Browse Source
This introduces an evolution on CsrfConfigurer#ignoreAntMatchers, allowing users to specify a RequestMatcher in the circumstance where more than just the path needs to be analyzed to determine whether CsrfFilter should require a token for the request. Simply put, a user can now selectively disable csrf by request matcher in addition to the way it can already be done with ant matchers. Fixes: gh-5477pull/5524/head
2 changed files with 158 additions and 2 deletions
@ -0,0 +1,127 @@ |
|||||||
|
/* |
||||||
|
* Copyright 2002-2018 the original author or authors. |
||||||
|
* |
||||||
|
* Licensed under the Apache License, Version 2.0 (the "License"); |
||||||
|
* you may not use this file except in compliance with the License. |
||||||
|
* You may obtain a copy of the License at |
||||||
|
* |
||||||
|
* http://www.apache.org/licenses/LICENSE-2.0
|
||||||
|
* |
||||||
|
* Unless required by applicable law or agreed to in writing, software |
||||||
|
* distributed under the License is distributed on an "AS IS" BASIS, |
||||||
|
* WITHOUT WARRANTIES OR CONDITIONS OF ANY KIND, either express or implied. |
||||||
|
* See the License for the specific language governing permissions and |
||||||
|
* limitations under the License. |
||||||
|
*/ |
||||||
|
|
||||||
|
package org.springframework.security.config.annotation.web.configurers; |
||||||
|
|
||||||
|
import org.junit.Rule; |
||||||
|
import org.junit.Test; |
||||||
|
|
||||||
|
import org.springframework.beans.factory.annotation.Autowired; |
||||||
|
import org.springframework.http.HttpMethod; |
||||||
|
import org.springframework.security.config.annotation.web.builders.HttpSecurity; |
||||||
|
import org.springframework.security.config.annotation.web.configuration.EnableWebSecurity; |
||||||
|
import org.springframework.security.config.annotation.web.configuration.WebSecurityConfigurerAdapter; |
||||||
|
import org.springframework.security.config.test.SpringTestRule; |
||||||
|
import org.springframework.security.web.util.matcher.AntPathRequestMatcher; |
||||||
|
import org.springframework.security.web.util.matcher.RequestMatcher; |
||||||
|
import org.springframework.test.web.servlet.MockMvc; |
||||||
|
import org.springframework.web.bind.annotation.RequestMapping; |
||||||
|
import org.springframework.web.bind.annotation.RestController; |
||||||
|
|
||||||
|
import static org.springframework.test.web.servlet.request.MockMvcRequestBuilders.get; |
||||||
|
import static org.springframework.test.web.servlet.request.MockMvcRequestBuilders.post; |
||||||
|
import static org.springframework.test.web.servlet.request.MockMvcRequestBuilders.put; |
||||||
|
import static org.springframework.test.web.servlet.result.MockMvcResultMatchers.status; |
||||||
|
|
||||||
|
/** |
||||||
|
* @author Josh Cummings |
||||||
|
*/ |
||||||
|
public class CsrfConfigurerIgnoringRequestMatchersTests { |
||||||
|
|
||||||
|
@Autowired |
||||||
|
MockMvc mvc; |
||||||
|
|
||||||
|
@Rule |
||||||
|
public final SpringTestRule spring = new SpringTestRule(); |
||||||
|
|
||||||
|
@Test |
||||||
|
public void requestWhenIgnoringRequestMatchersThenAugmentedByConfiguredRequestMatcher() |
||||||
|
throws Exception { |
||||||
|
this.spring.register(IgnoringRequestMatchers.class, BasicController.class).autowire(); |
||||||
|
|
||||||
|
this.mvc.perform(get("/path")) |
||||||
|
.andExpect(status().isForbidden()); |
||||||
|
|
||||||
|
this.mvc.perform(post("/path")) |
||||||
|
.andExpect(status().isOk()); |
||||||
|
} |
||||||
|
|
||||||
|
@EnableWebSecurity |
||||||
|
static class IgnoringRequestMatchers extends WebSecurityConfigurerAdapter { |
||||||
|
RequestMatcher requestMatcher = |
||||||
|
request -> HttpMethod.POST.name().equals(request.getMethod()); |
||||||
|
|
||||||
|
@Override |
||||||
|
protected void configure(HttpSecurity http) throws Exception { |
||||||
|
// @formatter:off
|
||||||
|
http |
||||||
|
.csrf() |
||||||
|
.requireCsrfProtectionMatcher(new AntPathRequestMatcher("/path")) |
||||||
|
.ignoringRequestMatchers(this.requestMatcher); |
||||||
|
// @formatter:on
|
||||||
|
} |
||||||
|
} |
||||||
|
|
||||||
|
@Test |
||||||
|
public void requestWhenIgnoringRequestMatcherThenUnionsWithConfiguredIgnoringAntMatchers() |
||||||
|
throws Exception { |
||||||
|
|
||||||
|
this.spring.register(IgnoringPathsAndMatchers.class, BasicController.class).autowire(); |
||||||
|
|
||||||
|
this.mvc.perform(put("/csrf")) |
||||||
|
.andExpect(status().isForbidden()); |
||||||
|
|
||||||
|
this.mvc.perform(post("/csrf")) |
||||||
|
.andExpect(status().isOk()); |
||||||
|
|
||||||
|
this.mvc.perform(put("/no-csrf")) |
||||||
|
.andExpect(status().isOk()); |
||||||
|
} |
||||||
|
|
||||||
|
@EnableWebSecurity |
||||||
|
static class IgnoringPathsAndMatchers extends WebSecurityConfigurerAdapter { |
||||||
|
RequestMatcher requestMatcher = |
||||||
|
request -> HttpMethod.POST.name().equals(request.getMethod()); |
||||||
|
|
||||||
|
@Override |
||||||
|
protected void configure(HttpSecurity http) throws Exception { |
||||||
|
// @formatter:off
|
||||||
|
http |
||||||
|
.csrf() |
||||||
|
.ignoringAntMatchers("/no-csrf") |
||||||
|
.ignoringRequestMatchers(this.requestMatcher); |
||||||
|
// @formatter:on
|
||||||
|
} |
||||||
|
} |
||||||
|
|
||||||
|
@RestController |
||||||
|
public static class BasicController { |
||||||
|
@RequestMapping("/path") |
||||||
|
public String path() { |
||||||
|
return "path"; |
||||||
|
} |
||||||
|
|
||||||
|
@RequestMapping("/csrf") |
||||||
|
public String csrf() { |
||||||
|
return "csrf"; |
||||||
|
} |
||||||
|
|
||||||
|
@RequestMapping("/no-csrf") |
||||||
|
public String noCsrf() { |
||||||
|
return "no-csrf"; |
||||||
|
} |
||||||
|
} |
||||||
|
} |
||||||
Loading…
Reference in new issue