IDEA整合Maven工具使用shiro进行权限管理

第一步:导入jar包

<!--shiro权限控制器-->
<dependency>
    <groupId>org.apache.shiro</groupId>
    <artifactId>shiro-core</artifactId>
    <version>1.2.2</version>
</dependency>
<dependency>
    <groupId>org.apache.shiro</groupId>
    <artifactId>shiro-web</artifactId>
    <version>1.2.2</version>
</dependency>
<dependency>
    <groupId>org.apache.shiro</groupId>
    <artifactId>shiro-ehcache</artifactId>
    <version>1.2.2</version>
</dependency>
<dependency>
    <groupId>org.apache.shiro</groupId>
    <artifactId>shiro-spring</artifactId>
    <version>1.2.2</version>
</dependency>
<dependency>
    <groupId>org.apache.shiro</groupId>
    <artifactId>shiro-quartz</artifactId>
    <version>1.2.2</version>
</dependency>

第二步:

配置shiro.xml(myRealm、CustomCredentialsMatcher需要自己实现)

myRealm 需要继承 AuthorizingRealm抽象类

CustomCredentialsMatcher 需要继承SimpleCredentialsMathcer类 实现doCredentialsMatcher方法

<beans xmlns:xsi="http://www.w3.org/2001/XMLSchema-instance"
       xmlns="http://www.springframework.org/schema/beans"
       xsi:schemaLocation="http://www.springframework.org/schema/beans
   http://www.springframework.org/schema/beans/spring-beans-4.0.xsd">

    <!-- 继承自AuthorizingRealm的自定义Realm,即指定Shiro验证用户登录 -->
    <bean id="myRealm" class="cn.attendance.common.security.MyRealm">
        <property name="credentialsMatcher" ref="passwordMatcher"/>
    </bean>
    <bean id="passwordMatcher" class="cn.attendance.common.security.CustomCredentialsMatcher"/>

    <!-- Shiro默认会使用Servlet容器的Session,可通过sessionMode属性来指定使用Shiro原生Session -->
    <!-- 即<property name="sessionMode" value="native"/>,详细说明见官方文档 -->
    <!-- 这里主要是设置自定义的单Realm应用,若有多个Realm,可使用'realms'属性代替 -->
    <bean id="securityManager" class="org.apache.shiro.web.mgt.DefaultWebSecurityManager">
        <property name="realm" ref="myRealm"/>
    </bean>

    <!-- Shiro主过滤器本身功能十分强大,其强大之处就在于它支持任何基于URL路径表达式的、自定义的过滤器的执行 -->
    <!-- Web应用中,Shiro可控制的Web请求必须经过Shiro主过滤器的拦截,Shiro对基于Spring的Web应用提供了完美的支持 -->
    <bean id="shiroFilter" class="org.apache.shiro.spring.web.ShiroFilterFactoryBean">
        <!-- Shiro的核心安全接口,这个属性是必须的 -->
        <property name="securityManager" ref="securityManager"/>
        <!-- 要求登录时的链接(可根据项目的URL进行替换),非必须的属性,默认会自动寻找Web工程根目录下的"/login.jsp"页面 -->
        <property name="loginUrl" value="/login"/>
        <!-- 登录成功后要跳转的连接(本例中此属性用不到,因为登录成功后的处理逻辑在LoginController里硬编码为main.jsp了) -->
        <!-- <property name="successUrl" value="/system/main"/> -->
        <!-- 用户访问未对其授权的资源时,所显示的连接 -->
        <!-- 若想更明显的测试此属性可以修改它的值,如unauthor.jsp,然后用[玄玉]登录后访问/admin/listUser.jsp就看见浏览器会显示unauthor.jsp -->
        <!--<property name="unauthorizedUrl" value="/error/403.html"/>-->
        <!-- Shiro连接约束配置,即过滤链的定义 -->
        <!-- 此处可配合我的这篇文章来理解各个过滤连的作用http://blog.csdn.net/jadyer/article/details/12172839 -->
        <!-- 下面value值的第一个'/'代表的路径是相对于HttpServletRequest.getContextPath()的值来的 -->
        <!-- anon:它对应的过滤器里面是空的,什么都没做,这里.do和.jsp后面的*表示参数,比方说login.jsp?main这种 -->
        <!-- authc:该过滤器下的页面必须验证后才能访问,它是Shiro内置的一个拦截器org.apache.shiro.web.filter.authc.FormAuthenticationFilter -->
        <property name="filterChainDefinitions">
            <value>
                /static/**=anon
                /login=anon
                <!--/user/userinfo=authc-->
                /user/userinfo=anon
            </value>
        </property>
    </bean>

    <!-- 保证实现了Shiro内部lifecycle函数的bean执行 -->
    <bean id="lifecycleBeanPostProcessor" class="org.apache.shiro.spring.LifecycleBeanPostProcessor"/>

</beans>

第三步:

整合spring框架

<!--引入权限管理-->
<import resource="spring-shiro.xml"/>

第四步:

扫描二维码关注公众号,回复: 1619095 查看本文章

整合spring-mvc框架

<!--开启切面编程自动代理-->
<aop:aspectj-autoproxy proxy-target-class="true"/>
<bean class="org.apache.shiro.spring.security.interceptor.AuthorizationAttributeSourceAdvisor">
    <property name="securityManager" ref="securityManager"/>
</bean>

第五步:

在web.xml中配置

 <filter>
    <filter-name>shiroFilter</filter-name>
    <filter-class>org.springframework.web.filter.DelegatingFilterProxy</filter-class>
    <async-supported>true</async-supported>
    <init-param>
      <!-- 该值缺省为false,表示生命周期由SpringApplicationContext管理,设置为true则表示由ServletContainer管理 -->
      <param-name>targetFilterLifecycle</param-name>
      <param-value>true</param-value>
    </init-param>
  </filter>
  <filter-mapping>
  <filter-name>shiroFilter</filter-name>
  <url-pattern>/*</url-pattern>
</filter-mapping>

 第六步 :

配置全局无权限跳转页面

<!--全局错误页面跳转-->
<bean class="org.springframework.web.servlet.handler.SimpleMappingExceptionResolver">
    <property name="exceptionMappings">
        <props>
            <!--无权限跳转后的页面-->
            <prop key="org.apache.shiro.authz.UnauthorizedException">403</prop>
        </props>
    </property>
</bean>


实例:

    1:认证:

(自定义的Realm需要继承AuthorizingRealm类并从写他的两个方法)(CustomerCredentialsMatcher继承SimpleCredentialsMathcer类并重写doCredentialsMatcher方法)

    (1)调用subject.login(Token) ->

    (2)Realm类中的AuthenticationInfo doGetAuthenticationInfo(AuthenticationToken token)方法 ->  

    (3)强转Token获取用户信息  ->

    (4)return Authentication对象  ->

   (5)自定义的认证方法CustomerCredentialsMatcher.doCredentialsMatcher方法

2:代码

myRealm:

protected AuthenticationInfo doGetAuthenticationInfo(AuthenticationToken token) throws AuthenticationException {
    UsernamePasswordToken usernamePasswordToken = (UsernamePasswordToken) token;
    String username = usernamePasswordToken.getUsername();
    User user = userService.findUserByUserName(username);
    if(user == null){
        return null;
    }else{
        AuthenticationInfo info = new SimpleAuthenticationInfo(user.getUsername(),user.getPassword(),getName());
        SecurityUtils.getSubject().getSession().setAttribute("userinfo",user);
        return info;
    }
}

CustomerCredentials:

public boolean doCredentialsMatch(AuthenticationToken token, AuthenticationInfo info) {
    try {
        UsernamePasswordToken usernamePasswordToken = (UsernamePasswordToken) token;
        String password = String.valueOf(usernamePasswordToken.getPassword());
        Object tokenCredentials = MD5Utils.encryptPassword(password);
        Object accountCredentials = getCredentials(info);
        return equals(tokenCredentials,accountCredentials);
    }catch (NoSuchAlgorithmException e) {
        e.printStackTrace();
    } catch (UnsupportedEncodingException e) {
        e.printStackTrace();
    }
    return false;
}

授权代码:

protected AuthorizationInfo doGetAuthorizationInfo(PrincipalCollection principalCollection) {

    String username = (String)principalCollection.getPrimaryPrincipal();
    User user = userService.findUserByUserName(username);
    SimpleAuthorizationInfo authorizationInfo = new SimpleAuthorizationInfo();
    for(Role role :user.getRoleList()){
        authorizationInfo.addRole(role.getRole());
        for(Permission permission :role.getPermissionList()){
            authorizationInfo.addStringPermission(permission.getPermission());
        }
    }
    return authorizationInfo;
}

猜你喜欢

转载自blog.csdn.net/qq_36957587/article/details/80719091