Java tutorial
/* * Licensed to the Apache Software Foundation (ASF) under one * or more contributor license agreements. See the NOTICE file * distributed with this work for additional information * regarding copyright ownership. The ASF licenses this file * to you under the Apache License, Version 2.0 (the * "License"); you may not use this file except in compliance * with the License. You may obtain a copy of the License at * * http://www.apache.org/licenses/LICENSE-2.0 * * Unless required by applicable law or agreed to in writing, * software distributed under the License is distributed on an * "AS IS" BASIS, WITHOUT WARRANTIES OR CONDITIONS OF ANY * KIND, either express or implied. See the License for the * specific language governing permissions and limitations * under the License. */ package com.uunemo.security; import java.util.HashSet; import java.util.Set; import javax.annotation.Resource; import org.apache.shiro.authc.AuthenticationException; import org.apache.shiro.authc.AuthenticationInfo; import org.apache.shiro.authc.AuthenticationToken; import org.apache.shiro.authc.SimpleAuthenticationInfo; import org.apache.shiro.authc.UsernamePasswordToken; import org.apache.shiro.authc.credential.Sha256CredentialsMatcher; import org.apache.shiro.authz.AuthorizationInfo; import org.apache.shiro.authz.SimpleAuthorizationInfo; import org.apache.shiro.realm.AuthorizingRealm; import org.apache.shiro.subject.PrincipalCollection; import org.springframework.beans.factory.annotation.Autowired; import org.springframework.stereotype.Component; import com.uunemo.beans.Permission; import com.uunemo.beans.Role; import com.uunemo.beans.User; import com.uunemo.daos.UserDao; /** * The Spring/Hibernate sample application's one and only configured Apache Shiro Realm. * * <p>Because a Realm is really just a security-specific DAO, we could have just made Hibernate calls directly * in the implementation and named it a 'HibernateRealm' or something similar.</p> * * <p>But we've decided to make the calls to the database using a UserDAO, since a DAO would be used in other areas * of a 'real' application in addition to here. We felt it better to use that same DAO to show code re-use.</p> */ @Component(value = "nemoRealm") public class NemoRealm extends AuthorizingRealm { @Resource(name = "UserDao") protected UserDao userDAO; public NemoRealm() { setName("NemoRealm"); //This name must match the name in the User class's getPrincipals() method // setCredentialsMatcher(new Sha256CredentialsMatcher()); } // @Autowired // public void setUserDAO(UserDAO userDAO) { // this.userDAO = userDAO; // } protected AuthenticationInfo doGetAuthenticationInfo(AuthenticationToken authcToken) throws AuthenticationException { UsernamePasswordToken token = (UsernamePasswordToken) authcToken; User user = (User) userDAO.findByEmail(token.getUsername()); if (user != null) { return new SimpleAuthenticationInfo(user.getUsername(), user.getPassword(), getName()); // return new SimpleAuthenticationInfo(user.getUserid(), user.getPassword(), getName()); } else { return null; } } protected AuthorizationInfo doGetAuthorizationInfo(PrincipalCollection principals) { // Integer userId = (Integer) principals.fromRealm(getName()).iterator().next(); // User user = userDAO.findById(userId); String email = (String) principals.fromRealm(getName()).iterator().next(); User user = (User) userDAO.findByEmail(email); Set permissionSet = new HashSet<String>(); if (user != null) { SimpleAuthorizationInfo info = new SimpleAuthorizationInfo(); for (Role role : user.getRoles()) { info.addRole(role.getRoleName()); permissionSet.clear(); for (Permission permission : role.getPermissions()) { permissionSet.add(permission.getPermissionName()); } //?permissioninfo info.addStringPermissions(permissionSet); } return info; } else { return null; } } }