2023-02-02 10:55:24 +01:00
|
|
|
package server
|
|
|
|
|
|
|
|
import (
|
|
|
|
"context"
|
|
|
|
"fmt"
|
|
|
|
"log"
|
|
|
|
"net"
|
|
|
|
"net/http"
|
2023-07-26 15:14:49 +02:00
|
|
|
"reflect"
|
|
|
|
"strings"
|
|
|
|
"time"
|
2023-02-02 10:55:24 +01:00
|
|
|
|
2023-03-07 23:10:42 +01:00
|
|
|
"forge.cadoles.com/Cadoles/emissary/internal/auth/agent"
|
2024-02-27 14:14:30 +01:00
|
|
|
"forge.cadoles.com/Cadoles/emissary/internal/auth/user"
|
2023-02-02 10:55:24 +01:00
|
|
|
"forge.cadoles.com/Cadoles/emissary/internal/config"
|
|
|
|
"forge.cadoles.com/Cadoles/emissary/internal/datastore"
|
2023-03-07 23:10:42 +01:00
|
|
|
"forge.cadoles.com/Cadoles/emissary/internal/jwk"
|
2024-02-27 09:56:15 +01:00
|
|
|
"forge.cadoles.com/Cadoles/emissary/internal/server/api"
|
2023-07-26 15:14:49 +02:00
|
|
|
"github.com/antonmedv/expr"
|
|
|
|
"github.com/antonmedv/expr/vm"
|
2023-11-30 16:01:35 +01:00
|
|
|
"github.com/go-chi/chi/v5"
|
|
|
|
"github.com/go-chi/chi/v5/middleware"
|
2023-02-02 10:55:24 +01:00
|
|
|
"github.com/go-chi/cors"
|
2023-07-26 15:14:49 +02:00
|
|
|
"github.com/lestrrat-go/jwx/v2/jwa"
|
|
|
|
"github.com/lestrrat-go/jwx/v2/jwt"
|
2023-02-02 10:55:24 +01:00
|
|
|
"github.com/pkg/errors"
|
|
|
|
"gitlab.com/wpetit/goweb/logger"
|
|
|
|
)
|
|
|
|
|
|
|
|
type Server struct {
|
2024-02-27 14:14:30 +01:00
|
|
|
conf config.ServerConfig
|
|
|
|
agentRepo datastore.AgentRepository
|
|
|
|
tenantRepo datastore.TenantRepository
|
2023-02-02 10:55:24 +01:00
|
|
|
}
|
|
|
|
|
|
|
|
func (s *Server) Start(ctx context.Context) (<-chan net.Addr, <-chan error) {
|
|
|
|
errs := make(chan error)
|
|
|
|
addrs := make(chan net.Addr)
|
|
|
|
|
|
|
|
go s.run(ctx, addrs, errs)
|
|
|
|
|
|
|
|
return addrs, errs
|
|
|
|
}
|
|
|
|
|
|
|
|
func (s *Server) run(parentCtx context.Context, addrs chan net.Addr, errs chan error) {
|
|
|
|
defer func() {
|
|
|
|
close(errs)
|
|
|
|
close(addrs)
|
|
|
|
}()
|
|
|
|
|
|
|
|
ctx, cancel := context.WithCancel(parentCtx)
|
|
|
|
defer cancel()
|
|
|
|
|
|
|
|
if err := s.initRepositories(ctx); err != nil {
|
|
|
|
errs <- errors.WithStack(err)
|
|
|
|
|
|
|
|
return
|
|
|
|
}
|
|
|
|
|
|
|
|
listener, err := net.Listen("tcp", fmt.Sprintf("%s:%d", s.conf.HTTP.Host, s.conf.HTTP.Port))
|
|
|
|
if err != nil {
|
|
|
|
errs <- errors.WithStack(err)
|
|
|
|
|
|
|
|
return
|
|
|
|
}
|
|
|
|
|
|
|
|
addrs <- listener.Addr()
|
|
|
|
|
|
|
|
defer func() {
|
|
|
|
if err := listener.Close(); err != nil && !errors.Is(err, net.ErrClosed) {
|
|
|
|
errs <- errors.WithStack(err)
|
|
|
|
}
|
|
|
|
}()
|
|
|
|
|
|
|
|
go func() {
|
|
|
|
<-ctx.Done()
|
|
|
|
|
|
|
|
if err := listener.Close(); err != nil && !errors.Is(err, net.ErrClosed) {
|
|
|
|
log.Printf("%+v", errors.WithStack(err))
|
|
|
|
}
|
|
|
|
}()
|
|
|
|
|
|
|
|
router := chi.NewRouter()
|
|
|
|
|
|
|
|
router.Use(middleware.Logger)
|
|
|
|
|
|
|
|
corsMiddleware := cors.New(cors.Options{
|
|
|
|
AllowedOrigins: s.conf.CORS.AllowedOrigins,
|
|
|
|
AllowedMethods: s.conf.CORS.AllowedMethods,
|
|
|
|
AllowCredentials: bool(s.conf.CORS.AllowCredentials),
|
|
|
|
AllowedHeaders: s.conf.CORS.AllowedHeaders,
|
|
|
|
Debug: bool(s.conf.CORS.Debug),
|
|
|
|
})
|
|
|
|
|
|
|
|
router.Use(corsMiddleware.Handler)
|
|
|
|
|
2024-02-27 14:14:30 +01:00
|
|
|
userAuth, err := s.getUserAuthenticator()
|
2023-07-26 15:14:49 +02:00
|
|
|
if err != nil {
|
|
|
|
errs <- errors.WithStack(err)
|
|
|
|
|
|
|
|
return
|
|
|
|
}
|
|
|
|
|
2023-02-02 10:55:24 +01:00
|
|
|
router.Route("/api/v1", func(r chi.Router) {
|
2024-02-27 09:56:15 +01:00
|
|
|
apiMount := api.NewMount(
|
|
|
|
s.agentRepo,
|
2024-02-27 14:14:30 +01:00
|
|
|
s.tenantRepo,
|
|
|
|
userAuth,
|
2024-02-27 09:56:15 +01:00
|
|
|
agent.NewAuthenticator(s.agentRepo, agent.DefaultAcceptableSkew),
|
|
|
|
)
|
2023-02-02 10:55:24 +01:00
|
|
|
|
2024-02-27 09:56:15 +01:00
|
|
|
apiMount.Mount(r)
|
2023-02-02 10:55:24 +01:00
|
|
|
})
|
|
|
|
|
|
|
|
logger.Info(ctx, "http server listening")
|
|
|
|
|
|
|
|
if err := http.Serve(listener, router); err != nil && !errors.Is(err, net.ErrClosed) {
|
|
|
|
errs <- errors.WithStack(err)
|
|
|
|
}
|
|
|
|
|
|
|
|
logger.Info(ctx, "http server exiting")
|
|
|
|
}
|
|
|
|
|
2024-02-27 14:14:30 +01:00
|
|
|
func (s *Server) getUserAuthenticator() (*user.Authenticator, error) {
|
2023-07-26 15:14:49 +02:00
|
|
|
var localPublicKey jwk.Key
|
|
|
|
|
|
|
|
localAuth := s.conf.Auth.Local
|
|
|
|
if localAuth != nil {
|
|
|
|
key, err := jwk.LoadOrGenerate(string(localAuth.PrivateKeyPath), jwk.DefaultKeySize)
|
|
|
|
if err != nil {
|
|
|
|
return nil, errors.WithStack(err)
|
|
|
|
}
|
|
|
|
|
|
|
|
publicKey, err := key.PublicKey()
|
|
|
|
if err != nil {
|
|
|
|
return nil, errors.WithStack(err)
|
|
|
|
}
|
|
|
|
|
|
|
|
if err := publicKey.Set(jwk.AlgorithmKey, jwa.RS256); err != nil {
|
|
|
|
return nil, errors.WithStack(err)
|
|
|
|
}
|
|
|
|
|
|
|
|
localPublicKey = publicKey
|
|
|
|
}
|
|
|
|
|
2024-02-27 14:14:30 +01:00
|
|
|
var getRemoteKeySet user.GetKeySet
|
2023-07-26 15:14:49 +02:00
|
|
|
|
|
|
|
remoteAuth := s.conf.Auth.Remote
|
|
|
|
if remoteAuth != nil {
|
|
|
|
refreshInterval := time.Minute * 15
|
|
|
|
if remoteAuth.RefreshInterval != nil {
|
|
|
|
refreshInterval = time.Duration(*remoteAuth.RefreshInterval)
|
|
|
|
}
|
|
|
|
|
|
|
|
fn, err := jwk.CreateCachedRemoteKeySet(context.Background(), string(remoteAuth.JsonWebKeySetURL), refreshInterval)
|
|
|
|
if err != nil {
|
|
|
|
return nil, errors.WithStack(err)
|
|
|
|
}
|
|
|
|
|
|
|
|
getRemoteKeySet = fn
|
|
|
|
}
|
|
|
|
|
|
|
|
getKeySet := func(ctx context.Context) (jwk.Set, error) {
|
|
|
|
keySet := jwk.NewSet()
|
|
|
|
|
|
|
|
if localPublicKey != nil {
|
|
|
|
if err := keySet.AddKey(localPublicKey); err != nil {
|
|
|
|
return nil, errors.WithStack(err)
|
|
|
|
}
|
|
|
|
}
|
|
|
|
|
|
|
|
if getRemoteKeySet != nil {
|
|
|
|
remoteKeySet, err := getRemoteKeySet(ctx)
|
|
|
|
if err != nil {
|
|
|
|
return nil, errors.WithStack(err)
|
|
|
|
}
|
|
|
|
|
|
|
|
for idx := 0; idx < remoteKeySet.Len(); idx++ {
|
|
|
|
key, ok := remoteKeySet.Key(idx)
|
|
|
|
if !ok {
|
|
|
|
break
|
|
|
|
}
|
|
|
|
|
|
|
|
if err := keySet.AddKey(key); err != nil {
|
|
|
|
return nil, errors.WithStack(err)
|
|
|
|
}
|
|
|
|
}
|
|
|
|
}
|
|
|
|
|
|
|
|
return keySet, nil
|
|
|
|
}
|
|
|
|
|
|
|
|
getTokenRole, err := s.createGetTokenRoleFunc()
|
|
|
|
if err != nil {
|
|
|
|
return nil, errors.WithStack(err)
|
|
|
|
}
|
|
|
|
|
2024-02-26 18:20:40 +01:00
|
|
|
getTenantRole, err := s.createGetTokenTenantFunc()
|
|
|
|
if err != nil {
|
|
|
|
return nil, errors.WithStack(err)
|
2023-07-26 15:14:49 +02:00
|
|
|
}
|
|
|
|
|
2024-02-27 14:14:30 +01:00
|
|
|
return user.NewAuthenticator(getKeySet, getTokenRole, getTenantRole, user.DefaultAcceptableSkew), nil
|
2024-02-26 18:20:40 +01:00
|
|
|
}
|
|
|
|
|
|
|
|
var ruleFuncs = []expr.Option{
|
|
|
|
expr.Function(
|
2023-07-26 15:14:49 +02:00
|
|
|
"str",
|
|
|
|
func(params ...any) (any, error) {
|
|
|
|
var builder strings.Builder
|
|
|
|
|
|
|
|
for _, p := range params {
|
|
|
|
if _, err := builder.WriteString(fmt.Sprintf("%v", p)); err != nil {
|
|
|
|
return nil, errors.WithStack(err)
|
|
|
|
}
|
|
|
|
}
|
|
|
|
|
|
|
|
return builder.String(), nil
|
|
|
|
},
|
|
|
|
new(func(any) string),
|
2024-02-26 18:20:40 +01:00
|
|
|
),
|
|
|
|
}
|
|
|
|
|
|
|
|
func (s *Server) createGetTokenRoleFunc() (func(ctx context.Context, token jwt.Token) (string, error), error) {
|
|
|
|
rawRules := s.conf.Auth.RoleExtractionRules
|
|
|
|
rules := make([]*vm.Program, 0, len(rawRules))
|
|
|
|
|
|
|
|
type Env struct {
|
|
|
|
JWT map[string]any `expr:"jwt"`
|
|
|
|
}
|
|
|
|
|
|
|
|
opts := append([]expr.Option{
|
|
|
|
expr.Env(Env{}),
|
|
|
|
expr.AsKind(reflect.String),
|
|
|
|
}, ruleFuncs...)
|
2023-07-26 15:14:49 +02:00
|
|
|
|
|
|
|
for _, rr := range rawRules {
|
2024-02-26 18:20:40 +01:00
|
|
|
r, err := expr.Compile(rr, opts...)
|
2023-07-26 15:14:49 +02:00
|
|
|
if err != nil {
|
|
|
|
return nil, errors.Wrapf(err, "could not compile role extraction rule '%s'", rr)
|
|
|
|
}
|
|
|
|
|
|
|
|
rules = append(rules, r)
|
|
|
|
}
|
|
|
|
|
|
|
|
return func(ctx context.Context, token jwt.Token) (string, error) {
|
|
|
|
jwt, err := token.AsMap(ctx)
|
|
|
|
if err != nil {
|
|
|
|
return "", errors.WithStack(err)
|
|
|
|
}
|
|
|
|
|
|
|
|
vm := vm.VM{}
|
|
|
|
|
|
|
|
for _, r := range rules {
|
|
|
|
result, err := vm.Run(r, Env{
|
|
|
|
JWT: jwt,
|
|
|
|
})
|
|
|
|
if err != nil {
|
|
|
|
return "", errors.WithStack(err)
|
|
|
|
}
|
|
|
|
|
|
|
|
role, ok := result.(string)
|
|
|
|
if !ok {
|
|
|
|
logger.Debug(ctx, "ignoring unexpected role extraction result", logger.F("result", result))
|
|
|
|
continue
|
|
|
|
}
|
|
|
|
|
|
|
|
if role != "" {
|
|
|
|
return role, nil
|
|
|
|
}
|
|
|
|
}
|
|
|
|
|
|
|
|
return "", errors.New("could not extract role from token")
|
|
|
|
}, nil
|
|
|
|
}
|
|
|
|
|
2024-02-26 18:20:40 +01:00
|
|
|
func (s *Server) createGetTokenTenantFunc() (func(ctx context.Context, token jwt.Token) (string, error), error) {
|
|
|
|
rawRules := s.conf.Auth.TenantExtractionRules
|
|
|
|
rules := make([]*vm.Program, 0, len(rawRules))
|
|
|
|
|
|
|
|
type Env struct {
|
|
|
|
JWT map[string]any `expr:"jwt"`
|
|
|
|
}
|
|
|
|
|
|
|
|
opts := append([]expr.Option{
|
|
|
|
expr.Env(Env{}),
|
|
|
|
expr.AsKind(reflect.String),
|
|
|
|
}, ruleFuncs...)
|
|
|
|
|
|
|
|
for _, rr := range rawRules {
|
|
|
|
r, err := expr.Compile(rr, opts...)
|
|
|
|
if err != nil {
|
|
|
|
return nil, errors.Wrapf(err, "could not compile role extraction rule '%s'", rr)
|
|
|
|
}
|
|
|
|
|
|
|
|
rules = append(rules, r)
|
|
|
|
}
|
|
|
|
|
|
|
|
return func(ctx context.Context, token jwt.Token) (string, error) {
|
|
|
|
jwt, err := token.AsMap(ctx)
|
|
|
|
if err != nil {
|
|
|
|
return "", errors.WithStack(err)
|
|
|
|
}
|
|
|
|
|
|
|
|
vm := vm.VM{}
|
|
|
|
|
|
|
|
for _, r := range rules {
|
|
|
|
result, err := vm.Run(r, Env{
|
|
|
|
JWT: jwt,
|
|
|
|
})
|
|
|
|
if err != nil {
|
|
|
|
return "", errors.WithStack(err)
|
|
|
|
}
|
|
|
|
|
|
|
|
tenant, ok := result.(string)
|
|
|
|
if !ok {
|
|
|
|
logger.Debug(ctx, "ignoring unexpected tenant extraction result", logger.F("result", result))
|
|
|
|
continue
|
|
|
|
}
|
|
|
|
|
|
|
|
if tenant != "" {
|
|
|
|
return tenant, nil
|
|
|
|
}
|
|
|
|
}
|
|
|
|
|
|
|
|
return "", errors.New("could not extract tenant from token")
|
|
|
|
}, nil
|
|
|
|
}
|
|
|
|
|
2023-02-02 10:55:24 +01:00
|
|
|
func New(funcs ...OptionFunc) *Server {
|
|
|
|
opt := defaultOption()
|
|
|
|
for _, fn := range funcs {
|
|
|
|
fn(opt)
|
|
|
|
}
|
|
|
|
|
|
|
|
return &Server{
|
|
|
|
conf: opt.Config,
|
|
|
|
}
|
|
|
|
}
|