/* * Copyright 2013-2017 Erudika. https://erudika.com * * Licensed under the Apache License, Version 2.0 (the "License"); * you may not use this file except in compliance with the License. * You may obtain a copy of the License at * * http://www.apache.org/licenses/LICENSE-2.0 * * Unless required by applicable law or agreed to in writing, software * distributed under the License is distributed on an "AS IS" BASIS, * WITHOUT WARRANTIES OR CONDITIONS OF ANY KIND, either express or implied. * See the License for the specific language governing permissions and * limitations under the License. * * For issues and patches go to: https://github.com/erudika */ package com.erudika.para.security; import java.util.regex.Pattern; import javax.servlet.http.HttpServletRequest; import org.springframework.security.web.util.matcher.RequestMatcher; /** * CSRF protection matcher - matches POST, PUT, PATCH, DELETE requests that are not in the ignored list and not * API or authentication requests. These requests will be rejected if they don't contain a valid CSRF token. * @author Alex Bogdanovski [alex@erudika.com] */ public final class CsrfProtectionRequestMatcher implements RequestMatcher { /** * An instance of this class. */ public static final RequestMatcher INSTANCE = new CsrfProtectionRequestMatcher(); private final Pattern allowedMethods = Pattern.compile("^(GET|HEAD|TRACE|OPTIONS)$"); private final Pattern authEndpoints = Pattern.compile("^/\\w+_auth$"); private CsrfProtectionRequestMatcher() { } @Override public boolean matches(HttpServletRequest request) { boolean matches = !RestRequestMatcher.INSTANCE.matches(request) && !IgnoredRequestMatcher.INSTANCE.matches(request) && !authEndpoints.matcher(request.getRequestURI()).matches() && !allowedMethods.matcher(request.getMethod()).matches(); return matches; } }