JwtAuthFilter.java 6.1 KB

123456789101112131415161718192021222324252627282930313233343536373839404142434445464748495051525354555657585960616263646566676869707172737475767778798081828384858687888990919293949596979899100101102103104105106107108109110111112113114115116117118119120121122123124125126127128129130131132133134135136137138139140141142143144145146147148149150151152153
  1. package com.yaozhitech.spring5.filter;
  2. import java.time.LocalDateTime;
  3. import java.time.ZoneId;
  4. import java.util.Date;
  5. import javax.servlet.ServletRequest;
  6. import javax.servlet.ServletResponse;
  7. import javax.servlet.http.HttpServletRequest;
  8. import javax.servlet.http.HttpServletResponse;
  9. import org.apache.shiro.authc.AuthenticationException;
  10. import org.apache.shiro.authc.AuthenticationToken;
  11. import org.apache.shiro.subject.Subject;
  12. import org.apache.shiro.web.filter.authc.AuthenticatingFilter;
  13. import org.apache.shiro.web.util.WebUtils;
  14. import org.springframework.beans.factory.annotation.Value;
  15. import org.springframework.util.StringUtils;
  16. import org.springframework.web.bind.annotation.RequestMethod;
  17. import com.yaozhitech.spring5.dto.UserDto;
  18. import com.yaozhitech.spring5.jwt.JWTToken;
  19. import com.yaozhitech.spring5.service.JwtUserService;
  20. import com.yaozhitech.spring5.utils.JwtUtils;
  21. import lombok.extern.slf4j.Slf4j;
  22. @Slf4j
  23. public class JwtAuthFilter extends AuthenticatingFilter {
  24. @Value("${jwt.header}")
  25. private String tokenHeader;
  26. @Value("${jwt.tokenHead}")
  27. private String tokenHead;
  28. private static final int tokenRefreshInterval = 300;
  29. private JwtUserService userService;
  30. public JwtAuthFilter(JwtUserService userService){
  31. this.userService = userService;
  32. this.setLoginUrl("/login");
  33. }
  34. @Override
  35. protected boolean preHandle(ServletRequest request, ServletResponse response) throws Exception {
  36. HttpServletRequest httpServletRequest = WebUtils.toHttp(request);
  37. if (httpServletRequest.getMethod().equals(RequestMethod.OPTIONS.name())) //对于OPTION请求做拦截,不做token校验
  38. return false;
  39. return super.preHandle(request, response);
  40. }
  41. @Override
  42. protected void postHandle(ServletRequest request, ServletResponse response){
  43. this.fillCorsHeader(WebUtils.toHttp(request), WebUtils.toHttp(response));
  44. }
  45. /**
  46. * 父类会在请求进入拦截器后调用该方法,返回true则继续,返回false则会调用onAccessDenied()。这里在不通过时,还调用了isPermissive()方法,
  47. */
  48. @Override
  49. protected boolean isAccessAllowed(ServletRequest request, ServletResponse response, Object mappedValue) {
  50. if(this.isLoginRequest(request, response))
  51. return true;
  52. boolean allowed = false;
  53. try {
  54. allowed = executeLogin(request, response);
  55. } catch(IllegalStateException e){ //not found any token
  56. log.error("Not found any token", e);
  57. }catch (Exception e) {
  58. log.error("Error occurs when login", e);
  59. }
  60. return allowed;// || super.isPermissive(mappedValue);
  61. }
  62. /**
  63. * 这里重写了父类的方法,使用我们自己定义的Token类,提交给shiro。这个方法返回null的话会直接抛出异常,进入isAccessAllowed()的异常处理逻辑。
  64. */
  65. @Override
  66. protected AuthenticationToken createToken(ServletRequest servletRequest, ServletResponse servletResponse) {
  67. String jwtToken = getAuthzHeader(servletRequest);
  68. if(!StringUtils.isEmpty(jwtToken)&&!JwtUtils.isTokenExpired(jwtToken))
  69. return new JWTToken(jwtToken);
  70. return null;
  71. }
  72. @Override
  73. protected boolean onAccessDenied(ServletRequest servletRequest, ServletResponse servletResponse) throws Exception {
  74. HttpServletRequest httpServletRequest = WebUtils.toHttp(servletRequest);
  75. HttpServletResponse httpResponse = WebUtils.toHttp(servletResponse);
  76. // 返回401
  77. httpResponse.setStatus(HttpServletResponse.SC_UNAUTHORIZED);
  78. httpResponse.getOutputStream().println("401 UNAUTHORIZED");
  79. // 设置响应码为401或者直接输出消息
  80. String url = httpServletRequest.getRequestURI();
  81. log.error("onAccessDenied url:{}", url);
  82. return false;
  83. }
  84. /**
  85. * 如果Shiro Login认证成功,会进入该方法,等同于用户名密码登录成功,我们这里还判断了是否要刷新Token
  86. */
  87. @Override
  88. protected boolean onLoginSuccess(AuthenticationToken token, Subject subject, ServletRequest request, ServletResponse response) throws Exception {
  89. HttpServletResponse httpResponse = WebUtils.toHttp(response);
  90. String newToken = null;
  91. if(token instanceof JWTToken){
  92. JWTToken jwtToken = (JWTToken)token;
  93. UserDto user = (UserDto) subject.getPrincipal();
  94. boolean shouldRefresh = shouldTokenRefresh(JwtUtils.getIssuedAt(jwtToken.getToken()));
  95. if(shouldRefresh) {
  96. newToken = userService.generateJwtToken(user.getUsername());
  97. }
  98. }
  99. if(!StringUtils.isEmpty(newToken))
  100. httpResponse.setHeader("x-auth-token", newToken);
  101. return true;
  102. }
  103. @Override
  104. protected boolean onLoginFailure(AuthenticationToken token, AuthenticationException e, ServletRequest request, ServletResponse response) {
  105. log.error("Validate token fail, token:{}, error:{}", token.toString(), e.getMessage());
  106. return false;
  107. }
  108. protected String getAuthzHeader(ServletRequest request) {
  109. HttpServletRequest httpRequest = WebUtils.toHttp(request);
  110. String header = httpRequest.getHeader("x-auth-token");
  111. if (StringUtils.startsWithIgnoreCase(header, "Bearer ")) {
  112. return StringUtils.replace(header, "Bearer ", "");
  113. }
  114. return header;
  115. }
  116. protected boolean shouldTokenRefresh(Date issueAt){
  117. LocalDateTime issueTime = LocalDateTime.ofInstant(issueAt.toInstant(), ZoneId.systemDefault());
  118. return LocalDateTime.now().minusSeconds(tokenRefreshInterval).isAfter(issueTime);
  119. }
  120. protected void fillCorsHeader(HttpServletRequest httpServletRequest, HttpServletResponse httpServletResponse){
  121. httpServletResponse.setHeader("Access-control-Allow-Origin", httpServletRequest.getHeader("Origin"));
  122. httpServletResponse.setHeader("Access-Control-Allow-Methods", "GET,POST,OPTIONS,HEAD");
  123. httpServletResponse.setHeader("Access-Control-Allow-Headers", httpServletRequest.getHeader("Access-Control-Request-Headers"));
  124. }
  125. }