2021-05-19 16:14:00 +00:00
|
|
|
package container
|
|
|
|
|
|
|
|
import (
|
2021-05-25 09:09:44 +00:00
|
|
|
"crypto/ecdsa"
|
2021-05-27 12:07:39 +00:00
|
|
|
"errors"
|
2021-05-19 16:14:00 +00:00
|
|
|
"fmt"
|
|
|
|
|
2023-01-10 13:01:54 +00:00
|
|
|
"github.com/TrueCloudLab/frostfs-node/pkg/morph/client/frostfsid"
|
2022-12-23 17:35:35 +00:00
|
|
|
cid "github.com/TrueCloudLab/frostfs-sdk-go/container/id"
|
|
|
|
frostfsecdsa "github.com/TrueCloudLab/frostfs-sdk-go/crypto/ecdsa"
|
|
|
|
"github.com/TrueCloudLab/frostfs-sdk-go/session"
|
|
|
|
"github.com/TrueCloudLab/frostfs-sdk-go/user"
|
2021-05-19 16:14:00 +00:00
|
|
|
)
|
|
|
|
|
2021-05-28 12:39:27 +00:00
|
|
|
var (
|
2022-05-18 15:20:08 +00:00
|
|
|
errWrongSessionVerb = errors.New("wrong token verb")
|
|
|
|
errWrongCID = errors.New("wrong container ID")
|
2021-05-28 12:39:27 +00:00
|
|
|
)
|
|
|
|
|
2022-05-18 15:20:08 +00:00
|
|
|
type signatureVerificationData struct {
|
|
|
|
ownerContainer user.ID
|
2021-05-19 16:14:00 +00:00
|
|
|
|
2022-05-18 15:20:08 +00:00
|
|
|
verb session.ContainerVerb
|
2021-05-27 12:07:39 +00:00
|
|
|
|
2022-05-18 15:20:08 +00:00
|
|
|
idContainerSet bool
|
|
|
|
idContainer cid.ID
|
2021-05-27 12:07:39 +00:00
|
|
|
|
2022-05-18 15:20:08 +00:00
|
|
|
binTokenSession []byte
|
2021-05-27 12:07:39 +00:00
|
|
|
|
2022-05-18 15:20:08 +00:00
|
|
|
binPublicKey []byte
|
|
|
|
|
|
|
|
signature []byte
|
2021-05-27 12:07:39 +00:00
|
|
|
|
2022-05-18 15:20:08 +00:00
|
|
|
signedData []byte
|
2021-05-27 12:07:39 +00:00
|
|
|
}
|
|
|
|
|
2022-05-18 15:20:08 +00:00
|
|
|
// verifySignature is a common method of Container service authentication. Asserts that:
|
2022-08-15 16:20:20 +00:00
|
|
|
// - for trusted parties: session is valid (*) and issued by container owner
|
|
|
|
// - operation data is signed by container owner or trusted party
|
|
|
|
// - operation data signature is correct
|
2022-05-18 15:20:08 +00:00
|
|
|
//
|
|
|
|
// (*) includes:
|
2022-08-15 16:20:20 +00:00
|
|
|
// - session token decodes correctly
|
|
|
|
// - signature is valid
|
|
|
|
// - session issued by the container owner
|
|
|
|
// - v.binPublicKey is a public session key
|
|
|
|
// - session context corresponds to the container and verb in v
|
|
|
|
// - session is "alive"
|
2022-05-18 15:20:08 +00:00
|
|
|
func (cp *Processor) verifySignature(v signatureVerificationData) error {
|
|
|
|
var err error
|
2022-12-23 17:35:35 +00:00
|
|
|
var key frostfsecdsa.PublicKeyRFC6979
|
2022-05-18 15:20:08 +00:00
|
|
|
keyProvided := v.binPublicKey != nil
|
|
|
|
|
|
|
|
if keyProvided {
|
|
|
|
err = key.Decode(v.binPublicKey)
|
|
|
|
if err != nil {
|
|
|
|
return fmt.Errorf("decode public key: %w", err)
|
2021-05-27 12:07:39 +00:00
|
|
|
}
|
|
|
|
}
|
|
|
|
|
2022-06-07 17:58:21 +00:00
|
|
|
if len(v.binTokenSession) > 0 {
|
2022-05-18 15:20:08 +00:00
|
|
|
var tok session.Container
|
2021-05-19 16:14:00 +00:00
|
|
|
|
2022-05-18 15:20:08 +00:00
|
|
|
err = tok.Unmarshal(v.binTokenSession)
|
|
|
|
if err != nil {
|
|
|
|
return fmt.Errorf("decode session token: %w", err)
|
2021-05-19 16:14:00 +00:00
|
|
|
}
|
|
|
|
|
2022-05-18 15:20:08 +00:00
|
|
|
if !tok.VerifySignature() {
|
|
|
|
return errors.New("invalid session token signature")
|
|
|
|
}
|
2021-05-27 12:07:39 +00:00
|
|
|
|
2022-05-18 15:20:08 +00:00
|
|
|
// FIXME(@cthulhu-rider): #1387 check token is signed by container owner, see neofs-sdk-go#233
|
2021-05-27 12:07:39 +00:00
|
|
|
|
2022-05-18 15:20:08 +00:00
|
|
|
if keyProvided && !tok.AssertAuthKey(&key) {
|
|
|
|
return errors.New("signed with a non-session key")
|
|
|
|
}
|
2022-05-17 13:59:46 +00:00
|
|
|
|
2022-05-18 15:20:08 +00:00
|
|
|
if !tok.AssertVerb(v.verb) {
|
|
|
|
return errWrongSessionVerb
|
|
|
|
}
|
2021-05-27 12:07:39 +00:00
|
|
|
|
2022-05-18 15:20:08 +00:00
|
|
|
if v.idContainerSet && !tok.AppliedTo(v.idContainer) {
|
|
|
|
return errWrongCID
|
|
|
|
}
|
2021-05-27 12:07:39 +00:00
|
|
|
|
2022-05-18 15:20:08 +00:00
|
|
|
if !session.IssuedBy(tok, v.ownerContainer) {
|
|
|
|
return errors.New("owner differs with token owner")
|
|
|
|
}
|
2021-05-27 12:07:39 +00:00
|
|
|
|
2022-05-18 15:20:08 +00:00
|
|
|
err = cp.checkTokenLifetime(tok)
|
|
|
|
if err != nil {
|
|
|
|
return fmt.Errorf("check session lifetime: %w", err)
|
|
|
|
}
|
2021-05-27 12:07:39 +00:00
|
|
|
|
2022-06-07 17:58:21 +00:00
|
|
|
if !tok.VerifySessionDataSignature(v.signedData, v.signature) {
|
|
|
|
return errors.New("invalid signature calculated with session key")
|
|
|
|
}
|
|
|
|
|
|
|
|
return nil
|
|
|
|
}
|
2021-06-04 15:02:25 +00:00
|
|
|
|
2022-05-18 15:20:08 +00:00
|
|
|
if keyProvided {
|
2022-06-07 17:58:21 +00:00
|
|
|
// TODO(@cthulhu-rider): #1387 use another approach after neofs-sdk-go#233
|
|
|
|
var idFromKey user.ID
|
|
|
|
user.IDFromKey(&idFromKey, (ecdsa.PublicKey)(key))
|
|
|
|
|
|
|
|
if v.ownerContainer.Equals(idFromKey) {
|
|
|
|
if key.Verify(v.signedData, v.signature) {
|
|
|
|
return nil
|
2022-05-18 15:20:08 +00:00
|
|
|
}
|
2021-05-27 12:07:39 +00:00
|
|
|
|
2022-06-07 17:58:21 +00:00
|
|
|
return errors.New("invalid signature calculated by container owner's key")
|
|
|
|
}
|
|
|
|
} else {
|
2023-01-10 13:01:54 +00:00
|
|
|
var prm frostfsid.AccountKeysPrm
|
2022-05-31 17:00:41 +00:00
|
|
|
prm.SetID(v.ownerContainer)
|
2021-05-28 12:39:27 +00:00
|
|
|
|
2022-05-18 15:20:08 +00:00
|
|
|
ownerKeys, err := cp.idClient.AccountKeys(prm)
|
|
|
|
if err != nil {
|
|
|
|
return fmt.Errorf("receive owner keys %s: %w", v.ownerContainer, err)
|
|
|
|
}
|
2021-05-28 12:39:27 +00:00
|
|
|
|
2022-05-18 15:20:08 +00:00
|
|
|
for i := range ownerKeys {
|
2022-12-23 17:35:35 +00:00
|
|
|
if (*frostfsecdsa.PublicKeyRFC6979)(ownerKeys[i]).Verify(v.signedData, v.signature) {
|
2022-06-07 17:58:21 +00:00
|
|
|
return nil
|
2022-05-18 15:20:08 +00:00
|
|
|
}
|
|
|
|
}
|
2021-05-28 12:39:27 +00:00
|
|
|
}
|
|
|
|
|
2022-06-07 17:58:21 +00:00
|
|
|
return errors.New("signature is invalid or calculated with the key not bound to the container owner")
|
2021-05-28 12:39:27 +00:00
|
|
|
}
|
2021-06-04 15:02:25 +00:00
|
|
|
|
2022-05-18 15:20:08 +00:00
|
|
|
func (cp *Processor) checkTokenLifetime(token session.Container) error {
|
2021-06-04 15:02:25 +00:00
|
|
|
curEpoch, err := cp.netState.Epoch()
|
|
|
|
if err != nil {
|
|
|
|
return fmt.Errorf("could not read current epoch: %w", err)
|
|
|
|
}
|
|
|
|
|
2022-05-18 15:20:08 +00:00
|
|
|
if token.InvalidAt(curEpoch) {
|
|
|
|
return fmt.Errorf("token is not valid at %d", curEpoch)
|
2021-06-04 15:02:25 +00:00
|
|
|
}
|
|
|
|
|
|
|
|
return nil
|
|
|
|
}
|