-
Notifications
You must be signed in to change notification settings - Fork 0
/
hs256.go
53 lines (48 loc) · 1.31 KB
/
hs256.go
1
2
3
4
5
6
7
8
9
10
11
12
13
14
15
16
17
18
19
20
21
22
23
24
25
26
27
28
29
30
31
32
33
34
35
36
37
38
39
40
41
42
43
44
45
46
47
48
49
50
51
52
53
package hs256
import (
"errors"
"os"
"github.com/golang-jwt/jwt"
)
// Encode encodes a jwt token using data gotten from payload.
func Encode(payload map[string]interface{}) (tokenString string, err error) {
secretKey := getSecret()
if len(secretKey) < 1 {
return "", errors.New("No 'JWT_SECRET_KEY' value in environment variables")
}
claims := jwt.MapClaims{}
for k, v := range payload {
claims[k] = v
}
token := jwt.NewWithClaims(jwt.SigningMethodHS256, claims)
tokenString, err = token.SignedString(secretKey)
return
}
// Decode decodes a jwt token string.
//
// If the jwt token is invalid it returns an error.
func Decode(tokenString string) (claims map[string]interface{}, err error) {
secretKey := getSecret()
if len(secretKey) < 1 {
return nil, errors.New("No 'JWT_SECRET_KEY' value in environment variables")
}
token, err := jwt.Parse(tokenString, func(token *jwt.Token) (interface{}, error) {
if _, ok := token.Method.(*jwt.SigningMethodHMAC); !ok {
return "", errors.New("Invalid jwt token string")
}
return secretKey, nil
})
if err != nil {
return
}
if token.Valid {
claims = token.Claims.(jwt.MapClaims)
return
}
err = errors.New("An unknowm error occured while decoding jwt")
return
}
func getSecret() (secret []byte) {
secret = []byte(os.Getenv("JWT_SECRET_KEY"))
return secret
}