risingwave_frontend/user/
user_authentication.rs1use std::collections::HashMap;
16
17use risingwave_pb::user::AuthInfo;
18use risingwave_pb::user::auth_info::EncryptionType;
19use risingwave_sqlparser::ast::SqlOption;
20use sha2::{Digest, Sha256};
21
22use crate::WithOptions;
23
24const SHA256_ENCRYPTED_PREFIX: &str = "SHA-256:";
27const MD5_ENCRYPTED_PREFIX: &str = "md5";
28
29const VALID_SHA256_ENCRYPTED_LEN: usize = SHA256_ENCRYPTED_PREFIX.len() + 64;
30const VALID_MD5_ENCRYPTED_LEN: usize = MD5_ENCRYPTED_PREFIX.len() + 32;
31
32pub const OAUTH_JWKS_URL_KEY: &str = "jwks_url";
33pub const OAUTH_ISSUER_KEY: &str = "issuer";
34
35#[inline(always)]
37pub fn build_oauth_info(options: &Vec<SqlOption>) -> Option<AuthInfo> {
38 let metadata: HashMap<String, String> = WithOptions::oauth_options_to_map(options.as_slice())
39 .ok()?
40 .into_iter()
41 .collect();
42 if !metadata.contains_key(OAUTH_JWKS_URL_KEY) || !metadata.contains_key(OAUTH_ISSUER_KEY) {
43 return None;
44 }
45 Some(AuthInfo {
46 encryption_type: EncryptionType::Oauth as i32,
47 encrypted_value: Vec::new(),
48 metadata,
49 })
50}
51
52#[inline(always)]
71pub fn encrypted_password(name: &str, password: &str) -> Option<AuthInfo> {
72 if password.is_empty() {
74 return None;
75 }
76
77 if valid_sha256_password(password) {
78 Some(AuthInfo {
79 encryption_type: EncryptionType::Sha256 as i32,
80 encrypted_value: password.trim_start_matches(SHA256_ENCRYPTED_PREFIX).into(),
81 metadata: HashMap::new(),
82 })
83 } else if valid_md5_password(password) {
84 Some(AuthInfo {
85 encryption_type: EncryptionType::Md5 as i32,
86 encrypted_value: password.trim_start_matches(MD5_ENCRYPTED_PREFIX).into(),
87 metadata: HashMap::new(),
88 })
89 } else {
90 Some(encrypt_default(name, password))
91 }
92}
93
94#[inline(always)]
96fn encrypt_default(name: &str, password: &str) -> AuthInfo {
97 AuthInfo {
98 encryption_type: EncryptionType::Md5 as i32,
99 encrypted_value: md5_hash(name, password),
100 metadata: HashMap::new(),
101 }
102}
103
104pub fn encrypted_raw_password(info: &AuthInfo) -> String {
106 let encrypted_pwd = String::from_utf8(info.encrypted_value.clone()).unwrap();
107 let prefix = match info.get_encryption_type().unwrap() {
108 EncryptionType::Unspecified => unreachable!(),
109 EncryptionType::Plaintext => "",
110 EncryptionType::Sha256 => SHA256_ENCRYPTED_PREFIX,
111 EncryptionType::Md5 => MD5_ENCRYPTED_PREFIX,
112 EncryptionType::Oauth => "",
113 };
114 format!("{}{}", prefix, encrypted_pwd)
115}
116
117#[inline(always)]
119pub fn md5_hash_with_salt(encrypted_value: &[u8], salt: &[u8; 4]) -> Vec<u8> {
120 let mut ctx = md5::Context::new();
121 ctx.consume(encrypted_value);
122 ctx.consume(salt);
123 format!("md5{:x}", ctx.compute()).into_bytes()
124}
125
126#[inline(always)]
127fn valid_sha256_password(password: &str) -> bool {
128 password.starts_with(SHA256_ENCRYPTED_PREFIX) && password.len() == VALID_SHA256_ENCRYPTED_LEN
129}
130
131#[inline(always)]
132fn valid_md5_password(password: &str) -> bool {
133 password.starts_with(MD5_ENCRYPTED_PREFIX) && password.len() == VALID_MD5_ENCRYPTED_LEN
134}
135
136#[cfg_attr(not(test), expect(dead_code))]
138#[inline(always)]
139pub fn sha256_hash(name: &str, password: &str) -> Vec<u8> {
140 let mut hasher = Sha256::new();
141 hasher.update(password.as_bytes());
142 hasher.update(name.as_bytes());
143 format!("{:x}", hasher.finalize()).into_bytes()
144}
145
146#[inline(always)]
148pub fn md5_hash(name: &str, password: &str) -> Vec<u8> {
149 let mut ctx = md5::Context::new();
150 ctx.consume(password.as_bytes());
151 ctx.consume(name.as_bytes());
152 format!("{:x}", ctx.compute()).into_bytes()
153}
154
155#[cfg(test)]
156mod tests {
157 use super::*;
158
159 #[test]
160 fn test_encrypt_password() {
161 let (user_name, password) = ("foo", "bar");
162 assert_eq!(
163 b"96948aad3fcae80c08a35c9b5958cd89".to_vec(),
164 md5_hash(user_name, password)
165 );
166 assert_eq!(
167 b"md59f2fa6a30871a92249bdd2f1eeee4ef6".to_vec(),
168 md5_hash_with_salt(
169 b"96948aad3fcae80c08a35c9b5958cd89",
170 &[0x1a, 0x2b, 0x3d, 0x4e]
171 )
172 );
173 assert_eq!(
174 b"88ecde925da3c6f8ec3d140683da9d2a422f26c1ae1d9212da1e5a53416dcc88".to_vec(),
175 sha256_hash(user_name, password)
176 );
177
178 let input_passwords = [
179 "bar",
180 "",
181 "md596948aad3fcae80c08a35c9b5958cd89",
182 "SHA-256:88ecde925da3c6f8ec3d140683da9d2a422f26c1ae1d9212da1e5a53416dcc88",
183 ];
184 let expected_output_passwords = vec![
185 Some(AuthInfo {
186 encryption_type: EncryptionType::Md5 as i32,
187 encrypted_value: md5_hash(user_name, password),
188 metadata: HashMap::new(),
189 }),
190 None,
191 Some(AuthInfo {
192 encryption_type: EncryptionType::Md5 as i32,
193 encrypted_value: md5_hash(user_name, password),
194 metadata: HashMap::new(),
195 }),
196 Some(AuthInfo {
197 encryption_type: EncryptionType::Sha256 as i32,
198 encrypted_value: sha256_hash(user_name, password),
199 metadata: HashMap::new(),
200 }),
201 ];
202 let output_passwords = input_passwords
203 .iter()
204 .map(|&p| encrypted_password(user_name, p))
205 .collect::<Vec<_>>();
206 assert_eq!(output_passwords, expected_output_passwords);
207 }
208}