2019-11-25 15:49:51 -06:00
|
|
|
[[webflux-http]]
|
|
|
|
= HTTP
|
2018-09-18 21:12:37 -05:00
|
|
|
|
2021-12-13 16:57:36 -06:00
|
|
|
All HTTP-based communication should be protected with xref:features/exploits/http.adoc#http[using TLS].
|
2018-09-18 21:12:37 -05:00
|
|
|
|
2021-04-21 16:01:26 -05:00
|
|
|
This section covers details about using WebFlux-specific features that assist with HTTPS usage.
|
2019-11-25 15:49:51 -06:00
|
|
|
|
|
|
|
[[webflux-http-redirect]]
|
|
|
|
== Redirect to HTTPS
|
|
|
|
|
2021-04-21 16:01:26 -05:00
|
|
|
If a client makes a request using HTTP rather than HTTPS, you can configure Spring Security to redirect to HTTPS.
|
2019-11-25 15:49:51 -06:00
|
|
|
|
2021-04-21 16:01:26 -05:00
|
|
|
The following Java configuration redirects any HTTP requests to HTTPS:
|
2019-11-25 15:49:51 -06:00
|
|
|
|
|
|
|
.Redirect to HTTPS
|
2023-06-18 21:30:41 -05:00
|
|
|
[tabs]
|
|
|
|
======
|
|
|
|
Java::
|
|
|
|
+
|
2020-09-18 14:43:23 +02:00
|
|
|
[source,java,role="primary"]
|
2018-09-18 21:12:37 -05:00
|
|
|
----
|
|
|
|
@Bean
|
2019-07-24 12:15:32 -04:00
|
|
|
SecurityWebFilterChain springSecurityFilterChain(ServerHttpSecurity http) {
|
2018-09-18 21:12:37 -05:00
|
|
|
http
|
|
|
|
// ...
|
2019-07-22 09:31:10 -04:00
|
|
|
.redirectToHttps(withDefaults());
|
2018-09-18 21:12:37 -05:00
|
|
|
return http.build();
|
|
|
|
}
|
|
|
|
----
|
2020-09-18 14:43:23 +02:00
|
|
|
|
2023-06-18 21:30:41 -05:00
|
|
|
Kotlin::
|
|
|
|
+
|
2020-09-18 14:43:23 +02:00
|
|
|
[source,kotlin,role="secondary"]
|
|
|
|
----
|
|
|
|
@Bean
|
|
|
|
fun springSecurityFilterChain(http: ServerHttpSecurity): SecurityWebFilterChain {
|
|
|
|
return http {
|
|
|
|
// ...
|
|
|
|
redirectToHttps { }
|
|
|
|
}
|
|
|
|
}
|
|
|
|
----
|
2023-06-18 21:30:41 -05:00
|
|
|
======
|
2018-09-18 21:12:37 -05:00
|
|
|
|
2021-04-21 16:01:26 -05:00
|
|
|
You can wrap the configuration can be wrapped around an `if` statement to be turned on only in production.
|
|
|
|
Alternatively, you can enable it by looking for a property about the request that happens only in production.
|
|
|
|
For example, if the production environment adds a header named `X-Forwarded-Proto`, you should use the following Java Configuration:
|
2018-09-18 21:12:37 -05:00
|
|
|
|
2019-11-25 15:49:51 -06:00
|
|
|
.Redirect to HTTPS when X-Forwarded
|
2023-06-18 21:30:41 -05:00
|
|
|
[tabs]
|
|
|
|
======
|
|
|
|
Java::
|
|
|
|
+
|
2020-09-18 14:43:23 +02:00
|
|
|
[source,java,role="primary"]
|
2018-09-18 21:12:37 -05:00
|
|
|
----
|
|
|
|
@Bean
|
2019-07-24 12:15:32 -04:00
|
|
|
SecurityWebFilterChain springSecurityFilterChain(ServerHttpSecurity http) {
|
2018-09-18 21:12:37 -05:00
|
|
|
http
|
|
|
|
// ...
|
2020-01-10 13:10:36 +01:00
|
|
|
.redirectToHttps(redirect -> redirect
|
|
|
|
.httpsRedirectWhen(e -> e.getRequest().getHeaders().containsKey("X-Forwarded-Proto"))
|
2019-07-22 09:31:10 -04:00
|
|
|
);
|
2018-09-18 21:12:37 -05:00
|
|
|
return http.build();
|
|
|
|
}
|
|
|
|
----
|
2020-09-18 14:43:23 +02:00
|
|
|
|
2023-06-18 21:30:41 -05:00
|
|
|
Kotlin::
|
|
|
|
+
|
2020-09-18 14:43:23 +02:00
|
|
|
[source,kotlin,role="secondary"]
|
|
|
|
----
|
|
|
|
@Bean
|
|
|
|
fun springSecurityFilterChain(http: ServerHttpSecurity): SecurityWebFilterChain {
|
|
|
|
return http {
|
|
|
|
// ...
|
|
|
|
redirectToHttps {
|
|
|
|
httpsRedirectWhen {
|
|
|
|
it.request.headers.containsKey("X-Forwarded-Proto")
|
|
|
|
}
|
|
|
|
}
|
|
|
|
}
|
|
|
|
}
|
|
|
|
----
|
2023-06-18 21:30:41 -05:00
|
|
|
======
|
2019-11-25 15:49:51 -06:00
|
|
|
|
|
|
|
[[webflux-hsts]]
|
|
|
|
== Strict Transport Security
|
|
|
|
|
2021-07-30 16:56:54 -05:00
|
|
|
Spring Security provides support for xref:servlet/exploits/headers.adoc#servlet-headers-hsts[Strict Transport Security] and enables it by default.
|
2019-11-25 15:49:51 -06:00
|
|
|
|
|
|
|
[[webflux-http-proxy-server]]
|
|
|
|
== Proxy Server Configuration
|
|
|
|
|
2021-08-10 15:21:42 -05:00
|
|
|
Spring Security xref:features/exploits/http.adoc#http-proxy-server[integrates with proxy servers].
|