// Copyright 2022 ROC. All rights reserved. // Use of this source code is governed by a MIT style // license that can be found in the LICENSE file. package app import ( "crypto/md5" "encoding/hex" "time" "github.com/golang-jwt/jwt/v5" "github.com/rocboss/paopao-ce/internal/conf" "github.com/rocboss/paopao-ce/internal/core/ms" ) type Claims struct { UID int64 `json:"uid"` Username string `json:"username"` jwt.RegisteredClaims } func GetJWTSecret() []byte { return []byte(conf.JWTSetting.Secret) } func GenerateToken(user *ms.User) (string, error) { expireTime := time.Now().Add(conf.JWTSetting.Expire) claims := Claims{ UID: user.ID, Username: user.Username, RegisteredClaims: jwt.RegisteredClaims{ ExpiresAt: jwt.NewNumericDate(expireTime), Issuer: IssuerFrom(user.Salt), }, } tokenClaims := jwt.NewWithClaims(jwt.SigningMethodHS256, claims) token, err := tokenClaims.SignedString(GetJWTSecret()) return token, err } func ParseToken(token string) (res *Claims, err error) { var tokenClaims *jwt.Token tokenClaims, err = jwt.ParseWithClaims(token, &Claims{}, func(_ *jwt.Token) (any, error) { return GetJWTSecret(), nil }) if err == nil && tokenClaims != nil && tokenClaims.Valid { res, _ = tokenClaims.Claims.(*Claims) } else { err = jwt.ErrTokenNotValidYet } return } func IssuerFrom(data string) string { contents := make([]byte, 0, len(conf.JWTSetting.Issuer)+len(data)) contents = append(append(contents, []byte(conf.JWTSetting.Issuer)...), []byte(data)...) res := md5.Sum(contents) return hex.EncodeToString(res[:]) }