package logic import ( "context" "crypto/rand" "encoding/base64" "fmt" "net/http" "dag-jupyter/internal/svc" "dag-jupyter/internal/types" "github.com/zeromicro/go-zero/core/logx" "golang.org/x/crypto/argon2" ) type PasswordLogic struct { logx.Logger ctx context.Context svcCtx *svc.ServiceContext } func NewPasswordLogic(ctx context.Context, svcCtx *svc.ServiceContext) *PasswordLogic { return &PasswordLogic{ Logger: logx.WithContext(ctx), ctx: ctx, svcCtx: svcCtx, } } func generateRandomBytes(n uint32) ([]byte, error) { b := make([]byte, n) _, err := rand.Read(b) if err != nil { return nil, err } return b, nil } type params struct { memory uint32 iterations uint32 parallelism uint8 saltLength uint32 keyLength uint32 } func generateFromPassword(password string, p *params) (encodedHash string, err error) { salt, err := generateRandomBytes(p.saltLength) if err != nil { return "", err } hash := argon2.IDKey([]byte(password), salt, p.iterations, p.memory, p.parallelism, p.keyLength) // Base64 encode the salt and hashed password. b64Salt := base64.RawStdEncoding.EncodeToString(salt) b64Hash := base64.RawStdEncoding.EncodeToString(hash) // Return a string using the standard encoded hash representation. encodedHash = fmt.Sprintf("argon2:$argon2id$v=%d$m=%d,t=%d,p=%d$%s$%s", argon2.Version, p.memory, p.iterations, p.parallelism, b64Salt, b64Hash) return encodedHash, nil } func (l *PasswordLogic) Password(req *types.PasswordRequest) (resp *types.Response, err error) { p := ¶ms{ memory: 10240, iterations: 10, parallelism: 8, saltLength: 16, keyLength: 32, } // Pass the plaintext password and parameters to our generateFromPassword // helper function. hash, err := generateFromPassword(req.Password, p) if err != nil { return &types.Response{Data: err, Code: http.StatusInternalServerError}, err } return &types.Response{Data: hash, Code: http.StatusOK}, nil }