Documentation
¶
Index ¶
Examples ¶
Constants ¶
This section is empty.
Variables ¶
This section is empty.
Functions ¶
This section is empty.
Types ¶
type FileRootCAFetcher ¶
type FileRootCAFetcher struct {
// contains filtered or unexported fields
}
FileRootCAFetcher implements RootCAFetcher via files.
func NewFileRootCAFetcher ¶
func NewFileRootCAFetcher(cerpath string, optional ...string) *FileRootCAFetcher
NewFileRootCAFetcher returns a new FileRootCAFetcher. Optional string argument is for setting multiple Root CA file paths. At least one Root CA file path must be set.
type HTTPRootCAFetcher ¶
type HTTPRootCAFetcher struct {
// contains filtered or unexported fields
}
HTTPRootCAFetcher implements RootCAFetcher via HTTP.
func NewHTTPRootCAFetcher ¶
func NewHTTPRootCAFetcher(client *http.Client, url string, optional ...string) *HTTPRootCAFetcher
NewHTTPRootCAFetcher returns a new HTTPRootCAFetcher. At least one url that returns Root CA must be set. Optional string argument is for setting multiple urls that returns Root CA. if *http.Client is nil, http.DefaultClient is used.
type KeyProvider ¶
type KeyProvider struct {
// contains filtered or unexported fields
}
KeyProvider implements jws.KeyProvider. Once pubkey verified, it's cached.
func NewKeyProvider ¶
func NewKeyProvider(fetcher RootCAFetcher) *KeyProvider
NewKeyProvider returns a new KeyProvider.
Example (ByFile) ¶
kp := NewKeyProvider(NewFileRootCAFetcher(cerPath)) opts := []jws.VerifyOption{jws.WithKeyProvider(kp)} verified, err := jws.Verify(request, opts...) fmt.Println(string(verified), err)
Output: {"notificationType":"DID_CHANGE_RENEWAL_PREF","subtype":"DOWNGRADE","notificationUUID":"c92e001c-96d2-9ou5-q92p-32a5fy0d6g78","notificationVersion":"2.0","data":{"appAppleId":982253034,"bundleId":"hogehoge","bundleVersion":"269822910.1","environment":"Production","signedRenewalInfo":"...","signedTransactionInfo":"..."}} <nil>
Example (ByFiles) ¶
emptyCerPath := path(emptyCerPath) optional := []string{cerPath} kp := NewKeyProvider(NewFileRootCAFetcher(emptyCerPath, optional...)) opts := []jws.VerifyOption{jws.WithKeyProvider(kp)} verified, err := jws.Verify(request, opts...) fmt.Println(string(verified), err)
Output: {"notificationType":"DID_CHANGE_RENEWAL_PREF","subtype":"DOWNGRADE","notificationUUID":"c92e001c-96d2-9ou5-q92p-32a5fy0d6g78","notificationVersion":"2.0","data":{"appAppleId":982253034,"bundleId":"hogehoge","bundleVersion":"269822910.1","environment":"Production","signedRenewalInfo":"...","signedTransactionInfo":"..."}} <nil>
Example (ByRaw) ¶
kp := NewKeyProvider(NewRawRootCAFetcher(raw)) opts := []jws.VerifyOption{jws.WithKeyProvider(kp)} verified, err := jws.Verify(request, opts...) fmt.Println(string(verified), err)
Output: {"notificationType":"DID_CHANGE_RENEWAL_PREF","subtype":"DOWNGRADE","notificationUUID":"c92e001c-96d2-9ou5-q92p-32a5fy0d6g78","notificationVersion":"2.0","data":{"appAppleId":982253034,"bundleId":"hogehoge","bundleVersion":"269822910.1","environment":"Production","signedRenewalInfo":"...","signedTransactionInfo":"..."}} <nil>
Example (ByRaws) ¶
kp := NewKeyProvider(NewRawRootCAFetcher([]byte(`test`), raw)) opts := []jws.VerifyOption{jws.WithKeyProvider(kp)} verified, err := jws.Verify(request, opts...) fmt.Println(string(verified), err)
Output: {"notificationType":"DID_CHANGE_RENEWAL_PREF","subtype":"DOWNGRADE","notificationUUID":"c92e001c-96d2-9ou5-q92p-32a5fy0d6g78","notificationVersion":"2.0","data":{"appAppleId":982253034,"bundleId":"hogehoge","bundleVersion":"269822910.1","environment":"Production","signedRenewalInfo":"...","signedTransactionInfo":"..."}} <nil>
Example (ByUrl) ¶
client := &http.Client{ Transport: &fakeAppleServer{}, } kp := NewKeyProvider(NewHTTPRootCAFetcher(client, cerURL)) opts := []jws.VerifyOption{jws.WithKeyProvider(kp)} verified, err := jws.Verify(request, opts...) fmt.Println(string(verified), err)
Output: {"notificationType":"DID_CHANGE_RENEWAL_PREF","subtype":"DOWNGRADE","notificationUUID":"c92e001c-96d2-9ou5-q92p-32a5fy0d6g78","notificationVersion":"2.0","data":{"appAppleId":982253034,"bundleId":"hogehoge","bundleVersion":"269822910.1","environment":"Production","signedRenewalInfo":"...","signedTransactionInfo":"..."}} <nil>
Example (ByUrls) ¶
const url = "http://localhost:8080/test.cer" client := &http.Client{ Transport: &fakeAppleServer{}, } optional := []string{cerURL} kp := NewKeyProvider(NewHTTPRootCAFetcher(client, url, optional...)) opts := []jws.VerifyOption{jws.WithKeyProvider(kp)} verified, err := jws.Verify(request, opts...) fmt.Println(string(verified), err)
Output: {"notificationType":"DID_CHANGE_RENEWAL_PREF","subtype":"DOWNGRADE","notificationUUID":"c92e001c-96d2-9ou5-q92p-32a5fy0d6g78","notificationVersion":"2.0","data":{"appAppleId":982253034,"bundleId":"hogehoge","bundleVersion":"269822910.1","environment":"Production","signedRenewalInfo":"...","signedTransactionInfo":"..."}} <nil>
func (*KeyProvider) FetchKeys ¶
func (p *KeyProvider) FetchKeys(ctx context.Context, sink jws.KeySink, sig *jws.Signature, msg *jws.Message) error
FetchKeys extracts the public key from the x5c field to verify the certificate according to https://datatracker.ietf.org/doc/html/rfc7515#section-4.1.6. Treat the chain that matches the root certificate fetched by RootCAFetcher as the root certificate.
type RawRootCAFetcher ¶
type RawRootCAFetcher struct {
// contains filtered or unexported fields
}
RawRootCAFetcher implements RootCAFetcher via raw bytes.
func NewRawRootCAFetcher ¶
func NewRawRootCAFetcher(rootCA []byte, optional ...[]byte) *RawRootCAFetcher
NewRawRootCAFetcher returns a new RawRootCAFetcher. At least one certificate must be set as a byte string. Optional byte slice argument is for setting multiple Root CAs.