-
-
Notifications
You must be signed in to change notification settings - Fork 163
/
Copy pathjwt_parse_with_key_provider_example_test.go
148 lines (131 loc) · 3.58 KB
/
jwt_parse_with_key_provider_example_test.go
1
2
3
4
5
6
7
8
9
10
11
12
13
14
15
16
17
18
19
20
21
22
23
24
25
26
27
28
29
30
31
32
33
34
35
36
37
38
39
40
41
42
43
44
45
46
47
48
49
50
51
52
53
54
55
56
57
58
59
60
61
62
63
64
65
66
67
68
69
70
71
72
73
74
75
76
77
78
79
80
81
82
83
84
85
86
87
88
89
90
91
92
93
94
95
96
97
98
99
100
101
102
103
104
105
106
107
108
109
110
111
112
113
114
115
116
117
118
119
120
121
122
123
124
125
126
127
128
129
130
131
132
133
134
135
136
137
138
139
140
141
142
143
144
145
146
147
148
package examples_test
import (
"context"
"crypto/rand"
"crypto/rsa"
"encoding/base64"
"fmt"
"github.com/lestrrat-go/jwx/v3/jwa"
"github.com/lestrrat-go/jwx/v3/jws"
"github.com/lestrrat-go/jwx/v3/jwt"
)
func ExampleJWT_ParseWithKeyProvider_UseToken() {
// This example shows how one might use the information in the JWT to
// load different keys.
// Setup
origIssuer := "me"
tok, err := jwt.NewBuilder().
Issuer(origIssuer).
Build()
if err != nil {
fmt.Printf("failed to build token: %s\n", err)
return
}
symmetricKey := []byte("Abracadabra")
alg := jwa.HS256()
signed, err := jwt.Sign(tok, jwt.WithKey(alg, symmetricKey))
if err != nil {
fmt.Printf("failed to sign token: %s\n", err)
return
}
// This next example assumes that you want to minimize the number of
// times you parse the JWT JSON
{
_, b64payload, _, err := jws.SplitCompact(signed)
if err != nil {
fmt.Printf("failed to split jws: %s\n", err)
return
}
enc := base64.RawStdEncoding
payload := make([]byte, enc.DecodedLen(len(b64payload)))
_, err = enc.Decode(payload, b64payload)
if err != nil {
fmt.Printf("failed to decode base64 payload: %s\n", err)
return
}
parsed, err := jwt.Parse(payload, jwt.WithVerify(false))
if err != nil {
fmt.Printf("failed to parse JWT: %s\n", err)
return
}
_, err = jws.Verify(signed, jws.WithKeyProvider(jws.KeyProviderFunc(func(_ context.Context, sink jws.KeySink, sig *jws.Signature, msg *jws.Message) error {
iss, ok := parsed.Issuer()
if !ok {
return fmt.Errorf("no issuer found")
}
switch iss {
case "me":
sink.Key(alg, symmetricKey)
return nil
default:
return fmt.Errorf("unknown issuer %q", iss)
}
})))
if err != nil {
fmt.Printf("%s\n", err)
return
}
if iss, ok := parsed.Issuer(); !ok || iss != origIssuer {
fmt.Printf("issuers do not match\n")
return
}
}
// OUTPUT:
//
}
func ExampleJWT_ParseWithKeyProvider() {
// Pretend that this is a storage somewhere (maybe a database) that maps
// a signature algorithm to a key
store := make(map[jwa.KeyAlgorithm]interface{})
algorithms := []jwa.SignatureAlgorithm{
jwa.RS256(),
jwa.RS384(),
jwa.RS512(),
}
var signingKey *rsa.PrivateKey
for _, alg := range algorithms {
pk, err := rsa.GenerateKey(rand.Reader, 2048)
if err != nil {
fmt.Printf("failed to generate private key: %s\n", err)
return
}
// too lazy to write a proper algorithm. just assign every
// time, and signingKey will end up being the last key generated
signingKey = pk
store[alg] = pk.PublicKey
}
// Create a JWT
token := jwt.New()
token.Set(`foo`, `bar`)
// Use the last private key in the list to sign the payload
serialized, err := jwt.Sign(token, jwt.WithKey(algorithms[2], signingKey))
if err != nil {
fmt.Printf(`failed to sign JWT: %s`, err)
return
}
// This example uses jws.KeyProviderFunc, but for production use
// you should probably use a reusable object that implements
// jws.KeyProvider
tok, err := jwt.Parse(serialized, jwt.WithKeyProvider(jws.KeyProviderFunc(func(_ context.Context, sink jws.KeySink, sig *jws.Signature, _ *jws.Message) error {
alg, ok := sig.ProtectedHeaders().Algorithm()
if !ok {
return nil
}
key, ok := store[alg]
if !ok {
// nothing found
return nil
}
// Note: we only send one key here, but we could potentially send _ALL_
// keys in the store and have `jws.Verify()` try each one (but it would
// most likely be a waste if you did that)
sink.Key(alg, key)
return nil
})))
if err != nil {
fmt.Printf(`failed to verify JWT: %s`, err)
return
}
_ = tok
// OUTPUT:
}