This commit is contained in:
Matthew Ryan Dillon 2016-03-09 09:06:54 -07:00
parent 92f2107635
commit c7a2ea1c62

30
jwt.go
View file

@ -107,18 +107,18 @@ func (m *Middleware) Secure(h http.Handler, v VerifyClaimsFunc) http.Handler {
return &jwtError{status: http.StatusUnauthorized, err: ErrMissingToken} return &jwtError{status: http.StatusUnauthorized, err: ErrMissingToken}
} }
} else { } else {
token_parts := strings.Split(authHeader, " ") tokenParts := strings.Split(authHeader, " ")
if len(token_parts) != 2 { if len(tokenParts) != 2 {
return &jwtError{status: http.StatusUnauthorized, err: ErrMalformedToken} return &jwtError{status: http.StatusUnauthorized, err: ErrMalformedToken}
} }
token = token_parts[1] token = tokenParts[1]
} }
if status, err, message := m.VerifyToken(token, v, r); err != nil { if status, message, err := m.VerifyToken(token, v, r); err != nil {
return &jwtError{ return &jwtError{
status: status, status: status,
err: err,
message: message, message: message,
err: err,
} }
} }
@ -242,16 +242,16 @@ func (m *Middleware) CreateToken(identity string) (string, error) {
} }
// VerifyToken verifies a token // VerifyToken verifies a token
func (m *Middleware) VerifyToken(token string, v VerifyClaimsFunc, r *http.Request) (int, error, string) { func (m *Middleware) VerifyToken(token string, v VerifyClaimsFunc, r *http.Request) (int, string, error) {
tokenParts := strings.Split(token, ".") tokenParts := strings.Split(token, ".")
if len(tokenParts) != 3 { if len(tokenParts) != 3 {
return http.StatusUnauthorized, ErrMalformedToken, "" return http.StatusUnauthorized, "", ErrMalformedToken
} }
// First, verify JOSE header // First, verify JOSE header
header, err := decode(tokenParts[0]) header, err := decode(tokenParts[0])
if err != nil { if err != nil {
return http.StatusInternalServerError, err, fmt.Sprintf("decoding header (%v)", tokenParts[0]) return http.StatusInternalServerError, fmt.Sprintf("decoding header (%v)", tokenParts[0]), err
} }
var t struct { var t struct {
Typ string Typ string
@ -259,7 +259,7 @@ func (m *Middleware) VerifyToken(token string, v VerifyClaimsFunc, r *http.Reque
} }
err = json.Unmarshal(header, &t) err = json.Unmarshal(header, &t)
if err != nil { if err != nil {
return http.StatusInternalServerError, ErrMalformedToken, fmt.Sprintf("unmarshalling header (%s)", header) return http.StatusInternalServerError, fmt.Sprintf("unmarshalling header (%s)", header), ErrMalformedToken
} }
// Then, verify signature // Then, verify signature
@ -268,29 +268,29 @@ func (m *Middleware) VerifyToken(token string, v VerifyClaimsFunc, r *http.Reque
mac.Write(message) mac.Write(message)
expectedMac, err := encode(mac.Sum(nil)) expectedMac, err := encode(mac.Sum(nil))
if err != nil { if err != nil {
return http.StatusInternalServerError, err, "" return http.StatusInternalServerError, "", err
} }
if !hmac.Equal([]byte(tokenParts[2]), []byte(expectedMac)) { if !hmac.Equal([]byte(tokenParts[2]), []byte(expectedMac)) {
return http.StatusUnauthorized, ErrInvalidSignature, fmt.Sprintf("checking signature (%v)", tokenParts[2]) return http.StatusUnauthorized, fmt.Sprintf("checking signature (%v)", tokenParts[2]), ErrInvalidSignature
} }
// Finally, check claims // Finally, check claims
claimSet, err := decode(tokenParts[1]) claimSet, err := decode(tokenParts[1])
if err != nil { if err != nil {
return http.StatusInternalServerError, ErrDecoding, "decoding claims" return http.StatusInternalServerError, "decoding claims", ErrDecoding
} }
err = v(claimSet, r) err = v(claimSet, r)
if err != nil { if err != nil {
return http.StatusUnauthorized, err, "handling claims callback" return http.StatusUnauthorized, "handling claims callback", err
} }
return 200, nil, "" return 200, "", nil
} }
type jwtError struct { type jwtError struct {
status int status int
err error
message string message string
err error
} }
type errorHandler func(http.ResponseWriter, *http.Request) *jwtError type errorHandler func(http.ResponseWriter, *http.Request) *jwtError