Skip to content

Commit 00f92df

Browse files
jtlisicsmarchbanks
authored andcommitted
chore: ensure internalQuerier utilizes identical authMiddleware to API (#3439)
Signed-off-by: Jacob Lisi <[email protected]>
1 parent 21272ce commit 00f92df

File tree

2 files changed

+12
-12
lines changed

2 files changed

+12
-12
lines changed

pkg/api/api.go

Lines changed: 11 additions & 10 deletions
Original file line numberDiff line numberDiff line change
@@ -51,12 +51,13 @@ func (cfg *Config) RegisterFlagsWithPrefix(prefix string, f *flag.FlagSet) {
5151
}
5252

5353
type API struct {
54-
cfg Config
55-
authMiddleware middleware.Interface
56-
server *server.Server
57-
logger log.Logger
58-
sourceIPs *middleware.SourceIPExtractor
59-
indexPage *IndexPageContent
54+
AuthMiddleware middleware.Interface
55+
56+
cfg Config
57+
server *server.Server
58+
logger log.Logger
59+
sourceIPs *middleware.SourceIPExtractor
60+
indexPage *IndexPageContent
6061
}
6162

6263
func New(cfg Config, serverCfg server.Config, s *server.Server, logger log.Logger) (*API, error) {
@@ -75,7 +76,7 @@ func New(cfg Config, serverCfg server.Config, s *server.Server, logger log.Logge
7576

7677
api := &API{
7778
cfg: cfg,
78-
authMiddleware: cfg.HTTPAuthMiddleware,
79+
AuthMiddleware: cfg.HTTPAuthMiddleware,
7980
server: s,
8081
logger: logger,
8182
sourceIPs: sourceIPs,
@@ -84,7 +85,7 @@ func New(cfg Config, serverCfg server.Config, s *server.Server, logger log.Logge
8485

8586
// If no authentication middleware is present in the config, use the default authentication middleware.
8687
if cfg.HTTPAuthMiddleware == nil {
87-
api.authMiddleware = middleware.AuthenticateUser
88+
api.AuthMiddleware = middleware.AuthenticateUser
8889
}
8990

9091
return api, nil
@@ -97,7 +98,7 @@ func (a *API) RegisterRoute(path string, handler http.Handler, auth bool, method
9798

9899
level.Debug(a.logger).Log("msg", "api: registering route", "methods", strings.Join(methods, ","), "path", path, "auth", auth)
99100
if auth {
100-
handler = a.authMiddleware.Wrap(handler)
101+
handler = a.AuthMiddleware.Wrap(handler)
101102
}
102103
if len(methods) == 0 {
103104
a.server.HTTP.Path(path).Handler(handler)
@@ -109,7 +110,7 @@ func (a *API) RegisterRoute(path string, handler http.Handler, auth bool, method
109110
func (a *API) RegisterRoutesWithPrefix(prefix string, handler http.Handler, auth bool, methods ...string) {
110111
level.Debug(a.logger).Log("msg", "api: registering route", "methods", strings.Join(methods, ","), "prefix", prefix, "auth", auth)
111112
if auth {
112-
handler = a.authMiddleware.Wrap(handler)
113+
handler = a.AuthMiddleware.Wrap(handler)
113114
}
114115
if len(methods) == 0 {
115116
a.server.HTTP.PathPrefix(prefix).Handler(handler)

pkg/cortex/modules.go

Lines changed: 1 addition & 2 deletions
Original file line numberDiff line numberDiff line change
@@ -11,7 +11,6 @@ import (
1111
"github.com/prometheus/prometheus/rules"
1212
prom_storage "github.com/prometheus/prometheus/storage"
1313
httpgrpc_server "github.com/weaveworks/common/httpgrpc/server"
14-
"github.com/weaveworks/common/middleware"
1514
"github.com/weaveworks/common/server"
1615

1716
"github.com/cortexproject/cortex/pkg/alertmanager"
@@ -290,7 +289,7 @@ func (t *Cortex) initQuerier() (serv services.Service, err error) {
290289
// If queries are processed using the external HTTP Server, we need wrap the internal querier with
291290
// HTTP router with middleware to parse the tenant ID from the HTTP header and inject it into the
292291
// request context.
293-
internalQuerierRouter = middleware.AuthenticateUser.Wrap(internalQuerierRouter)
292+
internalQuerierRouter = t.API.AuthMiddleware.Wrap(internalQuerierRouter)
294293
}
295294

296295
// Query frontend worker will only be started after all its dependencies are started, not here.

0 commit comments

Comments
 (0)