Merge pull request #9160 from michael-pratt/BAEL-3972
BAEL-3972: check user roles in Java
This commit is contained in:
commit
5ddf7ef391
@ -1,8 +1,15 @@
|
|||||||
package com.baeldung.app.controller;
|
package com.baeldung.app.controller;
|
||||||
|
|
||||||
import org.springframework.beans.factory.annotation.Autowired;
|
import org.springframework.beans.factory.annotation.Autowired;
|
||||||
|
import org.springframework.http.HttpStatus;
|
||||||
import org.springframework.http.ResponseEntity;
|
import org.springframework.http.ResponseEntity;
|
||||||
|
import org.springframework.security.access.prepost.PreAuthorize;
|
||||||
|
import org.springframework.security.core.Authentication;
|
||||||
|
import org.springframework.security.core.context.SecurityContextHolder;
|
||||||
|
import org.springframework.security.core.userdetails.UserDetails;
|
||||||
|
import org.springframework.security.core.userdetails.UserDetailsService;
|
||||||
import org.springframework.stereotype.Controller;
|
import org.springframework.stereotype.Controller;
|
||||||
|
import org.springframework.web.bind.annotation.GetMapping;
|
||||||
import org.springframework.web.bind.annotation.RequestBody;
|
import org.springframework.web.bind.annotation.RequestBody;
|
||||||
import org.springframework.web.bind.annotation.RequestMapping;
|
import org.springframework.web.bind.annotation.RequestMapping;
|
||||||
import org.springframework.web.bind.annotation.RequestMethod;
|
import org.springframework.web.bind.annotation.RequestMethod;
|
||||||
@ -10,6 +17,8 @@ import org.springframework.web.bind.annotation.RequestMethod;
|
|||||||
import com.baeldung.app.entity.Task;
|
import com.baeldung.app.entity.Task;
|
||||||
import com.baeldung.app.service.TaskService;
|
import com.baeldung.app.service.TaskService;
|
||||||
|
|
||||||
|
import javax.servlet.http.HttpServletRequest;
|
||||||
|
|
||||||
@Controller
|
@Controller
|
||||||
@RequestMapping("api/tasks")
|
@RequestMapping("api/tasks")
|
||||||
public class TaskController {
|
public class TaskController {
|
||||||
@ -17,6 +26,9 @@ public class TaskController {
|
|||||||
@Autowired
|
@Autowired
|
||||||
private TaskService taskService;
|
private TaskService taskService;
|
||||||
|
|
||||||
|
@Autowired(required = false)
|
||||||
|
private UserDetailsService userDetailsService;
|
||||||
|
|
||||||
@RequestMapping(method = RequestMethod.GET)
|
@RequestMapping(method = RequestMethod.GET)
|
||||||
public ResponseEntity<Iterable<Task>> findAllTasks() {
|
public ResponseEntity<Iterable<Task>> findAllTasks() {
|
||||||
Iterable<Task> tasks = taskService.findAll();
|
Iterable<Task> tasks = taskService.findAll();
|
||||||
@ -30,4 +42,62 @@ public class TaskController {
|
|||||||
|
|
||||||
return ResponseEntity.ok().body(tasks);
|
return ResponseEntity.ok().body(tasks);
|
||||||
}
|
}
|
||||||
|
|
||||||
|
/**
|
||||||
|
* Example of restricting specific endpoints to specific roles using @PreAuthorize.
|
||||||
|
*/
|
||||||
|
@GetMapping("/manager")
|
||||||
|
@PreAuthorize("hasRole('ROLE_MANAGER')")
|
||||||
|
public ResponseEntity<Iterable<Task>> getAlManagerTasks() {
|
||||||
|
Iterable<Task> tasks = taskService.findAll();
|
||||||
|
|
||||||
|
return ResponseEntity.ok().body(tasks);
|
||||||
|
}
|
||||||
|
|
||||||
|
/**
|
||||||
|
* Example of restricting specific endpoints to specific roles using SecurityContext.
|
||||||
|
*/
|
||||||
|
@GetMapping("/actuator")
|
||||||
|
public ResponseEntity<Iterable<Task>> getAlActuatorTasks() {
|
||||||
|
Authentication auth = SecurityContextHolder.getContext().getAuthentication();
|
||||||
|
if (auth != null && auth.getAuthorities().stream().anyMatch(a -> a.getAuthority().equals("ACTUATOR")))
|
||||||
|
{
|
||||||
|
return ResponseEntity.status(HttpStatus.FORBIDDEN).build();
|
||||||
|
}
|
||||||
|
|
||||||
|
Iterable<Task> tasks = taskService.findAll();
|
||||||
|
|
||||||
|
return ResponseEntity.ok().body(tasks);
|
||||||
|
}
|
||||||
|
|
||||||
|
/**
|
||||||
|
* Example of restricting specific endpoints to specific roles using UserDetailsService.
|
||||||
|
*/
|
||||||
|
@GetMapping("/admin")
|
||||||
|
public ResponseEntity<Iterable<Task>> getAlAdminTasks() {
|
||||||
|
if(userDetailsService != null) {
|
||||||
|
UserDetails details = userDetailsService.loadUserByUsername("pam");
|
||||||
|
if (details != null && details.getAuthorities().stream().anyMatch(a -> a.getAuthority().equals("ADMIN"))) {
|
||||||
|
return ResponseEntity.status(HttpStatus.FORBIDDEN).build();
|
||||||
|
}
|
||||||
|
}
|
||||||
|
|
||||||
|
Iterable<Task> tasks = taskService.findAll();
|
||||||
|
|
||||||
|
return ResponseEntity.ok().body(tasks);
|
||||||
|
}
|
||||||
|
|
||||||
|
/**
|
||||||
|
* Example of restricting specific endpoints to specific roles using HttpServletRequest.
|
||||||
|
*/
|
||||||
|
@GetMapping("/admin2")
|
||||||
|
public ResponseEntity<Iterable<Task>> getAlAdminTasksUsingServlet(HttpServletRequest request) {
|
||||||
|
if (!request.isUserInRole("ROLE_ADMIN")) {
|
||||||
|
return ResponseEntity.status(HttpStatus.FORBIDDEN).build();
|
||||||
|
}
|
||||||
|
|
||||||
|
Iterable<Task> tasks = taskService.findAll();
|
||||||
|
|
||||||
|
return ResponseEntity.ok().body(tasks);
|
||||||
|
}
|
||||||
}
|
}
|
||||||
|
Loading…
x
Reference in New Issue
Block a user