# webFluxTemplate
**Repository Path**: fenyun689/webFluxTemplate
## Basic Information
- **Project Name**: webFluxTemplate
- **Description**: Spring5 Webflux MongoDB JWT
- **Primary Language**: Unknown
- **License**: MIT
- **Default Branch**: master
- **Homepage**: None
- **GVP Project**: No
## Statistics
- **Stars**: 0
- **Forks**: 0
- **Created**: 2018-07-06
- **Last Updated**: 2020-12-20
## Categories & Tags
**Categories**: Uncategorized
**Tags**: None
## README
# Spring 5 Webflux Template
This code can be used to build the next generation of applications using micro-services, reactive programing, webs-sockets, rest, mongoDB, JWT (JSON Web Tokens) and Netty.
## What is this again?
This is a complete template example for Spring 5 Webflux.
The application shows how to use Spring 5 Webflux with Spring Security, web-sockets, @RestContorler, @Controller, Reactive MongoDB, and JWT.
Spring 5 is still new. There are very few examples of how to use Spring Security with the Webflux stack.
Reactive Oauth2 support is not ready yet. This application roles it's own Oauth2 like api with JWT tokens.
This app has integrated web-sockets and rest services into the Reactive Spring Security implementation.
#### MongoDB
MongoDB is used for this example, so you'll need this up and running on your local machine, if you are on OSX, you can easily install
MongoDB using Homebrew.
The MongoDB config is defined in application.yml.
## Running locally
```
git clone https://github.com/TransEmpiric/webFluxTemplate.git
cd webFluxTemplate
./gradlew bootRun
```
If everything goes well you can go to the Secure Web-socket Example page [http://localhost:8443/test/ws](http://localhost:8443/test/ws)
#### Get a JWT for authentication
Endpoint:
http://localhost:8443/auth/token
Method:
POST:
Request headers:
```
content-type: application/json
```
Body:
```
{"username" : "jdev", "password":"jdev"}
```
Response:
```
{
"token": "eyJhbGciOiJIUzUxMiJ9.eyJzdWIiOiJqZGV2IiwiYXVkIjoidW5rbm93biIsImV4cCI6MjEyMTcwNzgyMiwiaWF0IjoxNTE2OTA3ODIyfQ.TVwbWsz-BDfMQmgUDnB_GloXklEdS_ABMiF9iGzHrBNA1f4yOQb3day7vcFLNxcLefkQjZDlVlpU91AtkzQqLg",
"username": "jdev"
}
```
#### Use JWT on a secure rest endpoint
Endpoint:
http://localhost:8443/api/rest/user/list:
Method:
GET:
Request headers:
```
Content-Type: application/json
Authorization: Bearer eyJhbGciOiJIUzUxMiJ9.eyJzdWIiOiJqZGV2IiwiYXVkIjoidW5rbm93biIsImV4cCI6MjEyMTcwNzgyMiwiaWF0IjoxNTE2OTA3ODIyfQ.TVwbWsz-BDfMQmgUDnB_GloXklEdS_ABMiF9iGzHrBNA1f4yOQb3day7vcFLNxcLefkQjZDlVlpU91AtkzQqLg
```
Response:
```
[
{
"id":"5a6a2ef094bf49a0b8319a30",
"username":"jdev",
"firstname":"Joe",
"lastname":"Developer",
"email":"dev@transempiric.com",
"roles":[
"ROLE_ADMIN"
],
"enabled":true,
"lastPasswordResetDate":1516908272107,
"accountNonExpired":true,
"accountNonLocked":true,
"credentialsNonExpired":true,
"authorities":[
{
"authority":"ROLE_ADMIN"
}
]
}
]
```
#### Use JWT on a secure web-socket endpoint
Go to [http://localhost:8443/test/ws](http://localhost:8443/test/ws) in a browser.
JWT is hard coded in the JS within templates/websocket.ftl
You need to replace with a new token if the hard coded token has expired
```
```
#### Properties
```
Properties are in application.yml
You can set to HTTPS (test cert works) if you want, but make sure to update the call to web-socket endpoints with "wss://"
```
#### WILLDO
```
Verify password at auth end point with CustomPasswordEncoder
Make a UI for example token retrieval and a UI to use it
Finish Refresh Token code
Add React and/or Angular Front-end example to repo
```