Revamp plugin loading error management (#85939)

This commit is contained in:
Andres Martinez Gotor
2024-04-11 16:18:04 +02:00
committed by GitHub
parent bb56f4a605
commit ab5a065256
17 changed files with 298 additions and 161 deletions

View File

@ -2,6 +2,7 @@ package loader
import ( import (
"context" "context"
"errors"
"sort" "sort"
"strings" "strings"
"time" "time"
@ -13,6 +14,7 @@ import (
"github.com/grafana/grafana/pkg/plugins/manager/pipeline/initialization" "github.com/grafana/grafana/pkg/plugins/manager/pipeline/initialization"
"github.com/grafana/grafana/pkg/plugins/manager/pipeline/termination" "github.com/grafana/grafana/pkg/plugins/manager/pipeline/termination"
"github.com/grafana/grafana/pkg/plugins/manager/pipeline/validation" "github.com/grafana/grafana/pkg/plugins/manager/pipeline/validation"
"github.com/grafana/grafana/pkg/services/pluginsintegration/pluginerrs"
) )
type Loader struct { type Loader struct {
@ -21,21 +23,35 @@ type Loader struct {
initializer initialization.Initializer initializer initialization.Initializer
termination termination.Terminator termination termination.Terminator
validation validation.Validator validation validation.Validator
errorTracker pluginerrs.ErrorTracker
log log.Logger log log.Logger
} }
func New(discovery discovery.Discoverer, bootstrap bootstrap.Bootstrapper, validation validation.Validator, func New(discovery discovery.Discoverer, bootstrap bootstrap.Bootstrapper, validation validation.Validator,
initializer initialization.Initializer, termination termination.Terminator) *Loader { initializer initialization.Initializer, termination termination.Terminator, errorTracker pluginerrs.ErrorTracker) *Loader {
return &Loader{ return &Loader{
discovery: discovery, discovery: discovery,
bootstrap: bootstrap, bootstrap: bootstrap,
validation: validation, validation: validation,
initializer: initializer, initializer: initializer,
termination: termination, termination: termination,
errorTracker: errorTracker,
log: log.New("plugin.loader"), log: log.New("plugin.loader"),
} }
} }
func (l *Loader) recordError(ctx context.Context, p *plugins.Plugin, err error) {
var pErr *plugins.Error
if errors.As(err, &pErr) {
l.errorTracker.Record(ctx, pErr)
return
}
l.errorTracker.Record(ctx, &plugins.Error{
PluginID: p.ID,
ErrorCode: plugins.ErrorCode(err.Error()),
})
}
func (l *Loader) Load(ctx context.Context, src plugins.PluginSource) ([]*plugins.Plugin, error) { func (l *Loader) Load(ctx context.Context, src plugins.PluginSource) ([]*plugins.Plugin, error) {
end := l.instrumentLoad(ctx, src) end := l.instrumentLoad(ctx, src)
@ -48,7 +64,10 @@ func (l *Loader) Load(ctx context.Context, src plugins.PluginSource) ([]*plugins
for _, foundBundle := range discoveredPlugins { for _, foundBundle := range discoveredPlugins {
bootstrappedPlugin, err := l.bootstrap.Bootstrap(ctx, src, foundBundle) bootstrappedPlugin, err := l.bootstrap.Bootstrap(ctx, src, foundBundle)
if err != nil { if err != nil {
// TODO: Add error to registry l.errorTracker.Record(ctx, &plugins.Error{
PluginID: foundBundle.Primary.JSONData.ID,
ErrorCode: plugins.ErrorCode(err.Error()),
})
continue continue
} }
bootstrappedPlugins = append(bootstrappedPlugins, bootstrappedPlugin...) bootstrappedPlugins = append(bootstrappedPlugins, bootstrappedPlugin...)
@ -58,7 +77,7 @@ func (l *Loader) Load(ctx context.Context, src plugins.PluginSource) ([]*plugins
for _, bootstrappedPlugin := range bootstrappedPlugins { for _, bootstrappedPlugin := range bootstrappedPlugins {
err := l.validation.Validate(ctx, bootstrappedPlugin) err := l.validation.Validate(ctx, bootstrappedPlugin)
if err != nil { if err != nil {
// TODO: Add error to registry l.recordError(ctx, bootstrappedPlugin, err)
continue continue
} }
validatedPlugins = append(validatedPlugins, bootstrappedPlugin) validatedPlugins = append(validatedPlugins, bootstrappedPlugin)
@ -68,12 +87,17 @@ func (l *Loader) Load(ctx context.Context, src plugins.PluginSource) ([]*plugins
for _, validatedPlugin := range validatedPlugins { for _, validatedPlugin := range validatedPlugins {
initializedPlugin, err := l.initializer.Initialize(ctx, validatedPlugin) initializedPlugin, err := l.initializer.Initialize(ctx, validatedPlugin)
if err != nil { if err != nil {
// TODO: Add error to registry l.recordError(ctx, validatedPlugin, err)
continue continue
} }
initializedPlugins = append(initializedPlugins, initializedPlugin) initializedPlugins = append(initializedPlugins, initializedPlugin)
} }
// Clean errors from registry for initialized plugins
for _, p := range initializedPlugins {
l.errorTracker.Clear(ctx, p.ID)
}
end(initializedPlugins) end(initializedPlugins)
return initializedPlugins, nil return initializedPlugins, nil

View File

@ -21,6 +21,7 @@ import (
"github.com/grafana/grafana/pkg/plugins/manager/pipeline/validation" "github.com/grafana/grafana/pkg/plugins/manager/pipeline/validation"
"github.com/grafana/grafana/pkg/plugins/manager/sources" "github.com/grafana/grafana/pkg/plugins/manager/sources"
"github.com/grafana/grafana/pkg/services/org" "github.com/grafana/grafana/pkg/services/org"
"github.com/grafana/grafana/pkg/services/pluginsintegration/pluginerrs"
) )
var compareOpts = []cmp.Option{cmpopts.IgnoreFields(plugins.Plugin{}, "client", "log", "mu"), fsComparer} var compareOpts = []cmp.Option{cmpopts.IgnoreFields(plugins.Plugin{}, "client", "log", "mu"), fsComparer}
@ -408,10 +409,11 @@ func TestLoader_Load(t *testing.T) {
t.Run(tt.name, func(t *testing.T) { t.Run(tt.name, func(t *testing.T) {
terminationStage, err := termination.New(tt.cfg, termination.Opts{}) terminationStage, err := termination.New(tt.cfg, termination.Opts{})
require.NoError(t, err) require.NoError(t, err)
et := pluginerrs.ProvideErrorTracker()
l := New(discovery.New(tt.cfg, discovery.Opts{}), bootstrap.New(tt.cfg, bootstrap.Opts{}), l := New(discovery.New(tt.cfg, discovery.Opts{}), bootstrap.New(tt.cfg, bootstrap.Opts{}),
validation.New(tt.cfg, validation.Opts{}), initialization.New(tt.cfg, initialization.Opts{}), validation.New(tt.cfg, validation.Opts{}), initialization.New(tt.cfg, initialization.Opts{}),
terminationStage) terminationStage, et)
got, err := l.Load(context.Background(), sources.NewLocalSource(tt.class, tt.pluginPaths)) got, err := l.Load(context.Background(), sources.NewLocalSource(tt.class, tt.pluginPaths))
require.NoError(t, err) require.NoError(t, err)
@ -433,6 +435,7 @@ func TestLoader_Load(t *testing.T) {
return plugins.Signature{}, false return plugins.Signature{}, false
}, },
} }
et := pluginerrs.ProvideErrorTracker()
pluginJSON := plugins.JSONData{ID: "test-datasource", Type: plugins.TypeDataSource, Info: plugins.Info{Version: "1.0.0"}} pluginJSON := plugins.JSONData{ID: "test-datasource", Type: plugins.TypeDataSource, Info: plugins.Info{Version: "1.0.0"}}
plugin := &plugins.Plugin{ plugin := &plugins.Plugin{
JSONData: pluginJSON, JSONData: pluginJSON,
@ -469,17 +472,139 @@ func TestLoader_Load(t *testing.T) {
steps = append(steps, "initialize") steps = append(steps, "initialize")
return ps, nil return ps, nil
}, },
}, &fakes.FakeTerminator{}) }, &fakes.FakeTerminator{}, et)
got, err := l.Load(context.Background(), src) got, err := l.Load(context.Background(), src)
require.NoError(t, err) require.NoError(t, err)
require.Equal(t, []*plugins.Plugin{plugin}, got) require.Equal(t, []*plugins.Plugin{plugin}, got)
require.Equal(t, []string{"discover", "bootstrap", "validate", "initialize"}, steps) require.Equal(t, []string{"discover", "bootstrap", "validate", "initialize"}, steps)
}) })
t.Run("With error", func(t *testing.T) {
src := &fakes.FakePluginSource{
PluginClassFunc: func(ctx context.Context) plugins.Class {
return plugins.ClassExternal
},
PluginURIsFunc: func(ctx context.Context) []string {
return []string{"http://example.com"}
},
DefaultSignatureFunc: func(ctx context.Context) (plugins.Signature, bool) {
return plugins.Signature{}, false
},
}
et := pluginerrs.ProvideErrorTracker()
pluginJSON := plugins.JSONData{ID: "test-datasource", Type: plugins.TypeDataSource, Info: plugins.Info{Version: "1.0.0"}}
plugin := &plugins.Plugin{
JSONData: pluginJSON,
Signature: plugins.SignatureStatusValid,
SignatureType: plugins.SignatureTypeCommunity,
FS: plugins.NewFakeFS(),
}
var steps []string
l := New(
&fakes.FakeDiscoverer{
DiscoverFunc: func(ctx context.Context, s plugins.PluginSource) ([]*plugins.FoundBundle, error) {
require.Equal(t, src, s)
steps = append(steps, "discover")
return []*plugins.FoundBundle{{Primary: plugins.FoundPlugin{JSONData: pluginJSON}}}, nil
},
}, &fakes.FakeBootstrapper{
BootstrapFunc: func(ctx context.Context, s plugins.PluginSource, b *plugins.FoundBundle) ([]*plugins.Plugin, error) {
require.Equal(t, b.Primary.JSONData, pluginJSON)
require.Equal(t, src, s)
steps = append(steps, "bootstrap")
return []*plugins.Plugin{plugin}, nil
},
}, &fakes.FakeValidator{ValidateFunc: func(ctx context.Context, ps *plugins.Plugin) error {
require.Equal(t, plugin, ps)
steps = append(steps, "validate")
return errors.New("validation error")
}},
&fakes.FakeInitializer{
IntializeFunc: func(ctx context.Context, ps *plugins.Plugin) (*plugins.Plugin, error) {
require.Equal(t, ps.JSONData, pluginJSON)
steps = append(steps, "initialize")
return ps, nil
},
}, &fakes.FakeTerminator{}, et)
got, err := l.Load(context.Background(), src)
require.NoError(t, err)
require.Equal(t, []*plugins.Plugin{}, got)
// Initialize should not be executed if validation fails
require.Equal(t, []string{"discover", "bootstrap", "validate"}, steps)
errs := et.Errors(context.Background())
require.Len(t, errs, 1)
require.ErrorContains(t, errs[0], "validation error")
})
t.Run("Cleans up a previous error", func(t *testing.T) {
src := &fakes.FakePluginSource{
PluginClassFunc: func(ctx context.Context) plugins.Class {
return plugins.ClassExternal
},
PluginURIsFunc: func(ctx context.Context) []string {
return []string{"http://example.com"}
},
DefaultSignatureFunc: func(ctx context.Context) (plugins.Signature, bool) {
return plugins.Signature{}, false
},
}
et := pluginerrs.ProvideErrorTracker()
pluginJSON := plugins.JSONData{ID: "test-datasource", Type: plugins.TypeDataSource, Info: plugins.Info{Version: "1.0.0"}}
plugin := &plugins.Plugin{
JSONData: pluginJSON,
Signature: plugins.SignatureStatusValid,
SignatureType: plugins.SignatureTypeCommunity,
FS: plugins.NewFakeFS(),
}
et.Record(context.Background(), &plugins.Error{PluginID: "test-datasource", ErrorCode: plugins.ErrorCode("previous error")})
var steps []string
l := New(
&fakes.FakeDiscoverer{
DiscoverFunc: func(ctx context.Context, s plugins.PluginSource) ([]*plugins.FoundBundle, error) {
require.Equal(t, src, s)
steps = append(steps, "discover")
return []*plugins.FoundBundle{{Primary: plugins.FoundPlugin{JSONData: pluginJSON}}}, nil
},
}, &fakes.FakeBootstrapper{
BootstrapFunc: func(ctx context.Context, s plugins.PluginSource, b *plugins.FoundBundle) ([]*plugins.Plugin, error) {
require.Equal(t, b.Primary.JSONData, pluginJSON)
require.Equal(t, src, s)
steps = append(steps, "bootstrap")
return []*plugins.Plugin{plugin}, nil
},
}, &fakes.FakeValidator{ValidateFunc: func(ctx context.Context, ps *plugins.Plugin) error {
require.Equal(t, plugin, ps)
steps = append(steps, "validate")
return nil
}},
&fakes.FakeInitializer{
IntializeFunc: func(ctx context.Context, ps *plugins.Plugin) (*plugins.Plugin, error) {
require.Equal(t, ps.JSONData, pluginJSON)
steps = append(steps, "initialize")
return ps, nil
},
}, &fakes.FakeTerminator{}, et)
got, err := l.Load(context.Background(), src)
require.NoError(t, err)
require.Equal(t, []*plugins.Plugin{plugin}, got)
require.Equal(t, []string{"discover", "bootstrap", "validate", "initialize"}, steps)
errs := et.Errors(context.Background())
require.Len(t, errs, 0)
})
} }
func TestLoader_Unload(t *testing.T) { func TestLoader_Unload(t *testing.T) {
t.Run("Termination stage error is returned from Unload", func(t *testing.T) { t.Run("Termination stage error is returned from Unload", func(t *testing.T) {
et := pluginerrs.ProvideErrorTracker()
plugin := &plugins.Plugin{ plugin := &plugins.Plugin{
JSONData: plugins.JSONData{ID: "test-datasource", Type: plugins.TypeDataSource, Info: plugins.Info{Version: "1.0.0"}}, JSONData: plugins.JSONData{ID: "test-datasource", Type: plugins.TypeDataSource, Info: plugins.Info{Version: "1.0.0"}},
} }
@ -504,7 +629,7 @@ func TestLoader_Unload(t *testing.T) {
require.Equal(t, plugin, p) require.Equal(t, plugin, p)
return p, tc.expectedErr return p, tc.expectedErr
}, },
}) }, et)
_, err := l.Unload(context.Background(), plugin) _, err := l.Unload(context.Background(), plugin)
require.ErrorIs(t, err, tc.expectedErr) require.ErrorIs(t, err, tc.expectedErr)

View File

@ -20,7 +20,7 @@ func ProvideService() *Service {
} }
func (s *Service) Start(ctx context.Context, p *plugins.Plugin) error { func (s *Service) Start(ctx context.Context, p *plugins.Plugin) error {
if !p.IsManaged() || !p.Backend || p.SignatureError != nil { if !p.IsManaged() || !p.Backend || p.Error != nil {
return nil return nil
} }

View File

@ -23,7 +23,7 @@ func TestProcessManager_Start(t *testing.T) {
name string name string
managed bool managed bool
backend bool backend bool
signatureError *plugins.SignatureError Error *plugins.Error
expectedStartCount int expectedStartCount int
}{ }{
{ {
@ -42,7 +42,7 @@ func TestProcessManager_Start(t *testing.T) {
name: "Managed backend plugin with signature error will not be started", name: "Managed backend plugin with signature error will not be started",
managed: true, managed: true,
backend: true, backend: true,
signatureError: &plugins.SignatureError{ Error: &plugins.Error{
SignatureStatus: plugins.SignatureStatusUnsigned, SignatureStatus: plugins.SignatureStatusUnsigned,
}, },
expectedStartCount: 0, expectedStartCount: 0,
@ -65,7 +65,7 @@ func TestProcessManager_Start(t *testing.T) {
bp := fakes.NewFakeBackendPlugin(tc.managed) bp := fakes.NewFakeBackendPlugin(tc.managed)
p := createPlugin(t, bp, func(plugin *plugins.Plugin) { p := createPlugin(t, bp, func(plugin *plugins.Plugin) {
plugin.Backend = tc.backend plugin.Backend = tc.backend
plugin.SignatureError = tc.signatureError plugin.Error = tc.Error
}) })
m := ProvideService() m := ProvideService()

View File

@ -57,7 +57,7 @@ func (s *Validation) ValidateSignature(plugin *plugins.Plugin) error {
case plugins.SignatureStatusUnsigned: case plugins.SignatureStatusUnsigned:
if authorized := s.authorizer.CanLoadPlugin(plugin); !authorized { if authorized := s.authorizer.CanLoadPlugin(plugin); !authorized {
s.log.Debug("Plugin is unsigned", "pluginId", plugin.ID) s.log.Debug("Plugin is unsigned", "pluginId", plugin.ID)
return &plugins.SignatureError{ return &plugins.Error{
PluginID: plugin.ID, PluginID: plugin.ID,
SignatureStatus: plugins.SignatureStatusUnsigned, SignatureStatus: plugins.SignatureStatusUnsigned,
} }
@ -66,20 +66,20 @@ func (s *Validation) ValidateSignature(plugin *plugins.Plugin) error {
return nil return nil
case plugins.SignatureStatusInvalid: case plugins.SignatureStatusInvalid:
s.log.Debug("Plugin has an invalid signature", "pluginId", plugin.ID) s.log.Debug("Plugin has an invalid signature", "pluginId", plugin.ID)
return &plugins.SignatureError{ return &plugins.Error{
PluginID: plugin.ID, PluginID: plugin.ID,
SignatureStatus: plugins.SignatureStatusInvalid, SignatureStatus: plugins.SignatureStatusInvalid,
} }
case plugins.SignatureStatusModified: case plugins.SignatureStatusModified:
s.log.Debug("Plugin has a modified signature", "pluginId", plugin.ID) s.log.Debug("Plugin has a modified signature", "pluginId", plugin.ID)
return &plugins.SignatureError{ return &plugins.Error{
PluginID: plugin.ID, PluginID: plugin.ID,
SignatureStatus: plugins.SignatureStatusModified, SignatureStatus: plugins.SignatureStatusModified,
} }
default: default:
s.log.Debug("Plugin has an unrecognized plugin signature state", "pluginId", plugin.ID, "signature", s.log.Debug("Plugin has an unrecognized plugin signature state", "pluginId", plugin.ID, "signature",
plugin.Signature) plugin.Signature)
return &plugins.SignatureError{ return &plugins.Error{
PluginID: plugin.ID, PluginID: plugin.ID,
} }
} }

View File

@ -39,41 +39,6 @@ func (e DuplicateError) Is(err error) bool {
return ok return ok
} }
type SignatureError struct {
PluginID string `json:"pluginId"`
SignatureStatus SignatureStatus `json:"status"`
}
func (e SignatureError) Error() string {
switch e.SignatureStatus {
case SignatureStatusInvalid:
return fmt.Sprintf("plugin '%s' has an invalid signature", e.PluginID)
case SignatureStatusModified:
return fmt.Sprintf("plugin '%s' has an modified signature", e.PluginID)
case SignatureStatusUnsigned:
return fmt.Sprintf("plugin '%s' has no signature", e.PluginID)
case SignatureStatusInternal, SignatureStatusValid:
return ""
}
return fmt.Sprintf("plugin '%s' has an unknown signature state", e.PluginID)
}
func (e SignatureError) AsErrorCode() ErrorCode {
switch e.SignatureStatus {
case SignatureStatusInvalid:
return errorCodeSignatureInvalid
case SignatureStatusModified:
return errorCodeSignatureModified
case SignatureStatusUnsigned:
return errorCodeSignatureMissing
case SignatureStatusInternal, SignatureStatusValid:
return ""
}
return ""
}
type Dependencies struct { type Dependencies struct {
GrafanaDependency string `json:"grafanaDependency"` GrafanaDependency string `json:"grafanaDependency"`
GrafanaVersion string `json:"grafanaVersion"` GrafanaVersion string `json:"grafanaVersion"`
@ -280,6 +245,39 @@ type ErrorCode string
type Error struct { type Error struct {
ErrorCode `json:"errorCode"` ErrorCode `json:"errorCode"`
PluginID string `json:"pluginId,omitempty"` PluginID string `json:"pluginId,omitempty"`
SignatureStatus SignatureStatus `json:"status,omitempty"`
}
func (e Error) Error() string {
if e.SignatureStatus != "" {
switch e.SignatureStatus {
case SignatureStatusInvalid:
return fmt.Sprintf("plugin '%s' has an invalid signature", e.PluginID)
case SignatureStatusModified:
return fmt.Sprintf("plugin '%s' has an modified signature", e.PluginID)
case SignatureStatusUnsigned:
return fmt.Sprintf("plugin '%s' has no signature", e.PluginID)
case SignatureStatusInternal, SignatureStatusValid:
return ""
}
}
return fmt.Sprintf("plugin '%s' failed: %s", e.PluginID, e.ErrorCode)
}
func (e Error) AsErrorCode() ErrorCode {
switch e.SignatureStatus {
case SignatureStatusInvalid:
return errorCodeSignatureInvalid
case SignatureStatusModified:
return errorCodeSignatureModified
case SignatureStatusUnsigned:
return errorCodeSignatureMissing
case SignatureStatusInternal, SignatureStatusValid:
return ""
}
return ""
} }
// Access-Control related definitions // Access-Control related definitions

View File

@ -49,7 +49,7 @@ type Plugin struct {
SignatureOrg string SignatureOrg string
Parent *Plugin Parent *Plugin
Children []*Plugin Children []*Plugin
SignatureError *SignatureError Error *Error
// SystemJS fields // SystemJS fields
Module string Module string

View File

@ -6,33 +6,33 @@ import (
"github.com/grafana/grafana/pkg/plugins" "github.com/grafana/grafana/pkg/plugins"
) )
type fakeSignatureErrorTracker struct { type fakeErrorTracker struct {
RecordFunc func(ctx context.Context, err *plugins.SignatureError) RecordFunc func(ctx context.Context, err *plugins.Error)
ClearFunc func(ctx context.Context, pluginID string) ClearFunc func(ctx context.Context, pluginID string)
SignatureErrorsFunc func(ctx context.Context) []*plugins.SignatureError ErrorsFunc func(ctx context.Context) []*plugins.Error
} }
func newFakeSignatureErrorTracker() *fakeSignatureErrorTracker { func newFakeErrorTracker() *fakeErrorTracker {
return &fakeSignatureErrorTracker{} return &fakeErrorTracker{}
} }
func (t *fakeSignatureErrorTracker) Record(ctx context.Context, err *plugins.SignatureError) { func (t *fakeErrorTracker) Record(ctx context.Context, err *plugins.Error) {
if t.RecordFunc != nil { if t.RecordFunc != nil {
t.RecordFunc(ctx, err) t.RecordFunc(ctx, err)
return return
} }
} }
func (t *fakeSignatureErrorTracker) Clear(ctx context.Context, pluginID string) { func (t *fakeErrorTracker) Clear(ctx context.Context, pluginID string) {
if t.ClearFunc != nil { if t.ClearFunc != nil {
t.ClearFunc(ctx, pluginID) t.ClearFunc(ctx, pluginID)
return return
} }
} }
func (t *fakeSignatureErrorTracker) SignatureErrors(ctx context.Context) []*plugins.SignatureError { func (t *fakeErrorTracker) Errors(ctx context.Context) []*plugins.Error {
if t.SignatureErrorsFunc != nil { if t.ErrorsFunc != nil {
return t.SignatureErrorsFunc(ctx) return t.ErrorsFunc(ctx)
} }
return nil return nil
} }

View File

@ -10,6 +10,7 @@ import (
"github.com/grafana/grafana/pkg/plugins/manager/pipeline/initialization" "github.com/grafana/grafana/pkg/plugins/manager/pipeline/initialization"
"github.com/grafana/grafana/pkg/plugins/manager/pipeline/termination" "github.com/grafana/grafana/pkg/plugins/manager/pipeline/termination"
"github.com/grafana/grafana/pkg/plugins/manager/pipeline/validation" "github.com/grafana/grafana/pkg/plugins/manager/pipeline/validation"
"github.com/grafana/grafana/pkg/services/pluginsintegration/pluginerrs"
) )
var _ pluginsLoader.Service = (*Loader)(nil) var _ pluginsLoader.Service = (*Loader)(nil)
@ -19,10 +20,10 @@ type Loader struct {
} }
func ProvideService(discovery discovery.Discoverer, bootstrap bootstrap.Bootstrapper, validation validation.Validator, func ProvideService(discovery discovery.Discoverer, bootstrap bootstrap.Bootstrapper, validation validation.Validator,
initializer initialization.Initializer, termination termination.Terminator, initializer initialization.Initializer, termination termination.Terminator, errorTracker pluginerrs.ErrorTracker,
) *Loader { ) *Loader {
return &Loader{ return &Loader{
loader: pluginsLoader.New(discovery, bootstrap, validation, initializer, termination), loader: pluginsLoader.New(discovery, bootstrap, validation, initializer, termination, errorTracker),
} }
} }

View File

@ -63,7 +63,7 @@ func TestLoader_Load(t *testing.T) {
cfg *config.PluginManagementCfg cfg *config.PluginManagementCfg
pluginPaths []string pluginPaths []string
want []*plugins.Plugin want []*plugins.Plugin
pluginErrors map[string]*plugins.SignatureError pluginErrors map[string]*plugins.Error
}{ }{
{ {
name: "Load a Core plugin", name: "Load a Core plugin",
@ -279,7 +279,7 @@ func TestLoader_Load(t *testing.T) {
cfg: &config.PluginManagementCfg{}, cfg: &config.PluginManagementCfg{},
pluginPaths: []string{filepath.Join(testDataDir(t), "unsigned-datasource")}, pluginPaths: []string{filepath.Join(testDataDir(t), "unsigned-datasource")},
want: []*plugins.Plugin{}, want: []*plugins.Plugin{},
pluginErrors: map[string]*plugins.SignatureError{ pluginErrors: map[string]*plugins.Error{
"test-datasource": { "test-datasource": {
PluginID: "test-datasource", PluginID: "test-datasource",
SignatureStatus: plugins.SignatureStatusUnsigned, SignatureStatus: plugins.SignatureStatusUnsigned,
@ -331,7 +331,7 @@ func TestLoader_Load(t *testing.T) {
cfg: &config.PluginManagementCfg{}, cfg: &config.PluginManagementCfg{},
pluginPaths: []string{filepath.Join(testDataDir(t), "lacking-files")}, pluginPaths: []string{filepath.Join(testDataDir(t), "lacking-files")},
want: []*plugins.Plugin{}, want: []*plugins.Plugin{},
pluginErrors: map[string]*plugins.SignatureError{ pluginErrors: map[string]*plugins.Error{
"test-datasource": { "test-datasource": {
PluginID: "test-datasource", PluginID: "test-datasource",
SignatureStatus: plugins.SignatureStatusInvalid, SignatureStatus: plugins.SignatureStatusInvalid,
@ -346,7 +346,7 @@ func TestLoader_Load(t *testing.T) {
}, },
pluginPaths: []string{filepath.Join(testDataDir(t), "lacking-files")}, pluginPaths: []string{filepath.Join(testDataDir(t), "lacking-files")},
want: []*plugins.Plugin{}, want: []*plugins.Plugin{},
pluginErrors: map[string]*plugins.SignatureError{ pluginErrors: map[string]*plugins.Error{
"test-datasource": { "test-datasource": {
PluginID: "test-datasource", PluginID: "test-datasource",
SignatureStatus: plugins.SignatureStatusInvalid, SignatureStatus: plugins.SignatureStatusInvalid,
@ -361,7 +361,7 @@ func TestLoader_Load(t *testing.T) {
}, },
pluginPaths: []string{filepath.Join(testDataDir(t), "invalid-v2-missing-file")}, pluginPaths: []string{filepath.Join(testDataDir(t), "invalid-v2-missing-file")},
want: []*plugins.Plugin{}, want: []*plugins.Plugin{},
pluginErrors: map[string]*plugins.SignatureError{ pluginErrors: map[string]*plugins.Error{
"test-datasource": { "test-datasource": {
PluginID: "test-datasource", PluginID: "test-datasource",
SignatureStatus: plugins.SignatureStatusModified, SignatureStatus: plugins.SignatureStatusModified,
@ -376,7 +376,7 @@ func TestLoader_Load(t *testing.T) {
}, },
pluginPaths: []string{filepath.Join(testDataDir(t), "invalid-v2-extra-file")}, pluginPaths: []string{filepath.Join(testDataDir(t), "invalid-v2-extra-file")},
want: []*plugins.Plugin{}, want: []*plugins.Plugin{},
pluginErrors: map[string]*plugins.SignatureError{ pluginErrors: map[string]*plugins.Error{
"test-datasource": { "test-datasource": {
PluginID: "test-datasource", PluginID: "test-datasource",
SignatureStatus: plugins.SignatureStatusModified, SignatureStatus: plugins.SignatureStatusModified,
@ -439,7 +439,7 @@ func TestLoader_Load(t *testing.T) {
reg := fakes.NewFakePluginRegistry() reg := fakes.NewFakePluginRegistry()
procPrvdr := fakes.NewFakeBackendProcessProvider() procPrvdr := fakes.NewFakeBackendProcessProvider()
procMgr := fakes.NewFakeProcessManager() procMgr := fakes.NewFakeProcessManager()
errTracker := pluginerrs.ProvideSignatureErrorTracker() errTracker := pluginerrs.ProvideErrorTracker()
l := newLoader(t, tt.cfg, reg, procMgr, procPrvdr, errTracker) l := newLoader(t, tt.cfg, reg, procMgr, procPrvdr, errTracker)
t.Run(tt.name, func(t *testing.T) { t.Run(tt.name, func(t *testing.T) {
@ -449,7 +449,7 @@ func TestLoader_Load(t *testing.T) {
t.Fatalf("Result mismatch (-want +got):\n%s", cmp.Diff(got, tt.want, compareOpts...)) t.Fatalf("Result mismatch (-want +got):\n%s", cmp.Diff(got, tt.want, compareOpts...))
} }
pluginErrs := errTracker.SignatureErrors(context.Background()) pluginErrs := errTracker.Errors(context.Background())
require.Equal(t, len(tt.pluginErrors), len(pluginErrs)) require.Equal(t, len(tt.pluginErrors), len(pluginErrs))
for _, pluginErr := range pluginErrs { for _, pluginErr := range pluginErrs {
require.Equal(t, tt.pluginErrors[pluginErr.PluginID], pluginErr) require.Equal(t, tt.pluginErrors[pluginErr.PluginID], pluginErr)
@ -603,7 +603,7 @@ func TestLoader_Load_CustomSource(t *testing.T) {
Module: "https://cdn.example.com/grafana-worldmap-panel/0.3.3/public/plugins/grafana-worldmap-panel/module.js", Module: "https://cdn.example.com/grafana-worldmap-panel/0.3.3/public/plugins/grafana-worldmap-panel/module.js",
}} }}
l := newLoader(t, cfg, fakes.NewFakePluginRegistry(), fakes.NewFakeProcessManager(), fakes.NewFakeBackendProcessProvider(), newFakeSignatureErrorTracker()) l := newLoader(t, cfg, fakes.NewFakePluginRegistry(), fakes.NewFakeProcessManager(), fakes.NewFakeBackendProcessProvider(), newFakeErrorTracker())
got, err := l.Load(context.Background(), &fakes.FakePluginSource{ got, err := l.Load(context.Background(), &fakes.FakePluginSource{
PluginClassFunc: func(ctx context.Context) plugins.Class { PluginClassFunc: func(ctx context.Context) plugins.Class {
return plugins.ClassBundled return plugins.ClassBundled
@ -633,7 +633,7 @@ func TestLoader_Load_MultiplePlugins(t *testing.T) {
pluginPaths []string pluginPaths []string
existingPlugins map[string]struct{} existingPlugins map[string]struct{}
want []*plugins.Plugin want []*plugins.Plugin
pluginErrors map[string]*plugins.SignatureError pluginErrors map[string]*plugins.Error
}{ }{
{ {
name: "Load multiple plugins (broken, valid, unsigned)", name: "Load multiple plugins (broken, valid, unsigned)",
@ -680,7 +680,7 @@ func TestLoader_Load_MultiplePlugins(t *testing.T) {
SignatureOrg: "Will Browne", SignatureOrg: "Will Browne",
}, },
}, },
pluginErrors: map[string]*plugins.SignatureError{ pluginErrors: map[string]*plugins.Error{
"test-panel": { "test-panel": {
PluginID: "test-panel", PluginID: "test-panel",
SignatureStatus: plugins.SignatureStatusUnsigned, SignatureStatus: plugins.SignatureStatusUnsigned,
@ -693,7 +693,7 @@ func TestLoader_Load_MultiplePlugins(t *testing.T) {
reg := fakes.NewFakePluginRegistry() reg := fakes.NewFakePluginRegistry()
procPrvdr := fakes.NewFakeBackendProcessProvider() procPrvdr := fakes.NewFakeBackendProcessProvider()
procMgr := fakes.NewFakeProcessManager() procMgr := fakes.NewFakeProcessManager()
errTracker := pluginerrs.ProvideSignatureErrorTracker() errTracker := pluginerrs.ProvideErrorTracker()
l := newLoader(t, tt.cfg, reg, procMgr, procPrvdr, errTracker) l := newLoader(t, tt.cfg, reg, procMgr, procPrvdr, errTracker)
t.Run(tt.name, func(t *testing.T) { t.Run(tt.name, func(t *testing.T) {
@ -712,7 +712,7 @@ func TestLoader_Load_MultiplePlugins(t *testing.T) {
if !cmp.Equal(got, tt.want, compareOpts...) { if !cmp.Equal(got, tt.want, compareOpts...) {
t.Fatalf("Result mismatch (-want +got):\n%s", cmp.Diff(got, tt.want, compareOpts...)) t.Fatalf("Result mismatch (-want +got):\n%s", cmp.Diff(got, tt.want, compareOpts...))
} }
pluginErrs := errTracker.SignatureErrors(context.Background()) pluginErrs := errTracker.Errors(context.Background())
require.Equal(t, len(tt.pluginErrors), len(pluginErrs)) require.Equal(t, len(tt.pluginErrors), len(pluginErrs))
for _, pluginErr := range pluginErrs { for _, pluginErr := range pluginErrs {
require.Equal(t, tt.pluginErrors[pluginErr.PluginID], pluginErr) require.Equal(t, tt.pluginErrors[pluginErr.PluginID], pluginErr)
@ -796,7 +796,7 @@ func TestLoader_Load_RBACReady(t *testing.T) {
reg := fakes.NewFakePluginRegistry() reg := fakes.NewFakePluginRegistry()
procPrvdr := fakes.NewFakeBackendProcessProvider() procPrvdr := fakes.NewFakeBackendProcessProvider()
procMgr := fakes.NewFakeProcessManager() procMgr := fakes.NewFakeProcessManager()
l := newLoader(t, tt.cfg, reg, procMgr, procPrvdr, newFakeSignatureErrorTracker()) l := newLoader(t, tt.cfg, reg, procMgr, procPrvdr, newFakeErrorTracker())
got, err := l.Load(context.Background(), &fakes.FakePluginSource{ got, err := l.Load(context.Background(), &fakes.FakePluginSource{
PluginClassFunc: func(ctx context.Context) plugins.Class { PluginClassFunc: func(ctx context.Context) plugins.Class {
@ -854,7 +854,7 @@ func TestLoader_Load_Signature_RootURL(t *testing.T) {
procPrvdr := fakes.NewFakeBackendProcessProvider() procPrvdr := fakes.NewFakeBackendProcessProvider()
procMgr := fakes.NewFakeProcessManager() procMgr := fakes.NewFakeProcessManager()
cfg := &config.PluginManagementCfg{GrafanaAppURL: defaultAppURL} cfg := &config.PluginManagementCfg{GrafanaAppURL: defaultAppURL}
l := newLoader(t, cfg, reg, procMgr, procPrvdr, newFakeSignatureErrorTracker()) l := newLoader(t, cfg, reg, procMgr, procPrvdr, newFakeErrorTracker())
got, err := l.Load(context.Background(), &fakes.FakePluginSource{ got, err := l.Load(context.Background(), &fakes.FakePluginSource{
PluginClassFunc: func(ctx context.Context) plugins.Class { PluginClassFunc: func(ctx context.Context) plugins.Class {
return plugins.ClassExternal return plugins.ClassExternal
@ -931,7 +931,7 @@ func TestLoader_Load_DuplicatePlugins(t *testing.T) {
procPrvdr := fakes.NewFakeBackendProcessProvider() procPrvdr := fakes.NewFakeBackendProcessProvider()
procMgr := fakes.NewFakeProcessManager() procMgr := fakes.NewFakeProcessManager()
cfg := &config.PluginManagementCfg{} cfg := &config.PluginManagementCfg{}
l := newLoader(t, cfg, reg, procMgr, procPrvdr, newFakeSignatureErrorTracker()) l := newLoader(t, cfg, reg, procMgr, procPrvdr, newFakeErrorTracker())
got, err := l.Load(context.Background(), &fakes.FakePluginSource{ got, err := l.Load(context.Background(), &fakes.FakePluginSource{
PluginClassFunc: func(ctx context.Context) plugins.Class { PluginClassFunc: func(ctx context.Context) plugins.Class {
return plugins.ClassExternal return plugins.ClassExternal
@ -1021,7 +1021,7 @@ func TestLoader_Load_SkipUninitializedPlugins(t *testing.T) {
} }
procMgr := fakes.NewFakeProcessManager() procMgr := fakes.NewFakeProcessManager()
cfg := &config.PluginManagementCfg{} cfg := &config.PluginManagementCfg{}
l := newLoader(t, cfg, reg, procMgr, procPrvdr, newFakeSignatureErrorTracker()) l := newLoader(t, cfg, reg, procMgr, procPrvdr, newFakeErrorTracker())
got, err := l.Load(context.Background(), &fakes.FakePluginSource{ got, err := l.Load(context.Background(), &fakes.FakePluginSource{
PluginClassFunc: func(ctx context.Context) plugins.Class { PluginClassFunc: func(ctx context.Context) plugins.Class {
return plugins.ClassExternal return plugins.ClassExternal
@ -1255,7 +1255,7 @@ func TestLoader_Load_NestedPlugins(t *testing.T) {
procMgr := fakes.NewFakeProcessManager() procMgr := fakes.NewFakeProcessManager()
reg := fakes.NewFakePluginRegistry() reg := fakes.NewFakePluginRegistry()
cfg := &config.PluginManagementCfg{} cfg := &config.PluginManagementCfg{}
l := newLoader(t, cfg, reg, procMgr, procPrvdr, newFakeSignatureErrorTracker()) l := newLoader(t, cfg, reg, procMgr, procPrvdr, newFakeErrorTracker())
got, err := l.Load(context.Background(), &fakes.FakePluginSource{ got, err := l.Load(context.Background(), &fakes.FakePluginSource{
PluginClassFunc: func(ctx context.Context) plugins.Class { PluginClassFunc: func(ctx context.Context) plugins.Class {
@ -1432,7 +1432,7 @@ func TestLoader_Load_NestedPlugins(t *testing.T) {
procPrvdr := fakes.NewFakeBackendProcessProvider() procPrvdr := fakes.NewFakeBackendProcessProvider()
procMgr := fakes.NewFakeProcessManager() procMgr := fakes.NewFakeProcessManager()
cfg := &config.PluginManagementCfg{} cfg := &config.PluginManagementCfg{}
l := newLoader(t, cfg, reg, procMgr, procPrvdr, newFakeSignatureErrorTracker()) l := newLoader(t, cfg, reg, procMgr, procPrvdr, newFakeErrorTracker())
got, err := l.Load(context.Background(), &fakes.FakePluginSource{ got, err := l.Load(context.Background(), &fakes.FakePluginSource{
PluginClassFunc: func(ctx context.Context) plugins.Class { PluginClassFunc: func(ctx context.Context) plugins.Class {
return plugins.ClassExternal return plugins.ClassExternal
@ -1463,7 +1463,7 @@ type loaderDepOpts struct {
} }
func newLoader(t *testing.T, cfg *config.PluginManagementCfg, reg registry.Service, proc process.Manager, func newLoader(t *testing.T, cfg *config.PluginManagementCfg, reg registry.Service, proc process.Manager,
backendFactory plugins.BackendFactoryProvider, sigErrTracker pluginerrs.SignatureErrorTracker, backendFactory plugins.BackendFactoryProvider, errTracker pluginerrs.ErrorTracker,
) *Loader { ) *Loader {
assets := assetpath.ProvideService(cfg, pluginscdn.ProvideService(cfg)) assets := assetpath.ProvideService(cfg, pluginscdn.ProvideService(cfg))
angularInspector := angularinspector.NewStaticInspector() angularInspector := angularinspector.NewStaticInspector()
@ -1474,9 +1474,9 @@ func newLoader(t *testing.T, cfg *config.PluginManagementCfg, reg registry.Servi
return ProvideService(pipeline.ProvideDiscoveryStage(cfg, return ProvideService(pipeline.ProvideDiscoveryStage(cfg,
finder.NewLocalFinder(false), reg), finder.NewLocalFinder(false), reg),
pipeline.ProvideBootstrapStage(cfg, signature.DefaultCalculator(cfg), assets), pipeline.ProvideBootstrapStage(cfg, signature.DefaultCalculator(cfg), assets),
pipeline.ProvideValidationStage(cfg, signature.NewValidator(signature.NewUnsignedAuthorizer(cfg)), angularInspector, sigErrTracker), pipeline.ProvideValidationStage(cfg, signature.NewValidator(signature.NewUnsignedAuthorizer(cfg)), angularInspector),
pipeline.ProvideInitializationStage(cfg, reg, backendFactory, proc, &fakes.FakeAuthService{}, fakes.NewFakeRoleRegistry(), fakes.NewFakePluginEnvProvider(), tracing.InitializeTracerForTest()), pipeline.ProvideInitializationStage(cfg, reg, backendFactory, proc, &fakes.FakeAuthService{}, fakes.NewFakeRoleRegistry(), fakes.NewFakePluginEnvProvider(), tracing.InitializeTracerForTest()),
terminate) terminate, errTracker)
} }
func newLoaderWithOpts(t *testing.T, cfg *config.PluginManagementCfg, opts loaderDepOpts) *Loader { func newLoaderWithOpts(t *testing.T, cfg *config.PluginManagementCfg, opts loaderDepOpts) *Loader {
@ -1486,7 +1486,7 @@ func newLoaderWithOpts(t *testing.T, cfg *config.PluginManagementCfg, opts loade
terminate, err := pipeline.ProvideTerminationStage(cfg, reg, proc) terminate, err := pipeline.ProvideTerminationStage(cfg, reg, proc)
require.NoError(t, err) require.NoError(t, err)
sigErrTracker := pluginerrs.ProvideSignatureErrorTracker() errTracker := pluginerrs.ProvideErrorTracker()
angularInspector := opts.angularInspector angularInspector := opts.angularInspector
if opts.angularInspector == nil { if opts.angularInspector == nil {
@ -1506,9 +1506,9 @@ func newLoaderWithOpts(t *testing.T, cfg *config.PluginManagementCfg, opts loade
return ProvideService(pipeline.ProvideDiscoveryStage(cfg, return ProvideService(pipeline.ProvideDiscoveryStage(cfg,
finder.NewLocalFinder(false), reg), finder.NewLocalFinder(false), reg),
pipeline.ProvideBootstrapStage(cfg, signature.DefaultCalculator(cfg), assets), pipeline.ProvideBootstrapStage(cfg, signature.DefaultCalculator(cfg), assets),
pipeline.ProvideValidationStage(cfg, signature.NewValidator(signature.NewUnsignedAuthorizer(cfg)), angularInspector, sigErrTracker), pipeline.ProvideValidationStage(cfg, signature.NewValidator(signature.NewUnsignedAuthorizer(cfg)), angularInspector),
pipeline.ProvideInitializationStage(cfg, reg, backendFactoryProvider, proc, authServiceRegistry, fakes.NewFakeRoleRegistry(), fakes.NewFakePluginEnvProvider(), tracing.InitializeTracerForTest()), pipeline.ProvideInitializationStage(cfg, reg, backendFactoryProvider, proc, authServiceRegistry, fakes.NewFakeRoleRegistry(), fakes.NewFakePluginEnvProvider(), tracing.InitializeTracerForTest()),
terminate) terminate, errTracker)
} }
func verifyState(t *testing.T, ps []*plugins.Plugin, reg registry.Service, func verifyState(t *testing.T, ps []*plugins.Plugin, reg registry.Service,

View File

@ -19,7 +19,6 @@ import (
"github.com/grafana/grafana/pkg/plugins/manager/process" "github.com/grafana/grafana/pkg/plugins/manager/process"
"github.com/grafana/grafana/pkg/plugins/manager/registry" "github.com/grafana/grafana/pkg/plugins/manager/registry"
"github.com/grafana/grafana/pkg/plugins/manager/signature" "github.com/grafana/grafana/pkg/plugins/manager/signature"
"github.com/grafana/grafana/pkg/services/pluginsintegration/pluginerrs"
) )
func ProvideDiscoveryStage(cfg *config.PluginManagementCfg, pf finder.Finder, pr registry.Service) *discovery.Discovery { func ProvideDiscoveryStage(cfg *config.PluginManagementCfg, pf finder.Finder, pr registry.Service) *discovery.Discovery {
@ -49,11 +48,10 @@ func ProvideBootstrapStage(cfg *config.PluginManagementCfg, sc plugins.Signature
}) })
} }
func ProvideValidationStage(cfg *config.PluginManagementCfg, sv signature.Validator, ai angularinspector.Inspector, func ProvideValidationStage(cfg *config.PluginManagementCfg, sv signature.Validator, ai angularinspector.Inspector) *validation.Validate {
et pluginerrs.SignatureErrorTracker) *validation.Validate {
return validation.New(cfg, validation.Opts{ return validation.New(cfg, validation.Opts{
ValidateFuncs: []validation.ValidateFunc{ ValidateFuncs: []validation.ValidateFunc{
SignatureValidationStep(sv, et), SignatureValidationStep(sv),
validation.ModuleJSValidationStep(), validation.ModuleJSValidationStep(),
validation.AngularDetectionStep(cfg, ai), validation.AngularDetectionStep(cfg, ai),
}, },

View File

@ -20,7 +20,6 @@ import (
"github.com/grafana/grafana/pkg/plugins/manager/registry" "github.com/grafana/grafana/pkg/plugins/manager/registry"
"github.com/grafana/grafana/pkg/plugins/manager/signature" "github.com/grafana/grafana/pkg/plugins/manager/signature"
"github.com/grafana/grafana/pkg/plugins/pfs" "github.com/grafana/grafana/pkg/plugins/pfs"
"github.com/grafana/grafana/pkg/services/pluginsintegration/pluginerrs"
) )
// ExternalServiceRegistration implements an InitializeFunc for registering external services. // ExternalServiceRegistration implements an InitializeFunc for registering external services.
@ -105,15 +104,12 @@ func ReportBuildMetrics(_ context.Context, p *plugins.Plugin) (*plugins.Plugin,
// SignatureValidation implements a ValidateFunc for validating plugin signatures. // SignatureValidation implements a ValidateFunc for validating plugin signatures.
type SignatureValidation struct { type SignatureValidation struct {
signatureValidator signature.Validator signatureValidator signature.Validator
errs pluginerrs.SignatureErrorTracker
log log.Logger log log.Logger
} }
// SignatureValidationStep returns a new ValidateFunc for validating plugin signatures. // SignatureValidationStep returns a new ValidateFunc for validating plugin signatures.
func SignatureValidationStep(signatureValidator signature.Validator, func SignatureValidationStep(signatureValidator signature.Validator) validation.ValidateFunc {
sigErr pluginerrs.SignatureErrorTracker) validation.ValidateFunc {
sv := &SignatureValidation{ sv := &SignatureValidation{
errs: sigErr,
signatureValidator: signatureValidator, signatureValidator: signatureValidator,
log: log.New("plugins.signature.validation"), log: log.New("plugins.signature.validation"),
} }
@ -121,23 +117,19 @@ func SignatureValidationStep(signatureValidator signature.Validator,
} }
// Validate validates the plugin signature. If a signature error is encountered, the error is recorded with the // Validate validates the plugin signature. If a signature error is encountered, the error is recorded with the
// pluginerrs.SignatureErrorTracker. // pluginerrs.ErrorTracker.
func (v *SignatureValidation) Validate(ctx context.Context, p *plugins.Plugin) error { func (v *SignatureValidation) Validate(ctx context.Context, p *plugins.Plugin) error {
err := v.signatureValidator.ValidateSignature(p) err := v.signatureValidator.ValidateSignature(p)
if err != nil { if err != nil {
var sigErr *plugins.SignatureError var sigErr *plugins.Error
if errors.As(err, &sigErr) { if errors.As(err, &sigErr) {
v.log.Warn("Skipping loading plugin due to problem with signature", v.log.Warn("Skipping loading plugin due to problem with signature",
"pluginId", p.ID, "status", sigErr.SignatureStatus) "pluginId", p.ID, "status", sigErr.SignatureStatus)
p.SignatureError = sigErr p.Error = sigErr
v.errs.Record(ctx, sigErr)
} }
return err return err
} }
// clear plugin error if a pre-existing error has since been resolved
v.errs.Clear(ctx, p.ID)
return nil return nil
} }

View File

@ -10,60 +10,56 @@ import (
var _ plugins.ErrorResolver = (*Store)(nil) var _ plugins.ErrorResolver = (*Store)(nil)
type Store struct { type Store struct {
signatureErrs SignatureErrorTracker errs ErrorTracker
} }
func ProvideStore(signatureErrs SignatureErrorTracker) *Store { func ProvideStore(errs ErrorTracker) *Store {
return &Store{ return &Store{
signatureErrs: signatureErrs, errs: errs,
} }
} }
func (s *Store) PluginErrors(ctx context.Context) []*plugins.Error { func (s *Store) PluginErrors(ctx context.Context) []*plugins.Error {
sigErrs := s.signatureErrs.SignatureErrors(ctx) errs := s.errs.Errors(ctx)
errs := make([]*plugins.Error, 0, len(sigErrs)) for _, err := range errs {
for _, err := range sigErrs { err.ErrorCode = err.AsErrorCode()
errs = append(errs, &plugins.Error{
PluginID: err.PluginID,
ErrorCode: err.AsErrorCode(),
})
} }
return errs return errs
} }
type SignatureErrorRegistry struct { type ErrorRegistry struct {
errs map[string]*plugins.SignatureError errs map[string]*plugins.Error
log log.Logger log log.Logger
} }
type SignatureErrorTracker interface { type ErrorTracker interface {
Record(ctx context.Context, err *plugins.SignatureError) Record(ctx context.Context, err *plugins.Error)
Clear(ctx context.Context, pluginID string) Clear(ctx context.Context, pluginID string)
SignatureErrors(ctx context.Context) []*plugins.SignatureError Errors(ctx context.Context) []*plugins.Error
} }
func ProvideSignatureErrorTracker() *SignatureErrorRegistry { func ProvideErrorTracker() *ErrorRegistry {
return newSignatureErrorRegistry() return newErrorRegistry()
} }
func newSignatureErrorRegistry() *SignatureErrorRegistry { func newErrorRegistry() *ErrorRegistry {
return &SignatureErrorRegistry{ return &ErrorRegistry{
errs: make(map[string]*plugins.SignatureError), errs: make(map[string]*plugins.Error),
log: log.New("plugins.errors"), log: log.New("plugins.errors"),
} }
} }
func (r *SignatureErrorRegistry) Record(_ context.Context, signatureErr *plugins.SignatureError) { func (r *ErrorRegistry) Record(_ context.Context, err *plugins.Error) {
r.errs[signatureErr.PluginID] = signatureErr r.errs[err.PluginID] = err
} }
func (r *SignatureErrorRegistry) Clear(_ context.Context, pluginID string) { func (r *ErrorRegistry) Clear(_ context.Context, pluginID string) {
delete(r.errs, pluginID) delete(r.errs, pluginID)
} }
func (r *SignatureErrorRegistry) SignatureErrors(_ context.Context) []*plugins.SignatureError { func (r *ErrorRegistry) Errors(_ context.Context) []*plugins.Error {
errs := make([]*plugins.SignatureError, 0, len(r.errs)) errs := make([]*plugins.Error, 0, len(r.errs))
for _, err := range r.errs { for _, err := range r.errs {
errs = append(errs, err) errs = append(errs, err)
} }

View File

@ -92,8 +92,8 @@ var WireSet = wire.NewSet(
wire.Bind(new(signature.Validator), new(*signature.Validation)), wire.Bind(new(signature.Validator), new(*signature.Validation)),
loader.ProvideService, loader.ProvideService,
wire.Bind(new(pluginLoader.Service), new(*loader.Loader)), wire.Bind(new(pluginLoader.Service), new(*loader.Loader)),
pluginerrs.ProvideSignatureErrorTracker, pluginerrs.ProvideErrorTracker,
wire.Bind(new(pluginerrs.SignatureErrorTracker), new(*pluginerrs.SignatureErrorRegistry)), wire.Bind(new(pluginerrs.ErrorTracker), new(*pluginerrs.ErrorRegistry)),
pluginerrs.ProvideStore, pluginerrs.ProvideStore,
wire.Bind(new(plugins.ErrorResolver), new(*pluginerrs.Store)), wire.Bind(new(plugins.ErrorResolver), new(*pluginerrs.Store)),
registry.ProvideService, registry.ProvideService,

View File

@ -24,7 +24,8 @@ type Plugin struct {
Signature plugins.SignatureStatus Signature plugins.SignatureStatus
SignatureType plugins.SignatureType SignatureType plugins.SignatureType
SignatureOrg string SignatureOrg string
SignatureError *plugins.SignatureError
Error *plugins.Error
// SystemJS fields // SystemJS fields
Module string Module string
@ -69,7 +70,7 @@ func ToGrafanaDTO(p *plugins.Plugin) Plugin {
Signature: p.Signature, Signature: p.Signature,
SignatureType: p.SignatureType, SignatureType: p.SignatureType,
SignatureOrg: p.SignatureOrg, SignatureOrg: p.SignatureOrg,
SignatureError: p.SignatureError, Error: p.Error,
Module: p.Module, Module: p.Module,
BaseURL: p.BaseURL, BaseURL: p.BaseURL,
ExternalService: p.ExternalService, ExternalService: p.ExternalService,

View File

@ -20,6 +20,7 @@ import (
"github.com/grafana/grafana/pkg/plugins/manager/signature" "github.com/grafana/grafana/pkg/plugins/manager/signature"
"github.com/grafana/grafana/pkg/plugins/manager/sources" "github.com/grafana/grafana/pkg/plugins/manager/sources"
"github.com/grafana/grafana/pkg/services/pluginsintegration/pipeline" "github.com/grafana/grafana/pkg/services/pluginsintegration/pipeline"
"github.com/grafana/grafana/pkg/services/pluginsintegration/pluginerrs"
"github.com/grafana/grafana/pkg/services/rendering" "github.com/grafana/grafana/pkg/services/rendering"
) )
@ -136,5 +137,7 @@ func createLoader(cfg *config.PluginManagementCfg, pluginEnvProvider envvars.Pro
return nil, err return nil, err
} }
return loader.New(d, b, v, i, t), nil et := pluginerrs.ProvideErrorTracker()
return loader.New(d, b, v, i, t, et), nil
} }

View File

@ -50,11 +50,10 @@ func CreateIntegrationTestCtx(t *testing.T, cfg *setting.Cfg, coreRegistry *core
reg := registry.ProvideService() reg := registry.ProvideService()
angularInspector := angularinspector.NewStaticInspector() angularInspector := angularinspector.NewStaticInspector()
proc := process.ProvideService() proc := process.ProvideService()
errTracker := pluginerrs.ProvideSignatureErrorTracker()
disc := pipeline.ProvideDiscoveryStage(pCfg, finder.NewLocalFinder(true), reg) disc := pipeline.ProvideDiscoveryStage(pCfg, finder.NewLocalFinder(true), reg)
boot := pipeline.ProvideBootstrapStage(pCfg, signature.ProvideService(pCfg, statickey.New()), assetpath.ProvideService(pCfg, cdn)) boot := pipeline.ProvideBootstrapStage(pCfg, signature.ProvideService(pCfg, statickey.New()), assetpath.ProvideService(pCfg, cdn))
valid := pipeline.ProvideValidationStage(pCfg, signature.NewValidator(signature.NewUnsignedAuthorizer(pCfg)), angularInspector, errTracker) valid := pipeline.ProvideValidationStage(pCfg, signature.NewValidator(signature.NewUnsignedAuthorizer(pCfg)), angularInspector)
init := pipeline.ProvideInitializationStage(pCfg, reg, provider.ProvideService(coreRegistry), proc, &fakes.FakeAuthService{}, fakes.NewFakeRoleRegistry(), nil, tracing.InitializeTracerForTest()) init := pipeline.ProvideInitializationStage(pCfg, reg, provider.ProvideService(coreRegistry), proc, &fakes.FakeAuthService{}, fakes.NewFakeRoleRegistry(), nil, tracing.InitializeTracerForTest())
term, err := pipeline.ProvideTerminationStage(pCfg, reg, proc) term, err := pipeline.ProvideTerminationStage(pCfg, reg, proc)
require.NoError(t, err) require.NoError(t, err)
@ -95,7 +94,7 @@ func CreateTestLoader(t *testing.T, cfg *pluginsCfg.PluginManagementCfg, opts Lo
} }
if opts.Validator == nil { if opts.Validator == nil {
opts.Validator = pipeline.ProvideValidationStage(cfg, signature.NewValidator(signature.NewUnsignedAuthorizer(cfg)), angularinspector.NewStaticInspector(), pluginerrs.ProvideSignatureErrorTracker()) opts.Validator = pipeline.ProvideValidationStage(cfg, signature.NewValidator(signature.NewUnsignedAuthorizer(cfg)), angularinspector.NewStaticInspector())
} }
if opts.Initializer == nil { if opts.Initializer == nil {
@ -111,5 +110,5 @@ func CreateTestLoader(t *testing.T, cfg *pluginsCfg.PluginManagementCfg, opts Lo
require.NoError(t, err) require.NoError(t, err)
} }
return loader.New(opts.Discoverer, opts.Bootstrapper, opts.Validator, opts.Initializer, opts.Terminator) return loader.New(opts.Discoverer, opts.Bootstrapper, opts.Validator, opts.Initializer, opts.Terminator, pluginerrs.ProvideErrorTracker())
} }