2016-01-25 20:29:20 -05:00
|
|
|
/*
|
|
|
|
* Minio Cloud Storage, (C) 2016 Minio, Inc.
|
|
|
|
*
|
|
|
|
* Licensed under the Apache License, Version 2.0 (the "License");
|
|
|
|
* you may not use this file except in compliance with the License.
|
|
|
|
* You may obtain a copy of the License at
|
|
|
|
*
|
|
|
|
* http://www.apache.org/licenses/LICENSE-2.0
|
|
|
|
*
|
|
|
|
* Unless required by applicable law or agreed to in writing, software
|
|
|
|
* distributed under the License is distributed on an "AS IS" BASIS,
|
|
|
|
* WITHOUT WARRANTIES OR CONDITIONS OF ANY KIND, either express or implied.
|
|
|
|
* See the License for the specific language governing permissions and
|
|
|
|
* limitations under the License.
|
|
|
|
*/
|
|
|
|
|
2016-01-21 19:28:15 -05:00
|
|
|
package main
|
|
|
|
|
|
|
|
import (
|
2016-01-27 04:52:54 -05:00
|
|
|
"bytes"
|
2016-01-21 19:28:15 -05:00
|
|
|
"time"
|
|
|
|
|
2016-01-25 20:29:20 -05:00
|
|
|
jwtgo "github.com/dgrijalva/jwt-go"
|
|
|
|
"github.com/minio/minio-xl/pkg/probe"
|
2016-01-21 19:28:15 -05:00
|
|
|
"golang.org/x/crypto/bcrypt"
|
|
|
|
)
|
|
|
|
|
2016-01-25 01:26:53 -05:00
|
|
|
// JWT - jwt auth backend
|
|
|
|
type JWT struct {
|
2016-01-27 04:52:54 -05:00
|
|
|
accessKeyID []byte
|
|
|
|
secretAccessKey []byte
|
2016-01-21 19:28:15 -05:00
|
|
|
}
|
|
|
|
|
2016-01-27 04:52:54 -05:00
|
|
|
// Default - each token expires in 10hrs.
|
2016-01-21 19:28:15 -05:00
|
|
|
const (
|
2016-01-27 04:52:54 -05:00
|
|
|
tokenExpires time.Duration = 10
|
2016-01-21 19:28:15 -05:00
|
|
|
)
|
|
|
|
|
2016-01-25 20:29:20 -05:00
|
|
|
// InitJWT - initialize.
|
2016-01-25 01:26:53 -05:00
|
|
|
func InitJWT() *JWT {
|
2016-01-27 04:52:54 -05:00
|
|
|
jwt := &JWT{}
|
|
|
|
// Load credentials.
|
2016-01-25 01:26:53 -05:00
|
|
|
config, err := loadConfigV2()
|
|
|
|
fatalIf(err.Trace("JWT"), "Unable to load configuration file.", nil)
|
|
|
|
|
|
|
|
// Save access, secret keys.
|
2016-01-27 04:52:54 -05:00
|
|
|
jwt.accessKeyID = []byte(config.Credentials.AccessKeyID)
|
|
|
|
jwt.secretAccessKey = []byte(config.Credentials.SecretAccessKey)
|
2016-01-25 01:26:53 -05:00
|
|
|
return jwt
|
2016-01-21 19:28:15 -05:00
|
|
|
}
|
|
|
|
|
2016-01-25 20:29:20 -05:00
|
|
|
// GenerateToken - generates a new Json Web Token based on the incoming user id.
|
2016-01-27 04:52:54 -05:00
|
|
|
func (jwt *JWT) GenerateToken(userName string) (string, *probe.Error) {
|
|
|
|
token := jwtgo.New(jwtgo.SigningMethodHS512)
|
2016-01-25 20:29:20 -05:00
|
|
|
// Token expires in 10hrs.
|
2016-01-27 04:52:54 -05:00
|
|
|
token.Claims["exp"] = time.Now().Add(time.Hour * tokenExpires).Unix()
|
2016-01-21 19:28:15 -05:00
|
|
|
token.Claims["iat"] = time.Now().Unix()
|
|
|
|
token.Claims["sub"] = userName
|
2016-01-27 04:52:54 -05:00
|
|
|
tokenString, e := token.SignedString(jwt.secretAccessKey)
|
|
|
|
if e != nil {
|
|
|
|
return "", probe.NewError(e)
|
2016-01-21 19:28:15 -05:00
|
|
|
}
|
|
|
|
return tokenString, nil
|
|
|
|
}
|
|
|
|
|
2016-01-27 04:52:54 -05:00
|
|
|
// Authenticate - authenticates incoming username and password.
|
|
|
|
func (jwt *JWT) Authenticate(userName, password string) bool {
|
|
|
|
if !bytes.Equal([]byte(userName), jwt.accessKeyID) {
|
|
|
|
return false
|
2016-01-21 19:28:15 -05:00
|
|
|
}
|
2016-01-27 04:52:54 -05:00
|
|
|
hashedPassword, _ := bcrypt.GenerateFromPassword(jwt.secretAccessKey, bcrypt.DefaultCost)
|
|
|
|
return bcrypt.CompareHashAndPassword(hashedPassword, []byte(password)) == nil
|
2016-01-21 19:28:15 -05:00
|
|
|
}
|