klefki/internal/server/server.go
Jared Allard 404acf6b7f
All checks were successful
tests / go test (push) Successful in 8s
tests / golangci-lint (push) Successful in 16s
fix logic and log statement
2025-03-06 21:41:19 -08:00

203 lines
5.6 KiB
Go

// Copyright (C) 2025 klefki contributors
//
// This program is free software: you can redistribute it and/or modify
// it under the terms of the GNU Affero General Public License as
// published by the Free Software Foundation, either version 3 of the
// License, or (at your option) any later version.
//
// This program is distributed in the hope that it will be useful,
// but WITHOUT ANY WARRANTY; without even the implied warranty of
// MERCHANTABILITY or FITNESS FOR A PARTICULAR PURPOSE. See the
// GNU Affero General Public License for more details.
//
// You should have received a copy of the GNU Affero General Public License
// along with this program. If not, see <https://www.gnu.org/licenses/>.
//
// SPDX-License-Identifier: AGPL-3.0
// Package server contains the gRPC server logic for the service.
package server
import (
"context"
"fmt"
"net"
"sync"
"time"
"git.rgst.io/homelab/klefki/internal/db"
"git.rgst.io/homelab/klefki/internal/db/ent"
"git.rgst.io/homelab/klefki/internal/machines"
pbgrpcv1 "git.rgst.io/homelab/klefki/internal/server/grpc/generated/go/rgst/klefki/v1"
"git.rgst.io/homelab/sigtool/v3/sign"
"google.golang.org/grpc"
"google.golang.org/grpc/reflection"
)
// Session represents a session where a machine is attempting to receive
// a private key from SubmitKey.
type Session struct {
// LastAsked is the last time the machine called GetKey without
// receiving a key.
LastAsked time.Time
// EncKey is the encrypted provided by SubmitKey. If not set, no key
// has been provided.
EncKey []byte
}
// Server is a Klefki gRPC server
type Server struct {
gs *grpc.Server
db *ent.Client
// ses is a machine_id -> Session map
ses map[string]*Session
sesMu sync.RWMutex
pbgrpcv1.UnimplementedKlefkiServiceServer
}
// Run starts the server
func (s *Server) Run(ctx context.Context) error {
s.ses = make(map[string]*Session)
var err error
s.db, err = db.New(ctx)
if err != nil {
return fmt.Errorf("failed to open DB: %w", err)
}
// TODO(jaredallard): Clean up expired sessions after X time period.
s.gs = grpc.NewServer()
pbgrpcv1.RegisterKlefkiServiceServer(s.gs, s)
reflection.Register(s.gs)
lis, err := net.Listen("tcp", ":5300") //nolint:gosec // Why: This is fine.
if err != nil {
return fmt.Errorf("failed to create listener: %w", err)
}
fmt.Printf("starting gRPC server on %s\n", lis.Addr())
return s.gs.Serve(lis)
}
// GetTime implements the GetTime RPC
func (s *Server) GetTime(_ context.Context, _ *pbgrpcv1.GetTimeRequest) (*pbgrpcv1.GetTimeResponse, error) {
resp := &pbgrpcv1.GetTimeResponse{}
resp.SetTime(time.Now().Format(time.RFC3339Nano))
return resp, nil
}
// SubmitKey implements the SubmitKey RPC
func (s *Server) SubmitKey(_ context.Context, req *pbgrpcv1.SubmitKeyRequest) (*pbgrpcv1.SubmitKeyResponse, error) {
machineID := req.GetMachineId()
s.sesMu.RLock()
if _, ok := s.ses[machineID]; !ok {
s.sesMu.RUnlock()
return nil, fmt.Errorf("failed to find machine ID %q", machineID)
}
s.sesMu.RUnlock()
s.sesMu.Lock()
defer s.sesMu.Unlock()
s.ses[machineID].EncKey = req.GetEncKey()
return &pbgrpcv1.SubmitKeyResponse{}, nil
}
// GetKey implements the GetKey RPC
func (s *Server) GetKey(ctx context.Context, req *pbgrpcv1.GetKeyRequest) (*pbgrpcv1.GetKeyResponse, error) {
resp := &pbgrpcv1.GetKeyResponse{}
nonce := req.GetNonce()
ts, err := time.Parse(time.RFC3339Nano, req.GetSignedAt())
if err != nil || ts.IsZero() {
return nil, fmt.Errorf("failed to parsed signed at %q: %w", req.GetSignedAt(), err)
}
ts = ts.UTC() // Always operate with UTC time.
if time.Since(ts) > 5*time.Minute {
return nil, fmt.Errorf("signature has expired")
}
sig := req.GetSignature()
machine, err := s.db.Machine.Get(ctx, req.GetMachineId())
if err != nil {
return nil, err
}
if err := machines.Verify(machine.PublicKey, sig, nonce); err != nil {
return nil, err
}
spubk, err := sign.PublicKeyFromBytes(machine.PublicKey)
if err != nil {
return nil, fmt.Errorf("failed to create pub key for encryption: %w", err)
}
enc, err := sign.NewEncryptor(nil, 1024)
if err != nil {
return nil, fmt.Errorf("failed to create encryptor instance: %w", err)
}
if err := enc.AddRecipient(spubk); err != nil {
return nil, fmt.Errorf("failed to add instance public key to encryptor: %w", err)
}
s.sesMu.Lock()
defer s.sesMu.Unlock()
// Track the last time the machine asked for a key. This is what backs
// the sessions api
if _, ok := s.ses[machine.ID]; !ok {
s.ses[machine.ID] = &Session{}
}
s.ses[machine.ID].LastAsked = time.Now()
if len(s.ses[machine.ID].EncKey) == 0 {
return nil, fmt.Errorf("key not available")
}
resp.SetEncKey(s.ses[machine.ID].EncKey)
// Reset the session
delete(s.ses, machine.ID)
return resp, nil
}
// ListSessions implements the ListSessions RPC.
func (s *Server) ListSessions(ctx context.Context, _ *pbgrpcv1.ListSessionsRequest) (*pbgrpcv1.ListSessionsResponse, error) {
s.sesMu.RLock()
defer s.sesMu.RUnlock()
resp := &pbgrpcv1.ListSessionsResponse{}
grpcMachines := make([]*pbgrpcv1.Machine, 0, len(s.ses))
for machineID := range s.ses {
machine, err := s.db.Machine.Get(ctx, machineID)
if err != nil {
return nil, fmt.Errorf("failed to get machine %q: %w", machineID, err)
}
// If the machine asked recently, return it
gMachine := machines.GRPCMachine(machine)
gMachine.SetLastAsked(s.ses[machineID].LastAsked.Format(time.RFC3339Nano))
grpcMachines = append(grpcMachines, gMachine)
}
resp.SetMachines(grpcMachines)
return resp, nil
}
// Close closes the server
func (s *Server) Close(_ context.Context) error {
if s.gs == nil {
return nil
}
fmt.Println("shutting down server")
s.gs.GracefulStop()
return s.db.Close()
}