token.go 1.3 KB

1234567891011121314151617181920212223242526272829303132333435363738394041424344454647484950
  1. package main
  2. import (
  3. "time"
  4. "github.com/dgrijalva/jwt-go"
  5. )
  6. func generateTokenPair(user userInfo, cockieStr string) (map[string]string, error) {
  7. // Create token
  8. token := jwt.New(jwt.SigningMethodHS256)
  9. // Set claims
  10. // This is the information which frontend can use
  11. // The backend can also decode the token and get admin etc.
  12. claims := token.Claims.(jwt.MapClaims)
  13. claims["admin"] = false
  14. for _, v := range user.Result.Result.MemberofGroup {
  15. if v == "usermodifier" || v == "admins" {
  16. claims["admin"] = true
  17. }
  18. }
  19. claims["sub"] = 1
  20. claims["name"] = user.Result.Result.Displayname
  21. claims["IPAToken"] = cockieStr
  22. claims["memberof"] = user.Result.Result.MemberofGroup
  23. claims["exp"] = time.Now().Add(time.Minute * 15).Unix()
  24. // Generate encoded token and send it as response.
  25. // The signing string should be secret (a generated UUID works too)
  26. t, err := token.SignedString([]byte("secret"))
  27. if err != nil {
  28. return nil, err
  29. }
  30. refreshToken := jwt.New(jwt.SigningMethodHS256)
  31. rtClaims := refreshToken.Claims.(jwt.MapClaims)
  32. rtClaims["sub"] = 1
  33. rtClaims["exp"] = time.Now().Add(time.Hour * 24).Unix()
  34. //rt, err := refreshToken.SignedString([]byte("secret"))
  35. if err != nil {
  36. return nil, err
  37. }
  38. return map[string]string{
  39. "access_token": t,
  40. //"refresh_token": rt,
  41. }, nil
  42. }