aboutsummaryrefslogtreecommitdiff
path: root/plugins/ObjectCacheServer/src/CacheAuthKeyStore.cs
blob: 5fc700b1c7fe3159bef79d62972975f3d14320f7 (plain)
1
2
3
4
5
6
7
8
9
10
11
12
13
14
15
16
17
18
19
20
21
22
23
24
25
26
27
28
29
30
31
32
33
34
35
36
37
38
39
40
41
42
43
44
45
46
47
48
49
50
51
52
53
54
55
56
57
58
59
60
61
62
63
64
65
66
67
68
69
70
71
72
73
74
75
76
77
78
79
80
81
82
83
84
85
86
87
88
89
90
91
92
93
94
95
96
97
98
99
100
101
102
103
104
105
106
107
108
109
110
111
112
113
114
115
116
117
118
119
120
/*
* Copyright (c) 2023 Vaughn Nugent
* 
* Library: VNLib
* Package: ObjectCacheServer
* File: ObjectCacheServerEntry.cs 
*
* ObjectCacheServerEntry.cs is part of ObjectCacheServer which is part of the larger 
* VNLib collection of libraries and utilities.
*
* ObjectCacheServer is free software: you can redistribute it and/or modify 
* it under the terms of the GNU Affero General Public License as 
* published by the Free Software Foundation, either version 3 of the
* License, or (at your option) any later version.
*
* ObjectCacheServer is distributed in the hope that it will be useful,
* but WITHOUT ANY WARRANTY; without even the implied warranty of
* MERCHANTABILITY or FITNESS FOR A PARTICULAR PURPOSE. See the
* GNU Affero General Public License for more details.
*
* You should have received a copy of the GNU Affero General Public License
* along with this program.  If not, see https://www.gnu.org/licenses/.
*/

using System;
using System.Collections.Generic;
using System.Security.Cryptography;

using VNLib.Hashing;
using VNLib.Plugins;
using VNLib.Hashing.IdentityUtility;
using VNLib.Plugins.Extensions.Loading;
using VNLib.Data.Caching.Extensions;

namespace VNLib.Data.Caching.ObjectCache.Server
{
    sealed record class CacheAuthKeyStore : ICacheAuthManager
    {
        private readonly IAsyncLazy<ReadOnlyJsonWebKey> _clientPub;
        private readonly IAsyncLazy<ReadOnlyJsonWebKey> _cachePriv;

        public CacheAuthKeyStore(PluginBase plugin)
        {
            _clientPub = plugin.GetSecretAsync("client_public_key").ToLazy(r => r.GetJsonWebKey());
            _cachePriv = plugin.GetSecretAsync("cache_private_key").ToLazy(r => r.GetJsonWebKey());
        }

        ///<inheritdoc/>
        public IReadOnlyDictionary<string, string?> GetJwtHeader()
        {
            return _cachePriv.Value.JwtHeader;
        }

        ///<inheritdoc/>
        public void SignJwt(JsonWebToken jwt)
        {
            jwt.SignFromJwk(_cachePriv.Value);
        }

        ///<inheritdoc/>
        public bool VerifyJwt(JsonWebToken jwt, bool isPeer)
        {
            //Verify from peer server or client
            return isPeer ? jwt.VerifyFromJwk(_cachePriv.Value) : jwt.VerifyFromJwk(_clientPub.Value);
        }

        /// <summary>
        /// Verifies the message against the stored cache key
        /// </summary>
        /// <param name="jwt">The token to verify</param>
        /// <returns>True if the token was verified, false otherwise</returns>
        public bool VerifyCachePeer(JsonWebToken jwt)
        {
            return jwt.VerifyFromJwk(_cachePriv.Value);
        }

        ///<inheritdoc/>
        public byte[] SignMessageHash(byte[] hash, HashAlg alg)
        {
            //try to get the rsa alg for the signing key
            using RSA? rsa = _cachePriv.Value.GetRSAPublicKey();
            if (rsa != null)
            {
                return rsa.SignHash(hash, alg.GetAlgName(), RSASignaturePadding.Pkcs1);
            }

            //try to get the ecdsa alg for the signing key
            using ECDsa? ecdsa = _cachePriv.Value.GetECDsaPrivateKey();
            if (ecdsa != null)
            {
                return ecdsa.SignHash(hash);
            }

            throw new NotSupportedException("The signing key is not a valid RSA or ECDSA key");
        }
      
        ///<inheritdoc/>
        public bool VerifyMessageHash(ReadOnlySpan<byte> hash, HashAlg alg, ReadOnlySpan<byte> signature, bool isPeer)
        {
            //Determine the key to verify against
            ReadOnlyJsonWebKey jwk = isPeer ? _cachePriv.Value : _clientPub.Value;

            //try to get the rsa alg for the signing key
            using RSA? rsa = jwk.GetRSAPublicKey();
            if (rsa != null)
            {
                return rsa.VerifyHash(hash, signature, alg.GetAlgName(), RSASignaturePadding.Pkcs1);
            }

            //try to get the ecdsa alg for the signing key
            using ECDsa? ecdsa = jwk.GetECDsaPublicKey();
            if (ecdsa != null)
            {
                return ecdsa.VerifyHash(hash, signature);
            }

            throw new NotSupportedException("The current key is not an RSA or ECDSA key and is not supported");
        }
    }
}