-
Notifications
You must be signed in to change notification settings - Fork 120
/
Copy pathjwt_authenticator.go
181 lines (142 loc) · 4.18 KB
/
jwt_authenticator.go
1
2
3
4
5
6
7
8
9
10
11
12
13
14
15
16
17
18
19
20
21
22
23
24
25
26
27
28
29
30
31
32
33
34
35
36
37
38
39
40
41
42
43
44
45
46
47
48
49
50
51
52
53
54
55
56
57
58
59
60
61
62
63
64
65
66
67
68
69
70
71
72
73
74
75
76
77
78
79
80
81
82
83
84
85
86
87
88
89
90
91
92
93
94
95
96
97
98
99
100
101
102
103
104
105
106
107
108
109
110
111
112
113
114
115
116
117
118
119
120
121
122
123
124
125
126
127
128
129
130
131
132
133
134
135
136
137
138
139
140
141
142
143
144
145
146
147
148
149
150
151
152
153
154
155
156
157
158
159
160
161
162
163
164
165
166
167
168
169
170
171
172
173
174
175
176
177
178
179
180
181
package executor
import (
"crypto"
"encoding/json"
"fmt"
"io"
"log"
"net/http"
"os"
"strings"
"time"
"github.com/rakutentech/jwk-go/jwk"
"github.com/golang-jwt/jwt/v4"
)
func NewJWTAuthMiddleware(next http.Handler) (http.Handler, error) {
var authority = "https://gateway.openfaas:8080/.well-known/openid-configuration"
if v, ok := os.LookupEnv("jwt_auth_local"); ok && (v == "true" || v == "1") {
authority = "http://127.0.0.1:8000/.well-known/openid-configuration"
}
jwtAuthDebug := false
if val, ok := os.LookupEnv("jwt_auth_debug"); ok && val == "true" || val == "1" {
jwtAuthDebug = true
}
config, err := getConfig(authority)
if err != nil {
return nil, err
}
if jwtAuthDebug {
log.Printf("[JWT Auth] Issuer: %s\tJWKS URI: %s", config.Issuer, config.JWKSURI)
}
keyset, err := getKeyset(config.JWKSURI)
if err != nil {
return nil, err
}
if jwtAuthDebug {
for _, key := range keyset.Keys {
log.Printf("[JWT Auth] Key: %s", key.KeyID)
}
}
issuer := config.Issuer
return http.HandlerFunc(func(w http.ResponseWriter, r *http.Request) {
st := time.Now()
for _, key := range keyset.Keys {
log.Printf("%s: %v", issuer, key.KeyID)
}
var bearer string
if v := r.Header.Get("Authorization"); v != "" {
bearer = strings.TrimPrefix(v, "Bearer ")
}
if bearer == "" {
http.Error(w, "Bearer must be present in Authorization header", http.StatusUnauthorized)
log.Printf("%s %s - %d ACCESS DENIED - (%s)", r.Method, r.URL.Path, http.StatusUnauthorized, time.Since(st).Round(time.Millisecond))
return
}
mapClaims := jwt.MapClaims{}
token, err := jwt.ParseWithClaims(bearer, &mapClaims, func(token *jwt.Token) (interface{}, error) {
if jwtAuthDebug {
log.Printf("[JWT Auth] Token: audience: %v\tissuer: %v", mapClaims["aud"], mapClaims["iss"])
}
if mapClaims["iss"] != issuer {
return nil, fmt.Errorf("invalid issuer: %s", mapClaims["iss"])
}
kid, ok := token.Header["kid"].(string)
if !ok {
return nil, fmt.Errorf("invalid kid: %v", token.Header["kid"])
}
var key *jwk.KeySpec
for _, k := range keyset.Keys {
if k.KeyID == kid {
key = &k
break
}
}
if key == nil {
return nil, fmt.Errorf("invalid kid: %s", kid)
}
return key.Key.(crypto.PublicKey), nil
})
if err != nil {
http.Error(w, fmt.Sprintf("failed to parse JWT token: %s", err), http.StatusUnauthorized)
log.Printf("%s %s - %d ACCESS DENIED - (%s)", r.Method, r.URL.Path, http.StatusUnauthorized, time.Since(st).Round(time.Millisecond))
return
}
if !token.Valid {
http.Error(w, fmt.Sprintf("invalid JWT token: %s", bearer), http.StatusUnauthorized)
log.Printf("%s %s - %d ACCESS DENIED - (%s)", r.Method, r.URL.Path, http.StatusUnauthorized, time.Since(st).Round(time.Millisecond))
return
}
next.ServeHTTP(w, r)
}), nil
}
func getKeyset(uri string) (jwk.KeySpecSet, error) {
var set jwk.KeySpecSet
req, err := http.NewRequest(http.MethodGet, uri, nil)
if err != nil {
return set, err
}
req.Header.Add("User-Agent", "openfaas-watchdog")
res, err := http.DefaultClient.Do(req)
if err != nil {
return set, err
}
var body []byte
if res.Body != nil {
defer res.Body.Close()
body, _ = io.ReadAll(res.Body)
}
if res.StatusCode != http.StatusOK {
return set, fmt.Errorf("failed to get keyset from %s, status code: %d, body: %s", uri, res.StatusCode, string(body))
}
if err := json.Unmarshal(body, &set); err != nil {
return set, err
}
return set, nil
}
func getConfig(jwksURL string) (OpenIDConfiguration, error) {
var config OpenIDConfiguration
req, err := http.NewRequest(http.MethodGet, jwksURL, nil)
if err != nil {
return config, err
}
res, err := http.DefaultClient.Do(req)
if err != nil {
return config, err
}
var body []byte
if res.Body != nil {
defer res.Body.Close()
body, _ = io.ReadAll(res.Body)
}
if res.StatusCode != http.StatusOK {
return config, fmt.Errorf("failed to get config from %s, status code: %d, body: %s", jwksURL, res.StatusCode, string(body))
}
if err := json.Unmarshal(body, &config); err != nil {
return config, err
}
return config, nil
}
type OpenIDConfiguration struct {
Issuer string `json:"issuer"`
JWKSURI string `json:"jwks_uri"`
}