mirror of
https://github.com/Stirling-Tools/Stirling-PDF.git
synced 2024-06-03 06:10:11 +02:00
138 lines
7.2 KiB
Java
138 lines
7.2 KiB
Java
package stirling.software.SPDF.config.security;
|
|
|
|
import org.springframework.beans.factory.annotation.Autowired;
|
|
import org.springframework.beans.factory.annotation.Qualifier;
|
|
import org.springframework.context.annotation.Bean;
|
|
import org.springframework.context.annotation.Configuration;
|
|
import org.springframework.context.annotation.Lazy;
|
|
import org.springframework.security.authentication.dao.DaoAuthenticationProvider;
|
|
import org.springframework.security.config.annotation.method.configuration.EnableMethodSecurity;
|
|
import org.springframework.security.config.annotation.web.builders.HttpSecurity;
|
|
import org.springframework.security.config.annotation.web.configuration.EnableWebSecurity;
|
|
import org.springframework.security.core.userdetails.UserDetailsService;
|
|
import org.springframework.security.crypto.bcrypt.BCryptPasswordEncoder;
|
|
import org.springframework.security.crypto.password.PasswordEncoder;
|
|
import org.springframework.security.web.SecurityFilterChain;
|
|
import org.springframework.security.web.authentication.UsernamePasswordAuthenticationFilter;
|
|
import org.springframework.security.web.authentication.rememberme.PersistentTokenRepository;
|
|
import org.springframework.security.web.savedrequest.NullRequestCache;
|
|
import org.springframework.security.web.util.matcher.AntPathRequestMatcher;
|
|
|
|
import stirling.software.SPDF.repository.JPATokenRepositoryImpl;
|
|
|
|
@Configuration
|
|
@EnableWebSecurity()
|
|
@EnableMethodSecurity
|
|
public class SecurityConfiguration {
|
|
|
|
@Autowired private UserDetailsService userDetailsService;
|
|
|
|
@Bean
|
|
public PasswordEncoder passwordEncoder() {
|
|
return new BCryptPasswordEncoder();
|
|
}
|
|
|
|
@Autowired @Lazy private UserService userService;
|
|
|
|
@Autowired
|
|
@Qualifier("loginEnabled")
|
|
public boolean loginEnabledValue;
|
|
|
|
@Autowired private UserAuthenticationFilter userAuthenticationFilter;
|
|
|
|
@Autowired private LoginAttemptService loginAttemptService;
|
|
|
|
@Autowired private FirstLoginFilter firstLoginFilter;
|
|
|
|
@Bean
|
|
public SecurityFilterChain filterChain(HttpSecurity http) throws Exception {
|
|
http.addFilterBefore(userAuthenticationFilter, UsernamePasswordAuthenticationFilter.class);
|
|
|
|
if (loginEnabledValue) {
|
|
|
|
http.csrf(csrf -> csrf.disable());
|
|
http.addFilterBefore(rateLimitingFilter(), UsernamePasswordAuthenticationFilter.class);
|
|
http.addFilterAfter(firstLoginFilter, UsernamePasswordAuthenticationFilter.class);
|
|
http.formLogin(
|
|
formLogin ->
|
|
formLogin
|
|
.loginPage("/login")
|
|
.successHandler(
|
|
new CustomAuthenticationSuccessHandler())
|
|
.defaultSuccessUrl("/")
|
|
.failureHandler(
|
|
new CustomAuthenticationFailureHandler(
|
|
loginAttemptService))
|
|
.permitAll())
|
|
.requestCache(requestCache -> requestCache.requestCache(new NullRequestCache()))
|
|
.logout(
|
|
logout ->
|
|
logout.logoutRequestMatcher(
|
|
new AntPathRequestMatcher("/logout"))
|
|
.logoutSuccessUrl("/login?logout=true")
|
|
.invalidateHttpSession(true) // Invalidate session
|
|
.deleteCookies("JSESSIONID", "remember-me"))
|
|
.rememberMe(
|
|
rememberMeConfigurer ->
|
|
rememberMeConfigurer // Use the configurator directly
|
|
.key("uniqueAndSecret")
|
|
.tokenRepository(persistentTokenRepository())
|
|
.tokenValiditySeconds(1209600) // 2 weeks
|
|
)
|
|
.authorizeHttpRequests(
|
|
authz ->
|
|
authz.requestMatchers(
|
|
req -> {
|
|
String uri = req.getRequestURI();
|
|
String contextPath = req.getContextPath();
|
|
|
|
// Remove the context path from the URI
|
|
String trimmedUri =
|
|
uri.startsWith(contextPath)
|
|
? uri.substring(
|
|
contextPath
|
|
.length())
|
|
: uri;
|
|
|
|
return trimmedUri.startsWith("/login")
|
|
|| trimmedUri.endsWith(".svg")
|
|
|| trimmedUri.startsWith(
|
|
"/register")
|
|
|| trimmedUri.startsWith("/error")
|
|
|| trimmedUri.startsWith("/images/")
|
|
|| trimmedUri.startsWith("/public/")
|
|
|| trimmedUri.startsWith("/css/")
|
|
|| trimmedUri.startsWith("/js/");
|
|
})
|
|
.permitAll()
|
|
.anyRequest()
|
|
.authenticated())
|
|
.userDetailsService(userDetailsService)
|
|
.authenticationProvider(authenticationProvider());
|
|
} else {
|
|
http.csrf(csrf -> csrf.disable())
|
|
.authorizeHttpRequests(authz -> authz.anyRequest().permitAll());
|
|
}
|
|
return http.build();
|
|
}
|
|
|
|
@Bean
|
|
public IPRateLimitingFilter rateLimitingFilter() {
|
|
int maxRequestsPerIp = 1000000; // Example limit TODO add config level
|
|
return new IPRateLimitingFilter(maxRequestsPerIp, maxRequestsPerIp);
|
|
}
|
|
|
|
@Bean
|
|
public DaoAuthenticationProvider authenticationProvider() {
|
|
DaoAuthenticationProvider authProvider = new DaoAuthenticationProvider();
|
|
authProvider.setUserDetailsService(userDetailsService);
|
|
authProvider.setPasswordEncoder(passwordEncoder());
|
|
return authProvider;
|
|
}
|
|
|
|
@Bean
|
|
public PersistentTokenRepository persistentTokenRepository() {
|
|
return new JPATokenRepositoryImpl();
|
|
}
|
|
}
|