aboutsummaryrefslogtreecommitdiff
path: root/go/security/jwt.go
diff options
context:
space:
mode:
authorChris Lu <chris.lu@gmail.com>2015-02-07 15:35:28 -0800
committerChris Lu <chris.lu@gmail.com>2015-02-07 15:35:28 -0800
commitf7998f86522ef04717e22bb094f00138bdf18748 (patch)
tree5d8454179564d52feae0ad78caa2648518f63eb8 /go/security/jwt.go
parent714ccb6e2b709355bed617947ccaa6ad4b68b77b (diff)
downloadseaweedfs-f7998f86522ef04717e22bb094f00138bdf18748.tar.xz
seaweedfs-f7998f86522ef04717e22bb094f00138bdf18748.zip
merge conflicts
Diffstat (limited to 'go/security/jwt.go')
-rw-r--r--go/security/jwt.go72
1 files changed, 72 insertions, 0 deletions
diff --git a/go/security/jwt.go b/go/security/jwt.go
new file mode 100644
index 000000000..fac91dd8e
--- /dev/null
+++ b/go/security/jwt.go
@@ -0,0 +1,72 @@
+package security
+
+import (
+ "net/http"
+ "strings"
+
+ "time"
+
+ "github.com/chrislusf/weed-fs/go/glog"
+ jwt "github.com/dgrijalva/jwt-go"
+)
+
+type EncodedJwt string
+type Secret string
+
+func GenJwt(secret Secret, fileId string) EncodedJwt {
+ if secret == "" {
+ return ""
+ }
+
+ t := jwt.New(jwt.GetSigningMethod("HS256"))
+ t.Claims["exp"] = time.Now().Unix() + 10
+ t.Claims["sub"] = fileId
+ encoded, e := t.SignedString(secret)
+ if e != nil {
+ glog.V(0).Infof("Failed to sign claims: %v", t.Claims)
+ return ""
+ }
+ return EncodedJwt(encoded)
+}
+
+func GetJwt(r *http.Request) EncodedJwt {
+
+ // Get token from query params
+ tokenStr := r.URL.Query().Get("jwt")
+
+ // Get token from authorization header
+ if tokenStr == "" {
+ bearer := r.Header.Get("Authorization")
+ if len(bearer) > 7 && strings.ToUpper(bearer[0:6]) == "BEARER" {
+ tokenStr = bearer[7:]
+ }
+ }
+
+ // Get token from cookie
+ if tokenStr == "" {
+ cookie, err := r.Cookie("jwt")
+ if err == nil {
+ tokenStr = cookie.Value
+ }
+ }
+
+ return EncodedJwt(tokenStr)
+}
+
+func EncodeJwt(secret Secret, claims map[string]interface{}) (EncodedJwt, error) {
+ if secret == "" {
+ return "", nil
+ }
+
+ t := jwt.New(jwt.GetSigningMethod("HS256"))
+ t.Claims = claims
+ encoded, e := t.SignedString(secret)
+ return EncodedJwt(encoded), e
+}
+
+func DecodeJwt(secret Secret, tokenString EncodedJwt) (token *jwt.Token, err error) {
+ // check exp, nbf
+ return jwt.Parse(string(tokenString), func(token *jwt.Token) (interface{}, error) {
+ return secret, nil
+ })
+}