mirror of
https://github.com/grafana/grafana.git
synced 2024-11-27 03:11:01 -06:00
6f8fcae01b
* Plugins: Remove support for V1 manifests
* Plugins: Make proxy endpoints not leak sensitive HTTP headers
* Security: Fix do not forward login cookie in outgoing requests
(cherry picked from commit 4539c33fce
)
Co-authored-by: Will Browne <wbrowne@users.noreply.github.com>
208 lines
5.4 KiB
Go
208 lines
5.4 KiB
Go
package contexthandler
|
|
|
|
import (
|
|
"errors"
|
|
"fmt"
|
|
"net/http"
|
|
"strings"
|
|
|
|
"github.com/grafana/grafana/pkg/login"
|
|
"github.com/grafana/grafana/pkg/models"
|
|
"github.com/grafana/grafana/pkg/services/org"
|
|
"github.com/grafana/grafana/pkg/services/user"
|
|
"github.com/jmespath/go-jmespath"
|
|
)
|
|
|
|
const (
|
|
InvalidJWT = "Invalid JWT"
|
|
InvalidRole = "Invalid Role"
|
|
UserNotFound = "User not found"
|
|
)
|
|
|
|
func (h *ContextHandler) initContextWithJWT(ctx *models.ReqContext, orgId int64) bool {
|
|
if !h.Cfg.JWTAuthEnabled || h.Cfg.JWTAuthHeaderName == "" {
|
|
return false
|
|
}
|
|
|
|
jwtToken := ctx.Req.Header.Get(h.Cfg.JWTAuthHeaderName)
|
|
if jwtToken == "" && h.Cfg.JWTAuthURLLogin {
|
|
jwtToken = ctx.Req.URL.Query().Get("auth_token")
|
|
}
|
|
|
|
if jwtToken == "" {
|
|
return false
|
|
}
|
|
|
|
// Strip the 'Bearer' prefix if it exists.
|
|
jwtToken = strings.TrimPrefix(jwtToken, "Bearer ")
|
|
|
|
// The header is Authorization and the token does not look like a JWT,
|
|
// this is likely an API key. Pass it on.
|
|
if h.Cfg.JWTAuthHeaderName == "Authorization" && !looksLikeJWT(jwtToken) {
|
|
return false
|
|
}
|
|
|
|
claims, err := h.JWTAuthService.Verify(ctx.Req.Context(), jwtToken)
|
|
if err != nil {
|
|
ctx.Logger.Debug("Failed to verify JWT", "error", err)
|
|
ctx.JsonApiErr(http.StatusUnauthorized, InvalidJWT, err)
|
|
return true
|
|
}
|
|
|
|
query := user.GetSignedInUserQuery{OrgID: orgId}
|
|
|
|
sub, _ := claims["sub"].(string)
|
|
|
|
if sub == "" {
|
|
ctx.Logger.Warn("Got a JWT without the mandatory 'sub' claim", "error", err)
|
|
ctx.JsonApiErr(http.StatusUnauthorized, InvalidJWT, err)
|
|
return true
|
|
}
|
|
extUser := &models.ExternalUserInfo{
|
|
AuthModule: "jwt",
|
|
AuthId: sub,
|
|
OrgRoles: map[int64]org.RoleType{},
|
|
}
|
|
|
|
if key := h.Cfg.JWTAuthUsernameClaim; key != "" {
|
|
query.Login, _ = claims[key].(string)
|
|
extUser.Login, _ = claims[key].(string)
|
|
}
|
|
if key := h.Cfg.JWTAuthEmailClaim; key != "" {
|
|
query.Email, _ = claims[key].(string)
|
|
extUser.Email, _ = claims[key].(string)
|
|
}
|
|
|
|
if name, _ := claims["name"].(string); name != "" {
|
|
extUser.Name = name
|
|
}
|
|
|
|
role, grafanaAdmin := h.extractJWTRoleAndAdmin(claims)
|
|
if h.Cfg.JWTAuthRoleAttributeStrict && !role.IsValid() {
|
|
ctx.Logger.Debug("Extracted Role is invalid")
|
|
ctx.JsonApiErr(http.StatusForbidden, InvalidRole, nil)
|
|
return true
|
|
}
|
|
|
|
if role.IsValid() {
|
|
var orgID int64
|
|
if h.Cfg.AutoAssignOrg && h.Cfg.AutoAssignOrgId > 0 {
|
|
orgID = int64(h.Cfg.AutoAssignOrgId)
|
|
ctx.Logger.Debug("The user has a role assignment and organization membership is auto-assigned",
|
|
"role", role, "orgId", orgID)
|
|
} else {
|
|
orgID = int64(1)
|
|
ctx.Logger.Debug("The user has a role assignment and organization membership is not auto-assigned",
|
|
"role", role, "orgId", orgID)
|
|
}
|
|
|
|
extUser.OrgRoles[orgID] = role
|
|
if h.Cfg.JWTAuthAllowAssignGrafanaAdmin {
|
|
extUser.IsGrafanaAdmin = &grafanaAdmin
|
|
}
|
|
}
|
|
|
|
if query.Login == "" && query.Email == "" {
|
|
ctx.Logger.Debug("Failed to get an authentication claim from JWT")
|
|
ctx.JsonApiErr(http.StatusUnauthorized, InvalidJWT, err)
|
|
return true
|
|
}
|
|
|
|
if h.Cfg.JWTAuthAutoSignUp {
|
|
upsert := &models.UpsertUserCommand{
|
|
ReqContext: ctx,
|
|
SignupAllowed: h.Cfg.JWTAuthAutoSignUp,
|
|
ExternalUser: extUser,
|
|
UserLookupParams: models.UserLookupParams{
|
|
UserID: nil,
|
|
Login: &query.Login,
|
|
Email: &query.Email,
|
|
},
|
|
}
|
|
if err := h.loginService.UpsertUser(ctx.Req.Context(), upsert); err != nil {
|
|
ctx.Logger.Error("Failed to upsert JWT user", "error", err)
|
|
return false
|
|
}
|
|
}
|
|
|
|
queryResult, err := h.userService.GetSignedInUserWithCacheCtx(ctx.Req.Context(), &query)
|
|
if err != nil {
|
|
if errors.Is(err, user.ErrUserNotFound) {
|
|
ctx.Logger.Debug(
|
|
"Failed to find user using JWT claims",
|
|
"email_claim", query.Email,
|
|
"username_claim", query.Login,
|
|
)
|
|
err = login.ErrInvalidCredentials
|
|
ctx.JsonApiErr(http.StatusUnauthorized, UserNotFound, err)
|
|
} else {
|
|
ctx.Logger.Error("Failed to get signed in user", "error", err)
|
|
ctx.JsonApiErr(http.StatusUnauthorized, InvalidJWT, err)
|
|
}
|
|
return true
|
|
}
|
|
|
|
newCtx := WithAuthHTTPHeader(ctx.Req.Context(), h.Cfg.JWTAuthHeaderName)
|
|
*ctx.Req = *ctx.Req.WithContext(newCtx)
|
|
|
|
ctx.SignedInUser = queryResult
|
|
ctx.IsSignedIn = true
|
|
|
|
return true
|
|
}
|
|
|
|
const roleGrafanaAdmin = "GrafanaAdmin"
|
|
|
|
func (h *ContextHandler) extractJWTRoleAndAdmin(claims map[string]interface{}) (org.RoleType, bool) {
|
|
if h.Cfg.JWTAuthRoleAttributePath == "" {
|
|
return "", false
|
|
}
|
|
|
|
role, err := searchClaimsForStringAttr(h.Cfg.JWTAuthRoleAttributePath, claims)
|
|
if err != nil || role == "" {
|
|
return "", false
|
|
}
|
|
|
|
if role == roleGrafanaAdmin {
|
|
return org.RoleAdmin, true
|
|
}
|
|
return org.RoleType(role), false
|
|
}
|
|
|
|
func searchClaimsForAttr(attributePath string, claims map[string]interface{}) (interface{}, error) {
|
|
if attributePath == "" {
|
|
return "", errors.New("no attribute path specified")
|
|
}
|
|
|
|
if len(claims) == 0 {
|
|
return "", errors.New("empty claims provided")
|
|
}
|
|
|
|
val, err := jmespath.Search(attributePath, claims)
|
|
if err != nil {
|
|
return "", fmt.Errorf("failed to search claims with provided path: %q: %w", attributePath, err)
|
|
}
|
|
|
|
return val, nil
|
|
}
|
|
|
|
func searchClaimsForStringAttr(attributePath string, claims map[string]interface{}) (string, error) {
|
|
val, err := searchClaimsForAttr(attributePath, claims)
|
|
if err != nil {
|
|
return "", err
|
|
}
|
|
|
|
strVal, ok := val.(string)
|
|
if ok {
|
|
return strVal, nil
|
|
}
|
|
|
|
return "", nil
|
|
}
|
|
|
|
func looksLikeJWT(token string) bool {
|
|
// A JWT must have 3 parts separated by `.`.
|
|
parts := strings.Split(token, ".")
|
|
return len(parts) == 3
|
|
}
|