| | package middleware |
| |
|
| | import ( |
| | "net/http" |
| | "one-api/common" |
| | "one-api/model" |
| | "strconv" |
| | "strings" |
| |
|
| | "github.com/gin-contrib/sessions" |
| | "github.com/gin-gonic/gin" |
| | ) |
| |
|
| | func validUserInfo(username string, role int) bool { |
| | |
| | if strings.TrimSpace(username) == "" { |
| | return false |
| | } |
| | if !common.IsValidateRole(role) { |
| | return false |
| | } |
| | return true |
| | } |
| |
|
| | func authHelper(c *gin.Context, minRole int) { |
| | session := sessions.Default(c) |
| | username := session.Get("username") |
| | role := session.Get("role") |
| | id := session.Get("id") |
| | status := session.Get("status") |
| | useAccessToken := false |
| | if username == nil { |
| | |
| | accessToken := c.Request.Header.Get("Authorization") |
| | if accessToken == "" { |
| | c.JSON(http.StatusUnauthorized, gin.H{ |
| | "success": false, |
| | "message": "无权进行此操作,未登录且未提供 access token", |
| | }) |
| | c.Abort() |
| | return |
| | } |
| | user := model.ValidateAccessToken(accessToken) |
| | if user != nil && user.Username != "" { |
| | if !validUserInfo(user.Username, user.Role) { |
| | c.JSON(http.StatusOK, gin.H{ |
| | "success": false, |
| | "message": "无权进行此操作,用户信息无效", |
| | }) |
| | c.Abort() |
| | return |
| | } |
| | |
| | username = user.Username |
| | role = user.Role |
| | id = user.Id |
| | status = user.Status |
| | useAccessToken = true |
| | } else { |
| | c.JSON(http.StatusOK, gin.H{ |
| | "success": false, |
| | "message": "无权进行此操作,access token 无效", |
| | }) |
| | c.Abort() |
| | return |
| | } |
| | } |
| | |
| | apiUserIdStr := c.Request.Header.Get("New-Api-User") |
| | if apiUserIdStr == "" { |
| | c.JSON(http.StatusUnauthorized, gin.H{ |
| | "success": false, |
| | "message": "无权进行此操作,未提供 New-Api-User", |
| | }) |
| | c.Abort() |
| | return |
| | } |
| | apiUserId, err := strconv.Atoi(apiUserIdStr) |
| | if err != nil { |
| | c.JSON(http.StatusUnauthorized, gin.H{ |
| | "success": false, |
| | "message": "无权进行此操作,New-Api-User 格式错误", |
| | }) |
| | c.Abort() |
| | return |
| |
|
| | } |
| | if id != apiUserId { |
| | c.JSON(http.StatusUnauthorized, gin.H{ |
| | "success": false, |
| | "message": "无权进行此操作,New-Api-User 与登录用户不匹配", |
| | }) |
| | c.Abort() |
| | return |
| | } |
| | if status.(int) == common.UserStatusDisabled { |
| | c.JSON(http.StatusOK, gin.H{ |
| | "success": false, |
| | "message": "用户已被封禁", |
| | }) |
| | c.Abort() |
| | return |
| | } |
| | if role.(int) < minRole { |
| | c.JSON(http.StatusOK, gin.H{ |
| | "success": false, |
| | "message": "无权进行此操作,权限不足", |
| | }) |
| | c.Abort() |
| | return |
| | } |
| | if !validUserInfo(username.(string), role.(int)) { |
| | c.JSON(http.StatusOK, gin.H{ |
| | "success": false, |
| | "message": "无权进行此操作,用户信息无效", |
| | }) |
| | c.Abort() |
| | return |
| | } |
| | c.Set("username", username) |
| | c.Set("role", role) |
| | c.Set("id", id) |
| | c.Set("group", session.Get("group")) |
| | c.Set("use_access_token", useAccessToken) |
| | c.Next() |
| | } |
| |
|
| | func TryUserAuth() func(c *gin.Context) { |
| | return func(c *gin.Context) { |
| | session := sessions.Default(c) |
| | id := session.Get("id") |
| | if id != nil { |
| | c.Set("id", id) |
| | } |
| | c.Next() |
| | } |
| | } |
| |
|
| | func UserAuth() func(c *gin.Context) { |
| | return func(c *gin.Context) { |
| | authHelper(c, common.RoleCommonUser) |
| | } |
| | } |
| |
|
| | func AdminAuth() func(c *gin.Context) { |
| | return func(c *gin.Context) { |
| | authHelper(c, common.RoleAdminUser) |
| | } |
| | } |
| |
|
| | func RootAuth() func(c *gin.Context) { |
| | return func(c *gin.Context) { |
| | authHelper(c, common.RoleRootUser) |
| | } |
| | } |
| |
|
| | func WssAuth(c *gin.Context) { |
| |
|
| | } |
| |
|
| | func TokenAuth() func(c *gin.Context) { |
| | return func(c *gin.Context) { |
| | |
| | if c.Request.Header.Get("Sec-WebSocket-Protocol") != "" { |
| | |
| | |
| | key := c.Request.Header.Get("Sec-WebSocket-Protocol") |
| | parts := strings.Split(key, ",") |
| | for _, part := range parts { |
| | part = strings.TrimSpace(part) |
| | if strings.HasPrefix(part, "openai-insecure-api-key") { |
| | key = strings.TrimPrefix(part, "openai-insecure-api-key.") |
| | break |
| | } |
| | } |
| | c.Request.Header.Set("Authorization", "Bearer "+key) |
| | } |
| | |
| | if strings.Contains(c.Request.URL.Path, "/v1/messages") { |
| | |
| | key := c.Request.Header.Get("x-api-key") |
| | if key != "" { |
| | c.Request.Header.Set("Authorization", "Bearer "+key) |
| | } |
| | } |
| | |
| | if strings.HasPrefix(c.Request.URL.Path, "/v1beta/models/") { |
| | skKey := c.Query("key") |
| | if skKey != "" { |
| | c.Request.Header.Set("Authorization", "Bearer "+skKey) |
| | } |
| | |
| | xGoogKey := c.Request.Header.Get("x-goog-api-key") |
| | if xGoogKey != "" { |
| | c.Request.Header.Set("Authorization", "Bearer "+xGoogKey) |
| | } |
| | } |
| | key := c.Request.Header.Get("Authorization") |
| | parts := make([]string, 0) |
| | key = strings.TrimPrefix(key, "Bearer ") |
| | if key == "" || key == "midjourney-proxy" { |
| | key = c.Request.Header.Get("mj-api-secret") |
| | key = strings.TrimPrefix(key, "Bearer ") |
| | key = strings.TrimPrefix(key, "sk-") |
| | parts = strings.Split(key, "-") |
| | key = parts[0] |
| | } else { |
| | key = strings.TrimPrefix(key, "sk-") |
| | parts = strings.Split(key, "-") |
| | key = parts[0] |
| | } |
| | token, err := model.ValidateUserToken(key) |
| | if token != nil { |
| | id := c.GetInt("id") |
| | if id == 0 { |
| | c.Set("id", token.UserId) |
| | } |
| | } |
| | if err != nil { |
| | abortWithOpenAiMessage(c, http.StatusUnauthorized, err.Error()) |
| | return |
| | } |
| | userCache, err := model.GetUserCache(token.UserId) |
| | if err != nil { |
| | abortWithOpenAiMessage(c, http.StatusInternalServerError, err.Error()) |
| | return |
| | } |
| | userEnabled := userCache.Status == common.UserStatusEnabled |
| | if !userEnabled { |
| | abortWithOpenAiMessage(c, http.StatusForbidden, "用户已被封禁") |
| | return |
| | } |
| |
|
| | userCache.WriteContext(c) |
| |
|
| | c.Set("id", token.UserId) |
| | c.Set("token_id", token.Id) |
| | c.Set("token_key", token.Key) |
| | c.Set("token_name", token.Name) |
| | c.Set("token_unlimited_quota", token.UnlimitedQuota) |
| | if !token.UnlimitedQuota { |
| | c.Set("token_quota", token.RemainQuota) |
| | } |
| | if token.ModelLimitsEnabled { |
| | c.Set("token_model_limit_enabled", true) |
| | c.Set("token_model_limit", token.GetModelLimitsMap()) |
| | } else { |
| | c.Set("token_model_limit_enabled", false) |
| | } |
| | c.Set("allow_ips", token.GetIpLimitsMap()) |
| | c.Set("token_group", token.Group) |
| | if len(parts) > 1 { |
| | if model.IsAdmin(token.UserId) { |
| | c.Set("specific_channel_id", parts[1]) |
| | } else { |
| | abortWithOpenAiMessage(c, http.StatusForbidden, "普通用户不支持指定渠道") |
| | return |
| | } |
| | } |
| | c.Next() |
| | } |
| | } |
| |
|