From a6737e7f233c43c8222faabca991d8c666837c05 Mon Sep 17 00:00:00 2001 From: Vidhu Kant Sharma Date: Sun, 4 Dec 2022 18:04:57 +0530 Subject: added (untested) auth mechanism --- auth/jwt.go | 73 +++++++++++++++++++++++++++++++++++++++++++++++++++++++++++++ 1 file changed, 73 insertions(+) create mode 100644 auth/jwt.go (limited to 'auth/jwt.go') diff --git a/auth/jwt.go b/auth/jwt.go new file mode 100644 index 0000000..2d2ea8e --- /dev/null +++ b/auth/jwt.go @@ -0,0 +1,73 @@ +/* OpenBills-server - Server for libre billing software OpenBills-web + * Copyright (C) 2022 Vidhu Kant Sharma + + * This program is free software: you can redistribute it and/or modify + * it under the terms of the GNU General Public License as published by + * the Free Software Foundation, either version 3 of the License, or + * (at your option) any later version. + + * This program is distributed in the hope that it will be useful, + * but WITHOUT ANY WARRANTY; without even the implied warranty of + * MERCHANTABILITY or FITNESS FOR A PARTICULAR PURPOSE. See the + * GNU General Public License for more details. + + * You should have received a copy of the GNU General Public License + * along with this program. If not, see . + */ + +package auth + +import ( + "github.com/golang-jwt/jwt/v4" + "github.com/MikunoNaka/OpenBills-server/util" + "time" +) + +var accessSecret []byte +var refreshSecret []byte +func init() { + conf := util.GetConfig().Crypto + accessSecret = []byte(conf.AccessTokenSecret) + refreshSecret = []byte(conf.RefreshTokenSecret) +} + +func newAccessToken(userId string) (string, error) { + claims := jwt.NewWithClaims(jwt.SigningMethodHS256, jwt.StandardClaims { + Issuer: userId, + ExpiresAt: time.Now().Add(time.Second * 15).Unix(), + }) + + token, err := claims.SignedString(accessSecret) + if err != nil { + return "", err + } + + return token, nil +} + +/* + * the refresh token has a long lifespan and is stored in + * the database in case it needs to be revoked. + * + * this can be stored as an HTTP only cookie and will be used + * when creating a new access token + * + * I'm using a different secret key for refresh tokens + * for enhanced security + */ +func newRefreshToken(userId string) (string, int64, error) { + // TODO: store in DB + expiresAt := time.Now().Add(time.Hour * 12).Unix() + + claims := jwt.NewWithClaims(jwt.SigningMethodHS256, jwt.StandardClaims { + Issuer: userId, + ExpiresAt: expiresAt, + }) + + token, err := claims.SignedString(refreshSecret) + if err != nil { + return "", expiresAt, err + } + + return token, expiresAt, nil +} -- cgit v1.2.3