Building and returning JWTs on login
* Created Util package for assorted items * Currently generates an HMAC key on startup, to be changed * JWT also includes login role
This commit is contained in:
@@ -2,8 +2,11 @@ package models
|
||||
|
||||
import (
|
||||
"errors"
|
||||
"time"
|
||||
|
||||
"github.com/golang-jwt/jwt"
|
||||
"github.com/yxzzy-wtf/gin-gonic-prepack/database"
|
||||
"github.com/yxzzy-wtf/gin-gonic-prepack/util"
|
||||
)
|
||||
|
||||
type User struct {
|
||||
@@ -11,8 +14,27 @@ type User struct {
|
||||
Email string `gorm:"unique"`
|
||||
}
|
||||
|
||||
const userJwtDuration = time.Hour * 24
|
||||
|
||||
var userHmac = util.GenerateHmac()
|
||||
|
||||
func (u *User) GetJwt() (string, int) {
|
||||
return "", 0
|
||||
exp := time.Now().Add(userJwtDuration)
|
||||
j := jwt.NewWithClaims(jwt.SigningMethodHS256, jwt.MapClaims{
|
||||
"sub": u.Uid.String(),
|
||||
"iat": time.Now(),
|
||||
"exp": exp,
|
||||
"role": "user",
|
||||
"tid": u.Tenant.String(),
|
||||
})
|
||||
|
||||
jstr, err := j.SignedString(userHmac)
|
||||
if err != nil {
|
||||
// we should ALWAYS be able to build and sign a str
|
||||
panic(err)
|
||||
}
|
||||
|
||||
return jstr, int(userJwtDuration.Seconds())
|
||||
}
|
||||
|
||||
func (u *User) ByEmail(email string) error {
|
||||
|
||||
Reference in New Issue
Block a user