Documentation ¶
Overview ¶
Package jwt implements JSON Web Tokens as described in https://tools.ietf.org/html/rfc7519
This file is auto-generated by jwt/internal/cmd/gentoken/main.go. DO NOT EDIT
Index ¶
- Constants
- func Sign(t Token, alg jwa.SignatureAlgorithm, key interface{}, options ...Option) ([]byte, error)
- func Validate(t Token, options ...ValidateOption) error
- func Verify(t Token, options ...ValidateOption) error
- type ClaimPair
- type Clock
- type ClockFunc
- type Iterator
- type Option
- type ParseOption
- func UseDefaultKey(value bool) ParseOption
- func WithHeaders(hdrs jws.Headers) ParseOption
- func WithKeySet(set *jwk.Set) ParseOption
- func WithOpenIDClaims() ParseOption
- func WithToken(t Token) ParseOption
- func WithValidate(b bool) ParseOption
- func WithVerify(alg jwa.SignatureAlgorithm, key interface{}) ParseOption
- type Token
- type ValidateOption
- func WithAcceptableSkew(dur time.Duration) ValidateOption
- func WithAudience(s string) ValidateOption
- func WithClaimValue(name string, v interface{}) ValidateOption
- func WithClock(c Clock) ValidateOption
- func WithIssuer(s string) ValidateOption
- func WithJwtID(s string) ValidateOption
- func WithSubject(s string) ValidateOption
- type VerifyParameters
- type Visitor
- type VisitorFunc
Examples ¶
Constants ¶
const ( AudienceKey = "aud" ExpirationKey = "exp" IssuedAtKey = "iat" IssuerKey = "iss" JwtIDKey = "jti" NotBeforeKey = "nbf" SubjectKey = "sub" )
Variables ¶
This section is empty.
Functions ¶
func Sign ¶ added in v1.0.0
Sign is a convenience function to create a signed JWT token serialized in compact form.
It accepts either a raw key (e.g. rsa.PrivateKey, ecdsa.PrivateKey, etc) or a jwk.Key, and the name of the algorithm that should be used to sign the token.
If the key is a jwk.Key and the key contains a key ID (`kid` field), then it is added to the protected header generated by the signature
The algorithm specified in the `alg` parameter must be able to support the type of key you provided, otherwise an error is returned.
The protected header will also automatically have the `typ` field set to the literal value `JWT`.
Example ¶
package main import ( "bytes" "crypto/rand" "crypto/rsa" "fmt" "github.com/lestrrat-go/jwx/internal/json" "github.com/lestrrat-go/jwx/jwa" "github.com/lestrrat-go/jwx/jwt" ) func main() { privKey, err := rsa.GenerateKey(rand.Reader, 2048) if err != nil { fmt.Printf("failed to generate private key: %s\n", err) return } var payload []byte { // Create signed payload token := jwt.New() token.Set(`foo`, `bar`) payload, err = jwt.Sign(token, jwa.RS256, privKey) if err != nil { fmt.Printf("failed to generate signed payload: %s\n", err) return } } { // Parse signed payload, and perform (1) verification of the signature // and (2) validation of the JWT token // Validation can be performed in a separate step using `jwt.Validate` token, err := jwt.Parse(bytes.NewReader(payload), jwt.WithValidate(true), jwt.WithVerify(jwa.RS256, &privKey.PublicKey), ) if err != nil { fmt.Printf("failed to parse JWT token: %s\n", err) return } buf, err := json.MarshalIndent(token, "", " ") if err != nil { fmt.Printf("failed to generate JSON: %s\n", err) return } fmt.Printf("%s\n", buf) } }
Output: { "foo": "bar" }
func Validate ¶ added in v1.0.6
func Validate(t Token, options ...ValidateOption) error
Validate makes sure that the essential claims stand.
See the various `WithXXX` functions for optional parameters that can control the behavior of this method.
func Verify ¶ added in v1.0.0
func Verify(t Token, options ...ValidateOption) error
Verify has been deprecated in favor of `Validate` function, to avoid confusion between verifying the JWS signature during `Parse`, and the validation of the JWT token's contents
Types ¶
type ParseOption ¶ added in v1.0.6
type ParseOption interface { Option // contains filtered or unexported methods }
func UseDefaultKey ¶ added in v1.0.6
func UseDefaultKey(value bool) ParseOption
UseDefaultKey is used in conjunction with the option WithKeySet to instruct the Parse method to default to the single key in a key set when no Key ID is included in the JWT. If the key set contains multiple keys then the behaviour is unchanged.
func WithHeaders ¶ added in v1.0.3
func WithHeaders(hdrs jws.Headers) ParseOption
WithHeaders is passed to `Sign()` method, to allow specifying arbitrary header values to be included in the header section of the jws message
func WithKeySet ¶ added in v1.0.3
func WithKeySet(set *jwk.Set) ParseOption
WithKeySet forces the Parse method to verify the JWT message using one of the keys in the given key set. The key to be used is chosen by matching the Key ID of the JWT and the ID of the give keys.
func WithOpenIDClaims ¶ added in v1.0.0
func WithOpenIDClaims() ParseOption
WithOpenIDClaims is passed to the various JWT parsing functions, and specifies that it should use an instance of `openid.Token` as the destination to store the parsed results.
This is exactly equivalent to specifying `jwt.WithToken(openid.New())`
func WithToken ¶ added in v1.0.0
func WithToken(t Token) ParseOption
WithToken specifies the token instance that is used when parsing JWT tokens.
func WithValidate ¶ added in v1.0.6
func WithValidate(b bool) ParseOption
WithValidate is passed to `Parse()` method to denote that the validation of the JWT token should be performed after a successful] parsing of the incoming payload.
func WithVerify ¶
func WithVerify(alg jwa.SignatureAlgorithm, key interface{}) ParseOption
WithVerify forces the Parse method to verify the JWT message using the given key. XXX Should have been named something like WithVerificationKey
type Token ¶
type Token interface { Audience() []string Expiration() time.Time IssuedAt() time.Time Issuer() string JwtID() string NotBefore() time.Time Subject() string PrivateClaims() map[string]interface{} Get(string) (interface{}, bool) Set(string, interface{}) error Iterate(context.Context) Iterator Walk(context.Context, Visitor) error AsMap(context.Context) (map[string]interface{}, error) }
Token represents a generic JWT token. which are type-aware (to an extent). Other claims may be accessed via the `Get`/`Set` methods but their types are not taken into consideration at all. If you have non-standard claims that you must frequently access, consider creating accessors functions like the following
func SetFoo(tok jwt.Token) error func GetFoo(tok jwt.Token) (*Customtyp, error)
Embedding jwt.Token into another struct is not recommended, becase jwt.Token needs to handle private claims, and this really does not work well when it is embedded in other structure
Example ¶
t := jwt.New() t.Set(jwt.SubjectKey, `https://github.com/lestrrat-go/jwx/jwt`) t.Set(jwt.AudienceKey, `Golang Users`) t.Set(jwt.IssuedAtKey, time.Unix(aLongLongTimeAgo, 0)) t.Set(`privateClaimKey`, `Hello, World!`) buf, err := json.MarshalIndent(t, "", " ") if err != nil { fmt.Printf("failed to generate JSON: %s\n", err) return } fmt.Printf("%s\n", buf) fmt.Printf("aud -> '%s'\n", t.Audience()) fmt.Printf("iat -> '%s'\n", t.IssuedAt().Format(time.RFC3339)) if v, ok := t.Get(`privateClaimKey`); ok { fmt.Printf("privateClaimKey -> '%s'\n", v) } fmt.Printf("sub -> '%s'\n", t.Subject())
Output: { "aud": [ "Golang Users" ], "iat": 233431200, "sub": "https://github.com/lestrrat-go/jwx/jwt", "privateClaimKey": "Hello, World!" } aud -> '[Golang Users]' iat -> '1977-05-25T18:00:00Z' privateClaimKey -> 'Hello, World!' sub -> 'https://github.com/lestrrat-go/jwx/jwt'
func New ¶
func New() Token
New creates a standard token, with minimal knowledge of possible claims. Standard claims include"aud", "exp", "iat", "iss", "jti", "nbf" and "sub". Convenience accessors are provided for these standard claims
func Parse ¶
Parse parses the JWT token payload and creates a new `jwt.Token` object. The token must be encoded in either JSON format or compact format.
If the token is signed and you want to verify the payload matches the signature, you must pass the jwt.WithVerify(alg, key) or jwt.WithVerifyKeySet(jwk.Set) option. If you do not specify these parameters, no verification will be performed.
If you also want to assert the validity of the JWT itself (i.e. expiration and such), use the `Valid()` function on the returned token, or pass the `WithValidation(true)` option. Validation options can also be passed to `Parse`
This function takes both ParseOption and Validate Option types: ParseOptions control the parsing behavior, and ValidateOptions are passed to `Validate()` when `jwt.WithValidate` is specified.
func ParseBytes ¶
ParseString calls Parse with the given byte sequence
func ParseString ¶
ParseString calls Parse with the given string
func ParseVerify ¶
ParseVerify is marked to be deprecated. Please use jwt.Parse with appropriate options instead.
ParseVerify a function that is similar to Parse(), but does not allow for parsing without signature verification parameters.
If you want to provide a *jwk.Set and allow the library to automatically choose the key to use using the Key IDs, use the jwt.WithKeySet option along with the jwt.Parse function.
type ValidateOption ¶ added in v1.0.6
type ValidateOption interface { Option // contains filtered or unexported methods }
func WithAcceptableSkew ¶
func WithAcceptableSkew(dur time.Duration) ValidateOption
WithAcceptableSkew specifies the duration in which exp and nbf claims may differ by. This value should be positive
func WithAudience ¶
func WithAudience(s string) ValidateOption
WithAudience specifies that expected audience value. Verify will return true if one of the values in the `aud` element matches this value. If not specified, the value of issuer is not verified at all.
func WithClaimValue ¶ added in v0.9.2
func WithClaimValue(name string, v interface{}) ValidateOption
WithClaimValue specifies that expected any claim value.
func WithClock ¶
func WithClock(c Clock) ValidateOption
WithClock specifies the `Clock` to be used when verifying claims exp and nbf.
func WithIssuer ¶
func WithIssuer(s string) ValidateOption
WithIssuer specifies that expected issuer value. If not specified, the value of issuer is not verified at all.
func WithJwtID ¶
func WithJwtID(s string) ValidateOption
WithJwtID specifies that expected jti value. If not specified, the value of jti is not verified at all.
func WithSubject ¶
func WithSubject(s string) ValidateOption
WithSubject specifies that expected subject value. If not specified, the value of subject is not verified at all.
type VerifyParameters ¶
type VerifyParameters interface { Algorithm() jwa.SignatureAlgorithm Key() interface{} }
type Visitor ¶ added in v0.9.1
type Visitor = iter.MapVisitor
type VisitorFunc ¶ added in v1.0.0
type VisitorFunc iter.MapVisitorFunc
Source Files ¶
Directories ¶
Path | Synopsis |
---|---|
internal
|
|
Package openid provides a specialized token that provides utilities to work with OpenID JWT tokens.
|
Package openid provides a specialized token that provides utilities to work with OpenID JWT tokens. |