Skip to content
Projects
Groups
Snippets
Help
This project
Loading...
Sign in / Register
Toggle navigation
N
nexpie-grafana-theme
Overview
Overview
Details
Activity
Cycle Analytics
Repository
Repository
Files
Commits
Branches
Tags
Contributors
Graph
Compare
Charts
Registry
Registry
Issues
0
Issues
0
List
Board
Labels
Milestones
Merge Requests
0
Merge Requests
0
CI / CD
CI / CD
Pipelines
Jobs
Schedules
Charts
Wiki
Wiki
Snippets
Snippets
Members
Collapse sidebar
Close sidebar
Activity
Graph
Charts
Create a new issue
Jobs
Commits
Issue Boards
Open sidebar
Kornkitt Poolsup
nexpie-grafana-theme
Commits
9603dce4
Commit
9603dce4
authored
Sep 09, 2015
by
Torkel Ödegaard
Browse files
Options
Browse Files
Download
Email Patches
Plain Diff
feat(dataproxy): added whitelist setting and feature for data proxies, closes #2626
parent
13190f6f
Show whitespace changes
Inline
Side-by-side
Showing
4 changed files
with
32 additions
and
10 deletions
+32
-10
conf/defaults.ini
+3
-0
conf/sample.ini
+3
-0
pkg/api/dataproxy.go
+18
-10
pkg/setting/setting.go
+8
-0
No files found.
conf/defaults.ini
View file @
9603dce4
...
...
@@ -121,6 +121,9 @@ cookie_remember_name = grafana_remember
# disable gravatar profile images
disable_gravatar
=
false
# data source proxy whitelist (ip_or_domain:port seperated by spaces)
data_source_proxy_whitelist
=
#################################### Users ####################################
[users]
# disable user signup / registration
...
...
conf/sample.ini
View file @
9603dce4
...
...
@@ -117,6 +117,9 @@
# disable gravatar profile images
;disable_gravatar = false
# data source proxy whitelist (ip_or_domain:port seperated by spaces)
;data_source_proxy_whitelist =
#################################### Users ####################################
[users]
# disable user signup / registration
...
...
pkg/api/dataproxy.go
View file @
9603dce4
...
...
@@ -11,6 +11,7 @@ import (
"github.com/grafana/grafana/pkg/bus"
"github.com/grafana/grafana/pkg/middleware"
m
"github.com/grafana/grafana/pkg/models"
"github.com/grafana/grafana/pkg/setting"
"github.com/grafana/grafana/pkg/util"
)
...
...
@@ -24,30 +25,28 @@ var dataProxyTransport = &http.Transport{
TLSHandshakeTimeout
:
10
*
time
.
Second
,
}
func
NewReverseProxy
(
ds
*
m
.
DataSource
,
proxyPath
string
)
*
httputil
.
ReverseProxy
{
target
,
_
:=
url
.
Parse
(
ds
.
Url
)
func
NewReverseProxy
(
ds
*
m
.
DataSource
,
proxyPath
string
,
targetUrl
*
url
.
URL
)
*
httputil
.
ReverseProxy
{
director
:=
func
(
req
*
http
.
Request
)
{
req
.
URL
.
Scheme
=
target
.
Scheme
req
.
URL
.
Host
=
target
.
Host
req
.
Host
=
target
.
Host
req
.
URL
.
Scheme
=
target
Url
.
Scheme
req
.
URL
.
Host
=
target
Url
.
Host
req
.
Host
=
target
Url
.
Host
reqQueryVals
:=
req
.
URL
.
Query
()
if
ds
.
Type
==
m
.
DS_INFLUXDB_08
{
req
.
URL
.
Path
=
util
.
JoinUrlFragments
(
target
.
Path
,
"db/"
+
ds
.
Database
+
"/"
+
proxyPath
)
req
.
URL
.
Path
=
util
.
JoinUrlFragments
(
target
Url
.
Path
,
"db/"
+
ds
.
Database
+
"/"
+
proxyPath
)
reqQueryVals
.
Add
(
"u"
,
ds
.
User
)
reqQueryVals
.
Add
(
"p"
,
ds
.
Password
)
req
.
URL
.
RawQuery
=
reqQueryVals
.
Encode
()
}
else
if
ds
.
Type
==
m
.
DS_INFLUXDB
{
req
.
URL
.
Path
=
util
.
JoinUrlFragments
(
target
.
Path
,
proxyPath
)
req
.
URL
.
Path
=
util
.
JoinUrlFragments
(
target
Url
.
Path
,
proxyPath
)
reqQueryVals
.
Add
(
"db"
,
ds
.
Database
)
req
.
URL
.
RawQuery
=
reqQueryVals
.
Encode
()
if
!
ds
.
BasicAuth
{
req
.
Header
.
Add
(
"Authorization"
,
util
.
GetBasicAuthHeader
(
ds
.
User
,
ds
.
Password
))
}
}
else
{
req
.
URL
.
Path
=
util
.
JoinUrlFragments
(
target
.
Path
,
proxyPath
)
req
.
URL
.
Path
=
util
.
JoinUrlFragments
(
target
Url
.
Path
,
proxyPath
)
}
if
ds
.
BasicAuth
{
...
...
@@ -72,11 +71,20 @@ func ProxyDataSourceRequest(c *middleware.Context) {
return
}
ds
:=
query
.
Result
targetUrl
,
_
:=
url
.
Parse
(
ds
.
Url
)
if
len
(
setting
.
DataProxyWhiteList
)
>
0
{
if
_
,
exists
:=
setting
.
DataProxyWhiteList
[
targetUrl
.
Host
];
!
exists
{
c
.
JsonApiErr
(
403
,
"Data proxy hostname and ip are not included in whitelist"
,
nil
)
return
}
}
if
query
.
Result
.
Type
==
m
.
DS_CLOUDWATCH
{
ProxyCloudWatchDataSourceRequest
(
c
)
}
else
{
proxyPath
:=
c
.
Params
(
"*"
)
proxy
:=
NewReverseProxy
(
&
query
.
Result
,
proxyPath
)
proxy
:=
NewReverseProxy
(
&
ds
,
proxyPath
,
targetUrl
)
proxy
.
Transport
=
dataProxyTransport
proxy
.
ServeHTTP
(
c
.
RW
(),
c
.
Req
.
Request
)
}
...
...
pkg/setting/setting.go
View file @
9603dce4
...
...
@@ -73,6 +73,7 @@ var (
CookieRememberName
string
DisableGravatar
bool
EmailCodeValidMinutes
int
DataProxyWhiteList
map
[
string
]
bool
// User settings
AllowUserSignUp
bool
...
...
@@ -378,6 +379,7 @@ func NewConfigContext(args *CommandLineArgs) {
EnableGzip
=
server
.
Key
(
"enable_gzip"
)
.
MustBool
(
false
)
EnforceDomain
=
server
.
Key
(
"enforce_domain"
)
.
MustBool
(
false
)
// read security settings
security
:=
Cfg
.
Section
(
"security"
)
SecretKey
=
security
.
Key
(
"secret_key"
)
.
String
()
LogInRememberDays
=
security
.
Key
(
"login_remember_days"
)
.
MustInt
()
...
...
@@ -385,6 +387,12 @@ func NewConfigContext(args *CommandLineArgs) {
CookieRememberName
=
security
.
Key
(
"cookie_remember_name"
)
.
String
()
DisableGravatar
=
security
.
Key
(
"disable_gravatar"
)
.
MustBool
(
true
)
// read data source proxy white list
DataProxyWhiteList
=
make
(
map
[
string
]
bool
)
for
_
,
hostAndIp
:=
range
security
.
Key
(
"data_source_proxy_whitelist"
)
.
Strings
(
" "
)
{
DataProxyWhiteList
[
hostAndIp
]
=
true
}
// admin
AdminUser
=
security
.
Key
(
"admin_user"
)
.
String
()
AdminPassword
=
security
.
Key
(
"admin_password"
)
.
String
()
...
...
Write
Preview
Markdown
is supported
0%
Try again
or
attach a new file
Attach a file
Cancel
You are about to add
0
people
to the discussion. Proceed with caution.
Finish editing this message first!
Cancel
Please
register
or
sign in
to comment