licverifier: Validate JWT token expiry (#10253)

With this change the expiry is validated for the license key JWT
This commit is contained in:
Krishnan Parthasarathi 2020-08-12 21:31:52 -07:00 committed by GitHub
parent 1c865dd119
commit ab43804efd
No known key found for this signature in database
GPG Key ID: 4AEE18F83AFDEB23
2 changed files with 75 additions and 25 deletions

View File

@ -32,20 +32,21 @@ type LicenseVerifier struct {
// LicenseInfo holds customer metadata present in the license key. // LicenseInfo holds customer metadata present in the license key.
type LicenseInfo struct { type LicenseInfo struct {
Email string `json:"sub"` // Email of the license key requestor Email string // Email of the license key requestor
TeamName string `json:"teamName"` // Subnet team name TeamName string // Subnet team name
AccountID int64 `json:"accountId"` // Subnet account id AccountID int64 // Subnet account id
StorageCapacity int64 `json:"capacity"` // Storage capacity used in TB StorageCapacity int64 // Storage capacity used in TB
ServiceType string `json:"serviceType"` // Subnet service type ServiceType string // Subnet service type
} }
// Valid checks if customer metadata from the license key is valid. // license key JSON field names
func (li *LicenseInfo) Valid() error { const (
if li.AccountID <= 0 { accountID = "accountId"
return errors.New("Invalid accountId in claims") sub = "sub"
} teamName = "teamName"
return nil capacity = "capacity"
} serviceType = "serviceType"
)
// NewLicenseVerifier returns an initialized license verifier with the given // NewLicenseVerifier returns an initialized license verifier with the given
// ECDSA public key in PEM format. // ECDSA public key in PEM format.
@ -59,14 +60,49 @@ func NewLicenseVerifier(pemBytes []byte) (*LicenseVerifier, error) {
}, nil }, nil
} }
// toLicenseInfo extracts LicenseInfo from claims. It returns an error if any of
// the claim values are invalid.
func toLicenseInfo(claims jwt.MapClaims) (LicenseInfo, error) {
accID, ok := claims[accountID].(float64)
if ok && accID <= 0 {
return LicenseInfo{}, errors.New("Invalid accountId in claims")
}
email, ok := claims[sub].(string)
if !ok {
return LicenseInfo{}, errors.New("Invalid email in claims")
}
tName, ok := claims[teamName].(string)
if !ok {
return LicenseInfo{}, errors.New("Invalid team name in claims")
}
storageCap, ok := claims[capacity].(float64)
if !ok {
return LicenseInfo{}, errors.New("Invalid storage capacity in claims")
}
sType, ok := claims[serviceType].(string)
if !ok {
return LicenseInfo{}, errors.New("Invalid service type in claims")
}
return LicenseInfo{
Email: email,
TeamName: tName,
AccountID: int64(accID),
StorageCapacity: int64(storageCap),
ServiceType: sType,
}, nil
}
// Verify verifies the license key and validates the claims present in it. // Verify verifies the license key and validates the claims present in it.
func (lv *LicenseVerifier) Verify(license string) (LicenseInfo, error) { func (lv *LicenseVerifier) Verify(license string) (LicenseInfo, error) {
var licInfo LicenseInfo token, err := jwt.ParseWithClaims(license, &jwt.MapClaims{}, func(token *jwt.Token) (interface{}, error) {
_, err := jwt.ParseWithClaims(license, &licInfo, func(token *jwt.Token) (interface{}, error) {
return lv.ecPubKey, nil return lv.ecPubKey, nil
}) })
if err != nil { if err != nil {
return LicenseInfo{}, fmt.Errorf("Failed to verify license: %s", err) return LicenseInfo{}, fmt.Errorf("Failed to verify license: %s", err)
} }
return licInfo, nil if claims, ok := token.Claims.(*jwt.MapClaims); ok && token.Valid {
return toLicenseInfo(*claims)
}
return LicenseInfo{}, errors.New("Invalid claims found in license")
} }

View File

@ -19,8 +19,18 @@ package licverifier
import ( import (
"fmt" "fmt"
"testing" "testing"
"time"
"github.com/dgrijalva/jwt-go"
) )
// at fixes the jwt.TimeFunc at t and calls f in that context.
func at(t time.Time, f func()) {
jwt.TimeFunc = func() time.Time { return t }
f()
jwt.TimeFunc = time.Now
}
// TestLicenseVerify tests the license key verification process with a valid and // TestLicenseVerify tests the license key verification process with a valid and
// an invalid key. // an invalid key.
func TestLicenseVerify(t *testing.T) { func TestLicenseVerify(t *testing.T) {
@ -48,18 +58,22 @@ mr/cKCUyBL7rcAvg0zNq1vcSrUSGlAmY3SEDCu3GOKnjG/U4E7+p957ocWSV+mQU
} }
for i, tc := range testCases { for i, tc := range testCases {
licInfo, err := lv.Verify(tc.lic) // Fixing the jwt.TimeFunc at 2020-08-05 22:17:43 +0000 UTC to
if err != nil && tc.shouldPass { // ensure that the license JWT doesn't expire ever.
t.Fatalf("%d: Expected license to pass verification but failed with %s", i+1, err) at(time.Unix(int64(1596665863), 0), func() {
} licInfo, err := lv.Verify(tc.lic)
if err == nil { if err != nil && tc.shouldPass {
if !tc.shouldPass { t.Fatalf("%d: Expected license to pass verification but failed with %s", i+1, err)
t.Fatalf("%d: Expected license to fail verification but passed", i+1)
} }
if tc.expectedLicInfo != licInfo { if err == nil {
t.Fatalf("%d: Expected license info %v but got %v", i+1, tc.expectedLicInfo, licInfo) if !tc.shouldPass {
t.Fatalf("%d: Expected license to fail verification but passed", i+1)
}
if tc.expectedLicInfo != licInfo {
t.Fatalf("%d: Expected license info %v but got %v", i+1, tc.expectedLicInfo, licInfo)
}
} }
} })
} }
} }