ds_auth_provider.go 3.2 KB

123456789101112131415161718192021222324252627282930313233343536373839404142434445464748495051525354555657585960616263646566676869707172737475767778798081828384858687888990919293949596979899100101102103104105106107108109110111
  1. package pluginproxy
  2. import (
  3. "bytes"
  4. "context"
  5. "fmt"
  6. "net/http"
  7. "net/url"
  8. "strings"
  9. "text/template"
  10. m "github.com/grafana/grafana/pkg/models"
  11. "github.com/grafana/grafana/pkg/plugins"
  12. "github.com/grafana/grafana/pkg/util"
  13. )
  14. //ApplyRoute should use the plugin route data to set auth headers and custom headers
  15. func ApplyRoute(ctx context.Context, req *http.Request, proxyPath string, route *plugins.AppPluginRoute, ds *m.DataSource) {
  16. proxyPath = strings.TrimPrefix(proxyPath, route.Path)
  17. data := templateData{
  18. JsonData: ds.JsonData.Interface().(map[string]interface{}),
  19. SecureJsonData: ds.SecureJsonData.Decrypt(),
  20. }
  21. interpolatedURL, err := interpolateString(route.Url, data)
  22. if err != nil {
  23. logger.Error("Error interpolating proxy url", "error", err)
  24. return
  25. }
  26. routeURL, err := url.Parse(interpolatedURL)
  27. if err != nil {
  28. logger.Error("Error parsing plugin route url", "error", err)
  29. return
  30. }
  31. req.URL.Scheme = routeURL.Scheme
  32. req.URL.Host = routeURL.Host
  33. req.Host = routeURL.Host
  34. req.URL.Path = util.JoinUrlFragments(routeURL.Path, proxyPath)
  35. if err := addHeaders(&req.Header, route, data); err != nil {
  36. logger.Error("Failed to render plugin headers", "error", err)
  37. }
  38. tokenProvider := newAccessTokenProvider(ds, route)
  39. if route.TokenAuth != nil {
  40. if token, err := tokenProvider.getAccessToken(data); err != nil {
  41. logger.Error("Failed to get access token", "error", err)
  42. } else {
  43. req.Header.Add("Authorization", fmt.Sprintf("Bearer %s", token))
  44. }
  45. }
  46. gceAutoAuthentication := ds.JsonData.Get("gceAutomaticAuthentication").MustBool()
  47. logger.Info("gceAutoAuthentication", "gceAutoAuthentication", gceAutoAuthentication)
  48. if route.JwtTokenAuth != nil && !gceAutoAuthentication {
  49. if token, err := tokenProvider.getJwtAccessToken(ctx, data); err != nil {
  50. logger.Error("Failed to get access token", "error", err)
  51. } else {
  52. req.Header.Add("Authorization", fmt.Sprintf("Bearer %s", token))
  53. }
  54. }
  55. if gceAutoAuthentication {
  56. // tokenSrc, err := google.DefaultTokenSource(ctx, route.JwtTokenAuth.Scopes...)
  57. if err != nil {
  58. logger.Error("Failed to get default credentials", "error", err)
  59. } else {
  60. // token, err := tokenSrc.Token()
  61. token, err := tokenProvider.getJwtAccessToken(ctx, data)
  62. if err != nil {
  63. logger.Error("Failed to get default access token", "error", err)
  64. } else {
  65. // req.Header.Add("Authorization", fmt.Sprintf("Bearer %s", token.AccessToken))
  66. req.Header.Add("Authorization", fmt.Sprintf("Bearer %s", token))
  67. }
  68. }
  69. }
  70. logger.Info("Requesting", "url", req.URL.String())
  71. }
  72. func interpolateString(text string, data templateData) (string, error) {
  73. t, err := template.New("content").Parse(text)
  74. if err != nil {
  75. return "", fmt.Errorf("could not parse template %s", text)
  76. }
  77. var contentBuf bytes.Buffer
  78. err = t.Execute(&contentBuf, data)
  79. if err != nil {
  80. return "", fmt.Errorf("failed to execute template %s", text)
  81. }
  82. return contentBuf.String(), nil
  83. }
  84. func addHeaders(reqHeaders *http.Header, route *plugins.AppPluginRoute, data templateData) error {
  85. for _, header := range route.Headers {
  86. interpolated, err := interpolateString(header.Content, data)
  87. if err != nil {
  88. return err
  89. }
  90. reqHeaders.Add(header.Name, interpolated)
  91. }
  92. return nil
  93. }