@toolspack/ttd-common 1.3.0 → 1.3.1

This diff represents the content of publicly available package versions that have been released to one of the supported registries. The information contained in this diff is provided for informational purposes only and reflects changes between package versions as they appear in their respective public registries.
@@ -6,9 +6,11 @@
6
6
  </div>
7
7
  </template>
8
8
  <script>
9
- import { getUrl } from '../utils'
9
+
10
+ import WzhMixin from './WzhMixin';
10
11
 
11
12
  export default {
13
+ mixins: [WzhMixin],
12
14
  name: 'wzh-sing',
13
15
  data() {
14
16
  let codebase = ''
@@ -30,20 +32,8 @@ export default {
30
32
  publicPath: 'https://wsp.totodi.com/jz/', // 为了获取public下的静态文件
31
33
  codebase,
32
34
  classid,
33
- sourceData: '', // 签名原文, 动态随机字符串
34
- certType: 'RSA', // 签名算法
35
- CryptoAgent: null,
36
35
  }
37
36
  },
38
- props: {
39
- api: {
40
- type: Object,
41
- required: true,
42
- },
43
- },
44
- mounted() {
45
- this.onLoad()
46
- },
47
37
  methods: {
48
38
  /**
49
39
  * 初始化验签工具包,加载 验签空间(object)
@@ -57,73 +47,6 @@ export default {
57
47
  alert('验签插件加载失败!')
58
48
  }
59
49
  },
60
-
61
- getUkeyImage() {
62
- let image = ''
63
- try {
64
- image = this.CryptoAgent.GetSealImage('CFCA_UKEY_P11.dll')
65
- // console.log('CFCA_UKEY_P11', image)
66
- } catch (e) {
67
- console.log('CFCA_UKEY_P11 error', e)
68
- }
69
- if (!image) {
70
- try {
71
- image = this.CryptoAgent.GetSealImage('UyeePKCS11.Enterprise.dll')
72
- // console.log('UyeePKCS11', image)
73
- } catch (e) {
74
- console.log('UyeePKCS11 error', e)
75
- }
76
- }
77
- if (!image) {
78
- try {
79
- image = this.CryptoAgent.GetSealImage('UlanPKCS11.Enterprise.dll')
80
- // console.log('UlanPKCS11.Enterprise', image)
81
- } catch (e) {
82
- console.log('UlanPKCS11.Enterprise error', e)
83
- }
84
- }
85
- if (!image) {
86
- try {
87
- image = this.CryptoAgent.GetSealImage('UlanPKCS11.dll')
88
- // console.log('UlanPKCS11', image)
89
- } catch (e) {
90
- console.log('error', e)
91
- }
92
- }
93
- if (!image) {
94
- alert('读取Ukey印章图片失败!')
95
- }
96
- return image
97
- },
98
- // 消息签名, 生成Base64 编码的 PKCS#7 签名结果
99
- SignOnClick() {
100
- this.sourceData = `${new Date().getTime()}`
101
- try {
102
- const source = this.sourceData
103
- let signature = ''
104
- const signType = 'Attach' // 签名类型
105
- const selectedAlg = 'SHA-1' // 哈希算法(仅对RSA算法有效,SM2默认使用SM3哈希算法):
106
-
107
- if (signType === 'Attach') {
108
- // PKCS#7 Attach
109
- signature = this.CryptoAgent.SignMsgPKCS7(source, selectedAlg, true)
110
- } else if (signType === 'Detach') {
111
- // PKCS#7 Detach
112
- signature = this.CryptoAgent.SignMsgPKCS7(source, selectedAlg, false)
113
- } else {
114
- // PKCS#1
115
- signature = this.CryptoAgent.SignMsgPKCS1(source, selectedAlg)
116
- }
117
- if (!signature) {
118
- this.ShowErrorInfo()
119
- return ''
120
- }
121
- return signature
122
- } catch (e) {
123
- this.ShowErrorInfo()
124
- return ''
125
- }
126
- },
127
50
  GetCertInfoOnClick(InfoTypeID) {
128
51
  InfoTypeID = InfoTypeID || 'SubjectDN'
129
52
  try {
@@ -139,6 +62,7 @@ export default {
139
62
  return false
140
63
  }
141
64
  },
65
+
142
66
  SelectCertificateOnClick(serialNo = '') {
143
67
  try {
144
68
  const subjectDNFilter = '';
@@ -158,42 +82,7 @@ export default {
158
82
  return false
159
83
  }
160
84
  },
161
- getHashValue(label, fileOss, params) {
162
- const CertContent = this.CryptoAgent.GetSignCertInfo('CertContent');
163
- this.$emit('getImg', params)
164
- if (!CertContent) {
165
- alert('获取证书公钥失败!')
166
- return Promise.reject()
167
- }
168
- if (fileOss.bucketName && fileOss.objectKey) {
169
- return this.api.getSignHash({
170
- jsonData: {
171
- source: 'TTDFUND',
172
- timestamp: new Date().getTime(),
173
- msgBody: {
174
- // 合同地址, 相对路径--合同文件全路径。网络地址:http://xxxxxx.pdf;阿里云地址:oss:bucketxx:key
175
- attachfile: `oss:${fileOss.bucketName}:${fileOss.objectKey}`,
176
- reason: '', // 签署原因
177
- location: '', // 签署地点
178
- signImgfileName: '', // 图片名称
179
- signImgfile: params.image, // 图片路径,格式同文件字段类似
180
- signImgMd5: params.md5, // 印章图片的md5
181
- sealId: params.sealId, // 印章图片的id
182
- serialNo: params.serialNo, // 证书序列号
183
- ukeyType: params.ukeyType, // 证书类型(ttd配置)
184
- userId: params.userId, // 用户id
185
- pageNo: label.pageIndex, // 签章页
186
- pageX: Number(label.X), // 签章页签章位置X坐标
187
- pageY: Number(label.Y), // 签章页签章位置Y坐标
188
- certBase64: CertContent, // 证书公钥
189
- sealImageSize: params.sealImageSize, // 签章图片大小
190
- },
191
- },
192
- })
193
- }
194
- alert('文件对象不合规!')
195
- return Promise.reject()
196
- },
85
+
197
86
  async getSignHashValue(item, fileItem, params) {
198
87
  let sourceHashData = ''
199
88
  const { code, data, msg } = await this.getHashValue(item, fileItem, params);
@@ -221,73 +110,7 @@ export default {
221
110
  alert('获取PKCS#7分离式签名失败!')
222
111
  return false
223
112
  },
224
- async signFileKeyImage(item, fileItem, params) {
225
- const res = await this.getSignHashValue(item, fileItem, params)
226
- let errorMsg = '计算Hash 失败!'
227
- if (res) {
228
- const { data, code, msg } = await this.api.mergeHash({
229
- jsonData: {
230
- source: 'TTDFUND',
231
- timestamp: new Date().getTime(),
232
- msgBody: {
233
- sigString: res.signature, // 签名后的hash值
234
- id: res.id, // 计算接口返回的ID
235
- },
236
- },
237
- })
238
- // 此方法 code 不能完全说明正确,调用失败code 也是0
239
- if (code === 0) {
240
- if (data.bean.url) {
241
- return data.bean
242
- }
243
- errorMsg = data.bean.msg
244
- } else {
245
- errorMsg = data.msg || msg
246
- }
247
- }
248
- this.$message.error(errorMsg || 'error计算Hash失败!')
249
- return false
250
- },
251
- // fileOss: 为文件对象 {obje}
252
- // isOffset: 修正印章的位置,印章加时间后需要向下修正
253
- // parama: 其他参数:ukeyType, image, md5, isOffset
254
- async multipleSign(labels, fileOss, params) {
255
- let result = ''
256
- const localParams = { ...params }
257
- const { isOffset = 18 } = localParams
258
- if (!localParams.image) {
259
- alert('印章图片缺失!')
260
- return false
261
- }
262
113
 
263
- for (let index = 0; index < labels.length; index++) {
264
- const item = getUrl(labels[index])
265
- // 此处for循环多个文件时候以前签署,所以提示无意义
266
- // const message = `签署 [${text}] 位于第${label.pageIndex}页的位置,[总共:${index + 1}/${labels.length}个位置]`
267
- if (typeof isOffset === 'number') {
268
- // 印章统一向下偏移
269
- item.Y -= isOffset
270
- }
271
- if (index > 0) {
272
- const serialNoAgain = this.CryptoAgent.GetSignCertInfo('SerialNumber');
273
- if (localParams.serialNo !== serialNoAgain) {
274
- alert('签署过程中,请不要更换ukey!')
275
- return false
276
- }
277
- // 这里签署第二个章,需要在第一个签好的文件上签署 所以用result中是文件
278
- if (result) {
279
- // eslint-disable-next-line
280
- result = await this.signFileKeyImage((item), result, {...localParams})
281
- }
282
- console.log(`iterateSign 签章结果${index}---result----`, result)
283
- } else {
284
- // eslint-disable-next-line
285
- result = await this.signFileKeyImage((item), fileOss, {...localParams})
286
- console.log('第一个章 签章结果', result)
287
- }
288
- }
289
- return result
290
- },
291
114
  ShowErrorInfo(response = '') {
292
115
  if (!this.CryptoAgent) {
293
116
  alert('不支持该功能!');
@@ -3,28 +3,11 @@
3
3
  <div class="CryptoAgent-wrapper"></div>
4
4
  </template>
5
5
  <script>
6
- import { getUrl } from '../utils'
7
-
6
+ import WzhMixin from './WzhMixin';
8
7
  import WZHforChrome from './WZHforChrome'
9
8
 
10
9
  export default {
11
- mixins: [WZHforChrome],
12
- data() {
13
- return {
14
- sourceData: '', // 签名原文, 动态随机字符串
15
- certType: 'RSA', // 签名算法
16
- CryptoAgent: null,
17
- }
18
- },
19
- props: {
20
- api: {
21
- type: Object,
22
- required: true,
23
- },
24
- },
25
- mounted() {
26
- this.onLoad()
27
- },
10
+ mixins: [WzhMixin, WZHforChrome],
28
11
  methods: {
29
12
  /**
30
13
  * 初始化验签工具包,加载 验签空间(object)
@@ -35,36 +18,6 @@ export default {
35
18
  }
36
19
  this.LoadObj()
37
20
  },
38
-
39
- async getUkeyImage(bstrP11Name) {
40
- // 为了兼容 (新老ukey),获取证书的CSPName
41
- // 老版本ukey CSPName: CFCA FOR UKEY CSP v1.1.0
42
- // 新版本ukey CSPName: Uyee CSP v6.0 (Enterprise)
43
- if (!bstrP11Name) {
44
- let InfoContent = ''
45
- await this.SelectCertificateOnClick()
46
- try {
47
- InfoContent = await this.GetCertInfoOnClick('CSPName');
48
- } catch (e) {
49
- console.log(e)
50
- }
51
- if (InfoContent.indexOf('CFCA FOR UKEY CSP') > -1) {
52
- bstrP11Name = 'CFCA_UKEY_P11.dll'
53
- } else {
54
- bstrP11Name = 'UyeePKCS11.Enterprise.dll'
55
- }
56
- }
57
- return new Promise((resolve, reject) => {
58
- // 老ukey 获取图片 'CFCA_UKEY_P11.dll'
59
- // 新ukey 获取图片 'UyeePKCS11.Enterprise.dll'
60
- this.CryptoAgent.GetSealImage(bstrP11Name).then((response) => {
61
- resolve(response.result)
62
- }).catch((response1) => {
63
- this.ShowErrorInfo(response1);
64
- reject(response1)
65
- });
66
- })
67
- },
68
21
  GetCertInfoOnClick(InfoTypeID) {
69
22
  InfoTypeID = InfoTypeID || 'SubjectDN'
70
23
  return this.CryptoAgent.GetSignCertInfo(InfoTypeID).then((response) => response.result).catch((e) => {
@@ -72,26 +25,6 @@ export default {
72
25
  })
73
26
  },
74
27
 
75
- async SignOnClick() {
76
- this.sourceData = `${new Date().getTime()}`
77
- const source = this.sourceData
78
- let signature = ''
79
- const signType = 'Attach' // 签名类型
80
- const selectedAlg = 'SHA-1' // 哈希算法(仅对RSA算法有效,SM2默认使用SM3哈希算法):
81
-
82
- if (signType === 'Attach') {
83
- // PKCS#7 Attach
84
- signature = await this.CryptoAgent.SignMsgPKCS7(source, selectedAlg, true)
85
- } else if (signType === 'Detach') {
86
- // PKCS#7 Detach
87
- signature = await this.CryptoAgent.SignMsgPKCS7(source, selectedAlg, false)
88
- } else {
89
- // PKCS#1
90
- signature = await this.CryptoAgent.SignMsgPKCS1(source, selectedAlg)
91
- }
92
- console.log('SignOnClick 签名结果:', signature)
93
- return signature.result
94
- },
95
28
  async SelectCertificateOnClick(serialNumFilter = '') {
96
29
  const subjectDNFilter = '';
97
30
  const issuerDNFilter = 'CFCA ACS ';// CFCA ACS OCA31 ,CFCA ACS OCA32, CFCA ACS TEST OCA31
@@ -101,7 +34,7 @@ export default {
101
34
  if (!serialNumFilter) {
102
35
  try {
103
36
  const version = await this.CryptoAgent.GetVersion()
104
- console.log('CryptoAgent version ', version)
37
+ // console.log('CryptoAgent version ', version)
105
38
  } catch (response) {
106
39
  alert('扩展初始化失败,请联系管理员!')
107
40
  this.ShowErrorInfo(response);
@@ -120,42 +53,7 @@ export default {
120
53
  })
121
54
  // 返回值resSelect 在chrome下是 对象,在ie下返回是 true/false
122
55
  },
123
- async getHashValue(label, fileOss, params) {
124
- const CertContent = await this.GetCertInfoOnClick('CertContent');
125
- this.$emit('getImg', params)
126
- if (!CertContent) {
127
- alert('获取证书公钥失败!')
128
- return Promise.reject()
129
- }
130
- if (fileOss.bucketName && fileOss.objectKey) {
131
- return this.api.getSignHash({
132
- jsonData: {
133
- source: 'TTDFUND',
134
- timestamp: new Date().getTime(),
135
- msgBody: {
136
- // 合同地址, 相对路径--合同文件全路径。网络地址:http://xxxxxx.pdf;阿里云地址:oss:bucketxx:key
137
- attachfile: `oss:${fileOss.bucketName}:${fileOss.objectKey}`,
138
- reason: '', // 签署原因
139
- location: '', // 签署地点
140
- signImgfileName: '', // 图片名称
141
- signImgfile: params.image, // 图片路径,格式同文件字段类似
142
- signImgMd5: params.md5, // 印章图片的md5
143
- sealId: params.sealId, // 印章图片的id
144
- serialNo: params.serialNo, // 证书序列号
145
- ukeyType: params.ukeyType, // 证书类型(ttd配置)
146
- userId: params.userId, // 用户id
147
- pageNo: label.pageIndex, // 签章页
148
- pageX: Number(label.X), // 签章页签章位置X坐标
149
- pageY: Number(label.Y), // 签章页签章位置Y坐标
150
- certBase64: CertContent, // 证书公钥
151
- sealImageSize: params.sealImageSize, // 签章图片大小
152
- },
153
- },
154
- })
155
- }
156
- alert('文件对象不合规!')
157
- return Promise.reject()
158
- },
56
+
159
57
  async getSignHashValue(item, fileItem, params) {
160
58
  let sourceHashData = ''
161
59
  const { code, data } = await this.getHashValue(item, fileItem, params);
@@ -176,76 +74,13 @@ export default {
176
74
  this.ShowErrorInfo(response);
177
75
  });
178
76
  },
179
- async signFileKeyImage(item, fileItem, params) {
180
- const res = await this.getSignHashValue(item, fileItem, params)
181
- let errorMsg = '计算Hash失败!'
182
- if (res) {
183
- const { data, code } = await this.api.mergeHash({
184
- jsonData: {
185
- source: 'TTDFUND',
186
- timestamp: new Date().getTime(),
187
- msgBody: {
188
- sigString: res.signature, // 签名后的hash值
189
- id: res.id, // 计算接口返回的ID
190
- },
191
- },
192
- })
193
- // 此方法 code 不能完全说明正确,调用失败code 也是0
194
- if (code === 0) {
195
- if (data.bean.url) {
196
- return data.bean
197
- }
198
- errorMsg = data.bean.msg
199
- } else {
200
- errorMsg = data.msg
201
- }
202
- console.error(errorMsg)
203
- }
204
- this.$message.error(errorMsg || 'error计算Hash失败!')
205
- return false
206
- },
207
- // fileOss: 为文件对象 {obje}
208
- // isOffset: 修正印章的位置,印章加时间后需要向下修正
209
- // parama: 其他参数:ukeyType, image, md5, isOffset
210
- async multipleSign(labels, fileOss, params) {
211
- let result = ''
212
- const localParams = { ...params }
213
- const { isOffset = 18 } = localParams
214
- if (!localParams.image) {
215
- alert('印章图片缺失!')
216
- return false
217
- }
218
- console.log('multipleSign-params= ', localParams)
219
- for (let index = 0; index < labels.length; index++) {
220
- const item = getUrl(labels[index])
221
- // 此处for循环多个文件时候以前签署,所以提示无意义
222
- // const message = `签署 [${text}] 位于第${label.pageIndex}页的位置,[总共:${index + 1}/${labels.length}个位置]`
223
- if (typeof isOffset === 'number') {
224
- // 印章统一向下偏移
225
- item.Y -= isOffset
226
- }
227
- if (index > 0) {
228
- const serialNoAgain = await this.GetCertInfoOnClick('SerialNumber');
229
- if (localParams.serialNo !== serialNoAgain) {
230
- console.log(`params.serialNo:${ localParams.serialNo}`, `serialNoAgain${ serialNoAgain}`)
231
- alert('签署过程中,请不要更换ukey!')
232
- return false
233
- }
234
- // 这里签署第二个章,需要在第一个签好的文件上签署 所以用result中是文件
235
- if (result) {
236
- // eslint-disable-next-line
237
- result = await this.signFileKeyImage((item), result, {...localParams})
238
- }
239
- console.log(`iterateSign 签章结果${index}---result----`, result)
240
- } else {
241
- // eslint-disable-next-line
242
- result = await this.signFileKeyImage((item), fileOss, {...localParams})
243
- console.log('第一个章 签章结果', result)
244
- }
245
- }
246
- console.log('multipleSign 签章的结果', result)
247
- return result
248
- },
77
+ },
78
+ beforeDestroy() {
79
+ try {
80
+ this.CryptoAgent.uninit().then(() => { });
81
+ } catch (e) {
82
+ alert(e);
83
+ }
249
84
  },
250
85
  }
251
86