经验首页 前端设计 程序设计 Java相关 移动开发 数据库/运维 软件/图像 大数据/云计算 其他经验
当前位置:技术经验 » 其他 » 网络安全 » 查看文章
数据安全之数据库字段加解密检索和前端返回脱敏?看看我这个最强解决方案
来源:cnblogs  作者:薛家明  时间:2023/8/14 8:51:34  对本文有异议

数据安全之数据库字段加解密检索和前端返回脱敏?看看我这个最强解决方案

前言

数据安全一直是我们老生常谈的话题了,随着国产化的日渐推进和数字化信息改革,数据安全越来越被人们所重视。数据库作为存储、管理和检索数据的核心基础设施,其中可能包含着大量的敏感信息,如个人手机号、身份证号码、银行账户、家庭地址等信息。为了保障这些敏感信息在部分情况下被明文泄露和未授权访问等恶意行为的侵害,数据库字段敏感信息加密变得至关重要。但是数据库列一旦加密那么就牵扯到很多问题。如何对数据库字段进行加密变得非常重要,目前主要有两个解决方案:

  • 数据库自带加密函数或者使用数据库自定义函数方法进行加密解密
  • 使用应用代码比如java、c#等语言自带的加密解密函数库

为了助力国产化的推进下面我将用solon + easy-query对其进行实践演练和原理进行解析。

当前项目地址demo https://gitee.com/xuejm/solon-encrypt

方法 优点 缺点
数据库函数对 实现简单,占用磁盘空间少,由数据库自行实现 模糊搜索效率低,与数据库函数绑定,兼容性差,仅可以使用数据库提供的函数或者自行编程数据库支持的加密解密
java代码 实现复杂,占用磁盘空间多 模糊搜索效率高,不与数据库函数绑定,兼容性好,可以自行扩展实现国密等对称非对称加密

solon

文档地址 https://xuejm.gitee.io/easy-query-doc/

GITHUB地址 https://github.com/noear/solon

GITEE地址 https://gitee.com/noear/solon

easy-qeury

文档地址 https://xuejm.gitee.io/easy-query-doc/

GITHUB地址 https://github.com/xuejmnet/easy-query

GITEE地址 https://gitee.com/xuejm/easy-query

数据库处理

这边我们以mysql为例实现数据库函数的加密解密,对数据库列进行数据保护处理。

方法 默认值
to_base64(AES_ENCRYPT('手机号值'),'秘钥') 将数据进行aes加密,然后进行base64编码
AES_DECRYPT(from_base64('手机号列'),'秘钥') 将数据进行base64解码,然后进行aes进行解密

这两个方法其实很好理解,就是通过调用数据库函数让其在数据库层面就实现了加密和解密,应用程序获取到的数据本身就是解密好了的,但是缺点就是如果需要支持列的like搜索性能会变得非常低下,因为需要对加密列进行AES_DECRYPT(from_base64('手机号列'),'秘钥')的解密处理

  1. select id,name,AES_DECRYPT(from_base64('phone'),'秘钥') as `phone` from user where AES_DECRYPT(from_base64('phone'),'秘钥') like '%567%'

当数据量少的时候那么数据库是比较轻松并且相对性能是可以接受的,但是随着数据量的越来越大,这种sql会慢慢变成瓶颈,那么是否有一种方案可以兼顾两者呢,其实是有的.

应用代码处理

分段加密,采用分段加密可以实现like语句的模糊搜索,并且支持数据的加密,但是这种方案也有缺点就是会比较占用空间,具体原理可以看下《阿里巴巴密文字段检索方案》 https://jaq-doc.alibaba.com/docs/doc.htm?treeId=1&articleId=106213&docType=1 文章给出了具体的实现方式,约定最少4位数字或者2位中文字符4位英文字符(半角),2个中文字符(全角),比如12345678901这么一串

分别对其进行分段[1234,2345,3456,4567,5678,6789,7890,8901]分成8份,并且对每一份进行等长数据加密,也就是加密后的结果需要等长,比如都是16位或者都是8位

算法/模式/填充 16 字节加密后数据长度 不满 16 字节加密后长度 本次采用
AES/CBC/NoPadding 16 不支持 ?
AES/CBC/PKCS5Padding 32 16 ?
AES/CBC/ISO10126Padding 32 16 ?
AES/CFB/NoPadding 16 原始数据长度 ?
AES/CFB/PKCS5Padding 32 16 ?
AES/CFB/ISO10126Padding 32 16 ?
AES/ECB/NoPadding 16 不支持 ?
AES/ECB/PKCS5Padding 32 16 ?
AES/ECB/ISO10126Padding 32 16 ?
AES/OFB/NoPadding 16 原始数据长度 ?
AES/OFB/PKCS5Padding 32 16 ?
AES/OFB/ISO10126Padding 32 16 ?
AES/PCBC/NoPadding 16 不支持 ?
AES/PCBC/PKCS5Padding 32 16 ?
AES/PCBC/ISO10126Padding 32 16 ?

加密

我们可以选择任意一种这次选择AES/CBC/PKCS5Padding 因为我们的数据原因最终肯定不满16字节,所以加密后肯定都是16字节长度,然后可以对其进行base64编码,编码后会变成24字节在对其进行合并存储

base64(aes('1234')) + base64(aes('2345')) + base64(aes('3456')) +......+ base64(aes('7890')) + base64(aes('8901'))

,然后存入数据库,之后需要对其like的话限制最小like的数据应该满足最少4位数字或者2位中文字符4位英文字符(半角),2个中文字符(全角),比如我要查询包含45678的手机号只需要现对其进行分段[4567,5678]然后对其进行加密base64(aes('4567')) + base64(aes('5678'))

解密

因为我们采用aes加密后用base64编码拼接存入数据库,所以我们只需要对数据库的数据进行获取,之后判断其长度%24是否余数为0,如果是的话那么就将其进行以每24个长度为一组进行base64解码,然后通过aes解密.解密后在对其进行拼接还原出最初的明文数据

限制或缺点

  • 通过上述可以知晓解密片段必须小于16字节长度base64后的加密信息必须是定长
  • 字段会扩大,原本的n位明文如果需要支持加密那么将会让字段变得非常长,但是好处是支持非常高性能的like搜索
  • 建议使用到定长的数据信息中,譬如手机号,身份证号码登
  • 数据库函数加密解密不支持like操作符需要注意
  • 不同的数据库需要适配不同的函数

优点

  • 数据库函数实现简单
  • 支持任意存储对象比如es
  1. select * from user where phone like '%xxxxx%' -- 其中xxxxx就是base64(aes('4567'))+base64(aes('5678'))

这样我们就实现了即支持加密又支持like的方式了,但是对于大部分用户来说虽然原理有了,但是实现起来还是太麻烦了,所以接下来我们就助力国产配合国产web框架和国产orm实现这两个功能,让用户在使用时无感知

实践案例

添加依赖

新建solon的web项目并且添加依赖

  1. <dependencies>
  2. <dependency>
  3. <groupId>com.easy-query</groupId>
  4. <artifactId>sql-solon-plugin</artifactId>
  5. <version>1.3.18</version>
  6. </dependency>
  7. <dependency>
  8. <groupId>com.zaxxer</groupId>
  9. <artifactId>HikariCP</artifactId>
  10. <version>3.3.1</version>
  11. </dependency>
  12. <dependency>
  13. <groupId>mysql</groupId>
  14. <artifactId>mysql-connector-java</artifactId>
  15. <version>8.0.31</version>
  16. </dependency>
  17. <dependency>
  18. <groupId>org.projectlombok</groupId>
  19. <artifactId>lombok</artifactId>
  20. <version>1.18.18</version>
  21. </dependency>
  22. <dependency>
  23. <groupId>org.noear</groupId>
  24. <artifactId>solon-web</artifactId>
  25. <version>2.4.2</version>
  26. </dependency>
  27. <dependency>
  28. <groupId>org.noear</groupId>
  29. <artifactId>solon.logging.simple</artifactId>
  30. <version>2.4.2</version>
  31. </dependency>
  32. <dependency>
  33. <groupId>org.slf4j</groupId>
  34. <artifactId>slf4j-api</artifactId>
  35. <version>2.0.7</version>
  36. </dependency>
  37. </dependencies>

配置

resources目录下新建一个app.yml文件

  1. # 添加配置文件
  2. db1:
  3. jdbcUrl: jdbc:mysql://127.0.0.1:3306/solon_encrypt_db?serverTimezone=GMT%2B8&characterEncoding=utf-8&useSSL=false&allowMultiQueries=true&rewriteBatchedStatements=true
  4. username: root
  5. password: root
  6. driver-class-name: com.mysql.cj.jdbc.Driver
  7. easy-query:
  8. # 配置自定义日志
  9. # log-class: ...
  10. db1:
  11. # 支持mysql pgsql h2 mssql dameng mssql_row_number kingbase_es等其余数据库在适配中
  12. database: mysql
  13. # 支持underlined default lower_camel_case upper_camel_case upper_underlined
  14. name-conversion: underlined
  15. default-track: true
  16. # 记录器级别的配置示例
  17. solon.logging.logger:
  18. "root": #默认记录器配置
  19. level: TRACE
  20. "com.zaxxer.hikari":
  21. level: WARN

具体更多参数请参考solon官方文档easy-query官方文档

启动类

WebApp.java

  1. public class WebApp {
  2. public static void main(String[] args) {
  3. Solon.start(WebApp.class,args);
  4. }
  5. }

加密策略

  1. //支持like的java方法加密解密
  2. public class JavaEncryptionStrategy extends AbstractAesBase64EncryptionStrategy {
  3. @Override
  4. public String getIv() {
  5. return "1234567890123456";
  6. }
  7. @Override
  8. public String getKey() {
  9. return "1234561234567890";
  10. }
  11. }
  12. //数据库函数加密解密
  13. public class MySQLAESColumnValueSQLConverter implements ColumnValueSQLConverter {
  14. /**
  15. * 数据加密秘钥
  16. */
  17. private static final String SECRET="1234567890123456";
  18. @Override
  19. public void columnConvert(TableAvailable table, ColumnMetadata columnMetadata, SQLPropertyConverter sqlPropertyConverter, QueryRuntimeContext runtimeContext) {
  20. sqlPropertyConverter.sqlNativeSegment("AES_DECRYPT(from_base64({0}),{1})",context->{
  21. context
  22. .expression(columnMetadata.getPropertyName())//采用变量是因为可能出现join附带别名所以需要变量
  23. .value(SECRET)
  24. .setAlias(columnMetadata.getName());
  25. });
  26. }
  27. @Override
  28. public void valueConvert(TableAvailable table, ColumnMetadata columnMetadata, SQLParameter sqlParameter, SQLPropertyConverter sqlPropertyConverter, QueryRuntimeContext runtimeContext) {
  29. sqlPropertyConverter.sqlNativeSegment("to_base64(AES_ENCRYPT({0},{1}))",context->{
  30. context.value(sqlParameter).value(SECRET);
  31. });
  32. }
  33. }

数据库对象

  1. //用户信息表
  2. @Data
  3. @Table("sys_user")
  4. public class SysUser {
  5. @Column(primaryKey = true)
  6. private String id;
  7. private String name;
  8. @Column(sqlConversion = MySQLAESColumnValueSQLConverter.class)
  9. private String phone;
  10. @Encryption(strategy = JavaEncryptionStrategy.class,supportQueryLike = true)
  11. private String Address;
  12. private LocalDateTime createTime;
  13. @Navigate(value = RelationTypeEnum.OneToMany,targetProperty = "userId")
  14. private List<UserBook> books;
  15. }
  16. //为了演示复杂查询这边在新增一张用户书本表
  17. @Data
  18. @Table("user_book")
  19. public class UserBook {
  20. @Column(primaryKey = true)
  21. private String id;
  22. private String userId;
  23. private String name;
  24. }

数据库脚本

  1. CREATE DATABASE IF NOT EXISTS solon_encrypt_db CHARACTER SET 'utf8mb4';
  2. create table solon_encrypt_db.sys_user
  3. (
  4. id varchar(32) not null comment '主键ID'primary key,
  5. name varchar(50) not null comment '姓名',
  6. phone varchar(256) null comment '手机号',-- 手机号不需要模糊搜索
  7. address varchar(512) null comment '用户地址',-- 用户地址需要模糊搜索
  8. create_time datetime not null comment '创建时间'
  9. )comment '用户表';
  10. create table solon_encrypt_db.user_book
  11. (
  12. id varchar(32) not null comment '主键ID'primary key,
  13. user_id varchar(32) not null comment '姓名',
  14. name varchar(50) not null comment '姓名'
  15. )comment '用户书本表';

配置文件

  1. @Configuration
  2. public class DefaultConfiguration {
  3. @Bean(name = "db1",typed=true)
  4. public DataSource db1DataSource(@Inject("${db1}") HikariDataSource dataSource){
  5. return dataSource;
  6. }
  7. @Bean
  8. public void db1QueryConfiguration(@Db("db1") QueryConfiguration configuration){
  9. configuration.applyEncryptionStrategy(new JavaEncryptionStrategy());
  10. configuration.applyColumnValueSQLConverter(new MySQLAESColumnValueSQLConverter());
  11. }
  12. }

测试

新增控制器

  1. @Controller
  2. @Mapping("/test")
  3. public class TestController {
  4. @Db
  5. private EasyQuery easyQuery;
  6. @Mapping(value = "/init",method = MethodType.GET)
  7. @Tran
  8. public String init(){
  9. {
  10. SysUser sysUser = new SysUser();
  11. sysUser.setId("1");
  12. sysUser.setName("用户1");
  13. sysUser.setPhone("12345678901");
  14. sysUser.setAddress("浙江省绍兴市越城区城市广场1234号");
  15. sysUser.setCreateTime(LocalDateTime.now());
  16. ArrayList<UserBook> userBooks = new ArrayList<>();
  17. UserBook userBook = new UserBook();
  18. userBook.setId("1");
  19. userBook.setUserId("1");
  20. userBook.setName("语文");
  21. userBooks.add(userBook);
  22. UserBook userBook1 = new UserBook();
  23. userBook1.setId("2");
  24. userBook1.setUserId("1");
  25. userBook1.setName("数学");
  26. userBooks.add(userBook1);
  27. easyQuery.insertable(sysUser).executeRows();
  28. easyQuery.insertable(userBooks).executeRows();
  29. }
  30. {
  31. SysUser sysUser = new SysUser();
  32. sysUser.setId("2");
  33. sysUser.setName("用户2");
  34. sysUser.setPhone("19012345678");
  35. sysUser.setAddress("浙江省杭州市上城区武林广场1234号");
  36. sysUser.setCreateTime(LocalDateTime.now());
  37. ArrayList<UserBook> userBooks = new ArrayList<>();
  38. UserBook userBook = new UserBook();
  39. userBook.setId("3");
  40. userBook.setUserId("2");
  41. userBook.setName("语文");
  42. userBooks.add(userBook);
  43. UserBook userBook1 = new UserBook();
  44. userBook1.setId("4");
  45. userBook1.setUserId("2");
  46. userBook1.setName("英语");
  47. userBooks.add(userBook1);
  48. easyQuery.insertable(sysUser).executeRows();
  49. easyQuery.insertable(userBooks).executeRows();
  50. }
  51. return "初始化完成";
  52. }
  53. }
  54. ==> Preparing: INSERT INTO `sys_user` (`id`,`name`,`phone`,`address`,`create_time`) VALUES (?,?,to_base64(AES_ENCRYPT(?,?)),?,?)
  55. ==> Parameters: 1(String),用户1(String),12345678901(String),1234567890123456(String),miaKEctf5bGBi4yFHvSV6A==i9CdpEU+Ji+g0pPYOpTcWA==9RprkhoOPwcA13Ye0eE0NA==f0ryEfO7ajP2qQ9Yia/dwA==bFZZS42+JmMlvK+6t9a2xQ==O+TkblfoJWgGu6o/w3RuBQ==urDZztVNP45UWWQrQsneOg==+n2a0u3gq1V4L8aKa/eyEg==8u/RP9cyz8l7udgay5Tbnw==oLi10kERsXzxuJdSFAZN9w==Sgm9i3O/7FtvC4ryFziNug==9gkm5m1HD8qS4ITJ0r/W4A==zppH8USinNqLsEPxJ2jfiQ==RY3Ji2Exl1StrrdrzSVvDQ==lMnY0leaGzXqeK/mukEIQQ==NlthvCsk4jaQkEioF/SWsA==(String),2023-08-13T09:17:01.503(LocalDateTime)
  56. <== Total: 1
  57. ==> Preparing: INSERT INTO `user_book` (`id`,`user_id`,`name`) VALUES (?,?,?)
  58. ==> Parameters: 1(String),1(String),语文(String)
  59. <== Total: 1
  60. ==> Preparing: INSERT INTO `user_book` (`id`,`user_id`,`name`) VALUES (?,?,?)
  61. ==> Parameters: 2(String),1(String),数学(String)
  62. <== Total: 1
  63. ==> Preparing: INSERT INTO `sys_user` (`id`,`name`,`phone`,`address`,`create_time`) VALUES (?,?,to_base64(AES_ENCRYPT(?,?)),?,?)
  64. ==> Parameters: 2(String),用户2(String),19012345678(String),1234567890123456(String),miaKEctf5bGBi4yFHvSV6A==i9CdpEU+Ji+g0pPYOpTcWA==JdzWF3gRqqCuHO+fiRTsGQ==Ydc2v/Ghy3MbHTvTiLqHIg==B9zPkalGKbJMzyFgw8W6bA==yIJYfG5BGqQnnR5+GhdV4g==V7Zu1p3qHPjOBj+vAc1MQA==+n2a0u3gq1V4L8aKa/eyEg==MEsrlm3QnRdt4entjjf97w==rBJCNrGBSjKI6T77OXD2dg==k75blBdYdH81FSIB4AVjeA==9gkm5m1HD8qS4ITJ0r/W4A==zppH8USinNqLsEPxJ2jfiQ==RY3Ji2Exl1StrrdrzSVvDQ==lMnY0leaGzXqeK/mukEIQQ==NlthvCsk4jaQkEioF/SWsA==(String),2023-08-13T09:17:01.775(LocalDateTime)
  65. <== Total: 1
  66. ==> Preparing: INSERT INTO `user_book` (`id`,`user_id`,`name`) VALUES (?,?,?)
  67. ==> Parameters: 3(String),2(String),语文(String)
  68. <== Total: 1
  69. ==> Preparing: INSERT INTO `user_book` (`id`,`user_id`,`name`) VALUES (?,?,?)
  70. ==> Parameters: 4(String),2(String),英语(String)
  71. <== Total: 1

启动程序访问http://localhost:8080/test/init,插入对应的初始化数据

查询数据

  1. @Mapping(value = "/query",method = MethodType.GET)
  2. public Object query(){
  3. List<SysUser> list = easyQuery.queryable(SysUser.class)
  4. .include(o -> o.many(SysUser::getBooks))
  5. .toList();
  6. return list;
  7. }
  8. [{"id":"1","name":"用户1","phone":"12345678901","Address":"浙江省绍兴市越城区城市广场1234号","createTime":1691889422000,"books":[{"id":"1","userId":"1","name":"语文"},{"id":"2","userId":"1","name":"数学"}]},{"id":"2","name":"用户2","phone":"19012345678","Address":"浙江省杭州市上城区武林广场1234号","createTime":1691889422000,"books":[{"id":"3","userId":"2","name":"语文"},{"id":"4","userId":"2","name":"英语"}]}]

按用户加密地址模糊匹配

  1. @Mapping(value = "/queryByAddress",method = MethodType.GET)
  2. public Object queryByAddress(){
  3. SysUser user = easyQuery.queryable(SysUser.class)
  4. .where(o->o.like(SysUser::getAddress,"越城区"))
  5. .firstOrNull();
  6. return user;
  7. }
  8. {"id":"1","name":"用户1","phone":"12345678901","Address":"浙江省绍兴市越城区城市广场1234号","createTime":1691889422000}
  9. ==> Preparing: SELECT `id`,`name`,AES_DECRYPT(from_base64(`phone`),?) AS `phone`,`address`,`create_time` FROM `sys_user` WHERE `address` LIKE ? LIMIT 1
  10. ==> Parameters: 1234567890123456(String),%urDZztVNP45UWWQrQsneOg==+n2a0u3gq1V4L8aKa/eyEg==%(String)
  11. <== Time Elapsed: 23(ms)
  12. <== Total: 1

查询用户书本表并且获取用户书本对应的用户名

  1. @Data
  2. public class UserBookVO {
  3. private String id;
  4. private String userId;
  5. private String name;
  6. private String userName;
  7. private String userPhone;
  8. /**
  9. * 返回vo结果如果没有该注解将是返回数据库对应的列的原始数据
  10. */
  11. @Encryption(strategy = JavaEncryptionStrategy.class)
  12. private String userAddress;
  13. }
  14. @Mapping(value = "/queryBook",method = MethodType.GET)
  15. public Object queryBook(){
  16. //无需考虑表别名所属`t`还是`t1`等
  17. List<UserBookVO> userBooks = easyQuery.queryable(UserBook.class)
  18. .leftJoin(SysUser.class, (t, t1) -> t.eq(t1, UserBook::getUserId, SysUser::getId))
  19. .where((t, t1) -> t1.like(SysUser::getAddress, "越城区"))
  20. .select(UserBookVO.class, (t, t1) -> t.columnAll()
  21. .then(t1)
  22. .columnAs(SysUser::getName, UserBookVO::getUserName)
  23. .columnAs(SysUser::getPhone, UserBookVO::getUserPhone)
  24. .columnAs(SysUser::getAddress, UserBookVO::getUserAddress)
  25. )
  26. .toList();
  27. return userBooks;
  28. }
  29. [{"id":"1","userId":"1","name":"语文","userName":"用户1","userPhone":"12345678901","userAddress":"浙江省绍兴市越城区城市广场1234号"},{"id":"2","userId":"1","name":"数学","userName":"用户1","userPhone":"12345678901","userAddress":"浙江省绍兴市越城区城市广场1234号"}]
  30. ==> Preparing: SELECT t.`id`,t.`user_id`,t.`name`,t1.`name` AS `user_name`,AES_DECRYPT(from_base64(t1.`phone`),?) AS `user_phone`,t1.`address` AS `user_address` FROM `user_book` t LEFT JOIN `sys_user` t1 ON t.`user_id` = t1.`id` WHERE t1.`address` LIKE ?
  31. ==> Parameters: 1234567890123456(String),%urDZztVNP45UWWQrQsneOg==+n2a0u3gq1V4L8aKa/eyEg==%(String)
  32. <== Time Elapsed: 21(ms)
  33. <== Total: 2

修改手机号和地址

  1. @Mapping(value = "/updateFull",method = MethodType.GET)
  2. public Object updateFull(){
  3. SysUser user = easyQuery.queryable(SysUser.class).whereById("1").firstOrNull();
  4. user.setPhone("12312312312");
  5. user.setAddress("浙江省杭州市上城区0987号");
  6. easyQuery.updatable(user).executeRows();
  7. return null;
  8. }
  9. ==> Preparing: SELECT `id`,`name`,AES_DECRYPT(from_base64(`phone`),?) AS `phone`,`address`,`create_time` FROM `sys_user` WHERE `id` = ? LIMIT 1
  10. ==> Parameters: 1234567890123456(String),1(String)
  11. <== Time Elapsed: 35(ms)
  12. <== Total: 1
  13. ==> Preparing: UPDATE `sys_user` SET `name` = ?,`phone` = to_base64(AES_ENCRYPT(?,?)),`address` = ?,`create_time` = ? WHERE `id` = ?
  14. ==> Parameters: 用户1(String),12312312312(String),1234567890123456(String),miaKEctf5bGBi4yFHvSV6A==i9CdpEU+Ji+g0pPYOpTcWA==JdzWF3gRqqCuHO+fiRTsGQ==Ydc2v/Ghy3MbHTvTiLqHIg==B9zPkalGKbJMzyFgw8W6bA==yIJYfG5BGqQnnR5+GhdV4g==V7Zu1p3qHPjOBj+vAc1MQA==+n2a0u3gq1V4L8aKa/eyEg==+TZVS8QvlcDWZ4UTb8nhYQ==8ovX18Yz7LBizRX/aUCc+w==UY1+e/bka/X9nUuHla9C/w==VUW3oU+N4hm3mVZFJeal7Q==(String),2023-08-13T09:17:02(LocalDateTime),1(String)
  15. <== Total: 1

我只改了两个字段但是sql生成了全字段,下面就进行优化

  1. @Mapping(value = "/updateTrack",method = MethodType.GET)
  2. @EasyQueryTrack
  3. public Object updateTrack(){
  4. SysUser user = easyQuery.queryable(SysUser.class).whereById("1").firstOrNull();
  5. user.setPhone("123123123123");
  6. user.setAddress("绍兴市越城区87651号");
  7. easyQuery.updatable(user).executeRows();
  8. return null;
  9. }
  10. ==> Preparing: SELECT `id`,`name`,AES_DECRYPT(from_base64(`phone`),?) AS `phone`,`address`,`create_time` FROM `sys_user` WHERE `id` = ? LIMIT 1
  11. ==> Parameters: 1234567890123456(String),1(String)
  12. <== Time Elapsed: 10(ms)
  13. <== Total: 1
  14. ==> Preparing: UPDATE `sys_user` SET `phone` = to_base64(AES_ENCRYPT(?,?)),`address` = ? WHERE `id` = ?
  15. ==> Parameters: 123123123123(String),1234567890123456(String),f0ryEfO7ajP2qQ9Yia/dwA==bFZZS42+JmMlvK+6t9a2xQ==O+TkblfoJWgGu6o/w3RuBQ==urDZztVNP45UWWQrQsneOg==+n2a0u3gq1V4L8aKa/eyEg==ClirMJiuQjNV88CrpX4VKw==HWyz2JynN1dsAf5+bICC1A==X85Lef9VTnHIYUq4iTK4UQ==L32UeQ8jeCATh718YrxeQg==nozQIvfNzmvfkNQL2bI7RQ==(String),1(String)
  16. <== Total: 1

直接更新

  1. @Mapping(value = "/updateSet",method = MethodType.GET)
  2. public Object updateSet(){
  3. easyQuery.updatable(SysUser.class)
  4. .set(SysUser::getPhone,"1234567")
  5. .set(SysUser::getAddress,"绍兴市越城区123号")
  6. .whereById("1")
  7. .executeRows();
  8. return null;
  9. }
  10. ==> Preparing: UPDATE `sys_user` SET `phone` = to_base64(AES_ENCRYPT(?,?)),`address` = ? WHERE `id` = ?
  11. ==> Parameters: 1234567(String),1234567890123456(String),f0ryEfO7ajP2qQ9Yia/dwA==bFZZS42+JmMlvK+6t9a2xQ==O+TkblfoJWgGu6o/w3RuBQ==urDZztVNP45UWWQrQsneOg==+n2a0u3gq1V4L8aKa/eyEg==xznBF4y5j5N4cik+fWz0jw==I3FW5ECJDfcM6yNWsYlH/g==6QBhErf/Lxjd5my5p3v4wg==(String),1(String)
  12. <== Total: 1

数据库加密函数手机号检索

  1. @Mapping(value = "/queryByPhone",method = MethodType.GET)
  2. public Object queryByPhone(){
  3. SysUser sysUser = easyQuery.queryable(SysUser.class)
  4. .where(o -> o.eq(SysUser::getPhone,"1234567"))
  5. .firstOrNull();
  6. return sysUser;
  7. }
  8. {"id":"1","name":"用户1","phone":"1234567","Address":"绍兴市越城区123号","createTime":1691889422000}
  9. //默认只支持全匹配查询,因为解密函数在数据库列上是十分低效的
  10. ==> Preparing: SELECT `id`,`name`,AES_DECRYPT(from_base64(`phone`),?) AS `phone`,`address`,`create_time` FROM `sys_user` WHERE `phone` = to_base64(AES_ENCRYPT(?,?)) LIMIT 1
  11. ==> Parameters: 1234567890123456(String),1234567(String),1234567890123456(String)
  12. <== Time Elapsed: 27(ms)
  13. <== Total: 1

如果你希望数据库加密列也可以被检索可以自定义数据库片段函数来实现

  1. @Mapping(value = "/queryPhone",method = MethodType.GET)
  2. public Object queryPhone(){
  3. SysUser sysUser = easyQuery.queryable(SysUser.class)
  4. .where(o -> o.sqlNativeSegment("AES_DECRYPT(from_base64({0}),{1}) like {2}",context->{
  5. context.expression(SysUser::getPhone)//列
  6. .value("1234567890123456")//秘钥
  7. .value("%123%");//like值
  8. }))
  9. .firstOrNull();
  10. return sysUser;
  11. }
  12. {"id":"1","name":"用户1","phone":"1234567","Address":"绍兴市越城区123号","createTime":1691889422000}
  13. ==> Preparing: SELECT `id`,`name`,AES_DECRYPT(from_base64(`phone`),?) AS `phone`,`address`,`create_time` FROM `sys_user` WHERE AES_DECRYPT(from_base64(`phone`),?) like ? LIMIT 1
  14. ==> Parameters: 1234567890123456(String),1234567890123456(String),%123%(String)
  15. <== Time Elapsed: 11(ms)
  16. <== Total: 1

数据脱敏

很多时候我们的数据库对象不需要脱敏数据,而是我们的VO对象在返回的时候需要对其数据进行脱敏,所以我们可以通过ValueConverter来实现

  1. public class AddressMask implements ValueConverter<String,String> {
  2. @Override
  3. public String serialize(String s) {
  4. //因为是VO对象不需要实现
  5. throw new UnsupportedOperationException();
  6. }
  7. @Override
  8. public String deserialize(Class<String> propertyClass, String value) {
  9. if(EasyStringUtil.isBlank(value)){
  10. return value;
  11. }
  12. if(value.length()>5){
  13. return value.substring(0,3)+"***";
  14. }
  15. return value;
  16. }
  17. }
  18. @Data
  19. public class UserBookVO {
  20. private String id;
  21. private String userId;
  22. private String name;
  23. private String userName;
  24. private String userPhone;
  25. /**
  26. * 返回vo结果如果没有该注解将是返回数据库对应的列的原始数据
  27. */
  28. @Encryption(strategy = JavaEncryptionStrategy.class)
  29. @Column(conversion = AddressMask.class)//添加地址脱敏
  30. private String userAddress;
  31. }
  32. @Configuration
  33. public class DefaultConfiguration {
  34. @Bean(name = "db1",typed=true)
  35. public DataSource db1DataSource(@Inject("${db1}") HikariDataSource dataSource){
  36. return dataSource;
  37. }
  38. @Bean
  39. public void db1QueryConfiguration(@Db("db1") QueryConfiguration configuration){
  40. configuration.applyEncryptionStrategy(new JavaEncryptionStrategy());
  41. configuration.applyEncryptionStrategy(new JavaSM4EncryptionStrategy());
  42. configuration.applyColumnValueSQLConverter(new MySQLAESColumnValueSQLConverter());
  43. configuration.applyValueConverter(new AddressMask());
  44. }
  45. }
  46. @Mapping(value = "/queryBookMask",method = MethodType.GET)
  47. public Object queryBookMask(){
  48. List<UserBookVO> userBooks = easyQuery.queryable(UserBook.class)
  49. .leftJoin(SysUser.class, (t, t1) -> t.eq(t1, UserBook::getUserId, SysUser::getId))
  50. .where((t, t1) -> t1.like(SysUser::getAddress, "越城区"))
  51. .select(UserBookVO.class, (t, t1) -> t.columnAll()
  52. .then(t1)
  53. .columnAs(SysUser::getName, UserBookVO::getUserName)
  54. .columnAs(SysUser::getPhone, UserBookVO::getUserPhone)
  55. .columnAs(SysUser::getAddress, UserBookVO::getUserAddress)
  56. )
  57. .toList();
  58. return userBooks;
  59. }
  60. //数据地址被解密后正确的被脱敏返回到前端
  61. [{"id":"1","userId":"1","name":"语文","userName":"用户1","userPhone":"1234567","userAddress":"绍兴市***"},{"id":"2","userId":"1","name":"数学","userName":"用户1","userPhone":"1234567","userAddress":"绍兴市***"}]
  62. ==> Preparing: SELECT t.`id`,t.`user_id`,t.`name`,t1.`name` AS `user_name`,AES_DECRYPT(from_base64(t1.`phone`),?) AS `user_phone`,t1.`address` AS `user_address` FROM `user_book` t LEFT JOIN `sys_user` t1 ON t.`user_id` = t1.`id` WHERE t1.`address` LIKE ?
  63. ==> Parameters: 1234567890123456(String),%urDZztVNP45UWWQrQsneOg==+n2a0u3gq1V4L8aKa/eyEg==%(String)
  64. <== Time Elapsed: 13(ms)
  65. <== Total: 2

SM4

方便起见我们这边直接引入hutool工具包

  1. <dependency>
  2. <groupId>cn.hutool</groupId>
  3. <artifactId>hutool-all</artifactId>
  4. <version>5.3.0</version>
  5. </dependency>

编写sm4静态工具类

  1. public class SM4Util {
  2. static{
  3. Security.addProvider(new BouncyCastleProvider());
  4. }
  5. //算法名称
  6. public static final String ALGORITHM_NAME = "SM4";
  7. //ECB P5填充
  8. public static final String ALGORITHM_NAME_ECB_PADDING = "SM4/ECB/PKCS5Padding";
  9. //CBC P5填充
  10. public static final String ALGORITHM_NAME_CBC_PADDING = "SM4/CBC/PKCS5Padding";
  11. //密钥长度
  12. public static final int DEFAULT_KEY_SIZE = 128;
  13. /**
  14. * 获取密钥
  15. * @return byte
  16. * @throws NoSuchAlgorithmException
  17. * @throws NoSuchProviderException
  18. */
  19. public static byte[] generateKey() throws NoSuchAlgorithmException, NoSuchProviderException {
  20. return generateKey(DEFAULT_KEY_SIZE);
  21. }
  22. /**
  23. * 获取指定长度密钥
  24. * @param keySize 密钥的长度
  25. * @return byte
  26. * @throws NoSuchAlgorithmException
  27. * @throws NoSuchProviderException
  28. */
  29. public static byte[] generateKey(int keySize) throws NoSuchAlgorithmException, NoSuchProviderException {
  30. KeyGenerator kg = KeyGenerator.getInstance(ALGORITHM_NAME, BouncyCastleProvider.PROVIDER_NAME);
  31. kg.init(keySize, new SecureRandom());
  32. return kg.generateKey().getEncoded();
  33. }
  34. public static String encrypt(String plaintext, String key, Charset charset) {
  35. try {
  36. byte[] encrypt = encrypt_Ecb_Padding(plaintext.getBytes(charset), key.getBytes(charset));
  37. return new String(EasyBase64Util.encode(encrypt),charset);
  38. } catch (Exception e) {
  39. throw new RuntimeException(e);
  40. }
  41. }
  42. /**
  43. * ECB P5填充加密
  44. * @param key 密钥
  45. * @param data 明文数据
  46. * @return byte
  47. * @throws InvalidKeyException
  48. * @throws NoSuchAlgorithmException
  49. * @throws NoSuchProviderException
  50. * @throws NoSuchPaddingException
  51. * @throws IllegalBlockSizeException
  52. * @throws BadPaddingException
  53. */
  54. public static byte[] encrypt_Ecb_Padding(byte[] data,byte[] key)
  55. throws InvalidKeyException, NoSuchAlgorithmException, NoSuchProviderException,
  56. NoSuchPaddingException, IllegalBlockSizeException, BadPaddingException {
  57. Cipher cipher = generateEcbCipher(ALGORITHM_NAME_ECB_PADDING, Cipher.ENCRYPT_MODE, key);
  58. return cipher.doFinal(data);
  59. }
  60. public static String decrypt(String content, String key, Charset charset) {
  61. try {
  62. byte[] decrypt = decrypt_Ecb_Padding(EasyBase64Util.decode(content.getBytes(charset)), key.getBytes(charset));
  63. return new String(decrypt,charset);
  64. } catch (Exception e) {
  65. throw new RuntimeException(e);
  66. }
  67. }
  68. /**
  69. * ECB P5填充解密
  70. * @param key 密钥
  71. * @param cipherText 加密后的数据
  72. * @return byte
  73. * @throws IllegalBlockSizeException
  74. * @throws BadPaddingException
  75. * @throws InvalidKeyException
  76. * @throws NoSuchAlgorithmException
  77. * @throws NoSuchProviderException
  78. * @throws NoSuchPaddingException
  79. */
  80. public static byte[] decrypt_Ecb_Padding( byte[] cipherText,byte[] key)
  81. throws IllegalBlockSizeException, BadPaddingException, InvalidKeyException,
  82. NoSuchAlgorithmException, NoSuchProviderException, NoSuchPaddingException {
  83. Cipher cipher = generateEcbCipher(ALGORITHM_NAME_ECB_PADDING, Cipher.DECRYPT_MODE, key);
  84. return cipher.doFinal(cipherText);
  85. }
  86. /**
  87. * CBC P5填充加密
  88. * @param key 密钥
  89. * @param iv 偏移量
  90. * @param data 明文数据
  91. * @return byte
  92. * @throws InvalidKeyException
  93. * @throws NoSuchAlgorithmException
  94. * @throws NoSuchProviderException
  95. * @throws NoSuchPaddingException
  96. * @throws IllegalBlockSizeException
  97. * @throws BadPaddingException
  98. * @throws InvalidAlgorithmParameterException
  99. */
  100. public static byte[] encrypt_Cbc_Padding(byte[] key, byte[] iv, byte[] data)
  101. throws InvalidKeyException, NoSuchAlgorithmException, NoSuchProviderException,
  102. NoSuchPaddingException, IllegalBlockSizeException, BadPaddingException,
  103. InvalidAlgorithmParameterException {
  104. Cipher cipher = generateCbcCipher(ALGORITHM_NAME_CBC_PADDING, Cipher.ENCRYPT_MODE, key, iv);
  105. return cipher.doFinal(data);
  106. }
  107. /**
  108. * CBC P5填充解密
  109. * @param key 密钥
  110. * @param iv 偏移量
  111. * @param cipherText 加密数据
  112. * @return byte
  113. * @throws IllegalBlockSizeException
  114. * @throws BadPaddingException
  115. * @throws InvalidKeyException
  116. * @throws NoSuchAlgorithmException
  117. * @throws NoSuchProviderException
  118. * @throws NoSuchPaddingException
  119. * @throws InvalidAlgorithmParameterException
  120. */
  121. public static byte[] decrypt_Cbc_Padding(byte[] key, byte[] iv, byte[] cipherText)
  122. throws IllegalBlockSizeException, BadPaddingException, InvalidKeyException,
  123. NoSuchAlgorithmException, NoSuchProviderException, NoSuchPaddingException,
  124. InvalidAlgorithmParameterException {
  125. Cipher cipher = generateCbcCipher(ALGORITHM_NAME_CBC_PADDING, Cipher.DECRYPT_MODE, key, iv);
  126. return cipher.doFinal(cipherText);
  127. }
  128. /**
  129. * ECB P5填充加解密Cipher初始化
  130. * @param algorithmName 算法名称
  131. * @param mode 1 加密 2解密
  132. * @param key 密钥
  133. * @return Cipher
  134. * @throws NoSuchAlgorithmException
  135. * @throws NoSuchProviderException
  136. * @throws NoSuchPaddingException
  137. * @throws InvalidKeyException
  138. */
  139. private static Cipher generateEcbCipher(String algorithmName, int mode, byte[] key)
  140. throws NoSuchAlgorithmException, NoSuchProviderException, NoSuchPaddingException,
  141. InvalidKeyException {
  142. Cipher cipher = Cipher.getInstance(algorithmName, BouncyCastleProvider.PROVIDER_NAME);
  143. Key sm4Key = new SecretKeySpec(key, ALGORITHM_NAME);
  144. cipher.init(mode, sm4Key);
  145. return cipher;
  146. }
  147. /**
  148. * CBC P5填充加解密Cipher初始化
  149. * @param algorithmName 算法名称
  150. * @param mode 1 加密 2解密
  151. * @param key 密钥
  152. * @param iv 偏移量
  153. * @return Cipher
  154. * @throws InvalidKeyException
  155. * @throws InvalidAlgorithmParameterException
  156. * @throws NoSuchAlgorithmException
  157. * @throws NoSuchProviderException
  158. * @throws NoSuchPaddingException
  159. */
  160. private static Cipher generateCbcCipher(String algorithmName, int mode, byte[] key, byte[] iv)
  161. throws InvalidKeyException, InvalidAlgorithmParameterException, NoSuchAlgorithmException,
  162. NoSuchProviderException, NoSuchPaddingException {
  163. Cipher cipher = Cipher.getInstance(algorithmName, BouncyCastleProvider.PROVIDER_NAME);
  164. Key sm4Key = new SecretKeySpec(key, ALGORITHM_NAME);
  165. IvParameterSpec ivParameterSpec = new IvParameterSpec(iv);
  166. cipher.init(mode, sm4Key, ivParameterSpec);
  167. return cipher;
  168. }
  169. }

编写加密策略

  1. public class JavaSM4EncryptionStrategy implements EncryptionStrategy {
  2. private static final Log log = LogFactory.getLog(JavaSM4EncryptionStrategy.class);
  3. private static final String key="1234567890123456";
  4. @Override
  5. public Object encrypt(Class<?> entityClass, String propertyName, Object plaintext) {
  6. if (plaintext == null) {
  7. return null;
  8. }
  9. try {
  10. return doEncrypt(plaintext);
  11. }catch (Exception exception){
  12. log.error(EasyClassUtil.getInstanceSimpleName(this)+" "+ EasyClassUtil.getSimpleName(entityClass)+"."+ "."+propertyName+" decrypt error:" + plaintext, exception);
  13. throw exception;
  14. }
  15. }
  16. protected Object doEncrypt(Object plaintext){
  17. String plaintextString = plaintext.toString();
  18. //4表示多少单位长度为一组,1表示非中文的情况下1个字符为一个单位长度,2表示一个中文字符为2个单位长度
  19. List<String> stringCharSegments = EasyStringUtil.getStringCharSegments(plaintextString, 4,1,2);
  20. //符合要求譬如最少4个非中文字符或者2个中文字的情况下,可以选择抛错重写或者直接加密对应的值
  21. if (EasyCollectionUtil.isEmpty(stringCharSegments)) {
  22. stringCharSegments.add(plaintextString);
  23. }
  24. StringBuilder stringBuilder = new StringBuilder();
  25. for (String stringCharSegment : stringCharSegments) {
  26. String str= SM4Util.encrypt(stringCharSegment,key, StandardCharsets.UTF_8);
  27. stringBuilder.append(str);
  28. }
  29. return stringBuilder.toString();
  30. }
  31. @Override
  32. public Object decrypt(Class<?> entityClass,String propertyName,Object ciphertext) {
  33. try {
  34. return doDecrypt(entityClass,propertyName,ciphertext);
  35. } catch (Exception exception) {
  36. log.error(EasyClassUtil.getInstanceSimpleName(this)+" "+ EasyClassUtil.getSimpleName(entityClass)+"."+ "."+propertyName+" decrypt error:" + ciphertext, exception);
  37. throw exception;
  38. }
  39. }
  40. private Object doDecrypt(Class<?> entityClass,String propertyName,Object ciphertext) {
  41. if (ciphertext == null) {
  42. return null;
  43. }
  44. String ciphertextString = ciphertext.toString();
  45. if (ciphertextString.length() % 24 != 0) {
  46. throw new IllegalArgumentException(EasyClassUtil.getSimpleName(entityClass)+"."+propertyName+" decrypt cant decode base64:" + ciphertext);
  47. }
  48. List<String> segments = EasyStringUtil.splitString(ciphertextString, 24);
  49. StringBuilder stringBuilder = new StringBuilder();
  50. for (int i = 0; i < segments.size(); i++) {
  51. String str=SM4Util.decrypt(segments.get(i),key,StandardCharsets.UTF_8);
  52. boolean last = i == (segments.size() - 1);
  53. if (last) {
  54. stringBuilder.append(str);
  55. } else {
  56. stringBuilder.append(str.charAt(0));
  57. }
  58. }
  59. return stringBuilder.toString();
  60. }
  61. }
  62. @Configuration
  63. public class DefaultConfiguration {
  64. @Bean(name = "db1",typed=true)
  65. public DataSource db1DataSource(@Inject("${db1}") HikariDataSource dataSource){
  66. return dataSource;
  67. }
  68. @Bean
  69. public void db1QueryConfiguration(@Db("db1") QueryConfiguration configuration){
  70. configuration.applyEncryptionStrategy(new JavaEncryptionStrategy());
  71. configuration.applyEncryptionStrategy(new JavaSM4EncryptionStrategy());//添加sm4
  72. configuration.applyColumnValueSQLConverter(new MySQLAESColumnValueSQLConverter());
  73. }
  74. }
  75. @Data
  76. @Table("sys_user")
  77. public class SysUserSM4 {
  78. @Column(primaryKey = true)
  79. private String id;
  80. private String name;
  81. @Column(sqlConversion = MySQLAESColumnValueSQLConverter.class)
  82. private String phone;
  83. @Encryption(strategy = JavaSM4EncryptionStrategy.class,supportQueryLike = true)
  84. private String Address;
  85. private LocalDateTime createTime;
  86. }
  1. @Mapping(value = "/initSM4",method = MethodType.GET)
  2. @Tran
  3. public String initSM4(){
  4. {
  5. SysUserSM4 sysUser = new SysUserSM4();
  6. sysUser.setId("5");
  7. sysUser.setName("用户5");
  8. sysUser.setPhone("12345678901");
  9. sysUser.setAddress("浙江省绍兴市越城区城市广场1234号");
  10. sysUser.setCreateTime(LocalDateTime.now());
  11. easyQuery.insertable(sysUser).executeRows();
  12. }
  13. {
  14. SysUserSM4 sysUser = new SysUserSM4();
  15. sysUser.setId("6");
  16. sysUser.setName("用户6");
  17. sysUser.setPhone("19012345678");
  18. sysUser.setAddress("浙江省杭州市上城区武林广场1234号");
  19. sysUser.setCreateTime(LocalDateTime.now());
  20. easyQuery.insertable(sysUser).executeRows();
  21. }
  22. return "初始化完成";
  23. }
  24. ==> Preparing: INSERT INTO `sys_user` (`id`,`name`,`phone`,`address`,`create_time`) VALUES (?,?,to_base64(AES_ENCRYPT(?,?)),?,?)
  25. ==> Parameters: 5(String),用户5(String),12345678901(String),1234567890123456(String),KHxVEDHBxB0x9kgAltKrMA==llZIL8h9i+2b7sPaSt6qpw==/WFPdFPf569dkeGI2Q9r9A==CAvnuJp9Lz30LTVaZi5U5A==JKhjq5f94+MJgJK7Fc4lRA==flZDUtkyeOZJrdUE0DxlZg==jlVLlk9iVJCOCdln+G11Mg==wFIL7wK7nBctC0slOEomrg==zztIbbTcuUyyS+Zj2JgQ1w==X6DWRoQjqCunrA9w6ZlJ3Q==hN0Bm2/qS3XRK2Xxe8/MIw==iDZGTAU/WlMkwLAoiYuh8Q==R4pbp78Ig7qHCLzn9IF7rw==woPrxebr8Xvyo1qG8QxAUA==65pvnL+1Og20OW+xunqHCA==vJKXxvzbvWtZB9hrWrioCg==(String),2023-08-13T22:28:27.204(LocalDateTime)
  26. <== Total: 1
  27. ==> Preparing: INSERT INTO `sys_user` (`id`,`name`,`phone`,`address`,`create_time`) VALUES (?,?,to_base64(AES_ENCRYPT(?,?)),?,?)
  28. ==> Parameters: 6(String),用户6(String),19012345678(String),1234567890123456(String),KHxVEDHBxB0x9kgAltKrMA==llZIL8h9i+2b7sPaSt6qpw==66gmuLlsoaX1sHDabqd/XA==YGGmh56Hc5MS+Wf8dZdl8w==SjvWmsqOacq5Kui8xDCxxw==cQrhVkPp3Hf5s/GKHpNOaw==BDvJOrbklVQGHodEa+eyCA==wFIL7wK7nBctC0slOEomrg==BZcCFFYJzjQzZ7R23fmOUA==M8WFvyffOu6BeTpQgghhUA==Jw8BjPktNN8CPRyi1f5Vrg==iDZGTAU/WlMkwLAoiYuh8Q==R4pbp78Ig7qHCLzn9IF7rw==woPrxebr8Xvyo1qG8QxAUA==65pvnL+1Og20OW+xunqHCA==vJKXxvzbvWtZB9hrWrioCg==(String),2023-08-13T22:28:27.622(LocalDateTime)
  29. <== Total: 1

查询对应的数据

  1. @Mapping(value = "/querySM4",method = MethodType.GET)
  2. public Object querySM4(){
  3. List<SysUserSM4> list = easyQuery.queryable(SysUserSM4.class)
  4. .whereByIds(Arrays.asList("5", "6"))
  5. .toList();
  6. return list;
  7. }
  8. [{"id":"5","name":"用户5","phone":"12345678901","Address":"浙江省绍兴市越城区城市广场1234号","createTime":1691936907000},{"id":"6","name":"用户6","phone":"19012345678","Address":"浙江省杭州市上城区武林广场1234号","createTime":1691936908000}]
  9. ==> Preparing: SELECT `id`,`name`,AES_DECRYPT(from_base64(`phone`),?) AS `phone`,`address`,`create_time` FROM `sys_user` WHERE `id` IN (?,?)
  10. ==> Parameters: 1234567890123456(String),5(String),6(String)
  11. <== Time Elapsed: 14(ms)
  12. <== Total: 2

模糊查询

  1. @Mapping(value = "/queryLikeSM4",method = MethodType.GET)
  2. public Object queryLikeSM4(){
  3. List<SysUserSM4> list = easyQuery.queryable(SysUserSM4.class)
  4. .whereByIds(Arrays.asList("5", "6"))
  5. .where(o->o.like(SysUserSM4::getAddress,"武林广场"))
  6. .toList();
  7. return list;
  8. }
  9. [{"id":"6","name":"用户6","phone":"19012345678","Address":"浙江省杭州市上城区武林广场1234号","createTime":1691936908000}]
  10. ==> Preparing: SELECT `id`,`name`,AES_DECRYPT(from_base64(`phone`),?) AS `phone`,`address`,`create_time` FROM `sys_user` WHERE `id` IN (?,?) AND `address` LIKE ?
  11. ==> Parameters: 1234567890123456(String),5(String),6(String),%M8WFvyffOu6BeTpQgghhUA==Jw8BjPktNN8CPRyi1f5Vrg==iDZGTAU/WlMkwLAoiYuh8Q==%(String)
  12. <== Time Elapsed: 38(ms)
  13. <== Total: 1

注意例子里面采用的是简单的ecb模式,您可以自定义或者使用cbc,cbc模式需要多一个iv向量

支持我们实现了数据库列的加密,数据库函数对和java代码自定义,其中java代码支持like,数据库需要支持like就会消耗大量的计算,需要对所有加密数据在数据库层面进行解密后才可以

最后

看到这边您应该已经知道了solon国产框架的简洁和easy-query的便捷,如果本篇文章对您有帮助或者您觉得还行请给我一个星星表示支持谢谢
当前项目地址demo https://gitee.com/xuejm/solon-encrypt

easy-qeury

文档地址 https://xuejm.gitee.io/easy-query-doc/

GITHUB地址 https://github.com/xuejmnet/easy-query

GITEE地址 https://gitee.com/xuejm/easy-query

solon

文档地址 https://xuejm.gitee.io/easy-query-doc/

GITHUB地址 https://github.com/noear/solon

GITEE地址 https://gitee.com/noear/solon

原文链接:https://www.cnblogs.com/xuejiaming/p/17619102.html

 友情链接:直通硅谷  点职佳  北美留学生论坛

本站QQ群:前端 618073944 | Java 606181507 | Python 626812652 | C/C++ 612253063 | 微信 634508462 | 苹果 692586424 | C#/.net 182808419 | PHP 305140648 | 运维 608723728

W3xue 的所有内容仅供测试,对任何法律问题及风险不承担任何责任。通过使用本站内容随之而来的风险与本站无关。
关于我们  |  意见建议  |  捐助我们  |  报错有奖  |  广告合作、友情链接(目前9元/月)请联系QQ:27243702 沸活量
皖ICP备17017327号-2 皖公网安备34020702000426号