pkg/container/identity/codec.go (62 lines of code) (raw):
// Licensed to Elasticsearch B.V. under one or more contributor
// license agreements. See the NOTICE file distributed with
// this work for additional information regarding copyright
// ownership. Elasticsearch B.V. licenses this file to you under
// the Apache License, Version 2.0 (the "License"); you may
// not use this file except in compliance with the License.
// You may obtain a copy of the License at
//
// http://www.apache.org/licenses/LICENSE-2.0
//
// Unless required by applicable law or agreed to in writing,
// software distributed under the License is distributed on an
// "AS IS" BASIS, WITHOUT WARRANTIES OR CONDITIONS OF ANY
// KIND, either express or implied. See the License for the
// specific language governing permissions and limitations
// under the License.
package identity
import (
"encoding/json"
"fmt"
"io"
"time"
validation "github.com/go-ozzo/ozzo-validation/v4"
"github.com/go-ozzo/ozzo-validation/v4/is"
"github.com/elastic/harp/pkg/container/identity/key"
"github.com/elastic/harp/pkg/sdk/types"
)
const (
apiVersion = "harp.elastic.co/v1"
kind = "ContainerIdentity"
)
// -----------------------------------------------------------------------------
type PrivateKeyGeneratorFunc func(io.Reader) (*key.JSONWebKey, string, error)
// New identity from description.
func New(random io.Reader, description string, generator PrivateKeyGeneratorFunc) (*Identity, []byte, error) {
// Check arguments
if err := validation.Validate(description, validation.Required, is.ASCII); err != nil {
return nil, nil, fmt.Errorf("unable to create identity with invalid description: %w", err)
}
// Delegate to generator
jwk, encodedPub, err := generator(random)
if err != nil {
return nil, nil, fmt.Errorf("unable to generate identity private key: %w", err)
}
// Encode JWK as json
payload, err := json.Marshal(jwk)
if err != nil {
return nil, nil, fmt.Errorf("unable to serialize identity keypair: %w", err)
}
// Prepae identity object
id := &Identity{
APIVersion: apiVersion,
Kind: kind,
Timestamp: time.Now().UTC(),
Description: description,
Public: encodedPub,
}
// Encode to json for signature
protected, err := json.Marshal(id)
if err != nil {
return nil, nil, fmt.Errorf("unable to serialize identity for signature: %w", err)
}
// Sign the protected data
sig, err := jwk.Sign(protected)
if err != nil {
return nil, nil, fmt.Errorf("unable to sign protected data: %w", err)
}
// Auto-assign the signature
id.Signature = sig
// Return unsealed identity
return id, payload, nil
}
// FromReader extract identity instance from reader.
func FromReader(r io.Reader) (*Identity, error) {
// Check arguments
if types.IsNil(r) {
return nil, fmt.Errorf("unable to read nil reader")
}
// Convert input as a map
var input Identity
if err := json.NewDecoder(r).Decode(&input); err != nil {
return nil, fmt.Errorf("unable to decode input JSON: %w", err)
}
// Check component
if input.Private == nil {
return nil, fmt.Errorf("invalid identity: missing private component")
}
// Validate self signature
if errVerify := input.Verify(); errVerify != nil {
return nil, fmt.Errorf("unable to verify identity: %w", errVerify)
}
// Return no error
return &input, nil
}