JwtAuthFilter.java 5.9 KB

123456789101112131415161718192021222324252627282930313233343536373839404142434445464748495051525354555657585960616263646566676869707172737475767778798081828384858687888990919293949596979899100101102103104105106107108109110111112113114115116117118119120121122123124125126127128129130131132133134135136137138139140141142143144145146147148149150
  1. package com.yaozhitech.spring5.filter;
  2. import java.time.LocalDateTime;
  3. import java.time.ZoneId;
  4. import java.util.Date;
  5. import javax.servlet.ServletRequest;
  6. import javax.servlet.ServletResponse;
  7. import javax.servlet.http.HttpServletRequest;
  8. import javax.servlet.http.HttpServletResponse;
  9. import org.apache.shiro.authc.AuthenticationException;
  10. import org.apache.shiro.authc.AuthenticationToken;
  11. import org.apache.shiro.subject.Subject;
  12. import org.apache.shiro.web.filter.authc.AuthenticatingFilter;
  13. import org.apache.shiro.web.util.WebUtils;
  14. import org.springframework.util.StringUtils;
  15. import org.springframework.web.bind.annotation.RequestMethod;
  16. import com.yaozhitech.spring5.dto.UserDto;
  17. import com.yaozhitech.spring5.jwt.JWTToken;
  18. import com.yaozhitech.spring5.service.UserService;
  19. import com.yaozhitech.spring5.utils.JwtUtils;
  20. import lombok.extern.slf4j.Slf4j;
  21. @Slf4j
  22. public class JwtAuthFilter extends AuthenticatingFilter {
  23. private static final int tokenRefreshInterval = 300;
  24. private UserService userService;
  25. public JwtAuthFilter(UserService userService){
  26. this.userService = userService;
  27. this.setLoginUrl("/login");
  28. }
  29. @Override
  30. protected boolean preHandle(ServletRequest request, ServletResponse response) throws Exception {
  31. HttpServletRequest httpServletRequest = WebUtils.toHttp(request);
  32. if (httpServletRequest.getMethod().equals(RequestMethod.OPTIONS.name())) //对于OPTION请求做拦截,不做token校验
  33. return false;
  34. return super.preHandle(request, response);
  35. }
  36. @Override
  37. protected void postHandle(ServletRequest request, ServletResponse response){
  38. this.fillCorsHeader(WebUtils.toHttp(request), WebUtils.toHttp(response));
  39. }
  40. /**
  41. * 父类会在请求进入拦截器后调用该方法,返回true则继续,返回false则会调用onAccessDenied()。这里在不通过时,还调用了isPermissive()方法,
  42. */
  43. @Override
  44. protected boolean isAccessAllowed(ServletRequest request, ServletResponse response, Object mappedValue) {
  45. if(this.isLoginRequest(request, response))
  46. return true;
  47. boolean allowed = false;
  48. try {
  49. allowed = executeLogin(request, response);
  50. } catch(IllegalStateException e){ //not found any token
  51. log.error("Not found any token");
  52. }catch (Exception e) {
  53. log.error("Error occurs when login", e);
  54. }
  55. return allowed || super.isPermissive(mappedValue);
  56. }
  57. /**
  58. * 这里重写了父类的方法,使用我们自己定义的Token类,提交给shiro。这个方法返回null的话会直接抛出异常,进入isAccessAllowed()的异常处理逻辑。
  59. */
  60. @Override
  61. protected AuthenticationToken createToken(ServletRequest servletRequest, ServletResponse servletResponse) {
  62. String jwtToken = getAuthzHeader(servletRequest);
  63. if (!StringUtils.isEmpty(jwtToken)) {
  64. if (JwtUtils.isTokenExpired(jwtToken)) {
  65. log.error(jwtToken + " 已过期");
  66. return null;
  67. }
  68. return new JWTToken(jwtToken);
  69. }
  70. return null;
  71. }
  72. @Override
  73. protected boolean onAccessDenied(ServletRequest servletRequest, ServletResponse servletResponse) throws Exception {
  74. HttpServletResponse httpResponse = WebUtils.toHttp(servletResponse);
  75. httpResponse.setCharacterEncoding("UTF-8");
  76. httpResponse.setContentType("application/json;charset=UTF-8");
  77. httpResponse.setStatus(HttpServletResponse.SC_UNAUTHORIZED);
  78. fillCorsHeader(WebUtils.toHttp(servletRequest), httpResponse);
  79. httpResponse.getOutputStream().println("401 UNAUTHORIZED");
  80. return false;
  81. }
  82. /**
  83. * 如果Shiro Login认证成功,会进入该方法,等同于用户名密码登录成功,我们这里还判断了是否要刷新Token
  84. */
  85. @Override
  86. protected boolean onLoginSuccess(AuthenticationToken token, Subject subject, ServletRequest request, ServletResponse response) throws Exception {
  87. HttpServletResponse httpResponse = WebUtils.toHttp(response);
  88. String newToken = null;
  89. if(token instanceof JWTToken){
  90. JWTToken jwtToken = (JWTToken)token;
  91. UserDto user = (UserDto) subject.getPrincipal();
  92. boolean shouldRefresh = shouldTokenRefresh(JwtUtils.getIssuedAt(jwtToken.getToken()));
  93. if(shouldRefresh) {
  94. newToken = userService.generateJwtToken(user.getUsername());
  95. }
  96. }
  97. if(!StringUtils.isEmpty(newToken))
  98. httpResponse.setHeader("x-auth-token", newToken);
  99. return true;
  100. }
  101. @Override
  102. protected boolean onLoginFailure(AuthenticationToken token, AuthenticationException e, ServletRequest request, ServletResponse response) {
  103. log.error("Validate token fail, token:{}, error:{}", token.toString(), e.getMessage());
  104. return false;
  105. }
  106. protected String getAuthzHeader(ServletRequest request) {
  107. HttpServletRequest httpRequest = WebUtils.toHttp(request);
  108. String header = httpRequest.getHeader("x-auth-token");
  109. if (StringUtils.startsWithIgnoreCase(header, "Bearer ")) {
  110. return StringUtils.replace(header, "Bearer ", "");
  111. }
  112. return header;
  113. }
  114. protected boolean shouldTokenRefresh(Date issueAt){
  115. LocalDateTime issueTime = LocalDateTime.ofInstant(issueAt.toInstant(), ZoneId.systemDefault());
  116. return LocalDateTime.now().minusSeconds(tokenRefreshInterval).isAfter(issueTime);
  117. }
  118. protected void fillCorsHeader(HttpServletRequest httpServletRequest, HttpServletResponse httpServletResponse){
  119. httpServletResponse.setHeader("Access-control-Allow-Origin", httpServletRequest.getHeader("Origin"));
  120. httpServletResponse.setHeader("Access-Control-Allow-Methods", "GET,POST,OPTIONS,HEAD");
  121. httpServletResponse.setHeader("Access-Control-Allow-Headers", httpServletRequest.getHeader("Access-Control-Request-Headers"));
  122. }
  123. }