|
|
@@ -1,16 +1,22 @@
|
|
|
package sqlstore
|
|
|
|
|
|
import (
|
|
|
+ "encoding/base64"
|
|
|
"time"
|
|
|
|
|
|
"github.com/grafana/grafana/pkg/bus"
|
|
|
m "github.com/grafana/grafana/pkg/models"
|
|
|
+ "github.com/grafana/grafana/pkg/setting"
|
|
|
+ "github.com/grafana/grafana/pkg/util"
|
|
|
)
|
|
|
|
|
|
+var getTime = time.Now
|
|
|
+
|
|
|
func init() {
|
|
|
bus.AddHandler("sql", GetUserByAuthInfo)
|
|
|
bus.AddHandler("sql", GetAuthInfo)
|
|
|
bus.AddHandler("sql", SetAuthInfo)
|
|
|
+ bus.AddHandler("sql", UpdateAuthInfo)
|
|
|
bus.AddHandler("sql", DeleteAuthInfo)
|
|
|
}
|
|
|
|
|
|
@@ -94,7 +100,7 @@ func GetUserByAuthInfo(query *m.GetUserByAuthInfoQuery) error {
|
|
|
}
|
|
|
|
|
|
// create authInfo record to link accounts
|
|
|
- if authQuery.Result == nil && query.AuthModule != "" && query.AuthId != "" {
|
|
|
+ if authQuery.Result == nil && query.AuthModule != "" {
|
|
|
cmd2 := &m.SetAuthInfoCommand{
|
|
|
UserId: user.Id,
|
|
|
AuthModule: query.AuthModule,
|
|
|
@@ -111,10 +117,11 @@ func GetUserByAuthInfo(query *m.GetUserByAuthInfoQuery) error {
|
|
|
|
|
|
func GetAuthInfo(query *m.GetAuthInfoQuery) error {
|
|
|
userAuth := &m.UserAuth{
|
|
|
+ UserId: query.UserId,
|
|
|
AuthModule: query.AuthModule,
|
|
|
AuthId: query.AuthId,
|
|
|
}
|
|
|
- has, err := x.Get(userAuth)
|
|
|
+ has, err := x.Desc("created").Get(userAuth)
|
|
|
if err != nil {
|
|
|
return err
|
|
|
}
|
|
|
@@ -122,6 +129,22 @@ func GetAuthInfo(query *m.GetAuthInfoQuery) error {
|
|
|
return m.ErrUserNotFound
|
|
|
}
|
|
|
|
|
|
+ secretAccessToken, err := decodeAndDecrypt(userAuth.OAuthAccessToken)
|
|
|
+ if err != nil {
|
|
|
+ return err
|
|
|
+ }
|
|
|
+ secretRefreshToken, err := decodeAndDecrypt(userAuth.OAuthRefreshToken)
|
|
|
+ if err != nil {
|
|
|
+ return err
|
|
|
+ }
|
|
|
+ secretTokenType, err := decodeAndDecrypt(userAuth.OAuthTokenType)
|
|
|
+ if err != nil {
|
|
|
+ return err
|
|
|
+ }
|
|
|
+ userAuth.OAuthAccessToken = secretAccessToken
|
|
|
+ userAuth.OAuthRefreshToken = secretRefreshToken
|
|
|
+ userAuth.OAuthTokenType = secretTokenType
|
|
|
+
|
|
|
query.Result = userAuth
|
|
|
return nil
|
|
|
}
|
|
|
@@ -132,7 +155,27 @@ func SetAuthInfo(cmd *m.SetAuthInfoCommand) error {
|
|
|
UserId: cmd.UserId,
|
|
|
AuthModule: cmd.AuthModule,
|
|
|
AuthId: cmd.AuthId,
|
|
|
- Created: time.Now(),
|
|
|
+ Created: getTime(),
|
|
|
+ }
|
|
|
+
|
|
|
+ if cmd.OAuthToken != nil {
|
|
|
+ secretAccessToken, err := encryptAndEncode(cmd.OAuthToken.AccessToken)
|
|
|
+ if err != nil {
|
|
|
+ return err
|
|
|
+ }
|
|
|
+ secretRefreshToken, err := encryptAndEncode(cmd.OAuthToken.RefreshToken)
|
|
|
+ if err != nil {
|
|
|
+ return err
|
|
|
+ }
|
|
|
+ secretTokenType, err := encryptAndEncode(cmd.OAuthToken.TokenType)
|
|
|
+ if err != nil {
|
|
|
+ return err
|
|
|
+ }
|
|
|
+
|
|
|
+ authUser.OAuthAccessToken = secretAccessToken
|
|
|
+ authUser.OAuthRefreshToken = secretRefreshToken
|
|
|
+ authUser.OAuthTokenType = secretTokenType
|
|
|
+ authUser.OAuthExpiry = cmd.OAuthToken.Expiry
|
|
|
}
|
|
|
|
|
|
_, err := sess.Insert(authUser)
|
|
|
@@ -140,9 +183,76 @@ func SetAuthInfo(cmd *m.SetAuthInfoCommand) error {
|
|
|
})
|
|
|
}
|
|
|
|
|
|
+func UpdateAuthInfo(cmd *m.UpdateAuthInfoCommand) error {
|
|
|
+ return inTransaction(func(sess *DBSession) error {
|
|
|
+ authUser := &m.UserAuth{
|
|
|
+ UserId: cmd.UserId,
|
|
|
+ AuthModule: cmd.AuthModule,
|
|
|
+ AuthId: cmd.AuthId,
|
|
|
+ Created: getTime(),
|
|
|
+ }
|
|
|
+
|
|
|
+ if cmd.OAuthToken != nil {
|
|
|
+ secretAccessToken, err := encryptAndEncode(cmd.OAuthToken.AccessToken)
|
|
|
+ if err != nil {
|
|
|
+ return err
|
|
|
+ }
|
|
|
+ secretRefreshToken, err := encryptAndEncode(cmd.OAuthToken.RefreshToken)
|
|
|
+ if err != nil {
|
|
|
+ return err
|
|
|
+ }
|
|
|
+ secretTokenType, err := encryptAndEncode(cmd.OAuthToken.TokenType)
|
|
|
+ if err != nil {
|
|
|
+ return err
|
|
|
+ }
|
|
|
+
|
|
|
+ authUser.OAuthAccessToken = secretAccessToken
|
|
|
+ authUser.OAuthRefreshToken = secretRefreshToken
|
|
|
+ authUser.OAuthTokenType = secretTokenType
|
|
|
+ authUser.OAuthExpiry = cmd.OAuthToken.Expiry
|
|
|
+ }
|
|
|
+
|
|
|
+ cond := &m.UserAuth{
|
|
|
+ UserId: cmd.UserId,
|
|
|
+ AuthModule: cmd.AuthModule,
|
|
|
+ }
|
|
|
+
|
|
|
+ _, err := sess.Update(authUser, cond)
|
|
|
+ return err
|
|
|
+ })
|
|
|
+}
|
|
|
+
|
|
|
func DeleteAuthInfo(cmd *m.DeleteAuthInfoCommand) error {
|
|
|
return inTransaction(func(sess *DBSession) error {
|
|
|
_, err := sess.Delete(cmd.UserAuth)
|
|
|
return err
|
|
|
})
|
|
|
}
|
|
|
+
|
|
|
+// decodeAndDecrypt will decode the string with the standard bas64 decoder
|
|
|
+// and then decrypt it with grafana's secretKey
|
|
|
+func decodeAndDecrypt(s string) (string, error) {
|
|
|
+ // Bail out if empty string since it'll cause a segfault in util.Decrypt
|
|
|
+ if s == "" {
|
|
|
+ return "", nil
|
|
|
+ }
|
|
|
+ decoded, err := base64.StdEncoding.DecodeString(s)
|
|
|
+ if err != nil {
|
|
|
+ return "", err
|
|
|
+ }
|
|
|
+ decrypted, err := util.Decrypt(decoded, setting.SecretKey)
|
|
|
+ if err != nil {
|
|
|
+ return "", err
|
|
|
+ }
|
|
|
+ return string(decrypted), nil
|
|
|
+}
|
|
|
+
|
|
|
+// encryptAndEncode will encrypt a string with grafana's secretKey, and
|
|
|
+// then encode it with the standard bas64 encoder
|
|
|
+func encryptAndEncode(s string) (string, error) {
|
|
|
+ encrypted, err := util.Encrypt([]byte(s), setting.SecretKey)
|
|
|
+ if err != nil {
|
|
|
+ return "", err
|
|
|
+ }
|
|
|
+ return base64.StdEncoding.EncodeToString(encrypted), nil
|
|
|
+}
|