mirror of
https://github.com/grafana/grafana.git
synced 2024-11-29 20:24:18 -06:00
5652bde447
* Use secrets service in pluginproxy
* Use secrets service in pluginxontext
* Use secrets service in pluginsettings
* Use secrets service in provisioning
* Use secrets service in authinfoservice
* Use secrets service in api
* Use secrets service in sqlstore
* Use secrets service in dashboardshapshots
* Use secrets service in tsdb
* Use secrets service in datasources
* Use secrets service in alerting
* Use secrets service in ngalert
* Break cyclic dependancy
* Refactor service
* Break cyclic dependancy
* Add FakeSecretsStore
* Setup Secrets Service in sqlstore
* Fix
* Continue secrets service refactoring
* Fix cyclic dependancy in sqlstore tests
* Fix secrets service references
* Fix linter errors
* Add fake secrets service for tests
* Refactor SetupTestSecretsService
* Update setting up secret service in tests
* Fix missing secrets service in multiorg_alertmanager_test
* Use fake db in tests and sort imports
* Use fake db in datasources tests
* Fix more tests
* Fix linter issues
* Attempt to fix plugin proxy tests
* Pass secrets service to getPluginProxiedRequest in pluginproxy tests
* Fix pluginproxy tests
* Revert using secrets service in alerting and provisioning
* Update decryptFn in alerting migration
* Rename defaultProvider to currentProvider
* Use fake secrets service in alert channels tests
* Refactor secrets service test helper
* Update setting up secrets service in tests
* Revert alerting changes in api
* Add comments
* Remove secrets service from background services
* Convert global encryption functions into vars
* Revert "Convert global encryption functions into vars"
This reverts commit 498eb19859
.
* Add feature toggle for envelope encryption
* Rename toggle
Co-authored-by: Emil Tullstedt <emil.tullstedt@grafana.com>
Co-authored-by: Joan López de la Franca Beltran <joanjan14@gmail.com>
149 lines
3.6 KiB
Go
149 lines
3.6 KiB
Go
package util
|
|
|
|
import (
|
|
"bytes"
|
|
"crypto/aes"
|
|
"crypto/cipher"
|
|
"crypto/rand"
|
|
"crypto/sha256"
|
|
"encoding/base64"
|
|
"errors"
|
|
"fmt"
|
|
"io"
|
|
|
|
"golang.org/x/crypto/pbkdf2"
|
|
)
|
|
|
|
const (
|
|
saltLength = 8
|
|
aesCfb = "aes-cfb"
|
|
aesGcm = "aes-gcm"
|
|
encryptionAlgorithmDelimiter = '*'
|
|
)
|
|
|
|
// Decrypt decrypts a payload with a given secret.
|
|
// DEPRECATED. Do not use it.
|
|
// Use secrets.Service instead.
|
|
func Decrypt(payload []byte, secret string) ([]byte, error) {
|
|
alg, payload, err := deriveEncryptionAlgorithm(payload)
|
|
if err != nil {
|
|
return nil, err
|
|
}
|
|
|
|
if len(payload) < saltLength {
|
|
return nil, fmt.Errorf("unable to compute salt")
|
|
}
|
|
salt := payload[:saltLength]
|
|
key, err := encryptionKeyToBytes(secret, string(salt))
|
|
if err != nil {
|
|
return nil, err
|
|
}
|
|
|
|
block, err := aes.NewCipher(key)
|
|
if err != nil {
|
|
return nil, err
|
|
}
|
|
|
|
switch alg {
|
|
case aesGcm:
|
|
return decryptGCM(block, payload)
|
|
default:
|
|
return decryptCFB(block, payload)
|
|
}
|
|
}
|
|
|
|
func deriveEncryptionAlgorithm(payload []byte) (string, []byte, error) {
|
|
if len(payload) == 0 {
|
|
return "", nil, fmt.Errorf("unable to derive encryption algorithm")
|
|
}
|
|
|
|
if payload[0] != encryptionAlgorithmDelimiter {
|
|
return aesCfb, payload, nil // backwards compatibility
|
|
}
|
|
|
|
payload = payload[1:]
|
|
algDelim := bytes.Index(payload, []byte{encryptionAlgorithmDelimiter})
|
|
if algDelim == -1 {
|
|
return aesCfb, payload, nil // backwards compatibility
|
|
}
|
|
|
|
algB64 := payload[:algDelim]
|
|
payload = payload[algDelim+1:]
|
|
|
|
alg := make([]byte, base64.RawStdEncoding.DecodedLen(len(algB64)))
|
|
|
|
_, err := base64.RawStdEncoding.Decode(alg, algB64)
|
|
if err != nil {
|
|
return "", nil, err
|
|
}
|
|
|
|
return string(alg), payload, nil
|
|
}
|
|
|
|
func decryptGCM(block cipher.Block, payload []byte) ([]byte, error) {
|
|
gcm, err := cipher.NewGCM(block)
|
|
if err != nil {
|
|
return nil, err
|
|
}
|
|
|
|
nonce := payload[saltLength : saltLength+gcm.NonceSize()]
|
|
ciphertext := payload[saltLength+gcm.NonceSize():]
|
|
return gcm.Open(nil, nonce, ciphertext, nil)
|
|
}
|
|
|
|
func decryptCFB(block cipher.Block, payload []byte) ([]byte, error) {
|
|
// The IV needs to be unique, but not secure. Therefore it's common to
|
|
// include it at the beginning of the ciphertext.
|
|
if len(payload) < aes.BlockSize {
|
|
return nil, errors.New("payload too short")
|
|
}
|
|
|
|
iv := payload[saltLength : saltLength+aes.BlockSize]
|
|
payload = payload[saltLength+aes.BlockSize:]
|
|
payloadDst := make([]byte, len(payload))
|
|
|
|
stream := cipher.NewCFBDecrypter(block, iv)
|
|
|
|
// XORKeyStream can work in-place if the two arguments are the same.
|
|
stream.XORKeyStream(payloadDst, payload)
|
|
return payloadDst, nil
|
|
}
|
|
|
|
// Encrypt encrypts a payload with a given secret.
|
|
// DEPRECATED. Do not use it.
|
|
// Use secrets.Service instead.
|
|
func Encrypt(payload []byte, secret string) ([]byte, error) {
|
|
salt, err := GetRandomString(saltLength)
|
|
if err != nil {
|
|
return nil, err
|
|
}
|
|
|
|
key, err := encryptionKeyToBytes(secret, salt)
|
|
if err != nil {
|
|
return nil, err
|
|
}
|
|
block, err := aes.NewCipher(key)
|
|
if err != nil {
|
|
return nil, err
|
|
}
|
|
|
|
// The IV needs to be unique, but not secure. Therefore it's common to
|
|
// include it at the beginning of the ciphertext.
|
|
ciphertext := make([]byte, saltLength+aes.BlockSize+len(payload))
|
|
copy(ciphertext[:saltLength], salt)
|
|
iv := ciphertext[saltLength : saltLength+aes.BlockSize]
|
|
if _, err := io.ReadFull(rand.Reader, iv); err != nil {
|
|
return nil, err
|
|
}
|
|
|
|
stream := cipher.NewCFBEncrypter(block, iv)
|
|
stream.XORKeyStream(ciphertext[saltLength+aes.BlockSize:], payload)
|
|
|
|
return ciphertext, nil
|
|
}
|
|
|
|
// Key needs to be 32bytes
|
|
func encryptionKeyToBytes(secret, salt string) ([]byte, error) {
|
|
return pbkdf2.Key([]byte(secret), []byte(salt), 10000, 32, sha256.New), nil
|
|
}
|