github.com/Psiphon-Labs/psiphon-tunnel-core@v2.0.28+incompatible/psiphon/common/osl/paver/main.go (about) 1 /* 2 * Copyright (c) 2016, Psiphon Inc. 3 * All rights reserved. 4 * 5 * This program is free software: you can redistribute it and/or modify 6 * it under the terms of the GNU General Public License as published by 7 * the Free Software Foundation, either version 3 of the License, or 8 * (at your option) any later version. 9 * 10 * This program is distributed in the hope that it will be useful, 11 * but WITHOUT ANY WARRANTY; without even the implied warranty of 12 * MERCHANTABILITY or FITNESS FOR A PARTICULAR PURPOSE. See the 13 * GNU General Public License for more details. 14 * 15 * You should have received a copy of the GNU General Public License 16 * along with this program. If not, see <http://www.gnu.org/licenses/>. 17 * 18 */ 19 20 package main 21 22 import ( 23 "crypto/x509" 24 "encoding/base64" 25 "encoding/json" 26 "encoding/pem" 27 "flag" 28 "fmt" 29 "io/ioutil" 30 "os" 31 "path/filepath" 32 "strconv" 33 "time" 34 35 "github.com/Psiphon-Labs/psiphon-tunnel-core/psiphon/common/osl" 36 ) 37 38 func main() { 39 40 var configFilename string 41 flag.StringVar(&configFilename, "config", "", "OSL configuration filename") 42 43 var offset time.Duration 44 flag.DurationVar( 45 &offset, "offset", 0, 46 "pave OSL start time (now minus offset); default, 0, selects earliest epoch") 47 48 var period time.Duration 49 flag.DurationVar( 50 &period, "period", 0, 51 "pave OSL total period (starting from offset); default, 0, selects at least one OSL period from now for all schemes") 52 53 var signingKeyPairFilename string 54 flag.StringVar(&signingKeyPairFilename, "key", "", "signing public key pair filename") 55 56 var payloadFilename string 57 flag.StringVar(&payloadFilename, "payload", "", "server entries to pave into OSLs") 58 59 var destinationDirectory string 60 flag.StringVar( 61 &destinationDirectory, "output", "", 62 "destination directory for output files; when omitted, no files are written (dry run mode)") 63 64 var listScheme int 65 flag.IntVar(&listScheme, "list-scheme", -1, "list current period OSL IDs for specified scheme; no files are written") 66 67 var omitMD5SumsSchemes ints 68 flag.Var(&omitMD5SumsSchemes, "omit-md5sums", "omit MD5Sum fields for specified scheme(s)") 69 70 var omitEmptyOSLsSchemes ints 71 flag.Var(&omitEmptyOSLsSchemes, "omit-empty", "omit empty OSLs for specified scheme(s)") 72 73 flag.Parse() 74 75 // load config 76 77 configJSON, err := ioutil.ReadFile(configFilename) 78 if err != nil { 79 fmt.Printf("failed loading configuration file: %s\n", err) 80 os.Exit(1) 81 } 82 83 config, err := osl.LoadConfig(configJSON) 84 if err != nil { 85 fmt.Printf("failed processing configuration file: %s\n", err) 86 os.Exit(1) 87 } 88 89 if listScheme != -1 { 90 OSLIDs, err := config.CurrentOSLIDs(listScheme) 91 if err != nil { 92 fmt.Printf("failed listing scheme OSL IDs: %s\n", err) 93 os.Exit(1) 94 } 95 for propagationChannelID, OSLID := range OSLIDs { 96 fmt.Printf("%s %s\n", propagationChannelID, OSLID) 97 } 98 return 99 } 100 101 // load key pair 102 103 keyPairPEM, err := ioutil.ReadFile(signingKeyPairFilename) 104 if err != nil { 105 fmt.Printf("failed loading signing public key pair file: %s\n", err) 106 os.Exit(1) 107 } 108 109 // Password "none" from psi_ops: 110 // https://bitbucket.org/psiphon/psiphon-circumvention-system/src/ef4f3d4893bd5259ef24f0cb4525cbbbb0854cf9/Automation/psi_ops.py?at=default&fileviewer=file-view-default#psi_ops.py-297 111 112 block, _ := pem.Decode(keyPairPEM) 113 decryptedKeyPairPEM, err := x509.DecryptPEMBlock(block, []byte("none")) 114 if err != nil { 115 fmt.Printf("failed decrypting signing public key pair file: %s\n", err) 116 os.Exit(1) 117 } 118 119 rsaKey, err := x509.ParsePKCS1PrivateKey(decryptedKeyPairPEM) 120 if err != nil { 121 fmt.Printf("failed parsing signing public key pair file: %s\n", err) 122 os.Exit(1) 123 } 124 125 publicKeyBytes, err := x509.MarshalPKIXPublicKey(rsaKey.Public()) 126 if err != nil { 127 fmt.Printf("failed marshaling signing public key: %s\n", err) 128 os.Exit(1) 129 } 130 131 privateKeyBytes := x509.MarshalPKCS1PrivateKey(rsaKey) 132 133 signingPublicKey := base64.StdEncoding.EncodeToString(publicKeyBytes) 134 signingPrivateKey := base64.StdEncoding.EncodeToString(privateKeyBytes) 135 136 // load payload 137 138 paveServerEntries := make(map[string][]string) 139 140 pavedPayloadOSLID := make(map[string]bool) 141 142 if payloadFilename != "" { 143 payloadJSON, err := ioutil.ReadFile(payloadFilename) 144 if err != nil { 145 fmt.Printf("failed loading payload file: %s\n", err) 146 os.Exit(1) 147 } 148 149 var payload []*struct { 150 OSLIDs []string 151 ServerEntry string 152 } 153 154 err = json.Unmarshal(payloadJSON, &payload) 155 if err != nil { 156 fmt.Printf("failed unmarshaling payload file: %s\n", err) 157 os.Exit(1) 158 } 159 160 for _, item := range payload { 161 for _, oslID := range item.OSLIDs { 162 paveServerEntries[oslID] = append( 163 paveServerEntries[oslID], item.ServerEntry) 164 pavedPayloadOSLID[oslID] = false 165 } 166 } 167 } 168 169 // determine pave time range 170 171 paveTime := time.Now().UTC() 172 173 var startTime, endTime time.Time 174 175 if offset != 0 { 176 startTime = paveTime.Add(-offset) 177 } else { 178 // Default to the earliest scheme epoch. 179 startTime = paveTime 180 for _, scheme := range config.Schemes { 181 epoch, _ := time.Parse(time.RFC3339, scheme.Epoch) 182 if epoch.Before(startTime) { 183 startTime = epoch 184 } 185 } 186 } 187 188 if period != 0 { 189 endTime = startTime.Add(period) 190 } else { 191 // Default to at least one OSL period after "now", 192 // considering all schemes. 193 endTime = paveTime 194 for _, scheme := range config.Schemes { 195 oslDuration := scheme.GetOSLDuration() 196 if endTime.Add(oslDuration).After(endTime) { 197 endTime = endTime.Add(oslDuration) 198 } 199 } 200 } 201 202 // build list of all participating propagation channel IDs 203 204 allPropagationChannelIDs := make(map[string]bool) 205 for _, scheme := range config.Schemes { 206 for _, propagationChannelID := range scheme.PropagationChannelIDs { 207 allPropagationChannelIDs[propagationChannelID] = true 208 } 209 } 210 211 // pave a directory for each propagation channel 212 213 for propagationChannelID := range allPropagationChannelIDs { 214 215 paveFiles, err := config.Pave( 216 startTime, 217 endTime, 218 propagationChannelID, 219 signingPublicKey, 220 signingPrivateKey, 221 paveServerEntries, 222 omitMD5SumsSchemes, 223 omitEmptyOSLsSchemes, 224 func(logInfo *osl.PaveLogInfo) { 225 pavedPayloadOSLID[logInfo.OSLID] = true 226 fmt.Printf( 227 "paved %s: scheme %d, propagation channel ID %s, "+ 228 "OSL time %s, OSL duration %s, server entries: %d\n", 229 logInfo.FileName, 230 logInfo.SchemeIndex, 231 logInfo.PropagationChannelID, 232 logInfo.OSLTime, 233 logInfo.OSLDuration, 234 logInfo.ServerEntryCount) 235 }) 236 if err != nil { 237 fmt.Printf("failed paving: %s\n", err) 238 os.Exit(1) 239 } 240 241 if destinationDirectory != "" { 242 243 directory := filepath.Join(destinationDirectory, propagationChannelID) 244 245 err = os.MkdirAll(directory, 0755) 246 if err != nil { 247 fmt.Printf("failed creating output directory: %s\n", err) 248 os.Exit(1) 249 } 250 251 for _, paveFile := range paveFiles { 252 filename := filepath.Join(directory, paveFile.Name) 253 err = ioutil.WriteFile(filename, paveFile.Contents, 0755) 254 if err != nil { 255 fmt.Printf("error writing output file: %s\n", err) 256 os.Exit(1) 257 } 258 } 259 } 260 } 261 262 // fail if payload contains OSL IDs not in the config and time range 263 264 unknown := false 265 for oslID, paved := range pavedPayloadOSLID { 266 if !paved { 267 fmt.Printf( 268 "ignored %d server entries for unknown OSL ID: %s\n", 269 len(paveServerEntries[oslID]), 270 oslID) 271 unknown = true 272 } 273 } 274 if unknown { 275 fmt.Printf("payload contains unknown OSL IDs\n") 276 os.Exit(1) 277 } 278 } 279 280 type ints []int 281 282 func (i *ints) String() string { 283 return fmt.Sprint(*i) 284 } 285 286 func (i *ints) Set(strValue string) error { 287 value, err := strconv.Atoi(strValue) 288 if err != nil { 289 return err 290 } 291 *i = append(*i, value) 292 return nil 293 }