|
1 | 1 | /*
|
2 |
| - * Copyright 2002-2021 the original author or authors. |
| 2 | + * Copyright 2002-2022 the original author or authors. |
3 | 3 | *
|
4 | 4 | * Licensed under the Apache License, Version 2.0 (the "License");
|
5 | 5 | * you may not use this file except in compliance with the License.
|
|
30 | 30 | import org.springframework.context.annotation.Configuration;
|
31 | 31 | import org.springframework.http.HttpMethod;
|
32 | 32 | import org.springframework.mock.web.MockHttpSession;
|
| 33 | +import org.springframework.security.config.Customizer; |
33 | 34 | import org.springframework.security.config.annotation.authentication.builders.AuthenticationManagerBuilder;
|
34 | 35 | import org.springframework.security.config.annotation.web.builders.HttpSecurity;
|
35 | 36 | import org.springframework.security.config.annotation.web.configuration.EnableWebSecurity;
|
|
38 | 39 | import org.springframework.security.config.test.SpringTestContextExtension;
|
39 | 40 | import org.springframework.security.core.Authentication;
|
40 | 41 | import org.springframework.security.core.userdetails.PasswordEncodedUser;
|
| 42 | +import org.springframework.security.web.SecurityFilterChain; |
41 | 43 | import org.springframework.security.web.access.AccessDeniedHandler;
|
42 | 44 | import org.springframework.security.web.authentication.session.SessionAuthenticationStrategy;
|
| 45 | +import org.springframework.security.web.csrf.CsrfToken; |
43 | 46 | import org.springframework.security.web.csrf.CsrfTokenRepository;
|
| 47 | +import org.springframework.security.web.csrf.CsrfTokenRequestProcessor; |
44 | 48 | import org.springframework.security.web.csrf.DefaultCsrfToken;
|
| 49 | +import org.springframework.security.web.csrf.XorCsrfTokenRequestProcessor; |
45 | 50 | import org.springframework.security.web.firewall.StrictHttpFirewall;
|
46 | 51 | import org.springframework.security.web.util.matcher.AntPathRequestMatcher;
|
47 | 52 | import org.springframework.security.web.util.matcher.RequestMatcher;
|
|
55 | 60 |
|
56 | 61 | import static org.assertj.core.api.Assertions.assertThat;
|
57 | 62 | import static org.assertj.core.api.Assertions.assertThatExceptionOfType;
|
| 63 | +import static org.hamcrest.Matchers.containsString; |
| 64 | +import static org.hamcrest.Matchers.not; |
58 | 65 | import static org.mockito.ArgumentMatchers.any;
|
| 66 | +import static org.mockito.ArgumentMatchers.eq; |
59 | 67 | import static org.mockito.ArgumentMatchers.isNull;
|
60 | 68 | import static org.mockito.BDDMockito.given;
|
61 | 69 | import static org.mockito.Mockito.atLeastOnce;
|
62 | 70 | import static org.mockito.Mockito.mock;
|
| 71 | +import static org.mockito.Mockito.times; |
63 | 72 | import static org.mockito.Mockito.verify;
|
| 73 | +import static org.mockito.Mockito.verifyNoMoreInteractions; |
64 | 74 | import static org.springframework.security.config.Customizer.withDefaults;
|
65 | 75 | import static org.springframework.security.test.web.servlet.request.SecurityMockMvcRequestPostProcessors.csrf;
|
66 | 76 | import static org.springframework.security.test.web.servlet.request.SecurityMockMvcRequestPostProcessors.user;
|
|
74 | 84 | import static org.springframework.test.web.servlet.request.MockMvcRequestBuilders.post;
|
75 | 85 | import static org.springframework.test.web.servlet.request.MockMvcRequestBuilders.put;
|
76 | 86 | import static org.springframework.test.web.servlet.request.MockMvcRequestBuilders.request;
|
| 87 | +import static org.springframework.test.web.servlet.result.MockMvcResultMatchers.content; |
77 | 88 | import static org.springframework.test.web.servlet.result.MockMvcResultMatchers.redirectedUrl;
|
78 | 89 | import static org.springframework.test.web.servlet.result.MockMvcResultMatchers.status;
|
79 | 90 |
|
|
84 | 95 | * @author Eleftheria Stein
|
85 | 96 | * @author Michael Vitz
|
86 | 97 | * @author Sam Simmons
|
| 98 | + * @author Steve Riesenberg |
87 | 99 | */
|
88 | 100 | @ExtendWith(SpringTestContextExtension.class)
|
89 | 101 | public class CsrfConfigurerTests {
|
@@ -407,6 +419,108 @@ public void csrfAuthenticationStrategyConfiguredThenStrategyUsed() throws Except
|
407 | 419 | any(HttpServletRequest.class), any(HttpServletResponse.class));
|
408 | 420 | }
|
409 | 421 |
|
| 422 | + @Test |
| 423 | + public void getLoginWhenCsrfTokenRequestProcessorSetThenRespondsWithNormalCsrfToken() throws Exception { |
| 424 | + CsrfTokenRepository csrfTokenRepository = mock(CsrfTokenRepository.class); |
| 425 | + CsrfToken csrfToken = new DefaultCsrfToken("X-CSRF-TOKEN", "_csrf", "token"); |
| 426 | + given(csrfTokenRepository.generateToken(any(HttpServletRequest.class))).willReturn(csrfToken); |
| 427 | + CsrfTokenRequestProcessorConfig.REPO = csrfTokenRepository; |
| 428 | + CsrfTokenRequestProcessorConfig.PROCESSOR = new CsrfTokenRequestProcessor(); |
| 429 | + this.spring.register(CsrfTokenRequestProcessorConfig.class, BasicController.class).autowire(); |
| 430 | + this.mvc.perform(get("/login")).andExpect(status().isOk()) |
| 431 | + .andExpect(content().string(containsString(csrfToken.getToken()))); |
| 432 | + verify(csrfTokenRepository).loadToken(any(HttpServletRequest.class)); |
| 433 | + verify(csrfTokenRepository).generateToken(any(HttpServletRequest.class)); |
| 434 | + verify(csrfTokenRepository).saveToken(eq(csrfToken), any(HttpServletRequest.class), |
| 435 | + any(HttpServletResponse.class)); |
| 436 | + verifyNoMoreInteractions(csrfTokenRepository); |
| 437 | + } |
| 438 | + |
| 439 | + @Test |
| 440 | + public void loginWhenCsrfTokenRequestProcessorSetAndNormalCsrfTokenThenSuccess() throws Exception { |
| 441 | + CsrfToken csrfToken = new DefaultCsrfToken("X-CSRF-TOKEN", "_csrf", "token"); |
| 442 | + CsrfTokenRepository csrfTokenRepository = mock(CsrfTokenRepository.class); |
| 443 | + given(csrfTokenRepository.loadToken(any(HttpServletRequest.class))).willReturn(csrfToken); |
| 444 | + given(csrfTokenRepository.generateToken(any(HttpServletRequest.class))).willReturn(csrfToken); |
| 445 | + CsrfTokenRequestProcessorConfig.REPO = csrfTokenRepository; |
| 446 | + CsrfTokenRequestProcessorConfig.PROCESSOR = new CsrfTokenRequestProcessor(); |
| 447 | + this.spring.register(CsrfTokenRequestProcessorConfig.class, BasicController.class).autowire(); |
| 448 | + // @formatter:off |
| 449 | + MockHttpServletRequestBuilder loginRequest = post("/login") |
| 450 | + .header(csrfToken.getHeaderName(), csrfToken.getToken()) |
| 451 | + .param("username", "user") |
| 452 | + .param("password", "password"); |
| 453 | + // @formatter:on |
| 454 | + this.mvc.perform(loginRequest).andExpect(redirectedUrl("/")); |
| 455 | + verify(csrfTokenRepository, times(2)).loadToken(any(HttpServletRequest.class)); |
| 456 | + verify(csrfTokenRepository).saveToken(isNull(), any(HttpServletRequest.class), any(HttpServletResponse.class)); |
| 457 | + verify(csrfTokenRepository).generateToken(any(HttpServletRequest.class)); |
| 458 | + verify(csrfTokenRepository).saveToken(eq(csrfToken), any(HttpServletRequest.class), |
| 459 | + any(HttpServletResponse.class)); |
| 460 | + verifyNoMoreInteractions(csrfTokenRepository); |
| 461 | + } |
| 462 | + |
| 463 | + @Test |
| 464 | + public void getLoginWhenXorCsrfTokenRequestProcessorSetThenRespondsWithXorCsrfToken() throws Exception { |
| 465 | + CsrfTokenRepository csrfTokenRepository = mock(CsrfTokenRepository.class); |
| 466 | + CsrfToken csrfToken = new DefaultCsrfToken("X-CSRF-TOKEN", "_csrf", "token"); |
| 467 | + given(csrfTokenRepository.generateToken(any(HttpServletRequest.class))).willReturn(csrfToken); |
| 468 | + CsrfTokenRequestProcessorConfig.REPO = csrfTokenRepository; |
| 469 | + CsrfTokenRequestProcessorConfig.PROCESSOR = new XorCsrfTokenRequestProcessor(); |
| 470 | + this.spring.register(CsrfTokenRequestProcessorConfig.class, BasicController.class).autowire(); |
| 471 | + this.mvc.perform(get("/login")).andExpect(status().isOk()) |
| 472 | + .andExpect(content().string(containsString(csrfToken.getParameterName()))) |
| 473 | + .andExpect(content().string(not(containsString(csrfToken.getToken())))); |
| 474 | + verify(csrfTokenRepository).loadToken(any(HttpServletRequest.class)); |
| 475 | + verify(csrfTokenRepository).generateToken(any(HttpServletRequest.class)); |
| 476 | + verify(csrfTokenRepository).saveToken(eq(csrfToken), any(HttpServletRequest.class), |
| 477 | + any(HttpServletResponse.class)); |
| 478 | + verifyNoMoreInteractions(csrfTokenRepository); |
| 479 | + } |
| 480 | + |
| 481 | + @Test |
| 482 | + public void loginWhenXorCsrfTokenRequestProcessorSetAndXorCsrfTokenThenSuccess() throws Exception { |
| 483 | + CsrfToken csrfToken = new DefaultCsrfToken("X-CSRF-TOKEN", "_csrf", "token"); |
| 484 | + CsrfTokenRepository csrfTokenRepository = mock(CsrfTokenRepository.class); |
| 485 | + given(csrfTokenRepository.loadToken(any(HttpServletRequest.class))).willReturn(csrfToken); |
| 486 | + given(csrfTokenRepository.generateToken(any(HttpServletRequest.class))).willReturn(csrfToken); |
| 487 | + CsrfTokenRequestProcessorConfig.REPO = csrfTokenRepository; |
| 488 | + CsrfTokenRequestProcessorConfig.PROCESSOR = new XorCsrfTokenRequestProcessor(); |
| 489 | + this.spring.register(CsrfTokenRequestProcessorConfig.class, BasicController.class).autowire(); |
| 490 | + // @formatter:off |
| 491 | + MockHttpServletRequestBuilder loginRequest = post("/login") |
| 492 | + .header(csrfToken.getHeaderName(), "sKCSGVHEz_l8Pw==") |
| 493 | + .param("username", "user") |
| 494 | + .param("password", "password"); |
| 495 | + // @formatter:on |
| 496 | + this.mvc.perform(loginRequest).andExpect(redirectedUrl("/")); |
| 497 | + verify(csrfTokenRepository, times(2)).loadToken(any(HttpServletRequest.class)); |
| 498 | + verify(csrfTokenRepository).saveToken(isNull(), any(HttpServletRequest.class), any(HttpServletResponse.class)); |
| 499 | + verify(csrfTokenRepository).generateToken(any(HttpServletRequest.class)); |
| 500 | + verify(csrfTokenRepository).saveToken(eq(csrfToken), any(HttpServletRequest.class), |
| 501 | + any(HttpServletResponse.class)); |
| 502 | + verifyNoMoreInteractions(csrfTokenRepository); |
| 503 | + } |
| 504 | + |
| 505 | + @Test |
| 506 | + public void loginWhenXorCsrfTokenRequestProcessorSetAndNormalCsrfTokenThenRespondsWithForbidden() throws Exception { |
| 507 | + CsrfToken csrfToken = new DefaultCsrfToken("X-CSRF-TOKEN", "_csrf", "token"); |
| 508 | + CsrfTokenRepository csrfTokenRepository = mock(CsrfTokenRepository.class); |
| 509 | + given(csrfTokenRepository.loadToken(any(HttpServletRequest.class))).willReturn(csrfToken); |
| 510 | + CsrfTokenRequestProcessorConfig.REPO = csrfTokenRepository; |
| 511 | + CsrfTokenRequestProcessorConfig.PROCESSOR = new XorCsrfTokenRequestProcessor(); |
| 512 | + this.spring.register(CsrfTokenRequestProcessorConfig.class, BasicController.class).autowire(); |
| 513 | + // @formatter:off |
| 514 | + MockHttpServletRequestBuilder loginRequest = post("/login") |
| 515 | + .header(csrfToken.getHeaderName(), csrfToken.getToken()) |
| 516 | + .param("username", "user") |
| 517 | + .param("password", "password"); |
| 518 | + // @formatter:on |
| 519 | + this.mvc.perform(loginRequest).andExpect(status().isForbidden()); |
| 520 | + verify(csrfTokenRepository).loadToken(any(HttpServletRequest.class)); |
| 521 | + verifyNoMoreInteractions(csrfTokenRepository); |
| 522 | + } |
| 523 | + |
410 | 524 | @Configuration
|
411 | 525 | static class AllowHttpMethodsFirewallConfig {
|
412 | 526 |
|
@@ -748,6 +862,43 @@ protected void configure(AuthenticationManagerBuilder auth) throws Exception {
|
748 | 862 |
|
749 | 863 | }
|
750 | 864 |
|
| 865 | + @Configuration |
| 866 | + @EnableWebSecurity |
| 867 | + static class CsrfTokenRequestProcessorConfig { |
| 868 | + |
| 869 | + static CsrfTokenRepository REPO; |
| 870 | + |
| 871 | + static CsrfTokenRequestProcessor PROCESSOR; |
| 872 | + |
| 873 | + @Bean |
| 874 | + SecurityFilterChain securityFilterChain(HttpSecurity http) throws Exception { |
| 875 | + // @formatter:off |
| 876 | + http |
| 877 | + .authorizeHttpRequests((authorize) -> authorize |
| 878 | + .anyRequest().authenticated() |
| 879 | + ) |
| 880 | + .formLogin(Customizer.withDefaults()) |
| 881 | + .csrf((csrf) -> csrf |
| 882 | + .csrfTokenRepository(REPO) |
| 883 | + .csrfTokenRequestAttributeHandler(PROCESSOR) |
| 884 | + .csrfTokenRequestResolver(PROCESSOR) |
| 885 | + ); |
| 886 | + // @formatter:on |
| 887 | + |
| 888 | + return http.build(); |
| 889 | + } |
| 890 | + |
| 891 | + @Autowired |
| 892 | + void configure(AuthenticationManagerBuilder auth) throws Exception { |
| 893 | + // @formatter:off |
| 894 | + auth |
| 895 | + .inMemoryAuthentication() |
| 896 | + .withUser(PasswordEncodedUser.user()); |
| 897 | + // @formatter:on |
| 898 | + } |
| 899 | + |
| 900 | + } |
| 901 | + |
751 | 902 | @RestController
|
752 | 903 | static class BasicController {
|
753 | 904 |
|
|
0 commit comments