forked from Eauldane/SnowcloakUtils
115 lines
2.4 KiB
Go
115 lines
2.4 KiB
Go
package jwt
|
|
|
|
import (
|
|
"encoding/base64"
|
|
"log"
|
|
"sync"
|
|
|
|
"SnowcloakUtils/global"
|
|
|
|
"github.com/golang-jwt/jwt/v5"
|
|
)
|
|
|
|
type SnowcloakClaimTypes struct {
|
|
Uid string `json:"uid"`
|
|
Alias string
|
|
CharaIdent string
|
|
Internal string
|
|
Continent string
|
|
jwt.RegisteredClaims
|
|
}
|
|
|
|
type TokenProvider struct {
|
|
mu sync.Mutex
|
|
tokens map[string]string
|
|
config *global.SnowcloakConfigurationBase
|
|
}
|
|
|
|
func NewTokenProvider(cfg *global.SnowcloakConfigurationBase) *TokenProvider {
|
|
return &TokenProvider{
|
|
tokens: make(map[string]string),
|
|
config: cfg,
|
|
}
|
|
}
|
|
|
|
func (p *TokenProvider) Token() string {
|
|
p.mu.Lock()
|
|
defer p.mu.Unlock()
|
|
|
|
signingKey := p.config.Jwt
|
|
|
|
if token, ok := p.tokens[signingKey]; ok {
|
|
return token
|
|
}
|
|
|
|
token := p.GenerateToken("shard1", "teststringteststringteststringteststringteststringteststringteststringteststringteststringteststring") // Should be read from config file
|
|
p.tokens[signingKey] = token
|
|
return token
|
|
}
|
|
|
|
func (p *TokenProvider) GenerateToken(shard string, authSigningKey string) string {
|
|
token := jwt.NewWithClaims(jwt.SigningMethodHS256, SnowcloakClaimTypes{
|
|
Uid: shard,
|
|
Internal: "true",
|
|
})
|
|
|
|
secret, err := base64.StdEncoding.DecodeString(authSigningKey)
|
|
|
|
if err != nil {
|
|
log.Fatalf("Failed to decode secret into byte array")
|
|
}
|
|
|
|
ss, err := token.SignedString(secret)
|
|
|
|
if err != nil {
|
|
log.Fatalf("Failed to sign JWT with signing key")
|
|
}
|
|
|
|
p.tokens[authSigningKey] = ss
|
|
|
|
// log.Printf("Generated Token: %s", ss)
|
|
|
|
return ss
|
|
}
|
|
|
|
func CreateToken(claims *SnowcloakClaimTypes, authSigningKey string) string {
|
|
token := jwt.NewWithClaims(jwt.SigningMethodHS256, claims)
|
|
|
|
secret, err := base64.StdEncoding.DecodeString(authSigningKey)
|
|
|
|
if err != nil {
|
|
log.Fatalf("Failed to decode secret into byte array")
|
|
}
|
|
|
|
ss, err := token.SignedString(secret)
|
|
|
|
if err != nil {
|
|
log.Fatalf("Failed to sign JWT with signing key")
|
|
}
|
|
|
|
return ss
|
|
}
|
|
|
|
func ValidateToken(tokenString string, authSigningKey string) jwt.MapClaims {
|
|
secret, err := base64.StdEncoding.DecodeString(authSigningKey)
|
|
|
|
if err != nil {
|
|
log.Fatalf("Failed to decode secret into byte array")
|
|
}
|
|
|
|
token, err := jwt.Parse(tokenString, func(token *jwt.Token) (any, error) {
|
|
return secret, nil
|
|
}, jwt.WithValidMethods([]string{jwt.SigningMethodHS256.Alg()}))
|
|
|
|
if err != nil {
|
|
log.Println("Failed to parse token from string")
|
|
return nil
|
|
}
|
|
|
|
if claims, ok := token.Claims.(jwt.MapClaims); ok {
|
|
return claims
|
|
} else {
|
|
return nil
|
|
}
|
|
}
|