| package sendit |
|
|
| import ( |
| "crypto/rand" |
| "encoding/hex" |
| "time" |
|
|
| "github.com/golang-jwt/jwt/v5" |
| ) |
|
|
| |
| const ( |
| TokenIssuer = "sendit" |
| TokenAudienceAuth = "auth" |
| TokenAudienceConnect = "connect" |
| ) |
|
|
| |
| |
| func GenerateToken(secret []byte, aud, sub string) (string, error) { |
|
|
| tok := jwt.NewWithClaims(jwt.SigningMethodHS256, &jwt.RegisteredClaims{ |
| Issuer: TokenIssuer, |
| Audience: []string{aud}, |
| Subject: sub, |
| IssuedAt: jwt.NewNumericDate(time.Now()), |
| NotBefore: jwt.NewNumericDate(time.Now().Add(-15 * time.Minute)), |
| }) |
|
|
| return tok.SignedString(secret) |
| } |
|
|
| |
| |
| func TokenSubject(secret []byte, aud, token string) (string, error) { |
| tok, err := jwt.ParseWithClaims(token, &jwt.RegisteredClaims{}, func(tok *jwt.Token) (interface{}, error) { |
| if tok.Method.Alg() != jwt.SigningMethodHS256.Name { |
| return nil, jwt.ErrInvalidKeyType |
| } |
| return secret, nil |
| }, jwt.WithAudience(aud), jwt.WithIssuer(TokenIssuer), jwt.WithValidMethods([]string{"HS256"})) |
| if err != nil { |
| return "", err |
| } |
|
|
| return tok.Claims.(*jwt.RegisteredClaims).Subject, nil |
| } |
|
|
| func genID() (string, error) { |
| b := make([]byte, 32) |
| _, err := rand.Read(b) |
| if err != nil { |
| return "", err |
| } |
| return hex.EncodeToString(b), nil |
| } |
|
|
| |
| func ValidPath(p string) bool { |
| if len(p) < 3 { |
| return false |
| } |
| if len(p) > 64 { |
| return false |
| } |
| for _, r := range p { |
| if r == '-' { |
| continue |
| } |
| if r >= '0' && r <= '9' { |
| continue |
| } |
| if r >= 'a' && r <= 'z' { |
| continue |
| } |
| return false |
| } |
|
|
| return true |
| } |
|
|