JwtAuthExtension.cs 3.8 KB

1234567891011121314151617181920212223242526272829303132333435363738394041424344454647484950515253545556575859606162636465666768697071727374757677787980818283848586
  1. using IdentityModel;
  2. using Microsoft.AspNetCore.Authentication.JwtBearer;
  3. using Microsoft.AspNetCore.Authorization;
  4. using Microsoft.Extensions.Configuration;
  5. using Microsoft.Extensions.DependencyInjection;
  6. using Microsoft.IdentityModel.Tokens;
  7. using System;
  8. using System.Threading.Tasks;
  9. using System.Security.Claims;
  10. using System.IdentityModel.Tokens.Jwt;
  11. using System.Collections.Generic;
  12. using System.Text;
  13. namespace TEAMModelOS.SDK.Extension
  14. {
  15. public static class JwtAuthExtension
  16. {
  17. public static string CreateAuthToken(string issuer, string userID, string salt, string[] roles = null, string[] permissions = null, int expire = 1)
  18. {
  19. // 設定要加入到 JWT Token 中的聲明資訊(Claims)
  20. var claims = new List<Claim>();
  21. // 在 RFC 7519 規格中(Section#4),總共定義了 7 個預設的 Claims
  22. claims.Add(new Claim(JwtRegisteredClaimNames.Iss, issuer)); //發行者
  23. claims.Add(new Claim(JwtRegisteredClaimNames.Sub, userID)); // 用戶ID
  24. claims.Add(new Claim(JwtRegisteredClaimNames.Exp, DateTimeOffset.UtcNow.AddHours(expire).ToUnixTimeSeconds().ToString())); // 到期的時間,必須為數字
  25. // 擴充 "roles" 加入登入者的角色,角色類型 (USER、HABOOK)
  26. foreach (var role in roles)
  27. {
  28. claims.Add(new Claim("roles", role));
  29. }
  30. // 擴充 "permissions" 加入登入者的權限請求
  31. foreach (var role in permissions)
  32. {
  33. claims.Add(new Claim("permissions", role));
  34. }
  35. // 建立一組對稱式加密的金鑰,主要用於 JWT 簽章之用
  36. var securityKey = new SymmetricSecurityKey(Encoding.UTF8.GetBytes(salt));
  37. // HmacSha256 有要求必須要大於 128 bits,所以 salt 不能太短,至少要 16 字元以上
  38. // https://stackoverflow.com/questions/47279947/idx10603-the-algorithm-hs256-requires-the-securitykey-keysize-to-be-greater
  39. var signingCredentials = new SigningCredentials(securityKey, SecurityAlgorithms.HmacSha256Signature);
  40. // 建立 SecurityTokenDescriptor
  41. var tokenDescriptor = new SecurityTokenDescriptor
  42. {
  43. Issuer = issuer,
  44. Subject = new ClaimsIdentity(claims),
  45. Expires = DateTime.Now.AddHours(expire),
  46. SigningCredentials = signingCredentials
  47. };
  48. // 產出所需要的 JWT securityToken 物件,並取得序列化後的 Token 結果(字串格式)
  49. var tokenHandler = new JwtSecurityTokenHandler();
  50. var securityToken = tokenHandler.CreateToken(tokenDescriptor);
  51. var serializeToken = tokenHandler.WriteToken(securityToken);
  52. return serializeToken;
  53. }
  54. public static bool ValidateAuthToken(string token, string salt)
  55. {
  56. try
  57. {
  58. var handler = new JwtSecurityTokenHandler();
  59. var validationParameters = new TokenValidationParameters
  60. {
  61. RequireExpirationTime = true,
  62. ValidateIssuer = false,
  63. ValidateAudience = false,
  64. IssuerSigningKey = new SymmetricSecurityKey(Encoding.UTF8.GetBytes(salt)),
  65. ValidateLifetime = false,
  66. //LifetimeValidator = LifetimeValidator,
  67. ClockSkew = TimeSpan.Zero
  68. };
  69. ClaimsPrincipal principal = handler.ValidateToken(token, validationParameters, out SecurityToken securityToken);
  70. return true;
  71. }
  72. catch (Exception ex)
  73. {
  74. //Trace.WriteLine(ex.Message);
  75. return false;
  76. }
  77. }
  78. }
  79. }