1. 程式人生 > 實用技巧 >django-JWT安裝和配置

django-JWT安裝和配置

1.登入介面
2.重新整理介面 
3.自定義返回格式

1.JWT安裝配置


1.1 安裝JWT

pip install djangorestframework-jwt==1.11.0

1.2 syl/settings.py 配置jwt載荷中的有效期設定

# jwt載荷中的有效期設定

JWT_AUTH = { 
     # 1.token字首:headers中 Authorization 值的字首
     'JWT_AUTH_HEADER_PREFIX': 'JWT', 
     # 2.token有效期:一天有效 
     'JWT_EXPIRATION_DELTA': datetime.timedelta(days=1), 
     # 3.重新整理token:允許使用舊的token換新token 
     'JWT_ALLOW_REFRESH': True, 
     # 4.token有效期:token在24小時內過期, 可續期token
     'JWT_REFRESH_EXPIRATION_DELTA':datetime.timedelta(hours=24), 
     # 5.自定義JWT載荷資訊:自定義返回格式,需要手工建立 
     'JWT_RESPONSE_PAYLOAD_HANDLER': 
     'user.utils.jwt_response_payload_handler', 
}

1.3 syl/settings.py JWT結合DRF進行認證許可權配置

# 在DRF配置檔案中開啟認證和許可權
REST_FRAMEWORK = {
     ... 
     # 使用者登陸認證方式 
     'DEFAULT_AUTHENTICATION_CLASSES': [ 
          'rest_framework_jwt.authentication.JSONWebTokenAuthentication', # 在 DRF中配置JWT認證 
          # 'rest_framework.authentication.SessionAuthentication', # 使用session時 的認證器 
          # 'rest_framework.authentication.BasicAuthentication' # 提交表單時的認證器 
     ],
     # 許可權配置, 順序靠上的嚴格 
     'DEFAULT_PERMISSION_CLASSES': [
          # 'rest_framework.permissions.IsAdminUser', # 管理員可以訪問 
          'rest_framework.permissions.IsAuthenticated', # 全域性配置只有認 證使用者可以訪問介面 
          # 'rest_framework.permissions.IsAuthenticatedOrReadOnly', # 認證使用者可以訪 問, 否則只能讀取 
          # 'rest_framework.permissions.AllowAny', # 所有使用者都可以 訪問 
     ],
     ... 
}

1.4 user/urls.py 增加獲取token介面和重新整理token介面

from django.urls import include, path 
from rest_framework.authtoken.views import obtain_auth_token 
from user import views 
from rest_framework.routers import SimpleRouter, DefaultRouter 
from rest_framework_jwt.views import obtain_jwt_token, refresh_jwt_token

# 自動生成路由方法, 必須使用檢視集 
# router = SimpleRouter() # 沒有根路由 /user/ 無法識別
router = DefaultRouter() # 有根路由 
router.register(r'user', views.UserViewSet)

urlpatterns = [ 
     path('index/', views.index), # 函式檢視 
     path('login/', obtain_jwt_token), # 獲取token,登入檢視 
     path('refresh/', refresh_jwt_token), # 重新整理token 
     path('api-auth/', include('rest_framework.urls', namespace='rest_framework')), # 認證地址
]

urlpatterns += router.urls # 模組地址 
# print(router.urls)

1.5 user/utils.py中從寫jwt_response_payload_handler

def jwt_response_payload_handler(token, user=None, request=None, role=None):
     """ 
     自定義jwt認證成功返回資料 
     :token 返回的jwt 
     :user 當前登入的使用者資訊[物件] 
     :request 當前本次客戶端提交過來的資料 
     :role 角色 
     
     """ 
     if user.first_name: 
          name = user.first_name 
     else:
          name = user.username 
          
     return { 
          'authenticated': 'true', 
          'id': user.id, 
          "role": role, 
          'name': name,
          'username': user.username, 
          'email': user.email, 
          'token': token, 
     }

2.postman測試介面


2.1 測試登入介面,獲取token

http://192.168.56.100:8888/user/login/

'''
自定義認證和許可權優先順序更高,可以覆蓋settings.py中的 
''' 
# 自定義許可權類 
permission_classes = (MyPermission,) 
# 自定義認證類, 自定義會覆蓋全域性配置 
authentication_classes = (JSONWebTokenAuthentication,)

2.2 使用獲得的token獲取所有使用者資訊

http://192.168.56.100:8888/user/user/

3.原始碼分析


class JSONWebTokenAPIView(APIView): 
     """ 
     Base API View that various JWT interactions inherit from. 
     """ 
     permission_classes = () 
     authentication_classes = () 
     
     def get_serializer_context(self): 
          """ 
          Extra context provided to the serializer class. 
          """ 
          return {

               'request': self.request,
               'view': self, 
          } 
     
     def get_serializer_class(self): 
          """ 
          Return the class to use for the serializer. Defaults to using 
          `self.serializer_class`. You may want to override this if you need to 
          provide different serializations depending on the incoming request. (Eg. 
          admins get full serialization, others get basic serialization) 
          """ 
          assert self.serializer_class is not None, (
               "'%s' should either include a `serializer_class` attribute, 
               " "or override the `get_serializer_class()` method." % 
               self.__class__.__name__) 
          
          return self.serializer_class 
     
     def get_serializer(self, *args, **kwargs): 
          """ 
          Return the serializer instance that should be used for validating and 
          deserializing input, and for serializing output. 
          
          """
          serializer_class = self.get_serializer_class() 
          kwargs['context'] = self.get_serializer_context() 
          return serializer_class(*args, **kwargs) 
     
     def post(self, request, *args, **kwargs): 
          serializer = self.get_serializer(data=request.data) 
          if serializer.is_valid(): 
               user = serializer.object.get('user') or request.user # User表物件 
               token = serializer.object.get('token') # 獲取到生成的 token 
               response_data = jwt_response_payload_handler(token, user, request) 
               response = Response(response_data) 
               if api_settings.JWT_AUTH_COOKIE: 
                    expiration = (datetime.utcnow() + 
                                  api_settings.JWT_EXPIRATION_DELTA) 
                    response.set_cookie(api_settings.JWT_AUTH_COOKIE, token, 
                                        expires=expiration, httponly=True) 
               return response 
          return Response(serializer.errors, status=status.HTTP_400_BAD_REQUEST)