mirror of https://github.com/harness/drone.git
165 lines
4.3 KiB
Go
165 lines
4.3 KiB
Go
// Copyright 2023 Harness, Inc.
|
|
//
|
|
// Licensed under the Apache License, Version 2.0 (the "License");
|
|
// you may not use this file except in compliance with the License.
|
|
// You may obtain a copy of the License at
|
|
//
|
|
// http://www.apache.org/licenses/LICENSE-2.0
|
|
//
|
|
// Unless required by applicable law or agreed to in writing, software
|
|
// distributed under the License is distributed on an "AS IS" BASIS,
|
|
// WITHOUT WARRANTIES OR CONDITIONS OF ANY KIND, either express or implied.
|
|
// See the License for the specific language governing permissions and
|
|
// limitations under the License.
|
|
|
|
package jwt
|
|
|
|
import (
|
|
"fmt"
|
|
"time"
|
|
|
|
"github.com/harness/gitness/types"
|
|
"github.com/harness/gitness/types/enum"
|
|
|
|
"github.com/golang-jwt/jwt"
|
|
)
|
|
|
|
const (
|
|
//TODO: Update when ready to change repo and build
|
|
issuer = "Gitness"
|
|
)
|
|
|
|
// Source represents the source of the SubClaimsAccessPermissions.
|
|
type Source string
|
|
|
|
const (
|
|
OciSource Source = "oci"
|
|
)
|
|
|
|
// Claims defines Harness jwt claims.
|
|
type Claims struct {
|
|
jwt.StandardClaims
|
|
|
|
PrincipalID int64 `json:"pid,omitempty"`
|
|
|
|
Token *SubClaimsToken `json:"tkn,omitempty"`
|
|
Membership *SubClaimsMembership `json:"ms,omitempty"`
|
|
AccessPermissions *SubClaimsAccessPermissions `json:"ap,omitempty"`
|
|
}
|
|
|
|
// SubClaimsToken contains information about the token the JWT was created for.
|
|
type SubClaimsToken struct {
|
|
Type enum.TokenType `json:"typ,omitempty"`
|
|
ID int64 `json:"id,omitempty"`
|
|
}
|
|
|
|
// SubClaimsMembership contains the ephemeral membership the JWT was created with.
|
|
type SubClaimsMembership struct {
|
|
Role enum.MembershipRole `json:"role,omitempty"`
|
|
SpaceID int64 `json:"sid,omitempty"`
|
|
}
|
|
|
|
// SubClaimsAccessPermissions stores allowed actions on a resource.
|
|
type SubClaimsAccessPermissions struct {
|
|
Source Source `json:"src,omitempty"`
|
|
Permissions []AccessPermissions `json:"permissions,omitempty"`
|
|
}
|
|
|
|
// AccessPermissions stores allowed actions on a resource.
|
|
type AccessPermissions struct {
|
|
SpaceID int64 `json:"sid,omitempty"`
|
|
Permissions []enum.Permission `json:"p"`
|
|
}
|
|
|
|
// GenerateForToken generates a jwt for a given token.
|
|
func GenerateForToken(token *types.Token, secret string) (string, error) {
|
|
var expiresAt int64
|
|
if token.ExpiresAt != nil {
|
|
expiresAt = *token.ExpiresAt
|
|
}
|
|
|
|
jwtToken := jwt.NewWithClaims(jwt.SigningMethodHS256, Claims{
|
|
StandardClaims: jwt.StandardClaims{
|
|
Issuer: issuer,
|
|
// times required to be in sec not millisec
|
|
IssuedAt: token.IssuedAt / 1000,
|
|
ExpiresAt: expiresAt / 1000,
|
|
},
|
|
PrincipalID: token.PrincipalID,
|
|
Token: &SubClaimsToken{
|
|
Type: token.Type,
|
|
ID: token.ID,
|
|
},
|
|
})
|
|
|
|
res, err := jwtToken.SignedString([]byte(secret))
|
|
if err != nil {
|
|
return "", fmt.Errorf("failed to sign token: %w", err)
|
|
}
|
|
|
|
return res, nil
|
|
}
|
|
|
|
// GenerateWithMembership generates a jwt with the given ephemeral membership.
|
|
func GenerateWithMembership(
|
|
principalID int64,
|
|
spaceID int64,
|
|
role enum.MembershipRole,
|
|
lifetime time.Duration,
|
|
secret string,
|
|
) (string, error) {
|
|
issuedAt := time.Now()
|
|
expiresAt := issuedAt.Add(lifetime)
|
|
|
|
jwtToken := jwt.NewWithClaims(jwt.SigningMethodHS256, Claims{
|
|
StandardClaims: jwt.StandardClaims{
|
|
Issuer: issuer,
|
|
// times required to be in sec
|
|
IssuedAt: issuedAt.Unix(),
|
|
ExpiresAt: expiresAt.Unix(),
|
|
},
|
|
PrincipalID: principalID,
|
|
Membership: &SubClaimsMembership{
|
|
SpaceID: spaceID,
|
|
Role: role,
|
|
},
|
|
})
|
|
|
|
res, err := jwtToken.SignedString([]byte(secret))
|
|
if err != nil {
|
|
return "", fmt.Errorf("failed to sign token: %w", err)
|
|
}
|
|
|
|
return res, nil
|
|
}
|
|
|
|
// GenerateForTokenWithAccessPermissions generates a jwt for a given token.
|
|
func GenerateForTokenWithAccessPermissions(
|
|
principalID int64,
|
|
lifetime *time.Duration,
|
|
secret string, accessPermissions *SubClaimsAccessPermissions,
|
|
) (string, error) {
|
|
issuedAt := time.Now()
|
|
if lifetime == nil {
|
|
return "", fmt.Errorf("token lifetime is required")
|
|
}
|
|
expiresAt := issuedAt.Add(*lifetime)
|
|
|
|
jwtToken := jwt.NewWithClaims(jwt.SigningMethodHS256, Claims{
|
|
StandardClaims: jwt.StandardClaims{
|
|
Issuer: issuer,
|
|
IssuedAt: issuedAt.Unix(),
|
|
ExpiresAt: expiresAt.Unix(),
|
|
},
|
|
PrincipalID: principalID,
|
|
AccessPermissions: accessPermissions,
|
|
})
|
|
|
|
res, err := jwtToken.SignedString([]byte(secret))
|
|
if err != nil {
|
|
return "", fmt.Errorf("failed to sign token: %w", err)
|
|
}
|
|
|
|
return res, nil
|
|
}
|