2024-10-21 16:12:28 +00:00
|
|
|
package sec
|
|
|
|
|
|
|
|
import (
|
|
|
|
"crypto/rsa"
|
|
|
|
"crypto/x509"
|
|
|
|
"encoding/pem"
|
|
|
|
"fmt"
|
|
|
|
"github.com/golang-jwt/jwt/v5"
|
|
|
|
"os"
|
|
|
|
)
|
|
|
|
|
|
|
|
type JwtReader struct {
|
|
|
|
key *rsa.PublicKey
|
|
|
|
}
|
|
|
|
|
|
|
|
func NewJwtReader(fp string) (*JwtReader, error) {
|
2024-10-22 14:58:09 +00:00
|
|
|
rawKey, err := os.ReadFile(fp)
|
2024-10-21 16:12:28 +00:00
|
|
|
if err != nil {
|
|
|
|
return nil, err
|
|
|
|
}
|
|
|
|
|
2024-10-22 14:58:09 +00:00
|
|
|
block, _ := pem.Decode(rawKey)
|
2024-10-21 16:12:28 +00:00
|
|
|
if block == nil || block.Type != "PUBLIC KEY" {
|
|
|
|
return nil, fmt.Errorf("failed to decode PEM block containing private key")
|
|
|
|
}
|
|
|
|
|
|
|
|
anyPk, err := x509.ParsePKIXPublicKey(block.Bytes)
|
|
|
|
if err != nil {
|
|
|
|
return nil, err
|
|
|
|
}
|
|
|
|
|
|
|
|
pk, ok := anyPk.(*rsa.PublicKey)
|
|
|
|
if !ok {
|
|
|
|
return nil, fmt.Errorf("not an RSA public key")
|
|
|
|
}
|
|
|
|
|
|
|
|
return &JwtReader{
|
|
|
|
key: pk,
|
|
|
|
}, nil
|
|
|
|
}
|
|
|
|
|
2024-10-30 15:44:25 +00:00
|
|
|
func ReadJwt[T jwt.Claims](v *JwtReader, in string, out T) (T, error) {
|
2024-10-30 15:36:33 +00:00
|
|
|
token, err := jwt.ParseWithClaims(in, out, func(token *jwt.Token) (interface{}, error) {
|
2024-10-21 16:12:28 +00:00
|
|
|
if _, ok := token.Method.(*jwt.SigningMethodRSA); !ok {
|
|
|
|
return nil, fmt.Errorf("unexpected signing method: %v", token.Header["alg"])
|
|
|
|
}
|
|
|
|
return v.key, nil
|
|
|
|
})
|
|
|
|
if err != nil {
|
|
|
|
return out, err
|
|
|
|
} else if !token.Valid {
|
|
|
|
return out, fmt.Errorf("token is not valid")
|
|
|
|
}
|
|
|
|
|
2024-10-30 15:44:25 +00:00
|
|
|
if claims, ok := token.Claims.(T); ok {
|
|
|
|
return claims, nil
|
|
|
|
} else {
|
|
|
|
return out, err
|
|
|
|
}
|
2024-10-21 16:12:28 +00:00
|
|
|
}
|