mirror of
https://github.com/grafana/grafana.git
synced 2025-02-15 01:53:33 -06:00
* Encryption: De-duplicate encryption code with extensible service * Fix Wire injections * Fix tests * Register reload handler
46 lines
1.1 KiB
Go
46 lines
1.1 KiB
Go
package provider
|
|
|
|
import (
|
|
"context"
|
|
"crypto/aes"
|
|
"crypto/cipher"
|
|
"crypto/rand"
|
|
"io"
|
|
|
|
"github.com/grafana/grafana/pkg/services/encryption"
|
|
"github.com/grafana/grafana/pkg/util"
|
|
)
|
|
|
|
type aesCfbCipher struct{}
|
|
|
|
func (c aesCfbCipher) Encrypt(_ context.Context, payload []byte, secret string) ([]byte, error) {
|
|
salt, err := util.GetRandomString(encryption.SaltLength)
|
|
if err != nil {
|
|
return nil, err
|
|
}
|
|
|
|
key, err := encryption.KeyToBytes(secret, salt)
|
|
if err != nil {
|
|
return nil, err
|
|
}
|
|
|
|
block, err := aes.NewCipher(key)
|
|
if err != nil {
|
|
return nil, err
|
|
}
|
|
|
|
// The IV needs to be unique, but not secure. Therefore, it's common to
|
|
// include it at the beginning of the ciphertext.
|
|
ciphertext := make([]byte, encryption.SaltLength+aes.BlockSize+len(payload))
|
|
copy(ciphertext[:encryption.SaltLength], salt)
|
|
iv := ciphertext[encryption.SaltLength : encryption.SaltLength+aes.BlockSize]
|
|
if _, err := io.ReadFull(rand.Reader, iv); err != nil {
|
|
return nil, err
|
|
}
|
|
|
|
stream := cipher.NewCFBEncrypter(block, iv)
|
|
stream.XORKeyStream(ciphertext[encryption.SaltLength+aes.BlockSize:], payload)
|
|
|
|
return ciphertext, nil
|
|
}
|