之前的文章中我们完成了基础框架的搭建,现在基本上所有的后台系统都逃不过权限管理这一块,这算是一个刚需了。现在我们来集成shiro来达到颗粒化权限管理,也就是从连接菜单到页面功能按钮,都进行权限都验证,从前端按钮的显示隐藏,到后台具体功能方法的权限验证。
首先要先设计好我们的数据库,先来看一张比较粗糙的数据库设计图:
具体的数据库设计代码
/* Navicat MySQL Data Transfer Source Server : 本机 Source Server Version : 50537 Source Host : localhost:3306 Source Database : task Target Server Type : MYSQL Target Server Version : 50537 File Encoding : 65001 Date: 2017-01-19 09:58:27 */ SET FOREIGN_KEY_CHECKS=0; -- ---------------------------- -- Table structure for sys_authority -- ---------------------------- DROP TABLE IF EXISTS `sys_authority`; CREATE TABLE `sys_authority` ( `id` bigint(20) NOT NULL AUTO_INCREMENT COMMENT '主键', `data_url` varchar(100) NOT NULL COMMENT '连接路径或方法', `menu_class` varchar(50) NOT NULL COMMENT '菜单样式', `menu_code` varchar(50) NOT NULL COMMENT '菜单编码', `menu_name` varchar(50) NOT NULL COMMENT '菜单名称', `parent_menucode` varchar(50) DEFAULT NULL COMMENT '上级菜单编码', `sequence` bigint(20) DEFAULT '0' COMMENT '排序', `menu_type` varchar(2) DEFAULT '1' COMMENT '菜单类型(1是左导航菜单 2是按钮权限)', `create_time` varchar(30) NOT NULL COMMENT '创建时间', PRIMARY KEY (`id`), UNIQUE KEY `uk_sys_authority_menu_code` (`menu_code`) ) ENGINE=InnoDB DEFAULT CHARSET=utf8 COMMENT='菜单表'; -- ---------------------------- -- Records of sys_authority -- ---------------------------- -- ---------------------------- -- Table structure for sys_department -- ---------------------------- DROP TABLE IF EXISTS `sys_department`; CREATE TABLE `sys_department` ( `id` bigint(20) NOT NULL AUTO_INCREMENT COMMENT '主键', `department_key` varchar(20) NOT NULL COMMENT '部门编码', `department_value` varchar(40) NOT NULL COMMENT '部门名称', `description` varchar(200) DEFAULT NULL COMMENT '描述', `parent_departmentkey` varchar(20) DEFAULT NULL COMMENT '上级部门编码', `create_time` varchar(30) DEFAULT NULL COMMENT '创建时间', PRIMARY KEY (`id`), UNIQUE KEY `uk_sys_department_department_key` (`department_key`) ) ENGINE=InnoDB DEFAULT CHARSET=utf8 COMMENT='部门表'; -- ---------------------------- -- Records of sys_department -- ---------------------------- -- ---------------------------- -- Table structure for sys_role -- ---------------------------- DROP TABLE IF EXISTS `sys_role`; CREATE TABLE `sys_role` ( `role_id` int(11) NOT NULL AUTO_INCREMENT COMMENT '主键', `role_key` varchar(30) DEFAULT NULL COMMENT '角色编码', `create_time` varchar(30) DEFAULT NULL COMMENT '创建时间', `description` varchar(200) DEFAULT NULL COMMENT '描述', `role_value` varchar(40) NOT NULL COMMENT '角色名称', `company_id` bigint(20) DEFAULT NULL, PRIMARY KEY (`role_id`) ) ENGINE=InnoDB AUTO_INCREMENT=3 DEFAULT CHARSET=utf8 COMMENT='角色表'; -- ---------------------------- -- Records of sys_role -- ---------------------------- INSERT INTO `sys_role` VALUES ('1', 'ROLE_USER', null, null, '', null); INSERT INTO `sys_role` VALUES ('2', 'ROLE_ADMIN', null, null, '', null); -- ---------------------------- -- Table structure for sys_role_authority -- ---------------------------- DROP TABLE IF EXISTS `sys_role_authority`; CREATE TABLE `sys_role_authority` ( `id` bigint(20) NOT NULL AUTO_INCREMENT COMMENT '主键编号自增长', `menu_code` varchar(50) NOT NULL COMMENT '菜单编码', `role_key` varchar(40) NOT NULL COMMENT '角色编码', `menu_type` int(11) DEFAULT NULL COMMENT '菜单类型 1 导航 2 按钮', PRIMARY KEY (`id`) ) ENGINE=InnoDB DEFAULT CHARSET=utf8 COMMENT='角色菜单表'; -- ---------------------------- -- Records of sys_role_authority -- ---------------------------- -- ---------------------------- -- Table structure for sys_role_permission -- ---------------------------- DROP TABLE IF EXISTS `sys_role_permission`; CREATE TABLE `sys_role_permission` ( `role_id` int(11) NOT NULL COMMENT '角色主键编号', `permissions` varchar(1000) DEFAULT NULL COMMENT '按钮权限', KEY `FK9q28ewrhntqeipl1t04kh1be7` (`role_id`), CONSTRAINT `FK9q28ewrhntqeipl1t04kh1be7` FOREIGN KEY (`role_id`) REFERENCES `sys_role` (`role_id`), CONSTRAINT `fk_sys_role_permission_role_id` FOREIGN KEY (`role_id`) REFERENCES `sys_role` (`role_id`) ) ENGINE=InnoDB DEFAULT CHARSET=utf8 COMMENT='角色按钮权限表'; -- ---------------------------- -- Records of sys_role_permission -- ---------------------------- -- ---------------------------- -- Table structure for sys_user -- ---------------------------- DROP TABLE IF EXISTS `sys_user`; CREATE TABLE `sys_user` ( `user_id` bigint(20) NOT NULL AUTO_INCREMENT COMMENT '主键', `login_account` varchar(30) NOT NULL COMMENT '登录账号', `login_pass` varchar(65) NOT NULL COMMENT '登录密码', `user_name` varchar(20) DEFAULT NULL COMMENT '昵称', `user_head` varchar(30) DEFAULT NULL COMMENT '头像', `user_phone` varchar(20) DEFAULT NULL COMMENT '手机', `user_email` varchar(30) DEFAULT NULL COMMENT '邮箱', `user_sex` int(11) DEFAULT NULL COMMENT '性别', `user_birthday` varchar(30) DEFAULT NULL COMMENT '生日', `register_time` varchar(30) NOT NULL COMMENT '注册时间', `department_key` varchar(20) DEFAULT NULL COMMENT '部门编码', PRIMARY KEY (`user_id`), UNIQUE KEY `uk_sys_user_login_account` (`login_account`) ) ENGINE=InnoDB AUTO_INCREMENT=5 DEFAULT CHARSET=utf8 COMMENT='用户表'; -- ---------------------------- -- Records of sys_user -- ---------------------------- INSERT INTO `sys_user` VALUES ('2', 'hzw2312', '63cbbfefc6a5f389ea64299134e989a9a378d1293cad8b5623331bf5d0e023a9', null, null, null, 'hzw2312@sina.com', null, null, '2017-01-18 14:39:23', null); INSERT INTO `sys_user` VALUES ('3', 'hzw2312f', '63cbbfefc6a5f389ea64299134e989a9a378d1293cad8b5623331bf5d0e023a9', null, null, null, 'hzw23d12@sina.com', null, null, '2017-01-18 15:25:08', null); INSERT INTO `sys_user` VALUES ('4', 'hhsykx', '63cbbfefc6a5f389ea64299134e989a9a378d1293cad8b5623331bf5d0e023a9', null, null, null, 'hhs2312@sina.com', null, null, '2017-01-18 15:25:47', null); -- ---------------------------- -- Table structure for sys_user_role -- ---------------------------- DROP TABLE IF EXISTS `sys_user_role`; CREATE TABLE `sys_user_role` ( `user_id` bigint(20) NOT NULL COMMENT '用户编号', `role_id` int(20) NOT NULL COMMENT '角色编号', PRIMARY KEY (`user_id`,`role_id`), KEY `FKhh52n8vd4ny9ff4x9fb8v65qx` (`role_id`), CONSTRAINT `FKb40xxfch70f5qnyfw8yme1n1s` FOREIGN KEY (`user_id`) REFERENCES `sys_user` (`user_id`), CONSTRAINT `FKhh52n8vd4ny9ff4x9fb8v65qx` FOREIGN KEY (`role_id`) REFERENCES `sys_role` (`role_id`), CONSTRAINT `fk_sys_user_role_role_id` FOREIGN KEY (`role_id`) REFERENCES `sys_role` (`role_id`), CONSTRAINT `fk_sys_user_role_user_id` FOREIGN KEY (`user_id`) REFERENCES `sys_user` (`user_id`) ) ENGINE=InnoDB DEFAULT CHARSET=utf8 COMMENT='用户角色映射表'; -- ---------------------------- -- Records of sys_user_role -- ---------------------------- INSERT INTO `sys_user_role` VALUES ('3', '1'); INSERT INTO `sys_user_role` VALUES ('4', '1'); INSERT INTO `sys_user_role` VALUES ('2', '2');
下面我们开始根据之前的框架集成shiro
首先在pom.xml添加shiro的支持,先在properties中声明一下要倒入的版本:
<properties> <shiro.version>1.3.2</shiro.version> <commons-logging.version>1.2</commons-logging.version> </properties>
然后在是dependency的添加:
<!-- shiro权限 --> <dependency> <groupId>org.apache.shiro</groupId> <artifactId>shiro-all</artifactId> <version>${shiro.version}</version> </dependency> <!-- commons-logging --> <dependency> <groupId>commons-logging</groupId> <artifactId>commons-logging</artifactId> <version>${commons-logging.version}</version> </dependency>
下面是shiro的配置跟spring配置放在同级目录spring-shiro.xml:
<?xml version="1.0" encoding="UTF-8"?> <beans xmlns="http://www.springframework.org/schema/beans" xmlns:util="http://www.springframework.org/schema/util" xmlns:aop="http://www.springframework.org/schema/aop" xmlns:xsi="http://www.w3.org/2001/XMLSchema-instance" xsi:schemaLocation=" http://www.springframework.org/schema/beans http://www.springframework.org/schema/beans/spring-beans.xsd http://www.springframework.org/schema/util http://www.springframework.org/schema/util/spring-util.xsd http://www.springframework.org/schema/aop http://www.springframework.org/schema/aop/spring-aop.xsd"> <!-- 缓存管理器 使用Ehcache实现 --> <bean id="cacheManager" class="org.apache.shiro.cache.ehcache.EhCacheManager"> <property name="cacheManagerConfigFile" value="classpath:ehcache-shiro.xml" /> </bean> <bean id="securityManager" class="org.apache.shiro.web.mgt.DefaultWebSecurityManager"> <!--认证管理器--> <property name="realm" ref="shiroSecurityRealm" /> <!-- 缓存管理器 --> <property name="cacheManager" ref="cacheManager" /> <!-- rememberMe管理器 --> <property name="rememberMeManager" ref="rememberMeManager"/> </bean> <!-- 会话ID生成器 --> <bean id="sessionIdGenerator" class="org.apache.shiro.session.mgt.eis.JavaUuidSessionIdGenerator"/> <!-- 会话Cookie模板 --> <bean id="sessionIdCookie" class="org.apache.shiro.web.servlet.SimpleCookie"> <constructor-arg value="sid"/> <property name="httpOnly" value="true"/> <property name="maxAge" value="-1"/> </bean> <bean id="rememberMeCookie" class="org.apache.shiro.web.servlet.SimpleCookie"> <constructor-arg value="rememberMe"/> <property name="httpOnly" value="true"/> <property name="maxAge" value="2592000"/><!-- 30天 --> </bean> <!-- rememberMe管理器 --> <bean id="rememberMeManager" class="org.apache.shiro.web.mgt.CookieRememberMeManager"> <property name="cipherKey" value="#{T(org.apache.shiro.codec.Base64).decode('7gzYfKjTASKdsai43ds==')}"/> <property name="cookie" ref="rememberMeCookie"/> </bean> <!-- 会话DAO --> <bean id="sessionDAO" class="org.apache.shiro.session.mgt.eis.EnterpriseCacheSessionDAO"> <property name="activeSessionsCacheName" value="shiro-activeSessionCache"/> <property name="sessionIdGenerator" ref="sessionIdGenerator"/> </bean> <!-- 会话验证调度器 --> <bean id="sessionValidationScheduler" class="org.apache.shiro.session.mgt.quartz.QuartzSessionValidationScheduler"> <property name="sessionValidationInterval" value="3000000"/> <property name="sessionManager" ref="sessionManager"/> </bean> <!-- 会话管理器 --> <bean id="sessionManager" class="org.apache.shiro.web.session.mgt.DefaultWebSessionManager"> <property name="globalSessionTimeout" value="3000000"/> <property name="deleteInvalidSessions" value="true"/> <property name="sessionValidationSchedulerEnabled" value="true"/> <property name="sessionValidationScheduler" ref="sessionValidationScheduler"/> <property name="sessionDAO" ref="sessionDAO"/> <property name="sessionIdCookieEnabled" value="true"/> <property name="sessionIdCookie" ref="sessionIdCookie"/> </bean> <bean id="formAuthenticationFilter" class="org.apache.shiro.web.filter.authc.FormAuthenticationFilter"> <property name="rememberMeParam" value="rememberMe"/> </bean> <bean id="sysUserFilter" class="yfkj.gz.task.security.SysUserFilter"/> <bean id="shiroFilter" class="org.apache.shiro.spring.web.ShiroFilterFactoryBean"> <property name="securityManager" ref="securityManager"/> <property name="loginUrl" value="/login.jsp"/> <property name="successUrl" value="/page/main.action"/> <property name="filters"> <util:map> <entry key="authc"> <bean class="org.apache.shiro.web.filter.authc.PassThruAuthenticationFilter"/> </entry> <entry key="sysUser" value-ref="sysUserFilter"/> </util:map> </property> <property name="filterChainDefinitions"> <value> /static/** = anon /login.jsp = anon /sysuser/login.action = anon /sysuser/register.action = anon /sysuser/getEMailCount.action = anon /sysuser/getUserNameCount.action = anon /sysuser/logout.action = logout /** = user,sysUser <!-- 表示访问该地址的用户是身份验证通过或RememberMe登录的都可以 --> <!-- /** = authc 表示访问该地址用户必须身份验证通过--> </value> </property> </bean> <!-- Post processor that automatically invokes init() and destroy() methods --> <bean id="lifecycleBeanPostProcessor" class="org.apache.shiro.spring.LifecycleBeanPostProcessor"/> </beans>
上面的
/static/** = anon,/login.jsp = anon...这些等于anon的就是默认不做权限验证的,我们的登录,注册,静态资源等,不需要权限验证。
权限缓存的配置(如果不用缓存的话,每次请求都要去访问数据库查询权限)ehcache-shiro.xml:
<?xml version="1.0" encoding="UTF-8"?> <ehcache name="shirocache"> <diskStore path="java.io.tmpdir/yfkj-shiro-ehcache"/> <!-- 默认缓存 --> <defaultCache maxElementsInMemory="1000" eternal="false" overflowToDisk="true" timeToIdleSeconds="300" timeToLiveSeconds="180" diskPersistent="false" diskExpiryThreadIntervalSeconds="120" /> <!-- 登录记录缓存 --> <cache name="passwordRetryCache" maxEntriesLocalHeap="2000" eternal="false" timeToIdleSeconds="3600" timeToLiveSeconds="0" overflowToDisk="false" statistics="true"> </cache> <!-- 授权缓存 --> <cache name="authorizationCache" maxEntriesLocalHeap="2000" eternal="false" timeToIdleSeconds="3600" timeToLiveSeconds="0" overflowToDisk="false" statistics="true"> </cache> <!-- 认证缓存 --> <cache name="authenticationCache" maxEntriesLocalHeap="2000" eternal="false" timeToIdleSeconds="3600" timeToLiveSeconds="0" overflowToDisk="false" statistics="true"> </cache> <cache name="shiro-activeSessionCache" maxEntriesLocalHeap="2000" eternal="false" timeToIdleSeconds="3600" timeToLiveSeconds="0" overflowToDisk="false" statistics="true"> </cache> <cache name="shiro-kickout-session" maxEntriesLocalHeap="2000" eternal="false" timeToIdleSeconds="3600" timeToLiveSeconds="0" overflowToDisk="false" statistics="true"> </cache> </ehcache>
自定义用户过滤类SysUserFilter:
import yfkj.gz.task.service.ISysUserService; import org.apache.shiro.web.filter.PathMatchingFilter; import javax.annotation.Resource; import javax.servlet.ServletRequest; import javax.servlet.ServletResponse; /** * 自定义用户过滤器 * @author 胡汉三 * */ public class SysUserFilter extends PathMatchingFilter { @Resource private ISysUserService sysUserService; @Override protected boolean onPreHandle(ServletRequest request, ServletResponse response, Object mappedValue) throws Exception { //可以参考http://jinnianshilongnian.iteye.com/blog/2025656 return true; } }
权限认证类ShiroSecurityRealm:
import javax.annotation.Resource; import org.apache.shiro.authc.AuthenticationException; import org.apache.shiro.authc.AuthenticationInfo; import org.apache.shiro.authc.AuthenticationToken; import org.apache.shiro.authc.SimpleAuthenticationInfo; import org.apache.shiro.authc.UsernamePasswordToken; import org.apache.shiro.authc.credential.Sha256CredentialsMatcher; import org.apache.shiro.authz.AuthorizationInfo; import org.apache.shiro.authz.SimpleAuthorizationInfo; import org.apache.shiro.realm.AuthorizingRealm; import org.apache.shiro.subject.PrincipalCollection; import org.springframework.stereotype.Component; import yfkj.gz.task.dao.ISysUserDao; import yfkj.gz.task.entity.SysRole; import yfkj.gz.task.entity.SysUser; import yfkj.gz.task.service.ISysUserService; /** * 权限认证 * @author 胡汉三 * @date 2017年1月19日 上午10:52:17 */ @SuppressWarnings("deprecation") @Component public class ShiroSecurityRealm extends AuthorizingRealm { @Resource private ISysUserService userService; @Resource private ISysUserDao sysUserDao; public ShiroSecurityRealm() { setName("ShiroSecurityRealm"); // This name must match the name in the SysUser class's getPrincipals() method setCredentialsMatcher(new Sha256CredentialsMatcher()); } /** * 登录认证 */ protected AuthenticationInfo doGetAuthenticationInfo(AuthenticationToken authcToken) throws AuthenticationException { UsernamePasswordToken token = (UsernamePasswordToken) authcToken; SysUser user = userService.getByProerties(new String[]{"loginAccount"}, new String[]{token.getUsername()},null); if (user != null) { return new SimpleAuthenticationInfo(user.getUserId(), user.getLoginPass(), getName()); } else { return null; } } /** * 权限认证 */ protected AuthorizationInfo doGetAuthorizationInfo(PrincipalCollection principals) { Long userId = (Long) principals.fromRealm(getName()).iterator().next(); SysUser user = userService.get(userId); if (user != null) { SimpleAuthorizationInfo info = new SimpleAuthorizationInfo(); for (SysRole role : user.getRoles()) { info.addRole(role.getRoleKey()); info.addStringPermissions(role.getPermissions()); } return info; } else { return null; } } }
在web.xml加入:
<!-- 加载spring配置文件 --> <context-param> <param-name>contextConfigLocation</param-name> <param-value>classpath:spring.xml,classpath:spring-hibernate.xml,classpath:spring-shiro.xml</param-value> </context-param> <!-- shiro权限过滤器 --> <filter> <filter-name>shiroFilter</filter-name> <filter-class>org.springframework.web.filter.DelegatingFilterProxy</filter-class> <init-param> <param-name>targetFilterLifecycle</param-name> <param-value>true</param-value> </init-param> </filter> <filter-mapping> <filter-name>shiroFilter</filter-name> <url-pattern>/*</url-pattern> </filter-mapping>
在登录方法中加上权限的登录(构造方法参数:登录账号,登录密码,记住我):
//存入session Subject subject = SecurityUtils.getSubject(); //记得传入明文密码 subject.login(new UsernamePasswordToken(userInfo.getLoginAccount(), user.getLoginPass(), rememberMe)); 完整的登录方法: [java] view plain copy 在CODE上查看代码片派生到我的代码片 /** * 用户登录 * @param response * @param user * @throws IOException */ @RequestMapping(value = "/login", method = { RequestMethod.POST, RequestMethod.GET }) public void login(SysUser user,boolean rememberMe) throws IOException{ //用户登录 SysUser userInfo = userService.getByProerties(new String[]{"loginAccount"}, new String[]{user.getLoginAccount()},null); if(userInfo==null){ result.setMessage("用户名错误"); super.writeJSON(result); return; } if(!userInfo.getLoginPass().equals(new Sha256Hash(user.getLoginPass()).toHex())){ result.setMessage("密码错误"); super.writeJSON(result); return; } //存入session Subject subject = SecurityUtils.getSubject(); //记得传入明文密码 subject.login(new UsernamePasswordToken(userInfo.getLoginAccount(), user.getLoginPass(), rememberMe)); session.setAttribute(USER_SESSION, userInfo); result.setMessage("登录成功"); result.setSuccess(true); super.writeJSON(result); }
数据库也设计好啦,该整合的也整合了,怎么来实现呢,这里先说一点点,详细的等下一篇说:
jsp页面引入page指令:
<%@ taglib prefix="shiro" uri="http://shiro.apache.org/tags" %>
在要做验证的按钮上加上shiro标签的判断:
<shiro:hasPermission name="${ROLE_KEY}:role:role_add"> <button id="btn_add" type="button" class="btn btn-default"> <span class="glyphicon glyphicon-plus" aria-hidden="true"></span>新增 </button> </shiro:hasPermission>
${ROLE_KEY}:role:role_add的意思就是:
${ROLE_KEY}角色
role是指菜单(页面)
role_add指的功能
联合起来就是,当前角色在role菜单(页面)中有没有role_add新增的功能,如果有就会显示,没有就不显示这个按钮啦。
在后台方法中验证:
在对应的方法中加入代码:
Subject subject = SecurityUtils.getSubject(); subject.checkPermission(getCurrentRoleKey()+":role:role_add");
如果没有通过checkPermission,则会直接返回错误,不执行下面的代码啦。
实体Base类BaseEntity:
import java.io.Serializable; import java.util.LinkedHashMap; import java.util.Map; /** * 实体父类 * @author 胡汉三 * @date 2017年1月18日 上午11:03:11 */ public class BaseEntity implements Serializable{ /** * */ private static final long serialVersionUID = 3730369554400423966L; /** * 排序 */ private Map<String, String> sortedConditions = new LinkedHashMap<String, String>(); public Map<String, String> getSortedConditions() { return sortedConditions; } public void setSortedConditions(Map<String, String> sortedConditions) { this.sortedConditions = sortedConditions; } }
用户实体SysUser:
import java.util.HashSet; import java.util.Set; import javax.persistence.Column; import javax.persistence.Entity; import javax.persistence.FetchType; import javax.persistence.GeneratedValue; import javax.persistence.Id; import javax.persistence.JoinTable; import javax.persistence.JoinColumn; import javax.persistence.ManyToMany; import javax.persistence.Table; import org.hibernate.annotations.Cache; import org.hibernate.annotations.CacheConcurrencyStrategy; import yfkj.gz.support.BaseEntity; /** * 用户的实体类 */ @Entity @Table(name = "sys_user") public class SysUser extends BaseEntity{ /** * */ private static final long serialVersionUID = 2491111485758197830L; /**主键**/ @Id @GeneratedValue @Column(name = "user_id") private Long userId; /**登录账号**/ @Column(name = "login_account" ,length = 30 , unique = true ) private String loginAccount; /**登录密码**/ @Column(name = "login_pass" ,length = 65) private String loginPass; /**昵称**/ @Column(name = "user_name" ,length = 20) private String userName; /**头像**/ @Column(name = "user_head" ,length = 30) private String userHead; /**手机**/ @Column(name = "user_phone" ,length = 20) private String userPhone; /**邮箱**/ @Column(name = "user_email" ,length = 30) private String userEmail; /**性别**/ @Column(name = "user_sex") private Integer userSex; /**生日**/ @Column(name = "user_birthday" ,length = 30) private String userBirthday; /**注册时间**/ @Column(name = "register_time" ,length = 30) private String registerTime; /**部门编码**/ @Column(name = "department_key" ,length = 20) private String departmentKey; /**用户角色**/ @ManyToMany(fetch = FetchType.EAGER) @JoinTable(name = "sys_user_role", joinColumns = { @JoinColumn(name = "user_id") }, inverseJoinColumns = { @JoinColumn(name = "role_id") }) @Cache(region = "all", usage = CacheConcurrencyStrategy.READ_WRITE) private Set<SysRole> roles = new HashSet<SysRole>(); /**get/set**/ /**主键**/ public Long getUserId(){ return userId; } /**主键**/ public void setUserId(Long userId){ this.userId= userId; } /**登录账号**/ public String getLoginAccount(){ return loginAccount; } /**登录账号**/ public void setLoginAccount(String loginAccount){ this.loginAccount= loginAccount; } /**登录密码**/ public String getLoginPass(){ return loginPass; } /**登录密码**/ public void setLoginPass(String loginPass){ this.loginPass= loginPass; } /**昵称**/ public String getUserName(){ return userName; } /**昵称**/ public void setUserName(String userName){ this.userName= userName; } /**头像**/ public String getUserHead(){ return userHead; } /**头像**/ public void setUserHead(String userHead){ this.userHead= userHead; } /**手机**/ public String getUserPhone(){ return userPhone; } /**手机**/ public void setUserPhone(String userPhone){ this.userPhone= userPhone; } /**邮箱**/ public String getUserEmail(){ return userEmail; } /**邮箱**/ public void setUserEmail(String userEmail){ this.userEmail= userEmail; } /**性别**/ public Integer getUserSex(){ return userSex; } /**性别**/ public void setUserSex(Integer userSex){ this.userSex= userSex; } /**生日**/ public String getUserBirthday(){ return userBirthday; } /**生日**/ public void setUserBirthday(String userBirthday){ this.userBirthday= userBirthday; } /**注册时间**/ public String getRegisterTime(){ return registerTime; } /**注册时间**/ public void setRegisterTime(String registerTime){ this.registerTime= registerTime; } public Set<SysRole> getRoles() { return roles; } public void setRoles(Set<SysRole> roles) { this.roles = roles; } }
角色实体SysRole:
import java.util.Set; import javax.persistence.Column; import javax.persistence.ElementCollection; import javax.persistence.Entity; import javax.persistence.GeneratedValue; import javax.persistence.Id; import javax.persistence.JoinColumn; import javax.persistence.JoinTable; import javax.persistence.Table; import org.hibernate.annotations.Cache; import org.hibernate.annotations.CacheConcurrencyStrategy; import yfkj.gz.support.BaseEntity; /** * 角色的实体类 */ @Entity @Table(name = "sys_role") @Cache(region = "all", usage = CacheConcurrencyStrategy.READ_WRITE) public class SysRole extends BaseEntity{ // 各个字段的含义请查阅文档的数据库结构部分 private static final long serialVersionUID = 6019103858711599150L; @Id @GeneratedValue @Column(name = "role_id") private Long roleId; @Column(name = "role_key", length = 40, nullable = false, unique = true) private String roleKey; @Column(name = "role_value", length = 40, nullable = false) private String roleValue; @Column(name = "create_time", length = 30) private String createTime; @Column(name = "description", length = 200) private String description; @ElementCollection @JoinTable(name = "sys_role_permission", joinColumns = { @JoinColumn(name = "role_id") }) @Cache(region = "all", usage = CacheConcurrencyStrategy.READ_WRITE) private Set<String> permissions; @Column(name="company_id") private Long companyId; public SysRole() { } public Long getRoleId() { return roleId; } public void setRoleId(Long roleId) { this.roleId = roleId; } public String getRoleKey() { return roleKey; } public void setRoleKey(String roleKey) { this.roleKey = roleKey; } public String getRoleValue() { return roleValue; } public void setRoleValue(String roleValue) { this.roleValue = roleValue; } public String getCreateTime() { return createTime; } public void setCreateTime(String createTime) { this.createTime = createTime; } public String getDescription() { return description; } public void setDescription(String description) { this.description = description; } public Set<String> getPermissions() { return permissions; } public void setPermissions(Set<String> permissions) { this.permissions = permissions; } public Long getCompanyId() { return companyId; } public void setCompanyId(Long companyId) { this.companyId = companyId; } }
项目结构图:
源码地址:spring-shiro_jb51.rar
以上就是本文的全部内容,希望对大家的学习有所帮助,也希望大家多多支持小牛知识库。
本文向大家介绍Codeigniter整合Tank Auth权限类库详解,包括了Codeigniter整合Tank Auth权限类库详解的使用技巧和注意事项,需要的朋友参考一下 相交其他CodeIgniter的类库,tank_auth,配置简单,使用也简单,并且作者也一直在更新,现在是1.0.9。1.0.8已经支持CI2.0了,我现在一般的项目都是用它,所以推荐给大家。 安装Tankauth的步骤
本文向大家介绍SpringBoot中整合Shiro实现权限管理的示例代码,包括了SpringBoot中整合Shiro实现权限管理的示例代码的使用技巧和注意事项,需要的朋友参考一下 之前在 SSM 项目中使用过 shiro,发现 shiro 的权限管理做的真不错,但是在 SSM 项目中的配置太繁杂了,于是这次在 SpringBoot 中使用了 shiro,下面一起看看吧 一、简介 Apache Sh
本文向大家介绍Spring MVC整合Shiro权限控制的方法,包括了Spring MVC整合Shiro权限控制的方法的使用技巧和注意事项,需要的朋友参考一下 Apache Shiro 是一个功能强大且灵活的开放源代码安全框架,可以细粒度地处理认证 (Authentication),授权 (Authorization),会话 (Session) 管理和加密 (cryptography) 等企业级应
本文向大家介绍MySQL用户与权限的管理详解,包括了MySQL用户与权限的管理详解的使用技巧和注意事项,需要的朋友参考一下 本文实例讲述了MySQL用户与权限的管理。分享给大家供大家参考,具体如下: 用户连接到MySQL,可以做各种查询,这都是MySQL用户与权限功能在背后维持着操作。 用户与数据库服务器交互数据,分为两个阶段: (1)你有没有权连接上来 (2)你有没有权执行本操作 1、你有没有权
本文向大家介绍详解Spring整合Ehcache管理缓存,包括了详解Spring整合Ehcache管理缓存的使用技巧和注意事项,需要的朋友参考一下 前言 Ehcache 是一个成熟的缓存框架,你可以直接使用它来管理你的缓存。 Spring 提供了对缓存功能的抽象:即允许绑定不同的缓存解决方案(如Ehcache),但本身不直接提供缓存功能的实现。它支持注解方式使用缓存,非常方便。 本文先通过Ehc
本文向大家介绍MySQL用户权限管理详解,包括了MySQL用户权限管理详解的使用技巧和注意事项,需要的朋友参考一下 用户权限管理主要有以下作用: 1. 可以限制用户访问哪些库、哪些表 2. 可以限制用户对哪些表执行SELECT、CREATE、DELETE、DELETE、ALTER等操作 3. 可以限制用户登录的IP或域名 4. 可以限制用户自己的权限是否可以授权给别的用户 一、用户授权 •all