JwtAuthFilter.java 5.8 KB

123456789101112131415161718192021222324252627282930313233343536373839404142434445464748495051525354555657585960616263646566676869707172737475767778798081828384858687888990919293949596979899100101102103104105106107108109110111112113114115116117118119120121122123124125126127128129130131132133134135136137138139140141142143
  1. package com.yaozhitech.spring5.filter;
  2. import java.time.LocalDateTime;
  3. import java.time.ZoneId;
  4. import java.util.Date;
  5. import javax.servlet.ServletRequest;
  6. import javax.servlet.ServletResponse;
  7. import javax.servlet.http.HttpServletRequest;
  8. import javax.servlet.http.HttpServletResponse;
  9. import org.apache.shiro.authc.AuthenticationException;
  10. import org.apache.shiro.authc.AuthenticationToken;
  11. import org.apache.shiro.subject.Subject;
  12. import org.apache.shiro.web.filter.authc.AuthenticatingFilter;
  13. import org.apache.shiro.web.util.WebUtils;
  14. import org.springframework.http.HttpStatus;
  15. import org.springframework.util.StringUtils;
  16. import org.springframework.web.bind.annotation.RequestMethod;
  17. import com.yaozhitech.spring5.dto.UserDto;
  18. import com.yaozhitech.spring5.jwt.JWTToken;
  19. import com.yaozhitech.spring5.service.UserService;
  20. import com.yaozhitech.spring5.utils.JwtUtils;
  21. import lombok.extern.slf4j.Slf4j;
  22. @Slf4j
  23. public class JwtAuthFilter extends AuthenticatingFilter {
  24. private static final int tokenRefreshInterval = 300;
  25. private UserService userService;
  26. public JwtAuthFilter(UserService userService){
  27. this.userService = userService;
  28. this.setLoginUrl("/login");
  29. }
  30. @Override
  31. protected boolean preHandle(ServletRequest request, ServletResponse response) throws Exception {
  32. HttpServletRequest httpServletRequest = WebUtils.toHttp(request);
  33. if (httpServletRequest.getMethod().equals(RequestMethod.OPTIONS.name())) //对于OPTION请求做拦截,不做token校验
  34. return false;
  35. return super.preHandle(request, response);
  36. }
  37. @Override
  38. protected void postHandle(ServletRequest request, ServletResponse response){
  39. this.fillCorsHeader(WebUtils.toHttp(request), WebUtils.toHttp(response));
  40. }
  41. /**
  42. * 父类会在请求进入拦截器后调用该方法,返回true则继续,返回false则会调用onAccessDenied()。这里在不通过时,还调用了isPermissive()方法,
  43. */
  44. @Override
  45. protected boolean isAccessAllowed(ServletRequest request, ServletResponse response, Object mappedValue) {
  46. if(this.isLoginRequest(request, response))
  47. return true;
  48. boolean allowed = false;
  49. try {
  50. allowed = executeLogin(request, response);
  51. } catch(IllegalStateException e){ //not found any token
  52. log.error("Not found any token");
  53. }catch (Exception e) {
  54. log.error("Error occurs when login", e);
  55. }
  56. return allowed || super.isPermissive(mappedValue);
  57. }
  58. /**
  59. * 这里重写了父类的方法,使用我们自己定义的Token类,提交给shiro。这个方法返回null的话会直接抛出异常,进入isAccessAllowed()的异常处理逻辑。
  60. */
  61. @Override
  62. protected AuthenticationToken createToken(ServletRequest servletRequest, ServletResponse servletResponse) {
  63. String jwtToken = getAuthzHeader(servletRequest);
  64. if(!StringUtils.isEmpty(jwtToken)&&!JwtUtils.isTokenExpired(jwtToken))
  65. return new JWTToken(jwtToken);
  66. return null;
  67. }
  68. @Override
  69. protected boolean onAccessDenied(ServletRequest servletRequest, ServletResponse servletResponse) throws Exception {
  70. HttpServletResponse httpResponse = WebUtils.toHttp(servletResponse);
  71. httpResponse.setCharacterEncoding("UTF-8");
  72. httpResponse.setContentType("application/json;charset=UTF-8");
  73. httpResponse.setStatus(HttpStatus.UNAUTHORIZED.ordinal());
  74. fillCorsHeader(WebUtils.toHttp(servletRequest), httpResponse);
  75. return false;
  76. }
  77. /**
  78. * 如果Shiro Login认证成功,会进入该方法,等同于用户名密码登录成功,我们这里还判断了是否要刷新Token
  79. */
  80. @Override
  81. protected boolean onLoginSuccess(AuthenticationToken token, Subject subject, ServletRequest request, ServletResponse response) throws Exception {
  82. HttpServletResponse httpResponse = WebUtils.toHttp(response);
  83. String newToken = null;
  84. if(token instanceof JWTToken){
  85. JWTToken jwtToken = (JWTToken)token;
  86. UserDto user = (UserDto) subject.getPrincipal();
  87. boolean shouldRefresh = shouldTokenRefresh(JwtUtils.getIssuedAt(jwtToken.getToken()));
  88. if(shouldRefresh) {
  89. newToken = userService.generateJwtToken(user.getUsername());
  90. }
  91. }
  92. if(!StringUtils.isEmpty(newToken))
  93. httpResponse.setHeader("x-auth-token", newToken);
  94. return true;
  95. }
  96. @Override
  97. protected boolean onLoginFailure(AuthenticationToken token, AuthenticationException e, ServletRequest request, ServletResponse response) {
  98. log.error("Validate token fail, token:{}, error:{}", token.toString(), e.getMessage());
  99. return false;
  100. }
  101. protected String getAuthzHeader(ServletRequest request) {
  102. HttpServletRequest httpRequest = WebUtils.toHttp(request);
  103. String header = httpRequest.getHeader("x-auth-token");
  104. if (StringUtils.startsWithIgnoreCase(header, "Bearer ")) {
  105. return StringUtils.replace(header, "Bearer ", "");
  106. }
  107. return header;
  108. }
  109. protected boolean shouldTokenRefresh(Date issueAt){
  110. LocalDateTime issueTime = LocalDateTime.ofInstant(issueAt.toInstant(), ZoneId.systemDefault());
  111. return LocalDateTime.now().minusSeconds(tokenRefreshInterval).isAfter(issueTime);
  112. }
  113. protected void fillCorsHeader(HttpServletRequest httpServletRequest, HttpServletResponse httpServletResponse){
  114. httpServletResponse.setHeader("Access-control-Allow-Origin", httpServletRequest.getHeader("Origin"));
  115. httpServletResponse.setHeader("Access-Control-Allow-Methods", "GET,POST,OPTIONS,HEAD");
  116. httpServletResponse.setHeader("Access-Control-Allow-Headers", httpServletRequest.getHeader("Access-Control-Request-Headers"));
  117. }
  118. }