笔记参考柏码知识库
SpringSecurity是一个基于Spring开发的非常强大的权限验证框架,其核心功能包括:
认证 (用户登录)
授权 (此用户能够做哪些事情)
攻击防护 (防止伪造身份攻击)
常见攻击方式 CSRF跨站请求伪造攻击 构建恶意页面,引导用户访问对应网站执行操作。
SameSite可以限制第三方Cookie的使用。在Chrome浏览器中,SameSite默认为Lax,第三方Cookie只能在用户导航到与原始站点相同的站点时发送。
SFA会话固定攻击 黑客将JSESSIONID交给用户,通过用户的操作来使得该ID获取到用户的权限。
Tomcat发送的SESSIONID默认勾选了HttpOnly选项的,一旦被设定是无法被随意修改的,前提是先正常访问一次网站。
可以在登陆后重新给用户分配JSESSIONID,在SpringSecurity有所实现。
XSS跨站脚本攻击 向网站注入脚本进行攻击。
开发环境配置 导入SpringSecurity的相关依赖:
1 2 3 4 5 6 7 8 9 10 <dependency > <groupId > org.springframework.security</groupId > <artifactId > spring-security-web</artifactId > <version > 6.1.1</version > </dependency > <dependency > <groupId > org.springframework.security</groupId > <artifactId > spring-security-config</artifactId > <version > 6.1.1</version > </dependency >
配置初始化器:
1 2 3 4 public class SecurityInitializer extends AbstractSecurityWebApplicationInitializer { }
创建一个配置类用于配置SpringSecurity:
1 2 3 4 5 @Configuration @EnableWebSecurity public class SecurityConfiguration { }
在根容器中添加此配置文件:
1 2 3 4 @Override protected Class<?>[] getRootConfigClasses() { return new Class []{MainConfiguration.class, SecurityConfiguration.class}; }
认证 基于内存验证 以代码的形式配置用户和密码,密码需要进行加密,可以使用BCrypt加密工具:
1 2 3 4 5 6 7 8 9 10 11 12 13 14 15 16 17 18 19 20 21 22 23 24 25 26 @Configuration @EnableWebSecurity public class SecurityConfiguration { @Bean public PasswordEncoder passwordEncoder () { return new BCryptPasswordEncoder (); } @Bean public UserDetailsService userDetailsService (PasswordEncoder encoder) { UserDetails user = User .withUsername("user" ) .password(encoder.encode("password" )) .roles("USER" ) .build(); System.out.println(encoder.encode("password" )); UserDetails admin = User .withUsername("admin" ) .password(encoder.encode("password" )) .roles("ADMIN" , "USER" ) .build(); return new InMemoryUserDetailsManager (user, admin); } }
SpringSecurity会接管登录验证模块,不需要自己编写。
SpringSecurity自带了csrf防护,需要在POST请求中携带页面中的csrfToken,否则将进行拦截。
1 <input type ="text" th:id ="${_csrf.getParameterName()}" th:value ="${_csrf.token}" hidden >
1 2 3 4 5 6 7 8 function pay () { const account = document.getElementById("account" ).value const csrf = document.getElementById("_csrf" ).value axios.post('/mvc/pay' , { account: account, _csrf: csrf }, { ...
现在浏览器已经足够安全,因此可以关闭csrf防护。
基于数据库验证 官方默认提供了可以直接使用的用户和权限表设计,无需自己建表:
1 2 3 create table users (username varchar(50 ) not null primary key,password varchar (500 ) not null ,enabled boolean not null ); create table authorities (username varchar(50 ) not null ,authority varchar (50 ) not null ,constraint fk_authorities_users foreign key (username) references users (username) ); create unique index ix_auth_username on authorities (username,authority) ;
添加数据库相关依赖:
1 2 3 4 5 6 7 8 9 10 11 12 13 14 15 16 17 18 19 20 <dependency > <groupId > org.mybatis</groupId > <artifactId > mybatis</artifactId > <version > 3.5.13</version > </dependency > <dependency > <groupId > org.mybatis</groupId > <artifactId > mybatis-spring</artifactId > <version > 3.0.2</version > </dependency > <dependency > <groupId > com.mysql</groupId > <artifactId > mysql-connector-j</artifactId > <version > 8.0.31</version > </dependency > <dependency > <groupId > org.springframework</groupId > <artifactId > spring-jdbc</artifactId > <version > 6.0.10</version > </dependency >
编写配置类:
1 2 3 4 5 6 7 8 9 10 11 12 13 14 15 16 17 18 19 20 21 22 23 24 25 @Configuration @EnableWebSecurity public class SecurityConfiguration { @Bean PasswordEncoder passwordEncoder () { return new BCryptPasswordEncoder (); } @Bean public DataSource dataSource () { return new PooledDataSource ("com.mysql.cj.jdbc.Driver" , "jdbc:mysql://localhost:3306/test" , "root" , "123456" ); } @Bean public UserDetailsService userDetailsService (DataSource dataSource, PasswordEncoder encoder) { JdbcUserDetailsManager manager = new JdbcUserDetailsManager (dataSource); manager.createUser(User.withUsername("user" ) .password(encoder.encode("password" )).roles("USER" ).build()); return manager; } }
通过使用UserDetailsManager对象,就能快速执行用户相关的管理操作。
重置密码功能需要配置一下JdbcUserDetailsManager,为其添加一个AuthenticationManager用于原密码的校验:
1 2 3 4 5 6 7 8 9 10 11 12 13 14 15 16 17 18 19 20 21 22 23 24 @Configuration @EnableWebSecurity public class SecurityConfiguration { ... private AuthenticationManager authenticationManager (UserDetailsManager manager, PasswordEncoder encoder) { DaoAuthenticationProvider provider = new DaoAuthenticationProvider (); provider.setUserDetailsService(manager); provider.setPasswordEncoder(encoder); return new ProviderManager (provider); } @Bean public UserDetailsManager userDetailsService (DataSource dataSource, PasswordEncoder encoder) throws Exception { JdbcUserDetailsManager manager = new JdbcUserDetailsManager (dataSource); manager.setAuthenticationManager(authenticationManager(manager, encoder)); return manager; } }
重置密码接口:
1 2 3 4 5 6 7 8 9 @ResponseBody @PostMapping("/change-password") public JSONObject changePassword (@RequestParam String oldPassword, @RequestParam String newPassword) { manager.changePassword(oldPassword, encoder.encode(newPassword)); JSONObject object = new JSONObject (); object.put("success" , true ); return object; }
自定义验证 需要自行实现UserDetailsService或是功能更完善的UserDetailsManager接口。以前者为例:
1 2 3 4 public interface UserMapper { @Select("select * from user where username = #{username}") Account findUserByName (String username) ; }
1 2 3 4 5 6 7 8 9 10 11 12 13 14 15 16 17 @Service public class AuthorizeService implements UserDetailsService { @Resource UserMapper mapper; @Override public UserDetails loadUserByUsername (String username) throws UsernameNotFoundException { Account account = mapper.findUserByName(username); if (account == null ) throw new UsernameNotFoundException ("用户名或密码错误" ); return User .withUsername(username) .password(account.getPassword()) .build(); } }
其他配置 自定义登录界面 配置自定义登录界面,包括登录,退出以及关闭csrf验证:
1 2 3 4 5 6 7 8 9 10 11 12 13 14 15 16 17 18 19 20 21 22 23 24 25 26 27 28 29 30 31 32 33 34 35 36 37 38 39 40 @Configuration @EnableWebSecurity public class SecurityConfiguration { ... @Bean public SecurityFilterChain filterChain (HttpSecurity http) throws Exception { return http .authorizeHttpRequests(auth -> { auth.requestMatchers("/static/**" ).permitAll(); auth.anyRequest().authenticated(); }) .formLogin(conf -> { conf.loginPage("/login" ); conf.loginProcessingUrl("/doLogin" ); conf.defaultSuccessUrl("/" ); conf.permitAll(); conf.usernameParameter("username" ); conf.passwordParameter("password" ); }) .logout(conf -> { conf.logoutUrl("/doLogout" ); conf.logoutSuccessUrl("/login" ); conf.permitAll(); }) .csrf(conf -> { conf.disable(); conf.ignoringRequestMatchers("/xxx/**" ); }) .build(); } }
记住功能 开启功能
1 2 3 4 5 6 7 8 9 10 11 12 13 14 15 16 17 18 @Configuration @EnableWebSecurity public class SecurityConfiguration { ... @Bean public SecurityFilterChain filterChain (HttpSecurity http) throws Exception { return http ... .rememberMe(conf -> { conf.alwaysRemember(false ); conf.rememberMeParameter("remember-me" ); conf.rememberMeCookieName("xxxx" ); }) .build(); } }
持久化保存:
1 2 3 4 5 6 7 8 @Bean public PersistentTokenRepository tokenRepository (DataSource dataSource) { JdbcTokenRepositoryImpl repository = new JdbcTokenRepositoryImpl (); repository.setCreateTableOnStartup(true ); repository.setDataSource(dataSource); return repository; }
1 2 3 4 5 .rememberMe(conf -> { conf.rememberMeParameter("remember-me" ); conf.tokenRepository(repository); conf.tokenValiditySeconds(3600 * 7 ); })
授权 基于角色授权 配置:
1 2 3 4 5 6 7 8 .authorizeHttpRequests(auth -> { auth.requestMatchers("/static/**" ).permitAll(); auth.requestMatchers("/" ).hasAnyRole("user" , "admin" ); auth.anyRequest().hasRole("admin" ); })
基于权限授权 1 2 3 4 5 6 .authorizeHttpRequests(auth -> { auth.requestMatchers("/static/**" ).permitAll(); auth.anyRequest().hasAnyAuthority("page:index" ); })
使用注解权限判断 开启方法安全校验:
1 2 3 4 5 6 @Configuration @EnableWebSecurity @EnableMethodSecurity public class SecurityConfiguration { ... }
添加注解:
1 2 3 4 5 6 7 8 9 10 @Controller public class HelloController { @PreAuthorize("hasRole('user')") @GetMapping("/") public String index () { return "index" ; } ... }
类似还有@PostAuthorize注解,但是它是在方法执行之后再进行拦截。