2023-08-10 18:34:25 +00:00
|
|
|
package server
|
|
|
|
|
|
|
|
import (
|
|
|
|
"bytes"
|
2023-08-11 22:41:55 +00:00
|
|
|
"context"
|
2023-08-10 18:34:25 +00:00
|
|
|
"crypto/rand"
|
|
|
|
"crypto/sha256"
|
|
|
|
"encoding/base64"
|
|
|
|
"encoding/hex"
|
|
|
|
"encoding/json"
|
|
|
|
"fmt"
|
|
|
|
"io"
|
|
|
|
"log"
|
|
|
|
"net/http"
|
2023-08-22 01:38:31 +00:00
|
|
|
"net/url"
|
2023-08-10 18:34:25 +00:00
|
|
|
"os"
|
2023-09-19 16:36:30 +00:00
|
|
|
"path/filepath"
|
2023-08-22 01:38:31 +00:00
|
|
|
"strconv"
|
2023-08-10 18:34:25 +00:00
|
|
|
"strings"
|
|
|
|
"time"
|
|
|
|
|
|
|
|
"golang.org/x/crypto/ssh"
|
|
|
|
|
|
|
|
"github.com/jmorganca/ollama/api"
|
|
|
|
)
|
|
|
|
|
|
|
|
type AuthRedirect struct {
|
|
|
|
Realm string
|
|
|
|
Service string
|
|
|
|
Scope string
|
|
|
|
}
|
|
|
|
|
|
|
|
type SignatureData struct {
|
|
|
|
Method string
|
|
|
|
Path string
|
|
|
|
Data []byte
|
|
|
|
}
|
|
|
|
|
|
|
|
func generateNonce(length int) (string, error) {
|
|
|
|
nonce := make([]byte, length)
|
|
|
|
_, err := rand.Read(nonce)
|
|
|
|
if err != nil {
|
|
|
|
return "", err
|
|
|
|
}
|
|
|
|
return base64.RawURLEncoding.EncodeToString(nonce), nil
|
|
|
|
}
|
|
|
|
|
2023-08-22 01:38:31 +00:00
|
|
|
func (r AuthRedirect) URL() (*url.URL, error) {
|
|
|
|
redirectURL, err := url.Parse(r.Realm)
|
2023-08-10 18:34:25 +00:00
|
|
|
if err != nil {
|
2023-08-22 01:38:31 +00:00
|
|
|
return nil, err
|
2023-08-10 18:34:25 +00:00
|
|
|
}
|
2023-08-22 01:38:31 +00:00
|
|
|
|
|
|
|
values := redirectURL.Query()
|
|
|
|
|
|
|
|
values.Add("service", r.Service)
|
|
|
|
|
2023-08-17 04:42:02 +00:00
|
|
|
for _, s := range strings.Split(r.Scope, " ") {
|
2023-08-22 01:38:31 +00:00
|
|
|
values.Add("scope", s)
|
2023-08-17 04:42:02 +00:00
|
|
|
}
|
2023-08-22 01:38:31 +00:00
|
|
|
|
|
|
|
values.Add("ts", strconv.FormatInt(time.Now().Unix(), 10))
|
|
|
|
|
|
|
|
nonce, err := generateNonce(16)
|
|
|
|
if err != nil {
|
|
|
|
return nil, err
|
|
|
|
}
|
|
|
|
values.Add("nonce", nonce)
|
|
|
|
|
|
|
|
redirectURL.RawQuery = values.Encode()
|
|
|
|
return redirectURL, nil
|
2023-08-10 18:34:25 +00:00
|
|
|
}
|
|
|
|
|
2023-09-13 18:46:29 +00:00
|
|
|
func getAuthToken(ctx context.Context, redirData AuthRedirect) (string, error) {
|
2023-08-22 01:38:31 +00:00
|
|
|
redirectURL, err := redirData.URL()
|
2023-08-10 18:34:25 +00:00
|
|
|
if err != nil {
|
|
|
|
return "", err
|
|
|
|
}
|
|
|
|
|
|
|
|
home, err := os.UserHomeDir()
|
|
|
|
if err != nil {
|
|
|
|
return "", err
|
|
|
|
}
|
|
|
|
|
2023-09-19 16:36:30 +00:00
|
|
|
keyPath := filepath.Join(home, ".ollama", "id_ed25519")
|
2023-08-10 18:34:25 +00:00
|
|
|
|
2023-08-11 22:33:11 +00:00
|
|
|
rawKey, err := os.ReadFile(keyPath)
|
2023-08-10 18:34:25 +00:00
|
|
|
if err != nil {
|
|
|
|
log.Printf("Failed to load private key: %v", err)
|
|
|
|
return "", err
|
|
|
|
}
|
|
|
|
|
|
|
|
s := SignatureData{
|
2023-11-02 20:10:58 +00:00
|
|
|
Method: http.MethodGet,
|
2023-08-22 01:38:31 +00:00
|
|
|
Path: redirectURL.String(),
|
2023-08-10 18:34:25 +00:00
|
|
|
Data: nil,
|
|
|
|
}
|
|
|
|
|
|
|
|
sig, err := s.Sign(rawKey)
|
|
|
|
if err != nil {
|
|
|
|
return "", err
|
|
|
|
}
|
|
|
|
|
2023-08-22 01:24:42 +00:00
|
|
|
headers := make(http.Header)
|
|
|
|
headers.Set("Authorization", sig)
|
2023-11-02 20:10:58 +00:00
|
|
|
resp, err := makeRequest(ctx, http.MethodGet, redirectURL, headers, nil, nil)
|
2023-08-10 18:34:25 +00:00
|
|
|
if err != nil {
|
|
|
|
log.Printf("couldn't get token: %q", err)
|
2023-10-20 23:52:48 +00:00
|
|
|
return "", err
|
2023-08-10 18:34:25 +00:00
|
|
|
}
|
|
|
|
defer resp.Body.Close()
|
|
|
|
|
2023-08-27 04:55:21 +00:00
|
|
|
if resp.StatusCode >= http.StatusBadRequest {
|
2023-08-10 18:34:25 +00:00
|
|
|
body, _ := io.ReadAll(resp.Body)
|
|
|
|
return "", fmt.Errorf("on pull registry responded with code %d: %s", resp.StatusCode, body)
|
|
|
|
}
|
|
|
|
|
|
|
|
respBody, err := io.ReadAll(resp.Body)
|
|
|
|
if err != nil {
|
|
|
|
return "", err
|
|
|
|
}
|
|
|
|
|
|
|
|
var tok api.TokenResponse
|
|
|
|
if err := json.Unmarshal(respBody, &tok); err != nil {
|
|
|
|
return "", err
|
|
|
|
}
|
|
|
|
|
|
|
|
return tok.Token, nil
|
|
|
|
}
|
|
|
|
|
|
|
|
// Bytes returns a byte slice of the data to sign for the request
|
|
|
|
func (s SignatureData) Bytes() []byte {
|
|
|
|
// We first derive the content hash of the request body using:
|
|
|
|
// base64(hex(sha256(request body)))
|
|
|
|
|
|
|
|
hash := sha256.Sum256(s.Data)
|
|
|
|
hashHex := make([]byte, hex.EncodedLen(len(hash)))
|
|
|
|
hex.Encode(hashHex, hash[:])
|
|
|
|
contentHash := base64.StdEncoding.EncodeToString(hashHex)
|
|
|
|
|
|
|
|
// We then put the entire request together in a serialize string using:
|
|
|
|
// "<method>,<uri>,<content hash>"
|
|
|
|
// e.g. "GET,http://localhost,OTdkZjM1O..."
|
|
|
|
|
|
|
|
return []byte(strings.Join([]string{s.Method, s.Path, contentHash}, ","))
|
|
|
|
}
|
|
|
|
|
|
|
|
// SignData takes a SignatureData object and signs it with a raw private key
|
|
|
|
func (s SignatureData) Sign(rawKey []byte) (string, error) {
|
|
|
|
privateKey, err := ssh.ParseRawPrivateKey(rawKey)
|
|
|
|
if err != nil {
|
|
|
|
return "", err
|
|
|
|
}
|
|
|
|
|
|
|
|
signer, err := ssh.NewSignerFromKey(privateKey)
|
|
|
|
if err != nil {
|
|
|
|
return "", err
|
|
|
|
}
|
|
|
|
|
|
|
|
// get the pubkey, but remove the type
|
|
|
|
pubKey := ssh.MarshalAuthorizedKey(signer.PublicKey())
|
|
|
|
parts := bytes.Split(pubKey, []byte(" "))
|
|
|
|
if len(parts) < 2 {
|
|
|
|
return "", fmt.Errorf("malformed public key")
|
|
|
|
}
|
|
|
|
|
|
|
|
signedData, err := signer.Sign(nil, s.Bytes())
|
|
|
|
if err != nil {
|
|
|
|
return "", err
|
|
|
|
}
|
|
|
|
|
|
|
|
// signature is <pubkey>:<signature>
|
|
|
|
sig := fmt.Sprintf("%s:%s", bytes.TrimSpace(parts[1]), base64.StdEncoding.EncodeToString(signedData.Blob))
|
|
|
|
return sig, nil
|
|
|
|
}
|