JwtHelper.java 7.2 KB

123456789101112131415161718192021222324252627282930313233343536373839404142434445464748495051525354555657585960616263646566676869707172737475767778798081828384858687888990919293949596979899100101102103104105106107108109110111112113114115116117118119120121122123124125126127128129130131132133134135136137138139140141142143144145146147148149150151152153154155156157158159160161162163164165166167168169170171172173174175176177178179180181182183184185186187188189190191192193194195196197198199200201202203204205206207208209210211212213214215216217218219220221222223224225226227228229
  1. package com.bofeng;
  2. import com.auth0.jwt.JWT;
  3. import com.auth0.jwt.JWTVerifier;
  4. import com.auth0.jwt.algorithms.Algorithm;
  5. import com.auth0.jwt.interfaces.Claim;
  6. import com.google.common.base.Strings;
  7. import com.google.common.collect.ImmutableMap;
  8. import com.yvan.platform.Conv;
  9. import com.yvan.springmvc.HttpUtils;
  10. import lombok.val;
  11. import org.joda.time.DateTime;
  12. import javax.servlet.ServletRequest;
  13. import javax.servlet.http.HttpServletRequest;
  14. import java.util.Map;
  15. public class JwtHelper {
  16. private static final String USER_ID = "u";
  17. private static final String TOKEN_VERSION = "v";
  18. private static final String USER_TYPE = "t";
  19. private static final String STAFF_NAME = "n";
  20. public static final String AUTH_HEADER_NAME = "Authorization";
  21. public static final String AUTH_COOKIE_NAME = "auth";
  22. //头部
  23. private static final Map<String, Object> HEADER = new ImmutableMap.Builder<String, Object>()
  24. .build();
  25. public static boolean verify(String secret) {
  26. return verify(getAuthHeader(HttpUtils.currentRequest()), secret);
  27. }
  28. /**
  29. * 校验 jwtToken 是否正确
  30. */
  31. public static boolean verify(String jwtToken, String secret) {
  32. try {
  33. Algorithm algorithm = Algorithm.HMAC256(secret);
  34. JWTVerifier verifier = JWT.require(algorithm)
  35. .build();
  36. verifier.verify(jwtToken);
  37. return true;
  38. } catch (Exception e) {
  39. return false;
  40. }
  41. }
  42. /**
  43. * 校验 jwtToken 是否正确
  44. */
  45. public static boolean verify(String jwtToken, Long userId, String tokenVersion, String secret) {
  46. try {
  47. Algorithm algorithm = Algorithm.HMAC256(secret);
  48. JWTVerifier verifier = JWT.require(algorithm)
  49. .withClaim(USER_ID, userId)
  50. .withClaim(TOKEN_VERSION, tokenVersion)
  51. .build();
  52. verifier.verify(jwtToken);
  53. return true;
  54. } catch (Exception e) {
  55. return false;
  56. }
  57. }
  58. /**
  59. * 获得 userId
  60. */
  61. public static Long getUserId(String token) {
  62. if (Strings.isNullOrEmpty(token)) {
  63. return 0L;
  64. }
  65. Map<String, Claim> m = JWT.decode(token).getClaims();
  66. return m.get(USER_ID).asLong();
  67. }
  68. /**
  69. * 获取当前请求的 agentId
  70. */
  71. public static Long getUserId() {
  72. return getUserId(getAuthHeader(HttpUtils.currentRequest()));
  73. }
  74. /**
  75. * 获得 tokenVersion
  76. */
  77. public static String getTokenVersion(String token) {
  78. if (Strings.isNullOrEmpty(token)) {
  79. return "";
  80. }
  81. Map<String, Claim> m = JWT.decode(token).getClaims();
  82. return m.get(TOKEN_VERSION).asString();
  83. }
  84. /**
  85. * 获得 userType
  86. */
  87. public static String getUserType(String token) {
  88. if (Strings.isNullOrEmpty(token)) {
  89. return "";
  90. }
  91. Map<String, Claim> m = JWT.decode(token).getClaims();
  92. return m.get(USER_TYPE).asString();
  93. }
  94. public static String getUserType() {
  95. return getUserType(getAuthHeader(HttpUtils.currentRequest()));
  96. }
  97. /**
  98. * 获得 EntityId
  99. */
  100. public static String getStaffName(String token) {
  101. if (Strings.isNullOrEmpty(token)) {
  102. return "";
  103. }
  104. Map<String, Claim> m = JWT.decode(token).getClaims();
  105. return m.get(STAFF_NAME).asString();
  106. }
  107. /**
  108. * 获取当前请求的 EntityId
  109. */
  110. public static String getStaffName() {
  111. return getStaffName(getAuthHeader(HttpUtils.currentRequest()));
  112. }
  113. /**
  114. * 获取授权过期时间
  115. */
  116. public static DateTime getExpireTime(String token) {
  117. if (Strings.isNullOrEmpty(token)) {
  118. return null;
  119. }
  120. return new DateTime(JWT.decode(token).getExpiresAt().getTime());
  121. }
  122. /**
  123. * 获取授权过期时间
  124. */
  125. public static DateTime getExpireTime() {
  126. return getExpireTime(getAuthHeader(HttpUtils.currentRequest()));
  127. }
  128. public static boolean isLogined() {
  129. return (getAuthHeader(HttpUtils.currentRequest()) != null);
  130. }
  131. public static String getAuthHeader(ServletRequest request) {
  132. HttpServletRequest req = (HttpServletRequest) request;
  133. String authorization = req.getHeader(JwtHelper.AUTH_HEADER_NAME);
  134. if (!Strings.isNullOrEmpty(authorization)) {
  135. return authorization;
  136. }
  137. authorization = HttpUtils.getCookieValue(JwtHelper.AUTH_COOKIE_NAME);
  138. if (!Strings.isNullOrEmpty(authorization)) {
  139. return authorization;
  140. }
  141. return null;
  142. }
  143. /**
  144. * 生成签名
  145. */
  146. public static String sign(Long userAgentId, String role, String staffName, String secret, int expireOfMinutes) {
  147. DateTime now = DateTime.now();
  148. Algorithm algorithm = Algorithm.HMAC256(secret);
  149. return JWT.create()
  150. .withHeader(HEADER)
  151. .withClaim(USER_ID, userAgentId)
  152. .withClaim(STAFF_NAME, staffName)
  153. .withClaim(USER_TYPE, role)
  154. .withIssuedAt(now.toDate())
  155. .withExpiresAt(now.plusMinutes(expireOfMinutes).toDate())
  156. .sign(algorithm);
  157. }
  158. /**
  159. * 对票据进行延期
  160. */
  161. public static String extendExpireTime(String token, int expireMinutes, String secret) {
  162. DateTime now = DateTime.now();
  163. val decode = JWT.decode(token);
  164. Map<String, Claim> m = decode.getClaims();
  165. Algorithm algorithm = Algorithm.HMAC256(secret);
  166. return JWT.create()
  167. .withHeader(HEADER)
  168. .withClaim(USER_ID, m.get(USER_ID).asString())
  169. .withClaim(TOKEN_VERSION, m.get(TOKEN_VERSION).asString())
  170. .withClaim(STAFF_NAME, m.get(STAFF_NAME).asString())
  171. .withClaim(USER_TYPE, m.get(USER_TYPE).asString())
  172. .withIssuedAt(decode.getIssuedAt())
  173. .withExpiresAt(now.plusMinutes(expireMinutes).toDate())
  174. .sign(algorithm);
  175. }
  176. public static void main(String[] args) {
  177. val v = verify("eyJ0eXAiOiJKV1QiLCJhbGciOiJIUzI1NiJ9.eyJ0IjoiQSIsInUiOiJBRE1JTl8xIiwidiI6Ik4iLCJleHAiOjE1Mzk2MDMxOTgsImlhdCI6MTUzOTYwMjU5OCwibiI6IueuoeeQhuWRmCJ9._HAu7DCGtYelHH5gIH9HsyePkvsZqDGg-zntUwjxBYc",
  178. "jztd");
  179. System.out.println(v);
  180. String secret = "jzt600998";
  181. String role = "custom";
  182. Long userId = 123465L;
  183. String staffName = "张三";
  184. String version = "1";
  185. String token = sign(userId, role, staffName, secret, 6 * 30 * 24 * 60);
  186. System.out.println("token=" + token);
  187. System.out.println("getAgentId=" + getUserId(token));
  188. System.out.println("getTokenVersion=" + getTokenVersion(token));
  189. System.out.println("getRole=" + getUserType(token));
  190. System.out.println("verify(token)=" + verify(token, secret));
  191. System.out.println("verify(token, errorSecret)=" + verify(token, secret + "a"));
  192. System.out.println("verify(token, errorVersion)=" + verify(token, userId, "0", secret));
  193. System.out.println("verify(token, right)=" + verify(token, userId, version, secret));
  194. }
  195. }