Java tutorial
/* * Copyright 2014-2015 the original author or authors. * * Licensed under the Apache License, Version 2.0 (the "License"); * you may not use this file except in compliance with the License. * You may obtain a copy of the License at * * http://www.apache.org/licenses/LICENSE-2.0 * * Unless required by applicable law or agreed to in writing, software * distributed under the License is distributed on an "AS IS" BASIS, * WITHOUT WARRANTIES OR CONDITIONS OF ANY KIND, either express or implied. * See the License for the specific language governing permissions and * limitations under the License. */ package library; import javax.sql.DataSource; import org.springframework.beans.factory.annotation.Autowired; import org.springframework.context.annotation.Configuration; import org.springframework.http.HttpMethod; import org.springframework.security.config.annotation.authentication.builders.AuthenticationManagerBuilder; import org.springframework.security.config.annotation.method.configuration.EnableGlobalMethodSecurity; import org.springframework.security.config.annotation.web.builders.HttpSecurity; import org.springframework.security.config.annotation.web.configuration.EnableWebSecurity; import org.springframework.security.config.annotation.web.configuration.WebSecurityConfigurerAdapter; import library.services.DBComponentForUser; @Configuration @EnableGlobalMethodSecurity(prePostEnabled = true) @EnableWebSecurity public class SecurityConfiguration extends WebSecurityConfigurerAdapter { @Autowired DataSource dataSource; @Autowired DBComponentForUser componentForUser; @Autowired protected void configure(AuthenticationManagerBuilder auth) throws Exception { auth.jdbcAuthentication().dataSource(dataSource) .usersByUsernameQuery( "SELECT email as username,password,'true' as enabled FROM users WHERE email = ?") .authoritiesByUsernameQuery("select email as username, role as authority from users where email=?"); } @Override protected void configure(HttpSecurity http) throws Exception { http.httpBasic().and().authorizeRequests().antMatchers(HttpMethod.DELETE, "/user/delete").hasRole("ADMIN") .antMatchers(HttpMethod.DELETE, "/user/passBook").hasRole("ADMIN") .antMatchers(HttpMethod.DELETE, "/books/delete").hasRole("ADMIN") .antMatchers(HttpMethod.GET, "/users/all").hasRole("ADMIN") .antMatchers(HttpMethod.GET, "/users/user/**").hasAnyRole("USER", "ADMIN") .antMatchers(HttpMethod.GET, "/books/user/**").hasAnyRole("USER", "ADMIN") .antMatchers(HttpMethod.GET, "/books/book/**").hasAnyRole("USER", "ADMIN") .antMatchers(HttpMethod.POST, "/books/book/search").hasAnyRole("USER", "ADMIN") .antMatchers(HttpMethod.GET, "/book/status/*").hasAnyRole("USER", "ADMIN") .antMatchers(HttpMethod.GET, "/books/all").hasAnyRole("USER", "ADMIN") .antMatchers(HttpMethod.POST, "/users/user/search").hasRole("ADMIN") .antMatchers(HttpMethod.POST, "/user/takeBook").hasAnyRole("USER", "ADMIN") .antMatchers(HttpMethod.POST, "/books/add").hasRole("ADMIN") .antMatchers(HttpMethod.POST, "/books/update").hasRole("ADMIN").and().csrf().disable(); } }