mirror of
https://github.com/grafana/grafana.git
synced 2024-11-29 20:24:18 -06:00
62 lines
2.3 KiB
Go
62 lines
2.3 KiB
Go
package pluginproxy
|
|
|
|
import (
|
|
"context"
|
|
"strings"
|
|
|
|
"github.com/grafana/grafana-azure-sdk-go/azcredentials"
|
|
"github.com/grafana/grafana-azure-sdk-go/azsettings"
|
|
"github.com/grafana/grafana-azure-sdk-go/aztokenprovider"
|
|
|
|
"github.com/grafana/grafana/pkg/plugins"
|
|
"github.com/grafana/grafana/pkg/setting"
|
|
)
|
|
|
|
type azureAccessTokenProvider struct {
|
|
ctx context.Context
|
|
tokenProvider aztokenprovider.AzureTokenProvider
|
|
scopes []string
|
|
}
|
|
|
|
func newAzureAccessTokenProvider(ctx context.Context, cfg *setting.Cfg, authParams *plugins.JWTTokenAuth) (*azureAccessTokenProvider, error) {
|
|
credentials := getAzureCredentials(cfg.Azure, authParams)
|
|
tokenProvider, err := aztokenprovider.NewAzureAccessTokenProvider(cfg.Azure, credentials)
|
|
if err != nil {
|
|
return nil, err
|
|
}
|
|
return &azureAccessTokenProvider{
|
|
ctx: ctx,
|
|
tokenProvider: tokenProvider,
|
|
scopes: authParams.Scopes,
|
|
}, nil
|
|
}
|
|
|
|
func (provider *azureAccessTokenProvider) GetAccessToken() (string, error) {
|
|
return provider.tokenProvider.GetAccessToken(provider.ctx, provider.scopes)
|
|
}
|
|
|
|
func getAzureCredentials(settings *azsettings.AzureSettings, authParams *plugins.JWTTokenAuth) azcredentials.AzureCredentials {
|
|
authType := strings.ToLower(authParams.Params["azure_auth_type"])
|
|
clientId := authParams.Params["client_id"]
|
|
|
|
// Type of authentication being determined by the following logic:
|
|
// * If authType is set to 'msi' then user explicitly selected the managed identity authentication
|
|
// * If authType isn't set but other fields are configured then it's a datasource which was configured
|
|
// before managed identities where introduced, therefore use client secret authentication
|
|
// * If authType and other fields aren't set then it means the datasource never been configured
|
|
// and managed identity is the default authentication choice as long as managed identities are enabled
|
|
isManagedIdentity := authType == "msi" || (authType == "" && clientId == "" && settings.ManagedIdentityEnabled)
|
|
|
|
if isManagedIdentity {
|
|
return &azcredentials.AzureManagedIdentityCredentials{}
|
|
} else {
|
|
return &azcredentials.AzureClientSecretCredentials{
|
|
AzureCloud: authParams.Params["azure_cloud"],
|
|
Authority: authParams.Url,
|
|
TenantId: authParams.Params["tenant_id"],
|
|
ClientId: authParams.Params["client_id"],
|
|
ClientSecret: authParams.Params["client_secret"],
|
|
}
|
|
}
|
|
}
|