Shiro的两种配置方式

Apache Shiro是一款Java 安全框架,可以用于完成认证、授权、加密、会话管理、与Web集成、缓存等功能。根据官方文档,我这里列举出两种常用的配置方式,一是ini文件配置,二是spring xml文件的配置方式。
二者的配置,基本都是针对Shiro的以下几个常用组件:securityManager,cachManager,Realm,以及对应的链接拦截规则(urls)。
1. shiro.ini文件配置方式
我所用的是IDEA环境,在resources目录下新建config目录,用于存放相关配置文件,这里的Shiro.ini 文件也放在下面。你也可以放在你自己的目录,只不过要在web.xml指明配置文件的路径(默认为classpath下shiro.ini文件)。
shiro.ini文件的基本内容:这里的[urls]下anon代表对应链接不需要用户登录以及权限即可访问,authc代表需要用户登录才可以访问,其他标签可查看官方文档,在之后的学习过程中,根据实例再续写。

[main]
cacheManager = org.apache.shiro.cache.MemoryConstrainedCacheManager
securityManager.cacheManager = $cacheManager

myShiroRealm = com.song.shiro.realm.MyRealm
myShiroRealm.cacheManager = $cacheManager

securityManager.realm = $myShiroRealm

securityManager.rememberMeManager.cipherKey=false

shiro.loginUrl = /admin/login
shiro.successUrl = /admin/success

[urls]
/admin/login = anon
/admin/success = authc
/other/index = authc
/logout = logout

对应地,在web.xml中配置文件加载监听器及对应的Shiro拦截器配置为:

  <context-param>
    <param-name>shiroConfigLocations</param-name>
    <param-value>classpath:config/shiro.ini</param-value>
  </context-param>
  <listener>
    <listener-class>org.apache.shiro.web.env.EnvironmentLoaderListener</listener-class>
  </listener>
  <filter>
    <filter-name>shiroFilter</filter-name>
    <filter-class>org.apache.shiro.web.servlet.ShiroFilter</filter-class>
  </filter>
  <filter-mapping>
    <filter-name>shiroFilter</filter-name>
    <url-pattern>/*</url-pattern>
    <dispatcher>REQUEST</dispatcher>
    <dispatcher>FORWARD</dispatcher>
    <dispatcher>INCLUDE</dispatcher>
    <dispatcher>ERROR</dispatcher>
  </filter-mapping>

2. spring xml文件配置方式:
spring-shiro.xml文件内容:

    <?xml version="1.0" encoding="UTF-8"?>
<beans xmlns="http://www.springframework.org/schema/beans"
       xmlns:xsi="http://www.w3.org/2001/XMLSchema-instance"
       xsi:schemaLocation="http://www.springframework.org/schema/beans
                        http://www.springframework.org/schema/beans/spring-beans-3.0.xsd"
       default-lazy-init="true">

    <description>Shiro Configuration</description>

    <bean id="shiroFilter" class="org.apache.shiro.spring.web.ShiroFilterFactoryBean">
        <property name="securityManager" ref="securityManager"/>
        <property name="loginUrl" value="/admin/index" />
        <property name="successUrl" value="/admin/success" />
        <property name="unauthorizedUrl" value="/error" />
        <property name="filterChainDefinitions">
            <value>
                /admin/login = anon
                /admin/success = authc
                /other/index = authc
                /logout = logout
                /** = anon
            </value>
        </property>
    </bean>
    <!-- 用户授权信息Cache -->
    <bean id="cacheManager" class="org.apache.shiro.cache.MemoryConstrainedCacheManager" />

    <bean id="securityManager" class="org.apache.shiro.web.mgt.DefaultWebSecurityManager">
        <property name="realm" ref="myRealm"/>
        <property name="cacheManager" ref="cacheManager" />
    </bean>
    <bean id="lifecycleBeanPostProcessor" class="org.apache.shiro.spring.LifecycleBeanPostProcessor"/>

    <!-- Define the Shiro Realm implementation you want to use to connect to your back-end -->
    <!-- security datasource: -->
    <bean id="myRealm" class="com.song.shiro.realm.MyRealm">
        <property name="cacheManager" ref="cacheManager" />
    </bean>

    <!-- Enable Shiro Annotations for Spring-configured beans.  Only run after -->
    <!-- the lifecycleBeanProcessor has run: -->
    <bean class="org.springframework.aop.framework.autoproxy.DefaultAdvisorAutoProxyCreator" depends-on="lifecycleBeanPostProcessor"/>
    <bean class="org.apache.shiro.spring.security.interceptor.AuthorizationAttributeSourceAdvisor">
        <property name="securityManager" ref="securityManager"/>
    </bean>

</beans>

对应地,web.xml中加载监听器以及Shiro过滤器的配置如下:

  <context-param>
    <param-name>contextConfigLocation</param-name>
    <param-value>classpath:config/applicationContext.xml,classpath:config/spring-shiro1.xml</param-value>
  </context-param>
  <listener>
    <listener-class>org.springframework.web.context.ContextLoaderListener</listener-class>
  </listener>
  <filter>
    <filter-name>shiroFilter</filter-name>
    <filter-class>org.springframework.web.filter.DelegatingFilterProxy</filter-class>
    <init-param>
      <param-name>targetFilterLifecycle</param-name>
      <param-value>true</param-value>
    </init-param>
  </filter>
    <filter-mapping>
    <filter-name>shiroFilter</filter-name>
    <url-pattern>/*</url-pattern>
    <dispatcher>REQUEST</dispatcher>
    <dispatcher>FORWARD</dispatcher>
    <dispatcher>INCLUDE</dispatcher>
    <dispatcher>ERROR</dispatcher>
  </filter-mapping>

3. 说明
以上两种方式给出的配置,一般来说,对于实际web工程,只需要改动ini中的[urls]部分或者spring-xml中的shiroFilter配置部分。即定义web资源对应的操作控制权限。具体的语法以及分类,在接下来的具体实践中,再根据实例说明。
另外,配置文件中关于Realm的配置中时使用的MyRealm,这个是自己写的Realm,用于提供用户名称密码、角色、权限等封装信息的接口,以下是测试用例中的具体的实现(来源于网络,测试通过),其具体调用系统调用Shiro用户登录接口(subject.login(user))时触发:

/**
 * Created by Song on 2016/12/27.
 */
public class MyRealm extends AuthorizingRealm {
    //这里因为没有调用后台,直接默认只有一个用户("spf","123456")
    private static final String USER_NAME = "spf";
    private static final String PASSWORD = "123456";

    @Override
    protected AuthorizationInfo doGetAuthorizationInfo(PrincipalCollection principalCollection) {
        Set<String> roleNames = new HashSet<String>();
        Set<String> permissions = new HashSet<String>();
        roleNames.add("admin");//添加角色
        permissions.add("read");  //添加权限
        SimpleAuthorizationInfo info = new SimpleAuthorizationInfo(roleNames);
        info.setStringPermissions(permissions);
        return info;
    }

    @Override
    protected AuthenticationInfo doGetAuthenticationInfo(AuthenticationToken authenticationToken) throws AuthenticationException {
        UsernamePasswordToken token = (UsernamePasswordToken) authenticationToken;
        if(token.getUsername().equals(USER_NAME)){
            return new SimpleAuthenticationInfo(USER_NAME, MD5Util.MD5(PASSWORD), getName());
        }else{
            throw new AuthenticationException();
        }
    }
}

测试中用到的login.jsp页面(登录框):这里直接通过action提交表单,便于后台直接跳转页面,当然你也可以采用js Ajax提交请求,这样的话,就只能通过js根据返回的数据体进行页面跳转。

<%@ page language="java" contentType="text/html; charset=UTF-8" pageEncoding="UTF-8"%>
<html>
<head>
    <script typet="text/javascript" src="http://libs.baidu.com/jquery/1.9.1/jquery.min.js"></script>
</head>
<body>
<form action="<%=request.getContextPath()%>/admin/checkLogin">
    <input type="text" name="username" ><br><br>
    <input type="password" name="password"><br><br>
    <input type="checkbox" name="rememberMe" value="true"/>Remember Me?<br>
    <button type="submit" id="loginbtn">登录</button>
</form>
</body>

对应的/admin/checkLogin用户登录验证代码如下:

    /**
     * 验证用户名和密码
     * @param  username,String password
     * @return
     */
    @RequestMapping(value="/checkLogin")
    public String checkLogin(String username, String password, ServletRequest request) {
        Map<String, Object> result = new HashMap<String, Object>();
        try{
            UsernamePasswordToken token = new UsernamePasswordToken(username, MD5Util.MD5(password));
            Subject currentUser = SecurityUtils.getSubject();
            if (!currentUser.isAuthenticated()){
                //使用shiro来验证
                token.setRememberMe(true);
                currentUser.login(token);//验证角色和权限
                //获取本来要访问的网址uri
                String uri = WebUtils.getSavedRequest(request).getRequestUrl();
                //去掉工程名shiros
                if(uri.split("/shiros").length>1)
                    return "redirect:"+uri.split("/shiros")[1];
            }
        }catch(Exception e){
            e.printStackTrace();
        }
        return "redirect:/admin/success";
    }

猜你喜欢

转载自blog.csdn.net/u013248535/article/details/54142994
今日推荐