golem-client 0.0.47

Client for Golem Cloud's REST API
Documentation
#[derive(Debug)]
pub enum TokenError {
    RequestFailure(reqwest::Error),
    InvalidHeaderValue(reqwest::header::InvalidHeaderValue),
    UnexpectedStatus(reqwest::StatusCode),
    Status401 {
        message: String,
    },
    Status404 {
        message: String,
    },
    Status400 {
        errors: Vec<String>,
    },
    Status500 {
        error: String,
    },
}

impl From<reqwest::Error> for TokenError {
    fn from(error: reqwest::Error) -> TokenError {
        TokenError::RequestFailure(error)
    }
}

impl From<reqwest::header::InvalidHeaderValue> for TokenError {
    fn from(error: reqwest::header::InvalidHeaderValue) -> TokenError {
        TokenError::InvalidHeaderValue(error)
    }
}

impl TokenError {
    pub fn to_account_endpoint_error(&self) -> Option<crate::model::AccountEndpointError> {
        match self {
            TokenError::Status401 { message } => Some(crate::model::AccountEndpointError::Unauthorized { message: message.clone() }), 
            TokenError::Status404 { message } => Some(crate::model::AccountEndpointError::NotFound { message: message.clone() }), 
            TokenError::Status400 { errors } => Some(crate::model::AccountEndpointError::ArgValidation { errors: errors.clone() }), 
            TokenError::Status500 { error } => Some(crate::model::AccountEndpointError::Internal { error: error.clone() }), 
            _ => None
        }
    }
}

#[derive(Debug, Clone, serde::Serialize, serde::Deserialize)]
struct AccountEndpointErrorUnauthorizedPayload {
    pub message: String,
}

#[derive(Debug, Clone, serde::Serialize, serde::Deserialize)]
struct AccountEndpointErrorNotFoundPayload {
    pub message: String,
}

#[derive(Debug, Clone, serde::Serialize, serde::Deserialize)]
struct AccountEndpointErrorArgValidationPayload {
    pub errors: Vec<String>,
}

#[derive(Debug, Clone, serde::Serialize, serde::Deserialize)]
struct AccountEndpointErrorInternalPayload {
    pub error: String,
}

#[async_trait::async_trait]
pub trait Token {
    async fn get_tokens(&self, account_id: &str, authorization: &str) -> Result<Vec<crate::model::Token>, TokenError>;
    async fn get_token(&self, account_id: &str, token_id: uuid::Uuid, authorization: &str) -> Result<crate::model::Token, TokenError>;
    async fn post_token(&self, account_id: &str, field0: crate::model::CreateTokenDTO, authorization: &str) -> Result<crate::model::UnsafeToken, TokenError>;
    async fn delete_token(&self, account_id: &str, token_id: uuid::Uuid, authorization: &str) -> Result<(), TokenError>;
}

#[derive(Clone, Debug)]
pub struct TokenLive {
    pub base_url: reqwest::Url,
    pub allow_insecure: bool,
}

#[async_trait::async_trait]
impl Token for TokenLive {
    async fn get_tokens(&self, account_id: &str, authorization: &str) -> Result<Vec<crate::model::Token>, TokenError> {
        let mut url = self.base_url.clone();
        url.path_segments_mut().unwrap()
            .push("v1")
            .push("accounts")
            .push(account_id)
            .push("tokens");

        let mut headers = reqwest::header::HeaderMap::new();
        headers.append("authorization", reqwest::header::HeaderValue::from_str(&format!("{authorization}"))?);
        {
            let headers_vec: Vec<(&str, String)> = headers.iter().map(|(k, v)| crate::hide_authorization(k, v)).collect();
            tracing::info!(method="get", url=url.to_string(), headers=?headers_vec, body="<no_body>", "get_tokens");
        }
        let mut builder = reqwest::Client::builder();
        if self.allow_insecure {
            builder = builder.danger_accept_invalid_certs(true);
        }
        let client = builder.build()?;
        let result = client
            .get(url)
            .headers(headers)
            .send()
            .await?;
        match result.status().as_u16() {
            200 => {
                let body = result.json::<Vec<crate::model::Token>>().await?;
                Ok(body)
            }
            401 => {
                let body = result.json::<AccountEndpointErrorUnauthorizedPayload>().await?;
                Err(TokenError::Status401 { message: body.message })
            }
            404 => {
                let body = result.json::<AccountEndpointErrorNotFoundPayload>().await?;
                Err(TokenError::Status404 { message: body.message })
            }
            400 => {
                let body = result.json::<AccountEndpointErrorArgValidationPayload>().await?;
                Err(TokenError::Status400 { errors: body.errors })
            }
            500 => {
                let body = result.json::<AccountEndpointErrorInternalPayload>().await?;
                Err(TokenError::Status500 { error: body.error })
            }
            _ => Err(TokenError::UnexpectedStatus(result.status()))
        }
    }

    async fn get_token(&self, account_id: &str, token_id: uuid::Uuid, authorization: &str) -> Result<crate::model::Token, TokenError> {
        let mut url = self.base_url.clone();
        url.path_segments_mut().unwrap()
            .push("v1")
            .push("accounts")
            .push(account_id)
            .push("tokens")
            .push(&token_id.to_string());

        let mut headers = reqwest::header::HeaderMap::new();
        headers.append("authorization", reqwest::header::HeaderValue::from_str(&format!("{authorization}"))?);
        {
            let headers_vec: Vec<(&str, String)> = headers.iter().map(|(k, v)| crate::hide_authorization(k, v)).collect();
            tracing::info!(method="get", url=url.to_string(), headers=?headers_vec, body="<no_body>", "get_token");
        }
        let mut builder = reqwest::Client::builder();
        if self.allow_insecure {
            builder = builder.danger_accept_invalid_certs(true);
        }
        let client = builder.build()?;
        let result = client
            .get(url)
            .headers(headers)
            .send()
            .await?;
        match result.status().as_u16() {
            200 => {
                let body = result.json::<crate::model::Token>().await?;
                Ok(body)
            }
            401 => {
                let body = result.json::<AccountEndpointErrorUnauthorizedPayload>().await?;
                Err(TokenError::Status401 { message: body.message })
            }
            404 => {
                let body = result.json::<AccountEndpointErrorNotFoundPayload>().await?;
                Err(TokenError::Status404 { message: body.message })
            }
            400 => {
                let body = result.json::<AccountEndpointErrorArgValidationPayload>().await?;
                Err(TokenError::Status400 { errors: body.errors })
            }
            500 => {
                let body = result.json::<AccountEndpointErrorInternalPayload>().await?;
                Err(TokenError::Status500 { error: body.error })
            }
            _ => Err(TokenError::UnexpectedStatus(result.status()))
        }
    }

    async fn post_token(&self, account_id: &str, field0: crate::model::CreateTokenDTO, authorization: &str) -> Result<crate::model::UnsafeToken, TokenError> {
        let mut url = self.base_url.clone();
        url.path_segments_mut().unwrap()
            .push("v1")
            .push("accounts")
            .push(account_id)
            .push("tokens");

        let mut headers = reqwest::header::HeaderMap::new();
        headers.append("authorization", reqwest::header::HeaderValue::from_str(&format!("{authorization}"))?);
        {
            let headers_vec: Vec<(&str, String)> = headers.iter().map(|(k, v)| crate::hide_authorization(k, v)).collect();
            tracing::info!(method="post", url=url.to_string(), headers=?headers_vec, body=serde_json::to_string(&field0).unwrap(), "post_token");
        }
        let mut builder = reqwest::Client::builder();
        if self.allow_insecure {
            builder = builder.danger_accept_invalid_certs(true);
        }
        let client = builder.build()?;
        let result = client
            .post(url)
            .headers(headers)
            .json(&field0)
            .send()
            .await?;
        match result.status().as_u16() {
            200 => {
                let body = result.json::<crate::model::UnsafeToken>().await?;
                Ok(body)
            }
            401 => {
                let body = result.json::<AccountEndpointErrorUnauthorizedPayload>().await?;
                Err(TokenError::Status401 { message: body.message })
            }
            404 => {
                let body = result.json::<AccountEndpointErrorNotFoundPayload>().await?;
                Err(TokenError::Status404 { message: body.message })
            }
            400 => {
                let body = result.json::<AccountEndpointErrorArgValidationPayload>().await?;
                Err(TokenError::Status400 { errors: body.errors })
            }
            500 => {
                let body = result.json::<AccountEndpointErrorInternalPayload>().await?;
                Err(TokenError::Status500 { error: body.error })
            }
            _ => Err(TokenError::UnexpectedStatus(result.status()))
        }
    }

    async fn delete_token(&self, account_id: &str, token_id: uuid::Uuid, authorization: &str) -> Result<(), TokenError> {
        let mut url = self.base_url.clone();
        url.path_segments_mut().unwrap()
            .push("v1")
            .push("accounts")
            .push(account_id)
            .push("tokens")
            .push(&token_id.to_string());

        let mut headers = reqwest::header::HeaderMap::new();
        headers.append("authorization", reqwest::header::HeaderValue::from_str(&format!("{authorization}"))?);
        {
            let headers_vec: Vec<(&str, String)> = headers.iter().map(|(k, v)| crate::hide_authorization(k, v)).collect();
            tracing::info!(method="delete", url=url.to_string(), headers=?headers_vec, body="<no_body>", "delete_token");
        }
        let mut builder = reqwest::Client::builder();
        if self.allow_insecure {
            builder = builder.danger_accept_invalid_certs(true);
        }
        let client = builder.build()?;
        let result = client
            .delete(url)
            .headers(headers)
            .send()
            .await?;
        match result.status().as_u16() {
            200 => {
                let body = ();
                Ok(body)
            }
            401 => {
                let body = result.json::<AccountEndpointErrorUnauthorizedPayload>().await?;
                Err(TokenError::Status401 { message: body.message })
            }
            404 => {
                let body = result.json::<AccountEndpointErrorNotFoundPayload>().await?;
                Err(TokenError::Status404 { message: body.message })
            }
            400 => {
                let body = result.json::<AccountEndpointErrorArgValidationPayload>().await?;
                Err(TokenError::Status400 { errors: body.errors })
            }
            500 => {
                let body = result.json::<AccountEndpointErrorInternalPayload>().await?;
                Err(TokenError::Status500 { error: body.error })
            }
            _ => Err(TokenError::UnexpectedStatus(result.status()))
        }
    }
}