Skip to content
New issue

Have a question about this project? Sign up for a free GitHub account to open an issue and contact its maintainers and the community.

By clicking “Sign up for GitHub”, you agree to our terms of service and privacy statement. We’ll occasionally send you account related emails.

Already on GitHub? Sign in to your account

Accept JWT tokens authorizing kick, join messages #29

Merged
merged 13 commits into from
Feb 1, 2019
Merged

Accept JWT tokens authorizing kick, join messages #29

merged 13 commits into from
Feb 1, 2019

Conversation

mqp
Copy link
Contributor

@mqp mqp commented Jan 16, 2019

You can now send a JWT token with join and (brand new) kick signalling messages. The tokens currently have no effect, and the kick message does nothing yet. However, if provided, they will be validated against the signing key provided in the configuration file, and the log will show whether validation succeeded or failed. This should help us test things out before we actually start putting things behind auth barriers.

The signing key should be provided in DER format in a path given by the auth_key configuration key. For example, to generate a keypair (via):

ssh-keygen -t rsa -b 2048 -f key.pem -N ''
openssl rsa -in key.pem -outform PEM -pubout -out public.pem
openssl rsa -in key.pem -outform DER -out key.der
openssl rsa -in key.der -inform DER -RSAPublicKey_out -outform DER -out public.der
# sign JWTs with private key, point your config file to public.der

Sign up for free to join this conversation on GitHub. Already have an account? Sign in to comment
Labels
None yet
Projects
None yet
Development

Successfully merging this pull request may close these issues.

2 participants