signature.go 1.5 KB

123456789101112131415161718192021222324252627282930313233343536373839404142434445464748495051525354555657585960616263
  1. package signature
  2. import (
  3. "bytes"
  4. "crypto/sha256"
  5. "encoding/base64"
  6. "encoding/hex"
  7. "fmt"
  8. "strings"
  9. "golang.org/x/crypto/ssh"
  10. )
  11. type SignatureData struct {
  12. Method string
  13. Path string
  14. Data []byte
  15. }
  16. func GetBytesToSign(s SignatureData) []byte {
  17. // contentHash = base64(hex(sha256(s.Data)))
  18. hash := sha256.Sum256(s.Data)
  19. hashHex := make([]byte, hex.EncodedLen(len(hash)))
  20. hex.Encode(hashHex, hash[:])
  21. contentHash := base64.StdEncoding.EncodeToString(hashHex)
  22. // bytesToSign e.g.: "GET,http://localhost,OTdkZjM1O...
  23. bytesToSign := []byte(strings.Join([]string{s.Method, s.Path, contentHash}, ","))
  24. return bytesToSign
  25. }
  26. // SignData takes a SignatureData object and signs it with a raw private key
  27. func SignAuthData(s SignatureData, rawKey []byte) (string, error) {
  28. bytesToSign := GetBytesToSign(s)
  29. // TODO replace this w/ a non-SSH based private key
  30. privateKey, err := ssh.ParseRawPrivateKey(rawKey)
  31. if err != nil {
  32. return "", err
  33. }
  34. signer, err := ssh.NewSignerFromKey(privateKey)
  35. if err != nil {
  36. return "", err
  37. }
  38. // get the pubkey, but remove the type
  39. pubKey := ssh.MarshalAuthorizedKey(signer.PublicKey())
  40. parts := bytes.Split(pubKey, []byte(" "))
  41. if len(parts) < 2 {
  42. return "", fmt.Errorf("malformed private key")
  43. }
  44. signedData, err := signer.Sign(nil, bytesToSign)
  45. if err != nil {
  46. return "", err
  47. }
  48. // signature is <pubkey>:<signature>
  49. sig := fmt.Sprintf("%s:%s", bytes.TrimSpace(parts[1]), base64.StdEncoding.EncodeToString(signedData.Blob))
  50. return sig, nil
  51. }