use X-Grafana-Org-Id header to ensure backend uses correct org (#8122)

This commit is contained in:
Dan Cech
2017-04-14 09:47:39 -04:00
committed by Torkel Ödegaard
parent fb163450a5
commit f490c5f12c
5 changed files with 77 additions and 52 deletions

View File

@@ -13,7 +13,7 @@ import (
"github.com/grafana/grafana/pkg/setting" "github.com/grafana/grafana/pkg/setting"
) )
func initContextWithAuthProxy(ctx *Context) bool { func initContextWithAuthProxy(ctx *Context, orgId int64) bool {
if !setting.AuthProxyEnabled { if !setting.AuthProxyEnabled {
return false return false
} }
@@ -30,6 +30,7 @@ func initContextWithAuthProxy(ctx *Context) bool {
} }
query := getSignedInUserQueryForProxyAuth(proxyHeaderValue) query := getSignedInUserQueryForProxyAuth(proxyHeaderValue)
query.OrgId = orgId
if err := bus.Dispatch(query); err != nil { if err := bus.Dispatch(query); err != nil {
if err != m.ErrUserNotFound { if err != m.ErrUserNotFound {
ctx.Handle(500, "Failed to find user specified in auth proxy header", err) ctx.Handle(500, "Failed to find user specified in auth proxy header", err)
@@ -46,7 +47,7 @@ func initContextWithAuthProxy(ctx *Context) bool {
ctx.Handle(500, "Failed to create user specified in auth proxy header", err) ctx.Handle(500, "Failed to create user specified in auth proxy header", err)
return true return true
} }
query = &m.GetSignedInUserQuery{UserId: cmd.Result.Id} query = &m.GetSignedInUserQuery{UserId: cmd.Result.Id, OrgId: orgId}
if err := bus.Dispatch(query); err != nil { if err := bus.Dispatch(query); err != nil {
ctx.Handle(500, "Failed find user after creation", err) ctx.Handle(500, "Failed find user after creation", err)
return true return true

View File

@@ -39,6 +39,12 @@ func GetContextHandler() macaron.Handler {
Logger: log.New("context"), Logger: log.New("context"),
} }
orgId := int64(0)
orgIdHeader := ctx.Req.Header.Get("X-Grafana-Org-Id")
if orgIdHeader != "" {
orgId, _ = strconv.ParseInt(orgIdHeader, 10, 64)
}
// the order in which these are tested are important // the order in which these are tested are important
// look for api key in Authorization header first // look for api key in Authorization header first
// then init session and look for userId in session // then init session and look for userId in session
@@ -46,9 +52,9 @@ func GetContextHandler() macaron.Handler {
// then test if anonymous access is enabled // then test if anonymous access is enabled
if initContextWithRenderAuth(ctx) || if initContextWithRenderAuth(ctx) ||
initContextWithApiKey(ctx) || initContextWithApiKey(ctx) ||
initContextWithBasicAuth(ctx) || initContextWithBasicAuth(ctx, orgId) ||
initContextWithAuthProxy(ctx) || initContextWithAuthProxy(ctx, orgId) ||
initContextWithUserSessionCookie(ctx) || initContextWithUserSessionCookie(ctx, orgId) ||
initContextWithAnonymousUser(ctx) { initContextWithAnonymousUser(ctx) {
} }
@@ -68,18 +74,18 @@ func initContextWithAnonymousUser(ctx *Context) bool {
if err := bus.Dispatch(&orgQuery); err != nil { if err := bus.Dispatch(&orgQuery); err != nil {
log.Error(3, "Anonymous access organization error: '%s': %s", setting.AnonymousOrgName, err) log.Error(3, "Anonymous access organization error: '%s': %s", setting.AnonymousOrgName, err)
return false return false
} else {
ctx.IsSignedIn = false
ctx.AllowAnonymous = true
ctx.SignedInUser = &m.SignedInUser{}
ctx.OrgRole = m.RoleType(setting.AnonymousOrgRole)
ctx.OrgId = orgQuery.Result.Id
ctx.OrgName = orgQuery.Result.Name
return true
} }
ctx.IsSignedIn = false
ctx.AllowAnonymous = true
ctx.SignedInUser = &m.SignedInUser{}
ctx.OrgRole = m.RoleType(setting.AnonymousOrgRole)
ctx.OrgId = orgQuery.Result.Id
ctx.OrgName = orgQuery.Result.Name
return true
} }
func initContextWithUserSessionCookie(ctx *Context) bool { func initContextWithUserSessionCookie(ctx *Context, orgId int64) bool {
// initialize session // initialize session
if err := ctx.Session.Start(ctx); err != nil { if err := ctx.Session.Start(ctx); err != nil {
ctx.Logger.Error("Failed to start session", "error", err) ctx.Logger.Error("Failed to start session", "error", err)
@@ -91,15 +97,15 @@ func initContextWithUserSessionCookie(ctx *Context) bool {
return false return false
} }
query := m.GetSignedInUserQuery{UserId: userId} query := m.GetSignedInUserQuery{UserId: userId, OrgId: orgId}
if err := bus.Dispatch(&query); err != nil { if err := bus.Dispatch(&query); err != nil {
ctx.Logger.Error("Failed to get user with id", "userId", userId) ctx.Logger.Error("Failed to get user with id", "userId", userId)
return false return false
} else {
ctx.SignedInUser = query.Result
ctx.IsSignedIn = true
return true
} }
ctx.SignedInUser = query.Result
ctx.IsSignedIn = true
return true
} }
func initContextWithApiKey(ctx *Context) bool { func initContextWithApiKey(ctx *Context) bool {
@@ -114,30 +120,31 @@ func initContextWithApiKey(ctx *Context) bool {
ctx.JsonApiErr(401, "Invalid API key", err) ctx.JsonApiErr(401, "Invalid API key", err)
return true return true
} }
// fetch key // fetch key
keyQuery := m.GetApiKeyByNameQuery{KeyName: decoded.Name, OrgId: decoded.OrgId} keyQuery := m.GetApiKeyByNameQuery{KeyName: decoded.Name, OrgId: decoded.OrgId}
if err := bus.Dispatch(&keyQuery); err != nil { if err := bus.Dispatch(&keyQuery); err != nil {
ctx.JsonApiErr(401, "Invalid API key", err) ctx.JsonApiErr(401, "Invalid API key", err)
return true return true
} else { }
apikey := keyQuery.Result
// validate api key apikey := keyQuery.Result
if !apikeygen.IsValid(decoded, apikey.Key) {
ctx.JsonApiErr(401, "Invalid API key", err)
return true
}
ctx.IsSignedIn = true // validate api key
ctx.SignedInUser = &m.SignedInUser{} if !apikeygen.IsValid(decoded, apikey.Key) {
ctx.OrgRole = apikey.Role ctx.JsonApiErr(401, "Invalid API key", err)
ctx.ApiKeyId = apikey.Id
ctx.OrgId = apikey.OrgId
return true return true
} }
ctx.IsSignedIn = true
ctx.SignedInUser = &m.SignedInUser{}
ctx.OrgRole = apikey.Role
ctx.ApiKeyId = apikey.Id
ctx.OrgId = apikey.OrgId
return true
} }
func initContextWithBasicAuth(ctx *Context) bool { func initContextWithBasicAuth(ctx *Context, orgId int64) bool {
if !setting.BasicAuthEnabled { if !setting.BasicAuthEnabled {
return false return false
@@ -168,15 +175,15 @@ func initContextWithBasicAuth(ctx *Context) bool {
return true return true
} }
query := m.GetSignedInUserQuery{UserId: user.Id} query := m.GetSignedInUserQuery{UserId: user.Id, OrgId: orgId}
if err := bus.Dispatch(&query); err != nil { if err := bus.Dispatch(&query); err != nil {
ctx.JsonApiErr(401, "Authentication error", err) ctx.JsonApiErr(401, "Authentication error", err)
return true return true
} else {
ctx.SignedInUser = query.Result
ctx.IsSignedIn = true
return true
} }
ctx.SignedInUser = query.Result
ctx.IsSignedIn = true
return true
} }
// Handle handles and logs error by given status. // Handle handles and logs error by given status.

View File

@@ -117,6 +117,7 @@ type GetSignedInUserQuery struct {
UserId int64 UserId int64
Login string Login string
Email string Email string
OrgId int64
Result *SignedInUser Result *SignedInUser
} }

View File

@@ -1,6 +1,7 @@
package sqlstore package sqlstore
import ( import (
"strconv"
"strings" "strings"
"time" "time"
@@ -273,7 +274,7 @@ func SetUsingOrg(cmd *m.SetUsingOrgCommand) error {
} }
if !valid { if !valid {
return fmt.Errorf("user does not belong ot org") return fmt.Errorf("user does not belong to org")
} }
return inTransaction(func(sess *xorm.Session) error { return inTransaction(func(sess *xorm.Session) error {
@@ -319,19 +320,24 @@ func GetUserOrgList(query *m.GetUserOrgListQuery) error {
} }
func GetSignedInUser(query *m.GetSignedInUserQuery) error { func GetSignedInUser(query *m.GetSignedInUserQuery) error {
orgId := "u.org_id"
if query.OrgId > 0 {
orgId = strconv.FormatInt(query.OrgId, 10)
}
var rawSql = `SELECT var rawSql = `SELECT
u.id as user_id, u.id as user_id,
u.is_admin as is_grafana_admin, u.is_admin as is_grafana_admin,
u.email as email, u.email as email,
u.login as login, u.login as login,
u.name as name, u.name as name,
u.help_flags1 as help_flags1, u.help_flags1 as help_flags1,
org.name as org_name, org.name as org_name,
org_user.role as org_role, org_user.role as org_role,
org.id as org_id org.id as org_id
FROM ` + dialect.Quote("user") + ` as u FROM ` + dialect.Quote("user") + ` as u
LEFT OUTER JOIN org_user on org_user.org_id = u.org_id and org_user.user_id = u.id LEFT OUTER JOIN org_user on org_user.org_id = ` + orgId + ` and org_user.user_id = u.id
LEFT OUTER JOIN org on org.id = u.org_id ` LEFT OUTER JOIN org on org.id = org_user.org_id `
sess := x.Table("user") sess := x.Table("user")
if query.UserId > 0 { if query.UserId > 0 {

View File

@@ -9,8 +9,8 @@ export class BackendSrv {
inFlightRequests = {}; inFlightRequests = {};
HTTP_REQUEST_CANCELLED = -1; HTTP_REQUEST_CANCELLED = -1;
/** @ngInject */ /** @ngInject */
constructor(private $http, private alertSrv, private $rootScope, private $q, private $timeout) { constructor(private $http, private alertSrv, private $rootScope, private $q, private $timeout, private contextSrv) {
} }
get(url, params?) { get(url, params?) {
@@ -66,6 +66,11 @@ export class BackendSrv {
var requestIsLocal = options.url.indexOf('/') === 0; var requestIsLocal = options.url.indexOf('/') === 0;
var firstAttempt = options.retry === 0; var firstAttempt = options.retry === 0;
if (!options.url.match('https?://') && this.contextSrv && this.contextSrv.user && this.contextSrv.user.orgId) {
options.headers = options.headers || {};
options.headers['X-Grafana-Org-Id'] = this.contextSrv.user.orgId;
}
if (requestIsLocal && !options.hasSubUrl) { if (requestIsLocal && !options.hasSubUrl) {
options.url = config.appSubUrl + options.url; options.url = config.appSubUrl + options.url;
options.hasSubUrl = true; options.hasSubUrl = true;
@@ -128,6 +133,11 @@ export class BackendSrv {
var requestIsLocal = options.url.indexOf('/') === 0; var requestIsLocal = options.url.indexOf('/') === 0;
var firstAttempt = options.retry === 0; var firstAttempt = options.retry === 0;
if (!options.url.match('https?://') && this.contextSrv && this.contextSrv.user && this.contextSrv.user.orgId) {
options.headers = options.headers || {};
options.headers['X-Grafana-Org-Id'] = this.contextSrv.user.orgId;
}
if (requestIsLocal && !options.hasSubUrl && options.retry === 0) { if (requestIsLocal && !options.hasSubUrl && options.retry === 0) {
options.url = config.appSubUrl + options.url; options.url = config.appSubUrl + options.url;
} }