Shiro不依赖容器,直接创建一个Maven工程即可,添加Shiro相关依赖。
<dependency>
<groupId>org.apache.shirogroupId>
<artifactId>shiro-coreartifactId>
<version>1.9.0version>
dependency>
<dependency>
<groupId>commons-logginggroupId>
<artifactId>commons-loggingartifactId>
<version>1.2version>
dependency>
Shiro获取权限相关信息可以通过数据库获取,也可以通过ini配置文件获取,这里使用ini配置文件,在resources目录下创建shiro.ini文件,其中users要小写,key-value分别代表用户名-密码。
[users]
zhangsan=z3
lisi=l4
org.apache.shiro.realm.AuthenticatingRealm类,实现doGetAuthenticationInfo()方法
package com.demo.demo;
import org.apache.shiro.SecurityUtils;
import org.apache.shiro.authc.*;
import org.apache.shiro.config.IniSecurityManagerFactory;
import org.apache.shiro.mgt.SecurityManager;
import org.apache.shiro.subject.Subject;
public class Demo {
public static void main(String[] args) {
// 初试化获取SecurityManager
IniSecurityManagerFactory iniSecurityManagerFactory = new IniSecurityManagerFactory("classpath:shiro.ini");
SecurityManager securityManager = iniSecurityManagerFactory.getInstance();
SecurityUtils.setSecurityManager(securityManager);
// 获取Subject对象
Subject subject = SecurityUtils.getSubject();
// 创建token对象,web应用的用户名密码可以从页面传递
AuthenticationToken authenticationToken = new UsernamePasswordToken("zhangsan", "z3");
// AuthenticationToken authenticationToken = new UsernamePasswordToken("zhangsan123", "z3");// 触发UnknownAccountException
// AuthenticationToken authenticationToken = new UsernamePasswordToken("zhangsan", "z4");// 触发IncorrectCredentialsException
// 完成登录
try {
subject.login(authenticationToken);
System.out.println("登录成功");
} catch (UnknownAccountException e) {
e.printStackTrace();
System.out.println("用户不存在");
} catch (IncorrectCredentialsException e) {
e.printStackTrace();
System.out.println("密码错误");
} catch (AuthenticationException e) {
e.printStackTrace();
}
}
}
在生产环境中,更多的还是通过数据库记录这些用户信息,所以这里再加一种通过数据库来验证用户名密码,所以这里加上这种方式。
创建数据表,表名必须叫user,添加两个字段:username和password,不能叫别的名字,否则会对不上,这就是规定,记住即可。后面还会有user_role表和role_permission表,同样也有一些规定写法。
SET NAMES utf8mb4;
SET FOREIGN_KEY_CHECKS = 0;
-- ----------------------------
-- Table structure for role_permission
-- ----------------------------
DROP TABLE IF EXISTS `role_permission`;
CREATE TABLE `role_permission` (
`id` bigint(20) NOT NULL AUTO_INCREMENT,
`role_name` varchar(100) CHARACTER SET utf8 COLLATE utf8_general_ci NULL DEFAULT NULL,
`permission` varchar(100) CHARACTER SET utf8 COLLATE utf8_general_ci NULL DEFAULT NULL,
PRIMARY KEY (`id`) USING BTREE,
UNIQUE INDEX `idx_role_permission`(`role_name`, `permission`) USING BTREE
) ENGINE = InnoDB AUTO_INCREMENT = 7 CHARACTER SET = utf8 COLLATE = utf8_general_ci ROW_FORMAT = Dynamic;
-- ----------------------------
-- Records of role_permission
-- ----------------------------
INSERT INTO `role_permission` VALUES (2, 'role1', 'video:get');
INSERT INTO `role_permission` VALUES (1, 'role1', 'video:list');
INSERT INTO `role_permission` VALUES (3, 'role2', 'video:*');
INSERT INTO `role_permission` VALUES (4, 'role3', '*');
INSERT INTO `role_permission` VALUES (5, 'role4', '*');
-- ----------------------------
-- Table structure for user_role
-- ----------------------------
DROP TABLE IF EXISTS `user_role`;
CREATE TABLE `user_role` (
`id` bigint(20) NOT NULL AUTO_INCREMENT,
`username` varchar(100) CHARACTER SET utf8 COLLATE utf8_general_ci NULL DEFAULT NULL,
`role_name` varchar(100) CHARACTER SET utf8 COLLATE utf8_general_ci NULL DEFAULT NULL,
PRIMARY KEY (`id`) USING BTREE,
UNIQUE INDEX `idx_user_role`(`username`, `role_name`) USING BTREE
) ENGINE = InnoDB AUTO_INCREMENT = 5 CHARACTER SET = utf8 COLLATE = utf8_general_ci ROW_FORMAT = Dynamic;
-- ----------------------------
-- Records of user_role
-- ----------------------------
INSERT INTO `user_role` VALUES (1, 'username1', 'role1');
INSERT INTO `user_role` VALUES (2, 'username1', 'role2');
INSERT INTO `user_role` VALUES (3, 'username2', 'role3');
INSERT INTO `user_role` VALUES (4, 'username2', 'role4');
-- ----------------------------
-- Table structure for user
-- ----------------------------
DROP TABLE IF EXISTS `user`;
CREATE TABLE `user` (
`id` bigint(20) NOT NULL AUTO_INCREMENT,
`username` varchar(100) CHARACTER SET utf8 COLLATE utf8_general_ci NULL DEFAULT NULL,
`password` varchar(100) CHARACTER SET utf8 COLLATE utf8_general_ci NULL DEFAULT NULL,
`password_salt` varchar(100) CHARACTER SET utf8 COLLATE utf8_general_ci NULL DEFAULT NULL,
PRIMARY KEY (`id`) USING BTREE,
UNIQUE INDEX `idx_user_username`(`username`) USING BTREE
) ENGINE = InnoDB AUTO_INCREMENT = 3 CHARACTER SET = utf8 COLLATE = utf8_general_ci ROW_FORMAT = Dynamic;
-- ----------------------------
-- Records of user
-- ----------------------------
INSERT INTO `user` VALUES (1, 'username1', 'password1', NULL);
INSERT INTO `user` VALUES (2, 'username2', 'username2', NULL);
SET FOREIGN_KEY_CHECKS = 1;
然后,添加几条测试数据,回到代码开发环境,添加pom依赖。
<dependency>
<groupId>org.apache.shirogroupId>
<artifactId>shiro-coreartifactId>
<version>1.2.4version>
dependency>
<dependency>
<groupId>org.slf4jgroupId>
<artifactId>slf4j-log4j12artifactId>
<version>1.7.13version>
dependency>
<dependency>
<groupId>c3p0groupId>
<artifactId>c3p0artifactId>
<version>0.9.1.2version>
dependency>
<dependency>
<groupId>mysqlgroupId>
<artifactId>mysql-connector-javaartifactId>
<version>8.0.18version>
dependency>
<dependency>
<groupId>commons-logginggroupId>
<artifactId>commons-loggingartifactId>
<version>1.2version>
dependency>
新建jdbc.ini。
[main]
#注意 文件格式必须为ini,编码为ANSI
#声明Realm,指定realm类型
jdbcRealm=org.apache.shiro.realm.jdbc.JdbcRealm
#配置数据源
dataSource=com.mchange.v2.c3p0.ComboPooledDataSource
# mysql-connector-java 5用的驱动url是com.mysql.jdbc.Driver,mysql-connector-java 6以后用的是com.mysql.cj.jdbc.Driver
dataSource.driverClass=com.mysql.cj.jdbc.Driver
#避免安全警告
dataSource.jdbcUrl=jdbc:mysql://127.0.0.1:3306/demo?characterEncoding=UTF-8&serverTimezone=UTC&useSSL=false
dataSource.user=root
dataSource.password=root
#指定数据源
jdbcRealm.dataSource=$dataSource
#开启查找权限
jdbcRealm.permissionsLookupEnabled=true
#指定SecurityManager的Realms实现,设置realms,可以有多个,用逗号隔开
securityManager.realms=$jdbcRealm
然后是Java代码,用于测试。
package com.demo.demo;
import org.apache.shiro.SecurityUtils;
import org.apache.shiro.authc.AuthenticationException;
import org.apache.shiro.authc.UsernamePasswordToken;
import org.apache.shiro.config.IniSecurityManagerFactory;
import org.apache.shiro.mgt.SecurityManager;
import org.apache.shiro.subject.Subject;
import org.apache.shiro.util.Factory;
public class Demo {
public static void main(String[] args) {
// 获取SecurityManager工厂,此处使用Ini配置文件初始化SecurityManager
Factory<SecurityManager> factory = new IniSecurityManagerFactory("classpath:jdbc.ini");
// 获得SecurityManager实例
SecurityManager securityManager = factory.getInstance();
// 绑定给SecurityUtils
SecurityUtils.setSecurityManager(securityManager);
// 得到Subject及创建用户名/密码身份验证Token(即用户身份/凭证)
Subject subject= SecurityUtils.getSubject();
UsernamePasswordToken token = new UsernamePasswordToken("zhangsan", "z3");
try {
subject.login(token);
System.out.println("Succeed!");
} catch (AuthenticationException e) {
e.printStackTrace();
System.out.println("Fail!");
}
subject.logout();
}
}
if (subject.hasRole("admin")) {
} else {
}
@RequiredRoles("admin")
public void function() {
}
<shiro:hasRole name="admin">
shiro:hasRole>
Subject.isPermitted*/hasRole*接口,其会委托给SecurityManager,而SecurityManager接着会委托给AuthorizerisPermitted(“user:view”),其首先会通过PermissionResolver把字符串转换成相应的Permission实例isPermitted*/hasRole*会返回true,否则返回false表示授权失败
subject.login(authenticationToken),点进去,找到this.securityManager.login()方法,也就是将认证流程交给securityManager来处理了,点进去,找到authenticate()方法,点进去,找到AbstractAuthenticator类的authenticate()方法里的doAuthenticate(),点进去,就看到了熟悉的Realm,这里会分单个Realm和多个Realm,我们点击doSingleRealmAuthentication()方法,点击realm.getAuthenticationInfo()方法,点击this.doGetAuthenticationInfo()方法的实现,就来到了我们自定义Realm里的doGetAuthenticationInfo()方法。在ini文件里,给用户添加角色。
[users]
zhangsan=z3,role1,role2
lisi=l4
在代码里通过subject.hasRole("role1")来判断用户是否拥有角色。
在ini文件里,给角色添加权限。
[users]
zhangsan=z3,role1,role2
lisi=l4
[roles]
role1=user:insert,user:select
在代码里通过subject.isPermitted("user:insert")判断用户是否有权限,还可以通过subject.checkPermission("user:select")来判断,如果有权限,正常执行,如果没有权限,会抛异常。
实际系统开发中,一些敏感信息需要进行加密,比如说用户的密码。Shiro内嵌很多常用的加密算法,比如MD5加密。Shiro可以很简单的使用信息加密。
package com.demo.demo;
import org.apache.shiro.crypto.hash.Md5Hash;
import org.apache.shiro.crypto.hash.SimpleHash;
public class ShiroEncryption {
public static void main(String[] args) {
String password = "password";// 密码明文
System.out.println(new Md5Hash(password));// md5加密
System.out.println(new Md5Hash(password, "salt"));// md5加盐加密
System.out.println(new Md5Hash(password, "salt", 3));// md5加盐迭代加密
System.out.println(new SimpleHash("MD5", password, "salt", 3));// 父类md5加盐迭代加密
}
}
看了看SimpleHash的子类,有:Md2Hash、Sha512Hash、Sha384Hash、Md5Hash、Sha256Hash、Sha1Hash。
Shiro默认的登录认证是不带加密的,如果想要实现加密认证需要自定义登录认证,自定义Realm继承AuthenticatingRealm并重写doGetAuthenticationInfo方法。
目前,没有集成SpringBoot,所以,配置信息,还要在ini文件里写,我们自定义了Realm,就要告诉Shiro,使用自定义的Realm,这个配置是写在ini文件里的。
还是要回到刚才的Demo.java。
package com.demo.demo;
import org.apache.shiro.SecurityUtils;
import org.apache.shiro.authc.*;
import org.apache.shiro.config.IniSecurityManagerFactory;
import org.apache.shiro.mgt.SecurityManager;
import org.apache.shiro.subject.Subject;
public class Demo {
public static void main(String[] args) {
// 初试化获取SecurityManager
IniSecurityManagerFactory iniSecurityManagerFactory = new IniSecurityManagerFactory("classpath:shiro.ini");
SecurityManager securityManager = iniSecurityManagerFactory.getInstance();
SecurityUtils.setSecurityManager(securityManager);
// 获取Subject对象
Subject subject = SecurityUtils.getSubject();
// 创建token对象,web应用的用户名密码可以从页面传递
AuthenticationToken authenticationToken = new UsernamePasswordToken("username1", "password1");
// AuthenticationToken authenticationToken = new UsernamePasswordToken("zhangsan123", "z3");// 触发UnknownAccountException
// AuthenticationToken authenticationToken = new UsernamePasswordToken("zhangsan", "z4");// 触发IncorrectCredentialsException
// 完成登录
try {
subject.login(authenticationToken);
System.out.println("登录成功");
} catch (UnknownAccountException e) {
e.printStackTrace();
System.out.println("用户不存在");
} catch (IncorrectCredentialsException e) {
e.printStackTrace();
System.out.println("密码错误");
} catch (AuthenticationException e) {
e.printStackTrace();
}
}
}
编写自己的实现类MyRealm.java
package com.demo.demo;
import org.apache.shiro.authc.AuthenticationException;
import org.apache.shiro.authc.AuthenticationInfo;
import org.apache.shiro.authc.AuthenticationToken;
import org.apache.shiro.authc.SimpleAuthenticationInfo;
import org.apache.shiro.realm.AuthenticatingRealm;
import org.apache.shiro.util.ByteSource;
public class MyRealm extends AuthenticatingRealm {
@Override
protected AuthenticationInfo doGetAuthenticationInfo(AuthenticationToken authenticationToken) throws AuthenticationException {
// 获取身份信息
String principal = authenticationToken.getPrincipal().toString();
// 获取凭证信息
String credentials = new String((char[]) authenticationToken.getCredentials());
System.out.println("要验证的用户名:" + principal + ",要验证的密码:" + credentials);
// 获取数据库信息
String passwordFromDB = "68e63f21326b3c358bb018102724820c";// new Md5Hash("password1", "salt", 3)// 根据principle查库里加密的密码
return new SimpleAuthenticationInfo(principal, passwordFromDB, ByteSource.Util.bytes("salt"), principal);
}
}
编写ini配置文件
[main]
md5CredentialsMatcher=org.apache.shiro.authc.credential.Md5CredentialsMatcher
md5CredentialsMatcher.hashIterations=3
myRealm=com.demo.demo.MyRealm
myRealm.credentialsMatcher=$md5CredentialsMatcher
securityManager.realms=$myRealm
最后运行Demo.java测试效果,发现程序已经走了我们自定义的验证类:MyRealm.java。