137 lines
2.7 KiB
Go
137 lines
2.7 KiB
Go
|
package cookie
|
||
|
|
||
|
import (
|
||
|
"context"
|
||
|
"fmt"
|
||
|
"io"
|
||
|
"net/http"
|
||
|
"net/http/cookiejar"
|
||
|
"strings"
|
||
|
"sync"
|
||
|
"time"
|
||
|
|
||
|
clockutil "github.com/benbjohnson/clock"
|
||
|
|
||
|
"github.com/influxdata/telegraf"
|
||
|
"github.com/influxdata/telegraf/config"
|
||
|
)
|
||
|
|
||
|
type CookieAuthConfig struct {
|
||
|
URL string `toml:"cookie_auth_url"`
|
||
|
Method string `toml:"cookie_auth_method"`
|
||
|
|
||
|
Headers map[string]*config.Secret `toml:"cookie_auth_headers"`
|
||
|
|
||
|
// HTTP Basic Auth Credentials
|
||
|
Username string `toml:"cookie_auth_username"`
|
||
|
Password string `toml:"cookie_auth_password"`
|
||
|
|
||
|
Body string `toml:"cookie_auth_body"`
|
||
|
Renewal config.Duration `toml:"cookie_auth_renewal"`
|
||
|
|
||
|
client *http.Client
|
||
|
wg sync.WaitGroup
|
||
|
}
|
||
|
|
||
|
func (c *CookieAuthConfig) Start(client *http.Client, log telegraf.Logger, clock clockutil.Clock) (err error) {
|
||
|
if err := c.initializeClient(client); err != nil {
|
||
|
return err
|
||
|
}
|
||
|
|
||
|
// continual auth renewal if set
|
||
|
if c.Renewal > 0 {
|
||
|
ticker := clock.Ticker(time.Duration(c.Renewal))
|
||
|
// this context is used in the tests only, it is to cancel the goroutine
|
||
|
go c.authRenewal(context.Background(), ticker, log)
|
||
|
}
|
||
|
|
||
|
return nil
|
||
|
}
|
||
|
|
||
|
func (c *CookieAuthConfig) initializeClient(client *http.Client) (err error) {
|
||
|
c.client = client
|
||
|
|
||
|
if c.Method == "" {
|
||
|
c.Method = http.MethodPost
|
||
|
}
|
||
|
|
||
|
return c.auth()
|
||
|
}
|
||
|
|
||
|
func (c *CookieAuthConfig) authRenewal(ctx context.Context, ticker *clockutil.Ticker, log telegraf.Logger) {
|
||
|
for {
|
||
|
select {
|
||
|
case <-ctx.Done():
|
||
|
c.wg.Done()
|
||
|
return
|
||
|
case <-ticker.C:
|
||
|
if err := c.auth(); err != nil && log != nil {
|
||
|
log.Errorf("renewal failed for %q: %v", c.URL, err)
|
||
|
}
|
||
|
}
|
||
|
}
|
||
|
}
|
||
|
|
||
|
func (c *CookieAuthConfig) auth() error {
|
||
|
var err error
|
||
|
|
||
|
// everytime we auth we clear out the cookie jar to ensure that the cookie
|
||
|
// is not used as a part of re-authing. The only way to empty or reset is
|
||
|
// to create a new cookie jar.
|
||
|
c.client.Jar, err = cookiejar.New(nil)
|
||
|
if err != nil {
|
||
|
return err
|
||
|
}
|
||
|
|
||
|
var body io.Reader
|
||
|
if c.Body != "" {
|
||
|
body = strings.NewReader(c.Body)
|
||
|
}
|
||
|
|
||
|
req, err := http.NewRequest(c.Method, c.URL, body)
|
||
|
if err != nil {
|
||
|
return err
|
||
|
}
|
||
|
|
||
|
if c.Username != "" {
|
||
|
req.SetBasicAuth(c.Username, c.Password)
|
||
|
}
|
||
|
|
||
|
for k, v := range c.Headers {
|
||
|
secret, err := v.Get()
|
||
|
if err != nil {
|
||
|
return err
|
||
|
}
|
||
|
|
||
|
headerVal := secret.String()
|
||
|
if strings.EqualFold(k, "host") {
|
||
|
req.Host = headerVal
|
||
|
} else {
|
||
|
req.Header.Add(k, headerVal)
|
||
|
}
|
||
|
|
||
|
secret.Destroy()
|
||
|
}
|
||
|
|
||
|
resp, err := c.client.Do(req)
|
||
|
if err != nil {
|
||
|
return err
|
||
|
}
|
||
|
defer resp.Body.Close()
|
||
|
|
||
|
respBody, err := io.ReadAll(resp.Body)
|
||
|
if err != nil {
|
||
|
return err
|
||
|
}
|
||
|
|
||
|
if resp.StatusCode < 200 || resp.StatusCode > 299 {
|
||
|
return fmt.Errorf("cookie auth renewal received status code: %v (%v) [%v]",
|
||
|
resp.StatusCode,
|
||
|
http.StatusText(resp.StatusCode),
|
||
|
string(respBody),
|
||
|
)
|
||
|
}
|
||
|
|
||
|
return nil
|
||
|
}
|