如何更改H2数据库的密码加密?

时间:2019-12-29 21:01:46

标签: java spring-boot h2

我的Spring Boot项目有以下配置文件:

@Configuration
@EnableWebSecurity
@EnableGlobalMethodSecurity(prePostEnabled = true)
public class WebSecurityConfig extends WebSecurityConfigurerAdapter {
    @Autowired
    private UserService userService;

    @Autowired
    private PasswordEncoder passwordEncoder;

    @Bean
    public PasswordEncoder getPasswordEncoder() {
        return new BCryptPasswordEncoder(8);
    }

    @Override
    protected void configure(HttpSecurity http) throws Exception {
        http
                .authorizeRequests()
                .antMatchers("/", "/registration", "/activate/*").permitAll()
                .anyRequest().authenticated()
                .and()
                .formLogin()
                .loginPage("/login")
                .permitAll()
                .and()
                .logout()
                .permitAll();
    }

    @Override
    protected void configure(AuthenticationManagerBuilder auth) throws Exception {
        auth.userDetailsService(userService)
                .passwordEncoder(passwordEncoder);
    }
}

我也有data.sql文件,但是我需要对这些密码进行编码:

insert into users (email, username, password, is_enabled)
values ('admin@gmail.com', 'admin', 'admin', true),
       ('user@gmail.com', 'user', 'password', true),
       ('user2@gmail.com', 'user2', 'password', true);

insert into user_role (user_id, roles)
values (100000, 'ADMIN'),
       (100000, 'USER'),
       (100001, 'USER'),
       (100002, 'USER');

对于“ PostgreSQL”,我可以这样设置编码:

CREATE EXTENSION IF NOT EXISTS pgcrypto;

UPDATE users SET password = crypt(password, gen_salt('bf', 8));

但是它不适用于H2数据库。如何解决并编码密码?

1 个答案:

答案 0 :(得分:0)

SQL对此没有任何便携式方式,但是某些数据库具有自己的功能。在H2中,您可以使用HASH生成密码的哈希值。

UPDATE USERS SET PASSWORD = HASH('SHA256', PASSWORD, 1000);

SELECT * FROM USERS WHERE USERNAME = ? AND IS_ENABLED AND PASSWORD = HASH('SHA256', ?, 1000);

您还可以使用SECURE_RAND函数来生成盐以使用密码将其连接起来,但是您必须将盐分别存储在其自己的列中,或使用分隔符存储在同一列中(或通过使用哈希函数的已知长度)。

UPDATE USERS SET PASSWORD = (@S := SECURE_RAND(16)) || HASH('SHA256', @S || PASSWORD, 1000);

SELECT * FROM USERS WHERE USERNAME = 'user'
    AND HASH('SHA256', SUBSTRING(PASSWORD FROM 1 FOR 32) || 'password',  1000)
        = SUBSTRING(PASSWORD FROM 33);

您还可以编写用户定义的函数来模拟PostgreSQL中的函数。

更可靠的解决方案将是使用Java代码,而不依赖于您当前使用的数据库。

final int keyLength = 256 / 8;
final String algorithm = "PBKDF2WithHmacSHA256";
final int saltLength = 16;
final int numIterations = 1000;
SecureRandom sr = SecureRandom.getInstanceStrong();
SecretKeyFactory skf = SecretKeyFactory.getInstance(algorithm);
// Encode
String password = "test";
byte[] salt = sr.generateSeed(saltLength);
byte[] encodedPassword = skf
        .generateSecret(new PBEKeySpec(password.toCharArray(), salt, numIterations, keyLength * 8))
        .getEncoded();
byte[] passwordHash = Arrays.copyOf(salt, saltLength + keyLength);
System.arraycopy(encodedPassword, 0, passwordHash, saltLength, keyLength);
// Check
String password2 = "test";
salt = Arrays.copyOf(passwordHash, saltLength);
byte[] encodedPassword2 = skf
        .generateSecret(new PBEKeySpec(password2.toCharArray(), salt, numIterations, keyLength * 8))
        .getEncoded();
// Always test all bytes to prevent timing attack
int bits = 0;
for (int i = 0; i < keyLength; i++) {
    bits |= passwordHash[i + saltLength] ^ encodedPassword2[i];
}
boolean valid = bits == 0;