如題,在上一文章中分析了3rd_session和OpenId的關(guān)系,為確保隨機(jī)散列值和OpenId的唯一對(duì)應(yīng)關(guān)系,完全可以借助Flask中的itsdangerous 的TimedJSONWebSignatureSerializer來(lái)實(shí)現(xiàn)這一目標(biāo),具體操作流程如下:
step1: Flask中導(dǎo)入相應(yīng)的庫(kù):
-
from itsdangerous import TimedJSONWebSignatureSerializer as Serializer
-
-
-
def gen_3rdsession(openId):
-
# 用OpenId加密生成3rdsession
-
s = Serializer(current_app.config['SECRET_KEY'])
-
third_session = s.dumps({'openId': openId})
-
return third_session
-
-
def gen_openId(thirdsession):
-
# 用3rdsession解密生成OpenId
-
s = Serializer(current_app.config['SECRET_KEY'])
-
openId = s.loads(thirdsession)['openId']
-
return openId
step2:生成3rdsession:
-
third_session = gen_3rdsession(openId)
這個(gè)3rdsession本身就是Bsion格式,類似于Json,可以直接返回。
step3:然后在小程序中獲取:
-
var third_session = data.data;
-
console.log(third_session)
-
try {wx.setStorageSync('third_session', third_session)}
-
catch (e) {}
將其保存在本地緩存中。
step4:接下來(lái)就是在POST數(shù)據(jù)時(shí),將third_session提交至服務(wù)器進(jìn)行解密獲取Openid,進(jìn)而在數(shù)據(jù)庫(kù)查詢用戶的相關(guān)數(shù)據(jù)。
呵呵,該加密應(yīng)該是絕對(duì)安全的,每次加密的數(shù)據(jù)是不一樣的,加密后的OpenId==3rd_session如下:
-
eyJhbGciOiJIUzI1NiIsImV4cCI6MTQ5MzI2NDc5NCwiaWF0IjoxNDkzMjYxMTk0fQ.eyJvcGVuSWQiOiJvaXJiczBMT1dyajF2ZDRzVHAtamNxd1FWNy1JIn0.GM2THjHKYM_Rt8gBJuZcWNwDxxz1TgoAZCKLyOWs9Uk