Skip to content
Merged
Show file tree
Hide file tree
Changes from all commits
Commits
File filter

Filter by extension

Filter by extension

Conversations
Failed to load comments.
Loading
Jump to
Jump to file
Failed to load files.
Loading
Diff view
Diff view
4 changes: 4 additions & 0 deletions auto/clean
Original file line number Diff line number Diff line change
@@ -0,0 +1,4 @@
#!/usr/bin/env sh

export SPRING_PROFILES_ACTIVE=test
./gradlew clean
4 changes: 4 additions & 0 deletions auto/test
Original file line number Diff line number Diff line change
@@ -0,0 +1,4 @@
#!/usr/bin/env sh

export SPRING_PROFILES_ACTIVE=test
./gradlew test
12 changes: 11 additions & 1 deletion build.gradle.kts
Original file line number Diff line number Diff line change
Expand Up @@ -17,7 +17,9 @@ group = "org.nkcoder"
version = "0.1.0"

java {
sourceCompatibility = JavaVersion.VERSION_21
toolchain {
languageVersion.set(JavaLanguageVersion.of(21))
}
}

repositories {
Expand Down Expand Up @@ -174,6 +176,14 @@ sourceSets {
}
}

tasks.test {
maxParallelForks = Runtime.getRuntime().availableProcessors()
failFast = true

// Cache and incremental test execution
outputs.cacheIf { true }
}

// Test coverage: jacoco
jacoco {
toolVersion = "0.8.14"
Expand Down
12 changes: 12 additions & 0 deletions gradle.properties
Original file line number Diff line number Diff line change
@@ -0,0 +1,12 @@
# gradle.properties
org.gradle.daemon=true
org.gradle.parallel=true
org.gradle.configureondemand=true
org.gradle.caching=true
# Configuration cache (ensure plugins/tasks support it)
org.gradle.configuration-cache=true
# Better memory for large projects
org.gradle.jvmargs=-Xmx2g -XX:+UseG1GC -Dfile.encoding=UTF-8
# Kotlin incremental compilation
kotlin.incremental=true
kotlin.compiler.execution.strategy=daemon
Original file line number Diff line number Diff line change
@@ -1,10 +1,11 @@
package org.nkcoder.security;

import com.fasterxml.jackson.databind.ObjectMapper;
import jakarta.servlet.ServletException;
import io.jsonwebtoken.ExpiredJwtException;
import jakarta.servlet.http.HttpServletRequest;
import jakarta.servlet.http.HttpServletResponse;
import java.io.IOException;
import org.apache.logging.log4j.util.Strings;
import org.nkcoder.dto.common.ApiResponse;
import org.slf4j.Logger;
import org.slf4j.LoggerFactory;
Expand All @@ -18,6 +19,8 @@ public class JwtAuthenticationEntryPoint implements AuthenticationEntryPoint {

private static final Logger logger = LoggerFactory.getLogger(JwtAuthenticationEntryPoint.class);

private static final String CONTENT_TYPE_JSON = "application/json";

private final ObjectMapper objectMapper;

@Autowired
Expand All @@ -30,18 +33,30 @@ public void commence(
HttpServletRequest request,
HttpServletResponse response,
AuthenticationException authException)
throws IOException, ServletException {
throws IOException {

logger.error("Unauthorized error: {}", authException.getMessage());
logger.debug("Unauthorized access attempt to: {}", request.getRequestURI());

response.setContentType("application/json");
response.setContentType(CONTENT_TYPE_JSON);
response.setStatus(HttpServletResponse.SC_UNAUTHORIZED);

ApiResponse<Object> apiResponse =
ApiResponse.error("Unauthorized: " + authException.getMessage());
String errorMessage = determineErrorMessage(authException);
ApiResponse<Void> apiResponse = ApiResponse.error(errorMessage);

objectMapper.writeValue(response.getOutputStream(), apiResponse);
response.getOutputStream().flush();
response.getOutputStream().close();
// Do NOT close the stream - let the servlet container manage it
}

private String determineErrorMessage(AuthenticationException authException) {
if (authException.getCause() instanceof ExpiredJwtException) {
return "Token has expired";
}

if (Strings.isNotBlank(authException.getMessage())) {
return "Authentication required: " + authException.getMessage();
}

return "Authentication required";
}
}
97 changes: 57 additions & 40 deletions src/main/java/org/nkcoder/security/JwtAuthenticationFilter.java
Original file line number Diff line number Diff line change
@@ -1,13 +1,16 @@
package org.nkcoder.security;

import io.jsonwebtoken.Claims;
import io.jsonwebtoken.JwtException;
import io.jsonwebtoken.ExpiredJwtException;
import io.jsonwebtoken.MalformedJwtException;
import io.jsonwebtoken.UnsupportedJwtException;
import jakarta.servlet.FilterChain;
import jakarta.servlet.ServletException;
import jakarta.servlet.http.HttpServletRequest;
import jakarta.servlet.http.HttpServletResponse;
import java.io.IOException;
import java.util.List;
import java.util.Optional;
import java.util.UUID;
import org.jetbrains.annotations.NotNull;
import org.nkcoder.enums.Role;
Expand All @@ -29,6 +32,12 @@
@Component
public class JwtAuthenticationFilter extends OncePerRequestFilter {

private static final String AUTHORIZATION_HEADER = "Authorization";
private static final String BEARER_PREFIX = "Bearer ";
private static final String ATTRIBUTE_USER_ID = "userId";
private static final String ATTRIBUTE_ROLE = "role";
private static final String ATTRIBUTE_EMAIL = "email";

private static final Logger logger = LoggerFactory.getLogger(JwtAuthenticationFilter.class);

private final JwtUtil jwtUtil;
Expand All @@ -46,48 +55,56 @@ protected void doFilterInternal(
throws ServletException, IOException {
logger.debug("Processing authentication for request: {}", request.getRequestURI());

try {
String jwt = getJwtFromRequest(request);

if (StringUtils.hasText(jwt) && !jwtUtil.isTokenExpired(jwt)) {
Claims claims = jwtUtil.validateAccessToken(jwt);

UUID userId = UUID.fromString(claims.getSubject());
String email = claims.get("email", String.class);
String roleString = claims.get("role", String.class);
Role role = Role.valueOf(roleString);

// Create authorities
List<GrantedAuthority> authorities =
List.of(new SimpleGrantedAuthority("ROLE_" + role.name()));

UserDetails userDetails = new User(email, "", authorities);
UsernamePasswordAuthenticationToken authentication =
new UsernamePasswordAuthenticationToken(userDetails, null, authorities);

authentication.setDetails(new WebAuthenticationDetailsSource().buildDetails(request));

// Set custom attributes
request.setAttribute("userId", userId);
request.setAttribute("email", email);
request.setAttribute("role", role);

SecurityContextHolder.getContext().setAuthentication(authentication);

logger.debug("Set authentication for user: {}", email);
}
} catch (JwtException e) {
logger.error("Cannot set user authentication: {}", e.getMessage());
}
extractTokenFromRequest(request)
.ifPresent(
token -> {
try {
Claims claims = jwtUtil.validateAccessToken(token);

UUID userId = UUID.fromString(claims.getSubject());
String email = claims.get("email", String.class);
String roleString = claims.get("role", String.class);
Role role = Role.valueOf(roleString);

// Create authorities
List<GrantedAuthority> authorities =
List.of(new SimpleGrantedAuthority("ROLE_" + role.name()));

UserDetails userDetails = new User(email, "", authorities);
UsernamePasswordAuthenticationToken authentication =
new UsernamePasswordAuthenticationToken(userDetails, null, authorities);

authentication.setDetails(
new WebAuthenticationDetailsSource().buildDetails(request));

// Set custom attributes
request.setAttribute(ATTRIBUTE_USER_ID, userId);
request.setAttribute(ATTRIBUTE_EMAIL, email);
request.setAttribute(ATTRIBUTE_ROLE, role);

SecurityContextHolder.getContext().setAuthentication(authentication);

logger.debug("Set authentication for userId: {}", userId);
} catch (ExpiredJwtException e) {
logger.error("JWT token expired: {}", e.getMessage());
} catch (MalformedJwtException e) {
logger.error("Malformed JWT token: {}", e.getMessage());
} catch (UnsupportedJwtException e) {
logger.error("Unsupported JWT token: {}", e.getMessage());
} catch (SecurityException e) {
logger.error("JWT signature validation failed: {}", e.getMessage());
} catch (IllegalArgumentException e) {
logger.error("JWT token compact of handler are invalid: {}", e.getMessage());
}
});

filterChain.doFilter(request, response);
}

private String getJwtFromRequest(HttpServletRequest request) {
String bearerToken = request.getHeader("Authorization");
if (StringUtils.hasText(bearerToken) && bearerToken.startsWith("Bearer ")) {
return bearerToken.substring(7);
}
return null;
private Optional<String> extractTokenFromRequest(HttpServletRequest request) {
return Optional.ofNullable(request.getHeader(AUTHORIZATION_HEADER))
.filter(StringUtils::hasText)
.filter(token -> token.startsWith(BEARER_PREFIX))
.map(token -> token.substring(BEARER_PREFIX.length()));
}
}
Loading