ai-gateway/middleware/auth.go

120 lines
2.7 KiB
Go
Raw Normal View History

2023-04-22 12:39:27 +00:00
package middleware
import (
"github.com/gin-contrib/sessions"
"github.com/gin-gonic/gin"
"net/http"
2023-04-22 13:14:09 +00:00
"one-api/common"
"one-api/model"
2023-04-23 10:24:11 +00:00
"strings"
2023-04-22 12:39:27 +00:00
)
func authHelper(c *gin.Context, minRole int) {
session := sessions.Default(c)
username := session.Get("username")
role := session.Get("role")
id := session.Get("id")
status := session.Get("status")
if username == nil {
// Check access token
accessToken := c.Request.Header.Get("Authorization")
if accessToken == "" {
c.JSON(http.StatusUnauthorized, gin.H{
"success": false,
"message": "无权进行此操作,未登录且未提供 access token",
})
c.Abort()
return
}
user := model.ValidateAccessToken(accessToken)
if user != nil && user.Username != "" {
// Token is valid
username = user.Username
role = user.Role
id = user.Id
status = user.Status
} else {
c.JSON(http.StatusOK, gin.H{
"success": false,
"message": "无权进行此操作access token 无效",
})
c.Abort()
return
}
2023-04-22 12:39:27 +00:00
}
if status.(int) == common.UserStatusDisabled {
c.JSON(http.StatusOK, gin.H{
"success": false,
"message": "用户已被封禁",
})
c.Abort()
return
}
if role.(int) < minRole {
c.JSON(http.StatusOK, gin.H{
"success": false,
"message": "无权进行此操作,权限不足",
})
c.Abort()
return
}
c.Set("username", username)
c.Set("role", role)
c.Set("id", id)
c.Next()
}
func UserAuth() func(c *gin.Context) {
return func(c *gin.Context) {
authHelper(c, common.RoleCommonUser)
}
}
func AdminAuth() func(c *gin.Context) {
return func(c *gin.Context) {
authHelper(c, common.RoleAdminUser)
}
}
func RootAuth() func(c *gin.Context) {
return func(c *gin.Context) {
authHelper(c, common.RoleRootUser)
}
}
2023-04-23 10:24:11 +00:00
func TokenAuth() func(c *gin.Context) {
2023-04-22 12:39:27 +00:00
return func(c *gin.Context) {
2023-04-23 10:24:11 +00:00
key := c.Request.Header.Get("Authorization")
key = strings.TrimPrefix(key, "Bearer ")
key = strings.TrimPrefix(key, "sk-")
2023-04-23 10:24:11 +00:00
parts := strings.Split(key, "-")
key = parts[0]
token, err := model.ValidateUserToken(key)
if err != nil {
2023-09-17 07:39:46 +00:00
abortWithMessage(c, http.StatusUnauthorized, err.Error())
2023-04-22 12:39:27 +00:00
return
}
userEnabled, err := model.CacheIsUserEnabled(token.UserId)
2023-09-03 13:31:58 +00:00
if err != nil {
2023-09-17 07:39:46 +00:00
abortWithMessage(c, http.StatusInternalServerError, err.Error())
2023-09-03 13:31:58 +00:00
return
}
if !userEnabled {
2023-09-17 07:39:46 +00:00
abortWithMessage(c, http.StatusForbidden, "用户已被封禁")
return
}
2023-04-23 10:24:11 +00:00
c.Set("id", token.UserId)
c.Set("token_id", token.Id)
c.Set("token_name", token.Name)
2023-04-23 10:24:11 +00:00
if len(parts) > 1 {
if model.IsAdmin(token.UserId) {
c.Set("channelId", parts[1])
} else {
2023-09-17 07:39:46 +00:00
abortWithMessage(c, http.StatusForbidden, "普通用户不支持指定渠道")
return
}
2023-04-22 12:39:27 +00:00
}
c.Next()
}
}