目录
前言
本文介绍HTTP请求授权工作原理、配置及适用场景,共同以下内容观看效果更佳!!!
一、HTTP请求授权工作原理
基于Spring Security最新的Http请求授权讲授,不再利用旧版的请求授权
- 授权过滤器AuthorizationFilter获取认证信息
- 调用RequestMatcherDelegatingAuthorizationManager的check方法验证该用户是否具有该请求的授权
- RequestMatcherDelegatingAuthorizationManager根据配置的请求和授权关系校验用户是否具有当前请求的授权并返回授权结果
- AuthorizationFilter处置惩罚授权结果,授权成功则继续调用过滤器链,否则抛出AccessDeniedException异常
- 认证失败时,ExceptionTranslationFilter处置惩罚AccessDeniedException异常,如果是当前认证是匿名认证大概RememberMe认证则调用AuthenticationEntryPoint的commence方法,否则调用AccessDeniedHandler的handler方法
- 工作原理图如下
二、HTTP请求授权配置
1、添加用户权限
- package com.yu.demo.spring.impl;
- import com.yu.demo.entity.UserDetailsImpl;
- import org.springframework.security.core.GrantedAuthority;
- import org.springframework.security.core.authority.SimpleGrantedAuthority;
- import org.springframework.security.core.userdetails.UserDetails;
- import org.springframework.security.core.userdetails.UserDetailsService;
- import org.springframework.security.core.userdetails.UsernameNotFoundException;
- import org.springframework.stereotype.Service;
- import java.util.ArrayList;
- import java.util.List;
- import java.util.UUID;
- @Service
- public class UserDetailsServiceImpl implements UserDetailsService {
- //@Autowired
- //private UserService userService;
- // @Autowired
- //private UserRoleService userRoleService;
- @Override
- public UserDetails loadUserByUsername(String username) throws UsernameNotFoundException {
- //TODO 通过username从数据库中获取用户,将用户转UserDetails
- //User user = userService.getByUsername(username);
- //TODO 从数据库实现查询权限并转化为List<GrantedAuthority>
- //List<String> roleIds = userRoleService.listRoleIdByUsername(username);
- //List<GrantedAuthority> grantedAuthorities = new ArrayList<>(roleIds.size());
- //roleIds.forEach(roleId -> grantedAuthorities.add(new SimpleGrantedAuthority(roleId)));
- //return new User(username, user.getPassword(), user.getEnable(), user.getAccountNonExpired(), user.getCredentialsNonExpired(), user.getAccountNonLocked(), user.getAuthorities());
- //测试使用,指定权限
- List<GrantedAuthority> grantedAuthorities = new ArrayList<>();
- //与hasXxxRole匹配时添加ROLE_前缀
- grantedAuthorities.add(new SimpleGrantedAuthority("ROLE_ADMIN"));
- //与hasXxxAuthority匹配时原始值
- grantedAuthorities.add(new SimpleGrantedAuthority("OPERATE"));
- //{noop}不使用密码加密器,密码123的都可以验证成功
- UserDetailsImpl userDetails = new UserDetailsImpl(username, "{noop}123", true, true, true, true, grantedAuthorities);
- //userDetails中设置token,该token只是实现认证流程,未使用jwt
- userDetails.setToken(UUID.randomUUID().toString());
- return userDetails;
- }
- }
复制代码 2、配置ExceptionTranslationFilter自定义异常处置惩罚器
- 因AuthorizationFilter授权失败时会抛出异常,该异常由ExceptionTranslationFilter处置惩罚,以是要配置自定义的异常处置惩罚器。
- 自定义AccessDeniedHandler和AuthenticationEntryPoint异常处置惩罚器(可以用一个类实现认证授权相关的全部接口,也可以利用多个类分别实现)。
- package com.yu.demo.spring.impl;
- import com.yu.demo.entity.ApiResp;
- import com.yu.demo.entity.UserDetailsImpl;
- import com.yu.demo.util.SpringUtil;
- import org.springframework.security.access.AccessDeniedException;
- import org.springframework.security.authentication.UsernamePasswordAuthenticationToken;
- import org.springframework.security.core.Authentication;
- import org.springframework.security.core.AuthenticationException;
- import org.springframework.security.core.GrantedAuthority;
- import org.springframework.security.core.authority.SimpleGrantedAuthority;
- import org.springframework.security.web.AuthenticationEntryPoint;
- import org.springframework.security.web.access.AccessDeniedHandler;
- import org.springframework.security.web.authentication.AuthenticationFailureHandler;
- import org.springframework.security.web.authentication.AuthenticationSuccessHandler;
- import org.springframework.security.web.authentication.logout.LogoutSuccessHandler;
- import org.springframework.stereotype.Component;
- import javax.servlet.ServletException;
- import javax.servlet.http.HttpServletRequest;
- import javax.servlet.http.HttpServletResponse;
- import java.io.IOException;
- import java.util.HashSet;
- import java.util.Set;
- @Component
- public class LoginResultHandler implements AuthenticationSuccessHandler, LogoutSuccessHandler, AuthenticationEntryPoint, AuthenticationFailureHandler, AccessDeniedHandler {
- /**
- * 登录成功
- */
- @Override
- public void onAuthenticationSuccess(HttpServletRequest request, HttpServletResponse response, Authentication authentication) throws IOException {
- UsernamePasswordAuthenticationToken usernamePasswordAuthenticationToken = (UsernamePasswordAuthenticationToken) authentication;
- UserDetailsImpl userDetailsImpl = (UserDetailsImpl) usernamePasswordAuthenticationToken.getPrincipal();
- //token返回到前端
- SpringUtil.respJson(response, ApiResp.success(userDetailsImpl.getToken()));
- }
- /**
- * 登录失败
- */
- @Override
- public void onAuthenticationFailure(HttpServletRequest request, HttpServletResponse response, AuthenticationException exception) throws IOException, ServletException {
- SpringUtil.respJson(response, ApiResp.loginFailure());
- }
- /**
- * 登出成功
- */
- @Override
- public void onLogoutSuccess(HttpServletRequest request, HttpServletResponse response, Authentication authentication) throws IOException, ServletException {
- SpringUtil.respJson(response, ApiResp.success());
- }
- /**
- * 未登录调用需要登录的接口时
- */
- @Override
- public void commence(HttpServletRequest request, HttpServletResponse response, AuthenticationException authException) throws IOException, ServletException {
- SpringUtil.respJson(response, ApiResp.notLogin());
- }
- /**
- * 已登录调用未授权的接口时
- */
- @Override
- public void handle(HttpServletRequest request, HttpServletResponse response, AccessDeniedException accessDeniedException) throws IOException, ServletException {
- SpringUtil.respJson(response, ApiResp.forbidden());
- }
- }
复制代码- //异常处理配置
- .exceptionHandling(exceptionHandlingCustomizer -> exceptionHandlingCustomizer
- //授权失败处理器(登录账号访问未授权的资源时)
- .accessDeniedHandler(loginResultHandler)
- //登录失败处理器(匿账号访问需要未授权的资源时)
- .authenticationEntryPoint(loginResultHandler))
复制代码 3、HTTP请求授权配置
- 本文利用最新的authorizeHttpRequests(AuthorizationFilter+AuthorizationManager)配置,不在利用authorizeRequests(FilterSecurityInterceptor+AccessDecisionManager+AccessDecisionVoter)
- 请求和授权配置成对出现,配置在前的优先级更高
- 请求种类
- antMatchers:Ant风格的路径模式,?(匹配一个字符)、*(匹配零个或多个字符,但不包括目录分隔符)、**(匹配零个或多个目录)
- mvcMatchers:Spring MVC的路径模式,支持路径变量和请求参数
- regexMatchers:正则表达式路径模式
- requestMatchers:实现RequestMatcher自定义匹配逻辑
- anyRequest:未匹配的其他请求,只能有一个且只能放在末了
- 授权种类
- permitAll:匿名或登录用户都允许访问
- denyAll:匿名和登录用户都不允许访问
- hasAuthority:有配置的权限允许访问,AuthorityAuthorizationManager校验
- hasRole:有配置的角色允许访问,ROLE_{配置角色}与用户权限匹配,AuthorityAuthorizationManager校验
- hasAnyAuthority:有配置的恣意一个权限的允许访问,AuthorityAuthorizationManager校验
- hasAnyRole:有配置的恣意一个角色允许访问,ROLE_{配置角色}与用户权限匹配,AuthorityAuthorizationManager校验
- authenticated:已认证(不包括匿名)的允许访问,AuthenticatedAuthorizationManager校验
- access:自定义授权处置惩罚
- 因authorizeHttpRequests不支持利用anonymous()的方式配置匿名访问,未自定义匿名角色时可以通过hasRole("ANONYMOUS")大概hasAuthority("ROLE_ANONYMOUS")或其他类似的方式实现允许匿名请求的设置

- //http请求授权
- .authorizeHttpRequests(authorizeHttpRequestsCustomizer -> authorizeHttpRequestsCustomizer
- //不允许访问
- .antMatchers("/test/deny")
- .denyAll()
- //允许匿名访问
- .antMatchers("/test/anonymous")
- .hasRole("ANONYMOUS")
- //允许访问
- .antMatchers("/test/permit")
- .permitAll()
- //测试使用:拥有ADMIN角色
- .antMatchers("/test/admin")
- //拥有ROLE_ADMIN权限,配置的角色不能以ROLE_作为前缀
- .hasRole("ADMIN")
- //测试使用:拥有OPERATE权限
- .antMatchers("/test/operate")
- //拥有OPERATE权限
- .hasAuthority("OPERATE")
- //其他的任何请求
- .anyRequest()
- //需要认证,且不能是匿名
- .authenticated())
复制代码- package com.yu.demo.config;import com.yu.demo.spring.filter.RestfulLoginConfigurer;import com.yu.demo.spring.filter.RestfulUsernamePasswordAuthenticationFilter;import com.yu.demo.spring.impl.LoginResultHandler;import org.springframework.beans.factory.annotation.Autowired;import org.springframework.context.annotation.Bean;import org.springframework.context.annotation.Configuration;import org.springframework.http.HttpMethod;import org.springframework.security.config.annotation.web.builders.HttpSecurity;import org.springframework.security.config.annotation.web.configuration.EnableWebSecurity;import org.springframework.security.config.annotation.web.configurers.CsrfConfigurer;import org.springframework.security.config.annotation.web.configurers.FormLoginConfigurer;import org.springframework.security.config.annotation.web.configurers.HttpBasicConfigurer;import org.springframework.security.config.annotation.web.configurers.SessionManagementConfigurer;import org.springframework.security.web.SecurityFilterChain;import org.springframework.security.web.context.SecurityContextRepository;@Configuration@EnableWebSecuritypublic class SecurityConfig { //登录参数用户名 private static final String LOGIN_ARG_USERNAME = "username"; //登录参数密码 private static final String LOGIN_ARG_PASSWORD = "password"; //登录请求类型 private static final String LOGIN_HTTP_METHOD = HttpMethod.POST.name(); //登录请求所在 private static final String LOGIN_URL = "/login"; //登出请求所在 private static final String LOGOUT_URL = "/logout"; @Autowired private LoginResultHandler loginResultHandler; @Autowired private SecurityContextRepository securityContextRepository; @Bean public SecurityFilterChain securityFilterChain(HttpSecurity httpSecurity) throws Exception { httpSecurity //禁用UsernamePasswordAuthenticationFilter、DefaultLoginPageGeneratingFilter、DefaultLogoutPageGeneratingFilter .formLogin(FormLoginConfigurer::disable) //禁用BasicAuthenticationFilter .httpBasic(HttpBasicConfigurer::disable) //禁用CsrfFilter .csrf(CsrfConfigurer::disable) //禁用SessionManagementFilter .sessionManagement(SessionManagementConfigurer::disable) //异常处理配置
- .exceptionHandling(exceptionHandlingCustomizer -> exceptionHandlingCustomizer
- //授权失败处理器(登录账号访问未授权的资源时)
- .accessDeniedHandler(loginResultHandler)
- //登录失败处理器(匿账号访问需要未授权的资源时)
- .authenticationEntryPoint(loginResultHandler)) //http请求授权
- .authorizeHttpRequests(authorizeHttpRequestsCustomizer -> authorizeHttpRequestsCustomizer
- //不允许访问
- .antMatchers("/test/deny")
- .denyAll()
- //允许匿名访问
- .antMatchers("/test/anonymous")
- .hasRole("ANONYMOUS")
- //允许访问
- .antMatchers("/test/permit")
- .permitAll()
- //测试使用:拥有ADMIN角色
- .antMatchers("/test/admin")
- //拥有ROLE_ADMIN权限,配置的角色不能以ROLE_作为前缀
- .hasRole("ADMIN")
- //测试使用:拥有OPERATE权限
- .antMatchers("/test/operate")
- //拥有OPERATE权限
- .hasAuthority("OPERATE")
- //其他的任何请求
- .anyRequest()
- //需要认证,且不能是匿名
- .authenticated()) //安全上下文配置 .securityContext(securityContextCustomizer -> securityContextCustomizer //设置自定义securityContext仓库 .securityContextRepository(securityContextRepository) //显示保存SecurityContext,官方保举 .requireExplicitSave(true)) //登出配置 .logout(logoutCustomizer -> logoutCustomizer //登出所在 .logoutUrl(LOGOUT_URL) //登出成功处置惩罚器 .logoutSuccessHandler(loginResultHandler) ) //注册自定义登录过滤器的配置器:自动注册自定义登录过滤器; //须要重写FilterOrderRegistration的构造方法FilterOrderRegistration(){},在构造方法中添加自定义过滤器的序号,否则注册不成功 .apply(new RestfulLoginConfigurer(new RestfulUsernamePasswordAuthenticationFilter(LOGIN_ARG_USERNAME, LOGIN_ARG_PASSWORD, LOGIN_URL, LOGIN_HTTP_METHOD), LOGIN_URL, LOGIN_HTTP_METHOD)) //设置登录所在:未设置时系统默认生成登录页面,登录所在/login .loginPage(LOGIN_URL) //设置登录成功之后的处置惩罚器 .successHandler(loginResultHandler) //设置登录失败之后的处置惩罚器 .failureHandler(loginResultHandler); //创建过滤器链对象 return httpSecurity.build(); }}
复制代码 三、测试接口
1、测试类
- package com.yu.demo.web;
- import com.yu.demo.entity.ApiResp;
- import org.springframework.web.bind.annotation.GetMapping;
- import org.springframework.web.bind.annotation.RequestMapping;
- import org.springframework.web.bind.annotation.RestController;
- @RestController
- @RequestMapping("/test")
- public class TestController {
- @GetMapping("/hello")
- public ApiResp hello() {
- return ApiResp.success("hello");
- }
- /**
- * 匿名允许访问接口地址
- */
- @GetMapping("/anonymous")
- public ApiResp anonymous() {
- return ApiResp.success("anonymous");
- }
- /**
- * 禁止访问接口地址
- */
- @GetMapping("/deny")
- public ApiResp deny() {
- return ApiResp.success("deny");
- }
- /**
- * 允许访问接口地址
- */
- @GetMapping("/permit")
- public ApiResp permit() {
- return ApiResp.success("permit");
- }
- /**
- * 拥有ADMIN角色或ROLE_ADMIN权限允许访问接口地址
- */
- @GetMapping("/admin")
- public ApiResp admin() {
- return ApiResp.success("admin");
- }
- /**
- * 拥有OPERATE权限的允许访问接口地址
- */
- @GetMapping("/operate")
- public ApiResp operate() {
- return ApiResp.success("operate");
- }
- }
复制代码 2、测试
四、总结
- 授权是拿用户的权限和可以访问接口的权限进行匹配,匹配成功时授权成功,匹配失败时授权失败
- 用户的权限对象是SimpleGrantedAuthority,字符串属性role
- 接口的role权限会通过ROLE_{role}转化为SimpleGrantedAuthority及其字符串属性role
- 接口的authority权限会直接转化为SimpleGrantedAuthority及其字符串属性role
- 拥有ROLE_ANONYMOUS权限大概ANONYMOUS角色可以访问匿名接口
- 后续会讲利用HTTP请求授权+自定义AuthorizationManager方式实现基于RBAC权限模型,接待连续关注
- 源码下载
免责声明:如果侵犯了您的权益,请联系站长,我们会及时删除侵权内容,谢谢合作!更多信息从访问主页:qidao123.com:ToB企服之家,中国第一个企服评测及商务社交产业平台。 |