| 1 | package edu.ucsb.cs156.gauchoride.config; | |
| 2 | ||
| 3 | import java.io.IOException; | |
| 4 | import java.util.ArrayList; | |
| 5 | import java.util.HashSet; | |
| 6 | import java.util.List; | |
| 7 | import java.util.Map; | |
| 8 | import java.util.Optional; | |
| 9 | import java.util.Set; | |
| 10 | import java.util.function.Supplier; | |
| 11 | ||
| 12 | import edu.ucsb.cs156.gauchoride.entities.User; | |
| 13 | import edu.ucsb.cs156.gauchoride.repositories.UserRepository; | |
| 14 | import jakarta.servlet.FilterChain; | |
| 15 | import jakarta.servlet.ServletException; | |
| 16 | import jakarta.servlet.http.HttpServletRequest; | |
| 17 | import jakarta.servlet.http.HttpServletResponse; | |
| 18 | import lombok.extern.slf4j.Slf4j; | |
| 19 | ||
| 20 | import org.springframework.beans.factory.annotation.Autowired; | |
| 21 | import org.springframework.beans.factory.annotation.Value; | |
| 22 | import org.springframework.context.annotation.Bean; | |
| 23 | import org.springframework.context.annotation.Configuration; | |
| 24 | import org.springframework.security.config.Customizer; | |
| 25 | import org.springframework.security.config.annotation.method.configuration.EnableMethodSecurity; | |
| 26 | import org.springframework.security.config.annotation.web.builders.HttpSecurity; | |
| 27 | import org.springframework.security.config.annotation.web.builders.WebSecurity; | |
| 28 | import org.springframework.security.config.annotation.web.configuration.EnableWebSecurity; | |
| 29 | import org.springframework.security.config.annotation.web.configuration.WebSecurityCustomizer; | |
| 30 | import org.springframework.security.config.annotation.web.configurers.oauth2.server.resource.OAuth2ResourceServerConfigurer; | |
| 31 | import org.springframework.security.config.http.SessionCreationPolicy; | |
| 32 | import org.springframework.security.core.Authentication; | |
| 33 | import org.springframework.security.core.GrantedAuthority; | |
| 34 | import org.springframework.security.core.authority.SimpleGrantedAuthority; | |
| 35 | import org.springframework.security.core.authority.mapping.GrantedAuthoritiesMapper; | |
| 36 | import org.springframework.security.oauth2.core.user.OAuth2UserAuthority; | |
| 37 | import org.springframework.security.web.SecurityFilterChain; | |
| 38 | import org.springframework.security.web.authentication.Http403ForbiddenEntryPoint; | |
| 39 | import org.springframework.security.web.authentication.SavedRequestAwareAuthenticationSuccessHandler; | |
| 40 | import org.springframework.security.web.authentication.www.BasicAuthenticationFilter; | |
| 41 | import org.springframework.security.web.csrf.CookieCsrfTokenRepository; | |
| 42 | import org.springframework.security.web.csrf.CsrfTokenRequestAttributeHandler; | |
| 43 | import org.springframework.security.web.csrf.CsrfTokenRequestHandler; | |
| 44 | import org.springframework.security.web.csrf.XorCsrfTokenRequestAttributeHandler; | |
| 45 | import org.springframework.security.web.csrf.CsrfToken; | |
| 46 | import org.springframework.security.web.util.matcher.AntPathRequestMatcher; | |
| 47 | ||
| 48 | import org.springframework.util.StringUtils; | |
| 49 | import org.springframework.web.filter.OncePerRequestFilter; | |
| 50 | ||
| 51 | @Configuration | |
| 52 | @EnableWebSecurity | |
| 53 | @EnableMethodSecurity | |
| 54 | @Slf4j | |
| 55 | public class SecurityConfig { | |
| 56 | ||
| 57 |   @Value("${app.admin.emails}") | |
| 58 |   private final List<String> adminEmails = new ArrayList<>(); | |
| 59 | ||
| 60 |   @Autowired | |
| 61 |   UserRepository userRepository; | |
| 62 | ||
| 63 |   // https://docs.spring.io/spring-security/reference/servlet/exploits/csrf.html#csrf-integration-javascript-spa | |
| 64 |   @Bean | |
| 65 |   public SecurityFilterChain filterChain(HttpSecurity http) throws Exception { | |
| 66 |     http | |
| 67 |         .exceptionHandling(handling -> handling.authenticationEntryPoint(new Http403ForbiddenEntryPoint())) | |
| 68 |         .oauth2Login( | |
| 69 |             oauth2 -> oauth2.userInfoEndpoint(userInfo -> userInfo.userAuthoritiesMapper(this.userAuthoritiesMapper()))) | |
| 70 |         .csrf(csrf -> csrf | |
| 71 |             .csrfTokenRepository(CookieCsrfTokenRepository.withHttpOnlyFalse()) | |
| 72 |             .csrfTokenRequestHandler(new SpaCsrfTokenRequestHandler())) | |
| 73 |         .addFilterAfter(new CsrfCookieFilter(), BasicAuthenticationFilter.class) | |
| 74 |         .authorizeHttpRequests(auth -> auth.anyRequest().permitAll()) | |
| 75 |         .logout(logout -> logout.logoutRequestMatcher(new AntPathRequestMatcher("/logout")).logoutSuccessUrl("/")); | |
| 76 |     return http.build(); | |
| 77 |   } | |
| 78 | ||
| 79 |   @Bean | |
| 80 |   public WebSecurityCustomizer webSecurityCustomizer() { | |
| 81 |     return web -> web.ignoring().requestMatchers("/h2-console/**"); | |
| 82 |   } | |
| 83 | ||
| 84 |   private GrantedAuthoritiesMapper userAuthoritiesMapper() { | |
| 85 |     return (authorities) -> { | |
| 86 |       Set<GrantedAuthority> mappedAuthorities = new HashSet<>(); | |
| 87 | ||
| 88 |       authorities.forEach(authority -> { | |
| 89 |         log.info("********** authority={}", authority); | |
| 90 |         mappedAuthorities.add(authority); | |
| 91 |         if (authority instanceof OAuth2UserAuthority oauth2UserAuthority) { | |
| 92 | ||
| 93 |           Map<String, Object> userAttributes = oauth2UserAuthority.getAttributes(); | |
| 94 |           log.info("********** userAttributes={}", userAttributes); | |
| 95 | ||
| 96 |           mappedAuthorities.add(new SimpleGrantedAuthority("ROLE_USER")); | |
| 97 | ||
| 98 |           String email = (String) userAttributes.get("email"); | |
| 99 |           if (getAdmin(email)) { | |
| 100 |             mappedAuthorities.add(new SimpleGrantedAuthority("ROLE_ADMIN")); | |
| 101 |           } | |
| 102 | ||
| 103 | ||
| 104 |           if (getDriver(email)) { | |
| 105 |             mappedAuthorities.add(new SimpleGrantedAuthority("ROLE_DRIVER")); | |
| 106 |           } | |
| 107 | ||
| 108 |           if (getRider(email)) { | |
| 109 |             mappedAuthorities.add(new SimpleGrantedAuthority("ROLE_RIDER")); | |
| 110 |           } | |
| 111 | ||
| 112 |           if (email.endsWith("@ucsb.edu")) { | |
| 113 |             mappedAuthorities.add(new SimpleGrantedAuthority("ROLE_MEMBER")); | |
| 114 |           } | |
| 115 |         } | |
| 116 | ||
| 117 |       }); | |
| 118 |       return mappedAuthorities; | |
| 119 |     }; | |
| 120 |   } | |
| 121 | ||
| 122 |   public boolean getAdmin(String email) { | |
| 123 |     if (adminEmails.contains(email)) { | |
| 124 |       return true; | |
| 125 |     } | |
| 126 |     Optional<User> u = userRepository.findByEmail(email); | |
| 127 |     return u.isPresent() && u.get().getAdmin(); | |
| 128 |   } | |
| 129 | ||
| 130 | ||
| 131 |   public boolean getDriver(String email){ | |
| 132 |     Optional<User> u = userRepository.findByEmail(email); | |
| 133 |     return u.isPresent() && u.get().getDriver(); | |
| 134 |   } | |
| 135 | ||
| 136 |   public boolean getRider(String email){ | |
| 137 |     Optional<User> u = userRepository.findByEmail(email); | |
| 138 |     return u.isPresent() && u.get().getRider(); | |
| 139 |   } | |
| 140 | ||
| 141 |   final class SpaCsrfTokenRequestHandler extends CsrfTokenRequestAttributeHandler { | |
| 142 |     private final CsrfTokenRequestHandler delegate = new XorCsrfTokenRequestAttributeHandler(); | |
| 143 | ||
| 144 |     @Override | |
| 145 |     public void handle(HttpServletRequest request, HttpServletResponse response, | |
| 146 |         Supplier<CsrfToken> deferredCsrfToken) { | |
| 147 |       /* | |
| 148 |        * Always use XorCsrfTokenRequestAttributeHandler to provide BREACH protection | |
| 149 |        * of | |
| 150 |        * the CsrfToken when it is rendered in the response body. | |
| 151 |        */ | |
| 152 | 
1
1. handle : removed call to org/springframework/security/web/csrf/CsrfTokenRequestHandler::handle → KILLED | 
      this.delegate.handle(request, response, deferredCsrfToken); | 
| 153 |     } | |
| 154 | ||
| 155 |     @Override | |
| 156 |     public String resolveCsrfTokenValue(HttpServletRequest request, CsrfToken csrfToken) { | |
| 157 |       /* | |
| 158 |        * If the request contains a request header, use | |
| 159 |        * CsrfTokenRequestAttributeHandler | |
| 160 |        * to resolve the CsrfToken. This applies when a single-page application | |
| 161 |        * includes | |
| 162 |        * the header value automatically, which was obtained via a cookie containing | |
| 163 |        * the | |
| 164 |        * raw CsrfToken. | |
| 165 |        */ | |
| 166 | 
1
1. resolveCsrfTokenValue : negated conditional → KILLED | 
      if (StringUtils.hasText(request.getHeader(csrfToken.getHeaderName()))) { | 
| 167 | 
1
1. resolveCsrfTokenValue : replaced return value with "" for edu/ucsb/cs156/gauchoride/config/SecurityConfig$SpaCsrfTokenRequestHandler::resolveCsrfTokenValue → KILLED | 
        return super.resolveCsrfTokenValue(request, csrfToken); | 
| 168 |       } | |
| 169 |       /* | |
| 170 |        * In all other cases (e.g. if the request contains a request parameter), use | |
| 171 |        * XorCsrfTokenRequestAttributeHandler to resolve the CsrfToken. This applies | |
| 172 |        * when a server-side rendered form includes the _csrf request parameter as a | |
| 173 |        * hidden input. | |
| 174 |        */ | |
| 175 | 
1
1. resolveCsrfTokenValue : replaced return value with "" for edu/ucsb/cs156/gauchoride/config/SecurityConfig$SpaCsrfTokenRequestHandler::resolveCsrfTokenValue → KILLED | 
      return this.delegate.resolveCsrfTokenValue(request, csrfToken); | 
| 176 |     } | |
| 177 |   } | |
| 178 | ||
| 179 |   final class CsrfCookieFilter extends OncePerRequestFilter { | |
| 180 | ||
| 181 |     @Override | |
| 182 |     protected void doFilterInternal(HttpServletRequest request, HttpServletResponse response, FilterChain filterChain) | |
| 183 |         throws ServletException, IOException { | |
| 184 |       CsrfToken csrfToken = (CsrfToken) request.getAttribute("_csrf"); | |
| 185 |       // Render the token value to a cookie by causing the deferred token to be loaded | |
| 186 |       csrfToken.getToken(); | |
| 187 | 
1
1. doFilterInternal : removed call to jakarta/servlet/FilterChain::doFilter → KILLED | 
      filterChain.doFilter(request, response); | 
| 188 |     } | |
| 189 |   } | |
| 190 | } | |
Mutations | ||
| 152 | 
 
 1.1  | 
|
| 166 | 
 
 1.1  | 
|
| 167 | 
 
 1.1  | 
|
| 175 | 
 
 1.1  | 
|
| 187 | 
 
 1.1  |