use super::{configuration, Error};
use crate::apis::ResponseContent;
use ::qcs_api_client_common::backoff::{
duration_from_io_error, duration_from_reqwest_error, duration_from_response, ExponentialBackoff,
};
#[cfg(feature = "tracing")]
use qcs_api_client_common::configuration::TokenRefresher;
use reqwest::StatusCode;
use serde::{Deserialize, Serialize};
#[derive(Debug, Clone, Serialize, Deserialize)]
#[serde(untagged)]
pub enum GetHealthError {
UnknownValue(serde_json::Value),
}
#[derive(Debug, Clone, Serialize, Deserialize)]
#[serde(untagged)]
pub enum HealthCheckError {
Status422(crate::models::ValidationError),
UnknownValue(serde_json::Value),
}
#[derive(Debug, Clone, Serialize, Deserialize)]
#[serde(untagged)]
pub enum HealthCheckDeprecatedError {
Status422(crate::models::ValidationError),
UnknownValue(serde_json::Value),
}
async fn get_health_inner(
configuration: &configuration::Configuration,
backoff: &mut ExponentialBackoff,
) -> Result<crate::models::Health, Error<GetHealthError>> {
let local_var_configuration = configuration;
let local_var_client = &local_var_configuration.client;
let local_var_uri_str = format!("{}/", local_var_configuration.qcs_config.api_url());
let mut local_var_req_builder =
local_var_client.request(reqwest::Method::GET, local_var_uri_str.as_str());
#[cfg(feature = "tracing")]
{
let local_var_do_tracing =
local_var_uri_str
.parse::<::url::Url>()
.ok()
.map_or(true, |url| {
configuration
.qcs_config
.should_trace(&::urlpattern::UrlPatternMatchInput::Url(url))
});
if local_var_do_tracing {
::tracing::debug!(
url=%local_var_uri_str,
method="GET",
"making get_health request",
);
}
}
let token = configuration.qcs_config.get_bearer_access_token().await?;
local_var_req_builder = local_var_req_builder.bearer_auth(token);
let local_var_req = local_var_req_builder.build()?;
let local_var_resp = local_var_client.execute(local_var_req).await?;
let local_var_status = local_var_resp.status();
if !local_var_status.is_client_error() && !local_var_status.is_server_error() {
let local_var_content = local_var_resp.text().await?;
serde_json::from_str(&local_var_content).map_err(Error::from)
} else {
let local_var_retry_delay =
duration_from_response(local_var_resp.status(), local_var_resp.headers(), backoff);
let local_var_content = local_var_resp.text().await?;
let local_var_entity: Option<GetHealthError> =
serde_json::from_str(&local_var_content).ok();
let local_var_error = ResponseContent {
status: local_var_status,
content: local_var_content,
entity: local_var_entity,
retry_delay: local_var_retry_delay,
};
Err(Error::ResponseError(local_var_error))
}
}
pub async fn get_health(
configuration: &configuration::Configuration,
) -> Result<crate::models::Health, Error<GetHealthError>> {
let mut backoff = configuration.backoff.clone();
let mut refreshed_credentials = false;
let method = reqwest::Method::GET;
loop {
let result = get_health_inner(configuration, &mut backoff).await;
match result {
Ok(result) => return Ok(result),
Err(Error::ResponseError(response)) => {
if !refreshed_credentials
&& matches!(
response.status,
StatusCode::FORBIDDEN | StatusCode::UNAUTHORIZED
)
{
configuration.qcs_config.refresh().await?;
refreshed_credentials = true;
continue;
} else if let Some(duration) = response.retry_delay {
tokio::time::sleep(duration).await;
continue;
}
return Err(Error::ResponseError(response));
}
Err(Error::Reqwest(error)) => {
if let Some(duration) = duration_from_reqwest_error(&method, &error, &mut backoff) {
tokio::time::sleep(duration).await;
continue;
}
return Err(Error::Reqwest(error));
}
Err(Error::Io(error)) => {
if let Some(duration) = duration_from_io_error(&method, &error, &mut backoff) {
tokio::time::sleep(duration).await;
continue;
}
return Err(Error::Io(error));
}
Err(error) => return Err(error),
}
}
}
async fn health_check_inner(
configuration: &configuration::Configuration,
backoff: &mut ExponentialBackoff,
) -> Result<serde_json::Value, Error<HealthCheckError>> {
let local_var_configuration = configuration;
let local_var_client = &local_var_configuration.client;
let local_var_uri_str = format!(
"{}/v1/healthcheck",
local_var_configuration.qcs_config.api_url()
);
let mut local_var_req_builder =
local_var_client.request(reqwest::Method::GET, local_var_uri_str.as_str());
#[cfg(feature = "tracing")]
{
let local_var_do_tracing =
local_var_uri_str
.parse::<::url::Url>()
.ok()
.map_or(true, |url| {
configuration
.qcs_config
.should_trace(&::urlpattern::UrlPatternMatchInput::Url(url))
});
if local_var_do_tracing {
::tracing::debug!(
url=%local_var_uri_str,
method="GET",
"making health_check request",
);
}
}
let token = configuration.qcs_config.get_bearer_access_token().await?;
local_var_req_builder = local_var_req_builder.bearer_auth(token);
let local_var_req = local_var_req_builder.build()?;
let local_var_resp = local_var_client.execute(local_var_req).await?;
let local_var_status = local_var_resp.status();
if !local_var_status.is_client_error() && !local_var_status.is_server_error() {
let local_var_content = local_var_resp.text().await?;
serde_json::from_str(&local_var_content).map_err(Error::from)
} else {
let local_var_retry_delay =
duration_from_response(local_var_resp.status(), local_var_resp.headers(), backoff);
let local_var_content = local_var_resp.text().await?;
let local_var_entity: Option<HealthCheckError> =
serde_json::from_str(&local_var_content).ok();
let local_var_error = ResponseContent {
status: local_var_status,
content: local_var_content,
entity: local_var_entity,
retry_delay: local_var_retry_delay,
};
Err(Error::ResponseError(local_var_error))
}
}
pub async fn health_check(
configuration: &configuration::Configuration,
) -> Result<serde_json::Value, Error<HealthCheckError>> {
let mut backoff = configuration.backoff.clone();
let mut refreshed_credentials = false;
let method = reqwest::Method::GET;
loop {
let result = health_check_inner(configuration, &mut backoff).await;
match result {
Ok(result) => return Ok(result),
Err(Error::ResponseError(response)) => {
if !refreshed_credentials
&& matches!(
response.status,
StatusCode::FORBIDDEN | StatusCode::UNAUTHORIZED
)
{
configuration.qcs_config.refresh().await?;
refreshed_credentials = true;
continue;
} else if let Some(duration) = response.retry_delay {
tokio::time::sleep(duration).await;
continue;
}
return Err(Error::ResponseError(response));
}
Err(Error::Reqwest(error)) => {
if let Some(duration) = duration_from_reqwest_error(&method, &error, &mut backoff) {
tokio::time::sleep(duration).await;
continue;
}
return Err(Error::Reqwest(error));
}
Err(Error::Io(error)) => {
if let Some(duration) = duration_from_io_error(&method, &error, &mut backoff) {
tokio::time::sleep(duration).await;
continue;
}
return Err(Error::Io(error));
}
Err(error) => return Err(error),
}
}
}
async fn health_check_deprecated_inner(
configuration: &configuration::Configuration,
backoff: &mut ExponentialBackoff,
) -> Result<serde_json::Value, Error<HealthCheckDeprecatedError>> {
let local_var_configuration = configuration;
let local_var_client = &local_var_configuration.client;
let local_var_uri_str = format!("{}/v1/", local_var_configuration.qcs_config.api_url());
let mut local_var_req_builder =
local_var_client.request(reqwest::Method::GET, local_var_uri_str.as_str());
#[cfg(feature = "tracing")]
{
let local_var_do_tracing =
local_var_uri_str
.parse::<::url::Url>()
.ok()
.map_or(true, |url| {
configuration
.qcs_config
.should_trace(&::urlpattern::UrlPatternMatchInput::Url(url))
});
if local_var_do_tracing {
::tracing::debug!(
url=%local_var_uri_str,
method="GET",
"making health_check_deprecated request",
);
}
}
let token = configuration.qcs_config.get_bearer_access_token().await?;
local_var_req_builder = local_var_req_builder.bearer_auth(token);
let local_var_req = local_var_req_builder.build()?;
let local_var_resp = local_var_client.execute(local_var_req).await?;
let local_var_status = local_var_resp.status();
if !local_var_status.is_client_error() && !local_var_status.is_server_error() {
let local_var_content = local_var_resp.text().await?;
serde_json::from_str(&local_var_content).map_err(Error::from)
} else {
let local_var_retry_delay =
duration_from_response(local_var_resp.status(), local_var_resp.headers(), backoff);
let local_var_content = local_var_resp.text().await?;
let local_var_entity: Option<HealthCheckDeprecatedError> =
serde_json::from_str(&local_var_content).ok();
let local_var_error = ResponseContent {
status: local_var_status,
content: local_var_content,
entity: local_var_entity,
retry_delay: local_var_retry_delay,
};
Err(Error::ResponseError(local_var_error))
}
}
pub async fn health_check_deprecated(
configuration: &configuration::Configuration,
) -> Result<serde_json::Value, Error<HealthCheckDeprecatedError>> {
let mut backoff = configuration.backoff.clone();
let mut refreshed_credentials = false;
let method = reqwest::Method::GET;
loop {
let result = health_check_deprecated_inner(configuration, &mut backoff).await;
match result {
Ok(result) => return Ok(result),
Err(Error::ResponseError(response)) => {
if !refreshed_credentials
&& matches!(
response.status,
StatusCode::FORBIDDEN | StatusCode::UNAUTHORIZED
)
{
configuration.qcs_config.refresh().await?;
refreshed_credentials = true;
continue;
} else if let Some(duration) = response.retry_delay {
tokio::time::sleep(duration).await;
continue;
}
return Err(Error::ResponseError(response));
}
Err(Error::Reqwest(error)) => {
if let Some(duration) = duration_from_reqwest_error(&method, &error, &mut backoff) {
tokio::time::sleep(duration).await;
continue;
}
return Err(Error::Reqwest(error));
}
Err(Error::Io(error)) => {
if let Some(duration) = duration_from_io_error(&method, &error, &mut backoff) {
tokio::time::sleep(duration).await;
continue;
}
return Err(Error::Io(error));
}
Err(error) => return Err(error),
}
}
}