Skip to content
New issue

Have a question about this project? Sign up for a free GitHub account to open an issue and contact its maintainers and the community.

By clicking “Sign up for GitHub”, you agree to our terms of service and privacy statement. We’ll occasionally send you account related emails.

Already on GitHub? Sign in to your account

feat: Return detailed autoendpoint errors #170

Merged
merged 4 commits into from
Jul 13, 2020
Merged
Show file tree
Hide file tree
Changes from all commits
Commits
File filter

Filter by extension

Filter by extension

Conversations
Failed to load comments.
Loading
Jump to
Jump to file
Failed to load files.
Loading
Diff view
Diff view
57 changes: 30 additions & 27 deletions autoendpoint/src/error.rs
Original file line number Diff line number Diff line change
Expand Up @@ -18,8 +18,8 @@ use thiserror::Error;
/// Common `Result` type.
pub type ApiResult<T> = Result<T, ApiError>;

/// How long the client should wait before retrying a conflicting write.
pub const RETRY_AFTER: u8 = 10;
/// A link for more info on the returned error
const ERROR_URL: &str = "http://autopush.readthedocs.io/en/latest/http.html#error-codes";

/// The main error type.
#[derive(Debug)]
Expand Down Expand Up @@ -74,6 +74,9 @@ pub enum ApiErrorKind {
#[error("Invalid token")]
InvalidToken,

#[error("UAID not found")]
NoUser,

#[error("No such subscription")]
NoSubscription,

Expand Down Expand Up @@ -103,7 +106,7 @@ impl ApiErrorKind {
| ApiErrorKind::TokenHashValidation(_)
| ApiErrorKind::Uuid(_) => StatusCode::BAD_REQUEST,

ApiErrorKind::NoSubscription => StatusCode::GONE,
ApiErrorKind::NoUser | ApiErrorKind::NoSubscription => StatusCode::GONE,

ApiErrorKind::VapidError(_) | ApiErrorKind::Jwt(_) => StatusCode::UNAUTHORIZED,

Expand All @@ -117,6 +120,23 @@ impl ApiErrorKind {
| ApiErrorKind::Internal(_) => StatusCode::INTERNAL_SERVER_ERROR,
}
}

/// Get the associated error number
pub fn errno(&self) -> Option<usize> {
match self {
ApiErrorKind::InvalidEncryption(_) => Some(110),
ApiErrorKind::VapidError(_)
| ApiErrorKind::TokenHashValidation(_)
| ApiErrorKind::Jwt(_) => Some(109),
ApiErrorKind::InvalidToken => Some(102),
ApiErrorKind::NoUser => Some(103),
ApiErrorKind::NoSubscription => Some(106),
ApiErrorKind::PayloadError(PayloadError::Overflow)
| ApiErrorKind::PayloadTooLarge(_) => Some(104),
ApiErrorKind::Internal(_) => Some(999),
_ => None,
}
}
}

// Print out the error and backtrace, including source errors
Expand Down Expand Up @@ -174,40 +194,23 @@ impl From<ApiError> for HttpResponse {

impl ResponseError for ApiError {
fn error_response(&self) -> HttpResponse {
// To return a descriptive error response, this would work. We do not
// unfortunately do that so that we can retain Sync 1.1 backwards compatibility
// as the Python one does.
// HttpResponse::build(self.status).json(self)
//
// So instead we translate our error to a backwards compatible one
HttpResponse::build(self.kind.status())
.header("Retry-After", RETRY_AFTER.to_string())
.finish()
HttpResponse::build(self.kind.status()).json(self)
jrconlin marked this conversation as resolved.
Show resolved Hide resolved
}
}

// TODO: Use the same schema as documented here?
// https://autopush.readthedocs.io/en/latest/http.html#response
impl Serialize for ApiError {
fn serialize<S>(&self, serializer: S) -> Result<S::Ok, S::Error>
where
S: Serializer,
{
let status = self.kind.status();
let size = if status == StatusCode::UNAUTHORIZED {
2
} else {
3
};

let mut map = serializer.serialize_map(Some(size))?;
map.serialize_entry("status", &status.as_u16())?;
map.serialize_entry("reason", status.canonical_reason().unwrap_or(""))?;

if status != StatusCode::UNAUTHORIZED {
map.serialize_entry("errors", &self.kind.to_string())?;
}
let mut map = serializer.serialize_map(Some(5))?;

map.serialize_entry("code", &status.as_u16())?;
map.serialize_entry("errno", &self.kind.errno())?;
map.serialize_entry("error", &status.canonical_reason())?;
map.serialize_entry("message", &self.kind.to_string())?;
map.serialize_entry("more_info", ERROR_URL)?;
map.end()
}
}
3 changes: 2 additions & 1 deletion autoendpoint/src/server/extractors/subscription.rs
Original file line number Diff line number Diff line change
Expand Up @@ -63,7 +63,8 @@ impl FromRequest for Subscription {
.get_user(&uaid)
.compat()
.await
.map_err(ApiErrorKind::Database)?;
.map_err(ApiErrorKind::Database)?
.ok_or(ApiErrorKind::NoUser)?;
validate_user(&user, &channel_id, &state).await?;

// Validate the VAPID JWT token and record the version
Expand Down
8 changes: 4 additions & 4 deletions autopush-common/src/db/mod.rs
Original file line number Diff line number Diff line change
Expand Up @@ -443,17 +443,17 @@ impl DynamoStorage {
})
}

pub fn get_user(&self, uaid: &Uuid) -> impl Future<Item = DynamoDbUser, Error = Error> {
pub fn get_user(&self, uaid: &Uuid) -> impl Future<Item = Option<DynamoDbUser>, Error = Error> {
let ddb = self.ddb.clone();
let result = commands::get_uaid(ddb, uaid, &self.router_table_name).and_then(|result| {
future::result(
result
.item
.ok_or_else(|| "No user record found".into())
.and_then(|item| {
.map(|item| {
let user = serde_dynamodb::from_hashmap(item);
user.chain_err(|| "Error deserializing")
}),
})
.transpose(),
)
});
Box::new(result)
Expand Down
5 changes: 5 additions & 0 deletions autopush/src/client.rs
Original file line number Diff line number Diff line change
Expand Up @@ -693,6 +693,11 @@ fn save_and_notify_undelivered_messages(
srv2.ddb.get_user(&uaid)
})
.and_then(move |user| {
let user = match user.ok_or_else(|| "No user record found".into()) {
Ok(user) => user,
Err(e) => return future::err(e),
};

// Return an err to stop processing if the user hasn't reconnected yet, otherwise
// attempt to construct a client to make the request
if user.connected_at == connected_at {
Expand Down