Security News
Research
Supply Chain Attack on Rspack npm Packages Injects Cryptojacking Malware
A supply chain attack on Rspack's npm packages injected cryptomining malware, potentially impacting thousands of developers.
The byu-jwt module provides helpful functions to retrieve a specified BYU .well-known URL and verify BYU signed JWTs.
The byu-jwt module provides helpful functions to retrieve a specified BYU .well-known URL and verify BYU signed JWTs.
BYU's API Manager creates an HTTP header that contains a signed JWT(https://jwt.io). The names of the designed BYU signed headers can be referenced here for lookup convenience.
Note: The values of the headers are in lowercase because Node.js converts the headers by convention.
https://github.com/nodejs/node-v0.x-archive/issues/1954 https://nodejs.org/api/http.html#http_response_getheaders
The property containing the name of the HTTP header that contains the BYU signed JWT sent directly from BYU's API Manager.
Value is x-jwt-assertion
.
Example
The example uses the property to retrieve the header from the request.
const byuJwt = require('byu-jwt');
...
var current_jwt = req.headers[byuJwt.BYU_JWT_HEADER_CURRENT];
byuJwt.verifyJWT(current_jwt, 'http://the-wellknown-url.com');
The property containing the name of the HTTP header that contains the BYU signed JWT forwarded on from a service that received the BYU signed JWT sent directly from BYU's API Manager.
Value is x-jwt-assertion-original
.
Example
The example uses the property to retrieve the header from the request.
const byuJwt = require('byu-jwt');
...
var original_jwt = req.headers[byuJwt.BYU_JWT_HEADER_ORIGINAL];
byuJwt.verifyJWT(current_jwt, 'http://the-wellknown-url.com');
A property that can be set to enable or disable caching of the responses from well known URLs.
Defaults to false
.
Example
The example will set the module to cache well known URL responses:
const byuJwt = require('byu-jwt');
byuJwt.cacheWellknowns = true;
An error type that inherits from standard Error. Used in authenticate function.
Example
The example will throw an AuthenticationError and then immediately catch it:
const byuJwt = require('byu-jwt');
const AuthenticationError= byuJwt.AuthenticationError;
try {
throw new AuthenticationError('No expected JWTs found'));
} catch (e) {
if (e instanceof AuthenticationError) {
// Do something (send 401 status?)
} else {
// Do something else
}
}
Exposed error types from the jsonwebtoken npm package that also inherit from standard Error.
Example
The example will throw an JsonWebTokenError and then immediately catch it:
const byuJwt = require('byu-jwt');
const JsonWebTokenError= byuJwt.JsonWebTokenError;
try {
throw new JsonWebTokenError('expired jwt'));
} catch (e) {
if (e instanceof JsonWebTokenError) {
// Do something
} else {
// Do something else
}
}
Get the response of the specified .well-known URL. If cacheWellKnowns is set to true
then it returns the previously retrieved response.
Parameters
Returns a promise that resolves to an object. The object is the parsed JSON response from the well known URL.
Example
const byuJwt = require('byu-jwt');
byuJwt.getWellKnown('http://the-wellknown-url.com')
.then(function(wellKnownObject) {
console.log('Response:', wellKnownObject);
});
Get the PEM formatted X509 certificate.
Parameters
Returns a promise that resolves a string.
Example
const byuJwt = require('byu-jwt');
byuJwt.getPublicKey('http://the-wellknown-url.com')
.then(function(publicKey) {
console.log('Response:', publicKey);
});
Verify and decode the signed JWT.
Parameters
Returns a promise that resolves an object.
Verifies and decodes the signed JWT and then formats it to provide easier access to important properties within the JWT.
Parameters
Returns a promise that resolves to an object. The object will have many properties, but the most relevant will have the following structure:
{
byu: {
client: {
byuId: string,
claimSource: string,
netId: string,
personId: string,
preferredFirstName: string,
prefix: string,
restOfName: string,
sortName: string,
subscriberNetId: string,
suffix: string,
surname: string,
surnamePosition: string
},
resourceOwner: { // only set if resource owner exists
byuId: string,
netId: string,
personId: string,
preferredFirstName: string,
prefix: string,
restOfName: string,
sortName: string,
suffix: string,
surname: string,
surnamePosition: string
},
webresCheck: {
byuId: string,
netId: string,
personId: string,
}
},
wso2: {
apiContext: string,
application: {
id: string,
name: string,
tier: string
},
clientId: string,
endUser: string,
endUserTenantId: string,
keyType: string,
subscriber: string,
tier: string,
userType: string,
version: string
}
}
Example
const byuJwt = require('byu-jwt');
byuJwt.jwtDecoded('ey...gQ', 'http://the-wellknown-url.com')
.then(function(decoded) {
console.log(decoded.byu.client_byu_id); // example output: '123456789'
});
Verifies and decodes the signed JWT and then formats it to provide easier access to important properties within the JWT.
Parameters
{
'x-jwt-assertion': 'ey...gQ'
}
Returns a promise that resolves to an object or rejects with an AuthenticationError. The object will have the following structure:
{
current: {
/* The object returned by running jwtDecoded on current JWT */
},
// Only set if we have an original in addition to a current JWT
original: {
/* The object returned by running jwtDecoded on original JWT */
},
originalJwt: 'ey...gQ', // Here for convenience in passing it along
prioritizedClaims: {
byuId: string,
netId: string,
personId: string,
preferredFirstName: string,
prefix: string,
restOfName: string,
sortName: string,
suffix: string,
surname: string,
surnamePosition: string
}
}
Example
const byuJwt = require('byu-jwt');
const AuthenticationError = byuJwt.AuthenticationError;
const headers = {
'x-jwt-assertion': 'ey...gQ',
'x-jwt-assertion-original': 'ey...gQ'
}
byuJwt.authenticate(headers, 'http://the-wellknown-url.com')
.then(function(verifiedJwts) {
console.log(verifiedJwts.originalJwt); // example output: 'ey...gQ'
console.log(verifiedJwts.prioritizedClaims);
/**
* example output:
* {
* byuId: string,
* netId: string,
* personId: string,
* preferredFirstName: string,
* prefix: string,
* restOfName: string,
* sortName: string,
* suffix: string,
* surname: string,
* surnamePosition: string
* }
**/
})
.catch(err => {
if (err instanceof AuthenticationError) {
// This error came from authenticate function - Respond with 401
} else {
// Handle other errors
}
})
###Use in tests
For use in tests (like mocha tests), you can set the environment variable NODE_ENV to mock
. This will bypass the verifying of the JWT string parameter and simply decode it in jwtDecoded. Similarly, this will bypass the verifying of JWTs and basePath checking in authenticate.
Example (snippet)
it('decode JWT without verifying', function (done) {
process.env.NODE_ENV = 'mock';
//to run test case capture a jwt and copy in the function invocation below.
byuJwt.jwtDecoded('ey...gQ', 'http://the-wellknown-url.com')
.then(function (jwtDecoded) {
try {
assert.equal(jwtDecoded.byu.client.netId, '');
done()
}
catch (e) {
console.log(e);
done(e);
}
})
.catch(function (e) {
console.log(e);
done(e);
});
});
Note: Be sure to unset the environment variable for tests run after this test.
FAQs
The byu-jwt module provides helpful functions to retrieve a specified BYU .well-known URL and verify BYU signed JWTs.
The npm package byu-jwt receives a total of 263 weekly downloads. As such, byu-jwt popularity was classified as not popular.
We found that byu-jwt demonstrated a not healthy version release cadence and project activity because the last version was released a year ago. It has 14 open source maintainers collaborating on the project.
Did you know?
Socket for GitHub automatically highlights issues in each pull request and monitors the health of all your open source dependencies. Discover the contents of your packages and block harmful activity before you install or update your dependencies.
Security News
Research
A supply chain attack on Rspack's npm packages injected cryptomining malware, potentially impacting thousands of developers.
Research
Security News
Socket researchers discovered a malware campaign on npm delivering the Skuld infostealer via typosquatted packages, exposing sensitive data.
Security News
Sonar’s acquisition of Tidelift highlights a growing industry shift toward sustainable open source funding, addressing maintainer burnout and critical software dependencies.