diff --git a/README.md b/README.md
index c5b962e..6d3cca3 100644
--- a/README.md
+++ b/README.md
@@ -1,4 +1,53 @@
-# weworkapi_python
-official lib of wework api https://work.weixin.qq.com/api/doc
-python 版企业微信API的使用demo
+# About
+weworkapi_python 是为了简化开发者对企业微信API接口的使用而设计的,API调用库系列之python版本
+本库仅做示范用,并不保证完全无bug;
+作者会不定期更新本库,但不保证与官方API接口文档同步,因此一切以[官方文档](https://work.weixin.qq.com/api/doc)为准。
+
+更多来自个人开发者的其它语言的库推荐:
+python : https://github.com/sbzhu/weworkapi_python abelzhu@tencent.com(企业微信团队)
+ruby : https://github.com/mycolorway/wework MyColorway(个人开发者)
+php : https://github.com/sbzhu/weworkapi_php abelzhu@tencent.com(企业微信团队)
+golang : https://github.com/sbzhu/weworkapi_golang ryanjelin@tencent.com(企业微信团队)
+golang : https://github.com/doubliekill/EnterpriseWechatSDK 1006401052yh@gmail.com(个人开发者)
+
+# Director
+├── api // API 接口
+│ ├── examples // API接口的测试用例
+│ ├── README.md
+│ └── src // API接口的关键逻辑
+├── callback // 加解密库,python2, xml格式)
+
+├── callback_json // 加解密库,Python2, json格式, 仅适用于企业机器人/智能机器人
+
+├── callback_json_python3 // 加解密库,Python3, json格式, 仅适用于企业机器人/智能机器人
+
+├── callback_python3 // 加解密库,python2, xml格式
+
+├── conf.py
+└── README.md
+
+# Usage
+将本项目下载到你的目录,既可直接引用相关文件
+详细使用方法参考examples路径下的测试用例
+
+# 关于token的缓存
+token是需要缓存的,不能每次调用都去获取token,[否则会中频率限制](https://work.weixin.qq.com/api/doc#10013/%E7%AC%AC%E5%9B%9B%E6%AD%A5%EF%BC%9A%E7%BC%93%E5%AD%98%E5%92%8C%E5%88%B7%E6%96%B0access_token)
+在本库的设计里,token是以类里的一个变量缓存的
+比如api/src/CorpApi.py 里的access_token变量
+在类的生命周期里,这个accessToken都是存在的, 当且仅当发现token过期,CorpAPI类会自动刷新token
+刷新机制在 api/src/AbstractApi.py
+所以,使用时,只需要全局实例化一个CorpAPI类,不要析构它,就可一直用它调函数,不用关心 token
+```
+api = CorpAPI(corpid, corpsecret);
+api.dosomething()
+api.dosomething()
+api.dosomething()
+....
+```
+当然,如果要更严格的做的话,建议自行修改,全局缓存token,比如存redis、存文件等,失效周期设置为2小时。
+
+# Contact us
+abelzhu@tencent.com
+
+#
diff --git a/api/examples/AppChatTest.py b/api/examples/AppChatTest.py
new file mode 100644
index 0000000..aed9add
--- /dev/null
+++ b/api/examples/AppChatTest.py
@@ -0,0 +1,223 @@
+#!/usr/bin/env python
+# -*- coding:utf-8 -*-
+##
+ # Copyright (C) 2018 All rights reserved.
+ #
+ # @File UserTest.py
+ # @Brief
+ # @Author abelzhu, abelzhu@tencent.com
+ # @Version 1.0
+ # @Date 2018-02-24
+ #
+ #
+
+import sys
+sys.path.append("../src/")
+
+import random
+
+from CorpApi import *
+from TestConf import *
+
+## test
+api = CorpApi(TestConf['CORP_ID'], TestConf['APP_SECRET'])
+
+chatid = "test210";
+try :
+##
+ response = api.httpCall(
+ CORP_API_TYPE['APP_CHAT_CREATE'],
+ {
+ 'name' : 'appchat_test',
+ 'owner' : 'ZhuBiaoYi',
+ 'userlist' : ['LiShuang', 'ZhuShengBen', 'LinJianEn', 'ZhuBiaoYi', 'XuBin', 'yangpeiyi', 'HaLuoTeQu', 'lucky', 'raindong', 'simon', 'Wang', 'ZhaoDong', 'DengLinSheng', 'Li'],
+ 'chatid' : chatid,
+ })
+ print response
+ chatid = response['chatid']
+except ApiException as e :
+ print e.errCode, e.errMsg
+
+try :
+ ##
+ response = api.httpCall(
+ CORP_API_TYPE['APP_CHAT_UPDATE'],
+ {
+ 'chatid' : chatid,
+ 'name' : 'appchat_test_new_name',
+ 'owner' : 'ZhuShengBen',
+ 'add_user_list' : ['huqiqi', 'Wang']
+ })
+ print response
+
+ ##
+ response = api.httpCall(
+ CORP_API_TYPE['APP_CHAT_UPDATE'],
+ {
+ 'chatid' : chatid,
+ 'name' : '应用发消息测试',
+ 'owner' : 'ZhuBiaoYi',
+ 'del_user_list' : 'huqiqi',
+ })
+ print response
+
+ ##
+ response = api.httpCall(
+ CORP_API_TYPE['APP_CHAT_SEND'],
+ {
+ 'chatid':chatid,
+ 'msgtype' : 'text',
+ 'text' : {'content':'我是文本消息热爱祖国热爱人民热爱中国共产党我是文本消息热爱祖国热爱人民热爱中国共产党我是文本消息热爱祖国热爱人民热爱中国共产党我是文本消息热爱祖国热爱人民热爱中国共产党我是文本消息热爱祖国热爱人民热爱中国共产党我是文本消息热爱祖国热爱人民热爱中国共产党我是文本消息热爱祖国热爱人民热爱中国共产党我是文本消息热爱祖国热爱人民热爱中国共产党我是文本消息热爱祖国热爱人民热爱中国共产党我是文本消息热爱祖国热爱人民热爱中国共产党我是文本消息热爱祖国热爱人民热爱中国共产党我是文本消息热爱祖国热爱人民热爱中国共产党我是文本消息热爱祖国热爱人民热爱中国共产党'},
+ 'climsgid' : 'climsgidclimsgid_%f' % (random.random()),
+ 'safe' : 1,
+ })
+ print response
+
+ ##
+ response = api.httpCall(
+ CORP_API_TYPE['APP_CHAT_SEND'],
+ {
+ 'chatid':chatid,
+ 'msgtype' : 'image',
+ 'climsgid' : 'climsgidclimsgid_%f' % (random.random()),
+ 'image' : {
+ 'media_id':'3A9Jo9CHit_5UTfOVE38_067dUJQlLs30mOa9FC0a4jEGeoQgpLCZgc7rEza6TbfB',
+ },
+ 'safe' : 1,
+ })
+ print response
+
+ ##
+ response = api.httpCall(
+ CORP_API_TYPE['APP_CHAT_SEND'],
+ {
+ 'chatid':chatid,
+ 'msgtype' : 'file',
+ 'climsgid' : 'climsgidclimsgid_%f' % (random.random()),
+ 'file' : {
+ 'media_id':'35L7MmcpGdyFfqjbGhbECCkGcaNsUajaPQifGLJq_H5E',
+ },
+ 'safe' : 1,
+ })
+ print response
+
+
+ ##
+ response = api.httpCall(
+ CORP_API_TYPE['APP_CHAT_SEND'],
+ {
+ 'chatid':chatid,
+ 'climsgid' : 'climsgidclimsgid_%f' % (random.random()),
+ 'msgtype' : 'voice',
+ 'voice' : {
+ 'media_id':'3x1yb34061fDXjyUXy2rWNd-a-hWe-l8eTw2VKyh3bDQ',
+ },
+ 'safe' : 1,
+ })
+ print response
+
+ ##
+ response = api.httpCall(
+ CORP_API_TYPE['APP_CHAT_SEND'],
+ {
+ 'chatid':chatid,
+ 'climsgid' : 'climsgidclimsgid_%f' % (random.random()),
+ 'msgtype' : 'video',
+ 'video' : {
+ 'media_id':'3neA1ypnC3k5QnAZqvyVvCesFYUrXietU5F-Ipnj6ZobiD-PuFlXngzPplWXibw9r',
+ },
+ 'safe' : 1,
+ })
+ print response
+
+ ##
+ response = api.httpCall(
+ CORP_API_TYPE['APP_CHAT_SEND'],
+ {
+ 'chatid':chatid,
+ 'climsgid' : 'climsgidclimsgid_%f' % (random.random()),
+ 'msgtype' : 'news',
+ "news" : {
+ "articles" : [
+ {
+ "title" : "图文消息",
+ "description" : "今年中秋节公司有豪礼相送",
+ "url" : "URL",
+ "picurl" : "http://res.mail.qq.com/node/ww/wwopenmng/images/independent/doc/test_pic_msg1.png",
+ "btntxt":"更多",
+ },
+ {
+ "title" : "图文消息",
+ "description" : "今年中秋节公司有豪礼相送",
+ "url" : "URL",
+ "picurl" : "http://res.mail.qq.com/node/ww/wwopenmng/images/independent/doc/test_pic_msg1.png",
+ "btntxt":"更多",
+ },
+ {
+ "title" : "图文消息",
+ "description" : "今年中秋节公司有豪礼相送",
+ "url" : "URL",
+ "picurl" : "http://res.mail.qq.com/node/ww/wwopenmng/images/independent/doc/test_pic_msg1.png",
+ "btntxt":"更多",
+ },
+ ]},
+ 'safe' : 1,
+ },
+ )
+ print response
+
+ ##
+ response = api.httpCall(
+ CORP_API_TYPE['APP_CHAT_SEND'],
+ {
+ 'chatid':chatid,
+ 'msgtype' : 'textcard',
+ 'climsgid' : 'climsgidclimsgid_%f' % (random.random()),
+ 'textcard' : {
+ 'title':'我是文本卡片消息',
+ 'description' : 'aaaaaaa',
+ 'url' : 'www.qq.com',
+ 'btntxt' : '更多',
+ },
+ 'safe' : 1,
+ })
+ print response
+
+ ##
+ response = api.httpCall(
+ CORP_API_TYPE['APP_CHAT_SEND'],
+ {
+ 'chatid':chatid,
+ "msgtype" : "mpnews",
+ "mpnews": {
+ "articles" : [
+ {
+ "title" : "图文消息(mpnews)",
+ "thumb_media_id" : "3uFTZs4MRTr-OwUArqaoXPyqtuedcwCUW1x4sgKcOeQc",
+ "author" : "author",
+ "content" : "content",
+ "digest" : "我是图文"
+ },
+ {
+ "title" : "图文消息(mpnews)",
+ "thumb_media_id" : "3uFTZs4MRTr-OwUArqaoXPyqtuedcwCUW1x4sgKcOeQc",
+ "author" : "author",
+ "content" : "content",
+ "digest" : "我是图文"
+ },
+ {
+ "title" : "图文消息(mpnews)",
+ "thumb_media_id" : "3uFTZs4MRTr-OwUArqaoXPyqtuedcwCUW1x4sgKcOeQc",
+ "author" : "author",
+ "content" : "content",
+ "digest" : "我是图文"
+ },
+ ]
+ },
+ 'climsgid' : 'climsgidclimsgid_%f' % (random.random()),
+ 'safe' : 1,
+ })
+ print response
+
+except ApiException as e :
+ print e.errCode, e.errMsg
diff --git a/api/examples/MessageTest.py b/api/examples/MessageTest.py
new file mode 100644
index 0000000..c07b005
--- /dev/null
+++ b/api/examples/MessageTest.py
@@ -0,0 +1,42 @@
+#!/usr/bin/env python
+# -*- coding:utf-8 -*-
+##
+ # Copyright (C) 2018 All rights reserved.
+ #
+ # @File UserTest.py
+ # @Brief
+ # @Author abelzhu, abelzhu@tencent.com
+ # @Version 1.0
+ # @Date 2018-02-24
+ #
+ #
+
+import sys
+sys.path.append("../src/")
+
+import random
+
+from CorpApi import *
+from TestConf import *
+
+## test
+api = CorpApi(TestConf['CORP_ID'], TestConf['APP_SECRET'])
+
+try :
+##
+ response = api.httpCall(
+ CORP_API_TYPE['MESSAGE_SEND'],
+ {
+ "touser": "ZhuShengBen",
+ "agentid": 1000002,
+ 'msgtype' : 'text',
+ 'climsgid' : 'climsgidclimsgid_%f' % (random.random()),
+ 'text' : {
+ 'content':'方法论',
+ },
+ 'safe' : 0,
+ })
+ print response
+except ApiException as e :
+ print e.errCode, e.errMsg
+
diff --git a/api/examples/MiniprogramTest.py b/api/examples/MiniprogramTest.py
new file mode 100644
index 0000000..1ec96c8
--- /dev/null
+++ b/api/examples/MiniprogramTest.py
@@ -0,0 +1,37 @@
+#!/usr/bin/env python
+# -*- coding:utf-8 -*-
+##
+ # Copyright (C) 2018 All rights reserved.
+ #
+ # @File UserTest.py
+ # @Brief
+ # @Author abelzhu, abelzhu@tencent.com
+ # @Version 1.0
+ # @Date 2018-02-24
+ #
+ #
+
+import sys
+sys.path.append("../src/")
+
+import random
+
+from CorpApi import *
+from TestConf import *
+
+## test
+api = CorpApi(TestConf['CORP_ID'], TestConf['APP_SECRET'])
+
+try :
+##
+ response = api.httpCall(
+ CORP_API_TYPE['MINIPROGRAM_CODE_TO_SESSION_KEY'],
+ {
+ "js_code" : "sVqtL3itg0L30LTGJtZ_isKC0efG5FqGw470fVp8Dpw",
+ "grant_type" : "authorization_code"
+ })
+ print response
+
+except ApiException as e :
+ print e.errCode, e.errMsg
+
diff --git a/api/src/AbstractApi.py b/api/src/AbstractApi.py
index f7e7ce9..9c15796 100644
--- a/api/src/AbstractApi.py
+++ b/api/src/AbstractApi.py
@@ -64,7 +64,7 @@ def httpCall(self, urlType, args=None) :
# check if token expired
if self.__tokenExpired(response.get('errcode')) :
self.__refreshToken(shortUrl)
- ++ retryCnt
+ retryCnt += 1
continue
else :
break
@@ -107,7 +107,7 @@ def __httpPost(self, url, args) :
if DEBUG is True :
print realUrl, args
- return requests.post(realUrl, data=json.dumps(args).decode('unicode-escape').encode("utf-8")).json()
+ return requests.post(realUrl, data = json.dumps(args, ensure_ascii = False).encode('utf-8')).json()
def __httpGet(self, url) :
realUrl = self.__appendToken(url)
diff --git a/api/src/CorpApi.py b/api/src/CorpApi.py
index ecc1ef3..4f04a23 100644
--- a/api/src/CorpApi.py
+++ b/api/src/CorpApi.py
@@ -2,25 +2,25 @@
# -*- coding:utf-8 -*-
##
# Copyright (C) 2018 All rights reserved.
- #
+ #
# @File CorpApi.py
- # @Brief
+ # @Brief
# @Author abelzhu, abelzhu@tencent.com
# @Version 1.0
# @Date 2018-02-24
#
#
-
+
from AbstractApi import *
-CORP_API_TYPE = {
+CORP_API_TYPE = {
'GET_ACCESS_TOKEN' : ['/cgi-bin/gettoken', 'GET'],
'USER_CREATE' : ['/cgi-bin/user/create?access_token=ACCESS_TOKEN', 'POST'],
'USER_GET' : ['/cgi-bin/user/get?access_token=ACCESS_TOKEN', 'GET'],
'USER_UPDATE' : ['/cgi-bin/user/update?access_token=ACCESS_TOKEN', 'POST'],
'USER_DELETE' : ['/cgi-bin/user/delete?access_token=ACCESS_TOKEN', 'GET'],
'USER_BATCH_DELETE': ['/cgi-bin/user/batchdelete?access_token=ACCESS_TOKEN', 'POST'],
- 'USER_SIMPLE_LIST ': ['/cgi-bin/user/simplelist?access_token=ACCESS_TOKEN', 'GET'],
+ 'USER_SIMPLE_LIST': ['/cgi-bin/user/simplelist?access_token=ACCESS_TOKEN', 'GET'],
'USER_LIST' : ['/cgi-bin/user/list?access_token=ACCESS_TOKEN', 'GET'],
'USERID_TO_OPENID' : ['/cgi-bin/user/convert_to_openid?access_token=ACCESS_TOKEN', 'POST'],
'OPENID_TO_USERID' : ['/cgi-bin/user/convert_to_userid?access_token=ACCESS_TOKEN', 'POST'],
@@ -52,6 +52,7 @@
'MENU_DELETE' : ['/cgi-bin/menu/delete?access_token=ACCESS_TOKEN', 'GET'],
'MESSAGE_SEND' : ['/cgi-bin/message/send?access_token=ACCESS_TOKEN', 'POST'],
+ 'MESSAGE_REVOKE' : ['/cgi-bin/message/revoke?access_token=ACCESS_TOKEN', 'POST'],
'MEDIA_GET' : ['/cgi-bin/media/get?access_token=ACCESS_TOKEN', 'GET'],
@@ -66,18 +67,25 @@
'GET_APPROVAL_DATA': ['/cgi-bin/corp/getapprovaldata?access_token=ACCESS_TOKEN', 'POST'],
'GET_INVOICE_INFO' : ['/cgi-bin/card/invoice/reimburse/getinvoiceinfo?access_token=ACCESS_TOKEN', 'POST'],
- 'UPDATE_INVOICE_STATUS' :
+ 'UPDATE_INVOICE_STATUS' :
['/cgi-bin/card/invoice/reimburse/updateinvoicestatus?access_token=ACCESS_TOKEN', 'POST'],
- 'BATCH_UPDATE_INVOICE_STATUS' :
+ 'BATCH_UPDATE_INVOICE_STATUS' :
['/cgi-bin/card/invoice/reimburse/updatestatusbatch?access_token=ACCESS_TOKEN', 'POST'],
- 'BATCH_GET_INVOICE_INFO' :
+ 'BATCH_GET_INVOICE_INFO' :
['/cgi-bin/card/invoice/reimburse/getinvoiceinfobatch?access_token=ACCESS_TOKEN', 'POST'],
+
+ 'APP_CHAT_CREATE' : ['/cgi-bin/appchat/create?access_token=ACCESS_TOKEN', 'POST'],
+ 'APP_CHAT_GET' : ['/cgi-bin/appchat/get?access_token=ACCESS_TOKEN', 'GET'],
+ 'APP_CHAT_UPDATE' : ['/cgi-bin/appchat/update?access_token=ACCESS_TOKEN', 'POST'],
+ 'APP_CHAT_SEND' : ['/cgi-bin/appchat/send?access_token=ACCESS_TOKEN', 'POST'],
+
+ 'MINIPROGRAM_CODE_TO_SESSION_KEY' : ['/cgi-bin/miniprogram/jscode2session?access_token=ACCESS_TOKEN', 'GET'],
}
class CorpApi(AbstractApi) :
def __init__(self, corpid, secret) :
self.corpid = corpid
- self.secret = secret
+ self.secret = secret
self.access_token = None
def getAccessToken(self) :
@@ -89,8 +97,8 @@ def refreshAccessToken(self) :
response = self.httpCall(
CORP_API_TYPE['GET_ACCESS_TOKEN'],
{
- 'corpid' : self.corpid,
- 'corpsecret': self.secret,
+ 'corpid' : self.corpid,
+ 'corpsecret': self.secret,
})
- self.access_token = response.get('access_token')
+ self.access_token = response.get('access_token')
diff --git a/callback/Readme.txt b/callback/Readme.txt
new file mode 100644
index 0000000..7b8dd0c
--- /dev/null
+++ b/callback/Readme.txt
@@ -0,0 +1,5 @@
+注意事项
+1.WXBizMsgCrypt.py文件封装了WXBizMsgCrypt接口类(Python3以及以上版本使用 WXBizMsgCrypt3.py),提供了用户接入企业微信的三个接口,Sample.py文件提供了如何使用这三个接口的示例,ierror.py提供了错误码。
+2.WXBizMsgCrypt封装了VerifyURL, DecryptMsg, EncryptMsg三个接口,分别用于开发者验证回调url,收到用户回复消息的解密以及开发者回复消息的加密过程。使用方法可以参考Sample.py文件。
+3.加解密协议请参考企业微信官方文档。
+4.本代码用到了pycrypto第三方库,请开发者自行安装此库再使用。
diff --git a/callback/Sample.py b/callback/Sample.py
new file mode 100644
index 0000000..f1faa7c
--- /dev/null
+++ b/callback/Sample.py
@@ -0,0 +1,108 @@
+#!/usr/bin/env python
+# -*- coding: utf-8 -*-
+#########################################################################
+# Author: jonyqin
+# Created Time: Thu 11 Sep 2014 03:55:41 PM CST
+# File Name: Sample.py
+# Description: WXBizMsgCrypt 使用demo文件
+#########################################################################
+from WXBizMsgCrypt import WXBizMsgCrypt
+import xml.etree.cElementTree as ET
+import sys
+
+if __name__ == "__main__":
+ # 企业在企业微信后台上设置的密钥相关配置在这里 TODO
+ sToken = "xxxxxxx"
+ sEncodingAESKey = "xxxxxxx"
+ sCorpID = "ww1436e0e65a779aee"
+ '''
+ ------------使用示例一:验证回调URL---------------
+ *企业开启回调模式时,企业号会向验证url发送一个get请求
+ 假设点击验证时,企业收到类似请求:
+ * GET /cgi-bin/wxpush?msg_signature=5c45ff5e21c57e6ad56bac8758b79b1d9ac89fd3×tamp=1409659589&nonce=263014780&echostr=P9nAzCzyDtyTWESHep1vC5X9xho%2FqYX3Zpb4yKa9SKld1DsH3Iyt3tP3zNdtp%2B4RPcs8TgAE7OaBO%2BFZXvnaqQ%3D%3D
+ * HTTP/1.1 Host: qy.weixin.qq.com
+
+ 接收到该请求时,企业应 1.解析出Get请求的参数,包括消息体签名(msg_signature),时间戳(timestamp),随机数字串(nonce)以及企业微信推送过来的随机加密字符串(echostr),
+ 这一步注意作URL解码。
+ 2.验证消息体签名的正确性
+ 3. 解密出echostr原文,将原文当作Get请求的response,返回给企业微信
+ 第2,3步可以用企业微信提供的库函数VerifyURL来实现。
+ '''
+ wxcpt=WXBizMsgCrypt(sToken,sEncodingAESKey,sCorpID)
+ #sVerifyMsgSig=HttpUtils.ParseUrl("msg_signature")
+ #ret = wxcpt.VerifyAESKey()
+ #print ret
+ sVerifyMsgSig="012bc692d0a58dd4b10f8dfe5c4ac00ae211ebeb"
+ #sVerifyTimeStamp=HttpUtils.ParseUrl("timestamp")
+ sVerifyTimeStamp="1476416373"
+ #sVerifyNonce=HttpUitls.ParseUrl("nonce")
+ sVerifyNonce="47744683"
+ #sVerifyEchoStr=HttpUtils.ParseUrl("echostr")
+ sVerifyEchoStr="fsi1xnbH4yQh0+PJxcOdhhK6TDXkjMyhEPA7xB2TGz6b+g7xyAbEkRxN/3cNXW9qdqjnoVzEtpbhnFyq6SVHyA=="
+ ret,sEchoStr=wxcpt.VerifyURL(sVerifyMsgSig, sVerifyTimeStamp,sVerifyNonce,sVerifyEchoStr)
+ if(ret!=0):
+ print "ERR: VerifyURL ret: " + str(ret)
+ sys.exit(1)
+ #验证URL成功,将sEchoStr返回给企业号
+ #HttpUtils.SetResponse(sEchoStr)
+
+ '''
+ ------------使用示例二:对用户回复的消息解密---------------
+ 用户回复消息或者点击事件响应时,企业会收到回调消息,此消息是经过企业微信加密之后的密文以post形式发送给企业,密文格式请参考官方文档
+ 假设企业收到企业微信的回调消息如下:
+ POST /cgi-bin/wxpush? msg_signature=477715d11cdb4164915debcba66cb864d751f3e6×tamp=1409659813&nonce=1372623149 HTTP/1.1
+ Host: qy.weixin.qq.com
+ Content-Length: 613
+
+
+
+
+ 企业收到post请求之后应该 1.解析出url上的参数,包括消息体签名(msg_signature),时间戳(timestamp)以及随机数字串(nonce)
+ 2.验证消息体签名的正确性。 3.将post请求的数据进行xml解析,并将标签的内容进行解密,解密出来的明文即是用户回复消息的明文,明文格式请参考官方文档
+ 第2,3步可以用企业微信提供的库函数DecryptMsg来实现。
+ '''
+ # sReqMsgSig = HttpUtils.ParseUrl("msg_signature")
+ sReqMsgSig = "0c3914025cb4b4d68103f6bfc8db550f79dcf48e"
+ sReqTimeStamp = "1476422779"
+ sReqNonce = "1597212914"
+ sReqData = "\n\n\n"
+ ret,sMsg=wxcpt.DecryptMsg( sReqData, sReqMsgSig, sReqTimeStamp, sReqNonce)
+ print ret,sMsg
+ if( ret!=0 ):
+ print "ERR: DecryptMsg ret: " + str(ret)
+ sys.exit(1)
+ # 解密成功,sMsg即为xml格式的明文
+ # TODO: 对明文的处理
+ # For example:
+ xml_tree = ET.fromstring(sMsg)
+ content = xml_tree.find("Content").text
+ print content
+ # ...
+ # ...
+
+ '''
+ ------------使用示例三:企业回复用户消息的加密---------------
+ 企业被动回复用户的消息也需要进行加密,并且拼接成密文格式的xml串。
+ 假设企业需要回复用户的明文如下:
+
+
+
+ 1348831860
+
+
+ 1234567890123456
+ 128
+
+
+ 为了将此段明文回复给用户,企业应: 1.自己生成时间时间戳(timestamp),随机数字串(nonce)以便生成消息体签名,也可以直接用从企业微信的post url上解析出的对应值。
+ 2.将明文加密得到密文。 3.用密文,步骤1生成的timestamp,nonce和企业在企业微信设定的token生成消息体签名。 4.将密文,消息体签名,时间戳,随机数字串拼接成xml格式的字符串,发送给企业号。
+ 以上2,3,4步可以用企业微信提供的库函数EncryptMsg来实现。
+ '''
+ sRespData = "ww1436e0e65a779aeeChenJiaShun1476422779text你好14564537201000002"
+ ret,sEncryptMsg=wxcpt.EncryptMsg(sRespData, sReqNonce, sReqTimeStamp)
+ if( ret!=0 ):
+ print "ERR: EncryptMsg ret: " + str(ret)
+ sys.exit(1)
+ #ret == 0 加密成功,企业需要将sEncryptMsg返回给企业号
+ #TODO:
+ #HttpUitls.SetResponse(sEncryptMsg) #测试解密
diff --git a/callback/WXBizMsgCrypt.py b/callback/WXBizMsgCrypt.py
new file mode 100644
index 0000000..94e4e12
--- /dev/null
+++ b/callback/WXBizMsgCrypt.py
@@ -0,0 +1,274 @@
+#!/usr/bin/env python
+#-*- encoding:utf-8 -*-
+
+""" 对企业微信发送给企业后台的消息加解密示例代码.
+@copyright: Copyright (c) 1998-2014 Tencent Inc.
+
+"""
+# ------------------------------------------------------------------------
+
+import base64
+import string
+import random
+import hashlib
+import time
+import struct
+from Crypto.Cipher import AES
+import xml.etree.cElementTree as ET
+import sys
+import socket
+stdi,stdo,stde=sys.stdin,sys.stdout,sys.stderr
+reload(sys)
+sys.stdin,sys.stdout,sys.stderr=stdi,stdo,stde
+import ierror
+sys.setdefaultencoding('utf-8')
+
+"""
+关于Crypto.Cipher模块,ImportError: No module named 'Crypto'解决方案
+请到官方网站 https://www.dlitz.net/software/pycrypto/ 下载pycrypto。
+下载后,按照README中的“Installation”小节的提示进行pycrypto安装。
+"""
+class FormatException(Exception):
+ pass
+
+def throw_exception(message, exception_class=FormatException):
+ """my define raise exception function"""
+ raise exception_class(message)
+
+class SHA1:
+ """计算企业微信的消息签名接口"""
+
+ def getSHA1(self, token, timestamp, nonce, encrypt):
+ """用SHA1算法生成安全签名
+ @param token: 票据
+ @param timestamp: 时间戳
+ @param encrypt: 密文
+ @param nonce: 随机字符串
+ @return: 安全签名
+ """
+ try:
+ sortlist = [token, timestamp, nonce, encrypt]
+ sortlist.sort()
+ sha = hashlib.sha1()
+ sha.update("".join(sortlist))
+ return ierror.WXBizMsgCrypt_OK, sha.hexdigest()
+ except Exception,e:
+ print e
+ return ierror.WXBizMsgCrypt_ComputeSignature_Error, None
+
+
+class XMLParse:
+ """提供提取消息格式中的密文及生成回复消息格式的接口"""
+
+ # xml消息模板
+ AES_TEXT_RESPONSE_TEMPLATE = """
+
+
+%(timestamp)s
+
+"""
+
+ def extract(self, xmltext):
+ """提取出xml数据包中的加密消息
+ @param xmltext: 待提取的xml字符串
+ @return: 提取出的加密消息字符串
+ """
+ try:
+ xml_tree = ET.fromstring(xmltext)
+ encrypt = xml_tree.find("Encrypt")
+ return ierror.WXBizMsgCrypt_OK, encrypt.text
+ except Exception,e:
+ print e
+ return ierror.WXBizMsgCrypt_ParseXml_Error,None
+
+ def generate(self, encrypt, signature, timestamp, nonce):
+ """生成xml消息
+ @param encrypt: 加密后的消息密文
+ @param signature: 安全签名
+ @param timestamp: 时间戳
+ @param nonce: 随机字符串
+ @return: 生成的xml字符串
+ """
+ resp_dict = {
+ 'msg_encrypt' : encrypt,
+ 'msg_signaturet': signature,
+ 'timestamp' : timestamp,
+ 'nonce' : nonce,
+ }
+ resp_xml = self.AES_TEXT_RESPONSE_TEMPLATE % resp_dict
+ return resp_xml
+
+
+class PKCS7Encoder():
+ """提供基于PKCS7算法的加解密接口"""
+
+ block_size = 32
+ def encode(self, text):
+ """ 对需要加密的明文进行填充补位
+ @param text: 需要进行填充补位操作的明文
+ @return: 补齐明文字符串
+ """
+ text_length = len(text)
+ # 计算需要填充的位数
+ amount_to_pad = self.block_size - (text_length % self.block_size)
+ if amount_to_pad == 0:
+ amount_to_pad = self.block_size
+ # 获得补位所用的字符
+ pad = chr(amount_to_pad)
+ return text + pad * amount_to_pad
+
+ def decode(self, decrypted):
+ """删除解密后明文的补位字符
+ @param decrypted: 解密后的明文
+ @return: 删除补位字符后的明文
+ """
+ pad = ord(decrypted[-1])
+ if pad<1 or pad >32:
+ pad = 0
+ return decrypted[:-pad]
+
+
+class Prpcrypt(object):
+ """提供接收和推送给企业微信消息的加解密接口"""
+
+ def __init__(self,key):
+
+ #self.key = base64.b64decode(key+"=")
+ self.key = key
+ # 设置加解密模式为AES的CBC模式
+ self.mode = AES.MODE_CBC
+
+
+ def encrypt(self,text,receiveid):
+ """对明文进行加密
+ @param text: 需要加密的明文
+ @return: 加密得到的字符串
+ """
+ # 16位随机字符串添加到明文开头
+ text = self.get_random_str() + struct.pack("I",socket.htonl(len(text))) + text + receiveid
+ # 使用自定义的填充方式对明文进行补位填充
+ pkcs7 = PKCS7Encoder()
+ text = pkcs7.encode(text)
+ # 加密
+ cryptor = AES.new(self.key,self.mode,self.key[:16])
+ try:
+ ciphertext = cryptor.encrypt(text)
+ # 使用BASE64对加密后的字符串进行编码
+ return ierror.WXBizMsgCrypt_OK, base64.b64encode(ciphertext)
+ except Exception,e:
+ print e
+ return ierror.WXBizMsgCrypt_EncryptAES_Error,None
+
+ def decrypt(self,text,receiveid):
+ """对解密后的明文进行补位删除
+ @param text: 密文
+ @return: 删除填充补位后的明文
+ """
+ try:
+ cryptor = AES.new(self.key,self.mode,self.key[:16])
+ # 使用BASE64对密文进行解码,然后AES-CBC解密
+ plain_text = cryptor.decrypt(base64.b64decode(text))
+ except Exception,e:
+ print e
+ return ierror.WXBizMsgCrypt_DecryptAES_Error,None
+ try:
+ pad = ord(plain_text[-1])
+ # 去掉补位字符串
+ #pkcs7 = PKCS7Encoder()
+ #plain_text = pkcs7.encode(plain_text)
+ # 去除16位随机字符串
+ content = plain_text[16:-pad]
+ xml_len = socket.ntohl(struct.unpack("I",content[ : 4])[0])
+ xml_content = content[4 : xml_len+4]
+ from_receiveid = content[xml_len+4:]
+ except Exception,e:
+ print e
+ return ierror.WXBizMsgCrypt_IllegalBuffer,None
+ if from_receiveid != receiveid:
+ return ierror.WXBizMsgCrypt_ValidateCorpid_Error,None
+ return 0,xml_content
+
+ def get_random_str(self):
+ """ 随机生成16位字符串
+ @return: 16位字符串
+ """
+ rule = string.letters + string.digits
+ str = random.sample(rule, 16)
+ return "".join(str)
+
+class WXBizMsgCrypt(object):
+ #构造函数
+ def __init__(self,sToken,sEncodingAESKey,sReceiveId):
+ try:
+ self.key = base64.b64decode(sEncodingAESKey+"=")
+ assert len(self.key) == 32
+ except:
+ throw_exception("[error]: EncodingAESKey unvalid !", FormatException)
+ # return ierror.WXBizMsgCrypt_IllegalAesKey,None
+ self.m_sToken = sToken
+ self.m_sReceiveId = sReceiveId
+
+ #验证URL
+ #@param sMsgSignature: 签名串,对应URL参数的msg_signature
+ #@param sTimeStamp: 时间戳,对应URL参数的timestamp
+ #@param sNonce: 随机串,对应URL参数的nonce
+ #@param sEchoStr: 随机串,对应URL参数的echostr
+ #@param sReplyEchoStr: 解密之后的echostr,当return返回0时有效
+ #@return:成功0,失败返回对应的错误码
+
+ def VerifyURL(self, sMsgSignature, sTimeStamp, sNonce, sEchoStr):
+ sha1 = SHA1()
+ ret,signature = sha1.getSHA1(self.m_sToken, sTimeStamp, sNonce, sEchoStr)
+ if ret != 0:
+ return ret, None
+ if not signature == sMsgSignature:
+ return ierror.WXBizMsgCrypt_ValidateSignature_Error, None
+ pc = Prpcrypt(self.key)
+ ret,sReplyEchoStr = pc.decrypt(sEchoStr,self.m_sReceiveId)
+ return ret,sReplyEchoStr
+
+ def EncryptMsg(self, sReplyMsg, sNonce, timestamp = None):
+ #将企业回复用户的消息加密打包
+ #@param sReplyMsg: 企业号待回复用户的消息,xml格式的字符串
+ #@param sTimeStamp: 时间戳,可以自己生成,也可以用URL参数的timestamp,如为None则自动用当前时间
+ #@param sNonce: 随机串,可以自己生成,也可以用URL参数的nonce
+ #sEncryptMsg: 加密后的可以直接回复用户的密文,包括msg_signature, timestamp, nonce, encrypt的xml格式的字符串,
+ #return:成功0,sEncryptMsg,失败返回对应的错误码None
+ pc = Prpcrypt(self.key)
+ ret,encrypt = pc.encrypt(sReplyMsg, self.m_sReceiveId)
+ if ret != 0:
+ return ret,None
+ if timestamp is None:
+ timestamp = str(int(time.time()))
+ # 生成安全签名
+ sha1 = SHA1()
+ ret,signature = sha1.getSHA1(self.m_sToken, timestamp, sNonce, encrypt)
+ if ret != 0:
+ return ret,None
+ xmlParse = XMLParse()
+ return ret,xmlParse.generate(encrypt, signature, timestamp, sNonce)
+
+ def DecryptMsg(self, sPostData, sMsgSignature, sTimeStamp, sNonce):
+ # 检验消息的真实性,并且获取解密后的明文
+ # @param sMsgSignature: 签名串,对应URL参数的msg_signature
+ # @param sTimeStamp: 时间戳,对应URL参数的timestamp
+ # @param sNonce: 随机串,对应URL参数的nonce
+ # @param sPostData: 密文,对应POST请求的数据
+ # xml_content: 解密后的原文,当return返回0时有效
+ # @return: 成功0,失败返回对应的错误码
+ # 验证安全签名
+ xmlParse = XMLParse()
+ ret,encrypt = xmlParse.extract(sPostData)
+ if ret != 0:
+ return ret, None
+ sha1 = SHA1()
+ ret,signature = sha1.getSHA1(self.m_sToken, sTimeStamp, sNonce, encrypt)
+ if ret != 0:
+ return ret, None
+ if not signature == sMsgSignature:
+ return ierror.WXBizMsgCrypt_ValidateSignature_Error, None
+ pc = Prpcrypt(self.key)
+ ret,xml_content = pc.decrypt(encrypt,self.m_sReceiveId)
+ return ret,xml_content
+
+
diff --git a/callback/ierror.py b/callback/ierror.py
new file mode 100644
index 0000000..6678fec
--- /dev/null
+++ b/callback/ierror.py
@@ -0,0 +1,20 @@
+#!/usr/bin/env python
+# -*- coding: utf-8 -*-
+#########################################################################
+# Author: jonyqin
+# Created Time: Thu 11 Sep 2014 01:53:58 PM CST
+# File Name: ierror.py
+# Description:定义错误码含义
+#########################################################################
+WXBizMsgCrypt_OK = 0
+WXBizMsgCrypt_ValidateSignature_Error = -40001
+WXBizMsgCrypt_ParseXml_Error = -40002
+WXBizMsgCrypt_ComputeSignature_Error = -40003
+WXBizMsgCrypt_IllegalAesKey = -40004
+WXBizMsgCrypt_ValidateCorpid_Error = -40005
+WXBizMsgCrypt_EncryptAES_Error = -40006
+WXBizMsgCrypt_DecryptAES_Error = -40007
+WXBizMsgCrypt_IllegalBuffer = -40008
+WXBizMsgCrypt_EncodeBase64_Error = -40009
+WXBizMsgCrypt_DecodeBase64_Error = -40010
+WXBizMsgCrypt_GenReturnXml_Error = -40011
diff --git a/callback_json/Readme.txt b/callback_json/Readme.txt
new file mode 100644
index 0000000..79ebb21
--- /dev/null
+++ b/callback_json/Readme.txt
@@ -0,0 +1,5 @@
+ע
+1.WXBizMsgCrypt.pyļװWXBizMsgCryptӿ࣬ṩûҵŵӿڣSample.pyļṩʹӿڵʾierror.pyṩ˴롣
+2.WXBizMsgCryptװVerifyURL, DecryptMsg, EncryptMsgӿڣֱڿ֤صurlյûظϢĽԼظϢļ̡ܹʹ÷ԲοSample.pyļ
+3.ӽЭοҵŹٷĵ
+4.õpycrypto⣬뿪аװ˿ʹá
\ No newline at end of file
diff --git a/callback_json/Sample.py b/callback_json/Sample.py
new file mode 100644
index 0000000..5819337
--- /dev/null
+++ b/callback_json/Sample.py
@@ -0,0 +1,108 @@
+#!/usr/bin/env python
+# -*- coding: utf-8 -*-
+#########################################################################
+# Author: jonyqin
+# Created Time: Thu 11 Sep 2014 03:55:41 PM CST
+# File Name: Sample.py
+# Description: WXBizJsonMsgCrypt 使用demo文件
+#########################################################################
+from WXBizJsonMsgCrypt import WXBizJsonMsgCrypt
+import sys
+
+if __name__ == "__main__":
+ # 企业在企业微信后台上设置的密钥相关配置在这里 TODO
+ sToken = "xxxxxxx"
+ sEncodingAESKey = "xxxxxxx"
+ sCorpID = "ww1436e0e65a779aee"
+ '''
+ ------------使用示例一:验证回调URL---------------
+ *企业开启回调模式时,企业号会向验证url发送一个get请求
+ 假设点击验证时,企业收到类似请求:
+ * GET /cgi-bin/wxpush?msg_signature=5c45ff5e21c57e6ad56bac8758b79b1d9ac89fd3×tamp=1409659589&nonce=263014780&echostr=P9nAzCzyDtyTWESHep1vC5X9xho%2FqYX3Zpb4yKa9SKld1DsH3Iyt3tP3zNdtp%2B4RPcs8TgAE7OaBO%2BFZXvnaqQ%3D%3D
+ * HTTP/1.1 Host: qy.weixin.qq.com
+
+ 接收到该请求时,企业应 1.解析出Get请求的参数,包括消息体签名(msg_signature),时间戳(timestamp),随机数字串(nonce)以及企业微信推送过来的随机加密字符串(echostr),
+ 这一步注意作URL解码。
+ 2.验证消息体签名的正确性
+ 3. 解密出echostr原文,将原文当作Get请求的response,返回给企业微信
+ 第2,3步可以用企业微信提供的库函数VerifyURL来实现。
+ '''
+ wxcpt=WXBizJsonMsgCrypt(sToken,sEncodingAESKey,sCorpID)
+ sVerifyMsgSig="012bc692d0a58dd4b10f8dfe5c4ac00ae211ebeb"
+ sVerifyTimeStamp="1476416373"
+ sVerifyNonce="47744683"
+ sVerifyEchoStr="fsi1xnbH4yQh0+PJxcOdhhK6TDXkjMyhEPA7xB2TGz6b+g7xyAbEkRxN/3cNXW9qdqjnoVzEtpbhnFyq6SVHyA=="
+ ret,sEchoStr=wxcpt.VerifyURL(sVerifyMsgSig, sVerifyTimeStamp,sVerifyNonce,sVerifyEchoStr)
+ if(ret!=0):
+ print "ERR: VerifyURL ret: " + str(ret)
+ sys.exit(1)
+ else:
+ print "done VerifyURL"
+ #验证URL成功,将sEchoStr返回给企业号
+
+ print "=============================="
+ '''
+ ------------使用示例二:对用户回复的消息解密---------------
+ 用户回复消息或者点击事件响应时,企业会收到回调消息,此消息是经过企业微信加密之后的密文以post形式发送给企业,密文格式请参考官方文档
+ 假设企业收到企业微信的回调消息如下:
+ POST /cgi-bin/wxpush? msg_signature=e3647471e395139e2308c1fa963f2d648a00b90e×tamp=1409659813&nonce=1372623149 HTTP/1.1
+ Host: qy.weixin.qq.com
+
+ {
+ "tousername": "wx5823bf96d3bd56c7",
+ "encrypt": "cjhLUX7UU4yCSelv1vz7T0zT8huF51bAMVWriNvO1FMegHrQZNrtvRxbwf0fUPsFvwqR0U0fgiJNEA5Y30F2MoI2S7vv3EjVQ68C0cjw9frBoUE2Hj0BvFp9h3u6Vbsg4lc1C8AtHdaN8orKuNKkLRLuYEL52R1J3v8olJGZRLnRdVKIivixmX/eQpzgeExtp20jI1HxRP1AAZ6xZoILdqDPO549LO4WeG+685JRUTdiwcY5fjZlqeMxuT4PpMn1X9OWsS7NRj06Wa5E3Tvg4twjWp39KPfOdRte6P1T4JU=",
+ "agentid": 218
+ }
+
+ 企业收到post请求之后应该 1.解析出url上的参数,包括消息体签名(msg_signature),时间戳(timestamp)以及随机数字串(nonce)
+ 2.验证消息体签名的正确性。 3.将post请求的数据进行json解析,并将"encrypt"标签的内容进行解密,解密出来的明文即是用户回复消息的明文,明文格式请参考官方文档
+ 第2,3步可以用企业微信提供的库函数DecryptMsg来实现。
+ '''
+
+ sReqNonce = "1372623149"
+ sReqTimeStamp = "1409659813"
+
+ sReqMsgSig = "e3647471e395139e2308c1fa963f2d648a00b90e"
+ sReqData = '{ "tousername": "wx5823bf96d3bd56c7", "encrypt": "cjhLUX7UU4yCSelv1vz7T0zT8huF51bAMVWriNvO1FMegHrQZNrtvRxbwf0fUPsFvwqR0U0fgiJNEA5Y30F2MoI2S7vv3EjVQ68C0cjw9frBoUE2Hj0BvFp9h3u6Vbsg4lc1C8AtHdaN8orKuNKkLRLuYEL52R1J3v8olJGZRLnRdVKIivixmX/eQpzgeExtp20jI1HxRP1AAZ6xZoILdqDPO549LO4WeG+685JRUTdiwcY5fjZlqeMxuT4PpMn1X9OWsS7NRj06Wa5E3Tvg4twjWp39KPfOdRte6P1T4JU=", "agentid": 218 }';
+ ret,sMsg=wxcpt.DecryptMsg( sReqData, sReqMsgSig, sReqTimeStamp, sReqNonce)
+ if( ret!=0 ):
+ print "ERR: DecryptMsg ret: " + str(ret)
+ sys.exit(1)
+ else:
+ print sMsg
+ # 解密成功,sMsg即为json格式的明文
+ # TODO: 对明文的处理
+ # ...
+ # ...
+
+ print "=============================="
+
+ '''
+ ------------使用示例三:企业回复用户消息的加密---------------
+ 企业被动回复用户的消息也需要进行加密,并且拼接成密文格式的json串。
+ 假设企业需要回复用户的明文如下:
+
+ {
+ "ToUserName": "mycreate",
+ "FromUserName":"wx5823bf96d3bd56c7",
+ "CreateTime": 1348831860,
+ "MsgType": "text",
+ "Content": "this is a test",
+ "MsgId": 1234567890123456,
+ "AgentID": 128
+ }
+
+ 为了将此段明文回复给用户,企业应: 1.自己生成时间时间戳(timestamp),随机数字串(nonce)以便生成消息体签名,也可以直接用从企业微信的post url上解析出的对应值。
+ 2.将明文加密得到密文。 3.用密文,步骤1生成的timestamp,nonce和企业在企业微信设定的token生成消息体签名。 4.将密文,消息体签名,时间戳,随机数字串拼接成json格式的字符串,发送给企业号。
+ 以上2,3,4步可以用企业微信提供的库函数EncryptMsg来实现。
+ '''
+ #sRespData = ' { "ToUserName": "mycreate", "FromUserName":"wx5823bf96d3bd56c7", "CreateTime": 1348831860, "MsgType": "text", "Content": "this is a test", "MsgId": 1234567890123456, "AgentID": 128 }';
+ sRespData = '{ "ToUserName": "wx5823bf96d3bd56c7", "FromUserName": :mycreate", "CreateTime": 1409659813, "MsgType": "text", "Content": "hello", "MsgId": 4561255354251345929, "AgentID": 218}'
+ ret,sEncryptMsg=wxcpt.EncryptMsg(sRespData, sReqNonce, sReqTimeStamp)
+ if( ret!=0 ):
+ print "ERR: EncryptMsg ret: " + str(ret)
+ sys.exit(1)
+ else:
+ print sEncryptMsg
+ #ret == 0 加密成功,企业需要将sEncryptMsg返回给企业号
+ print "=============================="
diff --git a/callback_json/WXBizJsonMsgCrypt.py b/callback_json/WXBizJsonMsgCrypt.py
new file mode 100644
index 0000000..d0be3cc
--- /dev/null
+++ b/callback_json/WXBizJsonMsgCrypt.py
@@ -0,0 +1,275 @@
+#!/usr/bin/env python
+#-*- encoding:utf-8 -*-
+
+""" 对企业微信发送给企业后台的消息加解密示例代码.
+@copyright: Copyright (c) 1998-2020 Tencent Inc.
+
+"""
+# ------------------------------------------------------------------------
+
+import base64
+import string
+import random
+import hashlib
+import time
+import struct
+from Crypto.Cipher import AES
+import sys
+import socket
+import json
+
+reload(sys)
+import ierror
+sys.setdefaultencoding('utf-8')
+
+"""
+关于Crypto.Cipher模块,ImportError: No module named 'Crypto'解决方案
+请到官方网站 https://www.dlitz.net/software/pycrypto/ 下载pycrypto。
+下载后,按照README中的“Installation”小节的提示进行pycrypto安装。
+"""
+class FormatException(Exception):
+ pass
+
+def throw_exception(message, exception_class=FormatException):
+ """my define raise exception function"""
+ raise exception_class(message)
+
+class SHA1:
+ """计算企业微信的消息签名接口"""
+
+ def getSHA1(self, token, timestamp, nonce, encrypt):
+ """用SHA1算法生成安全签名
+ @param token: 票据
+ @param timestamp: 时间戳
+ @param encrypt: 密文
+ @param nonce: 随机字符串
+ @return: 安全签名
+ """
+ try:
+ sortlist = [token, timestamp, nonce, encrypt]
+ sortlist.sort()
+ sha = hashlib.sha1()
+ sha.update("".join(sortlist))
+ return ierror.WXBizMsgCrypt_OK, sha.hexdigest()
+ except Exception,e:
+ print e
+ return ierror.WXBizMsgCrypt_ComputeSignature_Error, None
+
+
+class JsonParse:
+ """提供提取消息格式中的密文及生成回复消息格式的接口"""
+
+ # json消息模板
+ AES_TEXT_RESPONSE_TEMPLATE = '''{
+ "encrypt": "%(msg_encrypt)s",
+ "msgsignature": "%(msg_signaturet)s",
+ "timestamp": "%(timestamp)s",
+ "nonce": "%(nonce)s"
+ }'''
+
+ def extract(self, jsontext):
+ """提取出json数据包中的加密消息
+ @param jsontext: 待提取的json字符串
+ @return: 提取出的加密消息字符串
+ """
+ try:
+ json_dict = json.loads(jsontext)
+ return ierror.WXBizMsgCrypt_OK, json_dict['encrypt']
+ except Exception,e:
+ print e
+ return ierror.WXBizMsgCrypt_ParseJson_Error, None
+ def generate(self, encrypt, signature, timestamp, nonce):
+ """生成json消息
+ @param encrypt: 加密后的消息密文
+ @param signature: 安全签名
+ @param timestamp: 时间戳
+ @param nonce: 随机字符串
+ @return: 生成的json字符串
+ """
+ resp_dict = {
+ 'msg_encrypt' : encrypt,
+ 'msg_signaturet': signature,
+ 'timestamp' : timestamp,
+ 'nonce' : nonce,
+ }
+ resp_json = self.AES_TEXT_RESPONSE_TEMPLATE % resp_dict
+ return resp_json
+
+
+class PKCS7Encoder():
+ """提供基于PKCS7算法的加解密接口"""
+
+ block_size = 32
+ def encode(self, text):
+ """ 对需要加密的明文进行填充补位
+ @param text: 需要进行填充补位操作的明文
+ @return: 补齐明文字符串
+ """
+ text_length = len(text)
+ # 计算需要填充的位数
+ amount_to_pad = self.block_size - (text_length % self.block_size)
+ if amount_to_pad == 0:
+ amount_to_pad = self.block_size
+ # 获得补位所用的字符
+ pad = chr(amount_to_pad)
+ return text + pad * amount_to_pad
+
+ def decode(self, decrypted):
+ """删除解密后明文的补位字符
+ @param decrypted: 解密后的明文
+ @return: 删除补位字符后的明文
+ """
+ pad = ord(decrypted[-1])
+ if pad<1 or pad >32:
+ pad = 0
+ return decrypted[:-pad]
+
+
+class Prpcrypt(object):
+ """提供接收和推送给企业微信消息的加解密接口"""
+
+ def __init__(self,key):
+
+ #self.key = base64.b64decode(key+"=")
+ self.key = key
+ # 设置加解密模式为AES的CBC模式
+ self.mode = AES.MODE_CBC
+
+
+ def encrypt(self,text,receiveid):
+ """对明文进行加密
+ @param text: 需要加密的明文
+ @return: 加密得到的字符串
+ """
+ # 16位随机字符串添加到明文开头
+ text = self.get_random_str() + struct.pack("I",socket.htonl(len(text))) + text + receiveid
+ # 使用自定义的填充方式对明文进行补位填充
+ pkcs7 = PKCS7Encoder()
+ text = pkcs7.encode(text)
+ # 加密
+ cryptor = AES.new(self.key,self.mode,self.key[:16])
+ try:
+ ciphertext = cryptor.encrypt(text)
+ # 使用BASE64对加密后的字符串进行编码
+ return ierror.WXBizMsgCrypt_OK, base64.b64encode(ciphertext)
+ except Exception,e:
+ print e
+ return ierror.WXBizMsgCrypt_EncryptAES_Error,None
+
+ def decrypt(self,text,receiveid):
+ """对解密后的明文进行补位删除
+ @param text: 密文
+ @return: 删除填充补位后的明文
+ """
+ try:
+ cryptor = AES.new(self.key,self.mode,self.key[:16])
+ # 使用BASE64对密文进行解码,然后AES-CBC解密
+ plain_text = cryptor.decrypt(base64.b64decode(text))
+ except Exception,e:
+ print e
+ return ierror.WXBizMsgCrypt_DecryptAES_Error,None
+ try:
+ pad = ord(plain_text[-1])
+ # 去掉补位字符串
+ #pkcs7 = PKCS7Encoder()
+ #plain_text = pkcs7.encode(plain_text)
+ # 去除16位随机字符串
+ content = plain_text[16:-pad]
+ json_len = socket.ntohl(struct.unpack("I",content[ : 4])[0])
+ json_content = content[4 : json_len+4]
+ from_receiveid = content[json_len+4:]
+ except Exception,e:
+ print e
+ return ierror.WXBizMsgCrypt_IllegalBuffer,None
+ if from_receiveid != receiveid:
+ print "receiveid not match"
+ print from_receiveid
+ return ierror.WXBizMsgCrypt_ValidateCorpid_Error,None
+ return 0,json_content
+
+ def get_random_str(self):
+ """ 随机生成16位字符串
+ @return: 16位字符串
+ """
+ rule = string.letters + string.digits
+ str = random.sample(rule, 16)
+ return "".join(str)
+
+class WXBizJsonMsgCrypt(object):
+ #构造函数
+ def __init__(self,sToken,sEncodingAESKey,sReceiveId):
+ try:
+ self.key = base64.b64decode(sEncodingAESKey+"=")
+ assert len(self.key) == 32
+ except:
+ throw_exception("[error]: EncodingAESKey unvalid !", FormatException)
+ # return ierror.WXBizMsgCrypt_IllegalAesKey,None
+ self.m_sToken = sToken
+ self.m_sReceiveId = sReceiveId
+
+ #验证URL
+ #@param sMsgSignature: 签名串,对应URL参数的msg_signature
+ #@param sTimeStamp: 时间戳,对应URL参数的timestamp
+ #@param sNonce: 随机串,对应URL参数的nonce
+ #@param sEchoStr: 随机串,对应URL参数的echostr
+ #@param sReplyEchoStr: 解密之后的echostr,当return返回0时有效
+ #@return:成功0,失败返回对应的错误码
+
+ def VerifyURL(self, sMsgSignature, sTimeStamp, sNonce, sEchoStr):
+ sha1 = SHA1()
+ ret,signature = sha1.getSHA1(self.m_sToken, sTimeStamp, sNonce, sEchoStr)
+ if ret != 0:
+ return ret, None
+ if not signature == sMsgSignature:
+ return ierror.WXBizMsgCrypt_ValidateSignature_Error, None
+ pc = Prpcrypt(self.key)
+ ret,sReplyEchoStr = pc.decrypt(sEchoStr,self.m_sReceiveId)
+ return ret,sReplyEchoStr
+
+ def EncryptMsg(self, sReplyMsg, sNonce, timestamp = None):
+ #将企业回复用户的消息加密打包
+ #@param sReplyMsg: 企业号待回复用户的消息,json格式的字符串
+ #@param sTimeStamp: 时间戳,可以自己生成,也可以用URL参数的timestamp,如为None则自动用当前时间
+ #@param sNonce: 随机串,可以自己生成,也可以用URL参数的nonce
+ #sEncryptMsg: 加密后的可以直接回复用户的密文,包括msg_signature, timestamp, nonce, encrypt的json格式的字符串,
+ #return:成功0,sEncryptMsg,失败返回对应的错误码None
+ pc = Prpcrypt(self.key)
+ ret,encrypt = pc.encrypt(sReplyMsg, self.m_sReceiveId)
+ if ret != 0:
+ return ret,None
+ if timestamp is None:
+ timestamp = str(int(time.time()))
+ # 生成安全签名
+ sha1 = SHA1()
+ ret,signature = sha1.getSHA1(self.m_sToken, timestamp, sNonce, encrypt)
+ if ret != 0:
+ return ret,None
+ jsonParse = JsonParse()
+ return ret,jsonParse.generate(encrypt, signature, timestamp, sNonce)
+
+ def DecryptMsg(self, sPostData, sMsgSignature, sTimeStamp, sNonce):
+ # 检验消息的真实性,并且获取解密后的明文
+ # @param sMsgSignature: 签名串,对应URL参数的msg_signature
+ # @param sTimeStamp: 时间戳,对应URL参数的timestamp
+ # @param sNonce: 随机串,对应URL参数的nonce
+ # @param sPostData: 密文,对应POST请求的数据
+ # json_content: 解密后的原文,当return返回0时有效
+ # @return: 成功0,失败返回对应的错误码
+ # 验证安全签名
+ jsonParse = JsonParse()
+ ret,encrypt = jsonParse.extract(sPostData)
+ if ret != 0:
+ return ret, None
+ sha1 = SHA1()
+ ret,signature = sha1.getSHA1(self.m_sToken, sTimeStamp, sNonce, encrypt)
+ if ret != 0:
+ return ret, None
+ if not signature == sMsgSignature:
+ print "signature not match"
+ print signature
+ return ierror.WXBizMsgCrypt_ValidateSignature_Error, None
+ pc = Prpcrypt(self.key)
+ ret,json_content = pc.decrypt(encrypt,self.m_sReceiveId)
+ return ret,json_content
+
+
diff --git a/callback_json/ierror.py b/callback_json/ierror.py
new file mode 100644
index 0000000..51c02c3
--- /dev/null
+++ b/callback_json/ierror.py
@@ -0,0 +1,20 @@
+#!/usr/bin/env python
+# -*- coding: utf-8 -*-
+#########################################################################
+# Author: jonyqin
+# Created Time: Thu 11 Sep 2014 01:53:58 PM CST
+# File Name: ierror.py
+# Description:定义错误码含义
+#########################################################################
+WXBizMsgCrypt_OK = 0
+WXBizMsgCrypt_ValidateSignature_Error = -40001
+WXBizMsgCrypt_ParseJson_Error = -40002
+WXBizMsgCrypt_ComputeSignature_Error = -40003
+WXBizMsgCrypt_IllegalAesKey = -40004
+WXBizMsgCrypt_ValidateCorpid_Error = -40005
+WXBizMsgCrypt_EncryptAES_Error = -40006
+WXBizMsgCrypt_DecryptAES_Error = -40007
+WXBizMsgCrypt_IllegalBuffer = -40008
+WXBizMsgCrypt_EncodeBase64_Error = -40009
+WXBizMsgCrypt_DecodeBase64_Error = -40010
+WXBizMsgCrypt_GenReturnJson_Error = -40011
diff --git a/callback_json_python3/Readme.txt b/callback_json_python3/Readme.txt
new file mode 100644
index 0000000..79ebb21
--- /dev/null
+++ b/callback_json_python3/Readme.txt
@@ -0,0 +1,5 @@
+ע
+1.WXBizMsgCrypt.pyļװWXBizMsgCryptӿ࣬ṩûҵŵӿڣSample.pyļṩʹӿڵʾierror.pyṩ˴롣
+2.WXBizMsgCryptװVerifyURL, DecryptMsg, EncryptMsgӿڣֱڿ֤صurlյûظϢĽԼظϢļ̡ܹʹ÷ԲοSample.pyļ
+3.ӽЭοҵŹٷĵ
+4.õpycrypto⣬뿪аװ˿ʹá
\ No newline at end of file
diff --git a/callback_json_python3/Sample.py b/callback_json_python3/Sample.py
new file mode 100644
index 0000000..7b76caf
--- /dev/null
+++ b/callback_json_python3/Sample.py
@@ -0,0 +1,123 @@
+#!/usr/bin/env python
+# -*- coding: utf-8 -*-
+#########################################################################
+# Author: jonyqin
+# Created Time: Thu 11 Sep 2014 03:55:41 PM CST
+# File Name: Sample.py
+# Description: WXBizJsonMsgCrypt 使用demo文件
+#########################################################################
+from WXBizJsonMsgCrypt import WXBizJsonMsgCrypt
+import sys
+import json
+
+if __name__ == "__main__":
+ # 企业在企业微信后台上设置的密钥相关配置在这里 TODO
+ sToken = "xxxxxxx"
+ sEncodingAESKey = "xxxxxxx"
+ sCorpID = "ww1436e0e65a779aee"
+ '''
+ ------------使用示例一:验证回调URL---------------
+ *企业开启回调模式时,企业号会向验证url发送一个get请求
+ 假设点击验证时,企业收到类似请求:
+ * GET /cgi-bin/wxpush?msg_signature=5c45ff5e21c57e6ad56bac8758b79b1d9ac89fd3×tamp=1409659589&nonce=263014780&echostr=P9nAzCzyDtyTWESHep1vC5X9xho%2FqYX3Zpb4yKa9SKld1DsH3Iyt3tP3zNdtp%2B4RPcs8TgAE7OaBO%2BFZXvnaqQ%3D%3D
+ * HTTP/1.1 Host: qy.weixin.qq.com
+
+ 接收到该请求时,企业应 1.解析出Get请求的参数,包括消息体签名(msg_signature),时间戳(timestamp),随机数字串(nonce)以及企业微信推送过来的随机加密字符串(echostr),
+ 这一步注意作URL解码。
+ 2.验证消息体签名的正确性
+ 3. 解密出echostr原文,将原文当作Get请求的response,返回给企业微信
+ 第2,3步可以用企业微信提供的库函数VerifyURL来实现。
+ '''
+ wxcpt=WXBizJsonMsgCrypt(sToken,sEncodingAESKey,sCorpID)
+ sVerifyMsgSig="012bc692d0a58dd4b10f8dfe5c4ac00ae211ebeb"
+ sVerifyTimeStamp="1476416373"
+ sVerifyNonce="47744683"
+ sVerifyEchoStr="fsi1xnbH4yQh0+PJxcOdhhK6TDXkjMyhEPA7xB2TGz6b+g7xyAbEkRxN/3cNXW9qdqjnoVzEtpbhnFyq6SVHyA=="
+ ret,sEchoStr=wxcpt.VerifyURL(sVerifyMsgSig, sVerifyTimeStamp,sVerifyNonce,sVerifyEchoStr)
+ if(ret!=0):
+ print("ERR: VerifyURL ret: " + str(ret))
+ sys.exit(1)
+ else:
+ print("done VerifyURL")
+ #验证URL成功,将sEchoStr返回给企业号
+
+ print("==============================")
+ '''
+ ------------使用示例二:对用户回复的消息解密---------------
+ 用户回复消息或者点击事件响应时,企业会收到回调消息,此消息是经过企业微信加密之后的密文以post形式发送给企业,密文格式请参考官方文档
+ 假设企业收到企业微信的回调消息如下:
+ POST /cgi-bin/wxpush? msg_signature=e3647471e395139e2308c1fa963f2d648a00b90e×tamp=1409659813&nonce=1372623149 HTTP/1.1
+ Host: qy.weixin.qq.com
+
+ {
+ "tousername": "wx5823bf96d3bd56c7",
+ "encrypt": "cjhLUX7UU4yCSelv1vz7T0zT8huF51bAMVWriNvO1FMegHrQZNrtvRxbwf0fUPsFvwqR0U0fgiJNEA5Y30F2MoI2S7vv3EjVQ68C0cjw9frBoUE2Hj0BvFp9h3u6Vbsg4lc1C8AtHdaN8orKuNKkLRLuYEL52R1J3v8olJGZRLnRdVKIivixmX/eQpzgeExtp20jI1HxRP1AAZ6xZoILdqDPO549LO4WeG+685JRUTdiwcY5fjZlqeMxuT4PpMn1X9OWsS7NRj06Wa5E3Tvg4twjWp39KPfOdRte6P1T4JU=",
+ "agentid": 218
+ }
+
+ 企业收到post请求之后应该 1.解析出url上的参数,包括消息体签名(msg_signature),时间戳(timestamp)以及随机数字串(nonce)
+ 2.验证消息体签名的正确性。 3.将post请求的数据进行json解析,并将"encrypt"标签的内容进行解密,解密出来的明文即是用户回复消息的明文,明文格式请参考官方文档
+ 第2,3步可以用企业微信提供的库函数DecryptMsg来实现。
+ '''
+
+ sReqNonce = "1372623149"
+ sReqTimeStamp = "1409659813"
+
+ sReqMsgSig = "e3647471e395139e2308c1fa963f2d648a00b90e"
+ sReqData = '{ "tousername": "wx5823bf96d3bd56c7", "encrypt": "cjhLUX7UU4yCSelv1vz7T0zT8huF51bAMVWriNvO1FMegHrQZNrtvRxbwf0fUPsFvwqR0U0fgiJNEA5Y30F2MoI2S7vv3EjVQ68C0cjw9frBoUE2Hj0BvFp9h3u6Vbsg4lc1C8AtHdaN8orKuNKkLRLuYEL52R1J3v8olJGZRLnRdVKIivixmX/eQpzgeExtp20jI1HxRP1AAZ6xZoILdqDPO549LO4WeG+685JRUTdiwcY5fjZlqeMxuT4PpMn1X9OWsS7NRj06Wa5E3Tvg4twjWp39KPfOdRte6P1T4JU=", "agentid": 218 }';
+ ret,sMsg=wxcpt.DecryptMsg( sReqData, sReqMsgSig, sReqTimeStamp, sReqNonce)
+ if( ret!=0 ):
+ print("ERR: DecryptMsg ret: " + str(ret))
+ sys.exit(1)
+ else:
+ print(sMsg)
+ # 解密成功,sMsg即为json格式的明文
+ # TODO: 对明文的处理
+ # ...
+ # ...
+
+ print("==============================")
+
+ '''
+ ------------使用示例三:企业回复用户消息的加密---------------
+ 企业被动回复用户的消息也需要进行加密,并且拼接成密文格式的json串。
+ 假设企业需要回复用户的明文如下:
+
+ {
+ "ToUserName": "mycreate",
+ "FromUserName":"wx5823bf96d3bd56c7",
+ "CreateTime": 1348831860,
+ "MsgType": "text",
+ "Content": "this is a test",
+ "MsgId": 1234567890123456,
+ "AgentID": 128
+ }
+
+ 为了将此段明文回复给用户,企业应: 1.自己生成时间时间戳(timestamp),随机数字串(nonce)以便生成消息体签名,也可以直接用从企业微信的post url上解析出的对应值。
+ 2.将明文加密得到密文。 3.用密文,步骤1生成的timestamp,nonce和企业在企业微信设定的token生成消息体签名。 4.将密文,消息体签名,时间戳,随机数字串拼接成json格式的字符串,发送给企业号。
+ 以上2,3,4步可以用企业微信提供的库函数EncryptMsg来实现。
+ '''
+ #sRespData = ' { "ToUserName": "mycreate", "FromUserName":"wx5823bf96d3bd56c7", "CreateTime": 1348831860, "MsgType": "text", "Content": "this is a test", "MsgId": 1234567890123456, "AgentID": 128 }';
+ sRespData = '{ "ToUserName": "wx5823bf96d3bd56c7", "FromUserName": :mycreate", "CreateTime": 1409659813, "MsgType": "text", "Content": "hello", "MsgId": 4561255354251345929, "AgentID": 218}'
+ ret,sEncryptMsg=wxcpt.EncryptMsg(sRespData, sReqNonce, sReqTimeStamp)
+ if( ret!=0 ):
+ print("ERR: EncryptMsg ret: " + str(ret))
+ sys.exit(1)
+ else:
+ print(sEncryptMsg)
+ #ret == 0 加密成功,企业需要将sEncryptMsg返回给企业号
+ print("==============================")
+
+ '''
+ 对上面加密的包进行解密
+ '''
+ sReqMsgSig = json.loads(sEncryptMsg)['msgsignature']
+ sReqTimeStamp = json.loads(sEncryptMsg)['timestamp']
+ sReqNonce = json.loads(sEncryptMsg)['nonce']
+
+ ret,sMsg=wxcpt.DecryptMsg( sEncryptMsg, sReqMsgSig, sReqTimeStamp, sReqNonce)
+ if( ret!=0 ):
+ print("ERR: DecryptMsg ret: " + str(ret))
+ sys.exit(1)
+ else:
+ print(sMsg)
diff --git a/callback_json_python3/WXBizJsonMsgCrypt.py b/callback_json_python3/WXBizJsonMsgCrypt.py
new file mode 100644
index 0000000..a954283
--- /dev/null
+++ b/callback_json_python3/WXBizJsonMsgCrypt.py
@@ -0,0 +1,282 @@
+#!/usr/bin/env python
+#-*- encoding:utf-8 -*-
+
+""" 对企业微信发送给企业后台的消息加解密示例代码.
+@copyright: Copyright (c) 1998-2020 Tencent Inc.
+
+"""
+# ------------------------------------------------------------------------
+
+import base64
+import string
+import random
+import hashlib
+import time
+import struct
+from Crypto.Cipher import AES
+import sys
+import socket
+import json
+
+import ierror
+
+"""
+关于Crypto.Cipher模块,ImportError: No module named 'Crypto'解决方案
+请到官方网站 https://www.dlitz.net/software/pycrypto/ 下载pycrypto。
+下载后,按照README中的“Installation”小节的提示进行pycrypto安装。
+"""
+class FormatException(Exception):
+ pass
+
+def throw_exception(message, exception_class=FormatException):
+ """my define raise exception function"""
+ raise exception_class(message)
+
+class SHA1:
+ """计算企业微信的消息签名接口"""
+
+ def getSHA1(self, token, timestamp, nonce, encrypt):
+ """用SHA1算法生成安全签名
+ @param token: 票据
+ @param timestamp: 时间戳
+ @param encrypt: 密文
+ @param nonce: 随机字符串
+ @return: 安全签名
+ """
+ try:
+ # 确保所有输入都是字符串类型
+ if isinstance(encrypt, bytes):
+ encrypt = encrypt.decode('utf-8')
+
+ sortlist = [str(token), str(timestamp), str(nonce), str(encrypt)]
+ sortlist.sort()
+ sha = hashlib.sha1()
+ sha.update("".join(sortlist).encode('utf-8'))
+ return ierror.WXBizMsgCrypt_OK, sha.hexdigest()
+
+ except Exception as e:
+ print(e)
+ return ierror.WXBizMsgCrypt_ComputeSignature_Error, None
+
+
+class JsonParse:
+ """提供提取消息格式中的密文及生成回复消息格式的接口"""
+
+ # json消息模板
+ AES_TEXT_RESPONSE_TEMPLATE = '''{
+ "encrypt": "%(msg_encrypt)s",
+ "msgsignature": "%(msg_signaturet)s",
+ "timestamp": "%(timestamp)s",
+ "nonce": "%(nonce)s"
+ }'''
+
+ def extract(self, jsontext):
+ """提取出json数据包中的加密消息
+ @param jsontext: 待提取的json字符串
+ @return: 提取出的加密消息字符串
+ """
+ try:
+ json_dict = json.loads(jsontext)
+ return ierror.WXBizMsgCrypt_OK, json_dict['encrypt']
+ except Exception as e:
+ print(e)
+ return ierror.WXBizMsgCrypt_ParseJson_Error, None
+ def generate(self, encrypt, signature, timestamp, nonce):
+ """生成json消息
+ @param encrypt: 加密后的消息密文
+ @param signature: 安全签名
+ @param timestamp: 时间戳
+ @param nonce: 随机字符串
+ @return: 生成的json字符串
+ """
+ resp_dict = {
+ 'msg_encrypt' : encrypt,
+ 'msg_signaturet': signature,
+ 'timestamp' : timestamp,
+ 'nonce' : nonce,
+ }
+ resp_json = self.AES_TEXT_RESPONSE_TEMPLATE % resp_dict
+ return resp_json
+
+
+class PKCS7Encoder():
+ """提供基于PKCS7算法的加解密接口"""
+
+ block_size = 32
+ def encode(self, text):
+ """ 对需要加密的明文进行填充补位
+ @param text: 需要进行填充补位操作的明文(bytes类型)
+ @return: 补齐明文字符串(bytes类型)
+ """
+ text_length = len(text)
+ # 计算需要填充的位数
+ amount_to_pad = self.block_size - (text_length % self.block_size)
+ if amount_to_pad == 0:
+ amount_to_pad = self.block_size
+ # 获得补位所用的字符
+ pad = bytes([amount_to_pad])
+ # 确保text是bytes类型
+ if isinstance(text, str):
+ text = text.encode('utf-8')
+ return text + pad * amount_to_pad
+
+ def decode(self, decrypted):
+ """删除解密后明文的补位字符
+ @param decrypted: 解密后的明文
+ @return: 删除补位字符后的明文
+ """
+ pad = ord(decrypted[-1])
+ if pad<1 or pad >32:
+ pad = 0
+ return decrypted[:-pad]
+
+
+class Prpcrypt(object):
+ """提供接收和推送给企业微信消息的加解密接口"""
+
+ def __init__(self,key):
+
+ #self.key = base64.b64decode(key+"=")
+ self.key = key
+ # 设置加解密模式为AES的CBC模式
+ self.mode = AES.MODE_CBC
+
+
+ def encrypt(self, text, receiveid):
+ """对明文进行加密
+ @param text: 需要加密的明文
+ @return: 加密得到的字符串
+ """
+ # 16位随机字符串添加到明文开头
+ text = text.encode()
+ text = self.get_random_str() + struct.pack("I", socket.htonl(len(text))) + text + receiveid.encode()
+
+ # 使用自定义的填充方式对明文进行补位填充
+ pkcs7 = PKCS7Encoder()
+ text = pkcs7.encode(text)
+ # 加密
+ cryptor = AES.new(self.key, self.mode, self.key[:16])
+ try:
+ ciphertext = cryptor.encrypt(text)
+ # 使用BASE64对加密后的字符串进行编码
+ return ierror.WXBizMsgCrypt_OK, base64.b64encode(ciphertext)
+ except Exception as e:
+ logger = logging.getLogger()
+ logger.error(e)
+ return ierror.WXBizMsgCrypt_EncryptAES_Error, None
+
+ def decrypt(self,text,receiveid):
+ """对解密后的明文进行补位删除
+ @param text: 密文
+ @return: 删除填充补位后的明文
+ """
+ try:
+ cryptor = AES.new(self.key,self.mode,self.key[:16])
+ # 使用BASE64对密文进行解码,然后AES-CBC解密
+ plain_text = cryptor.decrypt(base64.b64decode(text))
+ except Exception as e:
+ print(e)
+ return ierror.WXBizMsgCrypt_DecryptAES_Error,None
+ try:
+ pad = plain_text[-1]
+ # 去掉补位字符串
+ #pkcs7 = PKCS7Encoder()
+ #plain_text = pkcs7.encode(plain_text)
+ # 去除16位随机字符串
+ content = plain_text[16:-pad]
+ json_len = socket.ntohl(struct.unpack("I",content[ : 4])[0])
+ json_content = content[4 : json_len+4].decode('utf-8')
+ from_receiveid = content[json_len+4:].decode('utf-8')
+ except Exception as e:
+ print(e)
+ return ierror.WXBizMsgCrypt_IllegalBuffer,None
+ if from_receiveid != receiveid:
+ print("receiveid not match", receiveid, from_receiveid)
+ return ierror.WXBizMsgCrypt_ValidateCorpid_Error,None
+ return 0,json_content
+
+ def get_random_str(self):
+ """ 随机生成16位字符串
+ @return: 16位字符串
+ """
+ return str(random.randint(1000000000000000, 9999999999999999)).encode()
+
+class WXBizJsonMsgCrypt(object):
+ #构造函数
+ def __init__(self,sToken,sEncodingAESKey,sReceiveId):
+ try:
+ self.key = base64.b64decode(sEncodingAESKey+"=")
+ assert len(self.key) == 32
+ except:
+ throw_exception("[error]: EncodingAESKey unvalid !", FormatException)
+ # return ierror.WXBizMsgCrypt_IllegalAesKey,None
+ self.m_sToken = sToken
+ self.m_sReceiveId = sReceiveId
+
+ #验证URL
+ #@param sMsgSignature: 签名串,对应URL参数的msg_signature
+ #@param sTimeStamp: 时间戳,对应URL参数的timestamp
+ #@param sNonce: 随机串,对应URL参数的nonce
+ #@param sEchoStr: 随机串,对应URL参数的echostr
+ #@param sReplyEchoStr: 解密之后的echostr,当return返回0时有效
+ #@return:成功0,失败返回对应的错误码
+
+ def VerifyURL(self, sMsgSignature, sTimeStamp, sNonce, sEchoStr):
+ sha1 = SHA1()
+ ret,signature = sha1.getSHA1(self.m_sToken, sTimeStamp, sNonce, sEchoStr)
+ if ret != 0:
+ return ret, None
+ if not signature == sMsgSignature:
+ return ierror.WXBizMsgCrypt_ValidateSignature_Error, None
+ pc = Prpcrypt(self.key)
+ ret,sReplyEchoStr = pc.decrypt(sEchoStr,self.m_sReceiveId)
+ return ret,sReplyEchoStr
+
+ def EncryptMsg(self, sReplyMsg, sNonce, timestamp = None):
+ #将企业回复用户的消息加密打包
+ #@param sReplyMsg: 企业号待回复用户的消息,json格式的字符串
+ #@param sTimeStamp: 时间戳,可以自己生成,也可以用URL参数的timestamp,如为None则自动用当前时间
+ #@param sNonce: 随机串,可以自己生成,也可以用URL参数的nonce
+ #sEncryptMsg: 加密后的可以直接回复用户的密文,包括msg_signature, timestamp, nonce, encrypt的json格式的字符串,
+ #return:成功0,sEncryptMsg,失败返回对应的错误码None
+ pc = Prpcrypt(self.key)
+ ret,encrypt = pc.encrypt(sReplyMsg, self.m_sReceiveId)
+ encrypt = encrypt.decode('utf-8')
+ if ret != 0:
+ return ret,None
+ if timestamp is None:
+ timestamp = str(int(time.time()))
+ # 生成安全签名
+ sha1 = SHA1()
+ ret,signature = sha1.getSHA1(self.m_sToken, timestamp, sNonce, encrypt)
+ if ret != 0:
+ return ret,None
+ jsonParse = JsonParse()
+ return ret,jsonParse.generate(encrypt, signature, timestamp, sNonce)
+
+ def DecryptMsg(self, sPostData, sMsgSignature, sTimeStamp, sNonce):
+ # 检验消息的真实性,并且获取解密后的明文
+ # @param sMsgSignature: 签名串,对应URL参数的msg_signature
+ # @param sTimeStamp: 时间戳,对应URL参数的timestamp
+ # @param sNonce: 随机串,对应URL参数的nonce
+ # @param sPostData: 密文,对应POST请求的数据
+ # json_content: 解密后的原文,当return返回0时有效
+ # @return: 成功0,失败返回对应的错误码
+ # 验证安全签名
+ jsonParse = JsonParse()
+ ret,encrypt = jsonParse.extract(sPostData)
+ if ret != 0:
+ return ret, None
+ sha1 = SHA1()
+ ret,signature = sha1.getSHA1(self.m_sToken, sTimeStamp, sNonce, encrypt)
+ if ret != 0:
+ return ret, None
+ if not signature == sMsgSignature:
+ print("signature not match")
+ print(signature)
+ return ierror.WXBizMsgCrypt_ValidateSignature_Error, None
+ pc = Prpcrypt(self.key)
+ ret,json_content = pc.decrypt(encrypt,self.m_sReceiveId)
+ return ret,json_content
+
+
diff --git a/callback_json_python3/ierror.py b/callback_json_python3/ierror.py
new file mode 100644
index 0000000..51c02c3
--- /dev/null
+++ b/callback_json_python3/ierror.py
@@ -0,0 +1,20 @@
+#!/usr/bin/env python
+# -*- coding: utf-8 -*-
+#########################################################################
+# Author: jonyqin
+# Created Time: Thu 11 Sep 2014 01:53:58 PM CST
+# File Name: ierror.py
+# Description:定义错误码含义
+#########################################################################
+WXBizMsgCrypt_OK = 0
+WXBizMsgCrypt_ValidateSignature_Error = -40001
+WXBizMsgCrypt_ParseJson_Error = -40002
+WXBizMsgCrypt_ComputeSignature_Error = -40003
+WXBizMsgCrypt_IllegalAesKey = -40004
+WXBizMsgCrypt_ValidateCorpid_Error = -40005
+WXBizMsgCrypt_EncryptAES_Error = -40006
+WXBizMsgCrypt_DecryptAES_Error = -40007
+WXBizMsgCrypt_IllegalBuffer = -40008
+WXBizMsgCrypt_EncodeBase64_Error = -40009
+WXBizMsgCrypt_DecodeBase64_Error = -40010
+WXBizMsgCrypt_GenReturnJson_Error = -40011
diff --git a/callback_python3/Readme.txt b/callback_python3/Readme.txt
new file mode 100644
index 0000000..7b8dd0c
--- /dev/null
+++ b/callback_python3/Readme.txt
@@ -0,0 +1,5 @@
+注意事项
+1.WXBizMsgCrypt.py文件封装了WXBizMsgCrypt接口类(Python3以及以上版本使用 WXBizMsgCrypt3.py),提供了用户接入企业微信的三个接口,Sample.py文件提供了如何使用这三个接口的示例,ierror.py提供了错误码。
+2.WXBizMsgCrypt封装了VerifyURL, DecryptMsg, EncryptMsg三个接口,分别用于开发者验证回调url,收到用户回复消息的解密以及开发者回复消息的加密过程。使用方法可以参考Sample.py文件。
+3.加解密协议请参考企业微信官方文档。
+4.本代码用到了pycrypto第三方库,请开发者自行安装此库再使用。
diff --git a/callback_python3/Sample.py b/callback_python3/Sample.py
new file mode 100644
index 0000000..7b76caf
--- /dev/null
+++ b/callback_python3/Sample.py
@@ -0,0 +1,123 @@
+#!/usr/bin/env python
+# -*- coding: utf-8 -*-
+#########################################################################
+# Author: jonyqin
+# Created Time: Thu 11 Sep 2014 03:55:41 PM CST
+# File Name: Sample.py
+# Description: WXBizJsonMsgCrypt 使用demo文件
+#########################################################################
+from WXBizJsonMsgCrypt import WXBizJsonMsgCrypt
+import sys
+import json
+
+if __name__ == "__main__":
+ # 企业在企业微信后台上设置的密钥相关配置在这里 TODO
+ sToken = "xxxxxxx"
+ sEncodingAESKey = "xxxxxxx"
+ sCorpID = "ww1436e0e65a779aee"
+ '''
+ ------------使用示例一:验证回调URL---------------
+ *企业开启回调模式时,企业号会向验证url发送一个get请求
+ 假设点击验证时,企业收到类似请求:
+ * GET /cgi-bin/wxpush?msg_signature=5c45ff5e21c57e6ad56bac8758b79b1d9ac89fd3×tamp=1409659589&nonce=263014780&echostr=P9nAzCzyDtyTWESHep1vC5X9xho%2FqYX3Zpb4yKa9SKld1DsH3Iyt3tP3zNdtp%2B4RPcs8TgAE7OaBO%2BFZXvnaqQ%3D%3D
+ * HTTP/1.1 Host: qy.weixin.qq.com
+
+ 接收到该请求时,企业应 1.解析出Get请求的参数,包括消息体签名(msg_signature),时间戳(timestamp),随机数字串(nonce)以及企业微信推送过来的随机加密字符串(echostr),
+ 这一步注意作URL解码。
+ 2.验证消息体签名的正确性
+ 3. 解密出echostr原文,将原文当作Get请求的response,返回给企业微信
+ 第2,3步可以用企业微信提供的库函数VerifyURL来实现。
+ '''
+ wxcpt=WXBizJsonMsgCrypt(sToken,sEncodingAESKey,sCorpID)
+ sVerifyMsgSig="012bc692d0a58dd4b10f8dfe5c4ac00ae211ebeb"
+ sVerifyTimeStamp="1476416373"
+ sVerifyNonce="47744683"
+ sVerifyEchoStr="fsi1xnbH4yQh0+PJxcOdhhK6TDXkjMyhEPA7xB2TGz6b+g7xyAbEkRxN/3cNXW9qdqjnoVzEtpbhnFyq6SVHyA=="
+ ret,sEchoStr=wxcpt.VerifyURL(sVerifyMsgSig, sVerifyTimeStamp,sVerifyNonce,sVerifyEchoStr)
+ if(ret!=0):
+ print("ERR: VerifyURL ret: " + str(ret))
+ sys.exit(1)
+ else:
+ print("done VerifyURL")
+ #验证URL成功,将sEchoStr返回给企业号
+
+ print("==============================")
+ '''
+ ------------使用示例二:对用户回复的消息解密---------------
+ 用户回复消息或者点击事件响应时,企业会收到回调消息,此消息是经过企业微信加密之后的密文以post形式发送给企业,密文格式请参考官方文档
+ 假设企业收到企业微信的回调消息如下:
+ POST /cgi-bin/wxpush? msg_signature=e3647471e395139e2308c1fa963f2d648a00b90e×tamp=1409659813&nonce=1372623149 HTTP/1.1
+ Host: qy.weixin.qq.com
+
+ {
+ "tousername": "wx5823bf96d3bd56c7",
+ "encrypt": "cjhLUX7UU4yCSelv1vz7T0zT8huF51bAMVWriNvO1FMegHrQZNrtvRxbwf0fUPsFvwqR0U0fgiJNEA5Y30F2MoI2S7vv3EjVQ68C0cjw9frBoUE2Hj0BvFp9h3u6Vbsg4lc1C8AtHdaN8orKuNKkLRLuYEL52R1J3v8olJGZRLnRdVKIivixmX/eQpzgeExtp20jI1HxRP1AAZ6xZoILdqDPO549LO4WeG+685JRUTdiwcY5fjZlqeMxuT4PpMn1X9OWsS7NRj06Wa5E3Tvg4twjWp39KPfOdRte6P1T4JU=",
+ "agentid": 218
+ }
+
+ 企业收到post请求之后应该 1.解析出url上的参数,包括消息体签名(msg_signature),时间戳(timestamp)以及随机数字串(nonce)
+ 2.验证消息体签名的正确性。 3.将post请求的数据进行json解析,并将"encrypt"标签的内容进行解密,解密出来的明文即是用户回复消息的明文,明文格式请参考官方文档
+ 第2,3步可以用企业微信提供的库函数DecryptMsg来实现。
+ '''
+
+ sReqNonce = "1372623149"
+ sReqTimeStamp = "1409659813"
+
+ sReqMsgSig = "e3647471e395139e2308c1fa963f2d648a00b90e"
+ sReqData = '{ "tousername": "wx5823bf96d3bd56c7", "encrypt": "cjhLUX7UU4yCSelv1vz7T0zT8huF51bAMVWriNvO1FMegHrQZNrtvRxbwf0fUPsFvwqR0U0fgiJNEA5Y30F2MoI2S7vv3EjVQ68C0cjw9frBoUE2Hj0BvFp9h3u6Vbsg4lc1C8AtHdaN8orKuNKkLRLuYEL52R1J3v8olJGZRLnRdVKIivixmX/eQpzgeExtp20jI1HxRP1AAZ6xZoILdqDPO549LO4WeG+685JRUTdiwcY5fjZlqeMxuT4PpMn1X9OWsS7NRj06Wa5E3Tvg4twjWp39KPfOdRte6P1T4JU=", "agentid": 218 }';
+ ret,sMsg=wxcpt.DecryptMsg( sReqData, sReqMsgSig, sReqTimeStamp, sReqNonce)
+ if( ret!=0 ):
+ print("ERR: DecryptMsg ret: " + str(ret))
+ sys.exit(1)
+ else:
+ print(sMsg)
+ # 解密成功,sMsg即为json格式的明文
+ # TODO: 对明文的处理
+ # ...
+ # ...
+
+ print("==============================")
+
+ '''
+ ------------使用示例三:企业回复用户消息的加密---------------
+ 企业被动回复用户的消息也需要进行加密,并且拼接成密文格式的json串。
+ 假设企业需要回复用户的明文如下:
+
+ {
+ "ToUserName": "mycreate",
+ "FromUserName":"wx5823bf96d3bd56c7",
+ "CreateTime": 1348831860,
+ "MsgType": "text",
+ "Content": "this is a test",
+ "MsgId": 1234567890123456,
+ "AgentID": 128
+ }
+
+ 为了将此段明文回复给用户,企业应: 1.自己生成时间时间戳(timestamp),随机数字串(nonce)以便生成消息体签名,也可以直接用从企业微信的post url上解析出的对应值。
+ 2.将明文加密得到密文。 3.用密文,步骤1生成的timestamp,nonce和企业在企业微信设定的token生成消息体签名。 4.将密文,消息体签名,时间戳,随机数字串拼接成json格式的字符串,发送给企业号。
+ 以上2,3,4步可以用企业微信提供的库函数EncryptMsg来实现。
+ '''
+ #sRespData = ' { "ToUserName": "mycreate", "FromUserName":"wx5823bf96d3bd56c7", "CreateTime": 1348831860, "MsgType": "text", "Content": "this is a test", "MsgId": 1234567890123456, "AgentID": 128 }';
+ sRespData = '{ "ToUserName": "wx5823bf96d3bd56c7", "FromUserName": :mycreate", "CreateTime": 1409659813, "MsgType": "text", "Content": "hello", "MsgId": 4561255354251345929, "AgentID": 218}'
+ ret,sEncryptMsg=wxcpt.EncryptMsg(sRespData, sReqNonce, sReqTimeStamp)
+ if( ret!=0 ):
+ print("ERR: EncryptMsg ret: " + str(ret))
+ sys.exit(1)
+ else:
+ print(sEncryptMsg)
+ #ret == 0 加密成功,企业需要将sEncryptMsg返回给企业号
+ print("==============================")
+
+ '''
+ 对上面加密的包进行解密
+ '''
+ sReqMsgSig = json.loads(sEncryptMsg)['msgsignature']
+ sReqTimeStamp = json.loads(sEncryptMsg)['timestamp']
+ sReqNonce = json.loads(sEncryptMsg)['nonce']
+
+ ret,sMsg=wxcpt.DecryptMsg( sEncryptMsg, sReqMsgSig, sReqTimeStamp, sReqNonce)
+ if( ret!=0 ):
+ print("ERR: DecryptMsg ret: " + str(ret))
+ sys.exit(1)
+ else:
+ print(sMsg)
diff --git a/callback_python3/WXBizMsgCrypt.py b/callback_python3/WXBizMsgCrypt.py
new file mode 100644
index 0000000..fb9508c
--- /dev/null
+++ b/callback_python3/WXBizMsgCrypt.py
@@ -0,0 +1,280 @@
+#!/usr/bin/env python
+# -*- encoding:utf-8 -*-
+
+""" 对企业微信发送给企业后台的消息加解密示例代码.
+@copyright: Copyright (c) 1998-2014 Tencent Inc.
+
+"""
+# ------------------------------------------------------------------------
+import logging
+import base64
+import random
+import hashlib
+import time
+import struct
+from Crypto.Cipher import AES
+import xml.etree.cElementTree as ET
+import socket
+
+import ierror
+
+
+"""
+关于Crypto.Cipher模块,ImportError: No module named 'Crypto'解决方案
+请到官方网站 https://www.dlitz.net/software/pycrypto/ 下载pycrypto。
+下载后,按照README中的“Installation”小节的提示进行pycrypto安装。
+"""
+
+
+class FormatException(Exception):
+ pass
+
+
+def throw_exception(message, exception_class=FormatException):
+ """my define raise exception function"""
+ raise exception_class(message)
+
+
+class SHA1:
+ """计算企业微信的消息签名接口"""
+
+ def getSHA1(self, token, timestamp, nonce, encrypt):
+ """用SHA1算法生成安全签名
+ @param token: 票据
+ @param timestamp: 时间戳
+ @param encrypt: 密文
+ @param nonce: 随机字符串
+ @return: 安全签名
+ """
+ try:
+ sortlist = [token, timestamp, nonce, encrypt]
+ sortlist.sort()
+ sha = hashlib.sha1()
+ sha.update("".join(sortlist).encode())
+ return ierror.WXBizMsgCrypt_OK, sha.hexdigest()
+ except Exception as e:
+ logger = logging.getLogger()
+ logger.error(e)
+ return ierror.WXBizMsgCrypt_ComputeSignature_Error, None
+
+
+class XMLParse:
+ """提供提取消息格式中的密文及生成回复消息格式的接口"""
+
+ # xml消息模板
+ AES_TEXT_RESPONSE_TEMPLATE = """
+
+
+%(timestamp)s
+
+"""
+
+ def extract(self, xmltext):
+ """提取出xml数据包中的加密消息
+ @param xmltext: 待提取的xml字符串
+ @return: 提取出的加密消息字符串
+ """
+ try:
+ xml_tree = ET.fromstring(xmltext)
+ encrypt = xml_tree.find("Encrypt")
+ return ierror.WXBizMsgCrypt_OK, encrypt.text
+ except Exception as e:
+ logger = logging.getLogger()
+ logger.error(e)
+ return ierror.WXBizMsgCrypt_ParseXml_Error, None
+
+ def generate(self, encrypt, signature, timestamp, nonce):
+ """生成xml消息
+ @param encrypt: 加密后的消息密文
+ @param signature: 安全签名
+ @param timestamp: 时间戳
+ @param nonce: 随机字符串
+ @return: 生成的xml字符串
+ """
+ resp_dict = {
+ 'msg_encrypt': encrypt,
+ 'msg_signaturet': signature,
+ 'timestamp': timestamp,
+ 'nonce': nonce,
+ }
+ resp_xml = self.AES_TEXT_RESPONSE_TEMPLATE % resp_dict
+ return resp_xml
+
+
+class PKCS7Encoder():
+ """提供基于PKCS7算法的加解密接口"""
+
+ block_size = 32
+
+ def encode(self, text):
+ """ 对需要加密的明文进行填充补位
+ @param text: 需要进行填充补位操作的明文
+ @return: 补齐明文字符串
+ """
+ text_length = len(text)
+ # 计算需要填充的位数
+ amount_to_pad = self.block_size - (text_length % self.block_size)
+ if amount_to_pad == 0:
+ amount_to_pad = self.block_size
+ # 获得补位所用的字符
+ pad = chr(amount_to_pad)
+ return text + (pad * amount_to_pad).encode()
+
+ def decode(self, decrypted):
+ """删除解密后明文的补位字符
+ @param decrypted: 解密后的明文
+ @return: 删除补位字符后的明文
+ """
+ pad = ord(decrypted[-1])
+ if pad < 1 or pad > 32:
+ pad = 0
+ return decrypted[:-pad]
+
+
+class Prpcrypt(object):
+ """提供接收和推送给企业微信消息的加解密接口"""
+
+ def __init__(self, key):
+
+ # self.key = base64.b64decode(key+"=")
+ self.key = key
+ # 设置加解密模式为AES的CBC模式
+ self.mode = AES.MODE_CBC
+
+ def encrypt(self, text, receiveid):
+ """对明文进行加密
+ @param text: 需要加密的明文
+ @return: 加密得到的字符串
+ """
+ # 16位随机字符串添加到明文开头
+ text = text.encode()
+ text = self.get_random_str() + struct.pack("I", socket.htonl(len(text))) + text + receiveid.encode()
+
+ # 使用自定义的填充方式对明文进行补位填充
+ pkcs7 = PKCS7Encoder()
+ text = pkcs7.encode(text)
+ # 加密
+ cryptor = AES.new(self.key, self.mode, self.key[:16])
+ try:
+ ciphertext = cryptor.encrypt(text)
+ # 使用BASE64对加密后的字符串进行编码
+ return ierror.WXBizMsgCrypt_OK, base64.b64encode(ciphertext)
+ except Exception as e:
+ logger = logging.getLogger()
+ logger.error(e)
+ return ierror.WXBizMsgCrypt_EncryptAES_Error, None
+
+ def decrypt(self, text, receiveid):
+ """对解密后的明文进行补位删除
+ @param text: 密文
+ @return: 删除填充补位后的明文
+ """
+ try:
+ cryptor = AES.new(self.key, self.mode, self.key[:16])
+ # 使用BASE64对密文进行解码,然后AES-CBC解密
+ plain_text = cryptor.decrypt(base64.b64decode(text))
+ except Exception as e:
+ logger = logging.getLogger()
+ logger.error(e)
+ return ierror.WXBizMsgCrypt_DecryptAES_Error, None
+ try:
+ pad = plain_text[-1]
+ # 去掉补位字符串
+ # pkcs7 = PKCS7Encoder()
+ # plain_text = pkcs7.encode(plain_text)
+ # 去除16位随机字符串
+ content = plain_text[16:-pad]
+ xml_len = socket.ntohl(struct.unpack("I", content[: 4])[0])
+ xml_content = content[4: xml_len + 4]
+ from_receiveid = content[xml_len + 4:]
+ except Exception as e:
+ logger = logging.getLogger()
+ logger.error(e)
+ return ierror.WXBizMsgCrypt_IllegalBuffer, None
+
+ if from_receiveid.decode('utf8') != receiveid:
+ return ierror.WXBizMsgCrypt_ValidateCorpid_Error, None
+ return 0, xml_content
+
+ def get_random_str(self):
+ """ 随机生成16位字符串
+ @return: 16位字符串
+ """
+ return str(random.randint(1000000000000000, 9999999999999999)).encode()
+
+
+class WXBizMsgCrypt(object):
+ # 构造函数
+ def __init__(self, sToken, sEncodingAESKey, sReceiveId):
+ try:
+ self.key = base64.b64decode(sEncodingAESKey + "=")
+ assert len(self.key) == 32
+ except:
+ throw_exception("[error]: EncodingAESKey unvalid !", FormatException)
+ # return ierror.WXBizMsgCrypt_IllegalAesKey,None
+ self.m_sToken = sToken
+ self.m_sReceiveId = sReceiveId
+
+ # 验证URL
+ # @param sMsgSignature: 签名串,对应URL参数的msg_signature
+ # @param sTimeStamp: 时间戳,对应URL参数的timestamp
+ # @param sNonce: 随机串,对应URL参数的nonce
+ # @param sEchoStr: 随机串,对应URL参数的echostr
+ # @param sReplyEchoStr: 解密之后的echostr,当return返回0时有效
+ # @return:成功0,失败返回对应的错误码
+
+ def VerifyURL(self, sMsgSignature, sTimeStamp, sNonce, sEchoStr):
+ sha1 = SHA1()
+ ret, signature = sha1.getSHA1(self.m_sToken, sTimeStamp, sNonce, sEchoStr)
+ if ret != 0:
+ return ret, None
+ if not signature == sMsgSignature:
+ return ierror.WXBizMsgCrypt_ValidateSignature_Error, None
+ pc = Prpcrypt(self.key)
+ ret, sReplyEchoStr = pc.decrypt(sEchoStr, self.m_sReceiveId)
+ return ret, sReplyEchoStr
+
+ def EncryptMsg(self, sReplyMsg, sNonce, timestamp=None):
+ # 将企业回复用户的消息加密打包
+ # @param sReplyMsg: 企业号待回复用户的消息,xml格式的字符串
+ # @param sTimeStamp: 时间戳,可以自己生成,也可以用URL参数的timestamp,如为None则自动用当前时间
+ # @param sNonce: 随机串,可以自己生成,也可以用URL参数的nonce
+ # sEncryptMsg: 加密后的可以直接回复用户的密文,包括msg_signature, timestamp, nonce, encrypt的xml格式的字符串,
+ # return:成功0,sEncryptMsg,失败返回对应的错误码None
+ pc = Prpcrypt(self.key)
+ ret, encrypt = pc.encrypt(sReplyMsg, self.m_sReceiveId)
+ encrypt = encrypt.decode('utf8')
+ if ret != 0:
+ return ret, None
+ if timestamp is None:
+ timestamp = str(int(time.time()))
+ # 生成安全签名
+ sha1 = SHA1()
+ ret, signature = sha1.getSHA1(self.m_sToken, timestamp, sNonce, encrypt)
+ if ret != 0:
+ return ret, None
+ xmlParse = XMLParse()
+ return ret, xmlParse.generate(encrypt, signature, timestamp, sNonce)
+
+ def DecryptMsg(self, sPostData, sMsgSignature, sTimeStamp, sNonce):
+ # 检验消息的真实性,并且获取解密后的明文
+ # @param sMsgSignature: 签名串,对应URL参数的msg_signature
+ # @param sTimeStamp: 时间戳,对应URL参数的timestamp
+ # @param sNonce: 随机串,对应URL参数的nonce
+ # @param sPostData: 密文,对应POST请求的数据
+ # xml_content: 解密后的原文,当return返回0时有效
+ # @return: 成功0,失败返回对应的错误码
+ # 验证安全签名
+ xmlParse = XMLParse()
+ ret, encrypt = xmlParse.extract(sPostData)
+ if ret != 0:
+ return ret, None
+ sha1 = SHA1()
+ ret, signature = sha1.getSHA1(self.m_sToken, sTimeStamp, sNonce, encrypt)
+ if ret != 0:
+ return ret, None
+ if not signature == sMsgSignature:
+ return ierror.WXBizMsgCrypt_ValidateSignature_Error, None
+ pc = Prpcrypt(self.key)
+ ret, xml_content = pc.decrypt(encrypt, self.m_sReceiveId)
+ return ret, xml_content
diff --git a/callback_python3/ierror.py b/callback_python3/ierror.py
new file mode 100644
index 0000000..6678fec
--- /dev/null
+++ b/callback_python3/ierror.py
@@ -0,0 +1,20 @@
+#!/usr/bin/env python
+# -*- coding: utf-8 -*-
+#########################################################################
+# Author: jonyqin
+# Created Time: Thu 11 Sep 2014 01:53:58 PM CST
+# File Name: ierror.py
+# Description:定义错误码含义
+#########################################################################
+WXBizMsgCrypt_OK = 0
+WXBizMsgCrypt_ValidateSignature_Error = -40001
+WXBizMsgCrypt_ParseXml_Error = -40002
+WXBizMsgCrypt_ComputeSignature_Error = -40003
+WXBizMsgCrypt_IllegalAesKey = -40004
+WXBizMsgCrypt_ValidateCorpid_Error = -40005
+WXBizMsgCrypt_EncryptAES_Error = -40006
+WXBizMsgCrypt_DecryptAES_Error = -40007
+WXBizMsgCrypt_IllegalBuffer = -40008
+WXBizMsgCrypt_EncodeBase64_Error = -40009
+WXBizMsgCrypt_DecodeBase64_Error = -40010
+WXBizMsgCrypt_GenReturnXml_Error = -40011