1
0
Fork 0
mirror of https://github.com/postmannen/ctrl.git synced 2024-12-14 12:37:31 +00:00
ctrl/node_auth.go

394 lines
9.6 KiB
Go
Raw Normal View History

package steward
2022-02-07 03:23:13 +00:00
import (
"crypto/ed25519"
"encoding/base64"
2022-04-21 11:21:36 +00:00
"encoding/json"
2022-02-07 03:23:13 +00:00
"fmt"
2022-04-21 11:21:36 +00:00
"io"
2022-02-07 03:23:13 +00:00
"io/ioutil"
"log"
"os"
"path/filepath"
"strings"
2022-02-07 03:23:13 +00:00
"sync"
)
2022-05-24 11:45:41 +00:00
// nodeAuth is the structure that holds both keys and acl's
// that the running steward node shall use for authorization.
//It holds a mutex to use when interacting with the map.
2022-04-21 11:21:36 +00:00
type nodeAuth struct {
2022-05-24 11:45:41 +00:00
// ACL that defines where a node is allowed to recieve from.
nodeAcl *nodeAcl
// All the public keys for nodes a node is allowed to receive from.
publicKeys *publicKeys
2022-02-07 03:23:13 +00:00
// Full path to the signing keys folder
SignKeyFolder string
// Full path to private signing key.
SignKeyPrivateKeyPath string
// Full path to public signing key.
SignKeyPublicKeyPath string
// private key for ed25519 signing.
SignPrivateKey []byte
// public key for ed25519 signing.
SignPublicKey []byte
configuration *Configuration
errorKernel *errorKernel
}
2022-04-21 11:21:36 +00:00
func newNodeAuth(configuration *Configuration, errorKernel *errorKernel) *nodeAuth {
n := nodeAuth{
2022-05-24 11:45:41 +00:00
nodeAcl: newNodeAcl(configuration),
publicKeys: newPublicKeys(configuration),
configuration: configuration,
errorKernel: errorKernel,
2022-02-07 03:23:13 +00:00
}
// Set the signing key paths.
2022-04-21 11:21:36 +00:00
n.SignKeyFolder = filepath.Join(configuration.ConfigFolder, "signing")
n.SignKeyPrivateKeyPath = filepath.Join(n.SignKeyFolder, "private.key")
n.SignKeyPublicKeyPath = filepath.Join(n.SignKeyFolder, "public.key")
2022-02-07 03:23:13 +00:00
2022-04-21 11:21:36 +00:00
err := n.loadSigningKeys()
2022-02-07 03:23:13 +00:00
if err != nil {
log.Printf("%v\n", err)
os.Exit(1)
}
2022-04-21 11:21:36 +00:00
return &n
}
2022-02-07 03:23:13 +00:00
2022-05-24 11:45:41 +00:00
// --------------------- ACL ---------------------
type aclAndHash struct {
Acl map[Node]map[command]struct{}
Hash [32]byte
}
func newAclAndHash() aclAndHash {
a := aclAndHash{
Acl: make(map[Node]map[command]struct{}),
}
return a
}
type nodeAcl struct {
// allowed is a map for holding all the allowed signatures.
2022-05-24 11:45:41 +00:00
aclAndHash aclAndHash
filePath string
mu sync.Mutex
}
func newNodeAcl(c *Configuration) *nodeAcl {
n := nodeAcl{
aclAndHash: newAclAndHash(),
filePath: filepath.Join(c.DatabaseFolder, "acl.txt"),
}
return &n
}
// loadFromFile will try to load all the currently stored acl's from file,
// and return the error if it fails.
// If no file is found a nil error is returned.
func (n *nodeAcl) loadFromFile() error {
if _, err := os.Stat(n.filePath); os.IsNotExist(err) {
// Just logging the error since it is not crucial that a key file is missing,
// since a new one will be created on the next update.
log.Printf("no acl file found at %v\n", n.filePath)
return nil
}
fh, err := os.OpenFile(n.filePath, os.O_RDONLY, 0600)
if err != nil {
return fmt.Errorf("error: failed to open acl file: %v", err)
}
defer fh.Close()
b, err := io.ReadAll(fh)
if err != nil {
return err
}
n.mu.Lock()
defer n.mu.Unlock()
err = json.Unmarshal(b, &n.aclAndHash)
if err != nil {
return err
}
fmt.Printf("\n ***** DEBUG: Loaded existing acl's from file: %v\n\n", n.aclAndHash.Hash)
return nil
}
2022-05-24 11:45:41 +00:00
// saveToFile will save the acl to file for persistent storage.
// An error is returned if it fails.
func (n *nodeAcl) saveToFile() error {
fh, err := os.OpenFile(n.filePath, os.O_RDWR|os.O_CREATE|os.O_TRUNC, 0600)
if err != nil {
return fmt.Errorf("error: failed to acl file: %v", err)
}
defer fh.Close()
n.mu.Lock()
defer n.mu.Unlock()
b, err := json.Marshal(n.aclAndHash)
if err != nil {
return err
}
2022-05-24 11:45:41 +00:00
_, err = fh.Write(b)
if err != nil {
return err
}
return nil
}
2022-05-24 11:45:41 +00:00
// --------------------- KEYS ---------------------
2022-05-16 05:15:38 +00:00
type keysAndHash struct {
Keys map[Node][]byte
Hash [32]byte
}
func newKeysAndHash() *keysAndHash {
kh := keysAndHash{
Keys: make(map[Node][]byte),
}
return &kh
}
type publicKeys struct {
2022-05-16 05:15:38 +00:00
keysAndHash *keysAndHash
mu sync.Mutex
filePath string
}
2022-04-21 11:21:36 +00:00
func newPublicKeys(c *Configuration) *publicKeys {
p := publicKeys{
2022-05-16 05:15:38 +00:00
keysAndHash: newKeysAndHash(),
filePath: filepath.Join(c.DatabaseFolder, "publickeys.txt"),
2022-04-21 11:21:36 +00:00
}
err := p.loadFromFile()
if err != nil {
log.Printf("error: loading public keys from file: %v\n", err)
// os.Exit(1)
}
return &p
}
2022-04-21 11:21:36 +00:00
// loadFromFile will try to load all the currently stored public keys from file,
// and return the error if it fails.
// If no file is found a nil error is returned.
func (p *publicKeys) loadFromFile() error {
if _, err := os.Stat(p.filePath); os.IsNotExist(err) {
// Just logging the error since it is not crucial that a key file is missing,
// since a new one will be created on the next update.
log.Printf("no public keys file found at %v\n", p.filePath)
return nil
}
fh, err := os.OpenFile(p.filePath, os.O_RDONLY, 0600)
if err != nil {
return fmt.Errorf("error: failed to open public keys file: %v", err)
}
defer fh.Close()
b, err := io.ReadAll(fh)
if err != nil {
return err
}
p.mu.Lock()
defer p.mu.Unlock()
2022-05-16 05:15:38 +00:00
err = json.Unmarshal(b, &p.keysAndHash)
2022-04-21 11:21:36 +00:00
if err != nil {
return err
}
2022-05-16 05:15:38 +00:00
fmt.Printf("\n ***** DEBUG: Loaded existing keys from file: %v\n\n", p.keysAndHash.Hash)
2022-04-21 11:21:36 +00:00
return nil
}
// saveToFile will save all the public kets to file for persistent storage.
// An error is returned if it fails.
func (p *publicKeys) saveToFile() error {
fh, err := os.OpenFile(p.filePath, os.O_RDWR|os.O_CREATE|os.O_TRUNC, 0600)
if err != nil {
return fmt.Errorf("error: failed to open public keys file: %v", err)
}
defer fh.Close()
p.mu.Lock()
defer p.mu.Unlock()
2022-05-16 05:15:38 +00:00
b, err := json.Marshal(p.keysAndHash)
2022-04-21 11:21:36 +00:00
if err != nil {
return err
}
_, err = fh.Write(b)
if err != nil {
return err
}
return nil
}
2022-02-07 03:23:13 +00:00
// loadSigningKeys will try to load the ed25519 signing keys. If the
// files are not found new keys will be generated and written to disk.
2022-04-21 11:21:36 +00:00
func (n *nodeAuth) loadSigningKeys() error {
2022-02-07 03:23:13 +00:00
// Check if folder structure exist, if not create it.
2022-04-21 11:21:36 +00:00
if _, err := os.Stat(n.SignKeyFolder); os.IsNotExist(err) {
err := os.MkdirAll(n.SignKeyFolder, 0700)
2022-02-07 03:23:13 +00:00
if err != nil {
er := fmt.Errorf("error: failed to create directory for signing keys : %v", err)
return er
}
}
// Check if there already are any keys in the etc folder.
foundKey := false
2022-04-21 11:21:36 +00:00
if _, err := os.Stat(n.SignKeyPublicKeyPath); !os.IsNotExist(err) {
2022-02-07 03:23:13 +00:00
foundKey = true
}
2022-04-21 11:21:36 +00:00
if _, err := os.Stat(n.SignKeyPrivateKeyPath); !os.IsNotExist(err) {
2022-02-07 03:23:13 +00:00
foundKey = true
}
// If no keys where found generete a new pair, load them into the
// processes struct fields, and write them to disk.
if !foundKey {
pub, priv, err := ed25519.GenerateKey(nil)
if err != nil {
er := fmt.Errorf("error: failed to generate ed25519 keys for signing: %v", err)
return er
}
pubB64string := base64.RawStdEncoding.EncodeToString(pub)
privB64string := base64.RawStdEncoding.EncodeToString(priv)
// Write public key to file.
2022-04-21 11:21:36 +00:00
err = n.writeSigningKey(n.SignKeyPublicKeyPath, pubB64string)
2022-02-07 03:23:13 +00:00
if err != nil {
return err
}
// Write private key to file.
2022-04-21 11:21:36 +00:00
err = n.writeSigningKey(n.SignKeyPrivateKeyPath, privB64string)
2022-02-07 03:23:13 +00:00
if err != nil {
return err
}
// Also store the keys in the processes structure so we can
// reference them from there when we need them.
2022-04-21 11:21:36 +00:00
n.SignPublicKey = pub
n.SignPrivateKey = priv
2022-02-07 03:23:13 +00:00
er := fmt.Errorf("info: no signing keys found, generating new keys")
log.Printf("%v\n", er)
// We got the new generated keys now, so we can return.
return nil
}
// Key files found, load them into the processes struct fields.
2022-04-21 11:21:36 +00:00
pubKey, _, err := n.readKeyFile(n.SignKeyPublicKeyPath)
2022-02-07 03:23:13 +00:00
if err != nil {
return err
}
2022-04-21 11:21:36 +00:00
n.SignPublicKey = pubKey
2022-02-07 03:23:13 +00:00
2022-04-21 11:21:36 +00:00
privKey, _, err := n.readKeyFile(n.SignKeyPrivateKeyPath)
2022-02-07 03:23:13 +00:00
if err != nil {
return err
}
2022-04-21 11:21:36 +00:00
n.SignPublicKey = pubKey
n.SignPrivateKey = privKey
2022-02-07 03:23:13 +00:00
return nil
}
// writeSigningKey will write the base64 encoded signing key to file.
2022-04-21 11:21:36 +00:00
func (n *nodeAuth) writeSigningKey(realPath string, keyB64 string) error {
2022-02-07 03:23:13 +00:00
fh, err := os.OpenFile(realPath, os.O_RDWR|os.O_CREATE|os.O_TRUNC, 0600)
if err != nil {
er := fmt.Errorf("error: failed to open key file for writing: %v", err)
return er
}
defer fh.Close()
_, err = fh.Write([]byte(keyB64))
if err != nil {
er := fmt.Errorf("error: failed to write key to file: %v", err)
return er
}
return nil
}
// readKeyFile will take the path of a key file as input, read the base64
// encoded data, decode the data. It will return the raw data as []byte,
// the base64 encoded data, and any eventual error.
2022-04-21 11:21:36 +00:00
func (n *nodeAuth) readKeyFile(keyFile string) (ed2519key []byte, b64Key []byte, err error) {
2022-02-07 03:23:13 +00:00
fh, err := os.Open(keyFile)
if err != nil {
er := fmt.Errorf("error: failed to open key file: %v", err)
return nil, nil, er
}
defer fh.Close()
b, err := ioutil.ReadAll(fh)
if err != nil {
er := fmt.Errorf("error: failed to read key file: %v", err)
return nil, nil, er
}
key, err := base64.RawStdEncoding.DecodeString(string(b))
if err != nil {
er := fmt.Errorf("error: failed to base64 decode key data: %v", err)
return nil, nil, er
}
return key, b, nil
}
// verifySignature
2022-04-21 11:21:36 +00:00
func (n *nodeAuth) verifySignature(m Message) bool {
2022-02-11 08:04:14 +00:00
// fmt.Printf(" * DEBUG: verifySignature, method: %v\n", m.Method)
2022-04-21 11:21:36 +00:00
if !n.configuration.EnableSignatureCheck {
2022-02-11 08:04:14 +00:00
// fmt.Printf(" * DEBUG: verifySignature: AllowEmptySignature set to TRUE\n")
2022-02-07 03:23:13 +00:00
return true
}
// TODO: Only enable signature checking for REQCliCommand for now.
if m.Method != REQCliCommand {
2022-02-11 08:04:14 +00:00
// fmt.Printf(" * DEBUG: verifySignature: WAS OTHER THAN CLI COMMAND\n")
return true
}
2022-02-07 03:23:13 +00:00
// Verify if the signature matches.
argsStringified := argsToString(m.MethodArgs)
2022-04-21 11:21:36 +00:00
ok := ed25519.Verify(n.SignPublicKey, []byte(argsStringified), m.ArgSignature)
2022-02-07 03:23:13 +00:00
2022-02-11 08:04:14 +00:00
// fmt.Printf(" * DEBUG: verifySignature, result: %v, fromNode: %v, method: %v\n", ok, m.FromNode, m.Method)
2022-02-07 03:23:13 +00:00
return ok
}
// argsToString takes args in the format of []string and returns a string.
func argsToString(args []string) string {
return strings.Join(args, " ")
}