1. 程式人生 > >Spring整合Shiro做許可權控制模組詳細案例分析

Spring整合Shiro做許可權控制模組詳細案例分析

1.引入Shiro的Maven依賴

<!-- Spring 整合Shiro需要的依賴 -->

	<dependency>
		<groupId>org.apache.shiro</groupId>
		<artifactId>shiro-core</artifactId>
		<version>1.2.1</version>
	</dependency>
	<dependency>
		<groupId>org.apache.shiro</groupId>
		<artifactId>shiro-web</artifactId>
		<version>1.2.1</version>
	</dependency>
	<dependency>
		<groupId>org.apache.shiro</groupId>
		<artifactId>shiro-ehcache</artifactId>
		<version>1.2.1</version>
	</dependency>
	<dependency>
		<groupId>org.apache.shiro</groupId>
		<artifactId>shiro-spring</artifactId>
		<version>1.2.1</version>
	</dependency>
	<!-- 除此之外還有一些東西也不可少spring, spring-mvc, ibatis等 spring.3.1.2 spring-mvc.3.1.2 
		ibatis.2.3.4 cglib.2.2 -->

2.web.xml中配置

<!-- 配置shiro的核心攔截器 -->
	<filter>  
		<filter-name>shiroFilter</filter-name>  
		<filter-class>org.springframework.web.filter.DelegatingFilterProxy</filter-class>  
	</filter>  
	<filter-mapping>  
		<filter-name>shiroFilter</filter-name>  
		<url-pattern>/*</url-pattern>  
	</filter-mapping>

3.    編寫自己的UserRealm類繼承自Realm,主要實現認證和授權的管理操作

package com.jay.demo.shiro;

import java.util.HashSet;
import java.util.Iterator;
import java.util.Set;

import org.apache.shiro.authc.AuthenticationException;
import org.apache.shiro.authc.AuthenticationInfo;
import org.apache.shiro.authc.AuthenticationToken;
import org.apache.shiro.authc.LockedAccountException;
import org.apache.shiro.authc.SimpleAuthenticationInfo;
import org.apache.shiro.authc.UnknownAccountException;
import org.apache.shiro.authz.AuthorizationInfo;
import org.apache.shiro.authz.SimpleAuthorizationInfo;
import org.apache.shiro.realm.AuthorizingRealm;
import org.apache.shiro.subject.PrincipalCollection;
import org.springframework.beans.factory.annotation.Autowired;

import com.jay.demo.bean.Permission;
import com.jay.demo.bean.Role;
import com.jay.demo.bean.User;
import com.jay.demo.service.UserService;

public class UserRealm extends AuthorizingRealm{
	
	@Autowired
	private UserService userService;

	/**
	 * 授權操作
	 */
	@Override
	protected AuthorizationInfo doGetAuthorizationInfo(PrincipalCollection principals) {
//		String username = (String) getAvailablePrincipal(principals);
		String username = (String) principals.getPrimaryPrincipal();
		
		Set<Role> roleSet =  userService.findUserByUsername(username).getRoleSet();
		//角色名的集合
		Set<String> roles = new HashSet<String>();
		//許可權名的集合
		Set<String> permissions = new HashSet<String>();
		
		Iterator<Role> it = roleSet.iterator();
		while(it.hasNext()){
			roles.add(it.next().getName());
			for(Permission per:it.next().getPermissionSet()){
				permissions.add(per.getName());
			}
		}

		
		SimpleAuthorizationInfo authorizationInfo = new SimpleAuthorizationInfo();
		
		authorizationInfo.addRoles(roles);
		authorizationInfo.addStringPermissions(permissions);
		
		
		return authorizationInfo;
	}

	/**
	 * 身份驗證操作
	 */
	@Override
	protected AuthenticationInfo doGetAuthenticationInfo(
			AuthenticationToken token) throws AuthenticationException {
		
		String username = (String) token.getPrincipal();
		User user = userService.findUserByUsername(username);
		
		if(user==null){
			//木有找到使用者
			throw new UnknownAccountException("沒有找到該賬號");
		}
		/* if(Boolean.TRUE.equals(user.getLocked())) {  
	            throw new LockedAccountException(); //帳號鎖定  
	        } */
		
		/**
		 * 交給AuthenticatingRealm使用CredentialsMatcher進行密碼匹配,如果覺得人家的不好可以在此判斷或自定義實現  
		 */
		SimpleAuthenticationInfo info = new SimpleAuthenticationInfo(user.getUsername(), user.getPassword(),getName());
		
		
		return info;
	}
	
	@Override
	public String getName() {
		return getClass().getName();
	}

}

4.在Spring的applicationContext.xml中進行Shiro的相關配置

1、新增shiroFilter定義 

Xml程式碼 收藏程式碼

  1. <!-- Shiro Filter -->   
  2. < bean   id = "shiroFilter"   class = "org.apache.shiro.spring.web.ShiroFilterFactoryBean" >   
  3.      < property   name = "securityManager"   ref = "securityManager"   />   
  4.      < property   name = "loginUrl"   value = "/login"   />   
  5.      < property   name = "successUrl"   value = "/user/list"   />   
  6.      < property   name = "unauthorizedUrl"   value = "/login"   />   
  7.      < property   name = "filterChainDefinitions" >   
  8.          < value >   
  9.             / login  =  anon   
  10.             /user/** = authc  
  11.             /role/edit/* = perms[role:edit]  
  12.             /role/ save  =  perms [role:edit]  
  13.             /role/ list  =  perms [role:view]  
  14.             /** = authc  
  15.          </ value >   
  16.      </ property >   
  17. </ bean >   

2、新增securityManager定義 

Xml程式碼 收藏程式碼

  1. < bean   id = "securityManager"   class = "org.apache.shiro.web.mgt.DefaultWebSecurityManager" >   
  2.      < property   name = "realm"   ref = "myRealm"   />   
  3. </ bean >   

3、新增realm定義 

Xml程式碼 收藏程式碼

  1. < bean   id = " myRealm"   class = "com.jay.demo.shiro.
    UserRealm<span class="attribute-value" style="font-size: 1em; font-family: Monaco, 'DejaVu Sans Mono', 'Bitstream Vera Sans Mono', Consolas, 'Courier New', monospace; background-color: rgb(250, 250, 250);">"</span><span style="color: black; font-size: 1em; font-family: Monaco, 'DejaVu Sans Mono', 'Bitstream Vera Sans Mono', Consolas, 'Courier New', monospace; background-color: rgb(250, 250, 250);"> </span><span class="tag" style="font-size: 1em; font-family: Monaco, 'DejaVu Sans Mono', 'Bitstream Vera Sans Mono', Consolas, 'Courier New', monospace; color: rgb(0, 102, 153); font-weight: bold; background-color: rgb(250, 250, 250);">/></span><span style="color: black; font-size: 1em; font-family: Monaco, 'DejaVu Sans Mono', 'Bitstream Vera Sans Mono', Consolas, 'Courier New', monospace; background-color: rgb(250, 250, 250);">  </span>

4、配置EhCache

< bean   id = "cacheManager"   class = "org.apache.shiro.cache.ehcache.EhCacheManager"   />

5、 保證實現了Shiro內部lifecycle函式的bean執行

<bean id="lifecycleBeanPostProcessor" class="org.apache.shiro.spring.LifecycleBeanPostProcessor"/>

特別注意:

如果使用Shiro相關的註解,需要在springmvc-servlet.xml中配置一下資訊

<bean class="org.springframework.aop.framework.autoproxy.DefaultAdvisorAutoProxyCreator" depends-on="lifecycleBeanPostProcessor"/>
<bean class="org.apache.shiro.spring.security.interceptor.AuthorizationAttributeSourceAdvisor">
    <property name="securityManager" ref="securityManager"/>
</bean>

備註:Shiro許可權管理的過濾器解釋:

預設過濾器(10個) 
anon -- org.apache.shiro.web.filter.authc.AnonymousFilter
authc -- org.apache.shiro.web.filter.authc.FormAuthenticationFilter
authcBasic -- org.apache.shiro.web.filter.authc.BasicHttpAuthenticationFilter
perms -- org.apache.shiro.web.filter.authz.PermissionsAuthorizationFilter
port -- org.apache.shiro.web.filter.authz.PortFilter
rest -- org.apache.shiro.web.filter.authz.HttpMethodPermissionFilter
roles -- org.apache.shiro.web.filter.authz.RolesAuthorizationFilter
ssl -- org.apache.shiro.web.filter.authz.SslFilter
user -- org.apache.shiro.web.filter.authc.UserFilter
logout -- org.apache.shiro.web.filter.authc.LogoutFilter


anon:例子/admins/**=anon 沒有引數,表示可以匿名使用。 
authc:例如/admins/user/**=authc表示需要認證(登入)才能使用,沒有引數 
roles:例子/admins/user/**=roles[admin],引數可以寫多個,多個時必須加上引號,並且引數之間用逗號分割,當有多個引數時,例如admins/user/**=roles["admin,guest"],每個引數通過才算通過,相當於hasAllRoles()方法。 
perms:例子/admins/user/**=perms[user:add:*],引數可以寫多個,多個時必須加上引號,並且引數之間用逗號分割,例如/admins/user/**=perms["user:add:*,user:modify:*"],當有多個引數時必須每個引數都通過才通過,想當於isPermitedAll()方法。 
rest:例子/admins/user/**=rest[user],根據請求的方法,相當於/admins/user/**=perms[user:method] ,其中method為post,get,delete等。 
port:例子/admins/user/**=port[8081],當請求的url的埠不是8081是跳轉到schemal://serverName:8081?queryString,其中schmal是協議http或https等,serverName是你訪問的host,8081是url配置裡port的埠,queryString是你訪問的url裡的?後面的引數。 
authcBasic:例如/admins/user/**=authcBasic沒有引數表示httpBasic認證 
ssl:例子/admins/user/**=ssl沒有引數,表示安全的url請求,協議為https 
user:例如/admins/user/**=user沒有引數表示必須存在使用者,當登入操作時不做檢查

關於Shiro的標籤應用:

<shiro:authenticated> 登入之後
<shiro:notAuthenticated> 不在登入狀態時
<shiro:guest> 使用者在沒有RememberMe時
<shiro:user> 使用者在RememberMe時
<shiro:hasAnyRoles name="abc,123" > 在有abc或者123角色時
<shiro:hasRole name="abc"> 擁有角色abc
<shiro:lacksRole name="abc"> 沒有角色abc
<shiro:hasPermission name="abc"> 擁有許可權abc
<shiro:lacksPermission name="abc"> 沒有許可權abc
<shiro:principal> 顯示使用者登入名

以上是Shiro的相關配置,出於安全的考慮,一般都會使用ACL(基於角色的使用者許可權管理去控制使用者登入後的許可權)

ACL詳細程式碼案例如下:

涉及到的表:3+2(User,Role,Permission  +  user-role,role-permission)

3張實體表+2張關係表

1.關於User類:

package com.jay.demo.bean;

import java.util.HashSet;
import java.util.Set;

public class User {
	private String id;
	private String username;
	private String password;
	private Set<Role> roleSet = new HashSet<Role>();
	
	public User() {
	}

	public String getId() {
		return id;
	}

	public void setId(String id) {
		this.id = id;
	}

	public String getUsername() {
		return username;
	}

	public void setUsername(String username) {
		this.username = username;
	}

	public String getPassword() {
		return password;
	}

	public void setPassword(String password) {
		this.password = password;
	}

	public Set<Role> getRoleSet() {
		return roleSet;
	}

	public void setRoleSet(Set<Role> roleSet) {
		this.roleSet = roleSet;
	}

	
}

2.關於Role表

package com.jay.demo.bean;

import java.io.Serializable;
import java.util.HashSet;
import java.util.Set;

public class Role implements Serializable {

	private static final long serialVersionUID = -4987248128309954399L;

	private Integer id;
	private String name;
	private Set<Permission> permissionSet = new HashSet<Permission>();

	public Role() {
		super();
	}
	
	// --------------------------------------------------------------------------------

	@Override
	public int hashCode() {
		final int prime = 31;
		int result = 1;
		result = prime * result + ((id == null) ? 0 : id.hashCode());
		return result;
	}

	@Override
	public boolean equals(Object obj) {
		if (this == obj)
			return true;
		if (obj == null)
			return false;
		if (getClass() != obj.getClass())
			return false;
		Role other = (Role) obj;
		if (id == null) {
			if (other.id != null)
				return false;
		} else if (!id.equals(other.id))
			return false;
		return true;
	}
	
	// --------------------------------------------------------------------------------

	public Integer getId() {
		return id;
	}

	public void setId(Integer id) {
		this.id = id;
	}

	public String getName() {
		return name;
	}

	public void setName(String name) {
		this.name = name;
	}

	public Set<Permission> getPermissionSet() {
		return permissionSet;
	}

	public void setPermissionSet(Set<Permission> permissionSet) {
		this.permissionSet = permissionSet;
	}

}

3.關於permission表

<pre name="code" class="java">package com.jay.demo.bean;

import java.io.Serializable;

public class Permission implements Serializable {

	private static final long serialVersionUID = -8025597823572680802L;

	private Integer id;
	private String name;

	public Permission() {
		super();
	}

	// --------------------------------------------------------------------------------------

	@Override
	public int hashCode() {
		final int prime = 31;
		int result = 1;
		result = prime * result + ((id == null) ? 0 : id.hashCode());
		return result;
	}

	@Override
	public boolean equals(Object obj) {
		if (this == obj)
			return true;
		if (obj == null)
			return false;
		if (getClass() != obj.getClass())
			return false;
		Permission other = (Permission) obj;
		if (id == null) {
			if (other.id != null)
				return false;
		} else if (!id.equals(other.id))
			return false;
		return true;
	}

	// --------------------------------------------------------------------------------------

	public Integer getId() {
		return id;
	}

	public void setId(Integer id) {
		this.id = id;
	}

	public String getName() {
		return name;
	}

	public void setName(String name) {
		this.name = name;
	}

}

4.dao層介面

package com.jay.demo.dao;

import com.jay.demo.bean.User;

public interface UserDao {
	
	User findUserByUsername(String username); 
}

4.使用Mybatis完成的Dao層實現

<?xml version="1.0" encoding="UTF-8" ?>
<!DOCTYPE mapper PUBLIC "-//mybatis.org//DTD Mapper 3.0//EN" "http://mybatis.org/dtd/mybatis-3-mapper.dtd" >
<mapper namespace="com.jay.demo.dao.UserDao">
	<resultMap id="userMap" type="com.jay.demo.bean.User">
	<id property="id" column="USER_ID"/>
	<result property="username" column="USER_USERNAME"/>
	<result property="password" column="USER_PASSWORD"/>
	<!-- 進行 多表關聯插敘,先關聯user和role -->
	<collection property="roleSet" column="roleid" ofType="com.jay.demo.bean.Role">
	<id property="id" column="ROLE_ID"/>
	<result property="name" column="ROLE_NAME"/>
	<!-- 再在role中關聯role和permission -->
	<collection property="permissionSet" column="permissionid" ofType="com.jay.demo.bean.Permission">
	<id property="id" column="permission_id"/>
	<result property="name" column="permission_name"/>
	</collection>
	</collection>
	
	</resultMap>
	
	
	
	
	<!--  通過User來查詢Role   -->  
	<!-- <select id="selectRoleByUser" parameterType="int" resultMap="RoleMap">  
		select * from tbl_role_user user_id  = #{id}   
	</select>  
	

	<resultMap  id="roleMap" type="com.jay.demo.bean.User">
		<result property="id" column="ROLE_ID" />
		<result property="name" column="ROLE_NAME" />
	</resultMap>
	
	<resultMap id="permissionMap" type="com.jay.demo.bean.Permission">
		<result property="id" column="PERMISSION_ID" />
		<result property="name" column="PERMISSION_NAME" />
	</resultMap> -->
	
	

<sql id="select-base-01">  
		SELECT   
			u.USER_ID,  
			u.USER_USERNAME,  
			u.USER_PASSWORD,  
			r.ROLE_ID,  
			r.ROLE_NAME,  
			p.PERMISSION_ID,  
			p.PERMISSION_NAME  
		FROM  
		  tbl_user as u,  
		  tbl_role as r,  
		  tbl_permission as p,  
		  tbl_permission_role as pr,  
		  tbl_role_user as ru  
		WHERE  
		  u.USER_ID = ru.USER_ID  
		AND  
		  r.ROLE_ID = ru.ROLE_ID  
		AND  
		  p.PERMISSION_ID = pr.PERMISSION_ID  
		AND  
		  r.ROLE_ID = pr.ROLE_ID  
	</sql>  
	
	<select id="findUserByUsername" parameterType="string" resultMap="userMap">  
	   <include refid="select-base-01" />  
		AND  
			u.USER_USERNAME = #{username}	
			<!-- select * from tbl_user u, tbl_role r, tbl_role_user tu 
			where u.user_id = tu.user_id and r.role_id = tu.role_id 
			and user_username=#{username} -->
	</select>
	
</mapper>