/
token.go
91 lines (77 loc) · 2.18 KB
/
token.go
1
2
3
4
5
6
7
8
9
10
11
12
13
14
15
16
17
18
19
20
21
22
23
24
25
26
27
28
29
30
31
32
33
34
35
36
37
38
39
40
41
42
43
44
45
46
47
48
49
50
51
52
53
54
55
56
57
58
59
60
61
62
63
64
65
66
67
68
69
70
71
72
73
74
75
76
77
78
79
80
81
82
83
84
85
86
87
88
89
90
91
package repos
import (
"crypto/rand"
"encoding/base64"
"fmt"
"time"
"github.com/google/uuid"
"gorm.io/gorm"
"github.com/accentdesign/grpc/services/auth/internal/models"
)
type TokenConfig struct {
BearerDuration time.Duration
ResetDuration time.Duration
VerifyDuration time.Duration
}
type TokenRepository struct {
DB *gorm.DB
Config *TokenConfig
}
func (r *TokenRepository) createToken(token interface{}, userId uuid.UUID, size int, duration time.Duration) error {
randomBytes := make([]byte, size)
if _, err := rand.Read(randomBytes); err != nil {
return err
}
tokenStr := base64.URLEncoding.EncodeToString(randomBytes)
now := time.Now()
switch t := token.(type) {
case *models.AccessToken:
t.Token = tokenStr
t.UserId = userId
t.CreatedAt = now
t.ExpiresAt = now.Add(duration)
case *models.ResetToken:
t.Token = tokenStr
t.UserId = userId
t.CreatedAt = now
t.ExpiresAt = now.Add(duration)
case *models.VerifyToken:
t.Token = tokenStr
t.UserId = userId
t.CreatedAt = now
t.ExpiresAt = now.Add(duration)
default:
return fmt.Errorf("unsupported token type: %T", t)
}
if result := r.DB.Create(token); result.Error != nil {
return result.Error
}
return nil
}
func (r *TokenRepository) CreateAccessToken(userId uuid.UUID) (*models.AccessToken, error) {
accessToken := &models.AccessToken{}
if err := r.createToken(accessToken, userId, 64, r.Config.BearerDuration); err != nil {
return nil, err
}
return accessToken, nil
}
func (r *TokenRepository) CreateResetToken(userId uuid.UUID) (*models.ResetToken, error) {
resetToken := &models.ResetToken{}
if err := r.createToken(resetToken, userId, 64, r.Config.ResetDuration); err != nil {
return nil, err
}
return resetToken, nil
}
func (r *TokenRepository) CreateVerifyToken(userId uuid.UUID) (*models.VerifyToken, error) {
verifyToken := &models.VerifyToken{}
if err := r.createToken(verifyToken, userId, 64, r.Config.VerifyDuration); err != nil {
return nil, err
}
return verifyToken, nil
}
func (r *TokenRepository) RevokeBearerToken(token string) error {
if result := r.DB.Where("token = ?", token).Delete(&models.AccessToken{}); result.Error != nil {
return result.Error
}
return nil
}