You can not select more than 25 topics
			Topics must start with a letter or number, can include dashes ('-') and can be up to 35 characters long.
		
		
		
		
		
			
		
			
				
					
					
						
							97 lines
						
					
					
						
							2.6 KiB
						
					
					
				
			
		
		
		
			
			
			
		
		
	
	
							97 lines
						
					
					
						
							2.6 KiB
						
					
					
				
								package security
							 | 
						|
								
							 | 
						|
								import (
							 | 
						|
									"fmt"
							 | 
						|
									"net/http"
							 | 
						|
									"strings"
							 | 
						|
									"time"
							 | 
						|
								
							 | 
						|
									"github.com/golang-jwt/jwt"
							 | 
						|
									"github.com/seaweedfs/seaweedfs/weed/glog"
							 | 
						|
								)
							 | 
						|
								
							 | 
						|
								type EncodedJwt string
							 | 
						|
								type SigningKey []byte
							 | 
						|
								
							 | 
						|
								// SeaweedFileIdClaims is created by Master server(s) and consumed by Volume server(s),
							 | 
						|
								// restricting the access this JWT allows to only a single file.
							 | 
						|
								type SeaweedFileIdClaims struct {
							 | 
						|
									Fid string `json:"fid"`
							 | 
						|
									jwt.StandardClaims
							 | 
						|
								}
							 | 
						|
								
							 | 
						|
								// SeaweedFilerClaims is created e.g. by S3 proxy server and consumed by Filer server.
							 | 
						|
								// Right now, it only contains the standard claims; but this might be extended later
							 | 
						|
								// for more fine-grained permissions.
							 | 
						|
								type SeaweedFilerClaims struct {
							 | 
						|
									jwt.StandardClaims
							 | 
						|
								}
							 | 
						|
								
							 | 
						|
								func GenJwtForVolumeServer(signingKey SigningKey, expiresAfterSec int, fileId string) EncodedJwt {
							 | 
						|
									if len(signingKey) == 0 {
							 | 
						|
										return ""
							 | 
						|
									}
							 | 
						|
								
							 | 
						|
									claims := SeaweedFileIdClaims{
							 | 
						|
										fileId,
							 | 
						|
										jwt.StandardClaims{},
							 | 
						|
									}
							 | 
						|
									if expiresAfterSec > 0 {
							 | 
						|
										claims.ExpiresAt = time.Now().Add(time.Second * time.Duration(expiresAfterSec)).Unix()
							 | 
						|
									}
							 | 
						|
									t := jwt.NewWithClaims(jwt.SigningMethodHS256, claims)
							 | 
						|
									encoded, e := t.SignedString([]byte(signingKey))
							 | 
						|
									if e != nil {
							 | 
						|
										glog.V(0).Infof("Failed to sign claims %+v: %v", t.Claims, e)
							 | 
						|
										return ""
							 | 
						|
									}
							 | 
						|
									return EncodedJwt(encoded)
							 | 
						|
								}
							 | 
						|
								
							 | 
						|
								// GenJwtForFilerServer creates a JSON-web-token for using the authenticated Filer API. Used f.e. inside
							 | 
						|
								// the S3 API
							 | 
						|
								func GenJwtForFilerServer(signingKey SigningKey, expiresAfterSec int) EncodedJwt {
							 | 
						|
									if len(signingKey) == 0 {
							 | 
						|
										return ""
							 | 
						|
									}
							 | 
						|
								
							 | 
						|
									claims := SeaweedFilerClaims{
							 | 
						|
										jwt.StandardClaims{},
							 | 
						|
									}
							 | 
						|
									if expiresAfterSec > 0 {
							 | 
						|
										claims.ExpiresAt = time.Now().Add(time.Second * time.Duration(expiresAfterSec)).Unix()
							 | 
						|
									}
							 | 
						|
									t := jwt.NewWithClaims(jwt.SigningMethodHS256, claims)
							 | 
						|
									encoded, e := t.SignedString([]byte(signingKey))
							 | 
						|
									if e != nil {
							 | 
						|
										glog.V(0).Infof("Failed to sign claims %+v: %v", t.Claims, e)
							 | 
						|
										return ""
							 | 
						|
									}
							 | 
						|
									return EncodedJwt(encoded)
							 | 
						|
								}
							 | 
						|
								
							 | 
						|
								func GetJwt(r *http.Request) EncodedJwt {
							 | 
						|
								
							 | 
						|
									// Get token from query params
							 | 
						|
									tokenStr := r.URL.Query().Get("jwt")
							 | 
						|
								
							 | 
						|
									// Get token from authorization header
							 | 
						|
									if tokenStr == "" {
							 | 
						|
										bearer := r.Header.Get("Authorization")
							 | 
						|
										if len(bearer) > 7 && strings.ToUpper(bearer[0:6]) == "BEARER" {
							 | 
						|
											tokenStr = bearer[7:]
							 | 
						|
										}
							 | 
						|
									}
							 | 
						|
								
							 | 
						|
									return EncodedJwt(tokenStr)
							 | 
						|
								}
							 | 
						|
								
							 | 
						|
								func DecodeJwt(signingKey SigningKey, tokenString EncodedJwt, claims jwt.Claims) (token *jwt.Token, err error) {
							 | 
						|
									// check exp, nbf
							 | 
						|
									return jwt.ParseWithClaims(string(tokenString), claims, func(token *jwt.Token) (interface{}, error) {
							 | 
						|
										if _, ok := token.Method.(*jwt.SigningMethodHMAC); !ok {
							 | 
						|
											return nil, fmt.Errorf("unknown token method")
							 | 
						|
										}
							 | 
						|
										return []byte(signingKey), nil
							 | 
						|
									})
							 | 
						|
								}
							 |