-
Notifications
You must be signed in to change notification settings - Fork 282
New issue
Have a question about this project? Sign up for a free GitHub account to open an issue and contact its maintainers and the community.
By clicking “Sign up for GitHub”, you agree to our terms of service and privacy statement. We’ll occasionally send you account related emails.
Already on GitHub? Sign in to your account
Update CXF version to 3.4.5 #1540
Conversation
There was a problem hiding this comment.
Choose a reason for hiding this comment
The reason will be displayed to describe this comment to others. Learn more.
- only handles subject claim in JWT token, there may be other claims where unescaping is necessary.
- missing UT
4eedf97
to
e03ad58
Compare
Please upgrade CXF to 3.4.5 or above. See https://issues.apache.org/jira/browse/CXF-8555?jql=project%20%3D%20CXF%20AND%20text%20~%20%22escape%22 |
src/main/java/com/amazon/dlic/auth/http/jwt/AbstractHTTPJwtAuthenticator.java
Outdated
Show resolved
Hide resolved
@@ -193,6 +193,48 @@ public void decryptAssertionsTest() throws Exception { | |||
Assert.assertEquals("horst", jwt.getClaim("sub")); | |||
} | |||
|
|||
@Test | |||
public void unescapeSamlEntitiesTest() throws Exception { | |||
mockSamlIdpServer.setAuthenticateUser("ABC\\User1"); |
There was a problem hiding this comment.
Choose a reason for hiding this comment
The reason will be displayed to describe this comment to others. Learn more.
Please add tests for more special characters (/
, "
).
1e83433
to
ea01ea0
Compare
Signed-off-by: Palash Hedau <[email protected]>
f5a8845
Signed-off-by: Palash Hedau <[email protected]> Co-authored-by: Palash Hedau <[email protected]>
opensearch-security pull request intake form
Please provide as much details as possible to get feedback/acceptance on your PR quickly
Category: (Enhancement, New feature, Bug fix, Test fix, Refactoring, Maintenance, Documentation)
Bug Fix
Github Issue # or road-map entry, if available:
Description of changes:
Update CXF version to 3.4.5
Why these changes are required?
To correctly parse JWT with escaped characters
What is the old behavior before changes and new behavior after changes? (Please add any example/logs/screen-shot if available)
Testing done: (Please provide details of testing done: Unit testing, integration testing and manual testing)
TO-DOs, if any: (Please describe pending items and provide Github issues# for each of them)
Is it backport from main branch? (If yes, please add backport PR # and commits #)
By making a contribution to this project, I certify that:
(a) The contribution was created in whole or in part by me and I
have the right to submit it under the open source license
indicated in the file; or
(b) The contribution is based upon previous work that, to the best
of my knowledge, is covered under an appropriate open source
license and I have the right under that license to submit that
work with modifications, whether created in whole or in part
by me, under the same open source license (unless I am
permitted to submit under a different license), as indicated
in the file; or
(c) The contribution was provided directly to me by some other
person who certified (a), (b) or (c) and I have not modified
it.
(d) I understand and agree that this project and the contribution
are public and that a record of the contribution (including all
personal information I submit with it, including my sign-off) is
maintained indefinitely and may be redistributed consistent with
this project or the open source license(s) involved.
By submitting this pull request, I confirm that my contribution is made under the terms of the Apache 2.0 license.
For more information on following Developer Certificate of Origin and signing off your commits, please check here.