-
Notifications
You must be signed in to change notification settings - Fork 267
/
Copy pathtoken.go
144 lines (121 loc) · 3.91 KB
/
token.go
1
2
3
4
5
6
7
8
9
10
11
12
13
14
15
16
17
18
19
20
21
22
23
24
25
26
27
28
29
30
31
32
33
34
35
36
37
38
39
40
41
42
43
44
45
46
47
48
49
50
51
52
53
54
55
56
57
58
59
60
61
62
63
64
65
66
67
68
69
70
71
72
73
74
75
76
77
78
79
80
81
82
83
84
85
86
87
88
89
90
91
92
93
94
95
96
97
98
99
100
101
102
103
104
105
106
107
108
109
110
111
112
113
114
115
116
117
118
119
120
121
122
123
124
125
126
127
128
129
130
131
132
133
134
135
136
137
138
139
140
141
142
143
144
package token
import (
"time"
"github.com/pkg/errors"
"go.step.sm/crypto/jose"
"go.step.sm/crypto/keyutil"
)
const (
// DefaultIssuer when generating tokens.
DefaultIssuer = "step-cli"
// DefaultAudience when generating tokens.
DefaultAudience = "https://ca/sign"
// MinValidity token validity token duration.
MinValidity = 10 * time.Second
// MaxValidity token validity token duration.
MaxValidity = 1 * time.Hour
// DefaultValidity token validity duration.
DefaultValidity = 5 * time.Minute
// MaxValidityDelay allowable delay between Now and beginning of token validity period.
MaxValidityDelay = 30 * time.Minute
)
// RootSHAClaim is the property name for a JWT claim that stores the SHA256 of a root certificate.
const RootSHAClaim = "sha"
// SANSClaim is the property name for a JWT claim that stores the list of required subject alternative names.
const SANSClaim = "sans"
// StepClaim is the property name for a JWT claim the stores the custom information in the certificate.
const StepClaim = "step"
// UserClaim is the property name for a JWT claim that stores user-provided custom information.
const UserClaim = "user"
// ConfirmationClaim is the property name for a JWT claim that stores a JSON
// object used as Proof-Of-Possession.
const ConfirmationClaim = "cnf"
// Token interface which all token types should attempt to implement.
type Token interface {
SignedString(sigAlg string, priv interface{}) (string, error)
}
// Claims represents the claims that a token might have.
type Claims struct {
jose.Claims
ExtraClaims map[string]interface{}
ExtraHeaders map[string]interface{}
}
// Set adds the given key and value to the map of extra claims.
func (c *Claims) Set(key string, value interface{}) {
if c.ExtraClaims == nil {
c.ExtraClaims = make(map[string]interface{})
}
c.ExtraClaims[key] = value
}
// SetHeader adds the given key and value to the map of extra headers.
func (c *Claims) SetHeader(key string, value interface{}) {
if c.ExtraHeaders == nil {
c.ExtraHeaders = make(map[string]interface{})
}
c.ExtraHeaders[key] = value
}
// Sign creates a JWT with the claims and signs it with the given key.
func (c *Claims) Sign(alg jose.SignatureAlgorithm, key interface{}) (string, error) {
kid, err := GenerateKeyID(key)
if err != nil {
return "", err
}
so := new(jose.SignerOptions)
so.WithType("JWT")
so.WithHeader("kid", kid)
// Used to override the kid too
for k, v := range c.ExtraHeaders {
so.WithHeader(jose.HeaderKey(k), v)
}
signer, err := jose.NewSigner(jose.SigningKey{
Algorithm: alg,
Key: key,
}, so)
if err != nil {
return "", errors.Wrapf(err, "error creating JWT signer")
}
// Force aud to be a string
if len(c.Audience) == 1 {
c.Set("aud", c.Audience[0])
}
raw, err := jose.Signed(signer).Claims(c.Claims).Claims(c.ExtraClaims).CompactSerialize()
if err != nil {
return "", errors.Wrapf(err, "error serializing JWT")
}
return raw, nil
}
// NewClaims returns the default claims with the given options added.
func NewClaims(opts ...Options) (*Claims, error) {
c := DefaultClaims()
for _, fn := range opts {
if err := fn(c); err != nil {
return nil, err
}
}
return c, nil
}
// DefaultClaims returns the default claims of any token.
func DefaultClaims() *Claims {
now := time.Now().UTC()
return &Claims{
Claims: jose.Claims{
Issuer: DefaultIssuer,
Audience: jose.Audience{DefaultAudience},
Expiry: jose.NewNumericDate(now.Add(DefaultValidity)),
NotBefore: jose.NewNumericDate(now),
IssuedAt: jose.NewNumericDate(now),
},
ExtraClaims: make(map[string]interface{}),
}
}
// GenerateKeyID returns the SHA256 of a public key.
func GenerateKeyID(priv interface{}) (string, error) {
if signer, ok := priv.(jose.OpaqueSigner); ok {
return jose.Thumbprint(signer.Public())
}
pub, err := keyutil.PublicKey(priv)
if err != nil {
return "", errors.Wrap(err, "error generating kid")
}
return jose.Thumbprint(&jose.JSONWebKey{Key: pub})
}