Fix failing tests
This commit ensures that if an Origin is returned as it was provided, possibly with a trailing slash. See gh-26892
This commit is contained in:
parent
dc4e053d59
commit
aa51ed1940
|
@ -549,31 +549,31 @@ public class CorsConfiguration {
|
|||
|
||||
/**
|
||||
* Check the origin of the request against the configured allowed origins.
|
||||
* @param requestOrigin the origin to check
|
||||
* @param origin the origin to check
|
||||
* @return the origin to use for the response, or {@code null} which
|
||||
* means the request origin is not allowed
|
||||
*/
|
||||
@Nullable
|
||||
public String checkOrigin(@Nullable String requestOrigin) {
|
||||
if (!StringUtils.hasText(requestOrigin)) {
|
||||
public String checkOrigin(@Nullable String origin) {
|
||||
if (!StringUtils.hasText(origin)) {
|
||||
return null;
|
||||
}
|
||||
requestOrigin = trimTrailingSlash(requestOrigin);
|
||||
String originToCheck = trimTrailingSlash(origin);
|
||||
if (!ObjectUtils.isEmpty(this.allowedOrigins)) {
|
||||
if (this.allowedOrigins.contains(ALL)) {
|
||||
validateAllowCredentials();
|
||||
return ALL;
|
||||
}
|
||||
for (String allowedOrigin : this.allowedOrigins) {
|
||||
if (requestOrigin.equalsIgnoreCase(allowedOrigin)) {
|
||||
return requestOrigin;
|
||||
if (originToCheck.equalsIgnoreCase(allowedOrigin)) {
|
||||
return origin;
|
||||
}
|
||||
}
|
||||
}
|
||||
if (!ObjectUtils.isEmpty(this.allowedOriginPatterns)) {
|
||||
for (OriginPattern p : this.allowedOriginPatterns) {
|
||||
if (p.getDeclaredPattern().equals(ALL) || p.getPattern().matcher(requestOrigin).matches()) {
|
||||
return requestOrigin;
|
||||
if (p.getDeclaredPattern().equals(ALL) || p.getPattern().matcher(originToCheck).matches()) {
|
||||
return origin;
|
||||
}
|
||||
}
|
||||
}
|
||||
|
|
|
@ -294,12 +294,12 @@ public class CorsConfigurationTests {
|
|||
// specific origin matches Origin header with or without trailing "/"
|
||||
config.setAllowedOrigins(Collections.singletonList("https://domain.com"));
|
||||
assertThat(config.checkOrigin("https://domain.com")).isEqualTo("https://domain.com");
|
||||
assertThat(config.checkOrigin("https://domain.com/")).isEqualTo("https://domain.com");
|
||||
assertThat(config.checkOrigin("https://domain.com/")).isEqualTo("https://domain.com/");
|
||||
|
||||
// specific origin with trailing "/" matches Origin header with or without trailing "/"
|
||||
config.setAllowedOrigins(Collections.singletonList("https://domain.com/"));
|
||||
assertThat(config.checkOrigin("https://domain.com")).isEqualTo("https://domain.com");
|
||||
assertThat(config.checkOrigin("https://domain.com/")).isEqualTo("https://domain.com");
|
||||
assertThat(config.checkOrigin("https://domain.com/")).isEqualTo("https://domain.com/");
|
||||
|
||||
config.setAllowCredentials(false);
|
||||
assertThat(config.checkOrigin("https://domain.com")).isEqualTo("https://domain.com");
|
||||
|
|
|
@ -284,7 +284,7 @@ class CrossOriginTests {
|
|||
CorsConfiguration config = getCorsConfiguration(chain, false);
|
||||
assertThat(config).isNotNull();
|
||||
assertThat(config.getAllowedMethods()).containsExactly("GET");
|
||||
assertThat(config.getAllowedOrigins()).containsExactly("http://www.foo.example/");
|
||||
assertThat(config.getAllowedOrigins()).containsExactly("http://www.foo.example");
|
||||
assertThat(config.getAllowCredentials()).isTrue();
|
||||
}
|
||||
|
||||
|
@ -297,7 +297,7 @@ class CrossOriginTests {
|
|||
CorsConfiguration config = getCorsConfiguration(chain, false);
|
||||
assertThat(config).isNotNull();
|
||||
assertThat(config.getAllowedMethods()).containsExactly("GET");
|
||||
assertThat(config.getAllowedOrigins()).containsExactly("http://www.foo.example/");
|
||||
assertThat(config.getAllowedOrigins()).containsExactly("http://www.foo.example");
|
||||
assertThat(config.getAllowCredentials()).isTrue();
|
||||
}
|
||||
|
||||
|
|
Loading…
Reference in New Issue