Last active
September 20, 2020 07:02
-
-
Save charsyam/1310a46977ded441e532e4a5597d3074 to your computer and use it in GitHub Desktop.
This file contains bidirectional Unicode text that may be interpreted or compiled differently than what appears below. To review, open the file in an editor that reveals hidden Unicode characters.
Learn more about bidirectional Unicode characters
package main | |
import ( | |
"encoding/json" | |
"fmt" | |
"strings" | |
"errors" | |
"crypto/hmac" | |
"crypto/sha256" | |
b64 "encoding/base64" | |
) | |
type JWTHeader struct { | |
Type string `json:"typ"` | |
Algorithm string `json:"alg"` | |
} | |
type Claims struct { | |
UserId int `json:"user_id"` | |
} | |
func encodeHMACSHA256(data string, secret string) []byte { | |
h := hmac.New(sha256.New, []byte(secret)) | |
h.Write([]byte(data)) | |
sha := h.Sum(nil) | |
return sha | |
} | |
func ValidateJWTToken(token string, secret string) (bool, error) { | |
parts := strings.Split(token, ".") | |
if len(parts) != 3 { | |
return false, errors.New("Invalid JWT Token") | |
} | |
data := parts[0] + "." + parts[1] | |
r := encodeHMACSHA256(data, secret) | |
b64r := strings.Replace(b64.URLEncoding.EncodeToString(r), "=", "", -1) | |
if parts[2] != b64r { | |
return false, errors.New("signing is mismatched") | |
} | |
return true, nil | |
} | |
func CreateJWTToken(claims interface{}, secret string) string { | |
var h = JWTHeader{"JWT", "HS256"} | |
b, _ := json.Marshal(h) | |
b64b := strings.Replace(b64.URLEncoding.EncodeToString(b), "=", "", -1) | |
c, _ := json.Marshal(claims) | |
b64c := strings.Replace(b64.URLEncoding.EncodeToString(c), "=", "", -1) | |
data := b64b + "." + b64c | |
r := encodeHMACSHA256(data, secret) | |
b64r := strings.Replace(b64.URLEncoding.EncodeToString(r), "=", "", -1) | |
return data + "." + b64r | |
} | |
func main() { | |
var claims = Claims{1} | |
d := CreateJWTToken(claims, "123456") | |
fmt.Println(d) | |
nd := d + "123" | |
ok, err := ValidateJWTToken(d, "123456") | |
if ok == true { | |
fmt.Println("Valid JWT Token") | |
} else { | |
fmt.Println(err) | |
} | |
ok2, err := ValidateJWTToken(nd, "123456") | |
if ok2 == true { | |
fmt.Println("Valid JWT Token") | |
} else { | |
fmt.Println(err) | |
} | |
} |
Sign up for free
to join this conversation on GitHub.
Already have an account?
Sign in to comment