All checks were successful
Build Multi-Platform Binaries / build (push) Successful in 11m54s
124 lines
2.8 KiB
Go
124 lines
2.8 KiB
Go
package router
|
|
|
|
import (
|
|
"crypto/subtle"
|
|
"net/http"
|
|
"strings"
|
|
|
|
"github.com/gotunnel/pkg/auth"
|
|
)
|
|
|
|
// Router 路由管理器
|
|
type Router struct {
|
|
mux *http.ServeMux
|
|
}
|
|
|
|
// AuthConfig 认证配置
|
|
type AuthConfig struct {
|
|
Username string
|
|
Password string
|
|
}
|
|
|
|
// New 创建路由管理器
|
|
func New() *Router {
|
|
return &Router{
|
|
mux: http.NewServeMux(),
|
|
}
|
|
}
|
|
|
|
// Handle 注册路由处理器
|
|
func (r *Router) Handle(pattern string, handler http.Handler) {
|
|
r.mux.Handle(pattern, handler)
|
|
}
|
|
|
|
// HandleFunc 注册路由处理函数
|
|
func (r *Router) HandleFunc(pattern string, handler http.HandlerFunc) {
|
|
r.mux.HandleFunc(pattern, handler)
|
|
}
|
|
|
|
// Group 创建路由组
|
|
func (r *Router) Group(prefix string) *RouteGroup {
|
|
return &RouteGroup{
|
|
router: r,
|
|
prefix: prefix,
|
|
}
|
|
}
|
|
|
|
// RouteGroup 路由组
|
|
type RouteGroup struct {
|
|
router *Router
|
|
prefix string
|
|
}
|
|
|
|
// HandleFunc 注册路由组处理函数
|
|
func (g *RouteGroup) HandleFunc(pattern string, handler http.HandlerFunc) {
|
|
g.router.mux.HandleFunc(g.prefix+pattern, handler)
|
|
}
|
|
|
|
// Handler 返回 http.Handler
|
|
func (r *Router) Handler() http.Handler {
|
|
return r.mux
|
|
}
|
|
|
|
// BasicAuthMiddleware 基础认证中间件
|
|
func BasicAuthMiddleware(auth *AuthConfig, next http.Handler) http.Handler {
|
|
return http.HandlerFunc(func(w http.ResponseWriter, r *http.Request) {
|
|
if auth == nil || (auth.Username == "" && auth.Password == "") {
|
|
next.ServeHTTP(w, r)
|
|
return
|
|
}
|
|
|
|
user, pass, ok := r.BasicAuth()
|
|
if !ok {
|
|
w.Header().Set("WWW-Authenticate", `Basic realm="GoTunnel"`)
|
|
http.Error(w, "Unauthorized", http.StatusUnauthorized)
|
|
return
|
|
}
|
|
|
|
userMatch := subtle.ConstantTimeCompare([]byte(user), []byte(auth.Username)) == 1
|
|
passMatch := subtle.ConstantTimeCompare([]byte(pass), []byte(auth.Password)) == 1
|
|
|
|
if !userMatch || !passMatch {
|
|
w.Header().Set("WWW-Authenticate", `Basic realm="GoTunnel"`)
|
|
http.Error(w, "Unauthorized", http.StatusUnauthorized)
|
|
return
|
|
}
|
|
|
|
next.ServeHTTP(w, r)
|
|
})
|
|
}
|
|
|
|
// JWTMiddleware JWT 认证中间件
|
|
func JWTMiddleware(jwtAuth *auth.JWTAuth, skipPaths []string, next http.Handler) http.Handler {
|
|
return http.HandlerFunc(func(w http.ResponseWriter, r *http.Request) {
|
|
// 只对 /api/ 路径进行认证
|
|
if !strings.HasPrefix(r.URL.Path, "/api/") {
|
|
next.ServeHTTP(w, r)
|
|
return
|
|
}
|
|
|
|
// 检查是否跳过认证
|
|
for _, path := range skipPaths {
|
|
if strings.HasPrefix(r.URL.Path, path) {
|
|
next.ServeHTTP(w, r)
|
|
return
|
|
}
|
|
}
|
|
|
|
// 从 Header 获取 token
|
|
authHeader := r.Header.Get("Authorization")
|
|
if authHeader == "" || !strings.HasPrefix(authHeader, "Bearer ") {
|
|
http.Error(w, `{"error":"unauthorized"}`, http.StatusUnauthorized)
|
|
return
|
|
}
|
|
|
|
token := strings.TrimPrefix(authHeader, "Bearer ")
|
|
if _, err := jwtAuth.ValidateToken(token); err != nil {
|
|
http.Error(w, `{"error":"invalid token"}`, http.StatusUnauthorized)
|
|
return
|
|
}
|
|
|
|
next.ServeHTTP(w, r)
|
|
})
|
|
}
|