mirror of
https://github.com/grafana/grafana.git
synced 2025-02-25 18:55:37 -06:00
Plugins: Forward user header (X-Grafana-User) in backend plugin requests (#58646)
Grafana would forward the X-Grafana-User header to backend plugin request when dataproxy.send_user_header is enabled. In addition, X-Grafana-User will be automatically forwarded in outgoing HTTP requests for core/builtin HTTP datasources. Use grafana-plugin-sdk-go v0.147.0. Fixes #47734 Co-authored-by: Will Browne <wbrowne@users.noreply.github.com>
This commit is contained in:
parent
ecf83a6df9
commit
6478d0a5ef
@ -293,7 +293,7 @@ When configured, Grafana will pass the user's token to the plugin in an Authoriz
|
|||||||
|
|
||||||
```go
|
```go
|
||||||
func (ds *dataSource) CheckHealth(ctx context.Context, req *backend.CheckHealthRequest) (*backend.CheckHealthResult, error) {
|
func (ds *dataSource) CheckHealth(ctx context.Context, req *backend.CheckHealthRequest) (*backend.CheckHealthResult, error) {
|
||||||
token := strings.Fields(req.Headers["Authorization"])
|
token := strings.Fields(req.GetHTTPHeader(backend.OAuthIdentityTokenHeaderName))
|
||||||
var (
|
var (
|
||||||
tokenType = token[0]
|
tokenType = token[0]
|
||||||
accessToken = token[1]
|
accessToken = token[1]
|
||||||
@ -304,7 +304,7 @@ func (ds *dataSource) CheckHealth(ctx context.Context, req *backend.CheckHealthR
|
|||||||
}
|
}
|
||||||
|
|
||||||
func (ds *dataSource) QueryData(ctx context.Context, req *backend.QueryDataRequest) (*backend.QueryDataResponse, error) {
|
func (ds *dataSource) QueryData(ctx context.Context, req *backend.QueryDataRequest) (*backend.QueryDataResponse, error) {
|
||||||
token := strings.Fields(req.Headers["Authorization"])
|
token := strings.Fields(req.GetHTTPHeader(backend.OAuthIdentityTokenHeaderName))
|
||||||
var (
|
var (
|
||||||
tokenType = token[0]
|
tokenType = token[0]
|
||||||
accessToken = token[1]
|
accessToken = token[1]
|
||||||
@ -320,14 +320,14 @@ In addition, if the user's token includes an ID token, Grafana will pass the use
|
|||||||
|
|
||||||
```go
|
```go
|
||||||
func (ds *dataSource) CheckHealth(ctx context.Context, req *backend.CheckHealthRequest) (*backend.CheckHealthResult, error) {
|
func (ds *dataSource) CheckHealth(ctx context.Context, req *backend.CheckHealthRequest) (*backend.CheckHealthResult, error) {
|
||||||
idToken := req.Headers["X-ID-Token"]
|
idToken := req.GetHTTPHeader(backend.OAuthIdentityIDTokenHeaderName)
|
||||||
|
|
||||||
// ...
|
// ...
|
||||||
return &backend.CheckHealthResult{Status: backend.HealthStatusOk}, nil
|
return &backend.CheckHealthResult{Status: backend.HealthStatusOk}, nil
|
||||||
}
|
}
|
||||||
|
|
||||||
func (ds *dataSource) QueryData(ctx context.Context, req *backend.QueryDataRequest) (*backend.QueryDataResponse, error) {
|
func (ds *dataSource) QueryData(ctx context.Context, req *backend.QueryDataRequest) (*backend.QueryDataResponse, error) {
|
||||||
idToken := req.Headers["X-ID-Token"]
|
idToken := req.GetHTTPHeader(backend.OAuthIdentityIDTokenHeaderName)
|
||||||
|
|
||||||
for _, q := range req.Queries {
|
for _, q := range req.Queries {
|
||||||
// ...
|
// ...
|
||||||
@ -339,8 +339,8 @@ The `Authorization` and `X-ID-Token` headers will also be available on the `Call
|
|||||||
|
|
||||||
```go
|
```go
|
||||||
func (ds *dataSource) CallResource(ctx context.Context, req *backend.CallResourceRequest, sender backend.CallResourceResponseSender) error {
|
func (ds *dataSource) CallResource(ctx context.Context, req *backend.CallResourceRequest, sender backend.CallResourceResponseSender) error {
|
||||||
token := req.Headers["Authorization"]
|
token := req.GetHTTPHeader(backend.OAuthIdentityTokenHeaderName)
|
||||||
idToken := req.Headers["X-ID-Token"] // present if user's token includes an ID token
|
idToken := req.GetHTTPHeader(backend.OAuthIdentityIDTokenHeaderName) // present if user's token includes an ID token
|
||||||
|
|
||||||
// ...
|
// ...
|
||||||
}
|
}
|
||||||
@ -356,19 +356,43 @@ When configured, Grafana will pass these cookies to the plugin in the `Cookie` h
|
|||||||
|
|
||||||
```go
|
```go
|
||||||
func (ds *dataSource) QueryData(ctx context.Context, req *backend.QueryDataRequest) (*backend.QueryDataResponse, error) {
|
func (ds *dataSource) QueryData(ctx context.Context, req *backend.QueryDataRequest) (*backend.QueryDataResponse, error) {
|
||||||
cookies:= req.Headers["Cookie"]
|
cookies:= req.GetHTTPHeader(backend.CookiesHeaderName)
|
||||||
|
|
||||||
// ...
|
// ...
|
||||||
}
|
}
|
||||||
|
|
||||||
func (ds *dataSource) CallResource(ctx context.Context, req *backend.CallResourceRequest, sender backend.CallResourceResponseSender) error {
|
func (ds *dataSource) CallResource(ctx context.Context, req *backend.CallResourceRequest, sender backend.CallResourceResponseSender) error {
|
||||||
cookies := req.Headers["Cookie"]
|
cookies:= req.GetHTTPHeader(backend.CookiesHeaderName)
|
||||||
|
|
||||||
// ...
|
// ...
|
||||||
}
|
}
|
||||||
|
|
||||||
func (ds *dataSource) CheckHealth(ctx context.Context, req *backend.CheckHealthRequest) (*backend.CheckHealthResult, error) {
|
func (ds *dataSource) CheckHealth(ctx context.Context, req *backend.CheckHealthRequest) (*backend.CheckHealthResult, error) {
|
||||||
cookies:= req.Headers["Cookie"]
|
cookies:= req.GetHTTPHeader(backend.CookiesHeaderName)
|
||||||
|
|
||||||
|
// ...
|
||||||
|
}
|
||||||
|
```
|
||||||
|
|
||||||
|
## Forward user header for the logged-in user
|
||||||
|
|
||||||
|
When [send_user_header]({{< relref "../../setup-grafana/configure-grafana/_index.md#send_user_header" >}}) is enabled, Grafana will pass the user header to the plugin in the `X-Grafana-User` header, available in the `QueryData`, `CallResource` and `CheckHealth` requests in your backend data source.
|
||||||
|
|
||||||
|
```go
|
||||||
|
func (ds *dataSource) QueryData(ctx context.Context, req *backend.QueryDataRequest) (*backend.QueryDataResponse, error) {
|
||||||
|
u := req.GetHTTPHeader("X-Grafana-User")
|
||||||
|
|
||||||
|
// ...
|
||||||
|
}
|
||||||
|
|
||||||
|
func (ds *dataSource) CallResource(ctx context.Context, req *backend.CallResourceRequest, sender backend.CallResourceResponseSender) error {
|
||||||
|
u := req.GetHTTPHeader("X-Grafana-User")
|
||||||
|
|
||||||
|
// ...
|
||||||
|
}
|
||||||
|
|
||||||
|
func (ds *dataSource) CheckHealth(ctx context.Context, req *backend.CheckHealthRequest) (*backend.CheckHealthResult, error) {
|
||||||
|
u := req.GetHTTPHeader("X-Grafana-User")
|
||||||
|
|
||||||
// ...
|
// ...
|
||||||
}
|
}
|
||||||
|
7
go.mod
7
go.mod
@ -59,7 +59,7 @@ require (
|
|||||||
github.com/grafana/cuetsy v0.1.1
|
github.com/grafana/cuetsy v0.1.1
|
||||||
github.com/grafana/grafana-aws-sdk v0.11.0
|
github.com/grafana/grafana-aws-sdk v0.11.0
|
||||||
github.com/grafana/grafana-azure-sdk-go v1.3.1
|
github.com/grafana/grafana-azure-sdk-go v1.3.1
|
||||||
github.com/grafana/grafana-plugin-sdk-go v0.145.0
|
github.com/grafana/grafana-plugin-sdk-go v0.147.0
|
||||||
github.com/grafana/thema v0.0.0-20221113112305-b441ed85a1fd
|
github.com/grafana/thema v0.0.0-20221113112305-b441ed85a1fd
|
||||||
github.com/grpc-ecosystem/go-grpc-middleware v1.3.0
|
github.com/grpc-ecosystem/go-grpc-middleware v1.3.0
|
||||||
github.com/hashicorp/go-hclog v1.0.0
|
github.com/hashicorp/go-hclog v1.0.0
|
||||||
@ -73,7 +73,7 @@ require (
|
|||||||
github.com/lib/pq v1.10.7
|
github.com/lib/pq v1.10.7
|
||||||
github.com/linkedin/goavro/v2 v2.10.0
|
github.com/linkedin/goavro/v2 v2.10.0
|
||||||
github.com/m3db/prometheus_remote_client_golang v0.4.4
|
github.com/m3db/prometheus_remote_client_golang v0.4.4
|
||||||
github.com/magefile/mage v1.13.0
|
github.com/magefile/mage v1.14.0
|
||||||
github.com/mattn/go-isatty v0.0.14
|
github.com/mattn/go-isatty v0.0.14
|
||||||
github.com/mattn/go-sqlite3 v1.14.16
|
github.com/mattn/go-sqlite3 v1.14.16
|
||||||
github.com/matttproud/golang_protobuf_extensions v1.0.2
|
github.com/matttproud/golang_protobuf_extensions v1.0.2
|
||||||
@ -268,6 +268,8 @@ require (
|
|||||||
k8s.io/client-go v12.0.0+incompatible // gets replaced with v0.25.0
|
k8s.io/client-go v12.0.0+incompatible // gets replaced with v0.25.0
|
||||||
)
|
)
|
||||||
|
|
||||||
|
require k8s.io/apimachinery v0.25.0
|
||||||
|
|
||||||
require (
|
require (
|
||||||
cloud.google.com/go v0.102.0 // indirect
|
cloud.google.com/go v0.102.0 // indirect
|
||||||
github.com/Azure/azure-pipeline-go v0.2.3 // indirect
|
github.com/Azure/azure-pipeline-go v0.2.3 // indirect
|
||||||
@ -318,7 +320,6 @@ require (
|
|||||||
gopkg.in/fsnotify/fsnotify.v1 v1.4.7 // indirect
|
gopkg.in/fsnotify/fsnotify.v1 v1.4.7 // indirect
|
||||||
gopkg.in/inf.v0 v0.9.1 // indirect
|
gopkg.in/inf.v0 v0.9.1 // indirect
|
||||||
k8s.io/api v0.25.0 // indirect
|
k8s.io/api v0.25.0 // indirect
|
||||||
k8s.io/apimachinery v0.25.0 // indirect
|
|
||||||
k8s.io/klog/v2 v2.70.1 // indirect
|
k8s.io/klog/v2 v2.70.1 // indirect
|
||||||
k8s.io/kube-openapi v0.0.0-20220803162953-67bda5d908f1 // indirect
|
k8s.io/kube-openapi v0.0.0-20220803162953-67bda5d908f1 // indirect
|
||||||
k8s.io/utils v0.0.0-20220728103510-ee6ede2d64ed // indirect
|
k8s.io/utils v0.0.0-20220728103510-ee6ede2d64ed // indirect
|
||||||
|
8
go.sum
8
go.sum
@ -1384,8 +1384,8 @@ github.com/grafana/grafana-azure-sdk-go v1.3.1/go.mod h1:rgrnK9m6CgKlgx4rH3FFP/6
|
|||||||
github.com/grafana/grafana-google-sdk-go v0.0.0-20211104130251-b190293eaf58 h1:2ud7NNM7LrGPO4x0NFR8qLq68CqI4SmB7I2yRN2w9oE=
|
github.com/grafana/grafana-google-sdk-go v0.0.0-20211104130251-b190293eaf58 h1:2ud7NNM7LrGPO4x0NFR8qLq68CqI4SmB7I2yRN2w9oE=
|
||||||
github.com/grafana/grafana-google-sdk-go v0.0.0-20211104130251-b190293eaf58/go.mod h1:Vo2TKWfDVmNTELBUM+3lkrZvFtBws0qSZdXhQxRdJrE=
|
github.com/grafana/grafana-google-sdk-go v0.0.0-20211104130251-b190293eaf58/go.mod h1:Vo2TKWfDVmNTELBUM+3lkrZvFtBws0qSZdXhQxRdJrE=
|
||||||
github.com/grafana/grafana-plugin-sdk-go v0.114.0/go.mod h1:D7x3ah+1d4phNXpbnOaxa/osSaZlwh9/ZUnGGzegRbk=
|
github.com/grafana/grafana-plugin-sdk-go v0.114.0/go.mod h1:D7x3ah+1d4phNXpbnOaxa/osSaZlwh9/ZUnGGzegRbk=
|
||||||
github.com/grafana/grafana-plugin-sdk-go v0.145.0 h1:ZlRxxV3C6RA+wNWeGr+rLVD70pgsZwiLI9etzE0zu+Q=
|
github.com/grafana/grafana-plugin-sdk-go v0.147.0 h1:VavvJOa/Ubs+wzalzWIl+FQmdaD4vEK8KVYU0a8rf+E=
|
||||||
github.com/grafana/grafana-plugin-sdk-go v0.145.0/go.mod h1:dFof/7GenWBFTmrfcPRCpLau7tgIED0ykzupWAlB0o0=
|
github.com/grafana/grafana-plugin-sdk-go v0.147.0/go.mod h1:NMgO3t2gR5wyLx8bWZ9CTmpDk5Txp4wYFccFLHdYn3Q=
|
||||||
github.com/grafana/prometheus-alertmanager v0.24.1-0.20221012142027-823cd9150293 h1:dJIdfHqu+XjKz+w9zXLqXKPdp6Jjx/UPSOwdeSfWdeQ=
|
github.com/grafana/prometheus-alertmanager v0.24.1-0.20221012142027-823cd9150293 h1:dJIdfHqu+XjKz+w9zXLqXKPdp6Jjx/UPSOwdeSfWdeQ=
|
||||||
github.com/grafana/prometheus-alertmanager v0.24.1-0.20221012142027-823cd9150293/go.mod h1:HVHqK+BVPa/tmL8EMhLCCrPt2a1GdJpEyxr5hgur2UI=
|
github.com/grafana/prometheus-alertmanager v0.24.1-0.20221012142027-823cd9150293/go.mod h1:HVHqK+BVPa/tmL8EMhLCCrPt2a1GdJpEyxr5hgur2UI=
|
||||||
github.com/grafana/saml v0.4.9-0.20220727151557-61cd9c9353fc h1:1PY8n+rXuBNr3r1JQhoytWDCpc+pq+BibxV0SZv+Cr4=
|
github.com/grafana/saml v0.4.9-0.20220727151557-61cd9c9353fc h1:1PY8n+rXuBNr3r1JQhoytWDCpc+pq+BibxV0SZv+Cr4=
|
||||||
@ -1782,8 +1782,8 @@ github.com/lyft/protoc-gen-star v0.5.1/go.mod h1:9toiA3cC7z5uVbODF7kEQ91Xn7XNFkV
|
|||||||
github.com/m3db/prometheus_remote_client_golang v0.4.4 h1:DsAIjVKoCp7Ym35tAOFL1OuMLIdIikAEHeNPHY+yyM8=
|
github.com/m3db/prometheus_remote_client_golang v0.4.4 h1:DsAIjVKoCp7Ym35tAOFL1OuMLIdIikAEHeNPHY+yyM8=
|
||||||
github.com/m3db/prometheus_remote_client_golang v0.4.4/go.mod h1:wHfVbA3eAK6dQvKjCkHhusWYegCk3bDGkA15zymSHdc=
|
github.com/m3db/prometheus_remote_client_golang v0.4.4/go.mod h1:wHfVbA3eAK6dQvKjCkHhusWYegCk3bDGkA15zymSHdc=
|
||||||
github.com/magefile/mage v1.11.0/go.mod h1:z5UZb/iS3GoOSn0JgWuiw7dxlurVYTu+/jHXqQg881A=
|
github.com/magefile/mage v1.11.0/go.mod h1:z5UZb/iS3GoOSn0JgWuiw7dxlurVYTu+/jHXqQg881A=
|
||||||
github.com/magefile/mage v1.13.0 h1:XtLJl8bcCM7EFoO8FyH8XK3t7G5hQAeK+i4tq+veT9M=
|
github.com/magefile/mage v1.14.0 h1:6QDX3g6z1YvJ4olPhT1wksUcSa/V0a1B+pJb73fBjyo=
|
||||||
github.com/magefile/mage v1.13.0/go.mod h1:z5UZb/iS3GoOSn0JgWuiw7dxlurVYTu+/jHXqQg881A=
|
github.com/magefile/mage v1.14.0/go.mod h1:z5UZb/iS3GoOSn0JgWuiw7dxlurVYTu+/jHXqQg881A=
|
||||||
github.com/magiconair/properties v1.8.0/go.mod h1:PppfXfuXeibc/6YijjN8zIbojt8czPbwD3XqdrwzmxQ=
|
github.com/magiconair/properties v1.8.0/go.mod h1:PppfXfuXeibc/6YijjN8zIbojt8czPbwD3XqdrwzmxQ=
|
||||||
github.com/magiconair/properties v1.8.1/go.mod h1:PppfXfuXeibc/6YijjN8zIbojt8czPbwD3XqdrwzmxQ=
|
github.com/magiconair/properties v1.8.1/go.mod h1:PppfXfuXeibc/6YijjN8zIbojt8czPbwD3XqdrwzmxQ=
|
||||||
github.com/magiconair/properties v1.8.5/go.mod h1:y3VJvCyxH9uVvJTWEGAELF3aiYNyPKd5NZ3oSwXrF60=
|
github.com/magiconair/properties v1.8.5/go.mod h1:y3VJvCyxH9uVvJTWEGAELF3aiYNyPKd5NZ3oSwXrF60=
|
||||||
|
@ -222,7 +222,7 @@ func (proxy *DataSourceProxy) director(req *http.Request) {
|
|||||||
req.Header.Set("Authorization", dsAuth)
|
req.Header.Set("Authorization", dsAuth)
|
||||||
}
|
}
|
||||||
|
|
||||||
applyUserHeader(proxy.cfg.SendUserHeader, req, proxy.ctx.SignedInUser)
|
proxyutil.ApplyUserHeader(proxy.cfg.SendUserHeader, req, proxy.ctx.SignedInUser)
|
||||||
|
|
||||||
proxyutil.ClearCookieHeader(req, proxy.ds.AllowedCookies(), []string{proxy.cfg.LoginCookieName})
|
proxyutil.ClearCookieHeader(req, proxy.ds.AllowedCookies(), []string{proxy.cfg.LoginCookieName})
|
||||||
req.Header.Set("User-Agent", fmt.Sprintf("Grafana/%s", setting.BuildVersion))
|
req.Header.Set("User-Agent", fmt.Sprintf("Grafana/%s", setting.BuildVersion))
|
||||||
|
@ -154,7 +154,7 @@ func (proxy PluginProxy) director(req *http.Request) {
|
|||||||
|
|
||||||
req.Header.Set("X-Grafana-Context", string(ctxJSON))
|
req.Header.Set("X-Grafana-Context", string(ctxJSON))
|
||||||
|
|
||||||
applyUserHeader(proxy.cfg.SendUserHeader, req, proxy.ctx.SignedInUser)
|
proxyutil.ApplyUserHeader(proxy.cfg.SendUserHeader, req, proxy.ctx.SignedInUser)
|
||||||
|
|
||||||
if err := addHeaders(&req.Header, proxy.matchedRoute, data); err != nil {
|
if err := addHeaders(&req.Header, proxy.matchedRoute, data); err != nil {
|
||||||
proxy.ctx.JsonApiErr(500, "Failed to render plugin headers", err)
|
proxy.ctx.JsonApiErr(500, "Failed to render plugin headers", err)
|
||||||
|
@ -9,7 +9,6 @@ import (
|
|||||||
"text/template"
|
"text/template"
|
||||||
|
|
||||||
"github.com/grafana/grafana/pkg/plugins"
|
"github.com/grafana/grafana/pkg/plugins"
|
||||||
"github.com/grafana/grafana/pkg/services/user"
|
|
||||||
)
|
)
|
||||||
|
|
||||||
// interpolateString accepts template data and return a string with substitutions
|
// interpolateString accepts template data and return a string with substitutions
|
||||||
@ -84,11 +83,3 @@ func setBodyContent(req *http.Request, route *plugins.Route, data templateData)
|
|||||||
|
|
||||||
return nil
|
return nil
|
||||||
}
|
}
|
||||||
|
|
||||||
// Set the X-Grafana-User header if needed (and remove if not)
|
|
||||||
func applyUserHeader(sendUserHeader bool, req *http.Request, user *user.SignedInUser) {
|
|
||||||
req.Header.Del("X-Grafana-User")
|
|
||||||
if sendUserHeader && !user.IsAnonymous {
|
|
||||||
req.Header.Set("X-Grafana-User", user.Login)
|
|
||||||
}
|
|
||||||
}
|
|
||||||
|
@ -148,3 +148,8 @@ func (l *logWrapper) Error(msg string, args ...interface{}) {
|
|||||||
func (l *logWrapper) Level() sdklog.Level {
|
func (l *logWrapper) Level() sdklog.Level {
|
||||||
return sdklog.NoLevel
|
return sdklog.NoLevel
|
||||||
}
|
}
|
||||||
|
|
||||||
|
func (l *logWrapper) With(args ...interface{}) sdklog.Logger {
|
||||||
|
l.logger = l.logger.New(args...)
|
||||||
|
return l
|
||||||
|
}
|
||||||
|
@ -0,0 +1,103 @@
|
|||||||
|
package clientmiddleware
|
||||||
|
|
||||||
|
import (
|
||||||
|
"context"
|
||||||
|
"net/http"
|
||||||
|
|
||||||
|
"github.com/grafana/grafana-plugin-sdk-go/backend"
|
||||||
|
sdkhttpclient "github.com/grafana/grafana-plugin-sdk-go/backend/httpclient"
|
||||||
|
"github.com/grafana/grafana/pkg/infra/httpclient/httpclientprovider"
|
||||||
|
"github.com/grafana/grafana/pkg/plugins"
|
||||||
|
"github.com/grafana/grafana/pkg/services/contexthandler"
|
||||||
|
"github.com/grafana/grafana/pkg/util/proxyutil"
|
||||||
|
)
|
||||||
|
|
||||||
|
// NewUserHeaderMiddleware creates a new plugins.ClientMiddleware that will
|
||||||
|
// populate the X-Grafana-User header on outgoing plugins.Client and HTTP
|
||||||
|
// requests.
|
||||||
|
func NewUserHeaderMiddleware() plugins.ClientMiddleware {
|
||||||
|
return plugins.ClientMiddlewareFunc(func(next plugins.Client) plugins.Client {
|
||||||
|
return &UserHeaderMiddleware{
|
||||||
|
next: next,
|
||||||
|
}
|
||||||
|
})
|
||||||
|
}
|
||||||
|
|
||||||
|
type UserHeaderMiddleware struct {
|
||||||
|
next plugins.Client
|
||||||
|
}
|
||||||
|
|
||||||
|
func (m *UserHeaderMiddleware) applyToken(ctx context.Context, pCtx backend.PluginContext, h backend.ForwardHTTPHeaders) context.Context {
|
||||||
|
reqCtx := contexthandler.FromContext(ctx)
|
||||||
|
// if no HTTP request context skip middleware
|
||||||
|
if h == nil || reqCtx == nil || reqCtx.Req == nil || reqCtx.SignedInUser == nil {
|
||||||
|
return ctx
|
||||||
|
}
|
||||||
|
|
||||||
|
h.DeleteHTTPHeader(proxyutil.UserHeaderName)
|
||||||
|
if !reqCtx.IsAnonymous {
|
||||||
|
h.SetHTTPHeader(proxyutil.UserHeaderName, reqCtx.Login)
|
||||||
|
}
|
||||||
|
|
||||||
|
middlewares := []sdkhttpclient.Middleware{}
|
||||||
|
|
||||||
|
if !reqCtx.IsAnonymous {
|
||||||
|
httpHeaders := http.Header{
|
||||||
|
proxyutil.UserHeaderName: []string{reqCtx.Login},
|
||||||
|
}
|
||||||
|
|
||||||
|
middlewares = append(middlewares, httpclientprovider.SetHeadersMiddleware(httpHeaders))
|
||||||
|
} else {
|
||||||
|
middlewares = append(middlewares, httpclientprovider.DeleteHeadersMiddleware(proxyutil.UserHeaderName))
|
||||||
|
}
|
||||||
|
|
||||||
|
ctx = sdkhttpclient.WithContextualMiddleware(ctx, middlewares...)
|
||||||
|
|
||||||
|
return ctx
|
||||||
|
}
|
||||||
|
|
||||||
|
func (m *UserHeaderMiddleware) QueryData(ctx context.Context, req *backend.QueryDataRequest) (*backend.QueryDataResponse, error) {
|
||||||
|
if req == nil {
|
||||||
|
return m.next.QueryData(ctx, req)
|
||||||
|
}
|
||||||
|
|
||||||
|
ctx = m.applyToken(ctx, req.PluginContext, req)
|
||||||
|
|
||||||
|
return m.next.QueryData(ctx, req)
|
||||||
|
}
|
||||||
|
|
||||||
|
func (m *UserHeaderMiddleware) CallResource(ctx context.Context, req *backend.CallResourceRequest, sender backend.CallResourceResponseSender) error {
|
||||||
|
if req == nil {
|
||||||
|
return m.next.CallResource(ctx, req, sender)
|
||||||
|
}
|
||||||
|
|
||||||
|
ctx = m.applyToken(ctx, req.PluginContext, req)
|
||||||
|
|
||||||
|
return m.next.CallResource(ctx, req, sender)
|
||||||
|
}
|
||||||
|
|
||||||
|
func (m *UserHeaderMiddleware) CheckHealth(ctx context.Context, req *backend.CheckHealthRequest) (*backend.CheckHealthResult, error) {
|
||||||
|
if req == nil {
|
||||||
|
return m.next.CheckHealth(ctx, req)
|
||||||
|
}
|
||||||
|
|
||||||
|
ctx = m.applyToken(ctx, req.PluginContext, req)
|
||||||
|
|
||||||
|
return m.next.CheckHealth(ctx, req)
|
||||||
|
}
|
||||||
|
|
||||||
|
func (m *UserHeaderMiddleware) CollectMetrics(ctx context.Context, req *backend.CollectMetricsRequest) (*backend.CollectMetricsResult, error) {
|
||||||
|
return m.next.CollectMetrics(ctx, req)
|
||||||
|
}
|
||||||
|
|
||||||
|
func (m *UserHeaderMiddleware) SubscribeStream(ctx context.Context, req *backend.SubscribeStreamRequest) (*backend.SubscribeStreamResponse, error) {
|
||||||
|
return m.next.SubscribeStream(ctx, req)
|
||||||
|
}
|
||||||
|
|
||||||
|
func (m *UserHeaderMiddleware) PublishStream(ctx context.Context, req *backend.PublishStreamRequest) (*backend.PublishStreamResponse, error) {
|
||||||
|
return m.next.PublishStream(ctx, req)
|
||||||
|
}
|
||||||
|
|
||||||
|
func (m *UserHeaderMiddleware) RunStream(ctx context.Context, req *backend.RunStreamRequest, sender *backend.StreamSender) error {
|
||||||
|
return m.next.RunStream(ctx, req, sender)
|
||||||
|
}
|
@ -0,0 +1,254 @@
|
|||||||
|
package clientmiddleware
|
||||||
|
|
||||||
|
import (
|
||||||
|
"net/http"
|
||||||
|
"testing"
|
||||||
|
|
||||||
|
"github.com/grafana/grafana-plugin-sdk-go/backend"
|
||||||
|
"github.com/grafana/grafana-plugin-sdk-go/backend/httpclient"
|
||||||
|
"github.com/grafana/grafana/pkg/infra/httpclient/httpclientprovider"
|
||||||
|
"github.com/grafana/grafana/pkg/plugins/manager/client/clienttest"
|
||||||
|
"github.com/grafana/grafana/pkg/services/user"
|
||||||
|
"github.com/grafana/grafana/pkg/util/proxyutil"
|
||||||
|
"github.com/stretchr/testify/require"
|
||||||
|
)
|
||||||
|
|
||||||
|
func TestUserHeaderMiddleware(t *testing.T) {
|
||||||
|
t.Run("When anononymous user in reqContext", func(t *testing.T) {
|
||||||
|
req, err := http.NewRequest(http.MethodGet, "/some/thing", nil)
|
||||||
|
require.NoError(t, err)
|
||||||
|
|
||||||
|
t.Run("And requests are for a datasource", func(t *testing.T) {
|
||||||
|
cdt := clienttest.NewClientDecoratorTest(t,
|
||||||
|
clienttest.WithReqContext(req, &user.SignedInUser{
|
||||||
|
IsAnonymous: true,
|
||||||
|
Login: "anonymous"},
|
||||||
|
),
|
||||||
|
clienttest.WithMiddlewares(NewUserHeaderMiddleware()),
|
||||||
|
)
|
||||||
|
|
||||||
|
pluginCtx := backend.PluginContext{
|
||||||
|
DataSourceInstanceSettings: &backend.DataSourceInstanceSettings{},
|
||||||
|
}
|
||||||
|
|
||||||
|
t.Run("Should not forward user header when calling QueryData", func(t *testing.T) {
|
||||||
|
_, err = cdt.Decorator.QueryData(req.Context(), &backend.QueryDataRequest{
|
||||||
|
PluginContext: pluginCtx,
|
||||||
|
Headers: map[string]string{},
|
||||||
|
})
|
||||||
|
require.NoError(t, err)
|
||||||
|
require.NotNil(t, cdt.QueryDataReq)
|
||||||
|
require.Empty(t, cdt.QueryDataReq.Headers)
|
||||||
|
|
||||||
|
middlewares := httpclient.ContextualMiddlewareFromContext(cdt.QueryDataCtx)
|
||||||
|
require.Len(t, middlewares, 1)
|
||||||
|
require.Equal(t, httpclientprovider.DeleteHeadersMiddlewareName, middlewares[0].(httpclient.MiddlewareName).MiddlewareName())
|
||||||
|
})
|
||||||
|
|
||||||
|
t.Run("Should not forward user header when calling CallResource", func(t *testing.T) {
|
||||||
|
err = cdt.Decorator.CallResource(req.Context(), &backend.CallResourceRequest{
|
||||||
|
PluginContext: pluginCtx,
|
||||||
|
Headers: map[string][]string{},
|
||||||
|
}, nopCallResourceSender)
|
||||||
|
require.NoError(t, err)
|
||||||
|
require.NotNil(t, cdt.CallResourceReq)
|
||||||
|
require.Empty(t, cdt.CallResourceReq.Headers)
|
||||||
|
|
||||||
|
middlewares := httpclient.ContextualMiddlewareFromContext(cdt.CallResourceCtx)
|
||||||
|
require.Len(t, middlewares, 1)
|
||||||
|
require.Equal(t, httpclientprovider.DeleteHeadersMiddlewareName, middlewares[0].(httpclient.MiddlewareName).MiddlewareName())
|
||||||
|
})
|
||||||
|
|
||||||
|
t.Run("Should not forward user header when calling CheckHealth", func(t *testing.T) {
|
||||||
|
_, err = cdt.Decorator.CheckHealth(req.Context(), &backend.CheckHealthRequest{
|
||||||
|
PluginContext: pluginCtx,
|
||||||
|
Headers: map[string]string{},
|
||||||
|
})
|
||||||
|
require.NoError(t, err)
|
||||||
|
require.NotNil(t, cdt.CheckHealthReq)
|
||||||
|
require.Empty(t, cdt.CheckHealthReq.Headers)
|
||||||
|
|
||||||
|
middlewares := httpclient.ContextualMiddlewareFromContext(cdt.CheckHealthCtx)
|
||||||
|
require.Len(t, middlewares, 1)
|
||||||
|
require.Equal(t, httpclientprovider.DeleteHeadersMiddlewareName, middlewares[0].(httpclient.MiddlewareName).MiddlewareName())
|
||||||
|
})
|
||||||
|
})
|
||||||
|
|
||||||
|
t.Run("And requests are for an app", func(t *testing.T) {
|
||||||
|
cdt := clienttest.NewClientDecoratorTest(t,
|
||||||
|
clienttest.WithReqContext(req, &user.SignedInUser{
|
||||||
|
IsAnonymous: true,
|
||||||
|
Login: "anonymous"},
|
||||||
|
),
|
||||||
|
clienttest.WithMiddlewares(NewUserHeaderMiddleware()),
|
||||||
|
)
|
||||||
|
|
||||||
|
pluginCtx := backend.PluginContext{
|
||||||
|
AppInstanceSettings: &backend.AppInstanceSettings{},
|
||||||
|
}
|
||||||
|
|
||||||
|
t.Run("Should not forward user header when calling QueryData", func(t *testing.T) {
|
||||||
|
_, err = cdt.Decorator.QueryData(req.Context(), &backend.QueryDataRequest{
|
||||||
|
PluginContext: pluginCtx,
|
||||||
|
Headers: map[string]string{},
|
||||||
|
})
|
||||||
|
require.NoError(t, err)
|
||||||
|
require.NotNil(t, cdt.QueryDataReq)
|
||||||
|
require.Empty(t, cdt.QueryDataReq.Headers)
|
||||||
|
|
||||||
|
middlewares := httpclient.ContextualMiddlewareFromContext(cdt.QueryDataCtx)
|
||||||
|
require.Len(t, middlewares, 1)
|
||||||
|
require.Equal(t, httpclientprovider.DeleteHeadersMiddlewareName, middlewares[0].(httpclient.MiddlewareName).MiddlewareName())
|
||||||
|
})
|
||||||
|
|
||||||
|
t.Run("Should not forward user header when calling CallResource", func(t *testing.T) {
|
||||||
|
err = cdt.Decorator.CallResource(req.Context(), &backend.CallResourceRequest{
|
||||||
|
PluginContext: pluginCtx,
|
||||||
|
Headers: map[string][]string{},
|
||||||
|
}, nopCallResourceSender)
|
||||||
|
require.NoError(t, err)
|
||||||
|
require.NotNil(t, cdt.CallResourceReq)
|
||||||
|
require.Empty(t, cdt.CallResourceReq.Headers)
|
||||||
|
|
||||||
|
middlewares := httpclient.ContextualMiddlewareFromContext(cdt.CallResourceCtx)
|
||||||
|
require.Len(t, middlewares, 1)
|
||||||
|
require.Equal(t, httpclientprovider.DeleteHeadersMiddlewareName, middlewares[0].(httpclient.MiddlewareName).MiddlewareName())
|
||||||
|
})
|
||||||
|
|
||||||
|
t.Run("Should not forward user header when calling CheckHealth", func(t *testing.T) {
|
||||||
|
_, err = cdt.Decorator.CheckHealth(req.Context(), &backend.CheckHealthRequest{
|
||||||
|
PluginContext: pluginCtx,
|
||||||
|
Headers: map[string]string{},
|
||||||
|
})
|
||||||
|
require.NoError(t, err)
|
||||||
|
require.NotNil(t, cdt.CheckHealthReq)
|
||||||
|
require.Empty(t, cdt.CheckHealthReq.Headers)
|
||||||
|
|
||||||
|
middlewares := httpclient.ContextualMiddlewareFromContext(cdt.CheckHealthCtx)
|
||||||
|
require.Len(t, middlewares, 1)
|
||||||
|
require.Equal(t, httpclientprovider.DeleteHeadersMiddlewareName, middlewares[0].(httpclient.MiddlewareName).MiddlewareName())
|
||||||
|
})
|
||||||
|
})
|
||||||
|
})
|
||||||
|
|
||||||
|
t.Run("When real user in reqContext", func(t *testing.T) {
|
||||||
|
req, err := http.NewRequest(http.MethodGet, "/some/thing", nil)
|
||||||
|
require.NoError(t, err)
|
||||||
|
|
||||||
|
t.Run("And requests are for a datasource", func(t *testing.T) {
|
||||||
|
cdt := clienttest.NewClientDecoratorTest(t,
|
||||||
|
clienttest.WithReqContext(req, &user.SignedInUser{
|
||||||
|
Login: "admin",
|
||||||
|
}),
|
||||||
|
clienttest.WithMiddlewares(NewUserHeaderMiddleware()),
|
||||||
|
)
|
||||||
|
|
||||||
|
pluginCtx := backend.PluginContext{
|
||||||
|
DataSourceInstanceSettings: &backend.DataSourceInstanceSettings{},
|
||||||
|
}
|
||||||
|
|
||||||
|
t.Run("Should forward user header when calling QueryData", func(t *testing.T) {
|
||||||
|
_, err = cdt.Decorator.QueryData(req.Context(), &backend.QueryDataRequest{
|
||||||
|
PluginContext: pluginCtx,
|
||||||
|
Headers: map[string]string{},
|
||||||
|
})
|
||||||
|
require.NoError(t, err)
|
||||||
|
require.NotNil(t, cdt.QueryDataReq)
|
||||||
|
require.Len(t, cdt.QueryDataReq.Headers, 1)
|
||||||
|
require.Equal(t, "admin", cdt.QueryDataReq.GetHTTPHeader(proxyutil.UserHeaderName))
|
||||||
|
|
||||||
|
middlewares := httpclient.ContextualMiddlewareFromContext(cdt.QueryDataCtx)
|
||||||
|
require.Len(t, middlewares, 1)
|
||||||
|
require.Equal(t, httpclientprovider.SetHeadersMiddlewareName, middlewares[0].(httpclient.MiddlewareName).MiddlewareName())
|
||||||
|
})
|
||||||
|
|
||||||
|
t.Run("Should forward user header when calling CallResource", func(t *testing.T) {
|
||||||
|
err = cdt.Decorator.CallResource(req.Context(), &backend.CallResourceRequest{
|
||||||
|
PluginContext: pluginCtx,
|
||||||
|
Headers: map[string][]string{},
|
||||||
|
}, nopCallResourceSender)
|
||||||
|
require.NoError(t, err)
|
||||||
|
require.NotNil(t, cdt.CallResourceReq)
|
||||||
|
require.Len(t, cdt.CallResourceReq.Headers, 1)
|
||||||
|
require.Equal(t, "admin", cdt.CallResourceReq.GetHTTPHeader(proxyutil.UserHeaderName))
|
||||||
|
|
||||||
|
middlewares := httpclient.ContextualMiddlewareFromContext(cdt.CallResourceCtx)
|
||||||
|
require.Len(t, middlewares, 1)
|
||||||
|
require.Equal(t, httpclientprovider.SetHeadersMiddlewareName, middlewares[0].(httpclient.MiddlewareName).MiddlewareName())
|
||||||
|
})
|
||||||
|
|
||||||
|
t.Run("Should forward user header when calling CheckHealth", func(t *testing.T) {
|
||||||
|
_, err = cdt.Decorator.CheckHealth(req.Context(), &backend.CheckHealthRequest{
|
||||||
|
PluginContext: pluginCtx,
|
||||||
|
Headers: map[string]string{},
|
||||||
|
})
|
||||||
|
require.NoError(t, err)
|
||||||
|
require.NotNil(t, cdt.CheckHealthReq)
|
||||||
|
require.Len(t, cdt.CheckHealthReq.Headers, 1)
|
||||||
|
require.Equal(t, "admin", cdt.CheckHealthReq.GetHTTPHeader(proxyutil.UserHeaderName))
|
||||||
|
|
||||||
|
middlewares := httpclient.ContextualMiddlewareFromContext(cdt.CheckHealthCtx)
|
||||||
|
require.Len(t, middlewares, 1)
|
||||||
|
require.Equal(t, httpclientprovider.SetHeadersMiddlewareName, middlewares[0].(httpclient.MiddlewareName).MiddlewareName())
|
||||||
|
})
|
||||||
|
})
|
||||||
|
|
||||||
|
t.Run("And requests are for an app", func(t *testing.T) {
|
||||||
|
cdt := clienttest.NewClientDecoratorTest(t,
|
||||||
|
clienttest.WithReqContext(req, &user.SignedInUser{
|
||||||
|
Login: "admin",
|
||||||
|
}),
|
||||||
|
clienttest.WithMiddlewares(NewUserHeaderMiddleware()),
|
||||||
|
)
|
||||||
|
|
||||||
|
pluginCtx := backend.PluginContext{
|
||||||
|
AppInstanceSettings: &backend.AppInstanceSettings{},
|
||||||
|
}
|
||||||
|
|
||||||
|
t.Run("Should forward user header when calling QueryData", func(t *testing.T) {
|
||||||
|
_, err = cdt.Decorator.QueryData(req.Context(), &backend.QueryDataRequest{
|
||||||
|
PluginContext: pluginCtx,
|
||||||
|
Headers: map[string]string{},
|
||||||
|
})
|
||||||
|
require.NoError(t, err)
|
||||||
|
require.NotNil(t, cdt.QueryDataReq)
|
||||||
|
require.Len(t, cdt.QueryDataReq.Headers, 1)
|
||||||
|
require.Equal(t, "admin", cdt.QueryDataReq.GetHTTPHeader(proxyutil.UserHeaderName))
|
||||||
|
|
||||||
|
middlewares := httpclient.ContextualMiddlewareFromContext(cdt.QueryDataCtx)
|
||||||
|
require.Len(t, middlewares, 1)
|
||||||
|
require.Equal(t, httpclientprovider.SetHeadersMiddlewareName, middlewares[0].(httpclient.MiddlewareName).MiddlewareName())
|
||||||
|
})
|
||||||
|
|
||||||
|
t.Run("Should forward user header when calling CallResource", func(t *testing.T) {
|
||||||
|
err = cdt.Decorator.CallResource(req.Context(), &backend.CallResourceRequest{
|
||||||
|
PluginContext: pluginCtx,
|
||||||
|
Headers: map[string][]string{},
|
||||||
|
}, nopCallResourceSender)
|
||||||
|
require.NoError(t, err)
|
||||||
|
require.NotNil(t, cdt.CallResourceReq)
|
||||||
|
require.Len(t, cdt.CallResourceReq.Headers, 1)
|
||||||
|
require.Equal(t, "admin", cdt.CallResourceReq.GetHTTPHeader(proxyutil.UserHeaderName))
|
||||||
|
|
||||||
|
middlewares := httpclient.ContextualMiddlewareFromContext(cdt.CallResourceCtx)
|
||||||
|
require.Len(t, middlewares, 1)
|
||||||
|
require.Equal(t, httpclientprovider.SetHeadersMiddlewareName, middlewares[0].(httpclient.MiddlewareName).MiddlewareName())
|
||||||
|
})
|
||||||
|
|
||||||
|
t.Run("Should forward user header when calling CheckHealth", func(t *testing.T) {
|
||||||
|
_, err = cdt.Decorator.CheckHealth(req.Context(), &backend.CheckHealthRequest{
|
||||||
|
PluginContext: pluginCtx,
|
||||||
|
Headers: map[string]string{},
|
||||||
|
})
|
||||||
|
require.NoError(t, err)
|
||||||
|
require.NotNil(t, cdt.CheckHealthReq)
|
||||||
|
require.Len(t, cdt.CheckHealthReq.Headers, 1)
|
||||||
|
require.Equal(t, "admin", cdt.CheckHealthReq.GetHTTPHeader(proxyutil.UserHeaderName))
|
||||||
|
|
||||||
|
middlewares := httpclient.ContextualMiddlewareFromContext(cdt.CheckHealthCtx)
|
||||||
|
require.Len(t, middlewares, 1)
|
||||||
|
require.Equal(t, httpclientprovider.SetHeadersMiddlewareName, middlewares[0].(httpclient.MiddlewareName).MiddlewareName())
|
||||||
|
})
|
||||||
|
})
|
||||||
|
})
|
||||||
|
}
|
@ -77,5 +77,9 @@ func CreateMiddlewares(cfg *setting.Cfg, oAuthTokenService oauthtoken.OAuthToken
|
|||||||
clientmiddleware.NewCookiesMiddleware(skipCookiesNames),
|
clientmiddleware.NewCookiesMiddleware(skipCookiesNames),
|
||||||
}
|
}
|
||||||
|
|
||||||
|
if cfg.SendUserHeader {
|
||||||
|
middlewares = append(middlewares, clientmiddleware.NewUserHeaderMiddleware())
|
||||||
|
}
|
||||||
|
|
||||||
return middlewares
|
return middlewares
|
||||||
}
|
}
|
||||||
|
@ -4,8 +4,13 @@ import (
|
|||||||
"net"
|
"net"
|
||||||
"net/http"
|
"net/http"
|
||||||
"sort"
|
"sort"
|
||||||
|
|
||||||
|
"github.com/grafana/grafana/pkg/services/user"
|
||||||
)
|
)
|
||||||
|
|
||||||
|
// UserHeaderName name of the header used when forwarding the Grafana user login.
|
||||||
|
const UserHeaderName = "X-Grafana-User"
|
||||||
|
|
||||||
// PrepareProxyRequest prepares a request for being proxied.
|
// PrepareProxyRequest prepares a request for being proxied.
|
||||||
// Removes X-Forwarded-Host, X-Forwarded-Port, X-Forwarded-Proto, Origin, Referer headers.
|
// Removes X-Forwarded-Host, X-Forwarded-Port, X-Forwarded-Proto, Origin, Referer headers.
|
||||||
// Set X-Grafana-Referer based on contents of Referer.
|
// Set X-Grafana-Referer based on contents of Referer.
|
||||||
@ -69,3 +74,11 @@ func ClearCookieHeader(req *http.Request, keepCookiesNames []string, skipCookies
|
|||||||
func SetProxyResponseHeaders(header http.Header) {
|
func SetProxyResponseHeaders(header http.Header) {
|
||||||
header.Set("Content-Security-Policy", "sandbox")
|
header.Set("Content-Security-Policy", "sandbox")
|
||||||
}
|
}
|
||||||
|
|
||||||
|
// ApplyUserHeader Set the X-Grafana-User header if needed (and remove if not).
|
||||||
|
func ApplyUserHeader(sendUserHeader bool, req *http.Request, user *user.SignedInUser) {
|
||||||
|
req.Header.Del(UserHeaderName)
|
||||||
|
if sendUserHeader && user != nil && !user.IsAnonymous {
|
||||||
|
req.Header.Set(UserHeaderName, user.Login)
|
||||||
|
}
|
||||||
|
}
|
||||||
|
@ -4,6 +4,7 @@ import (
|
|||||||
"net/http"
|
"net/http"
|
||||||
"testing"
|
"testing"
|
||||||
|
|
||||||
|
"github.com/grafana/grafana/pkg/services/user"
|
||||||
"github.com/stretchr/testify/require"
|
"github.com/stretchr/testify/require"
|
||||||
)
|
)
|
||||||
|
|
||||||
@ -109,3 +110,39 @@ func TestClearCookieHeader(t *testing.T) {
|
|||||||
require.Equal(t, "cookie1=", req.Header.Get("Cookie"))
|
require.Equal(t, "cookie1=", req.Header.Get("Cookie"))
|
||||||
})
|
})
|
||||||
}
|
}
|
||||||
|
|
||||||
|
func TestApplyUserHeader(t *testing.T) {
|
||||||
|
t.Run("Should not apply user header when not enabled, should remove the existing", func(t *testing.T) {
|
||||||
|
req, err := http.NewRequest(http.MethodGet, "/", nil)
|
||||||
|
require.NoError(t, err)
|
||||||
|
req.Header.Set("X-Grafana-User", "admin")
|
||||||
|
|
||||||
|
ApplyUserHeader(false, req, &user.SignedInUser{Login: "admin"})
|
||||||
|
require.NotContains(t, req.Header, "X-Grafana-User")
|
||||||
|
})
|
||||||
|
|
||||||
|
t.Run("Should not apply user header when user is nil, should remove the existing", func(t *testing.T) {
|
||||||
|
req, err := http.NewRequest(http.MethodGet, "/", nil)
|
||||||
|
require.NoError(t, err)
|
||||||
|
req.Header.Set("X-Grafana-User", "admin")
|
||||||
|
|
||||||
|
ApplyUserHeader(false, req, nil)
|
||||||
|
require.NotContains(t, req.Header, "X-Grafana-User")
|
||||||
|
})
|
||||||
|
|
||||||
|
t.Run("Should not apply user header for anonomous user", func(t *testing.T) {
|
||||||
|
req, err := http.NewRequest(http.MethodGet, "/", nil)
|
||||||
|
require.NoError(t, err)
|
||||||
|
|
||||||
|
ApplyUserHeader(true, req, &user.SignedInUser{IsAnonymous: true})
|
||||||
|
require.NotContains(t, req.Header, "X-Grafana-User")
|
||||||
|
})
|
||||||
|
|
||||||
|
t.Run("Should apply user header for non-anonomous user", func(t *testing.T) {
|
||||||
|
req, err := http.NewRequest(http.MethodGet, "/", nil)
|
||||||
|
require.NoError(t, err)
|
||||||
|
|
||||||
|
ApplyUserHeader(true, req, &user.SignedInUser{Login: "admin"})
|
||||||
|
require.Equal(t, "admin", req.Header.Get("X-Grafana-User"))
|
||||||
|
})
|
||||||
|
}
|
||||||
|
Loading…
Reference in New Issue
Block a user