-
Notifications
You must be signed in to change notification settings - Fork 0
Expand file tree
/
Copy pathSecurityConfig.java
More file actions
74 lines (69 loc) · 3.83 KB
/
SecurityConfig.java
File metadata and controls
74 lines (69 loc) · 3.83 KB
1
2
3
4
5
6
7
8
9
10
11
12
13
14
15
16
17
18
19
20
21
22
23
24
25
26
27
28
29
30
31
32
33
34
35
36
37
38
39
40
41
42
43
44
45
46
47
48
49
50
51
52
53
54
55
56
57
58
59
60
61
62
63
64
65
66
67
68
69
70
71
72
73
74
package net.hackyourfuture.coursehub;
import net.hackyourfuture.coursehub.security.ApiKeyAuthenticationFilter;
import net.hackyourfuture.coursehub.service.UserAuthenticationService;
import org.springframework.context.annotation.Bean;
import org.springframework.context.annotation.Configuration;
import org.springframework.http.HttpMethod;
import org.springframework.security.authentication.AuthenticationManager;
import org.springframework.security.config.annotation.authentication.configuration.AuthenticationConfiguration;
import org.springframework.security.config.annotation.web.builders.HttpSecurity;
import org.springframework.security.config.annotation.web.configuration.EnableWebSecurity;
import org.springframework.security.config.annotation.web.configurers.AbstractHttpConfigurer;
import org.springframework.security.crypto.bcrypt.BCryptPasswordEncoder;
import org.springframework.security.crypto.password.PasswordEncoder;
import org.springframework.security.web.SecurityFilterChain;
import org.springframework.security.web.authentication.UsernamePasswordAuthenticationFilter;
import org.springframework.web.cors.CorsConfiguration;
@Configuration
@EnableWebSecurity
public class SecurityConfig {
@Bean
public SecurityFilterChain filterChain(HttpSecurity http, UserAuthenticationService userAuthenticationService) throws Exception {
return http.csrf(AbstractHttpConfigurer::disable)
.cors(cors -> cors.configurationSource(request -> {
var config = new CorsConfiguration();
config.addAllowedOriginPattern("http://localhost");
config.addAllowedOriginPattern("http://localhost:*");
config.addAllowedOriginPattern("https://coursehub.hyf.dev");
config.addAllowedHeader("*");
config.addAllowedMethod("*");
config.setAllowCredentials(true);
return config;
}))
// Disable the default logout endpoint as we implemented our own
.logout(AbstractHttpConfigurer::disable)
// Disable the default login (form) endpoint as we implemented our own
.formLogin(AbstractHttpConfigurer::disable)
.authorizeHttpRequests(auth -> auth
// allow CORS pre-flight requests to any endpoint
.requestMatchers(HttpMethod.OPTIONS, "/**")
.permitAll()
// this is an internal mapping to display errors
// allowing it without authentication so that errors are displayed correctly
.requestMatchers("/error")
.permitAll()
.requestMatchers(HttpMethod.POST, "/login", "/logout", "/register")
.permitAll()
.requestMatchers(HttpMethod.GET, "/courses", "/swagger-ui/**", "/v3/api-docs/**")
.permitAll()
.requestMatchers("/students/**")
.hasRole("student")
.anyRequest()
.authenticated())
.addFilterBefore(apiKeyAuthenticationFilter(userAuthenticationService), UsernamePasswordAuthenticationFilter.class)
.build();
}
@Bean
public PasswordEncoder passwordEncoder() {
return new BCryptPasswordEncoder();
}
@Bean
public AuthenticationManager authenticationManager(AuthenticationConfiguration authenticationConfiguration)
throws Exception {
return authenticationConfiguration.getAuthenticationManager();
}
@Bean
public ApiKeyAuthenticationFilter apiKeyAuthenticationFilter(UserAuthenticationService userAuthenticationService) {
return new ApiKeyAuthenticationFilter(userAuthenticationService);
}
}