Java tutorial
package com.dc.esb.servicegov.security.impl; /* * Licensed to the Apache Software Foundation (ASF) under one * or more contributor license agreements. See the NOTICE file * distributed with this work for additional information * regarding copyright ownership. The ASF licenses this file * to you under the Apache License, Version 2.0 (the * "License"); you may not use this file except in compliance * with the License. You may obtain a copy of the License at * * http://www.apache.org/licenses/LICENSE-2.0 * * Unless required by applicable law or agreed to in writing, * software distributed under the License is distributed on an * "AS IS" BASIS, WITHOUT WARRANTIES OR CONDITIONS OF ANY * KIND, either express or implied. See the License for the * specific language governing permissions and limitations * under the License. */ import com.dc.esb.servicegov.entity.*; import com.dc.esb.servicegov.service.impl.*; import org.apache.commons.logging.Log; import org.apache.commons.logging.LogFactory; import org.apache.shiro.authc.*; import org.apache.shiro.authz.AuthorizationInfo; import org.apache.shiro.authz.SimpleAuthorizationInfo; import org.apache.shiro.realm.AuthorizingRealm; import org.apache.shiro.subject.PrincipalCollection; import org.springframework.beans.factory.annotation.Autowired; import org.springframework.stereotype.Component; import org.springframework.transaction.annotation.Transactional; import java.util.List; /** * The Spring/Hibernate sample application's one and only configured Apache Shiro Realm. * <p/> * <p>Because a Realm is really just a security-specific DAO, we could have just made Hibernate calls directly * in the implementation and named it a 'HibernateRealm' or something similar.</p> * currentUserInterceptor * <p>But we've decided to make the calls to the database using a UserDAO, since a DAO would be used in other areas * of a 'real' application in addition to here. We felt it better to use that same DAO to show code re-use.</p> */ @Component public class SampleRealm extends AuthorizingRealm { private static final Log log = LogFactory.getLog(SampleRealm.class); @Autowired private SecurityServiceImpl securityService; public SampleRealm() { setName("SampleRealm"); //This name must match the name in the User class's getPrincipals() method // setCredentialsMatcher(new Sha256CredentialsMatcher()); } @Override protected AuthenticationInfo doGetAuthenticationInfo(AuthenticationToken authcToken) throws AuthenticationException { log.info("user login"); UsernamePasswordToken token = (UsernamePasswordToken) authcToken; SGUser user = securityService.getUserById(token.getUsername()); if (user != null) { return new SimpleAuthenticationInfo(token.getUsername(), user.getPassword(), getName()); } else { return null; } } @Transactional protected AuthorizationInfo doGetAuthorizationInfo(PrincipalCollection principals) { String userName = (String) principals.fromRealm(getName()).iterator().next(); SGUser user = securityService.getUserById(userName); if (user != null) { SimpleAuthorizationInfo info = new SimpleAuthorizationInfo(); List<Role> roles = securityService.getRoleOfUser(userName); for (Role role : roles) { info.addRole(role.getName()); List<Permission> permissions = securityService.getPermissionOfRole(role.getId()); for (Permission permission : permissions) { info.addStringPermission(permission.getDescription() + "-" + permission.getName()); } } return info; } else { return null; } } }