Jan Dittberner
da24ae70b6
Change the behaviour of the client to use the new CAInfoCommand support in cacert-gosigner. The client has a new mechanism to generate new commands as reaction to received responses. This functionality is used to retrieve CA certificate information when certificates previously unknown to the client appear and to trigger CRL retrieval for new certificates. New CA certificates announced by the signer are detected and information is retrieved. The retrieved CA certificate is stored alongside the CRL files in a configurable directory (defaults to "public" in the working directory of the signerclient process).
242 lines
6.3 KiB
Go
242 lines
6.3 KiB
Go
/*
|
|
Copyright 2022 CAcert Inc.
|
|
SPDX-License-Identifier: Apache-2.0
|
|
|
|
Licensed under the Apache License, Version 2.0 (the "License");
|
|
you may not use this file except in compliance with the License.
|
|
You may obtain a copy of the License at
|
|
|
|
http://www.apache.org/licenses/LICENSE-2.0
|
|
|
|
Unless required by applicable law or agreed to in writing, software
|
|
distributed under the License is distributed on an "AS IS" BASIS,
|
|
WITHOUT WARRANTIES OR CONDITIONS OF ANY KIND, either express or implied.
|
|
See the License for the specific language governing permissions and
|
|
limitations under the License.
|
|
*/
|
|
|
|
package handler
|
|
|
|
import (
|
|
"context"
|
|
"fmt"
|
|
"time"
|
|
|
|
"github.com/shamaton/msgpackgen/msgpack"
|
|
"github.com/sirupsen/logrus"
|
|
|
|
"git.cacert.org/cacert-gosignerclient/internal/client"
|
|
|
|
"git.cacert.org/cacert-gosigner/pkg/messages"
|
|
|
|
"git.cacert.org/cacert-gosigner/pkg/protocol"
|
|
"git.cacert.org/cacert-gosignerclient/internal/config"
|
|
)
|
|
|
|
type SignerClientHandler struct {
|
|
logger *logrus.Logger
|
|
commands chan *protocol.Command
|
|
config *config.ClientConfig
|
|
clientCallback chan interface{}
|
|
}
|
|
|
|
func (s *SignerClientHandler) Send(ctx context.Context, command *protocol.Command, out chan []byte) error {
|
|
var (
|
|
frame []byte
|
|
err error
|
|
)
|
|
|
|
frame, err = msgpack.Marshal(command.Announce)
|
|
if err != nil {
|
|
return fmt.Errorf("could not marshal command annoucement: %w", err)
|
|
}
|
|
|
|
s.logger.WithField("announcement", command.Announce).Debug("write command announcement")
|
|
|
|
s.logger.Trace("writing command announcement")
|
|
|
|
select {
|
|
case <-ctx.Done():
|
|
return nil
|
|
case out <- frame:
|
|
break
|
|
}
|
|
|
|
frame, err = msgpack.Marshal(command.Command)
|
|
if err != nil {
|
|
return fmt.Errorf("could not marshal command data: %w", err)
|
|
}
|
|
|
|
s.logger.WithField("command", command.Command).Debug("write command data")
|
|
|
|
select {
|
|
case <-ctx.Done():
|
|
return nil
|
|
case out <- frame:
|
|
return nil
|
|
}
|
|
}
|
|
|
|
func (s *SignerClientHandler) ResponseAnnounce(ctx context.Context, in chan []byte) (*protocol.Response, error) {
|
|
response := &protocol.Response{}
|
|
|
|
var announce messages.ResponseAnnounce
|
|
|
|
select {
|
|
case <-ctx.Done():
|
|
return nil, nil
|
|
case frame := <-in:
|
|
if err := msgpack.Unmarshal(frame, &announce); err != nil {
|
|
return nil, fmt.Errorf("could not unmarshal response announcement: %w", err)
|
|
}
|
|
|
|
response.Announce = &announce
|
|
|
|
s.logger.WithField("announcement", response.Announce).Debug("received response announcement")
|
|
|
|
return response, nil
|
|
case <-time.After(s.config.ResponseAnnounceTimeout):
|
|
return nil, protocol.ErrResponseAnnounceTimeoutExpired
|
|
}
|
|
}
|
|
|
|
func (s *SignerClientHandler) ResponseData(ctx context.Context, in chan []byte, response *protocol.Response) error {
|
|
select {
|
|
case <-ctx.Done():
|
|
return nil
|
|
case frame := <-in:
|
|
switch response.Announce.Code {
|
|
case messages.RespHealth:
|
|
var resp messages.HealthResponse
|
|
if err := msgpack.Unmarshal(frame, &resp); err != nil {
|
|
return fmt.Errorf("could not unmarshal health response data: %w", err)
|
|
}
|
|
|
|
response.Response = &resp
|
|
case messages.RespCAInfo:
|
|
var resp messages.CAInfoResponse
|
|
if err := msgpack.Unmarshal(frame, &resp); err != nil {
|
|
return fmt.Errorf("could not unmarshal CA info response data: %w", err)
|
|
}
|
|
|
|
response.Response = &resp
|
|
case messages.RespFetchCRL:
|
|
var resp messages.FetchCRLResponse
|
|
if err := msgpack.Unmarshal(frame, &resp); err != nil {
|
|
return fmt.Errorf("could not unmarshal fetch CRL response data: %w", err)
|
|
}
|
|
|
|
response.Response = &resp
|
|
case messages.RespError:
|
|
var resp messages.ErrorResponse
|
|
if err := msgpack.Unmarshal(frame, &resp); err != nil {
|
|
return fmt.Errorf("could not unmarshal error response data: %w", err)
|
|
}
|
|
|
|
response.Response = &resp
|
|
default:
|
|
return fmt.Errorf("unhandled response code %s", response.Announce.Code)
|
|
}
|
|
case <-time.After(s.config.ResponseDataTimeout):
|
|
return protocol.ErrResponseDataTimeoutExpired
|
|
}
|
|
|
|
return nil
|
|
}
|
|
|
|
func (s *SignerClientHandler) HandleResponse(ctx context.Context, response *protocol.Response) error {
|
|
s.logger.WithField("response", response.Announce).Info("handled response")
|
|
s.logger.WithField("response", response).Debug("full response")
|
|
|
|
switch r := response.Response.(type) {
|
|
case *messages.ErrorResponse:
|
|
s.logger.WithField("message", r.Message).Error("error from signer")
|
|
case *messages.HealthResponse:
|
|
s.handleHealthResponse(ctx, r)
|
|
case *messages.CAInfoResponse:
|
|
s.handleCAInfoResponse(ctx, r)
|
|
case *messages.FetchCRLResponse:
|
|
s.handleFetchCRLResponse(ctx, r)
|
|
default:
|
|
s.logger.WithField("response", response).Warnf("unhandled response of type %T", response.Response)
|
|
}
|
|
|
|
return nil
|
|
}
|
|
|
|
func (s *SignerClientHandler) handleHealthResponse(ctx context.Context, r *messages.HealthResponse) {
|
|
signerInfo := client.SignerInfo{}
|
|
|
|
signerInfo.SignerHealth = r.Healthy
|
|
signerInfo.SignerVersion = r.Version
|
|
|
|
if !r.Healthy {
|
|
// it might be a good idea to notify monitoring if the signer is not OK
|
|
s.logger.Error("signer is not healthy")
|
|
}
|
|
|
|
for _, item := range r.Info {
|
|
if !item.Healthy {
|
|
s.logger.WithField("component", item.Source).Error("signer component is not healthy")
|
|
}
|
|
|
|
switch item.Source {
|
|
case "HSM":
|
|
signerInfo.CACertificates = make([]string, 0)
|
|
|
|
for certName, status := range item.MoreInfo {
|
|
if status == string(messages.CertStatusOk) {
|
|
signerInfo.CACertificates = append(signerInfo.CACertificates, certName)
|
|
|
|
continue
|
|
}
|
|
|
|
s.logger.WithFields(map[string]interface{}{
|
|
"certificate": certName,
|
|
"status": status,
|
|
}).Warn("certificate has issues")
|
|
}
|
|
default:
|
|
s.logger.WithField("source", item.Source).Warn("unhandled health source")
|
|
}
|
|
}
|
|
|
|
select {
|
|
case <-ctx.Done():
|
|
return
|
|
case s.clientCallback <- signerInfo:
|
|
break
|
|
}
|
|
}
|
|
|
|
func (s *SignerClientHandler) handleCAInfoResponse(ctx context.Context, r *messages.CAInfoResponse) {
|
|
select {
|
|
case <-ctx.Done():
|
|
return
|
|
case s.clientCallback <- r:
|
|
break
|
|
}
|
|
}
|
|
|
|
func (s *SignerClientHandler) handleFetchCRLResponse(ctx context.Context, r *messages.FetchCRLResponse) {
|
|
select {
|
|
case <-ctx.Done():
|
|
return
|
|
case s.clientCallback <- r:
|
|
break
|
|
}
|
|
}
|
|
|
|
func New(
|
|
config *config.ClientConfig,
|
|
logger *logrus.Logger,
|
|
commands chan *protocol.Command,
|
|
clientCallback chan interface{},
|
|
) (protocol.ClientHandler, error) {
|
|
return &SignerClientHandler{
|
|
logger: logger,
|
|
config: config,
|
|
commands: commands,
|
|
clientCallback: clientCallback,
|
|
}, nil
|
|
}
|