github.com/keybase/client/go@v0.0.0-20241007131713-f10651d043c8/auth/credential_authority.go (about)

     1  package auth
     2  
     3  import (
     4  	"fmt"
     5  	"sync"
     6  	"time"
     7  
     8  	libkb "github.com/keybase/client/go/libkb"
     9  	logger "github.com/keybase/client/go/logger"
    10  	keybase1 "github.com/keybase/client/go/protocol/keybase1"
    11  	context "golang.org/x/net/context"
    12  )
    13  
    14  const (
    15  	userTimeout  = 3 * time.Hour
    16  	cacheTimeout = 8 * time.Hour
    17  )
    18  
    19  // CredentialAuthority should be allocated as a singleton object. It validates UID<->Username<->ActiveKey
    20  // triples for all users across a service. It keeps a cache and subscribes for updates,
    21  // so you can call into it as much as you'd like without fear of spamming the network.
    22  type CredentialAuthority struct {
    23  	log           logger.Logger
    24  	api           UserKeyAPIer
    25  	invalidateCh  chan keybase1.UID
    26  	checkCh       chan checkArg
    27  	shutdownCh    chan struct{}
    28  	cleanItemCh   chan cleanItem
    29  	users         map[keybase1.UID](*userWrapper)
    30  	cleanSchedule []cleanItem
    31  	eng           engine
    32  }
    33  
    34  // checkArgs are sent over the checkCh to the core loop of a CredentialAuthority
    35  type checkArg struct {
    36  	uid         keybase1.UID
    37  	username    *libkb.NormalizedUsername
    38  	kid         *keybase1.KID
    39  	sibkeys     []keybase1.KID
    40  	subkeys     []keybase1.KID
    41  	loadDeleted bool
    42  	retCh       chan error
    43  }
    44  
    45  // String implements the Stringer interface for checkArg.
    46  func (ca checkArg) String() string {
    47  	return fmt.Sprintf("{uid: %s, username: %s, kid: %s, sibkeys: %v, subkeys: %v}",
    48  		ca.uid, ca.username, ca.kid, ca.sibkeys, ca.subkeys)
    49  }
    50  
    51  // userWrapper contains two fields -- one is the user object itself, which will
    52  // spawn a go-routine that is largely off-limits to the main thread aside from
    53  // over channels. the second field is the `atime`, or *access* time, which the main
    54  // thread can touch to compute eviction mechanics.
    55  type userWrapper struct {
    56  	u     *user
    57  	atime time.Time
    58  }
    59  
    60  // String implements the Stringer interface for userWrapper.
    61  func (uw userWrapper) String() string {
    62  	return fmt.Sprintf("{user: %s, atime: %s}", uw.u, uw.atime)
    63  }
    64  
    65  // cleanItems are items to consider cleaning out of the cache. they sit in a queue
    66  // until they are up for review. When the review happens, the user object they
    67  // refer to can still persist in the cache, if it's been accessed recently.
    68  type cleanItem struct {
    69  	uid   keybase1.UID
    70  	ctime time.Time
    71  }
    72  
    73  // String implements the Stringer interface for cleanItem.
    74  func (ci cleanItem) String() string {
    75  	return fmt.Sprintf("{uid: %s, ctime: %s}", ci.uid, ci.ctime)
    76  }
    77  
    78  // user wraps a user who is currently active in the system. Each user has a run
    79  // method that runs its own goRoutine, so many items, aside from the two channels,
    80  // are off-limits to the main thread.
    81  type user struct {
    82  	lock      sync.RWMutex
    83  	uid       keybase1.UID
    84  	username  libkb.NormalizedUsername
    85  	sibkeys   map[keybase1.KID]struct{}
    86  	subkeys   map[keybase1.KID]struct{}
    87  	isOK      bool
    88  	isDeleted bool
    89  	ctime     time.Time
    90  	ca        *CredentialAuthority
    91  }
    92  
    93  // String implements the stringer interface for user.
    94  func (u *user) String() string {
    95  	u.lock.RLock()
    96  	defer u.lock.RUnlock()
    97  	return fmt.Sprintf("{uid: %s, username: %s, sibkeys: %v, subkeys: %v, isOK: %v, ctime: %s, isDeleted: %v}",
    98  		u.uid, u.username, u.sibkeys, u.subkeys, u.isOK, u.ctime, u.isDeleted)
    99  }
   100  
   101  // newUser makes a new user with the given UID for use in the given
   102  // CredentialAuthority. This constructor sets up the necessary maps and
   103  // channels to make the user work as expected.
   104  func newUser(uid keybase1.UID, ca *CredentialAuthority) *user {
   105  	ca.log.Debug("newUser, uid %s", uid)
   106  	ret := &user{
   107  		uid:     uid,
   108  		sibkeys: make(map[keybase1.KID]struct{}),
   109  		subkeys: make(map[keybase1.KID]struct{}),
   110  		ca:      ca,
   111  	}
   112  	return ret
   113  }
   114  
   115  // UserKeyAPIer is an interface that specifies the UserKeyAPI that
   116  // will eventually be used to get information about the users from the trusted
   117  // server authority.
   118  type UserKeyAPIer interface {
   119  	// GetUser looks up the username and KIDS active for the given user.
   120  	// Deleted users are loaded by default.
   121  	GetUser(context.Context, keybase1.UID) (
   122  		un libkb.NormalizedUsername, sibkeys, subkeys []keybase1.KID, deleted bool, err error)
   123  	// PollForChanges returns the UIDs that have recently changed on the server
   124  	// side. It will be called in a poll loop. This call should function as
   125  	// a *long poll*, meaning, it should not return unless there is a change
   126  	// to report, or a sufficient amount of time has passed. If an error occurred,
   127  	// then PollForChanges should delay before return, so we don't wind up
   128  	// busy-waiting.
   129  	PollForChanges(context.Context) ([]keybase1.UID, error)
   130  }
   131  
   132  // engine specifies the internal mechanics of how this CredentialAuthority
   133  // works. It's only really useful for testing, since tests will want to change
   134  // the definition of time, poke the main loop into action at certain points,
   135  // and get callback hooks when items are evicted.
   136  type engine interface {
   137  	Now() time.Time             // we can overload this for debugging
   138  	Evicted(uid keybase1.UID)   // called when this uid is evicted
   139  	GetPokeCh() <-chan struct{} // Return a channel that can poke the main loop
   140  }
   141  
   142  // standardEngine is the engine that's used in production when the CredentailAuthority
   143  // actually runs. It does very little.
   144  type standardEngine struct {
   145  	pokeCh <-chan struct{}
   146  }
   147  
   148  // Now returns time.Now
   149  func (se *standardEngine) Now() time.Time { return time.Now() }
   150  
   151  // Evicted is a Noop, called whenever a user object for the given UID is evicted.
   152  func (se *standardEngine) Evicted(uid keybase1.UID) {}
   153  
   154  // GetPokeCh returns a dummy channel that's never sent to
   155  func (se *standardEngine) GetPokeCh() <-chan struct{} { return se.pokeCh }
   156  
   157  // newStandardEngine creates and initializes a standardEngine for use in the
   158  // production run of a CredentialAuthority.
   159  func newStandardEngine() engine {
   160  	return &standardEngine{
   161  		pokeCh: make(chan struct{}),
   162  	}
   163  }
   164  
   165  // NewCredentialAuthority makes a new signleton CredentialAuthority an start it running. It takes as input
   166  // a logger and an API for making keybase API calls
   167  func NewCredentialAuthority(log logger.Logger, api UserKeyAPIer) *CredentialAuthority {
   168  	return newCredentialAuthorityWithEngine(log, api, newStandardEngine())
   169  }
   170  
   171  // newCredentialAuthoirutyWithEngine is an internal call that can specify the non-standard
   172  // engine. We'd only need to call this directly from testing to specify a testingEngine.
   173  func newCredentialAuthorityWithEngine(log logger.Logger, api UserKeyAPIer, eng engine) *CredentialAuthority {
   174  	ret := &CredentialAuthority{
   175  		log:          log,
   176  		api:          api,
   177  		invalidateCh: make(chan keybase1.UID, 100),
   178  		checkCh:      make(chan checkArg),
   179  		shutdownCh:   make(chan struct{}),
   180  		users:        make(map[keybase1.UID](*userWrapper)),
   181  		cleanItemCh:  make(chan cleanItem),
   182  		eng:          eng,
   183  	}
   184  	ret.run()
   185  	return ret
   186  }
   187  
   188  // run two loops in goroutines: one to poll for updates from the server, and
   189  // another to poll for incoming requests and maintenance events.
   190  func (v *CredentialAuthority) run() {
   191  	go v.pollLoop()
   192  	go v.runLoop()
   193  }
   194  
   195  // pollOnce polls the API server once for which users have changed.
   196  func (v *CredentialAuthority) pollOnce() error {
   197  	var err error
   198  	var uids []keybase1.UID
   199  	err = v.runWithCancel(func(ctx context.Context) error {
   200  		var err error
   201  		uids, err = v.api.PollForChanges(ctx)
   202  		return err
   203  	})
   204  	if err == nil {
   205  		for _, uid := range uids {
   206  			v.invalidateCh <- uid
   207  		}
   208  	}
   209  	return err
   210  }
   211  
   212  // runWithCancel runs an API call while listening for a shutdown of the CredentialAuthority.
   213  // If it gets one, it uses context-based cancellation to cancel the outstanding API call
   214  // (or sleep in the case of Poll()'ing).
   215  func (v *CredentialAuthority) runWithCancel(body func(ctx context.Context) error) error {
   216  	ctx, cancel := context.WithCancel(context.Background())
   217  	doneCh := make(chan error)
   218  	var err error
   219  
   220  	go func() {
   221  		doneCh <- body(ctx)
   222  	}()
   223  
   224  	select {
   225  	case err = <-doneCh:
   226  	case <-v.shutdownCh:
   227  		cancel()
   228  		err = ErrShutdown
   229  	}
   230  	return err
   231  }
   232  
   233  // pollLoop() keeps running until the CA is shut down via Shutdown(). It calls Poll()
   234  // on the UserKeyAPIer once per iteration.
   235  func (v *CredentialAuthority) pollLoop() {
   236  	for {
   237  		// We rely on pollOnce to not return right away, so we don't busy loop.
   238  		if v.pollOnce() == ErrShutdown {
   239  			break
   240  		}
   241  	}
   242  }
   243  
   244  // runLoop() keeps running until the CA is shut down via Shutdown(). It listens
   245  // for incoming client requests, and also for various maintenance takes, and
   246  // cache invalidations.
   247  func (v *CredentialAuthority) runLoop() {
   248  	done := false
   249  	for !done {
   250  		select {
   251  		case <-v.eng.GetPokeCh():
   252  			// Noop, but poke main loop for testing.
   253  		case <-v.shutdownCh:
   254  			done = true
   255  		case ca := <-v.checkCh:
   256  			v.log.Debug("Checking %s", ca)
   257  			u := v.makeUser(ca.uid)
   258  			go u.check(ca)
   259  		case uid := <-v.invalidateCh:
   260  			if uw := v.users[uid]; uw != nil {
   261  				v.log.Debug("Invalidating %s", uw)
   262  				delete(v.users, uid)
   263  				v.eng.Evicted(uid)
   264  			}
   265  		case ci := <-v.cleanItemCh:
   266  			v.cleanSchedule = append(v.cleanSchedule, ci)
   267  		}
   268  		v.clean()
   269  	}
   270  	for uid := range v.users {
   271  		v.eng.Evicted(uid)
   272  	}
   273  }
   274  
   275  // clean out in-memory data, going through in FIFO order. Stop once we've hit
   276  // a cleanItem that's too recent. When we iterate over cleanItems, we don't
   277  // need to throw them out necessarily, if they've been accessed recently. In that
   278  // case, just skip and keep going.
   279  //
   280  // We'll get an entry in the cleanSchedule once for ever call to GetUser() on
   281  // the API server.
   282  func (v *CredentialAuthority) clean() {
   283  	cutoff := v.eng.Now().Add(-cacheTimeout)
   284  	for i, e := range v.cleanSchedule {
   285  		if e.ctime.After(cutoff) {
   286  			v.cleanSchedule = v.cleanSchedule[i:]
   287  			return
   288  		}
   289  		if uw := v.users[e.uid]; uw != nil && !uw.atime.After(e.ctime) {
   290  			v.log.Debug("Cleaning %s, clean entry: %s", uw, e)
   291  			delete(v.users, e.uid)
   292  			v.eng.Evicted(e.uid)
   293  		}
   294  	}
   295  	v.cleanSchedule = nil
   296  }
   297  
   298  // makeUser either pulls a user from the in-memory table, or constructs a new
   299  // one. In either case, it updates the CA's `atime` bit for now for this user
   300  // record.
   301  func (v *CredentialAuthority) makeUser(uid keybase1.UID) *user {
   302  	uw := v.users[uid]
   303  	if uw == nil {
   304  		u := newUser(uid, v)
   305  		uw = &userWrapper{u: u}
   306  		v.users[uid] = uw
   307  	}
   308  	uw.atime = v.eng.Now()
   309  	return uw.u
   310  }
   311  
   312  // Now return this CA's idea of what time Now is.
   313  func (u *user) Now() time.Time { return u.ca.eng.Now() }
   314  
   315  // repopulate is intended to repopulate our representation of the user with the
   316  // server's up-to-date notion of what the user looks like. If our version is recent
   317  // enough, this is a no-op.  If not, we'll go to the server and send the main loop
   318  // a "Cleanup" event to eventually clean us out.
   319  func (u *user) repopulate() error {
   320  	u.lock.RLock()
   321  	alreadyPopulated := u.isPopulatedRLocked()
   322  	u.lock.RUnlock()
   323  	if alreadyPopulated {
   324  		return nil
   325  	}
   326  
   327  	u.lock.Lock()
   328  
   329  	// Check again in case another goroutine has already filled this before
   330  	// we took the write lock.
   331  	alreadyPopulated = u.isPopulatedRLocked()
   332  	defer u.lock.Unlock()
   333  	if alreadyPopulated {
   334  		return nil
   335  	}
   336  
   337  	// Register that this item should eventually be cleaned out by the cleaner
   338  	// thread. Don't block on the send, though, since that could deadlock the process
   339  	// (since the process is blocked on sending to us).
   340  	ctime := u.Now()
   341  	go func() {
   342  		u.ca.cleanItemCh <- cleanItem{uid: u.uid, ctime: ctime}
   343  	}()
   344  
   345  	un, sibkeys, subkeys, isDeleted, err := u.ca.getUserFromServer(u.uid)
   346  	if err != nil {
   347  		u.isOK = false
   348  		return err
   349  	}
   350  	u.username = un
   351  	for _, k := range sibkeys {
   352  		u.sibkeys[k] = struct{}{}
   353  	}
   354  	for _, k := range subkeys {
   355  		u.subkeys[k] = struct{}{}
   356  	}
   357  	u.isOK = true
   358  	u.ctime = ctime
   359  	u.isDeleted = isDeleted
   360  	u.ca.log.Debug("Repopulated info for %s", u)
   361  	return nil
   362  }
   363  
   364  // isPopulated returned true if this user is populated and current enough to
   365  // trust.
   366  func (u *user) isPopulatedRLocked() bool {
   367  	return u.isOK && u.Now().Sub(u.ctime) <= userTimeout
   368  }
   369  
   370  func (u *user) checkAfterPopulatedRLocked(ca checkArg) (err error) {
   371  	if !ca.loadDeleted && u.isDeleted {
   372  		return ErrUserDeleted
   373  	}
   374  
   375  	if ca.username != nil {
   376  		if err = u.checkUsernameRLocked(*ca.username); err != nil {
   377  			return err
   378  		}
   379  	}
   380  
   381  	if ca.kid != nil {
   382  		if err = u.checkKeyRLocked(*ca.kid); err != nil {
   383  			return err
   384  		}
   385  	}
   386  
   387  	if ca.sibkeys != nil {
   388  		if err = u.compareSibkeysRLocked(ca.sibkeys); err != nil {
   389  			return err
   390  		}
   391  	}
   392  
   393  	if ca.subkeys != nil {
   394  		if err = u.compareSubkeysRLocked(ca.subkeys); err != nil {
   395  			return err
   396  		}
   397  	}
   398  
   399  	return nil
   400  }
   401  
   402  // check that a user matches the given username and has the given key as one of
   403  // its valid keys. This is where the actually work of this whole library happens.
   404  func (u *user) check(ca checkArg) {
   405  	var err error
   406  
   407  	defer func() {
   408  		u.ca.log.Debug("Check %s, err: %v", ca, err)
   409  		ca.retCh <- err
   410  	}()
   411  
   412  	if err = u.repopulate(); err != nil {
   413  		return
   414  	}
   415  
   416  	u.lock.RLock()
   417  	defer u.lock.RUnlock()
   418  
   419  	err = u.checkAfterPopulatedRLocked(ca)
   420  }
   421  
   422  // getUserFromServer runs the UserKeyAPIer GetUser() API call while paying
   423  // attention to any shutdown events that might interrupt it.
   424  func (v *CredentialAuthority) getUserFromServer(uid keybase1.UID) (
   425  	un libkb.NormalizedUsername, sibkeys, subkeys []keybase1.KID, deleted bool, err error) {
   426  	err = v.runWithCancel(func(ctx context.Context) error {
   427  		var err error
   428  		un, sibkeys, subkeys, deleted, err = v.api.GetUser(ctx, uid)
   429  		return err
   430  	})
   431  	return un, sibkeys, subkeys, deleted, err
   432  }
   433  
   434  // checkUsernameRLocked checks that a username is a match for this user.
   435  func (u *user) checkUsernameRLocked(un libkb.NormalizedUsername) error {
   436  	var err error
   437  	if !u.username.Eq(un) {
   438  		err = BadUsernameError{u.username, un}
   439  	}
   440  	return err
   441  }
   442  
   443  // compareSibkeysRLocked returns true if the passed set of sibkeys is equal.
   444  func (u *user) compareSibkeysRLocked(sibkeys []keybase1.KID) error {
   445  	return compareKeys(sibkeys, u.sibkeys)
   446  }
   447  
   448  // compareSubkeysRLocked returns true if the passed set of subkeys is equal.
   449  func (u *user) compareSubkeysRLocked(subkeys []keybase1.KID) error {
   450  	return compareKeys(subkeys, u.subkeys)
   451  }
   452  
   453  // Helper method for the two above.
   454  func compareKeys(keys []keybase1.KID, expected map[keybase1.KID]struct{}) error {
   455  	if len(keys) != len(expected) {
   456  		return ErrKeysNotEqual
   457  	}
   458  	for _, kid := range keys {
   459  		if _, ok := expected[kid]; !ok {
   460  			return ErrKeysNotEqual
   461  		}
   462  	}
   463  	return nil
   464  }
   465  
   466  // checkKeyRLocked checks that the given key is still valid for this user.
   467  func (u *user) checkKeyRLocked(kid keybase1.KID) error {
   468  	var err error
   469  	if _, ok := u.sibkeys[kid]; !ok {
   470  		if _, ok := u.subkeys[kid]; !ok {
   471  			err = BadKeyError{u.uid, kid}
   472  		}
   473  	}
   474  	return err
   475  }
   476  
   477  // CheckUserKey is the main point of entry to this library. It takes as input a UID, a
   478  // username and a kid that should refer to a current valid triple, perhaps
   479  // extracted from a signed authentication statement. It returns an error if the
   480  // check fails, and nil otherwise. If username or kid are nil they aren't checked.
   481  func (v *CredentialAuthority) CheckUserKey(ctx context.Context, uid keybase1.UID,
   482  	username *libkb.NormalizedUsername, kid *keybase1.KID, loadDeleted bool) (err error) {
   483  	v.log.Debug("CheckUserKey uid %s, kid %s", uid, kid)
   484  	retCh := make(chan error, 1) // buffered in case the ctx is canceled
   485  	v.checkCh <- checkArg{uid: uid, username: username, kid: kid, loadDeleted: loadDeleted, retCh: retCh}
   486  	select {
   487  	case <-ctx.Done():
   488  		err = ctx.Err()
   489  	case err = <-retCh:
   490  	}
   491  	return err
   492  }
   493  
   494  // CheckUsers is used to validate all provided UIDs are known.
   495  func (v *CredentialAuthority) CheckUsers(ctx context.Context, users []keybase1.UID) (err error) {
   496  	for _, uid := range users {
   497  		if uid == keybase1.PUBLIC_UID {
   498  			continue
   499  		}
   500  		if err = v.CheckUserKey(ctx, uid, nil, nil, false); err != nil {
   501  			break
   502  		}
   503  	}
   504  	return err
   505  }
   506  
   507  // CompareUserKeys compares the passed sets to the sets known by the API server.
   508  // It returns true if the sets are equal.
   509  func (v *CredentialAuthority) CompareUserKeys(ctx context.Context, uid keybase1.UID, sibkeys, subkeys []keybase1.KID) (
   510  	err error) {
   511  	retCh := make(chan error, 1) // buffered in case the ctx is canceled
   512  	v.checkCh <- checkArg{uid: uid, sibkeys: sibkeys, subkeys: subkeys, retCh: retCh}
   513  	select {
   514  	case <-ctx.Done():
   515  		err = ctx.Err()
   516  	case err = <-retCh:
   517  	}
   518  	return err
   519  }
   520  
   521  // Shutdown the credentialAuthority and delete all internal state.
   522  func (v *CredentialAuthority) Shutdown() {
   523  	close(v.shutdownCh)
   524  }