mirror of
https://github.com/1f349/mjwt.git
synced 2024-11-13 23:11:34 +00:00
205 lines
5.0 KiB
Go
205 lines
5.0 KiB
Go
package mjwt
|
|
|
|
import (
|
|
"crypto/rsa"
|
|
"errors"
|
|
"github.com/1f349/rsa-helper/rsaprivate"
|
|
"github.com/1f349/rsa-helper/rsapublic"
|
|
"os"
|
|
"path"
|
|
"strings"
|
|
"sync"
|
|
)
|
|
|
|
// defaultMJwtKeyStore implements KeyStore and stores kIDs against just rsa.PublicKey
|
|
// or with rsa.PrivateKey instances as well.
|
|
type defaultMJwtKeyStore struct {
|
|
rwLocker *sync.RWMutex
|
|
store map[string]*rsa.PrivateKey
|
|
storePub map[string]*rsa.PublicKey
|
|
}
|
|
|
|
var _ KeyStore = &defaultMJwtKeyStore{}
|
|
|
|
// NewMJwtKeyStore creates a new defaultMJwtKeyStore.
|
|
func NewMJwtKeyStore() KeyStore {
|
|
return &defaultMJwtKeyStore{
|
|
rwLocker: new(sync.RWMutex),
|
|
store: make(map[string]*rsa.PrivateKey),
|
|
storePub: make(map[string]*rsa.PublicKey),
|
|
}
|
|
}
|
|
|
|
// NewMJwtKeyStoreFromDirectory loads keys from a directory with the specified extensions to denote public and private
|
|
// rsa keys; the kID is the filename of the key up to the first .
|
|
func NewMJwtKeyStoreFromDirectory(directory, keyPrvExt, keyPubExt string) (KeyStore, error) {
|
|
// Create empty KeyStore
|
|
ks := NewMJwtKeyStore().(*defaultMJwtKeyStore)
|
|
// List directory contents
|
|
dirEntries, err := os.ReadDir(directory)
|
|
if err != nil {
|
|
return nil, err
|
|
}
|
|
// Import keys from files, based on extension
|
|
for _, entry := range dirEntries {
|
|
if !entry.IsDir() {
|
|
firstDotIdx := strings.Index(entry.Name(), ".")
|
|
lastDotIdx := strings.LastIndex(entry.Name(), ".")
|
|
if firstDotIdx > 0 && lastDotIdx+1 < len(entry.Name()) {
|
|
if entry.Name()[lastDotIdx+1:] == keyPrvExt {
|
|
kID := entry.Name()[:firstDotIdx]
|
|
// Load rsa private key with the file name as the kID (Up to the first .)
|
|
key, err2 := rsaprivate.Read(path.Join(directory, entry.Name()))
|
|
if err2 == nil {
|
|
ks.store[kID] = key
|
|
ks.storePub[kID] = &key.PublicKey
|
|
} else {
|
|
err = err2
|
|
}
|
|
} else if entry.Name()[lastDotIdx+1:] == keyPubExt {
|
|
kID := entry.Name()[:firstDotIdx]
|
|
// Load rsa public key with the file name as the kID (Up to the first .)
|
|
key, err2 := rsapublic.Read(path.Join(directory, entry.Name()))
|
|
if err2 == nil {
|
|
_, exs := ks.store[kID]
|
|
if !exs {
|
|
ks.store[kID] = nil
|
|
}
|
|
ks.storePub[kID] = key
|
|
} else {
|
|
err = err2
|
|
}
|
|
}
|
|
}
|
|
}
|
|
}
|
|
return ks, err
|
|
}
|
|
|
|
// ExportKeyStore saves all the keys stored in the specified KeyStore into a directory with the specified
|
|
// extensions for public and private keys
|
|
func ExportKeyStore(ks KeyStore, directory, keyPrvExt, keyPubExt string) error {
|
|
if ks == nil {
|
|
return errors.New("ks is nil")
|
|
}
|
|
|
|
// Create directory
|
|
err := os.MkdirAll(directory, 0700)
|
|
if err != nil {
|
|
return err
|
|
}
|
|
|
|
// Export all keys
|
|
for _, kID := range ks.ListKeys() {
|
|
kPrv := ks.GetKey(kID)
|
|
if kPrv != nil {
|
|
err2 := rsaprivate.Write(path.Join(directory, kID+"."+keyPrvExt), kPrv)
|
|
if err2 != nil {
|
|
err = err2
|
|
}
|
|
}
|
|
kPub := ks.GetKeyPublic(kID)
|
|
if kPub != nil {
|
|
err2 := rsapublic.Write(path.Join(directory, kID+"."+keyPubExt), kPub)
|
|
if err2 != nil {
|
|
err = err2
|
|
}
|
|
}
|
|
}
|
|
return err
|
|
}
|
|
|
|
// SetKey adds a new rsa.PrivateKey with the specified kID to the KeyStore.
|
|
func (d *defaultMJwtKeyStore) SetKey(kID string, prvKey *rsa.PrivateKey) {
|
|
if d == nil || prvKey == nil {
|
|
return
|
|
}
|
|
d.rwLocker.Lock()
|
|
defer d.rwLocker.Unlock()
|
|
d.store[kID] = prvKey
|
|
d.storePub[kID] = &prvKey.PublicKey
|
|
return
|
|
}
|
|
|
|
// SetKeyPublic adds a new rsa.PublicKey with the specified kID to the KeyStore.
|
|
func (d *defaultMJwtKeyStore) SetKeyPublic(kID string, pubKey *rsa.PublicKey) {
|
|
if d == nil || pubKey == nil {
|
|
return
|
|
}
|
|
d.rwLocker.Lock()
|
|
defer d.rwLocker.Unlock()
|
|
_, exs := d.store[kID]
|
|
if !exs {
|
|
d.store[kID] = nil
|
|
}
|
|
d.storePub[kID] = pubKey
|
|
return
|
|
}
|
|
|
|
// RemoveKey removes a specified kID from the KeyStore.
|
|
func (d *defaultMJwtKeyStore) RemoveKey(kID string) {
|
|
if d == nil {
|
|
return
|
|
}
|
|
d.rwLocker.Lock()
|
|
defer d.rwLocker.Unlock()
|
|
delete(d.store, kID)
|
|
delete(d.storePub, kID)
|
|
return
|
|
}
|
|
|
|
// ListKeys lists the kIDs of all the keys in the KeyStore.
|
|
func (d *defaultMJwtKeyStore) ListKeys() []string {
|
|
if d == nil {
|
|
return nil
|
|
}
|
|
d.rwLocker.RLock()
|
|
defer d.rwLocker.RUnlock()
|
|
lKeys := make([]string, len(d.store))
|
|
i := 0
|
|
for k := range d.store {
|
|
lKeys[i] = k
|
|
i++
|
|
}
|
|
return lKeys
|
|
}
|
|
|
|
// GetKey gets the rsa.PrivateKey given the kID in the KeyStore or null if not found.
|
|
func (d *defaultMJwtKeyStore) GetKey(kID string) *rsa.PrivateKey {
|
|
if d == nil {
|
|
return nil
|
|
}
|
|
d.rwLocker.RLock()
|
|
defer d.rwLocker.RUnlock()
|
|
kPrv, ok := d.store[kID]
|
|
if ok {
|
|
return kPrv
|
|
}
|
|
return nil
|
|
}
|
|
|
|
// GetKeyPublic gets the rsa.PublicKey given the kID in the KeyStore or null if not found.
|
|
func (d *defaultMJwtKeyStore) GetKeyPublic(kID string) *rsa.PublicKey {
|
|
if d == nil {
|
|
return nil
|
|
}
|
|
d.rwLocker.RLock()
|
|
defer d.rwLocker.RUnlock()
|
|
kPub, ok := d.storePub[kID]
|
|
if ok {
|
|
return kPub
|
|
}
|
|
return nil
|
|
}
|
|
|
|
// ClearKeys removes all the stored keys in the KeyStore.
|
|
func (d *defaultMJwtKeyStore) ClearKeys() {
|
|
if d == nil {
|
|
return
|
|
}
|
|
d.rwLocker.Lock()
|
|
defer d.rwLocker.Unlock()
|
|
clear(d.store)
|
|
clear(d.storePub)
|
|
}
|