117 lines
4.5 KiB
Go
117 lines
4.5 KiB
Go
package handler
|
|
|
|
import (
|
|
"fmt"
|
|
"github.com/fastenhealth/fasten-onprem/backend/pkg"
|
|
"github.com/fastenhealth/fasten-onprem/backend/pkg/config"
|
|
"github.com/fastenhealth/fasten-onprem/backend/pkg/database"
|
|
"github.com/fastenhealth/fasten-onprem/backend/pkg/models"
|
|
"github.com/fastenhealth/fasten-sources/clients/factory"
|
|
sourcePkg "github.com/fastenhealth/fasten-sources/pkg"
|
|
"github.com/gin-gonic/gin"
|
|
"github.com/sirupsen/logrus"
|
|
"net/http"
|
|
"net/url"
|
|
"strings"
|
|
)
|
|
|
|
/*
|
|
These Endpoints are only available when Fasten is deployed with allow_unsafe_endpoints enabled.
|
|
*/
|
|
|
|
func UnsafeRequestSource(c *gin.Context) {
|
|
logger := c.MustGet(pkg.ContextKeyTypeLogger).(*logrus.Entry)
|
|
appConfig := c.MustGet(pkg.ContextKeyTypeConfig).(config.Interface)
|
|
databaseRepo := c.MustGet(pkg.ContextKeyTypeDatabase).(database.DatabaseRepository)
|
|
|
|
//safety check incase this function is called in another way
|
|
if !appConfig.GetBool("web.allow_unsafe_endpoints") {
|
|
c.JSON(http.StatusServiceUnavailable, gin.H{"success": false})
|
|
return
|
|
}
|
|
|
|
//!!!!!!INSECURE!!!!!!S
|
|
//We're setting the username to a user provided value, this is insecure, but required for calling databaseRepo fns
|
|
c.Set("AUTH_USERNAME", c.Param("username"))
|
|
|
|
foundSource, err := databaseRepo.GetSource(c, c.Param("sourceId"))
|
|
if err != nil {
|
|
logger.Errorf("An error occurred while finding source credential: %v", err)
|
|
c.JSON(http.StatusInternalServerError, gin.H{"success": false, "error": err.Error()})
|
|
return
|
|
}
|
|
|
|
if foundSource == nil {
|
|
logger.Errorf("Did not source credentials for %s", c.Param("sourceType"))
|
|
c.JSON(http.StatusNotFound, gin.H{"success": false, "error": err.Error()})
|
|
return
|
|
}
|
|
|
|
client, err := factory.GetSourceClient(sourcePkg.GetFastenLighthouseEnv(), foundSource.SourceType, c, logger, foundSource)
|
|
if err != nil {
|
|
logger.Errorf("Could not initialize source client %v", err)
|
|
c.JSON(http.StatusInternalServerError, gin.H{"success": false, "error": err.Error()})
|
|
return
|
|
}
|
|
//TODO: if source has been updated, we should save the access/refresh token.
|
|
//if updatedSource != nil {
|
|
// logger.Warnf("TODO: source credential has been updated, we should store it in the database: %v", updatedSource)
|
|
// // err := databaseRepo.CreateSource(c, updatedSource)
|
|
// // if err != nil {
|
|
// // logger.Errorf("An error occurred while updating source credential %v", err)
|
|
// // c.JSON(http.StatusInternalServerError, gin.H{"success": false, "error": err.Error()})
|
|
// // return
|
|
// // }
|
|
//}
|
|
|
|
var resp map[string]interface{}
|
|
|
|
parsedUrl, err := url.Parse(strings.TrimSuffix(c.Param("path"), "/"))
|
|
if err != nil {
|
|
logger.Errorf("Error parsing request, %v", err)
|
|
c.JSON(http.StatusInternalServerError, gin.H{"success": false, "error": err.Error()})
|
|
return
|
|
}
|
|
//make sure we include all query string parameters with the raw request.
|
|
parsedUrl.RawQuery = c.Request.URL.Query().Encode()
|
|
|
|
_, err = client.GetRequest(parsedUrl.String(), &resp)
|
|
if err != nil {
|
|
logger.Errorf("Error making raw request, %v", err)
|
|
c.JSON(http.StatusInternalServerError, gin.H{"success": false, "error": err.Error(), "data": resp})
|
|
return
|
|
}
|
|
|
|
//update source incase the access token/refresh token has been updated
|
|
sourceCredential := client.GetSourceCredential()
|
|
sourceCredentialConcrete, ok := sourceCredential.(*models.SourceCredential)
|
|
if !ok {
|
|
logger.Errorln("An error occurred while updating source credential, source credential is not of type *models.SourceCredential")
|
|
c.JSON(http.StatusOK, gin.H{"success": false, "data": resp, "error": fmt.Errorf("An error occurred while updating source credential, source credential is not of type *models.SourceCredential")})
|
|
return
|
|
}
|
|
err = databaseRepo.UpdateSource(c, sourceCredentialConcrete)
|
|
if err != nil {
|
|
logger.Errorf("An error occurred while updating source credential: %v", err)
|
|
c.JSON(http.StatusOK, gin.H{"success": false, "data": resp, "error": fmt.Errorf("An error occurred while updating source credential: %v", err)})
|
|
return
|
|
}
|
|
|
|
c.JSON(http.StatusOK, gin.H{"success": true, "data": resp})
|
|
}
|
|
|
|
func UnsafeResourceGraph(c *gin.Context) {
|
|
appConfig := c.MustGet(pkg.ContextKeyTypeConfig).(config.Interface)
|
|
//safety check incase this function is called in another way
|
|
if !appConfig.GetBool("web.allow_unsafe_endpoints") {
|
|
c.JSON(http.StatusServiceUnavailable, gin.H{"success": false})
|
|
return
|
|
}
|
|
|
|
//!!!!!!INSECURE!!!!!!S
|
|
//We're setting the username to a user provided value, this is insecure, but required for calling databaseRepo fns
|
|
c.Set(pkg.ContextKeyTypeAuthUsername, c.Param("username"))
|
|
|
|
GetResourceFhirGraph(c)
|
|
}
|