Skip to content

Commit 9eac92d

Browse files
committed
Update names
1 parent e3e7b46 commit 9eac92d

File tree

2 files changed

+17
-17
lines changed

2 files changed

+17
-17
lines changed

parser_test.go

Lines changed: 16 additions & 16 deletions
Original file line numberDiff line numberDiff line change
@@ -16,17 +16,17 @@ import (
1616
var errKeyFuncError error = fmt.Errorf("error loading key")
1717

1818
var (
19-
jwtTestDefaultKey *rsa.PublicKey
20-
jwtTestRSAPrivateKey *rsa.PrivateKey
21-
jwtTestEC256PublicKey crypto.PublicKey
22-
jwtTestEC256PrivateKey crypto.PrivateKey
23-
exampleCognitoPublicKey crypto.PublicKey
24-
defaultKeyFunc jwt.Keyfunc = func(t *jwt.Token) (interface{}, error) { return jwtTestDefaultKey, nil }
25-
ecdsaKeyFunc jwt.Keyfunc = func(t *jwt.Token) (interface{}, error) { return jwtTestEC256PublicKey, nil }
26-
exampleCognitoKeyFunc jwt.Keyfunc = func(t *jwt.Token) (interface{}, error) { return exampleCognitoPublicKey, nil }
27-
emptyKeyFunc jwt.Keyfunc = func(t *jwt.Token) (interface{}, error) { return nil, nil }
28-
errorKeyFunc jwt.Keyfunc = func(t *jwt.Token) (interface{}, error) { return nil, errKeyFuncError }
29-
nilKeyFunc jwt.Keyfunc = nil
19+
jwtTestDefaultKey *rsa.PublicKey
20+
jwtTestRSAPrivateKey *rsa.PrivateKey
21+
jwtTestEC256PublicKey crypto.PublicKey
22+
jwtTestEC256PrivateKey crypto.PrivateKey
23+
paddedKey crypto.PublicKey
24+
defaultKeyFunc jwt.Keyfunc = func(t *jwt.Token) (interface{}, error) { return jwtTestDefaultKey, nil }
25+
ecdsaKeyFunc jwt.Keyfunc = func(t *jwt.Token) (interface{}, error) { return jwtTestEC256PublicKey, nil }
26+
paddedKeyFunc jwt.Keyfunc = func(t *jwt.Token) (interface{}, error) { return paddedKey, nil }
27+
emptyKeyFunc jwt.Keyfunc = func(t *jwt.Token) (interface{}, error) { return nil, nil }
28+
errorKeyFunc jwt.Keyfunc = func(t *jwt.Token) (interface{}, error) { return nil, errKeyFuncError }
29+
nilKeyFunc jwt.Keyfunc = nil
3030
)
3131

3232
func init() {
@@ -36,7 +36,7 @@ func init() {
3636

3737
// Load cognito public key - note there is only a public key for this key pair and should only be used for the
3838
// two test cases below.
39-
exampleCognitoPublicKey = test.LoadECPublicKeyFromDisk("test/exampleCognito-public.pem")
39+
paddedKey = test.LoadECPublicKeyFromDisk("test/exampleCognito-public.pem")
4040

4141
// Load private keys
4242
jwtTestRSAPrivateKey = test.LoadRSAPrivateKeyFromDisk("test/sample_key")
@@ -488,21 +488,21 @@ var setPaddingTestData = []struct {
488488
valid: true,
489489
},
490490
{
491-
name: "Error for padded cognito token with padding disabled",
491+
name: "Error for example padded token with padding disabled",
492492
tokenString: "eyJ0eXAiOiJKV1QiLCJraWQiOiIxMjM0NTY3OC1hYmNkLTEyMzQtYWJjZC0xMjM0NTY3OGFiY2QiLCJhbGciOiJFUzI1NiIsImlzcyI6Imh0dHBzOi8vY29nbml0by1pZHAuZXUtd2VzdC0yLmFtYXpvbmF3cy5jb20vIiwiY2xpZW50IjoiN0xUY29QWnJWNDR6ZVg2WUs5VktBcHZPM3EiLCJzaWduZXIiOiJhcm46YXdzOmVsYXN0aWNsb2FkYmFsYW5jaW5nIiwiZXhwIjoxNjI5NDcwMTAxfQ==.eyJzdWIiOiIxMjM0NTY3OC1hYmNkLTEyMzQtYWJjZC0xMjM0NTY3OGFiY2QiLCJlbWFpbF92ZXJpZmllZCI6InRydWUiLCJlbWFpbCI6InVzZXJAZXhhbXBsZS5jb20iLCJ1c2VybmFtZSI6IjEyMzQ1Njc4LWFiY2QtMTIzNC1hYmNkLTEyMzQ1Njc4YWJjZCIsImV4cCI6MTYyOTQ3MDEwMSwiaXNzIjoiaHR0cHM6Ly9jb2duaXRvLWlkcC5ldS13ZXN0LTIuYW1hem9uYXdzLmNvbS8ifQ==.sx0muJ754glJvwWgkHaPrOI3L1gaPjRLLUvOQRk0WitnqC5Dtt1knorcbOzlEcH9zwPM2jYYIAYQz_qEyM3grw==",
493493
claims: nil,
494494
paddedDecode: false,
495495
signingMethod: jwt.SigningMethodES256,
496-
keyfunc: exampleCognitoKeyFunc,
496+
keyfunc: paddedKeyFunc,
497497
valid: false,
498498
},
499499
{
500-
name: "Validated padded cognito token with padding enabled",
500+
name: "Validated example padded token with padding enabled",
501501
tokenString: "eyJ0eXAiOiJKV1QiLCJraWQiOiIxMjM0NTY3OC1hYmNkLTEyMzQtYWJjZC0xMjM0NTY3OGFiY2QiLCJhbGciOiJFUzI1NiIsImlzcyI6Imh0dHBzOi8vY29nbml0by1pZHAuZXUtd2VzdC0yLmFtYXpvbmF3cy5jb20vIiwiY2xpZW50IjoiN0xUY29QWnJWNDR6ZVg2WUs5VktBcHZPM3EiLCJzaWduZXIiOiJhcm46YXdzOmVsYXN0aWNsb2FkYmFsYW5jaW5nIiwiZXhwIjoxNjI5NDcwMTAxfQ==.eyJzdWIiOiIxMjM0NTY3OC1hYmNkLTEyMzQtYWJjZC0xMjM0NTY3OGFiY2QiLCJlbWFpbF92ZXJpZmllZCI6InRydWUiLCJlbWFpbCI6InVzZXJAZXhhbXBsZS5jb20iLCJ1c2VybmFtZSI6IjEyMzQ1Njc4LWFiY2QtMTIzNC1hYmNkLTEyMzQ1Njc4YWJjZCIsImV4cCI6MTYyOTQ3MDEwMSwiaXNzIjoiaHR0cHM6Ly9jb2duaXRvLWlkcC5ldS13ZXN0LTIuYW1hem9uYXdzLmNvbS8ifQ==.sx0muJ754glJvwWgkHaPrOI3L1gaPjRLLUvOQRk0WitnqC5Dtt1knorcbOzlEcH9zwPM2jYYIAYQz_qEyM3grw==",
502502
claims: nil,
503503
paddedDecode: true,
504504
signingMethod: jwt.SigningMethodES256,
505-
keyfunc: exampleCognitoKeyFunc,
505+
keyfunc: paddedKeyFunc,
506506
valid: true,
507507
},
508508
}

token.go

Lines changed: 1 addition & 1 deletion
Original file line numberDiff line numberDiff line change
@@ -8,7 +8,7 @@ import (
88
)
99

1010

11-
// DecodePaddingAllowed will switch the codec used for encoding/decoding JWTs respectively. Note that the JWS RFC7515
11+
// DecodePaddingAllowed will switch the codec used for decoding JWTs respectively. Note that the JWS RFC7515
1212
// states that the tokens will utilize a Base64url encoding with no padding. Unfortunately, some implementations
1313
// of JWT are producing non-standard tokens, and thus require support for decoding. Note that this is a global
1414
// variable, and updating it will change the behavior on a package level, and is also NOT go-routine safe.

0 commit comments

Comments
 (0)