Skip to content
New issue

Have a question about this project? Sign up for a free GitHub account to open an issue and contact its maintainers and the community.

By clicking “Sign up for GitHub”, you agree to our terms of service and privacy statement. We’ll occasionally send you account related emails.

Already on GitHub? Sign in to your account

[extensionauth] Split extensionauth.Client by protocol type #12574

Merged
merged 10 commits into from
Mar 12, 2025
Merged
Show file tree
Hide file tree
Changes from all commits
Commits
File filter

Filter by extension

Filter by extension


Conversations
Failed to load comments.
Loading
Jump to
Jump to file
Failed to load files.
Loading
Diff view
Diff view
26 changes: 26 additions & 0 deletions .chloggen/mx-psi_extensionauth-refactor-2.yaml
Original file line number Diff line number Diff line change
@@ -0,0 +1,26 @@
# Use this changelog template to create an entry for release notes.

# One of 'breaking', 'deprecation', 'new_component', 'enhancement', 'bug_fix'
change_type: deprecation

# The name of the component, or a single word describing the area of concern, (e.g. otlpreceiver)
component: extensionauth

# A brief description of the change. Surround your text with quotes ("") if it needs to start with a backtick (`).
note: Deprecate `extensionauth.NewClient` and `extensionauth.NewServer`.

# One or more tracking issues or pull requests related to the change
issues: [12574]

# (Optional) One or more lines of additional information to render under the primary note.
# These lines will be padded with 2 spaces and then inserted directly into the document.
# Use pipe (|) for multiline entries.
subtext: |
- Manually implement the interfaces instead.

# Optional: The change log or logs in which this entry should be included.
# e.g. '[user]' or '[user, api]'
# Include 'user' if the change is relevant to end users.
# Include 'api' if there is a change to a library API.
# Default: '[user]'
change_logs: [api]
26 changes: 26 additions & 0 deletions .chloggen/mx-psi_extensionauth-refactor.yaml
Original file line number Diff line number Diff line change
@@ -0,0 +1,26 @@
# Use this changelog template to create an entry for release notes.

# One of 'breaking', 'deprecation', 'new_component', 'enhancement', 'bug_fix'
change_type: deprecation

# The name of the component, or a single word describing the area of concern, (e.g. otlpreceiver)
component: configauth

# A brief description of the change. Surround your text with quotes ("") if it needs to start with a backtick (`).
note: Deprecate `configauth.Authenticator.GetClientAuthenticator`.

# One or more tracking issues or pull requests related to the change
issues: [12574]

# (Optional) One or more lines of additional information to render under the primary note.
# These lines will be padded with 2 spaces and then inserted directly into the document.
# Use pipe (|) for multiline entries.
subtext: |
- Use the per-protocol methods instead.

# Optional: The change log or logs in which this entry should be included.
# e.g. '[user]' or '[user, api]'
# Include 'user' if the change is relevant to end users.
# Include 'api' if there is a change to a library API.
# Default: '[user]'
change_logs: [api]
4 changes: 3 additions & 1 deletion .chloggen/mx-psi_seal-them-all.yaml
Original file line number Diff line number Diff line change
Expand Up @@ -16,7 +16,9 @@ issues: [12567]
# These lines will be padded with 2 spaces and then inserted directly into the document.
# Use pipe (|) for multiline entries.
subtext: |
Use the standard `extensionauth.NewClient` constructor to create a client with a specific mock implementation. Use `extensionauthtest.NewErrorClient` to create a client that always returns an error.
- Use `extensionauthtest.NewNopClient` to create a client with a noop implementation.
- Use `extensionauthtest.NewErrorClient` to create a client that always returns an error.
- Implement the `extensionauth` interfaces for custom mock client implementations.

# Optional: The change log or logs in which this entry should be included.
# e.g. '[user]' or '[user, api]'
Expand Down
30 changes: 29 additions & 1 deletion config/configauth/configauth.go
Original file line number Diff line number Diff line change
Expand Up @@ -18,6 +18,8 @@
var (
errAuthenticatorNotFound = errors.New("authenticator not found")
errNotClient = errors.New("requested authenticator is not a client authenticator")
errNotHTTPClient = errors.New("requested authenticator is not a HTTP client authenticator")
errNotGRPCClient = errors.New("requested authenticator is not a gRPC client authenticator")
errNotServer = errors.New("requested authenticator is not a server authenticator")
)

Expand All @@ -42,7 +44,7 @@

// GetClientAuthenticator attempts to select the appropriate extensionauth.Client from the list of extensions,
// based on the component id of the extension. If an authenticator is not found, an error is returned.
// This should be only used by HTTP clients.
// Deprecated: [v0.122.0] Use GetHTTPClientAuthenticator or GetGRPCClientAuthenticator instead.
func (a Authentication) GetClientAuthenticator(_ context.Context, extensions map[component.ID]component.Component) (extensionauth.Client, error) {
if ext, found := extensions[a.AuthenticatorID]; found {
if client, ok := ext.(extensionauth.Client); ok {
Expand All @@ -52,3 +54,29 @@
}
return nil, fmt.Errorf("failed to resolve authenticator %q: %w", a.AuthenticatorID, errAuthenticatorNotFound)
}

// GetHTTPClientAuthenticator attempts to select the appropriate extensionauth.Client from the list of extensions,
// based on the component id of the extension. If an authenticator is not found, an error is returned.
// This should be only used by HTTP clients.
func (a Authentication) GetHTTPClientAuthenticator(_ context.Context, extensions map[component.ID]component.Component) (extensionauth.HTTPClient, error) {
if ext, found := extensions[a.AuthenticatorID]; found {
if client, ok := ext.(extensionauth.HTTPClient); ok {
return client, nil
}
return nil, errNotHTTPClient
}
return nil, fmt.Errorf("failed to resolve authenticator %q: %w", a.AuthenticatorID, errAuthenticatorNotFound)

Check warning on line 68 in config/configauth/configauth.go

View check run for this annotation

Codecov / codecov/patch

config/configauth/configauth.go#L68

Added line #L68 was not covered by tests
}

// GetGRPCClientAuthenticator attempts to select the appropriate extensionauth.Client from the list of extensions,
// based on the component id of the extension. If an authenticator is not found, an error is returned.
// This should be only used by gRPC clients.
func (a Authentication) GetGRPCClientAuthenticator(_ context.Context, extensions map[component.ID]component.Component) (extensionauth.GRPCClient, error) {
if ext, found := extensions[a.AuthenticatorID]; found {
if client, ok := ext.(extensionauth.GRPCClient); ok {
return client, nil
}
return nil, errNotGRPCClient

Check warning on line 79 in config/configauth/configauth.go

View check run for this annotation

Codecov / codecov/patch

config/configauth/configauth.go#L76-L79

Added lines #L76 - L79 were not covered by tests
}
return nil, fmt.Errorf("failed to resolve authenticator %q: %w", a.AuthenticatorID, errAuthenticatorNotFound)
}
45 changes: 15 additions & 30 deletions config/configauth/configauth_test.go
Original file line number Diff line number Diff line change
Expand Up @@ -12,37 +12,26 @@ import (

"go.opentelemetry.io/collector/component"
"go.opentelemetry.io/collector/extension"
"go.opentelemetry.io/collector/extension/extensionauth"
"go.opentelemetry.io/collector/extension/extensionauth/extensionauthtest"
)

var mockID = component.MustNewID("mock")

func must[T any](t *testing.T, builder func() (T, error)) T {
t.Helper()
thing, err := builder()
require.NoError(t, err)
return thing
}

func TestGetServer(t *testing.T) {
testCases := []struct {
name string
authenticator extension.Extension
expected error
}{
{
name: "obtain server authenticator",
authenticator: must(t, func() (extension.Extension, error) {
return extensionauth.NewServer()
}),
expected: nil,
name: "obtain server authenticator",
authenticator: extensionauthtest.NewNopServer(),
expected: nil,
},
{
name: "not a server authenticator",
authenticator: must(t, func() (extension.Extension, error) {
return extensionauth.NewClient()
}),
expected: errNotServer,
name: "not a server authenticator",
authenticator: extensionauthtest.NewNopClient(),
expected: errNotServer,
},
}
for _, tt := range testCases {
Expand Down Expand Up @@ -86,18 +75,14 @@ func TestGetClient(t *testing.T) {
expected error
}{
{
name: "obtain client authenticator",
authenticator: must(t, func() (extension.Extension, error) {
return extensionauth.NewClient()
}),
expected: nil,
name: "obtain client authenticator",
authenticator: extensionauthtest.NewNopClient(),
expected: nil,
},
{
name: "not a client authenticator",
authenticator: must(t, func() (extension.Extension, error) {
return extensionauth.NewServer()
}),
expected: errNotClient,
name: "not a client authenticator",
authenticator: extensionauthtest.NewNopServer(),
expected: errNotHTTPClient,
},
}
for _, tt := range testCases {
Expand All @@ -110,7 +95,7 @@ func TestGetClient(t *testing.T) {
mockID: tt.authenticator,
}

authenticator, err := cfg.GetClientAuthenticator(context.Background(), ext)
authenticator, err := cfg.GetHTTPClientAuthenticator(context.Background(), ext)

// verify
if tt.expected != nil {
Expand All @@ -128,7 +113,7 @@ func TestGetClientFails(t *testing.T) {
cfg := &Authentication{
AuthenticatorID: component.MustNewID("does_not_exist"),
}
authenticator, err := cfg.GetClientAuthenticator(context.Background(), map[component.ID]component.Component{})
authenticator, err := cfg.GetGRPCClientAuthenticator(context.Background(), map[component.ID]component.Component{})
require.ErrorIs(t, err, errAuthenticatorNotFound)
assert.Nil(t, authenticator)
}
3 changes: 3 additions & 0 deletions config/configauth/go.mod
Original file line number Diff line number Diff line change
Expand Up @@ -7,6 +7,7 @@ require (
go.opentelemetry.io/collector/component v1.27.0
go.opentelemetry.io/collector/extension v1.27.0
go.opentelemetry.io/collector/extension/extensionauth v0.121.0
go.opentelemetry.io/collector/extension/extensionauth/extensionauthtest v0.121.0
go.uber.org/goleak v1.3.0
)

Expand Down Expand Up @@ -38,3 +39,5 @@ replace go.opentelemetry.io/collector/component/componenttest => ../../component
replace go.opentelemetry.io/collector/extension => ../../extension

replace go.opentelemetry.io/collector/extension/extensionauth => ../../extension/extensionauth

replace go.opentelemetry.io/collector/extension/extensionauth/extensionauthtest => ../../extension/extensionauth/extensionauthtest
2 changes: 1 addition & 1 deletion config/configgrpc/configgrpc.go
Original file line number Diff line number Diff line change
Expand Up @@ -322,7 +322,7 @@ func (gcs *ClientConfig) getGrpcDialOptions(
return nil, errors.New("no extensions configuration available")
}

grpcAuthenticator, cerr := gcs.Auth.GetClientAuthenticator(ctx, host.GetExtensions())
grpcAuthenticator, cerr := gcs.Auth.GetGRPCClientAuthenticator(ctx, host.GetExtensions())
if cerr != nil {
return nil, cerr
}
Expand Down
43 changes: 23 additions & 20 deletions config/configgrpc/configgrpc_test.go
Original file line number Diff line number Diff line change
Expand Up @@ -29,22 +29,25 @@ import (
"go.opentelemetry.io/collector/config/confignet"
"go.opentelemetry.io/collector/config/configopaque"
"go.opentelemetry.io/collector/config/configtls"
"go.opentelemetry.io/collector/extension"
"go.opentelemetry.io/collector/extension/extensionauth"
"go.opentelemetry.io/collector/extension/extensionauth/extensionauthtest"
"go.opentelemetry.io/collector/pdata/ptrace/ptraceotlp"
)

func mustNewServerAuth(t *testing.T, opts ...extensionauth.ServerOption) extensionauth.Server {
t.Helper()
srv, err := extensionauth.NewServer(opts...)
require.NoError(t, err)
return srv
var (
_ extension.Extension = (*mockAuthServer)(nil)
_ extensionauth.Server = (*mockAuthServer)(nil)
)

type mockAuthServer struct {
component.StartFunc
component.ShutdownFunc
extensionauth.ServerAuthenticateFunc
}

func mustNewClientAuth(t *testing.T, opts ...extensionauth.ClientOption) extensionauth.Client {
t.Helper()
client, err := extensionauth.NewClient(opts...)
require.NoError(t, err)
return client
func newMockAuthServer(auth func(ctx context.Context, sources map[string][]string) (context.Context, error)) extensionauth.Server {
return &mockAuthServer{ServerAuthenticateFunc: auth}
}

func TestNewDefaultKeepaliveClientConfig(t *testing.T) {
Expand Down Expand Up @@ -177,7 +180,7 @@ func TestAllGrpcClientSettings(t *testing.T) {
},
host: &mockHost{
ext: map[component.ID]component.Component{
testAuthID: mustNewClientAuth(t),
testAuthID: extensionauthtest.NewNopClient(),
},
},
},
Expand Down Expand Up @@ -206,7 +209,7 @@ func TestAllGrpcClientSettings(t *testing.T) {
},
host: &mockHost{
ext: map[component.ID]component.Component{
testAuthID: mustNewClientAuth(t),
testAuthID: extensionauthtest.NewNopClient(),
},
},
},
Expand Down Expand Up @@ -235,7 +238,7 @@ func TestAllGrpcClientSettings(t *testing.T) {
},
host: &mockHost{
ext: map[component.ID]component.Component{
testAuthID: mustNewClientAuth(t),
testAuthID: extensionauthtest.NewNopClient(),
},
},
},
Expand Down Expand Up @@ -415,7 +418,7 @@ func TestGrpcServerAuthSettings(t *testing.T) {

host := &mockHost{
ext: map[component.ID]component.Component{
mockID: mustNewServerAuth(t),
mockID: extensionauthtest.NewNopServer(),
},
}
srv, err := gss.ToServer(context.Background(), host, componenttest.NewNopTelemetrySettings())
Expand Down Expand Up @@ -990,7 +993,7 @@ func TestDefaultUnaryInterceptorAuthSucceeded(t *testing.T) {
ctx := metadata.NewIncomingContext(context.Background(), metadata.Pairs("authorization", "some-auth-data"))

// test
res, err := authUnaryServerInterceptor(ctx, nil, &grpc.UnaryServerInfo{}, handler, mustNewServerAuth(t, extensionauth.WithServerAuthenticate(authFunc)))
res, err := authUnaryServerInterceptor(ctx, nil, &grpc.UnaryServerInfo{}, handler, newMockAuthServer(authFunc))

// verify
assert.Nil(t, res)
Expand All @@ -1014,7 +1017,7 @@ func TestDefaultUnaryInterceptorAuthFailure(t *testing.T) {
ctx := metadata.NewIncomingContext(context.Background(), metadata.Pairs("authorization", "some-auth-data"))

// test
res, err := authUnaryServerInterceptor(ctx, nil, &grpc.UnaryServerInfo{}, handler, mustNewServerAuth(t, extensionauth.WithServerAuthenticate(authFunc)))
res, err := authUnaryServerInterceptor(ctx, nil, &grpc.UnaryServerInfo{}, handler, newMockAuthServer(authFunc))

// verify
assert.Nil(t, res)
Expand All @@ -1035,7 +1038,7 @@ func TestDefaultUnaryInterceptorMissingMetadata(t *testing.T) {
}

// test
res, err := authUnaryServerInterceptor(context.Background(), nil, &grpc.UnaryServerInfo{}, handler, mustNewServerAuth(t, extensionauth.WithServerAuthenticate(authFunc)))
res, err := authUnaryServerInterceptor(context.Background(), nil, &grpc.UnaryServerInfo{}, handler, newMockAuthServer(authFunc))

// verify
assert.Nil(t, res)
Expand Down Expand Up @@ -1066,7 +1069,7 @@ func TestDefaultStreamInterceptorAuthSucceeded(t *testing.T) {
}

// test
err := authStreamServerInterceptor(nil, streamServer, &grpc.StreamServerInfo{}, handler, mustNewServerAuth(t, extensionauth.WithServerAuthenticate(authFunc)))
err := authStreamServerInterceptor(nil, streamServer, &grpc.StreamServerInfo{}, handler, newMockAuthServer(authFunc))

// verify
require.NoError(t, err)
Expand All @@ -1092,7 +1095,7 @@ func TestDefaultStreamInterceptorAuthFailure(t *testing.T) {
}

// test
err := authStreamServerInterceptor(nil, streamServer, &grpc.StreamServerInfo{}, handler, mustNewServerAuth(t, extensionauth.WithServerAuthenticate(authFunc)))
err := authStreamServerInterceptor(nil, streamServer, &grpc.StreamServerInfo{}, handler, newMockAuthServer(authFunc))

// verify
require.ErrorContains(t, err, expectedErr.Error()) // unfortunately, grpc errors don't wrap the original ones
Expand All @@ -1115,7 +1118,7 @@ func TestDefaultStreamInterceptorMissingMetadata(t *testing.T) {
}

// test
err := authStreamServerInterceptor(nil, streamServer, &grpc.StreamServerInfo{}, handler, mustNewServerAuth(t, extensionauth.WithServerAuthenticate(authFunc)))
err := authStreamServerInterceptor(nil, streamServer, &grpc.StreamServerInfo{}, handler, newMockAuthServer(authFunc))

// verify
assert.Equal(t, errMetadataNotFound, err)
Expand Down
5 changes: 4 additions & 1 deletion config/configgrpc/go.mod
Original file line number Diff line number Diff line change
Expand Up @@ -13,7 +13,9 @@ require (
go.opentelemetry.io/collector/config/confignet v1.27.0
go.opentelemetry.io/collector/config/configopaque v1.27.0
go.opentelemetry.io/collector/config/configtls v1.27.0
go.opentelemetry.io/collector/extension v1.27.0
go.opentelemetry.io/collector/extension/extensionauth v0.121.0
go.opentelemetry.io/collector/extension/extensionauth/extensionauthtest v0.121.0
go.opentelemetry.io/collector/pdata v1.27.0
go.opentelemetry.io/collector/pdata/testdata v0.121.0
go.opentelemetry.io/contrib/instrumentation/google.golang.org/grpc/otelgrpc v0.60.0
Expand All @@ -36,7 +38,6 @@ require (
github.com/modern-go/reflect2 v1.0.2 // indirect
github.com/pmezard/go-difflib v1.0.0 // indirect
go.opentelemetry.io/auto/sdk v1.1.0 // indirect
go.opentelemetry.io/collector/extension v1.27.0 // indirect
go.opentelemetry.io/collector/pdata/pprofile v0.121.0 // indirect
go.opentelemetry.io/otel/metric v1.35.0 // indirect
go.opentelemetry.io/otel/sdk v1.35.0 // indirect
Expand Down Expand Up @@ -79,3 +80,5 @@ replace go.opentelemetry.io/collector/component => ../../component
replace go.opentelemetry.io/collector/component/componenttest => ../../component/componenttest

replace go.opentelemetry.io/collector/consumer => ../../consumer

replace go.opentelemetry.io/collector/extension/extensionauth/extensionauthtest => ../../extension/extensionauth/extensionauthtest
2 changes: 1 addition & 1 deletion config/confighttp/confighttp.go
Original file line number Diff line number Diff line change
Expand Up @@ -203,7 +203,7 @@ func (hcs *ClientConfig) ToClient(ctx context.Context, host component.Host, sett
return nil, errors.New("extensions configuration not found")
}

httpCustomAuthRoundTripper, aerr := hcs.Auth.GetClientAuthenticator(ctx, ext)
httpCustomAuthRoundTripper, aerr := hcs.Auth.GetHTTPClientAuthenticator(ctx, ext)
if aerr != nil {
return nil, aerr
}
Expand Down
Loading
Loading