Spring整合Shiro做權限控制模塊詳細案例分析

jopen 8年前發布 | 131K 次閱讀 Spring Mono Shiro 安全相關

1.引入Shiro的Maven依賴

<!-- Spring 整合Shiro需要的依賴 -->

<dependency>
    <groupId>org.apache.shiro</groupId>
    <artifactId>shiro-core</artifactId>
    <version>1.2.1</version>
</dependency>
<dependency>
    <groupId>org.apache.shiro</groupId>
    <artifactId>shiro-web</artifactId>
    <version>1.2.1</version>
</dependency>
<dependency>
    <groupId>org.apache.shiro</groupId>
    <artifactId>shiro-ehcache</artifactId>
    <version>1.2.1</version>
</dependency>
<dependency>
    <groupId>org.apache.shiro</groupId>
    <artifactId>shiro-spring</artifactId>
    <version>1.2.1</version>
</dependency>
<!-- 除此之外還有一些東西也不可少spring, spring-mvc, ibatis等 spring.3.1.2 spring-mvc.3.1.2 
    ibatis.2.3.4 cglib.2.2 --></pre> <h2>2.web.xml中配置</h2>

<!-- 配置shiro的核心攔截器 -->
    <filter>  
        <filter-name>shiroFilter</filter-name>  
        <filter-class>org.springframework.web.filter.DelegatingFilterProxy</filter-class>  
    </filter>  
    <filter-mapping>  
        <filter-name>shiroFilter</filter-name>  
        <url-pattern>/*</url-pattern>  
    </filter-mapping>

3.    編寫自己的UserRealm類繼承自Realm,主要實現認證和授權的管理操作

package com.jay.demo.shiro;

import java.util.HashSet; import java.util.Iterator; import java.util.Set;

import org.apache.shiro.authc.AuthenticationException; import org.apache.shiro.authc.AuthenticationInfo; import org.apache.shiro.authc.AuthenticationToken; import org.apache.shiro.authc.LockedAccountException; import org.apache.shiro.authc.SimpleAuthenticationInfo; import org.apache.shiro.authc.UnknownAccountException; import org.apache.shiro.authz.AuthorizationInfo; import org.apache.shiro.authz.SimpleAuthorizationInfo; import org.apache.shiro.realm.AuthorizingRealm; import org.apache.shiro.subject.PrincipalCollection; import org.springframework.beans.factory.annotation.Autowired;

import com.jay.demo.bean.Permission; import com.jay.demo.bean.Role; import com.jay.demo.bean.User; import com.jay.demo.service.UserService;

public class UserRealm extends AuthorizingRealm{

@Autowired
private UserService userService;

/**
 * 授權操作
 */
@Override
protected AuthorizationInfo doGetAuthorizationInfo(PrincipalCollection principals) {

// String username = (String) getAvailablePrincipal(principals); String username = (String) principals.getPrimaryPrincipal();

    Set<Role> roleSet =  userService.findUserByUsername(username).getRoleSet();
    //角色名的集合
    Set<String> roles = new HashSet<String>();
    //權限名的集合
    Set<String> permissions = new HashSet<String>();

    Iterator<Role> it = roleSet.iterator();
    while(it.hasNext()){
        roles.add(it.next().getName());
        for(Permission per:it.next().getPermissionSet()){
            permissions.add(per.getName());
        }
    }


    SimpleAuthorizationInfo authorizationInfo = new SimpleAuthorizationInfo();

    authorizationInfo.addRoles(roles);
    authorizationInfo.addStringPermissions(permissions);


    return authorizationInfo;
}

/**
 * 身份驗證操作
 */
@Override
protected AuthenticationInfo doGetAuthenticationInfo(
        AuthenticationToken token) throws AuthenticationException {

    String username = (String) token.getPrincipal();
    User user = userService.findUserByUsername(username);

    if(user==null){
        //木有找到用戶
        throw new UnknownAccountException("沒有找到該賬號");
    }
    /* if(Boolean.TRUE.equals(user.getLocked())) {  
            throw new LockedAccountException(); //帳號鎖定  
        } */

    /**
     * 交給AuthenticatingRealm使用CredentialsMatcher進行密碼匹配,如果覺得人家的不好可以在此判斷或自定義實現  
     */
    SimpleAuthenticationInfo info = new SimpleAuthenticationInfo(user.getUsername(), user.getPassword(),getName());


    return info;
}

@Override
public String getName() {
    return getClass().getName();
}

}</pre>

4.在Spring的applicationContext.xml中進行Shiro的相關配置

1、添加shiroFilter定義 

Xml代碼 收藏代碼

  1. <!-- Shiro Filter -->   
  2. < bean   id = "shiroFilter"   class = "org.apache.shiro.spring.web.ShiroFilterFactoryBean" >   
  3.      < property   name = "securityManager"   ref = "securityManager"   />   
  4.      < property   name = "loginUrl"   value = "/login"   />   
  5.      < property   name = "successUrl"   value = "/user/list"   />   
  6.      < property   name = "unauthorizedUrl"   value = "/login"   />   
  7.      < property   name = "filterChainDefinitions" >   
  8.          < value >   
  9.             / login  =  anon   
  10.             /user/** = authc  
  11.             /role/edit/* = perms[role:edit]  
  12.             /role/ save  =  perms [role:edit]  
  13.             /role/ list  =  perms [role:view]  
  14.             /** = authc  
  15.          </ value >   
  16.      </ property >   
  17. </ bean >   
  18. </ol> </div>

    2、添加securityManager定義 

    Xml代碼 收藏代碼

    1. < bean   id = "securityManager"   class = "org.apache.shiro.web.mgt.DefaultWebSecurityManager" >   
    2.      < property   name = "realm"   ref = "myRealm"   />   
    3. </ bean >   
    4. </ol> </div>

      3、添加realm定義 

      Xml代碼 收藏代碼

      1. < bean   id = " myRealm"   class = "com.jay.demo.shiro.
        UserRealm<span class="attribute-value" style="font-size: 1em; font-family: Monaco, 'DejaVu Sans Mono', 'Bitstream Vera Sans Mono', Consolas, 'Courier New', monospace; background-color: rgb(250, 250, 250);">"</span><span style="color: black; font-size: 1em; font-family: Monaco, 'DejaVu Sans Mono', 'Bitstream Vera Sans Mono', Consolas, 'Courier New', monospace; background-color: rgb(250, 250, 250);"> </span><span class="tag" style="font-size: 1em; font-family: Monaco, 'DejaVu Sans Mono', 'Bitstream Vera Sans Mono', Consolas, 'Courier New', monospace; color: rgb(0, 102, 153); font-weight: bold; background-color: rgb(250, 250, 250);">/></span><span style="color: black; font-size: 1em; font-family: Monaco, 'DejaVu Sans Mono', 'Bitstream Vera Sans Mono', Consolas, 'Courier New', monospace; background-color: rgb(250, 250, 250);">  </span>
      2. </ol> </div>

        4、配置EhCache

        < bean   id = "cacheManager"   class = "org.apache.shiro.cache.ehcache.EhCacheManager"   />

        5、 保證實現了Shiro內部lifecycle函數的bean執行

        <bean id="lifecycleBeanPostProcessor" class="org.apache.shiro.spring.LifecycleBeanPostProcessor"/>

        特別注意:

        如果使用Shiro相關的注解,需要在springmvc-servlet.xml中配置一下信息

        <bean class="org.springframework.aop.framework.autoproxy.DefaultAdvisorAutoProxyCreator" depends-on="lifecycleBeanPostProcessor"/><bean class="org.apache.shiro.spring.security.interceptor.AuthorizationAttributeSourceAdvisor">
            <property name="securityManager" ref="securityManager"/></bean>

        備注:Shiro權限管理的過濾器解釋:

        默認過濾器(10個) 
        anon -- org.apache.shiro.web.filter.authc.AnonymousFilter
        authc -- org.apache.shiro.web.filter.authc.FormAuthenticationFilter
        authcBasic -- org.apache.shiro.web.filter.authc.BasicHttpAuthenticationFilter
        perms -- org.apache.shiro.web.filter.authz.PermissionsAuthorizationFilter
        port -- org.apache.shiro.web.filter.authz.PortFilter
        rest -- org.apache.shiro.web.filter.authz.HttpMethodPermissionFilter
        roles -- org.apache.shiro.web.filter.authz.RolesAuthorizationFilter
        ssl -- org.apache.shiro.web.filter.authz.SslFilter
        user -- org.apache.shiro.web.filter.authc.UserFilter
        logout -- org.apache.shiro.web.filter.authc.LogoutFilter

        anon:例子/admins/=anon 沒有參數,表示可以匿名使用。 authc:例如/admins/user/=authc表示需要認證(登錄)才能使用,沒有參數 roles:例子/admins/user/=roles[admin],參數可以寫多個,多個時必須加上引號,并且參數之間用逗號分割,當有多個參數時,例如admins/user/=roles["admin,guest"],每個參數通過才算通過,相當于hasAllRoles()方法。 perms:例子/admins/user/=perms[user:add:*],參數可以寫多個,多個時必須加上引號,并且參數之間用逗號分割,例如/admins/user/=perms["user:add:,user:modify:"],當有多個參數時必須每個參數都通過才通過,想當于isPermitedAll()方法。 rest:例子/admins/user/=rest[user],根據請求的方法,相當于/admins/user/=perms[user:method] ,其中method為post,get,delete等。 port:例子/admins/user/=port[8081],當請求的url的端口不是8081是跳轉到schemal://serverName:8081?queryString,其中schmal是協議http或https等,serverName是你訪問的host,8081是url配置里port的端口,queryString是你訪問的url里的?后面的參數。 authcBasic:例如/admins/user/=authcBasic沒有參數表示httpBasic認證 ssl:例子/admins/user/=ssl沒有參數,表示安全的url請求,協議為https user:例如/admins/user/=user沒有參數表示必須存在用戶,當登入操作時不做檢查</pre>

        關于Shiro的標簽應用:

        <shiro:authenticated> 登錄之后
        <shiro:notAuthenticated> 不在登錄狀態時
        <shiro:guest> 用戶在沒有RememberMe時
        <shiro:user> 用戶在RememberMe時
        <shiro:hasAnyRoles name="abc,123" > 在有abc或者123角色時
        <shiro:hasRole name="abc"> 擁有角色abc
        <shiro:lacksRole name="abc"> 沒有角色abc
        <shiro:hasPermission name="abc"> 擁有權限abc
        <shiro:lacksPermission name="abc"> 沒有權限abc
        <shiro:principal> 顯示用戶登錄名

        以上是Shiro的相關配置,出于安全的考慮,一般都會使用ACL(基于角色的用戶權限管理去控制用戶登錄后的權限)

        ACL詳細代碼案例如下:

        涉及到的表:3+2(User,Role,Permission  +  user-role,role-permission)

        3張實體表+2張關系表

        1.關于User類:

        package com.jay.demo.bean;

        import java.util.HashSet; import java.util.Set;

        public class User { private String id; private String username; private String password; private Set<Role> roleSet = new HashSet<Role>();

        public User() {
        }
        
        public String getId() {
            return id;
        }
        
        public void setId(String id) {
            this.id = id;
        }
        
        public String getUsername() {
            return username;
        }
        
        public void setUsername(String username) {
            this.username = username;
        }
        
        public String getPassword() {
            return password;
        }
        
        public void setPassword(String password) {
            this.password = password;
        }
        
        public Set<Role> getRoleSet() {
            return roleSet;
        }
        
        public void setRoleSet(Set<Role> roleSet) {
            this.roleSet = roleSet;
        }
        
        
        

        }</pre>

        2.關于Role表

        package com.jay.demo.bean;

        import java.io.Serializable; import java.util.HashSet; import java.util.Set;

        public class Role implements Serializable {

        private static final long serialVersionUID = -4987248128309954399L;
        
        private Integer id;
        private String name;
        private Set<Permission> permissionSet = new HashSet<Permission>();
        
        public Role() {
            super();
        }
        
        // --------------------------------------------------------------------------------
        
        @Override
        public int hashCode() {
            final int prime = 31;
            int result = 1;
            result = prime * result + ((id == null) ? 0 : id.hashCode());
            return result;
        }
        
        @Override
        public boolean equals(Object obj) {
            if (this == obj)
                return true;
            if (obj == null)
                return false;
            if (getClass() != obj.getClass())
                return false;
            Role other = (Role) obj;
            if (id == null) {
                if (other.id != null)
                    return false;
            } else if (!id.equals(other.id))
                return false;
            return true;
        }
        
        // --------------------------------------------------------------------------------
        
        public Integer getId() {
            return id;
        }
        
        public void setId(Integer id) {
            this.id = id;
        }
        
        public String getName() {
            return name;
        }
        
        public void setName(String name) {
            this.name = name;
        }
        
        public Set<Permission> getPermissionSet() {
            return permissionSet;
        }
        
        public void setPermissionSet(Set<Permission> permissionSet) {
            this.permissionSet = permissionSet;
        }
        
        

        }</pre>

        3.關于permission表

        <pre name="code" class="java">package com.jay.demo.bean;

        import java.io.Serializable;

        public class Permission implements Serializable {

        private static final long serialVersionUID = -8025597823572680802L;
        
        private Integer id;
        private String name;
        
        public Permission() {
            super();
        }
        
        // --------------------------------------------------------------------------------------
        
        @Override
        public int hashCode() {
            final int prime = 31;
            int result = 1;
            result = prime * result + ((id == null) ? 0 : id.hashCode());
            return result;
        }
        
        @Override
        public boolean equals(Object obj) {
            if (this == obj)
                return true;
            if (obj == null)
                return false;
            if (getClass() != obj.getClass())
                return false;
            Permission other = (Permission) obj;
            if (id == null) {
                if (other.id != null)
                    return false;
            } else if (!id.equals(other.id))
                return false;
            return true;
        }
        
        // --------------------------------------------------------------------------------------
        
        public Integer getId() {
            return id;
        }
        
        public void setId(Integer id) {
            this.id = id;
        }
        
        public String getName() {
            return name;
        }
        
        public void setName(String name) {
            this.name = name;
        }
        
        

        }</pre>

        4.dao層接口

        package com.jay.demo.dao;

        import com.jay.demo.bean.User;

        public interface UserDao {

        User findUserByUsername(String username); 
        

        }</pre>

        4.使用Mybatis完成的Dao層實現

        <?xml version="1.0" encoding="UTF-8" ?>
        <!DOCTYPE mapper PUBLIC "-//mybatis.org//DTD Mapper 3.0//EN" "
        
        
        </resultMap>
        
        
        
        
        <!--  通過User來查找Role   -->  
        <!-- <select id="selectRoleByUser" parameterType="int" resultMap="RoleMap">  
            select * from tbl_role_user user_id  = #{id}   
        </select>  
        
        
        <resultMap  id="roleMap" type="com.jay.demo.bean.User">
            <result property="id" column="ROLE_ID" />
            <result property="name" column="ROLE_NAME" />
        </resultMap>
        
        <resultMap id="permissionMap" type="com.jay.demo.bean.Permission">
            <result property="id" column="PERMISSION_ID" />
            <result property="name" column="PERMISSION_NAME" />
        </resultMap> -->
        
        
        
        

        <sql id="select-base-01">
        SELECT
        u.USER_ID,
        u.USER_USERNAME,
        u.USER_PASSWORD,
        r.ROLE_ID,
        r.ROLE_NAME,
        p.PERMISSION_ID,
        p.PERMISSION_NAME
        FROM
        tbl_user as u,
        tbl_role as r,
        tbl_permission as p,
        tbl_permission_role as pr,
        tbl_role_user as ru
        WHERE
        u.USER_ID = ru.USER_ID
        AND
        r.ROLE_ID = ru.ROLE_ID
        AND
        p.PERMISSION_ID = pr.PERMISSION_ID
        AND
        r.ROLE_ID = pr.ROLE_ID
        </sql>

        <select id="findUserByUsername" parameterType="string" resultMap="userMap">  
           <include refid="select-base-01" />  
            AND  
                u.USER_USERNAME = #{username}   
                <!-- select * from tbl_user u, tbl_role r, tbl_role_user tu 
                where u.user_id = tu.user_id and r.role_id = tu.role_id 
                and user_username=#{username} -->
        </select>
        
        

        </mapper></pre>

        說明:詳細代碼和demo見附件

        http://download.csdn.net/detail/he90227/7778689

        </div>

        來自: http://blog.csdn.net/he90227/article/details/38663553

        </span></span></span></span></span></span></span></span></span></span></span></span>

       本文由用戶 jopen 自行上傳分享,僅供網友學習交流。所有權歸原作者,若您的權利被侵害,請聯系管理員。
       轉載本站原創文章,請注明出處,并保留原始鏈接、圖片水印。
       本站是一個以用戶分享為主的開源技術平臺,歡迎各類分享!