mirror of
https://github.com/gchq/CyberChef.git
synced 2024-11-16 17:08:31 +01:00
65 lines
1.6 KiB
JavaScript
65 lines
1.6 KiB
JavaScript
/**
|
|
* @author gchq77703 []
|
|
* @copyright Crown Copyright 2018
|
|
* @license Apache-2.0
|
|
*/
|
|
|
|
import Operation from "../Operation.mjs";
|
|
import jwt from "jsonwebtoken";
|
|
import OperationError from "../errors/OperationError.mjs";
|
|
|
|
/**
|
|
* JWT Verify operation
|
|
*/
|
|
class JWTVerify extends Operation {
|
|
|
|
/**
|
|
* JWTVerify constructor
|
|
*/
|
|
constructor() {
|
|
super();
|
|
|
|
this.name = "JWT Verify";
|
|
this.module = "Crypto";
|
|
this.description = "Verifies that a JSON Web Token is valid and has been signed with the provided secret / private key.<br><br>The key should be either the secret for HMAC algorithms or the PEM-encoded private key for RSA and ECDSA.";
|
|
this.infoURL = "https://wikipedia.org/wiki/JSON_Web_Token";
|
|
this.inputType = "string";
|
|
this.outputType = "JSON";
|
|
this.args = [
|
|
{
|
|
name: "Private/Secret Key",
|
|
type: "text",
|
|
value: "secret"
|
|
},
|
|
];
|
|
}
|
|
|
|
/**
|
|
* @param {string} input
|
|
* @param {Object[]} args
|
|
* @returns {string}
|
|
*/
|
|
run(input, args) {
|
|
const [key] = args;
|
|
|
|
try {
|
|
const verified = jwt.verify(input, key, { algorithms: [
|
|
"HS256",
|
|
"HS384",
|
|
"HS512",
|
|
"none"
|
|
]});
|
|
|
|
if (Object.prototype.hasOwnProperty.call(verified, "name") && verified.name === "JsonWebTokenError") {
|
|
throw new OperationError(verified.message);
|
|
}
|
|
|
|
return verified;
|
|
} catch (err) {
|
|
throw new OperationError(err);
|
|
}
|
|
}
|
|
|
|
}
|
|
|
|
export default JWTVerify;
|