current position:Home>Springboot -- integrate Shiro to complete login verification and interview questions for Java intermediate programmers
Springboot -- integrate Shiro to complete login verification and interview questions for Java intermediate programmers
2022-01-27 01:40:47 【m0_ sixty-four million eight hundred and sixty-seven thousand e】
import org.apache.shiro.authz.SimpleAuthorizationInfo;
import org.apache.shiro.realm.AuthorizingRealm;
import org.apache.shiro.subject.PrincipalCollection;
import org.slf4j.Logger;
import org.slf4j.LoggerFactory;
import org.springframework.beans.factory.annotation.Autowired;
import java.util.HashSet;
import java.util.Objects;
import java.util.Set;
/**
-
Authentication verification class
-
@author: Liu Peng
-
date: 2019-05-05
*/
public class MyShiroRealm extends AuthorizingRealm {
//slf4j Log , May not be used
private Logger logger = LoggerFactory.getLogger(MyShiroRealm.class);
@Autowired
private LoginService loginService;
/**
- Set authorization information , At present, this method has little effect
*/
@Override
protected AuthorizationInfo doGetAuthorizationInfo(Pri
《 A big factory Java Analysis of interview questions + Back end development learning notes + The latest architecture explanation video + Practical project source code handout 》
【docs.qq.com/doc/DSmxTbFJ1cmN1R2dB】 Full content open source sharing
ncipalCollection principals) {
logger.info(“ Start authorizing (doGetAuthorizationInfo)”);
SimpleAuthorizationInfo authorizationInfo = new SimpleAuthorizationInfo();
// role
Set roles = new HashSet<>();
roles.add(“role1”);
authorizationInfo.setRoles(roles);
// jurisdiction
Set permissions = new HashSet<>();
permissions.add(“user:list”);
authorizationInfo.setStringPermissions(permissions);
return authorizationInfo;
}
/**
- Set authentication information
*/
@Override
protected AuthenticationInfo doGetAuthenticationInfo(
AuthenticationToken authcToken) throws AuthenticationException {
logger.info(“ Start certification (doGetAuthenticationInfo)”);
UsernamePasswordToken token = (UsernamePasswordToken) authcToken;
String username = token.getUsername();
String password = new String(token.getPassword());
// Query whether the user exists , It's used here Mybatis Plus, You can verify it in your own way
QueryWrapper queryWrapper = new QueryWrapper<>();
queryWrapper.eq(“name”, username);
queryWrapper.eq(“password”, password);
UserPO userPO = loginService.querySingle(queryWrapper);
if (Objects.isNull(userPO)) {
throw new IncorrectCredentialsException(“ Wrong username and password !”);
}
return new SimpleAuthenticationInfo(
userPO,
token.getPassword(),
getName()
);
}
}
3. establish shiro Configuration class
package com.youyou.login.config;
import org.apache.shiro.mgt.SecurityManager;
import org.apache.shiro.spring.security.interceptor.AuthorizationAttributeSourceAdvisor;
import org.apache.shiro.spring.web.ShiroFilterFactoryBean;
import org.apache.shiro.web.mgt.DefaultWebSecurityManager;
import org.slf4j.Logger;
import org.slf4j.LoggerFactory;
import org.springframework.context.annotation.Bean;
import org.springframework.context.annotation.Configuration;
import java.util.LinkedHashMap;
import java.util.Map;
@Configuration
public class ShiroConfiguration {
private static Logger logger = LoggerFactory.getLogger(ShiroConfiguration.class);
/**
- Requires authentication
*/
private static final String ANON = “anon”;
/**
- Exclude authentication
*/
private static final String AUTHC = “authc”;
@Bean(name = “shiroFilter”)
public ShiroFilterFactoryBean shiroFilter(SecurityManager securityManager) {
logger.info(“ Get into shiroFilter…”);
ShiroFilterFactoryBean shiroFilterFactoryBean = new ShiroFilterFactoryBean();
shiroFilterFactoryBean.setSecurityManager(securityManager);
// Set the path that does not need to be intercepted
Map<String, String> filterChainDefinitionMap = new LinkedHashMap<>();
// Judge in order , This is a chain of responsibility model , If there is a matching intercept , It won't match later
filterChainDefinitionMap.put("/static/**", ANON);
// Configuration to exit filter , The specific exit code Shiro It's been done for us
filterChainDefinitionMap.put("/logout", “logout”);
//
/ Initialize all permission information and start ******/
// here , If it is used in the project later , Query directly from the database
filterChainDefinitionMap.put("/user/list", “authc,perms[user:list]”);
//filterChainDefinitionMap.put("/user/add", “authc,perms[user:add]”);
/ Initialization of all permission information starts and ends ******/
filterChainDefinitionMap.put("/api/**", AUTHC);
// If not set the default will automatically find Web Project root directory "/login.jsp" page
shiroFilterFactoryBean.setLoginUrl("/login");
// The link to jump to after successful login
// shiroFilterFactoryBean.setSuccessUrl("/index");
// Unauthorized interface
shiroFilterFactoryBean.setUnauthorizedUrl("/error/403");
shiroFilterFactoryBean.setFilterChainDefinitionMap(filterChainDefinitionMap);
return shiroFilterFactoryBean;
}
@Bean
public MyShiroRealm myShiroRealm() {
MyShiroRealm myShiroRealm = new MyShiroRealm();
// The caching mechanism can be set here later
return myShiroRealm;
}
@Bean
public SecurityManager securityManager() {
DefaultWebSecurityManager securityManager = new DefaultWebSecurityManager();
securityManager.setRealm(myShiroRealm());
return securityManager;
}
@Bean
public AuthorizationAttributeSourceAdvisor authorizationAttributeSourceAdvisor(SecurityManager securityManager) {
AuthorizationAttributeSourceAdvisor authorizationAttributeSourceAdvisor =
new AuthorizationAttributeSourceAdvisor();
authorizationAttributeSourceAdvisor.setSecurityManager(securityManager);
return authorizationAttributeSourceAdvisor;
}
}
4. establish controller
package com.youyou.login.controller;
import com.youyou.common.http.ResponseMessage;
import com.youyou.common.http.Result;
import io.swagger.annotations.Api;
import io.swagger.annotations.ApiOperation;
import org.apache.commons.lang3.StringUtils;
import org.apache.shiro.SecurityUtils;
import org.apache.shiro.authc.IncorrectCredentialsException;
import org.apache.shiro.authc.UsernamePasswordToken;
copyright notice
author[m0_ sixty-four million eight hundred and sixty-seven thousand e],Please bring the original link to reprint, thank you.
https://en.cdmana.com/2022/01/202201270140455936.html
The sidebar is recommended
- Spring IOC container loading process
- [thinking] the difference between singleton mode and static method - object-oriented programming
- Hadoop environment setup (MySQL environment configuration)
- 10 minutes, using node JS creates a real-time early warning system for bad weather!
- Git tool
- Force deduction algorithm - 92 Reverse linked list II
- What is the sub problem of dynamic programming?
- C / C + +: static keyword summary
- Idea does not have the artifacts option when configuring Tomcat
- Anaconda can't open it
guess what you like
-
I don't know how to start this
-
Matlab simulation of transportation optimization algorithm based on PSO
-
MySQL slow log optimization
-
[Vue] as the window is stretched (larger, smaller, wider and higher), the text will not be displayed
-
Popular Linux distributions for embedded computing
-
Suzhou computer research
-
After installing SSL Certificate in Windows + tomcat, the domain name request is not successful. Please answer!!
-
Implementation time output and greetings of jQuery instance
-
The 72 year old uncle became popular. Wu Jing and Guo fan made his story into a film, which made countless dreamers blush
-
How to save computer research
Random recommended
- Springboot implements excel import and export, which is easy to use, and poi can be thrown away
- The final examination subjects of a class are mathematical programming, and the scores are sorted and output from high to low
- Two pronged approach, Tsinghua Professor Pro code JDK and hotspot source code notes, one-time learning to understand
- C + + recursive knapsack problem
- The use of GIT and GitHub and the latest git tutorial are easy to understand -- Video notes of crazy God speaking
- PostgreSQL statement query
- Ignition database test
- Context didn't understand why he got a high salary?, Nginxfair principle
- Bootstrap switch switch control user's guide, springcloud actual combat video
- A list that contains only strings. What other search methods can be used except sequential search
- [matlab path planning] multi ant colony algorithm grid map path planning [including GUI source code 650]
- [matlab path planning] improved genetic algorithm grid map path planning [including source code phase 525]
- Iinternet network path management system
- Appium settings app is not running after 5000ms
- Reactnative foundation - 07 (background image, status bar, statusbar)
- Reactnative foundation - 04 (custom rpx)
- If you want an embedded database (H2, hsql or Derby), please put it on the classpath
- When using stm32g070 Hal library, if you want to write to flash, you must perform an erase. If you don't let it, you can't write continuously.
- Linux checks where the software is installed and what files are installed
- SQL statement fuzzy query and time interval filtering
- 69. Sqrt (x) (c + + problem solving version with vs runnable source program)
- Fresh students are about to graduate. Do you choose Java development or big data?
- Java project: OA management system (java + SSM + bootstrap + MySQL + JSP)
- Titanic passenger survival prediction
- Vectorization of deep learning formula
- Configuration and use of private image warehouse of microservice architect docker
- Relearn JavaScript events
- For someone, delete return 1 and return 0
- How does Java dynamically obtain what type of data is passed? It is used to judge whether the data is the same, dynamic data type
- How does the database cow optimize SQL?
- [data structure] chain structure of binary tree (pre order traversal) (middle order traversal) (post order traversal) (sequence traversal)
- Webpack packaging optimization solution
- 5. Operation element
- Detailed explanation of red and black trees
- redhat7. 9 install database 19C
- Blue Bridge Cup notes: (the given elements are not repeated) complete arrangement (arrangement cannot be repeated, arrangement can be repeated)
- Detailed explanation of springboot default package scanning mechanism and @ componentscan specified scanning path
- How to solve the run-time exception of test times
- Detailed explanation of k8s management tool kubectl
- Android system view memory command