module Jose.Jwt
( module Jose.Types
, encode
, decode
, decodeClaims
)
where
import Control.Error
import Control.Monad.State.Strict
import qualified Crypto.PubKey.ECC.ECDSA as ECDSA
import Crypto.PubKey.RSA (PrivateKey(..))
import Crypto.Random (CPRG)
import Data.Aeson (decodeStrict')
import Data.ByteString (ByteString)
import Data.List (find)
import Data.Maybe (fromJust)
import qualified Data.ByteString.Char8 as BC
import qualified Jose.Internal.Base64 as B64
import Jose.Types
import Jose.Jwk
import Jose.Jwa
import qualified Jose.Jws as Jws
import qualified Jose.Jwe as Jwe
encode :: (CPRG g)
=> g
-> [Jwk]
-> Alg
-> Maybe Enc
-> Payload
-> (Either JwtError Jwt, g)
encode rng jwks alg enc msg = flip runState rng $ runEitherT $ case alg of
Signed None -> do
unless (isNothing enc) $ left (BadAlgorithm "Enc cannot be set for an unsecured JWT")
case msg of
Claims p -> return $ Jwt $ BC.intercalate "." [unsecuredHdr, B64.encode p]
Nested _ -> left BadClaims
Signed a -> do
unless (isNothing enc) $ left (BadAlgorithm "Enc cannot be set for a JWS")
case findMatchingJwsKeys jwks (defJwsHdr { jwsAlg = a }) of
[] -> left (KeyError "No matching key found for JWS algorithm")
(k:_) -> hoistEither =<< state (\g -> Jws.jwkEncode g a k msg)
Encrypted a -> do
e <- hoistEither $ note (BadAlgorithm "Enc must be supplied for a JWE") enc
case findMatchingJweKeys jwks (defJweHdr { jweAlg = a, jweEnc = e }) of
[] -> left (KeyError "No matching key found for JWE algorithm")
(k:_) -> hoistEither =<< state (\g -> Jwe.jwkEncode g a e k msg)
where
unsecuredHdr = B64.encode "{\"alg\":\"none\"}"
decode :: CPRG g
=> g
-> [Jwk]
-> ByteString
-> (Either JwtError JwtContent, g)
decode rng keySet jwt = flip runState rng $ runEitherT $ do
let components = BC.split '.' jwt
when (length components < 3) $ left $ BadDots 2
hdr <- B64.decode (head components) >>= hoistEither . parseHeader
ks <- findKeys hdr keySet
decodings <- case hdr of
UnsecuredH -> B64.decode (components !! 1) >>= \p -> return [Just (Unsecured p)]
JwsH _ -> mapM decodeWithJws ks
_ -> mapM decodeWithJwe ks
maybe (left $ KeyError "None of the keys was able to decode the JWT") (return . fromJust) $ find isJust decodings
where
decodeWithJws :: CPRG g => Jwk -> EitherT JwtError (State g) (Maybe JwtContent)
decodeWithJws k = either (const $ return Nothing) (return . Just . Jws) $ case k of
RsaPublicJwk kPub _ _ _ -> Jws.rsaDecode kPub jwt
RsaPrivateJwk kPr _ _ _ -> Jws.rsaDecode (private_pub kPr) jwt
EcPublicJwk kPub _ _ _ _ -> Jws.ecDecode kPub jwt
EcPrivateJwk kPr _ _ _ _ -> Jws.ecDecode (ECDSA.toPublicKey kPr) jwt
SymmetricJwk kb _ _ _ -> Jws.hmacDecode kb jwt
decodeWithJwe :: CPRG g => Jwk -> EitherT JwtError (State g) (Maybe JwtContent)
decodeWithJwe k = case k of
RsaPrivateJwk kPr _ _ _ -> do
e <- state (\g -> Jwe.rsaDecode g kPr jwt)
either (const $ return Nothing) (return . Just . Jwe) e
_ -> left $ KeyError "Not a JWE key (shouldn't happen)"
decodeClaims :: ByteString
-> Either JwtError (JwtHeader, JwtClaims)
decodeClaims jwt = do
let components = BC.split '.' jwt
when (length components /= 3) $ Left $ BadDots 2
hdr <- B64.decode (head components) >>= parseHeader
claims <- B64.decode ((head . tail) components) >>= parseClaims
return (hdr, claims)
where
parseClaims bs = maybe (Left BadClaims) Right $ decodeStrict' bs
findKeys :: Monad m => JwtHeader -> [Jwk] -> EitherT JwtError m [Jwk]
findKeys hdr jwks = case hdr of
JweH h -> checkKeys $ findMatchingJweKeys jwks h
JwsH h -> checkKeys $ findMatchingJwsKeys jwks h
UnsecuredH -> return []
where
checkKeys [] = left $ KeyError "No suitable key was found to decode the JWT"
checkKeys ks = return ks