SaTokenConfigure.java 6.4 KB

123456789101112131415161718192021222324252627282930313233343536373839404142434445464748495051525354555657585960616263646566676869707172737475767778798081828384858687888990919293949596979899100101102103104105106107108109110111112113114115116117118119120121122123124125126127128129130131132133134135136
  1. package com.fdkankan.manage.config;
  2. import cn.dev33.satoken.context.SaHolder;
  3. import cn.dev33.satoken.exception.NotLoginException;
  4. import cn.dev33.satoken.exception.NotPermissionException;
  5. import cn.dev33.satoken.exception.NotRoleException;
  6. import cn.dev33.satoken.filter.SaServletFilter;
  7. import cn.dev33.satoken.jwt.StpLogicJwtForMixin;
  8. import cn.dev33.satoken.router.SaRouter;
  9. import cn.dev33.satoken.stp.StpLogic;
  10. import cn.dev33.satoken.stp.StpUtil;
  11. import com.alibaba.fastjson.JSONArray;
  12. import com.alibaba.fastjson.JSONObject;
  13. import com.alibaba.nacos.common.utils.HttpMethod;
  14. import com.fdkankan.common.util.SecurityUtil;
  15. import com.fdkankan.manage.common.RedisKeyUtil;
  16. import com.fdkankan.manage.common.ResultCode;
  17. import com.fdkankan.manage.exception.BusinessException;
  18. import com.fdkankan.manage.common.ResultData;
  19. import com.fdkankan.manage.service.ISysMenuService;
  20. import com.fdkankan.redis.constant.RedisKey;
  21. import com.fdkankan.redis.util.RedisUtil;
  22. import lombok.extern.slf4j.Slf4j;
  23. import org.apache.commons.lang3.StringUtils;
  24. import org.springframework.beans.factory.annotation.Autowired;
  25. import org.springframework.context.annotation.Bean;
  26. import org.springframework.context.annotation.Configuration;
  27. import java.util.HashMap;
  28. import java.util.List;
  29. @Configuration
  30. @Slf4j
  31. public class SaTokenConfigure {
  32. public static HashMap<String, JSONObject> manageMenuUrl = new HashMap<>();
  33. public static HashMap<String, JSONObject> manageMenuId = new HashMap<>();
  34. @Autowired
  35. RedisUtil redisUtil;
  36. @Autowired
  37. ISysMenuService sysMenuService;
  38. // 注册Sa-Token的拦截器
  39. @Bean
  40. public SaServletFilter getSaServletFilter() {
  41. return new SaServletFilter()
  42. // 指定 拦截路由 与 放行路由
  43. .addInclude("/**").addExclude("/**/reMyselfPassword","/**/test/**","/**/inner/**","/**/feedback/h5/**")
  44. // 认证函数: 每次请求执行
  45. .setAuth(obj -> {
  46. // 登录认证 -- 拦截所有路由,并排除/user/doLogin 用于开放登录
  47. SaRouter.match("/**", "/service/manage/login", r ->checkLogin() );
  48. String menu = redisUtil.get(RedisKey.MANAGE_MENU);
  49. if(StringUtils.isBlank(menu)){
  50. SaRouter.match("/**", r -> StpUtil.checkRole("super-admin"));
  51. return;
  52. }
  53. JSONArray menuArray = JSONObject.parseArray(menu);
  54. for (Object o : menuArray) {
  55. JSONObject jsonObject = (JSONObject) o;
  56. String url = jsonObject.getString("url");
  57. String perm = jsonObject.getString("perms");
  58. if(StringUtils.isEmpty(url) || StringUtils.isEmpty(perm)){
  59. continue;
  60. }
  61. manageMenuId.put(jsonObject.getString("id"),jsonObject);
  62. manageMenuUrl.put(jsonObject.getString("url"),jsonObject);
  63. if(StpUtil.hasRole("super-admin")){
  64. continue;
  65. }
  66. SaRouter.match(url, r -> StpUtil.checkPermission(perm));
  67. }
  68. })
  69. // 异常处理函数:每次认证函数发生异常时执行此函数
  70. .setError(e -> {
  71. SaHolder.getResponse().setHeader("Content-Type", "application/json;charset=UTF-8");
  72. ResultData aj ;
  73. if (e instanceof NotLoginException) { // 如果是未登录异常
  74. NotLoginException ee = (NotLoginException) e;
  75. aj = ResultData.error(ResultCode.USER_NOT_LOGIN.code(),ResultCode.USER_NOT_LOGIN.message());
  76. }
  77. else if(e instanceof NotRoleException) { // 如果是角色异常
  78. NotRoleException ee = (NotRoleException) e;
  79. aj = ResultData.error(ResultCode.NOT_ROLE.code(),ResultCode.NOT_ROLE.message());
  80. }
  81. else if(e instanceof NotPermissionException) { // 如果是权限异常
  82. NotPermissionException ee = (NotPermissionException) e;
  83. aj = ResultData.error(ResultCode.NOT_PERMISSION.code(),ResultCode.NOT_PERMISSION.message());
  84. }
  85. else if(e instanceof BusinessException) { // 如果是权限异常
  86. BusinessException ee = (BusinessException) e;
  87. aj = ResultData.error(ee.getCode(),ee.getMessage());
  88. }
  89. else { // 普通异常, 输出:500 + 异常信息
  90. aj = ResultData.error(ResultCode.SYSTEM_ERROR.code(),ResultCode.SYSTEM_ERROR.message());
  91. }
  92. return JSONObject.toJSONString(aj);
  93. })
  94. // 前置函数:在每次认证函数之前执行
  95. .setBeforeAuth(r -> {
  96. // ---------- 设置一些安全响应头 ----------
  97. SaHolder.getResponse()
  98. .setHeader("Access-Control-Allow-Origin", "*")
  99. .setHeader("Access-Control-Allow-Methods", "*")
  100. .setHeader("Access-Control-Max-Age", "3600")
  101. .setHeader("Access-Control-Allow-Headers", "*")
  102. .setServer("4dkk");
  103. // 跳过对 OPTIONS 请求的检查,否则这里会鉴权失败,导致 springboot 配置的 addCorsMappings 跨域不执行
  104. if (SaHolder.getRequest().getMethod().equals(HttpMethod.OPTIONS.toString())) {
  105. SaRouter.back();
  106. }
  107. });
  108. }
  109. private void checkLogin(){
  110. if(!redisUtil.hasKey(String.format(RedisKeyUtil.loginToken,StpUtil.getTokenValue()))){
  111. throw new BusinessException(ResultCode.USER_NOT_LOGIN);
  112. }
  113. redisUtil.expire(String.format(RedisKeyUtil.loginToken,StpUtil.getTokenValue()),21600);
  114. StpUtil.checkLogin();
  115. }
  116. //Sa-Token 整合 jwt
  117. //Stateless 无状态模式 纯jwt
  118. //Mixin 混入模式 jwt 与 Redis 逻辑混合
  119. //Simple 简单模式 Token风格替换
  120. @Bean
  121. public StpLogic getStpLogicJwt() {
  122. return new StpLogicJwtForMixin();
  123. }
  124. }