1
2
3
4
5
6
7
8
9
10
11
12
13
14
15 package jws
16
17 import (
18 "bytes"
19 "crypto"
20 "crypto/rand"
21 "crypto/rsa"
22 "crypto/sha256"
23 "encoding/base64"
24 "encoding/json"
25 "errors"
26 "fmt"
27 "strings"
28 "time"
29 )
30
31
32
33
34 type ClaimSet struct {
35 Iss string `json:"iss"`
36 Scope string `json:"scope,omitempty"`
37 Aud string `json:"aud"`
38 Exp int64 `json:"exp"`
39 Iat int64 `json:"iat"`
40 Typ string `json:"typ,omitempty"`
41
42
43 Sub string `json:"sub,omitempty"`
44
45
46
47 Prn string `json:"prn,omitempty"`
48
49
50
51 PrivateClaims map[string]interface{} `json:"-"`
52 }
53
54 func (c *ClaimSet) encode() (string, error) {
55
56
57
58 now := time.Now().Add(-10 * time.Second)
59 if c.Iat == 0 {
60 c.Iat = now.Unix()
61 }
62 if c.Exp == 0 {
63 c.Exp = now.Add(time.Hour).Unix()
64 }
65 if c.Exp < c.Iat {
66 return "", fmt.Errorf("jws: invalid Exp = %v; must be later than Iat = %v", c.Exp, c.Iat)
67 }
68
69 b, err := json.Marshal(c)
70 if err != nil {
71 return "", err
72 }
73
74 if len(c.PrivateClaims) == 0 {
75 return base64.RawURLEncoding.EncodeToString(b), nil
76 }
77
78
79 prv, err := json.Marshal(c.PrivateClaims)
80 if err != nil {
81 return "", fmt.Errorf("jws: invalid map of private claims %v", c.PrivateClaims)
82 }
83
84
85 if !bytes.HasSuffix(b, []byte{'}'}) {
86 return "", fmt.Errorf("jws: invalid JSON %s", b)
87 }
88 if !bytes.HasPrefix(prv, []byte{'{'}) {
89 return "", fmt.Errorf("jws: invalid JSON %s", prv)
90 }
91 b[len(b)-1] = ','
92 b = append(b, prv[1:]...)
93 return base64.RawURLEncoding.EncodeToString(b), nil
94 }
95
96
97 type Header struct {
98
99 Algorithm string `json:"alg"`
100
101
102 Typ string `json:"typ"`
103
104
105 KeyID string `json:"kid,omitempty"`
106 }
107
108 func (h *Header) encode() (string, error) {
109 b, err := json.Marshal(h)
110 if err != nil {
111 return "", err
112 }
113 return base64.RawURLEncoding.EncodeToString(b), nil
114 }
115
116
117 func Decode(payload string) (*ClaimSet, error) {
118
119 s := strings.Split(payload, ".")
120 if len(s) < 2 {
121
122 return nil, errors.New("jws: invalid token received")
123 }
124 decoded, err := base64.RawURLEncoding.DecodeString(s[1])
125 if err != nil {
126 return nil, err
127 }
128 c := &ClaimSet{}
129 err = json.NewDecoder(bytes.NewBuffer(decoded)).Decode(c)
130 return c, err
131 }
132
133
134 type Signer func(data []byte) (sig []byte, err error)
135
136
137 func EncodeWithSigner(header *Header, c *ClaimSet, sg Signer) (string, error) {
138 head, err := header.encode()
139 if err != nil {
140 return "", err
141 }
142 cs, err := c.encode()
143 if err != nil {
144 return "", err
145 }
146 ss := fmt.Sprintf("%s.%s", head, cs)
147 sig, err := sg([]byte(ss))
148 if err != nil {
149 return "", err
150 }
151 return fmt.Sprintf("%s.%s", ss, base64.RawURLEncoding.EncodeToString(sig)), nil
152 }
153
154
155
156 func Encode(header *Header, c *ClaimSet, key *rsa.PrivateKey) (string, error) {
157 sg := func(data []byte) (sig []byte, err error) {
158 h := sha256.New()
159 h.Write(data)
160 return rsa.SignPKCS1v15(rand.Reader, key, crypto.SHA256, h.Sum(nil))
161 }
162 return EncodeWithSigner(header, c, sg)
163 }
164
165
166
167 func Verify(token string, key *rsa.PublicKey) error {
168 parts := strings.Split(token, ".")
169 if len(parts) != 3 {
170 return errors.New("jws: invalid token received, token must have 3 parts")
171 }
172
173 signedContent := parts[0] + "." + parts[1]
174 signatureString, err := base64.RawURLEncoding.DecodeString(parts[2])
175 if err != nil {
176 return err
177 }
178
179 h := sha256.New()
180 h.Write([]byte(signedContent))
181 return rsa.VerifyPKCS1v15(key, crypto.SHA256, h.Sum(nil), signatureString)
182 }
183
View as plain text