[web-app,monitor] 提供后台接口保护,打通前端认证登陆
This commit is contained in:
@@ -32,6 +32,11 @@ public interface CommonConstants {
|
|||||||
*/
|
*/
|
||||||
byte MONITOR_CONFLICT = 0x04;
|
byte MONITOR_CONFLICT = 0x04;
|
||||||
|
|
||||||
|
/**
|
||||||
|
* 响应状态码: 登陆账户密码错误
|
||||||
|
*/
|
||||||
|
byte MONITOR_LOGIN_FAILED = 0x05;
|
||||||
|
|
||||||
/**
|
/**
|
||||||
* 监控状态码: 未管理
|
* 监控状态码: 未管理
|
||||||
*/
|
*/
|
||||||
|
|||||||
@@ -14,6 +14,7 @@
|
|||||||
<properties>
|
<properties>
|
||||||
<mysql.version>8.0.16</mysql.version>
|
<mysql.version>8.0.16</mysql.version>
|
||||||
<snake.yaml.version>1.26</snake.yaml.version>
|
<snake.yaml.version>1.26</snake.yaml.version>
|
||||||
|
<sureness-core.version>1.0.5</sureness-core.version>
|
||||||
</properties>
|
</properties>
|
||||||
|
|
||||||
<dependencies>
|
<dependencies>
|
||||||
@@ -92,6 +93,12 @@
|
|||||||
<groupId>org.springframework.boot</groupId>
|
<groupId>org.springframework.boot</groupId>
|
||||||
<artifactId>spring-boot-starter-validation</artifactId>
|
<artifactId>spring-boot-starter-validation</artifactId>
|
||||||
</dependency>
|
</dependency>
|
||||||
|
<!--sureness-->
|
||||||
|
<dependency>
|
||||||
|
<groupId>com.usthe.sureness</groupId>
|
||||||
|
<artifactId>spring-boot-starter-sureness</artifactId>
|
||||||
|
<version>1.0.0-beta.2</version>
|
||||||
|
</dependency>
|
||||||
</dependencies>
|
</dependencies>
|
||||||
|
|
||||||
<build>
|
<build>
|
||||||
|
|||||||
@@ -0,0 +1,118 @@
|
|||||||
|
package com.usthe.manager.controller;
|
||||||
|
|
||||||
|
import com.usthe.common.entity.dto.Message;
|
||||||
|
import com.usthe.sureness.provider.SurenessAccount;
|
||||||
|
import com.usthe.sureness.provider.SurenessAccountProvider;
|
||||||
|
import com.usthe.sureness.provider.ducument.DocumentAccountProvider;
|
||||||
|
import com.usthe.sureness.subject.SubjectSum;
|
||||||
|
import com.usthe.sureness.util.JsonWebTokenUtil;
|
||||||
|
import com.usthe.sureness.util.Md5Util;
|
||||||
|
import com.usthe.sureness.util.SurenessContextHolder;
|
||||||
|
import io.swagger.annotations.Api;
|
||||||
|
import org.springframework.http.HttpStatus;
|
||||||
|
import org.springframework.http.ResponseEntity;
|
||||||
|
import org.springframework.web.bind.annotation.PostMapping;
|
||||||
|
import org.springframework.web.bind.annotation.RequestBody;
|
||||||
|
import org.springframework.web.bind.annotation.RequestMapping;
|
||||||
|
import org.springframework.web.bind.annotation.RestController;
|
||||||
|
|
||||||
|
import java.util.HashMap;
|
||||||
|
import java.util.List;
|
||||||
|
import java.util.Map;
|
||||||
|
import java.util.UUID;
|
||||||
|
|
||||||
|
import static com.usthe.common.util.CommonConstants.MONITOR_LOGIN_FAILED;
|
||||||
|
import static org.springframework.http.MediaType.APPLICATION_JSON_VALUE;
|
||||||
|
|
||||||
|
/**
|
||||||
|
* 认证注册TOKEN管理API
|
||||||
|
* @author tomsun28
|
||||||
|
* @date 13:11 2019-05-26
|
||||||
|
*/
|
||||||
|
@Api(tags = "认证注册TOKEN管理API")
|
||||||
|
@RestController()
|
||||||
|
@RequestMapping(value = "/account/auth", produces = {APPLICATION_JSON_VALUE})
|
||||||
|
public class AccountController {
|
||||||
|
|
||||||
|
/**
|
||||||
|
* account data provider
|
||||||
|
*/
|
||||||
|
private SurenessAccountProvider accountProvider = new DocumentAccountProvider();
|
||||||
|
|
||||||
|
/**
|
||||||
|
* 账户密码登陆获取token
|
||||||
|
* @param requestBody request
|
||||||
|
* @return token与refresh token
|
||||||
|
*
|
||||||
|
*/
|
||||||
|
@PostMapping("/form")
|
||||||
|
public ResponseEntity<Message> authGetToken(@RequestBody Map<String,String> requestBody) {
|
||||||
|
|
||||||
|
String identifier = requestBody.get("identifier");
|
||||||
|
String password = requestBody.get("password");
|
||||||
|
SurenessAccount account = accountProvider.loadAccount(identifier);
|
||||||
|
if (account == null || account.getPassword() == null) {
|
||||||
|
Message<Void> message = Message.<Void>builder().msg("账户密码错误")
|
||||||
|
.code(MONITOR_LOGIN_FAILED).build();
|
||||||
|
return ResponseEntity.ok(message);
|
||||||
|
} else {
|
||||||
|
if (account.getSalt() != null) {
|
||||||
|
password = Md5Util.md5(password + account.getSalt());
|
||||||
|
}
|
||||||
|
if (!account.getPassword().equals(password)) {
|
||||||
|
Message<Void> message = Message.<Void>builder().msg("账户密码错误")
|
||||||
|
.code(MONITOR_LOGIN_FAILED).build();
|
||||||
|
return ResponseEntity.ok(message);
|
||||||
|
}
|
||||||
|
if (account.isDisabledAccount() || account.isExcessiveAttempts()) {
|
||||||
|
Message<Void> message = Message.<Void>builder().msg("账户过期或被锁定")
|
||||||
|
.code(MONITOR_LOGIN_FAILED).build();
|
||||||
|
return ResponseEntity.ok(message);
|
||||||
|
}
|
||||||
|
}
|
||||||
|
// Get the roles the user has - rbac
|
||||||
|
List<String> roles = account.getOwnRoles();
|
||||||
|
long periodTime = 3600L;
|
||||||
|
// issue jwt
|
||||||
|
String jwt = JsonWebTokenUtil.issueJwt(UUID.randomUUID().toString(), identifier,
|
||||||
|
"token-server", periodTime, roles);
|
||||||
|
// issue refresh jwt
|
||||||
|
String refreshJwt = JsonWebTokenUtil.issueJwt(UUID.randomUUID().toString(), identifier,
|
||||||
|
"token-server-refresh", periodTime, roles);
|
||||||
|
Map<String, String> resp = new HashMap<>(2);
|
||||||
|
resp.put("token", jwt);
|
||||||
|
resp.put("refreshToken", refreshJwt);
|
||||||
|
return ResponseEntity.ok().body(new Message(resp));
|
||||||
|
}
|
||||||
|
|
||||||
|
/**
|
||||||
|
* 账户密码登陆获取token
|
||||||
|
* @param requestBody request
|
||||||
|
* @return token与refresh token
|
||||||
|
*
|
||||||
|
*/
|
||||||
|
@PostMapping("/refresh")
|
||||||
|
public ResponseEntity<Message> refreshToken(@RequestBody Map<String,String> requestBody) {
|
||||||
|
|
||||||
|
SubjectSum subjectSum = SurenessContextHolder.getBindSubject();
|
||||||
|
if (subjectSum == null) {
|
||||||
|
return ResponseEntity.status(HttpStatus.FORBIDDEN).build();
|
||||||
|
}
|
||||||
|
String identifier = String.valueOf(subjectSum.getPrincipal());
|
||||||
|
|
||||||
|
// Get the roles the user has - rbac
|
||||||
|
List<String> roles = (List<String>) subjectSum.getRoles();
|
||||||
|
long periodTime = 3600L;
|
||||||
|
// issue jwt
|
||||||
|
String jwt = JsonWebTokenUtil.issueJwt(UUID.randomUUID().toString(), identifier,
|
||||||
|
"token-server", periodTime, roles);
|
||||||
|
// issue refresh jwt
|
||||||
|
String refreshJwt = JsonWebTokenUtil.issueJwt(UUID.randomUUID().toString(), identifier,
|
||||||
|
"token-server-refresh", periodTime, roles);
|
||||||
|
Map<String, String> resp = new HashMap<>(2);
|
||||||
|
resp.put("token", jwt);
|
||||||
|
resp.put("refreshToken", refreshJwt);
|
||||||
|
return ResponseEntity.ok().body(new Message<>(resp));
|
||||||
|
}
|
||||||
|
|
||||||
|
}
|
||||||
44
manager/src/main/resources/sureness.yml
Normal file
44
manager/src/main/resources/sureness.yml
Normal file
@@ -0,0 +1,44 @@
|
|||||||
|
## -- sureness.yml document dataSource-- ##
|
||||||
|
|
||||||
|
# load api resource which need be protected, config role who can access these resource.
|
||||||
|
# resources that are not configured are also authenticated and protected by default, but not authorized
|
||||||
|
# eg: /api/v2/host===post===[role2,role3,role4] means /api/v2/host===post can be access by role2,role3,role4
|
||||||
|
# eg: /api/v1/getSource3===get===[] means /api/v1/getSource3===get can not be access by any role
|
||||||
|
resourceRole:
|
||||||
|
- /account/auth/refresh===post===[role1,role2,role3,role4]
|
||||||
|
|
||||||
|
# load api resource which do not need be protected, means them need be excluded.
|
||||||
|
# these api resource can be access by everyone
|
||||||
|
excludedResource:
|
||||||
|
- /account/auth/form===post
|
||||||
|
- /**/*.html===get
|
||||||
|
- /**/*.js===get
|
||||||
|
- /**/*.css===get
|
||||||
|
- /**/*.ico===get
|
||||||
|
- /**/*.ttf===get
|
||||||
|
- /**/*.png===get
|
||||||
|
- /**/*.gif===get
|
||||||
|
- /swagger-resources/**===get
|
||||||
|
- /v2/api-docs===get
|
||||||
|
- /v3/api-docs===get
|
||||||
|
- /**/*.png===*
|
||||||
|
|
||||||
|
# account info
|
||||||
|
# there are three account: admin, root, tom
|
||||||
|
# eg: admin has [role1,role2] ROLE, unencrypted password is admin, encrypted password is 0192023A7BBD73250516F069DF18B500
|
||||||
|
# eg: root has role1, unencrypted password is 23456
|
||||||
|
# eg: tom has role3, unencrypted password is 32113
|
||||||
|
account:
|
||||||
|
- appId: admin
|
||||||
|
credential: admin
|
||||||
|
role: [role1,role2]
|
||||||
|
- appId: tom
|
||||||
|
credential: tom@123
|
||||||
|
role: [role1,role2,role3]
|
||||||
|
- appId: lili
|
||||||
|
# 注意 Digest认证不支持加盐加密的密码账户
|
||||||
|
# 加盐加密的密码,通过 MD5(password+salt)计算
|
||||||
|
# 此账户的原始密码为 lili
|
||||||
|
credential: 1A676730B0C7F54654B0E09184448289
|
||||||
|
salt: 123
|
||||||
|
role: [role1,role2]
|
||||||
@@ -102,8 +102,8 @@ export const USERS = {
|
|||||||
'POST /user/avatar': 'ok',
|
'POST /user/avatar': 'ok',
|
||||||
'POST /login/account': (req: MockRequest) => {
|
'POST /login/account': (req: MockRequest) => {
|
||||||
const data = req.body;
|
const data = req.body;
|
||||||
if (!(data.userName === 'admin' || data.userName === 'user') || data.password !== 'admin@123') {
|
if (!(data.userName === 'admin' || data.userName === 'user') || data.password !== 'admin') {
|
||||||
return { msg: `Invalid username or password(admin/admin@123)` };
|
return { msg: `Invalid username or password(admin/admin)` };
|
||||||
}
|
}
|
||||||
return {
|
return {
|
||||||
msg: 'ok',
|
msg: 'ok',
|
||||||
|
|||||||
@@ -9,7 +9,6 @@ import {
|
|||||||
} from '@angular/common/http';
|
} from '@angular/common/http';
|
||||||
import { Injectable, Injector } from '@angular/core';
|
import { Injectable, Injector } from '@angular/core';
|
||||||
import { Router } from '@angular/router';
|
import { Router } from '@angular/router';
|
||||||
import { DA_SERVICE_TOKEN, ITokenService } from '@delon/auth';
|
|
||||||
import { ALAIN_I18N_TOKEN, _HttpClient } from '@delon/theme';
|
import { ALAIN_I18N_TOKEN, _HttpClient } from '@delon/theme';
|
||||||
import { environment } from '@env/environment';
|
import { environment } from '@env/environment';
|
||||||
import { NzNotificationService } from 'ng-zorro-antd/notification';
|
import { NzNotificationService } from 'ng-zorro-antd/notification';
|
||||||
@@ -51,10 +50,6 @@ export class DefaultInterceptor implements HttpInterceptor {
|
|||||||
return this.injector.get(NzNotificationService);
|
return this.injector.get(NzNotificationService);
|
||||||
}
|
}
|
||||||
|
|
||||||
private get tokenSrv(): ITokenService {
|
|
||||||
return this.injector.get(DA_SERVICE_TOKEN);
|
|
||||||
}
|
|
||||||
|
|
||||||
private get http(): _HttpClient {
|
private get http(): _HttpClient {
|
||||||
return this.injector.get(_HttpClient);
|
return this.injector.get(_HttpClient);
|
||||||
}
|
}
|
||||||
@@ -75,15 +70,16 @@ export class DefaultInterceptor implements HttpInterceptor {
|
|||||||
* 刷新 Token 请求
|
* 刷新 Token 请求
|
||||||
*/
|
*/
|
||||||
private refreshTokenRequest(): Observable<any> {
|
private refreshTokenRequest(): Observable<any> {
|
||||||
const model = this.tokenSrv.get();
|
const refreshToken = this.storageSvc.getRefreshToken();
|
||||||
return this.http.post(`/api/auth/refresh`, null, null, { headers: { refresh_token: model?.refresh_token || '' } });
|
return this.http.post(`/account/auth/refresh`, null, null,
|
||||||
|
{ headers: { Authorization: `Bearer ${refreshToken}` }});
|
||||||
}
|
}
|
||||||
|
|
||||||
// #region 刷新Token方式一:使用 401 重新刷新 Token
|
// #region 刷新Token方式一:使用 401 重新刷新 Token
|
||||||
|
|
||||||
private tryRefreshToken(ev: HttpResponseBase, req: HttpRequest<any>, next: HttpHandler): Observable<any> {
|
private tryRefreshToken(ev: HttpResponseBase, req: HttpRequest<any>, next: HttpHandler): Observable<any> {
|
||||||
// 1、若请求为刷新Token请求,表示来自刷新Token可以直接跳转登录页
|
// 1、若请求为刷新Token请求,表示来自刷新Token可以直接跳转登录页
|
||||||
if ([`/api/auth/refresh`].some(url => req.url.includes(url))) {
|
if ([`/account/auth/refresh`].some(url => req.url.includes(url))) {
|
||||||
this.toLogin();
|
this.toLogin();
|
||||||
return throwError(ev);
|
return throwError(ev);
|
||||||
}
|
}
|
||||||
@@ -105,8 +101,10 @@ export class DefaultInterceptor implements HttpInterceptor {
|
|||||||
this.refreshToking = false;
|
this.refreshToking = false;
|
||||||
this.refreshToken$.next(res);
|
this.refreshToken$.next(res);
|
||||||
// 重新保存新 token
|
// 重新保存新 token
|
||||||
this.storageSvc.storageAuthorizationToken(res);
|
let token = res.token;
|
||||||
this.tokenSrv.set(res);
|
let refreshToken = res.refreshToken;
|
||||||
|
this.storageSvc.storageAuthorizationToken(token);
|
||||||
|
this.storageSvc.storageRefreshToken(refreshToken);
|
||||||
// 重新发起请求
|
// 重新发起请求
|
||||||
return next.handle(this.reAttachToken(req));
|
return next.handle(this.reAttachToken(req));
|
||||||
}),
|
}),
|
||||||
@@ -134,7 +132,7 @@ export class DefaultInterceptor implements HttpInterceptor {
|
|||||||
|
|
||||||
private toLogin(): void {
|
private toLogin(): void {
|
||||||
this.notification.error(`未登录或登录已过期,请重新登录。`, ``);
|
this.notification.error(`未登录或登录已过期,请重新登录。`, ``);
|
||||||
this.goTo(this.tokenSrv.login_url!);
|
this.goTo('/passport/login');
|
||||||
}
|
}
|
||||||
|
|
||||||
private fillHeaders(headers?: HttpHeaders): { [name: string]: string } {
|
private fillHeaders(headers?: HttpHeaders): { [name: string]: string } {
|
||||||
|
|||||||
@@ -12,7 +12,7 @@
|
|||||||
<nz-form-item>
|
<nz-form-item>
|
||||||
<nz-form-control nzErrorTip="Please enter password">
|
<nz-form-control nzErrorTip="Please enter password">
|
||||||
<nz-input-group nzSize="large" nzPrefixIcon="lock">
|
<nz-input-group nzSize="large" nzPrefixIcon="lock">
|
||||||
<input nz-input type="password" formControlName="password" placeholder="password: admin@123" />
|
<input nz-input type="password" formControlName="password" placeholder="password: admin" />
|
||||||
</nz-input-group>
|
</nz-input-group>
|
||||||
</nz-form-control>
|
</nz-form-control>
|
||||||
</nz-form-item>
|
</nz-form-item>
|
||||||
|
|||||||
@@ -8,6 +8,8 @@ import { SettingsService, _HttpClient } from '@delon/theme';
|
|||||||
import { environment } from '@env/environment';
|
import { environment } from '@env/environment';
|
||||||
import { NzTabChangeEvent } from 'ng-zorro-antd/tabs';
|
import { NzTabChangeEvent } from 'ng-zorro-antd/tabs';
|
||||||
import { finalize } from 'rxjs/operators';
|
import { finalize } from 'rxjs/operators';
|
||||||
|
import {Message} from "../../../pojo/Message";
|
||||||
|
import {LocalStorageService} from "../../../service/local-storage.service";
|
||||||
|
|
||||||
@Component({
|
@Component({
|
||||||
selector: 'passport-login',
|
selector: 'passport-login',
|
||||||
@@ -28,11 +30,12 @@ export class UserLoginComponent implements OnDestroy {
|
|||||||
@Inject(DA_SERVICE_TOKEN) private tokenService: ITokenService,
|
@Inject(DA_SERVICE_TOKEN) private tokenService: ITokenService,
|
||||||
private startupSrv: StartupService,
|
private startupSrv: StartupService,
|
||||||
private http: _HttpClient,
|
private http: _HttpClient,
|
||||||
private cdr: ChangeDetectorRef
|
private cdr: ChangeDetectorRef,
|
||||||
|
private storageSvc: LocalStorageService
|
||||||
) {
|
) {
|
||||||
this.form = fb.group({
|
this.form = fb.group({
|
||||||
userName: [null, [Validators.required, Validators.pattern(/^(admin|user)$/)]],
|
userName: [null, [Validators.required]],
|
||||||
password: [null, [Validators.required, Validators.pattern(/^(admin@123)$/)]],
|
password: [null, [Validators.required]],
|
||||||
mobile: [null, [Validators.required, Validators.pattern(/^1\d{10}$/)]],
|
mobile: [null, [Validators.required, Validators.pattern(/^1\d{10}$/)]],
|
||||||
captcha: [null, [Validators.required]],
|
captcha: [null, [Validators.required]],
|
||||||
remember: [true]
|
remember: [true]
|
||||||
@@ -111,29 +114,28 @@ export class UserLoginComponent implements OnDestroy {
|
|||||||
this.loading = true;
|
this.loading = true;
|
||||||
this.cdr.detectChanges();
|
this.cdr.detectChanges();
|
||||||
this.http
|
this.http
|
||||||
.post('/login/account?_allow_anonymous=true', {
|
.post<Message<any>>('/account/auth/form', {
|
||||||
type: this.type,
|
type: this.type,
|
||||||
userName: this.userName.value,
|
identifier: this.userName.value,
|
||||||
password: this.password.value
|
password: this.password.value
|
||||||
})
|
})
|
||||||
.pipe(
|
.pipe(
|
||||||
finalize(() => {
|
finalize(() => {
|
||||||
this.loading = true;
|
this.loading = false;
|
||||||
this.cdr.detectChanges();
|
this.cdr.detectChanges();
|
||||||
})
|
})
|
||||||
)
|
)
|
||||||
.subscribe(res => {
|
.subscribe(message => {
|
||||||
if (res.msg !== 'ok') {
|
if (message.code !== 0) {
|
||||||
this.error = res.msg;
|
this.error = message.msg;
|
||||||
this.cdr.detectChanges();
|
this.cdr.detectChanges();
|
||||||
return;
|
return;
|
||||||
}
|
}
|
||||||
// 清空路由复用信息
|
// 清空路由复用信息
|
||||||
this.reuseTabService.clear();
|
this.reuseTabService.clear();
|
||||||
// 设置用户Token信息
|
// 设置用户Token信息
|
||||||
// TODO: Mock expired value
|
this.storageSvc.storageAuthorizationToken(message.data.token);
|
||||||
res.user.expired = +new Date() + 1000 * 60 * 5;
|
this.storageSvc.storageRefreshToken(message.data.refreshToken);
|
||||||
this.tokenService.set(res.user);
|
|
||||||
// 重新获取 StartupService 内容,我们始终认为应用信息一般都会受当前用户授权范围而影响
|
// 重新获取 StartupService 内容,我们始终认为应用信息一般都会受当前用户授权范围而影响
|
||||||
this.startupSrv.load().subscribe(() => {
|
this.startupSrv.load().subscribe(() => {
|
||||||
let url = this.tokenService.referrer!.url || '/';
|
let url = this.tokenService.referrer!.url || '/';
|
||||||
|
|||||||
@@ -19,7 +19,8 @@ const routes: Routes = [
|
|||||||
{
|
{
|
||||||
path: '',
|
path: '',
|
||||||
component: LayoutBasicComponent,
|
component: LayoutBasicComponent,
|
||||||
canActivate: [SimpleGuard],
|
// 路由守卫 在路由之前判断是否有认证或者权限进入此路由
|
||||||
|
// canActivate: [SimpleGuard],
|
||||||
children: [
|
children: [
|
||||||
// todo 根据路由自动生成面包屑
|
// todo 根据路由自动生成面包屑
|
||||||
{ path: '', redirectTo: 'dashboard', pathMatch: 'full'},
|
{ path: '', redirectTo: 'dashboard', pathMatch: 'full'},
|
||||||
|
|||||||
@@ -1,6 +1,7 @@
|
|||||||
import { Injectable } from '@angular/core';
|
import { Injectable } from '@angular/core';
|
||||||
|
|
||||||
const Authorization = 'Authorization';
|
const Authorization = 'Authorization';
|
||||||
|
const refreshToken = 'refresh-token';
|
||||||
|
|
||||||
@Injectable({
|
@Injectable({
|
||||||
providedIn: 'root'
|
providedIn: 'root'
|
||||||
@@ -22,6 +23,14 @@ export class LocalStorageService {
|
|||||||
return this.getData(Authorization);
|
return this.getData(Authorization);
|
||||||
}
|
}
|
||||||
|
|
||||||
|
public getRefreshToken(): string | null {
|
||||||
|
return this.getData(refreshToken);
|
||||||
|
}
|
||||||
|
|
||||||
|
public storageRefreshToken(token: string) {
|
||||||
|
return this.putData(refreshToken, token);
|
||||||
|
}
|
||||||
|
|
||||||
public storageAuthorizationToken(token: string) {
|
public storageAuthorizationToken(token: string) {
|
||||||
return this.putData(Authorization, token);
|
return this.putData(Authorization, token);
|
||||||
}
|
}
|
||||||
|
|||||||
Reference in New Issue
Block a user