2019-11-25 12:30:26 +03:00
|
|
|
// Package auth provides authentication and authorization capability
|
|
|
|
package auth
|
|
|
|
|
2019-11-25 12:33:30 +03:00
|
|
|
import (
|
2020-03-04 12:54:52 +03:00
|
|
|
"context"
|
|
|
|
"encoding/json"
|
2020-03-23 19:19:30 +03:00
|
|
|
"errors"
|
2020-03-25 14:20:53 +03:00
|
|
|
"fmt"
|
2019-11-25 12:33:30 +03:00
|
|
|
"time"
|
2020-03-04 12:54:52 +03:00
|
|
|
|
|
|
|
"github.com/micro/go-micro/v2/metadata"
|
2019-11-25 12:33:30 +03:00
|
|
|
)
|
|
|
|
|
2020-03-23 19:19:30 +03:00
|
|
|
var (
|
|
|
|
// ErrNotFound is returned when a resouce cannot be found
|
|
|
|
ErrNotFound = errors.New("not found")
|
|
|
|
// ErrEncodingToken is returned when the service encounters an error during encoding
|
|
|
|
ErrEncodingToken = errors.New("error encoding the token")
|
|
|
|
// ErrInvalidToken is returned when the token provided is not valid
|
|
|
|
ErrInvalidToken = errors.New("invalid token provided")
|
|
|
|
// ErrInvalidRole is returned when the role provided was invalid
|
|
|
|
ErrInvalidRole = errors.New("invalid role")
|
|
|
|
// ErrForbidden is returned when a user does not have the necessary roles to access a resource
|
|
|
|
ErrForbidden = errors.New("resource forbidden")
|
2020-03-25 14:20:53 +03:00
|
|
|
// BearerScheme used for Authorization header
|
|
|
|
BearerScheme = "Bearer "
|
2020-03-23 19:19:30 +03:00
|
|
|
)
|
|
|
|
|
2019-11-25 12:30:26 +03:00
|
|
|
// Auth providers authentication and authorization
|
|
|
|
type Auth interface {
|
2020-03-23 19:19:30 +03:00
|
|
|
// Init the auth
|
|
|
|
Init(opts ...Option)
|
|
|
|
// Options set for auth
|
2020-02-10 11:26:28 +03:00
|
|
|
Options() Options
|
2020-03-23 19:19:30 +03:00
|
|
|
// Generate a new account
|
2020-02-03 11:16:02 +03:00
|
|
|
Generate(id string, opts ...GenerateOption) (*Account, error)
|
2020-03-23 19:19:30 +03:00
|
|
|
// Grant access to a resource
|
|
|
|
Grant(role string, res *Resource) error
|
|
|
|
// Revoke access to a resource
|
|
|
|
Revoke(role string, res *Resource) error
|
|
|
|
// Verify an account has access to a resource
|
|
|
|
Verify(acc *Account, res *Resource) error
|
|
|
|
// Inspect a token
|
|
|
|
Inspect(token string) (*Account, error)
|
|
|
|
// Refresh an account using a secret
|
|
|
|
Refresh(secret string, opts ...RefreshOption) (*Token, error)
|
|
|
|
// String returns the name of the implementation
|
2020-02-16 22:36:45 +03:00
|
|
|
String() string
|
2019-12-18 00:27:05 +03:00
|
|
|
}
|
|
|
|
|
2020-02-03 11:16:02 +03:00
|
|
|
// Resource is an entity such as a user or
|
|
|
|
type Resource struct {
|
2019-12-18 00:27:05 +03:00
|
|
|
// Name of the resource
|
|
|
|
Name string
|
2020-02-03 11:16:02 +03:00
|
|
|
// Type of resource, e.g.
|
|
|
|
Type string
|
2020-03-23 19:19:30 +03:00
|
|
|
// Endpoint resource e.g NotesService.Create
|
|
|
|
Endpoint string
|
2020-02-03 11:16:02 +03:00
|
|
|
}
|
|
|
|
|
|
|
|
// Account provided by an auth provider
|
|
|
|
type Account struct {
|
2020-03-07 14:06:57 +03:00
|
|
|
// ID of the account (UUIDV4, email or username)
|
2020-03-23 19:19:30 +03:00
|
|
|
ID string `json:"id"`
|
|
|
|
// Secret used to renew the account
|
|
|
|
Secret *Token `json:"secret"`
|
|
|
|
// Roles associated with the Account
|
|
|
|
Roles []string `json:"roles"`
|
|
|
|
// Any other associated metadata
|
|
|
|
Metadata map[string]string `json:"metadata"`
|
|
|
|
}
|
|
|
|
|
|
|
|
// Token can be short or long lived
|
|
|
|
type Token struct {
|
|
|
|
// The token itself
|
2020-02-14 10:32:02 +03:00
|
|
|
Token string `json:"token"`
|
2020-03-23 19:19:30 +03:00
|
|
|
// Type of token, e.g. JWT
|
|
|
|
Type string `json:"type"`
|
|
|
|
// Time of token creation
|
2019-11-25 12:30:26 +03:00
|
|
|
Created time.Time `json:"created"`
|
2020-03-23 19:19:30 +03:00
|
|
|
// Time of token expiry
|
2019-11-25 12:30:26 +03:00
|
|
|
Expiry time.Time `json:"expiry"`
|
2020-03-23 19:19:30 +03:00
|
|
|
// Subject of the token, e.g. the account ID
|
|
|
|
Subject string `json:"subject"`
|
|
|
|
// Roles granted to the token
|
|
|
|
Roles []string `json:"roles"`
|
|
|
|
// Metadata embedded in the token
|
2019-11-25 12:30:26 +03:00
|
|
|
Metadata map[string]string `json:"metadata"`
|
|
|
|
}
|
2020-03-04 12:54:52 +03:00
|
|
|
|
|
|
|
const (
|
2020-03-23 19:19:30 +03:00
|
|
|
// MetadataKey is the key used when storing the account in metadata
|
2020-03-04 12:54:52 +03:00
|
|
|
MetadataKey = "auth-account"
|
2020-03-23 19:19:30 +03:00
|
|
|
// TokenCookieName is the name of the cookie which stores the auth token
|
|
|
|
TokenCookieName = "micro-token"
|
|
|
|
// SecretCookieName is the name of the cookie which stores the auth secret
|
|
|
|
SecretCookieName = "micro-secret"
|
2020-03-04 12:54:52 +03:00
|
|
|
)
|
|
|
|
|
|
|
|
// AccountFromContext gets the account from the context, which
|
|
|
|
// is set by the auth wrapper at the start of a call. If the account
|
|
|
|
// is not set, a nil account will be returned. The error is only returned
|
|
|
|
// when there was a problem retrieving an account
|
|
|
|
func AccountFromContext(ctx context.Context) (*Account, error) {
|
|
|
|
str, ok := metadata.Get(ctx, MetadataKey)
|
|
|
|
// there was no account set
|
|
|
|
if !ok {
|
|
|
|
return nil, nil
|
|
|
|
}
|
|
|
|
|
|
|
|
var acc *Account
|
|
|
|
// metadata is stored as a string, so unmarshal to an account
|
|
|
|
if err := json.Unmarshal([]byte(str), &acc); err != nil {
|
|
|
|
return nil, err
|
|
|
|
}
|
|
|
|
|
|
|
|
return acc, nil
|
|
|
|
}
|
|
|
|
|
|
|
|
// ContextWithAccount sets the account in the context
|
|
|
|
func ContextWithAccount(ctx context.Context, account *Account) (context.Context, error) {
|
|
|
|
// metadata is stored as a string, so marshal to bytes
|
|
|
|
bytes, err := json.Marshal(account)
|
|
|
|
if err != nil {
|
|
|
|
return ctx, err
|
|
|
|
}
|
|
|
|
|
|
|
|
// generate a new context with the MetadataKey set
|
|
|
|
return metadata.Set(ctx, MetadataKey, string(bytes)), nil
|
|
|
|
}
|
2020-03-25 14:20:53 +03:00
|
|
|
|
|
|
|
// ContextWithToken sets the auth token in the context
|
|
|
|
func ContextWithToken(ctx context.Context, token string) (context.Context, error) {
|
|
|
|
return metadata.Set(ctx, "Authorization", fmt.Sprintf("%v%v", BearerScheme, token)), nil
|
|
|
|
}
|