十、SpringSecurity
security——安全
web开发中,安全第一~过滤器,拦截器
功能性需求
做网站什么时候考虑安全?
设计之初就要进行考虑
漏洞,隐私泄露
安全框架:
- shiro、
- SpringSecurity、认证和授权
Spring Security是一个功能强大且高度可定制的身份验证和访问控制框架。它是保护基于spring的应用程序的事实标准。
- 功能权限
- 访问权限
- 菜单权限
简介
SpringSecurity是针对Spring项目的安全框架,也是SpringBoot底层安全模块默认的技术选型,他可以实现强大的web安全控制,对于安全控制,我们仅需要引入spring-boot-starter-security模块,进行少量配置,即可实现强大的安全管理
要记住几个类
WebSecurityConfigurerAdapter
:自定义Security策略AuthenticationManageerBuilder
:自定义认证策略@EnableWebSecurity
:开启WebSecurity模式
SpringSecurity的两个主要目标是“认证”和“授权”【权限控制】。
“认证”(Authentication)
“授权”(Authorization)
10.1、导包
<dependency>
<groupId>org.springframework.boot</groupId>
<artifactId>spring-boot-starter-security</artifactId>
</dependency>
10.2、使用
@EnableWebSecurity
public class SecurityConfig extends WebSecurityConfigurerAdapter {
@Override
protected void configure(HttpSecurity http) throws Exception {
super.configure(http);
}
}
10.3、授权与认证
@EnableWebSecurity
public class SecurityConfig extends WebSecurityConfigurerAdapter {
//链式编程
//请求授权的规则==>安全策略
@Override
protected void configure(HttpSecurity http) throws Exception {
//首页所有人能够访问,功能也只有对应权限的人能够访问
http.authorizeRequests()
.antMatchers("/").permitAll()
.antMatchers("/level1/**").hasRole("vip1")
.antMatchers("/level2/**").hasRole("vip2")
.antMatchers("/level3/**").hasRole("vip3");
// http.authorizeRequests().anyRequest().permitAll().and().logout();关闭登录页
//没有权限会跳转到登录页,需要开启登录的页面
//定制登录页
http.formLogin().loginPage("/toLogin") //也是接收username 和 password的地址
.usernameParameter("user")//定制传递的参数
.passwordParameter("pwd");
// 开启注销功能。.logoutUrl("/") 和 .logoutSuccessUrl("/")
http.logout().logoutSuccessUrl("/");
//开启记住我功能——保存 cookie的实现,默认保存两周
http.rememberMe();
}
//请求认证规则
//密码编码:Pass
//Spring Security5.0+中新增了许多的加密方式
@Override
protected void configure(AuthenticationManagerBuilder auth) throws Exception {
//正常应该再数据库中取出
auth.inMemoryAuthentication().passwordEncoder(new BCryptPasswordEncoder())
.withUser("shiqing").password(new BCryptPasswordEncoder().encode("123456")).roles("vip2","vip3")
.and()
.withUser("root").password(new BCryptPasswordEncoder().encode("123456")).roles("vip1","vip2","vip3")
.and()
.withUser("guest").password(new BCryptPasswordEncoder().encode("123456")).roles("vip1");
// super.configure(auth);
}
}
10.4、thymeleaf和springsecurity整合
<dependency>
<groupId>org.thymeleaf.extras</groupId>
<artifactId>thymeleaf-extras-springsecurity4</artifactId>
<version>3.0.2.RELEASE</version>
</dependency>
导入命名空间
<html lang="en" xmlns:th="http://www.thymeleaf.org"
xmlns:sec="http://www.thymeleaf.org/thymeleaf-extras-springsecurity4">
版本问题会造成不能成功显示——>建议版本2.0.9
<div class="right menu">
<!-- 未登录时 ——显示登陆 -->
<div sec:authorize="!isAuthenticated()">
<a class="item" th:href="@{/toLogin}">
<i class="address card icon"></i> 登录
</a>
</div>
<!-- 登录了——显示 注销和人员信息-->
<div sec:authorize="isAuthenticated()">
<a class="item" th:href="@{/logout}">
<i class="address card icon"></i> 注销
</a>
</div>
<div sec:authorize="isAuthenticated()">
<a class="item">
用户名:<span sec:authentication="name"></span>
角色:<span sec:authentication="principal.authorities"></span>
</a>
</div>
</div>
十一、Shiro
11.1、简介
什么是Shiro
- Apache Shiro 是一个Java安全(权限)框架
- Shiro 可以非常容易的开发出足够好的应用,其不仅可以用于JavaSE环境,也可以用在JavaEE环境。
- Shiro 可以完成:认证、授权、加密、会话管理、Web集成、缓存等
官网地址:http://shiro.apache.org/
https://github.com/apache/shiro.git
Authentication
: 身份认证、登录,验证用户是不是拥有相应的身份;Authorization
: 授权,即权限验证,验证某个已认证的用户是否拥有某个权限,即判断用户能否进行什么操作,如:验证某个用户是否拥有某个角色,或者细粒度的验证某个用户对某个资源是否具有某个权限!Session Manager
: 会话管理,即用户登录后就是第一次会话,在没有退出之前,它的所有信息都在会话中;会话可以是普通的avaSE环境,也可以是Web环境;Cryptography
: 加密,保护数据的安全性,如密码加密存储到数据库中,而不是明文存储;Web Support
: Web支持,可以非常容易的集成到Web环境;Caching
:缓存,比如用户登录后,其用户信息,拥有的角色、权限不必每次去查,这样可以提高效率Concurrency
: Shiro支持多线程应用的并发验证,即,如在一个线程中开启另一个线程,能把权限自动的传播过去Testing
: 提供测试支持;
Run As
: 允许一个用户假装为另一个用户(如果他们允许)的身份进行访问;Remember Me
: 记住我,这个是非常常见的功能,即一次登录后,下次再来的话不用登录了
11.2、导包
<dependencies>
<dependency>
<groupId>org.apache.shiro</groupId>
<artifactId>shiro-core</artifactId>
<version>1.4.1</version>
</dependency>
<!-- configure logging -->
<dependency>
<groupId>org.slf4j</groupId>
<artifactId>jcl-over-slf4j</artifactId>
<version>1.7.21</version>
</dependency>
<dependency>
<groupId>org.slf4j</groupId>
<artifactId>slf4j-log4j12</artifactId>
<version>1.7.21</version>
</dependency>
<dependency>
<groupId>log4j</groupId>
<artifactId>log4j</artifactId>
<version>1.2.17</version>
</dependency>
</dependencies>
log4j配置log4j.properties
log4j.rootLogger=INFO, stdout
log4j.appender.stdout=org.apache.log4j.ConsoleAppender
log4j.appender.stdout.layout=org.apache.log4j.PatternLayout
log4j.appender.stdout.layout.ConversionPattern=%d %p [%c] - %m %n
# General Apache libraries
log4j.logger.org.apache=WARN
# Spring
log4j.logger.org.springframework=WARN
# Default Shiro logging
log4j.logger.org.apache.shiro=INFO
# Disable verbose logging
log4j.logger.org.apache.shiro.util.ThreadContext=WARN
log4j.logger.org.apache.shiro.cache.ehcache.EhCache=WARN
配置ini文件
[users]
root = secret, admin
guest = guest, guest
presidentskroob = 12345, president
darkhelmet = ludicrousspeed, darklord, schwartz
lonestarr = vespa, goodguy, schwartz
# -----------------------------------------------------------------------------
# Roles with assigned permissions
# roleName = perm1, perm2, ..., permN
# -----------------------------------------------------------------------------
[roles]
admin = *
schwartz = lightsaber:*
goodguy = winnebago:drive:eagle5
11.3、测试
public class Quickstart {
private static final transient Logger log = LoggerFactory.getLogger(Quickstart.class);
public static void main(String[] args) {
log.info("My First Apache Shiro Application");
//工厂模式
Factory<SecurityManager> factory = new IniSecurityManagerFactory("classpath:shiro.ini");
SecurityManager securityManager = factory.getInstance();
SecurityUtils.setSecurityManager(securityManager);
// get the currently executing user:
//获取当前的用户对象
Subject currentUser = SecurityUtils.getSubject();
// Do some stuff with a Session (no need for a web or EJB container!!!)
//通过当前用户拿到Session
Session session = currentUser.getSession();
//设置一个 someKey
session.setAttribute("someKey", "aValue");
//取出 someKey
String value = (String) session.getAttribute("someKey");
if (value.equals("aValue")) {
log.info("Retrieved the correct value! [" + value + "]");
}
// let's login the current user so we can check against roles and permissions:
//判断当前的用户是否被认证
if (!currentUser.isAuthenticated()) {
//Token:令牌
UsernamePasswordToken token = new UsernamePasswordToken("lonestarr", "vespa");
token.setRememberMe(true);//设置记住我
try {
currentUser.login(token);//执行登录操作
} catch (UnknownAccountException uae) {//未知账户
log.info("There is no user with username of " + token.getPrincipal());
} catch (IncorrectCredentialsException ice) {//密码错误
log.info("Password for account " + token.getPrincipal() + " was incorrect!");
} catch (LockedAccountException lae) {//用户被锁定
log.info("The account for username " + token.getPrincipal() + " is locked. " +
"Please contact your administrator to unlock it.");
}
// ... catch more exceptions here (maybe custom ones specific to your application?
catch (AuthenticationException ae) {
//unexpected condition? error?
}
}
//say who they are:获取当前用户的认证
//print their identifying principal (in this case, a username):
log.info("User [" + currentUser.getPrincipal() + "] logged in successfully.");
//test a role:
//测试角色
if (currentUser.hasRole("schwartz")) {
log.info("May the Schwartz be with you!");
} else {
log.info("Hello, mere mortal.");
}
//匹配权限
//test a typed permission (not instance-level)粗粒度的
if (currentUser.isPermitted("lightsaber:wield")) {
log.info("You may use a lightsaber ring. Use it wisely.");
} else {
log.info("Sorry, lightsaber rings are for schwartz masters only.");
}
//a (very powerful) Instance Level permission:细粒度的
if (currentUser.isPermitted("winnebago:drive:eagle5")) {
log.info("You are permitted to 'drive' the winnebago with license plate (id) 'eagle5'. " +
"Here are the keys - have fun!");
} else {
log.info("Sorry, you aren't allowed to drive the 'eagle5' winnebago!");
}
//注销
//all done - log out!
currentUser.logout();
//结束
System.exit(0);
}
}
11.4、实例
创建Realm对象
public class UserRealm extends AuthorizingRealm {
//授权
@Override
protected AuthorizationInfo doGetAuthorizationInfo(PrincipalCollection principalCollection) {
System.out.println("执行了==>授权 doGetAuthorizationInfo");
return null;
}
//认证
@Override
protected AuthenticationInfo doGetAuthenticationInfo(AuthenticationToken authenticationToken) throws AuthenticationException {
System.out.println("执行了==>认证 doGetAuthorizationInfo");
return null;
}
}
Shiro配置
1、创建realm对象
//创建realm对象 需要自定义
@Bean
public UserRealm userRealm(){
return new UserRealm();
}
2、创建DefaulWebSecurityManager
//DefaulWebSecurityManager
@Bean(name = "securityManager")
public DefaultWebSecurityManager getDefaultWebSessionManager(@Qualifier("userRealm") UserRealm userRealm){
DefaultWebSecurityManager sessionManager = new DefaultWebSecurityManager();
//关联 UserRealm
sessionManager.setRealm(userRealm);
return sessionManager;
}
3、创建ShiroFilterFactoryBean工厂
添加Shiro 的内置过滤器
- anon:无需认证即可访问
- authc:必须认证才可访问
- user:必 须拥有记住我功能方可使用
- perms:拥有对某个资源的权限才能访问
- role:拥有某个角色权限才能访问
登录拦截器的实现
//ShiroFilterFactoryBean
@Bean
public ShiroFilterFactoryBean getShiroFilterFactoryBean(@Qualifier("securityManager") DefaultWebSecurityManager defaultWebSecurityManager){
ShiroFilterFactoryBean bean = new ShiroFilterFactoryBean();
//设置安全管理器
bean.setSecurityManager(defaultWebSecurityManager);
//添加Shiro 的内置过滤器
/**
* anon:无需认证即可访问
* authc:必须认证才可访问
* user:必须拥有记住我功能方可使用
* perms:拥有对某个资源的权限才能访问
* role:拥有某个角色权限才能访问
*/
LinkedHashMap<String, String> filterMap = new LinkedHashMap<>();
filterMap.put("/user/add","anon");
filterMap.put("/user/update","authc");
// filterMap.put("/user/*","authc");
bean.setFilterChainDefinitionMap(filterMap);
//设置登录请求,没有权限便触发
bean.setLoginUrl("/toLogin");
return bean;
}
完全实现
@Configuration
public class ShiroConfig {
//ShiroFilterFactoryBean
@Bean
public ShiroFilterFactoryBean getShiroFilterFactoryBean(@Qualifier("securityManager") DefaultWebSecurityManager defaultWebSecurityManager){
ShiroFilterFactoryBean bean = new ShiroFilterFactoryBean();
//设置安全管理器
bean.setSecurityManager(defaultWebSecurityManager);
//添加Shiro 的内置过滤器
/**
* anon:无需认证即可访问
* authc:必须认证才可访问
* user:必须拥有记住我功能方可使用
* perms:拥有对某个资源的权限才能访问
* role:拥有某个角色权限才能访问
*/
LinkedHashMap<String, String> filterMap = new LinkedHashMap<>();
filterMap.put("/user/add","anon");
filterMap.put("/user/update","authc");
// filterMap.put("/user/*","authc");
bean.setFilterChainDefinitionMap(filterMap);
//设置登录请求,没有权限便触发
bean.setLoginUrl("/toLogin");
return bean;
}
//DefaulWebSecurityManager
@Bean(name = "securityManager")
public DefaultWebSecurityManager getDefaultWebSessionManager(@Qualifier("userRealm") UserRealm userRealm){
DefaultWebSecurityManager sessionManager = new DefaultWebSecurityManager();
//关联 UserRealm
sessionManager.setRealm(userRealm);
return sessionManager;
}
//创建realm对象 需要自定义
@Bean
public UserRealm userRealm(){
return new UserRealm();
}
}
11.5、登录认证
获取前端信息,封装到Token中
@RequestMapping("/login")
public String login(String username,String password,Model model){
//获取当前用户
Subject subject = SecurityUtils.getSubject();
//封装用户的登录数据
UsernamePasswordToken token = new UsernamePasswordToken(username, password);
//登录令牌,执行登录方法,没有异常则OK
try {
subject.login(token);
return "index";
} catch (UnknownAccountException e) {//用户名不存在
model.addAttribute("msg","用户名不存在");
return "login";
}catch (IncorrectCredentialsException e){//密码错误
model.addAttribute("msg","密码错误");
return "login";
}
}
认证
//认证
@Override
protected AuthenticationInfo doGetAuthenticationInfo(AuthenticationToken token) throws AuthenticationException {
System.out.println("执行了==>认证 doGetAuthorizationInfo");
//用户 密码
String name = "root";
String password = "123456";
UsernamePasswordToken usernamePasswordToken = (UsernamePasswordToken) token;
//判断用户名是否一致
if (!usernamePasswordToken.getUsername().equals(name)){
return null;//抛出异常—UnknownAccountException
}
//密码认证,shiro做
return new SimpleAuthenticationInfo("",password,"");
}
11.6、Shiro整合Mybatis
@Autowired
UserServiceImpl userService;
//认证
@Override
protected AuthenticationInfo doGetAuthenticationInfo(AuthenticationToken token) throws AuthenticationException {
System.out.println("执行了==>认证 doGetAuthorizationInfo");
//连接真实数据库
UsernamePasswordToken usernamePasswordToken = (UsernamePasswordToken) token;
User user = userService.queryUserByName(usernamePasswordToken.getUsername());
if (user==null){
return null;
}
//密码认证,shiro做~ 密码加密 MD5加密,MD5盐值加密
return new SimpleAuthenticationInfo(user,user.getPwd(),"");
}
11.7、Shiro请求授权
ShiroConfig.java
//授权==>未授权会跳转到未授权页面
filterMap.put("/user/add","perms[user:add]");
filterMap.put("/user/update","perms[user:update]");
//设置未授权页面
bean.setUnauthorizedUrl("/noauth");
UserRealm.java
//授权
@Override
protected AuthorizationInfo doGetAuthorizationInfo(PrincipalCollection principalCollection) {
System.out.println("执行了==>授权 doGetAuthorizationInfo");
SimpleAuthorizationInfo info = new SimpleAuthorizationInfo();
// info.addStringPermission("user:add");
//拿到当前登录的对象
Subject subject = SecurityUtils.getSubject();
//获得User对象
User currentUser = (User) subject.getPrincipal();
//设置User权限
info.addStringPermission(currentUser.getPerms());
return info;
}
11.8、Shiro和Thymeleaf整合
导包
<dependency>
<groupId>com.github.theborakompanioni</groupId>
<artifactId>thymeleaf-extras-shiro</artifactId>
<version>2.0.0</version>
</dependency>
命名空间
<html lang="en" xmlns:th="http://www.thymeleaf.org"
xmlns:shiro="http://www.thymeleaf.org/thymeleaf-extras-shiro">
实例
<body>
<h1>首页</h1>
<div th:if="${session.loginUser} == null">
<a th:href="@{/toLogin}">登录</a>
</div>
<div shiro:hasPermission="user:add">
<a th:href="@{/user/add}">add</a>
<br>
</div>
<hr>
<div shiro:hasPermission="user:update">
<a th:href="@{/user/update}">update</a>
<br>
</div>
</body>
能够登陆成功就存放一个Session,用来判断 【登录】是否需要显示
<div th:if="${session.loginUser} == null">
<a th:href="@{/toLogin}">登录</a>
</div>