Skip to content
Draft
Show file tree
Hide file tree
Changes from all commits
Commits
File filter

Filter by extension

Filter by extension

Conversations
Failed to load comments.
Loading
Jump to
Jump to file
Failed to load files.
Loading
Diff view
Diff view
Original file line number Diff line number Diff line change
Expand Up @@ -403,11 +403,11 @@
config: &Config{
ClientConfig: confighttp.ClientConfig{
Endpoint: endpoint,
Headers: map[string]configopaque.String{
Headers: configopaque.MapListFromMap(map[string]configopaque.String{
"hdr1": "val1",
"hdr2": "val2",
},
},

Check failure on line 410 in exporter/alertmanagerexporter/alertmanager_exporter_test.go

View workflow job for this annotation

GitHub Actions / lint-matrix (windows, exporter-0)

expected operand, found '}' (typecheck)

Check failure on line 410 in exporter/alertmanagerexporter/alertmanager_exporter_test.go

View workflow job for this annotation

GitHub Actions / lint-matrix (linux, exporter-0)

expected operand, found '}' (typecheck)
},
},
{
Expand Down Expand Up @@ -440,27 +440,27 @@
},
}

for _, tt := range tests {

Check failure on line 443 in exporter/alertmanagerexporter/alertmanager_exporter_test.go

View workflow job for this annotation

GitHub Actions / lint-matrix (windows, exporter-0)

missing ',' in argument list (typecheck)

Check failure on line 443 in exporter/alertmanagerexporter/alertmanager_exporter_test.go

View workflow job for this annotation

GitHub Actions / lint-matrix (linux, exporter-0)

missing ',' in argument list (typecheck)
t.Run(tt.name, func(t *testing.T) {
set := exportertest.NewNopSettings(metadata.Type)
am := newAlertManagerExporter(tt.config, set.TelemetrySettings)

exp, err := newTracesExporter(t.Context(), tt.config, set)
if tt.mustFailOnCreate {

Check failure on line 449 in exporter/alertmanagerexporter/alertmanager_exporter_test.go

View workflow job for this annotation

GitHub Actions / lint-matrix (windows, exporter-0)

missing ',' in argument list (typecheck)

Check failure on line 449 in exporter/alertmanagerexporter/alertmanager_exporter_test.go

View workflow job for this annotation

GitHub Actions / lint-matrix (linux, exporter-0)

missing ',' in argument list (typecheck)
assert.Error(t, err)

Check failure on line 450 in exporter/alertmanagerexporter/alertmanager_exporter_test.go

View workflow job for this annotation

GitHub Actions / lint-matrix (windows, exporter-0)

missing ',' before newline in composite literal (typecheck)

Check failure on line 450 in exporter/alertmanagerexporter/alertmanager_exporter_test.go

View workflow job for this annotation

GitHub Actions / lint-matrix (linux, exporter-0)

missing ',' before newline in composite literal (typecheck)
return

Check failure on line 451 in exporter/alertmanagerexporter/alertmanager_exporter_test.go

View workflow job for this annotation

GitHub Actions / lint-matrix (windows, exporter-0)

expected operand, found 'return' (typecheck)

Check failure on line 451 in exporter/alertmanagerexporter/alertmanager_exporter_test.go

View workflow job for this annotation

GitHub Actions / lint-matrix (linux, exporter-0)

expected operand, found 'return' (typecheck)
}
assert.NoError(t, err)
assert.NotNil(t, exp)

err = am.start(t.Context(), componenttest.NewNopHost())
if tt.mustFailOnStart {

Check failure on line 457 in exporter/alertmanagerexporter/alertmanager_exporter_test.go

View workflow job for this annotation

GitHub Actions / lint-matrix (windows, exporter-0)

missing ',' in composite literal (typecheck)

Check failure on line 457 in exporter/alertmanagerexporter/alertmanager_exporter_test.go

View workflow job for this annotation

GitHub Actions / lint-matrix (linux, exporter-0)

missing ',' in composite literal (typecheck)
assert.Error(t, err)

Check failure on line 458 in exporter/alertmanagerexporter/alertmanager_exporter_test.go

View workflow job for this annotation

GitHub Actions / lint-matrix (windows, exporter-0)

missing ',' before newline in composite literal (typecheck)

Check failure on line 458 in exporter/alertmanagerexporter/alertmanager_exporter_test.go

View workflow job for this annotation

GitHub Actions / lint-matrix (linux, exporter-0)

missing ',' before newline in composite literal (typecheck)
}

Check failure on line 459 in exporter/alertmanagerexporter/alertmanager_exporter_test.go

View workflow job for this annotation

GitHub Actions / lint-matrix (windows, exporter-0)

missing ',' before newline in composite literal (typecheck)

Check failure on line 459 in exporter/alertmanagerexporter/alertmanager_exporter_test.go

View workflow job for this annotation

GitHub Actions / lint-matrix (linux, exporter-0)

missing ',' before newline in composite literal (typecheck)

t.Cleanup(func() {
require.NoError(t, am.shutdown(t.Context()))
})

Check failure on line 463 in exporter/alertmanagerexporter/alertmanager_exporter_test.go

View workflow job for this annotation

GitHub Actions / lint-matrix (windows, exporter-0)

missing ',' before newline in composite literal (typecheck)

Check failure on line 463 in exporter/alertmanagerexporter/alertmanager_exporter_test.go

View workflow job for this annotation

GitHub Actions / lint-matrix (linux, exporter-0)

missing ',' before newline in composite literal (typecheck)
})
}
}
12 changes: 6 additions & 6 deletions exporter/coralogixexporter/config.go
Original file line number Diff line number Diff line change
Expand Up @@ -40,9 +40,9 @@
func (c *TransportConfig) ToHTTPClient(ctx context.Context, host component.Host, settings component.TelemetrySettings) (*http.Client, error) {
headers := c.Headers
if headers == nil {
headers = make(map[string]configopaque.String)
headers = new(configopaque.MapList)

Check failure on line 43 in exporter/coralogixexporter/config.go

View workflow job for this annotation

GitHub Actions / govulncheck (exporter-0)

undefined: configopaque.MapList
}
headers["Content-Type"] = "application/x-protobuf"
headers.Set("Content-Type", "application/x-protobuf")

Check failure on line 45 in exporter/coralogixexporter/config.go

View workflow job for this annotation

GitHub Actions / govulncheck (exporter-0)

headers.Set undefined (type map[string]configopaque.String has no field or method Set)

httpClientConfig := confighttp.ClientConfig{
ProxyURL: c.ProxyURL,
Expand Down Expand Up @@ -226,16 +226,16 @@
if signalConfig.TLS.Insecure || signalConfig.TLS.InsecureSkipVerify || signalConfig.TLS.CAFile != "" {
merged.TLS = signalConfig.TLS
}
if len(signalConfig.Headers) > 0 {
if signalConfig.Headers.Len() > 0 {

Check failure on line 229 in exporter/coralogixexporter/config.go

View workflow job for this annotation

GitHub Actions / govulncheck (exporter-0)

signalConfig.Headers.Len undefined (type map[string]configopaque.String has no field or method Len)
// Deep-copy domain headers to avoid mutating the shared map
headers := make(map[string]configopaque.String)
for k, v := range merged.Headers {
for k, v := range merged.Headers.Iter {

Check failure on line 232 in exporter/coralogixexporter/config.go

View workflow job for this annotation

GitHub Actions / govulncheck (exporter-0)

merged.Headers.Iter undefined (type map[string]configopaque.String has no field or method Iter)
headers[k] = v
}
for k, v := range signalConfig.Headers {
for k, v := range signalConfig.Headers.Iter {

Check failure on line 235 in exporter/coralogixexporter/config.go

View workflow job for this annotation

GitHub Actions / govulncheck (exporter-0)

signalConfig.Headers.Iter undefined (type map[string]configopaque.String has no field or method Iter)
headers[k] = v
}
merged.Headers = headers
merged.Headers = configopaque.MapListFromMap(headers)

Check failure on line 238 in exporter/coralogixexporter/config.go

View workflow job for this annotation

GitHub Actions / govulncheck (exporter-0)

undefined: configopaque.MapListFromMap
}
if signalConfig.WriteBufferSize > 0 {
merged.WriteBufferSize = signalConfig.WriteBufferSize
Expand Down
4 changes: 2 additions & 2 deletions exporter/coralogixexporter/factory_test.go
Original file line number Diff line number Diff line change
Expand Up @@ -166,10 +166,10 @@ func TestCreateTraces(t *testing.T) {
Traces: TransportConfig{
ClientConfig: configgrpc.ClientConfig{
Endpoint: endpoint,
Headers: map[string]configopaque.String{
Headers: configopaque.MapListFromMap(map[string]configopaque.String{
"hdr1": "val1",
"hdr2": "val2",
},
}),
},
},
},
Expand Down
18 changes: 9 additions & 9 deletions exporter/coralogixexporter/logs_client_test.go
Original file line number Diff line number Diff line change
Expand Up @@ -84,7 +84,7 @@ func TestLogsExporter_Start(t *testing.T) {
PrivateKey: "test-key",
Logs: TransportConfig{
ClientConfig: configgrpc.ClientConfig{
Headers: map[string]configopaque.String{},
Headers: new(configopaque.MapList),
},
},
}
Expand All @@ -96,7 +96,7 @@ func TestLogsExporter_Start(t *testing.T) {
require.NoError(t, err)
assert.NotNil(t, exp.clientConn)
assert.NotNil(t, exp.grpcLogsExporter)
assert.Contains(t, exp.config.Logs.Headers, "Authorization")
assert.Contains(t, exp.config.Logs.Headers.ToMap(), "Authorization")

// Test shutdown
err = exp.shutdown(t.Context())
Expand All @@ -109,9 +109,9 @@ func TestLogsExporter_EnhanceContext(t *testing.T) {
PrivateKey: "test-key",
Logs: TransportConfig{
ClientConfig: configgrpc.ClientConfig{
Headers: map[string]configopaque.String{
Headers: configopaque.MapListFromMap(map[string]configopaque.String{
"test-header": "test-value",
},
}),
},
},
}
Expand All @@ -130,7 +130,7 @@ func TestLogsExporter_PushLogs(t *testing.T) {
PrivateKey: "test-key",
Logs: TransportConfig{
ClientConfig: configgrpc.ClientConfig{
Headers: map[string]configopaque.String{},
Headers: new(configopaque.MapList),
},
},
}
Expand Down Expand Up @@ -178,7 +178,7 @@ func TestLogsExporter_PushLogs_WhenCannotSend(t *testing.T) {
PrivateKey: "test-key",
Logs: TransportConfig{
ClientConfig: configgrpc.ClientConfig{
Headers: map[string]configopaque.String{},
Headers: new(configopaque.MapList),
},
},
RateLimiter: RateLimiterConfig{
Expand Down Expand Up @@ -280,7 +280,7 @@ func BenchmarkLogsExporter_PushLogs(b *testing.B) {
TLS: configtls.ClientConfig{
Insecure: true,
},
Headers: map[string]configopaque.String{},
Headers: new(configopaque.MapList),
},
},
PrivateKey: "test-key",
Expand Down Expand Up @@ -335,7 +335,7 @@ func TestLogsExporter_PushLogs_PartialSuccess(t *testing.T) {
TLS: configtls.ClientConfig{
Insecure: true,
},
Headers: map[string]configopaque.String{},
Headers: new(configopaque.MapList),
},
},
PrivateKey: "test-key",
Expand Down Expand Up @@ -406,7 +406,7 @@ func TestLogsExporter_PushLogs_Performance(t *testing.T) {
TLS: configtls.ClientConfig{
Insecure: true,
},
Headers: map[string]configopaque.String{},
Headers: new(configopaque.MapList),
},
},
PrivateKey: "test-key",
Expand Down
18 changes: 9 additions & 9 deletions exporter/coralogixexporter/metrics_client_test.go
Original file line number Diff line number Diff line change
Expand Up @@ -84,7 +84,7 @@ func TestMetricsExporter_Start(t *testing.T) {
PrivateKey: "test-key",
Metrics: TransportConfig{
ClientConfig: configgrpc.ClientConfig{
Headers: map[string]configopaque.String{},
Headers: new(configopaque.MapList),
},
},
}
Expand All @@ -96,7 +96,7 @@ func TestMetricsExporter_Start(t *testing.T) {
require.NoError(t, err)
assert.NotNil(t, exp.clientConn)
assert.NotNil(t, exp.grpcMetricsExporter)
assert.Contains(t, exp.config.Metrics.Headers, "Authorization")
assert.Contains(t, exp.config.Metrics.Headers.ToMap(), "Authorization")

// Test shutdown
err = exp.shutdown(t.Context())
Expand All @@ -109,9 +109,9 @@ func TestMetricsExporter_EnhanceContext(t *testing.T) {
PrivateKey: "test-key",
Metrics: TransportConfig{
ClientConfig: configgrpc.ClientConfig{
Headers: map[string]configopaque.String{
Headers: configopaque.MapListFromMap(map[string]configopaque.String{
"test-header": "test-value",
},
}),
},
},
}
Expand All @@ -130,7 +130,7 @@ func TestMetricsExporter_PushMetrics(t *testing.T) {
PrivateKey: "test-key",
Metrics: TransportConfig{
ClientConfig: configgrpc.ClientConfig{
Headers: map[string]configopaque.String{},
Headers: new(configopaque.MapList),
},
},
}
Expand Down Expand Up @@ -190,7 +190,7 @@ func TestMetricsExporter_PushMetrics_WhenCannotSend(t *testing.T) {
PrivateKey: "test-key",
Metrics: TransportConfig{
ClientConfig: configgrpc.ClientConfig{
Headers: map[string]configopaque.String{},
Headers: new(configopaque.MapList),
},
},
RateLimiter: RateLimiterConfig{
Expand Down Expand Up @@ -293,7 +293,7 @@ func BenchmarkMetricsExporter_PushMetrics(b *testing.B) {
TLS: configtls.ClientConfig{
Insecure: true,
},
Headers: map[string]configopaque.String{},
Headers: new(configopaque.MapList),
},
},
PrivateKey: "test-key",
Expand Down Expand Up @@ -352,7 +352,7 @@ func TestMetricsExporter_PushMetrics_PartialSuccess(t *testing.T) {
TLS: configtls.ClientConfig{
Insecure: true,
},
Headers: map[string]configopaque.String{},
Headers: new(configopaque.MapList),
},
},
PrivateKey: "test-key",
Expand Down Expand Up @@ -442,7 +442,7 @@ func TestMetricsExporter_PushMetrics_Performance(t *testing.T) {
TLS: configtls.ClientConfig{
Insecure: true,
},
Headers: map[string]configopaque.String{},
Headers: new(configopaque.MapList),
},
},
PrivateKey: "test-key",
Expand Down
18 changes: 9 additions & 9 deletions exporter/coralogixexporter/profiles_client_test.go
Original file line number Diff line number Diff line change
Expand Up @@ -82,7 +82,7 @@ func TestProfilesExporter_Start(t *testing.T) {
Domain: "test.domain.com",
PrivateKey: "test-key",
Profiles: configgrpc.ClientConfig{
Headers: map[string]configopaque.String{},
Headers: new(configopaque.MapList),
},
}

Expand All @@ -93,7 +93,7 @@ func TestProfilesExporter_Start(t *testing.T) {
require.NoError(t, err)
assert.NotNil(t, exp.clientConn)
assert.NotNil(t, exp.profilesExporter)
assert.Contains(t, exp.config.Profiles.Headers, "Authorization")
assert.Contains(t, exp.config.Profiles.Headers.ToMap(), "Authorization")

// Test shutdown
err = exp.shutdown(t.Context())
Expand All @@ -105,9 +105,9 @@ func TestProfilesExporter_EnhanceContext(t *testing.T) {
Domain: "test.domain.com",
PrivateKey: "test-key",
Profiles: configgrpc.ClientConfig{
Headers: map[string]configopaque.String{
Headers: configopaque.MapListFromMap(map[string]configopaque.String{
"test-header": "test-value",
},
}),
},
}

Expand All @@ -124,7 +124,7 @@ func TestProfilesExporter_PushProfiles(t *testing.T) {
Domain: "test.domain.com",
PrivateKey: "test-key",
Profiles: configgrpc.ClientConfig{
Headers: map[string]configopaque.String{},
Headers: new(configopaque.MapList),
},
}

Expand Down Expand Up @@ -172,7 +172,7 @@ func TestProfilesExporter_PushProfiles_WhenCannotSend(t *testing.T) {
Domain: "test.domain.com",
PrivateKey: "test-key",
Profiles: configgrpc.ClientConfig{
Headers: map[string]configopaque.String{},
Headers: new(configopaque.MapList),
},
RateLimiter: RateLimiterConfig{
Enabled: tt.enabled,
Expand Down Expand Up @@ -279,7 +279,7 @@ func BenchmarkProfilesExporter_PushProfiles(b *testing.B) {
TLS: configtls.ClientConfig{
Insecure: true,
},
Headers: map[string]configopaque.String{},
Headers: new(configopaque.MapList),
},
PrivateKey: "test-key",
}
Expand Down Expand Up @@ -334,7 +334,7 @@ func TestProfilesExporter_PushProfiles_PartialSuccess(t *testing.T) {
TLS: configtls.ClientConfig{
Insecure: true,
},
Headers: map[string]configopaque.String{},
Headers: new(configopaque.MapList),
},
PrivateKey: "test-key",
}
Expand Down Expand Up @@ -407,7 +407,7 @@ func TestProfilesExporter_PushProfiles_Performance(t *testing.T) {
TLS: configtls.ClientConfig{
Insecure: true,
},
Headers: map[string]configopaque.String{},
Headers: new(configopaque.MapList),
},
PrivateKey: "test-key",
RateLimiter: RateLimiterConfig{
Expand Down
10 changes: 5 additions & 5 deletions exporter/coralogixexporter/signals.go
Original file line number Diff line number Diff line change
Expand Up @@ -51,7 +51,7 @@
return w.config.Endpoint
}

func newSignalExporter(oCfg *Config, set exp.Settings, signalEndpoint string, headers map[string]configopaque.String) (*signalExporter, error) {
func newSignalExporter(oCfg *Config, set exp.Settings, signalEndpoint string, headers *configopaque.MapList) (*signalExporter, error) {

Check failure on line 54 in exporter/coralogixexporter/signals.go

View workflow job for this annotation

GitHub Actions / govulncheck (exporter-0)

undefined: configopaque.MapList
if isEmpty(oCfg.Domain) && isEmpty(signalEndpoint) {
return nil, errors.New("coralogix exporter config requires `domain` or `logs.endpoint` configuration")
}
Expand All @@ -60,7 +60,7 @@
set.BuildInfo.Description, set.BuildInfo.Version, runtime.GOOS, runtime.GOARCH)

md := metadata.New(nil)
for k, v := range headers {
for k, v := range headers.Iter {
md.Set(k, string(v))
}

Expand Down Expand Up @@ -121,11 +121,11 @@
func (e *signalExporter) startSignalExporter(ctx context.Context, host component.Host, signalConfig signalConfig) (err error) {
if signalConfigWrapper, ok := signalConfig.(*signalConfigWrapper); ok {
if signalConfigWrapper.config.Headers == nil {
signalConfigWrapper.config.Headers = make(map[string]configopaque.String)
signalConfigWrapper.config.Headers = new(configopaque.MapList)

Check failure on line 124 in exporter/coralogixexporter/signals.go

View workflow job for this annotation

GitHub Actions / govulncheck (exporter-0)

undefined: configopaque.MapList
}
signalConfigWrapper.config.Headers["Authorization"] = configopaque.String("Bearer " + string(e.config.PrivateKey))
signalConfigWrapper.config.Headers.Set("Authorization", configopaque.String("Bearer "+string(e.config.PrivateKey)))

Check failure on line 126 in exporter/coralogixexporter/signals.go

View workflow job for this annotation

GitHub Actions / govulncheck (exporter-0)

signalConfigWrapper.config.Headers.Set undefined (type map[string]configopaque.String has no field or method Set)
if e.config.Protocol != httpProtocol {
for k, v := range signalConfigWrapper.config.Headers {
for k, v := range signalConfigWrapper.config.Headers.Iter {

Check failure on line 128 in exporter/coralogixexporter/signals.go

View workflow job for this annotation

GitHub Actions / govulncheck (exporter-0)

signalConfigWrapper.config.Headers.Iter undefined (type map[string]configopaque.String has no field or method Iter)
e.metadata.Set(k, string(v))
}
}
Expand Down
28 changes: 14 additions & 14 deletions exporter/coralogixexporter/signals_test.go
Original file line number Diff line number Diff line change
Expand Up @@ -171,7 +171,7 @@ func TestSignalExporter_AuthorizationHeader(t *testing.T) {
PrivateKey: configopaque.String(privateKey),
Logs: TransportConfig{
ClientConfig: configgrpc.ClientConfig{
Headers: map[string]configopaque.String{},
Headers: new(configopaque.MapList),
},
},
}
Expand All @@ -186,7 +186,7 @@ func TestSignalExporter_AuthorizationHeader(t *testing.T) {
require.NoError(t, exp.shutdown(t.Context()))
}()

authHeader, ok := wrapper.config.Headers["Authorization"]
authHeader, ok := wrapper.config.Headers.Get2("Authorization")
require.True(t, ok, "Authorization header should be present")
assert.Equal(t, configopaque.String("Bearer "+privateKey), authHeader, "Authorization header should be in Bearer format")

Expand All @@ -203,37 +203,37 @@ func TestSignalExporter_CustomHeadersAndAuthorization(t *testing.T) {
{
name: "logs",
config: configgrpc.ClientConfig{
Headers: map[string]configopaque.String{
Headers: configopaque.MapListFromMap(map[string]configopaque.String{
"Custom-Header": "custom-value",
"X-Test": "test-value",
},
}),
},
},
{
name: "traces",
config: configgrpc.ClientConfig{
Headers: map[string]configopaque.String{
Headers: configopaque.MapListFromMap(map[string]configopaque.String{
"Custom-Header": "custom-value",
"X-Test": "test-value",
},
}),
},
},
{
name: "metrics",
config: configgrpc.ClientConfig{
Headers: map[string]configopaque.String{
Headers: configopaque.MapListFromMap(map[string]configopaque.String{
"Custom-Header": "custom-value",
"X-Test": "test-value",
},
}),
},
},
{
name: "profiles",
config: configgrpc.ClientConfig{
Headers: map[string]configopaque.String{
Headers: configopaque.MapListFromMap(map[string]configopaque.String{
"Custom-Header": "custom-value",
"X-Test": "test-value",
},
}),
},
},
}
Expand Down Expand Up @@ -269,17 +269,17 @@ func TestSignalExporter_CustomHeadersAndAuthorization(t *testing.T) {
}()

headers := wrapper.config.Headers
require.Len(t, headers, 3)
require.Equal(t, 3, headers.Len())

authHeader, ok := headers["Authorization"]
authHeader, ok := headers.Get2("Authorization")
require.True(t, ok)
assert.Equal(t, configopaque.String("Bearer "+privateKey), authHeader)

customHeader, ok := headers["Custom-Header"]
customHeader, ok := headers.Get2("Custom-Header")
require.True(t, ok)
assert.Equal(t, configopaque.String("custom-value"), customHeader)

testHeader, ok := headers["X-Test"]
testHeader, ok := headers.Get2("X-Test")
require.True(t, ok)
assert.Equal(t, configopaque.String("test-value"), testHeader)

Expand Down
Loading
Loading