AOP实现加解密(一)


使用RequestBodyAdvice和ResponseAdice实现

RequestBodyAdvice

@Slf4j
@RestControllerAdvice
public class RequestAdvice implements RequestBodyAdvice {
    @Override
    public Object handleEmptyBody(Object body,
                                  HttpInputMessage inputMessage,
                                  MethodParameter parameter,
                                  Type targetType,
                                  Class<? extends HttpMessageConverter<?>> converterType) {
        return body;
    }
    @Override
    public boolean supports(MethodParameter methodParameter,
                            Type targetType,
                            Class<? extends HttpMessageConverter<?>> converterType) {
        // 当且仅当请求为POST 且带有@EncryAndDecry 注解的请求会被处理
        return methodParameter.hasParameterAnnotation(RequestBody.class) && methodParameter.hasMethodAnnotation(EncryAndDecry.class);
    }

    @SneakyThrows
    @Override
    public HttpInputMessage beforeBodyRead(HttpInputMessage inputMessage,
                                           MethodParameter parameter,
                                           Type targetType,
                                           Class<? extends HttpMessageConverter<?>> converterType) throws IOException {
        EncryAndDecry encryAndDecry = parameter.getMethodAnnotation(EncryAndDecry.class);
        // 请求解密
        if (encryAndDecry.decry()) {
            // 和前端交互时,数据格式待定,暂已{"param":"xxxx"}为准,xxx为加密后的对象
            String body = IOUtils.toString(inputMessage.getBody(),"utf-8");
            JSONObject jsonObject = JSONObject.parseObject(body);
            String param = jsonObject.getString("param");

            if (!jsonObject.containsKey("param") || Strings.isNullOrEmpty(param)) {
                throw new IOException("未获取到入参");
            } else {
                String decryStr = "";
                try {
                    log.info("开始解密:{}",jsonObject);
                    decryStr = EncryptionUtil.AesDecrypt(param);
                    if (Strings.isNullOrEmpty(decryStr)) {
                        throw new IOException("解密失败");
                    }
                    log.info("解密完成:{}", decryStr);
                } catch (Exception e) {
                    throw new IOException("解密失败");
                }

                InputStream inputStream = new ByteArrayInputStream(decryStr.getBytes());
                return new DecryptHttpInputMessage(inputMessage.getHeaders(), inputStream);
            }
        }
        return inputMessage;
    }

    @Override
    public Object afterBodyRead(Object body, HttpInputMessage inputMessage, MethodParameter parameter, Type targetType, Class<? extends HttpMessageConverter<?>> converterType) {
        return body;
    }

    static class DecryptHttpInputMessage implements HttpInputMessage{
        HttpHeaders headers;
        InputStream body;

        public DecryptHttpInputMessage(HttpHeaders headers,InputStream body){
            this.headers = headers;
            this.body = body;
        }

        @Override
        public InputStream getBody() throws IOException {
            return body;
        }

        @Override
        public HttpHeaders getHeaders() {
            return headers;
        }
    }
}

ResponseAdice

@Slf4j
@ControllerAdvice
public class ResponseAdice implements ResponseBodyAdvice<Object> {
    @Override
    public boolean supports(MethodParameter returnType, Class<? extends HttpMessageConverter<?>> converterType) {
        return returnType.hasMethodAnnotation(EncryAndDecry.class);
    }

    @Override
    public Object beforeBodyWrite(Object body,
                                  MethodParameter returnType,
                                  MediaType selectedContentType,
                                  Class<? extends HttpMessageConverter<?>> selectedConverterType,
                                  ServerHttpRequest request,
                                  ServerHttpResponse response) {
        JSONObject jsonObject = (JSONObject) JSONObject.toJSON(body);
        EncryAndDecry encryAndDecry = returnType.getMethodAnnotation(EncryAndDecry.class);
        // 有body且启用加密时
        if (jsonObject.containsKey("body") && encryAndDecry.encry()) {
            String encyStr = "";
            try{
                log.info("开始对{}进行加密",jsonObject.getString("body"));
                encyStr = EncryptionUtil.AesEncryption(jsonObject.getString("body"));
                jsonObject.replace("body", encyStr);
            } catch (Exception e) {
                jsonObject.replace("errCode", "e9999");
                jsonObject.replace("errMsg", "加密失败");
                log.error("加密失败:{}", jsonObject);
            }
        }
        return jsonObject;
    }
}

EncryAndDecry

@Target(ElementType.METHOD)
@Retention(RetentionPolicy.RUNTIME)
public @interface EncryAndDecry {
    /**
     * 返参是否需要加密
     * @return
     */
    boolean encry() default false;

    /**
     * 入参是否需要解密
     * @return
     */
    boolean decry() default false;
}

使用方式

默认传参命名为:param

@EncryAndDecry(encry = true , decry = true)

引入依赖

		<dependency>
            <groupId>commons-io</groupId>
            <artifactId>commons-io</artifactId>
            <version>2.8.0</version>
        </dependency>

加解密方式

@Slf4j
public class EncryptionUtil {

    private static final String SECRET_KEY = "***32位字符串***";
    //偏移量字符串必须是16位 当模式是CBC的时候必须设置偏移量
    private static final String IV = "***16位***";
    private static final String ALGORITHM = "AES";
    //算法/模式/补码方式
    private static final String ALGORITHM_PROVIDER = "AES/CBC/PKCS5Padding";
    
    public static String getKey(String keyType) {
        if ("param".equals(keyType)) {
            return SECRET_KEY;
        }
        return SECRET_KEY;
    }

    /**
     * 返参加密
     * @param content
     * @return
     * @throws Exception
     */
    public static String AesEncryption(String content) throws Exception {
        return encryption(content, SECRET_KEY);
    }

    public static String encryption(String content, String key) throws Exception {
        byte[] bytes = key.getBytes("utf-8");
        String AESContent = byteToHexString(encrypt(content, bytes));
        return AESContent;
    }

    /**
     * 入参解密
     * @param content
     * @return
     * @throws Exception
     */
    public static String AesDecrypt(String content) throws Exception {
        return decrypt(content, SECRET_KEY);
    }

    public static String decrypt(String content, String key) throws Exception {
        byte[] bytes = key.getBytes("utf-8");
        String AESContent = new String(decrypt(content, bytes));
        return AESContent;
    }

    public static String byteToHexString(byte[] src) {
        StringBuilder sb = new StringBuilder();
        for (int i = 0; i < src.length; i++) {
            int v = src[i] & 0xff;
            String hv = Integer.toHexString(v);
            if (hv.length() < 2) {
                sb.append("0");
            }
            sb.append(hv);
        }
        return sb.toString();
    }

    public static byte[] encrypt(String src, byte[] key) throws NoSuchAlgorithmException, NoSuchPaddingException,
            InvalidKeyException, IllegalBlockSizeException, BadPaddingException, UnsupportedEncodingException, InvalidAlgorithmParameterException {
        SecretKey secretKey = new SecretKeySpec(key, ALGORITHM);
        IvParameterSpec ivParameterSpec = getIv();
        Cipher cipher = Cipher.getInstance(ALGORITHM_PROVIDER);
        cipher.init(Cipher.ENCRYPT_MODE, secretKey, ivParameterSpec);
        byte[] cipherBytes = cipher.doFinal(src.getBytes(Charset.forName("utf-8")));
        return cipherBytes;
    }


    public static IvParameterSpec getIv() throws UnsupportedEncodingException {
        IvParameterSpec ivParameterSpec = new IvParameterSpec(IV.getBytes("utf-8"));
        return ivParameterSpec;
    }

    public static byte[] decrypt(String src, byte[] key) throws Exception {
        SecretKey secretKey = new SecretKeySpec(key, ALGORITHM);

        IvParameterSpec ivParameterSpec = getIv();
        Cipher cipher = Cipher.getInstance(ALGORITHM_PROVIDER);
        cipher.init(Cipher.DECRYPT_MODE, secretKey, ivParameterSpec);
        byte[] hexBytes = hexStringToBytes(src);
        byte[] plainBytes = cipher.doFinal(hexBytes);
        return plainBytes;
    }

    public static byte[] hexStringToBytes(String hexString) {
        hexString = hexString.toUpperCase();
        int length = hexString.length() / 2;
        char[] hexChars = hexString.toCharArray();
        byte[] b = new byte[length];
        for (int i = 0; i < length; i++) {
            int pos = i * 2;
            b[i] = (byte) (charToByte(hexChars[pos]) << 4 | charToByte(hexChars[pos + 1]));
        }
        return b;
    }
    private static byte charToByte(char c) {
        return (byte) IV.indexOf(c);
    }
}
  • 0
    点赞
  • 3
    收藏
    觉得还不错? 一键收藏
  • 1
    评论
好的,了解了。关于您的问题,我可以提供以下思路: 1. 首先,在pom.xml中添加依赖: ```xml <dependency> <groupId>org.springframework.boot</groupId> <artifactId>spring-boot-starter-aop</artifactId> </dependency> ``` 这将允许我们使用Spring AOP框架。 2. 创建一个切面 ```java @Aspect @Component public class EncryptionAspect { @Pointcut("execution(* com.example.demo.controller.*.*(..))") public void controllerAdvice() {} @Around("controllerAdvice()") public Object encryptAndDecrypt(ProceedingJoinPoint joinPoint) throws Throwable { // 对参数进行加密解密操作 // 注意事项:加密解密等操作需要根据具体业务需求进行实现 Object[] args = joinPoint.getArgs(); if(args != null && args.length > 0) { for (Object arg : args) { //对入参进行加密 arg = encrypt(arg); } } // 执行接口方法 Object result = joinPoint.proceed(); // 对返回结果进行加密 result = encrypt(result); return result; } // 加密方法 private Object encrypt(Object obj) { // 实现加密算法 return obj; } // 解密方法 private Object decrypt(Object obj) { // 实现解密算法 return obj; } } ``` 这个切面类中有两个方法,一个是加密方法,一个是解密方法,这是具体业务需求的实现部分。此处的负责只是提供了一个示例,您需要根据实际情况进行修改。 3. 在配置文件中添加AOP自动代理 ```java @Configuration @EnableAspectJAutoProxy public class AopConfig { } ``` 然后,您的Spring Boot应用程序就会使用AOP框架对控制器中的所有方法自动应用EncryptionAspect切面。 以上是对您的问题的一些思路和示例代码,供您参考。如有疑问或需要更多帮助,请随时问我。

“相关推荐”对你有帮助么?

  • 非常没帮助
  • 没帮助
  • 一般
  • 有帮助
  • 非常有帮助
提交
评论 1
添加红包

请填写红包祝福语或标题

红包个数最小为10个

红包金额最低5元

当前余额3.43前往充值 >
需支付:10.00
成就一亿技术人!
领取后你会自动成为博主和红包主的粉丝 规则
hope_wisdom
发出的红包
实付
使用余额支付
点击重新获取
扫码支付
钱包余额 0

抵扣说明:

1.余额是钱包充值的虚拟货币,按照1:1的比例进行支付金额的抵扣。
2.余额无法直接购买下载,可以购买VIP、付费专栏及课程。

余额充值