jwt.go 2.8 KB

123456789101112131415161718192021222324252627282930313233343536373839404142434445464748495051525354555657585960616263646566676869707172737475767778798081828384858687
  1. package utils
  2. import (
  3. "errors"
  4. "time"
  5. "github.com/flipped-aurora/gin-vue-admin/server/global"
  6. "github.com/flipped-aurora/gin-vue-admin/server/model/system/request"
  7. jwt "github.com/golang-jwt/jwt/v5"
  8. )
  9. type JWT struct {
  10. SigningKey []byte
  11. }
  12. var (
  13. TokenValid = errors.New("未知错误")
  14. TokenExpired = errors.New("token已过期")
  15. TokenNotValidYet = errors.New("token尚未激活")
  16. TokenMalformed = errors.New("这不是一个token")
  17. TokenSignatureInvalid = errors.New("无效签名")
  18. TokenInvalid = errors.New("无法处理此token")
  19. )
  20. func NewJWT() *JWT {
  21. return &JWT{
  22. []byte(global.GVA_CONFIG.JWT.SigningKey),
  23. }
  24. }
  25. func (j *JWT) CreateClaims(baseClaims request.BaseClaims) request.CustomClaims {
  26. bf, _ := ParseDuration(global.GVA_CONFIG.JWT.BufferTime)
  27. ep, _ := ParseDuration(global.GVA_CONFIG.JWT.ExpiresTime)
  28. claims := request.CustomClaims{
  29. BaseClaims: baseClaims,
  30. BufferTime: int64(bf / time.Second), // 缓冲时间1天 缓冲时间内会获得新的token刷新令牌 此时一个用户会存在两个有效令牌 但是前端只留一个 另一个会丢失
  31. RegisteredClaims: jwt.RegisteredClaims{
  32. Audience: jwt.ClaimStrings{"GVA"}, // 受众
  33. NotBefore: jwt.NewNumericDate(time.Now().Add(-1000)), // 签名生效时间
  34. ExpiresAt: jwt.NewNumericDate(time.Now().Add(ep)), // 过期时间 7天 配置文件
  35. Issuer: global.GVA_CONFIG.JWT.Issuer, // 签名的发行者
  36. },
  37. }
  38. return claims
  39. }
  40. // CreateToken 创建一个token
  41. func (j *JWT) CreateToken(claims request.CustomClaims) (string, error) {
  42. token := jwt.NewWithClaims(jwt.SigningMethodHS256, claims)
  43. return token.SignedString(j.SigningKey)
  44. }
  45. // CreateTokenByOldToken 旧token 换新token 使用归并回源避免并发问题
  46. func (j *JWT) CreateTokenByOldToken(oldToken string, claims request.CustomClaims) (string, error) {
  47. v, err, _ := global.GVA_Concurrency_Control.Do("JWT:"+oldToken, func() (interface{}, error) {
  48. return j.CreateToken(claims)
  49. })
  50. return v.(string), err
  51. }
  52. // ParseToken 解析 token
  53. func (j *JWT) ParseToken(tokenString string) (*request.CustomClaims, error) {
  54. token, err := jwt.ParseWithClaims(tokenString, &request.CustomClaims{}, func(token *jwt.Token) (i interface{}, e error) {
  55. return j.SigningKey, nil
  56. })
  57. if err != nil {
  58. switch {
  59. case errors.Is(err, jwt.ErrTokenExpired):
  60. return nil, TokenExpired
  61. case errors.Is(err, jwt.ErrTokenMalformed):
  62. return nil, TokenMalformed
  63. case errors.Is(err, jwt.ErrTokenSignatureInvalid):
  64. return nil, TokenSignatureInvalid
  65. case errors.Is(err, jwt.ErrTokenNotValidYet):
  66. return nil, TokenNotValidYet
  67. default:
  68. return nil, TokenInvalid
  69. }
  70. }
  71. if token != nil {
  72. if claims, ok := token.Claims.(*request.CustomClaims); ok && token.Valid {
  73. return claims, nil
  74. }
  75. }
  76. return nil, TokenValid
  77. }