mirror of
https://github.com/mudler/edgevpn.git
synced 2025-09-26 21:01:44 +08:00

As EdgeVPN can be used as library and it turns out to be quite useful, change license for follow up versions to Apache so can be used as a library easilier.
106 lines
3.8 KiB
Go
106 lines
3.8 KiB
Go
/*
|
|
Copyright © 2021-2022 Ettore Di Giacinto <mudler@mocaccino.org>
|
|
Licensed under the Apache License, Version 2.0 (the "License");
|
|
you may not use this file except in compliance with the License.
|
|
You may obtain a copy of the License at
|
|
http://www.apache.org/licenses/LICENSE-2.0
|
|
Unless required by applicable law or agreed to in writing, software
|
|
distributed under the License is distributed on an "AS IS" BASIS,
|
|
WITHOUT WARRANTIES OR CONDITIONS OF ANY KIND, either express or implied.
|
|
See the License for the specific language governing permissions and
|
|
limitations under the License.
|
|
*/
|
|
|
|
package trustzone
|
|
|
|
import (
|
|
"context"
|
|
"time"
|
|
|
|
"github.com/ipfs/go-log"
|
|
"github.com/mudler/edgevpn/pkg/blockchain"
|
|
"github.com/mudler/edgevpn/pkg/hub"
|
|
"github.com/mudler/edgevpn/pkg/node"
|
|
"github.com/mudler/edgevpn/pkg/protocol"
|
|
)
|
|
|
|
// PeerGuardian provides auth for peers from blockchain data
|
|
type PeerGuardian struct {
|
|
authProviders []AuthProvider
|
|
logger log.StandardLogger
|
|
}
|
|
|
|
func NewPeerGuardian(logger log.StandardLogger, authProviders ...AuthProvider) *PeerGuardian {
|
|
return &PeerGuardian{
|
|
authProviders: authProviders,
|
|
logger: logger,
|
|
}
|
|
}
|
|
|
|
// ReceiveMessage is a GenericHandler for public channel to provide authentication.
|
|
// We receive messages here and we select them based on 2 criterias:
|
|
// - messages that are supposed to generate challenges for auth mechanisms.
|
|
// Auth mechanisms should get user auth data from a special TZ dedicated to hashes that are manually added
|
|
// - messages that are answers to such challenges and then means that the sender.ID should be added to the trust zone
|
|
func (pg *PeerGuardian) ReceiveMessage(l *blockchain.Ledger, m *hub.Message, c chan *hub.Message) error {
|
|
pg.logger.Debug("Peerguardian received message from", m.SenderID)
|
|
|
|
for _, a := range pg.authProviders {
|
|
|
|
_, exists := l.GetKey(protocol.TrustZoneKey, m.SenderID)
|
|
trustAuth := l.CurrentData()[protocol.TrustZoneAuthKey]
|
|
if !exists && a.Authenticate(m, c, trustAuth) {
|
|
// try to authenticate it
|
|
// Note we can also not be in a TZ here as we are not able to check (we miss node information at hand)
|
|
// In any way nodes would ignore the messages, and that we hit Authenticate is useful for two (or more)
|
|
// steps authenticators.
|
|
l.Persist(context.Background(), 5*time.Second, 120*time.Second, protocol.TrustZoneKey, m.SenderID, "")
|
|
return nil
|
|
}
|
|
}
|
|
|
|
return nil
|
|
}
|
|
|
|
// Challenger is a NetworkService that should send challenges with all enabled authenticators until we are in TZ
|
|
// note that might never happen as node might not have a satisfying authentication mechanism
|
|
func (pg *PeerGuardian) Challenger(duration time.Duration, autocleanup bool) node.NetworkService {
|
|
return func(ctx context.Context, c node.Config, n *node.Node, b *blockchain.Ledger) error {
|
|
b.Announce(ctx, duration, func() {
|
|
trustAuth := b.CurrentData()[protocol.TrustZoneAuthKey]
|
|
_, exists := b.GetKey(protocol.TrustZoneKey, n.Host().ID().String())
|
|
for _, a := range pg.authProviders {
|
|
a.Challenger(exists, c, n, b, trustAuth)
|
|
}
|
|
|
|
// Automatically cleanup TZ from peers not anymore in the hub
|
|
if autocleanup {
|
|
peers, err := n.MessageHub.ListPeers()
|
|
if err != nil {
|
|
return
|
|
}
|
|
tz := b.CurrentData()[protocol.TrustZoneKey]
|
|
|
|
for k, _ := range tz {
|
|
PEER:
|
|
for _, p := range peers {
|
|
if p.String() == k {
|
|
break PEER
|
|
}
|
|
}
|
|
b.Delete(protocol.TrustZoneKey, k)
|
|
}
|
|
}
|
|
})
|
|
return nil
|
|
}
|
|
}
|
|
|
|
// AuthProvider is a generic Blockchain authentity provider
|
|
type AuthProvider interface {
|
|
// Authenticate either generates challanges to pick up later or authenticates a node
|
|
// from a message with the available auth data in the blockchain
|
|
Authenticate(*hub.Message, chan *hub.Message, map[string]blockchain.Data) bool
|
|
Challenger(inTrustZone bool, c node.Config, n *node.Node, b *blockchain.Ledger, trustData map[string]blockchain.Data)
|
|
}
|