portainer/api/jwt/jwt.go

113 lines
3.1 KiB
Go
Raw Normal View History

2016-12-18 05:21:29 +00:00
package jwt
import (
"errors"
portainer "github.com/portainer/portainer/api"
2016-12-18 05:21:29 +00:00
"fmt"
"time"
2016-12-18 05:21:29 +00:00
"github.com/dgrijalva/jwt-go"
"github.com/gorilla/securecookie"
)
// Service represents a service for managing JWT tokens.
type Service struct {
secret []byte
userSessionTimeout time.Duration
2016-12-18 05:21:29 +00:00
}
type claims struct {
UserID int `json:"id"`
Username string `json:"username"`
Role int `json:"role"`
2016-12-18 05:21:29 +00:00
jwt.StandardClaims
}
var (
errSecretGeneration = errors.New("Unable to generate secret key")
errInvalidJWTToken = errors.New("Invalid JWT token")
)
2016-12-18 05:21:29 +00:00
// NewService initializes a new service. It will generate a random key that will be used to sign JWT tokens.
func NewService(userSessionDuration string) (*Service, error) {
userSessionTimeout, err := time.ParseDuration(userSessionDuration)
if err != nil {
return nil, err
}
2016-12-18 05:21:29 +00:00
secret := securecookie.GenerateRandomKey(32)
if secret == nil {
return nil, errSecretGeneration
2016-12-18 05:21:29 +00:00
}
2016-12-18 05:21:29 +00:00
service := &Service{
secret,
userSessionTimeout,
2016-12-18 05:21:29 +00:00
}
return service, nil
}
// GenerateToken generates a new JWT token.
func (service *Service) GenerateToken(data *portainer.TokenData) (string, error) {
return service.generateSignedToken(data, nil)
}
2016-12-18 05:21:29 +00:00
// GenerateTokenForOAuth generates a new JWT for OAuth login
// token expiry time from the OAuth provider is considered
func (service *Service) GenerateTokenForOAuth(data *portainer.TokenData, expiryTime *time.Time) (string, error) {
return service.generateSignedToken(data, expiryTime)
2016-12-18 05:21:29 +00:00
}
// ParseAndVerifyToken parses a JWT token and verify its validity. It returns an error if token is invalid.
func (service *Service) ParseAndVerifyToken(token string) (*portainer.TokenData, error) {
parsedToken, err := jwt.ParseWithClaims(token, &claims{}, func(token *jwt.Token) (interface{}, error) {
2016-12-18 05:21:29 +00:00
if _, ok := token.Method.(*jwt.SigningMethodHMAC); !ok {
msg := fmt.Errorf("Unexpected signing method: %v", token.Header["alg"])
return nil, msg
}
return service.secret, nil
})
if err == nil && parsedToken != nil {
if cl, ok := parsedToken.Claims.(*claims); ok && parsedToken.Valid {
tokenData := &portainer.TokenData{
ID: portainer.UserID(cl.UserID),
Username: cl.Username,
Role: portainer.UserRole(cl.Role),
}
return tokenData, nil
}
2016-12-18 05:21:29 +00:00
}
return nil, errInvalidJWTToken
2016-12-18 05:21:29 +00:00
}
// SetUserSessionDuration sets the user session duration
func (service *Service) SetUserSessionDuration(userSessionDuration time.Duration) {
service.userSessionTimeout = userSessionDuration
}
func (service *Service) generateSignedToken(data *portainer.TokenData, expiryTime *time.Time) (string, error) {
expireToken := time.Now().Add(service.userSessionTimeout).Unix()
if expiryTime != nil && !expiryTime.IsZero() {
expireToken = expiryTime.Unix()
}
cl := claims{
UserID: int(data.ID),
Username: data.Username,
Role: int(data.Role),
StandardClaims: jwt.StandardClaims{
ExpiresAt: expireToken,
},
}
token := jwt.NewWithClaims(jwt.SigningMethodHS256, cl)
signedToken, err := token.SignedString(service.secret)
if err != nil {
return "", err
}
return signedToken, nil
}