1
0
mirror of https://github.com/ceph/ceph-csi.git synced 2024-12-29 08:20:20 +00:00
ceph-csi/vendor/github.com/go-jose/go-jose/v3
dependabot[bot] 57a4fcbaa3 rebase: bump github.com/hashicorp/vault/api from 1.9.1 to 1.9.2
Bumps [github.com/hashicorp/vault/api](https://github.com/hashicorp/vault) from 1.9.1 to 1.9.2.
- [Release notes](https://github.com/hashicorp/vault/releases)
- [Changelog](https://github.com/hashicorp/vault/blob/main/CHANGELOG.md)
- [Commits](https://github.com/hashicorp/vault/compare/v1.9.1...v1.9.2)

---
updated-dependencies:
- dependency-name: github.com/hashicorp/vault/api
  dependency-type: direct:production
  update-type: version-update:semver-patch
...

Signed-off-by: dependabot[bot] <support@github.com>
2023-06-02 09:22:49 +00:00
..
cipher rebase: bump github.com/hashicorp/vault/api from 1.9.1 to 1.9.2 2023-06-02 09:22:49 +00:00
json rebase: bump github.com/hashicorp/vault/api from 1.9.1 to 1.9.2 2023-06-02 09:22:49 +00:00
jwt rebase: bump github.com/hashicorp/vault/api from 1.9.1 to 1.9.2 2023-06-02 09:22:49 +00:00
.gitignore rebase: bump github.com/hashicorp/vault/api from 1.9.1 to 1.9.2 2023-06-02 09:22:49 +00:00
.golangci.yml rebase: bump github.com/hashicorp/vault/api from 1.9.1 to 1.9.2 2023-06-02 09:22:49 +00:00
.travis.yml rebase: bump github.com/hashicorp/vault/api from 1.9.1 to 1.9.2 2023-06-02 09:22:49 +00:00
asymmetric.go rebase: bump github.com/hashicorp/vault/api from 1.9.1 to 1.9.2 2023-06-02 09:22:49 +00:00
BUG-BOUNTY.md rebase: bump github.com/hashicorp/vault/api from 1.9.1 to 1.9.2 2023-06-02 09:22:49 +00:00
CONTRIBUTING.md rebase: bump github.com/hashicorp/vault/api from 1.9.1 to 1.9.2 2023-06-02 09:22:49 +00:00
crypter.go rebase: bump github.com/hashicorp/vault/api from 1.9.1 to 1.9.2 2023-06-02 09:22:49 +00:00
doc.go rebase: bump github.com/hashicorp/vault/api from 1.9.1 to 1.9.2 2023-06-02 09:22:49 +00:00
encoding.go rebase: bump github.com/hashicorp/vault/api from 1.9.1 to 1.9.2 2023-06-02 09:22:49 +00:00
jwe.go rebase: bump github.com/hashicorp/vault/api from 1.9.1 to 1.9.2 2023-06-02 09:22:49 +00:00
jwk.go rebase: bump github.com/hashicorp/vault/api from 1.9.1 to 1.9.2 2023-06-02 09:22:49 +00:00
jws.go rebase: bump github.com/hashicorp/vault/api from 1.9.1 to 1.9.2 2023-06-02 09:22:49 +00:00
LICENSE rebase: bump github.com/hashicorp/vault/api from 1.9.1 to 1.9.2 2023-06-02 09:22:49 +00:00
opaque.go rebase: bump github.com/hashicorp/vault/api from 1.9.1 to 1.9.2 2023-06-02 09:22:49 +00:00
README.md rebase: bump github.com/hashicorp/vault/api from 1.9.1 to 1.9.2 2023-06-02 09:22:49 +00:00
shared.go rebase: bump github.com/hashicorp/vault/api from 1.9.1 to 1.9.2 2023-06-02 09:22:49 +00:00
signing.go rebase: bump github.com/hashicorp/vault/api from 1.9.1 to 1.9.2 2023-06-02 09:22:49 +00:00
symmetric.go rebase: bump github.com/hashicorp/vault/api from 1.9.1 to 1.9.2 2023-06-02 09:22:49 +00:00

Go JOSE

godoc godoc license build coverage

Package jose aims to provide an implementation of the Javascript Object Signing and Encryption set of standards. This includes support for JSON Web Encryption, JSON Web Signature, and JSON Web Token standards.

Disclaimer: This library contains encryption software that is subject to the U.S. Export Administration Regulations. You may not export, re-export, transfer or download this code or any part of it in violation of any United States law, directive or regulation. In particular this software may not be exported or re-exported in any form or on any media to Iran, North Sudan, Syria, Cuba, or North Korea, or to denied persons or entities mentioned on any US maintained blocked list.

Overview

The implementation follows the JSON Web Encryption (RFC 7516), JSON Web Signature (RFC 7515), and JSON Web Token (RFC 7519) specifications. Tables of supported algorithms are shown below. The library supports both the compact and JWS/JWE JSON Serialization formats, and has optional support for multiple recipients. It also comes with a small command-line utility (jose-util) for dealing with JOSE messages in a shell.

Note: We use a forked version of the encoding/json package from the Go standard library which uses case-sensitive matching for member names (instead of case-insensitive matching). This is to avoid differences in interpretation of messages between go-jose and libraries in other languages.

Versions

Version 2 (branch, doc) is the current stable version:

import "gopkg.in/go-jose/go-jose.v2"

Version 3 (branch, doc) is the under development/unstable version (not released yet):

import "github.com/go-jose/go-jose/v3"

All new feature development takes place on the master branch, which we are preparing to release as version 3 soon. Version 2 will continue to receive critical bug and security fixes. Note that starting with version 3 we are using Go modules for versioning instead of gopkg.in as before. Version 3 also will require Go version 1.13 or higher.

Version 1 (on the v1 branch) is frozen and not supported anymore.

Supported algorithms

See below for a table of supported algorithms. Algorithm identifiers match the names in the JSON Web Algorithms standard where possible. The Godoc reference has a list of constants.

Key encryption Algorithm identifier(s)
RSA-PKCS#1v1.5 RSA1_5
RSA-OAEP RSA-OAEP, RSA-OAEP-256
AES key wrap A128KW, A192KW, A256KW
AES-GCM key wrap A128GCMKW, A192GCMKW, A256GCMKW
ECDH-ES + AES key wrap ECDH-ES+A128KW, ECDH-ES+A192KW, ECDH-ES+A256KW
ECDH-ES (direct) ECDH-ES1
Direct encryption dir1

1. Not supported in multi-recipient mode

Signing / MAC Algorithm identifier(s)
RSASSA-PKCS#1v1.5 RS256, RS384, RS512
RSASSA-PSS PS256, PS384, PS512
HMAC HS256, HS384, HS512
ECDSA ES256, ES384, ES512
Ed25519 EdDSA2

2. Only available in version 2 of the package

Content encryption Algorithm identifier(s)
AES-CBC+HMAC A128CBC-HS256, A192CBC-HS384, A256CBC-HS512
AES-GCM A128GCM, A192GCM, A256GCM
Compression Algorithm identifiers(s)
DEFLATE (RFC 1951) DEF

Supported key types

See below for a table of supported key types. These are understood by the library, and can be passed to corresponding functions such as NewEncrypter or NewSigner. Each of these keys can also be wrapped in a JWK if desired, which allows attaching a key id.

Algorithm(s) Corresponding types
RSA *rsa.PublicKey, *rsa.PrivateKey
ECDH, ECDSA *ecdsa.PublicKey, *ecdsa.PrivateKey
EdDSA1 ed25519.PublicKey, ed25519.PrivateKey
AES, HMAC []byte

1. Only available in version 2 or later of the package

Examples

godoc godoc

Examples can be found in the Godoc reference for this package. The jose-util subdirectory also contains a small command-line utility which might be useful as an example as well.