Browse Source
See https://github.com/spring-projects/spring-boot/issues/37504 Adds @EnableWebFluxSecurity and copied MapReactiveUserDetailsService beans from boot.pull/3064/head
sgibb
12 months ago
4 changed files with 85 additions and 14 deletions
@ -0,0 +1,81 @@
@@ -0,0 +1,81 @@
|
||||
/* |
||||
* Copyright 2013-2023 the original author or authors. |
||||
* |
||||
* Licensed under the Apache License, Version 2.0 (the "License"); |
||||
* you may not use this file except in compliance with the License. |
||||
* You may obtain a copy of the License at |
||||
* |
||||
* https://www.apache.org/licenses/LICENSE-2.0
|
||||
* |
||||
* Unless required by applicable law or agreed to in writing, software |
||||
* distributed under the License is distributed on an "AS IS" BASIS, |
||||
* WITHOUT WARRANTIES OR CONDITIONS OF ANY KIND, either express or implied. |
||||
* See the License for the specific language governing permissions and |
||||
* limitations under the License. |
||||
*/ |
||||
|
||||
package org.springframework.cloud.gateway.test; |
||||
|
||||
import java.util.List; |
||||
import java.util.regex.Pattern; |
||||
|
||||
import org.apache.commons.logging.Log; |
||||
import org.apache.commons.logging.LogFactory; |
||||
|
||||
import org.springframework.beans.factory.ObjectProvider; |
||||
import org.springframework.boot.autoconfigure.AutoConfiguration; |
||||
import org.springframework.boot.autoconfigure.condition.ConditionalOnClass; |
||||
import org.springframework.boot.autoconfigure.condition.ConditionalOnMissingBean; |
||||
import org.springframework.boot.autoconfigure.security.SecurityProperties; |
||||
import org.springframework.boot.autoconfigure.security.reactive.ReactiveSecurityAutoConfiguration; |
||||
import org.springframework.context.annotation.Bean; |
||||
import org.springframework.security.config.annotation.web.reactive.EnableWebFluxSecurity; |
||||
import org.springframework.security.core.userdetails.MapReactiveUserDetailsService; |
||||
import org.springframework.security.core.userdetails.User; |
||||
import org.springframework.security.core.userdetails.UserDetails; |
||||
import org.springframework.security.crypto.password.PasswordEncoder; |
||||
import org.springframework.util.StringUtils; |
||||
import org.springframework.web.reactive.DispatcherHandler; |
||||
|
||||
/* |
||||
See https://github.com/spring-projects/spring-boot/issues/37504.
|
||||
Because gateway has normal spring security and spring security oauth 2 |
||||
we need an explicit @EnableWebFluxSecurity and a ReactiveUserDetailsService |
||||
*/ |
||||
@AutoConfiguration(before = ReactiveSecurityAutoConfiguration.class) |
||||
@ConditionalOnClass(DispatcherHandler.class) |
||||
@EnableWebFluxSecurity |
||||
public class TestEnableWebfluxSecurityAutoConfiguration { |
||||
|
||||
private static final String NOOP_PASSWORD_PREFIX = "{noop}"; |
||||
|
||||
private static final Pattern PASSWORD_ALGORITHM_PATTERN = Pattern.compile("^\\{.+}.*$"); |
||||
|
||||
private static final Log logger = LogFactory.getLog(TestEnableWebfluxSecurityAutoConfiguration.class); |
||||
|
||||
@Bean |
||||
@ConditionalOnMissingBean |
||||
public MapReactiveUserDetailsService reactiveUserDetailsService(SecurityProperties properties, |
||||
ObjectProvider<PasswordEncoder> passwordEncoder) { |
||||
SecurityProperties.User user = properties.getUser(); |
||||
UserDetails userDetails = getUserDetails(user, getOrDeducePassword(user, passwordEncoder.getIfAvailable())); |
||||
return new MapReactiveUserDetailsService(userDetails); |
||||
} |
||||
|
||||
private UserDetails getUserDetails(SecurityProperties.User user, String password) { |
||||
List<String> roles = user.getRoles(); |
||||
return User.withUsername(user.getName()).password(password).roles(StringUtils.toStringArray(roles)).build(); |
||||
} |
||||
|
||||
private String getOrDeducePassword(SecurityProperties.User user, PasswordEncoder encoder) { |
||||
String password = user.getPassword(); |
||||
if (user.isPasswordGenerated()) { |
||||
logger.info(String.format("%n%nUsing generated security password: %s%n", user.getPassword())); |
||||
} |
||||
if (encoder != null || PASSWORD_ALGORITHM_PATTERN.matcher(password).matches()) { |
||||
return password; |
||||
} |
||||
return NOOP_PASSWORD_PREFIX + password; |
||||
} |
||||
|
||||
} |
Loading…
Reference in new issue