7
0
gaore-common-sdk-go/sdk/client.go

170 lines
4.9 KiB
Go
Raw Normal View History

2020-08-03 20:48:58 +08:00
package sdk
import (
"context"
2020-08-04 21:14:06 +08:00
"crypto/tls"
2020-08-03 20:48:58 +08:00
"fmt"
"golib.gaore.com/GaoreGo/gaore-common-sdk-go/sdk/auth"
2020-08-04 12:23:34 +08:00
"golib.gaore.com/GaoreGo/gaore-common-sdk-go/sdk/auth/credentials"
2020-08-04 00:51:19 +08:00
"golib.gaore.com/GaoreGo/gaore-common-sdk-go/sdk/requests"
"golib.gaore.com/GaoreGo/gaore-common-sdk-go/sdk/responses"
2020-08-03 20:48:58 +08:00
"net"
"net/http"
"runtime"
"strings"
"time"
)
var Version = "0.0.1"
var defaultConnectTimeout = 5 * time.Second
var defaultReadTimeout = 10 * time.Second
var DefaultUserAgent = fmt.Sprintf("GaoreGoSdk (%s;%s) Golang/%s Core/%s", runtime.GOOS, runtime.GOARCH, strings.Trim(runtime.Version(), "go"), Version)
type Client struct {
Host string
httpClient *http.Client
isInsecure bool
2020-08-04 00:51:19 +08:00
signer auth.Signer
2020-08-03 20:48:58 +08:00
readTimeout time.Duration
connectTimeout time.Duration
config *Config
}
2020-08-04 21:14:06 +08:00
func (client *Client) GetHTTPSInsecure() bool {
return client.isInsecure
}
2020-08-04 12:23:34 +08:00
func (client *Client) InitClientConfig() (config *Config) {
2020-08-04 21:14:06 +08:00
if client.config != nil {
return client.config
} else {
return NewConfig()
}
2020-08-04 12:23:34 +08:00
}
func (client *Client) InitWithAccessKey(accessKeyId, accessKeySecret, source string) (err error) {
config := client.InitWithConfig()
credential := &credentials.BaseCredential{
AccessKeyId: accessKeyId,
AccessKeySecret: accessKeySecret,
}
return client.InitWithOptions("", config, credential)
}
2020-08-04 11:22:37 +08:00
func (client *Client) InitWithOptions(host string, config *Config, credential auth.Credential) (err error) {
2020-08-03 20:48:58 +08:00
client.httpClient = &http.Client{}
if config.Transport != nil {
client.httpClient.Transport = config.Transport
} else if config.HttpTransport != nil {
client.httpClient.Transport = config.HttpTransport
}
if config.Timeout > 0 {
client.httpClient.Timeout = config.Timeout
}
2020-08-04 00:51:19 +08:00
client.signer, err = auth.NewSignerWithCredential(credential, client.ProcessCommonRequestWithSigner)
2020-08-03 20:48:58 +08:00
return nil
}
func (client *Client) InitWithConfig() (config *Config) {
if client.config != nil {
return client.config
} else {
return NewConfig()
}
}
2020-08-04 00:51:19 +08:00
func (client *Client) ProcessCommonRequestWithSigner(request *requests.CommonRequest, signerInterface interface{}) (response *responses.CommonResponse, err error) {
if signer, isSigner := signerInterface.(auth.Signer); isSigner {
response = responses.NewCommonResponse()
err = client.DoActionWithSigner(request, response, signer)
return
}
panic("should not be here")
}
2020-08-03 20:48:58 +08:00
func Timeout(connectTimeout time.Duration) func(ctx context.Context, net, addr string) (c net.Conn, err error) {
return func(ctx context.Context, network, address string) (c net.Conn, err error) {
return (&net.Dialer{
Timeout: connectTimeout,
DualStack: true,
}).DialContext(ctx, network, address)
}
}
2020-08-04 00:51:19 +08:00
func (client *Client) setTimeOut(request requests.AcsRequest) {
2020-08-03 20:48:58 +08:00
readTimeout, connectTimeout := client.getTimeOut(request)
client.httpClient.Timeout = readTimeout
if trans, ok := client.httpClient.Transport.(*http.Transport); ok && trans != nil {
trans.DialContext = Timeout(connectTimeout)
client.httpClient.Transport = trans
} else if client.httpClient.Transport == nil {
client.httpClient.Transport = &http.Transport{
DialContext: Timeout(connectTimeout),
}
}
}
2020-08-04 00:51:19 +08:00
func (client *Client) getTimeOut(request requests.AcsRequest) (time.Duration, time.Duration) {
2020-08-03 20:48:58 +08:00
readTimeOut := defaultReadTimeout
connectTimeOut := defaultConnectTimeout
reqReadTimeout := request.GetReadTimeout()
reqConnectTimeout := request.GetConnectTimeout()
if reqReadTimeout != 0*time.Millisecond {
readTimeOut = reqReadTimeout
} else if client.readTimeout != 0*time.Microsecond {
readTimeOut = client.readTimeout
} else if client.httpClient.Timeout != 0 {
readTimeOut = client.httpClient.Timeout
}
if reqConnectTimeout != 0*time.Microsecond {
connectTimeOut = reqConnectTimeout
} else if client.connectTimeout != 0*time.Millisecond {
connectTimeOut = client.connectTimeout
}
return readTimeOut, connectTimeOut
}
2020-08-04 21:14:06 +08:00
func (client *Client) getHTTPSInsecure(request requests.AcsRequest) (insecure bool) {
if request.GetHTTPSInsecure() != nil {
insecure = *request.GetHTTPSInsecure()
} else {
insecure = client.GetHTTPSInsecure()
}
return
}
2020-08-04 00:51:19 +08:00
func (client *Client) DoAction(request requests.AcsRequest, response responses.AcsResponse) (err error) {
return client.DoActionWithSigner(request, response, nil)
}
func (client *Client) DoActionWithSigner(request requests.AcsRequest, response responses.AcsResponse, signer auth.Signer) (err error) {
2020-08-04 11:22:37 +08:00
2020-08-04 21:14:06 +08:00
client.setTimeOut(request)
if trans, ok := client.httpClient.Transport.(*http.Transport); ok && trans != nil {
if trans.TLSClientConfig != nil {
trans.TLSClientConfig.InsecureSkipVerify = client.getHTTPSInsecure(request)
} else {
trans.TLSClientConfig = &tls.Config{
InsecureSkipVerify: client.getHTTPSInsecure(request),
}
}
client.httpClient.Transport = trans
}
var httpResponse *http.Response
}
func (client *Client) buildRequestWithSigner(request requests.AcsRequest, signer auth.Signer) (httpRequest *requests.HttpRequest, err error) {
2020-08-03 20:48:58 +08:00
}