mirror of
https://github.com/grafana/grafana.git
synced 2025-01-18 20:43:26 -06:00
2cf88cfec8
* Chore: remove bus from contexthandler * remove bus from orgredirect
96 lines
2.3 KiB
Go
96 lines
2.3 KiB
Go
package contexthandler
|
|
|
|
import (
|
|
"errors"
|
|
|
|
"github.com/grafana/grafana/pkg/login"
|
|
"github.com/grafana/grafana/pkg/models"
|
|
)
|
|
|
|
const InvalidJWT = "Invalid JWT"
|
|
const UserNotFound = "User not found"
|
|
|
|
func (h *ContextHandler) initContextWithJWT(ctx *models.ReqContext, orgId int64) bool {
|
|
if !h.Cfg.JWTAuthEnabled || h.Cfg.JWTAuthHeaderName == "" {
|
|
return false
|
|
}
|
|
|
|
jwtToken := ctx.Req.Header.Get(h.Cfg.JWTAuthHeaderName)
|
|
if jwtToken == "" {
|
|
return false
|
|
}
|
|
|
|
claims, err := h.JWTAuthService.Verify(ctx.Req.Context(), jwtToken)
|
|
if err != nil {
|
|
ctx.Logger.Debug("Failed to verify JWT", "error", err)
|
|
ctx.JsonApiErr(401, InvalidJWT, err)
|
|
return true
|
|
}
|
|
|
|
query := models.GetSignedInUserQuery{OrgId: orgId}
|
|
|
|
sub, _ := claims["sub"].(string)
|
|
|
|
if sub == "" {
|
|
ctx.Logger.Warn("Got a JWT without the mandatory 'sub' claim", "error", err)
|
|
ctx.JsonApiErr(401, InvalidJWT, err)
|
|
return true
|
|
}
|
|
extUser := &models.ExternalUserInfo{
|
|
AuthModule: "jwt",
|
|
AuthId: sub,
|
|
}
|
|
|
|
if key := h.Cfg.JWTAuthUsernameClaim; key != "" {
|
|
query.Login, _ = claims[key].(string)
|
|
extUser.Login, _ = claims[key].(string)
|
|
}
|
|
if key := h.Cfg.JWTAuthEmailClaim; key != "" {
|
|
query.Email, _ = claims[key].(string)
|
|
extUser.Email, _ = claims[key].(string)
|
|
}
|
|
|
|
if name, _ := claims["name"].(string); name != "" {
|
|
extUser.Name = name
|
|
}
|
|
|
|
if query.Login == "" && query.Email == "" {
|
|
ctx.Logger.Debug("Failed to get an authentication claim from JWT")
|
|
ctx.JsonApiErr(401, InvalidJWT, err)
|
|
return true
|
|
}
|
|
|
|
if h.Cfg.JWTAuthAutoSignUp {
|
|
upsert := &models.UpsertUserCommand{
|
|
ReqContext: ctx,
|
|
SignupAllowed: h.Cfg.JWTAuthAutoSignUp,
|
|
ExternalUser: extUser,
|
|
}
|
|
if err := h.loginService.UpsertUser(ctx.Req.Context(), upsert); err != nil {
|
|
ctx.Logger.Error("Failed to upsert JWT user", "error", err)
|
|
return false
|
|
}
|
|
}
|
|
|
|
if err := h.SQLStore.GetSignedInUserWithCacheCtx(ctx.Req.Context(), &query); err != nil {
|
|
if errors.Is(err, models.ErrUserNotFound) {
|
|
ctx.Logger.Debug(
|
|
"Failed to find user using JWT claims",
|
|
"email_claim", query.Email,
|
|
"username_claim", query.Login,
|
|
)
|
|
err = login.ErrInvalidCredentials
|
|
ctx.JsonApiErr(401, UserNotFound, err)
|
|
} else {
|
|
ctx.Logger.Error("Failed to get signed in user", "error", err)
|
|
ctx.JsonApiErr(401, InvalidJWT, err)
|
|
}
|
|
return true
|
|
}
|
|
|
|
ctx.SignedInUser = query.Result
|
|
ctx.IsSignedIn = true
|
|
|
|
return true
|
|
}
|