-
Notifications
You must be signed in to change notification settings - Fork 2
/
metadata.go
111 lines (90 loc) · 2.73 KB
/
metadata.go
1
2
3
4
5
6
7
8
9
10
11
12
13
14
15
16
17
18
19
20
21
22
23
24
25
26
27
28
29
30
31
32
33
34
35
36
37
38
39
40
41
42
43
44
45
46
47
48
49
50
51
52
53
54
55
56
57
58
59
60
61
62
63
64
65
66
67
68
69
70
71
72
73
74
75
76
77
78
79
80
81
82
83
84
85
86
87
88
89
90
91
92
93
94
95
96
97
98
99
100
101
102
103
104
105
106
107
108
109
110
111
/*
* This file is part of Windermere (EGIL SCIM Server).
*
* Copyright (C) 2019-2021 Föreningen Sambruk
*
* This program is free software: you can redistribute it and/or modify
* it under the terms of the GNU Affero General Public License as
* published by the Free Software Foundation, either version 3 of the
* License, or (at your option) any later version.
* This program is distributed in the hope that it will be useful,
* but WITHOUT ANY WARRANTY; without even the implied warranty of
* MERCHANTABILITY or FITNESS FOR A PARTICULAR PURPOSE. See the
* GNU Affero General Public License for more details.
* You should have received a copy of the GNU Affero General Public License
* along with this program. If not, see <https://www.gnu.org/licenses/>.
*/
package main
import (
"crypto/x509"
"encoding/json"
"encoding/pem"
"errors"
"io/ioutil"
"log"
"net/http"
"os"
"github.com/joesiltberg/bowness/fedtls"
bownessutil "github.com/joesiltberg/bowness/util"
)
func publicKeyPin(certPath string) (string, error) {
pemdata, err := ioutil.ReadFile(certPath)
if err != nil {
return "", err
}
derdata, _ := pem.Decode(pemdata)
if derdata == nil {
return "", errors.New("Failed to decode PEM data when pinning public key")
}
x509Cert, err := x509.ParseCertificate(derdata.Bytes)
if err != nil {
return "", err
}
return bownessutil.Fingerprint(x509Cert), nil
}
// Creates a http.Handler for returning this server's metadata for the TLS federation
func metadataHandler(certPath, entityID, baseURI, organization, organizationID string) http.Handler {
cert, err := os.ReadFile(certPath)
if err != nil {
log.Fatalf("Failed to read certificate when creating metadata: %v", err)
}
issuer := fedtls.Issuer{
X509certificate: string(cert),
}
pkp, err := publicKeyPin(certPath)
if err != nil {
log.Fatalf("Failed to generate public key pin when creating metadata: %v", err)
}
pin := fedtls.Pin{
Alg: "sha256",
Digest: pkp,
}
description := "EGIL SCIM server"
server := fedtls.Server{
Description: &description,
BaseURI: baseURI,
Tags: []string{"egilv1"},
Pins: []fedtls.Pin{pin},
}
entity := fedtls.Entity{
Issuers: []fedtls.Issuer{issuer},
Servers: []fedtls.Server{server},
EntityID: entityID,
Organization: &organization,
OrganizationID: &organizationID,
}
md := fedtls.Metadata{
Version: "1.0.0",
Entities: []fedtls.Entity{entity},
}
return http.HandlerFunc(
func(w http.ResponseWriter, r *http.Request) {
body, err := json.MarshalIndent(&md, "", " ")
if err != nil {
http.Error(w, err.Error(), http.StatusInternalServerError)
return
}
w.Header().Set("Content-Type", "application/json")
w.Write(body)
})
}