Skip to content
Open
Show file tree
Hide file tree
Changes from all commits
Commits
File filter

Filter by extension

Filter by extension


Conversations
Failed to load comments.
Loading
Jump to
Jump to file
Failed to load files.
Loading
Diff view
Diff view
Binary file not shown.
Original file line number Diff line number Diff line change
@@ -1,8 +1,8 @@
spring:
datasource:
url: jdbc:postgresql://localhost:5432/pweb2
url: jdbc:postgresql://localhost:5433/pweb2-jwt
username: postgres
password: secret
password: 1327
driver-class-name: org.postgresql.Driver
jpa:
hibernate:
Expand Down
19 changes: 18 additions & 1 deletion exemplos/02-seguranca/pom.xml
Original file line number Diff line number Diff line change
Expand Up @@ -15,7 +15,7 @@
<description>Demo project for Spring Security</description>

<properties>
<java.version>1.8</java.version>
<java.version>11</java.version>
</properties>

<dependencies>
Expand Down Expand Up @@ -55,6 +55,23 @@
<artifactId>postgresql</artifactId>
<version>42.2.8</version>
</dependency>
<dependency>
<groupId>io.jsonwebtoken</groupId>
<artifactId>jjwt-api</artifactId>
<version>0.10.5</version>
</dependency>
<dependency>
<groupId>io.jsonwebtoken</groupId>
<artifactId>jjwt-impl</artifactId>
<version>0.10.5</version>
<scope>runtime</scope>
</dependency>
<dependency>
<groupId>io.jsonwebtoken</groupId>
<artifactId>jjwt-jackson</artifactId>
<version>0.10.5</version>
<scope>runtime</scope>
</dependency>

</dependencies>

Expand Down
Original file line number Diff line number Diff line change
@@ -1,8 +1,7 @@
package br.com.ifpb.pweb2.securitydemo.config;

import lombok.Data;
import lombok.Getter;
import lombok.Setter;

import org.springframework.boot.context.properties.ConfigurationProperties;
import org.springframework.context.annotation.Configuration;

Expand All @@ -13,7 +12,7 @@ public class ApplicationConfig {

private AutenticacaoPadrao autenticacaoPadrao = new AutenticacaoPadrao();

private enum TipoAutenticacao { MEMORIA, BANCO };
private enum TipoAutenticacao { MEMORIA, BANCO }

@Data
public class AutenticacaoPadrao {
Expand Down
Original file line number Diff line number Diff line change
@@ -0,0 +1,18 @@
package br.com.ifpb.pweb2.securitydemo.config;

import lombok.Data;
import org.springframework.boot.context.properties.ConfigurationProperties;
import org.springframework.context.annotation.Configuration;

@Configuration
@ConfigurationProperties(prefix="security")
@Data
public class SecurityConfig {
private String authLoginUrl;
private String tokenType;
private String secret;
private String issuer;
private String audience;
private Long expiration;

}
Original file line number Diff line number Diff line change
@@ -0,0 +1,19 @@
package br.com.ifpb.pweb2.securitydemo.config;

public class SecurityConstants {

public static final String AUTH_LOGIN_URL = "/api/authenticate";

// Signing key for HS512 algorithm
// Use http://www.allkeysgenerator.com/ para gerar uma chave
public static final String JWT_SECRET = "E07451F5-583D-4B1A-8AF1-A3AF70AABD43";

// JWT token defaults
public static final String TOKEN_HEADER = "Authorization";
public static final String TOKEN_PREFIX = "Bearer ";
public static final String TOKEN_TYPE = "JWT";
public static final String TOKEN_ISSUER = "secure-api";
public static final String TOKEN_AUDIENCE = "secure-app";

private SecurityConstants() {}
}
Original file line number Diff line number Diff line change
@@ -1,33 +1,78 @@
package br.com.ifpb.pweb2.securitydemo.config;

import br.com.ifpb.pweb2.securitydemo.config.jwt.JwtAuthenticationFilter;
import br.com.ifpb.pweb2.securitydemo.config.jwt.JwtAuthorizationFilter;
import br.com.ifpb.pweb2.securitydemo.service.UsuarioService;
import org.springframework.beans.factory.annotation.Autowired;
import org.springframework.context.annotation.Bean;
import org.springframework.core.annotation.Order;
import org.springframework.security.config.annotation.authentication.builders.AuthenticationManagerBuilder;
import org.springframework.security.config.annotation.method.configuration.EnableGlobalMethodSecurity;
import org.springframework.security.config.annotation.web.builders.HttpSecurity;
import org.springframework.security.config.annotation.web.configuration.EnableWebSecurity;
import org.springframework.security.config.annotation.web.configuration.WebSecurityConfigurerAdapter;
import org.springframework.security.config.http.SessionCreationPolicy;
import org.springframework.security.core.userdetails.UserDetailsService;
import org.springframework.security.crypto.password.PasswordEncoder;
import org.springframework.web.cors.CorsConfiguration;
import org.springframework.web.cors.CorsConfigurationSource;
import org.springframework.web.cors.UrlBasedCorsConfigurationSource;

@EnableWebSecurity
@EnableGlobalMethodSecurity(jsr250Enabled = true, securedEnabled = true, prePostEnabled = true)
public class WebSecurityConfig extends WebSecurityConfigurerAdapter {

public WebSecurityConfig() {
private final SecurityConfig securityConfig;
private UsuarioService usuarioService;

@Autowired
private ApplicationConfig applicationConfig;
private final UserDetailsService userDetailsService;

private final PasswordEncoder passwordEncoder;


public WebSecurityConfig(SecurityConfig securityConfig, UsuarioService usuarioService, UserDetailsService userDetailsService, PasswordEncoder passwordEncoder) {
this.securityConfig = securityConfig;
this.usuarioService = usuarioService;
this.userDetailsService = userDetailsService;
this.passwordEncoder = passwordEncoder;
}

@Override
protected void configure(HttpSecurity http) throws Exception {
http
http.cors().and()
.authorizeRequests()
.antMatchers("/api/**").authenticated()
.antMatchers("/publico").permitAll()
.antMatchers("/usuarios").hasRole("ADMIN")
.and()
.sessionManagement()
.anyRequest().authenticated()
.and()
.addFilter(new JwtAuthenticationFilter(authenticationManager(), securityConfig))
.addFilter(new JwtAuthorizationFilter(authenticationManager(), securityConfig)).
sessionManagement()
.sessionCreationPolicy(SessionCreationPolicy.STATELESS)
.and()
.httpBasic()
.and()
.csrf().disable();
}

@Override
public void configure(AuthenticationManagerBuilder auth) throws Exception {
if(!usuarioService.isEmpty()){
auth.userDetailsService(userDetailsService).passwordEncoder(passwordEncoder);
}else{
auth.inMemoryAuthentication()
.passwordEncoder(passwordEncoder)
.withUser(applicationConfig.getAutenticacaoPadrao().getLogin())
.password(passwordEncoder.encode(applicationConfig.getAutenticacaoPadrao().getSenha()))
.authorities("ROLE_"+applicationConfig.getAutenticacaoPadrao().getPapel());
} }

@Bean
public CorsConfigurationSource corsConfigurationSource() {
final UrlBasedCorsConfigurationSource source = new UrlBasedCorsConfigurationSource();
source.registerCorsConfiguration("/**", new CorsConfiguration().applyPermitDefaultValues());
return source;
}

}
Original file line number Diff line number Diff line change
@@ -0,0 +1,68 @@
package br.com.ifpb.pweb2.securitydemo.config.jwt;

import br.com.ifpb.pweb2.securitydemo.config.SecurityConfig;
import io.jsonwebtoken.Jwts;
import io.jsonwebtoken.SignatureAlgorithm;
import io.jsonwebtoken.security.Keys;
import org.springframework.security.authentication.AuthenticationManager;
import org.springframework.security.authentication.UsernamePasswordAuthenticationToken;
import org.springframework.security.core.Authentication;
import org.springframework.security.core.GrantedAuthority;
import org.springframework.security.core.userdetails.UserDetails;
import org.springframework.security.web.authentication.UsernamePasswordAuthenticationFilter;
import org.springframework.stereotype.Component;

import javax.servlet.FilterChain;
import javax.servlet.http.HttpServletRequest;
import javax.servlet.http.HttpServletResponse;
import java.util.Date;
import java.util.List;
import java.util.stream.Collectors;

public class JwtAuthenticationFilter extends UsernamePasswordAuthenticationFilter {

private final AuthenticationManager authenticationManager;

private final SecurityConfig securityConfig;

public JwtAuthenticationFilter(AuthenticationManager authenticationManager, SecurityConfig securityConfig) {
this.authenticationManager = authenticationManager;
this.securityConfig = securityConfig;
setFilterProcessesUrl(this.securityConfig.getAuthLoginUrl());
}

@Override
public Authentication attemptAuthentication(HttpServletRequest request, HttpServletResponse response) {
String username = request.getParameter("usuario");
String password = request.getParameter("senha");
UsernamePasswordAuthenticationToken authenticationToken = new UsernamePasswordAuthenticationToken(username, password);

return authenticationManager.authenticate(authenticationToken);
}

@Override
protected void successfulAuthentication(HttpServletRequest request, HttpServletResponse response,
FilterChain filterChain, Authentication authentication) {
UserDetails user = ((UserDetails) authentication.getPrincipal());

List<String> roles = user.getAuthorities()
.stream()
.map(GrantedAuthority::getAuthority)
.collect(Collectors.toList());

String signingKey = securityConfig.getSecret();

String token = Jwts.builder()
.signWith(Keys.hmacShaKeyFor(signingKey.getBytes()), SignatureAlgorithm.HS512)
.setHeaderParam("type", securityConfig.getTokenType())
.setIssuer(securityConfig.getIssuer()) //emissor
.setAudience(securityConfig.getAudience()) //destinatario
.setSubject(user.getUsername())
.setExpiration(new Date(System.currentTimeMillis() + securityConfig.getExpiration()))
.claim("roles", roles)
.compact();

response.addHeader("Authorization", "Bearer " + token);
}

}
Original file line number Diff line number Diff line change
@@ -0,0 +1,90 @@
package br.com.ifpb.pweb2.securitydemo.config.jwt;

import java.io.IOException;
import java.util.List;
import java.util.stream.Collectors;

import javax.servlet.FilterChain;
import javax.servlet.ServletException;
import javax.servlet.http.HttpServletRequest;
import javax.servlet.http.HttpServletResponse;

import org.springframework.security.authentication.AuthenticationManager;
import org.springframework.security.authentication.UsernamePasswordAuthenticationToken;
import org.springframework.security.core.authority.SimpleGrantedAuthority;
import org.springframework.security.core.context.SecurityContextHolder;
import org.springframework.security.web.authentication.www.BasicAuthenticationFilter;

import br.com.ifpb.pweb2.securitydemo.config.SecurityConfig;
import io.jsonwebtoken.Claims;
import io.jsonwebtoken.ExpiredJwtException;
import io.jsonwebtoken.Jws;
import io.jsonwebtoken.Jwts;
import io.jsonwebtoken.MalformedJwtException;
import io.jsonwebtoken.SignatureException;
import io.jsonwebtoken.UnsupportedJwtException;
import lombok.extern.slf4j.Slf4j;

@Slf4j
public class JwtAuthorizationFilter extends BasicAuthenticationFilter {

private final SecurityConfig securityConfig;

public JwtAuthorizationFilter(AuthenticationManager authenticationManager, SecurityConfig securityConfig) {
super(authenticationManager);
this.securityConfig = securityConfig;
}

@Override
protected void doFilterInternal(HttpServletRequest request, HttpServletResponse response,
FilterChain filterChain) throws IOException, ServletException {
UsernamePasswordAuthenticationToken authentication = getAuthentication(request);
if (authentication == null) {
filterChain.doFilter(request, response);
return;
}

SecurityContextHolder.getContext().setAuthentication(authentication);
filterChain.doFilter(request, response);
}

private UsernamePasswordAuthenticationToken getAuthentication(HttpServletRequest request) {
String token = request.getHeader("Authorization");
if (token != null && !token.isEmpty() && token.startsWith("Bearer")) {
try {
String signingKey = securityConfig.getSecret();

Jws<Claims> parsedToken = Jwts.parser()
.setSigningKey(signingKey.getBytes())
.parseClaimsJws(token.replace("Bearer ", ""));

String username = parsedToken
.getBody()
.getSubject();

List<SimpleGrantedAuthority> authorities = ((List<?>) parsedToken.getBody()
.get("roles")).stream()
.map(authority -> new SimpleGrantedAuthority((String) authority))
.collect(Collectors.toList());

if (username != null && !username.isEmpty()){
return new UsernamePasswordAuthenticationToken(username, null, authorities);
}

} catch (ExpiredJwtException exception) {
log.warn("Request to parse expired JWT : {} failed : {}", token, exception.getMessage());
} catch (UnsupportedJwtException exception) {
log.warn("Request to parse unsupported JWT : {} failed : {}", token, exception.getMessage());
} catch (MalformedJwtException exception) {
log.warn("Request to parse invalid JWT : {} failed : {}", token, exception.getMessage());
} catch (SignatureException exception) {
log.warn("Request to parse JWT with invalid signature : {} failed : {}", token, exception.getMessage());
} catch (IllegalArgumentException exception) {
log.warn("Request to parse empty or null JWT : {} failed : {}", token, exception.getMessage());
}
}

return null;
}

}
Original file line number Diff line number Diff line change
Expand Up @@ -10,7 +10,7 @@ public class PublicoController {

@GetMapping
public String exibirMensagem() {
return "Olá, meu acesso é público";
return "Olá, meu acesso é públicooooo";
}

}
Loading