日本不卡不码高清免费观看,久久国产精品久久w女人spa,黄色aa久久,三上悠亚国产精品一区二区三区

您的位置:首頁技術文章
文章詳情頁

SpringBoot集成Spring security JWT實現接口權限認證

瀏覽:25日期:2023-03-18 13:27:04
1、添加依賴

<dependency> <groupId>org.springframework.boot</groupId> <artifactId>spring-boot-starter-security</artifactId></dependency><dependency> <groupId>io.jsonwebtoken</groupId> <artifactId>jjwt</artifactId> <version>0.9.1</version></dependency>2、集成JWT工具類(JwtUtils)

package com.dreamteam.chdapp.utils;import io.jsonwebtoken.Jwts;import io.jsonwebtoken.SignatureAlgorithm;import org.slf4j.Logger;import org.slf4j.LoggerFactory;import javax.servlet.http.HttpServletRequest;import java.util.Date;import java.util.HashMap;import java.util.Map;/** * @Author HeYunHui * @create 2020/11/15 14:12 */public class JwtUtils { private static final Logger logger= LoggerFactory.getLogger(JwtUtils.class); public static final long EXPIRATION_TIME=60*60*1000;// 令牌環有效期 public static final String SECRET='abc123456def';//令牌環密鑰 public static final String TOKEN_PREFIX='Bearer';//令牌環頭標識 public static final String HEADER_STRING='Passport';//配置令牌環在http heads中的鍵值 public static final String ROLE='ROLE';//自定義字段-角色字段 //生成令牌環 public static String generateToken(String userRole,String userid){HashMap<String,Object> map=new HashMap<>();map.put(ROLE,userRole);map.put('userid',userid);String jwt= Jwts.builder().setClaims(map).setExpiration(new Date(System.currentTimeMillis()+EXPIRATION_TIME)).signWith(SignatureAlgorithm.HS512,SECRET).compact();return TOKEN_PREFIX+' '+jwt; } //生成令牌環 public static String generateToken(String userRole,String userid,long exprationtime){HashMap<String,Object> map=new HashMap<>();map.put(ROLE,userRole);map.put('userid',userid);String jwt= Jwts.builder().setClaims(map).setExpiration(new Date(System.currentTimeMillis()+exprationtime)).signWith(SignatureAlgorithm.HS512,SECRET).compact();return TOKEN_PREFIX+' '+jwt; } //令牌環校驗 public static Map<String,Object> validateTokenAndGetClaims(HttpServletRequest request){String token=request.getHeader(HEADER_STRING);if(token==null){ throw new TokenValidationException('Missing Token');}else{ Map<String,Object> body= Jwts.parser() .setSigningKey(SECRET) .parseClaimsJws(token.replace(TOKEN_PREFIX,'')) .getBody(); return body;} }static class TokenValidationException extends RuntimeException{public TokenValidationException(String msg){ super(msg);} }}3、集成JWT filter(攔截器/過濾器)

package com.dreamteam.chdapp.filter;import com.dreamteam.chdapp.utils.JwtUtils;import org.springframework.security.authentication.UsernamePasswordAuthenticationToken;import org.springframework.security.core.context.SecurityContextHolder;import org.springframework.util.AntPathMatcher;import org.springframework.util.PathMatcher;import org.springframework.web.filter.OncePerRequestFilter;import javax.servlet.FilterChain;import javax.servlet.ServletException;import javax.servlet.http.HttpServletRequest;import javax.servlet.http.HttpServletResponse;import java.io.IOException;import java.util.Arrays;import java.util.Map;import static com.dreamteam.chdapp.utils.JwtUtils.ROLE;/** * @Author HeYunHui * @create 2020/11/15 14:46 */public class JwtAuthenticationFilter extends OncePerRequestFilter { private static final PathMatcher pathmatcher = new AntPathMatcher(); private String[] protectUrlPattern = {'/manage/**', '/member/**', '/auth/**'}; //哪 些請求需要進行安全校驗 public JwtAuthenticationFilter() { } @Override protected void doFilterInternal(HttpServletRequest httpServletRequest, HttpServletResponse httpServletResponse, FilterChain filterChain) throws ServletException, IOException {//是不是可以在這里做多種方式登錄呢try { if (isProtectedUrl(httpServletRequest)) {Map<String, Object> claims = JwtUtils.validateTokenAndGetClaims(httpServletRequest);String role = String.valueOf(claims.get(ROLE));String userid = String.valueOf(claims.get('userid'));//最關鍵的部分就是這里, 我們直接注入了SecurityContextHolder.getContext().setAuthentication(new UsernamePasswordAuthenticationToken(userid, null, Arrays.asList(() -> role))); }} catch (Exception e) { e.printStackTrace(); httpServletResponse.sendError(HttpServletResponse.SC_UNAUTHORIZED, e.getMessage()); return;}filterChain.doFilter(httpServletRequest, httpServletResponse); } //是否是保護連接 private boolean isProtectedUrl(HttpServletRequest request) {boolean flag = false;for (int i = 0; i < protectUrlPattern.length; i++) { if (pathmatcher.match(protectUrlPattern[i], request.getServletPath())) {return true; }}return false; }}4、配置JWT config類(配置類)

跨域訪問:客戶端與服務端域名不同或是端口號不同。防止跨域攻擊

package edu.ynmd.cms.config;import edu.ynmd.cms.filter.JwtAuthenticationFilter;import org.springframework.context.annotation.Bean;import org.springframework.context.annotation.Configuration;import org.springframework.security.config.annotation.method.configuration.EnableGlobalMethodSecurity;import org.springframework.security.config.annotation.web.builders.HttpSecurity;import org.springframework.security.config.annotation.web.configuration.EnableWebSecurity;import org.springframework.security.config.annotation.web.configuration.WebSecurityConfigurerAdapter;import org.springframework.security.config.http.SessionCreationPolicy;import org.springframework.security.crypto.bcrypt.BCryptPasswordEncoder;import org.springframework.security.crypto.password.PasswordEncoder;import org.springframework.security.web.authentication.UsernamePasswordAuthenticationFilter;import org.springframework.security.web.firewall.HttpFirewall;import org.springframework.security.web.firewall.StrictHttpFirewall;@Configuration@EnableWebSecurity@EnableGlobalMethodSecurity(prePostEnabled = true)public class WebSecurityConfig extends WebSecurityConfigurerAdapter { @Bean public PasswordEncoder passwordEncoder(){return new BCryptPasswordEncoder(); } @Bean public HttpFirewall allowUrlEncodedSlashHttpFirewall() {StrictHttpFirewall firewall = new StrictHttpFirewall();firewall.setAllowUrlEncodedSlash(true);return firewall; } @Override protected void configure(HttpSecurity http) throws Exception {http.csrf().disable().cors() //允許跨域訪問.and().authorizeRequests().antMatchers('/').authenticated() //配置那些url需要進行校驗--所有請求都需要校驗'/'.antMatchers('/public/**').permitAll() //那些請求不需要校驗.anyRequest().authenticated() //自定義校驗類.and().addFilterBefore(new JwtAuthenticationFilter(),UsernamePasswordAuthenticationFilter.class).sessionManagement().sessionCreationPolicy(SessionCreationPolicy.STATELESS)//關閉session; }}5、Action注解

在Controller類中添加

@CrossOrigin@RestController@PreAuthorize('hasAuthority(’admin’)') //配置角色,擁有該角色的用戶方可訪問@RequestMapping('/manage')

postman測試http://localhost:7070/manage/userList,不可訪問

SpringBoot集成Spring security JWT實現接口權限認證

public開頭的可以訪問

6、token令牌環,訪問需校驗的資源

public的Controller類添加

@PostMapping('/login') @ResponseBody public HashMap<String,String> login( @RequestBody Account account) throws IOException {//Users u=manageService.getUserByUserNameAndPass(account.username,account.password);if(account.username.equals('admin')&&account.password.equals('123456')){//if(u!=null){ String jwt= JwtUtils.generateToken('admin','123456789abc');// String jwt= JwtUtils.generateToken(u.getRoleid(),u.getUsersid()); return new HashMap<String,String>(){{put('msg','ok');put('token',jwt);//put('role',u.getRoleid());put('role','admin'); }};}else { //return new ResponseEntity(HttpStatus.UNAUTHORIZED); return new HashMap<String,String>(){{put('msg','error');put('token','error'); }};} } public static class Account{public String username;public String password; }

postman測試,隨便輸用戶名密碼

SpringBoot集成Spring security JWT實現接口權限認證

輸入代碼中的用戶名密碼

SpringBoot集成Spring security JWT實現接口權限認證

去JWT官網https://jwt.io/,頁面下滑,將得到的token輸入,得到

SpringBoot集成Spring security JWT實現接口權限認證

manage的Controller類中添加測試

@GetMapping('testSecurityResource') @ResponseBody public String testSecurityResource() throws Exception{return '受保護的資源'; }

用postman訪問http://localhost:7070/manage/testSecurityResource,返回結果

SpringBoot集成Spring security JWT實現接口權限認證

7、service工具類

通用請求處理

package com.dreamteam.chdapp.controller.common;import org.slf4j.Logger;import org.slf4j.LoggerFactory;import org.springframework.stereotype.Controller;/** * 通用請求處理 * @Author HeYunHui * @create 2020/11/14 15:38 */@Controllerpublic class CommonController { protected static final Logger log= LoggerFactory.getLogger(CommonController.class); /** * 字符串為空 * @param value * @return */ public static boolean isNullOrSpace(String value){if(value==null){ return true;}else { if(value.equals('')){return true; } else {return false; }} }}

Service層

String getCurrentUserId();//從令牌環中獲取useridString getCurrentRole();//從令牌環中獲取角色id

ServiceImpl

/** * 獲取當前登錄用的的Id * @return */ @Override public String getCurrentUserId() {String userid= (String) SecurityContextHolder.getContext().getAuthentication() .getPrincipal();if(CommonController.isNullOrSpace(userid)){ return null;}else { return userid;} } /** * 獲取當前登錄用戶的角色 * @return */ @Override public String getCurrentRole() {String role=null;Collection<SimpleGrantedAuthority> authorities = (Collection<SimpleGrantedAuthority>) SecurityContextHolder.getContext().getAuthentication().getAuthorities();for (GrantedAuthority authority : authorities) { role = authority.getAuthority();}if(CommonController.isNullOrSpace(role)){ return null;}else{ return role;} }

修改manage的Controller類

@GetMapping('testSecurityResource') @ResponseBody public String testSecurityResource() throws Exception{String userid=userInfoService.getCurrentUserId();String role=userInfoService.getCurrentRole();return '受保護的資源,當前用戶的id是'+userid+'當前用戶的角色是'+role; }

用postman測試

SpringBoot集成Spring security JWT實現接口權限認證

這是前面自定義的

SpringBoot集成Spring security JWT實現接口權限認證

8、識別token信息

SpringBoot集成Spring security JWT實現接口權限認證

如果將下圖中的角色換掉,將不能訪問

SpringBoot集成Spring security JWT實現接口權限認證

9、自動更新令牌環

添加Controller類

package com.dreamteam.chdapp.controller;import com.dreamteam.chdapp.controller.common.CommonController;import com.dreamteam.chdapp.utils.JwtUtils;import org.springframework.security.access.prepost.PreAuthorize;import org.springframework.security.core.GrantedAuthority;import org.springframework.security.core.authority.SimpleGrantedAuthority;import org.springframework.security.core.context.SecurityContextHolder;import org.springframework.web.bind.annotation.*;import javax.servlet.http.HttpServletRequest;import java.util.Collection;import java.util.HashMap;/** * 令牌環自動更新 * @Author HeYunHui * @create 2020/11/16 17:24 * @PreAuthorize('hasAuthority(’admin’)')//只允許有admin角色的用戶訪問 hasAnyAuthority([auth1,auth2]) */@CrossOrigin@RestController@PreAuthorize('hasAnyAuthority(’admin’,’member’)')@RequestMapping('/auth')public class AuthController { /** * 更新令牌環信息 * @param request * @return */ @GetMapping('refreshToken') @ResponseBody public HashMap<String,String> refreshToken(HttpServletRequest request){String role=null;Collection<SimpleGrantedAuthority> authorities = (Collection<SimpleGrantedAuthority>) SecurityContextHolder.getContext().getAuthentication().getAuthorities();for (GrantedAuthority authority : authorities) { role = authority.getAuthority();}// UserDetails userDetails = (UserDetails) SecurityContextHolder.getContext().getAuthentication() .getPrincipal();String userid= (String)SecurityContextHolder.getContext().getAuthentication() .getPrincipal();if(CommonController.isNullOrSpace(role)){ return new HashMap<String,String>(){{put('token','error'); }};}else{ String jwt=''; //一小時 jwt= JwtUtils.generateToken(role,userid,60*60*1000); HashMap<String,String> m=new HashMap<>(); m.put('token',jwt); return m;} } /** * 獲取當前登錄用戶的角色 * @return */ @GetMapping('getRole') @ResponseBody public HashMap<String,String> getRoleByToken(){String role='';String userid='';Collection<SimpleGrantedAuthority> authorities = (Collection<SimpleGrantedAuthority>) SecurityContextHolder.getContext().getAuthentication().getAuthorities();for (GrantedAuthority authority : authorities) { role = authority.getAuthority();}if(CommonController.isNullOrSpace(role)){ return new HashMap<String,String>(){{put('role','error'); }};}else{ HashMap<String,String> m=new HashMap<>(); m.put('role',role); return m;} }}

用postman測試

SpringBoot集成Spring security JWT實現接口權限認證

10、使用數據庫存儲用戶信息

(1)實體類

package com.dreamteam.chdapp.entity;import com.baomidou.mybatisplus.annotation.IdType;import com.baomidou.mybatisplus.annotation.TableId;import com.baomidou.mybatisplus.annotation.TableName;import lombok.AllArgsConstructor;import lombok.Data;import lombok.NoArgsConstructor;import org.springframework.stereotype.Component;@Component@Data@AllArgsConstructor@NoArgsConstructor/** * 表名 */@TableName('users')public class Users { @TableId(type = IdType.AUTO) private String usrId; private String usrName; private String usrTel; private String usrPwd; private String usrType; }

UserMapper

package com.dreamteam.chdapp.mapper;import com.baomidou.mybatisplus.core.mapper.BaseMapper;import com.dreamteam.chdapp.entity.Users;import org.apache.ibatis.annotations.Mapper;import org.apache.ibatis.annotations.Param;import org.springframework.stereotype.Repository;import java.util.List;/** * @Author HeYunHui * @create 2020/11/11 21:50 */@Repository@Mapperpublic interface UserMapper extends BaseMapper<Users> { List<Users> getUsersByUsrNameAndPwd(@Param('usrName')String usrName, @Param('usrPwd') String usrPwd);}

UsersMapper.xml

<?xml version='1.0' encoding='UTF-8' ?><!DOCTYPE mapperPUBLIC '-//mybatis.org//DTD Mapper 3.0//EN''http://mybatis.org/dtd/mybatis-3-mapper.dtd'><mapper namespace='com.dreamteam.chdapp.mapper.UserMapper'> <select resultType='com.dreamteam.chdapp.entity.Users'>select * from users where #{usrName}=usr_name and #{usrPwd}=usr_pwd </select></mapper>

service

Users getUsersByUsrNameAndPwd(String usrName,String usrPwd);

serviceImpl JWT獲取用戶名密碼

@Override public Users getUsersByUsrNameAndPwd(String usrName, String usrPwd) {List<Users> ul=userMapper.getUsersByUsrNameAndPwd(usrName,usrPwd);if(ul.size()>0){ return ul.get(0);}return null; }

Controller

@PostMapping('/login') @ResponseBody public HashMap<String,String> login( @RequestBody Account account) throws IOException {Users u=userInfoService.getUsersByUsrNameAndPwd(account.username,account.password);//if(account.username.equals('admin')&&account.password.equals('123456')){if(u!=null){// String jwt= JwtUtils.generateToken('admin','123456789abc'); String jwt= JwtUtils.generateToken(u.getUsrType(),u.getUsrId()); return new HashMap<String,String>(){{put('msg','ok');put('token',jwt);put('role',u.getUsrType());//put('role','admin'); }};}else { //return new ResponseEntity(HttpStatus.UNAUTHORIZED); return new HashMap<String,String>(){{put('msg','error');put('token','error'); }};} } public static class Account{public String username;public String password; }

postman測試

a.登錄,生成token

SpringBoot集成Spring security JWT實現接口權限認證

b.輸入token訪問manage下的鏈接

SpringBoot集成Spring security JWT實現接口權限認證

到此這篇關于SpringBoot集成Spring security JWT實現接口權限認證的文章就介紹到這了,更多相關SpringBoot 接口權限認證內容請搜索好吧啦網以前的文章或繼續瀏覽下面的相關文章希望大家以后多多支持好吧啦網!

標簽: Spring
相關文章:
日本不卡不码高清免费观看,久久国产精品久久w女人spa,黄色aa久久,三上悠亚国产精品一区二区三区
成人精品视频| 欧美性感美女一区二区| 欧美日韩亚洲三区| 麻豆成人av在线| 日韩成人亚洲| 亚洲综合丁香| 久久国产日韩欧美精品| 国产一区精品福利| 亚洲国产成人精品女人| 日本午夜精品久久久| 国产成人精品亚洲线观看| 国产综合欧美| 欧美一级网站| 久久夜夜操妹子| 婷婷综合一区| 六月丁香综合在线视频| 五月婷婷亚洲| 欧美91在线| 伊人久久婷婷| 国产色综合网| 久久97久久97精品免视看秋霞| 国产精品99一区二区| 日本少妇精品亚洲第一区| 裤袜国产欧美精品一区| 综合干狼人综合首页| 成人精品高清在线视频| 蜜桃视频免费观看一区| 久久精品毛片| 视频在线观看一区二区三区| 国产在视频一区二区三区吞精| 国产一区二区三区自拍| 国产调教精品| 91久久亚洲| 福利一区和二区| 亚洲三级视频| 伊人久久大香线蕉av不卡| 国产精品日韩精品在线播放 | 亚洲精品国产嫩草在线观看| 日本不卡视频在线观看| 婷婷国产精品| 麻豆视频观看网址久久| 先锋亚洲精品| 国产一区二区三区四区五区| 视频一区免费在线观看| 中文在线免费视频| 欧美日一区二区三区在线观看国产免 | 久久精品不卡| 97se亚洲| 日韩在线短视频| 黄色精品视频| 美女网站久久| 中文在线免费视频| 国产高清久久| 国产精品巨作av| 精品中文一区| 美女一区网站| 喷白浆一区二区| 电影亚洲精品噜噜在线观看| 国产精品777777在线播放 | 99在线|亚洲一区二区| 国产不卡一区| 国产精品网站在线看| 亚洲精品麻豆| 香蕉久久久久久久av网站| 日韩一区亚洲二区| 国产精品sm| 日韩精品第二页| 日韩中文欧美在线| 亚洲激情中文在线| 91精品xxx在线观看| 久久伊人久久| 国产精品欧美在线观看| 亚洲tv在线| 视频一区视频二区中文| 亚洲二区三区不卡| 欧美 日韩 国产一区二区在线视频| 麻豆视频在线看| 日产精品一区二区| 精品国产乱码久久久久久樱花 | 亚洲综合日韩| 久久要要av| 久久视频国产| 国产91一区| 波多野结衣一区| 99视频精品全国免费| 日本蜜桃在线观看视频| 国产精品毛片一区二区在线看| 久久久久久亚洲精品美女| 国产日韩一区二区三免费高清| 亚洲精品高潮| 日韩精品免费视频一区二区三区 | 日本综合精品一区| 日韩中文字幕1| 久热精品在线| 蜜桃视频免费观看一区| 视频一区在线视频| 亚洲精品精选| 97精品资源在线观看| 久久国产三级精品| 国产乱论精品| 麻豆精品新av中文字幕| 精品国产中文字幕第一页| 久久丁香四色| 国产一区二区三区天码| 水蜜桃精品av一区二区| bbw在线视频| 久久精品中文| 欧美在线观看视频一区| 9色国产精品| 亚洲精品日本| 欧美日韩a区| 久久精品免费看| 欧美激情国产在线| 亚洲四虎影院| 国产精品日韩欧美一区| 亚洲欧美日本国产| 久久国际精品| 国产一区二区三区四区五区| 日韩电影二区| 欧美日韩第一| 一区二区国产在线观看| 国产亚洲精品精品国产亚洲综合| 欧美一级全黄| 麻豆精品视频在线| 桃色av一区二区| 一本色道久久精品| 啪啪亚洲精品| 成人影视亚洲图片在线| 精品欧美激情在线观看| 综合激情网...| 久久99青青| 热三久草你在线| 亚洲经典在线| 69精品国产久热在线观看| 久久亚洲精品中文字幕| 久久久久久久久久久9不雅视频| 香蕉久久国产| 欧美日韩18| 日韩高清中文字幕一区二区| 蜜桃视频一区二区三区在线观看| 国产情侣久久| 亚洲不卡系列| 亚洲精品第一| 日本一区二区高清不卡| 99热精品在线观看| 国产毛片精品| 亚洲天堂久久| 97精品资源在线观看| 福利一区二区三区视频在线观看| 亚洲免费精品| 国产精品网站在线看| 亚洲国内欧美| 天海翼亚洲一区二区三区| 久久精品三级| 久久av一区| 久久中文欧美| 亚洲综合三区| 国产一区精品福利| 美国av一区二区| 精品日本视频| 亚洲欧美日韩国产综合精品二区| 免费亚洲一区| 日韩中文字幕区一区有砖一区 | 国产精品一线天粉嫩av| 成人久久一区| 欧美影院精品| 欧美亚洲国产一区| 国产精品丝袜在线播放| 欧美在线影院| 久草精品视频| 亚洲日本在线观看视频| 日韩国产欧美一区二区| 日韩中文字幕一区二区高清99| 国产精品高颜值在线观看| 老司机精品久久| 欧美国产小视频| 日韩视频1区| 欧洲在线一区| 国产伦精品一区二区三区视频| 亚洲成人日韩| 国产精品蜜芽在线观看| 欧美一区不卡| 美日韩精品视频| 久久婷婷亚洲| 久久精品国产99| 日韩免费精品| 精品1区2区3区4区| 国产白浆在线免费观看| 日韩精品导航| 亚洲资源av| 久久久成人网| 国产成人精选| 国产图片一区| 免费成人在线影院| 亚洲福利国产| www.九色在线| 国产精品欧美一区二区三区不卡| 亚洲色图网站| 99视频精品| 久久中文亚洲字幕|