-
Notifications
You must be signed in to change notification settings - Fork 4
/
jwt.go
71 lines (53 loc) · 1.34 KB
/
jwt.go
1
2
3
4
5
6
7
8
9
10
11
12
13
14
15
16
17
18
19
20
21
22
23
24
25
26
27
28
29
30
31
32
33
34
35
36
37
38
39
40
41
42
43
44
45
46
47
48
49
50
51
52
53
54
55
56
57
58
59
60
61
62
63
64
65
66
67
68
69
70
71
package jwt
import (
"fmt"
"os"
"strings"
"time"
jwt "github.com/dgrijalva/jwt-go/v4"
"github.com/wearedevx/keystone/internal/models"
"github.com/wearedevx/keystone/internal/repo"
"golang.org/x/xerrors"
)
func MakeToken(user models.User) (string, error) {
salt := []byte(os.Getenv("JWT_SALT"))
claims := jwt.StandardClaims{
ExpiresAt: &jwt.Time{
time.Now().Add(24 * time.Hour),
},
IssuedAt: &jwt.Time{
time.Now(),
},
Issuer: "keystone",
Subject: user.UserID,
}
token := jwt.NewWithClaims(jwt.SigningMethodHS256, claims)
return token.SignedString(salt)
}
func cleanUpToken(token string) string {
if strings.HasPrefix(token, "Bearer ") {
s := strings.Replace(token, "Bearer ", "", 1)
return strings.Trim(s, " ")
}
return strings.Trim(token, " ")
}
func VerifyToken(token string) (string, error) {
trimedToken := cleanUpToken(token)
t, err := jwt.Parse(trimedToken, func(token *jwt.Token) (interface{}, error) {
return []byte(os.Getenv("JWT_SALT")), nil
})
if err != nil {
return "", err
}
expiredError := &jwt.TokenExpiredError{}
if t.Valid {
Repo := new(repo.Repo)
Repo.Connect()
claims := t.Claims.(jwt.MapClaims)
userID := claims["sub"].(string)
return userID, nil
} else if xerrors.As(err, expiredError) {
return "", fmt.Errorf("Token expired")
}
return "", fmt.Errorf("Invalid token")
}