|
package sendit |
|
|
|
import ( |
|
"crypto/rand" |
|
"encoding/hex" |
|
"time" |
|
|
|
"github.com/golang-jwt/jwt/v5" |
|
) |
|
|
|
|
|
const ( |
|
TokenIssuer = "sendit" |
|
TokenAudienceAuth = "auth" |
|
TokenAudienceConnect = "connect" |
|
) |
|
|
|
|
|
|
|
func GenerateToken(secret []byte, aud, sub string) (string, error) { |
|
|
|
tok := jwt.NewWithClaims(jwt.SigningMethodHS256, &jwt.RegisteredClaims{ |
|
Issuer: TokenIssuer, |
|
Audience: []string{aud}, |
|
Subject: sub, |
|
IssuedAt: jwt.NewNumericDate(time.Now()), |
|
NotBefore: jwt.NewNumericDate(time.Now().Add(-15 * time.Minute)), |
|
}) |
|
|
|
return tok.SignedString(secret) |
|
} |
|
|
|
|
|
|
|
func TokenSubject(secret []byte, aud, token string) (string, error) { |
|
tok, err := jwt.ParseWithClaims(token, &jwt.RegisteredClaims{}, func(tok *jwt.Token) (interface{}, error) { |
|
if tok.Method.Alg() != jwt.SigningMethodHS256.Name { |
|
return nil, jwt.ErrInvalidKeyType |
|
} |
|
return secret, nil |
|
}, jwt.WithAudience(aud), jwt.WithIssuer(TokenIssuer), jwt.WithValidMethods([]string{"HS256"})) |
|
if err != nil { |
|
return "", err |
|
} |
|
|
|
return tok.Claims.(*jwt.RegisteredClaims).Subject, nil |
|
} |
|
|
|
func genID() (string, error) { |
|
b := make([]byte, 32) |
|
_, err := rand.Read(b) |
|
if err != nil { |
|
return "", err |
|
} |
|
return hex.EncodeToString(b), nil |
|
} |
|
|
|
|
|
func ValidPath(p string) bool { |
|
if len(p) < 3 { |
|
return false |
|
} |
|
if len(p) > 64 { |
|
return false |
|
} |
|
for _, r := range p { |
|
if r == '-' { |
|
continue |
|
} |
|
if r >= '0' && r <= '9' { |
|
continue |
|
} |
|
if r >= 'a' && r <= 'z' { |
|
continue |
|
} |
|
return false |
|
} |
|
|
|
return true |
|
} |
|
|