DWN-27040: Bit of refactoring, Protected Resources now protected

pull/1601/head
Carling Knight 2018-12-05 14:36:38 +00:00
parent 5abebb7c36
commit 2008404afd
3 changed files with 4 additions and 10 deletions

View File

@ -150,12 +150,16 @@ public class DefaultOAuth2ClientDetailsEntityService implements ClientDetailsEnt
ensureNoReservedScopes(client); ensureNoReservedScopes(client);
String plaintextSecret = client.getClientSecret();
if(!Strings.isNullOrEmpty(client.getClientSecret())) { if(!Strings.isNullOrEmpty(client.getClientSecret())) {
client.setClientSecret(this.passwordEncoder.encode(client.getClientSecret())); client.setClientSecret(this.passwordEncoder.encode(client.getClientSecret()));
} }
ClientDetailsEntity c = clientRepository.saveClient(client); ClientDetailsEntity c = clientRepository.saveClient(client);
c.setClientSecret(plaintextSecret);
statsService.resetCache(); statsService.resetCache();
return c; return c;

View File

@ -281,8 +281,6 @@ public class ClientAPI {
client = clientService.generateClientId(client); client = clientService.generateClientId(client);
} }
String plaintextSecret = client.getClientSecret();
if (client.getTokenEndpointAuthMethod() == null || if (client.getTokenEndpointAuthMethod() == null ||
client.getTokenEndpointAuthMethod().equals(AuthMethod.NONE)) { client.getTokenEndpointAuthMethod().equals(AuthMethod.NONE)) {
// we shouldn't have a secret for this client // we shouldn't have a secret for this client
@ -297,7 +295,6 @@ public class ClientAPI {
if (json.has("generateClientSecret") && json.get("generateClientSecret").getAsBoolean() if (json.has("generateClientSecret") && json.get("generateClientSecret").getAsBoolean()
|| Strings.isNullOrEmpty(client.getClientSecret())) { || Strings.isNullOrEmpty(client.getClientSecret())) {
client = clientService.generateClientSecret(client); client = clientService.generateClientSecret(client);
plaintextSecret = client.getClientSecret();
} }
} else if (client.getTokenEndpointAuthMethod().equals(AuthMethod.PRIVATE_KEY)) { } else if (client.getTokenEndpointAuthMethod().equals(AuthMethod.PRIVATE_KEY)) {
@ -328,8 +325,6 @@ public class ClientAPI {
ClientDetailsEntity newClient = clientService.saveNewClient(client); ClientDetailsEntity newClient = clientService.saveNewClient(client);
//Set the client secret to the plaintext from the request //Set the client secret to the plaintext from the request
newClient.setClientSecret(plaintextSecret);
m.addAttribute(JsonEntityView.ENTITY, newClient); m.addAttribute(JsonEntityView.ENTITY, newClient);
if (AuthenticationUtilities.isAdmin(auth)) { if (AuthenticationUtilities.isAdmin(auth)) {

View File

@ -167,8 +167,6 @@ public class DynamicClientRegistrationEndpoint {
if (newClient != null) { if (newClient != null) {
// it parsed! // it parsed!
String plaintextSecret = newClient.getClientSecret();
// //
// Now do some post-processing consistency checks on it // Now do some post-processing consistency checks on it
// //
@ -203,7 +201,6 @@ public class DynamicClientRegistrationEndpoint {
// we need to generate a secret // we need to generate a secret
newClient = clientService.generateClientSecret(newClient); newClient = clientService.generateClientSecret(newClient);
plaintextSecret = newClient.getClientSecret();
} }
// set some defaults for token timeouts // set some defaults for token timeouts
@ -246,8 +243,6 @@ public class DynamicClientRegistrationEndpoint {
RegisteredClient registered = new RegisteredClient(savedClient, token.getValue(), config.getIssuer() + "register/" + UriUtils.encodePathSegment(savedClient.getClientId(), "UTF-8")); RegisteredClient registered = new RegisteredClient(savedClient, token.getValue(), config.getIssuer() + "register/" + UriUtils.encodePathSegment(savedClient.getClientId(), "UTF-8"));
registered.setClientSecret(plaintextSecret);
m.addAttribute("client", registered); m.addAttribute("client", registered);
m.addAttribute(HttpCodeView.CODE, HttpStatus.CREATED); // http 201 m.addAttribute(HttpCodeView.CODE, HttpStatus.CREATED); // http 201