142 lines
4.0 KiB
Go
142 lines
4.0 KiB
Go
/*
|
|
* Copyright 2025 coze-dev Authors
|
|
*
|
|
* Licensed under the Apache License, Version 2.0 (the "License");
|
|
* you may not use this file except in compliance with the License.
|
|
* You may obtain a copy of the License at
|
|
*
|
|
* http://www.apache.org/licenses/LICENSE-2.0
|
|
*
|
|
* Unless required by applicable law or agreed to in writing, software
|
|
* distributed under the License is distributed on an "AS IS" BASIS,
|
|
* WITHOUT WARRANTIES OR CONDITIONS OF ANY KIND, either express or implied.
|
|
* See the License for the specific language governing permissions and
|
|
* limitations under the License.
|
|
*/
|
|
|
|
package middleware
|
|
|
|
import (
|
|
"context"
|
|
"crypto/md5"
|
|
"encoding/hex"
|
|
"regexp"
|
|
"strings"
|
|
|
|
"github.com/cloudwego/hertz/pkg/app"
|
|
|
|
"github.com/coze-dev/coze-studio/backend/api/internal/httputil"
|
|
"github.com/coze-dev/coze-studio/backend/application/openauth"
|
|
"github.com/coze-dev/coze-studio/backend/pkg/ctxcache"
|
|
"github.com/coze-dev/coze-studio/backend/pkg/errorx"
|
|
"github.com/coze-dev/coze-studio/backend/pkg/lang/conv"
|
|
"github.com/coze-dev/coze-studio/backend/pkg/logs"
|
|
"github.com/coze-dev/coze-studio/backend/types/consts"
|
|
"github.com/coze-dev/coze-studio/backend/types/errno"
|
|
)
|
|
|
|
const HeaderAuthorizationKey = "Authorization"
|
|
|
|
var needAuthPath = map[string]bool{
|
|
"/v3/chat": true,
|
|
"/v1/conversations": true,
|
|
"/v1/conversation/create": true,
|
|
"/v1/conversation/message/list": true,
|
|
"/v1/files/upload": true,
|
|
"/v1/workflow/run": true,
|
|
"/v1/workflow/stream_run": true,
|
|
"/v1/workflow/stream_resume": true,
|
|
"/v1/workflow/get_run_history": true,
|
|
"/v1/bot/get_online_info": true,
|
|
}
|
|
|
|
var needAuthFunc = map[string]bool{
|
|
"^/v1/conversations/[0-9]+/clear$": true, // v1/conversations/:conversation_id/clear
|
|
}
|
|
|
|
func parseBearerAuthToken(authHeader string) string {
|
|
if len(authHeader) == 0 {
|
|
return ""
|
|
}
|
|
parts := strings.Split(authHeader, "Bearer")
|
|
if len(parts) != 2 {
|
|
return ""
|
|
}
|
|
|
|
token := strings.TrimSpace(parts[1])
|
|
if len(token) == 0 {
|
|
return ""
|
|
}
|
|
|
|
return token
|
|
}
|
|
|
|
func isNeedOpenapiAuth(c *app.RequestContext) bool {
|
|
isNeedAuth := false
|
|
|
|
uriPath := c.URI().Path()
|
|
|
|
for rule, res := range needAuthFunc {
|
|
if regexp.MustCompile(rule).MatchString(string(uriPath)) {
|
|
isNeedAuth = res
|
|
break
|
|
}
|
|
}
|
|
|
|
if needAuthPath[string(c.GetRequest().URI().Path())] {
|
|
isNeedAuth = true
|
|
}
|
|
|
|
return isNeedAuth
|
|
}
|
|
|
|
func OpenapiAuthMW() app.HandlerFunc {
|
|
return func(ctx context.Context, c *app.RequestContext) {
|
|
requestAuthType := c.GetInt32(RequestAuthTypeStr)
|
|
if requestAuthType != int32(RequestAuthTypeOpenAPI) {
|
|
c.Next(ctx)
|
|
return
|
|
}
|
|
|
|
// open api auth
|
|
if len(c.Request.Header.Get(HeaderAuthorizationKey)) == 0 {
|
|
httputil.InternalError(ctx, c,
|
|
errorx.New(errno.ErrUserAuthenticationFailed, errorx.KV("reason", "missing authorization in header")))
|
|
return
|
|
}
|
|
|
|
apiKey := parseBearerAuthToken(c.Request.Header.Get(HeaderAuthorizationKey))
|
|
if len(apiKey) == 0 {
|
|
httputil.InternalError(ctx, c,
|
|
errorx.New(errno.ErrUserAuthenticationFailed, errorx.KV("reason", "missing api_key in request")))
|
|
return
|
|
}
|
|
|
|
md5Hash := md5.Sum([]byte(apiKey))
|
|
md5Key := hex.EncodeToString(md5Hash[:])
|
|
apiKeyInfo, err := openauth.OpenAuthApplication.CheckPermission(ctx, md5Key)
|
|
|
|
if err != nil {
|
|
logs.CtxErrorf(ctx, "OpenAuthApplication.CheckPermission failed, err=%v", err)
|
|
httputil.InternalError(ctx, c,
|
|
errorx.New(errno.ErrUserAuthenticationFailed, errorx.KV("reason", err.Error())))
|
|
return
|
|
}
|
|
|
|
if apiKeyInfo == nil {
|
|
httputil.InternalError(ctx, c,
|
|
errorx.New(errno.ErrUserAuthenticationFailed, errorx.KV("reason", "api key invalid")))
|
|
return
|
|
}
|
|
|
|
apiKeyInfo.ConnectorID = consts.APIConnectorID
|
|
logs.CtxInfof(ctx, "OpenapiAuthMW: apiKeyInfo=%v", conv.DebugJsonToStr(apiKeyInfo))
|
|
ctxcache.Store(ctx, consts.OpenapiAuthKeyInCtx, apiKeyInfo)
|
|
err = openauth.OpenAuthApplication.UpdateLastUsedAt(ctx, apiKeyInfo.ID, apiKeyInfo.UserID)
|
|
if err != nil {
|
|
logs.CtxErrorf(ctx, "OpenAuthApplication.UpdateLastUsedAt failed, err=%v", err)
|
|
}
|
|
c.Next(ctx)
|
|
}
|
|
}
|