Codota Logo
io.vertx.reactivex.ext.auth
Code IndexAdd Codota to your IDE (free)

How to use io.vertx.reactivex.ext.auth

Best Java code snippets using io.vertx.reactivex.ext.auth (Showing top 20 results out of 315)

  • Add the Codota plugin to your IDE and get smart completions
private void myMethod () {
Dictionary d =
  • Codota Iconnew Hashtable()
  • Codota IconBundle bundle;bundle.getHeaders()
  • Codota Iconnew Properties()
  • Smart code suggestions by Codota
}
origin: FroMage/redpipe

private String getUserName() {
  return user.principal().getString("username");
}
origin: FroMage/redpipe

private String getUserName() {
  AccessToken tok = (AccessToken) user.getDelegate();
  return tok.accessToken().getString("preferred_username");
}
origin: net.redpipe/redpipe-engine

  @Override
  public void setUser(User user) {
//        System.err.println("setUser: "+user);
    ResteasyProviderFactory.pushContext(io.vertx.reactivex.ext.auth.User.class, io.vertx.reactivex.ext.auth.User.newInstance(user));
    delegate.setUser(user);
  }

origin: FroMage/redpipe

User user;
try {
  user = await(auth.rxAuthenticate(creds));
}catch(VertxException x) {
  return Response.status(Status.FORBIDDEN).build();
boolean canCreate = await(user.rxIsAuthorised("create"));
boolean canUpdate = await(user.rxIsAuthorised("update"));
boolean canDelete = await(user.rxIsAuthorised("delete"));
JsonArray permissions = new JsonArray();
if(canCreate)
  permissions.add("delete");
String jwtToken = jwt.generateToken(
    new JsonObject()
    .put("username", username)
origin: FroMage/redpipe

@Path("/save")
@POST
public Single<Response> save(@FormParam("id") String id,
    @FormParam("title") String title,
    @FormParam("markdown") String markdown,
    @FormParam("newPage") String newPage){
  return fiber((con) -> {
    boolean isNewPage = "yes".equals(newPage);
    String requiredPermission = isNewPage ? "create" : "update";
    if(!await(user.rxIsAuthorised(requiredPermission)))
      throw new AuthorizationException("Not authorized");
    String sql = isNewPage ? SQL.SQL_CREATE_PAGE : SQL.SQL_SAVE_PAGE;
    JsonArray params = new JsonArray();
    if (isNewPage) {
      params.add(title).add(markdown);
    } else {
      params.add(markdown).add(id);
    }
    await(con.rxUpdateWithParams(sql, params));
    URI location = Router.getURI(WikiResource::renderPage, title);
    return Response.seeOther(location).build();
  });
}
origin: net.redpipe/redpipe-engine

    auth != null ? io.vertx.rxjava.ext.auth.AuthProvider.newInstance(auth.getDelegate()) : null);
ResteasyProviderFactory.pushContext(io.vertx.rxjava.ext.auth.User.class, 
    context.user() != null ? io.vertx.rxjava.ext.auth.User.newInstance(context.user().getDelegate()) : null);
ResteasyProviderFactory.pushContext(io.vertx.rxjava.ext.web.Session.class, 
    context.session() != null ? io.vertx.rxjava.ext.web.Session.newInstance(context.session().getDelegate()) : null);
origin: FroMage/redpipe

User user;
try {
  user = await(auth.rxAuthenticate(creds));
}catch(VertxException x) {
  return Response.status(Status.FORBIDDEN).build();
boolean canCreate = await(user.rxIsAuthorised("create"));
boolean canUpdate = await(user.rxIsAuthorised("update"));
boolean canDelete = await(user.rxIsAuthorised("delete"));
JsonArray permissions = new JsonArray();
if(canCreate)
  permissions.add("delete");
String jwtToken = jwt.generateToken(
    new JsonObject()
    .put("username", username)
origin: io.gravitee.am.gateway.handlers/gravitee-am-gateway-handler

if (authenticatedUser == null || !(authenticatedUser.getDelegate() instanceof io.gravitee.am.gateway.handler.vertx.auth.user.User)) {
io.gravitee.am.model.User endUser = ((io.gravitee.am.gateway.handler.vertx.auth.user.User) authenticatedUser.getDelegate()).getUser();
Date loggedAt = endUser.getLoggedAt();
if (loggedAt == null) {
origin: FroMage/redpipe

@GET
public Single<Template> index(){
  return fiber(() -> {
    List<Pages> res = await(dao.findAll());
    List<String> pages = res
        .stream()
        .map(page -> page.getName())
        .sorted()
        .collect(Collectors.toList());
    boolean canCreatePage = await(user.rxIsAuthorised("create"));
    return new Template("templates/index.ftl")
        .set("title", "Wiki home")
        .set("pages", pages)
        .set("canCreatePage", canCreatePage)
        .set("username", getUserName())
        .set("backup_gist_url", flash.get("backup_gist_url"));
  });
}
origin: FroMage/redpipe

  @Override
  public void setUser(User user) {
//        System.err.println("setUser: "+user);
    ResteasyProviderFactory.pushContext(io.vertx.reactivex.ext.auth.User.class, io.vertx.reactivex.ext.auth.User.newInstance(user));
    delegate.setUser(user);
  }

origin: gravitee-io/graviteeio-access-management

if (authenticatedUser == null || !(authenticatedUser.getDelegate() instanceof io.gravitee.am.gateway.handler.vertx.auth.user.User)) {
io.gravitee.am.model.User endUser = ((io.gravitee.am.gateway.handler.vertx.auth.user.User) authenticatedUser.getDelegate()).getUser();
Date loggedAt = endUser.getLoggedAt();
if (loggedAt == null) {
origin: FroMage/redpipe

  @Override
  public Single<Boolean> assertAuthorized(Annotation authzSpec) {
    if(authzSpec instanceof RequiresPermissions){
      User user = getUser();
      if(user == null)
        return Single.error(new AuthorizationException("User required"));
      Single<Boolean> ret = Single.just(true);
      for(String perm : ((RequiresPermissions) authzSpec).value()){
        ret = user.rxIsAuthorised(perm).zipWith(ret, (a, b) -> a && b);
      }
      return ret;
    }
    return Single.just(true);
  }
}
origin: io.gravitee.am.gateway.handlers/gravitee-am-gateway-handler

@Override
public void handle(RoutingContext context) {
  // The authorization server first validates the client credentials (in
  // case of a confidential client) and then verifies whether the token
  // was issued to the client making the revocation request.  If this
  // validation fails, the request is refused and the client is informed
  // of the error by the authorization server as described below.
  User authenticatedUser = context.user();
  if (authenticatedUser == null || ! (authenticatedUser.getDelegate() instanceof Client)) {
    throw new InvalidClientException("Invalid client");
  }
  Client client = (Client) authenticatedUser.getDelegate();
  revocationTokenService
      .revoke(createRequest(context), client.getClient())
      .subscribe(() -> context.response().setStatusCode(200).end(), error -> context.fail(error));
}
origin: net.redpipe/redpipe-engine

  @Override
  public Single<Boolean> assertAuthorized(Annotation authzSpec) {
    if(authzSpec instanceof RequiresPermissions){
      User user = getUser();
      if(user == null)
        return Single.error(new AuthorizationException("User required"));
      Single<Boolean> ret = Single.just(true);
      for(String perm : ((RequiresPermissions) authzSpec).value()){
        ret = user.rxIsAuthorised(perm).zipWith(ret, (a, b) -> a && b);
      }
      return ret;
    }
    return Single.just(true);
  }
}
origin: gravitee-io/graviteeio-access-management

@Override
public void handle(RoutingContext context) {
  // The authorization server first validates the client credentials (in
  // case of a confidential client) and then verifies whether the token
  // was issued to the client making the revocation request.  If this
  // validation fails, the request is refused and the client is informed
  // of the error by the authorization server as described below.
  User authenticatedUser = context.user();
  if (authenticatedUser == null || ! (authenticatedUser.getDelegate() instanceof Client)) {
    throw new InvalidClientException("Invalid client");
  }
  Client client = (Client) authenticatedUser.getDelegate();
  revocationTokenService
      .revoke(createRequest(context), client.getClient())
      .subscribe(() -> context.response().setStatusCode(200).end(), error -> context.fail(error));
}
origin: FroMage/redpipe

@GET
public Single<Template> index(){
  return fiber((con) -> {
    ResultSet res = await(con.rxQuery(SQL.SQL_ALL_PAGES));
    List<String> pages = res.getResults()
        .stream()
        .map(json -> json.getString(0))
        .sorted()
        .collect(Collectors.toList());
    boolean canCreatePage = await(user.rxIsAuthorised("create"));
    return new Template("templates/index.ftl")
        .set("title", "Wiki home")
        .set("pages", pages)
        .set("canCreatePage", canCreatePage)
        .set("username", getUserName())
        .set("backup_gist_url", flash.get("backup_gist_url"));
  });
}
origin: io.gravitee.am.gateway.handlers/gravitee-am-gateway-handler

@Override
public void handle(RoutingContext context) {
  // If the protected resource uses OAuth 2.0 client credentials to
  // authenticate to the introspection endpoint and its credentials are
  // invalid, the authorization server responds with an HTTP 401
  User authenticatedUser = context.user();
  if (authenticatedUser == null || ! (authenticatedUser.getDelegate() instanceof Client)) {
    throw new InvalidClientException();
  }
  introspectionService
      .introspect(createRequest(context))
      .doOnSuccess(introspectionResponse -> context.response()
          .putHeader(HttpHeaders.CACHE_CONTROL, "no-store")
          .putHeader(HttpHeaders.PRAGMA, "no-cache")
          .putHeader(HttpHeaders.CONTENT_TYPE, MediaType.APPLICATION_JSON)
          .end(Json.encodePrettily(introspectionResponse)))
      .subscribe();
}
origin: FroMage/redpipe

@Path("/save")
@POST
public Single<Response> save(@FormParam("id") String id,
    @FormParam("title") String title,
    @FormParam("markdown") String markdown,
    @FormParam("newPage") String newPage){
  return fiber(() -> {
    boolean isNewPage = "yes".equals(newPage);
    String requiredPermission = isNewPage ? "create" : "update";
    if(!await(user.rxIsAuthorised(requiredPermission)))
      throw new AuthorizationException("Not authorized");
    io.reactivex.Single<Integer> query;
    if(isNewPage)
      query = dao.insert(new Pages().setName(title).setContent(markdown));
    else
      query = dao.update(new Pages().setId(Integer.valueOf(id)).setContent(markdown).setName(title));
    await(query);
    URI location = Router.getURI(WikiResource::renderPage, title);
    return Response.seeOther(location).build();
  });
}
origin: gravitee-io/graviteeio-access-management

@Override
public void handle(RoutingContext context) {
  // If the protected resource uses OAuth 2.0 client credentials to
  // authenticate to the introspection endpoint and its credentials are
  // invalid, the authorization server responds with an HTTP 401
  User authenticatedUser = context.user();
  if (authenticatedUser == null || ! (authenticatedUser.getDelegate() instanceof Client)) {
    throw new InvalidClientException();
  }
  introspectionService
      .introspect(createRequest(context))
      .doOnSuccess(introspectionResponse -> context.response()
          .putHeader(HttpHeaders.CACHE_CONTROL, "no-store")
          .putHeader(HttpHeaders.PRAGMA, "no-cache")
          .putHeader(HttpHeaders.CONTENT_TYPE, MediaType.APPLICATION_JSON)
          .end(Json.encodePrettily(introspectionResponse)))
      .subscribe();
}
origin: io.gravitee.am.gateway.handlers/gravitee-am-gateway-handler

if (authenticatedUser == null || ! (authenticatedUser.getDelegate() instanceof Client)) {
  throw new InvalidClientException();
io.vertx.reactivex.ext.auth

Most used classes

  • User
  • AuthProvider
  • JWTAuth
  • JDBCAuth
  • OAuth2Auth
  • ShiroAuth
Codota Logo
  • Products

    Search for Java codeSearch for JavaScript codeEnterprise
  • IDE Plugins

    IntelliJ IDEAWebStormAndroid StudioEclipseVisual Studio CodePyCharmSublime TextPhpStormVimAtomGoLandRubyMineEmacsJupyter
  • Company

    About UsContact UsCareers
  • Resources

    FAQBlogCodota Academy Plugin user guide Terms of usePrivacy policyJava Code IndexJavascript Code Index
Get Codota for your IDE now