seaweedfs/weed/security/jwt.go

67 lines
1.5 KiB
Go
Raw Normal View History

2015-02-07 23:35:28 +00:00
package security
import (
"fmt"
2015-02-07 23:35:28 +00:00
"net/http"
"strings"
"time"
2019-09-02 10:28:40 +00:00
"github.com/joeslay/seaweedfs/weed/glog"
2015-02-07 23:35:28 +00:00
jwt "github.com/dgrijalva/jwt-go"
)
type EncodedJwt string
type SigningKey []byte
type SeaweedFileIdClaims struct {
Fid string `json:"fid"`
jwt.StandardClaims
}
2015-02-07 23:35:28 +00:00
2019-05-04 15:42:25 +00:00
func GenJwt(signingKey SigningKey, expiresAfterSec int, fileId string) EncodedJwt {
if len(signingKey) == 0 {
2015-02-07 23:35:28 +00:00
return ""
}
claims := SeaweedFileIdClaims{
fileId,
2019-05-04 15:42:25 +00:00
jwt.StandardClaims{},
}
if expiresAfterSec > 0 {
claims.ExpiresAt = time.Now().Add(time.Second * time.Duration(expiresAfterSec)).Unix()
}
t := jwt.NewWithClaims(jwt.SigningMethodHS256, claims)
encoded, e := t.SignedString([]byte(signingKey))
2015-02-07 23:35:28 +00:00
if e != nil {
glog.V(0).Infof("Failed to sign claims %+v: %v", t.Claims, e)
2015-02-07 23:35:28 +00:00
return ""
}
return EncodedJwt(encoded)
}
func GetJwt(r *http.Request) EncodedJwt {
// Get token from query params
tokenStr := r.URL.Query().Get("jwt")
// Get token from authorization header
if tokenStr == "" {
bearer := r.Header.Get("Authorization")
if len(bearer) > 7 && strings.ToUpper(bearer[0:6]) == "BEARER" {
tokenStr = bearer[7:]
}
}
return EncodedJwt(tokenStr)
}
2019-02-10 05:56:32 +00:00
func DecodeJwt(signingKey SigningKey, tokenString EncodedJwt) (token *jwt.Token, err error) {
2015-02-07 23:35:28 +00:00
// check exp, nbf
2019-02-15 08:09:19 +00:00
return jwt.ParseWithClaims(string(tokenString), &SeaweedFileIdClaims{}, func(token *jwt.Token) (interface{}, error) {
if _, ok := token.Method.(*jwt.SigningMethodHMAC); !ok {
return nil, fmt.Errorf("unknown token method")
}
2019-02-15 08:09:19 +00:00
return []byte(signingKey), nil
2015-02-07 23:35:28 +00:00
})
}