@lblod/mu-auth-sudo 0.5.1 → 0.6.0-rc.0

This diff represents the content of publicly available package versions that have been released to one of the supported registries. The information contained in this diff is provided for informational purposes only and reflects changes between package versions as they appear in their respective public registries.
package/README.md CHANGED
@@ -1,5 +1,5 @@
1
1
  # mu-auth-sudo
2
- NPM package for a sparql client for mu.semte.ch that overrules access rights in queries through a mu-auth-sudo header.
2
+ NPM package for a SPARQL client for mu.semte.ch that overrules access rights in queries through a mu-auth-sudo header.
3
3
 
4
4
  ## Usage
5
5
  ```
@@ -13,7 +13,7 @@ import { querySudo as query, updateSudo as update } from '@lblod/mu-auth-sudo';
13
13
 
14
14
  //Examples
15
15
 
16
- // To run a normal query
16
+ // To run a regular query
17
17
 
18
18
  const queryString = `SELECT * FROM { GRAPH ?g { ?s ?p ?o. } } LIMIT 1`;
19
19
  await query(queryString);
@@ -24,9 +24,11 @@ const updateString = `INSERT DATA { GRAPH <http://foo> { <http://bar> <http://ba
24
24
  const extraHeaders = { 'mu-call-scope-id': 'http://foo/bar', 'other-info'; 'hello' };
25
25
  await update(updateString, extraHeaders);
26
26
 
27
- // With custom sparqlEndpoint (this should be exceptional, make sure you know what you're doing)
27
+ // With custom connection options (this should be exceptional, make sure you know what you're doing)
28
28
 
29
- await update(updateString, extraHeaders, 'http://the.sparql.endpoint/sparql');
29
+ const connectionOptions = { sparqlEndpoint: 'http://the.custom.endpoint/sparql', mayRetry: true };
30
+
31
+ await update(updateString, extraHeaders, connectionOptions);
30
32
  ```
31
33
 
32
34
  ## Logging
@@ -39,3 +41,13 @@ The verbosity of logging can be configured as in the [javascript template](https
39
41
  - `DEBUG_AUTH_HEADERS`: Debugging of [mu-authorization](https://github.com/mu-semtech/mu-authorization) access-control related headers (default `true`)
40
42
 
41
43
  Following values are considered true: [`"true"`, `"TRUE"`, `"1"`].
44
+
45
+ ## Retrying
46
+ You can tweak system-wide retry parameters. These should be considered internal, but tweaking them may help in extreme scenarios. Use with extreme caution.
47
+
48
+ - `SUDO_QUERY_RETRY`: System-wide configuration to enable the retry-mechanism (default `'false'`).
49
+ Warning: this overules eventual source-code specifications (i.e. `connectionOptions = { mayRetry: false }`), so make sure you know what you're doing.
50
+ - `SUDO_QUERY_RETRY_MAX_ATTEMPTS`: Specfiy the number of max retry attempts (default: 5)
51
+ - `SUDO_QUERY_RETRY_FOR_HTTP_STATUS_CODES`: Specify what returned HTTP status from the database are allowed for retry. (default: `''`). Overriding this list should be considered case by case.
52
+ - `SUDO_QUERY_RETRY_FOR_CONNECTION_ERRORS`: Specify what connection errors are allowed for retry. (default: `'ECONNRESET,ETIMEDOUT,EAI_AGAIN'`)
53
+ - `SUDO_QUERY_RETRY_TIMEOUT_INCREMENT_FACTOR`: Specify the factor applied to the timeout before the next attempt. Check implementation to see how it is calculated. (default: `'0.3'`)
package/dist/auth-sudo.js CHANGED
@@ -21,11 +21,24 @@ var LOG_SPARQL_QUERIES = process.env.LOG_SPARQL_QUERIES != undefined ? _envVar2.
21
21
  var LOG_SPARQL_UPDATES = process.env.LOG_SPARQL_UPDATES != undefined ? _envVar2.default.get('LOG_SPARQL_UPDATES').asBool() : _envVar2.default.get('LOG_SPARQL_ALL').asBool();
22
22
  var DEBUG_AUTH_HEADERS = _envVar2.default.get('DEBUG_AUTH_HEADERS').asBool();
23
23
 
24
+ // The following configuration options are considered optional, but may be overriden as a temporary workaround for issues. Thus, a last resort.
25
+ var RETRY = _envVar2.default.get('SUDO_QUERY_RETRY').default('false').asBool();
26
+ var RETRY_MAX_ATTEMPTS = _envVar2.default.get('SUDO_QUERY_RETRY_MAX_ATTEMPTS').default('5').asInt();
27
+ var RETRY_FOR_HTTP_STATUS_CODES = _envVar2.default.get('SUDO_QUERY_RETRY_FOR_HTTP_STATUS_CODES').default('').asArray();
28
+ var RETRY_FOR_CONNECTION_ERRORS = _envVar2.default.get('SUDO_QUERY_RETRY_FOR_CONNECTION_ERRORS').default('ECONNRESET,ETIMEDOUT,EAI_AGAIN').asArray();
29
+ var RETRY_TIMEOUT_INCREMENT_FACTOR = _envVar2.default.get('SUDO_QUERY_RETRY_TIMEOUT_INCREMENT_FACTOR').default('0.3').asFloat();
30
+
24
31
  function sudoSparqlClient() {
25
32
  var extraHeaders = arguments.length > 0 && arguments[0] !== undefined ? arguments[0] : {};
26
- var sparqlEndpoint = arguments[1];
33
+ var connectionOptions = arguments.length > 1 && arguments[1] !== undefined ? arguments[1] : {};
34
+
35
+
36
+ var sparqlEndpoint = process.env.MU_SPARQL_ENDPOINT;
37
+
38
+ if (connectionOptions) {
39
+ sparqlEndpoint = connectionOptions.sparqlEndpoint || sparqlEndpoint;
40
+ }
27
41
 
28
- sparqlEndpoint = sparqlEndpoint || process.env.MU_SPARQL_ENDPOINT;
29
42
  var options = {
30
43
  requestDefaults: {
31
44
  headers: {
@@ -75,29 +88,47 @@ function sudoSparqlClient() {
75
88
 
76
89
  async function executeRawQuery(queryString) {
77
90
  var extraHeaders = arguments.length > 1 && arguments[1] !== undefined ? arguments[1] : {};
78
- var sparqlEndpoint = arguments[2];
91
+ var connectionOptions = arguments.length > 2 && arguments[2] !== undefined ? arguments[2] : {};
92
+ var attempt = arguments.length > 3 && arguments[3] !== undefined ? arguments[3] : 0;
79
93
 
80
94
 
81
95
  if (LOG_SPARQL_QUERIES) {
82
96
  console.log(queryString);
83
97
  }
84
98
 
85
- var response = await sudoSparqlClient(extraHeaders, sparqlEndpoint).query(queryString).executeRaw();
86
- return maybeParseJSON(response.body);
99
+ try {
100
+
101
+ var response = await sudoSparqlClient(extraHeaders, connectionOptions).query(queryString).executeRaw();
102
+ return maybeParseJSON(response.body);
103
+ } catch (ex) {
104
+
105
+ if (mayRetry(ex, attempt, connectionOptions)) {
106
+
107
+ attempt += 1;
108
+
109
+ var sleepTime = nextAttemptTimeout(attempt);
110
+ console.log('Sleeping ' + sleepTime + ' ms before next attempt');
111
+ await new Promise(function (r) {
112
+ return setTimeout(r, sleepTime);
113
+ });
114
+
115
+ return await executeRawQuery(queryString, extraHeaders, connectionOptions, attempt);
116
+ } else throw ex;
117
+ }
87
118
  }
88
119
 
89
120
  function querySudo(queryString) {
90
121
  var extraHeaders = arguments.length > 1 && arguments[1] !== undefined ? arguments[1] : {};
91
- var sparqlEndpoint = arguments[2];
122
+ var connectionOptions = arguments.length > 2 && arguments[2] !== undefined ? arguments[2] : {};
92
123
 
93
- return executeRawQuery(queryString, extraHeaders, sparqlEndpoint);
124
+ return executeRawQuery(queryString, extraHeaders, connectionOptions);
94
125
  }
95
126
 
96
127
  function updateSudo(queryString) {
97
128
  var extraHeaders = arguments.length > 1 && arguments[1] !== undefined ? arguments[1] : {};
98
- var sparqlEndpoint = arguments[2];
129
+ var connectionOptions = arguments.length > 2 && arguments[2] !== undefined ? arguments[2] : {};
99
130
 
100
- return executeRawQuery(queryString, extraHeaders, sparqlEndpoint);
131
+ return executeRawQuery(queryString, extraHeaders, connectionOptions);
101
132
  }
102
133
 
103
134
  function maybeParseJSON(body) {
@@ -109,6 +140,34 @@ function maybeParseJSON(body) {
109
140
  }
110
141
  }
111
142
 
143
+ function mayRetry(error, attempt) {
144
+ var connectionOptions = arguments.length > 2 && arguments[2] !== undefined ? arguments[2] : {};
145
+
146
+
147
+ console.log('Checking retry allowed for error: ' + error + ' and attempt: ' + attempt);
148
+
149
+ var mayRetry = false;
150
+
151
+ if (!(RETRY || connectionOptions.mayRetry)) {
152
+ mayRetry = false;
153
+ } else if (attempt < RETRY_MAX_ATTEMPTS) {
154
+ if (error.code && RETRY_FOR_CONNECTION_ERRORS.includes(error.code)) {
155
+ mayRetry = true;
156
+ } else if (error.httpStatus && RETRY_FOR_HTTP_STATUS_CODES.includes('' + error.httpStatus)) {
157
+ mayRetry = true;
158
+ }
159
+ }
160
+
161
+ console.log('Retry allowed? ' + mayRetry);
162
+
163
+ return mayRetry;
164
+ }
165
+
166
+ function nextAttemptTimeout(attempt) {
167
+ //expected to be milliseconds
168
+ return Math.round(Math.exp(RETRY_TIMEOUT_INCREMENT_FACTOR * attempt + 10));
169
+ }
170
+
112
171
  var _exports = {
113
172
  querySudo: querySudo,
114
173
  updateSudo: updateSudo
package/package.json CHANGED
@@ -1,6 +1,6 @@
1
1
  {
2
2
  "name": "@lblod/mu-auth-sudo",
3
- "version": "0.5.1",
3
+ "version": "0.6.0-rc.0",
4
4
  "description": "this package provides an alternative sparql client for the mu-javascript-template that has sudo rights.",
5
5
  "main": "dist/auth-sudo.js",
6
6
  "scripts": {