2018-01-22 03:18:18 +00:00
|
|
|
package main
|
|
|
|
|
|
|
|
import (
|
|
|
|
"crypto"
|
|
|
|
"crypto/md5"
|
|
|
|
"crypto/rand"
|
|
|
|
"crypto/rsa"
|
|
|
|
"crypto/x509"
|
|
|
|
"encoding/hex"
|
|
|
|
"encoding/pem"
|
|
|
|
"flag"
|
2018-01-22 03:44:36 +00:00
|
|
|
"fmt"
|
2018-01-22 03:18:18 +00:00
|
|
|
"log"
|
|
|
|
"net/http"
|
|
|
|
"os"
|
|
|
|
"strconv"
|
|
|
|
"strings"
|
|
|
|
)
|
|
|
|
|
|
|
|
func main() {
|
|
|
|
log.SetOutput(os.Stdout)
|
|
|
|
|
2018-01-22 09:17:38 +00:00
|
|
|
port := flag.Int("p", 21017, "port")
|
2018-01-22 10:41:51 +00:00
|
|
|
host := flag.String("host", "0.0.0.0", "Bind TCP Address")
|
2018-01-22 03:18:18 +00:00
|
|
|
flag.Parse()
|
|
|
|
|
2018-01-23 06:26:22 +00:00
|
|
|
log.Println("*************************************************************")
|
|
|
|
log.Printf("** %-55s**", "JetBrains License Server")
|
|
|
|
log.Printf("** %-55s**", "Please support genuine!!!")
|
|
|
|
log.Printf("** Listen on %-45s**", fmt.Sprintf("%s:%d...", *host, *port))
|
2018-01-22 10:14:27 +00:00
|
|
|
|
2018-01-22 03:44:36 +00:00
|
|
|
addr := fmt.Sprintf("%s:%d", *host, *port)
|
|
|
|
if strings.Contains(addr, "0.0.0.0") {
|
2018-01-22 10:14:27 +00:00
|
|
|
addr = strings.Replace(addr, "0.0.0.0", "", 1)
|
|
|
|
*host = strings.Replace(*host, "0.0.0.0", "127.0.0.1", 1)
|
2018-01-22 03:18:18 +00:00
|
|
|
}
|
|
|
|
|
2018-01-23 06:26:22 +00:00
|
|
|
log.Printf("** You can use %-43s**", fmt.Sprintf("http://%s:%d as license server", *host, *port))
|
|
|
|
log.Println("*************************************************************")
|
2018-01-22 03:44:36 +00:00
|
|
|
|
2018-01-22 03:18:18 +00:00
|
|
|
routerBinding()
|
2018-01-22 03:44:36 +00:00
|
|
|
err := http.ListenAndServe(addr, http.DefaultServeMux)
|
2018-01-22 03:18:18 +00:00
|
|
|
if err != nil {
|
|
|
|
log.Fatalln(err)
|
|
|
|
}
|
|
|
|
}
|
|
|
|
|
|
|
|
func urlMatcher(h http.Handler) http.Handler {
|
|
|
|
return http.HandlerFunc(func(w http.ResponseWriter, r *http.Request) {
|
|
|
|
r.URL.Path = strings.ToLower(r.URL.Path)
|
|
|
|
h.ServeHTTP(w, r)
|
|
|
|
})
|
|
|
|
}
|
|
|
|
|
|
|
|
func routerBinding() {
|
|
|
|
mux := http.NewServeMux()
|
|
|
|
http.Handle("/", urlMatcher(mux))
|
|
|
|
|
|
|
|
mux.HandleFunc("/", index)
|
|
|
|
|
|
|
|
mux.HandleFunc("/rpc/ping.action", ping)
|
|
|
|
|
|
|
|
mux.HandleFunc("/rpc/obtainticket.action", obtainTicket)
|
|
|
|
}
|
|
|
|
|
|
|
|
func index(w http.ResponseWriter, r *http.Request) {
|
|
|
|
w.Write([]byte("Server is starting!"))
|
|
|
|
}
|
|
|
|
|
|
|
|
func ping(w http.ResponseWriter, r *http.Request) {
|
|
|
|
log.Println(r.URL)
|
|
|
|
salt := r.URL.Query().Get("salt")
|
|
|
|
xmlResponse := "<PingResponse><message></message><responseCode>OK</responseCode><salt>" + salt + "</salt></PingResponse>"
|
|
|
|
xmlSignature, _ := signature(xmlResponse)
|
|
|
|
w.Header().Add("Content-Type", "text/xml")
|
|
|
|
w.Write([]byte("<!-- " + xmlSignature + " -->\n" + xmlResponse))
|
|
|
|
}
|
|
|
|
|
|
|
|
func obtainTicket(w http.ResponseWriter, r *http.Request) {
|
2018-01-22 10:14:27 +00:00
|
|
|
// log.Println(r.URL)
|
2018-01-22 10:41:51 +00:00
|
|
|
|
2018-01-22 03:18:18 +00:00
|
|
|
salt := r.URL.Query().Get("salt")
|
|
|
|
username := r.URL.Query().Get("userName")
|
|
|
|
|
|
|
|
if salt == "" || username == "" {
|
|
|
|
w.WriteHeader(http.StatusForbidden)
|
|
|
|
return
|
|
|
|
}
|
|
|
|
|
|
|
|
prolongationPeriod := 607875500
|
|
|
|
|
|
|
|
xmlResponse := "<ObtainTicketResponse><message></message><prolongationPeriod>" + strconv.Itoa(prolongationPeriod) + "</prolongationPeriod><responseCode>OK</responseCode><salt>" + salt + "</salt><ticketId>1</ticketId><ticketProperties>licensee=" + username + "\tlicenseType=0\t</ticketProperties></ObtainTicketResponse>"
|
|
|
|
xmlSignature, _ := signature(xmlResponse)
|
|
|
|
w.Header().Add("Content-Type", "text/xml")
|
|
|
|
w.Write([]byte("<!-- " + xmlSignature + " -->\n" + xmlResponse))
|
|
|
|
}
|
|
|
|
|
2018-01-22 10:48:38 +00:00
|
|
|
var privateKey = []byte(`
|
|
|
|
-----BEGIN RSA PRIVATE KEY-----
|
|
|
|
MIIBOgIBAAJBALecq3BwAI4YJZwhJ+snnDFj3lF3DMqNPorV6y5ZKXCiCMqj8OeOmxk4YZW9aaV9
|
|
|
|
ckl/zlAOI0mpB3pDT+Xlj2sCAwEAAQJAW6/aVD05qbsZHMvZuS2Aa5FpNNj0BDlf38hOtkhDzz/h
|
|
|
|
kYb+EBYLLvldhgsD0OvRNy8yhz7EjaUqLCB0juIN4QIhAOeCQp+NXxfBmfdG/S+XbRUAdv8iHBl+
|
|
|
|
F6O2wr5fA2jzAiEAywlDfGIl6acnakPrmJE0IL8qvuO3FtsHBrpkUuOnXakCIQCqdr+XvADI/UTh
|
|
|
|
TuQepuErFayJMBSAsNe3NFsw0cUxAQIgGA5n7ZPfdBi3BdM4VeJWb87WrLlkVxPqeDSbcGrCyMkC
|
|
|
|
IFSs5JyXvFTreWt7IQjDssrKDRIPmALdNjvfETwlNJyY
|
|
|
|
-----END RSA PRIVATE KEY-----
|
|
|
|
`)
|
2018-01-22 03:18:18 +00:00
|
|
|
|
|
|
|
func signature(message string) (string, error) {
|
2018-01-22 10:48:38 +00:00
|
|
|
// key, err := ioutil.ReadFile("rsa.key")
|
|
|
|
// if err != nil {
|
|
|
|
// return "", err
|
|
|
|
// }
|
|
|
|
// pem, _ := pem.Decode(key)
|
2018-01-22 10:41:51 +00:00
|
|
|
|
2018-01-22 10:48:38 +00:00
|
|
|
pem, _ := pem.Decode([]byte(privateKey))
|
2018-01-22 03:18:18 +00:00
|
|
|
rsaPrivateKey, err := x509.ParsePKCS1PrivateKey(pem.Bytes)
|
|
|
|
|
|
|
|
hashedMessage := md5.Sum([]byte(message))
|
|
|
|
signature, err := rsa.SignPKCS1v15(rand.Reader, rsaPrivateKey, crypto.MD5, hashedMessage[:])
|
|
|
|
if err != nil {
|
|
|
|
return "", err
|
|
|
|
}
|
|
|
|
hexSignature := hex.EncodeToString(signature)
|
|
|
|
return hexSignature, nil
|
|
|
|
}
|