| 1234567891011121314151617181920212223242526272829303132333435363738394041424344454647484950515253545556575859606162636465666768697071727374757677787980818283848586878889909192939495969798 | import jsonfrom aliyunsdkcore import clientfrom aliyunsdksts.request.v20150401 import AssumeRoleRequestfrom django.views.generic import Viewfrom Ansjer.config import OSS_STS_ACCESS_SECRET, OSS_STS_ACCESS_KEY, OSS_ROLE_ARNfrom Object.ResponseObject import ResponseObjectfrom Object.TokenObject import TokenObjectclass StsOssView(View):    def get(self, request, *args, **kwargs):        request.encoding = 'utf-8'        operation = kwargs.get('operation')        return self.validation(request.GET, operation)    def post(self, request, *args, **kwargs):        request.encoding = 'utf-8'        operation = kwargs.get('operation')        return self.validation(request.POST, operation)    def validation(self, request_dict, operation):        response = ResponseObject()        # var_dump(request_dict)        token = request_dict.get('token', None)        if operation == 'uidPreview':            tko = TokenObject(token)            if tko.code == 0:                userID = tko.userID                return self.uid_preview(userID, response)            else:                return response.json(tko.code)        else:            return response.json(444)    def uid_preview(self, userID, response):        storage = '{userID}/uid_preview/'.format(userID=userID)        bucket_name = 'apg'        endpoint = 'oss-cn-shenzhen.aliyuncs.com'        region_id = 'cn-shenzhen'        clt = client.AcsClient(OSS_STS_ACCESS_KEY, OSS_STS_ACCESS_SECRET, region_id)        req = AssumeRoleRequest.AssumeRoleRequest()        req.set_accept_format('json')        req.set_RoleArn(OSS_ROLE_ARN)        req.set_RoleSessionName(userID)        req.set_DurationSeconds(3600)        Resource_access = "acs:oss:*:*:{bucket_name}/{userID}*". \            format(bucket_name=bucket_name, userID=userID)        policys = {            "Version": "1",            "Statement": [                {                    "Action": ["oss:PutObject", "oss:DeleteObject", "oss:GetObject", ],                    # "Action": ["*"],                    # "Action": ["*"],                    "Resource": [Resource_access],                    # "Resource": ["*"],                    "Effect": "Allow",                    "Condition": {                        # "IpAddress": {"acs:SourceIp": ip}                        # "IpAddress": {"acs:SourceIp": "120.237.157.184"}                        # "IpAddress": {"acs:SourceIp": "*"}                    }                },                #######                {                    "Effect": "Allow",                    "Action": [                        "oss:ListObjects"                    ],                    "Resource": [                        "*"                    ]                }            ]        }        req.set_Policy(Policy=json.dumps(policys))        body = clt.do_action(req)        # 使用RAM账号的AccessKeyId和AccessKeySecret向STS申请临时token。        token = json.loads(body.decode('utf-8'))        print(token)        res = {            'AccessKeyId': token['Credentials']['AccessKeyId'],            'AccessKeySecret': token['Credentials']['AccessKeySecret'],            'SecurityToken': token['Credentials']['SecurityToken'],            'Expiration': token['Credentials']['Expiration'],            'expire': 3600,            'endpoint': endpoint,            'bucket_name': bucket_name,            'arn': token['AssumedRoleUser']['Arn'],            'code': 0,            'storage': storage,        }        return response.json(0, res)
 |