日本不卡不码高清免费观看,久久国产精品久久w女人spa,黄色aa久久,三上悠亚国产精品一区二区三区

您的位置:首頁技術文章
文章詳情頁

spring security在分布式項目下的配置方法(案例詳解)

瀏覽:178日期:2023-08-09 15:08:31

分布式項目和傳統項目的區別就是,分布式項目有多個服務,每一個服務僅僅只實現一套系統中一個或幾個功能,所有的服務組合在一起才能實現系統的完整功能。這會產生一個問題,多個服務之間session不能共享,你在其中一個服務中登錄了,登錄信息保存在這個服務的session中,別的服務不知道啊,所以你訪問別的服務還得在重新登錄一次,對用戶十分不友好。為了解決這個問題,于是就產生了單點登錄:

**jwt單點登錄:**就是用戶在登錄服務登錄成功后,登錄服務會產生向前端響應一個token(令牌),以后用戶再訪問系統的資源的時候都要帶上這個令牌,各大服務對這個令牌進行驗證(令牌是否過期,令牌是否被篡改),驗證通過了,可以訪問資源,同時,令牌中也會攜帶一些不重要的信息,比如用戶名,權限。通過解析令牌就能知道當前登錄的用戶和用戶所擁有的權限。

下面我們就來寫一個案例項目看看具體如何使用

1 創建項目結構

1.1 父工程cloud-security

這是父工程所需要的包

<parent> <groupId>org.springframework.boot</groupId> <artifactId>spring-boot-starter-parent</artifactId> <version>2.1.3.RELEASE</version> <relativePath/></parent><dependencies> <dependency> <groupId>org.springframework.boot</groupId> <artifactId>spring-boot-starter-web</artifactId> </dependency> <dependency> <groupId>org.springframework.boot</groupId> <artifactId>spring-boot-starter-security</artifactId> </dependency> <dependency> <groupId>org.springframework.boot</groupId> <artifactId>spring-boot-starter-test</artifactId> </dependency></dependencies>

1.2 公共工程 security-common

這是公共工程所需要的包

<dependency> <groupId>org.projectlombok</groupId> <artifactId>lombok</artifactId></dependency><dependency> <groupId>com.alibaba</groupId> <artifactId>fastjson</artifactId> <version>1.2.60</version></dependency><!--jwt所需包--><dependency> <groupId>io.jsonwebtoken</groupId> <artifactId>jjwt-api</artifactId> <version>0.11.2</version></dependency><dependency> <groupId>io.jsonwebtoken</groupId> <artifactId>jjwt-impl</artifactId> <version>0.11.2</version> <scope>runtime</scope></dependency><dependency> <groupId>io.jsonwebtoken</groupId> <artifactId>jjwt-jackson</artifactId> <!-- or jjwt-gson if Gson is preferred --> <version>0.11.2</version> <scope>runtime</scope></dependency>

1.3 認證服務security-sever

這個服務僅僅只有兩項功能:

(1)用戶登錄,頒發令牌

(2)用戶注冊

我們這里只實現第一個功能

1.3.1 認證服務所需的包

<dependency> <groupId>cn.lx.security</groupId> <artifactId>security-common</artifactId> <version>1.0-SNAPSHOT</version></dependency><dependency> <groupId>mysql</groupId> <artifactId>mysql-connector-java</artifactId></dependency><!--通用mapper--><dependency> <groupId>tk.mybatis</groupId> <artifactId>mapper-spring-boot-starter</artifactId> <version>2.0.4</version></dependency><dependency> <groupId>org.springframework.boot</groupId> <artifactId>spring-boot-starter-thymeleaf</artifactId></dependency>

1.3.2 配置application.yml

這里面的配置沒什么好說的,都很簡單

server: port: 8080spring: datasource: url: jdbc:mysql:///security_authority?useUnicode=true&characterEncoding=UTF-8&serverTimezone=UTC username: root password: driver-class-name: com.mysql.cj.jdbc.Driver thymeleaf: cache: false main: allow-bean-definition-overriding: truemybatis: type-aliases-package: cn.lx.security.doamin configuration: #駝峰 map-underscore-to-camel-case: truelogging: level: cn.lx.security: debug

1.3.3 導入domain,dao,service,config

這個可以在上篇文檔中找到,我們只需要service中的loadUserByUsername方法及其所調用dao中的方法

完整項目在我的github中,地址:git@github.com:lx972/cloud-security.git

配置文件我們也從上篇中復制過來MvcConfig,SecurityConfig

1.3.4 測試

訪問http://localhost:8080/loginPage成功出現登錄頁面,說明認證服務的骨架搭建成功了

1.4 資源服務security-resource1

實際項目中會有很多資源服務,我只演示一個

為了簡單,資源服務不使用數據庫

1.4.1 資源服務所需的包

<dependency> <groupId>cn.lx.security</groupId> <artifactId>security-common</artifactId> <version>1.0-SNAPSHOT</version></dependency>

1.4.2 配置application.yml

server: port: 8090logging: level: cn.lx.security: debug

1.4.3 controller

擁有ORDER_LIST權限的才能訪問

@RestController@RequestMapping('/order')public class OrderController { //@Secured('ORDER_LIST') @PreAuthorize(value = 'hasAuthority(’ORDER_LIST’)') @RequestMapping('/findAll') public String findAll(){ return 'order-list'; }}

擁有PRODUCT_LIST權限的才能訪問

@RestController@RequestMapping('/product')public class ProductController { //@Secured('PRODUCT_LIST') @PreAuthorize(value = 'hasAuthority(’PRODUCT_LIST’)') @RequestMapping('/findAll') public String findAll(){ return 'product-list'; }}

1.4.4 security配置類

@Configuration@EnableWebSecurity//這個注解先不要加//@EnableGlobalMethodSecurity(prePostEnabled = true)public class SecurityConfig extends WebSecurityConfigurerAdapter { /** * Override this method to configure the {@link HttpSecurity}. Typically subclasses * should not invoke this method by calling super as it may override their * configuration. The default configuration is: * * <pre> * http.authorizeRequests().anyRequest().authenticated().and().formLogin().and().httpBasic(); * </pre> * * @param http the {@link HttpSecurity} to modify * @throws Exception if an error occurs */ @Override protected void configure(HttpSecurity http) throws Exception { http .csrf().disable() .authorizeRequests().anyRequest().authenticated(); }}

1.4.5 測試

訪問http://localhost:8090/order/findAll成功打印出order-list,服務搭建成功。

2 認證服務實現登錄,頒發令牌

首先,我們必須知道我們的項目是前后端分離的項目,所以我們不能由后端控制頁面跳轉了,只能返回json串通知前端登錄成功,然后前端根據后端返回的信息控制頁面跳轉。

2.1 登錄成功或者登錄失敗后的源碼分析

UsernamePasswordAuthenticationFilter中登錄成功后走successfulAuthentication方法

/** * Default behaviour for successful authentication.認證成功之后的默認操作 * <ol> * <li>Sets the successful <tt>Authentication</tt> object on the * {@link SecurityContextHolder}</li> * <li>Informs the configured <tt>RememberMeServices</tt> of the successful login</li> * <li>Fires an {@link InteractiveAuthenticationSuccessEvent} via the configured * <tt>ApplicationEventPublisher</tt></li> * <li>Delegates additional behaviour to the {@link AuthenticationSuccessHandler}.</li> * </ol> * * Subclasses can override this method to continue the {@link FilterChain} after * successful authentication. * @param request * @param response * @param chain * @param authResult the object returned from the <tt>attemptAuthentication</tt> * method. * @throws IOException * @throws ServletException */protected void successfulAuthentication(HttpServletRequest request,HttpServletResponse response, FilterChain chain, Authentication authResult)throws IOException, ServletException {if (logger.isDebugEnabled()) {logger.debug('Authentication success. Updating SecurityContextHolder to contain: '+ authResult);} //將已通過認證的Authentication保存到securityContext容器中,應為后面的過濾器需要使用SecurityContextHolder.getContext().setAuthentication(authResult); //記住我rememberMeServices.loginSuccess(request, response, authResult);// Fire eventif (this.eventPublisher != null) {eventPublisher.publishEvent(new InteractiveAuthenticationSuccessEvent(authResult, this.getClass()));} //這個方法你點進去,就會發現,真正作業面跳轉是在這里successHandler.onAuthenticationSuccess(request, response, authResult);}

UsernamePasswordAuthenticationFilter中登錄成功后走unsuccessfulAuthentication方法

/** * Default behaviour for unsuccessful authentication.認證失敗之后的默認操作 * <ol> * <li>Clears the {@link SecurityContextHolder}</li> * <li>Stores the exception in the session (if it exists or * <tt>allowSesssionCreation</tt> is set to <tt>true</tt>)</li> * <li>Informs the configured <tt>RememberMeServices</tt> of the failed login</li> * <li>Delegates additional behaviour to the {@link AuthenticationFailureHandler}.</li> * </ol> */protected void unsuccessfulAuthentication(HttpServletRequest request,HttpServletResponse response, AuthenticationException failed)throws IOException, ServletException {SecurityContextHolder.clearContext();if (logger.isDebugEnabled()) {logger.debug('Authentication request failed: ' + failed.toString(), failed);logger.debug('Updated SecurityContextHolder to contain null Authentication');logger.debug('Delegating to authentication failure handler ' + failureHandler);} //記住我失敗rememberMeServices.loginFail(request, response); //失敗后的頁面跳轉都在這里failureHandler.onAuthenticationFailure(request, response, failed);}

2.2 重寫successfulAuthentication和unsuccessfulAuthentication方法

我們繼承UsernamePasswordAuthenticationFilter這個過濾器

public class AuthenticationFilter extends UsernamePasswordAuthenticationFilter { /** * 這個方法必須有 * 在過濾器創建的時候手動將AuthenticationManager對象給這個過濾器使用 * @param authenticationManager 這個對象在自己寫的SecurityConfig里面 */ public AuthenticationFilter(AuthenticationManager authenticationManager) { super.setAuthenticationManager(authenticationManager); } /** * Default behaviour for successful authentication.認證成功之后的默認操作 * @param request * @param response * @param chain * @param authResult the object returned from the <tt>attemptAuthentication</tt> * method. * @throws IOException * @throws ServletException */ @Override protected void successfulAuthentication(HttpServletRequest request, HttpServletResponse response, FilterChain chain, Authentication authResult) throws IOException, ServletException { //認證成功的對象放入securityContext容器中 SecurityContextHolder.getContext().setAuthentication(authResult); // Fire event if (this.eventPublisher != null) { eventPublisher.publishEvent(new InteractiveAuthenticationSuccessEvent( authResult, this.getClass())); } //創建令牌 Map<String, Object> claims=new HashMap<>(); SysUser sysUser = (SysUser) authResult.getPrincipal(); claims.put('username',sysUser.getUsername()); claims.put('authorities',authResult.getAuthorities()); //這個方法在下面介紹 String jwt = JwtUtil.createJwt(claims); //直接返回json ResponseUtil.responseJson(new Result('200', '登錄成功',jwt),response); } /** * Default behaviour for unsuccessful authentication. * @param request * @param response * @param failed */ @Override protected void unsuccessfulAuthentication(HttpServletRequest request, HttpServletResponse response, AuthenticationException failed) throws IOException, ServletException { //清理容器中保存的認證對象 SecurityContextHolder.clearContext(); //直接返回json ResponseUtil.responseJson(new Result('500', '登錄失敗'),response); }}

2.3 令牌創建

String jwt = JwtUtil.createJwt(claims);

這個方法干了什么事呢

/** * 創建令牌 * @param claims * @return */public static String createJwt(Map<String, Object> claims){ //獲取私鑰 String priKey = KeyUtil.readKey('privateKey.txt'); //將string類型的私鑰轉換成PrivateKey,jwt只能接受PrivateKey的私鑰 PKCS8EncodedKeySpec priPKCS8 = null; try { priPKCS8 = new PKCS8EncodedKeySpec(new BASE64Decoder().decodeBuffer(priKey)); KeyFactory keyf = KeyFactory.getInstance('RSA'); PrivateKey privateKey = keyf.generatePrivate(priPKCS8); //創建令牌 String jws = Jwts.builder() //設置令牌過期時間30分鐘 .setExpiration(new Date(System.currentTimeMillis()+1000*60*30)) //為令牌設置額外的信息,這里我們設置用戶名和權限,還可以根據需要繼續添加 .addClaims(claims) //指定加密類型為rsa .signWith(privateKey, SignatureAlgorithm.RS256) //得到令牌 .compact(); log.info('創建令牌成功:'+jws); return jws; } catch (Exception e) { throw new RuntimeException('創建令牌失敗'); }}

獲取秘鑰的方法

public class KeyUtil { /** * 讀取秘鑰 * @param keyName * @return */ public static String readKey(String keyName){ //文件必須放在resources根目錄下 ClassPathResource resource=new ClassPathResource(keyName); String key =null; try { InputStream is = resource.getInputStream(); key = StreamUtils.copyToString(is, Charset.defaultCharset()); }catch (Exception e){ throw new RuntimeException('讀取秘鑰錯誤'); } if (key==null){ throw new RuntimeException('秘鑰為空'); } return key; }}

2.4 響應json格式數據給前端

封裝成了一個工具類

public class ResponseUtil { /** * 將結果以json格式返回 * @param result 返回結果 * @param response * @throws IOException */ public static void responseJson(Result result, HttpServletResponse response) throws IOException { response.setContentType('application/json;charset=utf-8'); response.setStatus(200); PrintWriter writer = response.getWriter(); writer.write(JSON.toJSONString(result)); writer.flush(); writer.close(); }}

返回結果

@Data@AllArgsConstructor@NoArgsConstructorpublic class Result { private String code; private String msg; private Object data; public Result(String code, String msg) { this.code = code; this.msg = msg; }}3 認證服務實現令牌驗證和解析

除了security配置類中配置的需要忽略的請求之外,其他所有請求必須驗證請求頭中是否攜帶令牌,沒有令牌直接響應json數據,否則就驗證和解析令牌。

security中有一個過濾器是實現令牌BasicAuthenticationFilter認證的,只不過他是basic的,沒關系,我們繼承它,然后重寫解析basic的方法

3.1 源碼分析

@Overrideprotected void doFilterInternal(HttpServletRequest request,HttpServletResponse response, FilterChain chain) throws IOException, ServletException { final boolean debug = this.logger.isDebugEnabled(); //獲取請求頭中Authorization的值 String header = request.getHeader('Authorization'); if (header == null || !header.toLowerCase().startsWith('basic ')) { //值不符合條件直接放行 chain.doFilter(request, response); return; } try { //就是解析Authorization String[] tokens = extractAndDecodeHeader(header, request); assert tokens.length == 2; //tokens[0]用戶名 tokens[1]密碼 String username = tokens[0]; if (debug) { this.logger .debug('Basic Authentication Authorization header found for user ’' + username + '’'); } //判斷是否需要認證(容器中有沒有該認證對象) if (authenticationIsRequired(username)) { //創建一個對象 UsernamePasswordAuthenticationToken authRequest = new UsernamePasswordAuthenticationToken( username, tokens[1]); authRequest.setDetails( this.authenticationDetailsSource.buildDetails(request)); //進行認證,我們不關心它如何認證,我們需要按自己的方法對令牌認證解析 Authentication authResult = this.authenticationManager .authenticate(authRequest); if (debug) { this.logger.debug('Authentication success: ' + authResult); } //已認證的對象保存到securityContext中 SecurityContextHolder.getContext().setAuthentication(authResult); //記住我 this.rememberMeServices.loginSuccess(request, response, authResult); onSuccessfulAuthentication(request, response, authResult); } } catch (AuthenticationException failed) { SecurityContextHolder.clearContext(); if (debug) { this.logger.debug('Authentication request for failed: ' + failed); } this.rememberMeServices.loginFail(request, response); onUnsuccessfulAuthentication(request, response, failed); if (this.ignoreFailure) { chain.doFilter(request, response); } else { this.authenticationEntryPoint.commence(request, response, failed); } return; } chain.doFilter(request, response);}

3.2 重寫doFilterInternal方法

繼承BasicAuthenticationFilter

public class TokenVerifyFilter extends BasicAuthenticationFilter { /** * Creates an instance which will authenticate against the supplied * {@code AuthenticationManager} and which will ignore failed authentication attempts, * allowing the request to proceed down the filter chain. * 在過濾器創建的時候手動將AuthenticationManager對象給這個過濾器使用 * @param authenticationManager 這個對象在自己寫的SecurityConfig里面 */ public TokenVerifyFilter(AuthenticationManager authenticationManager) { super(authenticationManager); } /** * 過濾請求,判斷是否攜帶令牌 * @param request * @param response * @param chain * @throws IOException * @throws ServletException */ @Override protected void doFilterInternal(HttpServletRequest request, HttpServletResponse response, FilterChain chain) throws IOException, ServletException { String header = request.getHeader('Authorization'); if (header == null || !header.toLowerCase().startsWith('bearer ')) { //直接返回json ResponseUtil.responseJson(new Result('403', '用戶未登錄'),response); return; } //得到jwt令牌 String jwt = StringUtils.replace(header, 'bearer ', ''); //解析令牌 String[] tokens = JwtUtil.extractAndDecodeJwt(jwt); //用戶名 String username = tokens[0]; //權限 List<SysPermission> authorities= JSON.parseArray(tokens[1], SysPermission.class); UsernamePasswordAuthenticationToken authRequest = new UsernamePasswordAuthenticationToken( username, null, authorities ); //放入SecurityContext容器中 SecurityContextHolder.getContext().setAuthentication(authRequest); chain.doFilter(request, response); }}

3.3 驗證解析令牌

/** * 解析令牌 * @param compactJws * @return */public static String decodeJwt(String compactJws){ //獲取公鑰 String pubKey = KeyUtil.readKey('publicKey.txt'); //將string類型的私鑰轉換成PublicKey,jwt只能接受PublicKey的公鑰 KeyFactory keyFactory; try { X509EncodedKeySpec bobPubKeySpec = new X509EncodedKeySpec( new BASE64Decoder().decodeBuffer(pubKey)); keyFactory = KeyFactory.getInstance('RSA'); PublicKey publicKey = keyFactory.generatePublic(bobPubKeySpec); Claims body = Jwts.parserBuilder().setSigningKey(publicKey).build().parseClaimsJws(compactJws).getBody(); String jwtString = JSON.toJSONString(body); //OK, we can trust this JWT log.info('解析令牌成功:'+jwtString); return jwtString; } catch (Exception e) { throw new RuntimeException('解析令牌失敗'); }}/** * 解析令牌并獲取用戶名和權限 * @param compactJws * @return String[0]用戶名 * String[1]權限 */public static String[] extractAndDecodeJwt(String compactJws){ //獲取令牌的內容 String decodeJwt = decodeJwt(compactJws); JSONObject jsonObject = JSON.parseObject(decodeJwt); String username = jsonObject.getString('username'); String authorities = jsonObject.getString('authorities'); return new String[] { username, authorities };}

3.4 修改security配置類

將自定義過濾器加入過濾器鏈

@Configuration@EnableWebSecuritypublic class SecurityConfig extends WebSecurityConfigurerAdapter { @Autowired private IUserService iUserService; @Autowired private BCryptPasswordEncoder bCryptPasswordEncoder; /** * 只有這個配置類有AuthenticationManager對象,我們要把這個類中的這個對象放入容器中 * 這樣在別的地方就可以自動注入了 * @return * @throws Exception */ @Bean @Override public AuthenticationManager authenticationManager() throws Exception { AuthenticationManager authenticationManager = super.authenticationManagerBean(); return authenticationManager; } /** * Used by the default implementation of {@link #authenticationManager()} to attempt * to obtain an {@link AuthenticationManager}. If overridden, the * {@link AuthenticationManagerBuilder} should be used to specify the * {@link AuthenticationManager}. * * <p> * The {@link #authenticationManagerBean()} method can be used to expose the resulting * {@link AuthenticationManager} as a Bean. The {@link #userDetailsServiceBean()} can * be used to expose the last populated {@link UserDetailsService} that is created * with the {@link AuthenticationManagerBuilder} as a Bean. The * {@link UserDetailsService} will also automatically be populated on * {@link HttpSecurity#getSharedObject(Class)} for use with other * {@link SecurityContextConfigurer} (i.e. RememberMeConfigurer ) * </p> * * <p> * For example, the following configuration could be used to register in memory * authentication that exposes an in memory {@link UserDetailsService}: * </p> * * <pre> * &#064;Override * protected void configure(AuthenticationManagerBuilder auth) { * auth * // enable in memory based authentication with a user named * // &quot;user&quot; and &quot;admin&quot; * .inMemoryAuthentication().withUser(&quot;user&quot;).password(&quot;password&quot;).roles(&quot;USER&quot;).and() * .withUser(&quot;admin&quot;).password(&quot;password&quot;).roles(&quot;USER&quot;, &quot;ADMIN&quot;); * } * * // Expose the UserDetailsService as a Bean * &#064;Bean * &#064;Override * public UserDetailsService userDetailsServiceBean() throws Exception { * return super.userDetailsServiceBean(); * } * * </pre> * * @param auth the {@link AuthenticationManagerBuilder} to use * @throws Exception */ @Override protected void configure(AuthenticationManagerBuilder auth) throws Exception { //在內存中注冊一個賬號 //auth.inMemoryAuthentication().withUser('user').password('{noop}123').roles('USER'); //連接數據庫,使用數據庫中的賬號 auth.userDetailsService(iUserService).passwordEncoder(bCryptPasswordEncoder); } /** * Override this method to configure {@link WebSecurity}. For example, if you wish to * ignore certain requests. * * @param web */ @Override public void configure(WebSecurity web) throws Exception { web.ignoring().antMatchers('/css/**', '/img/**', '/plugins/**', '/favicon.ico', '/loginPage'); } /** * Override this method to configure the {@link HttpSecurity}. Typically subclasses * should not invoke this method by calling super as it may override their * configuration. The default configuration is: * * <pre> * http.authorizeRequests().anyRequest().authenticated().and().formLogin().and().httpBasic(); * </pre> * * @param http the {@link HttpSecurity} to modify * @throws Exception if an error occurs */ @Override protected void configure(HttpSecurity http) throws Exception { http.csrf().disable() .httpBasic() .and() .authorizeRequests() .anyRequest().authenticated() .and() /** * 不要將自定義過濾器加component注解,而是在這里直接創建一個過濾器對象加入到過濾器鏈中,并傳入authenticationManager * 啟動后,過濾器鏈中會同時出現自定義過濾器和他的父類,他會自動覆蓋,并不會過濾兩次 * * 使用component注解會產生很多問題: * 1. web.ignoring()會失效,上面的資源還是會經過自定義的過濾器 * 2.過濾器鏈中出現的是他們父類中的名字 * 3.登錄的時候(訪問/login),一直使用匿名訪問,不會去數據庫中查詢 */ .addFilterAt(new AuthenticationFilter(super.authenticationManager()), UsernamePasswordAuthenticationFilter.class) .addFilterAt(new TokenVerifyFilter(super.authenticationManager()), BasicAuthenticationFilter.class) //.formLogin().loginPage('/login.jsp').loginProcessingUrl('/login').defaultSuccessUrl('/index.jsp').failureForwardUrl('/failer.jsp').permitAll() .formLogin().loginPage('/loginPage').loginProcessingUrl('/login').permitAll() .and() .logout().logoutUrl('/logout').logoutSuccessUrl('/loginPage').invalidateHttpSession(true).permitAll(); }}4 資源服務實現令牌驗證和解析

復制認證服務的TokenVerifyFilter到資源服務

然后修改security的配置文件

@Configuration@EnableWebSecurity@EnableGlobalMethodSecurity(prePostEnabled = true)public class SecurityConfig extends WebSecurityConfigurerAdapter { /** * Override this method to configure the {@link HttpSecurity}. Typically subclasses * should not invoke this method by calling super as it may override their * configuration. The default configuration is: * * <pre> * http.authorizeRequests().anyRequest().authenticated().and().formLogin().and().httpBasic(); * </pre> * * @param http the {@link HttpSecurity} to modify * @throws Exception if an error occurs */ @Override protected void configure(HttpSecurity http) throws Exception { http .csrf().disable() .authorizeRequests().anyRequest().authenticated() .and() //禁用session .sessionManagement().sessionCreationPolicy(SessionCreationPolicy.STATELESS) .and() //添加自定義過濾器 .addFilterAt(new TokenVerifyFilter(super.authenticationManager()), BasicAuthenticationFilter.class); }}

到此這篇關于spring security在分布式項目下的配置方法(案例詳解)的文章就介紹到這了,更多相關spring security分布式內容請搜索好吧啦網以前的文章或繼續瀏覽下面的相關文章希望大家以后多多支持好吧啦網!

標簽: Spring
相關文章:
日本不卡不码高清免费观看,久久国产精品久久w女人spa,黄色aa久久,三上悠亚国产精品一区二区三区
黄色国产精品| 五月综合激情| 亚洲一区二区三区四区电影| 黄色日韩精品| 国产亚洲网站| 伊人成人网在线看| 国产一区91| 天堂成人免费av电影一区| 在线视频免费在线观看一区二区| 欧美日韩第一| 国产麻豆综合| 亚洲精品福利| 国产精品欧美在线观看| 国产亚洲久久| 精品伊人久久久| av日韩中文| 中文在线а√在线8| 日本精品影院| 欧美特黄视频| 日韩一区欧美二区| 日本a级不卡| 免费一级欧美片在线观看网站| 韩日一区二区| 另类中文字幕国产精品| 成人精品中文字幕| 女同性一区二区三区人了人一 | 在线日韩电影| 午夜在线视频一区二区区别| 亚洲欧美日韩国产| 亚洲有吗中文字幕| 国产精品videossex久久发布| 日本一区二区免费高清| 亚洲午夜av| 老司机精品久久| 国产精品视频一区二区三区综合| 色综合狠狠操| 黑丝一区二区| 亚洲精品伊人| 麻豆国产精品| 在线精品小视频| 天堂va在线高清一区| 精品视频国产| 九九综合九九| 一级成人国产| 精品国产成人| 亚洲少妇在线| 免费一级欧美在线观看视频| 成人免费网站www网站高清| 亚洲一区日本| 麻豆精品在线视频| 亚洲国产日韩欧美在线| 亚洲+小说+欧美+激情+另类| 精品72久久久久中文字幕| 不卡av一区二区| 97久久亚洲| 日韩欧美一区二区三区免费观看| 亚洲一区二区免费看| 老司机免费视频一区二区| 国产99精品| 日韩高清在线不卡| 激情欧美一区二区三区| 国产精品sss在线观看av| 欧洲激情综合| 精品一区二区三区中文字幕视频| 亚洲欧美激情诱惑| 国产自产自拍视频在线观看| 午夜性色一区二区三区免费视频| 天堂√8在线中文| 日韩超碰人人爽人人做人人添| 久久精品导航| 久久三级中文| 日韩欧乱色一区二区三区在线| 成人免费电影网址| 国产麻豆一区| 免播放器亚洲| 青青青免费在线视频| 日韩国产欧美在线播放| 亚洲精品一区二区妖精| 国产盗摄——sm在线视频| 日韩va欧美va亚洲va久久| 亚洲欧洲一区| 日韩欧美字幕| 麻豆久久久久久| 亚洲精品亚洲人成在线观看| 久久久久久美女精品| 欧美激情麻豆| 日本综合视频| 亚洲欧美日韩国产| 欧美香蕉视频| 久久超级碰碰| 日韩一区中文| 99在线精品免费视频九九视 | 国产精品a级| 视频一区欧美精品| 激情久久婷婷| 日韩中文影院| 国产福利91精品一区二区| 日韩精品成人在线观看| 国产模特精品视频久久久久| 国产99在线| 久久精品国产99国产| 日本成人在线网站| 免费在线观看日韩欧美| 亚洲手机视频| 精品欧美一区二区三区在线观看| 麻豆国产精品| 麻豆精品国产91久久久久久| 久久国产欧美日韩精品| 亚洲最新av| 免费在线观看视频一区| 国产精品视区| 99国产成+人+综合+亚洲欧美| 欧美精品一区二区久久| 亚洲小说欧美另类婷婷| 成人午夜国产| 欧美成a人国产精品高清乱码在线观看片在线观看久 | 日韩国产欧美一区二区| 国产一区二区三区探花| 国产欧美日韩一级| 欧美日韩1区2区3区| 亚洲欧美一级| 自拍自偷一区二区三区| 蜜桃一区二区三区在线观看| 免费国产自线拍一欧美视频| 久久亚洲一区| 视频精品一区二区| 99精品99| 日韩制服丝袜av| 亚洲综合婷婷| 婷婷精品在线观看| 欧美片网站免费| 国产精品亚洲人成在99www| 国产日韩1区| 欧美日韩va| 麻豆精品在线视频| 成人国产精品久久| 久久久成人网| 影音先锋久久| 亚洲视频电影在线| 日韩精品国产精品| 国产精品亚洲综合久久| 久久精品一区| 麻豆网站免费在线观看| 欧美福利一区| 美日韩精品视频| 日韩国产精品久久久久久亚洲| 国产亚洲欧美日韩在线观看一区二区| 国产精品一国产精品k频道56| 国产精品亚洲欧美一级在线| 另类小说一区二区三区| 成人小电影网站| 欧美精品一区二区三区精品| 男女激情视频一区| 国产美女视频一区二区| 国产+成+人+亚洲欧洲在线| 啪啪国产精品| 亚洲伊人精品酒店| 国产一区 二区| 国产不卡一区| 狠狠爱成人网| 四虎在线精品| 高清精品久久| 国产精品日本欧美一区二区三区| 婷婷综合成人| 国产91在线播放精品| 精品1区2区3区4区| 欧美视频精品全部免费观看| 国产传媒在线观看| 久久亚洲色图| 欧美黑人巨大videos精品| 91精品精品| 亚洲精品三级| 中文字幕人成乱码在线观看| 亚洲欧美日韩一区在线观看| 国产乱人伦精品一区| 中文字幕系列一区| 婷婷成人av| 日韩欧美字幕| 少妇高潮一区二区三区99| 国产不卡精品| 亚洲一区二区日韩| 日本精品黄色| 亚洲a级精品| 日韩毛片视频| 日韩精品高清不卡| 国产亚洲一区二区手机在线观看| 中文一区一区三区免费在线观 | 欧美一区二区三区久久精品| 国产乱码午夜在线视频| 亚洲精品系列| 91精品精品| 国产精品一线| 在线视频免费在线观看一区二区| 麻豆精品视频在线观看免费| 午夜亚洲精品| 国产精品xvideos88| 亚洲一区免费| 亚洲成人不卡| 国产精品久久久久久久久久妞妞| 欧美va天堂在线|