debian-mirror-gitlab/lib/gitlab/jwt_authenticatable.rb

55 lines
1.7 KiB
Ruby
Raw Normal View History

2019-12-04 20:38:33 +05:30
# frozen_string_literal: true
module Gitlab
module JwtAuthenticatable
# Supposedly the effective key size for HMAC-SHA256 is 256 bits, i.e. 32
# bytes https://tools.ietf.org/html/rfc4868#section-2.6
SECRET_LENGTH = 32
def self.included(base)
base.extend(ClassMethods)
end
module ClassMethods
include Gitlab::Utils::StrongMemoize
2022-03-02 08:16:31 +05:30
def decode_jwt(encoded_message, jwt_secret = secret, issuer: nil, iat_after: nil)
options = { algorithm: 'HS256' }
options = options.merge(iss: issuer, verify_iss: true) if issuer.present?
options = options.merge(verify_iat: true) if iat_after.present?
decoded_message = JWT.decode(encoded_message, jwt_secret, true, options)
payload = decoded_message[0]
if iat_after.present?
raise JWT::DecodeError, "JWT iat claim is missing" if payload['iat'].blank?
iat = payload['iat'].to_i
raise JWT::ExpiredSignature, 'Token has expired' if iat < iat_after.to_i
end
decoded_message
2019-12-04 20:38:33 +05:30
end
def secret
strong_memoize(:secret) do
2022-03-02 08:16:31 +05:30
read_secret(secret_path)
end
end
def read_secret(path)
Base64.strict_decode64(File.read(path).chomp).tap do |bytes|
raise "#{path} does not contain #{SECRET_LENGTH} bytes" if bytes.length != SECRET_LENGTH
2019-12-04 20:38:33 +05:30
end
end
2022-03-02 08:16:31 +05:30
def write_secret(path = secret_path)
2019-12-04 20:38:33 +05:30
bytes = SecureRandom.random_bytes(SECRET_LENGTH)
2022-03-02 08:16:31 +05:30
File.open(path, 'w:BINARY', 0600) do |f|
2019-12-04 20:38:33 +05:30
f.chmod(0600) # If the file already existed, the '0600' passed to 'open' above was a no-op.
f.write(Base64.strict_encode64(bytes))
end
end
end
end
end