-
Notifications
You must be signed in to change notification settings - Fork 19
Expand file tree
/
Copy pathJwtProvider.java
More file actions
103 lines (85 loc) · 3.77 KB
/
JwtProvider.java
File metadata and controls
103 lines (85 loc) · 3.77 KB
1
2
3
4
5
6
7
8
9
10
11
12
13
14
15
16
17
18
19
20
21
22
23
24
25
26
27
28
29
30
31
32
33
34
35
36
37
38
39
40
41
42
43
44
45
46
47
48
49
50
51
52
53
54
55
56
57
58
59
60
61
62
63
64
65
66
67
68
69
70
71
72
73
74
75
76
77
78
79
80
81
82
83
84
85
86
87
88
89
90
91
92
93
94
95
96
97
98
99
100
101
102
103
package com.dku.springstudy.auth;
import com.dku.springstudy.member.service.MemberDetailService;
import com.fasterxml.jackson.databind.ObjectMapper;
import io.jsonwebtoken.*;
import lombok.RequiredArgsConstructor;
import lombok.extern.slf4j.Slf4j;
import org.springframework.security.authentication.UsernamePasswordAuthenticationToken;
import org.springframework.security.core.Authentication;
import org.springframework.security.core.userdetails.UserDetails;
import org.springframework.stereotype.Service;
import javax.servlet.http.HttpServletRequest;
import java.io.IOException;
import java.text.SimpleDateFormat;
import java.util.*;
@Service
@RequiredArgsConstructor
@Slf4j
public class JwtProvider {
private final MemberDetailService memberDetailService;
private final SecretKey secretKey;
public String createAccessToken(String payload) {
Claims claims = Jwts.claims().setSubject(payload);
Date now = new Date();
Date validityTime = new Date(now.getTime() + secretKey.getJwtValidityTime());
return Jwts.builder()
.setClaims(claims)
.setIssuedAt(now)
.setExpiration(validityTime)
.signWith(SignatureAlgorithm.HS256, secretKey.getJwtSecretKey())
.compact();
}
public Authentication getAuthentication(String token) {
UserDetails userDetails = memberDetailService.loadUserByUsername(this.extractEmail(token));
return new UsernamePasswordAuthenticationToken(userDetails, "", userDetails.getAuthorities());
}
public String extractEmail(String token) {
return (String) Jwts.parser().setSigningKey(secretKey.getJwtSecretKey()).parseClaimsJws(token).getBody().get("email");
}
public String resolveToken(HttpServletRequest request) {
String header = request.getHeader("Authorization");
if (header == null) {
return null;
}
return header.replace("Bearer ", "");
}
public boolean validateJwtToken(String token) {
try {
Jws<Claims> claims = Jwts.parser().setSigningKey(secretKey.getJwtSecretKey())
.parseClaimsJws(token);
return !claims.getBody().getExpiration().before(new Date());
} catch (JwtException | IllegalArgumentException e) {
throw new IllegalArgumentException("유효하지 않은 토큰 정보입니다.");
}
}
public Map<String, String> createRefreshToken(String payload) {
Claims claims = Jwts.claims().setSubject(payload);
Date now = new Date();
Date validityTime = new Date(now.getTime() + secretKey.getJwtValidityTime());
SimpleDateFormat simpleDateFormat = new SimpleDateFormat("yyyy-MM-dd HH:mm:ss", Locale.ENGLISH);
String refreshTokenExpirationAt = simpleDateFormat.format(validityTime);
String jwt = Jwts.builder()
.setClaims(claims)
.setIssuedAt(now)
.setExpiration(validityTime)
.signWith(SignatureAlgorithm.HS256, secretKey.getJwtSecretKey())
.compact();
Map<String, String> result = new HashMap<>();
result.put("refreshToken", jwt);
result.put("refreshTokenExpirationAt", refreshTokenExpirationAt);
return result;
}
public Long getTokenExpireTime(String accessToken) {
Base64.Decoder decoder = Base64.getUrlDecoder();
String[] parts = accessToken.split("\\.");
ObjectMapper mapper = new ObjectMapper();
String payload = new String(decoder.decode(parts[1]));
Map exp = null;
try {
exp = mapper.readValue(payload, Map.class);
return ((Number) exp.get("exp")).longValue();
} catch (IOException err) {
throw new RuntimeException(err);
}
}
}