Skip to content

Commit 660f96a

Browse files
Piotr BelkePiotr Belke
Piotr Belke
authored and
Piotr Belke
committed
IKC-424 Update backend dependencies
1 parent 7fea953 commit 660f96a

40 files changed

+308
-290
lines changed

kouncil-backend/pom.xml

Lines changed: 5 additions & 1 deletion
Original file line numberDiff line numberDiff line change
@@ -15,7 +15,7 @@
1515
</parent>
1616

1717
<properties>
18-
<confluent.version>7.2.3</confluent.version>
18+
<confluent.version>7.7.1</confluent.version>
1919
<springdoc-openapi-ui.version>1.8.0</springdoc-openapi-ui.version>
2020
<swagger-annotations.version>2.2.6</swagger-annotations.version>
2121
<testcontainers.version>1.17.6</testcontainers.version>
@@ -162,6 +162,10 @@
162162
<artifactId>postgresql</artifactId>
163163
<version>${postgresql.version}</version>
164164
</dependency>
165+
<dependency>
166+
<groupId>org.flywaydb</groupId>
167+
<artifactId>flyway-database-postgresql</artifactId>
168+
</dependency>
165169
<dependency>
166170
<groupId>org.flywaydb</groupId>
167171
<artifactId>flyway-core</artifactId>

kouncil-backend/src/main/java/com/consdata/kouncil/broker/BrokersController.java

Lines changed: 1 addition & 1 deletion
Original file line numberDiff line numberDiff line change
@@ -6,13 +6,13 @@
66
import com.consdata.kouncil.config.KouncilConfiguration;
77
import com.consdata.kouncil.logging.EntryExitLogger;
88
import com.consdata.kouncil.model.admin.SystemFunctionName.Fields;
9+
import jakarta.annotation.security.RolesAllowed;
910
import java.io.IOException;
1011
import java.util.ArrayList;
1112
import java.util.Collection;
1213
import java.util.Collections;
1314
import java.util.List;
1415
import java.util.Optional;
15-
import javax.annotation.security.RolesAllowed;
1616
import javax.management.MalformedObjectNameException;
1717
import lombok.AllArgsConstructor;
1818
import lombok.extern.slf4j.Slf4j;

kouncil-backend/src/main/java/com/consdata/kouncil/clusters/ClusterController.java

Lines changed: 1 addition & 1 deletion
Original file line numberDiff line numberDiff line change
@@ -2,7 +2,7 @@
22

33
import com.consdata.kouncil.clusters.dto.ClusterDto;
44
import com.consdata.kouncil.model.admin.SystemFunctionName.Fields;
5-
import javax.annotation.security.RolesAllowed;
5+
import jakarta.annotation.security.RolesAllowed;
66
import lombok.AllArgsConstructor;
77
import org.springframework.web.bind.annotation.DeleteMapping;
88
import org.springframework.web.bind.annotation.GetMapping;

kouncil-backend/src/main/java/com/consdata/kouncil/clusters/ClustersController.java

Lines changed: 1 addition & 1 deletion
Original file line numberDiff line numberDiff line change
@@ -2,7 +2,7 @@
22

33
import com.consdata.kouncil.clusters.dto.ClustersDto;
44
import com.consdata.kouncil.model.admin.SystemFunctionName.Fields;
5-
import javax.annotation.security.RolesAllowed;
5+
import jakarta.annotation.security.RolesAllowed;
66
import lombok.AllArgsConstructor;
77
import org.springframework.web.bind.annotation.GetMapping;
88
import org.springframework.web.bind.annotation.RestController;

kouncil-backend/src/main/java/com/consdata/kouncil/config/KouncilConfiguration.java

Lines changed: 5 additions & 5 deletions
Original file line numberDiff line numberDiff line change
@@ -4,6 +4,7 @@
44
import com.consdata.kouncil.clusters.ClustersService;
55
import com.consdata.kouncil.clusters.converter.ClusterConfigConverter;
66
import com.consdata.kouncil.clusters.dto.ClustersDto;
7+
import jakarta.annotation.PostConstruct;
78
import java.io.IOException;
89
import java.net.InetAddress;
910
import java.net.UnknownHostException;
@@ -17,11 +18,10 @@
1718
import java.util.UUID;
1819
import java.util.concurrent.ExecutorService;
1920
import java.util.concurrent.Executors;
20-
import javax.annotation.PostConstruct;
2121
import lombok.Data;
2222
import lombok.extern.slf4j.Slf4j;
23-
import org.springframework.boot.actuate.trace.http.HttpTraceRepository;
24-
import org.springframework.boot.actuate.trace.http.InMemoryHttpTraceRepository;
23+
import org.springframework.boot.actuate.web.exchanges.HttpExchangeRepository;
24+
import org.springframework.boot.actuate.web.exchanges.InMemoryHttpExchangeRepository;
2525
import org.springframework.boot.autoconfigure.kafka.KafkaProperties;
2626
import org.springframework.context.annotation.Bean;
2727
import org.springframework.context.annotation.DependsOn;
@@ -112,8 +112,8 @@ private void generateInstallationId() {
112112
}
113113

114114
@Bean
115-
public HttpTraceRepository httpTraceRepository() {
116-
return new InMemoryHttpTraceRepository();
115+
public HttpExchangeRepository httpTraceRepository() {
116+
return new InMemoryHttpExchangeRepository();
117117
}
118118

119119
@Bean("fixedThreadPool")

kouncil-backend/src/main/java/com/consdata/kouncil/config/KouncilConfigurationController.java

Lines changed: 1 addition & 1 deletion
Original file line numberDiff line numberDiff line change
@@ -3,9 +3,9 @@
33
import com.consdata.kouncil.KouncilRuntimeException;
44
import com.consdata.kouncil.logging.EntryExitLogger;
55
import com.consdata.kouncil.model.admin.SystemFunctionName.Fields;
6+
import jakarta.annotation.security.RolesAllowed;
67
import java.util.Map;
78
import java.util.stream.Collectors;
8-
import javax.annotation.security.RolesAllowed;
99
import lombok.RequiredArgsConstructor;
1010
import org.springframework.beans.factory.annotation.Value;
1111
import org.springframework.web.bind.annotation.GetMapping;

kouncil-backend/src/main/java/com/consdata/kouncil/config/cluster/ClusterConfigReader.java

Lines changed: 1 addition & 1 deletion
Original file line numberDiff line numberDiff line change
@@ -20,6 +20,7 @@
2020
import com.consdata.kouncil.model.schemaregistry.SchemaRegistrySecurityConfig;
2121
import com.consdata.kouncil.model.schemaregistry.SchemaSecurityProtocol;
2222
import com.consdata.kouncil.model.schemaregistry.StoreType;
23+
import jakarta.annotation.PostConstruct;
2324
import java.io.IOException;
2425
import java.util.ArrayList;
2526
import java.util.HashSet;
@@ -28,7 +29,6 @@
2829
import java.util.regex.Matcher;
2930
import java.util.regex.Pattern;
3031
import java.util.stream.StreamSupport;
31-
import javax.annotation.PostConstruct;
3232
import lombok.Data;
3333
import lombok.RequiredArgsConstructor;
3434
import lombok.extern.slf4j.Slf4j;

kouncil-backend/src/main/java/com/consdata/kouncil/config/security/UserGroupsConfigReader.java

Lines changed: 1 addition & 1 deletion
Original file line numberDiff line numberDiff line change
@@ -6,6 +6,7 @@
66
import com.consdata.kouncil.security.KouncilRole;
77
import com.consdata.kouncil.security.function.SystemFunctionsRepository;
88
import com.consdata.kouncil.security.group.UserGroupRepository;
9+
import jakarta.annotation.PostConstruct;
910
import java.util.ArrayList;
1011
import java.util.Arrays;
1112
import java.util.EnumMap;
@@ -16,7 +17,6 @@
1617
import java.util.Set;
1718
import java.util.stream.Collectors;
1819
import java.util.stream.StreamSupport;
19-
import javax.annotation.PostConstruct;
2020
import lombok.Data;
2121
import lombok.RequiredArgsConstructor;
2222
import lombok.extern.slf4j.Slf4j;

kouncil-backend/src/main/java/com/consdata/kouncil/config/security/ad/ActiveDirectoryWebSecurityConfig.java

Lines changed: 12 additions & 8 deletions
Original file line numberDiff line numberDiff line change
@@ -19,6 +19,7 @@
1919
import org.springframework.security.ldap.authentication.ad.ActiveDirectoryLdapAuthenticationProvider;
2020
import org.springframework.security.web.SecurityFilterChain;
2121
import org.springframework.security.web.csrf.CookieCsrfTokenRepository;
22+
import org.springframework.security.web.csrf.CsrfTokenRequestAttributeHandler;
2223
import org.springframework.web.cors.CorsConfiguration;
2324
import org.springframework.web.cors.UrlBasedCorsConfigurationSource;
2425

@@ -35,8 +36,11 @@ public class ActiveDirectoryWebSecurityConfig {
3536
@Bean
3637
public SecurityFilterChain filterChain(HttpSecurity http) throws Exception {
3738
http
38-
.csrf().csrfTokenRepository(CookieCsrfTokenRepository.withHttpOnlyFalse()).and()
39-
.cors().configurationSource(request -> {
39+
.csrf(csrf -> csrf
40+
.csrfTokenRepository(CookieCsrfTokenRepository.withHttpOnlyFalse())
41+
.csrfTokenRequestHandler(new CsrfTokenRequestAttributeHandler())
42+
)
43+
.cors(cors -> cors.configurationSource(request -> {
4044
CorsConfiguration configuration = new CorsConfiguration();
4145
configuration.setAllowedOrigins(List.of("*"));
4246
configuration.setAllowedMethods(List.of("*"));
@@ -45,11 +49,11 @@ public SecurityFilterChain filterChain(HttpSecurity http) throws Exception {
4549
UrlBasedCorsConfigurationSource source = new UrlBasedCorsConfigurationSource();
4650
source.registerCorsConfiguration("/**", configuration);
4751
return configuration;
48-
})
49-
.and()
50-
.authorizeRequests()
51-
.antMatchers("/api/info/version", "/api/login", "/api/activeProvider", "/api/context-path", "/*", "/assets/**").permitAll()
52-
.anyRequest().authenticated();
52+
}))
53+
.authorizeHttpRequests(authorize -> authorize
54+
.requestMatchers("/api/info/version", "/api/login", "/api/activeProvider", "/api/context-path", "/*", "/assets/**").permitAll()
55+
.anyRequest().authenticated()
56+
);
5357
return http.build();
5458
}
5559

@@ -59,7 +63,7 @@ GrantedAuthorityDefaults grantedAuthorityDefaults() {
5963
}
6064

6165
@Bean
62-
public DefaultUserPermissionsReloader userPermissionsReloader(){
66+
public DefaultUserPermissionsReloader userPermissionsReloader() {
6367
return new DefaultUserPermissionsReloader(eventSender);
6468
}
6569

kouncil-backend/src/main/java/com/consdata/kouncil/config/security/inmemory/InMemoryWebSecurityConfig.java

Lines changed: 14 additions & 10 deletions
Original file line numberDiff line numberDiff line change
@@ -34,7 +34,7 @@
3434
import org.springframework.context.annotation.DependsOn;
3535
import org.springframework.security.authentication.AuthenticationManager;
3636
import org.springframework.security.config.annotation.authentication.builders.AuthenticationManagerBuilder;
37-
import org.springframework.security.config.annotation.method.configuration.EnableGlobalMethodSecurity;
37+
import org.springframework.security.config.annotation.method.configuration.EnableMethodSecurity;
3838
import org.springframework.security.config.annotation.web.builders.HttpSecurity;
3939
import org.springframework.security.config.annotation.web.configuration.EnableWebSecurity;
4040
import org.springframework.security.config.core.GrantedAuthorityDefaults;
@@ -45,6 +45,7 @@
4545
import org.springframework.security.provisioning.UserDetailsManager;
4646
import org.springframework.security.web.SecurityFilterChain;
4747
import org.springframework.security.web.csrf.CookieCsrfTokenRepository;
48+
import org.springframework.security.web.csrf.CsrfTokenRequestAttributeHandler;
4849
import org.springframework.web.cors.CorsConfiguration;
4950
import org.springframework.web.cors.UrlBasedCorsConfigurationSource;
5051

@@ -53,7 +54,7 @@
5354
@Slf4j
5455
@RequiredArgsConstructor
5556
@ConditionalOnProperty(prefix = "kouncil.auth", name = "active-provider", havingValue = "inmemory")
56-
@EnableGlobalMethodSecurity(jsr250Enabled = true, securedEnabled = true, prePostEnabled = true)
57+
@EnableMethodSecurity(jsr250Enabled = true, securedEnabled = true)
5758
@DependsOn({"userGroupsConfigReader"})
5859
public class InMemoryWebSecurityConfig {
5960

@@ -62,8 +63,11 @@ public class InMemoryWebSecurityConfig {
6263
@Bean
6364
public SecurityFilterChain filterChain(HttpSecurity http) throws Exception {
6465
http
65-
.csrf().csrfTokenRepository(CookieCsrfTokenRepository.withHttpOnlyFalse()).and()
66-
.cors().configurationSource(request -> {
66+
.csrf(csrf -> csrf
67+
.csrfTokenRepository(CookieCsrfTokenRepository.withHttpOnlyFalse())
68+
.csrfTokenRequestHandler(new CsrfTokenRequestAttributeHandler())
69+
)
70+
.cors(cors -> cors.configurationSource(request -> {
6771
CorsConfiguration configuration = new CorsConfiguration();
6872
configuration.setAllowedOrigins(List.of("*"));
6973
configuration.setAllowedMethods(List.of("*"));
@@ -72,12 +76,12 @@ public SecurityFilterChain filterChain(HttpSecurity http) throws Exception {
7276
UrlBasedCorsConfigurationSource source = new UrlBasedCorsConfigurationSource();
7377
source.registerCorsConfiguration("/**", configuration);
7478
return configuration;
75-
})
76-
.and()
77-
.authorizeRequests()
78-
.antMatchers("/api/info/version", "/api/firstTimeLogin", "/api/login", "/api/activeProvider", "/api/context-path","/*", "/assets/**")
79-
.permitAll()
80-
.anyRequest().authenticated();
79+
}))
80+
.authorizeHttpRequests(authorize -> authorize
81+
.requestMatchers("/api/info/version", "/api/firstTimeLogin", "/api/login", "/api/activeProvider", "/api/context-path", "/*",
82+
"/assets/**").permitAll()
83+
.anyRequest().authenticated()
84+
);
8185
return http.build();
8286
}
8387

kouncil-backend/src/main/java/com/consdata/kouncil/config/security/ldap/LdapWebSecurityConfig.java

Lines changed: 12 additions & 8 deletions
Original file line numberDiff line numberDiff line change
@@ -23,6 +23,7 @@
2323
import org.springframework.security.ldap.search.FilterBasedLdapUserSearch;
2424
import org.springframework.security.web.SecurityFilterChain;
2525
import org.springframework.security.web.csrf.CookieCsrfTokenRepository;
26+
import org.springframework.security.web.csrf.CsrfTokenRequestAttributeHandler;
2627
import org.springframework.web.cors.CorsConfiguration;
2728
import org.springframework.web.cors.UrlBasedCorsConfigurationSource;
2829

@@ -39,8 +40,11 @@ public class LdapWebSecurityConfig {
3940
@Bean
4041
public SecurityFilterChain filterChain(HttpSecurity http) throws Exception {
4142
http
42-
.csrf().csrfTokenRepository(CookieCsrfTokenRepository.withHttpOnlyFalse()).and()
43-
.cors().configurationSource(request -> {
43+
.csrf(csrf -> csrf
44+
.csrfTokenRepository(CookieCsrfTokenRepository.withHttpOnlyFalse())
45+
.csrfTokenRequestHandler(new CsrfTokenRequestAttributeHandler())
46+
)
47+
.cors(cors -> cors.configurationSource(request -> {
4448
CorsConfiguration configuration = new CorsConfiguration();
4549
configuration.setAllowedOrigins(List.of("*"));
4650
configuration.setAllowedMethods(List.of("*"));
@@ -49,11 +53,11 @@ public SecurityFilterChain filterChain(HttpSecurity http) throws Exception {
4953
UrlBasedCorsConfigurationSource source = new UrlBasedCorsConfigurationSource();
5054
source.registerCorsConfiguration("/**", configuration);
5155
return configuration;
52-
})
53-
.and()
54-
.authorizeRequests()
55-
.antMatchers("/api/info/version", "/api/login", "/api/activeProvider", "/api/context-path", "/*", "/assets/**").permitAll()
56-
.anyRequest().authenticated();
56+
}))
57+
.authorizeHttpRequests(authorize -> authorize
58+
.requestMatchers("/api/info/version", "/api/login", "/api/activeProvider", "/api/context-path", "/*", "/assets/**").permitAll()
59+
.anyRequest().authenticated()
60+
);
5761
return http.build();
5862
}
5963

@@ -69,7 +73,7 @@ public AuthenticationManager authenticationManager(HttpSecurity http) throws Exc
6973
}
7074

7175
@Bean
72-
public DefaultUserPermissionsReloader userPermissionsReloader(){
76+
public DefaultUserPermissionsReloader userPermissionsReloader() {
7377
return new DefaultUserPermissionsReloader(eventSender);
7478
}
7579

kouncil-backend/src/main/java/com/consdata/kouncil/config/security/sso/InMemoryAuthRepository.java

Lines changed: 4 additions & 4 deletions
Original file line numberDiff line numberDiff line change
@@ -1,9 +1,9 @@
11
package com.consdata.kouncil.config.security.sso;
22

3+
import jakarta.servlet.http.HttpServletRequest;
4+
import jakarta.servlet.http.HttpServletResponse;
35
import java.util.HashMap;
46
import java.util.Map;
5-
import javax.servlet.http.HttpServletRequest;
6-
import javax.servlet.http.HttpServletResponse;
77
import org.springframework.security.oauth2.client.web.AuthorizationRequestRepository;
88
import org.springframework.security.oauth2.core.endpoint.OAuth2AuthorizationRequest;
99

@@ -15,7 +15,7 @@ public class InMemoryAuthRepository implements AuthorizationRequestRepository<OA
1515
public OAuth2AuthorizationRequest loadAuthorizationRequest(HttpServletRequest request) {
1616
String state = request.getParameter("state");
1717
if (state != null) {
18-
return removeAuthorizationRequest(request);
18+
return removeAuthorizationRequest(request, null);
1919
}
2020
return null;
2121
}
@@ -27,7 +27,7 @@ public void saveAuthorizationRequest(OAuth2AuthorizationRequest authorizationReq
2727
}
2828

2929
@Override
30-
public OAuth2AuthorizationRequest removeAuthorizationRequest(HttpServletRequest request) {
30+
public OAuth2AuthorizationRequest removeAuthorizationRequest(HttpServletRequest request, HttpServletResponse response) {
3131
String state = request.getParameter("state");
3232
if (state != null) {
3333
return cache.remove(state);

0 commit comments

Comments
 (0)