mirror of
https://github.com/infiniflow/ragflow.git
synced 2026-03-16 04:17:49 +08:00
### What problem does this PR solve? feat(admin): Implemented default administrator initialization and login functionality. Added support for default administrator configuration, including super user nickname, email, and password. ### Type of change - [x] Bug Fix (non-breaking change which fixes an issue)
112 lines
2.8 KiB
Go
112 lines
2.8 KiB
Go
//
|
|
// Copyright 2026 The InfiniFlow Authors. All Rights Reserved.
|
|
//
|
|
// Licensed under the Apache License, Version 2.0 (the "License");
|
|
// you may not use this file except in compliance with the License.
|
|
// You may obtain a copy of the License at
|
|
//
|
|
// http://www.apache.org/licenses/LICENSE-2.0
|
|
//
|
|
// Unless required by applicable law or agreed to in writing, software
|
|
// distributed under the License is distributed on an "AS IS" BASIS,
|
|
// WITHOUT WARRANTIES OR CONDITIONS OF ANY KIND, either express or implied.
|
|
// See the License for the specific language governing permissions and
|
|
// limitations under the License.
|
|
//
|
|
|
|
package admin
|
|
|
|
import (
|
|
"crypto/rand"
|
|
"crypto/sha256"
|
|
"encoding/base64"
|
|
"encoding/hex"
|
|
"fmt"
|
|
"hash"
|
|
"strconv"
|
|
"strings"
|
|
|
|
"golang.org/x/crypto/pbkdf2"
|
|
)
|
|
|
|
// CheckWerkzeugPassword verifies a password against a werkzeug password hash
|
|
// Format: pbkdf2:sha256:iterations$salt$hash
|
|
func CheckWerkzeugPassword(password, hashStr string) bool {
|
|
parts := strings.Split(hashStr, "$")
|
|
if len(parts) != 3 {
|
|
return false
|
|
}
|
|
|
|
// Parse method (e.g., "pbkdf2:sha256:150000")
|
|
methodParts := strings.Split(parts[0], ":")
|
|
if len(methodParts) != 3 {
|
|
return false
|
|
}
|
|
|
|
if methodParts[0] != "pbkdf2" {
|
|
return false
|
|
}
|
|
|
|
var hashFunc func() hash.Hash
|
|
switch methodParts[1] {
|
|
case "sha256":
|
|
hashFunc = sha256.New
|
|
case "sha512":
|
|
// sha512 not supported in this implementation
|
|
return false
|
|
default:
|
|
return false
|
|
}
|
|
|
|
iterations, err := strconv.Atoi(methodParts[2])
|
|
if err != nil {
|
|
return false
|
|
}
|
|
|
|
salt := parts[1]
|
|
expectedHash := parts[2]
|
|
|
|
// Decode salt from base64
|
|
saltBytes, err := base64.StdEncoding.DecodeString(salt)
|
|
if err != nil {
|
|
// Try hex encoding
|
|
saltBytes, err = hex.DecodeString(salt)
|
|
if err != nil {
|
|
return false
|
|
}
|
|
}
|
|
|
|
// Generate hash using PBKDF2
|
|
key := pbkdf2.Key([]byte(password), saltBytes, iterations, 32, hashFunc)
|
|
computedHash := base64.StdEncoding.EncodeToString(key)
|
|
|
|
return computedHash == expectedHash
|
|
}
|
|
|
|
// IsWerkzeugHash checks if a hash is in werkzeug format
|
|
func IsWerkzeugHash(hashStr string) bool {
|
|
return strings.HasPrefix(hashStr, "pbkdf2:")
|
|
}
|
|
|
|
// GenerateWerkzeugPasswordHash generates a werkzeug-compatible password hash
|
|
func GenerateWerkzeugPasswordHash(password string, iterations int) (string, error) {
|
|
if iterations == 0 {
|
|
iterations = 150000
|
|
}
|
|
|
|
// Generate random salt
|
|
salt := make([]byte, 16)
|
|
if _, err := rand.Read(salt); err != nil {
|
|
return "", err
|
|
}
|
|
|
|
// Generate hash using PBKDF2-SHA256
|
|
key := pbkdf2.Key([]byte(password), salt, iterations, 32, sha256.New)
|
|
|
|
// Format: pbkdf2:sha256:iterations$base64(salt)$base64(hash)
|
|
saltB64 := base64.StdEncoding.EncodeToString(salt)
|
|
hashB64 := base64.StdEncoding.EncodeToString(key)
|
|
|
|
return fmt.Sprintf("pbkdf2:sha256:%d$%s$%s", iterations, saltB64, hashB64), nil
|
|
}
|