springSecurity入门

依赖

1
2
3
4
<dependency>
<groupId>org.springframework.boot</groupId>
<artifactId>spring-boot-starter-security</artifactId>
</dependency>

1677239193793

添加登录及权限

我怎么感觉有点麻烦呢,又是经典白学?

controller

1
2
3
4
5
6
7
8
9
10
11
12
13
14
15
16
17
@PostMapping("/login")
public String login(@RequestBody User user) {
// 内部使用 UserDetailsService 查询用户,正确返回信息 错误返回空(大概)
UsernamePasswordAuthenticationToken usernamePasswordAuthenticationToken = new UsernamePasswordAuthenticationToken(user.getUsername(), user.getPassword());
// 取出刚才返回信息的内部存储的 UserDetails
Authentication authenticate = authenticationManager.authenticate(usernamePasswordAuthenticationToken);

if (Objects.isNull(authenticate)) {
throw new RuntimeException("用户名或密码错误");
}

LoginUser principal = (LoginUser) authenticate.getPrincipal();
System.out.println(principal);

// 返回一个token,在 JwtAuthenticationTokenFilter 中根据这个token获取权限和信息
return JwtUtil.createToken(principal.getUsername(), principal.getPassword());
}

在那些东西之前的jwt

1
2
3
4
5
6
7
8
9
10
11
12
13
14
15
16
17
18
19
20
21
22
23
24
25
26
27
28
29
30
31
32
33
34
35
36
37
38
39
40
41
42
43
44
45
46
47
48
49
50
51
52
53
54
package cn.sdadgz.security;

import cn.sdadgz.entity.User;
import cn.sdadgz.service.IUserService;
import lombok.RequiredArgsConstructor;
import org.springframework.security.authentication.UsernamePasswordAuthenticationToken;
import org.springframework.security.core.context.SecurityContextHolder;
import org.springframework.stereotype.Component;
import org.springframework.web.filter.OncePerRequestFilter;

import javax.servlet.FilterChain;
import javax.servlet.ServletException;
import javax.servlet.http.HttpServletRequest;
import javax.servlet.http.HttpServletResponse;
import java.io.IOException;
import java.util.Collections;
import java.util.Objects;

/**
* <p>
* 废物本物
* </p>
*
* @author sdadgz
* @since 2023/2/24 14:46:16
*/
@Component
@RequiredArgsConstructor
public class JwtAuthenticationTokenFilter extends OncePerRequestFilter {

private final IUserService userService;

@Override
protected void doFilterInternal(HttpServletRequest request, HttpServletResponse response, FilterChain filterChain) throws ServletException, IOException {
String token = request.getHeader("token");
if (Objects.isNull(token)) {
// 没有token,放行
filterChain.doFilter(request, response);
return;
}

// todo 获取用户,这里先写死
// 这里本应是根据刚才的token从redis中取到权限信息和用户
User user = userService.getById(4);
LoginUser loginUser = new LoginUser(user);
loginUser.setPermissions(Collections.singletonList("test"));

// 授权,从数据库中获取
UsernamePasswordAuthenticationToken usernamePasswordAuthenticationToken = new UsernamePasswordAuthenticationToken(loginUser, null,/* 授权 */ loginUser.getAuthorities());
SecurityContextHolder.getContext().setAuthentication(usernamePasswordAuthenticationToken);
// 放行
filterChain.doFilter(request, response);
}
}

controller登录调用的UserDetailsService

1
2
3
4
5
6
7
8
9
10
11
12
13
14
15
16
17
18
19
20
21
22
23
24
25
26
27
28
29
30
31
32
33
34
35
36
37
38
39
package cn.sdadgz.security;

import cn.sdadgz.entity.User;
import cn.sdadgz.service.IUserService;
import com.baomidou.mybatisplus.core.conditions.query.LambdaQueryWrapper;
import lombok.RequiredArgsConstructor;
import org.springframework.security.core.userdetails.UserDetails;
import org.springframework.security.core.userdetails.UserDetailsService;
import org.springframework.security.core.userdetails.UsernameNotFoundException;
import org.springframework.stereotype.Service;

import java.util.Collections;
import java.util.Objects;

/**
* <p>
* 废物本物
* </p>
*
* @author sdadgz
* @since 2023/2/22 19:46:57
*/
@Service
@RequiredArgsConstructor
public class UserDetailServiceImpl implements UserDetailsService {

private final IUserService userService;

@Override
public UserDetails loadUserByUsername(String username) throws UsernameNotFoundException {
LambdaQueryWrapper<User> wrapper = new LambdaQueryWrapper<>();
wrapper.eq(User::getUsername, username);
User user = userService.getOne(wrapper);
if (Objects.isNull(user)) {
throw new RuntimeException("用户名或密码错误");
}
return new LoginUser(user, Collections.singletonList("test")); // todo 从数据库中获取权限信息
}
}

UserDetailsServcie使用的UserDetails

1
2
3
4
5
6
7
8
9
10
11
12
13
14
15
16
17
18
19
20
21
22
23
24
25
26
27
28
29
30
31
32
33
34
35
36
37
38
39
40
41
42
43
44
45
46
47
48
49
50
51
52
53
54
55
56
57
58
59
60
61
62
63
64
65
66
67
68
69
70
71
72
73
74
75
76
77
78
79
80
package cn.sdadgz.security;

import cn.sdadgz.entity.User;
import lombok.*;
import org.springframework.security.core.GrantedAuthority;
import org.springframework.security.core.authority.SimpleGrantedAuthority;
import org.springframework.security.core.userdetails.UserDetails;

import java.util.Collection;
import java.util.List;
import java.util.stream.Collectors;

/**
* <p>
* 废物本物
* </p>
*
* @author sdadgz
* @since 2023/2/22 21:15:04
*/
@Getter
@Setter
@NoArgsConstructor
public class LoginUser implements UserDetails {

private User user;

private List<String> permissions;

public LoginUser(User user) {
this.user = user;
}

public LoginUser(User user, List<String> permissions) {
this.user = user;
this.permissions = permissions;
}

// 授权
@Override
public Collection<? extends GrantedAuthority> getAuthorities() {
return permissions.stream().map(SimpleGrantedAuthority::new).collect(Collectors.toList());
}

// 获取密码
@Override
public String getPassword() {
return user.getPassword();
}

// 获取用户名
@Override
public String getUsername() {
return user.getUsername();
}

// 是否在期
@Override
public boolean isAccountNonExpired() {
return true;
}

// true放行
@Override
public boolean isAccountNonLocked() {
return true;
}

// true放行
@Override
public boolean isCredentialsNonExpired() {
return true;
}

// 是否可用
@Override
public boolean isEnabled() {
return true;
}
}

配置

1
2
3
4
5
6
7
8
9
10
11
12
13
14
15
16
17
18
19
20
21
22
23
24
25
26
27
28
29
30
31
32
33
34
35
36
37
38
39
40
41
42
43
44
45
46
47
48
49
50
51
52
53
54
55
56
57
58
59
60
61
62
63
64
65
66
67
68
69
70
71
72
package cn.sdadgz.security;

import lombok.RequiredArgsConstructor;
import org.springframework.context.annotation.Bean;
import org.springframework.context.annotation.Configuration;
import org.springframework.security.authentication.AuthenticationManager;
import org.springframework.security.config.annotation.authentication.configuration.EnableGlobalAuthentication;
import org.springframework.security.config.annotation.method.configuration.EnableGlobalMethodSecurity;
import org.springframework.security.config.annotation.web.builders.HttpSecurity;
import org.springframework.security.config.annotation.web.configuration.EnableWebSecurity;
import org.springframework.security.config.annotation.web.configuration.WebSecurityConfiguration;
import org.springframework.security.config.annotation.web.configuration.WebSecurityConfigurerAdapter;
import org.springframework.security.config.http.SessionCreationPolicy;
import org.springframework.security.crypto.bcrypt.BCryptPasswordEncoder;
import org.springframework.security.crypto.password.PasswordEncoder;
import org.springframework.security.web.AuthenticationEntryPoint;
import org.springframework.security.web.access.AccessDeniedHandler;
import org.springframework.security.web.authentication.UsernamePasswordAuthenticationFilter;

/**
* <p>
* 废物本物
* </p>
*
* @author sdadgz
* @since 2023/2/23 19:33:51
*/
@RequiredArgsConstructor
@EnableGlobalMethodSecurity(prePostEnabled = true)
public class SecurityConfig extends WebSecurityConfigurerAdapter {

private final JwtAuthenticationTokenFilter jwtAuthenticationTokenFilter;
private final AuthenticationEntryPoint authenticationEntryPoint;
private final AccessDeniedHandler accessDeniedHandler;

// 使用这个加密密码
@Bean
public PasswordEncoder passwordEncoder() {
return new BCryptPasswordEncoder();
}

// 将authenticationManagerBean注入到容器中
@Bean
@Override
public AuthenticationManager authenticationManagerBean() throws Exception {
return super.authenticationManagerBean();
}

// 配置,我看不懂
@Override
protected void configure(HttpSecurity http) throws Exception {
// super.configure(http);
// 必要配置
http.csrf().disable()
.sessionManagement().sessionCreationPolicy(SessionCreationPolicy.STATELESS) // session设置
.and() // 结束上述设置
.authorizeRequests() // 放行设置
.antMatchers("/user/login", "/user/register").anonymous() // 未登录可访问
.anyRequest().authenticated(); // 类 '/**' 全部拦截

// 添加过滤器,过滤jwt伪造及过期
http.addFilterBefore(jwtAuthenticationTokenFilter, UsernamePasswordAuthenticationFilter.class);

// 添加异常处理
http.exceptionHandling()
.accessDeniedHandler(accessDeniedHandler)
.authenticationEntryPoint(authenticationEntryPoint);

// 允许跨域
http.cors();
}
}

使用登录的信息

所有授权信息都在jwt的那里添加,config拦截未授权的访问

退出登录

  1. 删了redis中的用户信息
  2. jwt那里发现取不到redis值
  3. 抛出用户未登录
  4. 结束

权限注解

  1. 配置文件加上@EnableGlobalMethodSecurity(prePostEnabled = true)注解,去掉冗余的@Configuration注解
  2. 需要特定权限的controller设置 @PreAuthorize("hasAuthority('test')")

  1. 同上第一步
  2. 。。。设置@PreAuthorize("@[my.compoment].hasAuthority('test')")

自定义权限验证类

1
2
3
4
5
6
7
8
9
10
11
12
13
14
15
16
17
18
19
20
21
22
23
24
25
26
27
28
29
30
31
32
33
package cn.sdadgz.security;

import org.springframework.security.core.Authentication;
import org.springframework.security.core.GrantedAuthority;
import org.springframework.security.core.context.SecurityContextHolder;
import org.springframework.stereotype.Component;

import java.util.Collection;
import java.util.List;

/**
* <p>
* 废物本物
* </p>
*
* @author sdadgz
* @since 2023/2/26 15:01:14
*/
@Component
public class Ex {
public static boolean hasAuthority(String auth){
Authentication authentication = SecurityContextHolder.getContext().getAuthentication();
LoginUser loginUser = (LoginUser) authentication.getPrincipal();
// 我觉得可以这样写
Collection<? extends GrantedAuthority> authorities = authentication.getAuthorities();
// 他的写法
List<String> permissions = loginUser.getPermissions();

// todo 自定义验证

return true;
}
}

其他

  • 登录成功处理器
  • 登录失败处理器
  • 登出成功处理器
  • 。。。

例一:

需要在配置中加上对应配置,似乎像是废话

1
2
3
4
5
6
7
8
9
10
11
12
13
14
15
16
17
18
19
20
21
22
23
24
25
26
27
28
29
30
31
32
package cn.sdadgz.security;

import cn.hutool.json.JSON;
import cn.hutool.json.JSONUtil;
import cn.sdadgz.exception.MyException;
import cn.sdadgz.utils.WebUtil;
import org.springframework.http.codec.cbor.Jackson2CborEncoder;
import org.springframework.security.access.AccessDeniedException;
import org.springframework.security.web.access.AccessDeniedHandler;
import org.springframework.stereotype.Component;

import javax.servlet.ServletException;
import javax.servlet.http.HttpServletRequest;
import javax.servlet.http.HttpServletResponse;
import java.io.IOException;

/**
* <p>
* 废物本物
* </p>
*
* @author sdadgz
* @since 2023/2/25 13:57:07
*/
@Component
public class AccessDeniedHandlerImpl implements AccessDeniedHandler {
@Override
public void handle(HttpServletRequest request, HttpServletResponse response, AccessDeniedException accessDeniedException) throws MyException {
String json = JSONUtil.toJsonStr("权限不足");
WebUtil.renderString(response, json);
}
}

例二:

1
2
3
4
5
6
7
8
9
10
11
12
13
14
15
16
17
18
19
20
21
22
23
24
25
26
27
28
29
30
package cn.sdadgz.security;

import cn.hutool.json.JSONUtil;
import cn.sdadgz.exception.MyException;
import cn.sdadgz.utils.WebUtil;
import org.springframework.security.core.AuthenticationException;
import org.springframework.security.web.AuthenticationEntryPoint;
import org.springframework.stereotype.Component;

import javax.servlet.ServletException;
import javax.servlet.http.HttpServletRequest;
import javax.servlet.http.HttpServletResponse;
import java.io.IOException;

/**
* <p>
* 废物本物
* </p>
*
* @author sdadgz
* @since 2023/2/25 11:51:09
*/
@Component
public class AuthenticationEntryPointImpl implements AuthenticationEntryPoint {
@Override
public void commence(HttpServletRequest request, HttpServletResponse response, AuthenticationException authException) throws MyException {
String json = JSONUtil.toJsonStr("认证失败");
WebUtil.renderString(response, json);
}
}