access_token_provider.go 4.1 KB

123456789101112131415161718192021222324252627282930313233343536373839404142434445464748495051525354555657585960616263646566676869707172737475767778798081828384858687888990919293949596979899100101102103104105106107108109110111112113114115116117118119120121122123124125126127128129130131132133134135136137138139140141142143144145146147148149150151152153154155156157158159160
  1. package pluginproxy
  2. import (
  3. "bytes"
  4. "context"
  5. "encoding/json"
  6. "fmt"
  7. "net/http"
  8. "net/url"
  9. "strconv"
  10. "time"
  11. "golang.org/x/oauth2"
  12. "github.com/grafana/grafana/pkg/plugins"
  13. "golang.org/x/oauth2/jwt"
  14. )
  15. var (
  16. tokenCache = map[string]*jwtToken{}
  17. oauthJwtTokenCache = map[string]*oauth2.Token{}
  18. )
  19. type accessTokenProvider struct {
  20. route *plugins.AppPluginRoute
  21. datasourceID int64
  22. }
  23. type jwtToken struct {
  24. ExpiresOn time.Time `json:"-"`
  25. ExpiresOnString string `json:"expires_on"`
  26. AccessToken string `json:"access_token"`
  27. }
  28. // Access token provider
  29. func NewAccessTokenProvider(dsID int64, pluginRoute *plugins.AppPluginRoute) *accessTokenProvider {
  30. return &accessTokenProvider{
  31. datasourceID: dsID,
  32. route: pluginRoute,
  33. }
  34. }
  35. func (provider *accessTokenProvider) getAccessToken(data templateData) (string, error) {
  36. if cachedToken, found := tokenCache[provider.getAccessTokenCacheKey()]; found {
  37. if cachedToken.ExpiresOn.After(time.Now().Add(time.Second * 10)) {
  38. logger.Info("Using token from cache")
  39. return cachedToken.AccessToken, nil
  40. }
  41. }
  42. urlInterpolated, err := interpolateString(provider.route.TokenAuth.Url, data)
  43. if err != nil {
  44. return "", err
  45. }
  46. params := make(url.Values)
  47. for key, value := range provider.route.TokenAuth.Params {
  48. interpolatedParam, err := interpolateString(value, data)
  49. if err != nil {
  50. return "", err
  51. }
  52. params.Add(key, interpolatedParam)
  53. }
  54. getTokenReq, _ := http.NewRequest("POST", urlInterpolated, bytes.NewBufferString(params.Encode()))
  55. getTokenReq.Header.Add("Content-Type", "application/x-www-form-urlencoded")
  56. getTokenReq.Header.Add("Content-Length", strconv.Itoa(len(params.Encode())))
  57. resp, err := client.Do(getTokenReq)
  58. if err != nil {
  59. return "", err
  60. }
  61. defer resp.Body.Close()
  62. var token jwtToken
  63. if err := json.NewDecoder(resp.Body).Decode(&token); err != nil {
  64. return "", err
  65. }
  66. expiresOnEpoch, _ := strconv.ParseInt(token.ExpiresOnString, 10, 64)
  67. token.ExpiresOn = time.Unix(expiresOnEpoch, 0)
  68. tokenCache[provider.getAccessTokenCacheKey()] = &token
  69. logger.Info("Got new access token", "ExpiresOn", token.ExpiresOn)
  70. return token.AccessToken, nil
  71. }
  72. func (provider *accessTokenProvider) getJwtAccessToken(ctx context.Context, data templateData) (string, error) {
  73. if cachedToken, found := oauthJwtTokenCache[provider.getAccessTokenCacheKey()]; found {
  74. if cachedToken.Expiry.After(time.Now().Add(time.Second * 10)) {
  75. logger.Info("Using token from cache")
  76. return cachedToken.AccessToken, nil
  77. }
  78. }
  79. conf := &jwt.Config{}
  80. if val, ok := provider.route.JwtTokenAuth.Params["client_email"]; ok {
  81. interpolatedVal, err := interpolateString(val, data)
  82. if err != nil {
  83. return "", err
  84. }
  85. conf.Email = interpolatedVal
  86. }
  87. if val, ok := provider.route.JwtTokenAuth.Params["private_key"]; ok {
  88. interpolatedVal, err := interpolateString(val, data)
  89. if err != nil {
  90. return "", err
  91. }
  92. conf.PrivateKey = []byte(interpolatedVal)
  93. }
  94. if val, ok := provider.route.JwtTokenAuth.Params["token_uri"]; ok {
  95. interpolatedVal, err := interpolateString(val, data)
  96. if err != nil {
  97. return "", err
  98. }
  99. conf.TokenURL = interpolatedVal
  100. }
  101. conf.Scopes = provider.route.JwtTokenAuth.Scopes
  102. token, err := getTokenSource(conf, ctx)
  103. if err != nil {
  104. return "", err
  105. }
  106. oauthJwtTokenCache[provider.getAccessTokenCacheKey()] = token
  107. return token.AccessToken, nil
  108. }
  109. var getTokenSource = func(conf *jwt.Config, ctx context.Context) (*oauth2.Token, error) {
  110. tokenSrc := conf.TokenSource(ctx)
  111. token, err := tokenSrc.Token()
  112. if err != nil {
  113. return nil, err
  114. }
  115. logger.Info("interpolatedVal", "token.AccessToken", token.AccessToken)
  116. return token, nil
  117. }
  118. func (provider *accessTokenProvider) getAccessTokenCacheKey() string {
  119. return fmt.Sprintf("%v_%v_%v", provider.datasourceID, provider.route.Path, provider.route.Method)
  120. }
  121. //Export access token lookup
  122. func GetAccessTokenFromCache(datasourceID int64, path string, method string) (string, error) {
  123. key := fmt.Sprintf("%v_%v_%v", datasourceID, path, method)
  124. if cachedToken, found := oauthJwtTokenCache[key]; found {
  125. return cachedToken.AccessToken, nil
  126. } else {
  127. return "", fmt.Errorf("Key doesnt exist")
  128. }
  129. }