Skip to content

Commit e11d505

Browse files
committed
refactor into multiple files
1 parent a32214d commit e11d505

File tree

4 files changed

+203
-195
lines changed

4 files changed

+203
-195
lines changed

decode.js

+30
Original file line numberDiff line numberDiff line change
@@ -0,0 +1,30 @@
1+
var jws = require('jws');
2+
3+
module.exports = function (jwt, options) {
4+
options = options || {};
5+
var decoded = jws.decode(jwt, options);
6+
if (!decoded) { return null; }
7+
var payload = decoded.payload;
8+
9+
//try parse the payload
10+
if(typeof payload === 'string') {
11+
try {
12+
var obj = JSON.parse(payload);
13+
if(typeof obj === 'object') {
14+
payload = obj;
15+
}
16+
} catch (e) { }
17+
}
18+
19+
//return header if `complete` option is enabled. header includes claims
20+
//such as `kid` and `alg` used to select the key within a JWKS needed to
21+
//verify the signature
22+
if (options.complete === true) {
23+
return {
24+
header: decoded.header,
25+
payload: payload,
26+
signature: decoded.signature
27+
};
28+
}
29+
return payload;
30+
};

index.js

+7-194
Original file line numberDiff line numberDiff line change
@@ -1,195 +1,8 @@
1-
var jws = require('jws');
2-
var ms = require('ms');
3-
var JWT = module.exports;
4-
5-
var JsonWebTokenError = JWT.JsonWebTokenError = require('./lib/JsonWebTokenError');
6-
var NotBeforeError = module.exports.NotBeforeError = require('./lib/NotBeforeError');
7-
var TokenExpiredError = JWT.TokenExpiredError = require('./lib/TokenExpiredError');
8-
9-
JWT.decode = function (jwt, options) {
10-
options = options || {};
11-
var decoded = jws.decode(jwt, options);
12-
if (!decoded) { return null; }
13-
var payload = decoded.payload;
14-
15-
//try parse the payload
16-
if(typeof payload === 'string') {
17-
try {
18-
var obj = JSON.parse(payload);
19-
if(typeof obj === 'object') {
20-
payload = obj;
21-
}
22-
} catch (e) { }
23-
}
24-
25-
//return header if `complete` option is enabled. header includes claims
26-
//such as `kid` and `alg` used to select the key within a JWKS needed to
27-
//verify the signature
28-
if (options.complete === true) {
29-
return {
30-
header: decoded.header,
31-
payload: payload,
32-
signature: decoded.signature
33-
};
34-
}
35-
return payload;
36-
};
37-
38-
JWT.sign = require('./sign');
39-
40-
JWT.verify = function(jwtString, secretOrPublicKey, options, callback) {
41-
if ((typeof options === 'function') && !callback) {
42-
callback = options;
43-
options = {};
44-
}
45-
46-
if (!options) options = {};
47-
48-
var done;
49-
50-
if (callback) {
51-
done = function() {
52-
var args = Array.prototype.slice.call(arguments, 0);
53-
return process.nextTick(function() {
54-
callback.apply(null, args);
55-
});
56-
};
57-
} else {
58-
done = function(err, data) {
59-
if (err) throw err;
60-
return data;
61-
};
62-
}
63-
64-
if (!jwtString){
65-
return done(new JsonWebTokenError('jwt must be provided'));
66-
}
67-
68-
var parts = jwtString.split('.');
69-
70-
if (parts.length !== 3){
71-
return done(new JsonWebTokenError('jwt malformed'));
72-
}
73-
74-
var hasSignature = parts[2].trim() !== '';
75-
76-
if (!hasSignature && secretOrPublicKey){
77-
return done(new JsonWebTokenError('jwt signature is required'));
78-
}
79-
80-
if (hasSignature && !secretOrPublicKey) {
81-
return done(new JsonWebTokenError('secret or public key must be provided'));
82-
}
83-
84-
if (!hasSignature && !options.algorithms) {
85-
options.algorithms = ['none'];
86-
}
87-
88-
if (!options.algorithms) {
89-
options.algorithms = ~secretOrPublicKey.toString().indexOf('BEGIN CERTIFICATE') ||
90-
~secretOrPublicKey.toString().indexOf('BEGIN PUBLIC KEY') ?
91-
[ 'RS256','RS384','RS512','ES256','ES384','ES512' ] :
92-
~secretOrPublicKey.toString().indexOf('BEGIN RSA PUBLIC KEY') ?
93-
[ 'RS256','RS384','RS512' ] :
94-
[ 'HS256','HS384','HS512' ];
95-
96-
}
97-
98-
var decodedToken;
99-
try {
100-
decodedToken = jws.decode(jwtString);
101-
} catch(err) {
102-
return done(new JsonWebTokenError('invalid token'));
103-
}
104-
105-
if (!decodedToken) {
106-
return done(new JsonWebTokenError('invalid token'));
107-
}
108-
109-
var header = decodedToken.header;
110-
111-
if (!~options.algorithms.indexOf(header.alg)) {
112-
return done(new JsonWebTokenError('invalid algorithm'));
113-
}
114-
115-
var valid;
116-
117-
try {
118-
valid = jws.verify(jwtString, header.alg, secretOrPublicKey);
119-
} catch (e) {
120-
return done(e);
121-
}
122-
123-
if (!valid)
124-
return done(new JsonWebTokenError('invalid signature'));
125-
126-
var payload;
127-
128-
try {
129-
payload = JWT.decode(jwtString);
130-
} catch(err) {
131-
return done(err);
132-
}
133-
134-
if (typeof payload.nbf !== 'undefined' && !options.ignoreNotBefore) {
135-
if (typeof payload.nbf !== 'number') {
136-
return done(new JsonWebTokenError('invalid nbf value'));
137-
}
138-
if (payload.nbf > Math.floor(Date.now() / 1000) + (options.clockTolerance || 0)) {
139-
return done(new NotBeforeError('jwt not active', new Date(payload.nbf * 1000)));
140-
}
141-
}
142-
143-
if (typeof payload.exp !== 'undefined' && !options.ignoreExpiration) {
144-
if (typeof payload.exp !== 'number') {
145-
return done(new JsonWebTokenError('invalid exp value'));
146-
}
147-
if (Math.floor(Date.now() / 1000) >= payload.exp + (options.clockTolerance || 0)) {
148-
return done(new TokenExpiredError('jwt expired', new Date(payload.exp * 1000)));
149-
}
150-
}
151-
152-
if (options.audience) {
153-
var audiences = Array.isArray(options.audience)? options.audience : [options.audience];
154-
var target = Array.isArray(payload.aud) ? payload.aud : [payload.aud];
155-
156-
var match = target.some(function(aud) { return audiences.indexOf(aud) != -1; });
157-
158-
if (!match)
159-
return done(new JsonWebTokenError('jwt audience invalid. expected: ' + audiences.join(' or ')));
160-
}
161-
162-
if (options.issuer) {
163-
var invalid_issuer =
164-
(typeof options.issuer === 'string' && payload.iss !== options.issuer) ||
165-
(Array.isArray(options.issuer) && options.issuer.indexOf(payload.iss) === -1);
166-
167-
if (invalid_issuer) {
168-
return done(new JsonWebTokenError('jwt issuer invalid. expected: ' + options.issuer));
169-
}
170-
}
171-
172-
if (options.subject) {
173-
if (payload.sub !== options.subject) {
174-
return done(new JsonWebTokenError('jwt subject invalid. expected: ' + options.subject));
175-
}
176-
}
177-
178-
if (options.jwtid) {
179-
if (payload.jti !== options.jwtid) {
180-
return done(new JsonWebTokenError('jwt jwtid invalid. expected: ' + options.jwtid));
181-
}
182-
}
183-
184-
if (options.maxAge) {
185-
var maxAge = ms(options.maxAge);
186-
if (typeof payload.iat !== 'number') {
187-
return done(new JsonWebTokenError('iat required when maxAge is specified'));
188-
}
189-
if (Date.now() - (payload.iat * 1000) > maxAge + (options.clockTolerance || 0) * 1000) {
190-
return done(new TokenExpiredError('maxAge exceeded', new Date(payload.iat * 1000 + maxAge)));
191-
}
192-
}
193-
194-
return done(null, payload);
1+
module.exports = {
2+
decode: require('./decode'),
3+
verify: require('./verify'),
4+
sign: require('./sign'),
5+
JsonWebTokenError: require('./lib/JsonWebTokenError'),
6+
NotBeforeError: require('./lib/NotBeforeError'),
7+
TokenExpiredError: require('./lib/TokenExpiredError'),
1958
};

test/encoding.tests.js

+1-1
Original file line numberDiff line numberDiff line change
@@ -34,4 +34,4 @@ describe('encoding', function() {
3434
expect(payload.username).to.equal(username);
3535
});
3636

37-
});
37+
});

0 commit comments

Comments
 (0)