feat(otp): encrypt recovery codes with AES

This commit is contained in:
Hintay 2025-02-10 23:21:52 +09:00
parent 69a7f38ba7
commit 5ade465ac6
No known key found for this signature in database
GPG key ID: 120FC7FF121F2F2D
5 changed files with 77 additions and 31 deletions

View file

@ -1,12 +1,17 @@
package crypto
import (
"context"
"crypto/aes"
"crypto/cipher"
"crypto/rand"
"encoding/base64"
"github.com/0xJacky/Nginx-UI/settings"
"encoding/json"
"io"
"reflect"
"github.com/0xJacky/Nginx-UI/settings"
"gorm.io/gorm/schema"
)
// AesEncrypt encrypts text and given key with AES.
@ -55,3 +60,49 @@ func AesDecrypt(text []byte) ([]byte, error) {
return data, nil
}
type JSONAesSerializer struct{}
func (JSONAesSerializer) Scan(ctx context.Context, field *schema.Field, dst reflect.Value, dbValue interface{}) (err error) {
fieldValue := reflect.New(field.FieldType)
if dbValue != nil {
var bytes []byte
switch v := dbValue.(type) {
case []byte:
bytes = v
case string:
bytes = []byte(v)
default:
bytes, err = json.Marshal(v)
if err != nil {
return err
}
}
if len(bytes) > 0 {
bytes, err = AesDecrypt(bytes)
if err != nil {
return err
}
err = json.Unmarshal(bytes, fieldValue.Interface())
}
}
field.ReflectValueOf(ctx, dst).Set(fieldValue.Elem())
return
}
// Value implements serializer interface
func (JSONAesSerializer) Value(ctx context.Context, field *schema.Field, dst reflect.Value, fieldValue interface{}) (interface{}, error) {
result, err := json.Marshal(fieldValue)
if string(result) == "null" {
if field.TagSettings["NOT NULL"] != "" {
return "", nil
}
return nil, err
}
encrypt, err := AesEncrypt(result)
return string(encrypt), err
}

View file

@ -52,7 +52,7 @@ func VerifyOTP(user *model.User, otp, recoveryCode string) (err error) {
// check recovery code
for _, code := range user.RecoveryCodes.Codes {
if code.Code == recoveryCode && code.UsedTime == nil {
t := time.Now()
t := time.Now().Unix()
code.UsedTime = &t
_, err = u.Where(u.ID.Eq(user.ID)).Updates(user)
return