forked from TrueCloudLab/distribution
fe21f43911
docker/libtrust repository has been archived for several years now. This commit replaces all the libtrust JWT machinery with go-jose/go-jose module. Some of the code has been adopted from libtrust and adjusted for some of the use cases covered by the token authorization flow especially in the tests. Signed-off-by: Milos Gajdos <milosthegajdos@gmail.com>
276 lines
7.8 KiB
Go
276 lines
7.8 KiB
Go
package token
|
|
|
|
import (
|
|
"crypto"
|
|
"crypto/x509"
|
|
"errors"
|
|
"fmt"
|
|
"time"
|
|
|
|
"github.com/go-jose/go-jose/v3"
|
|
"github.com/go-jose/go-jose/v3/jwt"
|
|
log "github.com/sirupsen/logrus"
|
|
|
|
"github.com/distribution/distribution/v3/registry/auth"
|
|
)
|
|
|
|
const (
|
|
// TokenSeparator is the value which separates the header, claims, and
|
|
// signature in the compact serialization of a JSON Web Token.
|
|
TokenSeparator = "."
|
|
// Leeway is the Duration that will be added to NBF and EXP claim
|
|
// checks to account for clock skew as per https://tools.ietf.org/html/rfc7519#section-4.1.5
|
|
Leeway = 60 * time.Second
|
|
)
|
|
|
|
// Errors used by token parsing and verification.
|
|
var (
|
|
ErrMalformedToken = errors.New("malformed token")
|
|
ErrInvalidToken = errors.New("invalid token")
|
|
)
|
|
|
|
// ResourceActions stores allowed actions on a named and typed resource.
|
|
type ResourceActions struct {
|
|
Type string `json:"type"`
|
|
Class string `json:"class,omitempty"`
|
|
Name string `json:"name"`
|
|
Actions []string `json:"actions"`
|
|
}
|
|
|
|
// ClaimSet describes the main section of a JSON Web Token.
|
|
type ClaimSet struct {
|
|
// Public claims
|
|
Issuer string `json:"iss"`
|
|
Subject string `json:"sub"`
|
|
Audience AudienceList `json:"aud"`
|
|
Expiration int64 `json:"exp"`
|
|
NotBefore int64 `json:"nbf"`
|
|
IssuedAt int64 `json:"iat"`
|
|
JWTID string `json:"jti"`
|
|
|
|
// Private claims
|
|
Access []*ResourceActions `json:"access"`
|
|
}
|
|
|
|
// Token is a JSON Web Token.
|
|
type Token struct {
|
|
Raw string
|
|
JWT *jwt.JSONWebToken
|
|
}
|
|
|
|
// VerifyOptions is used to specify
|
|
// options when verifying a JSON Web Token.
|
|
type VerifyOptions struct {
|
|
TrustedIssuers []string
|
|
AcceptedAudiences []string
|
|
Roots *x509.CertPool
|
|
TrustedKeys map[string]crypto.PublicKey
|
|
}
|
|
|
|
// NewToken parses the given raw token string
|
|
// and constructs an unverified JSON Web Token.
|
|
func NewToken(rawToken string) (*Token, error) {
|
|
token, err := jwt.ParseSigned(rawToken)
|
|
if err != nil {
|
|
return nil, ErrMalformedToken
|
|
}
|
|
|
|
return &Token{
|
|
Raw: rawToken,
|
|
JWT: token,
|
|
}, nil
|
|
}
|
|
|
|
// Verify attempts to verify this token using the given options.
|
|
// Returns a nil error if the token is valid.
|
|
func (t *Token) Verify(verifyOpts VerifyOptions) (*ClaimSet, error) {
|
|
// Verify that the signing key is trusted.
|
|
signingKey, err := t.VerifySigningKey(verifyOpts)
|
|
if err != nil {
|
|
log.Infof("failed to verify token: %v", err)
|
|
return nil, ErrInvalidToken
|
|
}
|
|
|
|
// NOTE(milosgajdos): Claims both verifies the signature
|
|
// and returns the claims within the payload
|
|
var claims ClaimSet
|
|
err = t.JWT.Claims(signingKey, &claims)
|
|
if err != nil {
|
|
return nil, err
|
|
}
|
|
|
|
// Verify that the Issuer claim is a trusted authority.
|
|
if !contains(verifyOpts.TrustedIssuers, claims.Issuer) {
|
|
log.Infof("token from untrusted issuer: %q", claims.Issuer)
|
|
return nil, ErrInvalidToken
|
|
}
|
|
|
|
// Verify that the Audience claim is allowed.
|
|
if !containsAny(verifyOpts.AcceptedAudiences, claims.Audience) {
|
|
log.Infof("token intended for another audience: %v", claims.Audience)
|
|
return nil, ErrInvalidToken
|
|
}
|
|
|
|
// Verify that the token is currently usable and not expired.
|
|
currentTime := time.Now()
|
|
|
|
ExpWithLeeway := time.Unix(claims.Expiration, 0).Add(Leeway)
|
|
if currentTime.After(ExpWithLeeway) {
|
|
log.Infof("token not to be used after %s - currently %s", ExpWithLeeway, currentTime)
|
|
return nil, ErrInvalidToken
|
|
}
|
|
|
|
NotBeforeWithLeeway := time.Unix(claims.NotBefore, 0).Add(-Leeway)
|
|
if currentTime.Before(NotBeforeWithLeeway) {
|
|
log.Infof("token not to be used before %s - currently %s", NotBeforeWithLeeway, currentTime)
|
|
return nil, ErrInvalidToken
|
|
}
|
|
|
|
return &claims, nil
|
|
}
|
|
|
|
// VerifySigningKey attempts to verify and return the signing key which was used to sign the token.
|
|
func (t *Token) VerifySigningKey(verifyOpts VerifyOptions) (signingKey crypto.PublicKey, err error) {
|
|
if len(t.JWT.Headers) == 0 {
|
|
return nil, ErrInvalidToken
|
|
}
|
|
|
|
// NOTE(milosgajdos): docker auth spec does not seem to
|
|
// support tokens signed by multiple signatures so we are
|
|
// verifying the first one in the list only at the moment.
|
|
header := t.JWT.Headers[0]
|
|
|
|
switch {
|
|
case header.JSONWebKey != nil:
|
|
signingKey, err = verifyJWK(header, verifyOpts)
|
|
case len(header.KeyID) > 0:
|
|
signingKey = verifyOpts.TrustedKeys[header.KeyID]
|
|
if signingKey == nil {
|
|
err = fmt.Errorf("token signed by untrusted key with ID: %q", header.KeyID)
|
|
}
|
|
default:
|
|
signingKey, err = verifyCertChain(header, verifyOpts.Roots)
|
|
}
|
|
|
|
return
|
|
}
|
|
|
|
func verifyCertChain(header jose.Header, roots *x509.CertPool) (signingKey crypto.PublicKey, err error) {
|
|
verifyOpts := x509.VerifyOptions{
|
|
Roots: roots,
|
|
KeyUsages: []x509.ExtKeyUsage{x509.ExtKeyUsageAny},
|
|
}
|
|
|
|
// TODO: this call returns certificate chains which we ignore for now, but
|
|
// we should check them for revocations if we have the ability later.
|
|
chains, err := header.Certificates(verifyOpts)
|
|
if err != nil {
|
|
return nil, err
|
|
}
|
|
signingKey = getCertPubKey(chains)
|
|
|
|
return
|
|
}
|
|
|
|
func verifyJWK(header jose.Header, verifyOpts VerifyOptions) (signingKey crypto.PublicKey, err error) {
|
|
jwk := header.JSONWebKey
|
|
signingKey = jwk.Key
|
|
|
|
// Check to see if the key includes a certificate chain.
|
|
if len(jwk.Certificates) == 0 {
|
|
// The JWK should be one of the trusted root keys.
|
|
if _, trusted := verifyOpts.TrustedKeys[jwk.KeyID]; !trusted {
|
|
return nil, errors.New("untrusted JWK with no certificate chain")
|
|
}
|
|
// The JWK is one of the trusted keys.
|
|
return
|
|
}
|
|
|
|
opts := x509.VerifyOptions{
|
|
Roots: verifyOpts.Roots,
|
|
KeyUsages: []x509.ExtKeyUsage{x509.ExtKeyUsageAny},
|
|
}
|
|
|
|
leaf := jwk.Certificates[0]
|
|
if opts.Intermediates == nil {
|
|
opts.Intermediates = x509.NewCertPool()
|
|
for _, intermediate := range jwk.Certificates[1:] {
|
|
opts.Intermediates.AddCert(intermediate)
|
|
}
|
|
}
|
|
|
|
// TODO: this call returns certificate chains which we ignore for now, but
|
|
// we should check them for revocations if we have the ability later.
|
|
chains, err := leaf.Verify(opts)
|
|
if err != nil {
|
|
return nil, err
|
|
}
|
|
signingKey = getCertPubKey(chains)
|
|
|
|
return
|
|
}
|
|
|
|
func getCertPubKey(chains [][]*x509.Certificate) crypto.PublicKey {
|
|
// NOTE(milosgajdos): if there are no certificates
|
|
// header.Certificates call above returns error, so we are
|
|
// guaranteed to get at least one certificate chain.
|
|
// We pick the leaf certificate chain.
|
|
chain := chains[0]
|
|
|
|
// NOTE(milosgajdos): header.Certificates call returns the result
|
|
// of leafCert.Verify which is a call to x509.Certificate.Verify.
|
|
// If successful, it returns one or more chains where the first
|
|
// element of the chain is x5c and the last element is from opts.Roots.
|
|
// See: https://pkg.go.dev/crypto/x509#Certificate.Verify
|
|
cert := chain[0]
|
|
|
|
// NOTE: we dont have to verify that the public key in the leaf cert
|
|
// *is* the signing key: if it's not the signing then token claims
|
|
// verifcation with this key fails
|
|
return cert.PublicKey.(crypto.PublicKey)
|
|
}
|
|
|
|
// accessSet returns a set of actions available for the resource
|
|
// actions listed in the `access` section of this token.
|
|
func (c *ClaimSet) accessSet() accessSet {
|
|
accessSet := make(accessSet, len(c.Access))
|
|
|
|
for _, resourceActions := range c.Access {
|
|
resource := auth.Resource{
|
|
Type: resourceActions.Type,
|
|
Name: resourceActions.Name,
|
|
}
|
|
|
|
set, exists := accessSet[resource]
|
|
if !exists {
|
|
set = newActionSet()
|
|
accessSet[resource] = set
|
|
}
|
|
|
|
for _, action := range resourceActions.Actions {
|
|
set.add(action)
|
|
}
|
|
}
|
|
|
|
return accessSet
|
|
}
|
|
|
|
func (c *ClaimSet) resources() []auth.Resource {
|
|
resourceSet := map[auth.Resource]struct{}{}
|
|
|
|
for _, resourceActions := range c.Access {
|
|
resource := auth.Resource{
|
|
Type: resourceActions.Type,
|
|
Class: resourceActions.Class,
|
|
Name: resourceActions.Name,
|
|
}
|
|
resourceSet[resource] = struct{}{}
|
|
}
|
|
|
|
resources := make([]auth.Resource, 0, len(resourceSet))
|
|
for resource := range resourceSet {
|
|
resources = append(resources, resource)
|
|
}
|
|
|
|
return resources
|
|
}
|