/
common.go
40 lines (34 loc) · 1.04 KB
/
common.go
1
2
3
4
5
6
7
8
9
10
11
12
13
14
15
16
17
18
19
20
21
22
23
24
25
26
27
28
29
30
31
32
33
34
35
36
37
38
39
40
package handlers
import (
"crypto/rsa"
"fmt"
"html/template"
"net/http"
"strings"
log "github.com/cihub/seelog"
"github.com/dgrijalva/jwt-go"
"github.com/wingfeng/idx/oauth2/server"
"github.com/wingfeng/idx/store"
)
var HTMLTemplate *template.Template
var PublicKey *rsa.PublicKey
var Srv *server.Server
var ClientStore *store.ClientStore
func verifyAuthorizationToken(r *http.Request) (jwt.MapClaims, error) {
header := r.Header.Get("Authorization")
tokenString := strings.Split(header, " ")[1]
token, err := jwt.Parse(tokenString, func(token *jwt.Token) (interface{}, error) {
// Don't forget to validate the alg is what you expect:
if _, ok := token.Method.(*jwt.SigningMethodRSA); !ok {
return nil, fmt.Errorf("unexpected signing method: %v", token.Header["alg"])
}
return PublicKey, nil
})
if claims, ok := token.Claims.(jwt.MapClaims); ok && token.Valid {
return claims, nil
} else {
err = fmt.Errorf("解析Token错误,Validate:%v,Error:%s", token.Valid, err.Error())
log.Errorf(err.Error())
return nil, err
}
}