private boolean isAuthenticated() { Authentication authentication = SecurityContextHolder.getContext().getAuthentication(); if (authentication == null || authentication instanceof AnonymousAuthenticationToken) { return false; } return true; }
private String getCurrentUsername() { Object principal = SecurityContextHolder.getContext().getAuthentication().getPrincipal(); if (principal instanceof UserDetails) { return ((UserDetails) principal).getUsername(); } if (principal instanceof Principal) { return ((Principal) principal).getName(); } return String.valueOf(principal); }
private String getUserName() { String username = SecurityContextHolder.getContext().getAuthentication().getName(); if (StringUtils.isEmpty(username)) { username = ""; } return username; }
@Override public AdminUser getPersistentAdminUser() { SecurityContext ctx = SecurityContextHolder.getContext(); if (ctx != null) { Authentication auth = ctx.getAuthentication(); if (auth != null && !auth.getName().equals(ANONYMOUS_USER_NAME)) { UserDetails temp = (UserDetails) auth.getPrincipal(); return securityService.readAdminUserByUserName(temp.getUsername()); } } return null; }
public String getUsername() { SecurityContext context = SecurityContextHolder.getContext(); Authentication authentication = context.getAuthentication(); if (authentication == null) return null; Object principal = authentication.getPrincipal(); if (principal instanceof UserDetails) { return ((UserDetails) principal).getUsername(); } else { return principal.toString(); } } public User getCurrentUser() { if (overridenCurrentUser != null) { return overridenCurrentUser; } User user = userRepository.findByUsername(getUsername()); if (user == null) return user; }
/** * Tries to determine the principal's name from the given Session. * * @param session the session * @return the principal's name, or empty String if it couldn't be determined */ private static String resolvePrincipal(Session session) { String principalName = session .getAttribute(FindByIndexNameSessionRepository.PRINCIPAL_NAME_INDEX_NAME); if (principalName != null) { return principalName; } SecurityContext securityContext = session .getAttribute(SPRING_SECURITY_CONTEXT); if (securityContext != null && securityContext.getAuthentication() != null) { return securityContext.getAuthentication().getName(); } return ""; }
String getCurrentUserName() { return SecurityContextHolder.getContext().getAuthentication().getName(); }
@Override public UmsMember getCurrentMember() { SecurityContext ctx = SecurityContextHolder.getContext(); Authentication auth = ctx.getAuthentication(); MemberDetails memberDetails = (MemberDetails) auth.getPrincipal(); return memberDetails.getUmsMember(); }
private Authentication getAuthentication() { if (this.authentication != null) { return this.authentication; } SecurityContext context = SecurityContextHolder.getContext(); return context.getAuthentication(); } }
protected AdminUser getPersistentAdminUser() { SecurityContext ctx = SecurityContextHolder.getContext(); if (ctx != null) { Authentication auth = ctx.getAuthentication(); if (auth != null && !auth.getName().equals(ANONYMOUS_USER_NAME)) { UserDetails temp = (UserDetails) auth.getPrincipal(); return adminSecurityService.readAdminUserByUserName(temp.getUsername()); } } return null; }
@Test public void securityContextDeserializeTest() throws IOException { SecurityContext context = mapper.readValue(SECURITY_CONTEXT_JSON, SecurityContextImpl.class); assertThat(context).isNotNull(); assertThat(context.getAuthentication()).isNotNull().isInstanceOf(UsernamePasswordAuthenticationToken.class); assertThat(context.getAuthentication().getPrincipal()).isEqualTo("admin"); assertThat(context.getAuthentication().getCredentials()).isEqualTo("1234"); assertThat(context.getAuthentication().isAuthenticated()).isTrue(); Collection authorities = context.getAuthentication().getAuthorities(); assertThat(authorities).hasSize(1); assertThat(authorities).contains(new SimpleGrantedAuthority("ROLE_USER")); } }
@Override public String getUserName() { Authentication a = SecurityContextHolder.getContext().getAuthentication(); return a == null ? null : a.getName(); }
@RequestMapping(value="/changePassword", method=RequestMethod.GET) public String changePassword(HttpServletRequest request, HttpServletResponse response, Model model) { SecurityContext c = SecurityContextHolder.getContext(); model.addAttribute("username", ((AdminUserDetails) c.getAuthentication().getPrincipal()).getUsername()); return "login/changePasswordPopup"; }
private void populateDefaultAuthentication(Map<String, Object> attrs) { if (attrs.containsKey(AUTHENTICATION_ATTR_NAME)) { return; } Authentication authentication = SecurityContextHolder.getContext().getAuthentication(); attrs.putIfAbsent(AUTHENTICATION_ATTR_NAME, authentication); }
protected AdminUser getPersistentAdminUser() { SecurityContext ctx = SecurityContextHolder.getContext(); if (ctx != null) { Authentication auth = ctx.getAuthentication(); if (auth != null && !auth.getName().equals(ANONYMOUS_USER_NAME)) { UserDetails temp = (UserDetails) auth.getPrincipal(); return securityService.readAdminUserByUserName(temp.getUsername()); } } return null; }
@RequestMapping(value = "/query/{queryId}/stop", method = RequestMethod.PUT) @ResponseBody public void stopQuery(@PathVariable String queryId) { final String user = SecurityContextHolder.getContext().getAuthentication().getName(); logger.info("{} tries to stop the query: {}, but not guaranteed to succeed.", user, queryId); QueryContextFacade.stopQuery(queryId, "stopped by " + user); }
@RequestMapping(value = "/change_email", method = RequestMethod.GET) public String changeEmailPage(Model model, @RequestParam(value = "client_id", required = false) String clientId, @RequestParam(value = "redirect_uri", required = false) String redirectUri) { SecurityContext securityContext = SecurityContextHolder.getContext(); model.addAttribute("email", ((UaaPrincipal)securityContext.getAuthentication().getPrincipal()).getEmail()); model.addAttribute("client_id", clientId); model.addAttribute("redirect_uri", redirectUri); return "change_email"; }
@Override public Set<GrantedAuthority> getAuthorities() { Authentication authentication = SecurityContextHolder.getContext().getAuthentication(); if (authentication == null) { return Collections.emptySet(); } return Collections.unmodifiableSet(new HashSet<GrantedAuthority>(authentication.getAuthorities())); }
protected AdminUser getPersistentAdminUser() { SecurityContext ctx = SecurityContextHolder.getContext(); if (ctx != null) { Authentication auth = ctx.getAuthentication(); if (auth != null && !auth.getName().equals(ANONYMOUS_USER_NAME)) { UserDetails temp = (UserDetails) auth.getPrincipal(); return securityService.readAdminUserByUserName(temp.getUsername()); } } return null; }
@RequestMapping(value = "/saved_queries/{id}", method = RequestMethod.DELETE, produces = { "application/json" }) @ResponseBody public void removeQuery(@PathVariable String id) throws IOException { String creator = SecurityContextHolder.getContext().getAuthentication().getName(); queryService.removeQuery(creator, id); }