JwtHelper.cs 4.3 KB

123456789101112131415161718192021222324252627282930313233343536373839404142434445464748495051525354555657585960616263646566676869707172737475767778798081828384858687888990919293949596979899100101102103104105106107108109110111112113114115116117118
  1. using SqlSugar.Extensions;
  2. using System.IdentityModel.Tokens.Jwt;
  3. using System.Security.Claims;
  4. namespace OASystem.API.OAMethodLib
  5. {
  6. public class JWTHelper
  7. {
  8. public class JwtHelper
  9. {
  10. /// <summary>
  11. /// 颁发JWT字符串
  12. /// </summary>
  13. /// <param name="tokenModel"></param>
  14. /// <returns></returns>
  15. public static string IssueJwt(TokenModelJwt tokenModel)
  16. {
  17. // appsettign.json 操作类
  18. string iss = "Issuer";
  19. string aud = "Audience";
  20. string secret = "Audience";
  21. var claims = new List<Claim>
  22. {
  23. /*
  24. * 特别重要:
  25. 1、这里将用户的部分信息,比如 uid 存到了Claim 中,如果你想知道如何在其他地方将这个 uid从 Token 中取出来,请看下边的SerializeJwt() 方法,或者在整个解决方案,搜索这个方法,看哪里使用了!
  26. 2、你也可以研究下 HttpContext.User.Claims ,具体的你可以看看 Policys/PermissionHandler.cs 类中是如何使用的。
  27. */
  28. new Claim(JwtRegisteredClaimNames.Jti, tokenModel.Uid.ToString()),
  29. new Claim(JwtRegisteredClaimNames.Iat, $"{new DateTimeOffset(DateTime.Now).ToUnixTimeSeconds()}"),
  30. new Claim(JwtRegisteredClaimNames.Nbf,$"{new DateTimeOffset(DateTime.Now).ToUnixTimeSeconds()}") ,
  31. //这个就是过期时间,目前是过期7200秒,可自定义,注意JWT有自己的缓冲过期时间
  32. new Claim (JwtRegisteredClaimNames.Exp,$"{new DateTimeOffset(DateTime.Now.AddSeconds(7200)).ToUnixTimeSeconds()}"),
  33. new Claim(JwtRegisteredClaimNames.Iss,iss),
  34. new Claim(JwtRegisteredClaimNames.Aud,aud),
  35. //new Claim(ClaimTypes.Role,tokenModel.Role),//为了解决一个用户多个角色(比如:Admin,System),用下边的方法
  36. };
  37. // 可以将一个用户的多个角色全部赋予;
  38. claims.AddRange(tokenModel.Role.Split(',').Select(s => new Claim(ClaimTypes.Role, s)));
  39. //秘钥 (SymmetricSecurityKey 对安全性的要求,密钥的长度太短会报出异常)
  40. var key = new SymmetricSecurityKey(Encoding.UTF8.GetBytes(secret));
  41. var creds = new SigningCredentials(key, SecurityAlgorithms.HmacSha256);
  42. var jwt = new JwtSecurityToken(
  43. issuer: iss,
  44. claims: claims,
  45. signingCredentials: creds
  46. //,expires:DateTime.Now.AddMinutes(1)
  47. );
  48. var jwtHandler = new JwtSecurityTokenHandler();
  49. var encodedJwt = jwtHandler.WriteToken(jwt);
  50. return encodedJwt;
  51. }
  52. /// <summary>
  53. /// 解析
  54. /// </summary>
  55. /// <param name="jwtStr"></param>
  56. /// <returns></returns>
  57. public static TokenModelJwt SerializeJwt(string jwtStr)
  58. {
  59. var jwtHandler = new JwtSecurityTokenHandler();
  60. JwtSecurityToken jwtToken = jwtHandler.ReadJwtToken(jwtStr);
  61. object role;
  62. try
  63. {
  64. jwtToken.Payload.TryGetValue(ClaimTypes.Role, out role);
  65. }
  66. catch (Exception e)
  67. {
  68. Console.WriteLine(e);
  69. throw;
  70. }
  71. var tm = new TokenModelJwt
  72. {
  73. Uid = (jwtToken.Id).ObjToInt(),
  74. Role = role != null ? role.ObjToString() : "",
  75. };
  76. return tm;
  77. }
  78. }
  79. /// <summary>
  80. /// 令牌
  81. /// </summary>
  82. public class TokenModelJwt
  83. {
  84. /// <summary>
  85. /// Id
  86. /// </summary>
  87. public long Uid { get; set; }
  88. public string UserName { get; set; }
  89. /// <summary>
  90. /// 角色
  91. /// </summary>
  92. public string Role { get; set; }
  93. /// <summary>
  94. /// 职能
  95. /// </summary>
  96. public string Work { get; set; }
  97. }
  98. }
  99. }