| 123456789101112131415161718192021222324252627282930313233343536373839404142434445464748495051525354555657585960616263646566676869707172737475767778798081828384858687888990919293949596979899100101102103104105106107108109110111112113114115116117118119120121122123124125126127128129130131132133134135136137138139140141142143144145146147148149150151152153154155156157158159160161162163164165166167168169170171172173174175176177178179180181182183184185186187188189190191192193194195196197198199200201202203204205206207208209210211212213214215216217218219220221222223224225226227228229230231232233234235236237238239240241242243244245246247248249250251252253254255256257258259260261262263264265266267268269270271272273274275276277278279280281282283284285286287288289290291292293294295296297298299300301302303304305306307308309310311312313314315316317318319320321322323324325326327328329330331332333334335336337338339340341342343344345346347348349350351352353354355356357358359360361362363364365366367368369370371372373374375376377378379380381382383384385386387388389390391392393394395396397398399400401402403404405406407408409410411412413414415416417418419420421422423424425426427428429430431432433434435436437438439440441442443444445446447448449450451452453454455456457458459460461462463464465466467468469470471472473474475476477478479480481482483484485486487488489490491492493494495496497498499500501502503504505506507508509510511512513514515516517518519520521522523524525526527528529530531532533534535536537538539540541542543544545546547548549550551552553554555556557558559560561562563564565566567568569570571572573574575576577578579580581582583584585586587588589590591592593594595596597598599600601602603604605606607608609610611612613614615616617618619620621622623624625626627628629630631632633634635636637638639640641642643644645646647648649650651652653654655656657658659660661662663664665666667668669670671672673674675676677678679680681682683684685686687688689690691692693694695696697698699700701702703704705706707708709710711712713714715716717718719720721722723724725726727728729730731732733734735736737738739740741742743744745746747748749750751752753754755756757758759760761762763764765766767768769770771772773774775776777778779780781782783784785786787788789790791792793794795796797798799800801802803804805806807808809810811812813814815816817818819820821822823824825826827828829830831832833834835836837838839840841842843844845846847848849850851852853854855856857858859860861862863864865866867868869870871872873874875876877878879880881882883884885886887888889890891892893894895896897898899900901902903904905906907908909910911912913914915916917918919920921922923924925926927928929930931932933934935936937938939940941942943944945946947948949950951952953954955956957958959960961962963964965966967968969970971972973974975976977978979980981982983984985986987988989990991992993994995996997998999100010011002100310041005100610071008100910101011101210131014101510161017101810191020102110221023102410251026102710281029103010311032103310341035103610371038103910401041104210431044104510461047104810491050105110521053105410551056105710581059106010611062106310641065106610671068106910701071107210731074107510761077107810791080108110821083108410851086108710881089109010911092109310941095109610971098109911001101110211031104110511061107110811091110111111121113111411151116 |
- // This file is auto-generated by jwk/internal/cmd/genheader/main.go. DO NOT EDIT
- package jwk
- import (
- "bytes"
- "context"
- "crypto/x509"
- "fmt"
- "sort"
- "sync"
- "github.com/lestrrat-go/iter/mapiter"
- "github.com/lestrrat-go/jwx/internal/base64"
- "github.com/lestrrat-go/jwx/internal/iter"
- "github.com/lestrrat-go/jwx/internal/json"
- "github.com/lestrrat-go/jwx/internal/pool"
- "github.com/lestrrat-go/jwx/jwa"
- "github.com/pkg/errors"
- )
- const (
- OKPCrvKey = "crv"
- OKPDKey = "d"
- OKPXKey = "x"
- )
- type OKPPublicKey interface {
- Key
- FromRaw(interface{}) error
- Crv() jwa.EllipticCurveAlgorithm
- X() []byte
- }
- type okpPublicKey struct {
- algorithm *string // https://tools.ietf.org/html/rfc7517#section-4.4
- crv *jwa.EllipticCurveAlgorithm
- keyID *string // https://tools.ietf.org/html/rfc7515#section-4.1.4
- keyOps *KeyOperationList // https://tools.ietf.org/html/rfc7517#section-4.3
- keyUsage *string // https://tools.ietf.org/html/rfc7517#section-4.2
- x []byte
- x509CertChain *CertificateChain // https://tools.ietf.org/html/rfc7515#section-4.1.6
- x509CertThumbprint *string // https://tools.ietf.org/html/rfc7515#section-4.1.7
- x509CertThumbprintS256 *string // https://tools.ietf.org/html/rfc7515#section-4.1.8
- x509URL *string // https://tools.ietf.org/html/rfc7515#section-4.1.5
- privateParams map[string]interface{}
- mu *sync.RWMutex
- dc json.DecodeCtx
- }
- func NewOKPPublicKey() OKPPublicKey {
- return newOKPPublicKey()
- }
- func newOKPPublicKey() *okpPublicKey {
- return &okpPublicKey{
- mu: &sync.RWMutex{},
- privateParams: make(map[string]interface{}),
- }
- }
- func (h okpPublicKey) KeyType() jwa.KeyType {
- return jwa.OKP
- }
- func (h *okpPublicKey) Algorithm() string {
- if h.algorithm != nil {
- return *(h.algorithm)
- }
- return ""
- }
- func (h *okpPublicKey) Crv() jwa.EllipticCurveAlgorithm {
- if h.crv != nil {
- return *(h.crv)
- }
- return jwa.InvalidEllipticCurve
- }
- func (h *okpPublicKey) KeyID() string {
- if h.keyID != nil {
- return *(h.keyID)
- }
- return ""
- }
- func (h *okpPublicKey) KeyOps() KeyOperationList {
- if h.keyOps != nil {
- return *(h.keyOps)
- }
- return nil
- }
- func (h *okpPublicKey) KeyUsage() string {
- if h.keyUsage != nil {
- return *(h.keyUsage)
- }
- return ""
- }
- func (h *okpPublicKey) X() []byte {
- return h.x
- }
- func (h *okpPublicKey) X509CertChain() []*x509.Certificate {
- if h.x509CertChain != nil {
- return h.x509CertChain.Get()
- }
- return nil
- }
- func (h *okpPublicKey) X509CertThumbprint() string {
- if h.x509CertThumbprint != nil {
- return *(h.x509CertThumbprint)
- }
- return ""
- }
- func (h *okpPublicKey) X509CertThumbprintS256() string {
- if h.x509CertThumbprintS256 != nil {
- return *(h.x509CertThumbprintS256)
- }
- return ""
- }
- func (h *okpPublicKey) X509URL() string {
- if h.x509URL != nil {
- return *(h.x509URL)
- }
- return ""
- }
- func (h *okpPublicKey) makePairs() []*HeaderPair {
- h.mu.RLock()
- defer h.mu.RUnlock()
- var pairs []*HeaderPair
- pairs = append(pairs, &HeaderPair{Key: "kty", Value: jwa.OKP})
- if h.algorithm != nil {
- pairs = append(pairs, &HeaderPair{Key: AlgorithmKey, Value: *(h.algorithm)})
- }
- if h.crv != nil {
- pairs = append(pairs, &HeaderPair{Key: OKPCrvKey, Value: *(h.crv)})
- }
- if h.keyID != nil {
- pairs = append(pairs, &HeaderPair{Key: KeyIDKey, Value: *(h.keyID)})
- }
- if h.keyOps != nil {
- pairs = append(pairs, &HeaderPair{Key: KeyOpsKey, Value: *(h.keyOps)})
- }
- if h.keyUsage != nil {
- pairs = append(pairs, &HeaderPair{Key: KeyUsageKey, Value: *(h.keyUsage)})
- }
- if h.x != nil {
- pairs = append(pairs, &HeaderPair{Key: OKPXKey, Value: h.x})
- }
- if h.x509CertChain != nil {
- pairs = append(pairs, &HeaderPair{Key: X509CertChainKey, Value: *(h.x509CertChain)})
- }
- if h.x509CertThumbprint != nil {
- pairs = append(pairs, &HeaderPair{Key: X509CertThumbprintKey, Value: *(h.x509CertThumbprint)})
- }
- if h.x509CertThumbprintS256 != nil {
- pairs = append(pairs, &HeaderPair{Key: X509CertThumbprintS256Key, Value: *(h.x509CertThumbprintS256)})
- }
- if h.x509URL != nil {
- pairs = append(pairs, &HeaderPair{Key: X509URLKey, Value: *(h.x509URL)})
- }
- for k, v := range h.privateParams {
- pairs = append(pairs, &HeaderPair{Key: k, Value: v})
- }
- return pairs
- }
- func (h *okpPublicKey) PrivateParams() map[string]interface{} {
- return h.privateParams
- }
- func (h *okpPublicKey) Get(name string) (interface{}, bool) {
- h.mu.RLock()
- defer h.mu.RUnlock()
- switch name {
- case KeyTypeKey:
- return h.KeyType(), true
- case AlgorithmKey:
- if h.algorithm == nil {
- return nil, false
- }
- return *(h.algorithm), true
- case OKPCrvKey:
- if h.crv == nil {
- return nil, false
- }
- return *(h.crv), true
- case KeyIDKey:
- if h.keyID == nil {
- return nil, false
- }
- return *(h.keyID), true
- case KeyOpsKey:
- if h.keyOps == nil {
- return nil, false
- }
- return *(h.keyOps), true
- case KeyUsageKey:
- if h.keyUsage == nil {
- return nil, false
- }
- return *(h.keyUsage), true
- case OKPXKey:
- if h.x == nil {
- return nil, false
- }
- return h.x, true
- case X509CertChainKey:
- if h.x509CertChain == nil {
- return nil, false
- }
- return h.x509CertChain.Get(), true
- case X509CertThumbprintKey:
- if h.x509CertThumbprint == nil {
- return nil, false
- }
- return *(h.x509CertThumbprint), true
- case X509CertThumbprintS256Key:
- if h.x509CertThumbprintS256 == nil {
- return nil, false
- }
- return *(h.x509CertThumbprintS256), true
- case X509URLKey:
- if h.x509URL == nil {
- return nil, false
- }
- return *(h.x509URL), true
- default:
- v, ok := h.privateParams[name]
- return v, ok
- }
- }
- func (h *okpPublicKey) Set(name string, value interface{}) error {
- h.mu.Lock()
- defer h.mu.Unlock()
- return h.setNoLock(name, value)
- }
- func (h *okpPublicKey) setNoLock(name string, value interface{}) error {
- switch name {
- case "kty":
- return nil
- case AlgorithmKey:
- switch v := value.(type) {
- case string:
- h.algorithm = &v
- case fmt.Stringer:
- tmp := v.String()
- h.algorithm = &tmp
- default:
- return errors.Errorf(`invalid type for %s key: %T`, AlgorithmKey, value)
- }
- return nil
- case OKPCrvKey:
- if v, ok := value.(jwa.EllipticCurveAlgorithm); ok {
- h.crv = &v
- return nil
- }
- return errors.Errorf(`invalid value for %s key: %T`, OKPCrvKey, value)
- case KeyIDKey:
- if v, ok := value.(string); ok {
- h.keyID = &v
- return nil
- }
- return errors.Errorf(`invalid value for %s key: %T`, KeyIDKey, value)
- case KeyOpsKey:
- var acceptor KeyOperationList
- if err := acceptor.Accept(value); err != nil {
- return errors.Wrapf(err, `invalid value for %s key`, KeyOpsKey)
- }
- h.keyOps = &acceptor
- return nil
- case KeyUsageKey:
- switch v := value.(type) {
- case KeyUsageType:
- switch v {
- case ForSignature, ForEncryption:
- tmp := v.String()
- h.keyUsage = &tmp
- default:
- return errors.Errorf(`invalid key usage type %s`, v)
- }
- case string:
- h.keyUsage = &v
- default:
- return errors.Errorf(`invalid key usage type %s`, v)
- }
- case OKPXKey:
- if v, ok := value.([]byte); ok {
- h.x = v
- return nil
- }
- return errors.Errorf(`invalid value for %s key: %T`, OKPXKey, value)
- case X509CertChainKey:
- var acceptor CertificateChain
- if err := acceptor.Accept(value); err != nil {
- return errors.Wrapf(err, `invalid value for %s key`, X509CertChainKey)
- }
- h.x509CertChain = &acceptor
- return nil
- case X509CertThumbprintKey:
- if v, ok := value.(string); ok {
- h.x509CertThumbprint = &v
- return nil
- }
- return errors.Errorf(`invalid value for %s key: %T`, X509CertThumbprintKey, value)
- case X509CertThumbprintS256Key:
- if v, ok := value.(string); ok {
- h.x509CertThumbprintS256 = &v
- return nil
- }
- return errors.Errorf(`invalid value for %s key: %T`, X509CertThumbprintS256Key, value)
- case X509URLKey:
- if v, ok := value.(string); ok {
- h.x509URL = &v
- return nil
- }
- return errors.Errorf(`invalid value for %s key: %T`, X509URLKey, value)
- default:
- if h.privateParams == nil {
- h.privateParams = map[string]interface{}{}
- }
- h.privateParams[name] = value
- }
- return nil
- }
- func (k *okpPublicKey) Remove(key string) error {
- k.mu.Lock()
- defer k.mu.Unlock()
- switch key {
- case AlgorithmKey:
- k.algorithm = nil
- case OKPCrvKey:
- k.crv = nil
- case KeyIDKey:
- k.keyID = nil
- case KeyOpsKey:
- k.keyOps = nil
- case KeyUsageKey:
- k.keyUsage = nil
- case OKPXKey:
- k.x = nil
- case X509CertChainKey:
- k.x509CertChain = nil
- case X509CertThumbprintKey:
- k.x509CertThumbprint = nil
- case X509CertThumbprintS256Key:
- k.x509CertThumbprintS256 = nil
- case X509URLKey:
- k.x509URL = nil
- default:
- delete(k.privateParams, key)
- }
- return nil
- }
- func (k *okpPublicKey) Clone() (Key, error) {
- return cloneKey(k)
- }
- func (k *okpPublicKey) DecodeCtx() json.DecodeCtx {
- k.mu.RLock()
- defer k.mu.RUnlock()
- return k.dc
- }
- func (k *okpPublicKey) SetDecodeCtx(dc json.DecodeCtx) {
- k.mu.Lock()
- defer k.mu.Unlock()
- k.dc = dc
- }
- func (h *okpPublicKey) UnmarshalJSON(buf []byte) error {
- h.algorithm = nil
- h.crv = nil
- h.keyID = nil
- h.keyOps = nil
- h.keyUsage = nil
- h.x = nil
- h.x509CertChain = nil
- h.x509CertThumbprint = nil
- h.x509CertThumbprintS256 = nil
- h.x509URL = nil
- dec := json.NewDecoder(bytes.NewReader(buf))
- LOOP:
- for {
- tok, err := dec.Token()
- if err != nil {
- return errors.Wrap(err, `error reading token`)
- }
- switch tok := tok.(type) {
- case json.Delim:
- // Assuming we're doing everything correctly, we should ONLY
- // get either '{' or '}' here.
- if tok == '}' { // End of object
- break LOOP
- } else if tok != '{' {
- return errors.Errorf(`expected '{', but got '%c'`, tok)
- }
- case string: // Objects can only have string keys
- switch tok {
- case KeyTypeKey:
- val, err := json.ReadNextStringToken(dec)
- if err != nil {
- return errors.Wrap(err, `error reading token`)
- }
- if val != jwa.OKP.String() {
- return errors.Errorf(`invalid kty value for RSAPublicKey (%s)`, val)
- }
- case AlgorithmKey:
- if err := json.AssignNextStringToken(&h.algorithm, dec); err != nil {
- return errors.Wrapf(err, `failed to decode value for key %s`, AlgorithmKey)
- }
- case OKPCrvKey:
- var decoded jwa.EllipticCurveAlgorithm
- if err := dec.Decode(&decoded); err != nil {
- return errors.Wrapf(err, `failed to decode value for key %s`, OKPCrvKey)
- }
- h.crv = &decoded
- case KeyIDKey:
- if err := json.AssignNextStringToken(&h.keyID, dec); err != nil {
- return errors.Wrapf(err, `failed to decode value for key %s`, KeyIDKey)
- }
- case KeyOpsKey:
- var decoded KeyOperationList
- if err := dec.Decode(&decoded); err != nil {
- return errors.Wrapf(err, `failed to decode value for key %s`, KeyOpsKey)
- }
- h.keyOps = &decoded
- case KeyUsageKey:
- if err := json.AssignNextStringToken(&h.keyUsage, dec); err != nil {
- return errors.Wrapf(err, `failed to decode value for key %s`, KeyUsageKey)
- }
- case OKPXKey:
- if err := json.AssignNextBytesToken(&h.x, dec); err != nil {
- return errors.Wrapf(err, `failed to decode value for key %s`, OKPXKey)
- }
- case X509CertChainKey:
- var decoded CertificateChain
- if err := dec.Decode(&decoded); err != nil {
- return errors.Wrapf(err, `failed to decode value for key %s`, X509CertChainKey)
- }
- h.x509CertChain = &decoded
- case X509CertThumbprintKey:
- if err := json.AssignNextStringToken(&h.x509CertThumbprint, dec); err != nil {
- return errors.Wrapf(err, `failed to decode value for key %s`, X509CertThumbprintKey)
- }
- case X509CertThumbprintS256Key:
- if err := json.AssignNextStringToken(&h.x509CertThumbprintS256, dec); err != nil {
- return errors.Wrapf(err, `failed to decode value for key %s`, X509CertThumbprintS256Key)
- }
- case X509URLKey:
- if err := json.AssignNextStringToken(&h.x509URL, dec); err != nil {
- return errors.Wrapf(err, `failed to decode value for key %s`, X509URLKey)
- }
- default:
- if dc := h.dc; dc != nil {
- if localReg := dc.Registry(); localReg != nil {
- decoded, err := localReg.Decode(dec, tok)
- if err == nil {
- h.setNoLock(tok, decoded)
- continue
- }
- }
- }
- decoded, err := registry.Decode(dec, tok)
- if err == nil {
- h.setNoLock(tok, decoded)
- continue
- }
- return errors.Wrapf(err, `could not decode field %s`, tok)
- }
- default:
- return errors.Errorf(`invalid token %T`, tok)
- }
- }
- if h.crv == nil {
- return errors.Errorf(`required field crv is missing`)
- }
- if h.x == nil {
- return errors.Errorf(`required field x is missing`)
- }
- return nil
- }
- func (h okpPublicKey) MarshalJSON() ([]byte, error) {
- data := make(map[string]interface{})
- fields := make([]string, 0, 10)
- for _, pair := range h.makePairs() {
- fields = append(fields, pair.Key.(string))
- data[pair.Key.(string)] = pair.Value
- }
- sort.Strings(fields)
- buf := pool.GetBytesBuffer()
- defer pool.ReleaseBytesBuffer(buf)
- buf.WriteByte('{')
- enc := json.NewEncoder(buf)
- for i, f := range fields {
- if i > 0 {
- buf.WriteRune(',')
- }
- buf.WriteRune('"')
- buf.WriteString(f)
- buf.WriteString(`":`)
- v := data[f]
- switch v := v.(type) {
- case []byte:
- buf.WriteRune('"')
- buf.WriteString(base64.EncodeToString(v))
- buf.WriteRune('"')
- default:
- if err := enc.Encode(v); err != nil {
- return nil, errors.Wrapf(err, `failed to encode value for field %s`, f)
- }
- buf.Truncate(buf.Len() - 1)
- }
- }
- buf.WriteByte('}')
- ret := make([]byte, buf.Len())
- copy(ret, buf.Bytes())
- return ret, nil
- }
- func (h *okpPublicKey) Iterate(ctx context.Context) HeaderIterator {
- pairs := h.makePairs()
- ch := make(chan *HeaderPair, len(pairs))
- go func(ctx context.Context, ch chan *HeaderPair, pairs []*HeaderPair) {
- defer close(ch)
- for _, pair := range pairs {
- select {
- case <-ctx.Done():
- return
- case ch <- pair:
- }
- }
- }(ctx, ch, pairs)
- return mapiter.New(ch)
- }
- func (h *okpPublicKey) Walk(ctx context.Context, visitor HeaderVisitor) error {
- return iter.WalkMap(ctx, h, visitor)
- }
- func (h *okpPublicKey) AsMap(ctx context.Context) (map[string]interface{}, error) {
- return iter.AsMap(ctx, h)
- }
- type OKPPrivateKey interface {
- Key
- FromRaw(interface{}) error
- Crv() jwa.EllipticCurveAlgorithm
- D() []byte
- X() []byte
- }
- type okpPrivateKey struct {
- algorithm *string // https://tools.ietf.org/html/rfc7517#section-4.4
- crv *jwa.EllipticCurveAlgorithm
- d []byte
- keyID *string // https://tools.ietf.org/html/rfc7515#section-4.1.4
- keyOps *KeyOperationList // https://tools.ietf.org/html/rfc7517#section-4.3
- keyUsage *string // https://tools.ietf.org/html/rfc7517#section-4.2
- x []byte
- x509CertChain *CertificateChain // https://tools.ietf.org/html/rfc7515#section-4.1.6
- x509CertThumbprint *string // https://tools.ietf.org/html/rfc7515#section-4.1.7
- x509CertThumbprintS256 *string // https://tools.ietf.org/html/rfc7515#section-4.1.8
- x509URL *string // https://tools.ietf.org/html/rfc7515#section-4.1.5
- privateParams map[string]interface{}
- mu *sync.RWMutex
- dc json.DecodeCtx
- }
- func NewOKPPrivateKey() OKPPrivateKey {
- return newOKPPrivateKey()
- }
- func newOKPPrivateKey() *okpPrivateKey {
- return &okpPrivateKey{
- mu: &sync.RWMutex{},
- privateParams: make(map[string]interface{}),
- }
- }
- func (h okpPrivateKey) KeyType() jwa.KeyType {
- return jwa.OKP
- }
- func (h *okpPrivateKey) Algorithm() string {
- if h.algorithm != nil {
- return *(h.algorithm)
- }
- return ""
- }
- func (h *okpPrivateKey) Crv() jwa.EllipticCurveAlgorithm {
- if h.crv != nil {
- return *(h.crv)
- }
- return jwa.InvalidEllipticCurve
- }
- func (h *okpPrivateKey) D() []byte {
- return h.d
- }
- func (h *okpPrivateKey) KeyID() string {
- if h.keyID != nil {
- return *(h.keyID)
- }
- return ""
- }
- func (h *okpPrivateKey) KeyOps() KeyOperationList {
- if h.keyOps != nil {
- return *(h.keyOps)
- }
- return nil
- }
- func (h *okpPrivateKey) KeyUsage() string {
- if h.keyUsage != nil {
- return *(h.keyUsage)
- }
- return ""
- }
- func (h *okpPrivateKey) X() []byte {
- return h.x
- }
- func (h *okpPrivateKey) X509CertChain() []*x509.Certificate {
- if h.x509CertChain != nil {
- return h.x509CertChain.Get()
- }
- return nil
- }
- func (h *okpPrivateKey) X509CertThumbprint() string {
- if h.x509CertThumbprint != nil {
- return *(h.x509CertThumbprint)
- }
- return ""
- }
- func (h *okpPrivateKey) X509CertThumbprintS256() string {
- if h.x509CertThumbprintS256 != nil {
- return *(h.x509CertThumbprintS256)
- }
- return ""
- }
- func (h *okpPrivateKey) X509URL() string {
- if h.x509URL != nil {
- return *(h.x509URL)
- }
- return ""
- }
- func (h *okpPrivateKey) makePairs() []*HeaderPair {
- h.mu.RLock()
- defer h.mu.RUnlock()
- var pairs []*HeaderPair
- pairs = append(pairs, &HeaderPair{Key: "kty", Value: jwa.OKP})
- if h.algorithm != nil {
- pairs = append(pairs, &HeaderPair{Key: AlgorithmKey, Value: *(h.algorithm)})
- }
- if h.crv != nil {
- pairs = append(pairs, &HeaderPair{Key: OKPCrvKey, Value: *(h.crv)})
- }
- if h.d != nil {
- pairs = append(pairs, &HeaderPair{Key: OKPDKey, Value: h.d})
- }
- if h.keyID != nil {
- pairs = append(pairs, &HeaderPair{Key: KeyIDKey, Value: *(h.keyID)})
- }
- if h.keyOps != nil {
- pairs = append(pairs, &HeaderPair{Key: KeyOpsKey, Value: *(h.keyOps)})
- }
- if h.keyUsage != nil {
- pairs = append(pairs, &HeaderPair{Key: KeyUsageKey, Value: *(h.keyUsage)})
- }
- if h.x != nil {
- pairs = append(pairs, &HeaderPair{Key: OKPXKey, Value: h.x})
- }
- if h.x509CertChain != nil {
- pairs = append(pairs, &HeaderPair{Key: X509CertChainKey, Value: *(h.x509CertChain)})
- }
- if h.x509CertThumbprint != nil {
- pairs = append(pairs, &HeaderPair{Key: X509CertThumbprintKey, Value: *(h.x509CertThumbprint)})
- }
- if h.x509CertThumbprintS256 != nil {
- pairs = append(pairs, &HeaderPair{Key: X509CertThumbprintS256Key, Value: *(h.x509CertThumbprintS256)})
- }
- if h.x509URL != nil {
- pairs = append(pairs, &HeaderPair{Key: X509URLKey, Value: *(h.x509URL)})
- }
- for k, v := range h.privateParams {
- pairs = append(pairs, &HeaderPair{Key: k, Value: v})
- }
- return pairs
- }
- func (h *okpPrivateKey) PrivateParams() map[string]interface{} {
- return h.privateParams
- }
- func (h *okpPrivateKey) Get(name string) (interface{}, bool) {
- h.mu.RLock()
- defer h.mu.RUnlock()
- switch name {
- case KeyTypeKey:
- return h.KeyType(), true
- case AlgorithmKey:
- if h.algorithm == nil {
- return nil, false
- }
- return *(h.algorithm), true
- case OKPCrvKey:
- if h.crv == nil {
- return nil, false
- }
- return *(h.crv), true
- case OKPDKey:
- if h.d == nil {
- return nil, false
- }
- return h.d, true
- case KeyIDKey:
- if h.keyID == nil {
- return nil, false
- }
- return *(h.keyID), true
- case KeyOpsKey:
- if h.keyOps == nil {
- return nil, false
- }
- return *(h.keyOps), true
- case KeyUsageKey:
- if h.keyUsage == nil {
- return nil, false
- }
- return *(h.keyUsage), true
- case OKPXKey:
- if h.x == nil {
- return nil, false
- }
- return h.x, true
- case X509CertChainKey:
- if h.x509CertChain == nil {
- return nil, false
- }
- return h.x509CertChain.Get(), true
- case X509CertThumbprintKey:
- if h.x509CertThumbprint == nil {
- return nil, false
- }
- return *(h.x509CertThumbprint), true
- case X509CertThumbprintS256Key:
- if h.x509CertThumbprintS256 == nil {
- return nil, false
- }
- return *(h.x509CertThumbprintS256), true
- case X509URLKey:
- if h.x509URL == nil {
- return nil, false
- }
- return *(h.x509URL), true
- default:
- v, ok := h.privateParams[name]
- return v, ok
- }
- }
- func (h *okpPrivateKey) Set(name string, value interface{}) error {
- h.mu.Lock()
- defer h.mu.Unlock()
- return h.setNoLock(name, value)
- }
- func (h *okpPrivateKey) setNoLock(name string, value interface{}) error {
- switch name {
- case "kty":
- return nil
- case AlgorithmKey:
- switch v := value.(type) {
- case string:
- h.algorithm = &v
- case fmt.Stringer:
- tmp := v.String()
- h.algorithm = &tmp
- default:
- return errors.Errorf(`invalid type for %s key: %T`, AlgorithmKey, value)
- }
- return nil
- case OKPCrvKey:
- if v, ok := value.(jwa.EllipticCurveAlgorithm); ok {
- h.crv = &v
- return nil
- }
- return errors.Errorf(`invalid value for %s key: %T`, OKPCrvKey, value)
- case OKPDKey:
- if v, ok := value.([]byte); ok {
- h.d = v
- return nil
- }
- return errors.Errorf(`invalid value for %s key: %T`, OKPDKey, value)
- case KeyIDKey:
- if v, ok := value.(string); ok {
- h.keyID = &v
- return nil
- }
- return errors.Errorf(`invalid value for %s key: %T`, KeyIDKey, value)
- case KeyOpsKey:
- var acceptor KeyOperationList
- if err := acceptor.Accept(value); err != nil {
- return errors.Wrapf(err, `invalid value for %s key`, KeyOpsKey)
- }
- h.keyOps = &acceptor
- return nil
- case KeyUsageKey:
- switch v := value.(type) {
- case KeyUsageType:
- switch v {
- case ForSignature, ForEncryption:
- tmp := v.String()
- h.keyUsage = &tmp
- default:
- return errors.Errorf(`invalid key usage type %s`, v)
- }
- case string:
- h.keyUsage = &v
- default:
- return errors.Errorf(`invalid key usage type %s`, v)
- }
- case OKPXKey:
- if v, ok := value.([]byte); ok {
- h.x = v
- return nil
- }
- return errors.Errorf(`invalid value for %s key: %T`, OKPXKey, value)
- case X509CertChainKey:
- var acceptor CertificateChain
- if err := acceptor.Accept(value); err != nil {
- return errors.Wrapf(err, `invalid value for %s key`, X509CertChainKey)
- }
- h.x509CertChain = &acceptor
- return nil
- case X509CertThumbprintKey:
- if v, ok := value.(string); ok {
- h.x509CertThumbprint = &v
- return nil
- }
- return errors.Errorf(`invalid value for %s key: %T`, X509CertThumbprintKey, value)
- case X509CertThumbprintS256Key:
- if v, ok := value.(string); ok {
- h.x509CertThumbprintS256 = &v
- return nil
- }
- return errors.Errorf(`invalid value for %s key: %T`, X509CertThumbprintS256Key, value)
- case X509URLKey:
- if v, ok := value.(string); ok {
- h.x509URL = &v
- return nil
- }
- return errors.Errorf(`invalid value for %s key: %T`, X509URLKey, value)
- default:
- if h.privateParams == nil {
- h.privateParams = map[string]interface{}{}
- }
- h.privateParams[name] = value
- }
- return nil
- }
- func (k *okpPrivateKey) Remove(key string) error {
- k.mu.Lock()
- defer k.mu.Unlock()
- switch key {
- case AlgorithmKey:
- k.algorithm = nil
- case OKPCrvKey:
- k.crv = nil
- case OKPDKey:
- k.d = nil
- case KeyIDKey:
- k.keyID = nil
- case KeyOpsKey:
- k.keyOps = nil
- case KeyUsageKey:
- k.keyUsage = nil
- case OKPXKey:
- k.x = nil
- case X509CertChainKey:
- k.x509CertChain = nil
- case X509CertThumbprintKey:
- k.x509CertThumbprint = nil
- case X509CertThumbprintS256Key:
- k.x509CertThumbprintS256 = nil
- case X509URLKey:
- k.x509URL = nil
- default:
- delete(k.privateParams, key)
- }
- return nil
- }
- func (k *okpPrivateKey) Clone() (Key, error) {
- return cloneKey(k)
- }
- func (k *okpPrivateKey) DecodeCtx() json.DecodeCtx {
- k.mu.RLock()
- defer k.mu.RUnlock()
- return k.dc
- }
- func (k *okpPrivateKey) SetDecodeCtx(dc json.DecodeCtx) {
- k.mu.Lock()
- defer k.mu.Unlock()
- k.dc = dc
- }
- func (h *okpPrivateKey) UnmarshalJSON(buf []byte) error {
- h.algorithm = nil
- h.crv = nil
- h.d = nil
- h.keyID = nil
- h.keyOps = nil
- h.keyUsage = nil
- h.x = nil
- h.x509CertChain = nil
- h.x509CertThumbprint = nil
- h.x509CertThumbprintS256 = nil
- h.x509URL = nil
- dec := json.NewDecoder(bytes.NewReader(buf))
- LOOP:
- for {
- tok, err := dec.Token()
- if err != nil {
- return errors.Wrap(err, `error reading token`)
- }
- switch tok := tok.(type) {
- case json.Delim:
- // Assuming we're doing everything correctly, we should ONLY
- // get either '{' or '}' here.
- if tok == '}' { // End of object
- break LOOP
- } else if tok != '{' {
- return errors.Errorf(`expected '{', but got '%c'`, tok)
- }
- case string: // Objects can only have string keys
- switch tok {
- case KeyTypeKey:
- val, err := json.ReadNextStringToken(dec)
- if err != nil {
- return errors.Wrap(err, `error reading token`)
- }
- if val != jwa.OKP.String() {
- return errors.Errorf(`invalid kty value for RSAPublicKey (%s)`, val)
- }
- case AlgorithmKey:
- if err := json.AssignNextStringToken(&h.algorithm, dec); err != nil {
- return errors.Wrapf(err, `failed to decode value for key %s`, AlgorithmKey)
- }
- case OKPCrvKey:
- var decoded jwa.EllipticCurveAlgorithm
- if err := dec.Decode(&decoded); err != nil {
- return errors.Wrapf(err, `failed to decode value for key %s`, OKPCrvKey)
- }
- h.crv = &decoded
- case OKPDKey:
- if err := json.AssignNextBytesToken(&h.d, dec); err != nil {
- return errors.Wrapf(err, `failed to decode value for key %s`, OKPDKey)
- }
- case KeyIDKey:
- if err := json.AssignNextStringToken(&h.keyID, dec); err != nil {
- return errors.Wrapf(err, `failed to decode value for key %s`, KeyIDKey)
- }
- case KeyOpsKey:
- var decoded KeyOperationList
- if err := dec.Decode(&decoded); err != nil {
- return errors.Wrapf(err, `failed to decode value for key %s`, KeyOpsKey)
- }
- h.keyOps = &decoded
- case KeyUsageKey:
- if err := json.AssignNextStringToken(&h.keyUsage, dec); err != nil {
- return errors.Wrapf(err, `failed to decode value for key %s`, KeyUsageKey)
- }
- case OKPXKey:
- if err := json.AssignNextBytesToken(&h.x, dec); err != nil {
- return errors.Wrapf(err, `failed to decode value for key %s`, OKPXKey)
- }
- case X509CertChainKey:
- var decoded CertificateChain
- if err := dec.Decode(&decoded); err != nil {
- return errors.Wrapf(err, `failed to decode value for key %s`, X509CertChainKey)
- }
- h.x509CertChain = &decoded
- case X509CertThumbprintKey:
- if err := json.AssignNextStringToken(&h.x509CertThumbprint, dec); err != nil {
- return errors.Wrapf(err, `failed to decode value for key %s`, X509CertThumbprintKey)
- }
- case X509CertThumbprintS256Key:
- if err := json.AssignNextStringToken(&h.x509CertThumbprintS256, dec); err != nil {
- return errors.Wrapf(err, `failed to decode value for key %s`, X509CertThumbprintS256Key)
- }
- case X509URLKey:
- if err := json.AssignNextStringToken(&h.x509URL, dec); err != nil {
- return errors.Wrapf(err, `failed to decode value for key %s`, X509URLKey)
- }
- default:
- if dc := h.dc; dc != nil {
- if localReg := dc.Registry(); localReg != nil {
- decoded, err := localReg.Decode(dec, tok)
- if err == nil {
- h.setNoLock(tok, decoded)
- continue
- }
- }
- }
- decoded, err := registry.Decode(dec, tok)
- if err == nil {
- h.setNoLock(tok, decoded)
- continue
- }
- return errors.Wrapf(err, `could not decode field %s`, tok)
- }
- default:
- return errors.Errorf(`invalid token %T`, tok)
- }
- }
- if h.crv == nil {
- return errors.Errorf(`required field crv is missing`)
- }
- if h.d == nil {
- return errors.Errorf(`required field d is missing`)
- }
- if h.x == nil {
- return errors.Errorf(`required field x is missing`)
- }
- return nil
- }
- func (h okpPrivateKey) MarshalJSON() ([]byte, error) {
- data := make(map[string]interface{})
- fields := make([]string, 0, 11)
- for _, pair := range h.makePairs() {
- fields = append(fields, pair.Key.(string))
- data[pair.Key.(string)] = pair.Value
- }
- sort.Strings(fields)
- buf := pool.GetBytesBuffer()
- defer pool.ReleaseBytesBuffer(buf)
- buf.WriteByte('{')
- enc := json.NewEncoder(buf)
- for i, f := range fields {
- if i > 0 {
- buf.WriteRune(',')
- }
- buf.WriteRune('"')
- buf.WriteString(f)
- buf.WriteString(`":`)
- v := data[f]
- switch v := v.(type) {
- case []byte:
- buf.WriteRune('"')
- buf.WriteString(base64.EncodeToString(v))
- buf.WriteRune('"')
- default:
- if err := enc.Encode(v); err != nil {
- return nil, errors.Wrapf(err, `failed to encode value for field %s`, f)
- }
- buf.Truncate(buf.Len() - 1)
- }
- }
- buf.WriteByte('}')
- ret := make([]byte, buf.Len())
- copy(ret, buf.Bytes())
- return ret, nil
- }
- func (h *okpPrivateKey) Iterate(ctx context.Context) HeaderIterator {
- pairs := h.makePairs()
- ch := make(chan *HeaderPair, len(pairs))
- go func(ctx context.Context, ch chan *HeaderPair, pairs []*HeaderPair) {
- defer close(ch)
- for _, pair := range pairs {
- select {
- case <-ctx.Done():
- return
- case ch <- pair:
- }
- }
- }(ctx, ch, pairs)
- return mapiter.New(ch)
- }
- func (h *okpPrivateKey) Walk(ctx context.Context, visitor HeaderVisitor) error {
- return iter.WalkMap(ctx, h, visitor)
- }
- func (h *okpPrivateKey) AsMap(ctx context.Context) (map[string]interface{}, error) {
- return iter.AsMap(ctx, h)
- }
|