DriveLinked/pkg/common/token.go

60 lines
1.3 KiB
Go
Raw Normal View History

2022-04-03 12:30:50 +08:00
package common
import (
"drive-linked/config"
"github.com/golang-jwt/jwt/v4"
2022-04-05 18:16:20 +08:00
"strings"
2022-04-03 12:30:50 +08:00
"time"
)
type JwtClaims struct {
Foo string `json:"foo"`
jwt.RegisteredClaims
}
//TODO:token解密验证
2022-04-05 18:16:20 +08:00
func ValidateLogin(authorization string) error {
// 取出Bearer后的内容
var tokenString string
if auths := strings.Split(authorization, " "); len(auths) > 1 {
tokenString = auths[1]
} else {
return jwt.ErrInvalidKey
}
token, err := jwt.Parse(tokenString, func(token *jwt.Token) (interface{}, error) {
return []byte(config.Cfg.Security.Jwt.Secret), nil
})
if token != nil && token.Valid {
return nil
}
return err
2022-04-03 12:30:50 +08:00
}
func NewToken(auds ...string) (string, error) {
if len(auds) == 0 {
2022-04-05 18:16:20 +08:00
auds = []string{"non-audience"}
}
2022-04-03 12:30:50 +08:00
// Create the claims
claims := JwtClaims{
"bar",
jwt.RegisteredClaims{
// A usual scenario is to set the expiration time relative to the current time
ExpiresAt: jwt.NewNumericDate(time.Now().Add(time.Duration(config.Cfg.Security.Jwt.Expire) * time.Second)),
IssuedAt: jwt.NewNumericDate(time.Now()),
NotBefore: jwt.NewNumericDate(time.Now()),
Issuer: "drivelinked",
Subject: "login",
Audience: auds,
2022-04-03 12:30:50 +08:00
},
}
token := jwt.NewWithClaims(jwt.SigningMethodHS256, claims)
ss, err := token.SignedString([]byte(config.Cfg.Security.Jwt.Secret))
2022-04-03 12:30:50 +08:00
if err != nil {
return "", err
}
return ss, nil
}