first commit

This commit is contained in:
2024-06-10 15:32:44 +08:00
commit 1644bd0c1c
26 changed files with 1249 additions and 0 deletions

View File

@@ -0,0 +1,16 @@
package com.rainbus.dlp;
import org.springframework.boot.SpringApplication;
import org.springframework.boot.autoconfigure.SpringBootApplication;
import org.springframework.boot.autoconfigure.security.servlet.SecurityAutoConfiguration;
import org.springframework.data.jpa.repository.config.EnableJpaAuditing;
@EnableJpaAuditing
@SpringBootApplication(exclude = {SecurityAutoConfiguration.class})
public class DlpAdminBackendApplication {
public static void main(String[] args) {
SpringApplication.run(DlpAdminBackendApplication.class, args);
}
}

View File

@@ -0,0 +1,62 @@
package com.rainbus.dlp.config;
import com.rainbus.dlp.entity.dto.user.CustomUserDetails;
import com.rainbus.dlp.entity.dto.user.TokenClaims;
import com.rainbus.dlp.service.UserServ;
import com.rainbus.dlp.util.JwtUtil;
import jakarta.servlet.FilterChain;
import jakarta.servlet.ServletException;
import jakarta.servlet.http.HttpServletRequest;
import jakarta.servlet.http.HttpServletResponse;
import lombok.RequiredArgsConstructor;
import org.apache.commons.lang3.StringUtils;
import org.springframework.lang.NonNull;
import org.springframework.security.authentication.AuthenticationManager;
import org.springframework.security.authentication.UsernamePasswordAuthenticationToken;
import org.springframework.security.core.Authentication;
import org.springframework.security.core.GrantedAuthority;
import org.springframework.security.core.authority.SimpleGrantedAuthority;
import org.springframework.security.core.context.SecurityContextHolder;
import org.springframework.security.core.userdetails.User;
import org.springframework.security.core.userdetails.UserDetails;
import org.springframework.security.web.authentication.WebAuthenticationDetailsSource;
import org.springframework.stereotype.Component;
import org.springframework.web.filter.OncePerRequestFilter;
import java.io.IOException;
import java.util.List;
import java.util.Objects;
import java.util.stream.Collectors;
@Component
@RequiredArgsConstructor
public class JwtFilter extends OncePerRequestFilter {
private final AuthenticationManager authenticationManager;
private final UserServ userServ;
@Override
protected void doFilterInternal(@NonNull HttpServletRequest request, @NonNull HttpServletResponse response, @NonNull FilterChain filterChain) throws ServletException, IOException {
String token = getJwtFromRequest(request);
if (Objects.isNull(token)) {
filterChain.doFilter(request, response);
return;
}
TokenClaims claims = JwtUtil.parseValidToken(token);
UserDetails userDetails = userServ.loadUserByUsername(claims.getUsername());
List<GrantedAuthority> authorities = claims.getRoles().stream().map(SimpleGrantedAuthority::new).collect(Collectors.toList());
UsernamePasswordAuthenticationToken authentication = new UsernamePasswordAuthenticationToken(userDetails, null, authorities);
authentication.setDetails(new WebAuthenticationDetailsSource().buildDetails(request));
SecurityContextHolder.getContext().setAuthentication(authentication);
filterChain.doFilter(request, response);
}
private String getJwtFromRequest(HttpServletRequest request) {
String bearerToken = request.getHeader("Authorization");
if (StringUtils.isBlank(bearerToken) || !bearerToken.startsWith("Bearer ")) {
return null;
}
return bearerToken.substring(7);
}
}

View File

@@ -0,0 +1,70 @@
package com.rainbus.dlp.config;
import com.rainbus.dlp.entity.pojo.user.SysRole;
import com.rainbus.dlp.repository.user.SysRoleRepo;
import com.rainbus.dlp.service.UserServ;
import lombok.AllArgsConstructor;
import lombok.RequiredArgsConstructor;
import org.springframework.context.annotation.Bean;
import org.springframework.context.annotation.Configuration;
import org.springframework.http.HttpMethod;
import org.springframework.security.authentication.AuthenticationManager;
import org.springframework.security.authentication.AuthenticationProvider;
import org.springframework.security.authentication.dao.DaoAuthenticationProvider;
import org.springframework.security.config.Customizer;
import org.springframework.security.config.annotation.authentication.configuration.AuthenticationConfiguration;
import org.springframework.security.config.annotation.web.builders.HttpSecurity;
import org.springframework.security.config.annotation.web.configuration.EnableWebSecurity;
import org.springframework.security.config.annotation.web.configurers.AbstractHttpConfigurer;
import org.springframework.security.config.annotation.web.configurers.AuthorizeHttpRequestsConfigurer;
import org.springframework.security.config.annotation.web.configurers.SessionManagementConfigurer;
import org.springframework.security.config.http.SessionCreationPolicy;
import org.springframework.security.crypto.bcrypt.BCryptPasswordEncoder;
import org.springframework.security.crypto.password.PasswordEncoder;
import org.springframework.security.web.SecurityFilterChain;
import org.springframework.security.web.authentication.UsernamePasswordAuthenticationFilter;
import org.springframework.web.bind.annotation.RequestMethod;
import java.util.List;
@Configuration
@EnableWebSecurity
@RequiredArgsConstructor
public class SecurityConfig {
private final UserServ userServ;
@Bean
public SecurityFilterChain filterChain(HttpSecurity http, JwtFilter jwtFilter) throws Exception {
http
.csrf(AbstractHttpConfigurer::disable)
.sessionManagement(sess -> sess.sessionCreationPolicy(SessionCreationPolicy.STATELESS))
.authorizeHttpRequests((authorizeHttpRequests) -> {
userServ.getAllRoles().forEach(role -> {
role.getResources().forEach(resource -> {
authorizeHttpRequests.requestMatchers(
HttpMethod.valueOf(resource.getRequestMethod().name()),
resource.getResource()
).hasAuthority(role.getRole());
});
});
authorizeHttpRequests.anyRequest().permitAll();
})
.addFilterBefore(jwtFilter, UsernamePasswordAuthenticationFilter.class)
.httpBasic(Customizer.withDefaults());
return http.build();
}
@Bean
public AuthenticationManager authenticationManager(AuthenticationConfiguration authenticationConfiguration)
throws Exception {
return authenticationConfiguration.getAuthenticationManager();
}
@Bean
public PasswordEncoder passwordEncoder() {
return new BCryptPasswordEncoder();
}
}

View File

@@ -0,0 +1,60 @@
package com.rainbus.dlp.controller;
import com.rainbus.dlp.entity.dto.user.TokenClaims;
import com.rainbus.dlp.entity.mapper.UserConv;
import com.rainbus.dlp.entity.pojo.user.SysUser;
import com.rainbus.dlp.entity.req.user.RegisterReq;
import com.rainbus.dlp.entity.resp.Resp;
import com.rainbus.dlp.repository.user.SysUserRepo;
import com.rainbus.dlp.util.JwtUtil;
import lombok.AllArgsConstructor;
import org.springframework.security.authentication.AuthenticationManager;
import org.springframework.security.authentication.UsernamePasswordAuthenticationToken;
import org.springframework.security.core.Authentication;
import org.springframework.security.core.context.SecurityContextHolder;
import org.springframework.security.crypto.password.PasswordEncoder;
import org.springframework.web.bind.annotation.*;
import java.util.List;
@RestController
@RequestMapping("/user")
@AllArgsConstructor
public class UserCtrl {
private final SysUserRepo userRepo;
private final UserConv userConv;
private final AuthenticationManager authenticationManager;
private final PasswordEncoder passwordEncoder;
@PostMapping("/register")
public Resp<Object> register(@RequestBody RegisterReq req) {
req.setPassword(passwordEncoder.encode(req.getPassword()));
userRepo.save(userConv.RegisterReq2Pojo(req));
return Resp.success();
}
@PostMapping("/login")
public Resp<Object> login(@RequestBody RegisterReq req) {
SysUser user = userRepo.findByUsername(req.getUsername()).orElse(null);
Authentication authentication = authenticationManager.authenticate(new UsernamePasswordAuthenticationToken(req.getUsername(), req.getPassword()));
SecurityContextHolder.getContext().setAuthentication(authentication);
if (user == null) {
return Resp.fail("user not exist");
}
if (!passwordEncoder.matches(req.getPassword(), user.getPassword())) {
return Resp.fail("password error");
}
return Resp.success(JwtUtil.generateToken(userConv.ClaimsPojo2Dto(user)));
}
@GetMapping("token")
public Resp<Object> token() {
TokenClaims claims = new TokenClaims();
claims.setUsername("rainbus");
claims.setId(1L);
claims.setRoles(List.of("USER"));
return Resp.success(JwtUtil.generateToken(claims));
}
}

View File

@@ -0,0 +1,38 @@
package com.rainbus.dlp.entity.dto.user;
import lombok.AllArgsConstructor;
import lombok.Data;
import lombok.Getter;
import org.springframework.security.core.authority.SimpleGrantedAuthority;
import org.springframework.security.core.userdetails.UserDetails;
import java.util.List;
@Getter
@AllArgsConstructor
public class CustomUserDetails implements UserDetails {
private String username;
private String password;
private List<SimpleGrantedAuthority> authorities;
@Override
public boolean isAccountNonExpired() {
return UserDetails.super.isAccountNonExpired();
}
@Override
public boolean isAccountNonLocked() {
return UserDetails.super.isAccountNonLocked();
}
@Override
public boolean isCredentialsNonExpired() {
return UserDetails.super.isCredentialsNonExpired();
}
@Override
public boolean isEnabled() {
return UserDetails.super.isEnabled();
}
}

View File

@@ -0,0 +1,36 @@
package com.rainbus.dlp.entity.dto.user;
import com.auth0.jwt.interfaces.Claim;
import com.rainbus.dlp.util.ConvertUtil;
import lombok.Data;
import java.lang.reflect.Field;
import java.util.List;
import java.util.Map;
@Data
public class TokenClaims {
private Long id;
private String username;
private List<String> roles;
public Map<String, Object> toMap() {
return ConvertUtil.toMap(this, Object.class);
}
public static TokenClaims fromClaimMap(Map<String, Claim> map) {
TokenClaims claims = new TokenClaims();
for (Field field : claims.getClass().getDeclaredFields()) {
field.setAccessible(true);
try {
field.set(claims, map.get(field.getName()).as(field.getType()));
} catch (IllegalAccessException e) {
e.printStackTrace();
}
}
return claims;
}
}
//Bearer eyJhbGciOiJIUzI1NiIsInR5cCI6IkpXVCJ9.eyJpZCI6MSwidXNlcm5hbWUiOiJyYWluYnVzIiwiZXhwIjoxNzIwNDM2MjE3LCJpYXQiOjE3MTc4NDQyMTcsImlzcyI6IkRMUCJ9._rINYg-YW8WpvRycXr4JLEpYu17Hm5__9pxuGTyn4iA

View File

@@ -0,0 +1,10 @@
package com.rainbus.dlp.entity.enums;
public enum RoleEnum {
// system admin
SUPER_ADMIN,
// department admin
DEPART_ADMIN,
// user
USER
}

View File

@@ -0,0 +1,19 @@
package com.rainbus.dlp.entity.mapper;
import com.rainbus.dlp.entity.dto.user.TokenClaims;
import com.rainbus.dlp.entity.pojo.user.SysUser;
import com.rainbus.dlp.entity.req.user.RegisterReq;
import org.mapstruct.InheritInverseConfiguration;
import org.mapstruct.Mapper;
import org.mapstruct.Mapping;
@Mapper(componentModel = "spring")
public interface UserConv {
@InheritInverseConfiguration
SysUser RegisterReq2Pojo(RegisterReq req);
@Mapping(target = "roles", expression = "java(user.getRoles().stream().map(com.rainbus.dlp.entity.pojo.user.SysRole::getRole).toList())")
TokenClaims ClaimsPojo2Dto(SysUser user);
}

View File

@@ -0,0 +1,44 @@
package com.rainbus.dlp.entity.pojo.user;
import jakarta.persistence.*;
import lombok.Data;
import org.springframework.data.annotation.CreatedBy;
import org.springframework.data.annotation.CreatedDate;
import org.springframework.data.annotation.LastModifiedBy;
import org.springframework.data.annotation.LastModifiedDate;
import org.springframework.web.bind.annotation.RequestMethod;
import java.time.LocalDateTime;
@Data
@Entity
public class SysResource {
@Id
@GeneratedValue(strategy = GenerationType.IDENTITY)
private Long id;
@Column
private String resource;
@Column
@Enumerated(EnumType.STRING)
private RequestMethod requestMethod;
@Column
private String description;
@CreatedBy
private Long createdBy;
@LastModifiedBy
private Long updatedBy;
@CreatedDate
private LocalDateTime createdAt;
@LastModifiedDate
private LocalDateTime updatedAt;
}

View File

@@ -0,0 +1,49 @@
package com.rainbus.dlp.entity.pojo.user;
import com.rainbus.dlp.entity.enums.RoleEnum;
import jakarta.persistence.*;
import lombok.Data;
import org.hibernate.annotations.Comment;
import org.springframework.data.annotation.CreatedBy;
import org.springframework.data.annotation.CreatedDate;
import org.springframework.data.annotation.LastModifiedBy;
import org.springframework.data.annotation.LastModifiedDate;
import java.util.List;
@Data
@Entity
public class SysRole {
@Id
@GeneratedValue(strategy = GenerationType.IDENTITY)
@Comment("id")
private Long id;
@Comment("角色")
private String role;
@Column
@Comment("描述")
private String description;
@OneToMany(fetch = FetchType.EAGER)
private List<SysResource> resources;
@CreatedBy
@Comment("创建人")
private Long createdBy;
@LastModifiedBy
@Comment("更新人")
private Long updatedBy;
@CreatedDate
@Comment("创建时间")
private Long createdAt;
@LastModifiedDate
@Comment("更新时间")
private Long updatedAt;
}

View File

@@ -0,0 +1,50 @@
package com.rainbus.dlp.entity.pojo.user;
import com.rainbus.dlp.entity.enums.RoleEnum;
import jakarta.persistence.*;
import lombok.Data;
import org.springframework.data.annotation.CreatedBy;
import org.springframework.data.annotation.CreatedDate;
import org.springframework.data.annotation.LastModifiedBy;
import org.springframework.data.annotation.LastModifiedDate;
import org.springframework.data.jpa.domain.support.AuditingEntityListener;
import java.time.LocalDateTime;
import java.util.List;
@Data
@Entity
//@SQLRestriction("is_deleted = 0")
@EntityListeners(value = AuditingEntityListener.class)
//@SQLDelete(sql = "update `user` set is_deleted = 1 where id = ?")
public class SysUser {
@Id
@GeneratedValue(strategy = GenerationType.IDENTITY)
private Long id;
@Column
private String username;
@Column
private String password;
@OneToMany(fetch = FetchType.EAGER)
private List<SysRole> roles;
@CreatedBy
private Long createBy;
@LastModifiedBy
private Long updateBy;
@CreatedDate
private LocalDateTime createAt;
@LastModifiedDate
private LocalDateTime updateAt;
@Column
private Integer isDeleted;
}

View File

@@ -0,0 +1,12 @@
package com.rainbus.dlp.entity.req.user;
import lombok.Data;
@Data
public class RegisterReq {
private String username;
private String password;
}

View File

@@ -0,0 +1,26 @@
package com.rainbus.dlp.entity.resp;
import lombok.AllArgsConstructor;
import lombok.Data;
@Data
@AllArgsConstructor
public class Resp<T> {
private int code;
private String msg;
private T data;
public static <T> Resp<T> success(T data) {
return new Resp<>(200, "success", data);
}
public static Resp<Object> success() {
return new Resp<>(200, "success", null);
}
public static Resp<Object> fail(String msg) {
return new Resp<>(400, msg, null);
}
}

View File

@@ -0,0 +1,7 @@
package com.rainbus.dlp.repository.user;
import com.rainbus.dlp.entity.pojo.user.SysResource;
import org.springframework.data.jpa.repository.JpaRepository;
public interface SysResourceRepo extends JpaRepository<SysResource, Long> {
}

View File

@@ -0,0 +1,7 @@
package com.rainbus.dlp.repository.user;
import com.rainbus.dlp.entity.pojo.user.SysRole;
import org.springframework.data.jpa.repository.JpaRepository;
public interface SysRoleRepo extends JpaRepository<SysRole, Long> {
}

View File

@@ -0,0 +1,12 @@
package com.rainbus.dlp.repository.user;
import com.rainbus.dlp.entity.pojo.user.SysUser;
import org.springframework.data.jpa.repository.JpaRepository;
import java.util.Optional;
public interface SysUserRepo extends JpaRepository<SysUser, Long> {
Optional<SysUser> findByUsername(String username);
}

View File

@@ -0,0 +1,44 @@
package com.rainbus.dlp.service;
import com.rainbus.dlp.entity.dto.user.CustomUserDetails;
import com.rainbus.dlp.entity.pojo.user.SysRole;
import com.rainbus.dlp.entity.pojo.user.SysUser;
import com.rainbus.dlp.repository.user.SysResourceRepo;
import com.rainbus.dlp.repository.user.SysRoleRepo;
import com.rainbus.dlp.repository.user.SysUserRepo;
import lombok.AllArgsConstructor;
import org.springframework.security.core.GrantedAuthority;
import org.springframework.security.core.authority.SimpleGrantedAuthority;
import org.springframework.security.core.userdetails.UserDetails;
import org.springframework.security.core.userdetails.UserDetailsService;
import org.springframework.security.core.userdetails.UsernameNotFoundException;
import org.springframework.stereotype.Service;
import org.springframework.validation.SimpleErrors;
import java.util.List;
import java.util.stream.Collectors;
@Service
@AllArgsConstructor
public class UserServ implements UserDetailsService {
private final SysUserRepo userRepo;
private final SysRoleRepo roleRepo;
private final SysResourceRepo resourceRepo;
public SysUser getUserByUsername(String username) {
return userRepo.findByUsername(username).orElse(null);
}
public List<SysRole> getAllRoles() {
return roleRepo.findAll();
}
@Override
public UserDetails loadUserByUsername(String username) throws UsernameNotFoundException {
SysUser user = userRepo.findByUsername(username).orElseThrow(() -> new UsernameNotFoundException("user not exist"));
List<SimpleGrantedAuthority> authorities = user.getRoles().stream().map(role -> new SimpleGrantedAuthority(role.getRole())).toList();
return new CustomUserDetails(user.getUsername(), user.getPassword(), authorities);
}
}

View File

@@ -0,0 +1,22 @@
package com.rainbus.dlp.util;
import com.fasterxml.jackson.databind.ObjectMapper;
import com.fasterxml.jackson.databind.type.MapType;
import java.util.HashMap;
import java.util.Map;
public class ConvertUtil {
private static final ObjectMapper mapper = new ObjectMapper();
public static <T, V> Map<String, V> toMap(T source, Class<V> vClass) {
MapType mapType = mapper.getTypeFactory().constructMapType(HashMap.class, String.class, vClass);
return mapper.convertValue(source, mapType);
}
public static <T> T fromMap(Map<String, ?> map, Class<T> tClass) {
return mapper.convertValue(map, tClass);
}
}

View File

@@ -0,0 +1,42 @@
package com.rainbus.dlp.util;
import com.auth0.jwt.JWT;
import com.auth0.jwt.JWTCreator;
import com.auth0.jwt.JWTVerifier;
import com.auth0.jwt.algorithms.Algorithm;
import com.auth0.jwt.exceptions.JWTVerificationException;
import com.auth0.jwt.interfaces.DecodedJWT;
import com.rainbus.dlp.entity.dto.user.TokenClaims;
import java.time.Instant;
public class JwtUtil {
private static final long TOKEN_ALIVE_TIME = 30 * 24 * 60 * 60;
private static final String SECRET = "2b44b0b00fd822d8ce753e54dac3dc4e06c2725f7db930f3b9924468b53194dbccdbe23d7baa5ef5fbc414ca4b2e64700bad60c5a7c45eaba56880985582fba4";
public static TokenClaims parseValidToken(String token) throws JWTVerificationException {
JWTVerifier verifier = JWT.require(algorithm()).withIssuer("DLP").build();
DecodedJWT decodedJWT = verifier.verify(token);
return TokenClaims.fromClaimMap(decodedJWT.getClaims());
}
public static String generateToken(TokenClaims claims) {
JWTCreator.Builder builder = JWT.create();
return builder.withPayload(claims.toMap())
.withExpiresAt(Instant.now().plusSeconds(TOKEN_ALIVE_TIME))
.withIssuedAt(Instant.now())
.withIssuer("DLP")
.sign(algorithm());
}
private static Algorithm algorithm() {
return Algorithm.HMAC256(SECRET);
}
public static boolean needRenew(Instant expiresAt, long renewTime) {
return expiresAt.minusSeconds(renewTime).isBefore(Instant.now());
}
}

View File

@@ -0,0 +1,21 @@
spring:
application:
name: dlp-admin-backend
datasource:
url: jdbc:mysql://myhost.fallen-angle.com:3306/dlp_admin?serverTimezone=UTC
username: root
password: 13291004986@lm
driver-class-name: com.mysql.cj.jdbc.Driver
jpa:
hibernate:
ddl-auto: update
show-sql: true
data:
redis:
host: myhost.fallen-angle.com
port: 6379
password: 13291004986
timeout: 10000
database: 0