File: jwx_readme_example_test.go

package info (click to toggle)
golang-github-lestrrat-go-jwx 2.1.4-1
  • links: PTS, VCS
  • area: main
  • in suites: forky, sid, trixie
  • size: 2,872 kB
  • sloc: sh: 222; makefile: 86; perl: 62
file content (113 lines) | stat: -rw-r--r-- 2,636 bytes parent folder | download
1
2
3
4
5
6
7
8
9
10
11
12
13
14
15
16
17
18
19
20
21
22
23
24
25
26
27
28
29
30
31
32
33
34
35
36
37
38
39
40
41
42
43
44
45
46
47
48
49
50
51
52
53
54
55
56
57
58
59
60
61
62
63
64
65
66
67
68
69
70
71
72
73
74
75
76
77
78
79
80
81
82
83
84
85
86
87
88
89
90
91
92
93
94
95
96
97
98
99
100
101
102
103
104
105
106
107
108
109
110
111
112
113
package examples_test

import (
	"bytes"
	"fmt"
	"net/http"
	"time"

	"github.com/lestrrat-go/jwx/v2/jwa"
	"github.com/lestrrat-go/jwx/v2/jwe"
	"github.com/lestrrat-go/jwx/v2/jwk"
	"github.com/lestrrat-go/jwx/v2/jws"
	"github.com/lestrrat-go/jwx/v2/jwt"
)

func Example_jwx_readme() {
	// Parse, serialize, slice and dice JWKs!
	privkey, err := jwk.ParseKey(jsonRSAPrivateKey)
	if err != nil {
		fmt.Printf("failed to parse JWK: %s\n", err)
		return
	}

	pubkey, err := jwk.PublicKeyOf(privkey)
	if err != nil {
		fmt.Printf("failed to get public key: %s\n", err)
		return
	}

	// Work with JWTs!
	{
		// Build a JWT!
		tok, err := jwt.NewBuilder().
			Issuer(`github.com/lestrrat-go/jwx`).
			IssuedAt(time.Now()).
			Build()
		if err != nil {
			fmt.Printf("failed to build token: %s\n", err)
			return
		}

		// Sign a JWT!
		signed, err := jwt.Sign(tok, jwt.WithKey(jwa.RS256, privkey))
		if err != nil {
			fmt.Printf("failed to sign token: %s\n", err)
			return
		}

		// Verify a JWT!
		{
			verifiedToken, err := jwt.Parse(signed, jwt.WithKey(jwa.RS256, pubkey))
			if err != nil {
				fmt.Printf("failed to verify JWS: %s\n", err)
				return
			}
			_ = verifiedToken
		}

		// Work with *http.Request!
		{
			req, err := http.NewRequest(http.MethodGet, `https://github.com/lestrrat-go/jwx`, nil)
			req.Header.Set(`Authorization`, fmt.Sprintf(`Bearer %s`, signed))

			verifiedToken, err := jwt.ParseRequest(req, jwt.WithKey(jwa.RS256, pubkey))
			if err != nil {
				fmt.Printf("failed to verify token from HTTP request: %s\n", err)
				return
			}
			_ = verifiedToken
		}
	}

	// Encrypt and Decrypt arbitrary payload with JWE!
	{
		encrypted, err := jwe.Encrypt(payloadLoremIpsum, jwe.WithKey(jwa.RSA_OAEP, jwkRSAPublicKey))
		if err != nil {
			fmt.Printf("failed to encrypt payload: %s\n", err)
			return
		}

		decrypted, err := jwe.Decrypt(encrypted, jwe.WithKey(jwa.RSA_OAEP, jwkRSAPrivateKey))
		if err != nil {
			fmt.Printf("failed to decrypt payload: %s\n", err)
			return
		}

		if !bytes.Equal(decrypted, payloadLoremIpsum) {
			fmt.Printf("verified payload did not match\n")
			return
		}
	}

	// Sign and Verify arbitrary payload with JWS!
	{
		signed, err := jws.Sign(payloadLoremIpsum, jws.WithKey(jwa.RS256, jwkRSAPrivateKey))
		if err != nil {
			fmt.Printf("failed to sign payload: %s\n", err)
			return
		}

		verified, err := jws.Verify(signed, jws.WithKey(jwa.RS256, jwkRSAPublicKey))
		if err != nil {
			fmt.Printf("failed to verify payload: %s\n", err)
			return
		}

		if !bytes.Equal(verified, payloadLoremIpsum) {
			fmt.Printf("verified payload did not match\n")
			return
		}
	}
	// OUTPUT:
}