commit 1644bd0c1c19b9efe47b090478551982c9f66dc1 Author: RainBus Date: Mon Jun 10 15:32:44 2024 +0800 first commit diff --git a/.gitignore b/.gitignore new file mode 100644 index 0000000..549e00a --- /dev/null +++ b/.gitignore @@ -0,0 +1,33 @@ +HELP.md +target/ +!.mvn/wrapper/maven-wrapper.jar +!**/src/main/**/target/ +!**/src/test/**/target/ + +### STS ### +.apt_generated +.classpath +.factorypath +.project +.settings +.springBeans +.sts4-cache + +### IntelliJ IDEA ### +.idea +*.iws +*.iml +*.ipr + +### NetBeans ### +/nbproject/private/ +/nbbuild/ +/dist/ +/nbdist/ +/.nb-gradle/ +build/ +!**/src/main/**/build/ +!**/src/test/**/build/ + +### VS Code ### +.vscode/ diff --git a/.mvn/wrapper/maven-wrapper.properties b/.mvn/wrapper/maven-wrapper.properties new file mode 100644 index 0000000..aeccdfd --- /dev/null +++ b/.mvn/wrapper/maven-wrapper.properties @@ -0,0 +1,18 @@ +# Licensed to the Apache Software Foundation (ASF) under one +# or more contributor license agreements. See the NOTICE file +# distributed with this work for additional information +# regarding copyright ownership. The ASF licenses this file +# to you under the Apache License, Version 2.0 (the +# "License"); you may not use this file except in compliance +# with the License. You may obtain a copy of the License at +# +# https://www.apache.org/licenses/LICENSE-2.0 +# +# Unless required by applicable law or agreed to in writing, +# software distributed under the License is distributed on an +# "AS IS" BASIS, WITHOUT WARRANTIES OR CONDITIONS OF ANY +# KIND, either express or implied. See the License for the +# specific language governing permissions and limitations +# under the License. +wrapperVersion=3.3.1 +distributionUrl=https://repo.maven.apache.org/maven2/org/apache/maven/apache-maven/3.9.6/apache-maven-3.9.6-bin.zip diff --git a/mvnw b/mvnw new file mode 100644 index 0000000..ba9212a --- /dev/null +++ b/mvnw @@ -0,0 +1,250 @@ +#!/bin/sh +# ---------------------------------------------------------------------------- +# Licensed to the Apache Software Foundation (ASF) under one +# or more contributor license agreements. See the NOTICE file +# distributed with this work for additional information +# regarding copyright ownership. The ASF licenses this file +# to you under the Apache License, Version 2.0 (the +# "License"); you may not use this file except in compliance +# with the License. You may obtain a copy of the License at +# +# https://www.apache.org/licenses/LICENSE-2.0 +# +# Unless required by applicable law or agreed to in writing, +# software distributed under the License is distributed on an +# "AS IS" BASIS, WITHOUT WARRANTIES OR CONDITIONS OF ANY +# KIND, either express or implied. See the License for the +# specific language governing permissions and limitations +# under the License. +# ---------------------------------------------------------------------------- + +# ---------------------------------------------------------------------------- +# Apache Maven Wrapper startup batch script, version 3.3.1 +# +# Optional ENV vars +# ----------------- +# JAVA_HOME - location of a JDK home dir, required when download maven via java source +# MVNW_REPOURL - repo url base for downloading maven distribution +# MVNW_USERNAME/MVNW_PASSWORD - user and password for downloading maven +# MVNW_VERBOSE - true: enable verbose log; debug: trace the mvnw script; others: silence the output +# ---------------------------------------------------------------------------- + +set -euf +[ "${MVNW_VERBOSE-}" != debug ] || set -x + +# OS specific support. +native_path() { printf %s\\n "$1"; } +case "$(uname)" in +CYGWIN* | MINGW*) + [ -z "${JAVA_HOME-}" ] || JAVA_HOME="$(cygpath --unix "$JAVA_HOME")" + native_path() { cygpath --path --windows "$1"; } + ;; +esac + +# set JAVACMD and JAVACCMD +set_java_home() { + # For Cygwin and MinGW, ensure paths are in Unix format before anything is touched + if [ -n "${JAVA_HOME-}" ]; then + if [ -x "$JAVA_HOME/jre/sh/java" ]; then + # IBM's JDK on AIX uses strange locations for the executables + JAVACMD="$JAVA_HOME/jre/sh/java" + JAVACCMD="$JAVA_HOME/jre/sh/javac" + else + JAVACMD="$JAVA_HOME/bin/java" + JAVACCMD="$JAVA_HOME/bin/javac" + + if [ ! -x "$JAVACMD" ] || [ ! -x "$JAVACCMD" ]; then + echo "The JAVA_HOME environment variable is not defined correctly, so mvnw cannot run." >&2 + echo "JAVA_HOME is set to \"$JAVA_HOME\", but \"\$JAVA_HOME/bin/java\" or \"\$JAVA_HOME/bin/javac\" does not exist." >&2 + return 1 + fi + fi + else + JAVACMD="$( + 'set' +e + 'unset' -f command 2>/dev/null + 'command' -v java + )" || : + JAVACCMD="$( + 'set' +e + 'unset' -f command 2>/dev/null + 'command' -v javac + )" || : + + if [ ! -x "${JAVACMD-}" ] || [ ! -x "${JAVACCMD-}" ]; then + echo "The java/javac command does not exist in PATH nor is JAVA_HOME set, so mvnw cannot run." >&2 + return 1 + fi + fi +} + +# hash string like Java String::hashCode +hash_string() { + str="${1:-}" h=0 + while [ -n "$str" ]; do + char="${str%"${str#?}"}" + h=$(((h * 31 + $(LC_CTYPE=C printf %d "'$char")) % 4294967296)) + str="${str#?}" + done + printf %x\\n $h +} + +verbose() { :; } +[ "${MVNW_VERBOSE-}" != true ] || verbose() { printf %s\\n "${1-}"; } + +die() { + printf %s\\n "$1" >&2 + exit 1 +} + +# parse distributionUrl and optional distributionSha256Sum, requires .mvn/wrapper/maven-wrapper.properties +while IFS="=" read -r key value; do + case "${key-}" in + distributionUrl) distributionUrl="${value-}" ;; + distributionSha256Sum) distributionSha256Sum="${value-}" ;; + esac +done <"${0%/*}/.mvn/wrapper/maven-wrapper.properties" +[ -n "${distributionUrl-}" ] || die "cannot read distributionUrl property in ${0%/*}/.mvn/wrapper/maven-wrapper.properties" + +case "${distributionUrl##*/}" in +maven-mvnd-*bin.*) + MVN_CMD=mvnd.sh _MVNW_REPO_PATTERN=/maven/mvnd/ + case "${PROCESSOR_ARCHITECTURE-}${PROCESSOR_ARCHITEW6432-}:$(uname -a)" in + *AMD64:CYGWIN* | *AMD64:MINGW*) distributionPlatform=windows-amd64 ;; + :Darwin*x86_64) distributionPlatform=darwin-amd64 ;; + :Darwin*arm64) distributionPlatform=darwin-aarch64 ;; + :Linux*x86_64*) distributionPlatform=linux-amd64 ;; + *) + echo "Cannot detect native platform for mvnd on $(uname)-$(uname -m), use pure java version" >&2 + distributionPlatform=linux-amd64 + ;; + esac + distributionUrl="${distributionUrl%-bin.*}-$distributionPlatform.zip" + ;; +maven-mvnd-*) MVN_CMD=mvnd.sh _MVNW_REPO_PATTERN=/maven/mvnd/ ;; +*) MVN_CMD="mvn${0##*/mvnw}" _MVNW_REPO_PATTERN=/org/apache/maven/ ;; +esac + +# apply MVNW_REPOURL and calculate MAVEN_HOME +# maven home pattern: ~/.m2/wrapper/dists/{apache-maven-,maven-mvnd--}/ +[ -z "${MVNW_REPOURL-}" ] || distributionUrl="$MVNW_REPOURL$_MVNW_REPO_PATTERN${distributionUrl#*"$_MVNW_REPO_PATTERN"}" +distributionUrlName="${distributionUrl##*/}" +distributionUrlNameMain="${distributionUrlName%.*}" +distributionUrlNameMain="${distributionUrlNameMain%-bin}" +MAVEN_HOME="$HOME/.m2/wrapper/dists/${distributionUrlNameMain-}/$(hash_string "$distributionUrl")" + +exec_maven() { + unset MVNW_VERBOSE MVNW_USERNAME MVNW_PASSWORD MVNW_REPOURL || : + exec "$MAVEN_HOME/bin/$MVN_CMD" "$@" || die "cannot exec $MAVEN_HOME/bin/$MVN_CMD" +} + +if [ -d "$MAVEN_HOME" ]; then + verbose "found existing MAVEN_HOME at $MAVEN_HOME" + exec_maven "$@" +fi + +case "${distributionUrl-}" in +*?-bin.zip | *?maven-mvnd-?*-?*.zip) ;; +*) die "distributionUrl is not valid, must match *-bin.zip or maven-mvnd-*.zip, but found '${distributionUrl-}'" ;; +esac + +# prepare tmp dir +if TMP_DOWNLOAD_DIR="$(mktemp -d)" && [ -d "$TMP_DOWNLOAD_DIR" ]; then + clean() { rm -rf -- "$TMP_DOWNLOAD_DIR"; } + trap clean HUP INT TERM EXIT +else + die "cannot create temp dir" +fi + +mkdir -p -- "${MAVEN_HOME%/*}" + +# Download and Install Apache Maven +verbose "Couldn't find MAVEN_HOME, downloading and installing it ..." +verbose "Downloading from: $distributionUrl" +verbose "Downloading to: $TMP_DOWNLOAD_DIR/$distributionUrlName" + +# select .zip or .tar.gz +if ! command -v unzip >/dev/null; then + distributionUrl="${distributionUrl%.zip}.tar.gz" + distributionUrlName="${distributionUrl##*/}" +fi + +# verbose opt +__MVNW_QUIET_WGET=--quiet __MVNW_QUIET_CURL=--silent __MVNW_QUIET_UNZIP=-q __MVNW_QUIET_TAR='' +[ "${MVNW_VERBOSE-}" != true ] || __MVNW_QUIET_WGET='' __MVNW_QUIET_CURL='' __MVNW_QUIET_UNZIP='' __MVNW_QUIET_TAR=v + +# normalize http auth +case "${MVNW_PASSWORD:+has-password}" in +'') MVNW_USERNAME='' MVNW_PASSWORD='' ;; +has-password) [ -n "${MVNW_USERNAME-}" ] || MVNW_USERNAME='' MVNW_PASSWORD='' ;; +esac + +if [ -z "${MVNW_USERNAME-}" ] && command -v wget >/dev/null; then + verbose "Found wget ... using wget" + wget ${__MVNW_QUIET_WGET:+"$__MVNW_QUIET_WGET"} "$distributionUrl" -O "$TMP_DOWNLOAD_DIR/$distributionUrlName" || die "wget: Failed to fetch $distributionUrl" +elif [ -z "${MVNW_USERNAME-}" ] && command -v curl >/dev/null; then + verbose "Found curl ... using curl" + curl ${__MVNW_QUIET_CURL:+"$__MVNW_QUIET_CURL"} -f -L -o "$TMP_DOWNLOAD_DIR/$distributionUrlName" "$distributionUrl" || die "curl: Failed to fetch $distributionUrl" +elif set_java_home; then + verbose "Falling back to use Java to download" + javaSource="$TMP_DOWNLOAD_DIR/Downloader.java" + targetZip="$TMP_DOWNLOAD_DIR/$distributionUrlName" + cat >"$javaSource" <<-END + public class Downloader extends java.net.Authenticator + { + protected java.net.PasswordAuthentication getPasswordAuthentication() + { + return new java.net.PasswordAuthentication( System.getenv( "MVNW_USERNAME" ), System.getenv( "MVNW_PASSWORD" ).toCharArray() ); + } + public static void main( String[] args ) throws Exception + { + setDefault( new Downloader() ); + java.nio.file.Files.copy( java.net.URI.create( args[0] ).toURL().openStream(), java.nio.file.Paths.get( args[1] ).toAbsolutePath().normalize() ); + } + } + END + # For Cygwin/MinGW, switch paths to Windows format before running javac and java + verbose " - Compiling Downloader.java ..." + "$(native_path "$JAVACCMD")" "$(native_path "$javaSource")" || die "Failed to compile Downloader.java" + verbose " - Running Downloader.java ..." + "$(native_path "$JAVACMD")" -cp "$(native_path "$TMP_DOWNLOAD_DIR")" Downloader "$distributionUrl" "$(native_path "$targetZip")" +fi + +# If specified, validate the SHA-256 sum of the Maven distribution zip file +if [ -n "${distributionSha256Sum-}" ]; then + distributionSha256Result=false + if [ "$MVN_CMD" = mvnd.sh ]; then + echo "Checksum validation is not supported for maven-mvnd." >&2 + echo "Please disable validation by removing 'distributionSha256Sum' from your maven-wrapper.properties." >&2 + exit 1 + elif command -v sha256sum >/dev/null; then + if echo "$distributionSha256Sum $TMP_DOWNLOAD_DIR/$distributionUrlName" | sha256sum -c >/dev/null 2>&1; then + distributionSha256Result=true + fi + elif command -v shasum >/dev/null; then + if echo "$distributionSha256Sum $TMP_DOWNLOAD_DIR/$distributionUrlName" | shasum -a 256 -c >/dev/null 2>&1; then + distributionSha256Result=true + fi + else + echo "Checksum validation was requested but neither 'sha256sum' or 'shasum' are available." >&2 + echo "Please install either command, or disable validation by removing 'distributionSha256Sum' from your maven-wrapper.properties." >&2 + exit 1 + fi + if [ $distributionSha256Result = false ]; then + echo "Error: Failed to validate Maven distribution SHA-256, your Maven distribution might be compromised." >&2 + echo "If you updated your Maven version, you need to update the specified distributionSha256Sum property." >&2 + exit 1 + fi +fi + +# unzip and move +if command -v unzip >/dev/null; then + unzip ${__MVNW_QUIET_UNZIP:+"$__MVNW_QUIET_UNZIP"} "$TMP_DOWNLOAD_DIR/$distributionUrlName" -d "$TMP_DOWNLOAD_DIR" || die "failed to unzip" +else + tar xzf${__MVNW_QUIET_TAR:+"$__MVNW_QUIET_TAR"} "$TMP_DOWNLOAD_DIR/$distributionUrlName" -C "$TMP_DOWNLOAD_DIR" || die "failed to untar" +fi +printf %s\\n "$distributionUrl" >"$TMP_DOWNLOAD_DIR/$distributionUrlNameMain/mvnw.url" +mv -- "$TMP_DOWNLOAD_DIR/$distributionUrlNameMain" "$MAVEN_HOME" || [ -d "$MAVEN_HOME" ] || die "fail to move MAVEN_HOME" + +clean || : +exec_maven "$@" diff --git a/mvnw.cmd b/mvnw.cmd new file mode 100644 index 0000000..406932d --- /dev/null +++ b/mvnw.cmd @@ -0,0 +1,146 @@ +<# : batch portion +@REM ---------------------------------------------------------------------------- +@REM Licensed to the Apache Software Foundation (ASF) under one +@REM or more contributor license agreements. See the NOTICE file +@REM distributed with this work for additional information +@REM regarding copyright ownership. The ASF licenses this file +@REM to you under the Apache License, Version 2.0 (the +@REM "License"); you may not use this file except in compliance +@REM with the License. You may obtain a copy of the License at +@REM +@REM https://www.apache.org/licenses/LICENSE-2.0 +@REM +@REM Unless required by applicable law or agreed to in writing, +@REM software distributed under the License is distributed on an +@REM "AS IS" BASIS, WITHOUT WARRANTIES OR CONDITIONS OF ANY +@REM KIND, either express or implied. See the License for the +@REM specific language governing permissions and limitations +@REM under the License. +@REM ---------------------------------------------------------------------------- + +@REM ---------------------------------------------------------------------------- +@REM Apache Maven Wrapper startup batch script, version 3.3.1 +@REM +@REM Optional ENV vars +@REM MVNW_REPOURL - repo url base for downloading maven distribution +@REM MVNW_USERNAME/MVNW_PASSWORD - user and password for downloading maven +@REM MVNW_VERBOSE - true: enable verbose log; others: silence the output +@REM ---------------------------------------------------------------------------- + +@IF "%__MVNW_ARG0_NAME__%"=="" (SET __MVNW_ARG0_NAME__=%~nx0) +@SET __MVNW_CMD__= +@SET __MVNW_ERROR__= +@SET __MVNW_PSMODULEP_SAVE=%PSModulePath% +@SET PSModulePath= +@FOR /F "usebackq tokens=1* delims==" %%A IN (`powershell -noprofile "& {$scriptDir='%~dp0'; $script='%__MVNW_ARG0_NAME__%'; icm -ScriptBlock ([Scriptblock]::Create((Get-Content -Raw '%~f0'))) -NoNewScope}"`) DO @( + IF "%%A"=="MVN_CMD" (set __MVNW_CMD__=%%B) ELSE IF "%%B"=="" (echo %%A) ELSE (echo %%A=%%B) +) +@SET PSModulePath=%__MVNW_PSMODULEP_SAVE% +@SET __MVNW_PSMODULEP_SAVE= +@SET __MVNW_ARG0_NAME__= +@SET MVNW_USERNAME= +@SET MVNW_PASSWORD= +@IF NOT "%__MVNW_CMD__%"=="" (%__MVNW_CMD__% %*) +@echo Cannot start maven from wrapper >&2 && exit /b 1 +@GOTO :EOF +: end batch / begin powershell #> + +$ErrorActionPreference = "Stop" +if ($env:MVNW_VERBOSE -eq "true") { + $VerbosePreference = "Continue" +} + +# calculate distributionUrl, requires .mvn/wrapper/maven-wrapper.properties +$distributionUrl = (Get-Content -Raw "$scriptDir/.mvn/wrapper/maven-wrapper.properties" | ConvertFrom-StringData).distributionUrl +if (!$distributionUrl) { + Write-Error "cannot read distributionUrl property in $scriptDir/.mvn/wrapper/maven-wrapper.properties" +} + +switch -wildcard -casesensitive ( $($distributionUrl -replace '^.*/','') ) { + "maven-mvnd-*" { + $USE_MVND = $true + $distributionUrl = $distributionUrl -replace '-bin\.[^.]*$',"-windows-amd64.zip" + $MVN_CMD = "mvnd.cmd" + break + } + default { + $USE_MVND = $false + $MVN_CMD = $script -replace '^mvnw','mvn' + break + } +} + +# apply MVNW_REPOURL and calculate MAVEN_HOME +# maven home pattern: ~/.m2/wrapper/dists/{apache-maven-,maven-mvnd--}/ +if ($env:MVNW_REPOURL) { + $MVNW_REPO_PATTERN = if ($USE_MVND) { "/org/apache/maven/" } else { "/maven/mvnd/" } + $distributionUrl = "$env:MVNW_REPOURL$MVNW_REPO_PATTERN$($distributionUrl -replace '^.*'+$MVNW_REPO_PATTERN,'')" +} +$distributionUrlName = $distributionUrl -replace '^.*/','' +$distributionUrlNameMain = $distributionUrlName -replace '\.[^.]*$','' -replace '-bin$','' +$MAVEN_HOME_PARENT = "$HOME/.m2/wrapper/dists/$distributionUrlNameMain" +$MAVEN_HOME_NAME = ([System.Security.Cryptography.MD5]::Create().ComputeHash([byte[]][char[]]$distributionUrl) | ForEach-Object {$_.ToString("x2")}) -join '' +$MAVEN_HOME = "$MAVEN_HOME_PARENT/$MAVEN_HOME_NAME" + +if (Test-Path -Path "$MAVEN_HOME" -PathType Container) { + Write-Verbose "found existing MAVEN_HOME at $MAVEN_HOME" + Write-Output "MVN_CMD=$MAVEN_HOME/bin/$MVN_CMD" + exit $? +} + +if (! $distributionUrlNameMain -or ($distributionUrlName -eq $distributionUrlNameMain)) { + Write-Error "distributionUrl is not valid, must end with *-bin.zip, but found $distributionUrl" +} + +# prepare tmp dir +$TMP_DOWNLOAD_DIR_HOLDER = New-TemporaryFile +$TMP_DOWNLOAD_DIR = New-Item -Itemtype Directory -Path "$TMP_DOWNLOAD_DIR_HOLDER.dir" +$TMP_DOWNLOAD_DIR_HOLDER.Delete() | Out-Null +trap { + if ($TMP_DOWNLOAD_DIR.Exists) { + try { Remove-Item $TMP_DOWNLOAD_DIR -Recurse -Force | Out-Null } + catch { Write-Warning "Cannot remove $TMP_DOWNLOAD_DIR" } + } +} + +New-Item -Itemtype Directory -Path "$MAVEN_HOME_PARENT" -Force | Out-Null + +# Download and Install Apache Maven +Write-Verbose "Couldn't find MAVEN_HOME, downloading and installing it ..." +Write-Verbose "Downloading from: $distributionUrl" +Write-Verbose "Downloading to: $TMP_DOWNLOAD_DIR/$distributionUrlName" + +$webclient = New-Object System.Net.WebClient +if ($env:MVNW_USERNAME -and $env:MVNW_PASSWORD) { + $webclient.Credentials = New-Object System.Net.NetworkCredential($env:MVNW_USERNAME, $env:MVNW_PASSWORD) +} +[Net.ServicePointManager]::SecurityProtocol = [Net.SecurityProtocolType]::Tls12 +$webclient.DownloadFile($distributionUrl, "$TMP_DOWNLOAD_DIR/$distributionUrlName") | Out-Null + +# If specified, validate the SHA-256 sum of the Maven distribution zip file +$distributionSha256Sum = (Get-Content -Raw "$scriptDir/.mvn/wrapper/maven-wrapper.properties" | ConvertFrom-StringData).distributionSha256Sum +if ($distributionSha256Sum) { + if ($USE_MVND) { + Write-Error "Checksum validation is not supported for maven-mvnd. `nPlease disable validation by removing 'distributionSha256Sum' from your maven-wrapper.properties." + } + Import-Module $PSHOME\Modules\Microsoft.PowerShell.Utility -Function Get-FileHash + if ((Get-FileHash "$TMP_DOWNLOAD_DIR/$distributionUrlName" -Algorithm SHA256).Hash.ToLower() -ne $distributionSha256Sum) { + Write-Error "Error: Failed to validate Maven distribution SHA-256, your Maven distribution might be compromised. If you updated your Maven version, you need to update the specified distributionSha256Sum property." + } +} + +# unzip and move +Expand-Archive "$TMP_DOWNLOAD_DIR/$distributionUrlName" -DestinationPath "$TMP_DOWNLOAD_DIR" | Out-Null +Rename-Item -Path "$TMP_DOWNLOAD_DIR/$distributionUrlNameMain" -NewName $MAVEN_HOME_NAME | Out-Null +try { + Move-Item -Path "$TMP_DOWNLOAD_DIR/$MAVEN_HOME_NAME" -Destination $MAVEN_HOME_PARENT | Out-Null +} catch { + if (! (Test-Path -Path "$MAVEN_HOME" -PathType Container)) { + Write-Error "fail to move MAVEN_HOME" + } +} finally { + try { Remove-Item $TMP_DOWNLOAD_DIR -Recurse -Force | Out-Null } + catch { Write-Warning "Cannot remove $TMP_DOWNLOAD_DIR" } +} + +Write-Output "MVN_CMD=$MAVEN_HOME/bin/$MVN_CMD" diff --git a/pom.xml b/pom.xml new file mode 100644 index 0000000..fbd18d2 --- /dev/null +++ b/pom.xml @@ -0,0 +1,142 @@ + + + 4.0.0 + + org.springframework.boot + spring-boot-starter-parent + 3.3.0 + + + com.rainbus + dlp-admin-backend + 0.0.1-SNAPSHOT + dlp-admin-backend + dlp-admin-backend + + 21 + 1.5.5.Final + 1.18.32 + 0.2.0 + 5.2.5 + 3.14.0 + 2.5.0 + 5.1.3 + 4.4.0 + + + + org.springframework.boot + spring-boot-starter-data-jpa + + + org.springframework.boot + spring-boot-starter-web + + + org.springframework.boot + spring-boot-starter-validation + + + org.springframework.boot + spring-boot-starter-security + + + org.springframework.boot + spring-boot-starter-data-redis + + + + com.mysql + mysql-connector-j + runtime + + + org.projectlombok + lombok + true + ${lombok.version} + + + org.springframework.boot + spring-boot-starter-test + test + + + + org.mapstruct + mapstruct + ${mapstruct.version} + + + + org.apache.commons + commons-lang3 + ${commons-lang3.version} + + + + org.springdoc + springdoc-openapi-starter-webmvc-ui + ${open-api.version} + + + + redis.clients + jedis + ${jedis.version} + + + + com.auth0 + java-jwt + ${jwt.version} + + + + + + + + org.springframework.boot + spring-boot-maven-plugin + + + + org.projectlombok + lombok + + + + + + + org.apache.maven.plugins + maven-compiler-plugin + 3.8.1 + + 21 + 21 + + + org.mapstruct + mapstruct-processor + ${mapstruct.version} + + + org.projectlombok + lombok + ${lombok.version} + + + org.projectlombok + lombok-mapstruct-binding + ${lomstrcut-binding.version} + + + + + + + + diff --git a/src/main/java/com/rainbus/dlp/DlpAdminBackendApplication.java b/src/main/java/com/rainbus/dlp/DlpAdminBackendApplication.java new file mode 100644 index 0000000..3f5ac42 --- /dev/null +++ b/src/main/java/com/rainbus/dlp/DlpAdminBackendApplication.java @@ -0,0 +1,16 @@ +package com.rainbus.dlp; + +import org.springframework.boot.SpringApplication; +import org.springframework.boot.autoconfigure.SpringBootApplication; +import org.springframework.boot.autoconfigure.security.servlet.SecurityAutoConfiguration; +import org.springframework.data.jpa.repository.config.EnableJpaAuditing; + +@EnableJpaAuditing +@SpringBootApplication(exclude = {SecurityAutoConfiguration.class}) +public class DlpAdminBackendApplication { + + public static void main(String[] args) { + SpringApplication.run(DlpAdminBackendApplication.class, args); + } + +} diff --git a/src/main/java/com/rainbus/dlp/config/JwtFilter.java b/src/main/java/com/rainbus/dlp/config/JwtFilter.java new file mode 100644 index 0000000..540670f --- /dev/null +++ b/src/main/java/com/rainbus/dlp/config/JwtFilter.java @@ -0,0 +1,62 @@ +package com.rainbus.dlp.config; + +import com.rainbus.dlp.entity.dto.user.CustomUserDetails; +import com.rainbus.dlp.entity.dto.user.TokenClaims; +import com.rainbus.dlp.service.UserServ; +import com.rainbus.dlp.util.JwtUtil; +import jakarta.servlet.FilterChain; +import jakarta.servlet.ServletException; +import jakarta.servlet.http.HttpServletRequest; +import jakarta.servlet.http.HttpServletResponse; +import lombok.RequiredArgsConstructor; +import org.apache.commons.lang3.StringUtils; +import org.springframework.lang.NonNull; +import org.springframework.security.authentication.AuthenticationManager; +import org.springframework.security.authentication.UsernamePasswordAuthenticationToken; +import org.springframework.security.core.Authentication; +import org.springframework.security.core.GrantedAuthority; +import org.springframework.security.core.authority.SimpleGrantedAuthority; +import org.springframework.security.core.context.SecurityContextHolder; +import org.springframework.security.core.userdetails.User; +import org.springframework.security.core.userdetails.UserDetails; +import org.springframework.security.web.authentication.WebAuthenticationDetailsSource; +import org.springframework.stereotype.Component; +import org.springframework.web.filter.OncePerRequestFilter; + +import java.io.IOException; +import java.util.List; +import java.util.Objects; +import java.util.stream.Collectors; + +@Component +@RequiredArgsConstructor +public class JwtFilter extends OncePerRequestFilter { + + private final AuthenticationManager authenticationManager; + private final UserServ userServ; + + @Override + protected void doFilterInternal(@NonNull HttpServletRequest request, @NonNull HttpServletResponse response, @NonNull FilterChain filterChain) throws ServletException, IOException { + String token = getJwtFromRequest(request); + if (Objects.isNull(token)) { + filterChain.doFilter(request, response); + return; + } + TokenClaims claims = JwtUtil.parseValidToken(token); + UserDetails userDetails = userServ.loadUserByUsername(claims.getUsername()); + List authorities = claims.getRoles().stream().map(SimpleGrantedAuthority::new).collect(Collectors.toList()); + UsernamePasswordAuthenticationToken authentication = new UsernamePasswordAuthenticationToken(userDetails, null, authorities); + authentication.setDetails(new WebAuthenticationDetailsSource().buildDetails(request)); + SecurityContextHolder.getContext().setAuthentication(authentication); + filterChain.doFilter(request, response); + } + + private String getJwtFromRequest(HttpServletRequest request) { + String bearerToken = request.getHeader("Authorization"); + if (StringUtils.isBlank(bearerToken) || !bearerToken.startsWith("Bearer ")) { + return null; + } + return bearerToken.substring(7); + } + +} diff --git a/src/main/java/com/rainbus/dlp/config/SecurityConfig.java b/src/main/java/com/rainbus/dlp/config/SecurityConfig.java new file mode 100644 index 0000000..bb10c60 --- /dev/null +++ b/src/main/java/com/rainbus/dlp/config/SecurityConfig.java @@ -0,0 +1,70 @@ +package com.rainbus.dlp.config; + + +import com.rainbus.dlp.entity.pojo.user.SysRole; +import com.rainbus.dlp.repository.user.SysRoleRepo; +import com.rainbus.dlp.service.UserServ; +import lombok.AllArgsConstructor; +import lombok.RequiredArgsConstructor; +import org.springframework.context.annotation.Bean; +import org.springframework.context.annotation.Configuration; +import org.springframework.http.HttpMethod; +import org.springframework.security.authentication.AuthenticationManager; +import org.springframework.security.authentication.AuthenticationProvider; +import org.springframework.security.authentication.dao.DaoAuthenticationProvider; +import org.springframework.security.config.Customizer; +import org.springframework.security.config.annotation.authentication.configuration.AuthenticationConfiguration; +import org.springframework.security.config.annotation.web.builders.HttpSecurity; +import org.springframework.security.config.annotation.web.configuration.EnableWebSecurity; +import org.springframework.security.config.annotation.web.configurers.AbstractHttpConfigurer; +import org.springframework.security.config.annotation.web.configurers.AuthorizeHttpRequestsConfigurer; +import org.springframework.security.config.annotation.web.configurers.SessionManagementConfigurer; +import org.springframework.security.config.http.SessionCreationPolicy; +import org.springframework.security.crypto.bcrypt.BCryptPasswordEncoder; +import org.springframework.security.crypto.password.PasswordEncoder; +import org.springframework.security.web.SecurityFilterChain; +import org.springframework.security.web.authentication.UsernamePasswordAuthenticationFilter; +import org.springframework.web.bind.annotation.RequestMethod; + +import java.util.List; + +@Configuration +@EnableWebSecurity +@RequiredArgsConstructor +public class SecurityConfig { + + private final UserServ userServ; + + @Bean + public SecurityFilterChain filterChain(HttpSecurity http, JwtFilter jwtFilter) throws Exception { + http + .csrf(AbstractHttpConfigurer::disable) + .sessionManagement(sess -> sess.sessionCreationPolicy(SessionCreationPolicy.STATELESS)) + .authorizeHttpRequests((authorizeHttpRequests) -> { + userServ.getAllRoles().forEach(role -> { + role.getResources().forEach(resource -> { + authorizeHttpRequests.requestMatchers( + HttpMethod.valueOf(resource.getRequestMethod().name()), + resource.getResource() + ).hasAuthority(role.getRole()); + }); + }); + authorizeHttpRequests.anyRequest().permitAll(); + }) + .addFilterBefore(jwtFilter, UsernamePasswordAuthenticationFilter.class) + .httpBasic(Customizer.withDefaults()); + return http.build(); + } + + @Bean + public AuthenticationManager authenticationManager(AuthenticationConfiguration authenticationConfiguration) + throws Exception { + return authenticationConfiguration.getAuthenticationManager(); + } + + @Bean + public PasswordEncoder passwordEncoder() { + return new BCryptPasswordEncoder(); + } + +} diff --git a/src/main/java/com/rainbus/dlp/controller/UserCtrl.java b/src/main/java/com/rainbus/dlp/controller/UserCtrl.java new file mode 100644 index 0000000..761e4ea --- /dev/null +++ b/src/main/java/com/rainbus/dlp/controller/UserCtrl.java @@ -0,0 +1,60 @@ +package com.rainbus.dlp.controller; + +import com.rainbus.dlp.entity.dto.user.TokenClaims; +import com.rainbus.dlp.entity.mapper.UserConv; +import com.rainbus.dlp.entity.pojo.user.SysUser; +import com.rainbus.dlp.entity.req.user.RegisterReq; +import com.rainbus.dlp.entity.resp.Resp; +import com.rainbus.dlp.repository.user.SysUserRepo; +import com.rainbus.dlp.util.JwtUtil; +import lombok.AllArgsConstructor; +import org.springframework.security.authentication.AuthenticationManager; +import org.springframework.security.authentication.UsernamePasswordAuthenticationToken; +import org.springframework.security.core.Authentication; +import org.springframework.security.core.context.SecurityContextHolder; +import org.springframework.security.crypto.password.PasswordEncoder; +import org.springframework.web.bind.annotation.*; + +import java.util.List; + +@RestController +@RequestMapping("/user") +@AllArgsConstructor +public class UserCtrl { + + private final SysUserRepo userRepo; + private final UserConv userConv; + private final AuthenticationManager authenticationManager; + private final PasswordEncoder passwordEncoder; + + @PostMapping("/register") + public Resp register(@RequestBody RegisterReq req) { + req.setPassword(passwordEncoder.encode(req.getPassword())); + userRepo.save(userConv.RegisterReq2Pojo(req)); + return Resp.success(); + } + + @PostMapping("/login") + public Resp login(@RequestBody RegisterReq req) { + SysUser user = userRepo.findByUsername(req.getUsername()).orElse(null); + Authentication authentication = authenticationManager.authenticate(new UsernamePasswordAuthenticationToken(req.getUsername(), req.getPassword())); + SecurityContextHolder.getContext().setAuthentication(authentication); + if (user == null) { + return Resp.fail("user not exist"); + } + if (!passwordEncoder.matches(req.getPassword(), user.getPassword())) { + return Resp.fail("password error"); + } + return Resp.success(JwtUtil.generateToken(userConv.ClaimsPojo2Dto(user))); + } + + @GetMapping("token") + public Resp token() { + TokenClaims claims = new TokenClaims(); + claims.setUsername("rainbus"); + claims.setId(1L); + claims.setRoles(List.of("USER")); + return Resp.success(JwtUtil.generateToken(claims)); + } + +} diff --git a/src/main/java/com/rainbus/dlp/entity/dto/user/CustomUserDetails.java b/src/main/java/com/rainbus/dlp/entity/dto/user/CustomUserDetails.java new file mode 100644 index 0000000..7df90a0 --- /dev/null +++ b/src/main/java/com/rainbus/dlp/entity/dto/user/CustomUserDetails.java @@ -0,0 +1,38 @@ +package com.rainbus.dlp.entity.dto.user; + +import lombok.AllArgsConstructor; +import lombok.Data; +import lombok.Getter; +import org.springframework.security.core.authority.SimpleGrantedAuthority; +import org.springframework.security.core.userdetails.UserDetails; + +import java.util.List; + +@Getter +@AllArgsConstructor +public class CustomUserDetails implements UserDetails { + + private String username; + private String password; + private List authorities; + + @Override + public boolean isAccountNonExpired() { + return UserDetails.super.isAccountNonExpired(); + } + + @Override + public boolean isAccountNonLocked() { + return UserDetails.super.isAccountNonLocked(); + } + + @Override + public boolean isCredentialsNonExpired() { + return UserDetails.super.isCredentialsNonExpired(); + } + + @Override + public boolean isEnabled() { + return UserDetails.super.isEnabled(); + } +} diff --git a/src/main/java/com/rainbus/dlp/entity/dto/user/TokenClaims.java b/src/main/java/com/rainbus/dlp/entity/dto/user/TokenClaims.java new file mode 100644 index 0000000..6ec599b --- /dev/null +++ b/src/main/java/com/rainbus/dlp/entity/dto/user/TokenClaims.java @@ -0,0 +1,36 @@ +package com.rainbus.dlp.entity.dto.user; + +import com.auth0.jwt.interfaces.Claim; +import com.rainbus.dlp.util.ConvertUtil; +import lombok.Data; + +import java.lang.reflect.Field; +import java.util.List; +import java.util.Map; + +@Data +public class TokenClaims { + private Long id; + private String username; + private List roles; + + public Map toMap() { + return ConvertUtil.toMap(this, Object.class); + } + + public static TokenClaims fromClaimMap(Map map) { + TokenClaims claims = new TokenClaims(); + for (Field field : claims.getClass().getDeclaredFields()) { + field.setAccessible(true); + try { + field.set(claims, map.get(field.getName()).as(field.getType())); + } catch (IllegalAccessException e) { + e.printStackTrace(); + } + } + return claims; + } + +} + +//Bearer eyJhbGciOiJIUzI1NiIsInR5cCI6IkpXVCJ9.eyJpZCI6MSwidXNlcm5hbWUiOiJyYWluYnVzIiwiZXhwIjoxNzIwNDM2MjE3LCJpYXQiOjE3MTc4NDQyMTcsImlzcyI6IkRMUCJ9._rINYg-YW8WpvRycXr4JLEpYu17Hm5__9pxuGTyn4iA \ No newline at end of file diff --git a/src/main/java/com/rainbus/dlp/entity/enums/RoleEnum.java b/src/main/java/com/rainbus/dlp/entity/enums/RoleEnum.java new file mode 100644 index 0000000..dc0365d --- /dev/null +++ b/src/main/java/com/rainbus/dlp/entity/enums/RoleEnum.java @@ -0,0 +1,10 @@ +package com.rainbus.dlp.entity.enums; + +public enum RoleEnum { + // system admin + SUPER_ADMIN, + // department admin + DEPART_ADMIN, + // user + USER +} diff --git a/src/main/java/com/rainbus/dlp/entity/mapper/UserConv.java b/src/main/java/com/rainbus/dlp/entity/mapper/UserConv.java new file mode 100644 index 0000000..898f6f1 --- /dev/null +++ b/src/main/java/com/rainbus/dlp/entity/mapper/UserConv.java @@ -0,0 +1,19 @@ +package com.rainbus.dlp.entity.mapper; + +import com.rainbus.dlp.entity.dto.user.TokenClaims; +import com.rainbus.dlp.entity.pojo.user.SysUser; +import com.rainbus.dlp.entity.req.user.RegisterReq; +import org.mapstruct.InheritInverseConfiguration; +import org.mapstruct.Mapper; +import org.mapstruct.Mapping; + +@Mapper(componentModel = "spring") +public interface UserConv { + + @InheritInverseConfiguration + SysUser RegisterReq2Pojo(RegisterReq req); + + @Mapping(target = "roles", expression = "java(user.getRoles().stream().map(com.rainbus.dlp.entity.pojo.user.SysRole::getRole).toList())") + TokenClaims ClaimsPojo2Dto(SysUser user); + +} diff --git a/src/main/java/com/rainbus/dlp/entity/pojo/user/SysResource.java b/src/main/java/com/rainbus/dlp/entity/pojo/user/SysResource.java new file mode 100644 index 0000000..fe6d9bc --- /dev/null +++ b/src/main/java/com/rainbus/dlp/entity/pojo/user/SysResource.java @@ -0,0 +1,44 @@ +package com.rainbus.dlp.entity.pojo.user; + + +import jakarta.persistence.*; +import lombok.Data; +import org.springframework.data.annotation.CreatedBy; +import org.springframework.data.annotation.CreatedDate; +import org.springframework.data.annotation.LastModifiedBy; +import org.springframework.data.annotation.LastModifiedDate; +import org.springframework.web.bind.annotation.RequestMethod; + +import java.time.LocalDateTime; + +@Data +@Entity +public class SysResource { + + @Id + @GeneratedValue(strategy = GenerationType.IDENTITY) + private Long id; + + @Column + private String resource; + + @Column + @Enumerated(EnumType.STRING) + private RequestMethod requestMethod; + + @Column + private String description; + + @CreatedBy + private Long createdBy; + + @LastModifiedBy + private Long updatedBy; + + @CreatedDate + private LocalDateTime createdAt; + + @LastModifiedDate + private LocalDateTime updatedAt; + +} diff --git a/src/main/java/com/rainbus/dlp/entity/pojo/user/SysRole.java b/src/main/java/com/rainbus/dlp/entity/pojo/user/SysRole.java new file mode 100644 index 0000000..6b9a742 --- /dev/null +++ b/src/main/java/com/rainbus/dlp/entity/pojo/user/SysRole.java @@ -0,0 +1,49 @@ +package com.rainbus.dlp.entity.pojo.user; + +import com.rainbus.dlp.entity.enums.RoleEnum; +import jakarta.persistence.*; +import lombok.Data; +import org.hibernate.annotations.Comment; +import org.springframework.data.annotation.CreatedBy; +import org.springframework.data.annotation.CreatedDate; +import org.springframework.data.annotation.LastModifiedBy; +import org.springframework.data.annotation.LastModifiedDate; + +import java.util.List; + +@Data +@Entity +public class SysRole { + + @Id + @GeneratedValue(strategy = GenerationType.IDENTITY) + @Comment("id") + private Long id; + + @Comment("角色") + private String role; + + @Column + @Comment("描述") + private String description; + + @OneToMany(fetch = FetchType.EAGER) + private List resources; + + @CreatedBy + @Comment("创建人") + private Long createdBy; + + @LastModifiedBy + @Comment("更新人") + private Long updatedBy; + + @CreatedDate + @Comment("创建时间") + private Long createdAt; + + @LastModifiedDate + @Comment("更新时间") + private Long updatedAt; + +} diff --git a/src/main/java/com/rainbus/dlp/entity/pojo/user/SysUser.java b/src/main/java/com/rainbus/dlp/entity/pojo/user/SysUser.java new file mode 100644 index 0000000..922fd7d --- /dev/null +++ b/src/main/java/com/rainbus/dlp/entity/pojo/user/SysUser.java @@ -0,0 +1,50 @@ +package com.rainbus.dlp.entity.pojo.user; + +import com.rainbus.dlp.entity.enums.RoleEnum; +import jakarta.persistence.*; +import lombok.Data; +import org.springframework.data.annotation.CreatedBy; +import org.springframework.data.annotation.CreatedDate; +import org.springframework.data.annotation.LastModifiedBy; +import org.springframework.data.annotation.LastModifiedDate; +import org.springframework.data.jpa.domain.support.AuditingEntityListener; + +import java.time.LocalDateTime; +import java.util.List; + +@Data +@Entity +//@SQLRestriction("is_deleted = 0") +@EntityListeners(value = AuditingEntityListener.class) +//@SQLDelete(sql = "update `user` set is_deleted = 1 where id = ?") +public class SysUser { + + @Id + @GeneratedValue(strategy = GenerationType.IDENTITY) + private Long id; + + @Column + private String username; + + @Column + private String password; + + @OneToMany(fetch = FetchType.EAGER) + private List roles; + + @CreatedBy + private Long createBy; + + @LastModifiedBy + private Long updateBy; + + @CreatedDate + private LocalDateTime createAt; + + @LastModifiedDate + private LocalDateTime updateAt; + + @Column + private Integer isDeleted; + +} diff --git a/src/main/java/com/rainbus/dlp/entity/req/user/RegisterReq.java b/src/main/java/com/rainbus/dlp/entity/req/user/RegisterReq.java new file mode 100644 index 0000000..fee2bbb --- /dev/null +++ b/src/main/java/com/rainbus/dlp/entity/req/user/RegisterReq.java @@ -0,0 +1,12 @@ +package com.rainbus.dlp.entity.req.user; + +import lombok.Data; + +@Data +public class RegisterReq { + + private String username; + + private String password; + +} diff --git a/src/main/java/com/rainbus/dlp/entity/resp/Resp.java b/src/main/java/com/rainbus/dlp/entity/resp/Resp.java new file mode 100644 index 0000000..ef98168 --- /dev/null +++ b/src/main/java/com/rainbus/dlp/entity/resp/Resp.java @@ -0,0 +1,26 @@ +package com.rainbus.dlp.entity.resp; + + +import lombok.AllArgsConstructor; +import lombok.Data; + +@Data +@AllArgsConstructor +public class Resp { + private int code; + private String msg; + private T data; + + public static Resp success(T data) { + return new Resp<>(200, "success", data); + } + + + public static Resp success() { + return new Resp<>(200, "success", null); + } + + public static Resp fail(String msg) { + return new Resp<>(400, msg, null); + } +} diff --git a/src/main/java/com/rainbus/dlp/repository/user/SysResourceRepo.java b/src/main/java/com/rainbus/dlp/repository/user/SysResourceRepo.java new file mode 100644 index 0000000..32942cf --- /dev/null +++ b/src/main/java/com/rainbus/dlp/repository/user/SysResourceRepo.java @@ -0,0 +1,7 @@ +package com.rainbus.dlp.repository.user; + +import com.rainbus.dlp.entity.pojo.user.SysResource; +import org.springframework.data.jpa.repository.JpaRepository; + +public interface SysResourceRepo extends JpaRepository { +} diff --git a/src/main/java/com/rainbus/dlp/repository/user/SysRoleRepo.java b/src/main/java/com/rainbus/dlp/repository/user/SysRoleRepo.java new file mode 100644 index 0000000..163ebae --- /dev/null +++ b/src/main/java/com/rainbus/dlp/repository/user/SysRoleRepo.java @@ -0,0 +1,7 @@ +package com.rainbus.dlp.repository.user; + +import com.rainbus.dlp.entity.pojo.user.SysRole; +import org.springframework.data.jpa.repository.JpaRepository; + +public interface SysRoleRepo extends JpaRepository { +} diff --git a/src/main/java/com/rainbus/dlp/repository/user/SysUserRepo.java b/src/main/java/com/rainbus/dlp/repository/user/SysUserRepo.java new file mode 100644 index 0000000..224669a --- /dev/null +++ b/src/main/java/com/rainbus/dlp/repository/user/SysUserRepo.java @@ -0,0 +1,12 @@ +package com.rainbus.dlp.repository.user; + +import com.rainbus.dlp.entity.pojo.user.SysUser; +import org.springframework.data.jpa.repository.JpaRepository; + +import java.util.Optional; + +public interface SysUserRepo extends JpaRepository { + + Optional findByUsername(String username); + +} \ No newline at end of file diff --git a/src/main/java/com/rainbus/dlp/service/UserServ.java b/src/main/java/com/rainbus/dlp/service/UserServ.java new file mode 100644 index 0000000..725c065 --- /dev/null +++ b/src/main/java/com/rainbus/dlp/service/UserServ.java @@ -0,0 +1,44 @@ +package com.rainbus.dlp.service; + +import com.rainbus.dlp.entity.dto.user.CustomUserDetails; +import com.rainbus.dlp.entity.pojo.user.SysRole; +import com.rainbus.dlp.entity.pojo.user.SysUser; +import com.rainbus.dlp.repository.user.SysResourceRepo; +import com.rainbus.dlp.repository.user.SysRoleRepo; +import com.rainbus.dlp.repository.user.SysUserRepo; +import lombok.AllArgsConstructor; +import org.springframework.security.core.GrantedAuthority; +import org.springframework.security.core.authority.SimpleGrantedAuthority; +import org.springframework.security.core.userdetails.UserDetails; +import org.springframework.security.core.userdetails.UserDetailsService; +import org.springframework.security.core.userdetails.UsernameNotFoundException; +import org.springframework.stereotype.Service; +import org.springframework.validation.SimpleErrors; + +import java.util.List; +import java.util.stream.Collectors; + + +@Service +@AllArgsConstructor +public class UserServ implements UserDetailsService { + + private final SysUserRepo userRepo; + private final SysRoleRepo roleRepo; + private final SysResourceRepo resourceRepo; + + public SysUser getUserByUsername(String username) { + return userRepo.findByUsername(username).orElse(null); + } + + public List getAllRoles() { + return roleRepo.findAll(); + } + + @Override + public UserDetails loadUserByUsername(String username) throws UsernameNotFoundException { + SysUser user = userRepo.findByUsername(username).orElseThrow(() -> new UsernameNotFoundException("user not exist")); + List authorities = user.getRoles().stream().map(role -> new SimpleGrantedAuthority(role.getRole())).toList(); + return new CustomUserDetails(user.getUsername(), user.getPassword(), authorities); + } +} diff --git a/src/main/java/com/rainbus/dlp/util/ConvertUtil.java b/src/main/java/com/rainbus/dlp/util/ConvertUtil.java new file mode 100644 index 0000000..8be6ef5 --- /dev/null +++ b/src/main/java/com/rainbus/dlp/util/ConvertUtil.java @@ -0,0 +1,22 @@ +package com.rainbus.dlp.util; + +import com.fasterxml.jackson.databind.ObjectMapper; +import com.fasterxml.jackson.databind.type.MapType; + +import java.util.HashMap; +import java.util.Map; + +public class ConvertUtil { + + private static final ObjectMapper mapper = new ObjectMapper(); + + public static Map toMap(T source, Class vClass) { + MapType mapType = mapper.getTypeFactory().constructMapType(HashMap.class, String.class, vClass); + return mapper.convertValue(source, mapType); + } + + public static T fromMap(Map map, Class tClass) { + return mapper.convertValue(map, tClass); + } + +} diff --git a/src/main/java/com/rainbus/dlp/util/JwtUtil.java b/src/main/java/com/rainbus/dlp/util/JwtUtil.java new file mode 100644 index 0000000..a29f159 --- /dev/null +++ b/src/main/java/com/rainbus/dlp/util/JwtUtil.java @@ -0,0 +1,42 @@ +package com.rainbus.dlp.util; + +import com.auth0.jwt.JWT; +import com.auth0.jwt.JWTCreator; +import com.auth0.jwt.JWTVerifier; +import com.auth0.jwt.algorithms.Algorithm; +import com.auth0.jwt.exceptions.JWTVerificationException; +import com.auth0.jwt.interfaces.DecodedJWT; +import com.rainbus.dlp.entity.dto.user.TokenClaims; + +import java.time.Instant; + +public class JwtUtil { + + private static final long TOKEN_ALIVE_TIME = 30 * 24 * 60 * 60; + + private static final String SECRET = "2b44b0b00fd822d8ce753e54dac3dc4e06c2725f7db930f3b9924468b53194dbccdbe23d7baa5ef5fbc414ca4b2e64700bad60c5a7c45eaba56880985582fba4"; + + public static TokenClaims parseValidToken(String token) throws JWTVerificationException { + JWTVerifier verifier = JWT.require(algorithm()).withIssuer("DLP").build(); + DecodedJWT decodedJWT = verifier.verify(token); + return TokenClaims.fromClaimMap(decodedJWT.getClaims()); + } + + public static String generateToken(TokenClaims claims) { + JWTCreator.Builder builder = JWT.create(); + return builder.withPayload(claims.toMap()) + .withExpiresAt(Instant.now().plusSeconds(TOKEN_ALIVE_TIME)) + .withIssuedAt(Instant.now()) + .withIssuer("DLP") + .sign(algorithm()); + } + + private static Algorithm algorithm() { + return Algorithm.HMAC256(SECRET); + } + + public static boolean needRenew(Instant expiresAt, long renewTime) { + return expiresAt.minusSeconds(renewTime).isBefore(Instant.now()); + } + +} diff --git a/src/main/resources/application.yml b/src/main/resources/application.yml new file mode 100644 index 0000000..19888cb --- /dev/null +++ b/src/main/resources/application.yml @@ -0,0 +1,21 @@ +spring: + application: + name: dlp-admin-backend + + datasource: + url: jdbc:mysql://myhost.fallen-angle.com:3306/dlp_admin?serverTimezone=UTC + username: root + password: 13291004986@lm + driver-class-name: com.mysql.cj.jdbc.Driver + jpa: + hibernate: + ddl-auto: update + show-sql: true + + data: + redis: + host: myhost.fallen-angle.com + port: 6379 + password: 13291004986 + timeout: 10000 + database: 0 diff --git a/src/test/java/com/rainbus/dlp/DlpAdminBackendApplicationTests.java b/src/test/java/com/rainbus/dlp/DlpAdminBackendApplicationTests.java new file mode 100644 index 0000000..994e996 --- /dev/null +++ b/src/test/java/com/rainbus/dlp/DlpAdminBackendApplicationTests.java @@ -0,0 +1,13 @@ +package com.rainbus.dlp; + +import org.junit.jupiter.api.Test; +import org.springframework.boot.test.context.SpringBootTest; + +@SpringBootTest +class DlpAdminBackendApplicationTests { + + @Test + void contextLoads() { + } + +}