功能:所有关于websocket的请求必须登录,实现websocket需要登录后才可使用,不登录不能建立连接。
后台spring security配置添加websocket的请求可以匿名访问,关于websocket的请求不要认证就可以随意访问,去除匿名访问后,前端在与websocket建立链接无法在请求头里直接加入Authorization token信息,任何关于websocket的请求都无法通过token认证。
解决办法: 使用websocket的Sec-WebSocket-Protocol参数,将token传回后台,后台借助HttpServletRequestWrapper重新生成新的请求信息,实现使用一套登录认证拦截
原理:
HttpServletRequestWrapper 采用装饰者模式对HttpServletRequest进行包装,我们可以通过继承HttpServletRequestWrapper 类去重写getParameterValues,getParameter等方法,实际还是调用HttpServletRequest的相对应方法,但是可以对方法的结果进行改装。
1、前端webSock.js
与webSocke建立连接
var websock = null;
var global_callback = null;
var serverPort = "8080";
var wsurl = "ws://" + window.location.hostname + ":" + serverPort+"/websocket/message";
function createWebSocket(callback) {
if (websock == null || typeof websock !== WebSocket) {
initWebSocket(callback);
}
}
function initWebSocket(callback) {
global_callback = callback;
websock = new WebSocket(wsurl,['你的token']);
websock.onmessage = function (e) {
websocketOnMessage(e);
};
websock.onclose = function (e) {
websocketClose(e);
};
websock.onopen = function () {
websocketOpen();
};
websock.onerror = function () {
console.log("WebSocket连接发生错误");
};
}
function sendSock(agentData ) {
if (websock.readyState === websock.OPEN) {
websocketsend(agentData);
} else if (websock.readyState === websock.CONNECTING) {
setTimeout(function () {
sendSock(agentData);
}, 1000);
} else {
setTimeout(function () {
sendSock(agentData);
}, 1000);
}
}
function closeSock() {
websock.close();
}
function websocketOnMessage(msg) {
let result = null;
if (msg.data instanceof Blob) {
const reader = new FileReader();
reader.readAsText(msg.data, "UTF-8");
reader.onload = (e) => {
result = reader.result;
global_callback(result);
};
} else {
result = msg.data;
global_callback(result);
}
}
function websocketsend(agentData) {
websock.send(agentData);
}
function websocketClose(e) {
}
function websocketOpen(e) {
}
export { sendSock, createWebSocket, closeSock };
2、后端的JWT拦截
前提 spring security配置类不允许/websocket匿名访问,需要鉴权才可以使用
2.1 先实现 HeaderMapRequestWrapper继承HttpServletRequestWrapper
来实现修改HttpServletRequest的请求参数
public class HeaderMapRequestWrapper extends HttpServletRequestWrapper {
private static final Logger LOGGER = LoggerFactory.getLogger(HeaderMapRequestWrapper.class);
public HeaderMapRequestWrapper(HttpServletRequest request) {
super(request);
}
private Map<String, String> headerMap = new HashMap<>();
public void addHeader(String name, String value) {
headerMap.put(name, value);
}
@Override
public String getHeader(String name) {
String headerValue = super.getHeader(name);
if (headerMap.containsKey(name)) {
headerValue = headerMap.get(name);
}
return headerValue;
}
@Override
public Enumeration<String> getHeaderNames() {
List<String> names = Collections.list(super.getHeaderNames());
for (String name : headerMap.keySet()) {
names.add(name);
}
return Collections.enumeration(names);
}
@Override
public Enumeration<String> getHeaders(String name) {
List<String> values = Collections.list(super.getHeaders(name));
if (headerMap.containsKey(name)) {
values = Arrays.asList(headerMap.get(name));
}
return Collections.enumeration(values);
}
}
2.2 token过滤器 JWT认证拦截器修改
@Override
protected void doFilterInternal(HttpServletRequest request, HttpServletResponse response, FilterChain chain)
throws ServletException, IOException
{
if(request.getRequestURI().contains("/websocket")){
HeaderMapRequestWrapper requestWrapper = new HeaderMapRequestWrapper((HttpServletRequest) request);
requestWrapper.addHeader("Authorization","Bearer "+request.getHeader("Sec-WebSocket-Protocol"));
request = (HttpServletRequest) requestWrapper;
}
LoginUser loginUser = getLoginUser(request);
·······
chain.doFilter(request, response);
}