summaryrefslogtreecommitdiff
path: root/vendor/github.com/superseriousbusiness/oauth2/v4/generates/jwt_access.go
diff options
context:
space:
mode:
Diffstat (limited to 'vendor/github.com/superseriousbusiness/oauth2/v4/generates/jwt_access.go')
-rw-r--r--vendor/github.com/superseriousbusiness/oauth2/v4/generates/jwt_access.go104
1 files changed, 0 insertions, 104 deletions
diff --git a/vendor/github.com/superseriousbusiness/oauth2/v4/generates/jwt_access.go b/vendor/github.com/superseriousbusiness/oauth2/v4/generates/jwt_access.go
deleted file mode 100644
index 60d1b06b5..000000000
--- a/vendor/github.com/superseriousbusiness/oauth2/v4/generates/jwt_access.go
+++ /dev/null
@@ -1,104 +0,0 @@
-package generates
-
-import (
- "context"
- "encoding/base64"
- "strings"
- "time"
-
- "github.com/superseriousbusiness/oauth2/v4"
- "github.com/superseriousbusiness/oauth2/v4/errors"
- "github.com/golang-jwt/jwt"
- "github.com/google/uuid"
-)
-
-// JWTAccessClaims jwt claims
-type JWTAccessClaims struct {
- jwt.StandardClaims
-}
-
-// Valid claims verification
-func (a *JWTAccessClaims) Valid() error {
- if time.Unix(a.ExpiresAt, 0).Before(time.Now()) {
- return errors.ErrInvalidAccessToken
- }
- return nil
-}
-
-// NewJWTAccessGenerate create to generate the jwt access token instance
-func NewJWTAccessGenerate(kid string, key []byte, method jwt.SigningMethod) *JWTAccessGenerate {
- return &JWTAccessGenerate{
- SignedKeyID: kid,
- SignedKey: key,
- SignedMethod: method,
- }
-}
-
-// JWTAccessGenerate generate the jwt access token
-type JWTAccessGenerate struct {
- SignedKeyID string
- SignedKey []byte
- SignedMethod jwt.SigningMethod
-}
-
-// Token based on the UUID generated token
-func (a *JWTAccessGenerate) Token(ctx context.Context, data *oauth2.GenerateBasic, isGenRefresh bool) (string, string, error) {
- claims := &JWTAccessClaims{
- StandardClaims: jwt.StandardClaims{
- Audience: data.Client.GetID(),
- Subject: data.UserID,
- ExpiresAt: data.TokenInfo.GetAccessCreateAt().Add(data.TokenInfo.GetAccessExpiresIn()).Unix(),
- },
- }
-
- token := jwt.NewWithClaims(a.SignedMethod, claims)
- if a.SignedKeyID != "" {
- token.Header["kid"] = a.SignedKeyID
- }
- var key interface{}
- if a.isEs() {
- v, err := jwt.ParseECPrivateKeyFromPEM(a.SignedKey)
- if err != nil {
- return "", "", err
- }
- key = v
- } else if a.isRsOrPS() {
- v, err := jwt.ParseRSAPrivateKeyFromPEM(a.SignedKey)
- if err != nil {
- return "", "", err
- }
- key = v
- } else if a.isHs() {
- key = a.SignedKey
- } else {
- return "", "", errors.New("unsupported sign method")
- }
-
- access, err := token.SignedString(key)
- if err != nil {
- return "", "", err
- }
- refresh := ""
-
- if isGenRefresh {
- t := uuid.NewSHA1(uuid.Must(uuid.NewRandom()), []byte(access)).String()
- refresh = base64.URLEncoding.EncodeToString([]byte(t))
- refresh = strings.ToUpper(strings.TrimRight(refresh, "="))
- }
-
- return access, refresh, nil
-}
-
-func (a *JWTAccessGenerate) isEs() bool {
- return strings.HasPrefix(a.SignedMethod.Alg(), "ES")
-}
-
-func (a *JWTAccessGenerate) isRsOrPS() bool {
- isRs := strings.HasPrefix(a.SignedMethod.Alg(), "RS")
- isPs := strings.HasPrefix(a.SignedMethod.Alg(), "PS")
- return isRs || isPs
-}
-
-func (a *JWTAccessGenerate) isHs() bool {
- return strings.HasPrefix(a.SignedMethod.Alg(), "HS")
-}