/
jwt.go
71 lines (61 loc) · 1.44 KB
/
jwt.go
1
2
3
4
5
6
7
8
9
10
11
12
13
14
15
16
17
18
19
20
21
22
23
24
25
26
27
28
29
30
31
32
33
34
35
36
37
38
39
40
41
42
43
44
45
46
47
48
49
50
51
52
53
54
55
56
57
58
59
60
61
62
63
64
65
66
67
68
69
70
71
package jwt
import (
"fmt"
"github.com/dgrijalva/jwt-go"
"time"
)
type JWTManager struct {
secret string
duration time.Duration
}
func NewJWTManager(secret string, duration time.Duration) *JWTManager {
return &JWTManager{
secret: secret,
duration: duration,
}
}
type Payload struct {
UserId string `json:"user_id"`
jwt.StandardClaims
}
func (manager *JWTManager) GenerateJWT(userId string) (string, error) {
claims := Payload{
UserId: userId,
StandardClaims: jwt.StandardClaims{
ExpiresAt: time.Now().Add(manager.duration).Unix(),
IssuedAt: time.Now().Unix(),
Issuer: "server",
},
}
token := jwt.NewWithClaims(jwt.SigningMethodHS256, claims)
tokenString, err := token.SignedString([]byte(manager.secret))
if err != nil {
return "", fmt.Errorf("%v", err)
}
return tokenString, nil
}
//VerifyToken verifies given token
func (manager *JWTManager) VerifyToken(accessToken string) (*Payload, error) {
token, err := jwt.ParseWithClaims(
accessToken,
&Payload{},
func(token *jwt.Token) (interface{}, error) {
_, ok := token.Method.(*jwt.SigningMethodHMAC)
if !ok {
return nil, fmt.Errorf("unexpected token signing method")
}
return []byte(manager.secret), nil
},
)
if err != nil {
return nil, fmt.Errorf("invalid token: %w", err)
}
if token.Valid {
claims, ok := token.Claims.(*Payload)
if !ok {
return nil, fmt.Errorf("invalid token claims")
}
return claims, err
}
return nil, err
}