@lblod/mu-auth-sudo 0.5.1 → 0.6.0-rc.0
This diff represents the content of publicly available package versions that have been released to one of the supported registries. The information contained in this diff is provided for informational purposes only and reflects changes between package versions as they appear in their respective public registries.
- package/README.md +16 -4
- package/dist/auth-sudo.js +68 -9
- package/package.json +1 -1
package/README.md
CHANGED
|
@@ -1,5 +1,5 @@
|
|
|
1
1
|
# mu-auth-sudo
|
|
2
|
-
NPM package for a
|
|
2
|
+
NPM package for a SPARQL client for mu.semte.ch that overrules access rights in queries through a mu-auth-sudo header.
|
|
3
3
|
|
|
4
4
|
## Usage
|
|
5
5
|
```
|
|
@@ -13,7 +13,7 @@ import { querySudo as query, updateSudo as update } from '@lblod/mu-auth-sudo';
|
|
|
13
13
|
|
|
14
14
|
//Examples
|
|
15
15
|
|
|
16
|
-
// To run a
|
|
16
|
+
// To run a regular query
|
|
17
17
|
|
|
18
18
|
const queryString = `SELECT * FROM { GRAPH ?g { ?s ?p ?o. } } LIMIT 1`;
|
|
19
19
|
await query(queryString);
|
|
@@ -24,9 +24,11 @@ const updateString = `INSERT DATA { GRAPH <http://foo> { <http://bar> <http://ba
|
|
|
24
24
|
const extraHeaders = { 'mu-call-scope-id': 'http://foo/bar', 'other-info'; 'hello' };
|
|
25
25
|
await update(updateString, extraHeaders);
|
|
26
26
|
|
|
27
|
-
// With custom
|
|
27
|
+
// With custom connection options (this should be exceptional, make sure you know what you're doing)
|
|
28
28
|
|
|
29
|
-
|
|
29
|
+
const connectionOptions = { sparqlEndpoint: 'http://the.custom.endpoint/sparql', mayRetry: true };
|
|
30
|
+
|
|
31
|
+
await update(updateString, extraHeaders, connectionOptions);
|
|
30
32
|
```
|
|
31
33
|
|
|
32
34
|
## Logging
|
|
@@ -39,3 +41,13 @@ The verbosity of logging can be configured as in the [javascript template](https
|
|
|
39
41
|
- `DEBUG_AUTH_HEADERS`: Debugging of [mu-authorization](https://github.com/mu-semtech/mu-authorization) access-control related headers (default `true`)
|
|
40
42
|
|
|
41
43
|
Following values are considered true: [`"true"`, `"TRUE"`, `"1"`].
|
|
44
|
+
|
|
45
|
+
## Retrying
|
|
46
|
+
You can tweak system-wide retry parameters. These should be considered internal, but tweaking them may help in extreme scenarios. Use with extreme caution.
|
|
47
|
+
|
|
48
|
+
- `SUDO_QUERY_RETRY`: System-wide configuration to enable the retry-mechanism (default `'false'`).
|
|
49
|
+
Warning: this overules eventual source-code specifications (i.e. `connectionOptions = { mayRetry: false }`), so make sure you know what you're doing.
|
|
50
|
+
- `SUDO_QUERY_RETRY_MAX_ATTEMPTS`: Specfiy the number of max retry attempts (default: 5)
|
|
51
|
+
- `SUDO_QUERY_RETRY_FOR_HTTP_STATUS_CODES`: Specify what returned HTTP status from the database are allowed for retry. (default: `''`). Overriding this list should be considered case by case.
|
|
52
|
+
- `SUDO_QUERY_RETRY_FOR_CONNECTION_ERRORS`: Specify what connection errors are allowed for retry. (default: `'ECONNRESET,ETIMEDOUT,EAI_AGAIN'`)
|
|
53
|
+
- `SUDO_QUERY_RETRY_TIMEOUT_INCREMENT_FACTOR`: Specify the factor applied to the timeout before the next attempt. Check implementation to see how it is calculated. (default: `'0.3'`)
|
package/dist/auth-sudo.js
CHANGED
|
@@ -21,11 +21,24 @@ var LOG_SPARQL_QUERIES = process.env.LOG_SPARQL_QUERIES != undefined ? _envVar2.
|
|
|
21
21
|
var LOG_SPARQL_UPDATES = process.env.LOG_SPARQL_UPDATES != undefined ? _envVar2.default.get('LOG_SPARQL_UPDATES').asBool() : _envVar2.default.get('LOG_SPARQL_ALL').asBool();
|
|
22
22
|
var DEBUG_AUTH_HEADERS = _envVar2.default.get('DEBUG_AUTH_HEADERS').asBool();
|
|
23
23
|
|
|
24
|
+
// The following configuration options are considered optional, but may be overriden as a temporary workaround for issues. Thus, a last resort.
|
|
25
|
+
var RETRY = _envVar2.default.get('SUDO_QUERY_RETRY').default('false').asBool();
|
|
26
|
+
var RETRY_MAX_ATTEMPTS = _envVar2.default.get('SUDO_QUERY_RETRY_MAX_ATTEMPTS').default('5').asInt();
|
|
27
|
+
var RETRY_FOR_HTTP_STATUS_CODES = _envVar2.default.get('SUDO_QUERY_RETRY_FOR_HTTP_STATUS_CODES').default('').asArray();
|
|
28
|
+
var RETRY_FOR_CONNECTION_ERRORS = _envVar2.default.get('SUDO_QUERY_RETRY_FOR_CONNECTION_ERRORS').default('ECONNRESET,ETIMEDOUT,EAI_AGAIN').asArray();
|
|
29
|
+
var RETRY_TIMEOUT_INCREMENT_FACTOR = _envVar2.default.get('SUDO_QUERY_RETRY_TIMEOUT_INCREMENT_FACTOR').default('0.3').asFloat();
|
|
30
|
+
|
|
24
31
|
function sudoSparqlClient() {
|
|
25
32
|
var extraHeaders = arguments.length > 0 && arguments[0] !== undefined ? arguments[0] : {};
|
|
26
|
-
var
|
|
33
|
+
var connectionOptions = arguments.length > 1 && arguments[1] !== undefined ? arguments[1] : {};
|
|
34
|
+
|
|
35
|
+
|
|
36
|
+
var sparqlEndpoint = process.env.MU_SPARQL_ENDPOINT;
|
|
37
|
+
|
|
38
|
+
if (connectionOptions) {
|
|
39
|
+
sparqlEndpoint = connectionOptions.sparqlEndpoint || sparqlEndpoint;
|
|
40
|
+
}
|
|
27
41
|
|
|
28
|
-
sparqlEndpoint = sparqlEndpoint || process.env.MU_SPARQL_ENDPOINT;
|
|
29
42
|
var options = {
|
|
30
43
|
requestDefaults: {
|
|
31
44
|
headers: {
|
|
@@ -75,29 +88,47 @@ function sudoSparqlClient() {
|
|
|
75
88
|
|
|
76
89
|
async function executeRawQuery(queryString) {
|
|
77
90
|
var extraHeaders = arguments.length > 1 && arguments[1] !== undefined ? arguments[1] : {};
|
|
78
|
-
var
|
|
91
|
+
var connectionOptions = arguments.length > 2 && arguments[2] !== undefined ? arguments[2] : {};
|
|
92
|
+
var attempt = arguments.length > 3 && arguments[3] !== undefined ? arguments[3] : 0;
|
|
79
93
|
|
|
80
94
|
|
|
81
95
|
if (LOG_SPARQL_QUERIES) {
|
|
82
96
|
console.log(queryString);
|
|
83
97
|
}
|
|
84
98
|
|
|
85
|
-
|
|
86
|
-
|
|
99
|
+
try {
|
|
100
|
+
|
|
101
|
+
var response = await sudoSparqlClient(extraHeaders, connectionOptions).query(queryString).executeRaw();
|
|
102
|
+
return maybeParseJSON(response.body);
|
|
103
|
+
} catch (ex) {
|
|
104
|
+
|
|
105
|
+
if (mayRetry(ex, attempt, connectionOptions)) {
|
|
106
|
+
|
|
107
|
+
attempt += 1;
|
|
108
|
+
|
|
109
|
+
var sleepTime = nextAttemptTimeout(attempt);
|
|
110
|
+
console.log('Sleeping ' + sleepTime + ' ms before next attempt');
|
|
111
|
+
await new Promise(function (r) {
|
|
112
|
+
return setTimeout(r, sleepTime);
|
|
113
|
+
});
|
|
114
|
+
|
|
115
|
+
return await executeRawQuery(queryString, extraHeaders, connectionOptions, attempt);
|
|
116
|
+
} else throw ex;
|
|
117
|
+
}
|
|
87
118
|
}
|
|
88
119
|
|
|
89
120
|
function querySudo(queryString) {
|
|
90
121
|
var extraHeaders = arguments.length > 1 && arguments[1] !== undefined ? arguments[1] : {};
|
|
91
|
-
var
|
|
122
|
+
var connectionOptions = arguments.length > 2 && arguments[2] !== undefined ? arguments[2] : {};
|
|
92
123
|
|
|
93
|
-
return executeRawQuery(queryString, extraHeaders,
|
|
124
|
+
return executeRawQuery(queryString, extraHeaders, connectionOptions);
|
|
94
125
|
}
|
|
95
126
|
|
|
96
127
|
function updateSudo(queryString) {
|
|
97
128
|
var extraHeaders = arguments.length > 1 && arguments[1] !== undefined ? arguments[1] : {};
|
|
98
|
-
var
|
|
129
|
+
var connectionOptions = arguments.length > 2 && arguments[2] !== undefined ? arguments[2] : {};
|
|
99
130
|
|
|
100
|
-
return executeRawQuery(queryString, extraHeaders,
|
|
131
|
+
return executeRawQuery(queryString, extraHeaders, connectionOptions);
|
|
101
132
|
}
|
|
102
133
|
|
|
103
134
|
function maybeParseJSON(body) {
|
|
@@ -109,6 +140,34 @@ function maybeParseJSON(body) {
|
|
|
109
140
|
}
|
|
110
141
|
}
|
|
111
142
|
|
|
143
|
+
function mayRetry(error, attempt) {
|
|
144
|
+
var connectionOptions = arguments.length > 2 && arguments[2] !== undefined ? arguments[2] : {};
|
|
145
|
+
|
|
146
|
+
|
|
147
|
+
console.log('Checking retry allowed for error: ' + error + ' and attempt: ' + attempt);
|
|
148
|
+
|
|
149
|
+
var mayRetry = false;
|
|
150
|
+
|
|
151
|
+
if (!(RETRY || connectionOptions.mayRetry)) {
|
|
152
|
+
mayRetry = false;
|
|
153
|
+
} else if (attempt < RETRY_MAX_ATTEMPTS) {
|
|
154
|
+
if (error.code && RETRY_FOR_CONNECTION_ERRORS.includes(error.code)) {
|
|
155
|
+
mayRetry = true;
|
|
156
|
+
} else if (error.httpStatus && RETRY_FOR_HTTP_STATUS_CODES.includes('' + error.httpStatus)) {
|
|
157
|
+
mayRetry = true;
|
|
158
|
+
}
|
|
159
|
+
}
|
|
160
|
+
|
|
161
|
+
console.log('Retry allowed? ' + mayRetry);
|
|
162
|
+
|
|
163
|
+
return mayRetry;
|
|
164
|
+
}
|
|
165
|
+
|
|
166
|
+
function nextAttemptTimeout(attempt) {
|
|
167
|
+
//expected to be milliseconds
|
|
168
|
+
return Math.round(Math.exp(RETRY_TIMEOUT_INCREMENT_FACTOR * attempt + 10));
|
|
169
|
+
}
|
|
170
|
+
|
|
112
171
|
var _exports = {
|
|
113
172
|
querySudo: querySudo,
|
|
114
173
|
updateSudo: updateSudo
|
package/package.json
CHANGED