mirror of
https://github.com/grafana/grafana.git
synced 2025-02-25 18:55:37 -06:00
Plugins: Require signing of external back-end plugins (#24075)
* PluginManager: Require signing of external plugins Co-authored-by: Marcus Efraimsson <marcus.efraimsson@gmail.com> Co-authored-by: Diana Payton <52059945+oddlittlebird@users.noreply.github.com>
This commit is contained in:
parent
827f99f0cb
commit
96ffcaa134
@ -695,6 +695,8 @@ disable_sanitize_html = false
|
|||||||
[plugins]
|
[plugins]
|
||||||
enable_alpha = false
|
enable_alpha = false
|
||||||
app_tls_skip_verify_insecure = false
|
app_tls_skip_verify_insecure = false
|
||||||
|
# Enter a comma-separated list of plugin identifiers to identify plugins that are allowed to be loaded even if they lack a valid signature.
|
||||||
|
allow_loading_unsigned_plugins =
|
||||||
|
|
||||||
#################################### Grafana Image Renderer Plugin ##########################
|
#################################### Grafana Image Renderer Plugin ##########################
|
||||||
[plugin.grafana-image-renderer]
|
[plugin.grafana-image-renderer]
|
||||||
|
@ -684,6 +684,8 @@
|
|||||||
[plugins]
|
[plugins]
|
||||||
;enable_alpha = false
|
;enable_alpha = false
|
||||||
;app_tls_skip_verify_insecure = false
|
;app_tls_skip_verify_insecure = false
|
||||||
|
# Enter a comma-separated list of plugin identifiers to identify plugins that are allowed to be loaded even if they lack a valid signature.
|
||||||
|
;allow_loading_unsigned_plugins =
|
||||||
|
|
||||||
#################################### Grafana Image Renderer Plugin ##########################
|
#################################### Grafana Image Renderer Plugin ##########################
|
||||||
[plugin.grafana-image-renderer]
|
[plugin.grafana-image-renderer]
|
||||||
|
@ -840,6 +840,10 @@ is false. This settings was introduced in Grafana v6.0.
|
|||||||
|
|
||||||
Set to true if you want to test alpha plugins that are not yet ready for general usage.
|
Set to true if you want to test alpha plugins that are not yet ready for general usage.
|
||||||
|
|
||||||
|
### allow_loading_unsigned_plugins
|
||||||
|
|
||||||
|
Enter a comma-separated list of plugin identifiers to identify plugins that are allowed to be loaded even if they lack a valid signature.
|
||||||
|
|
||||||
## [feature_toggles]
|
## [feature_toggles]
|
||||||
### enable
|
### enable
|
||||||
|
|
||||||
|
18
pkg/infra/fs/exists.go
Normal file
18
pkg/infra/fs/exists.go
Normal file
@ -0,0 +1,18 @@
|
|||||||
|
package fs
|
||||||
|
|
||||||
|
import (
|
||||||
|
"os"
|
||||||
|
)
|
||||||
|
|
||||||
|
// Exists determines whether a file/directory exists or not.
|
||||||
|
func Exists(fpath string) (bool, error) {
|
||||||
|
_, err := os.Stat(fpath)
|
||||||
|
if err != nil {
|
||||||
|
if !os.IsNotExist(err) {
|
||||||
|
return false, err
|
||||||
|
}
|
||||||
|
return false, nil
|
||||||
|
}
|
||||||
|
|
||||||
|
return true, nil
|
||||||
|
}
|
26
pkg/infra/fs/exists_test.go
Normal file
26
pkg/infra/fs/exists_test.go
Normal file
@ -0,0 +1,26 @@
|
|||||||
|
package fs
|
||||||
|
|
||||||
|
import (
|
||||||
|
"github.com/stretchr/testify/require"
|
||||||
|
"io/ioutil"
|
||||||
|
"os"
|
||||||
|
"testing"
|
||||||
|
)
|
||||||
|
|
||||||
|
func TestExists_NonExistent(t *testing.T) {
|
||||||
|
exists, err := Exists("non-existent")
|
||||||
|
require.NoError(t, err)
|
||||||
|
|
||||||
|
require.False(t, exists)
|
||||||
|
}
|
||||||
|
|
||||||
|
func TestExists_Existent(t *testing.T) {
|
||||||
|
f, err := ioutil.TempFile("", "")
|
||||||
|
require.NoError(t, err)
|
||||||
|
defer os.Remove(f.Name())
|
||||||
|
|
||||||
|
exists, err := Exists(f.Name())
|
||||||
|
require.NoError(t, err)
|
||||||
|
|
||||||
|
require.True(t, exists)
|
||||||
|
}
|
@ -60,6 +60,7 @@ type PluginBase struct {
|
|||||||
Preload bool `json:"preload"`
|
Preload bool `json:"preload"`
|
||||||
State PluginState `json:"state,omitempty"`
|
State PluginState `json:"state,omitempty"`
|
||||||
Signature PluginSignature `json:"signature"`
|
Signature PluginSignature `json:"signature"`
|
||||||
|
Backend bool `json:"backend"`
|
||||||
|
|
||||||
IncludedInAppId string `json:"-"`
|
IncludedInAppId string `json:"-"`
|
||||||
PluginDir string `json:"-"`
|
PluginDir string `json:"-"`
|
||||||
|
@ -13,6 +13,7 @@ import (
|
|||||||
"strings"
|
"strings"
|
||||||
"time"
|
"time"
|
||||||
|
|
||||||
|
"github.com/grafana/grafana/pkg/infra/fs"
|
||||||
"github.com/grafana/grafana/pkg/infra/log"
|
"github.com/grafana/grafana/pkg/infra/log"
|
||||||
"github.com/grafana/grafana/pkg/infra/metrics"
|
"github.com/grafana/grafana/pkg/infra/metrics"
|
||||||
"github.com/grafana/grafana/pkg/plugins/backendplugin"
|
"github.com/grafana/grafana/pkg/plugins/backendplugin"
|
||||||
@ -43,12 +44,15 @@ type PluginScanner struct {
|
|||||||
errors []error
|
errors []error
|
||||||
backendPluginManager backendplugin.Manager
|
backendPluginManager backendplugin.Manager
|
||||||
cfg *setting.Cfg
|
cfg *setting.Cfg
|
||||||
|
requireSigned bool
|
||||||
|
log log.Logger
|
||||||
}
|
}
|
||||||
|
|
||||||
type PluginManager struct {
|
type PluginManager struct {
|
||||||
BackendPluginManager backendplugin.Manager `inject:""`
|
BackendPluginManager backendplugin.Manager `inject:""`
|
||||||
Cfg *setting.Cfg `inject:""`
|
Cfg *setting.Cfg `inject:""`
|
||||||
log log.Logger
|
log log.Logger
|
||||||
|
scanningErrors []error
|
||||||
}
|
}
|
||||||
|
|
||||||
func init() {
|
func init() {
|
||||||
@ -73,33 +77,40 @@ func (pm *PluginManager) Init() error {
|
|||||||
}
|
}
|
||||||
|
|
||||||
pm.log.Info("Starting plugin search")
|
pm.log.Info("Starting plugin search")
|
||||||
|
|
||||||
plugDir := path.Join(setting.StaticRootPath, "app/plugins")
|
plugDir := path.Join(setting.StaticRootPath, "app/plugins")
|
||||||
if err := pm.scan(plugDir); err != nil {
|
pm.log.Debug("Scanning core plugin directory", "dir", plugDir)
|
||||||
return errutil.Wrapf(err, "Failed to scan main plugin directory '%s'", plugDir)
|
if err := pm.scan(plugDir, false); err != nil {
|
||||||
|
return errutil.Wrapf(err, "failed to scan core plugin directory '%s'", plugDir)
|
||||||
}
|
}
|
||||||
|
|
||||||
pm.log.Info("Checking Bundled Plugins")
|
plugDir = pm.Cfg.BundledPluginsPath
|
||||||
plugDir = path.Join(setting.HomePath, "plugins-bundled")
|
pm.log.Debug("Scanning bundled plugins directory", "dir", plugDir)
|
||||||
if _, err := os.Stat(plugDir); !os.IsNotExist(err) {
|
exists, err := fs.Exists(plugDir)
|
||||||
if err := pm.scan(plugDir); err != nil {
|
if err != nil {
|
||||||
return errutil.Wrapf(err, "failed to scan bundled plugin directory '%s'", plugDir)
|
return err
|
||||||
|
}
|
||||||
|
if exists {
|
||||||
|
if err := pm.scan(plugDir, false); err != nil {
|
||||||
|
return errutil.Wrapf(err, "failed to scan bundled plugins directory '%s'", plugDir)
|
||||||
}
|
}
|
||||||
}
|
}
|
||||||
|
|
||||||
// check if plugins dir exists
|
// check if plugins dir exists
|
||||||
if _, err := os.Stat(setting.PluginsPath); os.IsNotExist(err) {
|
exists, err = fs.Exists(setting.PluginsPath)
|
||||||
|
if err != nil {
|
||||||
|
return err
|
||||||
|
}
|
||||||
|
if !exists {
|
||||||
if err = os.MkdirAll(setting.PluginsPath, os.ModePerm); err != nil {
|
if err = os.MkdirAll(setting.PluginsPath, os.ModePerm); err != nil {
|
||||||
plog.Error("Failed to create plugin dir", "dir", setting.PluginsPath, "error", err)
|
pm.log.Error("failed to create external plugins directory", "dir", setting.PluginsPath, "error", err)
|
||||||
} else {
|
} else {
|
||||||
plog.Info("Plugin dir created", "dir", setting.PluginsPath)
|
pm.log.Info("External plugins directory created", "directory", setting.PluginsPath)
|
||||||
if err := pm.scan(setting.PluginsPath); err != nil {
|
|
||||||
return errutil.Wrapf(err, "Failed to scan configured plugin directory '%s'",
|
|
||||||
setting.PluginsPath)
|
|
||||||
}
|
|
||||||
}
|
}
|
||||||
} else {
|
} else {
|
||||||
if err := pm.scan(setting.PluginsPath); err != nil {
|
pm.log.Debug("Scanning external plugins directory", "dir", setting.PluginsPath)
|
||||||
return errutil.Wrapf(err, "Failed to scan configured plugin directory '%s'",
|
if err := pm.scan(setting.PluginsPath, true); err != nil {
|
||||||
|
return errutil.Wrapf(err, "failed to scan external plugins directory '%s'",
|
||||||
setting.PluginsPath)
|
setting.PluginsPath)
|
||||||
}
|
}
|
||||||
}
|
}
|
||||||
@ -163,8 +174,8 @@ func (pm *PluginManager) checkPluginPaths() error {
|
|||||||
continue
|
continue
|
||||||
}
|
}
|
||||||
|
|
||||||
if err := pm.scan(path); err != nil {
|
if err := pm.scan(path, false); err != nil {
|
||||||
return errutil.Wrapf(err, "Failed to scan directory configured for plugin '%s': '%s'", pluginID, path)
|
return errutil.Wrapf(err, "failed to scan directory configured for plugin '%s': '%s'", pluginID, path)
|
||||||
}
|
}
|
||||||
}
|
}
|
||||||
|
|
||||||
@ -172,11 +183,13 @@ func (pm *PluginManager) checkPluginPaths() error {
|
|||||||
}
|
}
|
||||||
|
|
||||||
// scan a directory for plugins.
|
// scan a directory for plugins.
|
||||||
func (pm *PluginManager) scan(pluginDir string) error {
|
func (pm *PluginManager) scan(pluginDir string, requireSigned bool) error {
|
||||||
scanner := &PluginScanner{
|
scanner := &PluginScanner{
|
||||||
pluginPath: pluginDir,
|
pluginPath: pluginDir,
|
||||||
backendPluginManager: pm.BackendPluginManager,
|
backendPluginManager: pm.BackendPluginManager,
|
||||||
cfg: pm.Cfg,
|
cfg: pm.Cfg,
|
||||||
|
requireSigned: requireSigned,
|
||||||
|
log: pm.log,
|
||||||
}
|
}
|
||||||
|
|
||||||
if err := util.Walk(pluginDir, true, true, scanner.walker); err != nil {
|
if err := util.Walk(pluginDir, true, true, scanner.walker); err != nil {
|
||||||
@ -196,6 +209,7 @@ func (pm *PluginManager) scan(pluginDir string) error {
|
|||||||
|
|
||||||
if len(scanner.errors) > 0 {
|
if len(scanner.errors) > 0 {
|
||||||
pm.log.Warn("Some plugins failed to load", "errors", scanner.errors)
|
pm.log.Warn("Some plugins failed to load", "errors", scanner.errors)
|
||||||
|
pm.scanningErrors = scanner.errors
|
||||||
}
|
}
|
||||||
|
|
||||||
return nil
|
return nil
|
||||||
@ -229,7 +243,7 @@ func (scanner *PluginScanner) walker(currentPath string, f os.FileInfo, err erro
|
|||||||
if f.Name() == "plugin.json" {
|
if f.Name() == "plugin.json" {
|
||||||
err := scanner.loadPluginJson(currentPath)
|
err := scanner.loadPluginJson(currentPath)
|
||||||
if err != nil {
|
if err != nil {
|
||||||
log.Error(3, "Plugins: Failed to load plugin json file: %v, err: %v", currentPath, err)
|
scanner.log.Error("Failed to load plugin", "error", err, "pluginPath", filepath.Dir(currentPath))
|
||||||
scanner.errors = append(scanner.errors, err)
|
scanner.errors = append(scanner.errors, err)
|
||||||
}
|
}
|
||||||
}
|
}
|
||||||
@ -252,21 +266,51 @@ func (scanner *PluginScanner) loadPluginJson(pluginJsonFilePath string) error {
|
|||||||
}
|
}
|
||||||
|
|
||||||
if pluginCommon.Id == "" || pluginCommon.Type == "" {
|
if pluginCommon.Id == "" || pluginCommon.Type == "" {
|
||||||
return errors.New("Did not find type and id property in plugin.json")
|
return errors.New("did not find type or id properties in plugin.json")
|
||||||
|
}
|
||||||
|
|
||||||
|
pluginCommon.PluginDir = filepath.Dir(pluginJsonFilePath)
|
||||||
|
|
||||||
|
// For the time being, we choose to only require back-end plugins to be signed
|
||||||
|
if pluginCommon.Backend && scanner.requireSigned {
|
||||||
|
scanner.log.Debug("Plugin signature required, validating", "pluginID", pluginCommon.Id,
|
||||||
|
"pluginDir", pluginCommon.PluginDir)
|
||||||
|
allowUnsigned := false
|
||||||
|
for _, plug := range scanner.cfg.PluginsAllowUnsigned {
|
||||||
|
if plug == pluginCommon.Id {
|
||||||
|
allowUnsigned = true
|
||||||
|
break
|
||||||
|
}
|
||||||
|
}
|
||||||
|
if sig := GetPluginSignatureState(&pluginCommon); sig != PluginSignatureValid && !allowUnsigned {
|
||||||
|
switch sig {
|
||||||
|
case PluginSignatureUnsigned:
|
||||||
|
return fmt.Errorf("plugin %q is unsigned", pluginCommon.Id)
|
||||||
|
case PluginSignatureInvalid:
|
||||||
|
return fmt.Errorf("plugin %q has an invalid signature", pluginCommon.Id)
|
||||||
|
case PluginSignatureModified:
|
||||||
|
return fmt.Errorf("plugin %q's signature has been modified", pluginCommon.Id)
|
||||||
|
default:
|
||||||
|
return fmt.Errorf("unrecognized plugin signature state %v", sig)
|
||||||
|
}
|
||||||
|
}
|
||||||
}
|
}
|
||||||
|
|
||||||
var loader PluginLoader
|
|
||||||
pluginGoType, exists := PluginTypes[pluginCommon.Type]
|
pluginGoType, exists := PluginTypes[pluginCommon.Type]
|
||||||
if !exists {
|
if !exists {
|
||||||
return errors.New("Unknown plugin type " + pluginCommon.Type)
|
return fmt.Errorf("unknown plugin type %q", pluginCommon.Type)
|
||||||
}
|
}
|
||||||
loader = reflect.New(reflect.TypeOf(pluginGoType)).Interface().(PluginLoader)
|
loader := reflect.New(reflect.TypeOf(pluginGoType)).Interface().(PluginLoader)
|
||||||
|
|
||||||
// External plugins need a module.js file for SystemJS to load
|
// External plugins need a module.js file for SystemJS to load
|
||||||
if !strings.HasPrefix(pluginJsonFilePath, setting.StaticRootPath) && !scanner.IsBackendOnlyPlugin(pluginCommon.Type) {
|
if !strings.HasPrefix(pluginJsonFilePath, setting.StaticRootPath) && !scanner.IsBackendOnlyPlugin(pluginCommon.Type) {
|
||||||
module := filepath.Join(filepath.Dir(pluginJsonFilePath), "module.js")
|
module := filepath.Join(filepath.Dir(pluginJsonFilePath), "module.js")
|
||||||
if _, err := os.Stat(module); os.IsNotExist(err) {
|
exists, err := fs.Exists(module)
|
||||||
plog.Warn("Plugin missing module.js",
|
if err != nil {
|
||||||
|
return err
|
||||||
|
}
|
||||||
|
if !exists {
|
||||||
|
scanner.log.Warn("Plugin missing module.js",
|
||||||
"name", pluginCommon.Name,
|
"name", pluginCommon.Name,
|
||||||
"warning", "Missing module.js, If you loaded this plugin from git, make sure to compile it.",
|
"warning", "Missing module.js, If you loaded this plugin from git, make sure to compile it.",
|
||||||
"path", module)
|
"path", module)
|
||||||
@ -276,6 +320,7 @@ func (scanner *PluginScanner) loadPluginJson(pluginJsonFilePath string) error {
|
|||||||
if _, err := reader.Seek(0, 0); err != nil {
|
if _, err := reader.Seek(0, 0); err != nil {
|
||||||
return err
|
return err
|
||||||
}
|
}
|
||||||
|
|
||||||
return loader.Load(jsonParser, currentDir, scanner.backendPluginManager)
|
return loader.Load(jsonParser, currentDir, scanner.backendPluginManager)
|
||||||
}
|
}
|
||||||
|
|
||||||
@ -290,11 +335,19 @@ func GetPluginMarkdown(pluginId string, name string) ([]byte, error) {
|
|||||||
}
|
}
|
||||||
|
|
||||||
path := filepath.Join(plug.PluginDir, fmt.Sprintf("%s.md", strings.ToUpper(name)))
|
path := filepath.Join(plug.PluginDir, fmt.Sprintf("%s.md", strings.ToUpper(name)))
|
||||||
if _, err := os.Stat(path); os.IsNotExist(err) {
|
exists, err := fs.Exists(path)
|
||||||
|
if err != nil {
|
||||||
|
return nil, err
|
||||||
|
}
|
||||||
|
if !exists {
|
||||||
path = filepath.Join(plug.PluginDir, fmt.Sprintf("%s.md", strings.ToLower(name)))
|
path = filepath.Join(plug.PluginDir, fmt.Sprintf("%s.md", strings.ToLower(name)))
|
||||||
}
|
}
|
||||||
|
|
||||||
if _, err := os.Stat(path); os.IsNotExist(err) {
|
exists, err = fs.Exists(path)
|
||||||
|
if err != nil {
|
||||||
|
return nil, err
|
||||||
|
}
|
||||||
|
if !exists {
|
||||||
return make([]byte, 0), nil
|
return make([]byte, 0), nil
|
||||||
}
|
}
|
||||||
|
|
||||||
|
@ -1,40 +1,36 @@
|
|||||||
package plugins
|
package plugins
|
||||||
|
|
||||||
import (
|
import (
|
||||||
|
"context"
|
||||||
|
"fmt"
|
||||||
"path/filepath"
|
"path/filepath"
|
||||||
"testing"
|
"testing"
|
||||||
|
|
||||||
|
"github.com/grafana/grafana-plugin-sdk-go/backend"
|
||||||
|
"github.com/grafana/grafana/pkg/models"
|
||||||
|
"github.com/grafana/grafana/pkg/plugins/backendplugin"
|
||||||
"github.com/grafana/grafana/pkg/setting"
|
"github.com/grafana/grafana/pkg/setting"
|
||||||
. "github.com/smartystreets/goconvey/convey"
|
"github.com/stretchr/testify/assert"
|
||||||
|
"github.com/stretchr/testify/require"
|
||||||
"gopkg.in/ini.v1"
|
"gopkg.in/ini.v1"
|
||||||
)
|
)
|
||||||
|
|
||||||
func TestPluginScans(t *testing.T) {
|
func TestPluginManager_Init(t *testing.T) {
|
||||||
|
origRootPath := setting.StaticRootPath
|
||||||
|
origRaw := setting.Raw
|
||||||
|
t.Cleanup(func() {
|
||||||
|
setting.StaticRootPath = origRootPath
|
||||||
|
setting.Raw = origRaw
|
||||||
|
})
|
||||||
|
|
||||||
Convey("When scanning for plugins", t, func() {
|
var err error
|
||||||
setting.StaticRootPath, _ = filepath.Abs("../../public/")
|
setting.StaticRootPath, err = filepath.Abs("../../public/")
|
||||||
|
require.NoError(t, err)
|
||||||
setting.Raw = ini.Empty()
|
setting.Raw = ini.Empty()
|
||||||
|
|
||||||
|
t.Run("Base case", func(t *testing.T) {
|
||||||
pm := &PluginManager{
|
pm := &PluginManager{
|
||||||
Cfg: &setting.Cfg{
|
Cfg: &setting.Cfg{
|
||||||
FeatureToggles: map[string]bool{},
|
|
||||||
},
|
|
||||||
}
|
|
||||||
err := pm.Init()
|
|
||||||
|
|
||||||
So(err, ShouldBeNil)
|
|
||||||
So(len(DataSources), ShouldBeGreaterThan, 1)
|
|
||||||
So(len(Panels), ShouldBeGreaterThan, 1)
|
|
||||||
|
|
||||||
Convey("Should set module automatically", func() {
|
|
||||||
So(DataSources["graphite"].Module, ShouldEqual, "app/plugins/datasource/graphite/module")
|
|
||||||
})
|
|
||||||
})
|
|
||||||
|
|
||||||
Convey("When reading app plugin definition", t, func() {
|
|
||||||
pm := &PluginManager{
|
|
||||||
Cfg: &setting.Cfg{
|
|
||||||
FeatureToggles: map[string]bool{},
|
|
||||||
PluginSettings: setting.PluginSettings{
|
PluginSettings: setting.PluginSettings{
|
||||||
"nginx-app": map[string]string{
|
"nginx-app": map[string]string{
|
||||||
"path": "testdata/test-app",
|
"path": "testdata/test-app",
|
||||||
@ -43,25 +39,107 @@ func TestPluginScans(t *testing.T) {
|
|||||||
},
|
},
|
||||||
}
|
}
|
||||||
err := pm.Init()
|
err := pm.Init()
|
||||||
So(err, ShouldBeNil)
|
require.NoError(t, err)
|
||||||
|
|
||||||
So(len(Apps), ShouldBeGreaterThan, 0)
|
assert.Empty(t, pm.scanningErrors)
|
||||||
So(Apps["test-app"].Info.Logos.Large, ShouldEqual, "public/plugins/test-app/img/logo_large.png")
|
assert.Greater(t, len(DataSources), 1)
|
||||||
So(Apps["test-app"].Info.Screenshots[1].Path, ShouldEqual, "public/plugins/test-app/img/screenshot2.png")
|
assert.Greater(t, len(Panels), 1)
|
||||||
|
assert.Equal(t, "app/plugins/datasource/graphite/module", DataSources["graphite"].Module)
|
||||||
|
assert.NotEmpty(t, Apps)
|
||||||
|
assert.Equal(t, "public/plugins/test-app/img/logo_large.png", Apps["test-app"].Info.Logos.Large)
|
||||||
|
assert.Equal(t, "public/plugins/test-app/img/screenshot2.png", Apps["test-app"].Info.Screenshots[1].Path)
|
||||||
})
|
})
|
||||||
|
|
||||||
Convey("When checking if renderer is backend only plugin", t, func() {
|
t.Run("With external back-end plugin lacking signature", func(t *testing.T) {
|
||||||
pluginScanner := &PluginScanner{}
|
origPluginsPath := setting.PluginsPath
|
||||||
result := pluginScanner.IsBackendOnlyPlugin("renderer")
|
t.Cleanup(func() {
|
||||||
|
setting.PluginsPath = origPluginsPath
|
||||||
So(result, ShouldEqual, true)
|
|
||||||
})
|
|
||||||
|
|
||||||
Convey("When checking if app is backend only plugin", t, func() {
|
|
||||||
pluginScanner := &PluginScanner{}
|
|
||||||
result := pluginScanner.IsBackendOnlyPlugin("app")
|
|
||||||
|
|
||||||
So(result, ShouldEqual, false)
|
|
||||||
})
|
})
|
||||||
|
setting.PluginsPath = "testdata/unsigned"
|
||||||
|
|
||||||
|
pm := &PluginManager{
|
||||||
|
Cfg: &setting.Cfg{},
|
||||||
|
}
|
||||||
|
err := pm.Init()
|
||||||
|
require.NoError(t, err)
|
||||||
|
|
||||||
|
assert.Equal(t, []error{fmt.Errorf(`plugin "test" is unsigned`)}, pm.scanningErrors)
|
||||||
|
})
|
||||||
|
|
||||||
|
t.Run("With external unsigned back-end plugin and configuration disabling signature check of this plugin", func(t *testing.T) {
|
||||||
|
origPluginsPath := setting.PluginsPath
|
||||||
|
t.Cleanup(func() {
|
||||||
|
setting.PluginsPath = origPluginsPath
|
||||||
|
})
|
||||||
|
setting.PluginsPath = "testdata/unsigned"
|
||||||
|
|
||||||
|
pm := &PluginManager{
|
||||||
|
Cfg: &setting.Cfg{
|
||||||
|
PluginsAllowUnsigned: []string{"test"},
|
||||||
|
},
|
||||||
|
BackendPluginManager: fakeBackendPluginManager{},
|
||||||
|
}
|
||||||
|
err := pm.Init()
|
||||||
|
require.NoError(t, err)
|
||||||
|
|
||||||
|
assert.Empty(t, pm.scanningErrors)
|
||||||
|
})
|
||||||
|
|
||||||
|
t.Run("With external back-end plugin with invalid signature", func(t *testing.T) {
|
||||||
|
origPluginsPath := setting.PluginsPath
|
||||||
|
t.Cleanup(func() {
|
||||||
|
setting.PluginsPath = origPluginsPath
|
||||||
|
})
|
||||||
|
setting.PluginsPath = "testdata/invalid-signature"
|
||||||
|
|
||||||
|
pm := &PluginManager{
|
||||||
|
Cfg: &setting.Cfg{},
|
||||||
|
}
|
||||||
|
err := pm.Init()
|
||||||
|
require.NoError(t, err)
|
||||||
|
|
||||||
|
assert.Equal(t, []error{fmt.Errorf(`plugin "test" has an invalid signature`)}, pm.scanningErrors)
|
||||||
|
})
|
||||||
|
}
|
||||||
|
|
||||||
|
func TestPluginManager_IsBackendOnlyPlugin(t *testing.T) {
|
||||||
|
pluginScanner := &PluginScanner{}
|
||||||
|
|
||||||
|
type testCase struct {
|
||||||
|
name string
|
||||||
|
isBackendOnly bool
|
||||||
|
}
|
||||||
|
|
||||||
|
for _, c := range []testCase{
|
||||||
|
{name: "renderer", isBackendOnly: true},
|
||||||
|
{name: "app", isBackendOnly: false},
|
||||||
|
} {
|
||||||
|
t.Run(fmt.Sprintf("Plugin %s", c.name), func(t *testing.T) {
|
||||||
|
result := pluginScanner.IsBackendOnlyPlugin(c.name)
|
||||||
|
|
||||||
|
assert.Equal(t, c.isBackendOnly, result)
|
||||||
|
})
|
||||||
|
}
|
||||||
|
}
|
||||||
|
|
||||||
|
type fakeBackendPluginManager struct {
|
||||||
|
}
|
||||||
|
|
||||||
|
func (f fakeBackendPluginManager) Register(descriptor backendplugin.PluginDescriptor) error {
|
||||||
|
return nil
|
||||||
|
}
|
||||||
|
|
||||||
|
func (f fakeBackendPluginManager) StartPlugin(ctx context.Context, pluginID string) error {
|
||||||
|
return nil
|
||||||
|
}
|
||||||
|
|
||||||
|
func (f fakeBackendPluginManager) CollectMetrics(ctx context.Context, pluginID string) (*backendplugin.CollectMetricsResult, error) {
|
||||||
|
return nil, nil
|
||||||
|
}
|
||||||
|
|
||||||
|
func (f fakeBackendPluginManager) CheckHealth(ctx context.Context, pCtx backend.PluginContext) (*backendplugin.CheckHealthResult, error) {
|
||||||
|
return nil, nil
|
||||||
|
}
|
||||||
|
|
||||||
|
func (f fakeBackendPluginManager) CallResource(pluginConfig backend.PluginContext, ctx *models.ReqContext, path string) {
|
||||||
}
|
}
|
||||||
|
1
pkg/plugins/testdata/invalid-signature/plugin/MANIFEST.txt
vendored
Normal file
1
pkg/plugins/testdata/invalid-signature/plugin/MANIFEST.txt
vendored
Normal file
@ -0,0 +1 @@
|
|||||||
|
Invalid manifest
|
14
pkg/plugins/testdata/invalid-signature/plugin/plugin.json
vendored
Normal file
14
pkg/plugins/testdata/invalid-signature/plugin/plugin.json
vendored
Normal file
@ -0,0 +1,14 @@
|
|||||||
|
{
|
||||||
|
"type": "datasource",
|
||||||
|
"name": "Test",
|
||||||
|
"id": "test",
|
||||||
|
"backend": true,
|
||||||
|
"state": "alpha",
|
||||||
|
"info": {
|
||||||
|
"description": "Test",
|
||||||
|
"author": {
|
||||||
|
"name": "Grafana Labs",
|
||||||
|
"url": "https://grafana.com"
|
||||||
|
}
|
||||||
|
}
|
||||||
|
}
|
14
pkg/plugins/testdata/unsigned/plugin/plugin.json
vendored
Normal file
14
pkg/plugins/testdata/unsigned/plugin/plugin.json
vendored
Normal file
@ -0,0 +1,14 @@
|
|||||||
|
{
|
||||||
|
"type": "datasource",
|
||||||
|
"name": "Test",
|
||||||
|
"id": "test",
|
||||||
|
"backend": true,
|
||||||
|
"state": "alpha",
|
||||||
|
"info": {
|
||||||
|
"description": "Test",
|
||||||
|
"author": {
|
||||||
|
"name": "Grafana Labs",
|
||||||
|
"url": "https://grafana.com"
|
||||||
|
}
|
||||||
|
}
|
||||||
|
}
|
@ -233,6 +233,7 @@ type Cfg struct {
|
|||||||
ProvisioningPath string
|
ProvisioningPath string
|
||||||
DataPath string
|
DataPath string
|
||||||
LogsPath string
|
LogsPath string
|
||||||
|
BundledPluginsPath string
|
||||||
|
|
||||||
// SMTP email settings
|
// SMTP email settings
|
||||||
Smtp SmtpSettings
|
Smtp SmtpSettings
|
||||||
@ -258,6 +259,7 @@ type Cfg struct {
|
|||||||
PluginsEnableAlpha bool
|
PluginsEnableAlpha bool
|
||||||
PluginsAppsSkipVerifyTLS bool
|
PluginsAppsSkipVerifyTLS bool
|
||||||
PluginSettings PluginSettings
|
PluginSettings PluginSettings
|
||||||
|
PluginsAllowUnsigned []string
|
||||||
DisableSanitizeHtml bool
|
DisableSanitizeHtml bool
|
||||||
EnterpriseLicensePath string
|
EnterpriseLicensePath string
|
||||||
|
|
||||||
@ -636,6 +638,7 @@ func (cfg *Cfg) Load(args *CommandLineArgs) error {
|
|||||||
return err
|
return err
|
||||||
}
|
}
|
||||||
PluginsPath = makeAbsolute(plugins, HomePath)
|
PluginsPath = makeAbsolute(plugins, HomePath)
|
||||||
|
cfg.BundledPluginsPath = makeAbsolute("plugins-bundled", HomePath)
|
||||||
provisioning, err := valueAsString(iniFile.Section("paths"), "provisioning", "")
|
provisioning, err := valueAsString(iniFile.Section("paths"), "provisioning", "")
|
||||||
if err != nil {
|
if err != nil {
|
||||||
return err
|
return err
|
||||||
@ -988,6 +991,11 @@ func (cfg *Cfg) Load(args *CommandLineArgs) error {
|
|||||||
cfg.PluginsEnableAlpha = pluginsSection.Key("enable_alpha").MustBool(false)
|
cfg.PluginsEnableAlpha = pluginsSection.Key("enable_alpha").MustBool(false)
|
||||||
cfg.PluginsAppsSkipVerifyTLS = pluginsSection.Key("app_tls_skip_verify_insecure").MustBool(false)
|
cfg.PluginsAppsSkipVerifyTLS = pluginsSection.Key("app_tls_skip_verify_insecure").MustBool(false)
|
||||||
cfg.PluginSettings = extractPluginSettings(iniFile.Sections())
|
cfg.PluginSettings = extractPluginSettings(iniFile.Sections())
|
||||||
|
pluginsAllowUnsigned := pluginsSection.Key("allow_loading_unsigned_plugins").MustString("")
|
||||||
|
for _, plug := range strings.Split(pluginsAllowUnsigned, ",") {
|
||||||
|
plug = strings.TrimSpace(plug)
|
||||||
|
cfg.PluginsAllowUnsigned = append(cfg.PluginsAllowUnsigned, plug)
|
||||||
|
}
|
||||||
|
|
||||||
// Read and populate feature toggles list
|
// Read and populate feature toggles list
|
||||||
featureTogglesSection := iniFile.Section("feature_toggles")
|
featureTogglesSection := iniFile.Section("feature_toggles")
|
||||||
|
Loading…
Reference in New Issue
Block a user