当前位置:网站首页>JWT-JSON WEB TOKEN

JWT-JSON WEB TOKEN

2022-07-06 06:14:00 Snow peak expensive


One 、JWT What is it? ?

 Example :pandas Is based on NumPy A tool of , The tool is created to solve data analysis tasks .

Two 、JWT The composition of

  1. Header: Record the type of token , Signed algorithm name .{“alg”:“HS256”,“type”:“JWT”}
  2. Payload: Record user information .{“username”:“GXF”,“id”:“1”}
  3. Signature: prevent Token Be tampered with , Improve safety . according to Header and Payload A string calculated .

3、 ... and 、Token form

token=BASE64(Header).BASE64(Payload).BASE64(Signature)

Four 、Signature The composition of

Signature By Header Inside alg Calculated by the specified algorithm .

Signature= Specified algorithm (BASE64(Header).BASE64(Payload), secret key )

5、 ... and 、 Use

  1. Plus dependence
<dependency>
     <groupId>io.jsonwebtoken</groupId>
     <artifactId>jjwt-api</artifactId>
     <version>0.10.7</version>
 </dependency>
 <dependency>
     <groupId>io.jsonwebtoken</groupId>
     <artifactId>jjwt-impl</artifactId>
     <version>0.10.7</version>
     <scope>runtime</scope>
 </dependency>
 <dependency>
     <groupId>io.jsonwebtoken</groupId>
     <artifactId>jjwt-jackson</artifactId>
     <version>0.10.7</version>
     <scope>runtime</scope>
 </dependency>
  1. Add configuration
jwt:
  secret: 123456 # secret key 
  #  The period of validity , Unit second , Default 2 Zhou 
  expire-time-in-second: 1209600
  1. Machining tools

import com.google.common.collect.Maps;
import io.jsonwebtoken.*;
import io.jsonwebtoken.security.Keys;
import lombok.RequiredArgsConstructor;
import lombok.extern.slf4j.Slf4j;
import org.apache.commons.codec.binary.Base64;
import org.springframework.beans.factory.annotation.Value;
import org.springframework.stereotype.Component;

import javax.crypto.SecretKey;
import java.util.Date;
import java.util.HashMap;
import java.util.Map;

@Slf4j
@RequiredArgsConstructor
@SuppressWarnings("WeakerAccess")
@Component
public class JwtOperator {
    
    /** *  Secret key  * -  Default aaabbbcccdddeeefffggghhhiiijjjkkklllmmmnnnooopppqqqrrrsssttt */
    @Value("${secret:aaabbbcccdddeeefffggghhhiiijjjkkklllmmmnnnooopppqqqrrrsssttt}")
    private String secret;
    /** *  The period of validity , Unit second  * -  Default 2 Zhou  */
    @Value("${expire-time-in-second:1209600}")
    private Long expirationTimeInSecond;

    /** *  from token In order to get claim * * @param token token * @return claim */
    public Claims getClaimsFromToken(String token) {
    
        try {
    
            return Jwts.parser()
                    .setSigningKey(this.secret.getBytes())
                    .parseClaimsJws(token)
                    .getBody();
        } catch (ExpiredJwtException | UnsupportedJwtException | MalformedJwtException | IllegalArgumentException e) {
    
            log.error("token Parse error ", e);
            throw new IllegalArgumentException("Token invalided.");
        }
    }

    /** *  obtain token The expiration time of  * * @param token token * @return  Expiration time  */
    public Date getExpirationDateFromToken(String token) {
    
        return getClaimsFromToken(token)
                .getExpiration();
    }

    /** *  Judge token Is it overdue  * * @param token token * @return  Expired return true, Not expired return false */
    private Boolean isTokenExpired(String token) {
    
        Date expiration = getExpirationDateFromToken(token);
        return expiration.before(new Date());
    }

    /** *  Calculation token The expiration time of  * * @return  Expiration time  */
    public Date getExpirationTime() {
    
        return new Date(System.currentTimeMillis() + this.expirationTimeInSecond * 1000);
    }

    /** *  Generate... For the specified user token * * @param claims  User information  * @return token */
    public String generateToken(Map<String, Object> claims) {
    
        Date createdTime = new Date();
        Date expirationTime = this.getExpirationTime();


        byte[] keyBytes = secret.getBytes();
        SecretKey key = Keys.hmacShaKeyFor(keyBytes);

        return Jwts.builder()
                .setClaims(claims)
                .setIssuedAt(createdTime)
                .setExpiration(expirationTime)
                //  You can also use your favorite algorithm 
                //  The supported algorithms are detailed in :https://github.com/jwtk/jjwt#features
                .signWith(key, SignatureAlgorithm.HS256)
                .compact();
    }

    /** *  Judge token Is it illegal  * * @param token token * @return  Not expired return true, Otherwise return to false */
    public Boolean validateToken(String token) {
    
        return !isTokenExpired(token);
    }

// public static void main(String[] args) {
    
// // 1.  initialization 
// JwtOperator jwtOperator = new JwtOperator();
// jwtOperator.expirationTimeInSecond = 1209600L;
// jwtOperator.secret = "aaabbbcccdddeeefffggghhhiiijjjkkklllmmmnnnooopppqqqrrrsssttt";
//
// // 2. Set user information 
// HashMap<String, Object> objectObjectHashMap = Maps.newHashMap();
// objectObjectHashMap.put("id", "1");
//
// //  test 1:  Generate token
// String token = jwtOperator.generateToken(objectObjectHashMap);
// //  Something similar to this string will be generated : eyJhbGciOiJIUzI1NiJ9.eyJpZCI6IjEiLCJpYXQiOjE1NjU1ODk4MTcsImV4cCI6MTU2Njc5OTQxN30.27_QgdtTg4SUgxidW6ALHFsZPgMtjCQ4ZYTRmZroKCQ
// System.out.println(token);
//
// //  Change me to the one generated above token!!!
// String someToken = "eyJhbGciOiJIUzI1NiJ9.eyJpZCI6IjEiLCJpYXQiOjE1NjU1OTQ1NjIsImV4cCI6MTU2NjgwNDE2Mn0.PAvWPcQAZnSlYKNbZr4O1l9aA4LPphuq0OG2QIs7O5E\n";
// //  test 2:  If you can token Legal and not expired , return true
// Boolean validateToken = jwtOperator.validateToken(someToken);
// System.out.println(validateToken);
//
// //  test 3:  Get user information 
// Claims claims = jwtOperator.getClaimsFromToken(someToken);
// System.out.println(claims);
//
// //  Change me to the one you generated token The first paragraph of ( With . As boundary )
// String encodedHeader = "eyJhbGciOiJIUzI1NiJ9";
// //  test 4:  Decrypt Header
// byte[] header = Base64.decodeBase64(encodedHeader.getBytes());
// System.out.println(new String(header));
//
// //  Change me to the one you generated token The second paragraph of ( With . As boundary )
// String encodedPayload = "eyJpZCI6IjEiLCJpYXQiOjE1NjU1ODk1NDEsImV4cCI6MTU2Njc5OTE0MX0";
// //  test 5:  Decrypt Payload
// byte[] payload = Base64.decodeBase64(encodedPayload.getBytes());
// System.out.println(new String(payload));
//
// //  test 6:  This is a falsified token, Therefore, an exception will be reported , explain JWT Is safe 
// jwtOperator.validateToken("eyJhbGciOiJIUzI1NiJ9.eyJpZCI6IjEiLCJpYXQiOjE1NjU1ODk3MzIsImV4cCI6MTU2Njc5OTMzMn0.nDv25ex7XuTlmXgNzGX46LqMZItVFyNHQpmL9UQf-aUxxx");
// }
}
原网站

版权声明
本文为[Snow peak expensive]所创,转载请带上原文链接,感谢
https://yzsam.com/2022/187/202207060607584803.html