2018-12-24 18:45:15 +01:00
|
|
|
/*
|
|
|
|
* Copyright © 2018 A Bunch Tell LLC.
|
|
|
|
*
|
|
|
|
* This file is part of WriteFreely.
|
|
|
|
*
|
|
|
|
* WriteFreely is free software: you can redistribute it and/or modify
|
|
|
|
* it under the terms of the GNU Affero General Public License, included
|
|
|
|
* in the LICENSE file in this source code package.
|
|
|
|
*/
|
2018-12-31 07:05:26 +01:00
|
|
|
|
2018-10-15 20:44:15 +02:00
|
|
|
package writefreely
|
|
|
|
|
|
|
|
import (
|
2018-11-11 23:52:24 +01:00
|
|
|
"crypto/rand"
|
|
|
|
"github.com/writeas/web-core/log"
|
2018-10-15 20:44:15 +02:00
|
|
|
"io/ioutil"
|
2018-11-11 23:52:24 +01:00
|
|
|
"os"
|
2018-11-11 23:16:05 +01:00
|
|
|
"path/filepath"
|
|
|
|
)
|
|
|
|
|
|
|
|
const (
|
|
|
|
keysDir = "keys"
|
2018-11-11 23:52:24 +01:00
|
|
|
|
|
|
|
encKeysBytes = 32
|
2018-11-11 23:16:05 +01:00
|
|
|
)
|
|
|
|
|
|
|
|
var (
|
|
|
|
emailKeyPath = filepath.Join(keysDir, "email.aes256")
|
|
|
|
cookieAuthKeyPath = filepath.Join(keysDir, "cookies_auth.aes256")
|
|
|
|
cookieKeyPath = filepath.Join(keysDir, "cookies_enc.aes256")
|
2018-10-15 20:44:15 +02:00
|
|
|
)
|
|
|
|
|
|
|
|
type keychain struct {
|
2018-10-17 02:30:38 +02:00
|
|
|
emailKey, cookieAuthKey, cookieKey []byte
|
2018-10-15 20:44:15 +02:00
|
|
|
}
|
|
|
|
|
2019-01-20 20:18:09 +01:00
|
|
|
func initKeyPaths(app *app) {
|
|
|
|
emailKeyPath = filepath.Join(app.cfg.Server.KeysParentDir, emailKeyPath)
|
|
|
|
cookieAuthKeyPath = filepath.Join(app.cfg.Server.KeysParentDir, cookieAuthKeyPath)
|
|
|
|
cookieKeyPath = filepath.Join(app.cfg.Server.KeysParentDir, cookieKeyPath)
|
|
|
|
}
|
|
|
|
|
2018-10-15 20:44:15 +02:00
|
|
|
func initKeys(app *app) error {
|
|
|
|
var err error
|
|
|
|
app.keys = &keychain{}
|
|
|
|
|
2019-01-19 00:57:04 +01:00
|
|
|
if debugging {
|
|
|
|
log.Info(" %s", emailKeyPath)
|
|
|
|
}
|
2018-11-11 23:16:05 +01:00
|
|
|
app.keys.emailKey, err = ioutil.ReadFile(emailKeyPath)
|
2018-10-17 02:30:38 +02:00
|
|
|
if err != nil {
|
|
|
|
return err
|
|
|
|
}
|
|
|
|
|
2019-01-19 00:57:04 +01:00
|
|
|
if debugging {
|
|
|
|
log.Info(" %s", cookieAuthKeyPath)
|
|
|
|
}
|
2018-11-11 23:16:05 +01:00
|
|
|
app.keys.cookieAuthKey, err = ioutil.ReadFile(cookieAuthKeyPath)
|
2018-10-15 20:44:15 +02:00
|
|
|
if err != nil {
|
|
|
|
return err
|
|
|
|
}
|
|
|
|
|
2019-01-19 00:57:04 +01:00
|
|
|
if debugging {
|
|
|
|
log.Info(" %s", cookieKeyPath)
|
|
|
|
}
|
2018-11-11 23:16:05 +01:00
|
|
|
app.keys.cookieKey, err = ioutil.ReadFile(cookieKeyPath)
|
2018-10-15 20:44:15 +02:00
|
|
|
if err != nil {
|
|
|
|
return err
|
|
|
|
}
|
|
|
|
|
|
|
|
return nil
|
|
|
|
}
|
2018-11-11 23:52:24 +01:00
|
|
|
|
|
|
|
// generateKey generates a key at the given path used for the encryption of
|
|
|
|
// certain user data. Because user data becomes unrecoverable without these
|
|
|
|
// keys, this won't overwrite any existing key, and instead outputs a message.
|
|
|
|
func generateKey(path string) error {
|
|
|
|
// Check if key file exists
|
2019-01-20 19:43:06 +01:00
|
|
|
if _, err := os.Stat(path); err == nil {
|
2018-11-11 23:52:24 +01:00
|
|
|
log.Info("%s already exists. rm the file if you understand the consquences.", path)
|
|
|
|
return nil
|
2019-01-20 19:43:06 +01:00
|
|
|
} else if !os.IsNotExist(err) {
|
|
|
|
log.Error("%s", err)
|
|
|
|
return err
|
2018-11-11 23:52:24 +01:00
|
|
|
}
|
|
|
|
|
|
|
|
log.Info("Generating %s.", path)
|
|
|
|
b, err := generateBytes(encKeysBytes)
|
|
|
|
if err != nil {
|
|
|
|
log.Error("FAILED. %s. Run writefreely --gen-keys again.", err)
|
|
|
|
return err
|
|
|
|
}
|
|
|
|
err = ioutil.WriteFile(path, b, 0600)
|
|
|
|
if err != nil {
|
|
|
|
log.Error("FAILED writing file: %s", err)
|
|
|
|
return err
|
|
|
|
}
|
|
|
|
log.Info("Success.")
|
|
|
|
return nil
|
|
|
|
}
|
|
|
|
|
|
|
|
// generateBytes returns securely generated random bytes.
|
|
|
|
func generateBytes(n int) ([]byte, error) {
|
|
|
|
b := make([]byte, n)
|
|
|
|
_, err := rand.Read(b)
|
|
|
|
if err != nil {
|
|
|
|
return nil, err
|
|
|
|
}
|
|
|
|
|
|
|
|
return b, nil
|
|
|
|
}
|