use crate::apis::{
auth_api, configuration, file_operations_api, general_api, transfers_api, Error,
};
use crate::models;
use http::header::{HeaderMap, HeaderValue};
use reqwest::{Client, Request, Response};
use reqwest_middleware::{ClientBuilder, Middleware, Next, Result as MiddlewareResult};
use std::sync::Arc;
use tapis_core::TokenProvider;
tokio::task_local! {
static EXTRA_HEADERS: HeaderMap;
}
pub async fn with_headers<F, T>(headers: HeaderMap, f: F) -> T
where
F: std::future::Future<Output = T>,
{
EXTRA_HEADERS.scope(headers, f).await
}
#[derive(Debug)]
struct LoggingMiddleware;
#[derive(Debug)]
struct HeaderInjectionMiddleware;
#[async_trait::async_trait]
impl Middleware for LoggingMiddleware {
async fn handle(
&self,
req: Request,
extensions: &mut http::Extensions,
next: Next<'_>,
) -> MiddlewareResult<Response> {
let method = req.method().clone();
let url = req.url().clone();
println!("Tapis SDK request: {} {}", method, url);
next.run(req, extensions).await
}
}
#[async_trait::async_trait]
impl Middleware for HeaderInjectionMiddleware {
async fn handle(
&self,
mut req: Request,
extensions: &mut http::Extensions,
next: Next<'_>,
) -> MiddlewareResult<Response> {
let _ = EXTRA_HEADERS.try_with(|headers| {
for (k, v) in headers {
req.headers_mut().insert(k, v.clone());
}
});
next.run(req, extensions).await
}
}
fn validate_tracking_id(tracking_id: &str) -> Result<(), String> {
if !tracking_id.is_ascii() {
return Err("X-Tapis-Tracking-ID must be an entirely ASCII string.".to_string());
}
if tracking_id.len() > 126 {
return Err("X-Tapis-Tracking-ID must be less than 126 characters.".to_string());
}
if tracking_id.matches('.').count() != 1 {
return Err("X-Tapis-Tracking-ID must contain exactly one '.' (format: <namespace>.<unique_identifier>).".to_string());
}
if tracking_id.starts_with('.') || tracking_id.ends_with('.') {
return Err("X-Tapis-Tracking-ID cannot start or end with '.'.".to_string());
}
let (namespace, unique_id) = tracking_id.split_once('.').unwrap();
if !namespace.chars().all(|c| c.is_alphanumeric() || c == '_') {
return Err("X-Tapis-Tracking-ID namespace must contain only alphanumeric characters and underscores.".to_string());
}
if !unique_id.chars().all(|c| c.is_alphanumeric() || c == '-') {
return Err("X-Tapis-Tracking-ID unique identifier must contain only alphanumeric characters and hyphens.".to_string());
}
Ok(())
}
#[derive(Debug)]
struct TrackingIdMiddleware;
#[async_trait::async_trait]
impl Middleware for TrackingIdMiddleware {
async fn handle(
&self,
mut req: Request,
extensions: &mut http::Extensions,
next: Next<'_>,
) -> MiddlewareResult<Response> {
let tracking_key = req
.headers()
.keys()
.find(|k| {
let s = k.as_str();
s.eq_ignore_ascii_case("x-tapis-tracking-id")
|| s.eq_ignore_ascii_case("x_tapis_tracking_id")
})
.cloned();
if let Some(key) = tracking_key {
let tracking_id = req
.headers()
.get(&key)
.and_then(|v| v.to_str().ok())
.map(|s| s.to_owned());
if let Some(id) = tracking_id {
req.headers_mut().remove(&key);
validate_tracking_id(&id)
.map_err(|e| reqwest_middleware::Error::Middleware(anyhow::anyhow!(e)))?;
let name = reqwest::header::HeaderName::from_static("x-tapis-tracking-id");
let value = reqwest::header::HeaderValue::from_str(&id)
.map_err(|e| reqwest_middleware::Error::Middleware(anyhow::anyhow!(e)))?;
req.headers_mut().insert(name, value);
}
}
next.run(req, extensions).await
}
}
fn decode_base64url(s: &str) -> Option<Vec<u8>> {
fn val(c: u8) -> Option<u8> {
match c {
b'A'..=b'Z' => Some(c - b'A'),
b'a'..=b'z' => Some(c - b'a' + 26),
b'0'..=b'9' => Some(c - b'0' + 52),
b'-' | b'+' => Some(62),
b'_' | b'/' => Some(63),
_ => None,
}
}
let chars: Vec<u8> = s.bytes().filter(|&b| b != b'=').collect();
let mut out = Vec::with_capacity(chars.len() * 3 / 4 + 1);
let mut i = 0;
while i < chars.len() {
let a = val(chars[i])?;
let b = val(*chars.get(i + 1)?)?;
out.push((a << 2) | (b >> 4));
if let Some(&c3) = chars.get(i + 2) {
let c = val(c3)?;
out.push(((b & 0x0f) << 4) | (c >> 2));
if let Some(&c4) = chars.get(i + 3) {
let d = val(c4)?;
out.push(((c & 0x03) << 6) | d);
}
}
i += 4;
}
Some(out)
}
fn extract_jwt_exp(token: &str) -> Option<i64> {
let payload_b64 = token.split('.').nth(1)?;
let bytes = decode_base64url(payload_b64)?;
let claims: serde_json::Value = serde_json::from_slice(&bytes).ok()?;
claims.get("exp")?.as_i64()
}
struct RefreshMiddleware {
token_provider: Arc<dyn TokenProvider>,
}
#[async_trait::async_trait]
impl Middleware for RefreshMiddleware {
async fn handle(
&self,
mut req: Request,
extensions: &mut http::Extensions,
next: Next<'_>,
) -> MiddlewareResult<Response> {
let is_token_endpoint = {
let url = req.url().as_str();
url.contains("/oauth2/tokens") || url.contains("/v3/tokens")
};
if !is_token_endpoint {
let needs_refresh = req
.headers()
.get("x-tapis-token")
.and_then(|v| v.to_str().ok())
.and_then(extract_jwt_exp)
.map(|exp| {
let now = std::time::SystemTime::now()
.duration_since(std::time::UNIX_EPOCH)
.map(|d| d.as_secs() as i64)
.unwrap_or(0);
exp - now < 5
})
.unwrap_or(false);
if needs_refresh {
if let Some(new_token) = self.token_provider.get_token().await {
let value = HeaderValue::from_str(&new_token)
.map_err(|e| reqwest_middleware::Error::Middleware(anyhow::anyhow!(e)))?;
req.headers_mut().insert("x-tapis-token", value);
}
}
}
next.run(req, extensions).await
}
}
#[derive(Clone)]
pub struct TapisGlobusProxy {
config: Arc<configuration::Configuration>,
pub auth: AuthClient,
pub file_operations: FileOperationsClient,
pub general: GeneralClient,
pub transfers: TransfersClient,
}
impl TapisGlobusProxy {
pub fn new(
base_url: &str,
jwt_token: Option<&str>,
) -> Result<Self, Box<dyn std::error::Error>> {
Self::build(base_url, jwt_token, None)
}
pub fn with_token_provider(
base_url: &str,
jwt_token: Option<&str>,
provider: Arc<dyn TokenProvider>,
) -> Result<Self, Box<dyn std::error::Error>> {
Self::build(base_url, jwt_token, Some(provider))
}
fn build(
base_url: &str,
jwt_token: Option<&str>,
token_provider: Option<Arc<dyn TokenProvider>>,
) -> Result<Self, Box<dyn std::error::Error>> {
let mut headers = HeaderMap::new();
if let Some(token) = jwt_token {
headers.insert("X-Tapis-Token", HeaderValue::from_str(token)?);
}
let reqwest_client = Client::builder().default_headers(headers).build()?;
let mut builder = ClientBuilder::new(reqwest_client)
.with(LoggingMiddleware)
.with(HeaderInjectionMiddleware)
.with(TrackingIdMiddleware);
if let Some(provider) = token_provider {
builder = builder.with(RefreshMiddleware {
token_provider: provider,
});
}
let client = builder.build();
let config = Arc::new(configuration::Configuration {
base_path: base_url.to_string(),
client,
..Default::default()
});
Ok(Self {
config: config.clone(),
auth: AuthClient {
config: config.clone(),
},
file_operations: FileOperationsClient {
config: config.clone(),
},
general: GeneralClient {
config: config.clone(),
},
transfers: TransfersClient {
config: config.clone(),
},
})
}
pub fn config(&self) -> &configuration::Configuration {
&self.config
}
}
#[derive(Clone)]
pub struct AuthClient {
config: Arc<configuration::Configuration>,
}
impl AuthClient {
pub async fn check_tokens(
&self,
client_id: &str,
endpoint_id: &str,
access_token: &str,
refresh_token: &str,
) -> Result<models::RespAuthTokens, Error<auth_api::CheckTokensError>> {
auth_api::check_tokens(
&self.config,
client_id,
endpoint_id,
access_token,
refresh_token,
)
.await
}
pub async fn get_auth_info(
&self,
client_id: &str,
endpoint_id: &str,
) -> Result<models::RespGlobusAuthInfo, Error<auth_api::GetAuthInfoError>> {
auth_api::get_auth_info(&self.config, client_id, endpoint_id).await
}
pub async fn get_tokens(
&self,
client_id: &str,
session_id: &str,
auth_code: &str,
) -> Result<models::RespAuthTokens, Error<auth_api::GetTokensError>> {
auth_api::get_tokens(&self.config, client_id, session_id, auth_code).await
}
}
#[derive(Clone)]
pub struct FileOperationsClient {
config: Arc<configuration::Configuration>,
}
impl FileOperationsClient {
pub async fn delete_path(
&self,
client_id: &str,
endpoint_id: &str,
path: &str,
access_token: &str,
refresh_token: &str,
recurse: Option<bool>,
) -> Result<models::RespBasic, Error<file_operations_api::DeletePathError>> {
file_operations_api::delete_path(
&self.config,
client_id,
endpoint_id,
path,
access_token,
refresh_token,
recurse,
)
.await
}
pub async fn list_files(
&self,
client_id: &str,
endpoint_id: &str,
path: &str,
access_token: &str,
refresh_token: &str,
limit: Option<i32>,
offset: Option<i32>,
filter: Option<&str>,
) -> Result<models::RespFileList, Error<file_operations_api::ListFilesError>> {
file_operations_api::list_files(
&self.config,
client_id,
endpoint_id,
path,
access_token,
refresh_token,
limit,
offset,
filter,
)
.await
}
pub async fn make_dir(
&self,
client_id: &str,
endpoint_id: &str,
path: &str,
access_token: &str,
refresh_token: &str,
req_make_dir: Option<models::ReqMakeDir>,
) -> Result<models::RespBasic, Error<file_operations_api::MakeDirError>> {
file_operations_api::make_dir(
&self.config,
client_id,
endpoint_id,
path,
access_token,
refresh_token,
req_make_dir,
)
.await
}
pub async fn rename_path(
&self,
client_id: &str,
endpoint_id: &str,
path: &str,
access_token: &str,
refresh_token: &str,
req_rename: Option<models::ReqRename>,
) -> Result<models::RespBasic, Error<file_operations_api::RenamePathError>> {
file_operations_api::rename_path(
&self.config,
client_id,
endpoint_id,
path,
access_token,
refresh_token,
req_rename,
)
.await
}
}
#[derive(Clone)]
pub struct GeneralClient {
config: Arc<configuration::Configuration>,
}
impl GeneralClient {
pub async fn health_check(
&self,
) -> Result<models::RespBasic, Error<general_api::HealthCheckError>> {
general_api::health_check(&self.config).await
}
}
#[derive(Clone)]
pub struct TransfersClient {
config: Arc<configuration::Configuration>,
}
impl TransfersClient {
pub async fn cancel_transfer_task(
&self,
client_id: &str,
task_id: &str,
access_token: &str,
refresh_token: &str,
) -> Result<models::RespCancelTask, Error<transfers_api::CancelTransferTaskError>> {
transfers_api::cancel_transfer_task(
&self.config,
client_id,
task_id,
access_token,
refresh_token,
)
.await
}
pub async fn create_transfer_task(
&self,
client_id: &str,
access_token: &str,
refresh_token: &str,
req_create_transfer: Option<models::ReqCreateTransfer>,
) -> Result<models::RespTransferTask, Error<transfers_api::CreateTransferTaskError>> {
transfers_api::create_transfer_task(
&self.config,
client_id,
access_token,
refresh_token,
req_create_transfer,
)
.await
}
pub async fn get_transfer_task(
&self,
client_id: &str,
task_id: &str,
access_token: &str,
refresh_token: &str,
) -> Result<models::RespTransferTask, Error<transfers_api::GetTransferTaskError>> {
transfers_api::get_transfer_task(
&self.config,
client_id,
task_id,
access_token,
refresh_token,
)
.await
}
}