hubez-admin partner-git master -> hubez-git transfer 202205241800

This commit is contained in:
hyunjin35
2022-05-24 18:12:19 +09:00
parent 013e992bc7
commit ad80b88089
309 changed files with 50355 additions and 91 deletions

View File

@@ -0,0 +1,135 @@
package kr.co.uplus.ez.config;
import javax.servlet.Filter;
import org.springframework.beans.factory.annotation.Autowired;
import org.springframework.context.annotation.Bean;
import org.springframework.context.annotation.Configuration;
import org.springframework.security.authentication.AuthenticationManager;
import org.springframework.security.config.annotation.authentication.builders.AuthenticationManagerBuilder;
import org.springframework.security.config.annotation.web.builders.HttpSecurity;
import org.springframework.security.config.annotation.web.builders.WebSecurity;
import org.springframework.security.config.annotation.web.configuration.EnableWebSecurity;
import org.springframework.security.config.annotation.web.configuration.WebSecurityConfigurerAdapter;
import org.springframework.security.config.http.SessionCreationPolicy;
import org.springframework.security.core.userdetails.UserDetailsService;
import org.springframework.security.crypto.factory.PasswordEncoderFactories;
import org.springframework.security.crypto.password.PasswordEncoder;
import org.springframework.security.web.authentication.UsernamePasswordAuthenticationFilter;
import org.springframework.web.cors.CorsUtils;
import kr.co.uplus.ez.common.auth.LoginFailureHandler;
import kr.co.uplus.ez.common.auth.LoginSuccessHandler;
import kr.co.uplus.ez.common.auth.jwt.JwtAuthCookieFilter;
import kr.co.uplus.ez.common.auth.jwt.JwtAuthHeaderFilter;
import kr.co.uplus.ez.common.auth.jwt.JwtExceptionFilter;
import kr.co.uplus.ez.common.auth.jwt.JwtProperties;
import kr.co.uplus.ez.common.consts.ConfigProps;
import kr.co.uplus.ez.common.security.VueStaticFilter;
import kr.co.uplus.ez.common.security.XssFilter;
@Configuration
@EnableWebSecurity
public class SecurityConfig extends WebSecurityConfigurerAdapter {
private static final String LOGIN_FORM_URL = "/login";
//public static final String LOGIN_API_URL = "/api/auth/login";
public static final String LOGIN_API_URL = "/api/v1/bo/login/*";
public static final String LOGIN_FAIL_URL = "/login?error=true";
public static final String LOGIN_SUCC_URL = "/";
public static final String NO_RCS_AUTH_LOGIN_SUCC_URL = "/view/mgt/brand";
private static final String API_URL = "/api/**";
//public static final String PUBLIC_API_URL = "/api/public/**"; // 내부에서 인증없이 호출하는 API
public static final String PUBLIC_API_URL = "/api/v1/bo/**"; // 내부에서 인증없이 호출하는 API
private static final String OPEN_API_URL = "/openapi/**"; // 외부에서 호출하는 API
public static final String[] REST_API_URLS = {API_URL, OPEN_API_URL};
public static final String LOGIN_ID_PARAM = "userId";
@SuppressWarnings("unused")
private static final String LOGIN_PWD_PARAM = "userPwd";
public static final String AUTH_USER = "authUser";
@Autowired
private UserDetailsService userDetailsService;
@Autowired
private ConfigProps cprops;
@Autowired
private JwtProperties jwtProps;
@Override
public void configure(WebSecurity web) throws Exception {
web.ignoring()
.antMatchers("/static/**");
}
@Bean
public Filter jwtAuthFilter() {
return new JwtAuthCookieFilter(jwtProps);
}
@Override
public void configure(HttpSecurity http) throws Exception {
http
.addFilterBefore(new VueStaticFilter(), UsernamePasswordAuthenticationFilter.class) // Vue에서 호출시 화면관련 URL은 / forward
.addFilterBefore(new XssFilter(cprops), UsernamePasswordAuthenticationFilter.class)
//.addFilterBefore(new LogFilter(cprops), UsernamePasswordAuthenticationFilter.class)
.addFilterBefore(new JwtExceptionFilter(), UsernamePasswordAuthenticationFilter.class)
.addFilterBefore(jwtAuthFilter(), UsernamePasswordAuthenticationFilter.class)
.addFilterBefore(new JwtAuthHeaderFilter(jwtProps), UsernamePasswordAuthenticationFilter.class);
http
.cors().and()
.csrf().disable()
// Spring Security가 HttpSession 객체를 생성하지 않도록 설정
.sessionManagement().sessionCreationPolicy(SessionCreationPolicy.STATELESS)
.and()
.headers().contentTypeOptions().disable()
.and()
.headers().frameOptions().disable()
.and()
.exceptionHandling()
.authenticationEntryPoint(new MixedAuthenticationEntryPoint(LOGIN_FORM_URL, REST_API_URLS))
.and()
.authorizeRequests()
.requestMatchers(CorsUtils::isPreFlightRequest).permitAll() // CORS preflight 요청은 인증처리를 하지 않도록 설정
.antMatchers("/", PUBLIC_API_URL, OPEN_API_URL, LOGIN_FORM_URL, LOGIN_API_URL, "/swagger-ui.html", "/swagger-ui/**", "/api-docs", "/api-docs/**").permitAll()
//.antMatchers("/", PUBLIC_API_URL, OPEN_API_URL, LOGIN_FORM_URL, LOGIN_API_URL).permitAll()
.antMatchers(API_URL).authenticated()
.anyRequest().authenticated();
}
@Override
protected void configure(final AuthenticationManagerBuilder auth) throws Exception {
auth.userDetailsService(userDetailsService).passwordEncoder(passwordEncoder());
}
@Bean
public PasswordEncoder passwordEncoder() {
/*String encodingId = "bcrypt";
Map<String, PasswordEncoder> encoders = new HashMap<>();
encoders.put(encodingId, new BCryptPasswordEncoder());
Pbkdf2PasswordEncoder Pbkdf2 = new Pbkdf2PasswordEncoder();
Pbkdf2.setAlgorithm(Pbkdf2PasswordEncoder.SecretKeyFactoryAlgorithm.PBKDF2WithHmacSHA512);
encoders.put("pbkdf2", Pbkdf2);
return new DelegatingPasswordEncoder(encodingId, encoders);
*/
return PasswordEncoderFactories.createDelegatingPasswordEncoder();
}
@Bean
@Override
public AuthenticationManager authenticationManagerBean() throws Exception {
return super.authenticationManagerBean();
}
@Bean
public LoginSuccessHandler loginSuccessHandler() {
return new LoginSuccessHandler();
}
@Bean
public LoginFailureHandler loginFailureHandler() {
return new LoginFailureHandler(LOGIN_FAIL_URL);
}
}