Content to be finalised. First draft
This article describes the web security implications for the Struts MVC framework, how Struts helps in securing your web applications and where special attention is needed. It will not describe the internal details of Struts.
The framework provides its own web Controller component. This Controller acts as a bridge between the application's Model and the web View. When a request is received, the Controller invokes an Action class. The Action class interacts with the Model to examine or update the application's state. The framework provides an ActionForm class to help transfer data between Model and View.
- No distinction is made between HTTP GET and POST method. Both methods are mapped to the same Action execute method.
- The ActionForm is much like a java bean.
- There is at least one action for each action that contains post data.
- It defines the fields that are passed to the action.
- It has pointers to or contains the validation that occurs before control makes it to the action.
- It is very important that you validate every field no matter how certain you may be about it's inability to cause problems.
- Integration with commons validator
In the struts-config.xml configuration file it is possible to specify a roles attribute, a comma-delimited list of security role names that are allowed access to the ActionMapping object. This is pretty much all that you get out of the box.
<action roles="administrator,contributor" path="/article/Edit" parameter="org.article.FindByArticle" name="articleForm" scope="request"> <forward name="success" path="article.jsp"/> </action>
Extending action mappings
If you extend the action mappings, you will be able to satisfy much more complicated security schemes.