jwts.go 7.2 KB

123456789101112131415161718192021222324252627282930313233343536373839404142434445464748495051525354555657585960616263646566676869707172737475767778798081828384858687888990919293949596979899100101102103104105106107108109110111112113114115116117118119120121122123124125126127128129130131132133134135136137138139140141142143144145146147148149150151152153154155156157158159160161162163164165166167168169170171172173174175176177178179180181182183184185186187188189190191192193194195196197198199200201202203204205206207208209210211212213214215216217218219220221222223224225226227228229230231232233234235236237238239240241242243244245246247248249250251252253254255256257258259260261262263264
  1. package logic
  2. import (
  3. "context"
  4. "crypto/hmac"
  5. "crypto/sha256"
  6. "encoding/hex"
  7. "errors"
  8. "fmt"
  9. "strings"
  10. "time"
  11. "github.com/golang-jwt/jwt/v4"
  12. "github.com/gravitl/netmaker/db"
  13. "github.com/gravitl/netmaker/logger"
  14. "github.com/gravitl/netmaker/models"
  15. "github.com/gravitl/netmaker/schema"
  16. "github.com/gravitl/netmaker/servercfg"
  17. )
  18. var jwtSecretKey []byte
  19. // SetJWTSecret - sets the jwt secret on server startup
  20. func SetJWTSecret() {
  21. currentSecret, jwtErr := FetchJWTSecret()
  22. if jwtErr != nil {
  23. newValue := RandomString(64)
  24. jwtSecretKey = []byte(newValue) // 512 bit random password
  25. if err := StoreJWTSecret(string(jwtSecretKey)); err != nil {
  26. logger.FatalLog("something went wrong when configuring JWT authentication")
  27. }
  28. } else {
  29. jwtSecretKey = []byte(currentSecret)
  30. }
  31. }
  32. // CreateJWT func will used to create the JWT while signing in and signing out
  33. func CreateJWT(uuid string, macAddress string, network string) (response string, err error) {
  34. expirationTime := time.Now().Add(15 * time.Minute)
  35. claims := &models.Claims{
  36. ID: uuid,
  37. Network: network,
  38. MacAddress: macAddress,
  39. RegisteredClaims: jwt.RegisteredClaims{
  40. Issuer: "Netmaker",
  41. Subject: fmt.Sprintf("node|%s", uuid),
  42. IssuedAt: jwt.NewNumericDate(time.Now()),
  43. ExpiresAt: jwt.NewNumericDate(expirationTime),
  44. },
  45. }
  46. token := jwt.NewWithClaims(jwt.SigningMethodHS256, claims)
  47. tokenString, err := token.SignedString(jwtSecretKey)
  48. if err == nil {
  49. return tokenString, nil
  50. }
  51. return "", err
  52. }
  53. // CreateUserJWT - creates a user jwt token
  54. func CreateUserAccessJwtToken(username string, role models.UserRoleID, d time.Time, tokenID string) (response string, err error) {
  55. claims := &models.UserClaims{
  56. UserName: username,
  57. Role: role,
  58. TokenType: models.AccessTokenType,
  59. Api: servercfg.GetAPIHost(),
  60. RegisteredClaims: jwt.RegisteredClaims{
  61. Issuer: "Netmaker",
  62. Subject: fmt.Sprintf("user|%s", username),
  63. IssuedAt: jwt.NewNumericDate(time.Now()),
  64. ExpiresAt: jwt.NewNumericDate(d),
  65. ID: tokenID,
  66. },
  67. }
  68. token := jwt.NewWithClaims(jwt.SigningMethodHS256, claims)
  69. tokenString, err := token.SignedString(jwtSecretKey)
  70. if err == nil {
  71. return tokenString, nil
  72. }
  73. return "", err
  74. }
  75. // CreateUserJWT - creates a user jwt token
  76. func CreateUserJWT(username string, role models.UserRoleID) (response string, err error) {
  77. settings := GetServerSettings()
  78. expirationTime := time.Now().Add(time.Duration(settings.JwtValidityDuration) * time.Minute)
  79. claims := &models.UserClaims{
  80. UserName: username,
  81. Role: role,
  82. TokenType: models.UserIDTokenType,
  83. RegisteredClaims: jwt.RegisteredClaims{
  84. Issuer: "Netmaker",
  85. Subject: fmt.Sprintf("user|%s", username),
  86. IssuedAt: jwt.NewNumericDate(time.Now()),
  87. ExpiresAt: jwt.NewNumericDate(expirationTime),
  88. },
  89. }
  90. token := jwt.NewWithClaims(jwt.SigningMethodHS256, claims)
  91. tokenString, err := token.SignedString(jwtSecretKey)
  92. if err == nil {
  93. return tokenString, nil
  94. }
  95. return "", err
  96. }
  97. // CreatePreAuthToken generate a jwt token to be used as intermediate
  98. // token after primary-factor authentication but before secondary-factor
  99. // authentication.
  100. func CreatePreAuthToken(username string) (string, error) {
  101. token := jwt.NewWithClaims(jwt.SigningMethodHS256, jwt.RegisteredClaims{
  102. Issuer: "Netmaker",
  103. Subject: username,
  104. Audience: []string{"auth:mfa"},
  105. IssuedAt: jwt.NewNumericDate(time.Now()),
  106. ExpiresAt: jwt.NewNumericDate(time.Now().Add(5 * time.Minute)),
  107. })
  108. return token.SignedString(jwtSecretKey)
  109. }
  110. func GenerateOTPAuthURLSignature(url string) string {
  111. signer := hmac.New(sha256.New, jwtSecretKey)
  112. signer.Write([]byte(url))
  113. return hex.EncodeToString(signer.Sum(nil))
  114. }
  115. func VerifyOTPAuthURL(url, signature string) bool {
  116. signatureBytes, err := hex.DecodeString(signature)
  117. if err != nil {
  118. return false
  119. }
  120. signer := hmac.New(sha256.New, jwtSecretKey)
  121. signer.Write([]byte(url))
  122. return hmac.Equal(signatureBytes, signer.Sum(nil))
  123. }
  124. func GetUserNameFromToken(authtoken string) (username string, err error) {
  125. claims := &models.UserClaims{}
  126. var tokenSplit = strings.Split(authtoken, " ")
  127. var tokenString = ""
  128. if len(tokenSplit) < 2 {
  129. return "", Unauthorized_Err
  130. } else {
  131. tokenString = tokenSplit[1]
  132. }
  133. if tokenString == servercfg.GetMasterKey() && servercfg.GetMasterKey() != "" {
  134. return MasterUser, nil
  135. }
  136. token, err := jwt.ParseWithClaims(tokenString, claims, func(token *jwt.Token) (interface{}, error) {
  137. return jwtSecretKey, nil
  138. })
  139. if err != nil {
  140. return "", Unauthorized_Err
  141. }
  142. for _, aud := range claims.Audience {
  143. // token created for mfa cannot be used for
  144. // anything else.
  145. if aud == "auth:mfa" {
  146. return "", Unauthorized_Err
  147. }
  148. }
  149. if claims.TokenType == models.AccessTokenType {
  150. jti := claims.ID
  151. if jti != "" {
  152. a := schema.UserAccessToken{ID: jti}
  153. // check if access token is active
  154. err := a.Get(db.WithContext(context.TODO()))
  155. if err != nil {
  156. err = errors.New("token revoked")
  157. return "", err
  158. }
  159. a.LastUsed = time.Now().UTC()
  160. a.Update(db.WithContext(context.TODO()))
  161. }
  162. }
  163. if token != nil && token.Valid {
  164. var user *models.User
  165. // check that user exists
  166. user, err = GetUser(claims.UserName)
  167. if err != nil {
  168. return "", err
  169. }
  170. if user.UserName != "" {
  171. return user.UserName, nil
  172. }
  173. if user.PlatformRoleID != claims.Role {
  174. return "", Unauthorized_Err
  175. }
  176. err = errors.New("user does not exist")
  177. } else {
  178. err = Unauthorized_Err
  179. }
  180. return "", err
  181. }
  182. // VerifyUserToken func will used to Verify the JWT Token while using APIS
  183. func VerifyUserToken(tokenString string) (username string, issuperadmin, isadmin bool, err error) {
  184. claims := &models.UserClaims{}
  185. if tokenString == servercfg.GetMasterKey() && servercfg.GetMasterKey() != "" {
  186. return MasterUser, true, true, nil
  187. }
  188. token, err := jwt.ParseWithClaims(tokenString, claims, func(token *jwt.Token) (interface{}, error) {
  189. return jwtSecretKey, nil
  190. })
  191. if claims.TokenType == models.AccessTokenType {
  192. jti := claims.ID
  193. if jti != "" {
  194. a := schema.UserAccessToken{ID: jti}
  195. // check if access token is active
  196. err := a.Get(db.WithContext(context.TODO()))
  197. if err != nil {
  198. err = errors.New("token revoked")
  199. return "", false, false, err
  200. }
  201. a.LastUsed = time.Now().UTC()
  202. a.Update(db.WithContext(context.TODO()))
  203. }
  204. }
  205. if token != nil && token.Valid {
  206. var user *models.User
  207. // check that user exists
  208. user, err = GetUser(claims.UserName)
  209. if err != nil {
  210. return "", false, false, err
  211. }
  212. if user.UserName != "" {
  213. return user.UserName, user.PlatformRoleID == models.SuperAdminRole,
  214. user.PlatformRoleID == models.AdminRole, nil
  215. }
  216. err = errors.New("user does not exist")
  217. }
  218. return "", false, false, err
  219. }
  220. // VerifyHostToken - [hosts] Only
  221. func VerifyHostToken(tokenString string) (hostID string, mac string, network string, err error) {
  222. claims := &models.Claims{}
  223. // this may be a stupid way of serving up a master key
  224. // TODO: look into a different method. Encryption?
  225. if tokenString == servercfg.GetMasterKey() && servercfg.GetMasterKey() != "" {
  226. return "mastermac", "", "", nil
  227. }
  228. token, err := jwt.ParseWithClaims(tokenString, claims, func(token *jwt.Token) (interface{}, error) {
  229. return jwtSecretKey, nil
  230. })
  231. if token != nil {
  232. return claims.ID, claims.MacAddress, claims.Network, nil
  233. }
  234. return "", "", "", err
  235. }