-
Notifications
You must be signed in to change notification settings - Fork 2
/
twikey.go
148 lines (124 loc) · 3.5 KB
/
twikey.go
1
2
3
4
5
6
7
8
9
10
11
12
13
14
15
16
17
18
19
20
21
22
23
24
25
26
27
28
29
30
31
32
33
34
35
36
37
38
39
40
41
42
43
44
45
46
47
48
49
50
51
52
53
54
55
56
57
58
59
60
61
62
63
64
65
66
67
68
69
70
71
72
73
74
75
76
77
78
79
80
81
82
83
84
85
86
87
88
89
90
91
92
93
94
95
96
97
98
99
100
101
102
103
104
105
106
107
108
109
110
111
112
113
114
115
116
117
118
119
120
121
122
123
124
125
126
127
128
129
130
131
132
133
134
135
136
137
138
139
140
141
142
143
144
145
146
147
148
// Package twikey provides the bindings for Twikey REST APIs.
package twikey
import (
"crypto/hmac"
"crypto/sha256"
"encoding/hex"
"encoding/json"
"io/ioutil"
"log"
"net/http"
"net/url"
"strings"
"time"
)
const (
baseURLV1 = "https://api.twikey.com"
twikeyBaseAgent = "twikey-api/go-v0.1.1"
)
type HTTPClient interface {
Do(req *http.Request) (*http.Response, error)
}
type TimeProvider interface {
Now() time.Time
}
type DefaultTimeProvider struct{}
func (tp DefaultTimeProvider) Now() time.Time {
return time.Now()
}
// Client is the base class, please use a dedicated UserAgent so we can notify the emergency contact
// if weird behaviour is perceived.
type Client struct {
BaseURL string
APIKey string
PrivateKey string
Salt string
UserAgent string
HTTPClient HTTPClient
Debug *log.Logger
apiToken string
lastLogin time.Time
timeProvider TimeProvider
}
// NewClient is a convenience method to hit the ground running with the Twikey Rest API
func NewClient(apiKey string) *Client {
logger := log.Default()
logger.SetOutput(ioutil.Discard)
return &Client{
BaseURL: baseURLV1,
APIKey: apiKey,
Salt: "own",
UserAgent: twikeyBaseAgent,
HTTPClient: &http.Client{
Timeout: time.Minute,
},
Debug: logger,
timeProvider: DefaultTimeProvider{},
}
}
type errorResponse struct {
Code string `json:"code"`
Message string `json:"message"` // translated according to Accept-Language
Extra string `json:"extra"`
}
// Ping Try the current credentials
func (c *Client) Ping() error {
if err := c.refreshTokenIfRequired(); err != nil {
return err
}
return nil
}
func (c *Client) sendRequest(req *http.Request, v interface{}) error {
if err := c.refreshTokenIfRequired(); err != nil {
return err
}
req.Header.Set("Content-Type", "application/x-www-form-urlencoded")
req.Header.Set("User-Agent", c.UserAgent)
req.Header.Set("Accept", "application/json")
req.Header.Set("Authorization", c.apiToken)
c.Debug.Println("Calling", req.Method, req.URL)
res, err := c.HTTPClient.Do(req)
if err != nil {
c.Debug.Println("Error while connecting", err)
return err
}
payload, _ := ioutil.ReadAll(res.Body)
_ = res.Body.Close()
c.Debug.Println("Response for", req.Method, req.URL, "was", string(payload))
if res.StatusCode < http.StatusOK || res.StatusCode >= http.StatusBadRequest {
if res.Header.Get("Apierror") == "err_no_login" {
c.Debug.Println("Error while using apitoken, renewing")
c.lastLogin = time.Time{} // force re-authenticate
}
var errRes errorResponse
if err = json.Unmarshal(payload, &errRes); err == nil {
return NewTwikeyError(errRes.Code, errRes.Message, errRes.Extra)
}
return NewTwikeyErrorFromResponse(res)
}
if v == nil {
return nil
}
if err = json.Unmarshal(payload, v); err != nil {
return NewTwikeyError("system_error", err.Error(), "")
}
return nil
}
// VerifyWebhook allows the verification of incoming webhooks.
func (c *Client) VerifyWebhook(signatureHeader string, payload string) error {
hash := hmac.New(sha256.New, []byte(c.APIKey))
if _, err := hash.Write([]byte(payload)); err != nil {
c.Debug.Println("Error cannot compute the HMAC for request: ", err)
return err
}
expectedHash := strings.ToUpper(hex.EncodeToString(hash.Sum(nil)))
if signatureHeader == expectedHash {
return nil
}
return NewTwikeyError("invalid_params", "Invalid value", "")
}
func addIfExists(params url.Values, paramKey string, value string) {
if value != "" {
params.Add(paramKey, value)
}
}