|
| 1 | +package awsds |
| 2 | + |
| 3 | +import ( |
| 4 | + "context" |
| 5 | + "os" |
| 6 | + "strconv" |
| 7 | + "strings" |
| 8 | + |
| 9 | + "github.com/aws/aws-sdk-go/aws/credentials/stscreds" |
| 10 | + "github.com/grafana/grafana-plugin-sdk-go/backend" |
| 11 | + "github.com/grafana/grafana-plugin-sdk-go/backend/gtime" |
| 12 | + "github.com/grafana/grafana-plugin-sdk-go/backend/proxy" |
| 13 | +) |
| 14 | + |
| 15 | +const ( |
| 16 | + // AllowedAuthProvidersEnvVarKeyName is the string literal for the aws allowed auth providers environment variable key name |
| 17 | + AllowedAuthProvidersEnvVarKeyName = "AWS_AUTH_AllowedAuthProviders" |
| 18 | + |
| 19 | + // AssumeRoleEnabledEnvVarKeyName is the string literal for the aws assume role enabled environment variable key name |
| 20 | + AssumeRoleEnabledEnvVarKeyName = "AWS_AUTH_AssumeRoleEnabled" |
| 21 | + |
| 22 | + // SessionDurationEnvVarKeyName is the string literal for the session duration variable key name |
| 23 | + SessionDurationEnvVarKeyName = "AWS_AUTH_SESSION_DURATION" |
| 24 | + |
| 25 | + // GrafanaAssumeRoleExternalIdKeyName is the string literal for the grafana assume role external id environment variable key name |
| 26 | + GrafanaAssumeRoleExternalIdKeyName = "AWS_AUTH_EXTERNAL_ID" |
| 27 | + |
| 28 | + // GrafanaListMetricsPageLimit is the string literal for the cloudwatch list metrics page limit key name |
| 29 | + GrafanaListMetricsPageLimit = "AWS_CW_LIST_METRICS_PAGE_LIMIT" |
| 30 | + |
| 31 | + defaultAssumeRoleEnabled = true |
| 32 | + defaultListMetricsPageLimit = 500 |
| 33 | + defaultSecureSocksDSProxyEnabled = false |
| 34 | +) |
| 35 | + |
| 36 | +// ReadAuthSettings gets the Grafana auth settings from the context if its available, the environment variables if not |
| 37 | +func ReadAuthSettings(ctx context.Context) *AuthSettings { |
| 38 | + settings, exists := ReadAuthSettingsFromContext(ctx) |
| 39 | + if !exists { |
| 40 | + settings = ReadAuthSettingsFromEnvironmentVariables() |
| 41 | + } |
| 42 | + return settings |
| 43 | +} |
| 44 | + |
| 45 | +func defaultAuthSettings() *AuthSettings { |
| 46 | + return &AuthSettings{ |
| 47 | + AllowedAuthProviders: []string{"default", "keys", "credentials"}, |
| 48 | + AssumeRoleEnabled: defaultAssumeRoleEnabled, |
| 49 | + SessionDuration: &stscreds.DefaultDuration, |
| 50 | + ListMetricsPageLimit: defaultListMetricsPageLimit, |
| 51 | + SecureSocksDSProxyEnabled: defaultSecureSocksDSProxyEnabled, |
| 52 | + } |
| 53 | +} |
| 54 | + |
| 55 | +// ReadAuthSettingsFromContext tries to get the auth settings from the GrafanaConfig in ctx, and returns true if it finds a config |
| 56 | +func ReadAuthSettingsFromContext(ctx context.Context) (*AuthSettings, bool) { |
| 57 | + cfg := backend.GrafanaConfigFromContext(ctx) |
| 58 | + // initialize settings with the default values set |
| 59 | + settings := defaultAuthSettings() |
| 60 | + if cfg == nil { |
| 61 | + return settings, false |
| 62 | + } |
| 63 | + hasSettings := false |
| 64 | + |
| 65 | + if providers := cfg.Get(AllowedAuthProvidersEnvVarKeyName); providers != "" { |
| 66 | + allowedAuthProviders := []string{} |
| 67 | + for _, authProvider := range strings.Split(providers, ",") { |
| 68 | + authProvider = strings.TrimSpace(authProvider) |
| 69 | + if authProvider != "" { |
| 70 | + allowedAuthProviders = append(allowedAuthProviders, authProvider) |
| 71 | + } |
| 72 | + } |
| 73 | + if len(allowedAuthProviders) != 0 { |
| 74 | + settings.AllowedAuthProviders = allowedAuthProviders |
| 75 | + } |
| 76 | + hasSettings = true |
| 77 | + } |
| 78 | + |
| 79 | + if v := cfg.Get(AssumeRoleEnabledEnvVarKeyName); v != "" { |
| 80 | + assumeRoleEnabled, err := strconv.ParseBool(v) |
| 81 | + if err == nil { |
| 82 | + settings.AssumeRoleEnabled = assumeRoleEnabled |
| 83 | + } else { |
| 84 | + backend.Logger.Error("could not parse context variable", "var", AllowedAuthProvidersEnvVarKeyName) |
| 85 | + } |
| 86 | + hasSettings = true |
| 87 | + } |
| 88 | + |
| 89 | + if v := cfg.Get(GrafanaAssumeRoleExternalIdKeyName); v != "" { |
| 90 | + settings.ExternalID = v |
| 91 | + hasSettings = true |
| 92 | + } |
| 93 | + |
| 94 | + if v := cfg.Get(GrafanaListMetricsPageLimit); v != "" { |
| 95 | + listMetricsPageLimit, err := strconv.Atoi(v) |
| 96 | + if err == nil { |
| 97 | + settings.ListMetricsPageLimit = listMetricsPageLimit |
| 98 | + } else { |
| 99 | + backend.Logger.Error("could not parse context variable", "var", GrafanaListMetricsPageLimit) |
| 100 | + } |
| 101 | + hasSettings = true |
| 102 | + } |
| 103 | + |
| 104 | + if v := cfg.Get(proxy.PluginSecureSocksProxyEnabled); v != "" { |
| 105 | + secureSocksDSProxyEnabled, err := strconv.ParseBool(v) |
| 106 | + if err == nil { |
| 107 | + settings.SecureSocksDSProxyEnabled = secureSocksDSProxyEnabled |
| 108 | + } else { |
| 109 | + backend.Logger.Error("could not parse context variable", "var", proxy.PluginSecureSocksProxyEnabled) |
| 110 | + } |
| 111 | + hasSettings = true |
| 112 | + } |
| 113 | + |
| 114 | + // Users set session duration directly as an environment variable |
| 115 | + sessionDurationString := os.Getenv(SessionDurationEnvVarKeyName) |
| 116 | + if sessionDurationString != "" { |
| 117 | + sessionDuration, err := gtime.ParseDuration(sessionDurationString) |
| 118 | + if err == nil { |
| 119 | + settings.SessionDuration = &sessionDuration |
| 120 | + } else { |
| 121 | + backend.Logger.Error("could not parse env variable", "var", SessionDurationEnvVarKeyName) |
| 122 | + } |
| 123 | + } |
| 124 | + |
| 125 | + return settings, hasSettings |
| 126 | +} |
| 127 | + |
| 128 | +// ReadAuthSettingsFromEnvironmentVariables gets the Grafana auth settings from the environment variables |
| 129 | +// Deprecated: Use ReadAuthSettingsFromContext instead |
| 130 | +func ReadAuthSettingsFromEnvironmentVariables() *AuthSettings { |
| 131 | + authSettings := &AuthSettings{} |
| 132 | + allowedAuthProviders := []string{} |
| 133 | + providers := os.Getenv(AllowedAuthProvidersEnvVarKeyName) |
| 134 | + for _, authProvider := range strings.Split(providers, ",") { |
| 135 | + authProvider = strings.TrimSpace(authProvider) |
| 136 | + if authProvider != "" { |
| 137 | + allowedAuthProviders = append(allowedAuthProviders, authProvider) |
| 138 | + } |
| 139 | + } |
| 140 | + |
| 141 | + if len(allowedAuthProviders) == 0 { |
| 142 | + allowedAuthProviders = []string{"default", "keys", "credentials"} |
| 143 | + backend.Logger.Warn("could not find allowed auth providers. falling back to 'default, keys, credentials'") |
| 144 | + } |
| 145 | + authSettings.AllowedAuthProviders = allowedAuthProviders |
| 146 | + |
| 147 | + assumeRoleEnabledString := os.Getenv(AssumeRoleEnabledEnvVarKeyName) |
| 148 | + if len(assumeRoleEnabledString) == 0 { |
| 149 | + backend.Logger.Warn("environment variable missing. falling back to enable assume role", "var", AssumeRoleEnabledEnvVarKeyName) |
| 150 | + assumeRoleEnabledString = "true" |
| 151 | + } |
| 152 | + |
| 153 | + var err error |
| 154 | + authSettings.AssumeRoleEnabled, err = strconv.ParseBool(assumeRoleEnabledString) |
| 155 | + if err != nil { |
| 156 | + backend.Logger.Error("could not parse env variable", "var", AssumeRoleEnabledEnvVarKeyName) |
| 157 | + authSettings.AssumeRoleEnabled = defaultAssumeRoleEnabled |
| 158 | + } |
| 159 | + |
| 160 | + authSettings.ExternalID = os.Getenv(GrafanaAssumeRoleExternalIdKeyName) |
| 161 | + |
| 162 | + listMetricsPageLimitString := os.Getenv(GrafanaListMetricsPageLimit) |
| 163 | + if len(listMetricsPageLimitString) == 0 { |
| 164 | + backend.Logger.Warn("environment variable missing. falling back to default page limit", "var", GrafanaListMetricsPageLimit) |
| 165 | + listMetricsPageLimitString = "500" |
| 166 | + } |
| 167 | + |
| 168 | + authSettings.ListMetricsPageLimit, err = strconv.Atoi(listMetricsPageLimitString) |
| 169 | + if err != nil { |
| 170 | + backend.Logger.Error("could not parse env variable", "var", GrafanaListMetricsPageLimit) |
| 171 | + authSettings.ListMetricsPageLimit = defaultListMetricsPageLimit |
| 172 | + } |
| 173 | + |
| 174 | + sessionDurationString := os.Getenv(SessionDurationEnvVarKeyName) |
| 175 | + if sessionDurationString != "" { |
| 176 | + sessionDuration, err := gtime.ParseDuration(sessionDurationString) |
| 177 | + if err != nil { |
| 178 | + backend.Logger.Error("could not parse env variable", "var", SessionDurationEnvVarKeyName) |
| 179 | + } else { |
| 180 | + authSettings.SessionDuration = &sessionDuration |
| 181 | + } |
| 182 | + } |
| 183 | + |
| 184 | + proxyEnabledString := os.Getenv(proxy.PluginSecureSocksProxyEnabled) |
| 185 | + if len(proxyEnabledString) == 0 { |
| 186 | + backend.Logger.Warn("environment variable missing. falling back to enable assume role", "var", AssumeRoleEnabledEnvVarKeyName) |
| 187 | + proxyEnabledString = "false" |
| 188 | + } |
| 189 | + |
| 190 | + authSettings.SecureSocksDSProxyEnabled, err = strconv.ParseBool(proxyEnabledString) |
| 191 | + if err != nil { |
| 192 | + backend.Logger.Error("could not parse env variable", "var", proxy.PluginSecureSocksProxyEnabled) |
| 193 | + authSettings.SecureSocksDSProxyEnabled = defaultSecureSocksDSProxyEnabled |
| 194 | + } |
| 195 | + |
| 196 | + return authSettings |
| 197 | +} |
0 commit comments