diff --git a/server/private.txt b/server/private.txt
new file mode 100644
index 0000000..86e2f1c
--- /dev/null
+++ b/server/private.txt
@@ -0,0 +1,27 @@
+-----BEGIN RSA PRIVATE KEY-----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+-----END RSA PRIVATE KEY-----
\ No newline at end of file
diff --git a/server/public.txt b/server/public.txt
new file mode 100644
index 0000000..2ed6092
--- /dev/null
+++ b/server/public.txt
@@ -0,0 +1,9 @@
+-----BEGIN PUBLIC KEY-----
+MIIBIjANBgkqhkiG9w0BAQEFAAOCAQ8AMIIBCgKCAQEA4jXKxEFsDsjng2nHppqC
+GTR1NQLfHJlGzc5hWalP/YgbJWIqdGXDy704Q2DuuoOe/t6KQcYI6/C7Ua9yumYp
+MoKZOA5b7gmh/k0SUfsCErKwzE93DIAnLbRoT/hkGJD1Dn7V7yTzYf2BjaFoY5it
+tZJ/UXM18TAqW7S1q0qCuv25Fb9NAEMh63EaX3N+DMW8rg51GBfRvtVfACbIyFo9
+8PW2/wOQhppGWkxdzgJdJUwPhZ+Fo9DZ18044hapYPNuZ31ordIGptYL6pB/0VKh
+kbDLk4oOnkhhWW0DmsTSFyhOiaQqtuxdrjPV7sqR1NokreZAtbUctVNezNBlYWoJ
+TwIDAQAB
+-----END PUBLIC KEY-----
\ No newline at end of file
diff --git a/server/zyjblogs-gateway/pom.xml b/server/zyjblogs-gateway/pom.xml
index 32705f5..a21d52a 100644
--- a/server/zyjblogs-gateway/pom.xml
+++ b/server/zyjblogs-gateway/pom.xml
@@ -48,11 +48,6 @@
-
-
-
-
-
cn.zyjblogs.starter
zyjblogs-redis-spring-boot-starter
@@ -62,10 +57,6 @@
org.springframework.cloud
spring-cloud-starter-loadbalancer
-
-
-
-
org.springframework.cloud
spring-cloud-starter-openfeign
@@ -102,7 +93,6 @@
maven-jar-plugin
${maven-jar-plugin.version}
-
diff --git a/server/zyjblogs-gateway/src/main/java/cn/zyjblogs/filter/AuthFilter.java b/server/zyjblogs-gateway/src/main/java/cn/zyjblogs/filter/AuthFilter.java
index 66b4565..7f389a0 100644
--- a/server/zyjblogs-gateway/src/main/java/cn/zyjblogs/filter/AuthFilter.java
+++ b/server/zyjblogs-gateway/src/main/java/cn/zyjblogs/filter/AuthFilter.java
@@ -86,14 +86,6 @@ public class AuthFilter implements GlobalFilter {
if ("/user/login".equals(path)) {
return chain.filter(exchange);
}
-// if (!TokenUtil.checkToken(token)) {
-// return getErrorMono(response, ResponseStatus.UNAUTHORIZED, "invalid_token");
-// }
- /*boolean hasPermission = hasPermission(routeId, methodType, path);
- if (!hasPermission) {
- log.warn("无权限访问,path:{}", path);
- return getErrorMono(response, ResponseCode.FORBIDDEN, "no_access");
- }*/
return chain.filter(build);
}
@@ -109,7 +101,7 @@ public class AuthFilter implements GlobalFilter {
String jwt = token.substring(HttpHeaderConstant.BEARER_TYPE.length()).trim();
try {
JwtParsers jwtParsers = new JwtParsers(true);
- if (rsaKeyProperties.getEnable()) {
+ if (Boolean.TRUE.equals(rsaKeyProperties.getEnable())) {
String publicKeyStr = null;
Object o = redisTemplateHandler.get(CommonRedisKeyConstant.REDIS_KEY_PUBLIC_RSA);
if (Objects.isNull(o)) {
diff --git a/server/zyjblogs-oauth/src/main/java/cn/zyjblogs/server/user/handler/OauthRquestHander.java b/server/zyjblogs-oauth/src/main/java/cn/zyjblogs/server/user/handler/OauthRquestHander.java
index 66b6212..cac8cab 100644
--- a/server/zyjblogs-oauth/src/main/java/cn/zyjblogs/server/user/handler/OauthRquestHander.java
+++ b/server/zyjblogs-oauth/src/main/java/cn/zyjblogs/server/user/handler/OauthRquestHander.java
@@ -1,5 +1,6 @@
package cn.zyjblogs.server.user.handler;
+import org.jetbrains.annotations.NotNull;
import org.springframework.security.oauth2.common.OAuth2AccessToken;
import org.springframework.security.oauth2.common.exceptions.InvalidRequestException;
import org.springframework.security.oauth2.common.exceptions.OAuth2Exception;
@@ -19,6 +20,10 @@ import java.util.*;
* @author zhuyijun
*/
public class OauthRquestHander {
+
+ private OauthRquestHander() {
+
+ }
/**
* 处理
*
@@ -27,6 +32,11 @@ public class OauthRquestHander {
* @return
*/
public static AuthorizationRequest createAuthorizationRequest(Map authorizationParameters, ClientDetails clientDetails) {
+ return getAuthorizationRequest(authorizationParameters, clientDetails);
+ }
+
+ @NotNull
+ public static AuthorizationRequest getAuthorizationRequest(Map authorizationParameters, ClientDetails clientDetails) {
String clientId = authorizationParameters.get(OAuth2Utils.CLIENT_ID);
String state = authorizationParameters.get(OAuth2Utils.STATE);
String redirectUri = authorizationParameters.get(OAuth2Utils.REDIRECT_URI);
@@ -45,8 +55,8 @@ public class OauthRquestHander {
public static String appendAccessToken(AuthorizationRequest authorizationRequest, OAuth2AccessToken accessToken) {
- Map vars = new LinkedHashMap();
- Map keys = new HashMap();
+ Map vars = new LinkedHashMap<>();
+ Map keys = new HashMap<>();
if (accessToken == null) {
throw new InvalidRequestException("An implicit grant could not be made");
@@ -143,7 +153,7 @@ public class OauthRquestHander {
if (authorizationCode == null) {
throw new IllegalStateException("No authorization code found in the current request scope.");
} else {
- Map query = new LinkedHashMap();
+ Map query = new LinkedHashMap<>();
query.put("code", authorizationCode);
String state = authorizationRequest.getState();
if (state != null) {
@@ -156,21 +166,14 @@ public class OauthRquestHander {
public static String getUnsuccessfulRedirect(AuthorizationRequest authorizationRequest, OAuth2Exception failure, boolean fragment) {
if (authorizationRequest != null && authorizationRequest.getRedirectUri() != null) {
- Map query = new LinkedHashMap();
+ Map query = new LinkedHashMap<>();
query.put("error", failure.getOAuth2ErrorCode());
query.put("error_description", failure.getMessage());
if (authorizationRequest.getState() != null) {
query.put("state", authorizationRequest.getState());
}
- if (failure.getAdditionalInformation() != null) {
- Iterator var5 = failure.getAdditionalInformation().entrySet().iterator();
-
- while (var5.hasNext()) {
- Map.Entry additionalInfo = (Map.Entry) var5.next();
- query.put(additionalInfo.getKey(), additionalInfo.getValue());
- }
- }
+ getFailFedirect(failure, query);
return append(authorizationRequest.getRedirectUri(), query, fragment);
} else {
@@ -180,19 +183,23 @@ public class OauthRquestHander {
public static String getUnsuccessfulRedirect(String redirectUri, OAuth2Exception failure, boolean fragment) {
if (StringUtils.hasLength(redirectUri)) {
- Map query = new LinkedHashMap();
+ Map query = new LinkedHashMap<>();
query.put("error", failure.getOAuth2ErrorCode());
query.put("error_description", failure.getMessage());
- if (failure.getAdditionalInformation() != null) {
- Iterator var5 = failure.getAdditionalInformation().entrySet().iterator();
- while (var5.hasNext()) {
- Map.Entry additionalInfo = (Map.Entry) var5.next();
- query.put(additionalInfo.getKey(), additionalInfo.getValue());
- }
- }
+ getFailFedirect(failure, query);
return append(redirectUri, query, fragment);
} else {
throw new UnapprovedClientAuthenticationException("Authorization failure, and no redirect URI.", failure);
}
}
+
+ public static void getFailFedirect(OAuth2Exception failure, Map query) {
+ if (failure.getAdditionalInformation() != null) {
+ Iterator> var5 = failure.getAdditionalInformation().entrySet().iterator();
+ while (var5.hasNext()) {
+ Map.Entry additionalInfo = var5.next();
+ query.put(additionalInfo.getKey(), additionalInfo.getValue());
+ }
+ }
+ }
}
diff --git a/server/zyjblogs-oauth/src/main/java/cn/zyjblogs/server/user/service/impl/AuthServiceImpl.java b/server/zyjblogs-oauth/src/main/java/cn/zyjblogs/server/user/service/impl/AuthServiceImpl.java
index 64dae74..1827d5e 100644
--- a/server/zyjblogs-oauth/src/main/java/cn/zyjblogs/server/user/service/impl/AuthServiceImpl.java
+++ b/server/zyjblogs-oauth/src/main/java/cn/zyjblogs/server/user/service/impl/AuthServiceImpl.java
@@ -32,6 +32,8 @@ import org.springframework.util.StringUtils;
import java.util.*;
+import static cn.zyjblogs.server.user.handler.OauthRquestHander.getAuthorizationRequest;
+
/**
* @author zhuyijun
*/
@@ -180,20 +182,7 @@ public class AuthServiceImpl implements AuthService {
* @return
*/
public AuthorizationRequest createAuthorizationRequest(Map authorizationParameters, ClientDetails clientDetails) {
- String clientId = authorizationParameters.get(OAuth2Utils.CLIENT_ID);
- String state = authorizationParameters.get(OAuth2Utils.STATE);
- String redirectUri = authorizationParameters.get(OAuth2Utils.REDIRECT_URI);
- Set responseTypes = OAuth2Utils.parseParameterList(authorizationParameters
- .get(OAuth2Utils.RESPONSE_TYPE));
- Set scopes = OAuth2Utils.parseParameterList(authorizationParameters.get(OAuth2Utils.SCOPE));
- if (CollectionUtils.isEmpty(scopes)) {
- scopes = clientDetails.getScope();
- }
- AuthorizationRequest request = new AuthorizationRequest(authorizationParameters,
- Collections.emptyMap(), clientId, scopes, null, null, false, state, redirectUri,
- responseTypes);
- request.setResourceIdsAndAuthoritiesFromClientDetails(clientDetails);
- return request;
+ return getAuthorizationRequest(authorizationParameters, clientDetails);
}
diff --git a/server/zyjblogs-sms/src/main/java/cn/zyjblogs/sms/provider/AbstractSmsGranter.java b/server/zyjblogs-sms/src/main/java/cn/zyjblogs/sms/provider/AbstractSmsGranter.java
index 55eedf8..f956017 100644
--- a/server/zyjblogs-sms/src/main/java/cn/zyjblogs/sms/provider/AbstractSmsGranter.java
+++ b/server/zyjblogs-sms/src/main/java/cn/zyjblogs/sms/provider/AbstractSmsGranter.java
@@ -2,15 +2,10 @@ package cn.zyjblogs.sms.provider;
import cn.zyjblogs.sms.common.SmsRequest;
-import cn.zyjblogs.sms.common.SmsResponse;
import cn.zyjblogs.sms.task.constant.ProviderType;
import cn.zyjblogs.sms.task.constant.TaskStatus;
import cn.zyjblogs.sms.task.dto.TaskResultDTO;
import cn.zyjblogs.starter.common.utils.collections.CollectionUtils;
-
-import java.util.LinkedList;
-import java.util.List;
-
/**
*
* @author zhuyijun
@@ -18,7 +13,7 @@ import java.util.List;
public abstract class AbstractSmsGranter implements SmsGranter {
private final ProviderType PROVIDER_TYPE;
- public AbstractSmsGranter(ProviderType providerType) {
+ protected AbstractSmsGranter(ProviderType providerType) {
this.PROVIDER_TYPE = providerType;
}