我正在关注Composing Web Service Requests
要执行 Discovering All User Identities (GET users/discover)。
想法是使这个简单的请求生效,然后再提出更复杂的请求,例如上传资产。
下面的代码从请求中返回错误。
import (
"bytes"
"crypto/ecdsa"
"crypto/rand"
"crypto/sha256"
"crypto/x509"
"encoding/base64"
"encoding/pem"
"fmt"
"math/big"
"net/http"
"time"
//...
)
func main() {
fmt.Printf("\nprivate key:\n")
const privPEM = `-----BEGIN EC PRIVATE KEY-----
MyProvateKey
-----END EC PRIVATE KEY-----`
// https://golang.org/pkg/crypto/x509/#example_ParsePKIXPublicKey
privBlock, _ := pem.Decode([]byte(privPEM))
if privBlock == nil {
panic("failed to parse PEM block containing the public key")
}
requestPathStr := "/database/1/iCloud.<MyContainer>/development/public/users/discover"
var requestPath []byte
requestPath = []byte(requestPathStr)
fmt.Printf("requestPath: %s\n", requestPath)
requestBody := ""
var jsonStr = []byte(requestBody)
//
h := sha256.New()
h.Write([]byte(requestBody))
b := h.Sum(nil)
hashedBody := base64.StdEncoding.EncodeToString(b)
//
f := "2006-01-02T15:04:05Z"
requestDate := time.Now().UTC().Format(f)
fmt.Println(requestDate)
rawPayload := []byte(requestDate + ":" + hashedBody + ":" + requestPathStr)
r, s, err := pkSign(rawPayload, privBlock)
if err != nil {
fmt.Printf("signing hash error: %s\n", err)
}
fmt.Printf("r: %v\n", r)
fmt.Printf("s: %v\n", s)
fmt.Printf("\npublic key:\n")
const pubPEM = `-----BEGIN PUBLIC KEY-----
MyPublicKey
-----END PUBLIC KEY-----`
pubBlock, _ := pem.Decode([]byte(pubPEM))
if pubBlock == nil {
panic("failed to parse PEM block containing the public key")
}
// ECDSA signature
ECDSAsignature := r.Bytes()
ECDSAsignature = append(ECDSAsignature, s.Bytes()...)
fmt.Printf("ECDSAsignature : %x\n", ECDSAsignature)
verify := pkVerify(rawPayload, pubBlock, r, s)
fmt.Printf("signature verification result: %t\n", verify)
// GET [path]/database/[version]/[container]/[environment]/public/users/discover
url := "https://api.apple-cloudkit.com/" + requestPathStr
fmt.Printf("\nurl:%v\n", url)
fmt.Printf("\njsonStr:%s\n", jsonStr)
fmt.Printf("\nrequestDate:%s\n", requestDate)
client := &http.Client{}
// GET [path]/database/[version]/[container]/[environment]/public/users/discover
req, err := http.NewRequest("GET", url, bytes.NewBuffer(jsonStr))
var authKeyID = "MyKeyID"
req.Header.Add("content-type", "text/plain")
req.Header.Add("X-Apple-CloudKit-Request-KeyID", authKeyID)
req.Header.Add("X-Apple-CloudKit-Request-ISO8601Date", requestDate)
ECDSAsignatureBase64 := base64.StdEncoding.EncodeToString(ECDSAsignature)
req.Header.Add("X-Apple-CloudKit-Request-SignatureV1", ECDSAsignatureBase64)
resp, _ := client.Do(req)
fmt.Printf("\nresp:%v\n", resp)
resp, err = client.Do(req)
if err != nil {
fmt.Printf("\nerr:%v\n", err.Error())
} else {
resp.Body.Close()
fmt.Printf("\nresp.Body:%v\n", resp.Body)
}
fmt.Printf("\nresp:%v\n", resp)
}
func pkSign(hash []byte, block *pem.Block) (r, s *big.Int, err error) {
zero := big.NewInt(0)
private_key, err := x509.ParseECPrivateKey(block.Bytes)
if err != nil {
return zero, zero, err
}
// Sign signs a hash (which should be the result of hashing a larger message)
// using the private key, priv.
// If the hash is longer than the bit-length of the private key's curve order,
// the hash will be truncated to that length.
// It returns the signature as a pair of integers.
// The security of the private key depends on the entropy of rand.
r, s, err = ecdsa.Sign(rand.Reader, private_key, hash)
if err != nil {
return zero, zero, err
}
return r, s, nil
}
func pkVerify(hash []byte, block *pem.Block, r *big.Int, s *big.Int) (result bool) {
public_key, err := x509.ParsePKIXPublicKey(block.Bytes)
if err != nil {
return false
}
switch public_key := public_key.(type) {
case *ecdsa.PublicKey:
return ecdsa.Verify(public_key, hash, r, s)
default:
return false
}
}
我得到的错误如下:
resp:&{503服务不可用503 HTTP / 1.1 1 1映射[访问控制公开标题:[X-Apple-Request-UUID通过]连接:[保持有效]内容长度:[0]内容类型:[文本/纯文本]日期:[Mon,24 Jun 2019 07:47:52 GMT]重试后:[30]服务器:[AppleHttpServer / 70a91026]通过:[icloudedge:mi01p00ic-zteu02110401:7401:19RC207 :Miami] X-Apple-Cache:[false] X-Apple-Request-Uuid:[ddeb0fa3-ea16-40e9-a15b-c2e68cb5fe78]] {} 0 []虚假地图[] 0xc00015c000 0xc0000ce2c0}
resp.Body:{}
答案 0 :(得分:0)
如果有人需要,这里是一个可行的解决方案。
package main
import (
"bytes"
"crypto/ecdsa"
"crypto/rand"
"crypto/sha256"
"crypto/x509"
"encoding/asn1"
"encoding/base64"
"encoding/pem"
"fmt"
"io/ioutil"
"math/big"
"net/http"
"time"
)
const projectID = "<your ID>"
//
const authKeyID = "your ID"
const path = "https://api.apple-cloudkit.com"
const version = "1"
const container = "your container"
const environment = "development"
const database = "public"
const privPEM = `-----BEGIN EC PRIVATE KEY-----
your privste key
-----END EC PRIVATE KEY-----`
const pubPEM = `-----BEGIN PUBLIC KEY-----
your public key
-----END PUBLIC KEY-----`
type ecdsaSignature struct {
R, S *big.Int
}
func main() {
t0 := time.Now().UTC()
t1 := time.Now().UTC()
// fmt.Printf("\nprivate key:\n")
// https://golang.org/pkg/crypto/x509/#example_ParsePKIXPublicKey
privBlock, _ := pem.Decode([]byte(privPEM))
if privBlock == nil {
panic("failed to parse PEM block containing the public key")
}
private_key, err := x509.ParseECPrivateKey(privBlock.Bytes)
if err != nil {
panic("failed to parse PEM block containing the public key")
}
pubBlock, _ := pem.Decode([]byte(pubPEM))
if pubBlock == nil {
panic("failed to parse PEM block containing the public key")
}
var public_key *ecdsa.PublicKey
public_k, err := x509.ParsePKIXPublicKey(pubBlock.Bytes)
if err != nil {
panic("failed to parse PEM block containing the public key")
}
switch public_k1 := public_k.(type) {
case *ecdsa.PublicKey:
public_key = public_k1
default:
//return false
}
//////////
// Config
//////////
requestPath := "/database/" +
version + "/" +
container + "/" +
environment + "/" +
database + "/" +
"records/query"
requestBody := `{"query": {"recordType": "<your record type"}}`
f := "2006-01-02T15:04:05Z"
requestDate := time.Now().UTC().Format(f)
h := sha256.New()
h.Write([]byte(requestBody))
b := h.Sum(nil)
hashedBody := base64.StdEncoding.EncodeToString(b)
rawPayload := requestDate + ":" + hashedBody + ":" + requestPath
signedSignature, err := SignMessage(private_key, []byte(rawPayload))
if err != nil {
fmt.Printf("SignMessage error: %s\n", err.Error())
}
verify := VerifyMessage(public_key, []byte(rawPayload), signedSignature)
fmt.Printf("signature verification result: %t\n", verify)
requestSignature := base64.StdEncoding.EncodeToString(signedSignature)
url := path + requestPath
req, err := http.NewRequest("POST", url, bytes.NewBuffer([]byte(requestBody)))
req.Header.Add("content-type", "text/plain")
req.Header.Add("X-Apple-CloudKit-Request-KeyID", authKeyID)
req.Header.Add("X-Apple-CloudKit-Request-ISO8601Date", requestDate)
req.Header.Add("X-Apple-CloudKit-Request-SignatureV1", requestSignature)
resp, err := http.DefaultClient.Do(req)
if err != nil {
fmt.Printf("\nresp.err:%v\n", err.Error())
}
defer resp.Body.Close()
rbody, err := ioutil.ReadAll(resp.Body)
if err != nil {
fmt.Printf("\nioutil.ReadAll.err:%v\n", err.Error())
}
fmt.Printf("\nrbody:%s\n", rbody)
curl := "curl -X POST -H \"content-type: text/plain\"" + " " +
"-H X-Apple-CloudKit-Request-KeyID:" + authKeyID + " " +
"-H X-Apple-CloudKit-Request-ISO8601Date:" + requestDate + " " +
"-H X-Apple-CloudKit-Request-SignatureV1:" + base64.StdEncoding.EncodeToString(signedSignature) + " " +
" -d " + "'" + requestBody + "'" + " " +
url
fmt.Printf("\n%s\n", curl)
}
func SignMessage(priv *ecdsa.PrivateKey, message []byte) ([]byte, error) {
hashed := sha256.Sum256(message)
r, s, err := ecdsa.Sign(rand.Reader, priv, hashed[:])
if err != nil {
return nil, err
}
return asn1.Marshal(ecdsaSignature{r, s})
}
func VerifyMessage(pub *ecdsa.PublicKey, message []byte, signature []byte) bool {
var rs ecdsaSignature
if _, err := asn1.Unmarshal(signature, &rs); err != nil {
return false
}
hashed := sha256.Sum256(message)
return ecdsa.Verify(pub, hashed[:], rs.R, rs.S)
}