✨ add mongodb/jwt
This commit is contained in:
51
common/jwt/access_token.go
Normal file
51
common/jwt/access_token.go
Normal file
@@ -0,0 +1,51 @@
|
||||
package jwt
|
||||
|
||||
import (
|
||||
"context"
|
||||
"time"
|
||||
|
||||
"github.com/golang-jwt/jwt/v5"
|
||||
"github.com/zeromicro/go-zero/core/logc"
|
||||
)
|
||||
|
||||
type AccessJWTPayload struct {
|
||||
UserID *string `json:"user_id"`
|
||||
Type *string `json:"type" default:"access"`
|
||||
}
|
||||
type AccessJWTClaims struct {
|
||||
AccessJWTPayload
|
||||
jwt.RegisteredClaims
|
||||
}
|
||||
|
||||
func GenerateAccessToken(secret string, payload AccessJWTPayload) string {
|
||||
claims := AccessJWTClaims{
|
||||
AccessJWTPayload: payload,
|
||||
RegisteredClaims: jwt.RegisteredClaims{
|
||||
ExpiresAt: jwt.NewNumericDate(time.Now().Add(time.Minute * 15)),
|
||||
IssuedAt: jwt.NewNumericDate(time.Now()),
|
||||
NotBefore: jwt.NewNumericDate(time.Now()),
|
||||
},
|
||||
}
|
||||
token := jwt.NewWithClaims(jwt.SigningMethodHS256, claims)
|
||||
accessToken, err := token.SignedString([]byte(secret))
|
||||
if err != nil {
|
||||
logc.Error(context.Background(), err)
|
||||
return ""
|
||||
}
|
||||
return accessToken
|
||||
}
|
||||
|
||||
// ParseAccessToken parses a JWT token and returns the payload
|
||||
func ParseAccessToken(secret string, tokenString string) *AccessJWTPayload {
|
||||
token, err := jwt.ParseWithClaims(tokenString, &AccessJWTClaims{}, func(token *jwt.Token) (interface{}, error) {
|
||||
return []byte(secret), nil
|
||||
})
|
||||
if err != nil {
|
||||
logc.Error(context.Background(), err)
|
||||
return nil
|
||||
}
|
||||
if claims, ok := token.Claims.(*AccessJWTClaims); ok && token.Valid {
|
||||
return &claims.AccessJWTPayload
|
||||
}
|
||||
return nil
|
||||
}
|
52
common/jwt/refresh_token.go
Normal file
52
common/jwt/refresh_token.go
Normal file
@@ -0,0 +1,52 @@
|
||||
package jwt
|
||||
|
||||
import (
|
||||
"context"
|
||||
"time"
|
||||
|
||||
"github.com/golang-jwt/jwt/v5"
|
||||
"github.com/zeromicro/go-zero/core/logc"
|
||||
)
|
||||
|
||||
type RefreshJWTPayload struct {
|
||||
UserID *string `json:"user_id"`
|
||||
Type *string `json:"type" default:"refresh"`
|
||||
}
|
||||
type RefreshJWTClaims struct {
|
||||
RefreshJWTPayload
|
||||
jwt.RegisteredClaims
|
||||
}
|
||||
|
||||
// GenerateRefreshToken generates a JWT token with the given payload, and returns the accessToken and refreshToken
|
||||
func GenerateRefreshToken(secret string, payload RefreshJWTPayload, days time.Duration) string {
|
||||
refreshClaims := RefreshJWTClaims{
|
||||
RefreshJWTPayload: payload,
|
||||
RegisteredClaims: jwt.RegisteredClaims{
|
||||
ExpiresAt: jwt.NewNumericDate(time.Now().Add(days)),
|
||||
IssuedAt: jwt.NewNumericDate(time.Now()),
|
||||
NotBefore: jwt.NewNumericDate(time.Now()),
|
||||
},
|
||||
}
|
||||
refreshToken := jwt.NewWithClaims(jwt.SigningMethodHS256, refreshClaims)
|
||||
refreshTokenString, err := refreshToken.SignedString([]byte(secret))
|
||||
if err != nil {
|
||||
logc.Error(context.Background(), err)
|
||||
return ""
|
||||
}
|
||||
return refreshTokenString
|
||||
}
|
||||
|
||||
// ParseRefreshToken parses a JWT token and returns the payload
|
||||
func ParseRefreshToken(secret string, refreshTokenString string) *RefreshJWTPayload {
|
||||
token, err := jwt.ParseWithClaims(refreshTokenString, &RefreshJWTClaims{}, func(token *jwt.Token) (interface{}, error) {
|
||||
return []byte(secret), nil
|
||||
})
|
||||
if err != nil {
|
||||
logc.Error(context.Background(), err)
|
||||
return nil
|
||||
}
|
||||
if claims, ok := token.Claims.(*RefreshJWTClaims); ok && token.Valid {
|
||||
return &claims.RefreshJWTPayload
|
||||
}
|
||||
return nil
|
||||
}
|
Reference in New Issue
Block a user