ds_auth_provider.go 2.7 KB

1234567891011121314151617181920212223242526272829303132333435363738394041424344454647484950515253545556575859606162636465666768697071727374757677787980818283848586878889909192
  1. package pluginproxy
  2. import (
  3. "context"
  4. "fmt"
  5. "net/http"
  6. "net/url"
  7. "strings"
  8. m "github.com/grafana/grafana/pkg/models"
  9. "github.com/grafana/grafana/pkg/plugins"
  10. "github.com/grafana/grafana/pkg/util"
  11. "golang.org/x/oauth2/google"
  12. )
  13. //ApplyRoute should use the plugin route data to set auth headers and custom headers
  14. func ApplyRoute(ctx context.Context, req *http.Request, proxyPath string, route *plugins.AppPluginRoute, ds *m.DataSource) {
  15. proxyPath = strings.TrimPrefix(proxyPath, route.Path)
  16. data := templateData{
  17. JsonData: ds.JsonData.Interface().(map[string]interface{}),
  18. SecureJsonData: ds.SecureJsonData.Decrypt(),
  19. }
  20. interpolatedURL, err := InterpolateString(route.Url, data)
  21. if err != nil {
  22. logger.Error("Error interpolating proxy url", "error", err)
  23. return
  24. }
  25. routeURL, err := url.Parse(interpolatedURL)
  26. if err != nil {
  27. logger.Error("Error parsing plugin route url", "error", err)
  28. return
  29. }
  30. req.URL.Scheme = routeURL.Scheme
  31. req.URL.Host = routeURL.Host
  32. req.Host = routeURL.Host
  33. req.URL.Path = util.JoinURLFragments(routeURL.Path, proxyPath)
  34. if err := addHeaders(&req.Header, route, data); err != nil {
  35. logger.Error("Failed to render plugin headers", "error", err)
  36. }
  37. tokenProvider := newAccessTokenProvider(ds, route)
  38. if route.TokenAuth != nil {
  39. if token, err := tokenProvider.getAccessToken(data); err != nil {
  40. logger.Error("Failed to get access token", "error", err)
  41. } else {
  42. req.Header.Set("Authorization", fmt.Sprintf("Bearer %s", token))
  43. }
  44. }
  45. authenticationType := ds.JsonData.Get("authenticationType").MustString("jwt")
  46. if route.JwtTokenAuth != nil && authenticationType == "jwt" {
  47. if token, err := tokenProvider.getJwtAccessToken(ctx, data); err != nil {
  48. logger.Error("Failed to get access token", "error", err)
  49. } else {
  50. req.Header.Set("Authorization", fmt.Sprintf("Bearer %s", token))
  51. }
  52. }
  53. if authenticationType == "gce" {
  54. tokenSrc, err := google.DefaultTokenSource(ctx, route.JwtTokenAuth.Scopes...)
  55. if err != nil {
  56. logger.Error("Failed to get default token from meta data server", "error", err)
  57. } else {
  58. token, err := tokenSrc.Token()
  59. if err != nil {
  60. logger.Error("Failed to get default access token from meta data server", "error", err)
  61. } else {
  62. req.Header.Set("Authorization", fmt.Sprintf("Bearer %s", token.AccessToken))
  63. }
  64. }
  65. }
  66. logger.Info("Requesting", "url", req.URL.String())
  67. }
  68. func addHeaders(reqHeaders *http.Header, route *plugins.AppPluginRoute, data templateData) error {
  69. for _, header := range route.Headers {
  70. interpolated, err := InterpolateString(header.Content, data)
  71. if err != nil {
  72. return err
  73. }
  74. reqHeaders.Add(header.Name, interpolated)
  75. }
  76. return nil
  77. }