0002-Make-Csrf-cookie-secure-flag-configurable-WebFlux.patch 12 KB

123456789101112131415161718192021222324252627282930313233343536373839404142434445464748495051525354555657585960616263646566676869707172737475767778798081828384858687888990919293949596979899100101102103104105106107108109110111112113114115116117118119120121122123124125126127128129130131132133134135136137138139140141142143144145146147148149150151152153154155156157158159160161162163164165166167168169170171172173174175176177178179180181182183184185186187188189190191192193194195196197198199200201202203204205206207208209210211212213214215216217218219220221222223224225226227228229230231232233234235236237238239240241242243244245246247248249250251252253254255256257258259260261262263264265266267268269270271
  1. From e2993d93e109c1a3c9020b7ea9efb6e556751ed4 Mon Sep 17 00:00:00 2001
  2. From: Thomas Vitale <ThomasVitale@users.noreply.github.com>
  3. Date: Mon, 26 Apr 2021 18:13:20 +0200
  4. Subject: [PATCH 2/3] Make Csrf cookie secure flag configurable (WebFlux)
  5. Make the XSRF-TOKEN cookie secure flag configurable in CookieServerCsrfTokenRepository.
  6. Closes gh-9678
  7. ---
  8. .../csrf/CookieServerCsrfTokenRepository.java | 30 ++++--
  9. .../CookieServerCsrfTokenRepositoryTests.java | 100 ++++++++++++++++--
  10. 2 files changed, 113 insertions(+), 17 deletions(-)
  11. diff --git a/web/src/main/java/org/springframework/security/web/server/csrf/CookieServerCsrfTokenRepository.java b/web/src/main/java/org/springframework/security/web/server/csrf/CookieServerCsrfTokenRepository.java
  12. index 5910ff3e45..bc3a20e711 100644
  13. --- a/web/src/main/java/org/springframework/security/web/server/csrf/CookieServerCsrfTokenRepository.java
  14. +++ b/web/src/main/java/org/springframework/security/web/server/csrf/CookieServerCsrfTokenRepository.java
  15. @@ -1,5 +1,5 @@
  16. /*
  17. - * Copyright 2002-2019 the original author or authors.
  18. + * Copyright 2002-2021 the original author or authors.
  19. *
  20. * Licensed under the Apache License, Version 2.0 (the "License");
  21. * you may not use this file except in compliance with the License.
  22. @@ -34,6 +34,7 @@ import org.springframework.web.server.ServerWebExchange;
  23. * AngularJS. When using with AngularJS be sure to use {@link #withHttpOnlyFalse()} .
  24. *
  25. * @author Eric Deandrea
  26. + * @author Thomas Vitale
  27. * @since 5.1
  28. */
  29. public final class CookieServerCsrfTokenRepository implements ServerCsrfTokenRepository {
  30. @@ -54,6 +55,8 @@ public final class CookieServerCsrfTokenRepository implements ServerCsrfTokenRep
  31. private boolean cookieHttpOnly = true;
  32. + private Boolean secure;
  33. +
  34. /**
  35. * Factory method to conveniently create an instance that has
  36. * {@link #setCookieHttpOnly(boolean)} set to false.
  37. @@ -75,11 +78,16 @@ public final class CookieServerCsrfTokenRepository implements ServerCsrfTokenRep
  38. public Mono<Void> saveToken(ServerWebExchange exchange, CsrfToken token) {
  39. return Mono.fromRunnable(() -> {
  40. String tokenValue = (token != null) ? token.getToken() : "";
  41. - int maxAge = !tokenValue.isEmpty() ? -1 : 0;
  42. - String path = (this.cookiePath != null) ? this.cookiePath : getRequestContext(exchange.getRequest());
  43. - boolean secure = exchange.getRequest().getSslInfo() != null;
  44. - ResponseCookie cookie = ResponseCookie.from(this.cookieName, tokenValue).domain(this.cookieDomain)
  45. - .httpOnly(this.cookieHttpOnly).maxAge(maxAge).path(path).secure(secure).build();
  46. + // @formatter:off
  47. + ResponseCookie cookie = ResponseCookie
  48. + .from(this.cookieName, tokenValue)
  49. + .domain(this.cookieDomain)
  50. + .httpOnly(this.cookieHttpOnly)
  51. + .maxAge(!tokenValue.isEmpty() ? -1 : 0)
  52. + .path((this.cookiePath != null) ? this.cookiePath : getRequestContext(exchange.getRequest()))
  53. + .secure((this.secure != null) ? this.secure : (exchange.getRequest().getSslInfo() != null))
  54. + .build();
  55. + // @formatter:on
  56. exchange.getResponse().addCookie(cookie);
  57. });
  58. }
  59. @@ -146,6 +154,16 @@ public final class CookieServerCsrfTokenRepository implements ServerCsrfTokenRep
  60. this.cookieDomain = cookieDomain;
  61. }
  62. + /**
  63. + * Sets the cookie secure flag. If not set, the value depends on
  64. + * {@link ServerHttpRequest#getSslInfo()}.
  65. + * @param secure The value for the secure flag
  66. + * @since 5.5
  67. + */
  68. + public void setSecure(boolean secure) {
  69. + this.secure = secure;
  70. + }
  71. +
  72. private CsrfToken createCsrfToken() {
  73. return createCsrfToken(createNewToken());
  74. }
  75. diff --git a/web/src/test/java/org/springframework/security/web/server/csrf/CookieServerCsrfTokenRepositoryTests.java b/web/src/test/java/org/springframework/security/web/server/csrf/CookieServerCsrfTokenRepositoryTests.java
  76. index d16f131920..7160337053 100644
  77. --- a/web/src/test/java/org/springframework/security/web/server/csrf/CookieServerCsrfTokenRepositoryTests.java
  78. +++ b/web/src/test/java/org/springframework/security/web/server/csrf/CookieServerCsrfTokenRepositoryTests.java
  79. @@ -1,5 +1,5 @@
  80. /*
  81. - * Copyright 2002-2018 the original author or authors.
  82. + * Copyright 2002-2021 the original author or authors.
  83. *
  84. * Licensed under the Apache License, Version 2.0 (the "License");
  85. * you may not use this file except in compliance with the License.
  86. @@ -16,12 +16,15 @@
  87. package org.springframework.security.web.server.csrf;
  88. +import java.security.cert.X509Certificate;
  89. import java.time.Duration;
  90. +import org.junit.Before;
  91. import org.junit.Test;
  92. import org.springframework.http.HttpCookie;
  93. import org.springframework.http.ResponseCookie;
  94. +import org.springframework.http.server.reactive.SslInfo;
  95. import org.springframework.mock.http.server.reactive.MockServerHttpRequest;
  96. import org.springframework.mock.web.server.MockServerWebExchange;
  97. import org.springframework.util.StringUtils;
  98. @@ -30,13 +33,14 @@ import static org.assertj.core.api.Assertions.assertThat;
  99. /**
  100. * @author Eric Deandrea
  101. + * @author Thomas Vitale
  102. * @since 5.1
  103. */
  104. public class CookieServerCsrfTokenRepositoryTests {
  105. - private MockServerWebExchange exchange = MockServerWebExchange.from(MockServerHttpRequest.get("/someUri"));
  106. + private CookieServerCsrfTokenRepository csrfTokenRepository;
  107. - private CookieServerCsrfTokenRepository csrfTokenRepository = new CookieServerCsrfTokenRepository();
  108. + private MockServerHttpRequest.BaseBuilder<?> request;
  109. private String expectedHeaderName = CookieServerCsrfTokenRepository.DEFAULT_CSRF_HEADER_NAME;
  110. @@ -56,6 +60,12 @@ public class CookieServerCsrfTokenRepositoryTests {
  111. private String expectedCookieValue = "csrfToken";
  112. + @Before
  113. + public void setUp() {
  114. + this.csrfTokenRepository = new CookieServerCsrfTokenRepository();
  115. + this.request = MockServerHttpRequest.get("/someUri");
  116. + }
  117. +
  118. @Test
  119. public void generateTokenWhenDefaultThenDefaults() {
  120. generateTokenAndAssertExpectedValues();
  121. @@ -82,8 +92,9 @@ public class CookieServerCsrfTokenRepositoryTests {
  122. @Test
  123. public void saveTokenWhenNoSubscriptionThenNotWritten() {
  124. - this.csrfTokenRepository.saveToken(this.exchange, createToken());
  125. - assertThat(this.exchange.getResponse().getCookies().getFirst(this.expectedCookieName)).isNull();
  126. + MockServerWebExchange exchange = MockServerWebExchange.from(this.request);
  127. + this.csrfTokenRepository.saveToken(exchange, createToken());
  128. + assertThat(exchange.getResponse().getCookies().getFirst(this.expectedCookieName)).isNull();
  129. }
  130. @Test
  131. @@ -112,6 +123,56 @@ public class CookieServerCsrfTokenRepositoryTests {
  132. saveAndAssertExpectedValues(createToken());
  133. }
  134. + @Test
  135. + public void saveTokenWhenSslInfoPresentThenSecure() {
  136. + this.request.sslInfo(new MockSslInfo());
  137. + MockServerWebExchange exchange = MockServerWebExchange.from(this.request);
  138. + this.csrfTokenRepository.saveToken(exchange, createToken()).block();
  139. + ResponseCookie cookie = exchange.getResponse().getCookies().getFirst(this.expectedCookieName);
  140. + assertThat(cookie).isNotNull();
  141. + assertThat(cookie.isSecure()).isTrue();
  142. + }
  143. +
  144. + @Test
  145. + public void saveTokenWhenSslInfoNullThenNotSecure() {
  146. + MockServerWebExchange exchange = MockServerWebExchange.from(this.request);
  147. + this.csrfTokenRepository.saveToken(exchange, createToken()).block();
  148. + ResponseCookie cookie = exchange.getResponse().getCookies().getFirst(this.expectedCookieName);
  149. + assertThat(cookie).isNotNull();
  150. + assertThat(cookie.isSecure()).isFalse();
  151. + }
  152. +
  153. + @Test
  154. + public void saveTokenWhenSecureFlagTrueThenSecure() {
  155. + MockServerWebExchange exchange = MockServerWebExchange.from(this.request);
  156. + this.csrfTokenRepository.setSecure(true);
  157. + this.csrfTokenRepository.saveToken(exchange, createToken()).block();
  158. + ResponseCookie cookie = exchange.getResponse().getCookies().getFirst(this.expectedCookieName);
  159. + assertThat(cookie).isNotNull();
  160. + assertThat(cookie.isSecure()).isTrue();
  161. + }
  162. +
  163. + @Test
  164. + public void saveTokenWhenSecureFlagFalseThenNotSecure() {
  165. + MockServerWebExchange exchange = MockServerWebExchange.from(this.request);
  166. + this.csrfTokenRepository.setSecure(false);
  167. + this.csrfTokenRepository.saveToken(exchange, createToken()).block();
  168. + ResponseCookie cookie = exchange.getResponse().getCookies().getFirst(this.expectedCookieName);
  169. + assertThat(cookie).isNotNull();
  170. + assertThat(cookie.isSecure()).isFalse();
  171. + }
  172. +
  173. + @Test
  174. + public void saveTokenWhenSecureFlagFalseAndSslInfoThenNotSecure() {
  175. + MockServerWebExchange exchange = MockServerWebExchange.from(this.request);
  176. + this.request.sslInfo(new MockSslInfo());
  177. + this.csrfTokenRepository.setSecure(false);
  178. + this.csrfTokenRepository.saveToken(exchange, createToken()).block();
  179. + ResponseCookie cookie = exchange.getResponse().getCookies().getFirst(this.expectedCookieName);
  180. + assertThat(cookie).isNotNull();
  181. + assertThat(cookie.isSecure()).isFalse();
  182. + }
  183. +
  184. @Test
  185. public void loadTokenWhenCookieExistThenTokenFound() {
  186. loadAndAssertExpectedValues();
  187. @@ -127,7 +188,8 @@ public class CookieServerCsrfTokenRepositoryTests {
  188. @Test
  189. public void loadTokenWhenNoCookiesThenNullToken() {
  190. - CsrfToken csrfToken = this.csrfTokenRepository.loadToken(this.exchange).block();
  191. + MockServerWebExchange exchange = MockServerWebExchange.from(this.request);
  192. + CsrfToken csrfToken = this.csrfTokenRepository.loadToken(exchange).block();
  193. assertThat(csrfToken).isNull();
  194. }
  195. @@ -180,8 +242,8 @@ public class CookieServerCsrfTokenRepositoryTests {
  196. private void loadAndAssertExpectedValues() {
  197. MockServerHttpRequest.BodyBuilder request = MockServerHttpRequest.post("/someUri")
  198. .cookie(new HttpCookie(this.expectedCookieName, this.expectedCookieValue));
  199. - this.exchange = MockServerWebExchange.from(request);
  200. - CsrfToken csrfToken = this.csrfTokenRepository.loadToken(this.exchange).block();
  201. + MockServerWebExchange exchange = MockServerWebExchange.from(request);
  202. + CsrfToken csrfToken = this.csrfTokenRepository.loadToken(exchange).block();
  203. if (StringUtils.hasText(this.expectedCookieValue)) {
  204. assertThat(csrfToken).isNotNull();
  205. assertThat(csrfToken.getHeaderName()).isEqualTo(this.expectedHeaderName);
  206. @@ -198,8 +260,9 @@ public class CookieServerCsrfTokenRepositoryTests {
  207. this.expectedMaxAge = Duration.ofSeconds(0);
  208. this.expectedCookieValue = "";
  209. }
  210. - this.csrfTokenRepository.saveToken(this.exchange, token).block();
  211. - ResponseCookie cookie = this.exchange.getResponse().getCookies().getFirst(this.expectedCookieName);
  212. + MockServerWebExchange exchange = MockServerWebExchange.from(this.request);
  213. + this.csrfTokenRepository.saveToken(exchange, token).block();
  214. + ResponseCookie cookie = exchange.getResponse().getCookies().getFirst(this.expectedCookieName);
  215. assertThat(cookie).isNotNull();
  216. assertThat(cookie.getMaxAge()).isEqualTo(this.expectedMaxAge);
  217. assertThat(cookie.getDomain()).isEqualTo(this.expectedDomain);
  218. @@ -211,7 +274,8 @@ public class CookieServerCsrfTokenRepositoryTests {
  219. }
  220. private void generateTokenAndAssertExpectedValues() {
  221. - CsrfToken csrfToken = this.csrfTokenRepository.generateToken(this.exchange).block();
  222. + MockServerWebExchange exchange = MockServerWebExchange.from(this.request);
  223. + CsrfToken csrfToken = this.csrfTokenRepository.generateToken(exchange).block();
  224. assertThat(csrfToken).isNotNull();
  225. assertThat(csrfToken.getHeaderName()).isEqualTo(this.expectedHeaderName);
  226. assertThat(csrfToken.getParameterName()).isEqualTo(this.expectedParameterName);
  227. @@ -226,4 +290,18 @@ public class CookieServerCsrfTokenRepositoryTests {
  228. return new DefaultCsrfToken(headerName, parameterName, tokenValue);
  229. }
  230. + static class MockSslInfo implements SslInfo {
  231. +
  232. + @Override
  233. + public String getSessionId() {
  234. + return "sessionId";
  235. + }
  236. +
  237. + @Override
  238. + public X509Certificate[] getPeerCertificates() {
  239. + return new X509Certificate[] {};
  240. + }
  241. +
  242. + }
  243. +
  244. }
  245. --
  246. 2.24.1