Compare commits
2 Commits
a6a3fe8ec2
...
main
Author | SHA1 | Date | |
---|---|---|---|
891f292658 | |||
bc8e7d08f2
|
@@ -6,6 +6,10 @@ import (
|
|||||||
"math/rand"
|
"math/rand"
|
||||||
)
|
)
|
||||||
|
|
||||||
|
type SnowcloakConfigurationBase struct {
|
||||||
|
Jwt string
|
||||||
|
}
|
||||||
|
|
||||||
func GenerateRandomString(length int) string {
|
func GenerateRandomString(length int) string {
|
||||||
// C# had optional parameters that allowed lowercase for chardata and gpose lobbies, Go doesn't.
|
// C# had optional parameters that allowed lowercase for chardata and gpose lobbies, Go doesn't.
|
||||||
// We can probably get away with just uppercase.
|
// We can probably get away with just uppercase.
|
||||||
|
2
go.mod
2
go.mod
@@ -3,3 +3,5 @@ module SnowcloakUtils
|
|||||||
go 1.25
|
go 1.25
|
||||||
|
|
||||||
require github.com/showwin/speedtest-go v1.7.10
|
require github.com/showwin/speedtest-go v1.7.10
|
||||||
|
|
||||||
|
require github.com/golang-jwt/jwt/v5 v5.3.0 // indirect
|
||||||
|
2
go.sum
2
go.sum
@@ -1,2 +1,4 @@
|
|||||||
|
github.com/golang-jwt/jwt/v5 v5.3.0 h1:pv4AsKCKKZuqlgs5sUmn4x8UlGa0kEVt/puTpKx9vvo=
|
||||||
|
github.com/golang-jwt/jwt/v5 v5.3.0/go.mod h1:fxCRLWMO43lRc8nhHWY6LGqRcf+1gQWArsqaEUEa5bE=
|
||||||
github.com/showwin/speedtest-go v1.7.10 h1:9o5zb7KsuzZKn+IE2//z5btLKJ870JwO6ETayUkqRFw=
|
github.com/showwin/speedtest-go v1.7.10 h1:9o5zb7KsuzZKn+IE2//z5btLKJ870JwO6ETayUkqRFw=
|
||||||
github.com/showwin/speedtest-go v1.7.10/go.mod h1:Ei7OCTmNPdWofMadzcfgq1rUO7mvJy9Jycj//G7vyfA=
|
github.com/showwin/speedtest-go v1.7.10/go.mod h1:Ei7OCTmNPdWofMadzcfgq1rUO7mvJy9Jycj//G7vyfA=
|
||||||
|
114
jwt/jwt.go
Normal file
114
jwt/jwt.go
Normal file
@@ -0,0 +1,114 @@
|
|||||||
|
package jwt
|
||||||
|
|
||||||
|
import (
|
||||||
|
"encoding/base64"
|
||||||
|
"log"
|
||||||
|
"sync"
|
||||||
|
|
||||||
|
"SnowcloakUtils/global"
|
||||||
|
|
||||||
|
"github.com/golang-jwt/jwt/v5"
|
||||||
|
)
|
||||||
|
|
||||||
|
type SnowcloakClaimTypes struct {
|
||||||
|
Uid string `json:"uid"`
|
||||||
|
Alias string
|
||||||
|
CharaIdent string
|
||||||
|
Internal string
|
||||||
|
Continent string
|
||||||
|
jwt.RegisteredClaims
|
||||||
|
}
|
||||||
|
|
||||||
|
type TokenProvider struct {
|
||||||
|
mu sync.Mutex
|
||||||
|
tokens map[string]string
|
||||||
|
config *global.SnowcloakConfigurationBase
|
||||||
|
}
|
||||||
|
|
||||||
|
func NewTokenProvider(cfg *global.SnowcloakConfigurationBase) *TokenProvider {
|
||||||
|
return &TokenProvider{
|
||||||
|
tokens: make(map[string]string),
|
||||||
|
config: cfg,
|
||||||
|
}
|
||||||
|
}
|
||||||
|
|
||||||
|
func (p *TokenProvider) Token() string {
|
||||||
|
p.mu.Lock()
|
||||||
|
defer p.mu.Unlock()
|
||||||
|
|
||||||
|
signingKey := p.config.Jwt
|
||||||
|
|
||||||
|
if token, ok := p.tokens[signingKey]; ok {
|
||||||
|
return token
|
||||||
|
}
|
||||||
|
|
||||||
|
token := p.GenerateToken("shard1", "teststringteststringteststringteststringteststringteststringteststringteststringteststringteststring") // Should be read from config file
|
||||||
|
p.tokens[signingKey] = token
|
||||||
|
return token
|
||||||
|
}
|
||||||
|
|
||||||
|
func (p *TokenProvider) GenerateToken(shard string, authSigningKey string) string {
|
||||||
|
token := jwt.NewWithClaims(jwt.SigningMethodHS256, SnowcloakClaimTypes{
|
||||||
|
Uid: shard,
|
||||||
|
Internal: "true",
|
||||||
|
})
|
||||||
|
|
||||||
|
secret, err := base64.StdEncoding.DecodeString(authSigningKey)
|
||||||
|
|
||||||
|
if err != nil {
|
||||||
|
log.Fatalf("Failed to decode secret into byte array")
|
||||||
|
}
|
||||||
|
|
||||||
|
ss, err := token.SignedString(secret)
|
||||||
|
|
||||||
|
if err != nil {
|
||||||
|
log.Fatalf("Failed to sign JWT with signing key")
|
||||||
|
}
|
||||||
|
|
||||||
|
p.tokens[authSigningKey] = ss
|
||||||
|
|
||||||
|
// log.Printf("Generated Token: %s", ss)
|
||||||
|
|
||||||
|
return ss
|
||||||
|
}
|
||||||
|
|
||||||
|
func CreateToken(claims *SnowcloakClaimTypes, authSigningKey string) string {
|
||||||
|
token := jwt.NewWithClaims(jwt.SigningMethodHS256, claims)
|
||||||
|
|
||||||
|
secret, err := base64.StdEncoding.DecodeString(authSigningKey)
|
||||||
|
|
||||||
|
if err != nil {
|
||||||
|
log.Fatalf("Failed to decode secret into byte array")
|
||||||
|
}
|
||||||
|
|
||||||
|
ss, err := token.SignedString(secret)
|
||||||
|
|
||||||
|
if err != nil {
|
||||||
|
log.Fatalf("Failed to sign JWT with signing key")
|
||||||
|
}
|
||||||
|
|
||||||
|
return ss
|
||||||
|
}
|
||||||
|
|
||||||
|
func ValidateToken(tokenString string, authSigningKey string) jwt.MapClaims {
|
||||||
|
secret, err := base64.StdEncoding.DecodeString(authSigningKey)
|
||||||
|
|
||||||
|
if err != nil {
|
||||||
|
log.Fatalf("Failed to decode secret into byte array")
|
||||||
|
}
|
||||||
|
|
||||||
|
token, err := jwt.Parse(tokenString, func(token *jwt.Token) (any, error) {
|
||||||
|
return secret, nil
|
||||||
|
}, jwt.WithValidMethods([]string{jwt.SigningMethodHS256.Alg()}))
|
||||||
|
|
||||||
|
if err != nil {
|
||||||
|
log.Println("Failed to parse token from string")
|
||||||
|
return nil
|
||||||
|
}
|
||||||
|
|
||||||
|
if claims, ok := token.Claims.(jwt.MapClaims); ok {
|
||||||
|
return claims
|
||||||
|
} else {
|
||||||
|
return nil
|
||||||
|
}
|
||||||
|
}
|
44
jwt/jwt_test.go
Normal file
44
jwt/jwt_test.go
Normal file
@@ -0,0 +1,44 @@
|
|||||||
|
package jwt
|
||||||
|
|
||||||
|
import (
|
||||||
|
"SnowcloakUtils/global"
|
||||||
|
"fmt"
|
||||||
|
"testing"
|
||||||
|
)
|
||||||
|
|
||||||
|
func TestCreateAndValidateToken(t *testing.T) {
|
||||||
|
fmt.Println("Test: token creation")
|
||||||
|
token1 := CreateToken(&SnowcloakClaimTypes{Uid: "0", CharaIdent: "test1", Alias: "myAlias1", Continent: "EU"}, "teststringteststringteststringteststringteststringteststringteststringteststringteststringteststring")
|
||||||
|
fmt.Println(token1)
|
||||||
|
fmt.Println("Test: token validation")
|
||||||
|
fmt.Println(ValidateToken(token1, "teststringteststringteststringteststringteststringteststringteststringteststringteststringteststring"))
|
||||||
|
fmt.Println("Test: bad token creation")
|
||||||
|
token2 := CreateToken(&SnowcloakClaimTypes{Uid: "423235", CharaIdent: "test1", Alias: "myAlias", Continent: "EU"}, "teststringteststringteststringteststringteststringteststringteststringteststringteststringteststring")
|
||||||
|
fmt.Println(token2)
|
||||||
|
fmt.Println("Test: bad token validation")
|
||||||
|
badValidate := ValidateToken(token2, "dGVzdHRlc3Rpbmd0dGVzdGluZw==")
|
||||||
|
if badValidate != nil {
|
||||||
|
t.Errorf("Token wasn't invalid")
|
||||||
|
} else {
|
||||||
|
fmt.Println("Didn't validate invalid token")
|
||||||
|
}
|
||||||
|
}
|
||||||
|
|
||||||
|
func TestGenerateToken(t *testing.T) {
|
||||||
|
tokenProvider := NewTokenProvider(&global.SnowcloakConfigurationBase{Jwt: "teststringteststringteststringteststringteststringteststringteststringteststringteststringteststring"})
|
||||||
|
|
||||||
|
fmt.Println("Test: token generation")
|
||||||
|
fmt.Println(tokenProvider.GenerateToken("shard2", "teststringteststringteststringteststringteststringteststringteststringteststringteststringteststring"))
|
||||||
|
fmt.Println("Test: get cached token")
|
||||||
|
fmt.Println(tokenProvider.Token())
|
||||||
|
fmt.Println("Test: update token")
|
||||||
|
fmt.Println(tokenProvider.GenerateToken("shard3", "teststringteststringteststringteststringteststringteststringteststringteststringteststringteststring"))
|
||||||
|
fmt.Println("Test: get updated token")
|
||||||
|
fmt.Println(tokenProvider.Token())
|
||||||
|
fmt.Println("Test: create bad token")
|
||||||
|
fmt.Println(tokenProvider.GenerateToken("shard4", "dGVzdHRlc3Rpbmd0dGVzdGluZw=="))
|
||||||
|
fmt.Println("Test: get bad token")
|
||||||
|
fmt.Println(tokenProvider.Token())
|
||||||
|
fmt.Println("Test: validate cached token")
|
||||||
|
fmt.Println(ValidateToken(tokenProvider.Token(), "teststringteststringteststringteststringteststringteststringteststringteststringteststringteststring"))
|
||||||
|
}
|
Reference in New Issue
Block a user