-
Notifications
You must be signed in to change notification settings - Fork 2.3k
/
extension.go
100 lines (84 loc) · 3.11 KB
/
extension.go
1
2
3
4
5
6
7
8
9
10
11
12
13
14
15
16
17
18
19
20
21
22
23
24
25
26
27
28
29
30
31
32
33
34
35
36
37
38
39
40
41
42
43
44
45
46
47
48
49
50
51
52
53
54
55
56
57
58
59
60
61
62
63
64
65
66
67
68
69
70
71
72
73
74
75
76
77
78
79
80
81
82
83
84
85
86
87
88
89
90
91
92
93
94
95
96
97
98
99
100
// Copyright The OpenTelemetry Authors
//
// Licensed under the Apache License, Version 2.0 (the "License");
// you may not use this file except in compliance with the License.
// You may obtain a copy of the License at
//
// http://www.apache.org/licenses/LICENSE-2.0
//
// Unless required by applicable law or agreed to in writing, software
// distributed under the License is distributed on an "AS IS" BASIS,
// WITHOUT WARRANTIES OR CONDITIONS OF ANY KIND, either express or implied.
// See the License for the specific language governing permissions and
// limitations under the License.
package asapauthextension // import "github.com/open-telemetry/opentelemetry-collector-contrib/extension/asapauthextension"
import (
"context"
"fmt"
"net/http"
asap "bitbucket.org/atlassian/go-asap/v2"
"github.com/SermoDigital/jose/crypto"
"go.opentelemetry.io/collector/component"
"go.opentelemetry.io/collector/config/configauth"
"google.golang.org/grpc/credentials"
)
// ASAPClientAuthenticator implements ClientAuthenticator
type ASAPClientAuthenticator struct {
provisioner asap.Provisioner
privateKey interface{}
}
var _ configauth.ClientAuthenticator = (*ASAPClientAuthenticator)(nil)
func (a ASAPClientAuthenticator) RoundTripper(base http.RoundTripper) (http.RoundTripper, error) {
return asap.NewTransportDecorator(a.provisioner, a.privateKey)(base), nil
}
func (a ASAPClientAuthenticator) PerRPCCredentials() (credentials.PerRPCCredentials, error) {
return &PerRPCAuth{
authenticator: a,
}, nil
}
// Start does nothing and returns nil
func (a ASAPClientAuthenticator) Start(_ context.Context, _ component.Host) error {
return nil
}
// Shutdown does nothing and returns nil
func (a ASAPClientAuthenticator) Shutdown(_ context.Context) error {
return nil
}
func createASAPClientAuthenticator(cfg *Config) (ASAPClientAuthenticator, error) {
var a ASAPClientAuthenticator
pk, err := asap.NewPrivateKey([]byte(cfg.PrivateKey))
if err != nil {
return a, err
}
// Caching provisioner will only issue a new token after the current token's expiry (determined by TTL).
p := asap.NewCachingProvisioner(asap.NewProvisioner(
cfg.KeyID, cfg.TTL, cfg.Issuer, cfg.Audience, crypto.SigningMethodRS256))
return ASAPClientAuthenticator{
provisioner: p,
privateKey: pk,
}, nil
}
var _ credentials.PerRPCCredentials = (*PerRPCAuth)(nil)
// PerRPCAuth is a gRPC credentials.PerRPCCredentials implementation that returns an 'authorization' header.
type PerRPCAuth struct {
authenticator ASAPClientAuthenticator
}
// GetRequestMetadata returns the request metadata to be used with the RPC.
func (c *PerRPCAuth) GetRequestMetadata(context.Context, ...string) (map[string]string, error) {
token, err := c.authenticator.provisioner.Provision()
if err != nil {
return nil, err
}
headerValue, err := token.Serialize(c.authenticator.privateKey)
if err != nil {
return nil, err
}
header := map[string]string{
"authorization": fmt.Sprintf("Bearer %s", string(headerValue)),
}
return header, nil
}
// RequireTransportSecurity always returns true for this implementation.
func (*PerRPCAuth) RequireTransportSecurity() bool {
return true
}