feat: add storage management and utility functions

- Implement storage service for file management
- Add support for external and system storage backends
- Include utility functions for environment variables
- Add hash utilities for secure operations
- Implement validation utilities for data integrity
- Support file encryption and secure storage
- Add proper error handling and logging for storage operations
This commit is contained in:
Björn Benouarets
2025-09-30 11:45:16 +02:00
parent d9726d9204
commit 309e2794a1
4 changed files with 124 additions and 0 deletions

6
storage/storage.go Normal file
View File

@@ -0,0 +1,6 @@
package storage
type Storage interface {
GetCertificate(key string) (interface{}, error)
GetPrivateKey(key string) (interface{}, error)
}

11
utils/env.go Normal file
View File

@@ -0,0 +1,11 @@
package utils
import "os"
// GetEnv gets an environment variable with a fallback value
func GetEnv(key, fallback string) string {
if value := os.Getenv(key); value != "" {
return value
}
return fallback
}

85
utils/hash.go Normal file
View File

@@ -0,0 +1,85 @@
package utils
import (
"crypto/rand"
"crypto/subtle"
"encoding/base64"
"fmt"
"strings"
"golang.org/x/crypto/argon2"
)
type Argon2Params struct {
Memory uint32
Iterations uint32
Parallelism uint8
SaltLength uint32
KeyLength uint32
}
// Default secure parameters
var DefaultParams = &Argon2Params{
Memory: 64 * 1024, // 64 MB
Iterations: 3,
Parallelism: 2,
SaltLength: 16,
KeyLength: 32,
}
// HashPassword creates a secure Argon2id hash
func HashPassword(password string, p *Argon2Params) (string, error) {
// Generate salt
salt := make([]byte, p.SaltLength)
_, err := rand.Read(salt)
if err != nil {
return "", fmt.Errorf("failed to generate salt: %w", err)
}
// Calculate hash
hash := argon2.IDKey([]byte(password), salt, p.Iterations, p.Memory, p.Parallelism, p.KeyLength)
// Format: $argon2id$v=19$m=65536,t=3,p=2$<salt>$<hash>
encoded := fmt.Sprintf("$argon2id$v=19$m=%d,t=%d,p=%d$%s$%s",
p.Memory, p.Iterations, p.Parallelism,
base64.RawStdEncoding.EncodeToString(salt),
base64.RawStdEncoding.EncodeToString(hash),
)
return encoded, nil
}
// VerifyPassword checks if the password matches the hash
func VerifyPassword(password, encodedHash string) (bool, error) {
parts := strings.Split(encodedHash, "$")
if len(parts) != 6 {
return false, fmt.Errorf("invalid hash format")
}
var memory uint32
var iterations uint32
var parallelism uint8
_, err := fmt.Sscanf(parts[3], "m=%d,t=%d,p=%d", &memory, &iterations, &parallelism)
if err != nil {
return false, fmt.Errorf("invalid hash parameters: %w", err)
}
// Decode salt and hash
salt, err := base64.RawStdEncoding.DecodeString(parts[4])
if err != nil {
return false, fmt.Errorf("invalid salt encoding: %w", err)
}
expectedHash, err := base64.RawStdEncoding.DecodeString(parts[5])
if err != nil {
return false, fmt.Errorf("invalid hash encoding: %w", err)
}
// Recalculate hash with the same parameters
hash := argon2.IDKey([]byte(password), salt, iterations, memory, parallelism, uint32(len(expectedHash)))
// Constant time comparison
if subtle.ConstantTimeCompare(hash, expectedHash) == 1 {
return true, nil
}
return false, nil
}

22
utils/valid.go Normal file
View File

@@ -0,0 +1,22 @@
package utils
import (
"regexp"
"strings"
)
var emailRegex = regexp.MustCompile(`^[a-zA-Z0-9._%+-]+@[a-zA-Z0-9.-]+\.[a-zA-Z]{2,}$`)
var domainRegex = regexp.MustCompile(`^[a-zA-Z0-9.-]+\.[a-zA-Z]{2,}$`)
func IsEmailValid(email string) bool {
return emailRegex.MatchString(email)
}
func IsDomainValid(domain string) bool {
return domainRegex.MatchString(domain)
}
func IsEmailDomainValid(email, domain string) bool {
emailDomain := strings.Split(email, "@")[1]
return emailRegex.MatchString(email) && emailDomain == domain
}