AdventureTube Backend Server
The AdventureTube backend server is a core component of the project, supporting the iOS app by enabling users to place YouTube stories on a map. It functions primarily as a Content Management System (CMS) and partially as a Customer Relationship Management (CRM) system, processing user-generated content and storing it in two databases:
- RDBMS (PostgreSQL 15.2): Stores structured data such as user details and content metadata.
- MongoDB 6.0: Handles mapping user content and enabling location-based interactions.
The backend ensures secure storage, access control, and authentication using:
- Spring Boot 3.2 – Provides a modular and scalable microservices architecture.
- Spring Security 6.2 – Manages authentication, authorization, and access control.
- JWT (JSON Web Token) with RSA Encryption – Enables secure, stateless user authentication.
Using JWT for Stateless Authentication
The AdventureTube iOS application uses Google Sign-In to obtain an ID token from Google. This ID token securely represents the user’s identity, allowing it to be passed to the backend server for verification.
* Access Google API from your app backend. will allow AdventureTube Backend server can make Google API calls on behalf of users while
user is offline and refresh token if access token expires.
Authentication Process in Spring Boot Backend
- Receive the Google ID token from the client
- Get OAuth server client ID
- The app needs to pass the identity of signed-in users to the backend server using an ID token and retrieve the OAuth server client ID.
- Verify the Google ID token
- Ensure its authenticity using Google’s public keys.
- Generate your own JWT after successful verification
- Create a JWT token with user details and roles.
- Use the JWT for subsequent API requests
- Attach the JWT in the Authorization header for secure communication with other services.
Role and Responsibility: Gateway Service vs. Auth-Service Module
In the AdventureTube microservices architecture, the Gateway Service and the Auth-Service module work together to manage authentication and authorization efficiently.
Gateway Service (Spring Cloud Gateway)
- Serves as the central entry point for all incoming requests to microservices.
- Intercepts HTTP requests and enforces authentication and authorization policies.
- Validates the presence of a JWT token before forwarding requests to other services.
- Routes requests to the appropriate microservice after security checks.
Auth-Service Module (AdventureTube Microservices)
- Handles user authentication using Google OAuth2.
- Verifies the Google ID token and generates an AdventureTube JWT token.
- Manages user roles and permissions within the system.
- Issues access and refresh tokens for secure and continuous authentication.
- Provides an endpoint for user role validation, used by the Gateway Service for role-based access control.
How They Work Together
- The Gateway Service intercepts all API requests and checks for a valid JWT token.
- If the token is missing or invalid, the request is rejected, and an authentication error is returned unless request url is public.
- If the token is valid, the Gateway forwards the request to the appropriate microservice.
- If additional role validation is required, the Gateway may call the Auth-Service to verify permissions before proceeding.
- The Auth-Service manages token renewal (refresh tokens) and updates user roles dynamically.
By centralizing security at the Gateway Service, the system ensures a unified security model, while the Auth-Service focuses on authentication, role management, and token issuance. This separation of responsibilities ensures scalability, flexibility, and maintainability across AdventureTube’s microservices architecture.
By leveraging these technologies, the system ensures that only authorized users can manage and interact with their content while maintaining a seamless and secure experience across the AdventureTube platform.
Spring Security for Authentication
Spring Security provides a robust authentication mechanism for securing applications. The authentication flow in AdventureTube’s auth-service module consists of several key components:
1. CustomUserDetailService (loadUserByUsername
method)
Retrieves user details from the Member-Service via a REST API call.
Converts the fetched user data into a Spring Security
UserDetails
object.Ensures the user exists and has valid credentials before authentication.
Throws:
UserNotFoundException
if the user is not found.BadCredentialsException
if credentials are incomplete or incorrect.
2. CustomAuthenticationManager (authenticationManager.authenticate
)
Authenticates users based on email and password.
Uses
UserDetailsService
(CustomUserDetailService
) to fetch user details.Compares the hashed password stored in the database with the provided password.
If the credentials match, authentication succeeds; otherwise, authentication fails with a
BadCredentialsException
.
3. Security Filter Chain (apiFilterChain
)
Configures authentication rules for
auth-service
endpoints:Allows public access to
/auth/register
,/auth/login
,/auth/refreshToken
,/auth/logout
.Requires ADMIN role for other endpoints.
Adds
JwtAuthFilter
beforeUsernamePasswordAuthenticationFilter
to:Extract and validate JWT tokens from incoming requests.
Authenticate users based on the extracted JWT claims.
4. JWT Handling in JwtAuthFilter
Extracts the JWT token from the request.
Validates the token and sets authentication in
SecurityContextHolder
.Ensures subsequent requests are processed with the correct authentication context.
5. Custom Authentication Provider (Optional)
Instead of relying solely on
UserDetailsService
, aCustomAuthenticationProvider
can be implemented to:Customize authentication logic beyond default user validation.
Handling Token Expiration: Client-Side Errors vs. Server-Side Token Renewal
When designing the refresh token process, one key decision is whether to return an error to the client when an access token expires or to renew the token immediately from the server. Below is a comparison of both approaches:
Returning Error to Client-Side
The server returns an error (e.g., HTTP 401 Unauthorized) when the access token expires.
The client then initiates a token renewal process using the refresh token.
This method provides explicit control and awareness to the client, allowing it to manage token renewal.
Immediate Token Renewal from Server-Side
The server automatically renews the access token upon detecting expiration, without returning an error.
This hides token expiration complexities from the client, offering a seamless user experience.
Clients are expected to always send both access and refresh tokens, ensuring continuous access.
Choosing the right approach depends on the specific needs of the system and the balance between client control and seamless authentication.
Exception Handling in AdventureTube Project
Dual Goals of Exception Handling in REST APIs
Exception handling in the AdventureTube microservices project serves two critical goals:
Managing System Exceptions
- Handle backend failures similar to traditional Java applications.
- Ensure robust logging and debugging mechanisms.
Providing Actionable Error Messages to API Consumers
- Communicate meaningful, structured error messages.
- Ensure errors are not just informational but also actionable, helping clients (such as the iOS app) resolve issues effectively.
Exception Handling Across Different Layers
Each backend layer has specific responsibilities when handling exceptions.
1. Repository Layer (Data Access Layer)
- Handles database-specific exceptions such as constraint violations and query errors.
- Wraps exceptions in domain-specific errors to provide meaningful context.
- Logs errors to ensure visibility for auditing and debugging.
2. Service Layer (Business Logic Layer)
- Catches repository-layer exceptions and provides contextual information for better traceability.
- Wraps exceptions in service-specific errors when necessary.
- Logs errors to monitor business logic failures and unexpected conditions.
3. Controller Layer (REST API Layer)
- Handles exceptions thrown from the service layer and ensures they are converted into HTTP responses.
- Uses centralized exception handling mechanisms for consistent error formatting.
- Logs exceptions for API monitoring and analysis.
Avoiding RuntimeExceptions in the Controller Layer
- Directly throwing unchecked runtime exceptions in the controller layer should be avoided.
- Instead, structured exception handling and centralized error management should be used.
- The primary role of the Controller Layer is to:
- Deliver accurate and actionable error messages.
- Ensure error responses are consistently formatted and meaningful.
Standard API Error Response Format
A consistent error response format ensures that API consumers (such as the iOS app) can handle errors predictably.
Field | Description |
---|---|
timestamp | Time when the error occurred |
status | HTTP status code (e.g., 400 , 404 , 500 ) |
error | General error category |
message | Human-readable error message |
path | API endpoint where the error occurred |
error_code | Unique error code for iOS error handling |
References
For further development and implementation of Spring Security with Gateway, refer to the following resources: