Implemented password hashing. Added and improved tests.
This commit is contained in:
parent
b5a70f6de0
commit
52b7d2f48b
@ -3,6 +3,8 @@
|
||||
"type": "object",
|
||||
"properties": {
|
||||
"artifactsRepo": { "type": "string" },
|
||||
"authSecret": { "type": "string" },
|
||||
"pwdCost": { "type": "integer" },
|
||||
"projects": {
|
||||
"title": "ProjectsList",
|
||||
"type": "array",
|
||||
@ -30,19 +32,14 @@
|
||||
"title": "UserDefinition",
|
||||
"type": "object",
|
||||
"properties": {
|
||||
"username": { "type": "string" },
|
||||
"name": { "type": "string" },
|
||||
"hashedPwd": { "type": "string" }
|
||||
},
|
||||
"required": ["username", "hashedPwd"],
|
||||
"required": ["name", "hashedPwd"],
|
||||
"additionalProperties": false
|
||||
}
|
||||
},
|
||||
"tokens": {
|
||||
"title": "TokensList",
|
||||
"type": "array",
|
||||
"items": { "type": "string" }
|
||||
}
|
||||
},
|
||||
"required": ["artifactsRepo", "projects", "users", "tokens"],
|
||||
"required": ["artifactsRepo", "authSecret", "pwdCost", "projects", "users"],
|
||||
"additionalProperties": false
|
||||
}
|
||||
|
@ -25,6 +25,7 @@ when isMainModule:
|
||||
Usage:
|
||||
strawboss serve
|
||||
strawboss run <project> <step> [options]
|
||||
strawboss hashpwd <pwd>
|
||||
|
||||
Options
|
||||
|
||||
@ -40,7 +41,6 @@ Options
|
||||
|
||||
let args = docopt(doc, version = "strawboss v" & SB_VER)
|
||||
|
||||
echo $args
|
||||
if args["run"]:
|
||||
|
||||
let req = RunRequest(
|
||||
@ -62,3 +62,9 @@ Options
|
||||
|
||||
elif args["serve"]: server.start(cfg)
|
||||
|
||||
elif args["hashpwd"]:
|
||||
echo $cfg.pwdCost
|
||||
let pwd = server.hashPwd($args["<pwd>"], cfg.pwdCost)
|
||||
echo pwd
|
||||
echo pwd[0..28]
|
||||
|
||||
|
@ -35,6 +35,7 @@ type
|
||||
artifactsRepo*: string
|
||||
authSecret*: string
|
||||
projects*: seq[ProjectDef]
|
||||
pwdCost*: int8
|
||||
users*: seq[UserRef]
|
||||
|
||||
# Equality on custom types
|
||||
@ -62,7 +63,7 @@ proc getIfExists(n: JsonNode, key: string): JsonNode =
|
||||
|
||||
proc getOrFail(n: JsonNode, key: string, objName: string = ""): JsonNode =
|
||||
# convenience method to get a key from a JObject or raise an exception
|
||||
if not n.hasKey(key): raiseEx objName & " missing key " & key
|
||||
if not n.hasKey(key): raiseEx objName & " missing key '" & key & "'"
|
||||
return n[key]
|
||||
|
||||
# Configuration parsing code
|
||||
@ -97,6 +98,7 @@ proc loadStrawBossConfig*(cfgFile: string): StrawBossConfig =
|
||||
result = StrawBossConfig(
|
||||
artifactsRepo: jsonCfg.getIfExists("artifactsRepo").getStr("artifacts"),
|
||||
authSecret: jsonCfg.getOrFail("authSecret", "strawboss config").getStr,
|
||||
pwdCost: int8(jsonCfg.getOrFail("pwdCost", "strawboss config").getNum),
|
||||
projects: projectDefs,
|
||||
users: users)
|
||||
|
||||
@ -170,8 +172,7 @@ proc `%`*(req: RunRequest): JsonNode =
|
||||
"stepName": req.stepName,
|
||||
"buildRef": req.buildRef,
|
||||
"workspaceDir": req.workspaceDir,
|
||||
"forceRebuild": req.forceRebuild
|
||||
}
|
||||
"forceRebuild": req.forceRebuild }
|
||||
|
||||
proc `$`*(s: BuildStatus): string = result = pretty(%s)
|
||||
proc `$`*(req: RunRequest): string = result = pretty(%req)
|
||||
|
@ -1,4 +1,5 @@
|
||||
import asyncdispatch, bcrypt, jester, json, jwt, osproc, sequtils, tempfile, times
|
||||
import asyncdispatch, bcrypt, jester, json, jwt, osproc, sequtils, tempfile,
|
||||
times, unittest
|
||||
|
||||
import ./configuration, ./core, private/util
|
||||
|
||||
@ -12,10 +13,9 @@ type Worker = object
|
||||
type
|
||||
Session = object
|
||||
user*: UserRef
|
||||
issuedAt*, expires*: TimeInfo
|
||||
issuedAt*, expires*: Time
|
||||
|
||||
const ISO_TIME_FORMAT = "yyyy-MM-dd'T'HH:mm:ss"
|
||||
const BCRYPT_ROUNDS = 16
|
||||
|
||||
proc makeJsonResp(status: HttpCode, details: string = ""): string =
|
||||
result = $(%* {
|
||||
@ -24,28 +24,34 @@ proc makeJsonResp(status: HttpCode, details: string = ""): string =
|
||||
"details": details
|
||||
})
|
||||
|
||||
proc newSession(user: UserRef): Session =
|
||||
proc newSession*(user: UserRef): Session =
|
||||
result = Session(
|
||||
user: user,
|
||||
issuedAt: getGMTime(getTime()),
|
||||
expires: daysForward(7))
|
||||
issuedAt: getTime(),
|
||||
expires: daysForward(7).toTime())
|
||||
|
||||
proc toJWT(session: Session): JWT =
|
||||
result = JWT(
|
||||
proc toJWT*(cfg: StrawBossConfig, session: Session): string =
|
||||
# result = toJWT(%* {
|
||||
# "header": {
|
||||
# "alg": "HS256",
|
||||
# "typ": "JWT" },
|
||||
# "claims": {
|
||||
# "sub": session.user.name,
|
||||
# "iat": session.issuedAt.toSeconds().int,
|
||||
# "exp": session.expires.toSeconds().int } })
|
||||
|
||||
var jwt = JWT(
|
||||
header: JOSEHeader(alg: HS256, typ: "jwt"),
|
||||
claims: toClaims(%*{
|
||||
"sub": session.user.name,
|
||||
"iss": session.issuedAt.format(ISO_TIME_FORMAT),
|
||||
"exp": session.expires.format(ISO_TIME_FORMAT) }))
|
||||
"iat": session.issuedAt.toSeconds().int,
|
||||
"exp": session.expires.toSeconds().int }))
|
||||
|
||||
proc extractSession(cfg: StrawBossConfig, request: Request): Session =
|
||||
jwt.sign(cfg.authSecret)
|
||||
result = $jwt
|
||||
|
||||
# Find the auth header
|
||||
if not request.headers.hasKey("Authentication"):
|
||||
raiseEx "No auth token."
|
||||
|
||||
# Read and verify the JWT token
|
||||
let jwt = toJWT(request.headers["Authentication"])
|
||||
proc fromJWT*(cfg: StrawBossConfig, strTok: string): Session =
|
||||
let jwt = toJWT(strTok)
|
||||
var secret = cfg.authSecret
|
||||
if not jwt.verify(secret): raiseEx "Unable to verify auth token."
|
||||
jwt.verifyTimeClaims()
|
||||
@ -57,13 +63,17 @@ proc extractSession(cfg: StrawBossConfig, request: Request): Session =
|
||||
|
||||
result = Session(
|
||||
user: users[0],
|
||||
issuedAt: parse(jwt.claims["iat"].node.str, ISO_TIME_FORMAT),
|
||||
expires: parse(jwt.claims["exp"].node.str, ISO_TIME_FORMAT))
|
||||
issuedAt: fromSeconds(jwt.claims["iat"].node.num),
|
||||
expires: fromSeconds(jwt.claims["exp"].node.num))
|
||||
|
||||
template requireAuth() =
|
||||
var session {.inject.}: Session
|
||||
try: session = extractSession(givenCfg, request)
|
||||
except: resp(Http401, makeJsonResp(Http401), "application/json")
|
||||
proc extractSession(cfg: StrawBossConfig, request: Request): Session =
|
||||
|
||||
# Find the auth header
|
||||
if not request.headers.hasKey("Authentication"):
|
||||
raiseEx "No auth token."
|
||||
|
||||
# Read and verify the JWT token
|
||||
result = fromJWT(cfg, request.headers["Authentication"])
|
||||
|
||||
proc spawnWorker(req: RunRequest): Worker =
|
||||
let dir = mkdtemp()
|
||||
@ -73,6 +83,32 @@ proc spawnWorker(req: RunRequest): Worker =
|
||||
process: startProcess("strawboss", ".", args, loadEnv(), {poUsePath}),
|
||||
workingDir: dir)
|
||||
|
||||
proc hashPwd*(pwd: string, cost: int8): string =
|
||||
let salt = genSalt(cost)
|
||||
result = hash(pwd, salt)
|
||||
|
||||
proc validatePwd*(u: UserRef, givenPwd: string): bool =
|
||||
let salt = u.hashedPwd[0..28] # TODO: magic numbers
|
||||
result = compare(u.hashedPwd, hash(givenPwd, salt))
|
||||
|
||||
proc makeAuthToken*(cfg: StrawBossConfig, uname, pwd: string): string =
|
||||
if uname == nil or pwd == nil:
|
||||
raiseEx "fields 'username' and 'password' required"
|
||||
|
||||
# find the user record
|
||||
let users = cfg.users.filterIt(it.name == uname)
|
||||
if users.len != 1: raiseEx "invalid username or password"
|
||||
|
||||
let user = users[0]
|
||||
|
||||
if not validatePwd(user, pwd): raiseEx "invalid username or password"
|
||||
result = toJWT(cfg, newSession(user))
|
||||
|
||||
template requireAuth() =
|
||||
var session {.inject.}: Session
|
||||
try: session = extractSession(givenCfg, request)
|
||||
except: resp(Http401, makeJsonResp(Http401), "application/json")
|
||||
|
||||
proc start*(givenCfg: StrawBossConfig): void =
|
||||
|
||||
var workers: seq[Worker] = @[]
|
||||
@ -89,26 +125,9 @@ proc start*(givenCfg: StrawBossConfig): void =
|
||||
resp($(%(givenCfg.projects)), "application/json")
|
||||
|
||||
get "/api/auth-token":
|
||||
var username, pwd: string
|
||||
try:
|
||||
username = @"username"
|
||||
pwd = @"password"
|
||||
except: resp(Http401, makeJsonResp(Http401, "fields 'username' and 'password' required"))
|
||||
|
||||
let users = givenCfg.users.filterIt(it.name == username)
|
||||
if users.len != 1:
|
||||
resp(Http401, makeJsonResp(Http401, "invalid username or password"))
|
||||
|
||||
let user = users[0]
|
||||
|
||||
# generate salt
|
||||
let salt = genSalt(BCRYPT_ROUNDS)
|
||||
|
||||
# bcrypt
|
||||
let hashedPwd = hash(pwd, salt)
|
||||
stdout.writeLine "Hashed pwd is " & $hashedPwd
|
||||
|
||||
resp(Http501, makeJsonResp(Http501))
|
||||
let authToken = makeAuthToken(givenCfg, @"username", @"password")
|
||||
except: resp(Http401, makeJsonResp(Http401, getCurrentExceptionMsg()))
|
||||
|
||||
post "/api/project/@projectName/@stepName/run/@buildRef?":
|
||||
workers.add(spawnWorker(RunRequest(
|
||||
|
@ -1,10 +1,11 @@
|
||||
{
|
||||
"artifactsRepo": "artifacts",
|
||||
"authSecret": "change me",
|
||||
"users": [
|
||||
{ "name": "bob@builder.com", "hashedPwd": "testvalue" },
|
||||
{ "name": "sam@sousa.com", "hashedPwd": "testvalue" }
|
||||
],
|
||||
"authSecret": "change me",
|
||||
"pwdCost": 11,
|
||||
"projects": [
|
||||
{ "name": "test-project-1",
|
||||
"repo": "/non-existent/dir",
|
||||
|
4
src/test/nim/runtests.nim
Normal file
4
src/test/nim/runtests.nim
Normal file
@ -0,0 +1,4 @@
|
||||
import unittest
|
||||
|
||||
import ./tserver.nim
|
||||
import ./tconfiguration.nim
|
Binary file not shown.
@ -1,6 +1,6 @@
|
||||
import strtabs, tables, unittest
|
||||
import ./testutil
|
||||
import ../../../main/nim/strawbosspkg/configuration
|
||||
import ../../main/nim/strawbosspkg/configuration
|
||||
|
||||
suite "load and save configuration objects":
|
||||
|
||||
@ -23,6 +23,7 @@ suite "load and save configuration objects":
|
||||
check:
|
||||
cfg.artifactsRepo == "artifacts"
|
||||
cfg.authSecret == "change me"
|
||||
cfg.pwdCost == 11
|
||||
sameContents(expectedUsers, cfg.users)
|
||||
sameContents(expectedProjects, cfg.projects)
|
||||
|
25
src/test/nim/tserver.nim
Normal file
25
src/test/nim/tserver.nim
Normal file
@ -0,0 +1,25 @@
|
||||
import times, unittest
|
||||
import ./testutil
|
||||
import ../../main/nim/strawbosspkg/configuration
|
||||
import ../../main/nim/strawbosspkg/server
|
||||
|
||||
let testuser = UserRef( # note: needs to correspond to an actual user
|
||||
name: "bob@builder.com",
|
||||
hashedPwd: "$2a$11$lVZ9U4optQMhzPh0E9A7Yu6XndXblUF3gCa.zmEvJy4F.4C4718b.")
|
||||
|
||||
let cfg = loadStrawBossConfig("src/test/json/strawboss.config.json")
|
||||
|
||||
## UNIT TESTS
|
||||
suite "strawboss server":
|
||||
test "can validate hashed pwd":
|
||||
check validatePwd(testuser, "password")
|
||||
|
||||
test "can detect invalid pwds":
|
||||
check (not validatePwd(testuser, "Password"))
|
||||
|
||||
test "can make and extract a JWT token from a session":
|
||||
let session = newSession(testuser)
|
||||
let tok = toJWT(cfg, session)
|
||||
|
||||
check:
|
||||
fromJWT(cfg, tok) == session
|
@ -2,6 +2,7 @@
|
||||
"artifactsRepo": "artifacts",
|
||||
"users": [],
|
||||
"authSecret": "change me",
|
||||
"pwdCost": 11,
|
||||
"projects": [
|
||||
{ "name": "new-life-intro-band",
|
||||
"repo": "/home/jdb/projects/new-life-introductory-band" },
|
||||
|
@ -12,3 +12,5 @@ srcDir = "src/main/nim"
|
||||
requires @["nim >= 0.16.1", "docopt >= 0.1.0", "tempfile", "jester", "bcrypt"]
|
||||
requires "https://github.com/yglukhov/nim-jwt"
|
||||
|
||||
task test, "Runs the test suite.":
|
||||
exec "nim c -r src/test/nim/runtests.nim"
|
||||
|
Loading…
x
Reference in New Issue
Block a user