mirror of
				https://github.com/1Panel-dev/1Panel.git
				synced 2025-10-28 01:36:56 +08:00 
			
		
		
		
	
		
			
				
	
	
		
			228 lines
		
	
	
	
		
			5.9 KiB
		
	
	
	
		
			Go
		
	
	
	
	
	
			
		
		
	
	
			228 lines
		
	
	
	
		
			5.9 KiB
		
	
	
	
		
			Go
		
	
	
	
	
	
| package encrypt
 | |
| 
 | |
| import (
 | |
| 	"bytes"
 | |
| 	"crypto/aes"
 | |
| 	"crypto/cipher"
 | |
| 	"crypto/rand"
 | |
| 	"crypto/rsa"
 | |
| 	"crypto/x509"
 | |
| 	"encoding/base64"
 | |
| 	"encoding/pem"
 | |
| 	"errors"
 | |
| 	"fmt"
 | |
| 	"io"
 | |
| 	"strings"
 | |
| 
 | |
| 	"github.com/1Panel-dev/1Panel/core/app/model"
 | |
| 	"github.com/1Panel-dev/1Panel/core/global"
 | |
| )
 | |
| 
 | |
| func StringDecryptWithBase64(text string) (string, error) {
 | |
| 	decryptItem, err := StringDecrypt(text)
 | |
| 	if err != nil {
 | |
| 		return "", err
 | |
| 	}
 | |
| 	return base64.StdEncoding.EncodeToString([]byte(decryptItem)), nil
 | |
| }
 | |
| 
 | |
| func StringEncrypt(text string) (string, error) {
 | |
| 	if len(text) == 0 {
 | |
| 		return "", nil
 | |
| 	}
 | |
| 	if len(global.CONF.Base.EncryptKey) == 0 {
 | |
| 		var encryptSetting model.Setting
 | |
| 		if err := global.DB.Where("key = ?", "EncryptKey").First(&encryptSetting).Error; err != nil {
 | |
| 			return "", err
 | |
| 		}
 | |
| 		global.CONF.Base.EncryptKey = encryptSetting.Value
 | |
| 	}
 | |
| 	key := global.CONF.Base.EncryptKey
 | |
| 	return StringEncryptWithKey(text, key)
 | |
| }
 | |
| 
 | |
| func StringEncryptWithKey(text, key string) (string, error) {
 | |
| 	if len(text) == 0 || len(key) == 0 {
 | |
| 		return "", nil
 | |
| 	}
 | |
| 	pass := []byte(text)
 | |
| 	xpass, err := aesEncryptWithSalt([]byte(key), pass)
 | |
| 	if err == nil {
 | |
| 		pass64 := base64.StdEncoding.EncodeToString(xpass)
 | |
| 		return pass64, err
 | |
| 	}
 | |
| 	return "", err
 | |
| }
 | |
| 
 | |
| func StringDecrypt(text string) (string, error) {
 | |
| 	if len(text) == 0 {
 | |
| 		return "", nil
 | |
| 	}
 | |
| 	if len(global.CONF.Base.EncryptKey) == 0 {
 | |
| 		var encryptSetting model.Setting
 | |
| 		if err := global.DB.Where("key = ?", "EncryptKey").First(&encryptSetting).Error; err != nil {
 | |
| 			return "", err
 | |
| 		}
 | |
| 		global.CONF.Base.EncryptKey = encryptSetting.Value
 | |
| 	}
 | |
| 	key := global.CONF.Base.EncryptKey
 | |
| 	return StringDecryptWithKey(text, key)
 | |
| }
 | |
| 
 | |
| func StringDecryptWithKey(text, key string) (string, error) {
 | |
| 	defer func() {
 | |
| 		if r := recover(); r != nil {
 | |
| 			global.LOG.Errorf("A panic occurred during string decrypt with key, error message: %v", r)
 | |
| 		}
 | |
| 	}()
 | |
| 	if len(text) == 0 {
 | |
| 		return "", nil
 | |
| 	}
 | |
| 	bytesPass, err := base64.StdEncoding.DecodeString(text)
 | |
| 	if err != nil {
 | |
| 		return "", err
 | |
| 	}
 | |
| 	var tpass []byte
 | |
| 	tpass, err = aesDecryptWithSalt([]byte(key), bytesPass)
 | |
| 	if err == nil {
 | |
| 		result := string(tpass[:])
 | |
| 		return result, err
 | |
| 	}
 | |
| 	return "", err
 | |
| }
 | |
| 
 | |
| func padding(plaintext []byte, blockSize int) []byte {
 | |
| 	padding := blockSize - len(plaintext)%blockSize
 | |
| 	padtext := bytes.Repeat([]byte{byte(padding)}, padding)
 | |
| 	return append(plaintext, padtext...)
 | |
| }
 | |
| 
 | |
| func unPadding(origData []byte) []byte {
 | |
| 	length := len(origData)
 | |
| 	unpadding := int(origData[length-1])
 | |
| 	return origData[:(length - unpadding)]
 | |
| }
 | |
| 
 | |
| func aesEncryptWithSalt(key, plaintext []byte) ([]byte, error) {
 | |
| 	plaintext = padding(plaintext, aes.BlockSize)
 | |
| 	block, err := aes.NewCipher(key)
 | |
| 	if err != nil {
 | |
| 		return nil, err
 | |
| 	}
 | |
| 	ciphertext := make([]byte, aes.BlockSize+len(plaintext))
 | |
| 	iv := ciphertext[0:aes.BlockSize]
 | |
| 	if _, err := io.ReadFull(rand.Reader, iv); err != nil {
 | |
| 		return nil, err
 | |
| 	}
 | |
| 	cbc := cipher.NewCBCEncrypter(block, iv)
 | |
| 	cbc.CryptBlocks(ciphertext[aes.BlockSize:], plaintext)
 | |
| 	return ciphertext, nil
 | |
| }
 | |
| func aesDecryptWithSalt(key, ciphertext []byte) ([]byte, error) {
 | |
| 	var block cipher.Block
 | |
| 	block, err := aes.NewCipher(key)
 | |
| 	if err != nil {
 | |
| 		return nil, err
 | |
| 	}
 | |
| 	if len(ciphertext) < aes.BlockSize {
 | |
| 		return nil, fmt.Errorf("iciphertext too short")
 | |
| 	}
 | |
| 	iv := ciphertext[:aes.BlockSize]
 | |
| 	ciphertext = ciphertext[aes.BlockSize:]
 | |
| 	cbc := cipher.NewCBCDecrypter(block, iv)
 | |
| 	cbc.CryptBlocks(ciphertext, ciphertext)
 | |
| 	ciphertext = unPadding(ciphertext)
 | |
| 	return ciphertext, nil
 | |
| }
 | |
| 
 | |
| func ParseRSAPrivateKey(privateKeyPEM string) (*rsa.PrivateKey, error) {
 | |
| 	block, _ := pem.Decode([]byte(privateKeyPEM))
 | |
| 	if block == nil || block.Type != "RSA PRIVATE KEY" {
 | |
| 		return nil, errors.New("failed to decode PEM block containing the private key")
 | |
| 	}
 | |
| 	privateKey, err := x509.ParsePKCS1PrivateKey(block.Bytes)
 | |
| 	if err != nil {
 | |
| 		return nil, err
 | |
| 	}
 | |
| 	return privateKey, nil
 | |
| }
 | |
| 
 | |
| func aesDecrypt(ciphertext, key, iv []byte) ([]byte, error) {
 | |
| 	if len(key) != 16 && len(key) != 24 && len(key) != 32 {
 | |
| 		return nil, errors.New("invalid AES key length: must be 16, 24, or 32 bytes")
 | |
| 	}
 | |
| 	if len(iv) != aes.BlockSize {
 | |
| 		return nil, errors.New("invalid IV length: must be 16 bytes")
 | |
| 	}
 | |
| 
 | |
| 	block, err := aes.NewCipher(key)
 | |
| 	if err != nil {
 | |
| 		return nil, err
 | |
| 	}
 | |
| 	mode := cipher.NewCBCDecrypter(block, iv)
 | |
| 	mode.CryptBlocks(ciphertext, ciphertext)
 | |
| 	ciphertext = pkcs7Unpad(ciphertext)
 | |
| 	return ciphertext, nil
 | |
| }
 | |
| 
 | |
| func pkcs7Unpad(data []byte) []byte {
 | |
| 	length := len(data)
 | |
| 	padLength := int(data[length-1])
 | |
| 	return data[:length-padLength]
 | |
| }
 | |
| 
 | |
| func DecryptPassword(encryptedData string, privateKey *rsa.PrivateKey) (string, error) {
 | |
| 	parts := strings.Split(encryptedData, ":")
 | |
| 	if len(parts) != 3 {
 | |
| 		return "", errors.New("encrypted data format error")
 | |
| 	}
 | |
| 	keyCipher := parts[0]
 | |
| 	ivBase64 := parts[1]
 | |
| 	ciphertextBase64 := parts[2]
 | |
| 
 | |
| 	encryptedAESKey, err := base64.StdEncoding.DecodeString(keyCipher)
 | |
| 	if err != nil {
 | |
| 		return "", errors.New("failed to decode keyCipher")
 | |
| 	}
 | |
| 
 | |
| 	aesKey, err := rsa.DecryptPKCS1v15(rand.Reader, privateKey, encryptedAESKey)
 | |
| 	if err != nil {
 | |
| 		return "", errors.New("failed to decode AES Key")
 | |
| 	}
 | |
| 
 | |
| 	ciphertext, err := base64.StdEncoding.DecodeString(ciphertextBase64)
 | |
| 	if err != nil {
 | |
| 		return "", errors.New("failed to decrypt the encrypted data")
 | |
| 	}
 | |
| 	iv, err := base64.StdEncoding.DecodeString(ivBase64)
 | |
| 	if err != nil {
 | |
| 		return "", errors.New("failed to decode the IV")
 | |
| 	}
 | |
| 
 | |
| 	password, err := aesDecrypt(ciphertext, aesKey, iv)
 | |
| 	if err != nil {
 | |
| 		return "", err
 | |
| 	}
 | |
| 	return string(password), nil
 | |
| }
 | |
| 
 | |
| func ExportPrivateKeyToPEM(privateKey *rsa.PrivateKey) string {
 | |
| 	privateKeyBytes := x509.MarshalPKCS1PrivateKey(privateKey)
 | |
| 	privateKeyPEM := pem.EncodeToMemory(&pem.Block{
 | |
| 		Type:  "RSA PRIVATE KEY",
 | |
| 		Bytes: privateKeyBytes,
 | |
| 	})
 | |
| 	return string(privateKeyPEM)
 | |
| }
 | |
| 
 | |
| func ExportPublicKeyToPEM(publicKey *rsa.PublicKey) (string, error) {
 | |
| 	publicKeyBytes, err := x509.MarshalPKIXPublicKey(publicKey)
 | |
| 	if err != nil {
 | |
| 		return "", err
 | |
| 	}
 | |
| 	publicKeyPEM := pem.EncodeToMemory(&pem.Block{
 | |
| 		Type:  "PUBLIC KEY",
 | |
| 		Bytes: publicKeyBytes,
 | |
| 	})
 | |
| 	return string(publicKeyPEM), nil
 | |
| }
 |