Comments (4)
This is what I currently have, it could probably be simplified internally
/// Get a verifier from a JWK
fn get_verifier(jwk: &Jwk) -> Result<Box<dyn JwsVerifier>> {
// Start with most likely algorithms
jws::ES512
.verifier_from_jwk(jwk)
.or_else(|_| jws::ES256.verifier_from_jwk(jwk))
.or_else(|_| jws::ES256K.verifier_from_jwk(jwk))
.or_else(|_| jws::ES384.verifier_from_jwk(jwk))
.map(|v| Box::new(v) as Box<dyn JwsVerifier>)
.or_else(|_| {
// EdDSA
jws::EdDSA
.verifier_from_jwk(jwk)
.map(|v| Box::new(v) as Box<dyn JwsVerifier>)
})
.or_else(|_| {
// HMAC
jws::HS256
.verifier_from_jwk(jwk)
.or_else(|_| jws::HS384.verifier_from_jwk(jwk))
.or_else(|_| jws::HS512.verifier_from_jwk(jwk))
.map(|v| Box::new(v) as Box<dyn JwsVerifier>)
})
.or_else(|_| {
// RSA
jws::RS256
.verifier_from_jwk(jwk)
.or_else(|_| jws::RS384.verifier_from_jwk(jwk))
.or_else(|_| jws::RS512.verifier_from_jwk(jwk))
.map(|v| Box::new(v) as Box<dyn JwsVerifier>)
})
.or_else(|_| {
// RSA PSS
jws::PS256
.verifier_from_jwk(jwk)
.or_else(|_| jws::PS384.verifier_from_jwk(jwk))
.or_else(|_| jws::PS512.verifier_from_jwk(jwk))
.map(|v| Box::new(v) as Box<dyn JwsVerifier>)
})
.map_err(Into::into)
}
from josekit-rs.
As JwsVerifier is extensively, There is not simple solution. But you can use a Box with trait.
For example:
let verifier: Box<dyn JwsVerifier> = match jwk.algorithm() {
Some("HS256") => Box::new(HS256.verifier_from_jwk(&jwk)?),
Some("HS384") => Box::new(HS384.verifier_from_jwk(&jwk)?),
Some("HS512") => Box::new(HS512.verifier_from_jwk(&jwk)?),
Some("RS256") => Box::new(RS256.verifier_from_jwk(&jwk)?),
Some("RS384") => Box::new(RS384.verifier_from_jwk(&jwk)?),
Some("RS512") => Box::new(RS512.verifier_from_jwk(&jwk)?),
Some("PS256") => Box::new(PS256.verifier_from_jwk(&jwk)?),
Some("PS384") => Box::new(PS384.verifier_from_jwk(&jwk)?),
Some("PS512") => Box::new(PS512.verifier_from_jwk(&jwk)?),
Some("ES256") => Box::new(ES256.verifier_from_jwk(&jwk)?),
Some("ES256K") => Box::new(ES256K.verifier_from_jwk(&jwk)?),
Some("ES384") => Box::new(ES384.verifier_from_jwk(&jwk)?),
Some("ES512") => Box::new(ES512.verifier_from_jwk(&jwk)?),
Some("EdDSA") => Box::new(EdDSA.verifier_from_jwk(&jwk)?),
_ => bail!("unknown algorthim."),
};
from josekit-rs.
Thanks for confirming, I guess that is roughly what I am doing.
Would you consider adding this to the library, just to make it easier for others?
impl Jwk {
/// Get a JWS verifier from a JWK
fn get_verifier(&self) -> Result<Box<dyn JwsVerifier>> {
let verifier: Box<dyn JwsVerifier> = match self.algorithm() {
Some("HS256") => Box::new(HS256.verifier_from_jwk(&jwk)?),
Some("HS384") => Box::new(HS384.verifier_from_jwk(&jwk)?),
Some("HS512") => Box::new(HS512.verifier_from_jwk(&jwk)?),
Some("RS256") => Box::new(RS256.verifier_from_jwk(&jwk)?),
Some("RS384") => Box::new(RS384.verifier_from_jwk(&jwk)?),
Some("RS512") => Box::new(RS512.verifier_from_jwk(&jwk)?),
Some("PS256") => Box::new(PS256.verifier_from_jwk(&jwk)?),
Some("PS384") => Box::new(PS384.verifier_from_jwk(&jwk)?),
Some("PS512") => Box::new(PS512.verifier_from_jwk(&jwk)?),
Some("ES256") => Box::new(ES256.verifier_from_jwk(&jwk)?),
Some("ES256K") => Box::new(ES256K.verifier_from_jwk(&jwk)?),
Some("ES384") => Box::new(ES384.verifier_from_jwk(&jwk)?),
Some("ES512") => Box::new(ES512.verifier_from_jwk(&jwk)?),
Some("EdDSA") => Box::new(EdDSA.verifier_from_jwk(&jwk)?),
_ => bail!("unknown algorthim."),
};
Ok(verifier)
}
}
from josekit-rs.
@hidekatsu-izuno in case yes, I added #27
from josekit-rs.
Related Issues (17)
- Only decode header HOT 2
- Allow deserialization of JwtPayload HOT 2
- Decoding/Verifying with JWK Set or Verifier Selector HOT 8
- set_x509_certificate_chain (x5c) implementation is wrong HOT 3
- JWS with x5c header parameter HOT 7
- x509_certificate_chain must be encoded in STANDARD, not URL_SAFE_NO_PAD or STANDARD_NOPAD HOT 1
- Jws/JweHeaderSet critical value should not be encoded by BASE64 HOT 1
- RUSTSEC-2023-0022 to 0024 => security advisory on openssl HOT 1
- Support the `ECMR` operation for JWK exchange HOT 2
- Allow to enable openssl vendored feature to cross compile HOT 4
- An equivalent function to node-jose's createEncrypt
- Security vulnerability disclosure HOT 2
- Support for Brainpool curves HOT 2
- Wrong iv length in JWE header HOT 3
- [QUESTION] how to properly use decode_with_verifier_in_jwk_set HOT 4
- [QUESTION] How can I cast JoseHeader to JwsHeader?
Recommend Projects
-
React
A declarative, efficient, and flexible JavaScript library for building user interfaces.
-
Vue.js
🖖 Vue.js is a progressive, incrementally-adoptable JavaScript framework for building UI on the web.
-
Typescript
TypeScript is a superset of JavaScript that compiles to clean JavaScript output.
-
TensorFlow
An Open Source Machine Learning Framework for Everyone
-
Django
The Web framework for perfectionists with deadlines.
-
Laravel
A PHP framework for web artisans
-
D3
Bring data to life with SVG, Canvas and HTML. 📊📈🎉
-
Recommend Topics
-
javascript
JavaScript (JS) is a lightweight interpreted programming language with first-class functions.
-
web
Some thing interesting about web. New door for the world.
-
server
A server is a program made to process requests and deliver data to clients.
-
Machine learning
Machine learning is a way of modeling and interpreting data that allows a piece of software to respond intelligently.
-
Visualization
Some thing interesting about visualization, use data art
-
Game
Some thing interesting about game, make everyone happy.
Recommend Org
-
Facebook
We are working to build community through open source technology. NB: members must have two-factor auth.
-
Microsoft
Open source projects and samples from Microsoft.
-
Google
Google ❤️ Open Source for everyone.
-
Alibaba
Alibaba Open Source for everyone
-
D3
Data-Driven Documents codes.
-
Tencent
China tencent open source team.
from josekit-rs.