142 lines
		
	
	
		
			4.0 KiB
		
	
	
	
		
			Go
		
	
	
	
			
		
		
	
	
			142 lines
		
	
	
		
			4.0 KiB
		
	
	
	
		
			Go
		
	
	
	
/*
 | 
						|
 * Copyright 2025 coze-dev Authors
 | 
						|
 *
 | 
						|
 * Licensed under the Apache License, Version 2.0 (the "License");
 | 
						|
 * you may not use this file except in compliance with the License.
 | 
						|
 * You may obtain a copy of the License at
 | 
						|
 *
 | 
						|
 *     http://www.apache.org/licenses/LICENSE-2.0
 | 
						|
 *
 | 
						|
 * Unless required by applicable law or agreed to in writing, software
 | 
						|
 * distributed under the License is distributed on an "AS IS" BASIS,
 | 
						|
 * WITHOUT WARRANTIES OR CONDITIONS OF ANY KIND, either express or implied.
 | 
						|
 * See the License for the specific language governing permissions and
 | 
						|
 * limitations under the License.
 | 
						|
 */
 | 
						|
 | 
						|
package middleware
 | 
						|
 | 
						|
import (
 | 
						|
	"context"
 | 
						|
	"crypto/md5"
 | 
						|
	"encoding/hex"
 | 
						|
	"regexp"
 | 
						|
	"strings"
 | 
						|
 | 
						|
	"github.com/cloudwego/hertz/pkg/app"
 | 
						|
 | 
						|
	"github.com/coze-dev/coze-studio/backend/api/internal/httputil"
 | 
						|
	"github.com/coze-dev/coze-studio/backend/application/openauth"
 | 
						|
	"github.com/coze-dev/coze-studio/backend/pkg/ctxcache"
 | 
						|
	"github.com/coze-dev/coze-studio/backend/pkg/errorx"
 | 
						|
	"github.com/coze-dev/coze-studio/backend/pkg/lang/conv"
 | 
						|
	"github.com/coze-dev/coze-studio/backend/pkg/logs"
 | 
						|
	"github.com/coze-dev/coze-studio/backend/types/consts"
 | 
						|
	"github.com/coze-dev/coze-studio/backend/types/errno"
 | 
						|
)
 | 
						|
 | 
						|
const HeaderAuthorizationKey = "Authorization"
 | 
						|
 | 
						|
var needAuthPath = map[string]bool{
 | 
						|
	"/v3/chat":                      true,
 | 
						|
	"/v1/conversations":             true,
 | 
						|
	"/v1/conversation/create":       true,
 | 
						|
	"/v1/conversation/message/list": true,
 | 
						|
	"/v1/files/upload":              true,
 | 
						|
	"/v1/workflow/run":              true,
 | 
						|
	"/v1/workflow/stream_run":       true,
 | 
						|
	"/v1/workflow/stream_resume":    true,
 | 
						|
	"/v1/workflow/get_run_history":  true,
 | 
						|
	"/v1/bot/get_online_info":       true,
 | 
						|
}
 | 
						|
 | 
						|
var needAuthFunc = map[string]bool{
 | 
						|
	"^/v1/conversations/[0-9]+/clear$": true, // v1/conversations/:conversation_id/clear
 | 
						|
}
 | 
						|
 | 
						|
func parseBearerAuthToken(authHeader string) string {
 | 
						|
	if len(authHeader) == 0 {
 | 
						|
		return ""
 | 
						|
	}
 | 
						|
	parts := strings.Split(authHeader, "Bearer")
 | 
						|
	if len(parts) != 2 {
 | 
						|
		return ""
 | 
						|
	}
 | 
						|
 | 
						|
	token := strings.TrimSpace(parts[1])
 | 
						|
	if len(token) == 0 {
 | 
						|
		return ""
 | 
						|
	}
 | 
						|
 | 
						|
	return token
 | 
						|
}
 | 
						|
 | 
						|
func isNeedOpenapiAuth(c *app.RequestContext) bool {
 | 
						|
	isNeedAuth := false
 | 
						|
 | 
						|
	uriPath := c.URI().Path()
 | 
						|
 | 
						|
	for rule, res := range needAuthFunc {
 | 
						|
		if regexp.MustCompile(rule).MatchString(string(uriPath)) {
 | 
						|
			isNeedAuth = res
 | 
						|
			break
 | 
						|
		}
 | 
						|
	}
 | 
						|
 | 
						|
	if needAuthPath[string(c.GetRequest().URI().Path())] {
 | 
						|
		isNeedAuth = true
 | 
						|
	}
 | 
						|
 | 
						|
	return isNeedAuth
 | 
						|
}
 | 
						|
 | 
						|
func OpenapiAuthMW() app.HandlerFunc {
 | 
						|
	return func(ctx context.Context, c *app.RequestContext) {
 | 
						|
		requestAuthType := c.GetInt32(RequestAuthTypeStr)
 | 
						|
		if requestAuthType != int32(RequestAuthTypeOpenAPI) {
 | 
						|
			c.Next(ctx)
 | 
						|
			return
 | 
						|
		}
 | 
						|
 | 
						|
		// open api auth
 | 
						|
		if len(c.Request.Header.Get(HeaderAuthorizationKey)) == 0 {
 | 
						|
			httputil.InternalError(ctx, c,
 | 
						|
				errorx.New(errno.ErrUserAuthenticationFailed, errorx.KV("reason", "missing authorization in header")))
 | 
						|
			return
 | 
						|
		}
 | 
						|
 | 
						|
		apiKey := parseBearerAuthToken(c.Request.Header.Get(HeaderAuthorizationKey))
 | 
						|
		if len(apiKey) == 0 {
 | 
						|
			httputil.InternalError(ctx, c,
 | 
						|
				errorx.New(errno.ErrUserAuthenticationFailed, errorx.KV("reason", "missing api_key in request")))
 | 
						|
			return
 | 
						|
		}
 | 
						|
 | 
						|
		md5Hash := md5.Sum([]byte(apiKey))
 | 
						|
		md5Key := hex.EncodeToString(md5Hash[:])
 | 
						|
		apiKeyInfo, err := openauth.OpenAuthApplication.CheckPermission(ctx, md5Key)
 | 
						|
 | 
						|
		if err != nil {
 | 
						|
			logs.CtxErrorf(ctx, "OpenAuthApplication.CheckPermission failed, err=%v", err)
 | 
						|
			httputil.InternalError(ctx, c,
 | 
						|
				errorx.New(errno.ErrUserAuthenticationFailed, errorx.KV("reason", err.Error())))
 | 
						|
			return
 | 
						|
		}
 | 
						|
 | 
						|
		if apiKeyInfo == nil {
 | 
						|
			httputil.InternalError(ctx, c,
 | 
						|
				errorx.New(errno.ErrUserAuthenticationFailed, errorx.KV("reason", "api key invalid")))
 | 
						|
			return
 | 
						|
		}
 | 
						|
 | 
						|
		apiKeyInfo.ConnectorID = consts.APIConnectorID
 | 
						|
		logs.CtxInfof(ctx, "OpenapiAuthMW: apiKeyInfo=%v", conv.DebugJsonToStr(apiKeyInfo))
 | 
						|
		ctxcache.Store(ctx, consts.OpenapiAuthKeyInCtx, apiKeyInfo)
 | 
						|
		err = openauth.OpenAuthApplication.UpdateLastUsedAt(ctx, apiKeyInfo.ID, apiKeyInfo.UserID)
 | 
						|
		if err != nil {
 | 
						|
			logs.CtxErrorf(ctx, "OpenAuthApplication.UpdateLastUsedAt failed, err=%v", err)
 | 
						|
		}
 | 
						|
		c.Next(ctx)
 | 
						|
	}
 | 
						|
}
 |