mirror of https://github.com/docker/docs.git
				
				
				
			
		
			
				
	
	
		
			177 lines
		
	
	
		
			4.9 KiB
		
	
	
	
		
			Go
		
	
	
	
			
		
		
	
	
			177 lines
		
	
	
		
			4.9 KiB
		
	
	
	
		
			Go
		
	
	
	
| package cryptoservice
 | |
| 
 | |
| import (
 | |
| 	"crypto/rand"
 | |
| 	"fmt"
 | |
| 	"path/filepath"
 | |
| 
 | |
| 	"github.com/Sirupsen/logrus"
 | |
| 	"github.com/docker/notary/trustmanager"
 | |
| 	"github.com/docker/notary/tuf/data"
 | |
| )
 | |
| 
 | |
| const (
 | |
| 	rsaKeySize = 2048 // Used for snapshots and targets keys
 | |
| )
 | |
| 
 | |
| // CryptoService implements Sign and Create, holding a specific GUN and keystore to
 | |
| // operate on
 | |
| type CryptoService struct {
 | |
| 	gun       string
 | |
| 	keyStores []trustmanager.KeyStore
 | |
| }
 | |
| 
 | |
| // NewCryptoService returns an instance of CryptoService
 | |
| func NewCryptoService(gun string, keyStores ...trustmanager.KeyStore) *CryptoService {
 | |
| 	return &CryptoService{gun: gun, keyStores: keyStores}
 | |
| }
 | |
| 
 | |
| // Create is used to generate keys for targets, snapshots and timestamps
 | |
| func (cs *CryptoService) Create(role, algorithm string) (data.PublicKey, error) {
 | |
| 	var privKey data.PrivateKey
 | |
| 	var err error
 | |
| 
 | |
| 	switch algorithm {
 | |
| 	case data.RSAKey:
 | |
| 		privKey, err = trustmanager.GenerateRSAKey(rand.Reader, rsaKeySize)
 | |
| 		if err != nil {
 | |
| 			return nil, fmt.Errorf("failed to generate RSA key: %v", err)
 | |
| 		}
 | |
| 	case data.ECDSAKey:
 | |
| 		privKey, err = trustmanager.GenerateECDSAKey(rand.Reader)
 | |
| 		if err != nil {
 | |
| 			return nil, fmt.Errorf("failed to generate EC key: %v", err)
 | |
| 		}
 | |
| 	case data.ED25519Key:
 | |
| 		privKey, err = trustmanager.GenerateED25519Key(rand.Reader)
 | |
| 		if err != nil {
 | |
| 			return nil, fmt.Errorf("failed to generate ED25519 key: %v", err)
 | |
| 		}
 | |
| 	default:
 | |
| 		return nil, fmt.Errorf("private key type not supported for key generation: %s", algorithm)
 | |
| 	}
 | |
| 	logrus.Debugf("generated new %s key for role: %s and keyID: %s", algorithm, role, privKey.ID())
 | |
| 
 | |
| 	// Store the private key into our keystore with the name being: /GUN/ID.key with an alias of role
 | |
| 	var keyPath string
 | |
| 	if role == data.CanonicalRootRole {
 | |
| 		keyPath = privKey.ID()
 | |
| 	} else {
 | |
| 		keyPath = filepath.Join(cs.gun, privKey.ID())
 | |
| 	}
 | |
| 
 | |
| 	for _, ks := range cs.keyStores {
 | |
| 		err = ks.AddKey(keyPath, role, privKey)
 | |
| 		if err == nil {
 | |
| 			return data.PublicKeyFromPrivate(privKey), nil
 | |
| 		}
 | |
| 	}
 | |
| 	if err != nil {
 | |
| 		return nil, fmt.Errorf("failed to add key to filestore: %v", err)
 | |
| 	}
 | |
| 	return nil, fmt.Errorf("keystores would not accept new private keys for unknown reasons")
 | |
| 
 | |
| }
 | |
| 
 | |
| // GetPrivateKey returns a private key by ID. It tries to get the key first
 | |
| // without a GUN (in which case it's a root key).  If that fails, try to get
 | |
| // the key with the GUN (non-root key).
 | |
| // If that fails, then we don't have the key.
 | |
| func (cs *CryptoService) GetPrivateKey(keyID string) (k data.PrivateKey, role string, err error) {
 | |
| 	keyPaths := []string{keyID, filepath.Join(cs.gun, keyID)}
 | |
| 	for _, ks := range cs.keyStores {
 | |
| 		for _, keyPath := range keyPaths {
 | |
| 			k, role, err = ks.GetKey(keyPath)
 | |
| 			if err != nil {
 | |
| 				continue
 | |
| 			}
 | |
| 			return
 | |
| 		}
 | |
| 	}
 | |
| 	return // returns whatever the final values were
 | |
| }
 | |
| 
 | |
| // GetKey returns a key by ID
 | |
| func (cs *CryptoService) GetKey(keyID string) data.PublicKey {
 | |
| 	privKey, _, err := cs.GetPrivateKey(keyID)
 | |
| 	if err != nil {
 | |
| 		return nil
 | |
| 	}
 | |
| 	return data.PublicKeyFromPrivate(privKey)
 | |
| }
 | |
| 
 | |
| // RemoveKey deletes a key by ID
 | |
| func (cs *CryptoService) RemoveKey(keyID string) (err error) {
 | |
| 	keyPaths := []string{keyID, filepath.Join(cs.gun, keyID)}
 | |
| 	for _, ks := range cs.keyStores {
 | |
| 		for _, keyPath := range keyPaths {
 | |
| 			_, _, err = ks.GetKey(keyPath)
 | |
| 			if err != nil {
 | |
| 				continue
 | |
| 			}
 | |
| 			err = ks.RemoveKey(keyPath)
 | |
| 			return
 | |
| 		}
 | |
| 	}
 | |
| 	return // returns whatever the final values were
 | |
| }
 | |
| 
 | |
| // Sign returns the signatures for the payload with a set of keyIDs. It ignores
 | |
| // errors to sign and expects the called to validate if the number of returned
 | |
| // signatures is adequate.
 | |
| func (cs *CryptoService) Sign(keyIDs []string, payload []byte) ([]data.Signature, error) {
 | |
| 	signatures := make([]data.Signature, 0, len(keyIDs))
 | |
| 	for _, keyid := range keyIDs {
 | |
| 		keyName := keyid
 | |
| 
 | |
| 		privKey, _, err := cs.GetPrivateKey(keyName)
 | |
| 		if err != nil {
 | |
| 			logrus.Debugf("error attempting to retrieve private key: %s, %v", keyid, err)
 | |
| 			continue
 | |
| 		}
 | |
| 
 | |
| 		sigAlgo := privKey.SignatureAlgorithm()
 | |
| 		sig, err := privKey.Sign(rand.Reader, payload, nil)
 | |
| 		if err != nil {
 | |
| 			logrus.Debugf("ignoring error attempting to %s sign with keyID: %s, %v",
 | |
| 				privKey.Algorithm(), keyid, err)
 | |
| 			continue
 | |
| 		}
 | |
| 
 | |
| 		logrus.Debugf("appending %s signature with Key ID: %s", privKey.Algorithm(), keyid)
 | |
| 
 | |
| 		// Append signatures to result array
 | |
| 		signatures = append(signatures, data.Signature{
 | |
| 			KeyID:     keyid,
 | |
| 			Method:    sigAlgo,
 | |
| 			Signature: sig[:],
 | |
| 		})
 | |
| 	}
 | |
| 
 | |
| 	return signatures, nil
 | |
| }
 | |
| 
 | |
| // ListKeys returns a list of key IDs valid for the given role
 | |
| func (cs *CryptoService) ListKeys(role string) []string {
 | |
| 	var res []string
 | |
| 	for _, ks := range cs.keyStores {
 | |
| 		for k, r := range ks.ListKeys() {
 | |
| 			if r == role {
 | |
| 				res = append(res, k)
 | |
| 			}
 | |
| 		}
 | |
| 	}
 | |
| 	return res
 | |
| }
 | |
| 
 | |
| // ListAllKeys returns a map of key IDs to role
 | |
| func (cs *CryptoService) ListAllKeys() map[string]string {
 | |
| 	res := make(map[string]string)
 | |
| 	for _, ks := range cs.keyStores {
 | |
| 		for k, r := range ks.ListKeys() {
 | |
| 			res[k] = r // keys are content addressed so don't care about overwrites
 | |
| 		}
 | |
| 	}
 | |
| 	return res
 | |
| }
 |