mirror of
https://github.com/spring-projects/spring-security.git
synced 2025-05-31 09:12:14 +00:00
Remove additional attribute name from CsrfWebFilter
Fixes gh-4799
This commit is contained in:
parent
91e27c1422
commit
3f18881493
@ -387,12 +387,6 @@ public class ServerHttpSecurity {
|
||||
return this;
|
||||
}
|
||||
|
||||
public CsrfBuilder csrfTokenAttributeName(String csrfTokenAttributeName) {
|
||||
Assert.notNull(csrfTokenAttributeName, "csrfTokenAttributeName cannot be null");
|
||||
this.filter.setCsrfTokenAttributeName(csrfTokenAttributeName);
|
||||
return this;
|
||||
}
|
||||
|
||||
public CsrfBuilder serverCsrfTokenRepository(
|
||||
ServerCsrfTokenRepository serverCsrfTokenRepository) {
|
||||
this.filter.setServerCsrfTokenRepository(serverCsrfTokenRepository);
|
||||
|
@ -59,19 +59,12 @@ public class CsrfWebFilter implements WebFilter {
|
||||
|
||||
private ServerAccessDeniedHandler serverAccessDeniedHandler = new HttpStatusServerAccessDeniedHandler(HttpStatus.FORBIDDEN);
|
||||
|
||||
private String csrfTokenAttributeName = "csrf";
|
||||
|
||||
public void setServerAccessDeniedHandler(
|
||||
ServerAccessDeniedHandler serverAccessDeniedHandler) {
|
||||
Assert.notNull(serverAccessDeniedHandler, "serverAccessDeniedHandler");
|
||||
this.serverAccessDeniedHandler = serverAccessDeniedHandler;
|
||||
}
|
||||
|
||||
public void setCsrfTokenAttributeName(String csrfTokenAttributeName) {
|
||||
Assert.notNull(csrfTokenAttributeName, "csrfTokenAttributeName cannot be null");
|
||||
this.csrfTokenAttributeName = csrfTokenAttributeName;
|
||||
}
|
||||
|
||||
public void setServerCsrfTokenRepository(
|
||||
ServerCsrfTokenRepository serverCsrfTokenRepository) {
|
||||
Assert.notNull(serverCsrfTokenRepository, "serverCsrfTokenRepository cannot be null");
|
||||
@ -113,7 +106,6 @@ public class CsrfWebFilter implements WebFilter {
|
||||
private Mono<Void> continueFilterChain(ServerWebExchange exchange, WebFilterChain chain) {
|
||||
return csrfToken(exchange)
|
||||
.doOnSuccess(csrfToken -> exchange.getAttributes().put(CsrfToken.class.getName(), csrfToken))
|
||||
.doOnSuccess(csrfToken -> exchange.getAttributes().put(this.csrfTokenAttributeName, csrfToken))
|
||||
.flatMap( t -> chain.filter(exchange))
|
||||
.then();
|
||||
}
|
||||
|
Loading…
x
Reference in New Issue
Block a user