Spring Security 用戶名密碼登錄源碼解析

簡介

本文主要講解SpringSecurity中賬號密碼登錄部分的源碼解析,其基本流程如下圖所示。用戶請求首先會進入到UsernamePasswordAuthenticationFilter中,此時的Authentication是未認證的。接着通過ProviderManager找到匹配的Provider,此處找到是DaoAuthenticationProvider,接着去校驗相關相關邏輯。UserDetailService需要自己實現這個接口,在這裏主要是通過用戶名加載密碼,並且返回實現了UserDetails接口的對象。最後根據用戶信息封裝到Authentication對象中。沿着調用鏈返回時最後會經過
SecurityContexPersistenceFilter。該過濾器在過濾器鏈的最前面,當請求過來的時候檢查Session裏是否有SecurityContex,有的話則拿出來放到線程裏。如果沒有則通過。最後返回時經過該過濾器時,如果有SecurityContex則拿出來放到Session中。

在這裏插入圖片描述

源碼詳情

UsernamePasswordAuthenticationFilter

該類的attemptAuthentication方法主要從request中獲取賬號密碼,訪問IP地址,sessionId等信息構造成未經過認證的Authentication.然後調用ProviderManager中的authenticate方法,並將Authentication對象作爲參數傳進去

public Authentication attemptAuthentication(HttpServletRequest request,
      HttpServletResponse response) throws AuthenticationException {
   if (postOnly && !request.getMethod().equals("POST")) {
      throw new AuthenticationServiceException(
            "Authentication method not supported: " + request.getMethod());
   }

   String username = obtainUsername(request);
   String password = obtainPassword(request);

   if (username == null) {
      username = "";
   }

   if (password == null) {
      password = "";
   }

   username = username.trim();

   UsernamePasswordAuthenticationToken authRequest = new UsernamePasswordAuthenticationToken(
         username, password);

   // Allow subclasses to set the "details" property
   // 將一些機器ip,session等存入authRequest
   setDetails(request, authRequest);

   return this.getAuthenticationManager().authenticate(authRequest);
}

ProviderManager

遍歷AuthenticationProvider的實現類,校驗的邏輯都在這些實現類中,挨個判斷這些provider能否支持當前的這個authentication類型

public Authentication authenticate(Authentication authentication)
      throws AuthenticationException {
   Class<? extends Authentication> toTest = authentication.getClass();
   AuthenticationException lastException = null;
   Authentication result = null;
   boolean debug = logger.isDebugEnabled();
    //遍歷AuthenticationProvider的實現類,校驗的邏輯都在這些實現類中,
    //挨個判斷這些provider能否支持當前的這個authentication類型
   for (AuthenticationProvider provider : getProviders()) {
      if (!provider.supports(toTest)) {
         continue;
      }

      if (debug) {
         logger.debug("Authentication attempt using "
               + provider.getClass().getName());
      }

      try {
      //AbstractUserDetailsAuthenticationProvider具體調用這裏的方法
         result = provider.authenticate(authentication);

         if (result != null) {
            copyDetails(authentication, result);
            break;
         }
      }
      catch (AccountStatusException e) {
         prepareException(e, authentication);
         // SEC-546: Avoid polling additional providers if auth failure is due to
         // invalid account status
         throw e;
      }
      catch (InternalAuthenticationServiceException e) {
         prepareException(e, authentication);
         throw e;
      }
      catch (AuthenticationException e) {
         lastException = e;
      }
   }

   if (result == null && parent != null) {
      // Allow the parent to try.
      try {
         result = parent.authenticate(authentication);
      }
      catch (ProviderNotFoundException e) {
         // ignore as we will throw below if no other exception occurred prior to
         // calling parent and the parent
         // may throw ProviderNotFound even though a provider in the child already
         // handled the request
      }
      catch (AuthenticationException e) {
         lastException = e;
      }
   }

   if (result != null) {
      if (eraseCredentialsAfterAuthentication
            && (result instanceof CredentialsContainer)) {
         // Authentication is complete. Remove credentials and other secret data
         // from authentication
         ((CredentialsContainer) result).eraseCredentials();
      }

      eventPublisher.publishAuthenticationSuccess(result);
      return result;
   }

   // Parent was null, or didn't authenticate (or throw an exception).

   if (lastException == null) {
      lastException = new ProviderNotFoundException(messages.getMessage(
            "ProviderManager.providerNotFound",
            new Object[] { toTest.getName() },
            "No AuthenticationProvider found for {0}"));
   }

   prepareException(lastException, authentication);

   throw lastException;
}

AbstractUserDetailsAuthenticationProvider

上述代碼中result = provider.authenticate(authentication); authenticate方法在該抽象類中。該方法先獲取User對象,然後實現預檢查,檢查isAccountNonLocked(),isEnabled(),isAccountNonExpired(),
再檢查密碼是否匹配,具體實現在DaoAuthenticationProvider中,最後再檢查isCredentialsNonExpired字段,所有檢查都通過則認爲用戶認證成功了。如果認證成功則根據用戶信息,真正請求的信息,創建一個success的Authentication。

public Authentication authenticate(Authentication authentication)
      throws AuthenticationException {
   Assert.isInstanceOf(UsernamePasswordAuthenticationToken.class, authentication,
         messages.getMessage(
               "AbstractUserDetailsAuthenticationProvider.onlySupports",
               "Only UsernamePasswordAuthenticationToken is supported"));

   // Determine username
   String username = (authentication.getPrincipal() == null) ? "NONE_PROVIDED"
         : authentication.getName();

   boolean cacheWasUsed = true;
   UserDetails user = this.userCache.getUserFromCache(username);

   if (user == null) {
      cacheWasUsed = false;

      try {
        //獲取User對象
         user = retrieveUser(username,
               (UsernamePasswordAuthenticationToken) authentication);
      }
      catch (UsernameNotFoundException notFound) {
         logger.debug("User '" + username + "' not found");

         if (hideUserNotFoundExceptions) {
            throw new BadCredentialsException(messages.getMessage(
                  "AbstractUserDetailsAuthenticationProvider.badCredentials",
                  "Bad credentials"));
         }
         else {
            throw notFound;
         }
      }

      Assert.notNull(user,
            "retrieveUser returned null - a violation of the interface contract");
   }

   try {
      //實現預檢查,檢查isAccountNonLocked(),isEnabled(),isAccountNonExpired()
      preAuthenticationChecks.check(user);
      //檢查密碼是否匹配,具體實現在DaoAuthenticationProvider中
      additionalAuthenticationChecks(user,
            (UsernamePasswordAuthenticationToken) authentication);
   }
   catch (AuthenticationException exception) {
      if (cacheWasUsed) {
         // There was a problem, so try again after checking
         // we're using latest data (i.e. not from the cache)
         cacheWasUsed = false;
         user = retrieveUser(username,
               (UsernamePasswordAuthenticationToken) authentication);
         preAuthenticationChecks.check(user);
         additionalAuthenticationChecks(user,
               (UsernamePasswordAuthenticationToken) authentication);
      }
      else {
         throw exception;
      }
   }
   //最後再檢查isCredentialsNonExpired字段,所有檢查都通過則認爲用戶認證成功了
   postAuthenticationChecks.check(user);

   if (!cacheWasUsed) {
      this.userCache.putUserInCache(user);
   }

   Object principalToReturn = user;

   if (forcePrincipalAsString) {
      principalToReturn = user.getUsername();
   }
//最後根據用戶信息,真正請求的信息,創建一個success的Authentication
   return createSuccessAuthentication(principalToReturn, authentication, user);
}

protected Authentication createSuccessAuthentication(Object principal,
      Authentication authentication, UserDetails user) {
   // Ensure we return the original credentials the user supplied,
   // so subsequent attempts are successful even with encoded passwords.
   // Also ensure we return the original getDetails(), so that future
   // authentication events after cache expiry contain the details
   // 主要加入user中的用戶權限信息
   UsernamePasswordAuthenticationToken result = new UsernamePasswordAuthenticationToken(
         principal, authentication.getCredentials(),
         authoritiesMapper.mapAuthorities(user.getAuthorities()));
   result.setDetails(authentication.getDetails());

   return result;
}

DaoAuthenticationProvider

該類繼承了AbstractUserDetailsAuthenticationProvider,並且實現了retrieveUser方法,該方法則會調用到我們自己實現了UserDetailsServices接口的類,通過loadUserByUsername方法獲得實現了UserDetails接口的類,這裏的默認實現是User類。

protected final UserDetails retrieveUser(String username,
      UsernamePasswordAuthenticationToken authentication)
      throws AuthenticationException {
   UserDetails loadedUser;

   try {
      loadedUser = this.getUserDetailsService().loadUserByUsername(username);
   }
   catch (UsernameNotFoundException notFound) {
      if (authentication.getCredentials() != null) {
         String presentedPassword = authentication.getCredentials().toString();
         passwordEncoder.isPasswordValid(userNotFoundEncodedPassword,
               presentedPassword, null);
      }
      throw notFound;
   }
   catch (Exception repositoryProblem) {
      throw new InternalAuthenticationServiceException(
            repositoryProblem.getMessage(), repositoryProblem);
   }

   if (loadedUser == null) {
      throw new InternalAuthenticationServiceException(
            "UserDetailsService returned null, which is an interface contract violation");
   }
   return loadedUser;
}

AbstractAuthenticationProcessingFilter

如果成功則調用AbstractAuthenticationProcessingFilter的successfulAuthentication方法。方法如果失敗則調用AbstractAuthenticationProcessingFilter的unsuccessfulAuthentication方法。successfulAuthentication,unsuccessfulAuthentication中可以調用自己的處理成功或者失敗的處理器。即通過以下這兩行代碼

  • successHandler.onAuthenticationSuccess(request, response, authResult);
  • failureHandler.onAuthenticationFailure(request, response, failed);
public void doFilter(ServletRequest req, ServletResponse res, FilterChain chain)
      throws IOException, ServletException {

   HttpServletRequest request = (HttpServletRequest) req;
   HttpServletResponse response = (HttpServletResponse) res;

   if (!requiresAuthentication(request, response)) {
      chain.doFilter(request, response);

      return;
   }

   if (logger.isDebugEnabled()) {
      logger.debug("Request is to process authentication");
   }

   Authentication authResult;

   try {
      authResult = attemptAuthentication(request, response);
      if (authResult == null) {
         // return immediately as subclass has indicated that it hasn't completed
         // authentication
         return;
      }
      sessionStrategy.onAuthentication(authResult, request, response);
   }
   catch (InternalAuthenticationServiceException failed) {
      logger.error(
            "An internal error occurred while trying to authenticate the user.",
            failed);
      unsuccessfulAuthentication(request, response, failed);

      return;
   }
   catch (AuthenticationException failed) {
      // Authentication failed
      unsuccessfulAuthentication(request, response, failed);

      return;
   }

   // Authentication success
   if (continueChainBeforeSuccessfulAuthentication) {
      chain.doFilter(request, response);
   }

   successfulAuthentication(request, response, chain, authResult);
}
protected void successfulAuthentication(HttpServletRequest request,
      HttpServletResponse response, FilterChain chain, Authentication authResult)
      throws IOException, ServletException {

   if (logger.isDebugEnabled()) {
      logger.debug("Authentication success. Updating SecurityContextHolder to contain: "
            + authResult);
   }

   SecurityContextHolder.getContext().setAuthentication(authResult);

   rememberMeServices.loginSuccess(request, response, authResult);

   // Fire event
   if (this.eventPublisher != null) {
      eventPublisher.publishEvent(new InteractiveAuthenticationSuccessEvent(
            authResult, this.getClass()));
   }
// 調用自己寫的成功的處理器
   successHandler.onAuthenticationSuccess(request, response, authResult);
}

protected void unsuccessfulAuthentication(HttpServletRequest request,
      HttpServletResponse response, AuthenticationException failed)
      throws IOException, ServletException {
   SecurityContextHolder.clearContext();

   if (logger.isDebugEnabled()) {
      logger.debug("Authentication request failed: " + failed.toString(), failed);
      logger.debug("Updated SecurityContextHolder to contain null Authentication");
      logger.debug("Delegating to authentication failure handler " + failureHandler);
   }

   rememberMeServices.loginFail(request, response);

   failureHandler.onAuthenticationFailure(request, response, failed);
}

SecurityContexPersistenceFilter

該過濾器在過濾器鏈的最前面,當請求過來的時候檢查Session裏是否有SecurityContex,有的話則拿出來放到線程裏。如果沒有則通過。最後返回時經過該過濾器時,如果有SecurityContex則拿出來放到Session中。

protected void successfulAuthentication(HttpServletRequest request,
      HttpServletResponse response, FilterChain chain, Authentication authResult)
      throws IOException, ServletException {

   if (logger.isDebugEnabled()) {
      logger.debug("Authentication success. Updating SecurityContextHolder to contain: "
            + authResult);
   }
    //將認證成功的Authentication放到securityContex中,再將securityContex放到SecurityContextHolder中
   SecurityContextHolder.getContext().setAuthentication(authResult);

   rememberMeServices.loginSuccess(request, response, authResult);

   // Fire event
   if (this.eventPublisher != null) {
      eventPublisher.publishEvent(new InteractiveAuthenticationSuccessEvent(
            authResult, this.getClass()));
   }

   successHandler.onAuthenticationSuccess(request, response, authResult);
}
發表評論
所有評論
還沒有人評論,想成為第一個評論的人麼? 請在上方評論欄輸入並且點擊發布.
相關文章