Skip to content

Instantly share code, notes, and snippets.

@SlyDen
Created March 7, 2014 09:41
Show Gist options
  • Star 10 You must be signed in to star a gist
  • Fork 5 You must be signed in to fork a gist
  • Save SlyDen/9408539 to your computer and use it in GitHub Desktop.
Save SlyDen/9408539 to your computer and use it in GitHub Desktop.
Sample of Spring Boot config with custom setting for embedded Tomcat And OAuth ... imports are skiped. https://github.com/joshlong/the-spring-rest-stack/blob/master/code/web/oauth/src/main/java/com/jl/crm/web/Application.java
@ComponentScan
@Import(ServiceConfiguration.class)
@EnableHypermediaSupport(type = EnableHypermediaSupport.HypermediaType.HAL)
@EnableAutoConfiguration
public class Application extends SpringBootServletInitializer {
private static Class<Application> applicationClass = Application.class;
public static void main(String[] args) {
SpringApplication.run(applicationClass);
}
@Override
protected SpringApplicationBuilder configure(SpringApplicationBuilder application) {
return application.sources(applicationClass);
}
// you can run this with SSL/TLS. For example, build the application (`mvn clean install`) in the `oauth` directory, then run:
// java -Dspring.profiles.active=production -Dkeystore.file=file:///`pwd`/src/main/resources/keystore.p12 -jar target/oauth-1.0.0.BUILD-SNAPSHOT.jar
@Profile("production")
@Bean
public EmbeddedServletContainerCustomizer containerCustomizer(
@Value("${keystore.file}") final Resource keystoreFile,
@Value("${keystore.alias}") final String keystoreAlias,
@Value("${keystore.type}") final String keystoreType,
@Value("${keystore.pass}") final String keystorePass,
@Value("${tls.port}") final int tlsPort
) {
return new EmbeddedServletContainerCustomizer() {
@Override
public void customize(ConfigurableEmbeddedServletContainerFactory factory) {
if (factory instanceof TomcatEmbeddedServletContainerFactory) {
TomcatEmbeddedServletContainerFactory containerFactory = (TomcatEmbeddedServletContainerFactory) factory;
containerFactory.addConnectorCustomizers(new TomcatConnectorCustomizer() {
@Override
public void customize(Connector connector) {
connector.setPort(tlsPort);
connector.setSecure(true);
connector.setScheme("https");
connector.setAttribute("keyAlias", "tomcat");
connector.setAttribute("keystorePass", "password");
String absoluteKeystoreFile;
try {
absoluteKeystoreFile = keystoreFile.getFile().getAbsolutePath();
connector.setAttribute("keystoreFile", absoluteKeystoreFile);
} catch (IOException e) {
throw new IllegalStateException("Cannot load keystore", e);
}
connector.setAttribute("clientAuth", "false");
connector.setAttribute("sslProtocol", "TLS");
connector.setAttribute("SSLEnabled", true);
Http11NioProtocol proto = (Http11NioProtocol) connector.getProtocolHandler();
proto.setSSLEnabled(true);
// proto.setClientAuth();
// uncomment this to require the
// client to authenticate. Then, you can use X509 support in Spring Security
proto.setKeystoreFile(absoluteKeystoreFile);
proto.setKeystorePass(keystorePass);
proto.setKeystoreType(keystoreType);
proto.setKeyAlias(keystoreAlias);
}
});
}
}
};
}
@Bean
MultipartConfigElement multipartConfigElement() {
return new MultipartConfigElement("");
}
}
/**
* Request OAuth authorization:
* <code>
* curl -X POST -vu android-crm:123456 http://localhost:8080/oauth/token -H "Accept: application/json" -d "password=cowbell&username=joshlong&grant_type=password&scope=read%2Cwrite&client_secret=123456&client_id=android-crm"
* </code>
* <p/>
* Use the access_token returned in the previous request to make the authorized request to the protected endpoint:
* <code>
* curl http://localhost:8080/users/5 -H "Authorization: Bearer <INSERT TOKEN>"
* </code>
*
* @author Roy Clarkson
* @author Josh Long
*/
@Configuration
@EnableWebSecurity
class WebSecurityConfiguration extends OAuth2ServerConfigurerAdapter {
private final String applicationName = "crm";
@Autowired
private CrmService crmService;
// @formatter:off
@Override
protected void configure(HttpSecurity http) throws Exception {
http.csrf().disable();
http.sessionManagement().sessionCreationPolicy(SessionCreationPolicy.STATELESS);
http.requestMatchers()
.and()
.authorizeRequests()
.antMatchers("/").permitAll()
.anyRequest().authenticated()
.and()
.apply(new OAuth2ServerConfigurer())
.tokenStore(new InMemoryTokenStore())
.resourceId(applicationName);
}
// @formatter:on
// @formatter:off
@Override
protected void configure(AuthenticationManagerBuilder authManagerBuilder)
throws Exception {
final String scopes[] = "read,write".split(",");
final String secret = "123456";
final String authorizedGrantTypes = "password";
final String authorities = "ROLE_USER";
authManagerBuilder
.userDetailsService(new CrmUserDetailsService(this.crmService))
.and()
.apply(new InMemoryClientDetailsServiceConfigurer())
.withClient("android-crm")
.resourceIds(applicationName)
.scopes(scopes)
.authorities(authorities)
.authorizedGrantTypes(authorizedGrantTypes)
.secret(secret)
.and()
.withClient("ios-crm")
.resourceIds(applicationName)
.scopes(scopes)
.authorities(authorities)
.authorizedGrantTypes(authorizedGrantTypes)
.secret(secret);
}
// @formatter:on
@Bean
@Override
public UserDetailsService userDetailsServiceBean() throws Exception {
return super.userDetailsServiceBean();
}
@Bean
@Override
public AuthenticationManager authenticationManagerBean() throws Exception {
return super.authenticationManagerBean();
}
@Bean
PasswordEncoder passwordEncoder() {
return NoOpPasswordEncoder.getInstance();
}
@Bean
TextEncryptor textEncryptor() {
return Encryptors.noOpText();
}
}
Sign up for free to join this conversation on GitHub. Already have an account? Sign in to comment