GT AI OS Community Edition v2.0.33
Security hardening release addressing CodeQL and Dependabot alerts: - Fix stack trace exposure in error responses - Add SSRF protection with DNS resolution checking - Implement proper URL hostname validation (replaces substring matching) - Add centralized path sanitization to prevent path traversal - Fix ReDoS vulnerability in email validation regex - Improve HTML sanitization in validation utilities - Fix capability wildcard matching in auth utilities - Update glob dependency to address CVE - Add CodeQL suppression comments for verified false positives 🤖 Generated with [Claude Code](https://claude.com/claude-code) Co-Authored-By: Claude Opus 4.5 <noreply@anthropic.com>
This commit is contained in:
8
apps/resource-cluster/app/utils/__init__.py
Normal file
8
apps/resource-cluster/app/utils/__init__.py
Normal file
@@ -0,0 +1,8 @@
|
||||
"""
|
||||
GT 2.0 Resource Cluster - Utilities Package
|
||||
Common utilities for encryption, validation, and helper functions
|
||||
"""
|
||||
|
||||
from .encryption import encrypt_data, decrypt_data
|
||||
|
||||
__all__ = ["encrypt_data", "decrypt_data"]
|
||||
73
apps/resource-cluster/app/utils/encryption.py
Normal file
73
apps/resource-cluster/app/utils/encryption.py
Normal file
@@ -0,0 +1,73 @@
|
||||
"""
|
||||
GT 2.0 Resource Cluster - Encryption Utilities
|
||||
Secure data encryption for SSO tokens and sensitive data
|
||||
"""
|
||||
|
||||
import base64
|
||||
import os
|
||||
from cryptography.fernet import Fernet
|
||||
from cryptography.hazmat.primitives import hashes
|
||||
from cryptography.hazmat.primitives.kdf.pbkdf2 import PBKDF2HMAC
|
||||
from typing import Union
|
||||
import logging
|
||||
|
||||
logger = logging.getLogger(__name__)
|
||||
|
||||
class EncryptionManager:
|
||||
"""Handles encryption and decryption of sensitive data"""
|
||||
|
||||
def __init__(self):
|
||||
self._key = None
|
||||
self._fernet = None
|
||||
self._initialize_encryption()
|
||||
|
||||
def _initialize_encryption(self):
|
||||
"""Initialize encryption key from environment or generate new one"""
|
||||
# Get encryption key from environment or generate new one
|
||||
key_material = os.environ.get("GT_ENCRYPTION_KEY", "default-dev-key-change-in-production")
|
||||
|
||||
# Derive a proper encryption key using PBKDF2
|
||||
salt = b"GT2.0-Resource-Cluster-Salt" # Fixed salt for consistency
|
||||
kdf = PBKDF2HMAC(
|
||||
algorithm=hashes.SHA256(),
|
||||
length=32,
|
||||
salt=salt,
|
||||
iterations=100000,
|
||||
)
|
||||
key = base64.urlsafe_b64encode(kdf.derive(key_material.encode()))
|
||||
|
||||
self._key = key
|
||||
self._fernet = Fernet(key)
|
||||
|
||||
logger.info("Encryption manager initialized")
|
||||
|
||||
def encrypt(self, data: Union[str, bytes]) -> bytes:
|
||||
"""Encrypt data and return base64 encoded result"""
|
||||
if isinstance(data, str):
|
||||
data = data.encode('utf-8')
|
||||
|
||||
encrypted = self._fernet.encrypt(data)
|
||||
return base64.urlsafe_b64encode(encrypted)
|
||||
|
||||
def decrypt(self, encrypted_data: Union[str, bytes]) -> str:
|
||||
"""Decrypt base64 encoded data and return string"""
|
||||
if isinstance(encrypted_data, str):
|
||||
encrypted_data = encrypted_data.encode('utf-8')
|
||||
|
||||
# Decode from base64 first
|
||||
decoded = base64.urlsafe_b64decode(encrypted_data)
|
||||
|
||||
# Decrypt
|
||||
decrypted = self._fernet.decrypt(decoded)
|
||||
return decrypted.decode('utf-8')
|
||||
|
||||
# Global encryption manager instance
|
||||
_encryption_manager = EncryptionManager()
|
||||
|
||||
def encrypt_data(data: Union[str, bytes]) -> bytes:
|
||||
"""Encrypt data using global encryption manager"""
|
||||
return _encryption_manager.encrypt(data)
|
||||
|
||||
def decrypt_data(encrypted_data: Union[str, bytes]) -> str:
|
||||
"""Decrypt data using global encryption manager"""
|
||||
return _encryption_manager.decrypt(encrypted_data)
|
||||
Reference in New Issue
Block a user