1.配置web.xml
<!-- Shiro框架入口 --> <filter> <filter-name>shiroFilter</filter-name> <filter-class>org.springframework.web.filter.DelegatingFilterProxy</filter-class> <init-param> <param-name>targetFilterLifecycle</param-name> <param-value>true</param-value> </init-param> </filter> <filter-mapping> <filter-name>shiroFilter</filter-name> <url-pattern>/actions/*</url-pattern> </filter-mapping>
2.配置shiro.xml
<!-- 这个bean的id与web.xml中shiro相关配置保持一致 --> <bean id="shiroFilter" class="org.apache.shiro.spring.web.ShiroFilterFactoryBean"> <property name="securityManager" ref="securityManager"/> <!-- 没认证后重定向的位置 --> <property name="loginUrl" value="/login.jsp"/> <!-- 登录成功跳转的位置 --> <property name="successUrl" value="/home.jsp"/> <!-- 没有权限跳转的位置 --> <property name="unauthorizedUrl" value="/unauthorized.jsp"/> <!-- 拦截请求--> <property name="filterChainDefinitions"> <value> <!-- 登录请求不拦截 --> /actions/security/login = anon <!-- 访问admin相关的请求,需要认证, 且经过自定义拦截器permissionFilter,最后还需要coder权限--> /actions/admin/** = authc,permissionFilter,roles[coder] /actions/logout = logout /actions/** = authc </value> </property> <!-- 用户自定义的过滤器 --> <property name="filters"> <map> <entry key="permissionFilter" value-ref="userAccessControlFilter"/> <!--<entry key="logout" value-ref="logoutFilter"/>--> </map> </property> </bean>
3.spring的配置文件中引入shiro.xml
<!-- 导入shiro的配置文件 --> <import resource="shiro.xml"/>
4.自定义Realm和自定义拦截器
public class UserRealm extends AuthorizingRealm { @Autowired private UserService userService; /** * 强制重写的认证方法 */ @Override protected AuthenticationInfo doGetAuthenticationInfo(AuthenticationToken token) throws AuthenticationException { //还记得吗,token封装了客户端的帐号密码,由Subject拉客并最终带到此处 String clientUsername = (String) token.getPrincipal(); //从数据库中查询帐号密码 String passwordFromDB = userService.findPasswordByName(clientUsername); if (passwordFromDB == null) { //如果根据用户输入的用户名,去数据库中没有查询到相关的密码 throw new UnknownAccountException(); } /** * 返回一个从数据库中查出来的的凭证。用户名为clientUsername,密码为passwordFromDB 。封装成当前返回值 * 接下来shiro框架做的事情就很简单了。 * 它会拿你的输入的token与当前返回的这个数据库凭证SimpleAuthenticationInfo对比一下 * 看看是不是一样,如果用户的帐号密码与数据库中查出来的数据一样,那么本次登录成功 * 否则就是你密码输入错误 */ return new SimpleAuthenticationInfo(clientUsername, passwordFromDB, "UserRealm"); } //授权 @Override protected AuthorizationInfo doGetAuthorizationInfo(PrincipalCollection principals) { String yourInputUsername = (String) principals.getPrimaryPrincipal(); //构造一个授权凭证 SimpleAuthorizationInfo info = new SimpleAuthorizationInfo(); //通过你的用户名查询数据库,得到你的权限信息与角色信息。并存放到权限凭证中 info.addRole(getYourRoleByUsernameFromDB(yourInputUsername)); info.addStringPermissions(getYourPermissionByUsernameFromDB(yourInputUsername)); //返回你的权限信息 return info; } private String getYourRoleByUsernameFromDB(String username) { return "coder"; } private List<String> getYourPermissionByUsernameFromDB(String username) { return Arrays.asList("code:insert", "code:update"); } }
@Component("userAccessControlFilter")
public final class UserAccessControlFilter extends AccessControlFilter {
private static final Logger LOGGER = LoggerFactory.getLogger(UserAccessControlFilter.class);
/**
* 即是否允许访问,返回true表示允许.
* 如果返回false,则进入本类的onAccessDenied方法中进行处理
*/
@Override
protected boolean isAccessAllowed(ServletRequest request, ServletResponse response, Object object)
throws Exception {
final Subject subject = SecurityUtils.getSubject();
//判断用户是否进行过登录认证,如果没经过认证则返回登录页
if (subject.getPrincipal() == null || !subject.isAuthenticated()) {
return Boolean.FALSE;
}
final String requestURI = this.getPathWithinApplication(request);
if (LOGGER.isDebugEnabled()) {
LOGGER.debug("请求URL为:{}", requestURI);
}
final String requestHeader = ((HttpServletRequest) request).getHeader("Referer");
//防盗链处理
if (requestHeader == null || "".equals(requestHeader)) {
return Boolean.FALSE;
}
//此处可以编写用于判断用户是否有相关权限的代码
//subject.hasRole("需要的角色");
//subject.isPermitted("需要的权限");
return Boolean.TRUE;
}
/**
* 如果返回true,则继续执行其它拦截器
* 如果返回false,则表示拦截住本次请求,且在代码中规定处理方法为重定向到登录页面
*/
@Override
protected boolean onAccessDenied(ServletRequest servletRequest, ServletResponse servletResponse)
throws Exception {
if (LOGGER.isDebugEnabled()) {
LOGGER.debug("当前帐号没有相应的权限!");
}
//重定向到登录页面
this.redirectToLogin(servletRequest, servletResponse);
return Boolean.FALSE;
}
}
5.login.jsp和Controller
<form action="<c:url value="/actions/security/login"/>" method="post"> 用户名<input type="text" name="username"><br> 密码<input type="password" name="password"><br> <input type="submit" value="提交"> </form>
@RequestMapping(value = "security/login", method = {RequestMethod.POST}) public String login(@RequestParam("username") String userName, @RequestParam("password") String password) { //获取到Subject门面对象 Subject subject = getSubject(); try { //将用户数据交给Shiro框架去做 //你可以在自定义Realm中的认证方法doGetAuthenticationInfo()处打个断点 subject.login(new UsernamePasswordToken(userName, password)); } catch (AuthenticationException exception) { if (!subject.isAuthenticated()) { //登录失败 return "fail"; } } //登录成功 return "home"; } @RequestMapping(value = "admin") public String enterAdmin() { //跳转到 web-inf/pages/admin.jsp页面 return "admin"; }
6.index。jsp
<a href="<c:url value="/actions/obtainAllUsers"/> ">测试超链接</a><br> <a href="<c:url value="/actions/admin"/> ">进入管理员页面</a><br> <a href="<c:url value="/actions/logout"/> ">退出</a>

登陆成功才能访问其他链接,否则一致都是login


https://github.com/1017020555/SSM-Shiro.git
浙公网安备 33010602011771号