Bladex-Boot使用Postman调用服务说明

一:GitBladex-Boot项目,并启动服务

二:打开Postman

三:使用Post,调用http://localhost/blade-auth/oauth/token/

配置:Header中增加Key:Authorization ,VALUE:Basic c2FiZXI6c2FiZXJfc2VjcmV0(注:"c3dvcmQ6c3dvcmRfc2VjcmV0"为clientId:clientSecret串转换为的base64编码,这个是可变的,clientId:clientSecret的取值在Bladex数据库中的blade_client表中的client_id字段的值和client_secret字段的值中间用冒号连接转为Base64位编码即可,Base64编码网站:http://tool.oschina.net/encrypt?type=3

如:

client_id:saber

client_secret:saber_secret

clientId:clientSecret组合为:saber:saber_secret  [注意冒号为半角字符]

经过Base64编码后为:c2FiZXI6c2FiZXJfc2VjcmV0

Body中增加:

Key:usernaem,VALUE:admin

Key:password,VALUE:admin

Key:tenantId,VALUE:000000

四:从返回的Json中取到 tokenType 和 accessToken,将他们拼接起来并以空格隔开

返回JSON中的内容如下:

"access_token": "eyJ0eXAiOiJKc29uV2ViVG9rZW4iLCJhbGciOiJIUzI1NiJ9.eyJpc3MiOiJpc3N1c2VyIiwiYXVkIjoiYXVkaWVuY2UiLCJ0ZW5hbnRfaWQiOiIwMDAwMDAiLCJyb2xlX25hbWUiOiJhZG1pbmlzdHJhdG9yIiwidXNlcl9pZCI6IjExMjM1OTg4MjE3Mzg2NzUyMDEiLCJyb2xlX2lkIjoiMTEyMzU5ODgxNjczODY3NTIwMSIsInVzZXJfbmFtZSI6ImFkbWluIiwibmlja19uYW1lIjoi566h55CG5ZGYIiwidG9rZW5fdHlwZSI6ImFjY2Vzc190b2tlbiIsImRlcHRfaWQiOiIxMTIzNTk4ODEzNzM4Njc1MjAxIiwiYWNjb3VudCI6ImFkbWluIiwiY2xpZW50X2lkIjoic3dvcmQiLCJleHAiOjE1Njg5NTYxMjUsIm5iZiI6MTU2ODk1MjUyNX0.ossjztnl8vPu1anZVvikNlxlaR7I4U8Puo9evRtRfD0",
"token_type": "bearer",
拼接好后如下:
 
bearer eyJ0eXAiOiJKc29uV2ViVG9rZW4iLCJhbGciOiJIUzI1NiJ9.eyJpc3MiOiJpc3N1c2VyIiwiYXVkIjoiYXVkaWVuY2UiLCJ0ZW5hbnRfaWQiOiIwMDAwMDAiLCJyb2xlX25hbWUiOiJhZG1pbmlzdHJhdG9yIiwidXNlcl9pZCI6IjExMjM1OTg4MjE3Mzg2NzUyMDEiLCJyb2xlX2lkIjoiMTEyMzU5ODgxNjczODY3NTIwMSIsInVzZXJfbmFtZSI6ImFkbWluIiwibmlja19uYW1lIjoi566h55CG5ZGYIiwidG9rZW5fdHlwZSI6ImFjY2Vzc190b2tlbiIsImRlcHRfaWQiOiIxMTIzNTk4ODEzNzM4Njc1MjAxIiwiYWNjb3VudCI6ImFkbWluIiwiY2xpZW50X2lkIjoic3dvcmQiLCJleHAiOjE1Njg5NTYxMjUsIm5iZiI6MTU2ODk1MjUyNX0.ossjztnl8vPu1anZVvikNlxlaR7I4U8Puo9evRtRfD0

五:其它API的调用,需要设置请求头为blade-auth,请求头对应的值为第四点拼接好的字符串 (后续的所有接口调用都需要带上请求头为 Authorization 值为 c3dvcmQ6c3dvcmRfc2VjcmV0,【授权认证时需要,后续接口经测试,不用需要增加】)

六:其它接口测试:http://localhost/blade-employee/list?current=1&size=10

配置:

Header中增加

Key:blade-auth

VALUE:bearer eyJ0eXAiOiJKc29uV2ViVG9rZW4iLCJhbGciOiJIUzI1NiJ9.eyJpc3MiOiJpc3N1c2VyIiwiYXVkIjoiYXVkaWVuY2UiLCJ0ZW5hbnRfaWQiOiIwMDAwMDAiLCJyb2xlX25hbWUiOiJhZG1pbmlzdHJhdG9yIiwidXNlcl9pZCI6IjExMjM1OTg4MjE3Mzg2NzUyMDEiLCJyb2xlX2lkIjoiMTEyMzU5ODgxNjczODY3NTIwMSIsInVzZXJfbmFtZSI6ImFkbWluIiwibmlja19uYW1lIjoi566h55CG5ZGYIiwidG9rZW5fdHlwZSI6ImFjY2Vzc190b2tlbiIsImRlcHRfaWQiOiIxMTIzNTk4ODEzNzM4Njc1MjAxIiwiYWNjb3VudCI6ImFkbWluIiwiY2xpZW50X2lkIjoic3dvcmQiLCJleHAiOjE1Njg5NTYxMjUsIm5iZiI6MTU2ODk1MjUyNX0.ossjztnl8vPu1anZVvikNlxlaR7I4U8Puo9evRtRfD0

Body中增加:

Key:username

VALUE:admin

Key:password

VALUE:admin

【Send】即可调用成功

原文地址:https://www.cnblogs.com/edrp/p/11556261.html