|
| 1 | +package access |
| 2 | + |
| 3 | +import ( |
| 4 | + "crypto/rsa" |
| 5 | + "encoding/base64" |
| 6 | + "encoding/json" |
| 7 | + "errors" |
| 8 | + "fmt" |
| 9 | + "strings" |
| 10 | + |
| 11 | + "github.com/golang-jwt/jwt/v5" |
| 12 | +) |
| 13 | + |
| 14 | +var ( |
| 15 | + ErrMissingAuthHeader = errors.New("missing Authorization header") |
| 16 | + ErrInvalidJWTSegments = errors.New("invalid size of jwt segments") |
| 17 | + ErrNilInsecurePayload = errors.New("insecure parsed token payload appears as nil") |
| 18 | + ErrInvalidInsecureUserID = errors.New("insecure parsed token user id is invalid") |
| 19 | + ErrInvalidSigningAlg = errors.New("invalid signing algorithm") |
| 20 | + ErrInvalidSig = errors.New("invalid token's signature") |
| 21 | + ErrInvalidClaims = errors.New("claims casting did not go well") |
| 22 | + ErrInvalidPubKeyPtr = errors.New("invalid pointer to public key") |
| 23 | + ErrInvalidUserID = errors.New("user id is invalid") |
| 24 | +) |
| 25 | + |
| 26 | +func VerifyToken(rawToken string, getPublicKeyByUserID func(userID string) (*rsa.PublicKey, error)) (userID string, err error) { |
| 27 | + if rawToken == "" { |
| 28 | + return "", ErrMissingAuthHeader |
| 29 | + } |
| 30 | + if getPublicKeyByUserID == nil { |
| 31 | + return "", ErrInvalidPubKeyPtr |
| 32 | + } |
| 33 | + |
| 34 | + segments := strings.Split(rawToken, ".") |
| 35 | + if len(segments) != 3 { |
| 36 | + return "", ErrInvalidJWTSegments |
| 37 | + } |
| 38 | + |
| 39 | + insecurePayloadJsonStr, err := base64.RawStdEncoding.DecodeString(segments[1]) |
| 40 | + if err != nil { |
| 41 | + return "", err |
| 42 | + } |
| 43 | + |
| 44 | + var insecurePayload map[string]any |
| 45 | + |
| 46 | + if err := json.Unmarshal(insecurePayloadJsonStr, &insecurePayload); err != nil { |
| 47 | + return "", err |
| 48 | + } |
| 49 | + |
| 50 | + if insecurePayload == nil { |
| 51 | + return "", ErrNilInsecurePayload |
| 52 | + } |
| 53 | + |
| 54 | + insecureUserID := fmt.Sprint(insecurePayload["u"]) |
| 55 | + if len(insecureUserID) == 0 || len(insecureUserID) > 32 { |
| 56 | + return "", ErrInvalidInsecureUserID |
| 57 | + } |
| 58 | + |
| 59 | + token, err := jwt.Parse(rawToken, func(t *jwt.Token) (any, error) { |
| 60 | + if _, ok := t.Method.(*jwt.SigningMethodRSA); !ok { |
| 61 | + return nil, ErrInvalidSigningAlg |
| 62 | + } |
| 63 | + |
| 64 | + return getPublicKeyByUserID(insecureUserID) |
| 65 | + }) |
| 66 | + if err != nil { |
| 67 | + return "", err |
| 68 | + } |
| 69 | + |
| 70 | + if !token.Valid { |
| 71 | + return "", ErrInvalidSig |
| 72 | + } |
| 73 | + |
| 74 | + claims, ok := token.Claims.(jwt.MapClaims) |
| 75 | + if !ok { |
| 76 | + return "", ErrInvalidClaims |
| 77 | + } |
| 78 | + |
| 79 | + verifiedUserID := fmt.Sprint(claims["id"]) |
| 80 | + if len(verifiedUserID) == 0 { |
| 81 | + return "", ErrInvalidUserID |
| 82 | + } |
| 83 | + |
| 84 | + return verifiedUserID, nil |
| 85 | +} |
0 commit comments