io.openshift.booster.RestApplication.java Source code

Java tutorial

Introduction

Here is the source code for io.openshift.booster.RestApplication.java

Source

/**
 * Licensed to the Apache Software Foundation (ASF) under one or more
 * contributor license agreements.  See the NOTICE file distributed with
 * this work for additional information regarding copyright ownership.
 * The ASF licenses this file to You under the Apache License, Version 2.0
 * (the "License"); you may not use this file except in compliance with
 * the License.  You may obtain a copy of the License at
 * <p>
 * http://www.apache.org/licenses/LICENSE-2.0
 * <p>
 * Unless required by applicable law or agreed to in writing, software
 * distributed under the License is distributed on an "AS IS" BASIS,
 * WITHOUT WARRANTIES OR CONDITIONS OF ANY KIND, either express or implied.
 * See the License for the specific language governing permissions and
 * limitations under the License.
 */
package io.openshift.booster;

import io.vertx.core.AbstractVerticle;
import io.vertx.core.Future;
import io.vertx.core.json.JsonObject;
import io.vertx.core.logging.Logger;
import io.vertx.core.logging.LoggerFactory;
import io.vertx.ext.auth.jwt.JWTAuth;
import io.vertx.ext.web.Router;
import io.vertx.ext.web.handler.JWTAuthHandler;
import io.vertx.ext.web.handler.StaticHandler;
import io.openshift.booster.service.Greeting;

import static io.vertx.core.http.HttpHeaders.CONTENT_TYPE;

public class RestApplication extends AbstractVerticle {

    private final Logger log = LoggerFactory.getLogger(RestApplication.class);
    private long counter;

    @Override
    public void start(Future done) {
        // Create a router object.
        Router router = Router.router(vertx);
        router.get("/health").handler(rc -> rc.response().end("OK"));

        JsonObject config = new JsonObject().put("realm", System.getenv("REALM"))
                .put("public-key", System.getenv("REALM_PUBLIC_KEY"))
                .put("auth-server-url", System.getenv("SSO_AUTH_SERVER_URL")).put("ssl-required", "external")
                .put("resource", System.getenv("CLIENT_ID"))
                .put("credentials", new JsonObject().put("secret", System.getenv("CREDENTIALS")))
                // since we're consuming keycloak JWTs we need to locate the permission claims in the token
                .put("permissionsClaimKey", "realm_access/roles");

        // Configure the AuthHandler to process JWT's
        router.route("/greeting").handler(JWTAuthHandler.create(JWTAuth.create(vertx, config)));

        // This is how one can do RBAC, e.g.: only admin is allowed
        router.get("/greeting").handler(ctx -> {
            ctx.user().isAuthorised("vertx-admin", authz -> {
                if (authz.succeeded() && authz.result()) {
                    ctx.next();
                } else {
                    log.error("AuthZ failed!");
                    ctx.fail(403);
                }
            });
        });

        router.get("/greeting").handler(ctx -> {
            String name = ctx.request().getParam("name");
            if (name == null) {
                name = "World";
            }
            ctx.response().putHeader(CONTENT_TYPE, "application/json; charset=utf-8")
                    .end(new Greeting(++counter, name).encode());
        });

        // serve the dynamic config so the web client
        // can also connect to the SSO server
        router.get("/keycloak.json").handler(ctx -> {
            ctx.response().putHeader(CONTENT_TYPE, "application/json; charset=utf-8").end(config.encode());
        });

        // serve static files (web client)
        router.get().handler(StaticHandler.create());

        // Create the HTTP server and pass the "accept" method to the request handler.
        vertx.createHttpServer().requestHandler(router::accept).listen(
                // Retrieve the port from the configuration,
                // default to 8080.
                config().getInteger("http.port", 8080), done.completer());
    }
}