什么是shiro?
- Apache Shiro是一个Java 的
安全(权限)框架
。 - 主要功能为:用户认证、访问控制、支持会话、单点登录、记住我功能
核心内容
- Authentication:身份认证、登录,验证用户是否拥有响应的身份。
- Authorization:授权,也就是权限认证,验证已经认证的用户身份权限,判断用户可以进行哪些操作。
- Session Manager:会话管理,在用户未退出前,所有的信息都在会话中。
- Cryptography:加密,保护数据的安全性,如密码加密存储到数据库。
- Web Support:web支持,使得非常容易集成到web环境。
- Caching:缓存,比如用户登录后的用户信息、拥有的角色、权限,提高效率。
- Concurrency:Shiro支持多线程应用的并发验证,也就是在一个线程中开启另一个线程,能把权限自动传播过去。
- Testing:提供测试支持。
- RunAs:允许一个用户作为另一个用户(如果允许)的身份进行访问。
- Remember Me:记住我功能。
详细架构图
从外部来看
-
Subject:代码直接交互对象是subject,代表当前用户。
-
SecurityManager:安全管理器,管理着所有的subject。
-
Realm:Shiro从Realm获取安全数据 (如用户,角色,权限),比较像database。
从内部来看
- Subject:当前与应用交互的实体。
- Security Manager:是Shiro API中的核心组件,管理所有的Subject,并且负责进行认证,授权,会话,以及缓存的管理。
- Authenticator:认证器,负责Subject认证。
- Authorizer:授权器,权限访问控制,负责确定用户在系统中对哪些资源拥有访问权限。
- SessionManager:管理Session,用于创建和管理用户会话。
- SessionDAO:负责Session会话的持久化。
- CacheManager:缓存管理器,负责创建和管理cache实例的生命周期。
- Cryptography:加密支持,Shiro提供了一些常见的加密组件用于密码加密,解密等。
- Realms:领域,充当一个连通Shiro和用户自己安全数据源的桥梁。
登录时身份认证逻辑
login(username,password) {
1. 参数非空校验
2. 判断username是否存在,存在则获取该用户的所有信息,包括salt值
3. 判断密码是否正确
1. 对password进行加密,使用salt,采用和添加用户时相同的算法进行加密
2. 将加密后的密钥与user对象中的密码进行比对
}
使用shiro框架的逻辑过程
快速入门
按照官网10min入门教程。
一、创建项目
创建一个新项目,命名为shiro_login。
二、导入依赖
进入github复制pom.xml中的依赖。
https://github.com/apache/shiro/blob/main/samples/quickstart/pom.xml
<dependencies>
<dependency>
<groupId>org.apache.shiro</groupId>
<artifactId>shiro-core</artifactId>
<version>1.4.1</version>
</dependency>
<!-- configure logging -->
<dependency>
<groupId>org.slf4j</groupId>
<artifactId>jcl-over-slf4j</artifactId>
<version>1.7.21</version>
</dependency>
<dependency>
<groupId>org.slf4j</groupId>
<artifactId>slf4j-log4j12</artifactId>
<version>1.7.21</version>
</dependency>
<dependency>
<groupId>log4j</groupId>
<artifactId>log4j</artifactId>
<version>1.2.17</version>
</dependency>
</dependencies>
三、创建shiro.ini
文件
log4j.properties
log4j.rootLogger=INFO, stdout
log4j.appender.stdout=org.apache.log4j.ConsoleAppender
log4j.appender.stdout.layout=org.apache.log4j.PatternLayout
log4j.appender.stdout.layout.ConversionPattern=%d %p [%c] - %m %n
# General Apache libraries
log4j.logger.org.apache=WARN
# Spring
log4j.logger.org.springframework=WARN
# Default Shiro logging
log4j.logger.org.apache.shiro=INFO
# Disable verbose logging
log4j.logger.org.apache.shiro.util.ThreadContext=WARN
log4j.logger.org.apache.shiro.cache.ehcache.EhCache=WARN
shiro.ini
[users]
# user 'root' with password 'secret' and the 'admin' role
root = secret, admin
# user 'guest' with the password 'guest' and the 'guest' role
guest = guest, guest
# user 'presidentskroob' with password '12345' ("That's the same combination on
# my luggage!!!" ;)), and role 'president'
presidentskroob = 12345, president
# user 'darkhelmet' with password 'ludicrousspeed' and roles 'darklord' and 'schwartz'
darkhelmet = ludicrousspeed, darklord, schwartz
# user 'lonestarr' with password 'vespa' and roles 'goodguy' and 'schwartz'
lonestarr = vespa, goodguy, schwartz
# -----------------------------------------------------------------------------
# Roles with assigned permissions
#
# Each line conforms to the format defined in the
# org.apache.shiro.realm.text.TextConfigurationRealm#setRoleDefinitions JavaDoc
# -----------------------------------------------------------------------------
[roles]
# 'admin' role has all permissions, indicated by the wildcard '*'
admin = *
# The 'schwartz' role can do anything (*) with any lightsaber:
schwartz = lightsaber:*
# The 'goodguy' role is allowed to 'drive' (action) the winnebago (type) with
# license plate 'eagle5' (instance specific id)
goodguy = winnebago:drive:eagle5
四、编写java代码
Quickstart.java
public class Quickstart {
// 开启日志
private static final transient Logger log = LoggerFactory.getLogger(Quickstart.class);
public static void main() {
// 使用工厂模式加载配置文件,获取工厂对象
Factory<SecurityManager> factory = new IniSecurityManagerFactory("classpath:shiro.ini");
// 使用工厂获取securityManager接口对象
SecurityManager securityManager = factory.getInstance();
// 给SecurityUtils设置管理器
SecurityUtils.setSecurityManager(securityManager);
// 获取当前用户对象 Subject
Subject currentUser = SecurityUtils.getSubject();
// 通过用户获取session
Session session = currentUser.getSession();
// 给session设置属性,键值对形式
session.setAttribute("someKey", "aValue");
// 获取session中的属性值
String value = (String) session.getAttribute("someKey");
// if判断,打印日志
if (value.equals("aValue")) {
log.info("Retrieved the correct value! [" + value + "]");
}
// 判断当前用户是否被认证
if (!currentUser.isAuthenticated()) {
// 通过UsernamePasswordToken生成令牌,正常业务是需要从Realm中读取正确的user信息
UsernamePasswordToken token = new UsernamePasswordToken("lonestarr", "vespa");
// 设置记住我
token.setRememberMe(true);
try {
// 执行登录操作
currentUser.login(token);
} catch (UnknownAccountException uae) {
log.info("There is no user with username of " + token.getPrincipal());
} catch (IncorrectCredentialsException ice) {
log.info("Password for account " + token.getPrincipal() + " was incorrect!");
} catch (LockedAccountException lae) {
log.info("The account for username " + token.getPrincipal() + " is locked. " +
"Please contact your administrator to unlock it.");
}
// ... catch more exceptions here (maybe custom ones specific to your application?
catch (AuthenticationException ae) {
//unexpected condition? error?
}
}
// if判断当前用户的角色
if (currentUser.hasRole("schwartz")) {
log.info("May the Schwartz be with you!");
} else {
log.info("Hello, mere mortal.");
}
// if判断当前用户的是否被允许操作(权限)
if (currentUser.isPermitted("lightsaber:wield")) {
log.info("You may use a lightsaber ring. Use it wisely.");
} else {
log.info("Sorry, lightsaber rings are for schwartz masters only.");
}
// 注销
currentUser.logout();
// 结束
System.exit(0);
}
}
SpringBoot整合Shiro
一、创建项目
二、导入依赖
<!--shiro-->
<dependency>
<groupId>org.apache.shiro</groupId>
<artifactId>shiro-spring</artifactId>
<version>1.4.1</version>
</dependency>
三、三大组件配置
ShiroFilterFactoryBean ==》 Subject
DefaultWebSecurityManager ==》 SecurityManager
创建realm对象 ==》 realm
Realm需要继承AuthorizingRealm
UserRealm.java
// 自定义的Realm需要继承AuthorizingRealm,并重写方法
public class UserRealm extends AuthorizingRealm {
// 授权
@Override
protected AuthorizationInfo doGetAuthorizationInfo(PrincipalCollection principalCollection) {
System.out.println("执行了=》授权doGetAuthorizationInfo");
return null;
}
// 认证
@Override
protected AuthenticationInfo doGetAuthenticationInfo(AuthenticationToken authenticationToken) throws AuthenticationException {
System.out.println("执行了=>认证doGetAuthenticationInfo");
return null;
}
}
ShiroConfig.java
package cn.ordshine.config;
import org.apache.shiro.spring.web.ShiroFilterFactoryBean;
import org.apache.shiro.web.mgt.DefaultWebSecurityManager;
import org.springframework.beans.factory.annotation.Qualifier;
import org.springframework.context.annotation.Bean;
import org.springframework.context.annotation.Configuration;
import java.util.LinkedHashMap;
import java.util.Map;
/**
* @author: Ordshine
* @date: 2023 - 06
* @description:
* @version: 1.0
*/
@Configuration
public class ShiroConfig {
// ShiroFilterFactoryBean
@Bean
public ShiroFilterFactoryBean getShiroFilterFactoryBean(@Qualifier("securityManager") DefaultWebSecurityManager securityManager) {
ShiroFilterFactoryBean bean = new ShiroFilterFactoryBean();
// 设置安全管理器
bean.setSecurityManager(securityManager);
// 添加shiro的内置过滤器
/*
anon: 无需认证就可以访问
authc: 必须认证才可以访问
user: 必须拥有记住我功能才可以使用
perms: 拥有对某个资源的权限才能访问
role: 拥有某个角色权限才能访问
*/
Map<String, String> filterMap = new LinkedHashMap<>();
filterMap.put("/user/add", "user");
filterMap.put("/user/update", "user");
bean.setFilterChainDefinitionMap(filterMap);
// 设置登录的请求
bean.setLoginUrl("/toLogin");
return bean;
}
// DefaultWebSecurityManager
@Bean(name="securityManager")
public DefaultWebSecurityManager getDefaultWebSecurityManager(@Qualifier("userRealm") UserRealm userRealm) {
DefaultWebSecurityManager securityManager = new DefaultWebSecurityManager();
// 关联UserRealm
securityManager.setRealm(userRealm);
return securityManager;
}
// 创建realm对象
@Bean
public UserRealm userRealm() {
return new UserRealm();
}
}
四、实现用户认证
登录接口
@RequestMapping("/login")
public String login(String username, String password, Model model) {
// 获取当前用户
Subject subject = SecurityUtils.getSubject();
// 封装用户的登录数据
UsernamePasswordToken token = new UsernamePasswordToken(username, password);
// 登录
try {
subject.login(token);
return "index";
} catch (UnknownAccountException e) {
model.addAttribute("msg", "用户名错误");
return "login";
} catch (IncorrectCredentialsException e) {
model.addAttribute("msg", "密码错误");
return "login";
}
}
realm认证方法
// 认证
@Override
protected AuthenticationInfo doGetAuthenticationInfo(AuthenticationToken token) throws AuthenticationException {
System.out.println("执行了=>认证doGetAuthenticationInfo");
// 判断用户名,密码
String name = "root";
String password = "123456";
UsernamePasswordToken userToken = (UsernamePasswordToken) token;
// 用户名认证
if (!userToken.getUsername().equals(name)) {
return null; // 抛出异常 UnknownAccountException
}
// 密码认证,shiro自动验证
return new SimpleAuthenticationInfo("",password,"");
}
五、整合MyBatis和Druid
创建表
CREATE TABLE `user` (
`id` int(20) NOT NULL AUTO_INCREMENT,
`username` varchar(30) DEFAULT NULL,
`password` varchar(30) DEFAULT NULL,
`perms` varchar(50) DEFAULT NULL,
PRIMARY KEY (`id`)
) ENGINE=MyISAM DEFAULT CHARSET=utf8;
导入依赖
<!--Log4j-->
<dependency>
<groupId>log4j</groupId>
<artifactId>log4j</artifactId>
<version>1.2.17</version>
</dependency>
<!--mysql驱动-->
<dependency>
<groupId>mysql</groupId>
<artifactId>mysql-connector-java</artifactId>
</dependency>
<!--Druid驱动-->
<dependency>
<groupId>com.alibaba</groupId>
<artifactId>druid</artifactId>
<version>1.2.9</version>
</dependency>
<!--引入mybatis, 则是MyBatis官方提供的适配Spring Boot的jar包-->
<dependency>
<groupId>org.mybatis.spring.boot</groupId>
<artifactId>mybatis-spring-boot-starter</artifactId>
<version>2.2.2</version>
</dependency>
配置数据库信息
application.yml
server:
port: 8080
# 运行环境
profiles:
active: dev
# active: prod
# active: test
# 数据库
datasource:
driver-class-name: com.mysql.jdbc.Driver
password: root
username: root
url: jdbc:mysql://localhost:3306/shiro_test #?serverTimezone=UTC&useUnicode=true&charcterEncoding=UTF-8
type: com.alibaba.druid.pool.DruidDataSource
#Spring Boot 默认是不注入这些属性值的,需要自己绑定
#druid 数据源专有配置
initialSize: 5
minIdle: 5
maxActive: 20
maxWait: 60000
timeBetweenEvictionRunsMillis: 60000
minEvictableIdleTimeMillis: 300000
validationQuery: SELECT 1 FROM DUAL
testWhileIdle: true
testOnBorrow: false
testOnReturn: false
poolPreparedStatements: true
#配置监控统计拦截的filters,stat:监控统计、log4j:日志记录、wall:防御sql注入
#如果允许时报错 java.lang.ClassNotFoundException: org.apache.log4j.Priority
#则导入 log4j 依赖即可,Maven 地址:https://mvnrepository.com/artifact/log4j/log4j
filters: stat,wall,log4j
maxPoolPreparedStatementPerConnectionSize: 20
useGlobalDataSourceStat: true
connectionProperties: druid.stat.mergeSql=true;druid.stat.slowSqlMillis=500
User.java
package cn.ordshine.pojo;
import lombok.AllArgsConstructor;
import lombok.Data;
import lombok.NoArgsConstructor;
/**
* @author: Ordshine
* @date: 2023 - 06
* @description:
* @version: 1.0
*/
@Data
@AllArgsConstructor
@NoArgsConstructor
public class User {
private int id;
private String username;
private String password;
private String perms;
}
UserMapper.java
package cn.ordshine.mapper;
import cn.ordshine.pojo.User;
import org.apache.ibatis.annotations.Mapper;
import org.apache.ibatis.annotations.Select;
/**
* @author: Ordshine
* @date: 2023 - 06
* @description:
* @version: 1.0
*/
@Mapper
public interface UserMapper {
@Select("select * from user where username = #{username}")
public User queryUserByName(String username);
}
UserService.java
package cn.ordshine.service;
import cn.ordshine.pojo.User;
/**
* @author: Ordshine
* @date: 2023 - 06
* @description:
* @version: 1.0
*/
public interface UserService {
public User queryUserByName(String username);
}
UserServiceImpl.java
package cn.ordshine.service;
import cn.ordshine.mapper.UserMapper;
import cn.ordshine.pojo.User;
import org.springframework.beans.factory.annotation.Autowired;
import org.springframework.stereotype.Service;
/**
* @author: Ordshine
* @date: 2023 - 06
* @description:
* @version: 1.0
*/
@Service
public class UserServiceImpl implements UserService {
@Autowired
UserMapper userMapper;
@Override
public User queryUserByName(String username) {
return userMapper.queryUserByName(username);
}
}
UserRelam.java
package cn.ordshine.config;
import cn.ordshine.pojo.User;
import cn.ordshine.service.UserService;
import org.apache.shiro.authc.*;
import org.apache.shiro.authz.AuthorizationInfo;
import org.apache.shiro.realm.AuthorizingRealm;
import org.apache.shiro.subject.PrincipalCollection;
import org.springframework.beans.factory.annotation.Autowired;
/**
* @author: Ordshine
* @date: 2023 - 06
* @description:
* @version: 1.0
*/
// 自定义的Realm需要继承AuthorizingRealm
public class UserRealm extends AuthorizingRealm {
@Autowired
UserService userService;
// 授权
@Override
protected AuthorizationInfo doGetAuthorizationInfo(PrincipalCollection principalCollection) {
System.out.println("执行了=》授权doGetAuthorizationInfo");
return null;
}
// 认证
@Override
protected AuthenticationInfo doGetAuthenticationInfo(AuthenticationToken token) throws AuthenticationException {
System.out.println("执行了=>认证doGetAuthenticationInfo");
// 判断用户名,密码
// String username = "root";
// String password = "123456";
UsernamePasswordToken userToken = (UsernamePasswordToken) token;
// 连接数据库获取用户信息
User user = userService.queryUserByName(userToken.getUsername());
// 用户名认证
if (user == null) {
return null; // 抛出异常 UnknownAccountException
}
// 密码认证,shiro自动验证
return new SimpleAuthenticationInfo("",user.getPassword(),"");
}
}
请求授权实现
授权
数据库中应当添加表示用户权限的字段,如perms字段。
保存格式例如:user:add,update 表示user用户具有add和update权限
ShiroConfig.java
增加拦截,设置访问权限。
// 拦截请求
Map<String, String> filterMap = new LinkedHashMap<>();
// 授权,只有user用户可以进入add页面, 授权是在认证之后的拦截
filterMap.put("/user/add", "perms[user:add]");
filterMap.put("/user/update", "perms[user:update]");
UserRealm.java
在授权方法中,对用户进行授权。
通过SimpleAuthorizationInfo获取info对象,并根据当前用户拥有权限进行设置。
// 授权
@Override
protected AuthorizationInfo doGetAuthorizationInfo(PrincipalCollection principalCollection) {
System.out.println("执行了=》授权doGetAuthorizationInfo");
// SimpleAuthorizationInfo
SimpleAuthorizationInfo info = new SimpleAuthorizationInfo();
// 从认证方法中获取用户信息
Subject subject = SecurityUtils.getSubject();
User user = (User) subject.getPrincipal();
System.out.println(user);
// 设置当前用户的权限
info.addStringPermission(user.getPerms());
// 设置授权需要return info
return info;
}
// 这里是认证方法的返回值,返回user对象存到principal(身份)
return new SimpleAuthenticationInfo(user,user.getPassword(),"");
登出操作
UserController.java
// 退出登录
@RequestMapping("/logOut")
public String logout() {
// 获取当前用户的 Subject
Subject currentUser = SecurityUtils.getSubject();
// 调用 Subject 的 logout 方法执行登出操作
currentUser.logout();
return "login";
}
整合Thymeleaf
目的
实现前端根据用户具有的权限对功能进行隐藏。
导入依赖
<!--shiro整合Thymeleaf-->
<dependency>
<groupId>com.github.theborakompanioni</groupId>
<artifactId>thymeleaf-extras-shiro</artifactId>
<version>2.1.0</version>
</dependency>
ShiroConfig.java
添加ShiroDialect配置
@Bean
// 整合ShiroDialect:用来整合shiro和thymeleaf
public ShiroDialect getShiroDialect() {
return new ShiroDialect();
}
前端代码
<!DOCTYPE html>
<html lang="en" xmlns:th="http://www.thymeleaf.org"
xmlns:shiro="http://www.thymeleaf.org/thymeleaf-extras-shiro">
<head>
<meta charset="UTF-8">
<title>Title</title>
</head>
<body>
<h1>首页</h1>
<p th:text="${msg}"></p>
<hr>
<div th:if="${session.loginUser==null}">
<a th:href="@{/toLogin}">登录</a>
</div>
<p th:text="${session.loginUser}"></p>
<a th:href="@{/logOut}" style="float: right;color: red">退出登录</a>
<div shiro:hasPermission="user:add">
<a th:href="@{/user/add}">add</a>
</div>
<div shiro:hasPermission="user:update">
<a th:href="@{/user/update}">update</a>
</div>
</body>
</html>
Comments 1 条评论
66666