|
3 | 3 | import static org.springframework.security.config.Customizer.withDefaults;
|
4 | 4 |
|
5 | 5 | import eu.zuinnote.example.springwebdemo.configuration.application.ApplicationConfig;
|
| 6 | +import java.util.Arrays; |
| 7 | +import java.util.Collection; |
| 8 | +import java.util.HashMap; |
| 9 | +import java.util.HashSet; |
| 10 | +import java.util.Map; |
| 11 | +import java.util.Set; |
| 12 | +import java.util.stream.Collectors; |
6 | 13 | import lombok.extern.log4j.Log4j2;
|
7 | 14 | import org.springframework.beans.factory.annotation.Autowired;
|
8 | 15 | import org.springframework.context.annotation.Bean;
|
9 | 16 | import org.springframework.context.annotation.Configuration;
|
10 | 17 | import org.springframework.context.annotation.Profile;
|
11 | 18 | import org.springframework.security.config.annotation.web.builders.HttpSecurity;
|
12 | 19 | import org.springframework.security.config.annotation.web.configuration.EnableWebSecurity;
|
| 20 | +import org.springframework.security.core.GrantedAuthority; |
| 21 | +import org.springframework.security.core.authority.SimpleGrantedAuthority; |
| 22 | +import org.springframework.security.core.authority.mapping.GrantedAuthoritiesMapper; |
| 23 | +import org.springframework.security.oauth2.core.oidc.OidcIdToken; |
| 24 | +import org.springframework.security.oauth2.core.oidc.OidcUserInfo; |
| 25 | +import org.springframework.security.oauth2.core.oidc.user.OidcUserAuthority; |
| 26 | +import org.springframework.security.oauth2.core.user.OAuth2UserAuthority; |
13 | 27 | import org.springframework.security.web.SecurityFilterChain;
|
14 | 28 |
|
15 | 29 | @Configuration
|
@@ -37,4 +51,108 @@ SecurityFilterChain app(HttpSecurity http) throws Exception {
|
37 | 51 | this.generalSecurityConfiguration.setRequireSecure(http);
|
38 | 52 | return http.build();
|
39 | 53 | }
|
| 54 | + |
| 55 | + /* |
| 56 | + * Custom OIDC claim to Spring GrantedAuthority mapper so that they can be used natively in Spring. |
| 57 | + * |
| 58 | + * See: https://docs.spring.io/spring-security/reference/servlet/oauth2/login/advanced.html#oauth2login-advanced-map-authorities |
| 59 | + * |
| 60 | + */ |
| 61 | + @Bean |
| 62 | + public GrantedAuthoritiesMapper userAuthoritiesMapper() { |
| 63 | + return (authorities) -> { |
| 64 | + Set<GrantedAuthority> mappedAuthorities = new HashSet<>(); |
| 65 | + |
| 66 | + authorities.forEach( |
| 67 | + authority -> { |
| 68 | + if (OidcUserAuthority.class.isInstance(authority)) { |
| 69 | + OidcUserAuthority oidcUserAuthority = (OidcUserAuthority) authority; |
| 70 | + |
| 71 | + OidcIdToken idToken = oidcUserAuthority.getIdToken(); |
| 72 | + OidcUserInfo userInfo = oidcUserAuthority.getUserInfo(); |
| 73 | + |
| 74 | + // map all claims from the IdToken |
| 75 | + for (String idTokenClaim : |
| 76 | + this.config.getOidc().getMapper().getJwtIdTokenClaims()) { |
| 77 | + Object claim = idToken.getClaim(idTokenClaim); |
| 78 | + mappedAuthorities.addAll( |
| 79 | + this.parseClaim("IdToken", idTokenClaim, claim)); |
| 80 | + } |
| 81 | + // map all claims from the EndUser Endpoint |
| 82 | + for (String endUserEndpointClaim : |
| 83 | + this.config.getOidc().getMapper().getUserClaims()) { |
| 84 | + Object claim = userInfo.getClaim(endUserEndpointClaim); |
| 85 | + mappedAuthorities.addAll( |
| 86 | + this.parseClaim( |
| 87 | + "EndUser Endpoint", endUserEndpointClaim, claim)); |
| 88 | + } |
| 89 | + |
| 90 | + } else if (OAuth2UserAuthority.class.isInstance(authority)) { |
| 91 | + OAuth2UserAuthority oauth2UserAuthority = |
| 92 | + (OAuth2UserAuthority) authority; |
| 93 | + |
| 94 | + Map<String, Object> userAttributes = |
| 95 | + oauth2UserAuthority.getAttributes(); |
| 96 | + |
| 97 | + // Map the attributes found in userAttributes |
| 98 | + for (String userAttribute : |
| 99 | + this.config.getOidc().getMapper().getUserAttributes()) { |
| 100 | + Object claim = userAttributes.get(userAttribute); |
| 101 | + mappedAuthorities.addAll( |
| 102 | + this.parseClaim( |
| 103 | + "EndUser Attributes", userAttribute, claim)); |
| 104 | + } |
| 105 | + } |
| 106 | + }); |
| 107 | + |
| 108 | + return mappedAuthorities; |
| 109 | + }; |
| 110 | + } |
| 111 | + |
| 112 | + /* Parses a claim and converts it to a set of GrantedAuthority |
| 113 | + * |
| 114 | + * @type from where claim comes from (e.g. IdToken, UserInfoEndpoint, UserAtttribute) |
| 115 | + * @claim name of the claim (e.g. scope) |
| 116 | + * @claimValue value of the claim |
| 117 | + * |
| 118 | + */ |
| 119 | + private Set<GrantedAuthority> parseClaim(String type, String claim, Object claimValue) { |
| 120 | + Set<GrantedAuthority> result = new HashSet<>(); |
| 121 | + String authorityPrefix = this.config.getOidc().getMapper().getAuthoritiesPrefix(); |
| 122 | + if (claimValue != null) { |
| 123 | + if (claimValue instanceof String) { |
| 124 | + HashMap<String, String> separatorMap = |
| 125 | + this.config.getOidc().getMapper().getClaimsSeparatorMap(); |
| 126 | + if ((separatorMap != null) |
| 127 | + && separatorMap.containsKey( |
| 128 | + claim)) { // check if we should parse the a list from the claim |
| 129 | + String separator = |
| 130 | + this.config.getOidc().getMapper().getClaimsSeparatorMap().get(claim); |
| 131 | + |
| 132 | + result.addAll( |
| 133 | + Arrays.asList(claimValue.toString().split(separator)).stream() |
| 134 | + .map(s -> authorityPrefix + s) |
| 135 | + .map(SimpleGrantedAuthority::new) |
| 136 | + .collect(Collectors.toCollection(HashSet::new))); |
| 137 | + } else { |
| 138 | + result.add(new SimpleGrantedAuthority(authorityPrefix + claimValue.toString())); |
| 139 | + } |
| 140 | + |
| 141 | + } else if (claimValue |
| 142 | + instanceof Collection) { // claim is already a list so simply converted them to |
| 143 | + // GrantedAuthority |
| 144 | + result.addAll( |
| 145 | + ((Collection<?>) claimValue) |
| 146 | + .stream() |
| 147 | + .map(Object::toString) |
| 148 | + .map(s -> authorityPrefix + s) |
| 149 | + .map(SimpleGrantedAuthority::new) |
| 150 | + .collect(Collectors.toCollection(HashSet::new))); |
| 151 | + } else { // unknown type of claim cannot be processed |
| 152 | + this.log.error( |
| 153 | + String.format("Error: Claim %s in %type has an unknown type", claim, type)); |
| 154 | + } |
| 155 | + } |
| 156 | + return result; |
| 157 | + } |
40 | 158 | }
|
0 commit comments