token.go 1.3 KB

1234567891011121314151617181920212223242526272829303132333435363738394041424344454647484950515253
  1. package middleware
  2. import (
  3. "github.com/golang-jwt/jwt"
  4. "iot_manager_service/app/system/model"
  5. "iot_manager_service/config"
  6. "time"
  7. )
  8. const (
  9. Authorization = "Authorization"
  10. )
  11. var EmptyKeyFunc = func(t *jwt.Token) (interface{}, error) { return []byte(config.Instance().Server.TokenSign), nil }
  12. type Claims struct {
  13. jwt.StandardClaims
  14. TenantId int `json:"tenant_id"`
  15. UserId int64 `json:"user_id"`
  16. RoleId int64 `json:"role_id"`
  17. UserName string `json:"user_name"`
  18. Random string `json:"random"`
  19. }
  20. func GetAccessToken(userId, roleId int64, tenantId int, userName string, random string) (string, error) {
  21. jwtToken := Claims{StandardClaims: jwt.StandardClaims{
  22. Audience: model.Audience,
  23. Issuer: model.Issuer,
  24. ExpiresAt: time.Now().Add(2 * time.Hour).Unix(),
  25. NotBefore: time.Now().Unix(),
  26. },
  27. UserId: userId,
  28. TenantId: tenantId,
  29. RoleId: roleId,
  30. UserName: userName,
  31. Random: random,
  32. }
  33. claims := jwt.NewWithClaims(jwt.SigningMethodHS512, jwtToken)
  34. return claims.SignedString([]byte(config.Instance().Server.TokenSign))
  35. }
  36. func parseAccessToken(authorization string) *Claims {
  37. token, err := jwt.ParseWithClaims(authorization, &Claims{}, EmptyKeyFunc)
  38. if err != nil {
  39. return nil
  40. }
  41. claims, ok := token.Claims.(*Claims)
  42. if !ok {
  43. return nil
  44. }
  45. return claims
  46. }