本文采用aop實(shí)現(xiàn)model中的字段加解密做修。
創(chuàng)建加密工具類 AseUtil
import org.springframework.util.Base64Utils;
import java.security.NoSuchAlgorithmException;
import java.security.SecureRandom;
import java.util.logging.Level;
import java.util.logging.Logger;
import javax.crypto.Cipher;
import javax.crypto.KeyGenerator;
import javax.crypto.SecretKey;
import javax.crypto.spec.SecretKeySpec;
/**
* Ase加密
*/
public class AseUtil {
private static final String KEY_ALGORITHM = "AES";
private static final String DEFAULT_CIPHER_ALGORITHM = "AES/ECB/PKCS5Padding";//默認(rèn)的加密算法
/**
* AES 加密操作
*
* @param content 待加密內(nèi)容
* @param secKey 加密密碼
* @return 返回Base64轉(zhuǎn)碼后的加密數(shù)據(jù)
*/
public static String encrypt(String content, String secKey) {
try {
Cipher cipher = Cipher.getInstance(DEFAULT_CIPHER_ALGORITHM);// 創(chuàng)建密碼器
byte[] byteContent = content.getBytes("utf-8");
cipher.init(Cipher.ENCRYPT_MODE, getSecretKey(secKey));// 初始化為加密模式的密碼器
byte[] result = cipher.doFinal(byteContent);// 加密
return Base64Utils.encodeToString(result);
} catch (Exception ex) {
Logger.getLogger(AseUtil.class.getName()).log(Level.SEVERE, null, ex);
}
return null;
}
/**
* AES 解密操作
*
* @param content
* @param secKey
* @return
*/
public static String decrypt(String content, String secKey) {
try {
//實(shí)例化
Cipher cipher = Cipher.getInstance(DEFAULT_CIPHER_ALGORITHM);
//使用密鑰初始化,設(shè)置為解密模式
cipher.init(Cipher.DECRYPT_MODE, getSecretKey(secKey));
//執(zhí)行操作
byte[] result = cipher.doFinal(Base64Utils.decodeFromString(content));
return new String(result, "utf-8");
} catch (Exception ex) {
Logger.getLogger(AseUtil.class.getName()).log(Level.SEVERE, null, ex);
}
return null;
}
/**
* 生成加密秘鑰
*
* @return
*/
private static SecretKeySpec getSecretKey(final String password) {
//返回生成指定算法密鑰生成器的 KeyGenerator 對象
KeyGenerator kg = null;
try {
kg = KeyGenerator.getInstance(KEY_ALGORITHM);
//AES 要求密鑰長度為 128
kg.init(128, new SecureRandom(password.getBytes()));
//生成一個密鑰
SecretKey secretKey = kg.generateKey();
return new SecretKeySpec(secretKey.getEncoded(), KEY_ALGORITHM);// 轉(zhuǎn)換為AES專用密鑰
} catch (NoSuchAlgorithmException ex) {
Logger.getLogger(AseUtil.class.getName()).log(Level.SEVERE, null, ex);
}
return null;
}
}
定義注解
@EncryptMethod
使用@EncryptMethod注解要加密參數(shù)(model)的方法。
/**
* 字段加解密
* @author seawish
* @date 2019/8/19
*/
@Documented
@Target({ElementType.FIELD})
@Retention(RetentionPolicy.RUNTIME)
@Order(Ordered.HIGHEST_PRECEDENCE)
public @interface EncryptField {}
@DecryptMethod
使用@DecryptMethod注解要加密參數(shù)(model)的方法。
/**
* 注解需要加解密參數(shù)的方法躏结,實(shí)現(xiàn)自動加解密馋艺。
*
* @author seawish.zheng
* @date 2019/8/16
*/
@Documented
@Target({ElementType.METHOD})
@Retention(RetentionPolicy.RUNTIME)
@Order(Ordered.HIGHEST_PRECEDENCE)
public @interface DecryptMethod { }
@CryptField
@CryptField修飾model類的屬性,被注解的屬性將被aop攔截新锈,進(jìn)行加解密處理。
import org.springframework.core.Ordered;
import org.springframework.core.annotation.Order;
import java.lang.annotation.*;
/**
* 字段加解密
* @author seawish.zheng
* @date 2019/8/19
*/
@Documented
@Target({ElementType.FIELD})
@Retention(RetentionPolicy.RUNTIME)
@Order(Ordered.HIGHEST_PRECEDENCE)
public @interface CryptField {}
定義切面類 CryptFieldAspect
CryptFieldAspect攔截@EncryptMethod和@DecryptMethod修飾的方法茂蚓,并對其第一個參數(shù)進(jìn)行的特定屬性(使用@CryptField注解的屬性)進(jìn)行加解密處理壕鹉。
import com.dji.graduate.utils.AseUtil;
import org.aspectj.lang.ProceedingJoinPoint;
import org.aspectj.lang.annotation.Around;
import org.aspectj.lang.annotation.Aspect;
import org.aspectj.lang.annotation.Pointcut;
import org.slf4j.Logger;
import org.slf4j.LoggerFactory;
import org.springframework.beans.factory.annotation.Value;
import org.springframework.core.Ordered;
import org.springframework.core.annotation.Order;
import org.springframework.stereotype.Component;
import java.lang.reflect.Field;
import java.util.Objects;
/**
* 安全字段加密解密切面
*
* @author: zetting
* @date:2018/12/27
*/
@Order(Ordered.HIGHEST_PRECEDENCE)
@Aspect
@Component
public class CryptFieldAspect {
private static Logger logger = LoggerFactory.getLogger(CryptFieldAspect.class);
@Value("${crypt.seckey}")
private String secretKey;
@Pointcut("@annotation(EncryptMethod)")
public void encryptPointCut() {
}
@Pointcut("@annotation(DecryptMethod)")
public void decryptPointCut() {
}
/**
* 加密數(shù)據(jù)環(huán)繞處理
* @param joinPoint
* @return
* @throws Throwable
*/
@Around("encryptPointCut()")
public Object aroundEncrypt(ProceedingJoinPoint joinPoint) throws Throwable {
Object requestObj = joinPoint.getArgs()[0];
handleEncrypt(requestObj); // 加密CryptField注解字段
Object responseObj = joinPoint.proceed(); // 方法執(zhí)行
handleDecrypt(responseObj); // 解密CryptField注解字段
return responseObj;
}
/**
* 解密數(shù)據(jù)環(huán)繞處理
* @param joinPoint
* @return
* @throws Throwable
*/
@Around("decryptPointCut()")
public Object aroundDecrypt(ProceedingJoinPoint joinPoint) throws Throwable {
Object requestObj = joinPoint.getArgs()[0];
handleDecrypt(requestObj); // 解密CryptField注解字段
Object responseObj = joinPoint.proceed(); // 方法執(zhí)行
handleEncrypt(responseObj); // 加密CryptField注解字段
return responseObj;
}
/**
* 處理加密
*
* @param requestObj
*/
private void handleEncrypt(Object requestObj) throws IllegalAccessException {
if (Objects.isNull(requestObj)) {
return;
}
Field[] fields = requestObj.getClass().getDeclaredFields();
for (Field field : fields) {
boolean hasSecureField = field.isAnnotationPresent(CryptField.class);
if (hasSecureField) {
field.setAccessible(true);
String plaintextValue = (String) field.get(requestObj);
String encryptValue = AseUtil.encrypt(plaintextValue, secretKey);
field.set(requestObj, encryptValue);
}
}
}
/**
* 處理解密
*
* @param responseObj
*/
private Object handleDecrypt(Object responseObj) throws IllegalAccessException {
if (Objects.isNull(responseObj)) {
return null;
}
Field[] fields = responseObj.getClass().getDeclaredFields();
for (Field field : fields) {
boolean hasSecureField = field.isAnnotationPresent(CryptField.class);
if (hasSecureField) {
field.setAccessible(true);
String encryptValue = (String) field.get(responseObj);
String plaintextValue = AseUtil.decrypt(encryptValue, secretKey);
field.set(responseObj, plaintextValue);
}
}
return responseObj;
}
}
切面使用
配置屬性
在application.properties中配置aes加密所需的seckey。
crypt.seckey = seawishkey
注解方法和字段
注解Dto對象的字段
AccountDto的password屬性使用@CryptField注解聋涨,其將被aop攔截晾浴,進(jìn)行加解密處理。
@ApiModel(value = "用戶Dto")
public class AccountDto extends BaseDto<AccountDto, AccountEntity> {
private static final long serialVersionUID = 1L;
@ApiModelProperty(hidden = true)
@CryptField
@NotEmpty(groups = {InsertGroup.class})
@Size(min = 8, max = 20)
private String password;
注解AddCount方法
addAccount方法使用@EncryptMethod注解牍白,其第一個參數(shù)脊凰,也就是accountDto對象,將被aop攔截。在方法執(zhí)行前狸涌,accountDto具有@CryptFiled注解的屬性都會被加密切省;而執(zhí)行完方法后,該對象被加密的字段都會被解密回原樣帕胆。
如果使用@DecryptMethod注解addAccount方法朝捆,則執(zhí)行@EncryptMethod相反的操作。
@ApiOperation("添加用戶信息")
@EncryptMethod
@PostMapping
@ResponseBody
public Result<String> addAccount(@Validated({Default.class, InsertGroup.class}) @RequestBody AccountDto accountDto) throws InvocationTargetException, IllegalAccessException {
logger.info("添加用戶,ad: {}", accountDto.getAd());
return accountService.add(accountDto) ? Result.success(accountDto.getId()) : Result.failureMsg("增加用戶失敗");
}
參考文獻(xiàn)
本文作者: seawish
版權(quán)聲明: 本博客所有文章除特別聲明外,均采用 CC BY-NC-SA 3.0 許可協(xié)議脸秽。轉(zhuǎn)載請注明出處儒老!