diff --git a/pom.xml b/pom.xml
index 175d57b7..74aabede 100644
--- a/pom.xml
+++ b/pom.xml
@@ -21,7 +21,8 @@
sa-token-core
sa-token-starter
sa-token-plugin
-
+
+ sa-token-demo/sa-token-demo-solon
diff --git a/sa-token-demo/sa-token-demo-solon/pom.xml b/sa-token-demo/sa-token-demo-solon/pom.xml
new file mode 100644
index 00000000..8290f25c
--- /dev/null
+++ b/sa-token-demo/sa-token-demo-solon/pom.xml
@@ -0,0 +1,85 @@
+
+ 4.0.0
+ cn.dev33
+ sa-token-demo-solon
+ 0.0.1-SNAPSHOT
+
+
+
+
+ 1.19.0
+
+
+
+
+
+
+ org.noear
+ solon-web
+ 1.4.8
+
+
+
+
+ cn.dev33
+ sa-token-solon-plugin
+ ${sa-token-version}
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+ org.apache.maven.plugins
+ maven-compiler-plugin
+ 3.8.1
+
+ -parameters
+ 1.8
+ 1.8
+ UTF-8
+
+
+
+
+
+
+
\ No newline at end of file
diff --git a/sa-token-demo/sa-token-demo-solon/src/main/java/com/pj/SaTokenDemoApp.java b/sa-token-demo/sa-token-demo-solon/src/main/java/com/pj/SaTokenDemoApp.java
new file mode 100644
index 00000000..b238d9af
--- /dev/null
+++ b/sa-token-demo/sa-token-demo-solon/src/main/java/com/pj/SaTokenDemoApp.java
@@ -0,0 +1,17 @@
+package com.pj;
+
+
+import cn.dev33.satoken.SaManager;
+import org.noear.solon.Solon;
+
+/**
+ * sa-token整合 solon 示例
+ * @author noear
+ *
+ */
+public class SaTokenDemoApp {
+ public static void main(String[] args) {
+ Solon.start(SaTokenDemoApp.class, args);
+ System.out.println("\n启动成功:sa-token配置如下:" + SaManager.getConfig());
+ }
+}
\ No newline at end of file
diff --git a/sa-token-demo/sa-token-demo-solon/src/main/java/com/pj/satoken/SaTokenConfigure.java b/sa-token-demo/sa-token-demo-solon/src/main/java/com/pj/satoken/SaTokenConfigure.java
new file mode 100644
index 00000000..70372415
--- /dev/null
+++ b/sa-token-demo/sa-token-demo-solon/src/main/java/com/pj/satoken/SaTokenConfigure.java
@@ -0,0 +1,60 @@
+package com.pj.satoken;
+
+
+import cn.dev33.satoken.solon.integration.SaTokenPathFilter;
+import com.pj.util.AjaxJson;
+
+import cn.dev33.satoken.context.SaHolder;
+import org.noear.solon.annotation.Bean;
+import org.noear.solon.annotation.Configuration;
+
+
+/**
+ * [Sa-Token 权限认证] 配置类
+ * @author kong
+ * @author noear
+ */
+@Configuration
+public class SaTokenConfigure {
+
+ /**
+ * 注册 [sa-token全局过滤器]
+ */
+ @Bean
+ public SaTokenPathFilter tokenPathFilter() {
+ return new SaTokenPathFilter()
+
+ // 指定 [拦截路由] 与 [放行路由]
+ .addInclude("/**").addExclude("/favicon.ico")
+
+ // 认证函数: 每次请求执行
+ .setAuth(r -> {
+ // System.out.println("---------- sa全局认证");
+
+ // SaRouterUtil.match("/test/test", () -> new Object());
+ })
+
+ // 异常处理函数:每次认证函数发生异常时执行此函数
+ .setError(e -> {
+ System.out.println("---------- sa全局异常 ");
+ return AjaxJson.getError(e.getMessage());
+ })
+
+ // 前置函数:在每次认证函数之前执行
+ .setBeforeAuth(r -> {
+ // ---------- 设置一些安全响应头 ----------
+ SaHolder.getResponse()
+ // 服务器名称
+ .setServer("sa-server")
+ // 是否可以在iframe显示视图: DENY=不可以 | SAMEORIGIN=同域下可以 | ALLOW-FROM uri=指定域名下可以
+ .setHeader("X-Frame-Options", "SAMEORIGIN")
+ // 是否启用浏览器默认XSS防护: 0=禁用 | 1=启用 | 1; mode=block 启用, 并在检查到XSS攻击时,停止渲染页面
+ .setHeader("X-Frame-Options", "1; mode=block")
+ // 禁用浏览器内容嗅探
+ .setHeader("X-Content-Type-Options", "nosniff")
+ ;
+ })
+ ;
+ }
+
+}
diff --git a/sa-token-demo/sa-token-demo-solon/src/main/java/com/pj/satoken/StpInterfaceImpl.java b/sa-token-demo/sa-token-demo-solon/src/main/java/com/pj/satoken/StpInterfaceImpl.java
new file mode 100644
index 00000000..35798046
--- /dev/null
+++ b/sa-token-demo/sa-token-demo-solon/src/main/java/com/pj/satoken/StpInterfaceImpl.java
@@ -0,0 +1,44 @@
+package com.pj.satoken;
+
+import java.util.ArrayList;
+import java.util.List;
+
+
+import cn.dev33.satoken.stp.StpInterface;
+import org.noear.solon.annotation.Component;
+
+/**
+ * 自定义权限验证接口扩展
+ */
+@Component // 打开此注解,保证此类被 solon 扫描,即可完成 sa-token 的自定义权限验证扩展
+public class StpInterfaceImpl implements StpInterface {
+
+ /**
+ * 返回一个账号所拥有的权限码集合
+ */
+ @Override
+ public List getPermissionList(Object loginId, String loginKey) {
+ // 本list仅做模拟,实际项目中要根据具体业务逻辑来查询权限
+ List list = new ArrayList();
+ list.add("101");
+ list.add("user-add");
+ list.add("user-delete");
+ list.add("user-update");
+ list.add("user-get");
+ list.add("article-get");
+ return list;
+ }
+
+ /**
+ * 返回一个账号所拥有的角色标识集合
+ */
+ @Override
+ public List getRoleList(Object loginId, String loginKey) {
+ // 本list仅做模拟,实际项目中要根据具体业务逻辑来查询角色
+ List list = new ArrayList();
+ list.add("admin");
+ list.add("super-admin");
+ return list;
+ }
+
+}
diff --git a/sa-token-demo/sa-token-demo-solon/src/main/java/com/pj/test/GlobalException.java b/sa-token-demo/sa-token-demo-solon/src/main/java/com/pj/test/GlobalException.java
new file mode 100644
index 00000000..a2818a1a
--- /dev/null
+++ b/sa-token-demo/sa-token-demo-solon/src/main/java/com/pj/test/GlobalException.java
@@ -0,0 +1,45 @@
+package com.pj.test;
+
+import cn.dev33.satoken.exception.*;
+import com.pj.util.AjaxJson;
+
+import org.noear.solon.annotation.Component;
+import org.noear.solon.core.event.EventListener;
+import org.noear.solon.core.handle.Context;
+
+
+/**
+ * 全局异常处理
+ *
+ * @author noear
+ */
+@Component
+public class GlobalException implements EventListener {
+
+ @Override
+ public void onEvent(Throwable e) {
+ Context c = Context.current();
+
+ if (c != null) {
+ // 不同异常返回不同状态码
+ AjaxJson aj = null;
+ if (e instanceof NotLoginException) { // 如果是未登录异常
+ NotLoginException ee = (NotLoginException) e;
+ aj = AjaxJson.getNotLogin().setMsg(ee.getMessage());
+ } else if (e instanceof NotRoleException) { // 如果是角色异常
+ NotRoleException ee = (NotRoleException) e;
+ aj = AjaxJson.getNotJur("无此角色:" + ee.getRole());
+ } else if (e instanceof NotPermissionException) { // 如果是权限异常
+ NotPermissionException ee = (NotPermissionException) e;
+ aj = AjaxJson.getNotJur("无此权限:" + ee.getCode());
+ } else if (e instanceof DisableLoginException) { // 如果是被封禁异常
+ DisableLoginException ee = (DisableLoginException) e;
+ aj = AjaxJson.getNotJur("账号被封禁:" + ee.getDisableTime() + "秒后解封");
+ } else { // 普通异常, 输出:500 + 异常信息
+ aj = AjaxJson.getError(e.getMessage());
+ }
+
+ c.result = aj;
+ }
+ }
+}
diff --git a/sa-token-demo/sa-token-demo-solon/src/main/java/com/pj/test/SSOController.java b/sa-token-demo/sa-token-demo-solon/src/main/java/com/pj/test/SSOController.java
new file mode 100644
index 00000000..3e988ffd
--- /dev/null
+++ b/sa-token-demo/sa-token-demo-solon/src/main/java/com/pj/test/SSOController.java
@@ -0,0 +1,36 @@
+package com.pj.test;
+
+import org.noear.solon.annotation.Controller;
+import org.noear.solon.annotation.Mapping;
+
+import com.pj.util.AjaxJson;
+
+import cn.dev33.satoken.stp.StpUtil;
+import org.noear.solon.annotation.Param;
+
+/**
+ * 测试: 同域单点登录
+ * @author kong
+ * @author noear
+ */
+@Controller
+@Mapping("/sso/")
+public class SSOController {
+
+ // 测试:进行登录
+ @Mapping("doLogin")
+ public AjaxJson doLogin(@Param(defaultValue = "10001") String id) {
+ System.out.println("---------------- 进行登录 ");
+ StpUtil.setLoginId(id);
+ return AjaxJson.getSuccess("登录成功: " + id);
+ }
+
+ // 测试:是否登录
+ @Mapping("isLogin")
+ public AjaxJson isLogin() {
+ System.out.println("---------------- 是否登录 ");
+ boolean isLogin = StpUtil.isLogin();
+ return AjaxJson.getSuccess("是否登录: " + isLogin);
+ }
+
+}
diff --git a/sa-token-demo/sa-token-demo-solon/src/main/java/com/pj/test/StressTestController.java b/sa-token-demo/sa-token-demo-solon/src/main/java/com/pj/test/StressTestController.java
new file mode 100644
index 00000000..75f4c1c4
--- /dev/null
+++ b/sa-token-demo/sa-token-demo-solon/src/main/java/com/pj/test/StressTestController.java
@@ -0,0 +1,61 @@
+package com.pj.test;
+
+import java.util.ArrayList;
+import java.util.List;
+
+import org.noear.solon.annotation.Controller;
+import org.noear.solon.annotation.Mapping;
+
+import com.pj.util.AjaxJson;
+import com.pj.util.Ttime;
+
+import cn.dev33.satoken.stp.StpUtil;
+
+/**
+ * 压力测试
+ * @author kong
+ * @author noear
+ */
+@Controller
+@Mapping("/s-test/")
+public class StressTestController {
+
+
+ // 测试 浏览器访问: http://localhost:8081/s-test/login
+ // 测试前,请先将 is-read-cookie 配置为 false
+ @Mapping("login")
+ public AjaxJson login() {
+// StpUtil.getTokenSession().logout();
+// StpUtil.logoutByLoginId(10001);
+
+ int count = 10; // 循环多少轮
+ int loginCount = 10000; // 每轮循环多少次
+
+ // 循环10次 取平均时间
+ List list = new ArrayList<>();
+ for (int i = 1; i <= count; i++) {
+ System.out.println("\n---------------------第" + i + "轮---------------------");
+ Ttime t = new Ttime().start();
+ // 每次登录的次数
+ for (int j = 1; j <= loginCount; j++) {
+ StpUtil.setLoginId("1000" + j, "PC-" + j);
+ if(j % 1000 == 0) {
+ System.out.println("已登录:" + j);
+ }
+ }
+ t.end();
+ list.add((t.returnMs() + 0.0) / 1000);
+ System.out.println("第" + i + "轮" + "用时:" + t.toString());
+ }
+// System.out.println(((SaTokenDaoDefaultImpl)SaTokenManager.getSaTokenDao()).dataMap.size());
+
+ System.out.println("\n---------------------测试结果---------------------");
+ System.out.println(list.size() + "次测试: " + list);
+ double ss = 0;
+ for (int i = 0; i < list.size(); i++) {
+ ss += list.get(i);
+ }
+ System.out.println("平均用时: " + ss / list.size());
+ return AjaxJson.getSuccess();
+ }
+}
diff --git a/sa-token-demo/sa-token-demo-solon/src/main/java/com/pj/test/TestController.java b/sa-token-demo/sa-token-demo-solon/src/main/java/com/pj/test/TestController.java
new file mode 100644
index 00000000..74676fbd
--- /dev/null
+++ b/sa-token-demo/sa-token-demo-solon/src/main/java/com/pj/test/TestController.java
@@ -0,0 +1,252 @@
+package com.pj.test;
+
+import java.util.Date;
+import java.util.List;
+
+import com.pj.util.AjaxJson;
+import com.pj.util.Ttime;
+
+import cn.dev33.satoken.annotation.SaCheckLogin;
+import cn.dev33.satoken.annotation.SaCheckPermission;
+import cn.dev33.satoken.annotation.SaCheckRole;
+import cn.dev33.satoken.annotation.SaMode;
+import cn.dev33.satoken.session.SaSessionCustomUtil;
+import cn.dev33.satoken.stp.SaTokenInfo;
+import cn.dev33.satoken.stp.StpUtil;
+import org.noear.snack.ONode;
+import org.noear.solon.annotation.Controller;
+import org.noear.solon.annotation.Mapping;
+import org.noear.solon.annotation.Param;
+
+/**
+ * 测试专用Controller
+ * @author kong
+ * @author noear
+ */
+@Controller
+@Mapping("/test/")
+public class TestController {
+
+
+ // 测试登录接口, 浏览器访问: http://localhost:8081/test/login
+ @Mapping("login")
+ public AjaxJson login(@Param(defaultValue="10001") String id) {
+ System.out.println("======================= 进入方法,测试登录接口 ========================= ");
+ System.out.println("当前会话的token:" + StpUtil.getTokenValue());
+ System.out.println("当前是否登录:" + StpUtil.isLogin());
+ System.out.println("当前登录账号:" + StpUtil.getLoginIdDefaultNull());
+
+ StpUtil.setLoginId(id); // 在当前会话登录此账号
+ System.out.println("登录成功");
+ System.out.println("当前是否登录:" + StpUtil.isLogin());
+ System.out.println("当前登录账号:" + StpUtil.getLoginId());
+// System.out.println("当前登录账号并转为int:" + StpUtil.getLoginIdAsInt());
+ System.out.println("当前登录设备:" + StpUtil.getLoginDevice());
+// System.out.println("当前token信息:" + StpUtil.getTokenInfo());
+
+ return AjaxJson.getSuccess();
+ }
+
+ // 测试退出登录 , 浏览器访问: http://localhost:8081/test/logout
+ @Mapping("logout")
+ public AjaxJson logout() {
+ StpUtil.logout();
+// StpUtil.logoutByLoginId(10001);
+ return AjaxJson.getSuccess();
+ }
+
+ // 测试角色接口, 浏览器访问: http://localhost:8081/test/testRole
+ @Mapping("testRole")
+ public AjaxJson testRole() {
+ System.out.println("======================= 进入方法,测试角色接口 ========================= ");
+
+ System.out.println("是否具有角色标识 user " + StpUtil.hasRole("user"));
+ System.out.println("是否具有角色标识 admin " + StpUtil.hasRole("admin"));
+
+ System.out.println("没有admin权限就抛出异常");
+ StpUtil.checkRole("admin");
+
+ System.out.println("在【admin、user】中只要拥有一个就不会抛出异常");
+ StpUtil.checkRoleOr("admin", "user");
+
+ System.out.println("在【admin、user】中必须全部拥有才不会抛出异常");
+ StpUtil.checkRoleAnd("admin", "user");
+
+ System.out.println("角色测试通过");
+
+ return AjaxJson.getSuccess();
+ }
+
+ // 测试权限接口, 浏览器访问: http://localhost:8081/test/testJur
+ @Mapping("testJur")
+ public AjaxJson testJur() {
+ System.out.println("======================= 进入方法,测试权限接口 ========================= ");
+
+ System.out.println("是否具有权限101" + StpUtil.hasPermission("101"));
+ System.out.println("是否具有权限user-add" + StpUtil.hasPermission("user-add"));
+ System.out.println("是否具有权限article-get" + StpUtil.hasPermission("article-get"));
+
+ System.out.println("没有user-add权限就抛出异常");
+ StpUtil.checkPermission("user-add");
+
+ System.out.println("在【101、102】中只要拥有一个就不会抛出异常");
+ StpUtil.checkPermissionOr("101", "102");
+
+ System.out.println("在【101、102】中必须全部拥有才不会抛出异常");
+ StpUtil.checkPermissionAnd("101", "102");
+
+ System.out.println("权限测试通过");
+
+ return AjaxJson.getSuccess();
+ }
+
+ // 测试会话session接口, 浏览器访问: http://localhost:8081/test/session
+ @Mapping("session")
+ public AjaxJson session() {
+ System.out.println("======================= 进入方法,测试会话session接口 ========================= ");
+ System.out.println("当前是否登录:" + StpUtil.isLogin());
+ System.out.println("当前登录账号session的id" + StpUtil.getSession().getId());
+ System.out.println("当前登录账号session的id" + StpUtil.getSession().getId());
+ System.out.println("测试取值name:" + StpUtil.getSession().getAttribute("name"));
+ StpUtil.getSession().setAttribute("name", new Date()); // 写入一个值
+ System.out.println("测试取值name:" + StpUtil.getSession().getAttribute("name"));
+ System.out.println( ONode.stringify(StpUtil.getSession()));
+ return AjaxJson.getSuccess();
+ }
+
+ // 测试自定义session接口, 浏览器访问: http://localhost:8081/test/session2
+ @Mapping("session2")
+ public AjaxJson session2() {
+ System.out.println("======================= 进入方法,测试自定义session接口 ========================= ");
+ // 自定义session就是无需登录也可以使用 的session :比如拿用户的手机号当做 key, 来获取 session
+ System.out.println("自定义 session的id为:" + SaSessionCustomUtil.getSessionById("1895544896").getId());
+ System.out.println("测试取值name:" + SaSessionCustomUtil.getSessionById("1895544896").getAttribute("name"));
+ SaSessionCustomUtil.getSessionById("1895544896").setAttribute("name", "张三"); // 写入值
+ System.out.println("测试取值name:" + SaSessionCustomUtil.getSessionById("1895544896").getAttribute("name"));
+ System.out.println("测试取值name:" + SaSessionCustomUtil.getSessionById("1895544896").getAttribute("name"));
+ return AjaxJson.getSuccess();
+ }
+
+ // ----------
+ // 测试token专属session, 浏览器访问: http://localhost:8081/test/getTokenSession
+ @Mapping("getTokenSession")
+ public AjaxJson getTokenSession() {
+ System.out.println("======================= 进入方法,测试会话session接口 ========================= ");
+ System.out.println("当前是否登录:" + StpUtil.isLogin());
+ System.out.println("当前token专属session: " + StpUtil.getTokenSession().getId());
+
+ System.out.println("测试取值name:" + StpUtil.getTokenSession().getAttribute("name"));
+ StpUtil.getTokenSession().setAttribute("name", "张三"); // 写入一个值
+ System.out.println("测试取值name:" + StpUtil.getTokenSession().getAttribute("name"));
+
+ return AjaxJson.getSuccess();
+ }
+
+ // 打印当前token信息, 浏览器访问: http://localhost:8081/test/tokenInfo
+ @Mapping("tokenInfo")
+ public AjaxJson tokenInfo() {
+ System.out.println("======================= 进入方法,打印当前token信息 ========================= ");
+ SaTokenInfo tokenInfo = StpUtil.getTokenInfo();
+ System.out.println(tokenInfo);
+ return AjaxJson.getSuccessData(tokenInfo);
+ }
+
+ // 测试注解式鉴权, 浏览器访问: http://localhost:8081/test/atCheck
+ @SaCheckLogin // 注解式鉴权:当前会话必须登录才能通过
+ @SaCheckRole("super-admin") // 注解式鉴权:当前会话必须具有指定角色标识才能通过
+ @SaCheckPermission("user-add") // 注解式鉴权:当前会话必须具有指定权限才能通过
+ @Mapping("atCheck")
+ public AjaxJson atCheck() {
+ System.out.println("======================= 进入方法,测试注解鉴权接口 ========================= ");
+ System.out.println("只有通过注解鉴权,才能进入此方法");
+// StpUtil.checkActivityTimeout();
+// StpUtil.updateLastActivityToNow();
+ return AjaxJson.getSuccess();
+ }
+
+ // 测试注解式鉴权, 浏览器访问: http://localhost:8081/test/atJurOr
+ @Mapping("atJurOr")
+ @SaCheckPermission(value = {"user-add", "user-all", "user-delete"}, mode = SaMode.OR) // 注解式鉴权:只要具有其中一个权限即可通过校验
+ public AjaxJson atJurOr() {
+ return AjaxJson.getSuccessData("用户信息");
+ }
+
+ // [活动时间] 续签: http://localhost:8081/test/rene
+ @Mapping("rene")
+ public AjaxJson rene() {
+ StpUtil.checkActivityTimeout();
+ StpUtil.updateLastActivityToNow();
+ return AjaxJson.getSuccess("续签成功");
+ }
+
+ // 测试踢人下线 浏览器访问: http://localhost:8081/test/kickOut
+ @Mapping("kickOut")
+ public AjaxJson kickOut() {
+ // 先登录上
+ StpUtil.setLoginId(10001);
+ // 踢下线
+ StpUtil.logoutByLoginId(10001);
+ // 再尝试获取
+ StpUtil.getLoginId();
+ // 返回
+ return AjaxJson.getSuccess();
+ }
+
+ // 测试登录接口, 按照设备登录, 浏览器访问: http://localhost:8081/test/login2
+ @Mapping("login2")
+ public AjaxJson login2(@Param(defaultValue="10001") String id, @Param(defaultValue="PC") String device) {
+ StpUtil.setLoginId(id, device);
+ return AjaxJson.getSuccess();
+ }
+
+ // 测试身份临时切换: http://localhost:8081/test/switchTo
+ @Mapping("switchTo")
+ public AjaxJson switchTo() {
+ System.out.println("当前会话身份:" + StpUtil.getLoginIdDefaultNull());
+ System.out.println("是否正在身份临时切换中: " + StpUtil.isSwitch());
+ StpUtil.switchTo(10044, () -> {
+ System.out.println("是否正在身份临时切换中: " + StpUtil.isSwitch());
+ System.out.println("当前会话身份已被切换为:" + StpUtil.getLoginId());
+ });
+ System.out.println("是否正在身份临时切换中: " + StpUtil.isSwitch());
+ return AjaxJson.getSuccess();
+ }
+
+ // 测试会话治理 浏览器访问: http://localhost:8081/test/search
+ @Mapping("search")
+ public AjaxJson search() {
+ System.out.println("--------------");
+ Ttime t = new Ttime().start();
+ List tokenValue = StpUtil.searchTokenValue("8feb8265f773", 0, 10);
+ for (String v : tokenValue) {
+// SaSession session = StpUtil.getSessionBySessionId(sid);
+ System.out.println(v);
+ }
+ System.out.println("用时:" + t.end().toString());
+ return AjaxJson.getSuccess();
+ }
+
+ // 测试指定设备登录 浏览器访问: http://localhost:8081/test/loginByDevice
+ @Mapping("loginByDevice")
+ public AjaxJson loginByDevice() {
+ System.out.println("--------------");
+ StpUtil.setLoginId(10001, "PC");
+ return AjaxJson.getSuccessData("登录成功");
+ }
+
+
+ // 测试 浏览器访问: http://localhost:8081/test/test
+ @Mapping("test")
+ public AjaxJson test() {
+ System.out.println("进来了");
+ return AjaxJson.getSuccess("访问成功");
+ }
+
+ // 测试 浏览器访问: http://localhost:8081/test/test2
+ @Mapping("test2")
+ public AjaxJson test2() {
+ return AjaxJson.getSuccess();
+ }
+
+
+}
diff --git a/sa-token-demo/sa-token-demo-solon/src/main/java/com/pj/test/UserController.java b/sa-token-demo/sa-token-demo-solon/src/main/java/com/pj/test/UserController.java
new file mode 100644
index 00000000..d11bcecc
--- /dev/null
+++ b/sa-token-demo/sa-token-demo-solon/src/main/java/com/pj/test/UserController.java
@@ -0,0 +1,33 @@
+package com.pj.test;
+
+import cn.dev33.satoken.stp.StpUtil;
+import org.noear.solon.annotation.Controller;
+import org.noear.solon.annotation.Mapping;
+
+/**
+ * 登录测试
+ * @author kong
+ * @author noear
+ */
+@Controller
+@Mapping("/user/")
+public class UserController {
+
+ // 测试登录,浏览器访问: http://localhost:8081/user/doLogin?username=zhang&password=123456
+ @Mapping("doLogin")
+ public String doLogin(String username, String password) {
+ // 此处仅作模拟示例,真实项目需要从数据库中查询数据进行比对
+ if("zhang".equals(username) && "123456".equals(password)) {
+ StpUtil.setLoginId(10001);
+ return "登录成功";
+ }
+ return "登录失败";
+ }
+
+ // 查询登录状态,浏览器访问: http://localhost:8081/user/isLogin
+ @Mapping("isLogin")
+ public String isLogin(String username, String password) {
+ return "当前会话是否登录:" + StpUtil.isLogin();
+ }
+
+}
diff --git a/sa-token-demo/sa-token-demo-solon/src/main/java/com/pj/util/AjaxJson.java b/sa-token-demo/sa-token-demo-solon/src/main/java/com/pj/util/AjaxJson.java
new file mode 100644
index 00000000..768d0578
--- /dev/null
+++ b/sa-token-demo/sa-token-demo-solon/src/main/java/com/pj/util/AjaxJson.java
@@ -0,0 +1,162 @@
+package com.pj.util;
+
+import java.io.Serializable;
+import java.util.List;
+
+
+/**
+ * ajax请求返回Json格式数据的封装
+ */
+public class AjaxJson implements Serializable{
+
+ private static final long serialVersionUID = 1L; // 序列化版本号
+
+ public static final int CODE_SUCCESS = 200; // 成功状态码
+ public static final int CODE_ERROR = 500; // 错误状态码
+ public static final int CODE_WARNING = 501; // 警告状态码
+ public static final int CODE_NOT_JUR = 403; // 无权限状态码
+ public static final int CODE_NOT_LOGIN = 401; // 未登录状态码
+ public static final int CODE_INVALID_REQUEST = 400; // 无效请求状态码
+
+ public int code; // 状态码
+ public String msg; // 描述信息
+ public Object data; // 携带对象
+ public Long dataCount; // 数据总数,用于分页
+
+ /**
+ * 返回code
+ * @return
+ */
+ public int getCode() {
+ return this.code;
+ }
+
+ /**
+ * 给msg赋值,连缀风格
+ */
+ public AjaxJson setMsg(String msg) {
+ this.msg = msg;
+ return this;
+ }
+ public String getMsg() {
+ return this.msg;
+ }
+
+ /**
+ * 给data赋值,连缀风格
+ */
+ public AjaxJson setData(Object data) {
+ this.data = data;
+ return this;
+ }
+
+ /**
+ * 将data还原为指定类型并返回
+ */
+ @SuppressWarnings("unchecked")
+ public T getData(Class cs) {
+ return (T) data;
+ }
+
+ // ============================ 构建 ==================================
+
+ public AjaxJson(int code, String msg, Object data, Long dataCount) {
+ this.code = code;
+ this.msg = msg;
+ this.data = data;
+ this.dataCount = dataCount;
+ }
+
+ // 返回成功
+ public static AjaxJson getSuccess() {
+ return new AjaxJson(CODE_SUCCESS, "ok", null, null);
+ }
+ public static AjaxJson getSuccess(String msg) {
+ return new AjaxJson(CODE_SUCCESS, msg, null, null);
+ }
+ public static AjaxJson getSuccess(String msg, Object data) {
+ return new AjaxJson(CODE_SUCCESS, msg, data, null);
+ }
+ public static AjaxJson getSuccessData(Object data) {
+ return new AjaxJson(CODE_SUCCESS, "ok", data, null);
+ }
+ public static AjaxJson getSuccessArray(Object... data) {
+ return new AjaxJson(CODE_SUCCESS, "ok", data, null);
+ }
+
+ // 返回失败
+ public static AjaxJson getError() {
+ return new AjaxJson(CODE_ERROR, "error", null, null);
+ }
+ public static AjaxJson getError(String msg) {
+ return new AjaxJson(CODE_ERROR, msg, null, null);
+ }
+
+ // 返回警告
+ public static AjaxJson getWarning() {
+ return new AjaxJson(CODE_ERROR, "warning", null, null);
+ }
+ public static AjaxJson getWarning(String msg) {
+ return new AjaxJson(CODE_WARNING, msg, null, null);
+ }
+
+ // 返回未登录
+ public static AjaxJson getNotLogin() {
+ return new AjaxJson(CODE_NOT_LOGIN, "未登录,请登录后再次访问", null, null);
+ }
+
+ // 返回没有权限的
+ public static AjaxJson getNotJur(String msg) {
+ return new AjaxJson(CODE_NOT_JUR, msg, null, null);
+ }
+
+ // 返回一个自定义状态码的
+ public static AjaxJson get(int code, String msg){
+ return new AjaxJson(code, msg, null, null);
+ }
+
+ // 返回分页和数据的
+ public static AjaxJson getPageData(Long dataCount, Object data){
+ return new AjaxJson(CODE_SUCCESS, "ok", data, dataCount);
+ }
+
+ // 返回,根据受影响行数的(大于0=ok,小于0=error)
+ public static AjaxJson getByLine(int line){
+ if(line > 0){
+ return getSuccess("ok", line);
+ }
+ return getError("error").setData(line);
+ }
+
+ // 返回,根据布尔值来确定最终结果的 (true=ok,false=error)
+ public static AjaxJson getByBoolean(boolean b){
+ return b ? getSuccess("ok") : getError("error");
+ }
+
+ /* (non-Javadoc)
+ * @see java.lang.Object#toString()
+ */
+ @SuppressWarnings("rawtypes")
+ @Override
+ public String toString() {
+ String data_string = null;
+ if(data == null){
+
+ } else if(data instanceof List){
+ data_string = "List(length=" + ((List)data).size() + ")";
+ } else {
+ data_string = data.toString();
+ }
+ return "{"
+ + "\"code\": " + this.getCode()
+ + ", \"msg\": \"" + this.getMsg() + "\""
+ + ", \"data\": " + data_string
+ + ", \"dataCount\": " + dataCount
+ + "}";
+ }
+
+
+
+
+
+}
diff --git a/sa-token-demo/sa-token-demo-solon/src/main/java/com/pj/util/Ttime.java b/sa-token-demo/sa-token-demo-solon/src/main/java/com/pj/util/Ttime.java
new file mode 100644
index 00000000..cb17dcaa
--- /dev/null
+++ b/sa-token-demo/sa-token-demo-solon/src/main/java/com/pj/util/Ttime.java
@@ -0,0 +1,63 @@
+package com.pj.util;
+
+
+/**
+ * 用于测试用时
+ * @author kong
+ *
+ */
+public class Ttime {
+
+ private long start=0; //开始时间
+ private long end=0; //结束时间
+
+ public static Ttime t = new Ttime(); //static快捷使用
+
+ /**
+ * 开始计时
+ * @return
+ */
+ public Ttime start() {
+ start=System.currentTimeMillis();
+ return this;
+ }
+
+
+ /**
+ * 结束计时
+ */
+ public Ttime end() {
+ end=System.currentTimeMillis();
+ return this;
+ }
+
+
+ /**
+ * 返回所用毫秒数
+ */
+ public long returnMs() {
+ return end-start;
+ }
+
+ /**
+ * 格式化输出结果
+ */
+ public void outTime() {
+ System.out.println(this.toString());
+ }
+
+ /**
+ * 结束并格式化输出结果
+ */
+ public void endOutTime() {
+ this.end().outTime();
+ }
+
+ @Override
+ public String toString() {
+ return (returnMs() + 0.0) / 1000 + "s"; // 格式化为:0.01s
+ }
+
+
+
+}
diff --git a/sa-token-demo/sa-token-demo-solon/src/main/resources/application.yml b/sa-token-demo/sa-token-demo-solon/src/main/resources/application.yml
new file mode 100644
index 00000000..bf9c4f97
--- /dev/null
+++ b/sa-token-demo/sa-token-demo-solon/src/main/resources/application.yml
@@ -0,0 +1,49 @@
+# 端口
+server:
+ port: 8081
+
+solon:
+ # sa-token配置
+ sa-token:
+ # token名称 (同时也是cookie名称)
+ token-name: satoken
+ # token有效期,单位s 默认30天, -1代表永不过期
+ timeout: 2592000
+ # token临时有效期 (指定时间内无操作就视为token过期) 单位: 秒
+ activity-timeout: -1
+ # 是否允许同一账号并发登录 (为true时允许一起登录, 为false时新登录挤掉旧登录)
+ allow-concurrent-login: true
+ # 在多人登录同一账号时,是否共用一个token (为true时所有登录共用一个token, 为false时每次登录新建一个token)
+ is-share: true
+ # token风格
+ token-style: uuid
+ # 是否输出操作日志
+ is-log: false
+
+ # redis配置
+ redis:
+ # Redis数据库索引(默认为0)
+ database: 0
+ # Redis服务器地址
+ host: 127.0.0.1
+ # Redis服务器连接端口
+ port: 6379
+ # Redis服务器连接密码(默认为空)
+ password:
+ # 连接超时时间(毫秒)
+ timeout: 10000ms
+ lettuce:
+ pool:
+ # 连接池最大连接数
+ max-active: 200
+ # 连接池最大阻塞等待时间(使用负值表示没有限制)
+ max-wait: -1ms
+ # 连接池中的最大空闲连接
+ max-idle: 10
+ # 连接池中的最小空闲连接
+ min-idle: 0
+
+
+
+
+
\ No newline at end of file
diff --git a/sa-token-starter/pom.xml b/sa-token-starter/pom.xml
index dd44eea5..641ba0ab 100644
--- a/sa-token-starter/pom.xml
+++ b/sa-token-starter/pom.xml
@@ -20,6 +20,7 @@
sa-token-servlet
sa-token-spring-boot-starter
sa-token-reactor-spring-boot-starter
+ sa-token-solon-plugin
\ No newline at end of file
diff --git a/sa-token-starter/sa-token-solon-plugin/pom.xml b/sa-token-starter/sa-token-solon-plugin/pom.xml
new file mode 100644
index 00000000..6c8d7486
--- /dev/null
+++ b/sa-token-starter/sa-token-solon-plugin/pom.xml
@@ -0,0 +1,32 @@
+
+
+ 4.0.0
+
+
+ cn.dev33
+ sa-token-starter
+ 1.19.0
+
+ jar
+
+ sa-token-solon-plugin
+ sa-token-solon-plugin
+ solon integrate sa-token
+
+
+
+ org.noear
+ solon
+ 1.4.8
+
+
+
+ cn.dev33
+ sa-token-core
+ 1.19.0
+
+
+
+
\ No newline at end of file
diff --git a/sa-token-starter/sa-token-solon-plugin/src/main/java/cn/dev33/satoken/solon/XPluginImp.java b/sa-token-starter/sa-token-solon-plugin/src/main/java/cn/dev33/satoken/solon/XPluginImp.java
new file mode 100644
index 00000000..0b3043bb
--- /dev/null
+++ b/sa-token-starter/sa-token-solon-plugin/src/main/java/cn/dev33/satoken/solon/XPluginImp.java
@@ -0,0 +1,60 @@
+package cn.dev33.satoken.solon;
+
+import cn.dev33.satoken.SaManager;
+import cn.dev33.satoken.action.SaTokenAction;
+import cn.dev33.satoken.annotation.SaCheckLogin;
+import cn.dev33.satoken.annotation.SaCheckPermission;
+import cn.dev33.satoken.annotation.SaCheckRole;
+import cn.dev33.satoken.config.SaTokenConfig;
+import cn.dev33.satoken.dao.SaTokenDao;
+import cn.dev33.satoken.listener.SaTokenListener;
+import cn.dev33.satoken.solon.integration.SaTokenMethodInterceptor;
+import cn.dev33.satoken.solon.integration.SaContextForSolon;
+import cn.dev33.satoken.stp.StpInterface;
+import org.noear.solon.Solon;
+import org.noear.solon.SolonApp;
+import org.noear.solon.core.Aop;
+import org.noear.solon.core.Plugin;
+
+/**
+ * @author noear
+ * @since 1.4
+ */
+public class XPluginImp implements Plugin {
+ @Override
+ public void start(SolonApp app) {
+ Aop.context().beanAroundAdd(SaCheckPermission.class, SaTokenMethodInterceptor.instance);
+ Aop.context().beanAroundAdd(SaCheckRole.class, SaTokenMethodInterceptor.instance);
+ Aop.context().beanAroundAdd(SaCheckLogin.class, SaTokenMethodInterceptor.instance);
+
+ //集成初始化
+
+ //注入配置Bean
+ SaTokenConfig saTokenConfig = Solon.cfg().getBean("solon.sa-token", SaTokenConfig.class);
+ SaManager.setConfig(saTokenConfig);
+
+
+ //注入容器交互Bean
+ SaManager.setSaTokenContext(new SaContextForSolon());
+
+ //注入侦听器Bean
+ Aop.getAsyn(SaTokenListener.class, bw->{
+ SaManager.setSaTokenListener(bw.raw());
+ });
+
+ //注入框架行为Bean
+ Aop.getAsyn(SaTokenAction.class, bw->{
+ SaManager.setSaTokenAction(bw.raw());
+ });
+
+ //注入权限认证Bean
+ Aop.getAsyn(StpInterface.class, bw->{
+ SaManager.setStpInterface(bw.raw());
+ });
+
+ //注入持久化Bean
+ Aop.getAsyn(SaTokenDao.class, bw->{
+ SaManager.setSaTokenDao(bw.raw());
+ });
+ }
+}
diff --git a/sa-token-starter/sa-token-solon-plugin/src/main/java/cn/dev33/satoken/solon/integration/SaContextForSolon.java b/sa-token-starter/sa-token-solon-plugin/src/main/java/cn/dev33/satoken/solon/integration/SaContextForSolon.java
new file mode 100644
index 00000000..4e0a58c4
--- /dev/null
+++ b/sa-token-starter/sa-token-solon-plugin/src/main/java/cn/dev33/satoken/solon/integration/SaContextForSolon.java
@@ -0,0 +1,48 @@
+package cn.dev33.satoken.solon.integration;
+
+import cn.dev33.satoken.context.SaTokenContext;
+import cn.dev33.satoken.context.model.SaRequest;
+import cn.dev33.satoken.context.model.SaResponse;
+import cn.dev33.satoken.context.model.SaStorage;
+import cn.dev33.satoken.solon.model.SaRequestForSolon;
+import cn.dev33.satoken.solon.model.SaResponseForSolon;
+import cn.dev33.satoken.solon.model.SaStorageForSolon;
+import org.noear.solon.core.util.PathAnalyzer;
+
+/**
+ * @author noear
+ * @since 1.4
+ */
+public class SaContextForSolon implements SaTokenContext {
+ /**
+ * 获取当前请求的Request对象
+ */
+ @Override
+ public SaRequest getRequest() {
+ return new SaRequestForSolon();
+ }
+
+ /**
+ * 获取当前请求的Response对象
+ */
+ @Override
+ public SaResponse getResponse() {
+ return new SaResponseForSolon();
+ }
+
+ /**
+ * 获取当前请求的 [存储器] 对象
+ */
+ @Override
+ public SaStorage getStorage() {
+ return new SaStorageForSolon();
+ }
+
+ /**
+ * 校验指定路由匹配符是否可以匹配成功指定路径
+ */
+ @Override
+ public boolean matchPath(String pattern, String path) {
+ return PathAnalyzer.get(path).matches(path);
+ }
+}
diff --git a/sa-token-starter/sa-token-solon-plugin/src/main/java/cn/dev33/satoken/solon/integration/SaTokenMethodInterceptor.java b/sa-token-starter/sa-token-solon-plugin/src/main/java/cn/dev33/satoken/solon/integration/SaTokenMethodInterceptor.java
new file mode 100644
index 00000000..1987a32b
--- /dev/null
+++ b/sa-token-starter/sa-token-solon-plugin/src/main/java/cn/dev33/satoken/solon/integration/SaTokenMethodInterceptor.java
@@ -0,0 +1,22 @@
+package cn.dev33.satoken.solon.integration;
+
+import cn.dev33.satoken.SaManager;
+import org.noear.solon.core.aspect.Interceptor;
+import org.noear.solon.core.aspect.Invocation;
+
+/**
+ * @author noear
+ * @since 1.4
+ */
+public class SaTokenMethodInterceptor implements Interceptor {
+ public static final SaTokenMethodInterceptor instance = new SaTokenMethodInterceptor();
+
+ @Override
+ public Object doIntercept(Invocation inv) throws Throwable {
+ // 注解鉴权
+ SaManager.getSaTokenAction().checkMethodAnnotation(inv.method().getMethod());
+
+ // 执行原有逻辑
+ return inv.invoke();
+ }
+}
diff --git a/sa-token-starter/sa-token-solon-plugin/src/main/java/cn/dev33/satoken/solon/integration/SaTokenPathFilter.java b/sa-token-starter/sa-token-solon-plugin/src/main/java/cn/dev33/satoken/solon/integration/SaTokenPathFilter.java
new file mode 100644
index 00000000..86496da9
--- /dev/null
+++ b/sa-token-starter/sa-token-solon-plugin/src/main/java/cn/dev33/satoken/solon/integration/SaTokenPathFilter.java
@@ -0,0 +1,162 @@
+package cn.dev33.satoken.solon.integration;
+
+
+import cn.dev33.satoken.exception.SaTokenException;
+import cn.dev33.satoken.filter.SaFilterAuthStrategy;
+import cn.dev33.satoken.filter.SaFilterErrorStrategy;
+import cn.dev33.satoken.router.SaRouterUtil;
+import org.noear.solon.core.handle.Context;
+import org.noear.solon.core.handle.Filter;
+import org.noear.solon.core.handle.FilterChain;
+
+import java.util.ArrayList;
+import java.util.Arrays;
+import java.util.List;
+
+/**
+ * @author noear 2021/5/30 created
+ */
+public class SaTokenPathFilter implements Filter {
+ // ------------------------ 设置此过滤器 拦截 & 放行 的路由
+
+ /**
+ * 拦截路由
+ */
+ private List includeList = new ArrayList<>();
+
+ /**
+ * 放行路由
+ */
+ private List excludeList = new ArrayList<>();
+
+ /**
+ * 添加 [拦截路由]
+ * @param paths 路由
+ * @return 对象自身
+ */
+ public SaTokenPathFilter addInclude(String... paths) {
+ includeList.addAll(Arrays.asList(paths));
+ return this;
+ }
+
+ /**
+ * 添加 [放行路由]
+ * @param paths 路由
+ * @return 对象自身
+ */
+ public SaTokenPathFilter addExclude(String... paths) {
+ excludeList.addAll(Arrays.asList(paths));
+ return this;
+ }
+
+ /**
+ * 写入 [拦截路由] 集合
+ * @param pathList 路由集合
+ * @return 对象自身
+ */
+ public SaTokenPathFilter setIncludeList(List pathList) {
+ includeList = pathList;
+ return this;
+ }
+
+ /**
+ * 写入 [放行路由] 集合
+ * @param pathList 路由集合
+ * @return 对象自身
+ */
+ public SaTokenPathFilter setExcludeList(List pathList) {
+ excludeList = pathList;
+ return this;
+ }
+
+ /**
+ * 获取 [拦截路由] 集合
+ * @return see note
+ */
+ public List getIncludeList() {
+ return includeList;
+ }
+
+ /**
+ * 获取 [放行路由] 集合
+ * @return see note
+ */
+ public List getExcludeList() {
+ return excludeList;
+ }
+
+
+ // ------------------------ 钩子函数
+
+ /**
+ * 认证函数:每次请求执行
+ */
+ public SaFilterAuthStrategy auth = r -> {};
+
+ /**
+ * 异常处理函数:每次[认证函数]发生异常时执行此函数
+ */
+ public SaFilterErrorStrategy error = e -> {
+ throw new SaTokenException(e);
+ };
+
+ /**
+ * 前置函数:在每次[认证函数]之前执行
+ */
+ public SaFilterAuthStrategy beforeAuth = r -> {};
+
+ /**
+ * 写入[认证函数]: 每次请求执行
+ * @param auth see note
+ * @return 对象自身
+ */
+ public SaTokenPathFilter setAuth(SaFilterAuthStrategy auth) {
+ this.auth = auth;
+ return this;
+ }
+
+ /**
+ * 写入[异常处理函数]:每次[认证函数]发生异常时执行此函数
+ * @param error see note
+ * @return 对象自身
+ */
+ public SaTokenPathFilter setError(SaFilterErrorStrategy error) {
+ this.error = error;
+ return this;
+ }
+
+ /**
+ * 写入[前置函数]:在每次[认证函数]之前执行
+ * @param beforeAuth see note
+ * @return 对象自身
+ */
+ public SaTokenPathFilter setBeforeAuth(SaFilterAuthStrategy beforeAuth) {
+ this.beforeAuth = beforeAuth;
+ return this;
+ }
+
+
+ @Override
+ public void doFilter(Context ctx, FilterChain chain) throws Throwable {
+ try {
+ // 执行全局过滤器
+ SaRouterUtil.match(includeList, excludeList, () -> {
+ beforeAuth.run(null);
+ auth.run(null);
+ });
+
+ } catch (Throwable e) {
+ // 1. 获取异常处理策略结果
+ Object result = error.run(e);
+ String resultString = String.valueOf(result);
+
+ // 2. 写入输出流
+ ctx.contentType("text/plain; charset=utf-8");
+ ctx.output(resultString);
+ return;
+ }
+
+ // 执行
+ chain.doFilter(ctx);
+ }
+}
diff --git a/sa-token-starter/sa-token-solon-plugin/src/main/java/cn/dev33/satoken/solon/model/SaRequestForSolon.java b/sa-token-starter/sa-token-solon-plugin/src/main/java/cn/dev33/satoken/solon/model/SaRequestForSolon.java
new file mode 100644
index 00000000..396b7422
--- /dev/null
+++ b/sa-token-starter/sa-token-solon-plugin/src/main/java/cn/dev33/satoken/solon/model/SaRequestForSolon.java
@@ -0,0 +1,45 @@
+package cn.dev33.satoken.solon.model;
+
+import cn.dev33.satoken.context.model.SaRequest;
+import org.noear.solon.core.handle.Context;
+
+/**
+ * @author noear
+ * @since 1.4
+ */
+public class SaRequestForSolon implements SaRequest {
+ Context ctx;
+ public SaRequestForSolon(){
+ ctx = Context.current();
+ }
+
+ @Override
+ public Object getSource() {
+ return ctx;
+ }
+
+ @Override
+ public String getParameter(String s) {
+ return ctx.param(s);
+ }
+
+ @Override
+ public String getHeader(String s) {
+ return ctx.header(s);
+ }
+
+ @Override
+ public String getCookieValue(String s) {
+ return ctx.cookie(s);
+ }
+
+ @Override
+ public String getRequestPath() {
+ return ctx.pathNew();
+ }
+
+ @Override
+ public String getMethod() {
+ return ctx.method();
+ }
+}
diff --git a/sa-token-starter/sa-token-solon-plugin/src/main/java/cn/dev33/satoken/solon/model/SaResponseForSolon.java b/sa-token-starter/sa-token-solon-plugin/src/main/java/cn/dev33/satoken/solon/model/SaResponseForSolon.java
new file mode 100644
index 00000000..edfecc31
--- /dev/null
+++ b/sa-token-starter/sa-token-solon-plugin/src/main/java/cn/dev33/satoken/solon/model/SaResponseForSolon.java
@@ -0,0 +1,42 @@
+package cn.dev33.satoken.solon.model;
+
+import cn.dev33.satoken.context.model.SaResponse;
+import org.noear.solon.Utils;
+import org.noear.solon.core.handle.Context;
+
+/**
+ * @author noear
+ * @since 1.4
+ */
+public class SaResponseForSolon implements SaResponse {
+ Context ctx;
+
+ public SaResponseForSolon() {
+ ctx = Context.current();
+ }
+
+ @Override
+ public Object getSource() {
+ return ctx;
+ }
+
+ @Override
+ public void deleteCookie(String s) {
+ ctx.cookieRemove(s);
+ }
+
+ @Override
+ public void addCookie(String name, String value, String path, String domain, int timeout) {
+ if (Utils.isNotEmpty(path)) {
+ path = "/";
+ }
+
+ ctx.cookieSet(name, value, domain, path, timeout);
+ }
+
+ @Override
+ public SaResponse setHeader(String name, String value) {
+ ctx.headerSet(name, value);
+ return this;
+ }
+}
diff --git a/sa-token-starter/sa-token-solon-plugin/src/main/java/cn/dev33/satoken/solon/model/SaStorageForSolon.java b/sa-token-starter/sa-token-solon-plugin/src/main/java/cn/dev33/satoken/solon/model/SaStorageForSolon.java
new file mode 100644
index 00000000..6191f549
--- /dev/null
+++ b/sa-token-starter/sa-token-solon-plugin/src/main/java/cn/dev33/satoken/solon/model/SaStorageForSolon.java
@@ -0,0 +1,36 @@
+package cn.dev33.satoken.solon.model;
+
+import cn.dev33.satoken.context.model.SaStorage;
+import org.noear.solon.core.handle.Context;
+
+/**
+ * @author noear
+ * @since 1.4
+ */
+public class SaStorageForSolon implements SaStorage {
+ Context ctx;
+
+ public SaStorageForSolon() {
+ ctx = Context.current();
+ }
+
+ @Override
+ public Object getSource() {
+ return ctx;
+ }
+
+ @Override
+ public void set(String key, Object value) {
+ ctx.attrSet(key, value);
+ }
+
+ @Override
+ public Object get(String key) {
+ return ctx.attr(key);
+ }
+
+ @Override
+ public void delete(String key) {
+ ctx.attrMap().remove(key);
+ }
+}
diff --git a/sa-token-starter/sa-token-solon-plugin/src/main/java/cn/dev33/satoken/solon/package-info.java b/sa-token-starter/sa-token-solon-plugin/src/main/java/cn/dev33/satoken/solon/package-info.java
new file mode 100644
index 00000000..4b10a207
--- /dev/null
+++ b/sa-token-starter/sa-token-solon-plugin/src/main/java/cn/dev33/satoken/solon/package-info.java
@@ -0,0 +1,4 @@
+/**
+ * sa-token 集成 solon 的各个组件
+ */
+package cn.dev33.satoken.solon;
\ No newline at end of file
diff --git a/sa-token-starter/sa-token-solon-plugin/src/main/resources/META-INF/solon/cn.dev33.satoken.solon.properties b/sa-token-starter/sa-token-solon-plugin/src/main/resources/META-INF/solon/cn.dev33.satoken.solon.properties
new file mode 100644
index 00000000..51d8fd9a
--- /dev/null
+++ b/sa-token-starter/sa-token-solon-plugin/src/main/resources/META-INF/solon/cn.dev33.satoken.solon.properties
@@ -0,0 +1 @@
+solon.plugin=cn.dev33.satoken.solon.XPluginImp
\ No newline at end of file