blob: 9532970cad185c49920aea3bb323eee9906179a6 [file] [log] [blame] [edit]
// Copyright 2015 The Vanadium Authors. All rights reserved.
// Use of this source code is governed by a BSD-style
// license that can be found in the LICENSE file.
package security
import (
"crypto/ecdsa"
"os"
"path"
"v.io/v23/security"
"v.io/v23/verror"
)
const pkgPath = "v.io/x/ref/lib/security"
var (
errCantCreateSigner = verror.Register(pkgPath+".errCantCreateSigner", verror.NoRetry, "{1:}{2:} failed to create serialization.Signer{:_}")
errCantLoadBlessingRoots = verror.Register(pkgPath+".errCantLoadBlessingRoots", verror.NoRetry, "{1:}{2:} failed to load BlessingRoots{:_}")
errCantLoadBlessingStore = verror.Register(pkgPath+".errCantLoadBlessingStore", verror.NoRetry, "{1:}{2:} failed to load BlessingStore{:_}")
errCantInitPrivateKey = verror.Register(pkgPath+".errCantInitPrivateKey", verror.NoRetry, "{1:}{2:} failed to initialize private key{:_}")
errNotADirectory = verror.Register(pkgPath+".errNotADirectory", verror.NoRetry, "{1:}{2:} {3} is not a directory{:_}")
errCantCreate = verror.Register(pkgPath+".errCantCreate", verror.NoRetry, "{1:}{2:} failed to create {3}{:_}")
errCantOpenForWriting = verror.Register(pkgPath+".errCantOpenForWriting", verror.NoRetry, "{1:}{2:} failed to open {3} for writing{:_}")
errCantGenerateKey = verror.Register(pkgPath+".errCantGenerateKey", verror.NoRetry, "{1:}{2:} failed to generate private key{:_}")
errCantSaveKey = verror.Register(pkgPath+".errCantSaveKey", verror.NoRetry, "{1:}{2:} failed to save private key to {3}{:_}")
)
const (
blessingStoreDataFile = "blessingstore.data"
blessingStoreSigFile = "blessingstore.sig"
blessingRootsDataFile = "blessingroots.data"
blessingRootsSigFile = "blessingroots.sig"
privateKeyFile = "privatekey.pem"
)
// NewPrincipal mints a new private key and generates a principal based on
// this key, storing its BlessingRoots and BlessingStore in memory.
func NewPrincipal() (security.Principal, error) {
pub, priv, err := NewPrincipalKey()
if err != nil {
return nil, err
}
return security.CreatePrincipal(security.NewInMemoryECDSASigner(priv), newInMemoryBlessingStore(pub), newInMemoryBlessingRoots())
}
// PrincipalStateSerializer is used to persist BlessingRoots/BlessingStore state for
// a principal with the provided SerializerReaderWriters.
type PrincipalStateSerializer struct {
BlessingRoots SerializerReaderWriter
BlessingStore SerializerReaderWriter
}
// NewPrincipalStateSerializer is a convenience function that returns a serializer
// for BlessingStore and BlessingRoots given a directory location. We create the
// directory if it does not already exist.
func NewPrincipalStateSerializer(dir string) (*PrincipalStateSerializer, error) {
if err := mkDir(dir); err != nil {
return nil, err
}
return &PrincipalStateSerializer{
BlessingRoots: NewFileSerializer(path.Join(dir, blessingRootsDataFile), path.Join(dir, blessingRootsSigFile)),
BlessingStore: NewFileSerializer(path.Join(dir, blessingStoreDataFile), path.Join(dir, blessingStoreSigFile)),
}, nil
}
// NewPrincipalFromSigner creates a new principal using the provided Signer. If previously
// persisted state is available, we use the serializers to populate BlessingRoots/BlessingStore
// for the Principal. If provided, changes to the state are persisted and committed with the
// same serializers. Otherwise, the state (ie: BlessingStore, BlessingRoots) is kept in memory.
func NewPrincipalFromSigner(signer security.Signer, state *PrincipalStateSerializer) (security.Principal, error) {
if state == nil {
return security.CreatePrincipal(signer, newInMemoryBlessingStore(signer.PublicKey()), newInMemoryBlessingRoots())
}
serializationSigner, err := security.CreatePrincipal(signer, nil, nil)
if err != nil {
return nil, verror.New(errCantCreateSigner, nil, err)
}
blessingRoots, err := newPersistingBlessingRoots(state.BlessingRoots, serializationSigner)
if err != nil {
return nil, verror.New(errCantLoadBlessingRoots, nil, err)
}
blessingStore, err := newPersistingBlessingStore(state.BlessingStore, serializationSigner)
if err != nil {
return nil, verror.New(errCantLoadBlessingStore, nil, err)
}
return security.CreatePrincipal(signer, blessingStore, blessingRoots)
}
// LoadPersistentPrincipal reads state for a principal (private key, BlessingRoots, BlessingStore)
// from the provided directory 'dir' and commits all state changes to the same directory.
// If private key file does not exist then an error 'err' is returned such that os.IsNotExist(err) is true.
// If private key file exists then 'passphrase' must be correct, otherwise ErrBadPassphrase will be returned.
func LoadPersistentPrincipal(dir string, passphrase []byte) (security.Principal, error) {
key, err := loadKeyFromDir(dir, passphrase)
if err != nil {
return nil, err
}
state, err := NewPrincipalStateSerializer(dir)
if err != nil {
return nil, err
}
return NewPrincipalFromSigner(security.NewInMemoryECDSASigner(key), state)
}
// CreatePersistentPrincipal creates a new principal (private key, BlessingRoots,
// BlessingStore) and commits all state changes to the provided directory.
//
// The generated private key is serialized and saved encrypted if the 'passphrase'
// is non-nil, and unencrypted otherwise.
//
// If the directory has any preexisting principal data, CreatePersistentPrincipal
// will return an error.
//
// The specified directory may not exist, in which case it gets created by this
// function.
func CreatePersistentPrincipal(dir string, passphrase []byte) (principal security.Principal, err error) {
if err := mkDir(dir); err != nil {
return nil, err
}
key, err := initKey(dir, passphrase)
if err != nil {
return nil, verror.New(errCantInitPrivateKey, nil, err)
}
state, err := NewPrincipalStateSerializer(dir)
if err != nil {
return nil, err
}
return NewPrincipalFromSigner(security.NewInMemoryECDSASigner(key), state)
}
// SetDefaultBlessings sets the provided blessings as default and shareable with
// all peers on provided principal's BlessingStore, and also adds it as a root to
// the principal's BlessingRoots.
func SetDefaultBlessings(p security.Principal, blessings security.Blessings) error {
if err := p.BlessingStore().SetDefault(blessings); err != nil {
return err
}
if _, err := p.BlessingStore().Set(blessings, security.AllPrincipals); err != nil {
return err
}
if err := security.AddToRoots(p, blessings); err != nil {
return err
}
return nil
}
// InitDefaultBlessings uses the provided principal to create a self blessing for name 'name',
// sets it as default on the principal's BlessingStore and adds it as root to the principal's BlessingRoots.
// TODO(ataly): Get rid this function given that we have SetDefaultBlessings.
func InitDefaultBlessings(p security.Principal, name string) error {
blessing, err := p.BlessSelf(name)
if err != nil {
return err
}
return SetDefaultBlessings(p, blessing)
}
func mkDir(dir string) error {
if finfo, err := os.Stat(dir); err == nil {
if !finfo.IsDir() {
return verror.New(errNotADirectory, nil, dir)
}
} else if err := os.MkdirAll(dir, 0700); err != nil {
return verror.New(errCantCreate, nil, dir, err)
}
return nil
}
func loadKeyFromDir(dir string, passphrase []byte) (*ecdsa.PrivateKey, error) {
keyFile := path.Join(dir, privateKeyFile)
f, err := os.Open(keyFile)
if err != nil {
return nil, err
}
defer f.Close()
key, err := LoadPEMKey(f, passphrase)
if err != nil {
return nil, err
}
return key.(*ecdsa.PrivateKey), nil
}
func initKey(dir string, passphrase []byte) (*ecdsa.PrivateKey, error) {
keyFile := path.Join(dir, privateKeyFile)
f, err := os.OpenFile(keyFile, os.O_WRONLY|os.O_CREATE|os.O_EXCL, 0600)
if err != nil {
return nil, verror.New(errCantOpenForWriting, nil, keyFile, err)
}
defer f.Close()
_, key, err := NewPrincipalKey()
if err != nil {
return nil, verror.New(errCantGenerateKey, nil, err)
}
if err := SavePEMKey(f, key, passphrase); err != nil {
return nil, verror.New(errCantSaveKey, nil, keyFile, err)
}
return key, nil
}