如何在Sping Boot 项目中忽略特定URL的Spring Security CSRF

6tqwzwtp  于 2024-01-06  发布在  Spring
关注(0)|答案(4)|浏览(221)

我怎么能忽略CSRF安全的特定URL,如“/workflow/**"。除了这个URL,我需要授权和CSRF安全的所有URL的和方法。

  1. @Configuration
  2. @Order(SecurityProperties.ACCESS_OVERRIDE_ORDER)
  3. protected static class SecurityConfiguration extends WebSecurityConfigurerAdapter {
  4. @Autowired
  5. private RESTAuthenticationEntryPoint authenticationEntryPoint;
  6. @Autowired
  7. private RESTAuthenticationFailureHandler authenticationFailureHandler;
  8. @Autowired
  9. private RESTAuthenticationSuccessHandler authenticationSuccessHandler;
  10. @Autowired
  11. private PranaUserDetailsService userDetailsService;
  12. @Override
  13. protected void configure(HttpSecurity http) throws Exception {
  14. http.csrf().requireCsrfProtectionMatcher(new AllExceptUrlStartedWith("/workflow"))
  15. .and().authorizeRequests()
  16. .antMatchers("/rest/**", "/tasklist").authenticated()
  17. .and().logout().logoutRequestMatcher(new AntPathRequestMatcher("/logout"))
  18. .logoutSuccessUrl("/index.html")
  19. .and().exceptionHandling().authenticationEntryPoint(authenticationEntryPoint)
  20. .and().formLogin().successHandler(authenticationSuccessHandler)
  21. .and().formLogin().failureHandler(authenticationFailureHandler)
  22. .and().csrf().csrfTokenRepository(csrfTokenRepository()).and().addFilterAfter(new CsrfHeaderFilter(), CsrfFilter.class);
  23. }
  24. private static class AllExceptUrlStartedWith implements RequestMatcher {
  25. private static final String[] ALLOWED_METHODS =
  26. new String[] {"GET"};
  27. private final String[] allowedUrls;
  28. public AllExceptUrlStartedWith(String... allowedUrls) {
  29. this.allowedUrls = allowedUrls;
  30. }
  31. @Override
  32. public boolean matches(HttpServletRequest request) {
  33. String method = request.getMethod();
  34. for(String allowedMethod : ALLOWED_METHODS) {
  35. if (allowedMethod.equals(method)) {
  36. return false;
  37. }
  38. }
  39. String uri = request.getRequestURI();
  40. for (String allowedUrl : allowedUrls) {
  41. if (uri.startsWith(allowedUrl)) {
  42. return false;
  43. }
  44. }
  45. return true;
  46. }
  47. }
  48. private CsrfTokenRepository csrfTokenRepository() {
  49. HttpSessionCsrfTokenRepository repository = new HttpSessionCsrfTokenRepository();
  50. repository.setHeaderName("X-XSRF-TOKEN");
  51. return repository;
  52. }
  53. @Override
  54. public void configure(WebSecurity web) throws Exception {
  55. web.ignoring().antMatchers("/styles/**").antMatchers("/scripts/**");
  56. }
  57. @Autowired
  58. public void configureGlobal(AuthenticationManagerBuilder auth) throws Exception {
  59. auth.userDetailsService(userDetailsService).passwordEncoder(new BCryptPasswordEncoder());
  60. }
  61. }

字符串
我怎么能忽略CSRF安全的特定URL,如“/workflow/**"。除了这个URL,我需要授权和CSRF安全的所有URL的和方法。

3yhwsihp

3yhwsihp1#

在我的项目中,我使用了以下代码:

  1. @Override
  2. protected void configure(HttpSecurity http) throws Exception {
  3. http
  4. .authorizeRequests()
  5. ...
  6. .csrf()
  7. // Allow unsecured requests to H2 console
  8. .requireCsrfProtectionMatcher(new AllExceptUrlsStartedWith("/console"))
  9. ...
  10. }
  11. private static class AllExceptUrlsStartedWith implements RequestMatcher {
  12. private static final String[] ALLOWED_METHODS =
  13. new String[] {"GET", "HEAD", "TRACE", "OPTIONS"};
  14. private final String[] allowedUrls;
  15. public AllExceptUrlsStartedWith(String... allowedUrls) {
  16. this.allowedUrls = allowedUrls;
  17. }
  18. @Override
  19. public boolean matches(HttpServletRequest request) {
  20. // replicate default behavior (see CsrfFilter.DefaultRequiresCsrfMatcher class)
  21. String method = request.getMethod();
  22. for (String allowedMethod : ALLOWED_METHODS) {
  23. if (allowedMethod.equals(method)) {
  24. return false;
  25. }
  26. }
  27. // apply our own exceptions
  28. String uri = request.getRequestURI();
  29. for (String allowedUrl : allowedUrls) {
  30. if (uri.startsWith(allowedUrl)) {
  31. return false;
  32. }
  33. }
  34. return true;
  35. }
  36. }

字符串
在本例中,我禁用了/console的CSRF保护。
更新:自Spring Security 4.0以来,您可以将其简化为一行:

  1. csrf()
  2. .ignoringAntMatchers("/nocsrf","/ignore/startswith/**")

展开查看全部
qyswt5oh

qyswt5oh2#

在这个线程中回答的唯一目的是解释和使用antPathMatcher,它的优点可以用来保护许多使用ant matchers的url。
从Doc

.csrf().requireCsrfProtectionMatcher(RequestMatcher requireCsrfProtectionMatcher)

指定RequestMatcher用于确定何时应用CSRF。默认值是忽略GET、HEAD、TRACE、OPTIONS并处理所有其他请求。
注意默认情况下GETHEADTRACEOPTIONS请求被忽略。如果你想覆盖这个默认配置requireCsrfProtectionMatcher(implementation_of_RequestMatcher)
在RequestMatcher的实现中,定义所有需要保护的URL。您完成了

假设您希望确保URL的/api/**用于CSRF保护

  1. @Autowired
  2. RequestMatcher csrfProtectedMatchers;
  3. @Override
  4. protected void configure(final HttpSecurity http) throws Exception
  5. {
  6. http
  7. .authorizeRequests()
  8. .antMatchers("/resources/**", "/", "/login").permitAll()
  9. .antMatchers("/api/**").hasAnyRole("ADMIN", "USER")
  10. .antMatchers("/app/user/*")
  11. .hasAnyRole("ADMIN", "USER")
  12. .and().formLogin()
  13. .and().csrf().requireCsrfProtectionMatcher(csrfProtectedMatchers);
  14. }
  15. @Bean
  16. public RequestMatcher getCsrfProtectedMatchers()
  17. {
  18. UrlPathHelper urlPathHelper = new UrlPathHelper();
  19. AntPathMatcher antPathMatcher = new AntPathMatcher();
  20. List<String> protectedUrlPatterns = Arrays.asList("/api/**", "/logout");
  21. return new RequestMatcher()
  22. {
  23. @Override
  24. public boolean matches(HttpServletRequest request)
  25. {
  26. String uri = urlPathHelper.getPathWithinApplication(request);
  27. for (String pattern : protectedUrlPatterns)
  28. {
  29. if (antPathMatcher.match(pattern, uri))
  30. {
  31. return true;
  32. }
  33. }
  34. return false;
  35. }
  36. };
  37. }

字符串

逻辑解释

假设URL:http://localhost:8080/csrf/api/test1
String uri = urlPathHelper.getPathWithinApplication(request);
uri => /api/test1 ;
antPathMatcher.match("/api/**", "/api/test1") => true

展开查看全部
byqmnocz

byqmnocz3#

回答我自己的问题.感谢@Slava

  1. @Configuration
  2. @Order(SecurityProperties.ACCESS_OVERRIDE_ORDER)
  3. protected static class SecurityConfiguration extends WebSecurityConfigurerAdapter {
  4. @Autowired
  5. private RESTAuthenticationEntryPoint authenticationEntryPoint;
  6. @Autowired
  7. private RESTAuthenticationFailureHandler authenticationFailureHandler;
  8. @Autowired
  9. private RESTAuthenticationSuccessHandler authenticationSuccessHandler;
  10. @Autowired
  11. private PranaUserDetailsService userDetailsService;
  12. @Override
  13. protected void configure(HttpSecurity http) throws Exception {
  14. http.csrf().requireCsrfProtectionMatcher(new AllExceptUrlStartedWith("/workflow"))
  15. .and().authorizeRequests()
  16. .antMatchers("/rest/**", "/tasklist").authenticated()
  17. .and().logout().logoutRequestMatcher(new AntPathRequestMatcher("/logout"))
  18. .logoutSuccessUrl("/index.html")
  19. .and().exceptionHandling().authenticationEntryPoint(authenticationEntryPoint)
  20. .and().formLogin().successHandler(authenticationSuccessHandler)
  21. .and().formLogin().failureHandler(authenticationFailureHandler)
  22. .and().csrf().csrfTokenRepository(csrfTokenRepository()).and().addFilterAfter(new CsrfHeaderFilter(), CsrfFilter.class);
  23. }
  24. private static class AllExceptUrlStartedWith implements RequestMatcher {
  25. private static final String[] ALLOWED_METHODS =
  26. new String[] {"GET"};
  27. private final String[] allowedUrls;
  28. public AllExceptUrlStartedWith(String... allowedUrls) {
  29. this.allowedUrls = allowedUrls;
  30. }
  31. @Override
  32. public boolean matches(HttpServletRequest request) {
  33. String method = request.getMethod();
  34. for(String allowedMethod : ALLOWED_METHODS) {
  35. if (allowedMethod.equals(method)) {
  36. return false;
  37. }
  38. }
  39. String uri = request.getRequestURI();
  40. for (String allowedUrl : allowedUrls) {
  41. if (uri.startsWith(allowedUrl)) {
  42. return false;
  43. }
  44. }
  45. return true;
  46. }
  47. }
  48. private CsrfTokenRepository csrfTokenRepository() {
  49. HttpSessionCsrfTokenRepository repository = new HttpSessionCsrfTokenRepository();
  50. repository.setHeaderName("X-XSRF-TOKEN");
  51. return repository;
  52. }
  53. @Override
  54. public void configure(WebSecurity web) throws Exception {
  55. web.ignoring().antMatchers("/styles/**").antMatchers("/scripts/**");
  56. }
  57. @Autowired
  58. public void configureGlobal(AuthenticationManagerBuilder auth) throws Exception {
  59. auth.userDetailsService(userDetailsService).passwordEncoder(new BCryptPasswordEncoder());
  60. }
  61. }

字符串

展开查看全部
5sxhfpxr

5sxhfpxr4#

在Spring Security 6中,可以使用CsrfConfigurer#ignoringRequestMatchers
举例来说:

  1. @Bean
  2. SecurityFilterChain securityFilterChain(HttpSecurity http) throws Exception {
  3. http.csrf(csrf -> csrf.ignoringRequestMatchers("/workflow/**"));
  4. return http.build();
  5. }

字符串

相关问题