As we reevaluate how to best support and maintain Staging Ref in the future, we encourage development teams using this environment to highlight their use cases in the following issue: https://gitlab.com/gitlab-com/gl-infra/software-delivery/framework/software-delivery-framework-issue-tracker/-/issues/36.

Skip to content
Snippets Groups Projects
Commit 71231b33 authored by Igor Drozdov's avatar Igor Drozdov
Browse files

Add JWT token to GitLab Rails request

It is passed as a Gitlab-Shell-Api-Request header and uses
the same shared secret in order to encrypt the token
parent 67164bdf
No related branches found
No related tags found
No related merge requests found
Loading
Loading
@@ -10,13 +10,19 @@ import (
"path"
"strings"
"testing"
"time"
"github.com/golang-jwt/jwt/v4"
"github.com/stretchr/testify/require"
"gitlab.com/gitlab-org/gitlab-shell/client/testserver"
"gitlab.com/gitlab-org/gitlab-shell/internal/testhelper"
)
var (
secret = []byte("sssh, it's a secret")
)
func TestClients(t *testing.T) {
testhelper.PrepareTestRootDir(t)
Loading
Loading
@@ -57,12 +63,10 @@ func TestClients(t *testing.T) {
t.Run(tc.desc, func(t *testing.T) {
url := tc.server(t, buildRequests(t, tc.relativeURLRoot))
secret := "sssh, it's a secret"
httpClient, err := NewHTTPClientWithOpts(url, tc.relativeURLRoot, tc.caFile, "", 1, nil)
require.NoError(t, err)
client, err := NewGitlabNetClient("", "", secret, httpClient)
client, err := NewGitlabNetClient("", "", string(secret), httpClient)
require.NoError(t, err)
testBrokenRequest(t, client)
Loading
Loading
@@ -71,6 +75,7 @@ func TestClients(t *testing.T) {
testMissing(t, client)
testErrorMessage(t, client)
testAuthenticationHeader(t, client)
testJWTAuthenticationHeader(t, client)
})
}
}
Loading
Loading
@@ -160,7 +165,7 @@ func testAuthenticationHeader(t *testing.T, client *GitlabNetClient) {
header, err := base64.StdEncoding.DecodeString(string(responseBody))
require.NoError(t, err)
require.Equal(t, "sssh, it's a secret", string(header))
require.Equal(t, secret, header)
})
t.Run("Authentication headers for POST", func(t *testing.T) {
Loading
Loading
@@ -175,7 +180,44 @@ func testAuthenticationHeader(t *testing.T, client *GitlabNetClient) {
header, err := base64.StdEncoding.DecodeString(string(responseBody))
require.NoError(t, err)
require.Equal(t, "sssh, it's a secret", string(header))
require.Equal(t, secret, header)
})
}
func testJWTAuthenticationHeader(t *testing.T, client *GitlabNetClient) {
verifyJWTToken := func(t *testing.T, response *http.Response) {
responseBody, err := io.ReadAll(response.Body)
require.NoError(t, err)
claims := &jwt.RegisteredClaims{}
token, err := jwt.ParseWithClaims(string(responseBody), claims, func(token *jwt.Token) (interface{}, error) {
return secret, nil
})
require.NoError(t, err)
require.True(t, token.Valid)
require.Equal(t, "gitlab-shell", claims.Issuer)
require.Equal(t, time.Now().Truncate(time.Second), claims.IssuedAt.Time, time.Second)
require.Equal(t, time.Now().Truncate(time.Second).Add(time.Minute), claims.ExpiresAt.Time, time.Second)
}
t.Run("JWT authentication headers for GET", func(t *testing.T) {
response, err := client.Get(context.Background(), "/jwt_auth")
require.NoError(t, err)
require.NotNil(t, response)
defer response.Body.Close()
verifyJWTToken(t, response)
})
t.Run("JWT authentication headers for POST", func(t *testing.T) {
response, err := client.Post(context.Background(), "/jwt_auth", map[string]string{})
require.NoError(t, err)
require.NotNil(t, response)
defer response.Body.Close()
verifyJWTToken(t, response)
})
}
Loading
Loading
@@ -208,6 +250,12 @@ func buildRequests(t *testing.T, relativeURLRoot string) []testserver.TestReques
fmt.Fprint(w, r.Header.Get(secretHeaderName))
},
},
{
Path: "/api/v4/internal/jwt_auth",
Handler: func(w http.ResponseWriter, r *http.Request) {
fmt.Fprint(w, r.Header.Get(apiSecretHeaderName))
},
},
{
Path: "/api/v4/internal/error",
Handler: func(w http.ResponseWriter, r *http.Request) {
Loading
Loading
Loading
Loading
@@ -11,13 +11,18 @@ import (
"strings"
"time"
"github.com/golang-jwt/jwt/v4"
"gitlab.com/gitlab-org/labkit/log"
)
const (
internalApiPath = "/api/v4/internal"
secretHeaderName = "Gitlab-Shared-Secret"
defaultUserAgent = "GitLab-Shell"
internalApiPath = "/api/v4/internal"
secretHeaderName = "Gitlab-Shared-Secret"
apiSecretHeaderName = "Gitlab-Shell-Api-Request"
defaultUserAgent = "GitLab-Shell"
jwtTTL = time.Minute
jwtIssuer = "gitlab-shell"
)
type ErrorResponse struct {
Loading
Loading
@@ -121,10 +126,22 @@ func (c *GitlabNetClient) DoRequest(ctx context.Context, method, path string, da
if user != "" && password != "" {
request.SetBasicAuth(user, password)
}
secretBytes := []byte(c.secret)
encodedSecret := base64.StdEncoding.EncodeToString([]byte(c.secret))
encodedSecret := base64.StdEncoding.EncodeToString(secretBytes)
request.Header.Set(secretHeaderName, encodedSecret)
claims := jwt.RegisteredClaims{
Issuer: jwtIssuer,
IssuedAt: jwt.NewNumericDate(time.Now()),
ExpiresAt: jwt.NewNumericDate(time.Now().Add(jwtTTL)),
}
tokenString, err := jwt.NewWithClaims(jwt.SigningMethodHS256, claims).SignedString(secretBytes)
if err != nil {
return nil, err
}
request.Header.Set(apiSecretHeaderName, tokenString)
request.Header.Add("Content-Type", "application/json")
request.Header.Add("User-Agent", c.userAgent)
request.Close = true
Loading
Loading
Loading
Loading
@@ -3,6 +3,7 @@ module gitlab.com/gitlab-org/gitlab-shell
go 1.17
require (
github.com/golang-jwt/jwt/v4 v4.4.1
github.com/grpc-ecosystem/go-grpc-middleware v1.3.0
github.com/grpc-ecosystem/go-grpc-prometheus v1.2.0
github.com/mattn/go-shellwords v1.0.11
Loading
Loading
0% Loading or .
You are about to add 0 people to the discussion. Proceed with caution.
Finish editing this message first!
Please register or to comment