Skip to content

Conversation

sdeleuze
Copy link

@sdeleuze sdeleuze commented Sep 1, 2025

This PR adds support for Jackson 3 which has the following major differences with the Jackson 2 one:

  • jackson subpackage instead of jackson2
  • Jackson type prefix instead of Jackson2
  • JsonMapper instead of ObjectMapper
  • For configuration, JsonMapper.Builder instead of ObjectMapper since the latter is now immutable
  • AllowlistTypeResolverBuilder in new a public type in order to be used easily with the JsonMapper.Builder API

Jackson 3 changes compared to Jackson 2 are documented on FasterXML/jackson-future-ideas#72.

It also deprecates Jackson 2 support for removal.

@spring-projects-issues spring-projects-issues added the status: waiting-for-triage An issue we've not yet triaged label Sep 1, 2025
Copy link
Member

@rwinch rwinch left a comment

Choose a reason for hiding this comment

The reason will be displayed to describe this comment to others. Learn more.

Thanks for the pull request. Generally, I think this is looking good. I've provided some feedback inline.

It also appears that there are still some classes that need migrated. Searching for jackson on main should give you a complete list of classes that are using jackson.

For example, webauthn has jackson support. I'm guessing this was missed because it is inconsistent with the rest of the jackson support in that it is in a jackson package rather than jackson2. It is also automatically registered because it does not use default types which would make it insecure.

There are also some tests that still use ObjectMapper or deprecated Spring Framework Jackson 2 classes (e.g. JwtDecodersTests.java#L388). Unless the test is specifically for the Jackson 2 support, we should update these to use non-deprecated classes (e.g. JsonMapper).

There are various Spring framework jackson based classes that have been deprecated that we should migrate away from. For example, MappingJackson2HttpMessageConverter usage (e.g. WebAuthnAuthenticationFilter.converter) should be migrated to JacksonJsonHttpMessageConverter if jackson 3 is on the classpath. Likely there could be a static factory method used that Spring Security uses to obtain the correct default json converter instance.

* @author Rob Winch
* @since 7.0
*/
public class AllowlistTypeResolverBuilder extends DefaultTypeResolverBuilder {
Copy link
Member

Choose a reason for hiding this comment

The reason will be displayed to describe this comment to others. Learn more.

I think that now is a good time for Spring Security to stop using global default typing.

While the AllowlistTypeResolverBuilder worked well as a security patch in the Jackson 2 support, I think that we should remove it for Jackson 3 support and better align with best practices with Jackson. Instead, I think that we should use https://github.com/FasterXML/jackson-docs/wiki/JacksonPolymorphicDeserialization#12-per-class-annotations This would mean that users would need to take the risk of enabling global default typing or opt into default typing per type.

I'd like to ensure that we have a test that verifies that a custom type does not just work after applying Spring Security's module. Another test would verify that users could add their own type. The docs would be updated to explain that global default typing is off, why it is off, and how they can add their own types.

Copy link
Author

Choose a reason for hiding this comment

The reason will be displayed to describe this comment to others. Learn more.

From your comment, looks like Spring Security Jackson 3 modules would stop configuring AllowlistTypeResolverBuilder. But would we keep a Jackson 3 AllowlistTypeResolverBuilder or not (I think not but please confirm)?

Do you expect Jackson 3 mixins provided by Spring Security to use per class annotations instead?

This would mean that users would need to take the risk of enabling global default typing or opt into default typing per type.

I don't understand this sentence, could you please elaborate?

The docs would be updated to explain that global default typing is off, why it is off, and how they can add their own types

A raw draft of what the doc should say would be useful for my own understanding and for this PR, I will likely let you refine post-PR.

Copy link
Member

Choose a reason for hiding this comment

The reason will be displayed to describe this comment to others. Learn more.

From your comment, looks like Spring Security Jackson 3 modules would stop configuring AllowlistTypeResolverBuilder. But would we keep a Jackson 3 AllowlistTypeResolverBuilder or not (I think not but please confirm)?

No. We should remove Jackson 3 AllowlistTypeResolverBuilder so that we don't need to maintain that logic once we remove Jackson 2 support.

Do you expect Jackson 3 mixins provided by Spring Security to use per class annotations instead?

Yes.

I don't understand this sentence, could you please elaborate?

Sorry that this wasn't clear.

Previously, Spring Security's Jackson support forced enabling global default typing which is dangerous due to deserialization gadgets that might be exposed. Spring Security's Jackson 3 support should only enable per class (with classes that are safe). If users want global default typing, they will need to do that explicitly outside of Spring Security's Jackson 3 support.

A raw draft of what the doc should say would be useful for my own understanding and for this PR, I will likely let you refine post-PR.

Expanding this statement, but keeping to a summary the docs would:

  1. Explain that Spring Security's Jackson 3 support does not enable global default typing because it is insecure.
  2. If users want to add additional classes, they can use per-class annotations. Alternatively, if users understand the security risks they can enable global default typing themselves.

Copy link
Author

@sdeleuze sdeleuze Sep 10, 2025

Choose a reason for hiding this comment

The reason will be displayed to describe this comment to others. Learn more.

So I made a try to remove global default typing, that's very involved. Almost all the tests are broken and this require much more refinements and thinking than adding annotation to individual classes as collection deserialization is broken in multiple ways, mixins require significant updates, etc.

Not saying you should not do it, but that is not directly related to the Jackson 2 to 3 migration, I don't have a real added value here, I lack of Spring Security knowledge to decide what are the right choices to do and this PR is already pretty huge.

I think the side effects should be carefully assessed by the Spring Security team, as it would be a major breaking change that would add its side effects to the Jackson 3 migration itself. It should probably have its own dedicated issue and I recommend handling that after merging this PR.

Copy link
Author

Choose a reason for hiding this comment

The reason will be displayed to describe this comment to others. Learn more.

After more work, I have pushed a commit that removes the global default typing and replace it by a safer alternative using a PolymorphicTypeValidator (see related Jackson blog post) that is contributed by the various modules.

I still need to add an API for end-user customization of the authorized classes.

@sdeleuze
Copy link
Author

sdeleuze commented Sep 8, 2025

@rwinch I have pushed additional commits:

I will do another pass with your feedback to my questions in the comments.

@sdeleuze sdeleuze force-pushed the jackson3 branch 2 times, most recently from e7d5c41 to 20a69ea Compare September 10, 2025 21:06
sdeleuze added a commit to sdeleuze/spring-security that referenced this pull request Sep 10, 2025
See spring-projectsgh-17832
Signed-off-by: Sébastien Deleuze <sdeleuze@users.noreply.github.com>
sdeleuze added a commit to sdeleuze/spring-security that referenced this pull request Sep 10, 2025
This commit adds support for Jackson 3 which has the following
major differences with the Jackson 2 one:
 - jackson subpackage instead of jackson2
 - Jackson type prefix instead of Jackson2
 - JsonMapper instead of ObjectMapper
 - For configuration, JsonMapper.Builder instead of ObjectMapper
   since the latter is now immutable
 - Remove custom Jackson 3 support for unmodifiable collections
 - AllowlistTypeResolverBuilder in new a public type in order
   to be used easily with the JsonMapper.Builder API

Jackson 3 changes compared to Jackson 2 are documented on
FasterXML/jackson-future-ideas#72.

This commit does not cover webauthn which is a special case (uses
jackson sub-package for Jackson 2 support) which will be handled in
a distinct commit.

See spring-projectsgh-17832
Signed-off-by: Sébastien Deleuze <sdeleuze@users.noreply.github.com>
sdeleuze added a commit to sdeleuze/spring-security that referenced this pull request Sep 10, 2025
This commit does not cover webauthn which is a special case (uses
jackson sub-package for Jackson 2 support) which will be handled in
a distinct commit.

See spring-projectsgh-17832
Signed-off-by: Sébastien Deleuze <sdeleuze@users.noreply.github.com>
sdeleuze added a commit to sdeleuze/spring-security that referenced this pull request Sep 10, 2025
Since this module was already using the jackson sub-package for Jackson 2
support, both Jackson 2 and Jackson 3 support lives in the same subpackage
and the former package-private classes has been renamed with a Jackson2
qualifier.

Closes spring-projectsgh-17832
Signed-off-by: Sébastien Deleuze <sdeleuze@users.noreply.github.com>
@sdeleuze
Copy link
Author

@rwinch I have removed the custom support for unmodifiable collections (seems to work fine with Jackson 3), reworked the commit for a cleaner git history, and rebased the commits on main.

This was referenced May 14, 2025
See spring-projectsgh-17832
Signed-off-by: Sébastien Deleuze <sdeleuze@users.noreply.github.com>
This commit adds support for Jackson 3 which has the following
major differences with the Jackson 2 one:
 - jackson subpackage instead of jackson2
 - Jackson type prefix instead of Jackson2
 - JsonMapper instead of ObjectMapper
 - For configuration, JsonMapper.Builder instead of ObjectMapper
   since the latter is now immutable
 - Remove custom Jackson 3 support for unmodifiable collections
 - AllowlistTypeResolverBuilder in new a public type in order
   to be used easily with the JsonMapper.Builder API

Jackson 3 changes compared to Jackson 2 are documented on
FasterXML/jackson-future-ideas#72.

This commit does not cover webauthn which is a special case (uses
jackson sub-package for Jackson 2 support) which will be handled in
a distinct commit.

See spring-projectsgh-17832
Signed-off-by: Sébastien Deleuze <sdeleuze@users.noreply.github.com>
This commit does not cover webauthn which is a special case (uses
jackson sub-package for Jackson 2 support) which will be handled in
a distinct commit.

See spring-projectsgh-17832
Signed-off-by: Sébastien Deleuze <sdeleuze@users.noreply.github.com>
sdeleuze added a commit to sdeleuze/spring-security that referenced this pull request Sep 25, 2025
Since this module was already using the jackson sub-package for Jackson 2
support, both Jackson 2 and Jackson 3 support lives in the same subpackage
and the former package-private classes has been renamed with a Jackson2
qualifier.

Closes spring-projectsgh-17832
Signed-off-by: Sébastien Deleuze <sdeleuze@users.noreply.github.com>
@jvalkeal
Copy link
Contributor

@sdeleuze @rwinch I was wondering if message converters in oauth2-core will also be part of this PR.

static {
ClassLoader classLoader = HttpMessageConverters.class.getClassLoader();
jackson2Present = ClassUtils.isPresent("com.fasterxml.jackson.databind.ObjectMapper", classLoader)
&& ClassUtils.isPresent("com.fasterxml.jackson.core.JsonGenerator", classLoader);
gsonPresent = ClassUtils.isPresent("com.google.gson.Gson", classLoader);
jsonbPresent = ClassUtils.isPresent("jakarta.json.bind.Jsonb", classLoader);
}

That's then causing NPE's i.e in OAuth2AccessTokenResponseHttpMessageConverter as jsonMessageConverter will always be null. Same with other classes in that same package if I only have jackson3 in a classpath.

Since this module was already using the jackson sub-package for Jackson 2
support, both Jackson 2 and Jackson 3 support lives in the same subpackage
and the former package-private classes has been renamed with a Jackson2
qualifier.

See spring-projectsgh-17832
Signed-off-by: Sébastien Deleuze <sdeleuze@users.noreply.github.com>
Signed-off-by: Sébastien Deleuze <sdeleuze@users.noreply.github.com>
This commits remove global default typing for better security
and use instead a custom PolymorphicTypeValidator. See
https://cowtowncoder.medium.com/jackson-2-10-safe-default-typing-2d018f0ce2ba
for more details.

See spring-projectsgh-17832
Signed-off-by: Sébastien Deleuze <sdeleuze@users.noreply.github.com>
@sdeleuze
Copy link
Author

@jvalkeal Good catch, I will add a related commit.

Sign up for free to join this conversation on GitHub. Already have an account? Sign in to comment
Labels
status: waiting-for-triage An issue we've not yet triaged
Projects
None yet
Development

Successfully merging this pull request may close these issues.

4 participants