【转】Spring security3 sec:authorize url 无效的问题

    原贴地址:http://my.oschina.net/u/2259804/blog/476044


    转载注:在需要用SS控制界面元素的显示隐藏,而又无法为sec:authorize标签提供一个确定的Role列表(这通常出现在系统的角色有增、减需求的场合),则可以使用下面的方法解决问题。

    如果项目里SS的权限控制已经完备,那么只需要做第1步就好了。记住将ref指向的过滤器改成自己的。

    Spring security3 sec:authorize url 无效的问题

    发表于2个月前(2015-07-08 10:44)   阅读( 85) | 评论( 1)  0人收藏此文章, 我要收藏
    0

    9月19日成都 OSC 源创会正在报名,送机械键盘和开源无码内裤  

    sexurity的xml文件里

    1、在<http auto-config="true">上面加上如下代码

    ?
    1
    2
    3
    < beans:bean  id = "customWebInvocationPrivilegeEvaluator"  class = "org.springframework.security.web.access.DefaultWebInvocationPrivilegeEvaluator" >  
             < beans:constructor-arg  name = "securityInterceptor"  ref = "filterSecurityInterceptor"  />  
         </ beans:bean >

    2、ref="filterSecurityInterceptor" 这里是自定义的过滤器

    ?
    1
    2
    3
    4
    5
    6
    7
    8
    9
    10
    11
    12
    13
    14
    15
    16
    17
    < beans:bean  id = "filterSecurityInterceptor"
         class = "org.springframework.security.web.access.intercept.FilterSecurityInterceptor"  autowire = "byType" >
         < beans:property  name = "securityMetadataSource"  ref = "filterInvocationSecurityMetadataSource"  />
         < beans:property  name = "authenticationManager"  ref = "org.springframework.security.authenticationManager" />
    </ beans:bean >
     
    < beans:bean  id = "filterInvocationSecurityMetadataSource"
         class = "com.iqilu.security.JdbcFilterInvocationDefinitionSourceFactoryBean" >
         < beans:property  name = "dataSource"  ref = "dataSource" />
         < beans:property  name = "resourceQuery"  value="
                 select re.c_res_string,r.c_name 
                 from t_role r 
                 join t_resc_role rr on  r.C_ID = rr .C_ROLE_ID 
                 join t_resc re on  re.C_ID = rr .C_RESC_ID 
                 order by re.c_priority
         "/>
    </ beans:bean >


    完整的配置:

    ?
    1
    2
    3
    4
    5
    6
    7
    8
    9
    10
    11
    12
    13
    14
    15
    16
    17
    18
    19
    20
    21
    22
    23
    24
    25
    26
    27
    28
    29
    30
    31
    32
    33
    34
    35
    36
    37
    38
    39
    40
    41
    42
    43
    44
    45
    46
    47
    48
    49
    50
    51
    52
    53
    54
    55
    56
    57
    58
    59
    60
    61
    62
    63
    64
    <? xml  version = "1.0"  encoding = "UTF-8" ?>  
    < beans:beans  xmlns = "http://www.springframework.org/schema/security"   
         xmlns:beans = "http://www.springframework.org/schema/beans"   
         xmlns:xsi = "http://www.w3.org/2001/XMLSchema-instance"   
         xsi:schemaLocation="http://www.springframework.org/schema/beans   
             http://www.springframework.org/schema/beans/spring-beans-3.0.xsd   
             http://www.springframework.org/schema/security   
             http://www.springframework.org/schema/security/spring-security-3.1.xsd">  
             
         < beans:bean  id = "customWebInvocationPrivilegeEvaluator"  class = "org.springframework.security.web.access.DefaultWebInvocationPrivilegeEvaluator" >  
             < beans:constructor-arg  name = "securityInterceptor"  ref = "filterSecurityInterceptor"  />  
         </ beans:bean >      
         
         <!-- 对于一些css、js、图片等文件不进行过滤 -->
         < http  pattern = "/css/**"  security = "none"  />
         < http  pattern = "/js/**"  security = "none"  />
         < http  pattern = "/images/**"  security = "none"  />
         < http  pattern = "/themes/**"  security = "none"  />
         < http  auto-config = "true"  access-denied-page = "/accessDenied.jsp" >
             < intercept-url  pattern = "/login.jsp"  access = "IS_AUTHENTICATED_ANONYMOUSLY"  />
             < intercept-url  pattern = "/upload.jsp"  access = "ROLE_ADMIN"  />
             < intercept-url  pattern = "/**"  access = "ROLE_USER,ROLE_ADMIN"  />
             < form-login  login-page = "/login.jsp"
                 authentication-failure-url = "/login.jsp?error=true"
                 default-target-url = "/index.jsp"  />
             < logout  invalidate-session = "true"  
                logout-success-url = "/login.jsp"  
                logout-url = "/j_spring_security_logout" />
             < custom-filter  ref = "filterSecurityInterceptor"  before = "FILTER_SECURITY_INTERCEPTOR"  />
         </ http >  
         
         <!-- 认证管理器 -->
         < authentication-manager >
             < authentication-provider >
                 < jdbc-user-service  data-source-ref = "dataSource"
                     users-by-username-query = "select C_ACCOUNT as username,C_PASSWORD as password, 1  as enabled from t_user where C_ACCOUNT=?"
                     authorities-by-username-query="select u.C_ACCOUNT as username,r.c_name as authority 
                         from t_user u
                         join t_user_role ur
                         on  u.C_BH = ur .c_user_id
                         join t_role r
                         on  r.c_id = ur .c_role_id
                         where u.C_ACCOUNT=?"/>
             </ authentication-provider >
         </ authentication-manager >
         
         < beans:bean  id = "filterSecurityInterceptor"
             class = "org.springframework.security.web.access.intercept.FilterSecurityInterceptor"  autowire = "byType" >
             < beans:property  name = "securityMetadataSource"  ref = "filterInvocationSecurityMetadataSource"  />
             < beans:property  name = "authenticationManager"  ref = "org.springframework.security.authenticationManager" />
         </ beans:bean >
     
         < beans:bean  id = "filterInvocationSecurityMetadataSource"
             class = "com.iqilu.security.JdbcFilterInvocationDefinitionSourceFactoryBean" >
             < beans:property  name = "dataSource"  ref = "dataSource" />
             < beans:property  name = "resourceQuery"  value="
                 select re.c_res_string,r.c_name 
                 from t_role r 
                 join t_resc_role rr on  r.C_ID = rr .C_ROLE_ID 
                 join t_resc re on  re.C_ID = rr .C_RESC_ID 
                 order by re.c_priority
             "/>
         </ beans:bean >
    </ beans:beans >

    4、过滤器代码:

    ?
    1
    2
    3
    4
    5
    6
    7
    8
    9
    10
    11
    12
    13
    14
    15
    16
    17
    18
    19
    20
    21
    22
    23
    24
    25
    26
    27
    28
    29
    30
    31
    32
    33
    34
    35
    36
    37
    38
    39
    40
    41
    42
    43
    44
    45
    46
    47
    48
    49
    50
    51
    52
    53
    54
    55
    56
    57
    58
    59
    60
    61
    62
    63
    64
    65
    66
    67
    68
    69
    70
    71
    72
    73
    74
    75
    76
    77
    78
    79
    80
    81
    82
    83
    84
    85
    86
    87
    88
    89
    90
    91
    92
    93
    94
    95
    96
    97
    98
    99
    100
    101
    102
    103
    104
    105
    106
    107
    108
    109
    110
    111
    112
    113
    114
    115
    116
    117
    118
    119
    120
    121
    package  com.iqilu.security;
     
    import  java.sql.ResultSet;
    import  java.sql.SQLException;
    import  java.util.Collection;
    import  java.util.LinkedHashMap;
    import  java.util.List;
    import  java.util.Map;
     
    import  javax.sql.DataSource;
     
    import  org.springframework.beans.factory.FactoryBean;
    import  org.springframework.jdbc.core.support.JdbcDaoSupport;
    import  org.springframework.jdbc.object.MappingSqlQuery;
    import  org.springframework.security.access.ConfigAttribute;
    import  org.springframework.security.access.ConfigAttributeEditor;
    import  org.springframework.security.web.access.intercept.DefaultFilterInvocationSecurityMetadataSource;
    import  org.springframework.security.web.access.intercept.FilterInvocationSecurityMetadataSource;
    import  org.springframework.security.web.util.AntPathRequestMatcher;
    import  org.springframework.security.web.util.RequestMatcher;
     
     
    @SuppressWarnings ({  "rawtypes" "deprecation"  })
    public  class  JdbcFilterInvocationDefinitionSourceFactoryBean
         extends  JdbcDaoSupport  implements  FactoryBean {
         private  String resourceQuery;
     
         public  boolean  isSingleton() {
             return  true ;
         }
     
         public  Class getObjectType() {
             return  FilterInvocationSecurityMetadataSource. class ;
         }
     
         public  Object getObject() {
             return  new  DefaultFilterInvocationSecurityMetadataSource( this
                 .buildRequestMap());
         }
     
         @SuppressWarnings ( "unchecked" )
         protected  Map<String, String> findResources() {
             ResourceMapping resourceMapping =  new  ResourceMapping(getDataSource(),
                     resourceQuery);
     
             Map<String, String> resourceMap =  new  LinkedHashMap<String, String>();
     
             for  (Resource resource : (List<Resource>) resourceMapping.execute()) {
                 String url = resource.getUrl();
                 String role = resource.getRole();
     
                 if  (resourceMap.containsKey(url)) {
                     String value = resourceMap.get(url);
                     resourceMap.put(url, value +  ","  + role);
                 else  {
                     resourceMap.put(url, role);
                 }
             }
     
             return  resourceMap;
         }
     
         @SuppressWarnings ({  "unchecked"  })
         protected  LinkedHashMap<RequestMatcher, Collection<ConfigAttribute>> buildRequestMap() {
             LinkedHashMap<RequestMatcher, Collection<ConfigAttribute>> requestMap =
                 null ;
             requestMap =  new  LinkedHashMap<RequestMatcher, Collection<ConfigAttribute>>();
     
             ConfigAttributeEditor editor =  new  ConfigAttributeEditor();
     
             Map<String, String> resourceMap =  this .findResources();
     
             for  (Map.Entry<String, String> entry : resourceMap.entrySet()) {
                 String key = entry.getKey();
                 editor.setAsText(entry.getValue());
                 requestMap.put( new  AntPathRequestMatcher(key),
                     (Collection<ConfigAttribute>) editor.getValue());
             }
     
             return  requestMap;
         }
     
         public  void  setResourceQuery(String resourceQuery) {
             this .resourceQuery = resourceQuery;
         }
     
         private  class  Resource {
             private  String url;
             private  String role;
     
             public  Resource(String url, String role) {
                 this .url = url;
                 this .role = role;
             }
     
             public  String getUrl() {
                 return  url;
             }
     
             public  String getRole() {
                 return  role;
             }
         }
     
         private  class  ResourceMapping  extends  MappingSqlQuery {
             protected  ResourceMapping(DataSource dataSource,
                 String resourceQuery) {
                 super (dataSource, resourceQuery);
                 compile();
             }
     
             protected  Object mapRow(ResultSet rs,  int  rownum)
                 throws  SQLException {
                 String url = rs.getString( 1 );
                 String role = rs.getString( 2 );
                 Resource resource =  new  Resource(url, role);
     
                 return  resource;
             }
         }
    }

    登录后您可以享受以下权益:

    ×
    评论
    添加红包

    请填写红包祝福语或标题

    红包个数最小为10个

    红包金额最低5元

    当前余额3.43前往充值 >
    需支付:10.00
    成就一亿技术人!
    领取后你会自动成为博主和红包主的粉丝 规则
    hope_wisdom
    发出的红包
    实付
    使用余额支付
    点击重新获取
    扫码支付
    钱包余额 0

    抵扣说明:

    1.余额是钱包充值的虚拟货币,按照1:1的比例进行支付金额的抵扣。
    2.余额无法直接购买下载,可以购买VIP、付费专栏及课程。

    余额充值
    程序员都在用的中文IT技术交流社区

    程序员都在用的中文IT技术交流社区

    专业的中文 IT 技术社区,与千万技术人共成长

    专业的中文 IT 技术社区,与千万技术人共成长

    关注【CSDN】视频号,行业资讯、技术分享精彩不断,直播好礼送不停!

    关注【CSDN】视频号,行业资讯、技术分享精彩不断,直播好礼送不停!

    客服 返回顶部