mirror of
https://github.com/infiniflow/ragflow.git
synced 2026-03-19 05:37:51 +08:00
### What problem does this PR solve? Fix: Enhanced user management functionality and cascading data deletion. Added tenant and related data initialization functionality during user creation, including tenants, user-tenant relationships, LLM configuration, and root folder. Added cascading deletion logic for user deletion, ensuring that all associated data is cleaned up simultaneously when a user is deleted. Implemented a Werkzeug-compatible password hash algorithm (scrypt) and verification functionality. Added multiple DAO methods to support batch data operations and cascading deletion. Improved user login processing and added token signing functionality. ### Type of change - [x] Bug Fix (non-breaking change which fixes an issue)
242 lines
6.6 KiB
Go
242 lines
6.6 KiB
Go
//
|
|
// Copyright 2026 The InfiniFlow Authors. All Rights Reserved.
|
|
//
|
|
// Licensed under the Apache License, Version 2.0 (the "License");
|
|
// you may not use this file except in compliance with the License.
|
|
// You may obtain a copy of the License at
|
|
//
|
|
// http://www.apache.org/licenses/LICENSE-2.0
|
|
//
|
|
// Unless required by applicable law or agreed to in writing, software
|
|
// distributed under the License is distributed on an "AS IS" BASIS,
|
|
// WITHOUT WARRANTIES OR CONDITIONS OF ANY KIND, either express or implied.
|
|
// See the License for the specific language governing permissions and
|
|
// limitations under the License.
|
|
//
|
|
|
|
package admin
|
|
|
|
import (
|
|
"crypto/rand"
|
|
"crypto/rsa"
|
|
"crypto/sha256"
|
|
"crypto/x509"
|
|
"encoding/base64"
|
|
"encoding/hex"
|
|
"encoding/pem"
|
|
"errors"
|
|
"fmt"
|
|
"os"
|
|
"strconv"
|
|
"strings"
|
|
|
|
"golang.org/x/crypto/pbkdf2"
|
|
"golang.org/x/crypto/scrypt"
|
|
)
|
|
|
|
// CheckWerkzeugPassword verifies a password against a werkzeug password hash
|
|
// Supports both pbkdf2 and scrypt formats
|
|
func CheckWerkzeugPassword(password, hashStr string) bool {
|
|
if strings.HasPrefix(hashStr, "scrypt:") {
|
|
return checkScryptPassword(password, hashStr)
|
|
}
|
|
if strings.HasPrefix(hashStr, "pbkdf2:") {
|
|
return checkPBKDF2Password(password, hashStr)
|
|
}
|
|
return false
|
|
}
|
|
|
|
// checkScryptPassword verifies password using scrypt format
|
|
// Format: scrypt:n:r:p$base64(salt)$hex(hash)
|
|
// IMPORTANT: werkzeug uses the base64-encoded salt string as UTF-8 bytes, NOT the decoded bytes
|
|
func checkScryptPassword(password, hashStr string) bool {
|
|
parts := strings.Split(hashStr, "$")
|
|
if len(parts) != 3 {
|
|
return false
|
|
}
|
|
|
|
params := strings.Split(parts[0], ":")
|
|
if len(params) != 4 || params[0] != "scrypt" {
|
|
return false
|
|
}
|
|
|
|
n, err := strconv.ParseUint(params[1], 10, 0)
|
|
if err != nil {
|
|
return false
|
|
}
|
|
r, err := strconv.ParseUint(params[2], 10, 0)
|
|
if err != nil {
|
|
return false
|
|
}
|
|
p, err := strconv.ParseUint(params[3], 10, 0)
|
|
if err != nil {
|
|
return false
|
|
}
|
|
|
|
saltB64 := parts[1]
|
|
hashHex := parts[2]
|
|
|
|
// IMPORTANT: werkzeug uses the base64 string as UTF-8 bytes, NOT decoded bytes
|
|
// This is the key difference from standard implementations
|
|
salt := []byte(saltB64)
|
|
|
|
// Decode hash from hex
|
|
expectedHash, err := hex.DecodeString(hashHex)
|
|
if err != nil {
|
|
return false
|
|
}
|
|
|
|
computed, err := scrypt.Key([]byte(password), salt, int(n), int(r), int(p), len(expectedHash))
|
|
if err != nil {
|
|
return false
|
|
}
|
|
|
|
return constantTimeCompare(expectedHash, computed)
|
|
}
|
|
|
|
// checkPBKDF2Password verifies password using PBKDF2 format
|
|
// Format: pbkdf2:sha256:iterations$base64(salt)$base64(hash)
|
|
func checkPBKDF2Password(password, hashStr string) bool {
|
|
parts := strings.Split(hashStr, "$")
|
|
if len(parts) != 3 {
|
|
return false
|
|
}
|
|
|
|
methodParts := strings.Split(parts[0], ":")
|
|
if len(methodParts) != 3 || methodParts[0] != "pbkdf2" {
|
|
return false
|
|
}
|
|
|
|
iterations, err := strconv.Atoi(methodParts[2])
|
|
if err != nil {
|
|
return false
|
|
}
|
|
|
|
salt := parts[1]
|
|
expectedHash := parts[2]
|
|
|
|
saltBytes, err := base64.StdEncoding.DecodeString(salt)
|
|
if err != nil {
|
|
saltBytes, err = hex.DecodeString(salt)
|
|
if err != nil {
|
|
return false
|
|
}
|
|
}
|
|
|
|
key := pbkdf2.Key([]byte(password), saltBytes, iterations, 32, sha256.New)
|
|
computedHash := base64.StdEncoding.EncodeToString(key)
|
|
|
|
return computedHash == expectedHash
|
|
}
|
|
|
|
// constantTimeCompare performs constant time comparison
|
|
func constantTimeCompare(a, b []byte) bool {
|
|
if len(a) != len(b) {
|
|
return false
|
|
}
|
|
var result byte
|
|
for i := 0; i < len(a); i++ {
|
|
result |= a[i] ^ b[i]
|
|
}
|
|
return result == 0
|
|
}
|
|
|
|
// IsWerkzeugHash checks if a hash is in werkzeug format
|
|
func IsWerkzeugHash(hashStr string) bool {
|
|
return strings.HasPrefix(hashStr, "scrypt:") || strings.HasPrefix(hashStr, "pbkdf2:")
|
|
}
|
|
|
|
// GenerateWerkzeugPasswordHash generates a werkzeug-compatible password hash using scrypt
|
|
// This matches Python werkzeug's default behavior
|
|
func GenerateWerkzeugPasswordHash(password string, iterations int) (string, error) {
|
|
// Generate random bytes (12 bytes will produce 16-char base64 string)
|
|
randomBytes := make([]byte, 12)
|
|
if _, err := rand.Read(randomBytes); err != nil {
|
|
return "", err
|
|
}
|
|
|
|
// Encode to base64 string (this will be 16 characters)
|
|
saltB64 := base64.StdEncoding.EncodeToString(randomBytes)
|
|
|
|
// Use scrypt with werkzeug default parameters: N=32768, r=8, p=1, keyLen=64
|
|
// IMPORTANT: werkzeug uses the base64 string as UTF-8 bytes, NOT the decoded bytes
|
|
hash, err := scrypt.Key([]byte(password), []byte(saltB64), 32768, 8, 1, 64)
|
|
if err != nil {
|
|
return "", err
|
|
}
|
|
|
|
// Format: scrypt:n:r:p$base64(salt)$hex(hash)
|
|
return fmt.Sprintf("scrypt:32768:8:1$%s$%x", saltB64, hash), nil
|
|
}
|
|
|
|
// DecryptPassword decrypts the password using RSA private key
|
|
// The password is expected to be base64 encoded RSA encrypted data
|
|
// If decryption fails, the original password is returned (assumed to be plain text)
|
|
func DecryptPassword(encryptedPassword string) (string, error) {
|
|
// Try to decode base64
|
|
ciphertext, err := base64.StdEncoding.DecodeString(encryptedPassword)
|
|
if err != nil {
|
|
// If base64 decoding fails, assume it's already a plain password
|
|
return encryptedPassword, nil
|
|
}
|
|
|
|
// Load private key
|
|
privateKey, err := loadPrivateKey()
|
|
if err != nil {
|
|
return "", err
|
|
}
|
|
|
|
// Decrypt using PKCS#1 v1.5
|
|
plaintext, err := rsa.DecryptPKCS1v15(nil, privateKey, ciphertext)
|
|
if err != nil {
|
|
// If decryption fails, assume it's already a plain password
|
|
return encryptedPassword, nil
|
|
}
|
|
|
|
return string(plaintext), nil
|
|
}
|
|
|
|
// loadPrivateKey loads and decrypts the RSA private key from conf/private.pem
|
|
func loadPrivateKey() (*rsa.PrivateKey, error) {
|
|
// Read private key file
|
|
keyData, err := os.ReadFile("conf/private.pem")
|
|
if err != nil {
|
|
return nil, fmt.Errorf("failed to read private key file: %w", err)
|
|
}
|
|
|
|
// Parse PEM block
|
|
block, _ := pem.Decode(keyData)
|
|
if block == nil {
|
|
return nil, errors.New("failed to decode PEM block")
|
|
}
|
|
|
|
// Decrypt the PEM block if it's encrypted
|
|
var privateKey interface{}
|
|
if block.Headers["Proc-Type"] == "4,ENCRYPTED" {
|
|
// Decrypt using password "Welcome"
|
|
decryptedData, err := x509.DecryptPEMBlock(block, []byte("Welcome"))
|
|
if err != nil {
|
|
return nil, fmt.Errorf("failed to decrypt private key: %w", err)
|
|
}
|
|
|
|
// Parse the decrypted key
|
|
privateKey, err = x509.ParsePKCS1PrivateKey(decryptedData)
|
|
if err != nil {
|
|
return nil, fmt.Errorf("failed to parse private key: %w", err)
|
|
}
|
|
} else {
|
|
// Not encrypted, parse directly
|
|
privateKey, err = x509.ParsePKCS1PrivateKey(block.Bytes)
|
|
if err != nil {
|
|
return nil, fmt.Errorf("failed to parse private key: %w", err)
|
|
}
|
|
}
|
|
|
|
rsaPrivateKey, ok := privateKey.(*rsa.PrivateKey)
|
|
if !ok {
|
|
return nil, errors.New("not an RSA private key")
|
|
}
|
|
|
|
return rsaPrivateKey, nil
|
|
}
|