Spring Boot中引入Jpa和Shiro

Apache Shiro是一个强大且易用的Java安全框架,具有身份验证、授权、密码加密和会话管理功能。
三个核心组件:Subject, SecurityManager 和 Realms
Subject:主体,代表了当前用户,Subject也可以是第三方进程、后台帐户(Daemon Account)等。Subject代表了当前用户的安全操作,SecurityManager则管理所有用户的安全操作。
SecurityManager:安全管理器;Shiro框架的核心,典型的Facade模式,Shiro通过SecurityManager来管理内部组件实例,并通过它来提供安全管理的各种服务。
Realm:域,Shiro从从Realm获取安全数据(如用户、角色、权限),就是说当对用户执行认证(登录)和授权(访问控制)验证时,Shiro会从应用配置的Realm中查找用户及其权限信息。
本次使用了JPA框架的表关联查询,自定义模式可能更好。

1、配置

上篇已引入Jpa,本文不重复已有内容
pom.xml

<dependency>
	<groupId>org.apache.shiro</groupId>
	<artifactId>shiro-spring</artifactId>
	<version>1.4.0</version>
</dependency>

application.properties

#输出SQL语句 
spring.jpa.show-sql=true

ShiroConfig.java

@Configuration
public class ShiroConfig {
    @Bean
    //org.apache.shiro.mgt.SecurityManager
    public ShiroFilterFactoryBean shirFilter(SecurityManager securityManager) {
        System.out.println("ShiroConfiguration.shirFilter()");
        ShiroFilterFactoryBean shiroFilterFactoryBean = new ShiroFilterFactoryBean();
        shiroFilterFactoryBean.setSecurityManager(securityManager);
        //拦截器.
        Map<String,String> filterChainDefinitionMap = new LinkedHashMap<String,String>();
        // 配置不会被拦截的链接 顺序判断
        //authc:所有url都必须认证通过才可以访问; anon:所有url都都可以匿名访问
        filterChainDefinitionMap.put("/*.ico", "anon");
        //配置退出 过滤器,其中的具体的退出代码Shiro已经替我们实现了
        filterChainDefinitionMap.put("/logout", "logout");
        //过滤链定义,从上向下顺序执行,一般将/**放在最为下边,否则容易出现问题
        filterChainDefinitionMap.put("/**", "authc");
        // 如果不设置默认会自动寻找Web工程根目录下的"/login.jsp"页面
        shiroFilterFactoryBean.setLoginUrl("/login");
        // 登录成功后要跳转的链接
        shiroFilterFactoryBean.setSuccessUrl("/index");

        //未授权界面;
        shiroFilterFactoryBean.setUnauthorizedUrl("/403");
        shiroFilterFactoryBean.setFilterChainDefinitionMap(filterChainDefinitionMap);
        return shiroFilterFactoryBean;
    }

    /**
	 * 凭证匹配器
	 * (由于我们的密码校验交给Shiro的SimpleAuthenticationInfo进行处理了 )
	 * @return
	 */
	@Bean
	public HashedCredentialsMatcher hashedCredentialsMatcher(){
		HashedCredentialsMatcher hashedCredentialsMatcher = new HashedCredentialsMatcher();
		//散列算法:这里使用MD5算法;
		hashedCredentialsMatcher.setHashAlgorithmName("md5");
		//散列的次数,比如散列两次,相当于 md5(md5(""));
		hashedCredentialsMatcher.setHashIterations(1);
		return hashedCredentialsMatcher;
	}

	@Bean
	public MyShiroRealm myShiroRealm(){
		MyShiroRealm myShiroRealm = new MyShiroRealm();
		myShiroRealm.setCredentialsMatcher(hashedCredentialsMatcher());
		return myShiroRealm;
	}

	@Bean
	public SecurityManager securityManager(){
		DefaultWebSecurityManager securityManager =  new DefaultWebSecurityManager();
		//the realm to set for a single-realm application
		securityManager.setRealm(myShiroRealm());
		return securityManager;
	}

	/**
	 *  开启shiro aop注解支持.
	 *  使用代理方式;所以需要开启代码支持
	 *  加入注解的使用,不加入这个注解不生效
	 * @param securityManager
	 * @return
	 */
	@Bean
	public AuthorizationAttributeSourceAdvisor authorizationAttributeSourceAdvisor(SecurityManager sm){
		AuthorizationAttributeSourceAdvisor advisor = new AuthorizationAttributeSourceAdvisor();
		advisor.setSecurityManager(sm);
		return advisor;
	}

	@Bean(name="simpleMappingExceptionResolver")
	public SimpleMappingExceptionResolver createSimpleMappingExceptionResolver() {
		SimpleMappingExceptionResolver r = new SimpleMappingExceptionResolver();
		Properties mappings = new Properties();
		mappings.setProperty("DatabaseException", "databaseError");//数据库异常处理
		mappings.setProperty("UnauthorizedException","403");
		r.setExceptionMappings(mappings);  // None by default
		r.setDefaultErrorView("error");    // No default
		r.setExceptionAttribute("ex");     // Default is "exception"
		//r.setWarnLogCategory("example.MvcLogger");     // No default

		return r;
	}
}

MyShiroRealm.java

/**
 * 在认证、授权内部实现机制中都有提到,最终处理都将交给Realm进行处理。
 * 因为在Shiro中,最终是通过Realm来获取应用程序中的用户、角色及权限信息的。
 * 通常情况下,在Realm中会直接从我们的数据源中获取Shiro需要的验证信息。
 * Realm是专用于安全框架的DAO
 */
public class MyShiroRealm extends AuthorizingRealm {
	@Resource
	private JpaUserRepository userRepository;

	/**
	 * 授权,即权限验证
	 */
	@Override
	protected AuthorizationInfo doGetAuthorizationInfo(
			PrincipalCollection principals) {
		SimpleAuthorizationInfo authorizationInfo = new SimpleAuthorizationInfo();
		JpaUser userInfo = (JpaUser) principals.getPrimaryPrincipal();
		for(SysUserRole role:userInfo.getRoleList()){
			authorizationInfo.addRole(role.getRole_id()+"");
		}
		return authorizationInfo;
	}

	/**
	 * 认证过程:验证用户输入的账号和密码是否正确
	 * 1、检查提交的进行认证的令牌信息
	 * 2、根据令牌信息从数据源(通常为数据库)中获取用户信息 
	 * 3、对用户信息进行匹配验证
	 * 4、验证通过将返回一个封装了用户信息的AuthenticationInfo实例
	 * 5、验证失败则抛出AuthenticationException异常信息
	 */
	@Override
	public AuthenticationInfo doGetAuthenticationInfo(AuthenticationToken token)
			throws AuthenticationException {
		// 获取用户的输入的账号.
		String username = (String) token.getPrincipal();
		System.out.println("--AuthenticationInfo: "
				+ String.valueOf((char[]) token.getCredentials()));
		// 通过username从数据库中查找 User对象
		// Shiro有时间间隔机制,2分钟内不会重复执行该方法
		JpaUser userInfo = null;
		List<JpaUser> userInfoList = userRepository.findByUsername(username);
		if (userInfoList == null) {
			return null;
		} else if (userInfoList.size() <= 0) {
			return null;
		} else {
			userInfo = userInfoList.get(0);
		}

		SimpleAuthenticationInfo authenticationInfo = new SimpleAuthenticationInfo(
				userInfo, // 用户名
				userInfo.getPassword(), // 密码
				//salt=username+salt
				// ByteSource.Util.bytes(userInfo.getCredentialsSalt()),
				getName() // realm name
		);

		return authenticationInfo;
	}

}

2、业务模拟

JpaUser.java

@Entity
@Table(name = "user_info")
public class JpaUser{
	@Id
    private Integer id;
    private String name;
    private String username;
    private String password;
	private String salt;
	private String state;
	@OneToMany(cascade = CascadeType.ALL,fetch = FetchType.EAGER)
    @JoinColumn(name="u_id",referencedColumnName = "id")
    private List<SysUserRole> roleList;

    //get,set...
    
    /**
     * 密码盐
     * @return
     */
    public String getCredentialsSalt(){
        return this.username + this.salt;
    }
    
    public String toString() {
    	String roles = "";
    	if(roleList!=null){
    		for(SysUserRole role : roleList){
    			roles += role.getRole_id()+", ";
    		}
    	}
		return "The Entity is userName:"+username+",passWord:"
		+password+",id:"+id+"; roleid:"+roles;
	}
}

SysUserRole.java

@Entity
@Table(name = "sys_user_role")
public class SysUserRole {
	@Id
	private Integer id;
	@Column(name="role_id")
	private Long roleid;
	@Column(name="u_id")
	private Long uid;
    @ManyToOne
    @JoinColumn(name="u_id",insertable=false,updatable=false)
    private JpaUser jpaUser;
    get,set...	
}

UserController.java

@Controller
public class UserController {
	@Autowired
	// 自动从spring容器中加载userRepository
	private JpaUserRepository userRepository;
	
	@RequestMapping("/login")
	public String login(HttpServletRequest request, Map<String, Object> map)
			throws Exception {
        // 登录失败从request中获取shiro处理的异常信息。
        // shiroLoginFailure:就是shiro异常类的全类名.
        String exception = (String) request.getAttribute("shiroLoginFailure");
        System.out.println("-- shiroLoginFailure:" + exception);
        String msg = "";
        if (exception != null) {
            if (UnknownAccountException.class.getName().equals(exception)) {
                msg = "UnknownAccountException : 账号不存在";
            } else if (IncorrectCredentialsException.class.getName().equals(exception)) {
                msg = "IncorrectCredentialsException : 密码不正确";
            } else if ("kaptchaValidateFailed".equals(exception)) {
                msg = "kaptchaValidateFailed : 验证码错误";
            } else {
                msg = "exception: "+exception;
            }
        }
        map.put("msg", msg);
        // 此方法不处理登录成功,由shiro进行处理
        return "/login";
	}
}

login.html

<!DOCTYPE html>
<html lang="en" xmlns:th="http://www.thymeleaf.org">
<head>
    <meta charset="UTF-8">
    <title>用户登录-Login</title>
    <link rel="stylesheet" th:href="@{css/bootstrap.css}" />
</head>

<body>
错误信息:<h4 th:text="${msg}"></h4>
<div class="form-group">
	<div class="col-sm-2 control-label">
		<form action="" method="post">
		    <p>账号:<input type="text" name="username" value="admin"/></p>
		    <p>密码:<input type="text" name="password" value="123456"/></p>
		    <p><input type="submit" value="登录"/></p>
		</form>
	</div>
</div>
</body>
</html>

3、测试

浏览器地址录入内容http://cos6743:8081/login
login
login

猜你喜欢

转载自blog.csdn.net/weixin_44153121/article/details/86509720