|
|
@@ -127,40 +127,21 @@ func GetAuthInfo(query *m.GetAuthInfoQuery) error {
|
|
|
return m.ErrUserNotFound
|
|
|
}
|
|
|
|
|
|
- if userAuth.OAuthAccessToken != "" {
|
|
|
- decodedAccessToken, err := base64.StdEncoding.DecodeString(userAuth.OAuthAccessToken)
|
|
|
- if err != nil {
|
|
|
- return err
|
|
|
- }
|
|
|
- decryptedAccessToken, err := util.Decrypt(decodedAccessToken, setting.SecretKey)
|
|
|
- if err != nil {
|
|
|
- return err
|
|
|
- }
|
|
|
- userAuth.OAuthAccessToken = string(decryptedAccessToken)
|
|
|
-
|
|
|
+ secretAccessToken, err := decodeAndDecrypt(userAuth.OAuthAccessToken)
|
|
|
+ if err != nil {
|
|
|
+ return err
|
|
|
}
|
|
|
- if userAuth.OAuthRefreshToken != "" {
|
|
|
- decodedRefreshToken, err := base64.StdEncoding.DecodeString(userAuth.OAuthRefreshToken)
|
|
|
- if err != nil {
|
|
|
- return err
|
|
|
- }
|
|
|
- decryptedRefreshToken, err := util.Decrypt(decodedRefreshToken, setting.SecretKey)
|
|
|
- if err != nil {
|
|
|
- return err
|
|
|
- }
|
|
|
- userAuth.OAuthRefreshToken = string(decryptedRefreshToken)
|
|
|
+ secretRefreshToken, err := decodeAndDecrypt(userAuth.OAuthRefreshToken)
|
|
|
+ if err != nil {
|
|
|
+ return err
|
|
|
}
|
|
|
- if userAuth.OAuthTokenType != "" {
|
|
|
- decodedTokenType, err := base64.StdEncoding.DecodeString(userAuth.OAuthTokenType)
|
|
|
- if err != nil {
|
|
|
- return err
|
|
|
- }
|
|
|
- decryptedTokenType, err := util.Decrypt(decodedTokenType, setting.SecretKey)
|
|
|
- if err != nil {
|
|
|
- return err
|
|
|
- }
|
|
|
- userAuth.OAuthTokenType = string(decryptedTokenType)
|
|
|
+ secretTokenType, err := decodeAndDecrypt(userAuth.OAuthTokenType)
|
|
|
+ if err != nil {
|
|
|
+ return err
|
|
|
}
|
|
|
+ userAuth.OAuthAccessToken = secretAccessToken
|
|
|
+ userAuth.OAuthRefreshToken = secretRefreshToken
|
|
|
+ userAuth.OAuthTokenType = secretTokenType
|
|
|
|
|
|
query.Result = userAuth
|
|
|
return nil
|
|
|
@@ -176,22 +157,22 @@ func SetAuthInfo(cmd *m.SetAuthInfoCommand) error {
|
|
|
}
|
|
|
|
|
|
if cmd.OAuthToken != nil {
|
|
|
- secretAccessToken, err := util.Encrypt([]byte(cmd.OAuthToken.AccessToken), setting.SecretKey)
|
|
|
+ secretAccessToken, err := encryptAndEncode(cmd.OAuthToken.AccessToken)
|
|
|
if err != nil {
|
|
|
return err
|
|
|
}
|
|
|
- secretRefreshToken, err := util.Encrypt([]byte(cmd.OAuthToken.RefreshToken), setting.SecretKey)
|
|
|
+ secretRefreshToken, err := encryptAndEncode(cmd.OAuthToken.RefreshToken)
|
|
|
if err != nil {
|
|
|
return err
|
|
|
}
|
|
|
- secretTokenType, err := util.Encrypt([]byte(cmd.OAuthToken.TokenType), setting.SecretKey)
|
|
|
+ secretTokenType, err := encryptAndEncode(cmd.OAuthToken.TokenType)
|
|
|
if err != nil {
|
|
|
return err
|
|
|
}
|
|
|
|
|
|
- authUser.OAuthAccessToken = base64.StdEncoding.EncodeToString(secretAccessToken)
|
|
|
- authUser.OAuthRefreshToken = base64.StdEncoding.EncodeToString(secretRefreshToken)
|
|
|
- authUser.OAuthTokenType = base64.StdEncoding.EncodeToString(secretTokenType)
|
|
|
+ authUser.OAuthAccessToken = secretAccessToken
|
|
|
+ authUser.OAuthRefreshToken = secretRefreshToken
|
|
|
+ authUser.OAuthTokenType = secretTokenType
|
|
|
authUser.OAuthExpiry = cmd.OAuthToken.Expiry
|
|
|
}
|
|
|
|
|
|
@@ -210,21 +191,22 @@ func UpdateAuthInfo(cmd *m.UpdateAuthInfoCommand) error {
|
|
|
}
|
|
|
|
|
|
if cmd.OAuthToken != nil {
|
|
|
- secretAccessToken, err := util.Encrypt([]byte(cmd.OAuthToken.AccessToken), setting.SecretKey)
|
|
|
+ secretAccessToken, err := encryptAndEncode(cmd.OAuthToken.AccessToken)
|
|
|
if err != nil {
|
|
|
return err
|
|
|
}
|
|
|
- secretRefreshToken, err := util.Encrypt([]byte(cmd.OAuthToken.RefreshToken), setting.SecretKey)
|
|
|
+ secretRefreshToken, err := encryptAndEncode(cmd.OAuthToken.RefreshToken)
|
|
|
if err != nil {
|
|
|
return err
|
|
|
}
|
|
|
- secretTokenType, err := util.Encrypt([]byte(cmd.OAuthToken.TokenType), setting.SecretKey)
|
|
|
+ secretTokenType, err := encryptAndEncode(cmd.OAuthToken.TokenType)
|
|
|
if err != nil {
|
|
|
return err
|
|
|
}
|
|
|
- authUser.OAuthAccessToken = base64.StdEncoding.EncodeToString(secretAccessToken)
|
|
|
- authUser.OAuthRefreshToken = base64.StdEncoding.EncodeToString(secretRefreshToken)
|
|
|
- authUser.OAuthTokenType = base64.StdEncoding.EncodeToString(secretTokenType)
|
|
|
+
|
|
|
+ authUser.OAuthAccessToken = secretAccessToken
|
|
|
+ authUser.OAuthRefreshToken = secretRefreshToken
|
|
|
+ authUser.OAuthTokenType = secretTokenType
|
|
|
authUser.OAuthExpiry = cmd.OAuthToken.Expiry
|
|
|
}
|
|
|
|
|
|
@@ -244,3 +226,31 @@ func DeleteAuthInfo(cmd *m.DeleteAuthInfoCommand) error {
|
|
|
return err
|
|
|
})
|
|
|
}
|
|
|
+
|
|
|
+// decodeAndDecrypt will decode the string with the standard bas64 decoder
|
|
|
+// and then decrypt it with grafana's secretKey
|
|
|
+func decodeAndDecrypt(s string) (string, error) {
|
|
|
+ // Bail out if empty string since it'll cause a segfault in util.Decrypt
|
|
|
+ if s == "" {
|
|
|
+ return "", nil
|
|
|
+ }
|
|
|
+ decoded, err := base64.StdEncoding.DecodeString(s)
|
|
|
+ if err != nil {
|
|
|
+ return "", err
|
|
|
+ }
|
|
|
+ decrypted, err := util.Decrypt(decoded, setting.SecretKey)
|
|
|
+ if err != nil {
|
|
|
+ return "", err
|
|
|
+ }
|
|
|
+ return string(decrypted), nil
|
|
|
+}
|
|
|
+
|
|
|
+// encryptAndEncode will encrypt a string with grafana's secretKey, and
|
|
|
+// then encode it with the standard bas64 encoder
|
|
|
+func encryptAndEncode(s string) (string, error) {
|
|
|
+ encrypted, err := util.Encrypt([]byte(s), setting.SecretKey)
|
|
|
+ if err != nil {
|
|
|
+ return "", err
|
|
|
+ }
|
|
|
+ return base64.StdEncoding.EncodeToString(encrypted), nil
|
|
|
+}
|