| OLD | NEW |
| 1 #!/usr/bin/env python | 1 #!/usr/bin/env python |
| 2 # Copyright (c) 2016 The Chromium Authors. All rights reserved. | 2 # Copyright (c) 2016 The Chromium Authors. All rights reserved. |
| 3 # Use of this source code is governed by a BSD-style license that can be | 3 # Use of this source code is governed by a BSD-style license that can be |
| 4 # found in the LICENSE file. | 4 # found in the LICENSE file. |
| 5 | 5 |
| 6 """Utility for generating experimental API tokens | 6 """Utility for generating experimental API tokens |
| 7 | 7 |
| 8 usage: generate_token.py [-h] [--key-file KEY_FILE] | 8 usage: generate_token.py [-h] [--key-file KEY_FILE] |
| 9 [--expire-days EXPIRE_DAYS | | 9 [--expire-days EXPIRE_DAYS | |
| 10 --expire-timestamp EXPIRE_TIMESTAMP] | 10 --expire-timestamp EXPIRE_TIMESTAMP] |
| 11 origin trial_name | 11 origin trial_name |
| 12 | 12 |
| 13 Run "generate_token.py -h" for more help on usage. | 13 Run "generate_token.py -h" for more help on usage. |
| 14 """ | 14 """ |
| 15 import argparse | 15 import argparse |
| 16 import base64 | 16 import base64 |
| 17 import json |
| 17 import re | 18 import re |
| 18 import os | 19 import os |
| 20 import struct |
| 19 import sys | 21 import sys |
| 20 import time | 22 import time |
| 21 import urlparse | 23 import urlparse |
| 22 | 24 |
| 23 script_dir = os.path.dirname(os.path.realpath(__file__)) | 25 script_dir = os.path.dirname(os.path.realpath(__file__)) |
| 24 sys.path.insert(0, os.path.join(script_dir, 'third_party', 'ed25519')) | 26 sys.path.insert(0, os.path.join(script_dir, 'third_party', 'ed25519')) |
| 25 import ed25519 | 27 import ed25519 |
| 26 | 28 |
| 27 | 29 |
| 28 # Matches a valid DNS name label (alphanumeric plus hyphens, except at the ends, | 30 # Matches a valid DNS name label (alphanumeric plus hyphens, except at the ends, |
| 29 # no longer than 63 ASCII characters) | 31 # no longer than 63 ASCII characters) |
| 30 DNS_LABEL_REGEX = re.compile(r"^(?!-)[a-z\d-]{1,63}(?<!-)$", re.IGNORECASE) | 32 DNS_LABEL_REGEX = re.compile(r"^(?!-)[a-z\d-]{1,63}(?<!-)$", re.IGNORECASE) |
| 31 | 33 |
| 34 # This script generates Version 2 tokens. |
| 35 VERSION = "\x02" |
| 36 |
| 32 def HostnameFromArg(arg): | 37 def HostnameFromArg(arg): |
| 33 """Determines whether a string represents a valid hostname. | 38 """Determines whether a string represents a valid hostname. |
| 34 | 39 |
| 35 Returns the canonical hostname if its argument is valid, or None otherwise. | 40 Returns the canonical hostname if its argument is valid, or None otherwise. |
| 36 """ | 41 """ |
| 37 if not arg or len(arg) > 255: | 42 if not arg or len(arg) > 255: |
| 38 return None | 43 return None |
| 39 if arg[-1] == ".": | 44 if arg[-1] == ".": |
| 40 arg = arg[:-1] | 45 arg = arg[:-1] |
| 41 if all(DNS_LABEL_REGEX.match(label) for label in arg.split(".")): | 46 if all(DNS_LABEL_REGEX.match(label) for label in arg.split(".")): |
| (...skipping 26 matching lines...) Expand all Loading... |
| 68 port = {"https": 443, "http": 80}[origin.scheme] | 73 port = {"https": 443, "http": 80}[origin.scheme] |
| 69 # Strip any extra components and return the origin URL: | 74 # Strip any extra components and return the origin URL: |
| 70 return "{0}://{1}:{2}".format(origin.scheme, origin.hostname, port) | 75 return "{0}://{1}:{2}".format(origin.scheme, origin.hostname, port) |
| 71 | 76 |
| 72 def ExpiryFromArgs(args): | 77 def ExpiryFromArgs(args): |
| 73 if args.expire_timestamp: | 78 if args.expire_timestamp: |
| 74 return int(args.expire_timestamp) | 79 return int(args.expire_timestamp) |
| 75 return (int(time.time()) + (int(args.expire_days) * 86400)) | 80 return (int(time.time()) + (int(args.expire_days) * 86400)) |
| 76 | 81 |
| 77 def GenerateTokenData(origin, api_name, expiry): | 82 def GenerateTokenData(origin, api_name, expiry): |
| 78 return "{0}|{1}|{2}".format(origin, api_name, expiry) | 83 return json.dumps({"origin": origin, |
| 84 "feature": api_name, |
| 85 "expiry": expiry}).encode('utf-8') |
| 86 |
| 87 def GenerateDataToSign(version, data): |
| 88 return version + struct.pack(">I",len(data)) + data |
| 79 | 89 |
| 80 def Sign(private_key, data): | 90 def Sign(private_key, data): |
| 81 return ed25519.signature(data, private_key[:32], private_key[32:]) | 91 return ed25519.signature(data, private_key[:32], private_key[32:]) |
| 82 | 92 |
| 83 def FormatToken(version, signature, data): | 93 def FormatToken(version, signature, data): |
| 84 return version + "|" + base64.b64encode(signature) + "|" + data | 94 return base64.b64encode(version + signature + |
| 95 struct.pack(">I",len(data)) + data) |
| 85 | 96 |
| 86 def main(): | 97 def main(): |
| 87 parser = argparse.ArgumentParser( | 98 parser = argparse.ArgumentParser( |
| 88 description="Generate tokens for enabling experimental APIs") | 99 description="Generate tokens for enabling experimental APIs") |
| 89 parser.add_argument("origin", | 100 parser.add_argument("origin", |
| 90 help="Origin for which to enable the API. This can be " | 101 help="Origin for which to enable the API. This can be " |
| 91 "either a hostname (default scheme HTTPS, default " | 102 "either a hostname (default scheme HTTPS, default " |
| 92 "port 443) or a URL.", | 103 "port 443) or a URL.", |
| 93 type=OriginFromArg) | 104 type=OriginFromArg) |
| 94 parser.add_argument("trial_name", | 105 parser.add_argument("trial_name", |
| (...skipping 21 matching lines...) Expand all Loading... |
| 116 | 127 |
| 117 # Validate that the key file read was a proper Ed25519 key -- running the | 128 # Validate that the key file read was a proper Ed25519 key -- running the |
| 118 # publickey method on the first half of the key should return the second | 129 # publickey method on the first half of the key should return the second |
| 119 # half. | 130 # half. |
| 120 if (len(private_key) < 64 or | 131 if (len(private_key) < 64 or |
| 121 ed25519.publickey(private_key[:32]) != private_key[32:]): | 132 ed25519.publickey(private_key[:32]) != private_key[32:]): |
| 122 print("Unable to use the specified private key file.") | 133 print("Unable to use the specified private key file.") |
| 123 sys.exit(1) | 134 sys.exit(1) |
| 124 | 135 |
| 125 token_data = GenerateTokenData(args.origin, args.trial_name, expiry) | 136 token_data = GenerateTokenData(args.origin, args.trial_name, expiry) |
| 126 signature = Sign(private_key, token_data) | 137 data_to_sign = GenerateDataToSign(VERSION, token_data) |
| 138 signature = Sign(private_key, data_to_sign) |
| 127 | 139 |
| 128 # Verify that that the signature is correct before printing it. | 140 # Verify that that the signature is correct before printing it. |
| 129 try: | 141 try: |
| 130 ed25519.checkvalid(signature, token_data, private_key[32:]) | 142 ed25519.checkvalid(signature, data_to_sign, private_key[32:]) |
| 131 except Exception, exc: | 143 except Exception, exc: |
| 132 print "There was an error generating the signature." | 144 print "There was an error generating the signature." |
| 133 print "(The original error was: %s)" % exc | 145 print "(The original error was: %s)" % exc |
| 134 sys.exit(1) | 146 sys.exit(1) |
| 135 | 147 |
| 136 # Output a properly-formatted token. Version 1 is hard-coded, as it is | 148 # Output a properly-formatted token. Version 1 is hard-coded, as it is |
| 137 # the only defined token version. | 149 # the only defined token version. |
| 138 print FormatToken("1", signature, token_data) | 150 print FormatToken(VERSION, signature, token_data) |
| 139 | 151 |
| 140 if __name__ == "__main__": | 152 if __name__ == "__main__": |
| 141 main() | 153 main() |
| OLD | NEW |