zoukankan      html  css  js  c++  java
  • spring security 登录、权限管理配置

    登录流程

    1)容器启动(MySecurityMetadataSource:loadResourceDefine加载系统资源与权限列表)
     2)用户发出请求
     3)过滤器拦截(MySecurityFilter:doFilter)
     4)取得请求资源所需权限(MySecurityMetadataSource:getAttributes)
     5)匹配用户拥有权限和请求权限(MyAccessDecisionManager:decide),如果用户没有相应的权限,

         执行第6步,否则执行第7步。
     6)登录
     7)验证并授权(MyUserDetailServiceImpl:loadUserByUsername)


    1、web.xml中加入过滤器

    1. <!-- SpringSecurity 核心过滤器配置 -->  
    2. <filter>  
    3.     <filter-name>springSecurityFilterChain</filter-name>  
    4.     <filter-class>org.springframework.web.filter.DelegatingFilterProxy</filter-class>  
    5. </filter>  
    6. <filter-mapping>  
    7.     <filter-name>springSecurityFilterChain</filter-name>  
    8.     <url-pattern>/*</url-pattern>  
    9. </filter-mapping>  


    2、新建spring-security.xml文件

    1. <?xml version="1.0" encoding="UTF-8"?>  
    2. <beans:beans xmlns="http://www.springframework.org/schema/security"  
    3.     xmlns:beans="http://www.springframework.org/schema/beans" xmlns:xsi="http://www.w3.org/2001/XMLSchema-instance"  
    4.     xsi:schemaLocation="http://www.springframework.org/schema/beans  
    5.     http://www.springframework.org/schema/beans/spring-beans.xsd  
    6.     http://www.springframework.org/schema/security  
    7.     http://www.springframework.org/schema/security/spring-security.xsd">  
    8.   
    9.     <!-- entry-point-ref 配置自定义登录 -->  
    10.     <http use-expressions="true" entry-point-ref="authenticationProcessingFilterEntryPoint">  
    11.           
    12.         <!-- 登出配置 -->  
    13.         <logout logout-url="/j_spring_security_logout" logout-success-url="/login" />  
    14.   
    15.         <access-denied-handler error-page="/noPower" />  
    16.           
    17.         <!-- 过滤不被拦截的请求 -->  
    18.         <intercept-url pattern="/login*" access="permitAll" />  
    19.         <intercept-url pattern="/resources/**" access="permitAll" />  
    20.           
    21.         <!-- 只有权限才能访问的请求 -->  
    22.         <intercept-url pattern="/admin/**" access="isAuthenticated()" />  
    23.   
    24.         <custom-filter ref="loginFilter" position="FORM_LOGIN_FILTER" />  
    25.         <custom-filter ref="securityFilter" before="FILTER_SECURITY_INTERCEPTOR" />  
    26.   
    27.     </http>  
    28.   
    29.     <beans:bean id="loginFilter"  
    30.         class="cn.com.abel.test.service.security.MyUsernamePasswordAuthenticationFilter">  
    31.           
    32.         <!-- 登录提交处理 -->  
    33.         <beans:property name="filterProcessesUrl" value="/j_spring_security_check"></beans:property>  
    34.           
    35.         <!-- 登录成功跳转 -->  
    36.         <beans:property name="authenticationSuccessHandler"  
    37.             ref="loginLogAuthenticationSuccessHandler"></beans:property>  
    38.           
    39.         <!-- 设置登录失败的网址 -->  
    40.         <beans:property name="authenticationFailureHandler"  
    41.             ref="simpleUrlAuthenticationFailureHandler"></beans:property>  
    42.           
    43.         <!-- 用户拥有权限 -->     
    44.         <beans:property name="authenticationManager" ref="myAuthenticationManager"></beans:property>  
    45.     </beans:bean>  
    46.   
    47.     <beans:bean id="loginLogAuthenticationSuccessHandler"  
    48.         class="org.springframework.security.web.authentication.SavedRequestAwareAuthenticationSuccessHandler">  
    49.         <beans:property name="defaultTargetUrl" value="/admin/index"></beans:property>  
    50.     </beans:bean>  
    51.     <beans:bean id="simpleUrlAuthenticationFailureHandler"  
    52.         class="org.springframework.security.web.authentication.SimpleUrlAuthenticationFailureHandler">  
    53.         <beans:property name="defaultFailureUrl" value="/login"></beans:property>  
    54.     </beans:bean>  
    55.   
    56.     <authentication-manager alias="myAuthenticationManager">  
    57.         <authentication-provider user-service-ref="myUserDetailServiceImpl">  
    58.             <password-encoder ref="encoder" />  
    59.         </authentication-provider>  
    60.     </authentication-manager>  
    61.   
    62.     <beans:bean id="myUserDetailServiceImpl"  
    63.         class="cn.com.abel.test.service.security.AdminUserDetailServiceImpl">  
    64.     </beans:bean>  
    65.   
    66.     <beans:bean id="authenticationProcessingFilterEntryPoint"  
    67.         class="org.springframework.security.web.authentication.LoginUrlAuthenticationEntryPoint">  
    68.         <beans:property name="loginFormUrl" value="/login"></beans:property>  
    69.     </beans:bean>  
    70.   
    71.     <!-- 认证过滤器 -->  
    72.     <beans:bean id="securityFilter"  
    73.         class="cn.com.abel.test.service.security.MySecurityFilter">  
    74.         <!-- 用户拥有的角色 -->  
    75.         <beans:property name="authenticationManager" ref="myAuthenticationManager" />  
    76.         <!-- 用户是否拥有所请求资源的权限 -->  
    77.         <beans:property name="accessDecisionManager" ref="myAccessDecisionManager" />  
    78.         <!-- 资源与角色的对应关系 -->  
    79.         <beans:property name="securityMetadataSource" ref="mySecurityMetadataSource" />  
    80.         <!-- <beans:property name="rejectPublicInvocations" value="true"/> -->  
    81.   
    82.     </beans:bean>  
    83.       
    84.     <beans:bean id="myAccessDecisionManager" class="myAccessDecisionManager"></beans:bean>  
    85.       
    86.     <beans:bean id="mySecurityMetadataSource"  
    87.         class="cn.com.abel.test.service.security.MySecurityMetadataSource">  
    88.         <beans:constructor-arg>  
    89.             <beans:ref bean="resourceService" />  
    90.         </beans:constructor-arg>  
    91.     </beans:bean>  
    92.   
    93.     <beans:bean id="encoder" class="org.springframework.security.authentication.encoding.Md5PasswordEncoder"></beans:bean>  
    94.     
    95. </beans:beans>  



    3、MyUsernamePasswordAuthenticationFilter.java

    1. package cn.com.abel.test.service.security;  
    2.   
    3. import javax.servlet.http.HttpServletRequest;  
    4. import javax.servlet.http.HttpServletResponse;  
    5.   
    6. import org.springframework.security.authentication.AuthenticationServiceException;  
    7. import org.springframework.security.authentication.UsernamePasswordAuthenticationToken;  
    8. import org.springframework.security.core.Authentication;  
    9. import org.springframework.security.core.AuthenticationException;  
    10. import org.springframework.security.web.authentication.UsernamePasswordAuthenticationFilter;  
    11.   
    12. public class MyUsernamePasswordAuthenticationFilter extends UsernamePasswordAuthenticationFilter{  
    13.   
    14.     @Override  
    15.     public Authentication attemptAuthentication(HttpServletRequest request, HttpServletResponse response) throws AuthenticationException {  
    16.   
    17.         if (!request.getMethod().equals("POST")) {  
    18.             throw new AuthenticationServiceException("Authentication method not supported: " + request.getMethod());  
    19.         }  
    20.   
    21.         String username = obtainUsername(request);  
    22.         String password = obtainPassword(request);  
    23.   
    24.         if (username == null) {  
    25.             username = "";  
    26.         }  
    27.   
    28.         if (password == null) {  
    29.             password = "";  
    30.         }  
    31.   
    32.         username = username.trim();  
    33.   
    34.         UsernamePasswordAuthenticationToken authRequest = new UsernamePasswordAuthenticationToken(username, password);  
    35.   
    36.         // Allow subclasses to set the "details" property  
    37.         setDetails(request, authRequest);  
    38.   
    39. //      //登录验证码,如需要开启把下面注释去掉则可  
    40. //      String authCode = StringUtils.defaultString(request.getParameter("authCode"));  
    41. //      if(!AdwImageCaptchaServlet.validateResponse(request, authCode)){  
    42. //          throw new AuthenticationServiceException("validCode.auth.fail");  
    43. //      }  
    44.   
    45.         return this.getAuthenticationManager().authenticate(authRequest);  
    46.     }  
    47. }  


    4、MySecurityFilter.java

    1. package cn.com.abel.test.service.security;  
    2.   
    3. import java.io.IOException;  
    4.   
    5. import javax.servlet.Filter;  
    6. import javax.servlet.FilterChain;  
    7. import javax.servlet.FilterConfig;  
    8. import javax.servlet.ServletException;  
    9. import javax.servlet.ServletRequest;  
    10. import javax.servlet.ServletResponse;  
    11.   
    12. import org.springframework.security.access.SecurityMetadataSource;  
    13. import org.springframework.security.access.intercept.AbstractSecurityInterceptor;  
    14. import org.springframework.security.access.intercept.InterceptorStatusToken;  
    15. import org.springframework.security.web.FilterInvocation;  
    16. import org.springframework.security.web.access.intercept.FilterInvocationSecurityMetadataSource;  
    17.   
    18. public class MySecurityFilter extends AbstractSecurityInterceptor implements Filter {  
    19.     //与applicationContext-security.xml里的myFilter的属性securityMetadataSource对应,  
    20.     //其他的两个组件,已经在AbstractSecurityInterceptor定义  
    21.     private FilterInvocationSecurityMetadataSource securityMetadataSource;  
    22.   
    23.     @Override  
    24.     public SecurityMetadataSource obtainSecurityMetadataSource() {  
    25.         return this.securityMetadataSource;  
    26.     }  
    27.   
    28.     public void doFilter(ServletRequest request, ServletResponse response,  
    29.             FilterChain chain) throws IOException, ServletException {  
    30.         FilterInvocation fi = new FilterInvocation(request, response, chain);  
    31.         invoke(fi);  
    32.     }  
    33.       
    34.     private void invoke(FilterInvocation fi) throws IOException, ServletException {  
    35.         // object为FilterInvocation对象  
    36.         //1.获取请求资源的权限  
    37.         //执行Collection<ConfigAttribute> attributes = SecurityMetadataSource.getAttributes(object);  
    38.         //2.是否拥有权限  
    39.         //获取安全主体,可以强制转换为UserDetails的实例  
    40.         //1) UserDetails  
    41.         // Authentication authenticated = authenticateIfRequired();  
    42.         //this.accessDecisionManager.decide(authenticated, object, attributes);  
    43.         //用户拥有的权限  
    44.         //2) GrantedAuthority  
    45.         //Collection<GrantedAuthority> authenticated.getAuthorities()  
    46.         //System.out.println("用户发送请求! ");  
    47.         InterceptorStatusToken token = null;  
    48.           
    49.         token = super.beforeInvocation(fi);  
    50.           
    51.         try {  
    52.             fi.getChain().doFilter(fi.getRequest(), fi.getResponse());  
    53.         } finally {  
    54.             super.afterInvocation(token, null);  
    55.         }  
    56.     }  
    57.   
    58.     public FilterInvocationSecurityMetadataSource getSecurityMetadataSource() {  
    59.         return securityMetadataSource;  
    60.     }  
    61.   
    62.     public void setSecurityMetadataSource(FilterInvocationSecurityMetadataSource securityMetadataSource) {  
    63.         this.securityMetadataSource = securityMetadataSource;  
    64.     }  
    65.       
    66.     public void init(FilterConfig arg0) throws ServletException {  
    67.         // TODO Auto-generated method stub  
    68.     }  
    69.       
    70.     public void destroy() {  
    71.         // TODO Auto-generated method stub  
    72.           
    73.     }  
    74.   
    75.     @Override  
    76.     public Class<? extends Object> getSecureObjectClass() {  
    77.         //下面的MyAccessDecisionManager的supports方面必须放回true,否则会提醒类型错误  
    78.         return FilterInvocation.class;  
    79.     }  
    80. }  


    5、AdminUserDetailServiceImpl.java

    1. package cn.com.abel.test.service.security;  
    2.   
    3. import java.util.HashSet;  
    4. import java.util.List;  
    5. import java.util.Set;  
    6.   
    7. import org.springframework.beans.factory.annotation.Autowired;  
    8. import org.springframework.security.core.GrantedAuthority;  
    9. import org.springframework.security.core.authority.SimpleGrantedAuthority;  
    10. import org.springframework.security.core.userdetails.UserDetails;  
    11. import org.springframework.security.core.userdetails.UserDetailsService;  
    12. import org.springframework.security.core.userdetails.UsernameNotFoundException;  
    13.   
    14. import cn.com.abel.test.model.RoleModel;  
    15. import cn.com.abel.test.model.MemberModel;  
    16. import cn.com.abel.test.service.RoleService;  
    17. import cn.com.abel.test.service.MemberService;  
    18.   
    19. public class AdminUserDetailServiceImpl implements UserDetailsService {  
    20.     @Autowired  
    21.     private MemberService memberService;  
    22.     @Autowired  
    23.     RoleService roleService;  
    24.    
    25.     //登录验证  
    26.     public UserDetails loadUserByUsername(String username) throws UsernameNotFoundException {  
    27.           
    28.        
    29.         MemberModel member = memberService.getUserDetailsByUserName(username);  
    30.           
    31.         if(member==null){  
    32.             throw new UsernameNotFoundException("member "+username +" not found.");  
    33.         }  
    34.         Set<GrantedAuthority> grantedAuths = obtionGrantedAuthorities(member);  
    35.   
    36.                 //封装成spring security的user  
    37.                 User userdetail = new User(user.getUserName(), user.getPassword(),  
    38.                 true// 账号状态 0 表示停用 1表示启用  
    39.                 truetruetrue, grantedAuths // 用户的权限  
    40.                 );  
    41.                 return userdetail;  
    42.     }  
    43.       
    44.     //取得用户的权限  
    45.     private Set<GrantedAuthority> obtionGrantedAuthorities(MemberModel member) {  
    46.           
    47.         Set<GrantedAuthority> authSet = new HashSet<GrantedAuthority>();  
    48.           
    49.         List<RoleModel> roles = roleService.getRoleByUser(member)<span style="font-family:Arial, Helvetica, sans-serif;">;</span>  
    50.         if(roles!=null){  
    51.             for(RoleModel role : roles) {  
    52.                 authSet.add(new SimpleGrantedAuthority(role.getRoleCode().trim()));  
    53.             }  
    54.         }  
    55.    
    56.         return authSet;  
    57.     }  
    58.       
    59. }  


    6、MyAccessDecisionManager.java

    1. package cn.com.abel.test.service.security;  
    2.   
    3. import java.util.Collection;  
    4. import java.util.Iterator;  
    5.   
    6. import org.springframework.security.access.AccessDecisionManager;  
    7. import org.springframework.security.access.AccessDeniedException;  
    8. import org.springframework.security.access.ConfigAttribute;  
    9. import org.springframework.security.authentication.InsufficientAuthenticationException;  
    10. import org.springframework.security.core.Authentication;  
    11. import org.springframework.security.core.GrantedAuthority;  
    12.   
    13. public class MyAccessDecisionManager implements AccessDecisionManager {  
    14.       
    15.     public void decide(Authentication authentication, Object object, Collection<ConfigAttribute> configAttributes) throws AccessDeniedException, InsufficientAuthenticationException {  
    16.         if(configAttributes == null) {  
    17.             return;  
    18.         }  
    19.         //所请求的资源拥有的权限(一个资源对多个权限)  
    20.         Iterator<ConfigAttribute> iterator = configAttributes.iterator();  
    21.         while(iterator.hasNext()) {  
    22.             ConfigAttribute configAttribute = iterator.next();  
    23.             //访问所请求资源所需要的权限  
    24.             String needPermission = configAttribute.getAttribute();  
    25.             System.out.println("needPermission is " + needPermission);  
    26.             //用户所拥有的权限authentication  
    27.             for(GrantedAuthority ga : authentication.getAuthorities()) {  
    28.                 if(needPermission.equals(ga.getAuthority())) {  
    29.                     return;  
    30.                 }  
    31.             }  
    32.         }  
    33.         //没有权限让我们去捕捉  
    34.         throw new AccessDeniedException(" 没有权限访问!");  
    35.     }  
    36.   
    37.     public boolean supports(ConfigAttribute attribute) {  
    38.         // TODO Auto-generated method stub  
    39.         return true;  
    40.     }  
    41.   
    42.     public boolean supports(Class<?> clazz) {  
    43.         // TODO Auto-generated method stub  
    44.         return true;  
    45.     }  
    46.       
    47. }  


    7、MySecurityMetadataSource.java

    1. package cn.com.abel.test.service.security;  
    2.   
    3. import java.util.ArrayList;  
    4. import java.util.Collection;  
    5. import java.util.HashSet;  
    6. import java.util.Iterator;  
    7. import java.util.List;  
    8. import java.util.Map;  
    9. import java.util.Map.Entry;  
    10. import java.util.TreeMap;  
    11. import java.util.concurrent.ConcurrentHashMap;  
    12.   
    13. import javax.servlet.http.HttpServletRequest;  
    14.   
    15. import org.apache.commons.lang.StringUtils;  
    16. import org.springframework.beans.factory.InitializingBean;  
    17. import org.springframework.security.access.ConfigAttribute;  
    18. import org.springframework.security.access.SecurityConfig;  
    19. import org.springframework.security.web.FilterInvocation;  
    20. import org.springframework.security.web.access.intercept.FilterInvocationSecurityMetadataSource;  
    21. import org.springframework.security.web.util.matcher.AntPathRequestMatcher;  
    22. import org.springframework.security.web.util.matcher.RequestMatcher;  
    23.   
    24. import cn.com.abel.test.model.RoleModel;  
    25. import cn.com.abel.test.service.ResourceService;  
    26.   
    27. public class MySecurityMetadataSource  implements FilterInvocationSecurityMetadataSource,InitializingBean {  
    28.   
    29.       
    30.     private static final String AUTH_NO_ROLE =" __AUTH_NO_ROLE__";  
    31.       
    32.     private ResourceService resourceService;  
    33.       
    34.     public MySecurityMetadataSource(ResourceService resourceService) {  
    35.         this.resourceService = resourceService;  
    36.     }  
    37.   
    38.     private static Map<String, Collection<ConfigAttribute>> resourceMap = null;  
    39.   
    40.     public Collection<ConfigAttribute> getAllConfigAttributes() {  
    41.         return null;  
    42.     }  
    43.   
    44.     public boolean supports(Class<?> clazz) {  
    45.         return true;  
    46.     }  
    47.     private void loadResourceDefine() {  
    48.         if(resourceMap == null) {  
    49.             resourceMap = new ConcurrentHashMap<String, Collection<ConfigAttribute>>();  
    50.         }else{  
    51.             resourceMap.clear();  
    52.         }  
    53.           
    54.         Map<String,List<RoleModel>> resourceRoleMap = resourceService.getAllResourceRole();  
    55.           
    56.         for (Entry<String,List<RoleModel>> entry : resourceRoleMap.entrySet()) {  
    57.             String url = entry.getKey();  
    58.             List<RoleModel> values = entry.getValue();  
    59.               
    60.             Collection<ConfigAttribute> configAttributes = new ArrayList<ConfigAttribute>();  
    61.             for(RoleModel secRoleModel : values){  
    62.                 ConfigAttribute configAttribute = new SecurityConfig(StringUtils.defaultString(secRoleModel.getRoleCode(),AUTH_NO_ROLE));  
    63.                 configAttributes.add(configAttribute);  
    64.             }  
    65.             resourceMap.put(url, configAttributes);  
    66.         }  
    67.     }  
    68.     public Collection<ConfigAttribute> getAttributes(Object object) throws IllegalArgumentException {  
    69.           
    70.         HttpServletRequest request = ((FilterInvocation) object).getHttpRequest();    
    71.    
    72.         TreeMap<String, Collection<ConfigAttribute>> attrMap = new TreeMap<String, Collection<ConfigAttribute>>(resourceMap);  
    73.           
    74.         Iterator<String> ite = attrMap.keySet().iterator();    
    75.           
    76.         RequestMatcher urlMatcher = null;    
    77.   
    78.         Collection<ConfigAttribute> attrSet = new HashSet<ConfigAttribute>();  
    79.         //match all of /admin/**  a/b/**  
    80.         while (ite.hasNext()) {    
    81.               
    82.             String resURL = ite.next();    
    83.             urlMatcher = new AntPathRequestMatcher(resURL);  
    84.   
    85.             if (urlMatcher.matches(request)||StringUtils.equals(request.getRequestURI(),resURL)) {    
    86.                 attrSet.addAll(attrMap.get(resURL));    
    87.             }    
    88.         }    
    89.   
    90.         if(!attrSet.isEmpty()){  
    91.             return attrSet;  
    92.         }  
    93.         return null;  
    94.     }  
    95.    
    96.     @Override  
    97.     public void afterPropertiesSet() throws Exception {  
    98.         loadResourceDefine() ;  
    99.     }  
    100.       
    101. }  


    8、ResourceService.java

    此类是为从数据库获取系统中的资源所属的角色,根据自己的数据表自行编写。

    1. package cn.com.abel.test.service;  
    2.   
    3. import java.util.ArrayList;  
    4. import java.util.HashMap;  
    5. import java.util.HashSet;  
    6. import java.util.List;  
    7. import java.util.Map;  
    8.   
    9. import org.apache.commons.collections.CollectionUtils;  
    10. import org.springframework.beans.factory.annotation.Autowired;  
    11. import org.springframework.stereotype.Service;  
    12.   
    13. import cn.com.abel.test.mapper.ResourceModelMapper;  
    14. import cn.com.abel.test.mapper.RoleModelMapper;  
    15. import cn.com.abel.test.mapper.RoleResourcetModelMapper;  
    16. import cn.com.abel.test.model.ResourceModel;  
    17. import cn.com.abel.test.model.ResourceModelCriteria;  
    18. import cn.com.abel.test.model.RoleModel;  
    19. import cn.com.abel.test.model.RoleModelCriteria;  
    20. import cn.com.abel.test.model.RoleResourcetModel;  
    21. import cn.com.abel.test.model.RoleResourcetModelCriteria;  
    22.   
    23. @Service  
    24. public class ResourceService {  
    25.       
    26.     @Autowired  
    27.     ResourceModelMapper resourceModelMapper;  
    28.       
    29.     @Autowired  
    30.     RoleModelMapper roleMapper;  
    31.       
    32.     @Autowired  
    33.     RoleResourcetModelMapper  roleResMapper;  
    34.       
    35.     /** 
    36.      * 获取各个资源(url)对应的角色 
    37.      * @return 
    38.      */  
    39.     public Map<String,List<RoleModel>> getAllResourceRole(){  
    40.           
    41.          Map<String,List<RoleModel>> resultMap = new HashMap<String,List<RoleModel>>();  
    42.            
    43.         ResourceModelCriteria secResourceModelExample = new ResourceModelCriteria();  
    44.         List<ResourceModel> resourceList = resourceModelMapper.selectByExample(secResourceModelExample);  
    45.           
    46.         if(CollectionUtils.isNotEmpty(resourceList)){  
    47.             for(ResourceModel secResourceModel : resourceList){  
    48.                 RoleModelCriteria roleCriteria = new RoleModelCriteria();  
    49.                 roleCriteria.createCriteria().andIdIn(getRoleIdsByResourceId(secResourceModel.getId()));  
    50.                 List<RoleModel> roleList = roleMapper.selectByExample(roleCriteria);  
    51.                 resultMap.put(secResourceModel.getValue(), roleList);  
    52.                   
    53.             }  
    54.         }  
    55.        
    56.         return resultMap;  
    57.     }  
    58.       
    59.     public List<Integer> getRoleIdsByResourceId(Integer resourceId){  
    60.         List<Integer> roleIds = new ArrayList<Integer>();  
    61.           
    62.         RoleResourcetModelCriteria criteria = new RoleResourcetModelCriteria();  
    63.         criteria.createCriteria().andResourceIdEqualTo(resourceId);  
    64.         List<RoleResourcetModel> list = roleResMapper.selectByExample(criteria);  
    65.         if(CollectionUtils.isNotEmpty(list)){  
    66.             for(RoleResourcetModel model : list){  
    67.                 roleIds.add(model.getRoleId());  
    68.             }  
    69.         }  
    70.           
    71.         HashSet<Integer> h  =   new  HashSet<Integer>(roleIds);       
    72.         roleIds.clear();       
    73.         roleIds.addAll(h);     
    74.         return roleIds;  
    75.     }  
    76. }  



    最后附上数据表的SQL:

    1. CREATE TABLE `auth_resource` (  
    2.     `id` INT(11) NOT NULL AUTO_INCREMENT,  
    3.     `nameVARCHAR(100) NULL DEFAULT NULL COMMENT '资源名称',  
    4.     `value` VARCHAR(100) NULL DEFAULT NULL COMMENT '资源值',  
    5.     `summary` VARCHAR(1000) NULL DEFAULT NULL COMMENT '资源描述',  
    6.     `updated_time` DATETIME NULL DEFAULT NULL,  
    7.     `updated_user` VARCHAR(100) NULL DEFAULT NULL,  
    8.     PRIMARY KEY (`id`)  
    9. )  
    10. COMMENT='资源访问表'  
    11. COLLATE='utf8_general_ci'  
    12. ENGINE=InnoDB;  
    13.   
    14. CREATE TABLE `auth_role` (  
    15.     `id` INT(11) NOT NULL AUTO_INCREMENT,  
    16.     `role_name` VARCHAR(100) NULL DEFAULT NULL COMMENT '角色名称',  
    17.     `role_code` VARCHAR(100) NULL DEFAULT NULL COMMENT '角色代码',  
    18.     `updated_time` DATETIME NULL DEFAULT NULL,  
    19.     `updated_user` VARCHAR(100) NULL DEFAULT NULL,  
    20.     PRIMARY KEY (`id`)  
    21. )  
    22. COMMENT='角色表'  
    23. COLLATE='utf8_general_ci'  
    24. ENGINE=InnoDB;  
    25.   
    26. CREATE TABLE `role_resource` (  
    27.     `id` INT(11) NOT NULL AUTO_INCREMENT,  
    28.     `role_id` INT(11) NOT NULL,  
    29.     `resource_id` INT(11) NOT NULL,  
    30.     PRIMARY KEY (`id`),  
    31.     UNIQUE INDEX `role_id_resource_id` (`role_id`, `resource_id`)  
    32. )  
    33. COMMENT='资源角色关联表'  
    34. COLLATE='utf8_general_ci'  
    35. ENGINE=InnoDB;  
    36.   
    37. CREATE TABLE `member` (  
    38.     `id` INT(11) NOT NULL AUTO_INCREMENT,  
    39.     `user_name` VARCHAR(100) NULL DEFAULT NULL,  
    40.     `nick` VARCHAR(100) NULL DEFAULT NULL,  
    41.     `passwordVARCHAR(100) NULL DEFAULT NULL,  
    42.     `sex` INT(11) NULL DEFAULT NULL,  
    43.     `birthday` DATE NULL DEFAULT NULL,  
    44.     `mobile` VARCHAR(50) NULL DEFAULT NULL,  
    45.     `email` VARCHAR(50) NULL DEFAULT NULL,  
    46.     `address` VARCHAR(512) NULL DEFAULT NULL,  
    47.     `regip` VARCHAR(100) NULL DEFAULT NULL,  
    48.     `created_time` DATETIME NULL DEFAULT NULL,  
    49.     PRIMARY KEY (`id`)  
    50. )  
    51. COMMENT='用户表'  
    52. COLLATE='utf8_general_ci'  
    53. ENGINE=InnoDB  
    54. AUTO_INCREMENT=2;  
    55.   
    56. CREATE TABLE `member_role` (  
    57.     `id` INT(11) NOT NULL AUTO_INCREMENT,  
    58.     `member_id` INT(11) NOT NULL,  
    59.     `role_id` INT(11) NOT NULL,  
    60.     PRIMARY KEY (`id`),  
    61.     UNIQUE INDEX `member_id_role_id` (`member_id`, `role_id`)  
    62. )  
    63. COMMENT='用户角色关联表'  
    64. COLLATE='utf8_general_ci'  
    65. ENGINE=InnoDB;  


    完整代码下载(包含数据库):http://download.csdn.net/download/rongku/9931455



  • 相关阅读:
    Arcengine效率探究之二——属性的更新 转载
    ArcEngine GDB数据库查询方法总结 转载
    黄聪:Python 字符串操作(string替换、删除、截取、复制、连接、比较、查找、包含、大小写转换、分割等)
    arcgis10.1补丁下载
    arcgis 分式标注jscript "<und>"+ [DLBM] +"</und>"+ "\r\n" + [DLMC]
    arcgis开发,C盘磁盘空间消失元凶,让c盘可以多出10G
    arcgis 查询 group by order by
    arcgis jscript参考http://technet.microsoft.com/zhcn/library/997bcd30(v=vs.80)
    在ArcEngine下实现图层属性过滤的两种方法 转载http://www.gisall.com/html/72/1242722990.html
    使用Geoprocessor 计算面积和长度 转载
  • 原文地址:https://www.cnblogs.com/jpfss/p/9045978.html
Copyright © 2011-2022 走看看