mirror of
https://github.com/grafana/grafana.git
synced 2024-12-01 21:19:28 -06:00
a367ad730c
* wip: Implement kvstore for secrets
* wip: Refactor kvstore for secrets
* wip: Add format key function to secrets kvstore sql
* wip: Add migration for secrets kvstore
* Remove unused Key field from secrets kvstore
* Remove secret values from debug logs
* Integrate unified secrets with datasources
* Fix minor issues and tests for kvstore
* Create test service helper for secret store
* Remove encryption tests from datasources
* Move secret operations after datasources
* Fix datasource proxy tests
* Fix legacy data tests
* Add Name to all delete data source commands
* Implement decryption cache on sql secret store
* Fix minor issue with cache and tests
* Use secret type on secret store datasource operations
* Add comments to make create and update clear
* Rename itemFound variable to isFound
* Improve secret deletion and cache management
* Add base64 encoding to sql secret store
* Move secret retrieval to decrypted values function
* Refactor decrypt secure json data functions
* Fix expr tests
* Fix datasource tests
* Fix plugin proxy tests
* Fix query tests
* Fix metrics api tests
* Remove unused fake secrets service from query tests
* Add rename function to secret store
* Add check for error renaming secret
* Remove bus from tests to fix merge conflicts
* Add background secrets migration to datasources
* Get datasource secure json fields from secrets
* Move migration to secret store
* Revert "Move migration to secret store"
This reverts commit 7c3f872072
.
* Add secret service to datasource service on tests
* Fix datasource tests
* Remove merge conflict on wire
* Add ctx to data source http transport on prometheus stats collector
* Add ctx to data source http transport on stats collector test
221 lines
6.5 KiB
Go
221 lines
6.5 KiB
Go
package kvstore
|
|
|
|
import (
|
|
"context"
|
|
"encoding/base64"
|
|
"sync"
|
|
"time"
|
|
|
|
"github.com/grafana/grafana/pkg/infra/log"
|
|
"github.com/grafana/grafana/pkg/services/secrets"
|
|
"github.com/grafana/grafana/pkg/services/sqlstore"
|
|
)
|
|
|
|
// secretsKVStoreSQL provides a key/value store backed by the Grafana database
|
|
type secretsKVStoreSQL struct {
|
|
log log.Logger
|
|
sqlStore sqlstore.Store
|
|
secretsService secrets.Service
|
|
decryptionCache decryptionCache
|
|
}
|
|
|
|
type decryptionCache struct {
|
|
cache map[int64]cachedDecrypted
|
|
sync.Mutex
|
|
}
|
|
|
|
type cachedDecrypted struct {
|
|
updated time.Time
|
|
value string
|
|
}
|
|
|
|
var b64 = base64.RawStdEncoding
|
|
|
|
// Get an item from the store
|
|
func (kv *secretsKVStoreSQL) Get(ctx context.Context, orgId int64, namespace string, typ string) (string, bool, error) {
|
|
item := Item{
|
|
OrgId: &orgId,
|
|
Namespace: &namespace,
|
|
Type: &typ,
|
|
}
|
|
var isFound bool
|
|
var decryptedValue []byte
|
|
|
|
err := kv.sqlStore.WithDbSession(ctx, func(dbSession *sqlstore.DBSession) error {
|
|
has, err := dbSession.Get(&item)
|
|
if err != nil {
|
|
kv.log.Debug("error getting secret value", "orgId", orgId, "type", typ, "namespace", namespace, "err", err)
|
|
return err
|
|
}
|
|
if !has {
|
|
kv.log.Debug("secret value not found", "orgId", orgId, "type", typ, "namespace", namespace)
|
|
return nil
|
|
}
|
|
isFound = true
|
|
kv.log.Debug("got secret value", "orgId", orgId, "type", typ, "namespace", namespace)
|
|
return nil
|
|
})
|
|
|
|
if err == nil && isFound {
|
|
kv.decryptionCache.Lock()
|
|
defer kv.decryptionCache.Unlock()
|
|
|
|
if cache, present := kv.decryptionCache.cache[item.Id]; present && item.Updated.Equal(cache.updated) {
|
|
return cache.value, isFound, err
|
|
}
|
|
|
|
decodedValue, err := b64.DecodeString(item.Value)
|
|
if err != nil {
|
|
kv.log.Debug("error decoding secret value", "orgId", orgId, "type", typ, "namespace", namespace, "err", err)
|
|
return string(decryptedValue), isFound, err
|
|
}
|
|
|
|
decryptedValue, err = kv.secretsService.Decrypt(ctx, decodedValue)
|
|
if err != nil {
|
|
kv.log.Debug("error decrypting secret value", "orgId", orgId, "type", typ, "namespace", namespace, "err", err)
|
|
return string(decryptedValue), isFound, err
|
|
}
|
|
|
|
kv.decryptionCache.cache[item.Id] = cachedDecrypted{
|
|
updated: item.Updated,
|
|
value: string(decryptedValue),
|
|
}
|
|
}
|
|
|
|
return string(decryptedValue), isFound, err
|
|
}
|
|
|
|
// Set an item in the store
|
|
func (kv *secretsKVStoreSQL) Set(ctx context.Context, orgId int64, namespace string, typ string, value string) error {
|
|
encryptedValue, err := kv.secretsService.Encrypt(ctx, []byte(value), secrets.WithoutScope())
|
|
if err != nil {
|
|
kv.log.Debug("error encrypting secret value", "orgId", orgId, "type", typ, "namespace", namespace, "err", err)
|
|
return err
|
|
}
|
|
encodedValue := b64.EncodeToString(encryptedValue)
|
|
return kv.sqlStore.WithTransactionalDbSession(ctx, func(dbSession *sqlstore.DBSession) error {
|
|
item := Item{
|
|
OrgId: &orgId,
|
|
Namespace: &namespace,
|
|
Type: &typ,
|
|
}
|
|
|
|
has, err := dbSession.Get(&item)
|
|
if err != nil {
|
|
kv.log.Debug("error checking secret value", "orgId", orgId, "type", typ, "namespace", namespace, "err", err)
|
|
return err
|
|
}
|
|
|
|
if has && item.Value == encodedValue {
|
|
kv.log.Debug("secret value not changed", "orgId", orgId, "type", typ, "namespace", namespace)
|
|
return nil
|
|
}
|
|
|
|
item.Value = encodedValue
|
|
item.Updated = time.Now()
|
|
|
|
if has {
|
|
// if item already exists we update it
|
|
_, err = dbSession.ID(item.Id).Update(&item)
|
|
if err != nil {
|
|
kv.log.Debug("error updating secret value", "orgId", orgId, "type", typ, "namespace", namespace, "err", err)
|
|
} else {
|
|
kv.decryptionCache.cache[item.Id] = cachedDecrypted{
|
|
updated: item.Updated,
|
|
value: value,
|
|
}
|
|
kv.log.Debug("secret value updated", "orgId", orgId, "type", typ, "namespace", namespace)
|
|
}
|
|
return err
|
|
}
|
|
|
|
// if item doesn't exist we create it
|
|
item.Created = item.Updated
|
|
_, err = dbSession.Insert(&item)
|
|
if err != nil {
|
|
kv.log.Debug("error inserting secret value", "orgId", orgId, "type", typ, "namespace", namespace, "err", err)
|
|
} else {
|
|
kv.log.Debug("secret value inserted", "orgId", orgId, "type", typ, "namespace", namespace)
|
|
}
|
|
return err
|
|
})
|
|
}
|
|
|
|
// Del deletes an item from the store.
|
|
func (kv *secretsKVStoreSQL) Del(ctx context.Context, orgId int64, namespace string, typ string) error {
|
|
err := kv.sqlStore.WithDbSession(ctx, func(dbSession *sqlstore.DBSession) error {
|
|
item := Item{
|
|
OrgId: &orgId,
|
|
Namespace: &namespace,
|
|
Type: &typ,
|
|
}
|
|
|
|
has, err := dbSession.Get(&item)
|
|
if err != nil {
|
|
kv.log.Debug("error checking secret value", "orgId", orgId, "type", typ, "namespace", namespace, "err", err)
|
|
return err
|
|
}
|
|
|
|
if has {
|
|
// if item exists we delete it
|
|
_, err = dbSession.ID(item.Id).Delete(&item)
|
|
if err != nil {
|
|
kv.log.Debug("error deleting secret value", "orgId", orgId, "type", typ, "namespace", namespace, "err", err)
|
|
} else {
|
|
delete(kv.decryptionCache.cache, item.Id)
|
|
kv.log.Debug("secret value deleted", "orgId", orgId, "type", typ, "namespace", namespace)
|
|
}
|
|
return err
|
|
}
|
|
return nil
|
|
})
|
|
return err
|
|
}
|
|
|
|
// Keys get all keys for a given namespace. To query for all
|
|
// organizations the constant 'kvstore.AllOrganizations' can be passed as orgId.
|
|
func (kv *secretsKVStoreSQL) Keys(ctx context.Context, orgId int64, namespace string, typ string) ([]Key, error) {
|
|
var keys []Key
|
|
err := kv.sqlStore.WithDbSession(ctx, func(dbSession *sqlstore.DBSession) error {
|
|
query := dbSession.Where("namespace = ?", namespace).And("type = ?", typ)
|
|
if orgId != AllOrganizations {
|
|
query.And("org_id = ?", orgId)
|
|
}
|
|
return query.Find(&keys)
|
|
})
|
|
return keys, err
|
|
}
|
|
|
|
// Rename an item in the store
|
|
func (kv *secretsKVStoreSQL) Rename(ctx context.Context, orgId int64, namespace string, typ string, newNamespace string) error {
|
|
return kv.sqlStore.WithTransactionalDbSession(ctx, func(dbSession *sqlstore.DBSession) error {
|
|
item := Item{
|
|
OrgId: &orgId,
|
|
Namespace: &namespace,
|
|
Type: &typ,
|
|
}
|
|
|
|
has, err := dbSession.Get(&item)
|
|
if err != nil {
|
|
kv.log.Debug("error checking secret value", "orgId", orgId, "type", typ, "namespace", namespace, "err", err)
|
|
return err
|
|
}
|
|
|
|
item.Namespace = &newNamespace
|
|
item.Updated = time.Now()
|
|
|
|
if has {
|
|
// if item already exists we update it
|
|
_, err = dbSession.ID(item.Id).Update(&item)
|
|
if err != nil {
|
|
kv.log.Debug("error updating secret namespace", "orgId", orgId, "type", typ, "namespace", namespace, "err", err)
|
|
} else {
|
|
kv.log.Debug("secret namespace updated", "orgId", orgId, "type", typ, "namespace", namespace)
|
|
}
|
|
return err
|
|
}
|
|
|
|
return err
|
|
})
|
|
}
|