package util import ( "errors" "golang.org/x/crypto/bcrypt" "os" "time" "github.com/golang-jwt/jwt/v5" ) type CustomClaims struct { jwt.RegisteredClaims Username string `json:"user_id"` } func CreateTokenForUser(username string) (string, error) { claims := CustomClaims{ jwt.RegisteredClaims{ ExpiresAt: jwt.NewNumericDate(time.Now().Add(1 * time.Hour)), IssuedAt: jwt.NewNumericDate(time.Now()), NotBefore: jwt.NewNumericDate(time.Now()), Issuer: "ptpp", }, username, } str, err := jwt.NewWithClaims(jwt.SigningMethodHS512, claims).SignedString([]byte(os.Getenv("TOKEN_SECRET"))) if err != nil { return "", err } return str, nil } func ParseToken(token string, secret string) (*CustomClaims, error) { tk, err := jwt.ParseWithClaims(token, &CustomClaims{}, func(t *jwt.Token) (interface{}, error) { return []byte(secret), nil }) if err != nil { return nil, err } if claims, ok := tk.Claims.(*CustomClaims); ok { return claims, nil } return nil, errors.New("invalid claims") } func HashPassword(password string) (string, error) { bytes, err := bcrypt.GenerateFromPassword([]byte(password), 8) return string(bytes), err } func CheckPassword(password string, hash string) (bool, error) { err := bcrypt.CompareHashAndPassword([]byte(hash), []byte(password)) return err == nil, err }