spring-data/rest/security
j b8618281d7 '1' 2024-06-10 21:20:03 +08:00
..
src '1' 2024-06-10 21:20:03 +08:00
.gitignore '1' 2024-06-10 21:20:03 +08:00
README.adoc '1' 2024-06-10 21:20:03 +08:00
pom.xml '1' 2024-06-10 21:20:03 +08:00

README.adoc

== Spring Data REST + Spring Security

This example shows how to secure a http://projects.spring.io/spring-data-rest[Spring Data REST] application in multiple ways with http://projects.spring.io/spring-security[Spring Security].

=== Defining the domain

For a basic Spring Data REST application, we need to define some domain objects. In this case, we have a company. The company has both employees and items it manages. The domain objects are declared as POJOs with JPA annotations.

.src/main/java/example/company/Employee.java
====
[source,java]
----
@Entity
public class Employee {

  private @Id @GeneratedValue Long id;
  private String firstName;
  private String lastName;
  private String title;

  …
}
----
====

.src/main/java/example/company/Item.java
====
[source,java]
----
@Entity
public class Item {

  private @Id @GeneratedValue Long id;
  private String description;

  …
}
----
====

=== Defining the repositories

Spring Data is based on the repository paradigm. In this case, we are defining a repository for each of these domain objects.

.src/main/java/example/company/EmployeeRepository.java
====
[source,java]
----
public interface EmployeeRepository extends CrudRepository<Employee, Long> {}
----
====

`EmployeeRepository` is about as simple as things can get. It extends Spring Data Commons' `CrudRepository`. This means that the repo doesn't HAVE to be tied to JPA. If the underlying `Employee` object was retooled for MongoDB, this repository definition would require no changes.

Now let's look at the next repository:

.src/main/java/example/company/ItemRepository.java
====
[source,java]
----
@PreAuthorize("hasRole('ROLE_USER')")
public interface ItemRepository extends CrudRepository<Item, Long>  {

  @PreAuthorize("hasRole('ROLE_ADMIN')")
  @Override
  Item save(Item s);

  @PreAuthorize("hasRole('ROLE_ADMIN')")
  @Override
  void delete(Long aLong);
}
----
====

This repository is simple in its functionality, but it has been marked up with Spring Security annotations (`@PreAuthorize`). The repository at the top level requires that the user have *ROLE_USER* before ANYTHING is granted.

NOTE: These code examples use Spring Security's more modern http://docs.spring.io/spring-security/site/docs/current/reference/htmlsingle/#method-security-expressions[@PreAuthorize] annotations. But you can also use http://docs.spring.io/spring-security/site/docs/current/reference/htmlsingle/#enableglobalmethodsecurity[@Secured] or JSR-250's security annotations. (Be advised, that JSR-250 annotations do NOT work at the interface level.)

To fine tune security policies, `save(Item)` and `delete(Item)` are overrides of `CrudRepository`, allowing us to further restrict these operations to require *ROLE_ADMIN*.

NOTE: This requires either Spring Security 3.2.6.RELEASE or 4.0.0.RELEASE (or higher).

=== Writing a security policy

The final bit that is needed is a security policy. By default, when using Spring Boot, everything is locked down and a random password is generated. Usually, you will want to replace this with a user store of some kind. In addition to that, you need to configure method-level security. To top it off, it is also possible to secure Spring Data REST endpoints at the URL level. All of this is shown below:

.src/main/java/example/company/SecurityConfiguration.java
====
[source,java]
----
@Configuration
@EnableGlobalMethodSecurity(prePostEnabled = true)
public class SecurityConfiguration extends WebSecurityConfigurerAdapter {

  /**
   * This section defines the user accounts which can be used for
   * authentication as well as the roles each user has.
   */
  @Override
  public void configure(AuthenticationManagerBuilder auth) throws Exception {

    auth.inMemoryAuthentication()
      .withUser("greg").password("turnquist").roles("USER").and()
      .withUser("ollie").password("gierke").roles("USER", "ADMIN");
  }

  /**
   * This section defines the security policy for the app.
   * - BASIC authentication is supported (enough for this REST-based demo)
   * - /employees is secured using URL security shown below
   * - CSRF headers are disabled since we are only testing the REST interface,
   *   not a web one.
   *
   * NOTE: GET is not shown which defaults to permitted.
   */
  @Override
  protected void configure(HttpSecurity http) throws Exception {

    http
      .httpBasic().and()
      .authorizeRequests()
        .antMatchers(HttpMethod.POST, "/employees").hasRole("ADMIN")
        .antMatchers(HttpMethod.PUT, "/employees/**").hasRole("ADMIN")
        .antMatchers(HttpMethod.PATCH, "/employees/**").hasRole("ADMIN").and()
      .csrf().disable();
  }
}
----
====

The top section shows the user accounts defined in the app.

The second section shows the URL restrictions that have been applied. Note that *GET /employees* has no restrictions at all. The other operations require *ROLE_ADMIN*.

=== Testing things out

You can drill down into `Application.java` to find the data that is preloaded.

. Run the app.
+
----
$ mvn spring-boot:run
----
+
. In another shell, look up the list of employees:
+
----
$ curl localhost:8080/employees
----
+
----
{
  "_embedded" : {
    "employees" : [ {
      "firstName" : "Bilbo",
      "lastName" : "Baggins",
      "title" : "thief",
      "_links" : {
        "self" : {
          "href" : "http://localhost:8080/employees/1"
        }
      }
    }, {
...
----
No security required!
+
. Try to POST with no credentials.
+
----
$ curl -X POST -d '{"firstName": "Saruman", "lastName": "the evil one", "title": "the White"}' localhost:8080/employees
----
+
----
{"timestamp":1412958386366,"status":401,"error":"Unauthorized","message":"Full authentication is required to access this resource","path":"/employees"}
----
You are denied due a lack of authentication, i.e. confirming who you are.
+
. Try to POST with *USER* level credentials.
+
----
$ curl -X POST -d '{"firstName": "Saruman", "lastName": "the evil one", "title": "the White"}' localhost:8080/employees -u greg:turnquist
----
+
----
{"timestamp":1412958491870,"status":403,"error":"Forbidden","message":"Access is denied","path":"/employees"}
----
You are now denied due to not having sufficient authorization.
+
. Try to POST with *ADMIN* level credentials.
+
----
$ curl -i -X POST -d '{"firstName": "Saruman", "lastName": "the evil one", "title": "the White"}' -H "Content-Type: application/json" localhost:8080/employees -u ollie:gierke
----
+
----
HTTP/1.1 201 Created
Server: Apache-Coyote/1.1
X-Content-Type-Options: nosniff
X-XSS-Protection: 1; mode=block
Cache-Control: no-cache, no-store, max-age=0, must-revalidate
Pragma: no-cache
Expires: 0
X-Frame-Options: DENY
Set-Cookie: JSESSIONID=D738A5C8E5EACF6C118F8452A8C98919; Path=/; HttpOnly
Location: http://localhost:8080/employees/4
Content-Length: 0
----
+
Finally you have managed to create a new entry as shown by the *Location* header. You can also read about these various http://docs.spring.io/spring-security/site/docs/current/reference/htmlsingle/#headers[security-based headers] that Spring Security adds by default and what extra protections they add.
+
. Now, try to fetch the list of items.
+
----
$ curl localhost:8080/items
----
+
----
{"timestamp":1412958853221,"status":401,"error":"Unauthorized","exception":"org.springframework.security.access.AccessDeniedException","message":"Access is denied","path":"/items"}
----
This fails at the get go because the entire repository is secured. Only with a *USER* level or higher can you see anything.
+
. Try to fetch the list of items with *USER* level credentials.
+
----
$ curl localhost:8080/items -u greg:turnquist
----
+
----
{
  "_embedded" : {
    "items" : [ {
      "description" : "Sting",
      "_links" : {
        "self" : {
          "href" : "http://localhost:8080/items/1"
        }
      }
    }, {
      "description" : "the one ring",
      "_links" : {
        "self" : {
          "href" : "http://localhost:8080/items/2"
        }
      }
    } ]
  }
}
----

From here on, you can experiment with this sample application:

* Try to perform various operations with the accounts like fetching, creating, updating, replacing, and deleting through the REST API.
* Inject the repositories inside some other code and use it there.
* Write your own custom controller and export either repository your own way. Find out what security controls are carried through by default and what ones you have to add.
* Finally, fiddle with the roles and permissions and change the security settings.