Skip to content

Commit

Permalink
Merge branch 'release_3_0_0' into dg/request
Browse files Browse the repository at this point in the history
  • Loading branch information
dgrijalva committed Apr 12, 2016
2 parents 070a4bd + fb4ca74 commit 4400800
Show file tree
Hide file tree
Showing 4 changed files with 43 additions and 16 deletions.
14 changes: 10 additions & 4 deletions parser.go
Original file line number Diff line number Diff line change
Expand Up @@ -16,7 +16,7 @@ type Parser struct {
// keyFunc will receive the parsed token and should return the key for validating.
// If everything is kosher, err will be nil
func (p *Parser) Parse(tokenString string, keyFunc Keyfunc) (*Token, error) {
return p.ParseWithClaims(tokenString, keyFunc, &MapClaims{})
return p.ParseWithClaims(tokenString, keyFunc, MapClaims{})
}

func (p *Parser) ParseWithClaims(tokenString string, keyFunc Keyfunc, claims Claims) (*Token, error) {
Expand All @@ -42,6 +42,7 @@ func (p *Parser) ParseWithClaims(tokenString string, keyFunc Keyfunc, claims Cla

// parse Claims
var claimBytes []byte
token.Claims = claims

if claimBytes, err = DecodeSegment(parts[1]); err != nil {
return token, &ValidationError{err: err.Error(), Errors: ValidationErrorMalformed}
Expand All @@ -50,12 +51,17 @@ func (p *Parser) ParseWithClaims(tokenString string, keyFunc Keyfunc, claims Cla
if p.UseJSONNumber {
dec.UseNumber()
}
if err = dec.Decode(&claims); err != nil {
// JSON Decode. Special case for map type to avoid weird pointer behavior
if c, ok := token.Claims.(MapClaims); ok {
err = dec.Decode(&c)
} else {
err = dec.Decode(&claims)
}
// Handle decode error
if err != nil {
return token, &ValidationError{err: err.Error(), Errors: ValidationErrorMalformed}
}

token.Claims = claims

// Lookup signature method
if method, ok := token.Header["alg"].(string); ok {
if token.Method = GetSigningMethod(method); token.Method == nil {
Expand Down
39 changes: 30 additions & 9 deletions parser_test.go
Original file line number Diff line number Diff line change
Expand Up @@ -28,7 +28,7 @@ var jwtTestData = []struct {
name string
tokenString string
keyfunc jwt.Keyfunc
claims jwt.MapClaims
claims jwt.Claims
valid bool
errors uint32
parser *jwt.Parser
Expand Down Expand Up @@ -109,7 +109,7 @@ var jwtTestData = []struct {
"invalid signing method",
"",
defaultKeyFunc,
map[string]interface{}{"foo": "bar"},
jwt.MapClaims{"foo": "bar"},
false,
jwt.ValidationErrorSignatureInvalid,
&jwt.Parser{ValidMethods: []string{"HS256"}},
Expand All @@ -118,7 +118,7 @@ var jwtTestData = []struct {
"valid signing method",
"",
defaultKeyFunc,
map[string]interface{}{"foo": "bar"},
jwt.MapClaims{"foo": "bar"},
true,
0,
&jwt.Parser{ValidMethods: []string{"RS256", "HS256"}},
Expand All @@ -127,7 +127,18 @@ var jwtTestData = []struct {
"JSON Number",
"",
defaultKeyFunc,
map[string]interface{}{"foo": json.Number("123.4")},
jwt.MapClaims{"foo": json.Number("123.4")},
true,
0,
&jwt.Parser{UseJSONNumber: true},
},
{
"Standard Claims",
"",
defaultKeyFunc,
&jwt.StandardClaims{
ExpiresAt: time.Now().Add(time.Second * 10).Unix(),
},
true,
0,
&jwt.Parser{UseJSONNumber: true},
Expand All @@ -137,20 +148,30 @@ var jwtTestData = []struct {
func TestParser_Parse(t *testing.T) {
privateKey := test.LoadRSAPrivateKeyFromDisk("test/sample_key")

// Iterate over test data set and run tests
for _, data := range jwtTestData {
// If the token string is blank, use helper function to generate string
if data.tokenString == "" {
data.tokenString = test.MakeSampleToken(data.claims, privateKey)
}

// Parse the token
var token *jwt.Token
var err error
if data.parser != nil {
token, err = data.parser.Parse(data.tokenString, data.keyfunc)
} else {
token, err = jwt.Parse(data.tokenString, data.keyfunc)
var parser = data.parser
if parser == nil {
parser = new(jwt.Parser)
}
// Figure out correct claims type
switch data.claims.(type) {
case jwt.MapClaims:
token, err = parser.ParseWithClaims(data.tokenString, data.keyfunc, jwt.MapClaims{})
case *jwt.StandardClaims:
token, err = parser.ParseWithClaims(data.tokenString, data.keyfunc, &jwt.StandardClaims{})
}

if !reflect.DeepEqual(&data.claims, token.Claims) {
// Verify result matches expectation
if !reflect.DeepEqual(data.claims, token.Claims) {
t.Errorf("[%v] Claims mismatch. Expecting: %v Got: %v", data.name, data.claims, token.Claims)
}

Expand Down
4 changes: 2 additions & 2 deletions request/request_test.go
Original file line number Diff line number Diff line change
Expand Up @@ -65,13 +65,13 @@ func TestParseRequest(t *testing.T) {
r.Header.Set(k, tokenString)
}
}
token, err := ParseFromRequestWithClaims(r, keyfunc, &jwt.MapClaims{})
token, err := ParseFromRequestWithClaims(r, keyfunc, jwt.MapClaims{})

if token == nil {
t.Errorf("[%v] Token was not found: %v", data.name, err)
continue
}
if !reflect.DeepEqual(&data.claims, token.Claims) {
if !reflect.DeepEqual(data.claims, token.Claims) {
t.Errorf("[%v] Claims mismatch. Expecting: %v Got: %v", data.name, data.claims, token.Claims)
}
if data.valid && err != nil {
Expand Down
2 changes: 1 addition & 1 deletion test/helpers.go
Original file line number Diff line number Diff line change
Expand Up @@ -30,7 +30,7 @@ func LoadRSAPublicKeyFromDisk(location string) *rsa.PublicKey {
return key
}

func MakeSampleToken(c jwt.MapClaims, key interface{}) string {
func MakeSampleToken(c jwt.Claims, key interface{}) string {
token := jwt.NewWithClaims(jwt.SigningMethodRS256, c)
s, e := token.SignedString(key)

Expand Down

0 comments on commit 4400800

Please sign in to comment.