Как выполнить проверку подлинности между серверами CloudKit - PullRequest
0 голосов
/ 24 июня 2019

Я следую Составление запросов веб-службы

Чтобы выполнить Обнаружение всех пользовательских идентификаторов (GET пользователи / обнаружение) .

Идея состоит в том, чтобы этот простой запрос работал, а затем выполняйте более сложные запросы, такие как загрузка ресурса.

Приведенный ниже код возвращает ошибку из запроса.


import (
    "bytes"
    "crypto/ecdsa"
    "crypto/rand"
    "crypto/sha256"
    "crypto/x509"
    "encoding/base64"
    "encoding/pem"
    "fmt"
    "math/big"
    "net/http"
    "time"
    //...
)

func main() {

    fmt.Printf("\nprivate key:\n")

    const privPEM = `-----BEGIN EC PRIVATE KEY-----
MyProvateKey
-----END EC PRIVATE KEY-----`

    // https://golang.org/pkg/crypto/x509/#example_ParsePKIXPublicKey
    privBlock, _ := pem.Decode([]byte(privPEM))
    if privBlock == nil {
        panic("failed to parse PEM block containing the public key")
    }

    requestPathStr := "/database/1/iCloud.<MyContainer>/development/public/users/discover"

    var requestPath []byte
    requestPath = []byte(requestPathStr)
    fmt.Printf("requestPath: %s\n", requestPath)

    requestBody := ""
    var jsonStr = []byte(requestBody)
    //
    h := sha256.New()
    h.Write([]byte(requestBody))
    b := h.Sum(nil)
    hashedBody := base64.StdEncoding.EncodeToString(b)
    //

    f := "2006-01-02T15:04:05Z"
    requestDate := time.Now().UTC().Format(f)
    fmt.Println(requestDate)

    rawPayload := []byte(requestDate + ":" + hashedBody + ":" + requestPathStr)

    r, s, err := pkSign(rawPayload, privBlock)
    if err != nil {
        fmt.Printf("signing hash error: %s\n", err)
    }
    fmt.Printf("r: %v\n", r)
    fmt.Printf("s: %v\n", s)

    fmt.Printf("\npublic key:\n")

    const pubPEM = `-----BEGIN PUBLIC KEY-----
MyPublicKey
-----END PUBLIC KEY-----`
    pubBlock, _ := pem.Decode([]byte(pubPEM))
    if pubBlock == nil {
        panic("failed to parse PEM block containing the public key")
    }
    // ECDSA signature
    ECDSAsignature := r.Bytes()
    ECDSAsignature = append(ECDSAsignature, s.Bytes()...)

    fmt.Printf("ECDSAsignature : %x\n", ECDSAsignature)

    verify := pkVerify(rawPayload, pubBlock, r, s)
    fmt.Printf("signature verification result: %t\n", verify)

    // GET [path]/database/[version]/[container]/[environment]/public/users/discover

    url := "https://api.apple-cloudkit.com/" + requestPathStr
    fmt.Printf("\nurl:%v\n", url)
    fmt.Printf("\njsonStr:%s\n", jsonStr)
    fmt.Printf("\nrequestDate:%s\n", requestDate)

    client := &http.Client{}

    // GET [path]/database/[version]/[container]/[environment]/public/users/discover

    req, err := http.NewRequest("GET", url, bytes.NewBuffer(jsonStr))
    var authKeyID = "MyKeyID"

    req.Header.Add("content-type", "text/plain")
    req.Header.Add("X-Apple-CloudKit-Request-KeyID", authKeyID)
    req.Header.Add("X-Apple-CloudKit-Request-ISO8601Date", requestDate)

    ECDSAsignatureBase64 := base64.StdEncoding.EncodeToString(ECDSAsignature)

    req.Header.Add("X-Apple-CloudKit-Request-SignatureV1", ECDSAsignatureBase64)
    resp, _ := client.Do(req)
    fmt.Printf("\nresp:%v\n", resp)

    resp, err = client.Do(req)
    if err != nil {
        fmt.Printf("\nerr:%v\n", err.Error())

    } else {
        resp.Body.Close()
        fmt.Printf("\nresp.Body:%v\n", resp.Body)

    }
    fmt.Printf("\nresp:%v\n", resp)

}

func pkSign(hash []byte, block *pem.Block) (r, s *big.Int, err error) {
    zero := big.NewInt(0)
    private_key, err := x509.ParseECPrivateKey(block.Bytes)
    if err != nil {
        return zero, zero, err
    }

    // Sign signs a hash (which should be the result of hashing a larger message)
    // using the private key, priv.
    // If the hash is longer than the bit-length of the private key's curve order,
    // the hash will be truncated to that length.
    // It returns the signature as a pair of integers.
    // The security of the private key depends on the entropy of rand.

    r, s, err = ecdsa.Sign(rand.Reader, private_key, hash)
    if err != nil {
        return zero, zero, err
    }
    return r, s, nil
}

func pkVerify(hash []byte, block *pem.Block, r *big.Int, s *big.Int) (result bool) {
    public_key, err := x509.ParsePKIXPublicKey(block.Bytes)
    if err != nil {
        return false
    }

    switch public_key := public_key.(type) {
    case *ecdsa.PublicKey:
        return ecdsa.Verify(public_key, hash, r, s)
    default:
        return false
    }
}

Я получил ошибку:следующее:

соответственно: & {503 Служба недоступна 503 HTTP / 1.1 1 1 map [Access-Control-Expose-Headers: [X-Apple-Request-UUID Via] Соединение: [keep-alive] Длина содержимого: [0] Тип содержимого: [текст / обычный] Дата: [Пн, 24 июня 2019 07:47:52 GMT] Повторная попытка: [30] Сервер: [AppleHttpServer / 70a91026] Через: [icloudedge: mi01p00ic-zteu02110401: 7401: 19RC207: Майами] X-Apple-кэш: [false] X-Apple-Request-Uuid: [ddeb0fa3-ea16-40e9-a15b-c2e68cb5fe78]] {} 0 [] неверная ложная карта []0xc00015c000 0xc0000ce2c0}

resp.Body: {}

1 Ответ

0 голосов
/ 26 июня 2019

Если кому-то это нужно, вот рабочее решение.

package main

import (
    "bytes"
    "crypto/ecdsa"
    "crypto/rand"
    "crypto/sha256"
    "crypto/x509"
    "encoding/asn1"
    "encoding/base64"
    "encoding/pem"
    "fmt"
    "io/ioutil"
    "math/big"
    "net/http"
    "time"
)

const projectID = "<your ID>"

//
const authKeyID = "your ID"
const path = "https://api.apple-cloudkit.com"
const version = "1"
const container = "your container"
const environment = "development"
const database = "public"

const privPEM = `-----BEGIN EC PRIVATE KEY-----
your privste key
-----END EC PRIVATE KEY-----`

const pubPEM = `-----BEGIN PUBLIC KEY-----
your public key
-----END PUBLIC KEY-----`

type ecdsaSignature struct {
    R, S *big.Int
}

func main() {
    t0 := time.Now().UTC()
    t1 := time.Now().UTC()

    // fmt.Printf("\nprivate key:\n")
    // https://golang.org/pkg/crypto/x509/#example_ParsePKIXPublicKey
    privBlock, _ := pem.Decode([]byte(privPEM))
    if privBlock == nil {
        panic("failed to parse PEM block containing the public key")
    }

    private_key, err := x509.ParseECPrivateKey(privBlock.Bytes)
    if err != nil {
        panic("failed to parse PEM block containing the public key")
    }

    pubBlock, _ := pem.Decode([]byte(pubPEM))
    if pubBlock == nil {
        panic("failed to parse PEM block containing the public key")
    }

    var public_key *ecdsa.PublicKey
    public_k, err := x509.ParsePKIXPublicKey(pubBlock.Bytes)
    if err != nil {
        panic("failed to parse PEM block containing the public key")
    }
    switch public_k1 := public_k.(type) {
    case *ecdsa.PublicKey:
        public_key = public_k1
    default:
        //return false
    }
    //////////
    // Config
    //////////
    requestPath := "/database/" +
        version + "/" +
        container + "/" +
        environment + "/" +
        database + "/" +
        "records/query"

    requestBody := `{"query": {"recordType": "<your record type"}}`

    f := "2006-01-02T15:04:05Z"
    requestDate := time.Now().UTC().Format(f)

    h := sha256.New()
    h.Write([]byte(requestBody))
    b := h.Sum(nil)
    hashedBody := base64.StdEncoding.EncodeToString(b)

    rawPayload := requestDate + ":" + hashedBody + ":" + requestPath

    signedSignature, err := SignMessage(private_key, []byte(rawPayload))
    if err != nil {
        fmt.Printf("SignMessage  error: %s\n", err.Error())
    }

    verify := VerifyMessage(public_key, []byte(rawPayload), signedSignature)
    fmt.Printf("signature verification result: %t\n", verify)

    requestSignature := base64.StdEncoding.EncodeToString(signedSignature)
    url := path + requestPath

    req, err := http.NewRequest("POST", url, bytes.NewBuffer([]byte(requestBody)))

    req.Header.Add("content-type", "text/plain")
    req.Header.Add("X-Apple-CloudKit-Request-KeyID", authKeyID)

    req.Header.Add("X-Apple-CloudKit-Request-ISO8601Date", requestDate)

    req.Header.Add("X-Apple-CloudKit-Request-SignatureV1", requestSignature)

    resp, err := http.DefaultClient.Do(req)
    if err != nil {
        fmt.Printf("\nresp.err:%v\n", err.Error())

    }

    defer resp.Body.Close()
    rbody, err := ioutil.ReadAll(resp.Body)
    if err != nil {
        fmt.Printf("\nioutil.ReadAll.err:%v\n", err.Error())

    }
    fmt.Printf("\nrbody:%s\n", rbody)

    curl := "curl -X POST -H \"content-type: text/plain\"" + " " +
        "-H X-Apple-CloudKit-Request-KeyID:" + authKeyID + " " +
        "-H X-Apple-CloudKit-Request-ISO8601Date:" + requestDate + " " +
        "-H X-Apple-CloudKit-Request-SignatureV1:" + base64.StdEncoding.EncodeToString(signedSignature) + " " +
        " -d " + "'" + requestBody + "'" + " " +
        url

    fmt.Printf("\n%s\n", curl)

}

func SignMessage(priv *ecdsa.PrivateKey, message []byte) ([]byte, error) {
    hashed := sha256.Sum256(message)
    r, s, err := ecdsa.Sign(rand.Reader, priv, hashed[:])
    if err != nil {
        return nil, err
    }

    return asn1.Marshal(ecdsaSignature{r, s})
}

func VerifyMessage(pub *ecdsa.PublicKey, message []byte, signature []byte) bool {
    var rs ecdsaSignature

    if _, err := asn1.Unmarshal(signature, &rs); err != nil {
        return false
    }

    hashed := sha256.Sum256(message)
    return ecdsa.Verify(pub, hashed[:], rs.R, rs.S)
}
...