| // Licensed to the Apache Software Foundation (ASF) under one |
| // or more contributor license agreements. See the NOTICE file |
| // distributed with this work for additional information |
| // regarding copyright ownership. The ASF licenses this file |
| // to you under the Apache License, Version 2.0 (the |
| // "License"); you may not use this file except in compliance |
| // with the License. You may obtain a copy of the License at |
| // |
| // http://www.apache.org/licenses/LICENSE-2.0 |
| // |
| // Unless required by applicable law or agreed to in writing, |
| // software distributed under the License is distributed on an |
| // "AS IS" BASIS, WITHOUT WARRANTIES OR CONDITIONS OF ANY |
| // KIND, either express or implied. See the License for the |
| // specific language governing permissions and limitations |
| // under the License. |
| |
| package auth |
| |
| import ( |
| "net/http" |
| |
| "github.com/apache/pulsar-client-go/oauth2" |
| |
| "github.com/apache/pulsar-client-go/pulsaradmin/pkg/admin/config" |
| ) |
| |
| // Provider provide a general method to add auth message |
| type Provider interface { |
| RoundTrip(req *http.Request) (*http.Response, error) |
| Transport() http.RoundTripper |
| WithTransport(tripper http.RoundTripper) |
| } |
| |
| type DefaultProvider struct { |
| transport http.RoundTripper |
| } |
| |
| func NewDefaultProvider(t http.RoundTripper) Provider { |
| return &DefaultProvider{ |
| transport: t, |
| } |
| } |
| |
| func (dp *DefaultProvider) RoundTrip(req *http.Request) (*http.Response, error) { |
| return dp.transport.RoundTrip(req) |
| } |
| |
| func (dp *DefaultProvider) Transport() http.RoundTripper { |
| return dp.transport |
| } |
| |
| func (dp *DefaultProvider) WithTransport(t http.RoundTripper) { |
| dp.transport = t |
| } |
| |
| func GetAuthProvider(config *config.Config) (Provider, error) { |
| var provider Provider |
| defaultTransport, err := NewDefaultTransport(config) |
| if err != nil { |
| return nil, err |
| } |
| switch config.AuthPlugin { |
| case TLSPluginShortName: |
| fallthrough |
| case TLSPluginName: |
| provider, err = NewAuthenticationTLSFromAuthParams(config.AuthParams, defaultTransport) |
| case TokenPluginName: |
| fallthrough |
| case TokePluginShortName: |
| provider, err = NewAuthenticationTokenFromAuthParams(config.AuthParams, defaultTransport) |
| case OAuth2PluginName: |
| fallthrough |
| case OAuth2PluginShortName: |
| provider, err = NewAuthenticationOAuth2WithDefaultFlow(oauth2.Issuer{ |
| IssuerEndpoint: config.IssuerEndpoint, |
| ClientID: config.ClientID, |
| Audience: config.Audience, |
| }, config.KeyFile) |
| default: |
| switch { |
| case len(config.TLSCertFile) > 0 && len(config.TLSKeyFile) > 0: |
| provider, err = NewAuthenticationTLS(config.TLSCertFile, config.TLSKeyFile, defaultTransport) |
| case len(config.Token) > 0: |
| provider, err = NewAuthenticationToken(config.Token, defaultTransport) |
| case len(config.TokenFile) > 0: |
| provider, err = NewAuthenticationTokenFromFile(config.TokenFile, defaultTransport) |
| case len(config.IssuerEndpoint) > 0 || len(config.ClientID) > 0 || len(config.Audience) > 0 || len(config.Scope) > 0: |
| provider, err = NewAuthenticationOAuth2WithParams( |
| config.IssuerEndpoint, config.ClientID, config.Audience, config.Scope, defaultTransport) |
| default: |
| provider = NewDefaultProvider(defaultTransport) |
| } |
| } |
| return provider, err |
| } |