mirror of
				https://github.com/minio/minio.git
				synced 2025-10-31 16:21:49 +01:00 
			
		
		
		
	Implementation overview: https://gist.github.com/klauspost/1801c858d5e0df391114436fdad6987b
		
			
				
	
	
		
			214 lines
		
	
	
		
			5.9 KiB
		
	
	
	
		
			Go
		
	
	
	
	
	
			
		
		
	
	
			214 lines
		
	
	
		
			5.9 KiB
		
	
	
	
		
			Go
		
	
	
	
	
	
| /*
 | |
|  * MinIO Cloud Storage, (C) 2020 MinIO, Inc.
 | |
|  *
 | |
|  * Licensed under the Apache License, Version 2.0 (the "License");
 | |
|  * you may not use this file except in compliance with the License.
 | |
|  * You may obtain a copy of the License at
 | |
|  *
 | |
|  *     http://www.apache.org/licenses/LICENSE-2.0
 | |
|  *
 | |
|  * Unless required by applicable law or agreed to in writing, software
 | |
|  * distributed under the License is distributed on an "AS IS" BASIS,
 | |
|  * WITHOUT WARRANTIES OR CONDITIONS OF ANY KIND, either express or implied.
 | |
|  * See the License for the specific language governing permissions and
 | |
|  * limitations under the License.
 | |
|  */
 | |
| 
 | |
| package jwt
 | |
| 
 | |
| // This file is a re-implementation of the original code here with some
 | |
| // additional allocation tweaks reproduced using GODEBUG=allocfreetrace=1
 | |
| // original file https://github.com/dgrijalva/jwt-go/blob/master/parser.go
 | |
| // borrowed under MIT License https://github.com/dgrijalva/jwt-go/blob/master/LICENSE
 | |
| 
 | |
| import (
 | |
| 	"fmt"
 | |
| 	"testing"
 | |
| 	"time"
 | |
| 
 | |
| 	"github.com/dgrijalva/jwt-go"
 | |
| )
 | |
| 
 | |
| var (
 | |
| 	defaultKeyFunc = func(claim *MapClaims) ([]byte, error) { return []byte("HelloSecret"), nil }
 | |
| 	emptyKeyFunc   = func(claim *MapClaims) ([]byte, error) { return nil, nil }
 | |
| 	errorKeyFunc   = func(claim *MapClaims) ([]byte, error) { return nil, fmt.Errorf("error loading key") }
 | |
| )
 | |
| 
 | |
| var jwtTestData = []struct {
 | |
| 	name        string
 | |
| 	tokenString string
 | |
| 	keyfunc     func(*MapClaims) ([]byte, error)
 | |
| 	claims      jwt.Claims
 | |
| 	valid       bool
 | |
| 	errors      int32
 | |
| }{
 | |
| 	{
 | |
| 		"basic",
 | |
| 		"",
 | |
| 		defaultKeyFunc,
 | |
| 		&MapClaims{
 | |
| 			MapClaims: jwt.MapClaims{
 | |
| 				"foo": "bar",
 | |
| 			},
 | |
| 		},
 | |
| 		true,
 | |
| 		0,
 | |
| 	},
 | |
| 	{
 | |
| 		"basic expired",
 | |
| 		"", // autogen
 | |
| 		defaultKeyFunc,
 | |
| 		&MapClaims{
 | |
| 			MapClaims: jwt.MapClaims{
 | |
| 				"foo": "bar",
 | |
| 				"exp": float64(time.Now().Unix() - 100),
 | |
| 			},
 | |
| 		},
 | |
| 		false,
 | |
| 		-1,
 | |
| 	},
 | |
| 	{
 | |
| 		"basic nbf",
 | |
| 		"", // autogen
 | |
| 		defaultKeyFunc,
 | |
| 		&MapClaims{
 | |
| 			MapClaims: jwt.MapClaims{
 | |
| 				"foo": "bar",
 | |
| 				"nbf": float64(time.Now().Unix() + 100),
 | |
| 			},
 | |
| 		},
 | |
| 		false,
 | |
| 		-1,
 | |
| 	},
 | |
| 	{
 | |
| 		"expired and nbf",
 | |
| 		"", // autogen
 | |
| 		defaultKeyFunc,
 | |
| 		&MapClaims{
 | |
| 			MapClaims: jwt.MapClaims{
 | |
| 				"foo": "bar",
 | |
| 				"nbf": float64(time.Now().Unix() + 100),
 | |
| 				"exp": float64(time.Now().Unix() - 100),
 | |
| 			},
 | |
| 		},
 | |
| 		false,
 | |
| 		-1,
 | |
| 	},
 | |
| 	{
 | |
| 		"basic invalid",
 | |
| 		"eyJ0eXAiOiJKV1QiLCJhbGciOiJSUzI1NiJ9.eyJmb28iOiJiYXIifQ.EhkiHkoESI_cG3NPigFrxEk9Z60_oXrOT2vGm9Pn6RDgYNovYORQmmA0zs1AoAOf09ly2Nx2YAg6ABqAYga1AcMFkJljwxTT5fYphTuqpWdy4BELeSYJx5Ty2gmr8e7RonuUztrdD5WfPqLKMm1Ozp_T6zALpRmwTIW0QPnaBXaQD90FplAg46Iy1UlDKr-Eupy0i5SLch5Q-p2ZpaL_5fnTIUDlxC3pWhJTyx_71qDI-mAA_5lE_VdroOeflG56sSmDxopPEG3bFlSu1eowyBfxtu0_CuVd-M42RU75Zc4Gsj6uV77MBtbMrf4_7M_NUTSgoIF3fRqxrj0NzihIBg",
 | |
| 		defaultKeyFunc,
 | |
| 		&MapClaims{
 | |
| 			MapClaims: jwt.MapClaims{
 | |
| 				"foo": "bar",
 | |
| 			},
 | |
| 		},
 | |
| 		false,
 | |
| 		-1,
 | |
| 	},
 | |
| 	{
 | |
| 		"basic nokeyfunc",
 | |
| 		"eyJ0eXAiOiJKV1QiLCJhbGciOiJSUzI1NiJ9.eyJmb28iOiJiYXIifQ.FhkiHkoESI_cG3NPigFrxEk9Z60_oXrOT2vGm9Pn6RDgYNovYORQmmA0zs1AoAOf09ly2Nx2YAg6ABqAYga1AcMFkJljwxTT5fYphTuqpWdy4BELeSYJx5Ty2gmr8e7RonuUztrdD5WfPqLKMm1Ozp_T6zALpRmwTIW0QPnaBXaQD90FplAg46Iy1UlDKr-Eupy0i5SLch5Q-p2ZpaL_5fnTIUDlxC3pWhJTyx_71qDI-mAA_5lE_VdroOeflG56sSmDxopPEG3bFlSu1eowyBfxtu0_CuVd-M42RU75Zc4Gsj6uV77MBtbMrf4_7M_NUTSgoIF3fRqxrj0NzihIBg",
 | |
| 		nil,
 | |
| 		&MapClaims{
 | |
| 			MapClaims: jwt.MapClaims{
 | |
| 				"foo": "bar",
 | |
| 			},
 | |
| 		},
 | |
| 		false,
 | |
| 		-1,
 | |
| 	},
 | |
| 	{
 | |
| 		"basic nokey",
 | |
| 		"eyJ0eXAiOiJKV1QiLCJhbGciOiJSUzI1NiJ9.eyJmb28iOiJiYXIifQ.FhkiHkoESI_cG3NPigFrxEk9Z60_oXrOT2vGm9Pn6RDgYNovYORQmmA0zs1AoAOf09ly2Nx2YAg6ABqAYga1AcMFkJljwxTT5fYphTuqpWdy4BELeSYJx5Ty2gmr8e7RonuUztrdD5WfPqLKMm1Ozp_T6zALpRmwTIW0QPnaBXaQD90FplAg46Iy1UlDKr-Eupy0i5SLch5Q-p2ZpaL_5fnTIUDlxC3pWhJTyx_71qDI-mAA_5lE_VdroOeflG56sSmDxopPEG3bFlSu1eowyBfxtu0_CuVd-M42RU75Zc4Gsj6uV77MBtbMrf4_7M_NUTSgoIF3fRqxrj0NzihIBg",
 | |
| 		emptyKeyFunc,
 | |
| 		&MapClaims{
 | |
| 			MapClaims: jwt.MapClaims{
 | |
| 				"foo": "bar",
 | |
| 			},
 | |
| 		},
 | |
| 		false,
 | |
| 		-1,
 | |
| 	},
 | |
| 	{
 | |
| 		"basic errorkey",
 | |
| 		"eyJ0eXAiOiJKV1QiLCJhbGciOiJSUzI1NiJ9.eyJmb28iOiJiYXIifQ.FhkiHkoESI_cG3NPigFrxEk9Z60_oXrOT2vGm9Pn6RDgYNovYORQmmA0zs1AoAOf09ly2Nx2YAg6ABqAYga1AcMFkJljwxTT5fYphTuqpWdy4BELeSYJx5Ty2gmr8e7RonuUztrdD5WfPqLKMm1Ozp_T6zALpRmwTIW0QPnaBXaQD90FplAg46Iy1UlDKr-Eupy0i5SLch5Q-p2ZpaL_5fnTIUDlxC3pWhJTyx_71qDI-mAA_5lE_VdroOeflG56sSmDxopPEG3bFlSu1eowyBfxtu0_CuVd-M42RU75Zc4Gsj6uV77MBtbMrf4_7M_NUTSgoIF3fRqxrj0NzihIBg",
 | |
| 		errorKeyFunc,
 | |
| 		&MapClaims{
 | |
| 			MapClaims: jwt.MapClaims{
 | |
| 				"foo": "bar",
 | |
| 			},
 | |
| 		},
 | |
| 		false,
 | |
| 		-1,
 | |
| 	},
 | |
| 	{
 | |
| 		"Standard Claims",
 | |
| 		"",
 | |
| 		defaultKeyFunc,
 | |
| 		&StandardClaims{
 | |
| 			StandardClaims: jwt.StandardClaims{
 | |
| 				ExpiresAt: time.Now().Add(time.Second * 10).Unix(),
 | |
| 			},
 | |
| 		},
 | |
| 		true,
 | |
| 		0,
 | |
| 	},
 | |
| }
 | |
| 
 | |
| func mapClaimsToken(claims *MapClaims) string {
 | |
| 	claims.SetAccessKey("test")
 | |
| 	j := jwt.NewWithClaims(jwt.SigningMethodHS512, claims)
 | |
| 	tk, _ := j.SignedString([]byte("HelloSecret"))
 | |
| 	return tk
 | |
| }
 | |
| 
 | |
| func standardClaimsToken(claims *StandardClaims) string {
 | |
| 	claims.AccessKey = "test"
 | |
| 	claims.Subject = "test"
 | |
| 	j := jwt.NewWithClaims(jwt.SigningMethodHS512, claims)
 | |
| 	tk, _ := j.SignedString([]byte("HelloSecret"))
 | |
| 	return tk
 | |
| }
 | |
| 
 | |
| func TestParserParse(t *testing.T) {
 | |
| 	// Iterate over test data set and run tests
 | |
| 	for _, data := range jwtTestData {
 | |
| 		data := data
 | |
| 		t.Run(data.name, func(t *testing.T) {
 | |
| 			// Parse the token
 | |
| 			var err error
 | |
| 
 | |
| 			// Figure out correct claims type
 | |
| 			switch claims := data.claims.(type) {
 | |
| 			case *MapClaims:
 | |
| 				if data.tokenString == "" {
 | |
| 					data.tokenString = mapClaimsToken(claims)
 | |
| 				}
 | |
| 				err = ParseWithClaims(data.tokenString, &MapClaims{}, data.keyfunc)
 | |
| 			case *StandardClaims:
 | |
| 				if data.tokenString == "" {
 | |
| 					data.tokenString = standardClaimsToken(claims)
 | |
| 				}
 | |
| 				err = ParseWithStandardClaims(data.tokenString, &StandardClaims{}, []byte("HelloSecret"))
 | |
| 			}
 | |
| 
 | |
| 			if data.valid && err != nil {
 | |
| 				t.Errorf("Error while verifying token: %T:%v", err, err)
 | |
| 			}
 | |
| 
 | |
| 			if !data.valid && err == nil {
 | |
| 				t.Errorf("Invalid token passed validation")
 | |
| 			}
 | |
| 
 | |
| 			if data.errors != 0 {
 | |
| 				_, ok := err.(*jwt.ValidationError)
 | |
| 				if !ok {
 | |
| 					t.Errorf("Expected *jwt.ValidationError, but got %#v instead", err)
 | |
| 				}
 | |
| 			}
 | |
| 		})
 | |
| 	}
 | |
| }
 |