spiderPolyHandler.go 3.3 KB

123456789101112131415161718192021222324252627282930313233343536373839404142434445464748495051525354555657585960616263646566676869707172737475767778798081828384858687888990919293949596979899100101102103104105106107108109110111112113114115
  1. package middleware
  2. import (
  3. "app.yhyue.com/moapp/jybase/common"
  4. log "app.yhyue.com/moapp/jylog"
  5. . "bp.jydev.jianyu360.cn/BaseService/gateway/common/gatecode"
  6. "bp.jydev.jianyu360.cn/BaseService/gateway/common/httpUtil"
  7. "bp.jydev.jianyu360.cn/BaseService/gateway/core/proxy/filterPoly"
  8. "bp.jydev.jianyu360.cn/BaseService/gateway/core/router"
  9. "bp.jydev.jianyu360.cn/BaseService/gateway/core/util"
  10. "fmt"
  11. "github.com/gogf/gf/v2/frame/g"
  12. "github.com/gogf/gf/v2/net/ghttp"
  13. "github.com/gogf/gf/v2/net/gtrace"
  14. "github.com/gogf/gf/v2/util/gconv"
  15. "net/http"
  16. "strings"
  17. )
  18. const (
  19. defaultVerifyPageHtml = "default"
  20. VerifyPageHtmlSource = "./resources/antiRes/page/%s.html"
  21. JyAntiEncryptSign = "antiEncrypt"
  22. JySecretKey = "secretKey"
  23. )
  24. var filterPolyManager *filterPoly.Manager
  25. func InitFilterPolyManager() {
  26. filterPolyManager = filterPoly.InitFilterPolyManager()
  27. }
  28. func FilterPolyHandler(r *ghttp.Request) {
  29. func() {
  30. ctx, span := gtrace.NewSpan(r.Context(), "FilterPolyHandler")
  31. defer span.End()
  32. gCtx := router.GetGContext(ctx)
  33. //获取策略
  34. poly := filterPolyManager.GetRule(gCtx.RouterRule.LimitPloy)
  35. status, key := func() (int, string) {
  36. //用户身份切换
  37. userFlag, _ := common.If(gCtx.Sess.MgoUserId != "", gCtx.Sess.MgoUserId, gCtx.Sess.UserId).(string)
  38. if gCtx.Sess.UserId != "" && poly.Rule.BCheckId { //id请求频率校验
  39. return poly.IdFilter(ctx, userFlag)
  40. } else { //ip请求频率校验
  41. return poly.IpFilter(ctx, r.GetClientIp())
  42. }
  43. }()
  44. returnHtml := false
  45. if strings.Contains(strings.ToLower(r.Header.Get("Accept")), "html") {
  46. returnHtml = true
  47. }
  48. //是否开启黑名单
  49. if status == -1 { //黑名单 不响应
  50. r.SetError(NewErrorWithCode(OTHER_ERR_OFTEN, fmt.Sprintf("请求频繁限制")))
  51. r.Response.ResponseWriter.WriteHeader(403)
  52. return
  53. }
  54. if status == 2 { //处理验证码逻辑
  55. rData := poly.VerifyHandle(r.Request, key)
  56. if !returnHtml {
  57. r.Response.WriteJsonExit(rData)
  58. } else {
  59. if renderErr := httpUtil.Render(r.Response.ResponseWriter, getVerifyPage(poly.Rule.VerifyPage), &rData); renderErr != nil {
  60. r.SetError(NewErrorWithCode(GATEWAY_HTML_RENDER_ERR, fmt.Sprintf("验证码页面:%v\n", renderErr)))
  61. }
  62. }
  63. return
  64. }
  65. //处理相应内容加
  66. if poly.Rule.JsEncrypt == 1 {
  67. if !returnHtml {
  68. r.SetCtxVar("changeFunc", SpiderJsEncrypt)
  69. }
  70. }
  71. }()
  72. r.Middleware.Next()
  73. }
  74. // getVerifyPage 获取验证码页面路径
  75. func getVerifyPage(page string) string {
  76. if page != "" {
  77. if strings.HasSuffix(page, ".html") {
  78. page = strings.ReplaceAll(page, ".html", "")
  79. }
  80. return fmt.Sprintf(VerifyPageHtmlSource, page)
  81. } else {
  82. return fmt.Sprintf(VerifyPageHtmlSource, defaultVerifyPageHtml)
  83. }
  84. }
  85. // SpiderJsEncrypt 反爬虫加密相应内容
  86. func SpiderJsEncrypt(resp *http.Response) error {
  87. return util.ChangeResponse(resp, func(bytes []byte) (newBytes []byte, err error) {
  88. if len(bytes) == 0 {
  89. return nil, nil
  90. }
  91. var entryStr, PKeyStr string
  92. entryStr, PKeyStr, err = util.JyAntiEncrypt(bytes)
  93. if err != nil {
  94. log.Println("JyAntiEncrypt err: ", err.Error())
  95. return
  96. }
  97. newBytes = gconv.Bytes(g.Map{
  98. JyAntiEncryptSign: 1,
  99. JySecretKey: PKeyStr,
  100. "data": entryStr,
  101. })
  102. resp.Header.Add(JyAntiEncryptSign, "1")
  103. //resp.Header.Add(JySecretKey, PKeyStr)
  104. return
  105. })
  106. }