Initial commit.
This commit is contained in:
45
.gitignore
vendored
Normal file
45
.gitignore
vendored
Normal file
@@ -0,0 +1,45 @@
|
|||||||
|
.gradle
|
||||||
|
build/
|
||||||
|
!gradle/wrapper/gradle-wrapper.jar
|
||||||
|
!**/src/main/**/build/
|
||||||
|
!**/src/test/**/build/
|
||||||
|
|
||||||
|
### IntelliJ IDEA ###
|
||||||
|
.idea/*
|
||||||
|
*.iws
|
||||||
|
*.iml
|
||||||
|
*.ipr
|
||||||
|
out/
|
||||||
|
!**/src/main/**/out/
|
||||||
|
!**/src/test/**/out/
|
||||||
|
|
||||||
|
### Kotlin ###
|
||||||
|
.kotlin
|
||||||
|
|
||||||
|
### Eclipse ###
|
||||||
|
.apt_generated
|
||||||
|
.classpath
|
||||||
|
.factorypath
|
||||||
|
.project
|
||||||
|
.settings
|
||||||
|
.springBeans
|
||||||
|
.sts4-cache
|
||||||
|
bin/
|
||||||
|
!**/src/main/**/bin/
|
||||||
|
!**/src/test/**/bin/
|
||||||
|
|
||||||
|
### NetBeans ###
|
||||||
|
/nbproject/private/
|
||||||
|
/nbbuild/
|
||||||
|
/dist/
|
||||||
|
/nbdist/
|
||||||
|
/.nb-gradle/
|
||||||
|
|
||||||
|
### VS Code ###
|
||||||
|
.vscode/
|
||||||
|
|
||||||
|
### Mac OS ###
|
||||||
|
.DS_Store
|
||||||
|
|
||||||
|
### Postgresql data ###
|
||||||
|
imagora-infrastructure/docker/postgres_data
|
||||||
6
README.md
Normal file
6
README.md
Normal file
@@ -0,0 +1,6 @@
|
|||||||
|
# Summary
|
||||||
|
This project is a template for startup a new kotlin/gralde project with hexagonal architecture.
|
||||||
|
|
||||||
|
It ships an entity which represent users, and all endpoints to signup, signin etc. with the PostgreSQL infrastructure implementation to store data.
|
||||||
|
|
||||||
|
Just clone this project and rename gradle modules and packages as you need.
|
||||||
56
build.gradle.kts
Normal file
56
build.gradle.kts
Normal file
@@ -0,0 +1,56 @@
|
|||||||
|
plugins {
|
||||||
|
kotlin("jvm") version "2.2.21"
|
||||||
|
kotlin("plugin.spring") version "2.2.21"
|
||||||
|
id("io.spring.dependency-management") version "1.1.7"
|
||||||
|
}
|
||||||
|
|
||||||
|
group = "org.takiguchi.imagora"
|
||||||
|
version = "0.0.1-SNAPSHOT"
|
||||||
|
|
||||||
|
java {
|
||||||
|
toolchain {
|
||||||
|
languageVersion = JavaLanguageVersion.of(21)
|
||||||
|
}
|
||||||
|
}
|
||||||
|
|
||||||
|
repositories {
|
||||||
|
mavenCentral()
|
||||||
|
}
|
||||||
|
|
||||||
|
subprojects {
|
||||||
|
apply(plugin = "java")
|
||||||
|
apply(plugin = "org.jetbrains.kotlin.jvm")
|
||||||
|
|
||||||
|
repositories {
|
||||||
|
mavenCentral()
|
||||||
|
}
|
||||||
|
|
||||||
|
dependencies {
|
||||||
|
implementation(platform("org.springframework.boot:spring-boot-dependencies:3.5.7"))
|
||||||
|
implementation("com.michael-bull.kotlin-result:kotlin-result:2.1.0")
|
||||||
|
testImplementation("org.jetbrains.kotlin:kotlin-test-junit5")
|
||||||
|
testImplementation("io.mockk:mockk:1.14.6")
|
||||||
|
testImplementation("org.springframework.boot:spring-boot-starter-test:3.5.7")
|
||||||
|
testImplementation("org.assertj:assertj-core:3.27.6")
|
||||||
|
}
|
||||||
|
|
||||||
|
tasks.withType<Test> {
|
||||||
|
useJUnitPlatform()
|
||||||
|
}
|
||||||
|
}
|
||||||
|
|
||||||
|
dependencyManagement {
|
||||||
|
imports {
|
||||||
|
mavenBom("org.springframework.boot:spring-boot-dependencies:3.5.7")
|
||||||
|
}
|
||||||
|
}
|
||||||
|
|
||||||
|
kotlin {
|
||||||
|
compilerOptions {
|
||||||
|
freeCompilerArgs.addAll("-Xjsr305=strict")
|
||||||
|
}
|
||||||
|
}
|
||||||
|
|
||||||
|
tasks.withType<Test> {
|
||||||
|
useJUnitPlatform()
|
||||||
|
}
|
||||||
7
gradle.properties
Normal file
7
gradle.properties
Normal file
@@ -0,0 +1,7 @@
|
|||||||
|
# Enable the build cache to save time by reusing outputs produced by other successful builds.
|
||||||
|
# https://docs.gradle.org/current/userguide/build_cache.html
|
||||||
|
org.gradle.caching=true
|
||||||
|
# Enable the configuration cache to reuse the build configuration and enable parallel task execution.
|
||||||
|
# (Note that some plugins may not yet be compatible with the configuration cache.)
|
||||||
|
# https://docs.gradle.org/current/userguide/configuration_cache.html
|
||||||
|
org.gradle.configuration-cache=true
|
||||||
22
gradle/libs.versions.toml
Normal file
22
gradle/libs.versions.toml
Normal file
@@ -0,0 +1,22 @@
|
|||||||
|
# Version catalog is a central place for you to declare and version dependencies
|
||||||
|
# https://docs.gradle.org/current/userguide/platforms.html#sub:version-catalog
|
||||||
|
# https://docs.gradle.org/current/userguide/platforms.html#sub::toml-dependencies-format
|
||||||
|
|
||||||
|
[versions]
|
||||||
|
kotlin = "2.2.20"
|
||||||
|
kotlinxDatetime = "0.6.2"
|
||||||
|
kotlinxSerializationJSON = "1.8.1"
|
||||||
|
kotlinxCoroutines = "1.10.2"
|
||||||
|
|
||||||
|
[libraries]
|
||||||
|
kotlinGradlePlugin = { module = "org.jetbrains.kotlin:kotlin-gradle-plugin", version.ref = "kotlin" }
|
||||||
|
kotlinxDatetime = { module = "org.jetbrains.kotlinx:kotlinx-datetime", version.ref = "kotlinxDatetime" }
|
||||||
|
kotlinxSerialization = { module = "org.jetbrains.kotlinx:kotlinx-serialization-json", version.ref = "kotlinxSerializationJSON" }
|
||||||
|
kotlinxCoroutines = { module = "org.jetbrains.kotlinx:kotlinx-coroutines-core", version.ref = "kotlinxCoroutines" }
|
||||||
|
|
||||||
|
# Libraries can be bundled together for easier import
|
||||||
|
[bundles]
|
||||||
|
kotlinxEcosystem = ["kotlinxDatetime", "kotlinxSerialization", "kotlinxCoroutines"]
|
||||||
|
|
||||||
|
[plugins]
|
||||||
|
kotlinPluginSerialization = { id = "org.jetbrains.kotlin.plugin.serialization", version.ref = "kotlin" }
|
||||||
BIN
gradle/wrapper/gradle-wrapper.jar
vendored
Normal file
BIN
gradle/wrapper/gradle-wrapper.jar
vendored
Normal file
Binary file not shown.
6
gradle/wrapper/gradle-wrapper.properties
vendored
Normal file
6
gradle/wrapper/gradle-wrapper.properties
vendored
Normal file
@@ -0,0 +1,6 @@
|
|||||||
|
#Tue Nov 11 19:48:20 CET 2025
|
||||||
|
distributionBase=GRADLE_USER_HOME
|
||||||
|
distributionPath=wrapper/dists
|
||||||
|
distributionUrl=https\://services.gradle.org/distributions/gradle-8.14-bin.zip
|
||||||
|
zipStoreBase=GRADLE_USER_HOME
|
||||||
|
zipStorePath=wrapper/dists
|
||||||
234
gradlew
vendored
Executable file
234
gradlew
vendored
Executable file
@@ -0,0 +1,234 @@
|
|||||||
|
#!/bin/sh
|
||||||
|
|
||||||
|
#
|
||||||
|
# Copyright © 2015-2021 the original authors.
|
||||||
|
#
|
||||||
|
# Licensed under the Apache License, Version 2.0 (the "License");
|
||||||
|
# you may not use this file except in compliance with the License.
|
||||||
|
# You may obtain a copy of the License at
|
||||||
|
#
|
||||||
|
# https://www.apache.org/licenses/LICENSE-2.0
|
||||||
|
#
|
||||||
|
# Unless required by applicable law or agreed to in writing, software
|
||||||
|
# distributed under the License is distributed on an "AS IS" BASIS,
|
||||||
|
# WITHOUT WARRANTIES OR CONDITIONS OF ANY KIND, either express or implied.
|
||||||
|
# See the License for the specific language governing permissions and
|
||||||
|
# limitations under the License.
|
||||||
|
#
|
||||||
|
|
||||||
|
##############################################################################
|
||||||
|
#
|
||||||
|
# Gradle start up script for POSIX generated by Gradle.
|
||||||
|
#
|
||||||
|
# Important for running:
|
||||||
|
#
|
||||||
|
# (1) You need a POSIX-compliant shell to run this script. If your /bin/sh is
|
||||||
|
# noncompliant, but you have some other compliant shell such as ksh or
|
||||||
|
# bash, then to run this script, type that shell name before the whole
|
||||||
|
# command line, like:
|
||||||
|
#
|
||||||
|
# ksh Gradle
|
||||||
|
#
|
||||||
|
# Busybox and similar reduced shells will NOT work, because this script
|
||||||
|
# requires all of these POSIX shell features:
|
||||||
|
# * functions;
|
||||||
|
# * expansions «$var», «${var}», «${var:-default}», «${var+SET}»,
|
||||||
|
# «${var#prefix}», «${var%suffix}», and «$( cmd )»;
|
||||||
|
# * compound commands having a testable exit status, especially «case»;
|
||||||
|
# * various built-in commands including «command», «set», and «ulimit».
|
||||||
|
#
|
||||||
|
# Important for patching:
|
||||||
|
#
|
||||||
|
# (2) This script targets any POSIX shell, so it avoids extensions provided
|
||||||
|
# by Bash, Ksh, etc; in particular arrays are avoided.
|
||||||
|
#
|
||||||
|
# The "traditional" practice of packing multiple parameters into a
|
||||||
|
# space-separated string is a well documented source of bugs and security
|
||||||
|
# problems, so this is (mostly) avoided, by progressively accumulating
|
||||||
|
# options in "$@", and eventually passing that to Java.
|
||||||
|
#
|
||||||
|
# Where the inherited environment variables (DEFAULT_JVM_OPTS, JAVA_OPTS,
|
||||||
|
# and GRADLE_OPTS) rely on word-splitting, this is performed explicitly;
|
||||||
|
# see the in-line comments for details.
|
||||||
|
#
|
||||||
|
# There are tweaks for specific operating systems such as AIX, CygWin,
|
||||||
|
# Darwin, MinGW, and NonStop.
|
||||||
|
#
|
||||||
|
# (3) This script is generated from the Groovy template
|
||||||
|
# https://github.com/gradle/gradle/blob/master/subprojects/plugins/src/main/resources/org/gradle/api/internal/plugins/unixStartScript.txt
|
||||||
|
# within the Gradle project.
|
||||||
|
#
|
||||||
|
# You can find Gradle at https://github.com/gradle/gradle/.
|
||||||
|
#
|
||||||
|
##############################################################################
|
||||||
|
|
||||||
|
# Attempt to set APP_HOME
|
||||||
|
|
||||||
|
# Resolve links: $0 may be a link
|
||||||
|
app_path=$0
|
||||||
|
|
||||||
|
# Need this for daisy-chained symlinks.
|
||||||
|
while
|
||||||
|
APP_HOME=${app_path%"${app_path##*/}"} # leaves a trailing /; empty if no leading path
|
||||||
|
[ -h "$app_path" ]
|
||||||
|
do
|
||||||
|
ls=$( ls -ld "$app_path" )
|
||||||
|
link=${ls#*' -> '}
|
||||||
|
case $link in #(
|
||||||
|
/*) app_path=$link ;; #(
|
||||||
|
*) app_path=$APP_HOME$link ;;
|
||||||
|
esac
|
||||||
|
done
|
||||||
|
|
||||||
|
APP_HOME=$( cd "${APP_HOME:-./}" && pwd -P ) || exit
|
||||||
|
|
||||||
|
APP_NAME="Gradle"
|
||||||
|
APP_BASE_NAME=${0##*/}
|
||||||
|
|
||||||
|
# Add default JVM options here. You can also use JAVA_OPTS and GRADLE_OPTS to pass JVM options to this script.
|
||||||
|
DEFAULT_JVM_OPTS='"-Xmx64m" "-Xms64m"'
|
||||||
|
|
||||||
|
# Use the maximum available, or set MAX_FD != -1 to use that value.
|
||||||
|
MAX_FD=maximum
|
||||||
|
|
||||||
|
warn () {
|
||||||
|
echo "$*"
|
||||||
|
} >&2
|
||||||
|
|
||||||
|
die () {
|
||||||
|
echo
|
||||||
|
echo "$*"
|
||||||
|
echo
|
||||||
|
exit 1
|
||||||
|
} >&2
|
||||||
|
|
||||||
|
# OS specific support (must be 'true' or 'false').
|
||||||
|
cygwin=false
|
||||||
|
msys=false
|
||||||
|
darwin=false
|
||||||
|
nonstop=false
|
||||||
|
case "$( uname )" in #(
|
||||||
|
CYGWIN* ) cygwin=true ;; #(
|
||||||
|
Darwin* ) darwin=true ;; #(
|
||||||
|
MSYS* | MINGW* ) msys=true ;; #(
|
||||||
|
NONSTOP* ) nonstop=true ;;
|
||||||
|
esac
|
||||||
|
|
||||||
|
CLASSPATH=$APP_HOME/gradle/wrapper/gradle-wrapper.jar
|
||||||
|
|
||||||
|
|
||||||
|
# Determine the Java command to use to start the JVM.
|
||||||
|
if [ -n "$JAVA_HOME" ] ; then
|
||||||
|
if [ -x "$JAVA_HOME/jre/sh/java" ] ; then
|
||||||
|
# IBM's JDK on AIX uses strange locations for the executables
|
||||||
|
JAVACMD=$JAVA_HOME/jre/sh/java
|
||||||
|
else
|
||||||
|
JAVACMD=$JAVA_HOME/bin/java
|
||||||
|
fi
|
||||||
|
if [ ! -x "$JAVACMD" ] ; then
|
||||||
|
die "ERROR: JAVA_HOME is set to an invalid directory: $JAVA_HOME
|
||||||
|
|
||||||
|
Please set the JAVA_HOME variable in your environment to match the
|
||||||
|
location of your Java installation."
|
||||||
|
fi
|
||||||
|
else
|
||||||
|
JAVACMD=java
|
||||||
|
which java >/dev/null 2>&1 || die "ERROR: JAVA_HOME is not set and no 'java' command could be found in your PATH.
|
||||||
|
|
||||||
|
Please set the JAVA_HOME variable in your environment to match the
|
||||||
|
location of your Java installation."
|
||||||
|
fi
|
||||||
|
|
||||||
|
# Increase the maximum file descriptors if we can.
|
||||||
|
if ! "$cygwin" && ! "$darwin" && ! "$nonstop" ; then
|
||||||
|
case $MAX_FD in #(
|
||||||
|
max*)
|
||||||
|
MAX_FD=$( ulimit -H -n ) ||
|
||||||
|
warn "Could not query maximum file descriptor limit"
|
||||||
|
esac
|
||||||
|
case $MAX_FD in #(
|
||||||
|
'' | soft) :;; #(
|
||||||
|
*)
|
||||||
|
ulimit -n "$MAX_FD" ||
|
||||||
|
warn "Could not set maximum file descriptor limit to $MAX_FD"
|
||||||
|
esac
|
||||||
|
fi
|
||||||
|
|
||||||
|
# Collect all arguments for the java command, stacking in reverse order:
|
||||||
|
# * args from the command line
|
||||||
|
# * the main class name
|
||||||
|
# * -classpath
|
||||||
|
# * -D...appname settings
|
||||||
|
# * --module-path (only if needed)
|
||||||
|
# * DEFAULT_JVM_OPTS, JAVA_OPTS, and GRADLE_OPTS environment variables.
|
||||||
|
|
||||||
|
# For Cygwin or MSYS, switch paths to Windows format before running java
|
||||||
|
if "$cygwin" || "$msys" ; then
|
||||||
|
APP_HOME=$( cygpath --path --mixed "$APP_HOME" )
|
||||||
|
CLASSPATH=$( cygpath --path --mixed "$CLASSPATH" )
|
||||||
|
|
||||||
|
JAVACMD=$( cygpath --unix "$JAVACMD" )
|
||||||
|
|
||||||
|
# Now convert the arguments - kludge to limit ourselves to /bin/sh
|
||||||
|
for arg do
|
||||||
|
if
|
||||||
|
case $arg in #(
|
||||||
|
-*) false ;; # don't mess with options #(
|
||||||
|
/?*) t=${arg#/} t=/${t%%/*} # looks like a POSIX filepath
|
||||||
|
[ -e "$t" ] ;; #(
|
||||||
|
*) false ;;
|
||||||
|
esac
|
||||||
|
then
|
||||||
|
arg=$( cygpath --path --ignore --mixed "$arg" )
|
||||||
|
fi
|
||||||
|
# Roll the args list around exactly as many times as the number of
|
||||||
|
# args, so each arg winds up back in the position where it started, but
|
||||||
|
# possibly modified.
|
||||||
|
#
|
||||||
|
# NB: a `for` loop captures its iteration list before it begins, so
|
||||||
|
# changing the positional parameters here affects neither the number of
|
||||||
|
# iterations, nor the values presented in `arg`.
|
||||||
|
shift # remove old arg
|
||||||
|
set -- "$@" "$arg" # push replacement arg
|
||||||
|
done
|
||||||
|
fi
|
||||||
|
|
||||||
|
# Collect all arguments for the java command;
|
||||||
|
# * $DEFAULT_JVM_OPTS, $JAVA_OPTS, and $GRADLE_OPTS can contain fragments of
|
||||||
|
# shell script including quotes and variable substitutions, so put them in
|
||||||
|
# double quotes to make sure that they get re-expanded; and
|
||||||
|
# * put everything else in single quotes, so that it's not re-expanded.
|
||||||
|
|
||||||
|
set -- \
|
||||||
|
"-Dorg.gradle.appname=$APP_BASE_NAME" \
|
||||||
|
-classpath "$CLASSPATH" \
|
||||||
|
org.gradle.wrapper.GradleWrapperMain \
|
||||||
|
"$@"
|
||||||
|
|
||||||
|
# Use "xargs" to parse quoted args.
|
||||||
|
#
|
||||||
|
# With -n1 it outputs one arg per line, with the quotes and backslashes removed.
|
||||||
|
#
|
||||||
|
# In Bash we could simply go:
|
||||||
|
#
|
||||||
|
# readarray ARGS < <( xargs -n1 <<<"$var" ) &&
|
||||||
|
# set -- "${ARGS[@]}" "$@"
|
||||||
|
#
|
||||||
|
# but POSIX shell has neither arrays nor command substitution, so instead we
|
||||||
|
# post-process each arg (as a line of input to sed) to backslash-escape any
|
||||||
|
# character that might be a shell metacharacter, then use eval to reverse
|
||||||
|
# that process (while maintaining the separation between arguments), and wrap
|
||||||
|
# the whole thing up as a single "set" statement.
|
||||||
|
#
|
||||||
|
# This will of course break if any of these variables contains a newline or
|
||||||
|
# an unmatched quote.
|
||||||
|
#
|
||||||
|
|
||||||
|
eval "set -- $(
|
||||||
|
printf '%s\n' "$DEFAULT_JVM_OPTS $JAVA_OPTS $GRADLE_OPTS" |
|
||||||
|
xargs -n1 |
|
||||||
|
sed ' s~[^-[:alnum:]+,./:=@_]~\\&~g; ' |
|
||||||
|
tr '\n' ' '
|
||||||
|
)" '"$@"'
|
||||||
|
|
||||||
|
exec "$JAVACMD" "$@"
|
||||||
89
gradlew.bat
vendored
Normal file
89
gradlew.bat
vendored
Normal file
@@ -0,0 +1,89 @@
|
|||||||
|
@rem
|
||||||
|
@rem Copyright 2015 the original author or authors.
|
||||||
|
@rem
|
||||||
|
@rem Licensed under the Apache License, Version 2.0 (the "License");
|
||||||
|
@rem you may not use this file except in compliance with the License.
|
||||||
|
@rem You may obtain a copy of the License at
|
||||||
|
@rem
|
||||||
|
@rem https://www.apache.org/licenses/LICENSE-2.0
|
||||||
|
@rem
|
||||||
|
@rem Unless required by applicable law or agreed to in writing, software
|
||||||
|
@rem distributed under the License is distributed on an "AS IS" BASIS,
|
||||||
|
@rem WITHOUT WARRANTIES OR CONDITIONS OF ANY KIND, either express or implied.
|
||||||
|
@rem See the License for the specific language governing permissions and
|
||||||
|
@rem limitations under the License.
|
||||||
|
@rem
|
||||||
|
|
||||||
|
@if "%DEBUG%" == "" @echo off
|
||||||
|
@rem ##########################################################################
|
||||||
|
@rem
|
||||||
|
@rem Gradle startup script for Windows
|
||||||
|
@rem
|
||||||
|
@rem ##########################################################################
|
||||||
|
|
||||||
|
@rem Set local scope for the variables with windows NT shell
|
||||||
|
if "%OS%"=="Windows_NT" setlocal
|
||||||
|
|
||||||
|
set DIRNAME=%~dp0
|
||||||
|
if "%DIRNAME%" == "" set DIRNAME=.
|
||||||
|
set APP_BASE_NAME=%~n0
|
||||||
|
set APP_HOME=%DIRNAME%
|
||||||
|
|
||||||
|
@rem Resolve any "." and ".." in APP_HOME to make it shorter.
|
||||||
|
for %%i in ("%APP_HOME%") do set APP_HOME=%%~fi
|
||||||
|
|
||||||
|
@rem Add default JVM options here. You can also use JAVA_OPTS and GRADLE_OPTS to pass JVM options to this script.
|
||||||
|
set DEFAULT_JVM_OPTS="-Xmx64m" "-Xms64m"
|
||||||
|
|
||||||
|
@rem Find java.exe
|
||||||
|
if defined JAVA_HOME goto findJavaFromJavaHome
|
||||||
|
|
||||||
|
set JAVA_EXE=java.exe
|
||||||
|
%JAVA_EXE% -version >NUL 2>&1
|
||||||
|
if "%ERRORLEVEL%" == "0" goto execute
|
||||||
|
|
||||||
|
echo.
|
||||||
|
echo ERROR: JAVA_HOME is not set and no 'java' command could be found in your PATH.
|
||||||
|
echo.
|
||||||
|
echo Please set the JAVA_HOME variable in your environment to match the
|
||||||
|
echo location of your Java installation.
|
||||||
|
|
||||||
|
goto fail
|
||||||
|
|
||||||
|
:findJavaFromJavaHome
|
||||||
|
set JAVA_HOME=%JAVA_HOME:"=%
|
||||||
|
set JAVA_EXE=%JAVA_HOME%/bin/java.exe
|
||||||
|
|
||||||
|
if exist "%JAVA_EXE%" goto execute
|
||||||
|
|
||||||
|
echo.
|
||||||
|
echo ERROR: JAVA_HOME is set to an invalid directory: %JAVA_HOME%
|
||||||
|
echo.
|
||||||
|
echo Please set the JAVA_HOME variable in your environment to match the
|
||||||
|
echo location of your Java installation.
|
||||||
|
|
||||||
|
goto fail
|
||||||
|
|
||||||
|
:execute
|
||||||
|
@rem Setup the command line
|
||||||
|
|
||||||
|
set CLASSPATH=%APP_HOME%\gradle\wrapper\gradle-wrapper.jar
|
||||||
|
|
||||||
|
|
||||||
|
@rem Execute Gradle
|
||||||
|
"%JAVA_EXE%" %DEFAULT_JVM_OPTS% %JAVA_OPTS% %GRADLE_OPTS% "-Dorg.gradle.appname=%APP_BASE_NAME%" -classpath "%CLASSPATH%" org.gradle.wrapper.GradleWrapperMain %*
|
||||||
|
|
||||||
|
:end
|
||||||
|
@rem End local scope for the variables with windows NT shell
|
||||||
|
if "%ERRORLEVEL%"=="0" goto mainEnd
|
||||||
|
|
||||||
|
:fail
|
||||||
|
rem Set variable GRADLE_EXIT_CONSOLE if you need the _script_ return code instead of
|
||||||
|
rem the _cmd.exe /c_ return code!
|
||||||
|
if not "" == "%GRADLE_EXIT_CONSOLE%" exit 1
|
||||||
|
exit /b 1
|
||||||
|
|
||||||
|
:mainEnd
|
||||||
|
if "%OS%"=="Windows_NT" endlocal
|
||||||
|
|
||||||
|
:omega
|
||||||
12
imagora-application/build.gradle.kts
Normal file
12
imagora-application/build.gradle.kts
Normal file
@@ -0,0 +1,12 @@
|
|||||||
|
plugins {
|
||||||
|
kotlin("jvm")
|
||||||
|
id("io.spring.dependency-management") version "1.1.7"
|
||||||
|
}
|
||||||
|
|
||||||
|
dependencies {
|
||||||
|
implementation(kotlin("stdlib"))
|
||||||
|
implementation(project(":imagora-domain"))
|
||||||
|
implementation("org.springframework:spring-context")
|
||||||
|
implementation("org.springframework.boot:spring-boot-starter-security")
|
||||||
|
implementation("com.auth0:java-jwt:4.5.0")
|
||||||
|
}
|
||||||
@@ -0,0 +1,12 @@
|
|||||||
|
package org.takiguchi.imagora.application.core.configuration
|
||||||
|
|
||||||
|
import org.springframework.context.annotation.Bean
|
||||||
|
import org.springframework.context.annotation.Configuration
|
||||||
|
import org.springframework.security.crypto.bcrypt.BCryptPasswordEncoder
|
||||||
|
import org.springframework.security.crypto.password.PasswordEncoder
|
||||||
|
|
||||||
|
@Configuration
|
||||||
|
open class GlobalServicesConfiguration {
|
||||||
|
@Bean
|
||||||
|
open fun passwordEncoder(): PasswordEncoder = BCryptPasswordEncoder()
|
||||||
|
}
|
||||||
@@ -0,0 +1,21 @@
|
|||||||
|
package org.takiguchi.imagora.application.core.security.model
|
||||||
|
|
||||||
|
import org.springframework.security.core.GrantedAuthority
|
||||||
|
import org.springframework.security.core.authority.SimpleGrantedAuthority
|
||||||
|
import org.springframework.security.core.userdetails.UserDetails
|
||||||
|
import org.takiguchi.imagora.domain.user.model.User
|
||||||
|
import org.takiguchi.imagora.domain.user.model.UserRole
|
||||||
|
|
||||||
|
class CustomUserDetails(
|
||||||
|
val user: User,
|
||||||
|
) : UserDetails {
|
||||||
|
override fun getAuthorities(): Collection<GrantedAuthority?> =
|
||||||
|
user.roles
|
||||||
|
.map(UserRole::name)
|
||||||
|
.map { role -> "ROLE_$role" }
|
||||||
|
.map(::SimpleGrantedAuthority)
|
||||||
|
|
||||||
|
override fun getPassword(): String = user.encryptedPassword
|
||||||
|
|
||||||
|
override fun getUsername(): String = user.id.toString()
|
||||||
|
}
|
||||||
@@ -0,0 +1,12 @@
|
|||||||
|
package org.takiguchi.imagora.application.user
|
||||||
|
|
||||||
|
import org.springframework.security.core.Authentication
|
||||||
|
import org.springframework.security.core.context.SecurityContextHolder
|
||||||
|
import org.springframework.stereotype.Component
|
||||||
|
|
||||||
|
@Component
|
||||||
|
class AuthenticationFacade {
|
||||||
|
fun getAuthentication(): Authentication {
|
||||||
|
return SecurityContextHolder.getContext().authentication
|
||||||
|
}
|
||||||
|
}
|
||||||
@@ -0,0 +1,90 @@
|
|||||||
|
package org.takiguchi.imagora.application.user
|
||||||
|
|
||||||
|
import com.auth0.jwt.JWT
|
||||||
|
import com.auth0.jwt.JWTVerifier
|
||||||
|
import com.auth0.jwt.algorithms.Algorithm
|
||||||
|
import com.auth0.jwt.exceptions.JWTVerificationException
|
||||||
|
import com.auth0.jwt.interfaces.Claim
|
||||||
|
import com.github.michaelbull.result.*
|
||||||
|
import org.springframework.beans.factory.annotation.Value
|
||||||
|
import org.springframework.stereotype.Service
|
||||||
|
import org.takiguchi.imagora.domain.core.error.TechnicalError
|
||||||
|
import org.takiguchi.imagora.domain.user.model.User
|
||||||
|
import org.takiguchi.imagora.domain.user.model.UserRole
|
||||||
|
import java.time.ZonedDateTime
|
||||||
|
import java.util.*
|
||||||
|
|
||||||
|
@Service
|
||||||
|
class JwtService(
|
||||||
|
@Value("\${application.security.jwt.secret-key}")
|
||||||
|
secretKey: String,
|
||||||
|
@param:Value("\${application.security.jwt.expiration-delay-in-minutes}")
|
||||||
|
private val tokenExpirationDelayInMinutes: Long
|
||||||
|
) {
|
||||||
|
private val algorithm: Algorithm = Algorithm.HMAC512(secretKey)
|
||||||
|
private val jwtVerifier: JWTVerifier = JWT.require(algorithm).build()
|
||||||
|
|
||||||
|
fun createJwt(user: User): Result<String, TechnicalError> =
|
||||||
|
ZonedDateTime.now().plusMinutes(tokenExpirationDelayInMinutes)
|
||||||
|
.let(ZonedDateTime::toInstant)
|
||||||
|
.let { expirationDateInstant ->
|
||||||
|
runCatching {
|
||||||
|
JWT.create()
|
||||||
|
.withSubject(user.id.toString())
|
||||||
|
.withExpiresAt(expirationDateInstant)
|
||||||
|
.withPayload(user.toJwtPayload())
|
||||||
|
.sign(algorithm)
|
||||||
|
}.mapError { throwable ->
|
||||||
|
TechnicalError("Technical error while JWT generation, caused by: ${throwable.message}.")
|
||||||
|
}
|
||||||
|
}
|
||||||
|
|
||||||
|
private fun User.toJwtPayload(): Map<String, Any> = mapOf(
|
||||||
|
"pseudo" to pseudo,
|
||||||
|
"email" to email,
|
||||||
|
"roles" to roles.joinToString(",")
|
||||||
|
)
|
||||||
|
|
||||||
|
fun isValid(token: String): Boolean = try {
|
||||||
|
jwtVerifier.verify(token)
|
||||||
|
true
|
||||||
|
} catch (error: JWTVerificationException) {
|
||||||
|
false
|
||||||
|
}
|
||||||
|
|
||||||
|
fun extractUser(token: String): Result<User, TechnicalError> = binding {
|
||||||
|
JWT.decode(token).claims
|
||||||
|
.let { claims ->
|
||||||
|
User(
|
||||||
|
id = (
|
||||||
|
claims[CLAIM_ID]?.asUuid()
|
||||||
|
?: Err(TechnicalError("User id is not defined in token."))
|
||||||
|
).bind(),
|
||||||
|
pseudo = claims[CLAIM_PSEUDO]?.asString()
|
||||||
|
?: Err(TechnicalError("User pseudo is not defined in token.")).bind(),
|
||||||
|
email = claims[CLAIM_EMAIL]?.asString()
|
||||||
|
?: Err(TechnicalError("User email is not defined in token.")).bind(),
|
||||||
|
encryptedPassword = "*****",
|
||||||
|
roles = (
|
||||||
|
claims[CLAIM_ROLES]?.asString()
|
||||||
|
?: Err(TechnicalError("User roles are not defined in token.")).bind()
|
||||||
|
)
|
||||||
|
.split(",")
|
||||||
|
.toList()
|
||||||
|
.map { role -> UserRole.fromString(role) ?: Err(TechnicalError("Unknown user role: $role.")).bind() }
|
||||||
|
|
||||||
|
)
|
||||||
|
}
|
||||||
|
}
|
||||||
|
|
||||||
|
private fun Claim.asUuid(): Result<UUID, TechnicalError> = runCatching {
|
||||||
|
UUID.fromString(this.asString())
|
||||||
|
}.mapError { throwable -> TechnicalError("User id deserialisation error.") }
|
||||||
|
|
||||||
|
companion object {
|
||||||
|
private const val CLAIM_ID = "sub"
|
||||||
|
private const val CLAIM_PSEUDO = "pseudo"
|
||||||
|
private const val CLAIM_EMAIL = "email"
|
||||||
|
private const val CLAIM_ROLES = "roles"
|
||||||
|
}
|
||||||
|
}
|
||||||
@@ -0,0 +1,30 @@
|
|||||||
|
package org.takiguchi.imagora.application.user
|
||||||
|
|
||||||
|
import com.github.michaelbull.result.Err
|
||||||
|
import com.github.michaelbull.result.Ok
|
||||||
|
import com.github.michaelbull.result.Result
|
||||||
|
import org.springframework.beans.factory.annotation.Value
|
||||||
|
import org.springframework.security.crypto.password.PasswordEncoder
|
||||||
|
import org.springframework.stereotype.Service
|
||||||
|
import org.takiguchi.imagora.domain.core.error.TechnicalError
|
||||||
|
import org.takiguchi.imagora.domain.user.error.UserError
|
||||||
|
import org.takiguchi.imagora.domain.user.inputport.PasswordInputPort
|
||||||
|
|
||||||
|
@Service
|
||||||
|
open class PasswordService(
|
||||||
|
private val passwordEncoder: PasswordEncoder,
|
||||||
|
@param:Value("\${application.security.password.salt}")
|
||||||
|
private val passwordSalt: String
|
||||||
|
) : PasswordInputPort {
|
||||||
|
override fun encode(password: String): Result<String, TechnicalError> =
|
||||||
|
Ok(passwordEncoder.encode("$password$passwordSalt"))
|
||||||
|
|
||||||
|
override fun checkPasswordsAreMatching(
|
||||||
|
password: String,
|
||||||
|
encodedPassword: String
|
||||||
|
): Result<Unit, UserError> =
|
||||||
|
when (passwordEncoder.matches("$password$passwordSalt", encodedPassword)) {
|
||||||
|
true -> Ok(Unit)
|
||||||
|
else -> Err(UserError("Password does not match."))
|
||||||
|
}
|
||||||
|
}
|
||||||
@@ -0,0 +1,40 @@
|
|||||||
|
package org.takiguchi.imagora.application.user
|
||||||
|
|
||||||
|
import com.github.michaelbull.result.Result
|
||||||
|
import com.github.michaelbull.result.binding
|
||||||
|
import com.github.michaelbull.result.mapError
|
||||||
|
import org.springframework.stereotype.Service
|
||||||
|
import org.takiguchi.imagora.domain.user.error.UserError
|
||||||
|
import org.takiguchi.imagora.domain.user.model.RefreshToken
|
||||||
|
import org.takiguchi.imagora.domain.user.model.User
|
||||||
|
import org.takiguchi.imagora.domain.user.model.UserAuthenticationData
|
||||||
|
import java.time.ZonedDateTime
|
||||||
|
import java.util.*
|
||||||
|
|
||||||
|
@Service
|
||||||
|
class UserAuthenticationDataUseCases(
|
||||||
|
private val jwtService: JwtService
|
||||||
|
) {
|
||||||
|
fun createFromUser(user: User): Result<UserAuthenticationData, UserError> = binding {
|
||||||
|
val accessToken = jwtService.createJwt(user)
|
||||||
|
.mapError { technicalError ->
|
||||||
|
UserError("Technical error while generating JWT, caused by: ${technicalError.message}")
|
||||||
|
}.bind()
|
||||||
|
|
||||||
|
val refreshToken = RefreshToken(
|
||||||
|
userId = user.id,
|
||||||
|
value = UUID.randomUUID(),
|
||||||
|
expirationDate = ZonedDateTime.now()
|
||||||
|
)
|
||||||
|
|
||||||
|
UserAuthenticationData(
|
||||||
|
tokenType = TOKEN_TYPE,
|
||||||
|
accessToken = accessToken,
|
||||||
|
refreshToken = refreshToken
|
||||||
|
)
|
||||||
|
}
|
||||||
|
|
||||||
|
companion object {
|
||||||
|
private const val TOKEN_TYPE = "Bearer"
|
||||||
|
}
|
||||||
|
}
|
||||||
@@ -0,0 +1,23 @@
|
|||||||
|
package org.takiguchi.imagora.application.user
|
||||||
|
|
||||||
|
import com.github.michaelbull.result.Err
|
||||||
|
import com.github.michaelbull.result.Ok
|
||||||
|
import com.github.michaelbull.result.Result
|
||||||
|
import org.springframework.stereotype.Component
|
||||||
|
import org.takiguchi.imagora.domain.user.error.UserError
|
||||||
|
|
||||||
|
@Component
|
||||||
|
class UserEditionRequestValidator {
|
||||||
|
fun validate(pseudo: String, email: String, password: String): Result<Unit, UserError> = when {
|
||||||
|
pseudo.trim().isEmpty() -> Err(UserError("User pseudo should not be empty nor blank."))
|
||||||
|
|
||||||
|
email.trim().isEmpty() -> Err(UserError("User email should not be empty nor blank."))
|
||||||
|
|
||||||
|
else -> validatePassword(password)
|
||||||
|
}
|
||||||
|
|
||||||
|
fun validatePassword(password: String): Result<Unit, UserError> = when {
|
||||||
|
password.trim().isEmpty() -> Err(UserError("Password should not be empty not blank."))
|
||||||
|
else -> Ok(Unit)
|
||||||
|
}
|
||||||
|
}
|
||||||
@@ -0,0 +1,144 @@
|
|||||||
|
package org.takiguchi.imagora.application.user
|
||||||
|
|
||||||
|
import com.github.michaelbull.result.*
|
||||||
|
import org.springframework.stereotype.Service
|
||||||
|
import org.takiguchi.imagora.application.core.security.model.CustomUserDetails
|
||||||
|
import org.takiguchi.imagora.domain.user.error.AuthenticationRequiredError
|
||||||
|
import org.takiguchi.imagora.domain.user.error.UserError
|
||||||
|
import org.takiguchi.imagora.domain.user.inputport.UserInputPort
|
||||||
|
import org.takiguchi.imagora.domain.user.model.User
|
||||||
|
import org.takiguchi.imagora.domain.user.model.UserAuthenticationData
|
||||||
|
import org.takiguchi.imagora.domain.user.model.UserRole.STANDARD
|
||||||
|
import org.takiguchi.imagora.domain.user.outputport.UserOutputPort
|
||||||
|
import java.util.*
|
||||||
|
|
||||||
|
@Service
|
||||||
|
class UserUseCases(
|
||||||
|
private val authenticationFacade: AuthenticationFacade,
|
||||||
|
private val passwordService: PasswordService,
|
||||||
|
private val userAuthenticationDataUseCases: UserAuthenticationDataUseCases,
|
||||||
|
private val userEditionRequestValidator: UserEditionRequestValidator,
|
||||||
|
private val userOutputPort: UserOutputPort
|
||||||
|
) : UserInputPort {
|
||||||
|
|
||||||
|
override fun getAuthenticatedUser(): Result<User, AuthenticationRequiredError> =
|
||||||
|
Ok(authenticationFacade.getAuthentication())
|
||||||
|
.map { it.principal }
|
||||||
|
.toErrorIfNull { AuthenticationRequiredError() }
|
||||||
|
.toErrorIf({customerUserDetails ->
|
||||||
|
!CustomUserDetails::class.java.isInstance(customerUserDetails)
|
||||||
|
}) { AuthenticationRequiredError() }
|
||||||
|
.map { customerUserDetails -> CustomUserDetails::class.java.cast(customerUserDetails) }
|
||||||
|
.map(CustomUserDetails::user)
|
||||||
|
|
||||||
|
override fun getAll(): Result<List<User>, UserError> =
|
||||||
|
userOutputPort.getAll()
|
||||||
|
.mapError { technicalError ->
|
||||||
|
UserError("Unknown error while retrieving all users: ${technicalError.message}")
|
||||||
|
}
|
||||||
|
|
||||||
|
override fun getById(userId: UUID): Result<User?, UserError> =
|
||||||
|
userOutputPort.getById(userId)
|
||||||
|
.mapError { _ -> UserError("Unknown error while retrieving user by its id.") }
|
||||||
|
|
||||||
|
override fun create(
|
||||||
|
pseudo: String,
|
||||||
|
email: String,
|
||||||
|
password: String
|
||||||
|
): Result<UserAuthenticationData, UserError> = binding {
|
||||||
|
userEditionRequestValidator.validate(pseudo, email, password).bind()
|
||||||
|
|
||||||
|
checkPseudoAlreadyExists(pseudo).bind()
|
||||||
|
|
||||||
|
checkEmailAlreadyExists(email).bind()
|
||||||
|
|
||||||
|
val encodedPassword = passwordService.encode(password)
|
||||||
|
.mapError { technicalError -> UserError("Technical error while encoding password, caused by: ${technicalError.message}") }
|
||||||
|
.bind()
|
||||||
|
|
||||||
|
val newUser = User(
|
||||||
|
id = UUID.randomUUID(),
|
||||||
|
pseudo = pseudo,
|
||||||
|
email = email,
|
||||||
|
encryptedPassword = encodedPassword,
|
||||||
|
roles = listOf(STANDARD),
|
||||||
|
)
|
||||||
|
userOutputPort.save(newUser)
|
||||||
|
.mapError { technicalError ->
|
||||||
|
UserError("Technical error while creating new user, caused by: ${technicalError.message}")
|
||||||
|
}
|
||||||
|
.bind()
|
||||||
|
|
||||||
|
userAuthenticationDataUseCases.createFromUser(newUser).bind()
|
||||||
|
}
|
||||||
|
|
||||||
|
private fun checkPseudoAlreadyExists(pseudo: String): Result<Boolean, UserError> = userOutputPort.existsByPseudo(pseudo)
|
||||||
|
.mapError { technicalError ->
|
||||||
|
UserError("Technical error while checking if pseudo already exists or not.")
|
||||||
|
}
|
||||||
|
.toErrorIf({ emailAlreadyExists -> emailAlreadyExists }) {
|
||||||
|
UserError("User pseudo already exists.")
|
||||||
|
}
|
||||||
|
|
||||||
|
private fun checkEmailAlreadyExists(email: String): Result<Boolean, UserError> = userOutputPort.existsByEmail(email)
|
||||||
|
.mapError { technicalError ->
|
||||||
|
UserError("Technical error while checking if email already exists or not.")
|
||||||
|
}
|
||||||
|
.toErrorIf({ emailAlreadyExists -> emailAlreadyExists }) {
|
||||||
|
UserError("User email already exists.")
|
||||||
|
}
|
||||||
|
|
||||||
|
override fun setUserAdmin(userId: UUID): Result<Unit, UserError> = binding {
|
||||||
|
val existingUser = userOutputPort.getById(userId)
|
||||||
|
.mapError { technicalError ->
|
||||||
|
UserError("Technical error while setting user admin, caused by: ${technicalError.message}")
|
||||||
|
}
|
||||||
|
.toErrorIfNull { UserError("User with id \"$userId\" does not exist.") }
|
||||||
|
.bind()
|
||||||
|
|
||||||
|
val updatedUser = existingUser.setAdmin()
|
||||||
|
userOutputPort.save(updatedUser)
|
||||||
|
.mapError { technicalError ->
|
||||||
|
UserError("Technical error while saving user, caused by: ${technicalError.message}")
|
||||||
|
}
|
||||||
|
.bind()
|
||||||
|
}
|
||||||
|
|
||||||
|
override fun setUserStandard(userId: UUID): Result<Unit, UserError> {
|
||||||
|
TODO("Not yet implemented")
|
||||||
|
}
|
||||||
|
|
||||||
|
override fun update(
|
||||||
|
userId: UUID,
|
||||||
|
pseudo: String,
|
||||||
|
email: String
|
||||||
|
): Result<Unit, UserError> {
|
||||||
|
TODO("Not yet implemented")
|
||||||
|
}
|
||||||
|
|
||||||
|
override fun changePassword(
|
||||||
|
userId: UUID,
|
||||||
|
actualPassword: String,
|
||||||
|
newPassword: String
|
||||||
|
): Result<Unit, UserError> {
|
||||||
|
TODO("Not yet implemented")
|
||||||
|
}
|
||||||
|
|
||||||
|
override fun deleteById(userId: UUID): Result<Unit, UserError> {
|
||||||
|
TODO("Not yet implemented")
|
||||||
|
}
|
||||||
|
|
||||||
|
override fun login(
|
||||||
|
pseudoOrEmail: String,
|
||||||
|
password: String
|
||||||
|
): Result<UserAuthenticationData, UserError> = binding {
|
||||||
|
val user = userOutputPort.getByPseudoOrEmail(pseudoOrEmail)
|
||||||
|
.mapError { technicalError -> UserError("Technical error while retrieving user, caused by: ${technicalError.message}") }
|
||||||
|
.toErrorIfNull { UserError("User does not exist.") }
|
||||||
|
.bind()
|
||||||
|
|
||||||
|
passwordService.checkPasswordsAreMatching(password, user.encryptedPassword).bind()
|
||||||
|
|
||||||
|
userAuthenticationDataUseCases.createFromUser(user).bind()
|
||||||
|
}
|
||||||
|
}
|
||||||
7
imagora-domain/build.gradle.kts
Normal file
7
imagora-domain/build.gradle.kts
Normal file
@@ -0,0 +1,7 @@
|
|||||||
|
plugins {
|
||||||
|
kotlin("jvm")
|
||||||
|
}
|
||||||
|
|
||||||
|
dependencies {
|
||||||
|
implementation(kotlin("stdlib"))
|
||||||
|
}
|
||||||
@@ -0,0 +1,3 @@
|
|||||||
|
package org.takiguchi.imagora.domain.core.error
|
||||||
|
|
||||||
|
open class BusinessError(message: String) : DomainError(message)
|
||||||
@@ -0,0 +1,3 @@
|
|||||||
|
package org.takiguchi.imagora.domain.core.error
|
||||||
|
|
||||||
|
open class DomainError(val message: String)
|
||||||
@@ -0,0 +1,3 @@
|
|||||||
|
package org.takiguchi.imagora.domain.core.error
|
||||||
|
|
||||||
|
open class TechnicalError(message: String) : DomainError(message)
|
||||||
@@ -0,0 +1,3 @@
|
|||||||
|
package org.takiguchi.imagora.domain.user.error
|
||||||
|
|
||||||
|
class AuthenticationRequiredError() : UserError("Authentication is required.")
|
||||||
@@ -0,0 +1,3 @@
|
|||||||
|
package org.takiguchi.imagora.domain.user.error
|
||||||
|
|
||||||
|
class OperationNotPermittedError : UserError("Operation not permitted: You do not have rights to perform this operation.")
|
||||||
@@ -0,0 +1,5 @@
|
|||||||
|
package org.takiguchi.imagora.domain.user.error
|
||||||
|
|
||||||
|
import org.takiguchi.imagora.domain.core.error.BusinessError
|
||||||
|
|
||||||
|
open class UserError(message: String) : BusinessError(message)
|
||||||
@@ -0,0 +1,11 @@
|
|||||||
|
package org.takiguchi.imagora.domain.user.inputport
|
||||||
|
|
||||||
|
import com.github.michaelbull.result.Result
|
||||||
|
import org.takiguchi.imagora.domain.core.error.TechnicalError
|
||||||
|
import org.takiguchi.imagora.domain.user.error.UserError
|
||||||
|
|
||||||
|
interface PasswordInputPort {
|
||||||
|
fun encode(password: String): Result<String, TechnicalError>
|
||||||
|
|
||||||
|
fun checkPasswordsAreMatching(password: String, encodedPassword: String): Result<Unit, UserError>
|
||||||
|
}
|
||||||
@@ -0,0 +1,21 @@
|
|||||||
|
package org.takiguchi.imagora.domain.user.inputport
|
||||||
|
|
||||||
|
import com.github.michaelbull.result.Result
|
||||||
|
import org.takiguchi.imagora.domain.user.error.AuthenticationRequiredError
|
||||||
|
import org.takiguchi.imagora.domain.user.error.UserError
|
||||||
|
import org.takiguchi.imagora.domain.user.model.User
|
||||||
|
import org.takiguchi.imagora.domain.user.model.UserAuthenticationData
|
||||||
|
import java.util.UUID
|
||||||
|
|
||||||
|
interface UserInputPort {
|
||||||
|
fun getAuthenticatedUser(): Result<User, AuthenticationRequiredError>
|
||||||
|
fun getAll(): Result<List<User>, UserError>
|
||||||
|
fun getById(userId: UUID): Result<User?, UserError>
|
||||||
|
fun create(pseudo: String, email: String, password: String): Result<UserAuthenticationData, UserError>
|
||||||
|
fun setUserAdmin(userId: UUID): Result<Unit, UserError>
|
||||||
|
fun setUserStandard(userId: UUID): Result<Unit, UserError>
|
||||||
|
fun update(userId: UUID, pseudo: String, email: String): Result<Unit, UserError>
|
||||||
|
fun changePassword(userId: UUID, actualPassword: String, newPassword: String): Result<Unit, UserError>
|
||||||
|
fun deleteById(userId: UUID): Result<Unit, UserError>
|
||||||
|
fun login(pseudoOrEmail: String, password: String): Result<UserAuthenticationData, UserError>
|
||||||
|
}
|
||||||
@@ -0,0 +1,10 @@
|
|||||||
|
package org.takiguchi.imagora.domain.user.model
|
||||||
|
|
||||||
|
import java.time.ZonedDateTime
|
||||||
|
import java.util.*
|
||||||
|
|
||||||
|
data class RefreshToken(
|
||||||
|
val userId: UUID,
|
||||||
|
val value: UUID,
|
||||||
|
val expirationDate: ZonedDateTime
|
||||||
|
)
|
||||||
@@ -0,0 +1,18 @@
|
|||||||
|
package org.takiguchi.imagora.domain.user.model
|
||||||
|
|
||||||
|
import org.takiguchi.imagora.domain.user.model.UserRole.*
|
||||||
|
import java.util.UUID
|
||||||
|
|
||||||
|
data class User(
|
||||||
|
val id: UUID,
|
||||||
|
val pseudo: String,
|
||||||
|
val email: String,
|
||||||
|
val encryptedPassword: String,
|
||||||
|
val roles: List<UserRole>
|
||||||
|
) {
|
||||||
|
fun setAdmin(): User = copy(roles = listOf(STANDARD, ADMIN))
|
||||||
|
|
||||||
|
fun setStandard(): User = copy(roles = listOf(STANDARD))
|
||||||
|
|
||||||
|
fun isAdmin(): Boolean = roles.contains(ADMIN)
|
||||||
|
}
|
||||||
@@ -0,0 +1,7 @@
|
|||||||
|
package org.takiguchi.imagora.domain.user.model
|
||||||
|
|
||||||
|
data class UserAuthenticationData(
|
||||||
|
val tokenType: String,
|
||||||
|
val accessToken: String,
|
||||||
|
val refreshToken: RefreshToken
|
||||||
|
)
|
||||||
@@ -0,0 +1,14 @@
|
|||||||
|
package org.takiguchi.imagora.domain.user.model
|
||||||
|
|
||||||
|
enum class UserRole {
|
||||||
|
STANDARD,
|
||||||
|
ADMIN;
|
||||||
|
|
||||||
|
companion object {
|
||||||
|
fun fromString(roleAsString: String): UserRole? = when (roleAsString) {
|
||||||
|
"STANDARD" -> STANDARD
|
||||||
|
"ADMIN" -> ADMIN
|
||||||
|
else -> null
|
||||||
|
}
|
||||||
|
}
|
||||||
|
}
|
||||||
@@ -0,0 +1,16 @@
|
|||||||
|
package org.takiguchi.imagora.domain.user.outputport
|
||||||
|
|
||||||
|
import com.github.michaelbull.result.Result
|
||||||
|
import org.takiguchi.imagora.domain.core.error.TechnicalError
|
||||||
|
import org.takiguchi.imagora.domain.user.model.User
|
||||||
|
import java.util.*
|
||||||
|
|
||||||
|
interface UserOutputPort {
|
||||||
|
fun getAll(): Result<List<User>, TechnicalError>
|
||||||
|
fun getById(userId: UUID): Result<User?, TechnicalError>
|
||||||
|
fun save(user: User): Result<Unit, TechnicalError>
|
||||||
|
fun deleteById(user: User): Result<Unit, TechnicalError>
|
||||||
|
fun existsByEmail(email: String): Result<Boolean, TechnicalError>
|
||||||
|
fun existsByPseudo(pseudo: String): Result<Boolean, TechnicalError>
|
||||||
|
fun getByPseudoOrEmail(pseudoOrEmail: String): Result<User?, TechnicalError>
|
||||||
|
}
|
||||||
14
imagora-exposition/build.gradle.kts
Normal file
14
imagora-exposition/build.gradle.kts
Normal file
@@ -0,0 +1,14 @@
|
|||||||
|
plugins {
|
||||||
|
kotlin("jvm")
|
||||||
|
id("io.spring.dependency-management") version "1.1.7"
|
||||||
|
}
|
||||||
|
|
||||||
|
dependencies {
|
||||||
|
implementation(kotlin("stdlib"))
|
||||||
|
implementation(project(":imagora-domain"))
|
||||||
|
implementation(project(":imagora-application"))
|
||||||
|
implementation("org.springframework.boot:spring-boot-starter-web")
|
||||||
|
implementation("org.springframework.boot:spring-boot-starter-security")
|
||||||
|
implementation("tools.jackson.module:jackson-module-kotlin:3.0.2")
|
||||||
|
implementation("com.fasterxml.jackson.module:jackson-module-kotlin:2.18.3")
|
||||||
|
}
|
||||||
@@ -0,0 +1,40 @@
|
|||||||
|
package org.takiguchi.imagora.exposition.core
|
||||||
|
|
||||||
|
import org.springframework.context.annotation.Configuration
|
||||||
|
import org.springframework.http.HttpStatus.BAD_REQUEST
|
||||||
|
import org.springframework.http.HttpStatus.INTERNAL_SERVER_ERROR
|
||||||
|
import org.springframework.http.ResponseEntity
|
||||||
|
import org.springframework.http.converter.HttpMessageNotReadableException
|
||||||
|
import org.springframework.web.bind.annotation.ExceptionHandler
|
||||||
|
import org.springframework.web.bind.annotation.RestControllerAdvice
|
||||||
|
import org.takiguchi.imagora.exposition.core.model.HttpResponse
|
||||||
|
import org.takiguchi.imagora.exposition.core.model.HttpResponseError
|
||||||
|
import org.takiguchi.imagora.exposition.core.resulterror.exception.ResultErrorException
|
||||||
|
import org.takiguchi.imagora.exposition.core.resulterror.mapper.ResultErrorMapper
|
||||||
|
|
||||||
|
@Configuration
|
||||||
|
@RestControllerAdvice
|
||||||
|
open class ExceptionHandlingConfiguration(
|
||||||
|
private val resultErrorMapper: ResultErrorMapper
|
||||||
|
) {
|
||||||
|
@ExceptionHandler(HttpMessageNotReadableException::class)
|
||||||
|
fun handleHttpMessageNotReadableException(ex: HttpMessageNotReadableException): ResponseEntity<HttpResponse<Nothing>> {
|
||||||
|
val errorMessage = "Invalid request payload."
|
||||||
|
return ResponseEntity(HttpResponseError(errorMessage), BAD_REQUEST)
|
||||||
|
}
|
||||||
|
|
||||||
|
@ExceptionHandler(ResultErrorException::class)
|
||||||
|
fun handleResultError(ex: ResultErrorException): ResponseEntity<HttpResponse<Nothing>> {
|
||||||
|
return ResponseEntity(
|
||||||
|
HttpResponseError(ex.error.message),
|
||||||
|
resultErrorMapper.mapHttpStatus(ex.error)
|
||||||
|
)
|
||||||
|
}
|
||||||
|
|
||||||
|
@ExceptionHandler(Exception::class)
|
||||||
|
fun handleException(ex: Exception): ResponseEntity<HttpResponse<Nothing>> {
|
||||||
|
val errorMessage = "Internal Server Error with Cause: ${ex.message}"
|
||||||
|
return ResponseEntity(HttpResponseError(errorMessage), INTERNAL_SERVER_ERROR)
|
||||||
|
}
|
||||||
|
|
||||||
|
}
|
||||||
@@ -0,0 +1,9 @@
|
|||||||
|
package org.takiguchi.imagora.exposition.core.model
|
||||||
|
|
||||||
|
interface HttpResponse<T> {
|
||||||
|
fun getError(): String?
|
||||||
|
}
|
||||||
|
|
||||||
|
data class HttpResponseError<Nothing>(private val error: String) : HttpResponse<Nothing> {
|
||||||
|
override fun getError(): String? = error
|
||||||
|
}
|
||||||
@@ -0,0 +1,16 @@
|
|||||||
|
package org.takiguchi.imagora.exposition.core.resulterror
|
||||||
|
|
||||||
|
import com.github.michaelbull.result.Result
|
||||||
|
import com.github.michaelbull.result.annotation.UnsafeResultErrorAccess
|
||||||
|
import com.github.michaelbull.result.annotation.UnsafeResultValueAccess
|
||||||
|
import org.takiguchi.imagora.domain.core.error.DomainError
|
||||||
|
import org.takiguchi.imagora.exposition.core.resulterror.exception.ResultErrorException
|
||||||
|
|
||||||
|
@OptIn(UnsafeResultValueAccess::class, UnsafeResultErrorAccess::class)
|
||||||
|
inline fun <T> response(block: () -> Result<T, DomainError>): T {
|
||||||
|
val result = block()
|
||||||
|
return when (result.isOk) {
|
||||||
|
true -> result.value
|
||||||
|
false -> throw ResultErrorException(result.error)
|
||||||
|
}
|
||||||
|
}
|
||||||
@@ -0,0 +1,5 @@
|
|||||||
|
package org.takiguchi.imagora.exposition.core.resulterror.exception
|
||||||
|
|
||||||
|
import org.takiguchi.imagora.domain.core.error.DomainError
|
||||||
|
|
||||||
|
data class ResultErrorException(val error: DomainError) : RuntimeException()
|
||||||
@@ -0,0 +1,18 @@
|
|||||||
|
package org.takiguchi.imagora.exposition.core.resulterror.mapper
|
||||||
|
|
||||||
|
import org.springframework.http.HttpStatus
|
||||||
|
import org.springframework.http.HttpStatus.INTERNAL_SERVER_ERROR
|
||||||
|
import org.springframework.stereotype.Component
|
||||||
|
import org.takiguchi.imagora.domain.core.error.DomainError
|
||||||
|
import org.takiguchi.imagora.domain.user.error.UserError
|
||||||
|
import org.takiguchi.imagora.exposition.core.resulterror.mapper.errormapper.UserErrorMapper
|
||||||
|
|
||||||
|
@Component
|
||||||
|
class ResultErrorMapper(
|
||||||
|
private val userErrorMapper: UserErrorMapper
|
||||||
|
) {
|
||||||
|
fun mapHttpStatus(error: DomainError): HttpStatus = when(error) {
|
||||||
|
is UserError -> userErrorMapper.map(error)
|
||||||
|
else -> INTERNAL_SERVER_ERROR
|
||||||
|
}
|
||||||
|
}
|
||||||
@@ -0,0 +1,8 @@
|
|||||||
|
package org.takiguchi.imagora.exposition.core.resulterror.mapper.errormapper
|
||||||
|
|
||||||
|
import org.springframework.http.HttpStatus
|
||||||
|
import org.takiguchi.imagora.domain.core.error.DomainError
|
||||||
|
|
||||||
|
interface HttpStatusErrorMapper<E : DomainError> {
|
||||||
|
fun map(error: E): HttpStatus
|
||||||
|
}
|
||||||
@@ -0,0 +1,17 @@
|
|||||||
|
package org.takiguchi.imagora.exposition.core.resulterror.mapper.errormapper
|
||||||
|
|
||||||
|
import org.springframework.http.HttpStatus
|
||||||
|
import org.springframework.http.HttpStatus.*
|
||||||
|
import org.springframework.stereotype.Component
|
||||||
|
import org.takiguchi.imagora.domain.user.error.AuthenticationRequiredError
|
||||||
|
import org.takiguchi.imagora.domain.user.error.OperationNotPermittedError
|
||||||
|
import org.takiguchi.imagora.domain.user.error.UserError
|
||||||
|
|
||||||
|
@Component
|
||||||
|
class UserErrorMapper : HttpStatusErrorMapper<UserError> {
|
||||||
|
override fun map(error: UserError): HttpStatus = when (error) {
|
||||||
|
is AuthenticationRequiredError -> UNAUTHORIZED
|
||||||
|
is OperationNotPermittedError -> FORBIDDEN
|
||||||
|
else -> BAD_REQUEST
|
||||||
|
}
|
||||||
|
}
|
||||||
@@ -0,0 +1,28 @@
|
|||||||
|
package org.takiguchi.imagora.exposition.core.security
|
||||||
|
|
||||||
|
import com.github.michaelbull.result.Ok
|
||||||
|
import com.github.michaelbull.result.flatMap
|
||||||
|
import com.github.michaelbull.result.map
|
||||||
|
import com.github.michaelbull.result.toErrorIfNull
|
||||||
|
import org.springframework.security.core.userdetails.UserDetails
|
||||||
|
import org.springframework.security.core.userdetails.UserDetailsService
|
||||||
|
import org.springframework.stereotype.Component
|
||||||
|
import org.takiguchi.imagora.application.core.security.model.CustomUserDetails
|
||||||
|
import org.takiguchi.imagora.domain.user.error.AuthenticationRequiredError
|
||||||
|
import org.takiguchi.imagora.domain.user.inputport.UserInputPort
|
||||||
|
import org.takiguchi.imagora.exposition.core.resulterror.response
|
||||||
|
import java.util.*
|
||||||
|
|
||||||
|
@Component
|
||||||
|
class CustomUserDetailsService(
|
||||||
|
private val userInputPort: UserInputPort
|
||||||
|
) : UserDetailsService {
|
||||||
|
override fun loadUserByUsername(username: String?): UserDetails = response {
|
||||||
|
username?.let(UUID::fromString)
|
||||||
|
.let(::Ok)
|
||||||
|
.toErrorIfNull { AuthenticationRequiredError() }
|
||||||
|
.flatMap { userId -> userInputPort.getById(userId) }
|
||||||
|
.toErrorIfNull { AuthenticationRequiredError() }
|
||||||
|
.map(::CustomUserDetails)
|
||||||
|
}
|
||||||
|
}
|
||||||
@@ -0,0 +1,61 @@
|
|||||||
|
package org.takiguchi.imagora.exposition.core.security
|
||||||
|
|
||||||
|
import com.github.michaelbull.result.*
|
||||||
|
import jakarta.servlet.FilterChain
|
||||||
|
import jakarta.servlet.http.HttpServletRequest
|
||||||
|
import jakarta.servlet.http.HttpServletResponse
|
||||||
|
import org.springframework.http.HttpHeaders.AUTHORIZATION
|
||||||
|
import org.springframework.security.authentication.UsernamePasswordAuthenticationToken
|
||||||
|
import org.springframework.security.core.context.SecurityContextHolder
|
||||||
|
import org.springframework.security.web.authentication.WebAuthenticationDetailsSource
|
||||||
|
import org.springframework.stereotype.Component
|
||||||
|
import org.springframework.web.filter.OncePerRequestFilter
|
||||||
|
import org.takiguchi.imagora.application.core.security.model.CustomUserDetails
|
||||||
|
import org.takiguchi.imagora.application.user.JwtService
|
||||||
|
import org.takiguchi.imagora.domain.core.error.DomainError
|
||||||
|
import org.takiguchi.imagora.domain.user.error.AuthenticationRequiredError
|
||||||
|
import org.takiguchi.imagora.domain.user.model.User
|
||||||
|
|
||||||
|
@Component
|
||||||
|
class JwtAuthenticationFilter(
|
||||||
|
private val jwtService: JwtService,
|
||||||
|
) : OncePerRequestFilter() {
|
||||||
|
override fun doFilterInternal(
|
||||||
|
request: HttpServletRequest,
|
||||||
|
response: HttpServletResponse,
|
||||||
|
filterChain: FilterChain
|
||||||
|
) {
|
||||||
|
request.extractJwt()
|
||||||
|
.toErrorIf({token -> !jwtService.isValid(token)}) {::AuthenticationRequiredError}
|
||||||
|
.flatMap(jwtService::extractUser)
|
||||||
|
.map { it.toUsernamePasswordAuthenticationToken() }
|
||||||
|
.fold(
|
||||||
|
success = { token ->
|
||||||
|
token.details = WebAuthenticationDetailsSource().buildDetails(request)
|
||||||
|
SecurityContextHolder.getContext().authentication = token
|
||||||
|
},
|
||||||
|
failure = {}
|
||||||
|
)
|
||||||
|
|
||||||
|
filterChain.doFilter(request, response)
|
||||||
|
}
|
||||||
|
|
||||||
|
private fun HttpServletRequest.extractJwt(): Result<String, DomainError> = getHeader(AUTHORIZATION)
|
||||||
|
?.takeIf { it.isNotEmpty() }
|
||||||
|
?.takeIf { it.startsWith(BEARER_PREFIX) }
|
||||||
|
?.substring(BEARER_PREFIX.length)
|
||||||
|
.let(::Ok)
|
||||||
|
.toErrorIfNull(::AuthenticationRequiredError)
|
||||||
|
|
||||||
|
private fun User.toUsernamePasswordAuthenticationToken(): UsernamePasswordAuthenticationToken =
|
||||||
|
CustomUserDetails(this)
|
||||||
|
.let { details -> UsernamePasswordAuthenticationToken(
|
||||||
|
details,
|
||||||
|
null,
|
||||||
|
details.authorities
|
||||||
|
)}
|
||||||
|
|
||||||
|
private companion object {
|
||||||
|
private const val BEARER_PREFIX = "Bearer "
|
||||||
|
}
|
||||||
|
}
|
||||||
@@ -0,0 +1,53 @@
|
|||||||
|
package org.takiguchi.imagora.exposition.core.security
|
||||||
|
|
||||||
|
import jakarta.servlet.DispatcherType.FORWARD
|
||||||
|
import jakarta.servlet.http.HttpServletResponse.SC_FORBIDDEN
|
||||||
|
import jakarta.servlet.http.HttpServletResponse.SC_UNAUTHORIZED
|
||||||
|
import org.springframework.context.annotation.Bean
|
||||||
|
import org.springframework.context.annotation.Configuration
|
||||||
|
import org.springframework.http.HttpMethod.OPTIONS
|
||||||
|
import org.springframework.http.HttpMethod.POST
|
||||||
|
import org.springframework.security.config.Customizer
|
||||||
|
import org.springframework.security.config.annotation.web.builders.HttpSecurity
|
||||||
|
import org.springframework.security.config.annotation.web.configuration.EnableWebSecurity
|
||||||
|
import org.springframework.security.config.annotation.web.configurers.CsrfConfigurer
|
||||||
|
import org.springframework.security.config.http.SessionCreationPolicy.STATELESS
|
||||||
|
import org.springframework.security.web.SecurityFilterChain
|
||||||
|
import org.springframework.security.web.authentication.UsernamePasswordAuthenticationFilter
|
||||||
|
|
||||||
|
@Configuration
|
||||||
|
@EnableWebSecurity
|
||||||
|
open class SecurityConfiguration {
|
||||||
|
@Bean
|
||||||
|
open fun securityFilterChain(
|
||||||
|
httpSecurity: HttpSecurity,
|
||||||
|
jwtAuthenticationFilter: JwtAuthenticationFilter
|
||||||
|
): SecurityFilterChain {
|
||||||
|
httpSecurity
|
||||||
|
.csrf(CsrfConfigurer<HttpSecurity>::disable)
|
||||||
|
.httpBasic { Customizer.withDefaults<HttpSecurity>() }
|
||||||
|
.configureUnauthorizedAndForbiddenErrors()
|
||||||
|
.addFilterBefore(jwtAuthenticationFilter, UsernamePasswordAuthenticationFilter::class.java)
|
||||||
|
.sessionManagement { customizer -> customizer.sessionCreationPolicy(STATELESS) }
|
||||||
|
.authorizeHttpRequests { requests ->
|
||||||
|
requests
|
||||||
|
.dispatcherTypeMatchers(FORWARD).permitAll()
|
||||||
|
.requestMatchers("/error").permitAll()
|
||||||
|
.requestMatchers(
|
||||||
|
POST,
|
||||||
|
"/api/users",
|
||||||
|
"/api/users/login",
|
||||||
|
).permitAll()
|
||||||
|
.requestMatchers(OPTIONS).permitAll()
|
||||||
|
.anyRequest().authenticated()
|
||||||
|
}
|
||||||
|
|
||||||
|
return httpSecurity.build()
|
||||||
|
}
|
||||||
|
|
||||||
|
private fun HttpSecurity.configureUnauthorizedAndForbiddenErrors(): HttpSecurity = exceptionHandling { configurer ->
|
||||||
|
configurer
|
||||||
|
.authenticationEntryPoint { _, response, _ -> response.sendError(SC_UNAUTHORIZED) }
|
||||||
|
.accessDeniedHandler { _, response, _ -> response.sendError(SC_FORBIDDEN) }
|
||||||
|
}
|
||||||
|
}
|
||||||
@@ -0,0 +1,30 @@
|
|||||||
|
package org.takiguchi.imagora.exposition.user
|
||||||
|
|
||||||
|
import com.github.michaelbull.result.map
|
||||||
|
import org.springframework.web.bind.annotation.PostMapping
|
||||||
|
import org.springframework.web.bind.annotation.RequestBody
|
||||||
|
import org.springframework.web.bind.annotation.RequestMapping
|
||||||
|
import org.springframework.web.bind.annotation.RestController
|
||||||
|
import org.takiguchi.imagora.domain.user.inputport.UserInputPort
|
||||||
|
import org.takiguchi.imagora.exposition.core.resulterror.response
|
||||||
|
import org.takiguchi.imagora.exposition.user.model.CreateUserRequest
|
||||||
|
import org.takiguchi.imagora.exposition.user.model.LoginRequest
|
||||||
|
import org.takiguchi.imagora.exposition.user.model.UserAuthenticationDataDto
|
||||||
|
|
||||||
|
@RestController
|
||||||
|
@RequestMapping("/api/users")
|
||||||
|
class UserController(
|
||||||
|
private val userInputPort: UserInputPort
|
||||||
|
) {
|
||||||
|
@PostMapping
|
||||||
|
fun signup(@RequestBody request: CreateUserRequest): UserAuthenticationDataDto = response {
|
||||||
|
userInputPort.create(request.pseudo, request.email, request.password)
|
||||||
|
.map(::UserAuthenticationDataDto)
|
||||||
|
}
|
||||||
|
|
||||||
|
@PostMapping("/login")
|
||||||
|
fun login(@RequestBody request: LoginRequest): UserAuthenticationDataDto = response {
|
||||||
|
userInputPort.login(request.username, request.password)
|
||||||
|
.map(::UserAuthenticationDataDto)
|
||||||
|
}
|
||||||
|
}
|
||||||
@@ -0,0 +1,7 @@
|
|||||||
|
package org.takiguchi.imagora.exposition.user.model
|
||||||
|
|
||||||
|
data class CreateUserRequest(
|
||||||
|
val pseudo: String,
|
||||||
|
val email: String,
|
||||||
|
val password: String
|
||||||
|
)
|
||||||
@@ -0,0 +1,7 @@
|
|||||||
|
package org.takiguchi.imagora.exposition.user.model
|
||||||
|
|
||||||
|
data class LoginRequest(
|
||||||
|
// Pseudo or email
|
||||||
|
val username: String,
|
||||||
|
val password: String
|
||||||
|
)
|
||||||
@@ -0,0 +1,23 @@
|
|||||||
|
package org.takiguchi.imagora.exposition.user.model
|
||||||
|
|
||||||
|
import org.takiguchi.imagora.domain.user.model.RefreshToken
|
||||||
|
import java.time.ZonedDateTime
|
||||||
|
import java.util.*
|
||||||
|
|
||||||
|
data class RefreshTokenDto(
|
||||||
|
val userId: UUID,
|
||||||
|
val value: UUID,
|
||||||
|
val expirationDate: ZonedDateTime
|
||||||
|
) {
|
||||||
|
constructor(refreshToken: RefreshToken) : this(
|
||||||
|
userId = refreshToken.userId,
|
||||||
|
value = refreshToken.value,
|
||||||
|
expirationDate = refreshToken.expirationDate
|
||||||
|
)
|
||||||
|
|
||||||
|
fun toDomain() = RefreshToken(
|
||||||
|
userId = userId,
|
||||||
|
value = value,
|
||||||
|
expirationDate = expirationDate
|
||||||
|
)
|
||||||
|
}
|
||||||
@@ -0,0 +1,21 @@
|
|||||||
|
package org.takiguchi.imagora.exposition.user.model
|
||||||
|
|
||||||
|
import org.takiguchi.imagora.domain.user.model.UserAuthenticationData
|
||||||
|
|
||||||
|
data class UserAuthenticationDataDto(
|
||||||
|
val tokenType: String,
|
||||||
|
val accessToken: String,
|
||||||
|
val refreshToken: RefreshTokenDto
|
||||||
|
) {
|
||||||
|
constructor(data: UserAuthenticationData) : this(
|
||||||
|
tokenType = data.tokenType,
|
||||||
|
accessToken = data.accessToken,
|
||||||
|
refreshToken = RefreshTokenDto(data.refreshToken)
|
||||||
|
)
|
||||||
|
|
||||||
|
fun toDomain() = UserAuthenticationData(
|
||||||
|
tokenType = tokenType,
|
||||||
|
accessToken = accessToken,
|
||||||
|
refreshToken = refreshToken.toDomain()
|
||||||
|
)
|
||||||
|
}
|
||||||
15
imagora-infrastructure/build.gradle.kts
Normal file
15
imagora-infrastructure/build.gradle.kts
Normal file
@@ -0,0 +1,15 @@
|
|||||||
|
plugins {
|
||||||
|
kotlin("jvm")
|
||||||
|
id("io.spring.dependency-management") version "1.1.7"
|
||||||
|
kotlin("plugin.jpa") version "2.2.21"
|
||||||
|
}
|
||||||
|
|
||||||
|
dependencies {
|
||||||
|
implementation(kotlin("stdlib"))
|
||||||
|
implementation(project(":imagora-domain"))
|
||||||
|
implementation(project(":imagora-application"))
|
||||||
|
implementation("org.springframework:spring-context")
|
||||||
|
implementation("org.springframework.boot:spring-boot-starter-data-jpa")
|
||||||
|
implementation("org.jetbrains.kotlin:kotlin-noarg:2.2.21")
|
||||||
|
implementation("org.postgresql:postgresql:42.7.8")
|
||||||
|
}
|
||||||
15
imagora-infrastructure/docker/docker-compose.yaml
Normal file
15
imagora-infrastructure/docker/docker-compose.yaml
Normal file
@@ -0,0 +1,15 @@
|
|||||||
|
services:
|
||||||
|
imagora_database:
|
||||||
|
image: postgres:17
|
||||||
|
container_name: imagora_database
|
||||||
|
environment:
|
||||||
|
POSTGRES_USER: imagora_admin
|
||||||
|
POSTGRES_PASSWORD: P@ssword!
|
||||||
|
POSTGRES_DB: imagora_database
|
||||||
|
ports:
|
||||||
|
- "11979:5432"
|
||||||
|
volumes:
|
||||||
|
- "./postgres_data:/var/lib/postgresql/data"
|
||||||
|
|
||||||
|
volumes:
|
||||||
|
postgres_data:
|
||||||
10
imagora-infrastructure/sql/000_database_initialisation.sql
Normal file
10
imagora-infrastructure/sql/000_database_initialisation.sql
Normal file
@@ -0,0 +1,10 @@
|
|||||||
|
CREATE EXTENSION IF NOT EXISTS "uuid-ossp";
|
||||||
|
|
||||||
|
CREATE USER imagora_user
|
||||||
|
WITH PASSWORD 'P@ssword!'
|
||||||
|
NOCREATEDB;
|
||||||
|
|
||||||
|
GRANT SELECT, INSERT, UPDATE, DELETE
|
||||||
|
ON ALL TABLES
|
||||||
|
IN SCHEMA public
|
||||||
|
TO imagora_user;
|
||||||
16
imagora-infrastructure/sql/001_tables_creation.sql
Normal file
16
imagora-infrastructure/sql/001_tables_creation.sql
Normal file
@@ -0,0 +1,16 @@
|
|||||||
|
CREATE TABLE IF NOT EXISTS "user" (
|
||||||
|
id UUID NOT NULL,
|
||||||
|
pseudo VARCHAR(256) NOT NULL,
|
||||||
|
email VARCHAR(256) NOT NULL,
|
||||||
|
encrypted_password VARCHAR(512) NOT NULL,
|
||||||
|
CONSTRAINT user_pk PRIMARY KEY (id)
|
||||||
|
);
|
||||||
|
|
||||||
|
CREATE TABLE IF NOT EXISTS user_roles (
|
||||||
|
user_id UUID NOT NULL,
|
||||||
|
role SMALLINT NOT NULL,
|
||||||
|
CONSTRAINT user_roles_pk PRIMARY KEY (user_id, role),
|
||||||
|
CONSTRAINT user_roles_user_id_fk FOREIGN KEY (user_id) REFERENCES "user" (id)
|
||||||
|
);
|
||||||
|
CREATE INDEX IF NOT EXISTS user_roles_user_id_idx ON user_roles (user_id);
|
||||||
|
|
||||||
@@ -0,0 +1,10 @@
|
|||||||
|
package org.takiguchi.imagora.infrastructure.core.configuration
|
||||||
|
|
||||||
|
import org.springframework.boot.autoconfigure.domain.EntityScan
|
||||||
|
import org.springframework.context.annotation.Configuration
|
||||||
|
import org.springframework.data.jpa.repository.config.EnableJpaRepositories
|
||||||
|
|
||||||
|
@Configuration
|
||||||
|
@EnableJpaRepositories("org.takiguchi.imagora.infrastructure")
|
||||||
|
@EntityScan("org.takiguchi.imagora.infrastructure")
|
||||||
|
open class JpaConfiguration
|
||||||
@@ -0,0 +1,65 @@
|
|||||||
|
package org.takiguchi.imagora.infrastructure.user
|
||||||
|
|
||||||
|
import com.github.michaelbull.result.Result
|
||||||
|
import com.github.michaelbull.result.mapError
|
||||||
|
import com.github.michaelbull.result.runCatching
|
||||||
|
import org.springframework.stereotype.Component
|
||||||
|
import org.takiguchi.imagora.domain.core.error.TechnicalError
|
||||||
|
import org.takiguchi.imagora.domain.user.model.User
|
||||||
|
import org.takiguchi.imagora.domain.user.outputport.UserOutputPort
|
||||||
|
import org.takiguchi.imagora.infrastructure.user.model.UserEntity
|
||||||
|
import org.takiguchi.imagora.infrastructure.user.repository.UserJpaRepository
|
||||||
|
import java.util.*
|
||||||
|
|
||||||
|
@Component
|
||||||
|
class UserJpaAdapter(
|
||||||
|
private val userJpaRepository: UserJpaRepository
|
||||||
|
) : UserOutputPort {
|
||||||
|
override fun getAll(): Result<List<User>, TechnicalError> = runCatching {
|
||||||
|
userJpaRepository.findAll()
|
||||||
|
.map(UserEntity::toDomain)
|
||||||
|
}.mapError { throwable ->
|
||||||
|
TechnicalError(throwable.message ?: "Unknown error while retrieving all users.")
|
||||||
|
}
|
||||||
|
|
||||||
|
override fun getById(userId: UUID): Result<User?, TechnicalError> = runCatching {
|
||||||
|
userJpaRepository.findById(userId)
|
||||||
|
.map(UserEntity::toDomain)
|
||||||
|
.orElse(null)
|
||||||
|
}.mapError { throwable ->
|
||||||
|
TechnicalError(throwable.message ?: "Unknown error while retrieving user by its id.")
|
||||||
|
}
|
||||||
|
|
||||||
|
override fun save(user: User): Result<Unit, TechnicalError> = runCatching {
|
||||||
|
UserEntity(user).also(userJpaRepository::save)
|
||||||
|
|
||||||
|
Unit
|
||||||
|
}.mapError { throwable ->
|
||||||
|
TechnicalError(throwable.message ?: "Unknown error while saving user.")
|
||||||
|
}
|
||||||
|
|
||||||
|
override fun deleteById(user: User): Result<Unit, TechnicalError> = runCatching {
|
||||||
|
userJpaRepository.deleteById(user.id)
|
||||||
|
}.mapError { throwable ->
|
||||||
|
TechnicalError(throwable.message ?: "Unknown error while deleting user.")
|
||||||
|
}
|
||||||
|
|
||||||
|
override fun existsByEmail(email: String): Result<Boolean, TechnicalError> = runCatching {
|
||||||
|
userJpaRepository.existsByEmail(email)
|
||||||
|
}.mapError { throwable ->
|
||||||
|
TechnicalError(throwable.message ?: "Unknown error while checking user existence by its email.")
|
||||||
|
}
|
||||||
|
|
||||||
|
override fun existsByPseudo(pseudo: String): Result<Boolean, TechnicalError> = runCatching {
|
||||||
|
userJpaRepository.existsByEmail(pseudo)
|
||||||
|
}.mapError { throwable ->
|
||||||
|
TechnicalError(throwable.message ?: "Unknown error while checking user existence by its pseudo.")
|
||||||
|
}
|
||||||
|
|
||||||
|
override fun getByPseudoOrEmail(pseudoOrEmail: String): Result<User?, TechnicalError> = runCatching {
|
||||||
|
userJpaRepository.getByPseudoOrEmail(pseudoOrEmail)
|
||||||
|
?.toDomain()
|
||||||
|
}.mapError { throwable ->
|
||||||
|
TechnicalError(throwable.message ?: "Unknown error while retrieving user by its pseudo or email.")
|
||||||
|
}
|
||||||
|
}
|
||||||
@@ -0,0 +1,42 @@
|
|||||||
|
package org.takiguchi.imagora.infrastructure.user.model
|
||||||
|
|
||||||
|
import jakarta.persistence.*
|
||||||
|
import org.takiguchi.imagora.domain.user.model.User
|
||||||
|
import org.takiguchi.imagora.domain.user.model.UserRole
|
||||||
|
import java.util.*
|
||||||
|
|
||||||
|
@Entity
|
||||||
|
@Table(name = "`user`")
|
||||||
|
data class UserEntity(
|
||||||
|
@Id
|
||||||
|
val id: UUID,
|
||||||
|
@Column(nullable = false)
|
||||||
|
val pseudo: String,
|
||||||
|
@Column(nullable = false)
|
||||||
|
val email: String,
|
||||||
|
@Column(nullable = false)
|
||||||
|
val encryptedPassword: String,
|
||||||
|
@ElementCollection(targetClass = UserRole::class)
|
||||||
|
@CollectionTable(
|
||||||
|
name = "user_roles",
|
||||||
|
joinColumns = [JoinColumn(name = "user_id")]
|
||||||
|
)
|
||||||
|
@Column(name = "role")
|
||||||
|
val roles: List<UserRole>
|
||||||
|
) {
|
||||||
|
constructor(user: User) : this (
|
||||||
|
id = user.id,
|
||||||
|
pseudo = user.pseudo,
|
||||||
|
email = user.email,
|
||||||
|
encryptedPassword = user.encryptedPassword,
|
||||||
|
roles = user.roles,
|
||||||
|
)
|
||||||
|
|
||||||
|
fun toDomain() = User(
|
||||||
|
id = id,
|
||||||
|
pseudo = pseudo,
|
||||||
|
email = email,
|
||||||
|
encryptedPassword = encryptedPassword,
|
||||||
|
roles = roles
|
||||||
|
)
|
||||||
|
}
|
||||||
@@ -0,0 +1,22 @@
|
|||||||
|
package org.takiguchi.imagora.infrastructure.user.repository
|
||||||
|
|
||||||
|
import org.springframework.data.jpa.repository.JpaRepository
|
||||||
|
import org.springframework.data.jpa.repository.Query
|
||||||
|
import org.springframework.data.repository.query.Param
|
||||||
|
import org.springframework.stereotype.Repository
|
||||||
|
import org.takiguchi.imagora.infrastructure.user.model.UserEntity
|
||||||
|
import java.util.*
|
||||||
|
|
||||||
|
@Repository
|
||||||
|
interface UserJpaRepository : JpaRepository<UserEntity, UUID> {
|
||||||
|
fun existsByEmail(email: String): Boolean
|
||||||
|
|
||||||
|
@Query("SELECT u FROM UserEntity u JOIN FETCH u.roles WHERE u.pseudo = :pseudoOrEmail OR u.email = :pseudoOrEmail")
|
||||||
|
fun getByPseudoOrEmail(@Param("pseudoOrEmail") pseudoOrEmail: String): UserEntity?
|
||||||
|
|
||||||
|
@Query("SELECT u FROM UserEntity u JOIN FETCH u.roles")
|
||||||
|
override fun findAll(): List<UserEntity>
|
||||||
|
|
||||||
|
@Query("SELECT u FROM UserEntity u JOIN FETCH u.roles WHERE u.id = :userId")
|
||||||
|
override fun findById(@Param("userId") userId: UUID): Optional<UserEntity>
|
||||||
|
}
|
||||||
20
imagora-launcher/build.gradle.kts
Normal file
20
imagora-launcher/build.gradle.kts
Normal file
@@ -0,0 +1,20 @@
|
|||||||
|
plugins {
|
||||||
|
kotlin("jvm")
|
||||||
|
id("org.springframework.boot") version "3.5.7"
|
||||||
|
id("io.spring.dependency-management") version "1.1.7"
|
||||||
|
}
|
||||||
|
|
||||||
|
dependencies {
|
||||||
|
implementation(kotlin("stdlib"))
|
||||||
|
implementation(kotlin("reflect"))
|
||||||
|
implementation(project(":imagora-domain"))
|
||||||
|
implementation(project(":imagora-application"))
|
||||||
|
implementation(project(":imagora-infrastructure"))
|
||||||
|
implementation(project(":imagora-exposition"))
|
||||||
|
implementation("org.springframework.boot:spring-boot-starter-web")
|
||||||
|
implementation("org.springframework.boot:spring-boot-devtools")
|
||||||
|
}
|
||||||
|
|
||||||
|
springBoot {
|
||||||
|
mainClass = "org.takiguchi.imagora.launcher.ApplicationLauncherKt"
|
||||||
|
}
|
||||||
@@ -0,0 +1,22 @@
|
|||||||
|
package org.takiguchi.imagora.launcher
|
||||||
|
|
||||||
|
import org.springframework.boot.autoconfigure.SpringBootApplication
|
||||||
|
import org.springframework.boot.autoconfigure.security.servlet.SecurityAutoConfiguration
|
||||||
|
import org.springframework.boot.runApplication
|
||||||
|
|
||||||
|
@SpringBootApplication(
|
||||||
|
scanBasePackages = [
|
||||||
|
"org.takiguchi.imagora.domain",
|
||||||
|
"org.takiguchi.imagora.application",
|
||||||
|
"org.takiguchi.imagora.infrastructure",
|
||||||
|
"org.takiguchi.imagora.exposition"
|
||||||
|
],
|
||||||
|
exclude = [
|
||||||
|
SecurityAutoConfiguration::class
|
||||||
|
]
|
||||||
|
)
|
||||||
|
open class ImagoraApplication
|
||||||
|
|
||||||
|
fun main(args: Array<String>) {
|
||||||
|
runApplication<ImagoraApplication>(*args)
|
||||||
|
}
|
||||||
25
imagora-launcher/src/main/resources/application-local.yaml
Normal file
25
imagora-launcher/src/main/resources/application-local.yaml
Normal file
@@ -0,0 +1,25 @@
|
|||||||
|
application:
|
||||||
|
security:
|
||||||
|
jwt:
|
||||||
|
secret-key: secret
|
||||||
|
expiration-delay-in-minutes: 5
|
||||||
|
password:
|
||||||
|
salt: s@lT
|
||||||
|
|
||||||
|
server:
|
||||||
|
error:
|
||||||
|
whitelabel:
|
||||||
|
enabled: false # Disable html error responses.
|
||||||
|
include-stacktrace: never
|
||||||
|
http2:
|
||||||
|
enabled: true
|
||||||
|
|
||||||
|
spring:
|
||||||
|
datasource:
|
||||||
|
url: jdbc:postgresql://localhost:11979/imagora_database
|
||||||
|
username: imagora_user
|
||||||
|
password: P@ssword!
|
||||||
|
driver-class-name: org.postgresql.Driver
|
||||||
|
jpa:
|
||||||
|
show-sql: false
|
||||||
|
open-in-view: false
|
||||||
21
imagora-launcher/src/main/resources/application.yaml
Normal file
21
imagora-launcher/src/main/resources/application.yaml
Normal file
@@ -0,0 +1,21 @@
|
|||||||
|
application:
|
||||||
|
security:
|
||||||
|
jwt:
|
||||||
|
secret-key: <JWT-SECRET-KEY>
|
||||||
|
expiration-delay-in-minutes: <JWT-EXPIRATION-DELAY-IN-MINUTES>
|
||||||
|
password:
|
||||||
|
salt: <PASSWORD-SALT>
|
||||||
|
|
||||||
|
server:
|
||||||
|
error:
|
||||||
|
include-stacktrace: never
|
||||||
|
|
||||||
|
spring:
|
||||||
|
datasource:
|
||||||
|
url: jdbc:postgresql://<URL>:<PORT>/<DATABASE_NAME>
|
||||||
|
username: <USERNAME>
|
||||||
|
password: <PASSWORD>
|
||||||
|
driver-class-name: org.postgresql.Driver
|
||||||
|
threads:
|
||||||
|
virtual:
|
||||||
|
enabled: true
|
||||||
25
rest-client-collection/Imagora/Users/Login as Admin.bru
Normal file
25
rest-client-collection/Imagora/Users/Login as Admin.bru
Normal file
@@ -0,0 +1,25 @@
|
|||||||
|
meta {
|
||||||
|
name: Login as Admin
|
||||||
|
type: http
|
||||||
|
seq: 4
|
||||||
|
}
|
||||||
|
|
||||||
|
post {
|
||||||
|
url: {{url}}/api/users/login
|
||||||
|
body: json
|
||||||
|
auth: inherit
|
||||||
|
}
|
||||||
|
|
||||||
|
body:json {
|
||||||
|
{
|
||||||
|
"username": "Admin",
|
||||||
|
"password": "P@ssword!"
|
||||||
|
}
|
||||||
|
}
|
||||||
|
|
||||||
|
script:post-response {
|
||||||
|
if (res.status === 200) {
|
||||||
|
bru.setEnvVar('userId', res.body.refreshToken.userId);
|
||||||
|
bru.setEnvVar('jwt', res.body.accessToken);
|
||||||
|
}
|
||||||
|
}
|
||||||
25
rest-client-collection/Imagora/Users/Login as Florian.bru
Normal file
25
rest-client-collection/Imagora/Users/Login as Florian.bru
Normal file
@@ -0,0 +1,25 @@
|
|||||||
|
meta {
|
||||||
|
name: Login as Florian
|
||||||
|
type: http
|
||||||
|
seq: 2
|
||||||
|
}
|
||||||
|
|
||||||
|
post {
|
||||||
|
url: {{url}}/api/users/login
|
||||||
|
body: json
|
||||||
|
auth: inherit
|
||||||
|
}
|
||||||
|
|
||||||
|
body:json {
|
||||||
|
{
|
||||||
|
"username": "Florian",
|
||||||
|
"password": "P@ssword!"
|
||||||
|
}
|
||||||
|
}
|
||||||
|
|
||||||
|
script:post-response {
|
||||||
|
if (res.status === 200) {
|
||||||
|
bru.setEnvVar('userId', res.body.refreshToken.userId);
|
||||||
|
bru.setEnvVar('jwt', res.body.accessToken);
|
||||||
|
}
|
||||||
|
}
|
||||||
25
rest-client-collection/Imagora/Users/Login as Thomas.bru
Normal file
25
rest-client-collection/Imagora/Users/Login as Thomas.bru
Normal file
@@ -0,0 +1,25 @@
|
|||||||
|
meta {
|
||||||
|
name: Login as Thomas
|
||||||
|
type: http
|
||||||
|
seq: 3
|
||||||
|
}
|
||||||
|
|
||||||
|
post {
|
||||||
|
url: {{url}}/api/users/login
|
||||||
|
body: json
|
||||||
|
auth: inherit
|
||||||
|
}
|
||||||
|
|
||||||
|
body:json {
|
||||||
|
{
|
||||||
|
"username": "Joux",
|
||||||
|
"password": "P@ssword!"
|
||||||
|
}
|
||||||
|
}
|
||||||
|
|
||||||
|
script:post-response {
|
||||||
|
if (res.status === 200) {
|
||||||
|
bru.setEnvVar('userId', res.body.refreshToken.userId);
|
||||||
|
bru.setEnvVar('jwt', res.body.accessToken);
|
||||||
|
}
|
||||||
|
}
|
||||||
26
rest-client-collection/Imagora/Users/Signup.bru
Normal file
26
rest-client-collection/Imagora/Users/Signup.bru
Normal file
@@ -0,0 +1,26 @@
|
|||||||
|
meta {
|
||||||
|
name: Signup
|
||||||
|
type: http
|
||||||
|
seq: 1
|
||||||
|
}
|
||||||
|
|
||||||
|
post {
|
||||||
|
url: {{url}}/api/users
|
||||||
|
body: json
|
||||||
|
auth: none
|
||||||
|
}
|
||||||
|
|
||||||
|
body:json {
|
||||||
|
{
|
||||||
|
"pseudo": "Admin",
|
||||||
|
"email": "admin@admin.com",
|
||||||
|
"password": "P@ssword!"
|
||||||
|
}
|
||||||
|
}
|
||||||
|
|
||||||
|
script:post-response {
|
||||||
|
if (res.status === 200) {
|
||||||
|
bru.setEnvVar('userId', res.body.refreshToken.userId);
|
||||||
|
bru.setEnvVar('jwt', res.body.accessToken);
|
||||||
|
}
|
||||||
|
}
|
||||||
4
rest-client-collection/Imagora/Users/folder.bru
Normal file
4
rest-client-collection/Imagora/Users/folder.bru
Normal file
@@ -0,0 +1,4 @@
|
|||||||
|
meta {
|
||||||
|
name: Users
|
||||||
|
seq: 6
|
||||||
|
}
|
||||||
9
rest-client-collection/Imagora/bruno.json
Normal file
9
rest-client-collection/Imagora/bruno.json
Normal file
@@ -0,0 +1,9 @@
|
|||||||
|
{
|
||||||
|
"version": "1",
|
||||||
|
"name": "Imagora",
|
||||||
|
"type": "collection",
|
||||||
|
"ignore": [
|
||||||
|
"node_modules",
|
||||||
|
".git"
|
||||||
|
]
|
||||||
|
}
|
||||||
@@ -0,0 +1,5 @@
|
|||||||
|
vars {
|
||||||
|
url: http://localhost:8080
|
||||||
|
jwt: eyJhbGciOiJIUzUxMiIsInR5cCI6IkpXVCJ9.eyJzdWIiOiI2N2VkZWUzYS00NmJiLTQ2OWItODRhZi0zNDA0Zjg0NDA1MTMiLCJleHAiOjE3NDY5NTYwMzMsInBzZXVkbyI6IkpvdXgiLCJlbWFpbCI6InRob21hcy5qb3V4QGdtYWlsLmNvbSIsInJvbGVzIjoiU1RBTkRBUkQifQ.O1I-yQeU09GXakktvBMY3QpSJS_PnLgIVFiMiqPQJOjaJ5z852R90rPHc76qKUBTuUqSmR-YFBGPNYa37e1xyg
|
||||||
|
userId: 67edee3a-46bb-469b-84af-3404f8440513
|
||||||
|
}
|
||||||
25
settings.gradle.kts
Normal file
25
settings.gradle.kts
Normal file
@@ -0,0 +1,25 @@
|
|||||||
|
// The settings file is the entry point of every Gradle build.
|
||||||
|
// Its primary purpose is to define the subprojects.
|
||||||
|
// It is also used for some aspects of project-wide configuration, like managing plugins, dependencies, etc.
|
||||||
|
// https://docs.gradle.org/current/userguide/settings_file_basics.html
|
||||||
|
|
||||||
|
dependencyResolutionManagement {
|
||||||
|
// Use Maven Central as the default repository (where Gradle will download dependencies) in all subprojects.
|
||||||
|
@Suppress("UnstableApiUsage")
|
||||||
|
repositories {
|
||||||
|
mavenCentral()
|
||||||
|
}
|
||||||
|
}
|
||||||
|
|
||||||
|
plugins {
|
||||||
|
// Use the Foojay Toolchains plugin to automatically download JDKs required by subprojects.
|
||||||
|
id("org.gradle.toolchains.foojay-resolver-convention") version "0.8.0"
|
||||||
|
}
|
||||||
|
|
||||||
|
include(":imagora-domain")
|
||||||
|
include(":imagora-application")
|
||||||
|
include(":imagora-exposition")
|
||||||
|
include(":imagora-infrastructure")
|
||||||
|
include(":imagora-launcher")
|
||||||
|
|
||||||
|
rootProject.name = "imagora"
|
||||||
Reference in New Issue
Block a user