介绍:
在当今的数字景观中,确保应用程序至关重要。一种强大的方法是JWT(JSON Web令牌)身份验证。它提供了验证用户身份的安全方法。在本指南中,我们将使用简化但有效的方法进行春季启动应用程序中的JWT身份验证。我们将介绍控制器,服务,配置和存储库,以确保您有能力提高应用程序的安全性。
ð步骤1:设置春季启动项目
首先创建一个新的Spring Boot项目或使用现有的项目。通过使用Spring Initializr来加快该过程,该过程设置了诸如Spring Web,Spring Security和Spring Data JPA等基本依赖性。
<!-- Include necessary dependencies in your pom.xml file -->
<dependencies>
<!-- Spring Web for creating web APIs -->
<dependency>
<groupId>org.springframework.boot</groupId>
<artifactId>spring-boot-starter-web</artifactId>
</dependency>
<!-- Spring Security for robust authentication and authorization -->
<dependency>
<groupId>org.springframework.boot</groupId>
<artifactId>spring-boot-starter-security</artifactId>
</dependency>
<!-- Spring Data JPA for streamlined database interactions -->
<dependency>
<groupId>org.springframework.boot</groupId>
<artifactId>spring-boot-starter-data-jpa</artifactId>
</dependency>
<dependency>
<groupId>io.jsonwebtoken</groupId>
<artifactId>jjwt</artifactId>
<version>0.9.1</version>
</dependency>
<!-- Other dependencies... -->
</dependencies>
¦ 步骤2:制作用户实体和存储库
设计一个User
类包含id
,username
和password
之类的属性。开发一个UserRepository
接口以促进流畅的用户数据管理。
@Entity
public class User {
@Id
@GeneratedValue(strategy = GenerationType.IDENTITY)
private Long id;
private String username;
private String password;
// Getters, setters...
}
public interface UserRepository extends JpaRepository<User, Long> {
User findByUsername(String username);
}
ð步骤3:配置弹簧安全
创建一个扩展WebSecurityConfigurerAdapter
的SecurityConfig
类。覆盖configure(HttpSecurity http)
以建立安全规则并管理JWT身份验证。
@Configuration
@EnableWebSecurity
public class SecurityConfig extends WebSecurityConfigurerAdapter {
@Autowired
private UserDetailsService userDetailsService;
@Autowired
private JwtUtil jwtUtil;
@Override
protected void configure(HttpSecurity http) throws Exception {
http.csrf().disable()
.authorizeRequests()
.antMatchers("/api/auth/**").permitAll()
.anyRequest().authenticated()
.and()
.addFilter(new JwtAuthenticationFilter(authenticationManager(), jwtUtil))
.addFilter(new JwtAuthorizationFilter(authenticationManager(), jwtUtil, userDetailsService));
}
// Additional configurations...
}
ðä步骤4:实施UserService
开发使用用户名加载用户并保存新用户的方法的UserService
接口。实现UserDetailsService
从数据库中检索用户详细信息。
@Service
public interface UserService extends UserDetailsService {
UserDetails loadUserByUsername(String username);
void saveUser(User user);
}
@Service
public class UserServiceImpl implements UserService {
@Autowired
private UserRepository userRepository;
@Override
public UserDetails loadUserByUsername(String username) throws UsernameNotFoundException {
User user = userRepository.findByUsername(username);
if (user == null) {
throw new UsernameNotFoundException("User not found: " + username);
}
return new org.springframework.security.core.userdetails.User(
user.getUsername(),
user.getPassword(),
new ArrayList<>()
);
}
@Override
public void saveUser(User user) {
userRepository.save(user);
}
}
ð步骤5:生成和验证JWT令牌
创建一个JwtUtil
类来生成和验证JWT令牌。
import io.jsonwebtoken.Claims;
import io.jsonwebtoken.Jwts;
import io.jsonwebtoken.SignatureAlgorithm;
import org.springframework.stereotype.Component;
import java.util.Date;
import java.util.HashMap;
import java.util.Map;
import java.util.function.Function;
@Component
public class JwtUtil {
private final String SECRET = "your-secret-key"; // Replace with a secure secret key
private final long EXPIRATION_TIME = 900_000; // 15 minutes
public String extractUsername(String token) {
return extractClaim(token, Claims::getSubject);
}
public Date extractExpiration(String token) {
return extractClaim(token, Claims::getExpiration);
}
public <T> T extractClaim(String token, Function<Claims, T> claimsResolver) {
final Claims claims = extractAllClaims(token);
return claimsResolver.apply(claims);
}
private Claims extractAllClaims(String token) {
return Jwts.parser().setSigningKey(SECRET).parseClaimsJws(token).getBody();
}
public String generateToken(String username) {
Map<String, Object> claims = new HashMap<>();
return createToken(claims, username);
}
private String createToken(Map<String, Object> claims, String subject) {
return Jwts.builder()
.setClaims(claims)
.setSubject(subject)
.setIssuedAt(new Date(System.currentTimeMillis()))
.setExpiration(new Date(System.currentTimeMillis() + EXPIRATION_TIME))
.signWith(SignatureAlgorithm.HS256, SECRET)
.compact();
}
public boolean isTokenExpired(String token) {
return extractExpiration(token).before(new Date());
}
public boolean validateToken(String token, UserDetails userDetails) {
final String username = extractUsername(token);
return (username.equals(userDetails.getUsername()) && !isTokenExpired(token));
}
// Additional utility methods...
}
ð步骤6:身份验证控制器
设计一个AuthController
类来处理用户注册和身份验证。
@RestController
@RequestMapping("/api/auth")
public class AuthController {
@Autowired
private AuthenticationManager authenticationManager;
@Autowired
private UserService userService;
@Autowired
private JwtUtil jwtUtil;
@PostMapping("/register")
public ResponseEntity<String> registerUser(@RequestBody User user) {
userService.saveUser(user);
return ResponseEntity.ok("User registered successfully!");
}
@PostMapping("/login")
public ResponseEntity<String> loginUser(@RequestBody AuthenticationRequest request) {
try {
authenticationManager.authenticate(
new UsernamePasswordAuthenticationToken(request.getUsername(), request.getPassword())
);
} catch (BadCredentialsException e) {
return ResponseEntity.status(HttpStatus.UNAUTHORIZED).body("Invalid username or password");
}
UserDetails userDetails = userService.loadUserByUsername(request.getUsername());
String token = jwtUtil.generateToken(userDetails);
return ResponseEntity.ok(token);
}
}
ð步骤7:实施JWTauthenticationFilter
创建一个JwtAuthenticationFilter
类来处理每个请求的JWT身份验证和授权。
@Component
public class JwtAuthenticationFilter extends OncePerRequestFilter {
@Autowired
private UserDetailsService userDetailsService;
@Autowired
private JwtUtil jwtTokenUtil;
@Override
protected void doFilterInternal(HttpServletRequest request, HttpServletResponse response, FilterChain filterChain)
throws ServletException, IOException {
final String authorizationHeader = request.getHeader("Authorization");
String username = null;
String jwtToken = null;
if (authorizationHeader != null && authorizationHeader.startsWith("Bearer ")) {
jwtToken = authorizationHeader.substring(7);
try {
username = jwtTokenUtil.extractUsername(jwtToken);
} catch (Exception e) {
// Handle token extraction/validation errors
System.out.println("Error extracting username from token: " + e.getMessage());
}
}
if (username != null && SecurityContextHolder.getContext().getAuthentication() == null) {
UserDetails userDetails = userDetailsService.loadUserByUsername(username);
if (jwtTokenUtil.validateToken(jwtToken, userDetails)) {
UsernamePasswordAuthenticationToken authenticationToken = new UsernamePasswordAuthenticationToken(
userDetails, null, userDetails.getAuthorities());
authenticationToken.setDetails(new WebAuthenticationDetailsSource().buildDetails(request));
SecurityContextHolder.getContext().setAuthentication(authenticationToken);
}
}
filterChain.doFilter(request, response);
}
}
ð结论
您已经在Spring Boot应用程序中成功实现了JWT身份验证! ð您的应用程序现在拥有更高的安全性,可确保仅授权用户访问敏感资源。请记住,安全是一个持续的旅程,因此请继续了解最佳实践并不断增强应用程序的防御能力。愉快的编码并保持安全! ðð