Skip to content

Instantly share code, notes, and snippets.

@Funcke
Created May 9, 2020 17:48
Show Gist options
  • Star 0 You must be signed in to star a gist
  • Fork 0 You must be signed in to fork a gist
  • Save Funcke/3d281af2373a5ca54da8fa11db0e4520 to your computer and use it in GitHub Desktop.
Save Funcke/3d281af2373a5ca54da8fa11db0e4520 to your computer and use it in GitHub Desktop.
Authentication Annotation Dev.to
package work.funcke.filter;
import java.lang.annotation.Retention;
import java.lang.annotation.Target;
import static java.lang.annotation.ElementType.METHOD;
import static java.lang.annotation.ElementType.TYPE;
import static java.lang.annotation.RetentionPolicy.RUNTIME;
@Retention(RUNTIME)
@Target({TYPE, METHOD})
public @interface Authorization {
/**
* List of roles that are permitted access.
*/
String[] value();
}
package work.funcke.filter;
import java.lang.reflect.Method;
import java.util.*;
import javax.annotation.security.DenyAll;
import javax.annotation.security.PermitAll;
import javax.ws.rs.ForbiddenException;
import javax.ws.rs.container.ContainerRequestContext;
import javax.ws.rs.container.ContainerRequestFilter;
import javax.ws.rs.container.ResourceInfo;
import javax.ws.rs.core.Context;
import javax.ws.rs.core.Response;
import javax.ws.rs.ext.Provider;
@Provider
public class AuthorizationFilter implements ContainerRequestFilter
{
@Context
private ResourceInfo resourceInfo;
private static final String AUTHORIZATION_HEADER = "Authorization";
private static final String AUTHENTICATION_SCHEME = "Bearer";
private static final Map<String, Set<String>> userData = new HashMap<String, Set<String>>() {{
put("admin", new HashSet<String>(){{
add("example:read");
}});
put("example_user", new HashSet<String>() {{
add("example:write");
}});
}};
@Override
public void filter(ContainerRequestContext requestContext)
{
Method method = resourceInfo.getResourceMethod();
if(method.isAnnotationPresent(Authorization.class))
{
String authorization = requestContext.getHeaderString(AUTHORIZATION_HEADER);
//If no authorization information present; block access
if(authorization == null || authorization.isEmpty())
{
deny();
}
Authorization rolesAnnotation = method.getAnnotation(Authorization.class);
Set<String> accessRights = new HashSet<>(Arrays.asList(rolesAnnotation.value()));
final String key = authorization.replaceFirst(AUTHENTICATION_SCHEME + " ", "");
if( ! authorize(key, accessRights))
deny();
}
}
private boolean authorize(final String key, final Set<String> accessRights)
{
boolean isAllowed = false;
Set<String> permittedActions = userData.get(key);
if(permittedActions != null && permittedActions.stream().anyMatch(accessRights::contains))
isAllowed = true;
return isAllowed;
}
private void deny() {
throw new ForbiddenException("Resource Forbidden");
}
}
Sign up for free to join this conversation on GitHub. Already have an account? Sign in to comment