-
Notifications
You must be signed in to change notification settings - Fork 0
/
token.go
111 lines (87 loc) · 2.95 KB
/
token.go
1
2
3
4
5
6
7
8
9
10
11
12
13
14
15
16
17
18
19
20
21
22
23
24
25
26
27
28
29
30
31
32
33
34
35
36
37
38
39
40
41
42
43
44
45
46
47
48
49
50
51
52
53
54
55
56
57
58
59
60
61
62
63
64
65
66
67
68
69
70
71
72
73
74
75
76
77
78
79
80
81
82
83
84
85
86
87
88
89
90
91
92
93
94
95
96
97
98
99
100
101
102
103
104
105
106
107
108
109
110
111
package paseto
import (
"aidanwoods.dev/go-paseto"
"fmt"
"github.com/JPratama7/util/types"
"github.com/goccy/go-json"
"time"
)
func (p PASETO) Encode(id string) (string, error) {
token := paseto.NewToken()
token.SetIssuedAt(time.Now())
token.SetNotBefore(time.Now())
token.SetExpiration(time.Now().Add(p.Duration))
token.SetString("id", id)
secretKey, err := paseto.NewV4AsymmetricSecretKeyFromHex(p.Private)
return token.V4Sign(secretKey, nil), err
}
func (p PASETO) EncodeWithStruct(id string, data any) (string, error) {
if !types.IsPointer(data) {
return "", fmt.Errorf("data must be a pointer")
}
token := paseto.NewToken()
token.SetIssuedAt(time.Now())
token.SetNotBefore(time.Now())
token.SetExpiration(time.Now().Add(p.Duration))
token.SetString("id", id)
err := token.Set("data", data)
if err != nil {
return "", err
}
secretKey, err := paseto.NewV4AsymmetricSecretKeyFromHex(p.Private)
return token.V4Sign(secretKey, nil), err
}
func (p PASETO) EncodeWithStructDuration(id string, data any, dur ...time.Duration) (string, error) {
duration := p.Duration
if len(dur) > 0 {
duration = dur[0]
}
token := paseto.NewToken()
token.SetIssuedAt(time.Now())
token.SetNotBefore(time.Now())
token.SetExpiration(time.Now().Add(duration))
token.SetString("id", id)
err := token.Set("data", data)
if err != nil {
return "", err
}
secretKey, err := paseto.NewV4AsymmetricSecretKeyFromHex(p.Private)
return token.V4Sign(secretKey, nil), err
}
func (p PASETO) Decode(tokenString string, payload any) (err error) {
if !types.IsPointer(payload) {
return fmt.Errorf("payload must be a pointer")
}
pubKey, err := paseto.NewV4AsymmetricPublicKeyFromHex(p.Public) // this wil fail if given key in an invalid format
if err != nil {
return
}
parser := paseto.NewParser() // only used because this example token has expired, use NewParser() (which checks expiry by default)
token, err := parser.ParseV4Public(pubKey, tokenString, nil) // this will fail if parsing failes, cryptographic checks fail, or validation rules fail
if err != nil {
return
}
err = json.Unmarshal(token.ClaimsJSON(), &payload)
return
}
func (p PASETO) RawDecode(tokenString string) (raw []byte, err error) {
pubKey, err := paseto.NewV4AsymmetricPublicKeyFromHex(p.Public) // this wil fail if given key in an invalid format
if err != nil {
return
}
parser := paseto.NewParser() // only used because this example token has expired, use NewParser() (which checks expiry by default)
token, err := parser.ParseV4Public(pubKey, tokenString, nil) // this will fail if parsing failes, cryptographic checks fail, or validation rules fail
if err != nil {
return
}
raw = token.ClaimsJSON()
return
}
func (p PASETO) DecodeGetId(tokenString string) string {
payload := new(Payload[any])
err := p.Decode(p.Public, tokenString)
if err != nil {
fmt.Println("Decode DecodeGetId : ", err)
}
return payload.Id
}