The signedxml package transforms and validates signed xml documents. The main use case is to support Single Sign On protocols like SAML and WS-Federation.
Other packages that provide similar functionality rely on C libraries, which makes them difficult to run across platforms without significant configuration. signedxml
is written in pure go, and can be easily used on any platform. This package was originally created by Matt Smith and is in use at Moov Financial.
go get github.com/daugminas/signedxml
-
Hashes
-
Signatures
- http://www.w3.org/2001/04/xmldsig-more#rsa-md2
- http://www.w3.org/2001/04/xmldsig-more#rsa-md5
- http://www.w3.org/2000/09/xmldsig#rsa-sha1
- http://www.w3.org/2001/04/xmldsig-more#rsa-sha256
- http://www.w3.org/2001/04/xmldsig-more#rsa-sha384
- http://www.w3.org/2001/04/xmldsig-more#rsa-sha512
- http://www.w3.org/2000/09/xmldsig#dsa-sha1
- http://www.w3.org/2000/09/xmldsig#dsa-sha256
- http://www.w3.org/2001/04/xmldsig-more#ecdsa-sha1
- http://www.w3.org/2001/04/xmldsig-more#ecdsa-sha256
- http://www.w3.org/2001/04/xmldsig-more#ecdsa-sha384
- http://www.w3.org/2001/04/xmldsig-more#ecdsa-sha512
-
Canonicalization Methods/Transforms
Three steps:
-
Insert the to-be-signed document into an XML signature template (this uses an enveloped version)
-
Prepare private key for signing (DER format)
-
Sign the templated document with the private key
Full code:
// 0. load inputs
templateBytes, e := os.ReadFile("template.xml")
if e != nil {
panic(e)
}
targetBytes, e := os.ReadFile("signing_target.xml")
if e != nil {
panic(e)
}
keyBytes, e = os.ReadFile("private_key.pem")
if e != nil {
return
}
// 1. Insert target into the template
finalXMLtoBeSigned, e := signedxml.InsertXMLintoSignatureTemplate(string(templateBytes), string(targetBytes), true)
if e != nil {
panic(e)
}
// 2. Prep the key
key, e := signedxml.PrepPKCS8PrivateKey(keyBytes)
if e != nil {
panic(e)
}
// 3. Sign the document
var signer *signedxml.Signer
signer, e = signedxml.NewSigner(targetXML)
if e != nil {
return
}
signedXML, e = signer.Sign(key)
if e != nil {
panic(e)
}
If your signed xml contains the signature and certificate, then you can just pass in the xml and call ValidateReferences()
.
validator, err := signedxml.NewValidator(`<YourXMLString></YourXMLString>`)
xml, err = validator.ValidateReferences()
ValidateReferences()
verifies the DigestValue and SignatureValue in the xml document, and returns the signed payload(s). If the error value is nil
, then the signed xml is valid.
The x509.Certificate that was successfully used to validate the xml will be available by calling:
validator.SigningCert()
You can then verify that you trust the certificate. You can optionally supply your trusted certificates ahead of time by assigning them to the Certificates
property of the Validator
object, which is an x509.Certificate array.
If you need to specify an external Signature, you can use the SetSignature()
function to assign it:
validator.SetSignature(<`Signature></Signature>`)
It is expected that your XML contains the Signature element with all the parameters set (except DigestValue and SignatureValue).
signer, err := signedxml.NewSigner(`<YourXMLString></YourXMLString`)
signedXML, err := signer.Sign(`*rsa.PrivateKey object`)
Sign()
will generate the DigestValue and SignatureValue, populate it in the XML, and return the signed XML string.
Additional Transform algorithms can be included by adding to the CanonicalizationAlgorithms map. This interface will need to be implemented:
type CanonicalizationAlgorithm interface {
Process(inputXML string, transformXML string) (outputXML string, err error)
}
Simple Example:
type NoChangeCanonicalization struct{}
func (n NoChangeCanonicalization) Process(inputXML string,
transformXML string) (outputXML string, err error) {
return inputXML, nil
}
signedxml.CanonicalizationAlgorithms["http://myTranform"] = NoChangeCanonicalization{}
See envelopedsignature.go
and exclusivecanonicalization.go
for examples of actual implementations.
It is possible to set a custom reference ID attribute for both the signer and the validator. The default value is "ID"
Signer example:
signer.SetReferenceIDAttribute("customId")
Validator example:
validator.SetReferenceIDAttribute("customId")
channel | info |
---|---|
Twitter @moov | You can follow Moov.io's Twitter feed to get updates on our project(s). You can also tweet us questions or just share blogs or stories. |
GitHub Issue | If you are able to reproduce a problem please open a GitHub Issue under the specific project that caused the error. |
moov-io slack | Join our slack channel to have an interactive discussion about the development of the project. |
Contributions are welcome. Just fork the repo and send a pull request.
- Moov RTP20022 implements ISO20022 messages in Go for Real Time Payments (RTP)
About xml-sig:(https://www.xml.com/pub/a/2001/08/08/xmldsig.html#xml-sig) XML-DSIG how-to: https://www.di-mgt.com.au/xmldsig.html