Files
monibuca/pkg/auth/auth.go
2024-12-25 17:34:07 +08:00

58 lines
1.5 KiB
Go

package auth
import (
"errors"
"fmt"
"time"
"github.com/golang-jwt/jwt/v5"
)
var (
jwtSecret = []byte("m7s_secret_key") // In production, this should be properly configured
tokenTTL = 24 * time.Hour
)
// JWTClaims represents the JWT claims
type JWTClaims struct {
Username string `json:"username"`
}
// TokenValidator is an interface for token validation
type TokenValidator interface {
ValidateToken(tokenString string) (*JWTClaims, error)
}
// GenerateToken generates a new JWT token for a user
func GenerateToken(username string) (string, error) {
claims := jwt.RegisteredClaims{
Subject: username,
ExpiresAt: jwt.NewNumericDate(time.Now().Add(tokenTTL)),
IssuedAt: jwt.NewNumericDate(time.Now()),
NotBefore: jwt.NewNumericDate(time.Now()),
}
token := jwt.NewWithClaims(jwt.SigningMethodHS256, claims)
return token.SignedString(jwtSecret)
}
// ValidateJWT validates a JWT token and returns the claims
func ValidateJWT(tokenString string) (*JWTClaims, error) {
token, err := jwt.ParseWithClaims(tokenString, &jwt.RegisteredClaims{}, func(token *jwt.Token) (interface{}, error) {
if _, ok := token.Method.(*jwt.SigningMethodHMAC); !ok {
return nil, fmt.Errorf("unexpected signing method: %v", token.Header["alg"])
}
return jwtSecret, nil
})
if err != nil {
return nil, err
}
if claims, ok := token.Claims.(*jwt.RegisteredClaims); ok && token.Valid {
return &JWTClaims{Username: claims.Subject}, nil
}
return nil, errors.New("invalid token")
}