當前位置:
首頁 > 知識 > SpringMVC + security模塊 框架整合詳解

SpringMVC + security模塊 框架整合詳解

最近整理一個二手後台管理項目,整體大體可分為 : Springmvc + mybatis + tiles + easyui + security 這幾個模塊,再用maven做管理。剛拿到手裡面東西實在太多,所以老大讓重新整一個,只挑出骨架。不可否認,架構整體規劃得還是很好的,尤其是前端界面用tiles+easyui ,開發很高效!其實,之前雖然聽說過security,但做過的項目都沒用過security,所以也算是一個新手!整合過程還是很燒腦的。

1、首先是springmvc部分,也是框架的最核心骨架部分。springmvc也是基於servlet框架完成的,所以我們都可以從web.xml入手,然後順藤摸瓜,整理出整個架構。web.xml中主要部分是放置spring的各種配置:

  1. <context-param>
  2. <param-name>contextConfigLocation</param-name>
  3. <param-value>
  4. /WEB-INF/spring/appServlet/servlet-context.xml
  5. </param-value>
  6. </context-param>

  1. <servlet>
  2. <servlet-name>appServlet</servlet-name>
  3. <servlet-class>org.springframework.web.servlet.DispatcherServlet</servlet-class>
  4. <init-param>
  5. <param-name>contextConfigLocation</param-name>
  6. <param-value>/WEB-INF/spring/appServlet/servlet-context.xml</param-value>
  7. </init-param>
  8. <load-on-startup>1</load-on-startup>
  9. <async-supported>true</async-supported>
  10. </servlet>
  11. <servlet-mapping>
  12. <servlet-name>appServlet</servlet-name>
  13. <url-pattern>/</url-pattern>
  14. </servlet-mapping>

這兩部分指定了配置文件地址和web請求地址攔截規則。需要注意的是,然後配置文件里就是常用的註解、數據源、之類的,不一而足。

2、然後是security,本文實現了自定義的用戶信息登錄認證,主要部分:spring的security主要注意幾個地方:

1)web.xml中配置security必須的過濾器,注意名字必須是springSecurityFilterChain,這是內置的過濾器;然後將過濾規則設置為/*,表示對所有請求都攔截。

2) 關於security的配置文件必須在<context-param>中加入,因為ContextLoaderListener在載入的時候就會去載入security相關的東西,而此時springmvc(servlet)模塊還沒有初始化。

二者配置如下:

  1. <context-param>
  2. <param-name>contextConfigLocation</param-name>
  3. <param-value>
  4. /WEB-INF/spring/appServlet/servlet-context.xml
  5. </param-value>
  6. </context-param>
  7. <!-- Creates the Spring Container shared by all Servlets and Filters -->
  8. <listener>
  9. <listener-class>org.springframework.web.context.ContextLoaderListener</listener-class>
  10. </listener>
  11. <!-- 用戶許可權模塊 -->
  12. <filter>
  13. <filter-name>springSecurityFilterChain</filter-name>
  14. <filter-class>org.springframework.web.filter.DelegatingFilterProxy</filter-class>
  15. </filter>
  16. <filter-mapping>
  17. <filter-name>springSecurityFilterChain</filter-name>
  18. <url-pattern>/*</url-pattern>
  19. </filter-mapping>

本文中security配置文件再servlet-context.xml中被引入,形如:

<beans:import resource="spring-security.xml"/>

3)spring-security.xml配置文件:

現在來看這個xml文件:

首先 <http>標籤部分聲明了訪問攔截規則,這是security的關鍵。在這部分,我們先聲明了一些不需要驗證的資源和訪問路徑;然後是地址攔截規則部分:該部分攔截路徑是/**,**表示可以跨目錄結構,因此此處攔截該站點所有請求(除之前聲明security=「none」的以外),然後攔截規則access="isAuthenticated()",這是SecurityExpressionRoot中的判斷是否認證過的方法之一,跟hasRole()類似,官方描述是Returns true if the user is not anonymous ,也就是用戶認證後返回true。

  1. <?xml version="1.0" encoding="UTF-8"?>
  2. <beans:beans xmlns="http://www.springframework.org/schema/security"
  3. xmlns:beans="http://www.springframework.org/schema/beans" xmlns:xsi="http://www.w3.org/2001/XMLSchema-instance"
  4. xmlns:security="http://www.springframework.org/schema/security"
  5. xsi:schemaLocation="http://www.springframework.org/schema/beans
  6. http://www.springframework.org/schema/beans/spring-beans-3.1.xsd
  7. http://www.springframework.org/schema/security
  8. http://www.springframework.org/schema/security/spring-security-3.2.xsd">
  9. <!-- For Web security -->
  10. <http pattern="/js/**" security="none"/>
  11. <http pattern="/images/**" security="none"/>
  12. <http pattern="/mgmt/**" security="none"/>
  13. <http pattern="/image_sys/**" security="none"/>
  14. <http pattern="/style/**" security="none"/>
  15. <http pattern="/view/login.jsp" security="none"/>
  16. <http pattern="/view/login/forgotPassword.jsp" security="none"/>
  17. <http pattern="/securityCodeImage.html" security="none"/>
  18. <http pattern="/checkSecurityCode.html" security="none"/>
  19. <http pattern="/admin/validateMobile.html" security="none"/>
  20. <http pattern="/verifycode/sendVerifyCode.html" security="none"/>
  21. <http pattern="/admin/resetPassword.html" security="none"/>
  22. <http use-expressions="true" entry-point-ref="authenticationProcessingFilterEntryPoint" access-denied-page="/view/403.jsp">
  23. <intercept-url pattern="/**" access="isAuthenticated()" />
  24. <remember-me />
  25. <!-- <expression-handler ref="webSecurityExpressionHandler"/> -->
  26. <custom-filter ref="loginFilter" position="FORM_LOGIN_FILTER" />
  27. <logout logout-url="/j_spring_security_logout" logout-success-url="/view/login.jsp" delete-cookies="JSESSIONID"/>
  28. </http>
  29. <!-- 未登錄的切入點 -->
  30. <beans:bean id="authenticationProcessingFilterEntryPoint" class="org.springframework.security.web.authentication.LoginUrlAuthenticationEntryPoint">
  31. <beans:property name="loginFormUrl" value="/view/login.jsp"></beans:property>
  32. </beans:bean>
  33. <!-- 登錄體系loginFilter -->
  34. <beans:bean id="loginFilter"
  35. class="com.security.AdminUsernamePasswordAuthenticationFilter">
  36. <beans:property name="filterProcessesUrl" value="/j_spring_security_check"></beans:property>
  37. <beans:property name="authenticationSuccessHandler" ref="myAuthenticationSuccessHandler"></beans:property>
  38. <beans:property name="authenticationFailureHandler" ref="myAuthenticationFailureHandler"></beans:property>
  39. <beans:property name="authenticationManager" ref="authenticationManager"></beans:property>
  40. </beans:bean>
  41. <!-- 驗證失敗顯示頁面 -->
  42. <beans:bean id="myAuthenticationFailureHandler"
  43. class="org.springframework.security.web.authentication.SimpleUrlAuthenticationFailureHandler">
  44. <beans:property name="defaultFailureUrl" value="/view/login.jsp?error=true" />
  45. </beans:bean>
  46. <!-- 驗證成功默認顯示頁面 -->
  47. <beans:bean id="myAuthenticationSuccessHandler"
  48. class="org.springframework.security.web.authentication.SavedRequestAwareAuthenticationSuccessHandler">
  49. <beans:property name="alwaysUseDefaultTargetUrl" value="true" />
  50. <!--此處可以請求登錄首頁的action地址 -->
  51. <beans:property name="defaultTargetUrl" value="/index/homepage" />
  52. </beans:bean>
  53. <!-- authentication體系 -->
  54. <authentication-manager alias="authenticationManager" erase-credentials="false">
  55. <authentication-provider ref="authenticationProvider" />
  56. </authentication-manager>
  57. <beans:bean id="authenticationProvider"
  58. class="com.security.AdminAuthenticationProvider">
  59. <beans:property name="userDetailsService" ref="userDetailsService" />
  60. </beans:bean>
  61. <beans:bean id="userDetailsService"
  62. class="com.security.AdminUserDetailsService">
  63. <beans:property name="adminService" ref="adminServiceImpl"></beans:property>
  64. </beans:bean>

</beans:beans>

然後聲明了自定義的用戶登錄的攔截器loginFilter,用於在登錄時實現security認證。spring的登錄認證模塊執行順序為:

1、UsernamePasswordAuthenticationFilter的attemptAuthentication()方法,此部分可以做用戶名密碼的判斷,正確後繼續執行;

2、接下來調用AuthenticationManager的authenticate()方法(中途具體怎麼調用此處不深究),一個Mannager對應了多個authenticationProvider,其實最終是通過調用provider的authenticate()方法來進行認證的,只要provider的supports方法返回true即可聲明該provider或可進行認證,最後將被manager調用。在authenticate()方法中,調用UserDetails的loadUserByUserName()方法來載入登錄用戶信息,包括許可權信息,最後封裝成AbstractAuthenticationToken,這個對象就是security模塊認證後的用戶完整信息。

自定義認證主要類如下:

  1. /**
  2. * 用戶登錄驗證步驟一:attemptAutentication()
  3. */
  4. public class AdminUsernamePasswordAuthenticationFilter extends UsernamePasswordAuthenticationFilter {
  5. public static final String VALIDATE_CODE = "validateCode";
  6. public static final String USERNAME = "j_username";
  7. public static final String PASSWORD = "j_password";
  8. public static final String EMPLOYEENO = "j_employeeNo";
  9. @Resource
  10. private AdminService adminService;
  11. @Override
  12. public Authentication attemptAuthentication(HttpServletRequest request, HttpServletResponse response)
  13. throws AuthenticationException {
  14. if (!request.getMethod().equals("POST")) {
  15. throw new AuthenticationServiceException("Authentication method not supported: " + request.getMethod());
  16. }
  17. // 判斷用戶信息
  18. // UsernamePasswordAuthenticationToken實現 Authentication
  19. UsernamePasswordAuthenticationToken authRequest = new UsernamePasswordAuthenticationToken(
  20. adminModel.getAdminId(), password);
  21. // 允許子類設置詳細屬性
  22. setDetails(request, authRequest);
  23. // 運行UserDetailsService的loadUserByUsername 再次封裝Authentication
  24. return this.getAuthenticationManager().authenticate(authRequest);
  25. }
  26. @Override
  27. protected String obtainUsername(HttpServletRequest request) {
  28. Object obj = request.getParameter(USERNAME);
  29. return null == obj ? "" : obj.toString();
  30. }
  31. @Override
  32. protected String obtainPassword(HttpServletRequest request) {
  33. Object obj = request.getParameter(PASSWORD);
  34. return null == obj ? "" : obj.toString();
  35. }
  36. }
  1. /**
  2. * <span stylex="font-family: Arial, Helvetica, sans-serif;">用戶登錄驗證步驟二:</span><span stylex="font-family: Arial, Helvetica, sans-serif;">authenticate</span><span stylex="font-family: Arial, Helvetica, sans-serif;">()</span><span stylex="font-family: Arial, Helvetica, sans-serif;">
  3. </span> */
  4. public class AdminAuthenticationProvider implements AuthenticationProvider {
  5. protected Logger logger = LoggerFactory.getLogger(this.getClass());
  6. private UserDetailsService userDetailsService = null;
  7. public AdminAuthenticationProvider() {
  8. super();
  9. }
  10. /**
  11. * @param userDetailsService
  12. */
  13. public AdminAuthenticationProvider(UserDetailsService userDetailsService) {
  14. super();
  15. this.userDetailsService = userDetailsService;
  16. }
  17. public UserDetailsService getUserDetailsService() {
  18. return userDetailsService;
  19. }
  20. public void setUserDetailsService(UserDetailsService userDetailsService) {
  21. this.userDetailsService = userDetailsService;
  22. }
  23. /**
  24. * provider的authenticate()方法,用於登錄驗證
  25. */
  26. @SuppressWarnings("unchecked")
  27. public Authentication authenticate(Authentication authentication) throws AuthenticationException {
  28. // 1. Check username and password
  29. try {
  30. doLogin(authentication);
  31. } catch (Exception e) {
  32. if (e instanceof AuthenticationException) {
  33. throw (AuthenticationException) e;
  34. }
  35. logger.error("failure to doLogin", e);
  36. }
  37. // 2. Get UserDetails
  38. UserDetails userDetails = null;
  39. try {
  40. userDetails = this.userDetailsService.loadUserByUsername(authentication.getName());
  41. } catch (Exception e) {
  42. if (e instanceof AuthenticationException) {
  43. throw (AuthenticationException) e;
  44. }
  45. logger.error("failure to get user detail", e);
  46. }
  47. // 3. Check and get all of admin roles and contexts.
  48. Collection<GrantedAuthority> authorities = (Collection<GrantedAuthority>) userDetails.getAuthorities();
  49. if (authorities != null && !authorities.isEmpty()) {
  50. AdminAuthenticationToken token = new AdminAuthenticationToken(authentication.getName(),
  51. authentication.getCredentials(), authorities);
  52. token.setDetails(userDetails);
  53. return token;
  54. }
  55. throw new BadCredentialsException("沒有分配許可權");
  56. }
  57. protected void doLogin(Authentication authentication) throws AuthenticationException {
  58. }
  59. @Override
  60. public boolean supports(Class<?> authentication) {
  61. // TODO Auto-generated method stub
  62. return true;
  63. }
  64. }
  1. /**用戶詳細信息獲取
  2. */
  3. public class AdminUserDetailsService implements UserDetailsService {
  4. private Logger logger = LoggerFactory.getLogger(AdminUserDetailsService.class);
  5. private AdminService adminService;
  6. @Override
  7. public UserDetails loadUserByUsername(String username) throws UsernameNotFoundException {
  8. AdminUserDetails userDetails = new AdminUserDetails();
  9. userDetails.setAdminId(username);
  10. ///載入用戶基本信息
  11. AdminModel adminModel = adminService.getAdminByAdminId(username);
  12. try {
  13. PropertyUtils.copyProperties(userDetails, adminModel);
  14. } catch (IllegalAccessException e) {
  15. logger.error("用戶信息複製到userDetails出錯",e);
  16. } catch (InvocationTargetException e) {
  17. logger.error("用戶信息複製到userDetails出錯",e);
  18. } catch (NoSuchMethodException e) {
  19. logger.error("用戶信息複製到userDetails出錯",e);
  20. }
  21. //載入許可權信息
  22. List<AdminRoleGrantedAuthority> authorities = this.adminService.getAuthorityByUserId(username);
  23. if (authorities == null || authorities.size() == 0) {////如果為普通用戶
  24. if (isCommonUserRequest()) {
  25. AdminRoleGrantedAuthority authority =
  26. new AdminRoleGrantedAuthority(AdminRoleGrantedAuthority.ADMIN_ROLE_TYPE_COMMON_USER);
  27. userDetails.getAuthorities().add(authority);
  28. } else {
  29. logger.warn("person authorities is empty, personId is [{}]", username);
  30. }
  31. }
  32. //載入用戶許可權
  33. userDetails.getAuthorities().addAll(authorities);
  34. ///這個就是許可權系統最後的用戶信息
  35. return userDetails;
  36. }
  37. private boolean isCommonUserRequest() {
  38. // TODO Auto-generated method stub
  39. return true;
  40. }
  41. public AdminService getAdminService() {
  42. return adminService;
  43. }
  44. public void setAdminService(AdminService adminService) {
  45. this.adminService = adminService;
  46. }
  47. }
  1. public class AdminAuthenticationToken extends AbstractAuthenticationToken {
  2. /**
  3. *
  4. */
  5. private static final long serialVersionUID = 5976309306377973996L;
  6. private final Object principal;
  7. private Object credentials;
  8. public AdminAuthenticationToken(Object principal, Object credentials) {
  9. super(null);
  10. this.principal = principal;
  11. this.credentials = credentials;
  12. setAuthenticated(false);
  13. }
  14. c AdminAuthenticationToken(Object principal, Object credentials, Collection<? extends GrantedAuthority> authorities) {
  15. super(authorities);
  16. this.principal = principal;
  17. this.credentials = credentials;
  18. super.setAuthenticated(true); //注意,這裡設置為true了! must use super, as we override
  19. }
  20. public Object getCredentials() {
  21. return this.credentials;
  22. }
  23. public Object getPrincipal() {
  24. return this.principal;
  25. }
  26. public void setAuthenticated(boolean isAuthenticated) throws IllegalArgumentException {
  27. if (isAuthenticated) {
  28. throw new IllegalArgumentException("Cannot set this token to trusted - use constructor which takes a GrantedAuthority list instead");
  29. }
  30. super.setAuthenticated(false);
  31. }
  32. @Override
  33. public void eraseCredentials() {
  34. super.eraseCredentials();
  35. credentials = null;
  36. }
  37. }

到這裡基本就完成了spring security的設置,

4)最後就是jsp頁面部分,頁面主要是表單的action地址必須為:path+/j_spring_security_check,其中path是項目路徑,然後登錄的時候就可以使用security模塊了!

至於文章中可能涉及到的一些bean或者service,這裡就不貼代碼了,畢竟項目較為完善,涉及東西太多,另外每個項目業務邏輯也不一樣。

在整個框架整合過程中,遇到了很多奇怪的問題,很多是因為版本不一致引起的,建議用maven進行jar等依賴包的統一管理。

SpringMVC + security模塊 框架整合詳解

喜歡這篇文章嗎?立刻分享出去讓更多人知道吧!

本站內容充實豐富,博大精深,小編精選每日熱門資訊,隨時更新,點擊「搶先收到最新資訊」瀏覽吧!


請您繼續閱讀更多來自 程序員小新人學習 的精彩文章:

我為何一直強調外包公司別去
.gitignore詳解及編寫

TAG:程序員小新人學習 |