--- title: Shiro学习 author: TianZD top: true cover: true toc: true mathjax: false summary: Shiro学习笔记,粗略学了一下,没有参考价值 tags: - Shiro - java - 学习笔记 categories: - java reprintPolicy: cc_by abbrlink: c0a48af9 date: 2022-04-29 10:50:23 coverImg: img: password: --- --- title: shiro tags: java notebook: JAVA --- # 1、Shiro简介 ## 1.1、Shiro 是什么? * Apache Shiro 是 Java 的一个安全(权限)框架。 * Shiro 可以非常容易的开发出足够好的应用,其不仅可以用在 JavaSE 环境,也可以用在 JavaEE 环境。 * Shiro 可以完成:认证、授权、加密、会话管理、与Web 集成、缓存等。 * 下载地址 * 官网:http://shiro.apache.org/ * github:https://github.com/apache/shiro ## 1.2、有哪些功能? [![image-20200729114647110](https://camo.githubusercontent.com/39792d7499fb7656be26a3573d232e7932aa10e43d2950cc47f3d1f53de77554/68747470733a2f2f67697465652e636f6d2f6c7a685f67697465652f737072696e67626f6f745f696d6167652f7261772f6d61737465722f696d672f696d6167652d32303230303732393131343634373131302e706e67)](https://camo.githubusercontent.com/39792d7499fb7656be26a3573d232e7932aa10e43d2950cc47f3d1f53de77554/68747470733a2f2f67697465652e636f6d2f6c7a685f67697465652f737072696e67626f6f745f696d6167652f7261772f6d61737465722f696d672f696d6167652d32303230303732393131343634373131302e706e67) * Authentication:身份认证/登录,验证用户是不是拥有相应的身份 * Authorization:授权,即权限验证,验证某个已认证的用户是否拥有某个权限;即判断用户是否能进行什么操作,如:验证某个用户是否拥有某个角色。或者细粒度的验证某个用户对某个资源是否具有某个权限 * Session Management:会话管理,即用户登录后就是一次会话,在没有退出之前,它的所有信息都在会话中;会话可以是普通JavaSE环境,也可以是Web 环境的 * Cryptography:加密,保护数据的安全性,如密码加密存储到数据库,而不是明文存储 * Web Support:Web 支持,可以非常容易的集成到Web 环境 * Caching:缓存,比如用户登录后,其用户信息、拥有的角色/权限不必每次去查,这样可以提高效率 * Concurrency:Shiro支持多线程应用的并发验证,即如在一个线程中开启另一个线程,能把权限自动传播过去 * Testing:提供测试支持 * "Run As":允许一个用户假装为另一个用户(如果他们允许)的身份进行访问 * Remember Me:记住我,这个是非常常见的功能,即一次登录后,下次再来的话不用登录了 ## 1.3、Shiro架构(外部) 从外部来看Shiro,即从应用程序角度的来观察如何使用Shiro完成工作 [![image-20200729114702566](https://camo.githubusercontent.com/e34dd392bfaaa048ccc5967d91a82e0eb538cdec6fdbfd602817f3a9e890fc70/68747470733a2f2f67697465652e636f6d2f6c7a685f67697465652f737072696e67626f6f745f696d6167652f7261772f6d61737465722f696d672f696d6167652d32303230303732393131343730323536362e706e67)](https://camo.githubusercontent.com/e34dd392bfaaa048ccc5967d91a82e0eb538cdec6fdbfd602817f3a9e890fc70/68747470733a2f2f67697465652e636f6d2f6c7a685f67697465652f737072696e67626f6f745f696d6167652f7261772f6d61737465722f696d672f696d6167652d32303230303732393131343730323536362e706e67) * Subject:应用代码直接交互的对象是Subject,也就是说Shiro的对外API 核心就是Subject。Subject 代表了当前“用户”,这个用户不一定是一个具体的人,与当前应用交互的任何东西都是Subject,如网络爬虫,机器人等;与Subject 的所有交互都会委托给SecurityManager;Subject 其实是一个门面,SecurityManager才是实际的执行者 * SecurityManager:安全管理器;即所有与安全有关的操作都会与SecurityManager交互;且其管理着所有Subject;可以看出它是Shiro的核心,它负责与Shiro的其他组件进行交互,它相当于SpringMVC中DispatcherServlet的角色 * Realm:Shiro从Realm 获取安全数据(如用户、角色、权限),就是说SecurityManager要验证用户身份,那么它需要从Realm 获取相应的用户进行比较以确定用户身份是否合法;也需要从Realm 得到用户相应的角色/权限进行验证用户是否能进行操作;可以把Realm 看成DataSource ## 1.4、Shiro架构(内部) [![image-20200729114720578](https://camo.githubusercontent.com/3c0eb32912aa456b96172a990316de48563666257f2b5bcb7889df7af26e4419/68747470733a2f2f67697465652e636f6d2f6c7a685f67697465652f737072696e67626f6f745f696d6167652f7261772f6d61737465722f696d672f696d6167652d32303230303732393131343732303537382e706e67)](https://camo.githubusercontent.com/3c0eb32912aa456b96172a990316de48563666257f2b5bcb7889df7af26e4419/68747470733a2f2f67697465652e636f6d2f6c7a685f67697465652f737072696e67626f6f745f696d6167652f7261772f6d61737465722f696d672f696d6167652d32303230303732393131343732303537382e706e67) * Subject:任何可以与应用交互的“用户”; * SecurityManager:相当于SpringMVC中的DispatcherServlet;是Shiro的心脏;所有具体的交互都通过SecurityManager进行控制;它管理着所有Subject、且负责进行认证、授权、会话及缓存的管理。 * Authenticator:负责Subject 认证,是一个扩展点,可以自定义实现;可以使用认证策略(Authentication Strategy),即什么情况下算用户认证通过了; * Authorizer:授权器、即访问控制器,用来决定主体是否有权限进行相应的操作;即控制着用户能访问应用中的哪些功能; * Realm:可以有1 个或多个Realm,可以认为是安全实体数据源,即用于获取安全实体的;可以是JDBC 实现,也可以是内存实现等等;由用户提供;所以一般在应用中都需要实现自己的Realm; * SessionManager:管理Session 生命周期的组件;而Shiro并不仅仅可以用在Web 环境,也可以用在如普通的JavaSE环境 CacheManager:缓存控制器,来管理如用户、角色、权限等的缓存的;因为这些数据基本上很少改变,放到缓存中后可以提高访问的性能 * Cryptography:密码模块,Shiro提高了一些常见的加密组件用于如密码加密/解密。 # 2、Hello World ## 2.1、快速实践 * 查看官方文档:http://shiro.apache.org/tutorial.html * 官方的quickstart : https://github.com/apache/shiro/tree/master/samples/quickstart/ [![image-20200729115148574](https://camo.githubusercontent.com/f8297239e27c6e9dac7cba9c91042bd0276075bc593e48a36dcaf90e85cf49ef/68747470733a2f2f67697465652e636f6d2f6c7a685f67697465652f737072696e67626f6f745f696d6167652f7261772f6d61737465722f696d672f696d6167652d32303230303732393131353134383537342e706e67)](https://camo.githubusercontent.com/f8297239e27c6e9dac7cba9c91042bd0276075bc593e48a36dcaf90e85cf49ef/68747470733a2f2f67697465652e636f6d2f6c7a685f67697465652f737072696e67626f6f745f696d6167652f7261772f6d61737465722f696d672f696d6167652d32303230303732393131353134383537342e706e67) 1. 创建一个maven父工程,用来学习Shiro,删掉不必要的部分 2. 创建一个普通的Maven子工程:hell-shiro [![image-20200729120114648](https://camo.githubusercontent.com/304172a69b541dc5d1019428828b8549f1b9f21d1911640cc6552ab0f96b9481/68747470733a2f2f67697465652e636f6d2f6c7a685f67697465652f737072696e67626f6f745f696d6167652f7261772f6d61737465722f696d672f696d6167652d32303230303732393132303131343634382e706e67)](https://camo.githubusercontent.com/304172a69b541dc5d1019428828b8549f1b9f21d1911640cc6552ab0f96b9481/68747470733a2f2f67697465652e636f6d2f6c7a685f67697465652f737072696e67626f6f745f696d6167652f7261772f6d61737465722f696d672f696d6167652d32303230303732393132303131343634382e706e67) 3. 根据[官方文档](https://github.com/apache/shiro/blob/master/samples/quickstart/pom.xml),我们导入Shiro的依赖 [![image-20200729120207730](https://camo.githubusercontent.com/0465f0a1e9d59c306b118c89f971feac1805f79ac5d6349a4f7e16e8883493e7/68747470733a2f2f67697465652e636f6d2f6c7a685f67697465652f737072696e67626f6f745f696d6167652f7261772f6d61737465722f696d672f696d6167652d32303230303732393132303230373733302e706e67)](https://camo.githubusercontent.com/0465f0a1e9d59c306b118c89f971feac1805f79ac5d6349a4f7e16e8883493e7/68747470733a2f2f67697465652e636f6d2f6c7a685f67697465652f737072696e67626f6f745f696d6167652f7261772f6d61737465722f696d672f696d6167652d32303230303732393132303230373733302e706e67) [版本号点击这里](https://mvnrepository.com/artifact/org.apache.shiro/shiro-core) ``` org.apache.shiro shiro-core 1.5.3 org.slf4j jcl-over-slf4j 1.7.26 org.slf4j slf4j-log4j12 1.7.26 log4j log4j 1.2.17 ``` 4. 相关配置文件 * log4j.properties——[官网](https://github.com/apache/shiro/blob/master/samples/quickstart/src/main/resources/log4j.properties) ``` log4j.rootLogger=INFO, stdout log4j.appender.stdout=org.apache.log4j.ConsoleAppender log4j.appender.stdout.layout=org.apache.log4j.PatternLayout log4j.appender.stdout.layout.ConversionPattern=%d %p [%c] - %m %n # General Apache libraries log4j.logger.org.apache=WARN # Spring log4j.logger.org.springframework=WARN # Default Shiro logging log4j.logger.org.apache.shiro=INFO # Disable verbose logging log4j.logger.org.apache.shiro.util.ThreadContext=WARN log4j.logger.org.apache.shiro.cache.ehcache.EhCache=WARN ``` * shiro.ini——[官网](https://github.com/apache/shiro/blob/master/samples/quickstart/src/main/resources/shiro.ini) ``` [users] # user 'root' with password 'secret' and the 'admin' role root = secret, admin # user 'guest' with the password 'guest' and the 'guest' role guest = guest, guest # user 'presidentskroob' with password '12345' ("That's the same combination on # my luggage!!!" ;)), and role 'president' presidentskroob = 12345, president # user 'darkhelmet' with password 'ludicrousspeed' and roles 'darklord' and 'schwartz' darkhelmet = ludicrousspeed, darklord, schwartz # user 'lonestarr' with password 'vespa' and roles 'goodguy' and 'schwartz' lonestarr = vespa, goodguy, schwartz # ----------------------------------------------------------------------------- # Roles with assigned permissions # # Each line conforms to the format defined in the # org.apache.shiro.realm.text.TextConfigurationRealm#setRoleDefinitions JavaDoc # ----------------------------------------------------------------------------- [roles] # 'admin' role has all permissions, indicated by the wildcard '*' admin = * # The 'schwartz' role can do anything (*) with any lightsaber: schwartz = lightsaber:* # The 'goodguy' role is allowed to 'drive' (action) the winnebago (type) with # license plate 'eagle5' (instance specific id) goodguy = winnebago:drive:eagle5 ``` * 启动类 Quickstart——[官网](https://github.com/apache/shiro/blob/master/samples/quickstart/src/main/java/Quickstart.java) ``` /* * Licensed to the Apache Software Foundation (ASF) under one * or more contributor license agreements. See the NOTICE file * distributed with this work for additional information * regarding copyright ownership. The ASF licenses this file * to you under the Apache License, Version 2.0 (the * "License"); you may not use this file except in compliance * with the License. You may obtain a copy of the License at * * http://www.apache.org/licenses/LICENSE-2.0 * * Unless required by applicable law or agreed to in writing, * software distributed under the License is distributed on an * "AS IS" BASIS, WITHOUT WARRANTIES OR CONDITIONS OF ANY * KIND, either express or implied. See the License for the * specific language governing permissions and limitations * under the License. */ import org.apache.shiro.SecurityUtils; import org.apache.shiro.authc.*; import org.apache.shiro.config.IniSecurityManagerFactory; import org.apache.shiro.mgt.SecurityManager; import org.apache.shiro.session.Session; import org.apache.shiro.subject.Subject; import org.apache.shiro.util.Factory; import org.slf4j.Logger; import org.slf4j.LoggerFactory; /** * Simple Quickstart application showing how to use Shiro's API. * 简单入门Shiro使用API * * @since 0.9 RC2 */ public class Quickstart { private static final transient Logger log = LoggerFactory.getLogger(Quickstart.class); public static void main(String[] args) { // The easiest way to create a Shiro SecurityManager with configured // realms, users, roles and permissions is to use the simple INI config. // We'll do that by using a factory that can ingest a .ini file and // return a SecurityManager instance: // Use the shiro.ini file at the root of the classpath // (file: and url: prefixes load from files and urls respectively): // 读取配置文件: Factory factory = new IniSecurityManagerFactory("classpath:shiro.ini"); SecurityManager securityManager = factory.getInstance(); // for this simple example quickstart, make the SecurityManager // accessible as a JVM singleton. Most applications wouldn't do this // and instead rely on their container configuration or web.xml for // webapps. That is outside the scope of this simple quickstart, so // we'll just do the bare minimum so you can continue to get a feel // for things. SecurityUtils.setSecurityManager(securityManager); // Now that a simple Shiro environment is set up, let's see what you can do: // get the currently executing user: // 获取当前的用户对象 Subject Subject currentUser = SecurityUtils.getSubject(); // Do some stuff with a Session (no need for a web or EJB container!!!) //通过当前用户拿到Shiro的Session 可以脱离web存值取值 Session session = currentUser.getSession(); session.setAttribute("someKey", "aValue"); String value = (String) session.getAttribute("someKey"); if (value.equals("aValue")) { log.info("Retrieved the correct value! [" + value + "]"); } // let's login the current user so we can check against roles and permissions: //判断当前的用户是否被认证 if (!currentUser.isAuthenticated()) { //Token 令牌 UsernamePasswordToken token = new UsernamePasswordToken("lonestarr", "vespa"); //设置记住我 token.setRememberMe(true); try { //执行登录操作 currentUser.login(token); } catch (UnknownAccountException uae) { log.info("There is no user with username of " + token.getPrincipal()); } catch (IncorrectCredentialsException ice) { log.info("Password for account " + token.getPrincipal() + " was incorrect!"); } catch (LockedAccountException lae) { log.info("The account for username " + token.getPrincipal() + " is locked. " + "Please contact your administrator to unlock it."); } // ... catch more exceptions here (maybe custom ones specific to your application? catch (AuthenticationException ae) { //unexpected condition? error? } } //say who they are: //print their identifying principal (in this case, a username): log.info("User [" + currentUser.getPrincipal() + "] logged in successfully."); //test a role: // 检查角色 if (currentUser.hasRole("schwartz")) { log.info("May the Schwartz be with you!"); } else { log.info("Hello, mere mortal."); } //test a typed permission (not instance-level) //粗粒度 if (currentUser.isPermitted("lightsaber:wield")) { log.info("You may use a lightsaber ring. Use it wisely."); } else { log.info("Sorry, lightsaber rings are for schwartz masters only."); } //a (very powerful) Instance Level permission: //细粒度 if (currentUser.isPermitted("winnebago:drive:eagle5")) { log.info("You are permitted to 'drive' the winnebago with license plate (id) 'eagle5'. " + "Here are the keys - have fun!"); } else { log.info("Sorry, you aren't allowed to drive the 'eagle5' winnebago!"); } //all done - log out! //注销 currentUser.logout(); //结束 System.exit(0); } } ``` [![image-20200729130649625](https://camo.githubusercontent.com/3e9d7c61a23719bee5050d36fe1b7b78b367c725c78cceb7e3257223cec104d8/68747470733a2f2f67697465652e636f6d2f6c7a685f67697465652f737072696e67626f6f745f696d6167652f7261772f6d61737465722f696d672f696d6167652d32303230303732393133303634393632352e706e67)](https://camo.githubusercontent.com/3e9d7c61a23719bee5050d36fe1b7b78b367c725c78cceb7e3257223cec104d8/68747470733a2f2f67697465652e636f6d2f6c7a685f67697465652f737072696e67626f6f745f696d6167652f7261772f6d61737465722f696d672f696d6167652d32303230303732393133303634393632352e706e67) * Spring Secutrry都有~(只是换了个名字) ``` // 获取当前的用户对象 Subject Subject currentUser = SecurityUtils.getSubject(); Session session = currentUser.getSession(); currentUser.isAuthenticated() currentUser.getPrincipal() currentUser.hasRole("schwartz") currentUser.isPermitted("lightsaber:wield") currentUser.logout(); ``` # 3、SpringBoot集成 ## 3.1、SpringBoot整合Shiro环境搭建 1. 新建一个项目或模块,勾选依赖 [![image-20200729174715011](https://camo.githubusercontent.com/98ca792576cb060f2f278b236c3887867ea62c4c8fbff32d7fe51db60841b562/68747470733a2f2f67697465652e636f6d2f6c7a685f67697465652f737072696e67626f6f745f696d6167652f7261772f6d61737465722f696d672f696d6167652d32303230303732393137343731353031312e706e67)](https://camo.githubusercontent.com/98ca792576cb060f2f278b236c3887867ea62c4c8fbff32d7fe51db60841b562/68747470733a2f2f67697465652e636f6d2f6c7a685f67697465652f737072696e67626f6f745f696d6167652f7261772f6d61737465722f696d672f696d6167652d32303230303732393137343731353031312e706e67) pom.xml ``` org.springframework.boot spring-boot-starter-thymeleaf org.springframework.boot spring-boot-starter-web org.springframework.boot spring-boot-starter-test test org.junit.vintage junit-vintage-engine ``` 2. 测试环境是否正常 * 新建一个controller页面 ``` @Controller public class MyController { @RequestMapping({"/","/index"}) public String toIndex(Model model) { model.addAttribute("msg","hello,Shiro"); return "index"; } @RequestMapping("/user/add") public String add() { return "user/add"; } @RequestMapping("/user/update") public String update() { return "user/update"; } } ``` * 新建一个index.html页面 ``` 首页

首页


add | update
``` * 新建一个add.html页面 ``` Title

add

``` * 新建一个update.html页面 ``` Title

update

``` * 项目结构 [![image-20200729190325307](https://camo.githubusercontent.com/8d47214d44b9e5d644acf03a1a8ee7f14bcf49be620a6124baab3e84371e36b9/68747470733a2f2f67697465652e636f6d2f6c7a685f67697465652f737072696e67626f6f745f696d6167652f7261772f6d61737465722f696d672f696d6167652d32303230303732393139303332353330372e706e67)](https://camo.githubusercontent.com/8d47214d44b9e5d644acf03a1a8ee7f14bcf49be620a6124baab3e84371e36b9/68747470733a2f2f67697465652e636f6d2f6c7a685f67697465652f737072696e67626f6f745f696d6167652f7261772f6d61737465722f696d672f696d6167652d32303230303732393139303332353330372e706e67) * 运行截图 [![image-20200729190548307](https://camo.githubusercontent.com/0690397defb63342a011bbe18b61a2b53786dc731053d47db48fb5a97e3d95fe/68747470733a2f2f67697465652e636f6d2f6c7a685f67697465652f737072696e67626f6f745f696d6167652f7261772f6d61737465722f696d672f696d6167652d32303230303732393139303534383330372e706e67)](https://camo.githubusercontent.com/0690397defb63342a011bbe18b61a2b53786dc731053d47db48fb5a97e3d95fe/68747470733a2f2f67697465652e636f6d2f6c7a685f67697465652f737072696e67626f6f745f696d6167652f7261772f6d61737465722f696d672f696d6167652d32303230303732393139303534383330372e706e67) 3. 导入shiro整合spring的包——[官网](https://mvnrepository.com/artifact/org.apache.shiro/shiro-spring),查看最新版本 ``` org.apache.shiro shiro-spring 1.5.3 ``` 4. 编写导入配置类 * 编写一个自定义类UserRealm ``` //自定义的UserRealm public class UserRealm extends AuthorizingRealm { //授权 @Override protected AuthorizationInfo doGetAuthorizationInfo(PrincipalCollection principalCollection) { System.out.println("执行了=>授权doGetAuthorizationInfo"); return null; } //认证 @Override protected AuthenticationInfo doGetAuthenticationInfo(AuthenticationToken authenticationToken) throws AuthenticationException { System.out.println("执行了=>认证doGetAuthorizationInfo"); return null; } } ``` * 编写配置ShiroConfig * 创建realm对象,需要自定义类 * DefaultWebSecurityManager * ShiroFilterFactoryBean ``` @Configuration public class ShiroConfig { //3. shiroFilterFactoryBean @Bean public ShiroFilterFactoryBean getShiroFilterFactoryBean(@Qualifier("getDefaultWebSecurityManager") DefaultWebSecurityManager defaultWebSecurityManager) { ShiroFilterFactoryBean bean = new ShiroFilterFactoryBean(); // 设置安全管理器 bean.setSecurityManager(defaultWebSecurityManager); return bean; } //2. DefaultWebSecurityManager @Bean public DefaultWebSecurityManager getDefaultWebSecurityManager(@Qualifier("userRealm") UserRealm userRealm) { DefaultWebSecurityManager securityManager = new DefaultWebSecurityManager(); // 关联userRealm securityManager.setRealm(userRealm); return securityManager; } //1. 创建realm对象,需要自定义类 @Bean public UserRealm userRealm() { return new UserRealm(); } } ``` ## 3.2、Shiro实现登录拦截 * 在`ShiroConfig`中的`getShiroFilterFactoryBean`方法中添加如下配置 * anon: 无需认证就可以访问 * authc: 必须认证了才能访问 * user: 必须拥有记住我功能才能用 * perms: 拥有对某个资源的权限才能访问 * role: 拥有某个角色权限 ``` Map filterMap = new LinkedHashMap<>(); filterMap.put("/user/add","authc"); filterMap.put("/user/update","authc"); bean.setFilterChainDefinitionMap(filterMap); ``` * 点击首页的add或者update之后 [![image-20200729191619576](https://camo.githubusercontent.com/d148dd9cf41446cddf6f2f595b498350d7fbd40bd59407f39e99353d2fdefdd8/68747470733a2f2f67697465652e636f6d2f6c7a685f67697465652f737072696e67626f6f745f696d6167652f7261772f6d61737465722f696d672f696d6167652d32303230303732393139313631393537362e706e67)](https://camo.githubusercontent.com/d148dd9cf41446cddf6f2f595b498350d7fbd40bd59407f39e99353d2fdefdd8/68747470733a2f2f67697465652e636f6d2f6c7a685f67697465652f737072696e67626f6f745f696d6167652f7261772f6d61737465722f696d672f696d6167652d32303230303732393139313631393537362e706e67) * 添加拦截成功页面 * 登录页面login.html ``` 登录页面

登录


用户名:

密码:

密码:

``` * 在MyConfig中添加 ``` @RequestMapping("/toLogin") public String toLogin() { return "login"; } ``` * 在`ShiroConfig`中的`getShiroFilterFactoryBean`方法中添加如下配置 ``` //设置登录的请求 bean.setLoginUrl("/toLogin"); ``` * 拦截成功页面 [![image-20200729192409085](https://camo.githubusercontent.com/c30215e3b1528739cffad8d0497103cb9bac7220047ea6aabf7a5cf3ccfed6c6/68747470733a2f2f67697465652e636f6d2f6c7a685f67697465652f737072696e67626f6f745f696d6167652f7261772f6d61737465722f696d672f696d6167652d32303230303732393139323430393038352e706e67)](https://camo.githubusercontent.com/c30215e3b1528739cffad8d0497103cb9bac7220047ea6aabf7a5cf3ccfed6c6/68747470733a2f2f67697465652e636f6d2f6c7a685f67697465652f737072696e67626f6f745f696d6167652f7261772f6d61737465722f696d672f696d6167652d32303230303732393139323430393038352e706e67) ## 3.3、Shiro实现用户认证 1. 在`MyController`中编写用户提交表单之后处理 ``` @RequestMapping("/login") public String login(String username, String password, Model model) { //获取一个用户 Subject subject = SecurityUtils.getSubject(); // 封装用户的登录数据 UsernamePasswordToken token = new UsernamePasswordToken(username, password); try { subject.login(token);//执行登录的方法,如果没有异常就说明ok了 return "index"; } catch (UnknownAccountException e) {//用户名不存在 model.addAttribute("msg","用户名错误"); return "login"; } catch (IncorrectCredentialsException e) {//密码不存在 model.addAttribute("msg","密码错误"); return "login"; } } ``` 2. login.html的修改 ``` 登录页面

登录


用户名:

密码:

密码:

``` 3. 用户输入登录信息 * 页面 [![image-20200729220647520](https://camo.githubusercontent.com/f18382061e7338a2ff3d1646e4d43f604d506897f62ed318b466f910a04fb2bc/68747470733a2f2f67697465652e636f6d2f6c7a685f67697465652f737072696e67626f6f745f696d6167652f7261772f6d61737465722f696d672f696d6167652d32303230303732393232303634373532302e706e67)](https://camo.githubusercontent.com/f18382061e7338a2ff3d1646e4d43f604d506897f62ed318b466f910a04fb2bc/68747470733a2f2f67697465652e636f6d2f6c7a685f67697465652f737072696e67626f6f745f696d6167652f7261772f6d61737465722f696d672f696d6167652d32303230303732393232303634373532302e706e67) * 控制台 [![image-20200729220926500](https://camo.githubusercontent.com/490b413c12125467e4f8916eea52ca4f8b1e1534217a97cc95ee336119aff81f/68747470733a2f2f67697465652e636f6d2f6c7a685f67697465652f737072696e67626f6f745f696d6167652f7261772f6d61737465722f696d672f696d6167652d32303230303732393232303932363530302e706e67)](https://camo.githubusercontent.com/490b413c12125467e4f8916eea52ca4f8b1e1534217a97cc95ee336119aff81f/68747470733a2f2f67697465652e636f6d2f6c7a685f67697465652f737072696e67626f6f745f696d6167652f7261772f6d61737465722f696d672f696d6167652d32303230303732393232303932363530302e706e67) 4. 用户认证编写`UserRealm`中的认证(doGetAuthenticationInfo) ``` //认证 @Override protected AuthenticationInfo doGetAuthenticationInfo(AuthenticationToken token) throws AuthenticationException { System.out.println("执行了=>认证doGetAuthorizationInfo"); // 用户名、密码, 数据中取 String name = "root"; String password = "123456"; UsernamePasswordToken userToken = (UsernamePasswordToken) token; if (!userToken.getUsername().equals(name)) { return null;//抛出异常 UnknownAccountException } // 密码认证,shiro做 return new SimpleAuthenticationInfo("",password,""); } ``` ## 3.4、Shiro整合Mybatis 1. 导入依赖 ``` org.projectlombok lombok mysql mysql-connector-java log4j log4j 1.2.17 com.alibaba druid 1.1.23 org.mybatis.spring.boot mybatis-spring-boot-starter 2.1.3 ``` 2. 配置文件application.yml的编写 ``` spring: datasource: username: root password: admin #?serverTimezone=UTC解决时区的报错 url: jdbc:mysql://localhost:3306/mybatis?serverTimezone=UTC&useUnicode=true&characterEncoding=utf-8 driver-class-name: com.mysql.cj.jdbc.Driver type: com.alibaba.druid.pool.DruidDataSource #Spring Boot 默认是不注入这些属性值的,需要自己绑定 #druid 数据源专有配置 initialSize: 5 minIdle: 5 maxActive: 20 maxWait: 60000 timeBetweenEvictionRunsMillis: 60000 minEvictableIdleTimeMillis: 300000 validationQuery: SELECT 1 FROM DUAL testWhileIdle: true testOnBorrow: false testOnReturn: false poolPreparedStatements: true #配置监控统计拦截的filters,stat:监控统计、log4j:日志记录、wall:防御sql注入 #如果允许时报错 java.lang.ClassNotFoundException: org.apache.log4j.Priority #则导入 log4j 依赖即可,Maven 地址:https://mvnrepository.com/artifact/log4j/log4j filters: stat,wall,log4j maxPoolPreparedStatementPerConnectionSize: 20 useGlobalDataSourceStat: true connectionProperties: druid.stat.mergeSql=true;druid.stat.slowSqlMillis=500 mybatis: type-aliases-package: nuc.ss.pojo mapper-locations: classpath:mapper/*.xml ``` 3. User类的编写 ``` @Data @AllArgsConstructor @NoArgsConstructor public class User { private int id; private String name; private String pwd; } ``` 4. UserMapper.xml映射 ``` insert into mybatis.user (id, name, pwd) values (#{id},#{name},#{pwd}); update mybatis.user set name=#{name},pwd = #{pwd} where id = #{id}; delete from mybatis.user where id = #{id} ``` 5. UserService接口实现 ``` public interface UserService { public User queryUserByName(String name); } ``` 6. UserServiceImpl业务逻辑 ``` @Service public class UserServiceImpl implements UserService { @Autowired UserMapper userMapper; @Override public User queryUserByName(String name) { return userMapper.queryUserByName(name); } } ``` 7. 测试环境 ``` @SpringBootTest class ShiroSpringbootApplicationTests { @Autowired UserService userService; @Test void contextLoads() { System.out.println(userService.queryUserByName("狂神")); } } ``` [![image-20200730121720922](https://camo.githubusercontent.com/308c5e1c04ff9875ffcc4e2179d20eb918ce323646e2f6208a0d849aae6a262b/68747470733a2f2f67697465652e636f6d2f6c7a685f67697465652f737072696e67626f6f745f696d6167652f7261772f6d61737465722f696d672f696d6167652d32303230303733303132313732303932322e706e67)](https://camo.githubusercontent.com/308c5e1c04ff9875ffcc4e2179d20eb918ce323646e2f6208a0d849aae6a262b/68747470733a2f2f67697465652e636f6d2f6c7a685f67697465652f737072696e67626f6f745f696d6167652f7261772f6d61737465722f696d672f696d6167652d32303230303733303132313732303932322e706e67) 8. `UserRealm`连接真实数据库 ``` //认证 @Override protected AuthenticationInfo doGetAuthenticationInfo(AuthenticationToken token) throws AuthenticationException { System.out.println("执行了=>认证doGetAuthorizationInfo"); UsernamePasswordToken userToken = (UsernamePasswordToken) token; // 真实数据库 用户名、密码, 数据中取 User user = userService.queryUserByName(userToken.getUsername()); if (user == null) {//没有这个人 return null; } // 密码认证,shiro做 return new SimpleAuthenticationInfo("",user.getPwd(),""); } ``` [![image-20200730180019861](https://camo.githubusercontent.com/c9af4c0276c84116535b93571ccafcaa1b84dd7ffeb1eb9ecd885c31d5738144/68747470733a2f2f67697465652e636f6d2f6c7a685f67697465652f737072696e67626f6f745f696d6167652f7261772f6d61737465722f696d672f696d6167652d32303230303733303138303031393836312e706e67)](https://camo.githubusercontent.com/c9af4c0276c84116535b93571ccafcaa1b84dd7ffeb1eb9ecd885c31d5738144/68747470733a2f2f67697465652e636f6d2f6c7a685f67697465652f737072696e67626f6f745f696d6167652f7261772f6d61737465722f696d672f696d6167652d32303230303733303138303031393836312e706e67) 9. 断点测试密码加密类型 * 打断点Debug [![image-20200730182621912](https://camo.githubusercontent.com/fff18c314ac225e18601b0ab9d48e3d87da840cbd7a919ce32e66d8966b96b11/68747470733a2f2f67697465652e636f6d2f6c7a685f67697465652f737072696e67626f6f745f696d6167652f7261772f6d61737465722f696d672f696d6167652d32303230303733303138323632313931322e706e67)](https://camo.githubusercontent.com/fff18c314ac225e18601b0ab9d48e3d87da840cbd7a919ce32e66d8966b96b11/68747470733a2f2f67697465652e636f6d2f6c7a685f67697465652f737072696e67626f6f745f696d6167652f7261772f6d61737465722f696d672f696d6167652d32303230303733303138323632313931322e706e67) * 默认是`SimpleCredentialsMatcher`加密 [![image-20200730181814293](https://camo.githubusercontent.com/1213c4a155a6cbf83c20593b4334363db71cc351482d4d87ae86f2e231ba204c/68747470733a2f2f67697465652e636f6d2f6c7a685f67697465652f737072696e67626f6f745f696d6167652f7261772f6d61737465722f696d672f696d6167652d32303230303733303138313831343239332e706e67)](https://camo.githubusercontent.com/1213c4a155a6cbf83c20593b4334363db71cc351482d4d87ae86f2e231ba204c/68747470733a2f2f67697465652e636f6d2f6c7a685f67697465652f737072696e67626f6f745f696d6167652f7261772f6d61737465722f696d672f696d6167652d32303230303733303138313831343239332e706e67) * MD5加密——[测试](http://tool.chinaz.com/tools/md5.aspx) 123456——E10ADC3949BA59ABBE56E057F20F883E * MD5盐值加密 * 所有加密 [![image-20200730181944253](https://camo.githubusercontent.com/8cf8498ea81bdcff2fb9917cfdd05525c2e65814464c181b5e636d1e9c1e24a1/68747470733a2f2f67697465652e636f6d2f6c7a685f67697465652f737072696e67626f6f745f696d6167652f7261772f6d61737465722f696d672f696d6167652d32303230303733303138313934343235332e706e67)](https://camo.githubusercontent.com/8cf8498ea81bdcff2fb9917cfdd05525c2e65814464c181b5e636d1e9c1e24a1/68747470733a2f2f67697465652e636f6d2f6c7a685f67697465652f737072696e67626f6f745f696d6167652f7261772f6d61737465722f696d672f696d6167652d32303230303733303138313934343235332e706e67) ## 3.5、Shiro实现用户授权 1. `ShiroConfig`中的`getShiroFilterFactoryBean`方法添加认证代码 ``` //授权,正常情况下,没有授权会跳转到为授权页面 filterMap.put("/user/add","perms[user:add]"); filterMap.put("/user/update","perms[user:update]"); ``` 2. 登录之后点击add按钮会弹出如下页面 [![image-20200730195133631](https://camo.githubusercontent.com/81387d3d3a6a48219f33ce3f53d6880f65cd73c05324208568f22b61c5d2f111/68747470733a2f2f67697465652e636f6d2f6c7a685f67697465652f737072696e67626f6f745f696d6167652f7261772f6d61737465722f696d672f696d6167652d32303230303733303139353133333633312e706e67)](https://camo.githubusercontent.com/81387d3d3a6a48219f33ce3f53d6880f65cd73c05324208568f22b61c5d2f111/68747470733a2f2f67697465652e636f6d2f6c7a685f67697465652f737072696e67626f6f745f696d6167652f7261772f6d61737465722f696d672f696d6167652d32303230303733303139353133333633312e706e67) 3. 添加为授权页面 * MyController ``` @RequestMapping("/noauto") @ResponseBody public String unauthorized() { return "未经授权,无法访问此页面"; } ``` * `ShiroConfig`中的`getShiroFilterFactoryBean`方法中添加 ``` //为授权页面 bean.setUnauthorizedUrl("/noauto"); ``` 4. 再次测试 [![image-20200730195807437](https://camo.githubusercontent.com/416afcb2900fd3fdd2564dfb3cdff907d7b67a112ef0ab2c1889d1886fc1b42b/68747470733a2f2f67697465652e636f6d2f6c7a685f67697465652f737072696e67626f6f745f696d6167652f7261772f6d61737465722f696d672f696d6167652d32303230303733303139353830373433372e706e67)](https://camo.githubusercontent.com/416afcb2900fd3fdd2564dfb3cdff907d7b67a112ef0ab2c1889d1886fc1b42b/68747470733a2f2f67697465652e636f6d2f6c7a685f67697465652f737072696e67626f6f745f696d6167652f7261772f6d61737465722f696d672f696d6167652d32303230303733303139353830373433372e706e67) [![image-20200730195946692](https://camo.githubusercontent.com/7be97fcb647f93b4eee73a38f2a54888a5f95953f429981bbdbcfc142e473df6/68747470733a2f2f67697465652e636f6d2f6c7a685f67697465652f737072696e67626f6f745f696d6167652f7261772f6d61737465722f696d672f696d6167652d32303230303733303139353934363639322e706e67)](https://camo.githubusercontent.com/7be97fcb647f93b4eee73a38f2a54888a5f95953f429981bbdbcfc142e473df6/68747470733a2f2f67697465652e636f6d2f6c7a685f67697465652f737072696e67626f6f745f696d6167652f7261772f6d61737465722f696d672f696d6167652d32303230303733303139353934363639322e706e67) 所以需要在UserRealm中为用户进行真正授权 5. UserRealm类的修改 ``` //自定义的UserRealm public class UserRealm extends AuthorizingRealm { @Autowired UserService userService; //授权 @Override protected AuthorizationInfo doGetAuthorizationInfo(PrincipalCollection principalCollection) { System.out.println("执行了=>授权doGetAuthorizationInfo"); SimpleAuthorizationInfo info = new SimpleAuthorizationInfo(); //拿到当前登录的这个对象 Subject subject = SecurityUtils.getSubject(); User currentUser = (User)subject.getPrincipal();//拿到user对象 //设置当前用户的权限 info.addStringPermission(currentUser.getPerms()); return info; } //认证 @Override protected AuthenticationInfo doGetAuthenticationInfo(AuthenticationToken token) throws AuthenticationException { ...... // 密码认证,shiro做 return new SimpleAuthenticationInfo(user,user.getPwd(),""); } } ``` 6. 再次测试 [![image-20200730202810034](https://camo.githubusercontent.com/31ac9e7acaee627de7b5b29aa307991405d5a80d7ed15a291955b34ddd6cc955/68747470733a2f2f67697465652e636f6d2f6c7a685f67697465652f737072696e67626f6f745f696d6167652f7261772f6d61737465722f696d672f696d6167652d32303230303733303230323831303033342e706e67)](https://camo.githubusercontent.com/31ac9e7acaee627de7b5b29aa307991405d5a80d7ed15a291955b34ddd6cc955/68747470733a2f2f67697465652e636f6d2f6c7a685f67697465652f737072696e67626f6f745f696d6167652f7261772f6d61737465722f696d672f696d6167652d32303230303733303230323831303033342e706e67) ## 3.6、Shiro整合Thymeleaf 1. shiro-thymeleaf整合包导入——[官网](https://mvnrepository.com/artifact/com.github.theborakompanioni/thymeleaf-extras-shiro) ``` com.github.theborakompanioni thymeleaf-extras-shiro 2.0.0 ``` 2. 在ShiroConfig中整合ShiroDialect ``` // 整合ShiroDialect: 用来整合 Shiro thymeleaf @Bean public ShiroDialect getShiroDialect() { return new ShiroDialect(); } ``` 3. index.html页面 ``` 首页

首页

登录

add
update
``` 4. 页面显示 [![image-20200730205736153](https://camo.githubusercontent.com/802d55dc3d0600bf012f27959d4d743aaf19bbdead74f083c9797d14e1b57c58/68747470733a2f2f67697465652e636f6d2f6c7a685f67697465652f737072696e67626f6f745f696d6167652f7261772f6d61737465722f696d672f696d6167652d32303230303733303230353733363135332e706e67)](https://camo.githubusercontent.com/802d55dc3d0600bf012f27959d4d743aaf19bbdead74f083c9797d14e1b57c58/68747470733a2f2f67697465652e636f6d2f6c7a685f67697465652f737072696e67626f6f745f696d6167652f7261772f6d61737465722f696d672f696d6167652d32303230303733303230353733363135332e706e67) ## 3.7、所有代码 * ShiroConfig ``` package nuc.ss.config; import at.pollux.thymeleaf.shiro.dialect.ShiroDialect; import org.apache.shiro.spring.web.ShiroFilterFactoryBean; import org.apache.shiro.web.mgt.DefaultWebSecurityManager; import org.springframework.beans.factory.annotation.Qualifier; import org.springframework.context.annotation.Bean; import org.springframework.context.annotation.Configuration; import java.util.LinkedHashMap; import java.util.Map; @Configuration public class ShiroConfig { //shiroFilterFactoryBean @Bean public ShiroFilterFactoryBean getShiroFilterFactoryBean(@Qualifier("getDefaultWebSecurityManager") DefaultWebSecurityManager defaultWebSecurityManager) { ShiroFilterFactoryBean bean = new ShiroFilterFactoryBean(); // 设置安全管理器 bean.setSecurityManager(defaultWebSecurityManager); // 添加shiro的内置过滤器 /* anon: 无需认证就可以访问 authc: 必须认证了才能访问 user: 必须拥有记住我功能才能用 perms: 拥有对某个资源的权限才能访问 role: 拥有某个角色权限 */ //拦截 Map filterMap = new LinkedHashMap<>(); //filterMap.put("/user/add","authc"); //filterMap.put("/user/update","authc"); //授权,正常情况下,没有授权会跳转到为授权页面 filterMap.put("/user/add","perms[user:add]"); filterMap.put("/user/update","perms[user:update]"); filterMap.put("/user/*","authc"); bean.setFilterChainDefinitionMap(filterMap); //设置登录的请求 bean.setLoginUrl("/toLogin"); //为授权页面 bean.setUnauthorizedUrl("/noauto"); return bean; } //DefaultWebSecurityManager @Bean public DefaultWebSecurityManager getDefaultWebSecurityManager(@Qualifier("userRealm") UserRealm userRealm) { DefaultWebSecurityManager securityManager = new DefaultWebSecurityManager(); // 关联userRealm securityManager.setRealm(userRealm); return securityManager; } //创建realm对象,需要自定义类 @Bean public UserRealm userRealm() { return new UserRealm(); } // 整合ShiroDialect: 用来整合 Shiro thymeleaf @Bean public ShiroDialect getShiroDialect() { return new ShiroDialect(); } } ``` * UserRealm ``` package nuc.ss.config; import nuc.ss.pojo.User; import nuc.ss.service.UserService; import org.apache.shiro.SecurityUtils; import org.apache.shiro.authc.*; import org.apache.shiro.authz.AuthorizationInfo; import org.apache.shiro.authz.SimpleAuthorizationInfo; import org.apache.shiro.realm.AuthorizingRealm; import org.apache.shiro.session.Session; import org.apache.shiro.subject.PrincipalCollection; import org.apache.shiro.subject.Subject; import org.springframework.beans.factory.annotation.Autowired; //自定义的UserRealm public class UserRealm extends AuthorizingRealm { @Autowired UserService userService; //授权 @Override protected AuthorizationInfo doGetAuthorizationInfo(PrincipalCollection principalCollection) { System.out.println("执行了=>授权doGetAuthorizationInfo"); SimpleAuthorizationInfo info = new SimpleAuthorizationInfo(); //info.addStringPermission("user:add"); //拿到当前登录的这个对象 Subject subject = SecurityUtils.getSubject(); User currentUser = (User)subject.getPrincipal();//拿到user对象 //设置当前用户的权限 info.addStringPermission(currentUser.getPerms()); return info; } //认证 @Override protected AuthenticationInfo doGetAuthenticationInfo(AuthenticationToken token) throws AuthenticationException { System.out.println("执行了=>认证doGetAuthorizationInfo"); UsernamePasswordToken userToken = (UsernamePasswordToken) token; // 虚拟用户 //String name = "root"; //String password = "123456"; //if (!userToken.getUsername().equals(name)) { // return null;//抛出异常 UnknownAccountException //} // 真实数据库 用户名、密码, 数据中取 User user = userService.queryUserByName(userToken.getUsername()); if (user == null) {//没有这个人 return null; } //首页 //Subject currentSubject = SecurityUtils.getSubject(); //Session session = currentSubject.getSession(); //session.setAttribute("loginUser",user); // 密码认证,shiro做 return new SimpleAuthenticationInfo(user,user.getPwd(),""); } } ``` * MyController ``` package nuc.ss.controller; import org.apache.shiro.SecurityUtils; import org.apache.shiro.authc.IncorrectCredentialsException; import org.apache.shiro.authc.UnknownAccountException; import org.apache.shiro.authc.UsernamePasswordToken; import org.apache.shiro.subject.Subject; import org.springframework.stereotype.Controller; import org.springframework.ui.Model; import org.springframework.web.bind.annotation.RequestMapping; import org.springframework.web.bind.annotation.ResponseBody; @Controller public class MyController { @RequestMapping({"/","/index"}) public String toIndex(Model model) { model.addAttribute("msg","hello,Shiro"); return "index"; } @RequestMapping("/user/add") public String add() { return "user/add"; } @RequestMapping("/user/update") public String update() { return "user/update"; } @RequestMapping("/toLogin") public String toLogin() { return "login"; } @RequestMapping("/login") public String login(String username, String password, Model model) { //获取一个用户 Subject subject = SecurityUtils.getSubject(); // 封装用户的登录数据 UsernamePasswordToken token = new UsernamePasswordToken(username, password); try { subject.login(token);//执行登录的方法,如果没有异常就说明ok了 return "index"; } catch (UnknownAccountException e) {//用户名不存在 model.addAttribute("msg","用户名错误"); return "login"; } catch (IncorrectCredentialsException e) {//密码不存在 model.addAttribute("msg","密码错误"); return "login"; } } @RequestMapping("/noauto") @ResponseBody public String unauthorized() { return "未经授权,无法访问此页面"; } } ``` * pom依赖 ``` 4.0.0 nuc.ss shiro-springboot 0.0.1-SNAPSHOT shiro-springboot Demo project for Spring Boot 1.8 UTF-8 UTF-8 2.3.0.RELEASE com.github.theborakompanioni thymeleaf-extras-shiro 2.0.0 org.projectlombok lombok mysql mysql-connector-java log4j log4j 1.2.17 com.alibaba druid 1.1.23 org.mybatis.spring.boot mybatis-spring-boot-starter 2.1.3 org.apache.shiro shiro-spring 1.5.3 org.springframework.boot spring-boot-starter-thymeleaf org.springframework.boot spring-boot-starter-web org.springframework.boot spring-boot-starter-test test org.junit.vintage junit-vintage-engine org.springframework.boot spring-boot-dependencies ${spring-boot.version} pom import org.apache.maven.plugins maven-compiler-plugin 1.8 1.8 UTF-8 org.springframework.boot spring-boot-maven-plugin ``` # 4、完美的解释 [让 Apache Shiro 保护你的应用](https://www.infoq.cn/article/apache-shiro/?itm_source=infoq_en&itm_medium=link_on_en_item&itm_campaign=item_in_other_langs)