v5.0.0-rc.1
Pre-releaseπ¨ New major version v5
(release candidate 1) π¨
Huge kudos to @oxisto for pushing this 10+ year-old project further and building a solid foundation. We don't take breaking changes lightly, but the changes outlined below were necessary to address some of the shortcomings of the previous API.
Version v5
contains a major rework of core functionalities in the jwt-go
library. This includes support for several validation options as well as a re-design of the Claims
interface. Lastly, we reworked how errors work under the hood, which should provide a better overall developer experience.
Starting from v5
, the import path will be:
"github.com/golang-jwt/jwt/v5"
For most users, changing the import path should suffice. However, since we intentionally changed and cleaned some of the public API, existing programs might need to be adopted. The following paragraphs go through the individual changes and make suggestions how to change existing programs.
The existing v4
version is available on the v4 branch at commit 9358574
Parsing and Validation Options
Under the hood, a new validator
struct takes care of validating the claims. A long awaited feature has been the option to fine-tune the validation of tokens. This is now possible with several ParserOption
functions that can be appended to most Parse
functions, such as ParseWithClaims
. The most important options and changes are:
WithLeeway
, which can be used to specific leeway that is taken into account when validating time-based claims, such asexp
ornbf
.- The new default behavior now disables checking the
iat
claim by default. Usage of this claim is OPTIONAL according to the JWT RFC. The claim itself is also purely informational according to the RFC, so a strict validation failure is not recommended. If you want to check for sensible values in these claims, please use theWithIssuedAt
parser option. - New options have also been added to check for expected
aud
,sub
andiss
, namelyWithAudience
,WithSubject
andWithIssuer
.
Changes to the Claims
interface
Complete Restructuring
Previously, the claims interface was satisfied with an implementation of a Valid() error
function. This had several issues:
- The different claim types (struct claims, map claims, etc.) then contained similar (but not 100 % identical) code of how this validation was done. This lead to a lot of (almost) duplicate code and was hard to maintain
- It was not really semantically close to what a "claim" (or a set of claims) really is; which is a list of defined key/value pairs with a certain semantic meaning.
Since all the validation functionality is now extracted into the validator, all VerifyXXX
and Valid
functions have been removed from the Claims
interface. Instead, the interface now represents a list of getters to retrieve values with a specific meaning. This allows us to completely decouple the validation logic with the underlying storage representation of the claim, which could be a struct, a map or even something stored in a database.
type Claims interface {
GetExpirationTime() (*NumericDate, error)
GetIssuedAt() (*NumericDate, error)
GetNotBefore() (*NumericDate, error)
GetIssuer() (string, error)
GetSubject() (string, error)
GetAudience() (ClaimStrings, error)
}
Supported Claim Types and Removal of StandardClaims
The two standard claim types supported by this library, MapClaims
and RegisteredClaims
both implement the necessary functions of this interface. The old StandardClaims
struct, which has already been deprecated in v4
is now removed.
Users using custom claims, in most cases, will not experience any changes in the behavior as long as they embedded RegisteredClaims
. If they created a new claim type from scratch, they now need to implemented the proper getter functions.
Migrating Application Specific Logic of the old Valid
Previously, users could override the Valid
method in a custom claim, for example to extend the validation with application-specific claims. However, this was always very dangerous, since once could easily disable the standard validation and signature checking.
In order to avoid that, while still supporting the use-case, a new ClaimsValidator
interface has been introduced. This interface consists of the Validate() error
function. If the validator sees, that a Claims
struct implements this interface, the errors returned to the Validate
function will be appended to the regular standard validation. It is not possible to disable the standard validation anymore (even only by accident).
Usage examples can be found in example_test.go, to build claims structs like the following.
// MyCustomClaims includes all registered claims, plus Foo.
type MyCustomClaims struct {
Foo string `json:"foo"`
jwt.RegisteredClaims
}
// Validate can be used to execute additional application-specific claims
// validation.
func (m MyCustomClaims) Validate() error {
if m.Foo != "bar" {
return errors.New("must be foobar")
}
return nil
}