You can not select more than 25 topics Topics must start with a letter or number, can include dashes ('-') and can be up to 35 characters long.

88 lines
2.3 KiB

package util
import (
"github.com/dgrijalva/jwt-go"
"time"
)
var jwtSecret = []byte("test")
// 用户唯一token信息类
type Claims struct {
ID uint `json:"id"`
UserName string `json:"user_name"`
Authority int `json:"authority"` //权限
jwt.StandardClaims
}
// token分发
func GenerateToken(id uint, userName string, authority int) (string, error) {
nowTime := time.Now()
endTime := nowTime.Add(24 * time.Hour)
claims := Claims{
ID: id,
UserName: userName,
Authority: authority,
StandardClaims: jwt.StandardClaims{
ExpiresAt: endTime.Unix(),
Issuer: "test-mall",
},
}
tokenClaims := jwt.NewWithClaims(jwt.SigningMethodHS256, claims) //哈希256加密
token, err := tokenClaims.SignedString(jwtSecret) //数字签名
return token, err
}
// token验证
func ParseToken(token string) (*Claims, error) {
tokenClaims, err := jwt.ParseWithClaims(token, &Claims{}, func(token *jwt.Token) (interface{}, error) {
return jwtSecret, nil
})
if tokenClaims != nil {
if claims, ok := tokenClaims.Claims.(*Claims); ok && tokenClaims.Valid {
return claims, nil
}
}
return nil, err
}
type EmailClaims struct {
UserID uint `json:"user_id"`
Email string `json:"email"`
Password string `json:"password"`
OperationType uint `json:"operation_type"`
jwt.StandardClaims
}
// 签发email token
func GenerateEmailToken(userId, Operation uint, email, password string) (string, error) {
nowTime := time.Now()
endTime := nowTime.Add(24 * time.Hour)
claims := EmailClaims{
UserID: userId,
Email: email,
Password: password,
OperationType: Operation,
StandardClaims: jwt.StandardClaims{
ExpiresAt: endTime.Unix(),
Issuer: "test-mall",
},
}
tokenClaims := jwt.NewWithClaims(jwt.SigningMethodHS256, claims) //哈希256加密
token, err := tokenClaims.SignedString(jwtSecret) //数字签名
return token, err
}
// 解密email token
func ParseEmailToken(token string) (*EmailClaims, error) {
tokenClaims, err := jwt.ParseWithClaims(token, &EmailClaims{}, func(token *jwt.Token) (interface{}, error) {
return jwtSecret, nil
})
if tokenClaims != nil {
if claims, ok := tokenClaims.Claims.(*EmailClaims); ok && tokenClaims.Valid {
return claims, nil
}
}
return nil, err
}