id
stringlengths
20
153
type
stringclasses
1 value
granularity
stringclasses
14 values
content
stringlengths
16
84.3k
metadata
dict
connector-service_snippet_-7416499650036175072_0_50
clm
snippet
// connector-service/backend/external-services/src/service.rs use std::{collections::HashMap, str::FromStr, time::Duration}; use common_enums::ApiClientError; use common_utils::{ ext_traits::AsyncExt, lineage, request::{Method, Request, RequestContent}, }; use domain_types::{ connector_types::{ConnectorResponseHeaders, RawConnectorRequestResponse}, errors::{ApiErrorResponse, ConnectorError}, router_data_v2::RouterDataV2, router_response_types::Response, types::Proxy, }; use hyperswitch_masking::Secret; use injector; pub trait ConnectorRequestReference { fn get_connector_request_reference_id(&self) -> &str; } pub trait AdditionalHeaders { fn get_vault_headers(&self) -> Option<&HashMap<String, Secret<String>>>; } impl ConnectorRequestReference for domain_types::connector_types::PaymentFlowData { fn get_connector_request_reference_id(&self) -> &str { &self.connector_request_reference_id } } impl AdditionalHeaders for domain_types::connector_types::PaymentFlowData { fn get_vault_headers(&self) -> Option<&HashMap<String, Secret<String>>> { self.vault_headers.as_ref() } } impl ConnectorRequestReference for domain_types::connector_types::RefundFlowData { fn get_connector_request_reference_id(&self) -> &str { &self.connector_request_reference_id } } impl AdditionalHeaders for domain_types::connector_types::RefundFlowData { fn get_vault_headers(&self) -> Option<&HashMap<String, Secret<String>>> { // RefundFlowData might not have vault_headers, so return None None } }
{ "chunk": null, "crate": "external-services", "enum_name": null, "file_size": null, "for_type": null, "function_name": null, "is_async": null, "is_pub": null, "lines": 50, "method_name": null, "num_enums": null, "num_items": null, "num_structs": null, "repo": "connector-service", "start_line": 0, "struct_name": null, "total_crates": null, "trait_name": null }
connector-service_snippet_-7416499650036175072_25_15
clm
snippet
// connector-service/backend/external-services/src/service.rs impl ConnectorRequestReference for domain_types::connector_types::PaymentFlowData { fn get_connector_request_reference_id(&self) -> &str { &self.connector_request_reference_id } } impl AdditionalHeaders for domain_types::connector_types::PaymentFlowData { fn get_vault_headers(&self) -> Option<&HashMap<String, Secret<String>>> { self.vault_headers.as_ref() } } impl ConnectorRequestReference for domain_types::connector_types::RefundFlowData { fn get_connector_request_reference_id(&self) -> &str {
{ "chunk": null, "crate": "external-services", "enum_name": null, "file_size": null, "for_type": null, "function_name": null, "is_async": null, "is_pub": null, "lines": 15, "method_name": null, "num_enums": null, "num_items": null, "num_structs": null, "repo": "connector-service", "start_line": 25, "struct_name": null, "total_crates": null, "trait_name": null }
connector-service_snippet_-7416499650036175072_25_30
clm
snippet
// connector-service/backend/external-services/src/service.rs impl ConnectorRequestReference for domain_types::connector_types::PaymentFlowData { fn get_connector_request_reference_id(&self) -> &str { &self.connector_request_reference_id } } impl AdditionalHeaders for domain_types::connector_types::PaymentFlowData { fn get_vault_headers(&self) -> Option<&HashMap<String, Secret<String>>> { self.vault_headers.as_ref() } } impl ConnectorRequestReference for domain_types::connector_types::RefundFlowData { fn get_connector_request_reference_id(&self) -> &str { &self.connector_request_reference_id } } impl AdditionalHeaders for domain_types::connector_types::RefundFlowData { fn get_vault_headers(&self) -> Option<&HashMap<String, Secret<String>>> { // RefundFlowData might not have vault_headers, so return None None } } impl ConnectorRequestReference for domain_types::connector_types::DisputeFlowData { fn get_connector_request_reference_id(&self) -> &str { &self.connector_request_reference_id }
{ "chunk": null, "crate": "external-services", "enum_name": null, "file_size": null, "for_type": null, "function_name": null, "is_async": null, "is_pub": null, "lines": 30, "method_name": null, "num_enums": null, "num_items": null, "num_structs": null, "repo": "connector-service", "start_line": 25, "struct_name": null, "total_crates": null, "trait_name": null }
connector-service_snippet_-7416499650036175072_25_50
clm
snippet
// connector-service/backend/external-services/src/service.rs impl ConnectorRequestReference for domain_types::connector_types::PaymentFlowData { fn get_connector_request_reference_id(&self) -> &str { &self.connector_request_reference_id } } impl AdditionalHeaders for domain_types::connector_types::PaymentFlowData { fn get_vault_headers(&self) -> Option<&HashMap<String, Secret<String>>> { self.vault_headers.as_ref() } } impl ConnectorRequestReference for domain_types::connector_types::RefundFlowData { fn get_connector_request_reference_id(&self) -> &str { &self.connector_request_reference_id } } impl AdditionalHeaders for domain_types::connector_types::RefundFlowData { fn get_vault_headers(&self) -> Option<&HashMap<String, Secret<String>>> { // RefundFlowData might not have vault_headers, so return None None } } impl ConnectorRequestReference for domain_types::connector_types::DisputeFlowData { fn get_connector_request_reference_id(&self) -> &str { &self.connector_request_reference_id } } impl AdditionalHeaders for domain_types::connector_types::DisputeFlowData { fn get_vault_headers(&self) -> Option<&HashMap<String, Secret<String>>> { // DisputeFlowData might not have vault_headers, so return None None } } use common_utils::{ emit_event_with_config, events::{Event, EventConfig, EventStage, FlowName, MaskedSerdeValue}, }; use error_stack::{report, ResultExt}; use hyperswitch_masking::{ErasedMaskSerialize, ExposeInterface, Maskable}; // TokenData is now imported from hyperswitch_injector use common_utils::consts; use injector::{injector_core, HttpMethod, TokenData}; use interfaces::{ connector_integration_v2::BoxedConnectorIntegrationV2, integrity::{CheckIntegrity, FlowIntegrity, GetIntegrityObject},
{ "chunk": null, "crate": "external-services", "enum_name": null, "file_size": null, "for_type": null, "function_name": null, "is_async": null, "is_pub": null, "lines": 50, "method_name": null, "num_enums": null, "num_items": null, "num_structs": null, "repo": "connector-service", "start_line": 25, "struct_name": null, "total_crates": null, "trait_name": null }
connector-service_snippet_-7416499650036175072_50_15
clm
snippet
// connector-service/backend/external-services/src/service.rs impl ConnectorRequestReference for domain_types::connector_types::DisputeFlowData { fn get_connector_request_reference_id(&self) -> &str { &self.connector_request_reference_id } } impl AdditionalHeaders for domain_types::connector_types::DisputeFlowData { fn get_vault_headers(&self) -> Option<&HashMap<String, Secret<String>>> { // DisputeFlowData might not have vault_headers, so return None None } } use common_utils::{ emit_event_with_config,
{ "chunk": null, "crate": "external-services", "enum_name": null, "file_size": null, "for_type": null, "function_name": null, "is_async": null, "is_pub": null, "lines": 15, "method_name": null, "num_enums": null, "num_items": null, "num_structs": null, "repo": "connector-service", "start_line": 50, "struct_name": null, "total_crates": null, "trait_name": null }
connector-service_snippet_-7416499650036175072_50_30
clm
snippet
// connector-service/backend/external-services/src/service.rs impl ConnectorRequestReference for domain_types::connector_types::DisputeFlowData { fn get_connector_request_reference_id(&self) -> &str { &self.connector_request_reference_id } } impl AdditionalHeaders for domain_types::connector_types::DisputeFlowData { fn get_vault_headers(&self) -> Option<&HashMap<String, Secret<String>>> { // DisputeFlowData might not have vault_headers, so return None None } } use common_utils::{ emit_event_with_config, events::{Event, EventConfig, EventStage, FlowName, MaskedSerdeValue}, }; use error_stack::{report, ResultExt}; use hyperswitch_masking::{ErasedMaskSerialize, ExposeInterface, Maskable}; // TokenData is now imported from hyperswitch_injector use common_utils::consts; use injector::{injector_core, HttpMethod, TokenData}; use interfaces::{ connector_integration_v2::BoxedConnectorIntegrationV2, integrity::{CheckIntegrity, FlowIntegrity, GetIntegrityObject}, }; use once_cell::sync::OnceCell; use reqwest::Client; use serde_json::json; use tracing::field::Empty;
{ "chunk": null, "crate": "external-services", "enum_name": null, "file_size": null, "for_type": null, "function_name": null, "is_async": null, "is_pub": null, "lines": 30, "method_name": null, "num_enums": null, "num_items": null, "num_structs": null, "repo": "connector-service", "start_line": 50, "struct_name": null, "total_crates": null, "trait_name": null }
connector-service_snippet_-7416499650036175072_50_50
clm
snippet
// connector-service/backend/external-services/src/service.rs impl ConnectorRequestReference for domain_types::connector_types::DisputeFlowData { fn get_connector_request_reference_id(&self) -> &str { &self.connector_request_reference_id } } impl AdditionalHeaders for domain_types::connector_types::DisputeFlowData { fn get_vault_headers(&self) -> Option<&HashMap<String, Secret<String>>> { // DisputeFlowData might not have vault_headers, so return None None } } use common_utils::{ emit_event_with_config, events::{Event, EventConfig, EventStage, FlowName, MaskedSerdeValue}, }; use error_stack::{report, ResultExt}; use hyperswitch_masking::{ErasedMaskSerialize, ExposeInterface, Maskable}; // TokenData is now imported from hyperswitch_injector use common_utils::consts; use injector::{injector_core, HttpMethod, TokenData}; use interfaces::{ connector_integration_v2::BoxedConnectorIntegrationV2, integrity::{CheckIntegrity, FlowIntegrity, GetIntegrityObject}, }; use once_cell::sync::OnceCell; use reqwest::Client; use serde_json::json; use tracing::field::Empty; use crate::shared_metrics as metrics; pub type Headers = std::collections::HashSet<(String, Maskable<String>)>; trait ToHttpMethod { fn to_http_method(&self) -> HttpMethod; } impl ToHttpMethod for Method { fn to_http_method(&self) -> HttpMethod { match self { Self::Get => HttpMethod::GET, Self::Post => HttpMethod::POST, Self::Put => HttpMethod::PUT, Self::Patch => HttpMethod::PATCH, Self::Delete => HttpMethod::DELETE, } } }
{ "chunk": null, "crate": "external-services", "enum_name": null, "file_size": null, "for_type": null, "function_name": null, "is_async": null, "is_pub": null, "lines": 50, "method_name": null, "num_enums": null, "num_items": null, "num_structs": null, "repo": "connector-service", "start_line": 50, "struct_name": null, "total_crates": null, "trait_name": null }
connector-service_snippet_-7416499650036175072_75_15
clm
snippet
// connector-service/backend/external-services/src/service.rs }; use once_cell::sync::OnceCell; use reqwest::Client; use serde_json::json; use tracing::field::Empty; use crate::shared_metrics as metrics; pub type Headers = std::collections::HashSet<(String, Maskable<String>)>; trait ToHttpMethod { fn to_http_method(&self) -> HttpMethod; } impl ToHttpMethod for Method { fn to_http_method(&self) -> HttpMethod {
{ "chunk": null, "crate": "external-services", "enum_name": null, "file_size": null, "for_type": null, "function_name": null, "is_async": null, "is_pub": null, "lines": 15, "method_name": null, "num_enums": null, "num_items": null, "num_structs": null, "repo": "connector-service", "start_line": 75, "struct_name": null, "total_crates": null, "trait_name": null }
connector-service_snippet_-7416499650036175072_75_30
clm
snippet
// connector-service/backend/external-services/src/service.rs }; use once_cell::sync::OnceCell; use reqwest::Client; use serde_json::json; use tracing::field::Empty; use crate::shared_metrics as metrics; pub type Headers = std::collections::HashSet<(String, Maskable<String>)>; trait ToHttpMethod { fn to_http_method(&self) -> HttpMethod; } impl ToHttpMethod for Method { fn to_http_method(&self) -> HttpMethod { match self { Self::Get => HttpMethod::GET, Self::Post => HttpMethod::POST, Self::Put => HttpMethod::PUT, Self::Patch => HttpMethod::PATCH, Self::Delete => HttpMethod::DELETE, } } } #[derive(Debug)] pub struct EventProcessingParams<'a> { pub connector_name: &'a str, pub service_name: &'a str, pub flow_name: FlowName,
{ "chunk": null, "crate": "external-services", "enum_name": null, "file_size": null, "for_type": null, "function_name": null, "is_async": null, "is_pub": null, "lines": 30, "method_name": null, "num_enums": null, "num_items": null, "num_structs": null, "repo": "connector-service", "start_line": 75, "struct_name": null, "total_crates": null, "trait_name": null }
connector-service_snippet_-7416499650036175072_75_50
clm
snippet
// connector-service/backend/external-services/src/service.rs }; use once_cell::sync::OnceCell; use reqwest::Client; use serde_json::json; use tracing::field::Empty; use crate::shared_metrics as metrics; pub type Headers = std::collections::HashSet<(String, Maskable<String>)>; trait ToHttpMethod { fn to_http_method(&self) -> HttpMethod; } impl ToHttpMethod for Method { fn to_http_method(&self) -> HttpMethod { match self { Self::Get => HttpMethod::GET, Self::Post => HttpMethod::POST, Self::Put => HttpMethod::PUT, Self::Patch => HttpMethod::PATCH, Self::Delete => HttpMethod::DELETE, } } } #[derive(Debug)] pub struct EventProcessingParams<'a> { pub connector_name: &'a str, pub service_name: &'a str, pub flow_name: FlowName, pub event_config: &'a EventConfig, pub request_id: &'a str, pub lineage_ids: &'a lineage::LineageIds<'a>, pub reference_id: &'a Option<String>, pub shadow_mode: bool, } #[tracing::instrument( name = "execute_connector_processing_step", skip_all, fields( request.headers = Empty, request.body = Empty, request.url = Empty, request.method = Empty, response.body = Empty, response.headers = Empty, response.error_message = Empty, response.status_code = Empty, message_ = "Golden Log Line (outgoing)",
{ "chunk": null, "crate": "external-services", "enum_name": null, "file_size": null, "for_type": null, "function_name": null, "is_async": null, "is_pub": null, "lines": 50, "method_name": null, "num_enums": null, "num_items": null, "num_structs": null, "repo": "connector-service", "start_line": 75, "struct_name": null, "total_crates": null, "trait_name": null }
connector-service_snippet_-7416499650036175072_100_15
clm
snippet
// connector-service/backend/external-services/src/service.rs #[derive(Debug)] pub struct EventProcessingParams<'a> { pub connector_name: &'a str, pub service_name: &'a str, pub flow_name: FlowName, pub event_config: &'a EventConfig, pub request_id: &'a str, pub lineage_ids: &'a lineage::LineageIds<'a>, pub reference_id: &'a Option<String>, pub shadow_mode: bool, } #[tracing::instrument( name = "execute_connector_processing_step", skip_all,
{ "chunk": null, "crate": "external-services", "enum_name": null, "file_size": null, "for_type": null, "function_name": null, "is_async": null, "is_pub": null, "lines": 15, "method_name": null, "num_enums": null, "num_items": null, "num_structs": null, "repo": "connector-service", "start_line": 100, "struct_name": null, "total_crates": null, "trait_name": null }
connector-service_snippet_-7416499650036175072_100_30
clm
snippet
// connector-service/backend/external-services/src/service.rs #[derive(Debug)] pub struct EventProcessingParams<'a> { pub connector_name: &'a str, pub service_name: &'a str, pub flow_name: FlowName, pub event_config: &'a EventConfig, pub request_id: &'a str, pub lineage_ids: &'a lineage::LineageIds<'a>, pub reference_id: &'a Option<String>, pub shadow_mode: bool, } #[tracing::instrument( name = "execute_connector_processing_step", skip_all, fields( request.headers = Empty, request.body = Empty, request.url = Empty, request.method = Empty, response.body = Empty, response.headers = Empty, response.error_message = Empty, response.status_code = Empty, message_ = "Golden Log Line (outgoing)", latency = Empty, ) )] pub async fn execute_connector_processing_step<T, F, ResourceCommonData, Req, Resp>( proxy: &Proxy,
{ "chunk": null, "crate": "external-services", "enum_name": null, "file_size": null, "for_type": null, "function_name": null, "is_async": null, "is_pub": null, "lines": 30, "method_name": null, "num_enums": null, "num_items": null, "num_structs": null, "repo": "connector-service", "start_line": 100, "struct_name": null, "total_crates": null, "trait_name": null }
connector-service_snippet_-7416499650036175072_100_50
clm
snippet
// connector-service/backend/external-services/src/service.rs #[derive(Debug)] pub struct EventProcessingParams<'a> { pub connector_name: &'a str, pub service_name: &'a str, pub flow_name: FlowName, pub event_config: &'a EventConfig, pub request_id: &'a str, pub lineage_ids: &'a lineage::LineageIds<'a>, pub reference_id: &'a Option<String>, pub shadow_mode: bool, } #[tracing::instrument( name = "execute_connector_processing_step", skip_all, fields( request.headers = Empty, request.body = Empty, request.url = Empty, request.method = Empty, response.body = Empty, response.headers = Empty, response.error_message = Empty, response.status_code = Empty, message_ = "Golden Log Line (outgoing)", latency = Empty, ) )] pub async fn execute_connector_processing_step<T, F, ResourceCommonData, Req, Resp>( proxy: &Proxy, connector: BoxedConnectorIntegrationV2<'static, F, ResourceCommonData, Req, Resp>, router_data: RouterDataV2<F, ResourceCommonData, Req, Resp>, all_keys_required: Option<bool>, event_params: EventProcessingParams<'_>, token_data: Option<TokenData>, call_connector_action: common_enums::CallConnectorAction, ) -> CustomResult<RouterDataV2<F, ResourceCommonData, Req, Resp>, ConnectorError> where F: Clone + 'static, T: FlowIntegrity, Req: Clone + 'static + std::fmt::Debug + GetIntegrityObject<T> + CheckIntegrity<Req, T>, Resp: Clone + 'static + std::fmt::Debug, ResourceCommonData: Clone + 'static + RawConnectorRequestResponse + ConnectorResponseHeaders + ConnectorRequestReference + AdditionalHeaders, { let start = tokio::time::Instant::now();
{ "chunk": null, "crate": "external-services", "enum_name": null, "file_size": null, "for_type": null, "function_name": null, "is_async": null, "is_pub": null, "lines": 50, "method_name": null, "num_enums": null, "num_items": null, "num_structs": null, "repo": "connector-service", "start_line": 100, "struct_name": null, "total_crates": null, "trait_name": null }
connector-service_snippet_-7416499650036175072_125_15
clm
snippet
// connector-service/backend/external-services/src/service.rs latency = Empty, ) )] pub async fn execute_connector_processing_step<T, F, ResourceCommonData, Req, Resp>( proxy: &Proxy, connector: BoxedConnectorIntegrationV2<'static, F, ResourceCommonData, Req, Resp>, router_data: RouterDataV2<F, ResourceCommonData, Req, Resp>, all_keys_required: Option<bool>, event_params: EventProcessingParams<'_>, token_data: Option<TokenData>, call_connector_action: common_enums::CallConnectorAction, ) -> CustomResult<RouterDataV2<F, ResourceCommonData, Req, Resp>, ConnectorError> where F: Clone + 'static, T: FlowIntegrity,
{ "chunk": null, "crate": "external-services", "enum_name": null, "file_size": null, "for_type": null, "function_name": null, "is_async": null, "is_pub": null, "lines": 15, "method_name": null, "num_enums": null, "num_items": null, "num_structs": null, "repo": "connector-service", "start_line": 125, "struct_name": null, "total_crates": null, "trait_name": null }
connector-service_snippet_-7416499650036175072_125_30
clm
snippet
// connector-service/backend/external-services/src/service.rs latency = Empty, ) )] pub async fn execute_connector_processing_step<T, F, ResourceCommonData, Req, Resp>( proxy: &Proxy, connector: BoxedConnectorIntegrationV2<'static, F, ResourceCommonData, Req, Resp>, router_data: RouterDataV2<F, ResourceCommonData, Req, Resp>, all_keys_required: Option<bool>, event_params: EventProcessingParams<'_>, token_data: Option<TokenData>, call_connector_action: common_enums::CallConnectorAction, ) -> CustomResult<RouterDataV2<F, ResourceCommonData, Req, Resp>, ConnectorError> where F: Clone + 'static, T: FlowIntegrity, Req: Clone + 'static + std::fmt::Debug + GetIntegrityObject<T> + CheckIntegrity<Req, T>, Resp: Clone + 'static + std::fmt::Debug, ResourceCommonData: Clone + 'static + RawConnectorRequestResponse + ConnectorResponseHeaders + ConnectorRequestReference + AdditionalHeaders, { let start = tokio::time::Instant::now(); let result = match call_connector_action { common_enums::CallConnectorAction::HandleResponse(res) => { let body = Response { headers: None, response: res.into(),
{ "chunk": null, "crate": "external-services", "enum_name": null, "file_size": null, "for_type": null, "function_name": null, "is_async": null, "is_pub": null, "lines": 30, "method_name": null, "num_enums": null, "num_items": null, "num_structs": null, "repo": "connector-service", "start_line": 125, "struct_name": null, "total_crates": null, "trait_name": null }
connector-service_snippet_-7416499650036175072_125_50
clm
snippet
// connector-service/backend/external-services/src/service.rs latency = Empty, ) )] pub async fn execute_connector_processing_step<T, F, ResourceCommonData, Req, Resp>( proxy: &Proxy, connector: BoxedConnectorIntegrationV2<'static, F, ResourceCommonData, Req, Resp>, router_data: RouterDataV2<F, ResourceCommonData, Req, Resp>, all_keys_required: Option<bool>, event_params: EventProcessingParams<'_>, token_data: Option<TokenData>, call_connector_action: common_enums::CallConnectorAction, ) -> CustomResult<RouterDataV2<F, ResourceCommonData, Req, Resp>, ConnectorError> where F: Clone + 'static, T: FlowIntegrity, Req: Clone + 'static + std::fmt::Debug + GetIntegrityObject<T> + CheckIntegrity<Req, T>, Resp: Clone + 'static + std::fmt::Debug, ResourceCommonData: Clone + 'static + RawConnectorRequestResponse + ConnectorResponseHeaders + ConnectorRequestReference + AdditionalHeaders, { let start = tokio::time::Instant::now(); let result = match call_connector_action { common_enums::CallConnectorAction::HandleResponse(res) => { let body = Response { headers: None, response: res.into(), status_code: 200, }; let status_code = body.status_code; tracing::Span::current().record("status_code", tracing::field::display(status_code)); if let Ok(response) = parse_json_with_bom_handling(&body.response) { tracing::Span::current().record( "response.body", tracing::field::display(response.masked_serialize().unwrap_or( json!({ "error": "failed to mask serialize connector response"}), )), ); } // Set raw_connector_response BEFORE calling the transformer let mut updated_router_data = router_data.clone(); if all_keys_required.unwrap_or(true) { let raw_response_string = strip_bom_and_convert_to_string(&body.response); updated_router_data .resource_common_data
{ "chunk": null, "crate": "external-services", "enum_name": null, "file_size": null, "for_type": null, "function_name": null, "is_async": null, "is_pub": null, "lines": 50, "method_name": null, "num_enums": null, "num_items": null, "num_structs": null, "repo": "connector-service", "start_line": 125, "struct_name": null, "total_crates": null, "trait_name": null }
connector-service_snippet_-7416499650036175072_150_15
clm
snippet
// connector-service/backend/external-services/src/service.rs let result = match call_connector_action { common_enums::CallConnectorAction::HandleResponse(res) => { let body = Response { headers: None, response: res.into(), status_code: 200, }; let status_code = body.status_code; tracing::Span::current().record("status_code", tracing::field::display(status_code)); if let Ok(response) = parse_json_with_bom_handling(&body.response) { tracing::Span::current().record( "response.body", tracing::field::display(response.masked_serialize().unwrap_or( json!({ "error": "failed to mask serialize connector response"}),
{ "chunk": null, "crate": "external-services", "enum_name": null, "file_size": null, "for_type": null, "function_name": null, "is_async": null, "is_pub": null, "lines": 15, "method_name": null, "num_enums": null, "num_items": null, "num_structs": null, "repo": "connector-service", "start_line": 150, "struct_name": null, "total_crates": null, "trait_name": null }
connector-service_snippet_-7416499650036175072_150_30
clm
snippet
// connector-service/backend/external-services/src/service.rs let result = match call_connector_action { common_enums::CallConnectorAction::HandleResponse(res) => { let body = Response { headers: None, response: res.into(), status_code: 200, }; let status_code = body.status_code; tracing::Span::current().record("status_code", tracing::field::display(status_code)); if let Ok(response) = parse_json_with_bom_handling(&body.response) { tracing::Span::current().record( "response.body", tracing::field::display(response.masked_serialize().unwrap_or( json!({ "error": "failed to mask serialize connector response"}), )), ); } // Set raw_connector_response BEFORE calling the transformer let mut updated_router_data = router_data.clone(); if all_keys_required.unwrap_or(true) { let raw_response_string = strip_bom_and_convert_to_string(&body.response); updated_router_data .resource_common_data .set_raw_connector_response(raw_response_string.map(Into::into)); } let handle_response_result = connector.handle_response_v2(&updated_router_data, None, body.clone());
{ "chunk": null, "crate": "external-services", "enum_name": null, "file_size": null, "for_type": null, "function_name": null, "is_async": null, "is_pub": null, "lines": 30, "method_name": null, "num_enums": null, "num_items": null, "num_structs": null, "repo": "connector-service", "start_line": 150, "struct_name": null, "total_crates": null, "trait_name": null }
connector-service_snippet_-7416499650036175072_150_50
clm
snippet
// connector-service/backend/external-services/src/service.rs let result = match call_connector_action { common_enums::CallConnectorAction::HandleResponse(res) => { let body = Response { headers: None, response: res.into(), status_code: 200, }; let status_code = body.status_code; tracing::Span::current().record("status_code", tracing::field::display(status_code)); if let Ok(response) = parse_json_with_bom_handling(&body.response) { tracing::Span::current().record( "response.body", tracing::field::display(response.masked_serialize().unwrap_or( json!({ "error": "failed to mask serialize connector response"}), )), ); } // Set raw_connector_response BEFORE calling the transformer let mut updated_router_data = router_data.clone(); if all_keys_required.unwrap_or(true) { let raw_response_string = strip_bom_and_convert_to_string(&body.response); updated_router_data .resource_common_data .set_raw_connector_response(raw_response_string.map(Into::into)); } let handle_response_result = connector.handle_response_v2(&updated_router_data, None, body.clone()); let response = match handle_response_result { Ok(data) => { tracing::info!("Transformer completed successfully"); Ok(data) } Err(err) => Err(err), }?; Ok(response) } common_enums::CallConnectorAction::Trigger => { let mut connector_request = connector.build_request_v2(&router_data.clone())?; let mut updated_router_data = router_data.clone(); updated_router_data = match &connector_request { Some(request) => { updated_router_data .resource_common_data .set_raw_connector_request(Some(
{ "chunk": null, "crate": "external-services", "enum_name": null, "file_size": null, "for_type": null, "function_name": null, "is_async": null, "is_pub": null, "lines": 50, "method_name": null, "num_enums": null, "num_items": null, "num_structs": null, "repo": "connector-service", "start_line": 150, "struct_name": null, "total_crates": null, "trait_name": null }
connector-service_snippet_-7416499650036175072_175_15
clm
snippet
// connector-service/backend/external-services/src/service.rs .set_raw_connector_response(raw_response_string.map(Into::into)); } let handle_response_result = connector.handle_response_v2(&updated_router_data, None, body.clone()); let response = match handle_response_result { Ok(data) => { tracing::info!("Transformer completed successfully"); Ok(data) } Err(err) => Err(err), }?; Ok(response)
{ "chunk": null, "crate": "external-services", "enum_name": null, "file_size": null, "for_type": null, "function_name": null, "is_async": null, "is_pub": null, "lines": 15, "method_name": null, "num_enums": null, "num_items": null, "num_structs": null, "repo": "connector-service", "start_line": 175, "struct_name": null, "total_crates": null, "trait_name": null }
connector-service_snippet_-7416499650036175072_175_30
clm
snippet
// connector-service/backend/external-services/src/service.rs .set_raw_connector_response(raw_response_string.map(Into::into)); } let handle_response_result = connector.handle_response_v2(&updated_router_data, None, body.clone()); let response = match handle_response_result { Ok(data) => { tracing::info!("Transformer completed successfully"); Ok(data) } Err(err) => Err(err), }?; Ok(response) } common_enums::CallConnectorAction::Trigger => { let mut connector_request = connector.build_request_v2(&router_data.clone())?; let mut updated_router_data = router_data.clone(); updated_router_data = match &connector_request { Some(request) => { updated_router_data .resource_common_data .set_raw_connector_request(Some( extract_raw_connector_request(request).into(), )); updated_router_data } None => updated_router_data,
{ "chunk": null, "crate": "external-services", "enum_name": null, "file_size": null, "for_type": null, "function_name": null, "is_async": null, "is_pub": null, "lines": 30, "method_name": null, "num_enums": null, "num_items": null, "num_structs": null, "repo": "connector-service", "start_line": 175, "struct_name": null, "total_crates": null, "trait_name": null }
connector-service_snippet_-7416499650036175072_175_50
clm
snippet
// connector-service/backend/external-services/src/service.rs .set_raw_connector_response(raw_response_string.map(Into::into)); } let handle_response_result = connector.handle_response_v2(&updated_router_data, None, body.clone()); let response = match handle_response_result { Ok(data) => { tracing::info!("Transformer completed successfully"); Ok(data) } Err(err) => Err(err), }?; Ok(response) } common_enums::CallConnectorAction::Trigger => { let mut connector_request = connector.build_request_v2(&router_data.clone())?; let mut updated_router_data = router_data.clone(); updated_router_data = match &connector_request { Some(request) => { updated_router_data .resource_common_data .set_raw_connector_request(Some( extract_raw_connector_request(request).into(), )); updated_router_data } None => updated_router_data, }; connector_request = connector_request.map(|mut req| { if event_params.shadow_mode { req.add_header( consts::X_REQUEST_ID, Maskable::Masked(Secret::new(event_params.request_id.to_string())), ); req.add_header( consts::X_SOURCE_NAME, Maskable::Masked(Secret::new(consts::X_CONNECTOR_SERVICE.to_string())), ); req.add_header( consts::X_FLOW_NAME, Maskable::Masked(Secret::new(event_params.flow_name.to_string())), ); req.add_header( consts::X_CONNECTOR_NAME, Maskable::Masked(Secret::new(event_params.connector_name.to_string())), );
{ "chunk": null, "crate": "external-services", "enum_name": null, "file_size": null, "for_type": null, "function_name": null, "is_async": null, "is_pub": null, "lines": 50, "method_name": null, "num_enums": null, "num_items": null, "num_structs": null, "repo": "connector-service", "start_line": 175, "struct_name": null, "total_crates": null, "trait_name": null }
connector-service_snippet_-7416499650036175072_200_15
clm
snippet
// connector-service/backend/external-services/src/service.rs extract_raw_connector_request(request).into(), )); updated_router_data } None => updated_router_data, }; connector_request = connector_request.map(|mut req| { if event_params.shadow_mode { req.add_header( consts::X_REQUEST_ID, Maskable::Masked(Secret::new(event_params.request_id.to_string())), ); req.add_header( consts::X_SOURCE_NAME, Maskable::Masked(Secret::new(consts::X_CONNECTOR_SERVICE.to_string())),
{ "chunk": null, "crate": "external-services", "enum_name": null, "file_size": null, "for_type": null, "function_name": null, "is_async": null, "is_pub": null, "lines": 15, "method_name": null, "num_enums": null, "num_items": null, "num_structs": null, "repo": "connector-service", "start_line": 200, "struct_name": null, "total_crates": null, "trait_name": null }
connector-service_snippet_-7416499650036175072_200_30
clm
snippet
// connector-service/backend/external-services/src/service.rs extract_raw_connector_request(request).into(), )); updated_router_data } None => updated_router_data, }; connector_request = connector_request.map(|mut req| { if event_params.shadow_mode { req.add_header( consts::X_REQUEST_ID, Maskable::Masked(Secret::new(event_params.request_id.to_string())), ); req.add_header( consts::X_SOURCE_NAME, Maskable::Masked(Secret::new(consts::X_CONNECTOR_SERVICE.to_string())), ); req.add_header( consts::X_FLOW_NAME, Maskable::Masked(Secret::new(event_params.flow_name.to_string())), ); req.add_header( consts::X_CONNECTOR_NAME, Maskable::Masked(Secret::new(event_params.connector_name.to_string())), ); } req }); let headers = connector_request .as_ref()
{ "chunk": null, "crate": "external-services", "enum_name": null, "file_size": null, "for_type": null, "function_name": null, "is_async": null, "is_pub": null, "lines": 30, "method_name": null, "num_enums": null, "num_items": null, "num_structs": null, "repo": "connector-service", "start_line": 200, "struct_name": null, "total_crates": null, "trait_name": null }
connector-service_snippet_-7416499650036175072_200_50
clm
snippet
// connector-service/backend/external-services/src/service.rs extract_raw_connector_request(request).into(), )); updated_router_data } None => updated_router_data, }; connector_request = connector_request.map(|mut req| { if event_params.shadow_mode { req.add_header( consts::X_REQUEST_ID, Maskable::Masked(Secret::new(event_params.request_id.to_string())), ); req.add_header( consts::X_SOURCE_NAME, Maskable::Masked(Secret::new(consts::X_CONNECTOR_SERVICE.to_string())), ); req.add_header( consts::X_FLOW_NAME, Maskable::Masked(Secret::new(event_params.flow_name.to_string())), ); req.add_header( consts::X_CONNECTOR_NAME, Maskable::Masked(Secret::new(event_params.connector_name.to_string())), ); } req }); let headers = connector_request .as_ref() .map(|connector_request| connector_request.headers.clone()) .unwrap_or_default(); tracing::info!(?headers, "headers of connector request"); let event_headers: HashMap<String, String> = headers .iter() .map(|(k, v)| (k.clone(), format!("{v:?}"))) .collect(); let masked_headers = headers .iter() .fold(serde_json::Map::new(), |mut acc, (k, v)| { let value = match v { Maskable::Masked(_) => { serde_json::Value::String("*** alloc::string::String ***".to_string()) } Maskable::Normal(iv) => serde_json::Value::String(iv.to_owned()), }; acc.insert(k.clone(), value); acc
{ "chunk": null, "crate": "external-services", "enum_name": null, "file_size": null, "for_type": null, "function_name": null, "is_async": null, "is_pub": null, "lines": 50, "method_name": null, "num_enums": null, "num_items": null, "num_structs": null, "repo": "connector-service", "start_line": 200, "struct_name": null, "total_crates": null, "trait_name": null }
connector-service_snippet_-7416499650036175072_225_15
clm
snippet
// connector-service/backend/external-services/src/service.rs } req }); let headers = connector_request .as_ref() .map(|connector_request| connector_request.headers.clone()) .unwrap_or_default(); tracing::info!(?headers, "headers of connector request"); let event_headers: HashMap<String, String> = headers .iter() .map(|(k, v)| (k.clone(), format!("{v:?}"))) .collect(); let masked_headers = headers
{ "chunk": null, "crate": "external-services", "enum_name": null, "file_size": null, "for_type": null, "function_name": null, "is_async": null, "is_pub": null, "lines": 15, "method_name": null, "num_enums": null, "num_items": null, "num_structs": null, "repo": "connector-service", "start_line": 225, "struct_name": null, "total_crates": null, "trait_name": null }
connector-service_snippet_-7416499650036175072_225_30
clm
snippet
// connector-service/backend/external-services/src/service.rs } req }); let headers = connector_request .as_ref() .map(|connector_request| connector_request.headers.clone()) .unwrap_or_default(); tracing::info!(?headers, "headers of connector request"); let event_headers: HashMap<String, String> = headers .iter() .map(|(k, v)| (k.clone(), format!("{v:?}"))) .collect(); let masked_headers = headers .iter() .fold(serde_json::Map::new(), |mut acc, (k, v)| { let value = match v { Maskable::Masked(_) => { serde_json::Value::String("*** alloc::string::String ***".to_string()) } Maskable::Normal(iv) => serde_json::Value::String(iv.to_owned()), }; acc.insert(k.clone(), value); acc }); let headers = serde_json::Value::Object(masked_headers); tracing::Span::current().record("request.headers", tracing::field::display(&headers)); let req = connector_request.as_ref().map(|connector_request| {
{ "chunk": null, "crate": "external-services", "enum_name": null, "file_size": null, "for_type": null, "function_name": null, "is_async": null, "is_pub": null, "lines": 30, "method_name": null, "num_enums": null, "num_items": null, "num_structs": null, "repo": "connector-service", "start_line": 225, "struct_name": null, "total_crates": null, "trait_name": null }
connector-service_snippet_-7416499650036175072_225_50
clm
snippet
// connector-service/backend/external-services/src/service.rs } req }); let headers = connector_request .as_ref() .map(|connector_request| connector_request.headers.clone()) .unwrap_or_default(); tracing::info!(?headers, "headers of connector request"); let event_headers: HashMap<String, String> = headers .iter() .map(|(k, v)| (k.clone(), format!("{v:?}"))) .collect(); let masked_headers = headers .iter() .fold(serde_json::Map::new(), |mut acc, (k, v)| { let value = match v { Maskable::Masked(_) => { serde_json::Value::String("*** alloc::string::String ***".to_string()) } Maskable::Normal(iv) => serde_json::Value::String(iv.to_owned()), }; acc.insert(k.clone(), value); acc }); let headers = serde_json::Value::Object(masked_headers); tracing::Span::current().record("request.headers", tracing::field::display(&headers)); let req = connector_request.as_ref().map(|connector_request| { let masked_request = match connector_request.body.as_ref() { Some(request) => match request { RequestContent::Json(i) | RequestContent::FormUrlEncoded(i) | RequestContent::Xml(i) => (**i).masked_serialize().unwrap_or( json!({ "error": "failed to mask serialize connector request"}), ), RequestContent::FormData(_) => json!({"request_type": "FORM_DATA"}), RequestContent::RawBytes(_) => json!({"request_type": "RAW_BYTES"}), }, None => serde_json::Value::Null, }; tracing::info!(request=?masked_request, "request of connector"); tracing::Span::current() .record("request.body", tracing::field::display(&masked_request)); masked_request }); match connector_request {
{ "chunk": null, "crate": "external-services", "enum_name": null, "file_size": null, "for_type": null, "function_name": null, "is_async": null, "is_pub": null, "lines": 50, "method_name": null, "num_enums": null, "num_items": null, "num_structs": null, "repo": "connector-service", "start_line": 225, "struct_name": null, "total_crates": null, "trait_name": null }
connector-service_snippet_-7416499650036175072_250_15
clm
snippet
// connector-service/backend/external-services/src/service.rs }); let headers = serde_json::Value::Object(masked_headers); tracing::Span::current().record("request.headers", tracing::field::display(&headers)); let req = connector_request.as_ref().map(|connector_request| { let masked_request = match connector_request.body.as_ref() { Some(request) => match request { RequestContent::Json(i) | RequestContent::FormUrlEncoded(i) | RequestContent::Xml(i) => (**i).masked_serialize().unwrap_or( json!({ "error": "failed to mask serialize connector request"}), ), RequestContent::FormData(_) => json!({"request_type": "FORM_DATA"}), RequestContent::RawBytes(_) => json!({"request_type": "RAW_BYTES"}), },
{ "chunk": null, "crate": "external-services", "enum_name": null, "file_size": null, "for_type": null, "function_name": null, "is_async": null, "is_pub": null, "lines": 15, "method_name": null, "num_enums": null, "num_items": null, "num_structs": null, "repo": "connector-service", "start_line": 250, "struct_name": null, "total_crates": null, "trait_name": null }
connector-service_snippet_-7416499650036175072_250_30
clm
snippet
// connector-service/backend/external-services/src/service.rs }); let headers = serde_json::Value::Object(masked_headers); tracing::Span::current().record("request.headers", tracing::field::display(&headers)); let req = connector_request.as_ref().map(|connector_request| { let masked_request = match connector_request.body.as_ref() { Some(request) => match request { RequestContent::Json(i) | RequestContent::FormUrlEncoded(i) | RequestContent::Xml(i) => (**i).masked_serialize().unwrap_or( json!({ "error": "failed to mask serialize connector request"}), ), RequestContent::FormData(_) => json!({"request_type": "FORM_DATA"}), RequestContent::RawBytes(_) => json!({"request_type": "RAW_BYTES"}), }, None => serde_json::Value::Null, }; tracing::info!(request=?masked_request, "request of connector"); tracing::Span::current() .record("request.body", tracing::field::display(&masked_request)); masked_request }); match connector_request { Some(request) => { let url = request.url.clone(); let method = request.method; metrics::EXTERNAL_SERVICE_TOTAL_API_CALLS .with_label_values(&[
{ "chunk": null, "crate": "external-services", "enum_name": null, "file_size": null, "for_type": null, "function_name": null, "is_async": null, "is_pub": null, "lines": 30, "method_name": null, "num_enums": null, "num_items": null, "num_structs": null, "repo": "connector-service", "start_line": 250, "struct_name": null, "total_crates": null, "trait_name": null }
connector-service_snippet_-7416499650036175072_250_50
clm
snippet
// connector-service/backend/external-services/src/service.rs }); let headers = serde_json::Value::Object(masked_headers); tracing::Span::current().record("request.headers", tracing::field::display(&headers)); let req = connector_request.as_ref().map(|connector_request| { let masked_request = match connector_request.body.as_ref() { Some(request) => match request { RequestContent::Json(i) | RequestContent::FormUrlEncoded(i) | RequestContent::Xml(i) => (**i).masked_serialize().unwrap_or( json!({ "error": "failed to mask serialize connector request"}), ), RequestContent::FormData(_) => json!({"request_type": "FORM_DATA"}), RequestContent::RawBytes(_) => json!({"request_type": "RAW_BYTES"}), }, None => serde_json::Value::Null, }; tracing::info!(request=?masked_request, "request of connector"); tracing::Span::current() .record("request.body", tracing::field::display(&masked_request)); masked_request }); match connector_request { Some(request) => { let url = request.url.clone(); let method = request.method; metrics::EXTERNAL_SERVICE_TOTAL_API_CALLS .with_label_values(&[ &method.to_string(), event_params.service_name, event_params.connector_name, ]) .inc(); let external_service_start_latency = tokio::time::Instant::now(); tracing::Span::current().record("request.url", tracing::field::display(&url)); tracing::Span::current() .record("request.method", tracing::field::display(method)); let request_id = event_params.request_id.to_string(); let response = if let Some(token_data) = token_data { tracing::debug!( "Creating injector request with token data using unified API" ); // Extract template and combine headers let template = request .body .as_ref()
{ "chunk": null, "crate": "external-services", "enum_name": null, "file_size": null, "for_type": null, "function_name": null, "is_async": null, "is_pub": null, "lines": 50, "method_name": null, "num_enums": null, "num_items": null, "num_structs": null, "repo": "connector-service", "start_line": 250, "struct_name": null, "total_crates": null, "trait_name": null }
connector-service_snippet_-7416499650036175072_275_15
clm
snippet
// connector-service/backend/external-services/src/service.rs Some(request) => { let url = request.url.clone(); let method = request.method; metrics::EXTERNAL_SERVICE_TOTAL_API_CALLS .with_label_values(&[ &method.to_string(), event_params.service_name, event_params.connector_name, ]) .inc(); let external_service_start_latency = tokio::time::Instant::now(); tracing::Span::current().record("request.url", tracing::field::display(&url)); tracing::Span::current() .record("request.method", tracing::field::display(method)); let request_id = event_params.request_id.to_string();
{ "chunk": null, "crate": "external-services", "enum_name": null, "file_size": null, "for_type": null, "function_name": null, "is_async": null, "is_pub": null, "lines": 15, "method_name": null, "num_enums": null, "num_items": null, "num_structs": null, "repo": "connector-service", "start_line": 275, "struct_name": null, "total_crates": null, "trait_name": null }
connector-service_snippet_-7416499650036175072_275_30
clm
snippet
// connector-service/backend/external-services/src/service.rs Some(request) => { let url = request.url.clone(); let method = request.method; metrics::EXTERNAL_SERVICE_TOTAL_API_CALLS .with_label_values(&[ &method.to_string(), event_params.service_name, event_params.connector_name, ]) .inc(); let external_service_start_latency = tokio::time::Instant::now(); tracing::Span::current().record("request.url", tracing::field::display(&url)); tracing::Span::current() .record("request.method", tracing::field::display(method)); let request_id = event_params.request_id.to_string(); let response = if let Some(token_data) = token_data { tracing::debug!( "Creating injector request with token data using unified API" ); // Extract template and combine headers let template = request .body .as_ref() .ok_or(ConnectorError::RequestEncodingFailed)? .get_inner_value() .expose() .to_string();
{ "chunk": null, "crate": "external-services", "enum_name": null, "file_size": null, "for_type": null, "function_name": null, "is_async": null, "is_pub": null, "lines": 30, "method_name": null, "num_enums": null, "num_items": null, "num_structs": null, "repo": "connector-service", "start_line": 275, "struct_name": null, "total_crates": null, "trait_name": null }
connector-service_snippet_-7416499650036175072_275_50
clm
snippet
// connector-service/backend/external-services/src/service.rs Some(request) => { let url = request.url.clone(); let method = request.method; metrics::EXTERNAL_SERVICE_TOTAL_API_CALLS .with_label_values(&[ &method.to_string(), event_params.service_name, event_params.connector_name, ]) .inc(); let external_service_start_latency = tokio::time::Instant::now(); tracing::Span::current().record("request.url", tracing::field::display(&url)); tracing::Span::current() .record("request.method", tracing::field::display(method)); let request_id = event_params.request_id.to_string(); let response = if let Some(token_data) = token_data { tracing::debug!( "Creating injector request with token data using unified API" ); // Extract template and combine headers let template = request .body .as_ref() .ok_or(ConnectorError::RequestEncodingFailed)? .get_inner_value() .expose() .to_string(); let headers = request .headers .iter() .map(|(key, value)| { ( key.clone(), Secret::new(match value { Maskable::Normal(val) => val.clone(), Maskable::Masked(val) => val.clone().expose().to_string(), }), ) }) .chain( updated_router_data .resource_common_data .get_vault_headers() .map(|headers| { headers.iter().map(|(k, v)| (k.clone(), v.clone())) }) .into_iter()
{ "chunk": null, "crate": "external-services", "enum_name": null, "file_size": null, "for_type": null, "function_name": null, "is_async": null, "is_pub": null, "lines": 50, "method_name": null, "num_enums": null, "num_items": null, "num_structs": null, "repo": "connector-service", "start_line": 275, "struct_name": null, "total_crates": null, "trait_name": null }
connector-service_snippet_-7416499650036175072_300_15
clm
snippet
// connector-service/backend/external-services/src/service.rs .ok_or(ConnectorError::RequestEncodingFailed)? .get_inner_value() .expose() .to_string(); let headers = request .headers .iter() .map(|(key, value)| { ( key.clone(), Secret::new(match value { Maskable::Normal(val) => val.clone(), Maskable::Masked(val) => val.clone().expose().to_string(), }),
{ "chunk": null, "crate": "external-services", "enum_name": null, "file_size": null, "for_type": null, "function_name": null, "is_async": null, "is_pub": null, "lines": 15, "method_name": null, "num_enums": null, "num_items": null, "num_structs": null, "repo": "connector-service", "start_line": 300, "struct_name": null, "total_crates": null, "trait_name": null }
connector-service_snippet_-7416499650036175072_300_30
clm
snippet
// connector-service/backend/external-services/src/service.rs .ok_or(ConnectorError::RequestEncodingFailed)? .get_inner_value() .expose() .to_string(); let headers = request .headers .iter() .map(|(key, value)| { ( key.clone(), Secret::new(match value { Maskable::Normal(val) => val.clone(), Maskable::Masked(val) => val.clone().expose().to_string(), }), ) }) .chain( updated_router_data .resource_common_data .get_vault_headers() .map(|headers| { headers.iter().map(|(k, v)| (k.clone(), v.clone())) }) .into_iter() .flatten(), ) .collect(); // Create injector request
{ "chunk": null, "crate": "external-services", "enum_name": null, "file_size": null, "for_type": null, "function_name": null, "is_async": null, "is_pub": null, "lines": 30, "method_name": null, "num_enums": null, "num_items": null, "num_structs": null, "repo": "connector-service", "start_line": 300, "struct_name": null, "total_crates": null, "trait_name": null }
connector-service_snippet_-7416499650036175072_300_50
clm
snippet
// connector-service/backend/external-services/src/service.rs .ok_or(ConnectorError::RequestEncodingFailed)? .get_inner_value() .expose() .to_string(); let headers = request .headers .iter() .map(|(key, value)| { ( key.clone(), Secret::new(match value { Maskable::Normal(val) => val.clone(), Maskable::Masked(val) => val.clone().expose().to_string(), }), ) }) .chain( updated_router_data .resource_common_data .get_vault_headers() .map(|headers| { headers.iter().map(|(k, v)| (k.clone(), v.clone())) }) .into_iter() .flatten(), ) .collect(); // Create injector request let injector_request = injector::InjectorRequest::new( request.url.clone(), request.method.to_http_method(), template, token_data, Some(headers), proxy .https_url .as_ref() .or(proxy.http_url.as_ref()) .map(|url| Secret::new(url.clone())), None, None, None, ); // New injector handles HTTP request internally and returns enhanced response let injector_response = injector_core(injector_request) .await .change_context(ConnectorError::RequestEncodingFailed)?;
{ "chunk": null, "crate": "external-services", "enum_name": null, "file_size": null, "for_type": null, "function_name": null, "is_async": null, "is_pub": null, "lines": 50, "method_name": null, "num_enums": null, "num_items": null, "num_structs": null, "repo": "connector-service", "start_line": 300, "struct_name": null, "total_crates": null, "trait_name": null }
connector-service_snippet_-7416499650036175072_325_15
clm
snippet
// connector-service/backend/external-services/src/service.rs .flatten(), ) .collect(); // Create injector request let injector_request = injector::InjectorRequest::new( request.url.clone(), request.method.to_http_method(), template, token_data, Some(headers), proxy .https_url .as_ref() .or(proxy.http_url.as_ref())
{ "chunk": null, "crate": "external-services", "enum_name": null, "file_size": null, "for_type": null, "function_name": null, "is_async": null, "is_pub": null, "lines": 15, "method_name": null, "num_enums": null, "num_items": null, "num_structs": null, "repo": "connector-service", "start_line": 325, "struct_name": null, "total_crates": null, "trait_name": null }
connector-service_snippet_-7416499650036175072_325_30
clm
snippet
// connector-service/backend/external-services/src/service.rs .flatten(), ) .collect(); // Create injector request let injector_request = injector::InjectorRequest::new( request.url.clone(), request.method.to_http_method(), template, token_data, Some(headers), proxy .https_url .as_ref() .or(proxy.http_url.as_ref()) .map(|url| Secret::new(url.clone())), None, None, None, ); // New injector handles HTTP request internally and returns enhanced response let injector_response = injector_core(injector_request) .await .change_context(ConnectorError::RequestEncodingFailed)?; // Convert injector response to connector service Response format let response_bytes = serde_json::to_vec(&injector_response.response) .map_err(|_| ConnectorError::ResponseHandlingFailed)?;
{ "chunk": null, "crate": "external-services", "enum_name": null, "file_size": null, "for_type": null, "function_name": null, "is_async": null, "is_pub": null, "lines": 30, "method_name": null, "num_enums": null, "num_items": null, "num_structs": null, "repo": "connector-service", "start_line": 325, "struct_name": null, "total_crates": null, "trait_name": null }
connector-service_snippet_-7416499650036175072_325_50
clm
snippet
// connector-service/backend/external-services/src/service.rs .flatten(), ) .collect(); // Create injector request let injector_request = injector::InjectorRequest::new( request.url.clone(), request.method.to_http_method(), template, token_data, Some(headers), proxy .https_url .as_ref() .or(proxy.http_url.as_ref()) .map(|url| Secret::new(url.clone())), None, None, None, ); // New injector handles HTTP request internally and returns enhanced response let injector_response = injector_core(injector_request) .await .change_context(ConnectorError::RequestEncodingFailed)?; // Convert injector response to connector service Response format let response_bytes = serde_json::to_vec(&injector_response.response) .map_err(|_| ConnectorError::ResponseHandlingFailed)?; // Convert headers from HashMap<String, String> to reqwest::HeaderMap if present let headers = injector_response.headers.map(|h| { let mut header_map = reqwest::header::HeaderMap::new(); for (key, value) in h { if let (Ok(header_name), Ok(header_value)) = ( reqwest::header::HeaderName::from_bytes(key.as_bytes()), reqwest::header::HeaderValue::from_str(&value), ) { header_map.insert(header_name, header_value); } } header_map }); Ok(Ok(Response { headers, response: response_bytes.into(), status_code: injector_response.status_code, // Use actual status code from connector })) } else {
{ "chunk": null, "crate": "external-services", "enum_name": null, "file_size": null, "for_type": null, "function_name": null, "is_async": null, "is_pub": null, "lines": 50, "method_name": null, "num_enums": null, "num_items": null, "num_structs": null, "repo": "connector-service", "start_line": 325, "struct_name": null, "total_crates": null, "trait_name": null }
connector-service_snippet_-7416499650036175072_350_15
clm
snippet
// connector-service/backend/external-services/src/service.rs // Convert injector response to connector service Response format let response_bytes = serde_json::to_vec(&injector_response.response) .map_err(|_| ConnectorError::ResponseHandlingFailed)?; // Convert headers from HashMap<String, String> to reqwest::HeaderMap if present let headers = injector_response.headers.map(|h| { let mut header_map = reqwest::header::HeaderMap::new(); for (key, value) in h { if let (Ok(header_name), Ok(header_value)) = ( reqwest::header::HeaderName::from_bytes(key.as_bytes()), reqwest::header::HeaderValue::from_str(&value), ) { header_map.insert(header_name, header_value); }
{ "chunk": null, "crate": "external-services", "enum_name": null, "file_size": null, "for_type": null, "function_name": null, "is_async": null, "is_pub": null, "lines": 15, "method_name": null, "num_enums": null, "num_items": null, "num_structs": null, "repo": "connector-service", "start_line": 350, "struct_name": null, "total_crates": null, "trait_name": null }
connector-service_snippet_-7416499650036175072_350_30
clm
snippet
// connector-service/backend/external-services/src/service.rs // Convert injector response to connector service Response format let response_bytes = serde_json::to_vec(&injector_response.response) .map_err(|_| ConnectorError::ResponseHandlingFailed)?; // Convert headers from HashMap<String, String> to reqwest::HeaderMap if present let headers = injector_response.headers.map(|h| { let mut header_map = reqwest::header::HeaderMap::new(); for (key, value) in h { if let (Ok(header_name), Ok(header_value)) = ( reqwest::header::HeaderName::from_bytes(key.as_bytes()), reqwest::header::HeaderValue::from_str(&value), ) { header_map.insert(header_name, header_value); } } header_map }); Ok(Ok(Response { headers, response: response_bytes.into(), status_code: injector_response.status_code, // Use actual status code from connector })) } else { call_connector_api(proxy, request, "execute_connector_processing_step") .await .change_context(ConnectorError::RequestEncodingFailed) .inspect_err(|err| { info_log(
{ "chunk": null, "crate": "external-services", "enum_name": null, "file_size": null, "for_type": null, "function_name": null, "is_async": null, "is_pub": null, "lines": 30, "method_name": null, "num_enums": null, "num_items": null, "num_structs": null, "repo": "connector-service", "start_line": 350, "struct_name": null, "total_crates": null, "trait_name": null }
connector-service_snippet_-7416499650036175072_350_50
clm
snippet
// connector-service/backend/external-services/src/service.rs // Convert injector response to connector service Response format let response_bytes = serde_json::to_vec(&injector_response.response) .map_err(|_| ConnectorError::ResponseHandlingFailed)?; // Convert headers from HashMap<String, String> to reqwest::HeaderMap if present let headers = injector_response.headers.map(|h| { let mut header_map = reqwest::header::HeaderMap::new(); for (key, value) in h { if let (Ok(header_name), Ok(header_value)) = ( reqwest::header::HeaderName::from_bytes(key.as_bytes()), reqwest::header::HeaderValue::from_str(&value), ) { header_map.insert(header_name, header_value); } } header_map }); Ok(Ok(Response { headers, response: response_bytes.into(), status_code: injector_response.status_code, // Use actual status code from connector })) } else { call_connector_api(proxy, request, "execute_connector_processing_step") .await .change_context(ConnectorError::RequestEncodingFailed) .inspect_err(|err| { info_log( "NETWORK_ERROR", &json!(format!( "Failed getting response from connector. Error: {:?}", err )), ); }) }; let external_service_elapsed = external_service_start_latency.elapsed(); metrics::EXTERNAL_SERVICE_API_CALLS_LATENCY .with_label_values(&[ &method.to_string(), event_params.service_name, event_params.connector_name, ]) .observe(external_service_elapsed.as_secs_f64()); tracing::info!(?response, "response from connector"); // Extract status code BEFORE creating event - one liner let status_code = response.as_ref().ok().map(|result| match result {
{ "chunk": null, "crate": "external-services", "enum_name": null, "file_size": null, "for_type": null, "function_name": null, "is_async": null, "is_pub": null, "lines": 50, "method_name": null, "num_enums": null, "num_items": null, "num_structs": null, "repo": "connector-service", "start_line": 350, "struct_name": null, "total_crates": null, "trait_name": null }
connector-service_snippet_-7416499650036175072_375_15
clm
snippet
// connector-service/backend/external-services/src/service.rs call_connector_api(proxy, request, "execute_connector_processing_step") .await .change_context(ConnectorError::RequestEncodingFailed) .inspect_err(|err| { info_log( "NETWORK_ERROR", &json!(format!( "Failed getting response from connector. Error: {:?}", err )), ); }) }; let external_service_elapsed = external_service_start_latency.elapsed(); metrics::EXTERNAL_SERVICE_API_CALLS_LATENCY
{ "chunk": null, "crate": "external-services", "enum_name": null, "file_size": null, "for_type": null, "function_name": null, "is_async": null, "is_pub": null, "lines": 15, "method_name": null, "num_enums": null, "num_items": null, "num_structs": null, "repo": "connector-service", "start_line": 375, "struct_name": null, "total_crates": null, "trait_name": null }
connector-service_snippet_-7416499650036175072_375_30
clm
snippet
// connector-service/backend/external-services/src/service.rs call_connector_api(proxy, request, "execute_connector_processing_step") .await .change_context(ConnectorError::RequestEncodingFailed) .inspect_err(|err| { info_log( "NETWORK_ERROR", &json!(format!( "Failed getting response from connector. Error: {:?}", err )), ); }) }; let external_service_elapsed = external_service_start_latency.elapsed(); metrics::EXTERNAL_SERVICE_API_CALLS_LATENCY .with_label_values(&[ &method.to_string(), event_params.service_name, event_params.connector_name, ]) .observe(external_service_elapsed.as_secs_f64()); tracing::info!(?response, "response from connector"); // Extract status code BEFORE creating event - one liner let status_code = response.as_ref().ok().map(|result| match result { Ok(body) | Err(body) => i32::from(body.status_code), }); // Construct masked request for event let masked_request_data = req.as_ref().and_then(|r| {
{ "chunk": null, "crate": "external-services", "enum_name": null, "file_size": null, "for_type": null, "function_name": null, "is_async": null, "is_pub": null, "lines": 30, "method_name": null, "num_enums": null, "num_items": null, "num_structs": null, "repo": "connector-service", "start_line": 375, "struct_name": null, "total_crates": null, "trait_name": null }
connector-service_snippet_-7416499650036175072_375_50
clm
snippet
// connector-service/backend/external-services/src/service.rs call_connector_api(proxy, request, "execute_connector_processing_step") .await .change_context(ConnectorError::RequestEncodingFailed) .inspect_err(|err| { info_log( "NETWORK_ERROR", &json!(format!( "Failed getting response from connector. Error: {:?}", err )), ); }) }; let external_service_elapsed = external_service_start_latency.elapsed(); metrics::EXTERNAL_SERVICE_API_CALLS_LATENCY .with_label_values(&[ &method.to_string(), event_params.service_name, event_params.connector_name, ]) .observe(external_service_elapsed.as_secs_f64()); tracing::info!(?response, "response from connector"); // Extract status code BEFORE creating event - one liner let status_code = response.as_ref().ok().map(|result| match result { Ok(body) | Err(body) => i32::from(body.status_code), }); // Construct masked request for event let masked_request_data = req.as_ref().and_then(|r| { MaskedSerdeValue::from_masked_optional(r, "connector_request") }); let latency = u64::try_from(external_service_elapsed.as_millis()).unwrap_or(u64::MAX); // Create single event (response_data will be set by connector) let mut event = Event { request_id: request_id.to_string(), timestamp: chrono::Utc::now().timestamp().into(), flow_type: event_params.flow_name, connector: event_params.connector_name.to_string(), url: Some(url.clone()), stage: EventStage::ConnectorCall, latency_ms: Some(latency), status_code, request_data: masked_request_data, response_data: None, // Will be set by connector via set_response_body headers: event_headers, additional_fields: HashMap::new(),
{ "chunk": null, "crate": "external-services", "enum_name": null, "file_size": null, "for_type": null, "function_name": null, "is_async": null, "is_pub": null, "lines": 50, "method_name": null, "num_enums": null, "num_items": null, "num_structs": null, "repo": "connector-service", "start_line": 375, "struct_name": null, "total_crates": null, "trait_name": null }
connector-service_snippet_-7416499650036175072_400_15
clm
snippet
// connector-service/backend/external-services/src/service.rs Ok(body) | Err(body) => i32::from(body.status_code), }); // Construct masked request for event let masked_request_data = req.as_ref().and_then(|r| { MaskedSerdeValue::from_masked_optional(r, "connector_request") }); let latency = u64::try_from(external_service_elapsed.as_millis()).unwrap_or(u64::MAX); // Create single event (response_data will be set by connector) let mut event = Event { request_id: request_id.to_string(), timestamp: chrono::Utc::now().timestamp().into(),
{ "chunk": null, "crate": "external-services", "enum_name": null, "file_size": null, "for_type": null, "function_name": null, "is_async": null, "is_pub": null, "lines": 15, "method_name": null, "num_enums": null, "num_items": null, "num_structs": null, "repo": "connector-service", "start_line": 400, "struct_name": null, "total_crates": null, "trait_name": null }
connector-service_snippet_-7416499650036175072_400_30
clm
snippet
// connector-service/backend/external-services/src/service.rs Ok(body) | Err(body) => i32::from(body.status_code), }); // Construct masked request for event let masked_request_data = req.as_ref().and_then(|r| { MaskedSerdeValue::from_masked_optional(r, "connector_request") }); let latency = u64::try_from(external_service_elapsed.as_millis()).unwrap_or(u64::MAX); // Create single event (response_data will be set by connector) let mut event = Event { request_id: request_id.to_string(), timestamp: chrono::Utc::now().timestamp().into(), flow_type: event_params.flow_name, connector: event_params.connector_name.to_string(), url: Some(url.clone()), stage: EventStage::ConnectorCall, latency_ms: Some(latency), status_code, request_data: masked_request_data, response_data: None, // Will be set by connector via set_response_body headers: event_headers, additional_fields: HashMap::new(), lineage_ids: event_params.lineage_ids.to_owned(), }; event.add_reference_id(event_params.reference_id.as_deref()); let result = match response {
{ "chunk": null, "crate": "external-services", "enum_name": null, "file_size": null, "for_type": null, "function_name": null, "is_async": null, "is_pub": null, "lines": 30, "method_name": null, "num_enums": null, "num_items": null, "num_structs": null, "repo": "connector-service", "start_line": 400, "struct_name": null, "total_crates": null, "trait_name": null }
connector-service_snippet_-7416499650036175072_400_50
clm
snippet
// connector-service/backend/external-services/src/service.rs Ok(body) | Err(body) => i32::from(body.status_code), }); // Construct masked request for event let masked_request_data = req.as_ref().and_then(|r| { MaskedSerdeValue::from_masked_optional(r, "connector_request") }); let latency = u64::try_from(external_service_elapsed.as_millis()).unwrap_or(u64::MAX); // Create single event (response_data will be set by connector) let mut event = Event { request_id: request_id.to_string(), timestamp: chrono::Utc::now().timestamp().into(), flow_type: event_params.flow_name, connector: event_params.connector_name.to_string(), url: Some(url.clone()), stage: EventStage::ConnectorCall, latency_ms: Some(latency), status_code, request_data: masked_request_data, response_data: None, // Will be set by connector via set_response_body headers: event_headers, additional_fields: HashMap::new(), lineage_ids: event_params.lineage_ids.to_owned(), }; event.add_reference_id(event_params.reference_id.as_deref()); let result = match response { Ok(body) => { let response = match body { Ok(body) => { let status_code = body.status_code; tracing::Span::current().record( "status_code", tracing::field::display(status_code), ); let is_source_verified = connector.verify(&updated_router_data, interfaces::verification::ConnectorSourceVerificationSecrets::AuthHeaders(updated_router_data.connector_auth_type.clone()), &body.response)?; if !is_source_verified { return Err(error_stack::report!( ConnectorError::SourceVerificationFailed )); } if all_keys_required.unwrap_or(true) { let raw_response_string = strip_bom_and_convert_to_string(&body.response); updated_router_data
{ "chunk": null, "crate": "external-services", "enum_name": null, "file_size": null, "for_type": null, "function_name": null, "is_async": null, "is_pub": null, "lines": 50, "method_name": null, "num_enums": null, "num_items": null, "num_structs": null, "repo": "connector-service", "start_line": 400, "struct_name": null, "total_crates": null, "trait_name": null }
connector-service_snippet_-7416499650036175072_425_15
clm
snippet
// connector-service/backend/external-services/src/service.rs lineage_ids: event_params.lineage_ids.to_owned(), }; event.add_reference_id(event_params.reference_id.as_deref()); let result = match response { Ok(body) => { let response = match body { Ok(body) => { let status_code = body.status_code; tracing::Span::current().record( "status_code", tracing::field::display(status_code), ); let is_source_verified = connector.verify(&updated_router_data, interfaces::verification::ConnectorSourceVerificationSecrets::AuthHeaders(updated_router_data.connector_auth_type.clone()), &body.response)?;
{ "chunk": null, "crate": "external-services", "enum_name": null, "file_size": null, "for_type": null, "function_name": null, "is_async": null, "is_pub": null, "lines": 15, "method_name": null, "num_enums": null, "num_items": null, "num_structs": null, "repo": "connector-service", "start_line": 425, "struct_name": null, "total_crates": null, "trait_name": null }
connector-service_snippet_-7416499650036175072_425_30
clm
snippet
// connector-service/backend/external-services/src/service.rs lineage_ids: event_params.lineage_ids.to_owned(), }; event.add_reference_id(event_params.reference_id.as_deref()); let result = match response { Ok(body) => { let response = match body { Ok(body) => { let status_code = body.status_code; tracing::Span::current().record( "status_code", tracing::field::display(status_code), ); let is_source_verified = connector.verify(&updated_router_data, interfaces::verification::ConnectorSourceVerificationSecrets::AuthHeaders(updated_router_data.connector_auth_type.clone()), &body.response)?; if !is_source_verified { return Err(error_stack::report!( ConnectorError::SourceVerificationFailed )); } if all_keys_required.unwrap_or(true) { let raw_response_string = strip_bom_and_convert_to_string(&body.response); updated_router_data .resource_common_data .set_raw_connector_response( raw_response_string.map(Into::into), );
{ "chunk": null, "crate": "external-services", "enum_name": null, "file_size": null, "for_type": null, "function_name": null, "is_async": null, "is_pub": null, "lines": 30, "method_name": null, "num_enums": null, "num_items": null, "num_structs": null, "repo": "connector-service", "start_line": 425, "struct_name": null, "total_crates": null, "trait_name": null }
connector-service_snippet_-7416499650036175072_425_50
clm
snippet
// connector-service/backend/external-services/src/service.rs lineage_ids: event_params.lineage_ids.to_owned(), }; event.add_reference_id(event_params.reference_id.as_deref()); let result = match response { Ok(body) => { let response = match body { Ok(body) => { let status_code = body.status_code; tracing::Span::current().record( "status_code", tracing::field::display(status_code), ); let is_source_verified = connector.verify(&updated_router_data, interfaces::verification::ConnectorSourceVerificationSecrets::AuthHeaders(updated_router_data.connector_auth_type.clone()), &body.response)?; if !is_source_verified { return Err(error_stack::report!( ConnectorError::SourceVerificationFailed )); } if all_keys_required.unwrap_or(true) { let raw_response_string = strip_bom_and_convert_to_string(&body.response); updated_router_data .resource_common_data .set_raw_connector_response( raw_response_string.map(Into::into), ); // Set response headers if available updated_router_data .resource_common_data .set_connector_response_headers(body.headers.clone()); } let handle_response_result = connector.handle_response_v2( &updated_router_data, Some(&mut event), body.clone(), ); // Log response body and headers using properly masked data from connector if let Some(response_data) = &event.response_data { tracing::Span::current().record( "response.body", tracing::field::display(response_data.inner()), ); }
{ "chunk": null, "crate": "external-services", "enum_name": null, "file_size": null, "for_type": null, "function_name": null, "is_async": null, "is_pub": null, "lines": 50, "method_name": null, "num_enums": null, "num_items": null, "num_structs": null, "repo": "connector-service", "start_line": 425, "struct_name": null, "total_crates": null, "trait_name": null }
connector-service_snippet_-7416499650036175072_450_15
clm
snippet
// connector-service/backend/external-services/src/service.rs .resource_common_data .set_raw_connector_response( raw_response_string.map(Into::into), ); // Set response headers if available updated_router_data .resource_common_data .set_connector_response_headers(body.headers.clone()); } let handle_response_result = connector.handle_response_v2( &updated_router_data, Some(&mut event), body.clone(),
{ "chunk": null, "crate": "external-services", "enum_name": null, "file_size": null, "for_type": null, "function_name": null, "is_async": null, "is_pub": null, "lines": 15, "method_name": null, "num_enums": null, "num_items": null, "num_structs": null, "repo": "connector-service", "start_line": 450, "struct_name": null, "total_crates": null, "trait_name": null }
connector-service_snippet_-7416499650036175072_450_30
clm
snippet
// connector-service/backend/external-services/src/service.rs .resource_common_data .set_raw_connector_response( raw_response_string.map(Into::into), ); // Set response headers if available updated_router_data .resource_common_data .set_connector_response_headers(body.headers.clone()); } let handle_response_result = connector.handle_response_v2( &updated_router_data, Some(&mut event), body.clone(), ); // Log response body and headers using properly masked data from connector if let Some(response_data) = &event.response_data { tracing::Span::current().record( "response.body", tracing::field::display(response_data.inner()), ); } // Log response headers from event (already masked) tracing::Span::current().record( "response.headers", tracing::field::debug(&event.headers), );
{ "chunk": null, "crate": "external-services", "enum_name": null, "file_size": null, "for_type": null, "function_name": null, "is_async": null, "is_pub": null, "lines": 30, "method_name": null, "num_enums": null, "num_items": null, "num_structs": null, "repo": "connector-service", "start_line": 450, "struct_name": null, "total_crates": null, "trait_name": null }
connector-service_snippet_-7416499650036175072_450_50
clm
snippet
// connector-service/backend/external-services/src/service.rs .resource_common_data .set_raw_connector_response( raw_response_string.map(Into::into), ); // Set response headers if available updated_router_data .resource_common_data .set_connector_response_headers(body.headers.clone()); } let handle_response_result = connector.handle_response_v2( &updated_router_data, Some(&mut event), body.clone(), ); // Log response body and headers using properly masked data from connector if let Some(response_data) = &event.response_data { tracing::Span::current().record( "response.body", tracing::field::display(response_data.inner()), ); } // Log response headers from event (already masked) tracing::Span::current().record( "response.headers", tracing::field::debug(&event.headers), ); match handle_response_result { Ok(data) => { tracing::info!("Transformer completed successfully"); Ok(data) } Err(err) => Err(err), }? } Err(body) => { metrics::EXTERNAL_SERVICE_API_CALLS_ERRORS .with_label_values(&[ &method.to_string(), event_params.service_name, event_params.connector_name, body.status_code.to_string().as_str(), ]) .inc(); if all_keys_required.unwrap_or(true) {
{ "chunk": null, "crate": "external-services", "enum_name": null, "file_size": null, "for_type": null, "function_name": null, "is_async": null, "is_pub": null, "lines": 50, "method_name": null, "num_enums": null, "num_items": null, "num_structs": null, "repo": "connector-service", "start_line": 450, "struct_name": null, "total_crates": null, "trait_name": null }
connector-service_snippet_-7416499650036175072_475_15
clm
snippet
// connector-service/backend/external-services/src/service.rs // Log response headers from event (already masked) tracing::Span::current().record( "response.headers", tracing::field::debug(&event.headers), ); match handle_response_result { Ok(data) => { tracing::info!("Transformer completed successfully"); Ok(data) } Err(err) => Err(err), }? } Err(body) => {
{ "chunk": null, "crate": "external-services", "enum_name": null, "file_size": null, "for_type": null, "function_name": null, "is_async": null, "is_pub": null, "lines": 15, "method_name": null, "num_enums": null, "num_items": null, "num_structs": null, "repo": "connector-service", "start_line": 475, "struct_name": null, "total_crates": null, "trait_name": null }
connector-service_snippet_-7416499650036175072_475_30
clm
snippet
// connector-service/backend/external-services/src/service.rs // Log response headers from event (already masked) tracing::Span::current().record( "response.headers", tracing::field::debug(&event.headers), ); match handle_response_result { Ok(data) => { tracing::info!("Transformer completed successfully"); Ok(data) } Err(err) => Err(err), }? } Err(body) => { metrics::EXTERNAL_SERVICE_API_CALLS_ERRORS .with_label_values(&[ &method.to_string(), event_params.service_name, event_params.connector_name, body.status_code.to_string().as_str(), ]) .inc(); if all_keys_required.unwrap_or(true) { let raw_response_string = strip_bom_and_convert_to_string(&body.response); updated_router_data .resource_common_data .set_raw_connector_response(
{ "chunk": null, "crate": "external-services", "enum_name": null, "file_size": null, "for_type": null, "function_name": null, "is_async": null, "is_pub": null, "lines": 30, "method_name": null, "num_enums": null, "num_items": null, "num_structs": null, "repo": "connector-service", "start_line": 475, "struct_name": null, "total_crates": null, "trait_name": null }
connector-service_snippet_-7416499650036175072_475_50
clm
snippet
// connector-service/backend/external-services/src/service.rs // Log response headers from event (already masked) tracing::Span::current().record( "response.headers", tracing::field::debug(&event.headers), ); match handle_response_result { Ok(data) => { tracing::info!("Transformer completed successfully"); Ok(data) } Err(err) => Err(err), }? } Err(body) => { metrics::EXTERNAL_SERVICE_API_CALLS_ERRORS .with_label_values(&[ &method.to_string(), event_params.service_name, event_params.connector_name, body.status_code.to_string().as_str(), ]) .inc(); if all_keys_required.unwrap_or(true) { let raw_response_string = strip_bom_and_convert_to_string(&body.response); updated_router_data .resource_common_data .set_raw_connector_response( raw_response_string.map(Into::into), ); updated_router_data .resource_common_data .set_connector_response_headers(body.headers.clone()); } let error = match body.status_code { 500..=511 => connector.get_5xx_error_response( body.clone(), Some(&mut event), )?, _ => connector.get_error_response_v2( body.clone(), Some(&mut event), )?, }; tracing::Span::current().record( "response.error_message", tracing::field::display(&error.message),
{ "chunk": null, "crate": "external-services", "enum_name": null, "file_size": null, "for_type": null, "function_name": null, "is_async": null, "is_pub": null, "lines": 50, "method_name": null, "num_enums": null, "num_items": null, "num_structs": null, "repo": "connector-service", "start_line": 475, "struct_name": null, "total_crates": null, "trait_name": null }
connector-service_snippet_-7416499650036175072_500_15
clm
snippet
// connector-service/backend/external-services/src/service.rs let raw_response_string = strip_bom_and_convert_to_string(&body.response); updated_router_data .resource_common_data .set_raw_connector_response( raw_response_string.map(Into::into), ); updated_router_data .resource_common_data .set_connector_response_headers(body.headers.clone()); } let error = match body.status_code { 500..=511 => connector.get_5xx_error_response( body.clone(),
{ "chunk": null, "crate": "external-services", "enum_name": null, "file_size": null, "for_type": null, "function_name": null, "is_async": null, "is_pub": null, "lines": 15, "method_name": null, "num_enums": null, "num_items": null, "num_structs": null, "repo": "connector-service", "start_line": 500, "struct_name": null, "total_crates": null, "trait_name": null }
connector-service_snippet_-7416499650036175072_500_30
clm
snippet
// connector-service/backend/external-services/src/service.rs let raw_response_string = strip_bom_and_convert_to_string(&body.response); updated_router_data .resource_common_data .set_raw_connector_response( raw_response_string.map(Into::into), ); updated_router_data .resource_common_data .set_connector_response_headers(body.headers.clone()); } let error = match body.status_code { 500..=511 => connector.get_5xx_error_response( body.clone(), Some(&mut event), )?, _ => connector.get_error_response_v2( body.clone(), Some(&mut event), )?, }; tracing::Span::current().record( "response.error_message", tracing::field::display(&error.message), ); tracing::Span::current().record( "response.status_code", tracing::field::display(error.status_code), );
{ "chunk": null, "crate": "external-services", "enum_name": null, "file_size": null, "for_type": null, "function_name": null, "is_async": null, "is_pub": null, "lines": 30, "method_name": null, "num_enums": null, "num_items": null, "num_structs": null, "repo": "connector-service", "start_line": 500, "struct_name": null, "total_crates": null, "trait_name": null }
connector-service_snippet_-7416499650036175072_500_50
clm
snippet
// connector-service/backend/external-services/src/service.rs let raw_response_string = strip_bom_and_convert_to_string(&body.response); updated_router_data .resource_common_data .set_raw_connector_response( raw_response_string.map(Into::into), ); updated_router_data .resource_common_data .set_connector_response_headers(body.headers.clone()); } let error = match body.status_code { 500..=511 => connector.get_5xx_error_response( body.clone(), Some(&mut event), )?, _ => connector.get_error_response_v2( body.clone(), Some(&mut event), )?, }; tracing::Span::current().record( "response.error_message", tracing::field::display(&error.message), ); tracing::Span::current().record( "response.status_code", tracing::field::display(error.status_code), ); updated_router_data.response = Err(error); updated_router_data } }; Ok(response) } Err(err) => { tracing::Span::current().record("url", tracing::field::display(url)); Err(err.change_context(ConnectorError::ProcessingStepFailed(None))) } }; emit_event_with_config(event, event_params.event_config); result } None => Ok(router_data), } } };
{ "chunk": null, "crate": "external-services", "enum_name": null, "file_size": null, "for_type": null, "function_name": null, "is_async": null, "is_pub": null, "lines": 50, "method_name": null, "num_enums": null, "num_items": null, "num_structs": null, "repo": "connector-service", "start_line": 500, "struct_name": null, "total_crates": null, "trait_name": null }
connector-service_snippet_-7416499650036175072_525_15
clm
snippet
// connector-service/backend/external-services/src/service.rs ); tracing::Span::current().record( "response.status_code", tracing::field::display(error.status_code), ); updated_router_data.response = Err(error); updated_router_data } }; Ok(response) } Err(err) => { tracing::Span::current().record("url", tracing::field::display(url)); Err(err.change_context(ConnectorError::ProcessingStepFailed(None))) }
{ "chunk": null, "crate": "external-services", "enum_name": null, "file_size": null, "for_type": null, "function_name": null, "is_async": null, "is_pub": null, "lines": 15, "method_name": null, "num_enums": null, "num_items": null, "num_structs": null, "repo": "connector-service", "start_line": 525, "struct_name": null, "total_crates": null, "trait_name": null }
connector-service_snippet_-7416499650036175072_525_30
clm
snippet
// connector-service/backend/external-services/src/service.rs ); tracing::Span::current().record( "response.status_code", tracing::field::display(error.status_code), ); updated_router_data.response = Err(error); updated_router_data } }; Ok(response) } Err(err) => { tracing::Span::current().record("url", tracing::field::display(url)); Err(err.change_context(ConnectorError::ProcessingStepFailed(None))) } }; emit_event_with_config(event, event_params.event_config); result } None => Ok(router_data), } } }; let result_with_integrity_check = match result { Ok(data) => { data.request .check_integrity(&data.request.clone(), None) .map_err(|err| ConnectorError::IntegrityCheckFailed {
{ "chunk": null, "crate": "external-services", "enum_name": null, "file_size": null, "for_type": null, "function_name": null, "is_async": null, "is_pub": null, "lines": 30, "method_name": null, "num_enums": null, "num_items": null, "num_structs": null, "repo": "connector-service", "start_line": 525, "struct_name": null, "total_crates": null, "trait_name": null }
connector-service_snippet_-7416499650036175072_525_50
clm
snippet
// connector-service/backend/external-services/src/service.rs ); tracing::Span::current().record( "response.status_code", tracing::field::display(error.status_code), ); updated_router_data.response = Err(error); updated_router_data } }; Ok(response) } Err(err) => { tracing::Span::current().record("url", tracing::field::display(url)); Err(err.change_context(ConnectorError::ProcessingStepFailed(None))) } }; emit_event_with_config(event, event_params.event_config); result } None => Ok(router_data), } } }; let result_with_integrity_check = match result { Ok(data) => { data.request .check_integrity(&data.request.clone(), None) .map_err(|err| ConnectorError::IntegrityCheckFailed { field_names: err.field_names, connector_transaction_id: err.connector_transaction_id, })?; Ok(data) } Err(err) => Err(err), }; let elapsed = start.elapsed().as_millis(); tracing::Span::current().record("latency", elapsed); tracing::info!(tag = ?Tag::OutgoingApi, log_type = "api", "Outgoing Request completed"); result_with_integrity_check } pub enum ApplicationResponse<R> { Json(R), } pub type CustomResult<T, E> = error_stack::Result<T, E>; pub type RouterResult<T> = CustomResult<T, ApiErrorResponse>;
{ "chunk": null, "crate": "external-services", "enum_name": null, "file_size": null, "for_type": null, "function_name": null, "is_async": null, "is_pub": null, "lines": 50, "method_name": null, "num_enums": null, "num_items": null, "num_structs": null, "repo": "connector-service", "start_line": 525, "struct_name": null, "total_crates": null, "trait_name": null }
connector-service_snippet_-7416499650036175072_550_15
clm
snippet
// connector-service/backend/external-services/src/service.rs let result_with_integrity_check = match result { Ok(data) => { data.request .check_integrity(&data.request.clone(), None) .map_err(|err| ConnectorError::IntegrityCheckFailed { field_names: err.field_names, connector_transaction_id: err.connector_transaction_id, })?; Ok(data) } Err(err) => Err(err), }; let elapsed = start.elapsed().as_millis(); tracing::Span::current().record("latency", elapsed);
{ "chunk": null, "crate": "external-services", "enum_name": null, "file_size": null, "for_type": null, "function_name": null, "is_async": null, "is_pub": null, "lines": 15, "method_name": null, "num_enums": null, "num_items": null, "num_structs": null, "repo": "connector-service", "start_line": 550, "struct_name": null, "total_crates": null, "trait_name": null }
connector-service_snippet_-7416499650036175072_550_30
clm
snippet
// connector-service/backend/external-services/src/service.rs let result_with_integrity_check = match result { Ok(data) => { data.request .check_integrity(&data.request.clone(), None) .map_err(|err| ConnectorError::IntegrityCheckFailed { field_names: err.field_names, connector_transaction_id: err.connector_transaction_id, })?; Ok(data) } Err(err) => Err(err), }; let elapsed = start.elapsed().as_millis(); tracing::Span::current().record("latency", elapsed); tracing::info!(tag = ?Tag::OutgoingApi, log_type = "api", "Outgoing Request completed"); result_with_integrity_check } pub enum ApplicationResponse<R> { Json(R), } pub type CustomResult<T, E> = error_stack::Result<T, E>; pub type RouterResult<T> = CustomResult<T, ApiErrorResponse>; pub type RouterResponse<T> = CustomResult<ApplicationResponse<T>, ApiErrorResponse>; pub async fn call_connector_api( proxy: &Proxy, request: Request,
{ "chunk": null, "crate": "external-services", "enum_name": null, "file_size": null, "for_type": null, "function_name": null, "is_async": null, "is_pub": null, "lines": 30, "method_name": null, "num_enums": null, "num_items": null, "num_structs": null, "repo": "connector-service", "start_line": 550, "struct_name": null, "total_crates": null, "trait_name": null }
connector-service_snippet_-7416499650036175072_550_50
clm
snippet
// connector-service/backend/external-services/src/service.rs let result_with_integrity_check = match result { Ok(data) => { data.request .check_integrity(&data.request.clone(), None) .map_err(|err| ConnectorError::IntegrityCheckFailed { field_names: err.field_names, connector_transaction_id: err.connector_transaction_id, })?; Ok(data) } Err(err) => Err(err), }; let elapsed = start.elapsed().as_millis(); tracing::Span::current().record("latency", elapsed); tracing::info!(tag = ?Tag::OutgoingApi, log_type = "api", "Outgoing Request completed"); result_with_integrity_check } pub enum ApplicationResponse<R> { Json(R), } pub type CustomResult<T, E> = error_stack::Result<T, E>; pub type RouterResult<T> = CustomResult<T, ApiErrorResponse>; pub type RouterResponse<T> = CustomResult<ApplicationResponse<T>, ApiErrorResponse>; pub async fn call_connector_api( proxy: &Proxy, request: Request, _flow_name: &str, ) -> CustomResult<Result<Response, Response>, ApiClientError> { let url = reqwest::Url::parse(&request.url).change_context(ApiClientError::UrlEncodingFailed)?; let should_bypass_proxy = proxy.bypass_proxy_urls.contains(&url.to_string()); let client = create_client( proxy, should_bypass_proxy, request.certificate, request.certificate_key, )?; let headers = request.headers.construct_header_map()?; // Process and log the request body based on content type let request = { match request.method { Method::Get => client.get(url),
{ "chunk": null, "crate": "external-services", "enum_name": null, "file_size": null, "for_type": null, "function_name": null, "is_async": null, "is_pub": null, "lines": 50, "method_name": null, "num_enums": null, "num_items": null, "num_structs": null, "repo": "connector-service", "start_line": 550, "struct_name": null, "total_crates": null, "trait_name": null }
connector-service_snippet_-7416499650036175072_575_15
clm
snippet
// connector-service/backend/external-services/src/service.rs pub type RouterResponse<T> = CustomResult<ApplicationResponse<T>, ApiErrorResponse>; pub async fn call_connector_api( proxy: &Proxy, request: Request, _flow_name: &str, ) -> CustomResult<Result<Response, Response>, ApiClientError> { let url = reqwest::Url::parse(&request.url).change_context(ApiClientError::UrlEncodingFailed)?; let should_bypass_proxy = proxy.bypass_proxy_urls.contains(&url.to_string()); let client = create_client( proxy, should_bypass_proxy,
{ "chunk": null, "crate": "external-services", "enum_name": null, "file_size": null, "for_type": null, "function_name": null, "is_async": null, "is_pub": null, "lines": 15, "method_name": null, "num_enums": null, "num_items": null, "num_structs": null, "repo": "connector-service", "start_line": 575, "struct_name": null, "total_crates": null, "trait_name": null }
connector-service_snippet_-7416499650036175072_575_30
clm
snippet
// connector-service/backend/external-services/src/service.rs pub type RouterResponse<T> = CustomResult<ApplicationResponse<T>, ApiErrorResponse>; pub async fn call_connector_api( proxy: &Proxy, request: Request, _flow_name: &str, ) -> CustomResult<Result<Response, Response>, ApiClientError> { let url = reqwest::Url::parse(&request.url).change_context(ApiClientError::UrlEncodingFailed)?; let should_bypass_proxy = proxy.bypass_proxy_urls.contains(&url.to_string()); let client = create_client( proxy, should_bypass_proxy, request.certificate, request.certificate_key, )?; let headers = request.headers.construct_header_map()?; // Process and log the request body based on content type let request = { match request.method { Method::Get => client.get(url), Method::Post => { let client = client.post(url); match request.body { Some(RequestContent::Json(payload)) => client.json(&payload), Some(RequestContent::FormUrlEncoded(payload)) => client.form(&payload),
{ "chunk": null, "crate": "external-services", "enum_name": null, "file_size": null, "for_type": null, "function_name": null, "is_async": null, "is_pub": null, "lines": 30, "method_name": null, "num_enums": null, "num_items": null, "num_structs": null, "repo": "connector-service", "start_line": 575, "struct_name": null, "total_crates": null, "trait_name": null }
connector-service_snippet_-7416499650036175072_575_50
clm
snippet
// connector-service/backend/external-services/src/service.rs pub type RouterResponse<T> = CustomResult<ApplicationResponse<T>, ApiErrorResponse>; pub async fn call_connector_api( proxy: &Proxy, request: Request, _flow_name: &str, ) -> CustomResult<Result<Response, Response>, ApiClientError> { let url = reqwest::Url::parse(&request.url).change_context(ApiClientError::UrlEncodingFailed)?; let should_bypass_proxy = proxy.bypass_proxy_urls.contains(&url.to_string()); let client = create_client( proxy, should_bypass_proxy, request.certificate, request.certificate_key, )?; let headers = request.headers.construct_header_map()?; // Process and log the request body based on content type let request = { match request.method { Method::Get => client.get(url), Method::Post => { let client = client.post(url); match request.body { Some(RequestContent::Json(payload)) => client.json(&payload), Some(RequestContent::FormUrlEncoded(payload)) => client.form(&payload), Some(RequestContent::Xml(payload)) => { // For XML content, we need to extract the XML string properly // The payload implements a custom Serialize that generates XML content let body = serde_json::to_string(&payload) .change_context(ApiClientError::UrlEncodingFailed)?; // Properly deserialize the JSON string to extract clean XML let xml_body = if body.starts_with('"') && body.ends_with('"') { // This is a JSON-encoded string, deserialize it properly serde_json::from_str::<String>(&body) .change_context(ApiClientError::UrlEncodingFailed)? } else { // This is already the raw body content body }; client.body(xml_body).header("Content-Type", "text/xml") } Some(RequestContent::FormData(form)) => client.multipart(form), _ => client, }
{ "chunk": null, "crate": "external-services", "enum_name": null, "file_size": null, "for_type": null, "function_name": null, "is_async": null, "is_pub": null, "lines": 50, "method_name": null, "num_enums": null, "num_items": null, "num_structs": null, "repo": "connector-service", "start_line": 575, "struct_name": null, "total_crates": null, "trait_name": null }
connector-service_snippet_-7416499650036175072_600_15
clm
snippet
// connector-service/backend/external-services/src/service.rs Method::Post => { let client = client.post(url); match request.body { Some(RequestContent::Json(payload)) => client.json(&payload), Some(RequestContent::FormUrlEncoded(payload)) => client.form(&payload), Some(RequestContent::Xml(payload)) => { // For XML content, we need to extract the XML string properly // The payload implements a custom Serialize that generates XML content let body = serde_json::to_string(&payload) .change_context(ApiClientError::UrlEncodingFailed)?; // Properly deserialize the JSON string to extract clean XML let xml_body = if body.starts_with('"') && body.ends_with('"') { // This is a JSON-encoded string, deserialize it properly serde_json::from_str::<String>(&body)
{ "chunk": null, "crate": "external-services", "enum_name": null, "file_size": null, "for_type": null, "function_name": null, "is_async": null, "is_pub": null, "lines": 15, "method_name": null, "num_enums": null, "num_items": null, "num_structs": null, "repo": "connector-service", "start_line": 600, "struct_name": null, "total_crates": null, "trait_name": null }
connector-service_snippet_-7416499650036175072_600_30
clm
snippet
// connector-service/backend/external-services/src/service.rs Method::Post => { let client = client.post(url); match request.body { Some(RequestContent::Json(payload)) => client.json(&payload), Some(RequestContent::FormUrlEncoded(payload)) => client.form(&payload), Some(RequestContent::Xml(payload)) => { // For XML content, we need to extract the XML string properly // The payload implements a custom Serialize that generates XML content let body = serde_json::to_string(&payload) .change_context(ApiClientError::UrlEncodingFailed)?; // Properly deserialize the JSON string to extract clean XML let xml_body = if body.starts_with('"') && body.ends_with('"') { // This is a JSON-encoded string, deserialize it properly serde_json::from_str::<String>(&body) .change_context(ApiClientError::UrlEncodingFailed)? } else { // This is already the raw body content body }; client.body(xml_body).header("Content-Type", "text/xml") } Some(RequestContent::FormData(form)) => client.multipart(form), _ => client, } } Method::Put => { let client = client.put(url); match request.body { Some(RequestContent::Json(payload)) => client.json(&payload),
{ "chunk": null, "crate": "external-services", "enum_name": null, "file_size": null, "for_type": null, "function_name": null, "is_async": null, "is_pub": null, "lines": 30, "method_name": null, "num_enums": null, "num_items": null, "num_structs": null, "repo": "connector-service", "start_line": 600, "struct_name": null, "total_crates": null, "trait_name": null }
connector-service_snippet_-7416499650036175072_600_50
clm
snippet
// connector-service/backend/external-services/src/service.rs Method::Post => { let client = client.post(url); match request.body { Some(RequestContent::Json(payload)) => client.json(&payload), Some(RequestContent::FormUrlEncoded(payload)) => client.form(&payload), Some(RequestContent::Xml(payload)) => { // For XML content, we need to extract the XML string properly // The payload implements a custom Serialize that generates XML content let body = serde_json::to_string(&payload) .change_context(ApiClientError::UrlEncodingFailed)?; // Properly deserialize the JSON string to extract clean XML let xml_body = if body.starts_with('"') && body.ends_with('"') { // This is a JSON-encoded string, deserialize it properly serde_json::from_str::<String>(&body) .change_context(ApiClientError::UrlEncodingFailed)? } else { // This is already the raw body content body }; client.body(xml_body).header("Content-Type", "text/xml") } Some(RequestContent::FormData(form)) => client.multipart(form), _ => client, } } Method::Put => { let client = client.put(url); match request.body { Some(RequestContent::Json(payload)) => client.json(&payload), Some(RequestContent::FormUrlEncoded(payload)) => client.form(&payload), Some(RequestContent::Xml(payload)) => { let body = serde_json::to_string(&payload) .change_context(ApiClientError::UrlEncodingFailed)?; let xml_body = if body.starts_with('"') && body.ends_with('"') { serde_json::from_str::<String>(&body) .change_context(ApiClientError::UrlEncodingFailed)? } else { body }; client.body(xml_body).header("Content-Type", "text/xml") } Some(RequestContent::FormData(form)) => client.multipart(form), _ => client, } } Method::Patch => { let client = client.patch(url); match request.body { Some(RequestContent::Json(payload)) => client.json(&payload),
{ "chunk": null, "crate": "external-services", "enum_name": null, "file_size": null, "for_type": null, "function_name": null, "is_async": null, "is_pub": null, "lines": 50, "method_name": null, "num_enums": null, "num_items": null, "num_structs": null, "repo": "connector-service", "start_line": 600, "struct_name": null, "total_crates": null, "trait_name": null }
connector-service_snippet_-7416499650036175072_625_15
clm
snippet
// connector-service/backend/external-services/src/service.rs } Method::Put => { let client = client.put(url); match request.body { Some(RequestContent::Json(payload)) => client.json(&payload), Some(RequestContent::FormUrlEncoded(payload)) => client.form(&payload), Some(RequestContent::Xml(payload)) => { let body = serde_json::to_string(&payload) .change_context(ApiClientError::UrlEncodingFailed)?; let xml_body = if body.starts_with('"') && body.ends_with('"') { serde_json::from_str::<String>(&body) .change_context(ApiClientError::UrlEncodingFailed)? } else { body };
{ "chunk": null, "crate": "external-services", "enum_name": null, "file_size": null, "for_type": null, "function_name": null, "is_async": null, "is_pub": null, "lines": 15, "method_name": null, "num_enums": null, "num_items": null, "num_structs": null, "repo": "connector-service", "start_line": 625, "struct_name": null, "total_crates": null, "trait_name": null }
connector-service_snippet_-7416499650036175072_625_30
clm
snippet
// connector-service/backend/external-services/src/service.rs } Method::Put => { let client = client.put(url); match request.body { Some(RequestContent::Json(payload)) => client.json(&payload), Some(RequestContent::FormUrlEncoded(payload)) => client.form(&payload), Some(RequestContent::Xml(payload)) => { let body = serde_json::to_string(&payload) .change_context(ApiClientError::UrlEncodingFailed)?; let xml_body = if body.starts_with('"') && body.ends_with('"') { serde_json::from_str::<String>(&body) .change_context(ApiClientError::UrlEncodingFailed)? } else { body }; client.body(xml_body).header("Content-Type", "text/xml") } Some(RequestContent::FormData(form)) => client.multipart(form), _ => client, } } Method::Patch => { let client = client.patch(url); match request.body { Some(RequestContent::Json(payload)) => client.json(&payload), Some(RequestContent::FormUrlEncoded(payload)) => client.form(&payload), Some(RequestContent::Xml(payload)) => { let body = serde_json::to_string(&payload) .change_context(ApiClientError::UrlEncodingFailed)?; let xml_body = if body.starts_with('"') && body.ends_with('"') {
{ "chunk": null, "crate": "external-services", "enum_name": null, "file_size": null, "for_type": null, "function_name": null, "is_async": null, "is_pub": null, "lines": 30, "method_name": null, "num_enums": null, "num_items": null, "num_structs": null, "repo": "connector-service", "start_line": 625, "struct_name": null, "total_crates": null, "trait_name": null }
connector-service_snippet_-7416499650036175072_625_50
clm
snippet
// connector-service/backend/external-services/src/service.rs } Method::Put => { let client = client.put(url); match request.body { Some(RequestContent::Json(payload)) => client.json(&payload), Some(RequestContent::FormUrlEncoded(payload)) => client.form(&payload), Some(RequestContent::Xml(payload)) => { let body = serde_json::to_string(&payload) .change_context(ApiClientError::UrlEncodingFailed)?; let xml_body = if body.starts_with('"') && body.ends_with('"') { serde_json::from_str::<String>(&body) .change_context(ApiClientError::UrlEncodingFailed)? } else { body }; client.body(xml_body).header("Content-Type", "text/xml") } Some(RequestContent::FormData(form)) => client.multipart(form), _ => client, } } Method::Patch => { let client = client.patch(url); match request.body { Some(RequestContent::Json(payload)) => client.json(&payload), Some(RequestContent::FormUrlEncoded(payload)) => client.form(&payload), Some(RequestContent::Xml(payload)) => { let body = serde_json::to_string(&payload) .change_context(ApiClientError::UrlEncodingFailed)?; let xml_body = if body.starts_with('"') && body.ends_with('"') { serde_json::from_str::<String>(&body) .change_context(ApiClientError::UrlEncodingFailed)? } else { body }; client.body(xml_body).header("Content-Type", "text/xml") } Some(RequestContent::FormData(form)) => client.multipart(form), _ => client, } } Method::Delete => { let client = client.delete(url); match request.body { Some(RequestContent::Json(payload)) => client.json(&payload), Some(RequestContent::FormUrlEncoded(payload)) => client.form(&payload), Some(RequestContent::Xml(payload)) => { let body = serde_json::to_string(&payload) .change_context(ApiClientError::UrlEncodingFailed)?; let xml_body = if body.starts_with('"') && body.ends_with('"') {
{ "chunk": null, "crate": "external-services", "enum_name": null, "file_size": null, "for_type": null, "function_name": null, "is_async": null, "is_pub": null, "lines": 50, "method_name": null, "num_enums": null, "num_items": null, "num_structs": null, "repo": "connector-service", "start_line": 625, "struct_name": null, "total_crates": null, "trait_name": null }
connector-service_snippet_-7416499650036175072_650_15
clm
snippet
// connector-service/backend/external-services/src/service.rs Some(RequestContent::FormUrlEncoded(payload)) => client.form(&payload), Some(RequestContent::Xml(payload)) => { let body = serde_json::to_string(&payload) .change_context(ApiClientError::UrlEncodingFailed)?; let xml_body = if body.starts_with('"') && body.ends_with('"') { serde_json::from_str::<String>(&body) .change_context(ApiClientError::UrlEncodingFailed)? } else { body }; client.body(xml_body).header("Content-Type", "text/xml") } Some(RequestContent::FormData(form)) => client.multipart(form), _ => client, }
{ "chunk": null, "crate": "external-services", "enum_name": null, "file_size": null, "for_type": null, "function_name": null, "is_async": null, "is_pub": null, "lines": 15, "method_name": null, "num_enums": null, "num_items": null, "num_structs": null, "repo": "connector-service", "start_line": 650, "struct_name": null, "total_crates": null, "trait_name": null }
connector-service_snippet_-7416499650036175072_650_30
clm
snippet
// connector-service/backend/external-services/src/service.rs Some(RequestContent::FormUrlEncoded(payload)) => client.form(&payload), Some(RequestContent::Xml(payload)) => { let body = serde_json::to_string(&payload) .change_context(ApiClientError::UrlEncodingFailed)?; let xml_body = if body.starts_with('"') && body.ends_with('"') { serde_json::from_str::<String>(&body) .change_context(ApiClientError::UrlEncodingFailed)? } else { body }; client.body(xml_body).header("Content-Type", "text/xml") } Some(RequestContent::FormData(form)) => client.multipart(form), _ => client, } } Method::Delete => { let client = client.delete(url); match request.body { Some(RequestContent::Json(payload)) => client.json(&payload), Some(RequestContent::FormUrlEncoded(payload)) => client.form(&payload), Some(RequestContent::Xml(payload)) => { let body = serde_json::to_string(&payload) .change_context(ApiClientError::UrlEncodingFailed)?; let xml_body = if body.starts_with('"') && body.ends_with('"') { serde_json::from_str::<String>(&body) .change_context(ApiClientError::UrlEncodingFailed)? } else { body };
{ "chunk": null, "crate": "external-services", "enum_name": null, "file_size": null, "for_type": null, "function_name": null, "is_async": null, "is_pub": null, "lines": 30, "method_name": null, "num_enums": null, "num_items": null, "num_structs": null, "repo": "connector-service", "start_line": 650, "struct_name": null, "total_crates": null, "trait_name": null }
connector-service_snippet_-7416499650036175072_650_50
clm
snippet
// connector-service/backend/external-services/src/service.rs Some(RequestContent::FormUrlEncoded(payload)) => client.form(&payload), Some(RequestContent::Xml(payload)) => { let body = serde_json::to_string(&payload) .change_context(ApiClientError::UrlEncodingFailed)?; let xml_body = if body.starts_with('"') && body.ends_with('"') { serde_json::from_str::<String>(&body) .change_context(ApiClientError::UrlEncodingFailed)? } else { body }; client.body(xml_body).header("Content-Type", "text/xml") } Some(RequestContent::FormData(form)) => client.multipart(form), _ => client, } } Method::Delete => { let client = client.delete(url); match request.body { Some(RequestContent::Json(payload)) => client.json(&payload), Some(RequestContent::FormUrlEncoded(payload)) => client.form(&payload), Some(RequestContent::Xml(payload)) => { let body = serde_json::to_string(&payload) .change_context(ApiClientError::UrlEncodingFailed)?; let xml_body = if body.starts_with('"') && body.ends_with('"') { serde_json::from_str::<String>(&body) .change_context(ApiClientError::UrlEncodingFailed)? } else { body }; client.body(xml_body).header("Content-Type", "text/xml") } Some(RequestContent::FormData(form)) => client.multipart(form), _ => client, } } } .add_headers(headers) }; let send_request = async { request.send().await.map_err(|error| { let api_error = match error { error if error.is_timeout() => ApiClientError::RequestTimeoutReceived, _ => ApiClientError::RequestNotSent(error.to_string()), }; info_log( "REQUEST_FAILURE", &json!(format!("Unable to send request to connector.",)), ); report!(api_error)
{ "chunk": null, "crate": "external-services", "enum_name": null, "file_size": null, "for_type": null, "function_name": null, "is_async": null, "is_pub": null, "lines": 50, "method_name": null, "num_enums": null, "num_items": null, "num_structs": null, "repo": "connector-service", "start_line": 650, "struct_name": null, "total_crates": null, "trait_name": null }
connector-service_snippet_-7416499650036175072_675_15
clm
snippet
// connector-service/backend/external-services/src/service.rs serde_json::from_str::<String>(&body) .change_context(ApiClientError::UrlEncodingFailed)? } else { body }; client.body(xml_body).header("Content-Type", "text/xml") } Some(RequestContent::FormData(form)) => client.multipart(form), _ => client, } } } .add_headers(headers) }; let send_request = async {
{ "chunk": null, "crate": "external-services", "enum_name": null, "file_size": null, "for_type": null, "function_name": null, "is_async": null, "is_pub": null, "lines": 15, "method_name": null, "num_enums": null, "num_items": null, "num_structs": null, "repo": "connector-service", "start_line": 675, "struct_name": null, "total_crates": null, "trait_name": null }
connector-service_snippet_-7416499650036175072_675_30
clm
snippet
// connector-service/backend/external-services/src/service.rs serde_json::from_str::<String>(&body) .change_context(ApiClientError::UrlEncodingFailed)? } else { body }; client.body(xml_body).header("Content-Type", "text/xml") } Some(RequestContent::FormData(form)) => client.multipart(form), _ => client, } } } .add_headers(headers) }; let send_request = async { request.send().await.map_err(|error| { let api_error = match error { error if error.is_timeout() => ApiClientError::RequestTimeoutReceived, _ => ApiClientError::RequestNotSent(error.to_string()), }; info_log( "REQUEST_FAILURE", &json!(format!("Unable to send request to connector.",)), ); report!(api_error) }) }; let response = send_request.await;
{ "chunk": null, "crate": "external-services", "enum_name": null, "file_size": null, "for_type": null, "function_name": null, "is_async": null, "is_pub": null, "lines": 30, "method_name": null, "num_enums": null, "num_items": null, "num_structs": null, "repo": "connector-service", "start_line": 675, "struct_name": null, "total_crates": null, "trait_name": null }
connector-service_snippet_-7416499650036175072_675_50
clm
snippet
// connector-service/backend/external-services/src/service.rs serde_json::from_str::<String>(&body) .change_context(ApiClientError::UrlEncodingFailed)? } else { body }; client.body(xml_body).header("Content-Type", "text/xml") } Some(RequestContent::FormData(form)) => client.multipart(form), _ => client, } } } .add_headers(headers) }; let send_request = async { request.send().await.map_err(|error| { let api_error = match error { error if error.is_timeout() => ApiClientError::RequestTimeoutReceived, _ => ApiClientError::RequestNotSent(error.to_string()), }; info_log( "REQUEST_FAILURE", &json!(format!("Unable to send request to connector.",)), ); report!(api_error) }) }; let response = send_request.await; handle_response(response).await } pub fn create_client( proxy_config: &Proxy, should_bypass_proxy: bool, _client_certificate: Option<Secret<String>>, _client_certificate_key: Option<Secret<String>>, ) -> CustomResult<Client, ApiClientError> { get_base_client(proxy_config, should_bypass_proxy) // match (client_certificate, client_certificate_key) { // (Some(encoded_certificate), Some(encoded_certificate_key)) => { // let client_builder = get_client_builder(proxy_config, should_bypass_proxy)?; // let identity = create_identity_from_certificate_and_key( // encoded_certificate.clone(), // encoded_certificate_key, // )?; // let certificate_list = create_certificate(encoded_certificate)?; // let client_builder = certificate_list
{ "chunk": null, "crate": "external-services", "enum_name": null, "file_size": null, "for_type": null, "function_name": null, "is_async": null, "is_pub": null, "lines": 50, "method_name": null, "num_enums": null, "num_items": null, "num_structs": null, "repo": "connector-service", "start_line": 675, "struct_name": null, "total_crates": null, "trait_name": null }
connector-service_snippet_-7416499650036175072_700_15
clm
snippet
// connector-service/backend/external-services/src/service.rs }) }; let response = send_request.await; handle_response(response).await } pub fn create_client( proxy_config: &Proxy, should_bypass_proxy: bool, _client_certificate: Option<Secret<String>>, _client_certificate_key: Option<Secret<String>>, ) -> CustomResult<Client, ApiClientError> { get_base_client(proxy_config, should_bypass_proxy)
{ "chunk": null, "crate": "external-services", "enum_name": null, "file_size": null, "for_type": null, "function_name": null, "is_async": null, "is_pub": null, "lines": 15, "method_name": null, "num_enums": null, "num_items": null, "num_structs": null, "repo": "connector-service", "start_line": 700, "struct_name": null, "total_crates": null, "trait_name": null }
connector-service_snippet_-7416499650036175072_700_30
clm
snippet
// connector-service/backend/external-services/src/service.rs }) }; let response = send_request.await; handle_response(response).await } pub fn create_client( proxy_config: &Proxy, should_bypass_proxy: bool, _client_certificate: Option<Secret<String>>, _client_certificate_key: Option<Secret<String>>, ) -> CustomResult<Client, ApiClientError> { get_base_client(proxy_config, should_bypass_proxy) // match (client_certificate, client_certificate_key) { // (Some(encoded_certificate), Some(encoded_certificate_key)) => { // let client_builder = get_client_builder(proxy_config, should_bypass_proxy)?; // let identity = create_identity_from_certificate_and_key( // encoded_certificate.clone(), // encoded_certificate_key, // )?; // let certificate_list = create_certificate(encoded_certificate)?; // let client_builder = certificate_list // .into_iter() // .fold(client_builder, |client_builder, certificate| { // client_builder.add_root_certificate(certificate) // }); // client_builder
{ "chunk": null, "crate": "external-services", "enum_name": null, "file_size": null, "for_type": null, "function_name": null, "is_async": null, "is_pub": null, "lines": 30, "method_name": null, "num_enums": null, "num_items": null, "num_structs": null, "repo": "connector-service", "start_line": 700, "struct_name": null, "total_crates": null, "trait_name": null }
connector-service_snippet_-7416499650036175072_700_50
clm
snippet
// connector-service/backend/external-services/src/service.rs }) }; let response = send_request.await; handle_response(response).await } pub fn create_client( proxy_config: &Proxy, should_bypass_proxy: bool, _client_certificate: Option<Secret<String>>, _client_certificate_key: Option<Secret<String>>, ) -> CustomResult<Client, ApiClientError> { get_base_client(proxy_config, should_bypass_proxy) // match (client_certificate, client_certificate_key) { // (Some(encoded_certificate), Some(encoded_certificate_key)) => { // let client_builder = get_client_builder(proxy_config, should_bypass_proxy)?; // let identity = create_identity_from_certificate_and_key( // encoded_certificate.clone(), // encoded_certificate_key, // )?; // let certificate_list = create_certificate(encoded_certificate)?; // let client_builder = certificate_list // .into_iter() // .fold(client_builder, |client_builder, certificate| { // client_builder.add_root_certificate(certificate) // }); // client_builder // .identity(identity) // .use_rustls_tls() // .build() // .change_context(ApiClientError::ClientConstructionFailed) // .inspect_err(|err| { // info_log( // "ERROR", // &json!(format!( // "Failed to construct client with certificate and certificate key. Error: {:?}", // err // )), // ); // }) // } // _ => , // } } static NON_PROXIED_CLIENT: OnceCell<Client> = OnceCell::new(); static PROXIED_CLIENT: OnceCell<Client> = OnceCell::new();
{ "chunk": null, "crate": "external-services", "enum_name": null, "file_size": null, "for_type": null, "function_name": null, "is_async": null, "is_pub": null, "lines": 50, "method_name": null, "num_enums": null, "num_items": null, "num_structs": null, "repo": "connector-service", "start_line": 700, "struct_name": null, "total_crates": null, "trait_name": null }
connector-service_snippet_-7416499650036175072_725_15
clm
snippet
// connector-service/backend/external-services/src/service.rs // .into_iter() // .fold(client_builder, |client_builder, certificate| { // client_builder.add_root_certificate(certificate) // }); // client_builder // .identity(identity) // .use_rustls_tls() // .build() // .change_context(ApiClientError::ClientConstructionFailed) // .inspect_err(|err| { // info_log( // "ERROR", // &json!(format!( // "Failed to construct client with certificate and certificate key. Error: {:?}", // err
{ "chunk": null, "crate": "external-services", "enum_name": null, "file_size": null, "for_type": null, "function_name": null, "is_async": null, "is_pub": null, "lines": 15, "method_name": null, "num_enums": null, "num_items": null, "num_structs": null, "repo": "connector-service", "start_line": 725, "struct_name": null, "total_crates": null, "trait_name": null }
connector-service_snippet_-7416499650036175072_725_30
clm
snippet
// connector-service/backend/external-services/src/service.rs // .into_iter() // .fold(client_builder, |client_builder, certificate| { // client_builder.add_root_certificate(certificate) // }); // client_builder // .identity(identity) // .use_rustls_tls() // .build() // .change_context(ApiClientError::ClientConstructionFailed) // .inspect_err(|err| { // info_log( // "ERROR", // &json!(format!( // "Failed to construct client with certificate and certificate key. Error: {:?}", // err // )), // ); // }) // } // _ => , // } } static NON_PROXIED_CLIENT: OnceCell<Client> = OnceCell::new(); static PROXIED_CLIENT: OnceCell<Client> = OnceCell::new(); fn get_base_client( proxy_config: &Proxy, should_bypass_proxy: bool, ) -> CustomResult<Client, ApiClientError> {
{ "chunk": null, "crate": "external-services", "enum_name": null, "file_size": null, "for_type": null, "function_name": null, "is_async": null, "is_pub": null, "lines": 30, "method_name": null, "num_enums": null, "num_items": null, "num_structs": null, "repo": "connector-service", "start_line": 725, "struct_name": null, "total_crates": null, "trait_name": null }
connector-service_snippet_-7416499650036175072_725_50
clm
snippet
// connector-service/backend/external-services/src/service.rs // .into_iter() // .fold(client_builder, |client_builder, certificate| { // client_builder.add_root_certificate(certificate) // }); // client_builder // .identity(identity) // .use_rustls_tls() // .build() // .change_context(ApiClientError::ClientConstructionFailed) // .inspect_err(|err| { // info_log( // "ERROR", // &json!(format!( // "Failed to construct client with certificate and certificate key. Error: {:?}", // err // )), // ); // }) // } // _ => , // } } static NON_PROXIED_CLIENT: OnceCell<Client> = OnceCell::new(); static PROXIED_CLIENT: OnceCell<Client> = OnceCell::new(); fn get_base_client( proxy_config: &Proxy, should_bypass_proxy: bool, ) -> CustomResult<Client, ApiClientError> { Ok(if should_bypass_proxy || (proxy_config.http_url.is_none() && proxy_config.https_url.is_none()) { &NON_PROXIED_CLIENT } else { &PROXIED_CLIENT } .get_or_try_init(|| { get_client_builder(proxy_config, should_bypass_proxy)? .build() .change_context(ApiClientError::ClientConstructionFailed) .inspect_err(|err| { info_log( "ERROR", &json!(format!("Failed to construct base client. Error: {:?}", err)), ); }) })? .clone()) }
{ "chunk": null, "crate": "external-services", "enum_name": null, "file_size": null, "for_type": null, "function_name": null, "is_async": null, "is_pub": null, "lines": 50, "method_name": null, "num_enums": null, "num_items": null, "num_structs": null, "repo": "connector-service", "start_line": 725, "struct_name": null, "total_crates": null, "trait_name": null }
connector-service_snippet_-7416499650036175072_750_15
clm
snippet
// connector-service/backend/external-services/src/service.rs fn get_base_client( proxy_config: &Proxy, should_bypass_proxy: bool, ) -> CustomResult<Client, ApiClientError> { Ok(if should_bypass_proxy || (proxy_config.http_url.is_none() && proxy_config.https_url.is_none()) { &NON_PROXIED_CLIENT } else { &PROXIED_CLIENT } .get_or_try_init(|| { get_client_builder(proxy_config, should_bypass_proxy)? .build()
{ "chunk": null, "crate": "external-services", "enum_name": null, "file_size": null, "for_type": null, "function_name": null, "is_async": null, "is_pub": null, "lines": 15, "method_name": null, "num_enums": null, "num_items": null, "num_structs": null, "repo": "connector-service", "start_line": 750, "struct_name": null, "total_crates": null, "trait_name": null }
connector-service_snippet_-7416499650036175072_750_30
clm
snippet
// connector-service/backend/external-services/src/service.rs fn get_base_client( proxy_config: &Proxy, should_bypass_proxy: bool, ) -> CustomResult<Client, ApiClientError> { Ok(if should_bypass_proxy || (proxy_config.http_url.is_none() && proxy_config.https_url.is_none()) { &NON_PROXIED_CLIENT } else { &PROXIED_CLIENT } .get_or_try_init(|| { get_client_builder(proxy_config, should_bypass_proxy)? .build() .change_context(ApiClientError::ClientConstructionFailed) .inspect_err(|err| { info_log( "ERROR", &json!(format!("Failed to construct base client. Error: {:?}", err)), ); }) })? .clone()) } fn load_custom_ca_certificate_from_content( mut client_builder: reqwest::ClientBuilder, cert_content: &str, ) -> CustomResult<reqwest::ClientBuilder, ApiClientError> {
{ "chunk": null, "crate": "external-services", "enum_name": null, "file_size": null, "for_type": null, "function_name": null, "is_async": null, "is_pub": null, "lines": 30, "method_name": null, "num_enums": null, "num_items": null, "num_structs": null, "repo": "connector-service", "start_line": 750, "struct_name": null, "total_crates": null, "trait_name": null }
connector-service_snippet_-7416499650036175072_750_50
clm
snippet
// connector-service/backend/external-services/src/service.rs fn get_base_client( proxy_config: &Proxy, should_bypass_proxy: bool, ) -> CustomResult<Client, ApiClientError> { Ok(if should_bypass_proxy || (proxy_config.http_url.is_none() && proxy_config.https_url.is_none()) { &NON_PROXIED_CLIENT } else { &PROXIED_CLIENT } .get_or_try_init(|| { get_client_builder(proxy_config, should_bypass_proxy)? .build() .change_context(ApiClientError::ClientConstructionFailed) .inspect_err(|err| { info_log( "ERROR", &json!(format!("Failed to construct base client. Error: {:?}", err)), ); }) })? .clone()) } fn load_custom_ca_certificate_from_content( mut client_builder: reqwest::ClientBuilder, cert_content: &str, ) -> CustomResult<reqwest::ClientBuilder, ApiClientError> { let certificate = reqwest::Certificate::from_pem(cert_content.as_bytes()) .change_context(ApiClientError::InvalidProxyConfiguration) .attach_printable("Failed to parse certificate PEM from provided content")?; client_builder = client_builder.add_root_certificate(certificate); Ok(client_builder) } fn get_client_builder( proxy_config: &Proxy, should_bypass_proxy: bool, ) -> CustomResult<reqwest::ClientBuilder, ApiClientError> { let mut client_builder = Client::builder() .redirect(reqwest::redirect::Policy::none()) .pool_idle_timeout(Duration::from_secs( proxy_config .idle_pool_connection_timeout .unwrap_or_default(), )); if should_bypass_proxy {
{ "chunk": null, "crate": "external-services", "enum_name": null, "file_size": null, "for_type": null, "function_name": null, "is_async": null, "is_pub": null, "lines": 50, "method_name": null, "num_enums": null, "num_items": null, "num_structs": null, "repo": "connector-service", "start_line": 750, "struct_name": null, "total_crates": null, "trait_name": null }
connector-service_snippet_-7416499650036175072_775_15
clm
snippet
// connector-service/backend/external-services/src/service.rs fn load_custom_ca_certificate_from_content( mut client_builder: reqwest::ClientBuilder, cert_content: &str, ) -> CustomResult<reqwest::ClientBuilder, ApiClientError> { let certificate = reqwest::Certificate::from_pem(cert_content.as_bytes()) .change_context(ApiClientError::InvalidProxyConfiguration) .attach_printable("Failed to parse certificate PEM from provided content")?; client_builder = client_builder.add_root_certificate(certificate); Ok(client_builder) } fn get_client_builder( proxy_config: &Proxy, should_bypass_proxy: bool,
{ "chunk": null, "crate": "external-services", "enum_name": null, "file_size": null, "for_type": null, "function_name": null, "is_async": null, "is_pub": null, "lines": 15, "method_name": null, "num_enums": null, "num_items": null, "num_structs": null, "repo": "connector-service", "start_line": 775, "struct_name": null, "total_crates": null, "trait_name": null }
connector-service_snippet_-7416499650036175072_775_30
clm
snippet
// connector-service/backend/external-services/src/service.rs fn load_custom_ca_certificate_from_content( mut client_builder: reqwest::ClientBuilder, cert_content: &str, ) -> CustomResult<reqwest::ClientBuilder, ApiClientError> { let certificate = reqwest::Certificate::from_pem(cert_content.as_bytes()) .change_context(ApiClientError::InvalidProxyConfiguration) .attach_printable("Failed to parse certificate PEM from provided content")?; client_builder = client_builder.add_root_certificate(certificate); Ok(client_builder) } fn get_client_builder( proxy_config: &Proxy, should_bypass_proxy: bool, ) -> CustomResult<reqwest::ClientBuilder, ApiClientError> { let mut client_builder = Client::builder() .redirect(reqwest::redirect::Policy::none()) .pool_idle_timeout(Duration::from_secs( proxy_config .idle_pool_connection_timeout .unwrap_or_default(), )); if should_bypass_proxy { return Ok(client_builder); } // Attach MITM certificate if enabled if proxy_config.mitm_proxy_enabled {
{ "chunk": null, "crate": "external-services", "enum_name": null, "file_size": null, "for_type": null, "function_name": null, "is_async": null, "is_pub": null, "lines": 30, "method_name": null, "num_enums": null, "num_items": null, "num_structs": null, "repo": "connector-service", "start_line": 775, "struct_name": null, "total_crates": null, "trait_name": null }
connector-service_snippet_-7416499650036175072_775_50
clm
snippet
// connector-service/backend/external-services/src/service.rs fn load_custom_ca_certificate_from_content( mut client_builder: reqwest::ClientBuilder, cert_content: &str, ) -> CustomResult<reqwest::ClientBuilder, ApiClientError> { let certificate = reqwest::Certificate::from_pem(cert_content.as_bytes()) .change_context(ApiClientError::InvalidProxyConfiguration) .attach_printable("Failed to parse certificate PEM from provided content")?; client_builder = client_builder.add_root_certificate(certificate); Ok(client_builder) } fn get_client_builder( proxy_config: &Proxy, should_bypass_proxy: bool, ) -> CustomResult<reqwest::ClientBuilder, ApiClientError> { let mut client_builder = Client::builder() .redirect(reqwest::redirect::Policy::none()) .pool_idle_timeout(Duration::from_secs( proxy_config .idle_pool_connection_timeout .unwrap_or_default(), )); if should_bypass_proxy { return Ok(client_builder); } // Attach MITM certificate if enabled if proxy_config.mitm_proxy_enabled { if let Some(cert_content) = &proxy_config.mitm_ca_cert { if !cert_content.trim().is_empty() { client_builder = load_custom_ca_certificate_from_content(client_builder, cert_content.trim())?; } } } // Proxy all HTTPS traffic through the configured HTTPS proxy if let Some(url) = proxy_config.https_url.as_ref() { client_builder = client_builder.proxy( reqwest::Proxy::https(url) .change_context(ApiClientError::InvalidProxyConfiguration) .inspect_err(|err| { info_log( "PROXY_ERROR", &json!(format!("HTTPS proxy configuration error. Error: {:?}", err)), ); })?, );
{ "chunk": null, "crate": "external-services", "enum_name": null, "file_size": null, "for_type": null, "function_name": null, "is_async": null, "is_pub": null, "lines": 50, "method_name": null, "num_enums": null, "num_items": null, "num_structs": null, "repo": "connector-service", "start_line": 775, "struct_name": null, "total_crates": null, "trait_name": null }
connector-service_snippet_-7416499650036175072_800_15
clm
snippet
// connector-service/backend/external-services/src/service.rs return Ok(client_builder); } // Attach MITM certificate if enabled if proxy_config.mitm_proxy_enabled { if let Some(cert_content) = &proxy_config.mitm_ca_cert { if !cert_content.trim().is_empty() { client_builder = load_custom_ca_certificate_from_content(client_builder, cert_content.trim())?; } } } // Proxy all HTTPS traffic through the configured HTTPS proxy if let Some(url) = proxy_config.https_url.as_ref() {
{ "chunk": null, "crate": "external-services", "enum_name": null, "file_size": null, "for_type": null, "function_name": null, "is_async": null, "is_pub": null, "lines": 15, "method_name": null, "num_enums": null, "num_items": null, "num_structs": null, "repo": "connector-service", "start_line": 800, "struct_name": null, "total_crates": null, "trait_name": null }
connector-service_snippet_-7416499650036175072_800_30
clm
snippet
// connector-service/backend/external-services/src/service.rs return Ok(client_builder); } // Attach MITM certificate if enabled if proxy_config.mitm_proxy_enabled { if let Some(cert_content) = &proxy_config.mitm_ca_cert { if !cert_content.trim().is_empty() { client_builder = load_custom_ca_certificate_from_content(client_builder, cert_content.trim())?; } } } // Proxy all HTTPS traffic through the configured HTTPS proxy if let Some(url) = proxy_config.https_url.as_ref() { client_builder = client_builder.proxy( reqwest::Proxy::https(url) .change_context(ApiClientError::InvalidProxyConfiguration) .inspect_err(|err| { info_log( "PROXY_ERROR", &json!(format!("HTTPS proxy configuration error. Error: {:?}", err)), ); })?, ); } // Proxy all HTTP traffic through the configured HTTP proxy if let Some(url) = proxy_config.http_url.as_ref() { client_builder = client_builder.proxy(
{ "chunk": null, "crate": "external-services", "enum_name": null, "file_size": null, "for_type": null, "function_name": null, "is_async": null, "is_pub": null, "lines": 30, "method_name": null, "num_enums": null, "num_items": null, "num_structs": null, "repo": "connector-service", "start_line": 800, "struct_name": null, "total_crates": null, "trait_name": null }
connector-service_snippet_-7416499650036175072_800_50
clm
snippet
// connector-service/backend/external-services/src/service.rs return Ok(client_builder); } // Attach MITM certificate if enabled if proxy_config.mitm_proxy_enabled { if let Some(cert_content) = &proxy_config.mitm_ca_cert { if !cert_content.trim().is_empty() { client_builder = load_custom_ca_certificate_from_content(client_builder, cert_content.trim())?; } } } // Proxy all HTTPS traffic through the configured HTTPS proxy if let Some(url) = proxy_config.https_url.as_ref() { client_builder = client_builder.proxy( reqwest::Proxy::https(url) .change_context(ApiClientError::InvalidProxyConfiguration) .inspect_err(|err| { info_log( "PROXY_ERROR", &json!(format!("HTTPS proxy configuration error. Error: {:?}", err)), ); })?, ); } // Proxy all HTTP traffic through the configured HTTP proxy if let Some(url) = proxy_config.http_url.as_ref() { client_builder = client_builder.proxy( reqwest::Proxy::http(url) .change_context(ApiClientError::InvalidProxyConfiguration) .inspect_err(|err| { info_log( "PROXY_ERROR", &json!(format!("HTTP proxy configuration error. Error: {:?}", err)), ); })?, ); } Ok(client_builder) } // pub fn create_identity_from_certificate_and_key( // encoded_certificate: hyperswitch_masking::Secret<String>, // encoded_certificate_key: hyperswitch_masking::Secret<String>, // ) -> Result<reqwest::Identity, error_stack::Report<ApiClientError>> { // let decoded_certificate = BASE64_ENGINE // .decode(encoded_certificate.expose())
{ "chunk": null, "crate": "external-services", "enum_name": null, "file_size": null, "for_type": null, "function_name": null, "is_async": null, "is_pub": null, "lines": 50, "method_name": null, "num_enums": null, "num_items": null, "num_structs": null, "repo": "connector-service", "start_line": 800, "struct_name": null, "total_crates": null, "trait_name": null }
connector-service_snippet_-7416499650036175072_825_15
clm
snippet
// connector-service/backend/external-services/src/service.rs } // Proxy all HTTP traffic through the configured HTTP proxy if let Some(url) = proxy_config.http_url.as_ref() { client_builder = client_builder.proxy( reqwest::Proxy::http(url) .change_context(ApiClientError::InvalidProxyConfiguration) .inspect_err(|err| { info_log( "PROXY_ERROR", &json!(format!("HTTP proxy configuration error. Error: {:?}", err)), ); })?, ); }
{ "chunk": null, "crate": "external-services", "enum_name": null, "file_size": null, "for_type": null, "function_name": null, "is_async": null, "is_pub": null, "lines": 15, "method_name": null, "num_enums": null, "num_items": null, "num_structs": null, "repo": "connector-service", "start_line": 825, "struct_name": null, "total_crates": null, "trait_name": null }
connector-service_snippet_-7416499650036175072_825_30
clm
snippet
// connector-service/backend/external-services/src/service.rs } // Proxy all HTTP traffic through the configured HTTP proxy if let Some(url) = proxy_config.http_url.as_ref() { client_builder = client_builder.proxy( reqwest::Proxy::http(url) .change_context(ApiClientError::InvalidProxyConfiguration) .inspect_err(|err| { info_log( "PROXY_ERROR", &json!(format!("HTTP proxy configuration error. Error: {:?}", err)), ); })?, ); } Ok(client_builder) } // pub fn create_identity_from_certificate_and_key( // encoded_certificate: hyperswitch_masking::Secret<String>, // encoded_certificate_key: hyperswitch_masking::Secret<String>, // ) -> Result<reqwest::Identity, error_stack::Report<ApiClientError>> { // let decoded_certificate = BASE64_ENGINE // .decode(encoded_certificate.expose()) // .change_context(ApiClientError::CertificateDecodeFailed)?; // let decoded_certificate_key = BASE64_ENGINE // .decode(encoded_certificate_key.expose()) // .change_context(ApiClientError::CertificateDecodeFailed)?;
{ "chunk": null, "crate": "external-services", "enum_name": null, "file_size": null, "for_type": null, "function_name": null, "is_async": null, "is_pub": null, "lines": 30, "method_name": null, "num_enums": null, "num_items": null, "num_structs": null, "repo": "connector-service", "start_line": 825, "struct_name": null, "total_crates": null, "trait_name": null }
connector-service_snippet_-7416499650036175072_825_50
clm
snippet
// connector-service/backend/external-services/src/service.rs } // Proxy all HTTP traffic through the configured HTTP proxy if let Some(url) = proxy_config.http_url.as_ref() { client_builder = client_builder.proxy( reqwest::Proxy::http(url) .change_context(ApiClientError::InvalidProxyConfiguration) .inspect_err(|err| { info_log( "PROXY_ERROR", &json!(format!("HTTP proxy configuration error. Error: {:?}", err)), ); })?, ); } Ok(client_builder) } // pub fn create_identity_from_certificate_and_key( // encoded_certificate: hyperswitch_masking::Secret<String>, // encoded_certificate_key: hyperswitch_masking::Secret<String>, // ) -> Result<reqwest::Identity, error_stack::Report<ApiClientError>> { // let decoded_certificate = BASE64_ENGINE // .decode(encoded_certificate.expose()) // .change_context(ApiClientError::CertificateDecodeFailed)?; // let decoded_certificate_key = BASE64_ENGINE // .decode(encoded_certificate_key.expose()) // .change_context(ApiClientError::CertificateDecodeFailed)?; // let certificate = String::from_utf8(decoded_certificate) // .change_context(ApiClientError::CertificateDecodeFailed)?; // let certificate_key = String::from_utf8(decoded_certificate_key) // .change_context(ApiClientError::CertificateDecodeFailed)?; // let key_chain = format!("{}{}", certificate_key, certificate); // reqwest::Identity::from_pem(key_chain.as_bytes()) // .change_context(ApiClientError::CertificateDecodeFailed) // } // pub fn create_certificate( // encoded_certificate: hyperswitch_masking::Secret<String>, // ) -> Result<Vec<reqwest::Certificate>, error_stack::Report<ApiClientError>> { // let decoded_certificate = BASE64_ENGINE // .decode(encoded_certificate.expose()) // .change_context(ApiClientError::CertificateDecodeFailed)?; // let certificate = String::from_utf8(decoded_certificate)
{ "chunk": null, "crate": "external-services", "enum_name": null, "file_size": null, "for_type": null, "function_name": null, "is_async": null, "is_pub": null, "lines": 50, "method_name": null, "num_enums": null, "num_items": null, "num_structs": null, "repo": "connector-service", "start_line": 825, "struct_name": null, "total_crates": null, "trait_name": null }