security基于数据库的认证(二)

x33g5p2x  于2022-03-02 转载在 其他  
字(11.7k)|赞(0)|评价(0)|浏览(259)

@TOC
前言:在security初体验(一)里,用户名和密码的认证都是基于内存级别的,本章主要是说security如何从db里取用户名和密码来验证的。

1.准备的sql

  1. DROP TABLE IF EXISTS `user`;
  2. CREATE TABLE `user` (
  3. `id` int(11) NOT NULL AUTO_INCREMENT,
  4. `username` varchar(100) CHARACTER SET utf8mb4 COLLATE utf8mb4_0900_ai_ci NULL DEFAULT NULL,
  5. `password` varchar(100) CHARACTER SET utf8mb4 COLLATE utf8mb4_0900_ai_ci NULL DEFAULT NULL,
  6. `enabled` tinyint(1) NULL DEFAULT NULL,
  7. `locked` tinyint(1) NULL DEFAULT NULL,
  8. PRIMARY KEY (`id`) USING BTREE
  9. ) ENGINE = InnoDB AUTO_INCREMENT = 4 CHARACTER SET = utf8mb4 COLLATE = utf8mb4_0900_ai_ci ROW_FORMAT = Dynamic;
  10. INSERT INTO `user` VALUES (1, 'root', '$2a$10$O8G0X/sUPAA76MV7U3BwY.3Uo8/QMBcqK678Rwkoz.fowbce.CLtO', 1, 0);
  11. INSERT INTO `user` VALUES (2, 'admin', '$2a$10$O8G0X/sUPAA76MV7U3BwY.3Uo8/QMBcqK678Rwkoz.fowbce.CLtO', 1, 0);
  12. INSERT INTO `user` VALUES (3, 'tom', '$2a$10$O8G0X/sUPAA76MV7U3BwY.3Uo8/QMBcqK678Rwkoz.fowbce.CLtO', 1, 0);
  13. DROP TABLE IF EXISTS `role`;
  14. CREATE TABLE `role` (
  15. `id` int(11) NOT NULL AUTO_INCREMENT,
  16. `name` varchar(100) CHARACTER SET utf8mb4 COLLATE utf8mb4_0900_ai_ci NULL DEFAULT NULL,
  17. `description` varchar(100) CHARACTER SET utf8mb4 COLLATE utf8mb4_0900_ai_ci NULL DEFAULT NULL,
  18. PRIMARY KEY (`id`) USING BTREE
  19. ) ENGINE = InnoDB AUTO_INCREMENT = 4 CHARACTER SET = utf8mb4 COLLATE = utf8mb4_0900_ai_ci ROW_FORMAT = Dynamic;
  20. INSERT INTO `role` VALUES (1, 'db', '数据库管理员');
  21. INSERT INTO `role` VALUES (2, 'admin', '系统管理员');
  22. INSERT INTO `role` VALUES (3, 'user', '用户');
  23. DROP TABLE IF EXISTS `user_role_ref`;
  24. CREATE TABLE `user_role_ref` (
  25. `id` int(11) NOT NULL AUTO_INCREMENT,
  26. `user_id` int(11) NULL DEFAULT NULL,
  27. `role_id` int(11) NULL DEFAULT NULL,
  28. PRIMARY KEY (`id`) USING BTREE
  29. ) ENGINE = InnoDB AUTO_INCREMENT = 5 CHARACTER SET = utf8mb4 COLLATE = utf8mb4_0900_ai_ci ROW_FORMAT = Dynamic;
  30. INSERT INTO `user_role_ref` VALUES (1, 1, 1);
  31. INSERT INTO `user_role_ref` VALUES (2, 1, 2);
  32. INSERT INTO `user_role_ref` VALUES (3, 2, 2);
  33. INSERT INTO `user_role_ref` VALUES (4, 3, 3);

2.pom.xml

  1. <?xml version="1.0" encoding="UTF-8"?>
  2. <project xmlns="http://maven.apache.org/POM/4.0.0" xmlns:xsi="http://www.w3.org/2001/XMLSchema-instance"
  3. xsi:schemaLocation="http://maven.apache.org/POM/4.0.0 https://maven.apache.org/xsd/maven-4.0.0.xsd">
  4. <modelVersion>4.0.0</modelVersion>
  5. <parent>
  6. <groupId>org.springframework.boot</groupId>
  7. <artifactId>spring-boot-starter-parent</artifactId>
  8. <version>2.6.4</version>
  9. <relativePath/> <!-- lookup parent from repository -->
  10. </parent>
  11. <groupId>com.yl</groupId>
  12. <artifactId>security-db</artifactId>
  13. <version>0.0.1-SNAPSHOT</version>
  14. <name>security-db</name>
  15. <description>Demo project for Spring Boot</description>
  16. <properties>
  17. <java.version>11</java.version>
  18. </properties>
  19. <dependencies>
  20. <dependency>
  21. <groupId>org.springframework.boot</groupId>
  22. <artifactId>spring-boot-starter-security</artifactId>
  23. </dependency>
  24. <dependency>
  25. <groupId>org.springframework.boot</groupId>
  26. <artifactId>spring-boot-starter-web</artifactId>
  27. </dependency>
  28. <dependency>
  29. <groupId>org.mybatis.spring.boot</groupId>
  30. <artifactId>mybatis-spring-boot-starter</artifactId>
  31. <version>2.2.2</version>
  32. </dependency>
  33. <dependency>
  34. <groupId>com.alibaba</groupId>
  35. <artifactId>druid-spring-boot-starter</artifactId>
  36. <version>1.1.10</version>
  37. </dependency>
  38. <dependency>
  39. <groupId>mysql</groupId>
  40. <artifactId>mysql-connector-java</artifactId>
  41. <scope>runtime</scope>
  42. </dependency>
  43. <dependency>
  44. <groupId>org.springframework.boot</groupId>
  45. <artifactId>spring-boot-starter-test</artifactId>
  46. <scope>test</scope>
  47. </dependency>
  48. <dependency>
  49. <groupId>org.springframework.security</groupId>
  50. <artifactId>spring-security-test</artifactId>
  51. <scope>test</scope>
  52. </dependency>
  53. </dependencies>
  54. <build>
  55. <resources>
  56. <resource>
  57. <directory>src/main/java</directory>
  58. <includes>
  59. <include>**/*.xml</include>
  60. </includes>
  61. </resource>
  62. <resource>
  63. <directory>src/min/resources</directory>
  64. </resource>
  65. </resources>
  66. <plugins>
  67. <plugin>
  68. <groupId>org.springframework.boot</groupId>
  69. <artifactId>spring-boot-maven-plugin</artifactId>
  70. </plugin>
  71. </plugins>
  72. </build>
  73. </project>

3.application.properties

  1. spring.datasource.url=jdbc:mysql://localhost:3306/demo?useUnicode=true&characterEncoding=utf8&useSSL=false&serverTimezone=Asia/Shanghai
  2. spring.datasource.type=com.alibaba.druid.pool.DruidDataSource
  3. spring.datasource.username=root
  4. spring.datasource.password=root

4.securityconfig

  1. package com.yl.securitydb.config;
  2. import com.yl.securitydb.service.UserService;
  3. import org.springframework.beans.factory.annotation.Autowired;
  4. import org.springframework.context.annotation.Bean;
  5. import org.springframework.context.annotation.Configuration;
  6. import org.springframework.security.access.hierarchicalroles.RoleHierarchy;
  7. import org.springframework.security.access.hierarchicalroles.RoleHierarchyImpl;
  8. import org.springframework.security.config.annotation.authentication.builders.AuthenticationManagerBuilder;
  9. import org.springframework.security.config.annotation.web.builders.HttpSecurity;
  10. import org.springframework.security.config.annotation.web.configuration.WebSecurityConfigurerAdapter;
  11. import org.springframework.security.crypto.bcrypt.BCryptPasswordEncoder;
  12. @Configuration
  13. public class SecurityConfig extends WebSecurityConfigurerAdapter {
  14. @Autowired
  15. UserService userService;
  16. @Bean
  17. BCryptPasswordEncoder bCryptPasswordEncoder() {
  18. return new BCryptPasswordEncoder();
  19. }
  20. // 配置角色继承关系,即dba角色拥有admin角色的权限,而admin角色拥有user角色的权限,所以dba角色也拥有了user角色的权限
  21. // @Bean
  22. // RoleHierarchy roleHierarchy() {
  23. // RoleHierarchyImpl roleHierarchy = new RoleHierarchyImpl();
  24. // String hierarchy = "ROLE_db > ROLE_admin \n ROLE_admin > ROLE_user";
  25. // roleHierarchy.setHierarchy(hierarchy);
  26. // return roleHierarchy;
  27. // }
  28. @Override
  29. protected void configure(AuthenticationManagerBuilder auth) throws Exception {
  30. // 基于数据库的用户名和密码认证
  31. auth.userDetailsService(userService);
  32. }
  33. @Override
  34. protected void configure(HttpSecurity http) throws Exception {
  35. http.authorizeRequests()
  36. .antMatchers("/db/**").hasRole("db")
  37. .antMatchers("/admin/**").hasRole("admin")
  38. .antMatchers("/user/**").hasRole("user")
  39. .anyRequest().authenticated()
  40. .and()
  41. .formLogin()
  42. .permitAll()
  43. .and()
  44. .csrf().disable();
  45. }
  46. }

5.实体类

  1. package com.yl.securitydb.domain;
  2. import org.springframework.security.core.GrantedAuthority;
  3. import org.springframework.security.core.authority.SimpleGrantedAuthority;
  4. import org.springframework.security.core.userdetails.UserDetails;
  5. import java.util.ArrayList;
  6. import java.util.Collection;
  7. import java.util.List;
  8. public class User implements UserDetails {
  9. private Integer id;
  10. private String username;
  11. private String password;
  12. private Boolean enabled;
  13. private Boolean locked;
  14. private List<Role> roles;
  15. public Integer getId() {
  16. return id;
  17. }
  18. public void setId(Integer id) {
  19. this.id = id;
  20. }
  21. public void setUsername(String username) {
  22. this.username = username;
  23. }
  24. @Override
  25. public Collection<? extends GrantedAuthority> getAuthorities() {
  26. List<SimpleGrantedAuthority> list = new ArrayList<>();
  27. for (Role role : roles) {
  28. list.add(new SimpleGrantedAuthority("ROLE_" + role.getName()));
  29. }
  30. return list;
  31. }
  32. @Override
  33. public String getPassword() {
  34. return password;
  35. }
  36. @Override
  37. public String getUsername() {
  38. return username;
  39. }
  40. // 账户是否未过期
  41. @Override
  42. public boolean isAccountNonExpired() {
  43. return true;
  44. }
  45. // 账户是否未锁定
  46. @Override
  47. public boolean isAccountNonLocked() {
  48. return !locked;
  49. }
  50. // 凭证是否未过期
  51. @Override
  52. public boolean isCredentialsNonExpired() {
  53. return true;
  54. }
  55. @Override
  56. public boolean isEnabled() {
  57. return enabled;
  58. }
  59. public void setPassword(String password) {
  60. this.password = password;
  61. }
  62. public void setEnabled(Boolean enabled) {
  63. this.enabled = enabled;
  64. }
  65. public void setLocked(Boolean locked) {
  66. this.locked = locked;
  67. }
  68. public List<Role> getRoles() {
  69. return roles;
  70. }
  71. public void setRoles(List<Role> roles) {
  72. this.roles = roles;
  73. }
  74. @Override
  75. public String toString() {
  76. return "User{" +
  77. "id=" + id +
  78. ", username='" + username + '\'' +
  79. ", password='" + password + '\'' +
  80. ", enabled=" + enabled +
  81. ", locked=" + locked +
  82. '}';
  83. }
  84. }
  1. package com.yl.securitydb.domain;
  2. import java.io.Serializable;
  3. public class Role implements Serializable {
  4. private Integer id;
  5. private String name;
  6. private String description;
  7. public Integer getId() {
  8. return id;
  9. }
  10. public void setId(Integer id) {
  11. this.id = id;
  12. }
  13. public String getName() {
  14. return name;
  15. }
  16. public void setName(String name) {
  17. this.name = name;
  18. }
  19. public String getDescription() {
  20. return description;
  21. }
  22. public void setDescription(String description) {
  23. this.description = description;
  24. }
  25. @Override
  26. public String toString() {
  27. return "Role{" +
  28. "id=" + id +
  29. ", name='" + name + '\'' +
  30. ", description='" + description + '\'' +
  31. '}';
  32. }
  33. }
  1. package com.yl.securitydb.domain;
  2. import java.io.Serializable;
  3. public class UserRoleRef implements Serializable {
  4. private Integer id;
  5. private Integer userId;
  6. private Integer roleId;
  7. public Integer getId() {
  8. return id;
  9. }
  10. public void setId(Integer id) {
  11. this.id = id;
  12. }
  13. public Integer getUserId() {
  14. return userId;
  15. }
  16. public void setUserId(Integer userId) {
  17. this.userId = userId;
  18. }
  19. public Integer getRoleId() {
  20. return roleId;
  21. }
  22. public void setRoleId(Integer roleId) {
  23. this.roleId = roleId;
  24. }
  25. @Override
  26. public String toString() {
  27. return "UserRoleRef{" +
  28. "id=" + id +
  29. ", userId=" + userId +
  30. ", roleId=" + roleId +
  31. '}';
  32. }
  33. }

6.mapper

  1. package com.yl.securitydb.mapper;
  2. import com.yl.securitydb.domain.Role;
  3. import com.yl.securitydb.domain.User;
  4. import org.apache.ibatis.annotations.Mapper;
  5. import java.util.List;
  6. @Mapper
  7. public interface UserMapper {
  8. User loadUserByUsername(String username);
  9. List<Role> getRolesByUserId(Integer userId);
  10. }

7.mapper.xml

  1. <?xml version="1.0" encoding="UTF-8"?>
  2. <!DOCTYPE mapper PUBLIC "-//mybatis.org//DTD Mapper 3.0//EN" "http://mybatis.org/dtd/mybatis-3-mapper.dtd">
  3. <mapper namespace="com.yl.securitydb.mapper.UserMapper">
  4. <select id="loadUserByUsername" resultType="com.yl.securitydb.domain.User">
  5. select * from user where username = #{username}
  6. </select>
  7. <select id="getRolesByUserId" resultType="com.yl.securitydb.domain.Role">
  8. select * from role where id in (select role_id from user_role_ref where user_id = #{userId})
  9. </select>
  10. </mapper>

8.service

  1. package com.yl.securitydb.service;
  2. import com.yl.securitydb.domain.User;
  3. import com.yl.securitydb.mapper.UserMapper;
  4. import org.springframework.beans.factory.annotation.Autowired;
  5. import org.springframework.security.core.userdetails.UserDetails;
  6. import org.springframework.security.core.userdetails.UserDetailsService;
  7. import org.springframework.security.core.userdetails.UsernameNotFoundException;
  8. import org.springframework.stereotype.Service;
  9. @Service
  10. public class UserService implements UserDetailsService {
  11. @Autowired
  12. UserMapper userMapper;
  13. @Override
  14. public UserDetails loadUserByUsername(String username) throws UsernameNotFoundException {
  15. User user = userMapper.loadUserByUsername(username);
  16. if (user == null) {
  17. throw new UsernameNotFoundException("用户名不存在");
  18. }
  19. user.setRoles(userMapper.getRolesByUserId(user.getId()));
  20. return user;
  21. }
  22. }

9.controller

  1. package com.yl.securitydb.controller;
  2. import org.springframework.web.bind.annotation.GetMapping;
  3. import org.springframework.web.bind.annotation.RestController;
  4. @RestController
  5. public class HelloController {
  6. @GetMapping("/hello")
  7. public String hello() {
  8. return "hello security";
  9. }
  10. @GetMapping("/admin/hello")
  11. public String admin() {
  12. return "hello admin";
  13. }
  14. @GetMapping("/db/hello")
  15. public String db() {
  16. return "hello db";
  17. }
  18. @GetMapping("/user/hello")
  19. public String user() {
  20. return "hello user";
  21. }
  22. }

10.测试

1.用admin账号登录,只能访问/admin/hello接口

2.admin账号不能访问其他两个接口

11.角色继承

1.配置

2.测试
1)登录root账号发现其可以访问/user/hello,/admin/hello,/db/hello这三个接口

相关文章