Files
monibuca/pkg/auth/auth.go

87 lines
2.4 KiB
Go

package auth
import (
"errors"
"fmt"
"time"
"github.com/golang-jwt/jwt/v5"
)
var (
jwtSecret = []byte("m7s_secret_key") // In production, this should be properly configured
tokenTTL = 24 * time.Hour
// Add refresh threshold - refresh token if it expires in less than 30 minutes
refreshThreshold = 30 * time.Minute
)
// JWTClaims represents the JWT claims
type JWTClaims struct {
Username string `json:"username"`
}
// TokenValidator is an interface for token validation
type TokenValidator interface {
ValidateToken(tokenString string) (*JWTClaims, error)
}
// GenerateToken generates a new JWT token for a user
func GenerateToken(username string) (string, error) {
claims := jwt.RegisteredClaims{
Subject: username,
ExpiresAt: jwt.NewNumericDate(time.Now().Add(tokenTTL)),
IssuedAt: jwt.NewNumericDate(time.Now()),
NotBefore: jwt.NewNumericDate(time.Now()),
}
token := jwt.NewWithClaims(jwt.SigningMethodHS256, claims)
return token.SignedString(jwtSecret)
}
// ValidateJWT validates a JWT token and returns the claims
func ValidateJWT(tokenString string) (*JWTClaims, error) {
token, err := jwt.ParseWithClaims(tokenString, &jwt.RegisteredClaims{}, func(token *jwt.Token) (interface{}, error) {
if _, ok := token.Method.(*jwt.SigningMethodHMAC); !ok {
return nil, fmt.Errorf("unexpected signing method: %v", token.Header["alg"])
}
return jwtSecret, nil
})
if err != nil {
return nil, err
}
if claims, ok := token.Claims.(*jwt.RegisteredClaims); ok && token.Valid {
return &JWTClaims{Username: claims.Subject}, nil
}
return nil, errors.New("invalid token")
}
// ShouldRefreshToken checks if a token should be refreshed based on its expiration time
func ShouldRefreshToken(tokenString string) (bool, error) {
token, err := jwt.ParseWithClaims(tokenString, &jwt.RegisteredClaims{}, func(token *jwt.Token) (interface{}, error) {
return jwtSecret, nil
})
if err != nil {
return false, err
}
if claims, ok := token.Claims.(*jwt.RegisteredClaims); ok && token.Valid {
if claims.ExpiresAt != nil {
timeUntilExpiry := time.Until(claims.ExpiresAt.Time)
return timeUntilExpiry < refreshThreshold, nil
}
}
return false, errors.New("invalid token")
}
// RefreshToken validates the old token and generates a new one if it's still valid
func RefreshToken(oldToken string) (string, error) {
claims, err := ValidateJWT(oldToken)
if err != nil {
return "", err
}
return GenerateToken(claims.Username)
}