覆盖 MVC4 应用程序的 User.IsInRole 和 [Authorize(Roles = "Admin" )]



我已经为我的MVC4应用程序创建了一个自定义角色提供程序,在该程序中,我成功地覆盖了CreateRole、GetAllRoles和RoleExists方法,并将它们链接到我现有的数据库,如下所示:

namespace Project.Providers
{
  public class MyProvider : System.Web.Security.SqlRoleProvider
  {
    private MyContext dbcontext = new MyContext(System.Configuration.ConfigurationManager.ConnectionStrings["MyContext"].ConnectionString);
    private Repository<MyUser> userRepository;
    private Repository<Role> roleRepository;
    public MyProvider()
    {
        this.userRepository = new Repository<MyUser>(dbcontext);
        this.roleRepository = new Repository<Role>(dbcontext);
    }
    public override string[] GetAllRoles()
    {
        IEnumerable<Role> dbRoles = roleRepository.GetAll();
        int dbRolesCount = roleRepository.GetAll().Count();
        string[] roles = new string[dbRolesCount];
        int i = 0;
        foreach(var role in dbRoles)
        {
            roles[i] = role.Name;
            i++;
        }
        return roles;
    }
    public override bool RoleExists(string roleName)
    {
        string[] roles = { "Admin", "User", "Business" };
        if(roles.Contains(roleName))
            return true;
        else
            return false;
    }
    public override void CreateRole(string roleName)
    {
        Role newRole = new Role();
        newRole.Name = roleName;
        roleRepository.Add(newRole);
        roleRepository.SaveChanges();
    }
    public override bool IsUserInRole(string userName, string roleName)
    {
        MyUser user = userRepository.Get(u => u.Username == userName).FirstOrDefault();
        Role role = roleRepository.Get(r => r.Name == roleName).FirstOrDefault();
        if (user.RoleID == role.RoleID)
            return true;
        else
            return false;
    }
  }
}

我一直找不到覆盖的方法

User.IsInRole(string roleName)

我还必须做什么才能在使用时:

[Authorize(Roles = "Admin")]

它将基于我设置的角色提供程序,而不是asp默认值。

我的用户类现在如下:

using System;
using System.Collections.Generic;
using System.Linq;
using System.Text;
using System.Threading.Tasks;
using System.ComponentModel.DataAnnotations;
using System.Collections;
using System.Security.Principal;
namespace Project.Data
{
  public class MyUser : IPrincipal
  {
    [Key]
    public int UserID { get; set; }
    [StringLength(128)]
    public string Username { get; set; }              
    .....other properties
    public IIdentity Identity { get; set; }
    public bool IsInRole(string role)
    {
        if (this.Role.Name == role)
        {
            return true;
        }
        return false;
    }
    public IIdentity Identity
    {
        get { throw new NotImplementedException(); }
    }
  }
}

我的堆栈跟踪似乎在以下位置:

System.Web.Security.RolePrincipal.IsInRole(String role) 

因此,我尝试以与设置自定义提供程序相同的方式实现自定义RolePrincipal。有什么想法吗?不确定它需要什么构造函数参数。这是我的尝试:

using System;
using System.Collections.Generic;
using System.Linq;
using System.Web;
using System.Configuration.Provider;
using Project.Data;
using System.Web.Security;
using System.Security.Principal.IIdentity;
namespace Project.Principal
{
  public class MyPrincipal : System.Web.Security.RolePrincipal
  {
    private MyContext dbcontext = new MyContext(System.Configuration.ConfigurationManager.ConnectionStrings["MyContext"].ConnectionString);
    private Repository<MyUser> userRepository;
    private Repository<Role> roleRepository;        
    public MyPrincipal()
    {
        this.userRepository = new Repository<MyUser>(dbcontext);
        this.roleRepository = new Repository<Role>(dbcontext);
    }
    public override bool IsInRole(string role)
    {
        //code to be added
        return true;
    }
}

}

您只需要在自定义角色提供程序中重写方法GetRolesForUser,而不是更逻辑的IsUserInRole,因为这是默认实现所调用的,它会执行一些不需要的缓存。

您在IPrincipal类中覆盖IsInRole,EF中的mine如下所示:

public class MyUser : IPrincipal {
    //Properties
    ...
    public bool IsInRole(string role) {
        if (Roles.Any(m=>m.NameKey.ToLower().Equals(role.ToLower()))) {
            return true;
        }
        return false;
    }
}

然后,一旦您为RoleProvider和MembershipProvider在webconfig中添加了适当的部分,您就应该适合Authorize属性。

更新以回应您的评论

web配置应该看起来像:

...
<authentication mode="Forms">
  <forms loginUrl="~/Login" timeout="2880"></forms>
</authentication>
<authorization>
</authorization>
..
<membership defaultProvider="MyMembershipProvider">
  <providers>
    <add name="MyMembershipProvider" type="MyApp.Infrastructure.MyMembershipProvider" connectionStringName="connectionstring" enablePasswordRetrieval="false" enablePasswordReset="true" requiresQuestionAndAnswer="false" requiresUniqueEmail="true" />
  </providers>
</membership>
<roleManager defaultProvider="MyRoleProvider" enabled="true" cacheRolesInCookie="true">
  <providers>
    <clear />
    <add name="MyRoleProvider" type="MyApp.Infrastructure.MyRoleProvider" />
  </providers>
</roleManager>
...

在提供者中,用户是您的IPrincipal吗?

public MyUser User { get; private set; }

用户应具有和IIdentity

在MyUser.cs:中

    ...
    public virtual ICollection<Role> Roles { get; set; }
    public IIdentity Identity { get; set; }

从你的评论中,我没有太多额外的建议来帮助解决问题。

更新

我经历过一些例子,发现这些例子对我的设置很有帮助:http://www.brianlegg.com/post/2011/05/09/Implementing-your-own-RoleProvider-and-MembershipProvider-in-MVC-3.aspx

http://www.mattwrock.com/post/2009/10/14/Implementing-custom-MembershipProvider-and-Role-Provider-for-Authinticating-ASPNET-MVC-Applications.aspx

http://blogs.msdn.com/b/rickandy/archive/2012/03/23/securing-your-asp-net-mvc-4-app-and-the-new-allowanonymous-attribute.aspx?Redirected=true

在我的第一次浏览中,我读了很多其他文章和SO帖子,但这些都是我不厌其烦地添加书签的东西。我对授权采取了角色/权利的方法,这就是为什么其中一种方法是这样的。

要解决此问题,需要对应用程序进行4次更新。

    1. Create a class that extends RoleProvider.
    namespace MyApp
    {

     public class MyRoleProvider : RoleProvider
        {
            public override string ApplicationName
            {
                get
                {
                    throw new NotImplementedException();
                }
                set
                {
                    throw new NotImplementedException();
                }
            }
            public override void AddUsersToRoles(string[] usernames, string[] roleNames)
            {
                throw new NotImplementedException();
            }
            public override void CreateRole(string roleName)
            {
                throw new NotImplementedException();
            }
            public override bool DeleteRole(string roleName, bool throwOnPopulatedRole)
            {
                throw new NotImplementedException();
            }
            public override string[] FindUsersInRole(string roleName, string usernameToMatch)
            {
                throw new NotImplementedException();
            }
            public override string[] GetAllRoles()
            {
                throw new NotImplementedException();
            }
            public override string[] GetRolesForUser(string username)
            {
                using (ApplicationDbContext db = new ApplicationDbContext())
                {
                        // get user roles here using user name.
                }
            }

            public override string[] GetUsersInRole(string roleName)
            {
                throw new NotImplementedException();
            }
            public override bool IsUserInRole(string username, string roleName)
            {
                return GetRolesForUser(username).Contains(roleName);
            }
            public override void RemoveUsersFromRoles(string[] usernames, string[] roleNames)
            {
                throw new NotImplementedException();
            }
            public override bool RoleExists(string roleName)
            {
                throw new NotImplementedException();
            }
        }
}
    2. Create a custom filter that extends AuthorizeAttribute and overwrite its methods.
      public class MyAuthFilter : AuthorizeAttribute
    {

        public override void OnAuthorization(AuthorizationContext filterContext)
        {
            base.OnAuthorization(filterContext);
       }

        protected override void HandleUnauthorizedRequest(AuthorizationContext filterContext)
        {
            var routeValues = new RouteValueDictionary(new
            {
                controller = "Account",
                action = "Login",

            });
             filterContext.Result = new RedirectToRouteResult(routeValues);
            base.HandleUnauthorizedRequest(filterContext);
        }
        protected override bool AuthorizeCore(HttpContextBase httpContext)
        {
            string[] roles = Roles.Split(',');
            string userName = HttpContext.Current.User.Identity.Name;
            MyRoleProvider myProvider = new MyRoleProvider();

            foreach (string role in roles)
            {
                bool success = myProvider.IsUserInRole(userName, role);
                if (success == true)
                {
                    return true;
                }
            }
            return false;
        }
    3. Configure your custom role provider in your web.config.
      <system.web>
        <roleManager defaultProvider="MyRoleProvider" enabled="true" cacheRolesInCookie="true">
          <providers>
            <clear />
            <add name="MyRoleProvider" type="MyApp.MyRoleProvider" />
          </providers>
        </roleManager>
      </system.web>
      Note: The type here uses the fully qualified namespace and your class name = MyApp.MyRoleProvider. Yours can be different
    4. Use your custom filter instead of the default Authorize attribute for your controllers and actions. E.g 
    [MyAuthFilter]
    public class HomeController : Controller
    {
        public ActionResult Index()
        {
            ViewBag.Title = "Home Page";
            return View();
        }
    }

最新更新