sig-auth/server/server.go
2025-02-22 15:11:00 -05:00

117 lines
2.5 KiB
Go

package server
import (
"context"
"crypto"
"encoding/json"
"fmt"
"net/http"
"crispbyte.dev/sig-auth/keydirectory"
"github.com/common-fate/httpsig"
"github.com/common-fate/httpsig/inmemory"
"golang.org/x/crypto/ssh"
)
func Start(isCaddyAuth bool, keyDir keydirectory.RegistrationDirectory) error {
mux := http.NewServeMux()
verifier := httpsig.Middleware(httpsig.MiddlewareOpts{
NonceStorage: inmemory.NewNonceStorage(),
KeyDirectory: keyDir,
Tag: "auth",
Scheme: "http",
Authority: "localhost:8080",
OnValidationError: func(ctx context.Context, err error) {
fmt.Printf("validation error: %s\n", err)
},
OnDeriveSigningString: func(ctx context.Context, stringToSign string) {
fmt.Printf("string to sign:\n%s\n", stringToSign)
},
})
verifyHandler := verifier(getDefaultHandler(isCaddyAuth))
var handler http.Handler
if isCaddyAuth {
handler = rewriteHeaders(verifyHandler)
} else {
handler = verifyHandler
}
mux.Handle("/auth", handler)
mux.Handle("/register", getRegistrationHandler(keyDir))
err := http.ListenAndServe("localhost:8080", mux)
return err
}
func getDefaultHandler(isCaddyAuth bool) http.Handler {
handler := func(w http.ResponseWriter, r *http.Request) {
attr := httpsig.AttributesFromContext(r.Context()).(string)
if isCaddyAuth {
w.Header().Add("Remote-User", attr)
}
msg := fmt.Sprintf("hello, %s!", attr)
w.Write([]byte(msg))
}
return http.HandlerFunc(handler)
}
func getRegistrationHandler(keyDir keydirectory.RegistrationDirectory) http.Handler {
handler := func(w http.ResponseWriter, r *http.Request) {
if r.Method != "POST" {
http.Error(w, "Bad request", 400)
return
}
var request RegisterRequest
err := json.NewDecoder(r.Body).Decode(&request)
if err != nil {
http.Error(w, fmt.Sprintf("Bad request - %s", err), 400)
return
}
key, alg, err := parsePublicKey(request.Key)
if err != nil {
http.Error(w, fmt.Sprintf("Bad request - %s", err), 400)
return
}
fmt.Printf("Registering %s key for %s\n", alg, request.UserId)
keyId, err := keyDir.RegisterKey(key, alg, request.UserId)
if err != nil {
http.Error(w, fmt.Sprintf("Server error - %s", err), 500)
return
}
w.Write([]byte(keyId))
}
return http.HandlerFunc(handler)
}
func parsePublicKey(input string) (crypto.PublicKey, string, error) {
pk, _, _, _, err := ssh.ParseAuthorizedKey([]byte(input))
var alg string
switch pk.Type() {
case "ssh-ed25519":
alg = "ed25519"
}
return pk.(ssh.CryptoPublicKey).CryptoPublicKey(), alg, err
}