代码拉取完成,页面将自动刷新
同步操作将从 tupelo-shen/mysnapd 强制同步,此操作会覆盖自 Fork 仓库以来所做的任何修改,且无法恢复!!!
确定后同步将在后台操作,完成时将刷新页面,请耐心等待。
// -*- Mode: Go; indent-tabs-mode: t -*-
/*
* Copyright (C) 2016 Canonical Ltd
*
* This program is free software: you can redistribute it and/or modify
* it under the terms of the GNU General Public License version 3 as
* published by the Free Software Foundation.
*
* This program is distributed in the hope that it will be useful,
* but WITHOUT ANY WARRANTY; without even the implied warranty of
* MERCHANTABILITY or FITNESS FOR A PARTICULAR PURPOSE. See the
* GNU General Public License for more details.
*
* You should have received a copy of the GNU General Public License
* along with this program. If not, see <http://www.gnu.org/licenses/>.
*
*/
package asserts
import (
"fmt"
"time"
"gitee.com/mysnapcore/mysnapd/release"
"gitee.com/mysnapcore/mysnapd/strutil"
)
// Serial holds a serial assertion, which is a statement binding a
// device identity with the device public key.
type Serial struct {
assertionBase
timestamp time.Time
pubKey PublicKey
}
// BrandID returns the brand identifier of the device.
func (ser *Serial) BrandID() string {
return ser.HeaderString("brand-id")
}
// Model returns the model name identifier of the device.
func (ser *Serial) Model() string {
return ser.HeaderString("model")
}
// Serial returns the serial identifier of the device, together with
// brand id and model they form the unique identifier of the device.
func (ser *Serial) Serial() string {
return ser.HeaderString("serial")
}
// DeviceKey returns the public key of the device.
func (ser *Serial) DeviceKey() PublicKey {
return ser.pubKey
}
// Timestamp returns the time when the serial assertion was issued.
func (ser *Serial) Timestamp() time.Time {
return ser.timestamp
}
func (ser *Serial) checkConsistency(db RODatabase, acck *AccountKey) error {
if ser.AuthorityID() != ser.BrandID() {
// serial authority and brand do not match, check the model
a, err := db.Find(ModelType, map[string]string{
"series": release.Series,
"brand-id": ser.BrandID(),
"model": ser.Model(),
})
if err != nil && !IsNotFound(err) {
return err
}
if IsNotFound(err) || !strutil.ListContains(a.(*Model).SerialAuthority(), ser.AuthorityID()) {
return fmt.Errorf("serial with authority %q different from brand %q without model assertion with serial-authority set to to allow for them", ser.AuthorityID(), ser.BrandID())
}
}
return nil
}
func assembleSerial(assert assertionBase) (Assertion, error) {
// brand-id and authority-id can diverge if the model allows
// for it via serial-authority, check for brand-id well-formedness
_, err := checkStringMatches(assert.headers, "brand-id", validAccountID)
if err != nil {
return nil, err
}
_, err = checkModel(assert.headers)
if err != nil {
return nil, err
}
encodedKey, err := checkNotEmptyString(assert.headers, "device-key")
if err != nil {
return nil, err
}
pubKey, err := DecodePublicKey([]byte(encodedKey))
if err != nil {
return nil, err
}
keyID, err := checkNotEmptyString(assert.headers, "device-key-sha3-384")
if err != nil {
return nil, err
}
if keyID != pubKey.ID() {
return nil, fmt.Errorf("device key does not match provided key id")
}
timestamp, err := checkRFC3339Date(assert.headers, "timestamp")
if err != nil {
return nil, err
}
// ignore extra headers and non-empty body for future compatibility
return &Serial{
assertionBase: assert,
timestamp: timestamp,
pubKey: pubKey,
}, nil
}
// SerialRequest holds a serial-request assertion, which is a self-signed request to obtain a full device identity bound to the device public key.
type SerialRequest struct {
assertionBase
pubKey PublicKey
}
// BrandID returns the brand identifier of the device making the request.
func (sreq *SerialRequest) BrandID() string {
return sreq.HeaderString("brand-id")
}
// Model returns the model name identifier of the device making the request.
func (sreq *SerialRequest) Model() string {
return sreq.HeaderString("model")
}
// Serial returns the optional proposed serial identifier for the device, the service taking the request might use it or ignore it.
func (sreq *SerialRequest) Serial() string {
return sreq.HeaderString("serial")
}
// RequestID returns the id for the request, obtained from and to be presented to the serial signing service.
func (sreq *SerialRequest) RequestID() string {
return sreq.HeaderString("request-id")
}
// DeviceKey returns the public key of the device making the request.
func (sreq *SerialRequest) DeviceKey() PublicKey {
return sreq.pubKey
}
func assembleSerialRequest(assert assertionBase) (Assertion, error) {
_, err := checkNotEmptyString(assert.headers, "brand-id")
if err != nil {
return nil, err
}
_, err = checkModel(assert.headers)
if err != nil {
return nil, err
}
_, err = checkNotEmptyString(assert.headers, "request-id")
if err != nil {
return nil, err
}
_, err = checkOptionalString(assert.headers, "serial")
if err != nil {
return nil, err
}
encodedKey, err := checkNotEmptyString(assert.headers, "device-key")
if err != nil {
return nil, err
}
pubKey, err := DecodePublicKey([]byte(encodedKey))
if err != nil {
return nil, err
}
if pubKey.ID() != assert.SignKeyID() {
return nil, fmt.Errorf("device key does not match included signing key id")
}
// ignore extra headers and non-empty body for future compatibility
return &SerialRequest{
assertionBase: assert,
pubKey: pubKey,
}, nil
}
// DeviceSessionRequest holds a device-session-request assertion, which is a request wrapping a store-provided nonce to start a session by a device signed with its key.
type DeviceSessionRequest struct {
assertionBase
timestamp time.Time
}
// BrandID returns the brand identifier of the device making the request.
func (req *DeviceSessionRequest) BrandID() string {
return req.HeaderString("brand-id")
}
// Model returns the model name identifier of the device making the request.
func (req *DeviceSessionRequest) Model() string {
return req.HeaderString("model")
}
// Serial returns the serial identifier of the device making the request,
// together with brand id and model it forms the unique identifier of
// the device.
func (req *DeviceSessionRequest) Serial() string {
return req.HeaderString("serial")
}
// Nonce returns the nonce obtained from store and to be presented when requesting a device session.
func (req *DeviceSessionRequest) Nonce() string {
return req.HeaderString("nonce")
}
// Timestamp returns the time when the device-session-request was created.
func (req *DeviceSessionRequest) Timestamp() time.Time {
return req.timestamp
}
func assembleDeviceSessionRequest(assert assertionBase) (Assertion, error) {
_, err := checkModel(assert.headers)
if err != nil {
return nil, err
}
_, err = checkNotEmptyString(assert.headers, "nonce")
if err != nil {
return nil, err
}
timestamp, err := checkRFC3339Date(assert.headers, "timestamp")
if err != nil {
return nil, err
}
// ignore extra headers and non-empty body for future compatibility
return &DeviceSessionRequest{
assertionBase: assert,
timestamp: timestamp,
}, nil
}
此处可能存在不合适展示的内容,页面不予展示。您可通过相关编辑功能自查并修改。
如您确认内容无涉及 不当用语 / 纯广告导流 / 暴力 / 低俗色情 / 侵权 / 盗版 / 虚假 / 无价值内容或违法国家有关法律法规的内容,可点击提交进行申诉,我们将尽快为您处理。