cryptionhandler.go 3.0 KB

123456789101112131415161718192021222324252627282930313233343536373839404142434445464748495051525354555657585960616263646566676869707172737475767778798081828384858687888990919293949596979899100101102103104105106107108109110111112113114115116117118119120121122123124125126127128129130131132133
  1. package handler
  2. import (
  3. "bufio"
  4. "bytes"
  5. "encoding/base64"
  6. "errors"
  7. "io"
  8. "net"
  9. "net/http"
  10. "github.com/zeromicro/go-zero/core/codec"
  11. "github.com/zeromicro/go-zero/core/logx"
  12. )
  13. const maxBytes = 1 << 20 // 1 MiB
  14. var errContentLengthExceeded = errors.New("content length exceeded")
  15. // CryptionHandler returns a middleware to handle cryption.
  16. func CryptionHandler(key []byte) func(http.Handler) http.Handler {
  17. return func(next http.Handler) http.Handler {
  18. return http.HandlerFunc(func(w http.ResponseWriter, r *http.Request) {
  19. cw := newCryptionResponseWriter(w)
  20. defer cw.flush(key)
  21. if r.ContentLength <= 0 {
  22. next.ServeHTTP(cw, r)
  23. return
  24. }
  25. if err := decryptBody(key, r); err != nil {
  26. w.WriteHeader(http.StatusBadRequest)
  27. return
  28. }
  29. next.ServeHTTP(cw, r)
  30. })
  31. }
  32. }
  33. func decryptBody(key []byte, r *http.Request) error {
  34. if r.ContentLength > maxBytes {
  35. return errContentLengthExceeded
  36. }
  37. var content []byte
  38. var err error
  39. if r.ContentLength > 0 {
  40. content = make([]byte, r.ContentLength)
  41. _, err = io.ReadFull(r.Body, content)
  42. } else {
  43. content, err = io.ReadAll(io.LimitReader(r.Body, maxBytes))
  44. }
  45. if err != nil {
  46. return err
  47. }
  48. content, err = base64.StdEncoding.DecodeString(string(content))
  49. if err != nil {
  50. return err
  51. }
  52. output, err := codec.EcbDecrypt(key, content)
  53. if err != nil {
  54. return err
  55. }
  56. var buf bytes.Buffer
  57. buf.Write(output)
  58. r.Body = io.NopCloser(&buf)
  59. return nil
  60. }
  61. type cryptionResponseWriter struct {
  62. http.ResponseWriter
  63. buf *bytes.Buffer
  64. }
  65. func newCryptionResponseWriter(w http.ResponseWriter) *cryptionResponseWriter {
  66. return &cryptionResponseWriter{
  67. ResponseWriter: w,
  68. buf: new(bytes.Buffer),
  69. }
  70. }
  71. func (w *cryptionResponseWriter) Flush() {
  72. if flusher, ok := w.ResponseWriter.(http.Flusher); ok {
  73. flusher.Flush()
  74. }
  75. }
  76. func (w *cryptionResponseWriter) Header() http.Header {
  77. return w.ResponseWriter.Header()
  78. }
  79. // Hijack implements the http.Hijacker interface.
  80. // This expands the Response to fulfill http.Hijacker if the underlying http.ResponseWriter supports it.
  81. func (w *cryptionResponseWriter) Hijack() (net.Conn, *bufio.ReadWriter, error) {
  82. if hijacked, ok := w.ResponseWriter.(http.Hijacker); ok {
  83. return hijacked.Hijack()
  84. }
  85. return nil, nil, errors.New("server doesn't support hijacking")
  86. }
  87. func (w *cryptionResponseWriter) Write(p []byte) (int, error) {
  88. return w.buf.Write(p)
  89. }
  90. func (w *cryptionResponseWriter) WriteHeader(statusCode int) {
  91. w.ResponseWriter.WriteHeader(statusCode)
  92. }
  93. func (w *cryptionResponseWriter) flush(key []byte) {
  94. if w.buf.Len() == 0 {
  95. return
  96. }
  97. content, err := codec.EcbEncrypt(key, w.buf.Bytes())
  98. if err != nil {
  99. w.WriteHeader(http.StatusInternalServerError)
  100. return
  101. }
  102. body := base64.StdEncoding.EncodeToString(content)
  103. if n, err := io.WriteString(w.ResponseWriter, body); err != nil {
  104. logx.Errorf("write response failed, error: %s", err)
  105. } else if n < len(content) {
  106. logx.Errorf("actual bytes: %d, written bytes: %d", len(content), n)
  107. }
  108. }