You can not select more than 25 topics
Topics must start with a letter or number, can include dashes ('-') and can be up to 35 characters long.
173 lines
6.5 KiB
173 lines
6.5 KiB
/* |
|
* Copyright 2020-2022 the original author or authors. |
|
* |
|
* Licensed under the Apache License, Version 2.0 (the "License"); |
|
* you may not use this file except in compliance with the License. |
|
* You may obtain a copy of the License at |
|
* |
|
* https://www.apache.org/licenses/LICENSE-2.0 |
|
* |
|
* Unless required by applicable law or agreed to in writing, software |
|
* distributed under the License is distributed on an "AS IS" BASIS, |
|
* WITHOUT WARRANTIES OR CONDITIONS OF ANY KIND, either express or implied. |
|
* See the License for the specific language governing permissions and |
|
* limitations under the License. |
|
*/ |
|
package sample.gettingstarted; |
|
|
|
import java.security.KeyPair; |
|
import java.security.KeyPairGenerator; |
|
import java.security.interfaces.RSAPrivateKey; |
|
import java.security.interfaces.RSAPublicKey; |
|
import java.util.UUID; |
|
|
|
import com.nimbusds.jose.jwk.JWKSet; |
|
import com.nimbusds.jose.jwk.RSAKey; |
|
import com.nimbusds.jose.jwk.source.ImmutableJWKSet; |
|
import com.nimbusds.jose.jwk.source.JWKSource; |
|
import com.nimbusds.jose.proc.SecurityContext; |
|
|
|
import org.springframework.context.annotation.Bean; |
|
import org.springframework.context.annotation.Configuration; |
|
import org.springframework.core.annotation.Order; |
|
import org.springframework.http.MediaType; |
|
import org.springframework.security.config.Customizer; |
|
import org.springframework.security.config.annotation.web.builders.HttpSecurity; |
|
import org.springframework.security.config.annotation.web.configuration.EnableWebSecurity; |
|
import org.springframework.security.core.userdetails.User; |
|
import org.springframework.security.core.userdetails.UserDetails; |
|
import org.springframework.security.core.userdetails.UserDetailsService; |
|
import org.springframework.security.oauth2.core.AuthorizationGrantType; |
|
import org.springframework.security.oauth2.core.ClientAuthenticationMethod; |
|
import org.springframework.security.oauth2.core.oidc.OidcScopes; |
|
import org.springframework.security.oauth2.jwt.JwtDecoder; |
|
import org.springframework.security.oauth2.server.authorization.client.InMemoryRegisteredClientRepository; |
|
import org.springframework.security.oauth2.server.authorization.client.RegisteredClient; |
|
import org.springframework.security.oauth2.server.authorization.client.RegisteredClientRepository; |
|
import org.springframework.security.oauth2.server.authorization.config.annotation.web.configuration.OAuth2AuthorizationServerConfiguration; |
|
import org.springframework.security.oauth2.server.authorization.config.annotation.web.configurers.OAuth2AuthorizationServerConfigurer; |
|
import org.springframework.security.oauth2.server.authorization.settings.AuthorizationServerSettings; |
|
import org.springframework.security.oauth2.server.authorization.settings.ClientSettings; |
|
import org.springframework.security.provisioning.InMemoryUserDetailsManager; |
|
import org.springframework.security.web.SecurityFilterChain; |
|
import org.springframework.security.web.authentication.LoginUrlAuthenticationEntryPoint; |
|
import org.springframework.security.web.util.matcher.MediaTypeRequestMatcher; |
|
|
|
@Configuration |
|
@EnableWebSecurity |
|
public class SecurityConfig { |
|
|
|
@Bean // <1> |
|
@Order(1) |
|
public SecurityFilterChain authorizationServerSecurityFilterChain(HttpSecurity http) |
|
throws Exception { |
|
OAuth2AuthorizationServerConfiguration.applyDefaultSecurity(http); |
|
http.getConfigurer(OAuth2AuthorizationServerConfigurer.class) |
|
.oidc(Customizer.withDefaults()); // Enable OpenID Connect 1.0 |
|
// @formatter:off |
|
http |
|
// Redirect to the login page when not authenticated from the |
|
// authorization endpoint |
|
.exceptionHandling((exceptions) -> exceptions |
|
.defaultAuthenticationEntryPointFor( |
|
new LoginUrlAuthenticationEntryPoint("/login"), |
|
new MediaTypeRequestMatcher(MediaType.TEXT_HTML) |
|
) |
|
) |
|
// Accept access tokens for User Info and/or Client Registration |
|
.oauth2ResourceServer((resourceServer) -> resourceServer |
|
.jwt(Customizer.withDefaults())); |
|
// @formatter:on |
|
|
|
return http.build(); |
|
} |
|
|
|
@Bean // <2> |
|
@Order(2) |
|
public SecurityFilterChain defaultSecurityFilterChain(HttpSecurity http) |
|
throws Exception { |
|
// @formatter:off |
|
http |
|
.authorizeHttpRequests((authorize) -> authorize |
|
.anyRequest().authenticated() |
|
) |
|
// Form login handles the redirect to the login page from the |
|
// authorization server filter chain |
|
.formLogin(Customizer.withDefaults()); |
|
// @formatter:on |
|
|
|
return http.build(); |
|
} |
|
|
|
@Bean // <3> |
|
public UserDetailsService userDetailsService() { |
|
// @formatter:off |
|
UserDetails userDetails = User.withDefaultPasswordEncoder() |
|
.username("user") |
|
.password("password") |
|
.roles("USER") |
|
.build(); |
|
// @formatter:on |
|
|
|
return new InMemoryUserDetailsManager(userDetails); |
|
} |
|
|
|
@Bean // <4> |
|
public RegisteredClientRepository registeredClientRepository() { |
|
// @formatter:off |
|
RegisteredClient oidcClient = RegisteredClient.withId(UUID.randomUUID().toString()) |
|
.clientId("oidc-client") |
|
.clientSecret("{noop}secret") |
|
.clientAuthenticationMethod(ClientAuthenticationMethod.CLIENT_SECRET_BASIC) |
|
.authorizationGrantType(AuthorizationGrantType.AUTHORIZATION_CODE) |
|
.authorizationGrantType(AuthorizationGrantType.REFRESH_TOKEN) |
|
.redirectUri("http://127.0.0.1:8080/login/oauth2/code/oidc-client") |
|
.postLogoutRedirectUri("http://127.0.0.1:8080/") |
|
.scope(OidcScopes.OPENID) |
|
.scope(OidcScopes.PROFILE) |
|
.clientSettings(ClientSettings.builder().requireAuthorizationConsent(true).build()) |
|
.build(); |
|
// @formatter:on |
|
|
|
return new InMemoryRegisteredClientRepository(oidcClient); |
|
} |
|
|
|
@Bean // <5> |
|
public JWKSource<SecurityContext> jwkSource() { |
|
KeyPair keyPair = generateRsaKey(); |
|
RSAPublicKey publicKey = (RSAPublicKey) keyPair.getPublic(); |
|
RSAPrivateKey privateKey = (RSAPrivateKey) keyPair.getPrivate(); |
|
// @formatter:off |
|
RSAKey rsaKey = new RSAKey.Builder(publicKey) |
|
.privateKey(privateKey) |
|
.keyID(UUID.randomUUID().toString()) |
|
.build(); |
|
// @formatter:on |
|
JWKSet jwkSet = new JWKSet(rsaKey); |
|
return new ImmutableJWKSet<>(jwkSet); |
|
} |
|
|
|
private static KeyPair generateRsaKey() { // <6> |
|
KeyPair keyPair; |
|
try { |
|
KeyPairGenerator keyPairGenerator = KeyPairGenerator.getInstance("RSA"); |
|
keyPairGenerator.initialize(2048); |
|
keyPair = keyPairGenerator.generateKeyPair(); |
|
} |
|
catch (Exception ex) { |
|
throw new IllegalStateException(ex); |
|
} |
|
return keyPair; |
|
} |
|
|
|
@Bean // <7> |
|
public JwtDecoder jwtDecoder(JWKSource<SecurityContext> jwkSource) { |
|
return OAuth2AuthorizationServerConfiguration.jwtDecoder(jwkSource); |
|
} |
|
|
|
@Bean // <8> |
|
public AuthorizationServerSettings authorizationServerSettings() { |
|
return AuthorizationServerSettings.builder().build(); |
|
} |
|
|
|
}
|
|
|