mirror of
https://github.com/minio/minio.git
synced 2025-04-06 12:50:34 -04:00
jwt,browser: allow short-expiry tokens for GETs (#4684)
This commit fixes a potential security issue, whereby a full-access token to the server would be available in the GET URL of a download request. This fixes that issue by introducing short-expiry tokens, which are only valid for one minute, and are regenerated for every download request. This commit specifically introduces the short-lived tokens, adds tests for the tokens, adds an RPC call for generating a token given a full-access token, updates the browser to use the new tokens for requests where the token is passed as a GET parameter, and adds some tests with the new temporary tokens. Refs: https://github.com/minio/minio/pull/4673
This commit is contained in:
parent
4785555d34
commit
ec5293ce29
@ -150,7 +150,16 @@ export default class Browse extends React.Component {
|
|||||||
if (prefix === currentPath) return
|
if (prefix === currentPath) return
|
||||||
browserHistory.push(utils.pathJoin(currentBucket, encPrefix))
|
browserHistory.push(utils.pathJoin(currentBucket, encPrefix))
|
||||||
} else {
|
} else {
|
||||||
window.location = `${window.location.origin}/minio/download/${currentBucket}/${encPrefix}?token=${storage.getItem('token')}`
|
// Download the selected file.
|
||||||
|
web.CreateURLToken()
|
||||||
|
.then(res => {
|
||||||
|
let url = `${window.location.origin}/minio/download/${currentBucket}/${encPrefix}?token=${res.token}`
|
||||||
|
window.location = url
|
||||||
|
})
|
||||||
|
.catch(err => dispatch(actions.showAlert({
|
||||||
|
type: 'danger',
|
||||||
|
message: err.message
|
||||||
|
})))
|
||||||
}
|
}
|
||||||
}
|
}
|
||||||
|
|
||||||
@ -406,16 +415,24 @@ export default class Browse extends React.Component {
|
|||||||
}
|
}
|
||||||
|
|
||||||
downloadSelected() {
|
downloadSelected() {
|
||||||
const {dispatch} = this.props
|
const {dispatch, web} = this.props
|
||||||
let req = {
|
let req = {
|
||||||
bucketName: this.props.currentBucket,
|
bucketName: this.props.currentBucket,
|
||||||
objects: this.props.checkedObjects,
|
objects: this.props.checkedObjects,
|
||||||
prefix: this.props.currentPath
|
prefix: this.props.currentPath
|
||||||
}
|
}
|
||||||
let requestUrl = location.origin + "/minio/zip?token=" + localStorage.token
|
|
||||||
|
|
||||||
this.xhr = new XMLHttpRequest()
|
web.CreateURLToken()
|
||||||
dispatch(actions.downloadSelected(requestUrl, req, this.xhr))
|
.then(res => {
|
||||||
|
let requestUrl = location.origin + "/minio/zip?token=" + res.token
|
||||||
|
|
||||||
|
this.xhr = new XMLHttpRequest()
|
||||||
|
dispatch(actions.downloadSelected(requestUrl, req, this.xhr))
|
||||||
|
})
|
||||||
|
.catch(err => dispatch(actions.showAlert({
|
||||||
|
type: 'danger',
|
||||||
|
message: err.message
|
||||||
|
})))
|
||||||
}
|
}
|
||||||
|
|
||||||
clearSelected() {
|
clearSelected() {
|
||||||
|
@ -112,6 +112,9 @@ export default class Web {
|
|||||||
return res
|
return res
|
||||||
})
|
})
|
||||||
}
|
}
|
||||||
|
CreateURLToken() {
|
||||||
|
return this.makeCall('CreateURLToken')
|
||||||
|
}
|
||||||
GetBucketPolicy(args) {
|
GetBucketPolicy(args) {
|
||||||
return this.makeCall('GetBucketPolicy', args)
|
return this.makeCall('GetBucketPolicy', args)
|
||||||
}
|
}
|
||||||
|
@ -34,6 +34,9 @@ const (
|
|||||||
|
|
||||||
// Inter-node JWT token expiry is 100 years approx.
|
// Inter-node JWT token expiry is 100 years approx.
|
||||||
defaultInterNodeJWTExpiry = 100 * 365 * 24 * time.Hour
|
defaultInterNodeJWTExpiry = 100 * 365 * 24 * time.Hour
|
||||||
|
|
||||||
|
// URL JWT token expiry is one minute (might be exposed).
|
||||||
|
defaultURLJWTExpiry = time.Minute
|
||||||
)
|
)
|
||||||
|
|
||||||
var (
|
var (
|
||||||
@ -77,6 +80,10 @@ func authenticateWeb(accessKey, secretKey string) (string, error) {
|
|||||||
return authenticateJWT(accessKey, secretKey, defaultJWTExpiry)
|
return authenticateJWT(accessKey, secretKey, defaultJWTExpiry)
|
||||||
}
|
}
|
||||||
|
|
||||||
|
func authenticateURL(accessKey, secretKey string) (string, error) {
|
||||||
|
return authenticateJWT(accessKey, secretKey, defaultURLJWTExpiry)
|
||||||
|
}
|
||||||
|
|
||||||
func keyFuncCallback(jwtToken *jwtgo.Token) (interface{}, error) {
|
func keyFuncCallback(jwtToken *jwtgo.Token) (interface{}, error) {
|
||||||
if _, ok := jwtToken.Method.(*jwtgo.SigningMethodHMAC); !ok {
|
if _, ok := jwtToken.Method.(*jwtgo.SigningMethodHMAC); !ok {
|
||||||
return nil, fmt.Errorf("Unexpected signing method: %v", jwtToken.Header["alg"])
|
return nil, fmt.Errorf("Unexpected signing method: %v", jwtToken.Header["alg"])
|
||||||
|
@ -60,6 +60,8 @@ func testAuthenticate(authType string, t *testing.T) {
|
|||||||
_, err = authenticateNode(testCase.accessKey, testCase.secretKey)
|
_, err = authenticateNode(testCase.accessKey, testCase.secretKey)
|
||||||
} else if authType == "web" {
|
} else if authType == "web" {
|
||||||
_, err = authenticateWeb(testCase.accessKey, testCase.secretKey)
|
_, err = authenticateWeb(testCase.accessKey, testCase.secretKey)
|
||||||
|
} else if authType == "url" {
|
||||||
|
_, err = authenticateURL(testCase.accessKey, testCase.secretKey)
|
||||||
}
|
}
|
||||||
|
|
||||||
if testCase.expectedErr != nil {
|
if testCase.expectedErr != nil {
|
||||||
@ -83,6 +85,10 @@ func TestAuthenticateWeb(t *testing.T) {
|
|||||||
testAuthenticate("web", t)
|
testAuthenticate("web", t)
|
||||||
}
|
}
|
||||||
|
|
||||||
|
func TestAuthenticateURL(t *testing.T) {
|
||||||
|
testAuthenticate("url", t)
|
||||||
|
}
|
||||||
|
|
||||||
func BenchmarkAuthenticateNode(b *testing.B) {
|
func BenchmarkAuthenticateNode(b *testing.B) {
|
||||||
testPath, err := newTestConfig(globalMinioDefaultRegion)
|
testPath, err := newTestConfig(globalMinioDefaultRegion)
|
||||||
if err != nil {
|
if err != nil {
|
||||||
|
@ -467,6 +467,30 @@ func (web *webAPIHandlers) GetAuth(r *http.Request, args *WebGenericArgs, reply
|
|||||||
return nil
|
return nil
|
||||||
}
|
}
|
||||||
|
|
||||||
|
// URLTokenReply contains the reply for CreateURLToken.
|
||||||
|
type URLTokenReply struct {
|
||||||
|
Token string `json:"token"`
|
||||||
|
UIVersion string `json:"uiVersion"`
|
||||||
|
}
|
||||||
|
|
||||||
|
// CreateURLToken creates a URL token (short-lived) for GET requests.
|
||||||
|
func (web *webAPIHandlers) CreateURLToken(r *http.Request, args *WebGenericArgs, reply *URLTokenReply) error {
|
||||||
|
if !isHTTPRequestValid(r) {
|
||||||
|
return toJSONError(errAuthentication)
|
||||||
|
}
|
||||||
|
|
||||||
|
creds := serverConfig.GetCredential()
|
||||||
|
|
||||||
|
token, err := authenticateURL(creds.AccessKey, creds.SecretKey)
|
||||||
|
if err != nil {
|
||||||
|
return toJSONError(err)
|
||||||
|
}
|
||||||
|
|
||||||
|
reply.Token = token
|
||||||
|
reply.UIVersion = browser.UIVersion
|
||||||
|
return nil
|
||||||
|
}
|
||||||
|
|
||||||
// Upload - file upload handler.
|
// Upload - file upload handler.
|
||||||
func (web *webAPIHandlers) Upload(w http.ResponseWriter, r *http.Request) {
|
func (web *webAPIHandlers) Upload(w http.ResponseWriter, r *http.Request) {
|
||||||
objectAPI := web.ObjectAPI()
|
objectAPI := web.ObjectAPI()
|
||||||
|
@ -662,6 +662,45 @@ func testGetAuthWebHandler(obj ObjectLayer, instanceType string, t TestErrHandle
|
|||||||
}
|
}
|
||||||
}
|
}
|
||||||
|
|
||||||
|
func TestWebCreateURLToken(t *testing.T) {
|
||||||
|
ExecObjectLayerTest(t, testCreateURLToken)
|
||||||
|
}
|
||||||
|
|
||||||
|
func testCreateURLToken(obj ObjectLayer, instanceType string, t TestErrHandler) {
|
||||||
|
apiRouter := initTestWebRPCEndPoint(obj)
|
||||||
|
credentials := serverConfig.GetCredential()
|
||||||
|
|
||||||
|
authorization, err := getWebRPCToken(apiRouter, credentials.AccessKey, credentials.SecretKey)
|
||||||
|
if err != nil {
|
||||||
|
t.Fatal(err)
|
||||||
|
}
|
||||||
|
|
||||||
|
args := WebGenericArgs{}
|
||||||
|
tokenReply := &URLTokenReply{}
|
||||||
|
|
||||||
|
req, err := newTestWebRPCRequest("Web.CreateURLToken", authorization, args)
|
||||||
|
if err != nil {
|
||||||
|
t.Fatal(err)
|
||||||
|
}
|
||||||
|
|
||||||
|
rec := httptest.NewRecorder()
|
||||||
|
apiRouter.ServeHTTP(rec, req)
|
||||||
|
|
||||||
|
if rec.Code != http.StatusOK {
|
||||||
|
t.Fatalf("Expected the response status to be 200, but instead found `%d`", rec.Code)
|
||||||
|
}
|
||||||
|
|
||||||
|
err = getTestWebRPCResponse(rec, &tokenReply)
|
||||||
|
if err != nil {
|
||||||
|
t.Fatal(err)
|
||||||
|
}
|
||||||
|
|
||||||
|
// Ensure the token is valid now. It will expire later.
|
||||||
|
if !isAuthTokenValid(tokenReply.Token) {
|
||||||
|
t.Fatalf("token is not valid")
|
||||||
|
}
|
||||||
|
}
|
||||||
|
|
||||||
// Wrapper for calling Upload Handler
|
// Wrapper for calling Upload Handler
|
||||||
func TestWebHandlerUpload(t *testing.T) {
|
func TestWebHandlerUpload(t *testing.T) {
|
||||||
ExecObjectLayerTest(t, testUploadWebHandler)
|
ExecObjectLayerTest(t, testUploadWebHandler)
|
||||||
@ -815,6 +854,32 @@ func testDownloadWebHandler(obj ObjectLayer, instanceType string, t TestErrHandl
|
|||||||
t.Fatalf("The downloaded file is corrupted")
|
t.Fatalf("The downloaded file is corrupted")
|
||||||
}
|
}
|
||||||
|
|
||||||
|
// Temporary token should succeed.
|
||||||
|
tmpToken, err := authenticateURL(credentials.AccessKey, credentials.SecretKey)
|
||||||
|
if err != nil {
|
||||||
|
t.Fatal(err)
|
||||||
|
}
|
||||||
|
|
||||||
|
code, bodyContent = test(tmpToken)
|
||||||
|
|
||||||
|
if code != http.StatusOK {
|
||||||
|
t.Fatalf("Expected the response status to be 200, but instead found `%d`", code)
|
||||||
|
}
|
||||||
|
|
||||||
|
if !bytes.Equal(bodyContent, content) {
|
||||||
|
t.Fatalf("The downloaded file is corrupted")
|
||||||
|
}
|
||||||
|
|
||||||
|
// Old token should fail.
|
||||||
|
code, bodyContent = test("eyJhbGciOiJIUzUxMiIsInR5cCI6IkpXVCJ9.eyJleHAiOjE1MDAzMzIwOTUsImlhdCI6MTUwMDMzMjAzNSwic3ViIjoiRFlLSU01VlRZNDBJMVZQSE5VMTkifQ.tXQ45GJc8eOFet_a4VWVyeqJEOPWybotQYNr2zVxBpEOICkGbu_YWGhd9TkLLe1E65oeeiLHPdXSN8CzcbPoRA")
|
||||||
|
if code != http.StatusForbidden {
|
||||||
|
t.Fatalf("Expected the response status to be 403, but instead found `%d`", code)
|
||||||
|
}
|
||||||
|
|
||||||
|
if !bytes.Equal(bodyContent, bytes.NewBufferString("Authentication failed, check your access credentials").Bytes()) {
|
||||||
|
t.Fatalf("Expected authentication error message, got %v", bodyContent)
|
||||||
|
}
|
||||||
|
|
||||||
// Unauthenticated download should fail.
|
// Unauthenticated download should fail.
|
||||||
code, _ = test("")
|
code, _ = test("")
|
||||||
if code != http.StatusForbidden {
|
if code != http.StatusForbidden {
|
||||||
@ -848,7 +913,7 @@ func testWebHandlerDownloadZip(obj ObjectLayer, instanceType string, t TestErrHa
|
|||||||
apiRouter := initTestWebRPCEndPoint(obj)
|
apiRouter := initTestWebRPCEndPoint(obj)
|
||||||
credentials := serverConfig.GetCredential()
|
credentials := serverConfig.GetCredential()
|
||||||
|
|
||||||
authorization, err := getWebRPCToken(apiRouter, credentials.AccessKey, credentials.SecretKey)
|
authorization, err := authenticateURL(credentials.AccessKey, credentials.SecretKey)
|
||||||
if err != nil {
|
if err != nil {
|
||||||
t.Fatal("Cannot authenticate")
|
t.Fatal("Cannot authenticate")
|
||||||
}
|
}
|
||||||
|
@ -83,6 +83,9 @@ func registerWebRouter(mux *router.Router) error {
|
|||||||
// RPC handler at URI - /minio/webrpc
|
// RPC handler at URI - /minio/webrpc
|
||||||
webBrowserRouter.Methods("POST").Path("/webrpc").Handler(webRPC)
|
webBrowserRouter.Methods("POST").Path("/webrpc").Handler(webRPC)
|
||||||
webBrowserRouter.Methods("PUT").Path("/upload/{bucket}/{object:.+}").HandlerFunc(web.Upload)
|
webBrowserRouter.Methods("PUT").Path("/upload/{bucket}/{object:.+}").HandlerFunc(web.Upload)
|
||||||
|
|
||||||
|
// These methods use short-expiry tokens in the URLs. These tokens may unintentionally
|
||||||
|
// be logged, so a new one must be generated for each request.
|
||||||
webBrowserRouter.Methods("GET").Path("/download/{bucket}/{object:.+}").Queries("token", "{token:.*}").HandlerFunc(web.Download)
|
webBrowserRouter.Methods("GET").Path("/download/{bucket}/{object:.+}").Queries("token", "{token:.*}").HandlerFunc(web.Download)
|
||||||
webBrowserRouter.Methods("POST").Path("/zip").Queries("token", "{token:.*}").HandlerFunc(web.DownloadZip)
|
webBrowserRouter.Methods("POST").Path("/zip").Queries("token", "{token:.*}").HandlerFunc(web.DownloadZip)
|
||||||
|
|
||||||
|
Loading…
x
Reference in New Issue
Block a user