File: jwe_encrypt_with_headers_example_test.go

package info (click to toggle)
golang-github-lestrrat-go-jwx 2.1.4-1
  • links: PTS, VCS
  • area: main
  • in suites: forky, sid, trixie
  • size: 2,872 kB
  • sloc: sh: 222; makefile: 86; perl: 62
file content (50 lines) | stat: -rw-r--r-- 1,483 bytes parent folder | download
1
2
3
4
5
6
7
8
9
10
11
12
13
14
15
16
17
18
19
20
21
22
23
24
25
26
27
28
29
30
31
32
33
34
35
36
37
38
39
40
41
42
43
44
45
46
47
48
49
50
package examples_test

import (
	"crypto/rand"
	"crypto/rsa"
	"fmt"
	"os"

	"github.com/lestrrat-go/jwx/v2/internal/json"
	"github.com/lestrrat-go/jwx/v2/jwa"
	"github.com/lestrrat-go/jwx/v2/jwe"
)

func Example_jwe_sign_with_headers() {
	privkey, err := rsa.GenerateKey(rand.Reader, 2048)
	if err != nil {
		fmt.Printf("failed to create private key: %s\n", err)
		return
	}
	const payload = "Lorem ipsum"

	hdrs := jwe.NewHeaders()
	hdrs.Set(`x-example`, true)
	encrypted, err := jwe.Encrypt([]byte(payload), jwe.WithKey(jwa.RSA_OAEP, privkey.PublicKey, jwe.WithPerRecipientHeaders(hdrs)))
	if err != nil {
		fmt.Printf("failed to encrypt payload: %s\n", err)
		return
	}

	msg, err := jwe.Parse(encrypted)
	if err != nil {
		fmt.Printf("failed to parse message: %s\n", err)
		return
	}

	// NOTE: This is a bit tricky. Even though we specified a per-recipient
	// header when executing jwe.Encrypt, the headers end up being in the
	// global protected headers section. This is... by the books. JWE
	// in Compact serialization asks us to shove the per-recipient
	// headers in the protected header section, because there is nowhere
	// else to store this information.
	//
	// If this were a full JWE JSON message, you might have to juggle
	// between the global protected headers, global unprotected headers,
	// and per-recipient unprotected headers
	json.NewEncoder(os.Stdout).Encode(msg.ProtectedHeaders())

	// OUTPUT:
	// {"alg":"RSA-OAEP","enc":"A256GCM","x-example":true}
}