casdoor/object/token_jwt.go

145 lines
3.9 KiB
Go
Raw Normal View History

2022-02-13 23:39:27 +08:00
// Copyright 2021 The Casdoor Authors. All Rights Reserved.
2021-03-14 22:48:09 +08:00
//
// Licensed under the Apache License, Version 2.0 (the "License");
// you may not use this file except in compliance with the License.
// You may obtain a copy of the License at
//
// http://www.apache.org/licenses/LICENSE-2.0
//
// Unless required by applicable law or agreed to in writing, software
// distributed under the License is distributed on an "AS IS" BASIS,
// WITHOUT WARRANTIES OR CONDITIONS OF ANY KIND, either express or implied.
// See the License for the specific language governing permissions and
// limitations under the License.
package object
import (
2021-10-15 16:27:10 +08:00
_ "embed"
"fmt"
2021-03-14 22:48:09 +08:00
"time"
"github.com/astaxie/beego"
"github.com/golang-jwt/jwt/v4"
2021-03-14 22:48:09 +08:00
)
type Claims struct {
*User
Nonce string `json:"nonce,omitempty"`
Tag string `json:"tag,omitempty"`
Scope string `json:"scope,omitempty"`
jwt.RegisteredClaims
2021-03-14 22:48:09 +08:00
}
type UserShort struct {
Owner string `xorm:"varchar(100) notnull pk" json:"owner"`
Name string `xorm:"varchar(100) notnull pk" json:"name"`
}
type ClaimsShort struct {
*UserShort
Nonce string `json:"nonce,omitempty"`
Scope string `json:"scope,omitempty"`
jwt.RegisteredClaims
}
func getShortUser(user *User) *UserShort {
res := &UserShort{
Owner: user.Owner,
Name: user.Name,
}
return res
}
func getShortClaims(claims Claims) ClaimsShort {
res := ClaimsShort{
UserShort: getShortUser(claims.User),
Nonce: claims.Nonce,
Scope: claims.Scope,
RegisteredClaims: claims.RegisteredClaims,
}
return res
}
func generateJwtToken(application *Application, user *User, nonce string, scope string) (string, string, error) {
2021-03-14 22:48:09 +08:00
nowTime := time.Now()
expireTime := nowTime.Add(time.Duration(application.ExpireInHours) * time.Hour)
refreshExpireTime := nowTime.Add(time.Duration(application.RefreshExpireInHours) * time.Hour)
2021-03-14 22:48:09 +08:00
2021-10-03 22:08:40 +08:00
user.Password = ""
2021-03-14 22:48:09 +08:00
claims := Claims{
User: user,
Nonce: nonce,
// FIXME: A workaround for custom claim by reusing `tag` in user info
Tag: user.Tag,
Scope: scope,
RegisteredClaims: jwt.RegisteredClaims{
2021-12-12 19:26:06 +08:00
Issuer: beego.AppConfig.String("origin"),
2021-03-14 22:48:09 +08:00
Subject: user.Id,
Audience: []string{application.ClientId},
ExpiresAt: jwt.NewNumericDate(expireTime),
NotBefore: jwt.NewNumericDate(nowTime),
IssuedAt: jwt.NewNumericDate(nowTime),
ID: "",
2021-03-14 22:48:09 +08:00
},
}
var token *jwt.Token
var refreshToken *jwt.Token
// the JWT token length in "JWT-Empty" mode will be very short, as User object only has two properties: owner and name
2021-12-18 16:16:34 +08:00
if application.TokenFormat == "JWT-Empty" {
claimsShort := getShortClaims(claims)
token = jwt.NewWithClaims(jwt.SigningMethodRS256, claimsShort)
claimsShort.ExpiresAt = jwt.NewNumericDate(refreshExpireTime)
refreshToken = jwt.NewWithClaims(jwt.SigningMethodRS256, claimsShort)
} else {
token = jwt.NewWithClaims(jwt.SigningMethodRS256, claims)
claims.ExpiresAt = jwt.NewNumericDate(refreshExpireTime)
refreshToken = jwt.NewWithClaims(jwt.SigningMethodRS256, claims)
2021-12-18 16:16:34 +08:00
}
2021-10-15 16:27:10 +08:00
2021-12-31 09:36:48 +08:00
cert := getCertByApplication(application)
// RSA private key
key, err := jwt.ParseRSAPrivateKeyFromPEM([]byte(cert.PrivateKey))
2021-10-15 16:27:10 +08:00
if err != nil {
return "", "", err
2021-10-15 16:27:10 +08:00
}
token.Header["kid"] = cert.Name
2021-10-15 16:27:10 +08:00
tokenString, err := token.SignedString(key)
if err != nil {
return "", "", err
}
refreshTokenString, err := refreshToken.SignedString(key)
2021-03-14 22:48:09 +08:00
return tokenString, refreshTokenString, err
2021-03-14 22:48:09 +08:00
}
2021-12-31 09:36:48 +08:00
func ParseJwtToken(token string, cert *Cert) (*Claims, error) {
2021-10-15 16:27:10 +08:00
t, err := jwt.ParseWithClaims(token, &Claims{}, func(token *jwt.Token) (interface{}, error) {
if _, ok := token.Method.(*jwt.SigningMethodRSA); !ok {
return nil, fmt.Errorf("unexpected signing method: %v", token.Header["alg"])
}
2021-12-31 09:36:48 +08:00
// RSA public key
publicKey, err := jwt.ParseRSAPublicKeyFromPEM([]byte(cert.PublicKey))
2021-10-15 16:27:10 +08:00
if err != nil {
return nil, err
}
return publicKey, nil
2021-03-14 22:48:09 +08:00
})
2021-10-15 16:27:10 +08:00
if t != nil {
if claims, ok := t.Claims.(*Claims); ok && t.Valid {
2021-03-14 22:48:09 +08:00
return claims, nil
}
}
return nil, err
}