* feat(s3): add STS GetFederationToken support Implement the AWS STS GetFederationToken API, which allows long-term IAM users to obtain temporary credentials scoped down by an optional inline session policy. This is useful for server-side applications that mint per-user temporary credentials. Key behaviors: - Requires SigV4 authentication from a long-term IAM user - Rejects calls from temporary credentials (session tokens) - Name parameter (2-64 chars) identifies the federated user - DurationSeconds supports 900-129600 (15 min to 36 hours, default 12h) - Optional inline session policy for permission scoping - Caller's attached policies are embedded in the JWT token - Returns federated user ARN: arn:aws:sts::<account>:federated-user/<Name> No performance impact on the S3 hot path — credential vending is a separate control-plane operation, and all policy data is embedded in the stateless JWT token. * fix(s3): address GetFederationToken PR review feedback - Fix Name validation: max 32 chars (not 64) per AWS spec, add regex validation for [\w+=,.@-]+ character whitelist - Refactor parseDurationSeconds into parseDurationSecondsWithBounds to eliminate duplicated duration parsing logic - Add sts:GetFederationToken permission check via VerifyActionPermission mirroring the AssumeRole authorization pattern - Change GetPoliciesForUser to return ([]string, error) so callers fail closed on policy-resolution failures instead of silently returning nil - Move temporary-credentials rejection before SigV4 verification for early rejection and proper test coverage - Update tests: verify specific error message for temp cred rejection, add regex validation test cases (spaces, slashes rejected) * refactor(s3): use sts.Action* constants instead of hard-coded strings Replace hard-coded "sts:AssumeRole" and "sts:GetFederationToken" strings in VerifyActionPermission calls with sts.ActionAssumeRole and sts.ActionGetFederationToken package constants. * fix(s3): pass through sts: prefix in action resolver and merge policies Two fixes: 1. mapBaseActionToS3Format now passes through "sts:" prefix alongside "s3:" and "iam:", preventing sts:GetFederationToken from being rewritten to s3:sts:GetFederationToken in VerifyActionPermission. This also fixes the existing sts:AssumeRole permission checks. 2. GetFederationToken policy embedding now merges identity.PolicyNames (from SigV4 identity) with policies from the IAM manager (which may include group-attached policies), deduplicated via a map. Previously the IAM manager lookup was skipped when identity.PolicyNames was non-empty, causing group policies to be omitted from the token. * test(s3): add integration tests for sts: action passthrough and policy merge Action resolver tests: - TestMapBaseActionToS3Format_ServicePrefixPassthrough: verifies s3:, iam:, and sts: prefixed actions pass through unchanged while coarse actions (Read, Write) are mapped to S3 format - TestResolveS3Action_STSActionsPassthrough: verifies sts:AssumeRole, sts:GetFederationToken, sts:GetCallerIdentity pass through ResolveS3Action unchanged with both nil and real HTTP requests Policy merge tests: - TestGetFederationToken_GetPoliciesForUser: tests IAMManager.GetPoliciesForUser with no user store (error), missing user, user with policies, user without - TestGetFederationToken_PolicyMergeAndDedup: tests that identity.PolicyNames and IAM-manager-resolved policies are merged and deduplicated (SharedPolicy appears in both sources, result has 3 unique policies) - TestGetFederationToken_PolicyMergeNoManager: tests that when IAM manager is unavailable, identity.PolicyNames alone are embedded * test(s3): add end-to-end integration tests for GetFederationToken Add integration tests that call GetFederationToken using real AWS SigV4 signed HTTP requests against a running SeaweedFS instance, following the existing pattern in test/s3/iam/s3_sts_assume_role_test.go. Tests: - TestSTSGetFederationTokenValidation: missing name, name too short/long, invalid characters, duration too short/long, malformed policy, anonymous rejection (7 subtests) - TestSTSGetFederationTokenRejectTemporaryCredentials: obtains temp creds via AssumeRole then verifies GetFederationToken rejects them - TestSTSGetFederationTokenSuccess: basic success, custom 1h duration, 36h max duration with expiration time verification - TestSTSGetFederationTokenWithSessionPolicy: creates a bucket, obtains federated creds with GetObject-only session policy, verifies GetObject succeeds and PutObject is denied using the AWS SDK S3 client
163 lines
5.1 KiB
Go
163 lines
5.1 KiB
Go
package sts
|
|
|
|
import (
|
|
"errors"
|
|
)
|
|
|
|
// Store Types
|
|
const (
|
|
StoreTypeMemory = "memory"
|
|
StoreTypeFiler = "filer"
|
|
StoreTypeRedis = "redis"
|
|
)
|
|
|
|
// Provider Types
|
|
const (
|
|
ProviderTypeOIDC = "oidc"
|
|
ProviderTypeLDAP = "ldap"
|
|
ProviderTypeSAML = "saml"
|
|
)
|
|
|
|
// Policy Effects
|
|
const (
|
|
EffectAllow = "Allow"
|
|
EffectDeny = "Deny"
|
|
)
|
|
|
|
// Default Paths - aligned with filer /etc/ convention
|
|
const (
|
|
DefaultSessionBasePath = "/etc/iam/sessions"
|
|
DefaultPolicyBasePath = "/etc/iam/policies"
|
|
DefaultRoleBasePath = "/etc/iam/roles"
|
|
)
|
|
|
|
// Default Values
|
|
const (
|
|
DefaultTokenDuration = 3600 // 1 hour in seconds
|
|
DefaultMaxSessionLength = 43200 // 12 hours in seconds
|
|
DefaultIssuer = "seaweedfs-sts"
|
|
DefaultStoreType = StoreTypeFiler // Default store type for persistence
|
|
MinSigningKeyLength = 16 // Minimum signing key length in bytes
|
|
)
|
|
|
|
// Configuration Field Names
|
|
const (
|
|
ConfigFieldFilerAddress = "filerAddress"
|
|
ConfigFieldBasePath = "basePath"
|
|
ConfigFieldIssuer = "issuer"
|
|
ConfigFieldClientID = "clientId"
|
|
ConfigFieldClientSecret = "clientSecret"
|
|
ConfigFieldJWKSUri = "jwksUri"
|
|
ConfigFieldScopes = "scopes"
|
|
ConfigFieldUserInfoUri = "userInfoUri"
|
|
ConfigFieldRedirectUri = "redirectUri"
|
|
ConfigFieldTLSCACert = "tlsCaCert"
|
|
ConfigFieldTLSInsecureSkipVerify = "tlsInsecureSkipVerify"
|
|
)
|
|
|
|
// Error Messages
|
|
const (
|
|
ErrConfigCannotBeNil = "config cannot be nil"
|
|
ErrProviderCannotBeNil = "provider cannot be nil"
|
|
ErrProviderNameEmpty = "provider name cannot be empty"
|
|
ErrProviderTypeEmpty = "provider type cannot be empty"
|
|
ErrTokenCannotBeEmpty = "token cannot be empty"
|
|
ErrSessionTokenCannotBeEmpty = "session token cannot be empty"
|
|
ErrSessionIDCannotBeEmpty = "session ID cannot be empty"
|
|
ErrSTSServiceNotInitialized = "STS service not initialized"
|
|
ErrProviderNotInitialized = "provider not initialized"
|
|
ErrInvalidTokenDuration = "token duration must be positive"
|
|
ErrInvalidMaxSessionLength = "max session length must be positive"
|
|
ErrIssuerRequired = "issuer is required"
|
|
ErrSigningKeyTooShort = "signing key must be at least %d bytes"
|
|
ErrFilerAddressRequired = "filer address is required"
|
|
ErrClientIDRequired = "clientId is required for OIDC provider"
|
|
ErrUnsupportedStoreType = "unsupported store type: %s"
|
|
ErrUnsupportedProviderType = "unsupported provider type: %s"
|
|
ErrInvalidTokenFormat = "invalid session token format: %w"
|
|
ErrSessionValidationFailed = "session validation failed: %w"
|
|
ErrInvalidToken = "invalid token: %w"
|
|
ErrTokenNotValid = "token is not valid"
|
|
ErrInvalidTokenClaims = "invalid token claims"
|
|
ErrInvalidIssuer = "invalid issuer"
|
|
ErrMissingSessionID = "missing session ID"
|
|
)
|
|
|
|
// Typed errors for robust error checking with errors.Is()
|
|
// These enable the HTTP layer to use errors.Is() instead of fragile string matching
|
|
var (
|
|
// ErrTokenExpired indicates that the provided token has expired
|
|
ErrTypedTokenExpired = errors.New("token has expired")
|
|
|
|
// ErrTypedInvalidToken indicates that the token format is invalid or malformed
|
|
ErrTypedInvalidToken = errors.New("invalid token format")
|
|
|
|
// ErrTypedInvalidIssuer indicates that the token issuer is not trusted
|
|
ErrTypedInvalidIssuer = errors.New("invalid token issuer")
|
|
|
|
// ErrTypedInvalidAudience indicates that the token audience doesn't match expected value
|
|
ErrTypedInvalidAudience = errors.New("invalid token audience")
|
|
|
|
// ErrTypedMissingClaims indicates that required claims are missing from the token
|
|
ErrTypedMissingClaims = errors.New("missing required claims")
|
|
)
|
|
|
|
// JWT Claims
|
|
const (
|
|
JWTClaimIssuer = "iss"
|
|
JWTClaimSubject = "sub"
|
|
JWTClaimAudience = "aud"
|
|
JWTClaimExpiration = "exp"
|
|
JWTClaimIssuedAt = "iat"
|
|
JWTClaimTokenType = "token_type"
|
|
)
|
|
|
|
// Token Types
|
|
const (
|
|
TokenTypeSession = "session"
|
|
TokenTypeAccess = "access"
|
|
TokenTypeRefresh = "refresh"
|
|
)
|
|
|
|
// AWS STS Actions
|
|
const (
|
|
ActionAssumeRole = "sts:AssumeRole"
|
|
ActionAssumeRoleWithWebIdentity = "sts:AssumeRoleWithWebIdentity"
|
|
ActionAssumeRoleWithCredentials = "sts:AssumeRoleWithCredentials"
|
|
ActionGetFederationToken = "sts:GetFederationToken"
|
|
ActionValidateSession = "sts:ValidateSession"
|
|
)
|
|
|
|
// Session File Prefixes
|
|
const (
|
|
SessionFilePrefix = "session_"
|
|
SessionFileExt = ".json"
|
|
PolicyFilePrefix = "policy_"
|
|
PolicyFileExt = ".json"
|
|
RoleFileExt = ".json"
|
|
)
|
|
|
|
// HTTP Headers
|
|
const (
|
|
HeaderAuthorization = "Authorization"
|
|
HeaderContentType = "Content-Type"
|
|
HeaderUserAgent = "User-Agent"
|
|
)
|
|
|
|
// Content Types
|
|
const (
|
|
ContentTypeJSON = "application/json"
|
|
ContentTypeFormURLEncoded = "application/x-www-form-urlencoded"
|
|
)
|
|
|
|
// Default Test Values
|
|
const (
|
|
TestSigningKey32Chars = "test-signing-key-32-characters-long"
|
|
TestIssuer = "test-sts"
|
|
TestClientID = "test-client"
|
|
TestSessionID = "test-session-123"
|
|
TestValidToken = "valid_test_token"
|
|
TestInvalidToken = "invalid_token"
|
|
TestExpiredToken = "expired_token"
|
|
)
|