token.go 1.6 KB

12345678910111213141516171819202122232425262728293031323334353637383940414243444546474849505152535455565758
  1. package main
  2. import (
  3. "crypto/sha256"
  4. "time"
  5. "github.com/dgrijalva/jwt-go"
  6. )
  7. func generateTokenPair(user userInfo, cockieStr string) (map[string]string, error) {
  8. // Create token
  9. token := jwt.New(jwt.SigningMethodHS256)
  10. // Set claims
  11. // This is the information which frontend can use
  12. // The backend can also decode the token and get admin etc.
  13. claims := token.Claims.(jwt.MapClaims)
  14. claims["admin"] = false
  15. for _, v := range user.Result.Result.MemberofGroup {
  16. if v == "usermodifier" || v == "admins" {
  17. claims["admin"] = true
  18. }
  19. }
  20. claims["sub"] = 1
  21. claims["name"] = user.Result.Result.Givenname[0]
  22. sha256 := sha256.Sum256([]byte(user.Result.Result.Givenname[0]))
  23. var hashChannel = make(chan []byte, 1)
  24. hashChannel <- sha256[:]
  25. claims["IPAToken"] = encrypt(<-hashChannel, cockieStr)
  26. claims["memberof"] = user.Result.Result.MemberofGroup
  27. claims["mail"] = user.Result.Result.Mail
  28. claims["exp"] = time.Now().Add(time.Minute * 15).Unix()
  29. // Generate encoded token and send it as response.
  30. // The signing string should be secret (a generated UUID works too)
  31. t, err := token.SignedString([]byte("secret"))
  32. if err != nil {
  33. return nil, err
  34. }
  35. refreshToken := jwt.New(jwt.SigningMethodHS256)
  36. rtClaims := refreshToken.Claims.(jwt.MapClaims)
  37. rtClaims["sub"] = 1
  38. rtClaims["IPAToken"] = claims["IPAToken"]
  39. rtClaims["name"] = claims["name"]
  40. rtClaims["exp"] = time.Now().Add(time.Hour * 24).Unix()
  41. rt, err := refreshToken.SignedString([]byte("secret"))
  42. if err != nil {
  43. return nil, err
  44. }
  45. return map[string]string{
  46. "access_token": t,
  47. "refresh_token": rt,
  48. }, nil
  49. }