2022-09-06 00:15:47 +08:00
|
|
|
package acimpl
|
2022-08-24 19:29:17 +08:00
|
|
|
|
|
|
|
|
import (
|
|
|
|
|
"context"
|
2022-08-25 18:50:27 +08:00
|
|
|
"errors"
|
2022-08-24 19:29:17 +08:00
|
|
|
|
|
|
|
|
"github.com/prometheus/client_golang/prometheus"
|
|
|
|
|
|
|
|
|
|
"github.com/grafana/grafana/pkg/infra/log"
|
|
|
|
|
"github.com/grafana/grafana/pkg/infra/metrics"
|
|
|
|
|
"github.com/grafana/grafana/pkg/services/accesscontrol"
|
2023-08-09 15:35:50 +08:00
|
|
|
"github.com/grafana/grafana/pkg/services/auth/identity"
|
2022-08-24 19:29:17 +08:00
|
|
|
"github.com/grafana/grafana/pkg/setting"
|
|
|
|
|
)
|
|
|
|
|
|
|
|
|
|
var _ accesscontrol.AccessControl = new(AccessControl)
|
|
|
|
|
|
2022-09-09 15:07:45 +08:00
|
|
|
func ProvideAccessControl(cfg *setting.Cfg) *AccessControl {
|
2022-08-24 19:29:17 +08:00
|
|
|
logger := log.New("accesscontrol")
|
|
|
|
|
return &AccessControl{
|
2022-09-09 15:07:45 +08:00
|
|
|
cfg, logger, accesscontrol.NewResolvers(logger),
|
2022-08-24 19:29:17 +08:00
|
|
|
}
|
|
|
|
|
}
|
|
|
|
|
|
|
|
|
|
type AccessControl struct {
|
|
|
|
|
cfg *setting.Cfg
|
|
|
|
|
log log.Logger
|
|
|
|
|
resolvers accesscontrol.Resolvers
|
|
|
|
|
}
|
|
|
|
|
|
2023-08-09 15:35:50 +08:00
|
|
|
func (a *AccessControl) Evaluate(ctx context.Context, user identity.Requester, evaluator accesscontrol.Evaluator) (bool, error) {
|
2022-08-24 19:29:17 +08:00
|
|
|
timer := prometheus.NewTimer(metrics.MAccessEvaluationsSummary)
|
|
|
|
|
defer timer.ObserveDuration()
|
|
|
|
|
metrics.MAccessEvaluationCount.Inc()
|
|
|
|
|
|
2023-08-09 15:35:50 +08:00
|
|
|
if user == nil || user.IsNil() {
|
2023-09-05 00:49:47 +08:00
|
|
|
a.log.Warn("No entity set for access control evaluation")
|
2022-09-09 15:07:45 +08:00
|
|
|
return false, nil
|
2022-08-24 19:29:17 +08:00
|
|
|
}
|
2023-08-09 15:35:50 +08:00
|
|
|
|
|
|
|
|
namespace, identifier := user.GetNamespacedID()
|
2024-02-01 19:37:01 +08:00
|
|
|
|
|
|
|
|
// If the user is in no organization, then the evaluation must happen based on the user's global permissions
|
|
|
|
|
permissions := user.GetPermissions()
|
|
|
|
|
if user.GetOrgID() == accesscontrol.NoOrgID {
|
|
|
|
|
permissions = user.GetGlobalPermissions()
|
|
|
|
|
}
|
|
|
|
|
if len(permissions) == 0 {
|
2023-09-07 16:22:31 +08:00
|
|
|
a.log.Debug("No permissions set for entity", "namespace", namespace, "id", identifier, "orgID", user.GetOrgID(), "login", user.GetLogin())
|
2023-08-09 15:35:50 +08:00
|
|
|
return false, nil
|
|
|
|
|
}
|
|
|
|
|
|
2022-08-25 18:50:27 +08:00
|
|
|
// Test evaluation without scope resolver first, this will prevent 403 for wildcard scopes when resource does not exist
|
2024-02-01 19:37:01 +08:00
|
|
|
if evaluator.Evaluate(permissions) {
|
2022-08-25 18:50:27 +08:00
|
|
|
return true, nil
|
|
|
|
|
}
|
|
|
|
|
|
2023-08-09 15:35:50 +08:00
|
|
|
resolvedEvaluator, err := evaluator.MutateScopes(ctx, a.resolvers.GetScopeAttributeMutator(user.GetOrgID()))
|
2022-08-24 19:29:17 +08:00
|
|
|
if err != nil {
|
2022-08-25 18:50:27 +08:00
|
|
|
if errors.Is(err, accesscontrol.ErrResolverNotFound) {
|
|
|
|
|
return false, nil
|
|
|
|
|
}
|
2022-08-24 19:29:17 +08:00
|
|
|
return false, err
|
|
|
|
|
}
|
2022-08-25 18:50:27 +08:00
|
|
|
|
2024-02-01 19:37:01 +08:00
|
|
|
return resolvedEvaluator.Evaluate(permissions), nil
|
2022-08-24 19:29:17 +08:00
|
|
|
}
|
|
|
|
|
|
|
|
|
|
func (a *AccessControl) RegisterScopeAttributeResolver(prefix string, resolver accesscontrol.ScopeAttributeResolver) {
|
|
|
|
|
a.resolvers.AddScopeAttributeResolver(prefix, resolver)
|
|
|
|
|
}
|