-
Notifications
You must be signed in to change notification settings - Fork 70
/
Copy pathjavascript_injection.go
123 lines (102 loc) · 3.98 KB
/
javascript_injection.go
1
2
3
4
5
6
7
8
9
10
11
12
13
14
15
16
17
18
19
20
21
22
23
24
25
26
27
28
29
30
31
32
33
34
35
36
37
38
39
40
41
42
43
44
45
46
47
48
49
50
51
52
53
54
55
56
57
58
59
60
61
62
63
64
65
66
67
68
69
70
71
72
73
74
75
76
77
78
79
80
81
82
83
84
85
86
87
88
89
90
91
92
93
94
95
96
97
98
99
100
101
102
103
104
105
106
107
108
109
110
111
112
113
114
115
116
117
118
119
120
121
122
123
package botman
import (
"context"
"encoding/json"
"fmt"
"net/http"
"github.com/akamai/AkamaiOPEN-edgegrid-golang/v9/pkg/session"
validation "github.com/go-ozzo/ozzo-validation/v4"
)
type (
// The JavascriptInjection interface supports retrieving and updating the javascript injection settings for a
// configuration
JavascriptInjection interface {
// GetJavascriptInjection https://techdocs.akamai.com/bot-manager/reference/get-javascript-injection
GetJavascriptInjection(ctx context.Context, params GetJavascriptInjectionRequest) (map[string]interface{}, error)
// UpdateJavascriptInjection https://techdocs.akamai.com/bot-manager/reference/put-javascript-injection
UpdateJavascriptInjection(ctx context.Context, params UpdateJavascriptInjectionRequest) (map[string]interface{}, error)
}
// GetJavascriptInjectionRequest is used to retrieve javascript injection settings
GetJavascriptInjectionRequest struct {
ConfigID int64
Version int64
SecurityPolicyID string
}
// UpdateJavascriptInjectionRequest is used to modify javascript injection settings
UpdateJavascriptInjectionRequest struct {
ConfigID int64
Version int64
SecurityPolicyID string
JsonPayload json.RawMessage
}
)
// Validate validates a GetJavascriptInjectionRequest.
func (v GetJavascriptInjectionRequest) Validate() error {
return validation.Errors{
"ConfigID": validation.Validate(v.ConfigID, validation.Required),
"Version": validation.Validate(v.Version, validation.Required),
"SecurityPolicyID": validation.Validate(v.SecurityPolicyID, validation.Required),
}.Filter()
}
// Validate validates an UpdateJavascriptInjectionRequest.
func (v UpdateJavascriptInjectionRequest) Validate() error {
return validation.Errors{
"ConfigID": validation.Validate(v.ConfigID, validation.Required),
"Version": validation.Validate(v.Version, validation.Required),
"SecurityPolicyID": validation.Validate(v.SecurityPolicyID, validation.Required),
"JsonPayload": validation.Validate(v.JsonPayload, validation.Required),
}.Filter()
}
func (b *botman) GetJavascriptInjection(ctx context.Context, params GetJavascriptInjectionRequest) (map[string]interface{}, error) {
logger := b.Log(ctx)
logger.Debug("GetJavascriptInjection")
if err := params.Validate(); err != nil {
return nil, fmt.Errorf("%w: %s", ErrStructValidation, err.Error())
}
uri := fmt.Sprintf(
"/appsec/v1/configs/%d/versions/%d/security-policies/%s/javascript-injection",
params.ConfigID,
params.Version,
params.SecurityPolicyID)
req, err := http.NewRequestWithContext(ctx, http.MethodGet, uri, nil)
if err != nil {
return nil, fmt.Errorf("failed to create GetJavascriptInjection request: %w", err)
}
var result map[string]interface{}
resp, err := b.Exec(req, &result)
if err != nil {
return nil, fmt.Errorf("GetJavascriptInjection request failed: %w", err)
}
defer session.CloseResponseBody(resp)
if resp.StatusCode != http.StatusOK {
return nil, b.Error(resp)
}
return result, nil
}
func (b *botman) UpdateJavascriptInjection(ctx context.Context, params UpdateJavascriptInjectionRequest) (map[string]interface{}, error) {
logger := b.Log(ctx)
logger.Debug("UpdateJavascriptInjection")
if err := params.Validate(); err != nil {
return nil, fmt.Errorf("%w: %s", ErrStructValidation, err.Error())
}
putURL := fmt.Sprintf(
"/appsec/v1/configs/%d/versions/%d/security-policies/%s/javascript-injection",
params.ConfigID,
params.Version,
params.SecurityPolicyID,
)
req, err := http.NewRequestWithContext(ctx, http.MethodPut, putURL, nil)
if err != nil {
return nil, fmt.Errorf("failed to create UpdateJavascriptInjection request: %w", err)
}
var result map[string]interface{}
resp, err := b.Exec(req, &result, params.JsonPayload)
if err != nil {
return nil, fmt.Errorf("UpdateJavascriptInjection request failed: %w", err)
}
defer session.CloseResponseBody(resp)
if resp.StatusCode != http.StatusOK {
return nil, b.Error(resp)
}
return result, nil
}