diff options
Diffstat (limited to 'vendor/github.com/superseriousbusiness/oauth2/v4/generates/jwt_access.go')
-rw-r--r-- | vendor/github.com/superseriousbusiness/oauth2/v4/generates/jwt_access.go | 104 |
1 files changed, 104 insertions, 0 deletions
diff --git a/vendor/github.com/superseriousbusiness/oauth2/v4/generates/jwt_access.go b/vendor/github.com/superseriousbusiness/oauth2/v4/generates/jwt_access.go new file mode 100644 index 000000000..3eb03f1cf --- /dev/null +++ b/vendor/github.com/superseriousbusiness/oauth2/v4/generates/jwt_access.go @@ -0,0 +1,104 @@ +package generates + +import ( + "context" + "encoding/base64" + "strings" + "time" + + "github.com/dgrijalva/jwt-go" + "github.com/google/uuid" + "github.com/superseriousbusiness/oauth2/v4" + "github.com/superseriousbusiness/oauth2/v4/errors" +) + +// JWTAccessClaims jwt claims +type JWTAccessClaims struct { + jwt.StandardClaims +} + +// Valid claims verification +func (a *JWTAccessClaims) Valid() error { + if time.Unix(a.ExpiresAt, 0).Before(time.Now()) { + return errors.ErrInvalidAccessToken + } + return nil +} + +// NewJWTAccessGenerate create to generate the jwt access token instance +func NewJWTAccessGenerate(kid string, key []byte, method jwt.SigningMethod) *JWTAccessGenerate { + return &JWTAccessGenerate{ + SignedKeyID: kid, + SignedKey: key, + SignedMethod: method, + } +} + +// JWTAccessGenerate generate the jwt access token +type JWTAccessGenerate struct { + SignedKeyID string + SignedKey []byte + SignedMethod jwt.SigningMethod +} + +// Token based on the UUID generated token +func (a *JWTAccessGenerate) Token(ctx context.Context, data *oauth2.GenerateBasic, isGenRefresh bool) (string, string, error) { + claims := &JWTAccessClaims{ + StandardClaims: jwt.StandardClaims{ + Audience: data.Client.GetID(), + Subject: data.UserID, + ExpiresAt: data.TokenInfo.GetAccessCreateAt().Add(data.TokenInfo.GetAccessExpiresIn()).Unix(), + }, + } + + token := jwt.NewWithClaims(a.SignedMethod, claims) + if a.SignedKeyID != "" { + token.Header["kid"] = a.SignedKeyID + } + var key interface{} + if a.isEs() { + v, err := jwt.ParseECPrivateKeyFromPEM(a.SignedKey) + if err != nil { + return "", "", err + } + key = v + } else if a.isRsOrPS() { + v, err := jwt.ParseRSAPrivateKeyFromPEM(a.SignedKey) + if err != nil { + return "", "", err + } + key = v + } else if a.isHs() { + key = a.SignedKey + } else { + return "", "", errors.New("unsupported sign method") + } + + access, err := token.SignedString(key) + if err != nil { + return "", "", err + } + refresh := "" + + if isGenRefresh { + t := uuid.NewSHA1(uuid.Must(uuid.NewRandom()), []byte(access)).String() + refresh = base64.URLEncoding.EncodeToString([]byte(t)) + refresh = strings.ToUpper(strings.TrimRight(refresh, "=")) + } + + return access, refresh, nil +} + +func (a *JWTAccessGenerate) isEs() bool { + return strings.HasPrefix(a.SignedMethod.Alg(), "ES") +} + +func (a *JWTAccessGenerate) isRsOrPS() bool { + isRs := strings.HasPrefix(a.SignedMethod.Alg(), "RS") + isPs := strings.HasPrefix(a.SignedMethod.Alg(), "PS") + return isRs || isPs +} + +func (a *JWTAccessGenerate) isHs() bool { + return strings.HasPrefix(a.SignedMethod.Alg(), "HS") +} |