Initial commit
This commit is contained in:
@@ -0,0 +1,21 @@
|
||||
package com.hideyoshi.backendportfolio;
|
||||
|
||||
import org.springframework.boot.SpringApplication;
|
||||
import org.springframework.boot.autoconfigure.SpringBootApplication;
|
||||
import org.springframework.context.annotation.Bean;
|
||||
import org.springframework.security.crypto.bcrypt.BCryptPasswordEncoder;
|
||||
import org.springframework.security.crypto.password.PasswordEncoder;
|
||||
|
||||
@SpringBootApplication
|
||||
public class BackendPortfolioApplication {
|
||||
|
||||
public static void main(String[] args) {
|
||||
SpringApplication.run(BackendPortfolioApplication.class, args);
|
||||
}
|
||||
|
||||
@Bean
|
||||
PasswordEncoder passwordEncoder() {
|
||||
return new BCryptPasswordEncoder();
|
||||
}
|
||||
|
||||
}
|
||||
@@ -0,0 +1,46 @@
|
||||
package com.hideyoshi.backendportfolio.base.config;
|
||||
|
||||
import org.springframework.beans.factory.annotation.Value;
|
||||
import org.springframework.context.annotation.Bean;
|
||||
import org.springframework.context.annotation.Configuration;
|
||||
import org.springframework.web.cors.CorsConfiguration;
|
||||
import org.springframework.web.cors.CorsConfigurationSource;
|
||||
import org.springframework.web.cors.UrlBasedCorsConfigurationSource;
|
||||
|
||||
import java.util.Arrays;
|
||||
import java.util.List;
|
||||
|
||||
@Configuration
|
||||
public class CorsConfig {
|
||||
|
||||
@Value("${com.hideyoshi.frontendPath}")
|
||||
private String FRONTEND_PATH;
|
||||
|
||||
@Value("${com.hideyoshi.frontendConnectionType}")
|
||||
private String CONNECTION_TYPE;
|
||||
|
||||
private final String HTTP = "http://";
|
||||
|
||||
private final String HTTPS = "https://";
|
||||
|
||||
@Bean
|
||||
public CorsConfigurationSource corsConfigurationSource() {
|
||||
|
||||
String connectionProtocol = CONNECTION_TYPE.equals("secure")
|
||||
? HTTPS
|
||||
: HTTP;
|
||||
|
||||
CorsConfiguration configuration = new CorsConfiguration();
|
||||
configuration.setAllowedOrigins(List.of(connectionProtocol + FRONTEND_PATH));
|
||||
configuration.setAllowedMethods(Arrays.asList("GET", "POST", "PUT", "PATCH", "DELETE", "OPTIONS"));
|
||||
configuration.setAllowedHeaders(Arrays.asList("authorization", "content-type", "x-auth-token"));
|
||||
configuration.setAllowCredentials(true);
|
||||
configuration.setExposedHeaders(List.of("x-auth-token"));
|
||||
|
||||
UrlBasedCorsConfigurationSource source = new UrlBasedCorsConfigurationSource();
|
||||
source.registerCorsConfiguration("/**", configuration);
|
||||
|
||||
return source;
|
||||
}
|
||||
|
||||
}
|
||||
@@ -0,0 +1,54 @@
|
||||
package com.hideyoshi.backendportfolio.base.config;
|
||||
|
||||
import com.hideyoshi.backendportfolio.base.user.entity.Role;
|
||||
import com.hideyoshi.backendportfolio.base.user.model.UserDTO;
|
||||
import com.hideyoshi.backendportfolio.base.user.repo.UserRepository;
|
||||
import com.hideyoshi.backendportfolio.base.user.service.UserService;
|
||||
import org.springframework.beans.factory.annotation.Value;
|
||||
import org.springframework.boot.CommandLineRunner;
|
||||
import org.springframework.context.annotation.Bean;
|
||||
import org.springframework.context.annotation.Configuration;
|
||||
|
||||
import java.util.ArrayList;
|
||||
|
||||
@Configuration
|
||||
public class DefaultUserConfig {
|
||||
|
||||
@Value("${com.hideyoshi.defaultUser.fullName}")
|
||||
private String ADMIN_NAME;
|
||||
|
||||
@Value("${com.hideyoshi.defaultUser.email}")
|
||||
private String ADMIN_EMAIL;
|
||||
|
||||
@Value("${com.hideyoshi.defaultUser.username}")
|
||||
private String ADMIN_USERNAME;
|
||||
|
||||
@Value("${com.hideyoshi.defaultUser.password}")
|
||||
private String ADMIN_PASSWORD;
|
||||
|
||||
@Bean
|
||||
CommandLineRunner run(UserService userService, UserRepository userRepo) {
|
||||
return args -> {
|
||||
UserDTO defaultUser = UserDTO.builder()
|
||||
.fullname(ADMIN_NAME)
|
||||
.email(ADMIN_EMAIL)
|
||||
.username(ADMIN_USERNAME)
|
||||
.password(ADMIN_PASSWORD)
|
||||
.roles(new ArrayList<>())
|
||||
.build();
|
||||
if (!userRepo.findByUsername(defaultUser.getUsername()).isPresent()) {
|
||||
defaultUser = userService.saveUser(defaultUser);
|
||||
|
||||
userService.addRoleToUser(
|
||||
defaultUser.getId(),
|
||||
Role.ADMIN.getDescription()
|
||||
);
|
||||
userService.addRoleToUser(
|
||||
defaultUser.getId(),
|
||||
Role.USER.getDescription()
|
||||
);
|
||||
}
|
||||
};
|
||||
}
|
||||
|
||||
}
|
||||
@@ -0,0 +1,34 @@
|
||||
package com.hideyoshi.backendportfolio.base.config;
|
||||
|
||||
import com.hideyoshi.backendportfolio.util.exception.AuthenticationInvalidException;
|
||||
import lombok.RequiredArgsConstructor;
|
||||
import lombok.extern.log4j.Log4j2;
|
||||
import org.springframework.beans.factory.annotation.Autowired;
|
||||
import org.springframework.beans.factory.annotation.Qualifier;
|
||||
import org.springframework.security.core.AuthenticationException;
|
||||
import org.springframework.security.web.AuthenticationEntryPoint;
|
||||
import org.springframework.stereotype.Component;
|
||||
import org.springframework.web.servlet.HandlerExceptionResolver;
|
||||
|
||||
import javax.servlet.http.HttpServletRequest;
|
||||
import javax.servlet.http.HttpServletResponse;
|
||||
|
||||
@Log4j2
|
||||
@Component("restAuthenticationEntryPoint")
|
||||
public class RestAuthenticationEntryPointConfig implements AuthenticationEntryPoint{
|
||||
|
||||
@Autowired
|
||||
@Qualifier("handlerExceptionResolver")
|
||||
private HandlerExceptionResolver resolver;
|
||||
|
||||
public void commence(HttpServletRequest request, HttpServletResponse response, AuthenticationException authenticationException) {
|
||||
|
||||
resolver.resolveException(
|
||||
request,
|
||||
response,
|
||||
null,
|
||||
new AuthenticationInvalidException("Authentication Failed. Check your credentials.")
|
||||
);
|
||||
|
||||
}
|
||||
}
|
||||
@@ -0,0 +1,22 @@
|
||||
package com.hideyoshi.backendportfolio.base.config;
|
||||
|
||||
import org.springframework.beans.factory.annotation.Value;
|
||||
import org.springframework.context.annotation.Bean;
|
||||
import org.springframework.session.web.http.CookieSerializer;
|
||||
import org.springframework.session.web.http.DefaultCookieSerializer;
|
||||
|
||||
public class SessionConfig {
|
||||
|
||||
@Value("${com.hideyoshi.frontEndPath}")
|
||||
private String frontEndPath;
|
||||
|
||||
@Bean
|
||||
public CookieSerializer cookieSerializer() {
|
||||
DefaultCookieSerializer serializer = new DefaultCookieSerializer();
|
||||
serializer.setCookieName("SESSION");
|
||||
serializer.setCookiePath("/");
|
||||
serializer.setDomainNamePattern("(^.+)?(\\.)?(" + frontEndPath + ")((/#!)?(/\\w+)+)?");
|
||||
return serializer;
|
||||
}
|
||||
|
||||
}
|
||||
@@ -0,0 +1,72 @@
|
||||
package com.hideyoshi.backendportfolio.base.security;
|
||||
|
||||
import com.hideyoshi.backendportfolio.base.config.RestAuthenticationEntryPointConfig;
|
||||
import com.hideyoshi.backendportfolio.base.security.filter.CustomAuthenticationFilter;
|
||||
import com.hideyoshi.backendportfolio.base.security.filter.CustomAuthorizationFilter;
|
||||
import com.hideyoshi.backendportfolio.base.security.service.AuthService;
|
||||
import lombok.RequiredArgsConstructor;
|
||||
import org.springframework.beans.factory.annotation.Autowired;
|
||||
import org.springframework.beans.factory.annotation.Qualifier;
|
||||
import org.springframework.context.annotation.Bean;
|
||||
import org.springframework.context.annotation.Configuration;
|
||||
import org.springframework.context.annotation.Primary;
|
||||
import org.springframework.security.authentication.AuthenticationManager;
|
||||
import org.springframework.security.config.annotation.authentication.builders.AuthenticationManagerBuilder;
|
||||
import org.springframework.security.config.annotation.web.builders.HttpSecurity;
|
||||
import org.springframework.security.config.annotation.web.configuration.EnableWebSecurity;
|
||||
import org.springframework.security.config.annotation.web.configuration.WebSecurityConfigurerAdapter;
|
||||
import org.springframework.security.config.http.SessionCreationPolicy;
|
||||
import org.springframework.security.core.userdetails.UserDetailsService;
|
||||
import org.springframework.security.crypto.bcrypt.BCryptPasswordEncoder;
|
||||
import org.springframework.security.web.authentication.UsernamePasswordAuthenticationFilter;
|
||||
import org.springframework.web.cors.CorsConfiguration;
|
||||
import org.springframework.web.cors.CorsConfigurationSource;
|
||||
import org.springframework.web.cors.UrlBasedCorsConfigurationSource;
|
||||
import org.springframework.web.servlet.HandlerExceptionResolver;
|
||||
|
||||
import java.util.Arrays;
|
||||
|
||||
@Configuration
|
||||
@EnableWebSecurity
|
||||
@RequiredArgsConstructor
|
||||
public class SecurityConfig extends WebSecurityConfigurerAdapter {
|
||||
|
||||
private final AuthService authService;
|
||||
|
||||
private final UserDetailsService userDetailsService;
|
||||
|
||||
private final BCryptPasswordEncoder passwordEncoder;
|
||||
|
||||
private final RestAuthenticationEntryPointConfig restAuthenticationEntryPointConfig;
|
||||
|
||||
@Override
|
||||
protected void configure(AuthenticationManagerBuilder auth) throws Exception {
|
||||
auth.userDetailsService(userDetailsService)
|
||||
.passwordEncoder(passwordEncoder);
|
||||
}
|
||||
|
||||
@Override
|
||||
protected void configure(HttpSecurity http) throws Exception {
|
||||
|
||||
CustomAuthenticationFilter customAuthenticationFilter =
|
||||
new CustomAuthenticationFilter(this.authenticationManager(), this.authService, this.restAuthenticationEntryPointConfig);
|
||||
|
||||
customAuthenticationFilter.setFilterProcessesUrl("/user/login");
|
||||
|
||||
http.cors().and().csrf().disable()
|
||||
.authorizeRequests().antMatchers("/session/**").permitAll()
|
||||
.and().authorizeRequests().antMatchers("/user/signup").permitAll()
|
||||
.and().authorizeRequests().antMatchers("/user/login/refresh").permitAll()
|
||||
.and().authorizeRequests().antMatchers("/**").hasAnyAuthority("ROLE_USER", "ROLE_ADMIN")
|
||||
.and().sessionManagement().sessionCreationPolicy(SessionCreationPolicy.IF_REQUIRED)
|
||||
.and().addFilter(customAuthenticationFilter)
|
||||
.addFilterBefore(new CustomAuthorizationFilter(this.authService), UsernamePasswordAuthenticationFilter.class);
|
||||
|
||||
}
|
||||
|
||||
@Bean
|
||||
public AuthenticationManager authenticationManagerBean() throws Exception {
|
||||
return super.authenticationManagerBean();
|
||||
}
|
||||
|
||||
}
|
||||
@@ -0,0 +1,74 @@
|
||||
package com.hideyoshi.backendportfolio.base.security.filter;
|
||||
|
||||
import com.auth0.jwt.algorithms.Algorithm;
|
||||
import com.fasterxml.jackson.databind.ObjectMapper;
|
||||
import com.hideyoshi.backendportfolio.base.config.RestAuthenticationEntryPointConfig;
|
||||
import com.hideyoshi.backendportfolio.base.security.service.AuthService;
|
||||
import com.hideyoshi.backendportfolio.base.user.model.TokenDTO;
|
||||
import com.hideyoshi.backendportfolio.base.user.model.UserDTO;
|
||||
import lombok.extern.log4j.Log4j2;
|
||||
import org.springframework.security.authentication.AuthenticationManager;
|
||||
import org.springframework.security.authentication.UsernamePasswordAuthenticationToken;
|
||||
import org.springframework.security.core.Authentication;
|
||||
import org.springframework.security.core.AuthenticationException;
|
||||
import org.springframework.security.web.authentication.UsernamePasswordAuthenticationFilter;
|
||||
|
||||
import javax.servlet.FilterChain;
|
||||
import javax.servlet.http.HttpServletRequest;
|
||||
import javax.servlet.http.HttpServletResponse;
|
||||
import javax.servlet.http.HttpSession;
|
||||
import java.io.IOException;
|
||||
import java.util.HashMap;
|
||||
|
||||
import static org.springframework.http.MediaType.APPLICATION_JSON_VALUE;
|
||||
|
||||
@Log4j2
|
||||
public class CustomAuthenticationFilter extends UsernamePasswordAuthenticationFilter {
|
||||
|
||||
private final AuthService authService;
|
||||
|
||||
private final AuthenticationManager authenticationManager;
|
||||
|
||||
private final RestAuthenticationEntryPointConfig restAuthenticationEntryPointConfig;
|
||||
|
||||
public CustomAuthenticationFilter(AuthenticationManager authenticationManager, AuthService authService, RestAuthenticationEntryPointConfig restAuthenticationEntryPointConfig) {
|
||||
this.authService = authService;
|
||||
this.authenticationManager = authenticationManager;
|
||||
this.restAuthenticationEntryPointConfig = restAuthenticationEntryPointConfig;
|
||||
}
|
||||
|
||||
@Override
|
||||
public Authentication attemptAuthentication(HttpServletRequest request, HttpServletResponse response) throws AuthenticationException {
|
||||
|
||||
String username = request.getParameter("username");
|
||||
String password = request.getParameter("password");
|
||||
|
||||
Authentication userAuthentication = null;
|
||||
try {
|
||||
userAuthentication = authenticationManager.authenticate(
|
||||
new UsernamePasswordAuthenticationToken(username, password)
|
||||
);
|
||||
} catch (AuthenticationException e) {
|
||||
restAuthenticationEntryPointConfig.commence(request, response, e);
|
||||
}
|
||||
return userAuthentication;
|
||||
}
|
||||
|
||||
@Override
|
||||
protected void successfulAuthentication(HttpServletRequest request, HttpServletResponse response, FilterChain chain, Authentication authentication) throws IOException {
|
||||
|
||||
UserDTO user = (UserDTO) authentication.getPrincipal();
|
||||
Algorithm algorithm = Algorithm.HMAC256("secret".getBytes());
|
||||
|
||||
HashMap<String,TokenDTO> tokens = this.authService.generateTokens(user, algorithm, request);
|
||||
|
||||
HttpSession httpSession = request.getSession();
|
||||
UserDTO authenticatedUser = user.toResponse(tokens.get("accessToken"), tokens.get("refreshToken"));
|
||||
httpSession.setAttribute("user", authenticatedUser);
|
||||
|
||||
response.setContentType(APPLICATION_JSON_VALUE);
|
||||
new ObjectMapper()
|
||||
.writeValue(response.getOutputStream(), authenticatedUser);
|
||||
}
|
||||
|
||||
}
|
||||
@@ -0,0 +1,72 @@
|
||||
package com.hideyoshi.backendportfolio.base.security.filter;
|
||||
|
||||
import com.fasterxml.jackson.databind.ObjectMapper;
|
||||
import com.hideyoshi.backendportfolio.base.security.service.AuthService;
|
||||
import com.hideyoshi.backendportfolio.util.exception.BadRequestException;
|
||||
import lombok.extern.log4j.Log4j2;
|
||||
import org.springframework.beans.factory.annotation.Qualifier;
|
||||
import org.springframework.context.annotation.Bean;
|
||||
import org.springframework.security.authentication.AuthenticationManager;
|
||||
import org.springframework.security.authentication.UsernamePasswordAuthenticationToken;
|
||||
import org.springframework.security.core.context.SecurityContextHolder;
|
||||
import org.springframework.web.filter.OncePerRequestFilter;
|
||||
import org.springframework.web.servlet.HandlerExceptionResolver;
|
||||
|
||||
import javax.servlet.FilterChain;
|
||||
import javax.servlet.ServletException;
|
||||
import javax.servlet.http.HttpServletRequest;
|
||||
import javax.servlet.http.HttpServletResponse;
|
||||
import java.io.IOException;
|
||||
import java.util.HashMap;
|
||||
import java.util.Map;
|
||||
import java.util.Objects;
|
||||
|
||||
import static org.springframework.http.HttpHeaders.AUTHORIZATION;
|
||||
import static org.springframework.http.HttpStatus.FORBIDDEN;
|
||||
import static org.springframework.http.MediaType.APPLICATION_JSON_VALUE;
|
||||
|
||||
public class CustomAuthorizationFilter extends OncePerRequestFilter {
|
||||
|
||||
public static String AUTHORIZATION_TYPE_STRING = "Bearer ";
|
||||
|
||||
private final AuthService authService;
|
||||
|
||||
public CustomAuthorizationFilter(AuthService authService) {
|
||||
this.authService = authService;
|
||||
}
|
||||
|
||||
@Override
|
||||
protected void doFilterInternal(HttpServletRequest request, HttpServletResponse response, FilterChain filterChain)
|
||||
throws ServletException, IOException {
|
||||
if (request.getServletPath().equals("/user/login")) {
|
||||
filterChain.doFilter(request, response);
|
||||
} else {
|
||||
String authorizationHeader = request.getHeader(AUTHORIZATION);
|
||||
if (Objects.nonNull(authorizationHeader) && authorizationHeader.startsWith(AUTHORIZATION_TYPE_STRING)) {
|
||||
try {
|
||||
|
||||
UsernamePasswordAuthenticationToken authenticationToken =
|
||||
this.authService.verifyAccessToken(authorizationHeader);
|
||||
|
||||
SecurityContextHolder.getContext().setAuthentication(authenticationToken);
|
||||
filterChain.doFilter(request, response);
|
||||
|
||||
} catch (Exception e) {
|
||||
response.setHeader("error", e.getMessage());
|
||||
|
||||
response.setStatus(FORBIDDEN.value());
|
||||
|
||||
Map<String, String> error = new HashMap<>();
|
||||
error.put("error_message", e.getMessage());
|
||||
|
||||
response.setContentType(APPLICATION_JSON_VALUE);
|
||||
new ObjectMapper()
|
||||
.writeValue(response.getOutputStream(), error);
|
||||
}
|
||||
} else {
|
||||
filterChain.doFilter(request, response);
|
||||
}
|
||||
}
|
||||
}
|
||||
|
||||
}
|
||||
@@ -0,0 +1,18 @@
|
||||
package com.hideyoshi.backendportfolio.base.security.interceptor;
|
||||
|
||||
import lombok.RequiredArgsConstructor;
|
||||
import org.springframework.stereotype.Component;
|
||||
import org.springframework.web.servlet.config.annotation.InterceptorRegistry;
|
||||
import org.springframework.web.servlet.config.annotation.WebMvcConfigurer;
|
||||
|
||||
@Component
|
||||
@RequiredArgsConstructor
|
||||
public class ConfigInterceptor implements WebMvcConfigurer {
|
||||
|
||||
private final UserResourceAccessInterceptor userResourceAccessInterceptor;
|
||||
|
||||
public void addInterceptors(InterceptorRegistry registry) {
|
||||
registry.addInterceptor(userResourceAccessInterceptor);
|
||||
}
|
||||
|
||||
}
|
||||
@@ -0,0 +1,45 @@
|
||||
package com.hideyoshi.backendportfolio.base.security.interceptor;
|
||||
|
||||
import com.fasterxml.jackson.databind.ObjectMapper;
|
||||
import com.hideyoshi.backendportfolio.base.user.service.UserService;
|
||||
import com.hideyoshi.backendportfolio.util.exception.BadRequestException;
|
||||
import com.hideyoshi.backendportfolio.util.guard.UserResourceGuard;
|
||||
import lombok.RequiredArgsConstructor;
|
||||
import lombok.extern.log4j.Log4j2;
|
||||
import org.springframework.stereotype.Component;
|
||||
import org.springframework.web.method.HandlerMethod;
|
||||
import org.springframework.web.servlet.HandlerInterceptor;
|
||||
|
||||
import javax.servlet.http.HttpServletRequest;
|
||||
import javax.servlet.http.HttpServletResponse;
|
||||
import java.util.Objects;
|
||||
|
||||
@Log4j2
|
||||
@Component
|
||||
@RequiredArgsConstructor
|
||||
public class UserResourceAccessInterceptor implements HandlerInterceptor {
|
||||
|
||||
private final UserService userService;
|
||||
|
||||
private final ObjectMapper objectMapper;
|
||||
|
||||
public boolean preHandle(final HttpServletRequest request, final HttpServletResponse response, final Object handler) {
|
||||
|
||||
if (!(handler instanceof HandlerMethod)) {
|
||||
return true;
|
||||
}
|
||||
|
||||
final UserResourceGuard annotation = ((HandlerMethod)handler)
|
||||
.getMethodAnnotation(UserResourceGuard.class);
|
||||
|
||||
if (Objects.nonNull(annotation)) {
|
||||
Boolean accessPermission =
|
||||
annotation.accessType().hasAccess(this.userService, this.objectMapper, request);
|
||||
if (!accessPermission) {
|
||||
throw new BadRequestException(annotation.denialMessage());
|
||||
}
|
||||
}
|
||||
return true;
|
||||
}
|
||||
|
||||
}
|
||||
@@ -0,0 +1,27 @@
|
||||
package com.hideyoshi.backendportfolio.base.security.service;
|
||||
|
||||
import com.auth0.jwt.algorithms.Algorithm;
|
||||
import com.hideyoshi.backendportfolio.base.user.model.TokenDTO;
|
||||
import com.hideyoshi.backendportfolio.base.user.model.UserDTO;
|
||||
import org.springframework.security.authentication.UsernamePasswordAuthenticationToken;
|
||||
|
||||
import javax.servlet.http.HttpServletRequest;
|
||||
import javax.servlet.http.HttpServletResponse;
|
||||
import javax.validation.Valid;
|
||||
import java.util.HashMap;
|
||||
|
||||
public interface AuthService {
|
||||
|
||||
TokenDTO generateAccessToken(@Valid UserDTO user, Algorithm algorithm, HttpServletRequest request);
|
||||
|
||||
TokenDTO generateRefreshToken(@Valid UserDTO user, Algorithm algorithm, HttpServletRequest request);
|
||||
|
||||
HashMap<String,TokenDTO> generateTokens(@Valid UserDTO user, Algorithm algorithm, HttpServletRequest request);
|
||||
|
||||
UsernamePasswordAuthenticationToken verifyAccessToken(String authorizationHeader);
|
||||
|
||||
UserDTO refreshAccessToken(String refreshToken, HttpServletRequest request, HttpServletResponse response);
|
||||
|
||||
UserDTO signupUser(@Valid UserDTO user, HttpServletRequest request);
|
||||
|
||||
}
|
||||
@@ -0,0 +1,175 @@
|
||||
package com.hideyoshi.backendportfolio.base.security.service;
|
||||
|
||||
import com.auth0.jwt.JWT;
|
||||
import com.auth0.jwt.JWTVerifier;
|
||||
import com.auth0.jwt.algorithms.Algorithm;
|
||||
import com.auth0.jwt.interfaces.DecodedJWT;
|
||||
import com.hideyoshi.backendportfolio.base.user.model.TokenDTO;
|
||||
import com.hideyoshi.backendportfolio.base.user.model.UserDTO;
|
||||
import com.hideyoshi.backendportfolio.base.user.service.UserService;
|
||||
import com.hideyoshi.backendportfolio.util.exception.BadRequestException;
|
||||
import lombok.RequiredArgsConstructor;
|
||||
import lombok.extern.log4j.Log4j2;
|
||||
import org.springframework.beans.factory.annotation.Autowired;
|
||||
import org.springframework.beans.factory.annotation.Qualifier;
|
||||
import org.springframework.beans.factory.annotation.Value;
|
||||
import org.springframework.security.authentication.UsernamePasswordAuthenticationToken;
|
||||
import org.springframework.security.core.GrantedAuthority;
|
||||
import org.springframework.security.core.authority.SimpleGrantedAuthority;
|
||||
import org.springframework.stereotype.Service;
|
||||
import org.springframework.web.servlet.HandlerExceptionResolver;
|
||||
|
||||
import javax.servlet.http.HttpServletRequest;
|
||||
import javax.servlet.http.HttpServletResponse;
|
||||
import javax.servlet.http.HttpSession;
|
||||
import javax.validation.Valid;
|
||||
import java.util.*;
|
||||
import java.util.stream.Collectors;
|
||||
|
||||
import static java.util.Arrays.stream;
|
||||
|
||||
@Log4j2
|
||||
@Service
|
||||
@RequiredArgsConstructor
|
||||
public class AuthServiceImpl implements AuthService {
|
||||
|
||||
|
||||
@Value("${com.hideyoshi.tokenSecret}")
|
||||
private String TOKEN_SECRET;
|
||||
|
||||
@Value("${com.hideyoshi.accessTokenDuration}")
|
||||
private Integer ACCESS_TOKEN_DURATION;
|
||||
|
||||
@Value("${com.hideyoshi.refreshTokenDuration}")
|
||||
private Integer REFRESH_TOKEN_DURATION;
|
||||
|
||||
private static final String AUTHORIZATION_TYPE_STRING = "Bearer ";
|
||||
|
||||
private final UserService userService;
|
||||
|
||||
@Autowired
|
||||
@Qualifier("handlerExceptionResolver")
|
||||
private HandlerExceptionResolver resolver;
|
||||
|
||||
@Override
|
||||
public TokenDTO generateAccessToken(@Valid UserDTO user, Algorithm algorithm, HttpServletRequest request) {
|
||||
|
||||
Date expirationDate = new Date(System.currentTimeMillis() + ACCESS_TOKEN_DURATION);
|
||||
|
||||
String accessToken = JWT.create()
|
||||
.withSubject(user.getUsername())
|
||||
.withExpiresAt(expirationDate)
|
||||
.withIssuer(request.getRequestURL().toString())
|
||||
.withClaim("roles", user.getAuthorities()
|
||||
.stream().map(GrantedAuthority::getAuthority)
|
||||
.collect(Collectors.toList()))
|
||||
.sign(algorithm);
|
||||
|
||||
return new TokenDTO(accessToken, expirationDate);
|
||||
}
|
||||
|
||||
@Override
|
||||
public TokenDTO generateRefreshToken(@Valid UserDTO user, Algorithm algorithm, HttpServletRequest request) {
|
||||
|
||||
Date expirationDate = new Date(System.currentTimeMillis() + REFRESH_TOKEN_DURATION);
|
||||
|
||||
String refreshToken = JWT.create()
|
||||
.withSubject(user.getUsername())
|
||||
.withExpiresAt(expirationDate)
|
||||
.withIssuer(request.getRequestURL().toString())
|
||||
.sign(algorithm);
|
||||
|
||||
return new TokenDTO(refreshToken, expirationDate);
|
||||
|
||||
}
|
||||
|
||||
@Override
|
||||
public HashMap<String, TokenDTO> generateTokens(@Valid UserDTO user, Algorithm algorithm, HttpServletRequest request) {
|
||||
|
||||
TokenDTO accessToken = generateAccessToken(user, algorithm, request);
|
||||
TokenDTO refreshToken = generateRefreshToken(user, algorithm, request);
|
||||
|
||||
HashMap<String,TokenDTO> tokens = new HashMap<>();
|
||||
tokens.put("accessToken", accessToken);
|
||||
tokens.put("refreshToken", refreshToken);
|
||||
|
||||
return tokens;
|
||||
}
|
||||
|
||||
@Override
|
||||
public UsernamePasswordAuthenticationToken verifyAccessToken(String authorizationHeader) {
|
||||
|
||||
if (authorizationHeader.startsWith(AUTHORIZATION_TYPE_STRING)) {
|
||||
|
||||
String authorizationToken = authorizationHeader.substring(AUTHORIZATION_TYPE_STRING.length());
|
||||
Algorithm algorithm = Algorithm.HMAC256(TOKEN_SECRET.getBytes());
|
||||
|
||||
JWTVerifier verifier = JWT.require(algorithm).build();
|
||||
DecodedJWT decodedJWT = verifier.verify(authorizationToken);
|
||||
|
||||
String username = decodedJWT.getSubject();
|
||||
String[] roles = decodedJWT.getClaim("roles").asArray(String.class);
|
||||
|
||||
Collection<SimpleGrantedAuthority> authorities = new ArrayList<>();
|
||||
stream(roles).forEach(role -> {
|
||||
authorities.add(new SimpleGrantedAuthority(role));
|
||||
});
|
||||
return new UsernamePasswordAuthenticationToken(username, null, authorities);
|
||||
}
|
||||
return null;
|
||||
}
|
||||
|
||||
@Override
|
||||
public UserDTO refreshAccessToken(String refreshToken, HttpServletRequest request, HttpServletResponse response) {
|
||||
|
||||
if (Objects.nonNull(refreshToken)) {
|
||||
|
||||
Algorithm algorithm = Algorithm.HMAC256(TOKEN_SECRET.getBytes());
|
||||
|
||||
JWTVerifier verifier = JWT.require(algorithm).build();
|
||||
DecodedJWT decodedJWT = verifier.verify(refreshToken);
|
||||
|
||||
UserDTO user = this.userService.getUser(decodedJWT.getSubject());
|
||||
|
||||
if (Objects.nonNull(user)) {
|
||||
|
||||
HttpSession httpSession = request.getSession();
|
||||
UserDTO authenticatedUser = user.toResponse(
|
||||
this.generateAccessToken(user, algorithm, request),
|
||||
new TokenDTO(
|
||||
refreshToken,
|
||||
decodedJWT.getExpiresAt()
|
||||
)
|
||||
);
|
||||
httpSession.setAttribute("user", authenticatedUser);
|
||||
|
||||
return authenticatedUser;
|
||||
}
|
||||
|
||||
} else {
|
||||
resolver.resolveException(
|
||||
request,
|
||||
response,
|
||||
null,
|
||||
new BadRequestException("Invalid Refresh Token. Please authenticate first.")
|
||||
);
|
||||
}
|
||||
return null;
|
||||
}
|
||||
|
||||
@Override
|
||||
public UserDTO signupUser(@Valid UserDTO user, HttpServletRequest request) {
|
||||
|
||||
Algorithm algorithm = Algorithm.HMAC256(TOKEN_SECRET.getBytes());
|
||||
|
||||
UserDTO userSaved = this.userService.saveUser(user);
|
||||
HashMap<String, TokenDTO> tokens = this.generateTokens(userSaved, algorithm, request);
|
||||
|
||||
HttpSession httpSession = request.getSession();
|
||||
UserDTO userAuthenticated = userSaved.toResponse(tokens.get("accessToken"), tokens.get("refreshToken"));
|
||||
httpSession.setAttribute("user", userAuthenticated);
|
||||
|
||||
return userAuthenticated;
|
||||
}
|
||||
|
||||
}
|
||||
@@ -0,0 +1,35 @@
|
||||
package com.hideyoshi.backendportfolio.base.session.api;
|
||||
|
||||
import com.hideyoshi.backendportfolio.base.session.service.SessionManagerService;
|
||||
import com.hideyoshi.backendportfolio.base.user.model.UserDTO;
|
||||
import lombok.RequiredArgsConstructor;
|
||||
import org.springframework.http.HttpStatus;
|
||||
import org.springframework.http.ResponseEntity;
|
||||
import org.springframework.stereotype.Controller;
|
||||
import org.springframework.web.bind.annotation.GetMapping;
|
||||
import org.springframework.web.bind.annotation.PostMapping;
|
||||
import org.springframework.web.bind.annotation.RequestMapping;
|
||||
import org.springframework.web.bind.annotation.RestController;
|
||||
|
||||
import javax.servlet.http.HttpSession;
|
||||
|
||||
@Controller
|
||||
@RestController
|
||||
@RequiredArgsConstructor
|
||||
@RequestMapping(path = "/session")
|
||||
public class SessionController {
|
||||
|
||||
private final SessionManagerService sessionManagerService;
|
||||
|
||||
@GetMapping(path = "/validate")
|
||||
public ResponseEntity<UserDTO> validateCurrentSession(HttpSession session) {
|
||||
return ResponseEntity.ok(this.sessionManagerService.validateSession(session));
|
||||
}
|
||||
|
||||
@PostMapping(path="/destroy")
|
||||
public ResponseEntity<Void> destroyCurrentSession(HttpSession session) {
|
||||
this.sessionManagerService.destroySession(session);
|
||||
return new ResponseEntity<>(HttpStatus.NO_CONTENT);
|
||||
}
|
||||
|
||||
}
|
||||
@@ -0,0 +1,13 @@
|
||||
package com.hideyoshi.backendportfolio.base.session.service;
|
||||
|
||||
import com.hideyoshi.backendportfolio.base.user.model.UserDTO;
|
||||
|
||||
import javax.servlet.http.HttpSession;
|
||||
|
||||
public interface SessionManagerService {
|
||||
|
||||
UserDTO validateSession(HttpSession session);
|
||||
|
||||
void destroySession(HttpSession session);
|
||||
|
||||
}
|
||||
@@ -0,0 +1,35 @@
|
||||
package com.hideyoshi.backendportfolio.base.session.service;
|
||||
|
||||
import com.hideyoshi.backendportfolio.base.user.model.UserDTO;
|
||||
import com.hideyoshi.backendportfolio.base.user.service.UserService;
|
||||
import lombok.RequiredArgsConstructor;
|
||||
import org.springframework.stereotype.Service;
|
||||
|
||||
import javax.servlet.http.HttpSession;
|
||||
import java.util.Objects;
|
||||
|
||||
@Service
|
||||
@RequiredArgsConstructor
|
||||
public class SessionManagerServiceImpl implements SessionManagerService {
|
||||
|
||||
private final UserService userService;
|
||||
|
||||
@Override
|
||||
public UserDTO validateSession(HttpSession session) {
|
||||
|
||||
UserDTO sessionObjects = (UserDTO) session.getAttribute("user");
|
||||
|
||||
if (Objects.nonNull(sessionObjects)) {
|
||||
return this.userService.getUser(sessionObjects.getUsername())
|
||||
.toResponse(sessionObjects.getAccessToken(), sessionObjects.getRefreshToken());
|
||||
}
|
||||
|
||||
return null;
|
||||
}
|
||||
|
||||
@Override
|
||||
public void destroySession(HttpSession session) {
|
||||
session.invalidate();
|
||||
}
|
||||
|
||||
}
|
||||
@@ -0,0 +1,89 @@
|
||||
package com.hideyoshi.backendportfolio.base.user.api;
|
||||
|
||||
import com.hideyoshi.backendportfolio.base.security.service.AuthService;
|
||||
import com.hideyoshi.backendportfolio.base.user.model.TokenDTO;
|
||||
import com.hideyoshi.backendportfolio.base.user.model.UserDTO;
|
||||
import com.hideyoshi.backendportfolio.base.user.service.UserService;
|
||||
import com.hideyoshi.backendportfolio.util.guard.UserResourceGuard;
|
||||
import com.hideyoshi.backendportfolio.util.guard.UserResourceGuardEnum;
|
||||
import lombok.RequiredArgsConstructor;
|
||||
import lombok.extern.log4j.Log4j2;
|
||||
import org.springframework.http.HttpStatus;
|
||||
import org.springframework.http.ResponseEntity;
|
||||
import org.springframework.stereotype.Controller;
|
||||
import org.springframework.validation.BindingResult;
|
||||
import org.springframework.web.bind.annotation.*;
|
||||
import org.springframework.web.servlet.support.ServletUriComponentsBuilder;
|
||||
|
||||
import javax.servlet.http.HttpServletRequest;
|
||||
import javax.servlet.http.HttpServletResponse;
|
||||
import javax.validation.Valid;
|
||||
import java.net.URI;
|
||||
import java.util.List;
|
||||
|
||||
@Log4j2
|
||||
@Controller
|
||||
@RestController
|
||||
@RequestMapping("/user")
|
||||
@RequiredArgsConstructor
|
||||
public class UserController {
|
||||
|
||||
private final UserService userService;
|
||||
|
||||
private final AuthService authService;
|
||||
|
||||
@GetMapping
|
||||
@UserResourceGuard(accessType = UserResourceGuardEnum.ADMIN_USER)
|
||||
public ResponseEntity<List<UserDTO>> getUsers() {
|
||||
return ResponseEntity.ok(this.userService.getUsers());
|
||||
}
|
||||
|
||||
@PostMapping("/signup")
|
||||
@UserResourceGuard(accessType = UserResourceGuardEnum.OPEN)
|
||||
public ResponseEntity<UserDTO> signupUser(@RequestBody @Valid UserDTO user, HttpServletRequest request) {
|
||||
URI uri = URI.create(
|
||||
ServletUriComponentsBuilder
|
||||
.fromCurrentContextPath()
|
||||
.path("/user/signup").toUriString()
|
||||
);
|
||||
return ResponseEntity.created(uri).body(this.authService.signupUser(user, request));
|
||||
}
|
||||
|
||||
@PostMapping("/delete/{id}")
|
||||
@UserResourceGuard(accessType = UserResourceGuardEnum.SAME_USER)
|
||||
public ResponseEntity<Void> deleteUser(@PathVariable("id") Long id) {
|
||||
this.userService.deleteUser(id);
|
||||
return new ResponseEntity<>(HttpStatus.NO_CONTENT);
|
||||
}
|
||||
//
|
||||
// @PostMapping("/alter/{id}")
|
||||
// @UserResourceGuard(accessType = UserResourceGuardEnum.SAME_USER)
|
||||
// public ResponseEntity<Void> alterUser(@PathVariable("id") Long id, @RequestBody @Valid UserDTO user) {
|
||||
// this.userService.alterUser(id, user);
|
||||
// return new ResponseEntity<>(HttpStatus.NO_CONTENT);
|
||||
// }
|
||||
//
|
||||
// @PostMapping("/alter/{id}/role/add")
|
||||
// @UserResourceGuard(accessType = UserResourceGuardEnum.SAME_USER)
|
||||
// public ResponseEntity<?> addRoleToUser(@PathVariable("id") Long id, @RequestBody RoleToUserDTO filter) {
|
||||
// userService.addRoleToUser(id, filter.getRoleName());
|
||||
// return ResponseEntity.ok().build();
|
||||
// }
|
||||
//
|
||||
// @PostMapping("/alter/{id}/role/delete")
|
||||
// @UserResourceGuard(accessType = UserResourceGuardEnum.SAME_USER)
|
||||
// public ResponseEntity<?> deleteRoleToUser(@PathVariable("id") Long id, @RequestBody RoleToUserDTO filter) {
|
||||
// userService.removeRoleFromUser(id, filter.getRoleName());
|
||||
// return ResponseEntity.ok().build();
|
||||
// }
|
||||
|
||||
@PostMapping("/login/refresh")
|
||||
@UserResourceGuard(accessType = UserResourceGuardEnum.OPEN)
|
||||
public ResponseEntity<UserDTO> refreshAccessToken(
|
||||
@RequestBody @Valid TokenDTO refreshToken,
|
||||
HttpServletRequest request,
|
||||
HttpServletResponse response) {
|
||||
return ResponseEntity.ok(this.authService.refreshAccessToken(refreshToken.getToken(), request, response));
|
||||
}
|
||||
|
||||
}
|
||||
@@ -0,0 +1,18 @@
|
||||
package com.hideyoshi.backendportfolio.base.user.entity;
|
||||
|
||||
public enum Provider {
|
||||
|
||||
GOOGLE("google"),
|
||||
|
||||
LOCAL("local");
|
||||
private String name;
|
||||
|
||||
Provider(String name) {
|
||||
this.name = name;
|
||||
}
|
||||
|
||||
public String getName() {
|
||||
return name;
|
||||
}
|
||||
|
||||
}
|
||||
@@ -0,0 +1,29 @@
|
||||
package com.hideyoshi.backendportfolio.base.user.entity;
|
||||
|
||||
import com.fasterxml.jackson.annotation.JsonValue;
|
||||
|
||||
public enum Role {
|
||||
USER("ROLE_USER"),
|
||||
ADMIN("ROLE_ADMIN");
|
||||
|
||||
@JsonValue
|
||||
private final String description;
|
||||
|
||||
Role(String description) {
|
||||
this.description = description;
|
||||
}
|
||||
|
||||
public String getDescription() {
|
||||
return this.description;
|
||||
}
|
||||
|
||||
public static Role byValue(String description) {
|
||||
for (Role r : values()) {
|
||||
if (r.getDescription().equals(description)) {
|
||||
return r;
|
||||
}
|
||||
}
|
||||
throw new IllegalArgumentException("Argument not valid.");
|
||||
}
|
||||
|
||||
}
|
||||
@@ -0,0 +1,77 @@
|
||||
package com.hideyoshi.backendportfolio.base.user.entity;
|
||||
|
||||
import lombok.AllArgsConstructor;
|
||||
import lombok.Data;
|
||||
import lombok.NoArgsConstructor;
|
||||
|
||||
import javax.persistence.*;
|
||||
import java.util.ArrayList;
|
||||
import java.util.List;
|
||||
import java.util.Objects;
|
||||
import java.util.stream.Collectors;
|
||||
|
||||
import static java.util.Arrays.stream;
|
||||
|
||||
@Data
|
||||
@Entity
|
||||
@NoArgsConstructor
|
||||
@AllArgsConstructor
|
||||
@Table(name = "`user`", schema = "auth")
|
||||
public class User {
|
||||
|
||||
@Id
|
||||
@SequenceGenerator(name = "seq_user", sequenceName = "auth.user_seq", allocationSize = 1)
|
||||
@GeneratedValue(strategy = GenerationType.SEQUENCE, generator = "seq_user")
|
||||
private Long id;
|
||||
|
||||
@Column(
|
||||
name = "full_name",
|
||||
nullable = false
|
||||
)
|
||||
private String fullname;
|
||||
|
||||
@Column(
|
||||
name = "email",
|
||||
unique = true,
|
||||
nullable = false
|
||||
)
|
||||
private String email;
|
||||
|
||||
|
||||
@Column(
|
||||
name = "username",
|
||||
unique = true,
|
||||
nullable = false
|
||||
)
|
||||
private String username;
|
||||
|
||||
|
||||
@Column(
|
||||
name = "password",
|
||||
nullable = false
|
||||
)
|
||||
private String password;
|
||||
|
||||
@Column(
|
||||
name = "roles",
|
||||
nullable = false
|
||||
)
|
||||
private String roles;
|
||||
|
||||
public void setRoles(List<Role> roles) {
|
||||
this.roles = roles.stream()
|
||||
.map(role -> role.getDescription())
|
||||
.collect(Collectors.joining("&"));
|
||||
}
|
||||
|
||||
public List<Role> getRoles() {
|
||||
List<Role> roles = new ArrayList<>();
|
||||
if (Objects.nonNull(this.roles) && !this.roles.isEmpty()) {
|
||||
roles = stream(this.roles.split("&"))
|
||||
.map(description -> Role.byValue(description))
|
||||
.collect(Collectors.toList());
|
||||
}
|
||||
return roles;
|
||||
}
|
||||
|
||||
}
|
||||
@@ -0,0 +1,10 @@
|
||||
package com.hideyoshi.backendportfolio.base.user.model;
|
||||
|
||||
import lombok.Data;
|
||||
|
||||
@Data
|
||||
public
|
||||
class RoleToUserDTO {
|
||||
private String username;
|
||||
private String roleName;
|
||||
}
|
||||
@@ -0,0 +1,21 @@
|
||||
package com.hideyoshi.backendportfolio.base.user.model;
|
||||
|
||||
import com.fasterxml.jackson.annotation.JsonFormat;
|
||||
import lombok.*;
|
||||
|
||||
import javax.validation.constraints.NotNull;
|
||||
import java.io.Serializable;
|
||||
import java.util.Date;
|
||||
|
||||
@Data
|
||||
@NoArgsConstructor
|
||||
@AllArgsConstructor
|
||||
public class TokenDTO implements Serializable {
|
||||
|
||||
@NotNull(message = "Invalid AccessToken. Please Authenticate first.")
|
||||
private String token;
|
||||
|
||||
@JsonFormat(pattern="yyyy-MM-dd HH:mm:ss")
|
||||
private Date expirationDate;
|
||||
|
||||
}
|
||||
@@ -0,0 +1,162 @@
|
||||
package com.hideyoshi.backendportfolio.base.user.model;
|
||||
|
||||
import com.fasterxml.jackson.annotation.JsonIgnore;
|
||||
import com.fasterxml.jackson.annotation.JsonIgnoreProperties;
|
||||
import com.fasterxml.jackson.annotation.JsonInclude;
|
||||
import com.hideyoshi.backendportfolio.base.user.entity.Provider;
|
||||
import com.hideyoshi.backendportfolio.base.user.entity.Role;
|
||||
import com.hideyoshi.backendportfolio.base.user.entity.User;
|
||||
import com.hideyoshi.backendportfolio.util.validator.email.unique.UniqueEmail;
|
||||
import com.hideyoshi.backendportfolio.util.validator.email.valid.ValidEmail;
|
||||
import com.hideyoshi.backendportfolio.util.validator.password.ValidPassword;
|
||||
import lombok.AllArgsConstructor;
|
||||
import lombok.Builder;
|
||||
import lombok.Data;
|
||||
import lombok.NoArgsConstructor;
|
||||
import org.springframework.lang.Nullable;
|
||||
import org.springframework.security.core.GrantedAuthority;
|
||||
import org.springframework.security.core.authority.SimpleGrantedAuthority;
|
||||
import org.springframework.security.core.userdetails.UserDetails;
|
||||
|
||||
import javax.validation.constraints.NotEmpty;
|
||||
import javax.validation.constraints.Size;
|
||||
import java.util.Collection;
|
||||
import java.util.List;
|
||||
import java.util.Objects;
|
||||
import java.util.stream.Collectors;
|
||||
|
||||
@Data
|
||||
@Builder
|
||||
@NoArgsConstructor
|
||||
@AllArgsConstructor
|
||||
@JsonInclude(JsonInclude.Include.NON_NULL)
|
||||
@JsonIgnoreProperties(ignoreUnknown = true)
|
||||
public class UserDTO implements UserDetails {
|
||||
|
||||
private Long id;
|
||||
|
||||
@NotEmpty
|
||||
private String fullname;
|
||||
|
||||
@NotEmpty
|
||||
@ValidEmail
|
||||
@UniqueEmail
|
||||
private String email;
|
||||
|
||||
@NotEmpty
|
||||
private String username;
|
||||
|
||||
@Nullable
|
||||
@ValidPassword
|
||||
private String password;
|
||||
|
||||
@Size(min=1)
|
||||
private List<Role> roles;
|
||||
|
||||
private TokenDTO accessToken;
|
||||
|
||||
private TokenDTO refreshToken;
|
||||
|
||||
private Provider provider;
|
||||
|
||||
public UserDTO(
|
||||
String fullname,
|
||||
String email,
|
||||
String username,
|
||||
String password
|
||||
) {
|
||||
this.fullname = fullname;
|
||||
this.email = email;
|
||||
this.username = username;
|
||||
this.password = password;
|
||||
this.roles = List.of(Role.USER);
|
||||
}
|
||||
|
||||
public UserDTO(
|
||||
String fullname,
|
||||
String email,
|
||||
String username,
|
||||
String password,
|
||||
List<Role> roles
|
||||
) {
|
||||
this.fullname = fullname;
|
||||
this.email = email;
|
||||
this.username = username;
|
||||
this.password = password;
|
||||
this.roles = roles;
|
||||
}
|
||||
|
||||
public UserDTO(User entity) {
|
||||
this.id = entity.getId();
|
||||
this.fullname = entity.getFullname();
|
||||
this.email = entity.getEmail();
|
||||
this.username = entity.getUsername();
|
||||
this.password = entity.getPassword();
|
||||
this.roles = entity.getRoles();
|
||||
}
|
||||
|
||||
public User toEntity() {
|
||||
return new User(
|
||||
this.id,
|
||||
this.fullname,
|
||||
this.email,
|
||||
this.username,
|
||||
this.password,
|
||||
Objects.nonNull(this.roles) ? this.roles.stream()
|
||||
.map(role -> role.getDescription())
|
||||
.collect(Collectors.joining("&")) : Role.USER.getDescription()
|
||||
);
|
||||
}
|
||||
|
||||
@JsonIgnore
|
||||
@Override
|
||||
public Collection<? extends GrantedAuthority> getAuthorities() {
|
||||
return this.roles.stream()
|
||||
.map(role -> new SimpleGrantedAuthority(role.getDescription()))
|
||||
.collect(Collectors.toList());
|
||||
}
|
||||
|
||||
@JsonIgnore
|
||||
@Override
|
||||
public boolean isAccountNonExpired() {
|
||||
return true;
|
||||
}
|
||||
|
||||
@JsonIgnore
|
||||
@Override
|
||||
public boolean isAccountNonLocked() {
|
||||
return true;
|
||||
}
|
||||
|
||||
@JsonIgnore
|
||||
@Override
|
||||
public boolean isCredentialsNonExpired() {
|
||||
return true;
|
||||
}
|
||||
|
||||
@JsonIgnore
|
||||
@Override
|
||||
public boolean isEnabled() {
|
||||
return true;
|
||||
}
|
||||
|
||||
public UserDTO toResponse() {
|
||||
return UserDTO.builder()
|
||||
.fullname(this.fullname)
|
||||
.email(this.email)
|
||||
.username(this.username)
|
||||
.build();
|
||||
}
|
||||
|
||||
public UserDTO toResponse(TokenDTO accessToken, TokenDTO refreshToken) {
|
||||
return UserDTO.builder()
|
||||
.id(this.id)
|
||||
.fullname(this.fullname)
|
||||
.email(this.email)
|
||||
.username(this.username)
|
||||
.roles(this.roles)
|
||||
.accessToken(accessToken)
|
||||
.refreshToken(refreshToken)
|
||||
.build();
|
||||
}
|
||||
}
|
||||
@@ -0,0 +1,13 @@
|
||||
package com.hideyoshi.backendportfolio.base.user.repo;
|
||||
|
||||
import com.hideyoshi.backendportfolio.base.user.entity.User;
|
||||
import org.springframework.data.jpa.repository.JpaRepository;
|
||||
import org.springframework.stereotype.Repository;
|
||||
|
||||
import java.util.Optional;
|
||||
|
||||
@Repository
|
||||
public interface UserRepository extends JpaRepository<User, Long> {
|
||||
Optional<User> findByUsername(String username);
|
||||
Optional<User> findByEmail(String email);
|
||||
}
|
||||
@@ -0,0 +1,26 @@
|
||||
package com.hideyoshi.backendportfolio.base.user.service;
|
||||
|
||||
import com.hideyoshi.backendportfolio.base.user.model.UserDTO;
|
||||
import org.springframework.security.core.userdetails.UserDetailsService;
|
||||
|
||||
import javax.validation.Valid;
|
||||
import java.util.List;
|
||||
|
||||
public interface UserService extends UserDetailsService {
|
||||
|
||||
UserDTO saveUser(@Valid UserDTO user);
|
||||
|
||||
void alterUser(Long id, @Valid UserDTO user);
|
||||
|
||||
void deleteUser(Long id);
|
||||
|
||||
void addRoleToUser(Long id, String roleName);
|
||||
|
||||
void removeRoleFromUser(Long id, String roleName);
|
||||
|
||||
UserDTO getUser(Long id);
|
||||
|
||||
UserDTO getUser(String username);
|
||||
|
||||
List<UserDTO> getUsers();
|
||||
}
|
||||
@@ -0,0 +1,146 @@
|
||||
package com.hideyoshi.backendportfolio.base.user.service;
|
||||
|
||||
import com.hideyoshi.backendportfolio.base.user.entity.Role;
|
||||
import com.hideyoshi.backendportfolio.base.user.entity.User;
|
||||
import com.hideyoshi.backendportfolio.base.user.model.UserDTO;
|
||||
import com.hideyoshi.backendportfolio.base.user.repo.UserRepository;
|
||||
import com.hideyoshi.backendportfolio.util.exception.BadRequestException;
|
||||
import lombok.RequiredArgsConstructor;
|
||||
import lombok.extern.log4j.Log4j2;
|
||||
import org.springframework.security.core.userdetails.UserDetails;
|
||||
import org.springframework.security.crypto.password.PasswordEncoder;
|
||||
import org.springframework.stereotype.Service;
|
||||
|
||||
import javax.transaction.Transactional;
|
||||
import javax.validation.Valid;
|
||||
import java.util.List;
|
||||
import java.util.Objects;
|
||||
import java.util.stream.Collectors;
|
||||
|
||||
@Log4j2
|
||||
@Service
|
||||
@Transactional
|
||||
@RequiredArgsConstructor
|
||||
public class UserServiceImpl implements UserService {
|
||||
|
||||
private final UserRepository userRepo;
|
||||
|
||||
private final PasswordEncoder passwordEncoder;
|
||||
|
||||
@Override
|
||||
public UserDTO saveUser(@Valid UserDTO user) {
|
||||
|
||||
this.userRepo.findByUsername(user.getUsername()).ifPresent( userOnDB -> {
|
||||
throw new BadRequestException(String.format("User %s already exists. Try another UserName.", userOnDB.getUsername()));
|
||||
});
|
||||
|
||||
log.info(String.format("Saving to the database user of name: %s", user.getFullname()));
|
||||
|
||||
user.setPassword(passwordEncoder.encode(user.getPassword()));
|
||||
UserDTO userSaved = new UserDTO(userRepo.save(user.toEntity()));
|
||||
|
||||
if (!userSaved.getRoles().contains(Role.USER)) {
|
||||
userSaved.getRoles().add(Role.USER);
|
||||
}
|
||||
|
||||
return userSaved;
|
||||
}
|
||||
|
||||
@Override
|
||||
public void alterUser(Long id, @Valid UserDTO user) {
|
||||
|
||||
this.userRepo.findById(id).ifPresentOrElse( userOnDB -> {
|
||||
User userToSave = user.toEntity();
|
||||
userToSave.setId(userOnDB.getId());
|
||||
userRepo.save(userToSave);
|
||||
}, () -> {
|
||||
throw new BadRequestException(String.format("User {} doesn't exist.", user.getUsername()));
|
||||
});
|
||||
}
|
||||
|
||||
@Override
|
||||
public void deleteUser(Long id) {
|
||||
|
||||
this.userRepo.findById(id).ifPresentOrElse( userOnDB -> {
|
||||
this.userRepo.delete(userOnDB);
|
||||
}, () -> {
|
||||
throw new BadRequestException("User doesn't exist.");
|
||||
});
|
||||
|
||||
}
|
||||
|
||||
@Override
|
||||
public void addRoleToUser(Long id, String roleName) {
|
||||
|
||||
UserDTO userOnDB = this.getUser(id);
|
||||
Role newAuthority = Role.byValue(roleName);
|
||||
|
||||
List<Role> roles = userOnDB.getRoles();
|
||||
if (Objects.nonNull(newAuthority) && !roles.contains(newAuthority)) {
|
||||
|
||||
log.info(String.format("Adding to user %s the role %s",
|
||||
userOnDB.getUsername(), newAuthority.getDescription()));
|
||||
|
||||
if (roles.add(newAuthority)) {
|
||||
userOnDB.setRoles(roles);
|
||||
this.alterUser(userOnDB.getId(), userOnDB);
|
||||
}
|
||||
|
||||
}
|
||||
|
||||
}
|
||||
|
||||
@Override
|
||||
public void removeRoleFromUser(Long id, String roleName) {
|
||||
|
||||
UserDTO userOnDB = this.getUser(id);
|
||||
Role toDeleteAuthority = Role.byValue(roleName);
|
||||
|
||||
List<Role> roles = userOnDB.getRoles();
|
||||
if (!roles.isEmpty()) {
|
||||
|
||||
log.info(String.format("Removing from user %s the role %s",
|
||||
userOnDB.getUsername(), toDeleteAuthority.getDescription()));
|
||||
|
||||
roles = roles.stream()
|
||||
.filter(role -> !role.equals(toDeleteAuthority))
|
||||
.collect(Collectors.toList());
|
||||
userOnDB.setRoles(roles);
|
||||
this.alterUser(userOnDB.getId(), userOnDB);
|
||||
}
|
||||
}
|
||||
|
||||
@Override
|
||||
public UserDTO getUser(Long id) {
|
||||
log.info(String.format("Fetching user with id: %o", id));
|
||||
|
||||
return new UserDTO(
|
||||
userRepo.findById(id)
|
||||
.orElseThrow(() -> new BadRequestException("User Not Found. Please create an Account."))
|
||||
);
|
||||
}
|
||||
|
||||
@Override
|
||||
public UserDTO getUser(String username) {
|
||||
log.info(String.format("Fetching user: %s", username));
|
||||
|
||||
return new UserDTO(
|
||||
userRepo.findByUsername(username)
|
||||
.orElseThrow(() -> new BadRequestException("User Not Found. Please create an Account."))
|
||||
);
|
||||
}
|
||||
|
||||
@Override
|
||||
public List<UserDTO> getUsers() {
|
||||
log.info("Fetching all users.");
|
||||
|
||||
return userRepo.findAll().stream()
|
||||
.map(user -> (new UserDTO(user)).toResponse())
|
||||
.collect(Collectors.toList());
|
||||
}
|
||||
|
||||
@Override
|
||||
public UserDetails loadUserByUsername(String username) {
|
||||
return this.getUser(username);
|
||||
}
|
||||
}
|
||||
@@ -0,0 +1,13 @@
|
||||
package com.hideyoshi.backendportfolio.util.exception;
|
||||
|
||||
import org.springframework.http.HttpStatus;
|
||||
import org.springframework.web.bind.annotation.ResponseStatus;
|
||||
|
||||
@ResponseStatus(HttpStatus.FORBIDDEN)
|
||||
public class AuthenticationInvalidException extends RuntimeException {
|
||||
|
||||
public AuthenticationInvalidException(String message) {
|
||||
super(message);
|
||||
}
|
||||
|
||||
}
|
||||
@@ -0,0 +1,15 @@
|
||||
package com.hideyoshi.backendportfolio.util.exception;
|
||||
|
||||
import java.time.LocalDateTime;
|
||||
|
||||
public class AuthenticationInvalidExceptionDetails extends ExceptionDetails{
|
||||
|
||||
public AuthenticationInvalidExceptionDetails(
|
||||
String title,
|
||||
Integer status,
|
||||
String details,
|
||||
String developerMessage,
|
||||
LocalDateTime timestamp) {
|
||||
super(title, status, details, developerMessage, timestamp);
|
||||
}
|
||||
}
|
||||
@@ -0,0 +1,11 @@
|
||||
package com.hideyoshi.backendportfolio.util.exception;
|
||||
|
||||
import org.springframework.http.HttpStatus;
|
||||
import org.springframework.web.bind.annotation.ResponseStatus;
|
||||
|
||||
@ResponseStatus(HttpStatus.BAD_REQUEST)
|
||||
public class BadRequestException extends RuntimeException{
|
||||
public BadRequestException(String message) {
|
||||
super(message);
|
||||
}
|
||||
}
|
||||
@@ -0,0 +1,13 @@
|
||||
package com.hideyoshi.backendportfolio.util.exception;
|
||||
|
||||
import java.time.LocalDateTime;
|
||||
|
||||
public class BadRequestExceptionDetails extends ExceptionDetails {
|
||||
|
||||
public BadRequestExceptionDetails(final String title, final Integer status,
|
||||
final String details, final String developerMessage,
|
||||
final LocalDateTime timestamp) {
|
||||
super(title, status, details, developerMessage, timestamp);
|
||||
}
|
||||
|
||||
}
|
||||
@@ -0,0 +1,30 @@
|
||||
package com.hideyoshi.backendportfolio.util.exception;
|
||||
|
||||
import lombok.Getter;
|
||||
import lombok.Setter;
|
||||
|
||||
import java.time.LocalDateTime;
|
||||
|
||||
@Getter
|
||||
@Setter
|
||||
public class ExceptionDetails {
|
||||
|
||||
protected String title;
|
||||
|
||||
protected Integer status;
|
||||
|
||||
protected String details;
|
||||
|
||||
protected String developerMessage;
|
||||
|
||||
protected LocalDateTime timestamp;
|
||||
|
||||
public ExceptionDetails(final String title, final Integer status, final String details, final String developerMessage, final LocalDateTime timestamp) {
|
||||
this.title = title;
|
||||
this.status = status;
|
||||
this.details = details;
|
||||
this.developerMessage = developerMessage;
|
||||
this.timestamp = timestamp;
|
||||
}
|
||||
|
||||
}
|
||||
@@ -0,0 +1,25 @@
|
||||
package com.hideyoshi.backendportfolio.util.exception;
|
||||
|
||||
import lombok.Getter;
|
||||
import lombok.Setter;
|
||||
|
||||
import java.time.LocalDateTime;
|
||||
|
||||
@Getter
|
||||
@Setter
|
||||
public class ValidationExceptionDetails extends ExceptionDetails {
|
||||
|
||||
private final String fields;
|
||||
|
||||
private final String fieldsMessage;
|
||||
|
||||
public ValidationExceptionDetails(final String title, final int status,
|
||||
final String details, final String developerMessage,
|
||||
final LocalDateTime timestamp, final String fields,
|
||||
final String fieldsMessage) {
|
||||
super(title, status, details, developerMessage, timestamp);
|
||||
this.fields = fields;
|
||||
this.fieldsMessage = fieldsMessage;
|
||||
}
|
||||
|
||||
}
|
||||
@@ -0,0 +1,14 @@
|
||||
package com.hideyoshi.backendportfolio.util.guard;
|
||||
|
||||
import java.lang.annotation.*;
|
||||
|
||||
@Target( ElementType.METHOD )
|
||||
@Retention( RetentionPolicy.RUNTIME )
|
||||
@Documented
|
||||
public @interface UserResourceGuard {
|
||||
|
||||
String denialMessage() default "Operation not permitted. You don't have access to this Resource.";
|
||||
|
||||
UserResourceGuardEnum accessType();
|
||||
|
||||
}
|
||||
@@ -0,0 +1,111 @@
|
||||
package com.hideyoshi.backendportfolio.util.guard;
|
||||
|
||||
import com.fasterxml.jackson.databind.ObjectMapper;
|
||||
import com.hideyoshi.backendportfolio.base.user.entity.Role;
|
||||
import com.hideyoshi.backendportfolio.base.user.model.UserDTO;
|
||||
import com.hideyoshi.backendportfolio.base.user.service.UserService;
|
||||
import org.springframework.security.core.authority.SimpleGrantedAuthority;
|
||||
import org.springframework.security.core.context.SecurityContextHolder;
|
||||
import org.springframework.web.servlet.HandlerMapping;
|
||||
|
||||
import javax.servlet.http.HttpServletRequest;
|
||||
import java.util.HashMap;
|
||||
|
||||
public enum UserResourceGuardEnum {
|
||||
|
||||
USER("user") {
|
||||
@Override
|
||||
public Boolean hasAccess(
|
||||
UserService userService,
|
||||
ObjectMapper objectMapper,
|
||||
HttpServletRequest request) {
|
||||
return justUser(userService, objectMapper, request);
|
||||
}
|
||||
},
|
||||
|
||||
SAME_USER("same_user") {
|
||||
@Override
|
||||
public Boolean hasAccess(
|
||||
UserService userService,
|
||||
ObjectMapper objectMapper,
|
||||
HttpServletRequest request) {
|
||||
return sameUser(userService, objectMapper, request);
|
||||
}
|
||||
},
|
||||
|
||||
ADMIN_USER("admin_user") {
|
||||
@Override
|
||||
public Boolean hasAccess(
|
||||
UserService userService,
|
||||
ObjectMapper objectMapper,
|
||||
HttpServletRequest request) {
|
||||
return adminUser(userService, objectMapper, request);
|
||||
}
|
||||
},
|
||||
|
||||
OPEN("open") {
|
||||
@Override
|
||||
public Boolean hasAccess(
|
||||
UserService userService,
|
||||
ObjectMapper objectMapper,
|
||||
HttpServletRequest request) {
|
||||
return openAccess(userService, objectMapper, request);
|
||||
}
|
||||
};
|
||||
|
||||
private final String accessType;
|
||||
|
||||
UserResourceGuardEnum(String accessType) {
|
||||
this.accessType = accessType;
|
||||
}
|
||||
|
||||
public abstract Boolean hasAccess(
|
||||
UserService userService,
|
||||
ObjectMapper objectMapper,
|
||||
HttpServletRequest request);
|
||||
|
||||
public String getAccessType() {
|
||||
return this.accessType;
|
||||
}
|
||||
|
||||
public static UserResourceGuardEnum byValue(String accessType) {
|
||||
for (UserResourceGuardEnum o : values()) {
|
||||
if (o.getAccessType().equals(accessType)) {
|
||||
return o;
|
||||
}
|
||||
}
|
||||
throw new IllegalArgumentException("Argument not valid.");
|
||||
}
|
||||
|
||||
private static boolean justUser(UserService userService, ObjectMapper objectMapper, HttpServletRequest request) {
|
||||
|
||||
String username = (String) SecurityContextHolder.getContext().getAuthentication().getPrincipal();
|
||||
UserDTO userLogged = userService.getUser(username);
|
||||
|
||||
return userLogged.getAuthorities().contains(new SimpleGrantedAuthority(Role.USER.getDescription()));
|
||||
}
|
||||
|
||||
private static boolean sameUser(UserService userService, ObjectMapper objectMapper, HttpServletRequest request) {
|
||||
String username = (String) SecurityContextHolder.getContext().getAuthentication().getPrincipal();
|
||||
UserDTO userLogged = userService.getUser(username);
|
||||
|
||||
Object requestPathVariable = request.getAttribute(HandlerMapping.URI_TEMPLATE_VARIABLES_ATTRIBUTE);
|
||||
HashMap<String, String> pathVariable = objectMapper.convertValue(requestPathVariable, HashMap.class);
|
||||
UserDTO userInfo = userService.getUser(Long.parseLong(pathVariable.get("id")));
|
||||
|
||||
return userLogged.getUsername().equals(userInfo.getUsername());
|
||||
|
||||
}
|
||||
|
||||
private static boolean adminUser(UserService userService, ObjectMapper objectMapper, HttpServletRequest request) {
|
||||
String username = (String) SecurityContextHolder.getContext().getAuthentication().getPrincipal();
|
||||
UserDTO userLogged = userService.getUser(username);
|
||||
|
||||
return userLogged.getAuthorities().contains(new SimpleGrantedAuthority(Role.ADMIN.getDescription()));
|
||||
}
|
||||
|
||||
private static Boolean openAccess(UserService userService, ObjectMapper objectMapper, HttpServletRequest request) {
|
||||
return true;
|
||||
}
|
||||
|
||||
}
|
||||
@@ -0,0 +1,22 @@
|
||||
package com.hideyoshi.backendportfolio.util.guard;
|
||||
|
||||
import com.hideyoshi.backendportfolio.base.user.model.UserDTO;
|
||||
import org.springframework.security.core.context.SecurityContextHolder;
|
||||
|
||||
import javax.validation.ConstraintValidator;
|
||||
import javax.validation.ConstraintValidatorContext;
|
||||
|
||||
public class UserResourceValidator implements ConstraintValidator<UserResourceGuard, UserDTO> {
|
||||
|
||||
@Override
|
||||
public void initialize(UserResourceGuard constraintAnnotation) {
|
||||
ConstraintValidator.super.initialize(constraintAnnotation);
|
||||
}
|
||||
|
||||
@Override
|
||||
public boolean isValid(UserDTO userDTO, ConstraintValidatorContext constraintValidatorContext) {
|
||||
System.out.println(SecurityContextHolder.getContext().getAuthentication());
|
||||
return false;
|
||||
}
|
||||
|
||||
}
|
||||
@@ -0,0 +1,84 @@
|
||||
package com.hideyoshi.backendportfolio.util.handler;
|
||||
|
||||
import com.hideyoshi.backendportfolio.util.exception.*;
|
||||
import lombok.extern.log4j.Log4j2;
|
||||
import org.springframework.http.HttpHeaders;
|
||||
import org.springframework.http.HttpStatus;
|
||||
import org.springframework.http.ResponseEntity;
|
||||
import org.springframework.lang.Nullable;
|
||||
import org.springframework.validation.FieldError;
|
||||
import org.springframework.web.bind.MethodArgumentNotValidException;
|
||||
import org.springframework.web.bind.annotation.ControllerAdvice;
|
||||
import org.springframework.web.bind.annotation.ExceptionHandler;
|
||||
import org.springframework.web.context.request.WebRequest;
|
||||
import org.springframework.web.servlet.mvc.method.annotation.ResponseEntityExceptionHandler;
|
||||
|
||||
import java.time.LocalDateTime;
|
||||
import java.util.List;
|
||||
import java.util.Objects;
|
||||
import java.util.stream.Collectors;
|
||||
|
||||
@Log4j2
|
||||
@ControllerAdvice
|
||||
public class RestExceptionHandler extends ResponseEntityExceptionHandler {
|
||||
|
||||
@ExceptionHandler(BadRequestException.class)
|
||||
public ResponseEntity<BadRequestExceptionDetails> handleBadRequest(final BadRequestException exception) {
|
||||
return new ResponseEntity<>(
|
||||
new BadRequestExceptionDetails("Bad Request Exception, Check the Documentation",
|
||||
HttpStatus.BAD_REQUEST.value(), exception.getMessage(),
|
||||
exception.getClass().getName(), LocalDateTime.now()),
|
||||
HttpStatus.BAD_REQUEST);
|
||||
}
|
||||
|
||||
@ExceptionHandler(AuthenticationInvalidException.class)
|
||||
public ResponseEntity<AuthenticationInvalidExceptionDetails> handleBadRequest(final AuthenticationInvalidException exception) {
|
||||
return new ResponseEntity<>(
|
||||
new AuthenticationInvalidExceptionDetails("Authentication Failed. Check your credentials.",
|
||||
HttpStatus.FORBIDDEN.value(), exception.getMessage(),
|
||||
exception.getClass().getName(), LocalDateTime.now()),
|
||||
HttpStatus.FORBIDDEN);
|
||||
}
|
||||
|
||||
@Override
|
||||
protected ResponseEntity<Object> handleMethodArgumentNotValid(
|
||||
final MethodArgumentNotValidException exception, final HttpHeaders headers, final HttpStatus status, final WebRequest request) {
|
||||
|
||||
final List<FieldError> fieldErrors = exception.getBindingResult().getFieldErrors();
|
||||
final String fields = fieldErrors.stream()
|
||||
.map(FieldError::getField)
|
||||
.collect(Collectors.joining(", "));
|
||||
|
||||
final String fieldsMessage = fieldErrors.stream()
|
||||
.map(FieldError::getDefaultMessage)
|
||||
.collect(Collectors.joining(", "));
|
||||
|
||||
return new ResponseEntity<>(
|
||||
new ValidationExceptionDetails("Bad Request Exception, Invalid Fields",
|
||||
HttpStatus.BAD_REQUEST.value(), "Check the field(s)",
|
||||
exception.getClass().getName(), LocalDateTime.now(),
|
||||
fields, fieldsMessage),
|
||||
HttpStatus.BAD_REQUEST);
|
||||
}
|
||||
|
||||
@Override
|
||||
protected ResponseEntity<Object> handleExceptionInternal(final Exception exception, @Nullable final Object body, final HttpHeaders headers, final HttpStatus status, final WebRequest request) {
|
||||
|
||||
String errorMessage;
|
||||
if (Objects.nonNull(exception.getCause())) {
|
||||
errorMessage = exception.getCause().getMessage();
|
||||
} else {
|
||||
errorMessage = exception.getMessage();
|
||||
}
|
||||
|
||||
final ExceptionDetails exceptionDetails = new ExceptionDetails(
|
||||
errorMessage,
|
||||
status.value(),
|
||||
exception.getMessage(),
|
||||
exception.getClass().getName(),
|
||||
LocalDateTime.now()
|
||||
);
|
||||
|
||||
return new ResponseEntity<>(exceptionDetails, headers, status);
|
||||
}
|
||||
}
|
||||
@@ -0,0 +1,34 @@
|
||||
package com.hideyoshi.backendportfolio.util.validator.email.unique;
|
||||
|
||||
import com.hideyoshi.backendportfolio.base.user.repo.UserRepository;
|
||||
import lombok.RequiredArgsConstructor;
|
||||
|
||||
import javax.validation.ConstraintValidator;
|
||||
import javax.validation.ConstraintValidatorContext;
|
||||
import java.util.concurrent.atomic.AtomicReference;
|
||||
|
||||
@RequiredArgsConstructor
|
||||
public class EmailUnique implements ConstraintValidator<UniqueEmail, String> {
|
||||
|
||||
private final UserRepository userRepository;
|
||||
|
||||
@Override
|
||||
public void initialize(UniqueEmail constraintAnnotation) {
|
||||
}
|
||||
|
||||
@Override
|
||||
public boolean isValid(String email, ConstraintValidatorContext constraintValidatorContext) {
|
||||
|
||||
AtomicReference<Boolean> emailValid = new AtomicReference();
|
||||
this.userRepository.findByEmail(email).ifPresentOrElse(
|
||||
(value) -> {
|
||||
emailValid.set(false);
|
||||
},
|
||||
() -> {
|
||||
emailValid.set(true);
|
||||
}
|
||||
);
|
||||
|
||||
return emailValid.get();
|
||||
}
|
||||
}
|
||||
@@ -0,0 +1,24 @@
|
||||
package com.hideyoshi.backendportfolio.util.validator.email.unique;
|
||||
|
||||
import javax.validation.Constraint;
|
||||
import javax.validation.Payload;
|
||||
import java.lang.annotation.Documented;
|
||||
import java.lang.annotation.Retention;
|
||||
import java.lang.annotation.Target;
|
||||
|
||||
import static java.lang.annotation.ElementType.*;
|
||||
import static java.lang.annotation.RetentionPolicy.RUNTIME;
|
||||
|
||||
@Target({TYPE, FIELD, ANNOTATION_TYPE})
|
||||
@Retention(RUNTIME)
|
||||
@Constraint(validatedBy = EmailUnique.class)
|
||||
@Documented
|
||||
public @interface UniqueEmail {
|
||||
|
||||
String message() default "Email taken, please choose another";
|
||||
|
||||
Class<?>[] groups() default {};
|
||||
|
||||
Class<? extends Payload>[] payload() default {};
|
||||
|
||||
}
|
||||
@@ -0,0 +1,32 @@
|
||||
package com.hideyoshi.backendportfolio.util.validator.email.valid;
|
||||
|
||||
import lombok.RequiredArgsConstructor;
|
||||
|
||||
import javax.validation.ConstraintValidator;
|
||||
import javax.validation.ConstraintValidatorContext;
|
||||
import java.util.regex.Matcher;
|
||||
import java.util.regex.Pattern;
|
||||
|
||||
@RequiredArgsConstructor
|
||||
public class EmailValidator implements ConstraintValidator<ValidEmail, String> {
|
||||
|
||||
private Pattern pattern;
|
||||
private Matcher matcher;
|
||||
private static final String EMAIL_PATTERN = "^[_A-Za-z\\d-+]+(.[_A-Za-z\\d-]+)*@+[A-Za-z\\d-]+(.[A-Za-z\\d]+)*(.[A-Za-z]{2,})$";
|
||||
|
||||
@Override
|
||||
public void initialize(ValidEmail constraintAnnotation) {
|
||||
}
|
||||
|
||||
@Override
|
||||
public boolean isValid(String email, ConstraintValidatorContext context){
|
||||
return (validateEmail(email));
|
||||
}
|
||||
|
||||
private boolean validateEmail(String email) {
|
||||
pattern = Pattern.compile(EMAIL_PATTERN);
|
||||
matcher = pattern.matcher(email);
|
||||
|
||||
return matcher.matches();
|
||||
}
|
||||
}
|
||||
@@ -0,0 +1,25 @@
|
||||
package com.hideyoshi.backendportfolio.util.validator.email.valid;
|
||||
|
||||
import com.hideyoshi.backendportfolio.util.validator.email.valid.EmailValidator;
|
||||
|
||||
import javax.validation.Constraint;
|
||||
import javax.validation.Payload;
|
||||
import java.lang.annotation.Documented;
|
||||
import java.lang.annotation.Retention;
|
||||
import java.lang.annotation.Target;
|
||||
|
||||
import static java.lang.annotation.ElementType.*;
|
||||
import static java.lang.annotation.RetentionPolicy.RUNTIME;
|
||||
|
||||
@Target({TYPE, FIELD, ANNOTATION_TYPE})
|
||||
@Retention(RUNTIME)
|
||||
@Constraint(validatedBy = EmailValidator.class)
|
||||
@Documented
|
||||
public @interface ValidEmail {
|
||||
|
||||
String message() default "Invalid email";
|
||||
|
||||
Class<?>[] groups() default {};
|
||||
|
||||
Class<? extends Payload>[] payload() default {};
|
||||
}
|
||||
@@ -0,0 +1,25 @@
|
||||
package com.hideyoshi.backendportfolio.util.validator.password;
|
||||
|
||||
import lombok.RequiredArgsConstructor;
|
||||
|
||||
import javax.validation.ConstraintValidator;
|
||||
import javax.validation.ConstraintValidatorContext;
|
||||
import java.util.regex.Pattern;
|
||||
|
||||
@RequiredArgsConstructor
|
||||
public class PasswordValidator implements ConstraintValidator<ValidPassword, String> {
|
||||
|
||||
private final String PASSWORD_PATTERN = "^(?=.*[a-z])(?=.*[A-Z])(?=.*\\d)(?=.*[@$!%*?&])[A-Za-z\\d@$!%*?&]{8,}$";
|
||||
|
||||
@Override
|
||||
public void initialize(ValidPassword constraintAnnotation) {}
|
||||
|
||||
@Override
|
||||
public boolean isValid(String password, ConstraintValidatorContext context) {
|
||||
|
||||
return Pattern.compile(PASSWORD_PATTERN)
|
||||
.matcher(password)
|
||||
.matches();
|
||||
|
||||
}
|
||||
}
|
||||
@@ -0,0 +1,23 @@
|
||||
package com.hideyoshi.backendportfolio.util.validator.password;
|
||||
|
||||
import javax.validation.Constraint;
|
||||
import javax.validation.Payload;
|
||||
import java.lang.annotation.Documented;
|
||||
import java.lang.annotation.Retention;
|
||||
import java.lang.annotation.Target;
|
||||
|
||||
import static java.lang.annotation.ElementType.*;
|
||||
import static java.lang.annotation.RetentionPolicy.RUNTIME;
|
||||
|
||||
@Target({TYPE, FIELD, ANNOTATION_TYPE})
|
||||
@Retention(RUNTIME)
|
||||
@Constraint(validatedBy = PasswordValidator.class)
|
||||
@Documented
|
||||
public @interface ValidPassword {
|
||||
|
||||
String message() default "Invalid password";
|
||||
|
||||
Class<?>[] groups() default {};
|
||||
|
||||
Class<? extends Payload>[] payload() default {};
|
||||
}
|
||||
42
src/main/resources/application.yml
Normal file
42
src/main/resources/application.yml
Normal file
@@ -0,0 +1,42 @@
|
||||
com:
|
||||
hideyoshi:
|
||||
frontEndPath: ${FRONTEND_PATH}}
|
||||
frontendConnectionType: ${FRONTEND_CONNECTION_TYPE}}
|
||||
tokenSecret: ${TOKEN_SECRET}
|
||||
accessTokenDuration: ${ACCESS_TOKEN_DURATION}
|
||||
refreshTokenDuration: ${REFRESH_TOKEN_DURATION}
|
||||
defaultUser:
|
||||
fullName: ${DEFAULT_USER_FULLNAME}
|
||||
email: ${DEFAULT_USER_EMAIL}
|
||||
username: ${DEFAULT_USER_USERNAME}
|
||||
password: ${DEFAULT_USER_PASSWORD}
|
||||
|
||||
|
||||
server:
|
||||
port: ${PORT}
|
||||
|
||||
spring:
|
||||
|
||||
datasource:
|
||||
url: jdbc:${DATABASE_URL}
|
||||
username: ${DATABASE_USERNAME}
|
||||
password: ${DATABASE_PASSWORD}
|
||||
|
||||
session:
|
||||
store:
|
||||
type: redis
|
||||
persistent: true
|
||||
|
||||
redis:
|
||||
host: ${REDIS_URL}
|
||||
port: ${REDIS_PORT}
|
||||
password: ${REDIS_PASSWORD}
|
||||
|
||||
jpa:
|
||||
open-in-view: false
|
||||
hibernate:
|
||||
ddl-auto: none
|
||||
properties:
|
||||
hibernate:
|
||||
dialect: org.hibernate.dialect.PostgreSQLDialect
|
||||
format_sql: true
|
||||
@@ -0,0 +1,11 @@
|
||||
databaseChangeLog:
|
||||
|
||||
- changeSet:
|
||||
id: db-table-model-client
|
||||
author: vitor.h.n.batista@gmail.com
|
||||
changes:
|
||||
- sqlFile:
|
||||
encoding: utf8
|
||||
path: sqls/db-table-model-client.sql
|
||||
relativeToChangelogFile: true
|
||||
dbms: postgresql
|
||||
@@ -0,0 +1,21 @@
|
||||
CREATE SCHEMA IF NOT EXISTS auth;
|
||||
|
||||
CREATE SEQUENCE IF NOT EXISTS auth.user_seq
|
||||
INCREMENT 1
|
||||
MINVALUE 1
|
||||
MAXVALUE 9223372036854775807
|
||||
START 1
|
||||
CACHE 1;
|
||||
|
||||
CREATE TABLE IF NOT EXISTS auth.user (
|
||||
id BIGINT NOT NULL DEFAULT NEXTVAL('auth.user_seq'),
|
||||
full_name VARCHAR(255) NOT NULL,
|
||||
email VARCHAR(255) NOT NULL,
|
||||
username VARCHAR(20) NOT NULL,
|
||||
password VARCHAR(100) NOT NULL,
|
||||
roles VARCHAR(50) NOT NULL DEFAULT 'ROLE_USER',
|
||||
|
||||
CONSTRAINT client_primary_key PRIMARY KEY (id),
|
||||
CONSTRAINT client_email_unique UNIQUE (email),
|
||||
CONSTRAINT client_username_unique UNIQUE (username)
|
||||
);
|
||||
6
src/main/resources/db/changelog/db.changelog-master.yaml
Normal file
6
src/main/resources/db/changelog/db.changelog-master.yaml
Normal file
@@ -0,0 +1,6 @@
|
||||
|
||||
|
||||
databaseChangeLog:
|
||||
|
||||
- include:
|
||||
file: db/changelog/client/db.changelog-client.yml
|
||||
@@ -0,0 +1,14 @@
|
||||
package com.hideyoshi.backendportfolio;
|
||||
|
||||
import org.junit.jupiter.api.Test;
|
||||
import org.springframework.boot.test.autoconfigure.orm.jpa.DataJpaTest;
|
||||
import org.springframework.boot.test.context.SpringBootTest;
|
||||
|
||||
@DataJpaTest
|
||||
class BackendPortfolioApplicationTests {
|
||||
|
||||
@Test
|
||||
void contextLoads() {
|
||||
}
|
||||
|
||||
}
|
||||
@@ -0,0 +1,70 @@
|
||||
package com.hideyoshi.backendportfolio.base.user.repo;
|
||||
|
||||
import com.hideyoshi.backendportfolio.base.user.entity.Role;
|
||||
import com.hideyoshi.backendportfolio.base.user.entity.User;
|
||||
import com.hideyoshi.backendportfolio.base.user.model.UserDTO;
|
||||
import lombok.extern.log4j.Log4j2;
|
||||
import org.junit.jupiter.api.Test;
|
||||
import org.springframework.beans.factory.annotation.Autowired;
|
||||
import org.springframework.boot.test.autoconfigure.orm.jpa.DataJpaTest;
|
||||
import org.springframework.boot.test.autoconfigure.orm.jpa.TestEntityManager;
|
||||
|
||||
import java.util.List;
|
||||
import java.util.Optional;
|
||||
|
||||
import static org.assertj.core.api.Assertions.assertThat;
|
||||
|
||||
@Log4j2
|
||||
@DataJpaTest
|
||||
class UserRepositoryTest {
|
||||
|
||||
@Autowired
|
||||
private TestEntityManager entityManager;
|
||||
|
||||
@Autowired
|
||||
private UserRepository underTest;
|
||||
|
||||
@Test
|
||||
void savesUserToDataBase() {
|
||||
// Given
|
||||
User user = this.createEntity();
|
||||
// When
|
||||
User userSaved = this.underTest.save(user);
|
||||
log.info(userSaved.getUsername());
|
||||
// Then
|
||||
assertThat(userSaved).isNotNull();
|
||||
assertThat(userSaved).isEqualTo(user);
|
||||
}
|
||||
|
||||
@Test
|
||||
void canFindsUserByUsername() {
|
||||
// Given
|
||||
User userSaved = this.entityManager.persist(this.createEntity());
|
||||
this.underTest.findAll();
|
||||
// When
|
||||
Optional<User> userOnDB =
|
||||
this.underTest.findByUsername(userSaved.getUsername());
|
||||
// Then
|
||||
assertThat(userOnDB).isNotEmpty();
|
||||
assertThat(userOnDB).hasValue(userSaved);
|
||||
}
|
||||
|
||||
@Test
|
||||
void cannotFindUserByUsername() {
|
||||
// When
|
||||
Optional<User> userOnDB = this.underTest.findByUsername("Batman");
|
||||
// Then
|
||||
assertThat(userOnDB).isEmpty();
|
||||
}
|
||||
|
||||
private User createEntity() {
|
||||
return new UserDTO(
|
||||
"Clark Kent",
|
||||
"superman@gmail.com",
|
||||
"Superman",
|
||||
"password",
|
||||
List.of(Role.USER)
|
||||
).toEntity();
|
||||
}
|
||||
|
||||
}
|
||||
@@ -0,0 +1,363 @@
|
||||
package com.hideyoshi.backendportfolio.base.user.service;
|
||||
|
||||
import com.hideyoshi.backendportfolio.base.security.service.AuthService;
|
||||
import com.hideyoshi.backendportfolio.base.user.entity.Role;
|
||||
import com.hideyoshi.backendportfolio.base.user.entity.User;
|
||||
import com.hideyoshi.backendportfolio.base.user.model.UserDTO;
|
||||
import com.hideyoshi.backendportfolio.base.user.repo.UserRepository;
|
||||
import com.hideyoshi.backendportfolio.util.exception.BadRequestException;
|
||||
import org.junit.jupiter.api.BeforeEach;
|
||||
import org.junit.jupiter.api.Test;
|
||||
import org.junit.jupiter.api.extension.ExtendWith;
|
||||
import org.mockito.*;
|
||||
import org.mockito.junit.jupiter.MockitoExtension;
|
||||
import org.springframework.boot.test.autoconfigure.orm.jpa.DataJpaTest;
|
||||
import org.springframework.security.core.userdetails.UserDetails;
|
||||
import org.springframework.security.crypto.bcrypt.BCryptPasswordEncoder;
|
||||
import org.springframework.security.crypto.password.PasswordEncoder;
|
||||
import org.springframework.test.annotation.DirtiesContext;
|
||||
|
||||
import java.util.List;
|
||||
import java.util.Objects;
|
||||
import java.util.Optional;
|
||||
|
||||
import static org.assertj.core.api.AssertionsForClassTypes.assertThat;
|
||||
import static org.junit.jupiter.api.Assertions.*;
|
||||
import static org.mockito.ArgumentMatchers.any;
|
||||
import static org.mockito.Mockito.verify;
|
||||
|
||||
@DataJpaTest
|
||||
@ExtendWith(MockitoExtension.class)
|
||||
@DirtiesContext(classMode= DirtiesContext.ClassMode.AFTER_EACH_TEST_METHOD)
|
||||
class UserServiceImplTest {
|
||||
|
||||
@InjectMocks
|
||||
private UserServiceImpl underTest;
|
||||
|
||||
@Mock
|
||||
private UserRepository userRepository;
|
||||
|
||||
private PasswordEncoder passwordEncoder;
|
||||
|
||||
private AuthService authService;
|
||||
|
||||
|
||||
@BeforeEach
|
||||
void setUp() {
|
||||
this.passwordEncoder = new BCryptPasswordEncoder();
|
||||
this.underTest = new UserServiceImpl(userRepository,passwordEncoder);
|
||||
}
|
||||
|
||||
@Test
|
||||
void canSaveUser() {
|
||||
|
||||
BDDMockito.when(userRepository.findByUsername(ArgumentMatchers.any(String.class)))
|
||||
.thenReturn(Optional.ofNullable(null));
|
||||
|
||||
BDDMockito.when(userRepository.save(ArgumentMatchers.any(User.class)))
|
||||
.thenReturn(createUser().toEntity());
|
||||
|
||||
// Given
|
||||
UserDTO user = this.createUser();
|
||||
// When
|
||||
UserDTO userSaved = this.underTest.saveUser(user);
|
||||
//Then
|
||||
ArgumentCaptor<User> userArgumentCaptor = ArgumentCaptor.forClass(User.class);
|
||||
|
||||
verify(userRepository).save(userArgumentCaptor.capture());
|
||||
assertThat(userArgumentCaptor.getValue()).isEqualTo(user.toEntity());
|
||||
assertThat(userSaved).isInstanceOf(UserDTO.class);
|
||||
}
|
||||
|
||||
@Test
|
||||
void cannotSaveUser() {
|
||||
|
||||
BDDMockito.when(userRepository.findByUsername(ArgumentMatchers.any(String.class)))
|
||||
.thenReturn(Optional.ofNullable(createUser().toEntity()));
|
||||
|
||||
|
||||
// Given
|
||||
UserDTO user = this.createUser();
|
||||
// When
|
||||
//Then
|
||||
assertThrows(
|
||||
BadRequestException.class,
|
||||
() -> {
|
||||
this.underTest.saveUser(user);
|
||||
},
|
||||
"Excepts a BadRequestException to be thrown."
|
||||
);
|
||||
}
|
||||
|
||||
@Test
|
||||
void canAlterUser() {
|
||||
BDDMockito.when(userRepository.findById(ArgumentMatchers.any(Long.class)))
|
||||
.thenReturn(Optional.ofNullable(createUser().toEntity()));
|
||||
|
||||
// Given
|
||||
UserDTO user = this.createUser();
|
||||
// When
|
||||
this.underTest.alterUser(1L, user);
|
||||
//Then
|
||||
ArgumentCaptor<User> userArgumentCaptor = ArgumentCaptor.forClass(User.class);
|
||||
|
||||
verify(userRepository).save(userArgumentCaptor.capture());
|
||||
assertThat(userArgumentCaptor.getValue()).isEqualTo(user.toEntity());
|
||||
}
|
||||
|
||||
@Test
|
||||
void cannotAlterUserDoesntExist() {
|
||||
BDDMockito.when(userRepository.findById(ArgumentMatchers.any(Long.class)))
|
||||
.thenReturn(Optional.ofNullable(null));
|
||||
|
||||
// Given
|
||||
UserDTO user = this.createUser();
|
||||
// When
|
||||
//Then
|
||||
assertThrows(
|
||||
BadRequestException.class,
|
||||
() -> {
|
||||
this.underTest.alterUser(1L, user);
|
||||
},
|
||||
"User doesn't exist."
|
||||
);
|
||||
}
|
||||
|
||||
@Test
|
||||
void canAddRoleToUser() {
|
||||
UserDTO user = this.createUser();
|
||||
|
||||
BDDMockito.when(userRepository.findById(ArgumentMatchers.any(Long.class)))
|
||||
.thenReturn(Optional.ofNullable(user.toEntity()));
|
||||
|
||||
BDDMockito.when(userRepository.findByUsername(ArgumentMatchers.any(String.class)))
|
||||
.thenReturn(Optional.ofNullable(createUser().toEntity()));
|
||||
|
||||
// Given
|
||||
UserDTO userSaved = this.underTest.getUser(user.getUsername());
|
||||
if (!Objects.nonNull(userSaved)) {
|
||||
userSaved = this.underTest.saveUser(user);
|
||||
}
|
||||
// When
|
||||
this.underTest.addRoleToUser(userSaved.getId(), Role.USER.getDescription());
|
||||
// Then
|
||||
userSaved = this.underTest.getUser(userSaved.getUsername());
|
||||
assertTrue(userSaved.getRoles().stream().anyMatch(e -> Role.USER.equals(e)));
|
||||
}
|
||||
|
||||
@Test
|
||||
void cannotAddRoleToUserDoesntExist() {
|
||||
|
||||
BDDMockito.when(userRepository.findById(ArgumentMatchers.any(Long.class)))
|
||||
.thenReturn(Optional.ofNullable(null));
|
||||
|
||||
// Given
|
||||
UserDTO user = this.createUser();
|
||||
// When
|
||||
// Then
|
||||
UserDTO finalUserSaved = user;
|
||||
assertThrows(
|
||||
BadRequestException.class,
|
||||
() -> {
|
||||
this.underTest.addRoleToUser(finalUserSaved.getId(), Role.USER.getDescription());
|
||||
},
|
||||
"User not found. Error while adding role."
|
||||
);
|
||||
}
|
||||
|
||||
@Test
|
||||
void cannotAddRoleToUserRoleDoesntExist() {
|
||||
UserDTO user = this.createUser();
|
||||
|
||||
BDDMockito.when(userRepository.findById(ArgumentMatchers.any(Long.class)))
|
||||
.thenReturn(Optional.ofNullable(user.toEntity()));
|
||||
|
||||
BDDMockito.when(userRepository.findByUsername(ArgumentMatchers.any(String.class)))
|
||||
.thenReturn(Optional.ofNullable(createUser().toEntity()));
|
||||
|
||||
// Given
|
||||
UserDTO userSaved = this.underTest.getUser(user.getUsername());
|
||||
if (!Objects.nonNull(userSaved)) {
|
||||
userSaved = this.underTest.saveUser(user);
|
||||
}
|
||||
// When
|
||||
// Then
|
||||
UserDTO finalUserSaved = userSaved;
|
||||
assertThrows(
|
||||
IllegalArgumentException.class,
|
||||
() -> {
|
||||
this.underTest.addRoleToUser(finalUserSaved.getId(), "BANANA");
|
||||
},
|
||||
"Argument not valid."
|
||||
);
|
||||
}
|
||||
|
||||
@Test
|
||||
void canRemoveRoleFromUser() {
|
||||
UserDTO user = this.createUser();
|
||||
|
||||
BDDMockito.when(userRepository.findByUsername(ArgumentMatchers.any(String.class)))
|
||||
.thenReturn(Optional.ofNullable(user.toEntity()));
|
||||
|
||||
BDDMockito.when(userRepository.findById(ArgumentMatchers.any(Long.class)))
|
||||
.thenReturn(Optional.ofNullable(user.toEntity()));
|
||||
|
||||
BDDMockito.when(userRepository.save(ArgumentMatchers.any(User.class)))
|
||||
.thenReturn(createUser().toEntity());
|
||||
|
||||
// Given
|
||||
UserDTO userSaved = this.underTest.getUser(user.getUsername());
|
||||
if (!Objects.nonNull(userSaved)) {
|
||||
userSaved = this.underTest.saveUser(user);
|
||||
}
|
||||
this.underTest.addRoleToUser(userSaved.getId(), Role.USER.getDescription());
|
||||
// When
|
||||
this.underTest.removeRoleFromUser(userSaved.getId(), Role.USER.getDescription());
|
||||
// Then
|
||||
ArgumentCaptor<User> userArgumentCaptor = ArgumentCaptor.forClass(User.class);
|
||||
|
||||
verify(userRepository).save(userArgumentCaptor.capture());
|
||||
|
||||
assertThat(userArgumentCaptor.getValue()).hasSameClassAs(user.toEntity());
|
||||
assertFalse(userArgumentCaptor.getValue().getRoles().stream().anyMatch(e -> Role.USER.equals(e)));
|
||||
}
|
||||
|
||||
@Test
|
||||
void cannotRemoveRoleFromUserDoesntExist() {
|
||||
UserDTO user = this.createUser();
|
||||
|
||||
BDDMockito.when(userRepository.findById(ArgumentMatchers.any(Long.class)))
|
||||
.thenReturn(Optional.ofNullable(user.toEntity()));
|
||||
|
||||
BDDMockito.when(userRepository.findByUsername(ArgumentMatchers.any(String.class)))
|
||||
.thenReturn(Optional.ofNullable(createUser().toEntity()));
|
||||
|
||||
// Given
|
||||
UserDTO userSaved = this.underTest.getUser(user.getUsername());
|
||||
if (!Objects.nonNull(userSaved)) {
|
||||
userSaved = this.underTest.saveUser(user);
|
||||
}
|
||||
this.underTest.addRoleToUser(userSaved.getId(), Role.USER.getDescription());
|
||||
// When
|
||||
// Then
|
||||
UserDTO finalUserSaved = userSaved;
|
||||
assertThrows(
|
||||
IllegalArgumentException.class,
|
||||
() -> {
|
||||
this.underTest.removeRoleFromUser(finalUserSaved.getId(), "BANANA");
|
||||
},
|
||||
"Argument not valid."
|
||||
);
|
||||
}
|
||||
|
||||
@Test
|
||||
void cannotRemoveRoleFromUserRoleDoesntExist() {
|
||||
// Given
|
||||
UserDTO user = this.createUser();
|
||||
// When
|
||||
// Then
|
||||
UserDTO finalUserSaved = user;
|
||||
assertThrows(
|
||||
BadRequestException.class,
|
||||
() -> {
|
||||
this.underTest.removeRoleFromUser(finalUserSaved.getId(), Role.USER.getDescription());
|
||||
},
|
||||
"User not found. Error while adding role."
|
||||
);
|
||||
}
|
||||
|
||||
@Test
|
||||
void canGetUser() {
|
||||
|
||||
BDDMockito.when(userRepository.findByUsername(ArgumentMatchers.any(String.class)))
|
||||
.thenReturn(Optional.ofNullable(createUser().toEntity()));
|
||||
|
||||
// Given
|
||||
UserDTO user = this.createUser();
|
||||
// When
|
||||
UserDTO userOnDB = this.underTest.getUser(user.getUsername());
|
||||
// Then
|
||||
ArgumentCaptor<String> usernameArgumentCaptor = ArgumentCaptor.forClass(String.class);
|
||||
verify(userRepository).findByUsername(usernameArgumentCaptor.capture());
|
||||
|
||||
assertThat(userOnDB).isNotNull();
|
||||
assertThat(userOnDB).isInstanceOf(UserDTO.class);
|
||||
assertThat(user.getUsername()).isEqualTo(usernameArgumentCaptor.getValue());
|
||||
}
|
||||
|
||||
@Test
|
||||
void cannotGetUser() {
|
||||
|
||||
BDDMockito.when(userRepository.findByUsername(ArgumentMatchers.any(String.class)))
|
||||
.thenReturn(Optional.ofNullable(null));
|
||||
|
||||
// Given
|
||||
UserDTO user = this.createUser();
|
||||
// When
|
||||
//Then
|
||||
assertThrows(
|
||||
BadRequestException.class,
|
||||
() -> {
|
||||
this.underTest.getUser(user.getUsername());
|
||||
},
|
||||
"Excepts a BadRequestException to be thrown."
|
||||
);
|
||||
}
|
||||
|
||||
@Test
|
||||
void canGetUsers() {
|
||||
List<UserDTO> users = this.underTest.getUsers();
|
||||
assertThat(users).isNotNull();
|
||||
}
|
||||
|
||||
@Test
|
||||
void canLoadUserByUsername() {
|
||||
|
||||
BDDMockito.when(userRepository.findByUsername(ArgumentMatchers.any(String.class)))
|
||||
.thenReturn(Optional.ofNullable(createUser().toEntity()));
|
||||
|
||||
// Given
|
||||
UserDTO user = this.createUser();
|
||||
// When
|
||||
UserDTO userOnDB = (UserDTO) this.underTest.loadUserByUsername(user.getUsername());
|
||||
// Then
|
||||
ArgumentCaptor<String> usernameArgumentCaptor = ArgumentCaptor.forClass(String.class);
|
||||
verify(userRepository).findByUsername(usernameArgumentCaptor.capture());
|
||||
|
||||
assertThat(userOnDB).isNotNull();
|
||||
assertThat(userOnDB).isInstanceOf(UserDetails.class);
|
||||
assertThat(user.getUsername()).isEqualTo(usernameArgumentCaptor.getValue());
|
||||
}
|
||||
|
||||
@Test
|
||||
void cannotLoadUserByUsername() {
|
||||
|
||||
BDDMockito.when(userRepository.findByUsername(ArgumentMatchers.any(String.class)))
|
||||
.thenReturn(Optional.ofNullable(null));
|
||||
|
||||
// Given
|
||||
UserDTO user = this.createUser();
|
||||
// When
|
||||
//Then
|
||||
assertThrows(
|
||||
BadRequestException.class,
|
||||
() -> {
|
||||
this.underTest.loadUserByUsername(user.getUsername());
|
||||
},
|
||||
"User Not Found. Please create an Account."
|
||||
);
|
||||
}
|
||||
|
||||
private UserDTO createUser() {
|
||||
UserDTO userCreated = new UserDTO(
|
||||
"Clark Kent",
|
||||
"superman@gmail.com",
|
||||
"Superman",
|
||||
"password",
|
||||
List.of(Role.USER)
|
||||
);
|
||||
userCreated.setId(1L);
|
||||
return userCreated;
|
||||
}
|
||||
|
||||
}
|
||||
35
src/test/resources/application.yml
Normal file
35
src/test/resources/application.yml
Normal file
@@ -0,0 +1,35 @@
|
||||
com:
|
||||
|
||||
hideyoshi:
|
||||
frontendPath: localhost:4200
|
||||
frontendConnectionType: unsecure
|
||||
tokenSecret: secret
|
||||
accessTokenDuration: 1800000
|
||||
refreshTokenDuration: 1314900000
|
||||
|
||||
defaultUser:
|
||||
fullName: "Vitor Hideyoshi"
|
||||
email: "vitor.h.n.batista@gmail.com"
|
||||
username: "YoshiUnfriendly"
|
||||
password: "passwd"
|
||||
|
||||
spring:
|
||||
|
||||
liquibase:
|
||||
enabled: false
|
||||
|
||||
datasource:
|
||||
jdbc:
|
||||
url: jdbc:h2:mem:testdb
|
||||
user: sa
|
||||
password: sa
|
||||
driver_class: org.h2.Driver
|
||||
|
||||
jpa:
|
||||
open-in-view: false
|
||||
hibernate:
|
||||
ddl-auto: update
|
||||
properties:
|
||||
hibernate:
|
||||
# dialect: org.hibernate.dialect.H2Dialect
|
||||
format_sql: true
|
||||
1
src/test/resources/schema.sql
Normal file
1
src/test/resources/schema.sql
Normal file
@@ -0,0 +1 @@
|
||||
CREATE SCHEMA IF NOT EXISTS auth;
|
||||
Reference in New Issue
Block a user