feat(openapi): allow Bearer token (#9669)

Co-authored-by: Dimitri GRISARD <dgrisard-externe@bedrockstreaming.com>
Co-authored-by: Harshal Sheth <hsheth2@gmail.com>
This commit is contained in:
Dimitri 2024-02-11 23:21:38 +01:00 committed by GitHub
parent 4f5e330272
commit 709c596867
No known key found for this signature in database
GPG Key ID: B5690EEEBB952194
2 changed files with 36 additions and 16 deletions

View File

@ -4,9 +4,10 @@ import warnings
from abc import ABC from abc import ABC
from typing import Dict, Iterable, Optional, Tuple from typing import Dict, Iterable, Optional, Tuple
from pydantic import validator
from pydantic.fields import Field from pydantic.fields import Field
from datahub.configuration.common import ConfigModel from datahub.configuration.common import ConfigModel, ConfigurationError
from datahub.emitter.mce_builder import make_tag_urn from datahub.emitter.mce_builder import make_tag_urn
from datahub.ingestion.api.common import PipelineContext from datahub.ingestion.api.common import PipelineContext
from datahub.ingestion.api.decorators import ( from datahub.ingestion.api.decorators import (
@ -74,14 +75,33 @@ class OpenApiConfig(ConfigModel):
token: Optional[str] = Field( token: Optional[str] = Field(
default=None, description="Token for endpoint authentication." default=None, description="Token for endpoint authentication."
) )
bearer_token: Optional[str] = Field(
default=None, description="Bearer token for endpoint authentication."
)
get_token: dict = Field( get_token: dict = Field(
default={}, description="Retrieving a token from the endpoint." default={}, description="Retrieving a token from the endpoint."
) )
@validator("bearer_token", always=True)
def ensure_only_one_token(
cls, bearer_token: Optional[str], values: Dict
) -> Optional[str]:
if bearer_token is not None and values.get("token") is not None:
raise ConfigurationError(
"Unable to use 'token' and 'bearer_token' together."
)
return bearer_token
def get_swagger(self) -> Dict: def get_swagger(self) -> Dict:
if self.get_token or self.token is not None: if self.get_token or self.token or self.bearer_token is not None:
if self.token is not None: if self.token:
... pass
elif self.bearer_token:
# TRICKY: To avoid passing a bunch of different token types around, we set the
# token's value to the properly formatted bearer token.
# TODO: We should just create a requests.Session and set all the auth
# details there once, and then use that session for all requests.
self.token = f"Bearer {self.bearer_token}"
else: else:
assert ( assert (
"url_complement" in self.get_token.keys() "url_complement" in self.get_token.keys()
@ -283,10 +303,11 @@ class APISource(Source, ABC):
"{" not in endpoint_k "{" not in endpoint_k
): # if the API does not explicitly require parameters ): # if the API does not explicitly require parameters
tot_url = clean_url(config.url + self.url_basepath + endpoint_k) tot_url = clean_url(config.url + self.url_basepath + endpoint_k)
if config.token: if config.token:
response = request_call( response = request_call(
tot_url, token=config.token, proxies=config.proxies tot_url,
token=config.token,
proxies=config.proxies,
) )
else: else:
response = request_call( response = request_call(
@ -314,7 +335,9 @@ class APISource(Source, ABC):
tot_url = clean_url(config.url + self.url_basepath + url_guess) tot_url = clean_url(config.url + self.url_basepath + url_guess)
if config.token: if config.token:
response = request_call( response = request_call(
tot_url, token=config.token, proxies=config.proxies tot_url,
token=config.token,
proxies=config.proxies,
) )
else: else:
response = request_call( response = request_call(
@ -342,7 +365,9 @@ class APISource(Source, ABC):
tot_url = clean_url(config.url + self.url_basepath + composed_url) tot_url = clean_url(config.url + self.url_basepath + composed_url)
if config.token: if config.token:
response = request_call( response = request_call(
tot_url, token=config.token, proxies=config.proxies tot_url,
token=config.token,
proxies=config.proxies,
) )
else: else:
response = request_call( response = request_call(

View File

@ -54,12 +54,10 @@ def request_call(
proxies: Optional[dict] = None, proxies: Optional[dict] = None,
) -> requests.Response: ) -> requests.Response:
headers = {"accept": "application/json"} headers = {"accept": "application/json"}
if username is not None and password is not None: if username is not None and password is not None:
return requests.get( return requests.get(
url, headers=headers, auth=HTTPBasicAuth(username, password) url, headers=headers, auth=HTTPBasicAuth(username, password)
) )
elif token is not None: elif token is not None:
headers["Authorization"] = f"{token}" headers["Authorization"] = f"{token}"
return requests.get(url, proxies=proxies, headers=headers) return requests.get(url, proxies=proxies, headers=headers)
@ -76,12 +74,9 @@ def get_swag_json(
proxies: Optional[dict] = None, proxies: Optional[dict] = None,
) -> Dict: ) -> Dict:
tot_url = url + swagger_file tot_url = url + swagger_file
if token is not None: response = request_call(
response = request_call(url=tot_url, token=token, proxies=proxies) url=tot_url, token=token, username=username, password=password, proxies=proxies
else: )
response = request_call(
url=tot_url, username=username, password=password, proxies=proxies
)
if response.status_code != 200: if response.status_code != 200:
raise Exception(f"Unable to retrieve {tot_url}, error {response.status_code}") raise Exception(f"Unable to retrieve {tot_url}, error {response.status_code}")