aboutsummaryrefslogtreecommitdiff
path: root/cmd/mimi/modules/scheduling/scheduling.twirp.go
diff options
context:
space:
mode:
authorXe Iaso <me@xeiaso.net>2024-06-30 10:32:55 -0400
committerXe Iaso <me@xeiaso.net>2024-06-30 10:32:55 -0400
commit050aff00512028ffc1989c7485cb2cb1258c7537 (patch)
tree3de72fe24e48dd039a1dfc91e35ec32652b35b0f /cmd/mimi/modules/scheduling/scheduling.twirp.go
parent759e3c8b09253990a8c3e09a359ed9a552121d72 (diff)
downloadx-050aff00512028ffc1989c7485cb2cb1258c7537.tar.xz
x-050aff00512028ffc1989c7485cb2cb1258c7537.zip
update generated files
Signed-off-by: Xe Iaso <me@xeiaso.net>
Diffstat (limited to 'cmd/mimi/modules/scheduling/scheduling.twirp.go')
-rw-r--r--cmd/mimi/modules/scheduling/scheduling.twirp.go1115
1 files changed, 0 insertions, 1115 deletions
diff --git a/cmd/mimi/modules/scheduling/scheduling.twirp.go b/cmd/mimi/modules/scheduling/scheduling.twirp.go
deleted file mode 100644
index bbe329d..0000000
--- a/cmd/mimi/modules/scheduling/scheduling.twirp.go
+++ /dev/null
@@ -1,1115 +0,0 @@
-// Code generated by protoc-gen-twirp v8.1.3, DO NOT EDIT.
-// source: scheduling.proto
-
-package scheduling
-
-import context "context"
-import fmt "fmt"
-import http "net/http"
-import io "io"
-import json "encoding/json"
-import strconv "strconv"
-import strings "strings"
-
-import protojson "google.golang.org/protobuf/encoding/protojson"
-import proto "google.golang.org/protobuf/proto"
-import twirp "github.com/twitchtv/twirp"
-import ctxsetters "github.com/twitchtv/twirp/ctxsetters"
-
-import bytes "bytes"
-import errors "errors"
-import path "path"
-import url "net/url"
-
-// Version compatibility assertion.
-// If the constant is not defined in the package, that likely means
-// the package needs to be updated to work with this generated code.
-// See https://twitchtv.github.io/twirp/docs/version_matrix.html
-const _ = twirp.TwirpPackageMinVersion_8_1_0
-
-// ====================
-// Scheduling Interface
-// ====================
-
-type Scheduling interface {
- ParseEmail(context.Context, *ParseReq) (*ParseResp, error)
-}
-
-// ==========================
-// Scheduling Protobuf Client
-// ==========================
-
-type schedulingProtobufClient struct {
- client HTTPClient
- urls [1]string
- interceptor twirp.Interceptor
- opts twirp.ClientOptions
-}
-
-// NewSchedulingProtobufClient creates a Protobuf client that implements the Scheduling interface.
-// It communicates using Protobuf and can be configured with a custom HTTPClient.
-func NewSchedulingProtobufClient(baseURL string, client HTTPClient, opts ...twirp.ClientOption) Scheduling {
- if c, ok := client.(*http.Client); ok {
- client = withoutRedirects(c)
- }
-
- clientOpts := twirp.ClientOptions{}
- for _, o := range opts {
- o(&clientOpts)
- }
-
- // Using ReadOpt allows backwards and forwards compatibility with new options in the future
- literalURLs := false
- _ = clientOpts.ReadOpt("literalURLs", &literalURLs)
- var pathPrefix string
- if ok := clientOpts.ReadOpt("pathPrefix", &pathPrefix); !ok {
- pathPrefix = "/twirp" // default prefix
- }
-
- // Build method URLs: <baseURL>[<prefix>]/<package>.<Service>/<Method>
- serviceURL := sanitizeBaseURL(baseURL)
- serviceURL += baseServicePath(pathPrefix, "within.website.x.mimi.scheduling", "Scheduling")
- urls := [1]string{
- serviceURL + "ParseEmail",
- }
-
- return &schedulingProtobufClient{
- client: client,
- urls: urls,
- interceptor: twirp.ChainInterceptors(clientOpts.Interceptors...),
- opts: clientOpts,
- }
-}
-
-func (c *schedulingProtobufClient) ParseEmail(ctx context.Context, in *ParseReq) (*ParseResp, error) {
- ctx = ctxsetters.WithPackageName(ctx, "within.website.x.mimi.scheduling")
- ctx = ctxsetters.WithServiceName(ctx, "Scheduling")
- ctx = ctxsetters.WithMethodName(ctx, "ParseEmail")
- caller := c.callParseEmail
- if c.interceptor != nil {
- caller = func(ctx context.Context, req *ParseReq) (*ParseResp, error) {
- resp, err := c.interceptor(
- func(ctx context.Context, req interface{}) (interface{}, error) {
- typedReq, ok := req.(*ParseReq)
- if !ok {
- return nil, twirp.InternalError("failed type assertion req.(*ParseReq) when calling interceptor")
- }
- return c.callParseEmail(ctx, typedReq)
- },
- )(ctx, req)
- if resp != nil {
- typedResp, ok := resp.(*ParseResp)
- if !ok {
- return nil, twirp.InternalError("failed type assertion resp.(*ParseResp) when calling interceptor")
- }
- return typedResp, err
- }
- return nil, err
- }
- }
- return caller(ctx, in)
-}
-
-func (c *schedulingProtobufClient) callParseEmail(ctx context.Context, in *ParseReq) (*ParseResp, error) {
- out := new(ParseResp)
- ctx, err := doProtobufRequest(ctx, c.client, c.opts.Hooks, c.urls[0], in, out)
- if err != nil {
- twerr, ok := err.(twirp.Error)
- if !ok {
- twerr = twirp.InternalErrorWith(err)
- }
- callClientError(ctx, c.opts.Hooks, twerr)
- return nil, err
- }
-
- callClientResponseReceived(ctx, c.opts.Hooks)
-
- return out, nil
-}
-
-// ======================
-// Scheduling JSON Client
-// ======================
-
-type schedulingJSONClient struct {
- client HTTPClient
- urls [1]string
- interceptor twirp.Interceptor
- opts twirp.ClientOptions
-}
-
-// NewSchedulingJSONClient creates a JSON client that implements the Scheduling interface.
-// It communicates using JSON and can be configured with a custom HTTPClient.
-func NewSchedulingJSONClient(baseURL string, client HTTPClient, opts ...twirp.ClientOption) Scheduling {
- if c, ok := client.(*http.Client); ok {
- client = withoutRedirects(c)
- }
-
- clientOpts := twirp.ClientOptions{}
- for _, o := range opts {
- o(&clientOpts)
- }
-
- // Using ReadOpt allows backwards and forwards compatibility with new options in the future
- literalURLs := false
- _ = clientOpts.ReadOpt("literalURLs", &literalURLs)
- var pathPrefix string
- if ok := clientOpts.ReadOpt("pathPrefix", &pathPrefix); !ok {
- pathPrefix = "/twirp" // default prefix
- }
-
- // Build method URLs: <baseURL>[<prefix>]/<package>.<Service>/<Method>
- serviceURL := sanitizeBaseURL(baseURL)
- serviceURL += baseServicePath(pathPrefix, "within.website.x.mimi.scheduling", "Scheduling")
- urls := [1]string{
- serviceURL + "ParseEmail",
- }
-
- return &schedulingJSONClient{
- client: client,
- urls: urls,
- interceptor: twirp.ChainInterceptors(clientOpts.Interceptors...),
- opts: clientOpts,
- }
-}
-
-func (c *schedulingJSONClient) ParseEmail(ctx context.Context, in *ParseReq) (*ParseResp, error) {
- ctx = ctxsetters.WithPackageName(ctx, "within.website.x.mimi.scheduling")
- ctx = ctxsetters.WithServiceName(ctx, "Scheduling")
- ctx = ctxsetters.WithMethodName(ctx, "ParseEmail")
- caller := c.callParseEmail
- if c.interceptor != nil {
- caller = func(ctx context.Context, req *ParseReq) (*ParseResp, error) {
- resp, err := c.interceptor(
- func(ctx context.Context, req interface{}) (interface{}, error) {
- typedReq, ok := req.(*ParseReq)
- if !ok {
- return nil, twirp.InternalError("failed type assertion req.(*ParseReq) when calling interceptor")
- }
- return c.callParseEmail(ctx, typedReq)
- },
- )(ctx, req)
- if resp != nil {
- typedResp, ok := resp.(*ParseResp)
- if !ok {
- return nil, twirp.InternalError("failed type assertion resp.(*ParseResp) when calling interceptor")
- }
- return typedResp, err
- }
- return nil, err
- }
- }
- return caller(ctx, in)
-}
-
-func (c *schedulingJSONClient) callParseEmail(ctx context.Context, in *ParseReq) (*ParseResp, error) {
- out := new(ParseResp)
- ctx, err := doJSONRequest(ctx, c.client, c.opts.Hooks, c.urls[0], in, out)
- if err != nil {
- twerr, ok := err.(twirp.Error)
- if !ok {
- twerr = twirp.InternalErrorWith(err)
- }
- callClientError(ctx, c.opts.Hooks, twerr)
- return nil, err
- }
-
- callClientResponseReceived(ctx, c.opts.Hooks)
-
- return out, nil
-}
-
-// =========================
-// Scheduling Server Handler
-// =========================
-
-type schedulingServer struct {
- Scheduling
- interceptor twirp.Interceptor
- hooks *twirp.ServerHooks
- pathPrefix string // prefix for routing
- jsonSkipDefaults bool // do not include unpopulated fields (default values) in the response
- jsonCamelCase bool // JSON fields are serialized as lowerCamelCase rather than keeping the original proto names
-}
-
-// NewSchedulingServer builds a TwirpServer that can be used as an http.Handler to handle
-// HTTP requests that are routed to the right method in the provided svc implementation.
-// The opts are twirp.ServerOption modifiers, for example twirp.WithServerHooks(hooks).
-func NewSchedulingServer(svc Scheduling, opts ...interface{}) TwirpServer {
- serverOpts := newServerOpts(opts)
-
- // Using ReadOpt allows backwards and forwards compatibility with new options in the future
- jsonSkipDefaults := false
- _ = serverOpts.ReadOpt("jsonSkipDefaults", &jsonSkipDefaults)
- jsonCamelCase := false
- _ = serverOpts.ReadOpt("jsonCamelCase", &jsonCamelCase)
- var pathPrefix string
- if ok := serverOpts.ReadOpt("pathPrefix", &pathPrefix); !ok {
- pathPrefix = "/twirp" // default prefix
- }
-
- return &schedulingServer{
- Scheduling: svc,
- hooks: serverOpts.Hooks,
- interceptor: twirp.ChainInterceptors(serverOpts.Interceptors...),
- pathPrefix: pathPrefix,
- jsonSkipDefaults: jsonSkipDefaults,
- jsonCamelCase: jsonCamelCase,
- }
-}
-
-// writeError writes an HTTP response with a valid Twirp error format, and triggers hooks.
-// If err is not a twirp.Error, it will get wrapped with twirp.InternalErrorWith(err)
-func (s *schedulingServer) writeError(ctx context.Context, resp http.ResponseWriter, err error) {
- writeError(ctx, resp, err, s.hooks)
-}
-
-// handleRequestBodyError is used to handle error when the twirp server cannot read request
-func (s *schedulingServer) handleRequestBodyError(ctx context.Context, resp http.ResponseWriter, msg string, err error) {
- if context.Canceled == ctx.Err() {
- s.writeError(ctx, resp, twirp.NewError(twirp.Canceled, "failed to read request: context canceled"))
- return
- }
- if context.DeadlineExceeded == ctx.Err() {
- s.writeError(ctx, resp, twirp.NewError(twirp.DeadlineExceeded, "failed to read request: deadline exceeded"))
- return
- }
- s.writeError(ctx, resp, twirp.WrapError(malformedRequestError(msg), err))
-}
-
-// SchedulingPathPrefix is a convenience constant that may identify URL paths.
-// Should be used with caution, it only matches routes generated by Twirp Go clients,
-// with the default "/twirp" prefix and default CamelCase service and method names.
-// More info: https://twitchtv.github.io/twirp/docs/routing.html
-const SchedulingPathPrefix = "/twirp/within.website.x.mimi.scheduling.Scheduling/"
-
-func (s *schedulingServer) ServeHTTP(resp http.ResponseWriter, req *http.Request) {
- ctx := req.Context()
- ctx = ctxsetters.WithPackageName(ctx, "within.website.x.mimi.scheduling")
- ctx = ctxsetters.WithServiceName(ctx, "Scheduling")
- ctx = ctxsetters.WithResponseWriter(ctx, resp)
-
- var err error
- ctx, err = callRequestReceived(ctx, s.hooks)
- if err != nil {
- s.writeError(ctx, resp, err)
- return
- }
-
- if req.Method != "POST" {
- msg := fmt.Sprintf("unsupported method %q (only POST is allowed)", req.Method)
- s.writeError(ctx, resp, badRouteError(msg, req.Method, req.URL.Path))
- return
- }
-
- // Verify path format: [<prefix>]/<package>.<Service>/<Method>
- prefix, pkgService, method := parseTwirpPath(req.URL.Path)
- if pkgService != "within.website.x.mimi.scheduling.Scheduling" {
- msg := fmt.Sprintf("no handler for path %q", req.URL.Path)
- s.writeError(ctx, resp, badRouteError(msg, req.Method, req.URL.Path))
- return
- }
- if prefix != s.pathPrefix {
- msg := fmt.Sprintf("invalid path prefix %q, expected %q, on path %q", prefix, s.pathPrefix, req.URL.Path)
- s.writeError(ctx, resp, badRouteError(msg, req.Method, req.URL.Path))
- return
- }
-
- switch method {
- case "ParseEmail":
- s.serveParseEmail(ctx, resp, req)
- return
- default:
- msg := fmt.Sprintf("no handler for path %q", req.URL.Path)
- s.writeError(ctx, resp, badRouteError(msg, req.Method, req.URL.Path))
- return
- }
-}
-
-func (s *schedulingServer) serveParseEmail(ctx context.Context, resp http.ResponseWriter, req *http.Request) {
- header := req.Header.Get("Content-Type")
- i := strings.Index(header, ";")
- if i == -1 {
- i = len(header)
- }
- switch strings.TrimSpace(strings.ToLower(header[:i])) {
- case "application/json":
- s.serveParseEmailJSON(ctx, resp, req)
- case "application/protobuf":
- s.serveParseEmailProtobuf(ctx, resp, req)
- default:
- msg := fmt.Sprintf("unexpected Content-Type: %q", req.Header.Get("Content-Type"))
- twerr := badRouteError(msg, req.Method, req.URL.Path)
- s.writeError(ctx, resp, twerr)
- }
-}
-
-func (s *schedulingServer) serveParseEmailJSON(ctx context.Context, resp http.ResponseWriter, req *http.Request) {
- var err error
- ctx = ctxsetters.WithMethodName(ctx, "ParseEmail")
- ctx, err = callRequestRouted(ctx, s.hooks)
- if err != nil {
- s.writeError(ctx, resp, err)
- return
- }
-
- d := json.NewDecoder(req.Body)
- rawReqBody := json.RawMessage{}
- if err := d.Decode(&rawReqBody); err != nil {
- s.handleRequestBodyError(ctx, resp, "the json request could not be decoded", err)
- return
- }
- reqContent := new(ParseReq)
- unmarshaler := protojson.UnmarshalOptions{DiscardUnknown: true}
- if err = unmarshaler.Unmarshal(rawReqBody, reqContent); err != nil {
- s.handleRequestBodyError(ctx, resp, "the json request could not be decoded", err)
- return
- }
-
- handler := s.Scheduling.ParseEmail
- if s.interceptor != nil {
- handler = func(ctx context.Context, req *ParseReq) (*ParseResp, error) {
- resp, err := s.interceptor(
- func(ctx context.Context, req interface{}) (interface{}, error) {
- typedReq, ok := req.(*ParseReq)
- if !ok {
- return nil, twirp.InternalError("failed type assertion req.(*ParseReq) when calling interceptor")
- }
- return s.Scheduling.ParseEmail(ctx, typedReq)
- },
- )(ctx, req)
- if resp != nil {
- typedResp, ok := resp.(*ParseResp)
- if !ok {
- return nil, twirp.InternalError("failed type assertion resp.(*ParseResp) when calling interceptor")
- }
- return typedResp, err
- }
- return nil, err
- }
- }
-
- // Call service method
- var respContent *ParseResp
- func() {
- defer ensurePanicResponses(ctx, resp, s.hooks)
- respContent, err = handler(ctx, reqContent)
- }()
-
- if err != nil {
- s.writeError(ctx, resp, err)
- return
- }
- if respContent == nil {
- s.writeError(ctx, resp, twirp.InternalError("received a nil *ParseResp and nil error while calling ParseEmail. nil responses are not supported"))
- return
- }
-
- ctx = callResponsePrepared(ctx, s.hooks)
-
- marshaler := &protojson.MarshalOptions{UseProtoNames: !s.jsonCamelCase, EmitUnpopulated: !s.jsonSkipDefaults}
- respBytes, err := marshaler.Marshal(respContent)
- if err != nil {
- s.writeError(ctx, resp, wrapInternal(err, "failed to marshal json response"))
- return
- }
-
- ctx = ctxsetters.WithStatusCode(ctx, http.StatusOK)
- resp.Header().Set("Content-Type", "application/json")
- resp.Header().Set("Content-Length", strconv.Itoa(len(respBytes)))
- resp.WriteHeader(http.StatusOK)
-
- if n, err := resp.Write(respBytes); err != nil {
- msg := fmt.Sprintf("failed to write response, %d of %d bytes written: %s", n, len(respBytes), err.Error())
- twerr := twirp.NewError(twirp.Unknown, msg)
- ctx = callError(ctx, s.hooks, twerr)
- }
- callResponseSent(ctx, s.hooks)
-}
-
-func (s *schedulingServer) serveParseEmailProtobuf(ctx context.Context, resp http.ResponseWriter, req *http.Request) {
- var err error
- ctx = ctxsetters.WithMethodName(ctx, "ParseEmail")
- ctx, err = callRequestRouted(ctx, s.hooks)
- if err != nil {
- s.writeError(ctx, resp, err)
- return
- }
-
- buf, err := io.ReadAll(req.Body)
- if err != nil {
- s.handleRequestBodyError(ctx, resp, "failed to read request body", err)
- return
- }
- reqContent := new(ParseReq)
- if err = proto.Unmarshal(buf, reqContent); err != nil {
- s.writeError(ctx, resp, malformedRequestError("the protobuf request could not be decoded"))
- return
- }
-
- handler := s.Scheduling.ParseEmail
- if s.interceptor != nil {
- handler = func(ctx context.Context, req *ParseReq) (*ParseResp, error) {
- resp, err := s.interceptor(
- func(ctx context.Context, req interface{}) (interface{}, error) {
- typedReq, ok := req.(*ParseReq)
- if !ok {
- return nil, twirp.InternalError("failed type assertion req.(*ParseReq) when calling interceptor")
- }
- return s.Scheduling.ParseEmail(ctx, typedReq)
- },
- )(ctx, req)
- if resp != nil {
- typedResp, ok := resp.(*ParseResp)
- if !ok {
- return nil, twirp.InternalError("failed type assertion resp.(*ParseResp) when calling interceptor")
- }
- return typedResp, err
- }
- return nil, err
- }
- }
-
- // Call service method
- var respContent *ParseResp
- func() {
- defer ensurePanicResponses(ctx, resp, s.hooks)
- respContent, err = handler(ctx, reqContent)
- }()
-
- if err != nil {
- s.writeError(ctx, resp, err)
- return
- }
- if respContent == nil {
- s.writeError(ctx, resp, twirp.InternalError("received a nil *ParseResp and nil error while calling ParseEmail. nil responses are not supported"))
- return
- }
-
- ctx = callResponsePrepared(ctx, s.hooks)
-
- respBytes, err := proto.Marshal(respContent)
- if err != nil {
- s.writeError(ctx, resp, wrapInternal(err, "failed to marshal proto response"))
- return
- }
-
- ctx = ctxsetters.WithStatusCode(ctx, http.StatusOK)
- resp.Header().Set("Content-Type", "application/protobuf")
- resp.Header().Set("Content-Length", strconv.Itoa(len(respBytes)))
- resp.WriteHeader(http.StatusOK)
- if n, err := resp.Write(respBytes); err != nil {
- msg := fmt.Sprintf("failed to write response, %d of %d bytes written: %s", n, len(respBytes), err.Error())
- twerr := twirp.NewError(twirp.Unknown, msg)
- ctx = callError(ctx, s.hooks, twerr)
- }
- callResponseSent(ctx, s.hooks)
-}
-
-func (s *schedulingServer) ServiceDescriptor() ([]byte, int) {
- return twirpFileDescriptor0, 0
-}
-
-func (s *schedulingServer) ProtocGenTwirpVersion() string {
- return "v8.1.3"
-}
-
-// PathPrefix returns the base service path, in the form: "/<prefix>/<package>.<Service>/"
-// that is everything in a Twirp route except for the <Method>. This can be used for routing,
-// for example to identify the requests that are targeted to this service in a mux.
-func (s *schedulingServer) PathPrefix() string {
- return baseServicePath(s.pathPrefix, "within.website.x.mimi.scheduling", "Scheduling")
-}
-
-// =====
-// Utils
-// =====
-
-// HTTPClient is the interface used by generated clients to send HTTP requests.
-// It is fulfilled by *(net/http).Client, which is sufficient for most users.
-// Users can provide their own implementation for special retry policies.
-//
-// HTTPClient implementations should not follow redirects. Redirects are
-// automatically disabled if *(net/http).Client is passed to client
-// constructors. See the withoutRedirects function in this file for more
-// details.
-type HTTPClient interface {
- Do(req *http.Request) (*http.Response, error)
-}
-
-// TwirpServer is the interface generated server structs will support: they're
-// HTTP handlers with additional methods for accessing metadata about the
-// service. Those accessors are a low-level API for building reflection tools.
-// Most people can think of TwirpServers as just http.Handlers.
-type TwirpServer interface {
- http.Handler
-
- // ServiceDescriptor returns gzipped bytes describing the .proto file that
- // this service was generated from. Once unzipped, the bytes can be
- // unmarshalled as a
- // google.golang.org/protobuf/types/descriptorpb.FileDescriptorProto.
- //
- // The returned integer is the index of this particular service within that
- // FileDescriptorProto's 'Service' slice of ServiceDescriptorProtos. This is a
- // low-level field, expected to be used for reflection.
- ServiceDescriptor() ([]byte, int)
-
- // ProtocGenTwirpVersion is the semantic version string of the version of
- // twirp used to generate this file.
- ProtocGenTwirpVersion() string
-
- // PathPrefix returns the HTTP URL path prefix for all methods handled by this
- // service. This can be used with an HTTP mux to route Twirp requests.
- // The path prefix is in the form: "/<prefix>/<package>.<Service>/"
- // that is, everything in a Twirp route except for the <Method> at the end.
- PathPrefix() string
-}
-
-func newServerOpts(opts []interface{}) *twirp.ServerOptions {
- serverOpts := &twirp.ServerOptions{}
- for _, opt := range opts {
- switch o := opt.(type) {
- case twirp.ServerOption:
- o(serverOpts)
- case *twirp.ServerHooks: // backwards compatibility, allow to specify hooks as an argument
- twirp.WithServerHooks(o)(serverOpts)
- case nil: // backwards compatibility, allow nil value for the argument
- continue
- default:
- panic(fmt.Sprintf("Invalid option type %T, please use a twirp.ServerOption", o))
- }
- }
- return serverOpts
-}
-
-// WriteError writes an HTTP response with a valid Twirp error format (code, msg, meta).
-// Useful outside of the Twirp server (e.g. http middleware), but does not trigger hooks.
-// If err is not a twirp.Error, it will get wrapped with twirp.InternalErrorWith(err)
-func WriteError(resp http.ResponseWriter, err error) {
- writeError(context.Background(), resp, err, nil)
-}
-
-// writeError writes Twirp errors in the response and triggers hooks.
-func writeError(ctx context.Context, resp http.ResponseWriter, err error, hooks *twirp.ServerHooks) {
- // Convert to a twirp.Error. Non-twirp errors are converted to internal errors.
- var twerr twirp.Error
- if !errors.As(err, &twerr) {
- twerr = twirp.InternalErrorWith(err)
- }
-
- statusCode := twirp.ServerHTTPStatusFromErrorCode(twerr.Code())
- ctx = ctxsetters.WithStatusCode(ctx, statusCode)
- ctx = callError(ctx, hooks, twerr)
-
- respBody := marshalErrorToJSON(twerr)
-
- resp.Header().Set("Content-Type", "application/json") // Error responses are always JSON
- resp.Header().Set("Content-Length", strconv.Itoa(len(respBody)))
- resp.WriteHeader(statusCode) // set HTTP status code and send response
-
- _, writeErr := resp.Write(respBody)
- if writeErr != nil {
- // We have three options here. We could log the error, call the Error
- // hook, or just silently ignore the error.
- //
- // Logging is unacceptable because we don't have a user-controlled
- // logger; writing out to stderr without permission is too rude.
- //
- // Calling the Error hook would confuse users: it would mean the Error
- // hook got called twice for one request, which is likely to lead to
- // duplicated log messages and metrics, no matter how well we document
- // the behavior.
- //
- // Silently ignoring the error is our least-bad option. It's highly
- // likely that the connection is broken and the original 'err' says
- // so anyway.
- _ = writeErr
- }
-
- callResponseSent(ctx, hooks)
-}
-
-// sanitizeBaseURL parses the the baseURL, and adds the "http" scheme if needed.
-// If the URL is unparsable, the baseURL is returned unchanged.
-func sanitizeBaseURL(baseURL string) string {
- u, err := url.Parse(baseURL)
- if err != nil {
- return baseURL // invalid URL will fail later when making requests
- }
- if u.Scheme == "" {
- u.Scheme = "http"
- }
- return u.String()
-}
-
-// baseServicePath composes the path prefix for the service (without <Method>).
-// e.g.: baseServicePath("/twirp", "my.pkg", "MyService")
-//
-// returns => "/twirp/my.pkg.MyService/"
-//
-// e.g.: baseServicePath("", "", "MyService")
-//
-// returns => "/MyService/"
-func baseServicePath(prefix, pkg, service string) string {
- fullServiceName := service
- if pkg != "" {
- fullServiceName = pkg + "." + service
- }
- return path.Join("/", prefix, fullServiceName) + "/"
-}
-
-// parseTwirpPath extracts path components form a valid Twirp route.
-// Expected format: "[<prefix>]/<package>.<Service>/<Method>"
-// e.g.: prefix, pkgService, method := parseTwirpPath("/twirp/pkg.Svc/MakeHat")
-func parseTwirpPath(path string) (string, string, string) {
- parts := strings.Split(path, "/")
- if len(parts) < 2 {
- return "", "", ""
- }
- method := parts[len(parts)-1]
- pkgService := parts[len(parts)-2]
- prefix := strings.Join(parts[0:len(parts)-2], "/")
- return prefix, pkgService, method
-}
-
-// getCustomHTTPReqHeaders retrieves a copy of any headers that are set in
-// a context through the twirp.WithHTTPRequestHeaders function.
-// If there are no headers set, or if they have the wrong type, nil is returned.
-func getCustomHTTPReqHeaders(ctx context.Context) http.Header {
- header, ok := twirp.HTTPRequestHeaders(ctx)
- if !ok || header == nil {
- return nil
- }
- copied := make(http.Header)
- for k, vv := range header {
- if vv == nil {
- copied[k] = nil
- continue
- }
- copied[k] = make([]string, len(vv))
- copy(copied[k], vv)
- }
- return copied
-}
-
-// newRequest makes an http.Request from a client, adding common headers.
-func newRequest(ctx context.Context, url string, reqBody io.Reader, contentType string) (*http.Request, error) {
- req, err := http.NewRequest("POST", url, reqBody)
- if err != nil {
- return nil, err
- }
- req = req.WithContext(ctx)
- if customHeader := getCustomHTTPReqHeaders(ctx); customHeader != nil {
- req.Header = customHeader
- }
- req.Header.Set("Accept", contentType)
- req.Header.Set("Content-Type", contentType)
- req.Header.Set("Twirp-Version", "v8.1.3")
- return req, nil
-}
-
-// JSON serialization for errors
-type twerrJSON struct {
- Code string `json:"code"`
- Msg string `json:"msg"`
- Meta map[string]string `json:"meta,omitempty"`
-}
-
-// marshalErrorToJSON returns JSON from a twirp.Error, that can be used as HTTP error response body.
-// If serialization fails, it will use a descriptive Internal error instead.
-func marshalErrorToJSON(twerr twirp.Error) []byte {
- // make sure that msg is not too large
- msg := twerr.Msg()
- if len(msg) > 1e6 {
- msg = msg[:1e6]
- }
-
- tj := twerrJSON{
- Code: string(twerr.Code()),
- Msg: msg,
- Meta: twerr.MetaMap(),
- }
-
- buf, err := json.Marshal(&tj)
- if err != nil {
- buf = []byte("{\"type\": \"" + twirp.Internal + "\", \"msg\": \"There was an error but it could not be serialized into JSON\"}") // fallback
- }
-
- return buf
-}
-
-// errorFromResponse builds a twirp.Error from a non-200 HTTP response.
-// If the response has a valid serialized Twirp error, then it's returned.
-// If not, the response status code is used to generate a similar twirp
-// error. See twirpErrorFromIntermediary for more info on intermediary errors.
-func errorFromResponse(resp *http.Response) twirp.Error {
- statusCode := resp.StatusCode
- statusText := http.StatusText(statusCode)
-
- if isHTTPRedirect(statusCode) {
- // Unexpected redirect: it must be an error from an intermediary.
- // Twirp clients don't follow redirects automatically, Twirp only handles
- // POST requests, redirects should only happen on GET and HEAD requests.
- location := resp.Header.Get("Location")
- msg := fmt.Sprintf("unexpected HTTP status code %d %q received, Location=%q", statusCode, statusText, location)
- return twirpErrorFromIntermediary(statusCode, msg, location)
- }
-
- respBodyBytes, err := io.ReadAll(resp.Body)
- if err != nil {
- return wrapInternal(err, "failed to read server error response body")
- }
-
- var tj twerrJSON
- dec := json.NewDecoder(bytes.NewReader(respBodyBytes))
- dec.DisallowUnknownFields()
- if err := dec.Decode(&tj); err != nil || tj.Code == "" {
- // Invalid JSON response; it must be an error from an intermediary.
- msg := fmt.Sprintf("Error from intermediary with HTTP status code %d %q", statusCode, statusText)
- return twirpErrorFromIntermediary(statusCode, msg, string(respBodyBytes))
- }
-
- errorCode := twirp.ErrorCode(tj.Code)
- if !twirp.IsValidErrorCode(errorCode) {
- msg := "invalid type returned from server error response: " + tj.Code
- return twirp.InternalError(msg).WithMeta("body", string(respBodyBytes))
- }
-
- twerr := twirp.NewError(errorCode, tj.Msg)
- for k, v := range tj.Meta {
- twerr = twerr.WithMeta(k, v)
- }
- return twerr
-}
-
-// twirpErrorFromIntermediary maps HTTP errors from non-twirp sources to twirp errors.
-// The mapping is similar to gRPC: https://github.com/grpc/grpc/blob/master/doc/http-grpc-status-mapping.md.
-// Returned twirp Errors have some additional metadata for inspection.
-func twirpErrorFromIntermediary(status int, msg string, bodyOrLocation string) twirp.Error {
- var code twirp.ErrorCode
- if isHTTPRedirect(status) { // 3xx
- code = twirp.Internal
- } else {
- switch status {
- case 400: // Bad Request
- code = twirp.Internal
- case 401: // Unauthorized
- code = twirp.Unauthenticated
- case 403: // Forbidden
- code = twirp.PermissionDenied
- case 404: // Not Found
- code = twirp.BadRoute
- case 429: // Too Many Requests
- code = twirp.ResourceExhausted
- case 502, 503, 504: // Bad Gateway, Service Unavailable, Gateway Timeout
- code = twirp.Unavailable
- default: // All other codes
- code = twirp.Unknown
- }
- }
-
- twerr := twirp.NewError(code, msg)
- twerr = twerr.WithMeta("http_error_from_intermediary", "true") // to easily know if this error was from intermediary
- twerr = twerr.WithMeta("status_code", strconv.Itoa(status))
- if isHTTPRedirect(status) {
- twerr = twerr.WithMeta("location", bodyOrLocation)
- } else {
- twerr = twerr.WithMeta("body", bodyOrLocation)
- }
- return twerr
-}
-
-func isHTTPRedirect(status int) bool {
- return status >= 300 && status <= 399
-}
-
-// wrapInternal wraps an error with a prefix as an Internal error.
-// The original error cause is accessible by github.com/pkg/errors.Cause.
-func wrapInternal(err error, prefix string) twirp.Error {
- return twirp.InternalErrorWith(&wrappedError{prefix: prefix, cause: err})
-}
-
-type wrappedError struct {
- prefix string
- cause error
-}
-
-func (e *wrappedError) Error() string { return e.prefix + ": " + e.cause.Error() }
-func (e *wrappedError) Unwrap() error { return e.cause } // for go1.13 + errors.Is/As
-func (e *wrappedError) Cause() error { return e.cause } // for github.com/pkg/errors
-
-// ensurePanicResponses makes sure that rpc methods causing a panic still result in a Twirp Internal
-// error response (status 500), and error hooks are properly called with the panic wrapped as an error.
-// The panic is re-raised so it can be handled normally with middleware.
-func ensurePanicResponses(ctx context.Context, resp http.ResponseWriter, hooks *twirp.ServerHooks) {
- if r := recover(); r != nil {
- // Wrap the panic as an error so it can be passed to error hooks.
- // The original error is accessible from error hooks, but not visible in the response.
- err := errFromPanic(r)
- twerr := &internalWithCause{msg: "Internal service panic", cause: err}
- // Actually write the error
- writeError(ctx, resp, twerr, hooks)
- // If possible, flush the error to the wire.
- f, ok := resp.(http.Flusher)
- if ok {
- f.Flush()
- }
-
- panic(r)
- }
-}
-
-// errFromPanic returns the typed error if the recovered panic is an error, otherwise formats as error.
-func errFromPanic(p interface{}) error {
- if err, ok := p.(error); ok {
- return err
- }
- return fmt.Errorf("panic: %v", p)
-}
-
-// internalWithCause is a Twirp Internal error wrapping an original error cause,
-// but the original error message is not exposed on Msg(). The original error
-// can be checked with go1.13+ errors.Is/As, and also by (github.com/pkg/errors).Unwrap
-type internalWithCause struct {
- msg string
- cause error
-}
-
-func (e *internalWithCause) Unwrap() error { return e.cause } // for go1.13 + errors.Is/As
-func (e *internalWithCause) Cause() error { return e.cause } // for github.com/pkg/errors
-func (e *internalWithCause) Error() string { return e.msg + ": " + e.cause.Error() }
-func (e *internalWithCause) Code() twirp.ErrorCode { return twirp.Internal }
-func (e *internalWithCause) Msg() string { return e.msg }
-func (e *internalWithCause) Meta(key string) string { return "" }
-func (e *internalWithCause) MetaMap() map[string]string { return nil }
-func (e *internalWithCause) WithMeta(key string, val string) twirp.Error { return e }
-
-// malformedRequestError is used when the twirp server cannot unmarshal a request
-func malformedRequestError(msg string) twirp.Error {
- return twirp.NewError(twirp.Malformed, msg)
-}
-
-// badRouteError is used when the twirp server cannot route a request
-func badRouteError(msg string, method, url string) twirp.Error {
- err := twirp.NewError(twirp.BadRoute, msg)
- err = err.WithMeta("twirp_invalid_route", method+" "+url)
- return err
-}
-
-// withoutRedirects makes sure that the POST request can not be redirected.
-// The standard library will, by default, redirect requests (including POSTs) if it gets a 302 or
-// 303 response, and also 301s in go1.8. It redirects by making a second request, changing the
-// method to GET and removing the body. This produces very confusing error messages, so instead we
-// set a redirect policy that always errors. This stops Go from executing the redirect.
-//
-// We have to be a little careful in case the user-provided http.Client has its own CheckRedirect
-// policy - if so, we'll run through that policy first.
-//
-// Because this requires modifying the http.Client, we make a new copy of the client and return it.
-func withoutRedirects(in *http.Client) *http.Client {
- copy := *in
- copy.CheckRedirect = func(req *http.Request, via []*http.Request) error {
- if in.CheckRedirect != nil {
- // Run the input's redirect if it exists, in case it has side effects, but ignore any error it
- // returns, since we want to use ErrUseLastResponse.
- err := in.CheckRedirect(req, via)
- _ = err // Silly, but this makes sure generated code passes errcheck -blank, which some people use.
- }
- return http.ErrUseLastResponse
- }
- return &copy
-}
-
-// doProtobufRequest makes a Protobuf request to the remote Twirp service.
-func doProtobufRequest(ctx context.Context, client HTTPClient, hooks *twirp.ClientHooks, url string, in, out proto.Message) (_ context.Context, err error) {
- reqBodyBytes, err := proto.Marshal(in)
- if err != nil {
- return ctx, wrapInternal(err, "failed to marshal proto request")
- }
- reqBody := bytes.NewBuffer(reqBodyBytes)
- if err = ctx.Err(); err != nil {
- return ctx, wrapInternal(err, "aborted because context was done")
- }
-
- req, err := newRequest(ctx, url, reqBody, "application/protobuf")
- if err != nil {
- return ctx, wrapInternal(err, "could not build request")
- }
- ctx, err = callClientRequestPrepared(ctx, hooks, req)
- if err != nil {
- return ctx, err
- }
-
- req = req.WithContext(ctx)
- resp, err := client.Do(req)
- if err != nil {
- return ctx, wrapInternal(err, "failed to do request")
- }
- defer func() { _ = resp.Body.Close() }()
-
- if err = ctx.Err(); err != nil {
- return ctx, wrapInternal(err, "aborted because context was done")
- }
-
- if resp.StatusCode != 200 {
- return ctx, errorFromResponse(resp)
- }
-
- respBodyBytes, err := io.ReadAll(resp.Body)
- if err != nil {
- return ctx, wrapInternal(err, "failed to read response body")
- }
- if err = ctx.Err(); err != nil {
- return ctx, wrapInternal(err, "aborted because context was done")
- }
-
- if err = proto.Unmarshal(respBodyBytes, out); err != nil {
- return ctx, wrapInternal(err, "failed to unmarshal proto response")
- }
- return ctx, nil
-}
-
-// doJSONRequest makes a JSON request to the remote Twirp service.
-func doJSONRequest(ctx context.Context, client HTTPClient, hooks *twirp.ClientHooks, url string, in, out proto.Message) (_ context.Context, err error) {
- marshaler := &protojson.MarshalOptions{UseProtoNames: true}
- reqBytes, err := marshaler.Marshal(in)
- if err != nil {
- return ctx, wrapInternal(err, "failed to marshal json request")
- }
- if err = ctx.Err(); err != nil {
- return ctx, wrapInternal(err, "aborted because context was done")
- }
-
- req, err := newRequest(ctx, url, bytes.NewReader(reqBytes), "application/json")
- if err != nil {
- return ctx, wrapInternal(err, "could not