mirror of
https://github.com/grafana/grafana.git
synced 2025-02-25 18:55:37 -06:00
LDAP: Fix LDAP users authenticated via auth proxy not being able to use LDAP active sync (#83715)
* fix LDAP users authenticated via auth proxy not being able to use ldap sync * simplify id resolution at the cost of no fallthrough * remove unused services * remove unused cache key
This commit is contained in:
parent
4dc8094514
commit
2182cc47ac
@ -123,7 +123,7 @@ func ProvideService(
|
|||||||
}
|
}
|
||||||
|
|
||||||
if s.cfg.AuthProxyEnabled && len(proxyClients) > 0 {
|
if s.cfg.AuthProxyEnabled && len(proxyClients) > 0 {
|
||||||
proxy, err := clients.ProvideProxy(cfg, cache, userService, proxyClients...)
|
proxy, err := clients.ProvideProxy(cfg, cache, proxyClients...)
|
||||||
if err != nil {
|
if err != nil {
|
||||||
s.log.Error("Failed to configure auth proxy", "err", err)
|
s.log.Error("Failed to configure auth proxy", "err", err)
|
||||||
} else {
|
} else {
|
||||||
|
@ -15,7 +15,6 @@ import (
|
|||||||
authidentity "github.com/grafana/grafana/pkg/services/auth/identity"
|
authidentity "github.com/grafana/grafana/pkg/services/auth/identity"
|
||||||
"github.com/grafana/grafana/pkg/services/authn"
|
"github.com/grafana/grafana/pkg/services/authn"
|
||||||
"github.com/grafana/grafana/pkg/services/login"
|
"github.com/grafana/grafana/pkg/services/login"
|
||||||
"github.com/grafana/grafana/pkg/services/user"
|
|
||||||
"github.com/grafana/grafana/pkg/setting"
|
"github.com/grafana/grafana/pkg/setting"
|
||||||
"github.com/grafana/grafana/pkg/util"
|
"github.com/grafana/grafana/pkg/util"
|
||||||
"github.com/grafana/grafana/pkg/util/errutil"
|
"github.com/grafana/grafana/pkg/util/errutil"
|
||||||
@ -43,12 +42,12 @@ var (
|
|||||||
_ authn.ContextAwareClient = new(Proxy)
|
_ authn.ContextAwareClient = new(Proxy)
|
||||||
)
|
)
|
||||||
|
|
||||||
func ProvideProxy(cfg *setting.Cfg, cache proxyCache, userSrv user.Service, clients ...authn.ProxyClient) (*Proxy, error) {
|
func ProvideProxy(cfg *setting.Cfg, cache proxyCache, clients ...authn.ProxyClient) (*Proxy, error) {
|
||||||
list, err := parseAcceptList(cfg.AuthProxyWhitelist)
|
list, err := parseAcceptList(cfg.AuthProxyWhitelist)
|
||||||
if err != nil {
|
if err != nil {
|
||||||
return nil, err
|
return nil, err
|
||||||
}
|
}
|
||||||
return &Proxy{log.New(authn.ClientProxy), cfg, cache, userSrv, clients, list}, nil
|
return &Proxy{log.New(authn.ClientProxy), cfg, cache, clients, list}, nil
|
||||||
}
|
}
|
||||||
|
|
||||||
type proxyCache interface {
|
type proxyCache interface {
|
||||||
@ -61,7 +60,6 @@ type Proxy struct {
|
|||||||
log log.Logger
|
log log.Logger
|
||||||
cfg *setting.Cfg
|
cfg *setting.Cfg
|
||||||
cache proxyCache
|
cache proxyCache
|
||||||
userSrv user.Service
|
|
||||||
clients []authn.ProxyClient
|
clients []authn.ProxyClient
|
||||||
acceptedIPs []*net.IPNet
|
acceptedIPs []*net.IPNet
|
||||||
}
|
}
|
||||||
@ -91,21 +89,17 @@ func (c *Proxy) Authenticate(ctx context.Context, r *authn.Request) (*authn.Iden
|
|||||||
if err != nil {
|
if err != nil {
|
||||||
c.log.FromContext(ctx).Warn("Failed to parse user id from cache", "error", err, "userId", string(entry))
|
c.log.FromContext(ctx).Warn("Failed to parse user id from cache", "error", err, "userId", string(entry))
|
||||||
} else {
|
} else {
|
||||||
usr, err := c.userSrv.GetSignedInUserWithCacheCtx(ctx, &user.GetSignedInUserQuery{
|
return &authn.Identity{
|
||||||
UserID: uid,
|
ID: authn.NamespacedID(authn.NamespaceUser, uid),
|
||||||
OrgID: r.OrgID,
|
OrgID: r.OrgID,
|
||||||
})
|
// FIXME: This does not match the actual auth module used, but should not have any impact
|
||||||
|
// Maybe caching the auth module used with the user ID would be a good idea
|
||||||
if err != nil {
|
AuthenticatedBy: login.AuthProxyAuthModule,
|
||||||
c.log.FromContext(ctx).Warn("Could not resolved cached user", "error", err, "userId", string(entry))
|
ClientParams: authn.ClientParams{
|
||||||
}
|
FetchSyncedUser: true,
|
||||||
|
SyncPermissions: true,
|
||||||
// if we for some reason cannot find the user we proceed with the normal flow, authenticate with ProxyClient
|
},
|
||||||
// and perform syncs
|
}, nil
|
||||||
if usr != nil {
|
|
||||||
c.log.FromContext(ctx).Debug("User was loaded from cache, skip syncs", "userId", usr.UserID)
|
|
||||||
return authn.IdentityFromSignedInUser(authn.NamespacedID(authn.NamespaceUser, usr.UserID), usr, authn.ClientParams{SyncPermissions: true}, login.AuthProxyAuthModule), nil
|
|
||||||
}
|
|
||||||
}
|
}
|
||||||
}
|
}
|
||||||
}
|
}
|
||||||
@ -116,7 +110,6 @@ func (c *Proxy) Authenticate(ctx context.Context, r *authn.Request) (*authn.Iden
|
|||||||
identity, clientErr = proxyClient.AuthenticateProxy(ctx, r, username, additional)
|
identity, clientErr = proxyClient.AuthenticateProxy(ctx, r, username, additional)
|
||||||
if identity != nil {
|
if identity != nil {
|
||||||
identity.ClientParams.CacheAuthProxyKey = cacheKey
|
identity.ClientParams.CacheAuthProxyKey = cacheKey
|
||||||
identity.AuthenticatedBy = login.AuthProxyAuthModule
|
|
||||||
return identity, nil
|
return identity, nil
|
||||||
}
|
}
|
||||||
}
|
}
|
||||||
|
@ -13,7 +13,6 @@ import (
|
|||||||
|
|
||||||
"github.com/grafana/grafana/pkg/services/authn"
|
"github.com/grafana/grafana/pkg/services/authn"
|
||||||
"github.com/grafana/grafana/pkg/services/authn/authntest"
|
"github.com/grafana/grafana/pkg/services/authn/authntest"
|
||||||
"github.com/grafana/grafana/pkg/services/user/usertest"
|
|
||||||
"github.com/grafana/grafana/pkg/setting"
|
"github.com/grafana/grafana/pkg/setting"
|
||||||
)
|
)
|
||||||
|
|
||||||
@ -113,7 +112,7 @@ func TestProxy_Authenticate(t *testing.T) {
|
|||||||
calledAdditional = additional
|
calledAdditional = additional
|
||||||
return nil, nil
|
return nil, nil
|
||||||
}}
|
}}
|
||||||
c, err := ProvideProxy(cfg, &fakeCache{expectedErr: errors.New("")}, usertest.NewUserServiceFake(), proxyClient)
|
c, err := ProvideProxy(cfg, &fakeCache{expectedErr: errors.New("")}, proxyClient)
|
||||||
require.NoError(t, err)
|
require.NoError(t, err)
|
||||||
|
|
||||||
_, err = c.Authenticate(context.Background(), tt.req)
|
_, err = c.Authenticate(context.Background(), tt.req)
|
||||||
@ -210,7 +209,7 @@ func TestProxy_Hook(t *testing.T) {
|
|||||||
withRole := func(role string) func(t *testing.T) {
|
withRole := func(role string) func(t *testing.T) {
|
||||||
cacheKey := fmt.Sprintf("users:johndoe-%s", role)
|
cacheKey := fmt.Sprintf("users:johndoe-%s", role)
|
||||||
return func(t *testing.T) {
|
return func(t *testing.T) {
|
||||||
c, err := ProvideProxy(cfg, cache, usertest.NewUserServiceFake(), authntest.MockProxyClient{})
|
c, err := ProvideProxy(cfg, cache, authntest.MockProxyClient{})
|
||||||
require.NoError(t, err)
|
require.NoError(t, err)
|
||||||
userIdentity := &authn.Identity{
|
userIdentity := &authn.Identity{
|
||||||
ID: userID,
|
ID: userID,
|
||||||
|
@ -120,7 +120,7 @@ func (h *ContextHandler) Middleware(next http.Handler) http.Handler {
|
|||||||
reqContext.UserToken = identity.SessionToken
|
reqContext.UserToken = identity.SessionToken
|
||||||
reqContext.IsSignedIn = !reqContext.SignedInUser.IsAnonymous
|
reqContext.IsSignedIn = !reqContext.SignedInUser.IsAnonymous
|
||||||
reqContext.AllowAnonymous = reqContext.SignedInUser.IsAnonymous
|
reqContext.AllowAnonymous = reqContext.SignedInUser.IsAnonymous
|
||||||
reqContext.IsRenderCall = identity.AuthenticatedBy == login.RenderModule
|
reqContext.IsRenderCall = identity.GetAuthenticatedBy() == login.RenderModule
|
||||||
}
|
}
|
||||||
|
|
||||||
reqContext.Logger = reqContext.Logger.New("userId", reqContext.UserID, "orgId", reqContext.OrgID, "uname", reqContext.Login)
|
reqContext.Logger = reqContext.Logger.New("userId", reqContext.UserID, "orgId", reqContext.OrgID, "uname", reqContext.Login)
|
||||||
|
Loading…
Reference in New Issue
Block a user