Spring boot整合Spring Security實現驗證碼登陸
驗證碼登陸在日常使用軟件中是很常見的,甚至可以說超過了密碼登陸。
如何通過Spring Security框架實現驗證碼登陸,並且登陸成功之后也同樣返回和密碼登陸類似的token?
- 先看一張Spring Security攔截請求的流程圖

可以發現Spring Security默認有用戶名密碼登陸攔截器,查看 UsernamePasswordAuthenticationFilter 實現了 AbstractAuthenticationProcessingFilter類 。根據UsernamePasswordAuthenticationFilter的設計模式可以在Spring security的基礎上拓展自己的攔截器,實現相應的功能。
- 新增一個 SmsCodeAuthenticationToken 實體類,需要繼承IrhAuthenticationToken,而IrhAuthenticationToken繼承了 AbstractAuthenticationToken 用來封裝驗證碼登陸時需要的信息,並且自定義一個AuthenticationToken的父類的作用就是用來在管理在具有多種登陸方式的系統中,能記錄最核心的兩個信息,一個是用戶身份,一個是登陸口令;並且在后期能直接向上轉型而不報錯。
package top.imuster.auth.config;
import org.springframework.security.core.GrantedAuthority;
import java.util.Collection;
/**
* @ClassName: SmsCodeAuthenticationToken
* @Description: 驗證碼登錄驗證信息封裝類
* @author: hmr
* @date: 2020/4/30 13:59
*/
public class SmsCodeAuthenticationToken extends IrhAuthenticationToken {
public SmsCodeAuthenticationToken(Object principal, Object credentials) {
super(principal, credentials);
}
public SmsCodeAuthenticationToken(Object principal, Object credentials, Collection<? extends GrantedAuthority> authorities) {
super(principal, credentials, authorities);
}
}
package top.imuster.auth.config;
import org.springframework.security.authentication.AbstractAuthenticationToken;
import org.springframework.security.core.GrantedAuthority;
import java.util.Collection;
/**
* @Author hmr
* @Description 自定義AbstractAuthenticationToken
* @Date: 2020/5/1 13:51
* @param irh平台的認證實體類 可以通過繼承該類來實現不同的登錄邏輯
* @reture:
**/
public class IrhAuthenticationToken extends AbstractAuthenticationToken {
private static final long serialVersionUID = 110L;
//用戶信息
protected final Object principal;
//密碼或者郵箱驗證碼
protected Object credentials;
/**
* This constructor can be safely used by any code that wishes to create a
* <code>UsernamePasswordAuthenticationToken</code>, as the {@link
* #isAuthenticated()} will return <code>false</code>.
*
*/
public IrhAuthenticationToken(Object principal, Object credentials) {
super(null);
this.principal = principal;
this.credentials = credentials;
this.setAuthenticated(false);
}
/**
* This constructor should only be used by <code>AuthenticationManager</code> or <code>AuthenticationProvider</code>
* implementations that are satisfied with producing a trusted (i.e. {@link #isAuthenticated()} = <code>true</code>)
* token token.
*
* @param principal
* @param credentials
* @param authorities
*/
public IrhAuthenticationToken(Object principal, Object credentials, Collection<? extends GrantedAuthority> authorities) {
super(authorities);
this.principal = principal;
this.credentials = credentials;
super.setAuthenticated(true);
}
@Override
public Object getCredentials() {
return this.credentials;
}
@Override
public Object getPrincipal() {
return this.principal;
}
public void setAuthenticated(boolean isAuthenticated) throws IllegalArgumentException {
if(isAuthenticated) {
throw new IllegalArgumentException("Cannot set this token to trusted - use constructor which takes a GrantedAuthority list instead");
} else {
super.setAuthenticated(false);
}
}
public void eraseCredentials() {
super.eraseCredentials();
this.credentials = null;
}
}


- 繼承AbstractAuthenticationProcessingFilter之后就可以將自定義的Filter假如到過濾器鏈中。所以自定義一個 SmsAuthenticationFilter 類並且繼承 AbstractAuthenticationProcessingFilter 類,並且該Filter中只校驗輸入參數是否正確,如果不完整,則拋出 AuthenticationServiceException異常,如果拋出自定義異常,會被Security框架處理。用原生異常可以設置異常信息,直接返回給前端。
package top.imuster.auth.component.login;
import org.apache.commons.lang3.StringUtils;
import org.slf4j.Logger;
import org.slf4j.LoggerFactory;
import org.springframework.beans.factory.annotation.Autowired;
import org.springframework.security.authentication.AuthenticationManager;
import org.springframework.security.authentication.AuthenticationServiceException;
import org.springframework.security.core.Authentication;
import org.springframework.security.core.AuthenticationException;
import org.springframework.security.web.authentication.AbstractAuthenticationProcessingFilter;
import org.springframework.security.web.util.matcher.AntPathRequestMatcher;
import top.imuster.auth.config.SecurityConstants;
import top.imuster.auth.config.SmsCodeAuthenticationToken;
import javax.servlet.ServletException;
import javax.servlet.http.HttpServletRequest;
import javax.servlet.http.HttpServletResponse;
import java.io.IOException;
/**
* @ClassName: SmsCodeAuthenticationFilter
* @Description: 自定義攔截器,攔截登錄請求中的登錄類型
* @author: hmr
* @date: 2020/4/30 12:16
*/
public class SmsCodeAuthenticationFilter extends AbstractAuthenticationProcessingFilter {
private static final Logger log = LoggerFactory.getLogger(SmsCodeAuthenticationFilter.class);
private static final String POST = "post";
private boolean postOnly = true;
public SmsCodeAuthenticationFilter(){
super(new AntPathRequestMatcher("/emailCodeLogin", "POST"));
}
@Autowired
AuthenticationManager authenticationManager;
@Override
@Autowired
public void setAuthenticationManager(AuthenticationManager authenticationManager) {
super.setAuthenticationManager(authenticationManager);
}
@Override
public Authentication attemptAuthentication(HttpServletRequest httpServletRequest, HttpServletResponse httpServletResponse) throws AuthenticationException, IOException, ServletException {
if(postOnly && !POST.equalsIgnoreCase(httpServletRequest.getMethod())){
throw new AuthenticationServiceException("不允許{}這種的請求方式: " + httpServletRequest.getMethod());
}
//郵箱地址
String loginName = obtainParameter(httpServletRequest, SecurityConstants.LOGIN_PARAM_NAME);
//驗證碼
String credentials = obtainParameter(httpServletRequest, SecurityConstants.EMAIL_VERIFY_CODE);
loginName = loginName.trim();
if(StringUtils.isBlank(loginName)) throw new AuthenticationServiceException("登錄名不能為空");
if(StringUtils.isBlank(credentials)) throw new AuthenticationServiceException("驗證碼不能為空");
SmsCodeAuthenticationToken authenticationToken = new SmsCodeAuthenticationToken(loginName, credentials); //將輸入的信息封裝成一個SmsCodeAuthenicationToken對象,並向后傳遞
setDetails(httpServletRequest, authenticationToken);
return authenticationManager.authenticate(authenticationToken);
}
private void setDetails(HttpServletRequest request,
SmsCodeAuthenticationToken authRequest) {
authRequest.setDetails(authenticationDetailsSource.buildDetails(request));
}
/**
* @Author hmr
* @Description 從request中獲得參數
* @Date: 2020/4/30 12:22
* @param request
* @reture: java.lang.String
**/
protected String obtainParameter(HttpServletRequest request, String type){
return request.getParameter(type);
}
}
- 設置了Filter攔截到登陸請求之后,還需要一個具體的校驗驗證碼是否正確的類 SmsAuthenticationProvider,該類才是具體的業務代碼
package top.imuster.auth.component.login;
import org.apache.commons.lang3.StringUtils;
import org.slf4j.Logger;
import org.slf4j.LoggerFactory;
import org.springframework.beans.factory.annotation.Autowired;
import org.springframework.data.redis.core.RedisTemplate;
import org.springframework.security.authentication.AuthenticationProvider;
import org.springframework.security.authentication.AuthenticationServiceException;
import org.springframework.security.core.Authentication;
import org.springframework.security.core.AuthenticationException;
import top.imuster.auth.config.SmsCodeAuthenticationToken;
import top.imuster.common.core.utils.RedisUtil;
/**
* @ClassName: IrhAuthenticationProvider
* @Description: IrhAuthenticationProvider
* @author: hmr
* @date: 2020/4/30 14:36
*/
public class SmsAuthenticationProvider implements AuthenticationProvider {
private final Logger log = LoggerFactory.getLogger(this.getClass());
@Autowired
RedisTemplate redisTemplate;
@Override
public Authentication authenticate(Authentication authentication) throws AuthenticationException {
SmsCodeAuthenticationToken authenticationToken = (SmsCodeAuthenticationToken) authentication; //先將authentication強轉成SmsCodeAuthenticationToken
//登錄名
String loginName = authenticationToken.getPrincipal() == null?"NONE_PROVIDED":authentication.getName();
//驗證碼
String verify = (String)authenticationToken.getCredentials();
String redisCode = (String)redisTemplate.opsForValue().get(RedisUtil.getConsumerLoginByEmail(loginName)); //從redis中獲得申請到的驗證碼
if(StringUtils.isEmpty(redisCode) || !verify.equalsIgnoreCase(redisCode)){
throw new AuthenticationServiceException("驗證碼失效或者錯誤");
}
return authentication;
}
@Override
public boolean supports(Class<?> aClass) {
return (SmsCodeAuthenticationToken.class.isAssignableFrom(aClass));
}
}
並且在一個繼承了 WebSecurityConfigurerAdapter的類中將Filter和Provide聲明成Bean
package top.imuster.auth.config;
import org.springframework.context.annotation.Bean;
import org.springframework.context.annotation.Configuration;
import org.springframework.core.annotation.Order;
import org.springframework.security.authentication.AuthenticationManager;
import org.springframework.security.authentication.ProviderManager;
import org.springframework.security.config.annotation.web.builders.HttpSecurity;
import org.springframework.security.config.annotation.web.builders.WebSecurity;
import org.springframework.security.config.annotation.web.configuration.EnableWebSecurity;
import org.springframework.security.config.annotation.web.configuration.WebSecurityConfigurerAdapter;
import top.imuster.auth.component.login.*;
import top.imuster.auth.service.Impl.UsernameUserDetailsServiceImpl;
import java.util.Arrays;
@Configuration
@EnableWebSecurity
@Order(2147483636)
class WebSecurityConfig extends WebSecurityConfigurerAdapter {
@Bean
public SmsCodeAuthenticationFilter smsCodeAuthenticationFilter(){
SmsCodeAuthenticationFilter smsCodeAuthenticationFilter = new SmsCodeAuthenticationFilter();
try {
smsCodeAuthenticationFilter.setAuthenticationManager(this.authenticationManager());
} catch (Exception e) {
e.printStackTrace();
}
smsCodeAuthenticationFilter.setAuthenticationSuccessHandler(irhAuthenticationSuccessHandler());
smsCodeAuthenticationFilter.setAuthenticationFailureHandler(irhAuthenticationFailHandler());
return smsCodeAuthenticationFilter;
}
@Bean
public SmsAuthenticationProvider smsAuthenticationProvider(){
SmsAuthenticationProvider provider = new SmsAuthenticationProvider();
// 設置userDetailsService
// 禁止隱藏用戶未找到異常
return provider;
}
@Bean
@Override
public AuthenticationManager authenticationManager() throws Exception {
ProviderManager authenticationManager = new ProviderManager(Arrays.asList(smsAuthenticationProvider()));
return authenticationManager;
}
}
說明:Filter是用來攔截Request請求,並且從request請求中將指定的信息提取出來,判斷一些必要信息是否存在,不對信息進行校驗,校驗信息合法之后將其封裝到token中,向后傳遞給provide如;provider則
將filter中得到的信息進行校驗,在provider中,主要要注意的就是需要重寫 supports(Class<?> aClass) 方法,該方法的作用就是假如在系統中有多個filter,並且向后傳遞了多個不同的token,那么對應的token只能傳遞到對應的provider中,所以該方法返回到是一個boolean類型,用來給Spring Security決策是否需要進入該provider。
- 獲取驗證碼
/**
* @Author hmr
* @Description 發送email驗證碼
* @Date: 2020/4/30 10:12
* @param email 接受code的郵箱
* @param type 1-注冊 2-登錄 3-忘記密碼
* @reture: top.imuster.common.base.wrapper.Message<java.lang.String>
**/
@ApiOperation(value = "發送email驗證碼",httpMethod = "GET")
@Idempotent(submitTotal = 5, timeTotal = 30, timeUnit = TimeUnit.MINUTES)
@GetMapping("/sendCode/{type}/{email}")
public Message<String> getCode(@ApiParam("郵箱地址") @PathVariable("email") String email, @PathVariable("type") Integer type) throws Exception {
if(type != 1 && type != 2 && type != 3 && type != 4){
return Message.createByError("參數異常,請刷新后重試");
}
userLoginService.getCode(email, type);
return Message.createBySuccess();
}
具體代碼我已經開源到GitHub上,倉庫地址為https://github.com/HMingR/irh,該項目中還有利用Spring security實現微信小程序登陸,用戶名密碼登陸等。

