@@ -4,7 +4,6 @@ package httpclient
44import (
55 "time"
66
7- "github.com/deploymenttheory/go-api-http-client/logger"
87 "go.uber.org/zap"
98)
109
@@ -17,22 +16,24 @@ type TokenResponse struct {
1716// ValidAuthTokenCheck checks if the current token is valid and not close to expiry.
1817// If the token is invalid, it tries to refresh it.
1918// It returns a boolean indicating the validity of the token and an error if there's a failure.
20- func (c * Client ) ValidAuthTokenCheck (log logger.Logger ) (bool , error ) {
19+ func (c * Client ) ValidAuthTokenCheck () (bool , error ) {
20+ log := c .Logger
21+
2122 if c .Token == "" {
22- c . Logger .Debug ("No token found, attempting to obtain a new one" )
23+ log .Debug ("No token found, attempting to obtain a new one" )
2324 if c .AuthMethod == "bearer" {
24- c . Logger .Info ("Credential Match" , zap .String ("AuthMethod" , c .AuthMethod ))
25+ log .Info ("Credential Match" , zap .String ("AuthMethod" , c .AuthMethod ))
2526 err := c .ObtainToken (log )
2627 if err != nil {
27- return false , c . Logger .Error ("Failed to obtain bearer token" , zap .Error (err ))
28+ return false , log .Error ("Failed to obtain bearer token" , zap .Error (err ))
2829 }
2930 } else if c .AuthMethod == "oauth" {
30- c . Logger .Info ("Credential Match" , zap .String ("AuthMethod" , c .AuthMethod ))
31- if err := c .ObtainOAuthToken (c .clientConfig .Auth , log ); err != nil {
32- return false , c . Logger .Error ("Failed to obtain OAuth token" , zap .Error (err ))
31+ log .Info ("Credential Match" , zap .String ("AuthMethod" , c .AuthMethod ))
32+ if err := c .ObtainOAuthToken (c .clientConfig .Auth ); err != nil {
33+ return false , log .Error ("Failed to obtain OAuth token" , zap .Error (err ))
3334 }
3435 } else {
35- return false , c . Logger .Error ("No valid credentials provided. Unable to obtain a token" , zap .String ("authMethod" , c .AuthMethod ))
36+ return false , log .Error ("No valid credentials provided. Unable to obtain a token" , zap .String ("authMethod" , c .AuthMethod ))
3637 }
3738 }
3839
@@ -41,18 +42,18 @@ func (c *Client) ValidAuthTokenCheck(log logger.Logger) (bool, error) {
4142 if c .BearerTokenAuthCredentials .Username != "" && c .BearerTokenAuthCredentials .Password != "" {
4243 err = c .RefreshToken (log )
4344 } else if c .OAuthCredentials .ClientID != "" && c .OAuthCredentials .ClientSecret != "" {
44- err = c .ObtainOAuthToken (c .clientConfig .Auth , log )
45+ err = c .ObtainOAuthToken (c .clientConfig .Auth )
4546 } else {
46- return false , c . Logger .Error ("Unknown auth method" , zap .String ("authMethod" , c .AuthMethod ))
47+ return false , log .Error ("Unknown auth method" , zap .String ("authMethod" , c .AuthMethod ))
4748 }
4849
4950 if err != nil {
50- return false , c . Logger .Error ("Failed to refresh token" , zap .Error (err ))
51+ return false , log .Error ("Failed to refresh token" , zap .Error (err ))
5152 }
5253 }
5354
5455 if time .Until (c .Expiry ) < c .clientConfig .ClientOptions .TokenRefreshBufferPeriod {
55- return false , c . Logger .Error (
56+ return false , log .Error (
5657 "Token lifetime setting less than buffer" ,
5758 zap .Duration ("buffer_period" , c .clientConfig .ClientOptions .TokenRefreshBufferPeriod ),
5859 zap .Duration ("time_until_expiry" , time .Until (c .Expiry )),
0 commit comments