个性化token 目的
默认通过调用 /oauth/token 返回的报文格式包含以下参数
1
2
3
4
5
6
7
|
{ "access_token" : "e6669cdf-b6cd-43fe-af5c-f91a65041382" , "token_type" : "bearer" , "refresh_token" : "da91294d-446c-4a89-bdcf-88aee15a75e8" , "expires_in" : 43199 , "scope" : "server" } |
并没包含用户的业务信息比如用户信息、租户信息等。
扩展生成包含业务信息(如下),避免系统多次调用,直接可以通过认证接口获取到用户信息等,大大提高系统性能
1
2
3
4
5
6
7
8
9
10
11
12
|
{ "access_token" : "a6f3b6d6-93e6-4eb8-a97d-3ae72240a7b0" , "token_type" : "bearer" , "refresh_token" : "710ab162-a482-41cd-8bad-26456af38e4f" , "expires_in" : 42396 , "scope" : "server" , "tenant_id" : 1 , "license" : "made by pigx" , "dept_id" : 1 , "user_id" : 1 , "username" : "admin" } |
密码模式生成token 源码解析
主页参考红框部分
resourceownerpasswordtokengranter (密码模式)根据用户的请求信息,进行认证得到当前用户上下文信息
1
2
3
4
5
6
7
8
9
10
11
12
13
14
|
protected oauth2authentication getoauth2authentication(clientdetails client, tokenrequest tokenrequest) { map<string, string> parameters = new linkedhashmap<string, string>(tokenrequest.getrequestparameters()); string username = parameters.get( "username" ); string password = parameters.get( "password" ); // protect from downstream leaks of password parameters.remove( "password" ); authentication userauth = new usernamepasswordauthenticationtoken(username, password); ((abstractauthenticationtoken) userauth).setdetails(parameters); userauth = authenticationmanager.authenticate(userauth); oauth2request storedoauth2request = getrequestfactory().createoauth2request(client, tokenrequest); return new oauth2authentication(storedoauth2request, userauth); } |
然后调用abstracttokengranter.getaccesstoken() 获取oauth2accesstoken
1
2
3
|
protected oauth2accesstoken getaccesstoken(clientdetails client, tokenrequest tokenrequest) { return tokenservices.createaccesstoken(getoauth2authentication(client, tokenrequest)); } |
默认使用defaulttokenservices来获取token
1
2
3
4
5
6
7
8
9
10
11
12
|
public oauth2accesstoken createaccesstoken(oauth2authentication authentication) throws authenticationexception { ... 一系列判断 ,合法性、是否过期等判断 oauth2accesstoken accesstoken = createaccesstoken(authentication, refreshtoken); tokenstore.storeaccesstoken(accesstoken, authentication); // in case it was modified refreshtoken = accesstoken.getrefreshtoken(); if (refreshtoken != null ) { tokenstore.storerefreshtoken(refreshtoken, authentication); } return accesstoken; } |
createaccesstoken 核心逻辑
1
2
3
4
5
6
7
8
9
10
11
12
|
// 默认刷新token 的有效期 private int refreshtokenvalidityseconds = 60 * 60 * 24 * 30 ; // default 30 days. // 默认token 的有效期 private int accesstokenvalidityseconds = 60 * 60 * 12 ; // default 12 hours. private oauth2accesstoken createaccesstoken(oauth2authentication authentication, oauth2refreshtoken refreshtoken) { defaultoauth2accesstoken token = new defaultoauth2accesstoken(uuid); token.setexpiration(date) token.setrefreshtoken(refreshtoken); token.setscope(authentication.getoauth2request().getscope()); return accesstokenenhancer != null ? accesstokenenhancer.enhance(token, authentication) : token; } |
如上代码,在拼装好token对象后会调用认证服务器配置tokenenhancer( 增强器) 来对默认的token进行增强。
tokenenhancer.enhance 通过上下文中的用户信息来个性化token
1
2
3
4
5
6
7
8
9
10
11
|
public oauth2accesstoken enhance(oauth2accesstoken accesstoken, oauth2authentication authentication) { final map<string, object> additionalinfo = new hashmap<>( 8 ); pigxuser pigxuser = (pigxuser) authentication.getuserauthentication().getprincipal(); additionalinfo.put( "user_id" , pigxuser.getid()); additionalinfo.put( "username" , pigxuser.getusername()); additionalinfo.put( "dept_id" , pigxuser.getdeptid()); additionalinfo.put( "tenant_id" , pigxuser.gettenantid()); additionalinfo.put( "license" , securityconstants.pigx_license); ((defaultoauth2accesstoken) accesstoken).setadditionalinformation(additionalinfo); return accesstoken; } |
基于pig 看下最终的实现效果
pig 基于spring cloud、oauth2.0开发基于vue前后分离的开发平台,支持账号、短信、sso等多种登录,提供配套视频开发教程。
以上就是本文的全部内容,希望对大家的学习有所帮助,也希望大家多多支持服务器之家。
原文链接:https://segmentfault.com/a/1190000018187384