Browse Source
Add asymmetric JWT signing (#16010)
Add asymmetric JWT signing (#16010)
* Added asymmetric token signing. * Load signing key from settings. * Added optional kid parameter. * Updated documentation. * Add "kid" to token header.master
committed by
GitHub
No known key found for this signature in database
GPG Key ID: 4AEE18F83AFDEB23
13 changed files with 481 additions and 47 deletions
-
2cmd/generate.go
-
4docs/content/doc/advanced/config-cheat-sheet.en-us.md
-
11docs/content/doc/developers/oauth2-provider.md
-
3models/oauth2.go
-
18models/oauth2_application.go
-
378modules/auth/oauth2/jwtsigningkey.go
-
19modules/generate/generate.go
-
2modules/setting/lfs.go
-
22modules/setting/setting.go
-
2routers/install/install.go
-
59routers/web/user/oauth.go
-
1routers/web/web.go
-
7templates/user/auth/oidc_wellknown.tmpl
@ -0,0 +1,378 @@ |
|||
// Copyright 2021 The Gitea Authors. All rights reserved.
|
|||
// Use of this source code is governed by a MIT-style
|
|||
// license that can be found in the LICENSE file.
|
|||
|
|||
package oauth2 |
|||
|
|||
import ( |
|||
"crypto/ecdsa" |
|||
"crypto/elliptic" |
|||
"crypto/rand" |
|||
"crypto/rsa" |
|||
"crypto/sha256" |
|||
"crypto/x509" |
|||
"encoding/base64" |
|||
"encoding/pem" |
|||
"fmt" |
|||
"io/ioutil" |
|||
"math/big" |
|||
"os" |
|||
"path/filepath" |
|||
"strings" |
|||
|
|||
"code.gitea.io/gitea/modules/generate" |
|||
"code.gitea.io/gitea/modules/log" |
|||
"code.gitea.io/gitea/modules/setting" |
|||
"code.gitea.io/gitea/modules/util" |
|||
|
|||
"github.com/dgrijalva/jwt-go" |
|||
ini "gopkg.in/ini.v1" |
|||
) |
|||
|
|||
// ErrInvalidAlgorithmType represents an invalid algorithm error.
|
|||
type ErrInvalidAlgorithmType struct { |
|||
Algorightm string |
|||
} |
|||
|
|||
func (err ErrInvalidAlgorithmType) Error() string { |
|||
return fmt.Sprintf("JWT signing algorithm is not supported: %s", err.Algorightm) |
|||
} |
|||
|
|||
// JWTSigningKey represents a algorithm/key pair to sign JWTs
|
|||
type JWTSigningKey interface { |
|||
IsSymmetric() bool |
|||
SigningMethod() jwt.SigningMethod |
|||
SignKey() interface{} |
|||
VerifyKey() interface{} |
|||
ToJWK() (map[string]string, error) |
|||
PreProcessToken(*jwt.Token) |
|||
} |
|||
|
|||
type hmacSigningKey struct { |
|||
signingMethod jwt.SigningMethod |
|||
secret []byte |
|||
} |
|||
|
|||
func (key hmacSigningKey) IsSymmetric() bool { |
|||
return true |
|||
} |
|||
|
|||
func (key hmacSigningKey) SigningMethod() jwt.SigningMethod { |
|||
return key.signingMethod |
|||
} |
|||
|
|||
func (key hmacSigningKey) SignKey() interface{} { |
|||
return key.secret |
|||
} |
|||
|
|||
func (key hmacSigningKey) VerifyKey() interface{} { |
|||
return key.secret |
|||
} |
|||
|
|||
func (key hmacSigningKey) ToJWK() (map[string]string, error) { |
|||
return map[string]string{ |
|||
"kty": "oct", |
|||
"alg": key.SigningMethod().Alg(), |
|||
}, nil |
|||
} |
|||
|
|||
func (key hmacSigningKey) PreProcessToken(*jwt.Token) {} |
|||
|
|||
type rsaSingingKey struct { |
|||
signingMethod jwt.SigningMethod |
|||
key *rsa.PrivateKey |
|||
id string |
|||
} |
|||
|
|||
func newRSASingingKey(signingMethod jwt.SigningMethod, key *rsa.PrivateKey) (rsaSingingKey, error) { |
|||
kid, err := createPublicKeyFingerprint(key.Public().(*rsa.PublicKey)) |
|||
if err != nil { |
|||
return rsaSingingKey{}, err |
|||
} |
|||
|
|||
return rsaSingingKey{ |
|||
signingMethod, |
|||
key, |
|||
base64.RawURLEncoding.EncodeToString(kid), |
|||
}, nil |
|||
} |
|||
|
|||
func (key rsaSingingKey) IsSymmetric() bool { |
|||
return false |
|||
} |
|||
|
|||
func (key rsaSingingKey) SigningMethod() jwt.SigningMethod { |
|||
return key.signingMethod |
|||
} |
|||
|
|||
func (key rsaSingingKey) SignKey() interface{} { |
|||
return key.key |
|||
} |
|||
|
|||
func (key rsaSingingKey) VerifyKey() interface{} { |
|||
return key.key.Public() |
|||
} |
|||
|
|||
func (key rsaSingingKey) ToJWK() (map[string]string, error) { |
|||
pubKey := key.key.Public().(*rsa.PublicKey) |
|||
|
|||
return map[string]string{ |
|||
"kty": "RSA", |
|||
"alg": key.SigningMethod().Alg(), |
|||
"kid": key.id, |
|||
"e": base64.RawURLEncoding.EncodeToString(big.NewInt(int64(pubKey.E)).Bytes()), |
|||
"n": base64.RawURLEncoding.EncodeToString(pubKey.N.Bytes()), |
|||
}, nil |
|||
} |
|||
|
|||
func (key rsaSingingKey) PreProcessToken(token *jwt.Token) { |
|||
token.Header["kid"] = key.id |
|||
} |
|||
|
|||
type ecdsaSingingKey struct { |
|||
signingMethod jwt.SigningMethod |
|||
key *ecdsa.PrivateKey |
|||
id string |
|||
} |
|||
|
|||
func newECDSASingingKey(signingMethod jwt.SigningMethod, key *ecdsa.PrivateKey) (ecdsaSingingKey, error) { |
|||
kid, err := createPublicKeyFingerprint(key.Public().(*ecdsa.PublicKey)) |
|||
if err != nil { |
|||
return ecdsaSingingKey{}, err |
|||
} |
|||
|
|||
return ecdsaSingingKey{ |
|||
signingMethod, |
|||
key, |
|||
base64.RawURLEncoding.EncodeToString(kid), |
|||
}, nil |
|||
} |
|||
|
|||
func (key ecdsaSingingKey) IsSymmetric() bool { |
|||
return false |
|||
} |
|||
|
|||
func (key ecdsaSingingKey) SigningMethod() jwt.SigningMethod { |
|||
return key.signingMethod |
|||
} |
|||
|
|||
func (key ecdsaSingingKey) SignKey() interface{} { |
|||
return key.key |
|||
} |
|||
|
|||
func (key ecdsaSingingKey) VerifyKey() interface{} { |
|||
return key.key.Public() |
|||
} |
|||
|
|||
func (key ecdsaSingingKey) ToJWK() (map[string]string, error) { |
|||
pubKey := key.key.Public().(*ecdsa.PublicKey) |
|||
|
|||
return map[string]string{ |
|||
"kty": "EC", |
|||
"alg": key.SigningMethod().Alg(), |
|||
"kid": key.id, |
|||
"crv": pubKey.Params().Name, |
|||
"x": base64.RawURLEncoding.EncodeToString(pubKey.X.Bytes()), |
|||
"y": base64.RawURLEncoding.EncodeToString(pubKey.Y.Bytes()), |
|||
}, nil |
|||
} |
|||
|
|||
func (key ecdsaSingingKey) PreProcessToken(token *jwt.Token) { |
|||
token.Header["kid"] = key.id |
|||
} |
|||
|
|||
// createPublicKeyFingerprint creates a fingerprint of the given key.
|
|||
// The fingerprint is the sha256 sum of the PKIX structure of the key.
|
|||
func createPublicKeyFingerprint(key interface{}) ([]byte, error) { |
|||
bytes, err := x509.MarshalPKIXPublicKey(key) |
|||
if err != nil { |
|||
return nil, err |
|||
} |
|||
|
|||
checksum := sha256.Sum256(bytes) |
|||
|
|||
return checksum[:], nil |
|||
} |
|||
|
|||
// CreateJWTSingingKey creates a signing key from an algorithm / key pair.
|
|||
func CreateJWTSingingKey(algorithm string, key interface{}) (JWTSigningKey, error) { |
|||
var signingMethod jwt.SigningMethod |
|||
switch algorithm { |
|||
case "HS256": |
|||
signingMethod = jwt.SigningMethodHS256 |
|||
case "HS384": |
|||
signingMethod = jwt.SigningMethodHS384 |
|||
case "HS512": |
|||
signingMethod = jwt.SigningMethodHS512 |
|||
|
|||
case "RS256": |
|||
signingMethod = jwt.SigningMethodRS256 |
|||
case "RS384": |
|||
signingMethod = jwt.SigningMethodRS384 |
|||
case "RS512": |
|||
signingMethod = jwt.SigningMethodRS512 |
|||
|
|||
case "ES256": |
|||
signingMethod = jwt.SigningMethodES256 |
|||
case "ES384": |
|||
signingMethod = jwt.SigningMethodES384 |
|||
case "ES512": |
|||
signingMethod = jwt.SigningMethodES512 |
|||
default: |
|||
return nil, ErrInvalidAlgorithmType{algorithm} |
|||
} |
|||
|
|||
switch signingMethod.(type) { |
|||
case *jwt.SigningMethodECDSA: |
|||
privateKey, ok := key.(*ecdsa.PrivateKey) |
|||
if !ok { |
|||
return nil, jwt.ErrInvalidKeyType |
|||
} |
|||
return newECDSASingingKey(signingMethod, privateKey) |
|||
case *jwt.SigningMethodRSA: |
|||
privateKey, ok := key.(*rsa.PrivateKey) |
|||
if !ok { |
|||
return nil, jwt.ErrInvalidKeyType |
|||
} |
|||
return newRSASingingKey(signingMethod, privateKey) |
|||
default: |
|||
secret, ok := key.([]byte) |
|||
if !ok { |
|||
return nil, jwt.ErrInvalidKeyType |
|||
} |
|||
return hmacSigningKey{signingMethod, secret}, nil |
|||
} |
|||
} |
|||
|
|||
// DefaultSigningKey is the default signing key for JWTs.
|
|||
var DefaultSigningKey JWTSigningKey |
|||
|
|||
// InitSigningKey creates the default signing key from settings or creates a random key.
|
|||
func InitSigningKey() error { |
|||
var err error |
|||
var key interface{} |
|||
|
|||
switch setting.OAuth2.JWTSigningAlgorithm { |
|||
case "HS256": |
|||
fallthrough |
|||
case "HS384": |
|||
fallthrough |
|||
case "HS512": |
|||
key, err = loadOrCreateSymmetricKey() |
|||
|
|||
case "RS256": |
|||
fallthrough |
|||
case "RS384": |
|||
fallthrough |
|||
case "RS512": |
|||
fallthrough |
|||
case "ES256": |
|||
fallthrough |
|||
case "ES384": |
|||
fallthrough |
|||
case "ES512": |
|||
key, err = loadOrCreateAsymmetricKey() |
|||
|
|||
default: |
|||
return ErrInvalidAlgorithmType{setting.OAuth2.JWTSigningAlgorithm} |
|||
} |
|||
|
|||
if err != nil { |
|||
return fmt.Errorf("Error while loading or creating symmetric key: %v", err) |
|||
} |
|||
|
|||
signingKey, err := CreateJWTSingingKey(setting.OAuth2.JWTSigningAlgorithm, key) |
|||
if err != nil { |
|||
return err |
|||
} |
|||
|
|||
DefaultSigningKey = signingKey |
|||
|
|||
return nil |
|||
} |
|||
|
|||
// loadOrCreateSymmetricKey checks if the configured secret is valid.
|
|||
// If it is not valid a new secret is created and saved in the configuration file.
|
|||
func loadOrCreateSymmetricKey() (interface{}, error) { |
|||
key := make([]byte, 32) |
|||
n, err := base64.RawURLEncoding.Decode(key, []byte(setting.OAuth2.JWTSecretBase64)) |
|||
if err != nil || n != 32 { |
|||
key, err = generate.NewJwtSecret() |
|||
if err != nil { |
|||
log.Fatal("error generating JWT secret: %v", err) |
|||
return nil, err |
|||
} |
|||
|
|||
setting.CreateOrAppendToCustomConf(func(cfg *ini.File) { |
|||
secretBase64 := base64.RawURLEncoding.EncodeToString(key) |
|||
cfg.Section("oauth2").Key("JWT_SECRET").SetValue(secretBase64) |
|||
}) |
|||
} |
|||
|
|||
return key, nil |
|||
} |
|||
|
|||
// loadOrCreateAsymmetricKey checks if the configured private key exists.
|
|||
// If it does not exist a new random key gets generated and saved on the configured path.
|
|||
func loadOrCreateAsymmetricKey() (interface{}, error) { |
|||
keyPath := setting.OAuth2.JWTSigningPrivateKeyFile |
|||
|
|||
isExist, err := util.IsExist(keyPath) |
|||
if err != nil { |
|||
log.Fatal("Unable to check if %s exists. Error: %v", keyPath, err) |
|||
} |
|||
if !isExist { |
|||
err := func() error { |
|||
key, err := func() (interface{}, error) { |
|||
if strings.HasPrefix(setting.OAuth2.JWTSigningAlgorithm, "RS") { |
|||
return rsa.GenerateKey(rand.Reader, 4096) |
|||
} |
|||
return ecdsa.GenerateKey(elliptic.P256(), rand.Reader) |
|||
}() |
|||
if err != nil { |
|||
return err |
|||
} |
|||
|
|||
bytes, err := x509.MarshalPKCS8PrivateKey(key) |
|||
if err != nil { |
|||
return err |
|||
} |
|||
|
|||
privateKeyPEM := &pem.Block{Type: "PRIVATE KEY", Bytes: bytes} |
|||
|
|||
if err := os.MkdirAll(filepath.Dir(keyPath), os.ModePerm); err != nil { |
|||
return err |
|||
} |
|||
|
|||
f, err := os.OpenFile(keyPath, os.O_RDWR|os.O_CREATE|os.O_TRUNC, 0600) |
|||
if err != nil { |
|||
return err |
|||
} |
|||
defer func() { |
|||
if err = f.Close(); err != nil { |
|||
log.Error("Close: %v", err) |
|||
} |
|||
}() |
|||
|
|||
return pem.Encode(f, privateKeyPEM) |
|||
}() |
|||
if err != nil { |
|||
log.Fatal("Error generating private key: %v", err) |
|||
return nil, err |
|||
} |
|||
} |
|||
|
|||
bytes, err := ioutil.ReadFile(keyPath) |
|||
if err != nil { |
|||
return nil, err |
|||
} |
|||
|
|||
block, _ := pem.Decode(bytes) |
|||
if block == nil { |
|||
return nil, fmt.Errorf("no valid PEM data found in %s", keyPath) |
|||
} else if block.Type != "PRIVATE KEY" { |
|||
return nil, fmt.Errorf("expected PRIVATE KEY, got %s in %s", block.Type, keyPath) |
|||
} |
|||
|
|||
return x509.ParsePKCS8PrivateKey(block.Bytes) |
|||
} |
Write
Preview
Loading…
Cancel
Save
Reference in new issue