From eff6bd6ae5807bcadf8d3def137df02c4deebd65 Mon Sep 17 00:00:00 2001
From: =?UTF-8?q?=EC=A1=B0=ED=83=9C=ED=98=81?= <95hyouka@gmail.com>
Date: Wed, 11 May 2022 09:06:27 +0900
Subject: [PATCH] Added subject validation
---
src/Paseto/Handlers/PasetoPurposeHandler.cs | 10 +++
src/Paseto/PasetoTokenValidationParameters.cs | 10 +++
tests/Paseto.Tests/PasetoValidationTest.cs | 66 +++++++++++++++++--
3 files changed, 80 insertions(+), 6 deletions(-)
diff --git a/src/Paseto/Handlers/PasetoPurposeHandler.cs b/src/Paseto/Handlers/PasetoPurposeHandler.cs
index 7da50a2..8b22245 100644
--- a/src/Paseto/Handlers/PasetoPurposeHandler.cs
+++ b/src/Paseto/Handlers/PasetoPurposeHandler.cs
@@ -46,6 +46,7 @@ public virtual PasetoTokenValidationResult ValidateTokenPayload(PasetoToken toke
ValidateLifetime(token, validationParameters);
ValidateAudience(token, validationParameters);
ValidateIssuer(token, validationParameters);
+ ValidateSubject(token, validationParameters);
}
catch (Exception ex)
{
@@ -87,4 +88,13 @@ protected virtual void ValidateIssuer(PasetoToken token, PasetoTokenValidationPa
if (token.Payload.HasIssuer())
new EqualValidator(token.Payload, PasetoRegisteredClaimNames.Issuer).Validate(validationParameters.ValidIssuer);
}
+
+ protected virtual void ValidateSubject(PasetoToken token, PasetoTokenValidationParameters validationParameters)
+ {
+ if (!validationParameters.ValidateSubject && !string.IsNullOrWhiteSpace(validationParameters.ValidSubject))
+ return;
+
+ if (token.Payload.HasSubject())
+ new EqualValidator(token.Payload, PasetoRegisteredClaimNames.Subject).Validate(validationParameters.ValidSubject);
+ }
}
diff --git a/src/Paseto/PasetoTokenValidationParameters.cs b/src/Paseto/PasetoTokenValidationParameters.cs
index 294b3ca..77749b5 100644
--- a/src/Paseto/PasetoTokenValidationParameters.cs
+++ b/src/Paseto/PasetoTokenValidationParameters.cs
@@ -22,6 +22,11 @@ public class PasetoTokenValidationParameters
///
public bool ValidateIssuer { get; set; }
+ ///
+ /// Gets or sets a value for comparing the subject of the payload.
+ ///
+ public bool ValidateSubject { get; set; }
+
///
/// Gets or sets the valid audience for comparing against the payload-provided aud.
///
@@ -31,4 +36,9 @@ public class PasetoTokenValidationParameters
/// Gets or sets the valid issuer for comparing against the payload-provided iss.
///
public string ValidIssuer { get; set; }
+
+ ///
+ /// Gets or sets the valid subject for comparing against the payload-provided sub.
+ ///
+ public string ValidSubject { get; set; }
}
\ No newline at end of file
diff --git a/tests/Paseto.Tests/PasetoValidationTest.cs b/tests/Paseto.Tests/PasetoValidationTest.cs
index d6472d2..bf5ecce 100644
--- a/tests/Paseto.Tests/PasetoValidationTest.cs
+++ b/tests/Paseto.Tests/PasetoValidationTest.cs
@@ -1,4 +1,5 @@
-using System.ComponentModel;
+using System;
+using System.ComponentModel;
using System.Linq;
using FluentAssertions;
using Paseto.Builder;
@@ -22,7 +23,7 @@ public void TokenWithValidIssuerValidationSucceeds(ProtocolVersion version, Purp
ValidIssuer = "valid-issuer",
};
- var (token, decodeKey) = GenerateToken(version, purpose, "valid-issuer");
+ var (token, decodeKey) = GenerateToken(version, purpose, PasetoRegisteredClaimNames.Issuer, "valid-issuer");
var decoded = new PasetoBuilder()
.Use(version, purpose)
.WithKey(decodeKey)
@@ -44,7 +45,7 @@ public void TokenWithInValidIssuerValidationFails(ProtocolVersion version, Purpo
ValidIssuer = "valid-issuer",
};
- var (token, decodeKey) = GenerateToken(version, purpose, "invalid-issuer");
+ var (token, decodeKey) = GenerateToken(version, purpose, PasetoRegisteredClaimNames.Issuer, "invalid-issuer");
var decoded = new PasetoBuilder()
.Use(version, purpose)
.WithKey(decodeKey)
@@ -53,9 +54,64 @@ public void TokenWithInValidIssuerValidationFails(ProtocolVersion version, Purpo
decoded.IsValid.Should().BeFalse();
}
- private static (string token, PasetoKey decodeKey) GenerateToken(ProtocolVersion version, Purpose purpose, string issuer)
+ [Theory(DisplayName = "Should succeed on token with valid subject")]
+ [InlineData(ProtocolVersion.V3, Purpose.Local)]
+ [InlineData(ProtocolVersion.V3, Purpose.Public)]
+ [InlineData(ProtocolVersion.V4, Purpose.Local)]
+ [InlineData(ProtocolVersion.V4, Purpose.Public)]
+ public void TokenWithValidSubjectValidationSucceeds(ProtocolVersion version, Purpose purpose)
+ {
+ var validationParameters = new PasetoTokenValidationParameters()
+ {
+ ValidateSubject = true,
+ ValidSubject = "valid-subject",
+ };
+
+ var (token, decodeKey) = GenerateToken(version, purpose, PasetoRegisteredClaimNames.Subject, "valid-subject");
+ var decoded = new PasetoBuilder()
+ .Use(version, purpose)
+ .WithKey(decodeKey)
+ .Decode(token, validationParameters);
+
+ decoded.IsValid.Should().BeTrue();
+ }
+
+ [Theory(DisplayName = "Should fail on token with invalid subject")]
+ [InlineData(ProtocolVersion.V3, Purpose.Local)]
+ [InlineData(ProtocolVersion.V3, Purpose.Public)]
+ [InlineData(ProtocolVersion.V4, Purpose.Local)]
+ [InlineData(ProtocolVersion.V4, Purpose.Public)]
+ public void TokenWithInValidSubjectValidationFails(ProtocolVersion version, Purpose purpose)
+ {
+ var validationParameters = new PasetoTokenValidationParameters()
+ {
+ ValidateSubject = true,
+ ValidSubject = "valid-subject",
+ };
+
+ var (token, decodeKey) = GenerateToken(version, purpose, PasetoRegisteredClaimNames.Subject, "invalid-subject");
+ var decoded = new PasetoBuilder()
+ .Use(version, purpose)
+ .WithKey(decodeKey)
+ .Decode(token, validationParameters);
+
+ decoded.IsValid.Should().BeFalse();
+ }
+
+ private static (string token, PasetoKey decodeKey) GenerateToken(ProtocolVersion version, Purpose purpose, string claimName, string claimValue)
{
var builder = new PasetoBuilder().Use(version, purpose);
+ switch (claimName)
+ {
+ case PasetoRegisteredClaimNames.Issuer:
+ builder.Issuer(claimValue);
+ break;
+ case PasetoRegisteredClaimNames.Subject:
+ builder.Subject(claimValue);
+ break;
+ default:
+ throw new NotImplementedException();
+ }
switch (purpose)
{
case Purpose.Local:
@@ -63,7 +119,6 @@ private static (string token, PasetoKey decodeKey) GenerateToken(ProtocolVersion
var key = builder.GenerateSymmetricKey();
var token = builder
.WithKey(key)
- .Issuer(issuer)
.Encode();
return (token, key);
}
@@ -72,7 +127,6 @@ private static (string token, PasetoKey decodeKey) GenerateToken(ProtocolVersion
var keyPair = builder.GenerateAsymmetricKeyPair(Enumerable.Repeat((byte)0x00, 32).ToArray());
var token = builder
.WithKey(keyPair.SecretKey)
- .Issuer(issuer)
.Encode();
return (token, keyPair.PublicKey);
}