|
|
|
package handler
|
|
|
|
|
|
|
|
import (
|
|
|
|
"bufio"
|
|
|
|
"bytes"
|
|
|
|
"encoding/base64"
|
|
|
|
"errors"
|
|
|
|
"io"
|
|
|
|
"io/ioutil"
|
|
|
|
"net"
|
|
|
|
"net/http"
|
|
|
|
|
|
|
|
"github.com/tal-tech/go-zero/core/codec"
|
|
|
|
"github.com/tal-tech/go-zero/core/logx"
|
|
|
|
)
|
|
|
|
|
|
|
|
const maxBytes = 1 << 20 // 1 MiB
|
|
|
|
|
|
|
|
var errContentLengthExceeded = errors.New("content length exceeded")
|
|
|
|
|
|
|
|
// CryptionHandler returns a middleware to handle cryption.
|
|
|
|
func CryptionHandler(key []byte) func(http.Handler) http.Handler {
|
|
|
|
return func(next http.Handler) http.Handler {
|
|
|
|
return http.HandlerFunc(func(w http.ResponseWriter, r *http.Request) {
|
|
|
|
cw := newCryptionResponseWriter(w)
|
|
|
|
defer cw.flush(key)
|
|
|
|
|
|
|
|
if r.ContentLength <= 0 {
|
|
|
|
next.ServeHTTP(cw, r)
|
|
|
|
return
|
|
|
|
}
|
|
|
|
|
|
|
|
if err := decryptBody(key, r); err != nil {
|
|
|
|
w.WriteHeader(http.StatusBadRequest)
|
|
|
|
return
|
|
|
|
}
|
|
|
|
|
|
|
|
next.ServeHTTP(cw, r)
|
|
|
|
})
|
|
|
|
}
|
|
|
|
}
|
|
|
|
|
|
|
|
func decryptBody(key []byte, r *http.Request) error {
|
|
|
|
if r.ContentLength > maxBytes {
|
|
|
|
return errContentLengthExceeded
|
|
|
|
}
|
|
|
|
|
|
|
|
var content []byte
|
|
|
|
var err error
|
|
|
|
if r.ContentLength > 0 {
|
|
|
|
content = make([]byte, r.ContentLength)
|
|
|
|
_, err = io.ReadFull(r.Body, content)
|
|
|
|
} else {
|
|
|
|
content, err = ioutil.ReadAll(io.LimitReader(r.Body, maxBytes))
|
|
|
|
}
|
|
|
|
if err != nil {
|
|
|
|
return err
|
|
|
|
}
|
|
|
|
|
|
|
|
content, err = base64.StdEncoding.DecodeString(string(content))
|
|
|
|
if err != nil {
|
|
|
|
return err
|
|
|
|
}
|
|
|
|
|
|
|
|
output, err := codec.EcbDecrypt(key, content)
|
|
|
|
if err != nil {
|
|
|
|
return err
|
|
|
|
}
|
|
|
|
|
|
|
|
var buf bytes.Buffer
|
|
|
|
buf.Write(output)
|
|
|
|
r.Body = ioutil.NopCloser(&buf)
|
|
|
|
|
|
|
|
return nil
|
|
|
|
}
|
|
|
|
|
|
|
|
type cryptionResponseWriter struct {
|
|
|
|
http.ResponseWriter
|
|
|
|
buf *bytes.Buffer
|
|
|
|
}
|
|
|
|
|
|
|
|
func newCryptionResponseWriter(w http.ResponseWriter) *cryptionResponseWriter {
|
|
|
|
return &cryptionResponseWriter{
|
|
|
|
ResponseWriter: w,
|
|
|
|
buf: new(bytes.Buffer),
|
|
|
|
}
|
|
|
|
}
|
|
|
|
|
|
|
|
func (w *cryptionResponseWriter) Flush() {
|
|
|
|
if flusher, ok := w.ResponseWriter.(http.Flusher); ok {
|
|
|
|
flusher.Flush()
|
|
|
|
}
|
|
|
|
}
|
|
|
|
|
|
|
|
func (w *cryptionResponseWriter) Header() http.Header {
|
|
|
|
return w.ResponseWriter.Header()
|
|
|
|
}
|
|
|
|
|
|
|
|
// Hijack implements the http.Hijacker interface.
|
|
|
|
// This expands the Response to fulfill http.Hijacker if the underlying http.ResponseWriter supports it.
|
|
|
|
func (w *cryptionResponseWriter) Hijack() (net.Conn, *bufio.ReadWriter, error) {
|
|
|
|
return w.ResponseWriter.(http.Hijacker).Hijack()
|
|
|
|
}
|
|
|
|
|
|
|
|
func (w *cryptionResponseWriter) Write(p []byte) (int, error) {
|
|
|
|
return w.buf.Write(p)
|
|
|
|
}
|
|
|
|
|
|
|
|
func (w *cryptionResponseWriter) WriteHeader(statusCode int) {
|
|
|
|
w.ResponseWriter.WriteHeader(statusCode)
|
|
|
|
}
|
|
|
|
|
|
|
|
func (w *cryptionResponseWriter) flush(key []byte) {
|
|
|
|
if w.buf.Len() == 0 {
|
|
|
|
return
|
|
|
|
}
|
|
|
|
|
|
|
|
content, err := codec.EcbEncrypt(key, w.buf.Bytes())
|
|
|
|
if err != nil {
|
|
|
|
w.WriteHeader(http.StatusInternalServerError)
|
|
|
|
return
|
|
|
|
}
|
|
|
|
|
|
|
|
body := base64.StdEncoding.EncodeToString(content)
|
|
|
|
if n, err := io.WriteString(w.ResponseWriter, body); err != nil {
|
|
|
|
logx.Errorf("write response failed, error: %s", err)
|
|
|
|
} else if n < len(content) {
|
|
|
|
logx.Errorf("actual bytes: %d, written bytes: %d", len(content), n)
|
|
|
|
}
|
|
|
|
}
|