package jwtutil import ( "errors" "time" "github.com/SamuelTariku/FortuneBet-Backend/internal/domain" "github.com/golang-jwt/jwt/v5" ) // type UserToken struct { // UserId string // } var ( ErrExpiredToken = errors.New("token expired") ErrMalformedToken = errors.New("token malformed") ErrTokenNotExpired = errors.New("token not expired") ErrRefreshTokenNotFound = errors.New("refresh token not found") // i.e login again ) type UserClaim struct { jwt.RegisteredClaims UserId int64 Role domain.Role } type JwtConfig struct { JwtAccessKey string JwtAccessExpiry int } func CreateJwt(userId int64, Role domain.Role, key string, expiry int) (string, error) { token := jwt.NewWithClaims(jwt.SigningMethodHS256, UserClaim{RegisteredClaims: jwt.RegisteredClaims{Issuer: "github.com/lafetz/snippitstash", IssuedAt: jwt.NewNumericDate(time.Now()), Audience: jwt.ClaimStrings{"fortune.com"}, NotBefore: jwt.NewNumericDate(time.Now()), ExpiresAt: jwt.NewNumericDate(time.Now().Add(time.Duration(expiry) * time.Second))}, UserId: userId, Role: Role, }) jwtToken, err := token.SignedString([]byte(key)) // return jwtToken, err } func ParseJwt(jwtToken string, key string) (*UserClaim, error) { token, err := jwt.ParseWithClaims(jwtToken, &UserClaim{}, func(token *jwt.Token) (interface{}, error) { return []byte(key), nil }) if err != nil { if errors.Is(err, jwt.ErrTokenExpired) { return nil, ErrExpiredToken } if errors.Is(err, jwt.ErrTokenMalformed) { return nil, ErrMalformedToken } return nil, err } if claims, ok := token.Claims.(*UserClaim); ok && token.Valid { return claims, nil } return nil, err }