mirror of
				https://github.com/ClusterCockpit/cc-backend
				synced 2025-11-01 00:15:05 +01:00 
			
		
		
		
	
		
			
				
	
	
		
			161 lines
		
	
	
		
			4.4 KiB
		
	
	
	
		
			Go
		
	
	
	
	
	
			
		
		
	
	
			161 lines
		
	
	
		
			4.4 KiB
		
	
	
	
		
			Go
		
	
	
	
	
	
| // Copyright (C) NHR@FAU, University Erlangen-Nuremberg.
 | |
| // All rights reserved. This file is part of cc-backend.
 | |
| // Use of this source code is governed by a MIT-style
 | |
| // license that can be found in the LICENSE file.
 | |
| 
 | |
| package auth
 | |
| 
 | |
| import (
 | |
| 	"crypto/ed25519"
 | |
| 	"encoding/base64"
 | |
| 	"errors"
 | |
| 	"net/http"
 | |
| 	"os"
 | |
| 	"strings"
 | |
| 	"time"
 | |
| 
 | |
| 	"github.com/ClusterCockpit/cc-backend/internal/repository"
 | |
| 	cclog "github.com/ClusterCockpit/cc-lib/ccLogger"
 | |
| 	"github.com/ClusterCockpit/cc-lib/schema"
 | |
| 	"github.com/golang-jwt/jwt/v5"
 | |
| )
 | |
| 
 | |
| type JWTAuthConfig struct {
 | |
| 	// Specifies for how long a JWT token shall be valid
 | |
| 	// as a string parsable by time.ParseDuration().
 | |
| 	MaxAge string `json:"max-age"`
 | |
| 
 | |
| 	// Specifies which cookie should be checked for a JWT token (if no authorization header is present)
 | |
| 	CookieName string `json:"cookieName"`
 | |
| 
 | |
| 	// Deny login for users not in database (but defined in JWT).
 | |
| 	// Ignore user roles defined in JWTs ('roles' claim), get them from db.
 | |
| 	ValidateUser bool `json:"validateUser"`
 | |
| 
 | |
| 	// Specifies which issuer should be accepted when validating external JWTs ('iss' claim)
 | |
| 	TrustedIssuer string `json:"trustedIssuer"`
 | |
| 
 | |
| 	// Should an non-existent user be added to the DB based on the information in the token
 | |
| 	SyncUserOnLogin bool `json:"syncUserOnLogin"`
 | |
| 
 | |
| 	// Should an existent user be updated in the DB based on the information in the token
 | |
| 	UpdateUserOnLogin bool `json:"updateUserOnLogin"`
 | |
| }
 | |
| 
 | |
| type JWTAuthenticator struct {
 | |
| 	publicKey  ed25519.PublicKey
 | |
| 	privateKey ed25519.PrivateKey
 | |
| }
 | |
| 
 | |
| func (ja *JWTAuthenticator) Init() error {
 | |
| 	pubKey, privKey := os.Getenv("JWT_PUBLIC_KEY"), os.Getenv("JWT_PRIVATE_KEY")
 | |
| 	if pubKey == "" || privKey == "" {
 | |
| 		cclog.Warn("environment variables 'JWT_PUBLIC_KEY' or 'JWT_PRIVATE_KEY' not set (token based authentication will not work)")
 | |
| 	} else {
 | |
| 		bytes, err := base64.StdEncoding.DecodeString(pubKey)
 | |
| 		if err != nil {
 | |
| 			cclog.Warn("Could not decode JWT public key")
 | |
| 			return err
 | |
| 		}
 | |
| 		ja.publicKey = ed25519.PublicKey(bytes)
 | |
| 		bytes, err = base64.StdEncoding.DecodeString(privKey)
 | |
| 		if err != nil {
 | |
| 			cclog.Warn("Could not decode JWT private key")
 | |
| 			return err
 | |
| 		}
 | |
| 		ja.privateKey = ed25519.PrivateKey(bytes)
 | |
| 	}
 | |
| 
 | |
| 	return nil
 | |
| }
 | |
| 
 | |
| func (ja *JWTAuthenticator) AuthViaJWT(
 | |
| 	rw http.ResponseWriter,
 | |
| 	r *http.Request,
 | |
| ) (*schema.User, error) {
 | |
| 	rawtoken := r.Header.Get("X-Auth-Token")
 | |
| 	if rawtoken == "" {
 | |
| 		rawtoken = r.Header.Get("Authorization")
 | |
| 		rawtoken = strings.TrimPrefix(rawtoken, "Bearer ")
 | |
| 	}
 | |
| 
 | |
| 	// there is no token
 | |
| 	if rawtoken == "" {
 | |
| 		return nil, nil
 | |
| 	}
 | |
| 
 | |
| 	token, err := jwt.Parse(rawtoken, func(t *jwt.Token) (any, error) {
 | |
| 		if t.Method != jwt.SigningMethodEdDSA {
 | |
| 			return nil, errors.New("only Ed25519/EdDSA supported")
 | |
| 		}
 | |
| 
 | |
| 		return ja.publicKey, nil
 | |
| 	})
 | |
| 	if err != nil {
 | |
| 		cclog.Warn("Error while parsing JWT token")
 | |
| 		return nil, err
 | |
| 	}
 | |
| 	if !token.Valid {
 | |
| 		cclog.Warn("jwt token claims are not valid")
 | |
| 		return nil, errors.New("jwt token claims are not valid")
 | |
| 	}
 | |
| 
 | |
| 	// Token is valid, extract payload
 | |
| 	claims := token.Claims.(jwt.MapClaims)
 | |
| 	sub, _ := claims["sub"].(string)
 | |
| 
 | |
| 	var roles []string
 | |
| 
 | |
| 	// Validate user + roles from JWT against database?
 | |
| 	if Keys.JwtConfig.ValidateUser {
 | |
| 		ur := repository.GetUserRepository()
 | |
| 		user, err := ur.GetUser(sub)
 | |
| 		// Deny any logins for unknown usernames
 | |
| 		if err != nil {
 | |
| 			cclog.Warn("Could not find user from JWT in internal database.")
 | |
| 			return nil, errors.New("unknown user")
 | |
| 		}
 | |
| 		// Take user roles from database instead of trusting the JWT
 | |
| 		roles = user.Roles
 | |
| 	} else {
 | |
| 		// Extract roles from JWT (if present)
 | |
| 		if rawroles, ok := claims["roles"].([]any); ok {
 | |
| 			for _, rr := range rawroles {
 | |
| 				if r, ok := rr.(string); ok {
 | |
| 					roles = append(roles, r)
 | |
| 				}
 | |
| 			}
 | |
| 		}
 | |
| 	}
 | |
| 
 | |
| 	return &schema.User{
 | |
| 		Username:   sub,
 | |
| 		Roles:      roles,
 | |
| 		AuthType:   schema.AuthToken,
 | |
| 		AuthSource: -1,
 | |
| 	}, nil
 | |
| }
 | |
| 
 | |
| // ProvideJWT generates a new JWT that can be used for authentication
 | |
| func (ja *JWTAuthenticator) ProvideJWT(user *schema.User) (string, error) {
 | |
| 	if ja.privateKey == nil {
 | |
| 		return "", errors.New("environment variable 'JWT_PRIVATE_KEY' not set")
 | |
| 	}
 | |
| 
 | |
| 	now := time.Now()
 | |
| 	claims := jwt.MapClaims{
 | |
| 		"sub":   user.Username,
 | |
| 		"roles": user.Roles,
 | |
| 		"iat":   now.Unix(),
 | |
| 	}
 | |
| 	if Keys.JwtConfig.MaxAge != "" {
 | |
| 		d, err := time.ParseDuration(Keys.JwtConfig.MaxAge)
 | |
| 		if err != nil {
 | |
| 			return "", errors.New("cannot parse max-age config key")
 | |
| 		}
 | |
| 		claims["exp"] = now.Add(d).Unix()
 | |
| 	}
 | |
| 
 | |
| 	return jwt.NewWithClaims(jwt.SigningMethodEdDSA, claims).SignedString(ja.privateKey)
 | |
| }
 |