日本不卡不码高清免费观看,久久国产精品久久w女人spa,黄色aa久久,三上悠亚国产精品一区二区三区

您的位置:首頁技術(shù)文章
文章詳情頁

SpringBoot集成Spring security JWT實現(xiàn)接口權(quán)限認(rèn)證

瀏覽:23日期:2023-03-18 13:27:04
1、添加依賴

<dependency> <groupId>org.springframework.boot</groupId> <artifactId>spring-boot-starter-security</artifactId></dependency><dependency> <groupId>io.jsonwebtoken</groupId> <artifactId>jjwt</artifactId> <version>0.9.1</version></dependency>2、集成JWT工具類(JwtUtils)

package com.dreamteam.chdapp.utils;import io.jsonwebtoken.Jwts;import io.jsonwebtoken.SignatureAlgorithm;import org.slf4j.Logger;import org.slf4j.LoggerFactory;import javax.servlet.http.HttpServletRequest;import java.util.Date;import java.util.HashMap;import java.util.Map;/** * @Author HeYunHui * @create 2020/11/15 14:12 */public class JwtUtils { private static final Logger logger= LoggerFactory.getLogger(JwtUtils.class); public static final long EXPIRATION_TIME=60*60*1000;// 令牌環(huán)有效期 public static final String SECRET='abc123456def';//令牌環(huán)密鑰 public static final String TOKEN_PREFIX='Bearer';//令牌環(huán)頭標(biāo)識 public static final String HEADER_STRING='Passport';//配置令牌環(huán)在http heads中的鍵值 public static final String ROLE='ROLE';//自定義字段-角色字段 //生成令牌環(huán) public static String generateToken(String userRole,String userid){HashMap<String,Object> map=new HashMap<>();map.put(ROLE,userRole);map.put('userid',userid);String jwt= Jwts.builder().setClaims(map).setExpiration(new Date(System.currentTimeMillis()+EXPIRATION_TIME)).signWith(SignatureAlgorithm.HS512,SECRET).compact();return TOKEN_PREFIX+' '+jwt; } //生成令牌環(huán) public static String generateToken(String userRole,String userid,long exprationtime){HashMap<String,Object> map=new HashMap<>();map.put(ROLE,userRole);map.put('userid',userid);String jwt= Jwts.builder().setClaims(map).setExpiration(new Date(System.currentTimeMillis()+exprationtime)).signWith(SignatureAlgorithm.HS512,SECRET).compact();return TOKEN_PREFIX+' '+jwt; } //令牌環(huán)校驗 public static Map<String,Object> validateTokenAndGetClaims(HttpServletRequest request){String token=request.getHeader(HEADER_STRING);if(token==null){ throw new TokenValidationException('Missing Token');}else{ Map<String,Object> body= Jwts.parser() .setSigningKey(SECRET) .parseClaimsJws(token.replace(TOKEN_PREFIX,'')) .getBody(); return body;} }static class TokenValidationException extends RuntimeException{public TokenValidationException(String msg){ super(msg);} }}3、集成JWT filter(攔截器/過濾器)

package com.dreamteam.chdapp.filter;import com.dreamteam.chdapp.utils.JwtUtils;import org.springframework.security.authentication.UsernamePasswordAuthenticationToken;import org.springframework.security.core.context.SecurityContextHolder;import org.springframework.util.AntPathMatcher;import org.springframework.util.PathMatcher;import org.springframework.web.filter.OncePerRequestFilter;import javax.servlet.FilterChain;import javax.servlet.ServletException;import javax.servlet.http.HttpServletRequest;import javax.servlet.http.HttpServletResponse;import java.io.IOException;import java.util.Arrays;import java.util.Map;import static com.dreamteam.chdapp.utils.JwtUtils.ROLE;/** * @Author HeYunHui * @create 2020/11/15 14:46 */public class JwtAuthenticationFilter extends OncePerRequestFilter { private static final PathMatcher pathmatcher = new AntPathMatcher(); private String[] protectUrlPattern = {'/manage/**', '/member/**', '/auth/**'}; //哪 些請求需要進(jìn)行安全校驗 public JwtAuthenticationFilter() { } @Override protected void doFilterInternal(HttpServletRequest httpServletRequest, HttpServletResponse httpServletResponse, FilterChain filterChain) throws ServletException, IOException {//是不是可以在這里做多種方式登錄呢try { if (isProtectedUrl(httpServletRequest)) {Map<String, Object> claims = JwtUtils.validateTokenAndGetClaims(httpServletRequest);String role = String.valueOf(claims.get(ROLE));String userid = String.valueOf(claims.get('userid'));//最關(guān)鍵的部分就是這里, 我們直接注入了SecurityContextHolder.getContext().setAuthentication(new UsernamePasswordAuthenticationToken(userid, null, Arrays.asList(() -> role))); }} catch (Exception e) { e.printStackTrace(); httpServletResponse.sendError(HttpServletResponse.SC_UNAUTHORIZED, e.getMessage()); return;}filterChain.doFilter(httpServletRequest, httpServletResponse); } //是否是保護(hù)連接 private boolean isProtectedUrl(HttpServletRequest request) {boolean flag = false;for (int i = 0; i < protectUrlPattern.length; i++) { if (pathmatcher.match(protectUrlPattern[i], request.getServletPath())) {return true; }}return false; }}4、配置JWT config類(配置類)

跨域訪問:客戶端與服務(wù)端域名不同或是端口號不同。防止跨域攻擊

package edu.ynmd.cms.config;import edu.ynmd.cms.filter.JwtAuthenticationFilter;import org.springframework.context.annotation.Bean;import org.springframework.context.annotation.Configuration;import org.springframework.security.config.annotation.method.configuration.EnableGlobalMethodSecurity;import org.springframework.security.config.annotation.web.builders.HttpSecurity;import org.springframework.security.config.annotation.web.configuration.EnableWebSecurity;import org.springframework.security.config.annotation.web.configuration.WebSecurityConfigurerAdapter;import org.springframework.security.config.http.SessionCreationPolicy;import org.springframework.security.crypto.bcrypt.BCryptPasswordEncoder;import org.springframework.security.crypto.password.PasswordEncoder;import org.springframework.security.web.authentication.UsernamePasswordAuthenticationFilter;import org.springframework.security.web.firewall.HttpFirewall;import org.springframework.security.web.firewall.StrictHttpFirewall;@Configuration@EnableWebSecurity@EnableGlobalMethodSecurity(prePostEnabled = true)public class WebSecurityConfig extends WebSecurityConfigurerAdapter { @Bean public PasswordEncoder passwordEncoder(){return new BCryptPasswordEncoder(); } @Bean public HttpFirewall allowUrlEncodedSlashHttpFirewall() {StrictHttpFirewall firewall = new StrictHttpFirewall();firewall.setAllowUrlEncodedSlash(true);return firewall; } @Override protected void configure(HttpSecurity http) throws Exception {http.csrf().disable().cors() //允許跨域訪問.and().authorizeRequests().antMatchers('/').authenticated() //配置那些url需要進(jìn)行校驗--所有請求都需要校驗'/'.antMatchers('/public/**').permitAll() //那些請求不需要校驗.anyRequest().authenticated() //自定義校驗類.and().addFilterBefore(new JwtAuthenticationFilter(),UsernamePasswordAuthenticationFilter.class).sessionManagement().sessionCreationPolicy(SessionCreationPolicy.STATELESS)//關(guān)閉session; }}5、Action注解

在Controller類中添加

@CrossOrigin@RestController@PreAuthorize('hasAuthority(’admin’)') //配置角色,擁有該角色的用戶方可訪問@RequestMapping('/manage')

postman測試http://localhost:7070/manage/userList,不可訪問

SpringBoot集成Spring security JWT實現(xiàn)接口權(quán)限認(rèn)證

public開頭的可以訪問

6、token令牌環(huán),訪問需校驗的資源

public的Controller類添加

@PostMapping('/login') @ResponseBody public HashMap<String,String> login( @RequestBody Account account) throws IOException {//Users u=manageService.getUserByUserNameAndPass(account.username,account.password);if(account.username.equals('admin')&&account.password.equals('123456')){//if(u!=null){ String jwt= JwtUtils.generateToken('admin','123456789abc');// String jwt= JwtUtils.generateToken(u.getRoleid(),u.getUsersid()); return new HashMap<String,String>(){{put('msg','ok');put('token',jwt);//put('role',u.getRoleid());put('role','admin'); }};}else { //return new ResponseEntity(HttpStatus.UNAUTHORIZED); return new HashMap<String,String>(){{put('msg','error');put('token','error'); }};} } public static class Account{public String username;public String password; }

postman測試,隨便輸用戶名密碼

SpringBoot集成Spring security JWT實現(xiàn)接口權(quán)限認(rèn)證

輸入代碼中的用戶名密碼

SpringBoot集成Spring security JWT實現(xiàn)接口權(quán)限認(rèn)證

去JWT官網(wǎng)https://jwt.io/,頁面下滑,將得到的token輸入,得到

SpringBoot集成Spring security JWT實現(xiàn)接口權(quán)限認(rèn)證

manage的Controller類中添加測試

@GetMapping('testSecurityResource') @ResponseBody public String testSecurityResource() throws Exception{return '受保護(hù)的資源'; }

用postman訪問http://localhost:7070/manage/testSecurityResource,返回結(jié)果

SpringBoot集成Spring security JWT實現(xiàn)接口權(quán)限認(rèn)證

7、service工具類

通用請求處理

package com.dreamteam.chdapp.controller.common;import org.slf4j.Logger;import org.slf4j.LoggerFactory;import org.springframework.stereotype.Controller;/** * 通用請求處理 * @Author HeYunHui * @create 2020/11/14 15:38 */@Controllerpublic class CommonController { protected static final Logger log= LoggerFactory.getLogger(CommonController.class); /** * 字符串為空 * @param value * @return */ public static boolean isNullOrSpace(String value){if(value==null){ return true;}else { if(value.equals('')){return true; } else {return false; }} }}

Service層

String getCurrentUserId();//從令牌環(huán)中獲取useridString getCurrentRole();//從令牌環(huán)中獲取角色id

ServiceImpl

/** * 獲取當(dāng)前登錄用的的Id * @return */ @Override public String getCurrentUserId() {String userid= (String) SecurityContextHolder.getContext().getAuthentication() .getPrincipal();if(CommonController.isNullOrSpace(userid)){ return null;}else { return userid;} } /** * 獲取當(dāng)前登錄用戶的角色 * @return */ @Override public String getCurrentRole() {String role=null;Collection<SimpleGrantedAuthority> authorities = (Collection<SimpleGrantedAuthority>) SecurityContextHolder.getContext().getAuthentication().getAuthorities();for (GrantedAuthority authority : authorities) { role = authority.getAuthority();}if(CommonController.isNullOrSpace(role)){ return null;}else{ return role;} }

修改manage的Controller類

@GetMapping('testSecurityResource') @ResponseBody public String testSecurityResource() throws Exception{String userid=userInfoService.getCurrentUserId();String role=userInfoService.getCurrentRole();return '受保護(hù)的資源,當(dāng)前用戶的id是'+userid+'當(dāng)前用戶的角色是'+role; }

用postman測試

SpringBoot集成Spring security JWT實現(xiàn)接口權(quán)限認(rèn)證

這是前面自定義的

SpringBoot集成Spring security JWT實現(xiàn)接口權(quán)限認(rèn)證

8、識別token信息

SpringBoot集成Spring security JWT實現(xiàn)接口權(quán)限認(rèn)證

如果將下圖中的角色換掉,將不能訪問

SpringBoot集成Spring security JWT實現(xiàn)接口權(quán)限認(rèn)證

9、自動更新令牌環(huán)

添加Controller類

package com.dreamteam.chdapp.controller;import com.dreamteam.chdapp.controller.common.CommonController;import com.dreamteam.chdapp.utils.JwtUtils;import org.springframework.security.access.prepost.PreAuthorize;import org.springframework.security.core.GrantedAuthority;import org.springframework.security.core.authority.SimpleGrantedAuthority;import org.springframework.security.core.context.SecurityContextHolder;import org.springframework.web.bind.annotation.*;import javax.servlet.http.HttpServletRequest;import java.util.Collection;import java.util.HashMap;/** * 令牌環(huán)自動更新 * @Author HeYunHui * @create 2020/11/16 17:24 * @PreAuthorize('hasAuthority(’admin’)')//只允許有admin角色的用戶訪問 hasAnyAuthority([auth1,auth2]) */@CrossOrigin@RestController@PreAuthorize('hasAnyAuthority(’admin’,’member’)')@RequestMapping('/auth')public class AuthController { /** * 更新令牌環(huán)信息 * @param request * @return */ @GetMapping('refreshToken') @ResponseBody public HashMap<String,String> refreshToken(HttpServletRequest request){String role=null;Collection<SimpleGrantedAuthority> authorities = (Collection<SimpleGrantedAuthority>) SecurityContextHolder.getContext().getAuthentication().getAuthorities();for (GrantedAuthority authority : authorities) { role = authority.getAuthority();}// UserDetails userDetails = (UserDetails) SecurityContextHolder.getContext().getAuthentication() .getPrincipal();String userid= (String)SecurityContextHolder.getContext().getAuthentication() .getPrincipal();if(CommonController.isNullOrSpace(role)){ return new HashMap<String,String>(){{put('token','error'); }};}else{ String jwt=''; //一小時 jwt= JwtUtils.generateToken(role,userid,60*60*1000); HashMap<String,String> m=new HashMap<>(); m.put('token',jwt); return m;} } /** * 獲取當(dāng)前登錄用戶的角色 * @return */ @GetMapping('getRole') @ResponseBody public HashMap<String,String> getRoleByToken(){String role='';String userid='';Collection<SimpleGrantedAuthority> authorities = (Collection<SimpleGrantedAuthority>) SecurityContextHolder.getContext().getAuthentication().getAuthorities();for (GrantedAuthority authority : authorities) { role = authority.getAuthority();}if(CommonController.isNullOrSpace(role)){ return new HashMap<String,String>(){{put('role','error'); }};}else{ HashMap<String,String> m=new HashMap<>(); m.put('role',role); return m;} }}

用postman測試

SpringBoot集成Spring security JWT實現(xiàn)接口權(quán)限認(rèn)證

10、使用數(shù)據(jù)庫存儲用戶信息

(1)實體類

package com.dreamteam.chdapp.entity;import com.baomidou.mybatisplus.annotation.IdType;import com.baomidou.mybatisplus.annotation.TableId;import com.baomidou.mybatisplus.annotation.TableName;import lombok.AllArgsConstructor;import lombok.Data;import lombok.NoArgsConstructor;import org.springframework.stereotype.Component;@Component@Data@AllArgsConstructor@NoArgsConstructor/** * 表名 */@TableName('users')public class Users { @TableId(type = IdType.AUTO) private String usrId; private String usrName; private String usrTel; private String usrPwd; private String usrType; }

UserMapper

package com.dreamteam.chdapp.mapper;import com.baomidou.mybatisplus.core.mapper.BaseMapper;import com.dreamteam.chdapp.entity.Users;import org.apache.ibatis.annotations.Mapper;import org.apache.ibatis.annotations.Param;import org.springframework.stereotype.Repository;import java.util.List;/** * @Author HeYunHui * @create 2020/11/11 21:50 */@Repository@Mapperpublic interface UserMapper extends BaseMapper<Users> { List<Users> getUsersByUsrNameAndPwd(@Param('usrName')String usrName, @Param('usrPwd') String usrPwd);}

UsersMapper.xml

<?xml version='1.0' encoding='UTF-8' ?><!DOCTYPE mapperPUBLIC '-//mybatis.org//DTD Mapper 3.0//EN''http://mybatis.org/dtd/mybatis-3-mapper.dtd'><mapper namespace='com.dreamteam.chdapp.mapper.UserMapper'> <select resultType='com.dreamteam.chdapp.entity.Users'>select * from users where #{usrName}=usr_name and #{usrPwd}=usr_pwd </select></mapper>

service

Users getUsersByUsrNameAndPwd(String usrName,String usrPwd);

serviceImpl JWT獲取用戶名密碼

@Override public Users getUsersByUsrNameAndPwd(String usrName, String usrPwd) {List<Users> ul=userMapper.getUsersByUsrNameAndPwd(usrName,usrPwd);if(ul.size()>0){ return ul.get(0);}return null; }

Controller

@PostMapping('/login') @ResponseBody public HashMap<String,String> login( @RequestBody Account account) throws IOException {Users u=userInfoService.getUsersByUsrNameAndPwd(account.username,account.password);//if(account.username.equals('admin')&&account.password.equals('123456')){if(u!=null){// String jwt= JwtUtils.generateToken('admin','123456789abc'); String jwt= JwtUtils.generateToken(u.getUsrType(),u.getUsrId()); return new HashMap<String,String>(){{put('msg','ok');put('token',jwt);put('role',u.getUsrType());//put('role','admin'); }};}else { //return new ResponseEntity(HttpStatus.UNAUTHORIZED); return new HashMap<String,String>(){{put('msg','error');put('token','error'); }};} } public static class Account{public String username;public String password; }

postman測試

a.登錄,生成token

SpringBoot集成Spring security JWT實現(xiàn)接口權(quán)限認(rèn)證

b.輸入token訪問manage下的鏈接

SpringBoot集成Spring security JWT實現(xiàn)接口權(quán)限認(rèn)證

到此這篇關(guān)于SpringBoot集成Spring security JWT實現(xiàn)接口權(quán)限認(rèn)證的文章就介紹到這了,更多相關(guān)SpringBoot 接口權(quán)限認(rèn)證內(nèi)容請搜索好吧啦網(wǎng)以前的文章或繼續(xù)瀏覽下面的相關(guān)文章希望大家以后多多支持好吧啦網(wǎng)!

標(biāo)簽: Spring
相關(guān)文章:
日本不卡不码高清免费观看,久久国产精品久久w女人spa,黄色aa久久,三上悠亚国产精品一区二区三区
免费看一区二区三区| 免费精品一区| 欧美日中文字幕| 伊人久久国产| 超碰在线99| 欧美日韩视频免费观看| 国产乱码午夜在线视频| 国产在线一区不卡| 国语精品一区| 国产福利片在线观看| 麻豆久久一区| 国产videos久久| 日韩中文在线电影| 国内精品99| 亚洲欧美激情诱惑| 日韩毛片一区| 国产欧美88| 国产精品久久久久蜜臀| 日韩电影免费网站| 亚洲激情不卡| 日韩av中文在线观看| 免费在线播放第一区高清av| 精品网站999| 色婷婷久久久| 丝袜诱惑制服诱惑色一区在线观看| 丝袜a∨在线一区二区三区不卡| 亚洲精品婷婷| 国产精品天天看天天狠| 国产一区2区| 国内精品99| 中文字幕日韩亚洲| 国产精品密蕾丝视频下载| 精品五月天堂| 红桃视频亚洲| 国产日韩在线观看视频| 色欧美自拍视频| 在线视频精品| 国产精品一区高清| 成人日韩在线观看| 亚洲日本国产| 国产一区二区三区四区| 婷婷激情一区| 在线精品国产亚洲| 嫩草伊人久久精品少妇av杨幂| 日韩国产激情| 亚洲精品看片| 久久亚州av| 国产精品毛片在线| 国产精品porn| 亚洲免费观看| 国产精品a级| 五月天久久网站| 久久国产精品色av免费看| 日韩欧美一区免费| 蜜桃av一区二区在线观看| 香蕉久久久久久久av网站| 国产精品亚洲四区在线观看| 久久激情网站| 国产精品一区二区三区四区在线观看| 日韩欧美国产精品综合嫩v| 视频一区二区中文字幕| 国产一区不卡| 中文字幕av一区二区三区四区| 精品精品国产三级a∨在线| 免费精品视频最新在线| 国产欧洲在线| 日韩精彩视频在线观看| 亚洲a在线视频| 国产精品成人一区二区网站软件| 蜜桃成人av| 国产精品中文字幕亚洲欧美| 婷婷久久一区| 精品视频黄色| 日韩精品三级| 欧美va天堂| 精品九九久久| 欧美日韩1区2区3区| 欧美午夜不卡| 亚洲性色av| 国产精品mv在线观看| 亚洲精品极品| 欧美资源在线| 日韩成人高清| 国产成人久久精品一区二区三区| 日韩午夜视频在线| 99久久激情| 国产一区二区三区精品在线观看| 中文字幕一区二区三区日韩精品| 午夜精品成人av| 精品午夜视频| 国产精品2区| 日韩综合一区二区| 在线亚洲成人| 亚洲性图久久| 色网在线免费观看| 国产一区日韩| 国产精品久一| 日韩av中文字幕一区二区| 免费成人在线影院| 在线亚洲一区| 久久国产成人午夜av影院宅| 九九99久久精品在免费线bt| 国产探花在线精品一区二区| 亚洲有吗中文字幕| 国产精品三上| 欧美日韩国产免费观看视频| 久久久久一区| 视频福利一区| 午夜精品成人av| 日韩在线不卡| 日韩欧美午夜| 女生影院久久| 欧美韩日一区| 水蜜桃久久夜色精品一区| 精品一区二区三区的国产在线观看| 日韩在线观看一区二区三区| 日本大胆欧美人术艺术动态| 亚洲欧美高清| 国产毛片久久| 国产精品丝袜xxxxxxx| 影音先锋国产精品| 欧美专区一区二区三区| 黄色不卡一区| 香蕉精品视频在线观看| 国产精品99一区二区| 婷婷中文字幕一区| 亚洲免费高清| 亚洲一区二区日韩| 亚州国产精品| 欧美精品国产白浆久久久久| 国产色噜噜噜91在线精品| 91精品国产自产在线丝袜啪| 日本三级亚洲精品| 国产毛片一区二区三区| **爰片久久毛片| 国产精品蜜月aⅴ在线| 精品国产乱码久久久久久1区2匹| 日韩av自拍| 亚洲视频综合| 天堂av在线一区| 日本va欧美va瓶| 国产乱人伦丫前精品视频 | 日韩影院精彩在线| 免费人成网站在线观看欧美高清| 亚洲欧美在线综合| 国产亚洲一卡2卡3卡4卡新区| 国产极品一区| 黄色aa久久| 亚洲精品小说| 亚洲一区二区三区久久久| 欧美综合社区国产| 成人精品久久| 不卡中文字幕| 日韩极品在线观看| 精品国产欧美日韩| 亚洲www啪成人一区二区| 亚洲经典在线| 日韩精品a在线观看91| 久久av日韩| 国产99久久| 亚洲精品在线a| 国产一区二区三区不卡视频网站| 秋霞国产精品| 亚洲精品九九| 成人午夜网址| 另类亚洲自拍| 欧美激情精品| 狠狠色综合网| 免费一级欧美在线观看视频 | 亚洲最新无码中文字幕久久 | 国产精品97| 日韩av中文字幕一区二区三区| 国模精品一区| 在线精品国产亚洲| 国产一区二区三区不卡av| 欧美午夜不卡| 国产精品激情电影| 黄色成人91| 久久超碰99| 亚洲精品电影| 国产经典一区| 在线亚洲观看| 成人日韩av| 亚洲午夜国产成人| 久久精品免视看国产成人| 欧美日韩国产综合网| 国产精品久久久久久久久久妞妞| 欧美高清一区| 久久久久观看| 蜜臀精品久久久久久蜜臀| 精品免费视频| 亚洲精品在线二区| 日韩深夜视频| 国产视频网站一区二区三区| 在线一区电影| 久久精品国产网站| 日韩中文欧美在线| 蜜桃精品在线| 久久成人高清| 亚州av日韩av|