美文网首页
SpringBoot整合Spring Security 动态权限

SpringBoot整合Spring Security 动态权限

作者: 伍陆柒_ | 来源:发表于2019-10-18 10:16 被阅读0次

    部分引自 www.javaboy.org
    之前的案例权限都是写死的,但实际项目中并不是这样的,权限应该放在数据库里,数据里面定义有哪些权限,用户有哪些角色进而达到动态权限配置

    5张表用来解决用户角色权限的动态管理

    /*
    Navicat MySQL Data Transfer
    
    Source Server         : neuedu
    Source Server Version : 50723
    Source Host           : localhost:3306
    Source Database       : security_test
    
    Target Server Type    : MYSQL
    Target Server Version : 50723
    File Encoding         : 65001
    
    Date: 2019-09-30 21:15:30
    */
    
    SET FOREIGN_KEY_CHECKS=0;
    
    -- ----------------------------
    -- Table structure for menu
    -- ----------------------------
    DROP TABLE IF EXISTS `menu`;
    CREATE TABLE `menu` (
      `id` int(11) NOT NULL AUTO_INCREMENT,
      `pattern` varchar(50) DEFAULT NULL,
      PRIMARY KEY (`id`)
    ) ENGINE=InnoDB AUTO_INCREMENT=4 DEFAULT CHARSET=utf8;
    
    -- ----------------------------
    -- Records of menu
    -- ----------------------------
    INSERT INTO `menu` VALUES ('1', '/dba/**');
    INSERT INTO `menu` VALUES ('2', '/admin/**');
    INSERT INTO `menu` VALUES ('3', '/user/**');
    
    -- ----------------------------
    -- Table structure for menu_role
    -- ----------------------------
    DROP TABLE IF EXISTS `menu_role`;
    CREATE TABLE `menu_role` (
      `id` int(11) NOT NULL AUTO_INCREMENT,
      `mid` int(11) DEFAULT NULL,
      `rid` int(11) DEFAULT NULL,
      PRIMARY KEY (`id`)
    ) ENGINE=InnoDB AUTO_INCREMENT=4 DEFAULT CHARSET=utf8;
    
    -- ----------------------------
    -- Records of menu_role
    -- ----------------------------
    INSERT INTO `menu_role` VALUES ('1', '1', '1');
    INSERT INTO `menu_role` VALUES ('2', '2', '2');
    INSERT INTO `menu_role` VALUES ('3', '3', '3');
    
    -- ----------------------------
    -- Table structure for role
    -- ----------------------------
    DROP TABLE IF EXISTS `role`;
    CREATE TABLE `role` (
      `id` int(11) NOT NULL AUTO_INCREMENT,
      `name` varchar(32) DEFAULT NULL,
      `nameZh` varchar(32) DEFAULT NULL,
      PRIMARY KEY (`id`)
    ) ENGINE=InnoDB AUTO_INCREMENT=4 DEFAULT CHARSET=utf8;
    
    -- ----------------------------
    -- Records of role
    -- ----------------------------
    INSERT INTO `role` VALUES ('1', 'ROLE_dba', '数据库管理员');
    INSERT INTO `role` VALUES ('2', 'ROLE_admin', '系统管理员');
    INSERT INTO `role` VALUES ('3', 'ROLE_user', '用户');
    
    -- ----------------------------
    -- Table structure for user
    -- ----------------------------
    DROP TABLE IF EXISTS `user`;
    CREATE TABLE `user` (
      `id` int(11) NOT NULL AUTO_INCREMENT,
      `username` varchar(32) DEFAULT NULL,
      `password` varchar(255) DEFAULT NULL,
      `enabled` tinyint(1) DEFAULT NULL,
      `locked` tinyint(1) DEFAULT NULL,
      PRIMARY KEY (`id`)
    ) ENGINE=InnoDB AUTO_INCREMENT=4 DEFAULT CHARSET=utf8;
    
    -- ----------------------------
    -- Records of user
    -- ----------------------------
    INSERT INTO `user` VALUES ('1', 'root', '$2a$10$WuUO9k/3LfTGzMEAKxNtAenttd9ulTq7wTj17ojqbU44Q5rwN/mWu', '1', '0');
    INSERT INTO `user` VALUES ('2', 'admin', '$2a$10$WuUO9k/3LfTGzMEAKxNtAenttd9ulTq7wTj17ojqbU44Q5rwN/mWu', '1', '0');
    INSERT INTO `user` VALUES ('3', 'sang', '$2a$10$WuUO9k/3LfTGzMEAKxNtAenttd9ulTq7wTj17ojqbU44Q5rwN/mWu', '1', '0');
    
    -- ----------------------------
    -- Table structure for user_role
    -- ----------------------------
    DROP TABLE IF EXISTS `user_role`;
    CREATE TABLE `user_role` (
      `id` int(11) NOT NULL AUTO_INCREMENT,
      `uid` int(11) DEFAULT NULL,
      `rid` int(11) DEFAULT NULL,
      PRIMARY KEY (`id`)
    ) ENGINE=InnoDB AUTO_INCREMENT=5 DEFAULT CHARSET=utf8;
    
    -- ----------------------------
    -- Records of user_role
    -- ----------------------------
    INSERT INTO `user_role` VALUES ('1', '1', '1');
    INSERT INTO `user_role` VALUES ('2', '1', '2');
    INSERT INTO `user_role` VALUES ('3', '2', '2');
    INSERT INTO `user_role` VALUES ('4', '3', '3');
    

    环境搭建

    新建项目,依然添加四个依赖,外加连接池
    mybatis数据库配置

    spring.datasource.url=jdbc:mysql:///security_test?useUnicode=true&characterEncoding=UTF-8
    spring.datasource.type=com.alibaba.druid.pool.DruidDataSource
    spring.datasource.username=root
    spring.datasource.password=root
    

    项目包


    image.png

    在之前的案例之上添加Menu实体类

    package org.javaboy.security_db2.bean;
    
    import java.util.List;
    
    public class Menu {
        private Integer id;
        private String pattern;
        // 表示访问该路径需要哪些角色
        private List<Role> roles;
    
        public List<Role> getRoles() {
            return roles;
        }
    
        public void setRoles(List<Role> roles) {
            this.roles = roles;
        }
    
        public Integer getId() {
            return id;
        }
    
        public void setId(Integer id) {
            this.id = id;
        }
    
        public String getPattern() {
            return pattern;
        }
    
        public void setPattern(String pattern) {
            this.pattern = pattern;
        }
    }
    

    service

    package org.javaboy.security_db2.service;
    
    import org.javaboy.security_db2.bean.Menu;
    import org.javaboy.security_db2.mapper.MenuMapper;
    import org.springframework.beans.factory.annotation.Autowired;
    import org.springframework.stereotype.Service;
    
    import java.util.List;
    
    @Service
    public class MenuService {
        @Autowired
        MenuMapper menuMapper;
        public List<Menu> getAllMenus(){
            return menuMapper.getAllMenus();
        }
    }
    

    mapper

    package org.javaboy.security_db2.mapper;
    
    import org.javaboy.security_db2.bean.Menu;
    
    import java.util.List;
    
    public interface MenuMapper {
        List<Menu> getAllMenus();
    }
    
    <?xml version="1.0" encoding="UTF-8"?>
    <!DOCTYPE mapper
            PUBLIC "-//mybatis.org//DTD Mapper 3.0//EN"
            "http://mybatis.org/dtd/mybatis-3-mapper.dtd">
    <mapper namespace="org.javaboy.security_db2.mapper.MenuMapper">
        <select id="getAllMenus" resultMap="BaseResultMap">
            select m.*,r.id rid,r.`name` rname,r.nameZh rnameZh
            from menu m
            left join menu_role mr
            on m.id = mr.mid
            left join role r
            on mr.rid = r.id
        </select>
        <resultMap id="BaseResultMap" type="org.javaboy.security_db2.bean.Menu">
            <id property="id" column="id"/>
            <result property="pattern" column="pattern"/>
            <collection property="roles" ofType="org.javaboy.security_db2.bean.Role">
                <id property="id" column="rid"/>
                <result property="name" column="rname" />
                <result property="nameZh" column="rnameZh"/>
            </collection>
        </resultMap>
    </mapper>
    

    新增配置类

    package org.javaboy.security_db2.config;
    
    import com.sun.org.apache.xerces.internal.xs.StringList;
    import org.javaboy.security_db2.bean.Menu;
    import org.javaboy.security_db2.bean.Role;
    import org.javaboy.security_db2.service.MenuService;
    import org.springframework.beans.factory.annotation.Autowired;
    import org.springframework.security.access.ConfigAttribute;
    import org.springframework.security.access.SecurityConfig;
    import org.springframework.security.web.FilterInvocation;
    import org.springframework.security.web.access.intercept.FilterInvocationSecurityMetadataSource;
    import org.springframework.stereotype.Component;
    import org.springframework.util.AntPathMatcher;
    
    import java.util.Collection;
    import java.util.List;
    
    /**
     * 这个类是分析得出 用户访问的 url 需要哪些角色
     * 核心的方法是第一个
     * 第三个方法返回true表示支持支持这种方式即可
     *
     */
    @Component
    public class UrlFilterInvocationSecurityMetadataSource implements FilterInvocationSecurityMetadataSource {
    
        @Autowired
        MenuService menuService;
        // ant风格匹配符
        AntPathMatcher antPathMatcher = new AntPathMatcher();
    
        /**
         * 在用户发出请求时,根据请求的 url 查出 该 url 需要哪些角色才能访问,并返回
         * @param o
         * @return
         * @throws IllegalArgumentException
         */
        @Override
        public Collection<ConfigAttribute> getAttributes(Object o) throws IllegalArgumentException {
            // 获取 请求 url 地址
            String requestUrl = ((FilterInvocation) o).getRequestUrl();
            // 得到所有 url 和 角色 的对应关系(这里可以用缓存处理)
            List<Menu> allMenus = menuService.getAllMenus();
            // 如果和 请求url 匹配上 就把他存入到 Collection<ConfigAttribute> 里
            for (Menu menu : allMenus) {
                if (antPathMatcher.match(menu.getPattern(), requestUrl)) {
                    // 如果匹配上就 获取到 所需的角色列表
                    List<Role> roles = menu.getRoles();
                    String[] strList = new String[roles.size()];
                    for (int i = 0; i < strList.length; i++) {
                        strList[i] = roles.get(i).getName();
                    }
                    return SecurityConfig.createList(strList);
                }
            }
            // 如果都没有匹配上,我们返回默认值,这个值就像一个特殊的标识符,自定义
            return SecurityConfig.createList("ROLE_LOGIN");
        }
    
        @Override
        public Collection<ConfigAttribute> getAllConfigAttributes() {
            return null;
        }
    
        @Override
        public boolean supports(Class<?> aClass) {
            return true;
        }
    }
    
    package org.javaboy.security_db2.config;
    
    import org.springframework.security.access.AccessDecisionManager;
    import org.springframework.security.access.AccessDeniedException;
    import org.springframework.security.access.ConfigAttribute;
    import org.springframework.security.authentication.AnonymousAuthenticationToken;
    import org.springframework.security.authentication.InsufficientAuthenticationException;
    import org.springframework.security.core.Authentication;
    import org.springframework.security.core.GrantedAuthority;
    import org.springframework.stereotype.Component;
    
    import java.util.Collection;
    
    /**
     * 获取登录用户的角色,并与 访问 所需要的角色进行对比,决定是否可以访问
     */
    @Component
    public class UrlAccessDecisionManager implements AccessDecisionManager {
    
        @Override
        public void decide(Authentication authentication, Object o, Collection<ConfigAttribute> collection) throws AccessDeniedException, InsufficientAuthenticationException {
            for (ConfigAttribute attribute : collection) {
                // 如果是其他的 url 访问,判断有没有登录,没有登录抛出异常
                if ("ROLE_LOGIN".equals(attribute.getAttribute())) {
                    if (authentication instanceof AnonymousAuthenticationToken) {
                        throw new AccessDeniedException("非法请求");
                    }else{
                        return;
                    }
                }
                // 如果 url 与数据库匹配上了,判断 当前 用户有没有能访问的角色,如果有就 return ,没有抛出异常
                Collection<? extends GrantedAuthority> authorities = authentication.getAuthorities();
                for (GrantedAuthority authority : authorities) {
                    if (authority.getAuthority().equals(attribute.getAttribute())) {
                        return;
                    }
                }
                throw new AccessDeniedException("非法请求");
            }
        }
    
        @Override
        public boolean supports(ConfigAttribute configAttribute) {
            return true;
        }
    
        @Override
        public boolean supports(Class<?> aClass) {
            return true;
        }
    }
    
    package org.javaboy.security_db2.config;
    
    import com.fasterxml.jackson.databind.ObjectMapper;
    import org.javaboy.security_db2.service.UserService;
    import org.springframework.beans.factory.annotation.Autowired;
    import org.springframework.context.annotation.Bean;
    import org.springframework.context.annotation.Configuration;
    import org.springframework.security.config.annotation.ObjectPostProcessor;
    import org.springframework.security.config.annotation.authentication.builders.AuthenticationManagerBuilder;
    import org.springframework.security.config.annotation.web.builders.HttpSecurity;
    import org.springframework.security.config.annotation.web.configuration.WebSecurityConfigurerAdapter;
    import org.springframework.security.core.Authentication;
    import org.springframework.security.core.AuthenticationException;
    import org.springframework.security.crypto.bcrypt.BCryptPasswordEncoder;
    import org.springframework.security.crypto.password.PasswordEncoder;
    import org.springframework.security.web.access.intercept.FilterSecurityInterceptor;
    import org.springframework.security.web.authentication.AuthenticationFailureHandler;
    import org.springframework.security.web.authentication.AuthenticationSuccessHandler;
    
    import javax.servlet.ServletException;
    import javax.servlet.http.HttpServletRequest;
    import javax.servlet.http.HttpServletResponse;
    import java.io.IOException;
    import java.io.PrintWriter;
    import java.util.HashMap;
    import java.util.Map;
    
    @Configuration
    public class SecurityConfig extends WebSecurityConfigurerAdapter {
        @Autowired
        UserService userService;
        @Autowired
        UrlAccessDecisionManager urlAccessDecisionManager;
        @Autowired
        UrlFilterInvocationSecurityMetadataSource urlFilterInvocationSecurityMetadataSource;
        @Override
        protected void configure(AuthenticationManagerBuilder auth) throws Exception {
            auth.userDetailsService(userService);
        }
    
        @Bean
        PasswordEncoder passwordEncoder(){
            return new BCryptPasswordEncoder();
        }
    
        @Override
        protected void configure(HttpSecurity http) throws Exception {
            http.authorizeRequests()
                    .withObjectPostProcessor(new ObjectPostProcessor<FilterSecurityInterceptor>() {
                        @Override
                        public <O extends FilterSecurityInterceptor> O postProcess(O o) {
                            o.setAccessDecisionManager(urlAccessDecisionManager);
                            o.setSecurityMetadataSource(urlFilterInvocationSecurityMetadataSource);
                            return o;
                        }
                    })
                    .and()
                    .formLogin()
                    .permitAll()
                    .and()
                    .csrf().disable();
        }
    }
    

    相关文章

      网友评论

          本文标题:SpringBoot整合Spring Security 动态权限

          本文链接:https://www.haomeiwen.com/subject/dqmhpctx.html