初始化项目

This commit is contained in:
lianghuanjie
2024-12-05 20:51:35 +08:00
commit e2ba6924b8
30 changed files with 1560 additions and 0 deletions

View File

@@ -0,0 +1,106 @@
package jwt
import (
"errors"
"fmt"
jwt "github.com/golang-jwt/jwt/v4"
"github.com/spf13/cast"
"github.com/zeromicro/go-zero/rest/token"
"net/http"
"time"
)
type Config struct {
AccessSecret string `json:",default=ac2d27613e131be6286c0eb17139293d"`
AccessExpire time.Duration `json:",default=24h"`
}
type TokenBuilder struct {
config Config
}
func NewTokenBuilder(config Config) *TokenBuilder {
return &TokenBuilder{config: config}
}
// GenerateToken 生成token
func (b *TokenBuilder) GenerateToken(kvs map[string]any) (string, int64, error) {
// 创建一个新的 Token
tok := jwt.New(jwt.SigningMethodHS256)
// 设置 Token 的声明Payload
claims := tok.Claims.(jwt.MapClaims)
for k, v := range kvs {
claims[k] = v
}
expiredAt := time.Now().Add(b.config.AccessExpire).Unix()
claims["exp"] = expiredAt // 设置过期时间
// 使用密钥签名 Token
tkStr, err := tok.SignedString([]byte(b.config.AccessSecret))
return tkStr, expiredAt, err
}
func (b *TokenBuilder) ParseUidFromToken(tokenStr string) (string, string, string, int64, error) {
r := &http.Request{Header: http.Header{}}
r.Header.Set("Authorization", fmt.Sprintf("Bearer %s", tokenStr))
parser := token.NewTokenParser()
tok, err := parser.ParseToken(r, b.config.AccessSecret, "")
if err != nil {
return "", "", "", 0, err
}
if !tok.Valid {
return "", "", "", 0, errors.New("token is invalid")
}
var appid, userId, tgId string
var expiredAt int64
if claims, ok := tok.Claims.(jwt.MapClaims); ok {
if uid, ok := claims["uid"]; ok {
userId = cast.ToString(uid)
}
if aid, ok := claims["app_id"]; ok {
appid = cast.ToString(aid)
}
if tid, ok := claims["tg_id"]; ok {
tgId = cast.ToString(tid)
}
if exp, ok := claims["exp"]; ok {
expiredAt = cast.ToInt64(exp)
}
}
return appid, userId, tgId, expiredAt, nil
}
//// ParseUid 解析出uid
//func (b *TokenBuilder) ParseUid(r *http.Request) (string, error) {
// parser := token.NewTokenParser()
// tok, err := parser.ParseToken(r, b.config.AccessSecret, "")
// if err != nil {
// return "", err
// }
// if !tok.Valid {
// return "", errors.New("token is invalid")
// }
// if claims, ok := tok.Claims.(jwt.MapClaims); ok {
// if uid, ok := claims["uid"]; ok {
// return cast.ToString(uid), nil
// }
// }
// return "", errors.New("token not exist uid")
//}
//func ParseUid(r *http.Request, accessSecret string) (string, error) {
// parser := token.NewTokenParser()
// tok, err := parser.ParseToken(r, accessSecret, "")
// if err != nil {
// return "", err
// }
// if !tok.Valid {
// return "", errors.New("token is invalid")
// }
// if claims, ok := tok.Claims.(jwt.MapClaims); ok {
// if uid, ok := claims["uid"]; ok {
// return cast.ToString(uid), nil
// }
// }
// return "", errors.New("token not exist uid")
//}

View File

@@ -0,0 +1,31 @@
package md5
import (
"crypto/md5"
"encoding/hex"
"fmt"
)
func Md5(src []byte) string {
has := md5.Sum(src)
md5Str := hex.EncodeToString(has[:])
return md5Str
}
func Md5str(src string) string {
return Md5([]byte(src))
}
func Md516(src string) string {
data := []byte(src)
has := md5.Sum(data)
md5Str := hex.EncodeToString(has[:])
return md5Str[8:24]
}
func Md516Upper(src string) string {
data := []byte(src)
has := md5.Sum(data)
md5Str := fmt.Sprintf("%X", has)
return md5Str[8:24]
}

View File

@@ -0,0 +1,30 @@
package sha
import (
"crypto/hmac"
"crypto/sha1"
"crypto/sha256"
"encoding/base64"
"encoding/hex"
)
func Sha1(src string) string {
h := sha1.New()
h.Write([]byte(src))
sh := hex.EncodeToString(h.Sum(nil))
return sh
}
func Sha256(src string) string {
m := sha256.New()
m.Write([]byte(src))
res := hex.EncodeToString(m.Sum(nil))
return res
}
func HmacSha256Base64(src, secret string) string {
h := hmac.New(sha256.New, []byte(secret))
h.Write([]byte(src))
sign := base64.StdEncoding.EncodeToString(h.Sum(nil))
return sign
}