Skip to main content

wavekat_platform_client/
client.rs

1//! `Client` — reqwest-backed bearer-auth HTTP against `platform.wavekat.com`.
2//!
3//! Ported from `wavekat-cli/src/client.rs`. Two intentional changes vs.
4//! the CLI:
5//!
6//!   1. Storage-agnostic constructor: `Client::new(base_url, token)`
7//!      instead of `Client::from_config()`. Reading auth.json belongs in
8//!      the consumer (see this crate's `CLAUDE.md`).
9//!   2. Typed errors via [`crate::Error`] instead of `anyhow::Result`.
10//!      Consumers that prefer `anyhow` can `?` straight through.
11//!
12//! Surface stays close to the CLI so the CLI's eventual migration is
13//! mechanical.
14
15use futures_util::StreamExt;
16use reqwest::header::{HeaderMap, HeaderValue, AUTHORIZATION};
17use serde::de::DeserializeOwned;
18use serde::Serialize;
19use tokio::io::AsyncWriteExt;
20
21use crate::error::{Error, Result};
22use crate::token::Token;
23
24/// HTTP client with the bearer token baked into its default headers.
25///
26/// Cheap to clone (it's a thin wrapper around `reqwest::Client`, which is
27/// itself an `Arc` internally), so prefer cloning over re-building.
28#[derive(Clone)]
29pub struct Client {
30    inner: reqwest::Client,
31    base_url: String,
32}
33
34impl Client {
35    /// Build a client for the given platform base URL, authenticated with
36    /// `token`. The base URL's trailing slash (if any) is stripped.
37    pub fn new(base_url: impl Into<String>, token: Token) -> Result<Self> {
38        let mut headers = HeaderMap::new();
39        let value = format!("Bearer {}", token.as_str());
40        let header = HeaderValue::from_str(&value)
41            .map_err(|_| Error::BadRequest("token contained invalid bytes".into()))?;
42        headers.insert(AUTHORIZATION, header);
43
44        let inner = reqwest::Client::builder()
45            .default_headers(headers)
46            .user_agent(concat!(
47                "wavekat-platform-client/",
48                env!("CARGO_PKG_VERSION")
49            ))
50            .build()?;
51        Ok(Self {
52            inner,
53            base_url: base_url.into().trim_end_matches('/').to_string(),
54        })
55    }
56
57    /// Base URL the client was configured with, with any trailing slash
58    /// stripped. Useful for callers that want to print a clickable link
59    /// alongside an API result (`{base_url}/projects/…`).
60    pub fn base_url(&self) -> &str {
61        &self.base_url
62    }
63
64    fn url(&self, path: &str) -> String {
65        format!("{}{}", self.base_url, path)
66    }
67
68    /// `GET {path}` and decode the JSON response.
69    pub async fn get_json<T: DeserializeOwned>(&self, path: &str) -> Result<T> {
70        let url = self.url(path);
71        let resp = self.inner.get(&url).send().await?;
72        decode(url, resp).await
73    }
74
75    /// `GET {path}?query` and decode the JSON response. `query` is any
76    /// `serde::Serialize` — typically a `&[(K, V)]` or a struct.
77    pub async fn get_json_query<T: DeserializeOwned, Q: Serialize + ?Sized>(
78        &self,
79        path: &str,
80        query: &Q,
81    ) -> Result<T> {
82        let url = self.url(path);
83        let resp = self.inner.get(&url).query(query).send().await?;
84        decode(url, resp).await
85    }
86
87    /// `POST {path}` with `body` serialized as JSON, decode the JSON
88    /// response.
89    pub async fn post_json<T: DeserializeOwned, B: Serialize + ?Sized>(
90        &self,
91        path: &str,
92        body: &B,
93    ) -> Result<T> {
94        let url = self.url(path);
95        let resp = self.inner.post(&url).json(body).send().await?;
96        decode(url, resp).await
97    }
98
99    /// `POST {path}` with no body, expecting an empty/ignored response.
100    pub async fn post_empty(&self, path: &str) -> Result<()> {
101        let url = self.url(path);
102        let resp = self.inner.post(&url).send().await?;
103        ensure_success(url, resp).await
104    }
105
106    /// `POST {path}` with no body, decoding the JSON response. The CLI
107    /// uses this for `…/finalize` endpoints that take no body but return
108    /// the updated row.
109    pub async fn post_empty_returning_json<T: DeserializeOwned>(&self, path: &str) -> Result<T> {
110        let url = self.url(path);
111        let resp = self.inner.post(&url).send().await?;
112        decode(url, resp).await
113    }
114
115    /// `DELETE {path}`.
116    pub async fn delete(&self, path: &str) -> Result<()> {
117        let url = self.url(path);
118        let resp = self.inner.delete(&url).send().await?;
119        ensure_success(url, resp).await
120    }
121
122    /// `PUT {path}` with `body` as `application/octet-stream`. Used by
123    /// the CLI's `models push` to ship bytes through the platform's
124    /// proxy upload route when R2 isn't directly reachable.
125    pub async fn put_proxy_bytes(&self, path: &str, body: Vec<u8>) -> Result<()> {
126        let url = self.url(path);
127        let resp = self
128            .inner
129            .put(&url)
130            .header(reqwest::header::CONTENT_TYPE, "application/octet-stream")
131            .body(body)
132            .send()
133            .await?;
134        ensure_success(url, resp).await
135    }
136
137    /// `PUT` raw bytes to a presigned URL. Deliberately uses a *fresh*
138    /// `reqwest::Client` (no auth headers) — adding `Authorization:
139    /// Bearer …` would make S3/R2 reject the request because it's not
140    /// part of the SigV4 query-string signature.
141    pub async fn put_presigned_bytes(presigned_url: &str, body: Vec<u8>) -> Result<()> {
142        let resp = reqwest::Client::new()
143            .put(presigned_url)
144            .body(body)
145            .send()
146            .await?;
147        ensure_success(presigned_url.to_string(), resp).await
148    }
149
150    /// Stream a `GET` response body into `sink`. Returns the number of
151    /// bytes written. Used for big payloads (manifests, audio clips)
152    /// where holding the whole body in memory would be wasteful.
153    pub async fn get_stream_to<W: AsyncWriteExt + Unpin>(
154        &self,
155        path: &str,
156        sink: &mut W,
157    ) -> Result<u64> {
158        let url = self.url(path);
159        let resp = self.inner.get(&url).send().await?;
160        let status = resp.status();
161        if !status.is_success() {
162            let body = resp.text().await.unwrap_or_default();
163            return Err(http_error(status.as_u16(), url, body));
164        }
165        let mut stream = resp.bytes_stream();
166        let mut written: u64 = 0;
167        while let Some(chunk) = stream.next().await {
168            let bytes = chunk?;
169            sink.write_all(&bytes).await?;
170            written += bytes.len() as u64;
171        }
172        sink.flush().await?;
173        Ok(written)
174    }
175}
176
177async fn decode<T: DeserializeOwned>(url: String, resp: reqwest::Response) -> Result<T> {
178    let status = resp.status();
179    let text = resp.text().await?;
180    if !status.is_success() {
181        return Err(http_error(status.as_u16(), url, text));
182    }
183    serde_json::from_str(&text).map_err(|source| Error::Decode { url, source })
184}
185
186async fn ensure_success(url: String, resp: reqwest::Response) -> Result<()> {
187    let status = resp.status();
188    if status.is_success() {
189        return Ok(());
190    }
191    let body = resp.text().await.unwrap_or_default();
192    Err(http_error(status.as_u16(), url, body))
193}
194
195/// Map an HTTP error response to the matching [`Error`] variant. 401
196/// gets its own [`Error::Unauthorized`] so consumers can render a
197/// tailored "sign in again" message; everything else stays as
198/// [`Error::Http`].
199fn http_error(status: u16, url: String, body: String) -> Error {
200    let body = truncate(&body, 500).to_string();
201    if status == 401 {
202        Error::Unauthorized { url, body }
203    } else {
204        Error::Http { status, url, body }
205    }
206}
207
208fn truncate(s: &str, n: usize) -> &str {
209    if s.len() > n {
210        // Walk back to the previous char boundary so we don't slice a
211        // multibyte UTF-8 sequence (the CLI's version of this used a
212        // raw byte slice, which is a panic waiting for a non-ASCII
213        // error body).
214        let mut end = n;
215        while end > 0 && !s.is_char_boundary(end) {
216            end -= 1;
217        }
218        &s[..end]
219    } else {
220        s
221    }
222}
223
224#[cfg(test)]
225mod tests {
226    use super::*;
227
228    #[test]
229    fn http_error_format_matches_cli_shape() {
230        // Regression guard: `Display` for `Error::Http` should format
231        // "{status} {url}: {body}" — matches what the CLI's old `decode`
232        // produced via `anyhow!`. Consumers (and grep-driven debugging)
233        // depend on the shape.
234        let e = Error::Http {
235            status: 500,
236            url: "https://platform.wavekat.com/api/me".into(),
237            body: "boom".into(),
238        };
239        let s = e.to_string();
240        assert!(s.contains("500"), "{s}");
241        assert!(s.contains("https://platform.wavekat.com/api/me"), "{s}");
242        assert!(s.contains("boom"), "{s}");
243    }
244
245    #[test]
246    fn http_error_splits_401_into_unauthorized() {
247        // 401 routes to the dedicated variant so consumers can match on
248        // it instead of inspecting `status == 401`.
249        let e = http_error(
250            401,
251            "https://platform.wavekat.com/api/me".into(),
252            "{\"error\":\"unauthenticated\"}".into(),
253        );
254        assert!(
255            matches!(e, Error::Unauthorized { .. }),
256            "expected Unauthorized, got {e:?}"
257        );
258        // Display still mentions 401 + url so logs stay greppable.
259        let s = e.to_string();
260        assert!(s.contains("401"), "{s}");
261        assert!(s.contains("https://platform.wavekat.com/api/me"), "{s}");
262    }
263
264    #[test]
265    fn http_error_keeps_non_401_in_http_variant() {
266        let e = http_error(
267            500,
268            "https://platform.wavekat.com/api/me".into(),
269            "boom".into(),
270        );
271        assert!(
272            matches!(e, Error::Http { status: 500, .. }),
273            "expected Http {{ status: 500 }}, got {e:?}"
274        );
275    }
276
277    #[test]
278    fn truncate_respects_char_boundaries() {
279        // Multi-byte char straddling the cap shouldn't panic.
280        let s = "a".repeat(498) + "é"; // 'é' is 2 bytes in UTF-8.
281        let t = truncate(&s, 499);
282        assert!(s.starts_with(t));
283    }
284}