Created
July 30, 2019 19:45
-
-
Save Odilio/0ba56ebf3976d1df8403e5a553121ff4 to your computer and use it in GitHub Desktop.
This file contains bidirectional Unicode text that may be interpreted or compiled differently than what appears below. To review, open the file in an editor that reveals hidden Unicode characters.
Learn more about bidirectional Unicode characters
package com.crm.config; | |
import java.io.IOException; | |
import javax.servlet.FilterChain; | |
import javax.servlet.ServletException; | |
import javax.servlet.http.HttpServletRequest; | |
import javax.servlet.http.HttpServletResponse; | |
import org.springframework.beans.factory.annotation.Autowired; | |
import org.springframework.security.authentication.UsernamePasswordAuthenticationToken; | |
import org.springframework.security.core.context.SecurityContextHolder; | |
import org.springframework.security.core.userdetails.UserDetails; | |
import org.springframework.security.web.authentication.WebAuthenticationDetailsSource; | |
import org.springframework.stereotype.Component; | |
import org.springframework.web.filter.OncePerRequestFilter; | |
import com.crm.service.JwtUserDetailsService; | |
import io.jsonwebtoken.ExpiredJwtException; | |
@Component | |
public class JwtRequestFilter extends OncePerRequestFilter { | |
@Autowired | |
private JwtUserDetailsService jwtUserDetailsService; | |
@Autowired | |
private JwtTokenUtil jwtTokenUtil; | |
@Override | |
protected void doFilterInternal(HttpServletRequest request, HttpServletResponse response, FilterChain chain) | |
throws ServletException, IOException { | |
final String requestTokenHeader = request.getHeader("Authorization"); | |
String username = null; | |
String jwtToken = null; | |
// JWT Token está no form "Bearer token". Remova a palavra Bearer e pegue somente o Token | |
if (requestTokenHeader != null && requestTokenHeader.startsWith("Bearer ")) { | |
jwtToken = requestTokenHeader.substring(7); | |
try { | |
username = jwtTokenUtil.getUsernameFromToken(jwtToken); | |
} catch (IllegalArgumentException e) { | |
System.out.println("Unable to get JWT Token"); | |
} catch (ExpiredJwtException e) { | |
System.out.println("JWT Token has expired"); | |
} | |
} else { | |
logger.warn("JWT Token does not begin with Bearer String"); | |
} | |
// Tendo o token, valide o. | |
if (username != null && SecurityContextHolder.getContext().getAuthentication() == null) { | |
UserDetails userDetails = this.jwtUserDetailsService.loadUserByUsername(username); | |
if (jwtTokenUtil.validateToken(jwtToken, userDetails)) { | |
UsernamePasswordAuthenticationToken usernamePasswordAuthenticationToken = new UsernamePasswordAuthenticationToken( | |
userDetails, null, userDetails.getAuthorities()); | |
usernamePasswordAuthenticationToken.setDetails(new WebAuthenticationDetailsSource().buildDetails(request)); | |
SecurityContextHolder.getContext().setAuthentication(usernamePasswordAuthenticationToken); | |
} | |
} | |
chain.doFilter(request, response); | |
} | |
} |
Sign up for free
to join this conversation on GitHub.
Already have an account?
Sign in to comment