1.认识shiro
除Spring Security安全框架外,应用非常广泛的就是Apache的强大又灵活的开源安全框架 Shiro,在国内使用量远远超过Spring Security。它能够用于身份验证、授权、加密和会话管理, 有易于理解的API,可以快速、轻松地构建任何应用程序。而且大部分人觉得从Shiro入门要比 Spring Security 简单。
1.1 认识Shiro的核心组件
Shiro有如下核心组件。
- Subject:代表当前“用户”。与当前应用程序交互的任何东西都是Subject,如爬虫、机器人、所有Subject都绑定到SecurityManager,与Subject的所有交互都会委托给 SecurityManager,Subject 是一个门面,SecurityManager 是实际的执行者。
- SecurityManager:与安全有关的操作都会与SecurityManager交互。它管理着所有 Subject,是Shiro的核心,员责与其他组件进行交互。
- Realm: Shiro从Realm中获取安全数据(用户、角色、权限),SecurityManager 需要 从Realm中获取相应的用户信息进行比较用户身份是否合法,也需要从Realm中得到用户 相应的角色/权限进行验证,以确定用户是否能进行操作。
2.实例:用shiro实现管理后台的动态权限功能
依赖:- <dependency>
- <groupId>org.apache.shiro</groupId>
- <artifactId>shiro-spring</artifactId>
- <version>1.9.1</version>
- </dependency>
- <dependency>
- <groupId>org.apache.commons</groupId>
- <artifactId>commons-lang3</artifactId>
- </dependency>
复制代码 2.1 创建实体
2.1.1 创建管理员实体
创建管理实体,用于存放管理员信息,见以下代码:- package com.intehel.demo.domain;
- import lombok.Data;
- import javax.persistence.*;
- import java.io.Serializable;
- import java.util.List;
- @Entity
- @Data
- public class Admin implements Serializable {
- @Id
- @GeneratedValue
- private Integer id;
- @Column(unique = true)
- //账号
- private String username;
- //名称
- private String name;
- //密码
- private String password;
- //盐加密
- private String salt;
- //用户状态:0:创建未认证,等待验证 1:正常状态 2:用户被锁定
- private byte state;
- @ManyToMany(fetch = FetchType.EAGER)
- @JoinTable(name = "SysUserRole",joinColumns = {@JoinColumn(name = "uid")},
- inverseJoinColumns = {@JoinColumn(name = "roleId")})
- private List<SysRole> rolesList;
- }
复制代码 2.1.2 创建权限实体
权限实体用于存放权限数据,见以下代码:- package com.intehel.demo.domain;
- import lombok.Data;
- import javax.persistence.*;
- import java.io.Serializable;
- import java.util.List;
- @Entity
- @Data
- public class SysPermission implements Serializable {
- @Id
- @GeneratedValue
- private Integer id;
- private String name;
- @Column(columnDefinition = "enum('menu','button')")
- private String resourceType;
- private String url;
- private String permission;
- private Long parentId;
- private String parentIds;
- private Boolean avaliable = Boolean.FALSE;
- @ManyToMany
- @JoinTable(name = "SysRolePermission",joinColumns = {@JoinColumn(name = "permissionId")},
- inverseJoinColumns = {@JoinColumn(name = "roleId")})
- private List<SysRole> rolesList;
- }
复制代码 2.1.3 创建角色实体
角色实体是管理员的角色,用于对管理员分组,并通过与权限表映射来确定管理员的权限,见以下代码:- package com.intehel.demo.domain;
- import lombok.Data;
- import javax.persistence.*;
- import java.util.List;
- @Entity
- @Data
- public class SysRole {
- @Id
- @GeneratedValue
- private Integer id;
- @Column(unique = true)
- private String role;
- private String description;
- private Boolean available = Boolean.FALSE;
- @ManyToMany(fetch = FetchType.EAGER)
- @JoinTable(name = "SysRolePermission",joinColumns = {@JoinColumn(name = "roleId")},
- inverseJoinColumns = {@JoinColumn(name = "permissionId")})
- private List<SysPermission> permissions;
- @ManyToMany
- @JoinTable(name = "SysUserRole",joinColumns = {@JoinColumn(name = "roleId")},
- inverseJoinColumns = {@JoinColumn(name = "uid")})
- private List<Admin> admins;
- }
复制代码 2.2 进行权限配置
- package com.intehel.demo.realm;
- import com.intehel.demo.domain.Admin;
- import com.intehel.demo.domain.SysPermission;
- import com.intehel.demo.domain.SysRole;
- import org.apache.shiro.authc.AuthenticationException;
- import org.apache.shiro.authc.AuthenticationInfo;
- import org.apache.shiro.authc.AuthenticationToken;
- import org.apache.shiro.authc.SimpleAuthenticationInfo;
- import org.apache.shiro.authz.AuthorizationInfo;
- import org.apache.shiro.authz.SimpleAuthorizationInfo;
- import org.apache.shiro.realm.AuthorizingRealm;
- import org.apache.shiro.subject.PrincipalCollection;
- import org.apache.shiro.util.ByteSource;
- public class CustomerRealm extends AuthorizingRealm {
- @Override
- protected AuthorizationInfo doGetAuthorizationInfo(PrincipalCollection principalCollection) {
- SimpleAuthorizationInfo info = new SimpleAuthorizationInfo();
- Admin adminInfo = (Admin) principalCollection.getPrimaryPrincipal();
- for (SysRole role : adminInfo.getRolesList()) {
- info.addRole(role.getRole());
- for (SysPermission p:role.getPermissions()){
- info.addStringPermission(p.getPermission());
- }
- }
- return info;
- }
- @Override
- protected AuthenticationInfo doGetAuthenticationInfo(AuthenticationToken authenticationToken) throws AuthenticationException {
- String username = (String) authenticationToken.getPrincipal();
- System.out.println(authenticationToken.getCredentials());
- Admin adminInfo = new Admin();
- adminInfo.setUsername("long");
- adminInfo.setPassword("longzhonghua");
- adminInfo.setSalt("yan");
- SimpleAuthenticationInfo info = new SimpleAuthenticationInfo(
- adminInfo,adminInfo.getPassword(),
- ByteSource.Util.bytes(adminInfo.getSalt()),
- getName()
- );
- return info;
- }
- }
复制代码 2.3 将shiro注入到spring容器中
- package com.intehel.demo.config;
- import com.intehel.demo.realm.CustomerRealm;
- import org.apache.shiro.spring.security.interceptor.AuthorizationAttributeSourceAdvisor;
- import org.apache.shiro.spring.web.ShiroFilterFactoryBean;
- import org.apache.shiro.web.mgt.DefaultWebSecurityManager;
- import org.springframework.aop.framework.autoproxy.DefaultAdvisorAutoProxyCreator;
- import org.springframework.boot.autoconfigure.condition.ConditionalOnMissingBean;
- import org.springframework.context.annotation.Bean;
- import org.springframework.context.annotation.Configuration;
- import org.apache.shiro.mgt.SecurityManager;
- import java.util.HashMap;
- import java.util.Map;
- @Configuration
- public class ShiroConfig {
- @Bean
- @ConditionalOnMissingBean
- public DefaultAdvisorAutoProxyCreator defaultAdvisorAutoProxyCreator() {
- DefaultAdvisorAutoProxyCreator defaultAdvisorAutoProxyCreator = new DefaultAdvisorAutoProxyCreator();
- defaultAdvisorAutoProxyCreator.setProxyTargetClass(true);
- return defaultAdvisorAutoProxyCreator;
- }
- // 将自己验证的方式加入到容器中
- @Bean
- public CustomerRealm customRealm() {
- CustomerRealm customRealm = new CustomerRealm();
- return customRealm;
- }
- //权限管理,配置主要是Realm的管理认证
- @Bean
- public SecurityManager securityManager() {
- DefaultWebSecurityManager defaultSecurityManager = new DefaultWebSecurityManager ();
- defaultSecurityManager.setRealm(customRealm());
- return defaultSecurityManager;
- }
- @Bean
- public ShiroFilterFactoryBean shiroFilterFactoryBean(SecurityManager securityManager) {
- ShiroFilterFactoryBean shiroFilterFactoryBean = new ShiroFilterFactoryBean();
- shiroFilterFactoryBean.setSecurityManager(securityManager);
- Map<String,String> map = new HashMap<>();
- // 登出
- map.put("/logout","logout");
- // 对所有用户进行认证
- map.put("/**","authc");
- //登录
- shiroFilterFactoryBean.setLoginUrl("/login");
- // 首页
- shiroFilterFactoryBean.setSuccessUrl("/index");
- // 错误页面 认证不通过跳转
- shiroFilterFactoryBean.setUnauthorizedUrl("/error");
- shiroFilterFactoryBean.setFilterChainDefinitionMap(map);
- return shiroFilterFactoryBean;
- }
- @Bean
- public AuthorizationAttributeSourceAdvisor authorizationAttributeSourceAdvisor(SecurityManager securityManager) {
- AuthorizationAttributeSourceAdvisor authorizationAttributeSourceAdvisor = new AuthorizationAttributeSourceAdvisor();
- authorizationAttributeSourceAdvisor.setSecurityManager(securityManager);
- return authorizationAttributeSourceAdvisor;
- }
- }
复制代码 2.4 编写控制层
- package com.intehel.demo.controller;
- import com.intehel.demo.domain.Admin;
- import lombok.extern.slf4j.Slf4j;
- import org.apache.commons.lang3.StringUtils;
- import org.apache.shiro.SecurityUtils;
- import org.apache.shiro.authc.AuthenticationException;
- import org.apache.shiro.authc.UnknownAccountException;
- import org.apache.shiro.authc.UsernamePasswordToken;
- import org.apache.shiro.authz.AuthorizationException;
- import org.apache.shiro.authz.annotation.RequiresPermissions;
- import org.apache.shiro.authz.annotation.RequiresRoles;
- import org.apache.shiro.subject.Subject;
- import org.springframework.web.bind.annotation.GetMapping;
- import org.springframework.web.bind.annotation.RestController;
- @RestController
- @Slf4j
- public class LoginController {
- @GetMapping("/login")
- public String login(Admin user) {
- if(StringUtils.isEmpty(user.getUsername()) || StringUtils.isEmpty(user.getPassword())) {
- return "请输入用户名和密码";
- }
- // 用户认证信息
- Subject subject = SecurityUtils.getSubject();
- UsernamePasswordToken usernamePasswordToken = new UsernamePasswordToken(user.getUsername(),user.getPassword());
- try {
- // 进行验证,这里可以捕获异常,然后返回对应信息
- subject.login(usernamePasswordToken);
- }catch (UnknownAccountException e) {
- log.error("用户名不存在",e);
- return "用户名不存在";
- } catch (AuthenticationException e) {
- log.error("账号或者密码错误!",e);
- return "账号或者密码错误!";
- } catch (AuthorizationException e) {
- log.error("没有权限!",e);
- return "没有权限";
- }
- return "login success";
- }
- @RequiresRoles("admin")
- @GetMapping("/admin")
- public String admin() {
- return "admin Success!";
- }
- @RequiresPermissions("query")
- @GetMapping("/index")
- public String index() {
- return "index success";
- }
- @RequiresPermissions("add")
- @GetMapping("/add")
- public String add() {
- return "add success";
- }
- }
复制代码 2.5 测试权限
(1)向sql中插入数据
- INSERT INTO `admin` (`id`, `name`, `password`, `salt`, `state`, `username`) VALUES (1, '管理员', '32baebda76498588dabf64c6e8984097', 'yan', 0, 'long');
- INSERT INTO `sys_permission` (`id`, `avaliable`, `name`, `parent_id`, `parent_ids`, `permission`, `resource_type`, `url`) VALUES (1, b'0', '用户管理', 0, '0/', 'admin:view', 'menu', 'admin/list');
- INSERT INTO `sys_permission` (`id`, `avaliable`, `name`, `parent_id`, `parent_ids`, `permission`, `resource_type`, `url`) VALUES (2, b'0', '用户添加', 1, '0/1', 'admin:add', 'button', 'admin/add');
- INSERT INTO `sys_permission` (`id`, `avaliable`, `name`, `parent_id`, `parent_ids`, `permission`, `resource_type`, `url`) VALUES (3, b'0', '用户删除', 1, '0/1', 'admin:del', 'button', 'admin/del');
- INSERT INTO `sys_role` (`id`, `available`, `description`, `role`) VALUES (1, b'0', '管理员', 'admin');
- INSERT INTO `sys_role_permission` (`role_id`, `permission_id`) VALUES (1, 1);
- INSERT INTO `sys_role_permission` (`role_id`, `permission_id`) VALUES (1, 2);
- INSERT INTO `sys_role_permission` (`role_id`, `permission_id`) VALUES (1, 3);
- INSERT INTO `sys_user_role` (`role_id`, `uid`) VALUES (1, 1);
复制代码 (2)测试登录

2.6 对比 Spring Security 与 Shiro
(1)Shiro的特点
- 功能强大,且简单、灵活。
- 拥有易于理解的API。
- 简单的身份认证(登录),支持多种数据源(LDAP、JDBC、Kerberos、ActiveDirectory等)。
- 支持对角色的简单签权,并且支持细粒度的签权。
- 支持一级缓存,以提升应用程序的性能。
- 内置的基于POJO会话管理,适用于Web,以及非Web环境。
- 不跟任何的框架或容器捆绑,可以独立运行。
(2)Spring Security 的特点。
- Shiro的功能它都有
- 对防止CSRF跨站、XSS跨站脚本可以很好地实现,对Oauth、OpenlD也有支持。Shiro 则需要开发者自己手动实现。
- 因为Spring Security是Spring自己的产品,所以对Spring的支持极好,但也正是因为这个,所以仅仅支持自己的产品,导致其捆绑到了 Spring框架,而不支持其他框架。
- Spring Security的权限细粒度更高(这不是绝对的,Shiro也可以实现)。
免责声明:如果侵犯了您的权益,请联系站长,我们会及时删除侵权内容,谢谢合作! |