Newer
Older
package models
import (
"fmt"
"net/http"
"time"
"corelab.mkcl.org/MKCLOS/coredevelopmentplatform/corepkgv2/loggermdl"
"github.com/gin-gonic/gin"
"github.com/golang-jwt/jwt/v5"
)
var (
// JWTKey - JWTKey for r and c
JWTKey = "gUkXp2s5v8y/B?E(H+MbQeThVmYq3t6w"
ConfigPath = "configs/database.json"
17
18
19
20
21
22
23
24
25
26
27
28
29
30
31
32
33
34
35
36
37
38
39
40
41
42
43
44
45
46
47
48
49
50
51
52
53
54
55
56
57
58
59
60
61
62
63
64
65
66
67
68
69
70
71
72
73
74
75
76
77
78
79
80
81
82
83
84
85
86
87
88
89
90
91
92
93
94
95
96
97
98
99
100
101
102
103
104
105
106
107
108
109
110
111
112
113
114
115
116
117
118
119
120
121
122
123
124
125
126
127
128
129
130
131
132
133
134
135
136
137
138
139
140
Host = "CoreStudio"
Database = "CoreStudio"
Collection = "gotemplate"
)
const (
// DefaultProjectPort -
DefaultPort = "3000"
PprofPort = "6060"
)
type User struct {
Id string `json:"id" bson:"id"`
UserName string `json:"userName" bson:"userName"`
Password string `json:"password" bson:"password"`
CreatedOn int64 `json:"createdOn" bson:"createdOn"`
CreatedBy string `json:"createdBy" bson:"createdBy"`
ModifiedOn int64 `json:"modifiedOn" bson:"modifiedOn"`
ModifiedBy string `json:"modifiedBy" bson:"modifiedBy"`
}
type Employee struct {
Name string `json:"name"`
Location string `json:"location"`
}
type ResponseData struct {
Result interface{} `json:"result"`
Error interface{} `json:"error"`
ResponseHeader interface{} `json:"reponseHeader"`
ErrorCode int `json:"errorCode"`
IsCompressed bool `json:"isCompressed"`
ServerTime time.Time `json:"serverTime"`
}
type jwtCustomClaims struct {
LoginId string `json:"loginId"`
Groups []string `json:"groups"`
ClientIP string `json:"clientIP"`
HitsCount int `json:"hitsCount"`
Token string `json:"token"`
Metadata string `json:"metadata"`
jwt.RegisteredClaims
}
func NewInstance(userName, password, createdBy, modifiedBy string, createdOn, modifiedOn int64) User {
return User{
UserName: userName,
Password: password,
CreatedOn: createdOn,
CreatedBy: createdBy,
ModifiedOn: modifiedOn,
ModifiedBy: modifiedBy,
}
}
// GetResponseData - to get the return obj
func GetResponseData(result interface{}, errorData interface{}, errorCode int) ResponseData {
return ResponseData{
Result: result,
Error: errorData,
ErrorCode: errorCode,
ServerTime: time.Now(),
}
}
func DecodeToken(tokenString string) error {
claims := jwt.MapClaims{}
token, err := jwt.ParseWithClaims(tokenString, claims, func(token *jwt.Token) (interface{}, error) {
return []byte(JWTKey), nil
})
if err != nil {
return err
}
loggermdl.LogError("token,", token)
for key, val := range claims {
fmt.Printf("Key: %v, value: %v\n", key, val)
}
return err
}
func GenerateTokenForLogin(c *gin.Context) {
var loginData jwtCustomClaims
err := c.Bind(&loginData)
if err != nil {
loggermdl.LogError("Error binding Json data")
}
loginId := loginData.LoginId
groups := loginData.Groups
clientIp := loginData.ClientIP
metadata := loginData.Metadata
expiresAt := time.Hour * 24
token, err := GenerateToken(loginId, groups, metadata, clientIp, expiresAt)
if err != nil {
c.JSON(http.StatusInternalServerError, gin.H{"error": "Failed to generate token"})
return
}
c.JSON(http.StatusOK, gin.H{"token": token})
}
func GenerateToken(loginId string, groups []string, metadata string, clientIP string, expiresAt time.Duration) (string, error) {
claims := jwtCustomClaims{
LoginId: loginId,
Groups: groups,
Metadata: metadata,
ClientIP: clientIP,
RegisteredClaims: jwt.RegisteredClaims{
ExpiresAt: jwt.NewNumericDate(time.Now().Add(expiresAt)),
}}
token := jwt.NewWithClaims(jwt.SigningMethodHS256, claims)
mySigningKey := []byte(JWTKey)
signedToken, err := token.SignedString([]byte(mySigningKey))
if err != nil {
return "Error signing token.", err
} else {
loggermdl.LogError("Signed Token", signedToken)
}
err = DecodeToken(signedToken)
if err != nil {
loggermdl.LogError("Error decoding")
} else {
loggermdl.LogError("Decode successful.")
}
return signedToken, nil
}