点击关注公众号,Java干货及时送达

1. 前言

Apache Shiro是一个功能强大且易于使用的Java安全框架,提供了认证,授权,加密,和会话管理。

Shiro有三大核心组件:

Subject:即当前用户,在权限管理的应用程序里往往需要知道谁能够操作什么,谁拥有操作该程序的权利,shiro中则需要通过Subject来提供基础的当前用户信息,Subject 不仅仅代表某个用户,与当前应用交互的任何东西都是Subject,如网络爬虫等。所有的Subject都要绑定到SecurityManager上,与Subject的交互实际上是被转换为与SecurityManager的交互。

SecurityManager:即所有Subject的管理者,这是Shiro框架的核心组件,可以把他看做是一个Shiro框架的全局管理组件,用于调度各种Shiro框架的服务。作用类似于SpringMVC中的DispatcherServlet,用于拦截所有请求并进行处理。

Realm:Realm是用户的信息认证器和用户的权限人证器,我们需要自己来实现Realm来自定义的管理我们自己系统内部的权限规则。SecurityManager要验证用户,需要从Realm中获取用户。可以把Realm看做是数据源。

2. 数据库设计

2.1 User(用户)

SET NAMES utf8mb4;
SET FOREIGN_KEY_CHECKS = 0;-- ----------------------------
-- Table structure for user
-- ----------------------------
DROP TABLE IF EXISTS `user`;
CREATE TABLE `user`  (`id` bigint(20) NOT NULL AUTO_INCREMENT,`password` varchar(255) CHARACTER SET utf8 COLLATE utf8_general_ci NULL DEFAULT NULL,`username` varchar(255) CHARACTER SET utf8 COLLATE utf8_general_ci NULL DEFAULT NULL,`account` varchar(255) CHARACTER SET utf8 COLLATE utf8_general_ci NULL DEFAULT NULL,PRIMARY KEY (`id`) USING BTREE
) ENGINE = MyISAM AUTO_INCREMENT = 4 CHARACTER SET = utf8 COLLATE = utf8_general_ci ROW_FORMAT = Dynamic;-- ----------------------------
-- Records of user
-- ----------------------------
INSERT INTO `user` VALUES (1, 'root', '超级用户', 'root');
INSERT INTO `user` VALUES (2, 'user', '普通用户', 'user');
INSERT INTO `user` VALUES (3, 'vip', 'VIP用户', 'vip');SET FOREIGN_KEY_CHECKS = 1;

2.2 Role(角色)

SET NAMES utf8mb4;
SET FOREIGN_KEY_CHECKS = 0;-- ----------------------------
-- Table structure for role
-- ----------------------------
DROP TABLE IF EXISTS `role`;
CREATE TABLE `role`  (`id` int(11) NOT NULL AUTO_INCREMENT,`role` varchar(255) CHARACTER SET utf8 COLLATE utf8_general_ci NULL DEFAULT NULL,`desc` varchar(255) CHARACTER SET utf8 COLLATE utf8_general_ci NULL DEFAULT NULL,PRIMARY KEY (`id`) USING BTREE
) ENGINE = MyISAM AUTO_INCREMENT = 4 CHARACTER SET = utf8 COLLATE = utf8_general_ci ROW_FORMAT = Dynamic;-- ----------------------------
-- Records of role
-- ----------------------------
INSERT INTO `role` VALUES (1, 'admin', '超级管理员');
INSERT INTO `role` VALUES (2, 'user', '普通用户');
INSERT INTO `role` VALUES (3, 'vip_user', 'VIP用户');SET FOREIGN_KEY_CHECKS = 1;

2.3 Permission(权限)

SET NAMES utf8mb4;
SET FOREIGN_KEY_CHECKS = 0;-- ----------------------------
-- Table structure for permission
-- ----------------------------
DROP TABLE IF EXISTS `permission`;
CREATE TABLE `permission`  (`id` int(11) NOT NULL AUTO_INCREMENT,`permission` varchar(255) CHARACTER SET utf8 COLLATE utf8_general_ci NULL DEFAULT NULL COMMENT '权限名称',`desc` varchar(255) CHARACTER SET utf8 COLLATE utf8_general_ci NULL DEFAULT NULL COMMENT '权限描述',PRIMARY KEY (`id`) USING BTREE
) ENGINE = MyISAM AUTO_INCREMENT = 5 CHARACTER SET = utf8 COLLATE = utf8_general_ci ROW_FORMAT = Dynamic;-- ----------------------------
-- Records of permission
-- ----------------------------
INSERT INTO `permission` VALUES (1, 'add', '增加');
INSERT INTO `permission` VALUES (2, 'update', '更新');
INSERT INTO `permission` VALUES (3, 'select', '查看');
INSERT INTO `permission` VALUES (4, 'delete', '删除');SET FOREIGN_KEY_CHECKS = 1;

2.4 User_Role(用户-角色)

SET NAMES utf8mb4;
SET FOREIGN_KEY_CHECKS = 0;-- ----------------------------
-- Table structure for user_role
-- ----------------------------
DROP TABLE IF EXISTS `user_role`;
CREATE TABLE `user_role`  (`id` int(11) NOT NULL AUTO_INCREMENT,`user_id` int(11) NULL DEFAULT NULL,`role_id` int(11) NULL DEFAULT NULL,PRIMARY KEY (`id`) USING BTREE
) ENGINE = MyISAM AUTO_INCREMENT = 4 CHARACTER SET = utf8 COLLATE = utf8_general_ci ROW_FORMAT = Fixed;-- ----------------------------
-- Records of user_role
-- ----------------------------
INSERT INTO `user_role` VALUES (1, 1, 1);
INSERT INTO `user_role` VALUES (2, 2, 2);
INSERT INTO `user_role` VALUES (3, 3, 3);SET FOREIGN_KEY_CHECKS = 1;

2.5 Role_Permission(角色-权限)

SET NAMES utf8mb4;
SET FOREIGN_KEY_CHECKS = 0;-- ----------------------------
-- Table structure for role_permission
-- ----------------------------
DROP TABLE IF EXISTS `role_permission`;
CREATE TABLE `role_permission`  (`id` int(11) NOT NULL AUTO_INCREMENT,`role_id` int(11) NULL DEFAULT NULL,`permission_id` int(255) NULL DEFAULT NULL,PRIMARY KEY (`id`) USING BTREE
) ENGINE = MyISAM AUTO_INCREMENT = 9 CHARACTER SET = utf8 COLLATE = utf8_general_ci ROW_FORMAT = Fixed;-- ----------------------------
-- Records of role_permission
-- ----------------------------
INSERT INTO `role_permission` VALUES (1, 1, 1);
INSERT INTO `role_permission` VALUES (2, 1, 2);
INSERT INTO `role_permission` VALUES (3, 1, 3);
INSERT INTO `role_permission` VALUES (4, 1, 4);
INSERT INTO `role_permission` VALUES (5, 2, 3);
INSERT INTO `role_permission` VALUES (6, 3, 3);
INSERT INTO `role_permission` VALUES (7, 3, 2);
INSERT INTO `role_permission` VALUES (8, 2, 1);SET FOREIGN_KEY_CHECKS = 1;
3. 项目结构

4. 前期准备

4.1 导入Pom

<dependency><groupId>org.springframework.boot</groupId><artifactId>spring-boot-starter-web</artifactId>
</dependency><dependency><groupId>mysql</groupId><artifactId>mysql-connector-java</artifactId>
</dependency><dependency><groupId>org.mybatis.spring.boot</groupId><artifactId>mybatis-spring-boot-starter</artifactId><version>1.3.2</version>
</dependency><dependency><groupId>org.apache.shiro</groupId><artifactId>shiro-spring</artifactId><version>1.4.0</version>
</dependency>

4.2 application.yml

server:port: 8903
spring:application:name: lab-userdatasource:driver-class-name: com.mysql.jdbc.Driverurl: jdbc:mysql://127.0.0.1:3306/laboratory?charset=utf8username: rootpassword: root
mybatis:type-aliases-package: cn.ntshare.laboratory.entitymapper-locations: classpath:mapper/*.xmlconfiguration:map-underscore-to-camel-case: true

4.3 实体类

4.3.1 User.java
@Data
@ToString
public class User implements Serializable {private static final long serialVersionUID = -6056125703075132981L;private Integer id;private String account;private String password;private String username;
}
4.3.2 Role.java
@Data
@ToString
public class Role implements Serializable {private static final long serialVersionUID = -1767327914553823741L;private Integer id;private String role;private String desc;
}
4.4 Dao层
4.4.1 PermissionMapper.java
@Mapper
@Repository
public interface PermissionMapper {List<String> findByRoleId(@Param("roleIds") List<Integer> roleIds);
}
4.4.2 PermissionMapper.xml
<mapper namespace="cn.ntshare.laboratory.dao.PermissionMapper"><sql id="base_column_list">id, permission, desc</sql><select id="findByRoleId" parameterType="List" resultType="String">select permissionfrom permission, role_permission rpwhere rp.permission_id = permission.id and rp.role_id in<foreach collection="roleIds" item="id" open="(" close=")" separator=",">#{id}</foreach></select>
</mapper>
4.4.3 RoleMapper.java
@Mapper
@Repository
public interface RoleMapper {List<Role> findRoleByUserId(@Param("userId") Integer userId);
}
4.4.4 RoleMapper.xml
<mapper namespace="cn.ntshare.laboratory.dao.RoleMapper"><sql id="base_column_list">id, user_id, role_id</sql><select id="findRoleByUserId" parameterType="Integer" resultType="Role">select role.id, rolefrom role, user, user_role urwhere role.id = ur.role_id and ur.user_id = user.id and user.id = #{userId}</select>
</mapper>
4.4.5 UserMapper.java
@Mapper
@Repository
public interface UserMapper {User findByAccount(@Param("account") String account);
}
4.4.6 UserMapper.xml
<mapper namespace="cn.ntshare.laboratory.dao.UserMapper"><sql id="base_column_list">id, account, password, username</sql><select id="findByAccount" parameterType="Map" resultType="User">select<include refid="base_column_list"/>from userwhere account = #{account}</select>
</mapper>

4.5 Service层

4.5.1 PermissionServiceImpl.java
@Service
public class PermissionServiceImpl implements PermissionService {@Autowiredprivate PermissionMapper permissionMapper;@Overridepublic List<String> findByRoleId(List<Integer> roleIds) {return permissionMapper.findByRoleId(roleIds);}
}
4.5.2 RoleServiceImpl.java
@Service
public class RoleServiceImpl implements RoleService {@Autowiredprivate RoleMapper roleMapper;@Overridepublic List<Role> findRoleByUserId(Integer id) {return roleMapper.findRoleByUserId(id);}
}
4.5.3 UserServiceImpl.java
@Service
public class UserServiceImpl implements UserService {@Autowiredprivate UserMapper userMapper;@Overridepublic User findByAccount(String account) {return userMapper.findByAccount(account);}
}

4.6. 系统返回状态枚举与包装函数

4.6.1 ServerResponseEnum.java
@AllArgsConstructor
@Getter
public enum ServerResponseEnum {SUCCESS(0, "成功"),ERROR(10, "失败"),ACCOUNT_NOT_EXIST(11, "账号不存在"),DUPLICATE_ACCOUNT(12, "账号重复"),ACCOUNT_IS_DISABLED(13, "账号被禁用"),INCORRECT_CREDENTIALS(14, "账号或密码错误"),NOT_LOGIN_IN(15, "账号未登录"),UNAUTHORIZED(16, "没有权限");Integer code;String message;
}
4.6.2 ServerResponseVO.java
@Getter
@Setter
@NoArgsConstructor
public class ServerResponseVO<T> implements Serializable {private static final long serialVersionUID = -1005863670741860901L;// 响应码private Integer code;// 描述信息private String message;// 响应内容private T data;private ServerResponseVO(ServerResponseEnum responseCode) {this.code = responseCode.getCode();this.message = responseCode.getMessage();}private ServerResponseVO(ServerResponseEnum responseCode, T data) {this.code = responseCode.getCode();this.message = responseCode.getMessage();this.data = data;}private ServerResponseVO(Integer code, String message) {this.code = code;this.message = message;}/*** 返回成功信息* @param data 信息内容* @param <T>* @return*/public static<T> ServerResponseVO success(T data) {return new ServerResponseVO<>(ServerResponseEnum.SUCCESS, data);}/*** 返回成功信息* @return*/public static ServerResponseVO success() {return new ServerResponseVO(ServerResponseEnum.SUCCESS);}/*** 返回错误信息* @param responseCode 响应码* @return*/public static ServerResponseVO error(ServerResponseEnum responseCode) {return new ServerResponseVO(responseCode);}
}

4.7 统一异常处理

当用户身份认证失败时,会抛出UnauthorizedException,我们可以通过统一异常处理来处理该异常

@RestControllerAdvice
public class UserExceptionHandler {@ExceptionHandler(UnauthorizedException.class)@ResponseStatus(HttpStatus.UNAUTHORIZED)public ServerResponseVO UnAuthorizedExceptionHandler(UnauthorizedException e) {return ServerResponseVO.error(ServerResponseEnum.UNAUTHORIZED);}
}

5. 集成Shiro

5.1 UserRealm.java

/*** 负责认证用户身份和对用户进行授权*/
public class UserRealm extends AuthorizingRealm {@Autowiredprivate UserService userService;@Autowiredprivate RoleService roleService;@Autowiredprivate PermissionService permissionService;// 用户授权protected AuthorizationInfo doGetAuthorizationInfo(PrincipalCollection principalCollection) {User user = (User) principalCollection.getPrimaryPrincipal();SimpleAuthorizationInfo authorizationInfo = new SimpleAuthorizationInfo();List<Role> roleList = roleService.findRoleByUserId(user.getId());Set<String> roleSet = new HashSet<>();List<Integer> roleIds = new ArrayList<>();for (Role role : roleList) {roleSet.add(role.getRole());roleIds.add(role.getId());}// 放入角色信息authorizationInfo.setRoles(roleSet);// 放入权限信息List<String> permissionList = permissionService.findByRoleId(roleIds);authorizationInfo.setStringPermissions(new HashSet<>(permissionList));return authorizationInfo;}// 用户认证protected AuthenticationInfo doGetAuthenticationInfo(AuthenticationToken authToken) throws AuthenticationException {UsernamePasswordToken token = (UsernamePasswordToken) authToken;User user = userService.findByAccount(token.getUsername());if (user == null) {return null;}return new SimpleAuthenticationInfo(user, user.getPassword(), getName());}
}

5.2 ShiroConfig.java

@Configuration
public class ShiroConfig {@Beanpublic UserRealm userRealm() {return new UserRealm();}@Beanpublic DefaultWebSecurityManager securityManager() {DefaultWebSecurityManager securityManager = new DefaultWebSecurityManager();securityManager.setRealm(userRealm());return securityManager;}/*** 路径过滤规则* @return*/@Beanpublic ShiroFilterFactoryBean shiroFilter(DefaultWebSecurityManager securityManager) {ShiroFilterFactoryBean shiroFilterFactoryBean = new ShiroFilterFactoryBean();shiroFilterFactoryBean.setSecurityManager(securityManager);shiroFilterFactoryBean.setLoginUrl("/login");shiroFilterFactoryBean.setSuccessUrl("/");Map<String, String> map = new LinkedHashMap<>();// 有先后顺序map.put("/login", "anon"); // 允许匿名访问map.put("/**", "authc"); // 进行身份认证后才能访问shiroFilterFactoryBean.setFilterChainDefinitionMap(map);return shiroFilterFactoryBean;}/*** 开启Shiro注解模式,可以在Controller中的方法上添加注解* @param securityManager* @return*/@Beanpublic AuthorizationAttributeSourceAdvisor authorizationAttributeSourceAdvisor(@Qualifier("securityManager") DefaultSecurityManager securityManager) {AuthorizationAttributeSourceAdvisor authorizationAttributeSourceAdvisor = new AuthorizationAttributeSourceAdvisor();authorizationAttributeSourceAdvisor.setSecurityManager(securityManager);return authorizationAttributeSourceAdvisor;}

5.3 LoginController.java

@RestController
@RequestMapping("")
public class LoginController {@PostMapping("/login")public ServerResponseVO login(@RequestParam(value = "account") String account,@RequestParam(value = "password") String password) {Subject userSubject = SecurityUtils.getSubject();UsernamePasswordToken token = new UsernamePasswordToken(account, password);try {// 登录验证userSubject.login(token);return ServerResponseVO.success();} catch (UnknownAccountException e) {return ServerResponseVO.error(ServerResponseEnum.ACCOUNT_NOT_EXIST);} catch (DisabledAccountException e) {return ServerResponseVO.error(ServerResponseEnum.ACCOUNT_IS_DISABLED);} catch (IncorrectCredentialsException e) {return ServerResponseVO.error(ServerResponseEnum.INCORRECT_CREDENTIALS);} catch (Throwable e) {e.printStackTrace();return ServerResponseVO.error(ServerResponseEnum.ERROR);}}@GetMapping("/login")public ServerResponseVO login() {return ServerResponseVO.error(ServerResponseEnum.NOT_LOGIN_IN);}@GetMapping("/auth")public String auth() {return "已成功登录";}@GetMapping("/role")@RequiresRoles("vip")public String role() {return "测试Vip角色";}@GetMapping("/permission")@RequiresPermissions(value = {"add", "update"}, logical = Logical.AND)public String permission() {return "测试Add和Update权限";}
}

6. 测试

6.1 用root用户登录

6.1.1 登录

6.1.2 验证是否登录

6.1.3 测试角色权限

6.1.4 测试用户操作权限

7. 总结

本文演示了 Spring Boot 极简集成 Shiro 框架,实现了基础的身份认证和授权功能,如有不足,请多指教。

后续可扩展的功能点有:

1. 集成 Redis 实现 Shiro 的分布式会话

2. 集成 JWT 实现单点登录功能

链接:juejin.cn/post/6844903887871148039

热门内容:常用正则表达式最强整理(速查手册)
还在写大量 if 来判断?试试用一个规则执行器来替代它请立即卸载这款 IDEA 插件
最近面试BAT,整理一份面试资料《Java面试BAT通关手册》,覆盖了Java核心技术、JVM、Java并发、SSM、微服务、数据库、数据结构等等。获取方式:点“在看”,关注公众号并回复 666 领取,更多内容陆续奉上。

明天见(。・ω・。)ノ♡

Spring Boot 极简集成 Shiro相关推荐

  1. 《Spring Boot极简教程》第8章 Spring Boot集成Groovy,Grails开发

    第8章 Spring Boot集成Groovy,Grails开发 本章介绍Spring Boot集成Groovy,Grails开发.我们将开发一个极简版的pms(项目管理系统). Groovy和Gra ...

  2. spring boot 2.0 集成shiro注意事项

    2019独角兽企业重金招聘Python工程师标准>>> spring boot 2.0 全面拥抱java8,在安全验证上面 很大程度的简化了配置项,用shiro就要把security ...

  3. 《Spring Boot极简教程》附录3 编程简史

    附录3 编程简史 1940之前 提花织布机 1801,Joseph Marie Jacquard用打孔卡为一台织布机编写指令,在提花织布机(或称甲卡提花织布机,Jacquard loom)上,运用打孔 ...

  4. 《Spring Boot极简教程》附录4 Java编程简史

    附录4 Java编程简史 从GOTO到OOP 在20世纪60年代,软件曾出现过严重危机,由软件错误而引起的信息丢失.系统报废事件屡有发生.为此,1968年,荷兰E.W.Dijkstra提出了程序设计中 ...

  5. Spring Boot最新版集成邮件发送功能大全

    Spring Boot最新版集成邮件发送功能大全 前言 一.开启SMTP服务并获取授权码 二.创建Spring Boot项目 1.配置邮箱基本信息: 2.简单邮件发送: 3.发送带附件的邮件: 5.使 ...

  6. spring boot、mybatis集成druid数据库连接池,实现mysql cluster HA负载均衡访问

    spring boot.mybatis集成druid数据库连接池,实现mysql cluster HA负载均衡访问 1.原理实现介绍 本质来说使用连接池是为了节省创建.关闭数据库连接的资源消耗,从而提 ...

  7. 10、Spring Boot 2.x 集成 Log4j2

    1.10 Spring Boot 2.x 集成 Log4j2 完整源码: Spring-Boot-Demos 转载于:https://www.cnblogs.com/Grand-Jon/p/99980 ...

  8. Spring Boot项目中集成Elasticsearch,并实现高效的搜索功能

    Spring Boot项目中集成Elasticsearch 前言 环境准备 引入依赖 配置Elasticsearch连接信息 定义实体类 定义Elasticsearch操作接口 实现搜索功能 总结 前 ...

  9. Spring Boot 2.0集成和使用CSE

    点击上方"微服务蜂巢"可以订阅哦 本文通过一个IoT的应用展现在SpringBoot 2.0中集成和使用CSE.IoT应用原来使用SpringBoot 2.0开发,通过少量的步骤集 ...

最新文章

  1. 任正非内部重磅发言:华为不可能简单学阿里、亚马逊
  2. 小巧数据库 Derby 使用攻略
  3. linux系统UDP的socket通信编程
  4. jQuery操作json
  5. 设计模式——建造者模式
  6. 计算机基础与应用教程计算机硬件,计算机基础系列一:计算机硬件
  7. GridView合并表头多重表头无错完美版(以合并3列3行举例)
  8. 「每天一道面试题」Redis的优势有哪些?
  9. 技术,要拿得起,更要放得下
  10. 非线性控制3.0——自适应模糊控制
  11. 机器人动力学(牛顿欧拉推导)
  12. speedoffice(Excel)表格如何添加边框?
  13. outlook 您的组织策略阻止我们为您完成此操作 解决办法
  14. 网易卡搭python_网易卡搭编程
  15. 『开发』小程序通过易班接口登陆并请求数据
  16. ag-grid在Vue项目中的基本使用
  17. 巴比特 | 元宇宙每日必读:广州南沙发布“元宇宙九条”措施,平台最高可获得2亿元资金支持...
  18. Socket状态变迁图
  19. input输入框短信验证码处理
  20. C#应用程序界面开发进阶——高级窗体控件(1)——图形和图像类控件

热门文章

  1. NOIP模拟 蛋糕(DP+Dilworth定理)
  2. java基础小总结(2)
  3. Direct2D开发:Direct2D 和 GDI 互操作性概述
  4. Android深度探索--HAL与驱动开发----第一章读书笔记
  5. MySQL_数据库操作语句
  6. Objective-C代码的文件扩展名
  7. 使用javascript开发2048
  8. 最初的梦想,将来的你一定会感谢现在努力的自己
  9. TFS2008 + Windows2003 + Sql2005 安装注意事项
  10. 基于Matlab的多层BP神经网络在非线性函数拟合中的应用