@@ -14,13 +14,13 @@ Since we are using this in spring applications, we can use `spring-aop`. So add
14
14
15
15
``` groovy
16
16
repositories {
17
- maven { url "https://dl.bintray.com/radar-base/org.radarbase" }
17
+ mavenCentral()
18
18
}
19
19
20
20
dependencies {
21
21
// AOP
22
- runtimeOnly(group: ' org.springframework', name: ' spring-aop', version: '5.2.4.RELEASE' )
23
- api(group: ' org.radarbase', name: ' radar-spring-auth', version: '1.0.0' )
22
+ runtimeOnly(" org.springframework: spring-aop:6.0.6" )
23
+ api(" org.radarbase: radar-spring-auth:1.2.0" )
24
24
}
25
25
```
26
26
@@ -71,27 +71,26 @@ public class AuthConfig {
71
71
}
72
72
```
73
73
74
- Although, we only need ` AuthAspect ` as a bean, we declare it's dependencies as a bean too, so they can be reused in the application using ` Autowired ` .
74
+ Although, we only need ` AuthAspect ` as a bean, we declare its dependencies as a bean too, so they can be reused in the application using ` Autowired ` .
75
75
76
76
Now, we add the ` Authorized ` annotation to our method that we want to authorize for (these are usually spring ` Controller ` methods).
77
77
78
78
``` java
79
- @Authorized (permission = " READ" , entity = " SUBJECT" , permissionOn = PermissionOn . SUBJECT )
80
- @GetMapping (
81
- " /"
82
- + " projects"
83
- + " /"
84
- + " {projectId}"
85
- + " /"
86
- + " users"
87
- + " /"
88
- + " {subjectId}" )
89
- public ResponseEntity<FcmUserDto > getUsersUsingProjectIdAndSubjectId(
90
- @Valid @PathVariable String projectId, @Valid @PathVariable String subjectId) {
91
-
79
+ @Authorized (permission = " READ" , entity = " SUBJECT" , permissionOn = PermissionOn . SUBJECT )
80
+ @GetMapping (
81
+ " /"
82
+ + " projects"
83
+ + " /"
84
+ + " {projectId}"
85
+ + " /"
86
+ + " users"
87
+ + " /"
88
+ + " {subjectId}" )
89
+ public ResponseEntity<FcmUserDto > getUsersUsingProjectIdAndSubjectId(
90
+ @Valid @PathVariable String projectId, @Valid @PathVariable String subjectId) {
92
91
return ResponseEntity . ok(
93
92
this . userService. getUsersByProjectIdAndSubjectId(projectId, subjectId));
94
- }
93
+ }
95
94
```
96
95
97
96
Various other conditions to verify can be provided using the ` Authorized ` annotation. For a full set, take a look at the [ annotation class] ( ./radar-spring-auth/src/main/kotlin/radar/spring/auth/common/Authorization.kt )
@@ -112,7 +111,7 @@ The `Authorized` annotation adds a request attribute named `radar_token` (presen
112
111
``` java
113
112
import java.util.Optional ;
114
113
import java.util.stream.Collectors ;
115
- import javax .servlet.http.HttpServletRequest ;
114
+ import jakarta .servlet.http.HttpServletRequest ;
116
115
117
116
import radar.spring.auth.common.Authorization ;
118
117
import radar.spring.auth.common.Authorized ;
@@ -131,47 +130,47 @@ import org.springframework.http.ResponseEntity;
131
130
132
131
@RestController
133
132
public class RadarProjectController {
134
- // Your project Service
135
- private transient ProjectService projectService;
133
+ // Your project Service
134
+ private transient ProjectService projectService;
136
135
137
- private transient Authorization<RadarToken > authorization;
136
+ private transient Authorization<RadarToken > authorization;
138
137
139
- public RadarProjectController (
140
- ProjectService projectService , Optional<Authorization<RadarToken > > authorization ) {
141
- this . projectService = projectService;
142
- this . authorization = authorization. orElse(null );
143
- }
138
+ public RadarProjectController (
139
+ ProjectService projectService , Optional<Authorization<RadarToken > > authorization ) {
140
+ this . projectService = projectService;
141
+ this . authorization = authorization. orElse(null );
142
+ }
144
143
145
144
146
- @Authorized (permission = " READ" , entity = " PROJECT" )
147
- @GetMapping (" /" + " projects" )
148
- public ResponseEntity<ProjectDtos > getAllProjects (HttpServletRequest request ) {
149
-
150
- ProjectDtos projectDtos = this . projectService. getAllProjects();
151
- if (authorization != null ) {
152
- RadarToken token = (RadarToken ) request. getAttribute(AuthAspect . TOKEN_KEY );
153
- ProjectDtos finalProjectDtos =
154
- new ProjectDtos ()
155
- .setProjects(
156
- projectDtos. getProjects(). stream()
157
- .filter(
158
- project - >
159
- authorization. hasPermission(
160
- token,
161
- " READ" ,
162
- " PROJECT" ,
163
- PermissionOn . PROJECT ,
164
- project. getProjectId(),
165
- null ,
166
- null ))
167
- .collect(Collectors . toList()));
168
- return ResponseEntity . ok(finalProjectDtos);
169
- } else {
170
- // If not authorization object if present, means authorization is disabled.
171
- // Remember how we added this as a bean initially.
172
- return ResponseEntity . ok(projectDtos);
145
+ @Authorized (permission = " READ" , entity = " PROJECT" )
146
+ @GetMapping (" /" + " projects" )
147
+ public ResponseEntity<ProjectDtos > getAllProjects (HttpServletRequest request ) {
148
+
149
+ ProjectDtos projectDtos = this . projectService. getAllProjects();
150
+ if (authorization != null ) {
151
+ RadarToken token = (RadarToken ) request. getAttribute(AuthAspect . TOKEN_KEY );
152
+ ProjectDtos finalProjectDtos =
153
+ new ProjectDtos ()
154
+ .setProjects(
155
+ projectDtos. getProjects(). stream()
156
+ .filter(
157
+ project - >
158
+ authorization. hasPermission(
159
+ token,
160
+ " READ" ,
161
+ " PROJECT" ,
162
+ PermissionOn . PROJECT ,
163
+ project. getProjectId(),
164
+ null ,
165
+ null ))
166
+ .collect(Collectors . toList()));
167
+ return ResponseEntity . ok(finalProjectDtos);
168
+ } else {
169
+ // If not authorization object if present, means authorization is disabled.
170
+ // Remember how we added this as a bean initially.
171
+ return ResponseEntity . ok(projectDtos);
172
+ }
173
173
}
174
- }
175
174
}
176
175
```
177
176
@@ -181,24 +180,21 @@ public class RadarProjectController {
181
180
The various parts of the application can be extended as required. Take a look at [ AuthValidator] ( ./radar-spring-auth/src/main/kotlin/radar/spring/auth/common/AuthValidator.kt ) and [ Authorization] ( ./radar-spring-auth/src/main/kotlin/radar/spring/auth/common/Authorization.kt ) interfaces which can be used to implement a new authorization. These can then be used to instantiate the ` AuthAspect ` to enable them.
182
181
You can also add another Aspect as per your requirements in your own project and add it as a Bean in spring to start using it just like the ` AuthAspect ` from this library.
183
182
184
-
185
183
The [ required parameter] ( #parameters-required ) names can also be changed as per your requirements apart from the default ones mentioned above. You can even specify multiple names as an array. These will need to be added when creating the ` AuthAspect ` . For example,
186
184
187
185
``` java
188
- ...
189
- @Bean
190
- AuthAspect getAuthAspect(
191
- @Autowired ManagementPortalAuthValidator authValidator,
192
- @Autowired ManagementPortalAuthorization authorization) {
186
+ @Bean
187
+ AuthAspect getAuthAspect(
188
+ @Autowired ManagementPortalAuthValidator authValidator,
189
+ @Autowired ManagementPortalAuthorization authorization) {
193
190
return new AuthAspect<> (
194
191
authValidator,
195
192
authorization,
196
- new String []{ " projectId" , " projectName" , " project" } ,
197
- new String []{ " subjectId" , " login" } ,
198
- new String []{ " sourceId" , " source" }
193
+ Set . of( " projectId" , " projectName" , " project" ) ,
194
+ Set . of( " subjectId" , " login" ) ,
195
+ Set . of( " sourceId" , " source" )
199
196
);
200
- }
201
- ...
197
+ }
202
198
```
203
199
204
200
But Note that while you can modify the name of the parameters according to you liking, their type must always be ` String ` .
0 commit comments