Shiro中Realm的初步學習---IniRealm,JdbcRealm,自定義Realm

全部測試代碼整體結構:

在此項目基礎上繼續編輯

https://blog.csdn.net/qq_43560721/article/details/105194364

 

首先是內置Realm

我們來看一下IniRealm和JdbcRealm

IniRealm:

測試代碼:

1.配置user.ini,主要配置用戶,角色和權限

[users]
xxs=123,admin
[roles]
admin=user:delete,user:update

2.寫測試類:

package cn.xxs.test;

import org.apache.shiro.SecurityUtils;
import org.apache.shiro.authc.UsernamePasswordToken;
import org.apache.shiro.mgt.DefaultSecurityManager;
import org.apache.shiro.realm.text.IniRealm;
import org.apache.shiro.subject.Subject;
import org.junit.Test;

/**
 * @Author xxs
 * @Date 2020/3/30 12:16
 */
public class IniRealmTest {

    @Test
    public void  testAuthentication(){
        IniRealm iniRealm = new IniRealm("classpath:user.ini");

        //1.構建SecurityManager環境,SecurityManager提供安全服務
        DefaultSecurityManager defaultSecurityManager = new DefaultSecurityManager();
        defaultSecurityManager.setRealm(iniRealm);
        //2.主題提交認證請求
        SecurityUtils.setSecurityManager(defaultSecurityManager);//設置SecurityManager環境
        Subject subject = SecurityUtils.getSubject();//獲得主體

        UsernamePasswordToken token = new UsernamePasswordToken("xxs","123");//認證數據
        subject.login(token);//提交認證
        System.out.println("isAuthenticated:"+subject.isAuthenticated());//看是否認證 true/false
        subject.checkRole("admin");//檢查角色
        subject.checkPermission("user:update");//檢查權限
    }
}

測試過程:

1.正確的用戶信息,角色,權限 進行檢查

2.錯誤用戶名

3.錯誤的密碼

4.錯誤角色

5.錯誤權限

 

 

JdbcRealm:

測試代碼:

1.添加依賴

<!--        引入mysql數據庫驅動包-->
        <dependency>
            <groupId>mysql</groupId>
            <artifactId>mysql-connector-java</artifactId>
            <version>5.1.45</version>
        </dependency>
<!--        引入數據源-->
        <dependency>
            <groupId>com.alibaba</groupId>
            <artifactId>druid</artifactId>
            <version>1.1.6</version>
        </dependency>

2.新建數據庫

自帶sql例子表:

自定義sql例子表:

3.寫測試類

package cn.xxs.test;

import com.alibaba.druid.pool.DruidDataSource;
import org.apache.shiro.SecurityUtils;
import org.apache.shiro.authc.UsernamePasswordToken;
import org.apache.shiro.mgt.DefaultSecurityManager;
import org.apache.shiro.realm.jdbc.JdbcRealm;
import org.apache.shiro.realm.text.IniRealm;
import org.apache.shiro.subject.Subject;
import org.junit.Test;

/**
 * @Author xxs
 * @Date 2020/3/30 14:02
 */
public class JdbcRealmTest {

    //設置jdbc訪問url,用戶及密碼
    DruidDataSource dataSource = new DruidDataSource();
    {
        dataSource.setUrl("jdbc:mysql://localhost:3306/test?useSSL=false");
        dataSource.setUsername("root");
        dataSource.setPassword("root");
    }
    @Test
    public void  testAuthentication(){
        //創建JdbcRealm對象
        JdbcRealm jdbcRealm = new JdbcRealm();
        //引入jdbc數據源
        jdbcRealm.setDataSource(dataSource);
        jdbcRealm.setPermissionsLookupEnabled(true);//打開查詢數據庫權限的開關,默認爲false
        //自定義sql
        String sql = "select password from test_user where user_name = ?";
        jdbcRealm.setAuthenticationQuery(sql);
        String roleSql =  "select role_name from test_user_role where user_name = ?";
        jdbcRealm.setUserRolesQuery(roleSql);
        //1.構建SecurityManager環境,SecurityManager提供安全服務
        DefaultSecurityManager defaultSecurityManager = new DefaultSecurityManager();
        defaultSecurityManager.setRealm(jdbcRealm);
        //2.主題提交認證請求
        SecurityUtils.setSecurityManager(defaultSecurityManager);//設置SecurityManager環境
        Subject subject = SecurityUtils.getSubject();//獲得主體
        UsernamePasswordToken token = new UsernamePasswordToken("ss","321");//認證數據
        subject.login(token);//提交認證
        System.out.println("isAuthenticated:"+subject.isAuthenticated());//看是否認證 true/false
//        subject.checkRole("admin");
//        subject.checkRoles("admin","user");
//        subject.checkPermission("user:select");
        subject.checkRole("user");
    }
}

測試過程:

1.自帶sql測試

數據對照這3個表

注意點:

 

jdbcRealm.setPermissionsLookupEnabled(true);//打開查詢數據庫權限的開關,默認爲false

 

以下面這兩張圖做對比。必須加上邊一行代碼,不然默認不查詢

JdbcRealm自帶的sql是在JdbcRealm類裏邊,進入會看到如下圖所示:

但是有弊端:只能按照自帶sql字段來建數據庫表。

那麼我們可以自定義sql

2.自定義sql測試:

數據對照這2個表

 

 

 

其次是自定義Realm

1.新建一個CustomRealm

package cn.imooc.shiro.realm;

import org.apache.shiro.authc.AuthenticationException;
import org.apache.shiro.authc.AuthenticationInfo;
import org.apache.shiro.authc.AuthenticationToken;
import org.apache.shiro.authc.SimpleAuthenticationInfo;
import org.apache.shiro.authz.AuthorizationInfo;
import org.apache.shiro.authz.SimpleAuthorizationInfo;
import org.apache.shiro.realm.AuthorizingRealm;
import org.apache.shiro.subject.PrincipalCollection;

import java.util.HashMap;
import java.util.HashSet;
import java.util.Map;
import java.util.Set;

/**
 * @Author xxs
 * @Date 2020/4/8 10:33
 */
public class CustomRealm  extends AuthorizingRealm {

    Map<String,String> userMap = new HashMap<String, String>(16);
    {
        userMap.put("xxs","123");
        super.setName("customRealm");
    }
    //做授權
    protected AuthorizationInfo doGetAuthorizationInfo(PrincipalCollection principalCollection) {
        // 1.從主體傳過來的認證信息中,獲得用戶名
        String userName = (String) principalCollection.getPrimaryPrincipal();
        //2.通過用戶名到數據庫或者緩存中獲取角色數據
        Set<String> roles = getRolesByUserName(userName);
        //3.通過用戶名到數據庫或者緩存中獲取權限數據
        Set<String> permissions = getPermissionsByUserName(userName);
        SimpleAuthorizationInfo simpleAuthorizationInfo = new SimpleAuthorizationInfo();
        simpleAuthorizationInfo.setStringPermissions(permissions);
        simpleAuthorizationInfo.setRoles(roles);
        return simpleAuthorizationInfo;
    }

    /**
     *模擬數據庫或緩存中查詢角色的權限
     * @param userName
     * @return
     */
    private Set<String> getPermissionsByUserName(String userName) {
        Set<String> sets = new HashSet<String>();
        sets.add("user:delete");
        sets.add("user:add");
        return sets;
    }

    /**
     *模擬數據庫或緩存中查詢角色
     * @param userName
     * @return
     */
    private Set<String> getRolesByUserName(String userName) {
        Set<String> sets = new HashSet<String>();
        sets.add("admin");
        sets.add("user");
        return sets;
    }

    //做認證
    protected AuthenticationInfo doGetAuthenticationInfo(AuthenticationToken authenticationToken)
            throws AuthenticationException {
        // 1.從主體傳過來的認證信息中,獲得用戶名
        String userName = (String) authenticationToken.getPrincipal();
        //2.通過用戶名到數據庫中獲取憑證
        String password = getPasswordByUserName(userName);
        if(password==null){
            return null;
        }
        //創建返回對象
        SimpleAuthenticationInfo authenticationInfo = new SimpleAuthenticationInfo
                ("xxs", password, "customRealm");//用戶名,密碼,realm名稱
        return authenticationInfo;
    }

    /**
     * 模擬數據庫或緩存中查詢憑證
     * @param userName
     * @return
     */
    private String getPasswordByUserName(String userName) {
        return userMap.get(userName);
    }
}

2.新建測試類

package cn.xxs.test;

import cn.imooc.shiro.realm.CustomRealm;
import org.apache.shiro.SecurityUtils;
import org.apache.shiro.authc.UsernamePasswordToken;
import org.apache.shiro.mgt.DefaultSecurityManager;
import org.apache.shiro.subject.Subject;
import org.junit.Test;

/**
 * @Author xxs
 * @Date 2020/4/8 10:49
 */
public class CustomRealmTest {
    @Test
    public void  testAuthentication(){
        CustomRealm customRealm = new CustomRealm();
        //1.構建SecurityManager環境,SecurityManager提供安全服務
        DefaultSecurityManager defaultSecurityManager = new DefaultSecurityManager();
        defaultSecurityManager.setRealm(customRealm);
        //2.主題提交認證請求
        SecurityUtils.setSecurityManager(defaultSecurityManager);//設置SecurityManager環境
        Subject subject = SecurityUtils.getSubject();//獲得主體
        UsernamePasswordToken token = new UsernamePasswordToken("xxs","123");//認證數據
        subject.login(token);//提交認證
        System.out.println("isAuthenticated:"+subject.isAuthenticated());//看是否認證 true/false
        subject.checkRole("admin");//檢查角色
        subject.checkPermission("user:add");//檢查權限

    }
}

測試過程:

1.驗證用戶信息

正確用戶信息驗證

錯誤用戶信息驗證

2.檢查角色和權限

正確角色及權限驗證

錯誤角色驗證

錯誤權限驗證

 

 

發表評論
所有評論
還沒有人評論,想成為第一個評論的人麼? 請在上方評論欄輸入並且點擊發布.
相關文章