mirror of
https://github.com/seaweedfs/seaweedfs.git
synced 2024-11-25 11:39:12 +08:00
75 lines
1.5 KiB
Go
75 lines
1.5 KiB
Go
package security
|
|
|
|
import (
|
|
"net/http"
|
|
"strings"
|
|
|
|
"time"
|
|
|
|
"github.com/chrislusf/seaweedfs/weed/glog"
|
|
jwt "github.com/dgrijalva/jwt-go"
|
|
)
|
|
|
|
type EncodedJwt string
|
|
type Secret string
|
|
|
|
func GenJwt(secret Secret, fileId string) EncodedJwt {
|
|
if secret == "" {
|
|
return ""
|
|
}
|
|
|
|
t := jwt.New(jwt.GetSigningMethod("HS256"))
|
|
t.Claims = &jwt.StandardClaims{
|
|
ExpiresAt: time.Now().Add(time.Second * 10).Unix(),
|
|
Subject: fileId,
|
|
}
|
|
encoded, e := t.SignedString(secret)
|
|
if e != nil {
|
|
glog.V(0).Infof("Failed to sign claims: %v", t.Claims)
|
|
return ""
|
|
}
|
|
return EncodedJwt(encoded)
|
|
}
|
|
|
|
func GetJwt(r *http.Request) EncodedJwt {
|
|
|
|
// Get token from query params
|
|
tokenStr := r.URL.Query().Get("jwt")
|
|
|
|
// Get token from authorization header
|
|
if tokenStr == "" {
|
|
bearer := r.Header.Get("Authorization")
|
|
if len(bearer) > 7 && strings.ToUpper(bearer[0:6]) == "BEARER" {
|
|
tokenStr = bearer[7:]
|
|
}
|
|
}
|
|
|
|
// Get token from cookie
|
|
if tokenStr == "" {
|
|
cookie, err := r.Cookie("jwt")
|
|
if err == nil {
|
|
tokenStr = cookie.Value
|
|
}
|
|
}
|
|
|
|
return EncodedJwt(tokenStr)
|
|
}
|
|
|
|
func EncodeJwt(secret Secret, claims *jwt.StandardClaims) (EncodedJwt, error) {
|
|
if secret == "" {
|
|
return "", nil
|
|
}
|
|
|
|
t := jwt.New(jwt.GetSigningMethod("HS256"))
|
|
t.Claims = claims
|
|
encoded, e := t.SignedString(secret)
|
|
return EncodedJwt(encoded), e
|
|
}
|
|
|
|
func DecodeJwt(secret Secret, tokenString EncodedJwt) (token *jwt.Token, err error) {
|
|
// check exp, nbf
|
|
return jwt.Parse(string(tokenString), func(token *jwt.Token) (interface{}, error) {
|
|
return secret, nil
|
|
})
|
|
}
|