123456789101112131415161718192021222324252627282930313233343536373839404142434445464748495051525354555657585960616263646566676869707172737475767778798081828384858687888990919293949596979899100101102103104105106107108109110111112113114115116117118119120121122123124125126127128129130131132133134135136137138139140141142143144145146147148149150151152153154155156157158159160161162163164165166167168169170171172173174175176177178179180181182183184185186187188189190191192193194195196197198199200201202203204205206207208209210211212213 |
- # -*- coding: utf-8 -*-
- import json
- import os
- from datetime import datetime
- from django.conf import settings
- import requests
- from .type import RequestType, SignType
- from .utils import aes_decrypt, build_authorization, hmac_sign, load_certificate, load_private_key, rsa_decrypt, rsa_encrypt, rsa_sign, rsa_verify
- class Core(object):
- def __init__(self, mchid, cert_serial_no, apiv3_key, logger=None, proxy=None):
- self._mchid = mchid # 商户号
- self._cert_serial_no = cert_serial_no # 商户证书序列号
- self._private_key = self._innt_private_key() # 商户证书私钥
- self._apiv3_key = apiv3_key # 商户APIv3密钥
- self._gate_way = 'https://api.mch.weixin.qq.com'
- self._certificates = []
- self._cert_dir = settings.PUBLIC_CERT_ROOT # 平台证书存放目录(减少证书下载调用次数)
- self._logger = logger # 日志记录器
- self._proxy = proxy # 代理设置
- self._init_certificates()
- def _innt_private_key(self):
- '''
- 加载商户私钥 PRIVATE_CERT_ROOT是在settings里边设置商户私钥证书地址
- :return:
- '''
- os_path = settings.PRIVATE_CERT_ROOT + "apiclient_key.pem"
- with open(os_path) as f:
- private_key = f.read()
- return load_private_key(private_key)
- def _init_certificates(self):
- '''
- 初始化平台证书 如果存在平台证书就加载平台证书 如果没有平台证书或者平台证书过期就下载平台证书
- :return:
- '''
- if self._cert_dir and os.path.exists(self._cert_dir):
- for file_name in os.listdir(self._cert_dir):
- if not file_name.lower().endswith('.pem'):
- continue
- with open(self._cert_dir + file_name, encoding="utf-8") as f:
- certificate = load_certificate(f.read())
- now = datetime.utcnow()
- if certificate and now >= certificate.not_valid_before and now <= certificate.not_valid_after:
- self._certificates.append(certificate)
- if not self._certificates:
- self._update_certificates()
- if not self._certificates:
- raise Exception('未发现平台证书,请仔细检查您的初始化参数!')
- def _update_certificates(self):
- '''
- 下载平台证书
- :return:
- '''
- path = '/v3/certificates'
- self._certificates.clear()
- code, message = self.request(path, skip_verify=True)
- if code != 200:
- return
- data = json.loads(message).get('data')
- for value in data:
- serial_no = value.get('serial_no')
- effective_time = value.get('effective_time')
- expire_time = value.get('expire_time')
- encrypt_certificate = value.get('encrypt_certificate')
- algorithm = nonce = associated_data = ciphertext = None
- if encrypt_certificate:
- algorithm = encrypt_certificate.get('algorithm')
- nonce = encrypt_certificate.get('nonce')
- associated_data = encrypt_certificate.get('associated_data')
- ciphertext = encrypt_certificate.get('ciphertext')
- if not (serial_no and effective_time and expire_time and algorithm and nonce and associated_data and ciphertext):
- continue
- cert_str = aes_decrypt(nonce=nonce, ciphertext=ciphertext, associated_data=associated_data, apiv3_key=self._apiv3_key)
- certificate = load_certificate(cert_str)
- if not certificate:
- continue
- now = datetime.utcnow()
- if now < certificate.not_valid_before or now > certificate.not_valid_after:
- continue
- self._certificates.append(certificate)
- if not self._cert_dir:
- continue
- if not os.path.exists(self._cert_dir):
- os.makedirs(self._cert_dir)
- if not os.path.exists(self._cert_dir + serial_no + '.pem'):
- with open(self._cert_dir + serial_no + '.pem', 'w') as f:
- f.write(cert_str)
- def _verify_signature(self, headers, body):
- signature = headers.get('Wechatpay-Signature')
- timestamp = headers.get('Wechatpay-Timestamp')
- nonce = headers.get('Wechatpay-Nonce')
- serial_no = headers.get('Wechatpay-Serial')
- cert_found = False
- for cert in self._certificates:
- if int('0x' + serial_no, 16) == cert.serial_number:
- cert_found = True
- certificate = cert
- break
- if not cert_found:
- self._update_certificates()
- for cert in self._certificates:
- if int('0x' + serial_no, 16) == cert.serial_number:
- cert_found = True
- certificate = cert
- break
- if not cert_found:
- return False
- if not rsa_verify(timestamp, nonce, body, signature, certificate):
- return False
- return True
- def request(self, path, method=RequestType.GET, data=None, skip_verify=False, sign_data=None, files=None, cipher_data=False, headers={}):
- headers.update({'Content-Type': 'application/json'})
- if files:
- headers['Content-Type'] = 'multipart/form-data'
- headers.update({'Accept': 'application/json'})
- if cipher_data:
- headers.update({'Wechatpay-Serial': hex(self._last_certificate().serial_number)[2:].upper()})
- authorization = build_authorization(path, method.value, self._mchid, self._cert_serial_no, self._private_key, data=sign_data if sign_data else data)
- headers.update({'Authorization': authorization})
- if method == RequestType.GET:
- response = requests.get(url=self._gate_way + path, headers=headers, proxies=self._proxy)
- elif method == RequestType.POST:
- response = requests.post(url=self._gate_way + path, json=None if files else data, data=data if files else None, headers=headers, files=files, proxies=self._proxy)
- elif method == RequestType.PATCH:
- response = requests.patch(url=self._gate_way + path, json=data, headers=headers, proxies=self._proxy)
- elif method == RequestType.PUT:
- response = requests.put(url=self._gate_way + path, json=data, headers=headers, proxies=self._proxy)
- elif method == RequestType.DELETE:
- response = requests.delete(url=self._gate_way + path, headers=headers, proxies=self._proxy)
- else:
- raise Exception('请求类型不被支持!')
- if response.status_code in range(200, 300) and not skip_verify:
- if not self._verify_signature(response.headers, response.text):
- raise Exception('验证签名失败!')
- return response.status_code, response.text if 'application/json' in response.headers.get('Content-Type') else response.content
- def sign(self, data, sign_type=SignType.RSA_SHA256):
- if sign_type == SignType.RSA_SHA256:
- sign_str = '\n'.join(data) + '\n'
- return rsa_sign(self._private_key, sign_str)
- elif sign_type == SignType.HMAC_SHA256:
- key_list = sorted(data.keys())
- sign_str = ''
- for k in key_list:
- v = data[k]
- sign_str += str(k) + '=' + str(v) + '&'
- sign_str += 'key=' + self._apiv3_key
- return hmac_sign(self._apiv3_key, sign_str)
- else:
- raise Exception('错误的签名类型!')
- def decrypt_callback(self, headers, body):
- if isinstance(body, bytes):
- body = body.decode('UTF-8')
- if not self._verify_signature(headers, body):
- return None
- data = json.loads(body)
- resource_type = data.get('resource_type')
- if resource_type != 'encrypt-resource':
- return None
- resource = data.get('resource')
- if not resource:
- return None
- algorithm = resource.get('algorithm')
- if algorithm != 'AEAD_AES_256_GCM':
- raise Exception('该算法不被支持!')
- nonce = resource.get('nonce')
- ciphertext = resource.get('ciphertext')
- associated_data = resource.get('associated_data')
- if not (nonce and ciphertext):
- return None
- if not associated_data:
- associated_data = ''
- result = aes_decrypt(
- nonce=nonce,
- ciphertext=ciphertext,
- associated_data=associated_data,
- apiv3_key=self._apiv3_key)
- return result
- def callback(self, headers, body):
- if isinstance(body, bytes):
- body = body.decode('UTF-8')
- result = self.decrypt_callback(headers=headers, body=body)
- if result:
- data = json.loads(body)
- data.update({'resource': json.loads(result)})
- return data
- else:
- return result
- def decrypt(self, ciphtext):
- return rsa_decrypt(ciphertext=ciphtext, private_key=self._private_key)
- def encrypt(self, text):
- return rsa_encrypt(text=text, certificate=self._last_certificate())
- def _last_certificate(self):
- if not self._certificates:
- self._update_certificates()
- certificate = self._certificates[0]
- for cert in self._certificates:
- if certificate.not_valid_after < cert.not_valid_after:
- certificate = cert
- return certificate
|