@lblod/mu-auth-sudo 0.5.1 → 0.6.0

This diff represents the content of publicly available package versions that have been released to one of the supported registries. The information contained in this diff is provided for informational purposes only and reflects changes between package versions as they appear in their respective public registries.
package/README.md CHANGED
@@ -1,5 +1,5 @@
1
1
  # mu-auth-sudo
2
- NPM package for a sparql client for mu.semte.ch that overrules access rights in queries through a mu-auth-sudo header.
2
+ NPM package for a SPARQL client for mu.semte.ch that overrules access rights in queries through a mu-auth-sudo header.
3
3
 
4
4
  ## Usage
5
5
  ```
@@ -13,7 +13,7 @@ import { querySudo as query, updateSudo as update } from '@lblod/mu-auth-sudo';
13
13
 
14
14
  //Examples
15
15
 
16
- // To run a normal query
16
+ // To run a regular query
17
17
 
18
18
  const queryString = `SELECT * FROM { GRAPH ?g { ?s ?p ?o. } } LIMIT 1`;
19
19
  await query(queryString);
@@ -24,9 +24,11 @@ const updateString = `INSERT DATA { GRAPH <http://foo> { <http://bar> <http://ba
24
24
  const extraHeaders = { 'mu-call-scope-id': 'http://foo/bar', 'other-info'; 'hello' };
25
25
  await update(updateString, extraHeaders);
26
26
 
27
- // With custom sparqlEndpoint (this should be exceptional, make sure you know what you're doing)
27
+ // With custom connection options (this should be exceptional, make sure you know what you're doing)
28
28
 
29
- await update(updateString, extraHeaders, 'http://the.sparql.endpoint/sparql');
29
+ const connectionOptions = { sparqlEndpoint: 'http://the.custom.endpoint/sparql', mayRetry: true };
30
+
31
+ await update(updateString, extraHeaders, connectionOptions);
30
32
  ```
31
33
 
32
34
  ## Logging
@@ -39,3 +41,13 @@ The verbosity of logging can be configured as in the [javascript template](https
39
41
  - `DEBUG_AUTH_HEADERS`: Debugging of [mu-authorization](https://github.com/mu-semtech/mu-authorization) access-control related headers (default `true`)
40
42
 
41
43
  Following values are considered true: [`"true"`, `"TRUE"`, `"1"`].
44
+
45
+ ## Retrying
46
+ You can tweak system-wide retry parameters. These should be considered internal, but tweaking them may help in extreme scenarios. Use with extreme caution.
47
+
48
+ - `SUDO_QUERY_RETRY`: System-wide configuration to enable the retry-mechanism (default `'false'`).
49
+ Warning: this overules eventual source-code specifications (i.e. `connectionOptions = { mayRetry: false }`), so make sure you know what you're doing.
50
+ - `SUDO_QUERY_RETRY_MAX_ATTEMPTS`: Specfiy the number of max retry attempts (default: 5)
51
+ - `SUDO_QUERY_RETRY_FOR_HTTP_STATUS_CODES`: Specify what returned HTTP status from the database are allowed for retry. (default: `''`). Overriding this list should be considered case by case.
52
+ - `SUDO_QUERY_RETRY_FOR_CONNECTION_ERRORS`: Specify what connection errors are allowed for retry. (default: `'ECONNRESET,ETIMEDOUT,EAI_AGAIN'`)
53
+ - `SUDO_QUERY_RETRY_TIMEOUT_INCREMENT_FACTOR`: Specify the factor applied to the timeout before the next attempt. Check implementation to see how it is calculated. (default: `'0.3'`)
package/dist/auth-sudo.js CHANGED
@@ -21,11 +21,24 @@ var LOG_SPARQL_QUERIES = process.env.LOG_SPARQL_QUERIES != undefined ? _envVar2.
21
21
  var LOG_SPARQL_UPDATES = process.env.LOG_SPARQL_UPDATES != undefined ? _envVar2.default.get('LOG_SPARQL_UPDATES').asBool() : _envVar2.default.get('LOG_SPARQL_ALL').asBool();
22
22
  var DEBUG_AUTH_HEADERS = _envVar2.default.get('DEBUG_AUTH_HEADERS').asBool();
23
23
 
24
+ // The following configuration options are considered optional, but may be overriden as a temporary workaround for issues. Thus, a last resort.
25
+ var RETRY = _envVar2.default.get('SUDO_QUERY_RETRY').default('false').asBool();
26
+ var RETRY_MAX_ATTEMPTS = _envVar2.default.get('SUDO_QUERY_RETRY_MAX_ATTEMPTS').default('5').asInt();
27
+ var RETRY_FOR_HTTP_STATUS_CODES = _envVar2.default.get('SUDO_QUERY_RETRY_FOR_HTTP_STATUS_CODES').default('').asArray();
28
+ var RETRY_FOR_CONNECTION_ERRORS = _envVar2.default.get('SUDO_QUERY_RETRY_FOR_CONNECTION_ERRORS').default('ECONNRESET,ETIMEDOUT,EAI_AGAIN').asArray();
29
+ var RETRY_TIMEOUT_INCREMENT_FACTOR = _envVar2.default.get('SUDO_QUERY_RETRY_TIMEOUT_INCREMENT_FACTOR').default('0.3').asFloat();
30
+
24
31
  function sudoSparqlClient() {
25
32
  var extraHeaders = arguments.length > 0 && arguments[0] !== undefined ? arguments[0] : {};
26
- var sparqlEndpoint = arguments[1];
33
+ var connectionOptions = arguments.length > 1 && arguments[1] !== undefined ? arguments[1] : {};
34
+
35
+
36
+ var sparqlEndpoint = process.env.MU_SPARQL_ENDPOINT;
37
+
38
+ if (connectionOptions) {
39
+ sparqlEndpoint = connectionOptions.sparqlEndpoint || sparqlEndpoint;
40
+ }
27
41
 
28
- sparqlEndpoint = sparqlEndpoint || process.env.MU_SPARQL_ENDPOINT;
29
42
  var options = {
30
43
  requestDefaults: {
31
44
  headers: {
@@ -75,29 +88,56 @@ function sudoSparqlClient() {
75
88
 
76
89
  async function executeRawQuery(queryString) {
77
90
  var extraHeaders = arguments.length > 1 && arguments[1] !== undefined ? arguments[1] : {};
78
- var sparqlEndpoint = arguments[2];
91
+ var connectionOptions = arguments.length > 2 && arguments[2] !== undefined ? arguments[2] : {};
92
+ var attempt = arguments.length > 3 && arguments[3] !== undefined ? arguments[3] : 0;
79
93
 
80
94
 
81
95
  if (LOG_SPARQL_QUERIES) {
82
96
  console.log(queryString);
83
97
  }
84
98
 
85
- var response = await sudoSparqlClient(extraHeaders, sparqlEndpoint).query(queryString).executeRaw();
86
- return maybeParseJSON(response.body);
99
+ try {
100
+
101
+ var response = await sudoSparqlClient(extraHeaders, connectionOptions).query(queryString).executeRaw();
102
+ return maybeParseJSON(response.body);
103
+ } catch (ex) {
104
+
105
+ if (mayRetry(ex, attempt, connectionOptions)) {
106
+
107
+ attempt += 1;
108
+
109
+ var sleepTime = nextAttemptTimeout(attempt);
110
+ console.log('Sleeping ' + sleepTime + ' ms before next attempt');
111
+ await new Promise(function (r) {
112
+ return setTimeout(r, sleepTime);
113
+ });
114
+
115
+ return await executeRawQuery(queryString, extraHeaders, connectionOptions, attempt);
116
+ } else {
117
+ console.log('Failed Query:\n ' + queryString);
118
+ throw ex;
119
+ }
120
+ }
87
121
  }
88
122
 
89
123
  function querySudo(queryString) {
90
124
  var extraHeaders = arguments.length > 1 && arguments[1] !== undefined ? arguments[1] : {};
91
- var sparqlEndpoint = arguments[2];
125
+ var connectionOptions = arguments.length > 2 && arguments[2] !== undefined ? arguments[2] : {};
92
126
 
93
- return executeRawQuery(queryString, extraHeaders, sparqlEndpoint);
127
+ if (LOG_SPARQL_QUERIES) {
128
+ console.log(queryString);
129
+ }
130
+ return executeRawQuery(queryString, extraHeaders, connectionOptions);
94
131
  }
95
132
 
96
133
  function updateSudo(queryString) {
97
134
  var extraHeaders = arguments.length > 1 && arguments[1] !== undefined ? arguments[1] : {};
98
- var sparqlEndpoint = arguments[2];
135
+ var connectionOptions = arguments.length > 2 && arguments[2] !== undefined ? arguments[2] : {};
99
136
 
100
- return executeRawQuery(queryString, extraHeaders, sparqlEndpoint);
137
+ if (LOG_SPARQL_UPDATES) {
138
+ console.log(queryString);
139
+ }
140
+ return executeRawQuery(queryString, extraHeaders, connectionOptions);
101
141
  }
102
142
 
103
143
  function maybeParseJSON(body) {
@@ -109,6 +149,34 @@ function maybeParseJSON(body) {
109
149
  }
110
150
  }
111
151
 
152
+ function mayRetry(error, attempt) {
153
+ var connectionOptions = arguments.length > 2 && arguments[2] !== undefined ? arguments[2] : {};
154
+
155
+
156
+ console.log('Checking retry allowed for error: ' + error + ' and attempt: ' + attempt);
157
+
158
+ var mayRetry = false;
159
+
160
+ if (!(RETRY || connectionOptions.mayRetry)) {
161
+ mayRetry = false;
162
+ } else if (attempt < RETRY_MAX_ATTEMPTS) {
163
+ if (error.code && RETRY_FOR_CONNECTION_ERRORS.includes(error.code)) {
164
+ mayRetry = true;
165
+ } else if (error.httpStatus && RETRY_FOR_HTTP_STATUS_CODES.includes('' + error.httpStatus)) {
166
+ mayRetry = true;
167
+ }
168
+ }
169
+
170
+ console.log('Retry allowed? ' + mayRetry);
171
+
172
+ return mayRetry;
173
+ }
174
+
175
+ function nextAttemptTimeout(attempt) {
176
+ //expected to be milliseconds
177
+ return Math.round(Math.exp(RETRY_TIMEOUT_INCREMENT_FACTOR * attempt + 10));
178
+ }
179
+
112
180
  var _exports = {
113
181
  querySudo: querySudo,
114
182
  updateSudo: updateSudo
package/package.json CHANGED
@@ -1,6 +1,6 @@
1
1
  {
2
2
  "name": "@lblod/mu-auth-sudo",
3
- "version": "0.5.1",
3
+ "version": "0.6.0",
4
4
  "description": "this package provides an alternative sparql client for the mu-javascript-template that has sudo rights.",
5
5
  "main": "dist/auth-sudo.js",
6
6
  "scripts": {