Springboot 实践(9)springboot集成Oauth2.0授权包,5个接口文件配置详解

前文讲解实现了spring boot集成Oauth2.0,实现了授权服务器和资源服务器的搭建,并通过浏览器和postman测试,获取到了授权码,用携带授权码的URL能够争取范文到资源。

本文详细讲解spring boot集成Oauth2.0的几个重要文件接口,详细如下:

1、授权服务配置接口AuthorizationServerConfigurerAdapter

AuthorizationServerConfigurer接口,其中存在3个方法:

☆ AuthorizationServerSecurityConfigurer:配置令牌端点(Token Endpoint)的安全约束;

☆ ClientDetailsServiceConfigurer:配置OAuth2客户端;

☆ AuthorizationServerEndpointsConfigurer:配置授权(authorization)以及令牌(token)的访问端点和令牌服务(token services);

详细代码如下:bleAuthorizationServer

public class OAuthAuthorizationServerConfig extends AuthorizationServerConfigurerAdapter {

@Autowired

private DataSource dataSource;

@Autowired

private AuthenticationManager authenticationManager;

@Autowired

private OAuthWebSecurityConfig oauthWebSecurityConfig;

//AuthorizationServerSecurityConfigurer:配置令牌端点(Token ++Endpoint++)的安全约束;

//AuthorizationServerSecurityConfigurer继承自SecurityConfigurerAdapter,也就是一个 Spring Security安全配置提供给AuthorizationServer去配置AuthorizationServer的端点(/++oauth++/****)的安全访问规则、过滤器Filter。

@Override

public void configure(final AuthorizationServerSecurityConfigurer oauthServer) throws Exception {

oauthServer

.tokenKeyAccess("permitAll()")//客户端token调用许可

.checkTokenAccess("permitAll()")//客户端校验token访问许可

.allowFormAuthenticationForClients();

}

//refresh_token 单独配置UserDetailsService

@Bean

public UserDetailsService userDetailsServiceRefresh_token() {

return oauthWebSecurityConfig.userDetailsService();

}

//AuthorizationServerEndpointsConfigurer:配置授权(authorization)以及令牌(token)的访问端点和令牌服务(token services);

@Override

public void configure(AuthorizationServerEndpointsConfigurer endpoints) throws Exception {

endpoints // 设置令牌

.tokenStore(new JdbcTokenStore(dataSource)).userDetailsService(userDetailsServiceRefresh_token())

.authenticationManager(authenticationManager);

}

@Bean // 声明 ClientDetails实现

public ClientDetailsService clientDetailsService() {

return new JdbcClientDetailsService(dataSource);

}

//ClientDetailsServiceConfigurer:配置OAuth2客户端;

@Override

public void configure(final ClientDetailsServiceConfigurer clients) throws Exception {

clients.withClientDetails(clientDetailsService());

}

}

2、资源服务配置接口ResourceServerConfigurerAdapter

ResourceServerConfigurerAdapter (资源服务器配置)内部关联了ResourceServerSecurityConfigurer 和 HttpSecurity。前者与资源安全配置相关,后者与http安全配置相关,详细代码如下:

/*** 资源服务器配置*/

@Configuration

@EnableResourceServer

@EnableWebSecurity

@EnableGlobalMethodSecurity(prePostEnabled = true)

@Order(-1)

public class OAuthResourcesServerConfig extends ResourceServerConfigurerAdapter {

@Autowired

private DataSource dataSource;

//在每个ResourceServer实例上设置resourceId,该resourceId作为该服务资源的唯一标识。(假如同一个微服务资源部署多份,resourceId相同)

private static final String DEMO_RESOURCE_ID = "test-resource";

@Override

public void configure(ResourceServerSecurityConfigurer resources) {

resources.resourceId(DEMO_RESOURCE_ID); //配置resourceServerID

resources.tokenStore(new JdbcTokenStore(dataSource)); //...... 还可以有有其他的配置

}

@Override

public void configure(HttpSecurity http) throws Exception {

http

.cors()//开启跨域

.and()

.csrf().disable()

.logout()

.logoutUrl("/logout")//虚拟的登出地址

.and()

.authorizeRequests()

.antMatchers("/loginSuccess").permitAll()

.antMatchers("/loginSuccess.html").permitAll()

.antMatchers("/actuator/health").permitAll()

.anyRequest().authenticated();

}

}

3、web安全配置接口WebSecurityConfigurerAdapter

WebSecurityConfigurerAdapter是Spring Security提供了一个抽象类,实现了默认的认证和授权,允许用户自定义一个WebSecurity类,重写其中的三个configure来实现自定义的认证和授权,这三个方法如下:

  • 自定义身份认证的逻辑

protected void configure(AuthenticationManagerBuilder auth) throws Exception { }

  • 自定义全局安全过滤的逻辑

public void configure(WebSecurity web) throws Exception { }

  • 自定义URL访问权限的逻辑

protected void configure(HttpSecurity http) throws Exception { }

详细代码如下:

@Configuration

@EnableWebSecurity

@EnableGlobalMethodSecurity(prePostEnabled = true)

@Order(-1)

public class OAuthWebSecurityConfig extends WebSecurityConfigurerAdapter {

@Autowired

private MyUserDetailServiceImpl myUserDetailServiceImpl;

@Autowired

private LogoutSuccessHandlerImpl logoutSuccessHandler;

@Autowired

private CustomAuthenticationFailureHandler customAuthenticationFailureHandler;

@Autowired

private DataSource dataSource;

/** * @return RememberMe 功能的 Repository */

@Bean

public PersistentTokenRepository persistentTokenRepository() {

// 连接数据库的实现类,还有一个实现类时存内存的InMemoryTokenRepositoryImpl

JdbcTokenRepositoryImpl tokenRepository = new JdbcTokenRepositoryImpl();

// 配置数据源

tokenRepository.setDataSource(dataSource);

// 在启动数据库时创建存储token的表

//tokenRepository.setCreateTableOnStartup(true);

return tokenRepository;

}

/******************************remember me***********************************/

@Override

@Bean

public AuthenticationManager authenticationManagerBean() throws Exception {

return super.authenticationManagerBean();

}

/** 放行静态资源 */

@Override

public void configure(WebSecurity web) throws Exception {

web.ignoring().antMatchers("/swagger-ui.html");

web.ignoring().antMatchers("/swagger-resources/**");

web.ignoring().antMatchers("/v2/api-docs");

web.ignoring().antMatchers("/configuration/security");

web.ignoring().antMatchers("/configuration/ui");

//web.ignoring().antMatchers("/++webjars++ /++springfox++ -swagger-++ui++/**");

/************************************************************

* ++servlet++ 3.0 以上的版本支持直接访问 jar 包里面的资源文件。

* 访问方式:将 jar 包里的 META-INF/resources 目录看成根目录,

* 则这个目录下的文件都可以直接访问

* swagger-bootstrap-++ui++-1.9.6.jar资源放行*/

web.ignoring().antMatchers("/webjars/**");

web.ignoring().antMatchers("/doc.html");

web.ignoring().antMatchers("/loginSuccess");

web.ignoring().antMatchers("/loginSuccess.html");

web.ignoring().antMatchers("/loginError");

web.ignoring().antMatchers("/lock");

web.ignoring().antMatchers("/assets/**");

//路由跳转允许

web.ignoring().antMatchers("/api/**");

web.ignoring().antMatchers("/websocket/**"); //农村饮水安全

web.ignoring().antMatchers("/Serialnum/EnSure"); //序列号确认

web.ignoring().antMatchers("/lock"); //锁屏页面

web.ignoring().antMatchers("/login.html"); //序列号确认

//放行consul安全监测接口

web.ignoring().antMatchers("/v1");

web.ignoring().antMatchers("/actuator/health");

//web.ignoring().antMatchers("/loginError.html");

web.ignoring().antMatchers("/favicon.ico");

//放行单点登录

web.ignoring().antMatchers("/index");

web.ignoring().antMatchers("/index/**");

web.ignoring().antMatchers("/index/oauth_callback");

//web.ignoring().antMatchers("/myLogout");

}

@Override

protected void configure(HttpSecurity http) throws Exception {

http

.requestMatchers().antMatchers(HttpMethod.OPTIONS,"/login", "/oauth/authorize", "/oauth/token")

.and()

.cors()//开启跨域

.and()

.csrf().disable()

.requestMatchers()

.antMatchers("/login")

.antMatchers(HttpMethod.OPTIONS)

.antMatchers("/oauth/authorize")

.and()

.rememberMe()//记住我相关配置

.tokenRepository(persistentTokenRepository())

.tokenValiditySeconds(60*60*10)

//.antMatchers("/++oauth++/token")

.and()

.authorizeRequests()

.anyRequest().authenticated()

.and()

.formLogin()

.loginPage("/login")

// 自定义登录页面,这里配置了 loginPage, 就会通过 LoginController 的 login 接口加载登录页面

// 登入成功后,跳转至指定页面

//.defaultSuccessUrl("/loginSuccess")

.failureUrl("/loginError").permitAll()

.and()

.logout()

.logoutUrl("/logout")//虚拟的登出地址

.logoutSuccessHandler(logoutSuccessHandler);

http.formLogin().failureHandler(customAuthenticationFailureHandler);

}

@Bean

@Override

public UserDetailsService userDetailsService(){

return myUserDetailServiceImpl;

//return userAuthenticationProvider;

}

@Override

protected void configure(AuthenticationManagerBuilder auth) throws Exception {

// 配置用户名密码,这里采用内存方式,生产环境需要从数据库获取

// auth.inMemoryAuthentication()

// .withUser("++admin++")

// .password(passwordEncoder().encode("123"))

// .roles("USER");

// 使用自定义认证与授权

auth.userDetailsService(userDetailsService());

}

@Bean

public BCryptPasswordEncoder passwordEncoder(){

return new BCryptPasswordEncoder();

}

}

4、用户登录服务接口UserDetailsService

Spring Security中进行身份验证的是AuthenticationManager接口,ProviderManager是它的一个默认实现,但它并不用来处理身份认证,而是委托给配置好的AuthenticationProvider,每个AuthenticationProvider会轮流检查身份认证。检查后或者返回Authentication对象或者抛出异常。验证身份就是加载响应的UserDetails,看看是否和用户输入的账号、密码、权限等信息匹配。UserDetails中需要重定义loadUserByUsername()函数。

详细代码如下:

@Component

public class MyUserDetailServiceImpl implements UserDetailsService {

private Logger logger = LoggerFactory.getLogger(this.getClass());

@Autowired

private SysUserService sysUserService;

@Autowired

private SysUserMapper sysUserMapper;

/**

* @param username

* @return

* @throws UsernameNotFoundException

*/

@Override

public UserDetails loadUserByUsername(String username) {

//1.根据用户名去数据库去查询用户信息获取加密后的密码

SysUser sysUser = sysUserMapper.findByName(username);

if(sysUser==null) {

logger.info("-------------未查询到用户名:" + username);

throw new UsernameNotFoundException("Invalid username or password.");

}else {

Boolean stateStr=sysUser.getAccountNonLocked();//锁定状态

if(stateStr==false){//用户被锁定

long lockTime = sysUser.getLockTime();

long sysTime = System.currentTimeMillis();

long time = sysTime - lockTime;

if(time>=10*60*1000) { //时间超过10分钟,解锁账户

sysUserMapper.updateUNLockedByUserId(username);

sysUserMapper.updatelockTimeByUserId(username, 0L);

sysUserMapper.updatenLockByUserId(username, 0L);

stateStr=true;

}else {

throw new InternalAuthenticationServiceException("该账号已被锁定,请联系管理员!");

}

}

Set<String> permissions = sysUserService.findPermissions(username);

List<GrantedAuthority> grantedAuthorities = permissions.stream().map(GrantedAuthorityImpl::new).collect(Collectors.toList());

return new User(username,

//encryptedPassWord,

sysUser.getPassword(),

true,

true,

true,

stateStr, //锁定状态

grantedAuthorities);

}

}

}

5、授权失败接口SimpleUrlAuthenticationFailureHandler

在Spring Security Web框架内部,缺省使用的认证错误处理策略是AuthenticationFailureHandler的实现类SimpleUrlAuthenticationFailureHandler。它由配置指定一个defaultFailureUrl,表示认证失败时缺省使用的重定向地址。一旦认证失败,它的方法onAuthenticationFailure被调用时,它就会将用户重定向到该地址。如果该属性没有设置,它会向客户端返回一个401状态码。另外SimpleUrlAuthenticationFailureHandler还有一个属性useForward,如果该属性设置为true,页面跳转将不再是重定向(redirect)机制,取而代之的是转发(forward)机制。

该处只需要重定义onAuthenticationFailure()详细代码如下:

//3、将登录失败提示到前端展示

@Component

public class CustomAuthenticationFailureHandler extends SimpleUrlAuthenticationFailureHandler {

private Logger logger = LoggerFactory.getLogger(this.getClass());

private static ObjectMapper ++objectMapper++ = new ObjectMapper();

@Autowired

private ThymeleafViewResolver ++viewResolver++;

private RedirectStrategy ++redirectStrategy++ = new DefaultRedirectStrategy();

@Override

public void onAuthenticationFailure(HttpServletRequest request, HttpServletResponse response, AuthenticationException exception) throws IOException, ServletException {

//此处自行定义授权失败功能。

}

}

springboot集成Oauth2.0授权包,接口文件配置详解到此就结束了,学友在实际操作过程中遇到问题,欢迎联系博主。

下文讲解spring cloud的配置与应用,实现服务注册机制。

相关推荐
大白菜和MySQL1 分钟前
tomcat服务搭建部署ujcms网站
java·linux·运维·服务器·tomcat
一只特立独行的猪6112 小时前
Java面试——集合篇
java·开发语言·面试
吃面不喝汤662 小时前
Flask + Swagger 完整指南:从安装到配置和注释
后端·python·flask
讓丄帝愛伱3 小时前
spring boot启动报错:so that it conforms to the canonical names requirements
java·spring boot·后端
weixin_586062023 小时前
Spring Boot 入门指南
java·spring boot·后端
雷袭月启3 小时前
SpringBoot实现OAuth客户端
spring boot·oauth客户端
Dola_Pan6 小时前
Linux文件IO(二)-文件操作使用详解
java·linux·服务器
wang_book6 小时前
Gitlab学习(007 gitlab项目操作)
java·运维·git·学习·spring·gitlab
蜗牛^^O^7 小时前
Docker和K8S
java·docker·kubernetes
从心归零7 小时前
sshj使用代理连接服务器
java·服务器·sshj