Skip to content

Commit e4c9d81

Browse files
author
sdratler1
committed
2 parents 179a466 + 27e1c58 commit e4c9d81

File tree

59 files changed

+724
-332
lines changed

Some content is hidden

Large Commits have some content hidden by default. Use the searchbox below for content that may be hidden.

59 files changed

+724
-332
lines changed
Lines changed: 25 additions & 0 deletions
Original file line numberDiff line numberDiff line change
@@ -0,0 +1,25 @@
1+
name: PR Build
2+
3+
on:
4+
pull_request:
5+
branches:
6+
- master
7+
8+
jobs:
9+
build:
10+
name: Build
11+
runs-on: ubuntu-latest
12+
13+
steps:
14+
- uses: actions/checkout@v2
15+
- name: Set up JDK
16+
uses: actions/setup-java@v1
17+
with:
18+
java-version: '8'
19+
- name: Cache Gradle packages
20+
uses: actions/cache@v2
21+
with:
22+
path: ~/.gradle/caches
23+
key: ${{ runner.os }}-gradle-${{ hashFiles('**/*.gradle') }}
24+
- name: Build with Gradle
25+
run: ./gradlew clean build --continue

CONTRIBUTING.adoc

Lines changed: 1 addition & 1 deletion
Original file line numberDiff line numberDiff line change
@@ -140,7 +140,7 @@ git config user.email link:mailto:user@ma&#x69
140140
. Keep the subject line to 50 characters or less if possible
141141
. Do not end the subject line with a period
142142
. In the body of the commit message, explain how things worked before this commit, what has changed, and how things work now
143-
. Include Fixes gh-<issue-number> at the end if this fixes a GitHub issue
143+
. Include Closes gh-<issue-number> at the end if this fixes a GitHub issue
144144
. Avoid markdown, including back-ticks identifying code
145145

146146
= Run all tests prior to submission

build.gradle

Lines changed: 5 additions & 1 deletion
Original file line numberDiff line numberDiff line change
@@ -2,7 +2,7 @@ buildscript {
22
dependencies {
33
classpath 'io.spring.gradle:spring-build-conventions:0.0.32.RELEASE'
44
classpath "org.springframework.boot:spring-boot-gradle-plugin:$springBootVersion"
5-
classpath 'io.spring.nohttp:nohttp-gradle:0.0.2.RELEASE'
5+
classpath 'io.spring.nohttp:nohttp-gradle:0.0.5.RELEASE'
66
classpath "io.freefair.gradle:aspectj-plugin:5.0.1"
77
classpath "org.jetbrains.kotlin:kotlin-gradle-plugin:$kotlinVersion"
88
}
@@ -39,3 +39,7 @@ subprojects {
3939
options.encoding = "UTF-8"
4040
}
4141
}
42+
43+
nohttp {
44+
allowlistFile = project.file("etc/nohttp/allowlist.lines")
45+
}

config/src/main/java/org/springframework/security/config/annotation/web/builders/WebSecurity.java

Lines changed: 8 additions & 1 deletion
Original file line numberDiff line numberDiff line change
@@ -1,5 +1,5 @@
11
/*
2-
* Copyright 2002-2018 the original author or authors.
2+
* Copyright 2002-2020 the original author or authors.
33
*
44
* Licensed under the Apache License, Version 2.0 (the "License");
55
* you may not use this file except in compliance with the License.
@@ -31,6 +31,7 @@
3131
import org.springframework.http.HttpMethod;
3232
import org.springframework.security.access.PermissionEvaluator;
3333
import org.springframework.security.access.expression.SecurityExpressionHandler;
34+
import org.springframework.security.access.hierarchicalroles.RoleHierarchy;
3435
import org.springframework.security.config.annotation.AbstractConfiguredSecurityBuilder;
3536
import org.springframework.security.config.annotation.ObjectPostProcessor;
3637
import org.springframework.security.config.annotation.SecurityBuilder;
@@ -75,6 +76,7 @@
7576
* @see WebSecurityConfiguration
7677
*
7778
* @author Rob Winch
79+
* @author Evgeniy Cheban
7880
* @since 3.2
7981
*/
8082
public final class WebSecurity extends
@@ -389,6 +391,11 @@ public void setApplicationContext(ApplicationContext applicationContext)
389391
throws BeansException {
390392
this.defaultWebSecurityExpressionHandler
391393
.setApplicationContext(applicationContext);
394+
395+
try {
396+
this.defaultWebSecurityExpressionHandler.setRoleHierarchy(applicationContext.getBean(RoleHierarchy.class));
397+
} catch (NoSuchBeanDefinitionException e) {}
398+
392399
try {
393400
this.defaultWebSecurityExpressionHandler.setPermissionEvaluator(applicationContext.getBean(
394401
PermissionEvaluator.class));

config/src/main/java/org/springframework/security/config/annotation/web/configuration/WebSecurityConfigurerAdapter.java

Lines changed: 1 addition & 1 deletion
Original file line numberDiff line numberDiff line change
@@ -187,7 +187,7 @@ protected void configure(AuthenticationManagerBuilder auth) throws Exception {
187187
/**
188188
* Creates the {@link HttpSecurity} or returns the current instance
189189
*
190-
* ] * @return the {@link HttpSecurity}
190+
* @return the {@link HttpSecurity}
191191
* @throws Exception
192192
*/
193193
@SuppressWarnings({ "rawtypes", "unchecked" })

config/src/main/java/org/springframework/security/config/annotation/web/reactive/ServerHttpSecurityConfiguration.java

Lines changed: 3 additions & 2 deletions
Original file line numberDiff line numberDiff line change
@@ -18,6 +18,7 @@
1818

1919
import org.springframework.beans.BeansException;
2020
import org.springframework.beans.factory.BeanFactory;
21+
import org.springframework.beans.factory.ObjectProvider;
2122
import org.springframework.beans.factory.annotation.Autowired;
2223
import org.springframework.context.ApplicationContext;
2324
import org.springframework.context.ApplicationContextAware;
@@ -87,11 +88,11 @@ void setUserDetailsPasswordService(ReactiveUserDetailsPasswordService userDetail
8788

8889
@Bean
8990
public WebFluxConfigurer authenticationPrincipalArgumentResolverConfigurer(
90-
AuthenticationPrincipalArgumentResolver authenticationPrincipalArgumentResolver) {
91+
ObjectProvider<AuthenticationPrincipalArgumentResolver> authenticationPrincipalArgumentResolver) {
9192
return new WebFluxConfigurer() {
9293
@Override
9394
public void configureArgumentResolvers(ArgumentResolverConfigurer configurer) {
94-
configurer.addCustomResolver(authenticationPrincipalArgumentResolver);
95+
configurer.addCustomResolver(authenticationPrincipalArgumentResolver.getObject());
9596
}
9697
};
9798
}

config/src/main/java/org/springframework/security/config/web/server/ServerHttpSecurity.java

Lines changed: 17 additions & 2 deletions
Original file line numberDiff line numberDiff line change
@@ -32,6 +32,8 @@
3232
import java.util.function.Supplier;
3333

3434
import org.springframework.security.core.authority.mapping.GrantedAuthoritiesMapper;
35+
import org.springframework.security.oauth2.core.OAuth2AuthenticationException;
36+
import org.springframework.security.oauth2.core.OAuth2AuthorizationException;
3537
import reactor.core.publisher.Mono;
3638
import reactor.util.context.Context;
3739

@@ -236,6 +238,7 @@
236238
* @author Rafiullah Hamedy
237239
* @author Eddú Meléndez
238240
* @author Joe Grandja
241+
* @author Parikshit Dutta
239242
* @since 5.0
240243
*/
241244
public class ServerHttpSecurity {
@@ -1093,9 +1096,14 @@ public OAuth2LoginSpec authenticationConverter(ServerAuthenticationConverter aut
10931096

10941097
private ServerAuthenticationConverter getAuthenticationConverter(ReactiveClientRegistrationRepository clientRegistrationRepository) {
10951098
if (this.authenticationConverter == null) {
1096-
ServerOAuth2AuthorizationCodeAuthenticationTokenConverter authenticationConverter = new ServerOAuth2AuthorizationCodeAuthenticationTokenConverter(clientRegistrationRepository);
1097-
authenticationConverter.setAuthorizationRequestRepository(getAuthorizationRequestRepository());
1099+
ServerOAuth2AuthorizationCodeAuthenticationTokenConverter delegate =
1100+
new ServerOAuth2AuthorizationCodeAuthenticationTokenConverter(clientRegistrationRepository);
1101+
delegate.setAuthorizationRequestRepository(getAuthorizationRequestRepository());
1102+
ServerAuthenticationConverter authenticationConverter = exchange ->
1103+
delegate.convert(exchange).onErrorMap(OAuth2AuthorizationException.class,
1104+
e -> new OAuth2AuthenticationException(e.getError(), e.getError().toString()));
10981105
this.authenticationConverter = authenticationConverter;
1106+
return authenticationConverter;
10991107
}
11001108
return this.authenticationConverter;
11011109
}
@@ -1511,10 +1519,17 @@ protected void configure(ServerHttpSecurity http) {
15111519
OAuth2AuthorizationCodeGrantWebFilter codeGrantWebFilter = new OAuth2AuthorizationCodeGrantWebFilter(
15121520
authenticationManager, authenticationConverter, authorizedClientRepository);
15131521
codeGrantWebFilter.setAuthorizationRequestRepository(getAuthorizationRequestRepository());
1522+
if (http.requestCache != null) {
1523+
codeGrantWebFilter.setRequestCache(http.requestCache.requestCache);
1524+
}
15141525

15151526
OAuth2AuthorizationRequestRedirectWebFilter oauthRedirectFilter = new OAuth2AuthorizationRequestRedirectWebFilter(
15161527
clientRegistrationRepository);
15171528
oauthRedirectFilter.setAuthorizationRequestRepository(getAuthorizationRequestRepository());
1529+
if (http.requestCache != null) {
1530+
oauthRedirectFilter.setRequestCache(http.requestCache.requestCache);
1531+
}
1532+
15181533
http.addFilterAt(codeGrantWebFilter, SecurityWebFiltersOrder.OAUTH2_AUTHORIZATION_CODE);
15191534
http.addFilterAt(oauthRedirectFilter, SecurityWebFiltersOrder.HTTP_BASIC);
15201535
}

config/src/main/resources/org/springframework/security/config/spring-security-5.4.rnc

Lines changed: 4 additions & 0 deletions
Original file line numberDiff line numberDiff line change
@@ -1034,6 +1034,10 @@ frame-options.attlist &=
10341034
attribute value {xsd:string}?
10351035
frame-options.attlist &=
10361036
## Specify the request parameter to use for the origin when using a 'whitelist' or 'regexp' based strategy. Default is 'from'.
1037+
## Deprecated ALLOW-FROM is an obsolete directive that no longer works in modern browsers. Instead use
1038+
## Content-Security-Policy with the
1039+
## <a href="https://developer.mozilla.org/en-US/docs/Web/HTTP/Headers/Content-Security-Policy/frame-ancestors">frame-ancestors</a>
1040+
## directive.
10371041
attribute from-parameter {xsd:string}?
10381042

10391043

config/src/main/resources/org/springframework/security/config/spring-security-5.4.xsd

Lines changed: 4 additions & 1 deletion
Original file line numberDiff line numberDiff line change
@@ -3000,7 +3000,10 @@
30003000
<xs:attribute name="from-parameter" type="xs:string">
30013001
<xs:annotation>
30023002
<xs:documentation>Specify the request parameter to use for the origin when using a 'whitelist' or 'regexp'
3003-
based strategy. Default is 'from'.
3003+
based strategy. Default is 'from'. Deprecated ALLOW-FROM is an obsolete directive that no
3004+
longer works in modern browsers. Instead use Content-Security-Policy with the &lt;a
3005+
href="https://developer.mozilla.org/en-US/docs/Web/HTTP/Headers/Content-Security-Policy/frame-ancestors"&gt;frame-ancestors&lt;/a&gt;
3006+
directive.
30043007
</xs:documentation>
30053008
</xs:annotation>
30063009
</xs:attribute>

config/src/test/java/org/springframework/security/config/annotation/web/configuration/WebSecurityConfigurationTests.java

Lines changed: 29 additions & 1 deletion
Original file line numberDiff line numberDiff line change
@@ -1,5 +1,5 @@
11
/*
2-
* Copyright 2002-2019 the original author or authors.
2+
* Copyright 2002-2020 the original author or authors.
33
*
44
* Licensed under the Apache License, Version 2.0 (the "License");
55
* you may not use this file except in compliance with the License.
@@ -32,6 +32,8 @@
3232
import org.springframework.security.access.PermissionEvaluator;
3333
import org.springframework.security.access.expression.AbstractSecurityExpressionHandler;
3434
import org.springframework.security.access.expression.SecurityExpressionHandler;
35+
import org.springframework.security.access.hierarchicalroles.RoleHierarchy;
36+
import org.springframework.security.access.hierarchicalroles.RoleHierarchyImpl;
3537
import org.springframework.security.authentication.TestingAuthenticationToken;
3638
import org.springframework.security.config.annotation.authentication.builders.AuthenticationManagerBuilder;
3739
import org.springframework.security.config.annotation.authentication.configuration.EnableGlobalAuthentication;
@@ -69,6 +71,7 @@
6971
*
7072
* @author Rob Winch
7173
* @author Joe Grandja
74+
* @author Evgeniy Cheban
7275
*/
7376
public class WebSecurityConfigurationTests {
7477
@Rule
@@ -290,6 +293,31 @@ protected void configure(HttpSecurity http) throws Exception {
290293
}
291294
}
292295

296+
@Test
297+
public void securityExpressionHandlerWhenRoleHierarchyBeanThenRoleHierarchyUsed() {
298+
this.spring.register(WebSecurityExpressionHandlerRoleHierarchyBeanConfig.class).autowire();
299+
TestingAuthenticationToken authentication = new TestingAuthenticationToken("user", "notused", "ROLE_ADMIN");
300+
FilterInvocation invocation = new FilterInvocation(new MockHttpServletRequest("GET", ""),
301+
new MockHttpServletResponse(), new MockFilterChain());
302+
303+
AbstractSecurityExpressionHandler handler = this.spring.getContext().getBean(AbstractSecurityExpressionHandler.class);
304+
EvaluationContext evaluationContext = handler.createEvaluationContext(authentication, invocation);
305+
Expression expression = handler.getExpressionParser()
306+
.parseExpression("hasRole('ROLE_USER')");
307+
boolean granted = expression.getValue(evaluationContext, Boolean.class);
308+
assertThat(granted).isTrue();
309+
}
310+
311+
@EnableWebSecurity
312+
static class WebSecurityExpressionHandlerRoleHierarchyBeanConfig extends WebSecurityConfigurerAdapter {
313+
@Bean
314+
RoleHierarchy roleHierarchy() {
315+
RoleHierarchyImpl roleHierarchy = new RoleHierarchyImpl();
316+
roleHierarchy.setHierarchy("ROLE_ADMIN > ROLE_USER");
317+
return roleHierarchy;
318+
}
319+
}
320+
293321
@Test
294322
public void securityExpressionHandlerWhenPermissionEvaluatorBeanThenPermissionEvaluatorUsed() {
295323
this.spring.register(WebSecurityExpressionHandlerPermissionEvaluatorBeanConfig.class).autowire();

config/src/test/java/org/springframework/security/config/annotation/web/reactive/EnableWebFluxSecurityTests.java

Lines changed: 21 additions & 0 deletions
Original file line numberDiff line numberDiff line change
@@ -47,6 +47,7 @@
4747
import org.springframework.security.test.context.annotation.SecurityTestExecutionListeners;
4848
import org.springframework.security.test.context.support.WithMockUser;
4949
import org.springframework.security.test.web.reactive.server.WebTestClientBuilder;
50+
import org.springframework.security.web.reactive.result.method.annotation.AuthenticationPrincipalArgumentResolver;
5051
import org.springframework.security.web.reactive.result.view.CsrfRequestDataValueProcessor;
5152
import org.springframework.security.web.server.SecurityWebFilterChain;
5253
import org.springframework.security.web.server.WebFilterChainProxy;
@@ -59,6 +60,7 @@
5960
import org.springframework.util.MultiValueMap;
6061
import org.springframework.web.bind.annotation.GetMapping;
6162
import org.springframework.web.bind.annotation.RestController;
63+
import org.springframework.web.reactive.config.DelegatingWebFluxConfiguration;
6264
import org.springframework.web.reactive.config.EnableWebFlux;
6365
import org.springframework.web.reactive.function.BodyInserters;
6466
import org.springframework.web.reactive.result.view.AbstractView;
@@ -434,4 +436,23 @@ static class Child {
434436
Child() {
435437
}
436438
}
439+
440+
@Test
441+
// gh-8596
442+
public void resolveAuthenticationPrincipalArgumentResolverFirstDoesNotCauseBeanCurrentlyInCreationException() {
443+
this.spring.register(EnableWebFluxSecurityConfiguration.class,
444+
ReactiveAuthenticationTestConfiguration.class,
445+
DelegatingWebFluxConfiguration.class).autowire();
446+
}
447+
448+
@EnableWebFluxSecurity
449+
@Configuration(proxyBeanMethods = false)
450+
static class EnableWebFluxSecurityConfiguration {
451+
/**
452+
* It is necessary to Autowire AuthenticationPrincipalArgumentResolver because it triggers eager loading of
453+
* AuthenticationPrincipalArgumentResolver bean which causes BeanCurrentlyInCreationException
454+
*/
455+
@Autowired
456+
AuthenticationPrincipalArgumentResolver resolver;
457+
}
437458
}

config/src/test/java/org/springframework/security/config/doc/XsdDocumentedTests.java

Lines changed: 6 additions & 1 deletion
Original file line numberDiff line numberDiff line change
@@ -52,7 +52,12 @@ public class XsdDocumentedTests {
5252
"nsa-websocket-security",
5353
"nsa-ldap",
5454
"nsa-method-security",
55-
"nsa-web");
55+
"nsa-web",
56+
// deprecated and for removal
57+
"nsa-frame-options-strategy",
58+
"nsa-frame-options-ref",
59+
"nsa-frame-options-value",
60+
"nsa-frame-options-from-parameter");
5661

5762
String referenceLocation = "../docs/manual/src/docs/asciidoc/_includes/servlet/appendix/namespace.adoc";
5863

0 commit comments

Comments
 (0)