jwts.go 7.3 KB

123456789101112131415161718192021222324252627282930313233343536373839404142434445464748495051525354555657585960616263646566676869707172737475767778798081828384858687888990919293949596979899100101102103104105106107108109110111112113114115116117118119120121122123124125126127128129130131132133134135136137138139140141142143144145146147148149150151152153154155156157158159160161162163164165166167168169170171172173174175176177178179180181182183184185186187188189190191192193194195196197198199200201202203204205206207208209210211212213214215216217218219220221222223224225226227228229230231232233234235236237238239240241242243244245246247248249250251252253254255256257258259260261262263264265266267268
  1. package logic
  2. import (
  3. "context"
  4. "crypto/hmac"
  5. "crypto/sha256"
  6. "encoding/hex"
  7. "errors"
  8. "fmt"
  9. "strings"
  10. "time"
  11. "github.com/golang-jwt/jwt/v4"
  12. "github.com/gravitl/netmaker/db"
  13. "github.com/gravitl/netmaker/logger"
  14. "github.com/gravitl/netmaker/models"
  15. "github.com/gravitl/netmaker/schema"
  16. "github.com/gravitl/netmaker/servercfg"
  17. )
  18. var jwtSecretKey []byte
  19. // SetJWTSecret - sets the jwt secret on server startup
  20. func SetJWTSecret() {
  21. currentSecret, jwtErr := FetchJWTSecret()
  22. if jwtErr != nil {
  23. newValue := RandomString(64)
  24. jwtSecretKey = []byte(newValue) // 512 bit random password
  25. if err := StoreJWTSecret(string(jwtSecretKey)); err != nil {
  26. logger.FatalLog("something went wrong when configuring JWT authentication")
  27. }
  28. } else {
  29. jwtSecretKey = []byte(currentSecret)
  30. }
  31. }
  32. // CreateJWT func will used to create the JWT while signing in and signing out
  33. func CreateJWT(uuid string, macAddress string, network string) (response string, err error) {
  34. expirationTime := time.Now().Add(15 * time.Minute)
  35. claims := &models.Claims{
  36. ID: uuid,
  37. Network: network,
  38. MacAddress: macAddress,
  39. RegisteredClaims: jwt.RegisteredClaims{
  40. Issuer: "Netmaker",
  41. Subject: fmt.Sprintf("node|%s", uuid),
  42. IssuedAt: jwt.NewNumericDate(time.Now()),
  43. ExpiresAt: jwt.NewNumericDate(expirationTime),
  44. },
  45. }
  46. token := jwt.NewWithClaims(jwt.SigningMethodHS256, claims)
  47. tokenString, err := token.SignedString(jwtSecretKey)
  48. if err == nil {
  49. return tokenString, nil
  50. }
  51. return "", err
  52. }
  53. // CreateUserJWT - creates a user jwt token
  54. func CreateUserAccessJwtToken(username string, role models.UserRoleID, d time.Time, tokenID string) (response string, err error) {
  55. claims := &models.UserClaims{
  56. UserName: username,
  57. Role: role,
  58. TokenType: models.AccessTokenType,
  59. Api: servercfg.GetAPIHost(),
  60. RegisteredClaims: jwt.RegisteredClaims{
  61. Issuer: "Netmaker",
  62. Subject: fmt.Sprintf("user|%s", username),
  63. IssuedAt: jwt.NewNumericDate(time.Now()),
  64. ExpiresAt: jwt.NewNumericDate(d),
  65. ID: tokenID,
  66. },
  67. }
  68. token := jwt.NewWithClaims(jwt.SigningMethodHS256, claims)
  69. tokenString, err := token.SignedString(jwtSecretKey)
  70. if err == nil {
  71. return tokenString, nil
  72. }
  73. return "", err
  74. }
  75. // CreateUserJWT - creates a user jwt token
  76. func CreateUserJWT(username string, role models.UserRoleID, appName string) (response string, err error) {
  77. duration := GetJwtValidityDuration()
  78. if appName == NetclientApp || appName == NetmakerDesktopApp {
  79. duration = GetJwtValidityDurationForClients()
  80. }
  81. expirationTime := time.Now().Add(duration)
  82. claims := &models.UserClaims{
  83. UserName: username,
  84. Role: role,
  85. TokenType: models.UserIDTokenType,
  86. RegisteredClaims: jwt.RegisteredClaims{
  87. Issuer: "Netmaker",
  88. Subject: fmt.Sprintf("user|%s", username),
  89. IssuedAt: jwt.NewNumericDate(time.Now()),
  90. ExpiresAt: jwt.NewNumericDate(expirationTime),
  91. },
  92. }
  93. token := jwt.NewWithClaims(jwt.SigningMethodHS256, claims)
  94. tokenString, err := token.SignedString(jwtSecretKey)
  95. if err == nil {
  96. return tokenString, nil
  97. }
  98. return "", err
  99. }
  100. // CreatePreAuthToken generate a jwt token to be used as intermediate
  101. // token after primary-factor authentication but before secondary-factor
  102. // authentication.
  103. func CreatePreAuthToken(username string) (string, error) {
  104. token := jwt.NewWithClaims(jwt.SigningMethodHS256, jwt.RegisteredClaims{
  105. Issuer: "Netmaker",
  106. Subject: username,
  107. Audience: []string{"auth:mfa"},
  108. IssuedAt: jwt.NewNumericDate(time.Now()),
  109. ExpiresAt: jwt.NewNumericDate(time.Now().Add(5 * time.Minute)),
  110. })
  111. return token.SignedString(jwtSecretKey)
  112. }
  113. func GenerateOTPAuthURLSignature(url string) string {
  114. signer := hmac.New(sha256.New, jwtSecretKey)
  115. signer.Write([]byte(url))
  116. return hex.EncodeToString(signer.Sum(nil))
  117. }
  118. func VerifyOTPAuthURL(url, signature string) bool {
  119. signatureBytes, err := hex.DecodeString(signature)
  120. if err != nil {
  121. return false
  122. }
  123. signer := hmac.New(sha256.New, jwtSecretKey)
  124. signer.Write([]byte(url))
  125. return hmac.Equal(signatureBytes, signer.Sum(nil))
  126. }
  127. func GetUserNameFromToken(authtoken string) (username string, err error) {
  128. claims := &models.UserClaims{}
  129. var tokenSplit = strings.Split(authtoken, " ")
  130. var tokenString = ""
  131. if len(tokenSplit) < 2 {
  132. return "", Unauthorized_Err
  133. } else {
  134. tokenString = tokenSplit[1]
  135. }
  136. if tokenString == servercfg.GetMasterKey() && servercfg.GetMasterKey() != "" {
  137. return MasterUser, nil
  138. }
  139. token, err := jwt.ParseWithClaims(tokenString, claims, func(token *jwt.Token) (interface{}, error) {
  140. return jwtSecretKey, nil
  141. })
  142. if err != nil {
  143. return "", Unauthorized_Err
  144. }
  145. for _, aud := range claims.Audience {
  146. // token created for mfa cannot be used for
  147. // anything else.
  148. if aud == "auth:mfa" {
  149. return "", Unauthorized_Err
  150. }
  151. }
  152. if claims.TokenType == models.AccessTokenType {
  153. jti := claims.ID
  154. if jti != "" {
  155. a := schema.UserAccessToken{ID: jti}
  156. // check if access token is active
  157. err := a.Get(db.WithContext(context.TODO()))
  158. if err != nil {
  159. err = errors.New("token revoked")
  160. return "", err
  161. }
  162. a.LastUsed = time.Now().UTC()
  163. a.Update(db.WithContext(context.TODO()))
  164. }
  165. }
  166. if token != nil && token.Valid {
  167. var user *models.User
  168. // check that user exists
  169. user, err = GetUser(claims.UserName)
  170. if err != nil {
  171. return "", err
  172. }
  173. if user.UserName != "" {
  174. return user.UserName, nil
  175. }
  176. if user.PlatformRoleID != claims.Role {
  177. return "", Unauthorized_Err
  178. }
  179. err = errors.New("user does not exist")
  180. } else {
  181. err = Unauthorized_Err
  182. }
  183. return "", err
  184. }
  185. // VerifyUserToken func will used to Verify the JWT Token while using APIS
  186. func VerifyUserToken(tokenString string) (username string, issuperadmin, isadmin bool, err error) {
  187. claims := &models.UserClaims{}
  188. if tokenString == servercfg.GetMasterKey() && servercfg.GetMasterKey() != "" {
  189. return MasterUser, true, true, nil
  190. }
  191. token, err := jwt.ParseWithClaims(tokenString, claims, func(token *jwt.Token) (interface{}, error) {
  192. return jwtSecretKey, nil
  193. })
  194. if claims.TokenType == models.AccessTokenType {
  195. jti := claims.ID
  196. if jti != "" {
  197. a := schema.UserAccessToken{ID: jti}
  198. // check if access token is active
  199. err := a.Get(db.WithContext(context.TODO()))
  200. if err != nil {
  201. err = errors.New("token revoked")
  202. return "", false, false, err
  203. }
  204. a.LastUsed = time.Now().UTC()
  205. a.Update(db.WithContext(context.TODO()))
  206. }
  207. }
  208. if token != nil && token.Valid {
  209. var user *models.User
  210. // check that user exists
  211. user, err = GetUser(claims.UserName)
  212. if err != nil {
  213. return "", false, false, err
  214. }
  215. if user.UserName != "" {
  216. return user.UserName, user.PlatformRoleID == models.SuperAdminRole,
  217. user.PlatformRoleID == models.AdminRole, nil
  218. }
  219. err = errors.New("user does not exist")
  220. }
  221. return "", false, false, err
  222. }
  223. // VerifyHostToken - [hosts] Only
  224. func VerifyHostToken(tokenString string) (hostID string, mac string, network string, err error) {
  225. claims := &models.Claims{}
  226. // this may be a stupid way of serving up a master key
  227. // TODO: look into a different method. Encryption?
  228. if tokenString == servercfg.GetMasterKey() && servercfg.GetMasterKey() != "" {
  229. return "mastermac", "", "", nil
  230. }
  231. token, err := jwt.ParseWithClaims(tokenString, claims, func(token *jwt.Token) (interface{}, error) {
  232. return jwtSecretKey, nil
  233. })
  234. if token != nil {
  235. return claims.ID, claims.MacAddress, claims.Network, nil
  236. }
  237. return "", "", "", err
  238. }