Add JWT generation, creation and validation along with tests

- from arieshi255/SnowcloakUtils
This commit is contained in:
2025-08-31 23:40:23 -04:00
parent a6a3fe8ec2
commit bc8e7d08f2
5 changed files with 166 additions and 0 deletions

114
jwt/jwt.go Normal file
View File

@@ -0,0 +1,114 @@
package jwt
import (
"encoding/base64"
"log"
"sync"
"SnowcloakUtils/global"
"github.com/golang-jwt/jwt/v5"
)
type SnowcloakClaimTypes struct {
Uid string `json:"uid"`
Alias string
CharaIdent string
Internal string
Continent string
jwt.RegisteredClaims
}
type TokenProvider struct {
mu sync.Mutex
tokens map[string]string
config *global.SnowcloakConfigurationBase
}
func NewTokenProvider(cfg *global.SnowcloakConfigurationBase) *TokenProvider {
return &TokenProvider{
tokens: make(map[string]string),
config: cfg,
}
}
func (p *TokenProvider) Token() string {
p.mu.Lock()
defer p.mu.Unlock()
signingKey := p.config.Jwt
if token, ok := p.tokens[signingKey]; ok {
return token
}
token := p.GenerateToken("shard1", "teststringteststringteststringteststringteststringteststringteststringteststringteststringteststring") // Should be read from config file
p.tokens[signingKey] = token
return token
}
func (p *TokenProvider) GenerateToken(shard string, authSigningKey string) string {
token := jwt.NewWithClaims(jwt.SigningMethodHS256, SnowcloakClaimTypes{
Uid: shard,
Internal: "true",
})
secret, err := base64.StdEncoding.DecodeString(authSigningKey)
if err != nil {
log.Fatalf("Failed to decode secret into byte array")
}
ss, err := token.SignedString(secret)
if err != nil {
log.Fatalf("Failed to sign JWT with signing key")
}
p.tokens[authSigningKey] = ss
// log.Printf("Generated Token: %s", ss)
return ss
}
func CreateToken(claims *SnowcloakClaimTypes, authSigningKey string) string {
token := jwt.NewWithClaims(jwt.SigningMethodHS256, claims)
secret, err := base64.StdEncoding.DecodeString(authSigningKey)
if err != nil {
log.Fatalf("Failed to decode secret into byte array")
}
ss, err := token.SignedString(secret)
if err != nil {
log.Fatalf("Failed to sign JWT with signing key")
}
return ss
}
func ValidateToken(tokenString string, authSigningKey string) jwt.MapClaims {
secret, err := base64.StdEncoding.DecodeString(authSigningKey)
if err != nil {
log.Fatalf("Failed to decode secret into byte array")
}
token, err := jwt.Parse(tokenString, func(token *jwt.Token) (any, error) {
return secret, nil
}, jwt.WithValidMethods([]string{jwt.SigningMethodHS256.Alg()}))
if err != nil {
log.Println("Failed to parse token from string")
return nil
}
if claims, ok := token.Claims.(jwt.MapClaims); ok {
return claims
} else {
return nil
}
}