tercul-backend/internal/platform/openlibrary/client.go
Damir Mukimov 24d48396ca
Update GitHub Actions workflows to 2025 best practices (#29)
* Fix workflow triggers to use 'main' branch instead of 'master'

* Switch to semantic version tags for GitHub Actions instead of SHAs for better maintainability

* Fix golangci-lint by adding go mod tidy and specifying paths ./... for linting

* feat: Restructure workflows following Single Responsibility Principle

- Remove old monolithic workflows (ci.yml, ci-cd.yml, cd.yml)
- Add focused workflows: lint.yml, test.yml, build.yml, security.yml, docker-build.yml, deploy.yml
- Each workflow has a single, clear responsibility
- Follow 2025 best practices with semantic versioning, OIDC auth, build attestations
- Add comprehensive README.md with workflow documentation
- Configure Dependabot for automated dependency updates

Workflows now run independently and can be triggered separately for better CI/CD control.

* fix: Resolve CI/CD workflow failures and GraphQL integration test issues

- Fix Application struct mismatch in application_builder.go
- Add global config.Cfg variable and BleveIndexPath field
- Regenerate GraphQL code to fix ProcessArgField errors
- Add search.InitBleve() call in main.go
- Fix all errcheck issues (12 total) in main.go files and test files
- Fix staticcheck issues (deprecated handler.NewDefaultServer, tagged switch)
- Remove all unused code (50 unused items including mock implementations)
- Fix GraphQL 'transport not supported' error in integration tests
- Add comprehensive database cleanup for integration tests
- Update GraphQL server setup with proper error presenter

* feat: Complete backend CI/CD workflow setup

- Add comprehensive GitHub Actions workflows for Go backend
- Build workflow with binary compilation and attestation
- Test workflow with coverage reporting and race detection
- Lint workflow with golangci-lint and security scanning
- Docker build workflow with multi-architecture support
- Deploy workflow for production deployment
- Security workflow with vulnerability scanning
- All workflows follow Single Responsibility Principle
- Use semantic versioning and latest action versions
- Enable security features: OIDC auth, attestations, minimal permissions

* fix: correct Go build path to ./cmd/api

- Fix build workflow to target ./cmd/api instead of ./cmd
- The main.go file is located in cmd/api/ subdirectory

* fix: correct Dockerfile build path to ./cmd/api

- Fix Docker build to target ./cmd/api instead of root directory
- The main.go file is located in cmd/api/ subdirectory
2025-11-27 07:08:08 +01:00

61 lines
1.5 KiB
Go

package openlibrary
import (
"context"
"encoding/json"
"fmt"
"net/http"
"time"
)
const baseURL = "https://openlibrary.org"
// Client is a client for the Open Library API.
type Client struct {
httpClient *http.Client
}
// NewClient creates a new Open Library client.
func NewClient() *Client {
return &Client{
httpClient: &http.Client{Timeout: 10 * time.Second},
}
}
// Author represents the data returned from the Open Library Authors API.
type Author struct {
Name string `json:"name"`
PersonalName string `json:"personal_name"`
Bio interface{} `json:"bio"` // Bio can be a string or a struct
Wikipedia string `json:"wikipedia"`
}
// GetAuthor fetches author data from the Open Library API.
// The olid is the Open Library Author ID (e.g., "OL23919A").
func (c *Client) GetAuthor(ctx context.Context, olid string) (*Author, error) {
url := fmt.Sprintf("%s/authors/%s.json", baseURL, olid)
req, err := http.NewRequestWithContext(ctx, "GET", url, nil)
if err != nil {
return nil, err
}
req.Header.Set("User-Agent", "TerculEnrichmentTool/1.0 (contact@tercul.com)")
resp, err := c.httpClient.Do(req)
if err != nil {
return nil, err
}
defer func() { _ = resp.Body.Close() }()
if resp.StatusCode != http.StatusOK {
return nil, fmt.Errorf("unexpected status code: %d", resp.StatusCode)
}
var author Author
if err := json.NewDecoder(resp.Body).Decode(&author); err != nil {
return nil, err
}
return &author, nil
}