swagger fixes
This commit is contained in:
@@ -12,14 +12,13 @@ import org.springframework.security.authentication.dao.DaoAuthenticationProvider
|
|||||||
import org.springframework.security.config.annotation.method.configuration.EnableMethodSecurity;
|
import org.springframework.security.config.annotation.method.configuration.EnableMethodSecurity;
|
||||||
import org.springframework.security.config.annotation.web.builders.HttpSecurity;
|
import org.springframework.security.config.annotation.web.builders.HttpSecurity;
|
||||||
import org.springframework.security.config.annotation.web.configuration.EnableWebSecurity;
|
import org.springframework.security.config.annotation.web.configuration.EnableWebSecurity;
|
||||||
|
import org.springframework.security.config.annotation.web.configuration.WebSecurityCustomizer;
|
||||||
import org.springframework.security.config.http.SessionCreationPolicy;
|
import org.springframework.security.config.http.SessionCreationPolicy;
|
||||||
import org.springframework.security.crypto.bcrypt.BCryptPasswordEncoder;
|
import org.springframework.security.crypto.bcrypt.BCryptPasswordEncoder;
|
||||||
import org.springframework.security.crypto.password.PasswordEncoder;
|
import org.springframework.security.crypto.password.PasswordEncoder;
|
||||||
import org.springframework.security.web.SecurityFilterChain;
|
import org.springframework.security.web.SecurityFilterChain;
|
||||||
import org.springframework.security.web.authentication.UsernamePasswordAuthenticationFilter;
|
import org.springframework.security.web.authentication.UsernamePasswordAuthenticationFilter;
|
||||||
import org.springframework.security.web.util.matcher.AntPathRequestMatcher;
|
import org.springframework.security.web.util.matcher.AntPathRequestMatcher;
|
||||||
import org.springframework.security.web.util.matcher.OrRequestMatcher;
|
|
||||||
import org.springframework.security.web.util.matcher.RequestMatcher;
|
|
||||||
import org.springframework.web.cors.CorsConfiguration;
|
import org.springframework.web.cors.CorsConfiguration;
|
||||||
import org.springframework.web.cors.CorsConfigurationSource;
|
import org.springframework.web.cors.CorsConfigurationSource;
|
||||||
import org.springframework.web.cors.UrlBasedCorsConfigurationSource;
|
import org.springframework.web.cors.UrlBasedCorsConfigurationSource;
|
||||||
@@ -54,19 +53,17 @@ public class AdminSecurityConfig {
|
|||||||
return new ProviderManager(adminAuthenticationProvider());
|
return new ProviderManager(adminAuthenticationProvider());
|
||||||
}
|
}
|
||||||
|
|
||||||
/** Permit Swagger UI and OpenAPI docs without authentication (public API documentation). */
|
/**
|
||||||
|
* Ignore Swagger/OpenAPI paths so they bypass Spring Security entirely (no 401).
|
||||||
|
* Using WebSecurityCustomizer is more reliable than a separate SecurityFilterChain on some environments (e.g. Railway).
|
||||||
|
*/
|
||||||
@Bean
|
@Bean
|
||||||
@Order(1)
|
public WebSecurityCustomizer webSecurityCustomizer() {
|
||||||
public SecurityFilterChain swaggerSecurityFilterChain(HttpSecurity http) throws Exception {
|
return web -> web.ignoring().requestMatchers(
|
||||||
RequestMatcher swaggerMatcher = new OrRequestMatcher(
|
|
||||||
new AntPathRequestMatcher("/swagger-ui/**"),
|
new AntPathRequestMatcher("/swagger-ui/**"),
|
||||||
new AntPathRequestMatcher("/v3/api-docs"),
|
new AntPathRequestMatcher("/v3/api-docs"),
|
||||||
new AntPathRequestMatcher("/v3/api-docs/**")
|
new AntPathRequestMatcher("/v3/api-docs/**")
|
||||||
);
|
);
|
||||||
http
|
|
||||||
.securityMatcher(swaggerMatcher)
|
|
||||||
.authorizeHttpRequests(auth -> auth.anyRequest().permitAll());
|
|
||||||
return http.build();
|
|
||||||
}
|
}
|
||||||
|
|
||||||
@Bean
|
@Bean
|
||||||
|
|||||||
Reference in New Issue
Block a user