cryptionhandler.go 2.6 KB

123456789101112131415161718192021222324252627282930313233343536373839404142434445464748495051525354555657585960616263646566676869707172737475767778798081828384858687888990919293949596979899100101102103104105106107108109110111112113114115116117118119120121122
  1. package handler
  2. import (
  3. "bytes"
  4. "encoding/base64"
  5. "errors"
  6. "io"
  7. "io/ioutil"
  8. "net/http"
  9. "github.com/tal-tech/go-zero/core/codec"
  10. "github.com/tal-tech/go-zero/core/logx"
  11. )
  12. const maxBytes = 1 << 20 // 1 MiB
  13. var errContentLengthExceeded = errors.New("content length exceeded")
  14. // CryptionHandler returns a middleware to handle cryption.
  15. func CryptionHandler(key []byte) func(http.Handler) http.Handler {
  16. return func(next http.Handler) http.Handler {
  17. return http.HandlerFunc(func(w http.ResponseWriter, r *http.Request) {
  18. cw := newCryptionResponseWriter(w)
  19. defer cw.flush(key)
  20. if r.ContentLength <= 0 {
  21. next.ServeHTTP(cw, r)
  22. return
  23. }
  24. if err := decryptBody(key, r); err != nil {
  25. w.WriteHeader(http.StatusBadRequest)
  26. return
  27. }
  28. next.ServeHTTP(cw, r)
  29. })
  30. }
  31. }
  32. func decryptBody(key []byte, r *http.Request) error {
  33. if r.ContentLength > maxBytes {
  34. return errContentLengthExceeded
  35. }
  36. var content []byte
  37. var err error
  38. if r.ContentLength > 0 {
  39. content = make([]byte, r.ContentLength)
  40. _, err = io.ReadFull(r.Body, content)
  41. } else {
  42. content, err = ioutil.ReadAll(io.LimitReader(r.Body, maxBytes))
  43. }
  44. if err != nil {
  45. return err
  46. }
  47. content, err = base64.StdEncoding.DecodeString(string(content))
  48. if err != nil {
  49. return err
  50. }
  51. output, err := codec.EcbDecrypt(key, content)
  52. if err != nil {
  53. return err
  54. }
  55. var buf bytes.Buffer
  56. buf.Write(output)
  57. r.Body = ioutil.NopCloser(&buf)
  58. return nil
  59. }
  60. type cryptionResponseWriter struct {
  61. http.ResponseWriter
  62. buf *bytes.Buffer
  63. }
  64. func newCryptionResponseWriter(w http.ResponseWriter) *cryptionResponseWriter {
  65. return &cryptionResponseWriter{
  66. ResponseWriter: w,
  67. buf: new(bytes.Buffer),
  68. }
  69. }
  70. func (w *cryptionResponseWriter) Flush() {
  71. if flusher, ok := w.ResponseWriter.(http.Flusher); ok {
  72. flusher.Flush()
  73. }
  74. }
  75. func (w *cryptionResponseWriter) Header() http.Header {
  76. return w.ResponseWriter.Header()
  77. }
  78. func (w *cryptionResponseWriter) Write(p []byte) (int, error) {
  79. return w.buf.Write(p)
  80. }
  81. func (w *cryptionResponseWriter) WriteHeader(statusCode int) {
  82. w.ResponseWriter.WriteHeader(statusCode)
  83. }
  84. func (w *cryptionResponseWriter) flush(key []byte) {
  85. if w.buf.Len() == 0 {
  86. return
  87. }
  88. content, err := codec.EcbEncrypt(key, w.buf.Bytes())
  89. if err != nil {
  90. w.WriteHeader(http.StatusInternalServerError)
  91. return
  92. }
  93. body := base64.StdEncoding.EncodeToString(content)
  94. if n, err := io.WriteString(w.ResponseWriter, body); err != nil {
  95. logx.Errorf("write response failed, error: %s", err)
  96. } else if n < len(content) {
  97. logx.Errorf("actual bytes: %d, written bytes: %d", len(content), n)
  98. }
  99. }