mirror of
https://github.com/spring-projects/spring-security.git
synced 2025-06-27 22:32:43 +00:00
Add Support SubjectX500PrincipalExtractor
Closes gh-16980 Signed-off-by: Max Batischev <mblancer@mail.ru>
This commit is contained in:
parent
e8f920e0ee
commit
aba437d469
@ -1,5 +1,5 @@
|
|||||||
/*
|
/*
|
||||||
* Copyright 2002-2024 the original author or authors.
|
* Copyright 2002-2025 the original author or authors.
|
||||||
*
|
*
|
||||||
* Licensed under the Apache License, Version 2.0 (the "License");
|
* Licensed under the Apache License, Version 2.0 (the "License");
|
||||||
* you may not use this file except in compliance with the License.
|
* you may not use this file except in compliance with the License.
|
||||||
@ -33,6 +33,7 @@ import org.springframework.security.web.authentication.preauth.PreAuthenticatedA
|
|||||||
import org.springframework.security.web.authentication.preauth.PreAuthenticatedAuthenticationToken;
|
import org.springframework.security.web.authentication.preauth.PreAuthenticatedAuthenticationToken;
|
||||||
import org.springframework.security.web.authentication.preauth.PreAuthenticatedGrantedAuthoritiesWebAuthenticationDetails;
|
import org.springframework.security.web.authentication.preauth.PreAuthenticatedGrantedAuthoritiesWebAuthenticationDetails;
|
||||||
import org.springframework.security.web.authentication.preauth.x509.SubjectDnX509PrincipalExtractor;
|
import org.springframework.security.web.authentication.preauth.x509.SubjectDnX509PrincipalExtractor;
|
||||||
|
import org.springframework.security.web.authentication.preauth.x509.SubjectX500PrincipalExtractor;
|
||||||
import org.springframework.security.web.authentication.preauth.x509.X509AuthenticationFilter;
|
import org.springframework.security.web.authentication.preauth.x509.X509AuthenticationFilter;
|
||||||
import org.springframework.security.web.authentication.preauth.x509.X509PrincipalExtractor;
|
import org.springframework.security.web.authentication.preauth.x509.X509PrincipalExtractor;
|
||||||
import org.springframework.security.web.context.RequestAttributeSecurityContextRepository;
|
import org.springframework.security.web.context.RequestAttributeSecurityContextRepository;
|
||||||
@ -74,6 +75,7 @@ import org.springframework.security.web.context.RequestAttributeSecurityContextR
|
|||||||
*
|
*
|
||||||
* @author Rob Winch
|
* @author Rob Winch
|
||||||
* @author Ngoc Nhan
|
* @author Ngoc Nhan
|
||||||
|
* @author Max Batischev
|
||||||
* @since 3.2
|
* @since 3.2
|
||||||
*/
|
*/
|
||||||
public final class X509Configurer<H extends HttpSecurityBuilder<H>>
|
public final class X509Configurer<H extends HttpSecurityBuilder<H>>
|
||||||
@ -161,14 +163,38 @@ public final class X509Configurer<H extends HttpSecurityBuilder<H>>
|
|||||||
* @param subjectPrincipalRegex the regex to extract the user principal from the
|
* @param subjectPrincipalRegex the regex to extract the user principal from the
|
||||||
* certificate (i.e. "CN=(.*?)(?:,|$)").
|
* certificate (i.e. "CN=(.*?)(?:,|$)").
|
||||||
* @return the {@link X509Configurer} for further customizations
|
* @return the {@link X509Configurer} for further customizations
|
||||||
|
* @deprecated Please use {{@link #extractPrincipalNameFromEmail(boolean)}} instead
|
||||||
*/
|
*/
|
||||||
|
@Deprecated
|
||||||
public X509Configurer<H> subjectPrincipalRegex(String subjectPrincipalRegex) {
|
public X509Configurer<H> subjectPrincipalRegex(String subjectPrincipalRegex) {
|
||||||
|
if (this.x509PrincipalExtractor instanceof SubjectX500PrincipalExtractor) {
|
||||||
|
throw new IllegalStateException(
|
||||||
|
"Cannot use subjectPrincipalRegex and extractPrincipalNameFromEmail together. "
|
||||||
|
+ "Please use one or the other.");
|
||||||
|
}
|
||||||
SubjectDnX509PrincipalExtractor principalExtractor = new SubjectDnX509PrincipalExtractor();
|
SubjectDnX509PrincipalExtractor principalExtractor = new SubjectDnX509PrincipalExtractor();
|
||||||
principalExtractor.setSubjectDnRegex(subjectPrincipalRegex);
|
principalExtractor.setSubjectDnRegex(subjectPrincipalRegex);
|
||||||
this.x509PrincipalExtractor = principalExtractor;
|
this.x509PrincipalExtractor = principalExtractor;
|
||||||
return this;
|
return this;
|
||||||
}
|
}
|
||||||
|
|
||||||
|
/**
|
||||||
|
* If true then DN will be extracted from EMAIlADDRESS, defaults to {@code false}
|
||||||
|
* @param extractPrincipalNameFromEmail whether to extract DN from EMAIlADDRESS
|
||||||
|
* @since 7.0
|
||||||
|
*/
|
||||||
|
public X509Configurer<H> extractPrincipalNameFromEmail(boolean extractPrincipalNameFromEmail) {
|
||||||
|
if (this.x509PrincipalExtractor instanceof SubjectDnX509PrincipalExtractor) {
|
||||||
|
throw new IllegalStateException(
|
||||||
|
"Cannot use subjectPrincipalRegex and extractPrincipalNameFromEmail together. "
|
||||||
|
+ "Please use one or the other.");
|
||||||
|
}
|
||||||
|
SubjectX500PrincipalExtractor extractor = new SubjectX500PrincipalExtractor();
|
||||||
|
extractor.setExtractPrincipalNameFromEmail(extractPrincipalNameFromEmail);
|
||||||
|
this.x509PrincipalExtractor = extractor;
|
||||||
|
return this;
|
||||||
|
}
|
||||||
|
|
||||||
@Override
|
@Override
|
||||||
public void init(H http) {
|
public void init(H http) {
|
||||||
PreAuthenticatedAuthenticationProvider authenticationProvider = new PreAuthenticatedAuthenticationProvider();
|
PreAuthenticatedAuthenticationProvider authenticationProvider = new PreAuthenticatedAuthenticationProvider();
|
||||||
|
@ -1,5 +1,5 @@
|
|||||||
/*
|
/*
|
||||||
* Copyright 2002-2023 the original author or authors.
|
* Copyright 2002-2025 the original author or authors.
|
||||||
*
|
*
|
||||||
* Licensed under the Apache License, Version 2.0 (the "License");
|
* Licensed under the Apache License, Version 2.0 (the "License");
|
||||||
* you may not use this file except in compliance with the License.
|
* you may not use this file except in compliance with the License.
|
||||||
@ -57,6 +57,7 @@ import org.springframework.security.web.authentication.preauth.PreAuthenticatedG
|
|||||||
import org.springframework.security.web.authentication.preauth.j2ee.J2eeBasedPreAuthenticatedWebAuthenticationDetailsSource;
|
import org.springframework.security.web.authentication.preauth.j2ee.J2eeBasedPreAuthenticatedWebAuthenticationDetailsSource;
|
||||||
import org.springframework.security.web.authentication.preauth.j2ee.J2eePreAuthenticatedProcessingFilter;
|
import org.springframework.security.web.authentication.preauth.j2ee.J2eePreAuthenticatedProcessingFilter;
|
||||||
import org.springframework.security.web.authentication.preauth.x509.SubjectDnX509PrincipalExtractor;
|
import org.springframework.security.web.authentication.preauth.x509.SubjectDnX509PrincipalExtractor;
|
||||||
|
import org.springframework.security.web.authentication.preauth.x509.SubjectX500PrincipalExtractor;
|
||||||
import org.springframework.security.web.authentication.preauth.x509.X509AuthenticationFilter;
|
import org.springframework.security.web.authentication.preauth.x509.X509AuthenticationFilter;
|
||||||
import org.springframework.security.web.authentication.ui.DefaultLoginPageGeneratingFilter;
|
import org.springframework.security.web.authentication.ui.DefaultLoginPageGeneratingFilter;
|
||||||
import org.springframework.security.web.authentication.ui.DefaultLogoutPageGeneratingFilter;
|
import org.springframework.security.web.authentication.ui.DefaultLogoutPageGeneratingFilter;
|
||||||
@ -522,12 +523,25 @@ final class AuthenticationConfigBuilder {
|
|||||||
filterBuilder.addPropertyValue("securityContextHolderStrategy",
|
filterBuilder.addPropertyValue("securityContextHolderStrategy",
|
||||||
authenticationFilterSecurityContextHolderStrategyRef);
|
authenticationFilterSecurityContextHolderStrategyRef);
|
||||||
String regex = x509Elt.getAttribute("subject-principal-regex");
|
String regex = x509Elt.getAttribute("subject-principal-regex");
|
||||||
|
String extractPrincipalNameFromEmail = x509Elt.getAttribute("extract-principal-name-from-email");
|
||||||
|
if (StringUtils.hasText(regex) && StringUtils.hasText(extractPrincipalNameFromEmail)) {
|
||||||
|
throw new IllegalStateException(
|
||||||
|
"Cannot use subjectPrincipalRegex and extractPrincipalNameFromEmail together. "
|
||||||
|
+ "Please use one or the other.");
|
||||||
|
}
|
||||||
if (StringUtils.hasText(regex)) {
|
if (StringUtils.hasText(regex)) {
|
||||||
BeanDefinitionBuilder extractor = BeanDefinitionBuilder
|
BeanDefinitionBuilder extractor = BeanDefinitionBuilder
|
||||||
.rootBeanDefinition(SubjectDnX509PrincipalExtractor.class);
|
.rootBeanDefinition(SubjectDnX509PrincipalExtractor.class);
|
||||||
extractor.addPropertyValue("subjectDnRegex", regex);
|
extractor.addPropertyValue("subjectDnRegex", regex);
|
||||||
filterBuilder.addPropertyValue("principalExtractor", extractor.getBeanDefinition());
|
filterBuilder.addPropertyValue("principalExtractor", extractor.getBeanDefinition());
|
||||||
}
|
}
|
||||||
|
if (StringUtils.hasText(extractPrincipalNameFromEmail)) {
|
||||||
|
BeanDefinitionBuilder extractor = BeanDefinitionBuilder
|
||||||
|
.rootBeanDefinition(SubjectX500PrincipalExtractor.class);
|
||||||
|
extractor.addPropertyValue("extractPrincipalNameFromEmail",
|
||||||
|
Boolean.parseBoolean(extractPrincipalNameFromEmail));
|
||||||
|
filterBuilder.addPropertyValue("principalExtractor", extractor.getBeanDefinition());
|
||||||
|
}
|
||||||
injectAuthenticationDetailsSource(x509Elt, filterBuilder);
|
injectAuthenticationDetailsSource(x509Elt, filterBuilder);
|
||||||
filter = (RootBeanDefinition) filterBuilder.getBeanDefinition();
|
filter = (RootBeanDefinition) filterBuilder.getBeanDefinition();
|
||||||
createPrauthEntryPoint(x509Elt);
|
createPrauthEntryPoint(x509Elt);
|
||||||
|
@ -119,7 +119,7 @@ import org.springframework.security.oauth2.server.resource.web.server.BearerToke
|
|||||||
import org.springframework.security.oauth2.server.resource.web.server.authentication.ServerBearerTokenAuthenticationConverter;
|
import org.springframework.security.oauth2.server.resource.web.server.authentication.ServerBearerTokenAuthenticationConverter;
|
||||||
import org.springframework.security.web.PortMapper;
|
import org.springframework.security.web.PortMapper;
|
||||||
import org.springframework.security.web.authentication.logout.LogoutHandler;
|
import org.springframework.security.web.authentication.logout.LogoutHandler;
|
||||||
import org.springframework.security.web.authentication.preauth.x509.SubjectDnX509PrincipalExtractor;
|
import org.springframework.security.web.authentication.preauth.x509.SubjectX500PrincipalExtractor;
|
||||||
import org.springframework.security.web.authentication.preauth.x509.X509PrincipalExtractor;
|
import org.springframework.security.web.authentication.preauth.x509.X509PrincipalExtractor;
|
||||||
import org.springframework.security.web.server.DefaultServerRedirectStrategy;
|
import org.springframework.security.web.server.DefaultServerRedirectStrategy;
|
||||||
import org.springframework.security.web.server.DelegatingServerAuthenticationEntryPoint;
|
import org.springframework.security.web.server.DelegatingServerAuthenticationEntryPoint;
|
||||||
@ -944,8 +944,8 @@ public class ServerHttpSecurity {
|
|||||||
* }
|
* }
|
||||||
* </pre>
|
* </pre>
|
||||||
*
|
*
|
||||||
* Note that if extractor is not specified, {@link SubjectDnX509PrincipalExtractor}
|
* Note that if extractor is not specified, {@link SubjectX500PrincipalExtractor} will
|
||||||
* will be used. If authenticationManager is not specified,
|
* be used. If authenticationManager is not specified,
|
||||||
* {@link ReactivePreAuthenticatedAuthenticationManager} will be used.
|
* {@link ReactivePreAuthenticatedAuthenticationManager} will be used.
|
||||||
* @return the {@link X509Spec} to customize
|
* @return the {@link X509Spec} to customize
|
||||||
* @since 5.2
|
* @since 5.2
|
||||||
@ -979,8 +979,8 @@ public class ServerHttpSecurity {
|
|||||||
* }
|
* }
|
||||||
* </pre>
|
* </pre>
|
||||||
*
|
*
|
||||||
* Note that if extractor is not specified, {@link SubjectDnX509PrincipalExtractor}
|
* Note that if extractor is not specified, {@link SubjectX500PrincipalExtractor} will
|
||||||
* will be used. If authenticationManager is not specified,
|
* be used. If authenticationManager is not specified,
|
||||||
* {@link ReactivePreAuthenticatedAuthenticationManager} will be used.
|
* {@link ReactivePreAuthenticatedAuthenticationManager} will be used.
|
||||||
* @param x509Customizer the {@link Customizer} to provide more options for the
|
* @param x509Customizer the {@link Customizer} to provide more options for the
|
||||||
* {@link X509Spec}
|
* {@link X509Spec}
|
||||||
@ -4181,7 +4181,7 @@ public class ServerHttpSecurity {
|
|||||||
if (this.principalExtractor != null) {
|
if (this.principalExtractor != null) {
|
||||||
return this.principalExtractor;
|
return this.principalExtractor;
|
||||||
}
|
}
|
||||||
return new SubjectDnX509PrincipalExtractor();
|
return new SubjectX500PrincipalExtractor();
|
||||||
}
|
}
|
||||||
|
|
||||||
private ReactiveAuthenticationManager getAuthenticationManager() {
|
private ReactiveAuthenticationManager getAuthenticationManager() {
|
||||||
|
@ -1053,6 +1053,9 @@ x509.attlist &=
|
|||||||
x509.attlist &=
|
x509.attlist &=
|
||||||
## Reference to an AuthenticationDetailsSource which will be used by the authentication filter
|
## Reference to an AuthenticationDetailsSource which will be used by the authentication filter
|
||||||
attribute authentication-details-source-ref {xsd:token}?
|
attribute authentication-details-source-ref {xsd:token}?
|
||||||
|
x509.attlist &=
|
||||||
|
## If true then DN will be extracted from EMAIlADDRESS
|
||||||
|
attribute extract-principal-name-from-email {xsd:token}?
|
||||||
|
|
||||||
jee =
|
jee =
|
||||||
## Adds a J2eePreAuthenticatedProcessingFilter to the filter chain to provide integration with container authentication.
|
## Adds a J2eePreAuthenticatedProcessingFilter to the filter chain to provide integration with container authentication.
|
||||||
|
@ -2917,6 +2917,12 @@
|
|||||||
</xs:documentation>
|
</xs:documentation>
|
||||||
</xs:annotation>
|
</xs:annotation>
|
||||||
</xs:attribute>
|
</xs:attribute>
|
||||||
|
<xs:attribute name="extract-principal-name-from-email" type="xs:token">
|
||||||
|
<xs:annotation>
|
||||||
|
<xs:documentation>If true then DN will be extracted from EMAIlADDRESS
|
||||||
|
</xs:documentation>
|
||||||
|
</xs:annotation>
|
||||||
|
</xs:attribute>
|
||||||
</xs:attributeGroup>
|
</xs:attributeGroup>
|
||||||
<xs:element name="jee">
|
<xs:element name="jee">
|
||||||
<xs:annotation>
|
<xs:annotation>
|
||||||
|
@ -1,5 +1,5 @@
|
|||||||
/*
|
/*
|
||||||
* Copyright 2002-2023 the original author or authors.
|
* Copyright 2002-2025 the original author or authors.
|
||||||
*
|
*
|
||||||
* Licensed under the Apache License, Version 2.0 (the "License");
|
* Licensed under the Apache License, Version 2.0 (the "License");
|
||||||
* you may not use this file except in compliance with the License.
|
* you may not use this file except in compliance with the License.
|
||||||
@ -123,6 +123,16 @@ public class X509ConfigurerTests {
|
|||||||
// @formatter:on
|
// @formatter:on
|
||||||
}
|
}
|
||||||
|
|
||||||
|
@Test
|
||||||
|
public void x509WhenExtractPrincipalNameFromEmailIsTrueThenUsesEmailAddressToExtractPrincipal() throws Exception {
|
||||||
|
this.spring.register(EmailPrincipalConfig.class).autowire();
|
||||||
|
X509Certificate certificate = loadCert("max.cer");
|
||||||
|
// @formatter:off
|
||||||
|
this.mvc.perform(get("/").with(x509(certificate)))
|
||||||
|
.andExpect(authenticated().withUsername("maxbatischev@gmail.com"));
|
||||||
|
// @formatter:on
|
||||||
|
}
|
||||||
|
|
||||||
@Test
|
@Test
|
||||||
public void x509WhenUserDetailsServiceNotConfiguredThenUsesBean() throws Exception {
|
public void x509WhenUserDetailsServiceNotConfiguredThenUsesBean() throws Exception {
|
||||||
this.spring.register(UserDetailsServiceBeanConfig.class).autowire();
|
this.spring.register(UserDetailsServiceBeanConfig.class).autowire();
|
||||||
@ -277,6 +287,33 @@ public class X509ConfigurerTests {
|
|||||||
|
|
||||||
}
|
}
|
||||||
|
|
||||||
|
@Configuration
|
||||||
|
@EnableWebSecurity
|
||||||
|
static class EmailPrincipalConfig {
|
||||||
|
|
||||||
|
@Bean
|
||||||
|
SecurityFilterChain filterChain(HttpSecurity http) throws Exception {
|
||||||
|
// @formatter:off
|
||||||
|
http
|
||||||
|
.x509((x509) ->
|
||||||
|
x509.extractPrincipalNameFromEmail(true)
|
||||||
|
);
|
||||||
|
// @formatter:on
|
||||||
|
return http.build();
|
||||||
|
}
|
||||||
|
|
||||||
|
@Bean
|
||||||
|
UserDetailsService userDetailsService() {
|
||||||
|
UserDetails user = User.withDefaultPasswordEncoder()
|
||||||
|
.username("maxbatischev@gmail.com")
|
||||||
|
.password("password")
|
||||||
|
.roles("USER", "ADMIN")
|
||||||
|
.build();
|
||||||
|
return new InMemoryUserDetailsManager(user);
|
||||||
|
}
|
||||||
|
|
||||||
|
}
|
||||||
|
|
||||||
@Configuration
|
@Configuration
|
||||||
@EnableWebSecurity
|
@EnableWebSecurity
|
||||||
static class UserDetailsServiceBeanConfig {
|
static class UserDetailsServiceBeanConfig {
|
||||||
|
BIN
config/src/test/resources/max.cer
Normal file
BIN
config/src/test/resources/max.cer
Normal file
Binary file not shown.
@ -2229,6 +2229,9 @@ Defines a regular expression which will be used to extract the username from the
|
|||||||
Allows a specific `UserDetailsService` to be used with X.509 in the case where multiple instances are configured.
|
Allows a specific `UserDetailsService` to be used with X.509 in the case where multiple instances are configured.
|
||||||
If not set, an attempt will be made to locate a suitable instance automatically and use that.
|
If not set, an attempt will be made to locate a suitable instance automatically and use that.
|
||||||
|
|
||||||
|
[[nsa-x509-extract-principal-name-from-email]]
|
||||||
|
* **extract-principal-name-from-email**
|
||||||
|
If true then DN will be extracted from EMAIlADDRESS.
|
||||||
|
|
||||||
[[nsa-filter-chain-map]]
|
[[nsa-filter-chain-map]]
|
||||||
== <filter-chain-map>
|
== <filter-chain-map>
|
||||||
|
@ -1,5 +1,5 @@
|
|||||||
/*
|
/*
|
||||||
* Copyright 2002-2020 the original author or authors.
|
* Copyright 2002-2025 the original author or authors.
|
||||||
*
|
*
|
||||||
* Licensed under the Apache License, Version 2.0 (the "License");
|
* Licensed under the Apache License, Version 2.0 (the "License");
|
||||||
* you may not use this file except in compliance with the License.
|
* you may not use this file except in compliance with the License.
|
||||||
@ -16,6 +16,7 @@
|
|||||||
|
|
||||||
package org.springframework.security.web.authentication.preauth.x509;
|
package org.springframework.security.web.authentication.preauth.x509;
|
||||||
|
|
||||||
|
import java.security.Principal;
|
||||||
import java.security.cert.X509Certificate;
|
import java.security.cert.X509Certificate;
|
||||||
import java.util.regex.Matcher;
|
import java.util.regex.Matcher;
|
||||||
import java.util.regex.Pattern;
|
import java.util.regex.Pattern;
|
||||||
@ -43,7 +44,9 @@ import org.springframework.util.Assert;
|
|||||||
* "EMAILADDRESS=jimi@hendrix.org, CN=..." giving a user name "jimi@hendrix.org"
|
* "EMAILADDRESS=jimi@hendrix.org, CN=..." giving a user name "jimi@hendrix.org"
|
||||||
*
|
*
|
||||||
* @author Luke Taylor
|
* @author Luke Taylor
|
||||||
|
* @deprecated Please use {@link SubjectX500PrincipalExtractor} instead
|
||||||
*/
|
*/
|
||||||
|
@Deprecated
|
||||||
public class SubjectDnX509PrincipalExtractor implements X509PrincipalExtractor, MessageSourceAware {
|
public class SubjectDnX509PrincipalExtractor implements X509PrincipalExtractor, MessageSourceAware {
|
||||||
|
|
||||||
protected final Log logger = LogFactory.getLog(getClass());
|
protected final Log logger = LogFactory.getLog(getClass());
|
||||||
@ -59,6 +62,7 @@ public class SubjectDnX509PrincipalExtractor implements X509PrincipalExtractor,
|
|||||||
@Override
|
@Override
|
||||||
public Object extractPrincipal(X509Certificate clientCert) {
|
public Object extractPrincipal(X509Certificate clientCert) {
|
||||||
// String subjectDN = clientCert.getSubjectX500Principal().getName();
|
// String subjectDN = clientCert.getSubjectX500Principal().getName();
|
||||||
|
Principal principal = clientCert.getSubjectDN();
|
||||||
String subjectDN = clientCert.getSubjectDN().getName();
|
String subjectDN = clientCert.getSubjectDN().getName();
|
||||||
this.logger.debug(LogMessage.format("Subject DN is '%s'", subjectDN));
|
this.logger.debug(LogMessage.format("Subject DN is '%s'", subjectDN));
|
||||||
Matcher matcher = this.subjectDnPattern.matcher(subjectDN);
|
Matcher matcher = this.subjectDnPattern.matcher(subjectDN);
|
||||||
|
@ -0,0 +1,88 @@
|
|||||||
|
/*
|
||||||
|
* Copyright 2002-2025 the original author or authors.
|
||||||
|
*
|
||||||
|
* Licensed under the Apache License, Version 2.0 (the "License");
|
||||||
|
* you may not use this file except in compliance with the License.
|
||||||
|
* You may obtain a copy of the License at
|
||||||
|
*
|
||||||
|
* https://www.apache.org/licenses/LICENSE-2.0
|
||||||
|
*
|
||||||
|
* Unless required by applicable law or agreed to in writing, software
|
||||||
|
* distributed under the License is distributed on an "AS IS" BASIS,
|
||||||
|
* WITHOUT WARRANTIES OR CONDITIONS OF ANY KIND, either express or implied.
|
||||||
|
* See the License for the specific language governing permissions and
|
||||||
|
* limitations under the License.
|
||||||
|
*/
|
||||||
|
|
||||||
|
package org.springframework.security.web.authentication.preauth.x509;
|
||||||
|
|
||||||
|
import java.security.cert.X509Certificate;
|
||||||
|
import java.util.regex.Matcher;
|
||||||
|
import java.util.regex.Pattern;
|
||||||
|
|
||||||
|
import javax.security.auth.x500.X500Principal;
|
||||||
|
|
||||||
|
import org.apache.commons.logging.Log;
|
||||||
|
import org.apache.commons.logging.LogFactory;
|
||||||
|
|
||||||
|
import org.springframework.context.MessageSource;
|
||||||
|
import org.springframework.context.MessageSourceAware;
|
||||||
|
import org.springframework.context.support.MessageSourceAccessor;
|
||||||
|
import org.springframework.core.log.LogMessage;
|
||||||
|
import org.springframework.security.authentication.BadCredentialsException;
|
||||||
|
import org.springframework.security.core.SpringSecurityMessageSource;
|
||||||
|
import org.springframework.util.Assert;
|
||||||
|
|
||||||
|
/**
|
||||||
|
* Obtains the principal from a certificate using RFC2253 and RFC1779 formats. By default,
|
||||||
|
* RFC2253 is used: DN is extracted from CN. If extractPrincipalNameFromEmail is true then
|
||||||
|
* format RFC1779 will be used: DN is extracted from EMAIlADDRESS.
|
||||||
|
*
|
||||||
|
* @author Max Batischev
|
||||||
|
* @since 7.0
|
||||||
|
*/
|
||||||
|
public final class SubjectX500PrincipalExtractor implements X509PrincipalExtractor, MessageSourceAware {
|
||||||
|
|
||||||
|
private final Log logger = LogFactory.getLog(getClass());
|
||||||
|
|
||||||
|
private MessageSourceAccessor messages = SpringSecurityMessageSource.getAccessor();
|
||||||
|
|
||||||
|
private boolean extractPrincipalNameFromEmail = false;
|
||||||
|
|
||||||
|
private final Pattern cnSubjectDnPattern = Pattern.compile("CN=(.*?)(?:,|$)", Pattern.CASE_INSENSITIVE);
|
||||||
|
|
||||||
|
private final Pattern emailSubjectDnPattern = Pattern.compile("OID.1.2.840.113549.1.9.1=(.*?)(?:,|$)",
|
||||||
|
Pattern.CASE_INSENSITIVE);
|
||||||
|
|
||||||
|
@Override
|
||||||
|
public Object extractPrincipal(X509Certificate clientCert) {
|
||||||
|
Assert.notNull(clientCert, "clientCert cannot be null");
|
||||||
|
X500Principal principal = clientCert.getSubjectX500Principal();
|
||||||
|
String subjectDN = this.extractPrincipalNameFromEmail ? principal.getName("RFC1779") : principal.getName();
|
||||||
|
this.logger.debug(LogMessage.format("Subject DN is '%s'", subjectDN));
|
||||||
|
Matcher matcher = this.extractPrincipalNameFromEmail ? this.emailSubjectDnPattern.matcher(subjectDN)
|
||||||
|
: this.cnSubjectDnPattern.matcher(subjectDN);
|
||||||
|
if (!matcher.find()) {
|
||||||
|
throw new BadCredentialsException(this.messages.getMessage("SubjectX500PrincipalExtractor.noMatching",
|
||||||
|
new Object[] { subjectDN }, "No matching pattern was found in subject DN: {0}"));
|
||||||
|
}
|
||||||
|
String principalName = matcher.group(1);
|
||||||
|
this.logger.debug(LogMessage.format("Extracted Principal name is '%s'", principalName));
|
||||||
|
return principalName;
|
||||||
|
}
|
||||||
|
|
||||||
|
@Override
|
||||||
|
public void setMessageSource(MessageSource messageSource) {
|
||||||
|
Assert.notNull(messageSource, "messageSource cannot be null");
|
||||||
|
this.messages = new MessageSourceAccessor(messageSource);
|
||||||
|
}
|
||||||
|
|
||||||
|
/**
|
||||||
|
* If true then DN will be extracted from EMAIlADDRESS, defaults to {@code false}
|
||||||
|
* @param extractPrincipalNameFromEmail whether to extract DN from EMAIlADDRESS
|
||||||
|
*/
|
||||||
|
public void setExtractPrincipalNameFromEmail(boolean extractPrincipalNameFromEmail) {
|
||||||
|
this.extractPrincipalNameFromEmail = extractPrincipalNameFromEmail;
|
||||||
|
}
|
||||||
|
|
||||||
|
}
|
@ -1,5 +1,5 @@
|
|||||||
/*
|
/*
|
||||||
* Copyright 2002-2016 the original author or authors.
|
* Copyright 2002-2025 the original author or authors.
|
||||||
*
|
*
|
||||||
* Licensed under the Apache License, Version 2.0 (the "License");
|
* Licensed under the Apache License, Version 2.0 (the "License");
|
||||||
* you may not use this file except in compliance with the License.
|
* you may not use this file except in compliance with the License.
|
||||||
@ -28,7 +28,7 @@ import org.springframework.security.web.authentication.preauth.AbstractPreAuthen
|
|||||||
*/
|
*/
|
||||||
public class X509AuthenticationFilter extends AbstractPreAuthenticatedProcessingFilter {
|
public class X509AuthenticationFilter extends AbstractPreAuthenticatedProcessingFilter {
|
||||||
|
|
||||||
private X509PrincipalExtractor principalExtractor = new SubjectDnX509PrincipalExtractor();
|
private X509PrincipalExtractor principalExtractor = new SubjectX500PrincipalExtractor();
|
||||||
|
|
||||||
@Override
|
@Override
|
||||||
protected Object getPreAuthenticatedPrincipal(HttpServletRequest request) {
|
protected Object getPreAuthenticatedPrincipal(HttpServletRequest request) {
|
||||||
|
@ -0,0 +1,66 @@
|
|||||||
|
/*
|
||||||
|
* Copyright 2002-2025 the original author or authors.
|
||||||
|
*
|
||||||
|
* Licensed under the Apache License, Version 2.0 (the "License");
|
||||||
|
* you may not use this file except in compliance with the License.
|
||||||
|
* You may obtain a copy of the License at
|
||||||
|
*
|
||||||
|
* https://www.apache.org/licenses/LICENSE-2.0
|
||||||
|
*
|
||||||
|
* Unless required by applicable law or agreed to in writing, software
|
||||||
|
* distributed under the License is distributed on an "AS IS" BASIS,
|
||||||
|
* WITHOUT WARRANTIES OR CONDITIONS OF ANY KIND, either express or implied.
|
||||||
|
* See the License for the specific language governing permissions and
|
||||||
|
* limitations under the License.
|
||||||
|
*/
|
||||||
|
|
||||||
|
package org.springframework.security.web.authentication.preauth.x509;
|
||||||
|
|
||||||
|
import org.junit.jupiter.api.Test;
|
||||||
|
|
||||||
|
import static org.assertj.core.api.Assertions.assertThat;
|
||||||
|
import static org.assertj.core.api.Assertions.assertThatIllegalArgumentException;
|
||||||
|
|
||||||
|
/**
|
||||||
|
* Tests for {@link SubjectX500PrincipalExtractor}.
|
||||||
|
*
|
||||||
|
* @author Max Batischev
|
||||||
|
*/
|
||||||
|
public class SubjectX500PrincipalExtractorTests {
|
||||||
|
|
||||||
|
private final SubjectX500PrincipalExtractor extractor = new SubjectX500PrincipalExtractor();
|
||||||
|
|
||||||
|
@Test
|
||||||
|
void extractWhenCnPatternSetThenExtractsPrincipalName() throws Exception {
|
||||||
|
Object principal = this.extractor.extractPrincipal(X509TestUtils.buildTestCertificate());
|
||||||
|
|
||||||
|
assertThat(principal).isEqualTo("Luke Taylor");
|
||||||
|
}
|
||||||
|
|
||||||
|
@Test
|
||||||
|
void extractWhenEmailPatternSetThenExtractsPrincipalName() throws Exception {
|
||||||
|
this.extractor.setExtractPrincipalNameFromEmail(true);
|
||||||
|
|
||||||
|
Object principal = this.extractor.extractPrincipal(X509TestUtils.buildTestCertificate());
|
||||||
|
|
||||||
|
assertThat(principal).isEqualTo("luke@monkeymachine");
|
||||||
|
}
|
||||||
|
|
||||||
|
@Test
|
||||||
|
void extractWhenCnAtEndThenExtractsPrincipalName() throws Exception {
|
||||||
|
Object principal = this.extractor.extractPrincipal(X509TestUtils.buildTestCertificateWithCnAtEnd());
|
||||||
|
|
||||||
|
assertThat(principal).isEqualTo("Duke");
|
||||||
|
}
|
||||||
|
|
||||||
|
@Test
|
||||||
|
void setMessageSourceWhenNullThenThrowsException() {
|
||||||
|
assertThatIllegalArgumentException().isThrownBy(() -> this.extractor.setMessageSource(null));
|
||||||
|
}
|
||||||
|
|
||||||
|
@Test
|
||||||
|
void extractWhenCertificateIsNullThenFails() {
|
||||||
|
assertThatIllegalArgumentException().isThrownBy(() -> this.extractor.extractPrincipal(null));
|
||||||
|
}
|
||||||
|
|
||||||
|
}
|
Loading…
x
Reference in New Issue
Block a user