百木园-与人分享,
就是让自己快乐。

shiro认证- SpringBoot(20)

1.认识shiro

  除Spring Security安全框架外,应用非常广泛的就是Apache的强大又灵活的开源安全框架 Shiro,在国内使用量远远超过Spring Security。它能够用于身份验证、授权、加密和会话管理, 有易于理解的API,可以快速、轻松地构建任何应用程序。而且大部分人觉得从Shiro入门要比 Spring Security 简单。

  1.1 认识Shiro的核心组件

Shiro有如下核心组件。

  • Subject:代表当前“用户”。与当前应用程序交互的任何东西都是Subject,如爬虫、机器人、所有Subject都绑定到SecurityManager,与Subject的所有交互都会委托给 SecurityManager,Subject 是一个门面,SecurityManager 是实际的执行者。
  • SecurityManager:与安全有关的操作都会与SecurityManager交互。它管理着所有 Subject,是Shiro的核心,员责与其他组件进行交互。
  • Realm: Shiro从Realm中获取安全数据(用户、角色、权限),SecurityManager 需要 从Realm中获取相应的用户信息进行比较用户身份是否合法,也需要从Realm中得到用户 相应的角色/权限进行验证,以确定用户是否能进行操作。

2.实例:用shiro实现管理后台的动态权限功能

  依赖:

<dependency>
    <groupId>org.apache.shiro</groupId>
    <artifactId>shiro-spring</artifactId>
    <version>1.9.1</version>
</dependency>
<dependency>
    <groupId>org.apache.commons</groupId>
    <artifactId>commons-lang3</artifactId>
</dependency>

  2.1 创建实体

  2.1.1 创建管理员实体

  创建管理实体,用于存放管理员信息,见以下代码:

package com.intehel.demo.domain;

import lombok.Data;
import javax.persistence.*;
import java.io.Serializable;
import java.util.List;

@Entity
@Data
public class Admin implements Serializable {
    @Id
    @GeneratedValue
    private Integer id;
    @Column(unique = true)
    //账号
    private String username;
    //名称
    private String name;
    //密码
    private String password;
    //盐加密
    private String salt;
    //用户状态:0:创建未认证,等待验证 1:正常状态 2:用户被锁定
    private byte state;
    @ManyToMany(fetch = FetchType.EAGER)
    @JoinTable(name = \"SysUserRole\",joinColumns = {@JoinColumn(name = \"uid\")},
            inverseJoinColumns = {@JoinColumn(name = \"roleId\")})
    private List<SysRole> rolesList;
}

  2.1.2 创建权限实体

  权限实体用于存放权限数据,见以下代码:

package com.intehel.demo.domain;

import lombok.Data;
import javax.persistence.*;
import java.io.Serializable;
import java.util.List;

@Entity
@Data
public class SysPermission implements Serializable {
    @Id
    @GeneratedValue
    private Integer id;
    private String name;
    @Column(columnDefinition = \"enum(\'menu\',\'button\')\")
    private String resourceType;
    private String url;
    private String permission;
    private Long parentId;
    private String parentIds;
    private Boolean avaliable = Boolean.FALSE;
    @ManyToMany
    @JoinTable(name = \"SysRolePermission\",joinColumns = {@JoinColumn(name = \"permissionId\")},
            inverseJoinColumns = {@JoinColumn(name = \"roleId\")})
    private List<SysRole> rolesList;

}

  2.1.3 创建角色实体

  角色实体是管理员的角色,用于对管理员分组,并通过与权限表映射来确定管理员的权限,见以下代码:

package com.intehel.demo.domain;

import lombok.Data;
import javax.persistence.*;
import java.util.List;

@Entity
@Data
public class SysRole {
    @Id
    @GeneratedValue
    private Integer id;
    @Column(unique = true)
    private String role;
    private String description;
    private Boolean available = Boolean.FALSE;
    @ManyToMany(fetch = FetchType.EAGER)
    @JoinTable(name = \"SysRolePermission\",joinColumns = {@JoinColumn(name = \"roleId\")},
            inverseJoinColumns = {@JoinColumn(name = \"permissionId\")})
    private List<SysPermission> permissions;
    @ManyToMany
    @JoinTable(name = \"SysUserRole\",joinColumns = {@JoinColumn(name = \"roleId\")},
            inverseJoinColumns = {@JoinColumn(name = \"uid\")})
    private List<Admin> admins;
}

  2.2 进行权限配置

package com.intehel.demo.realm;

import com.intehel.demo.domain.Admin;
import com.intehel.demo.domain.SysPermission;
import com.intehel.demo.domain.SysRole;
import org.apache.shiro.authc.AuthenticationException;
import org.apache.shiro.authc.AuthenticationInfo;
import org.apache.shiro.authc.AuthenticationToken;
import org.apache.shiro.authc.SimpleAuthenticationInfo;
import org.apache.shiro.authz.AuthorizationInfo;
import org.apache.shiro.authz.SimpleAuthorizationInfo;
import org.apache.shiro.realm.AuthorizingRealm;
import org.apache.shiro.subject.PrincipalCollection;
import org.apache.shiro.util.ByteSource;

public class CustomerRealm extends AuthorizingRealm {
    @Override
    protected AuthorizationInfo doGetAuthorizationInfo(PrincipalCollection principalCollection) {
        SimpleAuthorizationInfo info = new SimpleAuthorizationInfo();
        Admin adminInfo = (Admin) principalCollection.getPrimaryPrincipal();
        for (SysRole role : adminInfo.getRolesList()) {
            info.addRole(role.getRole());
            for (SysPermission p:role.getPermissions()){
                info.addStringPermission(p.getPermission());
            }
        }
        return info;
    }

    @Override
    protected AuthenticationInfo doGetAuthenticationInfo(AuthenticationToken authenticationToken) throws AuthenticationException {
        String username = (String) authenticationToken.getPrincipal();
        System.out.println(authenticationToken.getCredentials());
        Admin adminInfo = new Admin();
        adminInfo.setUsername(\"long\");
        adminInfo.setPassword(\"longzhonghua\");
        adminInfo.setSalt(\"yan\");
        SimpleAuthenticationInfo info = new SimpleAuthenticationInfo(
                adminInfo,adminInfo.getPassword(),
                ByteSource.Util.bytes(adminInfo.getSalt()),
                getName()
        );
        return info;
    }
}

  2.3 将shiro注入到spring容器中

package com.intehel.demo.config;

import com.intehel.demo.realm.CustomerRealm;
import org.apache.shiro.spring.security.interceptor.AuthorizationAttributeSourceAdvisor;
import org.apache.shiro.spring.web.ShiroFilterFactoryBean;
import org.apache.shiro.web.mgt.DefaultWebSecurityManager;
import org.springframework.aop.framework.autoproxy.DefaultAdvisorAutoProxyCreator;
import org.springframework.boot.autoconfigure.condition.ConditionalOnMissingBean;
import org.springframework.context.annotation.Bean;
import org.springframework.context.annotation.Configuration;
import org.apache.shiro.mgt.SecurityManager;
import java.util.HashMap;
import java.util.Map;

@Configuration
public class ShiroConfig {

    @Bean
    @ConditionalOnMissingBean
    public DefaultAdvisorAutoProxyCreator defaultAdvisorAutoProxyCreator() {
        DefaultAdvisorAutoProxyCreator defaultAdvisorAutoProxyCreator = new DefaultAdvisorAutoProxyCreator();
        defaultAdvisorAutoProxyCreator.setProxyTargetClass(true);
        return  defaultAdvisorAutoProxyCreator;
    }

    // 将自己验证的方式加入到容器中
    @Bean
    public CustomerRealm customRealm() {
        CustomerRealm customRealm = new CustomerRealm();
        return customRealm;
    }

    //权限管理,配置主要是Realm的管理认证
    @Bean
    public SecurityManager securityManager() {
        DefaultWebSecurityManager  defaultSecurityManager = new DefaultWebSecurityManager ();
        defaultSecurityManager.setRealm(customRealm());
        return defaultSecurityManager;
    }
    @Bean
    public ShiroFilterFactoryBean shiroFilterFactoryBean(SecurityManager securityManager) {
        ShiroFilterFactoryBean shiroFilterFactoryBean = new ShiroFilterFactoryBean();
        shiroFilterFactoryBean.setSecurityManager(securityManager);
        Map<String,String> map = new HashMap<>();
        // 登出
        map.put(\"/logout\",\"logout\");
        // 对所有用户进行认证
        map.put(\"/**\",\"authc\");
        //登录
        shiroFilterFactoryBean.setLoginUrl(\"/login\");
        // 首页
        shiroFilterFactoryBean.setSuccessUrl(\"/index\");
        // 错误页面 认证不通过跳转
        shiroFilterFactoryBean.setUnauthorizedUrl(\"/error\");
        shiroFilterFactoryBean.setFilterChainDefinitionMap(map);
        return shiroFilterFactoryBean;
    }


    @Bean
    public AuthorizationAttributeSourceAdvisor authorizationAttributeSourceAdvisor(SecurityManager securityManager) {
        AuthorizationAttributeSourceAdvisor authorizationAttributeSourceAdvisor = new AuthorizationAttributeSourceAdvisor();
        authorizationAttributeSourceAdvisor.setSecurityManager(securityManager);
        return authorizationAttributeSourceAdvisor;
    }


}

  2.4 编写控制层

package com.intehel.demo.controller;
import com.intehel.demo.domain.Admin;
import lombok.extern.slf4j.Slf4j;
import org.apache.commons.lang3.StringUtils;
import org.apache.shiro.SecurityUtils;
import org.apache.shiro.authc.AuthenticationException;
import org.apache.shiro.authc.UnknownAccountException;
import org.apache.shiro.authc.UsernamePasswordToken;
import org.apache.shiro.authz.AuthorizationException;
import org.apache.shiro.authz.annotation.RequiresPermissions;
import org.apache.shiro.authz.annotation.RequiresRoles;
import org.apache.shiro.subject.Subject;
import org.springframework.web.bind.annotation.GetMapping;
import org.springframework.web.bind.annotation.RestController;

@RestController
@Slf4j
public class LoginController {

    @GetMapping(\"/login\")
    public String login(Admin user) {
        if(StringUtils.isEmpty(user.getUsername()) || StringUtils.isEmpty(user.getPassword())) {
            return \"请输入用户名和密码\";
        }

        // 用户认证信息
        Subject subject = SecurityUtils.getSubject();
        UsernamePasswordToken usernamePasswordToken = new UsernamePasswordToken(user.getUsername(),user.getPassword());
        try {
            // 进行验证,这里可以捕获异常,然后返回对应信息
            subject.login(usernamePasswordToken);
        }catch (UnknownAccountException e) {
            log.error(\"用户名不存在\",e);
            return \"用户名不存在\";
        } catch (AuthenticationException e) {
            log.error(\"账号或者密码错误!\",e);
            return \"账号或者密码错误!\";
        } catch (AuthorizationException e) {
            log.error(\"没有权限!\",e);
            return \"没有权限\";
        }
        return \"login success\";
    }


    @RequiresRoles(\"admin\")
    @GetMapping(\"/admin\")
    public String admin() {
        return \"admin Success!\";
    }

    @RequiresPermissions(\"query\")
    @GetMapping(\"/index\")
    public String index() {
        return \"index success\";
    }

    @RequiresPermissions(\"add\")
    @GetMapping(\"/add\")
    public String add() {
        return \"add success\";
    }

}

  2.5 测试权限

  (1)向sql中插入数据

INSERT INTO `admin` (`id`, `name`, `password`, `salt`, `state`, `username`) VALUES (1, \'管理员\', \'32baebda76498588dabf64c6e8984097\', \'yan\', 0, \'long\');
INSERT INTO `sys_permission` (`id`, `avaliable`, `name`, `parent_id`, `parent_ids`, `permission`, `resource_type`, `url`) VALUES (1, b\'0\', \'用户管理\', 0, \'0/\', \'admin:view\', \'menu\', \'admin/list\');
INSERT INTO `sys_permission` (`id`, `avaliable`, `name`, `parent_id`, `parent_ids`, `permission`, `resource_type`, `url`) VALUES (2, b\'0\', \'用户添加\', 1, \'0/1\', \'admin:add\', \'button\', \'admin/add\');
INSERT INTO `sys_permission` (`id`, `avaliable`, `name`, `parent_id`, `parent_ids`, `permission`, `resource_type`, `url`) VALUES (3, b\'0\', \'用户删除\', 1, \'0/1\', \'admin:del\', \'button\', \'admin/del\');
INSERT INTO `sys_role` (`id`, `available`, `description`, `role`) VALUES (1, b\'0\', \'管理员\', \'admin\');
INSERT INTO `sys_role_permission` (`role_id`, `permission_id`) VALUES (1, 1);
INSERT INTO `sys_role_permission` (`role_id`, `permission_id`) VALUES (1, 2);
INSERT INTO `sys_role_permission` (`role_id`, `permission_id`) VALUES (1, 3);
INSERT INTO `sys_user_role` (`role_id`, `uid`) VALUES (1, 1);

   (2)测试登录

  

  2.6  对比 Spring Security 与 Shiro

  (1)Shiro的特点

  • 功能强大,且简单、灵活。
  • 拥有易于理解的API。
  • 简单的身份认证(登录),支持多种数据源(LDAP、JDBC、Kerberos、ActiveDirectory等)。
  • 支持对角色的简单签权,并且支持细粒度的签权。
  • 支持一级缓存,以提升应用程序的性能。
  • 内置的基于POJO会话管理,适用于Web,以及非Web环境。
  • 不跟任何的框架或容器捆绑,可以独立运行。

  (2)Spring Security 的特点。

  • Shiro的功能它都有
  • 对防止CSRF跨站、XSS跨站脚本可以很好地实现,对Oauth、OpenlD也有支持。Shiro 则需要开发者自己手动实现
  • 因为Spring Security是Spring自己的产品,所以对Spring的支持极好,但也正是因为这个,所以仅仅支持自己的产品,导致其捆绑到了 Spring框架,而不支持其他框架。
  • Spring Security的权限细粒度更高(这不是绝对的,Shiro也可以实现)。

 


来源:https://www.cnblogs.com/liwenruo/p/16574110.html
本站部分图文来源于网络,如有侵权请联系删除。

未经允许不得转载:百木园 » shiro认证- SpringBoot(20)

相关推荐

  • 暂无文章