jwt.go 1.3 KB

1234567891011121314151617181920212223242526272829303132333435363738394041424344454647484950515253545556575859606162
  1. package jwt
  2. import (
  3. "crypto/rsa"
  4. "github.com/golang-jwt/jwt/v5"
  5. "os"
  6. "time"
  7. )
  8. type Jwt struct {
  9. privateKey *rsa.PrivateKey
  10. TokenExpireDuration time.Duration
  11. }
  12. type UserClaims struct {
  13. UserId uint `json:"user_id"`
  14. jwt.RegisteredClaims
  15. }
  16. func NewJwt(privateKeyFile string, tokenExpireDuration time.Duration) *Jwt {
  17. privateKeyContent, err := os.ReadFile(privateKeyFile)
  18. if err != nil {
  19. panic(err)
  20. }
  21. privateKey, err := jwt.ParseRSAPrivateKeyFromPEM(privateKeyContent)
  22. if err != nil {
  23. panic(err)
  24. }
  25. return &Jwt{
  26. privateKey: privateKey,
  27. TokenExpireDuration: tokenExpireDuration,
  28. }
  29. }
  30. func (s *Jwt) GenerateToken(userId uint) string {
  31. t := jwt.NewWithClaims(jwt.SigningMethodRS256,
  32. UserClaims{
  33. UserId: userId,
  34. RegisteredClaims: jwt.RegisteredClaims{
  35. ExpiresAt: jwt.NewNumericDate(time.Now().Add(s.TokenExpireDuration)),
  36. },
  37. })
  38. token, err := t.SignedString(s.privateKey)
  39. if err != nil {
  40. return ""
  41. }
  42. return token
  43. }
  44. func (s *Jwt) ParseToken(tokenString string) (uint, error) {
  45. token, err := jwt.ParseWithClaims(tokenString, &UserClaims{}, func(token *jwt.Token) (interface{}, error) {
  46. return s.privateKey.Public(), nil
  47. })
  48. if err != nil {
  49. return 0, err
  50. }
  51. if claims, ok := token.Claims.(*UserClaims); ok && token.Valid {
  52. return claims.UserId, nil
  53. }
  54. return 0, err
  55. }