JwtHelper.cs 3.5 KB

1234567891011121314151617181920212223242526272829303132333435363738394041424344454647484950515253545556575859606162636465666768697071727374757677787980
  1. using TEAMModelOS.SDK.Extension.JwtAuth.Models;
  2. using IdentityModel;
  3. using Microsoft.IdentityModel.Tokens;
  4. using System;
  5. using System.Collections.Generic;
  6. using System.IdentityModel.Tokens.Jwt;
  7. using System.Linq;
  8. using System.Security.Claims;
  9. using System.Text;
  10. using TEAMModelOS.SDK.Helper.Common.DateTimeHelper;
  11. using TEAMModelOS.SDK.Context.Configuration;
  12. using System.Security.Cryptography;
  13. namespace TEAMModelOS.SDK.Extension.JwtAuth.JwtHelper
  14. {
  15. public class JwtHelper
  16. {
  17. /// <summary>
  18. /// 颁发JWT Token
  19. /// </summary>
  20. /// <param name="claimModel"></param>
  21. /// <param name="tokenModel"></param>
  22. /// <returns></returns>
  23. public static JwtResponse IssueJWT(ClaimModel claimModel, JwtSetting setting)
  24. {
  25. // JwtClient jwtClient = null;
  26. JwtClient jwtClient= setting.JwtClient.Where(x => x.Name.Equals(claimModel.Scope)).First();
  27. //foreach (JwtClient client in setting.JwtClient) {
  28. // if (claimModel.Scope.Equals(client.Name)) {
  29. // jwtClient = client;
  30. // break;
  31. // }
  32. //}
  33. List<Claim> claims = new List<Claim>();
  34. var dateTime = DateTimeHelper.ConvertToTimeStamp10(DateTime.Now);
  35. claims.AddRange(claimModel.Claims);
  36. claims.Add(new Claim(JwtClaimTypes.IssuedAt, dateTime + "", ClaimValueTypes.Integer64));
  37. claims.Add(new Claim(JwtClaimTypes.NotBefore, dateTime + "", ClaimValueTypes.Integer64));
  38. claims.Add(new Claim(JwtClaimTypes.Expiration, dateTime + jwtClient.Exp + "", ClaimValueTypes.Integer64));
  39. claims.Add(new Claim(JwtClaimTypes.Audience, setting.Audience));
  40. claims.Add(new Claim(JwtClaimTypes.Issuer, setting.Issuer));
  41. claims.Add(new Claim(JwtClaimTypes.Scope, claimModel.Scope));
  42. claims.AddRange(claimModel.Roles.ToArray().Select(s=>new Claim(JwtClaimTypes.Role,s)));
  43. string path = BaseConfigModel.ContentRootPath;
  44. RSACryptoServiceProvider provider = RsaHelper.LoadCertificateFile(path + "/private.pem");
  45. RsaSecurityKey rsaSecurity = new RsaSecurityKey(provider);
  46. var creds =new SigningCredentials(rsaSecurity, SecurityAlgorithms.RsaSha256);
  47. var jwt = new JwtSecurityToken(
  48. claims:claims,
  49. signingCredentials:creds
  50. );
  51. var jwtHandler = new JwtSecurityTokenHandler();
  52. return new JwtResponse {
  53. access_token = jwtHandler.WriteToken(jwt),
  54. scope = claimModel.Scope
  55. };
  56. }
  57. /// <summary>
  58. /// 解析jwt
  59. /// </summary>
  60. /// <param name="jwtStr"></param>
  61. /// <returns></returns>
  62. public static ClaimModel SerializeJWT(string jwtStr)
  63. {
  64. ///https://www.cnblogs.com/JacZhu/p/6837676.html#Update2.0 刷新 用户的 Token 在过期时间之内根本无法手动设置失效,随之而来的还有重放攻击等等问题
  65. var jwtHandler = new JwtSecurityTokenHandler();
  66. JwtSecurityToken jwtToken = jwtHandler.ReadJwtToken(jwtStr);
  67. ClaimModel claimModel = new ClaimModel();
  68. object role = new object();
  69. claimModel.Claims = jwtToken.Claims.ToList();
  70. jwtToken.Payload.TryGetValue("role", out role);
  71. if(role!=null)claimModel.Roles=role.ToString().Split(",").ToList();
  72. return claimModel;
  73. }
  74. }
  75. }