2019-01-23 21:42:10 +00:00
|
|
|
package sshgen
|
|
|
|
|
|
|
|
import (
|
|
|
|
"bytes"
|
|
|
|
"crypto/ecdsa"
|
|
|
|
"crypto/elliptic"
|
|
|
|
"crypto/rand"
|
|
|
|
"crypto/x509"
|
|
|
|
"encoding/json"
|
|
|
|
"encoding/pem"
|
2019-05-13 19:38:36 +00:00
|
|
|
"fmt"
|
|
|
|
"io"
|
2019-01-23 21:42:10 +00:00
|
|
|
"io/ioutil"
|
|
|
|
"net/http"
|
2021-03-24 21:31:02 +00:00
|
|
|
"net/url"
|
2019-01-23 21:42:10 +00:00
|
|
|
"time"
|
|
|
|
|
|
|
|
homedir "github.com/mitchellh/go-homedir"
|
2019-10-09 21:56:47 +00:00
|
|
|
"github.com/pkg/errors"
|
2019-01-23 21:42:10 +00:00
|
|
|
gossh "golang.org/x/crypto/ssh"
|
2022-02-05 15:39:29 +00:00
|
|
|
"gopkg.in/square/go-jose.v2/jwt"
|
2021-03-23 14:30:43 +00:00
|
|
|
|
2021-03-08 16:46:23 +00:00
|
|
|
"github.com/cloudflare/cloudflared/config"
|
|
|
|
cfpath "github.com/cloudflare/cloudflared/token"
|
2019-01-23 21:42:10 +00:00
|
|
|
)
|
|
|
|
|
|
|
|
const (
|
|
|
|
signEndpoint = "/cdn-cgi/access/cert_sign"
|
|
|
|
keyName = "cf_key"
|
|
|
|
)
|
|
|
|
|
|
|
|
// signPayload represents the request body sent to the sign handler API
|
|
|
|
type signPayload struct {
|
|
|
|
PublicKey string `json:"public_key"`
|
|
|
|
JWT string `json:"jwt"`
|
|
|
|
Issuer string `json:"issuer"`
|
|
|
|
}
|
|
|
|
|
|
|
|
// signResponse represents the response body from the sign handler API
|
|
|
|
type signResponse struct {
|
|
|
|
KeyID string `json:"id"`
|
|
|
|
Certificate string `json:"certificate"`
|
|
|
|
ExpiresAt time.Time `json:"expires_at"`
|
|
|
|
}
|
|
|
|
|
2019-05-13 19:38:36 +00:00
|
|
|
// ErrorResponse struct stores error information after any error-prone function
|
|
|
|
type errorResponse struct {
|
|
|
|
Status int `json:"status"`
|
|
|
|
Message string `json:"message"`
|
|
|
|
}
|
|
|
|
|
|
|
|
var mockRequest func(url, contentType string, body io.Reader) (*http.Response, error) = nil
|
|
|
|
|
2019-01-23 21:42:10 +00:00
|
|
|
// GenerateShortLivedCertificate generates and stores a keypair for short lived certs
|
2021-03-24 21:31:02 +00:00
|
|
|
func GenerateShortLivedCertificate(appURL *url.URL, token string) error {
|
|
|
|
fullName, err := cfpath.GenerateSSHCertFilePathFromURL(appURL, keyName)
|
2019-01-23 21:42:10 +00:00
|
|
|
if err != nil {
|
|
|
|
return err
|
|
|
|
}
|
|
|
|
|
|
|
|
cert, err := handleCertificateGeneration(token, fullName)
|
|
|
|
if err != nil {
|
|
|
|
return err
|
|
|
|
}
|
|
|
|
|
|
|
|
name := fullName + "-cert.pub"
|
|
|
|
if err := writeKey(name, []byte(cert)); err != nil {
|
|
|
|
return err
|
|
|
|
}
|
|
|
|
|
|
|
|
return nil
|
|
|
|
}
|
|
|
|
|
|
|
|
// handleCertificateGeneration takes a JWT and uses it build a signPayload
|
|
|
|
// to send to the Sign endpoint with the public key from the keypair it generated
|
|
|
|
func handleCertificateGeneration(token, fullName string) (string, error) {
|
2019-10-09 21:56:47 +00:00
|
|
|
pub, err := generateKeyPair(fullName)
|
|
|
|
if err != nil {
|
|
|
|
return "", err
|
|
|
|
}
|
|
|
|
|
|
|
|
return SignCert(token, string(pub))
|
|
|
|
}
|
|
|
|
|
|
|
|
func SignCert(token, pubKey string) (string, error) {
|
2019-01-23 21:42:10 +00:00
|
|
|
if token == "" {
|
|
|
|
return "", errors.New("invalid token")
|
|
|
|
}
|
|
|
|
|
2022-02-05 15:39:29 +00:00
|
|
|
parsedToken, err := jwt.ParseSigned(token)
|
2019-01-23 21:42:10 +00:00
|
|
|
if err != nil {
|
2019-10-09 21:56:47 +00:00
|
|
|
return "", errors.Wrap(err, "failed to parse JWT")
|
2019-01-23 21:42:10 +00:00
|
|
|
}
|
|
|
|
|
2022-02-05 15:39:29 +00:00
|
|
|
claims := jwt.Claims{}
|
|
|
|
err = parsedToken.UnsafeClaimsWithoutVerification(&claims)
|
2019-01-23 21:42:10 +00:00
|
|
|
if err != nil {
|
2019-10-09 21:56:47 +00:00
|
|
|
return "", errors.Wrap(err, "failed to retrieve JWT claims")
|
2019-01-23 21:42:10 +00:00
|
|
|
}
|
|
|
|
|
|
|
|
buf, err := json.Marshal(&signPayload{
|
2019-10-09 21:56:47 +00:00
|
|
|
PublicKey: pubKey,
|
2019-01-23 21:42:10 +00:00
|
|
|
JWT: token,
|
2022-02-05 15:39:29 +00:00
|
|
|
Issuer: claims.Issuer,
|
2019-01-23 21:42:10 +00:00
|
|
|
})
|
|
|
|
if err != nil {
|
2019-10-09 21:56:47 +00:00
|
|
|
return "", errors.Wrap(err, "failed to marshal signPayload")
|
2019-01-23 21:42:10 +00:00
|
|
|
}
|
2019-05-13 19:38:36 +00:00
|
|
|
var res *http.Response
|
|
|
|
if mockRequest != nil {
|
2022-02-05 15:39:29 +00:00
|
|
|
res, err = mockRequest(claims.Issuer+signEndpoint, "application/json", bytes.NewBuffer(buf))
|
2019-05-13 19:38:36 +00:00
|
|
|
} else {
|
2019-10-09 21:56:47 +00:00
|
|
|
client := http.Client{
|
|
|
|
Timeout: 10 * time.Second,
|
|
|
|
}
|
2022-02-05 15:39:29 +00:00
|
|
|
res, err = client.Post(claims.Issuer+signEndpoint, "application/json", bytes.NewBuffer(buf))
|
2019-05-13 19:38:36 +00:00
|
|
|
}
|
|
|
|
|
2019-01-23 21:42:10 +00:00
|
|
|
if err != nil {
|
2019-10-09 21:56:47 +00:00
|
|
|
return "", errors.Wrap(err, "failed to send request")
|
2019-01-23 21:42:10 +00:00
|
|
|
}
|
|
|
|
defer res.Body.Close()
|
|
|
|
|
|
|
|
decoder := json.NewDecoder(res.Body)
|
2019-05-13 19:38:36 +00:00
|
|
|
|
|
|
|
if res.StatusCode != 200 {
|
|
|
|
var errResponse errorResponse
|
|
|
|
if err := decoder.Decode(&errResponse); err != nil {
|
|
|
|
return "", err
|
|
|
|
}
|
|
|
|
return "", fmt.Errorf("%d: %s", errResponse.Status, errResponse.Message)
|
|
|
|
}
|
|
|
|
|
2019-01-23 21:42:10 +00:00
|
|
|
var signRes signResponse
|
|
|
|
if err := decoder.Decode(&signRes); err != nil {
|
2019-10-09 21:56:47 +00:00
|
|
|
return "", errors.Wrap(err, "failed to decode HTTP response")
|
2019-01-23 21:42:10 +00:00
|
|
|
}
|
2019-10-09 21:56:47 +00:00
|
|
|
return signRes.Certificate, nil
|
2019-01-23 21:42:10 +00:00
|
|
|
}
|
|
|
|
|
|
|
|
// generateKeyPair creates a EC keypair (P256) and stores them in the homedir.
|
|
|
|
// returns the generated public key from the successful keypair generation
|
|
|
|
func generateKeyPair(fullName string) ([]byte, error) {
|
|
|
|
pubKeyName := fullName + ".pub"
|
|
|
|
|
|
|
|
exist, err := config.FileExists(pubKeyName)
|
|
|
|
if err != nil {
|
|
|
|
return nil, err
|
|
|
|
}
|
|
|
|
if exist {
|
|
|
|
return ioutil.ReadFile(pubKeyName)
|
|
|
|
}
|
|
|
|
|
|
|
|
key, err := ecdsa.GenerateKey(elliptic.P256(), rand.Reader)
|
|
|
|
if err != nil {
|
|
|
|
return nil, err
|
|
|
|
}
|
|
|
|
parsed, err := x509.MarshalECPrivateKey(key)
|
|
|
|
if err != nil {
|
|
|
|
return nil, err
|
|
|
|
}
|
|
|
|
|
|
|
|
if err := writeKey(fullName, pem.EncodeToMemory(&pem.Block{
|
|
|
|
Type: "EC PRIVATE KEY",
|
|
|
|
Bytes: parsed,
|
|
|
|
})); err != nil {
|
|
|
|
return nil, err
|
|
|
|
}
|
|
|
|
|
|
|
|
pub, err := gossh.NewPublicKey(&key.PublicKey)
|
|
|
|
if err != nil {
|
|
|
|
return nil, err
|
|
|
|
}
|
|
|
|
data := gossh.MarshalAuthorizedKey(pub)
|
|
|
|
|
|
|
|
if err := writeKey(pubKeyName, data); err != nil {
|
|
|
|
return nil, err
|
|
|
|
}
|
|
|
|
|
|
|
|
return data, nil
|
|
|
|
}
|
|
|
|
|
|
|
|
// writeKey will write a key to disk in DER format (it's a standard pem key)
|
|
|
|
func writeKey(filename string, data []byte) error {
|
|
|
|
filepath, err := homedir.Expand(filename)
|
|
|
|
if err != nil {
|
|
|
|
return err
|
|
|
|
}
|
|
|
|
|
|
|
|
return ioutil.WriteFile(filepath, data, 0600)
|
|
|
|
}
|