oktopus/backend/services/controller/internal/api/auth/auth.go
2023-12-23 11:23:20 -03:00

71 lines
1.4 KiB
Go

package auth
import (
"errors"
"fmt"
"log"
"os"
"time"
"github.com/golang-jwt/jwt/v5"
)
func getJwtKey() []byte {
jwtKey, ok := os.LookupEnv("SECRET_API_KEY")
if !ok || jwtKey == "" {
return []byte("supersecretkey")
}
return []byte(jwtKey)
}
type JWTClaim struct {
Username string `json:"username"`
Email string `json:"email"`
jwt.RegisteredClaims
}
func GenerateJWT(email string, username string) (tokenString string, err error) {
expirationTime := time.Now().Add(4 * time.Hour)
claims := &JWTClaim{
username,
email,
jwt.RegisteredClaims{
ExpiresAt: jwt.NewNumericDate(expirationTime),
Issuer: "Oktopus",
},
}
token := jwt.NewWithClaims(jwt.SigningMethodHS256, claims)
tokenString, err = token.SignedString(getJwtKey())
return
}
func ValidateToken(signedToken string) (email string, err error) {
token, err := jwt.ParseWithClaims(
signedToken,
&JWTClaim{},
func(token *jwt.Token) (interface{}, error) {
// Don't forget to validate the alg is what you expect:
if _, ok := token.Method.(*jwt.SigningMethodHMAC); !ok {
return nil, fmt.Errorf("Unexpected signing method: %v", token.Header["alg"])
}
// hmacSampleSecret is a []byte containing your secret, e.g. []byte("my_secret_key")
return getJwtKey(), nil
},
)
if err != nil {
log.Println(err)
return
}
claims, ok := token.Claims.(*JWTClaim)
if !ok {
err = errors.New("couldn't parse claims")
return
}
email = claims.Email
return
}