<em>Mac</em>Book项目 2009年学校开始实施<em>Mac</em>Book项目,所有师生配备一本<em>Mac</em>Book,并同步更新了校园无线网络。学校每周进行电脑技术更新,每月发送技术支持资料,极大改变了教学及学习方式。因此2011
2021-06-01 09:32:01
pom.xml
<dependencies> <dependency> <groupId>org.springframework.boot</groupId> <artifactId>spring-boot-starter-web</artifactId> </dependency> <artifactId>spring-boot-devtools</artifactId> <scope>runtime</scope> <optional>true</optional> <groupId>org.projectlombok</groupId> <artifactId>lombok</artifactId> <artifactId>spring-boot-starter-test</artifactId> <scope>test</scope> <!--引入Jsp依賴--> <groupId>org.apache.tomcat.embed</groupId> <artifactId>tomcat-embed-jasper</artifactId> <!--jstl--> <groupId>jstl</groupId> <artifactId>jstl</artifactId> <version>1.2</version> </dependencies> <build> <plugins> <plugin> <groupId>org.springframework.boot</groupId> <artifactId>spring-boot-maven-plugin</artifactId> <configuration> <excludes> <exclude> <groupId>org.projectlombok</groupId> <artifactId>lombok</artifactId> </exclude> </excludes> </configuration> </plugin> </plugins> </build>
在webapp資料夾中建立index.jsp和login.jsp
index.jsp
<%@page contentType="text/html;UTF-8" pageEncoding="UTF-8" isErrorPage="false" %> <!doctype html> <html lang="en"> <head> <meta charset="UTF-8"> <meta name="viewport" content="width=device-width, user-scalable=no, initial-scale=1.0, maximum-scale=1.0, minimum-scale=1.0"> <meta http-equiv="X-UA-Compatible" content="ie=edge"> <title>Document</title> </head> <body> <%--受限資源--%> <h1>系統主頁</h1> <ul> <li><a href="#" rel="external nofollow" rel="external nofollow" rel="external nofollow" rel="external nofollow" rel="external nofollow" rel="external nofollow" rel="external nofollow" rel="external nofollow" rel="external nofollow" rel="external nofollow" rel="external nofollow" rel="external nofollow" >使用者管理</a></li> <li><a href="#" rel="external nofollow" rel="external nofollow" rel="external nofollow" rel="external nofollow" rel="external nofollow" rel="external nofollow" rel="external nofollow" rel="external nofollow" rel="external nofollow" rel="external nofollow" rel="external nofollow" rel="external nofollow" >商品管理</a></li> <li><a href="#" rel="external nofollow" rel="external nofollow" rel="external nofollow" rel="external nofollow" rel="external nofollow" rel="external nofollow" rel="external nofollow" rel="external nofollow" rel="external nofollow" rel="external nofollow" rel="external nofollow" rel="external nofollow" >訂單管理</a></li> <li><a href="#" rel="external nofollow" rel="external nofollow" rel="external nofollow" rel="external nofollow" rel="external nofollow" rel="external nofollow" rel="external nofollow" rel="external nofollow" rel="external nofollow" rel="external nofollow" rel="external nofollow" rel="external nofollow" >物流管理</a></li> </ul> </body> </html>
login.jsp
<%@page contentType="text/html;UTF-8" pageEncoding="UTF-8" isErrorPage="false" %> <!doctype html> <html lang="en"> <head> <meta charset="UTF-8"> <meta name="viewport" content="width=device-width, user-scalable=no, initial-scale=1.0, maximum-scale=1.0, minimum-scale=1.0"> <meta http-equiv="X-UA-Compatible" content="ie=edge"> <title>Document</title> </head> <body> <h1>登入介面</h1> <form action="${pageContext.request.contextPath}/user/login" method="post"> 使用者名稱:<input type="text" name="username" > <br/> 密碼 : <input type="text" name="password"> <br> <input type="submit" value="登入"> </form> </html>
application.properties
server.port=8080 server.servlet.context-path=/shiro spring.application.name=shiro spring.mvc.view.prefix=/ spring.mvc.view.suffix=.jsp
JSP 與IDEA 與SpringBoot存在一定的不相容,修改此設定即可解決
pom.xml
<!--引入shrio--> <dependency> <groupId>org.apache.shiro</groupId> <artifactId>shiro-spring-boot-starter</artifactId> <version>1.5.3</version> </dependency>
在shiro資料夾下建立realm資料夾
package com.test.shiro.realm; import org.apache.shiro.authc.AuthenticationException; import org.apache.shiro.authc.AuthenticationInfo; import org.apache.shiro.authc.AuthenticationToken; import org.apache.shiro.authz.AuthorizationInfo; import org.apache.shiro.realm.AuthorizingRealm; import org.apache.shiro.subject.PrincipalCollection; /** * 自定義Realm */ public class CustomerRealm extends AuthorizingRealm { @Override protected AuthorizationInfo doGetAuthorizationInfo(PrincipalCollection principalCollection) { return null; } @Override protected AuthenticationInfo doGetAuthenticationInfo(AuthenticationToken authenticationToken) throws AuthenticationException { return null; } }
在config資料夾中建立ShiroConfig.java
@Configuration public class ShiroConfig { //ShiroFilter過濾所有請求 @Bean public ShiroFilterFactoryBean getShiroFilterFactoryBean(DefaultWebSecurityManager securityManager) { ShiroFilterFactoryBean shiroFilterFactoryBean = new ShiroFilterFactoryBean(); //給ShiroFilter設定安全管理器 shiroFilterFactoryBean.setSecurityManager(securityManager); //設定系統受限資源 //設定系統公共資源 Map<String, String> map = new HashMap<String, String>(); map.put("/index.jsp","authc");//表示這個資源需要認證和授權 // 設定認證介面路徑 shiroFilterFactoryBean.setLoginUrl("/login.jsp"); shiroFilterFactoryBean.setFilterChainDefinitionMap(map); return shiroFilterFactoryBean; } //建立安全管理器 @Bean public DefaultWebSecurityManager getDefaultWebSecurityManager(Realm realm) { DefaultWebSecurityManager securityManager = new DefaultWebSecurityManager(); securityManager.setRealm(realm); return securityManager; } //建立自定義Realm @Bean public Realm getRealm() { CustomerRealm realm = new CustomerRealm(); return realm; } }
輸入http://localhost:8080/shiro/index.jsp,發現需要跳轉到login.jsp
注意: shiro提供和多個預設的過濾器,我們可以用這些過濾器來設定控制指定url的許可權:
index.jsp
<a href="${pageContext.request.contextPath}/user/logout" rel="external nofollow" rel="external nofollow" >退出登入</a>
UserController.java
@Controller @RequestMapping("/user") public class UserController { @RequestMapping("logout") public String logout() { Subject subject = SecurityUtils.getSubject(); subject.logout(); return "redirect:/login.jsp"; } @RequestMapping("/login") public String login(String username, String password) { //獲取主題物件 Subject subject = SecurityUtils.getSubject(); try { subject.login(new UsernamePasswordToken(username,password)); System.out.println("登入成功!!!"); return "redirect:/index.jsp"; } catch (UnknownAccountException e) { e.printStackTrace(); System.out.println("使用者錯誤!!!"); } catch (IncorrectCredentialsException e) { System.out.println("密碼錯誤!!!"); } return "redirect:/login.jsp"; } }
CustomerRealm.java
/** * 自定義Realm */ public class CustomerRealm extends AuthorizingRealm { @Override protected AuthorizationInfo doGetAuthorizationInfo(PrincipalCollection principalCollection) { return null; } @Override protected AuthenticationInfo doGetAuthenticationInfo(AuthenticationToken authenticationToken) throws AuthenticationException { String principal = (String) authenticationToken.getPrincipal(); if ("zhangsan".equals(principal)) { return new SimpleAuthenticationInfo(principal,"123456",this.getName()); } return null; } }
ShiroConfig.java
公共資源一定是在受限資源上面,不然會造成死迴圈。
@Configuration public class ShiroConfig { //ShiroFilter過濾所有請求 @Bean public ShiroFilterFactoryBean getShiroFilterFactoryBean(DefaultWebSecurityManager securityManager) { ShiroFilterFactoryBean shiroFilterFactoryBean = new ShiroFilterFactoryBean(); //給ShiroFilter設定安全管理器 shiroFilterFactoryBean.setSecurityManager(securityManager); //設定系統受限資源 //設定系統公共資源 Map<String, String> map = new HashMap<String, String>(); map.put("/user/login","anon");//表示這個為公共資源 一定是在受限資源上面 map.put("/**","authc");//表示這個受限資源需要認證和授權 // 設定認證介面路徑 shiroFilterFactoryBean.setLoginUrl("/login.jsp"); shiroFilterFactoryBean.setFilterChainDefinitionMap(map); return shiroFilterFactoryBean; } //建立安全管理器 @Bean public DefaultWebSecurityManager getDefaultWebSecurityManager(Realm realm) { DefaultWebSecurityManager securityManager = new DefaultWebSecurityManager(); securityManager.setRealm(realm); return securityManager; } //建立自定義Realm @Bean public Realm getRealm() { CustomerRealm realm = new CustomerRealm(); return realm; } }
登入正常,登出正常,未登入和登出後不能存取index.jsp
SET NAMES utf8mb4; SET FOREIGN_KEY_CHECKS = 0; -- ---------------------------- -- Table structure for t_user -- ---------------------------- DROP TABLE IF EXISTS `t_user`; CREATE TABLE `t_user` ( `id` INT(6) NOT NULL AUTO_INCREMENT, `username` VARCHAR(40) DEFAULT NULL, `password` VARCHAR(40) DEFAULT NULL, `salt` VARCHAR(255) DEFAULT NULL, PRIMARY KEY (`id`) ) ENGINE=INNODB AUTO_INCREMENT=2 DEFAULT CHARSET=utf8; SET FOREIGN_KEY_CHECKS = 1;
<!--引入mybatis--> <dependency> <groupId>tk.mybatis</groupId> <artifactId>mapper-spring-boot-starter</artifactId> <version>2.1.5</version> </dependency> <!--mysql--> <dependency> <groupId>mysql</groupId> <artifactId>mysql-connector-java</artifactId> </dependency> <!--druid--> <dependency> <groupId>com.alibaba</groupId> <artifactId>druid</artifactId> <version>1.2.6</version> </dependency>
application.properties
#設定資料來源 spring.datasource.type=com.alibaba.druid.pool.DruidDataSource spring.datasource.driver-class-name=com.mysql.jdbc.Driver spring.datasource.url=jdbc:mysql://localhost:3306/springboot_shrio?characterEncoding=UTF-8 spring.datasource.username=root spring.datasource.password=123456 mybatis.type-aliases-package=com.test.entity mybatis.mapper-locations=classpath:com/test/mapper/*.xml
User.java
@Data @Accessors(chain = true) @NoArgsConstructor @AllArgsConstructor public class User { private String id; private String username; private String password; private String salt; }
UserDao.java
@Mapper @Repository public interface UserDao { void save(User user); User findByUsername(String username); }
UserDao.xml
<?xml version="1.0" encoding="UTF-8" ?> <!DOCTYPE mapper PUBLIC "-//mybatis.org//DTD Config 3.0//EN" "http://mybatis.org/dtd/mybatis-3-mapper.dtd"> <mapper namespace="com.test.dao.UserDao"> <insert id="save" parameterType="User" useGeneratedKeys="true" keyProperty="id"> insert into t_user values(#{id},#{username},#{password},#{salt}) </insert> <select id="findByUsername" parameterType="String" resultType="User"> select id,username,password,salt from t_user where username = #{username} </select> </mapper>
UserService.java
public interface UserService { //註冊使用者方法 void register(User user); //根據使用者名稱查詢使用者 User findByUsername(String username); }
SaltUtil.java
public class SaltUtil { public static String getSalt(int n) { char[] chars = "ABCDEFGHIJKLMNOPQRSTUVWXYZabcdefghijklmnopqrstuvwxyz01234567890!@#$%^&*()".toCharArray(); StringBuilder sb = new StringBuilder(); for (int i = 0; i < n; i++) { char c = chars[new Random().nextInt(chars.length)]; sb.append(c); } return sb.toString(); } public static void main(String[] args) { System.out.println(getSalt(4)); } }
UserServiceImpl.java
@Service("userService") @Transactional public class UserServiceImpl implements UserService { @Autowired private UserDao userDao; @Override public void register(User user) { //1.獲取隨機鹽 String salt = SaltUtil.getSalt(8); //2.將隨機鹽儲存到資料 user.setSalt(salt); //3.明文密碼進行md5 + salt + hash雜湊 Md5Hash MD5 = new Md5Hash(user.getPassword(),salt,1024); user.setPassword(MD5.toHex()); userDao.save(user); } @Override public User findByUsername(String username) { return userDao.findByUsername(username); } }
UserController.java
@Controller @RequestMapping("/user") public class UserController { @Autowired private UserService userService; @RequestMapping("/register") public String register(User user) { try { userService.register(user); return "redirect:/login.jsp"; } catch (Exception e) { e.printStackTrace(); return "redirect:/register.jsp"; } } @RequestMapping("logout") public String logout() { Subject subject = SecurityUtils.getSubject(); subject.logout(); return "redirect:/login.jsp"; } @RequestMapping("/login") public String login(String username, String password) { //獲取主題物件 Subject subject = SecurityUtils.getSubject(); try { subject.login(new UsernamePasswordToken(username,password)); System.out.println("登入成功!!!"); return "redirect:/index.jsp"; } catch (UnknownAccountException e) { e.printStackTrace(); System.out.println("使用者錯誤!!!"); } catch (IncorrectCredentialsException e) { System.out.println("密碼錯誤!!!"); } return "redirect:/login.jsp"; } }
CustomerRealm.java
/** * 自定義Realm */ public class CustomerRealm extends AuthorizingRealm { @Override protected AuthorizationInfo doGetAuthorizationInfo(PrincipalCollection principalCollection) { return null; } @Override protected AuthenticationInfo doGetAuthenticationInfo(AuthenticationToken authenticationToken) throws AuthenticationException { String principal = (String) authenticationToken.getPrincipal(); //獲取UserService物件 UserService userService = (UserService) ApplicationContextUtil.getBean("userService"); //System.out.println(userService); User user = userService.findByUsername(principal); if (!ObjectUtils.isEmpty(user)) { return new SimpleAuthenticationInfo(user.getUsername(), user.getPassword(), ByteSource.Util.bytes(user.getSalt()), this.getName()); } return null; } }
ApplicationContextUtil.java
@Component public class ApplicationContextUtil implements ApplicationContextAware { private static ApplicationContext context; @Override public void setApplicationContext(ApplicationContext applicationContext) throws BeansException { this.context = applicationContext; } //根據bean名字獲取工廠中指定bean 物件 public static Object getBean(String beanName) { return context.getBean(beanName); } }
ShiroConfig.java
@Configuration public class ShiroConfig { //ShiroFilter過濾所有請求 @Bean public ShiroFilterFactoryBean getShiroFilterFactoryBean(DefaultWebSecurityManager securityManager) { ShiroFilterFactoryBean shiroFilterFactoryBean = new ShiroFilterFactoryBean(); //給ShiroFilter設定安全管理器 shiroFilterFactoryBean.setSecurityManager(securityManager); //設定系統受限資源 //設定系統公共資源 Map<String, String> map = new HashMap<String, String>(); map.put("/user/login","anon");//表示這個為公共資源 一定是在受限資源上面 map.put("/user/register","anon");//表示這個為公共資源 一定是在受限資源上面 map.put("/register.jsp","anon");//表示這個為公共資源 一定是在受限資源上面 map.put("/**","authc");//表示這個受限資源需要認證和授權 // 設定認證介面路徑 shiroFilterFactoryBean.setLoginUrl("/login.jsp"); shiroFilterFactoryBean.setFilterChainDefinitionMap(map); return shiroFilterFactoryBean; } //建立安全管理器 @Bean public DefaultWebSecurityManager getDefaultWebSecurityManager(Realm realm) { DefaultWebSecurityManager securityManager = new DefaultWebSecurityManager(); securityManager.setRealm(realm); return securityManager; } //建立自定義Realm @Bean public Realm getRealm() { CustomerRealm realm = new CustomerRealm(); HashedCredentialsMatcher credentialsMatcher = new HashedCredentialsMatcher(); //設定使用MD5加密演演算法 credentialsMatcher.setHashAlgorithmName("md5"); //雜湊次數 credentialsMatcher.setHashIterations(1024); realm.setCredentialsMatcher(credentialsMatcher); return realm; }
register.jsp
<%@page contentType="text/html;UTF-8" pageEncoding="UTF-8" isErrorPage="false" %> <!doctype html> <html lang="en"> <head> <meta charset="UTF-8"> <meta name="viewport" content="width=device-width, user-scalable=no, initial-scale=1.0, maximum-scale=1.0, minimum-scale=1.0"> <meta http-equiv="X-UA-Compatible" content="ie=edge"> <title>Document</title> </head> <body> <h1>註冊介面</h1> <form action="${pageContext.request.contextPath}/user/register" method="post"> 使用者名稱:<input type="text" name="username" > <br/> 密碼 : <input type="text" name="password"> <br> <input type="submit" value="立即註冊"> </form> </html>
新增成功
認證
優化版推薦閱讀(SpringBoot + Shiro + Jwt 實現登入認證,程式碼分析):https://blog.csdn.net/qq_43290318/article/details/108225519
CustomerRealm.java
@Override protected AuthorizationInfo doGetAuthorizationInfo(PrincipalCollection principalCollection) { String principal = (String) principalCollection.getPrimaryPrincipal(); if ("zhangsan".equals(principal)) { SimpleAuthorizationInfo info = new SimpleAuthorizationInfo(); info.addRole("admin"); info.addRole("user"); info.addStringPermission("user:find:*"); info.addStringPermission("admin:*"); return info; } return null; }
index.jsp
<%@page contentType="text/html;UTF-8" pageEncoding="UTF-8" isErrorPage="false" %> <%@taglib prefix="shiro" uri="http://shiro.apache.org/tags" %> <!doctype html> <html lang="en"> <head> <meta charset="UTF-8"> <meta name="viewport" content="width=device-width, user-scalable=no, initial-scale=1.0, maximum-scale=1.0, minimum-scale=1.0"> <meta http-equiv="X-UA-Compatible" content="ie=edge"> <title>Document</title> </head> <body> <%--受限資源--%> <h1>系統主頁</h1> <a href="${pageContext.request.contextPath}/user/logout" rel="external nofollow" rel="external nofollow" >退出登入</a> <ul> <shiro:hasRole name="user"> <li><a href="#" rel="external nofollow" rel="external nofollow" rel="external nofollow" rel="external nofollow" rel="external nofollow" rel="external nofollow" rel="external nofollow" rel="external nofollow" rel="external nofollow" rel="external nofollow" rel="external nofollow" rel="external nofollow" >使用者管理</a></li> <ul> <shiro:hasPermission name="user:save:*"> <li><a href="#" rel="external nofollow" rel="external nofollow" rel="external nofollow" rel="external nofollow" rel="external nofollow" rel="external nofollow" rel="external nofollow" rel="external nofollow" rel="external nofollow" rel="external nofollow" rel="external nofollow" rel="external nofollow" >增加</a></li> </shiro:hasPermission> <shiro:hasPermission name="user:delete:*"> <li><a href="#" rel="external nofollow" rel="external nofollow" rel="external nofollow" rel="external nofollow" rel="external nofollow" rel="external nofollow" rel="external nofollow" rel="external nofollow" rel="external nofollow" rel="external nofollow" rel="external nofollow" rel="external nofollow" >刪除</a></li> </shiro:hasPermission> <shiro:hasPermission name="user:update:*"> <li><a href="#" rel="external nofollow" rel="external nofollow" rel="external nofollow" rel="external nofollow" rel="external nofollow" rel="external nofollow" rel="external nofollow" rel="external nofollow" rel="external nofollow" rel="external nofollow" rel="external nofollow" rel="external nofollow" >修改</a></li> </shiro:hasPermission> <shiro:hasPermission name="user:find:*"> <li><a href="#" rel="external nofollow" rel="external nofollow" rel="external nofollow" rel="external nofollow" rel="external nofollow" rel="external nofollow" rel="external nofollow" rel="external nofollow" rel="external nofollow" rel="external nofollow" rel="external nofollow" rel="external nofollow" >查詢</a></li> </shiro:hasPermission> </ul> </shiro:hasRole> <shiro:hasRole name="admin"> <li><a href="#" rel="external nofollow" rel="external nofollow" rel="external nofollow" rel="external nofollow" rel="external nofollow" rel="external nofollow" rel="external nofollow" rel="external nofollow" rel="external nofollow" rel="external nofollow" rel="external nofollow" rel="external nofollow" >商品管理</a></li> <li><a href="#" rel="external nofollow" rel="external nofollow" rel="external nofollow" rel="external nofollow" rel="external nofollow" rel="external nofollow" rel="external nofollow" rel="external nofollow" rel="external nofollow" rel="external nofollow" rel="external nofollow" rel="external nofollow" >訂單管理</a></li> <li><a href="#" rel="external nofollow" rel="external nofollow" rel="external nofollow" rel="external nofollow" rel="external nofollow" rel="external nofollow" rel="external nofollow" rel="external nofollow" rel="external nofollow" rel="external nofollow" rel="external nofollow" rel="external nofollow" >物流管理</a></li> </shiro:hasRole> </ul> </body> </html>
OrderController.java
@Controller @RequestMapping("order") public class OrderController { @RequestMapping("save") public String save() { //基於角色 //獲取主體物件 Subject subject = SecurityUtils.getSubject(); //程式碼方式 if (subject.hasRole("admin")) { System.out.println("儲存訂單!"); }else{ System.out.println("無權存取!"); } System.out.println("進入save方法============"); return "redircet:/index.jsp"; } }
OrderController.java
@Controller @RequestMapping("order") public class OrderController { @RequiresRoles(value={"admin","user"})//用來判斷角色 同時具有 admin user @RequiresPermissions("user:update:01") //用來判斷許可權字串 @RequestMapping("save") public String save(){ System.out.println("進入方法"); return "redirect:/index.jsp"; } }
SET NAMES utf8mb4; SET FOREIGN_KEY_CHECKS = 0; -- ---------------------------- -- Table structure for t_perms -- ---------------------------- DROP TABLE IF EXISTS `t_perms`; CREATE TABLE `t_pers` ( `id` int(6) NOT NULL AUTO_INCREMENT, `name` varchar(80) DEFAULT NULL, `url` varchar(255) DEFAULT NULL, PRIMARY KEY (`id`) ) ENGINE=InnoDB DEFAULT CHARSET=utf8; -- ---------------------------- -- Table structure for t_role -- ---------------------------- DROP TABLE IF EXISTS `t_role`; CREATE TABLE `t_role` ( `id` int(6) NOT NULL AUTO_INCREMENT, `name` varchar(60) DEFAULT NULL, PRIMARY KEY (`id`) ) ENGINE=InnoDB DEFAULT CHARSET=utf8; -- ---------------------------- -- Table structure for t_role_perms -- ---------------------------- DROP TABLE IF EXISTS `t_role_perms`; CREATE TABLE `t_role_perms` ( `id` int(6) NOT NULL, `roleid` int(6) DEFAULT NULL, `permsid` int(6) DEFAULT NULL, PRIMARY KEY (`id`) ) ENGINE=InnoDB DEFAULT CHARSET=utf8; -- ---------------------------- -- Table structure for t_user -- ---------------------------- DROP TABLE IF EXISTS `t_user`; CREATE TABLE `t_user` ( `id` int(6) NOT NULL AUTO_INCREMENT, `username` varchar(40) DEFAULT NULL, `password` varchar(40) DEFAULT NULL, `salt` varchar(255) DEFAULT NULL, PRIMARY KEY (`id`) ) ENGINE=InnoDB AUTO_INCREMENT=2 DEFAULT CHARSET=utf8; -- ---------------------------- -- Table structure for t_user_role -- ---------------------------- DROP TABLE IF EXISTS `t_user_role`; CREATE TABLE `t_user_role` ( `id` int(6) NOT NULL, `userid` int(6) DEFAULT NULL, `roleid` int(6) DEFAULT NULL, PRIMARY KEY (`id`) ) ENGINE=InnoDB DEFAULT CHARSET=utf8; SET FOREIGN_KEY_CHECKS = 1;
User
@Data @Accessors(chain = true) @AllArgsConstructor @NoArgsConstructor public class User implements Serializable { private String id; private String username; private String password; private String salt; //定義角色集合 private List<Role> roles; }
Role
@Data @Accessors(chain = true) @AllArgsConstructor @NoArgsConstructor public class Role implements Serializable { private String id; private String name; //定義許可權的集合 private List<Perms> perms; }
Perms
@Data @Accessors(chain = true) @AllArgsConstructor @NoArgsConstructor public class Perms implements Serializable { private String id; private String name; private String url; }
UserDao.java
//根據使用者名稱查詢所有角色 User findRolesByUserName(String username);
UserDao.xml
<resultMap id="userMap" type="User"> <id column="uid" property="id"/> <result column="username" property="username"/> <!--角色資訊--> <collection property="roles" javaType="list" ofType="Role"> <id column="id" property="id"/> <result column="rname" property="name"/> </collection> </resultMap> <select id="findRolesByUserName" parameterType="String" resultMap="userMap"> SELECT u.id uid,u.username,r.id,r.NAME rname FROM t_user u LEFT JOIN t_user_role ur ON u.id=ur.userid LEFT JOIN t_role r ON ur.roleid=r.id WHERE u.username=#{username} </select>
UserService.java
public interface UserService { User findRoleByUsername(String username); }
UserServiceImpl.java
@Service("userService") @Transactional public class UserServiceImpl implements UserService { @Autowired private UserDao userDao; @Override public User findRoleByUsername(String username) { return userDao.findRoleByUsername(username); } }
CustomerRealm.java
/** * 自定義Realm */ public class CustomerRealm extends AuthorizingRealm { @Override protected AuthorizationInfo doGetAuthorizationInfo(PrincipalCollection principalCollection) { String principal = (String) principalCollection.getPrimaryPrincipal(); //獲取UserService物件 UserService userService = (UserService) ApplicationContextUtil.getBean("userService"); //System.out.println(userService); //基於角色授權 User user = userService.findRoleByUsername(principal); if (!CollectionUtils.isEmpty(user.getRoles())) { SimpleAuthorizationInfo info = new SimpleAuthorizationInfo(); user.getRoles().forEach(role -> info.addRole(role.getName())); return info; } return null; } ...... }
UserDao.java
@Mapper @Repository public interface UserDao { //根據角色id查詢許可權集合 Role findPermByRoleId(String id); //根據角色id查詢許可權集合 List<Perms> findPermsByRoleId2(String id); }
UserDao.xml
<?xml version="1.0" encoding="UTF-8" ?> <!DOCTYPE mapper PUBLIC "-//mybatis.org//DTD Config 3.0//EN" "http://mybatis.org/dtd/mybatis-3-mapper.dtd"> <mapper namespace="com.test.dao.UserDao"> <resultMap id="roleMap" type="Role"> <result column="name" property="name"/> <collection property="perms" javaType="list" ofType="Perms"> <id column="id" property="id"/> <result column="name" property="name"/> <result column="url" property="url"/> </collection> </resultMap> <select id="findPermByRoleId" parameterType="String" resultType="Role" resultMap="roleMap"> SELECT r.`name`,p.`id`,p.`name`,p.`url` FROM t_role r LEFT JOIN t_role_perms rp ON r.`id` = rp.`roleid` LEFT JOIN t_pers p ON rp.`permsid` = p.`id` WHERE r.`id` = #{id} </select> <select id="findPermsByRoleId2" parameterType="String" resultType="Perms"> SELECT p.id,p.NAME,p.url,r.NAME FROM t_role r LEFT JOIN t_role_perms rp ON r.id=rp.roleid LEFT JOIN t_pers p ON rp.permsid=p.id WHERE r.id=#{id} </select> </mapper>
UserService.java
public interface UserService { //根據角色id查詢許可權集合 Role findPermByRoleId(String id); //根據角色id查詢許可權集合 List<Perms> findPermsByRoleId2(String id); }
UserServiceImpl.java
@Service("userService") @Transactional public class UserServiceImpl implements UserService { @Autowired private UserDao userDao; @Override public Role findPermByRoleId(String id) { return userDao.findPermByRoleId(id); } @Override public List<Perms> findPermsByRoleId2(String id) { return userDao.findPermsByRoleId2(id); } }
CustomerRealm.java
/** * 自定義Realm */ public class CustomerRealm extends AuthorizingRealm { @Override protected AuthorizationInfo doGetAuthorizationInfo(PrincipalCollection principalCollection) { String principal = (String) principalCollection.getPrimaryPrincipal(); //獲取UserService物件 UserService userService = (UserService) ApplicationContextUtil.getBean("userService"); //System.out.println(userService); //基於角色授權 User user = userService.findRoleByUsername(principal); System.out.println("user======="+user); if (!CollectionUtils.isEmpty(user.getRoles())) { SimpleAuthorizationInfo info = new SimpleAuthorizationInfo(); user.getRoles().forEach(role ->{ info.addRole(role.getName()); /*Role role2 = userService.findPermByRoleId(role.getId()); System.out.println("role2======"+role2); if (!CollectionUtils.isEmpty(role2.getPerms())) { role2.getPerms().forEach(perm -> info.addStringPermission(perm.getName())); }*/ //許可權資訊 List<Perms> perms = userService.findPermsByRoleId2(role.getId()); System.out.println("perms========"+perms); if(!CollectionUtils.isEmpty(perms) && perms.get(0)!=null ){ perms.forEach(perm->{ info.addStringPermission(perm.getName()); }); } }); return info; } return null; } ...... }
Cache 快取: 計算機記憶體中一段資料
作用: 用來減輕DB的存取壓力,從而提高系統的查詢效率
流程:
1.引入依賴
<!--引入shiro和ehcache--> <dependency> <groupId>org.apache.shiro</groupId> <artifactId>shiro-ehcache</artifactId> <version>1.5.3</version> </dependency>
2.開啟快取
//3.建立自定義realm @Bean public Realm getRealm() { CustomerRealm realm = new CustomerRealm(); HashedCredentialsMatcher credentialsMatcher = new HashedCredentialsMatcher(); //設定使用MD5加密演演算法 credentialsMatcher.setHashAlgorithmName("md5"); //雜湊次數 credentialsMatcher.setHashIterations(1024); realm.setCredentialsMatcher(credentialsMatcher); //開啟快取管理器 realm.setCacheManager(new EhCacheManager()); realm.setCachingEnabled(true);//開啟快取 realm.setAuthenticationCachingEnabled(true);//開啟認證快取 realm.setAuthenticationCacheName("authentication"); realm.setAuthorizationCachingEnabled(true);//開啟授權快取 realm.setAuthorizationCacheName("authorization"); return realm; }
注意:如果控制檯沒有任何sql展示說明快取已經開啟
1.引入redis依賴
<!--redis整合springboot--> <dependency> <groupId>org.springframework.boot</groupId> <artifactId>spring-boot-starter-data-redis</artifactId> </dependency>
2.設定redis連線
spring.redis.port=6379 spring.redis.host=localhost spring.redis.database=0
3.啟動redis服務
4. 開發RedisCacheManager
自定義shiro快取管理器
RedisCacheManager.java
import org.apache.shiro.cache.Cache; import org.apache.shiro.cache.CacheException; import org.apache.shiro.cache.CacheManager; //自定義shiro快取管理器 public class RedisCacheManager implements CacheManager { //引數1:認證或者是授權快取的統一名稱 @Override public <K, V> Cache<K, V> getCache(String cacheName) throws CacheException { System.out.println(cacheName); return new RedisCache<K,V>(cacheName); } }
5.開RedisCache實現
//自定義redis快取的實現 public class RedisCache<k,v> implements Cache<k,v> { private String cacheName; public RedisCache() { } public RedisCache(String cacheName) { this.cacheName = cacheName; } @Override public v get(k k) throws CacheException { return (v) getRedisTemplate().opsForHash().get(this.cacheName, k.toString()); } @Override public v put(k k, v v) throws CacheException { System.out.println("put key: "+k); System.out.println("put value:"+v); getRedisTemplate().opsForHash().put(this.cacheName,k.toString(), v); return null; } @Override public v remove(k k) throws CacheException { System.out.println("=============remove============="); return (v) getRedisTemplate().opsForHash().delete(this.cacheName,k.toString()); } @Override public void clear() throws CacheException { System.out.println("=============clear=============="); getRedisTemplate().delete(this.cacheName); } @Override public int size() { return getRedisTemplate().opsForHash().size(this.cacheName).intValue(); } @Override public Set<k> keys() { return getRedisTemplate().opsForHash().keys(this.cacheName); } @Override public Collection<v> values() { return getRedisTemplate().opsForHash().values(this.cacheName); } private RedisTemplate getRedisTemplate(){ RedisTemplate redisTemplate = (RedisTemplate) ApplicationContextUtil.getBean("redisTemplate"); redisTemplate.setKeySerializer(new StringRedisSerializer()); redisTemplate.setHashKeySerializer(new StringRedisSerializer()); return redisTemplate; } }
6. 啟動專案測試發現報錯 錯誤解釋: 由於shiro中提供的simpleByteSource實現沒有實現序列化,所有在認證時出現錯誤資訊
解決方案如下:
實現 實體類 序列化
自定義salt實現 實現序列化介面
import org.apache.shiro.codec.Base64; import org.apache.shiro.codec.CodecSupport; import org.apache.shiro.codec.Hex; import org.apache.shiro.util.ByteSource; import java.io.File; import java.io.InputStream; import java.io.Serializable; import java.util.Arrays; //自定義salt實現 實現序列化介面 public class MyByteSource implements ByteSource, Serializable { private byte[] bytes; private String cachedHex; private String cachedBase64; public MyByteSource(byte[] bytes) { this.bytes = bytes; } public MyByteSource(char[] chars) { this.bytes = CodecSupport.toBytes(chars); public MyByteSource(String string) { this.bytes = CodecSupport.toBytes(string); public MyByteSource(ByteSource source) { this.bytes = source.getBytes(); public MyByteSource(File file) { this.bytes = (new MyByteSource.BytesHelper()).getBytes(file); public MyByteSource(InputStream stream) { this.bytes = (new MyByteSource.BytesHelper()).getBytes(stream); public static boolean isCompatible(Object o) { return o instanceof byte[] || o instanceof char[] || o instanceof String || o instanceof ByteSource || o instanceof File || o instanceof InputStream; public byte[] getBytes() { return this.bytes; public boolean isEmpty() { return this.bytes == null || this.bytes.length == 0; public String toHex() { if (this.cachedHex == null) { this.cachedHex = Hex.encodeToString(this.getBytes()); } return this.cachedHex; public String toBase64() { if (this.cachedBase64 == null) { this.cachedBase64 = Base64.encodeToString(this.getBytes()); return this.cachedBase64; public String toString() { return this.toBase64(); public int hashCode() { return this.bytes != null && this.bytes.length != 0 ? Arrays.hashCode(this.bytes) : 0; public boolean equals(Object o) { if (o == this) { return true; } else if (o instanceof ByteSource) { ByteSource bs = (ByteSource)o; return Arrays.equals(this.getBytes(), bs.getBytes()); } else { return false; private static final class BytesHelper extends CodecSupport { private BytesHelper() { public byte[] getBytes(File file) { return this.toBytes(file); public byte[] getBytes(InputStream stream) { return this.toBytes(stream); }
修改自定義realm中使用的salt
@Override protected AuthenticationInfo doGetAuthenticationInfo(AuthenticationToken authenticationToken) throws AuthenticationException { String principal = (String) authenticationToken.getPrincipal(); //獲取UserService物件 UserService userService = (UserService) ApplicationContextUtil.getBean("userService"); //System.out.println(userService); User user = userService.findByUsername(principal); if (!ObjectUtils.isEmpty(user)) { return new SimpleAuthenticationInfo(user.getUsername(), user.getPassword(), new MyByteSource(user.getSalt()), this.getName()); } return null; }
import javax.imageio.ImageIO; import java.awt.*; import java.awt.geom.AffineTransform; import java.awt.image.BufferedImage; import java.io.File; import java.io.FileOutputStream; import java.io.IOException; import java.io.OutputStream; import java.util.Arrays; import java.util.Random; /** *@建立人 cx *@建立時間 2018/11/27 17:36 *@描述 驗證碼生成 */ public class VerifyCodeUtils{ //使用到Algerian字型,系統裡沒有的話需要安裝字型,字型只顯示大寫,去掉了1,0,i,o幾個容易混淆的字元 public static final String VERIFY_CODES = "23456789ABCDEFGHJKLMNPQRSTUVWXYZ"; private static Random random = new Random(); /** * 使用系統預設字元源生成驗證碼 * @param verifySize 驗證碼長度 * @return */ public static String generateVerifyCode(int verifySize){ return generateVerifyCode(verifySize, VERIFY_CODES); } /** * 使用指定源生成驗證碼 * @param verifySize 驗證碼長度 * @param sources 驗證碼字元源 * @return */ public static String generateVerifyCode(int verifySize, String sources){ if(sources == null || sources.length() == 0){ sources = VERIFY_CODES; } int codesLen = sources.length(); Random rand = new Random(System.currentTimeMillis()); StringBuilder verifyCode = new StringBuilder(verifySize); for(int i = 0; i < verifySize; i++){ verifyCode.append(sources.charAt(rand.nextInt(codesLen-1))); } return verifyCode.toString(); } /** * 生成隨機驗證碼檔案,並返回驗證碼值 * @param w * @param h * @param outputFile * @param verifySize * @return * @throws IOException */ public static String outputVerifyImage(int w, int h, File outputFile, int verifySize) throws IOException{ String verifyCode = generateVerifyCode(verifySize); outputImage(w, h, outputFile, verifyCode); return verifyCode; } /** * 輸出隨機驗證碼圖片流,並返回驗證碼值 * @param w * @param h * @param os * @param verifySize * @return * @throws IOException */ public static String outputVerifyImage(int w, int h, OutputStream os, int verifySize) throws IOException{ String verifyCode = generateVerifyCode(verifySize); outputImage(w, h, os, verifyCode); return verifyCode; } /** * 生成指定驗證碼影象檔案 * @param w * @param h * @param outputFile * @param code * @throws IOException */ public static void outputImage(int w, int h, File outputFile, String code) throws IOException{ if(outputFile == null){ return; } File dir = outputFile.getParentFile(); if(!dir.exists()){ dir.mkdirs(); } try{ outputFile.createNewFile(); FileOutputStream fos = new FileOutputStream(outputFile); outputImage(w, h, fos, code); fos.close(); } catch(IOException e){ throw e; } } /** * 輸出指定驗證碼圖片流 * @param w * @param h * @param os * @param code * @throws IOException */ public static void outputImage(int w, int h, OutputStream os, String code) throws IOException{ int verifySize = code.length(); BufferedImage image = new BufferedImage(w, h, BufferedImage.TYPE_INT_RGB); Random rand = new Random(); Graphics2D g2 = image.createGraphics(); g2.setRenderingHint(RenderingHints.KEY_ANTIALIASING,RenderingHints.VALUE_ANTIALIAS_ON); Color[] colors = new Color[5]; Color[] colorSpaces = new Color[] { Color.WHITE, Color.CYAN, Color.GRAY, Color.LIGHT_GRAY, Color.MAGENTA, Color.ORANGE, Color.PINK, Color.YELLOW }; float[] fractions = new float[colors.length]; for(int i = 0; i < colors.length; i++){ colors[i] = colorSpaces[rand.nextInt(colorSpaces.length)]; fractions[i] = rand.nextFloat(); } Arrays.sort(fractions); g2.setColor(Color.GRAY);// 設定邊框色 g2.fillRect(0, 0, w, h); Color c = getRandColor(200, 250); g2.setColor(c);// 設定背景色 g2.fillRect(0, 2, w, h-4); //繪製干擾線 Random random = new Random(); g2.setColor(getRandColor(160, 200));// 設定線條的顏色 for (int i = 0; i < 20; i++) { int x = random.nextInt(w - 1); int y = random.nextInt(h - 1); int xl = random.nextInt(6) + 1; int yl = random.nextInt(12) + 1; g2.drawLine(x, y, x + xl + 40, y + yl + 20); } // 新增噪點 float yawpRate = 0.05f;// 噪聲率 int area = (int) (yawpRate * w * h); for (int i = 0; i < area; i++) { int x = random.nextInt(w); int y = random.nextInt(h); int rgb = getRandomIntColor(); image.setRGB(x, y, rgb); } shear(g2, w, h, c);// 使圖片扭曲 g2.setColor(getRandColor(100, 160)); int fontSize = h-4; Font font = new Font("Algerian", Font.ITALIC, fontSize); g2.setFont(font); char[] chars = code.toCharArray(); for(int i = 0; i < verifySize; i++){ AffineTransform affine = new AffineTransform(); affine.setToRotation(Math.PI / 4 * rand.nextDouble() * (rand.nextBoolean() ? 1 : -1), (w / verifySize) * i + fontSize/2, h/2); g2.setTransform(affine); g2.drawChars(chars, i, 1, ((w-10) / verifySize) * i + 5, h/2 + fontSize/2 - 10); } g2.dispose(); ImageIO.write(image, "jpg", os); } private static Color getRandColor(int fc, int bc) { if (fc > 255) fc = 255; if (bc > 255) bc = 255; int r = fc + random.nextInt(bc - fc); int g = fc + random.nextInt(bc - fc); int b = fc + random.nextInt(bc - fc); return new Color(r, g, b); } private static int getRandomIntColor() { int[] rgb = getRandomRgb(); int color = 0; for (int c : rgb) { color = color << 8; color = color | c; } return color; } private static int[] getRandomRgb() { int[] rgb = new int[3]; for (int i = 0; i < 3; i++) { rgb[i] = random.nextInt(255); } return rgb; } private static void shear(Graphics g, int w1, int h1, Color color) { shearX(g, w1, h1, color); shearY(g, w1, h1, color); } private static void shearX(Graphics g, int w1, int h1, Color color) { int period = random.nextInt(2); boolean borderGap = true; int frames = 1; int phase = random.nextInt(2); for (int i = 0; i < h1; i++) { double d = (double) (period >> 1) * Math.sin((double) i / (double) period + (6.2831853071795862D * (double) phase) / (double) frames); g.copyArea(0, i, w1, 1, (int) d, 0); if (borderGap) { g.setColor(color); g.drawLine((int) d, i, 0, i); g.drawLine((int) d + w1, i, w1, i); } } } private static void shearY(Graphics g, int w1, int h1, Color color) { int period = random.nextInt(40) + 10; // 50; boolean borderGap = true; int frames = 20; int phase = 7; for (int i = 0; i < w1; i++) { double d = (double) (period >> 1) * Math.sin((double) i / (double) period + (6.2831853071795862D * (double) phase) / (double) frames); g.copyArea(i, 0, 1, h1, 0, (int) d); if (borderGap) { g.setColor(color); g.drawLine(i, (int) d, i, 0); g.drawLine(i, (int) d + h1, i, h1); } } } public static void main(String[] args) throws IOException { //獲取驗證碼 String s = generateVerifyCode(4); //將驗證碼放入圖片中 outputImage(260,60,new File("/Users/chenyannan/Desktop/安工資料/aa.jpg"),s); System.out.println(s); } }
<form action="${pageContext.request.contextPath}/user/login" method="post"> 使用者名稱:<input type="text" name="username"> 密碼 : <input type="text" name="password"> 請輸入驗證碼: <input type="text" name="code"><img src="${pageContext.request.contextPath}/user/getImage" alt=""> <input type="submit" value="登入"> </form>
@RequestMapping("getImage") public void getImage(HttpSession session, HttpServletResponse response) throws IOException { //生成驗證碼 String code = VerifyCodeUtils.generateVerifyCode(4); //驗證碼放入session session.setAttribute("code",code); //驗證碼存入圖片 ServletOutputStream os = response.getOutputStream(); response.setContentType("image/png"); VerifyCodeUtils.outputImage(220,60,os,code); }
ShiroConfig.java
map.put("/user/getImage","anon");//驗證碼
@RequestMapping("login") public String login(String username, String password,String code,HttpSession session) { //比較驗證碼 String codes = (String) session.getAttribute("code"); try { if (codes.equalsIgnoreCase(code)){ //獲取主體物件 Subject subject = SecurityUtils.getSubject(); subject.login(new UsernamePasswordToken(username, password)); return "redirect:/index.jsp"; }else{ throw new RuntimeException("驗證碼錯誤!"); } } catch (UnknownAccountException e) { e.printStackTrace(); System.out.println("使用者名稱錯誤!"); } catch (IncorrectCredentialsException e) { e.printStackTrace(); System.out.println("密碼錯誤!"); }catch (Exception e){ e.printStackTrace(); System.out.println(e.getMessage()); } return "redirect:/login.jsp"; }
需要在jsp頁面中引入標籤 <%@ taglib uri="http://shiro.apache.org/tags" prefix="shiro" %> 標籤: <shiro:authenticated> 登入之後 <shiro:notAuthenticated> 不在登入狀態時 <shiro:guest> 使用者在沒有RememberMe時 <shiro:user> 使用者在RememberMe時 <shiro:hasAnyRoles name="abc,123" > 在有abc或者123角色時 <shiro:hasRole name="abc"> 擁有角色abc <shiro:lacksRole name="abc"> 沒有角色abc <shiro:hasPermission name="abc"> 擁有許可權資源abc <shiro:lacksPermission name="abc"> 沒有abc許可權資源 <shiro:principal> 顯示使用者身份名稱 <shiro:principal property="username"/> 顯示使用者身份中的屬性值
<dependency> <groupId>com.github.theborakompanioni</groupId> <artifactId>thymeleaf-extras-shiro</artifactId> <version>2.0.0</version> </dependency>
<html xmlns="http://www.w3.org/1999/xhtml" xmlns:th="http://www.thymeleaf.org" xmlns:shiro="http://www.pollix.at/thymeleaf/shiro">
<!-- 驗證當前使用者是否為「訪客」,即未認證(包含未記住)的使用者。 --> <p shiro:guest="">Please <a href="login.html" rel="external nofollow" rel="external nofollow" rel="external nofollow" >login</a></p> <!-- 認證通過或已記住的使用者。 --> <p shiro:user=""> Welcome back John! Not John? Click <a href="login.html" rel="external nofollow" rel="external nofollow" rel="external nofollow" >here</a> to login. </p> <!-- 已認證通過的使用者。不包含已記住的使用者,這是與user標籤的區別所在。 --> <p shiro:authenticated=""> Hello, <span shiro:principal=""></span>, how are you today? <a shiro:authenticated="" href="updateAccount.html" rel="external nofollow" >Update your contact information</a> <!-- 輸出當前使用者資訊,通常為登入帳號資訊。 --> <p>Hello, <shiro:principal/>, how are you today?</p> <!-- 未認證通過使用者,與authenticated標籤相對應。與guest標籤的區別是,該標籤包含已記住使用者。 --> <p shiro:notAuthenticated=""> Please <a href="login.html" rel="external nofollow" rel="external nofollow" rel="external nofollow" >login</a> in order to update your credit card information. <!-- 驗證當前使用者是否屬於該角色。 --> <a shiro:hasRole="admin" href="admin.html" rel="external nofollow" >Administer the system</a><!-- 擁有該角色 --> <!-- 與hasRole標籤邏輯相反,當用戶不屬於該角色時驗證通過。 --> <p shiro:lacksRole="developer"><!-- 沒有該角色 --> Sorry, you are not allowed to developer the system. <!-- 驗證當前使用者是否屬於以下所有角色。 --> <p shiro:hasAllRoles="developer, 2"><!-- 角色與判斷 --> You are a developer and a admin. <!-- 驗證當前使用者是否屬於以下任意一個角色。 --> <p shiro:hasAnyRoles="admin, vip, developer,1"><!-- 角色或判斷 --> You are a admin, vip, or developer. <!--驗證當前使用者是否擁有指定許可權。 --> <a shiro:hasPermission="userInfo:add" href="createUser.html" rel="external nofollow" rel="external nofollow" >新增使用者</a><!-- 擁有許可權 --> <!-- 與hasPermission標籤邏輯相反,當前使用者沒有制定許可權時,驗證通過。 --> <p shiro:lacksPermission="userInfo:del"><!-- 沒有許可權 --> Sorry, you are not allowed to delete user accounts. <!-- 驗證當前使用者是否擁有以下所有角色。 --> <p shiro:hasAllPermissions="userInfo:view, userInfo:add"><!-- 許可權與判斷 --> You can see or add users. <!-- 驗證當前使用者是否擁有以下任意一個許可權。 --> <p shiro:hasAnyPermissions="userInfo:view, userInfo:del"><!-- 許可權或判斷 --> You can see or delete users. <a shiro:hasPermission="pp" href="createUser.html" rel="external nofollow" rel="external nofollow" >Create a new User</a>
頁面標籤不起作用一定要記住加入方言處理
@Bean(name = "shiroDialect") public ShiroDialect shiroDialect(){ return new ShiroDialect(); }
內容參考:
B站程式設計不良人:https://www.bilibili.com/video/BV1uz4y197Zm
僅用於學習!
到此這篇關於SpringBoot整合Shiro思路(最新超詳細)的文章就介紹到這了,更多相關SpringBoot整合Shiro內容請搜尋it145.com以前的文章或繼續瀏覽下面的相關文章希望大家以後多多支援it145.com!
相關文章
<em>Mac</em>Book项目 2009年学校开始实施<em>Mac</em>Book项目,所有师生配备一本<em>Mac</em>Book,并同步更新了校园无线网络。学校每周进行电脑技术更新,每月发送技术支持资料,极大改变了教学及学习方式。因此2011
2021-06-01 09:32:01
综合看Anker超能充系列的性价比很高,并且与不仅和iPhone12/苹果<em>Mac</em>Book很配,而且适合多设备充电需求的日常使用或差旅场景,不管是安卓还是Switch同样也能用得上它,希望这次分享能给准备购入充电器的小伙伴们有所
2021-06-01 09:31:42
除了L4WUDU与吴亦凡已经多次共事,成为了明面上的厂牌成员,吴亦凡还曾带领20XXCLUB全队参加2020年的一场音乐节,这也是20XXCLUB首次全员合照,王嗣尧Turbo、陈彦希Regi、<em>Mac</em> Ova Seas、林渝植等人全部出场。然而让
2021-06-01 09:31:34
目前应用IPFS的机构:1 谷歌<em>浏览器</em>支持IPFS分布式协议 2 万维网 (历史档案博物馆)数据库 3 火狐<em>浏览器</em>支持 IPFS分布式协议 4 EOS 等数字货币数据存储 5 美国国会图书馆,历史资料永久保存在 IPFS 6 加
2021-06-01 09:31:24
开拓者的车机是兼容苹果和<em>安卓</em>,虽然我不怎么用,但确实兼顾了我家人的很多需求:副驾的门板还配有解锁开关,有的时候老婆开车,下车的时候偶尔会忘记解锁,我在副驾驶可以自己开门:第二排设计很好,不仅配置了一个很大的
2021-06-01 09:30:48
不仅是<em>安卓</em>手机,苹果手机的降价力度也是前所未有了,iPhone12也“跳水价”了,发布价是6799元,如今已经跌至5308元,降价幅度超过1400元,最新定价确认了。iPhone12是苹果首款5G手机,同时也是全球首款5nm芯片的智能机,它
2021-06-01 09:30:45