sig-auth/main.go

140 lines
2.6 KiB
Go
Raw Normal View History

2025-02-10 23:07:41 -05:00
package main
import (
"bytes"
"crypto"
"encoding/json"
2025-02-14 19:41:22 -05:00
"flag"
2025-02-10 23:07:41 -05:00
"fmt"
2025-02-14 19:41:22 -05:00
"io"
2025-02-10 23:07:41 -05:00
"log"
2025-02-14 19:41:22 -05:00
"net/http"
2025-02-10 23:07:41 -05:00
"os"
"crispbyte.dev/sig-auth/client"
2025-02-14 19:41:22 -05:00
"crispbyte.dev/sig-auth/server"
2025-02-17 19:55:53 -05:00
"crispbyte.dev/sig-auth/sqlite_directory"
2025-02-14 19:41:22 -05:00
"github.com/opencontainers/go-digest"
2025-02-10 23:07:41 -05:00
"golang.org/x/crypto/ssh"
)
func main() {
2025-02-14 19:41:22 -05:00
useClient := flag.Bool("c", false, "Run client")
2025-02-17 20:50:48 -05:00
register := flag.Bool("r", false, "Register a key")
user := flag.String("user", "", "Username to register")
keyPath := flag.String("key", "", "Path to the private key (client mode) or public key (registration mode) to use")
2025-02-14 19:41:22 -05:00
2025-02-16 13:51:53 -05:00
simulateCaddy := flag.Bool("caddy", false, "Simulate caddy reverse proxy")
2025-02-14 19:41:22 -05:00
flag.Parse()
if *useClient {
2025-02-17 20:50:48 -05:00
if *keyPath == "" || *user == "" {
flag.PrintDefaults()
return
}
runClient(*keyPath, *user, *simulateCaddy)
} else if *register {
if *keyPath == "" || *user == "" {
flag.PrintDefaults()
return
}
registerKey(*keyPath, *user)
2025-02-14 19:41:22 -05:00
} else {
2025-02-17 20:50:48 -05:00
runServer(*simulateCaddy)
2025-02-14 19:41:22 -05:00
}
}
2025-02-17 20:50:48 -05:00
func runClient(keyFile string, user string, simulateCaddy bool) {
2025-02-10 23:07:41 -05:00
testData := map[string]string{"hello": "world"}
json_data, _ := json.Marshal(testData)
2025-02-17 20:50:48 -05:00
key, err := loadPrivateKey(keyFile)
2025-02-10 23:07:41 -05:00
if err != nil {
log.Fatal(err)
}
2025-02-17 20:50:48 -05:00
client, err := client.GetSigningClient(key, user)
2025-02-10 23:07:41 -05:00
if err != nil {
log.Fatal(err)
}
2025-02-14 19:41:22 -05:00
id := digest.FromBytes(json_data)
2025-02-16 13:51:53 -05:00
var req *http.Request
req, err = http.NewRequest("POST", "http://localhost:8080/post", bytes.NewBuffer(json_data))
2025-02-14 19:41:22 -05:00
if err != nil {
log.Fatal(err)
}
req.Header.Add("Content-Digest", string(id.Algorithm())+"="+id.Encoded())
req.Header.Add("Content-Type", "application/json")
2025-02-16 13:51:53 -05:00
if simulateCaddy {
req.Header.Add("X-Forwarded-Method", req.Method)
req.Header.Add("X-Forwarded-Uri", req.RequestURI)
}
2025-02-14 19:41:22 -05:00
resp, err := client.Do(req)
2025-02-10 23:07:41 -05:00
if err != nil {
log.Fatal(err)
}
defer resp.Body.Close()
2025-02-14 19:41:22 -05:00
out, err := io.ReadAll(resp.Body)
if err != nil {
log.Fatal(err)
}
fmt.Println(resp.StatusCode)
2025-02-16 13:51:53 -05:00
fmt.Println(resp.Header)
2025-02-14 19:41:22 -05:00
fmt.Println(string(out[:]))
}
2025-02-17 20:50:48 -05:00
func runServer(simulateCaddy bool) {
keyDir := sqlite_directory.CreateDirectory()
2025-02-17 19:55:53 -05:00
server.Start(simulateCaddy, keyDir)
2025-02-10 23:07:41 -05:00
}
func loadPrivateKey(keyFile string) (crypto.PrivateKey, error) {
keyBytes, err := os.ReadFile(keyFile)
if err != nil {
return nil, err
}
return ssh.ParseRawPrivateKey(keyBytes)
}
2025-02-14 19:41:22 -05:00
2025-02-17 20:50:48 -05:00
func registerKey(keyFile string, userId string) {
2025-02-14 19:41:22 -05:00
keyBytes, err := os.ReadFile(keyFile)
if err != nil {
2025-02-17 20:50:48 -05:00
log.Fatal(err)
2025-02-14 19:41:22 -05:00
}
2025-02-17 20:50:48 -05:00
keyText := string(keyBytes)
2025-02-17 19:55:53 -05:00
2025-02-17 20:50:48 -05:00
request := server.RegisterRequest{
UserId: userId,
Key: keyText,
2025-02-17 19:55:53 -05:00
}
2025-02-17 20:50:48 -05:00
json_data, _ := json.Marshal(request)
http.DefaultClient.Post("http://localhost:8080/register", "application/json", bytes.NewBuffer(json_data))
2025-02-14 19:41:22 -05:00
}