token.go 1.1 KB

123456789101112131415161718192021222324252627282930313233343536373839404142434445464748
  1. package main
  2. import (
  3. "time"
  4. "github.com/dgrijalva/jwt-go"
  5. )
  6. func generateTokenPair(user userInfo) (map[string]string, error) {
  7. // Create token
  8. token := jwt.New(jwt.SigningMethodHS256)
  9. // Set claims
  10. // This is the information which frontend can use
  11. // The backend can also decode the token and get admin etc.
  12. claims := token.Claims.(jwt.MapClaims)
  13. claims["admin"] = false
  14. for _, v := range user.Result.Result.MemberofGroup {
  15. if v == "admins" {
  16. claims["admin"] = true
  17. }
  18. }
  19. claims["sub"] = 1
  20. claims["name"] = user.Result.Value
  21. claims["exp"] = time.Now().Add(time.Minute * 15).Unix()
  22. // Generate encoded token and send it as response.
  23. // The signing string should be secret (a generated UUID works too)
  24. t, err := token.SignedString([]byte("secret"))
  25. if err != nil {
  26. return nil, err
  27. }
  28. refreshToken := jwt.New(jwt.SigningMethodHS256)
  29. rtClaims := refreshToken.Claims.(jwt.MapClaims)
  30. rtClaims["sub"] = 1
  31. rtClaims["exp"] = time.Now().Add(time.Hour * 24).Unix()
  32. rt, err := refreshToken.SignedString([]byte("secret"))
  33. if err != nil {
  34. return nil, err
  35. }
  36. return map[string]string{
  37. "access_token": t,
  38. "refresh_token": rt,
  39. }, nil
  40. }