forked from HackIllinois/api
-
Notifications
You must be signed in to change notification settings - Fork 0
/
jwt.go
63 lines (51 loc) · 1.34 KB
/
jwt.go
1
2
3
4
5
6
7
8
9
10
11
12
13
14
15
16
17
18
19
20
21
22
23
24
25
26
27
28
29
30
31
32
33
34
35
36
37
38
39
40
41
42
43
44
45
46
47
48
49
50
51
52
53
54
55
56
57
58
59
60
61
62
63
package utils
import (
"fmt"
"github.com/HackIllinois/api/gateway/config"
"github.com/HackIllinois/api/gateway/models"
jwt "github.com/dgrijalva/jwt-go"
"time"
)
var secret []byte
func init() {
secret = []byte(config.TOKEN_SECRET)
}
func ExtractFieldFromJWT(token string, field string) ([]string, error) {
jwt_token, err := jwt.Parse(token, func(token *jwt.Token) (interface{}, error) {
if _, ok := token.Method.(*jwt.SigningMethodHMAC); !ok {
return nil, fmt.Errorf("Unexpected signing method: %v", token.Header["alg"])
}
return secret, nil
})
if err != nil {
return nil, fmt.Errorf("Invalid token")
}
if claims, ok := jwt_token.Claims.(jwt.MapClaims); ok && jwt_token.Valid {
if int64(claims["exp"].(float64)) < time.Now().Unix() {
return nil, fmt.Errorf("Expired token")
}
var data []string
switch elem := claims[field].(type) {
case []interface{}:
for _, item := range elem {
data = append(data, item.(string))
}
case interface{}:
data = append(data, elem.(string))
}
return data, nil
}
return nil, fmt.Errorf("Invalid token")
}
func HasRole(token string, required_role models.Role) (bool, error) {
roles, err := ExtractFieldFromJWT(token, "roles")
if err != nil {
return false, err
}
for _, role := range roles {
if role == required_role {
return true, nil
}
}
return false, nil
}