grafana/pkg/middleware/middleware.go

269 lines
6.2 KiB
Go
Raw Normal View History

2014-10-05 09:50:04 -05:00
package middleware
import (
2014-10-07 16:56:37 -05:00
"strconv"
2015-01-14 07:25:12 -06:00
"strings"
2014-10-05 09:50:04 -05:00
"gopkg.in/macaron.v1"
2014-10-05 09:50:04 -05:00
2015-02-05 03:37:13 -06:00
"github.com/grafana/grafana/pkg/bus"
"github.com/grafana/grafana/pkg/components/apikeygen"
2015-02-05 03:37:13 -06:00
"github.com/grafana/grafana/pkg/log"
2015-03-22 14:14:00 -05:00
"github.com/grafana/grafana/pkg/metrics"
2015-02-05 03:37:13 -06:00
m "github.com/grafana/grafana/pkg/models"
"github.com/grafana/grafana/pkg/setting"
"github.com/grafana/grafana/pkg/util"
2014-10-05 09:50:04 -05:00
)
type Context struct {
*macaron.Context
*m.SignedInUser
Session SessionStore
2014-10-05 09:50:04 -05:00
IsSignedIn bool
AllowAnonymous bool
Logger log.Logger
2014-10-06 14:31:54 -05:00
}
2014-10-05 09:50:04 -05:00
func GetContextHandler() macaron.Handler {
return func(c *macaron.Context) {
2014-10-05 09:50:04 -05:00
ctx := &Context{
Context: c,
SignedInUser: &m.SignedInUser{},
Session: GetSession(),
IsSignedIn: false,
AllowAnonymous: false,
Logger: log.New("context"),
2014-10-05 09:50:04 -05:00
}
// the order in which these are tested are important
// look for api key in Authorization header first
// then init session and look for userId in session
// then look for api key in session (special case for render calls via api)
// then test if anonymous access is enabled
if initContextWithApiKey(ctx) ||
initContextWithBasicAuth(ctx) ||
initContextWithAuthProxy(ctx) ||
initContextWithUserSessionCookie(ctx) ||
initContextWithApiKeyFromSession(ctx) ||
initContextWithAnonymousUser(ctx) {
}
ctx.Logger = log.New("context", "user", ctx.UserId, "orgId", ctx.OrgId)
ctx.Data["ctx"] = ctx
2014-10-05 09:50:04 -05:00
c.Map(ctx)
}
}
func initContextWithAnonymousUser(ctx *Context) bool {
if !setting.AnonymousEnabled {
return false
}
orgQuery := m.GetOrgByNameQuery{Name: setting.AnonymousOrgName}
if err := bus.Dispatch(&orgQuery); err != nil {
log.Error(3, "Anonymous access organization error: '%s': %s", setting.AnonymousOrgName, err)
return false
} else {
ctx.IsSignedIn = false
ctx.AllowAnonymous = true
ctx.SignedInUser = &m.SignedInUser{}
ctx.OrgRole = m.RoleType(setting.AnonymousOrgRole)
ctx.OrgId = orgQuery.Result.Id
ctx.OrgName = orgQuery.Result.Name
return true
}
}
func initContextWithUserSessionCookie(ctx *Context) bool {
// initialize session
if err := ctx.Session.Start(ctx); err != nil {
log.Error(3, "Failed to start session", err)
return false
}
var userId int64
if userId = getRequestUserId(ctx); userId == 0 {
return false
}
query := m.GetSignedInUserQuery{UserId: userId}
if err := bus.Dispatch(&query); err != nil {
log.Error(3, "Failed to get user with id %v", userId)
return false
} else {
ctx.SignedInUser = query.Result
ctx.IsSignedIn = true
return true
}
}
func initContextWithApiKey(ctx *Context) bool {
var keyString string
if keyString = getApiKey(ctx); keyString == "" {
return false
}
// base64 decode key
decoded, err := apikeygen.Decode(keyString)
if err != nil {
ctx.JsonApiErr(401, "Invalid API key", err)
return true
}
// fetch key
keyQuery := m.GetApiKeyByNameQuery{KeyName: decoded.Name, OrgId: decoded.OrgId}
if err := bus.Dispatch(&keyQuery); err != nil {
ctx.JsonApiErr(401, "Invalid API key", err)
return true
} else {
apikey := keyQuery.Result
// validate api key
if !apikeygen.IsValid(decoded, apikey.Key) {
ctx.JsonApiErr(401, "Invalid API key", err)
return true
}
ctx.IsSignedIn = true
ctx.SignedInUser = &m.SignedInUser{}
ctx.OrgRole = apikey.Role
ctx.ApiKeyId = apikey.Id
ctx.OrgId = apikey.OrgId
return true
}
}
func initContextWithBasicAuth(ctx *Context) bool {
if !setting.BasicAuthEnabled {
return false
}
header := ctx.Req.Header.Get("Authorization")
if header == "" {
return false
}
username, password, err := util.DecodeBasicAuthHeader(header)
if err != nil {
ctx.JsonApiErr(401, "Invalid Basic Auth Header", err)
return true
}
loginQuery := m.GetUserByLoginQuery{LoginOrEmail: username}
if err := bus.Dispatch(&loginQuery); err != nil {
ctx.JsonApiErr(401, "Basic auth failed", err)
return true
}
user := loginQuery.Result
// validate password
if util.EncodePassword(password, user.Salt) != user.Password {
ctx.JsonApiErr(401, "Invalid username or password", nil)
return true
}
query := m.GetSignedInUserQuery{UserId: user.Id}
if err := bus.Dispatch(&query); err != nil {
ctx.JsonApiErr(401, "Authentication error", err)
return true
} else {
ctx.SignedInUser = query.Result
ctx.IsSignedIn = true
return true
}
}
// special case for panel render calls with api key
func initContextWithApiKeyFromSession(ctx *Context) bool {
keyId := ctx.Session.Get(SESS_KEY_APIKEY)
if keyId == nil {
return false
}
keyQuery := m.GetApiKeyByIdQuery{ApiKeyId: keyId.(int64)}
if err := bus.Dispatch(&keyQuery); err != nil {
log.Error(3, "Failed to get api key by id", err)
return false
} else {
apikey := keyQuery.Result
ctx.IsSignedIn = true
ctx.SignedInUser = &m.SignedInUser{}
ctx.OrgRole = apikey.Role
ctx.ApiKeyId = apikey.Id
ctx.OrgId = apikey.OrgId
return true
}
}
2014-10-05 09:50:04 -05:00
// Handle handles and logs error by given status.
func (ctx *Context) Handle(status int, title string, err error) {
if err != nil {
log.Error(4, "%s: %v", title, err)
2015-01-29 08:46:54 -06:00
if setting.Env != setting.PROD {
2014-10-05 09:50:04 -05:00
ctx.Data["ErrorMsg"] = err
}
}
2015-03-22 14:14:00 -05:00
switch status {
case 200:
metrics.M_Page_Status_200.Inc(1)
case 404:
metrics.M_Page_Status_404.Inc(1)
case 500:
metrics.M_Page_Status_500.Inc(1)
}
ctx.Data["Title"] = title
2014-10-07 16:56:37 -05:00
ctx.HTML(status, strconv.Itoa(status))
2014-10-05 09:50:04 -05:00
}
2014-10-05 14:13:01 -05:00
func (ctx *Context) JsonOK(message string) {
resp := make(map[string]interface{})
resp["message"] = message
ctx.JSON(200, resp)
}
2015-01-14 07:25:12 -06:00
func (ctx *Context) IsApiRequest() bool {
return strings.HasPrefix(ctx.Req.URL.Path, "/api")
}
2014-10-07 14:54:38 -05:00
func (ctx *Context) JsonApiErr(status int, message string, err error) {
2014-10-06 14:31:54 -05:00
resp := make(map[string]interface{})
if err != nil {
log.Error(4, "%s: %v", message, err)
2014-12-16 05:04:08 -06:00
if setting.Env != setting.PROD {
resp["error"] = err.Error()
2014-10-06 14:31:54 -05:00
}
}
switch status {
case 404:
2015-06-30 00:52:55 -05:00
metrics.M_Api_Status_404.Inc(1)
2014-10-06 14:31:54 -05:00
resp["message"] = "Not Found"
case 500:
2015-06-30 00:52:55 -05:00
metrics.M_Api_Status_500.Inc(1)
2014-10-06 14:31:54 -05:00
resp["message"] = "Internal Server Error"
}
if message != "" {
resp["message"] = message
}
2014-11-24 03:17:13 -06:00
ctx.JSON(status, resp)
2014-10-06 14:31:54 -05:00
}
2015-12-21 16:09:27 -06:00
2015-12-22 04:37:44 -06:00
func (ctx *Context) HasUserRole(role m.RoleType) bool {
2015-12-21 16:09:27 -06:00
return ctx.OrgRole.Includes(role)
}
func (ctx *Context) TimeRequest(timer metrics.Timer) {
ctx.Data["perfmon.timer"] = timer
}