Skip to content

Commit 634b8ed

Browse files
committed
Merge pull request #78 from auth0/update-to-jws-3
Update to jws@^3.0.0
2 parents 954bd7a + 9f24ffd commit 634b8ed

File tree

4 files changed

+48
-19
lines changed

4 files changed

+48
-19
lines changed

index.js

+15-8
Original file line numberDiff line numberDiff line change
@@ -112,15 +112,27 @@ module.exports.verify = function(jwtString, secretOrPublicKey, options, callback
112112
~secretOrPublicKey.toString().indexOf('BEGIN PUBLIC KEY') ?
113113
[ 'RS256','RS384','RS512','ES256','ES384','ES512' ] :
114114
~secretOrPublicKey.toString().indexOf('BEGIN RSA PUBLIC KEY') ?
115-
[ 'RS256','RS384','RS512' ] :
116-
[ 'HS256','HS384','HS512' ];
115+
[ 'RS256','RS384','RS512' ] :
116+
[ 'HS256','HS384','HS512' ];
117117

118118
}
119119

120+
var decodedToken = jws.decode(jwtString);
121+
122+
if (!decodedToken) {
123+
return done(new JsonWebTokenError('invalid token'));
124+
}
125+
126+
var header = decodedToken.header;
127+
128+
if (!~options.algorithms.indexOf(header.alg)) {
129+
return done(new JsonWebTokenError('invalid algorithm'));
130+
}
131+
120132
var valid;
121133

122134
try {
123-
valid = jws.verify(jwtString, secretOrPublicKey);
135+
valid = jws.verify(jwtString, header.alg, secretOrPublicKey);
124136
} catch (e) {
125137
return done(e);
126138
}
@@ -136,11 +148,6 @@ module.exports.verify = function(jwtString, secretOrPublicKey, options, callback
136148
return done(err);
137149
}
138150

139-
var header = jws.decode(jwtString).header;
140-
if (!~options.algorithms.indexOf(header.alg)) {
141-
return done(new JsonWebTokenError('invalid signature'));
142-
}
143-
144151
if (typeof payload.exp !== 'undefined' && !options.ignoreExpiration) {
145152
if (typeof payload.exp !== 'number') {
146153
return done(new JsonWebTokenError('invalid exp value'));

package.json

+4-4
Original file line numberDiff line numberDiff line change
@@ -19,12 +19,12 @@
1919
"url": "https://github.com/auth0/node-jsonwebtoken/issues"
2020
},
2121
"dependencies": {
22-
"jws": "~2.0.0"
22+
"jws": "^3.0.0"
2323
},
2424
"devDependencies": {
25-
"atob": "~1.1.2",
26-
"chai": "~1.10.0",
27-
"mocha": "~2.1.0"
25+
"atob": "^1.1.2",
26+
"chai": "^1.10.0",
27+
"mocha": "^2.1.0"
2828
},
2929
"engines": {
3030
"npm": ">=1.4.28"

test/jwt.rs.tests.js

+1-1
Original file line numberDiff line numberDiff line change
@@ -241,7 +241,7 @@ describe('RS256', function() {
241241
jwt.verify('fruit.fruit.fruit', pub, function(err, decoded) {
242242
assert.isUndefined(decoded);
243243
assert.isNotNull(err);
244-
assert.equal(err.name, 'Error');
244+
assert.equal(err.name, 'JsonWebTokenError');
245245
done();
246246
});
247247
});

test/wrong_alg.tests.js

+28-6
Original file line numberDiff line numberDiff line change
@@ -11,10 +11,32 @@ var pub = fs.readFileSync(path.join(__dirname, 'pub.pem'), 'utf8');
1111

1212
var TOKEN = 'eyJ0eXAiOiJKV1QiLCJhbGciOiJIUzI1NiJ9.eyJmb28iOiJiYXIiLCJpYXQiOjE0MjY1NDY5MTl9.ETgkTn8BaxIX4YqvUWVFPmum3moNZ7oARZtSBXb_vP4';
1313

14-
describe('signing with pub key as symmetric', function () {
15-
it('should not verify', function () {
16-
expect(function () {
17-
jwt.verify(TOKEN, pub);
18-
}).to.throw(JsonWebTokenError, /invalid signature/);
14+
describe('when setting a wrong `header.alg`', function () {
15+
16+
describe('signing with pub key as symmetric', function () {
17+
it('should not verify', function () {
18+
expect(function () {
19+
jwt.verify(TOKEN, pub);
20+
}).to.throw(JsonWebTokenError, /invalid algorithm/);
21+
});
22+
});
23+
24+
describe('signing with pub key as HS256 and whitelisting only RS256', function () {
25+
it('should not verify', function () {
26+
expect(function () {
27+
jwt.verify(TOKEN, pub, {algorithms: ['RS256']});
28+
}).to.throw(JsonWebTokenError, /invalid algorithm/);
29+
});
1930
});
20-
});
31+
32+
describe('signing with HS256 and checking with HS384', function () {
33+
it('should not verify', function () {
34+
expect(function () {
35+
var token = jwt.sign({foo: 'bar'}, 'secret', {algorithm: 'HS256'});
36+
jwt.verify(token, 'some secret', {algorithms: ['HS384']});
37+
}).to.throw(JsonWebTokenError, /invalid algorithm/);
38+
});
39+
});
40+
41+
42+
});

0 commit comments

Comments
 (0)