- dingding callback

This commit is contained in:
gazebo
2019-03-09 08:10:04 +08:00
parent 9bd3b3f086
commit 803240fc9f
6 changed files with 160 additions and 26 deletions

View File

@@ -1,28 +1,81 @@
package dingdingapi
import (
"crypto/sha1"
"encoding/base64"
"fmt"
"sort"
"strings"
"time"
"git.rosy.net.cn/baseapi/utils"
)
const (
CBTagUserAddOrg = "user_add_org"
CBTagUserModifyOrg = "user_modify_org"
CBTagUserLeaveOrg = "user_leave_org"
)
func (a *API) encrypt(msg, aesKey string) (encryptedMsg string, err error) {
// binAesKey, err := base64.StdEncoding.DecodeString(aesKey)
// if err == nil {
// block, err2 := aes.NewCipher(binAesKey)
// if err = err2; err == nil {
// block.Encrypt()
// }
// }
const (
KeyMsgSignature = "msg_signature"
)
func (a *API) PackCallbackResult(result string) (resultMap map[string]interface{}) {
encryptedResult, err := a.Encrypt(result)
if err == nil {
resultMap = map[string]interface{}{
"encrypt": encryptedResult,
"timeStamp": utils.Int64ToStr(time.Now().Unix()),
"nonce": utils.GetUUID(),
}
resultMap["msg_signature"] = a.calculateCallbackSign(resultMap)
}
return resultMap
}
func (a *API) calculateCallbackSign(data map[string]interface{}) (sign string) {
strList := []string{
a.callbackToken,
}
for k, v := range data {
if k != KeyMsgSignature {
strList = append(strList, v.(string))
}
}
sort.Sort(sort.StringSlice(strList))
return fmt.Sprintf("%x", sha1.Sum([]byte(strings.Join(strList, ""))))
}
func (a *API) Encrypt(msg string) (encryptedMsg string, err error) {
binResult, err := utils.AESCBCEncpryt([]byte(msg), a.callbackAesKey, a.callbackAesKey[:16])
encryptedMsg = base64.StdEncoding.EncodeToString(binResult)
return encryptedMsg, err
}
func (a *API) Decrypt(msg string) (decryptedMsg string, err error) {
binMsg, err := base64.StdEncoding.DecodeString(msg)
if err == nil {
binResult, err2 := utils.AESCBCDecpryt(binMsg, a.callbackAesKey, a.callbackAesKey[:16])
if err = err2; err == nil {
decryptedMsg = string(binResult)
}
}
return decryptedMsg, err
}
func (a *API) RegisterCallback(callbackTagList []string, token, aesKey, urlStr string) (err error) {
_, err = a.AccessAPI("call_back/register_call_back", nil, map[string]interface{}{
"call_back_tag": callbackTagList,
"token": token,
"aes_key": aesKey,
"url": urlStr,
})
if len(callbackTagList) > 0 { // 为0做测试用
_, err = a.AccessAPI("call_back/register_call_back", nil, map[string]interface{}{
"call_back_tag": callbackTagList,
"token": token,
"aes_key": aesKey,
"url": urlStr,
})
}
if err == nil {
a.callbackToken = token
a.callbackAesKey, _ = base64.StdEncoding.DecodeString(aesKey + "=")
}
return err
}

View File

@@ -0,0 +1,16 @@
package dingdingapi
import "testing"
func TestEncrypt(t *testing.T) {
api.RegisterCallback(nil, "token", "M3Z1b1FIXjlAWW84bEVxNENHSlZOUFJEbkAlRUZQXnE", "")
encryptedMsg, err := api.Encrypt("hello")
decryptedMsg, err := api.Decrypt(encryptedMsg)
t.Log(encryptedMsg, decryptedMsg, err)
}
func TestPackCallbackResult(t *testing.T) {
api.RegisterCallback(nil, "token", "M3Z1b1FIXjlAWW84bEVxNENHSlZOUFJEbkAlRUZQXnE", "")
success := api.PackCallbackResult("success")
t.Log(success)
}

View File

@@ -34,6 +34,9 @@ type API struct {
client *http.Client
config *platformapi.APIConfig
locker sync.RWMutex
callbackToken string
callbackAesKey []byte
}
func New(appID, secret string, config ...*platformapi.APIConfig) *API {

View File

@@ -1,8 +1,7 @@
package weixinapi
import (
"crypto/aes"
"crypto/cipher"
"bytes"
"git.rosy.net.cn/baseapi/utils"
)
@@ -86,19 +85,18 @@ func (a *API) SNSDecodeMiniProgramData(encryptedData, sessionKey, iv string) (de
if err != nil {
return nil, err
}
c, err := aes.NewCipher(decodedDataList[1])
if err != nil {
return nil, err
}
cfbdec := cipher.NewCBCDecrypter(c, decodedDataList[2][:c.BlockSize()])
decryptedData = make([]byte, len(decodedDataList[0]))
cfbdec.CryptBlocks(decryptedData, decodedDataList[0])
decryptedData = PKCS7UnPadding(decryptedData)
return decryptedData, nil
decryptedData, err = utils.AESCBCDecpryt(decodedDataList[0], decodedDataList[1], decodedDataList[2])
return decryptedData, err
}
func PKCS7UnPadding(origData []byte) []byte {
func PKCSUnPadding(origData []byte) []byte {
length := len(origData)
unpadding := int(origData[length-1])
return origData[:(length - unpadding)]
}
func PKCSPadding(ciphertext []byte, blockSize int) []byte {
padding := blockSize - len(ciphertext)%blockSize
padtext := bytes.Repeat([]byte{byte(padding)}, padding)
return append(ciphertext, padtext...)
}

43
utils/utils_crypt.go Normal file
View File

@@ -0,0 +1,43 @@
package utils
import (
"bytes"
"crypto/aes"
"crypto/cipher"
)
func AESCBCEncpryt(data, aesKey, iv []byte) (encryptedData []byte, err error) {
c, err := aes.NewCipher(aesKey)
if err != nil {
return nil, err
}
cfbdec := cipher.NewCBCEncrypter(c, iv[:c.BlockSize()])
data = PKCSPadding(data, c.BlockSize())
encryptedData = make([]byte, len(data))
cfbdec.CryptBlocks(encryptedData, data)
return encryptedData, nil
}
func AESCBCDecpryt(encryptedData, aesKey, iv []byte) (decryptedData []byte, err error) {
c, err := aes.NewCipher(aesKey)
if err != nil {
return nil, err
}
cfbdec := cipher.NewCBCDecrypter(c, iv[:c.BlockSize()])
decryptedData = make([]byte, len(encryptedData))
cfbdec.CryptBlocks(decryptedData, encryptedData)
decryptedData = PKCSUnPadding(decryptedData)
return decryptedData, nil
}
func PKCSUnPadding(origData []byte) []byte {
length := len(origData)
unpadding := int(origData[length-1])
return origData[:(length - unpadding)]
}
func PKCSPadding(ciphertext []byte, blockSize int) []byte {
padding := blockSize - len(ciphertext)%blockSize
padtext := bytes.Repeat([]byte{byte(padding)}, padding)
return append(ciphertext, padtext...)
}

21
utils/utils_crypt_test.go Normal file
View File

@@ -0,0 +1,21 @@
package utils
import (
"testing"
)
func TestCrypt(t *testing.T) {
aesKey := []byte("123456789012345678901234567890ab")
msg := "hellasfsafsdsads"
encryptedMsg, err := AESCBCEncpryt([]byte(msg), aesKey, aesKey[:16])
if err != nil {
t.Fatal(err)
}
decryptedMsg, err := AESCBCDecpryt(encryptedMsg, aesKey, aesKey[:16])
if err != nil {
t.Fatal(err)
}
if msg != string(decryptedMsg) {
t.Fatal("result is wrong")
}
}