This commit is contained in:
hailin 2025-06-13 22:22:58 +08:00
parent 0d75f1c58c
commit ca86b1af36
2 changed files with 81 additions and 43 deletions

View File

@ -1,47 +1,60 @@
package license package license
import ( import (
"crypto"
"crypto/ecdsa" "crypto/ecdsa"
"crypto/elliptic" "crypto/elliptic"
"crypto/rand" "crypto/rand"
"crypto/rsa"
"crypto/sha256" "crypto/sha256"
"crypto/x509" "encoding/asn1"
"encoding/base64" "encoding/base64"
"encoding/pem" "math/big"
) )
var ( var privateKey *ecdsa.PrivateKey
privateKey *ecdsa.PrivateKey
)
func init() { func init() {
privateKey, _ = ecdsa.GenerateKey(elliptic.P256(), rand.Reader) var err error
privateKey, err = ecdsa.GenerateKey(elliptic.P256(), rand.Reader)
if err != nil {
panic(err)
}
} }
func SignPayload(payload []byte) (string, error) { // ecdsaSignature 是 ASN.1 编码中使用的结构体
hash := sha256.Sum256(payload) type ecdsaSignature struct {
R, S *big.Int
}
func SignPayload(message []byte) (string, error) {
hash := sha256.Sum256(message)
r, s, err := ecdsa.Sign(rand.Reader, privateKey, hash[:]) r, s, err := ecdsa.Sign(rand.Reader, privateKey, hash[:])
if err != nil { if err != nil {
return "", err return "", err
} }
sig := append(r.Bytes(), s.Bytes()...) sig, err := asn1.Marshal(ecdsaSignature{r, s})
if err != nil {
return "", err
}
return base64.StdEncoding.EncodeToString(sig), nil return base64.StdEncoding.EncodeToString(sig), nil
} }
func VerifySignature(pub *rsa.PublicKey, message []byte, signatureBase64 string) bool { func VerifySignature(pub *ecdsa.PublicKey, message []byte, signatureBase64 string) bool {
signature, err := base64.StdEncoding.DecodeString(signatureBase64) sigBytes, err := base64.StdEncoding.DecodeString(signatureBase64)
if err != nil { if err != nil {
return false return false
} }
hashed := sha256.Sum256(message)
err = rsa.VerifyPKCS1v15(pub, crypto.SHA256, hashed[:], signature) var sig ecdsaSignature
return err == nil _, err = asn1.Unmarshal(sigBytes, &sig)
if err != nil {
return false
}
hash := sha256.Sum256(message)
return ecdsa.Verify(pub, hash[:], sig.R, sig.S)
} }
func ExportPublicKeyPEM() string { func GetPublicKey() *ecdsa.PublicKey {
pubKeyBytes, _ := x509.MarshalPKIXPublicKey(&privateKey.PublicKey) return &privateKey.PublicKey
return string(pem.EncodeToMemory(&pem.Block{Type: "PUBLIC KEY", Bytes: pubKeyBytes}))
} }

View File

@ -13,15 +13,25 @@ func GenerateLicenseHandler(db storage.Database) fiber.Handler {
return func(c *fiber.Ctx) error { return func(c *fiber.Ctx) error {
var req LicenseRequest var req LicenseRequest
if err := c.BodyParser(&req); err != nil { if err := c.BodyParser(&req); err != nil {
return fiber.ErrBadRequest return fiber.NewError(fiber.StatusBadRequest, "Invalid request body")
} }
payloadBytes, _ := json.Marshal(req) if req.MachineID == "" || req.Expiry == "" {
payloadB64 := base64.StdEncoding.EncodeToString(payloadBytes) return fiber.NewError(fiber.StatusBadRequest, "Missing required fields")
signature, _ := SignPayload(payloadBytes) }
payloadBytes, err := json.Marshal(req)
if err != nil {
return fiber.NewError(fiber.StatusInternalServerError, "Failed to encode payload")
}
signature, err := SignPayload(payloadBytes)
if err != nil {
return fiber.NewError(fiber.StatusInternalServerError, "Signing failed")
}
licenseFile := LicenseFile{ licenseFile := LicenseFile{
Payload: payloadB64, Payload: base64.StdEncoding.EncodeToString(payloadBytes),
Signature: signature, Signature: signature,
} }
@ -33,25 +43,40 @@ func ActivateLicenseHandler(db storage.Database) fiber.Handler {
return func(c *fiber.Ctx) error { return func(c *fiber.Ctx) error {
var lf LicenseFile var lf LicenseFile
if err := c.BodyParser(&lf); err != nil { if err := c.BodyParser(&lf); err != nil {
return fiber.ErrBadRequest return fiber.NewError(fiber.StatusBadRequest, "Invalid license format")
}
payloadBytes, err := base64.StdEncoding.DecodeString(lf.Payload)
if err != nil {
return fiber.NewError(fiber.StatusBadRequest, "Invalid base64 payload")
}
if !VerifySignature(GetPublicKey(), payloadBytes, lf.Signature) {
return fiber.NewError(fiber.StatusUnauthorized, "Invalid license signature")
} }
payloadBytes, _ := base64.StdEncoding.DecodeString(lf.Payload)
var req LicenseRequest var req LicenseRequest
json.Unmarshal(payloadBytes, &req) if err := json.Unmarshal(payloadBytes, &req); err != nil {
return fiber.NewError(fiber.StatusBadRequest, "Malformed payload")
}
if req.MachineID == "" {
return fiber.NewError(fiber.StatusBadRequest, "Missing machine ID")
}
if db.HasActivated(req.MachineID) { if db.HasActivated(req.MachineID) {
return fiber.NewError(403, "This machine is already activated.") return fiber.NewError(fiber.StatusForbidden, "This machine is already activated")
} }
if !VerifySignature(&privateKey.PublicKey, payloadBytes, lf.Signature) { expiry, err := time.Parse("2006-01-02", req.Expiry)
return fiber.NewError(401, "Invalid license signature") if err != nil || time.Now().After(expiry) {
return fiber.NewError(fiber.StatusForbidden, "License is invalid or expired")
} }
licenseText := lf.Payload + "." + lf.Signature // 绑定激活记录
db.SaveActivation(req.MachineID, licenseText) db.SaveActivation(req.MachineID, lf.Payload+"."+lf.Signature)
return c.SendString("License activated successfully.") return c.JSON(fiber.Map{"status": "success", "message": "License activated successfully"})
} }
} }
@ -59,33 +84,33 @@ func ValidateLicenseHandler(db storage.Database) fiber.Handler {
return func(c *fiber.Ctx) error { return func(c *fiber.Ctx) error {
var lf LicenseFile var lf LicenseFile
if err := c.BodyParser(&lf); err != nil { if err := c.BodyParser(&lf); err != nil {
return fiber.ErrBadRequest return fiber.NewError(fiber.StatusBadRequest, "Invalid license format")
} }
payloadBytes, err := base64.StdEncoding.DecodeString(lf.Payload) payloadBytes, err := base64.StdEncoding.DecodeString(lf.Payload)
if err != nil { if err != nil {
return fiber.NewError(fiber.StatusBadRequest, "Invalid payload encoding") return fiber.NewError(fiber.StatusBadRequest, "Invalid base64 payload")
} }
// 先验证签名是否真的是对 payloadBytes 签的 if !VerifySignature(GetPublicKey(), payloadBytes, lf.Signature) {
if !VerifySignature(&privateKey.PublicKey, payloadBytes, lf.Signature) {
return fiber.NewError(fiber.StatusUnauthorized, "Invalid license signature") return fiber.NewError(fiber.StatusUnauthorized, "Invalid license signature")
} }
// 验证通过后再解析 payload 内容
var req LicenseRequest var req LicenseRequest
if err := json.Unmarshal(payloadBytes, &req); err != nil { if err := json.Unmarshal(payloadBytes, &req); err != nil {
return fiber.NewError(fiber.StatusBadRequest, "Malformed payload") return fiber.NewError(fiber.StatusBadRequest, "Malformed payload")
} }
expiry, err := time.Parse("2006-01-02", req.Expiry) expiry, err := time.Parse("2006-01-02", req.Expiry)
if err != nil { if err != nil || time.Now().After(expiry) {
return fiber.NewError(fiber.StatusBadRequest, "Invalid expiry date")
}
if time.Now().After(expiry) {
return fiber.NewError(fiber.StatusForbidden, "License expired") return fiber.NewError(fiber.StatusForbidden, "License expired")
} }
return c.JSON(fiber.Map{"valid": true, "features": req.Features}) return c.JSON(fiber.Map{
"valid": true,
"features": req.Features,
"machine": req.MachineID,
"expiry": req.Expiry,
})
} }
} }