@@ -4,7 +4,6 @@ package httpclient
4
4
import (
5
5
"time"
6
6
7
- "github.com/deploymenttheory/go-api-http-client/logger"
8
7
"go.uber.org/zap"
9
8
)
10
9
@@ -17,22 +16,24 @@ type TokenResponse struct {
17
16
// ValidAuthTokenCheck checks if the current token is valid and not close to expiry.
18
17
// If the token is invalid, it tries to refresh it.
19
18
// It returns a boolean indicating the validity of the token and an error if there's a failure.
20
- func (c * Client ) ValidAuthTokenCheck (log logger.Logger ) (bool , error ) {
19
+ func (c * Client ) ValidAuthTokenCheck () (bool , error ) {
20
+ log := c .Logger
21
+
21
22
if c .Token == "" {
22
- c . Logger .Debug ("No token found, attempting to obtain a new one" )
23
+ log .Debug ("No token found, attempting to obtain a new one" )
23
24
if c .AuthMethod == "bearer" {
24
- c . Logger .Info ("Credential Match" , zap .String ("AuthMethod" , c .AuthMethod ))
25
+ log .Info ("Credential Match" , zap .String ("AuthMethod" , c .AuthMethod ))
25
26
err := c .ObtainToken (log )
26
27
if err != nil {
27
- return false , c . Logger .Error ("Failed to obtain bearer token" , zap .Error (err ))
28
+ return false , log .Error ("Failed to obtain bearer token" , zap .Error (err ))
28
29
}
29
30
} else if c .AuthMethod == "oauth" {
30
- c . Logger .Info ("Credential Match" , zap .String ("AuthMethod" , c .AuthMethod ))
31
- if err := c .ObtainOAuthToken (c .clientConfig .Auth , log ); err != nil {
32
- return false , c . Logger .Error ("Failed to obtain OAuth token" , zap .Error (err ))
31
+ log .Info ("Credential Match" , zap .String ("AuthMethod" , c .AuthMethod ))
32
+ if err := c .ObtainOAuthToken (c .clientConfig .Auth ); err != nil {
33
+ return false , log .Error ("Failed to obtain OAuth token" , zap .Error (err ))
33
34
}
34
35
} else {
35
- return false , c . Logger .Error ("No valid credentials provided. Unable to obtain a token" , zap .String ("authMethod" , c .AuthMethod ))
36
+ return false , log .Error ("No valid credentials provided. Unable to obtain a token" , zap .String ("authMethod" , c .AuthMethod ))
36
37
}
37
38
}
38
39
@@ -41,18 +42,18 @@ func (c *Client) ValidAuthTokenCheck(log logger.Logger) (bool, error) {
41
42
if c .BearerTokenAuthCredentials .Username != "" && c .BearerTokenAuthCredentials .Password != "" {
42
43
err = c .RefreshToken (log )
43
44
} else if c .OAuthCredentials .ClientID != "" && c .OAuthCredentials .ClientSecret != "" {
44
- err = c .ObtainOAuthToken (c .clientConfig .Auth , log )
45
+ err = c .ObtainOAuthToken (c .clientConfig .Auth )
45
46
} else {
46
- return false , c . Logger .Error ("Unknown auth method" , zap .String ("authMethod" , c .AuthMethod ))
47
+ return false , log .Error ("Unknown auth method" , zap .String ("authMethod" , c .AuthMethod ))
47
48
}
48
49
49
50
if err != nil {
50
- return false , c . Logger .Error ("Failed to refresh token" , zap .Error (err ))
51
+ return false , log .Error ("Failed to refresh token" , zap .Error (err ))
51
52
}
52
53
}
53
54
54
55
if time .Until (c .Expiry ) < c .clientConfig .ClientOptions .TokenRefreshBufferPeriod {
55
- return false , c . Logger .Error (
56
+ return false , log .Error (
56
57
"Token lifetime setting less than buffer" ,
57
58
zap .Duration ("buffer_period" , c .clientConfig .ClientOptions .TokenRefreshBufferPeriod ),
58
59
zap .Duration ("time_until_expiry" , time .Until (c .Expiry )),
0 commit comments