mirror of
https://github.com/casdoor/casdoor.git
synced 2025-07-01 10:00:19 +08:00
feat: add organization's PasswordObfuscator to obfuscate login API's password (#3260)
* feat: add PasswordObfuscator to the login API * fix: change key error message * fix: remove unnecessary change * fix: fix one * fix: fix two * fix: fix three * fix: fix five * fix: disable organization update when key is invalid * fix: fix six * fix: use Form.Item to control key * fix: update obfuscator.js * Update obfuscator.go * Update obfuscator.go * Update auth.go * fix: remove real-time key monitoring --------- Co-authored-by: Yang Luo <hsluoyz@qq.com>
This commit is contained in:
76
util/obfuscator.go
Normal file
76
util/obfuscator.go
Normal file
@ -0,0 +1,76 @@
|
||||
// Copyright 2024 The Casdoor Authors. All Rights Reserved.
|
||||
//
|
||||
// Licensed under the Apache License, Version 2.0 (the "License");
|
||||
// you may not use this file except in compliance with the License.
|
||||
// You may obtain a copy of the License at
|
||||
//
|
||||
// http://www.apache.org/licenses/LICENSE-2.0
|
||||
//
|
||||
// Unless required by applicable law or agreed to in writing, software
|
||||
// distributed under the License is distributed on an "AS IS" BASIS,
|
||||
// WITHOUT WARRANTIES OR CONDITIONS OF ANY KIND, either express or implied.
|
||||
// See the License for the specific language governing permissions and
|
||||
// limitations under the License.
|
||||
|
||||
package util
|
||||
|
||||
import (
|
||||
"crypto/aes"
|
||||
"crypto/cipher"
|
||||
"crypto/des"
|
||||
"encoding/hex"
|
||||
"fmt"
|
||||
)
|
||||
|
||||
func unPaddingPkcs7(s []byte) []byte {
|
||||
length := len(s)
|
||||
if length == 0 {
|
||||
return s
|
||||
}
|
||||
unPadding := int(s[length-1])
|
||||
return s[:(length - unPadding)]
|
||||
}
|
||||
|
||||
func decryptDesOrAes(passwordCipher string, block cipher.Block) (string, error) {
|
||||
passwordCipherBytes, err := hex.DecodeString(passwordCipher)
|
||||
if err != nil {
|
||||
return "", err
|
||||
}
|
||||
|
||||
if len(passwordCipherBytes) < block.BlockSize() {
|
||||
return "", fmt.Errorf("the password ciphertext should contain a random hexadecimal string of length %d at the beginning", block.BlockSize()*2)
|
||||
}
|
||||
|
||||
iv := passwordCipherBytes[:block.BlockSize()]
|
||||
password := make([]byte, len(passwordCipherBytes)-block.BlockSize())
|
||||
|
||||
mode := cipher.NewCBCDecrypter(block, iv)
|
||||
mode.CryptBlocks(password, passwordCipherBytes[block.BlockSize():])
|
||||
|
||||
return string(unPaddingPkcs7(password)), nil
|
||||
}
|
||||
|
||||
func GetUnobfuscatedPassword(passwordObfuscatorType string, passwordObfuscatorKey string, passwordCipher string) (string, error) {
|
||||
if passwordObfuscatorType == "Plain" || passwordObfuscatorType == "" {
|
||||
return passwordCipher, nil
|
||||
} else if passwordObfuscatorType == "DES" || passwordObfuscatorType == "AES" {
|
||||
key, err := hex.DecodeString(passwordObfuscatorKey)
|
||||
if err != nil {
|
||||
return "", err
|
||||
}
|
||||
|
||||
var block cipher.Block
|
||||
if passwordObfuscatorType == "DES" {
|
||||
block, err = des.NewCipher(key)
|
||||
} else {
|
||||
block, err = aes.NewCipher(key)
|
||||
}
|
||||
if err != nil {
|
||||
return "", err
|
||||
}
|
||||
|
||||
return decryptDesOrAes(passwordCipher, block)
|
||||
} else {
|
||||
return "", fmt.Errorf("unsupported password obfuscator type: %s", passwordObfuscatorType)
|
||||
}
|
||||
}
|
Reference in New Issue
Block a user