Skip to content
Merged
Show file tree
Hide file tree
Changes from all commits
Commits
File filter

Filter by extension

Filter by extension

Conversations
Failed to load comments.
Loading
Jump to
Jump to file
Failed to load files.
Loading
Diff view
Diff view
Original file line number Diff line number Diff line change
@@ -1,136 +1,136 @@
package com.retrip.trip.infra.adapter.in.presentation.filter;

import com.retrip.trip.application.in.request.context.UserContext;
import io.jsonwebtoken.Claims;
import io.jsonwebtoken.Jws;
import io.jsonwebtoken.Jwts;
import jakarta.servlet.FilterChain;
import jakarta.servlet.ServletException;
import jakarta.servlet.http.HttpServletRequest;
import jakarta.servlet.http.HttpServletResponse;
import lombok.extern.slf4j.Slf4j;
import org.springframework.beans.factory.annotation.Value;
import org.springframework.security.authentication.UsernamePasswordAuthenticationToken;
import org.springframework.security.core.authority.SimpleGrantedAuthority;
import org.springframework.security.core.context.SecurityContextHolder;
import org.springframework.stereotype.Component;
import org.springframework.web.filter.OncePerRequestFilter;

import java.io.IOException;
import java.security.KeyFactory;
import java.security.PublicKey;
import java.security.spec.X509EncodedKeySpec;
import java.util.Base64;
import java.util.Collections;
import java.util.List;
import java.util.UUID;

@Slf4j
@Component
public class JwtAuthenticationFilter extends OncePerRequestFilter {

@Value("${jwt.public-key}")
private String publicKeyString;

@Override
protected void doFilterInternal(HttpServletRequest request, HttpServletResponse response, FilterChain filterChain)
throws ServletException, IOException {

String path = request.getRequestURI();

if (isExcludedPath(path)) {
filterChain.doFilter(request, response);
return;
}

String token = resolveToken(request);

if (token != null && validateToken(token)) {
try {

Claims claims = getClaims(token);


String subject = claims.getSubject();
UUID memberId = UUID.fromString(subject);


String role = claims.get("auth", String.class);

UserContext userContext = new UserContext(
memberId,
claims.get("nickname", String.class),
claims.get("email", String.class),
claims.get("name", String.class),
null,
0
);

request.setAttribute("userContext", userContext);

UsernamePasswordAuthenticationToken authentication = new UsernamePasswordAuthenticationToken(
memberId,
null,
role != null ? List.of(new SimpleGrantedAuthority(role)) : Collections.emptyList()
);
SecurityContextHolder.getContext().setAuthentication(authentication);

} catch (Exception e) {
log.error("Token processing error: {}", e.getMessage());
response.setStatus(HttpServletResponse.SC_UNAUTHORIZED);
return;
}
} else {
response.setStatus(HttpServletResponse.SC_UNAUTHORIZED);
return;
}

filterChain.doFilter(request, response);
}

private boolean isExcludedPath(String path) {
String pathLowercase = path.toLowerCase();
return path.equals("/") ||
pathLowercase.contains("swagger") ||
pathLowercase.contains("api-docs") ||
pathLowercase.contains("actuator") ||
pathLowercase.contains("robots.txt") ||
pathLowercase.contains("status-check");
}

private String resolveToken(HttpServletRequest request) {
String bearerToken = request.getHeader("Authorization");
if (bearerToken != null && bearerToken.startsWith("Bearer ")) {
return bearerToken.substring(7);
}
return null;
}

private boolean validateToken(String token) {
try {
getClaims(token);
return true;
} catch (Exception e) {
return false;
}
}

private Claims getClaims(String token) throws Exception {
String sanitizedKey = publicKeyString
.replace("-----BEGIN PUBLIC KEY-----", "")
.replace("-----END PUBLIC KEY-----", "")
.replaceAll("\\s", "");

byte[] publicBytes = Base64.getDecoder().decode(sanitizedKey);
X509EncodedKeySpec keySpec = new X509EncodedKeySpec(publicBytes);
KeyFactory keyFactory = KeyFactory.getInstance("RSA");
PublicKey publicKey = keyFactory.generatePublic(keySpec);

Jws<Claims> jws = Jwts.parser()
.verifyWith(publicKey)
.build()
.parseSignedClaims(token);

return jws.getPayload();
}
}
//package com.retrip.trip.infra.adapter.in.presentation.filter;
//
//import com.retrip.trip.application.in.request.context.UserContext;
//import io.jsonwebtoken.Claims;
//import io.jsonwebtoken.Jws;
//import io.jsonwebtoken.Jwts;
//import jakarta.servlet.FilterChain;
//import jakarta.servlet.ServletException;
//import jakarta.servlet.http.HttpServletRequest;
//import jakarta.servlet.http.HttpServletResponse;
//import lombok.extern.slf4j.Slf4j;
//import org.springframework.beans.factory.annotation.Value;
//import org.springframework.security.authentication.UsernamePasswordAuthenticationToken;
//import org.springframework.security.core.authority.SimpleGrantedAuthority;
//import org.springframework.security.core.context.SecurityContextHolder;
//import org.springframework.stereotype.Component;
//import org.springframework.web.filter.OncePerRequestFilter;
//
//import java.io.IOException;
//import java.security.KeyFactory;
//import java.security.PublicKey;
//import java.security.spec.X509EncodedKeySpec;
//import java.util.Base64;
//import java.util.Collections;
//import java.util.List;
//import java.util.UUID;
//
//@Slf4j
//@Component
//public class JwtAuthenticationFilter extends OncePerRequestFilter {
//
// @Value("${jwt.public-key}")
// private String publicKeyString;
//
// @Override
// protected void doFilterInternal(HttpServletRequest request, HttpServletResponse response, FilterChain filterChain)
// throws ServletException, IOException {
//
// String path = request.getRequestURI();
//
// if (isExcludedPath(path)) {
// filterChain.doFilter(request, response);
// return;
// }
//
// String token = resolveToken(request);
//
// if (token != null && validateToken(token)) {
// try {
//
// Claims claims = getClaims(token);
//
//
// String subject = claims.getSubject();
// UUID memberId = UUID.fromString(subject);
//
//
// String role = claims.get("auth", String.class);
//
// UserContext userContext = new UserContext(
// memberId,
// claims.get("nickname", String.class),
// claims.get("email", String.class),
// claims.get("name", String.class),
// null,
// 0
// );
//
// request.setAttribute("userContext", userContext);
//
// UsernamePasswordAuthenticationToken authentication = new UsernamePasswordAuthenticationToken(
// memberId,
// null,
// role != null ? List.of(new SimpleGrantedAuthority(role)) : Collections.emptyList()
// );
// SecurityContextHolder.getContext().setAuthentication(authentication);
//
// } catch (Exception e) {
// log.error("Token processing error: {}", e.getMessage());
// response.setStatus(HttpServletResponse.SC_UNAUTHORIZED);
// return;
// }
// } else {
// response.setStatus(HttpServletResponse.SC_UNAUTHORIZED);
// return;
// }
//
// filterChain.doFilter(request, response);
// }
//
// private boolean isExcludedPath(String path) {
// String pathLowercase = path.toLowerCase();
// return path.equals("/") ||
// pathLowercase.contains("swagger") ||
// pathLowercase.contains("api-docs") ||
// pathLowercase.contains("actuator") ||
// pathLowercase.contains("robots.txt") ||
// pathLowercase.contains("status-check");
// }
//
// private String resolveToken(HttpServletRequest request) {
// String bearerToken = request.getHeader("Authorization");
// if (bearerToken != null && bearerToken.startsWith("Bearer ")) {
// return bearerToken.substring(7);
// }
// return null;
// }
//
// private boolean validateToken(String token) {
// try {
// getClaims(token);
// return true;
// } catch (Exception e) {
// return false;
// }
// }
//
// private Claims getClaims(String token) throws Exception {
// String sanitizedKey = publicKeyString
// .replace("-----BEGIN PUBLIC KEY-----", "")
// .replace("-----END PUBLIC KEY-----", "")
// .replaceAll("\\s", "");
//
// byte[] publicBytes = Base64.getDecoder().decode(sanitizedKey);
// X509EncodedKeySpec keySpec = new X509EncodedKeySpec(publicBytes);
// KeyFactory keyFactory = KeyFactory.getInstance("RSA");
// PublicKey publicKey = keyFactory.generatePublic(keySpec);
//
// Jws<Claims> jws = Jwts.parser()
// .verifyWith(publicKey)
// .build()
// .parseSignedClaims(token);
//
// return jws.getPayload();
// }
//}
33 changes: 0 additions & 33 deletions src/main/java/com/retrip/trip/infra/config/SecurityConfig.java
Original file line number Diff line number Diff line change
@@ -1,46 +1,13 @@
package com.retrip.trip.infra.config;

import com.retrip.trip.infra.adapter.in.presentation.filter.JwtAuthenticationFilter;
import lombok.RequiredArgsConstructor;
import org.springframework.context.annotation.Bean;
import org.springframework.context.annotation.Configuration;
import org.springframework.security.config.annotation.web.builders.HttpSecurity;
import org.springframework.security.config.annotation.web.configuration.EnableWebSecurity;
import org.springframework.security.config.annotation.web.configurers.AbstractHttpConfigurer;
import org.springframework.security.config.http.SessionCreationPolicy;
import org.springframework.security.crypto.bcrypt.BCryptPasswordEncoder;
import org.springframework.security.web.SecurityFilterChain;
import org.springframework.security.web.authentication.UsernamePasswordAuthenticationFilter;

@Configuration
@EnableWebSecurity
@RequiredArgsConstructor
public class SecurityConfig {

private final JwtAuthenticationFilter jwtAuthenticationFilter;

@Bean
public BCryptPasswordEncoder passwordEncoder() {
return new BCryptPasswordEncoder();
}

@Bean
public SecurityFilterChain filterChain(HttpSecurity http) throws Exception {
http
.csrf(AbstractHttpConfigurer::disable)
.formLogin(AbstractHttpConfigurer::disable)
.httpBasic(AbstractHttpConfigurer::disable)
.sessionManagement(session ->
session.sessionCreationPolicy(SessionCreationPolicy.STATELESS))
.authorizeHttpRequests(auth -> auth

.requestMatchers(
"/", "/swagger-ui/**", "/v3/api-docs/**", "/actuator/**", "/status-check"
).permitAll()
.anyRequest().authenticated()
)
.addFilterBefore(jwtAuthenticationFilter, UsernamePasswordAuthenticationFilter.class);

return http.build();
}
}