BAEL-5982 | Article code (#13097)

* BAEL-5982 | Article code

* Renaming unit test methods

* Rearranging module list in alphabetic order
This commit is contained in:
Avin Buricha 2022-12-11 08:30:01 +05:30 committed by GitHub
parent 897a98ada4
commit 5c1c08e713
5 changed files with 259 additions and 1 deletions

3
security-modules/jwt/.gitignore vendored Normal file
View File

@ -0,0 +1,3 @@
.idea
target
*.iml

View File

@ -0,0 +1,28 @@
<?xml version="1.0" encoding="UTF-8"?>
<project xmlns="http://maven.apache.org/POM/4.0.0"
xmlns:xsi="http://www.w3.org/2001/XMLSchema-instance"
xsi:schemaLocation="http://maven.apache.org/POM/4.0.0 http://maven.apache.org/xsd/maven-4.0.0.xsd">
<modelVersion>4.0.0</modelVersion>
<artifactId>jwt</artifactId>
<name>jwt</name>
<packaging>jar</packaging>
<parent>
<groupId>com.baeldung</groupId>
<artifactId>security-modules</artifactId>
<version>1.0.0-SNAPSHOT</version>
</parent>
<dependencies>
<dependency>
<groupId>com.auth0</groupId>
<artifactId>java-jwt</artifactId>
<version>${auth0-jwt.version}</version>
</dependency>
</dependencies>
<properties>
<auth0-jwt.version>4.2.1</auth0-jwt.version>
</properties>
</project>

View File

@ -0,0 +1,99 @@
package com.baeldung.jwt.auth0;
import java.util.Date;
import java.util.UUID;
import com.auth0.jwt.JWT;
import com.auth0.jwt.JWTVerifier;
import com.auth0.jwt.algorithms.Algorithm;
import com.auth0.jwt.exceptions.JWTVerificationException;
import com.auth0.jwt.interfaces.Claim;
import com.auth0.jwt.interfaces.DecodedJWT;
public class Auth0JsonWebToken {
private static final String SECRET = "baeldung";
private static final String ISSUER = "Baeldung";
private static final String SUBJECT = "Baeldung Details";
private static final String DATA_CLAIM = "userId";
private static final String DATA = "1234";
private static final long TOKEN_VALIDITY_IN_MILLIS = 5000L;
private static Algorithm algorithm;
private static JWTVerifier verifier;
public static void initialize() {
algorithm = Algorithm.HMAC256(SECRET);
verifier = JWT.require(algorithm)
.withIssuer(ISSUER)
.build();
}
private static String createJWT() {
String jwtToken = JWT.create()
.withIssuer(ISSUER)
.withSubject(SUBJECT)
.withClaim(DATA_CLAIM, DATA)
.withIssuedAt(new Date())
.withExpiresAt(new Date(System.currentTimeMillis() + TOKEN_VALIDITY_IN_MILLIS))
.withJWTId(UUID.randomUUID()
.toString())
.withNotBefore(new Date(System.currentTimeMillis() + 1000L))
.sign(algorithm);
return jwtToken;
}
private static DecodedJWT verifyJWT(String jwtToken) {
try {
DecodedJWT decodedJWT = verifier.verify(jwtToken);
return decodedJWT;
} catch (JWTVerificationException e) {
System.out.println(e.getMessage());
}
return null;
}
private static boolean isJWTExpired(DecodedJWT decodedJWT) {
Date expiresAt = decodedJWT.getExpiresAt();
return expiresAt.getTime() < System.currentTimeMillis();
}
private static String getClaim(DecodedJWT decodedJWT, String claimName) {
Claim claim = decodedJWT.getClaim(claimName);
return claim != null ? claim.asString() : null;
}
public static void main(String args[]) throws InterruptedException {
initialize();
String jwtToken = createJWT();
System.out.println("Created JWT : " + jwtToken);
DecodedJWT decodedJWT = verifyJWT(jwtToken);
if (decodedJWT == null) {
System.out.println("JWT Verification Failed");
}
Thread.sleep(1000L);
decodedJWT = verifyJWT(jwtToken);
if (decodedJWT != null) {
System.out.println("Token Issued At : " + decodedJWT.getIssuedAt());
System.out.println("Token Expires At : " + decodedJWT.getExpiresAt());
System.out.println("Subject : " + decodedJWT.getSubject());
System.out.println("Data : " + getClaim(decodedJWT, DATA_CLAIM));
System.out.println("Header : " + decodedJWT.getHeader());
System.out.println("Payload : " + decodedJWT.getPayload());
System.out.println("Signature : " + decodedJWT.getSignature());
System.out.println("Algorithm : " + decodedJWT.getAlgorithm());
System.out.println("JWT Id : " + decodedJWT.getId());
Boolean isExpired = isJWTExpired(decodedJWT);
System.out.println("Is Expired : " + isExpired);
}
}
}

View File

@ -0,0 +1,127 @@
package com.baeldung.jwt.auth0;
import static org.junit.jupiter.api.Assertions.assertEquals;
import static org.junit.jupiter.api.Assertions.assertFalse;
import static org.junit.jupiter.api.Assertions.assertNotNull;
import static org.junit.jupiter.api.Assertions.assertThrows;
import java.util.Date;
import org.junit.jupiter.api.BeforeAll;
import org.junit.jupiter.api.Test;
import com.auth0.jwt.JWT;
import com.auth0.jwt.JWTVerifier;
import com.auth0.jwt.algorithms.Algorithm;
import com.auth0.jwt.exceptions.IncorrectClaimException;
import com.auth0.jwt.exceptions.SignatureVerificationException;
import com.auth0.jwt.exceptions.TokenExpiredException;
import com.auth0.jwt.interfaces.Claim;
import com.auth0.jwt.interfaces.DecodedJWT;
public class Auth0JsonWebTokenUnitTest {
private static final String SECRET = "baeldung";
private static final String SECRET_NEW = "baeldung.com";
private static final String ISSUER = "Baeldung";
private static final String DATA_CLAIM = "userId";
private static final String DATA = "1234";
private static Algorithm algorithm;
private static Algorithm algorithmWithDifferentSecret;
private static JWTVerifier verifier;
private static String jwtToken;
@BeforeAll
public static void setUp() {
algorithm = Algorithm.HMAC256(SECRET);
algorithmWithDifferentSecret = Algorithm.HMAC256(SECRET_NEW);
verifier = JWT.require(algorithm)
.withIssuer(ISSUER)
.build();
}
private static boolean isJWTExpired(DecodedJWT decodedJWT) {
Date expiresAt = decodedJWT.getExpiresAt();
return expiresAt.getTime() < System.currentTimeMillis();
}
private static DecodedJWT verifyJWT(String jwtToken) {
DecodedJWT decodedJWT = verifier.verify(jwtToken);
return decodedJWT;
}
@Test
public void givenJWT_whenNotExpired_thenCheckingIfNotExpired() {
jwtToken = JWT.create()
.withIssuer(ISSUER)
.withClaim(DATA_CLAIM, DATA)
.withExpiresAt(new Date(System.currentTimeMillis() + 1000L))
.sign(algorithm);
DecodedJWT decodedJWT = verifyJWT(jwtToken);
assertNotNull(decodedJWT);
assertFalse(isJWTExpired(decodedJWT));
}
@Test
public void givenJWT_whenExpired_thenCheckingIfExpired() {
jwtToken = JWT.create()
.withIssuer(ISSUER)
.withClaim(DATA_CLAIM, DATA)
.withExpiresAt(new Date(System.currentTimeMillis() - 1000L))
.sign(algorithm);
assertThrows(TokenExpiredException.class, () -> {
verifyJWT(jwtToken);
});
}
@Test
public void givenJWT_whenCreatedWithCustomClaim_thenCheckingForCustomClaim() {
jwtToken = JWT.create()
.withIssuer(ISSUER)
.withClaim(DATA_CLAIM, DATA)
.withExpiresAt(new Date(System.currentTimeMillis() + 1000L))
.sign(algorithm);
DecodedJWT decodedJWT = verifyJWT(jwtToken);
assertNotNull(decodedJWT);
Claim claim = decodedJWT.getClaim(DATA_CLAIM);
assertEquals(DATA, claim.asString());
}
@Test
public void givenJWT_whenCreatedWithNotBefore_thenThrowException() {
jwtToken = JWT.create()
.withIssuer(ISSUER)
.withClaim(DATA_CLAIM, DATA)
.withNotBefore(new Date(System.currentTimeMillis() + 1000L))
.sign(algorithm);
assertThrows(IncorrectClaimException.class, () -> {
verifyJWT(jwtToken);
});
}
@Test
public void givenJWT_whenVerifyingUsingDifferentSecret_thenThrowException() {
jwtToken = JWT.create()
.withIssuer(ISSUER)
.withClaim(DATA_CLAIM, DATA)
.withExpiresAt(new Date(System.currentTimeMillis() + 1000L))
.sign(algorithmWithDifferentSecret);
assertThrows(SignatureVerificationException.class, () -> {
verifyJWT(jwtToken);
});
}
}

View File

@ -20,8 +20,9 @@
<!-- <module>java-ee-8-security-api</module> --> <!-- long running -->
<module>jee-7-security</module>
<module>jjwt</module>
<module>jwt</module>
<module>oauth2-framework-impl</module>
<module>sql-injection-samples</module>
<module>sql-injection-samples</module>
</modules>
</project>