token.go 5.5 KB

123456789101112131415161718192021222324252627282930313233343536373839404142434445464748495051525354555657585960616263646566676869707172737475767778798081828384858687888990919293949596979899100101102103104105106107108109110111112113114115116117118119120121122123124125126127128129130131132133134135136137138139140141142143144145146147148149150151152153154155156157158159160161162163164165166167168169170171172173174175176177178179180181182183184185186187188189190191192193194195196197198199200201202203204205206207208209210211212213214215216217218219220221222223224225226227228229230231232233234235236237238239240241242243244245246247248249250251252253254255256257258259260261262263264265266267268269270271272273274275276277
  1. package token
  2. import (
  3. "crypto/hmac"
  4. "crypto/sha256"
  5. "encoding/hex"
  6. "errors"
  7. "fmt"
  8. "mtp2_if/config"
  9. "mtp2_if/global/e"
  10. "mtp2_if/rediscli"
  11. "net/http"
  12. "runtime"
  13. "strconv"
  14. "strings"
  15. "time"
  16. "github.com/gin-gonic/gin"
  17. )
  18. // TouristToken 游客Token
  19. var TouristToken string = "c886a057f3d820d4dbc41473686c7c2d"
  20. // CheckToken Token校验
  21. func CheckToken(loginid string, token string, group string) (string, error) {
  22. key := ""
  23. if len(group) == 0 {
  24. key = fmt.Sprintf("monitor:online_loginid::%s", loginid)
  25. } else {
  26. key = fmt.Sprintf("monitor:online_loginid:%s:%s", loginid, group)
  27. }
  28. field := "Token"
  29. realToken, err := rediscli.GetRedisClient().HGet(key, field).Result()
  30. if err != nil {
  31. return "", err
  32. }
  33. if realToken != token {
  34. return "", errors.New("token is invalid")
  35. }
  36. // 获取UserID
  37. userID, err := rediscli.GetRedisClient().HGet(key, "UserID").Result()
  38. return userID, err
  39. }
  40. // Auth Token校验中间件
  41. func Auth() gin.HandlerFunc {
  42. return func(c *gin.Context) {
  43. // if config.SerCfg.GetDebugMode() {
  44. // c.Next()
  45. // return
  46. // }
  47. // windows下方便开发调试, 不做token校验
  48. if config.SerCfg.GetDebugMode() &&
  49. runtime.GOOS == "windows" {
  50. c.Next()
  51. return
  52. }
  53. var code int
  54. var data interface{}
  55. userID := ""
  56. code = e.SUCCESS
  57. token := c.GetHeader("Authorization")
  58. if token == "" {
  59. // Token缺失
  60. code = e.ERROR_AUTH_CHECK_TOKEN_FAIL
  61. } else {
  62. // 获取loginid
  63. s := strings.Split(token, "_")
  64. loginid := s[0]
  65. // 支持分组功能
  66. group := ""
  67. if len(s) == 3 {
  68. group = s[2]
  69. }
  70. var err error
  71. userID, err = CheckToken(loginid, token, group)
  72. if err != nil {
  73. // Token错误
  74. code = e.ERROR_AUTH_CHECK_TOKEN_FAIL
  75. }
  76. }
  77. // Token检验失败
  78. if code != e.SUCCESS {
  79. c.JSON(http.StatusUnauthorized, gin.H{
  80. "code": code,
  81. "msg": e.GetMsg(code),
  82. "data": data,
  83. })
  84. c.Abort()
  85. return
  86. }
  87. // FIXME: - 针对POST接口,应判断传入TOKEN对应的用户是否正确(比如判断UserID或AccountID是否对得上等),后期处理
  88. if c.Request.Method == "POST" {
  89. c.Set("requserid", userID)
  90. }
  91. if config.SerCfg.GetApiKeyMode() {
  92. timestamp := c.GetHeader("Timestamp")
  93. verification := c.GetHeader("Verification")
  94. if timestamp == "" || token == "" || verification == "" {
  95. c.JSON(http.StatusUnauthorized, gin.H{
  96. "code": e.ERROR,
  97. "msg": "apikey1",
  98. "data": struct{}{},
  99. })
  100. c.Abort()
  101. return
  102. }
  103. // 判断时间,10S之内有效
  104. t, err := strconv.Atoi(timestamp)
  105. if err != nil {
  106. c.JSON(http.StatusUnauthorized, gin.H{
  107. "code": e.ERROR,
  108. "msg": "apikey2",
  109. "data": struct{}{},
  110. })
  111. c.Abort()
  112. return
  113. }
  114. now := time.Now().UnixMilli()
  115. ts := int64(t) - now
  116. // logger.GetLogger().Debugf("t:%v now:%v ts: %v", t, now, ts)
  117. if ts < -10*1000 || ts > 10*1000 {
  118. c.JSON(http.StatusUnauthorized, gin.H{
  119. "code": e.ERROR,
  120. "msg": "apikey3",
  121. "data": struct{}{},
  122. })
  123. c.Abort()
  124. return
  125. }
  126. s := fmt.Sprintf("%s%s", token, timestamp)
  127. hashed := hmac.New(sha256.New, []byte(config.SerCfg.WebCfg.ApiKey))
  128. hashed.Write([]byte(s))
  129. h := hex.EncodeToString(hashed.Sum(nil))
  130. if h == "" {
  131. c.JSON(http.StatusUnauthorized, gin.H{
  132. "code": e.ERROR,
  133. "msg": "apikey4",
  134. "data": struct{}{},
  135. })
  136. c.Abort()
  137. return
  138. }
  139. if h != verification {
  140. c.JSON(http.StatusUnauthorized, gin.H{
  141. "code": e.ERROR,
  142. "msg": "apikey5",
  143. "data": struct{}{},
  144. })
  145. c.Abort()
  146. return
  147. }
  148. }
  149. // Token检验成功
  150. c.Next()
  151. }
  152. }
  153. // AuthByHsby 游客鉴权
  154. func AuthByHsby() gin.HandlerFunc {
  155. return func(c *gin.Context) {
  156. // 包含accountID、accountIDs、userID和userIDs等参数需要走正常鉴权
  157. accountID := c.Query("accountID")
  158. accountIDs := c.Query("accountIDs")
  159. userID := c.Query("userID")
  160. userIDs := c.Query("userIDs")
  161. loginID := c.Query("loginID")
  162. if len(accountID) != 0 || len(accountIDs) != 0 || len(userID) != 0 || len(userIDs) != 0 || len(loginID) != 0 {
  163. realToken(c)
  164. return
  165. }
  166. var code int
  167. var data interface{}
  168. code = e.SUCCESS
  169. token := c.GetHeader("Authorization")
  170. if token == "" {
  171. // Token缺失
  172. code = e.ERROR_AUTH_CHECK_TOKEN_FAIL
  173. } else {
  174. // Token带下划线的走正常鉴权
  175. if strings.Contains(token, "_") {
  176. realToken(c)
  177. return
  178. }
  179. if token != TouristToken {
  180. // Token错误
  181. code = e.ERROR_AUTH_CHECK_TOKEN_FAIL
  182. }
  183. }
  184. // Token检验失败
  185. if code != e.SUCCESS {
  186. c.JSON(http.StatusUnauthorized, gin.H{
  187. "code": code,
  188. "msg": e.GetMsg(code),
  189. "data": data,
  190. })
  191. c.Abort()
  192. return
  193. }
  194. // Token检验成功
  195. c.Next()
  196. }
  197. }
  198. func realToken(c *gin.Context) {
  199. // if config.SerCfg.GetDebugMode() {
  200. // c.Next()
  201. // return
  202. // }
  203. var code int
  204. var data interface{}
  205. code = e.SUCCESS
  206. token := c.GetHeader("Authorization")
  207. if token == "" {
  208. // Token缺失
  209. code = e.ERROR_AUTH_CHECK_TOKEN_FAIL
  210. } else {
  211. // 获取loginid
  212. s := strings.Split(token, "_")
  213. loginid := s[0]
  214. // 支持分组功能
  215. group := ""
  216. if len(s) == 3 {
  217. group = s[2]
  218. }
  219. if _, err := CheckToken(loginid, token, group); err != nil {
  220. // Token错误
  221. code = e.ERROR_AUTH_CHECK_TOKEN_FAIL
  222. }
  223. }
  224. // Token检验失败
  225. if code != e.SUCCESS {
  226. c.JSON(http.StatusUnauthorized, gin.H{
  227. "code": code,
  228. "msg": e.GetMsg(code),
  229. "data": data,
  230. })
  231. c.Abort()
  232. return
  233. }
  234. // FIXME: - 针对POST接口,应判断传入TOKEN对应的用户是否正确(比如判断UserID或AccountID是否对得上等),后期处理
  235. // Token检验成功
  236. c.Next()
  237. return
  238. }