Spring Boot 2.1.1问题访问Oauth2中的PostgreSQL中的表

时间:2019-01-19 00:22:32

标签: spring postgresql scala spring-boot spring-oauth2

在遵循一些示例来清理我的代码之后,我试图通过Spring Boot添加对OAuth2的postgresql支持。

问题是,尽管在最新的Spring Boot中指定了某些属性,但我还是必须手动将模式添加到我自己的模式脚本中才能创建数据库。只有这样做后,表格才能被识别。此外,OAuth2继续失败,未找到任何表。该问题似乎与架构有关。

我能够通过禁用自动配置而无需在实体中指定一个模式来识别自己的模式,但无法弄清楚为什么除非使用公共模式,否则找不到OAuth2表。

我添加了以下属性文件,尝试使Spring引导识别我的模式:

    server.port=8081

    ## Spring DATASOURCE (DataSourceAutoConfiguration & DataSourceProperties)
    # The SQL dialect makes Hibernate generate better SQL for the chosen database

    # Hibernate ddl auto (create, create-drop, validate, update)
    spring.datasource.jdbcUrl=jdbc:postgresql://xxxxxx:xxx/oauth2
    spring.datasource.username= xxxxx
    spring.datasource.password= xxxxx
    spring.datasource.hikari.minimumIdle=5
spring.datasource.hikari.maximumPoolSize=20
spring.datasource.hikari.idleTimeout=30000
spring.datasource.hikari.poolName=SpringBootJPAHikariCP
spring.datasource.hikari.maxLifetime=2000000
spring.datasource.hikari.connectionTimeout=30000
spring.jpa.properties.hibernate.jdbc.lob.non_contextual_creation=true;
spring.jpa.properties.hibernate.current_session_context_class=thread
spring.jpa.hibernate.ddl-auto=none
spring.datasource.tomcat.default-auto-commit=true

# The SQL dialect makes Hibernate generate better SQL for the chosen database
spring.jpa.properties.hibernate.dialect = org.hibernate.dialect.PostgreSQL95Dialect
spring.jpa.hibernate.connection.provider_class=org.hibernate.hikaricp.internal.HikariCPConnectionProvider
spring.jpa.properties.hibernate.show_sql=true
spring.jpa.properties.hibernate.format_sql=true
spring.jpa.properties.hibernate.use_sql=true
spring.jpa.properties.hibernate.id.new_generator_mappings=false
spring.jpa.properties.hibernate.search.autoregister_listeners=false
spring.jpa.properties.hibernate.bytecode.use_reflection_optimizer=false
spring.jpa.properties.hibernate.default_schema = public


# spring.jpa.hibernate.naming.implicit-strategy=org.hibernate.boot.model.naming.ImplicitNamingStrategyLegacyJpaImpl
# spring.jpa.hibernate.naming.physical-strategy=org.hibernate.boot.model.naming.PhysicalNamingStrategyStandardImpl

# Hibernate ddl auto (create, create-drop, validate, update)


spring.thymeleaf.templateResolverOrder=1
logging.level.org.springframework=INFO
entitymanager.packagesToScan = com.si.model


logging.level.org.springframework.web=DEBUG
logging.level.guru.springframework.controllers=DEBUG
logging.level.org.hibernate=INFO
spring.main.allow-bean-definition-overriding=true

spring.thymeleaf.cache=false

logging.level.org.hibernate.SQL=DEBUG
logging.level.org.hibernate.type.descriptor.sql.BasicBinder=TRACE

spring.datasource.schema=classpath:schema.sql
spring.datasource.initialization-mode=always
spring.jpa.properties.hibernate.physical_naming_strategy=org.hibernate.boot.model.naming.PhysicalNamingStrategyStandardImpl

spring.template.cache: false
    spring.jpa.properties.hibernate.physical_naming_strategy=org.hibernate.boot.model.naming.PhysicalNamingStrategyStandardImpl

我也尝试过为授权服务器中的每个对象设置数据源:

@Configuration
@EnableAuthorizationServer
class AuthorizationServerConfiguration extends AuthorizationServerConfigurerAdapter {
  @Bean
  @ConfigurationProperties(prefix = "spring.datasource")
  def oauthDataSource: DataSource = DataSourceBuilder.create.build

  @Autowired
  private var authenticationManager: AuthenticationManager = null

  @Bean
  def clientDetailsService = new JdbcClientDetailsService(oauthDataSource)

  @Bean
  def tokenStore = new JdbcTokenStore(oauthDataSource)

  @Bean
  def approvalStore = new JdbcApprovalStore(oauthDataSource)

  @Bean
  def authorizationCodeServices = new JdbcAuthorizationCodeServices(oauthDataSource)

  @Bean
  def passwordEncoder(): Pbkdf2PasswordEncoder = new Pbkdf2PasswordEncoder()

  @throws[Exception]
  override def configure(clients: ClientDetailsServiceConfigurer): Unit = {
    clients.jdbc(oauthDataSource)
  }

  @throws[Exception]
  override def configure(oauthServer: AuthorizationServerSecurityConfigurer): Unit = {
    oauthServer.passwordEncoder(passwordEncoder)
  }

  @throws[Exception]
  override def configure(endpoints: AuthorizationServerEndpointsConfigurer): Unit = {
    endpoints
        .authenticationManager(authenticationManager)
        .approvalStore(approvalStore)
        .authorizationCodeServices(authorizationCodeServices)
        .tokenStore(tokenStore)
  }
}

最后,我将网络配置设置如下:

class WebSecurityConfiguration extends WebSecurityConfigurerAdapter {
  @Autowired
  private var passwordEncoder: Pbkdf2PasswordEncoder = null

  @Bean
  @Primary
  @ConfigurationProperties(prefix = "spring.datasource")
  def dataSource: DataSource = DataSourceBuilder.create.`type`(classOf[HikariDataSource]).build

  @Bean
  @throws[Exception]
  override def authenticationManagerBean: AuthenticationManager = super.authenticationManagerBean

  @Bean
  @throws[Exception]
  override def userDetailsServiceBean = new JdbcUserDetails()

  @throws[Exception]
  override def configure(web: WebSecurity): Unit = {
    web.ignoring.antMatchers("/webjars/**", "/resources/**")
  }

  @throws[Exception]
  override protected def configure(http: HttpSecurity): Unit = {
    http
      .csrf().disable()
      .authorizeRequests
        .antMatchers("/login", "/logout.do")
          .permitAll
        .antMatchers("/**")
          .authenticated
        .and.
        formLogin
          .loginProcessingUrl("/login.do")
          .usernameParameter("username")
          .passwordParameter("password")
          .loginPage("/login")
        .and
        .logout
          .logoutRequestMatcher(new AntPathRequestMatcher("/logout.do"))
      .and
        .userDetailsService(userDetailsServiceBean)
  }

  @throws[Exception]
  override protected def configure(auth: AuthenticationManagerBuilder): Unit = {
    auth
      .userDetailsService(userDetailsServiceBean)
      .passwordEncoder(passwordEncoder)
  }
}

由于某种原因,我不得不在模式脚本中将模式设置为public:

   drop table if exists public.oauth_client_token cascade;
create table if not exists public.oauth_client_token (
  token_id VARCHAR(255) not null primary key,
  token bytea,
  authentication_id VARCHAR(255),
  user_name VARCHAR(255),
  client_id VARCHAR(255)
);

drop table if exists public.oauth_client_details cascade;
CREATE TABLE if not exists public.oauth_client_details (
  client_id varchar(255) NOT NULL primary key,
  resource_ids varchar(255) DEFAULT NULL,
  client_secret varchar(255) DEFAULT NULL,
  scope varchar(255) DEFAULT NULL,
  authorized_grant_types varchar(255) DEFAULT NULL,
  web_server_redirect_uri varchar(255) DEFAULT NULL,
  authorities varchar(255) DEFAULT NULL,
  access_token_validity integer,
  refresh_token_validity integer,
  additional_information varchar(255) DEFAULT NULL,
  autoapprove varchar(255) DEFAULT NULL
);

drop table if exists public.oauth_access_token cascade;
create table if not exists public.oauth_access_token(
  token_id VARCHAR(255),
  token bytea,
  authentication_id VARCHAR(255),
  user_name VARCHAR(255),
  client_id VARCHAR(255),
  authentication bytea,
  refresh_token VARCHAR(255)
);

drop table if exists public.oauth_refresh_token cascade;
create table if not exists public.oauth_refresh_token(
  token_id VARCHAR(255),
  token bytea,
  authentication bytea
);
drop table if exists public.authorities cascade;
CREATE TABLE if not exists public.authorities (
  id  bigserial not null primary key,
  authority varchar(255)
);

drop table if exists public.credentials cascade;
CREATE TABLE if not exists public.credentials (
  id  bigserial not null primary key,
  enabled boolean not null,
  name varchar(255) not null,
  password varchar(255) not null,
  version integer
);

drop table if exists public.credentials_authorities cascade;
CREATE TABLE if not exists public.credentials_authorities (
  credentials_id bigint not null,
  authorities_id bigint not null
);

drop table if exists public.oauth_code cascade;
create table if not exists public.oauth_code (
  code VARCHAR(255),
  authentication bytea
);

drop table if exists public.oauth_approvals cascade;
create table if not exists public.oauth_approvals (
    userId VARCHAR(255),
    clientId VARCHAR(255),
    scope VARCHAR(255),
    status VARCHAR(10),
    expiresAt timestamp without time zone,
    lastModifiedAt timestamp without time zone
);

从clientDetailsRepository或Oauth2应用程序访问oauth2表会导致诸如以下错误:

org.postgresql.util.PSQLException: ERROR: relation "oauth_client_details" does not exist

作为最后的选择,我在postgresql中为我的用户将搜索路径设置为public,但仍然出现此错误。

更新

以下查询在pgadmin4中有效,是我失败的根源:

select client_id, client_secret, resource_ids, scope, authorized_grant_types, web_server_redirect_uri, authorities, access_token_validity, refresh_token_validity, additional_information, autoapprove from oauth_client_details order by client_id

关于为什么会发生这种情况的任何想法?我该如何解决?

0 个答案:

没有答案