casdoor/object/token_jwt.go

95 lines
2.4 KiB
Go
Raw Normal View History

2021-03-14 22:48:09 +08:00
// Copyright 2021 The casbin Authors. All Rights Reserved.
//
// Licensed under the Apache License, Version 2.0 (the "License");
// you may not use this file except in compliance with the License.
// You may obtain a copy of the License at
//
// http://www.apache.org/licenses/LICENSE-2.0
//
// Unless required by applicable law or agreed to in writing, software
// distributed under the License is distributed on an "AS IS" BASIS,
// WITHOUT WARRANTIES OR CONDITIONS OF ANY KIND, either express or implied.
// See the License for the specific language governing permissions and
// limitations under the License.
package object
import (
2021-10-15 16:27:10 +08:00
_ "embed"
"fmt"
2021-03-14 22:48:09 +08:00
"time"
"github.com/astaxie/beego"
"github.com/golang-jwt/jwt/v4"
2021-03-14 22:48:09 +08:00
)
2021-10-15 16:27:10 +08:00
//go:embed token_jwt_key.pem
var tokenJwtPublicKey string
//go:embed token_jwt_key.key
var tokenJwtPrivateKey string
2021-03-14 22:48:09 +08:00
type Claims struct {
2021-08-07 12:34:14 +08:00
User
Nonce string `json:"nonce,omitempty"`
jwt.RegisteredClaims
2021-03-14 22:48:09 +08:00
}
func generateJwtToken(application *Application, user *User, nonce string) (string, error) {
2021-03-14 22:48:09 +08:00
nowTime := time.Now()
expireTime := nowTime.Add(time.Duration(application.ExpireInHours) * time.Hour)
2021-10-03 22:08:40 +08:00
user.Password = ""
2021-03-14 22:48:09 +08:00
claims := Claims{
User: *user,
Nonce: nonce,
RegisteredClaims: jwt.RegisteredClaims{
2021-12-12 19:26:06 +08:00
Issuer: beego.AppConfig.String("origin"),
2021-03-14 22:48:09 +08:00
Subject: user.Id,
Audience: []string{application.ClientId},
ExpiresAt: jwt.NewNumericDate(expireTime),
NotBefore: jwt.NewNumericDate(nowTime),
IssuedAt: jwt.NewNumericDate(nowTime),
ID: "",
2021-03-14 22:48:09 +08:00
},
}
2021-10-15 16:27:10 +08:00
token := jwt.NewWithClaims(jwt.SigningMethodRS256, claims)
// Use "token_jwt_key.key" as RSA private key
privateKey := tokenJwtPrivateKey
key, err := jwt.ParseRSAPrivateKeyFromPEM([]byte(privateKey))
if err != nil {
return "", err
}
tokenString, err := token.SignedString(key)
2021-03-14 22:48:09 +08:00
2021-10-11 23:47:05 +08:00
return tokenString, err
2021-03-14 22:48:09 +08:00
}
2021-10-15 16:27:10 +08:00
func ParseJwtToken(token string) (*Claims, error) {
t, err := jwt.ParseWithClaims(token, &Claims{}, func(token *jwt.Token) (interface{}, error) {
if _, ok := token.Method.(*jwt.SigningMethodRSA); !ok {
return nil, fmt.Errorf("unexpected signing method: %v", token.Header["alg"])
}
// Use "token_jwt_key.pem" as RSA public key
publicKey, err := jwt.ParseRSAPublicKeyFromPEM([]byte(tokenJwtPublicKey))
if err != nil {
return nil, err
}
return publicKey, nil
2021-03-14 22:48:09 +08:00
})
2021-10-15 16:27:10 +08:00
if t != nil {
if claims, ok := t.Claims.(*Claims); ok && t.Valid {
2021-03-14 22:48:09 +08:00
return claims, nil
}
}
return nil, err
}