소스 검색

makes auth token rotation time configurable

bergquist 7 년 전
부모
커밋
56a521b264
5개의 변경된 파일29개의 추가작업 그리고 3개의 파일을 삭제
  1. 3 0
      conf/defaults.ini
  2. 22 0
      conf/sample.ini
  3. 1 2
      pkg/services/auth/auth_token.go
  4. 1 1
      pkg/services/auth/auth_token_test.go
  5. 2 0
      pkg/setting/setting.go

+ 3 - 0
conf/defaults.ini

@@ -122,6 +122,9 @@ cookie_username = grafana_user
 # How many days an session can be unused before we inactivate it
 # How many days an session can be unused before we inactivate it
 login_remember_days = 7
 login_remember_days = 7
 
 
+# How often should the login token be rotated. default to '30m'
+rotate_cookie_every = 30m
+
 # How long should Grafana keep expired tokens before deleting them
 # How long should Grafana keep expired tokens before deleting them
 delete_expired_token_after_days = 30
 delete_expired_token_after_days = 30
 
 

+ 22 - 0
conf/sample.ini

@@ -102,6 +102,28 @@ log_queries =
 # For "sqlite3" only. cache mode setting used for connecting to the database. (private, shared)
 # For "sqlite3" only. cache mode setting used for connecting to the database. (private, shared)
 ;cache_mode = private
 ;cache_mode = private
 
 
+#################################### Login ###############################
+
+[login]
+
+# Login cookie name
+;cookie_name = grafana_session
+
+# If you want login cookies to be https only. default is false
+;cookie_secure = false
+
+# Logged in user name
+;cookie_username = grafana_user
+
+# How many days an session can be unused before we inactivate it
+;login_remember_days = 7
+
+# How often should the login token be rotated. default to '30m'
+;rotate_cookie_every = 30m
+
+# How long should Grafana keep expired tokens before deleting them
+;delete_expired_token_after_days = 30
+
 #################################### Session ####################################
 #################################### Session ####################################
 [session]
 [session]
 # Either "memory", "file", "redis", "mysql", "postgres", default is "file"
 # Either "memory", "file", "redis", "mysql", "postgres", default is "file"

+ 1 - 2
pkg/services/auth/auth_token.go

@@ -23,7 +23,6 @@ func init() {
 
 
 var (
 var (
 	getTime          = time.Now
 	getTime          = time.Now
-	RotateTime       = 2 * time.Minute
 	UrgentRotateTime = 20 * time.Second
 	UrgentRotateTime = 20 * time.Second
 	oneYearInSeconds = 31557600 //used as default maxage for session cookies. We validate/rotate them more often.
 	oneYearInSeconds = 31557600 //used as default maxage for session cookies. We validate/rotate them more often.
 )
 )
@@ -219,7 +218,7 @@ func (s *UserAuthTokenServiceImpl) RefreshToken(token *userAuthToken, clientIP,
 	needsRotation := false
 	needsRotation := false
 	rotatedAt := time.Unix(token.RotatedAt, 0)
 	rotatedAt := time.Unix(token.RotatedAt, 0)
 	if token.AuthTokenSeen {
 	if token.AuthTokenSeen {
-		needsRotation = rotatedAt.Before(now.Add(-RotateTime))
+		needsRotation = rotatedAt.Before(now.Add(-s.Cfg.LoginCookieRotation))
 	} else {
 	} else {
 		needsRotation = rotatedAt.Before(now.Add(-UrgentRotateTime))
 		needsRotation = rotatedAt.Before(now.Add(-UrgentRotateTime))
 	}
 	}

+ 1 - 1
pkg/services/auth/auth_token_test.go

@@ -297,11 +297,11 @@ func createTestContext(t *testing.T) *testContext {
 			LoginCookieSecure:                 false,
 			LoginCookieSecure:                 false,
 			LoginCookieMaxDays:                7,
 			LoginCookieMaxDays:                7,
 			LoginDeleteExpiredTokensAfterDays: 30,
 			LoginDeleteExpiredTokensAfterDays: 30,
+			LoginCookieRotation:               10 * time.Minute,
 		},
 		},
 		log: log.New("test-logger"),
 		log: log.New("test-logger"),
 	}
 	}
 
 
-	RotateTime = 10 * time.Minute
 	UrgentRotateTime = time.Minute
 	UrgentRotateTime = time.Minute
 	setting.LogInRememberDays = 7
 	setting.LogInRememberDays = 7
 
 

+ 2 - 0
pkg/setting/setting.go

@@ -229,6 +229,7 @@ type Cfg struct {
 	LoginCookieUsername               string
 	LoginCookieUsername               string
 	LoginCookieSecure                 bool
 	LoginCookieSecure                 bool
 	LoginCookieMaxDays                int
 	LoginCookieMaxDays                int
+	LoginCookieRotation               time.Duration
 	LoginDeleteExpiredTokensAfterDays int
 	LoginDeleteExpiredTokensAfterDays int
 }
 }
 
 
@@ -560,6 +561,7 @@ func (cfg *Cfg) Load(args *CommandLineArgs) error {
 	cfg.LoginCookieSecure = login.Key("cookie_secure").MustBool(false)
 	cfg.LoginCookieSecure = login.Key("cookie_secure").MustBool(false)
 	cfg.LoginCookieUsername = login.Key("cookie_username").MustString("grafana_username")
 	cfg.LoginCookieUsername = login.Key("cookie_username").MustString("grafana_username")
 	cfg.LoginDeleteExpiredTokensAfterDays = login.Key("delete_expired_token_after_days").MustInt(30)
 	cfg.LoginDeleteExpiredTokensAfterDays = login.Key("delete_expired_token_after_days").MustInt(30)
+	cfg.LoginCookieRotation = login.Key("rotate_cookie_every").MustDuration(time.Minute * 30)
 
 
 	Env = iniFile.Section("").Key("app_mode").MustString("development")
 	Env = iniFile.Section("").Key("app_mode").MustString("development")
 	InstanceName = iniFile.Section("").Key("instance_name").MustString("unknown_instance_name")
 	InstanceName = iniFile.Section("").Key("instance_name").MustString("unknown_instance_name")