mirror of
https://github.com/edgelesssys/constellation.git
synced 2024-12-16 19:34:37 -05:00
d67d0ac9df
Signed-off-by: Daniel Weiße <dw@edgeless.systems>
165 lines
5.0 KiB
Go
165 lines
5.0 KiB
Go
/*
|
|
Copyright (c) Edgeless Systems GmbH
|
|
|
|
SPDX-License-Identifier: AGPL-3.0-only
|
|
*/
|
|
|
|
/*
|
|
Package fetcher implements a client for the Constellation Resource API.
|
|
|
|
The fetcher is used to get information from the versions API without having to
|
|
authenticate with AWS, where the API is currently hosted. This package should be
|
|
used in user-facing application code most of the time, like the CLI.
|
|
|
|
Each sub-API included in the Constellation Resource API should define it's resources by implementing types that implement apiObject.
|
|
The new package can then call this package's Fetch function to get the resource from the API.
|
|
To modify resources, pkg internal/api/client should be used in a similar fashion.
|
|
*/
|
|
package fetcher
|
|
|
|
import (
|
|
"context"
|
|
"encoding/json"
|
|
"fmt"
|
|
"io"
|
|
"net/http"
|
|
"net/url"
|
|
|
|
"github.com/edgelesssys/constellation/v2/internal/sigstore"
|
|
)
|
|
|
|
// NewHTTPClient returns a new http client.
|
|
func NewHTTPClient() HTTPClient {
|
|
return &http.Client{Transport: &http.Transport{
|
|
DisableKeepAlives: true, // DisableKeepAlives fixes concurrency issue see https://stackoverflow.com/a/75816347
|
|
Proxy: http.ProxyFromEnvironment,
|
|
}}
|
|
}
|
|
|
|
// Fetch fetches the given apiObject from the public Constellation CDN.
|
|
// Fetch does not require authentication.
|
|
func Fetch[T apiObject](ctx context.Context, c HTTPClient, cdnURL string, obj T) (T, error) {
|
|
rawObj, err := fetch(ctx, c, cdnURL, obj)
|
|
if err != nil {
|
|
return *new(T), fmt.Errorf("fetching %T: %w", obj, err)
|
|
}
|
|
|
|
return parseObject(rawObj, obj)
|
|
}
|
|
|
|
// FetchAndVerify fetches the given apiObject, checks if it can fetch an accompanying signature and verifies if the signature matches the found object.
|
|
// The public key used to verify the signature is embedded in the verifier argument.
|
|
// FetchAndVerify uses a generic to return a new object of type T.
|
|
// Otherwise the caller would have to cast the interface type to a concrete object, which could fail.
|
|
func FetchAndVerify[T apiObject](ctx context.Context, c HTTPClient, cdnURL string, obj T, cosignVerifier sigstore.Verifier) (T, error) {
|
|
rawObj, err := fetch(ctx, c, cdnURL, obj)
|
|
if err != nil {
|
|
return *new(T), fmt.Errorf("fetching %T: %w", obj, err)
|
|
}
|
|
fetchedObj, err := parseObject(rawObj, obj)
|
|
if err != nil {
|
|
return fetchedObj, fmt.Errorf("parsing %T: %w", obj, err)
|
|
}
|
|
|
|
signature, err := Fetch(ctx, c, cdnURL, signature{Signed: obj.JSONPath()})
|
|
if err != nil {
|
|
return fetchedObj, fmt.Errorf("fetching signature: %w", err)
|
|
}
|
|
err = cosignVerifier.VerifySignature(rawObj, signature.Signature)
|
|
if err != nil {
|
|
return fetchedObj, fmt.Errorf("verifying signature: %w", err)
|
|
}
|
|
return fetchedObj, nil
|
|
}
|
|
|
|
func fetch[T apiObject](ctx context.Context, c HTTPClient, cdnURL string, obj T) ([]byte, error) {
|
|
if err := obj.ValidateRequest(); err != nil {
|
|
return nil, fmt.Errorf("validating request for %T: %w", obj, err)
|
|
}
|
|
|
|
urlObj, err := url.Parse(cdnURL)
|
|
if err != nil {
|
|
return nil, fmt.Errorf("parsing CDN root URL: %w", err)
|
|
}
|
|
urlObj.Path = obj.JSONPath()
|
|
url := urlObj.String()
|
|
|
|
req, err := http.NewRequestWithContext(ctx, http.MethodGet, url, http.NoBody)
|
|
if err != nil {
|
|
return nil, fmt.Errorf("creating request for %T: %w", obj, err)
|
|
}
|
|
|
|
resp, err := c.Do(req)
|
|
if err != nil {
|
|
return nil, fmt.Errorf("sending request for %T: %w", obj, err)
|
|
}
|
|
defer resp.Body.Close()
|
|
switch resp.StatusCode {
|
|
case http.StatusOK:
|
|
case http.StatusNotFound:
|
|
return nil, &NotFoundError{fmt.Errorf("requesting resource at %s returned status code 404", url)}
|
|
default:
|
|
return nil, fmt.Errorf("unexpected status code %d while requesting resource", resp.StatusCode)
|
|
}
|
|
|
|
return io.ReadAll(resp.Body)
|
|
}
|
|
|
|
func parseObject[T apiObject](rawObj []byte, obj T) (T, error) {
|
|
var newObj T
|
|
if err := json.Unmarshal(rawObj, &newObj); err != nil {
|
|
return *new(T), fmt.Errorf("decoding %T: %w", obj, err)
|
|
}
|
|
if newObj.Validate() != nil {
|
|
return *new(T), fmt.Errorf("received invalid %T: %w", newObj, newObj.Validate())
|
|
}
|
|
return newObj, nil
|
|
}
|
|
|
|
// NotFoundError is an error that is returned when a resource is not found.
|
|
type NotFoundError struct {
|
|
err error
|
|
}
|
|
|
|
func (e *NotFoundError) Error() string {
|
|
return fmt.Sprintf("the requested resource was not found: %s", e.err.Error())
|
|
}
|
|
|
|
func (e *NotFoundError) Unwrap() error {
|
|
return e.err
|
|
}
|
|
|
|
// HTTPClient is an interface for http clients.
|
|
type HTTPClient interface {
|
|
Do(req *http.Request) (*http.Response, error)
|
|
}
|
|
|
|
type apiObject interface {
|
|
ValidateRequest() error
|
|
Validate() error
|
|
JSONPath() string
|
|
}
|
|
|
|
// signature manages the signature of a object saved at location 'Signed'.
|
|
type signature struct {
|
|
// Signed is the object that is signed.
|
|
Signed string `json:"signed"`
|
|
// Signature is the signature of `Signed`.
|
|
Signature []byte `json:"signature"`
|
|
}
|
|
|
|
// URL returns the URL for the request to the config api.
|
|
func (s signature) JSONPath() string {
|
|
return s.Signed + ".sig"
|
|
}
|
|
|
|
// ValidateRequest is a no-op.
|
|
func (s signature) ValidateRequest() error {
|
|
return nil
|
|
}
|
|
|
|
// Validate checks that the signature is base64 encoded.
|
|
func (s signature) Validate() error {
|
|
return sigstore.IsBase64(s.Signature)
|
|
}
|