forked from TrueCloudLab/distribution
c3b07952ad
Signed-off-by: Stephen J Day <stephen.day@docker.com>
343 lines
9.9 KiB
Go
343 lines
9.9 KiB
Go
package token
|
|
|
|
import (
|
|
"crypto"
|
|
"crypto/x509"
|
|
"encoding/base64"
|
|
"encoding/json"
|
|
"errors"
|
|
"fmt"
|
|
"strings"
|
|
"time"
|
|
|
|
log "github.com/Sirupsen/logrus"
|
|
"github.com/docker/libtrust"
|
|
|
|
"github.com/docker/distribution/registry/auth"
|
|
)
|
|
|
|
const (
|
|
// TokenSeparator is the value which separates the header, claims, and
|
|
// signature in the compact serialization of a JSON Web Token.
|
|
TokenSeparator = "."
|
|
)
|
|
|
|
// Errors used by token parsing and verification.
|
|
var (
|
|
ErrMalformedToken = errors.New("malformed token")
|
|
ErrInvalidToken = errors.New("invalid token")
|
|
)
|
|
|
|
// ResourceActions stores allowed actions on a named and typed resource.
|
|
type ResourceActions struct {
|
|
Type string `json:"type"`
|
|
Name string `json:"name"`
|
|
Actions []string `json:"actions"`
|
|
}
|
|
|
|
// ClaimSet describes the main section of a JSON Web Token.
|
|
type ClaimSet struct {
|
|
// Public claims
|
|
Issuer string `json:"iss"`
|
|
Subject string `json:"sub"`
|
|
Audience string `json:"aud"`
|
|
Expiration int64 `json:"exp"`
|
|
NotBefore int64 `json:"nbf"`
|
|
IssuedAt int64 `json:"iat"`
|
|
JWTID string `json:"jti"`
|
|
|
|
// Private claims
|
|
Access []*ResourceActions `json:"access"`
|
|
}
|
|
|
|
// Header describes the header section of a JSON Web Token.
|
|
type Header struct {
|
|
Type string `json:"typ"`
|
|
SigningAlg string `json:"alg"`
|
|
KeyID string `json:"kid,omitempty"`
|
|
X5c []string `json:"x5c,omitempty"`
|
|
RawJWK json.RawMessage `json:"jwk,omitempty"`
|
|
}
|
|
|
|
// Token describes a JSON Web Token.
|
|
type Token struct {
|
|
Raw string
|
|
Header *Header
|
|
Claims *ClaimSet
|
|
Signature []byte
|
|
}
|
|
|
|
// VerifyOptions is used to specify
|
|
// options when verifying a JSON Web Token.
|
|
type VerifyOptions struct {
|
|
TrustedIssuers []string
|
|
AcceptedAudiences []string
|
|
Roots *x509.CertPool
|
|
TrustedKeys map[string]libtrust.PublicKey
|
|
}
|
|
|
|
// NewToken parses the given raw token string
|
|
// and constructs an unverified JSON Web Token.
|
|
func NewToken(rawToken string) (*Token, error) {
|
|
parts := strings.Split(rawToken, TokenSeparator)
|
|
if len(parts) != 3 {
|
|
return nil, ErrMalformedToken
|
|
}
|
|
|
|
var (
|
|
rawHeader, rawClaims = parts[0], parts[1]
|
|
headerJSON, claimsJSON []byte
|
|
err error
|
|
)
|
|
|
|
defer func() {
|
|
if err != nil {
|
|
log.Errorf("error while unmarshalling raw token: %s", err)
|
|
}
|
|
}()
|
|
|
|
if headerJSON, err = joseBase64UrlDecode(rawHeader); err != nil {
|
|
err = fmt.Errorf("unable to decode header: %s", err)
|
|
return nil, ErrMalformedToken
|
|
}
|
|
|
|
if claimsJSON, err = joseBase64UrlDecode(rawClaims); err != nil {
|
|
err = fmt.Errorf("unable to decode claims: %s", err)
|
|
return nil, ErrMalformedToken
|
|
}
|
|
|
|
token := new(Token)
|
|
token.Header = new(Header)
|
|
token.Claims = new(ClaimSet)
|
|
|
|
token.Raw = strings.Join(parts[:2], TokenSeparator)
|
|
if token.Signature, err = joseBase64UrlDecode(parts[2]); err != nil {
|
|
err = fmt.Errorf("unable to decode signature: %s", err)
|
|
return nil, ErrMalformedToken
|
|
}
|
|
|
|
if err = json.Unmarshal(headerJSON, token.Header); err != nil {
|
|
return nil, ErrMalformedToken
|
|
}
|
|
|
|
if err = json.Unmarshal(claimsJSON, token.Claims); err != nil {
|
|
return nil, ErrMalformedToken
|
|
}
|
|
|
|
return token, nil
|
|
}
|
|
|
|
// Verify attempts to verify this token using the given options.
|
|
// Returns a nil error if the token is valid.
|
|
func (t *Token) Verify(verifyOpts VerifyOptions) error {
|
|
// Verify that the Issuer claim is a trusted authority.
|
|
if !contains(verifyOpts.TrustedIssuers, t.Claims.Issuer) {
|
|
log.Errorf("token from untrusted issuer: %q", t.Claims.Issuer)
|
|
return ErrInvalidToken
|
|
}
|
|
|
|
// Verify that the Audience claim is allowed.
|
|
if !contains(verifyOpts.AcceptedAudiences, t.Claims.Audience) {
|
|
log.Errorf("token intended for another audience: %q", t.Claims.Audience)
|
|
return ErrInvalidToken
|
|
}
|
|
|
|
// Verify that the token is currently usable and not expired.
|
|
currentUnixTime := time.Now().Unix()
|
|
if !(t.Claims.NotBefore <= currentUnixTime && currentUnixTime <= t.Claims.Expiration) {
|
|
log.Errorf("token not to be used before %d or after %d - currently %d", t.Claims.NotBefore, t.Claims.Expiration, currentUnixTime)
|
|
return ErrInvalidToken
|
|
}
|
|
|
|
// Verify the token signature.
|
|
if len(t.Signature) == 0 {
|
|
log.Error("token has no signature")
|
|
return ErrInvalidToken
|
|
}
|
|
|
|
// Verify that the signing key is trusted.
|
|
signingKey, err := t.VerifySigningKey(verifyOpts)
|
|
if err != nil {
|
|
log.Error(err)
|
|
return ErrInvalidToken
|
|
}
|
|
|
|
// Finally, verify the signature of the token using the key which signed it.
|
|
if err := signingKey.Verify(strings.NewReader(t.Raw), t.Header.SigningAlg, t.Signature); err != nil {
|
|
log.Errorf("unable to verify token signature: %s", err)
|
|
return ErrInvalidToken
|
|
}
|
|
|
|
return nil
|
|
}
|
|
|
|
// VerifySigningKey attempts to get the key which was used to sign this token.
|
|
// The token header should contain either of these 3 fields:
|
|
// `x5c` - The x509 certificate chain for the signing key. Needs to be
|
|
// verified.
|
|
// `jwk` - The JSON Web Key representation of the signing key.
|
|
// May contain its own `x5c` field which needs to be verified.
|
|
// `kid` - The unique identifier for the key. This library interprets it
|
|
// as a libtrust fingerprint. The key itself can be looked up in
|
|
// the trustedKeys field of the given verify options.
|
|
// Each of these methods are tried in that order of preference until the
|
|
// signing key is found or an error is returned.
|
|
func (t *Token) VerifySigningKey(verifyOpts VerifyOptions) (signingKey libtrust.PublicKey, err error) {
|
|
// First attempt to get an x509 certificate chain from the header.
|
|
var (
|
|
x5c = t.Header.X5c
|
|
rawJWK = t.Header.RawJWK
|
|
keyID = t.Header.KeyID
|
|
)
|
|
|
|
switch {
|
|
case len(x5c) > 0:
|
|
signingKey, err = parseAndVerifyCertChain(x5c, verifyOpts.Roots)
|
|
case len(rawJWK) > 0:
|
|
signingKey, err = parseAndVerifyRawJWK(rawJWK, verifyOpts)
|
|
case len(keyID) > 0:
|
|
signingKey = verifyOpts.TrustedKeys[keyID]
|
|
if signingKey == nil {
|
|
err = fmt.Errorf("token signed by untrusted key with ID: %q", keyID)
|
|
}
|
|
default:
|
|
err = errors.New("unable to get token signing key")
|
|
}
|
|
|
|
return
|
|
}
|
|
|
|
func parseAndVerifyCertChain(x5c []string, roots *x509.CertPool) (leafKey libtrust.PublicKey, err error) {
|
|
if len(x5c) == 0 {
|
|
return nil, errors.New("empty x509 certificate chain")
|
|
}
|
|
|
|
// Ensure the first element is encoded correctly.
|
|
leafCertDer, err := base64.StdEncoding.DecodeString(x5c[0])
|
|
if err != nil {
|
|
return nil, fmt.Errorf("unable to decode leaf certificate: %s", err)
|
|
}
|
|
|
|
// And that it is a valid x509 certificate.
|
|
leafCert, err := x509.ParseCertificate(leafCertDer)
|
|
if err != nil {
|
|
return nil, fmt.Errorf("unable to parse leaf certificate: %s", err)
|
|
}
|
|
|
|
// The rest of the certificate chain are intermediate certificates.
|
|
intermediates := x509.NewCertPool()
|
|
for i := 1; i < len(x5c); i++ {
|
|
intermediateCertDer, err := base64.StdEncoding.DecodeString(x5c[i])
|
|
if err != nil {
|
|
return nil, fmt.Errorf("unable to decode intermediate certificate: %s", err)
|
|
}
|
|
|
|
intermediateCert, err := x509.ParseCertificate(intermediateCertDer)
|
|
if err != nil {
|
|
return nil, fmt.Errorf("unable to parse intermediate certificate: %s", err)
|
|
}
|
|
|
|
intermediates.AddCert(intermediateCert)
|
|
}
|
|
|
|
verifyOpts := x509.VerifyOptions{
|
|
Intermediates: intermediates,
|
|
Roots: roots,
|
|
KeyUsages: []x509.ExtKeyUsage{x509.ExtKeyUsageAny},
|
|
}
|
|
|
|
// TODO: this call returns certificate chains which we ignore for now, but
|
|
// we should check them for revocations if we have the ability later.
|
|
if _, err = leafCert.Verify(verifyOpts); err != nil {
|
|
return nil, fmt.Errorf("unable to verify certificate chain: %s", err)
|
|
}
|
|
|
|
// Get the public key from the leaf certificate.
|
|
leafCryptoKey, ok := leafCert.PublicKey.(crypto.PublicKey)
|
|
if !ok {
|
|
return nil, errors.New("unable to get leaf cert public key value")
|
|
}
|
|
|
|
leafKey, err = libtrust.FromCryptoPublicKey(leafCryptoKey)
|
|
if err != nil {
|
|
return nil, fmt.Errorf("unable to make libtrust public key from leaf certificate: %s", err)
|
|
}
|
|
|
|
return
|
|
}
|
|
|
|
func parseAndVerifyRawJWK(rawJWK json.RawMessage, verifyOpts VerifyOptions) (pubKey libtrust.PublicKey, err error) {
|
|
pubKey, err = libtrust.UnmarshalPublicKeyJWK([]byte(rawJWK))
|
|
if err != nil {
|
|
return nil, fmt.Errorf("unable to decode raw JWK value: %s", err)
|
|
}
|
|
|
|
// Check to see if the key includes a certificate chain.
|
|
x5cVal, ok := pubKey.GetExtendedField("x5c").([]interface{})
|
|
if !ok {
|
|
// The JWK should be one of the trusted root keys.
|
|
if _, trusted := verifyOpts.TrustedKeys[pubKey.KeyID()]; !trusted {
|
|
return nil, errors.New("untrusted JWK with no certificate chain")
|
|
}
|
|
|
|
// The JWK is one of the trusted keys.
|
|
return
|
|
}
|
|
|
|
// Ensure each item in the chain is of the correct type.
|
|
x5c := make([]string, len(x5cVal))
|
|
for i, val := range x5cVal {
|
|
certString, ok := val.(string)
|
|
if !ok || len(certString) == 0 {
|
|
return nil, errors.New("malformed certificate chain")
|
|
}
|
|
x5c[i] = certString
|
|
}
|
|
|
|
// Ensure that the x509 certificate chain can
|
|
// be verified up to one of our trusted roots.
|
|
leafKey, err := parseAndVerifyCertChain(x5c, verifyOpts.Roots)
|
|
if err != nil {
|
|
return nil, fmt.Errorf("could not verify JWK certificate chain: %s", err)
|
|
}
|
|
|
|
// Verify that the public key in the leaf cert *is* the signing key.
|
|
if pubKey.KeyID() != leafKey.KeyID() {
|
|
return nil, errors.New("leaf certificate public key ID does not match JWK key ID")
|
|
}
|
|
|
|
return
|
|
}
|
|
|
|
// accessSet returns a set of actions available for the resource
|
|
// actions listed in the `access` section of this token.
|
|
func (t *Token) accessSet() accessSet {
|
|
if t.Claims == nil {
|
|
return nil
|
|
}
|
|
|
|
accessSet := make(accessSet, len(t.Claims.Access))
|
|
|
|
for _, resourceActions := range t.Claims.Access {
|
|
resource := auth.Resource{
|
|
Type: resourceActions.Type,
|
|
Name: resourceActions.Name,
|
|
}
|
|
|
|
set, exists := accessSet[resource]
|
|
if !exists {
|
|
set = newActionSet()
|
|
accessSet[resource] = set
|
|
}
|
|
|
|
for _, action := range resourceActions.Actions {
|
|
set.add(action)
|
|
}
|
|
}
|
|
|
|
return accessSet
|
|
}
|
|
|
|
func (t *Token) compactRaw() string {
|
|
return fmt.Sprintf("%s.%s", t.Raw, joseBase64UrlEncode(t.Signature))
|
|
}
|