token.go 1.6 KB

1234567891011121314151617181920212223242526272829303132333435363738394041424344454647484950515253545556575859
  1. package main
  2. import (
  3. "crypto/sha256"
  4. "time"
  5. "github.com/dgrijalva/jwt-go"
  6. )
  7. func generateTokenPair(user userInfo, cockieStr string) (map[string]string, error) {
  8. // Create token
  9. token := jwt.New(jwt.SigningMethodHS256)
  10. // Set claims
  11. // This is the information which frontend can use
  12. // The backend can also decode the token and get admin etc.
  13. claims := token.Claims.(jwt.MapClaims)
  14. claims["admin"] = false
  15. for _, v := range user.Result.Result.MemberofGroup {
  16. if v == "usermodifier" || v == "admins" {
  17. claims["admin"] = true
  18. }
  19. }
  20. claims["sub"] = 1
  21. claims["name"] = user.Result.Result.Givenname[0]
  22. claims["IPAUid"] = user.Result.Result.Uidnumber[0]
  23. sha256 := sha256.Sum256([]byte(user.Result.Result.Givenname[0]))
  24. var hashChannel = make(chan []byte, 1)
  25. hashChannel <- sha256[:]
  26. claims["IPAToken"] = encrypt(<-hashChannel, cockieStr)
  27. claims["memberof"] = user.Result.Result.MemberofGroup
  28. claims["mail"] = user.Result.Result.Mail
  29. claims["exp"] = time.Now().Add(time.Minute * 15).Unix()
  30. // Generate encoded token and send it as response.
  31. // The signing string should be secret (a generated UUID works too)
  32. t, err := token.SignedString([]byte("secret"))
  33. if err != nil {
  34. return nil, err
  35. }
  36. refreshToken := jwt.New(jwt.SigningMethodHS256)
  37. rtClaims := refreshToken.Claims.(jwt.MapClaims)
  38. rtClaims["sub"] = 1
  39. rtClaims["IPAToken"] = claims["IPAToken"]
  40. rtClaims["name"] = claims["name"]
  41. rtClaims["exp"] = time.Now().Add(time.Hour * 24).Unix()
  42. rt, err := refreshToken.SignedString([]byte("secret"))
  43. if err != nil {
  44. return nil, err
  45. }
  46. return map[string]string{
  47. "access_token": t,
  48. "refresh_token": rt,
  49. }, nil
  50. }