I have a /token
endpoint that is working with a password
grant. Because it's encoding a JWT
token, it has high latency of about 1 second. Is there a way to make signing the JWT faster?
I'm using Go with the github.com/dgrijalva/jwt-go
library.
package main
import (
"crypto/rsa"
"git.snappfood.ir/golang/framework/assert"
"io/ioutil"
"time"
"github.com/dgrijalva/jwt-go"
"github.com/sirupsen/logrus"
)
var (
private *rsa.PrivateKey
public *rsa.PublicKey
)
func main() {
var err error
var priv, pub []byte
pub, err = ioutil.ReadFile("public.pem")
if err!=nil{
panic(err)
}
priv, err = ioutil.ReadFile("private.pem")
if err!=nil{
panic(err)
}
public, err = jwt.ParseRSAPublicKeyFromPEM(pub)
if err!=nil{
panic(err)
}
private, err = jwt.ParseRSAPrivateKeyFromPEM(priv)
if err!=nil{
panic(err)
}
data := map[string]interface{}{
"jti": "dara",
"scopes": func() []string {
return []string{"sara", "dara"}
}(),
"aud": "aud",
"sub": "",
}
cl := jwt.MapClaims{}
for k, v := range data {
cl[k] = v
}
cl["iat"] = time.Now().Add(-6 * time.Hour).Unix()
cl["exp"] = time.Now().UTC().Add(1 * time.Hour).Unix()
t := jwt.NewWithClaims(jwt.GetSigningMethod("RS256"), cl)
t2 := time.Now()
tokenString, err := t.SignedString(private)
assert.Nil(err)
logrus.Warn(time.Since(t2))
logrus.Warn(tokenString)
}
rand.Reader
-- its (first) argument. In the case ofjwt-go
, this iscrypto/rand.Reader
. The implementation ofcrypto/rand.Reader
depends on your platform. It may be blocking for a long time because of low entropy on your system. Try measuring across platforms. – Vanadinitegithub.com/dgrijalva/jwt-go
is archived and no longer maintend. I would suggest switching to https://github.com/golang-jwt/jwt even though this might not affect your problem. – Cousins