美文网首页Spring Security
Spring Security源码分析十一:Spring Sec

Spring Security源码分析十一:Spring Sec

作者: 淡淡的伤你 | 来源:发表于2018-01-23 23:58 被阅读418次

    Json web token (JWT), 是为了在网络应用环境间传递声明而执行的一种基于JSON的开放标准(RFC 7519).该token被设计为紧凑且安全的,特别适用于分布式站点的单点登录(SSO)场景。JWT的声明一般被用来在身份提供者和服务提供者间传递被认证的用户身份信息,以便于从资源服务器获取资源,也可以增加一些额外的其它业务逻辑所必须的声明信息,该token也可直接被用于认证,也可被加密。

    JWT组成

    https://raw.githubusercontent.com/longfeizheng/longfeizheng.github.io/master/images/security/spring-security-jwt01.png
    eyJhbGciOiJIUzI1NiIsInR5cCI6IkpXVCJ9.eyJ1c2VyX25hbWUiOiJhZG1pbiIsInNjb3BlIjpbImFsbCJdLCJleHAiOjE1MTY3MjY4MTMsImJsb2ciOiJodHRwczovL2xvbmdmZWl6aGVuZy5naXRodWIuaW8vIiwiYXV0aG9yaXRpZXMiOlsiUk9MRV9VU0VSIl0sImp0aSI6ImJmZmY0NjRjLTFiNTktNGZkNy1hNTE4LWU3YjY5MDFiNzU3YyIsImNsaWVudF9pZCI6Im1lcnJ5eW91In0.gp5t9nY9mGp5O2-yqdflc0nEAsTeCQG7VugA8q8XcF4
    

    Header

    Header 包含了一些元数据,至少会表明 token 类型以及 签名方法。

    {
     "typ": "JWT",
     "alg": "HS256"
    }
    

    Claims (Payload)

    Claims 部分包含了一些跟这个 token 有关的重要信息。

    {
     "user_name": "admin",
     "scope": [
      "all"
     ],
     "exp": 1516726813,
     "blog": "https://longfeizheng.github.io/",
     "authorities": [
      "ROLE_USER"
     ],
     "jti": "bfff464c-1b59-4fd7-a518-e7b6901b757c",
     "client_id": "merryyou"
    }
    

    Signature

    JWT 标准遵照 JSON Web Signature (JWS) 标准来生成签名。签名主要用于验证 token 是否有效,是否被篡改。

    JWT流程示意图

    https://raw.githubusercontent.com/longfeizheng/longfeizheng.github.io/master/images/security/spring-security-jwt02.jpg

    Spring Security Oauth2 实现JWT

    配置TokenStoreConfig用于存储Token

    @Configuration
    public class TokenStoreConfig {
        /**
         * redis连接工厂
         */
        @Autowired
        private RedisConnectionFactory redisConnectionFactory;
    
        /**
         * 用于存放token
         * @return
         */
        @Bean
        @ConditionalOnProperty(prefix = "merryyou.security.oauth2", name = "storeType", havingValue = "redis")
        public TokenStore redisTokenStore() {
            return new RedisTokenStore(redisConnectionFactory);
        }
    
        /**
         * jwt TOKEN配置信息
         */
        @Configuration
        @ConditionalOnProperty(prefix = "merryyou.security.oauth2", name = "storeType", havingValue = "jwt", matchIfMissing = true)
        public static class JwtTokenCofnig{
    
            /**
             * 使用jwtTokenStore存储token
             * @return
             */
            @Bean
            public TokenStore jwtTokenStore(){
                return new JwtTokenStore(jwtAccessTokenConverter());
            }
    
            /**
             * 用于生成jwt
             * @return
             */
            @Bean
            public JwtAccessTokenConverter jwtAccessTokenConverter(){
                JwtAccessTokenConverter accessTokenConverter = new JwtAccessTokenConverter();
                accessTokenConverter.setSigningKey("merryyou");//生成签名的key
                return accessTokenConverter;
            }
    
            /**
             * 用于扩展JWT
             * @return
             */
            @Bean
            @ConditionalOnMissingBean(name = "jwtTokenEnhancer")
            public TokenEnhancer jwtTokenEnhancer(){
                return new MerryyouJwtTokenEnhancer();
            }
    
        }
    }
    
    
    MerryyouJwtTokenEnhancer
    public class MerryyouJwtTokenEnhancer implements TokenEnhancer {
        @Override
        public OAuth2AccessToken enhance(OAuth2AccessToken accessToken, OAuth2Authentication authentication) {
            Map<String, Object> info = new HashMap<>();
            info.put("blog", "https://longfeizheng.github.io/");//扩展返回的token
            ((DefaultOAuth2AccessToken) accessToken).setAdditionalInformation(info);
            return accessToken;
        }
    }
    
    

    配置认证服务器

    @Configuration
    @EnableAuthorizationServer
    public class MerryyouAuthorizationServerConfig extends AuthorizationServerConfigurerAdapter {
    
        @Autowired
        private AuthenticationManager authenticationManager;
    
        @Autowired
        private UserDetailsService userDetailsService;
    
        @Autowired
        private TokenStore tokenStore;
    
        @Autowired(required = false)
        private JwtAccessTokenConverter jwtAccessTokenConverter;
    
        @Autowired(required = false)
        private TokenEnhancer jwtTokenEnhancer;
    
        @Override
        public void configure(AuthorizationServerEndpointsConfigurer endpoints) throws Exception {
            endpoints.tokenStore(tokenStore)
                    .authenticationManager(authenticationManager)
                    .userDetailsService(userDetailsService);
            //扩展token返回结果
            if (jwtAccessTokenConverter != null && jwtTokenEnhancer != null) {
                TokenEnhancerChain tokenEnhancerChain = new TokenEnhancerChain();
                List<TokenEnhancer> enhancerList = new ArrayList();
                enhancerList.add(jwtTokenEnhancer);
                enhancerList.add(jwtAccessTokenConverter);
                tokenEnhancerChain.setTokenEnhancers(enhancerList);
                //jwt
                endpoints.tokenEnhancer(tokenEnhancerChain)
                        .accessTokenConverter(jwtAccessTokenConverter);
            }
        }
    
        /**
         * 配置客户端一些信息
         * @param clients
         * @throws Exception
         */
        @Override
        public void configure(ClientDetailsServiceConfigurer clients) throws Exception {
            clients.inMemory()
                    .withClient("merryyou")
                    .secret("merryyou")
                    .accessTokenValiditySeconds(7200)
                    .authorizedGrantTypes("refresh_token", "password", "authorization_code")//OAuth2支持的验证模式
                    .scopes("all");
        }
    }
    

    配置资源服务器

    @Configuration
    @EnableResourceServer
    public class MerryyouResourceServerConfig extends ResourceServerConfigurerAdapter {
    
        /**
         * 自定义登录成功处理器
         */
        @Autowired
        private AuthenticationSuccessHandler appLoginInSuccessHandler;
    
        @Override
        public void configure(HttpSecurity http) throws Exception {
            http.formLogin()
                    .successHandler(appLoginInSuccessHandler)//登录成功处理器
                    .and()
                    .authorizeRequests().anyRequest().authenticated().and()
                    .csrf().disable();
        }
    
    }
    

    解析扩展的Token

     @GetMapping("/user")
        public Object getCurrentUser1(Authentication authentication, HttpServletRequest request) throws UnsupportedEncodingException {
            log.info("【SecurityOauth2Application】 getCurrentUser1 authenticaiton={}", JsonUtil.toJson(authentication));
    
            String header = request.getHeader("Authorization");
            String token = StringUtils.substringAfter(header, "bearer ");
    
            Claims claims = Jwts.parser().setSigningKey("merryyou".getBytes("UTF-8")).parseClaimsJws(token).getBody();
            String blog = (String) claims.get("blog");
            log.info("【SecurityOauth2Application】 getCurrentUser1 blog={}", blog);
    
            return authentication;
        }
    

    测试方法

        @Test
        public void signInTest() throws Exception {
            RestTemplate rest = new RestTemplate();
            HttpHeaders headers = new HttpHeaders();
            headers.setContentType(MediaType.APPLICATION_FORM_URLENCODED);
            headers.add("authorization", getBasicAuthHeader());
    
            MultiValueMap<String, String> params = new LinkedMultiValueMap<>();
            params.add("username", "admin");
            params.add("password", "123456");
    
            HttpEntity<?> entity = new HttpEntity(params, headers);
            // pay attention, if using get with headers, should use exchange instead of getForEntity / getForObject
            ResponseEntity<String> result = rest.exchange(SIGN_IN_URI, HttpMethod.POST, entity, String.class, new Object[]{null});
            log.info("登录信息返回的结果={}", JsonUtil.toJson(result));
        }
    

    打印:

     "body": "{\"access_token\":\"eyJhbGciOiJIUzI1NiIsInR5cCI6IkpXVCJ9.eyJ1c2VyX25hbWUiOiJhZG1pbiIsInNjb3BlIjpbImFsbCJdLCJleHAiOjE1MTY3MjkxNDIsImJsb2ciOiJodHRwczovL2xvbmdmZWl6aGVuZy5naXRodWIuaW8vIiwiYXV0aG9yaXRpZXMiOlsiUk9MRV9VU0VSIl0sImp0aSI6IjMzOTUxNDk1LTBjOGYtNGQ5NS1iZDYyLTAxMjEyYWNjZDU1ZCIsImNsaWVudF9pZCI6Im1lcnJ5eW91In0.7Lrpmn3CaNweqcMeADJeZJGDTEZYN-gg5OpAzbKIEqQ\",\"token_type\":\"bearer\",\"refresh_token\":\"eyJhbGciOiJIUzI1NiIsInR5cCI6IkpXVCJ9.eyJ1c2VyX25hbWUiOiJhZG1pbiIsInNjb3BlIjpbImFsbCJdLCJhdGkiOiIzMzk1MTQ5NS0wYzhmLTRkOTUtYmQ2Mi0wMTIxMmFjY2Q1NWQiLCJleHAiOjE1MTkzMTM5NDIsImJsb2ciOiJodHRwczovL2xvbmdmZWl6aGVuZy5naXRodWIuaW8vIiwiYXV0aG9yaXRpZXMiOlsiUk9MRV9VU0VSIl0sImp0aSI6IjFlMjI1YzE5LTE5NDMtNGNjMi1iYTdjLTM1MzdmZDA1M2E4MyIsImNsaWVudF9pZCI6Im1lcnJ5eW91In0.lKHgXd2HSPCp2cK6S-ZvLUwXRjnXEX9wryDWV4CmSGw\",\"expires_in\":7199,\"scope\":\"all\",\"blog\":\"https://longfeizheng.github.io/\",\"jti\":\"33951495-0c8f-4d95-bd62-01212accd55d\"}"
    

    效果如下:

    https://raw.githubusercontent.com/longfeizheng/longfeizheng.github.io/master/images/security/spring-security-jwt03.gif

    代码下载

    从我的 github 中下载,https://github.com/longfeizheng/security-oauth2

    相关文章

      网友评论

      • 编程界的小学生:比如登录成功后处理器里返回统一格式的jwt的json,我用户名密码登录后返回json,没毛病。我用qq登录的时候怎么办呢?前端超链接过来,而不是ajax

      本文标题:Spring Security源码分析十一:Spring Sec

      本文链接:https://www.haomeiwen.com/subject/tqxyaxtx.html