blob: d604f13df9a004d54f360418579f971214daf850 [file] [log] [blame]
// Copyright 2022 Google LLC
//
// Licensed under the Apache License, Version 2.0 (the "License");
// you may not use this file except in compliance with the License.
// You may obtain a copy of the License at
//
// http://www.apache.org/licenses/LICENSE-2.0
//
// Unless required by applicable law or agreed to in writing, software
// distributed under the License is distributed on an "AS IS" BASIS,
// WITHOUT WARRANTIES OR CONDITIONS OF ANY KIND, either express or implied.
// See the License for the specific language governing permissions and
// limitations under the License.
//
////////////////////////////////////////////////////////////////////////////////
// Package jwt implements a subset of JSON Web Token (JWT) as defined by RFC 7519 (https://tools.ietf.org/html/rfc7519) that is considered safe and most often used.
package jwt
import (
"errors"
"fmt"
"github.com/google/tink/go/core/registry"
)
// A generic error returned when something went wrong before validation
var errJwtVerification = errors.New("verification failed")
var errJwtExpired = errors.New("token has expired")
// IsExpirationErr returns true if err was returned by a JWT verification for a token
// with a valid signature that is expired.
//
// Note that if the corresponding verification key has been removed from the keyset,
// verification will not return an expiration error even if the token is expired, because
// the expiration is only verified if the signature is valid.
func IsExpirationErr(err error) bool {
return err == errJwtExpired
}
func init() {
if err := registry.RegisterKeyManager(new(jwtHMACKeyManager)); err != nil {
panic(fmt.Sprintf("jwt.init() failed registering JWT HMAC key manager: %v", err))
}
if err := registry.RegisterKeyManager(new(jwtECDSAVerifierKeyManager)); err != nil {
panic(fmt.Sprintf("jwt.init() failed registering JWT ECDSA verifier key manager: %v", err))
}
if err := registry.RegisterKeyManager(new(jwtECDSASignerKeyManager)); err != nil {
panic(fmt.Sprintf("jwt.init() failed registering JWT ECDSA signer key manager: %v", err))
}
if err := registry.RegisterKeyManager(new(jwtRSSignerKeyManager)); err != nil {
panic(fmt.Sprintf("jwt.init() failed registering JWT RSA SSA PKCS1 signer key manager: %v", err))
}
if err := registry.RegisterKeyManager(new(jwtRSVerifierKeyManager)); err != nil {
panic(fmt.Sprintf("jwt.init() failed registering JWT RSA SSA PKCS1 verifier key manager: %v", err))
}
if err := registry.RegisterKeyManager(new(jwtPSSignerKeyManager)); err != nil {
panic(fmt.Sprintf("jwt.init() failed registering JWT RSA SSA PSS signer key manager: %v", err))
}
if err := registry.RegisterKeyManager(new(jwtPSVerifierKeyManager)); err != nil {
panic(fmt.Sprintf("jwt.init() failed registering JWT RSA SSA PSS verifier key manager: %v", err))
}
}