pixiecore: factor out URL signing/decoding, and unit test it.

This commit is contained in:
David Anderson 2016-08-14 21:46:12 -07:00
parent 4941f47975
commit f904f42035
3 changed files with 132 additions and 64 deletions

View File

@ -16,9 +16,7 @@ package pixiecore
import (
"crypto/rand"
"encoding/base64"
"encoding/json"
"errors"
"fmt"
"io"
"net"
@ -30,8 +28,6 @@ import (
"strings"
"text/template"
"time"
"golang.org/x/crypto/nacl/secretbox"
)
// StaticBooter boots all machines with the same Spec.
@ -188,11 +184,11 @@ func (b *apibooter) BootSpec(m Machine) (*Spec, error) {
ret := Spec{
Message: r.Message,
}
if ret.Kernel, err = b.signURL(r.Kernel); err != nil {
if ret.Kernel, err = signURL(r.Kernel, &b.key); err != nil {
return nil, err
}
for _, img := range r.Initrd {
initrd, err := b.signURL(img)
initrd, err := signURL(img, &b.key)
if err != nil {
return nil, err
}
@ -217,7 +213,7 @@ func (b *apibooter) BootSpec(m Machine) (*Spec, error) {
}
func (b *apibooter) ReadBootFile(id ID) (io.ReadCloser, error) {
urlStr, err := b.getURL(id)
urlStr, err := getURL(id, &b.key)
if err != nil {
return nil, err
}
@ -228,12 +224,20 @@ func (b *apibooter) ReadBootFile(id ID) (io.ReadCloser, error) {
}
var ret io.ReadCloser
if u.Scheme == "file" {
ret, err = b.readLocal(u)
ret, err = os.Open(u.Path)
} else {
// urlStr will get reparsed by http.Get, which is mildly
// wasteful, but the code looks nicer than constructing a
// Request.
ret, err = b.readRemote(urlStr)
resp, err := http.Get(urlStr)
if err != nil {
return nil, err
}
if resp.StatusCode != 200 {
return nil, fmt.Errorf("GET %q failed: %s", urlStr, resp.Status)
}
ret, err = resp.Body, nil
}
if err != nil {
return nil, err
@ -242,7 +246,7 @@ func (b *apibooter) ReadBootFile(id ID) (io.ReadCloser, error) {
}
func (b *apibooter) WriteBootFile(id ID, body io.Reader) error {
u, err := b.getURL(id)
u, err := getURL(id, &b.key)
if err != nil {
return err
}
@ -296,7 +300,7 @@ func (b *apibooter) constructCmdline(m map[string]interface{}) (string, error) {
if err != nil {
return "", fmt.Errorf("invalid url for cmdline key %q: %s", k, err)
}
encoded, err := b.signURL(urlStr)
encoded, err := signURL(urlStr, &b.key)
if err != nil {
return "", err
}
@ -307,56 +311,3 @@ func (b *apibooter) constructCmdline(m map[string]interface{}) (string, error) {
}
return strings.Join(ret, " "), nil
}
func (b *apibooter) signURL(u string) (ID, error) {
var nonce [24]byte
if _, err := io.ReadFull(rand.Reader, nonce[:]); err != nil {
return "", fmt.Errorf("could not read randomness for signing nonce: %s", err)
}
out := nonce[:]
// Secretbox is authenticated encryption. In theory we only need
// symmetric authentication, but secretbox is stupidly simple to
// use and hard to get wrong, and the encryption overhead should
// be tiny for such a small URL unless you're trying to
// simultaneously netboot a million machines. This is one case
// where convenience and certainty that you got it right trumps
// pure efficiency.
out = secretbox.Seal(out, []byte(u), &nonce, &b.key)
return ID(base64.URLEncoding.EncodeToString(out)), nil
}
func (b *apibooter) getURL(signedStr ID) (string, error) {
signed, err := base64.URLEncoding.DecodeString(string(signedStr))
if err != nil {
return "", err
}
if len(signed) < 24 {
return "", errors.New("signed blob too short to be valid")
}
var nonce [24]byte
copy(nonce[:], signed)
out, ok := secretbox.Open(nil, []byte(signed[24:]), &nonce, &b.key)
if !ok {
return "", errors.New("signature verification failed")
}
return string(out), nil
}
func (b *apibooter) readLocal(u *url.URL) (io.ReadCloser, error) {
return os.Open(u.Path)
}
func (b *apibooter) readRemote(u string) (io.ReadCloser, error) {
resp, err := http.Get(u)
if err != nil {
return nil, err
}
if resp.StatusCode != 200 {
return nil, fmt.Errorf("GET %q failed: %s", u, resp.Status)
}
return resp.Body, nil
}

66
pixiecore/urlsign.go Normal file
View File

@ -0,0 +1,66 @@
// Copyright 2016 Google Inc.
//
// Licensed under the Apache License, Version 2.0 (the "License");
// you may not use this file except in compliance with the License.
// You may obtain a copy of the License at
//
// http://www.apache.org/licenses/LICENSE-2.0
//
// Unless required by applicable law or agreed to in writing, software
// distributed under the License is distributed on an "AS IS" BASIS,
// WITHOUT WARRANTIES OR CONDITIONS OF ANY KIND, either express or implied.
// See the License for the specific language governing permissions and
// limitations under the License.
package pixiecore
import (
"crypto/rand"
"encoding/base64"
"errors"
"fmt"
"io"
"golang.org/x/crypto/nacl/secretbox"
)
// signURL constructs an ID from u, signed with key.
func signURL(u string, key *[32]byte) (ID, error) {
var nonce [24]byte
if _, err := io.ReadFull(rand.Reader, nonce[:]); err != nil {
return "", fmt.Errorf("could not read randomness for signing nonce: %s", err)
}
out := nonce[:]
// Secretbox is authenticated encryption. In theory we only need
// symmetric authentication, but secretbox is stupidly simple to
// use and hard to get wrong, and the encryption overhead should
// be tiny for such a small URL unless you're trying to
// simultaneously netboot a million machines. This is one case
// where convenience and certainty that you got it right trumps
// pure efficiency.
out = secretbox.Seal(out, []byte(u), &nonce, key)
return ID(base64.URLEncoding.EncodeToString(out)), nil
}
// getURL returns the URL contained within id.
//
// id must have been created by signURL, with key.
func getURL(id ID, key *[32]byte) (string, error) {
signed, err := base64.URLEncoding.DecodeString(string(id))
if err != nil {
return "", err
}
if len(signed) < 24 {
return "", errors.New("signed blob too short to be valid")
}
var nonce [24]byte
copy(nonce[:], signed)
out, ok := secretbox.Open(nil, []byte(signed[24:]), &nonce, key)
if !ok {
return "", errors.New("signature verification failed")
}
return string(out), nil
}

51
pixiecore/urlsign_test.go Normal file
View File

@ -0,0 +1,51 @@
// Copyright 2016 Google Inc.
//
// Licensed under the Apache License, Version 2.0 (the "License");
// you may not use this file except in compliance with the License.
// You may obtain a copy of the License at
//
// http://www.apache.org/licenses/LICENSE-2.0
//
// Unless required by applicable law or agreed to in writing, software
// distributed under the License is distributed on an "AS IS" BASIS,
// WITHOUT WARRANTIES OR CONDITIONS OF ANY KIND, either express or implied.
// See the License for the specific language governing permissions and
// limitations under the License.
package pixiecore
import (
"crypto/rand"
"io"
"testing"
)
func TestSignURL(t *testing.T) {
var k [32]byte
if _, err := io.ReadFull(rand.Reader, k[:]); err != nil {
t.Fatalf("could not read randomness for signing nonce: %s", err)
}
u := "http://test.example/foo/bar"
id, err := signURL(u, &k)
if err != nil {
t.Fatalf("URL signing failed: %s", err)
}
u2, err := getURL(id, &k)
if err != nil {
t.Fatalf("URL decoding failed: %s", err)
}
if u != u2 {
t.Fatalf("getURL(signURL(%q)) = %q, which isn't the same thing", u, u2)
}
// Corrupt the signed thing
id += "d"
_, err = getURL(id, &k)
if err == nil {
t.Fatalf("Corrupted id %q decoded correctly", id)
}
}