blob: bd7e84ab75d792de5bda2042414414f2114459ba [file] [log] [blame]
Ankur1d46f552014-10-09 12:13:31 -07001package main
2
3import (
4 "crypto/rand"
5 "encoding/base64"
6 "fmt"
7 "html/template"
8 "net"
9 "net/http"
10 "net/url"
11 "os"
12 "os/exec"
13 "strings"
Suharsh Sivakumar67ef84a2015-02-13 13:04:44 -080014 "time"
Ankur1d46f552014-10-09 12:13:31 -070015
Jiri Simsa6ac95222015-02-23 16:11:49 -080016 "v.io/v23/context"
17 "v.io/v23/options"
18 "v.io/v23/security"
Jiri Simsa337af232015-02-27 14:36:46 -080019 "v.io/x/lib/vlog"
Jiri Simsaffceefa2015-02-28 11:03:34 -080020 "v.io/x/ref/services/identity"
21 "v.io/x/ref/services/identity/oauth"
Ankur1d46f552014-10-09 12:13:31 -070022)
23
Suharsh Sivakumar67ef84a2015-02-13 13:04:44 -080024func exchangeMacaroonForBlessing(ctx *context.T, macaroonChan <-chan string) (security.Blessings, error) {
25 service, macaroon, rootKey, err := prepareBlessArgs(ctx, macaroonChan)
26 if err != nil {
Asim Shankar2bf7b1e2015-02-27 00:45:12 -080027 return security.Blessings{}, err
Suharsh Sivakumar67ef84a2015-02-13 13:04:44 -080028 }
29
30 ctx, cancel := context.WithTimeout(ctx, time.Minute)
31 defer cancel()
32
Asim Shankar0d0d5882015-02-18 14:23:53 -080033 // Authorize the server by its public key (obtained from macaroonChan).
34 // Must skip authorization during name resolution because the identity
35 // service is not a trusted root yet.
Asim Shankarb07ec692015-02-27 23:40:44 -080036 blessings, err := identity.MacaroonBlesserClient(service).Bless(ctx, macaroon, options.SkipResolveAuthorization{}, options.ServerPublicKey{rootKey})
Suharsh Sivakumar67ef84a2015-02-13 13:04:44 -080037 if err != nil {
Asim Shankar2bf7b1e2015-02-27 00:45:12 -080038 return security.Blessings{}, fmt.Errorf("failed to get blessing from %q: %v", service, err)
Suharsh Sivakumar67ef84a2015-02-13 13:04:44 -080039 }
Suharsh Sivakumar67ef84a2015-02-13 13:04:44 -080040 return blessings, nil
41}
42
43func prepareBlessArgs(ctx *context.T, macaroonChan <-chan string) (service, macaroon string, root security.PublicKey, err error) {
44 macaroon = <-macaroonChan
45 service = <-macaroonChan
46
47 marshalKey, err := base64.URLEncoding.DecodeString(<-macaroonChan)
48 if err != nil {
49 return "", "", nil, fmt.Errorf("failed to decode root key: %v", err)
50 }
51 root, err = security.UnmarshalPublicKey(marshalKey)
52 if err != nil {
53 return "", "", nil, fmt.Errorf("failed to unmarshal root key: %v", err)
54 }
55
56 return service, macaroon, root, nil
57}
58
Suharsh Sivakumara76dba62014-12-22 16:00:34 -080059func getMacaroonForBlessRPC(blessServerURL string, blessedChan <-chan string, browser bool) (<-chan string, error) {
Ankur1d46f552014-10-09 12:13:31 -070060 // Setup a HTTP server to recieve a blessing macaroon from the identity server.
61 // Steps:
62 // 1. Generate a state token to be included in the HTTP request
63 // (though, arguably, the random port assigment for the HTTP server is enough
64 // for XSRF protection)
65 // 2. Setup a HTTP server which will receive the final blessing macaroon from the id server.
66 // 3. Print out the link (to start the auth flow) for the user to click.
67 // 4. Return the macaroon and the rpc object name(where to make the MacaroonBlesser.Bless RPC call)
68 // in the "result" channel.
69 var stateBuf [32]byte
70 if _, err := rand.Read(stateBuf[:]); err != nil {
71 return nil, fmt.Errorf("failed to generate state token for OAuth: %v", err)
72 }
73 state := base64.URLEncoding.EncodeToString(stateBuf[:])
74
75 ln, err := net.Listen("tcp", "127.0.0.1:0")
76 if err != nil {
77 return nil, fmt.Errorf("failed to setup authorization code interception server: %v", err)
78 }
79 result := make(chan string)
80
81 redirectURL := fmt.Sprintf("http://%s/macaroon", ln.Addr())
82 http.HandleFunc("/macaroon", func(w http.ResponseWriter, r *http.Request) {
83 w.Header().Set("Content-Type", "text/html")
84 tmplArgs := struct {
85 Blessings, ErrShort, ErrLong string
86 }{}
87 defer func() {
88 if len(tmplArgs.ErrShort) > 0 {
89 w.WriteHeader(http.StatusBadRequest)
90 }
91 if err := tmpl.Execute(w, tmplArgs); err != nil {
92 vlog.Info("Failed to render template:", err)
93 }
94 }()
95
96 toolState := r.FormValue("state")
97 if toolState != state {
98 tmplArgs.ErrShort = "Unexpected request"
99 tmplArgs.ErrLong = "Mismatched state parameter. Possible cross-site-request-forgery?"
100 return
101 }
102 result <- r.FormValue("macaroon")
103 result <- r.FormValue("object_name")
Suharsh Sivakumar67ef84a2015-02-13 13:04:44 -0800104 result <- r.FormValue("root_key")
Ankur1d46f552014-10-09 12:13:31 -0700105 defer close(result)
106 blessed, ok := <-blessedChan
107 if !ok {
108 tmplArgs.ErrShort = "No blessings received"
109 tmplArgs.ErrLong = "Unable to obtain blessings from the Veyron service"
110 return
111 }
112 tmplArgs.Blessings = blessed
113 ln.Close()
114 })
115 go http.Serve(ln, nil)
116
117 // Print the link to start the flow.
118 url, err := seekBlessingsURL(blessServerURL, redirectURL, state)
119 if err != nil {
120 return nil, fmt.Errorf("failed to create seekBlessingsURL: %s", err)
121 }
Jiri Simsa37b0a092015-02-13 09:32:39 -0800122 fmt.Fprintln(os.Stdout, "Please visit the following URL to seek blessings:")
123 fmt.Fprintln(os.Stdout, url)
Ankur1d46f552014-10-09 12:13:31 -0700124 // Make an attempt to start the browser as a convenience.
125 // If it fails, doesn't matter - the client can see the URL printed above.
126 // Use exec.Command().Start instead of exec.Command().Run since there is no
127 // need to wait for the command to return (and indeed on some window managers,
128 // the command will not exit until the browser is closed).
Suharsh Sivakumara76dba62014-12-22 16:00:34 -0800129 if len(openCommand) != 0 && browser {
Ankur1d46f552014-10-09 12:13:31 -0700130 exec.Command(openCommand, url).Start()
131 }
132 return result, nil
133}
134
135func seekBlessingsURL(blessServerURL, redirectURL, state string) (string, error) {
Suharsh Sivakumar8e898db2014-12-17 14:07:21 -0800136 baseURL, err := url.Parse(joinURL(blessServerURL, oauth.SeekBlessingsRoute))
Ankur1d46f552014-10-09 12:13:31 -0700137 if err != nil {
138 return "", fmt.Errorf("failed to parse url: %v", err)
139 }
140 params := url.Values{}
141 params.Add("redirect_url", redirectURL)
142 params.Add("state", state)
143 baseURL.RawQuery = params.Encode()
144 return baseURL.String(), nil
145}
146
147func joinURL(baseURL, suffix string) string {
148 if !strings.HasSuffix(baseURL, "/") {
149 baseURL += "/"
150 }
151 return baseURL + suffix
152}
153
154var tmpl = template.Must(template.New("name").Parse(`<!doctype html>
155<html>
156<head>
157<meta charset="UTF-8">
158<title>Veyron Identity: Google</title>
159<meta name="viewport" content="width=device-width, initial-scale=1.0">
160<link rel="stylesheet" href="//netdna.bootstrapcdn.com/bootstrap/3.2.0/css/bootstrap.min.css">
161{{if .Blessings}}
162<!--Attempt to close the window. Though this script does not work on many browser configurations-->
163<script type="text/javascript">window.close();</script>
164{{end}}
165</head>
166<body>
167<div class="container">
168{{if .ErrShort}}
169<h1><span class="label label-danger">error</span>{{.ErrShort}}</h1>
170<div class="well">{{.ErrLong}}</div>
171{{else}}
172<h3>Received blessings: <tt>{{.Blessings}}</tt></h3>
173{{end}}
174</div>
175</body>
176</html>`))