user_auth.go 5.6 KB

123456789101112131415161718192021222324252627282930313233343536373839404142434445464748495051525354555657585960616263646566676869707172737475767778798081828384858687888990919293949596979899100101102103104105106107108109110111112113114115116117118119120121122123124125126127128129130131132133134135136137138139140141142143144145146147148149150151152153154155156157158159160161162163164165166167168169170171172173174175176177178179180181182183184185186187188189190191192193194195196197198199200201202203204205206207208209210211212213214215216217218219220221222223224225226227228229230231232
  1. package sqlstore
  2. import (
  3. "time"
  4. "github.com/grafana/grafana/pkg/bus"
  5. m "github.com/grafana/grafana/pkg/models"
  6. "github.com/grafana/grafana/pkg/setting"
  7. "github.com/grafana/grafana/pkg/util"
  8. )
  9. func init() {
  10. bus.AddHandler("sql", GetUserByAuthInfo)
  11. bus.AddHandler("sql", GetAuthInfo)
  12. bus.AddHandler("sql", SetAuthInfo)
  13. bus.AddHandler("sql", UpdateAuthInfo)
  14. bus.AddHandler("sql", DeleteAuthInfo)
  15. }
  16. func GetUserByAuthInfo(query *m.GetUserByAuthInfoQuery) error {
  17. user := &m.User{}
  18. has := false
  19. var err error
  20. authQuery := &m.GetAuthInfoQuery{}
  21. // Try to find the user by auth module and id first
  22. if query.AuthModule != "" && query.AuthId != "" {
  23. authQuery.AuthModule = query.AuthModule
  24. authQuery.AuthId = query.AuthId
  25. err = GetAuthInfo(authQuery)
  26. if err != m.ErrUserNotFound {
  27. if err != nil {
  28. return err
  29. }
  30. // if user id was specified and doesn't match the user_auth entry, remove it
  31. if query.UserId != 0 && query.UserId != authQuery.Result.UserId {
  32. err = DeleteAuthInfo(&m.DeleteAuthInfoCommand{
  33. UserAuth: authQuery.Result,
  34. })
  35. if err != nil {
  36. sqlog.Error("Error removing user_auth entry", "error", err)
  37. }
  38. authQuery.Result = nil
  39. } else {
  40. has, err = x.Id(authQuery.Result.UserId).Get(user)
  41. if err != nil {
  42. return err
  43. }
  44. if !has {
  45. // if the user has been deleted then remove the entry
  46. err = DeleteAuthInfo(&m.DeleteAuthInfoCommand{
  47. UserAuth: authQuery.Result,
  48. })
  49. if err != nil {
  50. sqlog.Error("Error removing user_auth entry", "error", err)
  51. }
  52. authQuery.Result = nil
  53. }
  54. }
  55. }
  56. }
  57. // If not found, try to find the user by id
  58. if !has && query.UserId != 0 {
  59. has, err = x.Id(query.UserId).Get(user)
  60. if err != nil {
  61. return err
  62. }
  63. }
  64. // If not found, try to find the user by email address
  65. if !has && query.Email != "" {
  66. user = &m.User{Email: query.Email}
  67. has, err = x.Get(user)
  68. if err != nil {
  69. return err
  70. }
  71. }
  72. // If not found, try to find the user by login
  73. if !has && query.Login != "" {
  74. user = &m.User{Login: query.Login}
  75. has, err = x.Get(user)
  76. if err != nil {
  77. return err
  78. }
  79. }
  80. // No user found
  81. if !has {
  82. return m.ErrUserNotFound
  83. }
  84. // create authInfo record to link accounts
  85. if authQuery.Result == nil && query.AuthModule != "" {
  86. cmd2 := &m.SetAuthInfoCommand{
  87. UserId: user.Id,
  88. AuthModule: query.AuthModule,
  89. AuthId: query.AuthId,
  90. }
  91. if err := SetAuthInfo(cmd2); err != nil {
  92. return err
  93. }
  94. }
  95. query.Result = user
  96. return nil
  97. }
  98. func GetAuthInfo(query *m.GetAuthInfoQuery) error {
  99. userAuth := &m.UserAuth{
  100. UserId: query.UserId, // TODO this doesn't have an index in the db
  101. AuthModule: query.AuthModule,
  102. AuthId: query.AuthId,
  103. }
  104. has, err := x.Get(userAuth)
  105. if err != nil {
  106. return err
  107. }
  108. if !has {
  109. return m.ErrUserNotFound
  110. }
  111. if userAuth.OAuthAccessToken != "" {
  112. accessToken, err := util.Decrypt([]byte(userAuth.OAuthAccessToken), setting.SecretKey)
  113. if err != nil {
  114. return err
  115. }
  116. userAuth.OAuthAccessToken = string(accessToken)
  117. }
  118. if userAuth.OAuthRefreshToken != "" {
  119. refreshToken, err := util.Decrypt([]byte(userAuth.OAuthRefreshToken), setting.SecretKey)
  120. if err != nil {
  121. return err
  122. }
  123. userAuth.OAuthRefreshToken = string(refreshToken)
  124. }
  125. if userAuth.OAuthTokenType != "" {
  126. tokenType, err := util.Decrypt([]byte(userAuth.OAuthTokenType), setting.SecretKey)
  127. if err != nil {
  128. return err
  129. }
  130. userAuth.OAuthTokenType = string(tokenType)
  131. }
  132. query.Result = userAuth
  133. return nil
  134. }
  135. func SetAuthInfo(cmd *m.SetAuthInfoCommand) error {
  136. return inTransaction(func(sess *DBSession) error {
  137. authUser := &m.UserAuth{
  138. UserId: cmd.UserId,
  139. AuthModule: cmd.AuthModule,
  140. AuthId: cmd.AuthId,
  141. Created: time.Now(),
  142. }
  143. if cmd.OAuthToken != nil {
  144. secretAccessToken, err := util.Encrypt([]byte(cmd.OAuthToken.AccessToken), setting.SecretKey)
  145. if err != nil {
  146. return err
  147. }
  148. secretRefreshToken, err := util.Encrypt([]byte(cmd.OAuthToken.RefreshToken), setting.SecretKey)
  149. if err != nil {
  150. return err
  151. }
  152. secretTokenType, err := util.Encrypt([]byte(cmd.OAuthToken.TokenType), setting.SecretKey)
  153. if err != nil {
  154. return err
  155. }
  156. authUser.OAuthAccessToken = string(secretAccessToken)
  157. authUser.OAuthRefreshToken = string(secretRefreshToken)
  158. authUser.OAuthTokenType = string(secretTokenType)
  159. authUser.OAuthExpiry = cmd.OAuthToken.Expiry
  160. }
  161. _, err := sess.Insert(authUser)
  162. return err
  163. })
  164. }
  165. func UpdateAuthInfo(cmd *m.UpdateAuthInfoCommand) error {
  166. return inTransaction(func(sess *DBSession) error {
  167. authUser := &m.UserAuth{
  168. UserId: cmd.UserId,
  169. AuthModule: cmd.AuthModule,
  170. AuthId: cmd.AuthId,
  171. Created: time.Now(),
  172. }
  173. if cmd.OAuthToken != nil {
  174. secretAccessToken, err := util.Encrypt([]byte(cmd.OAuthToken.AccessToken), setting.SecretKey)
  175. if err != nil {
  176. return err
  177. }
  178. secretRefreshToken, err := util.Encrypt([]byte(cmd.OAuthToken.RefreshToken), setting.SecretKey)
  179. if err != nil {
  180. return err
  181. }
  182. secretTokenType, err := util.Encrypt([]byte(cmd.OAuthToken.TokenType), setting.SecretKey)
  183. if err != nil {
  184. return err
  185. }
  186. authUser.OAuthAccessToken = string(secretAccessToken)
  187. authUser.OAuthRefreshToken = string(secretRefreshToken)
  188. authUser.OAuthTokenType = string(secretTokenType)
  189. authUser.OAuthExpiry = cmd.OAuthToken.Expiry
  190. }
  191. cond := &m.UserAuth{
  192. UserId: cmd.UserId,
  193. AuthModule: cmd.AuthModule,
  194. }
  195. _, err := sess.Update(authUser, cond)
  196. return err
  197. })
  198. }
  199. func DeleteAuthInfo(cmd *m.DeleteAuthInfoCommand) error {
  200. return inTransaction(func(sess *DBSession) error {
  201. _, err := sess.Delete(cmd.UserAuth)
  202. return err
  203. })
  204. }