最新消息:雨落星辰是一个专注网站SEO优化、网站SEO诊断、搜索引擎研究、网络营销推广、网站策划运营及站长类的自媒体原创博客

spring - @PreAuthorized annotation don't recognizing custom UserDetails - Stack Overflow

programmeradmin0浏览0评论

I'm trying to do method security in Spring Service by annotating it with @PreAuthorized annotation. I want to check if the id claim from the JWT token equals id field from my Request Body, I'm trying to do

@PreAuthorize("r.id == principal.getId()")
public ResponseEntity<?> update(UpdateRequest r) {
        return ResponseEntity.ok().build();
    }

But it seems like it's trying to use Spring built-in UserDetails without my custom logic. I'm sure that in my public class JwtAutentificationFilter extends OncePerRequestFilter using my custom UserDetails. I've tried Custom class principal in @PreAuthorize solution, where it was suggested to make custom Bean for that and I got an error

Failed to evaluate expression @decider.mayUpdate(principal,r.id)'

Where it was basically this

public static boolean mayUpdate(Object principal, Long id){
        CustomUserDetails user = (CustomUserDetails) principal;
        return user.getId().equals(id);
    }

I know that in every method I can get security context and do something like

Authentication auth = SecurityContextHolder.getContext().getAuthentication();

CustomUserDetails userDetails = (CustomUserDetails) auth.getPrincipal();

if(!userDetails.getId().equals(r.getId())){
...throw an error
}

But I'm going to have a lot of methods, and I don't want to do it in such a straight way. So I want to know if there's a way to put my custom principal into @PreAuthorized or do this authorization in some easier way!

I'm trying to do method security in Spring Service by annotating it with @PreAuthorized annotation. I want to check if the id claim from the JWT token equals id field from my Request Body, I'm trying to do

@PreAuthorize("r.id == principal.getId()")
public ResponseEntity<?> update(UpdateRequest r) {
        return ResponseEntity.ok().build();
    }

But it seems like it's trying to use Spring built-in UserDetails without my custom logic. I'm sure that in my public class JwtAutentificationFilter extends OncePerRequestFilter using my custom UserDetails. I've tried Custom class principal in @PreAuthorize solution, where it was suggested to make custom Bean for that and I got an error

Failed to evaluate expression @decider.mayUpdate(principal,r.id)'

Where it was basically this

public static boolean mayUpdate(Object principal, Long id){
        CustomUserDetails user = (CustomUserDetails) principal;
        return user.getId().equals(id);
    }

I know that in every method I can get security context and do something like

Authentication auth = SecurityContextHolder.getContext().getAuthentication();

CustomUserDetails userDetails = (CustomUserDetails) auth.getPrincipal();

if(!userDetails.getId().equals(r.getId())){
...throw an error
}

But I'm going to have a lot of methods, and I don't want to do it in such a straight way. So I want to know if there's a way to put my custom principal into @PreAuthorized or do this authorization in some easier way!

Share Improve this question edited 2 days ago Almer asked 2 days ago AlmerAlmer 12 bronze badges New contributor Almer is a new contributor to this site. Take care in asking for clarification, commenting, and answering. Check out our Code of Conduct. 1
  • Don't just post a snippet of the error/stacktrace post the full stacktrace. What does your JwtAutentificationFilter actually do (and why aren't you using the default Spring Security support for JWT but rolling your own? ). – M. Deinum Commented yesterday
Add a comment  | 

1 Answer 1

Reset to default 0

I found a way to fix this!

If any of you need to use custom UserDetails in @PreAuthtorize, create a new bean where you put your Authorization logic using SecurityContext you can do it like this:

You should annotate the method you want to secure like

@PreAuthorize("@decider.tokenIdEqualsIdFromRequest(#r.id)")
    public ResponseEntity<?> update(UpdateRequest r) {
        return ResponseEntity.ok().build();
}

And you have to create the bean where your logic using security context will be located, for me it's like

@Service
public class Decider {

    public static boolean tokenIdEqualsIdFromRequest(Long id){
        Authentication auth = SecurityContextHolder.getContext().getAuthentication();

        CustomUserDetails userDetails = (CustomUserDetails) auth.getPrincipal();

        return userDetails.getId().equals(id);
    }
}
发布评论

评论列表(0)

  1. 暂无评论