Compare commits
No commits in common. "main" and "v0.1.0" have entirely different histories.
1 changed files with 10 additions and 95 deletions
105
pkg.go
105
pkg.go
|
@ -17,74 +17,19 @@ import (
|
|||
"github.com/golang-jwt/jwt/v5"
|
||||
|
||||
// Standard
|
||||
"crypto"
|
||||
"encoding/json"
|
||||
"encoding/hex"
|
||||
"fmt"
|
||||
"time"
|
||||
)
|
||||
|
||||
type KeyType int
|
||||
|
||||
const (
|
||||
KeyEd25519 KeyType = iota
|
||||
KeyEcDSA
|
||||
)
|
||||
|
||||
type Manager struct {
|
||||
KeyType KeyType
|
||||
privKey crypto.PrivateKey
|
||||
PubKey crypto.PublicKey
|
||||
secret []byte
|
||||
ExpireDays int
|
||||
Initialized bool
|
||||
}
|
||||
|
||||
type KeyError struct {
|
||||
Err error
|
||||
KeyType string // PUBLIC or PRIVATE
|
||||
}
|
||||
|
||||
func (kerr KeyError) Error() string {
|
||||
return fmt.Sprintf("%s [%s]", kerr.Err.Error(), kerr.KeyType)
|
||||
}
|
||||
|
||||
func NewManager(keyType KeyType, private, public string, expireDays int) (mngr Manager, err error) { // {{{
|
||||
var errPriv, errPub error
|
||||
mngr.KeyType = keyType
|
||||
|
||||
switch keyType {
|
||||
case KeyEcDSA:
|
||||
/*
|
||||
openssl ecparam -genkey -name secp521r1 -noout >priv.pem
|
||||
openssl pkey -in priv.pem -pubout >pub.pem
|
||||
*/
|
||||
mngr.privKey, errPriv = jwt.ParseECPrivateKeyFromPEM([]byte(private))
|
||||
mngr.PubKey, errPub = jwt.ParseECPublicKeyFromPEM([]byte(public))
|
||||
|
||||
case KeyEd25519:
|
||||
/*
|
||||
openssl genpkey -algorithm ed25519 -out /tmp/priv.pem
|
||||
openssl pkey -in priv.pem -pubout >pub.pem
|
||||
*/
|
||||
mngr.privKey, errPriv = jwt.ParseEdPrivateKeyFromPEM([]byte(private))
|
||||
mngr.PubKey, errPub = jwt.ParseEdPublicKeyFromPEM([]byte(public))
|
||||
}
|
||||
|
||||
if errPriv != nil {
|
||||
err = KeyError{
|
||||
errPriv,
|
||||
"PRIVATE",
|
||||
}
|
||||
return
|
||||
}
|
||||
|
||||
if errPub != nil {
|
||||
err = KeyError {
|
||||
errPub,
|
||||
"PUBLIC",
|
||||
}
|
||||
return
|
||||
}
|
||||
|
||||
func NewManager(secret string, expireDays int) (mngr Manager, err error) { // {{{
|
||||
mngr.secret, err = hex.DecodeString(secret)
|
||||
mngr.ExpireDays = expireDays
|
||||
mngr.Initialized = true
|
||||
return
|
||||
|
@ -108,32 +53,10 @@ func (mngr *Manager) GenerateToken(data map[string]any) (signedString string) {
|
|||
data["iat"] = now.Unix()
|
||||
data["exp"] = now.Add(time.Hour * 24 * time.Duration(mngr.ExpireDays)).Unix()
|
||||
|
||||
var token *jwt.Token
|
||||
switch mngr.KeyType {
|
||||
case KeyEd25519:
|
||||
token = jwt.NewWithClaims(&jwt.SigningMethodEd25519{}, jwt.MapClaims(data))
|
||||
case KeyEcDSA:
|
||||
token = jwt.NewWithClaims(jwt.SigningMethodES512, jwt.MapClaims(data))
|
||||
}
|
||||
token := jwt.NewWithClaims(jwt.SigningMethodHS256, jwt.MapClaims(data))
|
||||
|
||||
// Sign and get the complete encoded token as a string using the secret.
|
||||
var err error
|
||||
signedString, err = token.SignedString(mngr.privKey)
|
||||
if err != nil {
|
||||
j, _ := json.Marshal(struct {
|
||||
Time time.Time `json:"time"`
|
||||
Level string
|
||||
Msg string
|
||||
Error string
|
||||
}{
|
||||
time.Now(),
|
||||
"ERROR",
|
||||
"JWT",
|
||||
err.Error(),
|
||||
})
|
||||
fmt.Printf("%s\n", j)
|
||||
}
|
||||
|
||||
signedString, _ = token.SignedString(mngr.secret)
|
||||
return
|
||||
} // }}}
|
||||
func (mngr *Manager) ParseToken(tokenString string) (jwt.MapClaims, error) { // {{{
|
||||
|
@ -143,20 +66,12 @@ func (mngr *Manager) ParseToken(tokenString string) (jwt.MapClaims, error) { //
|
|||
// to the callback, providing flexibility.
|
||||
token, err := jwt.Parse(tokenString, func(token *jwt.Token) (any, error) {
|
||||
// Don't forget to validate the alg is what you expect:
|
||||
|
||||
switch mngr.KeyType {
|
||||
case KeyEd25519:
|
||||
if _, ok := token.Method.(*jwt.SigningMethodEd25519); !ok {
|
||||
return nil, fmt.Errorf("Unexpected signing method: %v", token.Header["alg"])
|
||||
}
|
||||
|
||||
case KeyEcDSA:
|
||||
if _, ok := token.Method.(*jwt.SigningMethodECDSA); !ok {
|
||||
return nil, fmt.Errorf("Unexpected signing method: %v", token.Header["alg"])
|
||||
}
|
||||
if _, ok := token.Method.(*jwt.SigningMethodHMAC); !ok {
|
||||
return nil, fmt.Errorf("Unexpected signing method: %v", token.Header["alg"])
|
||||
}
|
||||
|
||||
return mngr.PubKey, nil
|
||||
// hmacSampleSecret is a []byte containing your secret, e.g. []byte("my_secret_key")
|
||||
return mngr.secret, nil
|
||||
})
|
||||
if err != nil {
|
||||
return nil, err
|
||||
|
|
Loading…
Add table
Reference in a new issue