first commit

This commit is contained in:
2025-03-21 11:05:42 +08:00
commit 7dffc94035
1717 changed files with 724764 additions and 0 deletions

View File

@@ -0,0 +1,59 @@
package token
import (
"fmt"
"time"
tk "github.com/golang-jwt/jwt/v5"
)
const minSecretKeySize = 32
// JWTMaker JSON Web Token
type JWTMaker struct {
secretKey string
}
// NewJWTMaker 创建一个新的JWTMaker
func NewJWTMaker(secretKey string) error {
if len(secretKey) < minSecretKeySize {
return fmt.Errorf("invalid key size: must be at least %d characters", minSecretKeySize)
}
engine = &JWTMaker{secretKey}
return nil
}
// CreateToken 根据用户名和时间创建一个新的token
func (maker *JWTMaker) CreateToken(id string, username string, duration time.Duration) (string, *Payload, error) {
payload, err := NewPayload(id, username, duration)
if err != nil {
return "", payload, err
}
jwtToken := tk.NewWithClaims(tk.SigningMethodHS256, payload)
token, err := jwtToken.SignedString([]byte(maker.secretKey))
return token, payload, err
}
// VerifyToken checks if the token is valid or not
func (maker *JWTMaker) VerifyToken(token string) (*Payload, error) {
keyFunc := func(token *tk.Token) (interface{}, error) {
_, ok := token.Method.(*tk.SigningMethodHMAC)
if !ok {
return nil, ErrInvalidToken
}
return []byte(maker.secretKey), nil
}
jwtToken, err := tk.ParseWithClaims(token, &Payload{}, keyFunc)
if err != nil {
return nil, ErrInvalidToken
}
payload, ok := jwtToken.Claims.(*Payload)
if !ok {
return nil, ErrInvalidToken
}
return payload, nil
}

View File

@@ -0,0 +1,24 @@
package token
import (
"time"
)
var engine Maker
// Maker 管理token的接口定义
type Maker interface {
// CreateToken 根据用户名和时间创建一个新的token
CreateToken(id string, username string, duration time.Duration) (string, *Payload, error)
// VerifyToken 校验token是否正确
VerifyToken(token string) (*Payload, error)
}
func CreateToken(id string, username string, duration time.Duration) (string, *Payload, error) {
return engine.CreateToken(id, username, duration)
}
func VerifyToken(token string) (*Payload, error) {
return engine.VerifyToken(token)
}

View File

@@ -0,0 +1,60 @@
package token
import (
"fmt"
"time"
"management/internal/config"
"github.com/aead/chacha20poly1305"
"github.com/o1egl/paseto"
)
// PasetoMaker is a PASETO token maker
type PasetoMaker struct {
paseto *paseto.V2
symmetricKey []byte
}
// NewPasetoMaker creates a new PasetoMaker
func NewPasetoMaker() error {
symmetricKey := config.File.JWT.SigningKey
if len(symmetricKey) != chacha20poly1305.KeySize {
return fmt.Errorf("invalid key size: must be exactly %d characters", chacha20poly1305.KeySize)
}
engine = &PasetoMaker{
paseto: paseto.NewV2(),
symmetricKey: []byte(symmetricKey),
}
return nil
}
// CreateToken creates a new token for a specific username and duration
func (maker *PasetoMaker) CreateToken(id string, username string, duration time.Duration) (string, *Payload, error) {
payload, err := NewPayload(id, username, duration)
if err != nil {
return "", payload, err
}
token, err := maker.paseto.Encrypt(maker.symmetricKey, payload, nil)
return token, payload, err
}
// VerifyToken checks if the token is valid or not
func (maker *PasetoMaker) VerifyToken(token string) (*Payload, error) {
payload := &Payload{}
err := maker.paseto.Decrypt(token, maker.symmetricKey, payload, nil)
if err != nil {
return nil, ErrInvalidToken
}
err = payload.Valid()
if err != nil {
return nil, err
}
return payload, nil
}

View File

@@ -0,0 +1,43 @@
package token
import (
"errors"
"time"
tk "github.com/golang-jwt/jwt/v5"
)
// Different types of error returned by the VerifyToken function
var (
ErrInvalidToken = errors.New("token is invalid")
ErrExpiredToken = errors.New("token has expired")
)
// Payload contains the payload data of the token
type Payload struct {
ID string `json:"id"`
Username string `json:"username"`
tk.RegisteredClaims // v5版本新加的方法
}
// NewPayload creates a new token payload with a specific username and duration
func NewPayload(id string, username string, duration time.Duration) (*Payload, error) {
payload := &Payload{
id,
username,
tk.RegisteredClaims{
ExpiresAt: tk.NewNumericDate(time.Now().Add(duration)), // 过期时间24小时
IssuedAt: tk.NewNumericDate(time.Now()), // 签发时间
NotBefore: tk.NewNumericDate(time.Now()), // 生效时间
},
}
return payload, nil
}
// Valid checks if the token payload is valid or not
func (payload *Payload) Valid() error {
if time.Now().After(payload.ExpiresAt.Time) {
return ErrExpiredToken
}
return nil
}