-
Notifications
You must be signed in to change notification settings - Fork 6k
New issue
Have a question about this project? Sign up for a free GitHub account to open an issue and contact its maintainers and the community.
By clicking “Sign up for GitHub”, you agree to our terms of service and privacy statement. We’ll occasionally send you account related emails.
Already on GitHub? Sign in to your account
Improve documentation on what changed in the default behaviour in version 6 vs 5.7 #12462
Comments
Hi @asaikali, thanks for reading through the migration guide and giving feedback! I understand you're looking for more explanation on what changed between 5.7 and 6.0 so that your migration effort is clearer and more informed (and of course successful). To better understand what improvements to make, I'd like to learn more about what's not working for you when you follow the existing configuration examples in the exploits page of the migration guide. For example, one issue which impacts SPA clients (as discussed in this comment) is that login success no longer generates a new csrf token. This scenario is not currently mentioned in the migration guide.
The provided solution for I am using AngularJS or another Javascript framework and other existing examples on that page attempt to answer this, by demonstrating how to roll back to 5.8 defaults and require no changes on the client. Perhaps the login success scenario I mentioned above is all that's missing in this case?
While there are many preparatory code changes between 5.7 and 5.8, there should (in theory) be no behavior changes between those two versions. All behavior changes should be isolated to changing defaults in 6.0. The migration guide attempts to demonstrate explicitly configuring the application for 5.8 defaults, allowing a seamless upgrade to 6.0. If there's a behavior change between 5.7 and 5.8, it may be a bug and worth investigating. |
Hi @sjohnr, I have encountered a CSRF-related regression in a Spring Boot 2.7 (with Spring Security 5.8) to Spring Boot 3.0 upgrade. We had some server-side rendered Freemarker templates which were relying on accessing a template variable called I appreciate this isn't really a Spring Security issue as it relates to the templating behaviour in Spring MVC. However it does "look" like a Security related issue because the effect is very similar to CSRF protection not being applied (ie it appears as if there is no CSRF token on the request), so this was the first place I looked to try to work out what was going on. It took quite a bit of digging to identify the actual problem. I'm not sure how many people will be affected by this as it could be that our use is an edge case, but it might save someone some time if it's mentioned in the Security migration guide. For anyone else who encounters this, my workaround was to set |
Thanks for the tip @petenattress! I was definitely not aware of that. I could be wrong, but I would say freemarker (and possibly most Framework-specific issues) is a bit out of scope for the Spring Security migration guide. That might be something the Spring Framework team would want to know about, or perhaps it's relevant in the Spring Boot upgrade doc. But we'll definitely keep it in mind. |
@petenattress I've also seen seen this issue as well and had also just discovered the workaround you mentioned, although it doesn't seem like the right fix. If it is of interest to you @sjohnr I've put together this basic app that demonstrates the problem, although it sounds like i'd be better of sending this over to the springboot folks... https://github.com/ardetrick/springboot3-freemarker-csrf-issue |
If you would like us to look at this issue, please provide the requested information. If the information is not provided within the next 7 days this issue will be closed. |
Closing due to lack of requested feedback. If you would like us to look at this issue, please provide the requested information and we will re-open the issue. |
Some related questions:
Reopening this (was closed automatically) to look into reworking or expanding the content of the exploits migration doc, related to deferred tokens and angular/js applications in particular. |
Next to the documentation I wonder (not just for this project) if it would be feasible to write recipes for/under Spring Boot Migrator to ease the pain a little for users. Just a thought that popped into my mind as that would really help and benefit people in automating upgrades and changes (ofcourse it will only go to a certain length but nonetheless I think it would be helpful). |
@asaikali @mdeinum @anschnapp I have published updates to the docs ahead of the upcoming releases for 5.8.2 and 6.0.2. The updates contain notes, tips and more explanation as well as additional examples for opt-out scenarios. Feedback is most welcome! We'll continue to enhance as needed based on your feedback, and can open additional issues for any new rounds of feedback. Feel free to use this issue to discuss. |
I am going through an upgrade of a Spring Boot 2.6 to Boot 3.0 application. I found the documentation at https://docs.spring.io/spring-security/reference/5.8/migration/servlet/exploits.html to be incomplete. I have had a to spend many hours on trial and error different setting combinations to try and get my app to work, however, I still have one failing test case where on CSRF token is not getting generated when it was generated in 5.7.
I am looking for the migration docs to explain what the impact of the changes in CSRF defaults from both the client perspective and the server side spring perspective.
Ideally the CSRF docs:
So far in my efforts to upgrade to Boot 3 the spring security changes in default behaviour have been the most problematic as I find myself having to trail and error configuration settings as opposed to being 100% clear on what I am changing and why I am changing it.
The text was updated successfully, but these errors were encountered: