2020-07-15 13:48:25 +00:00
|
|
|
package auth
|
|
|
|
|
|
|
|
import (
|
|
|
|
"crypto/ecdsa"
|
|
|
|
"crypto/elliptic"
|
|
|
|
"crypto/rand"
|
|
|
|
"crypto/rsa"
|
|
|
|
"crypto/sha256"
|
|
|
|
"crypto/x509"
|
|
|
|
"encoding/pem"
|
|
|
|
"io/ioutil"
|
|
|
|
"os"
|
|
|
|
|
|
|
|
"github.com/pkg/errors"
|
|
|
|
)
|
|
|
|
|
2020-07-15 15:20:45 +00:00
|
|
|
// const (
|
|
|
|
// // PathToUserAuthPrivateKeyFile is a linux-specific predefined path
|
|
|
|
// // to a persisted RSA private key for authenticating at S3 server.
|
|
|
|
// PathToUserAuthPrivateKeyFile = "/etc/neofs/1.pem"
|
|
|
|
// // PathToNeoFSECDSAPrivateKeyFile is a linux-specific predefined path
|
|
|
|
// // to a persisted ECDSA private key for accessing NeoFS network.
|
|
|
|
// PathToNeoFSECDSAPrivateKeyFile = "/etc/neofs/2.pem"
|
|
|
|
// )
|
2020-07-15 13:48:25 +00:00
|
|
|
|
|
|
|
const (
|
|
|
|
gatewayEncryptionKeySize = 4096
|
|
|
|
)
|
|
|
|
|
|
|
|
const (
|
|
|
|
_ encryptionKeyName = iota
|
|
|
|
// Indicates that the key is used to encrypt
|
|
|
|
// a bearer token to pass auth procedure.
|
|
|
|
gateUserAuthKey
|
|
|
|
)
|
|
|
|
|
|
|
|
const (
|
|
|
|
_ signatureKeyName = iota
|
|
|
|
// Indicates that the key is a NeoFS ECDSA key.
|
|
|
|
gateNeoFSECDSAKey
|
|
|
|
// Indicates that the key is a NeoFS Ed25519 key.
|
|
|
|
gateNeoFSEd25519Key
|
|
|
|
)
|
|
|
|
|
|
|
|
type (
|
|
|
|
signatureKeyName byte
|
|
|
|
encryptionKeyName byte
|
|
|
|
)
|
|
|
|
|
|
|
|
type (
|
|
|
|
signatureKeyPair struct {
|
|
|
|
PrivateKey *ecdsa.PrivateKey
|
|
|
|
PublicKey *ecdsa.PublicKey
|
|
|
|
}
|
|
|
|
|
|
|
|
encryptionKeyPair struct {
|
|
|
|
PrivateKey *rsa.PrivateKey
|
|
|
|
PublicKey *rsa.PublicKey
|
|
|
|
}
|
|
|
|
)
|
|
|
|
|
|
|
|
type secureEnclave struct {
|
|
|
|
signatureKeys map[signatureKeyName]signatureKeyPair
|
|
|
|
encryptionKeys map[encryptionKeyName]encryptionKeyPair
|
|
|
|
}
|
|
|
|
|
2020-07-15 15:20:45 +00:00
|
|
|
func newSecureEnclave(pathToRSAKey, pathToECDSAKey string) (*secureEnclave, error) {
|
2020-07-15 13:48:25 +00:00
|
|
|
var (
|
2020-07-15 15:20:45 +00:00
|
|
|
rsaKey *rsa.PrivateKey
|
|
|
|
ecdsaKey *ecdsa.PrivateKey
|
2020-07-15 13:48:25 +00:00
|
|
|
)
|
2020-07-15 15:20:45 +00:00
|
|
|
if key1bs, err := ioutil.ReadFile(pathToRSAKey); err != nil {
|
2020-07-15 13:48:25 +00:00
|
|
|
// No file found.
|
|
|
|
if os.IsNotExist(err) {
|
2020-07-15 15:20:45 +00:00
|
|
|
if rsaKey, err = rsa.GenerateKey(rand.Reader, gatewayEncryptionKeySize); err != nil {
|
2020-07-15 13:48:25 +00:00
|
|
|
return nil, errors.Wrap(err, "failed to generate RSA key")
|
|
|
|
}
|
2020-07-15 15:20:45 +00:00
|
|
|
key1bs := x509.MarshalPKCS1PrivateKey(rsaKey)
|
2020-07-15 13:48:25 +00:00
|
|
|
data := pem.EncodeToMemory(&pem.Block{Type: "RSA PRIVATE KEY", Bytes: key1bs})
|
2020-07-15 15:20:45 +00:00
|
|
|
if err := ioutil.WriteFile(pathToRSAKey, data, 0o600); err != nil {
|
|
|
|
return nil, errors.Wrapf(err, "failed to write file %s", pathToRSAKey)
|
2020-07-15 13:48:25 +00:00
|
|
|
}
|
|
|
|
} else {
|
2020-07-15 15:20:45 +00:00
|
|
|
return nil, errors.Wrapf(err, "failed to open file %s", pathToRSAKey)
|
2020-07-15 13:48:25 +00:00
|
|
|
}
|
|
|
|
} else {
|
|
|
|
pemBlock, _ := pem.Decode(key1bs)
|
|
|
|
if pemBlock == nil {
|
2020-07-15 15:20:45 +00:00
|
|
|
return nil, errors.Errorf("failed to decode PEM data from file %s", pathToRSAKey)
|
2020-07-15 13:48:25 +00:00
|
|
|
}
|
2020-07-15 15:20:45 +00:00
|
|
|
rsaKey, err = x509.ParsePKCS1PrivateKey(pemBlock.Bytes)
|
2020-07-15 13:48:25 +00:00
|
|
|
if err != nil {
|
2020-07-15 15:20:45 +00:00
|
|
|
return nil, errors.Wrapf(err, "failed to parse private key bytes from pem data from file %s", pathToRSAKey)
|
2020-07-15 13:48:25 +00:00
|
|
|
}
|
|
|
|
}
|
2020-07-15 15:20:45 +00:00
|
|
|
if key2bs, err := ioutil.ReadFile(pathToECDSAKey); err != nil {
|
2020-07-15 13:48:25 +00:00
|
|
|
// No file found.
|
|
|
|
if os.IsNotExist(err) {
|
2020-07-15 15:20:45 +00:00
|
|
|
if ecdsaKey, err = ecdsa.GenerateKey(elliptic.P256(), rand.Reader); err != nil {
|
2020-07-15 13:48:25 +00:00
|
|
|
return nil, errors.Wrap(err, "failed to generate ECDSA key")
|
|
|
|
}
|
2020-07-15 15:20:45 +00:00
|
|
|
key2bs, err := x509.MarshalECPrivateKey(ecdsaKey)
|
2020-07-15 13:48:25 +00:00
|
|
|
if err != nil {
|
|
|
|
return nil, errors.New("failed to marshal ECDSA private key")
|
|
|
|
}
|
|
|
|
data := pem.EncodeToMemory(&pem.Block{Type: "EC PRIVATE KEY", Bytes: key2bs})
|
2020-07-15 15:20:45 +00:00
|
|
|
if err := ioutil.WriteFile(pathToECDSAKey, data, 0o600); err != nil {
|
|
|
|
return nil, errors.Wrapf(err, "failed to write file %s", pathToECDSAKey)
|
2020-07-15 13:48:25 +00:00
|
|
|
}
|
|
|
|
} else {
|
2020-07-15 15:20:45 +00:00
|
|
|
return nil, errors.Wrapf(err, "failed to open file %s", pathToECDSAKey)
|
2020-07-15 13:48:25 +00:00
|
|
|
}
|
|
|
|
} else {
|
|
|
|
pemBlock, _ := pem.Decode(key2bs)
|
|
|
|
if pemBlock == nil {
|
2020-07-15 15:20:45 +00:00
|
|
|
return nil, errors.Errorf("failed to decode PEM data from file %s", pathToECDSAKey)
|
2020-07-15 13:48:25 +00:00
|
|
|
}
|
2020-07-15 15:20:45 +00:00
|
|
|
ecdsaKey, err = x509.ParseECPrivateKey(pemBlock.Bytes)
|
2020-07-15 13:48:25 +00:00
|
|
|
if err != nil {
|
2020-07-15 15:20:45 +00:00
|
|
|
return nil, errors.Wrapf(err, "failed to parse private key bytes from pem data from file %s", pathToECDSAKey)
|
2020-07-15 13:48:25 +00:00
|
|
|
}
|
|
|
|
}
|
|
|
|
return &secureEnclave{
|
|
|
|
encryptionKeys: map[encryptionKeyName]encryptionKeyPair{
|
2020-07-15 15:20:45 +00:00
|
|
|
gateUserAuthKey: {rsaKey, &rsaKey.PublicKey},
|
2020-07-15 13:48:25 +00:00
|
|
|
},
|
|
|
|
signatureKeys: map[signatureKeyName]signatureKeyPair{
|
2020-07-15 15:20:45 +00:00
|
|
|
gateNeoFSECDSAKey: {ecdsaKey, &ecdsaKey.PublicKey},
|
2020-07-15 13:48:25 +00:00
|
|
|
},
|
|
|
|
}, nil
|
|
|
|
}
|
|
|
|
|
|
|
|
func (se *secureEnclave) Encrypt(keyName encryptionKeyName, data []byte) ([]byte, error) {
|
|
|
|
return rsa.EncryptOAEP(sha256.New(), rand.Reader, se.encryptionKeys[keyName].PublicKey, data, []byte{})
|
|
|
|
}
|
|
|
|
|
|
|
|
func (se *secureEnclave) Decrypt(keyName encryptionKeyName, data []byte) ([]byte, error) {
|
|
|
|
return rsa.DecryptOAEP(sha256.New(), rand.Reader, se.encryptionKeys[keyName].PrivateKey, data, []byte{})
|
|
|
|
}
|