141 lines
4.1 KiB
Go

package util
import (
"fmt"
"time"
"apskel-pos-be/internal/entities"
"github.com/golang-jwt/jwt/v5"
"github.com/google/uuid"
)
// GenerateCustomerTokens generates access and refresh tokens for customer
func GenerateCustomerTokens(customer *entities.Customer, secret string, tokenTTLMinutes int) (string, string, time.Time, error) {
now := time.Now()
expiresAt := now.Add(time.Duration(tokenTTLMinutes) * time.Minute)
// Create access token claims
accessClaims := jwt.MapClaims{
"customer_id": customer.ID.String(),
"phone_number": *customer.PhoneNumber,
"name": customer.Name,
"type": "access",
"iat": now.Unix(),
"exp": expiresAt.Unix(),
}
// Create refresh token claims (longer expiration)
refreshExpiresAt := now.Add(time.Duration(tokenTTLMinutes*7) * 24 * time.Hour) // 7 days
refreshClaims := jwt.MapClaims{
"customer_id": customer.ID.String(),
"phone_number": *customer.PhoneNumber,
"type": "refresh",
"iat": now.Unix(),
"exp": refreshExpiresAt.Unix(),
}
// Generate access token
accessToken := jwt.NewWithClaims(jwt.SigningMethodHS256, accessClaims)
accessTokenString, err := accessToken.SignedString([]byte(secret))
if err != nil {
return "", "", time.Time{}, fmt.Errorf("failed to generate access token: %w", err)
}
// Generate refresh token
refreshToken := jwt.NewWithClaims(jwt.SigningMethodHS256, refreshClaims)
refreshTokenString, err := refreshToken.SignedString([]byte(secret))
if err != nil {
return "", "", time.Time{}, fmt.Errorf("failed to generate refresh token: %w", err)
}
return accessTokenString, refreshTokenString, expiresAt, nil
}
// ValidateCustomerToken validates a customer JWT token
func ValidateCustomerToken(tokenString, secret string) (*jwt.Token, error) {
token, err := jwt.Parse(tokenString, func(token *jwt.Token) (interface{}, error) {
if _, ok := token.Method.(*jwt.SigningMethodHMAC); !ok {
return nil, fmt.Errorf("unexpected signing method: %v", token.Header["alg"])
}
return []byte(secret), nil
})
if err != nil {
return nil, fmt.Errorf("failed to parse token: %w", err)
}
if !token.Valid {
return nil, fmt.Errorf("invalid token")
}
return token, nil
}
// ExtractCustomerIDFromToken extracts customer ID from JWT token
func ExtractCustomerIDFromToken(token *jwt.Token) (string, error) {
claims, ok := token.Claims.(jwt.MapClaims)
if !ok {
return "", fmt.Errorf("invalid token claims")
}
customerID, ok := claims["customer_id"].(string)
if !ok {
return "", fmt.Errorf("customer_id not found in token")
}
return customerID, nil
}
func GenerateSelfOrderSessionToken(tableID uuid.UUID, customerName string, phone string, secret string, ttlMinutes int) (string, int64, error) {
now := time.Now()
expiresAt := now.Add(time.Duration(ttlMinutes) * time.Minute)
claims := jwt.MapClaims{
"table_id": tableID.String(),
"customer_name": customerName,
"phone": phone,
"session_id": uuid.New().String(),
"type": "self_order_access",
"iat": now.Unix(),
"exp": expiresAt.Unix(),
}
token := jwt.NewWithClaims(jwt.SigningMethodHS256, claims)
tokenString, err := token.SignedString([]byte(secret))
if err != nil {
return "", 0, fmt.Errorf("failed to generate self-order session token: %w", err)
}
return tokenString, expiresAt.Unix(), nil
}
func ValidateSelfOrderToken(tokenString string, secret string) (jwt.MapClaims, error) {
token, err := jwt.Parse(tokenString, func(token *jwt.Token) (interface{}, error) {
if _, ok := token.Method.(*jwt.SigningMethodHMAC); !ok {
return nil, fmt.Errorf("unexpected signing method: %v", token.Header["alg"])
}
return []byte(secret), nil
})
if err != nil {
return nil, fmt.Errorf("failed to parse self-order token: %w", err)
}
if !token.Valid {
return nil, fmt.Errorf("invalid self-order token")
}
claims, ok := token.Claims.(jwt.MapClaims)
if !ok {
return nil, fmt.Errorf("invalid self-order token claims")
}
tokenType, ok := claims["type"].(string)
if !ok || tokenType != "self_order_access" {
return nil, fmt.Errorf("invalid self-order token type")
}
return claims, nil
}