Skip to content

Commit a910eba

Browse files
author
eugenp
committed
quick formatting work
1 parent 89d3f72 commit a910eba

File tree

3 files changed

+63
-89
lines changed

3 files changed

+63
-89
lines changed

spring-security-mvc-ldap/src/main/java/org/baeldung/SampleLDAPApplication.java

Lines changed: 7 additions & 7 deletions
Original file line numberDiff line numberDiff line change
@@ -15,13 +15,13 @@
1515
@ComponentScan("org.baeldung")
1616
public class SampleLDAPApplication extends WebMvcConfigurerAdapter {
1717

18-
public static void main(String[] args) {
19-
SpringApplication.run(SampleLDAPApplication.class, args);
20-
}
18+
public static void main(String[] args) {
19+
SpringApplication.run(SampleLDAPApplication.class, args);
20+
}
2121

22-
@Override
23-
public void addViewControllers(ViewControllerRegistry registry) {
24-
registry.addViewController("/login").setViewName("login");
25-
}
22+
@Override
23+
public void addViewControllers(ViewControllerRegistry registry) {
24+
registry.addViewController("/login").setViewName("login");
25+
}
2626

2727
}

spring-security-mvc-ldap/src/main/java/org/baeldung/controller/MyController.java

Lines changed: 47 additions & 51 deletions
Original file line numberDiff line numberDiff line change
@@ -4,7 +4,6 @@
44
import java.util.Arrays;
55
import java.util.Collection;
66
import java.util.HashSet;
7-
import java.util.List;
87
import java.util.Map;
98
import java.util.Set;
109

@@ -20,55 +19,52 @@
2019
@Controller
2120
public class MyController {
2221

23-
@RequestMapping("/")
24-
public String init(Map<String, Object> model, Principal principal) {
25-
model.put("title", "PUBLIC AREA");
26-
model.put("message", "Any user can view this page");
27-
model.put("username", getUserName(principal));
28-
model.put("userroles", getUserRoles(principal));
29-
return "home";
30-
}
22+
@RequestMapping("/")
23+
public String init(Map<String, Object> model, Principal principal) {
24+
model.put("title", "PUBLIC AREA");
25+
model.put("message", "Any user can view this page");
26+
model.put("username", getUserName(principal));
27+
model.put("userroles", getUserRoles(principal));
28+
return "home";
29+
}
3130

32-
@RequestMapping("/secure")
33-
public String secure(Map<String, Object> model, Principal principal) {
34-
model.put("title", "SECURE AREA");
35-
model.put("message", "Only Authorised Users Can See This Page");
36-
model.put("username", getUserName(principal));
37-
model.put("userroles", getUserRoles(principal));
38-
return "home";
39-
}
40-
41-
private String getUserName(Principal principal){
42-
43-
if(principal == null){
44-
return "anonymous";
45-
}else{
46-
47-
final UserDetails currentUser = (UserDetails) ((Authentication) principal).getPrincipal();
48-
Collection<? extends GrantedAuthority> authorities = currentUser.getAuthorities();
49-
for(GrantedAuthority grantedAuthority : authorities) {
50-
System.out.println(grantedAuthority.getAuthority());
51-
}
52-
return principal.getName();
53-
}
54-
}
55-
56-
private Collection<String> getUserRoles(Principal principal){
57-
58-
if(principal == null){
59-
return Arrays.asList("none");
60-
}else{
61-
62-
Set<String> roles = new HashSet<String>();
63-
64-
final UserDetails currentUser = (UserDetails) ((Authentication) principal).getPrincipal();
65-
Collection<? extends GrantedAuthority> authorities = currentUser.getAuthorities();
66-
for(GrantedAuthority grantedAuthority : authorities) {
67-
roles.add(grantedAuthority.getAuthority());
68-
}
69-
return roles;
70-
}
71-
}
72-
73-
}
31+
@RequestMapping("/secure")
32+
public String secure(Map<String, Object> model, Principal principal) {
33+
model.put("title", "SECURE AREA");
34+
model.put("message", "Only Authorised Users Can See This Page");
35+
model.put("username", getUserName(principal));
36+
model.put("userroles", getUserRoles(principal));
37+
return "home";
38+
}
39+
40+
private String getUserName(Principal principal) {
41+
if (principal == null) {
42+
return "anonymous";
43+
} else {
44+
45+
final UserDetails currentUser = (UserDetails) ((Authentication) principal).getPrincipal();
46+
Collection<? extends GrantedAuthority> authorities = currentUser.getAuthorities();
47+
for (GrantedAuthority grantedAuthority : authorities) {
48+
System.out.println(grantedAuthority.getAuthority());
49+
}
50+
return principal.getName();
51+
}
52+
}
53+
54+
private Collection<String> getUserRoles(Principal principal) {
55+
if (principal == null) {
56+
return Arrays.asList("none");
57+
} else {
7458

59+
Set<String> roles = new HashSet<String>();
60+
61+
final UserDetails currentUser = (UserDetails) ((Authentication) principal).getPrincipal();
62+
Collection<? extends GrantedAuthority> authorities = currentUser.getAuthorities();
63+
for (GrantedAuthority grantedAuthority : authorities) {
64+
roles.add(grantedAuthority.getAuthority());
65+
}
66+
return roles;
67+
}
68+
}
69+
70+
}

spring-security-mvc-ldap/src/main/java/org/baeldung/security/SecurityConfig.java

Lines changed: 9 additions & 31 deletions
Original file line numberDiff line numberDiff line change
@@ -15,37 +15,15 @@
1515
@Controller
1616
public class SecurityConfig extends WebSecurityConfigurerAdapter {
1717

18-
@Override
19-
protected void configure(AuthenticationManagerBuilder auth)
20-
throws Exception {
21-
22-
auth.ldapAuthentication()
23-
.userSearchBase("ou=people")
24-
.userSearchFilter("(uid={0})")
25-
.groupSearchBase("ou=groups")
26-
.groupSearchFilter("member={0}")
27-
.contextSource()
28-
.root("dc=baeldung,dc=com")
29-
.ldif("classpath:users.ldif");
30-
31-
}
32-
33-
@Override
34-
protected void configure(HttpSecurity http) throws Exception {
18+
@Override
19+
protected void configure(AuthenticationManagerBuilder auth) throws Exception {
20+
auth.ldapAuthentication().userSearchBase("ou=people").userSearchFilter("(uid={0})").groupSearchBase("ou=groups").groupSearchFilter("member={0}").contextSource().root("dc=baeldung,dc=com").ldif("classpath:users.ldif");
21+
}
3522

36-
http
37-
.authorizeRequests()
38-
.antMatchers("/", "/home").permitAll()
39-
.anyRequest().authenticated();
40-
http
41-
.formLogin()
42-
.loginPage("/login")
43-
.permitAll()
44-
.and()
45-
.logout()
46-
.logoutSuccessUrl("/");
23+
@Override
24+
protected void configure(HttpSecurity http) throws Exception {
25+
http.authorizeRequests().antMatchers("/", "/home").permitAll().anyRequest().authenticated();
26+
http.formLogin().loginPage("/login").permitAll().and().logout().logoutSuccessUrl("/");
27+
}
4728

48-
49-
}
50-
5129
}

0 commit comments

Comments
 (0)