View Javadoc
1   /*
2    * Licensed to the Apache Software Foundation (ASF) under one
3    * or more contributor license agreements.  See the NOTICE file
4    * distributed with this work for additional information
5    * regarding copyright ownership.  The ASF licenses this file
6    * to you under the Apache License, Version 2.0 (the
7    * "License"); you may not use this file except in compliance
8    * with the License.  You may obtain a copy of the License at
9    *
10   *     http://www.apache.org/licenses/LICENSE-2.0
11   *
12   * Unless required by applicable law or agreed to in writing,
13   * software distributed under the License is distributed on an
14   * "AS IS" BASIS, WITHOUT WARRANTIES OR CONDITIONS OF ANY
15   * KIND, either express or implied.  See the License for the
16   * specific language governing permissions and limitations
17   * under the License.
18   */
19  
20  import org.apache.shiro.SecurityUtils;
21  import org.apache.shiro.authc.*;
22  import org.apache.shiro.env.BasicIniEnvironment;
23  import org.apache.shiro.ini.IniSecurityManagerFactory;
24  import org.apache.shiro.mgt.SecurityManager;
25  import org.apache.shiro.session.Session;
26  import org.apache.shiro.subject.Subject;
27  import org.apache.shiro.lang.util.Factory;
28  import org.slf4j.Logger;
29  import org.slf4j.LoggerFactory;
30  
31  /**
32   * Simple Quickstart application showing how to use Shiro's API.
33   *
34   * @since 0.9 RC2
35   */
36  public class Quickstart {
37  
38      private static final transient Logger log = LoggerFactory.getLogger(Quickstart.class);
39  
40  
41      public static void main(String[] args) {
42  
43          // The easiest way to create a Shiro SecurityManager with configured
44          // realms, users, roles and permissions is to use the simple INI config.
45          // We'll do that by using a factory that can ingest a .ini file and
46          // return a SecurityManager instance:
47  
48          // Use the shiro.ini file at the root of the classpath
49          // (file: and url: prefixes load from files and urls respectively):
50          SecurityManager securityManager = new BasicIniEnvironment("classpath:shiro.ini").getSecurityManager();
51  
52          // for this simple example quickstart, make the SecurityManager
53          // accessible as a JVM singleton.  Most applications wouldn't do this
54          // and instead rely on their container configuration or web.xml for
55          // webapps.  That is outside the scope of this simple quickstart, so
56          // we'll just do the bare minimum, so you can continue to get a feel
57          // for things.
58          SecurityUtils.setSecurityManager(securityManager);
59  
60          // Now that a simple Shiro environment is set up, let's see what you can do:
61  
62          // get the currently executing user:
63          Subject currentUser = SecurityUtils.getSubject();
64  
65          // Do some stuff with a Session (no need for a web or EJB container!!!)
66          Session session = currentUser.getSession();
67          session.setAttribute("someKey", "aValue");
68          String value = (String) session.getAttribute("someKey");
69          if (value.equals("aValue")) {
70              log.info("Retrieved the correct value! [" + value + "]");
71          }
72  
73          // let's login the current user so we can check against roles and permissions:
74          if (!currentUser.isAuthenticated()) {
75              UsernamePasswordToken token = new UsernamePasswordToken("lonestarr", "vespa");
76              token.setRememberMe(true);
77              try {
78                  currentUser.login(token);
79              } catch (UnknownAccountException uae) {
80                  log.info("There is no user with username of " + token.getPrincipal());
81              } catch (IncorrectCredentialsException ice) {
82                  log.info("Password for account " + token.getPrincipal() + " was incorrect!");
83              } catch (LockedAccountException lae) {
84                  log.info("The account for username " + token.getPrincipal() + " is locked.  " +
85                          "Please contact your administrator to unlock it.");
86              }
87              // ... catch more exceptions here (maybe custom ones specific to your application?
88              catch (AuthenticationException ae) {
89                  //unexpected condition?  error?
90              }
91          }
92  
93          //say who they are:
94          //print their identifying principal (in this case, a username):
95          log.info("User [" + currentUser.getPrincipal() + "] logged in successfully.");
96  
97          //test a role:
98          if (currentUser.hasRole("schwartz")) {
99              log.info("May the Schwartz be with you!");
100         } else {
101             log.info("Hello, mere mortal.");
102         }
103 
104         //test a typed permission (not instance-level)
105         if (currentUser.isPermitted("lightsaber:wield")) {
106             log.info("You may use a lightsaber ring.  Use it wisely.");
107         } else {
108             log.info("Sorry, lightsaber rings are for schwartz masters only.");
109         }
110 
111         //a (very powerful) Instance Level permission:
112         if (currentUser.isPermitted("winnebago:drive:eagle5")) {
113             log.info("You are permitted to 'drive' the winnebago with license plate (id) 'eagle5'.  " +
114                     "Here are the keys - have fun!");
115         } else {
116             log.info("Sorry, you aren't allowed to drive the 'eagle5' winnebago!");
117         }
118 
119         //all done - log out!
120         currentUser.logout();
121 
122         System.exit(0);
123     }
124 }