Initial commit
This commit is contained in:
26
.github/workflows/maven.yml
vendored
Normal file
26
.github/workflows/maven.yml
vendored
Normal file
@@ -0,0 +1,26 @@
|
|||||||
|
# This workflow will build a Java project with Maven, and cache/restore any dependencies to improve the workflow execution time
|
||||||
|
# For more information see: https://help.github.com/actions/language-and-framework-guides/building-and-testing-java-with-maven
|
||||||
|
|
||||||
|
name: Java CI with Maven
|
||||||
|
|
||||||
|
on:
|
||||||
|
push:
|
||||||
|
branches: [ "main" ]
|
||||||
|
pull_request:
|
||||||
|
branches: [ "main" ]
|
||||||
|
|
||||||
|
jobs:
|
||||||
|
build:
|
||||||
|
|
||||||
|
runs-on: ubuntu-latest
|
||||||
|
|
||||||
|
steps:
|
||||||
|
- uses: actions/checkout@v3
|
||||||
|
- name: Set up JDK 17
|
||||||
|
uses: actions/setup-java@v3
|
||||||
|
with:
|
||||||
|
java-version: '17'
|
||||||
|
distribution: 'temurin'
|
||||||
|
cache: maven
|
||||||
|
- name: Build with Maven
|
||||||
|
run: mvn -B package --file pom.xml
|
||||||
35
.gitignore
vendored
Normal file
35
.gitignore
vendored
Normal file
@@ -0,0 +1,35 @@
|
|||||||
|
HELP.md
|
||||||
|
target/
|
||||||
|
!.mvn/wrapper/maven-wrapper.jar
|
||||||
|
!**/src/main/**/target/
|
||||||
|
!**/src/test/**/target/
|
||||||
|
|
||||||
|
### STS ###
|
||||||
|
.apt_generated
|
||||||
|
.classpath
|
||||||
|
.factorypath
|
||||||
|
.project
|
||||||
|
.settings
|
||||||
|
.springBeans
|
||||||
|
.sts4-cache
|
||||||
|
|
||||||
|
### IntelliJ IDEA ###
|
||||||
|
.idea
|
||||||
|
*.iws
|
||||||
|
*.iml
|
||||||
|
*.ipr
|
||||||
|
|
||||||
|
### NetBeans ###
|
||||||
|
/nbproject/private/
|
||||||
|
/nbbuild/
|
||||||
|
/dist/
|
||||||
|
/nbdist/
|
||||||
|
/.nb-gradle/
|
||||||
|
build/
|
||||||
|
!**/src/main/**/build/
|
||||||
|
!**/src/test/**/build/
|
||||||
|
|
||||||
|
### VS Code ###
|
||||||
|
.vscode/
|
||||||
|
|
||||||
|
src/main/resources/application-devel.yml
|
||||||
BIN
.mvn/wrapper/maven-wrapper.jar
vendored
Normal file
BIN
.mvn/wrapper/maven-wrapper.jar
vendored
Normal file
Binary file not shown.
2
.mvn/wrapper/maven-wrapper.properties
vendored
Normal file
2
.mvn/wrapper/maven-wrapper.properties
vendored
Normal file
@@ -0,0 +1,2 @@
|
|||||||
|
distributionUrl=https://repo.maven.apache.org/maven2/org/apache/maven/apache-maven/3.8.5/apache-maven-3.8.5-bin.zip
|
||||||
|
wrapperUrl=https://repo.maven.apache.org/maven2/org/apache/maven/wrapper/maven-wrapper/3.1.0/maven-wrapper-3.1.0.jar
|
||||||
16
Dockerfile
Normal file
16
Dockerfile
Normal file
@@ -0,0 +1,16 @@
|
|||||||
|
#
|
||||||
|
# Build stage
|
||||||
|
#
|
||||||
|
FROM maven:3.8-jdk-11 AS build
|
||||||
|
COPY src /home/app/src
|
||||||
|
COPY pom.xml /home/app
|
||||||
|
RUN mvn -Dmaven.test.skip -f /home/app/pom.xml clean package
|
||||||
|
|
||||||
|
#
|
||||||
|
# Package stage
|
||||||
|
#
|
||||||
|
FROM openjdk:17-jdk
|
||||||
|
|
||||||
|
COPY --from=build /home/app/target/*.jar app.jar
|
||||||
|
COPY src/main/resources/* credentials/
|
||||||
|
ENTRYPOINT ["java","-jar","/app.jar"]
|
||||||
21
LICENSE
Normal file
21
LICENSE
Normal file
@@ -0,0 +1,21 @@
|
|||||||
|
MIT License
|
||||||
|
|
||||||
|
Copyright (c) 2022 Vitor Hideyoshi Nakazone Batista
|
||||||
|
|
||||||
|
Permission is hereby granted, free of charge, to any person obtaining a copy
|
||||||
|
of this software and associated documentation files (the "Software"), to deal
|
||||||
|
in the Software without restriction, including without limitation the rights
|
||||||
|
to use, copy, modify, merge, publish, distribute, sublicense, and/or sell
|
||||||
|
copies of the Software, and to permit persons to whom the Software is
|
||||||
|
furnished to do so, subject to the following conditions:
|
||||||
|
|
||||||
|
The above copyright notice and this permission notice shall be included in all
|
||||||
|
copies or substantial portions of the Software.
|
||||||
|
|
||||||
|
THE SOFTWARE IS PROVIDED "AS IS", WITHOUT WARRANTY OF ANY KIND, EXPRESS OR
|
||||||
|
IMPLIED, INCLUDING BUT NOT LIMITED TO THE WARRANTIES OF MERCHANTABILITY,
|
||||||
|
FITNESS FOR A PARTICULAR PURPOSE AND NONINFRINGEMENT. IN NO EVENT SHALL THE
|
||||||
|
AUTHORS OR COPYRIGHT HOLDERS BE LIABLE FOR ANY CLAIM, DAMAGES OR OTHER
|
||||||
|
LIABILITY, WHETHER IN AN ACTION OF CONTRACT, TORT OR OTHERWISE, ARISING FROM,
|
||||||
|
OUT OF OR IN CONNECTION WITH THE SOFTWARE OR THE USE OR OTHER DEALINGS IN THE
|
||||||
|
SOFTWARE.
|
||||||
316
mvnw
vendored
Executable file
316
mvnw
vendored
Executable file
@@ -0,0 +1,316 @@
|
|||||||
|
#!/bin/sh
|
||||||
|
# ----------------------------------------------------------------------------
|
||||||
|
# Licensed to the Apache Software Foundation (ASF) under one
|
||||||
|
# or more contributor license agreements. See the NOTICE file
|
||||||
|
# distributed with this work for additional information
|
||||||
|
# regarding copyright ownership. The ASF licenses this file
|
||||||
|
# to you under the Apache License, Version 2.0 (the
|
||||||
|
# "License"); you may not use this file except in compliance
|
||||||
|
# with the License. You may obtain a copy of the License at
|
||||||
|
#
|
||||||
|
# https://www.apache.org/licenses/LICENSE-2.0
|
||||||
|
#
|
||||||
|
# Unless required by applicable law or agreed to in writing,
|
||||||
|
# software distributed under the License is distributed on an
|
||||||
|
# "AS IS" BASIS, WITHOUT WARRANTIES OR CONDITIONS OF ANY
|
||||||
|
# KIND, either express or implied. See the License for the
|
||||||
|
# specific language governing permissions and limitations
|
||||||
|
# under the License.
|
||||||
|
# ----------------------------------------------------------------------------
|
||||||
|
|
||||||
|
# ----------------------------------------------------------------------------
|
||||||
|
# Maven Start Up Batch script
|
||||||
|
#
|
||||||
|
# Required ENV vars:
|
||||||
|
# ------------------
|
||||||
|
# JAVA_HOME - location of a JDK home dir
|
||||||
|
#
|
||||||
|
# Optional ENV vars
|
||||||
|
# -----------------
|
||||||
|
# M2_HOME - location of maven2's installed home dir
|
||||||
|
# MAVEN_OPTS - parameters passed to the Java VM when running Maven
|
||||||
|
# e.g. to debug Maven itself, use
|
||||||
|
# set MAVEN_OPTS=-Xdebug -Xrunjdwp:transport=dt_socket,server=y,suspend=y,address=8000
|
||||||
|
# MAVEN_SKIP_RC - flag to disable loading of mavenrc files
|
||||||
|
# ----------------------------------------------------------------------------
|
||||||
|
|
||||||
|
if [ -z "$MAVEN_SKIP_RC" ] ; then
|
||||||
|
|
||||||
|
if [ -f /usr/local/etc/mavenrc ] ; then
|
||||||
|
. /usr/local/etc/mavenrc
|
||||||
|
fi
|
||||||
|
|
||||||
|
if [ -f /etc/mavenrc ] ; then
|
||||||
|
. /etc/mavenrc
|
||||||
|
fi
|
||||||
|
|
||||||
|
if [ -f "$HOME/.mavenrc" ] ; then
|
||||||
|
. "$HOME/.mavenrc"
|
||||||
|
fi
|
||||||
|
|
||||||
|
fi
|
||||||
|
|
||||||
|
# OS specific support. $var _must_ be set to either true or false.
|
||||||
|
cygwin=false;
|
||||||
|
darwin=false;
|
||||||
|
mingw=false
|
||||||
|
case "`uname`" in
|
||||||
|
CYGWIN*) cygwin=true ;;
|
||||||
|
MINGW*) mingw=true;;
|
||||||
|
Darwin*) darwin=true
|
||||||
|
# Use /usr/libexec/java_home if available, otherwise fall back to /Library/Java/Home
|
||||||
|
# See https://developer.apple.com/library/mac/qa/qa1170/_index.html
|
||||||
|
if [ -z "$JAVA_HOME" ]; then
|
||||||
|
if [ -x "/usr/libexec/java_home" ]; then
|
||||||
|
export JAVA_HOME="`/usr/libexec/java_home`"
|
||||||
|
else
|
||||||
|
export JAVA_HOME="/Library/Java/Home"
|
||||||
|
fi
|
||||||
|
fi
|
||||||
|
;;
|
||||||
|
esac
|
||||||
|
|
||||||
|
if [ -z "$JAVA_HOME" ] ; then
|
||||||
|
if [ -r /etc/gentoo-release ] ; then
|
||||||
|
JAVA_HOME=`java-config --jre-home`
|
||||||
|
fi
|
||||||
|
fi
|
||||||
|
|
||||||
|
if [ -z "$M2_HOME" ] ; then
|
||||||
|
## resolve links - $0 may be a link to maven's home
|
||||||
|
PRG="$0"
|
||||||
|
|
||||||
|
# need this for relative symlinks
|
||||||
|
while [ -h "$PRG" ] ; do
|
||||||
|
ls=`ls -ld "$PRG"`
|
||||||
|
link=`expr "$ls" : '.*-> \(.*\)$'`
|
||||||
|
if expr "$link" : '/.*' > /dev/null; then
|
||||||
|
PRG="$link"
|
||||||
|
else
|
||||||
|
PRG="`dirname "$PRG"`/$link"
|
||||||
|
fi
|
||||||
|
done
|
||||||
|
|
||||||
|
saveddir=`pwd`
|
||||||
|
|
||||||
|
M2_HOME=`dirname "$PRG"`/..
|
||||||
|
|
||||||
|
# make it fully qualified
|
||||||
|
M2_HOME=`cd "$M2_HOME" && pwd`
|
||||||
|
|
||||||
|
cd "$saveddir"
|
||||||
|
# echo Using m2 at $M2_HOME
|
||||||
|
fi
|
||||||
|
|
||||||
|
# For Cygwin, ensure paths are in UNIX format before anything is touched
|
||||||
|
if $cygwin ; then
|
||||||
|
[ -n "$M2_HOME" ] &&
|
||||||
|
M2_HOME=`cygpath --unix "$M2_HOME"`
|
||||||
|
[ -n "$JAVA_HOME" ] &&
|
||||||
|
JAVA_HOME=`cygpath --unix "$JAVA_HOME"`
|
||||||
|
[ -n "$CLASSPATH" ] &&
|
||||||
|
CLASSPATH=`cygpath --path --unix "$CLASSPATH"`
|
||||||
|
fi
|
||||||
|
|
||||||
|
# For Mingw, ensure paths are in UNIX format before anything is touched
|
||||||
|
if $mingw ; then
|
||||||
|
[ -n "$M2_HOME" ] &&
|
||||||
|
M2_HOME="`(cd "$M2_HOME"; pwd)`"
|
||||||
|
[ -n "$JAVA_HOME" ] &&
|
||||||
|
JAVA_HOME="`(cd "$JAVA_HOME"; pwd)`"
|
||||||
|
fi
|
||||||
|
|
||||||
|
if [ -z "$JAVA_HOME" ]; then
|
||||||
|
javaExecutable="`which javac`"
|
||||||
|
if [ -n "$javaExecutable" ] && ! [ "`expr \"$javaExecutable\" : '\([^ ]*\)'`" = "no" ]; then
|
||||||
|
# readlink(1) is not available as standard on Solaris 10.
|
||||||
|
readLink=`which readlink`
|
||||||
|
if [ ! `expr "$readLink" : '\([^ ]*\)'` = "no" ]; then
|
||||||
|
if $darwin ; then
|
||||||
|
javaHome="`dirname \"$javaExecutable\"`"
|
||||||
|
javaExecutable="`cd \"$javaHome\" && pwd -P`/javac"
|
||||||
|
else
|
||||||
|
javaExecutable="`readlink -f \"$javaExecutable\"`"
|
||||||
|
fi
|
||||||
|
javaHome="`dirname \"$javaExecutable\"`"
|
||||||
|
javaHome=`expr "$javaHome" : '\(.*\)/bin'`
|
||||||
|
JAVA_HOME="$javaHome"
|
||||||
|
export JAVA_HOME
|
||||||
|
fi
|
||||||
|
fi
|
||||||
|
fi
|
||||||
|
|
||||||
|
if [ -z "$JAVACMD" ] ; then
|
||||||
|
if [ -n "$JAVA_HOME" ] ; then
|
||||||
|
if [ -x "$JAVA_HOME/jre/sh/java" ] ; then
|
||||||
|
# IBM's JDK on AIX uses strange locations for the executables
|
||||||
|
JAVACMD="$JAVA_HOME/jre/sh/java"
|
||||||
|
else
|
||||||
|
JAVACMD="$JAVA_HOME/bin/java"
|
||||||
|
fi
|
||||||
|
else
|
||||||
|
JAVACMD="`\\unset -f command; \\command -v java`"
|
||||||
|
fi
|
||||||
|
fi
|
||||||
|
|
||||||
|
if [ ! -x "$JAVACMD" ] ; then
|
||||||
|
echo "Error: JAVA_HOME is not defined correctly." >&2
|
||||||
|
echo " We cannot execute $JAVACMD" >&2
|
||||||
|
exit 1
|
||||||
|
fi
|
||||||
|
|
||||||
|
if [ -z "$JAVA_HOME" ] ; then
|
||||||
|
echo "Warning: JAVA_HOME environment variable is not set."
|
||||||
|
fi
|
||||||
|
|
||||||
|
CLASSWORLDS_LAUNCHER=org.codehaus.plexus.classworlds.launcher.Launcher
|
||||||
|
|
||||||
|
# traverses directory structure from process work directory to filesystem root
|
||||||
|
# first directory with .mvn subdirectory is considered project base directory
|
||||||
|
find_maven_basedir() {
|
||||||
|
|
||||||
|
if [ -z "$1" ]
|
||||||
|
then
|
||||||
|
echo "Path not specified to find_maven_basedir"
|
||||||
|
return 1
|
||||||
|
fi
|
||||||
|
|
||||||
|
basedir="$1"
|
||||||
|
wdir="$1"
|
||||||
|
while [ "$wdir" != '/' ] ; do
|
||||||
|
if [ -d "$wdir"/.mvn ] ; then
|
||||||
|
basedir=$wdir
|
||||||
|
break
|
||||||
|
fi
|
||||||
|
# workaround for JBEAP-8937 (on Solaris 10/Sparc)
|
||||||
|
if [ -d "${wdir}" ]; then
|
||||||
|
wdir=`cd "$wdir/.."; pwd`
|
||||||
|
fi
|
||||||
|
# end of workaround
|
||||||
|
done
|
||||||
|
echo "${basedir}"
|
||||||
|
}
|
||||||
|
|
||||||
|
# concatenates all lines of a file
|
||||||
|
concat_lines() {
|
||||||
|
if [ -f "$1" ]; then
|
||||||
|
echo "$(tr -s '\n' ' ' < "$1")"
|
||||||
|
fi
|
||||||
|
}
|
||||||
|
|
||||||
|
BASE_DIR=`find_maven_basedir "$(pwd)"`
|
||||||
|
if [ -z "$BASE_DIR" ]; then
|
||||||
|
exit 1;
|
||||||
|
fi
|
||||||
|
|
||||||
|
##########################################################################################
|
||||||
|
# Extension to allow automatically downloading the maven-wrapper.jar from Maven-central
|
||||||
|
# This allows using the maven wrapper in projects that prohibit checking in binary data.
|
||||||
|
##########################################################################################
|
||||||
|
if [ -r "$BASE_DIR/.mvn/wrapper/maven-wrapper.jar" ]; then
|
||||||
|
if [ "$MVNW_VERBOSE" = true ]; then
|
||||||
|
echo "Found .mvn/wrapper/maven-wrapper.jar"
|
||||||
|
fi
|
||||||
|
else
|
||||||
|
if [ "$MVNW_VERBOSE" = true ]; then
|
||||||
|
echo "Couldn't find .mvn/wrapper/maven-wrapper.jar, downloading it ..."
|
||||||
|
fi
|
||||||
|
if [ -n "$MVNW_REPOURL" ]; then
|
||||||
|
jarUrl="$MVNW_REPOURL/org/apache/maven/wrapper/maven-wrapper/3.1.0/maven-wrapper-3.1.0.jar"
|
||||||
|
else
|
||||||
|
jarUrl="https://repo.maven.apache.org/maven2/org/apache/maven/wrapper/maven-wrapper/3.1.0/maven-wrapper-3.1.0.jar"
|
||||||
|
fi
|
||||||
|
while IFS="=" read key value; do
|
||||||
|
case "$key" in (wrapperUrl) jarUrl="$value"; break ;;
|
||||||
|
esac
|
||||||
|
done < "$BASE_DIR/.mvn/wrapper/maven-wrapper.properties"
|
||||||
|
if [ "$MVNW_VERBOSE" = true ]; then
|
||||||
|
echo "Downloading from: $jarUrl"
|
||||||
|
fi
|
||||||
|
wrapperJarPath="$BASE_DIR/.mvn/wrapper/maven-wrapper.jar"
|
||||||
|
if $cygwin; then
|
||||||
|
wrapperJarPath=`cygpath --path --windows "$wrapperJarPath"`
|
||||||
|
fi
|
||||||
|
|
||||||
|
if command -v wget > /dev/null; then
|
||||||
|
if [ "$MVNW_VERBOSE" = true ]; then
|
||||||
|
echo "Found wget ... using wget"
|
||||||
|
fi
|
||||||
|
if [ -z "$MVNW_USERNAME" ] || [ -z "$MVNW_PASSWORD" ]; then
|
||||||
|
wget "$jarUrl" -O "$wrapperJarPath" || rm -f "$wrapperJarPath"
|
||||||
|
else
|
||||||
|
wget --http-user=$MVNW_USERNAME --http-password=$MVNW_PASSWORD "$jarUrl" -O "$wrapperJarPath" || rm -f "$wrapperJarPath"
|
||||||
|
fi
|
||||||
|
elif command -v curl > /dev/null; then
|
||||||
|
if [ "$MVNW_VERBOSE" = true ]; then
|
||||||
|
echo "Found curl ... using curl"
|
||||||
|
fi
|
||||||
|
if [ -z "$MVNW_USERNAME" ] || [ -z "$MVNW_PASSWORD" ]; then
|
||||||
|
curl -o "$wrapperJarPath" "$jarUrl" -f
|
||||||
|
else
|
||||||
|
curl --user $MVNW_USERNAME:$MVNW_PASSWORD -o "$wrapperJarPath" "$jarUrl" -f
|
||||||
|
fi
|
||||||
|
|
||||||
|
else
|
||||||
|
if [ "$MVNW_VERBOSE" = true ]; then
|
||||||
|
echo "Falling back to using Java to download"
|
||||||
|
fi
|
||||||
|
javaClass="$BASE_DIR/.mvn/wrapper/MavenWrapperDownloader.java"
|
||||||
|
# For Cygwin, switch paths to Windows format before running javac
|
||||||
|
if $cygwin; then
|
||||||
|
javaClass=`cygpath --path --windows "$javaClass"`
|
||||||
|
fi
|
||||||
|
if [ -e "$javaClass" ]; then
|
||||||
|
if [ ! -e "$BASE_DIR/.mvn/wrapper/MavenWrapperDownloader.class" ]; then
|
||||||
|
if [ "$MVNW_VERBOSE" = true ]; then
|
||||||
|
echo " - Compiling MavenWrapperDownloader.java ..."
|
||||||
|
fi
|
||||||
|
# Compiling the Java class
|
||||||
|
("$JAVA_HOME/bin/javac" "$javaClass")
|
||||||
|
fi
|
||||||
|
if [ -e "$BASE_DIR/.mvn/wrapper/MavenWrapperDownloader.class" ]; then
|
||||||
|
# Running the downloader
|
||||||
|
if [ "$MVNW_VERBOSE" = true ]; then
|
||||||
|
echo " - Running MavenWrapperDownloader.java ..."
|
||||||
|
fi
|
||||||
|
("$JAVA_HOME/bin/java" -cp .mvn/wrapper MavenWrapperDownloader "$MAVEN_PROJECTBASEDIR")
|
||||||
|
fi
|
||||||
|
fi
|
||||||
|
fi
|
||||||
|
fi
|
||||||
|
##########################################################################################
|
||||||
|
# End of extension
|
||||||
|
##########################################################################################
|
||||||
|
|
||||||
|
export MAVEN_PROJECTBASEDIR=${MAVEN_BASEDIR:-"$BASE_DIR"}
|
||||||
|
if [ "$MVNW_VERBOSE" = true ]; then
|
||||||
|
echo $MAVEN_PROJECTBASEDIR
|
||||||
|
fi
|
||||||
|
MAVEN_OPTS="$(concat_lines "$MAVEN_PROJECTBASEDIR/.mvn/jvm.config") $MAVEN_OPTS"
|
||||||
|
|
||||||
|
# For Cygwin, switch paths to Windows format before running java
|
||||||
|
if $cygwin; then
|
||||||
|
[ -n "$M2_HOME" ] &&
|
||||||
|
M2_HOME=`cygpath --path --windows "$M2_HOME"`
|
||||||
|
[ -n "$JAVA_HOME" ] &&
|
||||||
|
JAVA_HOME=`cygpath --path --windows "$JAVA_HOME"`
|
||||||
|
[ -n "$CLASSPATH" ] &&
|
||||||
|
CLASSPATH=`cygpath --path --windows "$CLASSPATH"`
|
||||||
|
[ -n "$MAVEN_PROJECTBASEDIR" ] &&
|
||||||
|
MAVEN_PROJECTBASEDIR=`cygpath --path --windows "$MAVEN_PROJECTBASEDIR"`
|
||||||
|
fi
|
||||||
|
|
||||||
|
# Provide a "standardized" way to retrieve the CLI args that will
|
||||||
|
# work with both Windows and non-Windows executions.
|
||||||
|
MAVEN_CMD_LINE_ARGS="$MAVEN_CONFIG $@"
|
||||||
|
export MAVEN_CMD_LINE_ARGS
|
||||||
|
|
||||||
|
WRAPPER_LAUNCHER=org.apache.maven.wrapper.MavenWrapperMain
|
||||||
|
|
||||||
|
exec "$JAVACMD" \
|
||||||
|
$MAVEN_OPTS \
|
||||||
|
$MAVEN_DEBUG_OPTS \
|
||||||
|
-classpath "$MAVEN_PROJECTBASEDIR/.mvn/wrapper/maven-wrapper.jar" \
|
||||||
|
"-Dmaven.home=${M2_HOME}" \
|
||||||
|
"-Dmaven.multiModuleProjectDirectory=${MAVEN_PROJECTBASEDIR}" \
|
||||||
|
${WRAPPER_LAUNCHER} $MAVEN_CONFIG "$@"
|
||||||
188
mvnw.cmd
vendored
Normal file
188
mvnw.cmd
vendored
Normal file
@@ -0,0 +1,188 @@
|
|||||||
|
@REM ----------------------------------------------------------------------------
|
||||||
|
@REM Licensed to the Apache Software Foundation (ASF) under one
|
||||||
|
@REM or more contributor license agreements. See the NOTICE file
|
||||||
|
@REM distributed with this work for additional information
|
||||||
|
@REM regarding copyright ownership. The ASF licenses this file
|
||||||
|
@REM to you under the Apache License, Version 2.0 (the
|
||||||
|
@REM "License"); you may not use this file except in compliance
|
||||||
|
@REM with the License. You may obtain a copy of the License at
|
||||||
|
@REM
|
||||||
|
@REM https://www.apache.org/licenses/LICENSE-2.0
|
||||||
|
@REM
|
||||||
|
@REM Unless required by applicable law or agreed to in writing,
|
||||||
|
@REM software distributed under the License is distributed on an
|
||||||
|
@REM "AS IS" BASIS, WITHOUT WARRANTIES OR CONDITIONS OF ANY
|
||||||
|
@REM KIND, either express or implied. See the License for the
|
||||||
|
@REM specific language governing permissions and limitations
|
||||||
|
@REM under the License.
|
||||||
|
@REM ----------------------------------------------------------------------------
|
||||||
|
|
||||||
|
@REM ----------------------------------------------------------------------------
|
||||||
|
@REM Maven Start Up Batch script
|
||||||
|
@REM
|
||||||
|
@REM Required ENV vars:
|
||||||
|
@REM JAVA_HOME - location of a JDK home dir
|
||||||
|
@REM
|
||||||
|
@REM Optional ENV vars
|
||||||
|
@REM M2_HOME - location of maven2's installed home dir
|
||||||
|
@REM MAVEN_BATCH_ECHO - set to 'on' to enable the echoing of the batch commands
|
||||||
|
@REM MAVEN_BATCH_PAUSE - set to 'on' to wait for a keystroke before ending
|
||||||
|
@REM MAVEN_OPTS - parameters passed to the Java VM when running Maven
|
||||||
|
@REM e.g. to debug Maven itself, use
|
||||||
|
@REM set MAVEN_OPTS=-Xdebug -Xrunjdwp:transport=dt_socket,server=y,suspend=y,address=8000
|
||||||
|
@REM MAVEN_SKIP_RC - flag to disable loading of mavenrc files
|
||||||
|
@REM ----------------------------------------------------------------------------
|
||||||
|
|
||||||
|
@REM Begin all REM lines with '@' in case MAVEN_BATCH_ECHO is 'on'
|
||||||
|
@echo off
|
||||||
|
@REM set title of command window
|
||||||
|
title %0
|
||||||
|
@REM enable echoing by setting MAVEN_BATCH_ECHO to 'on'
|
||||||
|
@if "%MAVEN_BATCH_ECHO%" == "on" echo %MAVEN_BATCH_ECHO%
|
||||||
|
|
||||||
|
@REM set %HOME% to equivalent of $HOME
|
||||||
|
if "%HOME%" == "" (set "HOME=%HOMEDRIVE%%HOMEPATH%")
|
||||||
|
|
||||||
|
@REM Execute a user defined script before this one
|
||||||
|
if not "%MAVEN_SKIP_RC%" == "" goto skipRcPre
|
||||||
|
@REM check for pre script, once with legacy .bat ending and once with .cmd ending
|
||||||
|
if exist "%USERPROFILE%\mavenrc_pre.bat" call "%USERPROFILE%\mavenrc_pre.bat" %*
|
||||||
|
if exist "%USERPROFILE%\mavenrc_pre.cmd" call "%USERPROFILE%\mavenrc_pre.cmd" %*
|
||||||
|
:skipRcPre
|
||||||
|
|
||||||
|
@setlocal
|
||||||
|
|
||||||
|
set ERROR_CODE=0
|
||||||
|
|
||||||
|
@REM To isolate internal variables from possible post scripts, we use another setlocal
|
||||||
|
@setlocal
|
||||||
|
|
||||||
|
@REM ==== START VALIDATION ====
|
||||||
|
if not "%JAVA_HOME%" == "" goto OkJHome
|
||||||
|
|
||||||
|
echo.
|
||||||
|
echo Error: JAVA_HOME not found in your environment. >&2
|
||||||
|
echo Please set the JAVA_HOME variable in your environment to match the >&2
|
||||||
|
echo location of your Java installation. >&2
|
||||||
|
echo.
|
||||||
|
goto error
|
||||||
|
|
||||||
|
:OkJHome
|
||||||
|
if exist "%JAVA_HOME%\bin\java.exe" goto init
|
||||||
|
|
||||||
|
echo.
|
||||||
|
echo Error: JAVA_HOME is set to an invalid directory. >&2
|
||||||
|
echo JAVA_HOME = "%JAVA_HOME%" >&2
|
||||||
|
echo Please set the JAVA_HOME variable in your environment to match the >&2
|
||||||
|
echo location of your Java installation. >&2
|
||||||
|
echo.
|
||||||
|
goto error
|
||||||
|
|
||||||
|
@REM ==== END VALIDATION ====
|
||||||
|
|
||||||
|
:init
|
||||||
|
|
||||||
|
@REM Find the project base dir, i.e. the directory that contains the folder ".mvn".
|
||||||
|
@REM Fallback to current working directory if not found.
|
||||||
|
|
||||||
|
set MAVEN_PROJECTBASEDIR=%MAVEN_BASEDIR%
|
||||||
|
IF NOT "%MAVEN_PROJECTBASEDIR%"=="" goto endDetectBaseDir
|
||||||
|
|
||||||
|
set EXEC_DIR=%CD%
|
||||||
|
set WDIR=%EXEC_DIR%
|
||||||
|
:findBaseDir
|
||||||
|
IF EXIST "%WDIR%"\.mvn goto baseDirFound
|
||||||
|
cd ..
|
||||||
|
IF "%WDIR%"=="%CD%" goto baseDirNotFound
|
||||||
|
set WDIR=%CD%
|
||||||
|
goto findBaseDir
|
||||||
|
|
||||||
|
:baseDirFound
|
||||||
|
set MAVEN_PROJECTBASEDIR=%WDIR%
|
||||||
|
cd "%EXEC_DIR%"
|
||||||
|
goto endDetectBaseDir
|
||||||
|
|
||||||
|
:baseDirNotFound
|
||||||
|
set MAVEN_PROJECTBASEDIR=%EXEC_DIR%
|
||||||
|
cd "%EXEC_DIR%"
|
||||||
|
|
||||||
|
:endDetectBaseDir
|
||||||
|
|
||||||
|
IF NOT EXIST "%MAVEN_PROJECTBASEDIR%\.mvn\jvm.config" goto endReadAdditionalConfig
|
||||||
|
|
||||||
|
@setlocal EnableExtensions EnableDelayedExpansion
|
||||||
|
for /F "usebackq delims=" %%a in ("%MAVEN_PROJECTBASEDIR%\.mvn\jvm.config") do set JVM_CONFIG_MAVEN_PROPS=!JVM_CONFIG_MAVEN_PROPS! %%a
|
||||||
|
@endlocal & set JVM_CONFIG_MAVEN_PROPS=%JVM_CONFIG_MAVEN_PROPS%
|
||||||
|
|
||||||
|
:endReadAdditionalConfig
|
||||||
|
|
||||||
|
SET MAVEN_JAVA_EXE="%JAVA_HOME%\bin\java.exe"
|
||||||
|
set WRAPPER_JAR="%MAVEN_PROJECTBASEDIR%\.mvn\wrapper\maven-wrapper.jar"
|
||||||
|
set WRAPPER_LAUNCHER=org.apache.maven.wrapper.MavenWrapperMain
|
||||||
|
|
||||||
|
set DOWNLOAD_URL="https://repo.maven.apache.org/maven2/org/apache/maven/wrapper/maven-wrapper/3.1.0/maven-wrapper-3.1.0.jar"
|
||||||
|
|
||||||
|
FOR /F "usebackq tokens=1,2 delims==" %%A IN ("%MAVEN_PROJECTBASEDIR%\.mvn\wrapper\maven-wrapper.properties") DO (
|
||||||
|
IF "%%A"=="wrapperUrl" SET DOWNLOAD_URL=%%B
|
||||||
|
)
|
||||||
|
|
||||||
|
@REM Extension to allow automatically downloading the maven-wrapper.jar from Maven-central
|
||||||
|
@REM This allows using the maven wrapper in projects that prohibit checking in binary data.
|
||||||
|
if exist %WRAPPER_JAR% (
|
||||||
|
if "%MVNW_VERBOSE%" == "true" (
|
||||||
|
echo Found %WRAPPER_JAR%
|
||||||
|
)
|
||||||
|
) else (
|
||||||
|
if not "%MVNW_REPOURL%" == "" (
|
||||||
|
SET DOWNLOAD_URL="%MVNW_REPOURL%/org/apache/maven/wrapper/maven-wrapper/3.1.0/maven-wrapper-3.1.0.jar"
|
||||||
|
)
|
||||||
|
if "%MVNW_VERBOSE%" == "true" (
|
||||||
|
echo Couldn't find %WRAPPER_JAR%, downloading it ...
|
||||||
|
echo Downloading from: %DOWNLOAD_URL%
|
||||||
|
)
|
||||||
|
|
||||||
|
powershell -Command "&{"^
|
||||||
|
"$webclient = new-object System.Net.WebClient;"^
|
||||||
|
"if (-not ([string]::IsNullOrEmpty('%MVNW_USERNAME%') -and [string]::IsNullOrEmpty('%MVNW_PASSWORD%'))) {"^
|
||||||
|
"$webclient.Credentials = new-object System.Net.NetworkCredential('%MVNW_USERNAME%', '%MVNW_PASSWORD%');"^
|
||||||
|
"}"^
|
||||||
|
"[Net.ServicePointManager]::SecurityProtocol = [Net.SecurityProtocolType]::Tls12; $webclient.DownloadFile('%DOWNLOAD_URL%', '%WRAPPER_JAR%')"^
|
||||||
|
"}"
|
||||||
|
if "%MVNW_VERBOSE%" == "true" (
|
||||||
|
echo Finished downloading %WRAPPER_JAR%
|
||||||
|
)
|
||||||
|
)
|
||||||
|
@REM End of extension
|
||||||
|
|
||||||
|
@REM Provide a "standardized" way to retrieve the CLI args that will
|
||||||
|
@REM work with both Windows and non-Windows executions.
|
||||||
|
set MAVEN_CMD_LINE_ARGS=%*
|
||||||
|
|
||||||
|
%MAVEN_JAVA_EXE% ^
|
||||||
|
%JVM_CONFIG_MAVEN_PROPS% ^
|
||||||
|
%MAVEN_OPTS% ^
|
||||||
|
%MAVEN_DEBUG_OPTS% ^
|
||||||
|
-classpath %WRAPPER_JAR% ^
|
||||||
|
"-Dmaven.multiModuleProjectDirectory=%MAVEN_PROJECTBASEDIR%" ^
|
||||||
|
%WRAPPER_LAUNCHER% %MAVEN_CONFIG% %*
|
||||||
|
if ERRORLEVEL 1 goto error
|
||||||
|
goto end
|
||||||
|
|
||||||
|
:error
|
||||||
|
set ERROR_CODE=1
|
||||||
|
|
||||||
|
:end
|
||||||
|
@endlocal & set ERROR_CODE=%ERROR_CODE%
|
||||||
|
|
||||||
|
if not "%MAVEN_SKIP_RC%"=="" goto skipRcPost
|
||||||
|
@REM check for post script, once with legacy .bat ending and once with .cmd ending
|
||||||
|
if exist "%USERPROFILE%\mavenrc_post.bat" call "%USERPROFILE%\mavenrc_post.bat"
|
||||||
|
if exist "%USERPROFILE%\mavenrc_post.cmd" call "%USERPROFILE%\mavenrc_post.cmd"
|
||||||
|
:skipRcPost
|
||||||
|
|
||||||
|
@REM pause the script if MAVEN_BATCH_PAUSE is set to 'on'
|
||||||
|
if "%MAVEN_BATCH_PAUSE%"=="on" pause
|
||||||
|
|
||||||
|
if "%MAVEN_TERMINATE_CMD%"=="on" exit %ERROR_CODE%
|
||||||
|
|
||||||
|
cmd /C exit /B %ERROR_CODE%
|
||||||
120
pom.xml
Normal file
120
pom.xml
Normal file
@@ -0,0 +1,120 @@
|
|||||||
|
<?xml version="1.0" encoding="UTF-8"?>
|
||||||
|
<project xmlns="http://maven.apache.org/POM/4.0.0" xmlns:xsi="http://www.w3.org/2001/XMLSchema-instance"
|
||||||
|
xsi:schemaLocation="http://maven.apache.org/POM/4.0.0 https://maven.apache.org/xsd/maven-4.0.0.xsd">
|
||||||
|
<modelVersion>4.0.0</modelVersion>
|
||||||
|
<parent>
|
||||||
|
<groupId>org.springframework.boot</groupId>
|
||||||
|
<artifactId>spring-boot-starter-parent</artifactId>
|
||||||
|
<version>2.7.1</version>
|
||||||
|
<relativePath/> <!-- lookup parent from repository -->
|
||||||
|
</parent>
|
||||||
|
<groupId>com.hideyoshi</groupId>
|
||||||
|
<artifactId>backend-template</artifactId>
|
||||||
|
<version>0.0.1-SNAPSHOT</version>
|
||||||
|
<name>backend-template</name>
|
||||||
|
<description>Backend Template</description>
|
||||||
|
<properties>
|
||||||
|
<java.version>11</java.version>
|
||||||
|
</properties>
|
||||||
|
<dependencies>
|
||||||
|
<dependency>
|
||||||
|
<groupId>org.springframework.boot</groupId>
|
||||||
|
<artifactId>spring-boot-starter-web</artifactId>
|
||||||
|
</dependency>
|
||||||
|
<dependency>
|
||||||
|
<groupId>org.springframework.boot</groupId>
|
||||||
|
<artifactId>spring-boot-starter-validation</artifactId>
|
||||||
|
<version>2.7.3</version>
|
||||||
|
</dependency>
|
||||||
|
<dependency>
|
||||||
|
<groupId>org.springframework.boot</groupId>
|
||||||
|
<artifactId>spring-boot-starter-data-jpa</artifactId>
|
||||||
|
</dependency>
|
||||||
|
<dependency>
|
||||||
|
<groupId>org.springframework.boot</groupId>
|
||||||
|
<artifactId>spring-boot-starter-security</artifactId>
|
||||||
|
</dependency>
|
||||||
|
<dependency>
|
||||||
|
<groupId>org.springframework.session</groupId>
|
||||||
|
<artifactId>spring-session-core</artifactId>
|
||||||
|
</dependency>
|
||||||
|
<dependency>
|
||||||
|
<groupId>org.springframework.session</groupId>
|
||||||
|
<artifactId>spring-session-data-redis</artifactId>
|
||||||
|
</dependency>
|
||||||
|
|
||||||
|
<dependency>
|
||||||
|
<groupId>com.auth0</groupId>
|
||||||
|
<artifactId>java-jwt</artifactId>
|
||||||
|
<version>4.0.0</version>
|
||||||
|
</dependency>
|
||||||
|
<dependency>
|
||||||
|
<groupId>org.postgresql</groupId>
|
||||||
|
<artifactId>postgresql</artifactId>
|
||||||
|
<version>42.5.0</version>
|
||||||
|
<scope>runtime</scope>
|
||||||
|
</dependency>
|
||||||
|
<dependency>
|
||||||
|
<groupId>org.liquibase</groupId>
|
||||||
|
<artifactId>liquibase-core</artifactId>
|
||||||
|
</dependency>
|
||||||
|
<dependency>
|
||||||
|
<groupId>org.springframework.boot</groupId>
|
||||||
|
<artifactId>spring-boot-starter-data-redis</artifactId>
|
||||||
|
</dependency>
|
||||||
|
<dependency>
|
||||||
|
<groupId>org.springframework.data</groupId>
|
||||||
|
<artifactId>spring-data-redis</artifactId>
|
||||||
|
</dependency>
|
||||||
|
<dependency>
|
||||||
|
<groupId>org.projectlombok</groupId>
|
||||||
|
<artifactId>lombok</artifactId>
|
||||||
|
<optional>true</optional>
|
||||||
|
</dependency>
|
||||||
|
|
||||||
|
<dependency>
|
||||||
|
<groupId>org.springframework.boot</groupId>
|
||||||
|
<artifactId>spring-boot-starter-test</artifactId>
|
||||||
|
<scope>test</scope>
|
||||||
|
</dependency>
|
||||||
|
<dependency>
|
||||||
|
<groupId>org.springframework.security</groupId>
|
||||||
|
<artifactId>spring-security-test</artifactId>
|
||||||
|
<scope>test</scope>
|
||||||
|
</dependency>
|
||||||
|
<dependency>
|
||||||
|
<groupId>com.h2database</groupId>
|
||||||
|
<artifactId>h2</artifactId>
|
||||||
|
<scope>test</scope>
|
||||||
|
</dependency>
|
||||||
|
<dependency>
|
||||||
|
<groupId>org.springframework.boot</groupId>
|
||||||
|
<artifactId>spring-boot-devtools</artifactId>
|
||||||
|
<scope>runtime</scope>
|
||||||
|
<optional>true</optional>
|
||||||
|
</dependency>
|
||||||
|
<dependency>
|
||||||
|
<groupId>junit</groupId>
|
||||||
|
<artifactId>junit</artifactId>
|
||||||
|
<scope>test</scope>
|
||||||
|
</dependency>
|
||||||
|
</dependencies>
|
||||||
|
|
||||||
|
<build>
|
||||||
|
<plugins>
|
||||||
|
<plugin>
|
||||||
|
<groupId>org.springframework.boot</groupId>
|
||||||
|
<artifactId>spring-boot-maven-plugin</artifactId>
|
||||||
|
<configuration>
|
||||||
|
<excludes>
|
||||||
|
<exclude>
|
||||||
|
<groupId>org.project-lombok</groupId>
|
||||||
|
<artifactId>lombok</artifactId>
|
||||||
|
</exclude>
|
||||||
|
</excludes>
|
||||||
|
</configuration>
|
||||||
|
</plugin>
|
||||||
|
</plugins>
|
||||||
|
</build>
|
||||||
|
|
||||||
|
</project>
|
||||||
@@ -0,0 +1,21 @@
|
|||||||
|
package com.hideyoshi.backendportfolio;
|
||||||
|
|
||||||
|
import org.springframework.boot.SpringApplication;
|
||||||
|
import org.springframework.boot.autoconfigure.SpringBootApplication;
|
||||||
|
import org.springframework.context.annotation.Bean;
|
||||||
|
import org.springframework.security.crypto.bcrypt.BCryptPasswordEncoder;
|
||||||
|
import org.springframework.security.crypto.password.PasswordEncoder;
|
||||||
|
|
||||||
|
@SpringBootApplication
|
||||||
|
public class BackendPortfolioApplication {
|
||||||
|
|
||||||
|
public static void main(String[] args) {
|
||||||
|
SpringApplication.run(BackendPortfolioApplication.class, args);
|
||||||
|
}
|
||||||
|
|
||||||
|
@Bean
|
||||||
|
PasswordEncoder passwordEncoder() {
|
||||||
|
return new BCryptPasswordEncoder();
|
||||||
|
}
|
||||||
|
|
||||||
|
}
|
||||||
@@ -0,0 +1,46 @@
|
|||||||
|
package com.hideyoshi.backendportfolio.base.config;
|
||||||
|
|
||||||
|
import org.springframework.beans.factory.annotation.Value;
|
||||||
|
import org.springframework.context.annotation.Bean;
|
||||||
|
import org.springframework.context.annotation.Configuration;
|
||||||
|
import org.springframework.web.cors.CorsConfiguration;
|
||||||
|
import org.springframework.web.cors.CorsConfigurationSource;
|
||||||
|
import org.springframework.web.cors.UrlBasedCorsConfigurationSource;
|
||||||
|
|
||||||
|
import java.util.Arrays;
|
||||||
|
import java.util.List;
|
||||||
|
|
||||||
|
@Configuration
|
||||||
|
public class CorsConfig {
|
||||||
|
|
||||||
|
@Value("${com.hideyoshi.frontendPath}")
|
||||||
|
private String FRONTEND_PATH;
|
||||||
|
|
||||||
|
@Value("${com.hideyoshi.frontendConnectionType}")
|
||||||
|
private String CONNECTION_TYPE;
|
||||||
|
|
||||||
|
private final String HTTP = "http://";
|
||||||
|
|
||||||
|
private final String HTTPS = "https://";
|
||||||
|
|
||||||
|
@Bean
|
||||||
|
public CorsConfigurationSource corsConfigurationSource() {
|
||||||
|
|
||||||
|
String connectionProtocol = CONNECTION_TYPE.equals("secure")
|
||||||
|
? HTTPS
|
||||||
|
: HTTP;
|
||||||
|
|
||||||
|
CorsConfiguration configuration = new CorsConfiguration();
|
||||||
|
configuration.setAllowedOrigins(List.of(connectionProtocol + FRONTEND_PATH));
|
||||||
|
configuration.setAllowedMethods(Arrays.asList("GET", "POST", "PUT", "PATCH", "DELETE", "OPTIONS"));
|
||||||
|
configuration.setAllowedHeaders(Arrays.asList("authorization", "content-type", "x-auth-token"));
|
||||||
|
configuration.setAllowCredentials(true);
|
||||||
|
configuration.setExposedHeaders(List.of("x-auth-token"));
|
||||||
|
|
||||||
|
UrlBasedCorsConfigurationSource source = new UrlBasedCorsConfigurationSource();
|
||||||
|
source.registerCorsConfiguration("/**", configuration);
|
||||||
|
|
||||||
|
return source;
|
||||||
|
}
|
||||||
|
|
||||||
|
}
|
||||||
@@ -0,0 +1,54 @@
|
|||||||
|
package com.hideyoshi.backendportfolio.base.config;
|
||||||
|
|
||||||
|
import com.hideyoshi.backendportfolio.base.user.entity.Role;
|
||||||
|
import com.hideyoshi.backendportfolio.base.user.model.UserDTO;
|
||||||
|
import com.hideyoshi.backendportfolio.base.user.repo.UserRepository;
|
||||||
|
import com.hideyoshi.backendportfolio.base.user.service.UserService;
|
||||||
|
import org.springframework.beans.factory.annotation.Value;
|
||||||
|
import org.springframework.boot.CommandLineRunner;
|
||||||
|
import org.springframework.context.annotation.Bean;
|
||||||
|
import org.springframework.context.annotation.Configuration;
|
||||||
|
|
||||||
|
import java.util.ArrayList;
|
||||||
|
|
||||||
|
@Configuration
|
||||||
|
public class DefaultUserConfig {
|
||||||
|
|
||||||
|
@Value("${com.hideyoshi.defaultUser.fullName}")
|
||||||
|
private String ADMIN_NAME;
|
||||||
|
|
||||||
|
@Value("${com.hideyoshi.defaultUser.email}")
|
||||||
|
private String ADMIN_EMAIL;
|
||||||
|
|
||||||
|
@Value("${com.hideyoshi.defaultUser.username}")
|
||||||
|
private String ADMIN_USERNAME;
|
||||||
|
|
||||||
|
@Value("${com.hideyoshi.defaultUser.password}")
|
||||||
|
private String ADMIN_PASSWORD;
|
||||||
|
|
||||||
|
@Bean
|
||||||
|
CommandLineRunner run(UserService userService, UserRepository userRepo) {
|
||||||
|
return args -> {
|
||||||
|
UserDTO defaultUser = UserDTO.builder()
|
||||||
|
.fullname(ADMIN_NAME)
|
||||||
|
.email(ADMIN_EMAIL)
|
||||||
|
.username(ADMIN_USERNAME)
|
||||||
|
.password(ADMIN_PASSWORD)
|
||||||
|
.roles(new ArrayList<>())
|
||||||
|
.build();
|
||||||
|
if (!userRepo.findByUsername(defaultUser.getUsername()).isPresent()) {
|
||||||
|
defaultUser = userService.saveUser(defaultUser);
|
||||||
|
|
||||||
|
userService.addRoleToUser(
|
||||||
|
defaultUser.getId(),
|
||||||
|
Role.ADMIN.getDescription()
|
||||||
|
);
|
||||||
|
userService.addRoleToUser(
|
||||||
|
defaultUser.getId(),
|
||||||
|
Role.USER.getDescription()
|
||||||
|
);
|
||||||
|
}
|
||||||
|
};
|
||||||
|
}
|
||||||
|
|
||||||
|
}
|
||||||
@@ -0,0 +1,34 @@
|
|||||||
|
package com.hideyoshi.backendportfolio.base.config;
|
||||||
|
|
||||||
|
import com.hideyoshi.backendportfolio.util.exception.AuthenticationInvalidException;
|
||||||
|
import lombok.RequiredArgsConstructor;
|
||||||
|
import lombok.extern.log4j.Log4j2;
|
||||||
|
import org.springframework.beans.factory.annotation.Autowired;
|
||||||
|
import org.springframework.beans.factory.annotation.Qualifier;
|
||||||
|
import org.springframework.security.core.AuthenticationException;
|
||||||
|
import org.springframework.security.web.AuthenticationEntryPoint;
|
||||||
|
import org.springframework.stereotype.Component;
|
||||||
|
import org.springframework.web.servlet.HandlerExceptionResolver;
|
||||||
|
|
||||||
|
import javax.servlet.http.HttpServletRequest;
|
||||||
|
import javax.servlet.http.HttpServletResponse;
|
||||||
|
|
||||||
|
@Log4j2
|
||||||
|
@Component("restAuthenticationEntryPoint")
|
||||||
|
public class RestAuthenticationEntryPointConfig implements AuthenticationEntryPoint{
|
||||||
|
|
||||||
|
@Autowired
|
||||||
|
@Qualifier("handlerExceptionResolver")
|
||||||
|
private HandlerExceptionResolver resolver;
|
||||||
|
|
||||||
|
public void commence(HttpServletRequest request, HttpServletResponse response, AuthenticationException authenticationException) {
|
||||||
|
|
||||||
|
resolver.resolveException(
|
||||||
|
request,
|
||||||
|
response,
|
||||||
|
null,
|
||||||
|
new AuthenticationInvalidException("Authentication Failed. Check your credentials.")
|
||||||
|
);
|
||||||
|
|
||||||
|
}
|
||||||
|
}
|
||||||
@@ -0,0 +1,22 @@
|
|||||||
|
package com.hideyoshi.backendportfolio.base.config;
|
||||||
|
|
||||||
|
import org.springframework.beans.factory.annotation.Value;
|
||||||
|
import org.springframework.context.annotation.Bean;
|
||||||
|
import org.springframework.session.web.http.CookieSerializer;
|
||||||
|
import org.springframework.session.web.http.DefaultCookieSerializer;
|
||||||
|
|
||||||
|
public class SessionConfig {
|
||||||
|
|
||||||
|
@Value("${com.hideyoshi.frontEndPath}")
|
||||||
|
private String frontEndPath;
|
||||||
|
|
||||||
|
@Bean
|
||||||
|
public CookieSerializer cookieSerializer() {
|
||||||
|
DefaultCookieSerializer serializer = new DefaultCookieSerializer();
|
||||||
|
serializer.setCookieName("SESSION");
|
||||||
|
serializer.setCookiePath("/");
|
||||||
|
serializer.setDomainNamePattern("(^.+)?(\\.)?(" + frontEndPath + ")((/#!)?(/\\w+)+)?");
|
||||||
|
return serializer;
|
||||||
|
}
|
||||||
|
|
||||||
|
}
|
||||||
@@ -0,0 +1,72 @@
|
|||||||
|
package com.hideyoshi.backendportfolio.base.security;
|
||||||
|
|
||||||
|
import com.hideyoshi.backendportfolio.base.config.RestAuthenticationEntryPointConfig;
|
||||||
|
import com.hideyoshi.backendportfolio.base.security.filter.CustomAuthenticationFilter;
|
||||||
|
import com.hideyoshi.backendportfolio.base.security.filter.CustomAuthorizationFilter;
|
||||||
|
import com.hideyoshi.backendportfolio.base.security.service.AuthService;
|
||||||
|
import lombok.RequiredArgsConstructor;
|
||||||
|
import org.springframework.beans.factory.annotation.Autowired;
|
||||||
|
import org.springframework.beans.factory.annotation.Qualifier;
|
||||||
|
import org.springframework.context.annotation.Bean;
|
||||||
|
import org.springframework.context.annotation.Configuration;
|
||||||
|
import org.springframework.context.annotation.Primary;
|
||||||
|
import org.springframework.security.authentication.AuthenticationManager;
|
||||||
|
import org.springframework.security.config.annotation.authentication.builders.AuthenticationManagerBuilder;
|
||||||
|
import org.springframework.security.config.annotation.web.builders.HttpSecurity;
|
||||||
|
import org.springframework.security.config.annotation.web.configuration.EnableWebSecurity;
|
||||||
|
import org.springframework.security.config.annotation.web.configuration.WebSecurityConfigurerAdapter;
|
||||||
|
import org.springframework.security.config.http.SessionCreationPolicy;
|
||||||
|
import org.springframework.security.core.userdetails.UserDetailsService;
|
||||||
|
import org.springframework.security.crypto.bcrypt.BCryptPasswordEncoder;
|
||||||
|
import org.springframework.security.web.authentication.UsernamePasswordAuthenticationFilter;
|
||||||
|
import org.springframework.web.cors.CorsConfiguration;
|
||||||
|
import org.springframework.web.cors.CorsConfigurationSource;
|
||||||
|
import org.springframework.web.cors.UrlBasedCorsConfigurationSource;
|
||||||
|
import org.springframework.web.servlet.HandlerExceptionResolver;
|
||||||
|
|
||||||
|
import java.util.Arrays;
|
||||||
|
|
||||||
|
@Configuration
|
||||||
|
@EnableWebSecurity
|
||||||
|
@RequiredArgsConstructor
|
||||||
|
public class SecurityConfig extends WebSecurityConfigurerAdapter {
|
||||||
|
|
||||||
|
private final AuthService authService;
|
||||||
|
|
||||||
|
private final UserDetailsService userDetailsService;
|
||||||
|
|
||||||
|
private final BCryptPasswordEncoder passwordEncoder;
|
||||||
|
|
||||||
|
private final RestAuthenticationEntryPointConfig restAuthenticationEntryPointConfig;
|
||||||
|
|
||||||
|
@Override
|
||||||
|
protected void configure(AuthenticationManagerBuilder auth) throws Exception {
|
||||||
|
auth.userDetailsService(userDetailsService)
|
||||||
|
.passwordEncoder(passwordEncoder);
|
||||||
|
}
|
||||||
|
|
||||||
|
@Override
|
||||||
|
protected void configure(HttpSecurity http) throws Exception {
|
||||||
|
|
||||||
|
CustomAuthenticationFilter customAuthenticationFilter =
|
||||||
|
new CustomAuthenticationFilter(this.authenticationManager(), this.authService, this.restAuthenticationEntryPointConfig);
|
||||||
|
|
||||||
|
customAuthenticationFilter.setFilterProcessesUrl("/user/login");
|
||||||
|
|
||||||
|
http.cors().and().csrf().disable()
|
||||||
|
.authorizeRequests().antMatchers("/session/**").permitAll()
|
||||||
|
.and().authorizeRequests().antMatchers("/user/signup").permitAll()
|
||||||
|
.and().authorizeRequests().antMatchers("/user/login/refresh").permitAll()
|
||||||
|
.and().authorizeRequests().antMatchers("/**").hasAnyAuthority("ROLE_USER", "ROLE_ADMIN")
|
||||||
|
.and().sessionManagement().sessionCreationPolicy(SessionCreationPolicy.IF_REQUIRED)
|
||||||
|
.and().addFilter(customAuthenticationFilter)
|
||||||
|
.addFilterBefore(new CustomAuthorizationFilter(this.authService), UsernamePasswordAuthenticationFilter.class);
|
||||||
|
|
||||||
|
}
|
||||||
|
|
||||||
|
@Bean
|
||||||
|
public AuthenticationManager authenticationManagerBean() throws Exception {
|
||||||
|
return super.authenticationManagerBean();
|
||||||
|
}
|
||||||
|
|
||||||
|
}
|
||||||
@@ -0,0 +1,74 @@
|
|||||||
|
package com.hideyoshi.backendportfolio.base.security.filter;
|
||||||
|
|
||||||
|
import com.auth0.jwt.algorithms.Algorithm;
|
||||||
|
import com.fasterxml.jackson.databind.ObjectMapper;
|
||||||
|
import com.hideyoshi.backendportfolio.base.config.RestAuthenticationEntryPointConfig;
|
||||||
|
import com.hideyoshi.backendportfolio.base.security.service.AuthService;
|
||||||
|
import com.hideyoshi.backendportfolio.base.user.model.TokenDTO;
|
||||||
|
import com.hideyoshi.backendportfolio.base.user.model.UserDTO;
|
||||||
|
import lombok.extern.log4j.Log4j2;
|
||||||
|
import org.springframework.security.authentication.AuthenticationManager;
|
||||||
|
import org.springframework.security.authentication.UsernamePasswordAuthenticationToken;
|
||||||
|
import org.springframework.security.core.Authentication;
|
||||||
|
import org.springframework.security.core.AuthenticationException;
|
||||||
|
import org.springframework.security.web.authentication.UsernamePasswordAuthenticationFilter;
|
||||||
|
|
||||||
|
import javax.servlet.FilterChain;
|
||||||
|
import javax.servlet.http.HttpServletRequest;
|
||||||
|
import javax.servlet.http.HttpServletResponse;
|
||||||
|
import javax.servlet.http.HttpSession;
|
||||||
|
import java.io.IOException;
|
||||||
|
import java.util.HashMap;
|
||||||
|
|
||||||
|
import static org.springframework.http.MediaType.APPLICATION_JSON_VALUE;
|
||||||
|
|
||||||
|
@Log4j2
|
||||||
|
public class CustomAuthenticationFilter extends UsernamePasswordAuthenticationFilter {
|
||||||
|
|
||||||
|
private final AuthService authService;
|
||||||
|
|
||||||
|
private final AuthenticationManager authenticationManager;
|
||||||
|
|
||||||
|
private final RestAuthenticationEntryPointConfig restAuthenticationEntryPointConfig;
|
||||||
|
|
||||||
|
public CustomAuthenticationFilter(AuthenticationManager authenticationManager, AuthService authService, RestAuthenticationEntryPointConfig restAuthenticationEntryPointConfig) {
|
||||||
|
this.authService = authService;
|
||||||
|
this.authenticationManager = authenticationManager;
|
||||||
|
this.restAuthenticationEntryPointConfig = restAuthenticationEntryPointConfig;
|
||||||
|
}
|
||||||
|
|
||||||
|
@Override
|
||||||
|
public Authentication attemptAuthentication(HttpServletRequest request, HttpServletResponse response) throws AuthenticationException {
|
||||||
|
|
||||||
|
String username = request.getParameter("username");
|
||||||
|
String password = request.getParameter("password");
|
||||||
|
|
||||||
|
Authentication userAuthentication = null;
|
||||||
|
try {
|
||||||
|
userAuthentication = authenticationManager.authenticate(
|
||||||
|
new UsernamePasswordAuthenticationToken(username, password)
|
||||||
|
);
|
||||||
|
} catch (AuthenticationException e) {
|
||||||
|
restAuthenticationEntryPointConfig.commence(request, response, e);
|
||||||
|
}
|
||||||
|
return userAuthentication;
|
||||||
|
}
|
||||||
|
|
||||||
|
@Override
|
||||||
|
protected void successfulAuthentication(HttpServletRequest request, HttpServletResponse response, FilterChain chain, Authentication authentication) throws IOException {
|
||||||
|
|
||||||
|
UserDTO user = (UserDTO) authentication.getPrincipal();
|
||||||
|
Algorithm algorithm = Algorithm.HMAC256("secret".getBytes());
|
||||||
|
|
||||||
|
HashMap<String,TokenDTO> tokens = this.authService.generateTokens(user, algorithm, request);
|
||||||
|
|
||||||
|
HttpSession httpSession = request.getSession();
|
||||||
|
UserDTO authenticatedUser = user.toResponse(tokens.get("accessToken"), tokens.get("refreshToken"));
|
||||||
|
httpSession.setAttribute("user", authenticatedUser);
|
||||||
|
|
||||||
|
response.setContentType(APPLICATION_JSON_VALUE);
|
||||||
|
new ObjectMapper()
|
||||||
|
.writeValue(response.getOutputStream(), authenticatedUser);
|
||||||
|
}
|
||||||
|
|
||||||
|
}
|
||||||
@@ -0,0 +1,72 @@
|
|||||||
|
package com.hideyoshi.backendportfolio.base.security.filter;
|
||||||
|
|
||||||
|
import com.fasterxml.jackson.databind.ObjectMapper;
|
||||||
|
import com.hideyoshi.backendportfolio.base.security.service.AuthService;
|
||||||
|
import com.hideyoshi.backendportfolio.util.exception.BadRequestException;
|
||||||
|
import lombok.extern.log4j.Log4j2;
|
||||||
|
import org.springframework.beans.factory.annotation.Qualifier;
|
||||||
|
import org.springframework.context.annotation.Bean;
|
||||||
|
import org.springframework.security.authentication.AuthenticationManager;
|
||||||
|
import org.springframework.security.authentication.UsernamePasswordAuthenticationToken;
|
||||||
|
import org.springframework.security.core.context.SecurityContextHolder;
|
||||||
|
import org.springframework.web.filter.OncePerRequestFilter;
|
||||||
|
import org.springframework.web.servlet.HandlerExceptionResolver;
|
||||||
|
|
||||||
|
import javax.servlet.FilterChain;
|
||||||
|
import javax.servlet.ServletException;
|
||||||
|
import javax.servlet.http.HttpServletRequest;
|
||||||
|
import javax.servlet.http.HttpServletResponse;
|
||||||
|
import java.io.IOException;
|
||||||
|
import java.util.HashMap;
|
||||||
|
import java.util.Map;
|
||||||
|
import java.util.Objects;
|
||||||
|
|
||||||
|
import static org.springframework.http.HttpHeaders.AUTHORIZATION;
|
||||||
|
import static org.springframework.http.HttpStatus.FORBIDDEN;
|
||||||
|
import static org.springframework.http.MediaType.APPLICATION_JSON_VALUE;
|
||||||
|
|
||||||
|
public class CustomAuthorizationFilter extends OncePerRequestFilter {
|
||||||
|
|
||||||
|
public static String AUTHORIZATION_TYPE_STRING = "Bearer ";
|
||||||
|
|
||||||
|
private final AuthService authService;
|
||||||
|
|
||||||
|
public CustomAuthorizationFilter(AuthService authService) {
|
||||||
|
this.authService = authService;
|
||||||
|
}
|
||||||
|
|
||||||
|
@Override
|
||||||
|
protected void doFilterInternal(HttpServletRequest request, HttpServletResponse response, FilterChain filterChain)
|
||||||
|
throws ServletException, IOException {
|
||||||
|
if (request.getServletPath().equals("/user/login")) {
|
||||||
|
filterChain.doFilter(request, response);
|
||||||
|
} else {
|
||||||
|
String authorizationHeader = request.getHeader(AUTHORIZATION);
|
||||||
|
if (Objects.nonNull(authorizationHeader) && authorizationHeader.startsWith(AUTHORIZATION_TYPE_STRING)) {
|
||||||
|
try {
|
||||||
|
|
||||||
|
UsernamePasswordAuthenticationToken authenticationToken =
|
||||||
|
this.authService.verifyAccessToken(authorizationHeader);
|
||||||
|
|
||||||
|
SecurityContextHolder.getContext().setAuthentication(authenticationToken);
|
||||||
|
filterChain.doFilter(request, response);
|
||||||
|
|
||||||
|
} catch (Exception e) {
|
||||||
|
response.setHeader("error", e.getMessage());
|
||||||
|
|
||||||
|
response.setStatus(FORBIDDEN.value());
|
||||||
|
|
||||||
|
Map<String, String> error = new HashMap<>();
|
||||||
|
error.put("error_message", e.getMessage());
|
||||||
|
|
||||||
|
response.setContentType(APPLICATION_JSON_VALUE);
|
||||||
|
new ObjectMapper()
|
||||||
|
.writeValue(response.getOutputStream(), error);
|
||||||
|
}
|
||||||
|
} else {
|
||||||
|
filterChain.doFilter(request, response);
|
||||||
|
}
|
||||||
|
}
|
||||||
|
}
|
||||||
|
|
||||||
|
}
|
||||||
@@ -0,0 +1,18 @@
|
|||||||
|
package com.hideyoshi.backendportfolio.base.security.interceptor;
|
||||||
|
|
||||||
|
import lombok.RequiredArgsConstructor;
|
||||||
|
import org.springframework.stereotype.Component;
|
||||||
|
import org.springframework.web.servlet.config.annotation.InterceptorRegistry;
|
||||||
|
import org.springframework.web.servlet.config.annotation.WebMvcConfigurer;
|
||||||
|
|
||||||
|
@Component
|
||||||
|
@RequiredArgsConstructor
|
||||||
|
public class ConfigInterceptor implements WebMvcConfigurer {
|
||||||
|
|
||||||
|
private final UserResourceAccessInterceptor userResourceAccessInterceptor;
|
||||||
|
|
||||||
|
public void addInterceptors(InterceptorRegistry registry) {
|
||||||
|
registry.addInterceptor(userResourceAccessInterceptor);
|
||||||
|
}
|
||||||
|
|
||||||
|
}
|
||||||
@@ -0,0 +1,45 @@
|
|||||||
|
package com.hideyoshi.backendportfolio.base.security.interceptor;
|
||||||
|
|
||||||
|
import com.fasterxml.jackson.databind.ObjectMapper;
|
||||||
|
import com.hideyoshi.backendportfolio.base.user.service.UserService;
|
||||||
|
import com.hideyoshi.backendportfolio.util.exception.BadRequestException;
|
||||||
|
import com.hideyoshi.backendportfolio.util.guard.UserResourceGuard;
|
||||||
|
import lombok.RequiredArgsConstructor;
|
||||||
|
import lombok.extern.log4j.Log4j2;
|
||||||
|
import org.springframework.stereotype.Component;
|
||||||
|
import org.springframework.web.method.HandlerMethod;
|
||||||
|
import org.springframework.web.servlet.HandlerInterceptor;
|
||||||
|
|
||||||
|
import javax.servlet.http.HttpServletRequest;
|
||||||
|
import javax.servlet.http.HttpServletResponse;
|
||||||
|
import java.util.Objects;
|
||||||
|
|
||||||
|
@Log4j2
|
||||||
|
@Component
|
||||||
|
@RequiredArgsConstructor
|
||||||
|
public class UserResourceAccessInterceptor implements HandlerInterceptor {
|
||||||
|
|
||||||
|
private final UserService userService;
|
||||||
|
|
||||||
|
private final ObjectMapper objectMapper;
|
||||||
|
|
||||||
|
public boolean preHandle(final HttpServletRequest request, final HttpServletResponse response, final Object handler) {
|
||||||
|
|
||||||
|
if (!(handler instanceof HandlerMethod)) {
|
||||||
|
return true;
|
||||||
|
}
|
||||||
|
|
||||||
|
final UserResourceGuard annotation = ((HandlerMethod)handler)
|
||||||
|
.getMethodAnnotation(UserResourceGuard.class);
|
||||||
|
|
||||||
|
if (Objects.nonNull(annotation)) {
|
||||||
|
Boolean accessPermission =
|
||||||
|
annotation.accessType().hasAccess(this.userService, this.objectMapper, request);
|
||||||
|
if (!accessPermission) {
|
||||||
|
throw new BadRequestException(annotation.denialMessage());
|
||||||
|
}
|
||||||
|
}
|
||||||
|
return true;
|
||||||
|
}
|
||||||
|
|
||||||
|
}
|
||||||
@@ -0,0 +1,27 @@
|
|||||||
|
package com.hideyoshi.backendportfolio.base.security.service;
|
||||||
|
|
||||||
|
import com.auth0.jwt.algorithms.Algorithm;
|
||||||
|
import com.hideyoshi.backendportfolio.base.user.model.TokenDTO;
|
||||||
|
import com.hideyoshi.backendportfolio.base.user.model.UserDTO;
|
||||||
|
import org.springframework.security.authentication.UsernamePasswordAuthenticationToken;
|
||||||
|
|
||||||
|
import javax.servlet.http.HttpServletRequest;
|
||||||
|
import javax.servlet.http.HttpServletResponse;
|
||||||
|
import javax.validation.Valid;
|
||||||
|
import java.util.HashMap;
|
||||||
|
|
||||||
|
public interface AuthService {
|
||||||
|
|
||||||
|
TokenDTO generateAccessToken(@Valid UserDTO user, Algorithm algorithm, HttpServletRequest request);
|
||||||
|
|
||||||
|
TokenDTO generateRefreshToken(@Valid UserDTO user, Algorithm algorithm, HttpServletRequest request);
|
||||||
|
|
||||||
|
HashMap<String,TokenDTO> generateTokens(@Valid UserDTO user, Algorithm algorithm, HttpServletRequest request);
|
||||||
|
|
||||||
|
UsernamePasswordAuthenticationToken verifyAccessToken(String authorizationHeader);
|
||||||
|
|
||||||
|
UserDTO refreshAccessToken(String refreshToken, HttpServletRequest request, HttpServletResponse response);
|
||||||
|
|
||||||
|
UserDTO signupUser(@Valid UserDTO user, HttpServletRequest request);
|
||||||
|
|
||||||
|
}
|
||||||
@@ -0,0 +1,175 @@
|
|||||||
|
package com.hideyoshi.backendportfolio.base.security.service;
|
||||||
|
|
||||||
|
import com.auth0.jwt.JWT;
|
||||||
|
import com.auth0.jwt.JWTVerifier;
|
||||||
|
import com.auth0.jwt.algorithms.Algorithm;
|
||||||
|
import com.auth0.jwt.interfaces.DecodedJWT;
|
||||||
|
import com.hideyoshi.backendportfolio.base.user.model.TokenDTO;
|
||||||
|
import com.hideyoshi.backendportfolio.base.user.model.UserDTO;
|
||||||
|
import com.hideyoshi.backendportfolio.base.user.service.UserService;
|
||||||
|
import com.hideyoshi.backendportfolio.util.exception.BadRequestException;
|
||||||
|
import lombok.RequiredArgsConstructor;
|
||||||
|
import lombok.extern.log4j.Log4j2;
|
||||||
|
import org.springframework.beans.factory.annotation.Autowired;
|
||||||
|
import org.springframework.beans.factory.annotation.Qualifier;
|
||||||
|
import org.springframework.beans.factory.annotation.Value;
|
||||||
|
import org.springframework.security.authentication.UsernamePasswordAuthenticationToken;
|
||||||
|
import org.springframework.security.core.GrantedAuthority;
|
||||||
|
import org.springframework.security.core.authority.SimpleGrantedAuthority;
|
||||||
|
import org.springframework.stereotype.Service;
|
||||||
|
import org.springframework.web.servlet.HandlerExceptionResolver;
|
||||||
|
|
||||||
|
import javax.servlet.http.HttpServletRequest;
|
||||||
|
import javax.servlet.http.HttpServletResponse;
|
||||||
|
import javax.servlet.http.HttpSession;
|
||||||
|
import javax.validation.Valid;
|
||||||
|
import java.util.*;
|
||||||
|
import java.util.stream.Collectors;
|
||||||
|
|
||||||
|
import static java.util.Arrays.stream;
|
||||||
|
|
||||||
|
@Log4j2
|
||||||
|
@Service
|
||||||
|
@RequiredArgsConstructor
|
||||||
|
public class AuthServiceImpl implements AuthService {
|
||||||
|
|
||||||
|
|
||||||
|
@Value("${com.hideyoshi.tokenSecret}")
|
||||||
|
private String TOKEN_SECRET;
|
||||||
|
|
||||||
|
@Value("${com.hideyoshi.accessTokenDuration}")
|
||||||
|
private Integer ACCESS_TOKEN_DURATION;
|
||||||
|
|
||||||
|
@Value("${com.hideyoshi.refreshTokenDuration}")
|
||||||
|
private Integer REFRESH_TOKEN_DURATION;
|
||||||
|
|
||||||
|
private static final String AUTHORIZATION_TYPE_STRING = "Bearer ";
|
||||||
|
|
||||||
|
private final UserService userService;
|
||||||
|
|
||||||
|
@Autowired
|
||||||
|
@Qualifier("handlerExceptionResolver")
|
||||||
|
private HandlerExceptionResolver resolver;
|
||||||
|
|
||||||
|
@Override
|
||||||
|
public TokenDTO generateAccessToken(@Valid UserDTO user, Algorithm algorithm, HttpServletRequest request) {
|
||||||
|
|
||||||
|
Date expirationDate = new Date(System.currentTimeMillis() + ACCESS_TOKEN_DURATION);
|
||||||
|
|
||||||
|
String accessToken = JWT.create()
|
||||||
|
.withSubject(user.getUsername())
|
||||||
|
.withExpiresAt(expirationDate)
|
||||||
|
.withIssuer(request.getRequestURL().toString())
|
||||||
|
.withClaim("roles", user.getAuthorities()
|
||||||
|
.stream().map(GrantedAuthority::getAuthority)
|
||||||
|
.collect(Collectors.toList()))
|
||||||
|
.sign(algorithm);
|
||||||
|
|
||||||
|
return new TokenDTO(accessToken, expirationDate);
|
||||||
|
}
|
||||||
|
|
||||||
|
@Override
|
||||||
|
public TokenDTO generateRefreshToken(@Valid UserDTO user, Algorithm algorithm, HttpServletRequest request) {
|
||||||
|
|
||||||
|
Date expirationDate = new Date(System.currentTimeMillis() + REFRESH_TOKEN_DURATION);
|
||||||
|
|
||||||
|
String refreshToken = JWT.create()
|
||||||
|
.withSubject(user.getUsername())
|
||||||
|
.withExpiresAt(expirationDate)
|
||||||
|
.withIssuer(request.getRequestURL().toString())
|
||||||
|
.sign(algorithm);
|
||||||
|
|
||||||
|
return new TokenDTO(refreshToken, expirationDate);
|
||||||
|
|
||||||
|
}
|
||||||
|
|
||||||
|
@Override
|
||||||
|
public HashMap<String, TokenDTO> generateTokens(@Valid UserDTO user, Algorithm algorithm, HttpServletRequest request) {
|
||||||
|
|
||||||
|
TokenDTO accessToken = generateAccessToken(user, algorithm, request);
|
||||||
|
TokenDTO refreshToken = generateRefreshToken(user, algorithm, request);
|
||||||
|
|
||||||
|
HashMap<String,TokenDTO> tokens = new HashMap<>();
|
||||||
|
tokens.put("accessToken", accessToken);
|
||||||
|
tokens.put("refreshToken", refreshToken);
|
||||||
|
|
||||||
|
return tokens;
|
||||||
|
}
|
||||||
|
|
||||||
|
@Override
|
||||||
|
public UsernamePasswordAuthenticationToken verifyAccessToken(String authorizationHeader) {
|
||||||
|
|
||||||
|
if (authorizationHeader.startsWith(AUTHORIZATION_TYPE_STRING)) {
|
||||||
|
|
||||||
|
String authorizationToken = authorizationHeader.substring(AUTHORIZATION_TYPE_STRING.length());
|
||||||
|
Algorithm algorithm = Algorithm.HMAC256(TOKEN_SECRET.getBytes());
|
||||||
|
|
||||||
|
JWTVerifier verifier = JWT.require(algorithm).build();
|
||||||
|
DecodedJWT decodedJWT = verifier.verify(authorizationToken);
|
||||||
|
|
||||||
|
String username = decodedJWT.getSubject();
|
||||||
|
String[] roles = decodedJWT.getClaim("roles").asArray(String.class);
|
||||||
|
|
||||||
|
Collection<SimpleGrantedAuthority> authorities = new ArrayList<>();
|
||||||
|
stream(roles).forEach(role -> {
|
||||||
|
authorities.add(new SimpleGrantedAuthority(role));
|
||||||
|
});
|
||||||
|
return new UsernamePasswordAuthenticationToken(username, null, authorities);
|
||||||
|
}
|
||||||
|
return null;
|
||||||
|
}
|
||||||
|
|
||||||
|
@Override
|
||||||
|
public UserDTO refreshAccessToken(String refreshToken, HttpServletRequest request, HttpServletResponse response) {
|
||||||
|
|
||||||
|
if (Objects.nonNull(refreshToken)) {
|
||||||
|
|
||||||
|
Algorithm algorithm = Algorithm.HMAC256(TOKEN_SECRET.getBytes());
|
||||||
|
|
||||||
|
JWTVerifier verifier = JWT.require(algorithm).build();
|
||||||
|
DecodedJWT decodedJWT = verifier.verify(refreshToken);
|
||||||
|
|
||||||
|
UserDTO user = this.userService.getUser(decodedJWT.getSubject());
|
||||||
|
|
||||||
|
if (Objects.nonNull(user)) {
|
||||||
|
|
||||||
|
HttpSession httpSession = request.getSession();
|
||||||
|
UserDTO authenticatedUser = user.toResponse(
|
||||||
|
this.generateAccessToken(user, algorithm, request),
|
||||||
|
new TokenDTO(
|
||||||
|
refreshToken,
|
||||||
|
decodedJWT.getExpiresAt()
|
||||||
|
)
|
||||||
|
);
|
||||||
|
httpSession.setAttribute("user", authenticatedUser);
|
||||||
|
|
||||||
|
return authenticatedUser;
|
||||||
|
}
|
||||||
|
|
||||||
|
} else {
|
||||||
|
resolver.resolveException(
|
||||||
|
request,
|
||||||
|
response,
|
||||||
|
null,
|
||||||
|
new BadRequestException("Invalid Refresh Token. Please authenticate first.")
|
||||||
|
);
|
||||||
|
}
|
||||||
|
return null;
|
||||||
|
}
|
||||||
|
|
||||||
|
@Override
|
||||||
|
public UserDTO signupUser(@Valid UserDTO user, HttpServletRequest request) {
|
||||||
|
|
||||||
|
Algorithm algorithm = Algorithm.HMAC256(TOKEN_SECRET.getBytes());
|
||||||
|
|
||||||
|
UserDTO userSaved = this.userService.saveUser(user);
|
||||||
|
HashMap<String, TokenDTO> tokens = this.generateTokens(userSaved, algorithm, request);
|
||||||
|
|
||||||
|
HttpSession httpSession = request.getSession();
|
||||||
|
UserDTO userAuthenticated = userSaved.toResponse(tokens.get("accessToken"), tokens.get("refreshToken"));
|
||||||
|
httpSession.setAttribute("user", userAuthenticated);
|
||||||
|
|
||||||
|
return userAuthenticated;
|
||||||
|
}
|
||||||
|
|
||||||
|
}
|
||||||
@@ -0,0 +1,35 @@
|
|||||||
|
package com.hideyoshi.backendportfolio.base.session.api;
|
||||||
|
|
||||||
|
import com.hideyoshi.backendportfolio.base.session.service.SessionManagerService;
|
||||||
|
import com.hideyoshi.backendportfolio.base.user.model.UserDTO;
|
||||||
|
import lombok.RequiredArgsConstructor;
|
||||||
|
import org.springframework.http.HttpStatus;
|
||||||
|
import org.springframework.http.ResponseEntity;
|
||||||
|
import org.springframework.stereotype.Controller;
|
||||||
|
import org.springframework.web.bind.annotation.GetMapping;
|
||||||
|
import org.springframework.web.bind.annotation.PostMapping;
|
||||||
|
import org.springframework.web.bind.annotation.RequestMapping;
|
||||||
|
import org.springframework.web.bind.annotation.RestController;
|
||||||
|
|
||||||
|
import javax.servlet.http.HttpSession;
|
||||||
|
|
||||||
|
@Controller
|
||||||
|
@RestController
|
||||||
|
@RequiredArgsConstructor
|
||||||
|
@RequestMapping(path = "/session")
|
||||||
|
public class SessionController {
|
||||||
|
|
||||||
|
private final SessionManagerService sessionManagerService;
|
||||||
|
|
||||||
|
@GetMapping(path = "/validate")
|
||||||
|
public ResponseEntity<UserDTO> validateCurrentSession(HttpSession session) {
|
||||||
|
return ResponseEntity.ok(this.sessionManagerService.validateSession(session));
|
||||||
|
}
|
||||||
|
|
||||||
|
@PostMapping(path="/destroy")
|
||||||
|
public ResponseEntity<Void> destroyCurrentSession(HttpSession session) {
|
||||||
|
this.sessionManagerService.destroySession(session);
|
||||||
|
return new ResponseEntity<>(HttpStatus.NO_CONTENT);
|
||||||
|
}
|
||||||
|
|
||||||
|
}
|
||||||
@@ -0,0 +1,13 @@
|
|||||||
|
package com.hideyoshi.backendportfolio.base.session.service;
|
||||||
|
|
||||||
|
import com.hideyoshi.backendportfolio.base.user.model.UserDTO;
|
||||||
|
|
||||||
|
import javax.servlet.http.HttpSession;
|
||||||
|
|
||||||
|
public interface SessionManagerService {
|
||||||
|
|
||||||
|
UserDTO validateSession(HttpSession session);
|
||||||
|
|
||||||
|
void destroySession(HttpSession session);
|
||||||
|
|
||||||
|
}
|
||||||
@@ -0,0 +1,35 @@
|
|||||||
|
package com.hideyoshi.backendportfolio.base.session.service;
|
||||||
|
|
||||||
|
import com.hideyoshi.backendportfolio.base.user.model.UserDTO;
|
||||||
|
import com.hideyoshi.backendportfolio.base.user.service.UserService;
|
||||||
|
import lombok.RequiredArgsConstructor;
|
||||||
|
import org.springframework.stereotype.Service;
|
||||||
|
|
||||||
|
import javax.servlet.http.HttpSession;
|
||||||
|
import java.util.Objects;
|
||||||
|
|
||||||
|
@Service
|
||||||
|
@RequiredArgsConstructor
|
||||||
|
public class SessionManagerServiceImpl implements SessionManagerService {
|
||||||
|
|
||||||
|
private final UserService userService;
|
||||||
|
|
||||||
|
@Override
|
||||||
|
public UserDTO validateSession(HttpSession session) {
|
||||||
|
|
||||||
|
UserDTO sessionObjects = (UserDTO) session.getAttribute("user");
|
||||||
|
|
||||||
|
if (Objects.nonNull(sessionObjects)) {
|
||||||
|
return this.userService.getUser(sessionObjects.getUsername())
|
||||||
|
.toResponse(sessionObjects.getAccessToken(), sessionObjects.getRefreshToken());
|
||||||
|
}
|
||||||
|
|
||||||
|
return null;
|
||||||
|
}
|
||||||
|
|
||||||
|
@Override
|
||||||
|
public void destroySession(HttpSession session) {
|
||||||
|
session.invalidate();
|
||||||
|
}
|
||||||
|
|
||||||
|
}
|
||||||
@@ -0,0 +1,89 @@
|
|||||||
|
package com.hideyoshi.backendportfolio.base.user.api;
|
||||||
|
|
||||||
|
import com.hideyoshi.backendportfolio.base.security.service.AuthService;
|
||||||
|
import com.hideyoshi.backendportfolio.base.user.model.TokenDTO;
|
||||||
|
import com.hideyoshi.backendportfolio.base.user.model.UserDTO;
|
||||||
|
import com.hideyoshi.backendportfolio.base.user.service.UserService;
|
||||||
|
import com.hideyoshi.backendportfolio.util.guard.UserResourceGuard;
|
||||||
|
import com.hideyoshi.backendportfolio.util.guard.UserResourceGuardEnum;
|
||||||
|
import lombok.RequiredArgsConstructor;
|
||||||
|
import lombok.extern.log4j.Log4j2;
|
||||||
|
import org.springframework.http.HttpStatus;
|
||||||
|
import org.springframework.http.ResponseEntity;
|
||||||
|
import org.springframework.stereotype.Controller;
|
||||||
|
import org.springframework.validation.BindingResult;
|
||||||
|
import org.springframework.web.bind.annotation.*;
|
||||||
|
import org.springframework.web.servlet.support.ServletUriComponentsBuilder;
|
||||||
|
|
||||||
|
import javax.servlet.http.HttpServletRequest;
|
||||||
|
import javax.servlet.http.HttpServletResponse;
|
||||||
|
import javax.validation.Valid;
|
||||||
|
import java.net.URI;
|
||||||
|
import java.util.List;
|
||||||
|
|
||||||
|
@Log4j2
|
||||||
|
@Controller
|
||||||
|
@RestController
|
||||||
|
@RequestMapping("/user")
|
||||||
|
@RequiredArgsConstructor
|
||||||
|
public class UserController {
|
||||||
|
|
||||||
|
private final UserService userService;
|
||||||
|
|
||||||
|
private final AuthService authService;
|
||||||
|
|
||||||
|
@GetMapping
|
||||||
|
@UserResourceGuard(accessType = UserResourceGuardEnum.ADMIN_USER)
|
||||||
|
public ResponseEntity<List<UserDTO>> getUsers() {
|
||||||
|
return ResponseEntity.ok(this.userService.getUsers());
|
||||||
|
}
|
||||||
|
|
||||||
|
@PostMapping("/signup")
|
||||||
|
@UserResourceGuard(accessType = UserResourceGuardEnum.OPEN)
|
||||||
|
public ResponseEntity<UserDTO> signupUser(@RequestBody @Valid UserDTO user, HttpServletRequest request) {
|
||||||
|
URI uri = URI.create(
|
||||||
|
ServletUriComponentsBuilder
|
||||||
|
.fromCurrentContextPath()
|
||||||
|
.path("/user/signup").toUriString()
|
||||||
|
);
|
||||||
|
return ResponseEntity.created(uri).body(this.authService.signupUser(user, request));
|
||||||
|
}
|
||||||
|
|
||||||
|
@PostMapping("/delete/{id}")
|
||||||
|
@UserResourceGuard(accessType = UserResourceGuardEnum.SAME_USER)
|
||||||
|
public ResponseEntity<Void> deleteUser(@PathVariable("id") Long id) {
|
||||||
|
this.userService.deleteUser(id);
|
||||||
|
return new ResponseEntity<>(HttpStatus.NO_CONTENT);
|
||||||
|
}
|
||||||
|
//
|
||||||
|
// @PostMapping("/alter/{id}")
|
||||||
|
// @UserResourceGuard(accessType = UserResourceGuardEnum.SAME_USER)
|
||||||
|
// public ResponseEntity<Void> alterUser(@PathVariable("id") Long id, @RequestBody @Valid UserDTO user) {
|
||||||
|
// this.userService.alterUser(id, user);
|
||||||
|
// return new ResponseEntity<>(HttpStatus.NO_CONTENT);
|
||||||
|
// }
|
||||||
|
//
|
||||||
|
// @PostMapping("/alter/{id}/role/add")
|
||||||
|
// @UserResourceGuard(accessType = UserResourceGuardEnum.SAME_USER)
|
||||||
|
// public ResponseEntity<?> addRoleToUser(@PathVariable("id") Long id, @RequestBody RoleToUserDTO filter) {
|
||||||
|
// userService.addRoleToUser(id, filter.getRoleName());
|
||||||
|
// return ResponseEntity.ok().build();
|
||||||
|
// }
|
||||||
|
//
|
||||||
|
// @PostMapping("/alter/{id}/role/delete")
|
||||||
|
// @UserResourceGuard(accessType = UserResourceGuardEnum.SAME_USER)
|
||||||
|
// public ResponseEntity<?> deleteRoleToUser(@PathVariable("id") Long id, @RequestBody RoleToUserDTO filter) {
|
||||||
|
// userService.removeRoleFromUser(id, filter.getRoleName());
|
||||||
|
// return ResponseEntity.ok().build();
|
||||||
|
// }
|
||||||
|
|
||||||
|
@PostMapping("/login/refresh")
|
||||||
|
@UserResourceGuard(accessType = UserResourceGuardEnum.OPEN)
|
||||||
|
public ResponseEntity<UserDTO> refreshAccessToken(
|
||||||
|
@RequestBody @Valid TokenDTO refreshToken,
|
||||||
|
HttpServletRequest request,
|
||||||
|
HttpServletResponse response) {
|
||||||
|
return ResponseEntity.ok(this.authService.refreshAccessToken(refreshToken.getToken(), request, response));
|
||||||
|
}
|
||||||
|
|
||||||
|
}
|
||||||
@@ -0,0 +1,18 @@
|
|||||||
|
package com.hideyoshi.backendportfolio.base.user.entity;
|
||||||
|
|
||||||
|
public enum Provider {
|
||||||
|
|
||||||
|
GOOGLE("google"),
|
||||||
|
|
||||||
|
LOCAL("local");
|
||||||
|
private String name;
|
||||||
|
|
||||||
|
Provider(String name) {
|
||||||
|
this.name = name;
|
||||||
|
}
|
||||||
|
|
||||||
|
public String getName() {
|
||||||
|
return name;
|
||||||
|
}
|
||||||
|
|
||||||
|
}
|
||||||
@@ -0,0 +1,29 @@
|
|||||||
|
package com.hideyoshi.backendportfolio.base.user.entity;
|
||||||
|
|
||||||
|
import com.fasterxml.jackson.annotation.JsonValue;
|
||||||
|
|
||||||
|
public enum Role {
|
||||||
|
USER("ROLE_USER"),
|
||||||
|
ADMIN("ROLE_ADMIN");
|
||||||
|
|
||||||
|
@JsonValue
|
||||||
|
private final String description;
|
||||||
|
|
||||||
|
Role(String description) {
|
||||||
|
this.description = description;
|
||||||
|
}
|
||||||
|
|
||||||
|
public String getDescription() {
|
||||||
|
return this.description;
|
||||||
|
}
|
||||||
|
|
||||||
|
public static Role byValue(String description) {
|
||||||
|
for (Role r : values()) {
|
||||||
|
if (r.getDescription().equals(description)) {
|
||||||
|
return r;
|
||||||
|
}
|
||||||
|
}
|
||||||
|
throw new IllegalArgumentException("Argument not valid.");
|
||||||
|
}
|
||||||
|
|
||||||
|
}
|
||||||
@@ -0,0 +1,77 @@
|
|||||||
|
package com.hideyoshi.backendportfolio.base.user.entity;
|
||||||
|
|
||||||
|
import lombok.AllArgsConstructor;
|
||||||
|
import lombok.Data;
|
||||||
|
import lombok.NoArgsConstructor;
|
||||||
|
|
||||||
|
import javax.persistence.*;
|
||||||
|
import java.util.ArrayList;
|
||||||
|
import java.util.List;
|
||||||
|
import java.util.Objects;
|
||||||
|
import java.util.stream.Collectors;
|
||||||
|
|
||||||
|
import static java.util.Arrays.stream;
|
||||||
|
|
||||||
|
@Data
|
||||||
|
@Entity
|
||||||
|
@NoArgsConstructor
|
||||||
|
@AllArgsConstructor
|
||||||
|
@Table(name = "`user`", schema = "auth")
|
||||||
|
public class User {
|
||||||
|
|
||||||
|
@Id
|
||||||
|
@SequenceGenerator(name = "seq_user", sequenceName = "auth.user_seq", allocationSize = 1)
|
||||||
|
@GeneratedValue(strategy = GenerationType.SEQUENCE, generator = "seq_user")
|
||||||
|
private Long id;
|
||||||
|
|
||||||
|
@Column(
|
||||||
|
name = "full_name",
|
||||||
|
nullable = false
|
||||||
|
)
|
||||||
|
private String fullname;
|
||||||
|
|
||||||
|
@Column(
|
||||||
|
name = "email",
|
||||||
|
unique = true,
|
||||||
|
nullable = false
|
||||||
|
)
|
||||||
|
private String email;
|
||||||
|
|
||||||
|
|
||||||
|
@Column(
|
||||||
|
name = "username",
|
||||||
|
unique = true,
|
||||||
|
nullable = false
|
||||||
|
)
|
||||||
|
private String username;
|
||||||
|
|
||||||
|
|
||||||
|
@Column(
|
||||||
|
name = "password",
|
||||||
|
nullable = false
|
||||||
|
)
|
||||||
|
private String password;
|
||||||
|
|
||||||
|
@Column(
|
||||||
|
name = "roles",
|
||||||
|
nullable = false
|
||||||
|
)
|
||||||
|
private String roles;
|
||||||
|
|
||||||
|
public void setRoles(List<Role> roles) {
|
||||||
|
this.roles = roles.stream()
|
||||||
|
.map(role -> role.getDescription())
|
||||||
|
.collect(Collectors.joining("&"));
|
||||||
|
}
|
||||||
|
|
||||||
|
public List<Role> getRoles() {
|
||||||
|
List<Role> roles = new ArrayList<>();
|
||||||
|
if (Objects.nonNull(this.roles) && !this.roles.isEmpty()) {
|
||||||
|
roles = stream(this.roles.split("&"))
|
||||||
|
.map(description -> Role.byValue(description))
|
||||||
|
.collect(Collectors.toList());
|
||||||
|
}
|
||||||
|
return roles;
|
||||||
|
}
|
||||||
|
|
||||||
|
}
|
||||||
@@ -0,0 +1,10 @@
|
|||||||
|
package com.hideyoshi.backendportfolio.base.user.model;
|
||||||
|
|
||||||
|
import lombok.Data;
|
||||||
|
|
||||||
|
@Data
|
||||||
|
public
|
||||||
|
class RoleToUserDTO {
|
||||||
|
private String username;
|
||||||
|
private String roleName;
|
||||||
|
}
|
||||||
@@ -0,0 +1,21 @@
|
|||||||
|
package com.hideyoshi.backendportfolio.base.user.model;
|
||||||
|
|
||||||
|
import com.fasterxml.jackson.annotation.JsonFormat;
|
||||||
|
import lombok.*;
|
||||||
|
|
||||||
|
import javax.validation.constraints.NotNull;
|
||||||
|
import java.io.Serializable;
|
||||||
|
import java.util.Date;
|
||||||
|
|
||||||
|
@Data
|
||||||
|
@NoArgsConstructor
|
||||||
|
@AllArgsConstructor
|
||||||
|
public class TokenDTO implements Serializable {
|
||||||
|
|
||||||
|
@NotNull(message = "Invalid AccessToken. Please Authenticate first.")
|
||||||
|
private String token;
|
||||||
|
|
||||||
|
@JsonFormat(pattern="yyyy-MM-dd HH:mm:ss")
|
||||||
|
private Date expirationDate;
|
||||||
|
|
||||||
|
}
|
||||||
@@ -0,0 +1,162 @@
|
|||||||
|
package com.hideyoshi.backendportfolio.base.user.model;
|
||||||
|
|
||||||
|
import com.fasterxml.jackson.annotation.JsonIgnore;
|
||||||
|
import com.fasterxml.jackson.annotation.JsonIgnoreProperties;
|
||||||
|
import com.fasterxml.jackson.annotation.JsonInclude;
|
||||||
|
import com.hideyoshi.backendportfolio.base.user.entity.Provider;
|
||||||
|
import com.hideyoshi.backendportfolio.base.user.entity.Role;
|
||||||
|
import com.hideyoshi.backendportfolio.base.user.entity.User;
|
||||||
|
import com.hideyoshi.backendportfolio.util.validator.email.unique.UniqueEmail;
|
||||||
|
import com.hideyoshi.backendportfolio.util.validator.email.valid.ValidEmail;
|
||||||
|
import com.hideyoshi.backendportfolio.util.validator.password.ValidPassword;
|
||||||
|
import lombok.AllArgsConstructor;
|
||||||
|
import lombok.Builder;
|
||||||
|
import lombok.Data;
|
||||||
|
import lombok.NoArgsConstructor;
|
||||||
|
import org.springframework.lang.Nullable;
|
||||||
|
import org.springframework.security.core.GrantedAuthority;
|
||||||
|
import org.springframework.security.core.authority.SimpleGrantedAuthority;
|
||||||
|
import org.springframework.security.core.userdetails.UserDetails;
|
||||||
|
|
||||||
|
import javax.validation.constraints.NotEmpty;
|
||||||
|
import javax.validation.constraints.Size;
|
||||||
|
import java.util.Collection;
|
||||||
|
import java.util.List;
|
||||||
|
import java.util.Objects;
|
||||||
|
import java.util.stream.Collectors;
|
||||||
|
|
||||||
|
@Data
|
||||||
|
@Builder
|
||||||
|
@NoArgsConstructor
|
||||||
|
@AllArgsConstructor
|
||||||
|
@JsonInclude(JsonInclude.Include.NON_NULL)
|
||||||
|
@JsonIgnoreProperties(ignoreUnknown = true)
|
||||||
|
public class UserDTO implements UserDetails {
|
||||||
|
|
||||||
|
private Long id;
|
||||||
|
|
||||||
|
@NotEmpty
|
||||||
|
private String fullname;
|
||||||
|
|
||||||
|
@NotEmpty
|
||||||
|
@ValidEmail
|
||||||
|
@UniqueEmail
|
||||||
|
private String email;
|
||||||
|
|
||||||
|
@NotEmpty
|
||||||
|
private String username;
|
||||||
|
|
||||||
|
@Nullable
|
||||||
|
@ValidPassword
|
||||||
|
private String password;
|
||||||
|
|
||||||
|
@Size(min=1)
|
||||||
|
private List<Role> roles;
|
||||||
|
|
||||||
|
private TokenDTO accessToken;
|
||||||
|
|
||||||
|
private TokenDTO refreshToken;
|
||||||
|
|
||||||
|
private Provider provider;
|
||||||
|
|
||||||
|
public UserDTO(
|
||||||
|
String fullname,
|
||||||
|
String email,
|
||||||
|
String username,
|
||||||
|
String password
|
||||||
|
) {
|
||||||
|
this.fullname = fullname;
|
||||||
|
this.email = email;
|
||||||
|
this.username = username;
|
||||||
|
this.password = password;
|
||||||
|
this.roles = List.of(Role.USER);
|
||||||
|
}
|
||||||
|
|
||||||
|
public UserDTO(
|
||||||
|
String fullname,
|
||||||
|
String email,
|
||||||
|
String username,
|
||||||
|
String password,
|
||||||
|
List<Role> roles
|
||||||
|
) {
|
||||||
|
this.fullname = fullname;
|
||||||
|
this.email = email;
|
||||||
|
this.username = username;
|
||||||
|
this.password = password;
|
||||||
|
this.roles = roles;
|
||||||
|
}
|
||||||
|
|
||||||
|
public UserDTO(User entity) {
|
||||||
|
this.id = entity.getId();
|
||||||
|
this.fullname = entity.getFullname();
|
||||||
|
this.email = entity.getEmail();
|
||||||
|
this.username = entity.getUsername();
|
||||||
|
this.password = entity.getPassword();
|
||||||
|
this.roles = entity.getRoles();
|
||||||
|
}
|
||||||
|
|
||||||
|
public User toEntity() {
|
||||||
|
return new User(
|
||||||
|
this.id,
|
||||||
|
this.fullname,
|
||||||
|
this.email,
|
||||||
|
this.username,
|
||||||
|
this.password,
|
||||||
|
Objects.nonNull(this.roles) ? this.roles.stream()
|
||||||
|
.map(role -> role.getDescription())
|
||||||
|
.collect(Collectors.joining("&")) : Role.USER.getDescription()
|
||||||
|
);
|
||||||
|
}
|
||||||
|
|
||||||
|
@JsonIgnore
|
||||||
|
@Override
|
||||||
|
public Collection<? extends GrantedAuthority> getAuthorities() {
|
||||||
|
return this.roles.stream()
|
||||||
|
.map(role -> new SimpleGrantedAuthority(role.getDescription()))
|
||||||
|
.collect(Collectors.toList());
|
||||||
|
}
|
||||||
|
|
||||||
|
@JsonIgnore
|
||||||
|
@Override
|
||||||
|
public boolean isAccountNonExpired() {
|
||||||
|
return true;
|
||||||
|
}
|
||||||
|
|
||||||
|
@JsonIgnore
|
||||||
|
@Override
|
||||||
|
public boolean isAccountNonLocked() {
|
||||||
|
return true;
|
||||||
|
}
|
||||||
|
|
||||||
|
@JsonIgnore
|
||||||
|
@Override
|
||||||
|
public boolean isCredentialsNonExpired() {
|
||||||
|
return true;
|
||||||
|
}
|
||||||
|
|
||||||
|
@JsonIgnore
|
||||||
|
@Override
|
||||||
|
public boolean isEnabled() {
|
||||||
|
return true;
|
||||||
|
}
|
||||||
|
|
||||||
|
public UserDTO toResponse() {
|
||||||
|
return UserDTO.builder()
|
||||||
|
.fullname(this.fullname)
|
||||||
|
.email(this.email)
|
||||||
|
.username(this.username)
|
||||||
|
.build();
|
||||||
|
}
|
||||||
|
|
||||||
|
public UserDTO toResponse(TokenDTO accessToken, TokenDTO refreshToken) {
|
||||||
|
return UserDTO.builder()
|
||||||
|
.id(this.id)
|
||||||
|
.fullname(this.fullname)
|
||||||
|
.email(this.email)
|
||||||
|
.username(this.username)
|
||||||
|
.roles(this.roles)
|
||||||
|
.accessToken(accessToken)
|
||||||
|
.refreshToken(refreshToken)
|
||||||
|
.build();
|
||||||
|
}
|
||||||
|
}
|
||||||
@@ -0,0 +1,13 @@
|
|||||||
|
package com.hideyoshi.backendportfolio.base.user.repo;
|
||||||
|
|
||||||
|
import com.hideyoshi.backendportfolio.base.user.entity.User;
|
||||||
|
import org.springframework.data.jpa.repository.JpaRepository;
|
||||||
|
import org.springframework.stereotype.Repository;
|
||||||
|
|
||||||
|
import java.util.Optional;
|
||||||
|
|
||||||
|
@Repository
|
||||||
|
public interface UserRepository extends JpaRepository<User, Long> {
|
||||||
|
Optional<User> findByUsername(String username);
|
||||||
|
Optional<User> findByEmail(String email);
|
||||||
|
}
|
||||||
@@ -0,0 +1,26 @@
|
|||||||
|
package com.hideyoshi.backendportfolio.base.user.service;
|
||||||
|
|
||||||
|
import com.hideyoshi.backendportfolio.base.user.model.UserDTO;
|
||||||
|
import org.springframework.security.core.userdetails.UserDetailsService;
|
||||||
|
|
||||||
|
import javax.validation.Valid;
|
||||||
|
import java.util.List;
|
||||||
|
|
||||||
|
public interface UserService extends UserDetailsService {
|
||||||
|
|
||||||
|
UserDTO saveUser(@Valid UserDTO user);
|
||||||
|
|
||||||
|
void alterUser(Long id, @Valid UserDTO user);
|
||||||
|
|
||||||
|
void deleteUser(Long id);
|
||||||
|
|
||||||
|
void addRoleToUser(Long id, String roleName);
|
||||||
|
|
||||||
|
void removeRoleFromUser(Long id, String roleName);
|
||||||
|
|
||||||
|
UserDTO getUser(Long id);
|
||||||
|
|
||||||
|
UserDTO getUser(String username);
|
||||||
|
|
||||||
|
List<UserDTO> getUsers();
|
||||||
|
}
|
||||||
@@ -0,0 +1,146 @@
|
|||||||
|
package com.hideyoshi.backendportfolio.base.user.service;
|
||||||
|
|
||||||
|
import com.hideyoshi.backendportfolio.base.user.entity.Role;
|
||||||
|
import com.hideyoshi.backendportfolio.base.user.entity.User;
|
||||||
|
import com.hideyoshi.backendportfolio.base.user.model.UserDTO;
|
||||||
|
import com.hideyoshi.backendportfolio.base.user.repo.UserRepository;
|
||||||
|
import com.hideyoshi.backendportfolio.util.exception.BadRequestException;
|
||||||
|
import lombok.RequiredArgsConstructor;
|
||||||
|
import lombok.extern.log4j.Log4j2;
|
||||||
|
import org.springframework.security.core.userdetails.UserDetails;
|
||||||
|
import org.springframework.security.crypto.password.PasswordEncoder;
|
||||||
|
import org.springframework.stereotype.Service;
|
||||||
|
|
||||||
|
import javax.transaction.Transactional;
|
||||||
|
import javax.validation.Valid;
|
||||||
|
import java.util.List;
|
||||||
|
import java.util.Objects;
|
||||||
|
import java.util.stream.Collectors;
|
||||||
|
|
||||||
|
@Log4j2
|
||||||
|
@Service
|
||||||
|
@Transactional
|
||||||
|
@RequiredArgsConstructor
|
||||||
|
public class UserServiceImpl implements UserService {
|
||||||
|
|
||||||
|
private final UserRepository userRepo;
|
||||||
|
|
||||||
|
private final PasswordEncoder passwordEncoder;
|
||||||
|
|
||||||
|
@Override
|
||||||
|
public UserDTO saveUser(@Valid UserDTO user) {
|
||||||
|
|
||||||
|
this.userRepo.findByUsername(user.getUsername()).ifPresent( userOnDB -> {
|
||||||
|
throw new BadRequestException(String.format("User %s already exists. Try another UserName.", userOnDB.getUsername()));
|
||||||
|
});
|
||||||
|
|
||||||
|
log.info(String.format("Saving to the database user of name: %s", user.getFullname()));
|
||||||
|
|
||||||
|
user.setPassword(passwordEncoder.encode(user.getPassword()));
|
||||||
|
UserDTO userSaved = new UserDTO(userRepo.save(user.toEntity()));
|
||||||
|
|
||||||
|
if (!userSaved.getRoles().contains(Role.USER)) {
|
||||||
|
userSaved.getRoles().add(Role.USER);
|
||||||
|
}
|
||||||
|
|
||||||
|
return userSaved;
|
||||||
|
}
|
||||||
|
|
||||||
|
@Override
|
||||||
|
public void alterUser(Long id, @Valid UserDTO user) {
|
||||||
|
|
||||||
|
this.userRepo.findById(id).ifPresentOrElse( userOnDB -> {
|
||||||
|
User userToSave = user.toEntity();
|
||||||
|
userToSave.setId(userOnDB.getId());
|
||||||
|
userRepo.save(userToSave);
|
||||||
|
}, () -> {
|
||||||
|
throw new BadRequestException(String.format("User {} doesn't exist.", user.getUsername()));
|
||||||
|
});
|
||||||
|
}
|
||||||
|
|
||||||
|
@Override
|
||||||
|
public void deleteUser(Long id) {
|
||||||
|
|
||||||
|
this.userRepo.findById(id).ifPresentOrElse( userOnDB -> {
|
||||||
|
this.userRepo.delete(userOnDB);
|
||||||
|
}, () -> {
|
||||||
|
throw new BadRequestException("User doesn't exist.");
|
||||||
|
});
|
||||||
|
|
||||||
|
}
|
||||||
|
|
||||||
|
@Override
|
||||||
|
public void addRoleToUser(Long id, String roleName) {
|
||||||
|
|
||||||
|
UserDTO userOnDB = this.getUser(id);
|
||||||
|
Role newAuthority = Role.byValue(roleName);
|
||||||
|
|
||||||
|
List<Role> roles = userOnDB.getRoles();
|
||||||
|
if (Objects.nonNull(newAuthority) && !roles.contains(newAuthority)) {
|
||||||
|
|
||||||
|
log.info(String.format("Adding to user %s the role %s",
|
||||||
|
userOnDB.getUsername(), newAuthority.getDescription()));
|
||||||
|
|
||||||
|
if (roles.add(newAuthority)) {
|
||||||
|
userOnDB.setRoles(roles);
|
||||||
|
this.alterUser(userOnDB.getId(), userOnDB);
|
||||||
|
}
|
||||||
|
|
||||||
|
}
|
||||||
|
|
||||||
|
}
|
||||||
|
|
||||||
|
@Override
|
||||||
|
public void removeRoleFromUser(Long id, String roleName) {
|
||||||
|
|
||||||
|
UserDTO userOnDB = this.getUser(id);
|
||||||
|
Role toDeleteAuthority = Role.byValue(roleName);
|
||||||
|
|
||||||
|
List<Role> roles = userOnDB.getRoles();
|
||||||
|
if (!roles.isEmpty()) {
|
||||||
|
|
||||||
|
log.info(String.format("Removing from user %s the role %s",
|
||||||
|
userOnDB.getUsername(), toDeleteAuthority.getDescription()));
|
||||||
|
|
||||||
|
roles = roles.stream()
|
||||||
|
.filter(role -> !role.equals(toDeleteAuthority))
|
||||||
|
.collect(Collectors.toList());
|
||||||
|
userOnDB.setRoles(roles);
|
||||||
|
this.alterUser(userOnDB.getId(), userOnDB);
|
||||||
|
}
|
||||||
|
}
|
||||||
|
|
||||||
|
@Override
|
||||||
|
public UserDTO getUser(Long id) {
|
||||||
|
log.info(String.format("Fetching user with id: %o", id));
|
||||||
|
|
||||||
|
return new UserDTO(
|
||||||
|
userRepo.findById(id)
|
||||||
|
.orElseThrow(() -> new BadRequestException("User Not Found. Please create an Account."))
|
||||||
|
);
|
||||||
|
}
|
||||||
|
|
||||||
|
@Override
|
||||||
|
public UserDTO getUser(String username) {
|
||||||
|
log.info(String.format("Fetching user: %s", username));
|
||||||
|
|
||||||
|
return new UserDTO(
|
||||||
|
userRepo.findByUsername(username)
|
||||||
|
.orElseThrow(() -> new BadRequestException("User Not Found. Please create an Account."))
|
||||||
|
);
|
||||||
|
}
|
||||||
|
|
||||||
|
@Override
|
||||||
|
public List<UserDTO> getUsers() {
|
||||||
|
log.info("Fetching all users.");
|
||||||
|
|
||||||
|
return userRepo.findAll().stream()
|
||||||
|
.map(user -> (new UserDTO(user)).toResponse())
|
||||||
|
.collect(Collectors.toList());
|
||||||
|
}
|
||||||
|
|
||||||
|
@Override
|
||||||
|
public UserDetails loadUserByUsername(String username) {
|
||||||
|
return this.getUser(username);
|
||||||
|
}
|
||||||
|
}
|
||||||
@@ -0,0 +1,13 @@
|
|||||||
|
package com.hideyoshi.backendportfolio.util.exception;
|
||||||
|
|
||||||
|
import org.springframework.http.HttpStatus;
|
||||||
|
import org.springframework.web.bind.annotation.ResponseStatus;
|
||||||
|
|
||||||
|
@ResponseStatus(HttpStatus.FORBIDDEN)
|
||||||
|
public class AuthenticationInvalidException extends RuntimeException {
|
||||||
|
|
||||||
|
public AuthenticationInvalidException(String message) {
|
||||||
|
super(message);
|
||||||
|
}
|
||||||
|
|
||||||
|
}
|
||||||
@@ -0,0 +1,15 @@
|
|||||||
|
package com.hideyoshi.backendportfolio.util.exception;
|
||||||
|
|
||||||
|
import java.time.LocalDateTime;
|
||||||
|
|
||||||
|
public class AuthenticationInvalidExceptionDetails extends ExceptionDetails{
|
||||||
|
|
||||||
|
public AuthenticationInvalidExceptionDetails(
|
||||||
|
String title,
|
||||||
|
Integer status,
|
||||||
|
String details,
|
||||||
|
String developerMessage,
|
||||||
|
LocalDateTime timestamp) {
|
||||||
|
super(title, status, details, developerMessage, timestamp);
|
||||||
|
}
|
||||||
|
}
|
||||||
@@ -0,0 +1,11 @@
|
|||||||
|
package com.hideyoshi.backendportfolio.util.exception;
|
||||||
|
|
||||||
|
import org.springframework.http.HttpStatus;
|
||||||
|
import org.springframework.web.bind.annotation.ResponseStatus;
|
||||||
|
|
||||||
|
@ResponseStatus(HttpStatus.BAD_REQUEST)
|
||||||
|
public class BadRequestException extends RuntimeException{
|
||||||
|
public BadRequestException(String message) {
|
||||||
|
super(message);
|
||||||
|
}
|
||||||
|
}
|
||||||
@@ -0,0 +1,13 @@
|
|||||||
|
package com.hideyoshi.backendportfolio.util.exception;
|
||||||
|
|
||||||
|
import java.time.LocalDateTime;
|
||||||
|
|
||||||
|
public class BadRequestExceptionDetails extends ExceptionDetails {
|
||||||
|
|
||||||
|
public BadRequestExceptionDetails(final String title, final Integer status,
|
||||||
|
final String details, final String developerMessage,
|
||||||
|
final LocalDateTime timestamp) {
|
||||||
|
super(title, status, details, developerMessage, timestamp);
|
||||||
|
}
|
||||||
|
|
||||||
|
}
|
||||||
@@ -0,0 +1,30 @@
|
|||||||
|
package com.hideyoshi.backendportfolio.util.exception;
|
||||||
|
|
||||||
|
import lombok.Getter;
|
||||||
|
import lombok.Setter;
|
||||||
|
|
||||||
|
import java.time.LocalDateTime;
|
||||||
|
|
||||||
|
@Getter
|
||||||
|
@Setter
|
||||||
|
public class ExceptionDetails {
|
||||||
|
|
||||||
|
protected String title;
|
||||||
|
|
||||||
|
protected Integer status;
|
||||||
|
|
||||||
|
protected String details;
|
||||||
|
|
||||||
|
protected String developerMessage;
|
||||||
|
|
||||||
|
protected LocalDateTime timestamp;
|
||||||
|
|
||||||
|
public ExceptionDetails(final String title, final Integer status, final String details, final String developerMessage, final LocalDateTime timestamp) {
|
||||||
|
this.title = title;
|
||||||
|
this.status = status;
|
||||||
|
this.details = details;
|
||||||
|
this.developerMessage = developerMessage;
|
||||||
|
this.timestamp = timestamp;
|
||||||
|
}
|
||||||
|
|
||||||
|
}
|
||||||
@@ -0,0 +1,25 @@
|
|||||||
|
package com.hideyoshi.backendportfolio.util.exception;
|
||||||
|
|
||||||
|
import lombok.Getter;
|
||||||
|
import lombok.Setter;
|
||||||
|
|
||||||
|
import java.time.LocalDateTime;
|
||||||
|
|
||||||
|
@Getter
|
||||||
|
@Setter
|
||||||
|
public class ValidationExceptionDetails extends ExceptionDetails {
|
||||||
|
|
||||||
|
private final String fields;
|
||||||
|
|
||||||
|
private final String fieldsMessage;
|
||||||
|
|
||||||
|
public ValidationExceptionDetails(final String title, final int status,
|
||||||
|
final String details, final String developerMessage,
|
||||||
|
final LocalDateTime timestamp, final String fields,
|
||||||
|
final String fieldsMessage) {
|
||||||
|
super(title, status, details, developerMessage, timestamp);
|
||||||
|
this.fields = fields;
|
||||||
|
this.fieldsMessage = fieldsMessage;
|
||||||
|
}
|
||||||
|
|
||||||
|
}
|
||||||
@@ -0,0 +1,14 @@
|
|||||||
|
package com.hideyoshi.backendportfolio.util.guard;
|
||||||
|
|
||||||
|
import java.lang.annotation.*;
|
||||||
|
|
||||||
|
@Target( ElementType.METHOD )
|
||||||
|
@Retention( RetentionPolicy.RUNTIME )
|
||||||
|
@Documented
|
||||||
|
public @interface UserResourceGuard {
|
||||||
|
|
||||||
|
String denialMessage() default "Operation not permitted. You don't have access to this Resource.";
|
||||||
|
|
||||||
|
UserResourceGuardEnum accessType();
|
||||||
|
|
||||||
|
}
|
||||||
@@ -0,0 +1,111 @@
|
|||||||
|
package com.hideyoshi.backendportfolio.util.guard;
|
||||||
|
|
||||||
|
import com.fasterxml.jackson.databind.ObjectMapper;
|
||||||
|
import com.hideyoshi.backendportfolio.base.user.entity.Role;
|
||||||
|
import com.hideyoshi.backendportfolio.base.user.model.UserDTO;
|
||||||
|
import com.hideyoshi.backendportfolio.base.user.service.UserService;
|
||||||
|
import org.springframework.security.core.authority.SimpleGrantedAuthority;
|
||||||
|
import org.springframework.security.core.context.SecurityContextHolder;
|
||||||
|
import org.springframework.web.servlet.HandlerMapping;
|
||||||
|
|
||||||
|
import javax.servlet.http.HttpServletRequest;
|
||||||
|
import java.util.HashMap;
|
||||||
|
|
||||||
|
public enum UserResourceGuardEnum {
|
||||||
|
|
||||||
|
USER("user") {
|
||||||
|
@Override
|
||||||
|
public Boolean hasAccess(
|
||||||
|
UserService userService,
|
||||||
|
ObjectMapper objectMapper,
|
||||||
|
HttpServletRequest request) {
|
||||||
|
return justUser(userService, objectMapper, request);
|
||||||
|
}
|
||||||
|
},
|
||||||
|
|
||||||
|
SAME_USER("same_user") {
|
||||||
|
@Override
|
||||||
|
public Boolean hasAccess(
|
||||||
|
UserService userService,
|
||||||
|
ObjectMapper objectMapper,
|
||||||
|
HttpServletRequest request) {
|
||||||
|
return sameUser(userService, objectMapper, request);
|
||||||
|
}
|
||||||
|
},
|
||||||
|
|
||||||
|
ADMIN_USER("admin_user") {
|
||||||
|
@Override
|
||||||
|
public Boolean hasAccess(
|
||||||
|
UserService userService,
|
||||||
|
ObjectMapper objectMapper,
|
||||||
|
HttpServletRequest request) {
|
||||||
|
return adminUser(userService, objectMapper, request);
|
||||||
|
}
|
||||||
|
},
|
||||||
|
|
||||||
|
OPEN("open") {
|
||||||
|
@Override
|
||||||
|
public Boolean hasAccess(
|
||||||
|
UserService userService,
|
||||||
|
ObjectMapper objectMapper,
|
||||||
|
HttpServletRequest request) {
|
||||||
|
return openAccess(userService, objectMapper, request);
|
||||||
|
}
|
||||||
|
};
|
||||||
|
|
||||||
|
private final String accessType;
|
||||||
|
|
||||||
|
UserResourceGuardEnum(String accessType) {
|
||||||
|
this.accessType = accessType;
|
||||||
|
}
|
||||||
|
|
||||||
|
public abstract Boolean hasAccess(
|
||||||
|
UserService userService,
|
||||||
|
ObjectMapper objectMapper,
|
||||||
|
HttpServletRequest request);
|
||||||
|
|
||||||
|
public String getAccessType() {
|
||||||
|
return this.accessType;
|
||||||
|
}
|
||||||
|
|
||||||
|
public static UserResourceGuardEnum byValue(String accessType) {
|
||||||
|
for (UserResourceGuardEnum o : values()) {
|
||||||
|
if (o.getAccessType().equals(accessType)) {
|
||||||
|
return o;
|
||||||
|
}
|
||||||
|
}
|
||||||
|
throw new IllegalArgumentException("Argument not valid.");
|
||||||
|
}
|
||||||
|
|
||||||
|
private static boolean justUser(UserService userService, ObjectMapper objectMapper, HttpServletRequest request) {
|
||||||
|
|
||||||
|
String username = (String) SecurityContextHolder.getContext().getAuthentication().getPrincipal();
|
||||||
|
UserDTO userLogged = userService.getUser(username);
|
||||||
|
|
||||||
|
return userLogged.getAuthorities().contains(new SimpleGrantedAuthority(Role.USER.getDescription()));
|
||||||
|
}
|
||||||
|
|
||||||
|
private static boolean sameUser(UserService userService, ObjectMapper objectMapper, HttpServletRequest request) {
|
||||||
|
String username = (String) SecurityContextHolder.getContext().getAuthentication().getPrincipal();
|
||||||
|
UserDTO userLogged = userService.getUser(username);
|
||||||
|
|
||||||
|
Object requestPathVariable = request.getAttribute(HandlerMapping.URI_TEMPLATE_VARIABLES_ATTRIBUTE);
|
||||||
|
HashMap<String, String> pathVariable = objectMapper.convertValue(requestPathVariable, HashMap.class);
|
||||||
|
UserDTO userInfo = userService.getUser(Long.parseLong(pathVariable.get("id")));
|
||||||
|
|
||||||
|
return userLogged.getUsername().equals(userInfo.getUsername());
|
||||||
|
|
||||||
|
}
|
||||||
|
|
||||||
|
private static boolean adminUser(UserService userService, ObjectMapper objectMapper, HttpServletRequest request) {
|
||||||
|
String username = (String) SecurityContextHolder.getContext().getAuthentication().getPrincipal();
|
||||||
|
UserDTO userLogged = userService.getUser(username);
|
||||||
|
|
||||||
|
return userLogged.getAuthorities().contains(new SimpleGrantedAuthority(Role.ADMIN.getDescription()));
|
||||||
|
}
|
||||||
|
|
||||||
|
private static Boolean openAccess(UserService userService, ObjectMapper objectMapper, HttpServletRequest request) {
|
||||||
|
return true;
|
||||||
|
}
|
||||||
|
|
||||||
|
}
|
||||||
@@ -0,0 +1,22 @@
|
|||||||
|
package com.hideyoshi.backendportfolio.util.guard;
|
||||||
|
|
||||||
|
import com.hideyoshi.backendportfolio.base.user.model.UserDTO;
|
||||||
|
import org.springframework.security.core.context.SecurityContextHolder;
|
||||||
|
|
||||||
|
import javax.validation.ConstraintValidator;
|
||||||
|
import javax.validation.ConstraintValidatorContext;
|
||||||
|
|
||||||
|
public class UserResourceValidator implements ConstraintValidator<UserResourceGuard, UserDTO> {
|
||||||
|
|
||||||
|
@Override
|
||||||
|
public void initialize(UserResourceGuard constraintAnnotation) {
|
||||||
|
ConstraintValidator.super.initialize(constraintAnnotation);
|
||||||
|
}
|
||||||
|
|
||||||
|
@Override
|
||||||
|
public boolean isValid(UserDTO userDTO, ConstraintValidatorContext constraintValidatorContext) {
|
||||||
|
System.out.println(SecurityContextHolder.getContext().getAuthentication());
|
||||||
|
return false;
|
||||||
|
}
|
||||||
|
|
||||||
|
}
|
||||||
@@ -0,0 +1,84 @@
|
|||||||
|
package com.hideyoshi.backendportfolio.util.handler;
|
||||||
|
|
||||||
|
import com.hideyoshi.backendportfolio.util.exception.*;
|
||||||
|
import lombok.extern.log4j.Log4j2;
|
||||||
|
import org.springframework.http.HttpHeaders;
|
||||||
|
import org.springframework.http.HttpStatus;
|
||||||
|
import org.springframework.http.ResponseEntity;
|
||||||
|
import org.springframework.lang.Nullable;
|
||||||
|
import org.springframework.validation.FieldError;
|
||||||
|
import org.springframework.web.bind.MethodArgumentNotValidException;
|
||||||
|
import org.springframework.web.bind.annotation.ControllerAdvice;
|
||||||
|
import org.springframework.web.bind.annotation.ExceptionHandler;
|
||||||
|
import org.springframework.web.context.request.WebRequest;
|
||||||
|
import org.springframework.web.servlet.mvc.method.annotation.ResponseEntityExceptionHandler;
|
||||||
|
|
||||||
|
import java.time.LocalDateTime;
|
||||||
|
import java.util.List;
|
||||||
|
import java.util.Objects;
|
||||||
|
import java.util.stream.Collectors;
|
||||||
|
|
||||||
|
@Log4j2
|
||||||
|
@ControllerAdvice
|
||||||
|
public class RestExceptionHandler extends ResponseEntityExceptionHandler {
|
||||||
|
|
||||||
|
@ExceptionHandler(BadRequestException.class)
|
||||||
|
public ResponseEntity<BadRequestExceptionDetails> handleBadRequest(final BadRequestException exception) {
|
||||||
|
return new ResponseEntity<>(
|
||||||
|
new BadRequestExceptionDetails("Bad Request Exception, Check the Documentation",
|
||||||
|
HttpStatus.BAD_REQUEST.value(), exception.getMessage(),
|
||||||
|
exception.getClass().getName(), LocalDateTime.now()),
|
||||||
|
HttpStatus.BAD_REQUEST);
|
||||||
|
}
|
||||||
|
|
||||||
|
@ExceptionHandler(AuthenticationInvalidException.class)
|
||||||
|
public ResponseEntity<AuthenticationInvalidExceptionDetails> handleBadRequest(final AuthenticationInvalidException exception) {
|
||||||
|
return new ResponseEntity<>(
|
||||||
|
new AuthenticationInvalidExceptionDetails("Authentication Failed. Check your credentials.",
|
||||||
|
HttpStatus.FORBIDDEN.value(), exception.getMessage(),
|
||||||
|
exception.getClass().getName(), LocalDateTime.now()),
|
||||||
|
HttpStatus.FORBIDDEN);
|
||||||
|
}
|
||||||
|
|
||||||
|
@Override
|
||||||
|
protected ResponseEntity<Object> handleMethodArgumentNotValid(
|
||||||
|
final MethodArgumentNotValidException exception, final HttpHeaders headers, final HttpStatus status, final WebRequest request) {
|
||||||
|
|
||||||
|
final List<FieldError> fieldErrors = exception.getBindingResult().getFieldErrors();
|
||||||
|
final String fields = fieldErrors.stream()
|
||||||
|
.map(FieldError::getField)
|
||||||
|
.collect(Collectors.joining(", "));
|
||||||
|
|
||||||
|
final String fieldsMessage = fieldErrors.stream()
|
||||||
|
.map(FieldError::getDefaultMessage)
|
||||||
|
.collect(Collectors.joining(", "));
|
||||||
|
|
||||||
|
return new ResponseEntity<>(
|
||||||
|
new ValidationExceptionDetails("Bad Request Exception, Invalid Fields",
|
||||||
|
HttpStatus.BAD_REQUEST.value(), "Check the field(s)",
|
||||||
|
exception.getClass().getName(), LocalDateTime.now(),
|
||||||
|
fields, fieldsMessage),
|
||||||
|
HttpStatus.BAD_REQUEST);
|
||||||
|
}
|
||||||
|
|
||||||
|
@Override
|
||||||
|
protected ResponseEntity<Object> handleExceptionInternal(final Exception exception, @Nullable final Object body, final HttpHeaders headers, final HttpStatus status, final WebRequest request) {
|
||||||
|
|
||||||
|
String errorMessage;
|
||||||
|
if (Objects.nonNull(exception.getCause())) {
|
||||||
|
errorMessage = exception.getCause().getMessage();
|
||||||
|
} else {
|
||||||
|
errorMessage = exception.getMessage();
|
||||||
|
}
|
||||||
|
|
||||||
|
final ExceptionDetails exceptionDetails = new ExceptionDetails(
|
||||||
|
errorMessage,
|
||||||
|
status.value(),
|
||||||
|
exception.getMessage(),
|
||||||
|
exception.getClass().getName(),
|
||||||
|
LocalDateTime.now()
|
||||||
|
);
|
||||||
|
|
||||||
|
return new ResponseEntity<>(exceptionDetails, headers, status);
|
||||||
|
}
|
||||||
|
}
|
||||||
@@ -0,0 +1,34 @@
|
|||||||
|
package com.hideyoshi.backendportfolio.util.validator.email.unique;
|
||||||
|
|
||||||
|
import com.hideyoshi.backendportfolio.base.user.repo.UserRepository;
|
||||||
|
import lombok.RequiredArgsConstructor;
|
||||||
|
|
||||||
|
import javax.validation.ConstraintValidator;
|
||||||
|
import javax.validation.ConstraintValidatorContext;
|
||||||
|
import java.util.concurrent.atomic.AtomicReference;
|
||||||
|
|
||||||
|
@RequiredArgsConstructor
|
||||||
|
public class EmailUnique implements ConstraintValidator<UniqueEmail, String> {
|
||||||
|
|
||||||
|
private final UserRepository userRepository;
|
||||||
|
|
||||||
|
@Override
|
||||||
|
public void initialize(UniqueEmail constraintAnnotation) {
|
||||||
|
}
|
||||||
|
|
||||||
|
@Override
|
||||||
|
public boolean isValid(String email, ConstraintValidatorContext constraintValidatorContext) {
|
||||||
|
|
||||||
|
AtomicReference<Boolean> emailValid = new AtomicReference();
|
||||||
|
this.userRepository.findByEmail(email).ifPresentOrElse(
|
||||||
|
(value) -> {
|
||||||
|
emailValid.set(false);
|
||||||
|
},
|
||||||
|
() -> {
|
||||||
|
emailValid.set(true);
|
||||||
|
}
|
||||||
|
);
|
||||||
|
|
||||||
|
return emailValid.get();
|
||||||
|
}
|
||||||
|
}
|
||||||
@@ -0,0 +1,24 @@
|
|||||||
|
package com.hideyoshi.backendportfolio.util.validator.email.unique;
|
||||||
|
|
||||||
|
import javax.validation.Constraint;
|
||||||
|
import javax.validation.Payload;
|
||||||
|
import java.lang.annotation.Documented;
|
||||||
|
import java.lang.annotation.Retention;
|
||||||
|
import java.lang.annotation.Target;
|
||||||
|
|
||||||
|
import static java.lang.annotation.ElementType.*;
|
||||||
|
import static java.lang.annotation.RetentionPolicy.RUNTIME;
|
||||||
|
|
||||||
|
@Target({TYPE, FIELD, ANNOTATION_TYPE})
|
||||||
|
@Retention(RUNTIME)
|
||||||
|
@Constraint(validatedBy = EmailUnique.class)
|
||||||
|
@Documented
|
||||||
|
public @interface UniqueEmail {
|
||||||
|
|
||||||
|
String message() default "Email taken, please choose another";
|
||||||
|
|
||||||
|
Class<?>[] groups() default {};
|
||||||
|
|
||||||
|
Class<? extends Payload>[] payload() default {};
|
||||||
|
|
||||||
|
}
|
||||||
@@ -0,0 +1,32 @@
|
|||||||
|
package com.hideyoshi.backendportfolio.util.validator.email.valid;
|
||||||
|
|
||||||
|
import lombok.RequiredArgsConstructor;
|
||||||
|
|
||||||
|
import javax.validation.ConstraintValidator;
|
||||||
|
import javax.validation.ConstraintValidatorContext;
|
||||||
|
import java.util.regex.Matcher;
|
||||||
|
import java.util.regex.Pattern;
|
||||||
|
|
||||||
|
@RequiredArgsConstructor
|
||||||
|
public class EmailValidator implements ConstraintValidator<ValidEmail, String> {
|
||||||
|
|
||||||
|
private Pattern pattern;
|
||||||
|
private Matcher matcher;
|
||||||
|
private static final String EMAIL_PATTERN = "^[_A-Za-z\\d-+]+(.[_A-Za-z\\d-]+)*@+[A-Za-z\\d-]+(.[A-Za-z\\d]+)*(.[A-Za-z]{2,})$";
|
||||||
|
|
||||||
|
@Override
|
||||||
|
public void initialize(ValidEmail constraintAnnotation) {
|
||||||
|
}
|
||||||
|
|
||||||
|
@Override
|
||||||
|
public boolean isValid(String email, ConstraintValidatorContext context){
|
||||||
|
return (validateEmail(email));
|
||||||
|
}
|
||||||
|
|
||||||
|
private boolean validateEmail(String email) {
|
||||||
|
pattern = Pattern.compile(EMAIL_PATTERN);
|
||||||
|
matcher = pattern.matcher(email);
|
||||||
|
|
||||||
|
return matcher.matches();
|
||||||
|
}
|
||||||
|
}
|
||||||
@@ -0,0 +1,25 @@
|
|||||||
|
package com.hideyoshi.backendportfolio.util.validator.email.valid;
|
||||||
|
|
||||||
|
import com.hideyoshi.backendportfolio.util.validator.email.valid.EmailValidator;
|
||||||
|
|
||||||
|
import javax.validation.Constraint;
|
||||||
|
import javax.validation.Payload;
|
||||||
|
import java.lang.annotation.Documented;
|
||||||
|
import java.lang.annotation.Retention;
|
||||||
|
import java.lang.annotation.Target;
|
||||||
|
|
||||||
|
import static java.lang.annotation.ElementType.*;
|
||||||
|
import static java.lang.annotation.RetentionPolicy.RUNTIME;
|
||||||
|
|
||||||
|
@Target({TYPE, FIELD, ANNOTATION_TYPE})
|
||||||
|
@Retention(RUNTIME)
|
||||||
|
@Constraint(validatedBy = EmailValidator.class)
|
||||||
|
@Documented
|
||||||
|
public @interface ValidEmail {
|
||||||
|
|
||||||
|
String message() default "Invalid email";
|
||||||
|
|
||||||
|
Class<?>[] groups() default {};
|
||||||
|
|
||||||
|
Class<? extends Payload>[] payload() default {};
|
||||||
|
}
|
||||||
@@ -0,0 +1,25 @@
|
|||||||
|
package com.hideyoshi.backendportfolio.util.validator.password;
|
||||||
|
|
||||||
|
import lombok.RequiredArgsConstructor;
|
||||||
|
|
||||||
|
import javax.validation.ConstraintValidator;
|
||||||
|
import javax.validation.ConstraintValidatorContext;
|
||||||
|
import java.util.regex.Pattern;
|
||||||
|
|
||||||
|
@RequiredArgsConstructor
|
||||||
|
public class PasswordValidator implements ConstraintValidator<ValidPassword, String> {
|
||||||
|
|
||||||
|
private final String PASSWORD_PATTERN = "^(?=.*[a-z])(?=.*[A-Z])(?=.*\\d)(?=.*[@$!%*?&])[A-Za-z\\d@$!%*?&]{8,}$";
|
||||||
|
|
||||||
|
@Override
|
||||||
|
public void initialize(ValidPassword constraintAnnotation) {}
|
||||||
|
|
||||||
|
@Override
|
||||||
|
public boolean isValid(String password, ConstraintValidatorContext context) {
|
||||||
|
|
||||||
|
return Pattern.compile(PASSWORD_PATTERN)
|
||||||
|
.matcher(password)
|
||||||
|
.matches();
|
||||||
|
|
||||||
|
}
|
||||||
|
}
|
||||||
@@ -0,0 +1,23 @@
|
|||||||
|
package com.hideyoshi.backendportfolio.util.validator.password;
|
||||||
|
|
||||||
|
import javax.validation.Constraint;
|
||||||
|
import javax.validation.Payload;
|
||||||
|
import java.lang.annotation.Documented;
|
||||||
|
import java.lang.annotation.Retention;
|
||||||
|
import java.lang.annotation.Target;
|
||||||
|
|
||||||
|
import static java.lang.annotation.ElementType.*;
|
||||||
|
import static java.lang.annotation.RetentionPolicy.RUNTIME;
|
||||||
|
|
||||||
|
@Target({TYPE, FIELD, ANNOTATION_TYPE})
|
||||||
|
@Retention(RUNTIME)
|
||||||
|
@Constraint(validatedBy = PasswordValidator.class)
|
||||||
|
@Documented
|
||||||
|
public @interface ValidPassword {
|
||||||
|
|
||||||
|
String message() default "Invalid password";
|
||||||
|
|
||||||
|
Class<?>[] groups() default {};
|
||||||
|
|
||||||
|
Class<? extends Payload>[] payload() default {};
|
||||||
|
}
|
||||||
42
src/main/resources/application.yml
Normal file
42
src/main/resources/application.yml
Normal file
@@ -0,0 +1,42 @@
|
|||||||
|
com:
|
||||||
|
hideyoshi:
|
||||||
|
frontEndPath: ${FRONTEND_PATH}}
|
||||||
|
frontendConnectionType: ${FRONTEND_CONNECTION_TYPE}}
|
||||||
|
tokenSecret: ${TOKEN_SECRET}
|
||||||
|
accessTokenDuration: ${ACCESS_TOKEN_DURATION}
|
||||||
|
refreshTokenDuration: ${REFRESH_TOKEN_DURATION}
|
||||||
|
defaultUser:
|
||||||
|
fullName: ${DEFAULT_USER_FULLNAME}
|
||||||
|
email: ${DEFAULT_USER_EMAIL}
|
||||||
|
username: ${DEFAULT_USER_USERNAME}
|
||||||
|
password: ${DEFAULT_USER_PASSWORD}
|
||||||
|
|
||||||
|
|
||||||
|
server:
|
||||||
|
port: ${PORT}
|
||||||
|
|
||||||
|
spring:
|
||||||
|
|
||||||
|
datasource:
|
||||||
|
url: jdbc:${DATABASE_URL}
|
||||||
|
username: ${DATABASE_USERNAME}
|
||||||
|
password: ${DATABASE_PASSWORD}
|
||||||
|
|
||||||
|
session:
|
||||||
|
store:
|
||||||
|
type: redis
|
||||||
|
persistent: true
|
||||||
|
|
||||||
|
redis:
|
||||||
|
host: ${REDIS_URL}
|
||||||
|
port: ${REDIS_PORT}
|
||||||
|
password: ${REDIS_PASSWORD}
|
||||||
|
|
||||||
|
jpa:
|
||||||
|
open-in-view: false
|
||||||
|
hibernate:
|
||||||
|
ddl-auto: none
|
||||||
|
properties:
|
||||||
|
hibernate:
|
||||||
|
dialect: org.hibernate.dialect.PostgreSQLDialect
|
||||||
|
format_sql: true
|
||||||
@@ -0,0 +1,11 @@
|
|||||||
|
databaseChangeLog:
|
||||||
|
|
||||||
|
- changeSet:
|
||||||
|
id: db-table-model-client
|
||||||
|
author: vitor.h.n.batista@gmail.com
|
||||||
|
changes:
|
||||||
|
- sqlFile:
|
||||||
|
encoding: utf8
|
||||||
|
path: sqls/db-table-model-client.sql
|
||||||
|
relativeToChangelogFile: true
|
||||||
|
dbms: postgresql
|
||||||
@@ -0,0 +1,21 @@
|
|||||||
|
CREATE SCHEMA IF NOT EXISTS auth;
|
||||||
|
|
||||||
|
CREATE SEQUENCE IF NOT EXISTS auth.user_seq
|
||||||
|
INCREMENT 1
|
||||||
|
MINVALUE 1
|
||||||
|
MAXVALUE 9223372036854775807
|
||||||
|
START 1
|
||||||
|
CACHE 1;
|
||||||
|
|
||||||
|
CREATE TABLE IF NOT EXISTS auth.user (
|
||||||
|
id BIGINT NOT NULL DEFAULT NEXTVAL('auth.user_seq'),
|
||||||
|
full_name VARCHAR(255) NOT NULL,
|
||||||
|
email VARCHAR(255) NOT NULL,
|
||||||
|
username VARCHAR(20) NOT NULL,
|
||||||
|
password VARCHAR(100) NOT NULL,
|
||||||
|
roles VARCHAR(50) NOT NULL DEFAULT 'ROLE_USER',
|
||||||
|
|
||||||
|
CONSTRAINT client_primary_key PRIMARY KEY (id),
|
||||||
|
CONSTRAINT client_email_unique UNIQUE (email),
|
||||||
|
CONSTRAINT client_username_unique UNIQUE (username)
|
||||||
|
);
|
||||||
6
src/main/resources/db/changelog/db.changelog-master.yaml
Normal file
6
src/main/resources/db/changelog/db.changelog-master.yaml
Normal file
@@ -0,0 +1,6 @@
|
|||||||
|
|
||||||
|
|
||||||
|
databaseChangeLog:
|
||||||
|
|
||||||
|
- include:
|
||||||
|
file: db/changelog/client/db.changelog-client.yml
|
||||||
@@ -0,0 +1,14 @@
|
|||||||
|
package com.hideyoshi.backendportfolio;
|
||||||
|
|
||||||
|
import org.junit.jupiter.api.Test;
|
||||||
|
import org.springframework.boot.test.autoconfigure.orm.jpa.DataJpaTest;
|
||||||
|
import org.springframework.boot.test.context.SpringBootTest;
|
||||||
|
|
||||||
|
@DataJpaTest
|
||||||
|
class BackendPortfolioApplicationTests {
|
||||||
|
|
||||||
|
@Test
|
||||||
|
void contextLoads() {
|
||||||
|
}
|
||||||
|
|
||||||
|
}
|
||||||
@@ -0,0 +1,70 @@
|
|||||||
|
package com.hideyoshi.backendportfolio.base.user.repo;
|
||||||
|
|
||||||
|
import com.hideyoshi.backendportfolio.base.user.entity.Role;
|
||||||
|
import com.hideyoshi.backendportfolio.base.user.entity.User;
|
||||||
|
import com.hideyoshi.backendportfolio.base.user.model.UserDTO;
|
||||||
|
import lombok.extern.log4j.Log4j2;
|
||||||
|
import org.junit.jupiter.api.Test;
|
||||||
|
import org.springframework.beans.factory.annotation.Autowired;
|
||||||
|
import org.springframework.boot.test.autoconfigure.orm.jpa.DataJpaTest;
|
||||||
|
import org.springframework.boot.test.autoconfigure.orm.jpa.TestEntityManager;
|
||||||
|
|
||||||
|
import java.util.List;
|
||||||
|
import java.util.Optional;
|
||||||
|
|
||||||
|
import static org.assertj.core.api.Assertions.assertThat;
|
||||||
|
|
||||||
|
@Log4j2
|
||||||
|
@DataJpaTest
|
||||||
|
class UserRepositoryTest {
|
||||||
|
|
||||||
|
@Autowired
|
||||||
|
private TestEntityManager entityManager;
|
||||||
|
|
||||||
|
@Autowired
|
||||||
|
private UserRepository underTest;
|
||||||
|
|
||||||
|
@Test
|
||||||
|
void savesUserToDataBase() {
|
||||||
|
// Given
|
||||||
|
User user = this.createEntity();
|
||||||
|
// When
|
||||||
|
User userSaved = this.underTest.save(user);
|
||||||
|
log.info(userSaved.getUsername());
|
||||||
|
// Then
|
||||||
|
assertThat(userSaved).isNotNull();
|
||||||
|
assertThat(userSaved).isEqualTo(user);
|
||||||
|
}
|
||||||
|
|
||||||
|
@Test
|
||||||
|
void canFindsUserByUsername() {
|
||||||
|
// Given
|
||||||
|
User userSaved = this.entityManager.persist(this.createEntity());
|
||||||
|
this.underTest.findAll();
|
||||||
|
// When
|
||||||
|
Optional<User> userOnDB =
|
||||||
|
this.underTest.findByUsername(userSaved.getUsername());
|
||||||
|
// Then
|
||||||
|
assertThat(userOnDB).isNotEmpty();
|
||||||
|
assertThat(userOnDB).hasValue(userSaved);
|
||||||
|
}
|
||||||
|
|
||||||
|
@Test
|
||||||
|
void cannotFindUserByUsername() {
|
||||||
|
// When
|
||||||
|
Optional<User> userOnDB = this.underTest.findByUsername("Batman");
|
||||||
|
// Then
|
||||||
|
assertThat(userOnDB).isEmpty();
|
||||||
|
}
|
||||||
|
|
||||||
|
private User createEntity() {
|
||||||
|
return new UserDTO(
|
||||||
|
"Clark Kent",
|
||||||
|
"superman@gmail.com",
|
||||||
|
"Superman",
|
||||||
|
"password",
|
||||||
|
List.of(Role.USER)
|
||||||
|
).toEntity();
|
||||||
|
}
|
||||||
|
|
||||||
|
}
|
||||||
@@ -0,0 +1,363 @@
|
|||||||
|
package com.hideyoshi.backendportfolio.base.user.service;
|
||||||
|
|
||||||
|
import com.hideyoshi.backendportfolio.base.security.service.AuthService;
|
||||||
|
import com.hideyoshi.backendportfolio.base.user.entity.Role;
|
||||||
|
import com.hideyoshi.backendportfolio.base.user.entity.User;
|
||||||
|
import com.hideyoshi.backendportfolio.base.user.model.UserDTO;
|
||||||
|
import com.hideyoshi.backendportfolio.base.user.repo.UserRepository;
|
||||||
|
import com.hideyoshi.backendportfolio.util.exception.BadRequestException;
|
||||||
|
import org.junit.jupiter.api.BeforeEach;
|
||||||
|
import org.junit.jupiter.api.Test;
|
||||||
|
import org.junit.jupiter.api.extension.ExtendWith;
|
||||||
|
import org.mockito.*;
|
||||||
|
import org.mockito.junit.jupiter.MockitoExtension;
|
||||||
|
import org.springframework.boot.test.autoconfigure.orm.jpa.DataJpaTest;
|
||||||
|
import org.springframework.security.core.userdetails.UserDetails;
|
||||||
|
import org.springframework.security.crypto.bcrypt.BCryptPasswordEncoder;
|
||||||
|
import org.springframework.security.crypto.password.PasswordEncoder;
|
||||||
|
import org.springframework.test.annotation.DirtiesContext;
|
||||||
|
|
||||||
|
import java.util.List;
|
||||||
|
import java.util.Objects;
|
||||||
|
import java.util.Optional;
|
||||||
|
|
||||||
|
import static org.assertj.core.api.AssertionsForClassTypes.assertThat;
|
||||||
|
import static org.junit.jupiter.api.Assertions.*;
|
||||||
|
import static org.mockito.ArgumentMatchers.any;
|
||||||
|
import static org.mockito.Mockito.verify;
|
||||||
|
|
||||||
|
@DataJpaTest
|
||||||
|
@ExtendWith(MockitoExtension.class)
|
||||||
|
@DirtiesContext(classMode= DirtiesContext.ClassMode.AFTER_EACH_TEST_METHOD)
|
||||||
|
class UserServiceImplTest {
|
||||||
|
|
||||||
|
@InjectMocks
|
||||||
|
private UserServiceImpl underTest;
|
||||||
|
|
||||||
|
@Mock
|
||||||
|
private UserRepository userRepository;
|
||||||
|
|
||||||
|
private PasswordEncoder passwordEncoder;
|
||||||
|
|
||||||
|
private AuthService authService;
|
||||||
|
|
||||||
|
|
||||||
|
@BeforeEach
|
||||||
|
void setUp() {
|
||||||
|
this.passwordEncoder = new BCryptPasswordEncoder();
|
||||||
|
this.underTest = new UserServiceImpl(userRepository,passwordEncoder);
|
||||||
|
}
|
||||||
|
|
||||||
|
@Test
|
||||||
|
void canSaveUser() {
|
||||||
|
|
||||||
|
BDDMockito.when(userRepository.findByUsername(ArgumentMatchers.any(String.class)))
|
||||||
|
.thenReturn(Optional.ofNullable(null));
|
||||||
|
|
||||||
|
BDDMockito.when(userRepository.save(ArgumentMatchers.any(User.class)))
|
||||||
|
.thenReturn(createUser().toEntity());
|
||||||
|
|
||||||
|
// Given
|
||||||
|
UserDTO user = this.createUser();
|
||||||
|
// When
|
||||||
|
UserDTO userSaved = this.underTest.saveUser(user);
|
||||||
|
//Then
|
||||||
|
ArgumentCaptor<User> userArgumentCaptor = ArgumentCaptor.forClass(User.class);
|
||||||
|
|
||||||
|
verify(userRepository).save(userArgumentCaptor.capture());
|
||||||
|
assertThat(userArgumentCaptor.getValue()).isEqualTo(user.toEntity());
|
||||||
|
assertThat(userSaved).isInstanceOf(UserDTO.class);
|
||||||
|
}
|
||||||
|
|
||||||
|
@Test
|
||||||
|
void cannotSaveUser() {
|
||||||
|
|
||||||
|
BDDMockito.when(userRepository.findByUsername(ArgumentMatchers.any(String.class)))
|
||||||
|
.thenReturn(Optional.ofNullable(createUser().toEntity()));
|
||||||
|
|
||||||
|
|
||||||
|
// Given
|
||||||
|
UserDTO user = this.createUser();
|
||||||
|
// When
|
||||||
|
//Then
|
||||||
|
assertThrows(
|
||||||
|
BadRequestException.class,
|
||||||
|
() -> {
|
||||||
|
this.underTest.saveUser(user);
|
||||||
|
},
|
||||||
|
"Excepts a BadRequestException to be thrown."
|
||||||
|
);
|
||||||
|
}
|
||||||
|
|
||||||
|
@Test
|
||||||
|
void canAlterUser() {
|
||||||
|
BDDMockito.when(userRepository.findById(ArgumentMatchers.any(Long.class)))
|
||||||
|
.thenReturn(Optional.ofNullable(createUser().toEntity()));
|
||||||
|
|
||||||
|
// Given
|
||||||
|
UserDTO user = this.createUser();
|
||||||
|
// When
|
||||||
|
this.underTest.alterUser(1L, user);
|
||||||
|
//Then
|
||||||
|
ArgumentCaptor<User> userArgumentCaptor = ArgumentCaptor.forClass(User.class);
|
||||||
|
|
||||||
|
verify(userRepository).save(userArgumentCaptor.capture());
|
||||||
|
assertThat(userArgumentCaptor.getValue()).isEqualTo(user.toEntity());
|
||||||
|
}
|
||||||
|
|
||||||
|
@Test
|
||||||
|
void cannotAlterUserDoesntExist() {
|
||||||
|
BDDMockito.when(userRepository.findById(ArgumentMatchers.any(Long.class)))
|
||||||
|
.thenReturn(Optional.ofNullable(null));
|
||||||
|
|
||||||
|
// Given
|
||||||
|
UserDTO user = this.createUser();
|
||||||
|
// When
|
||||||
|
//Then
|
||||||
|
assertThrows(
|
||||||
|
BadRequestException.class,
|
||||||
|
() -> {
|
||||||
|
this.underTest.alterUser(1L, user);
|
||||||
|
},
|
||||||
|
"User doesn't exist."
|
||||||
|
);
|
||||||
|
}
|
||||||
|
|
||||||
|
@Test
|
||||||
|
void canAddRoleToUser() {
|
||||||
|
UserDTO user = this.createUser();
|
||||||
|
|
||||||
|
BDDMockito.when(userRepository.findById(ArgumentMatchers.any(Long.class)))
|
||||||
|
.thenReturn(Optional.ofNullable(user.toEntity()));
|
||||||
|
|
||||||
|
BDDMockito.when(userRepository.findByUsername(ArgumentMatchers.any(String.class)))
|
||||||
|
.thenReturn(Optional.ofNullable(createUser().toEntity()));
|
||||||
|
|
||||||
|
// Given
|
||||||
|
UserDTO userSaved = this.underTest.getUser(user.getUsername());
|
||||||
|
if (!Objects.nonNull(userSaved)) {
|
||||||
|
userSaved = this.underTest.saveUser(user);
|
||||||
|
}
|
||||||
|
// When
|
||||||
|
this.underTest.addRoleToUser(userSaved.getId(), Role.USER.getDescription());
|
||||||
|
// Then
|
||||||
|
userSaved = this.underTest.getUser(userSaved.getUsername());
|
||||||
|
assertTrue(userSaved.getRoles().stream().anyMatch(e -> Role.USER.equals(e)));
|
||||||
|
}
|
||||||
|
|
||||||
|
@Test
|
||||||
|
void cannotAddRoleToUserDoesntExist() {
|
||||||
|
|
||||||
|
BDDMockito.when(userRepository.findById(ArgumentMatchers.any(Long.class)))
|
||||||
|
.thenReturn(Optional.ofNullable(null));
|
||||||
|
|
||||||
|
// Given
|
||||||
|
UserDTO user = this.createUser();
|
||||||
|
// When
|
||||||
|
// Then
|
||||||
|
UserDTO finalUserSaved = user;
|
||||||
|
assertThrows(
|
||||||
|
BadRequestException.class,
|
||||||
|
() -> {
|
||||||
|
this.underTest.addRoleToUser(finalUserSaved.getId(), Role.USER.getDescription());
|
||||||
|
},
|
||||||
|
"User not found. Error while adding role."
|
||||||
|
);
|
||||||
|
}
|
||||||
|
|
||||||
|
@Test
|
||||||
|
void cannotAddRoleToUserRoleDoesntExist() {
|
||||||
|
UserDTO user = this.createUser();
|
||||||
|
|
||||||
|
BDDMockito.when(userRepository.findById(ArgumentMatchers.any(Long.class)))
|
||||||
|
.thenReturn(Optional.ofNullable(user.toEntity()));
|
||||||
|
|
||||||
|
BDDMockito.when(userRepository.findByUsername(ArgumentMatchers.any(String.class)))
|
||||||
|
.thenReturn(Optional.ofNullable(createUser().toEntity()));
|
||||||
|
|
||||||
|
// Given
|
||||||
|
UserDTO userSaved = this.underTest.getUser(user.getUsername());
|
||||||
|
if (!Objects.nonNull(userSaved)) {
|
||||||
|
userSaved = this.underTest.saveUser(user);
|
||||||
|
}
|
||||||
|
// When
|
||||||
|
// Then
|
||||||
|
UserDTO finalUserSaved = userSaved;
|
||||||
|
assertThrows(
|
||||||
|
IllegalArgumentException.class,
|
||||||
|
() -> {
|
||||||
|
this.underTest.addRoleToUser(finalUserSaved.getId(), "BANANA");
|
||||||
|
},
|
||||||
|
"Argument not valid."
|
||||||
|
);
|
||||||
|
}
|
||||||
|
|
||||||
|
@Test
|
||||||
|
void canRemoveRoleFromUser() {
|
||||||
|
UserDTO user = this.createUser();
|
||||||
|
|
||||||
|
BDDMockito.when(userRepository.findByUsername(ArgumentMatchers.any(String.class)))
|
||||||
|
.thenReturn(Optional.ofNullable(user.toEntity()));
|
||||||
|
|
||||||
|
BDDMockito.when(userRepository.findById(ArgumentMatchers.any(Long.class)))
|
||||||
|
.thenReturn(Optional.ofNullable(user.toEntity()));
|
||||||
|
|
||||||
|
BDDMockito.when(userRepository.save(ArgumentMatchers.any(User.class)))
|
||||||
|
.thenReturn(createUser().toEntity());
|
||||||
|
|
||||||
|
// Given
|
||||||
|
UserDTO userSaved = this.underTest.getUser(user.getUsername());
|
||||||
|
if (!Objects.nonNull(userSaved)) {
|
||||||
|
userSaved = this.underTest.saveUser(user);
|
||||||
|
}
|
||||||
|
this.underTest.addRoleToUser(userSaved.getId(), Role.USER.getDescription());
|
||||||
|
// When
|
||||||
|
this.underTest.removeRoleFromUser(userSaved.getId(), Role.USER.getDescription());
|
||||||
|
// Then
|
||||||
|
ArgumentCaptor<User> userArgumentCaptor = ArgumentCaptor.forClass(User.class);
|
||||||
|
|
||||||
|
verify(userRepository).save(userArgumentCaptor.capture());
|
||||||
|
|
||||||
|
assertThat(userArgumentCaptor.getValue()).hasSameClassAs(user.toEntity());
|
||||||
|
assertFalse(userArgumentCaptor.getValue().getRoles().stream().anyMatch(e -> Role.USER.equals(e)));
|
||||||
|
}
|
||||||
|
|
||||||
|
@Test
|
||||||
|
void cannotRemoveRoleFromUserDoesntExist() {
|
||||||
|
UserDTO user = this.createUser();
|
||||||
|
|
||||||
|
BDDMockito.when(userRepository.findById(ArgumentMatchers.any(Long.class)))
|
||||||
|
.thenReturn(Optional.ofNullable(user.toEntity()));
|
||||||
|
|
||||||
|
BDDMockito.when(userRepository.findByUsername(ArgumentMatchers.any(String.class)))
|
||||||
|
.thenReturn(Optional.ofNullable(createUser().toEntity()));
|
||||||
|
|
||||||
|
// Given
|
||||||
|
UserDTO userSaved = this.underTest.getUser(user.getUsername());
|
||||||
|
if (!Objects.nonNull(userSaved)) {
|
||||||
|
userSaved = this.underTest.saveUser(user);
|
||||||
|
}
|
||||||
|
this.underTest.addRoleToUser(userSaved.getId(), Role.USER.getDescription());
|
||||||
|
// When
|
||||||
|
// Then
|
||||||
|
UserDTO finalUserSaved = userSaved;
|
||||||
|
assertThrows(
|
||||||
|
IllegalArgumentException.class,
|
||||||
|
() -> {
|
||||||
|
this.underTest.removeRoleFromUser(finalUserSaved.getId(), "BANANA");
|
||||||
|
},
|
||||||
|
"Argument not valid."
|
||||||
|
);
|
||||||
|
}
|
||||||
|
|
||||||
|
@Test
|
||||||
|
void cannotRemoveRoleFromUserRoleDoesntExist() {
|
||||||
|
// Given
|
||||||
|
UserDTO user = this.createUser();
|
||||||
|
// When
|
||||||
|
// Then
|
||||||
|
UserDTO finalUserSaved = user;
|
||||||
|
assertThrows(
|
||||||
|
BadRequestException.class,
|
||||||
|
() -> {
|
||||||
|
this.underTest.removeRoleFromUser(finalUserSaved.getId(), Role.USER.getDescription());
|
||||||
|
},
|
||||||
|
"User not found. Error while adding role."
|
||||||
|
);
|
||||||
|
}
|
||||||
|
|
||||||
|
@Test
|
||||||
|
void canGetUser() {
|
||||||
|
|
||||||
|
BDDMockito.when(userRepository.findByUsername(ArgumentMatchers.any(String.class)))
|
||||||
|
.thenReturn(Optional.ofNullable(createUser().toEntity()));
|
||||||
|
|
||||||
|
// Given
|
||||||
|
UserDTO user = this.createUser();
|
||||||
|
// When
|
||||||
|
UserDTO userOnDB = this.underTest.getUser(user.getUsername());
|
||||||
|
// Then
|
||||||
|
ArgumentCaptor<String> usernameArgumentCaptor = ArgumentCaptor.forClass(String.class);
|
||||||
|
verify(userRepository).findByUsername(usernameArgumentCaptor.capture());
|
||||||
|
|
||||||
|
assertThat(userOnDB).isNotNull();
|
||||||
|
assertThat(userOnDB).isInstanceOf(UserDTO.class);
|
||||||
|
assertThat(user.getUsername()).isEqualTo(usernameArgumentCaptor.getValue());
|
||||||
|
}
|
||||||
|
|
||||||
|
@Test
|
||||||
|
void cannotGetUser() {
|
||||||
|
|
||||||
|
BDDMockito.when(userRepository.findByUsername(ArgumentMatchers.any(String.class)))
|
||||||
|
.thenReturn(Optional.ofNullable(null));
|
||||||
|
|
||||||
|
// Given
|
||||||
|
UserDTO user = this.createUser();
|
||||||
|
// When
|
||||||
|
//Then
|
||||||
|
assertThrows(
|
||||||
|
BadRequestException.class,
|
||||||
|
() -> {
|
||||||
|
this.underTest.getUser(user.getUsername());
|
||||||
|
},
|
||||||
|
"Excepts a BadRequestException to be thrown."
|
||||||
|
);
|
||||||
|
}
|
||||||
|
|
||||||
|
@Test
|
||||||
|
void canGetUsers() {
|
||||||
|
List<UserDTO> users = this.underTest.getUsers();
|
||||||
|
assertThat(users).isNotNull();
|
||||||
|
}
|
||||||
|
|
||||||
|
@Test
|
||||||
|
void canLoadUserByUsername() {
|
||||||
|
|
||||||
|
BDDMockito.when(userRepository.findByUsername(ArgumentMatchers.any(String.class)))
|
||||||
|
.thenReturn(Optional.ofNullable(createUser().toEntity()));
|
||||||
|
|
||||||
|
// Given
|
||||||
|
UserDTO user = this.createUser();
|
||||||
|
// When
|
||||||
|
UserDTO userOnDB = (UserDTO) this.underTest.loadUserByUsername(user.getUsername());
|
||||||
|
// Then
|
||||||
|
ArgumentCaptor<String> usernameArgumentCaptor = ArgumentCaptor.forClass(String.class);
|
||||||
|
verify(userRepository).findByUsername(usernameArgumentCaptor.capture());
|
||||||
|
|
||||||
|
assertThat(userOnDB).isNotNull();
|
||||||
|
assertThat(userOnDB).isInstanceOf(UserDetails.class);
|
||||||
|
assertThat(user.getUsername()).isEqualTo(usernameArgumentCaptor.getValue());
|
||||||
|
}
|
||||||
|
|
||||||
|
@Test
|
||||||
|
void cannotLoadUserByUsername() {
|
||||||
|
|
||||||
|
BDDMockito.when(userRepository.findByUsername(ArgumentMatchers.any(String.class)))
|
||||||
|
.thenReturn(Optional.ofNullable(null));
|
||||||
|
|
||||||
|
// Given
|
||||||
|
UserDTO user = this.createUser();
|
||||||
|
// When
|
||||||
|
//Then
|
||||||
|
assertThrows(
|
||||||
|
BadRequestException.class,
|
||||||
|
() -> {
|
||||||
|
this.underTest.loadUserByUsername(user.getUsername());
|
||||||
|
},
|
||||||
|
"User Not Found. Please create an Account."
|
||||||
|
);
|
||||||
|
}
|
||||||
|
|
||||||
|
private UserDTO createUser() {
|
||||||
|
UserDTO userCreated = new UserDTO(
|
||||||
|
"Clark Kent",
|
||||||
|
"superman@gmail.com",
|
||||||
|
"Superman",
|
||||||
|
"password",
|
||||||
|
List.of(Role.USER)
|
||||||
|
);
|
||||||
|
userCreated.setId(1L);
|
||||||
|
return userCreated;
|
||||||
|
}
|
||||||
|
|
||||||
|
}
|
||||||
35
src/test/resources/application.yml
Normal file
35
src/test/resources/application.yml
Normal file
@@ -0,0 +1,35 @@
|
|||||||
|
com:
|
||||||
|
|
||||||
|
hideyoshi:
|
||||||
|
frontendPath: localhost:4200
|
||||||
|
frontendConnectionType: unsecure
|
||||||
|
tokenSecret: secret
|
||||||
|
accessTokenDuration: 1800000
|
||||||
|
refreshTokenDuration: 1314900000
|
||||||
|
|
||||||
|
defaultUser:
|
||||||
|
fullName: "Vitor Hideyoshi"
|
||||||
|
email: "vitor.h.n.batista@gmail.com"
|
||||||
|
username: "YoshiUnfriendly"
|
||||||
|
password: "passwd"
|
||||||
|
|
||||||
|
spring:
|
||||||
|
|
||||||
|
liquibase:
|
||||||
|
enabled: false
|
||||||
|
|
||||||
|
datasource:
|
||||||
|
jdbc:
|
||||||
|
url: jdbc:h2:mem:testdb
|
||||||
|
user: sa
|
||||||
|
password: sa
|
||||||
|
driver_class: org.h2.Driver
|
||||||
|
|
||||||
|
jpa:
|
||||||
|
open-in-view: false
|
||||||
|
hibernate:
|
||||||
|
ddl-auto: update
|
||||||
|
properties:
|
||||||
|
hibernate:
|
||||||
|
# dialect: org.hibernate.dialect.H2Dialect
|
||||||
|
format_sql: true
|
||||||
1
src/test/resources/schema.sql
Normal file
1
src/test/resources/schema.sql
Normal file
@@ -0,0 +1 @@
|
|||||||
|
CREATE SCHEMA IF NOT EXISTS auth;
|
||||||
Reference in New Issue
Block a user