资讯专栏INFORMATION COLUMN

Spring-boot、Shrio实现JWT

qylost / 3388人阅读

摘要:截获页面错误处理逻辑关于权限等授权信息,可以直接放到中实现缓存。我认为也是不错的。源码奉上分支温馨提示平时测试代码可能比较乱。如果更好的实现,让我学习,让我我进步,请联系我。

关于验证大致分为两个方面:

用户登录时的验证;

用户登录后每次访问时的权限认证

主要解决方法:使用自定义的Shiro Filter 项目搭建:
这是一个spring-boot 的web项目,不了解spring-boot的项目搭建,请google。

pom.mx引入相关jar

</>复制代码

  1. org.apache.shiro
  2. shiro-spring
  3. ${shiro.version}
  4. org.apache.shiro
  5. shiro-core
  6. ${shiro.version}
  7. io.jsonwebtoken
  8. jjwt
  9. 0.9.0

Shrio 的相关配置

划重点!!自定义了一个Filter

filterMap.put("JWTFilter", new JWTFilter());

</>复制代码

  1. @Configuration
  2. public class ShiroConfig {
  3. @Bean
  4. public ShiroFilterFactoryBean getShiroFilterFactoryBean(SecurityManager securityManager) {
  5. ShiroFilterFactoryBean shiroFilterFactoryBean = new ShiroFilterFactoryBean();
  6. shiroFilterFactoryBean.setSecurityManager(securityManager);
  7. // 添加自己的过滤器并且取名为JWTFilter
  8. Map filterMap = new HashMap<>();
  9. filterMap.put("JWTFilter", new JWTFilter());
  10. shiroFilterFactoryBean.setFilters(filterMap);
  11. /*
  12. * 自定义url规则
  13. * http://shiro.apache.org/web.html#urls-
  14. */
  15. Map filterChainDefinitionMap = shiroFilterFactoryBean.getFilterChainDefinitionMap();
  16. filterChainDefinitionMap.put("/**", "JWTFilter");
  17. shiroFilterFactoryBean.setFilterChainDefinitionMap(filterChainDefinitionMap);
  18. return shiroFilterFactoryBean;
  19. }
  20. /**
  21. * securityManager 不用直接注入shiroDBRealm,可能会导致事务失效
  22. * 解决方法见 handleContextRefresh
  23. * http://www.debugrun.com/a/NKS9EJQ.html
  24. */
  25. @Bean("securityManager")
  26. public DefaultWebSecurityManager securityManager(TokenRealm tokenRealm) {
  27. DefaultWebSecurityManager manager = new DefaultWebSecurityManager();
  28. manager.setRealm(tokenRealm);
  29. /*
  30. * 关闭shiro自带的session,详情见文档
  31. * http://shiro.apache.org/session-management.html#SessionManagement-StatelessApplications%28Sessionless%29
  32. */
  33. DefaultSubjectDAO subjectDAO = new DefaultSubjectDAO();
  34. DefaultSessionStorageEvaluator defaultSessionStorageEvaluator = new DefaultSessionStorageEvaluator();
  35. defaultSessionStorageEvaluator.setSessionStorageEnabled(false);
  36. subjectDAO.setSessionStorageEvaluator(defaultSessionStorageEvaluator);
  37. manager.setSubjectDAO(subjectDAO);
  38. return manager;
  39. }
  40. @Bean
  41. public LifecycleBeanPostProcessor lifecycleBeanPostProcessor() {
  42. return new LifecycleBeanPostProcessor();
  43. }
  44. @Bean(name = "TokenRealm")
  45. @DependsOn("lifecycleBeanPostProcessor")
  46. public TokenRealm tokenRealm() {
  47. return new TokenRealm();
  48. }
  49. @Bean
  50. @DependsOn("lifecycleBeanPostProcessor")
  51. public DefaultAdvisorAutoProxyCreator defaultAdvisorAutoProxyCreator() {
  52. DefaultAdvisorAutoProxyCreator defaultAdvisorAutoProxyCreator = new DefaultAdvisorAutoProxyCreator();
  53. // 强制使用cglib,防止重复代理和可能引起代理出错的问题
  54. // https://zhuanlan.zhihu.com/p/29161098
  55. defaultAdvisorAutoProxyCreator.setProxyTargetClass(true);
  56. return defaultAdvisorAutoProxyCreator;
  57. }
  58. @Bean
  59. public AuthorizationAttributeSourceAdvisor getAuthorizationAttributeSourceAdvisor(SecurityManager securityManager) {
  60. AuthorizationAttributeSourceAdvisor authorizationAttributeSourceAdvisor = new AuthorizationAttributeSourceAdvisor();
  61. authorizationAttributeSourceAdvisor.setSecurityManager(securityManager);
  62. return new AuthorizationAttributeSourceAdvisor();
  63. }
  64. }

自定义Shrio filter

执行顺序:preHandle -> doFilterInternal -> executeLogin -> onLoginSuccess
主要判断是不是登录请求的是 doFilterInternal

</>复制代码

  1. public class JWTFilter extends BasicHttpAuthenticationFilter {
  2. /**
  3. * 自定义执行登录的方法
  4. */
  5. @Override
  6. protected boolean executeLogin(ServletRequest request, ServletResponse response) throws IOException {
  7. HttpServletRequest httpServletRequest = (HttpServletRequest) request;
  8. UsernamePasswordToken usernamePasswordToken = JSON.parseObject(httpServletRequest.getInputStream(), UsernamePasswordToken.class);
  9. // 提交给realm进行登入,如果错误他会抛出异常并被捕获
  10. Subject subject = this.getSubject(request, response);
  11. subject.login(usernamePasswordToken);
  12. return this.onLoginSuccess(usernamePasswordToken, subject, request, response);
  13. //错误抛出异常
  14. }
  15. /**
  16. * 最先执行的方法
  17. */
  18. @Override
  19. protected boolean preHandle(ServletRequest request, ServletResponse response) throws Exception {
  20. return super.preHandle(request, response);
  21. }
  22. /**
  23. * 登录成功后登录的操作
  24. * 加上jwt 的header
  25. */
  26. @Override
  27. protected boolean onLoginSuccess(AuthenticationToken token, Subject subject, ServletRequest request, ServletResponse response) {
  28. HttpServletResponse httpServletResponse = (HttpServletResponse) response;
  29. String jwtToken = Jwts.builder()
  30. .setId(token.getPrincipal().toString())
  31. .setExpiration(DateTime.now().plusMinutes(30).toDate())
  32. .signWith(SignatureAlgorithm.HS256, JWTCost.signatureKey)
  33. .compact();
  34. httpServletResponse.addHeader(AUTHORIZATION_HEADER, jwtToken);
  35. return true;
  36. }
  37. /**
  38. * 登录以及校验的主要流程
  39. * 判断是否是登录,或者是登陆后普通的一次请求
  40. */
  41. @Override
  42. public void doFilterInternal(ServletRequest servletRequest, ServletResponse servletResponse, FilterChain filterChain) throws IOException, ServletException {
  43. HttpServletRequest httpServletRequest = (HttpServletRequest) servletRequest;
  44. HttpServletResponse httpServletResponse = (HttpServletResponse) servletResponse;
  45. String servletPath = httpServletRequest.getServletPath();
  46. if (StringUtils.equals(servletPath, "/login")) {
  47. //执行登录
  48. this.executeLogin(servletRequest, servletResponse);
  49. } else {
  50. String authenticationHeader = httpServletRequest.getHeader(AUTHORIZATION_HEADER);
  51. if (StringUtils.isNotEmpty(authenticationHeader)) {
  52. Claims body = Jwts.parser()
  53. .setSigningKey(JWTCost.signatureKey)
  54. .parseClaimsJws(authenticationHeader)
  55. .getBody();
  56. if (body != null) {
  57. //更新token
  58. body.setExpiration(DateTime.now().plusMinutes(30).toDate());
  59. String updateToken = Jwts.builder().setClaims(body).compact();
  60. httpServletResponse.addHeader(AUTHORIZATION_HEADER, updateToken);
  61. //添加用户凭证
  62. PrincipalCollection principals = new SimplePrincipalCollection(body.getId(), JWTCost.UserNamePasswordRealm);//拼装shiro用户信息
  63. WebSubject.Builder builder = new WebSubject.Builder(servletRequest, servletResponse);
  64. builder.principals(principals);
  65. builder.authenticated(true);
  66. builder.sessionCreationEnabled(false);
  67. WebSubject subject = builder.buildWebSubject();
  68. //塞入容器,统一调用
  69. ThreadContext.bind(subject);
  70. filterChain.doFilter(httpServletRequest, httpServletResponse);
  71. }
  72. } else {
  73. httpServletResponse.setStatus(HttpStatus.FORBIDDEN.value());
  74. }
  75. }
  76. }
  77. }

登录失败处理

处理Shrio异常

</>复制代码

  1. @RestControllerAdvice
  2. public class GlobalControllerExceptionHandler {
  3. @ExceptionHandler(value = Exception.class)
  4. public Object allExceptionHandler(HttpServletRequest request, HttpServletResponse response, Exception exception) {
  5. String message = exception.getCause().getMessage();
  6. LogUtil.error(message);
  7. return new ResultInfo(exception.getClass().getName(), message);
  8. }
  9. /*=========== Shiro 异常拦截==============*/
  10. @ExceptionHandler(value = IncorrectCredentialsException.class)
  11. public String IncorrectCredentialsException(HttpServletRequest request, HttpServletResponse response, Exception exception) {
  12. response.setStatus(HttpStatus.FORBIDDEN.value());
  13. return "IncorrectCredentialsException";
  14. }
  15. @ExceptionHandler(value = UnknownAccountException.class)
  16. public String UnknownAccountException(HttpServletRequest request, HttpServletResponse response, Exception exception) {
  17. response.setStatus(HttpStatus.FORBIDDEN.value());
  18. return "UnknownAccountException";
  19. }
  20. @ExceptionHandler(value = LockedAccountException.class)
  21. public String LockedAccountException(HttpServletRequest request, HttpServletResponse response, Exception exception) {
  22. response.setStatus(HttpStatus.FORBIDDEN.value());
  23. return "LockedAccountException";
  24. }
  25. @ExceptionHandler(value = ExcessiveAttemptsException.class)
  26. public String ExcessiveAttemptsException(HttpServletRequest request, HttpServletResponse response, Exception exception) {
  27. response.setStatus(HttpStatus.FORBIDDEN.value());
  28. return "ExcessiveAttemptsException";
  29. }
  30. @ExceptionHandler(value = AuthenticationException.class)
  31. public String AuthenticationException(HttpServletRequest request, HttpServletResponse response, Exception exception) {
  32. response.setStatus(HttpStatus.FORBIDDEN.value());
  33. return "AuthenticationException";
  34. }
  35. @ExceptionHandler(value = UnauthorizedException.class)
  36. public String UnauthorizedException(HttpServletRequest request, HttpServletResponse response, Exception exception) {
  37. response.setStatus(HttpStatus.FORBIDDEN.value());
  38. return "UnauthorizedException";
  39. }
  40. }
处理JWT异常 这是个坑,因为是在filter内发生的异常,@ExceptionHandler是截获不到的。

</>复制代码

  1. /**
  2. * 截获spring boot Error页面
  3. */
  4. @RestController
  5. public class GlobalExceptionHandler implements ErrorController {
  6. @Override
  7. public String getErrorPath() {
  8. return "/error";
  9. }
  10. @RequestMapping(value = "/error")
  11. public Object error(HttpServletRequest request, HttpServletResponse response) throws Exception {
  12. // 错误处理逻辑
  13. Exception exception = (Exception) request.getAttribute("javax.servlet.error.exception");
  14. Throwable cause = exception.getCause();
  15. if (cause instanceof ExpiredJwtException) {
  16. response.setStatus(HttpStatus.GATEWAY_TIMEOUT.value());
  17. return new ResultInfo("ExpiredJwtException", cause.getMessage());
  18. }
  19. if (cause instanceof MalformedJwtException) {
  20. response.setStatus(HttpStatus.FORBIDDEN.value());
  21. return new ResultInfo("MalformedJwtException", cause.getMessage());
  22. }
  23. return new ResultInfo(cause.getCause().getMessage(), cause.getMessage());
  24. }
  25. }
关于权限等授权信息,可以直接放到Redis中实现缓存。我认为也是不错的。

源码奉上:githup-shiro分支 :温馨提示:平时测试代码可能比较乱。

如果更好的实现,让我学习,让我我进步,请联系我。

文章版权归作者所有,未经允许请勿转载,若此文章存在违规行为,您可以联系管理员删除。

转载请注明本文地址:https://www.ucloud.cn/yun/69300.html

相关文章

  • 使用JWT保护你的Spring Boot应用 - Spring Security实战

    摘要:创建应用有很多方法去创建项目,官方也推荐用在线项目创建工具可以方便选择你要用的组件,命令行工具当然也可以。对于开发人员最大的好处在于可以对应用进行自动配置。 使用JWT保护你的Spring Boot应用 - Spring Security实战 作者 freewolf 原创文章转载请标明出处 关键词 Spring Boot、OAuth 2.0、JWT、Spring Security、SS...

    wemall 评论0 收藏0
  • 高性能配置管理中心 duic

    摘要:配置中心在软件开发中随着业务的需要需求的变更程序的灵活我们时常需要在项目中设置各种开关或者配置项在往常时一般会采用配置文件的方式但是在这分布式集群时代采用传统的配置管理方式显得有点力不从心同时在我们的终端我们也时常需要各种配置在面对大量的终 ______ _ ______ |_ _ `. (_) . ___ | | | `...

    binaryTree 评论0 收藏0
  • 高性能配置管理中心 duic

    摘要:配置中心在软件开发中随着业务的需要需求的变更程序的灵活我们时常需要在项目中设置各种开关或者配置项在往常时一般会采用配置文件的方式但是在这分布式集群时代采用传统的配置管理方式显得有点力不从心同时在我们的终端我们也时常需要各种配置在面对大量的终 ______ _ ______ |_ _ `. (_) . ___ | | | `...

    newsning 评论0 收藏0
  • SpringBoot 入门简介

    摘要:这里使用的是数据库启动类上加上注解在启动类中添加对包扫描扫描多个包下的可以有以下几种方法扫描会自动加载相关配置,数据源就会自动注入到中,会自动注入到中,可以直接使用。有配置文件下的使用扫描多个包下的可以有以下几种方法扫描 Spring-Boot 学习笔记 1 Spring-Boot 介绍 1.1 什么是Spring-Boot Spring-Boot是由Pivotal团队提供的全新框架...

    chuyao 评论0 收藏0

发表评论

0条评论

最新活动
阅读需要支付1元查看
<