mirror of
https://github.com/rocky-linux/peridot.git
synced 2024-12-02 17:46:27 +00:00
ad0f7a5305
Upgrade to Go 1.20.5, Hydra v2 SDK, rules-go v0.44.2 (with proper resolves), protobuf v25.3 and mass upgrade of Go dependencies.
123 lines
4.5 KiB
Go
123 lines
4.5 KiB
Go
/*
|
|
*
|
|
* Copyright 2022 Google LLC
|
|
*
|
|
* Licensed under the Apache License, Version 2.0 (the "License");
|
|
* you may not use this file except in compliance with the License.
|
|
* You may obtain a copy of the License at
|
|
*
|
|
* https://www.apache.org/licenses/LICENSE-2.0
|
|
*
|
|
* Unless required by applicable law or agreed to in writing, software
|
|
* distributed under the License is distributed on an "AS IS" BASIS,
|
|
* WITHOUT WARRANTIES OR CONDITIONS OF ANY KIND, either express or implied.
|
|
* See the License for the specific language governing permissions and
|
|
* limitations under the License.
|
|
*
|
|
*/
|
|
|
|
// Package certverifier offloads verifications to S2Av2.
|
|
package certverifier
|
|
|
|
import (
|
|
"crypto/x509"
|
|
"fmt"
|
|
|
|
"github.com/google/s2a-go/stream"
|
|
"google.golang.org/grpc/codes"
|
|
"google.golang.org/grpc/grpclog"
|
|
|
|
s2av2pb "github.com/google/s2a-go/internal/proto/v2/s2a_go_proto"
|
|
)
|
|
|
|
// VerifyClientCertificateChain builds a SessionReq, sends it to S2Av2 and
|
|
// receives a SessionResp.
|
|
func VerifyClientCertificateChain(verificationMode s2av2pb.ValidatePeerCertificateChainReq_VerificationMode, s2AStream stream.S2AStream) func(rawCerts [][]byte, verifiedChains [][]*x509.Certificate) error {
|
|
return func(rawCerts [][]byte, verifiedChains [][]*x509.Certificate) error {
|
|
// Offload verification to S2Av2.
|
|
if grpclog.V(1) {
|
|
grpclog.Infof("Sending request to S2Av2 for client peer cert chain validation.")
|
|
}
|
|
if err := s2AStream.Send(&s2av2pb.SessionReq{
|
|
ReqOneof: &s2av2pb.SessionReq_ValidatePeerCertificateChainReq{
|
|
ValidatePeerCertificateChainReq: &s2av2pb.ValidatePeerCertificateChainReq{
|
|
Mode: verificationMode,
|
|
PeerOneof: &s2av2pb.ValidatePeerCertificateChainReq_ClientPeer_{
|
|
ClientPeer: &s2av2pb.ValidatePeerCertificateChainReq_ClientPeer{
|
|
CertificateChain: rawCerts,
|
|
},
|
|
},
|
|
},
|
|
},
|
|
}); err != nil {
|
|
grpclog.Infof("Failed to send request to S2Av2 for client peer cert chain validation.")
|
|
return err
|
|
}
|
|
|
|
// Get the response from S2Av2.
|
|
resp, err := s2AStream.Recv()
|
|
if err != nil {
|
|
grpclog.Infof("Failed to receive client peer cert chain validation response from S2Av2.")
|
|
return err
|
|
}
|
|
|
|
// Parse the response.
|
|
if (resp.GetStatus() != nil) && (resp.GetStatus().Code != uint32(codes.OK)) {
|
|
return fmt.Errorf("failed to offload client cert verification to S2A: %d, %v", resp.GetStatus().Code, resp.GetStatus().Details)
|
|
|
|
}
|
|
|
|
if resp.GetValidatePeerCertificateChainResp().ValidationResult != s2av2pb.ValidatePeerCertificateChainResp_SUCCESS {
|
|
return fmt.Errorf("client cert verification failed: %v", resp.GetValidatePeerCertificateChainResp().ValidationDetails)
|
|
}
|
|
|
|
return nil
|
|
}
|
|
}
|
|
|
|
// VerifyServerCertificateChain builds a SessionReq, sends it to S2Av2 and
|
|
// receives a SessionResp.
|
|
func VerifyServerCertificateChain(hostname string, verificationMode s2av2pb.ValidatePeerCertificateChainReq_VerificationMode, s2AStream stream.S2AStream, serverAuthorizationPolicy []byte) func(rawCerts [][]byte, verifiedChains [][]*x509.Certificate) error {
|
|
return func(rawCerts [][]byte, verifiedChains [][]*x509.Certificate) error {
|
|
// Offload verification to S2Av2.
|
|
if grpclog.V(1) {
|
|
grpclog.Infof("Sending request to S2Av2 for server peer cert chain validation.")
|
|
}
|
|
if err := s2AStream.Send(&s2av2pb.SessionReq{
|
|
ReqOneof: &s2av2pb.SessionReq_ValidatePeerCertificateChainReq{
|
|
ValidatePeerCertificateChainReq: &s2av2pb.ValidatePeerCertificateChainReq{
|
|
Mode: verificationMode,
|
|
PeerOneof: &s2av2pb.ValidatePeerCertificateChainReq_ServerPeer_{
|
|
ServerPeer: &s2av2pb.ValidatePeerCertificateChainReq_ServerPeer{
|
|
CertificateChain: rawCerts,
|
|
ServerHostname: hostname,
|
|
SerializedUnrestrictedClientPolicy: serverAuthorizationPolicy,
|
|
},
|
|
},
|
|
},
|
|
},
|
|
}); err != nil {
|
|
grpclog.Infof("Failed to send request to S2Av2 for server peer cert chain validation.")
|
|
return err
|
|
}
|
|
|
|
// Get the response from S2Av2.
|
|
resp, err := s2AStream.Recv()
|
|
if err != nil {
|
|
grpclog.Infof("Failed to receive server peer cert chain validation response from S2Av2.")
|
|
return err
|
|
}
|
|
|
|
// Parse the response.
|
|
if (resp.GetStatus() != nil) && (resp.GetStatus().Code != uint32(codes.OK)) {
|
|
return fmt.Errorf("failed to offload server cert verification to S2A: %d, %v", resp.GetStatus().Code, resp.GetStatus().Details)
|
|
}
|
|
|
|
if resp.GetValidatePeerCertificateChainResp().ValidationResult != s2av2pb.ValidatePeerCertificateChainResp_SUCCESS {
|
|
return fmt.Errorf("server cert verification failed: %v", resp.GetValidatePeerCertificateChainResp().ValidationDetails)
|
|
}
|
|
|
|
return nil
|
|
}
|
|
}
|