2015-06-11 22:13:43 +00:00
|
|
|
package acme
|
|
|
|
|
|
|
|
import (
|
|
|
|
"bytes"
|
2016-01-27 01:01:39 +00:00
|
|
|
"crypto"
|
2015-10-23 14:24:02 +00:00
|
|
|
"crypto/ecdsa"
|
2016-01-27 01:01:39 +00:00
|
|
|
"crypto/elliptic"
|
2015-06-11 22:13:43 +00:00
|
|
|
"crypto/rsa"
|
2015-09-26 17:45:52 +00:00
|
|
|
"fmt"
|
2015-06-11 22:13:43 +00:00
|
|
|
"net/http"
|
2016-08-18 20:35:03 +00:00
|
|
|
"sync"
|
2015-06-11 22:13:43 +00:00
|
|
|
|
2016-04-11 04:27:12 +00:00
|
|
|
"gopkg.in/square/go-jose.v1"
|
2015-06-11 22:13:43 +00:00
|
|
|
)
|
|
|
|
|
|
|
|
type jws struct {
|
2015-11-12 01:55:28 +00:00
|
|
|
directoryURL string
|
2016-01-27 01:01:39 +00:00
|
|
|
privKey crypto.PrivateKey
|
2017-02-19 03:48:45 +00:00
|
|
|
nonces nonceManager
|
2015-06-11 22:13:43 +00:00
|
|
|
}
|
|
|
|
|
2015-11-12 01:06:22 +00:00
|
|
|
func keyAsJWK(key interface{}) *jose.JsonWebKey {
|
|
|
|
switch k := key.(type) {
|
|
|
|
case *ecdsa.PublicKey:
|
|
|
|
return &jose.JsonWebKey{Key: k, Algorithm: "EC"}
|
|
|
|
case *rsa.PublicKey:
|
|
|
|
return &jose.JsonWebKey{Key: k, Algorithm: "RSA"}
|
|
|
|
|
|
|
|
default:
|
|
|
|
return nil
|
2015-10-23 14:24:02 +00:00
|
|
|
}
|
|
|
|
}
|
|
|
|
|
2017-01-15 15:54:49 +00:00
|
|
|
// Posts a JWS signed message to the specified URL.
|
|
|
|
// It does NOT close the response body, so the caller must
|
|
|
|
// do that if no error was returned.
|
2015-06-11 22:13:43 +00:00
|
|
|
func (j *jws) post(url string, content []byte) (*http.Response, error) {
|
2015-09-26 17:45:52 +00:00
|
|
|
signedContent, err := j.signContent(content)
|
|
|
|
if err != nil {
|
2017-02-19 04:50:21 +00:00
|
|
|
return nil, fmt.Errorf("Failed to sign content -> %s", err.Error())
|
2015-09-26 17:45:52 +00:00
|
|
|
}
|
|
|
|
|
2015-12-30 22:01:21 +00:00
|
|
|
resp, err := httpPost(url, "application/jose+json", bytes.NewBuffer([]byte(signedContent.FullSerialize())))
|
2017-03-17 18:58:44 +00:00
|
|
|
if err != nil {
|
|
|
|
return nil, fmt.Errorf("Failed to HTTP POST to %s -> %s", url, err.Error())
|
|
|
|
}
|
|
|
|
|
2017-02-19 04:12:14 +00:00
|
|
|
// Even in case of an error, the response should still contain a nonce.
|
2017-02-19 03:48:45 +00:00
|
|
|
nonce, nonceErr := getNonceFromResponse(resp)
|
|
|
|
if nonceErr == nil {
|
|
|
|
j.nonces.Push(nonce)
|
|
|
|
}
|
2015-09-26 17:45:52 +00:00
|
|
|
|
2017-02-19 04:12:14 +00:00
|
|
|
if err != nil {
|
|
|
|
switch err.(type) {
|
|
|
|
case NonceError:
|
|
|
|
// In case of a nonce error - retry once
|
|
|
|
resp, err = httpPost(url, "application/jose+json", bytes.NewBuffer([]byte(signedContent.FullSerialize())))
|
|
|
|
if err != nil {
|
2017-02-19 04:50:21 +00:00
|
|
|
return nil, fmt.Errorf("Failed to HTTP POST to %s -> %s", url, err.Error())
|
2017-02-19 04:12:14 +00:00
|
|
|
}
|
|
|
|
default:
|
2017-02-19 04:50:21 +00:00
|
|
|
return nil, fmt.Errorf("Failed to HTTP POST to %s -> %s", url, err.Error())
|
2017-02-19 04:12:14 +00:00
|
|
|
}
|
|
|
|
}
|
|
|
|
|
2017-02-19 04:50:21 +00:00
|
|
|
return resp, nil
|
2015-09-26 17:45:52 +00:00
|
|
|
}
|
|
|
|
|
|
|
|
func (j *jws) signContent(content []byte) (*jose.JsonWebSignature, error) {
|
2016-01-27 01:01:39 +00:00
|
|
|
|
|
|
|
var alg jose.SignatureAlgorithm
|
|
|
|
switch k := j.privKey.(type) {
|
|
|
|
case *rsa.PrivateKey:
|
|
|
|
alg = jose.RS256
|
|
|
|
case *ecdsa.PrivateKey:
|
|
|
|
if k.Curve == elliptic.P256() {
|
|
|
|
alg = jose.ES256
|
|
|
|
} else if k.Curve == elliptic.P384() {
|
|
|
|
alg = jose.ES384
|
|
|
|
}
|
|
|
|
}
|
|
|
|
|
|
|
|
signer, err := jose.NewSigner(alg, j.privKey)
|
2015-06-11 22:13:43 +00:00
|
|
|
if err != nil {
|
2017-02-19 04:50:21 +00:00
|
|
|
return nil, fmt.Errorf("Failed to create jose signer -> %s", err.Error())
|
2015-06-11 22:13:43 +00:00
|
|
|
}
|
2015-11-12 01:06:22 +00:00
|
|
|
signer.SetNonceSource(j)
|
2015-06-11 22:13:43 +00:00
|
|
|
|
2015-11-12 01:06:22 +00:00
|
|
|
signed, err := signer.Sign(content)
|
2015-06-11 22:13:43 +00:00
|
|
|
if err != nil {
|
2017-02-19 04:50:21 +00:00
|
|
|
return nil, fmt.Errorf("Failed to sign content -> %s", err.Error())
|
2015-06-11 22:13:43 +00:00
|
|
|
}
|
2015-09-26 17:45:52 +00:00
|
|
|
return signed, nil
|
|
|
|
}
|
|
|
|
|
2017-02-19 03:48:45 +00:00
|
|
|
func (j *jws) Nonce() (string, error) {
|
|
|
|
if nonce, ok := j.nonces.Pop(); ok {
|
|
|
|
return nonce, nil
|
2015-09-26 17:45:52 +00:00
|
|
|
}
|
|
|
|
|
2017-02-19 03:48:45 +00:00
|
|
|
return getNonce(j.directoryURL)
|
2015-09-26 17:45:52 +00:00
|
|
|
}
|
2015-06-11 22:13:43 +00:00
|
|
|
|
2017-02-19 03:48:45 +00:00
|
|
|
type nonceManager struct {
|
|
|
|
nonces []string
|
|
|
|
sync.Mutex
|
|
|
|
}
|
|
|
|
|
|
|
|
func (n *nonceManager) Pop() (string, bool) {
|
|
|
|
n.Lock()
|
|
|
|
defer n.Unlock()
|
|
|
|
|
|
|
|
if len(n.nonces) == 0 {
|
|
|
|
return "", false
|
2015-06-11 22:13:43 +00:00
|
|
|
}
|
|
|
|
|
2017-02-19 03:48:45 +00:00
|
|
|
nonce := n.nonces[len(n.nonces)-1]
|
|
|
|
n.nonces = n.nonces[:len(n.nonces)-1]
|
|
|
|
return nonce, true
|
2015-09-26 17:45:52 +00:00
|
|
|
}
|
|
|
|
|
2017-02-19 03:48:45 +00:00
|
|
|
func (n *nonceManager) Push(nonce string) {
|
|
|
|
n.Lock()
|
|
|
|
defer n.Unlock()
|
|
|
|
n.nonces = append(n.nonces, nonce)
|
|
|
|
}
|
|
|
|
|
|
|
|
func getNonce(url string) (string, error) {
|
|
|
|
resp, err := httpHead(url)
|
|
|
|
if err != nil {
|
2017-02-19 04:50:21 +00:00
|
|
|
return "", fmt.Errorf("Failed to get nonce from HTTP HEAD -> %s", err.Error())
|
2015-09-26 17:45:52 +00:00
|
|
|
}
|
2017-02-19 03:48:45 +00:00
|
|
|
|
|
|
|
return getNonceFromResponse(resp)
|
|
|
|
}
|
|
|
|
|
|
|
|
func getNonceFromResponse(resp *http.Response) (string, error) {
|
|
|
|
nonce := resp.Header.Get("Replay-Nonce")
|
|
|
|
if nonce == "" {
|
|
|
|
return "", fmt.Errorf("Server did not respond with a proper nonce header.")
|
2016-04-11 04:22:00 +00:00
|
|
|
}
|
2017-02-19 03:48:45 +00:00
|
|
|
|
2015-11-12 01:06:22 +00:00
|
|
|
return nonce, nil
|
2015-06-11 22:13:43 +00:00
|
|
|
}
|