介绍
一个基于 RFC 7519 的 JSON Web Token 和 JSON Web Signature的仓颉库。
特性
- 支持 JWT 创建与解析
- 支持 Payload 校验
- 支持 HMAC 算法签名及验证
- 支持 RSA 算法签名及验证
- 支持 ECDSA 算法签名及验证
路线

架构
源码目录
bash
.
├── README.md
├── doc
├── src
│ └── jwt
│ ├── algorithms
│ ├── common
│ ├── exception
│ ├── impl
│ │ └── json
│ ├── interfaces
│ └── utils
└── test
├── HLT
├── LLT
└── UT
doc
存放库的设计文档、提案、库的使用文档src
存放库源码目录test
存放存放测试用例,包括HLT用例、LLT 用例和UT用例
接口说明
主要是核心类和成员函数说明,详情见 API
使用说明
编译(win/linux)
cjpm build
功能示例

jwt创建功能示例
erlang
import std.collection.*
import std.time.*
import encoding.json.*
import jwt4cj.*
main(){
let jwtStr = JWT.create()
.withHeader(HashMap<String, Any>([("k1","v1")]))
.withKeyId("keyId")
.withIssuer("issuer")
.withSubject("subject")
.withAudience(["aud1", "aud2"])
.withExpiresAt(DateTime.ofEpoch(second: 3673835050, nanosecond: 0))
.withNotBefore(DateTime.ofEpoch(second: 1673835050, nanosecond: 0))
.withIssuedAt(DateTime.ofEpoch(second: 1673835050, nanosecond: 0))
.withJWTId("jwtId")
.withClaim("bool", true)
.withClaim("ddd", "dfdddff")
.withClaim("int64", 64)
.withClaim("float64", 3.14)
.withClaim("String", "abaaba")
.withClaim("time", DateTime.ofEpoch(second: 1673850000, nanosecond: 0))
.withClaim("map", HashMap<String, Any>([("mk2","mv2")]))
.withClaim("list", ArrayList<Any>([56.51,41.96]))
.withNullClaim("null")
.withArrayClaim("arraystring", ["astr1","astr2"])
.withArrayClaim("arrayint", [684,64])
.withPayload(HashMap<String, Any>([("pk1","pv1"),("pk2","pv2")]))
.sign(Algorithm.HMAC256("admin"))
println(jwtStr)
0
}
ewogICJrMSI6ICJ2MSIsCiAgImtpZCI6ICJrZXlJZCIsCiAgImFsZyI6ICJIUzI1NiIsCiAgInR5cCI6ICJKV1QiCn0.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.faVUD-cYR4nvaMYv5HMYk0pVfR9qRsCOWz28tgPoqdM
DD一下: 欢迎大家关注公众号<程序猿百晓生>,可以了解到以下知识点。
erlang
`欢迎大家关注公众号<程序猿百晓生>,可以了解到以下知识点。`
1.OpenHarmony开发基础
2.OpenHarmony北向开发环境搭建
3.鸿蒙南向开发环境的搭建
4.鸿蒙生态应用开发白皮书V2.0 & V3.0
5.鸿蒙开发面试真题(含参考答案)
6.TypeScript入门学习手册
7.OpenHarmony 经典面试题(含参考答案)
8.OpenHarmony设备开发入门【最新版】
9.沉浸式剖析OpenHarmony源代码
10.系统定制指南
11.【OpenHarmony】Uboot 驱动加载流程
12.OpenHarmony构建系统--GN与子系统、部件、模块详解
13.ohos开机init启动流程
14.鸿蒙版性能优化指南
.......
jwt解析功能示例
scss
import jwt4cj.*
let token =
"CnsKICAiazEiOiAidjEiLAogICJraWQiOiAiYWxnb3JpdGhtLmdldFNpZ25pbmdLZXlJZCgpIiwKICAiYWxnIjogIm5vbmUiLAogICJ0eXAiOiAiSldUIiwKICAiY3R5IjogIkpXVCIKfQo.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."
main() {
let decoder = JWT.decode(token)
println(decoder.getAlgorithm()) // none
println(decoder.getType()) // JWT
println(decoder.getContentType()) // JWT
println(decoder.getHeaderClaim("k1").asString()) // v1
println(decoder.getIssuer()) // issuer
println(decoder.getSubject()) // subject
println(decoder.getAudience().size) // 2
println(decoder.getExpiresAt()) //
println(decoder.getNotBefore()) //
println(decoder.getIssuedAt()) //
println(decoder.getId()) // jwtId
println(decoder.getClaim("bool").asBool()) // true
println(decoder.getClaims().size) // 19
0
}
yaml
none
JWT
JWT
v1
issuer
subject
2
2023-01-16T10:11:30+08:00
2023-01-16T10:10:50+08:00
2023-01-16T10:10:00+08:00
jwtId
true
19
jwt校验功能示例
erlang
import jwt4cj.*
let token = "ewogICJrMSI6ICJ2MSIsCiAgImtpZCI6ICJrZXlJZCIsCiAgImFsZyI6ICJub25lIiwKICAidHlwIjogIkpXVCIKfQ.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."
main() {
try {
let require = JWT.require(Algorithm.none())
require.withClaim("String","abaaba")
.withArrayClaim("arraystring",["astr1","astr2"])
.withArrayClaim("arrayint", [684,64])
.withClaim("time", DateTime.ofEpoch(second: 1673850000, nanosecond: 0))
.withClaim("bool", true)
.withClaim("int64", 64)
.withClaim("float64", 3.14)
.withIssuer("issuer") // 签发对象
.withAudience(["aud1"]) // 接收全部对象 ["aud1", "aud3"] false
.withAnyOfAudience(["aud1", "aud3"]) // 接收部分对象
.withSubject("subject")
.withJWTId("jwtId")
.withClaimPresence("ddd")
.acceptExpiresAt(111111)
.acceptLeeway(111111) // 设置默认时间
let verifier: JWTVerifier = require.build()
verifier.verify(token)
return 0
} catch (e: TokenExpiredException) {
println(e.message)
return 2
} catch (e: Exception) {
return 3
}
0
}