Expand ~ to HOME in Agent.Socket Add url override for gcloud functions v2 Add logging for parsing the principals go fmt
84 lines
3.0 KiB
Go
84 lines
3.0 KiB
Go
package gcp
|
|
|
|
import (
|
|
"bytes"
|
|
"crypto/rand"
|
|
"encoding/json"
|
|
"fmt"
|
|
"net/http"
|
|
"os"
|
|
|
|
"git.narnian.us/lordwelch/sshrimp/internal/config"
|
|
"git.narnian.us/lordwelch/sshrimp/internal/signer"
|
|
"golang.org/x/crypto/ssh"
|
|
)
|
|
|
|
func httpError(w http.ResponseWriter, v interface{}, statusCode int) {
|
|
var b bytes.Buffer
|
|
e := json.NewEncoder(&b)
|
|
_ = e.Encode(v)
|
|
http.Error(w, b.String(), statusCode)
|
|
}
|
|
|
|
// SSHrimp handles a request to sign an SSH public key verified by an OpenIDConnect id_token
|
|
func SSHrimp(w http.ResponseWriter, r *http.Request) {
|
|
// Load the configuration file, if not exsits, exit.
|
|
c := config.NewSSHrimp()
|
|
if err := c.Read("./serverless_function_source_code/sshrimp.toml"); err != nil {
|
|
httpError(w, signer.SSHrimpResult{Certificate: "", ErrorMessage: err.Error(), ErrorType: http.StatusText(http.StatusInternalServerError)}, http.StatusInternalServerError)
|
|
return
|
|
}
|
|
|
|
var event signer.SSHrimpEvent
|
|
if err := json.NewDecoder(r.Body).Decode(&event); err != nil {
|
|
httpError(w, signer.SSHrimpResult{Certificate: "", ErrorMessage: err.Error(), ErrorType: http.StatusText(http.StatusBadRequest)}, http.StatusBadRequest)
|
|
return
|
|
}
|
|
|
|
certificate, err := signer.ValidateRequest(event, c, r.Header.Get("Function-Execution-Id"), fmt.Sprintf("%s/%s/%s", os.Getenv("GCP_PROJECT"), os.Getenv("FUNCTION_REGION"), os.Getenv("FUNCTION_NAME")))
|
|
if err != nil {
|
|
httpError(w, signer.SSHrimpResult{Certificate: "", ErrorMessage: err.Error(), ErrorType: http.StatusText(http.StatusBadRequest)}, http.StatusBadRequest)
|
|
return
|
|
}
|
|
|
|
// Setup our Certificate Authority signer backed by KMS
|
|
kmsSigner := signer.NewGCPSSigner(c.CertificateAuthority.KeyAlias)
|
|
|
|
sshAlgorithmSigner, err := signer.NewAlgorithmSignerFromSigner(kmsSigner, ssh.KeyAlgoRSASHA256)
|
|
if err != nil {
|
|
httpError(w, signer.SSHrimpResult{Certificate: "", ErrorMessage: err.Error(), ErrorType: http.StatusText(http.StatusBadRequest)}, http.StatusBadRequest)
|
|
return
|
|
}
|
|
|
|
// Sign the certificate!!
|
|
if err := certificate.SignCert(rand.Reader, sshAlgorithmSigner); err != nil {
|
|
httpError(w, signer.SSHrimpResult{Certificate: "", ErrorMessage: err.Error(), ErrorType: http.StatusText(http.StatusInternalServerError)}, http.StatusInternalServerError)
|
|
return
|
|
}
|
|
|
|
// i, _ := identity.NewIdentity(c)
|
|
// username, _ := i.Validate(event.Token)
|
|
// cc := ssh.CertChecker{}
|
|
// err = cc.CheckCert(username, &certificate)
|
|
// if err != nil {
|
|
// httpError(w, signer.SSHrimpResult{Certificate: "", ErrorMessage: err.Error(), ErrorType: http.StatusText(http.StatusInternalServerError)}, http.StatusBadRequest)
|
|
// return
|
|
// }
|
|
|
|
// Extract the public key (certificate) to return to the user
|
|
pubkey, err := ssh.ParsePublicKey(certificate.Marshal())
|
|
if err != nil {
|
|
httpError(w, signer.SSHrimpResult{Certificate: "", ErrorMessage: err.Error(), ErrorType: http.StatusText(http.StatusInternalServerError)}, http.StatusInternalServerError)
|
|
return
|
|
}
|
|
|
|
// Success!
|
|
res := &signer.SSHrimpResult{
|
|
Certificate: string(ssh.MarshalAuthorizedKey(pubkey)),
|
|
ErrorMessage: "",
|
|
ErrorType: "",
|
|
}
|
|
e := json.NewEncoder(w)
|
|
_ = e.Encode(res)
|
|
}
|