0%

【Shiro 自学笔记八】Spring Boot 环境下 Shiro 整合 JWT

这一期我们用 Shiro 整合 JWT。

自定义 token

我们之前使用 Shiro 提供的 UsernamePasswordToken,这次我们需要自定义一个 token,实现空参构造、全参构造、GetSet:

1
2
3
4
5
6
7
8
9
10
11
12
13
14
15
16
17
18
@NoArgsConstructor
@AllArgsConstructor
@Getter
@Setter
public class JwtPasswordToken implements AuthenticationToken {
private String access_token;
private String password;

@Override
public Object getPrincipal() {
return access_token;
}

@Override
public Object getCredentials() {
return password;
}
}

自定义 Realm

重写 supports 修改 token 类型为自定义 token。

重写登录认证过程,如果 password 存在,就走登录流程;不存在就走 token 验证流程。

由于证书不能为空,所以我们用 DEFAULT_PASSWORD 代替:

1
2
3
4
5
6
7
8
9
10
11
12
13
14
15
16
17
18
19
20
21
22
23
24
25
26
27
28
29
30
31
32
33
34
35
36
37
38
39
40
41
42
43
@Component
public class UserRealm extends AuthorizingRealm {

@Autowired
private UserServiceImpl userService;

@Override
public boolean supports(AuthenticationToken token) {
return token instanceof JwtPasswordToken;
}

@Override
protected AuthorizationInfo doGetAuthorizationInfo(PrincipalCollection principalCollection) {
return null;
}

@Override
protected AuthenticationInfo doGetAuthenticationInfo(AuthenticationToken authenticationToken) throws AuthenticationException, MalformedJwtException, ExpiredJwtException {
Claims claims = JwtUtil.parseToken((String) authenticationToken.getPrincipal());
String username = claims.getAudience();
String password = (String) authenticationToken.getCredentials();

if ("DEFAULT_PASSWORD".equals(password)) {
return new SimpleAuthenticationInfo(
authenticationToken.getPrincipal(),
Md5Util.getMd5("DEFAULT_PASSWORD"),
ByteSource.Util.bytes("koorye_love_md5"),
this.getName()
);
} else {
User user = userService.getUserByUsername(username);
if (user == null) {
return null;
}
return new SimpleAuthenticationInfo(
authenticationToken.getPrincipal(),
userService.getUserByUsername(claims.getAudience()).getPassword(),
ByteSource.Util.bytes("koorye_love_md5"),
this.getName()
);
}
}
}

自定义 Filter

自定义的 Filter 继承 Shiro 提供的 BasicHttpAuthenticationFilter,重写:

  • isAccessAllowed 判断是否通过
  • isLoginAttempt 判断请求类型,此处检测是否拥有 token
  • executeLogin 尝试认证,由于证书不能为空,此处我们传入一个 DEFAULT_PASSWORD

getSubject(request, response).login(token) 用于请求 Realm 认证

1
2
3
4
5
6
7
8
9
10
11
12
13
14
15
16
17
18
19
20
21
22
23
24
25
26
27
28
29
30
31
public class JwtFilter extends BasicHttpAuthenticationFilter {
@SneakyThrows
@Override
protected boolean isAccessAllowed(ServletRequest request, ServletResponse response, Object mappedValue) {
if (isLoginAttempt(request, response)) {
return executeLogin(request, response);
} else {
return false;
}
}

@Override
protected boolean isLoginAttempt(ServletRequest request, ServletResponse response) {
HttpServletRequest httpServletRequest = (HttpServletRequest) request;
String access_token = httpServletRequest.getHeader("access_token");
return access_token != null;
}

@Override
protected boolean executeLogin(ServletRequest request, ServletResponse response) throws Exception {
HttpServletRequest httpServletRequest = (HttpServletRequest) request;
String access_token = httpServletRequest.getHeader("access_token");
if (access_token == null) {
throw new UnknownAccountException();
}

JwtPasswordToken token = new JwtPasswordToken(access_token, "DEFAULT_PASSWORD");
getSubject(request, response).login(token);
return true;
}
}

配置网络安全管理器

修改 Shiro 的配置类,关闭 Session 缓存:

1
2
3
4
5
6
7
8
9
10
11
12
13
@Bean(name = "webSecurityManager")
public DefaultWebSecurityManager defaultWebSecurityManager(UserRealm realm) {
DefaultWebSecurityManager defaultWebSecurityManager = new DefaultWebSecurityManager();
defaultWebSecurityManager.setRealm(realm);

DefaultSubjectDAO subjectDAO = new DefaultSubjectDAO();
DefaultSessionStorageEvaluator defaultSessionStorageEvaluator = new DefaultSessionStorageEvaluator();
defaultSessionStorageEvaluator.setSessionStorageEnabled(false);
subjectDAO.setSessionStorageEvaluator(defaultSessionStorageEvaluator);
defaultWebSecurityManager.setSubjectDAO(subjectDAO);

return defaultWebSecurityManager;
}

配置过滤规则

修改 Shiro 配置类,自定义过滤器和过滤规则:

1
2
3
4
5
6
7
8
9
10
11
12
13
14
15
16
17
@Bean
public ShiroFilterFactoryBean shiroFilterFactoryBean(DefaultWebSecurityManager webSecurityManager) {
ShiroFilterFactoryBean shiroFilterFactoryBean = new ShiroFilterFactoryBean();
shiroFilterFactoryBean.setSecurityManager(webSecurityManager);

Map<String, Filter> filterMap = new HashMap<>();
filterMap.put("jwt", new JwtFilter());
shiroFilterFactoryBean.setFilters(filterMap);

Map<String, String> filterRuleMap = new HashMap<>();
filterRuleMap.put("/api/**", "jwt");
filterRuleMap.put("/api/login", "anon");
filterRuleMap.put("/api/register", "anon");
shiroFilterFactoryBean.setFilterChainDefinitionMap(filterRuleMap);

return shiroFilterFactoryBean;
}

登录控制器

登录时将用户传入的用户名生成 token,再调用 login 登录:

1
2
3
4
5
6
7
8
9
10
11
12
13
14
15
16
17
18
19
20
@RequestMapping("/api/login")
public ResponseEntity<Map<String, String>> login(String username, String password) throws Exception {
Subject subject = SecurityUtils.getSubject();
String token = JwtUtil.getToken(username, 1800);
JwtPasswordToken jwtToken = new JwtPasswordToken(token, password);
subject.login(jwtToken);

if (subject.isAuthenticated()) {
String access_token = JwtUtil.getToken(username, 30 * 60);
Map<String, String> map = new HashMap<>();
map.put("ret_code", "201");
map.put("access_token", access_token);
return new ResponseEntity<>(map, HttpStatus.OK);
} else {
Map<String, String> map = new HashMap<>();
map.put("ret_code", "403");
map.put("err_msg", "Login failed.");
return new ResponseEntity<>(map, HttpStatus.BAD_REQUEST);
}
}

全局异常控制器

实现一个异常控制器类,统一处理所有异常:

1
2
3
4
5
6
7
8
9
10
11
12
13
14
15
16
17
18
19
20
21
22
23
24
25
26
27
28
29
30
31
32
33
34
35
36
37
38
39
40
41
42
43
@RestController
@ControllerAdvice
public class ExceptionController {
@ExceptionHandler(UnknownAccountException.class)
public ResponseEntity<Map<String, String>> unknownAccountException() {
Map<String, String> map = new HashMap<>();
map.put("ret_code", "401");
map.put("err_msg", "User is not EXIST!");
return new ResponseEntity<>(map, HttpStatus.BAD_REQUEST);
}

@ExceptionHandler(IncorrectCredentialsException.class)
public ResponseEntity<Map<String, String>> incorrectCredentialsException() {
Map<String, String> map = new HashMap<>();
map.put("ret_code", "402");
map.put("err_msg", "Password is ERROR!");
return new ResponseEntity<>(map, HttpStatus.BAD_REQUEST);
}

@ExceptionHandler(AuthenticationException.class)
public ResponseEntity<Map<String, String>> authenticationException() {
Map<String, String> map = new HashMap<>();
map.put("ret_code", "403");
map.put("err_msg", "Token is ERROR!");
return new ResponseEntity<>(map, HttpStatus.BAD_REQUEST);
}

@ExceptionHandler(MalformedJwtException.class)
public ResponseEntity<Map<String, String>> malformedJwtException() {
Map<String, String> map = new HashMap<>();
map.put("ret_code", "403");
map.put("err_msg", "Token is ERROR!");
return new ResponseEntity<>(map, HttpStatus.BAD_REQUEST);
}

@ExceptionHandler(ExpiredJwtException.class)
public ResponseEntity<Map<String, String>> expiredJwtException() {
Map<String, String> map = new HashMap<>();
map.put("ret_code", "404");
map.put("err_msg", "Token is EXPIRED!");
return new ResponseEntity<>(map, HttpStatus.BAD_REQUEST);
}
}

测试

使用 postman 模拟登录:

在这里插入图片描述

返回:

1
2
3
4
{
"access_token": "eyJhbGciOiJIUzI1NiJ9.eyJpc3MiOiJrb29yeWUiLCJzdWIiOiJzaGlyb19kZW1vIiwiYXVkIjoia29vcnllIiwiaWF0IjoxNTk1NjcwNzU2LCJleHAiOjE1OTU2NzI1NTZ9.avA3lQBzoxN-rF0qQq-36XQnRMTX-iH-FRRf98Xhykw",
"ret_code": "201"
}

模拟访问:

在这里插入图片描述

返回:

1
You are an admin.

pc3MiOiJrb29yeWUiLCJzdWIiOiJzaGlyb19kZW1vIiwiYXVkIjoia29vcnllIiwiaWF0IjoxNTk1NjcwNzU2LCJleHAiOjE1OTU2NzI1NTZ9.avA3lQBzoxN-rF0qQq-36XQnRMTX-iH-FRRf98Xhykw", "ret_code": "201" }

1
2
3
4
5
6
7
8
9

模拟访问:

[外链图片转存中...(img-QVmX4ugi-1595671362694)]

返回:

```json
You are an admin.