-
Notifications
You must be signed in to change notification settings - Fork 1
/
jwt-svc.go
69 lines (58 loc) · 1.35 KB
/
jwt-svc.go
1
2
3
4
5
6
7
8
9
10
11
12
13
14
15
16
17
18
19
20
21
22
23
24
25
26
27
28
29
30
31
32
33
34
35
36
37
38
39
40
41
42
43
44
45
46
47
48
49
50
51
52
53
54
55
56
57
58
59
60
61
62
63
64
65
66
67
68
69
package service
import (
"fmt"
"os"
"time"
"github.com/dgrijalva/jwt-go"
)
type JWTService interface {
GenerateToken(name string, user bool) string
ValidateToken(token string) (*jwt.Token, error)
}
type jwtClaim struct {
Name string `json:"name"`
Admin bool `json:"admin"`
jwt.StandardClaims
}
type jwtService struct {
secretKey string
issuer string
}
func NewJWTService() JWTService {
return &jwtService{
secretKey: getSecretKey(),
issuer: "robert",
}
}
func getSecretKey() string {
secret := os.Getenv("JWT_SECRET")
if len(secret) == 0 {
secret = "diptochuck"
}
return secret
}
func (jwtsvc *jwtService) GenerateToken(username string, user bool) string {
claims := &jwtClaim{
username,
user,
jwt.StandardClaims{
ExpiresAt: time.Now().Add(time.Hour * 72).Unix(),
Issuer: jwtsvc.issuer,
IssuedAt: time.Now().Unix(),
},
}
token := jwt.NewWithClaims(jwt.SigningMethodHS256, claims)
tokenSign, err := token.SignedString([]byte(jwtsvc.secretKey))
if err != nil {
panic(err)
}
return tokenSign
}
func (jwtsvc *jwtService) ValidateToken(token string) (*jwt.Token, error) {
return jwt.Parse(token, func(t *jwt.Token) (interface{}, error) {
if _, ok := t.Method.(*jwt.SigningMethodHMAC); !ok {
return nil, fmt.Errorf("incorrect SignIn Method: %v", t.Header["alg"])
}
return []byte(jwtsvc.secretKey), nil
})
}