66 "time"
77
88 errs "errors"
9+
910 "github.com/dgrijalva/jwt-go"
1011 "gopkg.in/oauth2.v3"
1112 "gopkg.in/oauth2.v3/errors"
@@ -14,14 +15,12 @@ import (
1415
1516// JWTAccessClaims jwt claims
1617type JWTAccessClaims struct {
17- ClientID string `json:"client_id,omitempty"`
18- UserID string `json:"user_id,omitempty"`
19- ExpiredAt int64 `json:"expired_at,omitempty"`
18+ jwt.StandardClaims
2019}
2120
2221// Valid claims verification
2322func (a * JWTAccessClaims ) Valid () error {
24- if time .Unix (a .ExpiredAt , 0 ).Before (time .Now ()) {
23+ if time .Unix (a .ExpiresAt , 0 ).Before (time .Now ()) {
2524 return errors .ErrInvalidAccessToken
2625 }
2726 return nil
@@ -44,9 +43,11 @@ type JWTAccessGenerate struct {
4443// Token based on the UUID generated token
4544func (a * JWTAccessGenerate ) Token (data * oauth2.GenerateBasic , isGenRefresh bool ) (access , refresh string , err error ) {
4645 claims := & JWTAccessClaims {
47- ClientID : data .Client .GetID (),
48- UserID : data .UserID ,
49- ExpiredAt : data .TokenInfo .GetAccessCreateAt ().Add (data .TokenInfo .GetAccessExpiresIn ()).Unix (),
46+ StandardClaims : jwt.StandardClaims {
47+ Audience : data .Client .GetID (),
48+ Subject : data .UserID ,
49+ ExpiresAt : data .TokenInfo .GetAccessCreateAt ().Add (data .TokenInfo .GetAccessExpiresIn ()).Unix (),
50+ },
5051 }
5152
5253 token := jwt .NewWithClaims (a .SignedMethod , claims )
0 commit comments