|
| 1 | +package auth |
| 2 | + |
| 3 | +import ( |
| 4 | + "encoding/json" |
| 5 | + "fmt" |
| 6 | + "log" |
| 7 | + "net/http" |
| 8 | + "os" |
| 9 | + "strconv" |
| 10 | + "strings" |
| 11 | + "time" |
| 12 | + |
| 13 | + jwt "github.com/dgrijalva/jwt-go" |
| 14 | +) |
| 15 | + |
| 16 | +func CreateToken(user_id uint32) (string, error) { |
| 17 | + claims := jwt.MapClaims{} |
| 18 | + claims["authorized"] = true |
| 19 | + claims["user_id"] = user_id |
| 20 | + claims["exp"] = time.Now().Add(time.Hour * 1).Unix() //Token expires after 1 hour |
| 21 | + token := jwt.NewWithClaims(jwt.SigningMethodHS256, claims) |
| 22 | + return token.SignedString([]byte(os.Getenv("API_SECRET"))) |
| 23 | + |
| 24 | +} |
| 25 | + |
| 26 | +func TokenValid(r *http.Request) error { |
| 27 | + tokenString := ExtractToken(r) |
| 28 | + token, err := jwt.Parse(tokenString, func(token *jwt.Token) (interface{}, error) { |
| 29 | + if _, ok := token.Method.(*jwt.SigningMethodHMAC); !ok { |
| 30 | + return nil, fmt.Errorf("Unexpected signing method: %v", token.Header["alg"]) |
| 31 | + } |
| 32 | + return []byte(os.Getenv("API_SECRET")), nil |
| 33 | + }) |
| 34 | + if err != nil { |
| 35 | + return err |
| 36 | + } |
| 37 | + if claims, ok := token.Claims.(jwt.MapClaims); ok && token.Valid { |
| 38 | + Pretty(claims) |
| 39 | + } |
| 40 | + return nil |
| 41 | +} |
| 42 | + |
| 43 | +func ExtractToken(r *http.Request) string { |
| 44 | + keys := r.URL.Query() |
| 45 | + token := keys.Get("token") |
| 46 | + if token != "" { |
| 47 | + return token |
| 48 | + } |
| 49 | + bearerToken := r.Header.Get("Authorization") |
| 50 | + if len(strings.Split(bearerToken, " ")) == 2 { |
| 51 | + return strings.Split(bearerToken, " ")[1] |
| 52 | + } |
| 53 | + return "" |
| 54 | +} |
| 55 | + |
| 56 | +func ExtractTokenID(r *http.Request) (uint32, error) { |
| 57 | + |
| 58 | + tokenString := ExtractToken(r) |
| 59 | + token, err := jwt.Parse(tokenString, func(token *jwt.Token) (interface{}, error) { |
| 60 | + if _, ok := token.Method.(*jwt.SigningMethodHMAC); !ok { |
| 61 | + return nil, fmt.Errorf("Unexpected signing method: %v", token.Header["alg"]) |
| 62 | + } |
| 63 | + return []byte(os.Getenv("API_SECRET")), nil |
| 64 | + }) |
| 65 | + if err != nil { |
| 66 | + return 0, err |
| 67 | + } |
| 68 | + claims, ok := token.Claims.(jwt.MapClaims) |
| 69 | + if ok && token.Valid { |
| 70 | + uid, err := strconv.ParseUint(fmt.Sprintf("%.0f", claims["user_id"]), 10, 32) |
| 71 | + if err != nil { |
| 72 | + return 0, err |
| 73 | + } |
| 74 | + return uint32(uid), nil |
| 75 | + } |
| 76 | + return 0, nil |
| 77 | +} |
| 78 | + |
| 79 | +//Pretty display the claims licely in the terminal |
| 80 | +func Pretty(data interface{}) { |
| 81 | + b, err := json.MarshalIndent(data, "", " ") |
| 82 | + if err != nil { |
| 83 | + log.Println(err) |
| 84 | + return |
| 85 | + } |
| 86 | + |
| 87 | + fmt.Println(string(b)) |
| 88 | +} |
0 commit comments