mirror of
https://github.com/Frooodle/Stirling-PDF.git
synced 2025-06-07 01:16:41 +02:00
remove debugs
This commit is contained in:
parent
2a4a19a80f
commit
2885fac30d
@ -66,7 +66,6 @@ import stirling.software.SPDF.config.security.saml2.CertificateUtils;
|
|||||||
import stirling.software.SPDF.config.security.saml2.CustomSaml2AuthenticationFailureHandler;
|
import stirling.software.SPDF.config.security.saml2.CustomSaml2AuthenticationFailureHandler;
|
||||||
import stirling.software.SPDF.config.security.saml2.CustomSaml2AuthenticationSuccessHandler;
|
import stirling.software.SPDF.config.security.saml2.CustomSaml2AuthenticationSuccessHandler;
|
||||||
import stirling.software.SPDF.config.security.saml2.CustomSaml2ResponseAuthenticationConverter;
|
import stirling.software.SPDF.config.security.saml2.CustomSaml2ResponseAuthenticationConverter;
|
||||||
import stirling.software.SPDF.config.security.saml2.SamlDebugFilter;
|
|
||||||
import stirling.software.SPDF.config.security.session.SessionPersistentRegistry;
|
import stirling.software.SPDF.config.security.session.SessionPersistentRegistry;
|
||||||
import stirling.software.SPDF.model.ApplicationProperties;
|
import stirling.software.SPDF.model.ApplicationProperties;
|
||||||
import stirling.software.SPDF.model.ApplicationProperties.Security.OAUTH2;
|
import stirling.software.SPDF.model.ApplicationProperties.Security.OAUTH2;
|
||||||
@ -105,8 +104,7 @@ public class SecurityConfiguration {
|
|||||||
|
|
||||||
@Autowired private FirstLoginFilter firstLoginFilter;
|
@Autowired private FirstLoginFilter firstLoginFilter;
|
||||||
@Autowired private SessionPersistentRegistry sessionRegistry;
|
@Autowired private SessionPersistentRegistry sessionRegistry;
|
||||||
@Autowired
|
|
||||||
private SamlDebugFilter samlDebugFilter;
|
|
||||||
@Bean
|
@Bean
|
||||||
public SecurityFilterChain filterChain(HttpSecurity http) throws Exception {
|
public SecurityFilterChain filterChain(HttpSecurity http) throws Exception {
|
||||||
|
|
||||||
@ -284,50 +282,13 @@ public class SecurityConfiguration {
|
|||||||
new CustomSaml2AuthenticationFailureHandler())
|
new CustomSaml2AuthenticationFailureHandler())
|
||||||
.permitAll();
|
.permitAll();
|
||||||
} catch (Exception e) {
|
} catch (Exception e) {
|
||||||
// TODO Auto-generated catch block
|
|
||||||
e.printStackTrace();
|
e.printStackTrace();
|
||||||
}
|
}
|
||||||
}).addFilterBefore(samlDebugFilter, SecurityContextHolderFilter.class)
|
})
|
||||||
.saml2Logout(logout -> logout
|
.saml2Logout(logout -> logout
|
||||||
.logoutUrl("/logout"))
|
.logoutUrl("/logout"))
|
||||||
;
|
;
|
||||||
|
|
||||||
http.addFilterBefore(new OncePerRequestFilter() {
|
|
||||||
@Override
|
|
||||||
protected void doFilterInternal(HttpServletRequest request,
|
|
||||||
HttpServletResponse response, FilterChain chain)
|
|
||||||
throws ServletException, IOException {
|
|
||||||
|
|
||||||
if (request.getRequestURI().contains("/saml2/authenticate")) {
|
|
||||||
log.info("SAML Auth Request - URI: " + request.getRequestURI());
|
|
||||||
log.info("SAML Auth Request - Method: " + request.getMethod());
|
|
||||||
log.info("SAML Auth Request - Query String: " + request.getQueryString());
|
|
||||||
|
|
||||||
// Log all request parameters
|
|
||||||
request.getParameterMap().forEach((key, value) -> {
|
|
||||||
log.info("SAML Auth Request - Parameter - " + key + ": " + Arrays.toString(value));
|
|
||||||
});
|
|
||||||
|
|
||||||
// Log request content if POST
|
|
||||||
if ("POST".equalsIgnoreCase(request.getMethod())) {
|
|
||||||
try {
|
|
||||||
BufferedReader reader = request.getReader();
|
|
||||||
StringBuilder sb = new StringBuilder();
|
|
||||||
String line;
|
|
||||||
while ((line = reader.readLine()) != null) {
|
|
||||||
sb.append(line);
|
|
||||||
}
|
|
||||||
log.info("SAML Auth Request - Body: " + sb.toString());
|
|
||||||
} catch (Exception e) {
|
|
||||||
log.info("Could not read request body", e);
|
|
||||||
}
|
|
||||||
}
|
|
||||||
}
|
|
||||||
chain.doFilter(request, response);
|
|
||||||
}
|
|
||||||
}, Saml2WebSsoAuthenticationRequestFilter.class);
|
|
||||||
|
|
||||||
|
|
||||||
}
|
}
|
||||||
} else {
|
} else {
|
||||||
if (applicationProperties.getSecurity().getCsrfDisabled()) {
|
if (applicationProperties.getSecurity().getCsrfDisabled()) {
|
||||||
|
@ -1,31 +0,0 @@
|
|||||||
package stirling.software.SPDF.config.security.saml2;
|
|
||||||
|
|
||||||
import java.io.IOException;
|
|
||||||
import java.util.Collections;
|
|
||||||
|
|
||||||
import org.springframework.stereotype.Component;
|
|
||||||
import org.springframework.web.filter.OncePerRequestFilter;
|
|
||||||
|
|
||||||
import jakarta.servlet.FilterChain;
|
|
||||||
import jakarta.servlet.ServletException;
|
|
||||||
import jakarta.servlet.http.HttpServletRequest;
|
|
||||||
import jakarta.servlet.http.HttpServletResponse;
|
|
||||||
import lombok.extern.slf4j.Slf4j;
|
|
||||||
|
|
||||||
@Component
|
|
||||||
@Slf4j
|
|
||||||
public class SamlDebugFilter extends OncePerRequestFilter {
|
|
||||||
|
|
||||||
@Override
|
|
||||||
protected void doFilterInternal(HttpServletRequest request, HttpServletResponse response, FilterChain filterChain)
|
|
||||||
throws ServletException, IOException {
|
|
||||||
if (request.getRequestURI().contains("/saml2/")) {
|
|
||||||
log.debug("SAML Debug - URI: {}", request.getRequestURI());
|
|
||||||
log.debug("SAML Debug - Query String: {}", request.getQueryString());
|
|
||||||
log.debug("SAML Debug - Method: {}", request.getMethod());
|
|
||||||
Collections.list(request.getHeaderNames()).forEach(headerName ->
|
|
||||||
log.debug("SAML Debug - Header {}: {}", headerName, request.getHeader(headerName)));
|
|
||||||
}
|
|
||||||
filterChain.doFilter(request, response);
|
|
||||||
}
|
|
||||||
}
|
|
@ -3,9 +3,9 @@ multipart.enabled=true
|
|||||||
logging.level.org.springframework=WARN
|
logging.level.org.springframework=WARN
|
||||||
logging.level.org.hibernate=WARN
|
logging.level.org.hibernate=WARN
|
||||||
logging.level.org.eclipse.jetty=WARN
|
logging.level.org.eclipse.jetty=WARN
|
||||||
logging.level.org.springframework.security.saml2=TRACE
|
#logging.level.org.springframework.security.saml2=TRACE
|
||||||
logging.level.org.springframework.security=DEBUG
|
#logging.level.org.springframework.security=DEBUG
|
||||||
logging.level.org.opensaml: DEBUG
|
#logging.level.org.opensaml: DEBUG
|
||||||
logging.level.com.zaxxer.hikari=WARN
|
logging.level.com.zaxxer.hikari=WARN
|
||||||
|
|
||||||
spring.jpa.open-in-view=false
|
spring.jpa.open-in-view=false
|
||||||
|
Loading…
Reference in New Issue
Block a user