package controllers
import (
"encoding/json"
"eta/eta_api/cache"
"eta/eta_api/models/system"
"eta/eta_api/services/alarm_msg"
"eta/eta_api/services/data"
"fmt"
"github.com/sirupsen/logrus"
"net/http"
"net/url"
"strconv"
"strings"
"time"
"github.com/beego/beego/v2/server/web"
"eta/eta_api/models"
"eta/eta_api/utils"
)
type AfterHandle func(bodyByte []byte) error
// AfterHandlerUrlMap 结束后待处理的url
var AfterHandlerUrlMap = map[string][]AfterHandle{
"/adminapi/datamanage/chart_info/save": {data.DeleteChartInfoDataRedis, data.DeleteChartClassifyRedis}, //图表保存接口
"/adminapi/datamanage/multiple_graph/chart/save": {data.DeleteChartInfoDataRedis, data.DeleteChartClassifyRedis}, //批量图表保存接口
//"/adminapi/datamanage/chart_info/detail": data.DeleteChartInfoDataRedis,
"/adminapi/datamanage/chart_info/edit": {data.DeleteChartInfoDataRedis, data.DeleteChartClassifyRedis}, //图表编辑接口
"/adminapi/datamanage/chart_info/refresh": {data.DeleteChartInfoDataRedis}, //图表刷新接口
"/adminapi/datamanage/chart_info/add": {data.DeleteChartClassifyRedis}, //图表添加接口
"/adminapi/datamanage/chart_classify/delete": {data.DeleteChartInfoDataRedis, data.DeleteChartClassifyRedis}, //图表删除、图表分类删除
"/adminapi/datamanage/chart_classify/add": {data.DeleteChartClassifyRedis}, //新增图表分类接口
"/adminapi/datamanage/chart_classify/edit": {data.DeleteChartClassifyRedis}, //编辑图表分类接口
"/adminapi/datamanage/chart_classify/move": {data.DeleteChartClassifyRedis}, //移动图表分类接口
"/adminapi/datamanage/chart_info/move": {data.DeleteChartClassifyRedis}, //移动图表接口
"/adminapi/datamanage/chart_info/copy": {data.DeleteChartClassifyRedis}, //图表另存为接口
}
var AdminOperateRecordMap = map[string]string{
"/adminapi/pptv2/saveLog": "/adminapi/pptv2/saveLog",
"/adminapi/report/saveReportContent": "/adminapi/report/saveReportContent",
"/adminapi/datamanage/chart_info/common/detail/from_unique_code": "/adminapi/datamanage/chart_info/common/detail/from_unique_code",
"/adminapi/english_report/saveReportContent": "/adminapi/english_report/saveReportContent",
"/adminapi/custom/message/listV2": "/adminapi/custom/message/listV2",
"/adminapi/sysuser/check_pwd": "/adminapi/sysuser/check_pwd",
"/adminapi/system/menu/list": "/adminapi/system/menu/list",
}
type BaseAuthController struct {
web.Controller
SysUser *system.Admin
}
func (c *BaseAuthController) Prepare() {
fmt.Println("enter prepare")
method := c.Ctx.Input.Method()
uri := c.Ctx.Input.URI()
fmt.Println("Url:", uri)
if method != "HEAD" {
if method == "POST" || method == "GET" {
authorization := c.Ctx.Input.Header("authorization")
if authorization == "" {
authorization = c.Ctx.Input.Header("Authorization")
}
if authorization == "" {
newAuthorization := c.GetString("authorization")
if newAuthorization != `` {
authorization = "authorization=" + newAuthorization
} else {
newAuthorization = c.GetString("Authorization")
authorization = "authorization=" + newAuthorization
}
} else {
if strings.Contains(authorization, ";") {
authorization = strings.Replace(authorization, ";", "$", 1)
}
}
if authorization == "" {
strArr := strings.Split(uri, "?")
for k, v := range strArr {
fmt.Println(k, v)
}
if len(strArr) > 1 {
authorization := strArr[1]
authorization = strings.Replace(authorization, "Authorization", "authorization", -1)
fmt.Println(authorization)
}
}
if authorization == "" {
c.JSON(models.BaseResponse{Ret: 408, Msg: "请重新授权!", ErrMsg: "请重新授权:Token is empty or account is empty"}, false, false)
c.StopRun()
return
}
authorizationArr := strings.Split(authorization, "$")
if len(authorizationArr) <= 1 {
c.JSON(models.BaseResponse{Ret: 408, Msg: "请重新授权!", ErrMsg: "请重新授权:Token is empty or account is empty"}, false, false)
c.StopRun()
return
}
tokenStr := authorizationArr[0]
tokenArr := strings.Split(tokenStr, "=")
token := tokenArr[1]
accountStr := authorizationArr[1]
accountArr := strings.Split(accountStr, "=")
account := accountArr[1]
//校验token是否合法
// JWT校验Token和Account
if !utils.CheckToken(account, token) {
c.JSON(models.BaseResponse{Ret: 408, Msg: "鉴权失败,请重新登录!", ErrMsg: "登录失效,请重新登陆!,CheckToken Fail"}, false, false)
c.StopRun()
return
}
session, err := system.GetSysSessionByToken(token)
if err != nil {
if err.Error() == utils.ErrNoRow() {
c.JSON(models.BaseResponse{Ret: 408, Msg: "信息已变更,请重新登陆!", ErrMsg: "Token 信息已变更:Token: " + token}, false, false)
c.StopRun()
return
}
c.JSON(models.BaseResponse{Ret: 408, Msg: "网络异常,请稍后重试!", ErrMsg: "获取用户信息异常,Eerr:" + err.Error()}, false, false)
c.StopRun()
return
}
if session == nil {
c.JSON(models.BaseResponse{Ret: 408, Msg: "网络异常,请稍后重试!", ErrMsg: "sesson is empty "}, false, false)
c.StopRun()
return
}
if time.Now().After(session.ExpiredTime) {
c.JSON(models.BaseResponse{Ret: 408, Msg: "请重新登录!", ErrMsg: "获取用户信息异常,Eerr:" + err.Error()}, false, false)
c.StopRun()
return
}
admin, err := system.GetSysUserById(session.SysUserId)
if err != nil {
if err.Error() == utils.ErrNoRow() {
c.JSON(models.BaseResponse{Ret: 408, Msg: "信息已变更,请重新登陆!", ErrMsg: "获取admin 信息失败 " + strconv.Itoa(session.SysUserId)}, false, false)
c.StopRun()
return
}
c.JSON(models.BaseResponse{Ret: 408, Msg: "网络异常,请稍后重试!", ErrMsg: "获取admin信息异常,Eerr:" + err.Error()}, false, false)
c.StopRun()
return
}
if admin == nil {
c.JSON(models.BaseResponse{Ret: 408, Msg: "网络异常,请稍后重试!", ErrMsg: "admin is empty "}, false, false)
c.StopRun()
return
}
//如果不是启用状态
if admin.Enabled != 1 {
c.JSON(models.BaseResponse{Ret: 408, Msg: "账户信息异常!", ErrMsg: "账户被禁用,不允许登陆!,CheckToken Fail"}, false, false)
c.StopRun()
return
}
// 如果当前登录态是不可信设备的,那么需要做过期校验
if session.IsRemember != 1 {
loginKey := fmt.Sprint(utils.CACHE_ACCESS_TOKEN_LOGIN, session.Id)
loginInfo, _ := utils.Rc.RedisString(loginKey)
if loginInfo == `` {
c.JSON(models.BaseResponse{Ret: 408, Msg: "超时未操作,系统自动退出!", ErrMsg: "超时未操作,系统自动退出!"}, false, false)
c.StopRun()
return
}
if loginInfo != "1" {
msg := `该账号于` + admin.LastLoginTime + "在其他网络登录。此客户端已退出登录。"
c.JSON(models.BaseResponse{Ret: 408, Msg: msg, ErrMsg: msg}, false, false)
c.StopRun()
return
}
// 如果是ETA体验版-更新活跃时长/更新登录时长的接口请求, 则不更新Token时长
if uri != `/adminapi/eta_trial/user/login_duration` && uri != `/adminapi/eta_trial/user/active` {
utils.Rc.Put(loginKey, "1", utils.LoginCacheTime*time.Minute)
// 不信任名单也同步更新
noTrustLoginKey := fmt.Sprint(utils.CACHE_ACCESS_TOKEN_LOGIN_NO_TRUST, admin.AdminId)
utils.Rc.Put(noTrustLoginKey, session.Id, utils.LoginCacheTime*time.Minute)
}
}
admin.RoleTypeCode = GetSysUserRoleTypeCode(admin.RoleTypeCode)
c.SysUser = admin
} else {
c.JSON(models.BaseResponse{Ret: 408, Msg: "请求异常,请联系客服!", ErrMsg: "POST之外的请求,暂不支持"}, false, false)
c.StopRun()
return
}
}
}
func (c *BaseAuthController) ServeJSON(encoding ...bool) {
urlPath := c.Ctx.Request.URL.Path
// 方法处理完后,需要后置处理的业务逻辑
if handlerList, ok := AfterHandlerUrlMap[urlPath]; ok {
for _, handler := range handlerList {
handler(c.Ctx.Input.RequestBody)
}
}
var (
hasIndent = false
hasEncoding = false
)
if web.BConfig.RunMode == web.PROD {
hasIndent = false
}
if len(encoding) > 0 && encoding[0] == true {
hasEncoding = true
}
if c.Data["json"] == nil {
//go utils.SendEmail("异常提醒:", "接口:"+"URI:"+c.Ctx.Input.URI()+";无返回值", utils.EmailSendToUsers)
body := "接口:" + "URI:" + c.Ctx.Input.URI() + ";无返回值"
go alarm_msg.SendAlarmMsg(body, 1)
return
}
baseRes := c.Data["json"].(*models.BaseResponse)
if baseRes != nil && baseRes.Ret != 408 {
body, _ := json.Marshal(baseRes)
var requestBody string
method := c.Ctx.Input.Method()
if method == "GET" {
requestBody = c.Ctx.Request.RequestURI
} else {
//requestBody, _ = url.QueryUnescape(string(c.Ctx.Input.RequestBody))
requestBody = string(c.Ctx.Input.RequestBody)
}
if baseRes.Ret != 200 && baseRes.IsSendEmail {
//go utils.SendEmail(utils.APPNAME+"【"+utils.RunMode+"】"+"失败提醒", "URI:"+c.Ctx.Input.URI()+"
"+"Params"+requestBody+"
"+"ErrMsg:"+baseRes.ErrMsg+";
Msg:"+baseRes.Msg+";
Body:"+string(body)+"
"+c.SysUser.RealName, utils.EmailSendToUsers)
body := "URI:" + c.Ctx.Input.URI() + "
" + "Params" + requestBody + "
" + "ErrMsg:" + baseRes.ErrMsg + ";
Msg:" + baseRes.Msg + ";
Body:" + string(body) + "
" + c.SysUser.RealName
go alarm_msg.SendAlarmMsg(body, 1)
}
if baseRes.IsAddLog && c.SysUser != nil {
go cache.RecordNewLogs(c.SysUser.AdminId, requestBody, string(body), c.SysUser.RealName, c.Ctx.Input.IP(), c.Ctx.Input.URI())
}
}
//新增uuid记录
{
if _, ok := AdminOperateRecordMap[urlPath]; !ok && !strings.Contains(urlPath, "cygx") {
var adminId int
var realName, params, ip, uriStr string
ip = c.Ctx.Input.IP()
if c.SysUser != nil {
adminId = c.SysUser.AdminId
realName = c.SysUser.RealName
}
uuid := c.Ctx.Input.Header("Uuid")
userAgent := c.Ctx.Input.Header("User-Agent")
uri := c.Ctx.Input.URI()
uriStr, _ = url.PathUnescape(uri)
if uriStr != "" {
uri = uriStr
}
if c.Ctx.Input.Method() == "GET" {
paramsJson, _ := json.Marshal(c.Ctx.Input.Params())
params = string(paramsJson)
} else {
params = string(c.Ctx.Input.RequestBody)
}
header := c.Ctx.Request.Header
headerJson, _ := json.Marshal(header)
headerStr := string(headerJson)
go cache.AdminOperateRecord(adminId, realName, uuid, uri, params, ip, userAgent, headerStr)
}
}
c.JSON(c.Data["json"], hasIndent, hasEncoding)
}
func (c *BaseAuthController) JSON(data interface{}, hasIndent bool, coding bool) error {
c.Ctx.Output.Header("Content-Type", "application/json; charset=utf-8")
var content []byte
var err error
if hasIndent {
content, err = json.MarshalIndent(data, "", " ")
} else {
content, err = json.Marshal(data)
}
if err != nil {
http.Error(c.Ctx.Output.Context.ResponseWriter, err.Error(), http.StatusInternalServerError)
return err
}
ip := c.Ctx.Input.IP()
requestBody, err := url.QueryUnescape(string(c.Ctx.Input.RequestBody))
if err != nil {
requestBody = string(c.Ctx.Input.RequestBody)
}
if requestBody == "" {
requestBody = c.Ctx.Input.URI()
}
c.logUri(data, requestBody, ip)
// 如果不是debug分支的话,那么需要加密返回
if utils.RunMode != "debug" {
content = utils.DesBase64Encrypt(content)
// get请求时,不加双引号就获取不到数据,不知道什么原因,所以还是在前后加上双引号吧
content = []byte(`"` + string(content) + `"`)
}
if coding {
content = []byte(utils.StringsToJSON(string(content)))
}
return c.Ctx.Output.Body(content)
}
func GetSysUserRoleTypeCode(roleTypeCode string) string {
if roleTypeCode == utils.ROLE_TYPE_CODE_FICC_SELLER ||
roleTypeCode == utils.ROLE_TYPE_CODE_FICC_DEPARTMENT {
return utils.ROLE_TYPE_CODE_FICC_SELLER
}
if roleTypeCode == utils.ROLE_TYPE_CODE_RAI_SELLER ||
roleTypeCode == utils.ROLE_TYPE_CODE_RAI_DEPARTMENT {
return utils.ROLE_TYPE_CODE_RAI_SELLER
}
if roleTypeCode == utils.ROLE_TYPE_CODE_RAI_GROUP {
return utils.ROLE_TYPE_CODE_RAI_GROUP
}
if roleTypeCode == utils.ROLE_TYPE_CODE_ADMIN {
return utils.ROLE_TYPE_CODE_ADMIN
}
if roleTypeCode == utils.ROLE_TYPE_CODE_FICC_ADMIN {
return utils.ROLE_TYPE_CODE_FICC_ADMIN
}
if roleTypeCode == utils.ROLE_TYPE_CODE_FICC_TEAM {
return utils.ROLE_TYPE_CODE_FICC_TEAM
}
if roleTypeCode == utils.ROLE_TYPE_CODE_FICC_GROUP {
return utils.ROLE_TYPE_CODE_FICC_GROUP
}
if roleTypeCode == utils.ROLE_TYPE_CODE_RAI_ADMIN {
return utils.ROLE_TYPE_CODE_RAI_ADMIN
}
if roleTypeCode == utils.ROLE_TYPE_CODE_RESEARCHR {
return utils.ROLE_TYPE_CODE_FICC_RESEARCHR
}
if roleTypeCode == utils.ROLE_TYPE_CODE_FICC_RESEARCHR {
return utils.ROLE_TYPE_CODE_FICC_RESEARCHR
}
if roleTypeCode == utils.ROLE_TYPE_CODE_RAI_RESEARCHR {
return utils.ROLE_TYPE_CODE_RAI_RESEARCHR
}
//合规
if roleTypeCode == utils.ROLE_TYPE_CODE_COMPLIANCE {
return utils.ROLE_TYPE_CODE_COMPLIANCE
}
//财务
if roleTypeCode == utils.ROLE_TYPE_CODE_FINANCE {
return utils.ROLE_TYPE_CODE_FINANCE
}
return ""
}
func (c *BaseAuthController) logUri(data interface{}, requestBody, ip string) {
authorization := ""
method := c.Ctx.Input.Method()
uri := c.Ctx.Input.URI()
fmt.Println("Url:", uri)
if method != "HEAD" {
if method == "POST" || method == "GET" {
authorization = c.Ctx.Input.Header("authorization")
if authorization == "" {
authorization = c.Ctx.Input.Header("Authorization")
}
if authorization == "" {
newAuthorization := c.GetString("authorization")
if newAuthorization != `` {
authorization = "authorization=" + newAuthorization
} else {
newAuthorization = c.GetString("Authorization")
authorization = "authorization=" + newAuthorization
}
} else {
if strings.Contains(authorization, ";") {
authorization = strings.Replace(authorization, ";", "$", 1)
}
}
if authorization == "" {
strArr := strings.Split(uri, "?")
for k, v := range strArr {
fmt.Println(k, v)
}
if len(strArr) > 1 {
authorization = strArr[1]
authorization = strings.Replace(authorization, "Authorization", "authorization", -1)
fmt.Println(authorization)
}
}
}
}
var reqData interface{}
err := json.Unmarshal([]byte(requestBody), &reqData)
if err != nil {
utils.ApiLog.WithFields(logrus.Fields{
"uri": c.Ctx.Input.URI(),
"authorization": authorization,
"requestBody": requestBody,
"responseBody": data,
"ip": ip,
}).Info("请求详情")
} else {
utils.ApiLog.WithFields(logrus.Fields{
"uri": c.Ctx.Input.URI(),
"authorization": authorization,
"requestBody": reqData,
"responseBody": data,
"ip": ip,
}).Info("请求详情")
}
return
}