Spring Security5.X 实现表单jwt认证

Spring Security 实现表单jwt认证

通过springboot 实现form 表单登录实现jwt token 认证

整合步骤

  • 添加依赖
   <dependencies>
       <dependency>
           <groupId>org.springframework.boot</groupId>
           <artifactId>spring-boot-starter-security</artifactId>
       </dependency>
       <dependency>
           <groupId>org.springframework.boot</groupId>
           <artifactId>spring-boot-starter-web</artifactId>
       </dependency>
       <dependency>
           <groupId>org.springframework.security</groupId>
           <artifactId>spring-security-test</artifactId>
           <scope>test</scope>
       </dependency>
       <dependency>
           <groupId>org.projectlombok</groupId>
           <artifactId>lombok</artifactId>
           <version>${lombok.version}</version>
       </dependency>
       <!-- 添加jwt jar -->
       <dependency>
           <groupId>com.nimbusds</groupId>
           <artifactId>nimbus-jose-jwt</artifactId>
           <version>8.17.1</version>
       </dependency>
   </dependencies>
  • 自定义 WebSecurityConfigurerAdapter
/**
 * @author bearBoy80
 * 定义简单的form 表单登录,
 * 默认登录页面为spring security自带页面
 * @see DefaultLoginPageGeneratingFilter#generateLoginPageHtml(HttpServletRequest, boolean, boolean)
 */
@Configuration
public class SecurityJwtAuthConfig extends WebSecurityConfigurerAdapter {
    @Override
    protected void configure(HttpSecurity http) throws Exception {
        http.   //关闭crsf
                csrf().disable()
                //拦截所有请求
                .authorizeRequests().anyRequest().authenticated().and()
                //设置表单登录
                .formLogin()
                // .loginPage() 自定义登录页面
                //.failureForwardUrl() 认证失败跳转页面url
                //.successForwardUrl() 认证成功跳转页面url
                //.failureHandler() 认证失败拦截器处理,需要自己实现一个AuthenticationFailureHandler,编写自己的业务逻辑处理,
                // 比如登录失败3次,等几分钟在登录,记录登录失败日志等
                //.successHandler() 认证成功拦截器处理,需要自己实现一个AuthenticationSuccessHandler
                // 可以在这里写业务逻辑处理,比如登录成功记录日志、
                //设置登录点
                .successHandler(successHandler())
                .loginProcessingUrl("/myLogin").and()
                //无状态
                .sessionManagement().sessionCreationPolicy(SessionCreationPolicy.STATELESS)
                .and()
                .addFilterBefore(jwtTokenFilter(), UsernamePasswordAuthenticationFilter.class);
    }

    @Bean
    public AuthenticationSuccessHandler successHandler() {
        return new SuccessJwtHandler();
    }

    @Bean
    @ConditionalOnMissingBean(BearerTokenResolver.class)
    public BearerTokenResolver bearerTokenResolver() {
        return new DefaultBearerTokenResolver();
    }

    @Bean
    public JwtTokenFilter jwtTokenFilter() {
        return new JwtTokenFilter();
    }
}
  • 实现UserDetailsService
/**
 * @author bearBoy80
 * 如果想定制用户认证,需要自己实现 UserDetailService类。本例 通过 InMemoryUserDetailsManager来实现简单表单认证
 * @see UserDetailsServiceAutoConfiguration springboot默认实现
 */
@Configuration
@Log
public class UserDetailServiceConfig {

    @Bean
    public UserDetailsService users() {
        UserDetails user = User.builder()
                .username("user")
                .password("{bcrypt}$2a$10$GRLdNijSQMUvl/au9ofL.eDwmoohzzS7.rmNSJZ.0FxO/BTk76klW")
                .roles("USER")
                .build();
        UserDetails admin = User.builder()
                .username("admin")
                .password("{bcrypt}$2a$10$GRLdNijSQMUvl/au9ofL.eDwmoohzzS7.rmNSJZ.0FxO/BTk76klW")
                .roles("USER", "ADMIN")
                .build();
        return new InMemoryUserDetailsManager(user, admin);
    }
}
  • 自定义登录成功处理器 (实现token生成)
/**
 * @author bearBoy80
 * form 表单登录成功处理器--生成token
 */
public class SuccessJwtHandler implements AuthenticationSuccessHandler {

    @Autowired
    ObjectMapper objectMapper;

    @Override
    public void onAuthenticationSuccess(HttpServletRequest request, HttpServletResponse response, Authentication authentication) throws IOException, ServletException {
        User details = (User) authentication.getPrincipal();
        String token = NimbusJwtUtils.buildJWT(details);
        response.setContentType(MimeTypeUtils.APPLICATION_JSON_VALUE);
        response.getOutputStream().write(objectMapper.writeValueAsBytes(Result.data(token)));
    }

}
  • 增加JwtTokenFilter 实现 token验证处理逻辑
/**
 * @author bearBoy80
 * token 拦截
 */
public class JwtTokenFilter extends OncePerRequestFilter {

    @Autowired
    BearerTokenResolver bearerTokenResolver;

    @Autowired
    ObjectMapper objectMapper;

    @Autowired
    private UserDetailsService userDetailsService;

    @Override
    protected void doFilterInternal(HttpServletRequest request, HttpServletResponse response, FilterChain filterChain) throws ServletException, IOException {
        try {
            String token = bearerTokenResolver.resolve(request);
            if (StringUtils.hasText(token)) {
                String username = NimbusJwtUtils.vaildToken(token);
                if (username != null && SecurityContextHolder.getContext().getAuthentication() == null) {
                    //token 验证成功后,生成认证信息
                    UserDetails details = userDetailsService.loadUserByUsername(username);
                    if (details != null) {
                        UsernamePasswordAuthenticationToken authenticationToken = new UsernamePasswordAuthenticationToken
                                (details, null, details.getAuthorities());
                        SecurityContextHolder.getContext().setAuthentication(authenticationToken);
                    }
                } else {
                    response.setContentType(MimeTypeUtils.APPLICATION_JSON_VALUE);
                    response.getOutputStream().write(objectMapper.writeValueAsBytes(Result.fail("token 无效")));
                    return;
                }
            }
        } catch (JwtException ex) {
            response.setContentType(MimeTypeUtils.APPLICATION_JSON_VALUE);
            response.getOutputStream().write(objectMapper.writeValueAsBytes(Result.fail(ex.getMessage())));
            return;
        }
        filterChain.doFilter(request, response);
    }

}
  • 增加userInfo controller
/**
 * @author bearBoy
 * 获取用户认证信息
 */
@RestController
public class UserDetailController {
    @RequestMapping("/userInfo")
    public User userInfo(@AuthenticationPrincipal User user) {
        return user;
    }
}
  • 启动应用
    运行JwtAuthApplication
  • 验证
    用postman 请求localhost:8100/MyLogin,构建表单user/password账户密码登录,登录成功后,获取token 信息
    用postman 请求localhost:8100/userInfo,header 增加 “bearer: token 信息”,获取到用户认证信息

原理说明

  • form表单登录流程
    在这里插入图片描述

  • form表单认证流程

在这里插入图片描述

  • form表单jwt认证关键类

UsernamePasswordAuthenticationFilter 拦截登录请求,通过username、password 拼接UsernamePasswordAuthenticationToken,
调用ProviderManager(AuthenticationManager子类).authenticate 进行认证

ProviderManager 根据UsernamePasswordAuthenticationToken 选择DaoAuthenticationProvider.authenticate 进行认证

DaoAuthenticationProvider 类
DaoAuthenticationProvider.authenticate(Authentication authentication)实现用户密码验证,并验证用户各种状态。
认证成功后重新生成 UsernamePasswordAuthenticationToken,否则抛AuthenticationException异常

UsernamePasswordAuthenticationToken 存储用户凭证信息和权限信息

SuccessJwtHandler 生成jwt token信息

部署应用到docker

<plugin>
                    <groupId>io.fabric8</groupId>
                    <artifactId>docker-maven-plugin</artifactId>
                    <version>0.33.0</version>
                    <extensions>true</extensions>
                    <configuration>
                        <verbose>true</verbose>
                        <dockerHost>docker容器IP:2375</dockerHost>
                        <images>
                            <image>
                                <name>${project.artifactId}</name>
                                <build>
                                    <dockerFileDir>
                                        ${project.basedir}
                                    </dockerFileDir>
                                </build>
                            </image>
                        </images>
                    </configuration>
                    <executions>
                        <execution>
                            <id>build</id>
                            <phase>post-integration-test</phase>
                            <goals>
                                <goal>build</goal>
                            </goals>
                        </execution>
                    </executions>
                </plugin>
  • 添加dockerfile文件
# 基于java:8-jdk-alpine 镜像进行创建
FROM java:8-jdk-alpine
#维护人
MAINTAINER bearBoy80
#复制jar到/usr/app目录
COPY ./target/spring-form-jwt-auth-0.0.1-SNAPSHOT.jar /usr/app/
#指定镜像工作目录
WORKDIR /usr/app
#更新jar包信息
RUN sh -c 'touch spring-form-jwt-auth-0.0.1-SNAPSHOT.jar'
#暴露8010端口,实际运行镜像需要指定宿主端口 -P或者-p
EXPOSE 8010
#启动容器后启动spring-form-jwt-auth-0.0.1-SNAPSHOT.jar的应用
ENTRYPOINT ["java", "-jar", "spring-form-jwt-auth-0.0.1-SNAPSHOT.jar"]
  • 生成镜像
mvn package fabric8:build
  • 部署镜像到容器
docker run -d 镜像id -P
  • 2
    点赞
  • 1
    收藏
    觉得还不错? 一键收藏
  • 0
    评论
评论
添加红包

请填写红包祝福语或标题

红包个数最小为10个

红包金额最低5元

当前余额3.43前往充值 >
需支付:10.00
成就一亿技术人!
领取后你会自动成为博主和红包主的粉丝 规则
hope_wisdom
发出的红包
实付
使用余额支付
点击重新获取
扫码支付
钱包余额 0

抵扣说明:

1.余额是钱包充值的虚拟货币,按照1:1的比例进行支付金额的抵扣。
2.余额无法直接购买下载,可以购买VIP、付费专栏及课程。

余额充值