-
Notifications
You must be signed in to change notification settings - Fork 0
/
auth.go
119 lines (103 loc) · 3.26 KB
/
auth.go
1
2
3
4
5
6
7
8
9
10
11
12
13
14
15
16
17
18
19
20
21
22
23
24
25
26
27
28
29
30
31
32
33
34
35
36
37
38
39
40
41
42
43
44
45
46
47
48
49
50
51
52
53
54
55
56
57
58
59
60
61
62
63
64
65
66
67
68
69
70
71
72
73
74
75
76
77
78
79
80
81
82
83
84
85
86
87
88
89
90
91
92
93
94
95
96
97
98
99
100
101
102
103
104
105
106
107
108
109
110
111
112
113
114
115
116
117
118
119
package app
import (
"crypto/md5"
"encoding/hex"
"errors"
"fmt"
jwt "github.com/dgrijalva/jwt-go"
"golang.org/x/crypto/bcrypt"
"log"
"net/http"
"strings"
"time"
)
type TokenPair struct {
AccessToken string `json:"access_token"`
TokenType string `json:"token_type"`
ExpiresIn int64 `json:"expires_in"`
RefreshToken string `json:"refresh_token"`
}
var TempSecret = "123"
// https://levelup.gitconnected.com/crud-restful-api-with-go-gorm-jwt-postgres-mysql-and-testing-460a85ab7121
func Hash(password string) ([]byte, error) {
return bcrypt.GenerateFromPassword([]byte(password), bcrypt.DefaultCost)
}
func ValidPassword(hashedPassword, password string) (bool, error) {
err := bcrypt.CompareHashAndPassword([]byte(hashedPassword), []byte(password))
if err != nil {
log.Printf("Error compare hash and pssword. %v", err)
err = errors.New("Wrong username or password")
}
return err == nil, err
}
/*
Создаем и подписываем пару токенов
*/
func CreateTokenPair(userId int64, secretKey string, tokenExpiresSec int64) (*TokenPair, error) {
accessClaims := jwt.MapClaims{}
accessClaims["authorized"] = true
accessClaims["sub"] = userId
accessClaims["exp"] = time.Now().Add(time.Duration(tokenExpiresSec) * time.Second).Unix() //Token expires after 15 minutes
refreshClaims := jwt.MapClaims{}
refreshClaims["sub"] = userId
refreshClaims["exp"] = time.Now().Add(time.Hour * 24).Unix() //Token expires after 12 hour
accessToken := jwt.NewWithClaims(jwt.SigningMethodHS256, accessClaims)
refreshToken := jwt.NewWithClaims(jwt.SigningMethodHS256, refreshClaims)
accessTokenString, err := accessToken.SignedString([]byte(secretKey))
if err != nil {
log.Printf("Create signed access tocken string %v", err)
}
refreshTokenSting, err := refreshToken.SignedString([]byte(secretKey))
if err != nil {
log.Printf("Create signed refresh tocken string %v", err)
}
return &TokenPair{accessTokenString, "bearer", tokenExpiresSec, refreshTokenSting}, err
}
func ReadToken(secretKey string, tokenString string) (*jwt.Token, error) {
token, err := jwt.Parse(tokenString, func(token *jwt.Token) (interface{}, error) {
if _, ok := token.Method.(*jwt.SigningMethodHMAC); !ok {
return nil, fmt.Errorf("Unexpected signing method: %v", token.Header["alg"])
}
return []byte(secretKey), nil
})
if err != nil {
return nil, err
}
if _, ok := token.Claims.(jwt.MapClaims); ok && token.Valid {
return token, nil
}
return nil, err
}
/*
Проверяем токен
*/
func TokenValid(r *http.Request) error {
tokenString := ExtractToken(r)
_, err := jwt.Parse(tokenString, func(token *jwt.Token) (interface{}, error) {
if _, ok := token.Method.(*jwt.SigningMethodHMAC); !ok {
return nil, fmt.Errorf("Unexpected signing method: %v", token.Header["alg"])
}
return []byte(TempSecret), nil
})
if err != nil {
return err
}
return nil
}
func ExtractToken(r *http.Request) string {
keys := r.URL.Query()
token := keys.Get("token")
if token != "" {
return token
}
bearerToken := r.Header.Get("Authorization")
if len(strings.Split(bearerToken, " ")) == 2 {
return strings.Split(bearerToken, " ")[1]
}
return ""
}
func GetMD5Hash(text string) string {
hasher := md5.New()
hasher.Write([]byte(text))
return hex.EncodeToString(hasher.Sum(nil))
}