SpringSecurity+jwt+Vuetify 做一个有动态权限的前后端分离的小案例

一个前后端分离的动态路由小demo,后端使用 SpringSecurity+jjwt 构建安全验证模块,前端使用vue+vuetify+vueRouter+Vuex等等搭建。 一个简单的小例子,帮助你快速了解前后端分离该怎么搭建,主要是后端怎么使用 Spring-Security+jwt 来处理返回给前端的json还有对token的校验,还有前端的动态路由,动态菜单的简单实现。

在线预览👈

Github地址👈

20201206111525

概要

该项目是一个很简单的前后端分离项目, 后台使用了SpringSecurity,前端使用了Vuetify,做了一个简单的动态路由,权限控制。(或者说是简陋版吧 哈哈哈 后面要重新设计一个比较完整的并补上啦!)😝

后端

主要是为了学习前后端分离的情况,SpringSecurity的使用 ,jdk11哦!😄

前端

新框架Vuetify的学习(主要之前误以为elementui不更新了,,想着学个能一直用的吧🙃),还有动态路由,权限的简单例子

启动

本地跑起来,在vue文件夹中,执行

  1. npm insall
  2. npm run serve

SpringSecurity也直接跑起来就行了。

如果后端端口不是8080,需要修改下vue.config.js文件,将端口改为对应的就行😄

结束语

额 后面会想做一个好看的,完整的各种各样的例子出来,然后学些的一些新技术(主要是后端的,运用到里面去😝) ,有兴趣可以关注下博主的公众号 (虽然现在没有啥东西,但是。。。慢慢积累就有了!🤗)谢谢!

wechat

  • 1
    点赞
  • 0
    收藏
    觉得还不错? 一键收藏
  • 0
    评论
好的,下面是一个基于Spring BootSpring SecurityJWT权限管理系统的代码框架。 1. 首先,引入相关的依赖: ```xml <dependencies> <dependency> <groupId>org.springframework.boot</groupId> <artifactId>spring-boot-starter-web</artifactId> </dependency> <dependency> <groupId>org.springframework.boot</groupId> <artifactId>spring-boot-starter-security</artifactId> </dependency> <dependency> <groupId>io.jsonwebtoken</groupId> <artifactId>jjwt</artifactId> <version>0.9.1</version> </dependency> </dependencies> ``` 2. 编写JWT工具类: ```java @Component public class JwtUtils { private static final String SECRET_KEY = "my_secret_key"; private static final long EXPIRATION_TIME = 864_000_000L; public String generateToken(String username) { Date expirationDate = new Date(System.currentTimeMillis() + EXPIRATION_TIME); String token = Jwts.builder() .setSubject(username) .setExpiration(expirationDate) .signWith(SignatureAlgorithm.HS512, SECRET_KEY) .compact(); return token; } public String getUsernameFromToken(String token) { try { Claims claims = Jwts.parser() .setSigningKey(SECRET_KEY) .parseClaimsJws(token) .getBody(); return claims.getSubject(); } catch (Exception e) { return null; } } public boolean isValidToken(String token) { try { Jwts.parser().setSigningKey(SECRET_KEY).parseClaimsJws(token); return true; } catch (Exception e) { return false; } } } ``` 3. 编写自定义UserDetailsService: ```java @Service public class CustomUserDetailsService implements UserDetailsService { @Autowired private UserRepository userRepository; @Override public UserDetails loadUserByUsername(String username) throws UsernameNotFoundException { User user = userRepository.findByUsername(username); if (user == null) { throw new UsernameNotFoundException("User not found with username: " + username); } return new org.springframework.security.core.userdetails.User( user.getUsername(), user.getPassword(), new ArrayList<>() ); } } ``` 4. 配置Spring Security: ```java @Configuration @EnableWebSecurity public class SecurityConfig extends WebSecurityConfigurerAdapter { @Autowired private CustomUserDetailsService userDetailsService; @Autowired private JwtUtils jwtUtils; @Autowired private UnauthorizedHandler unauthorizedHandler; @Override protected void configure(HttpSecurity http) throws Exception { http.csrf().disable().authorizeRequests() .antMatchers(HttpMethod.POST, "/users/login").permitAll() .anyRequest().authenticated() .and() .exceptionHandling() .authenticationEntryPoint(unauthorizedHandler) .and() .sessionManagement() .sessionCreationPolicy(SessionCreationPolicy.STATELESS); http.addFilterBefore(jwtAuthenticationFilter(), UsernamePasswordAuthenticationFilter.class); } @Override public void configure(AuthenticationManagerBuilder auth) throws Exception { auth.userDetailsService(userDetailsService).passwordEncoder(passwordEncoder()); } @Bean public PasswordEncoder passwordEncoder() { return new BCryptPasswordEncoder(); } @Bean public JwtAuthenticationFilter jwtAuthenticationFilter() { return new JwtAuthenticationFilter(jwtUtils, userDetailsService); } } ``` 在这个配置中,我们使用了JwtAuthenticationFilter来处理JWT的校验和授权。UnauthorizedHandler则用来处理未授权的情况。 5. 编写JwtAuthenticationFilter: ```java public class JwtAuthenticationFilter extends OncePerRequestFilter { @Autowired private JwtUtils jwtUtils; @Autowired private CustomUserDetailsService userDetailsService; @Override protected void doFilterInternal(HttpServletRequest request, HttpServletResponse response, FilterChain chain) throws ServletException, IOException { String authorizationHeader = request.getHeader("Authorization"); String username = null; String token = null; if (authorizationHeader != null && authorizationHeader.startsWith("Bearer ")) { token = authorizationHeader.substring(7); username = jwtUtils.getUsernameFromToken(token); } if (username != null && SecurityContextHolder.getContext().getAuthentication() == null) { UserDetails userDetails = userDetailsService.loadUserByUsername(username); if (jwtUtils.isValidToken(token)) { UsernamePasswordAuthenticationToken authentication = new UsernamePasswordAuthenticationToken( userDetails, null, userDetails.getAuthorities()); authentication.setDetails(new WebAuthenticationDetailsSource().buildDetails(request)); SecurityContextHolder.getContext().setAuthentication(authentication); } } chain.doFilter(request, response); } } ``` 6. 编写UnauthorizedHandler: ```java @Component public class UnauthorizedHandler implements AuthenticationEntryPoint { @Override public void commence(HttpServletRequest request, HttpServletResponse response, AuthenticationException authException) throws IOException, ServletException { response.sendError(HttpServletResponse.SC_UNAUTHORIZED, "Unauthorized"); } } ``` 7. 编写UserController: ```java @RestController @RequestMapping("/users") public class UserController { @Autowired private UserRepository userRepository; @Autowired private JwtUtils jwtUtils; @PostMapping("/signup") public ResponseEntity<?> signUp(@RequestBody User user) { User existingUser = userRepository.findByUsername(user.getUsername()); if (existingUser != null) { return new ResponseEntity<>("Username already exists", HttpStatus.BAD_REQUEST); } user.setPassword(new BCryptPasswordEncoder().encode(user.getPassword())); userRepository.save(user); return ResponseEntity.ok("User created successfully"); } @PostMapping("/login") public ResponseEntity<?> login(@RequestBody User user) { try { Authentication authentication = SecurityContextHolder.getContext().getAuthentication(); if (authentication != null && authentication.isAuthenticated()) { return ResponseEntity.ok("User already authenticated"); } authenticationManager.authenticate(new UsernamePasswordAuthenticationToken( user.getUsername(), user.getPassword())); final String token = jwtUtils.generateToken(user.getUsername()); return ResponseEntity.ok(token); } catch (BadCredentialsException e) { return new ResponseEntity<>("Invalid username/password supplied", HttpStatus.UNAUTHORIZED); } } } ``` 这里的User类是一个简单的POJO,包含了username和password字段。 现在,就可以使用这个权限管理系统了。在前端请求中,需要在Header中传递一个Authorization的键值对,键是Bearer加上空格,值是JWT Token。这样就可以在Spring Security中进行授权了。
评论
添加红包

请填写红包祝福语或标题

红包个数最小为10个

红包金额最低5元

当前余额3.43前往充值 >
需支付:10.00
成就一亿技术人!
领取后你会自动成为博主和红包主的粉丝 规则
hope_wisdom
发出的红包
实付
使用余额支付
点击重新获取
扫码支付
钱包余额 0

抵扣说明:

1.余额是钱包充值的虚拟货币,按照1:1的比例进行支付金额的抵扣。
2.余额无法直接购买下载,可以购买VIP、付费专栏及课程。

余额充值