資源服務(wù)器就是業(yè)務(wù)服務(wù) 如用戶(hù)服務(wù),訂單服務(wù)等 第三方需要到資源服務(wù)器調(diào)用接口獲取資源
ResourceServerConfig
ResourceServerConfig是資源服務(wù)器的核心配置 用于驗(yàn)證token 與網(wǎng)關(guān)配置相似
其中.antMatchers("/**").access("#oauth2.hasScope('user')") 需要oauth_client_details表的scope配合 意思是訪問(wèn)所有資源 需要客戶(hù)端有scope需要有user
1
2
3
4
5
6
7
8
9
10
11
12
13
14
15
16
17
18
19
20
21
22
23
24
25
26
27
28
29
30
31
32
33
34
35
36
37
38
39
40
41
42
43
44
45
46
47
48
49
50
51
52
53
54
|
@Configuration @EnableResourceServer // 標(biāo)識(shí)為資源服務(wù)器,請(qǐng)求服務(wù)中的資源,就要帶著token過(guò)來(lái),找不到token或token是無(wú)效訪問(wèn)不了資源 @EnableGlobalMethodSecurity (prePostEnabled = true ) // 開(kāi)啟方法級(jí)別權(quán)限控制 public class ResourceServerConfig extends ResourceServerConfigurerAdapter implements CommandLineRunner { private final static Logger logger = LoggerFactory.getLogger(ResourceServerConfig. class ); public static final String RESOURCE_ID = "user" ; /** * 權(quán)限不足返回給前端json */ @Autowired private CustomAccessDeniedHandlerConfig customAccessDeniedHandlerConfig; @Autowired private TokenStore tokenStore; /** * token無(wú)效返回前段json */ @Autowired private AuthExceptionEntryPointConfig authExceptionEntryPointConfig; @Override public void configure(ResourceServerSecurityConfigurer resources) throws Exception { // 當(dāng)前資源服務(wù)器的資源id,認(rèn)證服務(wù)會(huì)認(rèn)證客戶(hù)端有沒(méi)有訪問(wèn)這個(gè)資源id的權(quán)限,有則可以訪問(wèn)當(dāng)前服務(wù) resources.tokenStore(tokenStore).resourceId(RESOURCE_ID) // token無(wú)效異常的處理 .authenticationEntryPoint(authExceptionEntryPointConfig) // 權(quán)限不足異常處理類(lèi) .accessDeniedHandler(customAccessDeniedHandlerConfig) // 會(huì)話機(jī)制stateless開(kāi)啟 .stateless( true ); } @Override public void configure(HttpSecurity http) throws Exception { http.sessionManagement() // SpringSecurity不會(huì)使用也不會(huì)創(chuàng)建HttpSession實(shí)例 因?yàn)檎麄€(gè)oauth2后使用token .sessionCreationPolicy(SessionCreationPolicy.STATELESS).and().authorizeRequests() // 開(kāi)放swagger請(qǐng)求 .antMatchers( "/swagger-ui.html" , "/webjars/**" , "/swagger-resources/**" , "/v2/**" ).permitAll() // 所有請(qǐng)求,都需要有all范圍(scope) .antMatchers( "/**" ).access( "#oauth2.hasScope('user')" ). anyRequest().authenticated().and().csrf() .disable(); } @Bean public PasswordEncoder passwordEncoder() { return new BCryptPasswordEncoder(); } } |
AuthExceptionEntryPointConfig,CustomAccessDeniedHandlerConfig
用于異常返回前端json
1
2
3
4
5
6
7
8
9
10
11
12
13
14
15
16
|
@Component public class CustomAccessDeniedHandlerConfig implements AccessDeniedHandler { @Override public void handle(HttpServletRequest request, HttpServletResponse response, AccessDeniedException accessDeniedException) throws IOException, ServletException { response.setStatus(HttpStatus.OK.value()); response.setHeader( "Content-Type" , "application/json;charset=UTF-8" ); try { Result result = new Result( 403 , "權(quán)限不足" ); response.getWriter().write( new ObjectMapper().writeValueAsString(result)); } catch (IOException e) { e.printStackTrace(); } } } |
1
2
3
4
5
6
7
8
9
10
11
12
13
14
15
16
17
18
19
20
21
22
23
24
25
26
27
28
29
|
@Component public class AuthExceptionEntryPointConfig implements AuthenticationEntryPoint{ private final static Logger logger = LoggerFactory.getLogger(AuthExceptionEntryPointConfig. class ); @Value ( "${security.redirect-url}" ) private String redirectUrl; @Override public void commence(HttpServletRequest request, HttpServletResponse response, AuthenticationException authException) { Throwable cause = authException.getCause(); response.setStatus(HttpStatus.OK.value()); response.setHeader( "Content-Type" , "application/json;charset=UTF-8" ); Result result; try { if (cause instanceof InvalidTokenException) { result = new Result( 402 , "認(rèn)證失敗,無(wú)效或過(guò)期token" ); response.getWriter().write( new ObjectMapper().writeValueAsString(result)); } else { result = new Result( 401 , "認(rèn)證失敗,沒(méi)有攜帶token" ); response.sendRedirect(redirectUrl); } } catch (IOException e) { e.printStackTrace(); } } } |
TokenConfig
不多說(shuō)
1
2
3
4
5
6
7
8
9
10
11
12
13
14
15
|
@Configuration public class TokenConfig{ /** * 使用redis存儲(chǔ) */ @Autowired private RedisConnectionFactory redisConnectionFactory; @Bean public TokenStore tokenStore() { return new RedisTokenStore(redisConnectionFactory); } } |
application.yml
那么小伙伴又問(wèn)了 既然網(wǎng)關(guān)驗(yàn)證token的有效性 那么資源服務(wù)器是不是就不用驗(yàn)證啦 答案是否 因?yàn)椴惶砑优渲?會(huì)報(bào)錯(cuò) 同樣需要在application中添加以下配置
其他配置也spirng boot為準(zhǔn) 這里不多說(shuō)
1
2
3
4
5
6
7
|
security: oauth2: client: client-id: user-vue client-secret: 1234 resource: token-info-uri: http: //localhost:8001/oauth/check_token |
到此這篇關(guān)于spring cloud ouath2中的資源服務(wù)器的文章就介紹到這了,更多相關(guān)spring cloud ouath2資源服務(wù)器內(nèi)容請(qǐng)搜索服務(wù)器之家以前的文章或繼續(xù)瀏覽下面的相關(guān)文章希望大家以后多多支持服務(wù)器之家!
原文鏈接:https://blog.csdn.net/qq_20143059/article/details/113766105