grafana/pkg/services/ssosettings/strategies/saml_strategy.go
linoman fc205db466
samlsettings: api integration (#84300)
* add strategy and tests

* use settings provider service and remove multiple providers strategy

* Move SAML strategy to ssosettings service

* Update codeowners file

* reload from settings provider

* add saml as configurable provider

* Add new SAML strategy

* rename old saml settings interface

* update saml string references

* use OSS license

* validate saml provider depends on license for List

* add tests for list rendering including saml

* change the licensing validation to service init

* replace service struct for provider
2024-03-25 10:54:45 +01:00

68 lines
3.4 KiB
Go

package strategies
import (
"context"
"time"
"github.com/grafana/grafana/pkg/login/social"
"github.com/grafana/grafana/pkg/services/ssosettings"
"github.com/grafana/grafana/pkg/setting"
)
type SAMLStrategy struct {
settingsProvider setting.Provider
}
var _ ssosettings.FallbackStrategy = (*SAMLStrategy)(nil)
func NewSAMLStrategy(settingsProvider setting.Provider) *SAMLStrategy {
return &SAMLStrategy{
settingsProvider: settingsProvider,
}
}
func (s *SAMLStrategy) IsMatch(provider string) bool {
return provider == social.SAMLProviderName
}
func (s *SAMLStrategy) GetProviderConfig(_ context.Context, provider string) (map[string]any, error) {
return s.loadSAMLSettings(), nil
}
func (s *SAMLStrategy) loadSAMLSettings() map[string]any {
section := s.settingsProvider.Section("auth.saml")
result := map[string]any{
"enabled": section.KeyValue("enabled").MustBool(false),
"single_logout": section.KeyValue("single_logout").MustBool(false),
"allow_sign_up": section.KeyValue("allow_sign_up").MustBool(false),
"auto_login": section.KeyValue("auto_login").MustBool(false),
"certificate": section.KeyValue("certificate").MustString(""),
"certificate_path": section.KeyValue("certificate_path").MustString(""),
"private_key": section.KeyValue("private_key").MustString(""),
"private_key_path": section.KeyValue("private_key_path").MustString(""),
"signature_algorithm": section.KeyValue("signature_algorithm").MustString(""),
"idp_metadata": section.KeyValue("idp_metadata").MustString(""),
"idp_metadata_path": section.KeyValue("idp_metadata_path").MustString(""),
"idp_metadata_url": section.KeyValue("idp_metadata_url").MustString(""),
"max_issue_delay": section.KeyValue("max_issue_delay").MustDuration(90 * time.Second),
"metadata_valid_duration": section.KeyValue("metadata_valid_duration").MustDuration(48 * time.Hour),
"allow_idp_initiated": section.KeyValue("allow_idp_initiated").MustBool(false),
"relay_state": section.KeyValue("relay_state").MustString(""),
"assertion_attribute_name": section.KeyValue("assertion_attribute_name").MustString(""),
"assertion_attribute_login": section.KeyValue("assertion_attribute_login").MustString(""),
"assertion_attribute_email": section.KeyValue("assertion_attribute_email").MustString(""),
"assertion_attribute_groups": section.KeyValue("assertion_attribute_groups").MustString(""),
"assertion_attribute_role": section.KeyValue("assertion_attribute_role").MustString(""),
"assertion_attribute_org": section.KeyValue("assertion_attribute_org").MustString(""),
"allowed_organizations": section.KeyValue("allowed_organizations").MustString(""),
"org_mapping": section.KeyValue("org_mapping").MustString(""),
"role_values_editor": section.KeyValue("role_values_editor").MustString(""),
"role_values_admin": section.KeyValue("role_values_admin").MustString(""),
"role_values_grafana_admin": section.KeyValue("role_values_grafana_admin").MustString(""),
"name_id_format": section.KeyValue("name_id_format").MustString(""),
"skip_org_role_sync": section.KeyValue("skip_org_role_sync").MustBool(false),
"role_values_none": section.KeyValue("role_values_none").MustString(""),
}
return result
}