SpringSecurity结合电商项目

pom

<!--SpringSecurity及JWT依赖配置-->
<dependency>
	<groupId>org.springframework.boot</groupId>
	<artifactId>spring-boot-starter-security</ artifactId></dependency>
<!--Hutool Java工具包-->
<dependency>
	<groupId>cn.hutool</groupId>
	<artifactId>hutool-all</artifactId>
	<version>4.5.7</version>
</dependency>
<!--了MT(]son web Token)登录支持-->
<dependency>
	<groupId>io.jsonwebtoken</groupId>
	<artifactId>jjwt</artifactId>
	<version>0.9.o</version>
</dependency>

前台部分

公共配置类

@Configuration
public class SecurityConfig extends WebSecurityConfigurerAdapter {
    
    
    /**
     * 权限配置    白名单,jwt认证等等
     * @param http
     * @throws Exception
     */
    @Override
    protected void configure(HttpSecurity http) throws Exception {
    
    
        //放行白名单
        ExpressionUrlAuthorizationConfigurer<HttpSecurity>.ExpressionInterceptUrlRegistry registry = http.authorizeRequests();

        //循环白名单进行放行
        for (String url : ignoreUrlsConfig().getUrls()) {
    
    
            registry.antMatchers(url)
                    .permitAll();
        }

        //跨域请求
        //允许可以请求OPTIONS  CORS
        registry.antMatchers(HttpMethod.OPTIONS).permitAll();

        //其他请求都需要身份认证
        registry.anyRequest().authenticated()
                // 关闭csrf跨站请求伪造 :因为现在使用jwt来实现认证
                .and().csrf().disable()
                // 禁止session   性能更好
                .sessionManagement().sessionCreationPolicy(SessionCreationPolicy.STATELESS)
                // 自定义权限拒绝处理类
                .and().exceptionHandling()
                // 没有权限访问时的处理类
                .accessDeniedHandler(restfulAccessDeniedHandler())
                //没有登录时的处理类
                .authenticationEntryPoint(restfulAuthenticationEntryPoint())
                .and()
                //加入jwt认证过滤器
                .addFilterBefore(jwtAuthenticationFilter(), UsernamePasswordAuthenticationFilter.class);
    }

    @Bean
    public JwtAuthenticationFilter jwtAuthenticationFilter(){
    
    
        return new JwtAuthenticationFilter();
    }

    @Bean
    public IgnoreUrlsConfig ignoreUrlsConfig(){
    
    
        return new IgnoreUrlsConfig();
    }

    @Bean
    public RestfulAccessDeniedHandler restfulAccessDeniedHandler(){
    
    
        return new RestfulAccessDeniedHandler();
    }

    @Bean
    public RestfulAuthenticationEntryPoint restfulAuthenticationEntryPoint(){
    
    
        return new RestfulAuthenticationEntryPoint();
    }
	
	@Bean
    public PasswordEncoder passwordEncoder(){
    
    
        return new BCryptPasswordEncoder();
    }
}

白名单绑定类

secure:
  ignored:
    urls: #安全路径白名单
      - /swagger-ui.html
      - /swagger-resources/**
      - /swagger/**
      - /**/v2/api-docs
      - /**/*.js
      - /**/*.css
      - /**/*.png
      - /**/*.ico
      - /webjars/springfox-swagger-ui/**
      - /actuator/**
      - /druid/**
      - /user/**
      - /home/**
      - /product/**
      - /order/paySuccess
@ConfigurationProperties(prefix = "secure.ignored")
public class IgnoreUrlsConfig {
    
    
    List<String> urls;
    public List<String> getUrls() {
    
    
        return urls;
    }
    public void setUrls(List<String> urls) {
    
    
        this.urls = urls;
    }
}

没有权限访问时的响应处理类

/**
 * @author
 * 没有权限访问时的响应处理类
 */

public class RestfulAccessDeniedHandler implements AccessDeniedHandler {
    
    

    @Override
    public void handle(HttpServletRequest request, HttpServletResponse response, AccessDeniedException e) throws IOException, ServletException {
    
    
        response.setCharacterEncoding("UTF-8");
        response.setContentType("application/json");
        //响应403没有相关权限
        JSON json = JSONUtil.parse(CommonResult.failed(ResultCode.FORBIDDEN));
        //    FORBIDDEN(403, "没有相关权限"),
        response.getWriter().print(json);
        response.getWriter().flush();
    }
}

未登录处理类

/**
 * @author
 * 未登录时处理类
 */
public class RestfulAuthenticationEntryPoint implements AuthenticationEntryPoint {
    
    
    @Override
    public void commence(HttpServletRequest request, HttpServletResponse response, AuthenticationException e) throws IOException, ServletException {
    
    
        response.setCharacterEncoding("UTF-8");
        response.setContentType("application/json");
        // 响应401 暂未登录或session已经过期
        JSON json = JSONUtil.parse(CommonResult.failed(ResultCode.UNAUTHORIZED));
        //UNAUTHORIZED(401, "暂未登录或session已经过期"),
        response.getWriter().print(json);
    }
}

JWT类

/**
 * @author
 * JWT 过滤器
 */
public class JwtAuthenticationFilter extends OncePerRequestFilter {
    
    
    @Autowired
    HttpServletRequest request;
    @Value("${jwt.tokenHeader}")
    private String tokenHeader;
    @Value("${jwt.tokenHead}")
    private String tokenHead;
    @Autowired
    private JwtTokenUtil jwtTokenUtil;
    @Autowired
    private UserDetailsService userDetailsService;

    @Override
    protected void doFilterInternal(HttpServletRequest request, HttpServletResponse response, FilterChain filterChain) throws ServletException, IOException {
    
    
        //jwt令牌   获取jwt令牌
        String jwt = request.getHeader(tokenHeader);
        if (!StrUtil.isBlank(jwt)&& jwt.startsWith(tokenHead)) {
    
    
            //字符串截取   截取Head 后面的字符串
            jwt =jwt.substring(tokenHead.length());
            //解密
            String userName = jwtTokenUtil.getUserNameFromToken(jwt);
            if (!StrUtil.isBlank(userName)) {
    
    
                //从服务器中查询用户  判断是否存在该用户
                UserDetails userDetails = userDetailsService.loadUserByUsername(userName);
                if (userDetails!=null) {
    
    
                    //生成springsecurity的通过认证标识
                    UsernamePasswordAuthenticationToken token = new UsernamePasswordAuthenticationToken(userDetails,null,userDetails.getAuthorities());
                    SecurityContextHolder.getContext().setAuthentication(token);
                }
            }
//            filterChain.doFilter(request,response);//放行
        }
        filterChain.doFilter(request,response);//放行

//        response.setCharacterEncoding("UTF-8");
//        response.setContentType("application/json");
//        //JWT为空
//        JSON json = JSONUtil.parse("用户名不存在");
//        response.getWriter().print(json);
//        response.getWriter().flush();
    }
}
jwt:
  secret: tuling-mall-portal   #可以用MD5加密  服务端私钥
  expiration: 86400  #24*60*60 一天
  tokenHead: Bearer  #JWT规范  #告诉客户端JWT令牌开头需要加的一个字符串
  tokenHeader: Authorization #告诉客户端在请求头里传什么参数名

配置UserDetailsSerrvice
在这里插入图片描述

在这里插入图片描述

启动注解(具体子类模块中 代码)
@EnableWebSecurity
在这里插入图片描述

登录方法

 @Autowired
 private PasswordEncoder passwordEncoder;

@Override
    public UmsMember login(String username, String password) {
    
    
        UmsMember umsMember = null;
        try {
    
    
            UserDetails userDetails = loadUserByUsername(username);
            umsMember= ((MemberDetails) userDetails).getUmsMember();
            if (!passwordEncoder.matches(password,umsMember.getPassword())) {
    
    
                Asserts.fail("密码不正确");
            }
            //生成springsecurity的通过认证标识
            UsernamePasswordAuthenticationToken authenticationToken = new UsernamePasswordAuthenticationToken(userDetails,null,userDetails.getAuthorities());
            SecurityContextHolder.getContext().setAuthentication(authenticationToken);

            if (!userDetails.isEnabled()) {
    
    
                Asserts.fail("账号已被禁用");
            }

            insertLoginLog(username);//添加登录记录
        } catch (Exception e) {
    
    
            Asserts.fail("登录异常:" );
             e.printStackTrace();
        }
        return umsMember;
    }
/**
 * JwtToken生成的工具类
 * JWT token的格式:header.payload.signature
 * header的格式(算法、token的类型):
 * {"alg": "HS512","typ": "JWT"}
 * payload的格式(用户名、创建时间、生成时间):
 * {"sub":"wang","created":1489079981393,"exp":1489684781}
 * signature的生成算法:
 * HMACSHA512(base64UrlEncode(header) + "." +base64UrlEncode(payload),secret)
 * Created on 2018/4/26.
 */
public class JwtTokenUtil {
    
    
    public static ThreadLocal<String> currentUsername=new ThreadLocal<>();
    private static final Logger LOGGER = LoggerFactory.getLogger(JwtTokenUtil.class);
    private static final String CLAIM_KEY_USERNAME = "user_name";
    private static final String CLAIM_KEY_CREATED = "created";
    @Value("${jwt.secret}")
    private String secret;
    @Value("${jwt.expiration}")
    private Long expiration;
    @Value("${jwt.tokenHead}")
    private String tokenHead;

    /**
     * 根据负责生成JWT的token
     */
    private String generateToken(Map<String, Object> claims) {
    
    
        return Jwts.builder()
                .setClaims(claims)
                .setExpiration(generateExpirationDate())
                .signWith(SignatureAlgorithm.HS512, secret)
                .compact();
    }

    /**
     * 从token中获取JWT中的负载
     */
    private Claims getClaimsFromToken(String token) {
    
    
        Claims claims = null;
        try {
    
    
            claims = Jwts.parser()
                    .setSigningKey(secret)
                    .parseClaimsJws(token)
                    .getBody();
        } catch (Exception e) {
    
    
            LOGGER.info("JWT格式验证失败:{}", token);
        }
        return claims;
    }

    /**
     * 生成token的过期时间
     */
    private Date generateExpirationDate() {
    
    
        return new Date(System.currentTimeMillis() + expiration * 1000);
    }

    /**
     * 解密:从token中获取登录用户名(项目使用)
     */
    public String getUserNameFromToken(String token) {
    
    
        String username;
        try {
    
    
            Claims claims = getClaimsFromToken(token);
            username = claims.get(CLAIM_KEY_USERNAME,String.class);
        } catch (Exception e) {
    
    
            username = null;
        }
        return username;
    }

    /**
     * 加密: 根据用户名生成token(项目使用)
     */
    public String generateUserNameStr(String username) {
    
    
        Map<String, Object> claims = new HashMap<>();
        claims.put(CLAIM_KEY_USERNAME,username);
        claims.put(CLAIM_KEY_CREATED, new Date());
        return generateToken(claims);
    }

    /**
     * 判断token是否已经失效
     */
    private boolean isTokenExpired(String token) {
    
    
        Date expiredDate = getExpiredDateFromToken(token);
        return expiredDate.before(new Date());
    }

    /**
     * 从token中获取过期时间
     */
    private Date getExpiredDateFromToken(String token) {
    
    
        Claims claims = getClaimsFromToken(token);
        return claims.getExpiration();
    }

    /**
     * 当原来的token没过期时是可以刷新的
     *
     * @param oldToken 带tokenHead的token
     */
    public String refreshHeadToken(String oldToken) {
    
    
        if(StrUtil.isEmpty(oldToken)){
    
    
            return null;
        }
        String token = oldToken.substring(tokenHead.length());
        if(StrUtil.isEmpty(token)){
    
    
            return null;
        }
        //token校验不通过
        Claims claims = getClaimsFromToken(token);
        if(claims==null){
    
    
            return null;
        }
        //如果token已经过期,不支持刷新
        if(isTokenExpired(token)){
    
    
            return null;
        }
        //如果token在30分钟之内刚刷新过,返回原token
        if(tokenRefreshJustBefore(token,30*60)){
    
    
            return token;
        }else{
    
    
            claims.put(CLAIM_KEY_CREATED, new Date());
            return generateToken(claims);
        }
    }

    /**
     * 判断token在指定时间内是否刚刚刷新过
     * @param token 原token
     * @param time 指定时间(秒)
     */
    private boolean tokenRefreshJustBefore(String token, int time) {
    
    
        Claims claims = getClaimsFromToken(token);
        Date created = claims.get(CLAIM_KEY_CREATED, Date.class);
        Date refreshDate = new Date();
        //刷新时间在创建时间的指定时间内
        if(refreshDate.after(created)&&refreshDate.before(DateUtil.offsetSecond(created,time))){
    
    
            return true;
        }
        return false;
    }
}

后台部分

核心处理role,user,resource之间的关系

扫描二维码关注公众号,回复: 16561030 查看本文章

配置类

@Configuration
public class SecurityConfig extends WebSecurityConfigurerAdapter {
    
    
    /**
     * 前台服务没有动态权限功能
     */
    @Autowired(required = false)
    private SecuriResourceRoleSource securiResourceRoleSource;
	
    @Override
    protected void configure(HttpSecurity http) throws Exception {
    
    
        //其他代码

        if (securiResourceRoleSource != null) {
    
    
            Map<String, List<String>> map = securiResourceRoleSource.getResourceRole();
            //循环注册
            if (!map.isEmpty()) {
    
    
                Set<Map.Entry<String, List<String>>> entries = map.entrySet();
//                for (Map.Entry<String, List<String>> entry : entries) {
    
    
//                    entry.getKey()
//                }
                Iterator<Map.Entry<String, List<String>>> iterator = entries.iterator();
                while (iterator.hasNext()) {
    
    
                    Map.Entry<String, List<String>> next = iterator.next();
                    //list转换数据,object[]转换为String[]
                    List<String> list = next.getValue();
                    String[] toArray = list.toArray(new String[list.size()]);
                    registry.antMatchers(next.getKey()).hasAnyAuthority(toArray);
                }
            }
        }

       //其他代码
    }

SecuriResourceRoleSource 类

/**
 * @author
 * 核心是获取 用户user 角色role 资源resource
 */
public interface SecuriResourceRoleSource {
    
    
    /**
     * 获取所有资源对应的角色
     * @return
     */
    //key 资源   /product/**
    // value  角色
    Map<String, List<String>> getResourceRole();
}
    @Autowired
    private UmsResourceService resourceService;
    /**
     * 为Springsecurity配置的资源信息
     * @return
     */
    @Bean
    public SecuriResourceRoleSource securiResourceRoleSource(){
    
    
        return new SecuriResourceRoleSource() {
    
    
            @Override
            public Map<String, List<String>> getResourceRole() {
    
    
                //业务逻辑类 查询 对应的资源信息  用户  角色  资源三者关系
                List<ResourceRoleDto> list=resourceService.getResourceRole();

                Map<String, List<String>> map = new LinkedHashMap<>();
                for (ResourceRoleDto resourceRoleDto : list) {
    
    
                    List<String> roleNameList = list.stream().map(r -> r.getName()).collect(Collectors.toList());
                    map.put(resourceRoleDto.getUrl(),roleNameList);
                }
                return map;
            }
        };
    }

在这里插入图片描述
key为url
value为角色名
在这里插入图片描述
UserDetails中的getAuthorities()

   List<UmsRole> roleList;
    /**
     * 返回当前用户的角色信息
     * @return
     */
    @Override
    public Collection<? extends GrantedAuthority> getAuthorities() {
    
    
        List<GrantedAuthority> authorities = roleList.stream().map(role -> {
    
    
            return new SimpleGrantedAuthority(role.getName());
        }).collect(Collectors.toList());
        return authorities;
    }

User 类中

@Override
    public UserDetails loadUserByUsername(String username) {
    
    
        UmsMember umsMember = getAdminByUsername(username);
        //根据用户id返回用户的角色
        List<UmsRole> roleList = roleMapper.getRoleList(umsMember.getId());
        if (umsMember!=null) {
    
    
            return new MemberDetails(umsMember,roleList);
        }
        throw  new ApiException("用户名或密码错误");
    }

在这里插入图片描述

动态发布

/**
 * 动态权限决策管理器,用于判断用户是否有访问权限
 * Created by macro on 2020/2/7.
 */
public class DynamicAccessDecisionManager implements AccessDecisionManager {
    
    

    /**
     *
     * @param authentication   当前用户
     * @param object
     * @param configAttributes 角色
     * @throws AccessDeniedException
     * @throws InsufficientAuthenticationException
     */
    @Override
    public void decide(Authentication authentication, Object object,
                       Collection<ConfigAttribute> configAttributes) throws AccessDeniedException, InsufficientAuthenticationException {
    
    
        // 当接口未被配置资源时直接放行
        if (CollUtil.isEmpty(configAttributes)) {
    
    
            return;
        }
        Iterator<ConfigAttribute> iterator = configAttributes.iterator();
        // 循环上一步的角色
        while (iterator.hasNext()) {
    
    
            ConfigAttribute configAttribute = iterator.next();
            //将访问所需资源或用户拥有资源进行比对
            String needAuthority = configAttribute.getAttribute();
            // 根据当前用户角色 循环
            for (GrantedAuthority grantedAuthority : authentication.getAuthorities()) {
    
    

                if (needAuthority.trim().equals(grantedAuthority.getAuthority())) {
    
    
                    return;
                }
            }
        }
        throw new AccessDeniedException("抱歉,您没有访问权限");
    }

    @Override
    public boolean supports(ConfigAttribute configAttribute) {
    
    
        return true;
    }

    @Override
    public boolean supports(Class<?> aClass) {
    
    
        return true;
    }

}
/**
 * 动态权限过滤器,用于实现基于路径的动态权限过滤
 * Created by macro on 2020/2/7.
 */
public class DynamicSecurityFilter extends AbstractSecurityInterceptor implements Filter {
    
    

    @Autowired
    private DynamicSecurityMetadataSource dynamicSecurityMetadataSource;
    @Autowired
    private IgnoreUrlsConfig ignoreUrlsConfig;

    @Autowired
    public void setMyAccessDecisionManager(DynamicAccessDecisionManager dynamicAccessDecisionManager) {
    
    
        super.setAccessDecisionManager(dynamicAccessDecisionManager);
    }

    @Override
    public void init(FilterConfig filterConfig) throws ServletException {
    
    
    }

    @Override
    public void doFilter(ServletRequest servletRequest, ServletResponse servletResponse, FilterChain filterChain) throws IOException, ServletException {
    
    
        HttpServletRequest request = (HttpServletRequest) servletRequest;
        FilterInvocation fi = new FilterInvocation(servletRequest, servletResponse, filterChain);
        //OPTIONS请求直接放行
        if(request.getMethod().equals(HttpMethod.OPTIONS.toString())){
    
    
            fi.getChain().doFilter(fi.getRequest(), fi.getResponse());
            return;
        }
        //白名单请求直接放行
        PathMatcher pathMatcher = new AntPathMatcher();
        for (String path : ignoreUrlsConfig.getUrls()) {
    
    
            if(pathMatcher.match(path,request.getRequestURI())){
    
    
                fi.getChain().doFilter(fi.getRequest(), fi.getResponse());
                return;
            }
        }
        //此处会调用AccessDecisionManager中的decide方法进行鉴权操作
        InterceptorStatusToken token = super.beforeInvocation(fi);
        try {
    
    
            fi.getChain().doFilter(fi.getRequest(), fi.getResponse());
        } finally {
    
    
            super.afterInvocation(token, null);
        }
    }

    @Override
    public void destroy() {
    
    
    }

    @Override
    public Class<?> getSecureObjectClass() {
    
    
        return FilterInvocation.class;
    }

    @Override
    public SecurityMetadataSource obtainSecurityMetadataSource() {
    
    
        return dynamicSecurityMetadataSource;
    }
}
/**
 * 动态权限数据源,用于获取动态权限规则
 * Created by macro on 2020/2/7.
 */
public class DynamicSecurityMetadataSource implements FilterInvocationSecurityMetadataSource {
    
    

    // 所有的资源角色信息的map
    private static Map<RequestMatcher, List<ConfigAttribute>> configAttributeMap = null;
    @Autowired
    private DynamicSecurityService dynamicSecurityService;

    // @PostConstruct spring在创建bean的时候调用这个注解初始化方法
    // 读取到所有的资源角色信息
    @PostConstruct
    public void loadDataSource() {
    
    
        configAttributeMap = dynamicSecurityService.loadDataSource();
    }

    // 清除   在资源分配的时候就清除掉
    public void clearDataSource() {
    
    
        configAttributeMap.clear();
        configAttributeMap = null;
    }

    @Override
    public Collection<ConfigAttribute> getAttributes(Object o) throws IllegalArgumentException {
    
    
        // 在清除后就会再次获取最新的资源角色信息
        if (configAttributeMap == null) this.loadDataSource();
        List<ConfigAttribute>  configAttributes = new ArrayList<>();
        //获取当前访问的路径
        HttpServletRequest request = ((FilterInvocation) o).getRequest();
        Iterator<RequestMatcher> iterator = configAttributeMap.keySet().iterator();
        //循环所有资源角色信息
        while (iterator.hasNext()) {
    
    
            RequestMatcher pattern = iterator.next();
            // 匹配上了
            if (pattern.matches(request)) {
    
    
                // 拿到角色信息
                configAttributes.addAll(configAttributeMap.get(pattern));
            }
        }
        // 未设置操作请求权限,返回空集合
        return configAttributes;
    }

    @Override
    public Collection<ConfigAttribute> getAllConfigAttributes() {
    
    
        return null;
    }

    @Override
    public boolean supports(Class<?> aClass) {
    
    
        return true;
    }

}
/**
 * 动态权限相关业务类
 * Created by macro on 2020/2/7.
 */
public interface DynamicSecurityService {
    
    
    /**
     * 加载资源ANT通配符和资源对应MAP
     * key: 匹配器 (在DynamicSecurityMetadataSource起作用)
     * value: 资源所对应的角色
     * @return
     */
    Map<RequestMatcher, List<ConfigAttribute>> loadDataSource();
}
// 获取最新的资源角色信息
    @Bean("dynamicSecurityService")
    public DynamicSecurityService dynamicSecurityService() {
    
    
        return () -> {
    
    
            Map<RequestMatcher, List<ConfigAttribute>> map = new ConcurrentHashMap<>();

            List<ResourceRoleDto> list= resourceService.getResourceRole();
            for (ResourceRoleDto resource : list) {
    
    
                // 通配符匹配器
                map.put(new AntPathRequestMatcher(resource.getUrl()),
                        // 所有角色信息
                        resource.getRoleList().stream()
                                .map(role-> new org.springframework.security.access.SecurityConfig(role.getName()))
                                .collect(Collectors.toList())
                );
            }
            return map;
        };
    }

在这里插入图片描述

@Configuration
public class SecurityConfig extends WebSecurityConfigurerAdapter {
    
    
    /**
     * 前台服务没有动态权限功能
     */
    @Autowired(required = false)
    private SecuriResourceRoleSource securiResourceRoleSource;
    @Autowired(required = false)
    private DynamicSecurityMetadataSource dynamicSecurityService;
    /**
     * 权限配置    白名单,jwt认证等等
     * @param http
     * @throws Exception
     */
    @Override
    protected void configure(HttpSecurity http) throws Exception {
    
    
        //白名单进行放行
        ExpressionUrlAuthorizationConfigurer<HttpSecurity>.ExpressionInterceptUrlRegistry registry = http.authorizeRequests();

        //循环白名单进行放行
        for (String url : ignoreUrlsConfig().getUrls()) {
    
    
            registry.antMatchers(url)
                    .permitAll();
        }
        //跨域
        //允许可以请求OPTIONS  CORS
        registry.antMatchers(HttpMethod.OPTIONS).permitAll();

        //其他请求都需要身份认证
        registry.anyRequest().authenticated()
                .and().cors()//支持跨域
                // 关闭csrf跨站请求伪造 :因为现在使用jwt来实现认证
                .and().csrf().disable()
                // 禁止session   性能更好
                .sessionManagement().sessionCreationPolicy(SessionCreationPolicy.STATELESS)
                // 自定义权限拒绝处理类
                .and().exceptionHandling()
                // 没有权限访问时的处理类
                .accessDeniedHandler(restfulAccessDeniedHandler())
                //没有登录时的处理类
                .authenticationEntryPoint(restfulAuthenticationEntryPoint())
                .and()
                //加入jwt认证过滤器
                .addFilterBefore(jwtAuthenticationFilter(), UsernamePasswordAuthenticationFilter.class);

                //有动态权限配置时添加动态权限校验过滤器
                if(dynamicSecurityService!=null){
    
    
                    registry.and().addFilterBefore(dynamicSecurityFilter(), FilterSecurityInterceptor.class);
                }
    }

    @Bean
    public JwtAuthenticationFilter jwtAuthenticationFilter(){
    
    
        return new JwtAuthenticationFilter();
    }

    @Bean
    public IgnoreUrlsConfig ignoreUrlsConfig(){
    
    
        return new IgnoreUrlsConfig();
    }

    @Bean
    public RestfulAccessDeniedHandler restfulAccessDeniedHandler(){
    
    
        return new RestfulAccessDeniedHandler();
    }

    @Bean
    public RestfulAuthenticationEntryPoint restfulAuthenticationEntryPoint(){
    
    
        return new RestfulAuthenticationEntryPoint();
    }

    @Bean
    public PasswordEncoder passwordEncoder(){
    
    
        return new BCryptPasswordEncoder();
    }
    /**
     * 作用:根据当前请求url获取对应角色
     * @return
     */
    @ConditionalOnBean(name = "dynamicSecurityService")
    @Bean
    public DynamicAccessDecisionManager dynamicAccessDecisionManager() {
    
    
        return new DynamicAccessDecisionManager();
    }

    /**
     * 作用:在FilterSecurityInterceptor前面的自定义过滤器
     * @return
     */
    @ConditionalOnBean(name = "dynamicSecurityService")
    @Bean
    public DynamicSecurityFilter dynamicSecurityFilter() {
    
    
        return new DynamicSecurityFilter();
    }

    /**
     * 作用:鉴权
     * @return
     */
    @ConditionalOnBean(name = "dynamicSecurityService")
    @Bean
    public DynamicSecurityMetadataSource dynamicSecurityMetadataSource() {
    
    
        return new DynamicSecurityMetadataSource();
    }


}

全部代码

SecurityConfig

@Configuration
public class SecurityConfig extends WebSecurityConfigurerAdapter {
    
    
    /**
     * 前台服务没有动态权限功能
     */
    @Autowired(required = false)
    private SecuriResourceRoleSource securiResourceRoleSource;
    @Autowired(required = false)
    private DynamicSecurityMetadataSource dynamicSecurityService;
    /**
     * 权限配置    白名单,jwt认证等等
     * @param http
     * @throws Exception
     */
    @Override
    protected void configure(HttpSecurity http) throws Exception {
    
    
        //白名单进行放行
        ExpressionUrlAuthorizationConfigurer<HttpSecurity>.ExpressionInterceptUrlRegistry registry = http.authorizeRequests();

        //循环白名单进行放行
        for (String url : ignoreUrlsConfig().getUrls()) {
    
    
            registry.antMatchers(url)
                    .permitAll();
        }

        /*if (securiResourceRoleSource != null) {
            Map<String, List<String>> map = securiResourceRoleSource.getResourceRole();
            //循环注册
            if (!map.isEmpty()) {
                Set<Map.Entry<String, List<String>>> entries = map.entrySet();
//                for (Map.Entry<String, List<String>> entry : entries) {
//                    entry.getKey()
//                }
                Iterator<Map.Entry<String, List<String>>> iterator = entries.iterator();
                while (iterator.hasNext()) {
                    Map.Entry<String, List<String>> next = iterator.next();
                    //list转换数据,object[]转换为String[]
                    List<String> list = next.getValue();
                    String[] toArray = list.toArray(new String[list.size()]);
                    registry.antMatchers(next.getKey()).hasAnyAuthority(toArray);
                }
            }
        }*/

        //跨域
        //允许可以请求OPTIONS  CORS
        registry.antMatchers(HttpMethod.OPTIONS).permitAll();

        //其他请求都需要身份认证
        registry.anyRequest().authenticated()
                .and().cors()//支持跨域
                // 关闭csrf跨站请求伪造 :因为现在使用jwt来实现认证
                .and().csrf().disable()
                // 禁止session   性能更好
                .sessionManagement().sessionCreationPolicy(SessionCreationPolicy.STATELESS)
                // 自定义权限拒绝处理类
                .and().exceptionHandling()
                // 没有权限访问时的处理类
                .accessDeniedHandler(restfulAccessDeniedHandler())
                //没有登录时的处理类
                .authenticationEntryPoint(restfulAuthenticationEntryPoint())
                .and()
                //加入jwt认证过滤器
                .addFilterBefore(jwtAuthenticationFilter(), UsernamePasswordAuthenticationFilter.class);

                //有动态权限配置时添加动态权限校验过滤器
                if(dynamicSecurityService!=null){
    
    
                    registry.and().addFilterBefore(dynamicSecurityFilter(), FilterSecurityInterceptor.class);
                }
    }

    @Bean
    public JwtAuthenticationFilter jwtAuthenticationFilter(){
    
    
        return new JwtAuthenticationFilter();
    }

    @Bean
    public IgnoreUrlsConfig ignoreUrlsConfig(){
    
    
        return new IgnoreUrlsConfig();
    }

    @Bean
    public RestfulAccessDeniedHandler restfulAccessDeniedHandler(){
    
    
        return new RestfulAccessDeniedHandler();
    }

    @Bean
    public RestfulAuthenticationEntryPoint restfulAuthenticationEntryPoint(){
    
    
        return new RestfulAuthenticationEntryPoint();
    }

    @Bean
    public PasswordEncoder passwordEncoder(){
    
    
        return new BCryptPasswordEncoder();
    }
    /**
     * 作用:根据当前请求url获取对应角色
     * @return
     */
    @ConditionalOnBean(name = "dynamicSecurityService")
    @Bean
    public DynamicAccessDecisionManager dynamicAccessDecisionManager() {
    
    
        return new DynamicAccessDecisionManager();
    }

    /**
     * 作用:在FilterSecurityInterceptor前面的自定义过滤器
     * @return
     */
    @ConditionalOnBean(name = "dynamicSecurityService")
    @Bean
    public DynamicSecurityFilter dynamicSecurityFilter() {
    
    
        return new DynamicSecurityFilter();
    }

    /**
     * 作用:鉴权
     * @return
     */
    @ConditionalOnBean(name = "dynamicSecurityService")
    @Bean
    public DynamicSecurityMetadataSource dynamicSecurityMetadataSource() {
    
    
        return new DynamicSecurityMetadataSource();
    }
}
@Configuration
@EnableWebSecurity  //启动springsecurity
public class MallSecurityConfig extends SecurityConfig {
    
    

    @Autowired
    private UmsMemberService memberService;//user
    @Autowired
    private UmsResourceService resourceService;//resource

    /**
     * 认证交给springsecurity
     * @return
     */
    @Bean
    public UserDetailsService userDetailsService(){
    
    
        return username->memberService.loadUserByUsername(username);
    }

    /**
     * 为Springsecurity配置的资源信息
     * @return
     */
//    @Bean
    public SecuriResourceRoleSource securiResourceRoleSource(){
    
    
        return new SecuriResourceRoleSource() {
    
    
            @Override
            public Map<String, List<String>> getResourceRole() {
    
    
                //业务逻辑类 查询 对应的资源信息  用户  角色  资源三者关系
                List<ResourceRoleDto> list=resourceService.getResourceRole();

                Map<String, List<String>> map = new LinkedHashMap<>();
                for (ResourceRoleDto resourceRoleDto : list) {
    
    
                    List<String> roleNameList = list.stream().map(r -> r.getName()).collect(Collectors.toList());
                    map.put(resourceRoleDto.getUrl(),roleNameList);
                }
                return map;
            }
        };
    }


    // 获取最新的资源角色信息
    @Bean("dynamicSecurityService")
    public DynamicSecurityService dynamicSecurityService() {
    
    
        return () -> {
    
    
            Map<RequestMatcher, List<ConfigAttribute>> map = new ConcurrentHashMap<>();
            List<ResourceRoleDto> list= resourceService.getResourceRole();
            for (ResourceRoleDto resource : list) {
    
    
                // 通配符匹配器
                map.put(new AntPathRequestMatcher(resource.getUrl()),
                        // 所有角色信息
                        resource.getRoleList().stream()
                                .map(role-> new org.springframework.security.access.SecurityConfig(role.getName()))
                                .collect(Collectors.toList())
                );
            }
            return map;
        };
    }
}

UserDetailsService,UserDetails

 @Override
    public UserDetails loadUserByUsername(String username) {
    
    
        UmsMember umsMember = getAdminByUsername(username);
        //根据用户id返回用户的角色
        List<UmsRole> roleList = roleMapper.getRoleList(umsMember.getId());
        if (umsMember!=null) {
    
    
            return new MemberDetails(umsMember,roleList);
        }
        throw  new ApiException("用户名或密码错误");
    }
/**
 * @author
 *
 * 用户信息,用户权限信息
 */
public class MemberDetails implements UserDetails {
    
    

    private UmsMember umsMember;

    List<UmsRole> roleList;

    public MemberDetails(UmsMember umsMember, List<UmsRole> roleList) {
    
    
        this.umsMember = umsMember;
        this.roleList = roleList;
    }


    /**
     * 返回当前用户的角色信息
     * @return
     */
    @Override
    public Collection<? extends GrantedAuthority> getAuthorities() {
    
    
        List<GrantedAuthority> authorities = roleList.stream().map(role -> {
    
    
            return new SimpleGrantedAuthority(role.getName());
        }).collect(Collectors.toList());
        return authorities;
    }

    @Override
    public String getPassword() {
    
    
        return umsMember.getPassword();
    }

    @Override
    public String getUsername() {
    
    
        return umsMember.getUsername();
    }

    @Override
    public boolean isAccountNonExpired() {
    
    
        return false;
    }

    @Override
    public boolean isAccountNonLocked() {
    
    
        return false;
    }

    @Override
    public boolean isCredentialsNonExpired() {
    
    
        return false;
    }
    /**
     * 用户是否启用状态
     * @return
     */
    @Override
    public boolean isEnabled() {
    
    
        return umsMember.getStatus()==1;
    }

    public UmsMember getUmsMember() {
    
    
        return umsMember;
    }
}

登录代码

	@ApiOperation(value = "登录")
    @RequestMapping(value = "/login", method = RequestMethod.POST)
    @ResponseBody
    public CommonResult login(@Validated @RequestBody UmsMember umsMemberParam) {
    
    
        UmsMember login = umsMemberService.login(umsMemberParam.getUsername(), umsMemberParam.getPassword());
        if (login == null) {
    
    
            return CommonResult.validateFailed("用户名或密码错误");
        }

        String token = jwtTokenUtil.generateUserNameStr(login.getUsername());

        Map<String, String> tokenMap = new HashMap<>();
        // jwt
        tokenMap.put("token",token);
        tokenMap.put("tokenHead",tokenHead);
        tokenMap.put("tokenHeader",tokenHeader);

        return CommonResult.success(tokenMap);
    }

JWT工具类

/**
 * JwtToken生成的工具类
 * JWT token的格式:header.payload.signature
 * header的格式(算法、token的类型):
 * {"alg": "HS512","typ": "JWT"}
 * payload的格式(用户名、创建时间、生成时间):
 * {"sub":"wang","created":1489079981393,"exp":1489684781}
 * signature的生成算法:
 * HMACSHA512(base64UrlEncode(header) + "." +base64UrlEncode(payload),secret)
 */
public class JwtTokenUtil {
    
    
    public static ThreadLocal<String> currentUsername=new ThreadLocal<>();
    private static final Logger LOGGER = LoggerFactory.getLogger(JwtTokenUtil.class);
    private static final String CLAIM_KEY_USERNAME = "user_name";
    private static final String CLAIM_KEY_CREATED = "created";
    @Value("${jwt.secret}")
    private String secret;
    @Value("${jwt.expiration}")
    private Long expiration;
    @Value("${jwt.tokenHead}")
    private String tokenHead;

    /**
     * 根据负责生成JWT的token
     */
    private String generateToken(Map<String, Object> claims) {
    
    
        return Jwts.builder()
                .setClaims(claims)
                .setExpiration(generateExpirationDate())
                .signWith(SignatureAlgorithm.HS512, secret)
                .compact();
    }

    /**
     * 从token中获取JWT中的负载
     */
    private Claims getClaimsFromToken(String token) {
    
    
        Claims claims = null;
        try {
    
    
            claims = Jwts.parser()
                    .setSigningKey(secret)
                    .parseClaimsJws(token)
                    .getBody();
        } catch (Exception e) {
    
    
            LOGGER.info("JWT格式验证失败:{}", token);
        }
        return claims;
    }

    /**
     * 生成token的过期时间
     */
    private Date generateExpirationDate() {
    
    
        return new Date(System.currentTimeMillis() + expiration * 1000);
    }

    /**
     * 解密:从token中获取登录用户名(项目使用)
     */
    public String getUserNameFromToken(String token) {
    
    
        String username;
        try {
    
    
            Claims claims = getClaimsFromToken(token);
            username = claims.get(CLAIM_KEY_USERNAME,String.class);
        } catch (Exception e) {
    
    
            username = null;
        }
        return username;
    }

    /**
     * 加密: 根据用户名生成token(项目使用)
     */
    public String generateUserNameStr(String username) {
    
    
        Map<String, Object> claims = new HashMap<>();
        claims.put(CLAIM_KEY_USERNAME,username);
        claims.put(CLAIM_KEY_CREATED, new Date());
        return generateToken(claims);
    }

    /**
     * 判断token是否已经失效
     */
    private boolean isTokenExpired(String token) {
    
    
        Date expiredDate = getExpiredDateFromToken(token);
        return expiredDate.before(new Date());
    }

    /**
     * 从token中获取过期时间
     */
    private Date getExpiredDateFromToken(String token) {
    
    
        Claims claims = getClaimsFromToken(token);
        return claims.getExpiration();
    }

    /**
     * 当原来的token没过期时是可以刷新的
     *
     * @param oldToken 带tokenHead的token
     */
    public String refreshHeadToken(String oldToken) {
    
    
        if(StrUtil.isEmpty(oldToken)){
    
    
            return null;
        }
        String token = oldToken.substring(tokenHead.length());
        if(StrUtil.isEmpty(token)){
    
    
            return null;
        }
        //token校验不通过
        Claims claims = getClaimsFromToken(token);
        if(claims==null){
    
    
            return null;
        }
        //如果token已经过期,不支持刷新
        if(isTokenExpired(token)){
    
    
            return null;
        }
        //如果token在30分钟之内刚刷新过,返回原token
        if(tokenRefreshJustBefore(token,30*60)){
    
    
            return token;
        }else{
    
    
            claims.put(CLAIM_KEY_CREATED, new Date());
            return generateToken(claims);
        }
    }

    /**
     * 判断token在指定时间内是否刚刚刷新过
     * @param token 原token
     * @param time 指定时间(秒)
     */
    private boolean tokenRefreshJustBefore(String token, int time) {
    
    
        Claims claims = getClaimsFromToken(token);
        Date created = claims.get(CLAIM_KEY_CREATED, Date.class);
        Date refreshDate = new Date();
        //刷新时间在创建时间的指定时间内
        if(refreshDate.after(created)&&refreshDate.before(DateUtil.offsetSecond(created,time))){
    
    
            return true;
        }
        return false;
    }
}

猜你喜欢

转载自blog.csdn.net/Forbidden_City/article/details/132283992