forked from wrenn/wrenn
- Frontend: BYOC hosts page (/dashboard/byoc) with register/delete flows,
shimmer loading, pulsing online status, animated token reveal checkmark
- Frontend: Admin section (/admin/hosts) with platform + BYOC tabs, stat
pills, skeleton loading, slide-in animations for new rows
- Frontend: AdminSidebar component with accent top bar and admin pill badge
- Frontend: BYOC nav item shown only when team.is_byoc is true (derived
from teams store, not JWT); disabled for members
- Frontend: Admin shield button in Sidebar, visible only to platform admins
- Backend: is_admin in JWT claims + requireAdmin middleware (DB-validated)
- Backend: is_byoc added to teamResponse so frontend derives visibility
from fresh team data rather than stale JWT fields
- Backend: SetBYOC admin endpoint (PUT /v1/admin/teams/{id}/byoc)
- Backend: Admin hosts list enriches BYOC entries with team_name
- Host agent: load .env file via godotenv on startup
110 lines
3.4 KiB
Go
110 lines
3.4 KiB
Go
package auth
|
|
|
|
import (
|
|
"fmt"
|
|
"time"
|
|
|
|
"github.com/golang-jwt/jwt/v5"
|
|
)
|
|
|
|
const jwtExpiry = 6 * time.Hour
|
|
const hostJWTExpiry = 7 * 24 * time.Hour // 7 days; host refreshes via refresh token
|
|
const HostRefreshTokenExpiry = 60 * 24 * time.Hour // 60 days; exported for service layer
|
|
|
|
// Claims are the JWT payload for user tokens.
|
|
type Claims struct {
|
|
Type string `json:"typ,omitempty"` // empty for user tokens; used to reject host tokens
|
|
TeamID string `json:"team_id"`
|
|
Role string `json:"role"` // owner, admin, or member within TeamID
|
|
Email string `json:"email"`
|
|
Name string `json:"name"`
|
|
IsAdmin bool `json:"is_admin,omitempty"` // platform-level admin flag
|
|
jwt.RegisteredClaims
|
|
}
|
|
|
|
// SignJWT signs a new 6-hour JWT for the given user.
|
|
func SignJWT(secret []byte, userID, teamID, email, name, role string, isAdmin bool) (string, error) {
|
|
now := time.Now()
|
|
claims := Claims{
|
|
TeamID: teamID,
|
|
Role: role,
|
|
Email: email,
|
|
Name: name,
|
|
IsAdmin: isAdmin,
|
|
RegisteredClaims: jwt.RegisteredClaims{
|
|
Subject: userID,
|
|
IssuedAt: jwt.NewNumericDate(now),
|
|
ExpiresAt: jwt.NewNumericDate(now.Add(jwtExpiry)),
|
|
},
|
|
}
|
|
token := jwt.NewWithClaims(jwt.SigningMethodHS256, claims)
|
|
return token.SignedString(secret)
|
|
}
|
|
|
|
// VerifyJWT parses and validates a user JWT, returning the claims on success.
|
|
// Rejects host JWTs (which carry a "typ" claim) to prevent cross-token confusion.
|
|
func VerifyJWT(secret []byte, tokenStr string) (Claims, error) {
|
|
token, err := jwt.ParseWithClaims(tokenStr, &Claims{}, func(t *jwt.Token) (any, error) {
|
|
if _, ok := t.Method.(*jwt.SigningMethodHMAC); !ok {
|
|
return nil, fmt.Errorf("unexpected signing method: %v", t.Header["alg"])
|
|
}
|
|
return secret, nil
|
|
})
|
|
if err != nil {
|
|
return Claims{}, fmt.Errorf("invalid token: %w", err)
|
|
}
|
|
c, ok := token.Claims.(*Claims)
|
|
if !ok || !token.Valid {
|
|
return Claims{}, fmt.Errorf("invalid token claims")
|
|
}
|
|
if c.Type == "host" {
|
|
return Claims{}, fmt.Errorf("invalid token: host token cannot be used as user token")
|
|
}
|
|
return *c, nil
|
|
}
|
|
|
|
// HostClaims are the JWT payload for host agent tokens.
|
|
type HostClaims struct {
|
|
Type string `json:"typ"` // always "host"
|
|
HostID string `json:"host_id"`
|
|
jwt.RegisteredClaims
|
|
}
|
|
|
|
// SignHostJWT signs a long-lived (1 year) JWT for a registered host agent.
|
|
func SignHostJWT(secret []byte, hostID string) (string, error) {
|
|
now := time.Now()
|
|
claims := HostClaims{
|
|
Type: "host",
|
|
HostID: hostID,
|
|
RegisteredClaims: jwt.RegisteredClaims{
|
|
Subject: hostID,
|
|
IssuedAt: jwt.NewNumericDate(now),
|
|
ExpiresAt: jwt.NewNumericDate(now.Add(hostJWTExpiry)),
|
|
},
|
|
}
|
|
token := jwt.NewWithClaims(jwt.SigningMethodHS256, claims)
|
|
return token.SignedString(secret)
|
|
}
|
|
|
|
// VerifyHostJWT parses and validates a host JWT, returning the claims on success.
|
|
// It rejects user JWTs by checking the "typ" claim.
|
|
func VerifyHostJWT(secret []byte, tokenStr string) (HostClaims, error) {
|
|
token, err := jwt.ParseWithClaims(tokenStr, &HostClaims{}, func(t *jwt.Token) (any, error) {
|
|
if _, ok := t.Method.(*jwt.SigningMethodHMAC); !ok {
|
|
return nil, fmt.Errorf("unexpected signing method: %v", t.Header["alg"])
|
|
}
|
|
return secret, nil
|
|
})
|
|
if err != nil {
|
|
return HostClaims{}, fmt.Errorf("invalid token: %w", err)
|
|
}
|
|
c, ok := token.Claims.(*HostClaims)
|
|
if !ok || !token.Valid {
|
|
return HostClaims{}, fmt.Errorf("invalid token claims")
|
|
}
|
|
if c.Type != "host" {
|
|
return HostClaims{}, fmt.Errorf("invalid token type: expected host")
|
|
}
|
|
return *c, nil
|
|
}
|