7 Commits

Author SHA1 Message Date
semantic-release-bot
0296eed6bd chore(release): 1.2.2 [skip ci]
## [1.2.2](https://git.tools.ldpt.fr/lucasdpt/spring-keycloak-starter/compare/1.2.1...1.2.2) (2025-09-27)

### Bug Fixes

* fix requestMatcher for actuator ([a19bed6](a19bed652c))
2025-09-27 14:43:33 +00:00
lucasdpt
a19bed652c fix: fix requestMatcher for actuator
All checks were successful
Release / release (push) Successful in 2m4s
2025-09-27 16:41:55 +02:00
semantic-release-bot
45d21154cc chore(release): 1.2.1 [skip ci]
## [1.2.1](https://git.tools.ldpt.fr/lucasdpt/spring-keycloak-starter/compare/1.2.0...1.2.1) (2025-09-26)

### Bug Fixes

* update bean init ([46a618d](46a618daea))
2025-09-26 13:06:43 +00:00
lucasdpt
46a618daea fix: update bean init
All checks were successful
Release / release (push) Successful in 1m57s
2025-09-26 15:05:12 +02:00
semantic-release-bot
a1cff78f0c chore(release): 1.2.0 [skip ci]
# [1.2.0](https://git.tools.ldpt.fr/lucasdpt/spring-keycloak-starter/compare/v1.1.0...1.2.0) (2025-09-26)

### Features

* refactor way to get CallerId ([94dd635](94dd6355b4))
2025-09-26 11:06:02 +00:00
lucasdpt
94dd6355b4 feat: refactor way to get CallerId
All checks were successful
Release / release (push) Successful in 1m54s
2025-09-26 13:04:30 +02:00
f2fead959d ci: update semantic-release tagFormat
All checks were successful
Release / release (push) Successful in 1m20s
2025-09-23 06:52:38 +00:00
5 changed files with 30 additions and 35 deletions

View File

@@ -1,5 +1,6 @@
{ {
"branches": ["master"], "branches": ["master"],
"tagFormat": "${version}",
"plugins": [ "plugins": [
"@semantic-release/commit-analyzer", "@semantic-release/commit-analyzer",
"@semantic-release/release-notes-generator", "@semantic-release/release-notes-generator",

View File

@@ -1,3 +1,24 @@
## [1.2.2](https://git.tools.ldpt.fr/lucasdpt/spring-keycloak-starter/compare/1.2.1...1.2.2) (2025-09-27)
### Bug Fixes
* fix requestMatcher for actuator ([a19bed6](https://git.tools.ldpt.fr/lucasdpt/spring-keycloak-starter/commit/a19bed652cc87cf02e45fc0c14e2082eaa176830))
## [1.2.1](https://git.tools.ldpt.fr/lucasdpt/spring-keycloak-starter/compare/1.2.0...1.2.1) (2025-09-26)
### Bug Fixes
* update bean init ([46a618d](https://git.tools.ldpt.fr/lucasdpt/spring-keycloak-starter/commit/46a618daea7637c565240e468829294860cc6478))
# [1.2.0](https://git.tools.ldpt.fr/lucasdpt/spring-keycloak-starter/compare/v1.1.0...1.2.0) (2025-09-26)
### Features
* refactor way to get CallerId ([94dd635](https://git.tools.ldpt.fr/lucasdpt/spring-keycloak-starter/commit/94dd6355b40e69ef6863a225bbe60f9f8a780047))
# [1.1.0](https://git.tools.ldpt.fr/lucasdpt/spring-keycloak-starter/compare/v1.0.1...v1.1.0) (2025-09-21) # [1.1.0](https://git.tools.ldpt.fr/lucasdpt/spring-keycloak-starter/compare/v1.0.1...v1.1.0) (2025-09-21)

View File

@@ -6,7 +6,7 @@
<groupId>fr.lucasdupont</groupId> <groupId>fr.lucasdupont</groupId>
<artifactId>spring-keycloak-starter</artifactId> <artifactId>spring-keycloak-starter</artifactId>
<version>1.1.0</version> <version>1.2.2</version>
<properties> <properties>
<maven.compiler.source>21</maven.compiler.source> <maven.compiler.source>21</maven.compiler.source>

View File

@@ -1,28 +1,14 @@
package fr.lucasdupont.security; package fr.lucasdupont.security;
import org.springframework.core.MethodParameter;
import org.springframework.security.core.Authentication; import org.springframework.security.core.Authentication;
import org.springframework.security.core.context.SecurityContextHolder; import org.springframework.security.core.context.SecurityContextHolder;
import org.springframework.security.oauth2.jwt.Jwt; import org.springframework.security.oauth2.jwt.Jwt;
import org.springframework.security.oauth2.server.resource.authentication.JwtAuthenticationToken; import org.springframework.security.oauth2.server.resource.authentication.JwtAuthenticationToken;
import org.springframework.web.bind.support.WebDataBinderFactory; import org.springframework.stereotype.Component;
import org.springframework.web.context.request.NativeWebRequest;
import org.springframework.web.method.support.HandlerMethodArgumentResolver;
import org.springframework.web.method.support.ModelAndViewContainer;
public class CallerIdArgumentResolver implements HandlerMethodArgumentResolver { public class CallerIdResolver {
@Override
public boolean supportsParameter(MethodParameter parameter) {
return CallerId.class.isAssignableFrom(parameter.getParameterType());
}
@Override
public Object resolveArgument(MethodParameter parameter,
ModelAndViewContainer mavContainer,
NativeWebRequest webRequest,
WebDataBinderFactory binderFactory) throws IllegalAccessException {
public CallerId get() throws IllegalAccessException {
Authentication auth = SecurityContextHolder.getContext().getAuthentication(); Authentication auth = SecurityContextHolder.getContext().getAuthentication();
if (!(auth instanceof JwtAuthenticationToken jwtAuth)) { if (!(auth instanceof JwtAuthenticationToken jwtAuth)) {
throw new IllegalAccessException("Authentication is not of type JwtAuthenticationToken"); throw new IllegalAccessException("Authentication is not of type JwtAuthenticationToken");
@@ -44,4 +30,5 @@ public class CallerIdArgumentResolver implements HandlerMethodArgumentResolver {
return new CallerId(sub, CallerId.Type.USER); return new CallerId(sub, CallerId.Type.USER);
} }
} }
} }

View File

@@ -9,10 +9,6 @@ import org.springframework.security.config.annotation.web.configurers.AbstractHt
import org.springframework.security.oauth2.server.resource.authentication.JwtAuthenticationConverter; import org.springframework.security.oauth2.server.resource.authentication.JwtAuthenticationConverter;
import org.springframework.security.web.SecurityFilterChain; import org.springframework.security.web.SecurityFilterChain;
import org.springframework.security.web.authentication.UsernamePasswordAuthenticationFilter; import org.springframework.security.web.authentication.UsernamePasswordAuthenticationFilter;
import org.springframework.web.method.support.HandlerMethodArgumentResolver;
import org.springframework.web.servlet.config.annotation.WebMvcConfigurer;
import java.util.List;
@AutoConfiguration @AutoConfiguration
@ConditionalOnClass(HttpSecurity.class) @ConditionalOnClass(HttpSecurity.class)
@@ -30,7 +26,7 @@ public class KeycloakAutoConfiguration {
http http
.csrf(AbstractHttpConfigurer::disable) .csrf(AbstractHttpConfigurer::disable)
.authorizeHttpRequests(registry -> registry .authorizeHttpRequests(registry -> registry
.requestMatchers("/actuator/health", "/actuator/info").permitAll() .requestMatchers("/actuator/health", "/actuator/info", "/actuator/health/*", "/actuator/info/*").permitAll()
.anyRequest().authenticated() .anyRequest().authenticated()
) )
.oauth2ResourceServer(oauth2 -> oauth2 .oauth2ResourceServer(oauth2 -> oauth2
@@ -48,18 +44,8 @@ public class KeycloakAutoConfiguration {
} }
@Bean @Bean
public WebMvcConfigurer callerIdArgumentResolverConfigurer(CallerIdArgumentResolver resolver) { public CallerIdResolver callerIdResolver() {
return new WebMvcConfigurer() { return new CallerIdResolver();
@Override
public void addArgumentResolvers(List<HandlerMethodArgumentResolver> resolvers) {
resolvers.add(resolver);
}
};
}
@Bean
public CallerIdArgumentResolver callerIdArgumentResolver() {
return new CallerIdArgumentResolver();
} }
} }