-
Notifications
You must be signed in to change notification settings - Fork 1.5k
/
confighttp.go
137 lines (115 loc) · 3.99 KB
/
confighttp.go
1
2
3
4
5
6
7
8
9
10
11
12
13
14
15
16
17
18
19
20
21
22
23
24
25
26
27
28
29
30
31
32
33
34
35
36
37
38
39
40
41
42
43
44
45
46
47
48
49
50
51
52
53
54
55
56
57
58
59
60
61
62
63
64
65
66
67
68
69
70
71
72
73
74
75
76
77
78
79
80
81
82
83
84
85
86
87
88
89
90
91
92
93
94
95
96
97
98
99
100
101
102
103
104
105
106
107
108
109
110
111
112
113
114
115
116
117
118
119
120
121
122
123
124
125
126
127
128
129
130
131
132
133
134
135
136
137
// Copyright The OpenTelemetry Authors
//
// Licensed under the Apache License, Version 2.0 (the "License");
// you may not use this file except in compliance with the License.
// You may obtain a copy of the License at
//
// http://www.apache.org/licenses/LICENSE-2.0
//
// Unless required by applicable law or agreed to in writing, software
// distributed under the License is distributed on an "AS IS" BASIS,
// WITHOUT WARRANTIES OR CONDITIONS OF ANY KIND, either express or implied.
// See the License for the specific language governing permissions and
// limitations under the License.
package confighttp
import (
"crypto/tls"
"net"
"net/http"
"time"
"github.com/rs/cors"
"go.opentelemetry.io/collector/config/configtls"
)
type HTTPClientSettings struct {
// The target URL to send data to (e.g.: http://some.url:9411/v1/trace).
Endpoint string `mapstructure:"endpoint"`
// TLSSetting struct exposes TLS client configuration.
TLSSetting configtls.TLSClientSetting `mapstructure:",squash"`
// ReadBufferSize for HTTP client. See http.Transport.ReadBufferSize.
ReadBufferSize int `mapstructure:"read_buffer_size"`
// WriteBufferSize for HTTP client. See http.Transport.WriteBufferSize.
WriteBufferSize int `mapstructure:"write_buffer_size"`
// Timeout parameter configures `http.Client.Timeout`.
Timeout time.Duration `mapstructure:"timeout,omitempty"`
// Additional headers attached to each HTTP request sent by the client.
// Existing header values are overwritten if collision happens.
Headers map[string]string `mapstructure:"headers,omitempty"`
}
func (hcs *HTTPClientSettings) ToClient() (*http.Client, error) {
tlsCfg, err := hcs.TLSSetting.LoadTLSConfig()
if err != nil {
return nil, err
}
transport := http.DefaultTransport.(*http.Transport).Clone()
if tlsCfg != nil {
transport.TLSClientConfig = tlsCfg
}
if hcs.ReadBufferSize > 0 {
transport.ReadBufferSize = hcs.ReadBufferSize
}
if hcs.WriteBufferSize > 0 {
transport.WriteBufferSize = hcs.WriteBufferSize
}
var clientTransport http.RoundTripper
if hcs.Headers != nil && len(hcs.Headers) > 0 {
clientTransport = &clientInterceptorRoundTripper{
transport: transport,
headers: hcs.Headers,
}
} else {
clientTransport = transport
}
return &http.Client{
Transport: clientTransport,
Timeout: hcs.Timeout,
}, nil
}
// Custom RoundTripper that add headers
type clientInterceptorRoundTripper struct {
transport http.RoundTripper
headers map[string]string
}
// Custom RoundTrip that add headers
func (interceptor *clientInterceptorRoundTripper) RoundTrip(req *http.Request) (*http.Response, error) {
for k, v := range interceptor.headers {
req.Header.Set(k, v)
}
// Send the request to Cortex
response, err := interceptor.transport.RoundTrip(req)
return response, err
}
type HTTPServerSettings struct {
// Endpoint configures the listening address for the server.
Endpoint string `mapstructure:"endpoint"`
// TLSSetting struct exposes TLS client configuration.
TLSSetting *configtls.TLSServerSetting `mapstructure:"tls_settings, omitempty"`
// CorsOrigins are the allowed CORS origins for HTTP/JSON requests to grpc-gateway adapter
// for the OTLP receiver. See github.com/rs/cors
// An empty list means that CORS is not enabled at all. A wildcard (*) can be
// used to match any origin or one or more characters of an origin.
CorsOrigins []string `mapstructure:"cors_allowed_origins"`
}
func (hss *HTTPServerSettings) ToListener() (net.Listener, error) {
listener, err := net.Listen("tcp", hss.Endpoint)
if err != nil {
return nil, err
}
if hss.TLSSetting != nil {
var tlsCfg *tls.Config
tlsCfg, err = hss.TLSSetting.LoadTLSConfig()
if err != nil {
return nil, err
}
listener = tls.NewListener(listener, tlsCfg)
}
return listener, nil
}
func (hss *HTTPServerSettings) ToServer(handler http.Handler) *http.Server {
if len(hss.CorsOrigins) > 0 {
co := cors.Options{AllowedOrigins: hss.CorsOrigins}
handler = cors.New(co).Handler(handler)
}
return &http.Server{
Handler: handler,
}
}