mirror of
https://github.com/gravitational/teleport
synced 2024-10-20 17:23:22 +00:00
904b0d0488
Added support for an identity aware, RBAC enforcing, mutually authenticated, web application proxy to Teleport. * Updated services.Server to support an application servers. * Updated services.WebSession to support application sessions. * Added CRUD RPCs for "AppServers". * Added CRUD RPCs for "AppSessions". * Added RBAC support using labels for applications. * Added JWT signer as a services.CertAuthority type. * Added support for signing and verifying JWT tokens. * Refactored dynamic label and heartbeat code into standalone packages. * Added application support to web proxies and new "app_service" to proxy mutually authenticated connections from proxy to an internal application.
87 lines
2.5 KiB
Go
87 lines
2.5 KiB
Go
/*
|
|
Copyright 2020 Gravitational, Inc.
|
|
|
|
Licensed under the Apache License, Version 2.0 (the "License");
|
|
you may not use this file except in compliance with the License.
|
|
You may obtain a copy of the License at
|
|
|
|
http://www.apache.org/licenses/LICENSE-2.0
|
|
|
|
Unless required by applicable law or agreed to in writing, software
|
|
distributed under the License is distributed on an "AS IS" BASIS,
|
|
WITHOUT WARRANTIES OR CONDITIONS OF ANY KIND, either express or implied.
|
|
See the License for the specific language governing permissions and
|
|
limitations under the License.
|
|
*/
|
|
|
|
package jwt
|
|
|
|
import (
|
|
"crypto"
|
|
"crypto/rsa"
|
|
"encoding/base64"
|
|
"math/big"
|
|
|
|
"github.com/gravitational/teleport/lib/defaults"
|
|
"github.com/gravitational/teleport/lib/utils"
|
|
"github.com/gravitational/trace"
|
|
)
|
|
|
|
// JWK is a JSON Web Key, described in detail in RFC 7517.
|
|
type JWK struct {
|
|
// KeyType is the type of asymmetric key used.
|
|
KeyType string `json:"kty"`
|
|
// Algorithm used to sign.
|
|
Algorithm string `json:"alg"`
|
|
// N is the modulus of the public key.
|
|
N string `json:"n"`
|
|
// E is the exponent of the public key.
|
|
E string `json:"e"`
|
|
}
|
|
|
|
// MarshalJWK will marshal a supported public key into JWK format.
|
|
func MarshalJWK(bytes []byte) (JWK, error) {
|
|
// Parse the public key and validate type.
|
|
p, err := utils.ParsePublicKey(bytes)
|
|
if err != nil {
|
|
return JWK{}, trace.Wrap(err)
|
|
}
|
|
publicKey, ok := p.(*rsa.PublicKey)
|
|
if !ok {
|
|
return JWK{}, trace.BadParameter("unsupported key format %T", p)
|
|
}
|
|
|
|
// Marshal to JWK.
|
|
return JWK{
|
|
KeyType: string(defaults.ApplicationTokenKeyType),
|
|
Algorithm: string(defaults.ApplicationTokenAlgorithm),
|
|
N: base64.RawURLEncoding.EncodeToString(publicKey.N.Bytes()),
|
|
E: base64.RawURLEncoding.EncodeToString(big.NewInt(int64(publicKey.E)).Bytes()),
|
|
}, nil
|
|
}
|
|
|
|
// UnmarshalJWK will unmarshal JWK into a crypto.PublicKey that can be used
|
|
// to validate signatures.
|
|
func UnmarshalJWK(jwk JWK) (crypto.PublicKey, error) {
|
|
if jwk.KeyType != string(defaults.ApplicationTokenKeyType) {
|
|
return nil, trace.BadParameter("unsupported key type %v", jwk.KeyType)
|
|
}
|
|
if jwk.Algorithm != string(defaults.ApplicationTokenAlgorithm) {
|
|
return nil, trace.BadParameter("unsupported algorithm %v", jwk.Algorithm)
|
|
}
|
|
|
|
n, err := base64.RawURLEncoding.DecodeString(jwk.N)
|
|
if err != nil {
|
|
return nil, trace.Wrap(err)
|
|
}
|
|
e, err := base64.RawURLEncoding.DecodeString(jwk.E)
|
|
if err != nil {
|
|
return nil, trace.Wrap(err)
|
|
}
|
|
|
|
return &rsa.PublicKey{
|
|
N: new(big.Int).SetBytes(n),
|
|
E: int(new(big.Int).SetBytes(e).Uint64()),
|
|
}, nil
|
|
}
|