针对不同url模式的不同过滤器

pre*_*oid 3 spring spring-security spring-boot

我有一个主要提供REST端点的Spring启动应用程序,通过令牌(在Authorization标头中发送)完成身份验证,我TokenAuthenticationFilterLogoutFilter设置安全上下文之前添加了自己的身份.

在创建管理控制台的过程中,我希望管理员身份验证与常规用户分开,因为我之间没有共享表,Admins并且Users由于多种原因,在数据库级别上我有以下内容user,user_token,admin,admin_token.所以为了实现这个目标,我想到了几个解决方案:

  1. 让当前TokenAuthenticationFilter处理用户/管理员令牌auth.然而,这需要:修改过滤器以确定它是基于url模式的管理员还是用户令牌(例如,如果是/admin/**,过滤器将知道要调用哪个服务)或者具有来自用户的管理员标头(即用户发送U-Auth标头,Admin发送A-Auth标头),过滤器将根据标头名称进行操作.这对我来说听起来都不好.
  2. 指定一组过滤器以应用每个网址模式,例如 /admin/**AdminTokenAuthFilter添加到链中,而任何其他模式将TokenAuthenticationFilter在链中具有旧模式 .这听起来比早期的方法好,但我很难实现它.我试图在我的FilterRegistrationBean内部注册我自己的WebSecurityConfigurerAdapter

例:

 @Bean
 public FilterRegistrationBean adminFilter(){
     FilterRegistrationBean filterRegBean = new FilterRegistrationBean();
     filterRegBean.setFilter(new AdminTokenAuthFilter());
     List<String> urlPatterns = new ArrayList<>();
     urlPatterns.add("/admin/*");
     filterRegBean.setUrlPatterns(urlPatterns);
     return filterRegBean;
 }
Run Code Online (Sandbox Code Playgroud)

这似乎有效,但我不确定这是否是正确的做法我也关注一件事,我发现这会将过滤器添加到过滤器的弹簧originalChain中,而不是additionalFilters在我的WebSecurityConfigurerAdapter使用中 定期添加过滤器时似乎适用http.addFilterBefore(tokenAuthenticationFilter, LogoutFilter.class).我不想改变spring原始过滤器链,我宁愿在额外的过滤器链中使用我的自定义过滤器.有人可以详细说明吗?

  1. 创建两个单独的调度程序servlet并使每个调度程序监听特定的url模式,我想每个dispatcherServlet都有自己的安全配置.

任何人都可以分享一些关于这种情况下最佳方法的知识吗?

pre*_*oid 8

结束编写两个安全配置,第一个适用于特定的antmatcher,第二个适用于任何其他url模式.像这样:

@Configuration
@EnableWebSecurity
@ComponentScan(basePackages = "x.x.x")
public class NewSecurityConfiguration {
    @Configuration
    @Order(1)
    public static class BackendSecurityConfiguration extends WebSecurityConfigurerAdapter {
        @Autowired CustomSystemUserDetailsService customSystemUserDetailsService;
        @Autowired SystemTokenAuthFilter systemTokenAuthFilter;
        @Autowired CustomLogoutFilter customLogoutFilter;
        @Autowired UnauthorizedEntryPoint unauthorizedEntryPoint;

        @Bean
        public PasswordEncoder passwordEncoder() {
            return new BCryptPasswordEncoder();
        }

        @Bean(name="systemAuthenticationManager")
        @Override
        public AuthenticationManager authenticationManagerBean() throws Exception {
            return super.authenticationManagerBean();
        }

        @Override
        public void configure(AuthenticationManagerBuilder auth) throws Exception {                auth.userDetailsService(customSystemUserDetailsService).passwordEncoder(passwordEncoder());
        }

        @Override
        protected void configure(HttpSecurity http) throws Exception {    
            http.antMatcher("/system/**")
                    .addFilterBefore(systemTokenAuthFilter, LogoutFilter.class)
                    .addFilterBefore(customLogoutFilter, LogoutFilter.class)
                    .authorizeRequests()
                    .antMatchers("/system/login").permitAll()
                    .anyRequest().authenticated()
                    .and()
                    .sessionManagement().sessionCreationPolicy(SessionCreationPolicy.STATELESS)
                    .and()
                    .exceptionHandling().authenticationEntryPoint(unauthorizedEntryPoint)
                    .and()
                    .httpBasic().disable()
                    .csrf().disable()
                    .logout().disable();
        }
    }

    @Configuration
    @Order(2)
    public static class FrontEndSecurityConfiguration extends WebSecurityConfigurerAdapter {

        @Override
        public void configure(AuthenticationManagerBuilder auth) throws Exception {
            auth.userDetailsService(customUserDetailsService).passwordEncoder(passwordEncoder());
        }

        @Override
        protected void configure(HttpSecurity http) throws Exception {
            http
                    .addFilterBefore(userTokenAuthFilter, LogoutFilter.class)
                    .addFilterBefore(customLogoutFilter, LogoutFilter.class)
                    .authorizeRequests()
                    .antMatchers("/access/*").permitAll()
                    .antMatchers("/ref/*").permitAll()
                    .antMatchers("/ticket_parser/*").permitAll()
                    .antMatchers("/reset_password/**").permitAll()
                    .antMatchers("/link_profile/**").permitAll()
                    .antMatchers("/email_verification/**").permitAll()
                    .antMatchers("/ref").permitAll()
                    .antMatchers("/flightstats/alert").permitAll()
                    .antMatchers("/airline/list").access("authenticated or hasIpAddress('127.0.0.1') or hasIpAddress('0:0:0:0:0:0:0:1')")
                    .antMatchers("/airport/list").access("authenticated or hasIpAddress('127.0.0.1') or hasIpAddress('0:0:0:0:0:0:0:1')")
                    .and()
                    .authorizeRequests().anyRequest().authenticated().and().authorizeRequests()
                    .and()
                    .sessionManagement().sessionCreationPolicy(SessionCreationPolicy.STATELESS)
                    .and()
                    .exceptionHandling().authenticationEntryPoint(unauthorizedEntryPoint)
                    .and()
                    .httpBasic().disable()
                    .csrf().disable()
                    .formLogin().disable()
                    .logout().disable();
        }
    }
}
Run Code Online (Sandbox Code Playgroud)