437a97510a
* apiclient: correctly handle 0-byte response * lint
219 lines
5.3 KiB
Go
219 lines
5.3 KiB
Go
package apiclient
|
|
|
|
import (
|
|
"context"
|
|
"crypto/tls"
|
|
"crypto/x509"
|
|
"encoding/json"
|
|
"fmt"
|
|
"io"
|
|
"net/http"
|
|
"net/url"
|
|
|
|
"github.com/golang-jwt/jwt/v4"
|
|
|
|
"github.com/crowdsecurity/crowdsec/pkg/models"
|
|
)
|
|
|
|
var (
|
|
InsecureSkipVerify = false
|
|
Cert *tls.Certificate
|
|
CaCertPool *x509.CertPool
|
|
)
|
|
|
|
type ApiClient struct {
|
|
/*The http client used to make requests*/
|
|
client *http.Client
|
|
/*Reuse a single struct instead of allocating one for each service on the heap.*/
|
|
common service
|
|
/*config stuff*/
|
|
BaseURL *url.URL
|
|
PapiURL *url.URL
|
|
URLPrefix string
|
|
UserAgent string
|
|
/*exposed Services*/
|
|
Decisions *DecisionsService
|
|
DecisionDelete *DecisionDeleteService
|
|
Alerts *AlertsService
|
|
Auth *AuthService
|
|
Metrics *MetricsService
|
|
Signal *SignalService
|
|
HeartBeat *HeartBeatService
|
|
}
|
|
|
|
func (a *ApiClient) GetClient() *http.Client {
|
|
return a.client
|
|
}
|
|
|
|
func (a *ApiClient) IsEnrolled() bool {
|
|
jwtTransport := a.client.Transport.(*JWTTransport)
|
|
tokenStr := jwtTransport.Token
|
|
|
|
token, _ := jwt.Parse(tokenStr, nil)
|
|
if token == nil {
|
|
return false
|
|
}
|
|
|
|
claims := token.Claims.(jwt.MapClaims)
|
|
_, ok := claims["organization_id"]
|
|
|
|
return ok
|
|
}
|
|
|
|
type service struct {
|
|
client *ApiClient
|
|
}
|
|
|
|
func NewClient(config *Config) (*ApiClient, error) {
|
|
t := &JWTTransport{
|
|
MachineID: &config.MachineID,
|
|
Password: &config.Password,
|
|
Scenarios: config.Scenarios,
|
|
URL: config.URL,
|
|
UserAgent: config.UserAgent,
|
|
VersionPrefix: config.VersionPrefix,
|
|
UpdateScenario: config.UpdateScenario,
|
|
}
|
|
|
|
tlsconfig := tls.Config{InsecureSkipVerify: InsecureSkipVerify}
|
|
tlsconfig.RootCAs = CaCertPool
|
|
|
|
if Cert != nil {
|
|
tlsconfig.Certificates = []tls.Certificate{*Cert}
|
|
}
|
|
|
|
if ht, ok := http.DefaultTransport.(*http.Transport); ok {
|
|
ht.TLSClientConfig = &tlsconfig
|
|
}
|
|
|
|
c := &ApiClient{client: t.Client(), BaseURL: config.URL, UserAgent: config.UserAgent, URLPrefix: config.VersionPrefix, PapiURL: config.PapiURL}
|
|
c.common.client = c
|
|
c.Decisions = (*DecisionsService)(&c.common)
|
|
c.Alerts = (*AlertsService)(&c.common)
|
|
c.Auth = (*AuthService)(&c.common)
|
|
c.Metrics = (*MetricsService)(&c.common)
|
|
c.Signal = (*SignalService)(&c.common)
|
|
c.DecisionDelete = (*DecisionDeleteService)(&c.common)
|
|
c.HeartBeat = (*HeartBeatService)(&c.common)
|
|
|
|
return c, nil
|
|
}
|
|
|
|
func NewDefaultClient(URL *url.URL, prefix string, userAgent string, client *http.Client) (*ApiClient, error) {
|
|
if client == nil {
|
|
client = &http.Client{}
|
|
|
|
if ht, ok := http.DefaultTransport.(*http.Transport); ok {
|
|
tlsconfig := tls.Config{InsecureSkipVerify: InsecureSkipVerify}
|
|
tlsconfig.RootCAs = CaCertPool
|
|
|
|
if Cert != nil {
|
|
tlsconfig.Certificates = []tls.Certificate{*Cert}
|
|
}
|
|
|
|
ht.TLSClientConfig = &tlsconfig
|
|
client.Transport = ht
|
|
}
|
|
}
|
|
|
|
c := &ApiClient{client: client, BaseURL: URL, UserAgent: userAgent, URLPrefix: prefix}
|
|
c.common.client = c
|
|
c.Decisions = (*DecisionsService)(&c.common)
|
|
c.Alerts = (*AlertsService)(&c.common)
|
|
c.Auth = (*AuthService)(&c.common)
|
|
c.Metrics = (*MetricsService)(&c.common)
|
|
c.Signal = (*SignalService)(&c.common)
|
|
c.DecisionDelete = (*DecisionDeleteService)(&c.common)
|
|
c.HeartBeat = (*HeartBeatService)(&c.common)
|
|
|
|
return c, nil
|
|
}
|
|
|
|
func RegisterClient(config *Config, client *http.Client) (*ApiClient, error) {
|
|
if client == nil {
|
|
client = &http.Client{}
|
|
}
|
|
|
|
tlsconfig := tls.Config{InsecureSkipVerify: InsecureSkipVerify}
|
|
if Cert != nil {
|
|
tlsconfig.RootCAs = CaCertPool
|
|
tlsconfig.Certificates = []tls.Certificate{*Cert}
|
|
}
|
|
|
|
http.DefaultTransport.(*http.Transport).TLSClientConfig = &tlsconfig
|
|
c := &ApiClient{client: client, BaseURL: config.URL, UserAgent: config.UserAgent, URLPrefix: config.VersionPrefix}
|
|
c.common.client = c
|
|
c.Decisions = (*DecisionsService)(&c.common)
|
|
c.Alerts = (*AlertsService)(&c.common)
|
|
c.Auth = (*AuthService)(&c.common)
|
|
|
|
resp, err := c.Auth.RegisterWatcher(context.Background(), models.WatcherRegistrationRequest{MachineID: &config.MachineID, Password: &config.Password})
|
|
/*if we have http status, return it*/
|
|
if err != nil {
|
|
if resp != nil && resp.Response != nil {
|
|
return nil, fmt.Errorf("api register (%s) http %s: %w", c.BaseURL, resp.Response.Status, err)
|
|
}
|
|
|
|
return nil, fmt.Errorf("api register (%s): %w", c.BaseURL, err)
|
|
}
|
|
|
|
return c, nil
|
|
}
|
|
|
|
type Response struct {
|
|
Response *http.Response
|
|
//add our pagination stuff
|
|
//NextPage int
|
|
//...
|
|
}
|
|
|
|
type ErrorResponse struct {
|
|
models.ErrorResponse
|
|
}
|
|
|
|
func (e *ErrorResponse) Error() string {
|
|
err := fmt.Sprintf("API error: %s", *e.Message)
|
|
if len(e.Errors) > 0 {
|
|
err += fmt.Sprintf(" (%s)", e.Errors)
|
|
}
|
|
|
|
return err
|
|
}
|
|
|
|
func newResponse(r *http.Response) *Response {
|
|
return &Response{Response: r}
|
|
}
|
|
|
|
func CheckResponse(r *http.Response) error {
|
|
if c := r.StatusCode; 200 <= c && c <= 299 || c == 304 {
|
|
return nil
|
|
}
|
|
|
|
errorResponse := &ErrorResponse{}
|
|
|
|
data, err := io.ReadAll(r.Body)
|
|
if err == nil && len(data)>0 {
|
|
err := json.Unmarshal(data, errorResponse)
|
|
if err != nil {
|
|
return fmt.Errorf("http code %d, invalid body: %w", r.StatusCode, err)
|
|
}
|
|
} else {
|
|
errorResponse.Message = new(string)
|
|
*errorResponse.Message = fmt.Sprintf("http code %d, no error message", r.StatusCode)
|
|
}
|
|
|
|
return errorResponse
|
|
}
|
|
|
|
type ListOpts struct {
|
|
//Page int
|
|
//PerPage int
|
|
}
|
|
|
|
type DeleteOpts struct {
|
|
//??
|
|
}
|
|
|
|
type AddOpts struct {
|
|
//??
|
|
}
|