mirror of
https://github.com/grafana/grafana.git
synced 2024-11-29 04:04:00 -06:00
32f06c6d9c
* Replace global authz abstraction with one compatible with uid scope * Replace GettableApiReceiver with models.Receiver in receiver_svc * GrafanaIntegrationConfig -> models.Integration * Implement Create/Update methods * Add optimistic concurrency to receiver API * Add scope to ReceiversRead & ReceiversReadSecrets migrates existing permissions to include implicit global scope * Add receiver create, update, delete actions * Check if receiver is used by rules before delete * On receiver name change update in routes and notification settings * Improve errors * Linting * Include read permissions are requirements for create/update/delete * Alias ngalert/models to ngmodels to differentiate from v0alpha1 model * Ensure integration UIDs are valid, unique, and generated if empty * Validate integration settings on create/update * Leverage UidToName to GetReceiver instead of GetReceivers * Remove some unnecessary uses of simplejson * alerting.notifications.receiver -> alerting.notifications.receivers * validator -> provenanceValidator * Only validate the modified receiver stops existing invalid receivers from preventing modification of a valid receiver. * Improve error in Integration.Encrypt * Remove scope from alert.notifications.receivers:create * Add todos for receiver renaming * Use receiverAC precondition checks in k8s api * Linting * Optional optimistic concurrency for delete * make update-workspace * More specific auth checks in k8s authorize.go * Add debug log when delete optimistic concurrency is skipped * Improve error message on authorizer.DecisionDeny * Keep error for non-forbidden errutil errors
127 lines
4.7 KiB
Go
127 lines
4.7 KiB
Go
package accesscontrol
|
|
|
|
import (
|
|
"context"
|
|
"fmt"
|
|
|
|
"github.com/grafana/grafana/pkg/apimachinery/errutil"
|
|
"github.com/grafana/grafana/pkg/apimachinery/identity"
|
|
ac "github.com/grafana/grafana/pkg/services/accesscontrol"
|
|
"github.com/grafana/grafana/pkg/services/ngalert/models"
|
|
)
|
|
|
|
var (
|
|
ErrAuthorizationBase = errutil.Forbidden("alerting.unauthorized")
|
|
)
|
|
|
|
func NewAuthorizationErrorWithPermissions(action string, eval ac.Evaluator) error {
|
|
msg := "user is not authorized to %s"
|
|
err := ErrAuthorizationBase.Errorf(msg, action)
|
|
err.PublicMessage = fmt.Sprintf(msg, action)
|
|
if eval != nil {
|
|
err.PublicPayload = map[string]any{
|
|
"permissions": eval.GoString(),
|
|
}
|
|
}
|
|
return err
|
|
}
|
|
|
|
func NewAuthorizationErrorGeneric(action string) error {
|
|
return NewAuthorizationErrorWithPermissions(action, nil)
|
|
}
|
|
|
|
// actionAccess is a helper struct that provides common access control methods for a specific resource type and action.
|
|
type actionAccess[T models.Identified] struct {
|
|
genericService
|
|
|
|
// authorizeSome evaluates to true if user has access to some (any) resources.
|
|
// This is used as a precondition check, if this evaluates to false then user does not have access to any resources.
|
|
authorizeSome ac.Evaluator
|
|
|
|
// authorizeAll evaluates to true if user has access to all resources.
|
|
authorizeAll ac.Evaluator
|
|
|
|
// authorizeOne returns an evaluator that checks if user has access to a specific resource.
|
|
authorizeOne func(models.Identified) ac.Evaluator
|
|
|
|
// action is the action that user is trying to perform on the resource. Used in error messages.
|
|
action string
|
|
|
|
// resource is the name of the resource. Used in error messages.
|
|
resource string
|
|
}
|
|
|
|
// Filter filters the given list of resources based on access control permissions of the user.
|
|
// This method is preferred when many resources need to be checked.
|
|
func (s actionAccess[T]) Filter(ctx context.Context, user identity.Requester, resources ...T) ([]T, error) {
|
|
if err := s.AuthorizePreConditions(ctx, user); err != nil {
|
|
return nil, err
|
|
}
|
|
canAll, err := s.HasAccess(ctx, user, s.authorizeAll)
|
|
if err != nil {
|
|
return nil, err
|
|
}
|
|
if canAll {
|
|
return resources, nil
|
|
}
|
|
result := make([]T, 0, len(resources))
|
|
for _, r := range resources {
|
|
if hasAccess := s.authorize(ctx, user, r); hasAccess == nil {
|
|
result = append(result, r)
|
|
}
|
|
}
|
|
return result, nil
|
|
}
|
|
|
|
// Authorize checks if user has access to a resource. Returns an error if user does not have access.
|
|
func (s actionAccess[T]) Authorize(ctx context.Context, user identity.Requester, resource models.Identified) error {
|
|
if err := s.AuthorizePreConditions(ctx, user); err != nil {
|
|
return err
|
|
}
|
|
canAll, err := s.HasAccess(ctx, user, s.authorizeAll)
|
|
if canAll || err != nil { // Return early if user can either access all or there is an error.
|
|
return err
|
|
}
|
|
|
|
return s.authorize(ctx, user, resource)
|
|
}
|
|
|
|
// Has checks if user has access to a resource. Returns false if user does not have access.
|
|
func (s actionAccess[T]) Has(ctx context.Context, user identity.Requester, resource models.Identified) (bool, error) {
|
|
if err := s.AuthorizePreConditions(ctx, user); err != nil {
|
|
return false, err
|
|
}
|
|
canAll, err := s.HasAccess(ctx, user, s.authorizeAll)
|
|
if canAll || err != nil { // Return early if user can either access all or there is an error.
|
|
return canAll, err
|
|
}
|
|
|
|
return s.has(ctx, user, resource)
|
|
}
|
|
|
|
// AuthorizeAll checks if user has access to all resources. Returns error if user does not have access to all resources.
|
|
func (s actionAccess[T]) AuthorizeAll(ctx context.Context, user identity.Requester) error {
|
|
return s.HasAccessOrError(ctx, user, s.authorizeAll, func() string {
|
|
return fmt.Sprintf("%s all %ss", s.action, s.resource)
|
|
})
|
|
}
|
|
|
|
// AuthorizePreConditions checks necessary preconditions for resources. Returns error if user does not have access to any resources.
|
|
func (s actionAccess[T]) AuthorizePreConditions(ctx context.Context, user identity.Requester) error {
|
|
return s.HasAccessOrError(ctx, user, s.authorizeSome, func() string {
|
|
return fmt.Sprintf("%s any %s", s.action, s.resource)
|
|
})
|
|
}
|
|
|
|
// authorize checks if user has access to a specific resource given precondition checks have already passed. Returns an error if user does not have access.
|
|
func (s actionAccess[T]) authorize(ctx context.Context, user identity.Requester, resource models.Identified) error {
|
|
return s.HasAccessOrError(ctx, user, s.authorizeOne(resource), func() string {
|
|
return fmt.Sprintf("%s %s", s.action, s.resource)
|
|
})
|
|
}
|
|
|
|
// has checks if user has access to a specific resource given precondition checks have already passed. Returns false if user does not have access.
|
|
func (s actionAccess[T]) has(ctx context.Context, user identity.Requester, resource models.Identified) (bool, error) {
|
|
return s.HasAccess(ctx, user, s.authorizeOne(resource))
|
|
}
|