mirror of
https://github.com/grafana/grafana.git
synced 2024-11-30 12:44:10 -06:00
d0d8544ded
* split out plugin manager * remove whitespace * fix tests * split up tests * updating naming conventions * simplify manager * tidy * explorations * fix build * tidy * fix tests * add logger helper * pass the tests * tidying * fix tests * tidy and re-add test * store depends on loader * enrich tests * fix test * undo gomod changes
295 lines
8.5 KiB
Go
295 lines
8.5 KiB
Go
package storage
|
|
|
|
import (
|
|
"archive/zip"
|
|
"bytes"
|
|
"context"
|
|
"encoding/json"
|
|
"errors"
|
|
"fmt"
|
|
"io"
|
|
"os"
|
|
"path/filepath"
|
|
"regexp"
|
|
"strings"
|
|
"sync"
|
|
|
|
"github.com/grafana/grafana/pkg/plugins/logger"
|
|
)
|
|
|
|
var _ Manager = (*FS)(nil)
|
|
|
|
var reGitBuild = regexp.MustCompile("^[a-zA-Z0-9_.-]*/")
|
|
|
|
var (
|
|
ErrUninstallOutsideOfPluginDir = errors.New("cannot uninstall a plugin outside of the plugins directory")
|
|
ErrUninstallInvalidPluginDir = errors.New("cannot recognize as plugin folder")
|
|
)
|
|
|
|
type FS struct {
|
|
store map[string]string
|
|
mu sync.RWMutex
|
|
pluginsDir string
|
|
log logger.Logger
|
|
}
|
|
|
|
func FileSystem(logger logger.Logger, pluginsDir string) *FS {
|
|
return &FS{
|
|
store: make(map[string]string),
|
|
pluginsDir: pluginsDir,
|
|
log: logger,
|
|
}
|
|
}
|
|
|
|
func (fs *FS) Add(ctx context.Context, pluginID string, pluginArchive *zip.ReadCloser) (
|
|
*ExtractedPluginArchive, error) {
|
|
pluginDir, err := fs.extractFiles(ctx, pluginArchive, pluginID)
|
|
if err != nil {
|
|
return nil, fmt.Errorf("%v: %w", "failed to extract plugin archive", err)
|
|
}
|
|
|
|
res, err := toPluginDTO(pluginID, pluginDir)
|
|
if err != nil {
|
|
return nil, fmt.Errorf("%v: %w", "failed to convert to plugin DTO", err)
|
|
}
|
|
|
|
fs.log.Successf("Downloaded and extracted %s v%s zip successfully to %s", res.ID, res.Info.Version, pluginDir)
|
|
|
|
var deps []*Dependency
|
|
for _, plugin := range res.Dependencies.Plugins {
|
|
deps = append(deps, &Dependency{
|
|
ID: plugin.ID,
|
|
Version: plugin.Version,
|
|
})
|
|
}
|
|
|
|
return &ExtractedPluginArchive{
|
|
ID: res.ID,
|
|
Version: res.Info.Version,
|
|
Dependencies: deps,
|
|
Path: pluginDir,
|
|
}, nil
|
|
}
|
|
|
|
func (fs *FS) Register(_ context.Context, pluginID, pluginDir string) error {
|
|
fs.mu.Lock()
|
|
fs.store[pluginID] = pluginDir
|
|
fs.mu.Unlock()
|
|
|
|
return nil
|
|
}
|
|
|
|
func (fs *FS) Remove(_ context.Context, pluginID string) error {
|
|
fs.mu.RLock()
|
|
pluginDir, exists := fs.store[pluginID]
|
|
fs.mu.RUnlock()
|
|
if !exists {
|
|
return fmt.Errorf("%s does not exist", pluginID)
|
|
}
|
|
|
|
// extra security check to ensure we only remove plugins that are located in the configured plugins directory
|
|
path, err := filepath.Rel(fs.pluginsDir, pluginDir)
|
|
if err != nil || strings.HasPrefix(path, ".."+string(filepath.Separator)) {
|
|
return ErrUninstallOutsideOfPluginDir
|
|
}
|
|
|
|
if _, err = os.Stat(filepath.Join(pluginDir, "plugin.json")); os.IsNotExist(err) {
|
|
if _, err = os.Stat(filepath.Join(pluginDir, "dist/plugin.json")); os.IsNotExist(err) {
|
|
return ErrUninstallInvalidPluginDir
|
|
}
|
|
}
|
|
|
|
fs.log.Infof("Uninstalling plugin %v", pluginDir)
|
|
return os.RemoveAll(pluginDir)
|
|
}
|
|
|
|
func (fs *FS) extractFiles(_ context.Context, pluginArchive *zip.ReadCloser, pluginID string) (string, error) {
|
|
installDir := filepath.Join(fs.pluginsDir, pluginID)
|
|
if _, err := os.Stat(installDir); !os.IsNotExist(err) {
|
|
fs.log.Debugf("Removing existing installation of plugin %s", installDir)
|
|
err = os.RemoveAll(installDir)
|
|
if err != nil {
|
|
return "", err
|
|
}
|
|
}
|
|
|
|
defer func() {
|
|
if err := pluginArchive.Close(); err != nil {
|
|
fs.log.Warn("failed to close zip file", "err", err)
|
|
}
|
|
}()
|
|
|
|
for _, zf := range pluginArchive.File {
|
|
// We can ignore gosec G305 here since we check for the ZipSlip vulnerability below
|
|
// nolint:gosec
|
|
fullPath := filepath.Join(fs.pluginsDir, zf.Name)
|
|
|
|
// Check for ZipSlip. More Info: http://bit.ly/2MsjAWE
|
|
if filepath.IsAbs(zf.Name) ||
|
|
!strings.HasPrefix(fullPath, filepath.Clean(fs.pluginsDir)+string(os.PathSeparator)) ||
|
|
strings.HasPrefix(zf.Name, ".."+string(os.PathSeparator)) {
|
|
return "", fmt.Errorf(
|
|
"archive member %q tries to write outside of plugin directory: %q, this can be a security risk",
|
|
zf.Name, fs.pluginsDir)
|
|
}
|
|
|
|
dstPath := filepath.Clean(filepath.Join(fs.pluginsDir, removeGitBuildFromName(zf.Name, pluginID))) // lgtm[go/zipslip]
|
|
|
|
if zf.FileInfo().IsDir() {
|
|
// We can ignore gosec G304 here since it makes sense to give all users read access
|
|
// nolint:gosec
|
|
if err := os.MkdirAll(dstPath, 0755); err != nil {
|
|
if os.IsPermission(err) {
|
|
return "", ErrPermissionDenied{Path: dstPath}
|
|
}
|
|
|
|
return "", err
|
|
}
|
|
continue
|
|
}
|
|
|
|
// Create needed directories to extract file
|
|
// We can ignore gosec G304 here since it makes sense to give all users read access
|
|
// nolint:gosec
|
|
if err := os.MkdirAll(filepath.Dir(dstPath), 0755); err != nil {
|
|
return "", fmt.Errorf("%v: %w", "failed to create directory to extract plugin files", err)
|
|
}
|
|
|
|
if isSymlink(zf) {
|
|
if err := extractSymlink(installDir, zf, dstPath); err != nil {
|
|
fs.log.Warn("failed to extract symlink", "err", err)
|
|
continue
|
|
}
|
|
continue
|
|
}
|
|
|
|
if err := extractFile(zf, dstPath); err != nil {
|
|
return "", fmt.Errorf("%v: %w", "failed to extract file", err)
|
|
}
|
|
}
|
|
|
|
return installDir, nil
|
|
}
|
|
|
|
func isSymlink(file *zip.File) bool {
|
|
return file.Mode()&os.ModeSymlink == os.ModeSymlink
|
|
}
|
|
|
|
func extractSymlink(basePath string, file *zip.File, filePath string) error {
|
|
// symlink target is the contents of the file
|
|
src, err := file.Open()
|
|
if err != nil {
|
|
return fmt.Errorf("%v: %w", "failed to extract file", err)
|
|
}
|
|
buf := new(bytes.Buffer)
|
|
if _, err = io.Copy(buf, src); err != nil {
|
|
return fmt.Errorf("%v: %w", "failed to copy symlink contents", err)
|
|
}
|
|
|
|
symlinkPath := strings.TrimSpace(buf.String())
|
|
if !isSymlinkRelativeTo(basePath, symlinkPath, filePath) {
|
|
return fmt.Errorf("symlink %q pointing outside plugin directory is not allowed", filePath)
|
|
}
|
|
|
|
if err = os.Symlink(symlinkPath, filePath); err != nil {
|
|
return fmt.Errorf("failed to make symbolic link for %v: %w", filePath, err)
|
|
}
|
|
return nil
|
|
}
|
|
|
|
// isSymlinkRelativeTo checks whether symlinkDestPath is relative to basePath.
|
|
// symlinkOrigPath is the path to file holding the symbolic link.
|
|
func isSymlinkRelativeTo(basePath string, symlinkDestPath string, symlinkOrigPath string) bool {
|
|
if filepath.IsAbs(symlinkDestPath) {
|
|
return false
|
|
}
|
|
fileDir := filepath.Dir(symlinkOrigPath)
|
|
cleanPath := filepath.Clean(filepath.Join(fileDir, "/", symlinkDestPath))
|
|
p, err := filepath.Rel(basePath, cleanPath)
|
|
if err != nil {
|
|
return false
|
|
}
|
|
|
|
if strings.HasPrefix(filepath.Clean(p), "..") {
|
|
return false
|
|
}
|
|
|
|
return true
|
|
}
|
|
|
|
func extractFile(file *zip.File, filePath string) (err error) {
|
|
fileMode := file.Mode()
|
|
// This is entry point for backend plugins so we want to make them executable
|
|
if strings.HasSuffix(filePath, "_linux_amd64") || strings.HasSuffix(filePath, "_darwin_amd64") {
|
|
fileMode = os.FileMode(0755)
|
|
}
|
|
|
|
// We can ignore the gosec G304 warning on this one, since the variable part of the file path stems
|
|
// from command line flag "pluginsDir", and the only possible damage would be writing to the wrong directory.
|
|
// If the user shouldn't be writing to this directory, they shouldn't have the permission in the file system.
|
|
// nolint:gosec
|
|
dst, err := os.OpenFile(filePath, os.O_RDWR|os.O_CREATE|os.O_TRUNC, fileMode)
|
|
if err != nil {
|
|
if os.IsPermission(err) {
|
|
return fmt.Errorf("could not create %q, permission denied, make sure you have write access to plugin dir", filePath)
|
|
}
|
|
|
|
unwrappedError := errors.Unwrap(err)
|
|
if unwrappedError != nil && strings.EqualFold(unwrappedError.Error(), "text file busy") {
|
|
return fmt.Errorf("file %q is in use - please stop Grafana, install the plugin and restart Grafana", filePath)
|
|
}
|
|
|
|
return fmt.Errorf("%v: %w", "failed to open file", err)
|
|
}
|
|
defer func() {
|
|
err = dst.Close()
|
|
}()
|
|
|
|
src, err := file.Open()
|
|
if err != nil {
|
|
return fmt.Errorf("%v: %w", "failed to extract file", err)
|
|
}
|
|
defer func() {
|
|
err = src.Close()
|
|
}()
|
|
|
|
_, err = io.Copy(dst, src)
|
|
return err
|
|
}
|
|
|
|
func removeGitBuildFromName(filename, pluginID string) string {
|
|
return reGitBuild.ReplaceAllString(filename, pluginID+"/")
|
|
}
|
|
|
|
func toPluginDTO(pluginID, pluginDir string) (InstalledPlugin, error) {
|
|
distPluginDataPath := filepath.Join(pluginDir, "dist", "plugin.json")
|
|
|
|
// It's safe to ignore gosec warning G304 since the file path suffix is hardcoded
|
|
// nolint:gosec
|
|
data, err := os.ReadFile(distPluginDataPath)
|
|
if err != nil {
|
|
pluginDataPath := filepath.Join(pluginDir, "plugin.json")
|
|
// It's safe to ignore gosec warning G304 since the file path suffix is hardcoded
|
|
// nolint:gosec
|
|
data, err = os.ReadFile(pluginDataPath)
|
|
if err != nil {
|
|
return InstalledPlugin{}, fmt.Errorf("could not find dist/plugin.json or plugin.json for %s in %s", pluginID, pluginDir)
|
|
}
|
|
}
|
|
|
|
res := InstalledPlugin{}
|
|
if err = json.Unmarshal(data, &res); err != nil {
|
|
return res, err
|
|
}
|
|
|
|
if res.ID == "" {
|
|
return InstalledPlugin{}, fmt.Errorf("could not find valid plugin %s in %s", pluginID, pluginDir)
|
|
}
|
|
|
|
if res.Info.Version == "" {
|
|
res.Info.Version = "0.0.0"
|
|
}
|
|
|
|
return res, nil
|
|
}
|