1// Copyright 2014 The Go Authors. All rights reserved.
2// Use of this source code is governed by a BSD-style
3// license that can be found in the LICENSE file.
4
5// Package jws provides a partial implementation
6// of JSON Web Signature encoding and decoding.
7// It exists to support the golang.org/x/oauth2 package.
8//
9// See RFC 7515.
10//
11// Deprecated: this package is not intended for public use and might be
12// removed in the future. It exists for internal use only.
13// Please switch to another JWS package or copy this package into your own
14// source tree.
15package jws
16
17import (
18	"bytes"
19	"crypto"
20	"crypto/rand"
21	"crypto/rsa"
22	"crypto/sha256"
23	"encoding/base64"
24	"encoding/json"
25	"errors"
26	"fmt"
27	"strings"
28	"time"
29)
30
31// ClaimSet contains information about the JWT signature including the
32// permissions being requested (scopes), the target of the token, the issuer,
33// the time the token was issued, and the lifetime of the token.
34type ClaimSet struct {
35	Iss   string `json:"iss"`             // email address of the client_id of the application making the access token request
36	Scope string `json:"scope,omitempty"` // space-delimited list of the permissions the application requests
37	Aud   string `json:"aud"`             // descriptor of the intended target of the assertion (Optional).
38	Exp   int64  `json:"exp"`             // the expiration time of the assertion (seconds since Unix epoch)
39	Iat   int64  `json:"iat"`             // the time the assertion was issued (seconds since Unix epoch)
40	Typ   string `json:"typ,omitempty"`   // token type (Optional).
41
42	// Email for which the application is requesting delegated access (Optional).
43	Sub string `json:"sub,omitempty"`
44
45	// The old name of Sub. Client keeps setting Prn to be
46	// complaint with legacy OAuth 2.0 providers. (Optional)
47	Prn string `json:"prn,omitempty"`
48
49	// See http://tools.ietf.org/html/draft-jones-json-web-token-10#section-4.3
50	// This array is marshalled using custom code (see (c *ClaimSet) encode()).
51	PrivateClaims map[string]interface{} `json:"-"`
52}
53
54func (c *ClaimSet) encode() (string, error) {
55	// Reverting time back for machines whose time is not perfectly in sync.
56	// If client machine's time is in the future according
57	// to Google servers, an access token will not be issued.
58	now := time.Now().Add(-10 * time.Second)
59	if c.Iat == 0 {
60		c.Iat = now.Unix()
61	}
62	if c.Exp == 0 {
63		c.Exp = now.Add(time.Hour).Unix()
64	}
65	if c.Exp < c.Iat {
66		return "", fmt.Errorf("jws: invalid Exp = %v; must be later than Iat = %v", c.Exp, c.Iat)
67	}
68
69	b, err := json.Marshal(c)
70	if err != nil {
71		return "", err
72	}
73
74	if len(c.PrivateClaims) == 0 {
75		return base64.RawURLEncoding.EncodeToString(b), nil
76	}
77
78	// Marshal private claim set and then append it to b.
79	prv, err := json.Marshal(c.PrivateClaims)
80	if err != nil {
81		return "", fmt.Errorf("jws: invalid map of private claims %v", c.PrivateClaims)
82	}
83
84	// Concatenate public and private claim JSON objects.
85	if !bytes.HasSuffix(b, []byte{'}'}) {
86		return "", fmt.Errorf("jws: invalid JSON %s", b)
87	}
88	if !bytes.HasPrefix(prv, []byte{'{'}) {
89		return "", fmt.Errorf("jws: invalid JSON %s", prv)
90	}
91	b[len(b)-1] = ','         // Replace closing curly brace with a comma.
92	b = append(b, prv[1:]...) // Append private claims.
93	return base64.RawURLEncoding.EncodeToString(b), nil
94}
95
96// Header represents the header for the signed JWS payloads.
97type Header struct {
98	// The algorithm used for signature.
99	Algorithm string `json:"alg"`
100
101	// Represents the token type.
102	Typ string `json:"typ"`
103
104	// The optional hint of which key is being used.
105	KeyID string `json:"kid,omitempty"`
106}
107
108func (h *Header) encode() (string, error) {
109	b, err := json.Marshal(h)
110	if err != nil {
111		return "", err
112	}
113	return base64.RawURLEncoding.EncodeToString(b), nil
114}
115
116// Decode decodes a claim set from a JWS payload.
117func Decode(payload string) (*ClaimSet, error) {
118	// decode returned id token to get expiry
119	s := strings.Split(payload, ".")
120	if len(s) < 2 {
121		// TODO(jbd): Provide more context about the error.
122		return nil, errors.New("jws: invalid token received")
123	}
124	decoded, err := base64.RawURLEncoding.DecodeString(s[1])
125	if err != nil {
126		return nil, err
127	}
128	c := &ClaimSet{}
129	err = json.NewDecoder(bytes.NewBuffer(decoded)).Decode(c)
130	return c, err
131}
132
133// Signer returns a signature for the given data.
134type Signer func(data []byte) (sig []byte, err error)
135
136// EncodeWithSigner encodes a header and claim set with the provided signer.
137func EncodeWithSigner(header *Header, c *ClaimSet, sg Signer) (string, error) {
138	head, err := header.encode()
139	if err != nil {
140		return "", err
141	}
142	cs, err := c.encode()
143	if err != nil {
144		return "", err
145	}
146	ss := fmt.Sprintf("%s.%s", head, cs)
147	sig, err := sg([]byte(ss))
148	if err != nil {
149		return "", err
150	}
151	return fmt.Sprintf("%s.%s", ss, base64.RawURLEncoding.EncodeToString(sig)), nil
152}
153
154// Encode encodes a signed JWS with provided header and claim set.
155// This invokes EncodeWithSigner using crypto/rsa.SignPKCS1v15 with the given RSA private key.
156func Encode(header *Header, c *ClaimSet, key *rsa.PrivateKey) (string, error) {
157	sg := func(data []byte) (sig []byte, err error) {
158		h := sha256.New()
159		h.Write(data)
160		return rsa.SignPKCS1v15(rand.Reader, key, crypto.SHA256, h.Sum(nil))
161	}
162	return EncodeWithSigner(header, c, sg)
163}
164
165// Verify tests whether the provided JWT token's signature was produced by the private key
166// associated with the supplied public key.
167func Verify(token string, key *rsa.PublicKey) error {
168	parts := strings.Split(token, ".")
169	if len(parts) != 3 {
170		return errors.New("jws: invalid token received, token must have 3 parts")
171	}
172
173	signedContent := parts[0] + "." + parts[1]
174	signatureString, err := base64.RawURLEncoding.DecodeString(parts[2])
175	if err != nil {
176		return err
177	}
178
179	h := sha256.New()
180	h.Write([]byte(signedContent))
181	return rsa.VerifyPKCS1v15(key, crypto.SHA256, h.Sum(nil), []byte(signatureString))
182}
183