harbor/service/token/authutils.go

244 lines
6.7 KiB
Go
Raw Normal View History

2016-02-01 12:59:10 +01:00
/*
Copyright (c) 2016 VMware, Inc. All Rights Reserved.
Licensed under the Apache License, Version 2.0 (the "License");
you may not use this file except in compliance with the License.
You may obtain a copy of the License at
http://www.apache.org/licenses/LICENSE-2.0
Unless required by applicable law or agreed to in writing, software
distributed under the License is distributed on an "AS IS" BASIS,
WITHOUT WARRANTIES OR CONDITIONS OF ANY KIND, either express or implied.
See the License for the specific language governing permissions and
limitations under the License.
*/
2016-02-26 11:54:14 +01:00
2016-04-15 07:17:32 +02:00
package token
2016-02-01 12:59:10 +01:00
import (
"crypto"
"crypto/rand"
"encoding/base64"
"encoding/json"
"fmt"
2016-08-08 05:21:48 +02:00
"os"
"strconv"
2016-02-01 12:59:10 +01:00
"strings"
"time"
"github.com/vmware/harbor/dao"
2016-03-25 02:31:50 +01:00
"github.com/vmware/harbor/utils/log"
2016-02-01 12:59:10 +01:00
"github.com/docker/distribution/registry/auth/token"
"github.com/docker/libtrust"
)
const (
issuer = "registry-token-issuer"
privateKey = "/etc/ui/private_key.pem"
2016-02-01 12:59:10 +01:00
)
2016-08-08 05:21:48 +02:00
var (
expiration = 30 //minutes
)
func init() {
// TODO read it from config
expi := os.Getenv("TOKEN_EXPIRATION")
if len(expi) != 0 {
i, err := strconv.Atoi(expi)
if err != nil {
log.Errorf("failed to parse token expiration: %v, using default value: %d minutes", err, expiration)
return
}
if i <= 0 {
log.Warningf("invalid token expiration, using default value: %d minutes", expiration)
return
}
expiration = i
}
log.Infof("token expiration: %d minutes", expiration)
}
2016-02-26 11:35:55 +01:00
// GetResourceActions ...
func GetResourceActions(scopes []string) []*token.ResourceActions {
2016-04-29 11:22:17 +02:00
log.Debugf("scopes: %+v", scopes)
2016-02-01 12:59:10 +01:00
var res []*token.ResourceActions
for _, s := range scopes {
if s == "" {
continue
}
items := strings.Split(s, ":")
2016-05-25 11:22:33 +02:00
length := len(items)
typee := items[0]
name := ""
if length > 1 {
name = items[1]
}
actions := []string{}
if length > 2 {
actions = strings.Split(items[2], ",")
}
res = append(res, &token.ResourceActions{
2016-05-25 11:22:33 +02:00
Type: typee,
Name: name,
Actions: actions,
})
2016-02-01 12:59:10 +01:00
}
return res
}
2016-02-26 11:35:55 +01:00
// FilterAccess modify the action list in access based on permission
// determine if the request needs to be authenticated.
2016-02-01 12:59:10 +01:00
func FilterAccess(username string, authenticated bool, a *token.ResourceActions) {
if a.Type == "registry" && a.Name == "catalog" {
2016-04-29 11:22:17 +02:00
log.Infof("current access, type: %s, name:%s, actions:%v \n", a.Type, a.Name, a.Actions)
2016-02-01 12:59:10 +01:00
return
}
//clear action list to assign to new acess element after perm check.
a.Actions = []string{}
if a.Type == "repository" {
if strings.Contains(a.Name, "/") { //Only check the permission when the requested image has a namespace, i.e. project
projectName := a.Name[0:strings.LastIndex(a.Name, "/")]
var permission string
if authenticated {
isAdmin, err := dao.IsAdminRole(username)
if err != nil {
2016-04-05 14:04:29 +02:00
log.Errorf("Error occurred in IsAdminRole: %v", err)
}
if isAdmin {
exist, err := dao.ProjectExists(projectName)
if err != nil {
2016-03-25 02:08:44 +01:00
log.Errorf("Error occurred in CheckExistProject: %v", err)
return
}
if exist {
2016-04-15 07:17:32 +02:00
permission = "RWM"
2016-02-01 12:59:10 +01:00
} else {
permission = ""
2016-03-26 17:18:11 +01:00
log.Infof("project %s does not exist, set empty permission for admin\n", projectName)
}
} else {
permission, err = dao.GetPermission(username, projectName)
if err != nil {
2016-03-25 02:08:44 +01:00
log.Errorf("Error occurred in GetPermission: %v", err)
return
2016-02-01 12:59:10 +01:00
}
}
}
if strings.Contains(permission, "W") {
a.Actions = append(a.Actions, "push")
}
2016-04-15 07:17:32 +02:00
if strings.Contains(permission, "M") {
a.Actions = append(a.Actions, "*")
}
if strings.Contains(permission, "R") || dao.IsProjectPublic(projectName) {
a.Actions = append(a.Actions, "pull")
2016-02-01 12:59:10 +01:00
}
}
}
2016-03-25 02:08:44 +01:00
log.Infof("current access, type: %s, name:%s, actions:%v \n", a.Type, a.Name, a.Actions)
2016-02-01 12:59:10 +01:00
}
2016-02-26 11:35:55 +01:00
// GenTokenForUI is for the UI process to call, so it won't establish a https connection from UI to proxy.
2016-04-29 08:59:00 +02:00
func GenTokenForUI(username string, service string, scopes []string) (token string, expiresIn int, issuedAt *time.Time, err error) {
access := GetResourceActions(scopes)
2016-02-01 12:59:10 +01:00
for _, a := range access {
FilterAccess(username, true, a)
}
return MakeToken(username, service, access)
}
2016-02-26 11:35:55 +01:00
// MakeToken makes a valid jwt token based on parms.
2016-04-29 08:59:00 +02:00
func MakeToken(username, service string, access []*token.ResourceActions) (token string, expiresIn int, issuedAt *time.Time, err error) {
2016-02-01 12:59:10 +01:00
pk, err := libtrust.LoadKeyFile(privateKey)
if err != nil {
2016-04-29 08:59:00 +02:00
return "", 0, nil, err
2016-02-01 12:59:10 +01:00
}
2016-04-29 08:59:00 +02:00
tk, expiresIn, issuedAt, err := makeTokenCore(issuer, username, service, expiration, access, pk)
2016-02-01 12:59:10 +01:00
if err != nil {
2016-04-29 08:59:00 +02:00
return "", 0, nil, err
2016-02-01 12:59:10 +01:00
}
rs := fmt.Sprintf("%s.%s", tk.Raw, base64UrlEncode(tk.Signature))
2016-04-29 08:59:00 +02:00
return rs, expiresIn, issuedAt, nil
2016-02-01 12:59:10 +01:00
}
//make token core
func makeTokenCore(issuer, subject, audience string, expiration int,
2016-04-29 08:59:00 +02:00
access []*token.ResourceActions, signingKey libtrust.PrivateKey) (t *token.Token, expiresIn int, issuedAt *time.Time, err error) {
2016-02-01 12:59:10 +01:00
joseHeader := &token.Header{
Type: "JWT",
SigningAlg: "RS256",
KeyID: signingKey.KeyID(),
}
jwtID, err := randString(16)
if err != nil {
2016-04-29 08:59:00 +02:00
return nil, 0, nil, fmt.Errorf("Error to generate jwt id: %s", err)
2016-02-01 12:59:10 +01:00
}
2016-04-29 08:59:00 +02:00
now := time.Now().UTC()
issuedAt = &now
expiresIn = expiration * 60
2016-02-01 12:59:10 +01:00
claimSet := &token.ClaimSet{
Issuer: issuer,
Subject: subject,
Audience: audience,
Expiration: now.Add(time.Duration(expiration) * time.Minute).Unix(),
NotBefore: now.Unix(),
IssuedAt: now.Unix(),
JWTID: jwtID,
Access: access,
}
var joseHeaderBytes, claimSetBytes []byte
if joseHeaderBytes, err = json.Marshal(joseHeader); err != nil {
2016-04-29 08:59:00 +02:00
return nil, 0, nil, fmt.Errorf("unable to marshal jose header: %s", err)
2016-02-01 12:59:10 +01:00
}
if claimSetBytes, err = json.Marshal(claimSet); err != nil {
2016-04-29 08:59:00 +02:00
return nil, 0, nil, fmt.Errorf("unable to marshal claim set: %s", err)
2016-02-01 12:59:10 +01:00
}
encodedJoseHeader := base64UrlEncode(joseHeaderBytes)
encodedClaimSet := base64UrlEncode(claimSetBytes)
payload := fmt.Sprintf("%s.%s", encodedJoseHeader, encodedClaimSet)
var signatureBytes []byte
if signatureBytes, _, err = signingKey.Sign(strings.NewReader(payload), crypto.SHA256); err != nil {
2016-04-29 08:59:00 +02:00
return nil, 0, nil, fmt.Errorf("unable to sign jwt payload: %s", err)
2016-02-01 12:59:10 +01:00
}
signature := base64UrlEncode(signatureBytes)
tokenString := fmt.Sprintf("%s.%s", payload, signature)
2016-04-29 08:59:00 +02:00
t, err = token.NewToken(tokenString)
return
2016-02-01 12:59:10 +01:00
}
func randString(length int) (string, error) {
const alphanum = "abcdefghijklmnopqrstuvwxyzABCDEFGHIJKLMNOPQRSTUVWXYZ0123456789"
rb := make([]byte, length)
_, err := rand.Read(rb)
if err != nil {
return "", err
}
for i, b := range rb {
rb[i] = alphanum[int(b)%len(alphanum)]
}
return string(rb), nil
}
func base64UrlEncode(b []byte) string {
return strings.TrimRight(base64.URLEncoding.EncodeToString(b), "=")
}