|
| 1 | +package com.admin4j.framework.signature; |
| 2 | + |
| 3 | +import com.admin4j.framework.signature.annotation.Signature; |
| 4 | +import com.admin4j.framework.signature.properties.SignatureProperties; |
| 5 | +import com.alibaba.fastjson2.JSONObject; |
| 6 | +import org.apache.commons.lang3.StringUtils; |
| 7 | +import org.slf4j.Logger; |
| 8 | +import org.slf4j.LoggerFactory; |
| 9 | +import org.springframework.data.redis.core.StringRedisTemplate; |
| 10 | +import org.springframework.util.CollectionUtils; |
| 11 | +import org.springframework.util.DigestUtils; |
| 12 | + |
| 13 | +import javax.servlet.http.HttpServletRequest; |
| 14 | +import java.io.IOException; |
| 15 | +import java.util.Map; |
| 16 | +import java.util.SortedMap; |
| 17 | +import java.util.TreeMap; |
| 18 | +import java.util.concurrent.TimeUnit; |
| 19 | + |
| 20 | +/** |
| 21 | + * @author zhougang |
| 22 | + * @since 2023/11/10 10:43 |
| 23 | + */ |
| 24 | +public abstract class AbstractSignature implements SignatureService { |
| 25 | + |
| 26 | + private static final Logger log = LoggerFactory.getLogger(AbstractSignature.class); |
| 27 | + |
| 28 | + private final StringRedisTemplate stringRedisTemplate; |
| 29 | + |
| 30 | + private final SignatureProperties signatureProperties; |
| 31 | + |
| 32 | + private static final String SIGNATURE_NONCE_REDIS_KEY = "signature:nonce:"; |
| 33 | + |
| 34 | + public AbstractSignature(StringRedisTemplate stringRedisTemplate, SignatureProperties signatureProperties) { |
| 35 | + this.stringRedisTemplate = stringRedisTemplate; |
| 36 | + this.signatureProperties = signatureProperties; |
| 37 | + } |
| 38 | + |
| 39 | + /** |
| 40 | + * 判断请求是否签名通过 |
| 41 | + * |
| 42 | + * @param request HttpServletRequest |
| 43 | + * @return 是否通过 |
| 44 | + */ |
| 45 | + @Override |
| 46 | + public boolean verify(Signature signature, HttpServletRequest request) throws IOException { |
| 47 | + // 根据appId获取appSecret |
| 48 | + String appId = request.getHeader(signature.appId().filedName()); |
| 49 | + String appSecret; |
| 50 | + if (StringUtils.isBlank(appId) || |
| 51 | + StringUtils.isBlank(appSecret = getAppSecret(request.getHeader(signature.appId().filedName())))) { |
| 52 | + return false; |
| 53 | + } |
| 54 | + // 根据request 中 header值生成SignatureHeaders实体 |
| 55 | + if (!verifyHeaders(signature, request)) { |
| 56 | + return false; |
| 57 | + } |
| 58 | + // 获取全部参数(包括URL和Body上的) |
| 59 | + SortedMap<String, String> allParams = getAllParams(signature, request); |
| 60 | + // 生成服务端签名 |
| 61 | + String plainText = paramsSplicing(allParams, appSecret); |
| 62 | + // 将digest 转换成UTF-8 的 byte[] 后 使用MD5算法加密,最后将生成的md5字符串 |
| 63 | + String serverSign = digestEncoder(plainText); |
| 64 | + // 客户端签名 |
| 65 | + String clientSign = request.getHeader(signature.sign().filedName()); |
| 66 | + if (!StringUtils.equals(clientSign, serverSign)) { |
| 67 | + return false; |
| 68 | + } |
| 69 | + String nonce = allParams.get(signature.nonce().filedName()); |
| 70 | + // 将 nonce 记入缓存,防止重复使用(重点二:此处需要将 ttl 设定为允许 timestamp 时间差的值 x 2 ) |
| 71 | + stringRedisTemplate.opsForValue().set(SIGNATURE_NONCE_REDIS_KEY + nonce, nonce, signatureProperties.getExpireTime() * 2, TimeUnit.MILLISECONDS); |
| 72 | + return true; |
| 73 | + } |
| 74 | + |
| 75 | + /* |
| 76 | + private SignatureHeaders getSignatureHeaders(Signature signature, HttpServletRequest request) { |
| 77 | + SignatureHeaders signatureHeaders = new SignatureHeaders(); |
| 78 | + signatureHeaders.setAppId(request.getHeader(signature.appId().filedName())); |
| 79 | + signatureHeaders.setAppId(request.getHeader(signature.timestamp().filedName())); |
| 80 | + signatureHeaders.setAppId(request.getHeader(signature.nonce().filedName())); |
| 81 | + signatureHeaders.setAppId(request.getHeader(signature.sign().filedName())); |
| 82 | + return signatureHeaders; |
| 83 | + } |
| 84 | + */ |
| 85 | + |
| 86 | + /** |
| 87 | + * 1.appId是否合法,appId是否有对应的appSecret。 |
| 88 | + * 2.请求是否已经超时,默认10分钟。 |
| 89 | + * 3.随机串是否合法,是否在指定时间内已经访问过了。 |
| 90 | + * 4.sign是否合法。 |
| 91 | + */ |
| 92 | + private boolean verifyHeaders(Signature signature, HttpServletRequest request) { |
| 93 | + |
| 94 | + String timestamp = request.getHeader(signature.timestamp().filedName()); |
| 95 | + //Assert.notNull(timestamp, "timestamp cannot be empty"); |
| 96 | + if (StringUtils.isBlank(timestamp)) { |
| 97 | + return false; |
| 98 | + } |
| 99 | + |
| 100 | + Long expireTime = signatureProperties.getExpireTime(); |
| 101 | + //其他合法性校验 |
| 102 | + long requestTimestamp = Long.parseLong(timestamp); |
| 103 | + // 检查 timestamp 是否超出允许的范围 (重点一:此处需要取绝对值) |
| 104 | + long timestampDisparity = Math.abs(System.currentTimeMillis() - requestTimestamp); |
| 105 | + //Assert.isTrue(!(timestampDisparity > expireTime), "Request time exceeds the specified limit"); |
| 106 | + if (timestampDisparity > expireTime) { |
| 107 | + return false; |
| 108 | + } |
| 109 | + |
| 110 | + String nonce = request.getHeader(signature.nonce().filedName()); |
| 111 | + //Assert.notNull(nonce, "Random strings cannot be empty"); |
| 112 | + if (StringUtils.isBlank(nonce)) { |
| 113 | + return false; |
| 114 | + } |
| 115 | + //Assert.isTrue(!(nonce.length() < 10), "The random string nonce length is at least 10 bits"); |
| 116 | + if (nonce.length() < 10) { |
| 117 | + return false; |
| 118 | + } |
| 119 | + String cacheNonce = stringRedisTemplate.opsForValue().get(SIGNATURE_NONCE_REDIS_KEY + nonce); |
| 120 | + //Assert.isNull(cacheNonce, "This nonce has already been used and the request is invalid"); |
| 121 | + if (StringUtils.isNotBlank(cacheNonce)) { |
| 122 | + return false; |
| 123 | + } |
| 124 | + |
| 125 | + String sign = request.getHeader(signature.sign().filedName()); |
| 126 | + //Assert.notNull(sign, "sign cannot be empty"); |
| 127 | + return StringUtils.isNotBlank(sign); |
| 128 | + } |
| 129 | + |
| 130 | + /** |
| 131 | + * 获取全部参数(包括URL和Body上的) |
| 132 | + * |
| 133 | + * @param request request |
| 134 | + * @return |
| 135 | + */ |
| 136 | + protected SortedMap<String, String> getAllParams(Signature signature, HttpServletRequest request) throws IOException { |
| 137 | + |
| 138 | + SortedMap<String, String> sortedMap = new TreeMap<>(); |
| 139 | + |
| 140 | + sortedMap.put(signature.appId().filedName(), request.getHeader(signature.appId().filedName())); |
| 141 | + sortedMap.put(signature.timestamp().filedName(), request.getHeader(signature.timestamp().filedName())); |
| 142 | + sortedMap.put(signature.nonce().filedName(), request.getHeader(signature.nonce().filedName())); |
| 143 | + // 有url带动态参数的情况, 所以加上url, 客户端对应也要拼接 |
| 144 | + sortedMap.put("url", request.getServletPath()); |
| 145 | + |
| 146 | + // 获取parameters(对应@RequestParam) |
| 147 | + if (!CollectionUtils.isEmpty(request.getParameterMap())) { |
| 148 | + Map<String, String[]> requestParams = request.getParameterMap(); |
| 149 | + //获取GET请求参数,以键值对形式保存 |
| 150 | + for (Map.Entry<String, String[]> entry : requestParams.entrySet()) { |
| 151 | + sortedMap.put(entry.getKey(), entry.getValue()[0]); |
| 152 | + } |
| 153 | + } |
| 154 | + |
| 155 | + BodyReaderHttpServletRequestWrapper requestWrapper = new BodyReaderHttpServletRequestWrapper(request); |
| 156 | + // 分别获取了request input stream中的body信息、parameter信息 |
| 157 | + JSONObject data = JSONObject.parseObject(requestWrapper.getBody()); |
| 158 | + // 获取POST请求的JSON参数,以键值对形式保存 |
| 159 | + for (Map.Entry<String, Object> entry : data.entrySet()) { |
| 160 | + sortedMap.put(entry.getKey(), entry.getValue().toString()); |
| 161 | + } |
| 162 | + |
| 163 | + return sortedMap; |
| 164 | + } |
| 165 | + |
| 166 | + /** |
| 167 | + * 所有的参数与应用密钥appSecret 进行排序加密后生成签名 |
| 168 | + * |
| 169 | + * @param sortedMap 根据key升序排序的后所有请求参数 |
| 170 | + * @param appSecret 应用id对应的应用密钥 |
| 171 | + * @return 生成接口签名 |
| 172 | + */ |
| 173 | + protected String paramsSplicing(SortedMap<String, String> sortedMap, String appSecret) { |
| 174 | + // 进行key value拼接 |
| 175 | + StringBuilder plainText = new StringBuilder(); |
| 176 | + for (Map.Entry<String, String> entry : sortedMap.entrySet()) { |
| 177 | + plainText.append(entry.getKey()).append(entry.getValue()); |
| 178 | + } |
| 179 | + |
| 180 | + // 结尾拼接应用密钥 appSecret |
| 181 | + plainText.append(appSecret); |
| 182 | + |
| 183 | + // 摘要 |
| 184 | + return plainText.toString(); |
| 185 | + } |
| 186 | + |
| 187 | + /** |
| 188 | + * 获取appId对应的secret,假数据 |
| 189 | + * |
| 190 | + * @param appId 应用id |
| 191 | + * @return |
| 192 | + */ |
| 193 | + protected String getAppSecret(String appId) { |
| 194 | + return ""; |
| 195 | + } |
| 196 | + |
| 197 | + /** |
| 198 | + * 摘要加密 |
| 199 | + * @param plainText |
| 200 | + * @return |
| 201 | + */ |
| 202 | + protected String digestEncoder(String plainText) throws IOException { |
| 203 | + return DigestUtils.md5DigestAsHex(StringUtils.getBytes(plainText, "UTF-8")); |
| 204 | + } |
| 205 | +} |
0 commit comments