pye/jwt.go

107 lines
2.5 KiB
Go
Raw Normal View History

2024-10-11 23:57:57 +03:00
package main
import (
"crypto/rand"
2024-10-12 16:59:47 +03:00
"crypto/rsa"
2024-10-11 23:57:57 +03:00
"crypto/x509"
2024-10-12 09:55:58 +03:00
"encoding/pem"
"errors"
2024-10-11 23:57:57 +03:00
"log/slog"
2024-10-12 09:55:58 +03:00
"net/http"
"os"
2024-10-12 10:22:05 +03:00
"time"
2024-10-11 23:57:57 +03:00
2024-10-12 20:41:30 +03:00
"git.a71.su/Andrew71/pye/storage"
2024-10-12 09:55:58 +03:00
"github.com/golang-jwt/jwt/v5"
2024-10-11 23:57:57 +03:00
)
2024-10-12 09:55:58 +03:00
var (
2024-10-12 20:41:30 +03:00
KeyFile = "private.key"
key *rsa.PrivateKey
2024-10-12 09:55:58 +03:00
)
// LoadKey attempts to load a private key from KeyFile.
// If the file does not exist, it generates a new key (and saves it)
2024-10-12 20:41:30 +03:00
func MustLoadKey() {
2024-10-12 09:55:58 +03:00
// If the key doesn't exist, create it
if _, err := os.Stat(KeyFile); errors.Is(err, os.ErrNotExist) {
2024-10-12 16:59:47 +03:00
key, err = rsa.GenerateKey(rand.Reader, 4096)
2024-10-12 09:55:58 +03:00
if err != nil {
slog.Error("error generating key", "error", err)
os.Exit(1)
}
2024-10-12 16:59:47 +03:00
// Save key to disk
km := x509.MarshalPKCS1PrivateKey(key)
block := pem.Block{Bytes: km, Type: "RSA PRIVATE KEY"}
f, err := os.OpenFile(KeyFile, os.O_CREATE|os.O_WRONLY|os.O_TRUNC, 0644)
2024-10-12 09:55:58 +03:00
if err != nil {
2024-10-12 16:59:47 +03:00
slog.Error("error opening/creating file", "error", err)
os.Exit(1)
}
f.Write(pem.EncodeToMemory(&block))
if err := f.Close(); err != nil {
slog.Error("error closing file", "error", err)
2024-10-12 09:55:58 +03:00
os.Exit(1)
}
slog.Info("generated new key")
} else {
km, err := os.ReadFile(KeyFile)
if err != nil {
slog.Error("error reading key", "error", err)
os.Exit(1)
}
2024-10-12 16:59:47 +03:00
key, err = jwt.ParseRSAPrivateKeyFromPEM(km)
2024-10-12 09:55:58 +03:00
if err != nil {
slog.Error("error parsing key", "error", err)
os.Exit(1)
}
slog.Info("loaded private key")
}
}
2024-10-12 20:41:30 +03:00
func init() {
MustLoadKey()
}
2024-10-12 16:59:47 +03:00
// publicKey returns our public key as PEM block
2024-10-12 09:55:58 +03:00
func publicKey(w http.ResponseWriter, r *http.Request) {
2024-10-12 16:59:47 +03:00
key_marshalled := x509.MarshalPKCS1PublicKey(&key.PublicKey)
block := pem.Block{Bytes: key_marshalled, Type: "RSA PUBLIC KEY"}
2024-10-12 09:55:58 +03:00
pem.Encode(w, &block)
2024-10-11 23:57:57 +03:00
}
2024-10-12 20:41:30 +03:00
func CreateJWT(usr storage.User) (string, error) {
2024-10-12 16:59:47 +03:00
t := jwt.NewWithClaims(jwt.SigningMethodRS256,
2024-10-12 09:55:58 +03:00
jwt.MapClaims{
"iss": "pye",
2024-10-12 10:22:05 +03:00
"uid": usr.Uuid,
"sub": usr.Email,
2024-10-12 16:59:47 +03:00
"iat": time.Now().Unix(),
"exp": time.Now().Add(time.Hour * 24 * 7).Unix(),
2024-10-12 09:55:58 +03:00
})
s, err := t.SignedString(key)
if err != nil {
2024-10-12 16:59:47 +03:00
slog.Error("error creating JWT", "error", err)
2024-10-12 09:55:58 +03:00
return "", err
}
return s, nil
}
2024-10-12 16:59:47 +03:00
// VerifyToken receives a JWT and PEM-encoded public key,
// then returns whether the token is valid
func VerifyJWT(token string, publicKey []byte) bool {
_, err := jwt.Parse(token, func(token *jwt.Token) (interface{}, error) {
key, err := jwt.ParseRSAPublicKeyFromPEM(publicKey)
if err != nil {
return nil, err
}
if _, ok := token.Method.(*jwt.SigningMethodRSA); !ok {
return nil, err
}
return key, nil
})
slog.Info("Error check", "err", err)
return err == nil
}