-
Notifications
You must be signed in to change notification settings - Fork 0
/
auth.go
54 lines (45 loc) · 1.72 KB
/
auth.go
1
2
3
4
5
6
7
8
9
10
11
12
13
14
15
16
17
18
19
20
21
22
23
24
25
26
27
28
29
30
31
32
33
34
35
36
37
38
39
40
41
42
43
44
45
46
47
48
49
50
51
52
53
54
// Copyright 2021 dairongpeng <dairongpeng@foxmail.com>. All rights reserved.
//
// Licensed under the Apache License, Version 2.0 (the "License");
// you may not use this file except in compliance with the License.
// You may obtain a copy of the License at
//
// http://www.apache.org/licenses/LICENSE-2.0
//
// Unless required by applicable law or agreed to in writing, software
// distributed under the License is distributed on an "AS IS" BASIS,
// WITHOUT WARRANTIES OR CONDITIONS OF ANY KIND, either express or implied.
// See the License for the specific language governing permissions and
// limitations under the License.
// Package auth encrypt and compare password string.
package auth
import (
"time"
"github.com/dgrijalva/jwt-go"
"golang.org/x/crypto/bcrypt"
)
// Encrypt encrypts the plain text with bcrypt.
func Encrypt(source string) (string, error) {
hashedBytes, err := bcrypt.GenerateFromPassword([]byte(source), bcrypt.DefaultCost)
return string(hashedBytes), err
}
// Compare compares the encrypted text with the plain text if it's the same.
func Compare(hashedPassword, password string) error {
return bcrypt.CompareHashAndPassword([]byte(hashedPassword), []byte(password))
}
// Sign issue a jwt token based on secretID, secretKey, iss and aud.
func Sign(secretID string, secretKey string, iss, aud string) string {
claims := jwt.MapClaims{
"exp": time.Now().Add(time.Minute).Unix(),
"iat": time.Now().Unix(),
"nbf": time.Now().Add(0).Unix(),
"aud": aud,
"iss": iss,
}
// create a new token
token := jwt.NewWithClaims(jwt.SigningMethodHS256, claims)
token.Header["kid"] = secretID
// Sign the token with the specified secret.
tokenString, _ := token.SignedString([]byte(secretKey))
return tokenString
}