-
Notifications
You must be signed in to change notification settings - Fork 0
/
jwt.go
83 lines (59 loc) · 1.69 KB
/
jwt.go
1
2
3
4
5
6
7
8
9
10
11
12
13
14
15
16
17
18
19
20
21
22
23
24
25
26
27
28
29
30
31
32
33
34
35
36
37
38
39
40
41
42
43
44
45
46
47
48
49
50
51
52
53
54
55
56
57
58
59
60
61
62
63
64
65
66
67
68
69
70
71
72
73
74
75
76
77
78
79
80
81
82
83
package gocom
import (
"fmt"
"time"
"github.com/ariandi/gocom/secret"
"github.com/golang-jwt/jwt/v4"
)
func NewJWT(data map[string]interface{}, ttl ...time.Duration) (string, error) {
targetTTL := 24 * time.Hour
if len(ttl) > 0 {
targetTTL = ttl[0]
}
pem, err := secret.Get("app.jwt.privatekey")
if err != nil {
return "", fmt.Errorf("Get jwt private key error: %w", err)
}
ret := ""
privateKey, err := jwt.ParseRSAPrivateKeyFromPEM([]byte(pem))
if err != nil {
return "", fmt.Errorf("jwt error parse private key : %w", err)
}
now := time.Now().UTC()
claims := make(jwt.MapClaims)
for key, val := range data {
claims[key] = val
}
claims["exp"] = now.Add(targetTTL).Unix()
claims["iat"] = now.Unix()
claims["nbf"] = now.Unix()
ret, err = jwt.NewWithClaims(jwt.SigningMethodRS256, claims).SignedString(privateKey)
if err != nil {
return "", fmt.Errorf("jwt error sign token : %w", err)
}
return ret, nil
}
func ValidateJWT(token string) (map[string]interface{}, error) {
pem, err := secret.Get("app.jwt.publickey")
if err != nil {
return nil, fmt.Errorf("Get jwt public key error: %w", err)
}
key, err := jwt.ParseRSAPublicKeyFromPEM([]byte(pem))
if err != nil {
return nil, fmt.Errorf("validate: parse key: %w", err)
}
tok, err := jwt.Parse(token, func(jwtToken *jwt.Token) (interface{}, error) {
if _, ok := jwtToken.Method.(*jwt.SigningMethodRSA); !ok {
return nil, fmt.Errorf("unexpected method: %s", jwtToken.Header["alg"])
}
return key, nil
})
if err != nil {
return nil, fmt.Errorf("validate: %w", err)
}
claims, ok := tok.Claims.(jwt.MapClaims)
if !ok || !tok.Valid {
return nil, fmt.Errorf("validate: invalid")
}
return claims, nil
}