commit
302b99c743
5 changed files with 241 additions and 33 deletions
|
@ -10,9 +10,15 @@ import (
|
||||||
httpfrontend "github.com/chihaya/chihaya/frontend/http"
|
httpfrontend "github.com/chihaya/chihaya/frontend/http"
|
||||||
udpfrontend "github.com/chihaya/chihaya/frontend/udp"
|
udpfrontend "github.com/chihaya/chihaya/frontend/udp"
|
||||||
"github.com/chihaya/chihaya/middleware"
|
"github.com/chihaya/chihaya/middleware"
|
||||||
|
"github.com/chihaya/chihaya/middleware/jwt"
|
||||||
"github.com/chihaya/chihaya/storage/memory"
|
"github.com/chihaya/chihaya/storage/memory"
|
||||||
)
|
)
|
||||||
|
|
||||||
|
type hookConfig struct {
|
||||||
|
Name string `yaml:"name"`
|
||||||
|
Config interface{} `yaml:"config"`
|
||||||
|
}
|
||||||
|
|
||||||
// ConfigFile represents a namespaced YAML configation file.
|
// ConfigFile represents a namespaced YAML configation file.
|
||||||
type ConfigFile struct {
|
type ConfigFile struct {
|
||||||
MainConfigBlock struct {
|
MainConfigBlock struct {
|
||||||
|
@ -21,6 +27,8 @@ type ConfigFile struct {
|
||||||
HTTPConfig httpfrontend.Config `yaml:"http"`
|
HTTPConfig httpfrontend.Config `yaml:"http"`
|
||||||
UDPConfig udpfrontend.Config `yaml:"udp"`
|
UDPConfig udpfrontend.Config `yaml:"udp"`
|
||||||
Storage memory.Config `yaml:"storage"`
|
Storage memory.Config `yaml:"storage"`
|
||||||
|
PreHooks []hookConfig `yaml:"prehooks"`
|
||||||
|
PostHooks []hookConfig `yaml:"posthooks"`
|
||||||
} `yaml:"chihaya"`
|
} `yaml:"chihaya"`
|
||||||
}
|
}
|
||||||
|
|
||||||
|
@ -52,3 +60,31 @@ func ParseConfigFile(path string) (*ConfigFile, error) {
|
||||||
|
|
||||||
return &cfgFile, nil
|
return &cfgFile, nil
|
||||||
}
|
}
|
||||||
|
|
||||||
|
// CreateHooks creates instances of Hooks for all of the PreHooks and PostHooks
|
||||||
|
// configured in a ConfigFile.
|
||||||
|
func (cfg ConfigFile) CreateHooks() (preHooks, postHooks []middleware.Hook, err error) {
|
||||||
|
for _, hookCfg := range cfg.MainConfigBlock.PreHooks {
|
||||||
|
cfgBytes, err := yaml.Marshal(hookCfg.Config)
|
||||||
|
if err != nil {
|
||||||
|
panic("failed to remarshal valid YAML")
|
||||||
|
}
|
||||||
|
|
||||||
|
switch hookCfg.Name {
|
||||||
|
case "jwt":
|
||||||
|
var jwtCfg jwt.Config
|
||||||
|
err := yaml.Unmarshal(cfgBytes, &jwtCfg)
|
||||||
|
if err != nil {
|
||||||
|
return nil, nil, errors.New("invalid JWT middleware config" + err.Error())
|
||||||
|
}
|
||||||
|
preHooks = append(preHooks, jwt.NewHook(jwtCfg))
|
||||||
|
}
|
||||||
|
}
|
||||||
|
|
||||||
|
for _, hookCfg := range cfg.MainConfigBlock.PostHooks {
|
||||||
|
switch hookCfg.Name {
|
||||||
|
}
|
||||||
|
}
|
||||||
|
|
||||||
|
return
|
||||||
|
}
|
||||||
|
|
|
@ -54,8 +54,12 @@ func rootCmdRun(cmd *cobra.Command, args []string) error {
|
||||||
return err
|
return err
|
||||||
}
|
}
|
||||||
|
|
||||||
// TODO create Hooks
|
preHooks, postHooks, err := configFile.CreateHooks()
|
||||||
logic := middleware.NewLogic(cfg.Config, peerStore, nil, nil, nil, nil)
|
if err != nil {
|
||||||
|
return err
|
||||||
|
}
|
||||||
|
|
||||||
|
logic := middleware.NewLogic(cfg.Config, peerStore, preHooks, postHooks)
|
||||||
if err != nil {
|
if err != nil {
|
||||||
return err
|
return err
|
||||||
}
|
}
|
||||||
|
|
|
@ -23,9 +23,10 @@ chihaya:
|
||||||
prehooks:
|
prehooks:
|
||||||
- name: jwt
|
- name: jwt
|
||||||
config:
|
config:
|
||||||
jwk_set_uri: ""
|
issuer: https://issuer.com
|
||||||
|
audience: https://chihaya.issuer.com
|
||||||
|
jwk_set_uri: https://issuer.com/keys
|
||||||
jwk_set_update_interval: 5m
|
jwk_set_update_interval: 5m
|
||||||
jwt_audience: ""
|
|
||||||
- name: approved_client
|
- name: approved_client
|
||||||
config:
|
config:
|
||||||
type: whitelist
|
type: whitelist
|
||||||
|
|
179
middleware/jwt/jwt.go
Normal file
179
middleware/jwt/jwt.go
Normal file
|
@ -0,0 +1,179 @@
|
||||||
|
// Package jwt implements a Hook that fails an Announce if the client's request
|
||||||
|
// is missing a valid JSON Web Token.
|
||||||
|
//
|
||||||
|
// JWTs are validated against the standard claims in RFC7519 along with an
|
||||||
|
// extra "infohash" claim that verifies the client has access to the Swarm.
|
||||||
|
// RS256 keys are asychronously rotated from a provided JWK Set HTTP endpoint.
|
||||||
|
package jwt
|
||||||
|
|
||||||
|
import (
|
||||||
|
"context"
|
||||||
|
"crypto"
|
||||||
|
"encoding/json"
|
||||||
|
"errors"
|
||||||
|
"log"
|
||||||
|
"net/http"
|
||||||
|
"net/url"
|
||||||
|
"time"
|
||||||
|
|
||||||
|
jc "github.com/SermoDigital/jose/crypto"
|
||||||
|
"github.com/SermoDigital/jose/jws"
|
||||||
|
"github.com/SermoDigital/jose/jwt"
|
||||||
|
"github.com/mendsley/gojwk"
|
||||||
|
|
||||||
|
"github.com/chihaya/chihaya/bittorrent"
|
||||||
|
"github.com/chihaya/chihaya/middleware"
|
||||||
|
)
|
||||||
|
|
||||||
|
var (
|
||||||
|
// ErrMissingJWT is returned when a JWT is missing from a request.
|
||||||
|
ErrMissingJWT = bittorrent.ClientError("unapproved request: missing jwt")
|
||||||
|
|
||||||
|
// ErrInvalidJWT is returned when a JWT fails to verify.
|
||||||
|
ErrInvalidJWT = bittorrent.ClientError("unapproved request: invalid jwt")
|
||||||
|
)
|
||||||
|
|
||||||
|
// Config represents all the values required by this middleware to fetch JWKs
|
||||||
|
// and verify JWTs.
|
||||||
|
type Config struct {
|
||||||
|
Issuer string `yaml:"issuer"`
|
||||||
|
Audience string `yaml:"audience"`
|
||||||
|
JWKSetURL string `yaml:"jwk_set_url"`
|
||||||
|
JWKUpdateInterval time.Duration `yaml:"jwk_set_update_interval"`
|
||||||
|
}
|
||||||
|
|
||||||
|
type hook struct {
|
||||||
|
cfg Config
|
||||||
|
publicKeys map[string]crypto.PublicKey
|
||||||
|
closing chan struct{}
|
||||||
|
}
|
||||||
|
|
||||||
|
// NewHook returns an instance of the JWT middleware.
|
||||||
|
func NewHook(cfg Config) middleware.Hook {
|
||||||
|
h := &hook{
|
||||||
|
cfg: cfg,
|
||||||
|
publicKeys: map[string]crypto.PublicKey{},
|
||||||
|
closing: make(chan struct{}),
|
||||||
|
}
|
||||||
|
|
||||||
|
go func() {
|
||||||
|
for {
|
||||||
|
select {
|
||||||
|
case <-h.closing:
|
||||||
|
return
|
||||||
|
case <-time.After(cfg.JWKUpdateInterval):
|
||||||
|
resp, err := http.Get(cfg.JWKSetURL)
|
||||||
|
if err != nil {
|
||||||
|
log.Println("failed to fetch JWK Set: " + err.Error())
|
||||||
|
continue
|
||||||
|
}
|
||||||
|
|
||||||
|
parsedJWKs := map[string]gojwk.Key{}
|
||||||
|
err = json.NewDecoder(resp.Body).Decode(&parsedJWKs)
|
||||||
|
if err != nil {
|
||||||
|
resp.Body.Close()
|
||||||
|
log.Println("failed to decode JWK JSON: " + err.Error())
|
||||||
|
continue
|
||||||
|
}
|
||||||
|
resp.Body.Close()
|
||||||
|
|
||||||
|
keys := map[string]crypto.PublicKey{}
|
||||||
|
for kid, parsedJWK := range parsedJWKs {
|
||||||
|
publicKey, err := parsedJWK.DecodePublicKey()
|
||||||
|
if err != nil {
|
||||||
|
log.Println("failed to decode JWK into public key: " + err.Error())
|
||||||
|
continue
|
||||||
|
}
|
||||||
|
keys[kid] = publicKey
|
||||||
|
}
|
||||||
|
h.publicKeys = keys
|
||||||
|
}
|
||||||
|
}
|
||||||
|
}()
|
||||||
|
|
||||||
|
return h
|
||||||
|
}
|
||||||
|
|
||||||
|
func (h *hook) Stop() {
|
||||||
|
close(h.closing)
|
||||||
|
}
|
||||||
|
|
||||||
|
func (h *hook) HandleAnnounce(ctx context.Context, req *bittorrent.AnnounceRequest, resp *bittorrent.AnnounceResponse) error {
|
||||||
|
if req.Params == nil {
|
||||||
|
return ErrMissingJWT
|
||||||
|
}
|
||||||
|
|
||||||
|
jwtParam, ok := req.Params.String("jwt")
|
||||||
|
if !ok {
|
||||||
|
return ErrMissingJWT
|
||||||
|
}
|
||||||
|
|
||||||
|
if err := validateJWT(req.InfoHash, []byte(jwtParam), h.cfg.Issuer, h.cfg.Audience, h.publicKeys); err != nil {
|
||||||
|
return ErrInvalidJWT
|
||||||
|
}
|
||||||
|
|
||||||
|
return nil
|
||||||
|
}
|
||||||
|
|
||||||
|
func (h *hook) HandleScrape(ctx context.Context, req *bittorrent.ScrapeRequest, resp *bittorrent.ScrapeResponse) error {
|
||||||
|
// Scrapes don't require any protection.
|
||||||
|
return nil
|
||||||
|
}
|
||||||
|
|
||||||
|
func validateJWT(ih bittorrent.InfoHash, jwtBytes []byte, cfgIss, cfgAud string, publicKeys map[string]crypto.PublicKey) error {
|
||||||
|
parsedJWT, err := jws.ParseJWT(jwtBytes)
|
||||||
|
if err != nil {
|
||||||
|
return err
|
||||||
|
}
|
||||||
|
|
||||||
|
claims := parsedJWT.Claims()
|
||||||
|
if iss, ok := claims.Issuer(); !ok || iss != cfgIss {
|
||||||
|
return jwt.ErrInvalidISSClaim
|
||||||
|
}
|
||||||
|
|
||||||
|
if aud, ok := claims.Audience(); !ok || !validAudience(aud, cfgAud) {
|
||||||
|
return jwt.ErrInvalidAUDClaim
|
||||||
|
}
|
||||||
|
|
||||||
|
if ihClaim, ok := claims.Get("infohash").(string); !ok || !validInfoHash(ihClaim, ih) {
|
||||||
|
return errors.New("claim \"infohash\" is invalid")
|
||||||
|
}
|
||||||
|
|
||||||
|
parsedJWS := parsedJWT.(jws.JWS)
|
||||||
|
kid, ok := parsedJWS.Protected().Get("kid").(string)
|
||||||
|
if !ok {
|
||||||
|
return errors.New("invalid kid")
|
||||||
|
}
|
||||||
|
publicKey, ok := publicKeys[kid]
|
||||||
|
if !ok {
|
||||||
|
return errors.New("signed by unknown kid")
|
||||||
|
}
|
||||||
|
|
||||||
|
return parsedJWS.Verify(publicKey, jc.SigningMethodRS256)
|
||||||
|
}
|
||||||
|
|
||||||
|
func validAudience(aud []string, cfgAud string) bool {
|
||||||
|
for _, a := range aud {
|
||||||
|
if a == cfgAud {
|
||||||
|
return true
|
||||||
|
}
|
||||||
|
}
|
||||||
|
return false
|
||||||
|
}
|
||||||
|
|
||||||
|
func validInfoHash(claim string, ih bittorrent.InfoHash) bool {
|
||||||
|
if len(claim) == 20 && bittorrent.InfoHashFromString(claim) == ih {
|
||||||
|
return true
|
||||||
|
}
|
||||||
|
|
||||||
|
unescapedClaim, err := url.QueryUnescape(claim)
|
||||||
|
if err != nil {
|
||||||
|
return false
|
||||||
|
}
|
||||||
|
|
||||||
|
if len(unescapedClaim) == 20 && bittorrent.InfoHashFromString(unescapedClaim) == ih {
|
||||||
|
return true
|
||||||
|
}
|
||||||
|
|
||||||
|
return false
|
||||||
|
}
|
|
@ -18,30 +18,20 @@ type Config struct {
|
||||||
|
|
||||||
var _ frontend.TrackerLogic = &Logic{}
|
var _ frontend.TrackerLogic = &Logic{}
|
||||||
|
|
||||||
func NewLogic(config Config, peerStore storage.PeerStore, announcePreHooks, announcePostHooks, scrapePreHooks, scrapePostHooks []Hook) *Logic {
|
func NewLogic(cfg Config, peerStore storage.PeerStore, preHooks, postHooks []Hook) *Logic {
|
||||||
l := &Logic{
|
l := &Logic{
|
||||||
announceInterval: config.AnnounceInterval,
|
announceInterval: cfg.AnnounceInterval,
|
||||||
peerStore: peerStore,
|
peerStore: peerStore,
|
||||||
announcePreHooks: announcePreHooks,
|
preHooks: preHooks,
|
||||||
announcePostHooks: announcePostHooks,
|
postHooks: postHooks,
|
||||||
scrapePreHooks: scrapePreHooks,
|
|
||||||
scrapePostHooks: scrapePostHooks,
|
|
||||||
}
|
}
|
||||||
|
|
||||||
if len(l.announcePreHooks) == 0 {
|
if len(l.preHooks) == 0 {
|
||||||
l.announcePreHooks = []Hook{nopHook{}}
|
l.preHooks = []Hook{nopHook{}}
|
||||||
}
|
}
|
||||||
|
|
||||||
if len(l.announcePostHooks) == 0 {
|
if len(l.postHooks) == 0 {
|
||||||
l.announcePostHooks = []Hook{nopHook{}}
|
l.postHooks = []Hook{nopHook{}}
|
||||||
}
|
|
||||||
|
|
||||||
if len(l.scrapePreHooks) == 0 {
|
|
||||||
l.scrapePreHooks = []Hook{nopHook{}}
|
|
||||||
}
|
|
||||||
|
|
||||||
if len(l.scrapePostHooks) == 0 {
|
|
||||||
l.scrapePostHooks = []Hook{nopHook{}}
|
|
||||||
}
|
}
|
||||||
|
|
||||||
return l
|
return l
|
||||||
|
@ -52,10 +42,8 @@ func NewLogic(config Config, peerStore storage.PeerStore, announcePreHooks, anno
|
||||||
type Logic struct {
|
type Logic struct {
|
||||||
announceInterval time.Duration
|
announceInterval time.Duration
|
||||||
peerStore storage.PeerStore
|
peerStore storage.PeerStore
|
||||||
announcePreHooks []Hook
|
preHooks []Hook
|
||||||
announcePostHooks []Hook
|
postHooks []Hook
|
||||||
scrapePreHooks []Hook
|
|
||||||
scrapePostHooks []Hook
|
|
||||||
}
|
}
|
||||||
|
|
||||||
// HandleAnnounce generates a response for an Announce.
|
// HandleAnnounce generates a response for an Announce.
|
||||||
|
@ -63,7 +51,7 @@ func (l *Logic) HandleAnnounce(ctx context.Context, req *bittorrent.AnnounceRequ
|
||||||
resp := &bittorrent.AnnounceResponse{
|
resp := &bittorrent.AnnounceResponse{
|
||||||
Interval: l.announceInterval,
|
Interval: l.announceInterval,
|
||||||
}
|
}
|
||||||
for _, h := range l.announcePreHooks {
|
for _, h := range l.preHooks {
|
||||||
if err := h.HandleAnnounce(ctx, req, resp); err != nil {
|
if err := h.HandleAnnounce(ctx, req, resp); err != nil {
|
||||||
return nil, err
|
return nil, err
|
||||||
}
|
}
|
||||||
|
@ -75,7 +63,7 @@ func (l *Logic) HandleAnnounce(ctx context.Context, req *bittorrent.AnnounceRequ
|
||||||
// AfterAnnounce does something with the results of an Announce after it has
|
// AfterAnnounce does something with the results of an Announce after it has
|
||||||
// been completed.
|
// been completed.
|
||||||
func (l *Logic) AfterAnnounce(ctx context.Context, req *bittorrent.AnnounceRequest, resp *bittorrent.AnnounceResponse) {
|
func (l *Logic) AfterAnnounce(ctx context.Context, req *bittorrent.AnnounceRequest, resp *bittorrent.AnnounceResponse) {
|
||||||
for _, h := range l.announcePostHooks {
|
for _, h := range l.postHooks {
|
||||||
if err := h.HandleAnnounce(ctx, req, resp); err != nil {
|
if err := h.HandleAnnounce(ctx, req, resp); err != nil {
|
||||||
log.Println("chihaya: post-announce hooks failed:", err.Error())
|
log.Println("chihaya: post-announce hooks failed:", err.Error())
|
||||||
return
|
return
|
||||||
|
@ -88,7 +76,7 @@ func (l *Logic) HandleScrape(ctx context.Context, req *bittorrent.ScrapeRequest)
|
||||||
resp := &bittorrent.ScrapeResponse{
|
resp := &bittorrent.ScrapeResponse{
|
||||||
Files: make(map[bittorrent.InfoHash]bittorrent.Scrape),
|
Files: make(map[bittorrent.InfoHash]bittorrent.Scrape),
|
||||||
}
|
}
|
||||||
for _, h := range l.scrapePreHooks {
|
for _, h := range l.preHooks {
|
||||||
if err := h.HandleScrape(ctx, req, resp); err != nil {
|
if err := h.HandleScrape(ctx, req, resp); err != nil {
|
||||||
return nil, err
|
return nil, err
|
||||||
}
|
}
|
||||||
|
@ -100,7 +88,7 @@ func (l *Logic) HandleScrape(ctx context.Context, req *bittorrent.ScrapeRequest)
|
||||||
// AfterScrape does something with the results of a Scrape after it has been
|
// AfterScrape does something with the results of a Scrape after it has been
|
||||||
// completed.
|
// completed.
|
||||||
func (l *Logic) AfterScrape(ctx context.Context, req *bittorrent.ScrapeRequest, resp *bittorrent.ScrapeResponse) {
|
func (l *Logic) AfterScrape(ctx context.Context, req *bittorrent.ScrapeRequest, resp *bittorrent.ScrapeResponse) {
|
||||||
for _, h := range l.scrapePostHooks {
|
for _, h := range l.postHooks {
|
||||||
if err := h.HandleScrape(ctx, req, resp); err != nil {
|
if err := h.HandleScrape(ctx, req, resp); err != nil {
|
||||||
log.Println("chihaya: post-scrape hooks failed:", err.Error())
|
log.Println("chihaya: post-scrape hooks failed:", err.Error())
|
||||||
return
|
return
|
||||||
|
|
Loading…
Reference in a new issue