mirror of
https://github.com/astaxie/beego.git
synced 2024-11-25 22:11:29 +00:00
db67ffbb94
2.add apiauth test
161 lines
4.1 KiB
Go
161 lines
4.1 KiB
Go
// Copyright 2014 beego Author. All Rights Reserved.
|
|
//
|
|
// Licensed under the Apache License, Version 2.0 (the "License");
|
|
// you may not use this file except in compliance with the License.
|
|
// You may obtain a copy of the License at
|
|
//
|
|
// http://www.apache.org/licenses/LICENSE-2.0
|
|
//
|
|
// Unless required by applicable law or agreed to in writing, software
|
|
// distributed under the License is distributed on an "AS IS" BASIS,
|
|
// WITHOUT WARRANTIES OR CONDITIONS OF ANY KIND, either express or implied.
|
|
// See the License for the specific language governing permissions and
|
|
// limitations under the License.
|
|
|
|
// Package apiauth provides handlers to enable apiauth support.
|
|
//
|
|
// Simple Usage:
|
|
// import(
|
|
// "github.com/astaxie/beego"
|
|
// "github.com/astaxie/beego/plugins/apiauth"
|
|
// )
|
|
//
|
|
// func main(){
|
|
// // apiauth every request
|
|
// beego.InsertFilter("*", beego.BeforeRouter,apiauth.APIBaiscAuth("appid","appkey"))
|
|
// beego.Run()
|
|
// }
|
|
//
|
|
// Advanced Usage:
|
|
//
|
|
// func getAppSecret(appid string) string {
|
|
// // get appsecret by appid
|
|
// // maybe store in configure, maybe in database
|
|
// }
|
|
//
|
|
// beego.InsertFilter("*", beego.BeforeRouter,apiauth.APISecretAuth(getAppSecret, 360))
|
|
//
|
|
// Information:
|
|
//
|
|
// In the request user should include these params in the query
|
|
//
|
|
// 1. appid
|
|
//
|
|
// appid is assigned to the application
|
|
//
|
|
// 2. signature
|
|
//
|
|
// get the signature use apiauth.Signature()
|
|
//
|
|
// when you send to server remember use url.QueryEscape()
|
|
//
|
|
// 3. timestamp:
|
|
//
|
|
// send the request time, the format is yyyy-mm-dd HH:ii:ss
|
|
//
|
|
package apiauth
|
|
|
|
import (
|
|
"bytes"
|
|
"crypto/hmac"
|
|
"crypto/sha256"
|
|
"encoding/base64"
|
|
"fmt"
|
|
"net/url"
|
|
"sort"
|
|
"time"
|
|
|
|
"github.com/astaxie/beego"
|
|
"github.com/astaxie/beego/context"
|
|
)
|
|
|
|
// AppIDToAppSecret is used to get appsecret throw appid
|
|
type AppIDToAppSecret func(string) string
|
|
|
|
// APIBaiscAuth use the basic appid/appkey as the AppIdToAppSecret
|
|
func APIBaiscAuth(appid, appkey string) beego.FilterFunc {
|
|
ft := func(aid string) string {
|
|
if aid == appid {
|
|
return appkey
|
|
}
|
|
return ""
|
|
}
|
|
return APISecretAuth(ft, 300)
|
|
}
|
|
|
|
// APISecretAuth use AppIdToAppSecret verify and
|
|
func APISecretAuth(f AppIDToAppSecret, timeout int) beego.FilterFunc {
|
|
return func(ctx *context.Context) {
|
|
if ctx.Input.Query("appid") == "" {
|
|
ctx.ResponseWriter.WriteHeader(403)
|
|
ctx.WriteString("miss query param: appid")
|
|
return
|
|
}
|
|
appsecret := f(ctx.Input.Query("appid"))
|
|
if appsecret == "" {
|
|
ctx.ResponseWriter.WriteHeader(403)
|
|
ctx.WriteString("not exist this appid")
|
|
return
|
|
}
|
|
if ctx.Input.Query("signature") == "" {
|
|
ctx.ResponseWriter.WriteHeader(403)
|
|
ctx.WriteString("miss query param: signature")
|
|
return
|
|
}
|
|
if ctx.Input.Query("timestamp") == "" {
|
|
ctx.ResponseWriter.WriteHeader(403)
|
|
ctx.WriteString("miss query param: timestamp")
|
|
return
|
|
}
|
|
u, err := time.Parse("2006-01-02 15:04:05", ctx.Input.Query("timestamp"))
|
|
if err != nil {
|
|
ctx.ResponseWriter.WriteHeader(403)
|
|
ctx.WriteString("timestamp format is error, should 2006-01-02 15:04:05")
|
|
return
|
|
}
|
|
t := time.Now()
|
|
if t.Sub(u).Seconds() > float64(timeout) {
|
|
ctx.ResponseWriter.WriteHeader(403)
|
|
ctx.WriteString("timeout! the request time is long ago, please try again")
|
|
return
|
|
}
|
|
if ctx.Input.Query("signature") !=
|
|
Signature(appsecret, ctx.Input.Method(), ctx.Request.Form, ctx.Input.URL()) {
|
|
ctx.ResponseWriter.WriteHeader(403)
|
|
ctx.WriteString("auth failed")
|
|
}
|
|
}
|
|
}
|
|
|
|
// Signature used to generate signature with the appsecret/method/params/RequestURI
|
|
func Signature(appsecret, method string, params url.Values, RequestURL string) (result string) {
|
|
var b bytes.Buffer
|
|
keys := make([]string, len(params))
|
|
pa := make(map[string]string)
|
|
for k, v := range params {
|
|
pa[k] = v[0]
|
|
keys = append(keys, k)
|
|
}
|
|
|
|
sort.Strings(keys)
|
|
|
|
for _, key := range keys {
|
|
if key == "signature" {
|
|
continue
|
|
}
|
|
|
|
val := pa[key]
|
|
if key != "" && val != "" {
|
|
b.WriteString(key)
|
|
b.WriteString(val)
|
|
}
|
|
}
|
|
|
|
stringToSign := fmt.Sprintf("%v\n%v\n%v\n", method, b.String(), RequestURL)
|
|
|
|
sha256 := sha256.New
|
|
hash := hmac.New(sha256, []byte(appsecret))
|
|
hash.Write([]byte(stringToSign))
|
|
return base64.StdEncoding.EncodeToString(hash.Sum(nil))
|
|
}
|