Glassfish @RolesAllowed with custom SecurityContext

前端 未结 2 961
醉酒成梦
醉酒成梦 2021-02-06 16:37

The question i\'m about to ask is a bit tricky and I haven\'t found any answer yet. Maybe because i\'m looking for the wrong thing. But i hope you will help me on this.

2条回答
  •  谎友^
    谎友^ (楼主)
    2021-02-06 17:10

    Ok I've just completed that part (in fact all parts except for the EmailGateway).

    Firstly I say thanks to Iain Porter for his work - its top quality. And I apologise for mistakenly referring to him as just 'Porter' before.

    There is something going on with the Stackoverflow code formatting so be aware that some code proceeds the code boxes.

    For your problem I did this:

    1. web.xml - I don't use except for Faces
    2. Instead of web.xml and to register the various providers I created a class AuthApplicationConfig.java

      @ApplicationPath("rest")
      public class AuthApplicationConfig extends Application {
      
          @Override
          public Set> getClasses() {
              Set> resources = new java.util.HashSet<>();
      
              // REST resources
              resources.add(HealthCheckResource.class);
              resources.add(PasswordResource.class);
              resources.add(UserResource.class);
              resources.add(VerificationResource.class);
      
              // Filters (Auth)
              resources.add(RolesAllowedDynamicFeature.class);
              resources.add(SecurityContextFilter.class);
      
              // Misc
              resources.add(GenericExceptionMapper.class);
              return resources;
          }
      }
      

    See https://java.net/jira/browse/JERSEY-1634 for why you need to register the classes even though they are annotated with @Provider

    1. ResourceFilterFactory.java - I didn't use
    2. SecurityContextFilter.java is slightly different:

      @Provider
      @Priority(Priorities.AUTHENTICATION)    // So it comes in before org.glassfish.jersey.server.filter.RolesAllowedDynamicFeature
      
      public class SecurityContextFilter implements ContainerRequestFilter {
          @Inject
          Logger logger;
      
          protected static final String HEADER_AUTHORIZATION = "Authorization";
      
          protected static final String HEADER_DATE = "x-java-rest-date";
      
          protected static final String HEADER_NONCE = "nonce";
      
          private AuthorizationService authorizationService;
      
          ApplicationConfig config;
      
          @Inject
          public SecurityContextFilter(UserRepository userRepository,
                  UserService userService, ApplicationConfig config) {
              delegateAuthorizationService(userRepository, userService, config);
              this.config = config;
      
          }
      
          /**
           * If there is an Authorisation header in the request extract the session
           * token and retrieve the user
           * 
           * Delegate to the AuthorizationService to validate the request
           * 
           * If the request has a valid session token and the user is validated then a
           * user object will be added to the security context
           * 
           * Any Resource Controllers can assume the user has been validated and can
           * merely authorize based on the role
           * 
           * Resources with @PermitAll annotation do not require an Authorization
           * header but will still be filtered
           * 
           * @param request
           *            the ContainerRequest to filter
           * 
           */
          @Override
          public void filter(ContainerRequestContext requestContext)
                  throws IOException {
              System.out.println("SecurityContextFilter / filter("+printContainerRequestContext(requestContext)+")");
              String authToken = requestContext.getHeaderString(HEADER_AUTHORIZATION);
              String requestDateString = requestContext.getHeaderString(HEADER_DATE);
              String nonce = requestContext.getHeaderString(HEADER_NONCE);
              AuthorizationRequestContext context = new AuthorizationRequestContext(
                      requestContext.getUriInfo().getPath(),
                      requestContext.getMethod(), requestDateString, nonce, authToken);
              ExternalUser externalUser = authorizationService.authorize(context);
              requestContext
                      .setSecurityContext(new SecurityContextImpl(externalUser));
              System.out.println(String.format(" END OF SecurityContextFilter / filter - AuthorizationRequestContext: %s, externalUser:%s", context,externalUser));
          }
      
          private String printContainerRequestContext(ContainerRequestContext requestContext) {
              return String.format("[ContainerRequestContext:%s]", requestContext);
          }
      
          /**
           * Specify the AuthorizationService that the application should use
           * 
           * @param userRepository
           * @param userService
           * @param config
           */
          private void delegateAuthorizationService(UserRepository userRepository,
                  UserService userService, ApplicationConfig config) {
              System.out.println("SecurityContextFilter - requireSignedRequests?"+config.requireSignedRequests());
              if (config.requireSignedRequests()) {
                  this.authorizationService = new RequestSigningAuthorizationService(
                          userRepository, userService, config);
              } else {
                  this.authorizationService = new SessionTokenAuthorizationService(
                          userRepository);
              }
          }
      
          @Inject
          public void setConfig(ApplicationConfig config) {
              this.config = config;
          }
      }
      
    3. SecurityContextImpl is the same as Iain defined it:

      public class SecurityContextImpl implements SecurityContext {
      
          private final ExternalUser user;
      
          public SecurityContextImpl(ExternalUser user) {
              this.user = user;
          }
      
          @Override
          public Principal getUserPrincipal() {
              return user;
          }
      
          @Override
          public boolean isUserInRole(String role) {
              if(role.equalsIgnoreCase(Role.anonymous.name())) {
                   return true;
              }
              if(user == null) {
                  throw new InvalidAuthorizationHeaderException();
              }
              System.out.println(String.format("SecurityContextImpl / isUserInRole - role:%s, user:%s", role, user));
              return user.getRole().equalsIgnoreCase(role);
          }
      
          @Override
          public boolean isSecure() {
              return false;
          }
      
          @Override
          public String getAuthenticationScheme() {
              return SecurityContext.BASIC_AUTH;
          }
      }
      
    4. UserResource is as Iain defined it and similar to your UserRestService:

      @Path("/user")
      // @Component
      @Produces({ MediaType.APPLICATION_JSON })
      @Consumes({ MediaType.APPLICATION_JSON })
      @RequestScoped
      public class UserResource {
          // A Social thing that is not needed
          // private ConnectionFactoryLocator connectionFactoryLocator;
          @Inject
          Logger logger;
      
          @Inject
          protected UserService userService;
      
          @Inject
          protected VerificationTokenService verificationTokenService;
      
          @Inject
          protected EmailServicesGateway emailServicesGateway;
      
          @Context
          protected UriInfo uriInfo;
      
          // @Inject
          // protected ApplicationConfig config;
      
          // @Autowired
          // public UserResource(ConnectionFactoryLocator connectionFactoryLocator) {
          // this.connectionFactoryLocator = connectionFactoryLocator;
          // }
      
          @PermitAll
          @POST
          public Response signupUser(CreateUserRequest request) {
              AuthenticatedUserToken token = userService.createUser(request, Role.authenticated);
              verificationTokenService.sendEmailRegistrationToken(token.getUserId());
              URI location = uriInfo.getAbsolutePathBuilder().path(token.getUserId()).build();
              return Response.created(location).entity(token).build();
          }
      
          @RolesAllowed("admin")
          @Path("{userId}")
          @DELETE
          public Response deleteUser(@Context SecurityContext sc, @PathParam("userId") String userId) {
              ExternalUser userMakingRequest = (ExternalUser) sc.getUserPrincipal();
              userService.deleteUser(userMakingRequest, userId);
              return Response.ok().build();
          }
          ...
      

提交回复
热议问题