зеркало из https://github.com/mozilla/mig.git
417 строки
10 KiB
Go
417 строки
10 KiB
Go
// This Source Code Form is subject to the terms of the Mozilla Public
|
|
// License, v. 2.0. If a copy of the MPL was not distributed with this
|
|
// file, You can obtain one at http://mozilla.org/MPL/2.0/.
|
|
//
|
|
// Contributor: Aaron Meihm ameihm@mozilla.com [:alm]
|
|
|
|
package mig /* import "mig.ninja/mig" */
|
|
|
|
// This file contains structures and functions related to the handling of
|
|
// manifests and state bundles by the MIG loader and API.
|
|
|
|
import (
|
|
"archive/tar"
|
|
"bytes"
|
|
"compress/gzip"
|
|
"crypto/sha256"
|
|
"encoding/base64"
|
|
"encoding/json"
|
|
"fmt"
|
|
"io"
|
|
"io/ioutil"
|
|
"mig.ninja/mig/pgp"
|
|
"os"
|
|
"path"
|
|
"runtime"
|
|
"time"
|
|
)
|
|
|
|
// Describes a manifest record stored within the MIG database
|
|
type ManifestRecord struct {
|
|
ID float64 `json:"id"` // Manifest record ID
|
|
Name string `json:"name"` // The name of the manifest record
|
|
Content string `json:"content,omitempty"` // Full data contents of record
|
|
Timestamp time.Time `json:"timestamp"` // Record timestamp
|
|
Status string `json:"status"` // Record status
|
|
Target string `json:"target"` // Targetting parameters for record
|
|
Signatures []string `json:"signatures"` // Signatures applied to the record
|
|
}
|
|
|
|
// Validate an existing manifest record
|
|
func (m *ManifestRecord) Validate() (err error) {
|
|
if m.Name == "" {
|
|
return fmt.Errorf("manifest has invalid name")
|
|
}
|
|
if m.Target == "" {
|
|
return fmt.Errorf("manifest has invalid target")
|
|
}
|
|
if m.Status != "staged" && m.Status != "active" && m.Status != "disabled" {
|
|
return fmt.Errorf("manifest has invalid status")
|
|
}
|
|
// Attempt to convert it to a response as part of validation
|
|
_, err = m.ManifestResponse()
|
|
if err != nil {
|
|
return
|
|
}
|
|
return
|
|
}
|
|
|
|
// Sign a manifest record
|
|
func (m *ManifestRecord) Sign(keyid string, secring io.Reader) (sig string, err error) {
|
|
defer func() {
|
|
if e := recover(); e != nil {
|
|
err = fmt.Errorf("Sign() -> %v", e)
|
|
}
|
|
}()
|
|
|
|
// Convert the record into entry format, and strip existing signatures
|
|
// before signing.
|
|
me, err := m.ManifestResponse()
|
|
if err != nil {
|
|
panic(err)
|
|
}
|
|
me.Signatures = make([]string, 0)
|
|
buf, err := json.Marshal(me)
|
|
if err != nil {
|
|
panic(err)
|
|
}
|
|
sig, err = pgp.Sign(string(buf), keyid, secring)
|
|
if err != nil {
|
|
panic(err)
|
|
}
|
|
return
|
|
}
|
|
|
|
// Convert a manifest record into a manifest response
|
|
func (m *ManifestRecord) ManifestResponse() (ManifestResponse, error) {
|
|
ret := ManifestResponse{}
|
|
|
|
if len(m.Content) == 0 {
|
|
return ret, fmt.Errorf("manifest record has no content")
|
|
}
|
|
|
|
buf := bytes.NewBufferString(m.Content)
|
|
b64r := base64.NewDecoder(base64.StdEncoding, buf)
|
|
gzr, err := gzip.NewReader(b64r)
|
|
if err != nil {
|
|
return ret, err
|
|
}
|
|
tr := tar.NewReader(gzr)
|
|
for {
|
|
h, err := tr.Next()
|
|
if err != nil {
|
|
if err == io.EOF {
|
|
break
|
|
}
|
|
return ret, err
|
|
}
|
|
if h.Typeflag != tar.TypeReg {
|
|
continue
|
|
}
|
|
|
|
hash := sha256.New()
|
|
rbuf := make([]byte, 4096)
|
|
for {
|
|
n, err := tr.Read(rbuf)
|
|
if err != nil {
|
|
if err == io.EOF {
|
|
break
|
|
}
|
|
return ret, err
|
|
}
|
|
if n > 0 {
|
|
hash.Write(rbuf[:n])
|
|
}
|
|
}
|
|
|
|
_, entname := path.Split(h.Name)
|
|
|
|
newEntry := ManifestEntry{}
|
|
newEntry.Name = entname
|
|
newEntry.SHA256 = fmt.Sprintf("%x", hash.Sum(nil))
|
|
ret.Entries = append(ret.Entries, newEntry)
|
|
}
|
|
ret.Signatures = m.Signatures
|
|
|
|
return ret, nil
|
|
}
|
|
|
|
// Returns the requested file object as a gzip compressed byte slice
|
|
// from the manifest record
|
|
func (m *ManifestRecord) ManifestObject(obj string) ([]byte, error) {
|
|
var bufw bytes.Buffer
|
|
var ret []byte
|
|
|
|
bufr := bytes.NewBufferString(m.Content)
|
|
b64r := base64.NewDecoder(base64.StdEncoding, bufr)
|
|
gzr, err := gzip.NewReader(b64r)
|
|
if err != nil {
|
|
return ret, err
|
|
}
|
|
tr := tar.NewReader(gzr)
|
|
found := false
|
|
for {
|
|
h, err := tr.Next()
|
|
if err != nil {
|
|
if err == io.EOF {
|
|
break
|
|
}
|
|
return ret, err
|
|
}
|
|
if h.Typeflag != tar.TypeReg {
|
|
continue
|
|
}
|
|
_, thisf := path.Split(h.Name)
|
|
if thisf != obj {
|
|
continue
|
|
}
|
|
found = true
|
|
gzw := gzip.NewWriter(&bufw)
|
|
buftemp := make([]byte, 4096)
|
|
for {
|
|
n, err := tr.Read(buftemp)
|
|
if err != nil {
|
|
if err == io.EOF {
|
|
break
|
|
}
|
|
return ret, err
|
|
}
|
|
if n > 0 {
|
|
_, err = gzw.Write(buftemp[:n])
|
|
if err != nil {
|
|
return ret, err
|
|
}
|
|
}
|
|
}
|
|
gzw.Close()
|
|
break
|
|
}
|
|
if !found {
|
|
return ret, fmt.Errorf("object %v not found in manifest", obj)
|
|
}
|
|
|
|
ret = bufw.Bytes()
|
|
return ret, nil
|
|
}
|
|
|
|
// Load manifest content from a file on the file system (a gzip'd tar file),
|
|
// primarily utilized by mig-console during manifest creation operations.
|
|
func (m *ManifestRecord) ContentFromFile(path string) (err error) {
|
|
var buf bytes.Buffer
|
|
fd, err := os.Open(path)
|
|
if err != nil {
|
|
return
|
|
}
|
|
defer fd.Close()
|
|
b64w := base64.NewEncoder(base64.StdEncoding, &buf)
|
|
b, err := ioutil.ReadAll(fd)
|
|
if err != nil {
|
|
return
|
|
}
|
|
_, err = b64w.Write(b)
|
|
if err != nil {
|
|
return
|
|
}
|
|
b64w.Close()
|
|
m.Content = buf.String()
|
|
return
|
|
}
|
|
|
|
// Write manifest content to a file on the file system
|
|
func (m *ManifestRecord) FileFromContent(path string) (err error) {
|
|
fd, err := os.Create(path)
|
|
if err != nil {
|
|
return
|
|
}
|
|
defer fd.Close()
|
|
bufr := bytes.NewBufferString(m.Content)
|
|
b64r := base64.NewDecoder(base64.StdEncoding, bufr)
|
|
b, err := ioutil.ReadAll(b64r)
|
|
if err != nil {
|
|
return
|
|
}
|
|
_, err = fd.Write(b)
|
|
if err != nil {
|
|
return
|
|
}
|
|
return nil
|
|
}
|
|
|
|
// Manifest parameters are sent from the loader to the API as part of
|
|
// a manifest request.
|
|
type ManifestParameters struct {
|
|
AgentIdentifier Agent `json:"agent"` // Agent context information
|
|
Object string `json:"object"` // Object being requested
|
|
}
|
|
|
|
// Validate parameters included in a manifest request
|
|
func (m *ManifestParameters) Validate() error {
|
|
return nil
|
|
}
|
|
|
|
// Validate parameters included in a manifest request with an object fetch
|
|
// component
|
|
func (m *ManifestParameters) ValidateFetch() error {
|
|
err := m.Validate()
|
|
if err != nil {
|
|
return err
|
|
}
|
|
if m.Object == "" {
|
|
return fmt.Errorf("manifest fetch with no object")
|
|
}
|
|
return m.Validate()
|
|
}
|
|
|
|
// The response to a manifest object fetch
|
|
type ManifestFetchResponse struct {
|
|
Data []byte `json:"data"`
|
|
}
|
|
|
|
// The response to a standard manifest request
|
|
type ManifestResponse struct {
|
|
LoaderName string `json:"loader_name"`
|
|
Entries []ManifestEntry `json:"entries"`
|
|
Signatures []string `json:"signatures"`
|
|
}
|
|
|
|
// Validate a manifest response
|
|
func (m *ManifestResponse) Validate() error {
|
|
if m.LoaderName == "" {
|
|
return fmt.Errorf("manifest response has no loader name")
|
|
}
|
|
return nil
|
|
}
|
|
|
|
// Validates signatures stored in the manifest against keys in keyring, returns
|
|
// the number of valid signature matches
|
|
func (m *ManifestResponse) VerifySignatures(keyring io.Reader) (validcnt int, err error) {
|
|
var sigs []string
|
|
|
|
// Copy signatures out of the response, and clear them as we do not
|
|
// include them as part of the JSON document in validation
|
|
sigs = make([]string, len(m.Signatures))
|
|
copy(sigs, m.Signatures)
|
|
m.Signatures = m.Signatures[:0]
|
|
|
|
mcopy := *m
|
|
|
|
// Also zero the loader name as it is not included in the signature
|
|
mcopy.LoaderName = ""
|
|
|
|
buf, err := json.Marshal(mcopy)
|
|
if err != nil {
|
|
return validcnt, err
|
|
}
|
|
// Create a copy of the keyring we can use during validation of each
|
|
// signature. We don't want to use the keyring directly as it is
|
|
// backed by a buffer and will be drained after verification of the
|
|
// first signature.
|
|
keycopy, err := ioutil.ReadAll(keyring)
|
|
if err != nil {
|
|
return validcnt, err
|
|
}
|
|
for _, x := range sigs {
|
|
keyreader := bytes.NewBuffer(keycopy)
|
|
valid, _, err := pgp.Verify(string(buf), x, keyreader)
|
|
if err != nil {
|
|
return validcnt, err
|
|
}
|
|
if valid {
|
|
validcnt++
|
|
}
|
|
}
|
|
|
|
return
|
|
}
|
|
|
|
// Describes individual file elements within a manifest
|
|
type ManifestEntry struct {
|
|
Name string `json:"name"` // Corresponds to a bundle name
|
|
SHA256 string `json:"sha256"` // SHA256 of entry
|
|
}
|
|
|
|
// The bundle dictionary is used to map tokens within the loader manifest to
|
|
// objects on the file system. We don't allow specification of an exact path
|
|
// for interrogation or manipulation in the manifest. This results in some
|
|
// restrictions but hardens the loader against making unauthorized changes
|
|
// to the file system.
|
|
//
|
|
// If a Transform function is set on the entry, this is used to transform
|
|
// bytes into the data set prior to hash calculation
|
|
type BundleDictionaryEntry struct {
|
|
Name string
|
|
Path string
|
|
SHA256 string
|
|
Perm os.FileMode
|
|
}
|
|
|
|
var bundleEntryLinux = []BundleDictionaryEntry{
|
|
{"mig-agent", "/sbin/mig-agent", "", 0700},
|
|
{"mig-loader", "/sbin/mig-loader", "", 0700},
|
|
{"configuration", "/etc/mig/mig-agent.cfg", "", 0600},
|
|
{"agentcert", "/etc/mig/agent.crt", "", 0644},
|
|
{"agentkey", "/etc/mig/agent.key", "", 0600},
|
|
{"cacert", "/etc/mig/ca.crt", "", 0644},
|
|
}
|
|
|
|
var bundleEntryDarwin = []BundleDictionaryEntry{
|
|
{"mig-agent", "/usr/local/bin/mig-agent", "", 0700},
|
|
{"mig-loader", "/usr/local/bin/mig-loader", "", 0700},
|
|
{"configuration", "/etc/mig/mig-agent.cfg", "", 0600},
|
|
{"agentcert", "/etc/mig/agent.crt", "", 0644},
|
|
{"agentkey", "/etc/mig/agent.key", "", 0600},
|
|
{"cacert", "/etc/mig/ca.crt", "", 0644},
|
|
}
|
|
|
|
var BundleDictionary = map[string][]BundleDictionaryEntry{
|
|
"linux": bundleEntryLinux,
|
|
"darwin": bundleEntryDarwin,
|
|
}
|
|
|
|
func GetHostBundle() ([]BundleDictionaryEntry, error) {
|
|
switch runtime.GOOS {
|
|
case "linux":
|
|
return bundleEntryLinux, nil
|
|
case "darwin":
|
|
return bundleEntryDarwin, nil
|
|
}
|
|
return nil, fmt.Errorf("no entry for %v in bundle dictionary", runtime.GOOS)
|
|
}
|
|
|
|
// Populates a slice of BundleDictionaryEntrys, adding the SHA256 checksums
|
|
// from the file system
|
|
func HashBundle(b []BundleDictionaryEntry) ([]BundleDictionaryEntry, error) {
|
|
ret := b
|
|
for i := range ret {
|
|
fd, err := os.Open(ret[i].Path)
|
|
if err != nil {
|
|
// If the file does not exist we don't treat this as as
|
|
// an error. This is likely in cases with embedded
|
|
// configurations. In this case we leave the SHA256 as
|
|
// an empty string.
|
|
if os.IsNotExist(err) {
|
|
continue
|
|
}
|
|
return nil, err
|
|
}
|
|
h := sha256.New()
|
|
buf := make([]byte, 4096)
|
|
for {
|
|
n, err := fd.Read(buf)
|
|
if err != nil {
|
|
if err == io.EOF {
|
|
break
|
|
}
|
|
fd.Close()
|
|
return nil, err
|
|
}
|
|
if n > 0 {
|
|
h.Write(buf[:n])
|
|
}
|
|
}
|
|
fd.Close()
|
|
ret[i].SHA256 = fmt.Sprintf("%x", h.Sum(nil))
|
|
}
|
|
return ret, nil
|
|
}
|