2024-01-19 16:56:11 +00:00
|
|
|
package adminauthservice
|
2024-01-02 15:35:26 +00:00
|
|
|
|
|
|
|
import (
|
2024-01-19 16:56:11 +00:00
|
|
|
"strings"
|
2024-01-02 15:35:26 +00:00
|
|
|
"time"
|
2024-01-22 14:41:55 +00:00
|
|
|
|
|
|
|
"git.gocasts.ir/ebhomengo/niki/entity"
|
|
|
|
"github.com/golang-jwt/jwt/v4"
|
2024-01-02 15:35:26 +00:00
|
|
|
)
|
|
|
|
|
|
|
|
type Config struct {
|
|
|
|
SignKey string `koanf:"sign_key"`
|
|
|
|
AccessExpirationTime time.Duration `koanf:"access_expiration_time"`
|
|
|
|
RefreshExpirationTime time.Duration `koanf:"refresh_expiration_time"`
|
|
|
|
AccessSubject string `koanf:"access_subject"`
|
|
|
|
RefreshSubject string `koanf:"refresh_subject"`
|
|
|
|
}
|
|
|
|
|
|
|
|
type Service struct {
|
|
|
|
config Config
|
|
|
|
}
|
|
|
|
|
|
|
|
func New(cfg Config) Service {
|
|
|
|
return Service{
|
|
|
|
config: cfg,
|
|
|
|
}
|
|
|
|
}
|
2024-01-19 16:56:11 +00:00
|
|
|
|
|
|
|
func (s Service) CreateAccessToken(admin entity.Admin) (string, error) {
|
|
|
|
return s.createToken(admin.ID, admin.Role, s.config.AccessSubject, s.config.AccessExpirationTime)
|
|
|
|
}
|
|
|
|
|
|
|
|
func (s Service) CreateRefreshToken(admin entity.Admin) (string, error) {
|
|
|
|
return s.createToken(admin.ID, admin.Role, s.config.RefreshSubject, s.config.RefreshExpirationTime)
|
|
|
|
}
|
|
|
|
|
|
|
|
func (s Service) ParseToken(bearerToken string) (*Claims, error) {
|
|
|
|
// https://pkg.go.dev/github.com/golang-jwt/jwt/v5#example-ParseWithClaims-CustomClaimsType
|
|
|
|
|
|
|
|
tokenStr := strings.Replace(bearerToken, "Bearer ", "", 1)
|
|
|
|
|
|
|
|
token, err := jwt.ParseWithClaims(tokenStr, &Claims{}, func(token *jwt.Token) (interface{}, error) {
|
|
|
|
return []byte(s.config.SignKey), nil
|
|
|
|
})
|
|
|
|
if err != nil {
|
|
|
|
return nil, err
|
|
|
|
}
|
|
|
|
|
|
|
|
if claims, ok := token.Claims.(*Claims); ok && token.Valid {
|
|
|
|
return claims, nil
|
|
|
|
}
|
|
|
|
|
|
|
|
return nil, err
|
|
|
|
}
|
|
|
|
|
|
|
|
func (s Service) createToken(userID uint, role entity.AdminRole, subject string, expireDuration time.Duration) (string, error) {
|
|
|
|
// create a signer for rsa 256
|
|
|
|
// TODO - replace with rsa 256 RS256 - https://github.com/golang-jwt/jwt/blob/main/http_example_test.go
|
|
|
|
|
|
|
|
// set our claims
|
|
|
|
claims := Claims{
|
|
|
|
RegisteredClaims: jwt.RegisteredClaims{
|
|
|
|
Subject: subject,
|
|
|
|
ExpiresAt: jwt.NewNumericDate(time.Now().Add(expireDuration)),
|
|
|
|
},
|
|
|
|
UserID: userID,
|
|
|
|
Role: role,
|
|
|
|
}
|
|
|
|
|
|
|
|
// TODO - add sign method to config
|
|
|
|
accessToken := jwt.NewWithClaims(jwt.SigningMethodHS256, claims)
|
|
|
|
tokenString, err := accessToken.SignedString([]byte(s.config.SignKey))
|
|
|
|
if err != nil {
|
|
|
|
return "", err
|
|
|
|
}
|
|
|
|
|
|
|
|
return tokenString, nil
|
|
|
|
}
|