Remove BaseDigestPasswordEncoder from core
Issue: gh-4674
This commit is contained in:
parent
a8aa65b828
commit
6a3e981c80
|
@ -26,7 +26,6 @@ import org.springframework.beans.factory.config.RuntimeBeanReference;
|
||||||
import org.springframework.beans.factory.support.BeanDefinitionBuilder;
|
import org.springframework.beans.factory.support.BeanDefinitionBuilder;
|
||||||
import org.springframework.beans.factory.support.RootBeanDefinition;
|
import org.springframework.beans.factory.support.RootBeanDefinition;
|
||||||
import org.springframework.beans.factory.xml.ParserContext;
|
import org.springframework.beans.factory.xml.ParserContext;
|
||||||
import org.springframework.security.authentication.encoding.BaseDigestPasswordEncoder;
|
|
||||||
import org.springframework.security.authentication.encoding.LdapShaPasswordEncoder;
|
import org.springframework.security.authentication.encoding.LdapShaPasswordEncoder;
|
||||||
import org.springframework.security.config.Elements;
|
import org.springframework.security.config.Elements;
|
||||||
import org.springframework.security.crypto.bcrypt.BCryptPasswordEncoder;
|
import org.springframework.security.crypto.bcrypt.BCryptPasswordEncoder;
|
||||||
|
@ -107,16 +106,6 @@ public class PasswordEncoderParser {
|
||||||
Class<?> beanClass = ENCODER_CLASSES.get(hash);
|
Class<?> beanClass = ENCODER_CLASSES.get(hash);
|
||||||
BeanDefinitionBuilder beanBldr = BeanDefinitionBuilder
|
BeanDefinitionBuilder beanBldr = BeanDefinitionBuilder
|
||||||
.rootBeanDefinition(beanClass);
|
.rootBeanDefinition(beanClass);
|
||||||
|
|
||||||
if (useBase64) {
|
|
||||||
if (BaseDigestPasswordEncoder.class.isAssignableFrom(beanClass)) {
|
|
||||||
beanBldr.addPropertyValue("encodeHashAsBase64", "true");
|
|
||||||
}
|
|
||||||
else {
|
|
||||||
logger.warn(ATT_BASE_64 + " isn't compatible with " + hash
|
|
||||||
+ " and will be ignored");
|
|
||||||
}
|
|
||||||
}
|
|
||||||
return beanBldr.getBeanDefinition();
|
return beanBldr.getBeanDefinition();
|
||||||
}
|
}
|
||||||
|
|
||||||
|
|
|
@ -56,7 +56,7 @@ password-encoder =
|
||||||
## element which defines a password encoding strategy. Used by an authentication provider to convert submitted passwords to hashed versions, for example.
|
## element which defines a password encoding strategy. Used by an authentication provider to convert submitted passwords to hashed versions, for example.
|
||||||
element password-encoder {password-encoder.attlist, salt-source?}
|
element password-encoder {password-encoder.attlist, salt-source?}
|
||||||
password-encoder.attlist &=
|
password-encoder.attlist &=
|
||||||
ref | (hash? & base64?)
|
ref | (hash)
|
||||||
|
|
||||||
salt-source =
|
salt-source =
|
||||||
## Password salting strategy. A system-wide constant or a property from the UserDetails object can be used.
|
## Password salting strategy. A system-wide constant or a property from the UserDetails object can be used.
|
||||||
|
|
|
@ -147,12 +147,6 @@
|
||||||
</xs:restriction>
|
</xs:restriction>
|
||||||
</xs:simpleType>
|
</xs:simpleType>
|
||||||
</xs:attribute>
|
</xs:attribute>
|
||||||
<xs:attribute name="base64" type="xs:boolean">
|
|
||||||
<xs:annotation>
|
|
||||||
<xs:documentation>Whether a string should be base64 encoded
|
|
||||||
</xs:documentation>
|
|
||||||
</xs:annotation>
|
|
||||||
</xs:attribute>
|
|
||||||
</xs:attributeGroup>
|
</xs:attributeGroup>
|
||||||
|
|
||||||
<xs:attributeGroup name="user-property">
|
<xs:attributeGroup name="user-property">
|
||||||
|
|
|
@ -1,49 +0,0 @@
|
||||||
/*
|
|
||||||
* Copyright 2004, 2005, 2006 Acegi Technology Pty Limited
|
|
||||||
*
|
|
||||||
* Licensed under the Apache License, Version 2.0 (the "License");
|
|
||||||
* you may not use this file except in compliance with the License.
|
|
||||||
* You may obtain a copy of the License at
|
|
||||||
*
|
|
||||||
* http://www.apache.org/licenses/LICENSE-2.0
|
|
||||||
*
|
|
||||||
* Unless required by applicable law or agreed to in writing, software
|
|
||||||
* distributed under the License is distributed on an "AS IS" BASIS,
|
|
||||||
* WITHOUT WARRANTIES OR CONDITIONS OF ANY KIND, either express or implied.
|
|
||||||
* See the License for the specific language governing permissions and
|
|
||||||
* limitations under the License.
|
|
||||||
*/
|
|
||||||
|
|
||||||
package org.springframework.security.authentication.encoding;
|
|
||||||
|
|
||||||
/**
|
|
||||||
* <p>
|
|
||||||
* Convenience base for digest password encoders.
|
|
||||||
* </p>
|
|
||||||
*
|
|
||||||
* @author colin sampaleanu
|
|
||||||
*/
|
|
||||||
public abstract class BaseDigestPasswordEncoder extends BasePasswordEncoder {
|
|
||||||
// ~ Instance fields
|
|
||||||
// ================================================================================================
|
|
||||||
|
|
||||||
private boolean encodeHashAsBase64 = false;
|
|
||||||
|
|
||||||
// ~ Methods
|
|
||||||
// ========================================================================================================
|
|
||||||
|
|
||||||
public boolean getEncodeHashAsBase64() {
|
|
||||||
return encodeHashAsBase64;
|
|
||||||
}
|
|
||||||
|
|
||||||
/**
|
|
||||||
* The encoded password is normally returned as Hex (32 char) version of the hash
|
|
||||||
* bytes. Setting this property to true will cause the encoded pass to be returned as
|
|
||||||
* Base64 text, which will consume 24 characters.
|
|
||||||
*
|
|
||||||
* @param encodeHashAsBase64 set to true for Base64 output
|
|
||||||
*/
|
|
||||||
public void setEncodeHashAsBase64(boolean encodeHashAsBase64) {
|
|
||||||
this.encodeHashAsBase64 = encodeHashAsBase64;
|
|
||||||
}
|
|
||||||
}
|
|
|
@ -1,105 +0,0 @@
|
||||||
/*
|
|
||||||
* Copyright 2004, 2005, 2006 Acegi Technology Pty Limited
|
|
||||||
*
|
|
||||||
* Licensed under the Apache License, Version 2.0 (the "License");
|
|
||||||
* you may not use this file except in compliance with the License.
|
|
||||||
* You may obtain a copy of the License at
|
|
||||||
*
|
|
||||||
* http://www.apache.org/licenses/LICENSE-2.0
|
|
||||||
*
|
|
||||||
* Unless required by applicable law or agreed to in writing, software
|
|
||||||
* distributed under the License is distributed on an "AS IS" BASIS,
|
|
||||||
* WITHOUT WARRANTIES OR CONDITIONS OF ANY KIND, either express or implied.
|
|
||||||
* See the License for the specific language governing permissions and
|
|
||||||
* limitations under the License.
|
|
||||||
*/
|
|
||||||
|
|
||||||
package org.springframework.security.authentication.encoding;
|
|
||||||
|
|
||||||
/**
|
|
||||||
* <p>
|
|
||||||
* Convenience base for all password encoders.
|
|
||||||
* </p>
|
|
||||||
*
|
|
||||||
* @author Ben Alex
|
|
||||||
*/
|
|
||||||
public abstract class BasePasswordEncoder implements PasswordEncoder {
|
|
||||||
// ~ Methods
|
|
||||||
// ========================================================================================================
|
|
||||||
|
|
||||||
/**
|
|
||||||
* Used by subclasses to extract the password and salt from a merged
|
|
||||||
* <code>String</code> created using
|
|
||||||
* {@link #mergePasswordAndSalt(String,Object,boolean)}.
|
|
||||||
* <p>
|
|
||||||
* The first element in the returned array is the password. The second element is the
|
|
||||||
* salt. The salt array element will always be present, even if no salt was found in
|
|
||||||
* the <code>mergedPasswordSalt</code> argument.
|
|
||||||
* </p>
|
|
||||||
*
|
|
||||||
* @param mergedPasswordSalt as generated by <code>mergePasswordAndSalt</code>
|
|
||||||
*
|
|
||||||
* @return an array, in which the first element is the password and the second the
|
|
||||||
* salt
|
|
||||||
*
|
|
||||||
* @throws IllegalArgumentException if mergedPasswordSalt is null or empty.
|
|
||||||
*/
|
|
||||||
protected String[] demergePasswordAndSalt(String mergedPasswordSalt) {
|
|
||||||
if ((mergedPasswordSalt == null) || "".equals(mergedPasswordSalt)) {
|
|
||||||
throw new IllegalArgumentException("Cannot pass a null or empty String");
|
|
||||||
}
|
|
||||||
|
|
||||||
String password = mergedPasswordSalt;
|
|
||||||
String salt = "";
|
|
||||||
|
|
||||||
int saltBegins = mergedPasswordSalt.lastIndexOf("{");
|
|
||||||
|
|
||||||
if ((saltBegins != -1) && ((saltBegins + 1) < mergedPasswordSalt.length())) {
|
|
||||||
salt = mergedPasswordSalt.substring(saltBegins + 1,
|
|
||||||
mergedPasswordSalt.length() - 1);
|
|
||||||
password = mergedPasswordSalt.substring(0, saltBegins);
|
|
||||||
}
|
|
||||||
|
|
||||||
return new String[] { password, salt };
|
|
||||||
}
|
|
||||||
|
|
||||||
/**
|
|
||||||
* Used by subclasses to generate a merged password and salt <code>String</code>.
|
|
||||||
* <P>
|
|
||||||
* The generated password will be in the form of <code>password{salt}</code>.
|
|
||||||
* </p>
|
|
||||||
* <p>
|
|
||||||
* A <code>null</code> can be passed to either method, and will be handled correctly.
|
|
||||||
* If the <code>salt</code> is <code>null</code> or empty, the resulting generated
|
|
||||||
* password will simply be the passed <code>password</code>. The <code>toString</code>
|
|
||||||
* method of the <code>salt</code> will be used to represent the salt.
|
|
||||||
* </p>
|
|
||||||
*
|
|
||||||
* @param password the password to be used (can be <code>null</code>)
|
|
||||||
* @param salt the salt to be used (can be <code>null</code>)
|
|
||||||
* @param strict ensures salt doesn't contain the delimiters
|
|
||||||
*
|
|
||||||
* @return a merged password and salt <code>String</code>
|
|
||||||
*
|
|
||||||
* @throws IllegalArgumentException if the salt contains '{' or '}' characters.
|
|
||||||
*/
|
|
||||||
protected String mergePasswordAndSalt(String password, Object salt, boolean strict) {
|
|
||||||
if (password == null) {
|
|
||||||
password = "";
|
|
||||||
}
|
|
||||||
|
|
||||||
if (strict && (salt != null)) {
|
|
||||||
if ((salt.toString().lastIndexOf("{") != -1)
|
|
||||||
|| (salt.toString().lastIndexOf("}") != -1)) {
|
|
||||||
throw new IllegalArgumentException("Cannot use { or } in salt.toString()");
|
|
||||||
}
|
|
||||||
}
|
|
||||||
|
|
||||||
if ((salt == null) || "".equals(salt)) {
|
|
||||||
return password;
|
|
||||||
}
|
|
||||||
else {
|
|
||||||
return password + "{" + salt.toString() + "}";
|
|
||||||
}
|
|
||||||
}
|
|
||||||
}
|
|
|
@ -1,155 +0,0 @@
|
||||||
/*
|
|
||||||
* Copyright 2004, 2005, 2006 Acegi Technology Pty Limited
|
|
||||||
*
|
|
||||||
* Licensed under the Apache License, Version 2.0 (the "License");
|
|
||||||
* you may not use this file except in compliance with the License.
|
|
||||||
* You may obtain a copy of the License at
|
|
||||||
*
|
|
||||||
* http://www.apache.org/licenses/LICENSE-2.0
|
|
||||||
*
|
|
||||||
* Unless required by applicable law or agreed to in writing, software
|
|
||||||
* distributed under the License is distributed on an "AS IS" BASIS,
|
|
||||||
* WITHOUT WARRANTIES OR CONDITIONS OF ANY KIND, either express or implied.
|
|
||||||
* See the License for the specific language governing permissions and
|
|
||||||
* limitations under the License.
|
|
||||||
*/
|
|
||||||
|
|
||||||
package org.springframework.security.authentication.encoding;
|
|
||||||
|
|
||||||
import static org.assertj.core.api.Assertions.*;
|
|
||||||
|
|
||||||
import org.junit.Test;
|
|
||||||
|
|
||||||
|
|
||||||
/**
|
|
||||||
* <p>
|
|
||||||
* TestCase for BasePasswordEncoder.
|
|
||||||
* </p>
|
|
||||||
*
|
|
||||||
* @author Ben Alex
|
|
||||||
*/
|
|
||||||
public class BasePasswordEncoderTests {
|
|
||||||
// ~ Methods
|
|
||||||
// ========================================================================================================
|
|
||||||
|
|
||||||
@Test
|
|
||||||
public void testDemergeHandlesEmptyAndNullSalts() {
|
|
||||||
MockPasswordEncoder pwd = new MockPasswordEncoder();
|
|
||||||
|
|
||||||
String merged = pwd.nowMergePasswordAndSalt("password", null, true);
|
|
||||||
|
|
||||||
String[] demerged = pwd.nowDemergePasswordAndSalt(merged);
|
|
||||||
assertThat(demerged[0]).isEqualTo("password");
|
|
||||||
assertThat(demerged[1]).isEqualTo("");
|
|
||||||
|
|
||||||
merged = pwd.nowMergePasswordAndSalt("password", "", true);
|
|
||||||
|
|
||||||
demerged = pwd.nowDemergePasswordAndSalt(merged);
|
|
||||||
assertThat(demerged[0]).isEqualTo("password");
|
|
||||||
assertThat(demerged[1]).isEqualTo("");
|
|
||||||
}
|
|
||||||
@Test
|
|
||||||
public void testDemergeWithEmptyStringIsRejected() {
|
|
||||||
MockPasswordEncoder pwd = new MockPasswordEncoder();
|
|
||||||
|
|
||||||
try {
|
|
||||||
pwd.nowDemergePasswordAndSalt("");
|
|
||||||
fail("Should have thrown IllegalArgumentException");
|
|
||||||
}
|
|
||||||
catch (IllegalArgumentException expected) {
|
|
||||||
assertThat(expected.getMessage()).isEqualTo("Cannot pass a null or empty String");
|
|
||||||
}
|
|
||||||
}
|
|
||||||
@Test
|
|
||||||
public void testDemergeWithNullIsRejected() {
|
|
||||||
MockPasswordEncoder pwd = new MockPasswordEncoder();
|
|
||||||
|
|
||||||
try {
|
|
||||||
pwd.nowDemergePasswordAndSalt(null);
|
|
||||||
fail("Should have thrown IllegalArgumentException");
|
|
||||||
}
|
|
||||||
catch (IllegalArgumentException expected) {
|
|
||||||
assertThat(expected.getMessage()).isEqualTo("Cannot pass a null or empty String");
|
|
||||||
}
|
|
||||||
}
|
|
||||||
@Test
|
|
||||||
public void testMergeDemerge() {
|
|
||||||
MockPasswordEncoder pwd = new MockPasswordEncoder();
|
|
||||||
|
|
||||||
String merged = pwd.nowMergePasswordAndSalt("password", "foo", true);
|
|
||||||
assertThat(merged).isEqualTo("password{foo}");
|
|
||||||
|
|
||||||
String[] demerged = pwd.nowDemergePasswordAndSalt(merged);
|
|
||||||
assertThat(demerged[0]).isEqualTo("password");
|
|
||||||
assertThat(demerged[1]).isEqualTo("foo");
|
|
||||||
}
|
|
||||||
@Test
|
|
||||||
public void testMergeDemergeWithDelimitersInPassword() {
|
|
||||||
MockPasswordEncoder pwd = new MockPasswordEncoder();
|
|
||||||
|
|
||||||
String merged = pwd.nowMergePasswordAndSalt("p{ass{w{o}rd", "foo", true);
|
|
||||||
assertThat(merged).isEqualTo("p{ass{w{o}rd{foo}");
|
|
||||||
|
|
||||||
String[] demerged = pwd.nowDemergePasswordAndSalt(merged);
|
|
||||||
|
|
||||||
assertThat(demerged[0]).isEqualTo("p{ass{w{o}rd");
|
|
||||||
assertThat(demerged[1]).isEqualTo("foo");
|
|
||||||
}
|
|
||||||
@Test
|
|
||||||
public void testMergeDemergeWithNullAsPassword() {
|
|
||||||
MockPasswordEncoder pwd = new MockPasswordEncoder();
|
|
||||||
|
|
||||||
String merged = pwd.nowMergePasswordAndSalt(null, "foo", true);
|
|
||||||
assertThat(merged).isEqualTo("{foo}");
|
|
||||||
|
|
||||||
String[] demerged = pwd.nowDemergePasswordAndSalt(merged);
|
|
||||||
assertThat(demerged[0]).isEqualTo("");
|
|
||||||
assertThat(demerged[1]).isEqualTo("foo");
|
|
||||||
}
|
|
||||||
@Test
|
|
||||||
public void testStrictMergeRejectsDelimitersInSalt1() {
|
|
||||||
MockPasswordEncoder pwd = new MockPasswordEncoder();
|
|
||||||
|
|
||||||
try {
|
|
||||||
pwd.nowMergePasswordAndSalt("password", "f{oo", true);
|
|
||||||
fail("Should have thrown IllegalArgumentException");
|
|
||||||
}
|
|
||||||
catch (IllegalArgumentException expected) {
|
|
||||||
assertThat(expected.getMessage()).isEqualTo("Cannot use { or } in salt.toString()");
|
|
||||||
}
|
|
||||||
}
|
|
||||||
@Test
|
|
||||||
public void testStrictMergeRejectsDelimitersInSalt2() {
|
|
||||||
MockPasswordEncoder pwd = new MockPasswordEncoder();
|
|
||||||
|
|
||||||
try {
|
|
||||||
pwd.nowMergePasswordAndSalt("password", "f}oo", true);
|
|
||||||
fail("Should have thrown IllegalArgumentException");
|
|
||||||
}
|
|
||||||
catch (IllegalArgumentException expected) {
|
|
||||||
assertThat(expected.getMessage()).isEqualTo("Cannot use { or } in salt.toString()");
|
|
||||||
}
|
|
||||||
}
|
|
||||||
|
|
||||||
// ~ Inner Classes
|
|
||||||
// ==================================================================================================
|
|
||||||
|
|
||||||
private class MockPasswordEncoder extends BasePasswordEncoder {
|
|
||||||
public String encodePassword(String rawPass, Object salt) {
|
|
||||||
throw new UnsupportedOperationException("mock method not implemented");
|
|
||||||
}
|
|
||||||
|
|
||||||
public boolean isPasswordValid(String encPass, String rawPass, Object salt) {
|
|
||||||
throw new UnsupportedOperationException("mock method not implemented");
|
|
||||||
}
|
|
||||||
|
|
||||||
public String[] nowDemergePasswordAndSalt(String password) {
|
|
||||||
return demergePasswordAndSalt(password);
|
|
||||||
}
|
|
||||||
|
|
||||||
public String nowMergePasswordAndSalt(String password, Object salt, boolean strict) {
|
|
||||||
return mergePasswordAndSalt(password, salt, strict);
|
|
||||||
}
|
|
||||||
}
|
|
||||||
}
|
|
||||||
|
|
|
@ -9185,11 +9185,6 @@ Authentication providers can optionally be configured to use a password encoder
|
||||||
===== <password-encoder> Attributes
|
===== <password-encoder> Attributes
|
||||||
|
|
||||||
|
|
||||||
[[nsa-password-encoder-base64]]
|
|
||||||
* **base64**
|
|
||||||
Whether a string should be base64 encoded
|
|
||||||
|
|
||||||
|
|
||||||
[[nsa-password-encoder-hash]]
|
[[nsa-password-encoder-hash]]
|
||||||
* **hash**
|
* **hash**
|
||||||
Defines the hashing algorithm used on user passwords. We recommend strongly against using MD4, as it is a very weak hashing algorithm.
|
Defines the hashing algorithm used on user passwords. We recommend strongly against using MD4, as it is a very weak hashing algorithm.
|
||||||
|
|
Loading…
Reference in New Issue