mirror of https://github.com/status-im/consul.git
164 lines
3.7 KiB
Go
164 lines
3.7 KiB
Go
/*-
|
|
* Copyright 2016 Zbigniew Mandziejewicz
|
|
* Copyright 2016 Square, Inc.
|
|
*
|
|
* Licensed under the Apache License, Version 2.0 (the "License");
|
|
* you may not use this file except in compliance with the License.
|
|
* You may obtain a copy of the License at
|
|
*
|
|
* http://www.apache.org/licenses/LICENSE-2.0
|
|
*
|
|
* Unless required by applicable law or agreed to in writing, software
|
|
* distributed under the License is distributed on an "AS IS" BASIS,
|
|
* WITHOUT WARRANTIES OR CONDITIONS OF ANY KIND, either express or implied.
|
|
* See the License for the specific language governing permissions and
|
|
* limitations under the License.
|
|
*/
|
|
|
|
package jwt
|
|
|
|
import (
|
|
"fmt"
|
|
"strings"
|
|
|
|
jose "gopkg.in/square/go-jose.v2"
|
|
"gopkg.in/square/go-jose.v2/json"
|
|
)
|
|
|
|
// JSONWebToken represents a JSON Web Token (as specified in RFC7519).
|
|
type JSONWebToken struct {
|
|
payload func(k interface{}) ([]byte, error)
|
|
unverifiedPayload func() []byte
|
|
Headers []jose.Header
|
|
}
|
|
|
|
type NestedJSONWebToken struct {
|
|
enc *jose.JSONWebEncryption
|
|
Headers []jose.Header
|
|
}
|
|
|
|
// Claims deserializes a JSONWebToken into dest using the provided key.
|
|
func (t *JSONWebToken) Claims(key interface{}, dest ...interface{}) error {
|
|
payloadKey := tryJWKS(t.Headers, key)
|
|
|
|
b, err := t.payload(payloadKey)
|
|
if err != nil {
|
|
return err
|
|
}
|
|
|
|
for _, d := range dest {
|
|
if err := json.Unmarshal(b, d); err != nil {
|
|
return err
|
|
}
|
|
}
|
|
|
|
return nil
|
|
}
|
|
|
|
// UnsafeClaimsWithoutVerification deserializes the claims of a
|
|
// JSONWebToken into the dests. For signed JWTs, the claims are not
|
|
// verified. This function won't work for encrypted JWTs.
|
|
func (t *JSONWebToken) UnsafeClaimsWithoutVerification(dest ...interface{}) error {
|
|
if t.unverifiedPayload == nil {
|
|
return fmt.Errorf("square/go-jose: Cannot get unverified claims")
|
|
}
|
|
claims := t.unverifiedPayload()
|
|
for _, d := range dest {
|
|
if err := json.Unmarshal(claims, d); err != nil {
|
|
return err
|
|
}
|
|
}
|
|
return nil
|
|
}
|
|
|
|
func (t *NestedJSONWebToken) Decrypt(decryptionKey interface{}) (*JSONWebToken, error) {
|
|
key := tryJWKS(t.Headers, decryptionKey)
|
|
|
|
b, err := t.enc.Decrypt(key)
|
|
if err != nil {
|
|
return nil, err
|
|
}
|
|
|
|
sig, err := ParseSigned(string(b))
|
|
if err != nil {
|
|
return nil, err
|
|
}
|
|
|
|
return sig, nil
|
|
}
|
|
|
|
// ParseSigned parses token from JWS form.
|
|
func ParseSigned(s string) (*JSONWebToken, error) {
|
|
sig, err := jose.ParseSigned(s)
|
|
if err != nil {
|
|
return nil, err
|
|
}
|
|
headers := make([]jose.Header, len(sig.Signatures))
|
|
for i, signature := range sig.Signatures {
|
|
headers[i] = signature.Header
|
|
}
|
|
|
|
return &JSONWebToken{
|
|
payload: sig.Verify,
|
|
unverifiedPayload: sig.UnsafePayloadWithoutVerification,
|
|
Headers: headers,
|
|
}, nil
|
|
}
|
|
|
|
// ParseEncrypted parses token from JWE form.
|
|
func ParseEncrypted(s string) (*JSONWebToken, error) {
|
|
enc, err := jose.ParseEncrypted(s)
|
|
if err != nil {
|
|
return nil, err
|
|
}
|
|
|
|
return &JSONWebToken{
|
|
payload: enc.Decrypt,
|
|
Headers: []jose.Header{enc.Header},
|
|
}, nil
|
|
}
|
|
|
|
// ParseSignedAndEncrypted parses signed-then-encrypted token from JWE form.
|
|
func ParseSignedAndEncrypted(s string) (*NestedJSONWebToken, error) {
|
|
enc, err := jose.ParseEncrypted(s)
|
|
if err != nil {
|
|
return nil, err
|
|
}
|
|
|
|
contentType, _ := enc.Header.ExtraHeaders[jose.HeaderContentType].(string)
|
|
if strings.ToUpper(contentType) != "JWT" {
|
|
return nil, ErrInvalidContentType
|
|
}
|
|
|
|
return &NestedJSONWebToken{
|
|
enc: enc,
|
|
Headers: []jose.Header{enc.Header},
|
|
}, nil
|
|
}
|
|
|
|
func tryJWKS(headers []jose.Header, key interface{}) interface{} {
|
|
jwks, ok := key.(*jose.JSONWebKeySet)
|
|
if !ok {
|
|
return key
|
|
}
|
|
|
|
var kid string
|
|
for _, header := range headers {
|
|
if header.KeyID != "" {
|
|
kid = header.KeyID
|
|
break
|
|
}
|
|
}
|
|
|
|
if kid == "" {
|
|
return key
|
|
}
|
|
|
|
keys := jwks.Key(kid)
|
|
if len(keys) == 0 {
|
|
return key
|
|
}
|
|
|
|
return keys[0].Key
|
|
}
|