telebit/cmd/signjwt/signjwt.go

128 lines
3.2 KiB
Go
Raw Normal View History

2020-05-26 09:05:39 +00:00
package main
import (
"crypto/hmac"
"crypto/sha256"
2020-05-31 12:19:41 +00:00
"encoding/base64"
"encoding/hex"
2020-07-06 09:23:12 +00:00
"flag"
2020-05-26 09:05:39 +00:00
"fmt"
"os"
2020-06-03 07:47:06 +00:00
"git.coolaj86.com/coolaj86/go-telebitd/mgmt/authstore"
2020-07-06 09:23:12 +00:00
telebit "git.coolaj86.com/coolaj86/go-telebitd/mplexer"
2020-05-31 12:19:41 +00:00
"github.com/denisbrodbeck/machineid"
2020-05-26 09:05:39 +00:00
_ "github.com/joho/godotenv/autoload"
)
func main() {
2020-07-19 08:16:11 +00:00
var secret, clientSecret, relaySecret string
machinePPID := flag.String("machine-ppid", "", "spoof the machine ppid")
machineID := flag.String("machine-id", "", "spoof the raw machine id")
vendorID := flag.String("vendor-id", "", "a unique identifier for a deploy target environment")
2020-07-06 09:23:12 +00:00
authURL := flag.String("auth-url", "", "the base url for authentication, if not the same as the tunnel relay")
getMachinePPID := flag.Bool("machine-ppid-only", false, "just print the machine ppid, not the token")
2020-07-19 08:16:11 +00:00
flag.StringVar(&secret, "secret", "", "either the remote server or the tunnel relay secret (used for JWT authentication)")
2020-07-06 09:23:12 +00:00
flag.Parse()
2020-05-26 09:05:39 +00:00
2020-07-19 08:16:11 +00:00
if 0 == len(*authURL) {
*authURL = os.Getenv("AUTH_URL")
}
if 0 == len(*vendorID) {
*vendorID = os.Getenv("VENDOR_ID")
2020-05-26 09:05:39 +00:00
}
if 0 == len(*vendorID) {
*vendorID = "telebit.io"
2020-07-06 09:23:12 +00:00
}
2020-07-19 08:16:11 +00:00
if 0 == len(secret) {
clientSecret = os.Getenv("CLIENT_SECRET")
relaySecret = os.Getenv("RELAY_SECRET")
if 0 == len(relaySecret) {
relaySecret = os.Getenv("SECRET")
2020-07-06 09:23:12 +00:00
}
}
2020-07-19 08:16:11 +00:00
if 0 == len(secret) {
secret = clientSecret
2020-07-06 09:23:12 +00:00
}
2020-07-19 08:16:11 +00:00
if 0 == len(secret) {
secret = relaySecret
2020-07-06 09:23:12 +00:00
}
2020-07-19 08:16:11 +00:00
if 0 == len(secret) && 0 == len(clientSecret) && 0 == len(relaySecret) {
fmt.Fprintf(os.Stderr, "See usage: signjwt --help\n")
os.Exit(1)
return
} else if 0 != len(clientSecret) && 0 != len(relaySecret) {
fmt.Fprintf(os.Stderr, "Use only one of $SECRET or --relay-secret or --client-secret\n")
2020-05-26 09:05:39 +00:00
os.Exit(1)
return
}
ppid := *machinePPID
if 0 == len(ppid) {
appID := fmt.Sprintf("%s|%s", *vendorID, secret)
var muid string
var err error
if 0 == len(*machineID) {
muid, err = machineid.ProtectedID(appID)
if nil != err {
fmt.Fprintf(os.Stderr, "unauthorized device: %s\n", err)
os.Exit(1)
return
}
} else {
muid = ProtectMachineID(appID, *machineID)
}
muidBytes, _ := hex.DecodeString(muid)
ppid = base64.RawURLEncoding.EncodeToString(muidBytes)
2020-07-06 09:23:12 +00:00
}
fmt.Fprintf(os.Stderr, "[debug] vendorID = %s\n", *vendorID)
2020-07-19 08:16:11 +00:00
fmt.Fprintf(os.Stderr, "[debug] secret = %s\n", secret)
pub := authstore.ToPublicKeyString(ppid)
if *getMachinePPID {
2020-07-19 08:16:11 +00:00
fmt.Fprintf(os.Stderr, "[debug]: <ppid> <pub>\n")
fmt.Fprintf(
os.Stdout,
"%s %s\n",
ppid,
pub,
)
return
2020-05-31 12:19:41 +00:00
}
2020-07-19 08:16:11 +00:00
fmt.Fprintf(os.Stderr, "[debug] ppid = %s\n", ppid)
fmt.Fprintf(os.Stderr, "[debug] pub = %s\n", pub)
tok, err := authstore.HMACToken(ppid)
2020-05-26 09:05:39 +00:00
if nil != err {
2020-07-06 09:23:12 +00:00
fmt.Fprintf(os.Stderr, "signing error: %s\n", err)
2020-05-26 09:05:39 +00:00
os.Exit(1)
return
}
2020-07-06 09:23:12 +00:00
fmt.Fprintf(os.Stderr, "[debug] <token>\n")
2020-07-19 08:16:11 +00:00
fmt.Fprintf(os.Stdout, "%s\n", tok)
2020-07-06 09:23:12 +00:00
2020-07-19 08:16:11 +00:00
if "" != *authURL {
grants, err := telebit.Inspect(*authURL, tok)
if nil != err {
fmt.Fprintf(os.Stderr, "inspect relay token failed:\n%s\n", err)
os.Exit(1)
}
fmt.Fprintf(os.Stderr, "[debug] <grants>\n")
fmt.Fprintf(os.Stderr, "%+v\n", grants)
2020-07-06 09:23:12 +00:00
}
2020-05-26 09:05:39 +00:00
}
func ProtectMachineID(appID, machineID string) string {
mac := hmac.New(sha256.New, []byte(machineID))
mac.Write([]byte(appID))
return hex.EncodeToString(mac.Sum(nil))
}