对边缘节点配置缓存进行加密,提升安全性

This commit is contained in:
刘祥超
2023-03-02 10:28:15 +08:00
parent 4379acbeea
commit a068ce9a4f
3 changed files with 110 additions and 13 deletions

View File

@@ -1,10 +1,13 @@
package nodeconfigs package nodeconfigs
import ( import (
"bytes"
"crypto/sha256" "crypto/sha256"
"encoding/base64"
"encoding/json" "encoding/json"
"errors" "errors"
"fmt" "fmt"
"github.com/TeaOSLab/EdgeCommon/pkg/nodeutils"
"github.com/TeaOSLab/EdgeCommon/pkg/serverconfigs" "github.com/TeaOSLab/EdgeCommon/pkg/serverconfigs"
"github.com/TeaOSLab/EdgeCommon/pkg/serverconfigs/ddosconfigs" "github.com/TeaOSLab/EdgeCommon/pkg/serverconfigs/ddosconfigs"
"github.com/TeaOSLab/EdgeCommon/pkg/serverconfigs/firewallconfigs" "github.com/TeaOSLab/EdgeCommon/pkg/serverconfigs/firewallconfigs"
@@ -14,6 +17,7 @@ import (
"os" "os"
"reflect" "reflect"
"strconv" "strconv"
"strings"
) )
var sharedNodeConfig *NodeConfig = nil var sharedNodeConfig *NodeConfig = nil
@@ -122,17 +126,50 @@ func SharedNodeConfig() (*NodeConfig, error) {
return sharedNodeConfig, nil return sharedNodeConfig, nil
} }
data, err := os.ReadFile(Tea.ConfigFile("node.json")) // 从本地缓存读取
var configFile = Tea.ConfigFile("node.json")
var readCacheOk = false
defer func() {
if !readCacheOk {
_ = os.Remove(configFile)
}
}()
data, err := os.ReadFile(configFile)
if err != nil {
return &NodeConfig{}, err
}
encodedNodeInfo, encodedJSONData, found := bytes.Cut(data, []byte("\n"))
if !found {
// 删除缓存文件
return &NodeConfig{}, errors.New("node.json: invalid data format")
}
encodedNodeInfoData, err := base64.StdEncoding.DecodeString(string(encodedNodeInfo))
if err != nil {
// 删除缓存文件
return &NodeConfig{}, err
}
nodeUniqueId, nodeSecret, found := strings.Cut(string(encodedNodeInfoData), "|")
if !found {
// 删除缓存文件
return &NodeConfig{}, errors.New("node.json: node info: invalid data format")
}
jsonData, err := nodeutils.DecryptData(nodeUniqueId, nodeSecret, string(encodedJSONData))
if err != nil { if err != nil {
return &NodeConfig{}, err return &NodeConfig{}, err
} }
var config = &NodeConfig{} var config = &NodeConfig{}
err = json.Unmarshal(data, &config) err = json.Unmarshal(jsonData, &config)
if err != nil { if err != nil {
return &NodeConfig{}, err return &NodeConfig{}, err
} }
readCacheOk = true
sharedNodeConfig = config sharedNodeConfig = config
return config, nil return config, nil
} }
@@ -397,7 +434,7 @@ func (this *NodeConfig) RemoveServer(serverId int64) {
// AvailableGroups 根据网络地址和协议分组 // AvailableGroups 根据网络地址和协议分组
func (this *NodeConfig) AvailableGroups() []*serverconfigs.ServerAddressGroup { func (this *NodeConfig) AvailableGroups() []*serverconfigs.ServerAddressGroup {
groupMapping := map[string]*serverconfigs.ServerAddressGroup{} // protocol://addr => Server Group var groupMapping = map[string]*serverconfigs.ServerAddressGroup{} // protocol://addr => Server Group
for _, server := range this.Servers { for _, server := range this.Servers {
if !server.IsOk() || !server.IsOn { if !server.IsOk() || !server.IsOn {
continue continue
@@ -413,7 +450,7 @@ func (this *NodeConfig) AvailableGroups() []*serverconfigs.ServerAddressGroup {
groupMapping[addr] = group groupMapping[addr] = group
} }
} }
result := []*serverconfigs.ServerAddressGroup{} var result = []*serverconfigs.ServerAddressGroup{}
for _, group := range groupMapping { for _, group := range groupMapping {
result = append(result, group) result = append(result, group)
} }
@@ -435,7 +472,14 @@ func (this *NodeConfig) Save() error {
return err return err
} }
return os.WriteFile(Tea.ConfigFile("node.json"), data, 0777) var headerData = []byte(base64.StdEncoding.EncodeToString([]byte(this.NodeId+"|"+this.Secret)) + "\n")
encodedData, err := nodeutils.EncryptData(this.NodeId, this.Secret, data)
if err != nil {
return err
}
return os.WriteFile(Tea.ConfigFile("node.json"), append(headerData, encodedData...), 0777)
} }
// PaddedId 获取填充后的ID // PaddedId 获取填充后的ID

View File

@@ -10,8 +10,8 @@ import (
"time" "time"
) )
// EncryptData 加密 // EncryptMap 加密
func EncryptData(nodeUniqueId string, nodeSecret string, data maps.Map, timeout int32) (string, error) { func EncryptMap(nodeUniqueId string, nodeSecret string, data maps.Map, timeout int32) (string, error) {
if data == nil { if data == nil {
data = maps.Map{} data = maps.Map{}
} }
@@ -42,8 +42,8 @@ func EncryptData(nodeUniqueId string, nodeSecret string, data maps.Map, timeout
return base64.StdEncoding.EncodeToString(result), nil return base64.StdEncoding.EncodeToString(result), nil
} }
// DecryptData 解密 // DecryptMap 解密
func DecryptData(nodeUniqueId string, nodeSecret string, encodedString string) (maps.Map, error) { func DecryptMap(nodeUniqueId string, nodeSecret string, encodedString string) (maps.Map, error) {
var method = &AES256CFBMethod{} var method = &AES256CFBMethod{}
err := method.Init([]byte(nodeUniqueId), []byte(nodeSecret)) err := method.Init([]byte(nodeUniqueId), []byte(nodeSecret))
if err != nil { if err != nil {
@@ -73,3 +73,42 @@ func DecryptData(nodeUniqueId string, nodeSecret string, encodedString string) (
return result.GetMap("data"), nil return result.GetMap("data"), nil
} }
// EncryptData 加密
func EncryptData(nodeUniqueId string, nodeSecret string, data []byte) (string, error) {
if len(data) == 0 {
return "", nil
}
var method = &AES256CFBMethod{}
err := method.Init([]byte(nodeUniqueId), []byte(nodeSecret))
if err != nil {
return "", err
}
result, err := method.Encrypt(data)
if err != nil {
return "", err
}
return base64.StdEncoding.EncodeToString(result), nil
}
// DecryptData 解密
func DecryptData(nodeUniqueId string, nodeSecret string, encodedString string) ([]byte, error) {
if len(encodedString) == 0 {
return nil, nil
}
var method = &AES256CFBMethod{}
err := method.Init([]byte(nodeUniqueId), []byte(nodeSecret))
if err != nil {
return nil, err
}
encodedData, err := base64.StdEncoding.DecodeString(encodedString)
if err != nil {
return nil, errors.New("base64 decode failed: " + err.Error())
}
return method.Decrypt(encodedData)
}

View File

@@ -7,8 +7,8 @@ import (
"testing" "testing"
) )
func TestEncryptData(t *testing.T) { func TestEncryptMap(t *testing.T) {
e, err := EncryptData("a", "b", maps.Map{ e, err := EncryptMap("a", "b", maps.Map{
"c": 1, "c": 1,
}, 5) }, 5)
if err != nil { if err != nil {
@@ -16,16 +16,30 @@ func TestEncryptData(t *testing.T) {
} }
t.Log("e:", e) t.Log("e:", e)
s, err := DecryptData("a", "b", e) s, err := DecryptMap("a", "b", e)
if err != nil { if err != nil {
t.Fatal(err) t.Fatal(err)
} }
t.Log("s:", s) t.Log("s:", s)
} }
func TestEncryptData(t *testing.T) {
encoded, err := EncryptData("a", "b", []byte("Hello, World"))
if err != nil {
t.Fatal(err)
}
t.Log("encoded:", encoded)
source, err := DecryptData("a", "b", encoded)
if err != nil {
t.Fatal(err)
}
t.Log("source:", string(source))
}
func BenchmarkEncryptData(b *testing.B) { func BenchmarkEncryptData(b *testing.B) {
for i := 0; i < b.N; i++ { for i := 0; i < b.N; i++ {
_, _ = EncryptData("a", "b", maps.Map{ _, _ = EncryptMap("a", "b", maps.Map{
"c": 1, "c": 1,
}, 5) }, 5)
} }