我有一个托管在 Heroku 上的 Spring Boot API,当我尝试通过 Google Chrome 中的 Angular 应用程序访问它时(在 Firefox 中工作正常),我面临以下问题:
JSESSIONID cookie 似乎被阻止,因为它没有设置为 SameSite=None。但如何将其设置为 SameSite=None 呢?
以下是我的配置类:
安全配置:
@Configuration
@EnableWebSecurity
@Order(SecurityProperties.DEFAULT_FILTER_ORDER)
public class SecurityConfig extends WebSecurityConfigurerAdapter {
@Autowired
private ClienteUserDetailsService clienteUserDetailsService;
private static final String[] PUBLIC_MATCHERS = {"/login", "/logout", "/error.html", "/error"};
private static final String[] PUBLIC_MATCHERS_GET = {"/login", "/logout", "/error.html", "/error"};
private static final String[] PUBLIC_MATCHERS_POST = {"/login", "/logout"};
@Override
protected void configure(HttpSecurity http) throws Exception {
http.csrf().disable()
.authorizeRequests()
.antMatchers(HttpMethod.POST, PUBLIC_MATCHERS_POST).permitAll()
.antMatchers(HttpMethod.GET, PUBLIC_MATCHERS_GET).permitAll()
.antMatchers(PUBLIC_MATCHERS).permitAll()
.antMatchers(HttpMethod.OPTIONS, "/**").permitAll()
.anyRequest().authenticated()
.and().formLogin()
.and().httpBasic()
.and().logout().logoutUrl("/logout").logoutSuccessHandler((new HttpStatusReturningLogoutSuccessHandler(HttpStatus.OK)))
.clearAuthentication(true).invalidateHttpSession(true)
.deleteCookies("JSESSIONID", "XSRF-TOKEN");
}
private CsrfTokenRepository getCsrfTokenRepository() {
CookieCsrfTokenRepository tokenRepository = CookieCsrfTokenRepository.withHttpOnlyFalse();
tokenRepository.setCookiePath("/");
return tokenRepository;
}
@Override
protected void configure(AuthenticationManagerBuilder builder) throws Exception {
builder.userDetailsService(clienteUserDetailsService)
.passwordEncoder(passwordEncoder());
}
@Bean
public WebMvcConfigurer corsConfigurer() {
return new WebMvcConfigurerAdapter() {
@Override
public void addCorsMappings(CorsRegistry registry) {
registry.addMapping("**")
.allowedOrigins("http://localhost:4200", "https://dogwalk-teste.web.app")
.allowedMethods("POST, GET, PUT, OPTIONS, DELETE, PATCH")
.allowCredentials(true);
}
};
}
@Bean
public PasswordEncoder passwordEncoder() {
return new BCryptPasswordEncoder();
}
}
过滤器:
@Component
@Order(Ordered.HIGHEST_PRECEDENCE)
public class CorsFilter implements Filter {
@Context
public void doFilter(ServletRequest req, ServletResponse res, FilterChain chain)
throws IOException, ServletException {
HttpServletRequest request = (HttpServletRequest) req;
HttpServletResponse response = (HttpServletResponse) res;
response.setHeader("Access-Control-Allow-Origin", request.getHeader("Origin"));
response.setHeader("Access-Control-Allow-Credentials", "true");
response.setHeader("Access-Control-Allow-Methods", "POST, GET, PUT, OPTIONS, DELETE, PATCH");
response.setHeader("Access-Control-Max-Age", "3600");
response.setHeader("Access-Control-Allow-Headers",
"X-PINGOTHER, Content-Type, X-Requested-With, Accept, Origin, Access-Control-Request-Method, "
+ "Access-Control-Request-Headers, Authorization, if-modified-since, remember-me, "
+ "x-csrf-token, x-xsrf-token, xsrf-token ");
response.addHeader("Access-Control-Expose-Headers", "xsrf-token");
response.addHeader("Access-Control-Allow-Headers", "x-csrf-token, x-xsrf-token");
response.setHeader("Set-Cookie", "locale=pt-BR; HttpOnly; Secure; SameSite=None;");
chain.doFilter(req, res);
}
@Override
public void init(FilterConfig filterConfig) throws ServletException {
}
@Override
public void destroy() {
}
}