diff --git a/pom.xml b/pom.xml
index 49ac77e..ffd641d 100644
--- a/pom.xml
+++ b/pom.xml
@@ -43,6 +43,10 @@
org.springframework.boot
spring-boot-starter-security
+
+ org.springframework.boot
+ spring-boot-starter-oauth2-client
+
org.projectlombok
diff --git a/src/main/java/com/faf223/expensetrackerfaf/config/SecurityConfiguration.java b/src/main/java/com/faf223/expensetrackerfaf/config/SecurityConfiguration.java
index 430f3ff..c95f0f8 100644
--- a/src/main/java/com/faf223/expensetrackerfaf/config/SecurityConfiguration.java
+++ b/src/main/java/com/faf223/expensetrackerfaf/config/SecurityConfiguration.java
@@ -1,13 +1,25 @@
package com.faf223.expensetrackerfaf.config;
import lombok.RequiredArgsConstructor;
+import org.springframework.beans.factory.annotation.Value;
import org.springframework.context.annotation.Bean;
import org.springframework.context.annotation.Configuration;
import org.springframework.security.authentication.AuthenticationProvider;
+import org.springframework.security.config.Customizer;
import org.springframework.security.config.annotation.method.configuration.EnableMethodSecurity;
import org.springframework.security.config.annotation.web.builders.HttpSecurity;
import org.springframework.security.config.annotation.web.configuration.EnableWebSecurity;
+import org.springframework.security.config.annotation.web.configurers.AbstractHttpConfigurer;
import org.springframework.security.config.http.SessionCreationPolicy;
+import org.springframework.security.oauth2.client.registration.ClientRegistration;
+import org.springframework.security.oauth2.client.registration.ClientRegistrationRepository;
+import org.springframework.security.oauth2.client.registration.InMemoryClientRegistrationRepository;
+import org.springframework.security.oauth2.client.userinfo.DefaultOAuth2UserService;
+import org.springframework.security.oauth2.client.userinfo.OAuth2UserRequest;
+import org.springframework.security.oauth2.client.userinfo.OAuth2UserService;
+import org.springframework.security.oauth2.core.AuthorizationGrantType;
+import org.springframework.security.oauth2.core.oidc.IdTokenClaimNames;
+import org.springframework.security.oauth2.core.user.OAuth2User;
import org.springframework.security.web.SecurityFilterChain;
import org.springframework.security.web.authentication.UsernamePasswordAuthenticationFilter;
@@ -23,7 +35,7 @@ public class SecurityConfiguration {
@Bean
public SecurityFilterChain securityFilterChain(HttpSecurity http) throws Exception {
http
- .csrf(csrf -> csrf.disable())
+ .csrf(AbstractHttpConfigurer::disable)
.authorizeHttpRequests(auth -> auth
.requestMatchers("/api/v1/auth/**").permitAll()
.anyRequest().authenticated()
@@ -31,7 +43,34 @@ public class SecurityConfiguration {
.sessionManagement(session -> session.sessionCreationPolicy(SessionCreationPolicy.STATELESS))
.authenticationProvider(authenticationProvider)
.addFilterBefore(jwtAuthFilter, UsernamePasswordAuthenticationFilter.class); // will be executed before UsernamePasswordAuthenticationFilter
+// .oauth2Login(Customizer.withDefaults());
return http.build();
}
+
+ @Bean
+ public ClientRegistrationRepository clientRegistrationRepository(
+ @Value("${spring.security.oauth2.client.registration.google.client-id}") String clientId,
+ @Value("${spring.security.oauth2.client.registration.google.client-secret}") String clientSecret) {
+
+ ClientRegistration registration = ClientRegistration.withRegistrationId("google")
+ .clientId(clientId)
+ .clientSecret(clientSecret)
+ .clientName("Google")
+ .authorizationGrantType(AuthorizationGrantType.AUTHORIZATION_CODE)
+ .redirectUri("http://localhost:8081/login/oauth2/code/{registrationId}")
+ .scope("openid", "profile", "email")
+ .authorizationUri("https://accounts.google.com/o/oauth2/auth")
+ .tokenUri("https://accounts.google.com/o/oauth2/token")
+ .userInfoUri("https://www.googleapis.com/oauth2/v3/userinfo")
+ .userNameAttributeName(IdTokenClaimNames.SUB)
+ .build();
+
+ return new InMemoryClientRegistrationRepository(registration);
+ }
+
+ @Bean
+ public OAuth2UserService oAuth2UserService() {
+ return new DefaultOAuth2UserService();
+ }
}