split authClient and AuthServer

This commit is contained in:
aler9
2020-09-20 10:18:11 +02:00
parent 556c285c08
commit b865997f68
3 changed files with 265 additions and 252 deletions

252
auth.go
View File

@@ -2,12 +2,7 @@ package gortsplib
import (
"crypto/md5"
"crypto/rand"
"encoding/base64"
"encoding/hex"
"fmt"
"net/url"
"strings"
)
func md5Hex(in string) string {
@@ -26,250 +21,3 @@ const (
// Digest authentication method
Digest
)
// AuthServer is an object that helps a server to validate the credentials of
// a client.
type AuthServer struct {
user string
pass string
methods []AuthMethod
realm string
nonce string
}
// NewAuthServer allocates an AuthServer.
// If methods is nil, the Basic and Digest methods are used.
func NewAuthServer(user string, pass string, methods []AuthMethod) *AuthServer {
if methods == nil {
methods = []AuthMethod{Basic, Digest}
}
nonceByts := make([]byte, 16)
rand.Read(nonceByts)
nonce := hex.EncodeToString(nonceByts)
return &AuthServer{
user: user,
pass: pass,
methods: methods,
realm: "IPCAM",
nonce: nonce,
}
}
// GenerateHeader generates the WWW-Authenticate header needed by a client to log in.
func (as *AuthServer) GenerateHeader() HeaderValue {
var ret HeaderValue
for _, m := range as.methods {
switch m {
case Basic:
ret = append(ret, (&HeaderAuth{
Method: Basic,
Realm: &as.realm,
}).Write()...)
case Digest:
ret = append(ret, (&HeaderAuth{
Method: Digest,
Realm: &as.realm,
Nonce: &as.nonce,
}).Write()...)
}
}
return ret
}
// ValidateHeader validates the Authorization header sent by a client after receiving the
// WWW-Authenticate header.
func (as *AuthServer) ValidateHeader(v HeaderValue, method Method, ur *url.URL) error {
if len(v) == 0 {
return fmt.Errorf("authorization header not provided")
}
if len(v) > 1 {
return fmt.Errorf("authorization header provided multiple times")
}
v0 := v[0]
if strings.HasPrefix(v0, "Basic ") {
inResponse := v0[len("Basic "):]
response := base64.StdEncoding.EncodeToString([]byte(as.user + ":" + as.pass))
if inResponse != response {
return fmt.Errorf("wrong response")
}
} else if strings.HasPrefix(v0, "Digest ") {
auth, err := ReadHeaderAuth(HeaderValue{v0})
if err != nil {
return err
}
if auth.Realm == nil {
return fmt.Errorf("realm not provided")
}
if auth.Nonce == nil {
return fmt.Errorf("nonce not provided")
}
if auth.Username == nil {
return fmt.Errorf("username not provided")
}
if auth.URI == nil {
return fmt.Errorf("uri not provided")
}
if auth.Response == nil {
return fmt.Errorf("response not provided")
}
if *auth.Nonce != as.nonce {
return fmt.Errorf("wrong nonce")
}
if *auth.Realm != as.realm {
return fmt.Errorf("wrong realm")
}
if *auth.Username != as.user {
return fmt.Errorf("wrong username")
}
uri := ur.String()
if *auth.URI != uri {
// VLC strips the subpath
newUrl := *ur
newUrl.Path = func() string {
ret := newUrl.Path
if n := strings.Index(ret[1:], "/"); n >= 0 {
ret = ret[:n+2]
}
return ret
}()
uri = newUrl.String()
if *auth.URI != uri {
return fmt.Errorf("wrong url")
}
}
response := md5Hex(md5Hex(as.user+":"+as.realm+":"+as.pass) +
":" + as.nonce + ":" + md5Hex(string(method)+":"+uri))
if *auth.Response != response {
return fmt.Errorf("wrong response")
}
} else {
return fmt.Errorf("unsupported authorization header")
}
return nil
}
// authClient is an object that helps a client to send its credentials to a
// server.
type authClient struct {
user string
pass string
method AuthMethod
realm string
nonce string
}
// newAuthClient allocates an authClient.
// header is the WWW-Authenticate header provided by the server.
func newAuthClient(v HeaderValue, user string, pass string) (*authClient, error) {
// prefer digest
if headerAuthDigest := func() string {
for _, vi := range v {
if strings.HasPrefix(vi, "Digest ") {
return vi
}
}
return ""
}(); headerAuthDigest != "" {
auth, err := ReadHeaderAuth(HeaderValue{headerAuthDigest})
if err != nil {
return nil, err
}
if auth.Realm == nil {
return nil, fmt.Errorf("realm not provided")
}
if auth.Nonce == nil {
return nil, fmt.Errorf("nonce not provided")
}
return &authClient{
user: user,
pass: pass,
method: Digest,
realm: *auth.Realm,
nonce: *auth.Nonce,
}, nil
}
if headerAuthBasic := func() string {
for _, vi := range v {
if strings.HasPrefix(vi, "Basic ") {
return vi
}
}
return ""
}(); headerAuthBasic != "" {
auth, err := ReadHeaderAuth(HeaderValue{headerAuthBasic})
if err != nil {
return nil, err
}
if auth.Realm == nil {
return nil, fmt.Errorf("realm not provided")
}
return &authClient{
user: user,
pass: pass,
method: Basic,
realm: *auth.Realm,
}, nil
}
return nil, fmt.Errorf("there are no authentication methods available")
}
// GenerateHeader generates an Authorization Header that allows to authenticate a request with
// the given method and url.
func (ac *authClient) GenerateHeader(method Method, ur *url.URL) HeaderValue {
switch ac.method {
case Basic:
response := base64.StdEncoding.EncodeToString([]byte(ac.user + ":" + ac.pass))
return HeaderValue{"Basic " + response}
case Digest:
response := md5Hex(md5Hex(ac.user+":"+ac.realm+":"+ac.pass) + ":" +
ac.nonce + ":" + md5Hex(string(method)+":"+ur.String()))
return (&HeaderAuth{
Method: Digest,
Username: &ac.user,
Realm: &ac.realm,
Nonce: &ac.nonce,
URI: func() *string {
v := ur.String()
return &v
}(),
Response: &response,
}).Write()
}
return nil
}

109
authclient.go Normal file
View File

@@ -0,0 +1,109 @@
package gortsplib
import (
"encoding/base64"
"fmt"
"net/url"
"strings"
)
// authClient is an object that helps a client to send its credentials to a
// server.
type authClient struct {
user string
pass string
method AuthMethod
realm string
nonce string
}
// newAuthClient allocates an authClient.
// header is the WWW-Authenticate header provided by the server.
func newAuthClient(v HeaderValue, user string, pass string) (*authClient, error) {
// prefer digest
if headerAuthDigest := func() string {
for _, vi := range v {
if strings.HasPrefix(vi, "Digest ") {
return vi
}
}
return ""
}(); headerAuthDigest != "" {
auth, err := ReadHeaderAuth(HeaderValue{headerAuthDigest})
if err != nil {
return nil, err
}
if auth.Realm == nil {
return nil, fmt.Errorf("realm not provided")
}
if auth.Nonce == nil {
return nil, fmt.Errorf("nonce not provided")
}
return &authClient{
user: user,
pass: pass,
method: Digest,
realm: *auth.Realm,
nonce: *auth.Nonce,
}, nil
}
if headerAuthBasic := func() string {
for _, vi := range v {
if strings.HasPrefix(vi, "Basic ") {
return vi
}
}
return ""
}(); headerAuthBasic != "" {
auth, err := ReadHeaderAuth(HeaderValue{headerAuthBasic})
if err != nil {
return nil, err
}
if auth.Realm == nil {
return nil, fmt.Errorf("realm not provided")
}
return &authClient{
user: user,
pass: pass,
method: Basic,
realm: *auth.Realm,
}, nil
}
return nil, fmt.Errorf("there are no authentication methods available")
}
// GenerateHeader generates an Authorization Header that allows to authenticate a request with
// the given method and url.
func (ac *authClient) GenerateHeader(method Method, ur *url.URL) HeaderValue {
switch ac.method {
case Basic:
response := base64.StdEncoding.EncodeToString([]byte(ac.user + ":" + ac.pass))
return HeaderValue{"Basic " + response}
case Digest:
response := md5Hex(md5Hex(ac.user+":"+ac.realm+":"+ac.pass) + ":" +
ac.nonce + ":" + md5Hex(string(method)+":"+ur.String()))
return (&HeaderAuth{
Method: Digest,
Username: &ac.user,
Realm: &ac.realm,
Nonce: &ac.nonce,
URI: func() *string {
v := ur.String()
return &v
}(),
Response: &response,
}).Write()
}
return nil
}

156
authserver.go Normal file
View File

@@ -0,0 +1,156 @@
package gortsplib
import (
"crypto/rand"
"encoding/base64"
"encoding/hex"
"fmt"
"net/url"
"strings"
)
// AuthServer is an object that helps a server to validate the credentials of
// a client.
type AuthServer struct {
user string
pass string
methods []AuthMethod
realm string
nonce string
}
// NewAuthServer allocates an AuthServer.
// If methods is nil, the Basic and Digest methods are used.
func NewAuthServer(user string, pass string, methods []AuthMethod) *AuthServer {
if methods == nil {
methods = []AuthMethod{Basic, Digest}
}
nonceByts := make([]byte, 16)
rand.Read(nonceByts)
nonce := hex.EncodeToString(nonceByts)
return &AuthServer{
user: user,
pass: pass,
methods: methods,
realm: "IPCAM",
nonce: nonce,
}
}
// GenerateHeader generates the WWW-Authenticate header needed by a client to log in.
func (as *AuthServer) GenerateHeader() HeaderValue {
var ret HeaderValue
for _, m := range as.methods {
switch m {
case Basic:
ret = append(ret, (&HeaderAuth{
Method: Basic,
Realm: &as.realm,
}).Write()...)
case Digest:
ret = append(ret, (&HeaderAuth{
Method: Digest,
Realm: &as.realm,
Nonce: &as.nonce,
}).Write()...)
}
}
return ret
}
// ValidateHeader validates the Authorization header sent by a client after receiving the
// WWW-Authenticate header.
func (as *AuthServer) ValidateHeader(v HeaderValue, method Method, ur *url.URL) error {
if len(v) == 0 {
return fmt.Errorf("authorization header not provided")
}
if len(v) > 1 {
return fmt.Errorf("authorization header provided multiple times")
}
v0 := v[0]
if strings.HasPrefix(v0, "Basic ") {
inResponse := v0[len("Basic "):]
response := base64.StdEncoding.EncodeToString([]byte(as.user + ":" + as.pass))
if inResponse != response {
return fmt.Errorf("wrong response")
}
} else if strings.HasPrefix(v0, "Digest ") {
auth, err := ReadHeaderAuth(HeaderValue{v0})
if err != nil {
return err
}
if auth.Realm == nil {
return fmt.Errorf("realm not provided")
}
if auth.Nonce == nil {
return fmt.Errorf("nonce not provided")
}
if auth.Username == nil {
return fmt.Errorf("username not provided")
}
if auth.URI == nil {
return fmt.Errorf("uri not provided")
}
if auth.Response == nil {
return fmt.Errorf("response not provided")
}
if *auth.Nonce != as.nonce {
return fmt.Errorf("wrong nonce")
}
if *auth.Realm != as.realm {
return fmt.Errorf("wrong realm")
}
if *auth.Username != as.user {
return fmt.Errorf("wrong username")
}
uri := ur.String()
if *auth.URI != uri {
// VLC strips the subpath
newUrl := *ur
newUrl.Path = func() string {
ret := newUrl.Path
if n := strings.Index(ret[1:], "/"); n >= 0 {
ret = ret[:n+2]
}
return ret
}()
uri = newUrl.String()
if *auth.URI != uri {
return fmt.Errorf("wrong url")
}
}
response := md5Hex(md5Hex(as.user+":"+as.realm+":"+as.pass) +
":" + as.nonce + ":" + md5Hex(string(method)+":"+uri))
if *auth.Response != response {
return fmt.Errorf("wrong response")
}
} else {
return fmt.Errorf("unsupported authorization header")
}
return nil
}