blob: 51cc6842e68d4a62766ca851e3b6474dfedac6a3 [file] [log] [blame]
/**
* Licensed under the Apache License, Version 2.0 (the "License");
* you may not use this file except in compliance with the License.
* You may obtain a copy of the License at
*
* http://www.apache.org/licenses/LICENSE-2.0
*
* Unless required by applicable law or agreed to in writing, software
* distributed under the License is distributed on an "AS IS" BASIS,
* WITHOUT WARRANTIES OR CONDITIONS OF ANY KIND, either express or implied.
* See the License for the specific language governing permissions and
* limitations under the License.
*/
package io.streamnative.pulsar.manager.service.impl;
import io.jsonwebtoken.*;
import io.jsonwebtoken.security.Keys;
import io.streamnative.pulsar.manager.service.JwtService;
import lombok.extern.slf4j.Slf4j;
import org.apache.pulsar.broker.authentication.utils.AuthTokenUtils;
import org.apache.pulsar.common.util.RelativeTimeUtil;
import org.springframework.beans.factory.annotation.Autowired;
import org.springframework.beans.factory.annotation.Value;
import org.springframework.stereotype.Service;
import java.io.IOException;
import java.security.Key;
import java.util.Date;
import java.util.Map;
import java.util.Optional;
import java.util.concurrent.ConcurrentHashMap;
import java.util.concurrent.TimeUnit;
@Slf4j
@Service
public class JwtServiceImpl implements JwtService {
private int sessionTime;
@Value("${jwt.broker.token.mode}")
private String jwtBrokerTokenMode;
@Value("${jwt.broker.secret.key}")
private String jwtBrokerSecretKey;
@Value("${jwt.broker.private.key}")
private String jwtBrokerPrivateKey;
@Value("${jwt.broker.public.key}")
private String jwtBrokerPublicKey;
private final Map<String, String> tokens = new ConcurrentHashMap<>();
private final Key key = Keys.secretKeyFor(SignatureAlgorithm.HS256);
@Autowired
public JwtServiceImpl(@Value("${jwt.sessionTime}") int sessionTime) {
this.sessionTime = sessionTime;
}
@Override
public String toToken(String id) {
return Jwts.builder()
.setSubject(id)
.setExpiration(expireTimeFromNow())
.signWith(key)
.compact();
}
@Override
public Optional<String> getSubFromToken(String token) {
try {
Jws<Claims> claimsJws = Jwts.parser().setSigningKey(key).parseClaimsJws(token);
return Optional.ofNullable(claimsJws.getBody().getSubject());
} catch (Exception e) {
return Optional.empty();
}
}
private Date expireTimeFromNow() {
return new Date(System.currentTimeMillis() + sessionTime * 1000);
}
@Override
public void setToken(String key, String value) {
synchronized (this.tokens) {
this.tokens.put(key, value);
}
}
@Override
public String getToken(String key) {
return this.tokens.get(key);
}
@Override
public void removeToken(String key) {
synchronized (this.tokens) {
this.tokens.remove(key);
}
}
private Key decodeBySecretKey() {
try {
byte[] encodedKey = AuthTokenUtils.readKeyFromUrl(jwtBrokerSecretKey);
Key signingKey = AuthTokenUtils.decodeSecretKey(encodedKey);
return signingKey;
} catch (IOException e) {
log.error("Decode failed by secrete key, error: {}", e.getMessage());
return null;
}
}
public String createBrokerToken(String role, String expiryTime) {
Key signingKey;
if (jwtBrokerTokenMode.equals("SECRET")) {
signingKey = decodeBySecretKey();
} else if (jwtBrokerTokenMode.equals("PRIVATE")){
signingKey = decodeByPrivateKey();
} else {
log.info("Default disable JWT auth, please set jwt.broker.token.mode.");
return null;
}
if (signingKey == null) {
log.error("JWT Auth failed, signingKey is not empty");
return null;
}
Optional<Date> optExpiryTime = Optional.empty();
if (expiryTime != null) {
long relativeTimeMillis = TimeUnit.SECONDS
.toMillis(RelativeTimeUtil.parseRelativeTimeInSeconds(expiryTime));
optExpiryTime = Optional.of(new Date(System.currentTimeMillis() + relativeTimeMillis));
}
String token = AuthTokenUtils.createToken(signingKey, role, optExpiryTime);
return token;
}
private Key decodeByPrivateKey() {
try {
byte[] encodedKey = AuthTokenUtils.readKeyFromUrl(jwtBrokerPrivateKey);
SignatureAlgorithm algorithm = SignatureAlgorithm.RS256;
Key signingKey = AuthTokenUtils.decodePrivateKey(encodedKey, algorithm);
return signingKey;
} catch (IOException e) {
log.error("Decode failed by private key, error: {}", e.getMessage());
return null;
}
}
public Claims validateBrokerToken(String token) {
Key validationKey;
if (jwtBrokerTokenMode.equals("SECRET")) {
validationKey = decodeBySecretKey();
} else if (jwtBrokerTokenMode.equals("PRIVATE")){
validationKey = decodeByPrivateKey();
} else {
log.info("Default disable JWT auth, please set jwt.broker.token.mode.");
return null;
}
Jwt<?, Claims> jwt = Jwts.parser()
.setSigningKey(validationKey)
.parse(token);
return jwt.getBody();
}
}