auth_proxy.go 5.7 KB

123456789101112131415161718192021222324252627282930313233343536373839404142434445464748495051525354555657585960616263646566676869707172737475767778798081828384858687888990919293949596979899100101102103104105106107108109110111112113114115116117118119120121122123124125126127128129130131132133134135136137138139140141142143144145146147148149150151152153154155156157158159160161162163164165166167168169170171172173174175176177178179180181182183184185186187188189190191192193194195196197198199200201202203204205206207208209210211212213214
  1. package middleware
  2. import (
  3. "fmt"
  4. "net"
  5. "net/mail"
  6. "reflect"
  7. "strings"
  8. "time"
  9. "github.com/grafana/grafana/pkg/bus"
  10. "github.com/grafana/grafana/pkg/log"
  11. "github.com/grafana/grafana/pkg/login"
  12. m "github.com/grafana/grafana/pkg/models"
  13. "github.com/grafana/grafana/pkg/services/session"
  14. "github.com/grafana/grafana/pkg/setting"
  15. )
  16. var AUTH_PROXY_SESSION_VAR = "authProxyHeaderValue"
  17. func initContextWithAuthProxy(ctx *m.ReqContext, orgID int64) bool {
  18. if !setting.AuthProxyEnabled {
  19. return false
  20. }
  21. proxyHeaderValue := ctx.Req.Header.Get(setting.AuthProxyHeaderName)
  22. if len(proxyHeaderValue) == 0 {
  23. return false
  24. }
  25. // if auth proxy ip(s) defined, check if request comes from one of those
  26. if err := checkAuthenticationProxy(ctx.Req.RemoteAddr, proxyHeaderValue); err != nil {
  27. ctx.Handle(407, "Proxy authentication required", err)
  28. return true
  29. }
  30. // initialize session
  31. if err := ctx.Session.Start(ctx.Context); err != nil {
  32. log.Error(3, "Failed to start session. error %v", err)
  33. return false
  34. }
  35. query := &m.GetSignedInUserQuery{OrgId: orgID}
  36. // if this session has already been authenticated by authProxy just load the user
  37. sessProxyValue := ctx.Session.Get(AUTH_PROXY_SESSION_VAR)
  38. if sessProxyValue != nil && sessProxyValue.(string) == proxyHeaderValue && getRequestUserId(ctx) > 0 {
  39. // if we're using ldap, sync user periodically
  40. if setting.LdapEnabled {
  41. syncQuery := &m.LoginUserQuery{
  42. ReqContext: ctx,
  43. Username: proxyHeaderValue,
  44. }
  45. if err := syncGrafanaUserWithLdapUser(syncQuery); err != nil {
  46. if err == login.ErrInvalidCredentials {
  47. ctx.Handle(500, "Unable to authenticate user", err)
  48. return false
  49. }
  50. ctx.Handle(500, "Failed to sync user", err)
  51. return false
  52. }
  53. }
  54. query.UserId = getRequestUserId(ctx)
  55. // if we're using ldap, pass authproxy login name to ldap user sync
  56. } else if setting.LdapEnabled {
  57. ctx.Session.Delete(session.SESS_KEY_LASTLDAPSYNC)
  58. syncQuery := &m.LoginUserQuery{
  59. ReqContext: ctx,
  60. Username: proxyHeaderValue,
  61. }
  62. if err := syncGrafanaUserWithLdapUser(syncQuery); err != nil {
  63. if err == login.ErrInvalidCredentials {
  64. ctx.Handle(500, "Unable to authenticate user", err)
  65. return false
  66. }
  67. ctx.Handle(500, "Failed to sync user", err)
  68. return false
  69. }
  70. if syncQuery.User == nil {
  71. ctx.Handle(500, "Failed to sync user", nil)
  72. return false
  73. }
  74. query.UserId = syncQuery.User.Id
  75. // no ldap, just use the info we have
  76. } else {
  77. extUser := &m.ExternalUserInfo{
  78. AuthModule: "authproxy",
  79. AuthId: proxyHeaderValue,
  80. }
  81. if setting.AuthProxyHeaderProperty == "username" {
  82. extUser.Login = proxyHeaderValue
  83. // only set Email if it can be parsed as an email address
  84. emailAddr, emailErr := mail.ParseAddress(proxyHeaderValue)
  85. if emailErr == nil {
  86. extUser.Email = emailAddr.Address
  87. }
  88. } else if setting.AuthProxyHeaderProperty == "email" {
  89. extUser.Email = proxyHeaderValue
  90. extUser.Login = proxyHeaderValue
  91. } else {
  92. ctx.Handle(500, "Auth proxy header property invalid", nil)
  93. return true
  94. }
  95. for _, field := range []string{"Name", "Email", "Login"} {
  96. if setting.AuthProxyHeaders[field] == "" {
  97. continue
  98. }
  99. if val := ctx.Req.Header.Get(setting.AuthProxyHeaders[field]); val != "" {
  100. reflect.ValueOf(extUser).Elem().FieldByName(field).SetString(val)
  101. }
  102. }
  103. // add/update user in grafana
  104. cmd := &m.UpsertUserCommand{
  105. ReqContext: ctx,
  106. ExternalUser: extUser,
  107. SignupAllowed: setting.AuthProxyAutoSignUp,
  108. }
  109. err := bus.Dispatch(cmd)
  110. if err != nil {
  111. ctx.Handle(500, "Failed to login as user specified in auth proxy header", err)
  112. return true
  113. }
  114. query.UserId = cmd.Result.Id
  115. }
  116. if err := bus.Dispatch(query); err != nil {
  117. ctx.Handle(500, "Failed to find user", err)
  118. return true
  119. }
  120. // Make sure that we cannot share a session between different users!
  121. if getRequestUserId(ctx) > 0 && getRequestUserId(ctx) != query.Result.UserId {
  122. // remove session
  123. if err := ctx.Session.Destory(ctx.Context); err != nil {
  124. log.Error(3, "Failed to destroy session. error: %v", err)
  125. }
  126. // initialize a new session
  127. if err := ctx.Session.Start(ctx.Context); err != nil {
  128. log.Error(3, "Failed to start session. error: %v", err)
  129. }
  130. }
  131. ctx.Session.Set(AUTH_PROXY_SESSION_VAR, proxyHeaderValue)
  132. ctx.SignedInUser = query.Result
  133. ctx.IsSignedIn = true
  134. ctx.Session.Set(session.SESS_KEY_USERID, ctx.UserId)
  135. return true
  136. }
  137. var syncGrafanaUserWithLdapUser = func(query *m.LoginUserQuery) error {
  138. expireEpoch := time.Now().Add(time.Duration(-setting.AuthProxyLdapSyncTtl) * time.Minute).Unix()
  139. var lastLdapSync int64
  140. if lastLdapSyncInSession := query.ReqContext.Session.Get(session.SESS_KEY_LASTLDAPSYNC); lastLdapSyncInSession != nil {
  141. lastLdapSync = lastLdapSyncInSession.(int64)
  142. }
  143. if lastLdapSync < expireEpoch {
  144. ldapCfg := login.LdapCfg
  145. if len(ldapCfg.Servers) < 1 {
  146. return fmt.Errorf("No LDAP servers available")
  147. }
  148. for _, server := range ldapCfg.Servers {
  149. author := login.NewLdapAuthenticator(server)
  150. if err := author.SyncUser(query); err != nil {
  151. return err
  152. }
  153. }
  154. query.ReqContext.Session.Set(session.SESS_KEY_LASTLDAPSYNC, time.Now().Unix())
  155. }
  156. return nil
  157. }
  158. func checkAuthenticationProxy(remoteAddr string, proxyHeaderValue string) error {
  159. if len(strings.TrimSpace(setting.AuthProxyWhitelist)) == 0 {
  160. return nil
  161. }
  162. proxies := strings.Split(setting.AuthProxyWhitelist, ",")
  163. sourceIP, _, err := net.SplitHostPort(remoteAddr)
  164. if err != nil {
  165. return err
  166. }
  167. // Compare allowed IP addresses to actual address
  168. for _, proxyIP := range proxies {
  169. if sourceIP == strings.TrimSpace(proxyIP) {
  170. return nil
  171. }
  172. }
  173. return fmt.Errorf("Request for user (%s) from %s is not from the authentication proxy", proxyHeaderValue, sourceIP)
  174. }