Spring整合Shiro做权限控制模块详细案例分析

Posted mike-jp

tags:

篇首语:本文由小常识网(cha138.com)小编为大家整理,主要介绍了Spring整合Shiro做权限控制模块详细案例分析相关的知识,希望对你有一定的参考价值。

1.引入Shiro的Maven依赖

<!-- Spring 整合Shiro需要的依赖 -->
<dependency>
    <groupId>org.apache.shiro</groupId>
    <artifactId>shiro-core</artifactId>
    <version>1.2.1</version>
</dependency>
<dependency>
    <groupId>org.apache.shiro</groupId>
    <artifactId>shiro-web</artifactId>
    <version>1.2.1</version>
</dependency>
<dependency>
    <groupId>org.apache.shiro</groupId>
    <artifactId>shiro-ehcache</artifactId>
    <version>1.2.1</version>
</dependency>
<dependency>
    <groupId>org.apache.shiro</groupId>
    <artifactId>shiro-spring</artifactId>
    <version>1.2.1</version>
</dependency>


2.web.xml中配置

<!-- 配置shiro的核心拦截器 -->
<filter> 
    <filter-name>shiroFilter</filter-name> 
    <filter-class>org.springframework.web.filter.DelegatingFilterProxy</filter-class> 
</filter> 
<filter-mapping> 
    <filter-name>shiroFilter</filter-name> 
    <url-pattern>/*</url-pattern> 
</filter-mapping>


3.    编写自己的UserRealm类继承自Realm,主要实现认证和授权的管理操作

package com.jy.demo.shiro;

import java.util.HashSet;
import java.util.Iterator;
import java.util.Set;

import org.apache.shiro.authc.AuthenticationException;
import org.apache.shiro.authc.AuthenticationInfo;
import org.apache.shiro.authc.AuthenticationToken;
import org.apache.shiro.authc.LockedAccountException;
import org.apache.shiro.authc.SimpleAuthenticationInfo;
import org.apache.shiro.authc.UnknownAccountException;
import org.apache.shiro.authz.AuthorizationInfo;
import org.apache.shiro.authz.SimpleAuthorizationInfo;
import org.apache.shiro.realm.AuthorizingRealm;
import org.apache.shiro.subject.PrincipalCollection;
import org.springframework.beans.factory.annotation.Autowired;

import com.jy.demo.bean.Permission;
import com.jy.demo.bean.Role;
import com.jy.demo.bean.User;
import com.jy.demo.service.UserService;

public class UserRealm extends AuthorizingRealm

@Autowired
private UserService userService;

/**
* 授权操作
*/
@Override
protected AuthorizationInfo doGetAuthorizationInfo(PrincipalCollection principals) 
//    String username = (String) getAvailablePrincipal(principals);
String username = (String) principals.getPrimaryPrincipal();

Set<Role> roleSet = userService.findUserByUsername(username).getRoleSet();
//角色名的集合
Set<String> roles = new HashSet<String>();
//权限名的集合
Set<String> permissions = new HashSet<String>();

Iterator<Role> it = roleSet.iterator();
while(it.hasNext())
roles.add(it.next().getName());
for(Permission per:it.next().getPermissionSet())
permissions.add(per.getName());




SimpleAuthorizationInfo authorizationInfo = new SimpleAuthorizationInfo();

authorizationInfo.addRoles(roles);
authorizationInfo.addStringPermissions(permissions);


return authorizationInfo;


/**
* 身份验证操作
*/
@Override
protected AuthenticationInfo doGetAuthenticationInfo(
AuthenticationToken token) throws AuthenticationException 

String username = (String) token.getPrincipal();
User user = userService.findUserByUsername(username);

if(user==null)
//木有找到用户
throw new UnknownAccountException("没有找到该账号");

/* if(Boolean.TRUE.equals(user.getLocked()))  
throw new LockedAccountException(); //帐号锁定 
 */

/**
* 交给AuthenticatingRealm使用CredentialsMatcher进行密码匹配,如果觉得人家的不好可以在此判断或自定义实现 
*/
SimpleAuthenticationInfo info = new SimpleAuthenticationInfo(user.getUsername(), user.getPassword(),getName());


return info;


@Override
public String getName() 
return getClass().getName();



4.在Spring的applicationContext.xml中进行Shiro的相关配置
1、添加shiroFilter定义 

<!-- Shiro Filter --> 
< bean id = "shiroFilter" class = "org.apache.shiro.spring.web.ShiroFilterFactoryBean" > 
< property name = "securityManager" ref = "securityManager" /> 
< property name = "loginUrl" value = "/login" /> 
< property name = "successUrl" value = "/user/list" /> 
< property name = "unauthorizedUrl" value = "/login" /> 
< property name = "filterChainDefinitions" > 
< value > 
/ login = anon 
/user/** = authc 
/role/edit/* = perms[role:edit] 
/role/ save = perms [role:edit] 
/role/ list = perms [role:view] 
/** = authc 
</ value > 
</ property > 
</ bean >

 

2、添加securityManager定义 

< bean id = "securityManager" class = "org.apache.shiro.web.mgt.DefaultWebSecurityManager" > 
< property name = "realm" ref = "myRealm" /> 
</ bean >

 

3、添加realm定义 

 

4、配置EhCache

 

< bean id = "cacheManager" class ="org.apache.shiro.cache.ehcache.EhCacheManager" />


5、 保证实现了Shiro内部lifecycle函数的bean执行

<bean id="lifecycleBeanPostProcessor" class="org.apache.shiro.spring.LifecycleBeanPostProcessor"/>

 

特别注意:

如果使用Shiro相关的注解,需要在springmvc-servlet.xml中配置一下信息

<bean class="org.springframework.aop.framework.autoproxy.DefaultAdvisorAutoProxyCreator" depends-on="lifecycleBeanPostProcessor"/>
<bean class="org.apache.shiro.spring.security.interceptor.AuthorizationAttributeSourceAdvisor">
<property name="securityManager" ref="securityManager"/>
</bean>

 

备注:Shiro权限管理的过滤器解释:
默认过滤器(10个)

anon -- org.apache.shiro.web.filter.authc.AnonymousFilter
authc -- org.apache.shiro.web.filter.authc.FormAuthenticationFilter
authcBasic -- org.apache.shiro.web.filter.authc.BasicHttpAuthenticationFilter
perms -- org.apache.shiro.web.filter.authz.PermissionsAuthorizationFilter
port -- org.apache.shiro.web.filter.authz.PortFilter
rest -- org.apache.shiro.web.filter.authz.HttpMethodPermissionFilter
roles -- org.apache.shiro.web.filter.authz.RolesAuthorizationFilter
ssl -- org.apache.shiro.web.filter.authz.SslFilter
user -- org.apache.shiro.web.filter.authc.UserFilter
logout -- org.apache.shiro.web.filter.authc.LogoutFilter
anon:例子/admins/**=anon 没有参数,表示可以匿名使用。 
authc:例如/admins/user/**=authc表示需要认证(登录)才能使用,没有参数 
roles:例子/admins/user/**=roles[admin],参数可以写多个,多个时必须加上引号,并且参数之间用逗号分割,当有多个参数时,例如admins/user/**=roles["admin,guest"],每个参数通过才算通过,相当于hasAllRoles()方法。 
perms:例子/admins/user/**=perms[user:add:*],参数可以写多个,多个时必须加上引号,并且参数之间用逗号分割,例如/admins/user/**=perms["user:add:*,user:modify:*"],当有多个参数时必须每个参数都通过才通过,想当于isPermitedAll()方法。 
rest:例子/admins/user/**=rest[user],根据请求的方法,相当于/admins/user/**=perms[user:method] ,其中method为post,get,delete等。 
port:例子/admins/user/**=port[8081],当请求的url的端口不是8081是跳转到schemal://serverName:8081?queryString,其中schmal是协议http或https等,serverName是你访问的host,8081是url配置里port的端口,queryString是你访问的url里的?后面的参数。 
authcBasic:例如/admins/user/**=authcBasic没有参数表示httpBasic认证 
ssl:例子/admins/user/**=ssl没有参数,表示安全的url请求,协议为https 
user:例如/admins/user/**=user没有参数表示必须存在用户,当登入操作时不做检查

 

关于Shiro的标签应用:

<shiro:authenticated> 登录之后
<shiro:notAuthenticated> 不在登录状态时
<shiro:guest> 用户在没有RememberMe时
<shiro:user> 用户在RememberMe时
<shiro:hasAnyRoles name="abc,123" > 在有abc或者123角色时
<shiro:hasRole name="abc"> 拥有角色abc
<shiro:lacksRole name="abc"> 没有角色abc
<shiro:hasPermission name="abc"> 拥有权限abc
<shiro:lacksPermission name="abc"> 没有权限abc
<shiro:principal> 显示用户登录名

 

以上是Shiro的相关配置,出于安全的考虑,一般都会使用ACL(基于角色的用户权限管理去控制用户登录后的权限)

ACL详细代码案例如下:

涉及到的表:3+2(User,Role,Permission  +  user-role,role-permission)

3张实体表+2张关系表

1.关于User类:

package com.jy.demo.bean;

import java.util.HashSet;
import java.util.Set;

public class User 
private String id;
private String username;
private String password;
private Set<Role> roleSet = new HashSet<Role>();

public User() 


public String getId() 
return id;


public void setId(String id) 
this.id = id;


public String getUsername() 
return username;


public void setUsername(String username) 
this.username = username;


public String getPassword() 
return password;


public void setPassword(String password) 
this.password = password;


public Set<Role> getRoleSet() 
return roleSet;


public void setRoleSet(Set<Role> roleSet) 
this.roleSet = roleSet;



 


2.关于Role表

package com.jy.demo.bean;

import java.io.Serializable;
import java.util.HashSet;
import java.util.Set;

public class Role implements Serializable 

private static final long serialVersionUID = -4987248128309954399L;

private Integer id;
private String name;
private Set<Permission> permissionSet = new HashSet<Permission>();

public Role() 
super();



// --------------------------------------------------------------------------------

@Override
public int hashCode()
final int prime = 31;
int result = 1;
result = prime * result + ((id == null) ? 0 : id.hashCode());
return result;


@Override
public boolean equals(Object obj)
if (this == obj)
return true;
if (obj == null)
return false;
if (getClass() != obj.getClass())
return false;
Role other = (Role) obj;
if (id == null)
if (other.id != null)
return false;
else if (!id.equals(other.id))
return false;
return true;


// --------------------------------------------------------------------------------

public Integer getId()
return id;


public void setId(Integer id)
this.id = id;


public String getName()
return name;


public void setName(String name)
this.name = name;


public Set<Permission> getPermissionSet()
return permissionSet;


public void setPermissionSet(Set<Permission> permissionSet)
this.permissionSet = permissionSet;



 

3.关于permission表

package com.jy.demo.bean;

import java.io.Serializable;

public class Permission implements Serializable 

private static final long serialVersionUID = -8025597823572680802L;

private Integer id;
private String name;

public Permission() 
super();


// --------------------------------------------------------------------------------------

@Override
public int hashCode() 
final int prime = 31;
int result = 1;
result = prime * result + ((id == null) ? 0 : id.hashCode());
return result;


@Override
public boolean equals(Object obj) 
if (this == obj)
return true;
if (obj == null)
return false;
if (getClass() != obj.getClass())
return false;
Permission other = (Permission) obj;
if (id == null) 
if (other.id != null)
return false;
 else if (!id.equals(other.id))
return false;
return true;


// --------------------------------------------------------------------------------------

public Integer getId() 
return id;


public void setId(Integer id) 
this.id = id;


public String getName() 
return name;


public void setName(String name) 
this.name = name;


 

4.dao层接口

package com.jy.demo.dao;

import com.jay.demo.bean.User;

public interface UserDao 

User findUserByUsername(String username); 

 

4.使用Mybatis完成的Dao层实现

<?xml version="1.0" encoding="UTF-8" ?>
<!DOCTYPE mapper PUBLIC "-//mybatis.org//DTD Mapper 3.0//EN" "http://mybatis.org/dtd/mybatis-3-mapper.dtd" >
<mapper namespace="com.jay.demo.dao.UserDao">
<resultMap id="userMap" type="com.jay.demo.bean.User">
<id property="id" column="USER_ID"/>
<result property="username" column="USER_USERNAME"/>
<result property="password" column="USER_PASSWORD"/>
<!-- 进行 多表关联插叙,先关联user和role -->
<collection property="roleSet" column="roleid" ofType="com.jay.demo.bean.Role">
<id property="id" column="ROLE_ID"/>
<result property="name" column="ROLE_NAME"/>
<!-- 再在role中关联role和permission -->
<collection property="permissionSet" column="permissionid" ofType="com.jay.demo.bean.Permission">
<id property="id" column="permission_id"/>
<result property="name" column="permission_name"/>
</collection>
</collection>

</resultMap>




<!-- 通过User来查找Role --> 
<!-- <select id="selectRoleByUser" parameterType="int" resultMap="RoleMap"> 
select * from tbl_role_user user_id = #id 
</select> 

<resultMap id="roleMap" type="com.jay.demo.bean.User">
<result property="id" column="ROLE_ID" />
<result property="name" column="ROLE_NAME" />
</resultMap>

<resultMap id="permissionMap" type="com.jay.demo.bean.Permission">
<result property="id" column="PERMISSION_ID" />
<result property="name" column="PERMISSION_NAME" />
</resultMap> -->



<sql id="select-base-01"> 
SELECT 
u.USER_ID, 
u.USER_USERNAME, 
u.USER_PASSWORD, 
r.ROLE_ID, 
r.ROLE_NAME, 
p.PERMISSION_ID, 
p.PERMISSION_NAME 
FROM 
tbl_user as u, 
tbl_role as r, 
tbl_permission as p, 
tbl_permission_role as pr, 
tbl_role_user as ru 
WHERE 
u.USER_ID = ru.USER_ID 
AND 
r.ROLE_ID = ru.ROLE_ID 
AND 
p.PERMISSION_ID = pr.PERMISSION_ID 
AND 
r.ROLE_ID = pr.ROLE_ID 
</sql> 

<select id="findUserByUsername" parameterType="string" resultMap="userMap"> 
<include refid="select-base-01" /> 
AND 
u.USER_USERNAME = #username    
<!-- select * from tbl_user u, tbl_role r, tbl_role_user tu 
where u.user_id = tu.user_id and r.role_id = tu.role_id 
and user_username=#username -->
</select>

</mapper>

---------------------
版权声明:本文为CSDN博主「Joker_Ye」的原创文章,遵循CC 4.0 by-sa版权协议,转载请附上原文出处链接及本声明。
原文链接:https://blog.csdn.net/hj7jay/article/details/51752544

以上是关于Spring整合Shiro做权限控制模块详细案例分析的主要内容,如果未能解决你的问题,请参考以下文章

spring mvc整合shiro无法访问控制器是啥问题

spring整合shiro框架

Spring Boot 整合 Shiro 实现登录认证与权限控制

shiro权限控制:shiro介绍以及整合SSM框架

spring boot 整合 shiro 权限框架

Spring Boot 整合 Shiro ,两种方式全总结