func (s *SessionState) EncryptedString(c *cookie.Cipher) (string, error) { var err error if c == nil { panic("error. missing cipher") } a := s.AccessToken if a != "" { a, err = c.Encrypt(a) if err != nil { return "", err } } r := s.RefreshToken if r != "" { r, err = c.Encrypt(r) if err != nil { return "", err } } return fmt.Sprintf("%s|%s|%d|%s", s.userOrEmail(), a, s.ExpiresOn.Unix(), r), nil }
func DecodeSessionState(v string, c *cookie.Cipher) (s *SessionState, err error) { chunks := strings.Split(v, "|") if len(chunks) == 1 { if strings.Contains(chunks[0], "@") { u := strings.Split(v, "@")[0] return &SessionState{Email: v, User: u}, nil } return &SessionState{User: v}, nil } if len(chunks) != 4 { err = fmt.Errorf("invalid number of fields (got %d expected 4)", len(chunks)) return } s = &SessionState{} if c != nil && chunks[1] != "" { s.AccessToken, err = c.Decrypt(chunks[1]) if err != nil { return nil, err } } if c != nil && chunks[3] != "" { s.RefreshToken, err = c.Decrypt(chunks[3]) if err != nil { return nil, err } } if u := chunks[0]; strings.Contains(u, "@") { s.Email = u s.User = strings.Split(u, "@")[0] } else { s.User = u } ts, _ := strconv.Atoi(chunks[2]) s.ExpiresOn = time.Unix(int64(ts), 0) return }