1 2 3 4 5 6 7 8 9 10 11 12 13 14 15 16 17 18 19 20 21 22 23 24 25 26 27 28 29 30 31 32 33 34 35 36 37 38 39 40 41 42 43 44 45 46 47 48 49 50 51 52 53 54 55 56 57 58 59 60 61 62 63
| package utils
import ( "commander-server-t260220/internal/types" "errors" "time"
"github.com/golang-jwt/jwt/v5" )
type CustomClaims struct { UserID uint `json:"user_id"` jwt.RegisteredClaims }
type JwtUtils struct { secret []byte }
func NewJwtUtils(config *types.ServerConfig) *JwtUtils { return &JwtUtils{secret: []byte(config.Server.JwtSecret)} }
func (j *JwtUtils) GenerateToken(userID uint) (string, error) { claims := CustomClaims{ UserID: userID, RegisteredClaims: jwt.RegisteredClaims{ ExpiresAt: jwt.NewNumericDate(time.Now().Add(24 * time.Hour)), IssuedAt: jwt.NewNumericDate(time.Now()), NotBefore: jwt.NewNumericDate(time.Now()), }, }
token := jwt.NewWithClaims(jwt.SigningMethodHS256, claims) return token.SignedString(j.secret) }
func (j *JwtUtils) ParseToken(tokenString string) (uint, error) { token, err := jwt.ParseWithClaims(tokenString, &CustomClaims{}, func(t *jwt.Token) (interface{}, error) { if _, ok := t.Method.(*jwt.SigningMethodHMAC); !ok { return nil, errors.New("unexpected signing method") } return j.secret, nil })
if err != nil { return 0, err }
if claims, ok := token.Claims.(*CustomClaims); ok && token.Valid { return claims.UserID, nil }
return 0, errors.New("invalid token") }
|