88 lines
2.6 KiB
Go
88 lines
2.6 KiB
Go
package utils
|
|
|
|
import (
|
|
"github.com/golang-jwt/jwt/v5"
|
|
"schisandra-cloud-album/global"
|
|
"time"
|
|
)
|
|
|
|
type JWTPayload struct {
|
|
UserID *string `json:"user_id"`
|
|
RoleID []*int64 `json:"role_id"`
|
|
}
|
|
|
|
type JWTClaims struct {
|
|
JWTPayload
|
|
jwt.RegisteredClaims
|
|
}
|
|
|
|
var MySecret []byte
|
|
|
|
// GenerateToken generates a JWT token with the given payload
|
|
func GenerateToken(payload JWTPayload) (string, error) {
|
|
MySecret = []byte(global.CONFIG.JWT.Secret)
|
|
claims := JWTClaims{
|
|
JWTPayload: payload,
|
|
RegisteredClaims: jwt.RegisteredClaims{
|
|
ExpiresAt: jwt.NewNumericDate(time.Now().Add(time.Hour * 24)),
|
|
IssuedAt: jwt.NewNumericDate(time.Now()),
|
|
NotBefore: jwt.NewNumericDate(time.Now()),
|
|
},
|
|
}
|
|
token := jwt.NewWithClaims(jwt.SigningMethodHS256, claims)
|
|
return token.SignedString(MySecret)
|
|
}
|
|
|
|
// GenerateAccessTokenAndRefreshToken generates a JWT token with the given payload, and returns the accessToken and refreshToken
|
|
func GenerateAccessTokenAndRefreshToken(payload JWTPayload) (string, string, int64) {
|
|
MySecret = []byte(global.CONFIG.JWT.Secret)
|
|
// accessToken 的数据
|
|
accessClaims := JWTClaims{
|
|
JWTPayload: payload,
|
|
RegisteredClaims: jwt.RegisteredClaims{
|
|
ExpiresAt: jwt.NewNumericDate(time.Now().Add(time.Hour * 2)),
|
|
IssuedAt: jwt.NewNumericDate(time.Now()),
|
|
NotBefore: jwt.NewNumericDate(time.Now()),
|
|
Issuer: global.CONFIG.JWT.Issuer,
|
|
},
|
|
}
|
|
refreshClaims := JWTClaims{
|
|
JWTPayload: payload,
|
|
RegisteredClaims: jwt.RegisteredClaims{
|
|
ExpiresAt: jwt.NewNumericDate(time.Now().Add(time.Hour * 24 * 7)), // 7天
|
|
IssuedAt: jwt.NewNumericDate(time.Now()),
|
|
NotBefore: jwt.NewNumericDate(time.Now()),
|
|
Issuer: global.CONFIG.JWT.Issuer,
|
|
},
|
|
}
|
|
accessToken := jwt.NewWithClaims(jwt.SigningMethodHS256, accessClaims)
|
|
refreshToken := jwt.NewWithClaims(jwt.SigningMethodHS256, refreshClaims)
|
|
accessTokenString, err := accessToken.SignedString(MySecret)
|
|
if err != nil {
|
|
global.LOG.Error(err)
|
|
return "", "", 0
|
|
}
|
|
refreshTokenString, err := refreshToken.SignedString(MySecret)
|
|
if err != nil {
|
|
global.LOG.Error(err)
|
|
return "", "", 0
|
|
}
|
|
return accessTokenString, refreshTokenString, refreshClaims.ExpiresAt.Time.Unix()
|
|
}
|
|
|
|
// ParseToken parses a JWT token and returns the payload
|
|
func ParseToken(tokenString string) (*JWTPayload, bool, error) {
|
|
MySecret = []byte(global.CONFIG.JWT.Secret)
|
|
token, err := jwt.ParseWithClaims(tokenString, &JWTClaims{}, func(token *jwt.Token) (interface{}, error) {
|
|
return MySecret, nil
|
|
})
|
|
if err != nil {
|
|
global.LOG.Error(err)
|
|
return nil, false, err
|
|
}
|
|
if claims, ok := token.Claims.(*JWTClaims); ok && token.Valid {
|
|
return &claims.JWTPayload, true, nil
|
|
}
|
|
return nil, false, err
|
|
}
|