Skip to content
Snippets Groups Projects
Select Git revision
  • 99a358c775aab5acaa28baba7d275fa63c3396b4
  • main default protected
  • trading_hours
  • refactor_trading_hours
  • audit_cleaning_cater_for_non_struct_fields
  • remove-info-logs
  • sl-refactor
  • 18-use-scan-for-param-values
  • 17-order-search-results
  • 4-simplify-framework-2
  • 1-http-error
  • v1.297.0
  • v1.296.0
  • v1.295.0
  • v1.294.0
  • v1.293.0
  • v1.292.0
  • v1.291.0
  • v1.290.0
  • v1.289.0
  • v1.288.0
  • v1.287.0
  • v1.286.0
  • v1.285.0
  • v1.284.0
  • v1.283.0
  • v1.282.0
  • v1.281.0
  • v1.280.0
  • v1.279.0
  • v1.278.0
31 results

jwt.go

Blame
  • jwt.go 5.50 KiB
    package auth
    
    import (
    	"encoding/json"
    	"github.com/golang-jwt/jwt/v4"
    	"gitlab.bob.co.za/bob-public-utils/bobgroup-go-utils/date_utils"
    	"gitlab.bob.co.za/bob-public-utils/bobgroup-go-utils/errors"
    	"net/http"
    	"time"
    )
    
    type JsonWebToken struct {
    	UserID     string    `json:"user_id"`
    	ProviderID int64     `json:"provider_id,omitempty"`
    	ExpiryDate time.Time `json:"expiry_date"`
    }
    
    // GenerateJWTWithSessionToken first signs the session token with the secret key, then takes the payload and generates a
    // signed JWT using the resulting signed session token
    func GenerateJWTWithSessionToken(payload JsonWebToken, secretKey string, sessionToken string) (string, error) {
    	signedSessionToken := SignSessionTokenWithKey(secretKey, sessionToken)
    	return GenerateJWT(payload, signedSessionToken)
    }
    
    // GenerateJWT takes the payload and generates a signed JWT using the provided secret
    func GenerateJWT(payload JsonWebToken, secretKey string) (string, error) {
    	// Convert the JsonWebToken to a map[string]interface{}
    	tokenBytes, err := json.Marshal(payload)
    	if err != nil {
    		return "", err
    	}
    
    	tokenMap := make(map[string]interface{})
    	err = json.Unmarshal(tokenBytes, &tokenMap)
    	if err != nil {
    		return "", err
    	}
    
    	// Create the signed token
    	token := jwt.NewWithClaims(jwt.SigningMethodHS256, jwt.MapClaims(tokenMap))
    	tokenString, err := token.SignedString([]byte(secretKey))
    	if err != nil {
    		return "", err
    	}
    
    	return tokenString, nil
    }
    
    func getJsonWebTokenFromTokenClaims(token *jwt.Token, checkValidity bool) (JsonWebToken, error) {
    	if token == nil {
    		return JsonWebToken{}, errors.Error("could not get token from token string")
    	}
    
    	claims, ok := token.Claims.(jwt.MapClaims)
    	if !ok || (checkValidity && token.Valid == false) {
    		return JsonWebToken{}, errors.Error("invalid token")
    	}
    
    	// Convert the MapClaims to a JsonWebToken
    	claimsBytes, err := json.Marshal(claims)
    	if err != nil {
    		return JsonWebToken{}, err
    	}
    
    	var jsonWebToken JsonWebToken
    	err = json.Unmarshal(claimsBytes, &jsonWebToken)
    	if err != nil {
    		return JsonWebToken{}, err
    	}