mirror of
https://github.com/openimsdk/open-im-server.git
synced 2025-04-05 20:11:14 +08:00
* statistics user register * refactor: router change * minio init * UserRegisterCount * push use local conn * refactor: user pb update * remove online push close grpc conn * refactor: user pb update * refactor:pb file * msgs statistics * msgs statistics * revoke userID * refactor: errcode update * active user * active user * active user * refactor: errcode update * feat: conn update token * active user * active user * feat: conn update token * active user * feat: conn update token * feat: conn update token * feat: conn update token * add tx_oss cos * active user * active user * group create * group create * feat: group notification show to conversation * feat: group notification show to conversation * group active * user active * sendNotificationWithName * withname * privateChat * a2r call option * grpc with detail return error * change log error * chain unary interceptor * api nil slice map * fix sync has read * fix: text update * fix: update add model * set conversations update * set privateChat * fix: content update * remove unuse rpc * msgDestruct * cron use rpc mw * set IsMsgDestruct * msg destruct * msgDestruct * s3 minio, cos, oss support * feat: add implement of GetUsersOnlineStatus, #472 (#477) * s3 minio, cos, oss support * s3 route * remove extendMsg code * s3 route * remove unuse code * s3 pb * s3 pb * s3 pb * s3 presigned put * s3 presigned test * s3 presigned test * s3 presigned test * s3 presigned test * s3 presigned test * s3 presigned test * s3 presigned test * s3 presigned test * Update .gitignore (#482) * s3 debug log * s3 debug log * cron add log and fix cron * add log * cron * s3 config * fix kick user bug * s3 cos * add kick log * s3 cos test * s3 cos test * s3 cos test * kick user log * kickuserlog * s3 cos copy * s3 cos copy * s3 url * s3 url * s3 AccessURL * log * s3 InitiateMultipartUpload add ExpireTime * feat: regenerate pb file * feat: regenerate pb file * Revert "feat: regenerate pb file" This reverts commit 434f22564a89f816cbe944ab61bd9ff3414f0885. * Delete .idea directory * feat: regenerate pb file * fix: remove import C * fix: add msg transfer main file * fix: get user online status fix --------- Co-authored-by: withchao <993506633@qq.com> Co-authored-by: wangchuxiao <wangchuxiao97@outlook.com> Co-authored-by: BanTanger <88583317+BanTanger@users.noreply.github.com> Co-authored-by: withchao <48119764+withchao@users.noreply.github.com> Co-authored-by: Alan <68671759+hanzhixiao@users.noreply.github.com>
82 lines
2.4 KiB
Go
82 lines
2.4 KiB
Go
package oss
|
|
|
|
import (
|
|
"crypto/hmac"
|
|
"crypto/sha1"
|
|
"crypto/sha256"
|
|
"encoding/base64"
|
|
"github.com/aliyun/aliyun-oss-go-sdk/oss"
|
|
"hash"
|
|
"io"
|
|
"net/http"
|
|
"sort"
|
|
"strings"
|
|
)
|
|
|
|
func (o *OSS) getAdditionalHeaderKeys(req *http.Request) ([]string, map[string]string) {
|
|
var keysList []string
|
|
keysMap := make(map[string]string)
|
|
srcKeys := make(map[string]string)
|
|
|
|
for k := range req.Header {
|
|
srcKeys[strings.ToLower(k)] = ""
|
|
}
|
|
|
|
for _, v := range o.bucket.Client.Config.AdditionalHeaders {
|
|
if _, ok := srcKeys[strings.ToLower(v)]; ok {
|
|
keysMap[strings.ToLower(v)] = ""
|
|
}
|
|
}
|
|
|
|
for k := range keysMap {
|
|
keysList = append(keysList, k)
|
|
}
|
|
sort.Strings(keysList)
|
|
return keysList, keysMap
|
|
}
|
|
|
|
func (o *OSS) getSignedStr(req *http.Request, canonicalizedResource string, keySecret string) string {
|
|
// Find out the "x-oss-"'s address in header of the request
|
|
ossHeadersMap := make(map[string]string)
|
|
additionalList, additionalMap := o.getAdditionalHeaderKeys(req)
|
|
for k, v := range req.Header {
|
|
if strings.HasPrefix(strings.ToLower(k), "x-oss-") {
|
|
ossHeadersMap[strings.ToLower(k)] = v[0]
|
|
} else if o.bucket.Client.Config.AuthVersion == oss.AuthV2 {
|
|
if _, ok := additionalMap[strings.ToLower(k)]; ok {
|
|
ossHeadersMap[strings.ToLower(k)] = v[0]
|
|
}
|
|
}
|
|
}
|
|
hs := newHeaderSorter(ossHeadersMap)
|
|
|
|
// Sort the ossHeadersMap by the ascending order
|
|
hs.Sort()
|
|
|
|
// Get the canonicalizedOSSHeaders
|
|
canonicalizedOSSHeaders := ""
|
|
for i := range hs.Keys {
|
|
canonicalizedOSSHeaders += hs.Keys[i] + ":" + hs.Vals[i] + "\n"
|
|
}
|
|
|
|
// Give other parameters values
|
|
// when sign URL, date is expires
|
|
date := req.Header.Get(oss.HTTPHeaderDate)
|
|
contentType := req.Header.Get(oss.HTTPHeaderContentType)
|
|
contentMd5 := req.Header.Get(oss.HTTPHeaderContentMD5)
|
|
|
|
// default is v1 signature
|
|
signStr := req.Method + "\n" + contentMd5 + "\n" + contentType + "\n" + date + "\n" + canonicalizedOSSHeaders + canonicalizedResource
|
|
h := hmac.New(func() hash.Hash { return sha1.New() }, []byte(keySecret))
|
|
|
|
// v2 signature
|
|
if o.bucket.Client.Config.AuthVersion == oss.AuthV2 {
|
|
signStr = req.Method + "\n" + contentMd5 + "\n" + contentType + "\n" + date + "\n" + canonicalizedOSSHeaders + strings.Join(additionalList, ";") + "\n" + canonicalizedResource
|
|
h = hmac.New(func() hash.Hash { return sha256.New() }, []byte(keySecret))
|
|
}
|
|
_, _ = io.WriteString(h, signStr)
|
|
signedStr := base64.StdEncoding.EncodeToString(h.Sum(nil))
|
|
|
|
return signedStr
|
|
}
|