package controllers import ( "encoding/json" "eta/eta_mobile/cache" "eta/eta_mobile/models/system" "eta/eta_mobile/services/alarm_msg" "eta/eta_mobile/services/data" "fmt" "net/http" "net/url" "strconv" "strings" "time" "github.com/beego/beego/v2/server/web" "eta/eta_mobile/models" "eta/eta_mobile/utils" ) type AfterHandle func(bodyByte []byte) error // AfterHandlerUrlMap 结束后待处理的url var AfterHandlerUrlMap = map[string][]AfterHandle{ "/adminapi/datamanage/chart_info/save": {data.DeleteChartInfoDataRedis, data.DeleteChartClassifyRedis}, //图表保存接口 //"/adminapi/datamanage/chart_info/detail": data.DeleteChartInfoDataRedis, "/adminapi/datamanage/chart_info/edit": {data.DeleteChartInfoDataRedis, data.DeleteChartClassifyRedis}, //图表编辑接口 "/adminapi/datamanage/chart_info/refresh": {data.DeleteChartInfoDataRedis}, //图表刷新接口 "/adminapi/datamanage/chart_info/add": {data.DeleteChartClassifyRedis}, //图表添加接口 "/adminapi/datamanage/chart_classify/delete": {data.DeleteChartInfoDataRedis, data.DeleteChartClassifyRedis}, //图表删除、图表分类删除 "/adminapi/datamanage/chart_classify/add": {data.DeleteChartClassifyRedis}, //新增图表分类接口 "/adminapi/datamanage/chart_classify/edit": {data.DeleteChartClassifyRedis}, //编辑图表分类接口 "/adminapi/datamanage/chart_classify/move": {data.DeleteChartClassifyRedis}, //移动图表分类接口 "/adminapi/datamanage/chart_info/move": {data.DeleteChartClassifyRedis}, //移动图表接口 "/adminapi/datamanage/chart_info/copy": {data.DeleteChartClassifyRedis}, //图表另存为接口 } type BaseAuthController struct { web.Controller SysUser *system.Admin Session *system.SysSession Lang string `description:"当前语言类型,中文:zh;英文:en;默认:zh"` } func (this *BaseAuthController) Prepare() { //fmt.Println("enter prepare") method := this.Ctx.Input.Method() uri := this.Ctx.Input.URI() //fmt.Println("Url:", uri) if method != "HEAD" { if method == "POST" || method == "GET" { // 当前语言 { lang := this.Ctx.Input.Header("Lang") if lang == "" { lang = utils.ZhLangVersion } this.Lang = lang } authorization := this.Ctx.Input.Header("authorization") if authorization == "" { authorization = this.Ctx.Input.Header("Authorization") } if authorization == "" { newAuthorization := this.GetString("authorization") if newAuthorization != `` { authorization = "authorization=" + newAuthorization } else { newAuthorization = this.GetString("Authorization") authorization = "authorization=" + newAuthorization } } else { if strings.Contains(authorization, ";") { authorization = strings.Replace(authorization, ";", "$", 1) } } if authorization == "" { strArr := strings.Split(uri, "?") //for k, v := range strArr { // fmt.Println(k, v) //} if len(strArr) > 1 { authorization := strArr[1] authorization = strings.Replace(authorization, "Authorization", "authorization", -1) //fmt.Println(authorization) } } if authorization == "" { this.JSON(models.BaseResponse{Ret: 408, Msg: "请重新授权!", ErrMsg: "请重新授权:Token is empty or account is empty"}, false, false) this.StopRun() return } authorizationArr := strings.Split(authorization, "$") if len(authorizationArr) <= 1 { this.JSON(models.BaseResponse{Ret: 408, Msg: "请重新授权!", ErrMsg: "请重新授权:Token is empty or account is empty"}, false, false) this.StopRun() return } tokenStr := authorizationArr[0] tokenArr := strings.Split(tokenStr, "=") token := tokenArr[1] accountStr := authorizationArr[1] accountArr := strings.Split(accountStr, "=") account := accountArr[1] //校验token是否合法 // JWT校验Token和Account if !utils.CheckToken(account, token) { this.JSON(models.BaseResponse{Ret: 408, Msg: "鉴权失败,请重新登录!", ErrMsg: "登录失效,请重新登陆!,CheckToken Fail"}, false, false) this.StopRun() return } session, err := system.GetSysSessionByToken(token) if err != nil { if err.Error() == utils.ErrNoRow() { this.JSON(models.BaseResponse{Ret: 408, Msg: "信息已变更,请重新登陆!", ErrMsg: "Token 信息已变更:Token: " + token}, false, false) this.StopRun() return } this.JSON(models.BaseResponse{Ret: 408, Msg: "网络异常,请稍后重试!", ErrMsg: "获取用户信息异常,Eerr:" + err.Error()}, false, false) this.StopRun() return } if session == nil { this.JSON(models.BaseResponse{Ret: 408, Msg: "网络异常,请稍后重试!", ErrMsg: "sesson is empty "}, false, false) this.StopRun() return } if time.Now().After(session.ExpiredTime) { this.JSON(models.BaseResponse{Ret: 408, Msg: "请重新登录!", ErrMsg: "获取用户信息异常,Eerr:" + err.Error()}, false, false) this.StopRun() return } admin, err := system.GetSysUserById(session.SysUserId) if err != nil { if err.Error() == utils.ErrNoRow() { this.JSON(models.BaseResponse{Ret: 408, Msg: "信息已变更,请重新登陆!", ErrMsg: "获取admin 信息失败 " + strconv.Itoa(session.SysUserId)}, false, false) this.StopRun() return } this.JSON(models.BaseResponse{Ret: 408, Msg: "网络异常,请稍后重试!", ErrMsg: "获取admin信息异常,Eerr:" + err.Error()}, false, false) this.StopRun() return } if admin == nil { this.JSON(models.BaseResponse{Ret: 408, Msg: "网络异常,请稍后重试!", ErrMsg: "admin is empty "}, false, false) this.StopRun() return } //如果不是启用状态 if admin.Enabled != 1 { this.JSON(models.BaseResponse{Ret: 408, Msg: "账户信息异常!", ErrMsg: "账户被禁用,不允许登陆!,CheckToken Fail"}, false, false) this.StopRun() return } // 如果当前登录态是不可信设备的,那么需要做过期校验 if session.IsRemember != 1 { loginKey := fmt.Sprint(utils.CACHE_ACCESS_TOKEN_LOGIN, session.Id) loginInfo, _ := utils.Rc.RedisString(loginKey) if loginInfo == `` { this.JSON(models.BaseResponse{Ret: 408, Msg: "超时未操作,系统自动退出!", ErrMsg: "超时未操作,系统自动退出!"}, false, false) this.StopRun() return } if loginInfo != "1" { msg := `该账号于` + admin.LastLoginTime + "在其他网络登录。此客户端已退出登录。" this.JSON(models.BaseResponse{Ret: 408, Msg: msg, ErrMsg: msg}, false, false) this.StopRun() return } utils.Rc.Put(loginKey, "1", utils.LoginCacheTime*time.Minute) // 不信任名单也同步更新 noTrustLoginKey := fmt.Sprint(utils.CACHE_ACCESS_TOKEN_LOGIN_NO_TRUST, admin.AdminId) utils.Rc.Put(noTrustLoginKey, session.Id, utils.LoginCacheTime*time.Minute) } admin.RoleTypeCode = GetSysUserRoleTypeCode(admin.RoleTypeCode) this.SysUser = admin this.Session = session } else { this.JSON(models.BaseResponse{Ret: 408, Msg: "请求异常,请联系客服!", ErrMsg: "POST之外的请求,暂不支持"}, false, false) this.StopRun() return } } } func (c *BaseAuthController) ServeJSON(encoding ...bool) { // 方法处理完后,需要后置处理的业务逻辑 if handlerList, ok := AfterHandlerUrlMap[c.Ctx.Request.URL.Path]; ok { for _, handler := range handlerList { handler(c.Ctx.Input.RequestBody) } } var ( hasIndent = false hasEncoding = false ) if web.BConfig.RunMode == web.PROD { hasIndent = false } if len(encoding) > 0 && encoding[0] == true { hasEncoding = true } if c.Data["json"] == nil { //go utils.SendEmail("异常提醒:", "接口:"+"URI:"+c.Ctx.Input.URI()+";无返回值", utils.EmailSendToUsers) body := "接口:" + "URI:" + c.Ctx.Input.URI() + ";无返回值" go alarm_msg.SendAlarmMsg(body, 1) return } baseRes := c.Data["json"].(*models.BaseResponse) if baseRes != nil && baseRes.Ret != 408 { body, _ := json.Marshal(baseRes) var requestBody string method := c.Ctx.Input.Method() if method == "GET" { requestBody = c.Ctx.Request.RequestURI } else { //requestBody, _ = url.QueryUnescape(string(c.Ctx.Input.RequestBody)) requestBody = string(c.Ctx.Input.RequestBody) } if baseRes.Ret != 200 && baseRes.IsSendEmail { //go utils.SendEmail(utils.APPNAME+"【"+utils.RunMode+"】"+"失败提醒", "URI:"+c.Ctx.Input.URI()+"
"+"Params"+requestBody+"
"+"ErrMsg:"+baseRes.ErrMsg+";
Msg:"+baseRes.Msg+";
Body:"+string(body)+"
"+c.SysUser.RealName, utils.EmailSendToUsers) body := "URI:" + c.Ctx.Input.URI() + "
" + "Params" + requestBody + "
" + "ErrMsg:" + baseRes.ErrMsg + ";
Msg:" + baseRes.Msg + ";
Body:" + string(body) + "
" + c.SysUser.RealName go alarm_msg.SendAlarmMsg(body, 1) } if baseRes.IsAddLog && c.SysUser != nil { go cache.RecordNewLogs(c.SysUser.AdminId, requestBody, string(body), c.SysUser.RealName, c.Ctx.Input.IP(), c.Ctx.Input.URI()) } } c.JSON(c.Data["json"], hasIndent, hasEncoding) } func (c *BaseAuthController) JSON(data interface{}, hasIndent bool, coding bool) error { c.Ctx.Output.Header("Content-Type", "application/json; charset=utf-8") desEncrypt := utils.DesBase64Encrypt([]byte(utils.DesKey), utils.DesKeySalt) c.Ctx.Output.Header("Dk", string(desEncrypt)) // des3加解密key var content []byte var err error if hasIndent { content, err = json.MarshalIndent(data, "", " ") } else { content, err = json.Marshal(data) } if err != nil { http.Error(c.Ctx.Output.Context.ResponseWriter, err.Error(), http.StatusInternalServerError) return err } ip := c.Ctx.Input.IP() requestBody, err := url.QueryUnescape(string(c.Ctx.Input.RequestBody)) if err != nil { requestBody = string(c.Ctx.Input.RequestBody) } if requestBody == "" { requestBody = c.Ctx.Input.URI() } c.logUri(content, requestBody, ip) if coding { content = []byte(utils.StringsToJSON(string(content))) } // 如果不是debug分支的话,那么需要加密返回 if utils.RunMode != "debug" { content = utils.DesBase64Encrypt(content, utils.DesKey) // get请求时,不加双引号就获取不到数据,不知道什么原因,所以还是在前后加上双引号吧 content = []byte(`"` + string(content) + `"`) } if coding { content = []byte(utils.StringsToJSON(string(content))) } return c.Ctx.Output.Body(content) } func GetSysUserRoleTypeCode(roleTypeCode string) string { if roleTypeCode == utils.ROLE_TYPE_CODE_FICC_SELLER || roleTypeCode == utils.ROLE_TYPE_CODE_FICC_DEPARTMENT { return utils.ROLE_TYPE_CODE_FICC_SELLER } if roleTypeCode == utils.ROLE_TYPE_CODE_RAI_SELLER || roleTypeCode == utils.ROLE_TYPE_CODE_RAI_DEPARTMENT { return utils.ROLE_TYPE_CODE_RAI_SELLER } if roleTypeCode == utils.ROLE_TYPE_CODE_RAI_GROUP { return utils.ROLE_TYPE_CODE_RAI_GROUP } if roleTypeCode == utils.ROLE_TYPE_CODE_ADMIN { return utils.ROLE_TYPE_CODE_ADMIN } if roleTypeCode == utils.ROLE_TYPE_CODE_FICC_ADMIN { return utils.ROLE_TYPE_CODE_FICC_ADMIN } if roleTypeCode == utils.ROLE_TYPE_CODE_FICC_TEAM { return utils.ROLE_TYPE_CODE_FICC_TEAM } if roleTypeCode == utils.ROLE_TYPE_CODE_FICC_GROUP { return utils.ROLE_TYPE_CODE_FICC_GROUP } if roleTypeCode == utils.ROLE_TYPE_CODE_RAI_ADMIN { return utils.ROLE_TYPE_CODE_RAI_ADMIN } if roleTypeCode == utils.ROLE_TYPE_CODE_RESEARCHR { return utils.ROLE_TYPE_CODE_FICC_RESEARCHR } if roleTypeCode == utils.ROLE_TYPE_CODE_FICC_RESEARCHR { return utils.ROLE_TYPE_CODE_FICC_RESEARCHR } if roleTypeCode == utils.ROLE_TYPE_CODE_RAI_RESEARCHR { return utils.ROLE_TYPE_CODE_RAI_RESEARCHR } //合规 if roleTypeCode == utils.ROLE_TYPE_CODE_COMPLIANCE { return utils.ROLE_TYPE_CODE_COMPLIANCE } //财务 if roleTypeCode == utils.ROLE_TYPE_CODE_FINANCE { return utils.ROLE_TYPE_CODE_FINANCE } return "" } func (c *BaseAuthController) logUri(respContent []byte, requestBody, ip string) { authorization := "" method := c.Ctx.Input.Method() uri := c.Ctx.Input.URI() //fmt.Println("Url:", uri) if method != "HEAD" { if method == "POST" || method == "GET" { authorization = c.Ctx.Input.Header("authorization") if authorization == "" { authorization = c.Ctx.Input.Header("Authorization") } if authorization == "" { newAuthorization := c.GetString("authorization") if newAuthorization != `` { authorization = "authorization=" + newAuthorization } else { newAuthorization = c.GetString("Authorization") authorization = "authorization=" + newAuthorization } } else { if strings.Contains(authorization, ";") { authorization = strings.Replace(authorization, ";", "$", 1) } } if authorization == "" { strArr := strings.Split(uri, "?") //for k, v := range strArr { // fmt.Println(k, v) //} if len(strArr) > 1 { authorization = strArr[1] authorization = strings.Replace(authorization, "Authorization", "authorization", -1) //fmt.Println(authorization) } } } } utils.ApiLog.Info("uri:%s, authorization:%s, requestBody:%s, responseBody:%s, ip:%s", c.Ctx.Input.URI(), authorization, requestBody, respContent, ip) return }