117 lines
2.5 KiB
Go
117 lines
2.5 KiB
Go
package server
|
|
|
|
import (
|
|
"context"
|
|
"crypto"
|
|
"encoding/json"
|
|
"fmt"
|
|
"net/http"
|
|
|
|
"crispbyte.dev/sig-auth/keydirectory"
|
|
"github.com/common-fate/httpsig"
|
|
"github.com/common-fate/httpsig/inmemory"
|
|
"golang.org/x/crypto/ssh"
|
|
)
|
|
|
|
func Start(isCaddyAuth bool, keyDir keydirectory.RegistrationDirectory) error {
|
|
mux := http.NewServeMux()
|
|
|
|
verifier := httpsig.Middleware(httpsig.MiddlewareOpts{
|
|
NonceStorage: inmemory.NewNonceStorage(),
|
|
KeyDirectory: keyDir,
|
|
Tag: "auth",
|
|
Scheme: "http",
|
|
Authority: "localhost:8080",
|
|
|
|
OnValidationError: func(ctx context.Context, err error) {
|
|
fmt.Printf("validation error: %s\n", err)
|
|
},
|
|
|
|
OnDeriveSigningString: func(ctx context.Context, stringToSign string) {
|
|
fmt.Printf("string to sign:\n%s\n", stringToSign)
|
|
},
|
|
})
|
|
|
|
verifyHandler := verifier(getDefaultHandler(isCaddyAuth))
|
|
|
|
var handler http.Handler
|
|
|
|
if isCaddyAuth {
|
|
handler = rewriteHeaders(verifyHandler)
|
|
} else {
|
|
handler = verifyHandler
|
|
}
|
|
|
|
mux.Handle("/", handler)
|
|
mux.Handle("/register", getRegistrationHandler(keyDir))
|
|
|
|
err := http.ListenAndServe("localhost:8080", mux)
|
|
|
|
return err
|
|
}
|
|
|
|
func getDefaultHandler(isCaddyAuth bool) http.Handler {
|
|
handler := func(w http.ResponseWriter, r *http.Request) {
|
|
attr := httpsig.AttributesFromContext(r.Context()).(string)
|
|
|
|
if isCaddyAuth {
|
|
w.Header().Add("Remote-User", attr)
|
|
}
|
|
|
|
msg := fmt.Sprintf("hello, %s!", attr)
|
|
w.Write([]byte(msg))
|
|
}
|
|
|
|
return http.HandlerFunc(handler)
|
|
}
|
|
|
|
func getRegistrationHandler(keyDir keydirectory.RegistrationDirectory) http.Handler {
|
|
handler := func(w http.ResponseWriter, r *http.Request) {
|
|
if r.Method != "POST" {
|
|
http.Error(w, "Bad request", 400)
|
|
return
|
|
}
|
|
|
|
var request RegisterRequest
|
|
|
|
err := json.NewDecoder(r.Body).Decode(&request)
|
|
|
|
if err != nil {
|
|
http.Error(w, fmt.Sprintf("Bad request - %s", err), 400)
|
|
return
|
|
}
|
|
|
|
key, alg, err := parsePublicKey(request.Key)
|
|
|
|
if err != nil {
|
|
http.Error(w, fmt.Sprintf("Bad request - %s", err), 400)
|
|
return
|
|
}
|
|
|
|
fmt.Printf("Registering %s key for %s\n", alg, request.UserId)
|
|
|
|
keyId, err := keyDir.RegisterKey(key, alg, request.UserId)
|
|
|
|
if err != nil {
|
|
http.Error(w, fmt.Sprintf("Server error - %s", err), 500)
|
|
return
|
|
}
|
|
|
|
w.Write([]byte(keyId))
|
|
}
|
|
|
|
return http.HandlerFunc(handler)
|
|
}
|
|
|
|
func parsePublicKey(input string) (crypto.PublicKey, string, error) {
|
|
pk, _, _, _, err := ssh.ParseAuthorizedKey([]byte(input))
|
|
|
|
var alg string
|
|
|
|
switch pk.Type() {
|
|
case "ssh-ed25519":
|
|
alg = "ed25519"
|
|
}
|
|
|
|
return pk.(ssh.CryptoPublicKey).CryptoPublicKey(), alg, err
|
|
}
|