-
Notifications
You must be signed in to change notification settings - Fork 1
Expand file tree
/
Copy pathjwt.js
More file actions
90 lines (67 loc) · 2.39 KB
/
jwt.js
File metadata and controls
90 lines (67 loc) · 2.39 KB
1
2
3
4
5
6
7
8
9
10
11
12
13
14
15
16
17
18
19
20
21
22
23
24
25
26
27
28
29
30
31
32
33
34
35
36
37
38
39
40
41
42
43
44
45
46
47
48
49
50
51
52
53
54
55
56
57
58
59
60
61
62
63
64
65
66
67
68
69
70
71
72
73
74
75
76
77
78
79
80
81
82
83
84
85
86
87
88
89
// jwt.js
function base64UrlEncode(arrayBuffer) {
const uint8Array = new Uint8Array(arrayBuffer);
let base64String = '';
for (let i = 0; i < uint8Array.length; i++) {
base64String += String.fromCharCode(uint8Array[i]);
}
return btoa(base64String)
.replace(/=/g, '')
.replace(/\+/g, '-')
.replace(/\//g, '_');
}
function base64UrlDecode(base64UrlString) {
const base64String = base64UrlString
.replace(/-/g, '+')
.replace(/_/g, '/')
.padEnd(base64UrlString.length + (4 - (base64UrlString.length % 4)) % 4, '=');
const binaryString = atob(base64String);
const len = binaryString.length;
const bytes = new Uint8Array(len);
for (let i = 0; i < len; i++) {
bytes[i] = binaryString.charCodeAt(i);
}
return bytes.buffer;
}
export async function createJWT(payload, secret) {
const encoder = new TextEncoder();
const header = { alg: 'HS256', typ: 'JWT' };
const encodedHeader = base64UrlEncode(encoder.encode(JSON.stringify(header)));
const encodedPayload = base64UrlEncode(encoder.encode(JSON.stringify(payload)));
const key = await crypto.subtle.importKey(
'raw',
encoder.encode(secret),
{ name: 'HMAC', hash: 'SHA-256' },
false,
['sign']
);
const data = `${encodedHeader}.${encodedPayload}`;
const signature = await crypto.subtle.sign('HMAC', key, encoder.encode(data));
const encodedSignature = base64UrlEncode(signature);
return `${encodedHeader}.${encodedPayload}.${encodedSignature}`;
}
export async function verifyJWT(token, secret) {
const encoder = new TextEncoder();
const [encodedHeader, encodedPayload, encodedSignature] = token.split('.');
if (!encodedHeader || !encodedPayload || !encodedSignature) {
throw new Error('Invalid token format');
}
const key = await crypto.subtle.importKey(
'raw',
encoder.encode(secret),
{ name: 'HMAC', hash: 'SHA-256' },
false,
['verify']
);
const data = `${encodedHeader}.${encodedPayload}`;
const signature = base64UrlDecode(encodedSignature);
const isValid = await crypto.subtle.verify('HMAC', key, signature, encoder.encode(data));
if (!isValid) {
throw new Error('Invalid token signature');
}
// Decode and parse the payload
const decodedPayloadBytes = base64UrlDecode(encodedPayload);
const decodedPayloadString = new TextDecoder().decode(decodedPayloadBytes);
const payload = JSON.parse(decodedPayloadString);
return payload;
}