138 lines
3.6 KiB
Go
138 lines
3.6 KiB
Go
package main
|
|
|
|
import (
|
|
"bytes"
|
|
"crypto/tls"
|
|
"crypto/x509"
|
|
"flag"
|
|
"fmt"
|
|
"io"
|
|
"io/ioutil"
|
|
"net/http"
|
|
"os"
|
|
"strings"
|
|
"time"
|
|
|
|
"gitlab-app.eng.qops.net/golang/jwt"
|
|
)
|
|
|
|
func main() {
|
|
var bodyRepeat int
|
|
var path, host, method, body, headers, brandID, issuer string
|
|
var ca, cert, key, secret string
|
|
var needJWT, verbose bool
|
|
var timeout time.Duration
|
|
flag.StringVar(&method, "method", "get", "method for request")
|
|
flag.StringVar(&path, "path", "fieldsetdefinitions/v1/index/surveys/SV_031sm3MMOPSa8Tz/fieldsets?assumeHasPermission=true", "path for request")
|
|
flag.StringVar(&host, "host", "data-platform.service.b1-prv.consul:8080", "host and port for request")
|
|
flag.StringVar(&body, "body", "", "body for request")
|
|
flag.IntVar(&bodyRepeat, "bodyrepeat", 1, "repeat body for request")
|
|
flag.StringVar(&brandID, "brand", "testencresponse", "brandID for request JWT")
|
|
flag.StringVar(&headers, "headers", "", "headers as k=v,k=v for request")
|
|
flag.StringVar(&issuer, "issuer", "dataprocessing,responseengine,fieldset-definitions,qualtrics,objectstore,svs,monolith,ex,blixt,null,responseengine", "issuer for jwt")
|
|
flag.BoolVar(&needJWT, "jwt", true, "need jwt boolean")
|
|
flag.BoolVar(&verbose, "v", false, "is verbose")
|
|
flag.DurationVar(&timeout, "t", time.Second*10, "request timeout")
|
|
flag.StringVar(&ca, "ca", "", "ca for server")
|
|
flag.StringVar(&cert, "cert", "", "cert for client")
|
|
flag.StringVar(&key, "key", "", "key for client")
|
|
flag.StringVar(&secret, "secret", "dnKgzTPNZyEd2Kfop", "secret for jwt")
|
|
flag.Parse()
|
|
|
|
if !strings.HasPrefix(host, "http") {
|
|
host = "http://" + host
|
|
}
|
|
|
|
c := makeClient(timeout, ca, cert, key)
|
|
var reqBody io.Reader
|
|
if bodyRepeat >= 1 {
|
|
reqBody = strings.NewReader(strings.Repeat(body, bodyRepeat))
|
|
} else {
|
|
reqBody = os.Stdin
|
|
}
|
|
req, err := http.NewRequest(
|
|
strings.ToUpper(method),
|
|
host+"/"+strings.Trim(path, "/"),
|
|
reqBody,
|
|
)
|
|
if err != nil {
|
|
panic(err)
|
|
}
|
|
if len(headers) > 0 {
|
|
for _, pair := range strings.Split(headers, ",") {
|
|
kv := strings.Split(pair, "=")
|
|
req.Header.Add(kv[0], kv[1])
|
|
}
|
|
}
|
|
if needJWT {
|
|
setJWT(req, brandID, issuer, secret)
|
|
}
|
|
|
|
if verbose {
|
|
fmt.Fprintf(os.Stderr, "%v\n", req)
|
|
}
|
|
resp, err := c.Do(req)
|
|
if err != nil {
|
|
fmt.Println("DO FAILED:", err)
|
|
return
|
|
}
|
|
b, err := ioutil.ReadAll(resp.Body)
|
|
if err != nil {
|
|
fmt.Println("READ BODY FAILED:", err)
|
|
return
|
|
}
|
|
defer resp.Body.Close()
|
|
|
|
fmt.Fprintf(os.Stderr, "(%d) ", resp.StatusCode)
|
|
fmt.Printf("%s\n", bytes.TrimSpace(b))
|
|
}
|
|
|
|
func makeClient(timeout time.Duration, ca, cert, key string) *http.Client {
|
|
transport := &http.Transport{
|
|
TLSClientConfig: &tls.Config{},
|
|
}
|
|
if ca == "" {
|
|
transport.TLSClientConfig.InsecureSkipVerify = true
|
|
} else {
|
|
caBytes, err := ioutil.ReadFile(ca)
|
|
if err != nil {
|
|
panic(err)
|
|
}
|
|
rootCAs := x509.NewCertPool()
|
|
rootCAs.AppendCertsFromPEM(caBytes)
|
|
transport.TLSClientConfig.RootCAs = rootCAs
|
|
}
|
|
if cert != "" && key != "" {
|
|
clientCert, err := tls.LoadX509KeyPair(cert, key)
|
|
if err != nil {
|
|
panic(err)
|
|
}
|
|
transport.TLSClientConfig.Certificates = []tls.Certificate{clientCert}
|
|
transport.TLSClientConfig.BuildNameToCertificate()
|
|
}
|
|
return &http.Client{
|
|
Timeout: timeout,
|
|
Transport: transport,
|
|
}
|
|
}
|
|
|
|
func setJWT(r *http.Request, brandID string, issuer string, secret string) {
|
|
signer := &jwt.Signer{
|
|
Key: []byte(secret),
|
|
DefaultClaims: jwt.Claims{
|
|
Audience: "qualtrics",
|
|
Issuer: issuer,
|
|
UserID: "breel",
|
|
BrandID: brandID,
|
|
Custom: map[string]interface{}{
|
|
"IsolationPartitionID": brandID,
|
|
},
|
|
},
|
|
IncludeBodyHash: true,
|
|
}
|
|
|
|
if err := signer.Sign(r, jwt.Claims{}); err != nil {
|
|
panic(err)
|
|
}
|
|
}
|