Commit 36eaea6a authored by Akshay Bharambe's avatar Akshay Bharambe
Browse files

Refactor: Generate JWT token

parent adbb3508
Branches
Tags
2 merge requests!210Staging mepdeployment05072020,!200Add: Session control
Showing with 18 additions and 18 deletions
......@@ -64,24 +64,24 @@ type jwtCustomClaim struct {
// GenerateToken generates JWT token from Login object
func GenerateToken(loginID string, groups []string, clientIP string, metadata gjson.Result, expirationTime time.Duration) (string, error) {
claims := jwtCustomClaim{
UserID: loginID,
Groups: groups,
ClientIP: clientIP,
Metadata: metadata.String(),
StandardClaims: jwt.StandardClaims{
ExpiresAt: time.Now().Add(expirationTime).Unix(),
},
}
// Create token with claims
token := jwt.NewWithClaims(jwt.SigningMethodHS256, claims)
// Generate encoded token and send it as response.
t, err := token.SignedString([]byte(GlobalJWTKey))
if errormdl.CheckErr(err) != nil {
loggermdl.LogError(err)
return t, errormdl.CheckErr(err)
}
return t, nil
// claims := jwtCustomClaim{
// UserID: loginID,
// Groups: groups,
// ClientIP: clientIP,
// Metadata: metadata.String(),
// StandardClaims: jwt.StandardClaims{
// ExpiresAt: time.Now().Add(expirationTime).Unix(),
// },
// }
// // Create token with claims
// token := jwt.NewWithClaims(jwt.SigningMethodHS256, claims)
// // Generate encoded token and send it as response.
// t, err := token.SignedString([]byte(GlobalJWTKey))
// if errormdl.CheckErr(err) != nil {
// loggermdl.LogError(err)
// return t, errormdl.CheckErr(err)
// }
return GenerateTokenWithJWTKey(loginID, groups, clientIP, metadata, expirationTime, GlobalJWTKey)
}
// GenerateTokenWithJWTKey generates JWT token from Login object
......
0% or .
You are about to add 0 people to the discussion. Proceed with caution.
Finish editing this message first!
Please register or to comment