houzhongjian
2024-12-03 874287a4c02d0a980d8b97c4a691b4f37ec5e812
提交 | 用户 | 时间
e7c126 1 package com.iailab.framework.security.config;
H 2
3 import cn.hutool.core.collection.CollUtil;
4 import com.iailab.framework.security.core.filter.TokenAuthenticationFilter;
5 import com.iailab.framework.web.config.WebProperties;
6 import com.google.common.collect.HashMultimap;
7 import com.google.common.collect.Multimap;
8 import org.springframework.boot.autoconfigure.AutoConfiguration;
9 import org.springframework.boot.autoconfigure.AutoConfigureOrder;
10 import org.springframework.context.ApplicationContext;
11 import org.springframework.context.annotation.Bean;
12 import org.springframework.http.HttpMethod;
13 import org.springframework.security.authentication.AuthenticationManager;
14 import org.springframework.security.config.Customizer;
15 import org.springframework.security.config.annotation.authentication.configuration.AuthenticationConfiguration;
16 import org.springframework.security.config.annotation.method.configuration.EnableMethodSecurity;
17 import org.springframework.security.config.annotation.web.builders.HttpSecurity;
18 import org.springframework.security.config.annotation.web.configurers.AbstractHttpConfigurer;
19 import org.springframework.security.config.annotation.web.configurers.HeadersConfigurer;
20 import org.springframework.security.config.http.SessionCreationPolicy;
21 import org.springframework.security.web.AuthenticationEntryPoint;
22 import org.springframework.security.web.SecurityFilterChain;
23 import org.springframework.security.web.access.AccessDeniedHandler;
24 import org.springframework.security.web.authentication.UsernamePasswordAuthenticationFilter;
25 import org.springframework.web.bind.annotation.RequestMethod;
26 import org.springframework.web.method.HandlerMethod;
27 import org.springframework.web.servlet.mvc.method.RequestMappingInfo;
28 import org.springframework.web.servlet.mvc.method.annotation.RequestMappingHandlerMapping;
29 import org.springframework.web.util.pattern.PathPattern;
30
31 import javax.annotation.Resource;
32 import javax.annotation.security.PermitAll;
33 import java.util.HashSet;
34 import java.util.List;
35 import java.util.Map;
36 import java.util.Set;
37
38 import static com.iailab.framework.common.util.collection.CollectionUtils.convertList;
39
40 /**
41  * 自定义的 Spring Security 配置适配器实现
42  *
43  * @author iailab
44  */
45 @AutoConfiguration
46 @AutoConfigureOrder(-1) // 目的:先于 Spring Security 自动配置,避免一键改包后,org.* 基础包无法生效
47 @EnableMethodSecurity(securedEnabled = true)
48 public class IailabWebSecurityConfigurerAdapter {
49
50     @Resource
51     private WebProperties webProperties;
52     @Resource
53     private SecurityProperties securityProperties;
54
55     /**
56      * 认证失败处理类 Bean
57      */
58     @Resource
59     private AuthenticationEntryPoint authenticationEntryPoint;
60     /**
61      * 权限不够处理器 Bean
62      */
63     @Resource
64     private AccessDeniedHandler accessDeniedHandler;
65     /**
66      * Token 认证过滤器 Bean
67      */
68     @Resource
69     private TokenAuthenticationFilter authenticationTokenFilter;
70
71     /**
72      * 自定义的权限映射 Bean 们
73      *
74      * @see #filterChain(HttpSecurity)
75      */
76     @Resource
77     private List<AuthorizeRequestsCustomizer> authorizeRequestsCustomizers;
78
79     @Resource
80     private ApplicationContext applicationContext;
81
82     /**
83      * 由于 Spring Security 创建 AuthenticationManager 对象时,没声明 @Bean 注解,导致无法被注入
84      * 通过覆写父类的该方法,添加 @Bean 注解,解决该问题
85      */
86     @Bean
87     public AuthenticationManager authenticationManagerBean(AuthenticationConfiguration authenticationConfiguration) throws Exception {
88         return authenticationConfiguration.getAuthenticationManager();
89     }
90
91     /**
92      * 配置 URL 的安全配置
93      *
94      * anyRequest          |   匹配所有请求路径
95      * access              |   SpringEl表达式结果为true时可以访问
96      * anonymous           |   匿名可以访问
97      * denyAll             |   用户不能访问
98      * fullyAuthenticated  |   用户完全认证可以访问(非remember-me下自动登录)
99      * hasAnyAuthority     |   如果有参数,参数表示权限,则其中任何一个权限可以访问
100      * hasAnyRole          |   如果有参数,参数表示角色,则其中任何一个角色可以访问
101      * hasAuthority        |   如果有参数,参数表示权限,则其权限可以访问
102      * hasIpAddress        |   如果有参数,参数表示IP地址,如果用户IP和参数匹配,则可以访问
103      * hasRole             |   如果有参数,参数表示角色,则其角色可以访问
104      * permitAll           |   用户可以任意访问
105      * rememberMe          |   允许通过remember-me登录的用户访问
106      * authenticated       |   用户登录后可访问
107      */
108     @Bean
109     protected SecurityFilterChain filterChain(HttpSecurity httpSecurity) throws Exception {
110         // 登出
111         httpSecurity
112                 // 开启跨域
113                 .cors(Customizer.withDefaults())
114                 // CSRF 禁用,因为不使用 Session
115                 .csrf(AbstractHttpConfigurer::disable)
116                 // 基于 token 机制,所以不需要 Session
117                 .sessionManagement(c -> c.sessionCreationPolicy(SessionCreationPolicy.STATELESS))
118                 .headers(c -> c.frameOptions(HeadersConfigurer.FrameOptionsConfig::disable))
119                 // 一堆自定义的 Spring Security 处理器
120                 .exceptionHandling(c -> c.authenticationEntryPoint(authenticationEntryPoint)
121                         .accessDeniedHandler(accessDeniedHandler));
122         // 登录、登录暂时不使用 Spring Security 的拓展点,主要考虑一方面拓展多用户、多种登录方式相对复杂,一方面用户的学习成本较高
123
124         // 获得 @PermitAll 带来的 URL 列表,免登录
125         Multimap<HttpMethod, String> permitAllUrls = getPermitAllUrlsFromAnnotations();
126         // 设置每个请求的权限
127         httpSecurity
128                 // ①:全局共享规则
874287 129                 .authorizeHttpRequests(c -> c
H 130                         // 1.1 静态资源,可匿名访问
131                         .requestMatchers(HttpMethod.GET, "/*.html", "/*.html", "/*.css", "/*.js").permitAll()
132                         // 1.2 设置 @PermitAll 无需认证
133                         .requestMatchers(HttpMethod.GET, permitAllUrls.get(HttpMethod.GET).toArray(new String[0])).permitAll()
134                         .requestMatchers(HttpMethod.POST, permitAllUrls.get(HttpMethod.POST).toArray(new String[0])).permitAll()
135                         .requestMatchers(HttpMethod.PUT, permitAllUrls.get(HttpMethod.PUT).toArray(new String[0])).permitAll()
136                         .requestMatchers(HttpMethod.DELETE, permitAllUrls.get(HttpMethod.DELETE).toArray(new String[0])).permitAll()
137                         .requestMatchers(HttpMethod.HEAD, permitAllUrls.get(HttpMethod.HEAD).toArray(new String[0])).permitAll()
138                         .requestMatchers(HttpMethod.PATCH, permitAllUrls.get(HttpMethod.PATCH).toArray(new String[0])).permitAll()
139                         // 1.3 基于 yudao.security.permit-all-urls 无需认证
140                         .requestMatchers(securityProperties.getPermitAllUrls().toArray(new String[0])).permitAll()
141                 )
e7c126 142                 // ②:每个项目的自定义规则
874287 143                 .authorizeHttpRequests(c -> authorizeRequestsCustomizers.forEach(customizer -> customizer.customize(c)))
e7c126 144                 // ③:兜底规则,必须认证
874287 145                 .authorizeHttpRequests(c -> c.anyRequest().authenticated());
e7c126 146
H 147         // 添加 Token Filter
148         httpSecurity.addFilterBefore(authenticationTokenFilter, UsernamePasswordAuthenticationFilter.class);
149         return httpSecurity.build();
150     }
151
152     private String buildAppApi(String url) {
153         return webProperties.getAppApi().getPrefix() + url;
154     }
155
156     private Multimap<HttpMethod, String> getPermitAllUrlsFromAnnotations() {
157         Multimap<HttpMethod, String> result = HashMultimap.create();
158         // 获得接口对应的 HandlerMethod 集合
159         RequestMappingHandlerMapping requestMappingHandlerMapping = (RequestMappingHandlerMapping)
160                 applicationContext.getBean("requestMappingHandlerMapping");
161         Map<RequestMappingInfo, HandlerMethod> handlerMethodMap = requestMappingHandlerMapping.getHandlerMethods();
162         // 获得有 @PermitAll 注解的接口
163         for (Map.Entry<RequestMappingInfo, HandlerMethod> entry : handlerMethodMap.entrySet()) {
164             HandlerMethod handlerMethod = entry.getValue();
165             if (!handlerMethod.hasMethodAnnotation(PermitAll.class)) {
166                 continue;
167             }
168             Set<String> urls = new HashSet<>();
169             if (entry.getKey().getPatternsCondition() != null) {
170                 urls.addAll(entry.getKey().getPatternsCondition().getPatterns());
171             }
172             if (entry.getKey().getPathPatternsCondition() != null) {
173                 urls.addAll(convertList(entry.getKey().getPathPatternsCondition().getPatterns(), PathPattern::getPatternString));
174             }
175             if (urls.isEmpty()) {
176                 continue;
177             }
178
179             // 特殊:使用 @RequestMapping 注解,并且未写 method 属性,此时认为都需要免登录
180             Set<RequestMethod> methods = entry.getKey().getMethodsCondition().getMethods();
181             if (CollUtil.isEmpty(methods)) {
182                 result.putAll(HttpMethod.GET, urls);
183                 result.putAll(HttpMethod.POST, urls);
184                 result.putAll(HttpMethod.PUT, urls);
185                 result.putAll(HttpMethod.DELETE, urls);
186                 result.putAll(HttpMethod.HEAD, urls);
187                 result.putAll(HttpMethod.PATCH, urls);
188                 continue;
189             }
190             // 根据请求方法,添加到 result 结果
191             entry.getKey().getMethodsCondition().getMethods().forEach(requestMethod -> {
192                 switch (requestMethod) {
193                     case GET:
194                         result.putAll(HttpMethod.GET, urls);
195                         break;
196                     case POST:
197                         result.putAll(HttpMethod.POST, urls);
198                         break;
199                     case PUT:
200                         result.putAll(HttpMethod.PUT, urls);
201                         break;
202                     case DELETE:
203                         result.putAll(HttpMethod.DELETE, urls);
204                         break;
205                     case HEAD:
206                         result.putAll(HttpMethod.HEAD, urls);
207                         break;
208                     case PATCH:
209                         result.putAll(HttpMethod.PATCH, urls);
210                         break;
211                 }
212             });
213         }
214         return result;
215     }
216
217 }