.buildAuthFilter())); environment.jersey().register(new AuthValueFactoryProvider.Binder<>(Account.class));
@Override public KeycloakAuthFilter<P> buildAuthFilter() { Preconditions.checkArgument(adapterConfig != null, "Keycloak config is not set"); KeycloakAuthFilter<P> filter = super.buildAuthFilter(); filter.initializeKeycloak(); return filter; } }
@Override public AuthFilter<?, Principal> createAuthFilter(AuthenticationBootstrap bootstrap) { final byte[] decodedSecretKey = Base64.getDecoder().decode(secretKey); final Key secretKeyKey = new SecretKeySpec(decodedSecretKey, 0, decodedSecretKey.length, this.getSignatureAlgorithm().toString()); return new JsonWebTokenAuthFilter.Builder<>() .setAuthenticator(new JsonWebTokenAuthenticator(secretKeyKey, this.getSignatureAlgorithm())) .setAuthorizer(new PermitAllAuthorizer()) .buildAuthFilter(); } }
.setRealm("System-Api") .setAuthorizer(new BasicAuthorizer(config.user())) .buildAuthFilter();
.setAuthorizer(new PermitAllAuthorizer<>()) .setPrefix("Bearer") .buildAuthFilter())); environment.jersey().register(RolesAllowedDynamicFeature.class); environment.jersey().register(new AuthValueFactoryProvider.Binder<>(UserPrincipal.class));
.setAuthorizer(new DefaultAuthorizer()) .setUnauthorizedHandler(new DefaultUnauthorizedHandler()) .buildAuthFilter(); environment.jersey().register(RolesAllowedDynamicFeature.class); environment.jersey().register(new AuthDynamicFeature(authFilter));
.setPrefix(BEARER) .setAuthenticator(cachingJwtAuthenticator) .buildAuthFilter() ));
.setAuthenticator(cachingAuthenticator) .setPrefix("Bearer") .buildAuthFilter())); environment.jersey().register(new AuthValueFactoryProvider.Binder<>(Account.class));
private void registerWebAPIs(Environment env, Map<String, String> conf, ScheduledExecutorService bgTasks) throws SQLException, ClassNotFoundException { env.jersey().register(new GrafanaQueryApiv1(storageEngine)); env.jersey().register(new GrafanaQueryApiv2(storageEngine)); env.jersey().register(new MeasurementOpsApi(storageEngine)); env.jersey().register(new DatabaseOpsApi(storageEngine)); // env.jersey().register(new SqlApi(storageEngine)); if (Boolean.parseBoolean(conf.getOrDefault("jersey.influx", "true"))) { PointProcessor proc = new PointProcessorABQ(storageEngine, conf); env.jersey().register(new InfluxApi(proc)); } env.healthChecks().register("restapi", new RestAPIHealthCheck()); if (Boolean.parseBoolean(conf.getOrDefault(ConfigConstants.AUTH_BASIC_ENABLED, ConfigConstants.FALSE))) { logger.info("Enabling basic authentication"); AuthFilter<BasicCredentials, Principal> basicCredentialAuthFilter = new BasicCredentialAuthFilter.Builder<>() .setAuthenticator(new BasicAuthenticator(conf.get(ConfigConstants.AUTH_BASIC_USERS))) .setAuthorizer(new AllowAllAuthorizer()).setPrefix("Basic").buildAuthFilter(); env.jersey().register(basicCredentialAuthFilter); } }
private static void setupLdapAuth(LdapConfiguration ldapConfiguration, Environment environment) { final LdapAuthenticator ldapAuthenticator = new LdapAuthenticator(ldapConfiguration); final CachingAuthenticator<BasicCredentials, User> cachingAuthenticator = new CachingAuthenticator<>( environment.metrics(), TenacityAuthenticator.wrap( new ResourceAuthenticator(ldapAuthenticator), BreakerboxDependencyKey.BRKRBX_LDAP_AUTH), ldapConfiguration.getCachePolicy() ); environment.jersey().register(new AuthDynamicFeature( new BasicCredentialAuthFilter.Builder<User>() .setAuthenticator(cachingAuthenticator) .setRealm("breakerbox") .buildAuthFilter())); environment.jersey().register(new AuthValueFactoryProvider.Binder<>(User.class)); }
/** * Default implementation for the Keycloak auth factory. Please provide your own if you implement * your own User's representation. * * @param configuration the application's configuration * @return Keycloak auth factory */ protected ContainerRequestFilter createAuthFactory(T configuration) { return new KeycloakAuthFilter.Builder<Principal>() .setConfig(getKeycloakConfiguration(configuration)) .setAuthenticator(createAuthenticator(getKeycloakConfiguration(configuration))) .setAuthorizer(createAuthorizer()) .setRealm(getRealm(configuration)) .buildAuthFilter(); }
public <T extends SecurityRestAuthenticator> void configure(Injector injector, Environment environment, Class<T> authenticator, Authorizer<UserInfo> authorizer) { environment.jersey().register(new AuthDynamicFeature( new OAuthCredentialAuthFilter.Builder<UserInfo>() .setAuthenticator(injector.getInstance(authenticator)) .setAuthorizer(authorizer) .setPrefix(PREFIX) .setUnauthorizedHandler(injector.getInstance(SecurityUnauthorizedHandler.class)) .buildAuthFilter())); environment.jersey().register(RolesAllowedDynamicFeature.class); environment.jersey().register(new AuthValueFactoryProvider.Binder<>(UserInfo.class)); } }
@Override protected void configure() { environment.jersey().register(new AuthDynamicFeature(new GitLabAuthFilter.Builder() .setAuthenticator(new GitLabAuthenticator(configuration.getPassword())) .setUnauthorizedHandler((s, s1) -> Response.status(Response.Status.UNAUTHORIZED).build()) .setRealm("GitLab HOOK") .buildAuthFilter())); environment.jersey().register(RolesAllowedDynamicFeature.class); environment.jersey().register(new AuthValueFactoryProvider.Binder<>(Principal.class)); }
@Override public void run(Configuration configuration, Environment environment) { environment.jersey().register(new LoginResource()); environment.jersey().register(new UserResource()); environment.jersey().register(new TrekResource()); environment.jersey().register(new AuthDynamicFeature( new OAuthCredentialAuthFilter.Builder<PrincipalImpl>() .setAuthenticator(new TestOAuthAuthenticator()).setPrefix("Bearer") .buildAuthFilter())); environment.jersey().register(RolesAllowedDynamicFeature.class); environment.jersey().register(new AuthValueFactoryProvider.Binder<>(PrincipalImpl.class)); } }
@Override public AuthFilter<?, Principal> createAuthFilter(AuthenticationBootstrap bootstrap) { return new BasicCredentialAuthFilter.Builder<>() .setAuthenticator(new BasicAuthenticator(bootstrap.getUserDAO())) .setAuthorizer(new PermitAllAuthorizer()) .setRealm(realm) .buildAuthFilter(); } }
private static void setupNullAuth(Environment environment) { environment.jersey().register(new AuthDynamicFeature( new NullAuthFilter.Builder<User>() .setAuthenticator(new NullAuthenticator()) .setRealm("null") .buildAuthFilter())); environment.jersey().register(new AuthValueFactoryProvider.Binder<>(User.class)); }
@Override public AuthFilter<?, Principal> createAuthFilter(AuthenticationBootstrap bootstrap) { return new GuestAuthFilter.Builder<>() .setAuthenticator(new GuestAuthenticator(guestUserName)) .setAuthorizer(new PermitAllAuthorizer()) .setRealm(DEFAULT_GUEST_AUTH_REALM) .buildAuthFilter(); } }
@Override public void run(HelloWorldConfiguration configuration, Environment environment) { final PersonDAO dao = new PersonDAO(hibernateBundle.getSessionFactory()); final Template template = configuration.buildTemplate(); environment.healthChecks().register("template", new TemplateHealthCheck(template)); environment.admin().addTask(new EchoTask()); environment.jersey().register(DateRequiredFeature.class); environment.jersey().register(new AuthDynamicFeature(new BasicCredentialAuthFilter.Builder<User>() .setAuthenticator(new ExampleAuthenticator()) .setAuthorizer(new ExampleAuthorizer()) .setRealm("SUPER SECRET STUFF") .buildAuthFilter())); environment.jersey().register(new AuthValueFactoryProvider.Binder<>(User.class)); environment.jersey().register(RolesAllowedDynamicFeature.class); environment.jersey().register(new HelloWorldResource(template)); environment.jersey().register(new ViewResource()); environment.jersey().register(new ProtectedResource()); environment.jersey().register(new PeopleResource(dao)); environment.jersey().register(new PersonResource(dao)); environment.jersey().register(new FilteredResource()); } }