123456789101112131415161718192021222324252627282930313233343536373839404142434445464748495051525354555657585960616263646566676869707172737475767778798081828384858687888990919293949596979899100101102103104105106107108109110111112113114115116117118119120121122123124125126127128129130131132133134135136137138139140141142143144145146147148149150151152153154155156157158159160161162163164165166167168169170171172173174175176177178179180181182183184185186187188189190191192193194195196197198199200201202203204205206207208209210211212213214215216217218219220221222223224225226227228229230231232233234235236237238239240241242243244245246247248249250251252253254255256257258259260261262263264265266267268269270271272273274275276277278279280281282283284285286287288289290291292293294295296297298299300301302303304305306307308309310311312313314315316317318319320321322323324325326327328329330331332333334335336337338339340341342343344345346347348349350351352353354355356357358359360361362363364365366367368369370371372373374375376377378379380381382383384385386387388389390391392393394395396397398399400401402403404405406407408409410411412413414415416417418419420421422423424425426427428429430431432433434435436437438439440441442443444445446447448449450451452453454455456457458459460461462463464465466467468469470471472473474475476477478479480481482483484485486487488489490491492493494495496497498499500 |
- /*
- * @description: 阿里云oss相关
- * @Author: CP
- * @Date: 2020-12-04 10:06:19
- * @FilePath: \construction_management\web\api\oss_api.go
- */
- package api
- import (
- "crypto"
- "crypto/hmac"
- "crypto/md5"
- "crypto/rsa"
- "crypto/sha1"
- "crypto/x509"
- "encoding/base64"
- "encoding/json"
- "encoding/pem"
- "errors"
- "fmt"
- "hash"
- "io"
- "io/ioutil"
- "net/http"
- "strconv"
- "time"
- "github.com/kataras/iris/v12"
- "go.mod/conf"
- )
- type OssApi struct {
- //框架-web应用上下文环境
- Ctx iris.Context
- }
- const (
- base64Table = "123QRSTUabcdVWXYZHijKLAWDCABDstEFGuvwxyzGHIJklmnopqr234560178912"
- )
- var coder = base64.NewEncoding(base64Table)
- func base64Encode(src []byte) []byte {
- return []byte(coder.EncodeToString(src))
- }
- func get_gmt_iso8601(expire_end int64) string {
- var tokenExpire = time.Unix(expire_end, 0).UTC().Format("2006-01-02T15:04:05Z")
- return tokenExpire
- }
- type ConfigStruct struct {
- Expiration string `json:"expiration"`
- Conditions [][]string `json:"conditions"`
- }
- type PolicyToken struct {
- AccessKeyId string `json:"accessId"`
- Host string `json:"host"`
- Expire int64 `json:"expire"`
- Signature string `json:"signature"`
- Policy string `json:"policy"`
- Directory string `json:"dir"`
- Callback string `json:"callback"`
- }
- type CallbackParam struct {
- CallbackUrl string `json:"callbackUrl"`
- CallbackBody string `json:"callbackBody"`
- CallbackBodyType string `json:"callbackBodyType"`
- }
- func get_policy_token() string {
- now := time.Now().Unix()
- expire_end := now + conf.Expire_time
- var tokenExpire = get_gmt_iso8601(expire_end)
- //create post policy json
- var config ConfigStruct
- config.Expiration = tokenExpire
- var condition []string
- condition = append(condition, "starts-with")
- condition = append(condition, "$key")
- condition = append(condition, conf.Upload_dir)
- config.Conditions = append(config.Conditions, condition)
- //calucate signature
- result, err := json.Marshal(config)
- debyte := base64.StdEncoding.EncodeToString(result)
- h := hmac.New(func() hash.Hash { return sha1.New() }, []byte(conf.AccessKeySecret))
- io.WriteString(h, debyte)
- signedStr := base64.StdEncoding.EncodeToString(h.Sum(nil))
- var callbackParam CallbackParam
- callbackParam.CallbackUrl = conf.CallbackUrl
- callbackParam.CallbackBody = "filename=${object}&size=${size}&mimeType=${mimeType}&height=${imageInfo.height}&width=${imageInfo.width}"
- callbackParam.CallbackBodyType = "application/x-www-form-urlencoded"
- callback_str, err := json.Marshal(callbackParam)
- if err != nil {
- fmt.Println("callback json err:", err)
- }
- callbackBase64 := base64.StdEncoding.EncodeToString(callback_str)
- var policyToken PolicyToken
- policyToken.AccessKeyId = conf.AccessKeyId
- policyToken.Host = conf.OssHost
- policyToken.Expire = expire_end
- policyToken.Signature = string(signedStr)
- policyToken.Directory = conf.Upload_dir
- policyToken.Policy = string(debyte)
- policyToken.Callback = string(callbackBase64)
- response, err := json.Marshal(policyToken)
- if err != nil {
- fmt.Println("json err:", err)
- }
- return string(response)
- }
- // 获得上传Oss签名
- func (c *OssApi) GetSignature() {
- policyToken := PolicyToken{}
- response := get_policy_token()
- json.Unmarshal([]byte(response), &policyToken)
- c.Ctx.JSON(iris.Map{
- "code": 0,
- "msg": "",
- "data": policyToken,
- })
- }
- func handlerRequest(w http.ResponseWriter, r *http.Request) {
- if r.Method == "GET" {
- response := get_policy_token()
- w.Header().Set("Access-Control-Allow-Methods", "POST")
- w.Header().Set("Access-Control-Allow-Origin", "*")
- io.WriteString(w, response)
- }
- if r.Method == "POST" {
- fmt.Println("\nHandle Post Request ... ")
- // Get PublicKey bytes
- bytePublicKey, err := getPublicKey(r)
- if err != nil {
- responseFailed(w)
- return
- }
- // Get Authorization bytes : decode from Base64String
- byteAuthorization, err := getAuthorization(r)
- if err != nil {
- responseFailed(w)
- return
- }
- // Get MD5 bytes from Newly Constructed Authrization String.
- byteMD5, err := getMD5FromNewAuthString(r)
- if err != nil {
- responseFailed(w)
- return
- }
- // verifySignature and response to client
- if verifySignature(bytePublicKey, byteMD5, byteAuthorization) {
- // do something you want accoding to callback_body ...
- responseSuccess(w) // response OK : 200
- } else {
- responseFailed(w) // response FAILED : 400
- }
- }
- }
- // getPublicKey : Get PublicKey bytes from Request.URL
- func getPublicKey(r *http.Request) ([]byte, error) {
- var bytePublicKey []byte
- // get PublicKey URL
- publicKeyURLBase64 := r.Header.Get("x-oss-pub-key-url")
- if publicKeyURLBase64 == "" {
- fmt.Println("GetPublicKey from Request header failed : No x-oss-pub-key-url field. ")
- return bytePublicKey, errors.New("no x-oss-pub-key-url field in Request header ")
- }
- publicKeyURL, _ := base64.StdEncoding.DecodeString(publicKeyURLBase64)
- // fmt.Printf("publicKeyURL={%s}\n", publicKeyURL)
- // get PublicKey Content from URL
- responsePublicKeyURL, err := http.Get(string(publicKeyURL))
- if err != nil {
- fmt.Printf("Get PublicKey Content from URL failed : %s \n", err.Error())
- return bytePublicKey, err
- }
- bytePublicKey, err = ioutil.ReadAll(responsePublicKeyURL.Body)
- if err != nil {
- fmt.Printf("Read PublicKey Content from URL failed : %s \n", err.Error())
- return bytePublicKey, err
- }
- defer responsePublicKeyURL.Body.Close()
- // fmt.Printf("publicKey={%s}\n", bytePublicKey)
- return bytePublicKey, nil
- }
- // getAuthorization : decode from Base64String
- func getAuthorization(r *http.Request) ([]byte, error) {
- var byteAuthorization []byte
- // Get Authorization bytes : decode from Base64String
- strAuthorizationBase64 := r.Header.Get("authorization")
- if strAuthorizationBase64 == "" {
- fmt.Println("Failed to get authorization field from request header. ")
- return byteAuthorization, errors.New("no authorization field in Request header")
- }
- byteAuthorization, _ = base64.StdEncoding.DecodeString(strAuthorizationBase64)
- return byteAuthorization, nil
- }
- // getMD5FromNewAuthString : Get MD5 bytes from Newly Constructed Authrization String.
- func getMD5FromNewAuthString(r *http.Request) ([]byte, error) {
- var byteMD5 []byte
- // Construct the New Auth String from URI+Query+Body
- bodyContent, err := ioutil.ReadAll(r.Body)
- r.Body.Close()
- if err != nil {
- fmt.Printf("Read Request Body failed : %s \n", err.Error())
- return byteMD5, err
- }
- strCallbackBody := string(bodyContent)
- // fmt.Printf("r.URL.RawPath={%s}, r.URL.Query()={%s}, strCallbackBody={%s}\n", r.URL.RawPath, r.URL.Query(), strCallbackBody)
- strURLPathDecode, errUnescape := unescapePath(r.URL.Path, encodePathSegment) //url.PathUnescape(r.URL.Path) for Golang v1.8.2+
- if errUnescape != nil {
- fmt.Printf("url.PathUnescape failed : URL.Path=%s, error=%s \n", r.URL.Path, err.Error())
- return byteMD5, errUnescape
- }
- // Generate New Auth String prepare for MD5
- strAuth := ""
- if r.URL.RawQuery == "" {
- strAuth = fmt.Sprintf("%s\n%s", strURLPathDecode, strCallbackBody)
- } else {
- strAuth = fmt.Sprintf("%s?%s\n%s", strURLPathDecode, r.URL.RawQuery, strCallbackBody)
- }
- // fmt.Printf("NewlyConstructedAuthString={%s}\n", strAuth)
- // Generate MD5 from the New Auth String
- md5Ctx := md5.New()
- md5Ctx.Write([]byte(strAuth))
- byteMD5 = md5Ctx.Sum(nil)
- return byteMD5, nil
- }
- /* VerifySignature
- * VerifySignature需要三个重要的数据信息来进行签名验证: 1>获取公钥PublicKey; 2>生成新的MD5鉴权串; 3>解码Request携带的鉴权串;
- * 1>获取公钥PublicKey : 从RequestHeader的"x-oss-pub-key-url"字段中获取 URL, 读取URL链接的包含的公钥内容, 进行解码解析, 将其作为rsa.VerifyPKCS1v15的入参。
- * 2>生成新的MD5鉴权串 : 把Request中的url中的path部分进行urldecode, 加上url的query部分, 再加上body, 组合之后进行MD5编码, 得到MD5鉴权字节串。
- * 3>解码Request携带的鉴权串 : 获取RequestHeader的"authorization"字段, 对其进行Base64解码,作为签名验证的鉴权对比串。
- * rsa.VerifyPKCS1v15进行签名验证,返回验证结果。
- * */
- func verifySignature(bytePublicKey []byte, byteMd5 []byte, authorization []byte) bool {
- pubBlock, _ := pem.Decode(bytePublicKey)
- if pubBlock == nil {
- fmt.Printf("Failed to parse PEM block containing the public key")
- return false
- }
- pubInterface, err := x509.ParsePKIXPublicKey(pubBlock.Bytes)
- if (pubInterface == nil) || (err != nil) {
- fmt.Printf("x509.ParsePKIXPublicKey(publicKey) failed : %s \n", err.Error())
- return false
- }
- pub := pubInterface.(*rsa.PublicKey)
- errorVerifyPKCS1v15 := rsa.VerifyPKCS1v15(pub, crypto.MD5, byteMd5, authorization)
- if errorVerifyPKCS1v15 != nil {
- fmt.Printf("\nSignature Verification is Failed : %s \n", errorVerifyPKCS1v15.Error())
- //printByteArray(byteMd5, "AuthMd5(fromNewAuthString)")
- //printByteArray(bytePublicKey, "PublicKeyBase64")
- //printByteArray(authorization, "AuthorizationFromRequest")
- return false
- }
- fmt.Printf("\nSignature Verification is Successful. \n")
- return true
- }
- // responseSuccess : Response 200 to client
- func responseSuccess(w http.ResponseWriter) {
- strResponseBody := "{\"Status\":\"OK\"}"
- w.Header().Set("Content-Type", "application/json")
- w.Header().Set("Content-Length", strconv.Itoa(len(strResponseBody)))
- w.WriteHeader(http.StatusOK)
- w.Write([]byte(strResponseBody))
- fmt.Printf("\nPost Response : 200 OK . \n")
- }
- // responseFailed : Response 400 to client
- func responseFailed(w http.ResponseWriter) {
- w.WriteHeader(http.StatusBadRequest)
- fmt.Printf("\nPost Response : 400 BAD . \n")
- }
- func printByteArray(byteArrary []byte, arrName string) {
- fmt.Printf("++++++++ printByteArray : ArrayName=%s, ArrayLength=%d \n", arrName, len(byteArrary))
- for i := 0; i < len(byteArrary); i++ {
- fmt.Printf("%02x", byteArrary[i])
- }
- fmt.Printf("\n-------- printByteArray : End . \n")
- }
- type EscapeError string
- func (e EscapeError) Error() string {
- return "invalid URL escape " + strconv.Quote(string(e))
- }
- type InvalidHostError string
- func (e InvalidHostError) Error() string {
- return "invalid character " + strconv.Quote(string(e)) + " in host name"
- }
- type encoding int
- const (
- encodePath encoding = 1 + iota
- encodePathSegment
- encodeHost
- encodeZone
- encodeUserPassword
- encodeQueryComponent
- encodeFragment
- )
- // unescapePath : unescapes a string; the mode specifies, which section of the URL string is being unescaped.
- func unescapePath(s string, mode encoding) (string, error) {
- // Count %, check that they're well-formed.
- mode = encodePathSegment
- n := 0
- hasPlus := false
- for i := 0; i < len(s); {
- switch s[i] {
- case '%':
- n++
- if i+2 >= len(s) || !ishex(s[i+1]) || !ishex(s[i+2]) {
- s = s[i:]
- if len(s) > 3 {
- s = s[:3]
- }
- return "", EscapeError(s)
- }
- // Per https://tools.ietf.org/html/rfc3986#page-21
- // in the host component %-encoding can only be used
- // for non-ASCII bytes.
- // But https://tools.ietf.org/html/rfc6874#section-2
- // introduces %25 being allowed to escape a percent sign
- // in IPv6 scoped-address literals. Yay.
- if mode == encodeHost && unhex(s[i+1]) < 8 && s[i:i+3] != "%25" {
- return "", EscapeError(s[i : i+3])
- }
- if mode == encodeZone {
- // RFC 6874 says basically "anything goes" for zone identifiers
- // and that even non-ASCII can be redundantly escaped,
- // but it seems prudent to restrict %-escaped bytes here to those
- // that are valid host name bytes in their unescaped form.
- // That is, you can use escaping in the zone identifier but not
- // to introduce bytes you couldn't just write directly.
- // But Windows puts spaces here! Yay.
- v := unhex(s[i+1])<<4 | unhex(s[i+2])
- if s[i:i+3] != "%25" && v != ' ' && shouldEscape(v, encodeHost) {
- return "", EscapeError(s[i : i+3])
- }
- }
- i += 3
- case '+':
- hasPlus = mode == encodeQueryComponent
- i++
- default:
- if (mode == encodeHost || mode == encodeZone) && s[i] < 0x80 && shouldEscape(s[i], mode) {
- return "", InvalidHostError(s[i : i+1])
- }
- i++
- }
- }
- if n == 0 && !hasPlus {
- return s, nil
- }
- t := make([]byte, len(s)-2*n)
- j := 0
- for i := 0; i < len(s); {
- switch s[i] {
- case '%':
- t[j] = unhex(s[i+1])<<4 | unhex(s[i+2])
- j++
- i += 3
- case '+':
- if mode == encodeQueryComponent {
- t[j] = ' '
- } else {
- t[j] = '+'
- }
- j++
- i++
- default:
- t[j] = s[i]
- j++
- i++
- }
- }
- return string(t), nil
- }
- // Please be informed that for now shouldEscape does not check all
- // reserved characters correctly. See golang.org/issue/5684.
- func shouldEscape(c byte, mode encoding) bool {
- // §2.3 Unreserved characters (alphanum)
- if 'A' <= c && c <= 'Z' || 'a' <= c && c <= 'z' || '0' <= c && c <= '9' {
- return false
- }
- if mode == encodeHost || mode == encodeZone {
- // §3.2.2 Host allows
- // sub-delims = "!" / "$" / "&" / "'" / "(" / ")" / "*" / "+" / "," / ";" / "="
- // as part of reg-name.
- // We add : because we include :port as part of host.
- // We add [ ] because we include [ipv6]:port as part of host.
- // We add < > because they're the only characters left that
- // we could possibly allow, and Parse will reject them if we
- // escape them (because hosts can't use %-encoding for
- // ASCII bytes).
- switch c {
- case '!', '$', '&', '\'', '(', ')', '*', '+', ',', ';', '=', ':', '[', ']', '<', '>', '"':
- return false
- }
- }
- switch c {
- case '-', '_', '.', '~': // §2.3 Unreserved characters (mark)
- return false
- case '$', '&', '+', ',', '/', ':', ';', '=', '?', '@': // §2.2 Reserved characters (reserved)
- // Different sections of the URL allow a few of
- // the reserved characters to appear unescaped.
- switch mode {
- case encodePath: // §3.3
- // The RFC allows : @ & = + $ but saves / ; , for assigning
- // meaning to individual path segments. This package
- // only manipulates the path as a whole, so we allow those
- // last three as well. That leaves only ? to escape.
- return c == '?'
- case encodePathSegment: // §3.3
- // The RFC allows : @ & = + $ but saves / ; , for assigning
- // meaning to individual path segments.
- return c == '/' || c == ';' || c == ',' || c == '?'
- case encodeUserPassword: // §3.2.1
- // The RFC allows ';', ':', '&', '=', '+', '$', and ',' in
- // userinfo, so we must escape only '@', '/', and '?'.
- // The parsing of userinfo treats ':' as special so we must escape
- // that too.
- return c == '@' || c == '/' || c == '?' || c == ':'
- case encodeQueryComponent: // §3.4
- // The RFC reserves (so we must escape) everything.
- return true
- case encodeFragment: // §4.1
- // The RFC text is silent but the grammar allows
- // everything, so escape nothing.
- return false
- }
- }
- // Everything else must be escaped.
- return true
- }
- func ishex(c byte) bool {
- switch {
- case '0' <= c && c <= '9':
- return true
- case 'a' <= c && c <= 'f':
- return true
- case 'A' <= c && c <= 'F':
- return true
- }
- return false
- }
- func unhex(c byte) byte {
- switch {
- case '0' <= c && c <= '9':
- return c - '0'
- case 'a' <= c && c <= 'f':
- return c - 'a' + 10
- case 'A' <= c && c <= 'F':
- return c - 'A' + 10
- }
- return 0
- }
|