70 lines
1.8 KiB
Go
70 lines
1.8 KiB
Go
package jwtutil
|
|
|
|
import (
|
|
"Yimaru-Backend/internal/domain"
|
|
"errors"
|
|
"fmt"
|
|
"time"
|
|
|
|
"github.com/golang-jwt/jwt/v5"
|
|
)
|
|
|
|
var (
|
|
ErrExpiredToken = errors.New("token expired")
|
|
ErrMalformedToken = errors.New("token malformed")
|
|
ErrTokenNotExpired = errors.New("token not expired")
|
|
ErrRefreshTokenNotFound = errors.New("refresh token not found")
|
|
)
|
|
|
|
type UserClaim struct {
|
|
jwt.RegisteredClaims
|
|
UserId int64
|
|
Role domain.Role
|
|
CompanyID domain.NullJwtInt64
|
|
}
|
|
|
|
type JwtConfig struct {
|
|
JwtAccessKey string
|
|
JwtAccessExpiry int
|
|
}
|
|
|
|
func CreateJwt(userId int64, Role domain.Role, key string, expiry int) (string, error) {
|
|
token := jwt.NewWithClaims(jwt.SigningMethodHS256, UserClaim{
|
|
RegisteredClaims: jwt.RegisteredClaims{
|
|
Issuer: "yimaru.com",
|
|
IssuedAt: jwt.NewNumericDate(time.Now()),
|
|
Audience: jwt.ClaimStrings{"api.yimaru.com"},
|
|
NotBefore: jwt.NewNumericDate(time.Now()),
|
|
ExpiresAt: jwt.NewNumericDate(time.Now().Add(time.Duration(expiry) * time.Second)),
|
|
},
|
|
UserId: userId,
|
|
Role: Role,
|
|
// CompanyID: domain.NullJwtInt64{
|
|
// Value: CompanyID.Value,
|
|
// Valid: CompanyID.Valid,
|
|
// },
|
|
})
|
|
jwtToken, err := token.SignedString([]byte(key))
|
|
return jwtToken, err
|
|
}
|
|
|
|
func ParseJwt(jwtToken string, key string) (*UserClaim, error) {
|
|
token, err := jwt.ParseWithClaims(jwtToken, &UserClaim{}, func(token *jwt.Token) (interface{}, error) {
|
|
return []byte(key), nil
|
|
})
|
|
if err != nil {
|
|
if errors.Is(err, jwt.ErrTokenExpired) {
|
|
return nil, ErrExpiredToken
|
|
}
|
|
if errors.Is(err, jwt.ErrTokenMalformed) {
|
|
fmt.Printf("error %v", err.Error())
|
|
return nil, ErrMalformedToken
|
|
}
|
|
return nil, err
|
|
}
|
|
if claims, ok := token.Claims.(*UserClaim); ok && token.Valid {
|
|
return claims, nil
|
|
}
|
|
return nil, errors.New("invalid token claims")
|
|
}
|