jwt安裝與配置


1.JWT安裝配置

1.1 安裝JWT

 

 

1.2 syl/settings.py 配置jwt載荷中的有效期設置

# jwt載荷中的有效期設置
JWT_AUTH = {
# 1.token前綴:headers中 Authorization 值的前綴
'JWT_AUTH_HEADER_PREFIX': 'JWT',
# 2.token有效期:一天有效
'JWT_EXPIRATION_DELTA': datetime.timedelta(days=1),
# 3.刷新token:允許使用舊的token換新token
'JWT_ALLOW_REFRESH': True,
# 4.token有效期:token在24小時內過期, 可續期token
'JWT_REFRESH_EXPIRATION_DELTA': datetime.timedelta(hours=24),
# 5.自定義JWT載荷信息:自定義返回格式,需要手工創建
'JWT_RESPONSE_PAYLOAD_HANDLER': 'user.utils.jwt_response_payload_handler',
}

 

 1.3 syl/settings.py JWT結合DRF進行認證權限配置

 

 1.4 user/urls.py 增加獲取token接口和刷新token接口

from django.urls import include, path
from rest_framework.authtoken.views import obtain_auth_token
from user import views
from rest_framework.routers import SimpleRouter, DefaultRouter
from rest_framework_jwt.views import obtain_jwt_token, refresh_jwt_token
# 自動生成路由方法, 必須使用視圖集
# router = SimpleRouter() # 沒有根路由 /user/ 無法識別
router = DefaultRouter() # 有根路由
router.register(r'user', views.UserViewSet)
urlpatterns = [
path('index/', views.index), # 函數視圖
path('login/', obtain_jwt_token), # 獲取token,登錄視圖
path('refresh/', refresh_jwt_token), # 刷新token
path('api-auth/', include('rest_framework.urls',
namespace='rest_framework')), # 認證地址
]
urlpatterns += router.urls # 模塊地址
# print(router.urls)

 

 1.5 在user/utils.py中從寫jwt_response_payload_handler

def jwt_response_payload_handler(token, user=None, request=None, role=None):
"""
自定義jwt認證成功返回數據
:token 返回的jwt
:user 當前登錄的用戶信息[對象]
:request 當前本次客戶端提交過來的數據
:role 角色
"""
if user.first_name:
name = user.first_name
else:
name = user.username
return {
'authenticated': 'true',
'id': user.id,
"role": role,
'name': name,
'username': user.username,
'email': user.email,
'token': token,
}

 

 2.postman測試接口

2.1 測試登錄接口,獲取token

'''自定義認證和權限優先級更高,可以覆蓋settings.py中的 '''
# 自定義權限類
permission_classes = (MyPermission,)
# 自定義認證類, 自定義會覆蓋全局配置
authentication_classes = (JSONWebTokenAuthentication,)

 2.2 使用獲得的token獲取所有用戶信息

 

 

 

 3.源碼分析

class JSONWebTokenAPIView(APIView):
"""
Base API View that various JWT interactions inherit from.
"""
permission_classes = ()
authentication_classes = ()
def get_serializer_context(self):
"""
Extra context provided to the serializer class.
"""
return {
'request': self.request,
'view': self,
}
def get_serializer_class(self):
"""
Return the class to use for the serializer.
Defaults to using `self.serializer_class`.
You may want to override this if you need to provide different
serializations depending on the incoming request.
(Eg. admins get full serialization, others get basic serialization)
"""
assert self.serializer_class is not None, (
"'%s' should either include a `serializer_class` attribute, "
"or override the `get_serializer_class()` method."
% self.__class__.__name__)
return self.serializer_class
def get_serializer(self, *args, **kwargs):
"""
Return the serializer instance that should be used for validating and
deserializing input, and for serializing output.
"""
serializer_class = self.get_serializer_class()
kwargs['context'] = self.get_serializer_context()
return serializer_class(*args, **kwargs)
def post(self, request, *args, **kwargs):
serializer = self.get_serializer(data=request.data)
if serializer.is_valid():
user = serializer.object.get('user') or request.user # User表對象
token = serializer.object.get('token') # 獲取到生成的
token
response_data = jwt_response_payload_handler(token, user, request)
response = Response(response_data)
if api_settings.JWT_AUTH_COOKIE:
expiration = (datetime.utcnow() +
api_settings.JWT_EXPIRATION_DELTA)
response.set_cookie(api_settings.JWT_AUTH_COOKIE,
token,
expires=expiration,
httponly=True)
return response
return Response(serializer.errors, status=status.HTTP_400_BAD_REQUEST)

 


免責聲明!

本站轉載的文章為個人學習借鑒使用,本站對版權不負任何法律責任。如果侵犯了您的隱私權益,請聯系本站郵箱yoyou2525@163.com刪除。



 
粵ICP備18138465號   © 2018-2025 CODEPRJ.COM