-
Notifications
You must be signed in to change notification settings - Fork 1.6k
/
Copy pathconfigauth.go
59 lines (50 loc) · 2.37 KB
/
configauth.go
1
2
3
4
5
6
7
8
9
10
11
12
13
14
15
16
17
18
19
20
21
22
23
24
25
26
27
28
29
30
31
32
33
34
35
36
37
38
39
40
41
42
43
44
45
46
47
48
49
50
51
52
53
54
55
56
57
58
59
// Copyright The OpenTelemetry Authors
// SPDX-License-Identifier: Apache-2.0
// Package configauth implements the configuration settings to
// ensure authentication on incoming requests, and allows
// exporters to add authentication on outgoing requests.
package configauth // import "go.opentelemetry.io/collector/config/configauth"
import (
"context"
"errors"
"fmt"
"go.opentelemetry.io/collector/component"
"go.opentelemetry.io/collector/extension/auth"
)
var (
errAuthenticatorNotFound = errors.New("authenticator not found")
errNotClient = errors.New("requested authenticator is not a client authenticator")
errNotServer = errors.New("requested authenticator is not a server authenticator")
)
// Authentication defines the auth settings for the receiver.
type Authentication struct {
// AuthenticatorID specifies the name of the extension to use in order to authenticate the incoming data point.
AuthenticatorID component.ID `mapstructure:"authenticator"`
}
// NewDefaultAuthentication returns a default authentication configuration.
func NewDefaultAuthentication() *Authentication {
return &Authentication{}
}
// GetServerAuthenticator attempts to select the appropriate auth.Server from the list of extensions,
// based on the requested extension name. If an authenticator is not found, an error is returned.
func (a Authentication) GetServerAuthenticator(_ context.Context, extensions map[component.ID]component.Component) (auth.Server, error) {
if ext, found := extensions[a.AuthenticatorID]; found {
if server, ok := ext.(auth.Server); ok {
return server, nil
}
return nil, errNotServer
}
return nil, fmt.Errorf("failed to resolve authenticator %q: %w", a.AuthenticatorID, errAuthenticatorNotFound)
}
// GetClientAuthenticator attempts to select the appropriate auth.Client from the list of extensions,
// based on the component id of the extension. If an authenticator is not found, an error is returned.
// This should be only used by HTTP clients.
func (a Authentication) GetClientAuthenticator(_ context.Context, extensions map[component.ID]component.Component) (auth.Client, error) {
if ext, found := extensions[a.AuthenticatorID]; found {
if client, ok := ext.(auth.Client); ok {
return client, nil
}
return nil, errNotClient
}
return nil, fmt.Errorf("failed to resolve authenticator %q: %w", a.AuthenticatorID, errAuthenticatorNotFound)
}