mirror of
https://github.com/QuantumNous/new-api.git
synced 2026-04-18 17:07:27 +00:00
397 lines
10 KiB
Go
397 lines
10 KiB
Go
package middleware
|
||
|
||
import (
|
||
"fmt"
|
||
"net/http"
|
||
"one-api/common"
|
||
"one-api/constant"
|
||
"one-api/model"
|
||
"one-api/setting"
|
||
"one-api/setting/ratio_setting"
|
||
"one-api/setting/system_setting"
|
||
"one-api/src/oauth"
|
||
"strconv"
|
||
"strings"
|
||
|
||
"github.com/gin-contrib/sessions"
|
||
"github.com/gin-gonic/gin"
|
||
jwt "github.com/golang-jwt/jwt/v5"
|
||
)
|
||
|
||
func validUserInfo(username string, role int) bool {
|
||
// check username is empty
|
||
if strings.TrimSpace(username) == "" {
|
||
return false
|
||
}
|
||
if !common.IsValidateRole(role) {
|
||
return false
|
||
}
|
||
return true
|
||
}
|
||
|
||
func authHelper(c *gin.Context, minRole int) {
|
||
session := sessions.Default(c)
|
||
username := session.Get("username")
|
||
role := session.Get("role")
|
||
id := session.Get("id")
|
||
status := session.Get("status")
|
||
useAccessToken := false
|
||
if username == nil {
|
||
// Check access token
|
||
accessToken := c.Request.Header.Get("Authorization")
|
||
if accessToken == "" {
|
||
c.JSON(http.StatusUnauthorized, gin.H{
|
||
"success": false,
|
||
"message": "无权进行此操作,未登录且未提供 access token",
|
||
})
|
||
c.Abort()
|
||
return
|
||
}
|
||
user := model.ValidateAccessToken(accessToken)
|
||
if user != nil && user.Username != "" {
|
||
if !validUserInfo(user.Username, user.Role) {
|
||
c.JSON(http.StatusOK, gin.H{
|
||
"success": false,
|
||
"message": "无权进行此操作,用户信息无效",
|
||
})
|
||
c.Abort()
|
||
return
|
||
}
|
||
// Token is valid
|
||
username = user.Username
|
||
role = user.Role
|
||
id = user.Id
|
||
status = user.Status
|
||
useAccessToken = true
|
||
} else {
|
||
c.JSON(http.StatusOK, gin.H{
|
||
"success": false,
|
||
"message": "无权进行此操作,access token 无效",
|
||
})
|
||
c.Abort()
|
||
return
|
||
}
|
||
}
|
||
// get header New-Api-User
|
||
apiUserIdStr := c.Request.Header.Get("New-Api-User")
|
||
if apiUserIdStr == "" {
|
||
c.JSON(http.StatusUnauthorized, gin.H{
|
||
"success": false,
|
||
"message": "无权进行此操作,未提供 New-Api-User",
|
||
})
|
||
c.Abort()
|
||
return
|
||
}
|
||
apiUserId, err := strconv.Atoi(apiUserIdStr)
|
||
if err != nil {
|
||
c.JSON(http.StatusUnauthorized, gin.H{
|
||
"success": false,
|
||
"message": "无权进行此操作,New-Api-User 格式错误",
|
||
})
|
||
c.Abort()
|
||
return
|
||
|
||
}
|
||
if id != apiUserId {
|
||
c.JSON(http.StatusUnauthorized, gin.H{
|
||
"success": false,
|
||
"message": "无权进行此操作,New-Api-User 与登录用户不匹配",
|
||
})
|
||
c.Abort()
|
||
return
|
||
}
|
||
if status.(int) == common.UserStatusDisabled {
|
||
c.JSON(http.StatusOK, gin.H{
|
||
"success": false,
|
||
"message": "用户已被封禁",
|
||
})
|
||
c.Abort()
|
||
return
|
||
}
|
||
if role.(int) < minRole {
|
||
c.JSON(http.StatusOK, gin.H{
|
||
"success": false,
|
||
"message": "无权进行此操作,权限不足",
|
||
})
|
||
c.Abort()
|
||
return
|
||
}
|
||
if !validUserInfo(username.(string), role.(int)) {
|
||
c.JSON(http.StatusOK, gin.H{
|
||
"success": false,
|
||
"message": "无权进行此操作,用户信息无效",
|
||
})
|
||
c.Abort()
|
||
return
|
||
}
|
||
c.Set("username", username)
|
||
c.Set("role", role)
|
||
c.Set("id", id)
|
||
c.Set("group", session.Get("group"))
|
||
c.Set("user_group", session.Get("group"))
|
||
c.Set("use_access_token", useAccessToken)
|
||
|
||
//userCache, err := model.GetUserCache(id.(int))
|
||
//if err != nil {
|
||
// c.JSON(http.StatusOK, gin.H{
|
||
// "success": false,
|
||
// "message": err.Error(),
|
||
// })
|
||
// c.Abort()
|
||
// return
|
||
//}
|
||
//userCache.WriteContext(c)
|
||
|
||
c.Next()
|
||
}
|
||
|
||
func TryUserAuth() func(c *gin.Context) {
|
||
return func(c *gin.Context) {
|
||
session := sessions.Default(c)
|
||
id := session.Get("id")
|
||
if id != nil {
|
||
c.Set("id", id)
|
||
}
|
||
c.Next()
|
||
}
|
||
}
|
||
|
||
func UserAuth() func(c *gin.Context) {
|
||
return func(c *gin.Context) {
|
||
authHelper(c, common.RoleCommonUser)
|
||
}
|
||
}
|
||
|
||
func AdminAuth() func(c *gin.Context) {
|
||
return func(c *gin.Context) {
|
||
authHelper(c, common.RoleAdminUser)
|
||
}
|
||
}
|
||
|
||
func RootAuth() func(c *gin.Context) {
|
||
return func(c *gin.Context) {
|
||
authHelper(c, common.RoleRootUser)
|
||
}
|
||
}
|
||
|
||
func WssAuth(c *gin.Context) {
|
||
|
||
}
|
||
|
||
func TokenAuth() func(c *gin.Context) {
|
||
return func(c *gin.Context) {
|
||
rawAuth := c.Request.Header.Get("Authorization")
|
||
// 先检测是否为ws
|
||
if c.Request.Header.Get("Sec-WebSocket-Protocol") != "" {
|
||
// Sec-WebSocket-Protocol: realtime, openai-insecure-api-key.sk-xxx, openai-beta.realtime-v1
|
||
// read sk from Sec-WebSocket-Protocol
|
||
key := c.Request.Header.Get("Sec-WebSocket-Protocol")
|
||
parts := strings.Split(key, ",")
|
||
for _, part := range parts {
|
||
part = strings.TrimSpace(part)
|
||
if strings.HasPrefix(part, "openai-insecure-api-key") {
|
||
key = strings.TrimPrefix(part, "openai-insecure-api-key.")
|
||
break
|
||
}
|
||
}
|
||
c.Request.Header.Set("Authorization", "Bearer "+key)
|
||
}
|
||
// 检查path包含/v1/messages
|
||
if strings.Contains(c.Request.URL.Path, "/v1/messages") {
|
||
anthropicKey := c.Request.Header.Get("x-api-key")
|
||
if anthropicKey != "" {
|
||
c.Request.Header.Set("Authorization", "Bearer "+anthropicKey)
|
||
}
|
||
}
|
||
// gemini api 从query中获取key
|
||
if strings.HasPrefix(c.Request.URL.Path, "/v1beta/models") ||
|
||
strings.HasPrefix(c.Request.URL.Path, "/v1beta/openai/models") ||
|
||
strings.HasPrefix(c.Request.URL.Path, "/v1/models/") {
|
||
skKey := c.Query("key")
|
||
if skKey != "" {
|
||
c.Request.Header.Set("Authorization", "Bearer "+skKey)
|
||
}
|
||
// 从x-goog-api-key header中获取key
|
||
xGoogKey := c.Request.Header.Get("x-goog-api-key")
|
||
if xGoogKey != "" {
|
||
c.Request.Header.Set("Authorization", "Bearer "+xGoogKey)
|
||
}
|
||
}
|
||
key := c.Request.Header.Get("Authorization")
|
||
parts := make([]string, 0)
|
||
key = strings.TrimPrefix(key, "Bearer ")
|
||
if key == "" || key == "midjourney-proxy" {
|
||
key = c.Request.Header.Get("mj-api-secret")
|
||
key = strings.TrimPrefix(key, "Bearer ")
|
||
key = strings.TrimPrefix(key, "sk-")
|
||
parts = strings.Split(key, "-")
|
||
key = parts[0]
|
||
} else {
|
||
key = strings.TrimPrefix(key, "sk-")
|
||
parts = strings.Split(key, "-")
|
||
key = parts[0]
|
||
}
|
||
token, err := model.ValidateUserToken(key)
|
||
if token != nil {
|
||
id := c.GetInt("id")
|
||
if id == 0 {
|
||
c.Set("id", token.UserId)
|
||
}
|
||
}
|
||
if err != nil {
|
||
// OAuth Bearer fallback
|
||
if tryOAuthBearer(c, rawAuth) {
|
||
c.Next()
|
||
return
|
||
}
|
||
abortWithOpenAiMessage(c, http.StatusUnauthorized, err.Error())
|
||
return
|
||
}
|
||
|
||
allowIpsMap := token.GetIpLimitsMap()
|
||
if len(allowIpsMap) != 0 {
|
||
clientIp := c.ClientIP()
|
||
if _, ok := allowIpsMap[clientIp]; !ok {
|
||
abortWithOpenAiMessage(c, http.StatusForbidden, "您的 IP 不在令牌允许访问的列表中")
|
||
return
|
||
}
|
||
}
|
||
|
||
userCache, err := model.GetUserCache(token.UserId)
|
||
if err != nil {
|
||
abortWithOpenAiMessage(c, http.StatusInternalServerError, err.Error())
|
||
return
|
||
}
|
||
userEnabled := userCache.Status == common.UserStatusEnabled
|
||
if !userEnabled {
|
||
abortWithOpenAiMessage(c, http.StatusForbidden, "用户已被封禁")
|
||
return
|
||
}
|
||
|
||
userCache.WriteContext(c)
|
||
|
||
userGroup := userCache.Group
|
||
tokenGroup := token.Group
|
||
if tokenGroup != "" {
|
||
// check common.UserUsableGroups[userGroup]
|
||
if _, ok := setting.GetUserUsableGroups(userGroup)[tokenGroup]; !ok {
|
||
abortWithOpenAiMessage(c, http.StatusForbidden, fmt.Sprintf("令牌分组 %s 已被禁用", tokenGroup))
|
||
return
|
||
}
|
||
// check group in common.GroupRatio
|
||
if !ratio_setting.ContainsGroupRatio(tokenGroup) {
|
||
if tokenGroup != "auto" {
|
||
abortWithOpenAiMessage(c, http.StatusForbidden, fmt.Sprintf("分组 %s 已被弃用", tokenGroup))
|
||
return
|
||
}
|
||
}
|
||
userGroup = tokenGroup
|
||
}
|
||
common.SetContextKey(c, constant.ContextKeyUsingGroup, userGroup)
|
||
|
||
err = SetupContextForToken(c, token, parts...)
|
||
if err != nil {
|
||
return
|
||
}
|
||
c.Next()
|
||
}
|
||
}
|
||
|
||
// tryOAuthBearer validates an OAuth JWT access token and sets minimal context for relay
|
||
func tryOAuthBearer(c *gin.Context, rawAuth string) bool {
|
||
if rawAuth == "" || !strings.HasPrefix(rawAuth, "Bearer ") {
|
||
return false
|
||
}
|
||
tokenString := strings.TrimSpace(strings.TrimPrefix(rawAuth, "Bearer "))
|
||
if tokenString == "" {
|
||
return false
|
||
}
|
||
settings := system_setting.GetOAuth2Settings()
|
||
// Parse & verify
|
||
parsed, err := jwt.Parse(tokenString, func(t *jwt.Token) (interface{}, error) {
|
||
if _, ok := t.Method.(*jwt.SigningMethodRSA); !ok {
|
||
return nil, jwt.ErrTokenSignatureInvalid
|
||
}
|
||
if kid, ok := t.Header["kid"].(string); ok {
|
||
if settings.JWTKeyID != "" && kid != settings.JWTKeyID {
|
||
return nil, jwt.ErrTokenSignatureInvalid
|
||
}
|
||
}
|
||
pub := oauth.GetRSAPublicKey()
|
||
if pub == nil {
|
||
return nil, jwt.ErrTokenUnverifiable
|
||
}
|
||
return pub, nil
|
||
})
|
||
if err != nil || parsed == nil || !parsed.Valid {
|
||
return false
|
||
}
|
||
claims, ok := parsed.Claims.(jwt.MapClaims)
|
||
if !ok {
|
||
return false
|
||
}
|
||
// issuer check when configured
|
||
if iss, ok2 := claims["iss"].(string); !ok2 || (settings.Issuer != "" && iss != settings.Issuer) {
|
||
return false
|
||
}
|
||
// revoke check
|
||
if jti, ok2 := claims["jti"].(string); ok2 && jti != "" {
|
||
if revoked, _ := model.IsTokenRevoked(jti); revoked {
|
||
return false
|
||
}
|
||
}
|
||
// scope check: must contain api:read or api:write or admin
|
||
scope, _ := claims["scope"].(string)
|
||
scopePadded := " " + scope + " "
|
||
if !(strings.Contains(scopePadded, " api:read ") || strings.Contains(scopePadded, " api:write ") || strings.Contains(scopePadded, " admin ")) {
|
||
return false
|
||
}
|
||
// subject must be user id to support quota logic
|
||
sub, _ := claims["sub"].(string)
|
||
uid, err := strconv.Atoi(sub)
|
||
if err != nil || uid <= 0 {
|
||
return false
|
||
}
|
||
// load user cache & set context
|
||
userCache, err := model.GetUserCache(uid)
|
||
if err != nil || userCache == nil || userCache.Status != common.UserStatusEnabled {
|
||
return false
|
||
}
|
||
c.Set("id", uid)
|
||
c.Set("group", userCache.Group)
|
||
c.Set("user_group", userCache.Group)
|
||
// set UsingGroup
|
||
common.SetContextKey(c, constant.ContextKeyUsingGroup, userCache.Group)
|
||
return true
|
||
}
|
||
|
||
func SetupContextForToken(c *gin.Context, token *model.Token, parts ...string) error {
|
||
if token == nil {
|
||
return fmt.Errorf("token is nil")
|
||
}
|
||
c.Set("id", token.UserId)
|
||
c.Set("token_id", token.Id)
|
||
c.Set("token_key", token.Key)
|
||
c.Set("token_name", token.Name)
|
||
c.Set("token_unlimited_quota", token.UnlimitedQuota)
|
||
if !token.UnlimitedQuota {
|
||
c.Set("token_quota", token.RemainQuota)
|
||
}
|
||
if token.ModelLimitsEnabled {
|
||
c.Set("token_model_limit_enabled", true)
|
||
c.Set("token_model_limit", token.GetModelLimitsMap())
|
||
} else {
|
||
c.Set("token_model_limit_enabled", false)
|
||
}
|
||
c.Set("token_group", token.Group)
|
||
if len(parts) > 1 {
|
||
if model.IsAdmin(token.UserId) {
|
||
c.Set("specific_channel_id", parts[1])
|
||
} else {
|
||
abortWithOpenAiMessage(c, http.StatusForbidden, "普通用户不支持指定渠道")
|
||
return fmt.Errorf("普通用户不支持指定渠道")
|
||
}
|
||
}
|
||
return nil
|
||
}
|