1
0
mirror of https://github.com/go-micro/go-micro.git synced 2024-12-12 08:23:58 +02:00
go-micro/plugins/auth/jwt/token/jwt.go

110 lines
2.2 KiB
Go
Raw Normal View History

2020-12-29 17:49:26 +02:00
package token
import (
"encoding/base64"
"time"
"github.com/dgrijalva/jwt-go"
2021-10-12 13:55:53 +02:00
"go-micro.dev/v4/auth"
)
// authClaims to be encoded in the JWT
type authClaims struct {
Type string `json:"type"`
Scopes []string `json:"scopes"`
Metadata map[string]string `json:"metadata"`
jwt.StandardClaims
}
// JWT implementation of token provider
type JWT struct {
2020-12-29 17:49:26 +02:00
opts Options
}
2020-12-29 17:49:26 +02:00
// New returns an initialized basic provider
func New(opts ...Option) Provider {
return &JWT{
2020-12-29 17:49:26 +02:00
opts: NewOptions(opts...),
}
}
// Generate a new JWT
2020-12-29 17:49:26 +02:00
func (j *JWT) Generate(acc *auth.Account, opts ...GenerateOption) (*Token, error) {
// decode the private key
priv, err := base64.StdEncoding.DecodeString(j.opts.PrivateKey)
if err != nil {
return nil, err
}
// parse the private key
key, err := jwt.ParseRSAPrivateKeyFromPEM(priv)
if err != nil {
2020-12-29 17:49:26 +02:00
return nil, ErrEncodingToken
}
// parse the options
2020-12-29 17:49:26 +02:00
options := NewGenerateOptions(opts...)
// generate the JWT
expiry := time.Now().Add(options.Expiry)
t := jwt.NewWithClaims(jwt.SigningMethodRS256, authClaims{
2020-05-21 17:41:55 +02:00
acc.Type, acc.Scopes, acc.Metadata, jwt.StandardClaims{
2020-04-01 15:25:00 +02:00
Subject: acc.ID,
2020-05-21 17:41:55 +02:00
Issuer: acc.Issuer,
ExpiresAt: expiry.Unix(),
},
})
tok, err := t.SignedString(key)
if err != nil {
return nil, err
}
// return the token
2020-12-29 17:49:26 +02:00
return &Token{
2020-04-01 15:25:00 +02:00
Token: tok,
Expiry: expiry,
Created: time.Now(),
}, nil
}
// Inspect a JWT
2020-04-01 15:25:00 +02:00
func (j *JWT) Inspect(t string) (*auth.Account, error) {
// decode the public key
pub, err := base64.StdEncoding.DecodeString(j.opts.PublicKey)
if err != nil {
return nil, err
}
// parse the public key
res, err := jwt.ParseWithClaims(t, &authClaims{}, func(token *jwt.Token) (interface{}, error) {
return jwt.ParseRSAPublicKeyFromPEM(pub)
})
if err != nil {
2020-12-29 17:49:26 +02:00
return nil, ErrInvalidToken
}
// validate the token
if !res.Valid {
2020-12-29 17:49:26 +02:00
return nil, ErrInvalidToken
}
claims, ok := res.Claims.(*authClaims)
if !ok {
2020-12-29 17:49:26 +02:00
return nil, ErrInvalidToken
}
// return the token
2020-04-01 15:25:00 +02:00
return &auth.Account{
ID: claims.Subject,
2020-05-21 17:41:55 +02:00
Issuer: claims.Issuer,
Type: claims.Type,
Scopes: claims.Scopes,
Metadata: claims.Metadata,
}, nil
}
// String returns JWT
func (j *JWT) String() string {
return "jwt"
}