2020-08-19 19:18:36 +00:00
|
|
|
package main
|
|
|
|
|
|
|
|
import (
|
2020-09-18 00:40:46 +00:00
|
|
|
"bufio"
|
2020-08-19 19:18:36 +00:00
|
|
|
"crypto/rand"
|
|
|
|
"encoding/hex"
|
|
|
|
"encoding/json"
|
|
|
|
"fmt"
|
|
|
|
"io"
|
|
|
|
"io/ioutil"
|
|
|
|
"os"
|
2020-09-18 00:40:46 +00:00
|
|
|
"strings"
|
2020-08-19 19:18:36 +00:00
|
|
|
|
|
|
|
"github.com/gbrlsnchs/jwt/v3"
|
|
|
|
"github.com/urfave/cli/v2"
|
|
|
|
|
2020-09-18 00:40:46 +00:00
|
|
|
"github.com/filecoin-project/go-jsonrpc/auth"
|
2020-08-19 19:18:36 +00:00
|
|
|
"github.com/filecoin-project/lotus/api/apistruct"
|
|
|
|
"github.com/filecoin-project/lotus/chain/types"
|
|
|
|
"github.com/filecoin-project/lotus/node/modules"
|
|
|
|
)
|
|
|
|
|
|
|
|
var jwtCmd = &cli.Command{
|
|
|
|
Name: "jwt",
|
|
|
|
Usage: "work with lotus jwt secrets and tokens",
|
|
|
|
Description: `The subcommands of jwt provide helpful tools for working with jwt files without
|
|
|
|
having to run the lotus daemon.`,
|
|
|
|
Subcommands: []*cli.Command{
|
|
|
|
jwtNewCmd,
|
2020-09-18 00:40:46 +00:00
|
|
|
jwtTokenCmd,
|
|
|
|
},
|
|
|
|
}
|
|
|
|
|
|
|
|
var jwtTokenCmd = &cli.Command{
|
|
|
|
Name: "token",
|
|
|
|
Usage: "create a token for a given jwt secret",
|
|
|
|
ArgsUsage: "<name>",
|
|
|
|
Description: `The jwt tokens have four different levels of permissions that provide some ability
|
|
|
|
to control access to what methods can be invoked by the holder of the token.
|
|
|
|
|
|
|
|
This command only works on jwt secrets that are base16 encoded files, such as those produced by the
|
|
|
|
sibling 'new' command.
|
|
|
|
`,
|
|
|
|
Flags: []cli.Flag{
|
|
|
|
&cli.StringFlag{
|
|
|
|
Name: "output",
|
|
|
|
Value: "token",
|
|
|
|
Usage: "specify a name",
|
|
|
|
},
|
|
|
|
&cli.BoolFlag{
|
|
|
|
Name: "read",
|
|
|
|
Value: false,
|
|
|
|
Usage: "add read permissions to the token",
|
|
|
|
},
|
|
|
|
&cli.BoolFlag{
|
|
|
|
Name: "write",
|
|
|
|
Value: false,
|
|
|
|
Usage: "add write permissions to the token",
|
|
|
|
},
|
|
|
|
&cli.BoolFlag{
|
|
|
|
Name: "sign",
|
|
|
|
Value: false,
|
|
|
|
Usage: "add sign permissions to the token",
|
|
|
|
},
|
|
|
|
&cli.BoolFlag{
|
|
|
|
Name: "admin",
|
|
|
|
Value: false,
|
|
|
|
Usage: "add admin permissions to the token",
|
|
|
|
},
|
|
|
|
},
|
|
|
|
Action: func(cctx *cli.Context) error {
|
|
|
|
if !cctx.Args().Present() {
|
|
|
|
return fmt.Errorf("please specify a name")
|
|
|
|
}
|
|
|
|
|
|
|
|
inputFile, err := os.Open(cctx.Args().First())
|
|
|
|
if err != nil {
|
|
|
|
return err
|
|
|
|
}
|
|
|
|
defer inputFile.Close() //nolint:errcheck
|
|
|
|
input := bufio.NewReader(inputFile)
|
|
|
|
|
|
|
|
encoded, err := ioutil.ReadAll(input)
|
|
|
|
if err != nil {
|
|
|
|
return err
|
|
|
|
}
|
|
|
|
|
|
|
|
decoded, err := hex.DecodeString(strings.TrimSpace(string(encoded)))
|
|
|
|
if err != nil {
|
|
|
|
return err
|
|
|
|
}
|
|
|
|
|
|
|
|
var keyInfo types.KeyInfo
|
|
|
|
if err := json.Unmarshal(decoded, &keyInfo); err != nil {
|
|
|
|
return err
|
|
|
|
}
|
|
|
|
|
|
|
|
perms := []auth.Permission{}
|
|
|
|
|
|
|
|
if cctx.Bool("read") {
|
|
|
|
perms = append(perms, apistruct.PermRead)
|
|
|
|
}
|
|
|
|
|
|
|
|
if cctx.Bool("write") {
|
|
|
|
perms = append(perms, apistruct.PermWrite)
|
|
|
|
}
|
|
|
|
|
|
|
|
if cctx.Bool("sign") {
|
|
|
|
perms = append(perms, apistruct.PermSign)
|
|
|
|
}
|
|
|
|
|
|
|
|
if cctx.Bool("admin") {
|
|
|
|
perms = append(perms, apistruct.PermAdmin)
|
|
|
|
}
|
|
|
|
|
|
|
|
p := modules.JwtPayload{
|
|
|
|
Allow: perms,
|
|
|
|
}
|
|
|
|
|
|
|
|
token, err := jwt.Sign(&p, jwt.NewHS256(keyInfo.PrivateKey))
|
|
|
|
if err != nil {
|
|
|
|
return err
|
|
|
|
}
|
|
|
|
|
|
|
|
return ioutil.WriteFile(cctx.String("output"), token, 0600)
|
2020-08-19 19:18:36 +00:00
|
|
|
},
|
|
|
|
}
|
|
|
|
|
|
|
|
var jwtNewCmd = &cli.Command{
|
|
|
|
Name: "new",
|
|
|
|
Usage: "create a new jwt secret and token for lotus",
|
|
|
|
ArgsUsage: "<name>",
|
|
|
|
Description: `Jwt tokens are used to authenticate api requests to the lotus daemon.
|
|
|
|
|
|
|
|
The created jwt token have full privileges and should not be shared.`,
|
|
|
|
Flags: []cli.Flag{},
|
|
|
|
Action: func(cctx *cli.Context) error {
|
|
|
|
if !cctx.Args().Present() {
|
|
|
|
return fmt.Errorf("please specify a name")
|
|
|
|
}
|
|
|
|
|
|
|
|
keyName := cctx.Args().First()
|
|
|
|
|
|
|
|
sk, err := ioutil.ReadAll(io.LimitReader(rand.Reader, 32))
|
|
|
|
if err != nil {
|
|
|
|
return err
|
|
|
|
}
|
|
|
|
|
|
|
|
keyInfo := types.KeyInfo{
|
|
|
|
Type: modules.KTJwtHmacSecret,
|
|
|
|
PrivateKey: sk,
|
|
|
|
}
|
|
|
|
|
|
|
|
p := modules.JwtPayload{
|
|
|
|
Allow: apistruct.AllPermissions,
|
|
|
|
}
|
|
|
|
|
|
|
|
token, err := jwt.Sign(&p, jwt.NewHS256(keyInfo.PrivateKey))
|
|
|
|
if err != nil {
|
|
|
|
return err
|
|
|
|
}
|
|
|
|
|
|
|
|
filename := fmt.Sprintf("jwt-%s.jwts", keyName)
|
|
|
|
file, err := os.OpenFile(filename, os.O_RDWR|os.O_CREATE|os.O_TRUNC, 0600)
|
|
|
|
if err != nil {
|
|
|
|
return err
|
|
|
|
}
|
|
|
|
|
|
|
|
defer func() {
|
|
|
|
if err := file.Close(); err != nil {
|
|
|
|
log.Warnf("failed to close output file: %w", err)
|
|
|
|
}
|
|
|
|
}()
|
|
|
|
|
|
|
|
bytes, err := json.Marshal(keyInfo)
|
|
|
|
if err != nil {
|
|
|
|
return err
|
|
|
|
}
|
|
|
|
|
|
|
|
encoded := hex.EncodeToString(bytes)
|
|
|
|
if _, err := file.Write([]byte(encoded)); err != nil {
|
|
|
|
return err
|
|
|
|
}
|
|
|
|
|
|
|
|
filenameToken := fmt.Sprintf("jwt-%s.token", keyName)
|
|
|
|
return ioutil.WriteFile(filenameToken, token, 0600)
|
|
|
|
},
|
|
|
|
}
|