一个api要支持H5, PC和APP三个前端,如果使用session的话对app不是很友好,而且session有跨域攻击的问题,所以选择了JWT

1.导入依赖包

  1. <dependency>
  2. <groupId>org.apache.shiro</groupId>
  3. <artifactId>shiro-spring</artifactId>
  4. <version>1.3.2</version>
  5. </dependency>
  6.  
  7. <dependency>
  8. <groupId>com.auth0</groupId>
  9. <artifactId>java-jwt</artifactId>
  10. <version>3.2.0</version>
  11. </dependency>

2.自定义JWTToken

  1. import org.apache.shiro.authc.AuthenticationToken;
  2.  
  3. public class JwtToken implements AuthenticationToken {
  4.  
  5. private String token;
  6.  
  7. public JwtToken(String token) {
  8. this.token = token;
  9. }
  10.  
  11. @Override
  12. public Object getPrincipal() {
  13. return token;
  14. }
  15.  
  16. @Override
  17. public Object getCredentials() {
  18. return token;
  19. }
  20. }

工具类

  1. import com.auth0.jwt.JWT;
  2. import com.auth0.jwt.JWTVerifier;
  3. import com.auth0.jwt.algorithms.Algorithm;
  4. import com.auth0.jwt.exceptions.JWTDecodeException;
  5. import com.auth0.jwt.interfaces.DecodedJWT;
  6.  
  7. import java.io.UnsupportedEncodingException;
  8. import java.util.Date;
  9.  
  10. public class JwtUtils {
  11.  
  12. // 过期时间30天
  13. private static final long EXPIRE_TIME = 24 * 60 * 30 * 1000;
  14.  
  15. /**
  16. * 校验token是否正确
  17. *
  18. * @param token 密钥
  19. * @param username 登录名
  20. * @param password 密码
  21. * @return
  22. */
  23. public static boolean verify(String token, String username, String password) {
  24. try {
  25. Algorithm algorithm = Algorithm.HMAC256(password);
  26.  
  27. JWTVerifier verifier = JWT.require(algorithm).withClaim("userName", username).build();
  28.  
  29. DecodedJWT jwt = verifier.verify(token);
  30.  
  31. return true;
  32. } catch (Exception e) {
  33. return false;
  34. }
  35. }
  36.  
  37. /**
  38. * 获取登录名
  39. *
  40. * @param token
  41. * @return
  42. */
  43. public static String getUsername(String token) {
  44. try {
  45. DecodedJWT jwt = JWT.decode(token);
  46.  
  47. return jwt.getClaim("userName").asString();
  48. } catch (JWTDecodeException e) {
  49. return null;
  50. }
  51. }
  52.  
  53. /**
  54. * 生成签名
  55. *
  56. * @param username
  57. * @param password
  58. * @return
  59. */
  60. public static String sign(String username, String password) {
  61. try {
  62. // 指定过期时间
  63. Date date = new Date(System.currentTimeMillis() + EXPIRE_TIME);
  64.  
  65. Algorithm algorithm = Algorithm.HMAC256(password);
  66.  
  67. return JWT.create()
  68. .withClaim("userName", username)
  69. .withExpiresAt(date)
  70. .sign(algorithm);
  71. } catch (UnsupportedEncodingException e) {
  72. return null;
  73. }
  74. }
  75.  
  76. }

3.自定义realm

  1. import com.system.authorization.model.JwtToken;
  2. import com.system.authorization.model.MzUser;
  3. import com.system.authorization.service.MzUserService;
  4. import com.system.authorization.utils.JwtUtils;
  5. import org.apache.shiro.authc.*;
  6. import org.apache.shiro.authz.AuthorizationInfo;
  7. import org.apache.shiro.authz.SimpleAuthorizationInfo;
  8. import org.apache.shiro.realm.AuthorizingRealm;
  9. import org.apache.shiro.subject.PrincipalCollection;
  10. import org.slf4j.Logger;
  11. import org.slf4j.LoggerFactory;
  12. import org.springframework.beans.factory.annotation.Autowired;
  13.  
  14. import java.util.Set;
  15.  
  16. public class JwtShiroRealm extends AuthorizingRealm {
  17.  
  18. private Logger logger = LoggerFactory.getLogger(this.getClass());
  19.  
  20. @Autowired
  21. private MzUserService mzUserService;
  22.  
  23. /**
  24. * 使用JWT代替原生Token
  25. * @param token
  26. * @return
  27. */
  28. @Override
  29. public boolean supports(AuthenticationToken token) {
  30. return token instanceof JwtToken;
  31. }
  32.  
  33. //权限验证
  34. @Override
  35. protected AuthorizationInfo doGetAuthorizationInfo(PrincipalCollection principalCollection) {
  36. logger.info("doGetAuthorizationInfo:" + principalCollection.toString());
  37.  
  38. String userName = JwtUtils.getUsername(principalCollection.toString());
  39.  
  40. //获取权限数据
  41. Set<String> permissions = mzUserService.getPermissionByUserName(userName);
  42.  
  43. SimpleAuthorizationInfo simpleAuthorizationInfo = new SimpleAuthorizationInfo();
  44. simpleAuthorizationInfo.setStringPermissions(permissions);
  45. return simpleAuthorizationInfo;
  46. }
  47.  
  48. /**
  49. * 身份认证:Authentication 用来验证用户身份
  50. * 默认使用此方法进行用户名正确与否验证,错误抛出异常
  51. */
  52. @Override
  53. protected AuthenticationInfo doGetAuthenticationInfo(AuthenticationToken authenticationToken) throws AuthenticationException {
  54. String token = authenticationToken.getPrincipal().toString();
  55.  
  56. System.out.println("Realm 验证:"+token);
  57. String userName = JwtUtils.getUsername(token);
  58.  
  59. System.out.println("Realm 验证用户名:"+userName);
  60. MzUser mzUser = mzUserService.queryByUserName(userName);
  61. if (mzUser == null) {
  62. throw new AuthenticationException("token验证失败,权限不足");
  63. }
  64.  
  65. if (!JwtUtils.verify(token, userName, mzUser.getPassword())) {
  66. throw new UnknownAccountException("token验证失败,权限不足");
  67. }
  68.  
  69. return new SimpleAuthenticationInfo(token, token, "realm");
  70. }
  71. }

4.自定义filter

  1. import com.system.authorization.model.JwtToken;
  2. import org.apache.commons.lang3.StringUtils;
  3. import org.apache.http.HttpStatus;
  4. import org.apache.shiro.authc.UnknownAccountException;
  5. import org.apache.shiro.web.filter.authc.BasicHttpAuthenticationFilter;
  6. import org.apache.shiro.web.util.WebUtils;
  7. import org.slf4j.Logger;
  8. import org.slf4j.LoggerFactory;
  9.  
  10. import javax.servlet.ServletRequest;
  11. import javax.servlet.ServletResponse;
  12. import javax.servlet.http.HttpServletRequest;
  13. import javax.servlet.http.HttpServletResponse;
  14. import java.io.IOException;
  15.  
  16. public class JwtAuthFilter extends BasicHttpAuthenticationFilter {
  17.  
  18. private Logger logger = LoggerFactory.getLogger(this.getClass());
  19.  
  20. // 登录标识
  21. private static String LOGIN_SIGN = "x-auth-token";
  22.  
  23. /**
  24. * 检测用户是否登录
  25. * 检测header里面是否包含Authorization字段即可
  26. *
  27. * @param request
  28. * @param response
  29. * @return
  30. */
  31. @Override
  32. protected boolean isLoginAttempt(ServletRequest request, ServletResponse response) {
  33. HttpServletRequest httpRequest = WebUtils.toHttp(request);
  34.  
  35. String authorization = httpRequest.getHeader(LOGIN_SIGN);
  36.  
  37. return StringUtils.isNoneBlank(authorization);
  38. }
  39.  
  40. @Override
  41. protected boolean executeLogin(ServletRequest request, ServletResponse response) throws Exception {
  42. HttpServletRequest httpRequest = WebUtils.toHttp(request);
  43. String token = httpRequest.getHeader(LOGIN_SIGN);
  44. JwtToken jwtToken = new JwtToken(token);
  45. //提交给realm进行登录,如果错误会怕熬出异常并被捕获,如果没有抛出异常则返回true
  46. getSubject(request, response).login(jwtToken);
  47. return true;
  48. }
  49.  
  50. @Override
  51. protected boolean isAccessAllowed(ServletRequest request, ServletResponse response, Object mappedValue) {
  52. System.out.println("开始jwt 校验");
  53. //如果不是登录请求
  54. if (isLoginAttempt(request, response)) {
  55. try {
  56. executeLogin(request, response);
  57. } catch (Exception e) {
  58. // throw new TSharkException("登录权限不足!", e);
  59. throw new UnknownAccountException("token验证失败,权限不足");
  60. }
  61. }
  62. System.out.println("jwt 校验通过");
  63. return true;
  64. }
  65.  
  66. @Override
  67. protected boolean onAccessDenied(ServletRequest request, ServletResponse response) throws IOException {
  68. HttpServletResponse httpResponse = WebUtils.toHttp(response);
  69. httpResponse.setCharacterEncoding("UTF-8");
  70. httpResponse.setContentType("application/json;charset=utf-8");
  71. httpResponse.setStatus(org.apache.http.HttpStatus.SC_UNAUTHORIZED);
  72. System.out.println("token验证失败,没权限访问");
  73. return false;
  74. }
  75.  
  76. /**
  77. * 对跨域提供支持
  78. *
  79. * @param request
  80. * @param response
  81. * @return
  82. * @throws Exception
  83. */
  84. @Override
  85. protected boolean preHandle(ServletRequest request, ServletResponse response) throws Exception {
  86. HttpServletRequest httpServletRequest = (HttpServletRequest) request;
  87. HttpServletResponse httpServletResponse = (HttpServletResponse) response;
  88. httpServletResponse.setHeader("Access-control-Allow-Origin", httpServletRequest.getHeader("Origin"));
  89. httpServletResponse.setHeader("Access-Control-Allow-Methods", "GET,POST,OPTIONS,PUT,DELETE");
  90. httpServletResponse.setHeader("Access-Control-Allow-Headers", httpServletRequest.getHeader("Access-Control-Request-Headers"));
  91. // 跨域时会首先发送一个option请求,这里我们给option请求直接返回正常状态
  92. if (httpServletRequest.getMethod().equals(RequestMethod.OPTIONS.name())) {
  93. httpServletResponse.setStatus(HttpStatus.OK.value());
  94. return false;
  95. }
  96. return super.preHandle(request, response);
  97. }
  98.  
  99. }

授权过滤器

  1. import org.apache.http.HttpStatus;
  2. import org.apache.shiro.subject.Subject;
  3. import org.apache.shiro.web.filter.authz.AuthorizationFilter;
  4. import org.apache.shiro.web.util.WebUtils;
  5.  
  6. import javax.servlet.ServletRequest;
  7. import javax.servlet.ServletResponse;
  8. import javax.servlet.http.HttpServletResponse;
  9. import java.io.IOException;
  10.  
  11. public class RolesAndPermissionFilter extends AuthorizationFilter {
  12.  
  13. @Override
  14. protected boolean isAccessAllowed(ServletRequest request, ServletResponse response, Object mappedValue) throws Exception {
  15. System.out.println("开始Roles permission校验");
  16. //获取接口请求地址
  17. String path = WebUtils.toHttp(request).getRequestURI();
  18.  
  19. Subject subject = getSubject(request, response);
  20.  
  21. //数据库中存储的是接口的请求地址,此处验证当前请求的接口地址,当前登录的用户是否存在,如果存在则通过验证
  22. if (subject.isPermitted(path))
  23. return true;
  24. System.out.println("roles permission校验未通过");
  25. return false;
  26. }
  27.  
  28. @Override
  29. protected boolean onAccessDenied(ServletRequest request, ServletResponse response) throws IOException {
  30. HttpServletResponse httpResponse = WebUtils.toHttp(response);
  31. httpResponse.setCharacterEncoding("UTF-8");
  32. httpResponse.setContentType("application/json;charset=utf-8");
  33. httpResponse.setStatus(HttpStatus.SC_UNAUTHORIZED);
  34. return false;
  35. }
  36. }

5.配置信息,注入spring容器

  1. import com.system.authorization.filter.JwtAuthFilter;
  2. import com.system.authorization.filter.RolesAndPermissionFilter;
  3. import com.system.authorization.realm.JwtShiroRealm;
  4. import org.apache.shiro.mgt.DefaultSecurityManager;
  5. import org.apache.shiro.mgt.DefaultSessionStorageEvaluator;
  6. import org.apache.shiro.mgt.DefaultSubjectDAO;
  7. import org.apache.shiro.mgt.SecurityManager;
  8. import org.apache.shiro.realm.Realm;
  9. import org.apache.shiro.spring.LifecycleBeanPostProcessor;
  10. import org.apache.shiro.spring.security.interceptor.AuthorizationAttributeSourceAdvisor;
  11. import org.apache.shiro.spring.web.ShiroFilterFactoryBean;
  12. import org.apache.shiro.web.mgt.DefaultWebSecurityManager;
  13. import org.springframework.aop.framework.autoproxy.DefaultAdvisorAutoProxyCreator;
  14. import org.springframework.boot.autoconfigure.condition.ConditionalOnWebApplication;
  15. import org.springframework.context.annotation.Bean;
  16. import org.springframework.context.annotation.Configuration;
  17. import org.springframework.context.annotation.DependsOn;
  18.  
  19. import javax.servlet.Filter;
  20. import java.util.HashMap;
  21. import java.util.LinkedHashMap;
  22. import java.util.Map;
  23.  
  24. @Configuration
  25. @ConditionalOnWebApplication
  26. public class ShiroConfig {
  27.  
  28. @Bean
  29. public Realm jwtShiroRealm() {
  30. return new JwtShiroRealm();
  31. }
  32.  
  33. @Bean
  34. public SecurityManager securityManager() {
  35. DefaultSecurityManager defaultSecurityManager = new DefaultWebSecurityManager();
  36. defaultSecurityManager.setRealm(jwtShiroRealm());
  37.  
  38. // 关闭自带session
  39. DefaultSessionStorageEvaluator evaluator = new DefaultSessionStorageEvaluator();
  40. evaluator.setSessionStorageEnabled(false);
  41.  
  42. DefaultSubjectDAO subjectDAO = new DefaultSubjectDAO();
  43. subjectDAO.setSessionStorageEvaluator(evaluator);
  44.  
  45. defaultSecurityManager.setSubjectDAO(subjectDAO);
  46.  
  47. return defaultSecurityManager;
  48. }
  49.  
  50. @Bean(name = "shiroFilter")
  51. public ShiroFilterFactoryBean shiroFilter(SecurityManager securityManager) {
  52. ShiroFilterFactoryBean factoryBean = new ShiroFilterFactoryBean();
  53.  
  54. //将自定义的过滤器注入
  55. Map<String, Filter> filterMap = new LinkedHashMap<>();
  56. filterMap.put("jwt", new JwtAuthFilter());
  57. filterMap.put("permission", new RolesAndPermissionFilter());
  58.  
  59. factoryBean.setFilters(filterMap);
  60. factoryBean.setSecurityManager(securityManager);
  61.  
  62. //定义过滤规则
  63. Map<String, String> filterRuleMap = new HashMap<>();
  64. //所有的请求都必须经过jwt,permission过滤器
  65. filterRuleMap.put("/**", "jwt,permission");
  66. //登录接口可以不做验证
  67. filterRuleMap.put("/mz/user/login", "anon");
  68.  
  69. factoryBean.setFilterChainDefinitionMap(filterRuleMap);
  70.  
  71. //设置登录页面,主页面,验证失败页面
  72. factoryBean.setLoginUrl("https://www.baidu.com");
  73. factoryBean.setSuccessUrl("https://www.cnblogs.com/gyli20170901/");
  74. factoryBean.setUnauthorizedUrl("/403");
  75.  
  76. return factoryBean;
  77. }
  78.  
  79. @Bean
  80. @DependsOn("lifecycleBeanPostProcessor")
  81. public DefaultAdvisorAutoProxyCreator defaultAdvisorAutoProxyCreator() {
  82. DefaultAdvisorAutoProxyCreator defaultAdvisorAutoProxyCreator = new DefaultAdvisorAutoProxyCreator();
  83. defaultAdvisorAutoProxyCreator.setProxyTargetClass(true);
  84. return defaultAdvisorAutoProxyCreator;
  85. }
  86.  
  87. @Bean
  88. public LifecycleBeanPostProcessor lifecycleBeanPostProcessor() {
  89. return new LifecycleBeanPostProcessor();
  90. }
  91.  
  92. @Bean
  93. public AuthorizationAttributeSourceAdvisor authorizationAttributeSourceAdvisor(SecurityManager securityManager) {
  94. AuthorizationAttributeSourceAdvisor advisor = new AuthorizationAttributeSourceAdvisor();
  95. advisor.setSecurityManager(securityManager);
  96. return advisor;
  97. }
  98. }

参考:https://yq.aliyun.com/articles/646440

spring boot Shiro JWT整合的更多相关文章

  1. spring boot shiro redis整合基于角色和权限的安全管理-Java编程

    一.概述 本博客主要讲解spring boot整合Apache的shiro框架,实现基于角色的安全访问控制或者基于权限的访问安全控制,其中还使用到分布式缓存redis进行用户认证信息的缓存,减少数据库 ...

  2. Spring Boot Security JWT 整合实现前后端分离认证示例

    前面两章节我们介绍了 Spring Boot Security 快速入门 和 Spring Boot JWT 快速入门,本章节使用 JWT 和 Spring Boot Security 构件一个前后端 ...

  3. Spring Boot认证:整合Jwt

    背景 Jwt全称是:json web token.它将用户信息加密到token里,服务器不保存任何用户信息.服务器通过使用保存的密钥验证token的正确性,只要正确即通过验证. 优点 简洁: 可以通过 ...

  4. SpringBoot2.0+Shiro+JWT 整合

    SpringBoot2.0+Shiro+JWT 整合 JSON Web Token(JWT)是一个非常轻巧的规范.这个规范允许我们使用 JWT 在用户和服务器之间传递安全可靠的信息. 我们利用一定的编 ...

  5. Spring Boot Shiro 使用教程

    Apache Shiro 已经大名鼎鼎,搞 Java 的没有不知道的,这类似于 .Net 中的身份验证 form 认证.跟 .net core 中的认证授权策略基本是一样的.当然都不知道也没有关系,因 ...

  6. Spring Boot 2.x整合Redis

    最近在学习Spring Boot 2.x整合Redis,在这里和大家分享一下,希望对大家有帮助. Redis是什么 Redis 是开源免费高性能的key-value数据库.有以下的优势(源于Redis ...

  7. spring boot 2.0 整合 elasticsearch6.5.3,spring boot 2.0 整合 elasticsearch NoNodeAvailableException

    原文地址:spring boot 2.0 整合 elasticsearch NoNodeAvailableException 原文说的有点问题,下面贴出我的配置: 原码云项目地址:https://gi ...

  8. Spring Boot入门 and Spring Boot与ActiveMQ整合

    1.Spring Boot入门 1.1什么是Spring Boot Spring 诞生时是 Java 企业版(Java Enterprise Edition,JEE,也称 J2EE)的轻量级代替品.无 ...

  9. Spring Boot和Dubbo整合

    provider端 POM依赖 <dependencies> <dependency> <groupId>org.springframework.boot</ ...

随机推荐

  1. 查看linux系统安装的服务

    如何查看linux系统安装了哪些服务呢,因不同版本的操作系统可能使用的命令不一样或者有些命令在某些操作系统不可用,现列举一些常用查看命令(基于我的linux版本). 我的操作系统版本如下: 1.ser ...

  2. linux 上安装 keepalive

    1.keepalive 单机安装 1.1 安装环境 yum -y install kernel-devel* openssl-* popt-devel lrzsz openssh-clients li ...

  3. 高性能JAVA开发之内存管理

    这几天在找一个程序的bug,主要是java虚拟机内存溢出的问题,调研了一些java内存管理的资料,现整理如下: 一.JVM中的对象生命周期 对象的生命周期一般分为7个阶段:创建阶段,应用阶段,不可视阶 ...

  4. Excel-DNA项目只用1个文件实现Ribbon CustomUI和CustomTaskpane定制【C#版】

    Excel-DNA项目中的自定义功能区和自定义任务窗格需要用到各种命名空间.添加所需文件,才能实现.后来我发现可以把所有代码都写在Class1.cs这个默认文件中. 大家可以在Visual Studi ...

  5. 3)ARP到底属于网络层还是链路层

     说白了  就是有些协议起到了承上启下的作用  比较模糊   很难给出一个精确的定位

  6. curl操作和file_get_contents() 比较

    1 . curl需要php开启php_curl开启扩展 $ch = curl_init(); $timeout = 5; curl_setopt ($ch, CURLOPT_URL, 'http:// ...

  7. python3的数据类型转换问题

    问题描述:在自我学习的过程中,写了个登陆,在input处,希望能够对数据类型进行判断,但是因为python3的输入的数据会被系统默认为字符串,也就是1,1.2,a.都会被系统默认为字符串,这个心塞啊, ...

  8. 深度学习之TensorFlow安装与初体验

    深度学习之TensorFlow安装与初体验 学习前 搞懂一些关系和概念 首先,搞清楚一个关系:深度学习的前身是人工神经网络,深度学习只是人工智能的一种,深层次的神经网络结构就是深度学习的模型,浅层次的 ...

  9. js如何深度克隆

    var json = {a:6,b:4,c:[1,2,3]}; var json2 = clone(json); function clone(obj){ var oNew = new obj.con ...

  10. 在 mac osx 上安装OpenOffice并以服务的方式启动

    OpenOffice是Apache基金会旗下的一款先进的开源办公软件套件,包含文本文档.电子表格.演示文稿.绘图.数据库等.包含Microsoft office所有功能.它不仅可以作为桌面应用供普通用 ...