blob: 9fc7798cddea48a24dc7afb0114bd6f83e100c8a [file] [log] [blame]
package blesser
import (
"bytes"
"fmt"
"time"
"veyron.io/veyron/veyron/services/identity"
"veyron.io/veyron/veyron/services/identity/util"
"veyron.io/veyron/veyron2"
"veyron.io/veyron/veyron2/ipc"
"veyron.io/veyron/veyron2/security"
"veyron.io/veyron/veyron2/vdl/vdlutil"
"veyron.io/veyron/veyron2/vom"
)
type macaroonBlesser struct {
rt veyron2.Runtime
key []byte
}
// BlessingMacaroon contains the data that is encoded into the macaroon for creating blessings.
type BlessingMacaroon struct {
Creation time.Time
Caveats []security.Caveat
Name string
}
// NewMacaroonBlesserServer provides an identity.MacaroonBlesser Service that uses an
// bless macaroon.
//
// Blessings generated by this server expire after duration. If domain is non-empty, then blessings
// are generated only for email addresses from that domain.
//
// TODO(ashankar): Remove the veyron2.Runtime parameter once the old security model is ripped out.
func NewMacaroonBlesserServer(r veyron2.Runtime, key []byte) interface{} {
return identity.NewServerMacaroonBlesser(&macaroonBlesser{
rt: r,
key: key,
})
}
func (b *macaroonBlesser) Bless(ctx ipc.ServerContext, macaroon string) (vdlutil.Any, error) {
inputs, err := util.Macaroon(macaroon).Decode(b.key)
if err != nil {
return nil, err
}
m := BlessingMacaroon{}
if err := vom.NewDecoder(bytes.NewBuffer(inputs)).Decode(&m); err != nil {
return nil, err
}
if time.Now().After(m.Creation.Add(time.Minute * 5)) {
return nil, fmt.Errorf("macaroon has expired")
}
if ctx.LocalPrincipal() == nil || ctx.RemoteBlessings() == nil {
// TODO(ashankar): Old security model, remove this block.
self := b.rt.Identity()
var err error
// Use the blessing that was used to authenticate with the client to bless it.
if self, err = self.Derive(ctx.LocalID()); err != nil {
return nil, err
}
return self.Bless(ctx.RemoteID(), m.Name, time.Hour*24*365, m.Caveats)
}
if len(m.Caveats) == 0 {
m.Caveats = []security.Caveat{security.UnconstrainedUse()}
}
// TODO(ashankar,toddw): After the old security model is ripped out and the VDL configuration
// files have the scheme to translate between "wire" types and "in-memory" types, this should just
// become return ctx.LocalPrincipal().....
blessings, err := ctx.LocalPrincipal().Bless(ctx.RemoteBlessings().PublicKey(), ctx.LocalBlessings(), m.Name, m.Caveats[0], m.Caveats[1:]...)
if err != nil {
return nil, err
}
return security.MarshalBlessings(blessings), nil
}