arrow/flight/client_auth.go (57 lines of code) (raw):

// Licensed to the Apache Software Foundation (ASF) under one // or more contributor license agreements. See the NOTICE file // distributed with this work for additional information // regarding copyright ownership. The ASF licenses this file // to you under the Apache License, Version 2.0 (the // "License"); you may not use this file except in compliance // with the License. You may obtain a copy of the License at // // http://www.apache.org/licenses/LICENSE-2.0 // // Unless required by applicable law or agreed to in writing, software // distributed under the License is distributed on an "AS IS" BASIS, // WITHOUT WARRANTIES OR CONDITIONS OF ANY KIND, either express or implied. // See the License for the specific language governing permissions and // limitations under the License. package flight import ( "context" "strings" "google.golang.org/grpc" "google.golang.org/grpc/codes" "google.golang.org/grpc/metadata" "google.golang.org/grpc/status" ) // ClientAuthHandler defines an interface for the Flight client to perform // the authentication handshake. The token that is retrieved from GetToken // will be sent as part of the context metadata in subsequent requests after // authentication is performed using the key "auth-token-bin". type ClientAuthHandler interface { Authenticate(context.Context, AuthConn) error GetToken(context.Context) (string, error) } type clientAuthConn struct { stream FlightService_HandshakeClient } func (a *clientAuthConn) Read() ([]byte, error) { in, err := a.stream.Recv() if err != nil { return nil, err } return in.Payload, nil } func (a *clientAuthConn) Send(b []byte) error { return a.stream.Send(&HandshakeRequest{Payload: b}) } func createClientAuthUnaryInterceptor(auth ClientAuthHandler) grpc.UnaryClientInterceptor { if auth == nil { return func(ctx context.Context, method string, req, reply interface{}, cc *grpc.ClientConn, invoker grpc.UnaryInvoker, opts ...grpc.CallOption) error { return invoker(ctx, method, req, reply, cc, opts...) } } return func(ctx context.Context, method string, req, reply interface{}, cc *grpc.ClientConn, invoker grpc.UnaryInvoker, opts ...grpc.CallOption) error { tok, err := auth.GetToken(ctx) if err != nil { return status.Errorf(codes.Unauthenticated, "error retrieving token: %s", err) } return invoker(metadata.AppendToOutgoingContext(ctx, grpcAuthHeader, tok), method, req, reply, cc, opts...) } } func createClientAuthStreamInterceptor(auth ClientAuthHandler) grpc.StreamClientInterceptor { if auth == nil { return func(ctx context.Context, desc *grpc.StreamDesc, cc *grpc.ClientConn, method string, streamer grpc.Streamer, opts ...grpc.CallOption) (grpc.ClientStream, error) { return streamer(ctx, desc, cc, method, opts...) } } return func(ctx context.Context, desc *grpc.StreamDesc, cc *grpc.ClientConn, method string, streamer grpc.Streamer, opts ...grpc.CallOption) (grpc.ClientStream, error) { if strings.HasSuffix(method, "/Handshake") { return streamer(ctx, desc, cc, method, opts...) } tok, err := auth.GetToken(ctx) if err != nil { return nil, status.Errorf(codes.Unauthenticated, "error retrieving token: %s", err) } return streamer(metadata.AppendToOutgoingContext(ctx, grpcAuthHeader, tok), desc, cc, method, opts...) } }