springboot-安全

Spring Security

1. 简介

  1. Spring Security是针对Spring项目的安全框架,也是Spring Boot底层安全模块默认的技术选项
  2. 他可以实现强大的Web安全控制,对于安全控制我们仅需要引入spring-boot-starter-security模块,进行少量的配置,即可实现强大的安全管理

2. 几个重要的概念和类

  1. 重要的类
  1. WebSecurityConfigurerAdapter:自定义Security策略
  2. AuthenticationManagerBuilder:自定义认证策略
  3. @EnableWebSecurity:开启WebSecurity模式
  1. Spring Security的两个重要目标是"认证(Authentication)“和"授权”(Authorization)

3. 基本配置

  1. pom.xml
<!-- security -->
<dependency>
    <groupId>org.springframework.boot</groupId>
    <artifactId>spring-boot-starter-security</artifactId>
</dependency>
  1. SecurityConfig.java
@EnableWebSecurity
public class SecurityConfig extends WebSecurityConfigurerAdapter {
    //链式编程
    @Override
    protected void configure(HttpSecurity http) throws Exception {
        //首页所有人可以访问,功能页只有对应有权限的人才能访问
        //请求授权的
        规则
        http.authorizeRequests()
                .antMatchers("/").permitAll()
                .antMatchers("/toLogin").permitAll()
                .antMatchers("/level1/**").hasRole("vip1")
                .antMatchers("/level2/**").hasRole("vip2")
                .antMatchers("/level3/**").hasRole("vip3");

        //没有权限默认跳到登录页面,默认/login(自动配置的)
        //loginPage:定制登录页面,即用自己写的登录界面,当请求/toLogin进入Security登录
        //loginProcessingUrl:登陆成功放行的请求,即前端的url=/loginSuccess
        // /toLogin对应Controller定义的一个请求,/loginSuccess可理解为Security内定的一个方法的路径
        http.formLogin().loginPage("/toLogin").loginProcessingUrl("/loginSuccess");

        //注销;开启注销功能,默认/logout (自动配置的)
//        http.logout();
        http.logout().logoutSuccessUrl("/");
        //防止网站工具:get,post
        http.csrf().disable();

        //开启记录功能 cookie 默认保存两周
//        http.rememberMe();
        http.rememberMe().rememberMeParameter("remember");
    }

    //认证,SpringBoot 2.1.x 可以直接使用
    //密码编码:PasswordEncoder
    @Override
    protected void configure(AuthenticationManagerBuilder auth) throws Exception {
        BCryptPasswordEncoder encoder = new BCryptPasswordEncoder();
        //这些数据正常应该从数据库中读
        //从内存获取
        auth.inMemoryAuthentication().passwordEncoder(encoder)
                .withUser("admin").password(encoder.encode("1")).roles("vip1","vip2")
                .and()
                .withUser("root").password(encoder.encode("123")).roles("vip1","vip2","vip3");
    }
}

4. 整合thymeleaf的一些功能

  1. pom.xml
<dependency>
    <groupId>org.thymeleaf.extras</groupId>
    <artifactId>thymeleaf-extras-java8time</artifactId>
</dependency>
  1. index.html
<html lang="en" xmlns:th="http://www.thymeleaf.org"
      xmlns:sec="http://www.thymeleaf.org/thymeleaf-extras-springsecurity4">

<!-- 如果未登录,判断,条件成立该标签才生效  -->
<div sec:authorize="!isAuthenticated()">
    <!--未登录-->
    <a class="item" th:href="@{/toLogin}">
        <i class="address card icon"></i> 登录
    </a>
</div>

<!-- 如果登录 :显示用户名,判断,条件成立该标签才生效-->
<div sec:authorize="isAuthenticated()">
    <!-- 获取用户名 -->
    <a class="item">
        用户名:<span sec:authentication="name"></span>
    </a>
</div>
<!-- 如果登录 :显示注销-->
<div sec:authorize="isAuthenticated()">
    <!--注销-->
    <a class="item" th:href="@{/logout}">
        <i class="sign out icon"></i> 注销
    </a>
</div>

Shiro

基本配置

  1. pom.xml
<dependency>
    <groupId>org.apache.shiro</groupId>
    <artifactId>shiro-core</artifactId>
    <version>1.4.1</version>
</dependency>

<!-- configure logging -->
<dependency>
    <groupId>org.slf4j</groupId>
    <artifactId>jcl-over-slf4j</artifactId>
    <version>1.7.21</version>
    <scope>runtime</scope>
</dependency>
<dependency>
    <groupId>org.slf4j</groupId>
    <artifactId>slf4j-log4j12</artifactId>
    <version>1.7.21</version>
    <scope>runtime</scope>
</dependency>
<dependency>
    <groupId>log4j</groupId>
    <artifactId>log4j</artifactId>
    <version>1.2.17</version>
    <scope>runtime</scope>
</dependency>
  1. 日志配置
# log4j.properties
log4j.rootLogger=INFO, stdout

log4j.appender.stdout=org.apache.log4j.ConsoleAppender
log4j.appender.stdout.layout=org.apache.log4j.PatternLayout
log4j.appender.stdout.layout.ConversionPattern=%d %p [%c] - %m %n

# General Apache libraries
log4j.logger.org.apache=WARN

# Spring
log4j.logger.org.springframework=WARN

# Default Shiro logging
log4j.logger.org.apache.shiro=INFO

# Disable verbose logging
log4j.logger.org.apache.shiro.util.ThreadContext=WARN
log4j.logger.org.apache.shiro.cache.ehcache.EhCache=WARN
  1. shiro.ini
[users]
# user 'root' with password 'secret' and the 'admin' role
root = secret, admin
# user 'guest' with the password 'guest' and the 'guest' role
guest = guest, guest
# user 'presidentskroob' with password '12345' ("That's the same combination on
# my luggage!!!" ;)), and role 'president'
presidentskroob = 12345, president
# user 'darkhelmet' with password 'ludicrousspeed' and roles 'darklord' and 'schwartz'
darkhelmet = ludicrousspeed, darklord, schwartz
# user 'lonestarr' with password 'vespa' and roles 'goodguy' and 'schwartz'
lonestarr = vespa, goodguy, schwartz

[roles]
# 'admin' role has all permissions, indicated by the wildcard '*'
admin = *
# The 'schwartz' role can do anything (*) with any lightsaber:
schwartz = lightsaber:*
# The 'goodguy' role is allowed to 'drive' (action) the winnebago (type) with
# license plate 'eagle5' (instance specific id)
goodguy = winnebago:drive:eagle5
  1. 基本用法
//获得当前的用户对象 Subject
Subject currentUser = SecurityUtils.getSubject();

// 通过当前用户拿到 shiro.session.Session
Session session = currentUser.getSession();
session.setAttribute("someKey", "aValue");

//判断当前的用户是否被认证
currentUser.isAuthenticated()

//判断当前用户是否有某个权限
currentUser.hasRole("schwartz")

// 判断当前用户是否有某个权限
currentUser.isPermitted("lightsaber:wield")

//注销
currentUser.logout();

Springboot + Shiro

1. 基本配置

  1. pom.xml
<!-- shiro整合boot -->
<dependency>
    <groupId>org.apache.shiro</groupId>
    <artifactId>shiro-spring</artifactId>
    <version>1.4.1</version>
</dependency>
  1. config包下ShiroConfig
@Configuration
public class ShiroConfig {
    /*
        Subject 用户
        SecurityManager 管理所有用户
        Realm 连接数据
     */

    //ShiroFilterFactoryBean
    @Bean
    public ShiroFilterFactoryBean getShiroFilterFactoryBean(@Qualifier("securityManager") DefaultWebSecurityManager manager){
        ShiroFilterFactoryBean bean = new ShiroFilterFactoryBean();
        //设置安全管理器
        bean.setSecurityManager(manager);
        
        //添加shiro的内置过滤器
        /*
            anon:无需认证就可以访问
            authc:必须认证了才能访问
            user: 必须拥有 记住我 功能才能用
            perms:拥有对某个资源的权限才能访问
            role:拥有某个角色权限才能访问
         */
        HashMap<String, String> map = new HashMap<>();
        map.put("/user/*","authc");
        bean.setFilterChainDefinitionMap(map);

        //设置登录的请求
        bean.setLoginUrl("/toLogin");

        return bean;
    }

    //DefaultWebSecurityManager
    @Bean("securityManager")
    public DefaultWebSecurityManager defaultWebSecurityManager(@Qualifier("userRealm") UserRealm userRealm){
        DefaultWebSecurityManager manager = new DefaultWebSecurityManager();
        //关联UserRealm
        manager.setRealm(userRealm);
        return manager;
    }

    //创建realm对象,需要自定义类
    @Bean
    public UserRealm userRealm(){
        return new UserRealm();
    }
  1. config包下自定义的UserRealm
//自定义的UserRealm
public class UserRealm extends AuthorizingRealm {
    //授权
    @Override
    protected AuthorizationInfo doGetAuthorizationInfo(PrincipalCollection principals) {
        return null;
    }

    //认证
    @Override
    protected AuthenticationInfo doGetAuthenticationInfo(AuthenticationToken token) throws AuthenticationException {
        return null;
    }
}

2. 基本流程

  1. 在ShiroFilterFactoryBean中进行一些路径的配置
@Bean
public ShiroFilterFactoryBean getShiroFilterFactoryBean(DefaultWebSecurityManager manager){
    ShiroFilterFactoryBean bean = new ShiroFilterFactoryBean();
    //设置安全管理器
    bean.setSecurityManager(manager);
    //添加shiro的内置过滤器
    /*
        anon:无需认证就可以访问
        authc:必须认证了才能访问
        user: 必须拥有 记住我 功能才能用
        perms:拥有对某个资源的权限才能访问
        role:拥有某个角色权限才能访问
     */
    HashMap<String, String> map = new HashMap<>();

    //授权,该路径需要某些权限
    //正常的情况下,没有授权,会跳转到未授权页面
    map.put("/user/add","perms[user:add]");
    map.put("/user/update","perms[user:update]");

    //设置一些路径需要认证才能访问
    map.put("/user/*","authc");
    bean.setFilterChainDefinitionMap(map);

    //设置登录的请求
    bean.setLoginUrl("/toLogin");
    //未授权页面
    bean.setUnauthorizedUrl("/noauth");


    return bean;
}
  1. 在自定义的Realm中设置授权和认证相关的东西
//自定义的UserRealm
public class UserRealm extends AuthorizingRealm {

    @Autowired
    UserService userService;

    //授权
    @Override
    protected AuthorizationInfo doGetAuthorizationInfo(PrincipalCollection principals) {
        System.out.println("执行了===>授权");


        SimpleAuthorizationInfo info = new SimpleAuthorizationInfo();
       // info.addStringPermission("user:add"); //每个用户都会加
        //拿到当前登陆对象
        Subject subject = SecurityUtils.getSubject();
        User user = (User) subject.getPrincipal(); //拿到User对象,在认证处加入的user对象
        info.addStringPermission(user.getPerms());//授权
        return info;
    }

    //认证,当有Subject login时自动认证
    @Override
    protected AuthenticationInfo doGetAuthenticationInfo(AuthenticationToken token) throws AuthenticationException {
        System.out.println("执行了===>认证");

        UsernamePasswordToken userToken = (UsernamePasswordToken) token;
        User user = userService.queryUserByName(userToken.getUsername());
        if(user == null){ //!userToken.getUsername().equals(name),没有这个人
            return null; //自己抛出 UnknownAccountException 异常
        }
        //可以加密: MD5(不可逆) MD5颜值加密
        //密码认证,shiro做 , 密码加密
        //第一个参数是用户对象,也可以不加
        return new SimpleAuthenticationInfo(user,user.getPwd(),"");
    }
}
  1. Controller的一些相关操作
@RequestMapping("/login")
public String login(String username,String password,Model model){
    //获取当前的用户
    Subject subject = SecurityUtils.getSubject();
    //封装当前用户的登陆数据
    UsernamePasswordToken token = new UsernamePasswordToken(username, password);

    try{
        subject.login(token);//执行登录方法,如果无异常就说明ok
        subject.getSession().setAttribute("HasUser",true);
        return "/index";
    }catch (UnknownAccountException e){//用户名不存在
        model.addAttribute("msg","用户名错误");
        return "login";
    }catch (IncorrectCredentialsException e){
        model.addAttribute("msg","密码错误");
        return "login";
    }
}

@RequestMapping("/logout")
public String logout(){
    //获取当前的用户
    Subject subject = SecurityUtils.getSubject();
    subject.getSession().removeAttribute("HasUser");
    subject.logout();
    return "index";
}

3. 导入shiro整合thymeleaf的前端

  1. pom.xml
<!-- shiro整合thymeleaf -->
<dependency>
    <groupId>com.github.theborakompanioni</groupId>
    <artifactId>thymeleaf-extras-shiro</artifactId>
    <version>2.0.0</version>
</dependency>

<dependency>
    <groupId>org.thymeleaf</groupId>
    <artifactId>thymeleaf-spring5</artifactId>
</dependency>

<dependency>
    <groupId>org.thymeleaf.extras</groupId>
    <artifactId>thymeleaf-extras-java8time</artifactId>
</dependency>
  1. 需要加入ShiroDialect bean
@Bean
public ShiroDialect getShiroDialect(){
    return new ShiroDialect();
}
  1. index.xml
<h1>首页</h1>
<a th:if="${session.get('HasUser')== null}" th:href="@{/toLogin}">登录</a>
<a th:if="${session.get('HasUser')== true}"  th:href="@{/logout}">注销</a>
<p th:text="${msg}"></p>
<!-- 是否有权限 -->
<a shiro:hasPermission="user:add" th:href="@{/user/add}">add</a>
<a shiro:hasPermission="user:update"  th:href="@{/user/update}">update</a>
  • 0
    点赞
  • 0
    收藏
    觉得还不错? 一键收藏
  • 0
    评论
评论
添加红包

请填写红包祝福语或标题

红包个数最小为10个

红包金额最低5元

当前余额3.43前往充值 >
需支付:10.00
成就一亿技术人!
领取后你会自动成为博主和红包主的粉丝 规则
hope_wisdom
发出的红包
实付
使用余额支付
点击重新获取
扫码支付
钱包余额 0

抵扣说明:

1.余额是钱包充值的虚拟货币,按照1:1的比例进行支付金额的抵扣。
2.余额无法直接购买下载,可以购买VIP、付费专栏及课程。

余额充值