cc-backend/internal/auth/jwt.go

171 lines
4.1 KiB
Go
Raw Normal View History

2022-07-07 14:08:37 +02:00
package auth
2022-07-07 12:11:49 +02:00
import (
"crypto/ed25519"
"encoding/base64"
"errors"
"net/http"
"os"
"strings"
2022-07-07 12:48:04 +02:00
"time"
2022-07-07 12:11:49 +02:00
"github.com/ClusterCockpit/cc-backend/pkg/log"
"github.com/golang-jwt/jwt/v4"
)
2022-07-07 14:08:37 +02:00
type JWTAuthConfig struct {
// Specifies for how long a session or JWT shall be valid
// as a string parsable by time.ParseDuration().
MaxAge int64 `json:"max-age"`
}
2022-07-07 12:11:49 +02:00
type JWTAuthenticator struct {
auth *Authentication
publicKey ed25519.PublicKey
privateKey ed25519.PrivateKey
2022-07-07 12:48:04 +02:00
2022-07-07 14:08:37 +02:00
config *JWTAuthConfig
2022-07-07 12:11:49 +02:00
}
var _ Authenticator = (*JWTAuthenticator)(nil)
2022-07-07 14:08:37 +02:00
func (ja *JWTAuthenticator) Init(auth *Authentication, conf interface{}) error {
2022-07-07 12:11:49 +02:00
ja.auth = auth
2022-07-07 14:08:37 +02:00
ja.config = conf.(*JWTAuthConfig)
2022-07-07 12:11:49 +02:00
pubKey, privKey := os.Getenv("JWT_PUBLIC_KEY"), os.Getenv("JWT_PRIVATE_KEY")
if pubKey == "" || privKey == "" {
log.Warn("environment variables 'JWT_PUBLIC_KEY' or 'JWT_PRIVATE_KEY' not set (token based authentication will not work)")
} else {
bytes, err := base64.StdEncoding.DecodeString(pubKey)
if err != nil {
return err
}
ja.publicKey = ed25519.PublicKey(bytes)
bytes, err = base64.StdEncoding.DecodeString(privKey)
if err != nil {
return err
}
ja.privateKey = ed25519.PrivateKey(bytes)
}
return nil
}
func (ja *JWTAuthenticator) CanLogin(user *User, rw http.ResponseWriter, r *http.Request) bool {
2022-07-07 13:40:38 +02:00
return (user != nil && user.AuthSource == AuthViaToken) || r.Header.Get("Authorization") != ""
2022-07-07 12:11:49 +02:00
}
2022-07-07 13:40:38 +02:00
func (ja *JWTAuthenticator) Login(user *User, rw http.ResponseWriter, r *http.Request) (*User, error) {
2022-07-07 12:48:04 +02:00
rawtoken := r.Header.Get("X-Auth-Token")
if rawtoken == "" {
rawtoken = r.Header.Get("Authorization")
rawtoken = strings.TrimPrefix("Bearer ", rawtoken)
}
token, err := jwt.Parse(rawtoken, func(t *jwt.Token) (interface{}, error) {
if t.Method != jwt.SigningMethodEdDSA {
return nil, errors.New("only Ed25519/EdDSA supported")
}
return ja.publicKey, nil
})
if err != nil {
return nil, err
}
if err := token.Claims.Valid(); err != nil {
return nil, err
}
claims := token.Claims.(jwt.MapClaims)
sub, _ := claims["sub"].(string)
exp, _ := claims["exp"].(float64)
var roles []string
if rawroles, ok := claims["roles"].([]interface{}); ok {
for _, rr := range rawroles {
if r, ok := rr.(string); ok {
roles = append(roles, r)
}
}
}
2022-07-07 13:40:38 +02:00
if user == nil {
2022-07-07 12:48:04 +02:00
user = &User{
2022-07-07 13:40:38 +02:00
Username: sub,
2022-07-07 12:48:04 +02:00
Roles: roles,
AuthSource: AuthViaToken,
}
if err := ja.auth.AddUser(user); err != nil {
return nil, err
}
}
user.Expiration = time.Unix(int64(exp), 0)
return user, nil
2022-07-07 12:11:49 +02:00
}
func (ja *JWTAuthenticator) Auth(rw http.ResponseWriter, r *http.Request) (*User, error) {
rawtoken := r.Header.Get("X-Auth-Token")
if rawtoken == "" {
rawtoken = r.Header.Get("Authorization")
2022-07-07 12:48:04 +02:00
rawtoken = strings.TrimPrefix("Bearer ", rawtoken)
}
// Because a user can also log in via a token, the
// session cookie must be checked here as well:
if rawtoken == "" {
2022-07-07 13:40:38 +02:00
return ja.auth.AuthViaSession(rw, r)
2022-07-07 12:11:49 +02:00
}
token, err := jwt.Parse(rawtoken, func(t *jwt.Token) (interface{}, error) {
if t.Method != jwt.SigningMethodEdDSA {
return nil, errors.New("only Ed25519/EdDSA supported")
}
return ja.publicKey, nil
})
if err != nil {
return nil, err
}
if err := token.Claims.Valid(); err != nil {
return nil, err
}
claims := token.Claims.(jwt.MapClaims)
sub, _ := claims["sub"].(string)
var roles []string
if rawroles, ok := claims["roles"].([]interface{}); ok {
for _, rr := range rawroles {
if r, ok := rr.(string); ok {
roles = append(roles, r)
}
}
}
return &User{
Username: sub,
Roles: roles,
AuthSource: AuthViaToken,
}, nil
}
2022-07-07 12:48:04 +02:00
// Generate a new JWT that can be used for authentication
func (ja *JWTAuthenticator) ProvideJWT(user *User) (string, error) {
if ja.privateKey == nil {
return "", errors.New("environment variable 'JWT_PRIVATE_KEY' not set")
}
now := time.Now()
claims := jwt.MapClaims{
"sub": user.Username,
"roles": user.Roles,
"iat": now.Unix(),
}
2022-07-07 14:08:37 +02:00
if ja.config != nil && ja.config.MaxAge != 0 {
claims["exp"] = now.Add(time.Duration(ja.config.MaxAge)).Unix()
2022-07-07 12:48:04 +02:00
}
return jwt.NewWithClaims(jwt.SigningMethodEdDSA, claims).SignedString(ja.privateKey)
}