mirror of
https://github.com/grafana/grafana.git
synced 2025-07-29 04:52:10 +08:00

* add group to role DisplayName to make searching easier * clean up more role names; add filtered display text when fetching * pass filter state into role menu to decide how to display role name * prop name better describes what it does
130 lines
4.4 KiB
Go
130 lines
4.4 KiB
Go
package pluginaccesscontrol
|
|
|
|
import (
|
|
"context"
|
|
|
|
"github.com/grafana/grafana/pkg/plugins"
|
|
ac "github.com/grafana/grafana/pkg/services/accesscontrol"
|
|
contextmodel "github.com/grafana/grafana/pkg/services/contexthandler/model"
|
|
"github.com/grafana/grafana/pkg/services/datasources"
|
|
"github.com/grafana/grafana/pkg/services/featuremgmt"
|
|
"github.com/grafana/grafana/pkg/services/org"
|
|
"github.com/grafana/grafana/pkg/setting"
|
|
)
|
|
|
|
const (
|
|
// Plugins actions
|
|
ActionInstall = "plugins:install"
|
|
ActionWrite = "plugins:write"
|
|
|
|
// App Plugins actions
|
|
ActionAppAccess = "plugins.app:access"
|
|
)
|
|
|
|
var (
|
|
ScopeProvider = ac.NewScopeProvider("plugins")
|
|
// Protects access to the Configuration > Plugins page
|
|
AdminAccessEvaluator = ac.EvalAny(ac.EvalPermission(ActionWrite), ac.EvalPermission(ActionInstall))
|
|
)
|
|
|
|
// RoleRegistry handles the plugin RBAC roles and their assignments
|
|
type RoleRegistry interface {
|
|
DeclarePluginRoles(ctx context.Context, ID, name string, registrations []plugins.RoleRegistration) error
|
|
}
|
|
|
|
// ActionSetRegistry handles the plugin RBAC actionsets
|
|
type ActionSetRegistry interface {
|
|
RegisterActionSets(ctx context.Context, ID string, registrations []plugins.ActionSet) error
|
|
}
|
|
|
|
func ReqCanAdminPlugins(cfg *setting.Cfg) func(rc *contextmodel.ReqContext) bool {
|
|
// Legacy handler that protects access to the Configuration > Plugins page
|
|
return func(rc *contextmodel.ReqContext) bool {
|
|
return rc.OrgRole == org.RoleAdmin || cfg.PluginAdminEnabled && rc.IsGrafanaAdmin
|
|
}
|
|
}
|
|
|
|
func DeclareRBACRoles(service ac.Service, cfg *setting.Cfg, features featuremgmt.FeatureToggles) error {
|
|
AppPluginsReader := ac.RoleRegistration{
|
|
Role: ac.RoleDTO{
|
|
Name: ac.FixedRolePrefix + "plugins.app:reader",
|
|
DisplayName: "Application Plugins Access",
|
|
Description: "Access application plugins (still enforcing the organization role)",
|
|
Group: "Plugins",
|
|
Permissions: []ac.Permission{
|
|
{Action: ActionAppAccess, Scope: ScopeProvider.GetResourceAllScope()},
|
|
},
|
|
},
|
|
Grants: []string{string(org.RoleViewer)},
|
|
}
|
|
PluginsWriter := ac.RoleRegistration{
|
|
Role: ac.RoleDTO{
|
|
Name: ac.FixedRolePrefix + "plugins:writer",
|
|
DisplayName: "Writer",
|
|
Description: "Enable and disable plugins and edit plugins' settings",
|
|
Group: "Plugins",
|
|
Permissions: []ac.Permission{
|
|
{Action: ActionWrite, Scope: ScopeProvider.GetResourceAllScope()},
|
|
},
|
|
},
|
|
Grants: []string{string(org.RoleAdmin)},
|
|
}
|
|
PluginsMaintainer := ac.RoleRegistration{
|
|
Role: ac.RoleDTO{
|
|
Name: ac.FixedRolePrefix + "plugins:maintainer",
|
|
DisplayName: "Maintainer",
|
|
Description: "Install, uninstall plugins. Needs to be assigned globally.",
|
|
Group: "Plugins",
|
|
Permissions: []ac.Permission{
|
|
{Action: ActionInstall},
|
|
},
|
|
},
|
|
Grants: []string{ac.RoleGrafanaAdmin},
|
|
}
|
|
|
|
if !cfg.PluginAdminEnabled {
|
|
PluginsMaintainer.Grants = []string{}
|
|
}
|
|
|
|
return service.DeclareFixedRoles(AppPluginsReader, PluginsWriter, PluginsMaintainer)
|
|
}
|
|
|
|
var datasourcesActions = map[string]bool{
|
|
datasources.ActionIDRead: true,
|
|
datasources.ActionQuery: true,
|
|
datasources.ActionRead: true,
|
|
datasources.ActionWrite: true,
|
|
datasources.ActionDelete: true,
|
|
datasources.ActionPermissionsRead: true,
|
|
datasources.ActionPermissionsWrite: true,
|
|
"datasources.caching:read": true,
|
|
"datasources.caching:write": true,
|
|
ac.ActionAlertingRuleExternalRead: true,
|
|
ac.ActionAlertingRuleExternalWrite: true,
|
|
ac.ActionAlertingInstancesExternalRead: true,
|
|
ac.ActionAlertingInstancesExternalWrite: true,
|
|
ac.ActionAlertingNotificationsExternalRead: true,
|
|
ac.ActionAlertingNotificationsExternalWrite: true,
|
|
}
|
|
|
|
// GetDataSourceRouteEvaluator returns an evaluator for the given data source UID and action.
|
|
func GetDataSourceRouteEvaluator(dsUID, action string) ac.Evaluator {
|
|
if datasourcesActions[action] {
|
|
return ac.EvalPermission(action, "datasources:uid:"+dsUID)
|
|
}
|
|
return ac.EvalPermission(action)
|
|
}
|
|
|
|
var pluginsActions = map[string]bool{
|
|
ActionWrite: true,
|
|
ActionAppAccess: true,
|
|
}
|
|
|
|
// GetPluginRouteEvaluator returns an evaluator for the given plugin ID and action.
|
|
func GetPluginRouteEvaluator(pluginID, action string) ac.Evaluator {
|
|
if pluginsActions[action] {
|
|
return ac.EvalPermission(action, "plugins:id:"+pluginID)
|
|
}
|
|
return ac.EvalPermission(action)
|
|
}
|