAttrs...),
|
|
|
|
serverSpanKind,
|
|
|
|
)
|
|
|
|
defer span.End()
|
|
|
|
|
|
|
|
// Add Labeler to context.
|
|
|
|
labeler := &Labeler{attrs: otelAttrs}
|
|
|
|
ctx = contextWithLabeler(ctx, labeler)
|
|
|
|
|
|
|
|
// Run stopwatch.
|
|
|
|
startTime := time.Now()
|
|
|
|
defer func() {
|
|
|
|
elapsedDuration := time.Since(startTime)
|
2024-12-06 00:36:15 +00:00
|
|
|
|
|
|
|
attrSet := labeler.AttributeSet()
|
|
|
|
attrs := attrSet.ToSlice()
|
|
|
|
code := statusWriter.status
|
|
|
|
if code != 0 {
|
|
|
|
codeAttr := semconv.HTTPResponseStatusCode(code)
|
|
|
|
attrs = append(attrs, codeAttr)
|
|
|
|
span.SetAttributes(codeAttr)
|
|
|
|
}
|
|
|
|
attrOpt := metric.WithAttributes(attrs...)
|
2024-11-28 01:46:54 +00:00
|
|
|
|
|
|
|
// Increment request counter.
|
|
|
|
s.requests.Add(ctx, 1, attrOpt)
|
|
|
|
|
|
|
|
// Use floating point division here for higher precision (instead of Millisecond method).
|
2024-12-06 00:36:15 +00:00
|
|
|
s.duration.Record(ctx, float64(elapsedDuration)/float64(time.Millisecond), attrOpt)
|
2024-11-28 01:46:54 +00:00
|
|
|
}()
|
|
|
|
|
|
|
|
var (
|
|
|
|
recordError = func(stage string, err error) {
|
|
|
|
span.RecordError(err)
|
2024-12-06 00:36:15 +00:00
|
|
|
|
|
|
|
// https://opentelemetry.io/docs/specs/semconv/http/http-spans/#status
|
|
|
|
// Span Status MUST be left unset if HTTP status code was in the 1xx, 2xx or 3xx ranges,
|
|
|
|
// unless there was another error (e.g., network error receiving the response body; or 3xx codes with
|
|
|
|
// max redirects exceeded), in which case status MUST be set to Error.
|
|
|
|
code := statusWriter.status
|
|
|
|
if code >= 100 && code < 500 {
|
|
|
|
span.SetStatus(codes.Error, stage)
|
|
|
|
}
|
|
|
|
|
|
|
|
attrSet := labeler.AttributeSet()
|
|
|
|
attrs := attrSet.ToSlice()
|
|
|
|
if code != 0 {
|
|
|
|
attrs = append(attrs, semconv.HTTPResponseStatusCode(code))
|
|
|
|
}
|
|
|
|
|
|
|
|
s.errors.Add(ctx, 1, metric.WithAttributes(attrs...))
|
2024-11-28 01:46:54 +00:00
|
|
|
}
|
|
|
|
err error
|
|
|
|
opErrContext = ogenerrors.OperationContext{
|
2024-11-29 22:33:48 +00:00
|
|
|
Name: ActionSubmissionPublishOperation,
|
2024-11-28 01:46:54 +00:00
|
|
|
ID: "actionSubmissionPublish",
|
|
|
|
}
|
|
|
|
)
|
2024-11-29 22:33:48 +00:00
|
|
|
{
|
|
|
|
type bitset = [1]uint8
|
|
|
|
var satisfied bitset
|
|
|
|
{
|
|
|
|
sctx, ok, err := s.securityCookieAuth(ctx, ActionSubmissionPublishOperation, r)
|
|
|
|
if err != nil {
|
|
|
|
err = &ogenerrors.SecurityError{
|
|
|
|
OperationContext: opErrContext,
|
|
|
|
Security: "CookieAuth",
|
|
|
|
Err: err,
|
|
|
|
}
|
|
|
|
if encodeErr := encodeErrorResponse(s.h.NewError(ctx, err), w, span); encodeErr != nil {
|
|
|
|
defer recordError("Security:CookieAuth", err)
|
|
|
|
}
|
|
|
|
return
|
|
|
|
}
|
|
|
|
if ok {
|
|
|
|
satisfied[0] |= 1 << 0
|
|
|
|
ctx = sctx
|
|
|
|
}
|
|
|
|
}
|
|
|
|
|
|
|
|
if ok := func() bool {
|
|
|
|
nextRequirement:
|
|
|
|
for _, requirement := range []bitset{
|
|
|
|
{0b00000001},
|
|
|
|
} {
|
|
|
|
for i, mask := range requirement {
|
|
|
|
if satisfied[i]&mask != mask {
|
|
|
|
continue nextRequirement
|
|
|
|
}
|
|
|
|
}
|
|
|
|
return true
|
|
|
|
}
|
|
|
|
return false
|
|
|
|
}(); !ok {
|
|
|
|
err = &ogenerrors.SecurityError{
|
|
|
|
OperationContext: opErrContext,
|
|
|
|
Err: ogenerrors.ErrSecurityRequirementIsNotSatisfied,
|
|
|
|
}
|
|
|
|
if encodeErr := encodeErrorResponse(s.h.NewError(ctx, err), w, span); encodeErr != nil {
|
|
|
|
defer recordError("Security", err)
|
|
|
|
}
|
|
|
|
return
|
|
|
|
}
|
|
|
|
}
|
2024-11-28 01:46:54 +00:00
|
|
|
params, err := decodeActionSubmissionPublishParams(args, argsEscaped, r)
|
|
|
|
if err != nil {
|
|
|
|
err = &ogenerrors.DecodeParamsError{
|
|
|
|
OperationContext: opErrContext,
|
|
|
|
Err: err,
|
|
|
|
}
|
|
|
|
defer recordError("DecodeParams", err)
|
|
|
|
s.cfg.ErrorHandler(ctx, w, r, err)
|
|
|
|
return
|
|
|
|
}
|
|
|
|
|
|
|
|
var response *ActionSubmissionPublishOK
|
|
|
|
if m := s.cfg.Middleware; m != nil {
|
|
|
|
mreq := middleware.Request{
|
|
|
|
Context: ctx,
|
2024-11-29 22:33:48 +00:00
|
|
|
OperationName: ActionSubmissionPublishOperation,
|
2024-11-28 01:46:54 +00:00
|
|
|
OperationSummary: "Role Validator changes status from Publishing -> Published",
|
|
|
|
OperationID: "actionSubmissionPublish",
|
|
|
|
Body: nil,
|
|
|
|
Params: middleware.Parameters{
|
|
|
|
{
|
|
|
|
Name: "SubmissionID",
|
|
|
|
In: "path",
|
|
|
|
}: params.SubmissionID,
|
|
|
|
},
|
|
|
|
Raw: r,
|
|
|
|
}
|
|
|
|
|
|
|
|
type (
|
|
|
|
Request = struct{}
|
|
|
|
Params = ActionSubmissionPublishParams
|
|
|
|
Response = *ActionSubmissionPublishOK
|
|
|
|
)
|
|
|
|
response, err = middleware.HookMiddleware[
|
|
|
|
Request,
|
|
|
|
Params,
|
|
|
|
Response,
|
|
|
|
](
|
|
|
|
m,
|
|
|
|
mreq,
|
|
|
|
unpackActionSubmissionPublishParams,
|
|
|
|
func(ctx context.Context, request Request, params Params) (response Response, err error) {
|
|
|
|
err = s.h.ActionSubmissionPublish(ctx, params)
|
|
|
|
return response, err
|
|
|
|
},
|
|
|
|
)
|
|
|
|
} else {
|
|
|
|
err = s.h.ActionSubmissionPublish(ctx, params)
|
|
|
|
}
|
|
|
|
if err != nil {
|
|
|
|
if errRes, ok := errors.Into[*ErrorStatusCode](err); ok {
|
|
|
|
if err := encodeErrorResponse(errRes, w, span); err != nil {
|
|
|
|
defer recordError("Internal", err)
|
|
|
|
}
|
|
|
|
return
|
|
|
|
}
|
|
|
|
if errors.Is(err, ht.ErrNotImplemented) {
|
|
|
|
s.cfg.ErrorHandler(ctx, w, r, err)
|
|
|
|
return
|
|
|
|
}
|
|
|
|
if err := encodeErrorResponse(s.h.NewError(ctx, err), w, span); err != nil {
|
|
|
|
defer recordError("Internal", err)
|
|
|
|
}
|
|
|
|
return
|
|
|
|
}
|
|
|
|
|
|
|
|
if err := encodeActionSubmissionPublishResponse(response, w, span); err != nil {
|
|
|
|
defer recordError("EncodeResponse", err)
|
|
|
|
if !errors.Is(err, ht.ErrInternalServerErrorResponse) {
|
|
|
|
s.cfg.ErrorHandler(ctx, w, r, err)
|
|
|
|
}
|
|
|
|
return
|
|
|
|
}
|
|
|
|
}
|
|
|
|
|
|
|
|
// handleActionSubmissionRejectRequest handles actionSubmissionReject operation.
|
|
|
|
//
|
|
|
|
// Role Reviewer changes status from Submitted -> Rejected.
|
|
|
|
//
|
|
|
|
// PATCH /submissions/{SubmissionID}/status/reject
|
|
|
|
func (s *Server) handleActionSubmissionRejectRequest(args [1]string, argsEscaped bool, w http.ResponseWriter, r *http.Request) {
|
2024-12-06 00:36:15 +00:00
|
|
|
statusWriter := &codeRecorder{ResponseWriter: w}
|
|
|
|
w = statusWriter
|
2024-11-28 01:46:54 +00:00
|
|
|
otelAttrs := []attribute.KeyValue{
|
|
|
|
otelogen.OperationID("actionSubmissionReject"),
|
|
|
|
semconv.HTTPRequestMethodKey.String("PATCH"),
|
|
|
|
semconv.HTTPRouteKey.String("/submissions/{SubmissionID}/status/reject"),
|
|
|
|
}
|
|
|
|
|
|
|
|
// Start a span for this request.
|
2024-11-29 22:33:48 +00:00
|
|
|
ctx, span := s.cfg.Tracer.Start(r.Context(), ActionSubmissionRejectOperation,
|
2024-11-28 01:46:54 +00:00
|
|
|
trace.WithAttributes(otelAttrs...),
|
|
|
|
serverSpanKind,
|
|
|
|
)
|
|
|
|
defer span.End()
|
|
|
|
|
|
|
|
// Add Labeler to context.
|
|
|
|
labeler := &Labeler{attrs: otelAttrs}
|
|
|
|
ctx = contextWithLabeler(ctx, labeler)
|
|
|
|
|
|
|
|
// Run stopwatch.
|
|
|
|
startTime := time.Now()
|
|
|
|
defer func() {
|
|
|
|
elapsedDuration := time.Since(startTime)
|
2024-12-06 00:36:15 +00:00
|
|
|
|
|
|
|
attrSet := labeler.AttributeSet()
|
|
|
|
attrs := attrSet.ToSlice()
|
|
|
|
code := statusWriter.status
|
|
|
|
if code != 0 {
|
|
|
|
codeAttr := semconv.HTTPResponseStatusCode(code)
|
|
|
|
attrs = append(attrs, codeAttr)
|
|
|
|
span.SetAttributes(codeAttr)
|
|
|
|
}
|
|
|
|
attrOpt := metric.WithAttributes(attrs...)
|
2024-11-28 01:46:54 +00:00
|
|
|
|
|
|
|
// Increment request counter.
|
|
|
|
s.requests.Add(ctx, 1, attrOpt)
|
|
|
|
|
|
|
|
// Use floating point division here for higher precision (instead of Millisecond method).
|
2024-12-06 00:36:15 +00:00
|
|
|
s.duration.Record(ctx, float64(elapsedDuration)/float64(time.Millisecond), attrOpt)
|
2024-11-28 01:46:54 +00:00
|
|
|
}()
|
|
|
|
|
|
|
|
var (
|
|
|
|
recordError = func(stage string, err error) {
|
|
|
|
span.RecordError(err)
|
2024-12-06 00:36:15 +00:00
|
|
|
|
|
|
|
// https://opentelemetry.io/docs/specs/semconv/http/http-spans/#status
|
|
|
|
// Span Status MUST be left unset if HTTP status code was in the 1xx, 2xx or 3xx ranges,
|
|
|
|
// unless there was another error (e.g., network error receiving the response body; or 3xx codes with
|
|
|
|
// max redirects exceeded), in which case status MUST be set to Error.
|
|
|
|
code := statusWriter.status
|
|
|
|
if code >= 100 && code < 500 {
|
|
|
|
span.SetStatus(codes.Error, stage)
|
|
|
|
}
|
|
|
|
|
|
|
|
attrSet := labeler.AttributeSet()
|
|
|
|
attrs := attrSet.ToSlice()
|
|
|
|
if code != 0 {
|
|
|
|
attrs = append(attrs, semconv.HTTPResponseStatusCode(code))
|
|
|
|
}
|
|
|
|
|
|
|
|
s.errors.Add(ctx, 1, metric.WithAttributes(attrs...))
|
2024-11-28 01:46:54 +00:00
|
|
|
}
|
|
|
|
err error
|
|
|
|
opErrContext = ogenerrors.OperationContext{
|
2024-11-29 22:33:48 +00:00
|
|
|
Name: ActionSubmissionRejectOperation,
|
2024-11-28 01:46:54 +00:00
|
|
|
ID: "actionSubmissionReject",
|
|
|
|
}
|
|
|
|
)
|
2024-11-29 22:33:48 +00:00
|
|
|
{
|
|
|
|
type bitset = [1]uint8
|
|
|
|
var satisfied bitset
|
|
|
|
{
|
|
|
|
sctx, ok, err := s.securityCookieAuth(ctx, ActionSubmissionRejectOperation, r)
|
|
|
|
if err != nil {
|
|
|
|
err = &ogenerrors.SecurityError{
|
|
|
|
OperationContext: opErrContext,
|
|
|
|
Security: "CookieAuth",
|
|
|
|
Err: err,
|
|
|
|
}
|
|
|
|
if encodeErr := encodeErrorResponse(s.h.NewError(ctx, err), w, span); encodeErr != nil {
|
|
|
|
defer recordError("Security:CookieAuth", err)
|
|
|
|
}
|
|
|
|
return
|
|
|
|
}
|
|
|
|
if ok {
|
|
|
|
satisfied[0] |= 1 << 0
|
|
|
|
ctx = sctx
|
|
|
|
}
|
|
|
|
}
|
|
|
|
|
|
|
|
if ok := func() bool {
|
|
|
|
nextRequirement:
|
|
|
|
for _, requirement := range []bitset{
|
|
|
|
{0b00000001},
|
|
|
|
} {
|
|
|
|
for i, mask := range requirement {
|
|
|
|
if satisfied[i]&mask != mask {
|
|
|
|
continue nextRequirement
|
|
|
|
}
|
|
|
|
}
|
|
|
|
return true
|
|
|
|
}
|
|
|
|
return false
|
|
|
|
}(); !ok {
|
|
|
|
err = &ogenerrors.SecurityError{
|
|
|
|
OperationContext: opErrContext,
|
|
|
|
Err: ogenerrors.ErrSecurityRequirementIsNotSatisfied,
|
|
|
|
}
|
|
|
|
if encodeErr := encodeErrorResponse(s.h.NewError(ctx, err), w, span); encodeErr != nil {
|
|
|
|
defer recordError("Security", err)
|
|
|
|
}
|
|
|
|
return
|
|
|
|
}
|
|
|
|
}
|
2024-11-28 01:46:54 +00:00
|
|
|
params, err := decodeActionSubmissionRejectParams(args, argsEscaped, r)
|
|
|
|
if err != nil {
|
|
|
|
err = &ogenerrors.DecodeParamsError{
|
|
|
|
OperationContext: opErrContext,
|
|
|
|
Err: err,
|
|
|
|
}
|
|
|
|
defer recordError("DecodeParams", err)
|
|
|
|
s.cfg.ErrorHandler(ctx, w, r, err)
|
|
|
|
return
|
|
|
|
}
|
|
|
|
|
|
|
|
var response *ActionSubmissionRejectOK
|
|
|
|
if m := s.cfg.Middleware; m != nil {
|
|
|
|
mreq := middleware.Request{
|
|
|
|
Context: ctx,
|
2024-11-29 22:33:48 +00:00
|
|
|
OperationName: ActionSubmissionRejectOperation,
|
2024-11-28 01:46:54 +00:00
|
|
|
OperationSummary: "Role Reviewer changes status from Submitted -> Rejected",
|
|
|
|
OperationID: "actionSubmissionReject",
|
|
|
|
Body: nil,
|
|
|
|
Params: middleware.Parameters{
|
|
|
|
{
|
|
|
|
Name: "SubmissionID",
|
|
|
|
In: "path",
|
|
|
|
}: params.SubmissionID,
|
|
|
|
},
|
|
|
|
Raw: r,
|
|
|
|
}
|
|
|
|
|
|
|
|
type (
|
|
|
|
Request = struct{}
|
|
|
|
Params = ActionSubmissionRejectParams
|
|
|
|
Response = *ActionSubmissionRejectOK
|
|
|
|
)
|
|
|
|
response, err = middleware.HookMiddleware[
|
|
|
|
Request,
|
|
|
|
Params,
|
|
|
|
Response,
|
|
|
|
](
|
|
|
|
m,
|
|
|
|
mreq,
|
|
|
|
unpackActionSubmissionRejectParams,
|
|
|
|
func(ctx context.Context, request Request, params Params) (response Response, err error) {
|
|
|
|
err = s.h.ActionSubmissionReject(ctx, params)
|
|
|
|
return response, err
|
|
|
|
},
|
|
|
|
)
|
|
|
|
} else {
|
|
|
|
err = s.h.ActionSubmissionReject(ctx, params)
|
|
|
|
}
|
|
|
|
if err != nil {
|
|
|
|
if errRes, ok := errors.Into[*ErrorStatusCode](err); ok {
|
|
|
|
if err := encodeErrorResponse(errRes, w, span); err != nil {
|
|
|
|
defer recordError("Internal", err)
|
|
|
|
}
|
|
|
|
return
|
|
|
|
}
|
|
|
|
if errors.Is(err, ht.ErrNotImplemented) {
|
|
|
|
s.cfg.ErrorHandler(ctx, w, r, err)
|
|
|
|
return
|
|
|
|
}
|
|
|
|
if err := encodeErrorResponse(s.h.NewError(ctx, err), w, span); err != nil {
|
|
|
|
defer recordError("Internal", err)
|
|
|
|
}
|
|
|
|
return
|
|
|
|
}
|
|
|
|
|
|
|
|
if err := encodeActionSubmissionRejectResponse(response, w, span); err != nil {
|
|
|
|
defer recordError("EncodeResponse", err)
|
|
|
|
if !errors.Is(err, ht.ErrInternalServerErrorResponse) {
|
|
|
|
s.cfg.ErrorHandler(ctx, w, r, err)
|
|
|
|
}
|
|
|
|
return
|
|
|
|
}
|
|
|
|
}
|
|
|
|
|
|
|
|
// handleActionSubmissionRequestChangesRequest handles actionSubmissionRequestChanges operation.
|
|
|
|
//
|
|
|
|
// Role Reviewer changes status from Validated|Accepted|Submitted -> ChangesRequested.
|
|
|
|
//
|
|
|
|
// PATCH /submissions/{SubmissionID}/status/request-changes
|
|
|
|
func (s *Server) handleActionSubmissionRequestChangesRequest(args [1]string, argsEscaped bool, w http.ResponseWriter, r *http.Request) {
|
2024-12-06 00:36:15 +00:00
|
|
|
statusWriter := &codeRecorder{ResponseWriter: w}
|
|
|
|
w = statusWriter
|
2024-11-28 01:46:54 +00:00
|
|
|
otelAttrs := []attribute.KeyValue{
|
|
|
|
otelogen.OperationID("actionSubmissionRequestChanges"),
|
|
|
|
semconv.HTTPRequestMethodKey.String("PATCH"),
|
|
|
|
semconv.HTTPRouteKey.String("/submissions/{SubmissionID}/status/request-changes"),
|
|
|
|
}
|
|
|
|
|
|
|
|
// Start a span for this request.
|
2024-11-29 22:33:48 +00:00
|
|
|
ctx, span := s.cfg.Tracer.Start(r.Context(), ActionSubmissionRequestChangesOperation,
|
2024-11-28 01:46:54 +00:00
|
|
|
trace.WithAttributes(otelAttrs...),
|
|
|
|
serverSpanKind,
|
|
|
|
)
|
|
|
|
defer span.End()
|
|
|
|
|
|
|
|
// Add Labeler to context.
|
|
|
|
labeler := &Labeler{attrs: otelAttrs}
|
|
|
|
ctx = contextWithLabeler(ctx, labeler)
|
|
|
|
|
|
|
|
// Run stopwatch.
|
|
|
|
startTime := time.Now()
|
|
|
|
defer func() {
|
|
|
|
elapsedDuration := time.Since(startTime)
|
2024-12-06 00:36:15 +00:00
|
|
|
|
|
|
|
attrSet := labeler.AttributeSet()
|
|
|
|
attrs := attrSet.ToSlice()
|
|
|
|
code := statusWriter.status
|
|
|
|
if code != 0 {
|
|
|
|
codeAttr := semconv.HTTPResponseStatusCode(code)
|
|
|
|
attrs = append(attrs, codeAttr)
|
|
|
|
span.SetAttributes(codeAttr)
|
|
|
|
}
|
|
|
|
attrOpt := metric.WithAttributes(attrs...)
|
2024-11-28 01:46:54 +00:00
|
|
|
|
|
|
|
// Increment request counter.
|
|
|
|
s.requests.Add(ctx, 1, attrOpt)
|
|
|
|
|
|
|
|
// Use floating point division here for higher precision (instead of Millisecond method).
|
2024-12-06 00:36:15 +00:00
|
|
|
s.duration.Record(ctx, float64(elapsedDuration)/float64(time.Millisecond), attrOpt)
|
2024-11-28 01:46:54 +00:00
|
|
|
}()
|
|
|
|
|
|
|
|
var (
|
|
|
|
recordError = func(stage string, err error) {
|
|
|
|
span.RecordError(err)
|
2024-12-06 00:36:15 +00:00
|
|
|
|
|
|
|
// https://opentelemetry.io/docs/specs/semconv/http/http-spans/#status
|
|
|
|
// Span Status MUST be left unset if HTTP status code was in the 1xx, 2xx or 3xx ranges,
|
|
|
|
// unless there was another error (e.g., network error receiving the response body; or 3xx codes with
|
|
|
|
// max redirects exceeded), in which case status MUST be set to Error.
|
|
|
|
code := statusWriter.status
|
|
|
|
if code >= 100 && code < 500 {
|
|
|
|
span.SetStatus(codes.Error, stage)
|
|
|
|
}
|
|
|
|
|
|
|
|
attrSet := labeler.AttributeSet()
|
|
|
|
attrs := attrSet.ToSlice()
|
|
|
|
if code != 0 {
|
|
|
|
attrs = append(attrs, semconv.HTTPResponseStatusCode(code))
|
|
|
|
}
|
|
|
|
|
|
|
|
s.errors.Add(ctx, 1, metric.WithAttributes(attrs...))
|
2024-11-28 01:46:54 +00:00
|
|
|
}
|
|
|
|
err error
|
|
|
|
opErrContext = ogenerrors.OperationContext{
|
2024-11-29 22:33:48 +00:00
|
|
|
Name: ActionSubmissionRequestChangesOperation,
|
2024-11-28 01:46:54 +00:00
|
|
|
ID: "actionSubmissionRequestChanges",
|
|
|
|
}
|
|
|
|
)
|
2024-11-29 22:33:48 +00:00
|
|
|
{
|
|
|
|
type bitset = [1]uint8
|
|
|
|
var satisfied bitset
|
|
|
|
{
|
|
|
|
sctx, ok, err := s.securityCookieAuth(ctx, ActionSubmissionRequestChangesOperation, r)
|
|
|
|
if err != nil {
|
|
|
|
err = &ogenerrors.SecurityError{
|
|
|
|
OperationContext: opErrContext,
|
|
|
|
Security: "CookieAuth",
|
|
|
|
Err: err,
|
|
|
|
}
|
|
|
|
if encodeErr := encodeErrorResponse(s.h.NewError(ctx, err), w, span); encodeErr != nil {
|
|
|
|
defer recordError("Security:CookieAuth", err)
|
|
|
|
}
|
|
|
|
return
|
|
|
|
}
|
|
|
|
if ok {
|
|
|
|
satisfied[0] |= 1 << 0
|
|
|
|
ctx = sctx
|
|
|
|
}
|
|
|
|
}
|
|
|
|
|
|
|
|
if ok := func() bool {
|
|
|
|
nextRequirement:
|
|
|
|
for _, requirement := range []bitset{
|
|
|
|
{0b00000001},
|
|
|
|
} {
|
|
|
|
for i, mask := range requirement {
|
|
|
|
if satisfied[i]&mask != mask {
|
|
|
|
continue nextRequirement
|
|
|
|
}
|
|
|
|
}
|
|
|
|
return true
|
|
|
|
}
|
|
|
|
return false
|
|
|
|
}(); !ok {
|
|
|
|
err = &ogenerrors.SecurityError{
|
|
|
|
OperationContext: opErrContext,
|
|
|
|
Err: ogenerrors.ErrSecurityRequirementIsNotSatisfied,
|
|
|
|
}
|
|
|
|
if encodeErr := encodeErrorResponse(s.h.NewError(ctx, err), w, span); encodeErr != nil {
|
|
|
|
defer recordError("Security", err)
|
|
|
|
}
|
|
|
|
return
|
|
|
|
}
|
|
|
|
}
|
2024-11-28 01:46:54 +00:00
|
|
|
params, err := decodeActionSubmissionRequestChangesParams(args, argsEscaped, r)
|
|
|
|
if err != nil {
|
|
|
|
err = &ogenerrors.DecodeParamsError{
|
|
|
|
OperationContext: opErrContext,
|
|
|
|
Err: err,
|
|
|
|
}
|
|
|
|
defer recordError("DecodeParams", err)
|
|
|
|
s.cfg.ErrorHandler(ctx, w, r, err)
|
|
|
|
return
|
|
|
|
}
|
|
|
|
|
|
|
|
var response *ActionSubmissionRequestChangesOK
|
|
|
|
if m := s.cfg.Middleware; m != nil {
|
|
|
|
mreq := middleware.Request{
|
|
|
|
Context: ctx,
|
2024-11-29 22:33:48 +00:00
|
|
|
OperationName: ActionSubmissionRequestChangesOperation,
|
2024-11-28 01:46:54 +00:00
|
|
|
OperationSummary: "Role Reviewer changes status from Validated|Accepted|Submitted -> ChangesRequested",
|
|
|
|
OperationID: "actionSubmissionRequestChanges",
|
|
|
|
Body: nil,
|
|
|
|
Params: middleware.Parameters{
|
|
|
|
{
|
|
|
|
Name: "SubmissionID",
|
|
|
|
In: "path",
|
|
|
|
}: params.SubmissionID,
|
|
|
|
},
|
|
|
|
Raw: r,
|
|
|
|
}
|
|
|
|
|
|
|
|
type (
|
|
|
|
Request = struct{}
|
|
|
|
Params = ActionSubmissionRequestChangesParams
|
|
|
|
Response = *ActionSubmissionRequestChangesOK
|
|
|
|
)
|
|
|
|
response, err = middleware.HookMiddleware[
|
|
|
|
Request,
|
|
|
|
Params,
|
|
|
|
Response,
|
|
|
|
](
|
|
|
|
m,
|
|
|
|
mreq,
|
|
|
|
unpackActionSubmissionRequestChangesParams,
|
|
|
|
func(ctx context.Context, request Request, params Params) (response Response, err error) {
|
|
|
|
err = s.h.ActionSubmissionRequestChanges(ctx, params)
|
|
|
|
return response, err
|
|
|
|
},
|
|
|
|
)
|
|
|
|
} else {
|
|
|
|
err = s.h.ActionSubmissionRequestChanges(ctx, params)
|
|
|
|
}
|
|
|
|
if err != nil {
|
|
|
|
if errRes, ok := errors.Into[*ErrorStatusCode](err); ok {
|
|
|
|
if err := encodeErrorResponse(errRes, w, span); err != nil {
|
|
|
|
defer recordError("Internal", err)
|
|
|
|
}
|
|
|
|
return
|
|
|
|
}
|
|
|
|
if errors.Is(err, ht.ErrNotImplemented) {
|
|
|
|
s.cfg.ErrorHandler(ctx, w, r, err)
|
|
|
|
return
|
|
|
|
}
|
|
|
|
if err := encodeErrorResponse(s.h.NewError(ctx, err), w, span); err != nil {
|
|
|
|
defer recordError("Internal", err)
|
|
|
|
}
|
|
|
|
return
|
|
|
|
}
|
|
|
|
|
|
|
|
if err := encodeActionSubmissionRequestChangesResponse(response, w, span); err != nil {
|
|
|
|
defer recordError("EncodeResponse", err)
|
|
|
|
if !errors.Is(err, ht.ErrInternalServerErrorResponse) {
|
|
|
|
s.cfg.ErrorHandler(ctx, w, r, err)
|
|
|
|
}
|
|
|
|
return
|
|
|
|
}
|
|
|
|
}
|
|
|
|
|
|
|
|
// handleActionSubmissionRevokeRequest handles actionSubmissionRevoke operation.
|
|
|
|
//
|
|
|
|
// Role Submitter changes status from Submitted|ChangesRequested -> UnderConstruction.
|
|
|
|
//
|
|
|
|
// PATCH /submissions/{SubmissionID}/status/revoke
|
|
|
|
func (s *Server) handleActionSubmissionRevokeRequest(args [1]string, argsEscaped bool, w http.ResponseWriter, r *http.Request) {
|
2024-12-06 00:36:15 +00:00
|
|
|
statusWriter := &codeRecorder{ResponseWriter: w}
|
|
|
|
w = statusWriter
|
2024-11-28 01:46:54 +00:00
|
|
|
otelAttrs := []attribute.KeyValue{
|
|
|
|
otelogen.OperationID("actionSubmissionRevoke"),
|
|
|
|
semconv.HTTPRequestMethodKey.String("PATCH"),
|
|
|
|
semconv.HTTPRouteKey.String("/submissions/{SubmissionID}/status/revoke"),
|
|
|
|
}
|
|
|
|
|
|
|
|
// Start a span for this request.
|
2024-11-29 22:33:48 +00:00
|
|
|
ctx, span := s.cfg.Tracer.Start(r.Context(), ActionSubmissionRevokeOperation,
|
2024-11-28 01:46:54 +00:00
|
|
|
trace.WithAttributes(otelAttrs...),
|
|
|
|
serverSpanKind,
|
|
|
|
)
|
|
|
|
defer span.End()
|
|
|
|
|
|
|
|
// Add Labeler to context.
|
|
|
|
labeler := &Labeler{attrs: otelAttrs}
|
|
|
|
ctx = contextWithLabeler(ctx, labeler)
|
|
|
|
|
|
|
|
// Run stopwatch.
|
|
|
|
startTime := time.Now()
|
|
|
|
defer func() {
|
|
|
|
elapsedDuration := time.Since(startTime)
|
2024-12-06 00:36:15 +00:00
|
|
|
|
|
|
|
attrSet := labeler.AttributeSet()
|
|
|
|
attrs := attrSet.ToSlice()
|
|
|
|
code := statusWriter.status
|
|
|
|
if code != 0 {
|
|
|
|
codeAttr := semconv.HTTPResponseStatusCode(code)
|
|
|
|
attrs = append(attrs, codeAttr)
|
|
|
|
span.SetAttributes(codeAttr)
|
|
|
|
}
|
|
|
|
attrOpt := metric.WithAttributes(attrs...)
|
2024-11-28 01:46:54 +00:00
|
|
|
|
|
|
|
// Increment request counter.
|
|
|
|
s.requests.Add(ctx, 1, attrOpt)
|
|
|
|
|
|
|
|
// Use floating point division here for higher precision (instead of Millisecond method).
|
2024-12-06 00:36:15 +00:00
|
|
|
s.duration.Record(ctx, float64(elapsedDuration)/float64(time.Millisecond), attrOpt)
|
2024-11-28 01:46:54 +00:00
|
|
|
}()
|
|
|
|
|
|
|
|
var (
|
|
|
|
recordError = func(stage string, err error) {
|
|
|
|
span.RecordError(err)
|
2024-12-06 00:36:15 +00:00
|
|
|
|
|
|
|
// https://opentelemetry.io/docs/specs/semconv/http/http-spans/#status
|
|
|
|
// Span Status MUST be left unset if HTTP status code was in the 1xx, 2xx or 3xx ranges,
|
|
|
|
// unless there was another error (e.g., network error receiving the response body; or 3xx codes with
|
|
|
|
// max redirects exceeded), in which case status MUST be set to Error.
|
|
|
|
code := statusWriter.status
|
|
|
|
if code >= 100 && code < 500 {
|
|
|
|
span.SetStatus(codes.Error, stage)
|
|
|
|
}
|
|
|
|
|
|
|
|
attrSet := labeler.AttributeSet()
|
|
|
|
attrs := attrSet.ToSlice()
|
|
|
|
if code != 0 {
|
|
|
|
attrs = append(attrs, semconv.HTTPResponseStatusCode(code))
|
|
|
|
}
|
|
|
|
|
|
|
|
s.errors.Add(ctx, 1, metric.WithAttributes(attrs...))
|
2024-11-28 01:46:54 +00:00
|
|
|
}
|
|
|
|
err error
|
|
|
|
opErrContext = ogenerrors.OperationContext{
|
2024-11-29 22:33:48 +00:00
|
|
|
Name: ActionSubmissionRevokeOperation,
|
2024-11-28 01:46:54 +00:00
|
|
|
ID: "actionSubmissionRevoke",
|
|
|
|
}
|
|
|
|
)
|
2024-11-29 22:33:48 +00:00
|
|
|
{
|
|
|
|
type bitset = [1]uint8
|
|
|
|
var satisfied bitset
|
|
|
|
{
|
|
|
|
sctx, ok, err := s.securityCookieAuth(ctx, ActionSubmissionRevokeOperation, r)
|
|
|
|
if err != nil {
|
|
|
|
err = &ogenerrors.SecurityError{
|
|
|
|
OperationContext: opErrContext,
|
|
|
|
Security: "CookieAuth",
|
|
|
|
Err: err,
|
|
|
|
}
|
|
|
|
if encodeErr := encodeErrorResponse(s.h.NewError(ctx, err), w, span); encodeErr != nil {
|
|
|
|
defer recordError("Security:CookieAuth", err)
|
|
|
|
}
|
|
|
|
return
|
|
|
|
}
|
|
|
|
if ok {
|
|
|
|
satisfied[0] |= 1 << 0
|
|
|
|
ctx = sctx
|
|
|
|
}
|
|
|
|
}
|
|
|
|
|
|
|
|
if ok := func() bool {
|
|
|
|
nextRequirement:
|
|
|
|
for _, requirement := range []bitset{
|
|
|
|
{0b00000001},
|
|
|
|
} {
|
|
|
|
for i, mask := range requirement {
|
|
|
|
if satisfied[i]&mask != mask {
|
|
|
|
continue nextRequirement
|
|
|
|
}
|
|
|
|
}
|
|
|
|
return true
|
|
|
|
}
|
|
|
|
return false
|
|
|
|
}(); !ok {
|
|
|
|
err = &ogenerrors.SecurityError{
|
|
|
|
OperationContext: opErrContext,
|
|
|
|
Err: ogenerrors.ErrSecurityRequirementIsNotSatisfied,
|
|
|
|
}
|
|
|
|
if encodeErr := encodeErrorResponse(s.h.NewError(ctx, err), w, span); encodeErr != nil {
|
|
|
|
defer recordError("Security", err)
|
|
|
|
}
|
|
|
|
return
|
|
|
|
}
|
|
|
|
}
|
2024-11-28 01:46:54 +00:00
|
|
|
params, err := decodeActionSubmissionRevokeParams(args, argsEscaped, r)
|
|
|
|
if err != nil {
|
|
|
|
err = &ogenerrors.DecodeParamsError{
|
|
|
|
OperationContext: opErrContext,
|
|
|
|
Err: err,
|
|
|
|
}
|
|
|
|
defer recordError("DecodeParams", err)
|
|
|
|
s.cfg.ErrorHandler(ctx, w, r, err)
|
|
|
|
return
|
|
|
|
}
|
|
|
|
|
|
|
|
var response *ActionSubmissionRevokeOK
|
|
|
|
if m := s.cfg.Middleware; m != nil {
|
|
|
|
mreq := middleware.Request{
|
|
|
|
Context: ctx,
|
2024-11-29 22:33:48 +00:00
|
|
|
OperationName: ActionSubmissionRevokeOperation,
|
2024-11-28 01:46:54 +00:00
|
|
|
OperationSummary: "Role Submitter changes status from Submitted|ChangesRequested -> UnderConstruction",
|
|
|
|
OperationID: "actionSubmissionRevoke",
|
|
|
|
Body: nil,
|
|
|
|
Params: middleware.Parameters{
|
|
|
|
{
|
|
|
|
Name: "SubmissionID",
|
|
|
|
In: "path",
|
|
|
|
}: params.SubmissionID,
|
|
|
|
},
|
|
|
|
Raw: r,
|
|
|
|
}
|
|
|
|
|
|
|
|
type (
|
|
|
|
Request = struct{}
|
|
|
|
Params = ActionSubmissionRevokeParams
|
|
|
|
Response = *ActionSubmissionRevokeOK
|
|
|
|
)
|
|
|
|
response, err = middleware.HookMiddleware[
|
|
|
|
Request,
|
|
|
|
Params,
|
|
|
|
Response,
|
|
|
|
](
|
|
|
|
m,
|
|
|
|
mreq,
|
|
|
|
unpackActionSubmissionRevokeParams,
|
|
|
|
func(ctx context.Context, request Request, params Params) (response Response, err error) {
|
|
|
|
err = s.h.ActionSubmissionRevoke(ctx, params)
|
|
|
|
return response, err
|
|
|
|
},
|
|
|
|
)
|
|
|
|
} else {
|
|
|
|
err = s.h.ActionSubmissionRevoke(ctx, params)
|
|
|
|
}
|
|
|
|
if err != nil {
|
|
|
|
if errRes, ok := errors.Into[*ErrorStatusCode](err); ok {
|
|
|
|
if err := encodeErrorResponse(errRes, w, span); err != nil {
|
|
|
|
defer recordError("Internal", err)
|
|
|
|
}
|
|
|
|
return
|
|
|
|
}
|
|
|
|
if errors.Is(err, ht.ErrNotImplemented) {
|
|
|
|
s.cfg.ErrorHandler(ctx, w, r, err)
|
|
|
|
return
|
|
|
|
}
|
|
|
|
if err := encodeErrorResponse(s.h.NewError(ctx, err), w, span); err != nil {
|
|
|
|
defer recordError("Internal", err)
|
|
|
|
}
|
|
|
|
return
|
|
|
|
}
|
|
|
|
|
|
|
|
if err := encodeActionSubmissionRevokeResponse(response, w, span); err != nil {
|
|
|
|
defer recordError("EncodeResponse", err)
|
|
|
|
if !errors.Is(err, ht.ErrInternalServerErrorResponse) {
|
|
|
|
s.cfg.ErrorHandler(ctx, w, r, err)
|
|
|
|
}
|
|
|
|
return
|
|
|
|
}
|
|
|
|
}
|
|
|
|
|
|
|
|
// handleActionSubmissionSubmitRequest handles actionSubmissionSubmit operation.
|
|
|
|
//
|
|
|
|
// Role Submitter changes status from UnderConstruction|ChangesRequested -> Submitted.
|
|
|
|
//
|
|
|
|
// PATCH /submissions/{SubmissionID}/status/submit
|
|
|
|
func (s *Server) handleActionSubmissionSubmitRequest(args [1]string, argsEscaped bool, w http.ResponseWriter, r *http.Request) {
|
2024-12-06 00:36:15 +00:00
|
|
|
statusWriter := &codeRecorder{ResponseWriter: w}
|
|
|
|
w = statusWriter
|
2024-11-28 01:46:54 +00:00
|
|
|
otelAttrs := []attribute.KeyValue{
|
|
|
|
otelogen.OperationID("actionSubmissionSubmit"),
|
|
|
|
semconv.HTTPRequestMethodKey.String("PATCH"),
|
|
|
|
semconv.HTTPRouteKey.String("/submissions/{SubmissionID}/status/submit"),
|
|
|
|
}
|
|
|
|
|
|
|
|
// Start a span for this request.
|
2024-11-29 22:33:48 +00:00
|
|
|
ctx, span := s.cfg.Tracer.Start(r.Context(), ActionSubmissionSubmitOperation,
|
2024-11-28 01:46:54 +00:00
|
|
|
trace.WithAttributes(otelAttrs...),
|
|
|
|
serverSpanKind,
|
|
|
|
)
|
|
|
|
defer span.End()
|
|
|
|
|
|
|
|
// Add Labeler to context.
|
|
|
|
labeler := &Labeler{attrs: otelAttrs}
|
|
|
|
ctx = contextWithLabeler(ctx, labeler)
|
|
|
|
|
|
|
|
// Run stopwatch.
|
|
|
|
startTime := time.Now()
|
|
|
|
defer func() {
|
|
|
|
elapsedDuration := time.Since(startTime)
|
2024-12-06 00:36:15 +00:00
|
|
|
|
|
|
|
attrSet := labeler.AttributeSet()
|
|
|
|
attrs := attrSet.ToSlice()
|
|
|
|
code := statusWriter.status
|
|
|
|
if code != 0 {
|
|
|
|
codeAttr := semconv.HTTPResponseStatusCode(code)
|
|
|
|
attrs = append(attrs, codeAttr)
|
|
|
|
span.SetAttributes(codeAttr)
|
|
|
|
}
|
|
|
|
attrOpt := metric.WithAttributes(attrs...)
|
2024-11-28 01:46:54 +00:00
|
|
|
|
|
|
|
// Increment request counter.
|
|
|
|
s.requests.Add(ctx, 1, attrOpt)
|
|
|
|
|
|
|
|
// Use floating point division here for higher precision (instead of Millisecond method).
|
2024-12-06 00:36:15 +00:00
|
|
|
s.duration.Record(ctx, float64(elapsedDuration)/float64(time.Millisecond), attrOpt)
|
2024-11-28 01:46:54 +00:00
|
|
|
}()
|
|
|
|
|
|
|
|
var (
|
|
|
|
recordError = func(stage string, err error) {
|
|
|
|
span.RecordError(err)
|
2024-12-06 00:36:15 +00:00
|
|
|
|
|
|
|
// https://opentelemetry.io/docs/specs/semconv/http/http-spans/#status
|
|
|
|
// Span Status MUST be left unset if HTTP status code was in the 1xx, 2xx or 3xx ranges,
|
|
|
|
// unless there was another error (e.g., network error receiving the response body; or 3xx codes with
|
|
|
|
// max redirects exceeded), in which case status MUST be set to Error.
|
|
|
|
code := statusWriter.status
|
|
|
|
if code >= 100 && code < 500 {
|
|
|
|
span.SetStatus(codes.Error, stage)
|
|
|
|
}
|
|
|
|
|
|
|
|
attrSet := labeler.AttributeSet()
|
|
|
|
attrs := attrSet.ToSlice()
|
|
|
|
if code != 0 {
|
|
|
|
attrs = append(attrs, semconv.HTTPResponseStatusCode(code))
|
|
|
|
}
|
|
|
|
|
|
|
|
s.errors.Add(ctx, 1, metric.WithAttributes(attrs...))
|
2024-11-28 01:46:54 +00:00
|
|
|
}
|
|
|
|
err error
|
|
|
|
opErrContext = ogenerrors.OperationContext{
|
2024-11-29 22:33:48 +00:00
|
|
|
Name: ActionSubmissionSubmitOperation,
|
2024-11-28 01:46:54 +00:00
|
|
|
ID: "actionSubmissionSubmit",
|
|
|
|
}
|
|
|
|
)
|
2024-11-29 22:33:48 +00:00
|
|
|
{
|
|
|
|
type bitset = [1]uint8
|
|
|
|
var satisfied bitset
|
|
|
|
{
|
|
|
|
sctx, ok, err := s.securityCookieAuth(ctx, ActionSubmissionSubmitOperation, r)
|
|
|
|
if err != nil {
|
|
|
|
err = &ogenerrors.SecurityError{
|
|
|
|
OperationContext: opErrContext,
|
|
|
|
Security: "CookieAuth",
|
|
|
|
Err: err,
|
|
|
|
}
|
|
|
|
if encodeErr := encodeErrorResponse(s.h.NewError(ctx, err), w, span); encodeErr != nil {
|
|
|
|
defer recordError("Security:CookieAuth", err)
|
|
|
|
}
|
|
|
|
return
|
|
|
|
}
|
|
|
|
if ok {
|
|
|
|
satisfied[0] |= 1 << 0
|
|
|
|
ctx = sctx
|
|
|
|
}
|
|
|
|
}
|
|
|
|
|
|
|
|
if ok := func() bool {
|
|
|
|
nextRequirement:
|
|
|
|
for _, requirement := range []bitset{
|
|
|
|
{0b00000001},
|
|
|
|
} {
|
|
|
|
for i, mask := range requirement {
|
|
|
|
if satisfied[i]&mask != mask {
|
|
|
|
continue nextRequirement
|
|
|
|
}
|
|
|
|
}
|
|
|
|
return true
|
|
|
|
}
|
|
|
|
return false
|
|
|
|
}(); !ok {
|
|
|
|
err = &ogenerrors.SecurityError{
|
|
|
|
OperationContext: opErrContext,
|
|
|
|
Err: ogenerrors.ErrSecurityRequirementIsNotSatisfied,
|
|
|
|
}
|
|
|
|
if encodeErr := encodeErrorResponse(s.h.NewError(ctx, err), w, span); encodeErr != nil {
|
|
|
|
defer recordError("Security", err)
|
|
|
|
}
|
|
|
|
return
|
|
|
|
}
|
|
|
|
}
|
2024-11-28 01:46:54 +00:00
|
|
|
params, err := decodeActionSubmissionSubmitParams(args, argsEscaped, r)
|
|
|
|
if err != nil {
|
|
|
|
err = &ogenerrors.DecodeParamsError{
|
|
|
|
OperationContext: opErrContext,
|
|
|
|
Err: err,
|
|
|
|
}
|
|
|
|
defer recordError("DecodeParams", err)
|
|
|
|
s.cfg.ErrorHandler(ctx, w, r, err)
|
|
|
|
return
|
|
|
|
}
|
|
|
|
|
|
|
|
var response *ActionSubmissionSubmitOK
|
|
|
|
if m := s.cfg.Middleware; m != nil {
|
|
|
|
mreq := middleware.Request{
|
|
|
|
Context: ctx,
|
2024-11-29 22:33:48 +00:00
|
|
|
OperationName: ActionSubmissionSubmitOperation,
|
2024-11-28 01:46:54 +00:00
|
|
|
OperationSummary: "Role Submitter changes status from UnderConstruction|ChangesRequested -> Submitted",
|
|
|
|
OperationID: "actionSubmissionSubmit",
|
|
|
|
Body: nil,
|
|
|
|
Params: middleware.Parameters{
|
|
|
|
{
|
|
|
|
Name: "SubmissionID",
|
|
|
|
In: "path",
|
|
|
|
}: params.SubmissionID,
|
|
|
|
},
|
|
|
|
Raw: r,
|
|
|
|
}
|
|
|
|
|
|
|
|
type (
|
|
|
|
Request = struct{}
|
|
|
|
Params = ActionSubmissionSubmitParams
|
|
|
|
Response = *ActionSubmissionSubmitOK
|
|
|
|
)
|
|
|
|
response, err = middleware.HookMiddleware[
|
|
|
|
Request,
|
|
|
|
Params,
|
|
|
|
Response,
|
|
|
|
](
|
|
|
|
m,
|
|
|
|
mreq,
|
|
|
|
unpackActionSubmissionSubmitParams,
|
|
|
|
func(ctx context.Context, request Request, params Params) (response Response, err error) {
|
|
|
|
err = s.h.ActionSubmissionSubmit(ctx, params)
|
|
|
|
return response, err
|
|
|
|
},
|
|
|
|
)
|
|
|
|
} else {
|
|
|
|
err = s.h.ActionSubmissionSubmit(ctx, params)
|
|
|
|
}
|
|
|
|
if err != nil {
|
|
|
|
if errRes, ok := errors.Into[*ErrorStatusCode](err); ok {
|
|
|
|
if err := encodeErrorResponse(errRes, w, span); err != nil {
|
|
|
|
defer recordError("Internal", err)
|
|
|
|
}
|
|
|
|
return
|
|
|
|
}
|
|
|
|
if errors.Is(err, ht.ErrNotImplemented) {
|
|
|
|
s.cfg.ErrorHandler(ctx, w, r, err)
|
|
|
|
return
|
|
|
|
}
|
|
|
|
if err := encodeErrorResponse(s.h.NewError(ctx, err), w, span); err != nil {
|
|
|
|
defer recordError("Internal", err)
|
|
|
|
}
|
|
|
|
return
|
|
|
|
}
|
|
|
|
|
|
|
|
if err := encodeActionSubmissionSubmitResponse(response, w, span); err != nil {
|
|
|
|
defer recordError("EncodeResponse", err)
|
|
|
|
if !errors.Is(err, ht.ErrInternalServerErrorResponse) {
|
|
|
|
s.cfg.ErrorHandler(ctx, w, r, err)
|
|
|
|
}
|
|
|
|
return
|
|
|
|
}
|
|
|
|
}
|
|
|
|
|
|
|
|
// handleActionSubmissionTriggerPublishRequest handles actionSubmissionTriggerPublish operation.
|
|
|
|
//
|
|
|
|
// Role Admin changes status from Validated -> Publishing.
|
|
|
|
//
|
|
|
|
// PATCH /submissions/{SubmissionID}/status/trigger-publish
|
|
|
|
func (s *Server) handleActionSubmissionTriggerPublishRequest(args [1]string, argsEscaped bool, w http.ResponseWriter, r *http.Request) {
|
2024-12-06 00:36:15 +00:00
|
|
|
statusWriter := &codeRecorder{ResponseWriter: w}
|
|
|
|
w = statusWriter
|
2024-11-28 01:46:54 +00:00
|
|
|
otelAttrs := []attribute.KeyValue{
|
|
|
|
otelogen.OperationID("actionSubmissionTriggerPublish"),
|
|
|
|
semconv.HTTPRequestMethodKey.String("PATCH"),
|
|
|
|
semconv.HTTPRouteKey.String("/submissions/{SubmissionID}/status/trigger-publish"),
|
|
|
|
}
|
|
|
|
|
|
|
|
// Start a span for this request.
|
2024-11-29 22:33:48 +00:00
|
|
|
ctx, span := s.cfg.Tracer.Start(r.Context(), ActionSubmissionTriggerPublishOperation,
|
2024-11-28 01:46:54 +00:00
|
|
|
trace.WithAttributes(otelAttrs...),
|
|
|
|
serverSpanKind,
|
|
|
|
)
|
|
|
|
defer span.End()
|
|
|
|
|
|
|
|
// Add Labeler to context.
|
|
|
|
labeler := &Labeler{attrs: otelAttrs}
|
|
|
|
ctx = contextWithLabeler(ctx, labeler)
|
|
|
|
|
|
|
|
// Run stopwatch.
|
|
|
|
startTime := time.Now()
|
|
|
|
defer func() {
|
|
|
|
elapsedDuration := time.Since(startTime)
|
2024-12-06 00:36:15 +00:00
|
|
|
|
|
|
|
attrSet := labeler.AttributeSet()
|
|
|
|
attrs := attrSet.ToSlice()
|
|
|
|
code := statusWriter.status
|
|
|
|
if code != 0 {
|
|
|
|
codeAttr := semconv.HTTPResponseStatusCode(code)
|
|
|
|
attrs = append(attrs, codeAttr)
|
|
|
|
span.SetAttributes(codeAttr)
|
|
|
|
}
|
|
|
|
attrOpt := metric.WithAttributes(attrs...)
|
2024-11-28 01:46:54 +00:00
|
|
|
|
|
|
|
// Increment request counter.
|
|
|
|
s.requests.Add(ctx, 1, attrOpt)
|
|
|
|
|
|
|
|
// Use floating point division here for higher precision (instead of Millisecond method).
|
2024-12-06 00:36:15 +00:00
|
|
|
s.duration.Record(ctx, float64(elapsedDuration)/float64(time.Millisecond), attrOpt)
|
2024-11-28 01:46:54 +00:00
|
|
|
}()
|
|
|
|
|
|
|
|
var (
|
|
|
|
recordError = func(stage string, err error) {
|
|
|
|
span.RecordError(err)
|
2024-12-06 00:36:15 +00:00
|
|
|
|
|
|
|
// https://opentelemetry.io/docs/specs/semconv/http/http-spans/#status
|
|
|
|
// Span Status MUST be left unset if HTTP status code was in the 1xx, 2xx or 3xx ranges,
|
|
|
|
// unless there was another error (e.g., network error receiving the response body; or 3xx codes with
|
|
|
|
// max redirects exceeded), in which case status MUST be set to Error.
|
|
|
|
code := statusWriter.status
|
|
|
|
if code >= 100 && code < 500 {
|
|
|
|
span.SetStatus(codes.Error, stage)
|
|
|
|
}
|
|
|
|
|
|
|
|
attrSet := labeler.AttributeSet()
|
|
|
|
attrs := attrSet.ToSlice()
|
|
|
|
if code != 0 {
|
|
|
|
attrs = append(attrs, semconv.HTTPResponseStatusCode(code))
|
|
|
|
}
|
|
|
|
|
|
|
|
s.errors.Add(ctx, 1, metric.WithAttributes(attrs...))
|
2024-11-28 01:46:54 +00:00
|
|
|
}
|
|
|
|
err error
|
|
|
|
opErrContext = ogenerrors.OperationContext{
|
2024-11-29 22:33:48 +00:00
|
|
|
Name: ActionSubmissionTriggerPublishOperation,
|
2024-11-28 01:46:54 +00:00
|
|
|
ID: "actionSubmissionTriggerPublish",
|
|
|
|
}
|
|
|
|
)
|
2024-11-29 22:33:48 +00:00
|
|
|
{
|
|
|
|
type bitset = [1]uint8
|
|
|
|
var satisfied bitset
|
|
|
|
{
|
|
|
|
sctx, ok, err := s.securityCookieAuth(ctx, ActionSubmissionTriggerPublishOperation, r)
|
|
|
|
if err != nil {
|
|
|
|
err = &ogenerrors.SecurityError{
|
|
|
|
OperationContext: opErrContext,
|
|
|
|
Security: "CookieAuth",
|
|
|
|
Err: err,
|
|
|
|
}
|
|
|
|
if encodeErr := encodeErrorResponse(s.h.NewError(ctx, err), w, span); encodeErr != nil {
|
|
|
|
defer recordError("Security:CookieAuth", err)
|
|
|
|
}
|
|
|
|
return
|
|
|
|
}
|
|
|
|
if ok {
|
|
|
|
satisfied[0] |= 1 << 0
|
|
|
|
ctx = sctx
|
|
|
|
}
|
|
|
|
}
|
|
|
|
|
|
|
|
if ok := func() bool {
|
|
|
|
nextRequirement:
|
|
|
|
for _, requirement := range []bitset{
|
|
|
|
{0b00000001},
|
|
|
|
} {
|
|
|
|
for i, mask := range requirement {
|
|
|
|
if satisfied[i]&mask != mask {
|
|
|
|
continue nextRequirement
|
|
|
|
}
|
|
|
|
}
|
|
|
|
return true
|
|
|
|
}
|
|
|
|
return false
|
|
|
|
}(); !ok {
|
|
|
|
err = &ogenerrors.SecurityError{
|
|
|
|
OperationContext: opErrContext,
|
|
|
|
Err: ogenerrors.ErrSecurityRequirementIsNotSatisfied,
|
|
|
|
}
|
|
|
|
if encodeErr := encodeErrorResponse(s.h.NewError(ctx, err), w, span); encodeErr != nil {
|
|
|
|
defer recordError("Security", err)
|
|
|
|
}
|
|
|
|
return
|
|
|
|
}
|
|
|
|
}
|
2024-11-28 01:46:54 +00:00
|
|
|
params, err := decodeActionSubmissionTriggerPublishParams(args, argsEscaped, r)
|
|
|
|
if err != nil {
|
|
|
|
err = &ogenerrors.DecodeParamsError{
|
|
|
|
OperationContext: opErrContext,
|
|
|
|
Err: err,
|
|
|
|
}
|
|
|
|
defer recordError("DecodeParams", err)
|
|
|
|
s.cfg.ErrorHandler(ctx, w, r, err)
|
|
|
|
return
|
|
|
|
}
|
|
|
|
|
|
|
|
var response *ActionSubmissionTriggerPublishOK
|
|
|
|
if m := s.cfg.Middleware; m != nil {
|
|
|
|
mreq := middleware.Request{
|
|
|
|
Context: ctx,
|
2024-11-29 22:33:48 +00:00
|
|
|
OperationName: ActionSubmissionTriggerPublishOperation,
|
2024-11-28 01:46:54 +00:00
|
|
|
OperationSummary: "Role Admin changes status from Validated -> Publishing",
|
|
|
|
OperationID: "actionSubmissionTriggerPublish",
|
|
|
|
Body: nil,
|
|
|
|
Params: middleware.Parameters{
|
|
|
|
{
|
|
|
|
Name: "SubmissionID",
|
|
|
|
In: "path",
|
|
|
|
}: params.SubmissionID,
|
|
|
|
},
|
|
|
|
Raw: r,
|
|
|
|
}
|
|
|
|
|
|
|
|
type (
|
|
|
|
Request = struct{}
|
|
|
|
Params = ActionSubmissionTriggerPublishParams
|
|
|
|
Response = *ActionSubmissionTriggerPublishOK
|
|
|
|
)
|
|
|
|
response, err = middleware.HookMiddleware[
|
|
|
|
Request,
|
|
|
|
Params,
|
|
|
|
Response,
|
|
|
|
](
|
|
|
|
m,
|
|
|
|
mreq,
|
|
|
|
unpackActionSubmissionTriggerPublishParams,
|
|
|
|
func(ctx context.Context, request Request, params Params) (response Response, err error) {
|
|
|
|
err = s.h.ActionSubmissionTriggerPublish(ctx, params)
|
|
|
|
return response, err
|
|
|
|
},
|
|
|
|
)
|
|
|
|
} else {
|
|
|
|
err = s.h.ActionSubmissionTriggerPublish(ctx, params)
|
|
|
|
}
|
|
|
|
if err != nil {
|
|
|
|
if errRes, ok := errors.Into[*ErrorStatusCode](err); ok {
|
|
|
|
if err := encodeErrorResponse(errRes, w, span); err != nil {
|
|
|
|
defer recordError("Internal", err)
|
|
|
|
}
|
|
|
|
return
|
|
|
|
}
|
|
|
|
if errors.Is(err, ht.ErrNotImplemented) {
|
|
|
|
s.cfg.ErrorHandler(ctx, w, r, err)
|
|
|
|
return
|
|
|
|
}
|
|
|
|
if err := encodeErrorResponse(s.h.NewError(ctx, err), w, span); err != nil {
|
|
|
|
defer recordError("Internal", err)
|
|
|
|
}
|
|
|
|
return
|
|
|
|
}
|
|
|
|
|
|
|
|
if err := encodeActionSubmissionTriggerPublishResponse(response, w, span); err != nil {
|
|
|
|
defer recordError("EncodeResponse", err)
|
|
|
|
if !errors.Is(err, ht.ErrInternalServerErrorResponse) {
|
|
|
|
s.cfg.ErrorHandler(ctx, w, r, err)
|
|
|
|
}
|
|
|
|
return
|
|
|
|
}
|
|
|
|
}
|
|
|
|
|
|
|
|
// handleActionSubmissionTriggerValidateRequest handles actionSubmissionTriggerValidate operation.
|
|
|
|
//
|
|
|
|
// Role Reviewer triggers validation and changes status from Submitted|Accepted -> Validating.
|
|
|
|
//
|
|
|
|
// PATCH /submissions/{SubmissionID}/status/trigger-validate
|
|
|
|
func (s *Server) handleActionSubmissionTriggerValidateRequest(args [1]string, argsEscaped bool, w http.ResponseWriter, r *http.Request) {
|
2024-12-06 00:36:15 +00:00
|
|
|
statusWriter := &codeRecorder{ResponseWriter: w}
|
|
|
|
w = statusWriter
|
2024-11-28 01:46:54 +00:00
|
|
|
otelAttrs := []attribute.KeyValue{
|
|
|
|
otelogen.OperationID("actionSubmissionTriggerValidate"),
|
|
|
|
semconv.HTTPRequestMethodKey.String("PATCH"),
|
|
|
|
semconv.HTTPRouteKey.String("/submissions/{SubmissionID}/status/trigger-validate"),
|
|
|
|
}
|
|
|
|
|
|
|
|
// Start a span for this request.
|
2024-11-29 22:33:48 +00:00
|
|
|
ctx, span := s.cfg.Tracer.Start(r.Context(), ActionSubmissionTriggerValidateOperation,
|
2024-11-28 01:46:54 +00:00
|
|
|
trace.WithAttributes(otelAttrs...),
|
|
|
|
serverSpanKind,
|
|
|
|
)
|
|
|
|
defer span.End()
|
|
|
|
|
|
|
|
// Add Labeler to context.
|
|
|
|
labeler := &Labeler{attrs: otelAttrs}
|
|
|
|
ctx = contextWithLabeler(ctx, labeler)
|
|
|
|
|
|
|
|
// Run stopwatch.
|
|
|
|
startTime := time.Now()
|
|
|
|
defer func() {
|
|
|
|
elapsedDuration := time.Since(startTime)
|
2024-12-06 00:36:15 +00:00
|
|
|
|
|
|
|
attrSet := labeler.AttributeSet()
|
|
|
|
attrs := attrSet.ToSlice()
|
|
|
|
code := statusWriter.status
|
|
|
|
if code != 0 {
|
|
|
|
codeAttr := semconv.HTTPResponseStatusCode(code)
|
|
|
|
attrs = append(attrs, codeAttr)
|
|
|
|
span.SetAttributes(codeAttr)
|
|
|
|
}
|
|
|
|
attrOpt := metric.WithAttributes(attrs...)
|
2024-11-28 01:46:54 +00:00
|
|
|
|
|
|
|
// Increment request counter.
|
|
|
|
s.requests.Add(ctx, 1, attrOpt)
|
|
|
|
|
|
|
|
// Use floating point division here for higher precision (instead of Millisecond method).
|
2024-12-06 00:36:15 +00:00
|
|
|
s.duration.Record(ctx, float64(elapsedDuration)/float64(time.Millisecond), attrOpt)
|
2024-11-28 01:46:54 +00:00
|
|
|
}()
|
|
|
|
|
|
|
|
var (
|
|
|
|
recordError = func(stage string, err error) {
|
|
|
|
span.RecordError(err)
|
2024-12-06 00:36:15 +00:00
|
|
|
|
|
|
|
// https://opentelemetry.io/docs/specs/semconv/http/http-spans/#status
|
|
|
|
// Span Status MUST be left unset if HTTP status code was in the 1xx, 2xx or 3xx ranges,
|
|
|
|
// unless there was another error (e.g., network error receiving the response body; or 3xx codes with
|
|
|
|
// max redirects exceeded), in which case status MUST be set to Error.
|
|
|
|
code := statusWriter.status
|
|
|
|
if code >= 100 && code < 500 {
|
|
|
|
span.SetStatus(codes.Error, stage)
|
|
|
|
}
|
|
|
|
|
|
|
|
attrSet := labeler.AttributeSet()
|
|
|
|
attrs := attrSet.ToSlice()
|
|
|
|
if code != 0 {
|
|
|
|
attrs = append(attrs, semconv.HTTPResponseStatusCode(code))
|
|
|
|
}
|
|
|
|
|
|
|
|
s.errors.Add(ctx, 1, metric.WithAttributes(attrs...))
|
2024-11-28 01:46:54 +00:00
|
|
|
}
|
|
|
|
err error
|
|
|
|
opErrContext = ogenerrors.OperationContext{
|
2024-11-29 22:33:48 +00:00
|
|
|
Name: ActionSubmissionTriggerValidateOperation,
|
2024-11-28 01:46:54 +00:00
|
|
|
ID: "actionSubmissionTriggerValidate",
|
|
|
|
}
|
|
|
|
)
|
2024-11-29 22:33:48 +00:00
|
|
|
{
|
|
|
|
type bitset = [1]uint8
|
|
|
|
var satisfied bitset
|
|
|
|
{
|
|
|
|
sctx, ok, err := s.securityCookieAuth(ctx, ActionSubmissionTriggerValidateOperation, r)
|
|
|
|
if err != nil {
|
|
|
|
err = &ogenerrors.SecurityError{
|
|
|
|
OperationContext: opErrContext,
|
|
|
|
Security: "CookieAuth",
|
|
|
|
Err: err,
|
|
|
|
}
|
|
|
|
if encodeErr := encodeErrorResponse(s.h.NewError(ctx, err), w, span); encodeErr != nil {
|
|
|
|
defer recordError("Security:CookieAuth", err)
|
|
|
|
}
|
|
|
|
return
|
|
|
|
}
|
|
|
|
if ok {
|
|
|
|
satisfied[0] |= 1 << 0
|
|
|
|
ctx = sctx
|
|
|
|
}
|
|
|
|
}
|
|
|
|
|
|
|
|
if ok := func() bool {
|
|
|
|
nextRequirement:
|
|
|
|
for _, requirement := range []bitset{
|
|
|
|
{0b00000001},
|
|
|
|
} {
|
|
|
|
for i, mask := range requirement {
|
|
|
|
if satisfied[i]&mask != mask {
|
|
|
|
continue nextRequirement
|
|
|
|
}
|
|
|
|
}
|
|
|
|
return true
|
|
|
|
}
|
|
|
|
return false
|
|
|
|
}(); !ok {
|
|
|
|
err = &ogenerrors.SecurityError{
|
|
|
|
OperationContext: opErrContext,
|
|
|
|
Err: ogenerrors.ErrSecurityRequirementIsNotSatisfied,
|
|
|
|
}
|
|
|
|
if encodeErr := encodeErrorResponse(s.h.NewError(ctx, err), w, span); encodeErr != nil {
|
|
|
|
defer recordError("Security", err)
|
|
|
|
}
|
|
|
|
return
|
|
|
|
}
|
|
|
|
}
|
2024-11-28 01:46:54 +00:00
|
|
|
params, err := decodeActionSubmissionTriggerValidateParams(args, argsEscaped, r)
|
|
|
|
if err != nil {
|
|
|
|
err = &ogenerrors.DecodeParamsError{
|
|
|
|
OperationContext: opErrContext,
|
|
|
|
Err: err,
|
|
|
|
}
|
|
|
|
defer recordError("DecodeParams", err)
|
|
|
|
s.cfg.ErrorHandler(ctx, w, r, err)
|
|
|
|
return
|
|
|
|
}
|
|
|
|
|
|
|
|
var response *ActionSubmissionTriggerValidateOK
|
|
|
|
if m := s.cfg.Middleware; m != nil {
|
|
|
|
mreq := middleware.Request{
|
|
|
|
Context: ctx,
|
2024-11-29 22:33:48 +00:00
|
|
|
OperationName: ActionSubmissionTriggerValidateOperation,
|
2024-11-28 01:46:54 +00:00
|
|
|
OperationSummary: "Role Reviewer triggers validation and changes status from Submitted|Accepted -> Validating",
|
|
|
|
OperationID: "actionSubmissionTriggerValidate",
|
|
|
|
Body: nil,
|
|
|
|
Params: middleware.Parameters{
|
|
|
|
{
|
|
|
|
Name: "SubmissionID",
|
|
|
|
In: "path",
|
|
|
|
}: params.SubmissionID,
|
|
|
|
},
|
|
|
|
Raw: r,
|
|
|
|
}
|
|
|
|
|
|
|
|
type (
|
|
|
|
Request = struct{}
|
|
|
|
Params = ActionSubmissionTriggerValidateParams
|
|
|
|
Response = *ActionSubmissionTriggerValidateOK
|
|
|
|
)
|
|
|
|
response, err = middleware.HookMiddleware[
|
|
|
|
Request,
|
|
|
|
Params,
|
|
|
|
Response,
|
|
|
|
](
|
|
|
|
m,
|
|
|
|
mreq,
|
|
|
|
unpackActionSubmissionTriggerValidateParams,
|
|
|
|
func(ctx context.Context, request Request, params Params) (response Response, err error) {
|
|
|
|
err = s.h.ActionSubmissionTriggerValidate(ctx, params)
|
|
|
|
return response, err
|
|
|
|
},
|
|
|
|
)
|
|
|
|
} else {
|
|
|
|
err = s.h.ActionSubmissionTriggerValidate(ctx, params)
|
|
|
|
}
|
|
|
|
if err != nil {
|
|
|
|
if errRes, ok := errors.Into[*ErrorStatusCode](err); ok {
|
|
|
|
if err := encodeErrorResponse(errRes, w, span); err != nil {
|
|
|
|
defer recordError("Internal", err)
|
|
|
|
}
|
|
|
|
return
|
|
|
|
}
|
|
|
|
if errors.Is(err, ht.ErrNotImplemented) {
|
|
|
|
s.cfg.ErrorHandler(ctx, w, r, err)
|
|
|
|
return
|
|
|
|
}
|
|
|
|
if err := encodeErrorResponse(s.h.NewError(ctx, err), w, span); err != nil {
|
|
|
|
defer recordError("Internal", err)
|
|
|
|
}
|
|
|
|
return
|
|
|
|
}
|
|
|
|
|
|
|
|
if err := encodeActionSubmissionTriggerValidateResponse(response, w, span); err != nil {
|
|
|
|
defer recordError("EncodeResponse", err)
|
|
|
|
if !errors.Is(err, ht.ErrInternalServerErrorResponse) {
|
|
|
|
s.cfg.ErrorHandler(ctx, w, r, err)
|
|
|
|
}
|
|
|
|
return
|
|
|
|
}
|
|
|
|
}
|
|
|
|
|
|
|
|
// handleActionSubmissionValidateRequest handles actionSubmissionValidate operation.
|
|
|
|
//
|
|
|
|
// Role Validator changes status from Validating -> Validated.
|
|
|
|
//
|
|
|
|
// PATCH /submissions/{SubmissionID}/status/validate
|
|
|
|
func (s *Server) handleActionSubmissionValidateRequest(args [1]string, argsEscaped bool, w http.ResponseWriter, r *http.Request) {
|
2024-12-06 00:36:15 +00:00
|
|
|
statusWriter := &codeRecorder{ResponseWriter: w}
|
|
|
|
w = statusWriter
|
2024-11-28 01:46:54 +00:00
|
|
|
otelAttrs := []attribute.KeyValue{
|
|
|
|
otelogen.OperationID("actionSubmissionValidate"),
|
|
|
|
semconv.HTTPRequestMethodKey.String("PATCH"),
|
|
|
|
semconv.HTTPRouteKey.String("/submissions/{SubmissionID}/status/validate"),
|
|
|
|
}
|
|
|
|
|
|
|
|
// Start a span for this request.
|
2024-11-29 22:33:48 +00:00
|
|
|
ctx, span := s.cfg.Tracer.Start(r.Context(), ActionSubmissionValidateOperation,
|
2024-11-28 01:46:54 +00:00
|
|
|
trace.WithAttributes(otelAttrs...),
|
|
|
|
serverSpanKind,
|
|
|
|
)
|
|
|
|
defer span.End()
|
|
|
|
|
|
|
|
// Add Labeler to context.
|
|
|
|
labeler := &Labeler{attrs: otelAttrs}
|
|
|
|
ctx = contextWithLabeler(ctx, labeler)
|
|
|
|
|
|
|
|
// Run stopwatch.
|
|
|
|
startTime := time.Now()
|
|
|
|
defer func() {
|
|
|
|
elapsedDuration := time.Since(startTime)
|
2024-12-06 00:36:15 +00:00
|
|
|
|
|
|
|
attrSet := labeler.AttributeSet()
|
|
|
|
attrs := attrSet.ToSlice()
|
|
|
|
code := statusWriter.status
|
|
|
|
if code != 0 {
|
|
|
|
codeAttr := semconv.HTTPResponseStatusCode(code)
|
|
|
|
attrs = append(attrs, codeAttr)
|
|
|
|
span.SetAttributes(codeAttr)
|
|
|
|
}
|
|
|
|
attrOpt := metric.WithAttributes(attrs...)
|
2024-11-28 01:46:54 +00:00
|
|
|
|
|
|
|
// Increment request counter.
|
|
|
|
s.requests.Add(ctx, 1, attrOpt)
|
|
|
|
|
|
|
|
// Use floating point division here for higher precision (instead of Millisecond method).
|
2024-12-06 00:36:15 +00:00
|
|
|
s.duration.Record(ctx, float64(elapsedDuration)/float64(time.Millisecond), attrOpt)
|
2024-11-28 01:46:54 +00:00
|
|
|
}()
|
|
|
|
|
|
|
|
var (
|
|
|
|
recordError = func(stage string, err error) {
|
|
|
|
span.RecordError(err)
|
2024-12-06 00:36:15 +00:00
|
|
|
|
|
|
|
// https://opentelemetry.io/docs/specs/semconv/http/http-spans/#status
|
|
|
|
// Span Status MUST be left unset if HTTP status code was in the 1xx, 2xx or 3xx ranges,
|
|
|
|
// unless there was another error (e.g., network error receiving the response body; or 3xx codes with
|
|
|
|
// max redirects exceeded), in which case status MUST be set to Error.
|
|
|
|
code := statusWriter.status
|
|
|
|
if code >= 100 && code < 500 {
|
|
|
|
span.SetStatus(codes.Error, stage)
|
|
|
|
}
|
|
|
|
|
|
|
|
attrSet := labeler.AttributeSet()
|
|
|
|
attrs := attrSet.ToSlice()
|
|
|
|
if code != 0 {
|
|
|
|
attrs = append(attrs, semconv.HTTPResponseStatusCode(code))
|
|
|
|
}
|
|
|
|
|
|
|
|
s.errors.Add(ctx, 1, metric.WithAttributes(attrs...))
|
2024-11-28 01:46:54 +00:00
|
|
|
}
|
|
|
|
err error
|
|
|
|
opErrContext = ogenerrors.OperationContext{
|
2024-11-29 22:33:48 +00:00
|
|
|
Name: ActionSubmissionValidateOperation,
|
2024-11-28 01:46:54 +00:00
|
|
|
ID: "actionSubmissionValidate",
|
|
|
|
}
|
|
|
|
)
|
2024-11-29 22:33:48 +00:00
|
|
|
{
|
|
|
|
type bitset = [1]uint8
|
|
|
|
var satisfied bitset
|
|
|
|
{
|
|
|
|
sctx, ok, err := s.securityCookieAuth(ctx, ActionSubmissionValidateOperation, r)
|
|
|
|
if err != nil {
|
|
|
|
err = &ogenerrors.SecurityError{
|
|
|
|
OperationContext: opErrContext,
|
|
|
|
Security: "CookieAuth",
|
|
|
|
Err: err,
|
|
|
|
}
|
|
|
|
if encodeErr := encodeErrorResponse(s.h.NewError(ctx, err), w, span); encodeErr != nil {
|
|
|
|
defer recordError("Security:CookieAuth", err)
|
|
|
|
}
|
|
|
|
return
|
|
|
|
}
|
|
|
|
if ok {
|
|
|
|
satisfied[0] |= 1 << 0
|
|
|
|
ctx = sctx
|
|
|
|
}
|
|
|
|
}
|
|
|
|
|
|
|
|
if ok := func() bool {
|
|
|
|
nextRequirement:
|
|
|
|
for _, requirement := range []bitset{
|
|
|
|
{0b00000001},
|
|
|
|
} {
|
|
|
|
for i, mask := range requirement {
|
|
|
|
if satisfied[i]&mask != mask {
|
|
|
|
continue nextRequirement
|
|
|
|
}
|
|
|
|
}
|
|
|
|
return true
|
|
|
|
}
|
|
|
|
return false
|
|
|
|
}(); !ok {
|
|
|
|
err = &ogenerrors.SecurityError{
|
|
|
|
OperationContext: opErrContext,
|
|
|
|
Err: ogenerrors.ErrSecurityRequirementIsNotSatisfied,
|
|
|
|
}
|
|
|
|
if encodeErr := encodeErrorResponse(s.h.NewError(ctx, err), w, span); encodeErr != nil {
|
|
|
|
defer recordError("Security", err)
|
|
|
|
}
|
|
|
|
return
|
|
|
|
}
|
|
|
|
}
|
2024-11-28 01:46:54 +00:00
|
|
|
params, err := decodeActionSubmissionValidateParams(args, argsEscaped, r)
|
|
|
|
if err != nil {
|
|
|
|
err = &ogenerrors.DecodeParamsError{
|
|
|
|
OperationContext: opErrContext,
|
|
|
|
Err: err,
|
|
|
|
}
|
|
|
|
defer recordError("DecodeParams", err)
|
|
|
|
s.cfg.ErrorHandler(ctx, w, r, err)
|
|
|
|
return
|
|
|
|
}
|
|
|
|
|
|
|
|
var response *ActionSubmissionValidateOK
|
|
|
|
if m := s.cfg.Middleware; m != nil {
|
|
|
|
mreq := middleware.Request{
|
|
|
|
Context: ctx,
|
2024-11-29 22:33:48 +00:00
|
|
|
OperationName: ActionSubmissionValidateOperation,
|
2024-11-28 01:46:54 +00:00
|
|
|
OperationSummary: "Role Validator changes status from Validating -> Validated",
|
|
|
|
OperationID: "actionSubmissionValidate",
|
|
|
|
Body: nil,
|
|
|
|
Params: middleware.Parameters{
|
|
|
|
{
|
|
|
|
Name: "SubmissionID",
|
|
|
|
In: "path",
|
|
|
|
}: params.SubmissionID,
|
|
|
|
},
|
|
|
|
Raw: r,
|
|
|
|
}
|
|
|
|
|
|
|
|
type (
|
|
|
|
Request = struct{}
|
|
|
|
Params = ActionSubmissionValidateParams
|
|
|
|
Response = *ActionSubmissionValidateOK
|
|
|
|
)
|
|
|
|
response, err = middleware.HookMiddleware[
|
|
|
|
Request,
|
|
|
|
Params,
|
|
|
|
Response,
|
|
|
|
](
|
|
|
|
m,
|
|
|
|
mreq,
|
|
|
|
unpackActionSubmissionValidateParams,
|
|
|
|
func(ctx context.Context, request Request, params Params) (response Response, err error) {
|
|
|
|
err = s.h.ActionSubmissionValidate(ctx, params)
|
|
|
|
return response, err
|
|
|
|
},
|
|
|
|
)
|
|
|
|
} else {
|
|
|
|
err = s.h.ActionSubmissionValidate(ctx, params)
|
|
|
|
}
|
|
|
|
if err != nil {
|
|
|
|
if errRes, ok := errors.Into[*ErrorStatusCode](err); ok {
|
|
|
|
if err := encodeErrorResponse(errRes, w, span); err != nil {
|
|
|
|
defer recordError("Internal", err)
|
|
|
|
}
|
|
|
|
return
|
|
|
|
}
|
|
|
|
if errors.Is(err, ht.ErrNotImplemented) {
|
|
|
|
s.cfg.ErrorHandler(ctx, w, r, err)
|
|
|
|
return
|
|
|
|
}
|
|
|
|
if err := encodeErrorResponse(s.h.NewError(ctx, err), w, span); err != nil {
|
|
|
|
defer recordError("Internal", err)
|
|
|
|
}
|
|
|
|
return
|
|
|
|
}
|
|
|
|
|
|
|
|
if err := encodeActionSubmissionValidateResponse(response, w, span); err != nil {
|
|
|
|
defer recordError("EncodeResponse", err)
|
|
|
|
if !errors.Is(err, ht.ErrInternalServerErrorResponse) {
|
|
|
|
s.cfg.ErrorHandler(ctx, w, r, err)
|
|
|
|
}
|
|
|
|
return
|
|
|
|
}
|
|
|
|
}
|
|
|
|
|
2024-12-06 00:36:15 +00:00
|
|
|
// handleCreateScriptRequest handles createScript operation.
|
2024-11-26 01:22:45 +00:00
|
|
|
//
|
2024-12-06 00:36:15 +00:00
|
|
|
// Create a new script.
|
2024-11-26 01:22:45 +00:00
|
|
|
//
|
2024-12-06 00:36:15 +00:00
|
|
|
// POST /scripts
|
|
|
|
func (s *Server) handleCreateScriptRequest(args [0]string, argsEscaped bool, w http.ResponseWriter, r *http.Request) {
|
|
|
|
statusWriter := &codeRecorder{ResponseWriter: w}
|
|
|
|
w = statusWriter
|
2024-11-26 01:22:45 +00:00
|
|
|
otelAttrs := []attribute.KeyValue{
|
2024-12-06 00:36:15 +00:00
|
|
|
otelogen.OperationID("createScript"),
|
2024-11-26 20:39:10 +00:00
|
|
|
semconv.HTTPRequestMethodKey.String("POST"),
|
2024-12-06 00:36:15 +00:00
|
|
|
semconv.HTTPRouteKey.String("/scripts"),
|
2024-11-26 01:22:45 +00:00
|
|
|
}
|
|
|
|
|
|
|
|
// Start a span for this request.
|
2024-12-06 00:36:15 +00:00
|
|
|
ctx, span := s.cfg.Tracer.Start(r.Context(), CreateScriptOperation,
|
2024-11-26 20:39:10 +00:00
|
|
|
trace.WithAttributes(otelAttrs...),
|
|
|
|
serverSpanKind,
|
|
|
|
)
|
|
|
|
defer span.End()
|
|
|
|
|
|
|
|
// Add Labeler to context.
|
|
|
|
labeler := &Labeler{attrs: otelAttrs}
|
|
|
|
ctx = contextWithLabeler(ctx, labeler)
|
|
|
|
|
|
|
|
// Run stopwatch.
|
|
|
|
startTime := time.Now()
|
|
|
|
defer func() {
|
|
|
|
elapsedDuration := time.Since(startTime)
|
2024-12-06 00:36:15 +00:00
|
|
|
|
|
|
|
attrSet := labeler.AttributeSet()
|
|
|
|
attrs := attrSet.ToSlice()
|
|
|
|
code := statusWriter.status
|
|
|
|
if code != 0 {
|
|
|
|
codeAttr := semconv.HTTPResponseStatusCode(code)
|
|
|
|
attrs = append(attrs, codeAttr)
|
|
|
|
span.SetAttributes(codeAttr)
|
|
|
|
}
|
|
|
|
attrOpt := metric.WithAttributes(attrs...)
|
2024-11-26 20:39:10 +00:00
|
|
|
|
|
|
|
// Increment request counter.
|
|
|
|
s.requests.Add(ctx, 1, attrOpt)
|
|
|
|
|
|
|
|
// Use floating point division here for higher precision (instead of Millisecond method).
|
2024-12-06 00:36:15 +00:00
|
|
|
s.duration.Record(ctx, float64(elapsedDuration)/float64(time.Millisecond), attrOpt)
|
2024-11-26 20:39:10 +00:00
|
|
|
}()
|
|
|
|
|
|
|
|
var (
|
|
|
|
recordError = func(stage string, err error) {
|
|
|
|
span.RecordError(err)
|
2024-12-06 00:36:15 +00:00
|
|
|
|
|
|
|
// https://opentelemetry.io/docs/specs/semconv/http/http-spans/#status
|
|
|
|
// Span Status MUST be left unset if HTTP status code was in the 1xx, 2xx or 3xx ranges,
|
|
|
|
// unless there was another error (e.g., network error receiving the response body; or 3xx codes with
|
|
|
|
// max redirects exceeded), in which case status MUST be set to Error.
|
|
|
|
code := statusWriter.status
|
|
|
|
if code >= 100 && code < 500 {
|
|
|
|
span.SetStatus(codes.Error, stage)
|
|
|
|
}
|
|
|
|
|
|
|
|
attrSet := labeler.AttributeSet()
|
|
|
|
attrs := attrSet.ToSlice()
|
|
|
|
if code != 0 {
|
|
|
|
attrs = append(attrs, semconv.HTTPResponseStatusCode(code))
|
|
|
|
}
|
|
|
|
|
|
|
|
s.errors.Add(ctx, 1, metric.WithAttributes(attrs...))
|
2024-11-26 20:39:10 +00:00
|
|
|
}
|
2024-11-27 23:38:17 +00:00
|
|
|
err error
|
|
|
|
opErrContext = ogenerrors.OperationContext{
|
2024-12-06 00:36:15 +00:00
|
|
|
Name: CreateScriptOperation,
|
|
|
|
ID: "createScript",
|
2024-11-27 23:38:17 +00:00
|
|
|
}
|
2024-11-26 20:39:10 +00:00
|
|
|
)
|
2024-11-29 22:33:48 +00:00
|
|
|
{
|
|
|
|
type bitset = [1]uint8
|
|
|
|
var satisfied bitset
|
|
|
|
{
|
2024-12-06 00:36:15 +00:00
|
|
|
sctx, ok, err := s.securityCookieAuth(ctx, CreateScriptOperation, r)
|
2024-11-29 22:33:48 +00:00
|
|
|
if err != nil {
|
|
|
|
err = &ogenerrors.SecurityError{
|
|
|
|
OperationContext: opErrContext,
|
|
|
|
Security: "CookieAuth",
|
|
|
|
Err: err,
|
|
|
|
}
|
|
|
|
if encodeErr := encodeErrorResponse(s.h.NewError(ctx, err), w, span); encodeErr != nil {
|
|
|
|
defer recordError("Security:CookieAuth", err)
|
|
|
|
}
|
|
|
|
return
|
|
|
|
}
|
|
|
|
if ok {
|
|
|
|
satisfied[0] |= 1 << 0
|
|
|
|
ctx = sctx
|
|
|
|
}
|
|
|
|
}
|
|
|
|
|
|
|
|
if ok := func() bool {
|
|
|
|
nextRequirement:
|
|
|
|
for _, requirement := range []bitset{
|
|
|
|
{0b00000001},
|
|
|
|
} {
|
|
|
|
for i, mask := range requirement {
|
|
|
|
if satisfied[i]&mask != mask {
|
|
|
|
continue nextRequirement
|
|
|
|
}
|
|
|
|
}
|
|
|
|
return true
|
|
|
|
}
|
|
|
|
return false
|
|
|
|
}(); !ok {
|
|
|
|
err = &ogenerrors.SecurityError{
|
|
|
|
OperationContext: opErrContext,
|
|
|
|
Err: ogenerrors.ErrSecurityRequirementIsNotSatisfied,
|
|
|
|
}
|
|
|
|
if encodeErr := encodeErrorResponse(s.h.NewError(ctx, err), w, span); encodeErr != nil {
|
|
|
|
defer recordError("Security", err)
|
|
|
|
}
|
|
|
|
return
|
|
|
|
}
|
|
|
|
}
|
2024-12-06 00:36:15 +00:00
|
|
|
request, close, err := s.decodeCreateScriptRequest(r)
|
2024-11-27 23:38:17 +00:00
|
|
|
if err != nil {
|
|
|
|
err = &ogenerrors.DecodeRequestError{
|
|
|
|
OperationContext: opErrContext,
|
|
|
|
Err: err,
|
|
|
|
}
|
|
|
|
defer recordError("DecodeRequest", err)
|
|
|
|
s.cfg.ErrorHandler(ctx, w, r, err)
|
|
|
|
return
|
|
|
|
}
|
|
|
|
defer func() {
|
|
|
|
if err := close(); err != nil {
|
|
|
|
recordError("CloseRequest", err)
|
|
|
|
}
|
|
|
|
}()
|
2024-11-26 20:39:10 +00:00
|
|
|
|
2024-11-28 00:13:43 +00:00
|
|
|
var response *ID
|
2024-11-26 20:39:10 +00:00
|
|
|
if m := s.cfg.Middleware; m != nil {
|
|
|
|
mreq := middleware.Request{
|
|
|
|
Context: ctx,
|
2024-12-06 00:36:15 +00:00
|
|
|
OperationName: CreateScriptOperation,
|
|
|
|
OperationSummary: "Create a new script",
|
|
|
|
OperationID: "createScript",
|
2024-11-27 23:38:17 +00:00
|
|
|
Body: request,
|
2024-11-26 20:39:10 +00:00
|
|
|
Params: middleware.Parameters{},
|
|
|
|
Raw: r,
|
|
|
|
}
|
|
|
|
|
|
|
|
type (
|
2024-12-06 00:36:15 +00:00
|
|
|
Request = OptScriptCreate
|
2024-11-26 20:39:10 +00:00
|
|
|
Params = struct{}
|
2024-11-28 00:13:43 +00:00
|
|
|
Response = *ID
|
2024-11-26 20:39:10 +00:00
|
|
|
)
|
|
|
|
response, err = middleware.HookMiddleware[
|
|
|
|
Request,
|
|
|
|
Params,
|
|
|
|
Response,
|
|
|
|
](
|
|
|
|
m,
|
|
|
|
mreq,
|
|
|
|
nil,
|
|
|
|
func(ctx context.Context, request Request, params Params) (response Response, err error) {
|
2024-12-06 00:36:15 +00:00
|
|
|
response, err = s.h.CreateScript(ctx, request)
|
2024-11-26 20:39:10 +00:00
|
|
|
return response, err
|
|
|
|
},
|
|
|
|
)
|
|
|
|
} else {
|
2024-12-06 00:36:15 +00:00
|
|
|
response, err = s.h.CreateScript(ctx, request)
|
2024-11-26 20:39:10 +00:00
|
|
|
}
|
|
|
|
if err != nil {
|
|
|
|
if errRes, ok := errors.Into[*ErrorStatusCode](err); ok {
|
|
|
|
if err := encodeErrorResponse(errRes, w, span); err != nil {
|
|
|
|
defer recordError("Internal", err)
|
|
|
|
}
|
|
|
|
return
|
|
|
|
}
|
|
|
|
if errors.Is(err, ht.ErrNotImplemented) {
|
|
|
|
s.cfg.ErrorHandler(ctx, w, r, err)
|
|
|
|
return
|
|
|
|
}
|
|
|
|
if err := encodeErrorResponse(s.h.NewError(ctx, err), w, span); err != nil {
|
|
|
|
defer recordError("Internal", err)
|
|
|
|
}
|
|
|
|
return
|
|
|
|
}
|
|
|
|
|
2024-12-06 00:36:15 +00:00
|
|
|
if err := encodeCreateScriptResponse(response, w, span); err != nil {
|
2024-11-26 20:39:10 +00:00
|
|
|
defer recordError("EncodeResponse", err)
|
|
|
|
if !errors.Is(err, ht.ErrInternalServerErrorResponse) {
|
|
|
|
s.cfg.ErrorHandler(ctx, w, r, err)
|
|
|
|
}
|
|
|
|
return
|
|
|
|
}
|
|
|
|
}
|
|
|
|
|
2024-12-06 00:36:15 +00:00
|
|
|
// handleCreateScriptPolicyRequest handles createScriptPolicy operation.
|
2024-11-26 20:39:10 +00:00
|
|
|
//
|
2024-12-06 00:36:15 +00:00
|
|
|
// Create a new script policy.
|
2024-11-26 20:39:10 +00:00
|
|
|
//
|
2024-12-06 00:36:15 +00:00
|
|
|
// POST /script-policy
|
|
|
|
func (s *Server) handleCreateScriptPolicyRequest(args [0]string, argsEscaped bool, w http.ResponseWriter, r *http.Request) {
|
|
|
|
statusWriter := &codeRecorder{ResponseWriter: w}
|
|
|
|
w = statusWriter
|
2024-11-26 20:39:10 +00:00
|
|
|
otelAttrs := []attribute.KeyValue{
|
2024-12-06 00:36:15 +00:00
|
|
|
otelogen.OperationID("createScriptPolicy"),
|
|
|
|
semconv.HTTPRequestMethodKey.String("POST"),
|
|
|
|
semconv.HTTPRouteKey.String("/script-policy"),
|
2024-11-26 20:39:10 +00:00
|
|
|
}
|
|
|
|
|
|
|
|
// Start a span for this request.
|
2024-12-06 00:36:15 +00:00
|
|
|
ctx, span := s.cfg.Tracer.Start(r.Context(), CreateScriptPolicyOperation,
|
2024-11-26 01:22:45 +00:00
|
|
|
trace.WithAttributes(otelAttrs...),
|
|
|
|
serverSpanKind,
|
|
|
|
)
|
|
|
|
defer span.End()
|
|
|
|
|
|
|
|
// Add Labeler to context.
|
|
|
|
labeler := &Labeler{attrs: otelAttrs}
|
|
|
|
ctx = contextWithLabeler(ctx, labeler)
|
|
|
|
|
|
|
|
// Run stopwatch.
|
|
|
|
startTime := time.Now()
|
|
|
|
defer func() {
|
|
|
|
elapsedDuration := time.Since(startTime)
|
2024-12-06 00:36:15 +00:00
|
|
|
|
|
|
|
attrSet := labeler.AttributeSet()
|
|
|
|
attrs := attrSet.ToSlice()
|
|
|
|
code := statusWriter.status
|
|
|
|
if code != 0 {
|
|
|
|
codeAttr := semconv.HTTPResponseStatusCode(code)
|
|
|
|
attrs = append(attrs, codeAttr)
|
|
|
|
span.SetAttributes(codeAttr)
|
|
|
|
}
|
|
|
|
attrOpt := metric.WithAttributes(attrs...)
|
2024-11-26 01:22:45 +00:00
|
|
|
|
|
|
|
// Increment request counter.
|
|
|
|
s.requests.Add(ctx, 1, attrOpt)
|
|
|
|
|
|
|
|
// Use floating point division here for higher precision (instead of Millisecond method).
|
2024-12-06 00:36:15 +00:00
|
|
|
s.duration.Record(ctx, float64(elapsedDuration)/float64(time.Millisecond), attrOpt)
|
2024-11-26 01:22:45 +00:00
|
|
|
}()
|
|
|
|
|
|
|
|
var (
|
|
|
|
recordError = func(stage string, err error) {
|
|
|
|
span.RecordError(err)
|
2024-12-06 00:36:15 +00:00
|
|
|
|
|
|
|
// https://opentelemetry.io/docs/specs/semconv/http/http-spans/#status
|
|
|
|
// Span Status MUST be left unset if HTTP status code was in the 1xx, 2xx or 3xx ranges,
|
|
|
|
// unless there was another error (e.g., network error receiving the response body; or 3xx codes with
|
|
|
|
// max redirects exceeded), in which case status MUST be set to Error.
|
|
|
|
code := statusWriter.status
|
|
|
|
if code >= 100 && code < 500 {
|
|
|
|
span.SetStatus(codes.Error, stage)
|
|
|
|
}
|
|
|
|
|
|
|
|
attrSet := labeler.AttributeSet()
|
|
|
|
attrs := attrSet.ToSlice()
|
|
|
|
if code != 0 {
|
|
|
|
attrs = append(attrs, semconv.HTTPResponseStatusCode(code))
|
|
|
|
}
|
|
|
|
|
|
|
|
s.errors.Add(ctx, 1, metric.WithAttributes(attrs...))
|
2024-11-26 01:22:45 +00:00
|
|
|
}
|
|
|
|
err error
|
|
|
|
opErrContext = ogenerrors.OperationContext{
|
2024-12-06 00:36:15 +00:00
|
|
|
Name: CreateScriptPolicyOperation,
|
|
|
|
ID: "createScriptPolicy",
|
2024-11-26 01:22:45 +00:00
|
|
|
}
|
|
|
|
)
|
2024-11-29 22:33:48 +00:00
|
|
|
{
|
|
|
|
type bitset = [1]uint8
|
|
|
|
var satisfied bitset
|
|
|
|
{
|
2024-12-06 00:36:15 +00:00
|
|
|
sctx, ok, err := s.securityCookieAuth(ctx, CreateScriptPolicyOperation, r)
|
2024-11-29 22:33:48 +00:00
|
|
|
if err != nil {
|
|
|
|
err = &ogenerrors.SecurityError{
|
|
|
|
OperationContext: opErrContext,
|
|
|
|
Security: "CookieAuth",
|
|
|
|
Err: err,
|
|
|
|
}
|
|
|
|
if encodeErr := encodeErrorResponse(s.h.NewError(ctx, err), w, span); encodeErr != nil {
|
|
|
|
defer recordError("Security:CookieAuth", err)
|
|
|
|
}
|
|
|
|
return
|
|
|
|
}
|
|
|
|
if ok {
|
|
|
|
satisfied[0] |= 1 << 0
|
|
|
|
ctx = sctx
|
|
|
|
}
|
|
|
|
}
|
|
|
|
|
|
|
|
if ok := func() bool {
|
|
|
|
nextRequirement:
|
|
|
|
for _, requirement := range []bitset{
|
|
|
|
{0b00000001},
|
|
|
|
} {
|
|
|
|
for i, mask := range requirement {
|
|
|
|
if satisfied[i]&mask != mask {
|
|
|
|
continue nextRequirement
|
|
|
|
}
|
|
|
|
}
|
|
|
|
return true
|
|
|
|
}
|
|
|
|
return false
|
|
|
|
}(); !ok {
|
|
|
|
err = &ogenerrors.SecurityError{
|
|
|
|
OperationContext: opErrContext,
|
|
|
|
Err: ogenerrors.ErrSecurityRequirementIsNotSatisfied,
|
|
|
|
}
|
|
|
|
if encodeErr := encodeErrorResponse(s.h.NewError(ctx, err), w, span); encodeErr != nil {
|
|
|
|
defer recordError("Security", err)
|
|
|
|
}
|
|
|
|
return
|
|
|
|
}
|
|
|
|
}
|
2024-12-06 00:36:15 +00:00
|
|
|
request, close, err := s.decodeCreateScriptPolicyRequest(r)
|
2024-11-26 01:22:45 +00:00
|
|
|
if err != nil {
|
2024-12-06 00:36:15 +00:00
|
|
|
err = &ogenerrors.DecodeRequestError{
|
2024-11-26 01:22:45 +00:00
|
|
|
OperationContext: opErrContext,
|
|
|
|
Err: err,
|
|
|
|
}
|
2024-12-06 00:36:15 +00:00
|
|
|
defer recordError("DecodeRequest", err)
|
2024-11-26 01:22:45 +00:00
|
|
|
s.cfg.ErrorHandler(ctx, w, r, err)
|
|
|
|
return
|
|
|
|
}
|
2024-12-06 00:36:15 +00:00
|
|
|
defer func() {
|
|
|
|
if err := close(); err != nil {
|
|
|
|
recordError("CloseRequest", err)
|
|
|
|
}
|
|
|
|
}()
|
2024-11-26 01:22:45 +00:00
|
|
|
|
2024-12-06 00:36:15 +00:00
|
|
|
var response *ID
|
2024-11-26 01:22:45 +00:00
|
|
|
if m := s.cfg.Middleware; m != nil {
|
|
|
|
mreq := middleware.Request{
|
|
|
|
Context: ctx,
|
2024-12-06 00:36:15 +00:00
|
|
|
OperationName: CreateScriptPolicyOperation,
|
|
|
|
OperationSummary: "Create a new script policy",
|
|
|
|
OperationID: "createScriptPolicy",
|
|
|
|
Body: request,
|
|
|
|
Params: middleware.Parameters{},
|
|
|
|
Raw: r,
|
2024-11-26 01:22:45 +00:00
|
|
|
}
|
|
|
|
|
|
|
|
type (
|
2024-12-06 00:36:15 +00:00
|
|
|
Request = OptScriptPolicyCreate
|
|
|
|
Params = struct{}
|
|
|
|
Response = *ID
|
2024-11-26 01:22:45 +00:00
|
|
|
)
|
|
|
|
response, err = middleware.HookMiddleware[
|
|
|
|
Request,
|
|
|
|
Params,
|
|
|
|
Response,
|
|
|
|
](
|
|
|
|
m,
|
|
|
|
mreq,
|
2024-12-06 00:36:15 +00:00
|
|
|
nil,
|
2024-11-26 01:22:45 +00:00
|
|
|
func(ctx context.Context, request Request, params Params) (response Response, err error) {
|
2024-12-06 00:36:15 +00:00
|
|
|
response, err = s.h.CreateScriptPolicy(ctx, request)
|
2024-11-26 01:22:45 +00:00
|
|
|
return response, err
|
|
|
|
},
|
|
|
|
)
|
|
|
|
} else {
|
2024-12-06 00:36:15 +00:00
|
|
|
response, err = s.h.CreateScriptPolicy(ctx, request)
|
2024-11-26 01:22:45 +00:00
|
|
|
}
|
|
|
|
if err != nil {
|
|
|
|
if errRes, ok := errors.Into[*ErrorStatusCode](err); ok {
|
|
|
|
if err := encodeErrorResponse(errRes, w, span); err != nil {
|
|
|
|
defer recordError("Internal", err)
|
|
|
|
}
|
|
|
|
return
|
|
|
|
}
|
|
|
|
if errors.Is(err, ht.ErrNotImplemented) {
|
|
|
|
s.cfg.ErrorHandler(ctx, w, r, err)
|
|
|
|
return
|
|
|
|
}
|
|
|
|
if err := encodeErrorResponse(s.h.NewError(ctx, err), w, span); err != nil {
|
|
|
|
defer recordError("Internal", err)
|
|
|
|
}
|
|
|
|
return
|
|
|
|
}
|
|
|
|
|
2024-12-06 00:36:15 +00:00
|
|
|
if err := encodeCreateScriptPolicyResponse(response, w, span); err != nil {
|
2024-11-26 01:22:45 +00:00
|
|
|
defer recordError("EncodeResponse", err)
|
|
|
|
if !errors.Is(err, ht.ErrInternalServerErrorResponse) {
|
|
|
|
s.cfg.ErrorHandler(ctx, w, r, err)
|
|
|
|
}
|
|
|
|
return
|
|
|
|
}
|
|
|
|
}
|
|
|
|
|
2024-12-06 00:36:15 +00:00
|
|
|
// handleCreateSubmissionRequest handles createSubmission operation.
|
2024-11-26 01:22:45 +00:00
|
|
|
//
|
2024-12-06 00:36:15 +00:00
|
|
|
// Create new submission.
|
2024-11-26 01:22:45 +00:00
|
|
|
//
|
2024-12-06 00:36:15 +00:00
|
|
|
// POST /submissions
|
|
|
|
func (s *Server) handleCreateSubmissionRequest(args [0]string, argsEscaped bool, w http.ResponseWriter, r *http.Request) {
|
|
|
|
statusWriter := &codeRecorder{ResponseWriter: w}
|
|
|
|
w = statusWriter
|
2024-11-26 01:22:45 +00:00
|
|
|
otelAttrs := []attribute.KeyValue{
|
2024-12-06 00:36:15 +00:00
|
|
|
otelogen.OperationID("createSubmission"),
|
|
|
|
semconv.HTTPRequestMethodKey.String("POST"),
|
2024-11-26 20:39:10 +00:00
|
|
|
semconv.HTTPRouteKey.String("/submissions"),
|
2024-11-26 01:22:45 +00:00
|
|
|
}
|
|
|
|
|
|
|
|
// Start a span for this request.
|
2024-12-06 00:36:15 +00:00
|
|
|
ctx, span := s.cfg.Tracer.Start(r.Context(), CreateSubmissionOperation,
|
2024-11-26 01:22:45 +00:00
|
|
|
trace.WithAttributes(otelAttrs...),
|
|
|
|
serverSpanKind,
|
|
|
|
)
|
|
|
|
defer span.End()
|
|
|
|
|
|
|
|
// Add Labeler to context.
|
|
|
|
labeler := &Labeler{attrs: otelAttrs}
|
|
|
|
ctx = contextWithLabeler(ctx, labeler)
|
|
|
|
|
|
|
|
// Run stopwatch.
|
|
|
|
startTime := time.Now()
|
|
|
|
defer func() {
|
|
|
|
elapsedDuration := time.Since(startTime)
|
2024-12-06 00:36:15 +00:00
|
|
|
|
|
|
|
attrSet := labeler.AttributeSet()
|
|
|
|
attrs := attrSet.ToSlice()
|
|
|
|
code := statusWriter.status
|
|
|
|
if code != 0 {
|
|
|
|
codeAttr := semconv.HTTPResponseStatusCode(code)
|
|
|
|
attrs = append(attrs, codeAttr)
|
|
|
|
span.SetAttributes(codeAttr)
|
|
|
|
}
|
|
|
|
attrOpt := metric.WithAttributes(attrs...)
|
2024-11-26 01:22:45 +00:00
|
|
|
|
|
|
|
// Increment request counter.
|
|
|
|
s.requests.Add(ctx, 1, attrOpt)
|
|
|
|
|
|
|
|
// Use floating point division here for higher precision (instead of Millisecond method).
|
2024-12-06 00:36:15 +00:00
|
|
|
s.duration.Record(ctx, float64(elapsedDuration)/float64(time.Millisecond), attrOpt)
|
2024-11-26 01:22:45 +00:00
|
|
|
}()
|
|
|
|
|
|
|
|
var (
|
|
|
|
recordError = func(stage string, err error) {
|
|
|
|
span.RecordError(err)
|
2024-12-06 00:36:15 +00:00
|
|
|
|
|
|
|
// https://opentelemetry.io/docs/specs/semconv/http/http-spans/#status
|
|
|
|
// Span Status MUST be left unset if HTTP status code was in the 1xx, 2xx or 3xx ranges,
|
|
|
|
// unless there was another error (e.g., network error receiving the response body; or 3xx codes with
|
|
|
|
// max redirects exceeded), in which case status MUST be set to Error.
|
|
|
|
code := statusWriter.status
|
|
|
|
if code >= 100 && code < 500 {
|
|
|
|
span.SetStatus(codes.Error, stage)
|
|
|
|
}
|
|
|
|
|
|
|
|
attrSet := labeler.AttributeSet()
|
|
|
|
attrs := attrSet.ToSlice()
|
|
|
|
if code != 0 {
|
|
|
|
attrs = append(attrs, semconv.HTTPResponseStatusCode(code))
|
|
|
|
}
|
|
|
|
|
|
|
|
s.errors.Add(ctx, 1, metric.WithAttributes(attrs...))
|
2024-11-26 01:22:45 +00:00
|
|
|
}
|
|
|
|
err error
|
|
|
|
opErrContext = ogenerrors.OperationContext{
|
2024-12-06 00:36:15 +00:00
|
|
|
Name: CreateSubmissionOperation,
|
|
|
|
ID: "createSubmission",
|
2024-11-26 01:22:45 +00:00
|
|
|
}
|
|
|
|
)
|
2024-11-29 22:33:48 +00:00
|
|
|
{
|
|
|
|
type bitset = [1]uint8
|
|
|
|
var satisfied bitset
|
|
|
|
{
|
2024-12-06 00:36:15 +00:00
|
|
|
sctx, ok, err := s.securityCookieAuth(ctx, CreateSubmissionOperation, r)
|
2024-11-29 22:33:48 +00:00
|
|
|
if err != nil {
|
|
|
|
err = &ogenerrors.SecurityError{
|
|
|
|
OperationContext: opErrContext,
|
|
|
|
Security: "CookieAuth",
|
|
|
|
Err: err,
|
|
|
|
}
|
|
|
|
if encodeErr := encodeErrorResponse(s.h.NewError(ctx, err), w, span); encodeErr != nil {
|
|
|
|
defer recordError("Security:CookieAuth", err)
|
|
|
|
}
|
|
|
|
return
|
|
|
|
}
|
|
|
|
if ok {
|
|
|
|
satisfied[0] |= 1 << 0
|
|
|
|
ctx = sctx
|
|
|
|
}
|
|
|
|
}
|
|
|
|
|
|
|
|
if ok := func() bool {
|
|
|
|
nextRequirement:
|
|
|
|
for _, requirement := range []bitset{
|
|
|
|
{0b00000001},
|
|
|
|
} {
|
|
|
|
for i, mask := range requirement {
|
|
|
|
if satisfied[i]&mask != mask {
|
|
|
|
continue nextRequirement
|
|
|
|
}
|
|
|
|
}
|
|
|
|
return true
|
|
|
|
}
|
|
|
|
return false
|
|
|
|
}(); !ok {
|
|
|
|
err = &ogenerrors.SecurityError{
|
|
|
|
OperationContext: opErrContext,
|
|
|
|
Err: ogenerrors.ErrSecurityRequirementIsNotSatisfied,
|
|
|
|
}
|
|
|
|
if encodeErr := encodeErrorResponse(s.h.NewError(ctx, err), w, span); encodeErr != nil {
|
|
|
|
defer recordError("Security", err)
|
|
|
|
}
|
|
|
|
return
|
|
|
|
}
|
|
|
|
}
|
2024-12-06 00:36:15 +00:00
|
|
|
request, close, err := s.decodeCreateSubmissionRequest(r)
|
2024-11-26 01:22:45 +00:00
|
|
|
if err != nil {
|
2024-12-06 00:36:15 +00:00
|
|
|
err = &ogenerrors.DecodeRequestError{
|
2024-11-26 01:22:45 +00:00
|
|
|
OperationContext: opErrContext,
|
|
|
|
Err: err,
|
|
|
|
}
|
2024-12-06 00:36:15 +00:00
|
|
|
defer recordError("DecodeRequest", err)
|
2024-11-26 01:22:45 +00:00
|
|
|
s.cfg.ErrorHandler(ctx, w, r, err)
|
|
|
|
return
|
|
|
|
}
|
2024-12-06 00:36:15 +00:00
|
|
|
defer func() {
|
|
|
|
if err := close(); err != nil {
|
|
|
|
recordError("CloseRequest", err)
|
|
|
|
}
|
|
|
|
}()
|
2024-11-26 01:22:45 +00:00
|
|
|
|
2024-12-06 00:36:15 +00:00
|
|
|
var response *ID
|
2024-11-26 01:22:45 +00:00
|
|
|
if m := s.cfg.Middleware; m != nil {
|
|
|
|
mreq := middleware.Request{
|
|
|
|
Context: ctx,
|
2024-12-06 00:36:15 +00:00
|
|
|
OperationName: CreateSubmissionOperation,
|
|
|
|
OperationSummary: "Create new submission",
|
|
|
|
OperationID: "createSubmission",
|
|
|
|
Body: request,
|
|
|
|
Params: middleware.Parameters{},
|
|
|
|
Raw: r,
|
2024-11-26 20:39:10 +00:00
|
|
|
}
|
|
|
|
|
|
|
|
type (
|
2024-12-06 00:36:15 +00:00
|
|
|
Request = OptSubmissionCreate
|
|
|
|
Params = struct{}
|
|
|
|
Response = *ID
|
2024-11-26 20:39:10 +00:00
|
|
|
)
|
|
|
|
response, err = middleware.HookMiddleware[
|
|
|
|
Request,
|
|
|
|
Params,
|
|
|
|
Response,
|
|
|
|
](
|
|
|
|
m,
|
|
|
|
mreq,
|
2024-12-06 00:36:15 +00:00
|
|
|
nil,
|
2024-11-26 20:39:10 +00:00
|
|
|
func(ctx context.Context, request Request, params Params) (response Response, err error) {
|
2024-12-06 00:36:15 +00:00
|
|
|
response, err = s.h.CreateSubmission(ctx, request)
|
2024-11-26 20:39:10 +00:00
|
|
|
return response, err
|
|
|
|
},
|
|
|
|
)
|
|
|
|
} else {
|
2024-12-06 00:36:15 +00:00
|
|
|
response, err = s.h.CreateSubmission(ctx, request)
|
2024-11-26 20:39:10 +00:00
|
|
|
}
|
|
|
|
if err != nil {
|
|
|
|
if errRes, ok := errors.Into[*ErrorStatusCode](err); ok {
|
|
|
|
if err := encodeErrorResponse(errRes, w, span); err != nil {
|
|
|
|
defer recordError("Internal", err)
|
|
|
|
}
|
|
|
|
return
|
|
|
|
}
|
|
|
|
if errors.Is(err, ht.ErrNotImplemented) {
|
|
|
|
s.cfg.ErrorHandler(ctx, w, r, err)
|
|
|
|
return
|
|
|
|
}
|
|
|
|
if err := encodeErrorResponse(s.h.NewError(ctx, err), w, span); err != nil {
|
|
|
|
defer recordError("Internal", err)
|
|
|
|
}
|
|
|
|
return
|
|
|
|
}
|
|
|
|
|
2024-12-06 00:36:15 +00:00
|
|
|
if err := encodeCreateSubmissionResponse(response, w, span); err != nil {
|
2024-11-26 20:39:10 +00:00
|
|
|
defer recordError("EncodeResponse", err)
|
|
|
|
if !errors.Is(err, ht.ErrInternalServerErrorResponse) {
|
|
|
|
s.cfg.ErrorHandler(ctx, w, r, err)
|
|
|
|
}
|
|
|
|
return
|
|
|
|
}
|
|
|
|
}
|
|
|
|
|
2024-12-06 00:36:15 +00:00
|
|
|
// handleDeleteScriptRequest handles deleteScript operation.
|
2024-11-26 20:39:10 +00:00
|
|
|
//
|
2024-12-06 00:36:15 +00:00
|
|
|
// Delete the specified script by ID.
|
2024-11-26 20:39:10 +00:00
|
|
|
//
|
2024-12-06 00:36:15 +00:00
|
|
|
// DELETE /scripts/{ScriptID}
|
|
|
|
func (s *Server) handleDeleteScriptRequest(args [1]string, argsEscaped bool, w http.ResponseWriter, r *http.Request) {
|
|
|
|
statusWriter := &codeRecorder{ResponseWriter: w}
|
|
|
|
w = statusWriter
|
2024-11-26 20:39:10 +00:00
|
|
|
otelAttrs := []attribute.KeyValue{
|
2024-12-06 00:36:15 +00:00
|
|
|
otelogen.OperationID("deleteScript"),
|
|
|
|
semconv.HTTPRequestMethodKey.String("DELETE"),
|
|
|
|
semconv.HTTPRouteKey.String("/scripts/{ScriptID}"),
|
2024-11-26 20:39:10 +00:00
|
|
|
}
|
|
|
|
|
|
|
|
// Start a span for this request.
|
2024-12-06 00:36:15 +00:00
|
|
|
ctx, span := s.cfg.Tracer.Start(r.Context(), DeleteScriptOperation,
|
2024-11-26 20:39:10 +00:00
|
|
|
trace.WithAttributes(otelAttrs...),
|
|
|
|
serverSpanKind,
|
|
|
|
)
|
|
|
|
defer span.End()
|
|
|
|
|
|
|
|
// Add Labeler to context.
|
|
|
|
labeler := &Labeler{attrs: otelAttrs}
|
|
|
|
ctx = contextWithLabeler(ctx, labeler)
|
|
|
|
|
|
|
|
// Run stopwatch.
|
|
|
|
startTime := time.Now()
|
|
|
|
defer func() {
|
|
|
|
elapsedDuration := time.Since(startTime)
|
2024-12-06 00:36:15 +00:00
|
|
|
|
|
|
|
attrSet := labeler.AttributeSet()
|
|
|
|
attrs := attrSet.ToSlice()
|
|
|
|
code := statusWriter.status
|
|
|
|
if code != 0 {
|
|
|
|
codeAttr := semconv.HTTPResponseStatusCode(code)
|
|
|
|
attrs = append(attrs, codeAttr)
|
|
|
|
span.SetAttributes(codeAttr)
|
|
|
|
}
|
|
|
|
attrOpt := metric.WithAttributes(attrs...)
|
2024-11-26 20:39:10 +00:00
|
|
|
|
|
|
|
// Increment request counter.
|
|
|
|
s.requests.Add(ctx, 1, attrOpt)
|
|
|
|
|
|
|
|
// Use floating point division here for higher precision (instead of Millisecond method).
|
2024-12-06 00:36:15 +00:00
|
|
|
s.duration.Record(ctx, float64(elapsedDuration)/float64(time.Millisecond), attrOpt)
|
2024-11-26 20:39:10 +00:00
|
|
|
}()
|
|
|
|
|
|
|
|
var (
|
|
|
|
recordError = func(stage string, err error) {
|
|
|
|
span.RecordError(err)
|
2024-12-06 00:36:15 +00:00
|
|
|
|
|
|
|
// https://opentelemetry.io/docs/specs/semconv/http/http-spans/#status
|
|
|
|
// Span Status MUST be left unset if HTTP status code was in the 1xx, 2xx or 3xx ranges,
|
|
|
|
// unless there was another error (e.g., network error receiving the response body; or 3xx codes with
|
|
|
|
// max redirects exceeded), in which case status MUST be set to Error.
|
|
|
|
code := statusWriter.status
|
|
|
|
if code >= 100 && code < 500 {
|
|
|
|
span.SetStatus(codes.Error, stage)
|
|
|
|
}
|
|
|
|
|
|
|
|
attrSet := labeler.AttributeSet()
|
|
|
|
attrs := attrSet.ToSlice()
|
|
|
|
if code != 0 {
|
|
|
|
attrs = append(attrs, semconv.HTTPResponseStatusCode(code))
|
|
|
|
}
|
|
|
|
|
|
|
|
s.errors.Add(ctx, 1, metric.WithAttributes(attrs...))
|
2024-11-26 20:39:10 +00:00
|
|
|
}
|
|
|
|
err error
|
|
|
|
opErrContext = ogenerrors.OperationContext{
|
2024-12-06 00:36:15 +00:00
|
|
|
Name: DeleteScriptOperation,
|
|
|
|
ID: "deleteScript",
|
2024-11-26 20:39:10 +00:00
|
|
|
}
|
|
|
|
)
|
2024-11-29 22:33:48 +00:00
|
|
|
{
|
|
|
|
type bitset = [1]uint8
|
|
|
|
var satisfied bitset
|
|
|
|
{
|
2024-12-06 00:36:15 +00:00
|
|
|
sctx, ok, err := s.securityCookieAuth(ctx, DeleteScriptOperation, r)
|
2024-11-29 22:33:48 +00:00
|
|
|
if err != nil {
|
|
|
|
err = &ogenerrors.SecurityError{
|
|
|
|
OperationContext: opErrContext,
|
|
|
|
Security: "CookieAuth",
|
|
|
|
Err: err,
|
|
|
|
}
|
|
|
|
if encodeErr := encodeErrorResponse(s.h.NewError(ctx, err), w, span); encodeErr != nil {
|
|
|
|
defer recordError("Security:CookieAuth", err)
|
|
|
|
}
|
|
|
|
return
|
|
|
|
}
|
|
|
|
if ok {
|
|
|
|
satisfied[0] |= 1 << 0
|
|
|
|
ctx = sctx
|
|
|
|
}
|
|
|
|
}
|
|
|
|
|
|
|
|
if ok := func() bool {
|
|
|
|
nextRequirement:
|
|
|
|
for _, requirement := range []bitset{
|
|
|
|
{0b00000001},
|
|
|
|
} {
|
|
|
|
for i, mask := range requirement {
|
|
|
|
if satisfied[i]&mask != mask {
|
|
|
|
continue nextRequirement
|
|
|
|
}
|
|
|
|
}
|
|
|
|
return true
|
|
|
|
}
|
|
|
|
return false
|
|
|
|
}(); !ok {
|
|
|
|
err = &ogenerrors.SecurityError{
|
|
|
|
OperationContext: opErrContext,
|
|
|
|
Err: ogenerrors.ErrSecurityRequirementIsNotSatisfied,
|
|
|
|
}
|
|
|
|
if encodeErr := encodeErrorResponse(s.h.NewError(ctx, err), w, span); encodeErr != nil {
|
|
|
|
defer recordError("Security", err)
|
|
|
|
}
|
|
|
|
return
|
|
|
|
}
|
|
|
|
}
|
2024-12-06 00:36:15 +00:00
|
|
|
params, err := decodeDeleteScriptParams(args, argsEscaped, r)
|
2024-11-26 20:39:10 +00:00
|
|
|
if err != nil {
|
|
|
|
err = &ogenerrors.DecodeParamsError{
|
|
|
|
OperationContext: opErrContext,
|
|
|
|
Err: err,
|
|
|
|
}
|
|
|
|
defer recordError("DecodeParams", err)
|
|
|
|
s.cfg.ErrorHandler(ctx, w, r, err)
|
|
|
|
return
|
|
|
|
}
|
|
|
|
|
2024-12-06 00:36:15 +00:00
|
|
|
var response *DeleteScriptOK
|
2024-11-26 20:39:10 +00:00
|
|
|
if m := s.cfg.Middleware; m != nil {
|
|
|
|
mreq := middleware.Request{
|
|
|
|
Context: ctx,
|
2024-12-06 00:36:15 +00:00
|
|
|
OperationName: DeleteScriptOperation,
|
|
|
|
OperationSummary: "Delete the specified script by ID",
|
|
|
|
OperationID: "deleteScript",
|
2024-11-26 20:39:10 +00:00
|
|
|
Body: nil,
|
|
|
|
Params: middleware.Parameters{
|
|
|
|
{
|
2024-12-06 00:36:15 +00:00
|
|
|
Name: "ScriptID",
|
2024-11-26 20:39:10 +00:00
|
|
|
In: "path",
|
2024-12-06 00:36:15 +00:00
|
|
|
}: params.ScriptID,
|
2024-11-26 01:22:45 +00:00
|
|
|
},
|
|
|
|
Raw: r,
|
|
|
|
}
|
|
|
|
|
|
|
|
type (
|
|
|
|
Request = struct{}
|
2024-12-06 00:36:15 +00:00
|
|
|
Params = DeleteScriptParams
|
|
|
|
Response = *DeleteScriptOK
|
2024-11-26 01:22:45 +00:00
|
|
|
)
|
|
|
|
response, err = middleware.HookMiddleware[
|
|
|
|
Request,
|
|
|
|
Params,
|
|
|
|
Response,
|
|
|
|
](
|
|
|
|
m,
|
|
|
|
mreq,
|
2024-12-06 00:36:15 +00:00
|
|
|
unpackDeleteScriptParams,
|
2024-11-26 01:22:45 +00:00
|
|
|
func(ctx context.Context, request Request, params Params) (response Response, err error) {
|
2024-12-06 00:36:15 +00:00
|
|
|
err = s.h.DeleteScript(ctx, params)
|
2024-11-26 01:22:45 +00:00
|
|
|
return response, err
|
|
|
|
},
|
|
|
|
)
|
|
|
|
} else {
|
2024-12-06 00:36:15 +00:00
|
|
|
err = s.h.DeleteScript(ctx, params)
|
2024-11-26 01:22:45 +00:00
|
|
|
}
|
|
|
|
if err != nil {
|
|
|
|
if errRes, ok := errors.Into[*ErrorStatusCode](err); ok {
|
|
|
|
if err := encodeErrorResponse(errRes, w, span); err != nil {
|
|
|
|
defer recordError("Internal", err)
|
|
|
|
}
|
|
|
|
return
|
|
|
|
}
|
|
|
|
if errors.Is(err, ht.ErrNotImplemented) {
|
|
|
|
s.cfg.ErrorHandler(ctx, w, r, err)
|
|
|
|
return
|
|
|
|
}
|
|
|
|
if err := encodeErrorResponse(s.h.NewError(ctx, err), w, span); err != nil {
|
|
|
|
defer recordError("Internal", err)
|
|
|
|
}
|
|
|
|
return
|
|
|
|
}
|
|
|
|
|
2024-12-06 00:36:15 +00:00
|
|
|
if err := encodeDeleteScriptResponse(response, w, span); err != nil {
|
2024-11-26 01:22:45 +00:00
|
|
|
defer recordError("EncodeResponse", err)
|
|
|
|
if !errors.Is(err, ht.ErrInternalServerErrorResponse) {
|
|
|
|
s.cfg.ErrorHandler(ctx, w, r, err)
|
|
|
|
}
|
|
|
|
return
|
|
|
|
}
|
|
|
|
}
|
|
|
|
|
2024-12-06 00:36:15 +00:00
|
|
|
// handleDeleteScriptPolicyRequest handles deleteScriptPolicy operation.
|
2024-11-26 01:22:45 +00:00
|
|
|
//
|
2024-12-06 00:36:15 +00:00
|
|
|
// Delete the specified script policy by ID.
|
2024-11-26 01:22:45 +00:00
|
|
|
//
|
2024-12-06 00:36:15 +00:00
|
|
|
// DELETE /script-policy/id/{ScriptPolicyID}
|
|
|
|
func (s *Server) handleDeleteScriptPolicyRequest(args [1]string, argsEscaped bool, w http.ResponseWriter, r *http.Request) {
|
|
|
|
statusWriter := &codeRecorder{ResponseWriter: w}
|
|
|
|
w = statusWriter
|
2024-11-26 01:22:45 +00:00
|
|
|
otelAttrs := []attribute.KeyValue{
|
2024-12-06 00:36:15 +00:00
|
|
|
otelogen.OperationID("deleteScriptPolicy"),
|
|
|
|
semconv.HTTPRequestMethodKey.String("DELETE"),
|
|
|
|
semconv.HTTPRouteKey.String("/script-policy/id/{ScriptPolicyID}"),
|
2024-11-26 01:22:45 +00:00
|
|
|
}
|
|
|
|
|
|
|
|
// Start a span for this request.
|
2024-12-06 00:36:15 +00:00
|
|
|
ctx, span := s.cfg.Tracer.Start(r.Context(), DeleteScriptPolicyOperation,
|
2024-11-26 01:22:45 +00:00
|
|
|
trace.WithAttributes(otelAttrs...),
|
|
|
|
serverSpanKind,
|
|
|
|
)
|
|
|
|
defer span.End()
|
|
|
|
|
|
|
|
// Add Labeler to context.
|
|
|
|
labeler := &Labeler{attrs: otelAttrs}
|
|
|
|
ctx = contextWithLabeler(ctx, labeler)
|
|
|
|
|
|
|
|
// Run stopwatch.
|
|
|
|
startTime := time.Now()
|
|
|
|
defer func() {
|
|
|
|
elapsedDuration := time.Since(startTime)
|
2024-12-06 00:36:15 +00:00
|
|
|
|
|
|
|
attrSet := labeler.AttributeSet()
|
|
|
|
attrs := attrSet.ToSlice()
|
|
|
|
code := statusWriter.status
|
|
|
|
if code != 0 {
|
|
|
|
codeAttr := semconv.HTTPResponseStatusCode(code)
|
|
|
|
attrs = append(attrs, codeAttr)
|
|
|
|
span.SetAttributes(codeAttr)
|
|
|
|
}
|
|
|
|
attrOpt := metric.WithAttributes(attrs...)
|
2024-11-26 01:22:45 +00:00
|
|
|
|
|
|
|
// Increment request counter.
|
|
|
|
s.requests.Add(ctx, 1, attrOpt)
|
|
|
|
|
|
|
|
// Use floating point division here for higher precision (instead of Millisecond method).
|
2024-12-06 00:36:15 +00:00
|
|
|
s.duration.Record(ctx, float64(elapsedDuration)/float64(time.Millisecond), attrOpt)
|
2024-11-26 01:22:45 +00:00
|
|
|
}()
|
|
|
|
|
|
|
|
var (
|
|
|
|
recordError = func(stage string, err error) {
|
|
|
|
span.RecordError(err)
|
2024-12-06 00:36:15 +00:00
|
|
|
|
|
|
|
// https://opentelemetry.io/docs/specs/semconv/http/http-spans/#status
|
|
|
|
// Span Status MUST be left unset if HTTP status code was in the 1xx, 2xx or 3xx ranges,
|
|
|
|
// unless there was another error (e.g., network error receiving the response body; or 3xx codes with
|
|
|
|
// max redirects exceeded), in which case status MUST be set to Error.
|
|
|
|
code := statusWriter.status
|
|
|
|
if code >= 100 && code < 500 {
|
|
|
|
span.SetStatus(codes.Error, stage)
|
|
|
|
}
|
|
|
|
|
|
|
|
attrSet := labeler.AttributeSet()
|
|
|
|
attrs := attrSet.ToSlice()
|
|
|
|
if code != 0 {
|
|
|
|
attrs = append(attrs, semconv.HTTPResponseStatusCode(code))
|
|
|
|
}
|
|
|
|
|
|
|
|
s.errors.Add(ctx, 1, metric.WithAttributes(attrs...))
|
2024-11-26 01:22:45 +00:00
|
|
|
}
|
|
|
|
err error
|
|
|
|
opErrContext = ogenerrors.OperationContext{
|
2024-12-06 00:36:15 +00:00
|
|
|
Name: DeleteScriptPolicyOperation,
|
|
|
|
ID: "deleteScriptPolicy",
|
2024-11-26 01:22:45 +00:00
|
|
|
}
|
|
|
|
)
|
2024-11-29 22:33:48 +00:00
|
|
|
{
|
|
|
|
type bitset = [1]uint8
|
|
|
|
var satisfied bitset
|
|
|
|
{
|
2024-12-06 00:36:15 +00:00
|
|
|
sctx, ok, err := s.securityCookieAuth(ctx, DeleteScriptPolicyOperation, r)
|
2024-11-29 22:33:48 +00:00
|
|
|
if err != nil {
|
|
|
|
err = &ogenerrors.SecurityError{
|
|
|
|
OperationContext: opErrContext,
|
|
|
|
Security: "CookieAuth",
|
|
|
|
Err: err,
|
|
|
|
}
|
|
|
|
if encodeErr := encodeErrorResponse(s.h.NewError(ctx, err), w, span); encodeErr != nil {
|
|
|
|
defer recordError("Security:CookieAuth", err)
|
|
|
|
}
|
|
|
|
return
|
|
|
|
}
|
|
|
|
if ok {
|
|
|
|
satisfied[0] |= 1 << 0
|
|
|
|
ctx = sctx
|
|
|
|
}
|
|
|
|
}
|
|
|
|
|
|
|
|
if ok := func() bool {
|
|
|
|
nextRequirement:
|
|
|
|
for _, requirement := range []bitset{
|
|
|
|
{0b00000001},
|
|
|
|
} {
|
|
|
|
for i, mask := range requirement {
|
|
|
|
if satisfied[i]&mask != mask {
|
|
|
|
continue nextRequirement
|
|
|
|
}
|
|
|
|
}
|
|
|
|
return true
|
|
|
|
}
|
|
|
|
return false
|
|
|
|
}(); !ok {
|
|
|
|
err = &ogenerrors.SecurityError{
|
|
|
|
OperationContext: opErrContext,
|
|
|
|
Err: ogenerrors.ErrSecurityRequirementIsNotSatisfied,
|
|
|
|
}
|
|
|
|
if encodeErr := encodeErrorResponse(s.h.NewError(ctx, err), w, span); encodeErr != nil {
|
|
|
|
defer recordError("Security", err)
|
|
|
|
}
|
|
|
|
return
|
|
|
|
}
|
|
|
|
}
|
2024-12-06 00:36:15 +00:00
|
|
|
params, err := decodeDeleteScriptPolicyParams(args, argsEscaped, r)
|
2024-11-26 01:22:45 +00:00
|
|
|
if err != nil {
|
|
|
|
err = &ogenerrors.DecodeParamsError{
|
|
|
|
OperationContext: opErrContext,
|
|
|
|
Err: err,
|
|
|
|
}
|
|
|
|
defer recordError("DecodeParams", err)
|
|
|
|
s.cfg.ErrorHandler(ctx, w, r, err)
|
|
|
|
return
|
|
|
|
}
|
|
|
|
|
2024-12-06 00:36:15 +00:00
|
|
|
var response *DeleteScriptPolicyOK
|
2024-11-26 01:22:45 +00:00
|
|
|
if m := s.cfg.Middleware; m != nil {
|
|
|
|
mreq := middleware.Request{
|
|
|
|
Context: ctx,
|
2024-12-06 00:36:15 +00:00
|
|
|
OperationName: DeleteScriptPolicyOperation,
|
|
|
|
OperationSummary: "Delete the specified script policy by ID",
|
|
|
|
OperationID: "deleteScriptPolicy",
|
2024-11-26 01:22:45 +00:00
|
|
|
Body: nil,
|
|
|
|
Params: middleware.Parameters{
|
|
|
|
{
|
2024-12-06 00:36:15 +00:00
|
|
|
Name: "ScriptPolicyID",
|
2024-11-26 20:39:10 +00:00
|
|
|
In: "path",
|
2024-12-06 00:36:15 +00:00
|
|
|
}: params.ScriptPolicyID,
|
|
|
|
},
|
|
|
|
Raw: r,
|
|
|
|
}
|
|
|
|
|
|
|
|
type (
|
|
|
|
Request = struct{}
|
|
|
|
Params = DeleteScriptPolicyParams
|
|
|
|
Response = *DeleteScriptPolicyOK
|
|
|
|
)
|
|
|
|
response, err = middleware.HookMiddleware[
|
|
|
|
Request,
|
|
|
|
Params,
|
|
|
|
Response,
|
|
|
|
](
|
|
|
|
m,
|
|
|
|
mreq,
|
|
|
|
unpackDeleteScriptPolicyParams,
|
|
|
|
func(ctx context.Context, request Request, params Params) (response Response, err error) {
|
|
|
|
err = s.h.DeleteScriptPolicy(ctx, params)
|
|
|
|
return response, err
|
|
|
|
},
|
|
|
|
)
|
|
|
|
} else {
|
|
|
|
err = s.h.DeleteScriptPolicy(ctx, params)
|
|
|
|
}
|
|
|
|
if err != nil {
|
|
|
|
if errRes, ok := errors.Into[*ErrorStatusCode](err); ok {
|
|
|
|
if err := encodeErrorResponse(errRes, w, span); err != nil {
|
|
|
|
defer recordError("Internal", err)
|
|
|
|
}
|
|
|
|
return
|
|
|
|
}
|
|
|
|
if errors.Is(err, ht.ErrNotImplemented) {
|
|
|
|
s.cfg.ErrorHandler(ctx, w, r, err)
|
|
|
|
return
|
|
|
|
}
|
|
|
|
if err := encodeErrorResponse(s.h.NewError(ctx, err), w, span); err != nil {
|
|
|
|
defer recordError("Internal", err)
|
|
|
|
}
|
|
|
|
return
|
|
|
|
}
|
|
|
|
|
|
|
|
if err := encodeDeleteScriptPolicyResponse(response, w, span); err != nil {
|
|
|
|
defer recordError("EncodeResponse", err)
|
|
|
|
if !errors.Is(err, ht.ErrInternalServerErrorResponse) {
|
|
|
|
s.cfg.ErrorHandler(ctx, w, r, err)
|
|
|
|
}
|
|
|
|
return
|
|
|
|
}
|
|
|
|
}
|
|
|
|
|
|
|
|
// handleGetScriptRequest handles getScript operation.
|
|
|
|
//
|
|
|
|
// Get the specified script by ID.
|
|
|
|
//
|
|
|
|
// GET /scripts/{ScriptID}
|
|
|
|
func (s *Server) handleGetScriptRequest(args [1]string, argsEscaped bool, w http.ResponseWriter, r *http.Request) {
|
|
|
|
statusWriter := &codeRecorder{ResponseWriter: w}
|
|
|
|
w = statusWriter
|
|
|
|
otelAttrs := []attribute.KeyValue{
|
|
|
|
otelogen.OperationID("getScript"),
|
|
|
|
semconv.HTTPRequestMethodKey.String("GET"),
|
|
|
|
semconv.HTTPRouteKey.String("/scripts/{ScriptID}"),
|
|
|
|
}
|
|
|
|
|
|
|
|
// Start a span for this request.
|
|
|
|
ctx, span := s.cfg.Tracer.Start(r.Context(), GetScriptOperation,
|
|
|
|
trace.WithAttributes(otelAttrs...),
|
|
|
|
serverSpanKind,
|
|
|
|
)
|
|
|
|
defer span.End()
|
|
|
|
|
|
|
|
// Add Labeler to context.
|
|
|
|
labeler := &Labeler{attrs: otelAttrs}
|
|
|
|
ctx = contextWithLabeler(ctx, labeler)
|
|
|
|
|
|
|
|
// Run stopwatch.
|
|
|
|
startTime := time.Now()
|
|
|
|
defer func() {
|
|
|
|
elapsedDuration := time.Since(startTime)
|
|
|
|
|
|
|
|
attrSet := labeler.AttributeSet()
|
|
|
|
attrs := attrSet.ToSlice()
|
|
|
|
code := statusWriter.status
|
|
|
|
if code != 0 {
|
|
|
|
codeAttr := semconv.HTTPResponseStatusCode(code)
|
|
|
|
attrs = append(attrs, codeAttr)
|
|
|
|
span.SetAttributes(codeAttr)
|
|
|
|
}
|
|
|
|
attrOpt := metric.WithAttributes(attrs...)
|
|
|
|
|
|
|
|
// Increment request counter.
|
|
|
|
s.requests.Add(ctx, 1, attrOpt)
|
|
|
|
|
|
|
|
// Use floating point division here for higher precision (instead of Millisecond method).
|
|
|
|
s.duration.Record(ctx, float64(elapsedDuration)/float64(time.Millisecond), attrOpt)
|
|
|
|
}()
|
|
|
|
|
|
|
|
var (
|
|
|
|
recordError = func(stage string, err error) {
|
|
|
|
span.RecordError(err)
|
|
|
|
|
|
|
|
// https://opentelemetry.io/docs/specs/semconv/http/http-spans/#status
|
|
|
|
// Span Status MUST be left unset if HTTP status code was in the 1xx, 2xx or 3xx ranges,
|
|
|
|
// unless there was another error (e.g., network error receiving the response body; or 3xx codes with
|
|
|
|
// max redirects exceeded), in which case status MUST be set to Error.
|
|
|
|
code := statusWriter.status
|
|
|
|
if code >= 100 && code < 500 {
|
|
|
|
span.SetStatus(codes.Error, stage)
|
|
|
|
}
|
|
|
|
|
|
|
|
attrSet := labeler.AttributeSet()
|
|
|
|
attrs := attrSet.ToSlice()
|
|
|
|
if code != 0 {
|
|
|
|
attrs = append(attrs, semconv.HTTPResponseStatusCode(code))
|
|
|
|
}
|
|
|
|
|
|
|
|
s.errors.Add(ctx, 1, metric.WithAttributes(attrs...))
|
|
|
|
}
|
|
|
|
err error
|
|
|
|
opErrContext = ogenerrors.OperationContext{
|
|
|
|
Name: GetScriptOperation,
|
|
|
|
ID: "getScript",
|
|
|
|
}
|
|
|
|
)
|
|
|
|
{
|
|
|
|
type bitset = [1]uint8
|
|
|
|
var satisfied bitset
|
|
|
|
{
|
|
|
|
sctx, ok, err := s.securityCookieAuth(ctx, GetScriptOperation, r)
|
|
|
|
if err != nil {
|
|
|
|
err = &ogenerrors.SecurityError{
|
|
|
|
OperationContext: opErrContext,
|
|
|
|
Security: "CookieAuth",
|
|
|
|
Err: err,
|
|
|
|
}
|
|
|
|
if encodeErr := encodeErrorResponse(s.h.NewError(ctx, err), w, span); encodeErr != nil {
|
|
|
|
defer recordError("Security:CookieAuth", err)
|
|
|
|
}
|
|
|
|
return
|
|
|
|
}
|
|
|
|
if ok {
|
|
|
|
satisfied[0] |= 1 << 0
|
|
|
|
ctx = sctx
|
|
|
|
}
|
|
|
|
}
|
|
|
|
|
|
|
|
if ok := func() bool {
|
|
|
|
nextRequirement:
|
|
|
|
for _, requirement := range []bitset{
|
|
|
|
{0b00000001},
|
|
|
|
} {
|
|
|
|
for i, mask := range requirement {
|
|
|
|
if satisfied[i]&mask != mask {
|
|
|
|
continue nextRequirement
|
|
|
|
}
|
|
|
|
}
|
|
|
|
return true
|
|
|
|
}
|
|
|
|
return false
|
|
|
|
}(); !ok {
|
|
|
|
err = &ogenerrors.SecurityError{
|
|
|
|
OperationContext: opErrContext,
|
|
|
|
Err: ogenerrors.ErrSecurityRequirementIsNotSatisfied,
|
|
|
|
}
|
|
|
|
if encodeErr := encodeErrorResponse(s.h.NewError(ctx, err), w, span); encodeErr != nil {
|
|
|
|
defer recordError("Security", err)
|
|
|
|
}
|
|
|
|
return
|
|
|
|
}
|
|
|
|
}
|
|
|
|
params, err := decodeGetScriptParams(args, argsEscaped, r)
|
|
|
|
if err != nil {
|
|
|
|
err = &ogenerrors.DecodeParamsError{
|
|
|
|
OperationContext: opErrContext,
|
|
|
|
Err: err,
|
|
|
|
}
|
|
|
|
defer recordError("DecodeParams", err)
|
|
|
|
s.cfg.ErrorHandler(ctx, w, r, err)
|
|
|
|
return
|
|
|
|
}
|
|
|
|
|
|
|
|
var response *Script
|
|
|
|
if m := s.cfg.Middleware; m != nil {
|
|
|
|
mreq := middleware.Request{
|
|
|
|
Context: ctx,
|
|
|
|
OperationName: GetScriptOperation,
|
|
|
|
OperationSummary: "Get the specified script by ID",
|
|
|
|
OperationID: "getScript",
|
|
|
|
Body: nil,
|
|
|
|
Params: middleware.Parameters{
|
2024-11-26 01:22:45 +00:00
|
|
|
{
|
2024-12-06 00:36:15 +00:00
|
|
|
Name: "ScriptID",
|
|
|
|
In: "path",
|
|
|
|
}: params.ScriptID,
|
2024-11-26 01:22:45 +00:00
|
|
|
},
|
|
|
|
Raw: r,
|
|
|
|
}
|
|
|
|
|
|
|
|
type (
|
|
|
|
Request = struct{}
|
2024-12-06 00:36:15 +00:00
|
|
|
Params = GetScriptParams
|
|
|
|
Response = *Script
|
2024-11-26 01:22:45 +00:00
|
|
|
)
|
|
|
|
response, err = middleware.HookMiddleware[
|
|
|
|
Request,
|
|
|
|
Params,
|
|
|
|
Response,
|
|
|
|
](
|
|
|
|
m,
|
|
|
|
mreq,
|
2024-12-06 00:36:15 +00:00
|
|
|
unpackGetScriptParams,
|
2024-11-26 01:22:45 +00:00
|
|
|
func(ctx context.Context, request Request, params Params) (response Response, err error) {
|
2024-12-06 00:36:15 +00:00
|
|
|
response, err = s.h.GetScript(ctx, params)
|
2024-11-26 01:22:45 +00:00
|
|
|
return response, err
|
|
|
|
},
|
|
|
|
)
|
|
|
|
} else {
|
2024-12-06 00:36:15 +00:00
|
|
|
response, err = s.h.GetScript(ctx, params)
|
2024-11-26 01:22:45 +00:00
|
|
|
}
|
|
|
|
if err != nil {
|
|
|
|
if errRes, ok := errors.Into[*ErrorStatusCode](err); ok {
|
|
|
|
if err := encodeErrorResponse(errRes, w, span); err != nil {
|
|
|
|
defer recordError("Internal", err)
|
|
|
|
}
|
|
|
|
return
|
|
|
|
}
|
|
|
|
if errors.Is(err, ht.ErrNotImplemented) {
|
|
|
|
s.cfg.ErrorHandler(ctx, w, r, err)
|
|
|
|
return
|
|
|
|
}
|
|
|
|
if err := encodeErrorResponse(s.h.NewError(ctx, err), w, span); err != nil {
|
|
|
|
defer recordError("Internal", err)
|
|
|
|
}
|
|
|
|
return
|
|
|
|
}
|
|
|
|
|
2024-12-06 00:36:15 +00:00
|
|
|
if err := encodeGetScriptResponse(response, w, span); err != nil {
|
|
|
|
defer recordError("EncodeResponse", err)
|
|
|
|
if !errors.Is(err, ht.ErrInternalServerErrorResponse) {
|
|
|
|
s.cfg.ErrorHandler(ctx, w, r, err)
|
|
|
|
}
|
|
|
|
return
|
|
|
|
}
|
|
|
|
}
|
|
|
|
|
|
|
|
// handleGetScriptPolicyRequest handles getScriptPolicy operation.
|
|
|
|
//
|
|
|
|
// Get the specified script policy by ID.
|
|
|
|
//
|
|
|
|
// GET /script-policy/id/{ScriptPolicyID}
|
|
|
|
func (s *Server) handleGetScriptPolicyRequest(args [1]string, argsEscaped bool, w http.ResponseWriter, r *http.Request) {
|
|
|
|
statusWriter := &codeRecorder{ResponseWriter: w}
|
|
|
|
w = statusWriter
|
|
|
|
otelAttrs := []attribute.KeyValue{
|
|
|
|
otelogen.OperationID("getScriptPolicy"),
|
|
|
|
semconv.HTTPRequestMethodKey.String("GET"),
|
|
|
|
semconv.HTTPRouteKey.String("/script-policy/id/{ScriptPolicyID}"),
|
|
|
|
}
|
|
|
|
|
|
|
|
// Start a span for this request.
|
|
|
|
ctx, span := s.cfg.Tracer.Start(r.Context(), GetScriptPolicyOperation,
|
|
|
|
trace.WithAttributes(otelAttrs...),
|
|
|
|
serverSpanKind,
|
|
|
|
)
|
|
|
|
defer span.End()
|
|
|
|
|
|
|
|
// Add Labeler to context.
|
|
|
|
labeler := &Labeler{attrs: otelAttrs}
|
|
|
|
ctx = contextWithLabeler(ctx, labeler)
|
|
|
|
|
|
|
|
// Run stopwatch.
|
|
|
|
startTime := time.Now()
|
|
|
|
defer func() {
|
|
|
|
elapsedDuration := time.Since(startTime)
|
|
|
|
|
|
|
|
attrSet := labeler.AttributeSet()
|
|
|
|
attrs := attrSet.ToSlice()
|
|
|
|
code := statusWriter.status
|
|
|
|
if code != 0 {
|
|
|
|
codeAttr := semconv.HTTPResponseStatusCode(code)
|
|
|
|
attrs = append(attrs, codeAttr)
|
|
|
|
span.SetAttributes(codeAttr)
|
|
|
|
}
|
|
|
|
attrOpt := metric.WithAttributes(attrs...)
|
|
|
|
|
|
|
|
// Increment request counter.
|
|
|
|
s.requests.Add(ctx, 1, attrOpt)
|
|
|
|
|
|
|
|
// Use floating point division here for higher precision (instead of Millisecond method).
|
|
|
|
s.duration.Record(ctx, float64(elapsedDuration)/float64(time.Millisecond), attrOpt)
|
|
|
|
}()
|
|
|
|
|
|
|
|
var (
|
|
|
|
recordError = func(stage string, err error) {
|
|
|
|
span.RecordError(err)
|
|
|
|
|
|
|
|
// https://opentelemetry.io/docs/specs/semconv/http/http-spans/#status
|
|
|
|
// Span Status MUST be left unset if HTTP status code was in the 1xx, 2xx or 3xx ranges,
|
|
|
|
// unless there was another error (e.g., network error receiving the response body; or 3xx codes with
|
|
|
|
// max redirects exceeded), in which case status MUST be set to Error.
|
|
|
|
code := statusWriter.status
|
|
|
|
if code >= 100 && code < 500 {
|
|
|
|
span.SetStatus(codes.Error, stage)
|
|
|
|
}
|
|
|
|
|
|
|
|
attrSet := labeler.AttributeSet()
|
|
|
|
attrs := attrSet.ToSlice()
|
|
|
|
if code != 0 {
|
|
|
|
attrs = append(attrs, semconv.HTTPResponseStatusCode(code))
|
|
|
|
}
|
|
|
|
|
|
|
|
s.errors.Add(ctx, 1, metric.WithAttributes(attrs...))
|
|
|
|
}
|
|
|
|
err error
|
|
|
|
opErrContext = ogenerrors.OperationContext{
|
|
|
|
Name: GetScriptPolicyOperation,
|
|
|
|
ID: "getScriptPolicy",
|
|
|
|
}
|
|
|
|
)
|
|
|
|
{
|
|
|
|
type bitset = [1]uint8
|
|
|
|
var satisfied bitset
|
|
|
|
{
|
|
|
|
sctx, ok, err := s.securityCookieAuth(ctx, GetScriptPolicyOperation, r)
|
|
|
|
if err != nil {
|
|
|
|
err = &ogenerrors.SecurityError{
|
|
|
|
OperationContext: opErrContext,
|
|
|
|
Security: "CookieAuth",
|
|
|
|
Err: err,
|
|
|
|
}
|
|
|
|
if encodeErr := encodeErrorResponse(s.h.NewError(ctx, err), w, span); encodeErr != nil {
|
|
|
|
defer recordError("Security:CookieAuth", err)
|
|
|
|
}
|
|
|
|
return
|
|
|
|
}
|
|
|
|
if ok {
|
|
|
|
satisfied[0] |= 1 << 0
|
|
|
|
ctx = sctx
|
|
|
|
}
|
|
|
|
}
|
|
|
|
|
|
|
|
if ok := func() bool {
|
|
|
|
nextRequirement:
|
|
|
|
for _, requirement := range []bitset{
|
|
|
|
{0b00000001},
|
|
|
|
} {
|
|
|
|
for i, mask := range requirement {
|
|
|
|
if satisfied[i]&mask != mask {
|
|
|
|
continue nextRequirement
|
|
|
|
}
|
|
|
|
}
|
|
|
|
return true
|
|
|
|
}
|
|
|
|
return false
|
|
|
|
}(); !ok {
|
|
|
|
err = &ogenerrors.SecurityError{
|
|
|
|
OperationContext: opErrContext,
|
|
|
|
Err: ogenerrors.ErrSecurityRequirementIsNotSatisfied,
|
|
|
|
}
|
|
|
|
if encodeErr := encodeErrorResponse(s.h.NewError(ctx, err), w, span); encodeErr != nil {
|
|
|
|
defer recordError("Security", err)
|
|
|
|
}
|
|
|
|
return
|
|
|
|
}
|
|
|
|
}
|
|
|
|
params, err := decodeGetScriptPolicyParams(args, argsEscaped, r)
|
|
|
|
if err != nil {
|
|
|
|
err = &ogenerrors.DecodeParamsError{
|
|
|
|
OperationContext: opErrContext,
|
|
|
|
Err: err,
|
|
|
|
}
|
|
|
|
defer recordError("DecodeParams", err)
|
|
|
|
s.cfg.ErrorHandler(ctx, w, r, err)
|
|
|
|
return
|
|
|
|
}
|
|
|
|
|
|
|
|
var response *ScriptPolicy
|
|
|
|
if m := s.cfg.Middleware; m != nil {
|
|
|
|
mreq := middleware.Request{
|
|
|
|
Context: ctx,
|
|
|
|
OperationName: GetScriptPolicyOperation,
|
|
|
|
OperationSummary: "Get the specified script policy by ID",
|
|
|
|
OperationID: "getScriptPolicy",
|
|
|
|
Body: nil,
|
|
|
|
Params: middleware.Parameters{
|
|
|
|
{
|
|
|
|
Name: "ScriptPolicyID",
|
|
|
|
In: "path",
|
|
|
|
}: params.ScriptPolicyID,
|
|
|
|
},
|
|
|
|
Raw: r,
|
|
|
|
}
|
|
|
|
|
|
|
|
type (
|
|
|
|
Request = struct{}
|
|
|
|
Params = GetScriptPolicyParams
|
|
|
|
Response = *ScriptPolicy
|
|
|
|
)
|
|
|
|
response, err = middleware.HookMiddleware[
|
|
|
|
Request,
|
|
|
|
Params,
|
|
|
|
Response,
|
|
|
|
](
|
|
|
|
m,
|
|
|
|
mreq,
|
|
|
|
unpackGetScriptPolicyParams,
|
|
|
|
func(ctx context.Context, request Request, params Params) (response Response, err error) {
|
|
|
|
response, err = s.h.GetScriptPolicy(ctx, params)
|
|
|
|
return response, err
|
|
|
|
},
|
|
|
|
)
|
|
|
|
} else {
|
|
|
|
response, err = s.h.GetScriptPolicy(ctx, params)
|
|
|
|
}
|
|
|
|
if err != nil {
|
|
|
|
if errRes, ok := errors.Into[*ErrorStatusCode](err); ok {
|
|
|
|
if err := encodeErrorResponse(errRes, w, span); err != nil {
|
|
|
|
defer recordError("Internal", err)
|
|
|
|
}
|
|
|
|
return
|
|
|
|
}
|
|
|
|
if errors.Is(err, ht.ErrNotImplemented) {
|
|
|
|
s.cfg.ErrorHandler(ctx, w, r, err)
|
|
|
|
return
|
|
|
|
}
|
|
|
|
if err := encodeErrorResponse(s.h.NewError(ctx, err), w, span); err != nil {
|
|
|
|
defer recordError("Internal", err)
|
|
|
|
}
|
|
|
|
return
|
|
|
|
}
|
|
|
|
|
|
|
|
if err := encodeGetScriptPolicyResponse(response, w, span); err != nil {
|
|
|
|
defer recordError("EncodeResponse", err)
|
|
|
|
if !errors.Is(err, ht.ErrInternalServerErrorResponse) {
|
|
|
|
s.cfg.ErrorHandler(ctx, w, r, err)
|
|
|
|
}
|
|
|
|
return
|
|
|
|
}
|
|
|
|
}
|
|
|
|
|
|
|
|
// handleGetScriptPolicyFromHashRequest handles getScriptPolicyFromHash operation.
|
|
|
|
//
|
|
|
|
// Get the policy for the given hash of script source code.
|
|
|
|
//
|
|
|
|
// GET /script-policy/hash/{FromScriptHash}
|
|
|
|
func (s *Server) handleGetScriptPolicyFromHashRequest(args [1]string, argsEscaped bool, w http.ResponseWriter, r *http.Request) {
|
|
|
|
statusWriter := &codeRecorder{ResponseWriter: w}
|
|
|
|
w = statusWriter
|
|
|
|
otelAttrs := []attribute.KeyValue{
|
|
|
|
otelogen.OperationID("getScriptPolicyFromHash"),
|
|
|
|
semconv.HTTPRequestMethodKey.String("GET"),
|
|
|
|
semconv.HTTPRouteKey.String("/script-policy/hash/{FromScriptHash}"),
|
|
|
|
}
|
|
|
|
|
|
|
|
// Start a span for this request.
|
|
|
|
ctx, span := s.cfg.Tracer.Start(r.Context(), GetScriptPolicyFromHashOperation,
|
|
|
|
trace.WithAttributes(otelAttrs...),
|
|
|
|
serverSpanKind,
|
|
|
|
)
|
|
|
|
defer span.End()
|
|
|
|
|
|
|
|
// Add Labeler to context.
|
|
|
|
labeler := &Labeler{attrs: otelAttrs}
|
|
|
|
ctx = contextWithLabeler(ctx, labeler)
|
|
|
|
|
|
|
|
// Run stopwatch.
|
|
|
|
startTime := time.Now()
|
|
|
|
defer func() {
|
|
|
|
elapsedDuration := time.Since(startTime)
|
|
|
|
|
|
|
|
attrSet := labeler.AttributeSet()
|
|
|
|
attrs := attrSet.ToSlice()
|
|
|
|
code := statusWriter.status
|
|
|
|
if code != 0 {
|
|
|
|
codeAttr := semconv.HTTPResponseStatusCode(code)
|
|
|
|
attrs = append(attrs, codeAttr)
|
|
|
|
span.SetAttributes(codeAttr)
|
|
|
|
}
|
|
|
|
attrOpt := metric.WithAttributes(attrs...)
|
|
|
|
|
|
|
|
// Increment request counter.
|
|
|
|
s.requests.Add(ctx, 1, attrOpt)
|
|
|
|
|
|
|
|
// Use floating point division here for higher precision (instead of Millisecond method).
|
|
|
|
s.duration.Record(ctx, float64(elapsedDuration)/float64(time.Millisecond), attrOpt)
|
|
|
|
}()
|
|
|
|
|
|
|
|
var (
|
|
|
|
recordError = func(stage string, err error) {
|
|
|
|
span.RecordError(err)
|
|
|
|
|
|
|
|
// https://opentelemetry.io/docs/specs/semconv/http/http-spans/#status
|
|
|
|
// Span Status MUST be left unset if HTTP status code was in the 1xx, 2xx or 3xx ranges,
|
|
|
|
// unless there was another error (e.g., network error receiving the response body; or 3xx codes with
|
|
|
|
// max redirects exceeded), in which case status MUST be set to Error.
|
|
|
|
code := statusWriter.status
|
|
|
|
if code >= 100 && code < 500 {
|
|
|
|
span.SetStatus(codes.Error, stage)
|
|
|
|
}
|
|
|
|
|
|
|
|
attrSet := labeler.AttributeSet()
|
|
|
|
attrs := attrSet.ToSlice()
|
|
|
|
if code != 0 {
|
|
|
|
attrs = append(attrs, semconv.HTTPResponseStatusCode(code))
|
|
|
|
}
|
|
|
|
|
|
|
|
s.errors.Add(ctx, 1, metric.WithAttributes(attrs...))
|
|
|
|
}
|
|
|
|
err error
|
|
|
|
opErrContext = ogenerrors.OperationContext{
|
|
|
|
Name: GetScriptPolicyFromHashOperation,
|
|
|
|
ID: "getScriptPolicyFromHash",
|
|
|
|
}
|
|
|
|
)
|
|
|
|
{
|
|
|
|
type bitset = [1]uint8
|
|
|
|
var satisfied bitset
|
|
|
|
{
|
|
|
|
sctx, ok, err := s.securityCookieAuth(ctx, GetScriptPolicyFromHashOperation, r)
|
|
|
|
if err != nil {
|
|
|
|
err = &ogenerrors.SecurityError{
|
|
|
|
OperationContext: opErrContext,
|
|
|
|
Security: "CookieAuth",
|
|
|
|
Err: err,
|
|
|
|
}
|
|
|
|
if encodeErr := encodeErrorResponse(s.h.NewError(ctx, err), w, span); encodeErr != nil {
|
|
|
|
defer recordError("Security:CookieAuth", err)
|
|
|
|
}
|
|
|
|
return
|
|
|
|
}
|
|
|
|
if ok {
|
|
|
|
satisfied[0] |= 1 << 0
|
|
|
|
ctx = sctx
|
|
|
|
}
|
|
|
|
}
|
|
|
|
|
|
|
|
if ok := func() bool {
|
|
|
|
nextRequirement:
|
|
|
|
for _, requirement := range []bitset{
|
|
|
|
{0b00000001},
|
|
|
|
} {
|
|
|
|
for i, mask := range requirement {
|
|
|
|
if satisfied[i]&mask != mask {
|
|
|
|
continue nextRequirement
|
|
|
|
}
|
|
|
|
}
|
|
|
|
return true
|
|
|
|
}
|
|
|
|
return false
|
|
|
|
}(); !ok {
|
|
|
|
err = &ogenerrors.SecurityError{
|
|
|
|
OperationContext: opErrContext,
|
|
|
|
Err: ogenerrors.ErrSecurityRequirementIsNotSatisfied,
|
|
|
|
}
|
|
|
|
if encodeErr := encodeErrorResponse(s.h.NewError(ctx, err), w, span); encodeErr != nil {
|
|
|
|
defer recordError("Security", err)
|
|
|
|
}
|
|
|
|
return
|
|
|
|
}
|
|
|
|
}
|
|
|
|
params, err := decodeGetScriptPolicyFromHashParams(args, argsEscaped, r)
|
|
|
|
if err != nil {
|
|
|
|
err = &ogenerrors.DecodeParamsError{
|
|
|
|
OperationContext: opErrContext,
|
|
|
|
Err: err,
|
|
|
|
}
|
|
|
|
defer recordError("DecodeParams", err)
|
|
|
|
s.cfg.ErrorHandler(ctx, w, r, err)
|
|
|
|
return
|
|
|
|
}
|
|
|
|
|
|
|
|
var response *ScriptPolicy
|
|
|
|
if m := s.cfg.Middleware; m != nil {
|
|
|
|
mreq := middleware.Request{
|
|
|
|
Context: ctx,
|
|
|
|
OperationName: GetScriptPolicyFromHashOperation,
|
|
|
|
OperationSummary: "Get the policy for the given hash of script source code",
|
|
|
|
OperationID: "getScriptPolicyFromHash",
|
|
|
|
Body: nil,
|
|
|
|
Params: middleware.Parameters{
|
|
|
|
{
|
|
|
|
Name: "FromScriptHash",
|
|
|
|
In: "path",
|
|
|
|
}: params.FromScriptHash,
|
|
|
|
},
|
|
|
|
Raw: r,
|
|
|
|
}
|
|
|
|
|
|
|
|
type (
|
|
|
|
Request = struct{}
|
|
|
|
Params = GetScriptPolicyFromHashParams
|
|
|
|
Response = *ScriptPolicy
|
|
|
|
)
|
|
|
|
response, err = middleware.HookMiddleware[
|
|
|
|
Request,
|
|
|
|
Params,
|
|
|
|
Response,
|
|
|
|
](
|
|
|
|
m,
|
|
|
|
mreq,
|
|
|
|
unpackGetScriptPolicyFromHashParams,
|
|
|
|
func(ctx context.Context, request Request, params Params) (response Response, err error) {
|
|
|
|
response, err = s.h.GetScriptPolicyFromHash(ctx, params)
|
|
|
|
return response, err
|
|
|
|
},
|
|
|
|
)
|
|
|
|
} else {
|
|
|
|
response, err = s.h.GetScriptPolicyFromHash(ctx, params)
|
|
|
|
}
|
|
|
|
if err != nil {
|
|
|
|
if errRes, ok := errors.Into[*ErrorStatusCode](err); ok {
|
|
|
|
if err := encodeErrorResponse(errRes, w, span); err != nil {
|
|
|
|
defer recordError("Internal", err)
|
|
|
|
}
|
|
|
|
return
|
|
|
|
}
|
|
|
|
if errors.Is(err, ht.ErrNotImplemented) {
|
|
|
|
s.cfg.ErrorHandler(ctx, w, r, err)
|
|
|
|
return
|
|
|
|
}
|
|
|
|
if err := encodeErrorResponse(s.h.NewError(ctx, err), w, span); err != nil {
|
|
|
|
defer recordError("Internal", err)
|
|
|
|
}
|
|
|
|
return
|
|
|
|
}
|
|
|
|
|
|
|
|
if err := encodeGetScriptPolicyFromHashResponse(response, w, span); err != nil {
|
|
|
|
defer recordError("EncodeResponse", err)
|
|
|
|
if !errors.Is(err, ht.ErrInternalServerErrorResponse) {
|
|
|
|
s.cfg.ErrorHandler(ctx, w, r, err)
|
|
|
|
}
|
|
|
|
return
|
|
|
|
}
|
|
|
|
}
|
|
|
|
|
|
|
|
// handleGetSubmissionRequest handles getSubmission operation.
|
|
|
|
//
|
|
|
|
// Retrieve map with ID.
|
|
|
|
//
|
|
|
|
// GET /submissions/{SubmissionID}
|
|
|
|
func (s *Server) handleGetSubmissionRequest(args [1]string, argsEscaped bool, w http.ResponseWriter, r *http.Request) {
|
|
|
|
statusWriter := &codeRecorder{ResponseWriter: w}
|
|
|
|
w = statusWriter
|
|
|
|
otelAttrs := []attribute.KeyValue{
|
|
|
|
otelogen.OperationID("getSubmission"),
|
|
|
|
semconv.HTTPRequestMethodKey.String("GET"),
|
|
|
|
semconv.HTTPRouteKey.String("/submissions/{SubmissionID}"),
|
|
|
|
}
|
|
|
|
|
|
|
|
// Start a span for this request.
|
|
|
|
ctx, span := s.cfg.Tracer.Start(r.Context(), GetSubmissionOperation,
|
|
|
|
trace.WithAttributes(otelAttrs...),
|
|
|
|
serverSpanKind,
|
|
|
|
)
|
|
|
|
defer span.End()
|
|
|
|
|
|
|
|
// Add Labeler to context.
|
|
|
|
labeler := &Labeler{attrs: otelAttrs}
|
|
|
|
ctx = contextWithLabeler(ctx, labeler)
|
|
|
|
|
|
|
|
// Run stopwatch.
|
|
|
|
startTime := time.Now()
|
|
|
|
defer func() {
|
|
|
|
elapsedDuration := time.Since(startTime)
|
|
|
|
|
|
|
|
attrSet := labeler.AttributeSet()
|
|
|
|
attrs := attrSet.ToSlice()
|
|
|
|
code := statusWriter.status
|
|
|
|
if code != 0 {
|
|
|
|
codeAttr := semconv.HTTPResponseStatusCode(code)
|
|
|
|
attrs = append(attrs, codeAttr)
|
|
|
|
span.SetAttributes(codeAttr)
|
|
|
|
}
|
|
|
|
attrOpt := metric.WithAttributes(attrs...)
|
|
|
|
|
|
|
|
// Increment request counter.
|
|
|
|
s.requests.Add(ctx, 1, attrOpt)
|
|
|
|
|
|
|
|
// Use floating point division here for higher precision (instead of Millisecond method).
|
|
|
|
s.duration.Record(ctx, float64(elapsedDuration)/float64(time.Millisecond), attrOpt)
|
|
|
|
}()
|
|
|
|
|
|
|
|
var (
|
|
|
|
recordError = func(stage string, err error) {
|
|
|
|
span.RecordError(err)
|
|
|
|
|
|
|
|
// https://opentelemetry.io/docs/specs/semconv/http/http-spans/#status
|
|
|
|
// Span Status MUST be left unset if HTTP status code was in the 1xx, 2xx or 3xx ranges,
|
|
|
|
// unless there was another error (e.g., network error receiving the response body; or 3xx codes with
|
|
|
|
// max redirects exceeded), in which case status MUST be set to Error.
|
|
|
|
code := statusWriter.status
|
|
|
|
if code >= 100 && code < 500 {
|
|
|
|
span.SetStatus(codes.Error, stage)
|
|
|
|
}
|
|
|
|
|
|
|
|
attrSet := labeler.AttributeSet()
|
|
|
|
attrs := attrSet.ToSlice()
|
|
|
|
if code != 0 {
|
|
|
|
attrs = append(attrs, semconv.HTTPResponseStatusCode(code))
|
|
|
|
}
|
|
|
|
|
|
|
|
s.errors.Add(ctx, 1, metric.WithAttributes(attrs...))
|
|
|
|
}
|
|
|
|
err error
|
|
|
|
opErrContext = ogenerrors.OperationContext{
|
|
|
|
Name: GetSubmissionOperation,
|
|
|
|
ID: "getSubmission",
|
|
|
|
}
|
|
|
|
)
|
|
|
|
{
|
|
|
|
type bitset = [1]uint8
|
|
|
|
var satisfied bitset
|
|
|
|
{
|
|
|
|
sctx, ok, err := s.securityCookieAuth(ctx, GetSubmissionOperation, r)
|
|
|
|
if err != nil {
|
|
|
|
err = &ogenerrors.SecurityError{
|
|
|
|
OperationContext: opErrContext,
|
|
|
|
Security: "CookieAuth",
|
|
|
|
Err: err,
|
|
|
|
}
|
|
|
|
if encodeErr := encodeErrorResponse(s.h.NewError(ctx, err), w, span); encodeErr != nil {
|
|
|
|
defer recordError("Security:CookieAuth", err)
|
|
|
|
}
|
|
|
|
return
|
|
|
|
}
|
|
|
|
if ok {
|
|
|
|
satisfied[0] |= 1 << 0
|
|
|
|
ctx = sctx
|
|
|
|
}
|
|
|
|
}
|
|
|
|
|
|
|
|
if ok := func() bool {
|
|
|
|
nextRequirement:
|
|
|
|
for _, requirement := range []bitset{
|
|
|
|
{0b00000001},
|
|
|
|
} {
|
|
|
|
for i, mask := range requirement {
|
|
|
|
if satisfied[i]&mask != mask {
|
|
|
|
continue nextRequirement
|
|
|
|
}
|
|
|
|
}
|
|
|
|
return true
|
|
|
|
}
|
|
|
|
return false
|
|
|
|
}(); !ok {
|
|
|
|
err = &ogenerrors.SecurityError{
|
|
|
|
OperationContext: opErrContext,
|
|
|
|
Err: ogenerrors.ErrSecurityRequirementIsNotSatisfied,
|
|
|
|
}
|
|
|
|
if encodeErr := encodeErrorResponse(s.h.NewError(ctx, err), w, span); encodeErr != nil {
|
|
|
|
defer recordError("Security", err)
|
|
|
|
}
|
|
|
|
return
|
|
|
|
}
|
|
|
|
}
|
|
|
|
params, err := decodeGetSubmissionParams(args, argsEscaped, r)
|
|
|
|
if err != nil {
|
|
|
|
err = &ogenerrors.DecodeParamsError{
|
|
|
|
OperationContext: opErrContext,
|
|
|
|
Err: err,
|
|
|
|
}
|
|
|
|
defer recordError("DecodeParams", err)
|
|
|
|
s.cfg.ErrorHandler(ctx, w, r, err)
|
|
|
|
return
|
|
|
|
}
|
|
|
|
|
|
|
|
var response *Submission
|
|
|
|
if m := s.cfg.Middleware; m != nil {
|
|
|
|
mreq := middleware.Request{
|
|
|
|
Context: ctx,
|
|
|
|
OperationName: GetSubmissionOperation,
|
|
|
|
OperationSummary: "Retrieve map with ID",
|
|
|
|
OperationID: "getSubmission",
|
|
|
|
Body: nil,
|
|
|
|
Params: middleware.Parameters{
|
|
|
|
{
|
|
|
|
Name: "SubmissionID",
|
|
|
|
In: "path",
|
|
|
|
}: params.SubmissionID,
|
|
|
|
},
|
|
|
|
Raw: r,
|
|
|
|
}
|
|
|
|
|
|
|
|
type (
|
|
|
|
Request = struct{}
|
|
|
|
Params = GetSubmissionParams
|
|
|
|
Response = *Submission
|
|
|
|
)
|
|
|
|
response, err = middleware.HookMiddleware[
|
|
|
|
Request,
|
|
|
|
Params,
|
|
|
|
Response,
|
|
|
|
](
|
|
|
|
m,
|
|
|
|
mreq,
|
|
|
|
unpackGetSubmissionParams,
|
|
|
|
func(ctx context.Context, request Request, params Params) (response Response, err error) {
|
|
|
|
response, err = s.h.GetSubmission(ctx, params)
|
|
|
|
return response, err
|
|
|
|
},
|
|
|
|
)
|
|
|
|
} else {
|
|
|
|
response, err = s.h.GetSubmission(ctx, params)
|
|
|
|
}
|
|
|
|
if err != nil {
|
|
|
|
if errRes, ok := errors.Into[*ErrorStatusCode](err); ok {
|
|
|
|
if err := encodeErrorResponse(errRes, w, span); err != nil {
|
|
|
|
defer recordError("Internal", err)
|
|
|
|
}
|
|
|
|
return
|
|
|
|
}
|
|
|
|
if errors.Is(err, ht.ErrNotImplemented) {
|
|
|
|
s.cfg.ErrorHandler(ctx, w, r, err)
|
|
|
|
return
|
|
|
|
}
|
|
|
|
if err := encodeErrorResponse(s.h.NewError(ctx, err), w, span); err != nil {
|
|
|
|
defer recordError("Internal", err)
|
|
|
|
}
|
|
|
|
return
|
|
|
|
}
|
|
|
|
|
|
|
|
if err := encodeGetSubmissionResponse(response, w, span); err != nil {
|
|
|
|
defer recordError("EncodeResponse", err)
|
|
|
|
if !errors.Is(err, ht.ErrInternalServerErrorResponse) {
|
|
|
|
s.cfg.ErrorHandler(ctx, w, r, err)
|
|
|
|
}
|
|
|
|
return
|
|
|
|
}
|
|
|
|
}
|
|
|
|
|
|
|
|
// handleListSubmissionsRequest handles listSubmissions operation.
|
|
|
|
//
|
|
|
|
// Get list of submissions.
|
|
|
|
//
|
|
|
|
// GET /submissions
|
|
|
|
func (s *Server) handleListSubmissionsRequest(args [0]string, argsEscaped bool, w http.ResponseWriter, r *http.Request) {
|
|
|
|
statusWriter := &codeRecorder{ResponseWriter: w}
|
|
|
|
w = statusWriter
|
|
|
|
otelAttrs := []attribute.KeyValue{
|
|
|
|
otelogen.OperationID("listSubmissions"),
|
|
|
|
semconv.HTTPRequestMethodKey.String("GET"),
|
|
|
|
semconv.HTTPRouteKey.String("/submissions"),
|
|
|
|
}
|
|
|
|
|
|
|
|
// Start a span for this request.
|
|
|
|
ctx, span := s.cfg.Tracer.Start(r.Context(), ListSubmissionsOperation,
|
|
|
|
trace.WithAttributes(otelAttrs...),
|
|
|
|
serverSpanKind,
|
|
|
|
)
|
|
|
|
defer span.End()
|
|
|
|
|
|
|
|
// Add Labeler to context.
|
|
|
|
labeler := &Labeler{attrs: otelAttrs}
|
|
|
|
ctx = contextWithLabeler(ctx, labeler)
|
|
|
|
|
|
|
|
// Run stopwatch.
|
|
|
|
startTime := time.Now()
|
|
|
|
defer func() {
|
|
|
|
elapsedDuration := time.Since(startTime)
|
|
|
|
|
|
|
|
attrSet := labeler.AttributeSet()
|
|
|
|
attrs := attrSet.ToSlice()
|
|
|
|
code := statusWriter.status
|
|
|
|
if code != 0 {
|
|
|
|
codeAttr := semconv.HTTPResponseStatusCode(code)
|
|
|
|
attrs = append(attrs, codeAttr)
|
|
|
|
span.SetAttributes(codeAttr)
|
|
|
|
}
|
|
|
|
attrOpt := metric.WithAttributes(attrs...)
|
|
|
|
|
|
|
|
// Increment request counter.
|
|
|
|
s.requests.Add(ctx, 1, attrOpt)
|
|
|
|
|
|
|
|
// Use floating point division here for higher precision (instead of Millisecond method).
|
|
|
|
s.duration.Record(ctx, float64(elapsedDuration)/float64(time.Millisecond), attrOpt)
|
|
|
|
}()
|
|
|
|
|
|
|
|
var (
|
|
|
|
recordError = func(stage string, err error) {
|
|
|
|
span.RecordError(err)
|
|
|
|
|
|
|
|
// https://opentelemetry.io/docs/specs/semconv/http/http-spans/#status
|
|
|
|
// Span Status MUST be left unset if HTTP status code was in the 1xx, 2xx or 3xx ranges,
|
|
|
|
// unless there was another error (e.g., network error receiving the response body; or 3xx codes with
|
|
|
|
// max redirects exceeded), in which case status MUST be set to Error.
|
|
|
|
code := statusWriter.status
|
|
|
|
if code >= 100 && code < 500 {
|
|
|
|
span.SetStatus(codes.Error, stage)
|
|
|
|
}
|
|
|
|
|
|
|
|
attrSet := labeler.AttributeSet()
|
|
|
|
attrs := attrSet.ToSlice()
|
|
|
|
if code != 0 {
|
|
|
|
attrs = append(attrs, semconv.HTTPResponseStatusCode(code))
|
|
|
|
}
|
|
|
|
|
|
|
|
s.errors.Add(ctx, 1, metric.WithAttributes(attrs...))
|
|
|
|
}
|
|
|
|
err error
|
|
|
|
opErrContext = ogenerrors.OperationContext{
|
|
|
|
Name: ListSubmissionsOperation,
|
|
|
|
ID: "listSubmissions",
|
|
|
|
}
|
|
|
|
)
|
|
|
|
{
|
|
|
|
type bitset = [1]uint8
|
|
|
|
var satisfied bitset
|
|
|
|
{
|
|
|
|
sctx, ok, err := s.securityCookieAuth(ctx, ListSubmissionsOperation, r)
|
|
|
|
if err != nil {
|
|
|
|
err = &ogenerrors.SecurityError{
|
|
|
|
OperationContext: opErrContext,
|
|
|
|
Security: "CookieAuth",
|
|
|
|
Err: err,
|
|
|
|
}
|
|
|
|
if encodeErr := encodeErrorResponse(s.h.NewError(ctx, err), w, span); encodeErr != nil {
|
|
|
|
defer recordError("Security:CookieAuth", err)
|
|
|
|
}
|
|
|
|
return
|
|
|
|
}
|
|
|
|
if ok {
|
|
|
|
satisfied[0] |= 1 << 0
|
|
|
|
ctx = sctx
|
|
|
|
}
|
|
|
|
}
|
|
|
|
|
|
|
|
if ok := func() bool {
|
|
|
|
nextRequirement:
|
|
|
|
for _, requirement := range []bitset{
|
|
|
|
{0b00000001},
|
|
|
|
} {
|
|
|
|
for i, mask := range requirement {
|
|
|
|
if satisfied[i]&mask != mask {
|
|
|
|
continue nextRequirement
|
|
|
|
}
|
|
|
|
}
|
|
|
|
return true
|
|
|
|
}
|
|
|
|
return false
|
|
|
|
}(); !ok {
|
|
|
|
err = &ogenerrors.SecurityError{
|
|
|
|
OperationContext: opErrContext,
|
|
|
|
Err: ogenerrors.ErrSecurityRequirementIsNotSatisfied,
|
|
|
|
}
|
|
|
|
if encodeErr := encodeErrorResponse(s.h.NewError(ctx, err), w, span); encodeErr != nil {
|
|
|
|
defer recordError("Security", err)
|
|
|
|
}
|
|
|
|
return
|
|
|
|
}
|
|
|
|
}
|
|
|
|
params, err := decodeListSubmissionsParams(args, argsEscaped, r)
|
|
|
|
if err != nil {
|
|
|
|
err = &ogenerrors.DecodeParamsError{
|
|
|
|
OperationContext: opErrContext,
|
|
|
|
Err: err,
|
|
|
|
}
|
|
|
|
defer recordError("DecodeParams", err)
|
|
|
|
s.cfg.ErrorHandler(ctx, w, r, err)
|
|
|
|
return
|
|
|
|
}
|
|
|
|
|
|
|
|
var response []Submission
|
|
|
|
if m := s.cfg.Middleware; m != nil {
|
|
|
|
mreq := middleware.Request{
|
|
|
|
Context: ctx,
|
|
|
|
OperationName: ListSubmissionsOperation,
|
|
|
|
OperationSummary: "Get list of submissions",
|
|
|
|
OperationID: "listSubmissions",
|
|
|
|
Body: nil,
|
|
|
|
Params: middleware.Parameters{
|
|
|
|
{
|
|
|
|
Name: "page",
|
|
|
|
In: "query",
|
|
|
|
}: params.Page,
|
|
|
|
{
|
|
|
|
Name: "filter",
|
|
|
|
In: "query",
|
|
|
|
}: params.Filter,
|
|
|
|
},
|
|
|
|
Raw: r,
|
|
|
|
}
|
|
|
|
|
|
|
|
type (
|
|
|
|
Request = struct{}
|
|
|
|
Params = ListSubmissionsParams
|
|
|
|
Response = []Submission
|
|
|
|
)
|
|
|
|
response, err = middleware.HookMiddleware[
|
|
|
|
Request,
|
|
|
|
Params,
|
|
|
|
Response,
|
|
|
|
](
|
|
|
|
m,
|
|
|
|
mreq,
|
|
|
|
unpackListSubmissionsParams,
|
|
|
|
func(ctx context.Context, request Request, params Params) (response Response, err error) {
|
|
|
|
response, err = s.h.ListSubmissions(ctx, params)
|
|
|
|
return response, err
|
|
|
|
},
|
|
|
|
)
|
|
|
|
} else {
|
|
|
|
response, err = s.h.ListSubmissions(ctx, params)
|
|
|
|
}
|
|
|
|
if err != nil {
|
|
|
|
if errRes, ok := errors.Into[*ErrorStatusCode](err); ok {
|
|
|
|
if err := encodeErrorResponse(errRes, w, span); err != nil {
|
|
|
|
defer recordError("Internal", err)
|
|
|
|
}
|
|
|
|
return
|
|
|
|
}
|
|
|
|
if errors.Is(err, ht.ErrNotImplemented) {
|
|
|
|
s.cfg.ErrorHandler(ctx, w, r, err)
|
|
|
|
return
|
|
|
|
}
|
|
|
|
if err := encodeErrorResponse(s.h.NewError(ctx, err), w, span); err != nil {
|
|
|
|
defer recordError("Internal", err)
|
|
|
|
}
|
|
|
|
return
|
|
|
|
}
|
|
|
|
|
|
|
|
if err := encodeListSubmissionsResponse(response, w, span); err != nil {
|
|
|
|
defer recordError("EncodeResponse", err)
|
|
|
|
if !errors.Is(err, ht.ErrInternalServerErrorResponse) {
|
|
|
|
s.cfg.ErrorHandler(ctx, w, r, err)
|
|
|
|
}
|
|
|
|
return
|
|
|
|
}
|
|
|
|
}
|
|
|
|
|
|
|
|
// handlePatchSubmissionCompletedRequest handles patchSubmissionCompleted operation.
|
|
|
|
//
|
|
|
|
// Retrieve map with ID.
|
|
|
|
//
|
|
|
|
// PATCH /submissions/{SubmissionID}/completed
|
|
|
|
func (s *Server) handlePatchSubmissionCompletedRequest(args [1]string, argsEscaped bool, w http.ResponseWriter, r *http.Request) {
|
|
|
|
statusWriter := &codeRecorder{ResponseWriter: w}
|
|
|
|
w = statusWriter
|
|
|
|
otelAttrs := []attribute.KeyValue{
|
|
|
|
otelogen.OperationID("patchSubmissionCompleted"),
|
|
|
|
semconv.HTTPRequestMethodKey.String("PATCH"),
|
|
|
|
semconv.HTTPRouteKey.String("/submissions/{SubmissionID}/completed"),
|
|
|
|
}
|
|
|
|
|
|
|
|
// Start a span for this request.
|
|
|
|
ctx, span := s.cfg.Tracer.Start(r.Context(), PatchSubmissionCompletedOperation,
|
|
|
|
trace.WithAttributes(otelAttrs...),
|
|
|
|
serverSpanKind,
|
|
|
|
)
|
|
|
|
defer span.End()
|
|
|
|
|
|
|
|
// Add Labeler to context.
|
|
|
|
labeler := &Labeler{attrs: otelAttrs}
|
|
|
|
ctx = contextWithLabeler(ctx, labeler)
|
|
|
|
|
|
|
|
// Run stopwatch.
|
|
|
|
startTime := time.Now()
|
|
|
|
defer func() {
|
|
|
|
elapsedDuration := time.Since(startTime)
|
|
|
|
|
|
|
|
attrSet := labeler.AttributeSet()
|
|
|
|
attrs := attrSet.ToSlice()
|
|
|
|
code := statusWriter.status
|
|
|
|
if code != 0 {
|
|
|
|
codeAttr := semconv.HTTPResponseStatusCode(code)
|
|
|
|
attrs = append(attrs, codeAttr)
|
|
|
|
span.SetAttributes(codeAttr)
|
|
|
|
}
|
|
|
|
attrOpt := metric.WithAttributes(attrs...)
|
|
|
|
|
|
|
|
// Increment request counter.
|
|
|
|
s.requests.Add(ctx, 1, attrOpt)
|
|
|
|
|
|
|
|
// Use floating point division here for higher precision (instead of Millisecond method).
|
|
|
|
s.duration.Record(ctx, float64(elapsedDuration)/float64(time.Millisecond), attrOpt)
|
|
|
|
}()
|
|
|
|
|
|
|
|
var (
|
|
|
|
recordError = func(stage string, err error) {
|
|
|
|
span.RecordError(err)
|
|
|
|
|
|
|
|
// https://opentelemetry.io/docs/specs/semconv/http/http-spans/#status
|
|
|
|
// Span Status MUST be left unset if HTTP status code was in the 1xx, 2xx or 3xx ranges,
|
|
|
|
// unless there was another error (e.g., network error receiving the response body; or 3xx codes with
|
|
|
|
// max redirects exceeded), in which case status MUST be set to Error.
|
|
|
|
code := statusWriter.status
|
|
|
|
if code >= 100 && code < 500 {
|
|
|
|
span.SetStatus(codes.Error, stage)
|
|
|
|
}
|
|
|
|
|
|
|
|
attrSet := labeler.AttributeSet()
|
|
|
|
attrs := attrSet.ToSlice()
|
|
|
|
if code != 0 {
|
|
|
|
attrs = append(attrs, semconv.HTTPResponseStatusCode(code))
|
|
|
|
}
|
|
|
|
|
|
|
|
s.errors.Add(ctx, 1, metric.WithAttributes(attrs...))
|
|
|
|
}
|
|
|
|
err error
|
|
|
|
opErrContext = ogenerrors.OperationContext{
|
|
|
|
Name: PatchSubmissionCompletedOperation,
|
|
|
|
ID: "patchSubmissionCompleted",
|
|
|
|
}
|
|
|
|
)
|
|
|
|
{
|
|
|
|
type bitset = [1]uint8
|
|
|
|
var satisfied bitset
|
|
|
|
{
|
|
|
|
sctx, ok, err := s.securityCookieAuth(ctx, PatchSubmissionCompletedOperation, r)
|
|
|
|
if err != nil {
|
|
|
|
err = &ogenerrors.SecurityError{
|
|
|
|
OperationContext: opErrContext,
|
|
|
|
Security: "CookieAuth",
|
|
|
|
Err: err,
|
|
|
|
}
|
|
|
|
if encodeErr := encodeErrorResponse(s.h.NewError(ctx, err), w, span); encodeErr != nil {
|
|
|
|
defer recordError("Security:CookieAuth", err)
|
|
|
|
}
|
|
|
|
return
|
|
|
|
}
|
|
|
|
if ok {
|
|
|
|
satisfied[0] |= 1 << 0
|
|
|
|
ctx = sctx
|
|
|
|
}
|
|
|
|
}
|
|
|
|
|
|
|
|
if ok := func() bool {
|
|
|
|
nextRequirement:
|
|
|
|
for _, requirement := range []bitset{
|
|
|
|
{0b00000001},
|
|
|
|
} {
|
|
|
|
for i, mask := range requirement {
|
|
|
|
if satisfied[i]&mask != mask {
|
|
|
|
continue nextRequirement
|
|
|
|
}
|
|
|
|
}
|
|
|
|
return true
|
|
|
|
}
|
|
|
|
return false
|
|
|
|
}(); !ok {
|
|
|
|
err = &ogenerrors.SecurityError{
|
|
|
|
OperationContext: opErrContext,
|
|
|
|
Err: ogenerrors.ErrSecurityRequirementIsNotSatisfied,
|
|
|
|
}
|
|
|
|
if encodeErr := encodeErrorResponse(s.h.NewError(ctx, err), w, span); encodeErr != nil {
|
|
|
|
defer recordError("Security", err)
|
|
|
|
}
|
|
|
|
return
|
|
|
|
}
|
|
|
|
}
|
|
|
|
params, err := decodePatchSubmissionCompletedParams(args, argsEscaped, r)
|
|
|
|
if err != nil {
|
|
|
|
err = &ogenerrors.DecodeParamsError{
|
|
|
|
OperationContext: opErrContext,
|
|
|
|
Err: err,
|
|
|
|
}
|
|
|
|
defer recordError("DecodeParams", err)
|
|
|
|
s.cfg.ErrorHandler(ctx, w, r, err)
|
|
|
|
return
|
|
|
|
}
|
|
|
|
|
|
|
|
var response *PatchSubmissionCompletedOK
|
|
|
|
if m := s.cfg.Middleware; m != nil {
|
|
|
|
mreq := middleware.Request{
|
|
|
|
Context: ctx,
|
|
|
|
OperationName: PatchSubmissionCompletedOperation,
|
|
|
|
OperationSummary: "Retrieve map with ID",
|
|
|
|
OperationID: "patchSubmissionCompleted",
|
|
|
|
Body: nil,
|
|
|
|
Params: middleware.Parameters{
|
|
|
|
{
|
|
|
|
Name: "SubmissionID",
|
|
|
|
In: "path",
|
|
|
|
}: params.SubmissionID,
|
|
|
|
},
|
|
|
|
Raw: r,
|
|
|
|
}
|
|
|
|
|
|
|
|
type (
|
|
|
|
Request = struct{}
|
|
|
|
Params = PatchSubmissionCompletedParams
|
|
|
|
Response = *PatchSubmissionCompletedOK
|
|
|
|
)
|
|
|
|
response, err = middleware.HookMiddleware[
|
|
|
|
Request,
|
|
|
|
Params,
|
|
|
|
Response,
|
|
|
|
](
|
|
|
|
m,
|
|
|
|
mreq,
|
|
|
|
unpackPatchSubmissionCompletedParams,
|
|
|
|
func(ctx context.Context, request Request, params Params) (response Response, err error) {
|
|
|
|
err = s.h.PatchSubmissionCompleted(ctx, params)
|
|
|
|
return response, err
|
|
|
|
},
|
|
|
|
)
|
|
|
|
} else {
|
|
|
|
err = s.h.PatchSubmissionCompleted(ctx, params)
|
|
|
|
}
|
|
|
|
if err != nil {
|
|
|
|
if errRes, ok := errors.Into[*ErrorStatusCode](err); ok {
|
|
|
|
if err := encodeErrorResponse(errRes, w, span); err != nil {
|
|
|
|
defer recordError("Internal", err)
|
|
|
|
}
|
|
|
|
return
|
|
|
|
}
|
|
|
|
if errors.Is(err, ht.ErrNotImplemented) {
|
|
|
|
s.cfg.ErrorHandler(ctx, w, r, err)
|
|
|
|
return
|
|
|
|
}
|
|
|
|
if err := encodeErrorResponse(s.h.NewError(ctx, err), w, span); err != nil {
|
|
|
|
defer recordError("Internal", err)
|
|
|
|
}
|
|
|
|
return
|
|
|
|
}
|
|
|
|
|
|
|
|
if err := encodePatchSubmissionCompletedResponse(response, w, span); err != nil {
|
|
|
|
defer recordError("EncodeResponse", err)
|
|
|
|
if !errors.Is(err, ht.ErrInternalServerErrorResponse) {
|
|
|
|
s.cfg.ErrorHandler(ctx, w, r, err)
|
|
|
|
}
|
|
|
|
return
|
|
|
|
}
|
|
|
|
}
|
|
|
|
|
|
|
|
// handlePatchSubmissionModelRequest handles patchSubmissionModel operation.
|
|
|
|
//
|
|
|
|
// Update model following role restrictions.
|
|
|
|
//
|
|
|
|
// PATCH /submissions/{SubmissionID}/model
|
|
|
|
func (s *Server) handlePatchSubmissionModelRequest(args [1]string, argsEscaped bool, w http.ResponseWriter, r *http.Request) {
|
|
|
|
statusWriter := &codeRecorder{ResponseWriter: w}
|
|
|
|
w = statusWriter
|
|
|
|
otelAttrs := []attribute.KeyValue{
|
|
|
|
otelogen.OperationID("patchSubmissionModel"),
|
|
|
|
semconv.HTTPRequestMethodKey.String("PATCH"),
|
|
|
|
semconv.HTTPRouteKey.String("/submissions/{SubmissionID}/model"),
|
|
|
|
}
|
|
|
|
|
|
|
|
// Start a span for this request.
|
|
|
|
ctx, span := s.cfg.Tracer.Start(r.Context(), PatchSubmissionModelOperation,
|
|
|
|
trace.WithAttributes(otelAttrs...),
|
|
|
|
serverSpanKind,
|
|
|
|
)
|
|
|
|
defer span.End()
|
|
|
|
|
|
|
|
// Add Labeler to context.
|
|
|
|
labeler := &Labeler{attrs: otelAttrs}
|
|
|
|
ctx = contextWithLabeler(ctx, labeler)
|
|
|
|
|
|
|
|
// Run stopwatch.
|
|
|
|
startTime := time.Now()
|
|
|
|
defer func() {
|
|
|
|
elapsedDuration := time.Since(startTime)
|
|
|
|
|
|
|
|
attrSet := labeler.AttributeSet()
|
|
|
|
attrs := attrSet.ToSlice()
|
|
|
|
code := statusWriter.status
|
|
|
|
if code != 0 {
|
|
|
|
codeAttr := semconv.HTTPResponseStatusCode(code)
|
|
|
|
attrs = append(attrs, codeAttr)
|
|
|
|
span.SetAttributes(codeAttr)
|
|
|
|
}
|
|
|
|
attrOpt := metric.WithAttributes(attrs...)
|
|
|
|
|
|
|
|
// Increment request counter.
|
|
|
|
s.requests.Add(ctx, 1, attrOpt)
|
|
|
|
|
|
|
|
// Use floating point division here for higher precision (instead of Millisecond method).
|
|
|
|
s.duration.Record(ctx, float64(elapsedDuration)/float64(time.Millisecond), attrOpt)
|
|
|
|
}()
|
|
|
|
|
|
|
|
var (
|
|
|
|
recordError = func(stage string, err error) {
|
|
|
|
span.RecordError(err)
|
|
|
|
|
|
|
|
// https://opentelemetry.io/docs/specs/semconv/http/http-spans/#status
|
|
|
|
// Span Status MUST be left unset if HTTP status code was in the 1xx, 2xx or 3xx ranges,
|
|
|
|
// unless there was another error (e.g., network error receiving the response body; or 3xx codes with
|
|
|
|
// max redirects exceeded), in which case status MUST be set to Error.
|
|
|
|
code := statusWriter.status
|
|
|
|
if code >= 100 && code < 500 {
|
|
|
|
span.SetStatus(codes.Error, stage)
|
|
|
|
}
|
|
|
|
|
|
|
|
attrSet := labeler.AttributeSet()
|
|
|
|
attrs := attrSet.ToSlice()
|
|
|
|
if code != 0 {
|
|
|
|
attrs = append(attrs, semconv.HTTPResponseStatusCode(code))
|
|
|
|
}
|
|
|
|
|
|
|
|
s.errors.Add(ctx, 1, metric.WithAttributes(attrs...))
|
|
|
|
}
|
|
|
|
err error
|
|
|
|
opErrContext = ogenerrors.OperationContext{
|
|
|
|
Name: PatchSubmissionModelOperation,
|
|
|
|
ID: "patchSubmissionModel",
|
|
|
|
}
|
|
|
|
)
|
|
|
|
{
|
|
|
|
type bitset = [1]uint8
|
|
|
|
var satisfied bitset
|
|
|
|
{
|
|
|
|
sctx, ok, err := s.securityCookieAuth(ctx, PatchSubmissionModelOperation, r)
|
|
|
|
if err != nil {
|
|
|
|
err = &ogenerrors.SecurityError{
|
|
|
|
OperationContext: opErrContext,
|
|
|
|
Security: "CookieAuth",
|
|
|
|
Err: err,
|
|
|
|
}
|
|
|
|
if encodeErr := encodeErrorResponse(s.h.NewError(ctx, err), w, span); encodeErr != nil {
|
|
|
|
defer recordError("Security:CookieAuth", err)
|
|
|
|
}
|
|
|
|
return
|
|
|
|
}
|
|
|
|
if ok {
|
|
|
|
satisfied[0] |= 1 << 0
|
|
|
|
ctx = sctx
|
|
|
|
}
|
|
|
|
}
|
|
|
|
|
|
|
|
if ok := func() bool {
|
|
|
|
nextRequirement:
|
|
|
|
for _, requirement := range []bitset{
|
|
|
|
{0b00000001},
|
|
|
|
} {
|
|
|
|
for i, mask := range requirement {
|
|
|
|
if satisfied[i]&mask != mask {
|
|
|
|
continue nextRequirement
|
|
|
|
}
|
|
|
|
}
|
|
|
|
return true
|
|
|
|
}
|
|
|
|
return false
|
|
|
|
}(); !ok {
|
|
|
|
err = &ogenerrors.SecurityError{
|
|
|
|
OperationContext: opErrContext,
|
|
|
|
Err: ogenerrors.ErrSecurityRequirementIsNotSatisfied,
|
|
|
|
}
|
|
|
|
if encodeErr := encodeErrorResponse(s.h.NewError(ctx, err), w, span); encodeErr != nil {
|
|
|
|
defer recordError("Security", err)
|
|
|
|
}
|
|
|
|
return
|
|
|
|
}
|
|
|
|
}
|
|
|
|
params, err := decodePatchSubmissionModelParams(args, argsEscaped, r)
|
|
|
|
if err != nil {
|
|
|
|
err = &ogenerrors.DecodeParamsError{
|
|
|
|
OperationContext: opErrContext,
|
|
|
|
Err: err,
|
|
|
|
}
|
|
|
|
defer recordError("DecodeParams", err)
|
|
|
|
s.cfg.ErrorHandler(ctx, w, r, err)
|
|
|
|
return
|
|
|
|
}
|
|
|
|
|
|
|
|
var response *PatchSubmissionModelOK
|
|
|
|
if m := s.cfg.Middleware; m != nil {
|
|
|
|
mreq := middleware.Request{
|
|
|
|
Context: ctx,
|
|
|
|
OperationName: PatchSubmissionModelOperation,
|
|
|
|
OperationSummary: "Update model following role restrictions",
|
|
|
|
OperationID: "patchSubmissionModel",
|
|
|
|
Body: nil,
|
|
|
|
Params: middleware.Parameters{
|
|
|
|
{
|
|
|
|
Name: "SubmissionID",
|
|
|
|
In: "path",
|
|
|
|
}: params.SubmissionID,
|
|
|
|
{
|
|
|
|
Name: "ModelID",
|
|
|
|
In: "query",
|
|
|
|
}: params.ModelID,
|
|
|
|
{
|
|
|
|
Name: "VersionID",
|
|
|
|
In: "query",
|
|
|
|
}: params.VersionID,
|
|
|
|
},
|
|
|
|
Raw: r,
|
|
|
|
}
|
|
|
|
|
|
|
|
type (
|
|
|
|
Request = struct{}
|
|
|
|
Params = PatchSubmissionModelParams
|
|
|
|
Response = *PatchSubmissionModelOK
|
|
|
|
)
|
|
|
|
response, err = middleware.HookMiddleware[
|
|
|
|
Request,
|
|
|
|
Params,
|
|
|
|
Response,
|
|
|
|
](
|
|
|
|
m,
|
|
|
|
mreq,
|
|
|
|
unpackPatchSubmissionModelParams,
|
|
|
|
func(ctx context.Context, request Request, params Params) (response Response, err error) {
|
|
|
|
err = s.h.PatchSubmissionModel(ctx, params)
|
|
|
|
return response, err
|
|
|
|
},
|
|
|
|
)
|
|
|
|
} else {
|
|
|
|
err = s.h.PatchSubmissionModel(ctx, params)
|
|
|
|
}
|
|
|
|
if err != nil {
|
|
|
|
if errRes, ok := errors.Into[*ErrorStatusCode](err); ok {
|
|
|
|
if err := encodeErrorResponse(errRes, w, span); err != nil {
|
|
|
|
defer recordError("Internal", err)
|
|
|
|
}
|
|
|
|
return
|
|
|
|
}
|
|
|
|
if errors.Is(err, ht.ErrNotImplemented) {
|
|
|
|
s.cfg.ErrorHandler(ctx, w, r, err)
|
|
|
|
return
|
|
|
|
}
|
|
|
|
if err := encodeErrorResponse(s.h.NewError(ctx, err), w, span); err != nil {
|
|
|
|
defer recordError("Internal", err)
|
|
|
|
}
|
|
|
|
return
|
|
|
|
}
|
|
|
|
|
|
|
|
if err := encodePatchSubmissionModelResponse(response, w, span); err != nil {
|
|
|
|
defer recordError("EncodeResponse", err)
|
|
|
|
if !errors.Is(err, ht.ErrInternalServerErrorResponse) {
|
|
|
|
s.cfg.ErrorHandler(ctx, w, r, err)
|
|
|
|
}
|
|
|
|
return
|
|
|
|
}
|
|
|
|
}
|
|
|
|
|
|
|
|
// handleUpdateScriptRequest handles updateScript operation.
|
|
|
|
//
|
|
|
|
// Update the specified script by ID.
|
|
|
|
//
|
|
|
|
// PATCH /scripts/{ScriptID}
|
|
|
|
func (s *Server) handleUpdateScriptRequest(args [1]string, argsEscaped bool, w http.ResponseWriter, r *http.Request) {
|
|
|
|
statusWriter := &codeRecorder{ResponseWriter: w}
|
|
|
|
w = statusWriter
|
|
|
|
otelAttrs := []attribute.KeyValue{
|
|
|
|
otelogen.OperationID("updateScript"),
|
|
|
|
semconv.HTTPRequestMethodKey.String("PATCH"),
|
|
|
|
semconv.HTTPRouteKey.String("/scripts/{ScriptID}"),
|
|
|
|
}
|
|
|
|
|
|
|
|
// Start a span for this request.
|
|
|
|
ctx, span := s.cfg.Tracer.Start(r.Context(), UpdateScriptOperation,
|
|
|
|
trace.WithAttributes(otelAttrs...),
|
|
|
|
serverSpanKind,
|
|
|
|
)
|
|
|
|
defer span.End()
|
|
|
|
|
|
|
|
// Add Labeler to context.
|
|
|
|
labeler := &Labeler{attrs: otelAttrs}
|
|
|
|
ctx = contextWithLabeler(ctx, labeler)
|
|
|
|
|
|
|
|
// Run stopwatch.
|
|
|
|
startTime := time.Now()
|
|
|
|
defer func() {
|
|
|
|
elapsedDuration := time.Since(startTime)
|
|
|
|
|
|
|
|
attrSet := labeler.AttributeSet()
|
|
|
|
attrs := attrSet.ToSlice()
|
|
|
|
code := statusWriter.status
|
|
|
|
if code != 0 {
|
|
|
|
codeAttr := semconv.HTTPResponseStatusCode(code)
|
|
|
|
attrs = append(attrs, codeAttr)
|
|
|
|
span.SetAttributes(codeAttr)
|
|
|
|
}
|
|
|
|
attrOpt := metric.WithAttributes(attrs...)
|
|
|
|
|
|
|
|
// Increment request counter.
|
|
|
|
s.requests.Add(ctx, 1, attrOpt)
|
|
|
|
|
|
|
|
// Use floating point division here for higher precision (instead of Millisecond method).
|
|
|
|
s.duration.Record(ctx, float64(elapsedDuration)/float64(time.Millisecond), attrOpt)
|
|
|
|
}()
|
|
|
|
|
|
|
|
var (
|
|
|
|
recordError = func(stage string, err error) {
|
|
|
|
span.RecordError(err)
|
|
|
|
|
|
|
|
// https://opentelemetry.io/docs/specs/semconv/http/http-spans/#status
|
|
|
|
// Span Status MUST be left unset if HTTP status code was in the 1xx, 2xx or 3xx ranges,
|
|
|
|
// unless there was another error (e.g., network error receiving the response body; or 3xx codes with
|
|
|
|
// max redirects exceeded), in which case status MUST be set to Error.
|
|
|
|
code := statusWriter.status
|
|
|
|
if code >= 100 && code < 500 {
|
|
|
|
span.SetStatus(codes.Error, stage)
|
|
|
|
}
|
|
|
|
|
|
|
|
attrSet := labeler.AttributeSet()
|
|
|
|
attrs := attrSet.ToSlice()
|
|
|
|
if code != 0 {
|
|
|
|
attrs = append(attrs, semconv.HTTPResponseStatusCode(code))
|
|
|
|
}
|
|
|
|
|
|
|
|
s.errors.Add(ctx, 1, metric.WithAttributes(attrs...))
|
|
|
|
}
|
|
|
|
err error
|
|
|
|
opErrContext = ogenerrors.OperationContext{
|
|
|
|
Name: UpdateScriptOperation,
|
|
|
|
ID: "updateScript",
|
|
|
|
}
|
|
|
|
)
|
|
|
|
{
|
|
|
|
type bitset = [1]uint8
|
|
|
|
var satisfied bitset
|
|
|
|
{
|
|
|
|
sctx, ok, err := s.securityCookieAuth(ctx, UpdateScriptOperation, r)
|
|
|
|
if err != nil {
|
|
|
|
err = &ogenerrors.SecurityError{
|
|
|
|
OperationContext: opErrContext,
|
|
|
|
Security: "CookieAuth",
|
|
|
|
Err: err,
|
|
|
|
}
|
|
|
|
if encodeErr := encodeErrorResponse(s.h.NewError(ctx, err), w, span); encodeErr != nil {
|
|
|
|
defer recordError("Security:CookieAuth", err)
|
|
|
|
}
|
|
|
|
return
|
|
|
|
}
|
|
|
|
if ok {
|
|
|
|
satisfied[0] |= 1 << 0
|
|
|
|
ctx = sctx
|
|
|
|
}
|
|
|
|
}
|
|
|
|
|
|
|
|
if ok := func() bool {
|
|
|
|
nextRequirement:
|
|
|
|
for _, requirement := range []bitset{
|
|
|
|
{0b00000001},
|
|
|
|
} {
|
|
|
|
for i, mask := range requirement {
|
|
|
|
if satisfied[i]&mask != mask {
|
|
|
|
continue nextRequirement
|
|
|
|
}
|
|
|
|
}
|
|
|
|
return true
|
|
|
|
}
|
|
|
|
return false
|
|
|
|
}(); !ok {
|
|
|
|
err = &ogenerrors.SecurityError{
|
|
|
|
OperationContext: opErrContext,
|
|
|
|
Err: ogenerrors.ErrSecurityRequirementIsNotSatisfied,
|
|
|
|
}
|
|
|
|
if encodeErr := encodeErrorResponse(s.h.NewError(ctx, err), w, span); encodeErr != nil {
|
|
|
|
defer recordError("Security", err)
|
|
|
|
}
|
|
|
|
return
|
|
|
|
}
|
|
|
|
}
|
|
|
|
params, err := decodeUpdateScriptParams(args, argsEscaped, r)
|
|
|
|
if err != nil {
|
|
|
|
err = &ogenerrors.DecodeParamsError{
|
|
|
|
OperationContext: opErrContext,
|
|
|
|
Err: err,
|
|
|
|
}
|
|
|
|
defer recordError("DecodeParams", err)
|
|
|
|
s.cfg.ErrorHandler(ctx, w, r, err)
|
|
|
|
return
|
|
|
|
}
|
|
|
|
request, close, err := s.decodeUpdateScriptRequest(r)
|
|
|
|
if err != nil {
|
|
|
|
err = &ogenerrors.DecodeRequestError{
|
|
|
|
OperationContext: opErrContext,
|
|
|
|
Err: err,
|
|
|
|
}
|
|
|
|
defer recordError("DecodeRequest", err)
|
|
|
|
s.cfg.ErrorHandler(ctx, w, r, err)
|
|
|
|
return
|
|
|
|
}
|
|
|
|
defer func() {
|
|
|
|
if err := close(); err != nil {
|
|
|
|
recordError("CloseRequest", err)
|
|
|
|
}
|
|
|
|
}()
|
|
|
|
|
|
|
|
var response *UpdateScriptOK
|
|
|
|
if m := s.cfg.Middleware; m != nil {
|
|
|
|
mreq := middleware.Request{
|
|
|
|
Context: ctx,
|
|
|
|
OperationName: UpdateScriptOperation,
|
|
|
|
OperationSummary: "Update the specified script by ID",
|
|
|
|
OperationID: "updateScript",
|
|
|
|
Body: request,
|
|
|
|
Params: middleware.Parameters{
|
|
|
|
{
|
|
|
|
Name: "ScriptID",
|
|
|
|
In: "path",
|
|
|
|
}: params.ScriptID,
|
|
|
|
},
|
|
|
|
Raw: r,
|
|
|
|
}
|
|
|
|
|
|
|
|
type (
|
|
|
|
Request = OptScriptUpdate
|
|
|
|
Params = UpdateScriptParams
|
|
|
|
Response = *UpdateScriptOK
|
|
|
|
)
|
|
|
|
response, err = middleware.HookMiddleware[
|
|
|
|
Request,
|
|
|
|
Params,
|
|
|
|
Response,
|
|
|
|
](
|
|
|
|
m,
|
|
|
|
mreq,
|
|
|
|
unpackUpdateScriptParams,
|
|
|
|
func(ctx context.Context, request Request, params Params) (response Response, err error) {
|
|
|
|
err = s.h.UpdateScript(ctx, request, params)
|
|
|
|
return response, err
|
|
|
|
},
|
|
|
|
)
|
|
|
|
} else {
|
|
|
|
err = s.h.UpdateScript(ctx, request, params)
|
|
|
|
}
|
|
|
|
if err != nil {
|
|
|
|
if errRes, ok := errors.Into[*ErrorStatusCode](err); ok {
|
|
|
|
if err := encodeErrorResponse(errRes, w, span); err != nil {
|
|
|
|
defer recordError("Internal", err)
|
|
|
|
}
|
|
|
|
return
|
|
|
|
}
|
|
|
|
if errors.Is(err, ht.ErrNotImplemented) {
|
|
|
|
s.cfg.ErrorHandler(ctx, w, r, err)
|
|
|
|
return
|
|
|
|
}
|
|
|
|
if err := encodeErrorResponse(s.h.NewError(ctx, err), w, span); err != nil {
|
|
|
|
defer recordError("Internal", err)
|
|
|
|
}
|
|
|
|
return
|
|
|
|
}
|
|
|
|
|
|
|
|
if err := encodeUpdateScriptResponse(response, w, span); err != nil {
|
|
|
|
defer recordError("EncodeResponse", err)
|
|
|
|
if !errors.Is(err, ht.ErrInternalServerErrorResponse) {
|
|
|
|
s.cfg.ErrorHandler(ctx, w, r, err)
|
|
|
|
}
|
|
|
|
return
|
|
|
|
}
|
|
|
|
}
|
|
|
|
|
|
|
|
// handleUpdateScriptPolicyRequest handles updateScriptPolicy operation.
|
|
|
|
//
|
|
|
|
// Update the specified script policy by ID.
|
|
|
|
//
|
|
|
|
// PATCH /script-policy/id/{ScriptPolicyID}
|
|
|
|
func (s *Server) handleUpdateScriptPolicyRequest(args [1]string, argsEscaped bool, w http.ResponseWriter, r *http.Request) {
|
|
|
|
statusWriter := &codeRecorder{ResponseWriter: w}
|
|
|
|
w = statusWriter
|
|
|
|
otelAttrs := []attribute.KeyValue{
|
|
|
|
otelogen.OperationID("updateScriptPolicy"),
|
|
|
|
semconv.HTTPRequestMethodKey.String("PATCH"),
|
|
|
|
semconv.HTTPRouteKey.String("/script-policy/id/{ScriptPolicyID}"),
|
|
|
|
}
|
|
|
|
|
|
|
|
// Start a span for this request.
|
|
|
|
ctx, span := s.cfg.Tracer.Start(r.Context(), UpdateScriptPolicyOperation,
|
|
|
|
trace.WithAttributes(otelAttrs...),
|
|
|
|
serverSpanKind,
|
|
|
|
)
|
|
|
|
defer span.End()
|
|
|
|
|
|
|
|
// Add Labeler to context.
|
|
|
|
labeler := &Labeler{attrs: otelAttrs}
|
|
|
|
ctx = contextWithLabeler(ctx, labeler)
|
|
|
|
|
|
|
|
// Run stopwatch.
|
|
|
|
startTime := time.Now()
|
|
|
|
defer func() {
|
|
|
|
elapsedDuration := time.Since(startTime)
|
|
|
|
|
|
|
|
attrSet := labeler.AttributeSet()
|
|
|
|
attrs := attrSet.ToSlice()
|
|
|
|
code := statusWriter.status
|
|
|
|
if code != 0 {
|
|
|
|
codeAttr := semconv.HTTPResponseStatusCode(code)
|
|
|
|
attrs = append(attrs, codeAttr)
|
|
|
|
span.SetAttributes(codeAttr)
|
|
|
|
}
|
|
|
|
attrOpt := metric.WithAttributes(attrs...)
|
|
|
|
|
|
|
|
// Increment request counter.
|
|
|
|
s.requests.Add(ctx, 1, attrOpt)
|
|
|
|
|
|
|
|
// Use floating point division here for higher precision (instead of Millisecond method).
|
|
|
|
s.duration.Record(ctx, float64(elapsedDuration)/float64(time.Millisecond), attrOpt)
|
|
|
|
}()
|
|
|
|
|
|
|
|
var (
|
|
|
|
recordError = func(stage string, err error) {
|
|
|
|
span.RecordError(err)
|
|
|
|
|
|
|
|
// https://opentelemetry.io/docs/specs/semconv/http/http-spans/#status
|
|
|
|
// Span Status MUST be left unset if HTTP status code was in the 1xx, 2xx or 3xx ranges,
|
|
|
|
// unless there was another error (e.g., network error receiving the response body; or 3xx codes with
|
|
|
|
// max redirects exceeded), in which case status MUST be set to Error.
|
|
|
|
code := statusWriter.status
|
|
|
|
if code >= 100 && code < 500 {
|
|
|
|
span.SetStatus(codes.Error, stage)
|
|
|
|
}
|
|
|
|
|
|
|
|
attrSet := labeler.AttributeSet()
|
|
|
|
attrs := attrSet.ToSlice()
|
|
|
|
if code != 0 {
|
|
|
|
attrs = append(attrs, semconv.HTTPResponseStatusCode(code))
|
|
|
|
}
|
|
|
|
|
|
|
|
s.errors.Add(ctx, 1, metric.WithAttributes(attrs...))
|
|
|
|
}
|
|
|
|
err error
|
|
|
|
opErrContext = ogenerrors.OperationContext{
|
|
|
|
Name: UpdateScriptPolicyOperation,
|
|
|
|
ID: "updateScriptPolicy",
|
|
|
|
}
|
|
|
|
)
|
|
|
|
{
|
|
|
|
type bitset = [1]uint8
|
|
|
|
var satisfied bitset
|
|
|
|
{
|
|
|
|
sctx, ok, err := s.securityCookieAuth(ctx, UpdateScriptPolicyOperation, r)
|
|
|
|
if err != nil {
|
|
|
|
err = &ogenerrors.SecurityError{
|
|
|
|
OperationContext: opErrContext,
|
|
|
|
Security: "CookieAuth",
|
|
|
|
Err: err,
|
|
|
|
}
|
|
|
|
if encodeErr := encodeErrorResponse(s.h.NewError(ctx, err), w, span); encodeErr != nil {
|
|
|
|
defer recordError("Security:CookieAuth", err)
|
|
|
|
}
|
|
|
|
return
|
|
|
|
}
|
|
|
|
if ok {
|
|
|
|
satisfied[0] |= 1 << 0
|
|
|
|
ctx = sctx
|
|
|
|
}
|
|
|
|
}
|
|
|
|
|
|
|
|
if ok := func() bool {
|
|
|
|
nextRequirement:
|
|
|
|
for _, requirement := range []bitset{
|
|
|
|
{0b00000001},
|
|
|
|
} {
|
|
|
|
for i, mask := range requirement {
|
|
|
|
if satisfied[i]&mask != mask {
|
|
|
|
continue nextRequirement
|
|
|
|
}
|
|
|
|
}
|
|
|
|
return true
|
|
|
|
}
|
|
|
|
return false
|
|
|
|
}(); !ok {
|
|
|
|
err = &ogenerrors.SecurityError{
|
|
|
|
OperationContext: opErrContext,
|
|
|
|
Err: ogenerrors.ErrSecurityRequirementIsNotSatisfied,
|
|
|
|
}
|
|
|
|
if encodeErr := encodeErrorResponse(s.h.NewError(ctx, err), w, span); encodeErr != nil {
|
|
|
|
defer recordError("Security", err)
|
|
|
|
}
|
|
|
|
return
|
|
|
|
}
|
|
|
|
}
|
|
|
|
params, err := decodeUpdateScriptPolicyParams(args, argsEscaped, r)
|
|
|
|
if err != nil {
|
|
|
|
err = &ogenerrors.DecodeParamsError{
|
|
|
|
OperationContext: opErrContext,
|
|
|
|
Err: err,
|
|
|
|
}
|
|
|
|
defer recordError("DecodeParams", err)
|
|
|
|
s.cfg.ErrorHandler(ctx, w, r, err)
|
|
|
|
return
|
|
|
|
}
|
|
|
|
request, close, err := s.decodeUpdateScriptPolicyRequest(r)
|
|
|
|
if err != nil {
|
|
|
|
err = &ogenerrors.DecodeRequestError{
|
|
|
|
OperationContext: opErrContext,
|
|
|
|
Err: err,
|
|
|
|
}
|
|
|
|
defer recordError("DecodeRequest", err)
|
|
|
|
s.cfg.ErrorHandler(ctx, w, r, err)
|
|
|
|
return
|
|
|
|
}
|
|
|
|
defer func() {
|
|
|
|
if err := close(); err != nil {
|
|
|
|
recordError("CloseRequest", err)
|
|
|
|
}
|
|
|
|
}()
|
|
|
|
|
|
|
|
var response *UpdateScriptPolicyOK
|
|
|
|
if m := s.cfg.Middleware; m != nil {
|
|
|
|
mreq := middleware.Request{
|
|
|
|
Context: ctx,
|
|
|
|
OperationName: UpdateScriptPolicyOperation,
|
|
|
|
OperationSummary: "Update the specified script policy by ID",
|
|
|
|
OperationID: "updateScriptPolicy",
|
|
|
|
Body: request,
|
|
|
|
Params: middleware.Parameters{
|
|
|
|
{
|
|
|
|
Name: "ScriptPolicyID",
|
|
|
|
In: "path",
|
|
|
|
}: params.ScriptPolicyID,
|
|
|
|
},
|
|
|
|
Raw: r,
|
|
|
|
}
|
|
|
|
|
|
|
|
type (
|
|
|
|
Request = OptScriptPolicyUpdate
|
|
|
|
Params = UpdateScriptPolicyParams
|
|
|
|
Response = *UpdateScriptPolicyOK
|
|
|
|
)
|
|
|
|
response, err = middleware.HookMiddleware[
|
|
|
|
Request,
|
|
|
|
Params,
|
|
|
|
Response,
|
|
|
|
](
|
|
|
|
m,
|
|
|
|
mreq,
|
|
|
|
unpackUpdateScriptPolicyParams,
|
|
|
|
func(ctx context.Context, request Request, params Params) (response Response, err error) {
|
|
|
|
err = s.h.UpdateScriptPolicy(ctx, request, params)
|
|
|
|
return response, err
|
|
|
|
},
|
|
|
|
)
|
|
|
|
} else {
|
|
|
|
err = s.h.UpdateScriptPolicy(ctx, request, params)
|
|
|
|
}
|
|
|
|
if err != nil {
|
|
|
|
if errRes, ok := errors.Into[*ErrorStatusCode](err); ok {
|
|
|
|
if err := encodeErrorResponse(errRes, w, span); err != nil {
|
|
|
|
defer recordError("Internal", err)
|
|
|
|
}
|
|
|
|
return
|
|
|
|
}
|
|
|
|
if errors.Is(err, ht.ErrNotImplemented) {
|
|
|
|
s.cfg.ErrorHandler(ctx, w, r, err)
|
|
|
|
return
|
|
|
|
}
|
|
|
|
if err := encodeErrorResponse(s.h.NewError(ctx, err), w, span); err != nil {
|
|
|
|
defer recordError("Internal", err)
|
|
|
|
}
|
|
|
|
return
|
|
|
|
}
|
|
|
|
|
|
|
|
if err := encodeUpdateScriptPolicyResponse(response, w, span); err != nil {
|
2024-11-26 01:22:45 +00:00
|
|
|
defer recordError("EncodeResponse", err)
|
|
|
|
if !errors.Is(err, ht.ErrInternalServerErrorResponse) {
|
|
|
|
s.cfg.ErrorHandler(ctx, w, r, err)
|
|
|
|
}
|
|
|
|
return
|
|
|
|
}
|
|
|
|
}
|