123456789101112131415161718192021222324252627282930313233343536373839404142434445464748495051525354555657585960616263646566676869707172737475767778798081828384858687888990919293949596979899100101102103104105106107108109110111112113114115116117118119120121122123124125126127128129130131132133134135136137138139140141142143144145146147148149150151152153154155156157158159160161162163164165166167168169170171172173174175176177178179180181182183184185186187188189190191192193194195196197198199200201202203204205206207208209210211212213214215216217218219220221222223224225226227228229230231232233234235236237238239240241242243244245246247248249250251252253254255256257258259260261262263264265266267268269270271 |
- From e2993d93e109c1a3c9020b7ea9efb6e556751ed4 Mon Sep 17 00:00:00 2001
- From: Thomas Vitale <ThomasVitale@users.noreply.github.com>
- Date: Mon, 26 Apr 2021 18:13:20 +0200
- Subject: [PATCH 2/3] Make Csrf cookie secure flag configurable (WebFlux)
- Make the XSRF-TOKEN cookie secure flag configurable in CookieServerCsrfTokenRepository.
- Closes gh-9678
- ---
- .../csrf/CookieServerCsrfTokenRepository.java | 30 ++++--
- .../CookieServerCsrfTokenRepositoryTests.java | 100 ++++++++++++++++--
- 2 files changed, 113 insertions(+), 17 deletions(-)
- diff --git a/web/src/main/java/org/springframework/security/web/server/csrf/CookieServerCsrfTokenRepository.java b/web/src/main/java/org/springframework/security/web/server/csrf/CookieServerCsrfTokenRepository.java
- index 5910ff3e45..bc3a20e711 100644
- --- a/web/src/main/java/org/springframework/security/web/server/csrf/CookieServerCsrfTokenRepository.java
- +++ b/web/src/main/java/org/springframework/security/web/server/csrf/CookieServerCsrfTokenRepository.java
- @@ -1,5 +1,5 @@
- /*
- - * Copyright 2002-2019 the original author or authors.
- + * Copyright 2002-2021 the original author or authors.
- *
- * Licensed under the Apache License, Version 2.0 (the "License");
- * you may not use this file except in compliance with the License.
- @@ -34,6 +34,7 @@ import org.springframework.web.server.ServerWebExchange;
- * AngularJS. When using with AngularJS be sure to use {@link #withHttpOnlyFalse()} .
- *
- * @author Eric Deandrea
- + * @author Thomas Vitale
- * @since 5.1
- */
- public final class CookieServerCsrfTokenRepository implements ServerCsrfTokenRepository {
- @@ -54,6 +55,8 @@ public final class CookieServerCsrfTokenRepository implements ServerCsrfTokenRep
-
- private boolean cookieHttpOnly = true;
-
- + private Boolean secure;
- +
- /**
- * Factory method to conveniently create an instance that has
- * {@link #setCookieHttpOnly(boolean)} set to false.
- @@ -75,11 +78,16 @@ public final class CookieServerCsrfTokenRepository implements ServerCsrfTokenRep
- public Mono<Void> saveToken(ServerWebExchange exchange, CsrfToken token) {
- return Mono.fromRunnable(() -> {
- String tokenValue = (token != null) ? token.getToken() : "";
- - int maxAge = !tokenValue.isEmpty() ? -1 : 0;
- - String path = (this.cookiePath != null) ? this.cookiePath : getRequestContext(exchange.getRequest());
- - boolean secure = exchange.getRequest().getSslInfo() != null;
- - ResponseCookie cookie = ResponseCookie.from(this.cookieName, tokenValue).domain(this.cookieDomain)
- - .httpOnly(this.cookieHttpOnly).maxAge(maxAge).path(path).secure(secure).build();
- + // @formatter:off
- + ResponseCookie cookie = ResponseCookie
- + .from(this.cookieName, tokenValue)
- + .domain(this.cookieDomain)
- + .httpOnly(this.cookieHttpOnly)
- + .maxAge(!tokenValue.isEmpty() ? -1 : 0)
- + .path((this.cookiePath != null) ? this.cookiePath : getRequestContext(exchange.getRequest()))
- + .secure((this.secure != null) ? this.secure : (exchange.getRequest().getSslInfo() != null))
- + .build();
- + // @formatter:on
- exchange.getResponse().addCookie(cookie);
- });
- }
- @@ -146,6 +154,16 @@ public final class CookieServerCsrfTokenRepository implements ServerCsrfTokenRep
- this.cookieDomain = cookieDomain;
- }
-
- + /**
- + * Sets the cookie secure flag. If not set, the value depends on
- + * {@link ServerHttpRequest#getSslInfo()}.
- + * @param secure The value for the secure flag
- + * @since 5.5
- + */
- + public void setSecure(boolean secure) {
- + this.secure = secure;
- + }
- +
- private CsrfToken createCsrfToken() {
- return createCsrfToken(createNewToken());
- }
- diff --git a/web/src/test/java/org/springframework/security/web/server/csrf/CookieServerCsrfTokenRepositoryTests.java b/web/src/test/java/org/springframework/security/web/server/csrf/CookieServerCsrfTokenRepositoryTests.java
- index d16f131920..7160337053 100644
- --- a/web/src/test/java/org/springframework/security/web/server/csrf/CookieServerCsrfTokenRepositoryTests.java
- +++ b/web/src/test/java/org/springframework/security/web/server/csrf/CookieServerCsrfTokenRepositoryTests.java
- @@ -1,5 +1,5 @@
- /*
- - * Copyright 2002-2018 the original author or authors.
- + * Copyright 2002-2021 the original author or authors.
- *
- * Licensed under the Apache License, Version 2.0 (the "License");
- * you may not use this file except in compliance with the License.
- @@ -16,12 +16,15 @@
-
- package org.springframework.security.web.server.csrf;
-
- +import java.security.cert.X509Certificate;
- import java.time.Duration;
-
- +import org.junit.Before;
- import org.junit.Test;
-
- import org.springframework.http.HttpCookie;
- import org.springframework.http.ResponseCookie;
- +import org.springframework.http.server.reactive.SslInfo;
- import org.springframework.mock.http.server.reactive.MockServerHttpRequest;
- import org.springframework.mock.web.server.MockServerWebExchange;
- import org.springframework.util.StringUtils;
- @@ -30,13 +33,14 @@ import static org.assertj.core.api.Assertions.assertThat;
-
- /**
- * @author Eric Deandrea
- + * @author Thomas Vitale
- * @since 5.1
- */
- public class CookieServerCsrfTokenRepositoryTests {
-
- - private MockServerWebExchange exchange = MockServerWebExchange.from(MockServerHttpRequest.get("/someUri"));
- + private CookieServerCsrfTokenRepository csrfTokenRepository;
-
- - private CookieServerCsrfTokenRepository csrfTokenRepository = new CookieServerCsrfTokenRepository();
- + private MockServerHttpRequest.BaseBuilder<?> request;
-
- private String expectedHeaderName = CookieServerCsrfTokenRepository.DEFAULT_CSRF_HEADER_NAME;
-
- @@ -56,6 +60,12 @@ public class CookieServerCsrfTokenRepositoryTests {
-
- private String expectedCookieValue = "csrfToken";
-
- + @Before
- + public void setUp() {
- + this.csrfTokenRepository = new CookieServerCsrfTokenRepository();
- + this.request = MockServerHttpRequest.get("/someUri");
- + }
- +
- @Test
- public void generateTokenWhenDefaultThenDefaults() {
- generateTokenAndAssertExpectedValues();
- @@ -82,8 +92,9 @@ public class CookieServerCsrfTokenRepositoryTests {
-
- @Test
- public void saveTokenWhenNoSubscriptionThenNotWritten() {
- - this.csrfTokenRepository.saveToken(this.exchange, createToken());
- - assertThat(this.exchange.getResponse().getCookies().getFirst(this.expectedCookieName)).isNull();
- + MockServerWebExchange exchange = MockServerWebExchange.from(this.request);
- + this.csrfTokenRepository.saveToken(exchange, createToken());
- + assertThat(exchange.getResponse().getCookies().getFirst(this.expectedCookieName)).isNull();
- }
-
- @Test
- @@ -112,6 +123,56 @@ public class CookieServerCsrfTokenRepositoryTests {
- saveAndAssertExpectedValues(createToken());
- }
-
- + @Test
- + public void saveTokenWhenSslInfoPresentThenSecure() {
- + this.request.sslInfo(new MockSslInfo());
- + MockServerWebExchange exchange = MockServerWebExchange.from(this.request);
- + this.csrfTokenRepository.saveToken(exchange, createToken()).block();
- + ResponseCookie cookie = exchange.getResponse().getCookies().getFirst(this.expectedCookieName);
- + assertThat(cookie).isNotNull();
- + assertThat(cookie.isSecure()).isTrue();
- + }
- +
- + @Test
- + public void saveTokenWhenSslInfoNullThenNotSecure() {
- + MockServerWebExchange exchange = MockServerWebExchange.from(this.request);
- + this.csrfTokenRepository.saveToken(exchange, createToken()).block();
- + ResponseCookie cookie = exchange.getResponse().getCookies().getFirst(this.expectedCookieName);
- + assertThat(cookie).isNotNull();
- + assertThat(cookie.isSecure()).isFalse();
- + }
- +
- + @Test
- + public void saveTokenWhenSecureFlagTrueThenSecure() {
- + MockServerWebExchange exchange = MockServerWebExchange.from(this.request);
- + this.csrfTokenRepository.setSecure(true);
- + this.csrfTokenRepository.saveToken(exchange, createToken()).block();
- + ResponseCookie cookie = exchange.getResponse().getCookies().getFirst(this.expectedCookieName);
- + assertThat(cookie).isNotNull();
- + assertThat(cookie.isSecure()).isTrue();
- + }
- +
- + @Test
- + public void saveTokenWhenSecureFlagFalseThenNotSecure() {
- + MockServerWebExchange exchange = MockServerWebExchange.from(this.request);
- + this.csrfTokenRepository.setSecure(false);
- + this.csrfTokenRepository.saveToken(exchange, createToken()).block();
- + ResponseCookie cookie = exchange.getResponse().getCookies().getFirst(this.expectedCookieName);
- + assertThat(cookie).isNotNull();
- + assertThat(cookie.isSecure()).isFalse();
- + }
- +
- + @Test
- + public void saveTokenWhenSecureFlagFalseAndSslInfoThenNotSecure() {
- + MockServerWebExchange exchange = MockServerWebExchange.from(this.request);
- + this.request.sslInfo(new MockSslInfo());
- + this.csrfTokenRepository.setSecure(false);
- + this.csrfTokenRepository.saveToken(exchange, createToken()).block();
- + ResponseCookie cookie = exchange.getResponse().getCookies().getFirst(this.expectedCookieName);
- + assertThat(cookie).isNotNull();
- + assertThat(cookie.isSecure()).isFalse();
- + }
- +
- @Test
- public void loadTokenWhenCookieExistThenTokenFound() {
- loadAndAssertExpectedValues();
- @@ -127,7 +188,8 @@ public class CookieServerCsrfTokenRepositoryTests {
-
- @Test
- public void loadTokenWhenNoCookiesThenNullToken() {
- - CsrfToken csrfToken = this.csrfTokenRepository.loadToken(this.exchange).block();
- + MockServerWebExchange exchange = MockServerWebExchange.from(this.request);
- + CsrfToken csrfToken = this.csrfTokenRepository.loadToken(exchange).block();
- assertThat(csrfToken).isNull();
- }
-
- @@ -180,8 +242,8 @@ public class CookieServerCsrfTokenRepositoryTests {
- private void loadAndAssertExpectedValues() {
- MockServerHttpRequest.BodyBuilder request = MockServerHttpRequest.post("/someUri")
- .cookie(new HttpCookie(this.expectedCookieName, this.expectedCookieValue));
- - this.exchange = MockServerWebExchange.from(request);
- - CsrfToken csrfToken = this.csrfTokenRepository.loadToken(this.exchange).block();
- + MockServerWebExchange exchange = MockServerWebExchange.from(request);
- + CsrfToken csrfToken = this.csrfTokenRepository.loadToken(exchange).block();
- if (StringUtils.hasText(this.expectedCookieValue)) {
- assertThat(csrfToken).isNotNull();
- assertThat(csrfToken.getHeaderName()).isEqualTo(this.expectedHeaderName);
- @@ -198,8 +260,9 @@ public class CookieServerCsrfTokenRepositoryTests {
- this.expectedMaxAge = Duration.ofSeconds(0);
- this.expectedCookieValue = "";
- }
- - this.csrfTokenRepository.saveToken(this.exchange, token).block();
- - ResponseCookie cookie = this.exchange.getResponse().getCookies().getFirst(this.expectedCookieName);
- + MockServerWebExchange exchange = MockServerWebExchange.from(this.request);
- + this.csrfTokenRepository.saveToken(exchange, token).block();
- + ResponseCookie cookie = exchange.getResponse().getCookies().getFirst(this.expectedCookieName);
- assertThat(cookie).isNotNull();
- assertThat(cookie.getMaxAge()).isEqualTo(this.expectedMaxAge);
- assertThat(cookie.getDomain()).isEqualTo(this.expectedDomain);
- @@ -211,7 +274,8 @@ public class CookieServerCsrfTokenRepositoryTests {
- }
-
- private void generateTokenAndAssertExpectedValues() {
- - CsrfToken csrfToken = this.csrfTokenRepository.generateToken(this.exchange).block();
- + MockServerWebExchange exchange = MockServerWebExchange.from(this.request);
- + CsrfToken csrfToken = this.csrfTokenRepository.generateToken(exchange).block();
- assertThat(csrfToken).isNotNull();
- assertThat(csrfToken.getHeaderName()).isEqualTo(this.expectedHeaderName);
- assertThat(csrfToken.getParameterName()).isEqualTo(this.expectedParameterName);
- @@ -226,4 +290,18 @@ public class CookieServerCsrfTokenRepositoryTests {
- return new DefaultCsrfToken(headerName, parameterName, tokenValue);
- }
-
- + static class MockSslInfo implements SslInfo {
- +
- + @Override
- + public String getSessionId() {
- + return "sessionId";
- + }
- +
- + @Override
- + public X509Certificate[] getPeerCertificates() {
- + return new X509Certificate[] {};
- + }
- +
- + }
- +
- }
- --
- 2.24.1
|