better clients worker auth everything

This commit is contained in:
Jari 2025-03-12 22:50:05 +01:00
parent e2cd042e59
commit 9421c9f593
21 changed files with 259 additions and 26 deletions

View File

@ -5,5 +5,6 @@ enum class EUserRoles(val role: String) {
PSICO("PSICO"),
ALL("ALL"),
ADMIN("ADMIN"),
BASE("BASE")
BASE("BASE"),
EMPTY("")
}

View File

@ -1,10 +1,14 @@
package org.octopus.lorca_core.common.models
import org.octopus.lorca_core.common.enums.EWorkerCategory
import java.util.*
data class Worker(
var id: Long,
var name: String,
var surname: String,
val category: EWorkerCategory
var birthDate: Date,
var dni: String,
var email: String,
var category: EWorkerCategory,
)

View File

@ -4,7 +4,6 @@ import jakarta.servlet.FilterChain
import jakarta.servlet.ServletException
import jakarta.servlet.http.HttpServletRequest
import jakarta.servlet.http.HttpServletResponse
import org.octopus.lorca_core.common.enums.EUserRoles
import org.octopus.lorca_core.services.JwtService
import org.springframework.lang.NonNull
import org.springframework.security.authentication.UsernamePasswordAuthenticationToken
@ -48,7 +47,7 @@ class JwtAuthenticationFilter(
val roles = jwtService.getRoles(jwt)
if (jwtService.isTokenValid(jwt, userDetails) && roles.contains(EUserRoles.BASE)) {
if (jwtService.isTokenValid(jwt, userDetails) && roles.isNotEmpty()) {
val authToken = UsernamePasswordAuthenticationToken(
userDetails,
null,

View File

@ -14,6 +14,7 @@ import org.springframework.security.web.authentication.UsernamePasswordAuthentic
@Configuration
@EnableWebSecurity
@EnableMethodSecurity(securedEnabled = true)
class SecurityConfig(
val authenticationProvider: AuthenticationProvider,
val jwtAuthenticationFilter: JwtAuthenticationFilter
@ -25,6 +26,7 @@ class SecurityConfig(
.authorizeHttpRequests { auth ->
auth
.requestMatchers("/auth/**").permitAll()
.requestMatchers("/workers/register/**").hasRole("EMPTY")
.anyRequest().authenticated()
}
.sessionManagement { session ->

View File

@ -1,9 +1,7 @@
package org.octopus.lorca_core.db.entities
import jakarta.persistence.Entity
import jakarta.persistence.GeneratedValue
import jakarta.persistence.GenerationType
import jakarta.persistence.Id
import jakarta.persistence.*
import java.util.*
@Entity(name = "clients")
data class ClientEntity(
@ -11,5 +9,12 @@ data class ClientEntity(
var id: Long = 0L,
var name: String,
var surname: String,
var dni: String,
val phoneNumber: String,
@Column(unique = true)
val expNumber: String,
@Column(unique = true)
val userNumber: String,
val birthDate: Date,
val deactivated: Boolean
)

View File

@ -2,6 +2,7 @@ package org.octopus.lorca_core.db.entities
import jakarta.persistence.*
import org.octopus.lorca_core.common.enums.EWorkerCategory
import java.util.*
@Entity(name = "workers")
data class WorkerEntity(
@ -9,6 +10,9 @@ data class WorkerEntity(
var id: Long = 0L,
var name: String,
var surname: String,
var birthDate: Date,
var dni: String,
var email: String,
var category: EWorkerCategory,
@OneToOne
var authUser: UserAuthEntity

View File

@ -6,6 +6,7 @@ import org.octopus.lorca_core.common.mappers.WorkerMapper
import org.octopus.lorca_core.common.models.Worker
import org.octopus.lorca_core.db.WorkerJpa
import org.octopus.lorca_core.db.entities.UserAuthEntity
import org.octopus.lorca_core.db.entities.WorkerEntity
import org.octopus.lorca_core.repositories.WorkerRepository
import org.springframework.stereotype.Component
import kotlin.jvm.optionals.getOrNull
@ -21,9 +22,17 @@ class WorkerRepositoryImpl(
}
override fun createForUser(worker: Worker, userAuth: UserAuthEntity): Worker {
val w = mapper.toEntity(worker)
w.authUser = userAuth
userAuth.setClaimsList(listOf(EUserRoles.FISIO, EUserRoles.ADMIN))
val w = WorkerEntity(
id = 0L,
name = worker.name,
surname = worker.surname,
email = worker.email,
dni = worker.dni,
birthDate = worker.birthDate,
category = worker.category,
authUser = userAuth
)
val ent = jpa.save(w)
return mapper.toModel(ent)
}

View File

@ -2,9 +2,10 @@ package org.octopus.lorca_core.services
import org.octopus.lorca_core.common.enums.EWorkerCategory
import org.octopus.lorca_core.common.models.Worker
import org.octopus.lorca_core.web.utils.dtos.WorkerDto
interface WorkerService {
fun createTestData()
fun getAllWorkers(): List<Worker>
fun getAllWorkersForCategory(workCategory: EWorkerCategory): List<Worker>
fun createWorker(workerDto: WorkerDto, username: String): Worker
}

View File

@ -75,7 +75,10 @@ class JwtServiceImpl(
}
override fun getRoles(token: String): List<EUserRoles> {
return (extractAllClaims(token).get("roles") as List<String>).map { EUserRoles.valueOf(it) }
extractAllClaims(token)["roles"]?.let { roles ->
return (roles as List<String>).map { EUserRoles.valueOf(it) }
}
return listOf(EUserRoles.EMPTY)
}
private fun isTokenExpired(token: String): Boolean {

View File

@ -5,19 +5,11 @@ import org.octopus.lorca_core.common.models.Worker
import org.octopus.lorca_core.repositories.UserAuthRepository
import org.octopus.lorca_core.repositories.WorkerRepository
import org.octopus.lorca_core.services.WorkerService
import org.octopus.lorca_core.web.utils.dtos.WorkerDto
import org.springframework.stereotype.Service
@Service
class WorkerServiceImpl(val repo: WorkerRepository, val authRepository: UserAuthRepository) : WorkerService {
override fun createTestData() {
val worker = Worker(
id = 0,
name = "TestName",
surname = "TestSurname",
category = EWorkerCategory.FISIO
)
repo.createForUser(worker, authRepository.getByUsername("test"))
}
override fun getAllWorkers(): List<Worker> {
return repo.getAll().toList()
@ -26,4 +18,17 @@ class WorkerServiceImpl(val repo: WorkerRepository, val authRepository: UserAuth
override fun getAllWorkersForCategory(workCategory: EWorkerCategory): List<Worker> {
return repo.getAllByCategory(workCategory)
}
override fun createWorker(workerDto: WorkerDto, username: String): Worker {
val worker = Worker(
id = 0L,
name = workerDto.name,
surname = workerDto.surname,
birthDate = workerDto.dateOfBirth,
email = workerDto.email,
category = workerDto.category,
dni = workerDto.dni
)
return repo.createForUser(worker, authRepository.getByUsername(username))
}
}

View File

@ -1,10 +1,13 @@
package org.octopus.lorca_core.web.controllers
import jakarta.validation.Valid
import lombok.AllArgsConstructor
import org.octopus.lorca_core.common.enums.EWorkerCategory
import org.octopus.lorca_core.common.models.Worker
import org.octopus.lorca_core.services.WorkerService
import org.octopus.lorca_core.web.utils.dtos.WorkerDto
import org.octopus.lorca_core.web.utils.responses.WebResponse
import org.springframework.security.core.context.SecurityContextHolder
import org.springframework.web.bind.annotation.*
@RestController
@ -30,6 +33,12 @@ class WorkerController(
)
}
@PostMapping("/register")
fun registerAsWorker(@Valid @RequestBody workerDto: WorkerDto): WebResponse<Worker> {
val username = SecurityContextHolder.getContext().authentication.name
return WebResponse.ok(workerService.createWorker(workerDto, username))
}
@PostMapping("/test")
fun createTestData(): WebResponse<Nothing> {
// workerService.createTestData()

View File

@ -1,11 +1,23 @@
package org.octopus.lorca_core.web.utils.dtos
import org.octopus.lorca_core.web.utils.dtos.validators.DniValidator
import org.octopus.lorca_core.web.utils.dtos.validators.ExpValidator
import org.octopus.lorca_core.web.utils.dtos.validators.NameValidator
import org.octopus.lorca_core.web.utils.dtos.validators.PhoneValidator
import java.util.*
data class ClientDto(
@field:NameValidator.Validate
val name: String,
@field:NameValidator.Validate
val surname: String,
@field:DniValidator.Validate
val dni: String,
@field:PhoneValidator.Validate
val phone: String,
@field:ExpValidator.Validate
val numExp: String,
val numUser: String,
val dateOfBirth: Date,
val deactivated: Boolean
)

View File

@ -0,0 +1,20 @@
package org.octopus.lorca_core.web.utils.dtos
import org.octopus.lorca_core.common.enums.EWorkerCategory
import org.octopus.lorca_core.web.utils.dtos.validators.DniValidator
import org.octopus.lorca_core.web.utils.dtos.validators.EmailValidator
import org.octopus.lorca_core.web.utils.dtos.validators.NameValidator
import java.util.*
data class WorkerDto(
@field:NameValidator.Validate
val name: String,
@field:NameValidator.Validate
val surname: String,
@field:DniValidator.Validate
val dni: String,
val dateOfBirth: Date,
@field:EmailValidator.Validate
val email: String,
val category: EWorkerCategory
)

View File

@ -0,0 +1,34 @@
package org.octopus.lorca_core.web.utils.dtos.validators
import jakarta.validation.Constraint
import jakarta.validation.ConstraintValidator
import jakarta.validation.ConstraintValidatorContext
import jakarta.validation.Payload
import kotlin.reflect.KClass
class DniValidator : ConstraintValidator<DniValidator.Validate, String> {
override fun isValid(value: String?, context: ConstraintValidatorContext): Boolean {
val pattern = Regex("^\\d{8}[A-Z]$")
if (value == null || value.matches(pattern)) {
return true
}
context.disableDefaultConstraintViolation()
context.buildConstraintViolationWithTemplate("Invalid value '$value' : 8 numbers and a letter are expected.")
.addConstraintViolation()
return false
}
@Target(AnnotationTarget.FIELD, AnnotationTarget.PROPERTY, AnnotationTarget.VALUE_PARAMETER)
@Retention(AnnotationRetention.RUNTIME)
@MustBeDocumented
@Constraint(validatedBy = [DniValidator::class])
annotation class Validate(
val message: String = "",
val groups: Array<KClass<*>> = [],
val payload: Array<KClass<out Payload>> = []
)
}

View File

@ -0,0 +1,33 @@
package org.octopus.lorca_core.web.utils.dtos.validators
import jakarta.validation.Constraint
import jakarta.validation.ConstraintValidator
import jakarta.validation.ConstraintValidatorContext
import jakarta.validation.Payload
import kotlin.reflect.KClass
class EmailValidator : ConstraintValidator<EmailValidator.Validate, String> {
override fun isValid(value: String?, context: ConstraintValidatorContext): Boolean {
val pattern = Regex("^(?=.{1,64}@.{1,255}$)([a-zA-Z0-9._%+-]{1,64})@([a-zA-Z0-9.-]+\\.[a-zA-Z]{2,})$")
if (value == null || value.matches(pattern)) {
return true
}
context.disableDefaultConstraintViolation()
context.buildConstraintViolationWithTemplate("Invalid value '$value' : Email pattern is wrong.")
.addConstraintViolation()
return false
}
@Target(AnnotationTarget.FIELD, AnnotationTarget.PROPERTY, AnnotationTarget.VALUE_PARAMETER)
@Retention(AnnotationRetention.RUNTIME)
@MustBeDocumented
@Constraint(validatedBy = [EmailValidator::class])
annotation class Validate(
val message: String = "",
val groups: Array<KClass<*>> = [],
val payload: Array<KClass<out Payload>> = []
)
}

View File

@ -0,0 +1,34 @@
package org.octopus.lorca_core.web.utils.dtos.validators
import jakarta.validation.Constraint
import jakarta.validation.ConstraintValidator
import jakarta.validation.ConstraintValidatorContext
import jakarta.validation.Payload
import kotlin.reflect.KClass
class ExpValidator : ConstraintValidator<ExpValidator.Validate, String> {
override fun isValid(value: String?, context: ConstraintValidatorContext): Boolean {
val pattern = Regex("")
if (value == null || value.matches(pattern)) {
return true
}
context.disableDefaultConstraintViolation()
context.buildConstraintViolationWithTemplate("Invalid value '$value' : 8 numbers and a letter are expected.")
.addConstraintViolation()
return false
}
@Target(AnnotationTarget.FIELD, AnnotationTarget.PROPERTY, AnnotationTarget.VALUE_PARAMETER)
@Retention(AnnotationRetention.RUNTIME)
@MustBeDocumented
@Constraint(validatedBy = [ExpValidator::class])
annotation class Validate(
val message: String = "",
val groups: Array<KClass<*>> = [],
val payload: Array<KClass<out Payload>> = []
)
}

View File

@ -0,0 +1,34 @@
package org.octopus.lorca_core.web.utils.dtos.validators
import jakarta.validation.Constraint
import jakarta.validation.ConstraintValidator
import jakarta.validation.ConstraintValidatorContext
import jakarta.validation.Payload
import kotlin.reflect.KClass
class PhoneValidator : ConstraintValidator<PhoneValidator.Validate, String> {
override fun isValid(value: String?, context: ConstraintValidatorContext): Boolean {
val pattern = Regex("^[6789]\\d{8}$")
if (value == null || value.matches(pattern)) {
return true
}
context.disableDefaultConstraintViolation()
context.buildConstraintViolationWithTemplate("Invalid value '$value' : Phone must start with [6,7,8,9] and 8 more numbers are expected.")
.addConstraintViolation()
return false
}
@Target(AnnotationTarget.FIELD, AnnotationTarget.PROPERTY, AnnotationTarget.VALUE_PARAMETER)
@Retention(AnnotationRetention.RUNTIME)
@MustBeDocumented
@Constraint(validatedBy = [PhoneValidator::class])
annotation class Validate(
val message: String = "",
val groups: Array<KClass<*>> = [],
val payload: Array<KClass<out Payload>> = []
)
}

View File

@ -0,0 +1,3 @@
curl -X POST http://localhost:8080/api/auth/register \
-H "Content-Type: application/json" \
-d '{"username":"test","password":"cGFzc3dvcmQ="}'

View File

@ -0,0 +1,8 @@
TOKEN=$(curl -s -X POST http://localhost:8080/api/auth/login \
-H "Content-Type: application/json" \
-d '{"username":"test","password":"cGFzc3dvcmQ="}' | sed -n 's/.*"token":"\([^"]*\)".*/\1/p')
curl -X POST http://localhost:8080/api/workers/register \
-H "Authorization: Bearer $TOKEN" \
-H "Content-Type: application/json" \
-d '{"name": "Test","surname": "Test","dni": "12345678A","dateOfBirth": "1990-05-15","email": "jari.sciampi@mailbox.org","category":"FISIO"}'

View File

@ -2,9 +2,4 @@ TOKEN=$(curl -s -X POST http://localhost:8080/api/auth/login \
-H "Content-Type: application/json" \
-d '{"username":"test","password":"cGFzc3dvcmQ="}' | sed -n 's/.*"token":"\([^"]*\)".*/\1/p')
#curl -H "Authorization: Bearer $TOKEN" -X POST http://localhost:8080/api/workers/test
#curl -H "Authorization: Bearer $TOKEN" -XGET http://localhost:8080/api/workers
curl -G -H "Authorization: Bearer $TOKEN" --data-urlencode "category=FISIO" "http://localhost:8080/api/workers"
#echo "$TOKEN"

View File

@ -0,0 +1,18 @@
TOKEN=$(curl -s -X POST http://localhost:8080/api/auth/login \
-H "Content-Type: application/json" \
-d '{"username":"test","password":"cGFzc3dvcmQ="}' | sed -n 's/.*"token":"\([^"]*\)".*/\1/p')
#curl -H "Authorization: Bearer $TOKEN" -X POST http://localhost:8080/api/workers/test
#curl -H "Authorization: Bearer $TOKEN" -XGET http://localhost:8080/api/workers
curl -X POST http://localhost:8080/api/workers \
-H "Authorization: Bearer $TOKEN" \
-H "Content-Type: application/json" \
-d '{
"name": "Carlos",
"surname": "Fernandez",
"dni": "12345678A",
"dateOfBirth": "1990-05-15",
"email": "carlos.fernandez@example.com"}'
#echo "$TOKEN"