JwtAuthFilter.java 6.3 KB

123456789101112131415161718192021222324252627282930313233343536373839404142434445464748495051525354555657585960616263646566676869707172737475767778798081828384858687888990919293949596979899100101102103104105106107108109110111112113114115116117118119120121122123124125126127128129130131132133134135136137138139140141142143144145146147148149150151152153154155156157158
  1. package com.yaozhitech.spring5.filter;
  2. import java.time.LocalDateTime;
  3. import java.time.ZoneId;
  4. import java.util.Date;
  5. import javax.servlet.ServletRequest;
  6. import javax.servlet.ServletResponse;
  7. import javax.servlet.http.HttpServletRequest;
  8. import javax.servlet.http.HttpServletResponse;
  9. import org.apache.shiro.authc.AuthenticationException;
  10. import org.apache.shiro.authc.AuthenticationToken;
  11. import org.apache.shiro.subject.Subject;
  12. import org.apache.shiro.web.filter.authc.AuthenticatingFilter;
  13. import org.apache.shiro.web.util.WebUtils;
  14. import org.springframework.beans.factory.annotation.Value;
  15. import org.springframework.util.StringUtils;
  16. import org.springframework.web.bind.annotation.RequestMethod;
  17. import com.yaozhitech.spring5.dto.UserDto;
  18. import com.yaozhitech.spring5.jwt.JWTToken;
  19. import com.yaozhitech.spring5.service.UserService;
  20. import com.yaozhitech.spring5.utils.JwtUtils;
  21. import lombok.extern.slf4j.Slf4j;
  22. @Slf4j
  23. public class JwtAuthFilter extends AuthenticatingFilter {
  24. @Value("${jwt.header}")
  25. private String tokenHeader;
  26. @Value("${jwt.tokenHead}")
  27. private String tokenHead;
  28. private static final int tokenRefreshInterval = 300;
  29. private UserService userService;
  30. public JwtAuthFilter(UserService userService){
  31. this.userService = userService;
  32. this.setLoginUrl("/login");
  33. }
  34. @Override
  35. protected boolean preHandle(ServletRequest request, ServletResponse response) throws Exception {
  36. HttpServletRequest httpServletRequest = WebUtils.toHttp(request);
  37. if (httpServletRequest.getMethod().equals(RequestMethod.OPTIONS.name())) //对于OPTION请求做拦截,不做token校验
  38. return false;
  39. return super.preHandle(request, response);
  40. }
  41. @Override
  42. protected void postHandle(ServletRequest request, ServletResponse response){
  43. this.fillCorsHeader(WebUtils.toHttp(request), WebUtils.toHttp(response));
  44. request.setAttribute("jwtShiroFilter.FILTERED", true);
  45. }
  46. /**
  47. * 父类会在请求进入拦截器后调用该方法,返回true则继续,返回false则会调用onAccessDenied()。这里在不通过时,还调用了isPermissive()方法,
  48. */
  49. @Override
  50. protected boolean isAccessAllowed(ServletRequest request, ServletResponse response, Object mappedValue) {
  51. if(this.isLoginRequest(request, response))
  52. return true;
  53. Boolean afterFiltered = (Boolean)(request.getAttribute("jwtShiroFilter.FILTERED"));
  54. if(afterFiltered != null && afterFiltered)
  55. return true;
  56. boolean allowed = false;
  57. try {
  58. allowed = executeLogin(request, response);
  59. } catch(IllegalStateException e){ //not found any token
  60. log.error("Not found any token", e);
  61. }catch (Exception e) {
  62. log.error("Error occurs when login", e);
  63. }
  64. return allowed;// || super.isPermissive(mappedValue);
  65. }
  66. /**
  67. * 这里重写了父类的方法,使用我们自己定义的Token类,提交给shiro。这个方法返回null的话会直接抛出异常,进入isAccessAllowed()的异常处理逻辑。
  68. */
  69. @Override
  70. protected AuthenticationToken createToken(ServletRequest servletRequest, ServletResponse servletResponse) {
  71. String jwtToken = getAuthzHeader(servletRequest);
  72. if(!StringUtils.isEmpty(jwtToken)&&!JwtUtils.isTokenExpired(jwtToken))
  73. return new JWTToken(jwtToken);
  74. return null;
  75. }
  76. @Override
  77. protected boolean onAccessDenied(ServletRequest servletRequest, ServletResponse servletResponse) throws Exception {
  78. HttpServletRequest httpServletRequest = WebUtils.toHttp(servletRequest);
  79. HttpServletResponse httpResponse = WebUtils.toHttp(servletResponse);
  80. // 返回401
  81. httpResponse.setStatus(HttpServletResponse.SC_UNAUTHORIZED);
  82. httpResponse.getOutputStream().println("401 UNAUTHORIZED");
  83. // 设置响应码为401或者直接输出消息
  84. String url = httpServletRequest.getRequestURI();
  85. log.error("onAccessDenied url:{}", url);
  86. return false;
  87. }
  88. /**
  89. * 如果Shiro Login认证成功,会进入该方法,等同于用户名密码登录成功,我们这里还判断了是否要刷新Token
  90. */
  91. @Override
  92. protected boolean onLoginSuccess(AuthenticationToken token, Subject subject, ServletRequest request, ServletResponse response) throws Exception {
  93. HttpServletResponse httpResponse = WebUtils.toHttp(response);
  94. String newToken = null;
  95. if(token instanceof JWTToken){
  96. JWTToken jwtToken = (JWTToken)token;
  97. UserDto user = (UserDto) subject.getPrincipal();
  98. boolean shouldRefresh = shouldTokenRefresh(JwtUtils.getIssuedAt(jwtToken.getToken()));
  99. if(shouldRefresh) {
  100. newToken = userService.generateJwtToken(user.getUsername());
  101. }
  102. }
  103. if(!StringUtils.isEmpty(newToken))
  104. httpResponse.setHeader("x-auth-token", newToken);
  105. return true;
  106. }
  107. @Override
  108. protected boolean onLoginFailure(AuthenticationToken token, AuthenticationException e, ServletRequest request, ServletResponse response) {
  109. log.error("Validate token fail, token:{}, error:{}", token.toString(), e.getMessage());
  110. return false;
  111. }
  112. protected String getAuthzHeader(ServletRequest request) {
  113. HttpServletRequest httpRequest = WebUtils.toHttp(request);
  114. String header = httpRequest.getHeader("x-auth-token");
  115. if (StringUtils.startsWithIgnoreCase(header, "Bearer ")) {
  116. return StringUtils.replace(header, "Bearer ", "");
  117. }
  118. return header;
  119. }
  120. protected boolean shouldTokenRefresh(Date issueAt){
  121. LocalDateTime issueTime = LocalDateTime.ofInstant(issueAt.toInstant(), ZoneId.systemDefault());
  122. return LocalDateTime.now().minusSeconds(tokenRefreshInterval).isAfter(issueTime);
  123. }
  124. protected void fillCorsHeader(HttpServletRequest httpServletRequest, HttpServletResponse httpServletResponse){
  125. httpServletResponse.setHeader("Access-control-Allow-Origin", httpServletRequest.getHeader("Origin"));
  126. httpServletResponse.setHeader("Access-Control-Allow-Methods", "GET,POST,OPTIONS,HEAD");
  127. httpServletResponse.setHeader("Access-Control-Allow-Headers", httpServletRequest.getHeader("Access-Control-Request-Headers"));
  128. }
  129. }