iperf3exporter/vendor/github.com/golang-jwt/jwt/v4/map_claims.go

149 lines
3.4 KiB
Go
Raw Normal View History

2021-10-20 10:08:56 +02:00
package jwt
import (
"encoding/json"
"errors"
2021-11-16 15:32:13 +01:00
"time"
2021-10-20 10:08:56 +02:00
// "fmt"
)
// MapClaims is a claims type that uses the map[string]interface{} for JSON decoding.
// This is the default claims type if you don't supply one
type MapClaims map[string]interface{}
// VerifyAudience Compares the aud claim against cmp.
// If required is false, this method will return true if the value matches or is unset
func (m MapClaims) VerifyAudience(cmp string, req bool) bool {
var aud []string
switch v := m["aud"].(type) {
case string:
aud = append(aud, v)
case []string:
aud = v
case []interface{}:
for _, a := range v {
vs, ok := a.(string)
if !ok {
return false
}
aud = append(aud, vs)
}
}
return verifyAud(aud, cmp, req)
}
2021-11-16 15:32:13 +01:00
// VerifyExpiresAt compares the exp claim against cmp (cmp <= exp).
// If req is false, it will return true, if exp is unset.
2021-10-20 10:08:56 +02:00
func (m MapClaims) VerifyExpiresAt(cmp int64, req bool) bool {
2021-11-16 15:32:13 +01:00
cmpTime := time.Unix(cmp, 0)
v, ok := m["exp"]
2021-10-20 10:08:56 +02:00
if !ok {
return !req
}
2021-11-16 15:32:13 +01:00
switch exp := v.(type) {
2021-10-20 10:08:56 +02:00
case float64:
2021-11-16 15:32:13 +01:00
if exp == 0 {
return verifyExp(nil, cmpTime, req)
}
return verifyExp(&newNumericDateFromSeconds(exp).Time, cmpTime, req)
2021-10-20 10:08:56 +02:00
case json.Number:
2021-11-16 15:32:13 +01:00
v, _ := exp.Float64()
return verifyExp(&newNumericDateFromSeconds(v).Time, cmpTime, req)
2021-10-20 10:08:56 +02:00
}
2021-11-16 15:32:13 +01:00
2021-10-20 10:08:56 +02:00
return false
}
2021-11-16 15:32:13 +01:00
// VerifyIssuedAt compares the exp claim against cmp (cmp >= iat).
// If req is false, it will return true, if iat is unset.
2021-10-20 10:08:56 +02:00
func (m MapClaims) VerifyIssuedAt(cmp int64, req bool) bool {
2021-11-16 15:32:13 +01:00
cmpTime := time.Unix(cmp, 0)
v, ok := m["iat"]
2021-10-20 10:08:56 +02:00
if !ok {
return !req
}
2021-11-16 15:32:13 +01:00
switch iat := v.(type) {
2021-10-20 10:08:56 +02:00
case float64:
2021-11-16 15:32:13 +01:00
if iat == 0 {
return verifyIat(nil, cmpTime, req)
}
return verifyIat(&newNumericDateFromSeconds(iat).Time, cmpTime, req)
2021-10-20 10:08:56 +02:00
case json.Number:
2021-11-16 15:32:13 +01:00
v, _ := iat.Float64()
return verifyIat(&newNumericDateFromSeconds(v).Time, cmpTime, req)
2021-10-20 10:08:56 +02:00
}
2021-11-16 15:32:13 +01:00
return false
2021-10-20 10:08:56 +02:00
}
2021-11-16 15:32:13 +01:00
// VerifyNotBefore compares the nbf claim against cmp (cmp >= nbf).
// If req is false, it will return true, if nbf is unset.
2021-10-20 10:08:56 +02:00
func (m MapClaims) VerifyNotBefore(cmp int64, req bool) bool {
2021-11-16 15:32:13 +01:00
cmpTime := time.Unix(cmp, 0)
v, ok := m["nbf"]
2021-10-20 10:08:56 +02:00
if !ok {
return !req
}
2021-11-16 15:32:13 +01:00
switch nbf := v.(type) {
2021-10-20 10:08:56 +02:00
case float64:
2021-11-16 15:32:13 +01:00
if nbf == 0 {
return verifyNbf(nil, cmpTime, req)
}
return verifyNbf(&newNumericDateFromSeconds(nbf).Time, cmpTime, req)
2021-10-20 10:08:56 +02:00
case json.Number:
2021-11-16 15:32:13 +01:00
v, _ := nbf.Float64()
return verifyNbf(&newNumericDateFromSeconds(v).Time, cmpTime, req)
2021-10-20 10:08:56 +02:00
}
2021-11-16 15:32:13 +01:00
2021-10-20 10:08:56 +02:00
return false
}
2021-11-16 15:32:13 +01:00
// VerifyIssuer compares the iss claim against cmp.
// If required is false, this method will return true if the value matches or is unset
func (m MapClaims) VerifyIssuer(cmp string, req bool) bool {
iss, _ := m["iss"].(string)
return verifyIss(iss, cmp, req)
}
// Valid validates time based claims "exp, iat, nbf".
2021-10-20 10:08:56 +02:00
// There is no accounting for clock skew.
// As well, if any of the above claims are not in the token, it will still
// be considered a valid claim.
func (m MapClaims) Valid() error {
vErr := new(ValidationError)
now := TimeFunc().Unix()
if !m.VerifyExpiresAt(now, false) {
vErr.Inner = errors.New("Token is expired")
vErr.Errors |= ValidationErrorExpired
}
if !m.VerifyIssuedAt(now, false) {
vErr.Inner = errors.New("Token used before issued")
vErr.Errors |= ValidationErrorIssuedAt
}
if !m.VerifyNotBefore(now, false) {
vErr.Inner = errors.New("Token is not valid yet")
vErr.Errors |= ValidationErrorNotValidYet
}
if vErr.valid() {
return nil
}
return vErr
}