JwtTokenUtil.java 4.9 KB

123456789101112131415161718192021222324252627282930313233343536373839404142434445464748495051525354555657585960616263646566676869707172737475767778798081828384858687888990919293949596979899100101102103104105106107108109110111112113114115116117118119120121122123124125126127128129130131132133134
  1. package com.izouma.nineth.security;
  2. import com.izouma.nineth.domain.UserToken;
  3. import com.izouma.nineth.repo.UserTokenRepo;
  4. import edu.umd.cs.findbugs.annotations.SuppressFBWarnings;
  5. import io.jsonwebtoken.Claims;
  6. import io.jsonwebtoken.Clock;
  7. import io.jsonwebtoken.Jwts;
  8. import io.jsonwebtoken.SignatureAlgorithm;
  9. import io.jsonwebtoken.impl.DefaultClock;
  10. import org.springframework.security.core.userdetails.UserDetails;
  11. import org.springframework.stereotype.Component;
  12. import java.io.Serializable;
  13. import java.util.Date;
  14. import java.util.HashMap;
  15. import java.util.Map;
  16. import java.util.function.Function;
  17. @Component
  18. public class JwtTokenUtil implements Serializable {
  19. private static final long serialVersionUID = -3301605591108950415L;
  20. static final String CLAIM_KEY_USERNAME = "sub";
  21. static final String CLAIM_KEY_CREATED = "iat";
  22. @SuppressFBWarnings(value = "SE_BAD_FIELD", justification = "It's okay here")
  23. private Clock clock = DefaultClock.INSTANCE;
  24. private JwtConfig jwtConfig;
  25. private final UserTokenRepo userTokenRepo;
  26. public JwtTokenUtil(JwtConfig jwtConfig, UserTokenRepo userTokenRepo) {
  27. this.jwtConfig = jwtConfig;
  28. this.userTokenRepo = userTokenRepo;
  29. }
  30. public String getUsernameFromToken(String token) {
  31. return getClaimFromToken(token, Claims::getSubject);
  32. }
  33. public Date getIssuedAtDateFromToken(String token) {
  34. return getClaimFromToken(token, Claims::getIssuedAt);
  35. }
  36. public Date getExpirationDateFromToken(String token) {
  37. return getClaimFromToken(token, Claims::getExpiration);
  38. }
  39. public <T> T getClaimFromToken(String token, Function<Claims, T> claimsResolver) {
  40. final Claims claims = getAllClaimsFromToken(token);
  41. return claimsResolver.apply(claims);
  42. }
  43. private Claims getAllClaimsFromToken(String token) {
  44. return Jwts.parser()
  45. .setSigningKey(jwtConfig.getSecret())
  46. .parseClaimsJws(token)
  47. .getBody();
  48. }
  49. private Boolean isTokenExpired(String token) {
  50. final Date expiration = getExpirationDateFromToken(token);
  51. return expiration.before(clock.now()) || !userTokenRepo.findFirstByToken(token).isPresent();
  52. }
  53. private Boolean isCreatedBeforeLastPasswordReset(Date created, Date lastPasswordReset) {
  54. return (lastPasswordReset != null && created.before(lastPasswordReset));
  55. }
  56. private Boolean ignoreTokenExpiration(String token) {
  57. // here you specify tokens, for that the expiration is ignored
  58. return false;
  59. }
  60. public String generateToken(UserDetails userDetails) {
  61. JwtUser jwtUser = (JwtUser) userDetails;
  62. Map<String, Object> claims = new HashMap<>();
  63. String token = doGenerateToken(claims, userDetails.getUsername());
  64. userTokenRepo.deleteByUserId(jwtUser.getUser().getId());
  65. userTokenRepo.save(new UserToken(jwtUser.getUser().getId(), token));
  66. return token;
  67. }
  68. public String doGenerateToken(Map<String, Object> claims, String subject) {
  69. final Date createdDate = clock.now();
  70. final Date expirationDate = calculateExpirationDate(createdDate);
  71. return Jwts.builder()
  72. .setClaims(claims)
  73. .setSubject(subject)
  74. .setIssuedAt(createdDate)
  75. .setExpiration(expirationDate)
  76. .signWith(SignatureAlgorithm.HS512, jwtConfig.getSecret())
  77. .compact();
  78. }
  79. public Boolean canTokenBeRefreshed(String token, Date lastPasswordReset) {
  80. final Date created = getIssuedAtDateFromToken(token);
  81. return !isCreatedBeforeLastPasswordReset(created, lastPasswordReset)
  82. && (!isTokenExpired(token) || ignoreTokenExpiration(token));
  83. }
  84. public String refreshToken(String token) {
  85. final Date createdDate = clock.now();
  86. final Date expirationDate = calculateExpirationDate(createdDate);
  87. final Claims claims = getAllClaimsFromToken(token);
  88. claims.setIssuedAt(createdDate);
  89. claims.setExpiration(expirationDate);
  90. return Jwts.builder()
  91. .setClaims(claims)
  92. .signWith(SignatureAlgorithm.HS512, jwtConfig.getSecret())
  93. .compact();
  94. }
  95. public Boolean validateToken(String token, UserDetails userDetails) {
  96. JwtUser user = (JwtUser) userDetails;
  97. final String username = getUsernameFromToken(token);
  98. final Date created = getIssuedAtDateFromToken(token);
  99. //final Date expiration = getExpirationDateFromToken(token);
  100. return (
  101. username.equals(user.getUsername())
  102. && !isTokenExpired(token)
  103. && !isCreatedBeforeLastPasswordReset(created, user.getLastPasswordResetDate())
  104. );
  105. }
  106. private Date calculateExpirationDate(Date createdDate) {
  107. return new Date(createdDate.getTime() + jwtConfig.getExpiration() * 1000);
  108. }
  109. }