2016-03-04 235 views
2

我试图验证和使用jsonwebtoken NPM,使用下面的代码片段解码JSON网络令牌:jsonwebtoken验证失败

var jwt = require('jsonwebtoken'); 
var fs = require('fs'); 

var encoded = 'eyJ0eXAiOiJKV1QiLCJhbGciOiJIUzI1NiJ9.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.yn2Vb3hE7BKrXntCa-pTVAS7MwsaHD1csPZMiibOhwk'; 

fs.readFile('/etc/jwt/shared.key', function(err, result){ 
    if (err) { 
    console.error("error:", err); 
    return; 
    } 
    var verified = jwt.verify(encoded, 'ssshhhh'); 
    //var verified = jwt.verify(encoded, result); 
    console.log("verified:", verified); 
}); 

当我尝试jwt.verify (),使用硬编码值,程序失败

 if (err) throw err; 
        ^
JsonWebTokenError: invalid signature 
    at Object.JWT.verify (/home/rvnath/projects/comviva/mbs/ecp7/dev/authserver/node_modules/jsonwebtoken/index.js:219:17) 
    at /home/rvnath/projects/comviva/mbs/ecp7/dev/authserver/testverify.js:11:22 
    at fs.js:334:14 
    at FSReqWrap.oncomplete (fs.js:95:15) 

但是,如果我读的密钥文件(而不是硬编码),并提供给验证功能,它工作正常。下面是该方案在这种情况下,输出:

[email protected] ~/projects/comviva/mbs/ecp7/dev/authserver $ node testverify.js 
verified: { id: '1', 
    loginId: 'root', 
    userName: 'root', 
    role: '0', 
    status: '1', 
    password: 'acb3e141d883106de2f30d46e76c09cf', 
    namak: 'root', 
    lastLoginTime: 'null', 
    email: '[email protected]', 
    contactNo: '', 
    authType: 'null', 
    parentId: 'null', 
    language: 'null', 
    currency: 'null', 
    activationDt: 'null', 
    expiryDt: 'null', 
    deletedAt: 'null', 
    perms: '{"%":7}', 
    balance: '1299', 
    cached: true, 
    iat: 1457100926 } 

我的秘密文件是一个简单的文本文件,如下图所示:

[email protected] ~ $ cat /etc/jwt/shared.key 
ssshhhh 
[email protected] ~ $ 

总之,我试图通过使用相同的秘密解码键存储在文件/etc/jwt/shared.key中,但是当键值在程序中硬编码时失败。我在这里做错了什么?

编辑 是由我的服务器应用程序生成的智威汤逊,由同一个文件中读取的秘密:

/** Creates a signed JSON WEB TOKEN **/ 
function createJWT(user) { 
    return fs.readFileAsync('/etc/jwt/shared.key').then(function(cert){ 
    var secret = cert.toString(); 
    console.log("shared secret:", secret); 
    var token = jwt.sign(user, secret); 
    //console.log("token verification:",jwt.verify(token, cert)); 
    return token; 
    }); 
} 

回答

0

这是一个愚蠢的小问题,而是花了很多时间去找出。当从文件读取秘密时,它将一个LF(换行符)char附加到字符串。所以,当相同的秘密是硬编码的,它没有LF。这解释了差异。