2021-05-19 09:28:17 +00:00
|
|
|
package authmate
|
2021-05-18 18:49:09 +00:00
|
|
|
|
|
|
|
import (
|
|
|
|
"context"
|
|
|
|
"crypto/ecdsa"
|
2021-05-25 16:52:29 +00:00
|
|
|
"encoding/hex"
|
2021-05-18 18:49:09 +00:00
|
|
|
"encoding/json"
|
2021-05-20 10:14:17 +00:00
|
|
|
"fmt"
|
2021-05-18 18:49:09 +00:00
|
|
|
"io"
|
|
|
|
"math"
|
|
|
|
"strconv"
|
|
|
|
"time"
|
|
|
|
|
2021-06-16 20:09:51 +00:00
|
|
|
"github.com/google/uuid"
|
2021-05-18 18:49:09 +00:00
|
|
|
"github.com/nspcc-dev/neofs-api-go/pkg/acl/eacl"
|
|
|
|
"github.com/nspcc-dev/neofs-api-go/pkg/container"
|
2021-06-04 13:01:42 +00:00
|
|
|
cid "github.com/nspcc-dev/neofs-api-go/pkg/container/id"
|
2021-05-18 18:49:09 +00:00
|
|
|
"github.com/nspcc-dev/neofs-api-go/pkg/netmap"
|
|
|
|
"github.com/nspcc-dev/neofs-api-go/pkg/object"
|
|
|
|
"github.com/nspcc-dev/neofs-api-go/pkg/owner"
|
2021-06-16 20:09:51 +00:00
|
|
|
"github.com/nspcc-dev/neofs-api-go/pkg/session"
|
2021-05-18 18:49:09 +00:00
|
|
|
"github.com/nspcc-dev/neofs-api-go/pkg/token"
|
2021-06-16 14:07:31 +00:00
|
|
|
crypto "github.com/nspcc-dev/neofs-crypto"
|
2021-05-18 18:49:09 +00:00
|
|
|
"github.com/nspcc-dev/neofs-node/pkg/policy"
|
2021-06-14 13:39:25 +00:00
|
|
|
"github.com/nspcc-dev/neofs-s3-gw/creds/accessbox"
|
|
|
|
"github.com/nspcc-dev/neofs-s3-gw/creds/tokens"
|
2021-05-28 20:48:23 +00:00
|
|
|
"github.com/nspcc-dev/neofs-sdk-go/pkg/pool"
|
2021-05-18 18:49:09 +00:00
|
|
|
"go.uber.org/zap"
|
|
|
|
)
|
|
|
|
|
2021-05-26 16:48:27 +00:00
|
|
|
const (
|
2021-06-17 12:38:07 +00:00
|
|
|
defaultAuthContainerBasicACL uint32 = 0b00111100100011001000110011001110
|
2021-05-26 16:48:27 +00:00
|
|
|
)
|
2021-05-18 18:49:09 +00:00
|
|
|
|
2021-05-19 16:27:02 +00:00
|
|
|
// Agent contains client communicating with NeoFS and logger.
|
2021-05-18 18:49:09 +00:00
|
|
|
type Agent struct {
|
2021-05-28 20:48:23 +00:00
|
|
|
pool pool.Pool
|
|
|
|
log *zap.Logger
|
2021-05-18 18:49:09 +00:00
|
|
|
}
|
|
|
|
|
2021-05-19 16:27:02 +00:00
|
|
|
// New creates an object of type Agent that consists of Client and logger.
|
2021-05-28 20:48:23 +00:00
|
|
|
func New(log *zap.Logger, conns pool.Pool) *Agent {
|
|
|
|
return &Agent{log: log, pool: conns}
|
2021-05-18 18:49:09 +00:00
|
|
|
}
|
|
|
|
|
|
|
|
type (
|
2021-05-19 16:27:02 +00:00
|
|
|
// IssueSecretOptions contains options for passing to Agent.IssueSecret method.
|
2021-05-18 18:49:09 +00:00
|
|
|
IssueSecretOptions struct {
|
2021-06-04 13:01:42 +00:00
|
|
|
ContainerID *cid.ID
|
2021-05-18 18:49:09 +00:00
|
|
|
ContainerFriendlyName string
|
2021-05-28 20:48:23 +00:00
|
|
|
NeoFSKey *ecdsa.PrivateKey
|
2021-06-16 14:07:31 +00:00
|
|
|
GatesPublicKeys []*ecdsa.PublicKey
|
2021-05-18 18:49:09 +00:00
|
|
|
EACLRules []byte
|
2021-06-16 20:09:51 +00:00
|
|
|
ContextRules []byte
|
|
|
|
SessionTkn bool
|
2021-05-18 18:49:09 +00:00
|
|
|
}
|
|
|
|
|
2021-05-19 16:27:02 +00:00
|
|
|
// ObtainSecretOptions contains options for passing to Agent.ObtainSecret method.
|
2021-05-18 18:49:09 +00:00
|
|
|
ObtainSecretOptions struct {
|
|
|
|
SecretAddress string
|
2021-06-16 14:07:31 +00:00
|
|
|
GatePrivateKey *ecdsa.PrivateKey
|
2021-05-18 18:49:09 +00:00
|
|
|
}
|
|
|
|
)
|
|
|
|
|
|
|
|
type (
|
|
|
|
issuingResult struct {
|
|
|
|
AccessKeyID string `json:"access_key_id"`
|
|
|
|
SecretAccessKey string `json:"secret_access_key"`
|
|
|
|
OwnerPrivateKey string `json:"owner_private_key"`
|
|
|
|
}
|
|
|
|
|
|
|
|
obtainingResult struct {
|
|
|
|
BearerToken *token.BearerToken `json:"-"`
|
|
|
|
SecretAccessKey string `json:"secret_access_key"`
|
|
|
|
}
|
|
|
|
)
|
|
|
|
|
2021-06-04 13:01:42 +00:00
|
|
|
func (a *Agent) checkContainer(ctx context.Context, cid *cid.ID, friendlyName string) (*cid.ID, error) {
|
2021-05-18 18:49:09 +00:00
|
|
|
if cid != nil {
|
|
|
|
// check that container exists
|
2021-06-23 20:26:48 +00:00
|
|
|
_, err := a.pool.GetContainer(ctx, cid)
|
2021-05-18 18:49:09 +00:00
|
|
|
return cid, err
|
|
|
|
}
|
|
|
|
|
|
|
|
pp, err := buildPlacementPolicy("")
|
|
|
|
if err != nil {
|
2021-05-20 10:14:17 +00:00
|
|
|
return nil, fmt.Errorf("failed to build placement policy: %w", err)
|
2021-05-18 18:49:09 +00:00
|
|
|
}
|
|
|
|
|
|
|
|
cnr := container.New(
|
|
|
|
container.WithPolicy(pp),
|
|
|
|
container.WithCustomBasicACL(defaultAuthContainerBasicACL),
|
|
|
|
container.WithAttribute(container.AttributeName, friendlyName),
|
|
|
|
container.WithAttribute(container.AttributeTimestamp, strconv.FormatInt(time.Now().Unix(), 10)))
|
|
|
|
|
2021-06-23 20:26:48 +00:00
|
|
|
cid, err = a.pool.PutContainer(ctx, cnr)
|
2021-05-26 16:48:27 +00:00
|
|
|
if err != nil {
|
|
|
|
return nil, err
|
|
|
|
}
|
|
|
|
|
2021-06-23 20:26:48 +00:00
|
|
|
if err := a.pool.WaitForContainerPresence(ctx, cid, pool.DefaultPollingParams()); err != nil {
|
|
|
|
return nil, err
|
2021-05-26 16:48:27 +00:00
|
|
|
}
|
2021-06-23 20:26:48 +00:00
|
|
|
return cid, nil
|
2021-05-18 18:49:09 +00:00
|
|
|
}
|
|
|
|
|
2021-05-19 16:27:02 +00:00
|
|
|
// IssueSecret creates an auth token, puts it in the NeoFS network and writes to io.Writer a new secret access key.
|
2021-05-18 18:49:09 +00:00
|
|
|
func (a *Agent) IssueSecret(ctx context.Context, w io.Writer, options *IssueSecretOptions) error {
|
|
|
|
var (
|
|
|
|
err error
|
2021-06-04 13:01:42 +00:00
|
|
|
cid *cid.ID
|
2021-06-16 14:07:31 +00:00
|
|
|
box *accessbox.AccessBox
|
2021-05-18 18:49:09 +00:00
|
|
|
)
|
|
|
|
|
|
|
|
a.log.Info("check container", zap.Stringer("cid", options.ContainerID))
|
|
|
|
if cid, err = a.checkContainer(ctx, options.ContainerID, options.ContainerFriendlyName); err != nil {
|
|
|
|
return err
|
|
|
|
}
|
|
|
|
|
2021-06-18 15:15:58 +00:00
|
|
|
gatesData, err := createTokens(options, cid)
|
2021-05-18 18:49:09 +00:00
|
|
|
if err != nil {
|
2021-05-20 10:14:17 +00:00
|
|
|
return fmt.Errorf("failed to build bearer token: %w", err)
|
2021-05-18 18:49:09 +00:00
|
|
|
}
|
|
|
|
|
2021-06-18 15:15:58 +00:00
|
|
|
box, secrets, err := accessbox.PackTokens(gatesData)
|
2021-06-14 13:39:25 +00:00
|
|
|
if err != nil {
|
2021-06-18 15:15:58 +00:00
|
|
|
return err
|
2021-06-14 13:39:25 +00:00
|
|
|
}
|
2021-06-16 20:09:51 +00:00
|
|
|
|
2021-06-18 15:15:58 +00:00
|
|
|
oid, err := ownerIDFromNeoFSKey(&options.NeoFSKey.PublicKey)
|
2021-06-16 14:07:31 +00:00
|
|
|
if err != nil {
|
|
|
|
return err
|
2021-06-16 20:09:51 +00:00
|
|
|
}
|
|
|
|
|
2021-06-16 14:07:31 +00:00
|
|
|
a.log.Info("store bearer token into NeoFS",
|
2021-06-17 16:45:50 +00:00
|
|
|
zap.Stringer("owner_tkn", oid))
|
2021-06-16 14:07:31 +00:00
|
|
|
|
2021-06-16 20:09:51 +00:00
|
|
|
if !options.SessionTkn && len(options.ContextRules) > 0 {
|
|
|
|
_, err := w.Write([]byte("Warning: rules for session token were set but --create-session flag wasn't, " +
|
|
|
|
"so session token was not created\n"))
|
|
|
|
if err != nil {
|
|
|
|
return err
|
|
|
|
}
|
|
|
|
}
|
2021-05-18 18:49:09 +00:00
|
|
|
|
2021-06-14 13:39:25 +00:00
|
|
|
address, err := tokens.
|
2021-06-17 16:45:50 +00:00
|
|
|
New(a.pool, secrets.EphemeralKey).
|
2021-06-16 14:07:31 +00:00
|
|
|
Put(ctx, cid, oid, box, options.GatesPublicKeys...)
|
2021-05-18 18:49:09 +00:00
|
|
|
if err != nil {
|
2021-05-20 10:14:17 +00:00
|
|
|
return fmt.Errorf("failed to put bearer token: %w", err)
|
2021-05-18 18:49:09 +00:00
|
|
|
}
|
|
|
|
|
2021-06-02 18:53:20 +00:00
|
|
|
accessKeyID := address.ContainerID().String() + "_" + address.ObjectID().String()
|
|
|
|
|
2021-05-18 18:49:09 +00:00
|
|
|
ir := &issuingResult{
|
2021-06-02 18:53:20 +00:00
|
|
|
AccessKeyID: accessKeyID,
|
2021-06-17 16:45:50 +00:00
|
|
|
SecretAccessKey: secrets.AccessKey,
|
|
|
|
OwnerPrivateKey: hex.EncodeToString(crypto.MarshalPrivateKey(secrets.EphemeralKey)),
|
2021-05-18 18:49:09 +00:00
|
|
|
}
|
|
|
|
|
|
|
|
enc := json.NewEncoder(w)
|
|
|
|
enc.SetIndent("", " ")
|
|
|
|
return enc.Encode(ir)
|
|
|
|
}
|
|
|
|
|
2021-05-19 16:27:02 +00:00
|
|
|
// ObtainSecret receives an existing secret access key from NeoFS and
|
|
|
|
// writes to io.Writer the secret access key.
|
2021-05-18 18:49:09 +00:00
|
|
|
func (a *Agent) ObtainSecret(ctx context.Context, w io.Writer, options *ObtainSecretOptions) error {
|
2021-06-14 13:39:25 +00:00
|
|
|
bearerCreds := tokens.New(a.pool, options.GatePrivateKey)
|
2021-05-18 18:49:09 +00:00
|
|
|
address := object.NewAddress()
|
|
|
|
if err := address.Parse(options.SecretAddress); err != nil {
|
2021-05-20 10:14:17 +00:00
|
|
|
return fmt.Errorf("failed to parse secret address: %w", err)
|
2021-05-18 18:49:09 +00:00
|
|
|
}
|
|
|
|
|
2021-06-17 16:45:50 +00:00
|
|
|
tkns, err := bearerCreds.GetTokens(ctx, address)
|
2021-05-18 18:49:09 +00:00
|
|
|
if err != nil {
|
2021-06-17 16:45:50 +00:00
|
|
|
return fmt.Errorf("failed to get tokens: %w", err)
|
2021-05-18 18:49:09 +00:00
|
|
|
}
|
|
|
|
|
|
|
|
or := &obtainingResult{
|
2021-06-17 16:45:50 +00:00
|
|
|
BearerToken: tkns.BearerToken,
|
|
|
|
SecretAccessKey: tkns.AccessKey,
|
2021-05-18 18:49:09 +00:00
|
|
|
}
|
|
|
|
|
|
|
|
enc := json.NewEncoder(w)
|
|
|
|
enc.SetIndent("", " ")
|
|
|
|
return enc.Encode(or)
|
|
|
|
}
|
|
|
|
|
|
|
|
func buildPlacementPolicy(placementRules string) (*netmap.PlacementPolicy, error) {
|
|
|
|
if len(placementRules) != 0 {
|
|
|
|
return policy.Parse(placementRules)
|
|
|
|
}
|
|
|
|
|
|
|
|
/*
|
|
|
|
REP 1 IN X // place one copy of object
|
|
|
|
CBF 1
|
|
|
|
SELECT 2 From * AS X // in container of two nodes
|
|
|
|
*/
|
|
|
|
pp := new(netmap.PlacementPolicy)
|
|
|
|
pp.SetContainerBackupFactor(1)
|
|
|
|
pp.SetReplicas([]*netmap.Replica{newReplica("X", 1)}...)
|
|
|
|
pp.SetSelectors([]*netmap.Selector{newSimpleSelector("X", 2)}...)
|
|
|
|
|
|
|
|
return pp, nil
|
|
|
|
}
|
|
|
|
|
2021-05-19 16:27:02 +00:00
|
|
|
// selects <count> nodes in container without any additional attributes.
|
2021-05-18 18:49:09 +00:00
|
|
|
func newSimpleSelector(name string, count uint32) (s *netmap.Selector) {
|
|
|
|
s = new(netmap.Selector)
|
|
|
|
s.SetCount(count)
|
|
|
|
s.SetFilter("*")
|
|
|
|
s.SetName(name)
|
|
|
|
return
|
|
|
|
}
|
|
|
|
|
|
|
|
func newReplica(name string, count uint32) (r *netmap.Replica) {
|
|
|
|
r = new(netmap.Replica)
|
|
|
|
r.SetCount(count)
|
|
|
|
r.SetSelector(name)
|
|
|
|
return
|
|
|
|
}
|
|
|
|
|
2021-06-04 13:01:42 +00:00
|
|
|
func buildEACLTable(cid *cid.ID, eaclTable []byte) (*eacl.Table, error) {
|
2021-05-18 18:49:09 +00:00
|
|
|
table := eacl.NewTable()
|
|
|
|
if len(eaclTable) != 0 {
|
|
|
|
return table, table.UnmarshalJSON(eaclTable)
|
|
|
|
}
|
|
|
|
|
|
|
|
record := eacl.NewRecord()
|
|
|
|
record.SetOperation(eacl.OperationGet)
|
|
|
|
record.SetAction(eacl.ActionAllow)
|
|
|
|
// TODO: Change this later.
|
|
|
|
// from := eacl.HeaderFromObject
|
|
|
|
// matcher := eacl.MatchStringEqual
|
|
|
|
// record.AddFilter(from eacl.FilterHeaderType, matcher eacl.Match, name string, value string)
|
|
|
|
eacl.AddFormedTarget(record, eacl.RoleOthers)
|
|
|
|
table.SetCID(cid)
|
|
|
|
table.AddRecord(record)
|
|
|
|
|
|
|
|
return table, nil
|
|
|
|
}
|
|
|
|
|
2021-06-16 20:09:51 +00:00
|
|
|
func buildContext(rules []byte) (*session.ContainerContext, error) {
|
|
|
|
sessionCtx := session.NewContainerContext() // wildcard == true on by default
|
|
|
|
|
|
|
|
if len(rules) != 0 {
|
|
|
|
// cast ToV2 temporary, because there is no method for unmarshalling in ContainerContext in api-go
|
|
|
|
err := sessionCtx.ToV2().UnmarshalJSON(rules)
|
|
|
|
if err != nil {
|
|
|
|
return nil, fmt.Errorf("failed to read rules for session token: %w", err)
|
|
|
|
}
|
|
|
|
return sessionCtx, nil
|
2021-05-28 20:48:23 +00:00
|
|
|
}
|
2021-06-16 20:09:51 +00:00
|
|
|
sessionCtx.ForPut()
|
|
|
|
sessionCtx.ApplyTo(nil)
|
|
|
|
return sessionCtx, nil
|
|
|
|
}
|
2021-05-28 20:48:23 +00:00
|
|
|
|
2021-06-18 15:15:58 +00:00
|
|
|
func buildBearerToken(key *ecdsa.PrivateKey, table *eacl.Table, gateKey *ecdsa.PublicKey) (*token.BearerToken, error) {
|
|
|
|
oid, err := ownerIDFromNeoFSKey(gateKey)
|
2021-06-16 14:07:31 +00:00
|
|
|
if err != nil {
|
|
|
|
return nil, err
|
|
|
|
}
|
|
|
|
|
2021-05-18 18:49:09 +00:00
|
|
|
bearerToken := token.NewBearerToken()
|
|
|
|
bearerToken.SetEACLTable(table)
|
|
|
|
bearerToken.SetOwner(oid)
|
|
|
|
bearerToken.SetLifetime(math.MaxUint64, 0, 0)
|
|
|
|
|
|
|
|
return bearerToken, bearerToken.SignToken(key)
|
|
|
|
}
|
2021-05-25 16:52:29 +00:00
|
|
|
|
2021-06-18 15:15:58 +00:00
|
|
|
func buildBearerTokens(key *ecdsa.PrivateKey, table *eacl.Table, gatesKeys []*ecdsa.PublicKey) ([]*token.BearerToken, error) {
|
|
|
|
bearerTokens := make([]*token.BearerToken, 0, len(gatesKeys))
|
|
|
|
for _, gateKey := range gatesKeys {
|
|
|
|
tkn, err := buildBearerToken(key, table, gateKey)
|
2021-06-17 16:45:50 +00:00
|
|
|
if err != nil {
|
|
|
|
return nil, err
|
|
|
|
}
|
2021-06-18 15:15:58 +00:00
|
|
|
bearerTokens = append(bearerTokens, tkn)
|
2021-06-17 16:45:50 +00:00
|
|
|
}
|
2021-06-18 15:15:58 +00:00
|
|
|
return bearerTokens, nil
|
2021-06-17 16:45:50 +00:00
|
|
|
}
|
|
|
|
|
2021-06-18 15:15:58 +00:00
|
|
|
func buildSessionToken(key *ecdsa.PrivateKey, oid *owner.ID, ctx *session.ContainerContext, gateKey *ecdsa.PublicKey) (*session.Token, error) {
|
2021-06-16 20:09:51 +00:00
|
|
|
tok := session.NewToken()
|
|
|
|
tok.SetContext(ctx)
|
|
|
|
uid, err := uuid.New().MarshalBinary()
|
|
|
|
if err != nil {
|
|
|
|
return nil, err
|
|
|
|
}
|
|
|
|
tok.SetID(uid)
|
|
|
|
tok.SetOwnerID(oid)
|
2021-06-18 15:15:58 +00:00
|
|
|
tok.SetSessionKey(crypto.MarshalPublicKey(gateKey))
|
2021-06-16 20:09:51 +00:00
|
|
|
|
|
|
|
return tok, tok.Sign(key)
|
|
|
|
}
|
|
|
|
|
2021-06-18 15:15:58 +00:00
|
|
|
func buildSessionTokens(key *ecdsa.PrivateKey, oid *owner.ID, ctx *session.ContainerContext, gatesKeys []*ecdsa.PublicKey) ([]*session.Token, error) {
|
|
|
|
sessionTokens := make([]*session.Token, 0, len(gatesKeys))
|
|
|
|
for _, gateKey := range gatesKeys {
|
|
|
|
tkn, err := buildSessionToken(key, oid, ctx, gateKey)
|
|
|
|
if err != nil {
|
|
|
|
return nil, err
|
|
|
|
}
|
|
|
|
sessionTokens = append(sessionTokens, tkn)
|
|
|
|
}
|
|
|
|
return sessionTokens, nil
|
|
|
|
}
|
|
|
|
|
|
|
|
func createTokens(options *IssueSecretOptions, cid *cid.ID) ([]*accessbox.GateData, error) {
|
|
|
|
gates := make([]*accessbox.GateData, len(options.GatesPublicKeys))
|
|
|
|
|
|
|
|
table, err := buildEACLTable(cid, options.EACLRules)
|
|
|
|
if err != nil {
|
|
|
|
return nil, fmt.Errorf("failed to build eacl table: %w", err)
|
|
|
|
}
|
|
|
|
bearerTokens, err := buildBearerTokens(options.NeoFSKey, table, options.GatesPublicKeys)
|
|
|
|
if err != nil {
|
|
|
|
return nil, fmt.Errorf("failed to build bearer tokens: %w", err)
|
|
|
|
}
|
|
|
|
for i, gateKey := range options.GatesPublicKeys {
|
|
|
|
gates[i] = accessbox.NewGateData(gateKey, bearerTokens[i])
|
|
|
|
}
|
|
|
|
|
2021-06-16 14:07:31 +00:00
|
|
|
if options.SessionTkn {
|
|
|
|
sessionRules, err := buildContext(options.ContextRules)
|
|
|
|
if err != nil {
|
|
|
|
return nil, fmt.Errorf("failed to build context for session token: %w", err)
|
|
|
|
}
|
2021-06-18 15:15:58 +00:00
|
|
|
oid, err := ownerIDFromNeoFSKey(&options.NeoFSKey.PublicKey)
|
|
|
|
if err != nil {
|
|
|
|
return nil, err
|
|
|
|
}
|
|
|
|
|
|
|
|
sessionTokens, err := buildSessionTokens(options.NeoFSKey, oid, sessionRules, options.GatesPublicKeys)
|
|
|
|
if err != nil {
|
|
|
|
return nil, err
|
|
|
|
}
|
|
|
|
for i, sessionToken := range sessionTokens {
|
|
|
|
gates[i].SessionToken = sessionToken
|
|
|
|
}
|
2021-06-16 14:07:31 +00:00
|
|
|
}
|
2021-06-18 15:15:58 +00:00
|
|
|
|
|
|
|
return gates, nil
|
2021-06-16 14:07:31 +00:00
|
|
|
}
|
|
|
|
|
2021-06-16 20:09:51 +00:00
|
|
|
func ownerIDFromNeoFSKey(key *ecdsa.PublicKey) (*owner.ID, error) {
|
|
|
|
wallet, err := owner.NEO3WalletFromPublicKey(key)
|
|
|
|
if err != nil {
|
|
|
|
return nil, err
|
|
|
|
}
|
|
|
|
return owner.NewIDFromNeo3Wallet(wallet), nil
|
|
|
|
}
|
2021-06-16 14:07:31 +00:00
|
|
|
|
|
|
|
// LoadPublicKey returns ecdsa.PublicKey from hex string.
|
|
|
|
func LoadPublicKey(val string) (*ecdsa.PublicKey, error) {
|
|
|
|
data, err := hex.DecodeString(val)
|
|
|
|
if err != nil {
|
|
|
|
return nil, fmt.Errorf("unknown key format (%q), expect: hex-string", val)
|
|
|
|
}
|
|
|
|
|
|
|
|
if key := crypto.UnmarshalPublicKey(data); key != nil {
|
|
|
|
return key, nil
|
|
|
|
}
|
|
|
|
return nil, fmt.Errorf("couldn't unmarshal public key (%q)", val)
|
|
|
|
}
|