| | package integrationkey |
| |
|
| | import ( |
| | "context" |
| | "database/sql" |
| | "errors" |
| | "time" |
| |
|
| | "github.com/golang-jwt/jwt/v5" |
| | "github.com/google/uuid" |
| | "github.com/target/goalert/expflag" |
| | "github.com/target/goalert/gadb" |
| | "github.com/target/goalert/permission" |
| | "github.com/target/goalert/util/log" |
| |
|
| | "github.com/target/goalert/validation" |
| | "github.com/target/goalert/validation/validate" |
| | ) |
| |
|
| | |
| | const Issuer = "goalert" |
| |
|
| | |
| | const Audience = "uik-key-v1" |
| |
|
| | func newClaims(keyID, tokenID uuid.UUID) jwt.Claims { |
| | n := time.Now() |
| | return jwt.RegisteredClaims{ |
| | ID: tokenID.String(), |
| | Subject: keyID.String(), |
| | IssuedAt: jwt.NewNumericDate(n), |
| | NotBefore: jwt.NewNumericDate(n.Add(-time.Minute)), |
| | Issuer: Issuer, |
| | Audience: []string{Audience}, |
| | } |
| | } |
| |
|
| | func (s *Store) AuthorizeUIK(ctx context.Context, tokStr string) (context.Context, error) { |
| | if !expflag.ContextHas(ctx, expflag.UnivKeys) { |
| | return ctx, permission.Unauthorized() |
| | } |
| |
|
| | var claims jwt.RegisteredClaims |
| | _, err := s.keys.VerifyJWT(tokStr, &claims, Issuer, Audience) |
| | if err != nil { |
| | return ctx, permission.Unauthorized() |
| | } |
| |
|
| | keyID, err := uuid.Parse(claims.Subject) |
| | if err != nil { |
| | log.Logf(ctx, "apikey: invalid subject: %v", err) |
| | return ctx, permission.Unauthorized() |
| | } |
| | tokID, err := uuid.Parse(claims.ID) |
| | if err != nil { |
| | log.Logf(ctx, "apikey: invalid token ID: %v", err) |
| | return ctx, permission.Unauthorized() |
| | } |
| |
|
| | serviceID, err := gadb.New(s.db).IntKeyUIKValidateService(ctx, gadb.IntKeyUIKValidateServiceParams{ |
| | KeyID: keyID, |
| | TokenID: uuid.NullUUID{UUID: tokID, Valid: true}, |
| | }) |
| | if errors.Is(err, sql.ErrNoRows) { |
| | return ctx, permission.Unauthorized() |
| | } |
| | if err != nil { |
| | return ctx, err |
| | } |
| |
|
| | ctx = permission.ServiceSourceContext(ctx, serviceID.String(), &permission.SourceInfo{ |
| | Type: permission.SourceTypeUIK, |
| | ID: keyID.String(), |
| | }) |
| |
|
| | return ctx, nil |
| | } |
| |
|
| | func (s *Store) TokenHints(ctx context.Context, db gadb.DBTX, id uuid.UUID) (primary, secondary string, err error) { |
| | err = permission.LimitCheckAny(ctx, permission.User) |
| | if err != nil { |
| | return "", "", err |
| | } |
| |
|
| | row, err := gadb.New(s.db).IntKeyTokenHints(ctx, id) |
| | if errors.Is(err, sql.ErrNoRows) { |
| | return "", "", nil |
| | } |
| | if err != nil { |
| | return "", "", err |
| | } |
| |
|
| | return row.PrimaryTokenHint.String, row.SecondaryTokenHint.String, nil |
| | } |
| |
|
| | func (s *Store) GenerateToken(ctx context.Context, db gadb.DBTX, id uuid.UUID) (string, error) { |
| | err := permission.LimitCheckAny(ctx, permission.User) |
| | if err != nil { |
| | return "", err |
| | } |
| |
|
| | key, err := gadb.New(db).IntKeyFindOne(ctx, id) |
| | if err != nil { |
| | return "", err |
| | } |
| | if key.Type != gadb.EnumIntegrationKeysType(TypeUniversal) { |
| | return "", validation.NewFieldError("ID", "key is not a universal key") |
| | } |
| |
|
| | tokID := uuid.New() |
| | tokStr, err := s.keys.SignJWT(newClaims(id, tokID)) |
| | if err != nil { |
| | return "", err |
| | } |
| |
|
| | hint := tokStr[:2] + "..." + tokStr[len(tokStr)-4:] |
| |
|
| | err = s.setToken(ctx, db, id, tokID, hint) |
| | if err != nil { |
| | return "", err |
| | } |
| |
|
| | return tokStr, nil |
| | } |
| |
|
| | func (s *Store) setToken(ctx context.Context, db gadb.DBTX, keyID, tokenID uuid.UUID, tokenHint string) error { |
| | err := permission.LimitCheckAny(ctx, permission.User) |
| | if err != nil { |
| | return err |
| | } |
| |
|
| | if err := validate.ASCII("Token Hint", tokenHint, 1, 32); err != nil { |
| | |
| | return errors.New("invalid token hint") |
| | } |
| |
|
| | gdb := gadb.New(db) |
| |
|
| | _, err = gdb.IntKeySetSecondaryToken(ctx, gadb.IntKeySetSecondaryTokenParams{ |
| | ID: keyID, |
| | SecondaryToken: uuid.NullUUID{UUID: tokenID, Valid: true}, |
| | SecondaryTokenHint: sql.NullString{String: tokenHint, Valid: true}, |
| | }) |
| | if errors.Is(err, sql.ErrNoRows) { |
| | |
| | _, err = gdb.IntKeySetPrimaryToken(ctx, gadb.IntKeySetPrimaryTokenParams{ |
| | ID: keyID, |
| | PrimaryToken: uuid.NullUUID{UUID: tokenID, Valid: true}, |
| | PrimaryTokenHint: sql.NullString{String: tokenHint, Valid: true}, |
| | }) |
| | if errors.Is(err, sql.ErrNoRows) { |
| | return validation.NewGenericError("key not found, or already has primary and secondary tokens") |
| | } |
| |
|
| | |
| | } |
| | if err != nil { |
| | return err |
| | } |
| |
|
| | return nil |
| | } |
| |
|
| | func (s *Store) PromoteSecondaryToken(ctx context.Context, db gadb.DBTX, id uuid.UUID) error { |
| | err := permission.LimitCheckAny(ctx, permission.User) |
| | if err != nil { |
| | return err |
| | } |
| |
|
| | hint, err := gadb.New(db).IntKeyPromoteSecondary(ctx, id) |
| | if err != nil { |
| | return err |
| | } |
| |
|
| | if !hint.Valid { |
| | return validation.NewGenericError("no secondary token to promote") |
| | } |
| |
|
| | return nil |
| | } |
| |
|
| | func (s *Store) DeleteSecondaryToken(ctx context.Context, db gadb.DBTX, id uuid.UUID) error { |
| | err := permission.LimitCheckAny(ctx, permission.User) |
| | if err != nil { |
| | return err |
| | } |
| |
|
| | err = gadb.New(db).IntKeyDeleteSecondaryToken(ctx, id) |
| | if err != nil { |
| | return err |
| | } |
| |
|
| | return nil |
| | } |
| |
|