id stringlengths 20 153 | type stringclasses 1 value | granularity stringclasses 14 values | content stringlengths 16 84.3k | metadata dict |
|---|---|---|---|---|
connector-service_snippet_-7416499650036175072_0_50 | clm | snippet | // connector-service/backend/external-services/src/service.rs
use std::{collections::HashMap, str::FromStr, time::Duration};
use common_enums::ApiClientError;
use common_utils::{
ext_traits::AsyncExt,
lineage,
request::{Method, Request, RequestContent},
};
use domain_types::{
connector_types::{ConnectorResponseHeaders, RawConnectorRequestResponse},
errors::{ApiErrorResponse, ConnectorError},
router_data_v2::RouterDataV2,
router_response_types::Response,
types::Proxy,
};
use hyperswitch_masking::Secret;
use injector;
pub trait ConnectorRequestReference {
fn get_connector_request_reference_id(&self) -> &str;
}
pub trait AdditionalHeaders {
fn get_vault_headers(&self) -> Option<&HashMap<String, Secret<String>>>;
}
impl ConnectorRequestReference for domain_types::connector_types::PaymentFlowData {
fn get_connector_request_reference_id(&self) -> &str {
&self.connector_request_reference_id
}
}
impl AdditionalHeaders for domain_types::connector_types::PaymentFlowData {
fn get_vault_headers(&self) -> Option<&HashMap<String, Secret<String>>> {
self.vault_headers.as_ref()
}
}
impl ConnectorRequestReference for domain_types::connector_types::RefundFlowData {
fn get_connector_request_reference_id(&self) -> &str {
&self.connector_request_reference_id
}
}
impl AdditionalHeaders for domain_types::connector_types::RefundFlowData {
fn get_vault_headers(&self) -> Option<&HashMap<String, Secret<String>>> {
// RefundFlowData might not have vault_headers, so return None
None
}
}
| {
"chunk": null,
"crate": "external-services",
"enum_name": null,
"file_size": null,
"for_type": null,
"function_name": null,
"is_async": null,
"is_pub": null,
"lines": 50,
"method_name": null,
"num_enums": null,
"num_items": null,
"num_structs": null,
"repo": "connector-service",
"start_line": 0,
"struct_name": null,
"total_crates": null,
"trait_name": null
} |
connector-service_snippet_-7416499650036175072_25_15 | clm | snippet | // connector-service/backend/external-services/src/service.rs
impl ConnectorRequestReference for domain_types::connector_types::PaymentFlowData {
fn get_connector_request_reference_id(&self) -> &str {
&self.connector_request_reference_id
}
}
impl AdditionalHeaders for domain_types::connector_types::PaymentFlowData {
fn get_vault_headers(&self) -> Option<&HashMap<String, Secret<String>>> {
self.vault_headers.as_ref()
}
}
impl ConnectorRequestReference for domain_types::connector_types::RefundFlowData {
fn get_connector_request_reference_id(&self) -> &str {
| {
"chunk": null,
"crate": "external-services",
"enum_name": null,
"file_size": null,
"for_type": null,
"function_name": null,
"is_async": null,
"is_pub": null,
"lines": 15,
"method_name": null,
"num_enums": null,
"num_items": null,
"num_structs": null,
"repo": "connector-service",
"start_line": 25,
"struct_name": null,
"total_crates": null,
"trait_name": null
} |
connector-service_snippet_-7416499650036175072_25_30 | clm | snippet | // connector-service/backend/external-services/src/service.rs
impl ConnectorRequestReference for domain_types::connector_types::PaymentFlowData {
fn get_connector_request_reference_id(&self) -> &str {
&self.connector_request_reference_id
}
}
impl AdditionalHeaders for domain_types::connector_types::PaymentFlowData {
fn get_vault_headers(&self) -> Option<&HashMap<String, Secret<String>>> {
self.vault_headers.as_ref()
}
}
impl ConnectorRequestReference for domain_types::connector_types::RefundFlowData {
fn get_connector_request_reference_id(&self) -> &str {
&self.connector_request_reference_id
}
}
impl AdditionalHeaders for domain_types::connector_types::RefundFlowData {
fn get_vault_headers(&self) -> Option<&HashMap<String, Secret<String>>> {
// RefundFlowData might not have vault_headers, so return None
None
}
}
impl ConnectorRequestReference for domain_types::connector_types::DisputeFlowData {
fn get_connector_request_reference_id(&self) -> &str {
&self.connector_request_reference_id
}
| {
"chunk": null,
"crate": "external-services",
"enum_name": null,
"file_size": null,
"for_type": null,
"function_name": null,
"is_async": null,
"is_pub": null,
"lines": 30,
"method_name": null,
"num_enums": null,
"num_items": null,
"num_structs": null,
"repo": "connector-service",
"start_line": 25,
"struct_name": null,
"total_crates": null,
"trait_name": null
} |
connector-service_snippet_-7416499650036175072_25_50 | clm | snippet | // connector-service/backend/external-services/src/service.rs
impl ConnectorRequestReference for domain_types::connector_types::PaymentFlowData {
fn get_connector_request_reference_id(&self) -> &str {
&self.connector_request_reference_id
}
}
impl AdditionalHeaders for domain_types::connector_types::PaymentFlowData {
fn get_vault_headers(&self) -> Option<&HashMap<String, Secret<String>>> {
self.vault_headers.as_ref()
}
}
impl ConnectorRequestReference for domain_types::connector_types::RefundFlowData {
fn get_connector_request_reference_id(&self) -> &str {
&self.connector_request_reference_id
}
}
impl AdditionalHeaders for domain_types::connector_types::RefundFlowData {
fn get_vault_headers(&self) -> Option<&HashMap<String, Secret<String>>> {
// RefundFlowData might not have vault_headers, so return None
None
}
}
impl ConnectorRequestReference for domain_types::connector_types::DisputeFlowData {
fn get_connector_request_reference_id(&self) -> &str {
&self.connector_request_reference_id
}
}
impl AdditionalHeaders for domain_types::connector_types::DisputeFlowData {
fn get_vault_headers(&self) -> Option<&HashMap<String, Secret<String>>> {
// DisputeFlowData might not have vault_headers, so return None
None
}
}
use common_utils::{
emit_event_with_config,
events::{Event, EventConfig, EventStage, FlowName, MaskedSerdeValue},
};
use error_stack::{report, ResultExt};
use hyperswitch_masking::{ErasedMaskSerialize, ExposeInterface, Maskable};
// TokenData is now imported from hyperswitch_injector
use common_utils::consts;
use injector::{injector_core, HttpMethod, TokenData};
use interfaces::{
connector_integration_v2::BoxedConnectorIntegrationV2,
integrity::{CheckIntegrity, FlowIntegrity, GetIntegrityObject},
| {
"chunk": null,
"crate": "external-services",
"enum_name": null,
"file_size": null,
"for_type": null,
"function_name": null,
"is_async": null,
"is_pub": null,
"lines": 50,
"method_name": null,
"num_enums": null,
"num_items": null,
"num_structs": null,
"repo": "connector-service",
"start_line": 25,
"struct_name": null,
"total_crates": null,
"trait_name": null
} |
connector-service_snippet_-7416499650036175072_50_15 | clm | snippet | // connector-service/backend/external-services/src/service.rs
impl ConnectorRequestReference for domain_types::connector_types::DisputeFlowData {
fn get_connector_request_reference_id(&self) -> &str {
&self.connector_request_reference_id
}
}
impl AdditionalHeaders for domain_types::connector_types::DisputeFlowData {
fn get_vault_headers(&self) -> Option<&HashMap<String, Secret<String>>> {
// DisputeFlowData might not have vault_headers, so return None
None
}
}
use common_utils::{
emit_event_with_config,
| {
"chunk": null,
"crate": "external-services",
"enum_name": null,
"file_size": null,
"for_type": null,
"function_name": null,
"is_async": null,
"is_pub": null,
"lines": 15,
"method_name": null,
"num_enums": null,
"num_items": null,
"num_structs": null,
"repo": "connector-service",
"start_line": 50,
"struct_name": null,
"total_crates": null,
"trait_name": null
} |
connector-service_snippet_-7416499650036175072_50_30 | clm | snippet | // connector-service/backend/external-services/src/service.rs
impl ConnectorRequestReference for domain_types::connector_types::DisputeFlowData {
fn get_connector_request_reference_id(&self) -> &str {
&self.connector_request_reference_id
}
}
impl AdditionalHeaders for domain_types::connector_types::DisputeFlowData {
fn get_vault_headers(&self) -> Option<&HashMap<String, Secret<String>>> {
// DisputeFlowData might not have vault_headers, so return None
None
}
}
use common_utils::{
emit_event_with_config,
events::{Event, EventConfig, EventStage, FlowName, MaskedSerdeValue},
};
use error_stack::{report, ResultExt};
use hyperswitch_masking::{ErasedMaskSerialize, ExposeInterface, Maskable};
// TokenData is now imported from hyperswitch_injector
use common_utils::consts;
use injector::{injector_core, HttpMethod, TokenData};
use interfaces::{
connector_integration_v2::BoxedConnectorIntegrationV2,
integrity::{CheckIntegrity, FlowIntegrity, GetIntegrityObject},
};
use once_cell::sync::OnceCell;
use reqwest::Client;
use serde_json::json;
use tracing::field::Empty;
| {
"chunk": null,
"crate": "external-services",
"enum_name": null,
"file_size": null,
"for_type": null,
"function_name": null,
"is_async": null,
"is_pub": null,
"lines": 30,
"method_name": null,
"num_enums": null,
"num_items": null,
"num_structs": null,
"repo": "connector-service",
"start_line": 50,
"struct_name": null,
"total_crates": null,
"trait_name": null
} |
connector-service_snippet_-7416499650036175072_50_50 | clm | snippet | // connector-service/backend/external-services/src/service.rs
impl ConnectorRequestReference for domain_types::connector_types::DisputeFlowData {
fn get_connector_request_reference_id(&self) -> &str {
&self.connector_request_reference_id
}
}
impl AdditionalHeaders for domain_types::connector_types::DisputeFlowData {
fn get_vault_headers(&self) -> Option<&HashMap<String, Secret<String>>> {
// DisputeFlowData might not have vault_headers, so return None
None
}
}
use common_utils::{
emit_event_with_config,
events::{Event, EventConfig, EventStage, FlowName, MaskedSerdeValue},
};
use error_stack::{report, ResultExt};
use hyperswitch_masking::{ErasedMaskSerialize, ExposeInterface, Maskable};
// TokenData is now imported from hyperswitch_injector
use common_utils::consts;
use injector::{injector_core, HttpMethod, TokenData};
use interfaces::{
connector_integration_v2::BoxedConnectorIntegrationV2,
integrity::{CheckIntegrity, FlowIntegrity, GetIntegrityObject},
};
use once_cell::sync::OnceCell;
use reqwest::Client;
use serde_json::json;
use tracing::field::Empty;
use crate::shared_metrics as metrics;
pub type Headers = std::collections::HashSet<(String, Maskable<String>)>;
trait ToHttpMethod {
fn to_http_method(&self) -> HttpMethod;
}
impl ToHttpMethod for Method {
fn to_http_method(&self) -> HttpMethod {
match self {
Self::Get => HttpMethod::GET,
Self::Post => HttpMethod::POST,
Self::Put => HttpMethod::PUT,
Self::Patch => HttpMethod::PATCH,
Self::Delete => HttpMethod::DELETE,
}
}
}
| {
"chunk": null,
"crate": "external-services",
"enum_name": null,
"file_size": null,
"for_type": null,
"function_name": null,
"is_async": null,
"is_pub": null,
"lines": 50,
"method_name": null,
"num_enums": null,
"num_items": null,
"num_structs": null,
"repo": "connector-service",
"start_line": 50,
"struct_name": null,
"total_crates": null,
"trait_name": null
} |
connector-service_snippet_-7416499650036175072_75_15 | clm | snippet | // connector-service/backend/external-services/src/service.rs
};
use once_cell::sync::OnceCell;
use reqwest::Client;
use serde_json::json;
use tracing::field::Empty;
use crate::shared_metrics as metrics;
pub type Headers = std::collections::HashSet<(String, Maskable<String>)>;
trait ToHttpMethod {
fn to_http_method(&self) -> HttpMethod;
}
impl ToHttpMethod for Method {
fn to_http_method(&self) -> HttpMethod {
| {
"chunk": null,
"crate": "external-services",
"enum_name": null,
"file_size": null,
"for_type": null,
"function_name": null,
"is_async": null,
"is_pub": null,
"lines": 15,
"method_name": null,
"num_enums": null,
"num_items": null,
"num_structs": null,
"repo": "connector-service",
"start_line": 75,
"struct_name": null,
"total_crates": null,
"trait_name": null
} |
connector-service_snippet_-7416499650036175072_75_30 | clm | snippet | // connector-service/backend/external-services/src/service.rs
};
use once_cell::sync::OnceCell;
use reqwest::Client;
use serde_json::json;
use tracing::field::Empty;
use crate::shared_metrics as metrics;
pub type Headers = std::collections::HashSet<(String, Maskable<String>)>;
trait ToHttpMethod {
fn to_http_method(&self) -> HttpMethod;
}
impl ToHttpMethod for Method {
fn to_http_method(&self) -> HttpMethod {
match self {
Self::Get => HttpMethod::GET,
Self::Post => HttpMethod::POST,
Self::Put => HttpMethod::PUT,
Self::Patch => HttpMethod::PATCH,
Self::Delete => HttpMethod::DELETE,
}
}
}
#[derive(Debug)]
pub struct EventProcessingParams<'a> {
pub connector_name: &'a str,
pub service_name: &'a str,
pub flow_name: FlowName,
| {
"chunk": null,
"crate": "external-services",
"enum_name": null,
"file_size": null,
"for_type": null,
"function_name": null,
"is_async": null,
"is_pub": null,
"lines": 30,
"method_name": null,
"num_enums": null,
"num_items": null,
"num_structs": null,
"repo": "connector-service",
"start_line": 75,
"struct_name": null,
"total_crates": null,
"trait_name": null
} |
connector-service_snippet_-7416499650036175072_75_50 | clm | snippet | // connector-service/backend/external-services/src/service.rs
};
use once_cell::sync::OnceCell;
use reqwest::Client;
use serde_json::json;
use tracing::field::Empty;
use crate::shared_metrics as metrics;
pub type Headers = std::collections::HashSet<(String, Maskable<String>)>;
trait ToHttpMethod {
fn to_http_method(&self) -> HttpMethod;
}
impl ToHttpMethod for Method {
fn to_http_method(&self) -> HttpMethod {
match self {
Self::Get => HttpMethod::GET,
Self::Post => HttpMethod::POST,
Self::Put => HttpMethod::PUT,
Self::Patch => HttpMethod::PATCH,
Self::Delete => HttpMethod::DELETE,
}
}
}
#[derive(Debug)]
pub struct EventProcessingParams<'a> {
pub connector_name: &'a str,
pub service_name: &'a str,
pub flow_name: FlowName,
pub event_config: &'a EventConfig,
pub request_id: &'a str,
pub lineage_ids: &'a lineage::LineageIds<'a>,
pub reference_id: &'a Option<String>,
pub shadow_mode: bool,
}
#[tracing::instrument(
name = "execute_connector_processing_step",
skip_all,
fields(
request.headers = Empty,
request.body = Empty,
request.url = Empty,
request.method = Empty,
response.body = Empty,
response.headers = Empty,
response.error_message = Empty,
response.status_code = Empty,
message_ = "Golden Log Line (outgoing)",
| {
"chunk": null,
"crate": "external-services",
"enum_name": null,
"file_size": null,
"for_type": null,
"function_name": null,
"is_async": null,
"is_pub": null,
"lines": 50,
"method_name": null,
"num_enums": null,
"num_items": null,
"num_structs": null,
"repo": "connector-service",
"start_line": 75,
"struct_name": null,
"total_crates": null,
"trait_name": null
} |
connector-service_snippet_-7416499650036175072_100_15 | clm | snippet | // connector-service/backend/external-services/src/service.rs
#[derive(Debug)]
pub struct EventProcessingParams<'a> {
pub connector_name: &'a str,
pub service_name: &'a str,
pub flow_name: FlowName,
pub event_config: &'a EventConfig,
pub request_id: &'a str,
pub lineage_ids: &'a lineage::LineageIds<'a>,
pub reference_id: &'a Option<String>,
pub shadow_mode: bool,
}
#[tracing::instrument(
name = "execute_connector_processing_step",
skip_all,
| {
"chunk": null,
"crate": "external-services",
"enum_name": null,
"file_size": null,
"for_type": null,
"function_name": null,
"is_async": null,
"is_pub": null,
"lines": 15,
"method_name": null,
"num_enums": null,
"num_items": null,
"num_structs": null,
"repo": "connector-service",
"start_line": 100,
"struct_name": null,
"total_crates": null,
"trait_name": null
} |
connector-service_snippet_-7416499650036175072_100_30 | clm | snippet | // connector-service/backend/external-services/src/service.rs
#[derive(Debug)]
pub struct EventProcessingParams<'a> {
pub connector_name: &'a str,
pub service_name: &'a str,
pub flow_name: FlowName,
pub event_config: &'a EventConfig,
pub request_id: &'a str,
pub lineage_ids: &'a lineage::LineageIds<'a>,
pub reference_id: &'a Option<String>,
pub shadow_mode: bool,
}
#[tracing::instrument(
name = "execute_connector_processing_step",
skip_all,
fields(
request.headers = Empty,
request.body = Empty,
request.url = Empty,
request.method = Empty,
response.body = Empty,
response.headers = Empty,
response.error_message = Empty,
response.status_code = Empty,
message_ = "Golden Log Line (outgoing)",
latency = Empty,
)
)]
pub async fn execute_connector_processing_step<T, F, ResourceCommonData, Req, Resp>(
proxy: &Proxy,
| {
"chunk": null,
"crate": "external-services",
"enum_name": null,
"file_size": null,
"for_type": null,
"function_name": null,
"is_async": null,
"is_pub": null,
"lines": 30,
"method_name": null,
"num_enums": null,
"num_items": null,
"num_structs": null,
"repo": "connector-service",
"start_line": 100,
"struct_name": null,
"total_crates": null,
"trait_name": null
} |
connector-service_snippet_-7416499650036175072_100_50 | clm | snippet | // connector-service/backend/external-services/src/service.rs
#[derive(Debug)]
pub struct EventProcessingParams<'a> {
pub connector_name: &'a str,
pub service_name: &'a str,
pub flow_name: FlowName,
pub event_config: &'a EventConfig,
pub request_id: &'a str,
pub lineage_ids: &'a lineage::LineageIds<'a>,
pub reference_id: &'a Option<String>,
pub shadow_mode: bool,
}
#[tracing::instrument(
name = "execute_connector_processing_step",
skip_all,
fields(
request.headers = Empty,
request.body = Empty,
request.url = Empty,
request.method = Empty,
response.body = Empty,
response.headers = Empty,
response.error_message = Empty,
response.status_code = Empty,
message_ = "Golden Log Line (outgoing)",
latency = Empty,
)
)]
pub async fn execute_connector_processing_step<T, F, ResourceCommonData, Req, Resp>(
proxy: &Proxy,
connector: BoxedConnectorIntegrationV2<'static, F, ResourceCommonData, Req, Resp>,
router_data: RouterDataV2<F, ResourceCommonData, Req, Resp>,
all_keys_required: Option<bool>,
event_params: EventProcessingParams<'_>,
token_data: Option<TokenData>,
call_connector_action: common_enums::CallConnectorAction,
) -> CustomResult<RouterDataV2<F, ResourceCommonData, Req, Resp>, ConnectorError>
where
F: Clone + 'static,
T: FlowIntegrity,
Req: Clone + 'static + std::fmt::Debug + GetIntegrityObject<T> + CheckIntegrity<Req, T>,
Resp: Clone + 'static + std::fmt::Debug,
ResourceCommonData: Clone
+ 'static
+ RawConnectorRequestResponse
+ ConnectorResponseHeaders
+ ConnectorRequestReference
+ AdditionalHeaders,
{
let start = tokio::time::Instant::now();
| {
"chunk": null,
"crate": "external-services",
"enum_name": null,
"file_size": null,
"for_type": null,
"function_name": null,
"is_async": null,
"is_pub": null,
"lines": 50,
"method_name": null,
"num_enums": null,
"num_items": null,
"num_structs": null,
"repo": "connector-service",
"start_line": 100,
"struct_name": null,
"total_crates": null,
"trait_name": null
} |
connector-service_snippet_-7416499650036175072_125_15 | clm | snippet | // connector-service/backend/external-services/src/service.rs
latency = Empty,
)
)]
pub async fn execute_connector_processing_step<T, F, ResourceCommonData, Req, Resp>(
proxy: &Proxy,
connector: BoxedConnectorIntegrationV2<'static, F, ResourceCommonData, Req, Resp>,
router_data: RouterDataV2<F, ResourceCommonData, Req, Resp>,
all_keys_required: Option<bool>,
event_params: EventProcessingParams<'_>,
token_data: Option<TokenData>,
call_connector_action: common_enums::CallConnectorAction,
) -> CustomResult<RouterDataV2<F, ResourceCommonData, Req, Resp>, ConnectorError>
where
F: Clone + 'static,
T: FlowIntegrity,
| {
"chunk": null,
"crate": "external-services",
"enum_name": null,
"file_size": null,
"for_type": null,
"function_name": null,
"is_async": null,
"is_pub": null,
"lines": 15,
"method_name": null,
"num_enums": null,
"num_items": null,
"num_structs": null,
"repo": "connector-service",
"start_line": 125,
"struct_name": null,
"total_crates": null,
"trait_name": null
} |
connector-service_snippet_-7416499650036175072_125_30 | clm | snippet | // connector-service/backend/external-services/src/service.rs
latency = Empty,
)
)]
pub async fn execute_connector_processing_step<T, F, ResourceCommonData, Req, Resp>(
proxy: &Proxy,
connector: BoxedConnectorIntegrationV2<'static, F, ResourceCommonData, Req, Resp>,
router_data: RouterDataV2<F, ResourceCommonData, Req, Resp>,
all_keys_required: Option<bool>,
event_params: EventProcessingParams<'_>,
token_data: Option<TokenData>,
call_connector_action: common_enums::CallConnectorAction,
) -> CustomResult<RouterDataV2<F, ResourceCommonData, Req, Resp>, ConnectorError>
where
F: Clone + 'static,
T: FlowIntegrity,
Req: Clone + 'static + std::fmt::Debug + GetIntegrityObject<T> + CheckIntegrity<Req, T>,
Resp: Clone + 'static + std::fmt::Debug,
ResourceCommonData: Clone
+ 'static
+ RawConnectorRequestResponse
+ ConnectorResponseHeaders
+ ConnectorRequestReference
+ AdditionalHeaders,
{
let start = tokio::time::Instant::now();
let result = match call_connector_action {
common_enums::CallConnectorAction::HandleResponse(res) => {
let body = Response {
headers: None,
response: res.into(),
| {
"chunk": null,
"crate": "external-services",
"enum_name": null,
"file_size": null,
"for_type": null,
"function_name": null,
"is_async": null,
"is_pub": null,
"lines": 30,
"method_name": null,
"num_enums": null,
"num_items": null,
"num_structs": null,
"repo": "connector-service",
"start_line": 125,
"struct_name": null,
"total_crates": null,
"trait_name": null
} |
connector-service_snippet_-7416499650036175072_125_50 | clm | snippet | // connector-service/backend/external-services/src/service.rs
latency = Empty,
)
)]
pub async fn execute_connector_processing_step<T, F, ResourceCommonData, Req, Resp>(
proxy: &Proxy,
connector: BoxedConnectorIntegrationV2<'static, F, ResourceCommonData, Req, Resp>,
router_data: RouterDataV2<F, ResourceCommonData, Req, Resp>,
all_keys_required: Option<bool>,
event_params: EventProcessingParams<'_>,
token_data: Option<TokenData>,
call_connector_action: common_enums::CallConnectorAction,
) -> CustomResult<RouterDataV2<F, ResourceCommonData, Req, Resp>, ConnectorError>
where
F: Clone + 'static,
T: FlowIntegrity,
Req: Clone + 'static + std::fmt::Debug + GetIntegrityObject<T> + CheckIntegrity<Req, T>,
Resp: Clone + 'static + std::fmt::Debug,
ResourceCommonData: Clone
+ 'static
+ RawConnectorRequestResponse
+ ConnectorResponseHeaders
+ ConnectorRequestReference
+ AdditionalHeaders,
{
let start = tokio::time::Instant::now();
let result = match call_connector_action {
common_enums::CallConnectorAction::HandleResponse(res) => {
let body = Response {
headers: None,
response: res.into(),
status_code: 200,
};
let status_code = body.status_code;
tracing::Span::current().record("status_code", tracing::field::display(status_code));
if let Ok(response) = parse_json_with_bom_handling(&body.response) {
tracing::Span::current().record(
"response.body",
tracing::field::display(response.masked_serialize().unwrap_or(
json!({ "error": "failed to mask serialize connector response"}),
)),
);
}
// Set raw_connector_response BEFORE calling the transformer
let mut updated_router_data = router_data.clone();
if all_keys_required.unwrap_or(true) {
let raw_response_string = strip_bom_and_convert_to_string(&body.response);
updated_router_data
.resource_common_data
| {
"chunk": null,
"crate": "external-services",
"enum_name": null,
"file_size": null,
"for_type": null,
"function_name": null,
"is_async": null,
"is_pub": null,
"lines": 50,
"method_name": null,
"num_enums": null,
"num_items": null,
"num_structs": null,
"repo": "connector-service",
"start_line": 125,
"struct_name": null,
"total_crates": null,
"trait_name": null
} |
connector-service_snippet_-7416499650036175072_150_15 | clm | snippet | // connector-service/backend/external-services/src/service.rs
let result = match call_connector_action {
common_enums::CallConnectorAction::HandleResponse(res) => {
let body = Response {
headers: None,
response: res.into(),
status_code: 200,
};
let status_code = body.status_code;
tracing::Span::current().record("status_code", tracing::field::display(status_code));
if let Ok(response) = parse_json_with_bom_handling(&body.response) {
tracing::Span::current().record(
"response.body",
tracing::field::display(response.masked_serialize().unwrap_or(
json!({ "error": "failed to mask serialize connector response"}),
| {
"chunk": null,
"crate": "external-services",
"enum_name": null,
"file_size": null,
"for_type": null,
"function_name": null,
"is_async": null,
"is_pub": null,
"lines": 15,
"method_name": null,
"num_enums": null,
"num_items": null,
"num_structs": null,
"repo": "connector-service",
"start_line": 150,
"struct_name": null,
"total_crates": null,
"trait_name": null
} |
connector-service_snippet_-7416499650036175072_150_30 | clm | snippet | // connector-service/backend/external-services/src/service.rs
let result = match call_connector_action {
common_enums::CallConnectorAction::HandleResponse(res) => {
let body = Response {
headers: None,
response: res.into(),
status_code: 200,
};
let status_code = body.status_code;
tracing::Span::current().record("status_code", tracing::field::display(status_code));
if let Ok(response) = parse_json_with_bom_handling(&body.response) {
tracing::Span::current().record(
"response.body",
tracing::field::display(response.masked_serialize().unwrap_or(
json!({ "error": "failed to mask serialize connector response"}),
)),
);
}
// Set raw_connector_response BEFORE calling the transformer
let mut updated_router_data = router_data.clone();
if all_keys_required.unwrap_or(true) {
let raw_response_string = strip_bom_and_convert_to_string(&body.response);
updated_router_data
.resource_common_data
.set_raw_connector_response(raw_response_string.map(Into::into));
}
let handle_response_result =
connector.handle_response_v2(&updated_router_data, None, body.clone());
| {
"chunk": null,
"crate": "external-services",
"enum_name": null,
"file_size": null,
"for_type": null,
"function_name": null,
"is_async": null,
"is_pub": null,
"lines": 30,
"method_name": null,
"num_enums": null,
"num_items": null,
"num_structs": null,
"repo": "connector-service",
"start_line": 150,
"struct_name": null,
"total_crates": null,
"trait_name": null
} |
connector-service_snippet_-7416499650036175072_150_50 | clm | snippet | // connector-service/backend/external-services/src/service.rs
let result = match call_connector_action {
common_enums::CallConnectorAction::HandleResponse(res) => {
let body = Response {
headers: None,
response: res.into(),
status_code: 200,
};
let status_code = body.status_code;
tracing::Span::current().record("status_code", tracing::field::display(status_code));
if let Ok(response) = parse_json_with_bom_handling(&body.response) {
tracing::Span::current().record(
"response.body",
tracing::field::display(response.masked_serialize().unwrap_or(
json!({ "error": "failed to mask serialize connector response"}),
)),
);
}
// Set raw_connector_response BEFORE calling the transformer
let mut updated_router_data = router_data.clone();
if all_keys_required.unwrap_or(true) {
let raw_response_string = strip_bom_and_convert_to_string(&body.response);
updated_router_data
.resource_common_data
.set_raw_connector_response(raw_response_string.map(Into::into));
}
let handle_response_result =
connector.handle_response_v2(&updated_router_data, None, body.clone());
let response = match handle_response_result {
Ok(data) => {
tracing::info!("Transformer completed successfully");
Ok(data)
}
Err(err) => Err(err),
}?;
Ok(response)
}
common_enums::CallConnectorAction::Trigger => {
let mut connector_request = connector.build_request_v2(&router_data.clone())?;
let mut updated_router_data = router_data.clone();
updated_router_data = match &connector_request {
Some(request) => {
updated_router_data
.resource_common_data
.set_raw_connector_request(Some(
| {
"chunk": null,
"crate": "external-services",
"enum_name": null,
"file_size": null,
"for_type": null,
"function_name": null,
"is_async": null,
"is_pub": null,
"lines": 50,
"method_name": null,
"num_enums": null,
"num_items": null,
"num_structs": null,
"repo": "connector-service",
"start_line": 150,
"struct_name": null,
"total_crates": null,
"trait_name": null
} |
connector-service_snippet_-7416499650036175072_175_15 | clm | snippet | // connector-service/backend/external-services/src/service.rs
.set_raw_connector_response(raw_response_string.map(Into::into));
}
let handle_response_result =
connector.handle_response_v2(&updated_router_data, None, body.clone());
let response = match handle_response_result {
Ok(data) => {
tracing::info!("Transformer completed successfully");
Ok(data)
}
Err(err) => Err(err),
}?;
Ok(response)
| {
"chunk": null,
"crate": "external-services",
"enum_name": null,
"file_size": null,
"for_type": null,
"function_name": null,
"is_async": null,
"is_pub": null,
"lines": 15,
"method_name": null,
"num_enums": null,
"num_items": null,
"num_structs": null,
"repo": "connector-service",
"start_line": 175,
"struct_name": null,
"total_crates": null,
"trait_name": null
} |
connector-service_snippet_-7416499650036175072_175_30 | clm | snippet | // connector-service/backend/external-services/src/service.rs
.set_raw_connector_response(raw_response_string.map(Into::into));
}
let handle_response_result =
connector.handle_response_v2(&updated_router_data, None, body.clone());
let response = match handle_response_result {
Ok(data) => {
tracing::info!("Transformer completed successfully");
Ok(data)
}
Err(err) => Err(err),
}?;
Ok(response)
}
common_enums::CallConnectorAction::Trigger => {
let mut connector_request = connector.build_request_v2(&router_data.clone())?;
let mut updated_router_data = router_data.clone();
updated_router_data = match &connector_request {
Some(request) => {
updated_router_data
.resource_common_data
.set_raw_connector_request(Some(
extract_raw_connector_request(request).into(),
));
updated_router_data
}
None => updated_router_data,
| {
"chunk": null,
"crate": "external-services",
"enum_name": null,
"file_size": null,
"for_type": null,
"function_name": null,
"is_async": null,
"is_pub": null,
"lines": 30,
"method_name": null,
"num_enums": null,
"num_items": null,
"num_structs": null,
"repo": "connector-service",
"start_line": 175,
"struct_name": null,
"total_crates": null,
"trait_name": null
} |
connector-service_snippet_-7416499650036175072_175_50 | clm | snippet | // connector-service/backend/external-services/src/service.rs
.set_raw_connector_response(raw_response_string.map(Into::into));
}
let handle_response_result =
connector.handle_response_v2(&updated_router_data, None, body.clone());
let response = match handle_response_result {
Ok(data) => {
tracing::info!("Transformer completed successfully");
Ok(data)
}
Err(err) => Err(err),
}?;
Ok(response)
}
common_enums::CallConnectorAction::Trigger => {
let mut connector_request = connector.build_request_v2(&router_data.clone())?;
let mut updated_router_data = router_data.clone();
updated_router_data = match &connector_request {
Some(request) => {
updated_router_data
.resource_common_data
.set_raw_connector_request(Some(
extract_raw_connector_request(request).into(),
));
updated_router_data
}
None => updated_router_data,
};
connector_request = connector_request.map(|mut req| {
if event_params.shadow_mode {
req.add_header(
consts::X_REQUEST_ID,
Maskable::Masked(Secret::new(event_params.request_id.to_string())),
);
req.add_header(
consts::X_SOURCE_NAME,
Maskable::Masked(Secret::new(consts::X_CONNECTOR_SERVICE.to_string())),
);
req.add_header(
consts::X_FLOW_NAME,
Maskable::Masked(Secret::new(event_params.flow_name.to_string())),
);
req.add_header(
consts::X_CONNECTOR_NAME,
Maskable::Masked(Secret::new(event_params.connector_name.to_string())),
);
| {
"chunk": null,
"crate": "external-services",
"enum_name": null,
"file_size": null,
"for_type": null,
"function_name": null,
"is_async": null,
"is_pub": null,
"lines": 50,
"method_name": null,
"num_enums": null,
"num_items": null,
"num_structs": null,
"repo": "connector-service",
"start_line": 175,
"struct_name": null,
"total_crates": null,
"trait_name": null
} |
connector-service_snippet_-7416499650036175072_200_15 | clm | snippet | // connector-service/backend/external-services/src/service.rs
extract_raw_connector_request(request).into(),
));
updated_router_data
}
None => updated_router_data,
};
connector_request = connector_request.map(|mut req| {
if event_params.shadow_mode {
req.add_header(
consts::X_REQUEST_ID,
Maskable::Masked(Secret::new(event_params.request_id.to_string())),
);
req.add_header(
consts::X_SOURCE_NAME,
Maskable::Masked(Secret::new(consts::X_CONNECTOR_SERVICE.to_string())),
| {
"chunk": null,
"crate": "external-services",
"enum_name": null,
"file_size": null,
"for_type": null,
"function_name": null,
"is_async": null,
"is_pub": null,
"lines": 15,
"method_name": null,
"num_enums": null,
"num_items": null,
"num_structs": null,
"repo": "connector-service",
"start_line": 200,
"struct_name": null,
"total_crates": null,
"trait_name": null
} |
connector-service_snippet_-7416499650036175072_200_30 | clm | snippet | // connector-service/backend/external-services/src/service.rs
extract_raw_connector_request(request).into(),
));
updated_router_data
}
None => updated_router_data,
};
connector_request = connector_request.map(|mut req| {
if event_params.shadow_mode {
req.add_header(
consts::X_REQUEST_ID,
Maskable::Masked(Secret::new(event_params.request_id.to_string())),
);
req.add_header(
consts::X_SOURCE_NAME,
Maskable::Masked(Secret::new(consts::X_CONNECTOR_SERVICE.to_string())),
);
req.add_header(
consts::X_FLOW_NAME,
Maskable::Masked(Secret::new(event_params.flow_name.to_string())),
);
req.add_header(
consts::X_CONNECTOR_NAME,
Maskable::Masked(Secret::new(event_params.connector_name.to_string())),
);
}
req
});
let headers = connector_request
.as_ref()
| {
"chunk": null,
"crate": "external-services",
"enum_name": null,
"file_size": null,
"for_type": null,
"function_name": null,
"is_async": null,
"is_pub": null,
"lines": 30,
"method_name": null,
"num_enums": null,
"num_items": null,
"num_structs": null,
"repo": "connector-service",
"start_line": 200,
"struct_name": null,
"total_crates": null,
"trait_name": null
} |
connector-service_snippet_-7416499650036175072_200_50 | clm | snippet | // connector-service/backend/external-services/src/service.rs
extract_raw_connector_request(request).into(),
));
updated_router_data
}
None => updated_router_data,
};
connector_request = connector_request.map(|mut req| {
if event_params.shadow_mode {
req.add_header(
consts::X_REQUEST_ID,
Maskable::Masked(Secret::new(event_params.request_id.to_string())),
);
req.add_header(
consts::X_SOURCE_NAME,
Maskable::Masked(Secret::new(consts::X_CONNECTOR_SERVICE.to_string())),
);
req.add_header(
consts::X_FLOW_NAME,
Maskable::Masked(Secret::new(event_params.flow_name.to_string())),
);
req.add_header(
consts::X_CONNECTOR_NAME,
Maskable::Masked(Secret::new(event_params.connector_name.to_string())),
);
}
req
});
let headers = connector_request
.as_ref()
.map(|connector_request| connector_request.headers.clone())
.unwrap_or_default();
tracing::info!(?headers, "headers of connector request");
let event_headers: HashMap<String, String> = headers
.iter()
.map(|(k, v)| (k.clone(), format!("{v:?}")))
.collect();
let masked_headers = headers
.iter()
.fold(serde_json::Map::new(), |mut acc, (k, v)| {
let value = match v {
Maskable::Masked(_) => {
serde_json::Value::String("*** alloc::string::String ***".to_string())
}
Maskable::Normal(iv) => serde_json::Value::String(iv.to_owned()),
};
acc.insert(k.clone(), value);
acc
| {
"chunk": null,
"crate": "external-services",
"enum_name": null,
"file_size": null,
"for_type": null,
"function_name": null,
"is_async": null,
"is_pub": null,
"lines": 50,
"method_name": null,
"num_enums": null,
"num_items": null,
"num_structs": null,
"repo": "connector-service",
"start_line": 200,
"struct_name": null,
"total_crates": null,
"trait_name": null
} |
connector-service_snippet_-7416499650036175072_225_15 | clm | snippet | // connector-service/backend/external-services/src/service.rs
}
req
});
let headers = connector_request
.as_ref()
.map(|connector_request| connector_request.headers.clone())
.unwrap_or_default();
tracing::info!(?headers, "headers of connector request");
let event_headers: HashMap<String, String> = headers
.iter()
.map(|(k, v)| (k.clone(), format!("{v:?}")))
.collect();
let masked_headers = headers
| {
"chunk": null,
"crate": "external-services",
"enum_name": null,
"file_size": null,
"for_type": null,
"function_name": null,
"is_async": null,
"is_pub": null,
"lines": 15,
"method_name": null,
"num_enums": null,
"num_items": null,
"num_structs": null,
"repo": "connector-service",
"start_line": 225,
"struct_name": null,
"total_crates": null,
"trait_name": null
} |
connector-service_snippet_-7416499650036175072_225_30 | clm | snippet | // connector-service/backend/external-services/src/service.rs
}
req
});
let headers = connector_request
.as_ref()
.map(|connector_request| connector_request.headers.clone())
.unwrap_or_default();
tracing::info!(?headers, "headers of connector request");
let event_headers: HashMap<String, String> = headers
.iter()
.map(|(k, v)| (k.clone(), format!("{v:?}")))
.collect();
let masked_headers = headers
.iter()
.fold(serde_json::Map::new(), |mut acc, (k, v)| {
let value = match v {
Maskable::Masked(_) => {
serde_json::Value::String("*** alloc::string::String ***".to_string())
}
Maskable::Normal(iv) => serde_json::Value::String(iv.to_owned()),
};
acc.insert(k.clone(), value);
acc
});
let headers = serde_json::Value::Object(masked_headers);
tracing::Span::current().record("request.headers", tracing::field::display(&headers));
let req = connector_request.as_ref().map(|connector_request| {
| {
"chunk": null,
"crate": "external-services",
"enum_name": null,
"file_size": null,
"for_type": null,
"function_name": null,
"is_async": null,
"is_pub": null,
"lines": 30,
"method_name": null,
"num_enums": null,
"num_items": null,
"num_structs": null,
"repo": "connector-service",
"start_line": 225,
"struct_name": null,
"total_crates": null,
"trait_name": null
} |
connector-service_snippet_-7416499650036175072_225_50 | clm | snippet | // connector-service/backend/external-services/src/service.rs
}
req
});
let headers = connector_request
.as_ref()
.map(|connector_request| connector_request.headers.clone())
.unwrap_or_default();
tracing::info!(?headers, "headers of connector request");
let event_headers: HashMap<String, String> = headers
.iter()
.map(|(k, v)| (k.clone(), format!("{v:?}")))
.collect();
let masked_headers = headers
.iter()
.fold(serde_json::Map::new(), |mut acc, (k, v)| {
let value = match v {
Maskable::Masked(_) => {
serde_json::Value::String("*** alloc::string::String ***".to_string())
}
Maskable::Normal(iv) => serde_json::Value::String(iv.to_owned()),
};
acc.insert(k.clone(), value);
acc
});
let headers = serde_json::Value::Object(masked_headers);
tracing::Span::current().record("request.headers", tracing::field::display(&headers));
let req = connector_request.as_ref().map(|connector_request| {
let masked_request = match connector_request.body.as_ref() {
Some(request) => match request {
RequestContent::Json(i)
| RequestContent::FormUrlEncoded(i)
| RequestContent::Xml(i) => (**i).masked_serialize().unwrap_or(
json!({ "error": "failed to mask serialize connector request"}),
),
RequestContent::FormData(_) => json!({"request_type": "FORM_DATA"}),
RequestContent::RawBytes(_) => json!({"request_type": "RAW_BYTES"}),
},
None => serde_json::Value::Null,
};
tracing::info!(request=?masked_request, "request of connector");
tracing::Span::current()
.record("request.body", tracing::field::display(&masked_request));
masked_request
});
match connector_request {
| {
"chunk": null,
"crate": "external-services",
"enum_name": null,
"file_size": null,
"for_type": null,
"function_name": null,
"is_async": null,
"is_pub": null,
"lines": 50,
"method_name": null,
"num_enums": null,
"num_items": null,
"num_structs": null,
"repo": "connector-service",
"start_line": 225,
"struct_name": null,
"total_crates": null,
"trait_name": null
} |
connector-service_snippet_-7416499650036175072_250_15 | clm | snippet | // connector-service/backend/external-services/src/service.rs
});
let headers = serde_json::Value::Object(masked_headers);
tracing::Span::current().record("request.headers", tracing::field::display(&headers));
let req = connector_request.as_ref().map(|connector_request| {
let masked_request = match connector_request.body.as_ref() {
Some(request) => match request {
RequestContent::Json(i)
| RequestContent::FormUrlEncoded(i)
| RequestContent::Xml(i) => (**i).masked_serialize().unwrap_or(
json!({ "error": "failed to mask serialize connector request"}),
),
RequestContent::FormData(_) => json!({"request_type": "FORM_DATA"}),
RequestContent::RawBytes(_) => json!({"request_type": "RAW_BYTES"}),
},
| {
"chunk": null,
"crate": "external-services",
"enum_name": null,
"file_size": null,
"for_type": null,
"function_name": null,
"is_async": null,
"is_pub": null,
"lines": 15,
"method_name": null,
"num_enums": null,
"num_items": null,
"num_structs": null,
"repo": "connector-service",
"start_line": 250,
"struct_name": null,
"total_crates": null,
"trait_name": null
} |
connector-service_snippet_-7416499650036175072_250_30 | clm | snippet | // connector-service/backend/external-services/src/service.rs
});
let headers = serde_json::Value::Object(masked_headers);
tracing::Span::current().record("request.headers", tracing::field::display(&headers));
let req = connector_request.as_ref().map(|connector_request| {
let masked_request = match connector_request.body.as_ref() {
Some(request) => match request {
RequestContent::Json(i)
| RequestContent::FormUrlEncoded(i)
| RequestContent::Xml(i) => (**i).masked_serialize().unwrap_or(
json!({ "error": "failed to mask serialize connector request"}),
),
RequestContent::FormData(_) => json!({"request_type": "FORM_DATA"}),
RequestContent::RawBytes(_) => json!({"request_type": "RAW_BYTES"}),
},
None => serde_json::Value::Null,
};
tracing::info!(request=?masked_request, "request of connector");
tracing::Span::current()
.record("request.body", tracing::field::display(&masked_request));
masked_request
});
match connector_request {
Some(request) => {
let url = request.url.clone();
let method = request.method;
metrics::EXTERNAL_SERVICE_TOTAL_API_CALLS
.with_label_values(&[
| {
"chunk": null,
"crate": "external-services",
"enum_name": null,
"file_size": null,
"for_type": null,
"function_name": null,
"is_async": null,
"is_pub": null,
"lines": 30,
"method_name": null,
"num_enums": null,
"num_items": null,
"num_structs": null,
"repo": "connector-service",
"start_line": 250,
"struct_name": null,
"total_crates": null,
"trait_name": null
} |
connector-service_snippet_-7416499650036175072_250_50 | clm | snippet | // connector-service/backend/external-services/src/service.rs
});
let headers = serde_json::Value::Object(masked_headers);
tracing::Span::current().record("request.headers", tracing::field::display(&headers));
let req = connector_request.as_ref().map(|connector_request| {
let masked_request = match connector_request.body.as_ref() {
Some(request) => match request {
RequestContent::Json(i)
| RequestContent::FormUrlEncoded(i)
| RequestContent::Xml(i) => (**i).masked_serialize().unwrap_or(
json!({ "error": "failed to mask serialize connector request"}),
),
RequestContent::FormData(_) => json!({"request_type": "FORM_DATA"}),
RequestContent::RawBytes(_) => json!({"request_type": "RAW_BYTES"}),
},
None => serde_json::Value::Null,
};
tracing::info!(request=?masked_request, "request of connector");
tracing::Span::current()
.record("request.body", tracing::field::display(&masked_request));
masked_request
});
match connector_request {
Some(request) => {
let url = request.url.clone();
let method = request.method;
metrics::EXTERNAL_SERVICE_TOTAL_API_CALLS
.with_label_values(&[
&method.to_string(),
event_params.service_name,
event_params.connector_name,
])
.inc();
let external_service_start_latency = tokio::time::Instant::now();
tracing::Span::current().record("request.url", tracing::field::display(&url));
tracing::Span::current()
.record("request.method", tracing::field::display(method));
let request_id = event_params.request_id.to_string();
let response = if let Some(token_data) = token_data {
tracing::debug!(
"Creating injector request with token data using unified API"
);
// Extract template and combine headers
let template = request
.body
.as_ref()
| {
"chunk": null,
"crate": "external-services",
"enum_name": null,
"file_size": null,
"for_type": null,
"function_name": null,
"is_async": null,
"is_pub": null,
"lines": 50,
"method_name": null,
"num_enums": null,
"num_items": null,
"num_structs": null,
"repo": "connector-service",
"start_line": 250,
"struct_name": null,
"total_crates": null,
"trait_name": null
} |
connector-service_snippet_-7416499650036175072_275_15 | clm | snippet | // connector-service/backend/external-services/src/service.rs
Some(request) => {
let url = request.url.clone();
let method = request.method;
metrics::EXTERNAL_SERVICE_TOTAL_API_CALLS
.with_label_values(&[
&method.to_string(),
event_params.service_name,
event_params.connector_name,
])
.inc();
let external_service_start_latency = tokio::time::Instant::now();
tracing::Span::current().record("request.url", tracing::field::display(&url));
tracing::Span::current()
.record("request.method", tracing::field::display(method));
let request_id = event_params.request_id.to_string();
| {
"chunk": null,
"crate": "external-services",
"enum_name": null,
"file_size": null,
"for_type": null,
"function_name": null,
"is_async": null,
"is_pub": null,
"lines": 15,
"method_name": null,
"num_enums": null,
"num_items": null,
"num_structs": null,
"repo": "connector-service",
"start_line": 275,
"struct_name": null,
"total_crates": null,
"trait_name": null
} |
connector-service_snippet_-7416499650036175072_275_30 | clm | snippet | // connector-service/backend/external-services/src/service.rs
Some(request) => {
let url = request.url.clone();
let method = request.method;
metrics::EXTERNAL_SERVICE_TOTAL_API_CALLS
.with_label_values(&[
&method.to_string(),
event_params.service_name,
event_params.connector_name,
])
.inc();
let external_service_start_latency = tokio::time::Instant::now();
tracing::Span::current().record("request.url", tracing::field::display(&url));
tracing::Span::current()
.record("request.method", tracing::field::display(method));
let request_id = event_params.request_id.to_string();
let response = if let Some(token_data) = token_data {
tracing::debug!(
"Creating injector request with token data using unified API"
);
// Extract template and combine headers
let template = request
.body
.as_ref()
.ok_or(ConnectorError::RequestEncodingFailed)?
.get_inner_value()
.expose()
.to_string();
| {
"chunk": null,
"crate": "external-services",
"enum_name": null,
"file_size": null,
"for_type": null,
"function_name": null,
"is_async": null,
"is_pub": null,
"lines": 30,
"method_name": null,
"num_enums": null,
"num_items": null,
"num_structs": null,
"repo": "connector-service",
"start_line": 275,
"struct_name": null,
"total_crates": null,
"trait_name": null
} |
connector-service_snippet_-7416499650036175072_275_50 | clm | snippet | // connector-service/backend/external-services/src/service.rs
Some(request) => {
let url = request.url.clone();
let method = request.method;
metrics::EXTERNAL_SERVICE_TOTAL_API_CALLS
.with_label_values(&[
&method.to_string(),
event_params.service_name,
event_params.connector_name,
])
.inc();
let external_service_start_latency = tokio::time::Instant::now();
tracing::Span::current().record("request.url", tracing::field::display(&url));
tracing::Span::current()
.record("request.method", tracing::field::display(method));
let request_id = event_params.request_id.to_string();
let response = if let Some(token_data) = token_data {
tracing::debug!(
"Creating injector request with token data using unified API"
);
// Extract template and combine headers
let template = request
.body
.as_ref()
.ok_or(ConnectorError::RequestEncodingFailed)?
.get_inner_value()
.expose()
.to_string();
let headers = request
.headers
.iter()
.map(|(key, value)| {
(
key.clone(),
Secret::new(match value {
Maskable::Normal(val) => val.clone(),
Maskable::Masked(val) => val.clone().expose().to_string(),
}),
)
})
.chain(
updated_router_data
.resource_common_data
.get_vault_headers()
.map(|headers| {
headers.iter().map(|(k, v)| (k.clone(), v.clone()))
})
.into_iter()
| {
"chunk": null,
"crate": "external-services",
"enum_name": null,
"file_size": null,
"for_type": null,
"function_name": null,
"is_async": null,
"is_pub": null,
"lines": 50,
"method_name": null,
"num_enums": null,
"num_items": null,
"num_structs": null,
"repo": "connector-service",
"start_line": 275,
"struct_name": null,
"total_crates": null,
"trait_name": null
} |
connector-service_snippet_-7416499650036175072_300_15 | clm | snippet | // connector-service/backend/external-services/src/service.rs
.ok_or(ConnectorError::RequestEncodingFailed)?
.get_inner_value()
.expose()
.to_string();
let headers = request
.headers
.iter()
.map(|(key, value)| {
(
key.clone(),
Secret::new(match value {
Maskable::Normal(val) => val.clone(),
Maskable::Masked(val) => val.clone().expose().to_string(),
}),
| {
"chunk": null,
"crate": "external-services",
"enum_name": null,
"file_size": null,
"for_type": null,
"function_name": null,
"is_async": null,
"is_pub": null,
"lines": 15,
"method_name": null,
"num_enums": null,
"num_items": null,
"num_structs": null,
"repo": "connector-service",
"start_line": 300,
"struct_name": null,
"total_crates": null,
"trait_name": null
} |
connector-service_snippet_-7416499650036175072_300_30 | clm | snippet | // connector-service/backend/external-services/src/service.rs
.ok_or(ConnectorError::RequestEncodingFailed)?
.get_inner_value()
.expose()
.to_string();
let headers = request
.headers
.iter()
.map(|(key, value)| {
(
key.clone(),
Secret::new(match value {
Maskable::Normal(val) => val.clone(),
Maskable::Masked(val) => val.clone().expose().to_string(),
}),
)
})
.chain(
updated_router_data
.resource_common_data
.get_vault_headers()
.map(|headers| {
headers.iter().map(|(k, v)| (k.clone(), v.clone()))
})
.into_iter()
.flatten(),
)
.collect();
// Create injector request
| {
"chunk": null,
"crate": "external-services",
"enum_name": null,
"file_size": null,
"for_type": null,
"function_name": null,
"is_async": null,
"is_pub": null,
"lines": 30,
"method_name": null,
"num_enums": null,
"num_items": null,
"num_structs": null,
"repo": "connector-service",
"start_line": 300,
"struct_name": null,
"total_crates": null,
"trait_name": null
} |
connector-service_snippet_-7416499650036175072_300_50 | clm | snippet | // connector-service/backend/external-services/src/service.rs
.ok_or(ConnectorError::RequestEncodingFailed)?
.get_inner_value()
.expose()
.to_string();
let headers = request
.headers
.iter()
.map(|(key, value)| {
(
key.clone(),
Secret::new(match value {
Maskable::Normal(val) => val.clone(),
Maskable::Masked(val) => val.clone().expose().to_string(),
}),
)
})
.chain(
updated_router_data
.resource_common_data
.get_vault_headers()
.map(|headers| {
headers.iter().map(|(k, v)| (k.clone(), v.clone()))
})
.into_iter()
.flatten(),
)
.collect();
// Create injector request
let injector_request = injector::InjectorRequest::new(
request.url.clone(),
request.method.to_http_method(),
template,
token_data,
Some(headers),
proxy
.https_url
.as_ref()
.or(proxy.http_url.as_ref())
.map(|url| Secret::new(url.clone())),
None,
None,
None,
);
// New injector handles HTTP request internally and returns enhanced response
let injector_response = injector_core(injector_request)
.await
.change_context(ConnectorError::RequestEncodingFailed)?;
| {
"chunk": null,
"crate": "external-services",
"enum_name": null,
"file_size": null,
"for_type": null,
"function_name": null,
"is_async": null,
"is_pub": null,
"lines": 50,
"method_name": null,
"num_enums": null,
"num_items": null,
"num_structs": null,
"repo": "connector-service",
"start_line": 300,
"struct_name": null,
"total_crates": null,
"trait_name": null
} |
connector-service_snippet_-7416499650036175072_325_15 | clm | snippet | // connector-service/backend/external-services/src/service.rs
.flatten(),
)
.collect();
// Create injector request
let injector_request = injector::InjectorRequest::new(
request.url.clone(),
request.method.to_http_method(),
template,
token_data,
Some(headers),
proxy
.https_url
.as_ref()
.or(proxy.http_url.as_ref())
| {
"chunk": null,
"crate": "external-services",
"enum_name": null,
"file_size": null,
"for_type": null,
"function_name": null,
"is_async": null,
"is_pub": null,
"lines": 15,
"method_name": null,
"num_enums": null,
"num_items": null,
"num_structs": null,
"repo": "connector-service",
"start_line": 325,
"struct_name": null,
"total_crates": null,
"trait_name": null
} |
connector-service_snippet_-7416499650036175072_325_30 | clm | snippet | // connector-service/backend/external-services/src/service.rs
.flatten(),
)
.collect();
// Create injector request
let injector_request = injector::InjectorRequest::new(
request.url.clone(),
request.method.to_http_method(),
template,
token_data,
Some(headers),
proxy
.https_url
.as_ref()
.or(proxy.http_url.as_ref())
.map(|url| Secret::new(url.clone())),
None,
None,
None,
);
// New injector handles HTTP request internally and returns enhanced response
let injector_response = injector_core(injector_request)
.await
.change_context(ConnectorError::RequestEncodingFailed)?;
// Convert injector response to connector service Response format
let response_bytes = serde_json::to_vec(&injector_response.response)
.map_err(|_| ConnectorError::ResponseHandlingFailed)?;
| {
"chunk": null,
"crate": "external-services",
"enum_name": null,
"file_size": null,
"for_type": null,
"function_name": null,
"is_async": null,
"is_pub": null,
"lines": 30,
"method_name": null,
"num_enums": null,
"num_items": null,
"num_structs": null,
"repo": "connector-service",
"start_line": 325,
"struct_name": null,
"total_crates": null,
"trait_name": null
} |
connector-service_snippet_-7416499650036175072_325_50 | clm | snippet | // connector-service/backend/external-services/src/service.rs
.flatten(),
)
.collect();
// Create injector request
let injector_request = injector::InjectorRequest::new(
request.url.clone(),
request.method.to_http_method(),
template,
token_data,
Some(headers),
proxy
.https_url
.as_ref()
.or(proxy.http_url.as_ref())
.map(|url| Secret::new(url.clone())),
None,
None,
None,
);
// New injector handles HTTP request internally and returns enhanced response
let injector_response = injector_core(injector_request)
.await
.change_context(ConnectorError::RequestEncodingFailed)?;
// Convert injector response to connector service Response format
let response_bytes = serde_json::to_vec(&injector_response.response)
.map_err(|_| ConnectorError::ResponseHandlingFailed)?;
// Convert headers from HashMap<String, String> to reqwest::HeaderMap if present
let headers = injector_response.headers.map(|h| {
let mut header_map = reqwest::header::HeaderMap::new();
for (key, value) in h {
if let (Ok(header_name), Ok(header_value)) = (
reqwest::header::HeaderName::from_bytes(key.as_bytes()),
reqwest::header::HeaderValue::from_str(&value),
) {
header_map.insert(header_name, header_value);
}
}
header_map
});
Ok(Ok(Response {
headers,
response: response_bytes.into(),
status_code: injector_response.status_code, // Use actual status code from connector
}))
} else {
| {
"chunk": null,
"crate": "external-services",
"enum_name": null,
"file_size": null,
"for_type": null,
"function_name": null,
"is_async": null,
"is_pub": null,
"lines": 50,
"method_name": null,
"num_enums": null,
"num_items": null,
"num_structs": null,
"repo": "connector-service",
"start_line": 325,
"struct_name": null,
"total_crates": null,
"trait_name": null
} |
connector-service_snippet_-7416499650036175072_350_15 | clm | snippet | // connector-service/backend/external-services/src/service.rs
// Convert injector response to connector service Response format
let response_bytes = serde_json::to_vec(&injector_response.response)
.map_err(|_| ConnectorError::ResponseHandlingFailed)?;
// Convert headers from HashMap<String, String> to reqwest::HeaderMap if present
let headers = injector_response.headers.map(|h| {
let mut header_map = reqwest::header::HeaderMap::new();
for (key, value) in h {
if let (Ok(header_name), Ok(header_value)) = (
reqwest::header::HeaderName::from_bytes(key.as_bytes()),
reqwest::header::HeaderValue::from_str(&value),
) {
header_map.insert(header_name, header_value);
}
| {
"chunk": null,
"crate": "external-services",
"enum_name": null,
"file_size": null,
"for_type": null,
"function_name": null,
"is_async": null,
"is_pub": null,
"lines": 15,
"method_name": null,
"num_enums": null,
"num_items": null,
"num_structs": null,
"repo": "connector-service",
"start_line": 350,
"struct_name": null,
"total_crates": null,
"trait_name": null
} |
connector-service_snippet_-7416499650036175072_350_30 | clm | snippet | // connector-service/backend/external-services/src/service.rs
// Convert injector response to connector service Response format
let response_bytes = serde_json::to_vec(&injector_response.response)
.map_err(|_| ConnectorError::ResponseHandlingFailed)?;
// Convert headers from HashMap<String, String> to reqwest::HeaderMap if present
let headers = injector_response.headers.map(|h| {
let mut header_map = reqwest::header::HeaderMap::new();
for (key, value) in h {
if let (Ok(header_name), Ok(header_value)) = (
reqwest::header::HeaderName::from_bytes(key.as_bytes()),
reqwest::header::HeaderValue::from_str(&value),
) {
header_map.insert(header_name, header_value);
}
}
header_map
});
Ok(Ok(Response {
headers,
response: response_bytes.into(),
status_code: injector_response.status_code, // Use actual status code from connector
}))
} else {
call_connector_api(proxy, request, "execute_connector_processing_step")
.await
.change_context(ConnectorError::RequestEncodingFailed)
.inspect_err(|err| {
info_log(
| {
"chunk": null,
"crate": "external-services",
"enum_name": null,
"file_size": null,
"for_type": null,
"function_name": null,
"is_async": null,
"is_pub": null,
"lines": 30,
"method_name": null,
"num_enums": null,
"num_items": null,
"num_structs": null,
"repo": "connector-service",
"start_line": 350,
"struct_name": null,
"total_crates": null,
"trait_name": null
} |
connector-service_snippet_-7416499650036175072_350_50 | clm | snippet | // connector-service/backend/external-services/src/service.rs
// Convert injector response to connector service Response format
let response_bytes = serde_json::to_vec(&injector_response.response)
.map_err(|_| ConnectorError::ResponseHandlingFailed)?;
// Convert headers from HashMap<String, String> to reqwest::HeaderMap if present
let headers = injector_response.headers.map(|h| {
let mut header_map = reqwest::header::HeaderMap::new();
for (key, value) in h {
if let (Ok(header_name), Ok(header_value)) = (
reqwest::header::HeaderName::from_bytes(key.as_bytes()),
reqwest::header::HeaderValue::from_str(&value),
) {
header_map.insert(header_name, header_value);
}
}
header_map
});
Ok(Ok(Response {
headers,
response: response_bytes.into(),
status_code: injector_response.status_code, // Use actual status code from connector
}))
} else {
call_connector_api(proxy, request, "execute_connector_processing_step")
.await
.change_context(ConnectorError::RequestEncodingFailed)
.inspect_err(|err| {
info_log(
"NETWORK_ERROR",
&json!(format!(
"Failed getting response from connector. Error: {:?}",
err
)),
);
})
};
let external_service_elapsed = external_service_start_latency.elapsed();
metrics::EXTERNAL_SERVICE_API_CALLS_LATENCY
.with_label_values(&[
&method.to_string(),
event_params.service_name,
event_params.connector_name,
])
.observe(external_service_elapsed.as_secs_f64());
tracing::info!(?response, "response from connector");
// Extract status code BEFORE creating event - one liner
let status_code = response.as_ref().ok().map(|result| match result {
| {
"chunk": null,
"crate": "external-services",
"enum_name": null,
"file_size": null,
"for_type": null,
"function_name": null,
"is_async": null,
"is_pub": null,
"lines": 50,
"method_name": null,
"num_enums": null,
"num_items": null,
"num_structs": null,
"repo": "connector-service",
"start_line": 350,
"struct_name": null,
"total_crates": null,
"trait_name": null
} |
connector-service_snippet_-7416499650036175072_375_15 | clm | snippet | // connector-service/backend/external-services/src/service.rs
call_connector_api(proxy, request, "execute_connector_processing_step")
.await
.change_context(ConnectorError::RequestEncodingFailed)
.inspect_err(|err| {
info_log(
"NETWORK_ERROR",
&json!(format!(
"Failed getting response from connector. Error: {:?}",
err
)),
);
})
};
let external_service_elapsed = external_service_start_latency.elapsed();
metrics::EXTERNAL_SERVICE_API_CALLS_LATENCY
| {
"chunk": null,
"crate": "external-services",
"enum_name": null,
"file_size": null,
"for_type": null,
"function_name": null,
"is_async": null,
"is_pub": null,
"lines": 15,
"method_name": null,
"num_enums": null,
"num_items": null,
"num_structs": null,
"repo": "connector-service",
"start_line": 375,
"struct_name": null,
"total_crates": null,
"trait_name": null
} |
connector-service_snippet_-7416499650036175072_375_30 | clm | snippet | // connector-service/backend/external-services/src/service.rs
call_connector_api(proxy, request, "execute_connector_processing_step")
.await
.change_context(ConnectorError::RequestEncodingFailed)
.inspect_err(|err| {
info_log(
"NETWORK_ERROR",
&json!(format!(
"Failed getting response from connector. Error: {:?}",
err
)),
);
})
};
let external_service_elapsed = external_service_start_latency.elapsed();
metrics::EXTERNAL_SERVICE_API_CALLS_LATENCY
.with_label_values(&[
&method.to_string(),
event_params.service_name,
event_params.connector_name,
])
.observe(external_service_elapsed.as_secs_f64());
tracing::info!(?response, "response from connector");
// Extract status code BEFORE creating event - one liner
let status_code = response.as_ref().ok().map(|result| match result {
Ok(body) | Err(body) => i32::from(body.status_code),
});
// Construct masked request for event
let masked_request_data = req.as_ref().and_then(|r| {
| {
"chunk": null,
"crate": "external-services",
"enum_name": null,
"file_size": null,
"for_type": null,
"function_name": null,
"is_async": null,
"is_pub": null,
"lines": 30,
"method_name": null,
"num_enums": null,
"num_items": null,
"num_structs": null,
"repo": "connector-service",
"start_line": 375,
"struct_name": null,
"total_crates": null,
"trait_name": null
} |
connector-service_snippet_-7416499650036175072_375_50 | clm | snippet | // connector-service/backend/external-services/src/service.rs
call_connector_api(proxy, request, "execute_connector_processing_step")
.await
.change_context(ConnectorError::RequestEncodingFailed)
.inspect_err(|err| {
info_log(
"NETWORK_ERROR",
&json!(format!(
"Failed getting response from connector. Error: {:?}",
err
)),
);
})
};
let external_service_elapsed = external_service_start_latency.elapsed();
metrics::EXTERNAL_SERVICE_API_CALLS_LATENCY
.with_label_values(&[
&method.to_string(),
event_params.service_name,
event_params.connector_name,
])
.observe(external_service_elapsed.as_secs_f64());
tracing::info!(?response, "response from connector");
// Extract status code BEFORE creating event - one liner
let status_code = response.as_ref().ok().map(|result| match result {
Ok(body) | Err(body) => i32::from(body.status_code),
});
// Construct masked request for event
let masked_request_data = req.as_ref().and_then(|r| {
MaskedSerdeValue::from_masked_optional(r, "connector_request")
});
let latency =
u64::try_from(external_service_elapsed.as_millis()).unwrap_or(u64::MAX);
// Create single event (response_data will be set by connector)
let mut event = Event {
request_id: request_id.to_string(),
timestamp: chrono::Utc::now().timestamp().into(),
flow_type: event_params.flow_name,
connector: event_params.connector_name.to_string(),
url: Some(url.clone()),
stage: EventStage::ConnectorCall,
latency_ms: Some(latency),
status_code,
request_data: masked_request_data,
response_data: None, // Will be set by connector via set_response_body
headers: event_headers,
additional_fields: HashMap::new(),
| {
"chunk": null,
"crate": "external-services",
"enum_name": null,
"file_size": null,
"for_type": null,
"function_name": null,
"is_async": null,
"is_pub": null,
"lines": 50,
"method_name": null,
"num_enums": null,
"num_items": null,
"num_structs": null,
"repo": "connector-service",
"start_line": 375,
"struct_name": null,
"total_crates": null,
"trait_name": null
} |
connector-service_snippet_-7416499650036175072_400_15 | clm | snippet | // connector-service/backend/external-services/src/service.rs
Ok(body) | Err(body) => i32::from(body.status_code),
});
// Construct masked request for event
let masked_request_data = req.as_ref().and_then(|r| {
MaskedSerdeValue::from_masked_optional(r, "connector_request")
});
let latency =
u64::try_from(external_service_elapsed.as_millis()).unwrap_or(u64::MAX);
// Create single event (response_data will be set by connector)
let mut event = Event {
request_id: request_id.to_string(),
timestamp: chrono::Utc::now().timestamp().into(),
| {
"chunk": null,
"crate": "external-services",
"enum_name": null,
"file_size": null,
"for_type": null,
"function_name": null,
"is_async": null,
"is_pub": null,
"lines": 15,
"method_name": null,
"num_enums": null,
"num_items": null,
"num_structs": null,
"repo": "connector-service",
"start_line": 400,
"struct_name": null,
"total_crates": null,
"trait_name": null
} |
connector-service_snippet_-7416499650036175072_400_30 | clm | snippet | // connector-service/backend/external-services/src/service.rs
Ok(body) | Err(body) => i32::from(body.status_code),
});
// Construct masked request for event
let masked_request_data = req.as_ref().and_then(|r| {
MaskedSerdeValue::from_masked_optional(r, "connector_request")
});
let latency =
u64::try_from(external_service_elapsed.as_millis()).unwrap_or(u64::MAX);
// Create single event (response_data will be set by connector)
let mut event = Event {
request_id: request_id.to_string(),
timestamp: chrono::Utc::now().timestamp().into(),
flow_type: event_params.flow_name,
connector: event_params.connector_name.to_string(),
url: Some(url.clone()),
stage: EventStage::ConnectorCall,
latency_ms: Some(latency),
status_code,
request_data: masked_request_data,
response_data: None, // Will be set by connector via set_response_body
headers: event_headers,
additional_fields: HashMap::new(),
lineage_ids: event_params.lineage_ids.to_owned(),
};
event.add_reference_id(event_params.reference_id.as_deref());
let result = match response {
| {
"chunk": null,
"crate": "external-services",
"enum_name": null,
"file_size": null,
"for_type": null,
"function_name": null,
"is_async": null,
"is_pub": null,
"lines": 30,
"method_name": null,
"num_enums": null,
"num_items": null,
"num_structs": null,
"repo": "connector-service",
"start_line": 400,
"struct_name": null,
"total_crates": null,
"trait_name": null
} |
connector-service_snippet_-7416499650036175072_400_50 | clm | snippet | // connector-service/backend/external-services/src/service.rs
Ok(body) | Err(body) => i32::from(body.status_code),
});
// Construct masked request for event
let masked_request_data = req.as_ref().and_then(|r| {
MaskedSerdeValue::from_masked_optional(r, "connector_request")
});
let latency =
u64::try_from(external_service_elapsed.as_millis()).unwrap_or(u64::MAX);
// Create single event (response_data will be set by connector)
let mut event = Event {
request_id: request_id.to_string(),
timestamp: chrono::Utc::now().timestamp().into(),
flow_type: event_params.flow_name,
connector: event_params.connector_name.to_string(),
url: Some(url.clone()),
stage: EventStage::ConnectorCall,
latency_ms: Some(latency),
status_code,
request_data: masked_request_data,
response_data: None, // Will be set by connector via set_response_body
headers: event_headers,
additional_fields: HashMap::new(),
lineage_ids: event_params.lineage_ids.to_owned(),
};
event.add_reference_id(event_params.reference_id.as_deref());
let result = match response {
Ok(body) => {
let response = match body {
Ok(body) => {
let status_code = body.status_code;
tracing::Span::current().record(
"status_code",
tracing::field::display(status_code),
);
let is_source_verified = connector.verify(&updated_router_data, interfaces::verification::ConnectorSourceVerificationSecrets::AuthHeaders(updated_router_data.connector_auth_type.clone()), &body.response)?;
if !is_source_verified {
return Err(error_stack::report!(
ConnectorError::SourceVerificationFailed
));
}
if all_keys_required.unwrap_or(true) {
let raw_response_string =
strip_bom_and_convert_to_string(&body.response);
updated_router_data
| {
"chunk": null,
"crate": "external-services",
"enum_name": null,
"file_size": null,
"for_type": null,
"function_name": null,
"is_async": null,
"is_pub": null,
"lines": 50,
"method_name": null,
"num_enums": null,
"num_items": null,
"num_structs": null,
"repo": "connector-service",
"start_line": 400,
"struct_name": null,
"total_crates": null,
"trait_name": null
} |
connector-service_snippet_-7416499650036175072_425_15 | clm | snippet | // connector-service/backend/external-services/src/service.rs
lineage_ids: event_params.lineage_ids.to_owned(),
};
event.add_reference_id(event_params.reference_id.as_deref());
let result = match response {
Ok(body) => {
let response = match body {
Ok(body) => {
let status_code = body.status_code;
tracing::Span::current().record(
"status_code",
tracing::field::display(status_code),
);
let is_source_verified = connector.verify(&updated_router_data, interfaces::verification::ConnectorSourceVerificationSecrets::AuthHeaders(updated_router_data.connector_auth_type.clone()), &body.response)?;
| {
"chunk": null,
"crate": "external-services",
"enum_name": null,
"file_size": null,
"for_type": null,
"function_name": null,
"is_async": null,
"is_pub": null,
"lines": 15,
"method_name": null,
"num_enums": null,
"num_items": null,
"num_structs": null,
"repo": "connector-service",
"start_line": 425,
"struct_name": null,
"total_crates": null,
"trait_name": null
} |
connector-service_snippet_-7416499650036175072_425_30 | clm | snippet | // connector-service/backend/external-services/src/service.rs
lineage_ids: event_params.lineage_ids.to_owned(),
};
event.add_reference_id(event_params.reference_id.as_deref());
let result = match response {
Ok(body) => {
let response = match body {
Ok(body) => {
let status_code = body.status_code;
tracing::Span::current().record(
"status_code",
tracing::field::display(status_code),
);
let is_source_verified = connector.verify(&updated_router_data, interfaces::verification::ConnectorSourceVerificationSecrets::AuthHeaders(updated_router_data.connector_auth_type.clone()), &body.response)?;
if !is_source_verified {
return Err(error_stack::report!(
ConnectorError::SourceVerificationFailed
));
}
if all_keys_required.unwrap_or(true) {
let raw_response_string =
strip_bom_and_convert_to_string(&body.response);
updated_router_data
.resource_common_data
.set_raw_connector_response(
raw_response_string.map(Into::into),
);
| {
"chunk": null,
"crate": "external-services",
"enum_name": null,
"file_size": null,
"for_type": null,
"function_name": null,
"is_async": null,
"is_pub": null,
"lines": 30,
"method_name": null,
"num_enums": null,
"num_items": null,
"num_structs": null,
"repo": "connector-service",
"start_line": 425,
"struct_name": null,
"total_crates": null,
"trait_name": null
} |
connector-service_snippet_-7416499650036175072_425_50 | clm | snippet | // connector-service/backend/external-services/src/service.rs
lineage_ids: event_params.lineage_ids.to_owned(),
};
event.add_reference_id(event_params.reference_id.as_deref());
let result = match response {
Ok(body) => {
let response = match body {
Ok(body) => {
let status_code = body.status_code;
tracing::Span::current().record(
"status_code",
tracing::field::display(status_code),
);
let is_source_verified = connector.verify(&updated_router_data, interfaces::verification::ConnectorSourceVerificationSecrets::AuthHeaders(updated_router_data.connector_auth_type.clone()), &body.response)?;
if !is_source_verified {
return Err(error_stack::report!(
ConnectorError::SourceVerificationFailed
));
}
if all_keys_required.unwrap_or(true) {
let raw_response_string =
strip_bom_and_convert_to_string(&body.response);
updated_router_data
.resource_common_data
.set_raw_connector_response(
raw_response_string.map(Into::into),
);
// Set response headers if available
updated_router_data
.resource_common_data
.set_connector_response_headers(body.headers.clone());
}
let handle_response_result = connector.handle_response_v2(
&updated_router_data,
Some(&mut event),
body.clone(),
);
// Log response body and headers using properly masked data from connector
if let Some(response_data) = &event.response_data {
tracing::Span::current().record(
"response.body",
tracing::field::display(response_data.inner()),
);
}
| {
"chunk": null,
"crate": "external-services",
"enum_name": null,
"file_size": null,
"for_type": null,
"function_name": null,
"is_async": null,
"is_pub": null,
"lines": 50,
"method_name": null,
"num_enums": null,
"num_items": null,
"num_structs": null,
"repo": "connector-service",
"start_line": 425,
"struct_name": null,
"total_crates": null,
"trait_name": null
} |
connector-service_snippet_-7416499650036175072_450_15 | clm | snippet | // connector-service/backend/external-services/src/service.rs
.resource_common_data
.set_raw_connector_response(
raw_response_string.map(Into::into),
);
// Set response headers if available
updated_router_data
.resource_common_data
.set_connector_response_headers(body.headers.clone());
}
let handle_response_result = connector.handle_response_v2(
&updated_router_data,
Some(&mut event),
body.clone(),
| {
"chunk": null,
"crate": "external-services",
"enum_name": null,
"file_size": null,
"for_type": null,
"function_name": null,
"is_async": null,
"is_pub": null,
"lines": 15,
"method_name": null,
"num_enums": null,
"num_items": null,
"num_structs": null,
"repo": "connector-service",
"start_line": 450,
"struct_name": null,
"total_crates": null,
"trait_name": null
} |
connector-service_snippet_-7416499650036175072_450_30 | clm | snippet | // connector-service/backend/external-services/src/service.rs
.resource_common_data
.set_raw_connector_response(
raw_response_string.map(Into::into),
);
// Set response headers if available
updated_router_data
.resource_common_data
.set_connector_response_headers(body.headers.clone());
}
let handle_response_result = connector.handle_response_v2(
&updated_router_data,
Some(&mut event),
body.clone(),
);
// Log response body and headers using properly masked data from connector
if let Some(response_data) = &event.response_data {
tracing::Span::current().record(
"response.body",
tracing::field::display(response_data.inner()),
);
}
// Log response headers from event (already masked)
tracing::Span::current().record(
"response.headers",
tracing::field::debug(&event.headers),
);
| {
"chunk": null,
"crate": "external-services",
"enum_name": null,
"file_size": null,
"for_type": null,
"function_name": null,
"is_async": null,
"is_pub": null,
"lines": 30,
"method_name": null,
"num_enums": null,
"num_items": null,
"num_structs": null,
"repo": "connector-service",
"start_line": 450,
"struct_name": null,
"total_crates": null,
"trait_name": null
} |
connector-service_snippet_-7416499650036175072_450_50 | clm | snippet | // connector-service/backend/external-services/src/service.rs
.resource_common_data
.set_raw_connector_response(
raw_response_string.map(Into::into),
);
// Set response headers if available
updated_router_data
.resource_common_data
.set_connector_response_headers(body.headers.clone());
}
let handle_response_result = connector.handle_response_v2(
&updated_router_data,
Some(&mut event),
body.clone(),
);
// Log response body and headers using properly masked data from connector
if let Some(response_data) = &event.response_data {
tracing::Span::current().record(
"response.body",
tracing::field::display(response_data.inner()),
);
}
// Log response headers from event (already masked)
tracing::Span::current().record(
"response.headers",
tracing::field::debug(&event.headers),
);
match handle_response_result {
Ok(data) => {
tracing::info!("Transformer completed successfully");
Ok(data)
}
Err(err) => Err(err),
}?
}
Err(body) => {
metrics::EXTERNAL_SERVICE_API_CALLS_ERRORS
.with_label_values(&[
&method.to_string(),
event_params.service_name,
event_params.connector_name,
body.status_code.to_string().as_str(),
])
.inc();
if all_keys_required.unwrap_or(true) {
| {
"chunk": null,
"crate": "external-services",
"enum_name": null,
"file_size": null,
"for_type": null,
"function_name": null,
"is_async": null,
"is_pub": null,
"lines": 50,
"method_name": null,
"num_enums": null,
"num_items": null,
"num_structs": null,
"repo": "connector-service",
"start_line": 450,
"struct_name": null,
"total_crates": null,
"trait_name": null
} |
connector-service_snippet_-7416499650036175072_475_15 | clm | snippet | // connector-service/backend/external-services/src/service.rs
// Log response headers from event (already masked)
tracing::Span::current().record(
"response.headers",
tracing::field::debug(&event.headers),
);
match handle_response_result {
Ok(data) => {
tracing::info!("Transformer completed successfully");
Ok(data)
}
Err(err) => Err(err),
}?
}
Err(body) => {
| {
"chunk": null,
"crate": "external-services",
"enum_name": null,
"file_size": null,
"for_type": null,
"function_name": null,
"is_async": null,
"is_pub": null,
"lines": 15,
"method_name": null,
"num_enums": null,
"num_items": null,
"num_structs": null,
"repo": "connector-service",
"start_line": 475,
"struct_name": null,
"total_crates": null,
"trait_name": null
} |
connector-service_snippet_-7416499650036175072_475_30 | clm | snippet | // connector-service/backend/external-services/src/service.rs
// Log response headers from event (already masked)
tracing::Span::current().record(
"response.headers",
tracing::field::debug(&event.headers),
);
match handle_response_result {
Ok(data) => {
tracing::info!("Transformer completed successfully");
Ok(data)
}
Err(err) => Err(err),
}?
}
Err(body) => {
metrics::EXTERNAL_SERVICE_API_CALLS_ERRORS
.with_label_values(&[
&method.to_string(),
event_params.service_name,
event_params.connector_name,
body.status_code.to_string().as_str(),
])
.inc();
if all_keys_required.unwrap_or(true) {
let raw_response_string =
strip_bom_and_convert_to_string(&body.response);
updated_router_data
.resource_common_data
.set_raw_connector_response(
| {
"chunk": null,
"crate": "external-services",
"enum_name": null,
"file_size": null,
"for_type": null,
"function_name": null,
"is_async": null,
"is_pub": null,
"lines": 30,
"method_name": null,
"num_enums": null,
"num_items": null,
"num_structs": null,
"repo": "connector-service",
"start_line": 475,
"struct_name": null,
"total_crates": null,
"trait_name": null
} |
connector-service_snippet_-7416499650036175072_475_50 | clm | snippet | // connector-service/backend/external-services/src/service.rs
// Log response headers from event (already masked)
tracing::Span::current().record(
"response.headers",
tracing::field::debug(&event.headers),
);
match handle_response_result {
Ok(data) => {
tracing::info!("Transformer completed successfully");
Ok(data)
}
Err(err) => Err(err),
}?
}
Err(body) => {
metrics::EXTERNAL_SERVICE_API_CALLS_ERRORS
.with_label_values(&[
&method.to_string(),
event_params.service_name,
event_params.connector_name,
body.status_code.to_string().as_str(),
])
.inc();
if all_keys_required.unwrap_or(true) {
let raw_response_string =
strip_bom_and_convert_to_string(&body.response);
updated_router_data
.resource_common_data
.set_raw_connector_response(
raw_response_string.map(Into::into),
);
updated_router_data
.resource_common_data
.set_connector_response_headers(body.headers.clone());
}
let error = match body.status_code {
500..=511 => connector.get_5xx_error_response(
body.clone(),
Some(&mut event),
)?,
_ => connector.get_error_response_v2(
body.clone(),
Some(&mut event),
)?,
};
tracing::Span::current().record(
"response.error_message",
tracing::field::display(&error.message),
| {
"chunk": null,
"crate": "external-services",
"enum_name": null,
"file_size": null,
"for_type": null,
"function_name": null,
"is_async": null,
"is_pub": null,
"lines": 50,
"method_name": null,
"num_enums": null,
"num_items": null,
"num_structs": null,
"repo": "connector-service",
"start_line": 475,
"struct_name": null,
"total_crates": null,
"trait_name": null
} |
connector-service_snippet_-7416499650036175072_500_15 | clm | snippet | // connector-service/backend/external-services/src/service.rs
let raw_response_string =
strip_bom_and_convert_to_string(&body.response);
updated_router_data
.resource_common_data
.set_raw_connector_response(
raw_response_string.map(Into::into),
);
updated_router_data
.resource_common_data
.set_connector_response_headers(body.headers.clone());
}
let error = match body.status_code {
500..=511 => connector.get_5xx_error_response(
body.clone(),
| {
"chunk": null,
"crate": "external-services",
"enum_name": null,
"file_size": null,
"for_type": null,
"function_name": null,
"is_async": null,
"is_pub": null,
"lines": 15,
"method_name": null,
"num_enums": null,
"num_items": null,
"num_structs": null,
"repo": "connector-service",
"start_line": 500,
"struct_name": null,
"total_crates": null,
"trait_name": null
} |
connector-service_snippet_-7416499650036175072_500_30 | clm | snippet | // connector-service/backend/external-services/src/service.rs
let raw_response_string =
strip_bom_and_convert_to_string(&body.response);
updated_router_data
.resource_common_data
.set_raw_connector_response(
raw_response_string.map(Into::into),
);
updated_router_data
.resource_common_data
.set_connector_response_headers(body.headers.clone());
}
let error = match body.status_code {
500..=511 => connector.get_5xx_error_response(
body.clone(),
Some(&mut event),
)?,
_ => connector.get_error_response_v2(
body.clone(),
Some(&mut event),
)?,
};
tracing::Span::current().record(
"response.error_message",
tracing::field::display(&error.message),
);
tracing::Span::current().record(
"response.status_code",
tracing::field::display(error.status_code),
);
| {
"chunk": null,
"crate": "external-services",
"enum_name": null,
"file_size": null,
"for_type": null,
"function_name": null,
"is_async": null,
"is_pub": null,
"lines": 30,
"method_name": null,
"num_enums": null,
"num_items": null,
"num_structs": null,
"repo": "connector-service",
"start_line": 500,
"struct_name": null,
"total_crates": null,
"trait_name": null
} |
connector-service_snippet_-7416499650036175072_500_50 | clm | snippet | // connector-service/backend/external-services/src/service.rs
let raw_response_string =
strip_bom_and_convert_to_string(&body.response);
updated_router_data
.resource_common_data
.set_raw_connector_response(
raw_response_string.map(Into::into),
);
updated_router_data
.resource_common_data
.set_connector_response_headers(body.headers.clone());
}
let error = match body.status_code {
500..=511 => connector.get_5xx_error_response(
body.clone(),
Some(&mut event),
)?,
_ => connector.get_error_response_v2(
body.clone(),
Some(&mut event),
)?,
};
tracing::Span::current().record(
"response.error_message",
tracing::field::display(&error.message),
);
tracing::Span::current().record(
"response.status_code",
tracing::field::display(error.status_code),
);
updated_router_data.response = Err(error);
updated_router_data
}
};
Ok(response)
}
Err(err) => {
tracing::Span::current().record("url", tracing::field::display(url));
Err(err.change_context(ConnectorError::ProcessingStepFailed(None)))
}
};
emit_event_with_config(event, event_params.event_config);
result
}
None => Ok(router_data),
}
}
};
| {
"chunk": null,
"crate": "external-services",
"enum_name": null,
"file_size": null,
"for_type": null,
"function_name": null,
"is_async": null,
"is_pub": null,
"lines": 50,
"method_name": null,
"num_enums": null,
"num_items": null,
"num_structs": null,
"repo": "connector-service",
"start_line": 500,
"struct_name": null,
"total_crates": null,
"trait_name": null
} |
connector-service_snippet_-7416499650036175072_525_15 | clm | snippet | // connector-service/backend/external-services/src/service.rs
);
tracing::Span::current().record(
"response.status_code",
tracing::field::display(error.status_code),
);
updated_router_data.response = Err(error);
updated_router_data
}
};
Ok(response)
}
Err(err) => {
tracing::Span::current().record("url", tracing::field::display(url));
Err(err.change_context(ConnectorError::ProcessingStepFailed(None)))
}
| {
"chunk": null,
"crate": "external-services",
"enum_name": null,
"file_size": null,
"for_type": null,
"function_name": null,
"is_async": null,
"is_pub": null,
"lines": 15,
"method_name": null,
"num_enums": null,
"num_items": null,
"num_structs": null,
"repo": "connector-service",
"start_line": 525,
"struct_name": null,
"total_crates": null,
"trait_name": null
} |
connector-service_snippet_-7416499650036175072_525_30 | clm | snippet | // connector-service/backend/external-services/src/service.rs
);
tracing::Span::current().record(
"response.status_code",
tracing::field::display(error.status_code),
);
updated_router_data.response = Err(error);
updated_router_data
}
};
Ok(response)
}
Err(err) => {
tracing::Span::current().record("url", tracing::field::display(url));
Err(err.change_context(ConnectorError::ProcessingStepFailed(None)))
}
};
emit_event_with_config(event, event_params.event_config);
result
}
None => Ok(router_data),
}
}
};
let result_with_integrity_check = match result {
Ok(data) => {
data.request
.check_integrity(&data.request.clone(), None)
.map_err(|err| ConnectorError::IntegrityCheckFailed {
| {
"chunk": null,
"crate": "external-services",
"enum_name": null,
"file_size": null,
"for_type": null,
"function_name": null,
"is_async": null,
"is_pub": null,
"lines": 30,
"method_name": null,
"num_enums": null,
"num_items": null,
"num_structs": null,
"repo": "connector-service",
"start_line": 525,
"struct_name": null,
"total_crates": null,
"trait_name": null
} |
connector-service_snippet_-7416499650036175072_525_50 | clm | snippet | // connector-service/backend/external-services/src/service.rs
);
tracing::Span::current().record(
"response.status_code",
tracing::field::display(error.status_code),
);
updated_router_data.response = Err(error);
updated_router_data
}
};
Ok(response)
}
Err(err) => {
tracing::Span::current().record("url", tracing::field::display(url));
Err(err.change_context(ConnectorError::ProcessingStepFailed(None)))
}
};
emit_event_with_config(event, event_params.event_config);
result
}
None => Ok(router_data),
}
}
};
let result_with_integrity_check = match result {
Ok(data) => {
data.request
.check_integrity(&data.request.clone(), None)
.map_err(|err| ConnectorError::IntegrityCheckFailed {
field_names: err.field_names,
connector_transaction_id: err.connector_transaction_id,
})?;
Ok(data)
}
Err(err) => Err(err),
};
let elapsed = start.elapsed().as_millis();
tracing::Span::current().record("latency", elapsed);
tracing::info!(tag = ?Tag::OutgoingApi, log_type = "api", "Outgoing Request completed");
result_with_integrity_check
}
pub enum ApplicationResponse<R> {
Json(R),
}
pub type CustomResult<T, E> = error_stack::Result<T, E>;
pub type RouterResult<T> = CustomResult<T, ApiErrorResponse>;
| {
"chunk": null,
"crate": "external-services",
"enum_name": null,
"file_size": null,
"for_type": null,
"function_name": null,
"is_async": null,
"is_pub": null,
"lines": 50,
"method_name": null,
"num_enums": null,
"num_items": null,
"num_structs": null,
"repo": "connector-service",
"start_line": 525,
"struct_name": null,
"total_crates": null,
"trait_name": null
} |
connector-service_snippet_-7416499650036175072_550_15 | clm | snippet | // connector-service/backend/external-services/src/service.rs
let result_with_integrity_check = match result {
Ok(data) => {
data.request
.check_integrity(&data.request.clone(), None)
.map_err(|err| ConnectorError::IntegrityCheckFailed {
field_names: err.field_names,
connector_transaction_id: err.connector_transaction_id,
})?;
Ok(data)
}
Err(err) => Err(err),
};
let elapsed = start.elapsed().as_millis();
tracing::Span::current().record("latency", elapsed);
| {
"chunk": null,
"crate": "external-services",
"enum_name": null,
"file_size": null,
"for_type": null,
"function_name": null,
"is_async": null,
"is_pub": null,
"lines": 15,
"method_name": null,
"num_enums": null,
"num_items": null,
"num_structs": null,
"repo": "connector-service",
"start_line": 550,
"struct_name": null,
"total_crates": null,
"trait_name": null
} |
connector-service_snippet_-7416499650036175072_550_30 | clm | snippet | // connector-service/backend/external-services/src/service.rs
let result_with_integrity_check = match result {
Ok(data) => {
data.request
.check_integrity(&data.request.clone(), None)
.map_err(|err| ConnectorError::IntegrityCheckFailed {
field_names: err.field_names,
connector_transaction_id: err.connector_transaction_id,
})?;
Ok(data)
}
Err(err) => Err(err),
};
let elapsed = start.elapsed().as_millis();
tracing::Span::current().record("latency", elapsed);
tracing::info!(tag = ?Tag::OutgoingApi, log_type = "api", "Outgoing Request completed");
result_with_integrity_check
}
pub enum ApplicationResponse<R> {
Json(R),
}
pub type CustomResult<T, E> = error_stack::Result<T, E>;
pub type RouterResult<T> = CustomResult<T, ApiErrorResponse>;
pub type RouterResponse<T> = CustomResult<ApplicationResponse<T>, ApiErrorResponse>;
pub async fn call_connector_api(
proxy: &Proxy,
request: Request,
| {
"chunk": null,
"crate": "external-services",
"enum_name": null,
"file_size": null,
"for_type": null,
"function_name": null,
"is_async": null,
"is_pub": null,
"lines": 30,
"method_name": null,
"num_enums": null,
"num_items": null,
"num_structs": null,
"repo": "connector-service",
"start_line": 550,
"struct_name": null,
"total_crates": null,
"trait_name": null
} |
connector-service_snippet_-7416499650036175072_550_50 | clm | snippet | // connector-service/backend/external-services/src/service.rs
let result_with_integrity_check = match result {
Ok(data) => {
data.request
.check_integrity(&data.request.clone(), None)
.map_err(|err| ConnectorError::IntegrityCheckFailed {
field_names: err.field_names,
connector_transaction_id: err.connector_transaction_id,
})?;
Ok(data)
}
Err(err) => Err(err),
};
let elapsed = start.elapsed().as_millis();
tracing::Span::current().record("latency", elapsed);
tracing::info!(tag = ?Tag::OutgoingApi, log_type = "api", "Outgoing Request completed");
result_with_integrity_check
}
pub enum ApplicationResponse<R> {
Json(R),
}
pub type CustomResult<T, E> = error_stack::Result<T, E>;
pub type RouterResult<T> = CustomResult<T, ApiErrorResponse>;
pub type RouterResponse<T> = CustomResult<ApplicationResponse<T>, ApiErrorResponse>;
pub async fn call_connector_api(
proxy: &Proxy,
request: Request,
_flow_name: &str,
) -> CustomResult<Result<Response, Response>, ApiClientError> {
let url =
reqwest::Url::parse(&request.url).change_context(ApiClientError::UrlEncodingFailed)?;
let should_bypass_proxy = proxy.bypass_proxy_urls.contains(&url.to_string());
let client = create_client(
proxy,
should_bypass_proxy,
request.certificate,
request.certificate_key,
)?;
let headers = request.headers.construct_header_map()?;
// Process and log the request body based on content type
let request = {
match request.method {
Method::Get => client.get(url),
| {
"chunk": null,
"crate": "external-services",
"enum_name": null,
"file_size": null,
"for_type": null,
"function_name": null,
"is_async": null,
"is_pub": null,
"lines": 50,
"method_name": null,
"num_enums": null,
"num_items": null,
"num_structs": null,
"repo": "connector-service",
"start_line": 550,
"struct_name": null,
"total_crates": null,
"trait_name": null
} |
connector-service_snippet_-7416499650036175072_575_15 | clm | snippet | // connector-service/backend/external-services/src/service.rs
pub type RouterResponse<T> = CustomResult<ApplicationResponse<T>, ApiErrorResponse>;
pub async fn call_connector_api(
proxy: &Proxy,
request: Request,
_flow_name: &str,
) -> CustomResult<Result<Response, Response>, ApiClientError> {
let url =
reqwest::Url::parse(&request.url).change_context(ApiClientError::UrlEncodingFailed)?;
let should_bypass_proxy = proxy.bypass_proxy_urls.contains(&url.to_string());
let client = create_client(
proxy,
should_bypass_proxy,
| {
"chunk": null,
"crate": "external-services",
"enum_name": null,
"file_size": null,
"for_type": null,
"function_name": null,
"is_async": null,
"is_pub": null,
"lines": 15,
"method_name": null,
"num_enums": null,
"num_items": null,
"num_structs": null,
"repo": "connector-service",
"start_line": 575,
"struct_name": null,
"total_crates": null,
"trait_name": null
} |
connector-service_snippet_-7416499650036175072_575_30 | clm | snippet | // connector-service/backend/external-services/src/service.rs
pub type RouterResponse<T> = CustomResult<ApplicationResponse<T>, ApiErrorResponse>;
pub async fn call_connector_api(
proxy: &Proxy,
request: Request,
_flow_name: &str,
) -> CustomResult<Result<Response, Response>, ApiClientError> {
let url =
reqwest::Url::parse(&request.url).change_context(ApiClientError::UrlEncodingFailed)?;
let should_bypass_proxy = proxy.bypass_proxy_urls.contains(&url.to_string());
let client = create_client(
proxy,
should_bypass_proxy,
request.certificate,
request.certificate_key,
)?;
let headers = request.headers.construct_header_map()?;
// Process and log the request body based on content type
let request = {
match request.method {
Method::Get => client.get(url),
Method::Post => {
let client = client.post(url);
match request.body {
Some(RequestContent::Json(payload)) => client.json(&payload),
Some(RequestContent::FormUrlEncoded(payload)) => client.form(&payload),
| {
"chunk": null,
"crate": "external-services",
"enum_name": null,
"file_size": null,
"for_type": null,
"function_name": null,
"is_async": null,
"is_pub": null,
"lines": 30,
"method_name": null,
"num_enums": null,
"num_items": null,
"num_structs": null,
"repo": "connector-service",
"start_line": 575,
"struct_name": null,
"total_crates": null,
"trait_name": null
} |
connector-service_snippet_-7416499650036175072_575_50 | clm | snippet | // connector-service/backend/external-services/src/service.rs
pub type RouterResponse<T> = CustomResult<ApplicationResponse<T>, ApiErrorResponse>;
pub async fn call_connector_api(
proxy: &Proxy,
request: Request,
_flow_name: &str,
) -> CustomResult<Result<Response, Response>, ApiClientError> {
let url =
reqwest::Url::parse(&request.url).change_context(ApiClientError::UrlEncodingFailed)?;
let should_bypass_proxy = proxy.bypass_proxy_urls.contains(&url.to_string());
let client = create_client(
proxy,
should_bypass_proxy,
request.certificate,
request.certificate_key,
)?;
let headers = request.headers.construct_header_map()?;
// Process and log the request body based on content type
let request = {
match request.method {
Method::Get => client.get(url),
Method::Post => {
let client = client.post(url);
match request.body {
Some(RequestContent::Json(payload)) => client.json(&payload),
Some(RequestContent::FormUrlEncoded(payload)) => client.form(&payload),
Some(RequestContent::Xml(payload)) => {
// For XML content, we need to extract the XML string properly
// The payload implements a custom Serialize that generates XML content
let body = serde_json::to_string(&payload)
.change_context(ApiClientError::UrlEncodingFailed)?;
// Properly deserialize the JSON string to extract clean XML
let xml_body = if body.starts_with('"') && body.ends_with('"') {
// This is a JSON-encoded string, deserialize it properly
serde_json::from_str::<String>(&body)
.change_context(ApiClientError::UrlEncodingFailed)?
} else {
// This is already the raw body content
body
};
client.body(xml_body).header("Content-Type", "text/xml")
}
Some(RequestContent::FormData(form)) => client.multipart(form),
_ => client,
}
| {
"chunk": null,
"crate": "external-services",
"enum_name": null,
"file_size": null,
"for_type": null,
"function_name": null,
"is_async": null,
"is_pub": null,
"lines": 50,
"method_name": null,
"num_enums": null,
"num_items": null,
"num_structs": null,
"repo": "connector-service",
"start_line": 575,
"struct_name": null,
"total_crates": null,
"trait_name": null
} |
connector-service_snippet_-7416499650036175072_600_15 | clm | snippet | // connector-service/backend/external-services/src/service.rs
Method::Post => {
let client = client.post(url);
match request.body {
Some(RequestContent::Json(payload)) => client.json(&payload),
Some(RequestContent::FormUrlEncoded(payload)) => client.form(&payload),
Some(RequestContent::Xml(payload)) => {
// For XML content, we need to extract the XML string properly
// The payload implements a custom Serialize that generates XML content
let body = serde_json::to_string(&payload)
.change_context(ApiClientError::UrlEncodingFailed)?;
// Properly deserialize the JSON string to extract clean XML
let xml_body = if body.starts_with('"') && body.ends_with('"') {
// This is a JSON-encoded string, deserialize it properly
serde_json::from_str::<String>(&body)
| {
"chunk": null,
"crate": "external-services",
"enum_name": null,
"file_size": null,
"for_type": null,
"function_name": null,
"is_async": null,
"is_pub": null,
"lines": 15,
"method_name": null,
"num_enums": null,
"num_items": null,
"num_structs": null,
"repo": "connector-service",
"start_line": 600,
"struct_name": null,
"total_crates": null,
"trait_name": null
} |
connector-service_snippet_-7416499650036175072_600_30 | clm | snippet | // connector-service/backend/external-services/src/service.rs
Method::Post => {
let client = client.post(url);
match request.body {
Some(RequestContent::Json(payload)) => client.json(&payload),
Some(RequestContent::FormUrlEncoded(payload)) => client.form(&payload),
Some(RequestContent::Xml(payload)) => {
// For XML content, we need to extract the XML string properly
// The payload implements a custom Serialize that generates XML content
let body = serde_json::to_string(&payload)
.change_context(ApiClientError::UrlEncodingFailed)?;
// Properly deserialize the JSON string to extract clean XML
let xml_body = if body.starts_with('"') && body.ends_with('"') {
// This is a JSON-encoded string, deserialize it properly
serde_json::from_str::<String>(&body)
.change_context(ApiClientError::UrlEncodingFailed)?
} else {
// This is already the raw body content
body
};
client.body(xml_body).header("Content-Type", "text/xml")
}
Some(RequestContent::FormData(form)) => client.multipart(form),
_ => client,
}
}
Method::Put => {
let client = client.put(url);
match request.body {
Some(RequestContent::Json(payload)) => client.json(&payload),
| {
"chunk": null,
"crate": "external-services",
"enum_name": null,
"file_size": null,
"for_type": null,
"function_name": null,
"is_async": null,
"is_pub": null,
"lines": 30,
"method_name": null,
"num_enums": null,
"num_items": null,
"num_structs": null,
"repo": "connector-service",
"start_line": 600,
"struct_name": null,
"total_crates": null,
"trait_name": null
} |
connector-service_snippet_-7416499650036175072_600_50 | clm | snippet | // connector-service/backend/external-services/src/service.rs
Method::Post => {
let client = client.post(url);
match request.body {
Some(RequestContent::Json(payload)) => client.json(&payload),
Some(RequestContent::FormUrlEncoded(payload)) => client.form(&payload),
Some(RequestContent::Xml(payload)) => {
// For XML content, we need to extract the XML string properly
// The payload implements a custom Serialize that generates XML content
let body = serde_json::to_string(&payload)
.change_context(ApiClientError::UrlEncodingFailed)?;
// Properly deserialize the JSON string to extract clean XML
let xml_body = if body.starts_with('"') && body.ends_with('"') {
// This is a JSON-encoded string, deserialize it properly
serde_json::from_str::<String>(&body)
.change_context(ApiClientError::UrlEncodingFailed)?
} else {
// This is already the raw body content
body
};
client.body(xml_body).header("Content-Type", "text/xml")
}
Some(RequestContent::FormData(form)) => client.multipart(form),
_ => client,
}
}
Method::Put => {
let client = client.put(url);
match request.body {
Some(RequestContent::Json(payload)) => client.json(&payload),
Some(RequestContent::FormUrlEncoded(payload)) => client.form(&payload),
Some(RequestContent::Xml(payload)) => {
let body = serde_json::to_string(&payload)
.change_context(ApiClientError::UrlEncodingFailed)?;
let xml_body = if body.starts_with('"') && body.ends_with('"') {
serde_json::from_str::<String>(&body)
.change_context(ApiClientError::UrlEncodingFailed)?
} else {
body
};
client.body(xml_body).header("Content-Type", "text/xml")
}
Some(RequestContent::FormData(form)) => client.multipart(form),
_ => client,
}
}
Method::Patch => {
let client = client.patch(url);
match request.body {
Some(RequestContent::Json(payload)) => client.json(&payload),
| {
"chunk": null,
"crate": "external-services",
"enum_name": null,
"file_size": null,
"for_type": null,
"function_name": null,
"is_async": null,
"is_pub": null,
"lines": 50,
"method_name": null,
"num_enums": null,
"num_items": null,
"num_structs": null,
"repo": "connector-service",
"start_line": 600,
"struct_name": null,
"total_crates": null,
"trait_name": null
} |
connector-service_snippet_-7416499650036175072_625_15 | clm | snippet | // connector-service/backend/external-services/src/service.rs
}
Method::Put => {
let client = client.put(url);
match request.body {
Some(RequestContent::Json(payload)) => client.json(&payload),
Some(RequestContent::FormUrlEncoded(payload)) => client.form(&payload),
Some(RequestContent::Xml(payload)) => {
let body = serde_json::to_string(&payload)
.change_context(ApiClientError::UrlEncodingFailed)?;
let xml_body = if body.starts_with('"') && body.ends_with('"') {
serde_json::from_str::<String>(&body)
.change_context(ApiClientError::UrlEncodingFailed)?
} else {
body
};
| {
"chunk": null,
"crate": "external-services",
"enum_name": null,
"file_size": null,
"for_type": null,
"function_name": null,
"is_async": null,
"is_pub": null,
"lines": 15,
"method_name": null,
"num_enums": null,
"num_items": null,
"num_structs": null,
"repo": "connector-service",
"start_line": 625,
"struct_name": null,
"total_crates": null,
"trait_name": null
} |
connector-service_snippet_-7416499650036175072_625_30 | clm | snippet | // connector-service/backend/external-services/src/service.rs
}
Method::Put => {
let client = client.put(url);
match request.body {
Some(RequestContent::Json(payload)) => client.json(&payload),
Some(RequestContent::FormUrlEncoded(payload)) => client.form(&payload),
Some(RequestContent::Xml(payload)) => {
let body = serde_json::to_string(&payload)
.change_context(ApiClientError::UrlEncodingFailed)?;
let xml_body = if body.starts_with('"') && body.ends_with('"') {
serde_json::from_str::<String>(&body)
.change_context(ApiClientError::UrlEncodingFailed)?
} else {
body
};
client.body(xml_body).header("Content-Type", "text/xml")
}
Some(RequestContent::FormData(form)) => client.multipart(form),
_ => client,
}
}
Method::Patch => {
let client = client.patch(url);
match request.body {
Some(RequestContent::Json(payload)) => client.json(&payload),
Some(RequestContent::FormUrlEncoded(payload)) => client.form(&payload),
Some(RequestContent::Xml(payload)) => {
let body = serde_json::to_string(&payload)
.change_context(ApiClientError::UrlEncodingFailed)?;
let xml_body = if body.starts_with('"') && body.ends_with('"') {
| {
"chunk": null,
"crate": "external-services",
"enum_name": null,
"file_size": null,
"for_type": null,
"function_name": null,
"is_async": null,
"is_pub": null,
"lines": 30,
"method_name": null,
"num_enums": null,
"num_items": null,
"num_structs": null,
"repo": "connector-service",
"start_line": 625,
"struct_name": null,
"total_crates": null,
"trait_name": null
} |
connector-service_snippet_-7416499650036175072_625_50 | clm | snippet | // connector-service/backend/external-services/src/service.rs
}
Method::Put => {
let client = client.put(url);
match request.body {
Some(RequestContent::Json(payload)) => client.json(&payload),
Some(RequestContent::FormUrlEncoded(payload)) => client.form(&payload),
Some(RequestContent::Xml(payload)) => {
let body = serde_json::to_string(&payload)
.change_context(ApiClientError::UrlEncodingFailed)?;
let xml_body = if body.starts_with('"') && body.ends_with('"') {
serde_json::from_str::<String>(&body)
.change_context(ApiClientError::UrlEncodingFailed)?
} else {
body
};
client.body(xml_body).header("Content-Type", "text/xml")
}
Some(RequestContent::FormData(form)) => client.multipart(form),
_ => client,
}
}
Method::Patch => {
let client = client.patch(url);
match request.body {
Some(RequestContent::Json(payload)) => client.json(&payload),
Some(RequestContent::FormUrlEncoded(payload)) => client.form(&payload),
Some(RequestContent::Xml(payload)) => {
let body = serde_json::to_string(&payload)
.change_context(ApiClientError::UrlEncodingFailed)?;
let xml_body = if body.starts_with('"') && body.ends_with('"') {
serde_json::from_str::<String>(&body)
.change_context(ApiClientError::UrlEncodingFailed)?
} else {
body
};
client.body(xml_body).header("Content-Type", "text/xml")
}
Some(RequestContent::FormData(form)) => client.multipart(form),
_ => client,
}
}
Method::Delete => {
let client = client.delete(url);
match request.body {
Some(RequestContent::Json(payload)) => client.json(&payload),
Some(RequestContent::FormUrlEncoded(payload)) => client.form(&payload),
Some(RequestContent::Xml(payload)) => {
let body = serde_json::to_string(&payload)
.change_context(ApiClientError::UrlEncodingFailed)?;
let xml_body = if body.starts_with('"') && body.ends_with('"') {
| {
"chunk": null,
"crate": "external-services",
"enum_name": null,
"file_size": null,
"for_type": null,
"function_name": null,
"is_async": null,
"is_pub": null,
"lines": 50,
"method_name": null,
"num_enums": null,
"num_items": null,
"num_structs": null,
"repo": "connector-service",
"start_line": 625,
"struct_name": null,
"total_crates": null,
"trait_name": null
} |
connector-service_snippet_-7416499650036175072_650_15 | clm | snippet | // connector-service/backend/external-services/src/service.rs
Some(RequestContent::FormUrlEncoded(payload)) => client.form(&payload),
Some(RequestContent::Xml(payload)) => {
let body = serde_json::to_string(&payload)
.change_context(ApiClientError::UrlEncodingFailed)?;
let xml_body = if body.starts_with('"') && body.ends_with('"') {
serde_json::from_str::<String>(&body)
.change_context(ApiClientError::UrlEncodingFailed)?
} else {
body
};
client.body(xml_body).header("Content-Type", "text/xml")
}
Some(RequestContent::FormData(form)) => client.multipart(form),
_ => client,
}
| {
"chunk": null,
"crate": "external-services",
"enum_name": null,
"file_size": null,
"for_type": null,
"function_name": null,
"is_async": null,
"is_pub": null,
"lines": 15,
"method_name": null,
"num_enums": null,
"num_items": null,
"num_structs": null,
"repo": "connector-service",
"start_line": 650,
"struct_name": null,
"total_crates": null,
"trait_name": null
} |
connector-service_snippet_-7416499650036175072_650_30 | clm | snippet | // connector-service/backend/external-services/src/service.rs
Some(RequestContent::FormUrlEncoded(payload)) => client.form(&payload),
Some(RequestContent::Xml(payload)) => {
let body = serde_json::to_string(&payload)
.change_context(ApiClientError::UrlEncodingFailed)?;
let xml_body = if body.starts_with('"') && body.ends_with('"') {
serde_json::from_str::<String>(&body)
.change_context(ApiClientError::UrlEncodingFailed)?
} else {
body
};
client.body(xml_body).header("Content-Type", "text/xml")
}
Some(RequestContent::FormData(form)) => client.multipart(form),
_ => client,
}
}
Method::Delete => {
let client = client.delete(url);
match request.body {
Some(RequestContent::Json(payload)) => client.json(&payload),
Some(RequestContent::FormUrlEncoded(payload)) => client.form(&payload),
Some(RequestContent::Xml(payload)) => {
let body = serde_json::to_string(&payload)
.change_context(ApiClientError::UrlEncodingFailed)?;
let xml_body = if body.starts_with('"') && body.ends_with('"') {
serde_json::from_str::<String>(&body)
.change_context(ApiClientError::UrlEncodingFailed)?
} else {
body
};
| {
"chunk": null,
"crate": "external-services",
"enum_name": null,
"file_size": null,
"for_type": null,
"function_name": null,
"is_async": null,
"is_pub": null,
"lines": 30,
"method_name": null,
"num_enums": null,
"num_items": null,
"num_structs": null,
"repo": "connector-service",
"start_line": 650,
"struct_name": null,
"total_crates": null,
"trait_name": null
} |
connector-service_snippet_-7416499650036175072_650_50 | clm | snippet | // connector-service/backend/external-services/src/service.rs
Some(RequestContent::FormUrlEncoded(payload)) => client.form(&payload),
Some(RequestContent::Xml(payload)) => {
let body = serde_json::to_string(&payload)
.change_context(ApiClientError::UrlEncodingFailed)?;
let xml_body = if body.starts_with('"') && body.ends_with('"') {
serde_json::from_str::<String>(&body)
.change_context(ApiClientError::UrlEncodingFailed)?
} else {
body
};
client.body(xml_body).header("Content-Type", "text/xml")
}
Some(RequestContent::FormData(form)) => client.multipart(form),
_ => client,
}
}
Method::Delete => {
let client = client.delete(url);
match request.body {
Some(RequestContent::Json(payload)) => client.json(&payload),
Some(RequestContent::FormUrlEncoded(payload)) => client.form(&payload),
Some(RequestContent::Xml(payload)) => {
let body = serde_json::to_string(&payload)
.change_context(ApiClientError::UrlEncodingFailed)?;
let xml_body = if body.starts_with('"') && body.ends_with('"') {
serde_json::from_str::<String>(&body)
.change_context(ApiClientError::UrlEncodingFailed)?
} else {
body
};
client.body(xml_body).header("Content-Type", "text/xml")
}
Some(RequestContent::FormData(form)) => client.multipart(form),
_ => client,
}
}
}
.add_headers(headers)
};
let send_request = async {
request.send().await.map_err(|error| {
let api_error = match error {
error if error.is_timeout() => ApiClientError::RequestTimeoutReceived,
_ => ApiClientError::RequestNotSent(error.to_string()),
};
info_log(
"REQUEST_FAILURE",
&json!(format!("Unable to send request to connector.",)),
);
report!(api_error)
| {
"chunk": null,
"crate": "external-services",
"enum_name": null,
"file_size": null,
"for_type": null,
"function_name": null,
"is_async": null,
"is_pub": null,
"lines": 50,
"method_name": null,
"num_enums": null,
"num_items": null,
"num_structs": null,
"repo": "connector-service",
"start_line": 650,
"struct_name": null,
"total_crates": null,
"trait_name": null
} |
connector-service_snippet_-7416499650036175072_675_15 | clm | snippet | // connector-service/backend/external-services/src/service.rs
serde_json::from_str::<String>(&body)
.change_context(ApiClientError::UrlEncodingFailed)?
} else {
body
};
client.body(xml_body).header("Content-Type", "text/xml")
}
Some(RequestContent::FormData(form)) => client.multipart(form),
_ => client,
}
}
}
.add_headers(headers)
};
let send_request = async {
| {
"chunk": null,
"crate": "external-services",
"enum_name": null,
"file_size": null,
"for_type": null,
"function_name": null,
"is_async": null,
"is_pub": null,
"lines": 15,
"method_name": null,
"num_enums": null,
"num_items": null,
"num_structs": null,
"repo": "connector-service",
"start_line": 675,
"struct_name": null,
"total_crates": null,
"trait_name": null
} |
connector-service_snippet_-7416499650036175072_675_30 | clm | snippet | // connector-service/backend/external-services/src/service.rs
serde_json::from_str::<String>(&body)
.change_context(ApiClientError::UrlEncodingFailed)?
} else {
body
};
client.body(xml_body).header("Content-Type", "text/xml")
}
Some(RequestContent::FormData(form)) => client.multipart(form),
_ => client,
}
}
}
.add_headers(headers)
};
let send_request = async {
request.send().await.map_err(|error| {
let api_error = match error {
error if error.is_timeout() => ApiClientError::RequestTimeoutReceived,
_ => ApiClientError::RequestNotSent(error.to_string()),
};
info_log(
"REQUEST_FAILURE",
&json!(format!("Unable to send request to connector.",)),
);
report!(api_error)
})
};
let response = send_request.await;
| {
"chunk": null,
"crate": "external-services",
"enum_name": null,
"file_size": null,
"for_type": null,
"function_name": null,
"is_async": null,
"is_pub": null,
"lines": 30,
"method_name": null,
"num_enums": null,
"num_items": null,
"num_structs": null,
"repo": "connector-service",
"start_line": 675,
"struct_name": null,
"total_crates": null,
"trait_name": null
} |
connector-service_snippet_-7416499650036175072_675_50 | clm | snippet | // connector-service/backend/external-services/src/service.rs
serde_json::from_str::<String>(&body)
.change_context(ApiClientError::UrlEncodingFailed)?
} else {
body
};
client.body(xml_body).header("Content-Type", "text/xml")
}
Some(RequestContent::FormData(form)) => client.multipart(form),
_ => client,
}
}
}
.add_headers(headers)
};
let send_request = async {
request.send().await.map_err(|error| {
let api_error = match error {
error if error.is_timeout() => ApiClientError::RequestTimeoutReceived,
_ => ApiClientError::RequestNotSent(error.to_string()),
};
info_log(
"REQUEST_FAILURE",
&json!(format!("Unable to send request to connector.",)),
);
report!(api_error)
})
};
let response = send_request.await;
handle_response(response).await
}
pub fn create_client(
proxy_config: &Proxy,
should_bypass_proxy: bool,
_client_certificate: Option<Secret<String>>,
_client_certificate_key: Option<Secret<String>>,
) -> CustomResult<Client, ApiClientError> {
get_base_client(proxy_config, should_bypass_proxy)
// match (client_certificate, client_certificate_key) {
// (Some(encoded_certificate), Some(encoded_certificate_key)) => {
// let client_builder = get_client_builder(proxy_config, should_bypass_proxy)?;
// let identity = create_identity_from_certificate_and_key(
// encoded_certificate.clone(),
// encoded_certificate_key,
// )?;
// let certificate_list = create_certificate(encoded_certificate)?;
// let client_builder = certificate_list
| {
"chunk": null,
"crate": "external-services",
"enum_name": null,
"file_size": null,
"for_type": null,
"function_name": null,
"is_async": null,
"is_pub": null,
"lines": 50,
"method_name": null,
"num_enums": null,
"num_items": null,
"num_structs": null,
"repo": "connector-service",
"start_line": 675,
"struct_name": null,
"total_crates": null,
"trait_name": null
} |
connector-service_snippet_-7416499650036175072_700_15 | clm | snippet | // connector-service/backend/external-services/src/service.rs
})
};
let response = send_request.await;
handle_response(response).await
}
pub fn create_client(
proxy_config: &Proxy,
should_bypass_proxy: bool,
_client_certificate: Option<Secret<String>>,
_client_certificate_key: Option<Secret<String>>,
) -> CustomResult<Client, ApiClientError> {
get_base_client(proxy_config, should_bypass_proxy)
| {
"chunk": null,
"crate": "external-services",
"enum_name": null,
"file_size": null,
"for_type": null,
"function_name": null,
"is_async": null,
"is_pub": null,
"lines": 15,
"method_name": null,
"num_enums": null,
"num_items": null,
"num_structs": null,
"repo": "connector-service",
"start_line": 700,
"struct_name": null,
"total_crates": null,
"trait_name": null
} |
connector-service_snippet_-7416499650036175072_700_30 | clm | snippet | // connector-service/backend/external-services/src/service.rs
})
};
let response = send_request.await;
handle_response(response).await
}
pub fn create_client(
proxy_config: &Proxy,
should_bypass_proxy: bool,
_client_certificate: Option<Secret<String>>,
_client_certificate_key: Option<Secret<String>>,
) -> CustomResult<Client, ApiClientError> {
get_base_client(proxy_config, should_bypass_proxy)
// match (client_certificate, client_certificate_key) {
// (Some(encoded_certificate), Some(encoded_certificate_key)) => {
// let client_builder = get_client_builder(proxy_config, should_bypass_proxy)?;
// let identity = create_identity_from_certificate_and_key(
// encoded_certificate.clone(),
// encoded_certificate_key,
// )?;
// let certificate_list = create_certificate(encoded_certificate)?;
// let client_builder = certificate_list
// .into_iter()
// .fold(client_builder, |client_builder, certificate| {
// client_builder.add_root_certificate(certificate)
// });
// client_builder
| {
"chunk": null,
"crate": "external-services",
"enum_name": null,
"file_size": null,
"for_type": null,
"function_name": null,
"is_async": null,
"is_pub": null,
"lines": 30,
"method_name": null,
"num_enums": null,
"num_items": null,
"num_structs": null,
"repo": "connector-service",
"start_line": 700,
"struct_name": null,
"total_crates": null,
"trait_name": null
} |
connector-service_snippet_-7416499650036175072_700_50 | clm | snippet | // connector-service/backend/external-services/src/service.rs
})
};
let response = send_request.await;
handle_response(response).await
}
pub fn create_client(
proxy_config: &Proxy,
should_bypass_proxy: bool,
_client_certificate: Option<Secret<String>>,
_client_certificate_key: Option<Secret<String>>,
) -> CustomResult<Client, ApiClientError> {
get_base_client(proxy_config, should_bypass_proxy)
// match (client_certificate, client_certificate_key) {
// (Some(encoded_certificate), Some(encoded_certificate_key)) => {
// let client_builder = get_client_builder(proxy_config, should_bypass_proxy)?;
// let identity = create_identity_from_certificate_and_key(
// encoded_certificate.clone(),
// encoded_certificate_key,
// )?;
// let certificate_list = create_certificate(encoded_certificate)?;
// let client_builder = certificate_list
// .into_iter()
// .fold(client_builder, |client_builder, certificate| {
// client_builder.add_root_certificate(certificate)
// });
// client_builder
// .identity(identity)
// .use_rustls_tls()
// .build()
// .change_context(ApiClientError::ClientConstructionFailed)
// .inspect_err(|err| {
// info_log(
// "ERROR",
// &json!(format!(
// "Failed to construct client with certificate and certificate key. Error: {:?}",
// err
// )),
// );
// })
// }
// _ => ,
// }
}
static NON_PROXIED_CLIENT: OnceCell<Client> = OnceCell::new();
static PROXIED_CLIENT: OnceCell<Client> = OnceCell::new();
| {
"chunk": null,
"crate": "external-services",
"enum_name": null,
"file_size": null,
"for_type": null,
"function_name": null,
"is_async": null,
"is_pub": null,
"lines": 50,
"method_name": null,
"num_enums": null,
"num_items": null,
"num_structs": null,
"repo": "connector-service",
"start_line": 700,
"struct_name": null,
"total_crates": null,
"trait_name": null
} |
connector-service_snippet_-7416499650036175072_725_15 | clm | snippet | // connector-service/backend/external-services/src/service.rs
// .into_iter()
// .fold(client_builder, |client_builder, certificate| {
// client_builder.add_root_certificate(certificate)
// });
// client_builder
// .identity(identity)
// .use_rustls_tls()
// .build()
// .change_context(ApiClientError::ClientConstructionFailed)
// .inspect_err(|err| {
// info_log(
// "ERROR",
// &json!(format!(
// "Failed to construct client with certificate and certificate key. Error: {:?}",
// err
| {
"chunk": null,
"crate": "external-services",
"enum_name": null,
"file_size": null,
"for_type": null,
"function_name": null,
"is_async": null,
"is_pub": null,
"lines": 15,
"method_name": null,
"num_enums": null,
"num_items": null,
"num_structs": null,
"repo": "connector-service",
"start_line": 725,
"struct_name": null,
"total_crates": null,
"trait_name": null
} |
connector-service_snippet_-7416499650036175072_725_30 | clm | snippet | // connector-service/backend/external-services/src/service.rs
// .into_iter()
// .fold(client_builder, |client_builder, certificate| {
// client_builder.add_root_certificate(certificate)
// });
// client_builder
// .identity(identity)
// .use_rustls_tls()
// .build()
// .change_context(ApiClientError::ClientConstructionFailed)
// .inspect_err(|err| {
// info_log(
// "ERROR",
// &json!(format!(
// "Failed to construct client with certificate and certificate key. Error: {:?}",
// err
// )),
// );
// })
// }
// _ => ,
// }
}
static NON_PROXIED_CLIENT: OnceCell<Client> = OnceCell::new();
static PROXIED_CLIENT: OnceCell<Client> = OnceCell::new();
fn get_base_client(
proxy_config: &Proxy,
should_bypass_proxy: bool,
) -> CustomResult<Client, ApiClientError> {
| {
"chunk": null,
"crate": "external-services",
"enum_name": null,
"file_size": null,
"for_type": null,
"function_name": null,
"is_async": null,
"is_pub": null,
"lines": 30,
"method_name": null,
"num_enums": null,
"num_items": null,
"num_structs": null,
"repo": "connector-service",
"start_line": 725,
"struct_name": null,
"total_crates": null,
"trait_name": null
} |
connector-service_snippet_-7416499650036175072_725_50 | clm | snippet | // connector-service/backend/external-services/src/service.rs
// .into_iter()
// .fold(client_builder, |client_builder, certificate| {
// client_builder.add_root_certificate(certificate)
// });
// client_builder
// .identity(identity)
// .use_rustls_tls()
// .build()
// .change_context(ApiClientError::ClientConstructionFailed)
// .inspect_err(|err| {
// info_log(
// "ERROR",
// &json!(format!(
// "Failed to construct client with certificate and certificate key. Error: {:?}",
// err
// )),
// );
// })
// }
// _ => ,
// }
}
static NON_PROXIED_CLIENT: OnceCell<Client> = OnceCell::new();
static PROXIED_CLIENT: OnceCell<Client> = OnceCell::new();
fn get_base_client(
proxy_config: &Proxy,
should_bypass_proxy: bool,
) -> CustomResult<Client, ApiClientError> {
Ok(if should_bypass_proxy
|| (proxy_config.http_url.is_none() && proxy_config.https_url.is_none())
{
&NON_PROXIED_CLIENT
} else {
&PROXIED_CLIENT
}
.get_or_try_init(|| {
get_client_builder(proxy_config, should_bypass_proxy)?
.build()
.change_context(ApiClientError::ClientConstructionFailed)
.inspect_err(|err| {
info_log(
"ERROR",
&json!(format!("Failed to construct base client. Error: {:?}", err)),
);
})
})?
.clone())
}
| {
"chunk": null,
"crate": "external-services",
"enum_name": null,
"file_size": null,
"for_type": null,
"function_name": null,
"is_async": null,
"is_pub": null,
"lines": 50,
"method_name": null,
"num_enums": null,
"num_items": null,
"num_structs": null,
"repo": "connector-service",
"start_line": 725,
"struct_name": null,
"total_crates": null,
"trait_name": null
} |
connector-service_snippet_-7416499650036175072_750_15 | clm | snippet | // connector-service/backend/external-services/src/service.rs
fn get_base_client(
proxy_config: &Proxy,
should_bypass_proxy: bool,
) -> CustomResult<Client, ApiClientError> {
Ok(if should_bypass_proxy
|| (proxy_config.http_url.is_none() && proxy_config.https_url.is_none())
{
&NON_PROXIED_CLIENT
} else {
&PROXIED_CLIENT
}
.get_or_try_init(|| {
get_client_builder(proxy_config, should_bypass_proxy)?
.build()
| {
"chunk": null,
"crate": "external-services",
"enum_name": null,
"file_size": null,
"for_type": null,
"function_name": null,
"is_async": null,
"is_pub": null,
"lines": 15,
"method_name": null,
"num_enums": null,
"num_items": null,
"num_structs": null,
"repo": "connector-service",
"start_line": 750,
"struct_name": null,
"total_crates": null,
"trait_name": null
} |
connector-service_snippet_-7416499650036175072_750_30 | clm | snippet | // connector-service/backend/external-services/src/service.rs
fn get_base_client(
proxy_config: &Proxy,
should_bypass_proxy: bool,
) -> CustomResult<Client, ApiClientError> {
Ok(if should_bypass_proxy
|| (proxy_config.http_url.is_none() && proxy_config.https_url.is_none())
{
&NON_PROXIED_CLIENT
} else {
&PROXIED_CLIENT
}
.get_or_try_init(|| {
get_client_builder(proxy_config, should_bypass_proxy)?
.build()
.change_context(ApiClientError::ClientConstructionFailed)
.inspect_err(|err| {
info_log(
"ERROR",
&json!(format!("Failed to construct base client. Error: {:?}", err)),
);
})
})?
.clone())
}
fn load_custom_ca_certificate_from_content(
mut client_builder: reqwest::ClientBuilder,
cert_content: &str,
) -> CustomResult<reqwest::ClientBuilder, ApiClientError> {
| {
"chunk": null,
"crate": "external-services",
"enum_name": null,
"file_size": null,
"for_type": null,
"function_name": null,
"is_async": null,
"is_pub": null,
"lines": 30,
"method_name": null,
"num_enums": null,
"num_items": null,
"num_structs": null,
"repo": "connector-service",
"start_line": 750,
"struct_name": null,
"total_crates": null,
"trait_name": null
} |
connector-service_snippet_-7416499650036175072_750_50 | clm | snippet | // connector-service/backend/external-services/src/service.rs
fn get_base_client(
proxy_config: &Proxy,
should_bypass_proxy: bool,
) -> CustomResult<Client, ApiClientError> {
Ok(if should_bypass_proxy
|| (proxy_config.http_url.is_none() && proxy_config.https_url.is_none())
{
&NON_PROXIED_CLIENT
} else {
&PROXIED_CLIENT
}
.get_or_try_init(|| {
get_client_builder(proxy_config, should_bypass_proxy)?
.build()
.change_context(ApiClientError::ClientConstructionFailed)
.inspect_err(|err| {
info_log(
"ERROR",
&json!(format!("Failed to construct base client. Error: {:?}", err)),
);
})
})?
.clone())
}
fn load_custom_ca_certificate_from_content(
mut client_builder: reqwest::ClientBuilder,
cert_content: &str,
) -> CustomResult<reqwest::ClientBuilder, ApiClientError> {
let certificate = reqwest::Certificate::from_pem(cert_content.as_bytes())
.change_context(ApiClientError::InvalidProxyConfiguration)
.attach_printable("Failed to parse certificate PEM from provided content")?;
client_builder = client_builder.add_root_certificate(certificate);
Ok(client_builder)
}
fn get_client_builder(
proxy_config: &Proxy,
should_bypass_proxy: bool,
) -> CustomResult<reqwest::ClientBuilder, ApiClientError> {
let mut client_builder = Client::builder()
.redirect(reqwest::redirect::Policy::none())
.pool_idle_timeout(Duration::from_secs(
proxy_config
.idle_pool_connection_timeout
.unwrap_or_default(),
));
if should_bypass_proxy {
| {
"chunk": null,
"crate": "external-services",
"enum_name": null,
"file_size": null,
"for_type": null,
"function_name": null,
"is_async": null,
"is_pub": null,
"lines": 50,
"method_name": null,
"num_enums": null,
"num_items": null,
"num_structs": null,
"repo": "connector-service",
"start_line": 750,
"struct_name": null,
"total_crates": null,
"trait_name": null
} |
connector-service_snippet_-7416499650036175072_775_15 | clm | snippet | // connector-service/backend/external-services/src/service.rs
fn load_custom_ca_certificate_from_content(
mut client_builder: reqwest::ClientBuilder,
cert_content: &str,
) -> CustomResult<reqwest::ClientBuilder, ApiClientError> {
let certificate = reqwest::Certificate::from_pem(cert_content.as_bytes())
.change_context(ApiClientError::InvalidProxyConfiguration)
.attach_printable("Failed to parse certificate PEM from provided content")?;
client_builder = client_builder.add_root_certificate(certificate);
Ok(client_builder)
}
fn get_client_builder(
proxy_config: &Proxy,
should_bypass_proxy: bool,
| {
"chunk": null,
"crate": "external-services",
"enum_name": null,
"file_size": null,
"for_type": null,
"function_name": null,
"is_async": null,
"is_pub": null,
"lines": 15,
"method_name": null,
"num_enums": null,
"num_items": null,
"num_structs": null,
"repo": "connector-service",
"start_line": 775,
"struct_name": null,
"total_crates": null,
"trait_name": null
} |
connector-service_snippet_-7416499650036175072_775_30 | clm | snippet | // connector-service/backend/external-services/src/service.rs
fn load_custom_ca_certificate_from_content(
mut client_builder: reqwest::ClientBuilder,
cert_content: &str,
) -> CustomResult<reqwest::ClientBuilder, ApiClientError> {
let certificate = reqwest::Certificate::from_pem(cert_content.as_bytes())
.change_context(ApiClientError::InvalidProxyConfiguration)
.attach_printable("Failed to parse certificate PEM from provided content")?;
client_builder = client_builder.add_root_certificate(certificate);
Ok(client_builder)
}
fn get_client_builder(
proxy_config: &Proxy,
should_bypass_proxy: bool,
) -> CustomResult<reqwest::ClientBuilder, ApiClientError> {
let mut client_builder = Client::builder()
.redirect(reqwest::redirect::Policy::none())
.pool_idle_timeout(Duration::from_secs(
proxy_config
.idle_pool_connection_timeout
.unwrap_or_default(),
));
if should_bypass_proxy {
return Ok(client_builder);
}
// Attach MITM certificate if enabled
if proxy_config.mitm_proxy_enabled {
| {
"chunk": null,
"crate": "external-services",
"enum_name": null,
"file_size": null,
"for_type": null,
"function_name": null,
"is_async": null,
"is_pub": null,
"lines": 30,
"method_name": null,
"num_enums": null,
"num_items": null,
"num_structs": null,
"repo": "connector-service",
"start_line": 775,
"struct_name": null,
"total_crates": null,
"trait_name": null
} |
connector-service_snippet_-7416499650036175072_775_50 | clm | snippet | // connector-service/backend/external-services/src/service.rs
fn load_custom_ca_certificate_from_content(
mut client_builder: reqwest::ClientBuilder,
cert_content: &str,
) -> CustomResult<reqwest::ClientBuilder, ApiClientError> {
let certificate = reqwest::Certificate::from_pem(cert_content.as_bytes())
.change_context(ApiClientError::InvalidProxyConfiguration)
.attach_printable("Failed to parse certificate PEM from provided content")?;
client_builder = client_builder.add_root_certificate(certificate);
Ok(client_builder)
}
fn get_client_builder(
proxy_config: &Proxy,
should_bypass_proxy: bool,
) -> CustomResult<reqwest::ClientBuilder, ApiClientError> {
let mut client_builder = Client::builder()
.redirect(reqwest::redirect::Policy::none())
.pool_idle_timeout(Duration::from_secs(
proxy_config
.idle_pool_connection_timeout
.unwrap_or_default(),
));
if should_bypass_proxy {
return Ok(client_builder);
}
// Attach MITM certificate if enabled
if proxy_config.mitm_proxy_enabled {
if let Some(cert_content) = &proxy_config.mitm_ca_cert {
if !cert_content.trim().is_empty() {
client_builder =
load_custom_ca_certificate_from_content(client_builder, cert_content.trim())?;
}
}
}
// Proxy all HTTPS traffic through the configured HTTPS proxy
if let Some(url) = proxy_config.https_url.as_ref() {
client_builder = client_builder.proxy(
reqwest::Proxy::https(url)
.change_context(ApiClientError::InvalidProxyConfiguration)
.inspect_err(|err| {
info_log(
"PROXY_ERROR",
&json!(format!("HTTPS proxy configuration error. Error: {:?}", err)),
);
})?,
);
| {
"chunk": null,
"crate": "external-services",
"enum_name": null,
"file_size": null,
"for_type": null,
"function_name": null,
"is_async": null,
"is_pub": null,
"lines": 50,
"method_name": null,
"num_enums": null,
"num_items": null,
"num_structs": null,
"repo": "connector-service",
"start_line": 775,
"struct_name": null,
"total_crates": null,
"trait_name": null
} |
connector-service_snippet_-7416499650036175072_800_15 | clm | snippet | // connector-service/backend/external-services/src/service.rs
return Ok(client_builder);
}
// Attach MITM certificate if enabled
if proxy_config.mitm_proxy_enabled {
if let Some(cert_content) = &proxy_config.mitm_ca_cert {
if !cert_content.trim().is_empty() {
client_builder =
load_custom_ca_certificate_from_content(client_builder, cert_content.trim())?;
}
}
}
// Proxy all HTTPS traffic through the configured HTTPS proxy
if let Some(url) = proxy_config.https_url.as_ref() {
| {
"chunk": null,
"crate": "external-services",
"enum_name": null,
"file_size": null,
"for_type": null,
"function_name": null,
"is_async": null,
"is_pub": null,
"lines": 15,
"method_name": null,
"num_enums": null,
"num_items": null,
"num_structs": null,
"repo": "connector-service",
"start_line": 800,
"struct_name": null,
"total_crates": null,
"trait_name": null
} |
connector-service_snippet_-7416499650036175072_800_30 | clm | snippet | // connector-service/backend/external-services/src/service.rs
return Ok(client_builder);
}
// Attach MITM certificate if enabled
if proxy_config.mitm_proxy_enabled {
if let Some(cert_content) = &proxy_config.mitm_ca_cert {
if !cert_content.trim().is_empty() {
client_builder =
load_custom_ca_certificate_from_content(client_builder, cert_content.trim())?;
}
}
}
// Proxy all HTTPS traffic through the configured HTTPS proxy
if let Some(url) = proxy_config.https_url.as_ref() {
client_builder = client_builder.proxy(
reqwest::Proxy::https(url)
.change_context(ApiClientError::InvalidProxyConfiguration)
.inspect_err(|err| {
info_log(
"PROXY_ERROR",
&json!(format!("HTTPS proxy configuration error. Error: {:?}", err)),
);
})?,
);
}
// Proxy all HTTP traffic through the configured HTTP proxy
if let Some(url) = proxy_config.http_url.as_ref() {
client_builder = client_builder.proxy(
| {
"chunk": null,
"crate": "external-services",
"enum_name": null,
"file_size": null,
"for_type": null,
"function_name": null,
"is_async": null,
"is_pub": null,
"lines": 30,
"method_name": null,
"num_enums": null,
"num_items": null,
"num_structs": null,
"repo": "connector-service",
"start_line": 800,
"struct_name": null,
"total_crates": null,
"trait_name": null
} |
connector-service_snippet_-7416499650036175072_800_50 | clm | snippet | // connector-service/backend/external-services/src/service.rs
return Ok(client_builder);
}
// Attach MITM certificate if enabled
if proxy_config.mitm_proxy_enabled {
if let Some(cert_content) = &proxy_config.mitm_ca_cert {
if !cert_content.trim().is_empty() {
client_builder =
load_custom_ca_certificate_from_content(client_builder, cert_content.trim())?;
}
}
}
// Proxy all HTTPS traffic through the configured HTTPS proxy
if let Some(url) = proxy_config.https_url.as_ref() {
client_builder = client_builder.proxy(
reqwest::Proxy::https(url)
.change_context(ApiClientError::InvalidProxyConfiguration)
.inspect_err(|err| {
info_log(
"PROXY_ERROR",
&json!(format!("HTTPS proxy configuration error. Error: {:?}", err)),
);
})?,
);
}
// Proxy all HTTP traffic through the configured HTTP proxy
if let Some(url) = proxy_config.http_url.as_ref() {
client_builder = client_builder.proxy(
reqwest::Proxy::http(url)
.change_context(ApiClientError::InvalidProxyConfiguration)
.inspect_err(|err| {
info_log(
"PROXY_ERROR",
&json!(format!("HTTP proxy configuration error. Error: {:?}", err)),
);
})?,
);
}
Ok(client_builder)
}
// pub fn create_identity_from_certificate_and_key(
// encoded_certificate: hyperswitch_masking::Secret<String>,
// encoded_certificate_key: hyperswitch_masking::Secret<String>,
// ) -> Result<reqwest::Identity, error_stack::Report<ApiClientError>> {
// let decoded_certificate = BASE64_ENGINE
// .decode(encoded_certificate.expose())
| {
"chunk": null,
"crate": "external-services",
"enum_name": null,
"file_size": null,
"for_type": null,
"function_name": null,
"is_async": null,
"is_pub": null,
"lines": 50,
"method_name": null,
"num_enums": null,
"num_items": null,
"num_structs": null,
"repo": "connector-service",
"start_line": 800,
"struct_name": null,
"total_crates": null,
"trait_name": null
} |
connector-service_snippet_-7416499650036175072_825_15 | clm | snippet | // connector-service/backend/external-services/src/service.rs
}
// Proxy all HTTP traffic through the configured HTTP proxy
if let Some(url) = proxy_config.http_url.as_ref() {
client_builder = client_builder.proxy(
reqwest::Proxy::http(url)
.change_context(ApiClientError::InvalidProxyConfiguration)
.inspect_err(|err| {
info_log(
"PROXY_ERROR",
&json!(format!("HTTP proxy configuration error. Error: {:?}", err)),
);
})?,
);
}
| {
"chunk": null,
"crate": "external-services",
"enum_name": null,
"file_size": null,
"for_type": null,
"function_name": null,
"is_async": null,
"is_pub": null,
"lines": 15,
"method_name": null,
"num_enums": null,
"num_items": null,
"num_structs": null,
"repo": "connector-service",
"start_line": 825,
"struct_name": null,
"total_crates": null,
"trait_name": null
} |
connector-service_snippet_-7416499650036175072_825_30 | clm | snippet | // connector-service/backend/external-services/src/service.rs
}
// Proxy all HTTP traffic through the configured HTTP proxy
if let Some(url) = proxy_config.http_url.as_ref() {
client_builder = client_builder.proxy(
reqwest::Proxy::http(url)
.change_context(ApiClientError::InvalidProxyConfiguration)
.inspect_err(|err| {
info_log(
"PROXY_ERROR",
&json!(format!("HTTP proxy configuration error. Error: {:?}", err)),
);
})?,
);
}
Ok(client_builder)
}
// pub fn create_identity_from_certificate_and_key(
// encoded_certificate: hyperswitch_masking::Secret<String>,
// encoded_certificate_key: hyperswitch_masking::Secret<String>,
// ) -> Result<reqwest::Identity, error_stack::Report<ApiClientError>> {
// let decoded_certificate = BASE64_ENGINE
// .decode(encoded_certificate.expose())
// .change_context(ApiClientError::CertificateDecodeFailed)?;
// let decoded_certificate_key = BASE64_ENGINE
// .decode(encoded_certificate_key.expose())
// .change_context(ApiClientError::CertificateDecodeFailed)?;
| {
"chunk": null,
"crate": "external-services",
"enum_name": null,
"file_size": null,
"for_type": null,
"function_name": null,
"is_async": null,
"is_pub": null,
"lines": 30,
"method_name": null,
"num_enums": null,
"num_items": null,
"num_structs": null,
"repo": "connector-service",
"start_line": 825,
"struct_name": null,
"total_crates": null,
"trait_name": null
} |
connector-service_snippet_-7416499650036175072_825_50 | clm | snippet | // connector-service/backend/external-services/src/service.rs
}
// Proxy all HTTP traffic through the configured HTTP proxy
if let Some(url) = proxy_config.http_url.as_ref() {
client_builder = client_builder.proxy(
reqwest::Proxy::http(url)
.change_context(ApiClientError::InvalidProxyConfiguration)
.inspect_err(|err| {
info_log(
"PROXY_ERROR",
&json!(format!("HTTP proxy configuration error. Error: {:?}", err)),
);
})?,
);
}
Ok(client_builder)
}
// pub fn create_identity_from_certificate_and_key(
// encoded_certificate: hyperswitch_masking::Secret<String>,
// encoded_certificate_key: hyperswitch_masking::Secret<String>,
// ) -> Result<reqwest::Identity, error_stack::Report<ApiClientError>> {
// let decoded_certificate = BASE64_ENGINE
// .decode(encoded_certificate.expose())
// .change_context(ApiClientError::CertificateDecodeFailed)?;
// let decoded_certificate_key = BASE64_ENGINE
// .decode(encoded_certificate_key.expose())
// .change_context(ApiClientError::CertificateDecodeFailed)?;
// let certificate = String::from_utf8(decoded_certificate)
// .change_context(ApiClientError::CertificateDecodeFailed)?;
// let certificate_key = String::from_utf8(decoded_certificate_key)
// .change_context(ApiClientError::CertificateDecodeFailed)?;
// let key_chain = format!("{}{}", certificate_key, certificate);
// reqwest::Identity::from_pem(key_chain.as_bytes())
// .change_context(ApiClientError::CertificateDecodeFailed)
// }
// pub fn create_certificate(
// encoded_certificate: hyperswitch_masking::Secret<String>,
// ) -> Result<Vec<reqwest::Certificate>, error_stack::Report<ApiClientError>> {
// let decoded_certificate = BASE64_ENGINE
// .decode(encoded_certificate.expose())
// .change_context(ApiClientError::CertificateDecodeFailed)?;
// let certificate = String::from_utf8(decoded_certificate)
| {
"chunk": null,
"crate": "external-services",
"enum_name": null,
"file_size": null,
"for_type": null,
"function_name": null,
"is_async": null,
"is_pub": null,
"lines": 50,
"method_name": null,
"num_enums": null,
"num_items": null,
"num_structs": null,
"repo": "connector-service",
"start_line": 825,
"struct_name": null,
"total_crates": null,
"trait_name": null
} |
Subsets and Splits
No community queries yet
The top public SQL queries from the community will appear here once available.