automated code format cleanup
parent
edda0218e1
commit
489450b1c2
|
@ -109,7 +109,7 @@ public class ClientKeyCacheService {
|
|||
|
||||
return null;
|
||||
}
|
||||
} catch (UncheckedExecutionException | ExecutionException e) {
|
||||
} catch (UncheckedExecutionException | ExecutionException e) {
|
||||
logger.error("Problem loading client validator", e);
|
||||
return null;
|
||||
}
|
||||
|
|
|
@ -737,21 +737,21 @@ public class DefaultUserInfo implements UserInfo {
|
|||
/*
|
||||
* Custom serialization to handle the JSON object
|
||||
*/
|
||||
private void writeObject(ObjectOutputStream out) throws IOException {
|
||||
out.defaultWriteObject();
|
||||
if (src == null) {
|
||||
out.writeObject(null);
|
||||
} else {
|
||||
out.writeObject(src.toString());
|
||||
}
|
||||
}
|
||||
private void readObject(ObjectInputStream in) throws IOException, ClassNotFoundException {
|
||||
in.defaultReadObject();
|
||||
Object o = in.readObject();
|
||||
if (o != null) {
|
||||
JsonParser parser = new JsonParser();
|
||||
src = parser.parse((String)o).getAsJsonObject();
|
||||
}
|
||||
}
|
||||
private void writeObject(ObjectOutputStream out) throws IOException {
|
||||
out.defaultWriteObject();
|
||||
if (src == null) {
|
||||
out.writeObject(null);
|
||||
} else {
|
||||
out.writeObject(src.toString());
|
||||
}
|
||||
}
|
||||
private void readObject(ObjectInputStream in) throws IOException, ClassNotFoundException {
|
||||
in.defaultReadObject();
|
||||
Object o = in.readObject();
|
||||
if (o != null) {
|
||||
JsonParser parser = new JsonParser();
|
||||
src = parser.parse((String)o).getAsJsonObject();
|
||||
}
|
||||
}
|
||||
|
||||
}
|
||||
|
|
|
@ -136,20 +136,20 @@ public class OIDCAuthenticationToken extends AbstractAuthenticationToken {
|
|||
/*
|
||||
* Custom serialization to handle the JSON object
|
||||
*/
|
||||
private void writeObject(ObjectOutputStream out) throws IOException {
|
||||
out.defaultWriteObject();
|
||||
if (idToken == null) {
|
||||
out.writeObject(null);
|
||||
} else {
|
||||
out.writeObject(idToken.serialize());
|
||||
}
|
||||
}
|
||||
private void readObject(ObjectInputStream in) throws IOException, ClassNotFoundException, ParseException {
|
||||
in.defaultReadObject();
|
||||
Object o = in.readObject();
|
||||
if (o != null) {
|
||||
idToken = JWTParser.parse((String)o);
|
||||
}
|
||||
}
|
||||
private void writeObject(ObjectOutputStream out) throws IOException {
|
||||
out.defaultWriteObject();
|
||||
if (idToken == null) {
|
||||
out.writeObject(null);
|
||||
} else {
|
||||
out.writeObject(idToken.serialize());
|
||||
}
|
||||
}
|
||||
private void readObject(ObjectInputStream in) throws IOException, ClassNotFoundException, ParseException {
|
||||
in.defaultReadObject();
|
||||
Object o = in.readObject();
|
||||
if (o != null) {
|
||||
idToken = JWTParser.parse((String)o);
|
||||
}
|
||||
}
|
||||
|
||||
}
|
||||
|
|
|
@ -138,20 +138,20 @@ public class PendingOIDCAuthenticationToken extends AbstractAuthenticationToken
|
|||
/*
|
||||
* Custom serialization to handle the JSON object
|
||||
*/
|
||||
private void writeObject(ObjectOutputStream out) throws IOException {
|
||||
out.defaultWriteObject();
|
||||
if (idToken == null) {
|
||||
out.writeObject(null);
|
||||
} else {
|
||||
out.writeObject(idToken.serialize());
|
||||
}
|
||||
}
|
||||
private void readObject(ObjectInputStream in) throws IOException, ClassNotFoundException, ParseException {
|
||||
in.defaultReadObject();
|
||||
Object o = in.readObject();
|
||||
if (o != null) {
|
||||
idToken = JWTParser.parse((String)o);
|
||||
}
|
||||
}
|
||||
private void writeObject(ObjectOutputStream out) throws IOException {
|
||||
out.defaultWriteObject();
|
||||
if (idToken == null) {
|
||||
out.writeObject(null);
|
||||
} else {
|
||||
out.writeObject(idToken.serialize());
|
||||
}
|
||||
}
|
||||
private void readObject(ObjectInputStream in) throws IOException, ClassNotFoundException, ParseException {
|
||||
in.defaultReadObject();
|
||||
Object o = in.readObject();
|
||||
if (o != null) {
|
||||
idToken = JWTParser.parse((String)o);
|
||||
}
|
||||
}
|
||||
|
||||
}
|
||||
|
|
|
@ -91,7 +91,7 @@ public class Policy {
|
|||
name = "claim_to_policy",
|
||||
joinColumns = @JoinColumn(name = "policy_id"),
|
||||
inverseJoinColumns = @JoinColumn(name = "claim_id")
|
||||
)
|
||||
)
|
||||
public Collection<Claim> getClaimsRequired() {
|
||||
return claimsRequired;
|
||||
}
|
||||
|
|
|
@ -39,10 +39,10 @@ import javax.persistence.Table;
|
|||
@Entity
|
||||
@Table(name = "resource_set")
|
||||
@NamedQueries ({
|
||||
@NamedQuery(name = ResourceSet.QUERY_BY_OWNER, query = "select r from ResourceSet r where r.owner = :" + ResourceSet.PARAM_OWNER),
|
||||
@NamedQuery(name = ResourceSet.QUERY_BY_OWNER_AND_CLIENT, query = "select r from ResourceSet r where r.owner = :" + ResourceSet.PARAM_OWNER + " and r.clientId = :" + ResourceSet.PARAM_CLIENTID),
|
||||
@NamedQuery(name = ResourceSet.QUERY_BY_CLIENT, query = "select r from ResourceSet r where r.clientId = :" + ResourceSet.PARAM_CLIENTID),
|
||||
@NamedQuery(name = ResourceSet.QUERY_ALL, query = "select r from ResourceSet r")
|
||||
@NamedQuery(name = ResourceSet.QUERY_BY_OWNER, query = "select r from ResourceSet r where r.owner = :" + ResourceSet.PARAM_OWNER),
|
||||
@NamedQuery(name = ResourceSet.QUERY_BY_OWNER_AND_CLIENT, query = "select r from ResourceSet r where r.owner = :" + ResourceSet.PARAM_OWNER + " and r.clientId = :" + ResourceSet.PARAM_CLIENTID),
|
||||
@NamedQuery(name = ResourceSet.QUERY_BY_CLIENT, query = "select r from ResourceSet r where r.clientId = :" + ResourceSet.PARAM_CLIENTID),
|
||||
@NamedQuery(name = ResourceSet.QUERY_ALL, query = "select r from ResourceSet r")
|
||||
})
|
||||
public class ResourceSet {
|
||||
|
||||
|
|
|
@ -62,6 +62,7 @@ public class JWTBearerClientAssertionTokenEndpointFilter extends AbstractAuthent
|
|||
public void afterPropertiesSet() {
|
||||
super.afterPropertiesSet();
|
||||
setAuthenticationFailureHandler(new AuthenticationFailureHandler() {
|
||||
@Override
|
||||
public void onAuthenticationFailure(HttpServletRequest request, HttpServletResponse response,
|
||||
AuthenticationException exception) throws IOException, ServletException {
|
||||
if (exception instanceof BadCredentialsException) {
|
||||
|
@ -71,6 +72,7 @@ public class JWTBearerClientAssertionTokenEndpointFilter extends AbstractAuthent
|
|||
}
|
||||
});
|
||||
setAuthenticationSuccessHandler(new AuthenticationSuccessHandler() {
|
||||
@Override
|
||||
public void onAuthenticationSuccess(HttpServletRequest request, HttpServletResponse response,
|
||||
Authentication authentication) throws IOException, ServletException {
|
||||
// no-op - just allow filter chain to continue to token endpoint
|
||||
|
|
|
@ -96,24 +96,24 @@ public class JsonMessageSource extends AbstractMessageSource {
|
|||
|
||||
while (it.hasNext()) {
|
||||
String p = it.next();
|
||||
if (e.isJsonObject()) {
|
||||
JsonObject o = e.getAsJsonObject();
|
||||
if (o.has(p)) {
|
||||
e = o.get(p); // found the next level
|
||||
if (!it.hasNext()) {
|
||||
// we've reached a leaf, grab it
|
||||
if (e.isJsonPrimitive()) {
|
||||
value = e.getAsString();
|
||||
}
|
||||
if (e.isJsonObject()) {
|
||||
JsonObject o = e.getAsJsonObject();
|
||||
if (o.has(p)) {
|
||||
e = o.get(p); // found the next level
|
||||
if (!it.hasNext()) {
|
||||
// we've reached a leaf, grab it
|
||||
if (e.isJsonPrimitive()) {
|
||||
value = e.getAsString();
|
||||
}
|
||||
} else {
|
||||
// didn't find it, stop processing
|
||||
break;
|
||||
}
|
||||
} else {
|
||||
// didn't find it, stop processing
|
||||
break;
|
||||
}
|
||||
} else {
|
||||
// didn't find it, stop processing
|
||||
break;
|
||||
}
|
||||
}
|
||||
|
||||
|
||||
|
|
|
@ -42,6 +42,7 @@ public class MultiUrlRequestMatcher implements RequestMatcher {
|
|||
this.filterProcessesUrls = ImmutableSet.copyOf(filterProcessesUrls);
|
||||
}
|
||||
|
||||
@Override
|
||||
public boolean matches(HttpServletRequest request) {
|
||||
String uri = request.getRequestURI();
|
||||
int pathParamIndex = uri.indexOf(';');
|
||||
|
|
|
@ -149,9 +149,9 @@ public class MITREidDataService_1_0 extends MITREidDataServiceSupport implements
|
|||
reader.endObject();
|
||||
continue;
|
||||
default:
|
||||
logger.debug("Found unexpected entry");
|
||||
reader.skipValue();
|
||||
continue; }
|
||||
logger.debug("Found unexpected entry");
|
||||
reader.skipValue();
|
||||
continue; }
|
||||
}
|
||||
fixObjectReferences();
|
||||
}
|
||||
|
|
|
@ -56,27 +56,27 @@ public class JsonEntityView extends AbstractView {
|
|||
public static final String VIEWNAME = "jsonEntityView";
|
||||
|
||||
private Gson gson = new GsonBuilder()
|
||||
.setExclusionStrategies(new ExclusionStrategy() {
|
||||
.setExclusionStrategies(new ExclusionStrategy() {
|
||||
|
||||
@Override
|
||||
public boolean shouldSkipField(FieldAttributes f) {
|
||||
@Override
|
||||
public boolean shouldSkipField(FieldAttributes f) {
|
||||
|
||||
return false;
|
||||
return false;
|
||||
}
|
||||
|
||||
@Override
|
||||
public boolean shouldSkipClass(Class<?> clazz) {
|
||||
// skip the JPA binding wrapper
|
||||
if (clazz.equals(BeanPropertyBindingResult.class)) {
|
||||
return true;
|
||||
}
|
||||
return false;
|
||||
}
|
||||
|
||||
@Override
|
||||
public boolean shouldSkipClass(Class<?> clazz) {
|
||||
// skip the JPA binding wrapper
|
||||
if (clazz.equals(BeanPropertyBindingResult.class)) {
|
||||
return true;
|
||||
}
|
||||
return false;
|
||||
}
|
||||
|
||||
})
|
||||
.serializeNulls()
|
||||
.setDateFormat("yyyy-MM-dd'T'HH:mm:ssZ")
|
||||
.create();
|
||||
})
|
||||
.serializeNulls()
|
||||
.setDateFormat("yyyy-MM-dd'T'HH:mm:ssZ")
|
||||
.create();
|
||||
|
||||
@Override
|
||||
protected void renderMergedOutputModel(Map<String, Object> model, HttpServletRequest request, HttpServletResponse response) {
|
||||
|
|
|
@ -236,18 +236,18 @@ public class TestMITREidDataService_1_0 {
|
|||
//2 times for token, 2 times to update client, 2 times to update authHolder
|
||||
verify(tokenRepository, times(6)).saveRefreshToken(capturedRefreshTokens.capture());
|
||||
|
||||
List<OAuth2RefreshTokenEntity> savedRefreshTokens = new ArrayList(fakeDb.values()); //capturedRefreshTokens.getAllValues();
|
||||
Collections.sort(savedRefreshTokens, new refreshTokenIdComparator());
|
||||
List<OAuth2RefreshTokenEntity> savedRefreshTokens = new ArrayList(fakeDb.values()); //capturedRefreshTokens.getAllValues();
|
||||
Collections.sort(savedRefreshTokens, new refreshTokenIdComparator());
|
||||
|
||||
assertThat(savedRefreshTokens.size(), is(2));
|
||||
assertThat(savedRefreshTokens.size(), is(2));
|
||||
|
||||
assertThat(savedRefreshTokens.get(0).getClient().getClientId(), equalTo(token1.getClient().getClientId()));
|
||||
assertThat(savedRefreshTokens.get(0).getExpiration(), equalTo(token1.getExpiration()));
|
||||
assertThat(savedRefreshTokens.get(0).getValue(), equalTo(token1.getValue()));
|
||||
assertThat(savedRefreshTokens.get(0).getClient().getClientId(), equalTo(token1.getClient().getClientId()));
|
||||
assertThat(savedRefreshTokens.get(0).getExpiration(), equalTo(token1.getExpiration()));
|
||||
assertThat(savedRefreshTokens.get(0).getValue(), equalTo(token1.getValue()));
|
||||
|
||||
assertThat(savedRefreshTokens.get(1).getClient().getClientId(), equalTo(token2.getClient().getClientId()));
|
||||
assertThat(savedRefreshTokens.get(1).getExpiration(), equalTo(token2.getExpiration()));
|
||||
assertThat(savedRefreshTokens.get(1).getValue(), equalTo(token2.getValue()));
|
||||
assertThat(savedRefreshTokens.get(1).getClient().getClientId(), equalTo(token2.getClient().getClientId()));
|
||||
assertThat(savedRefreshTokens.get(1).getExpiration(), equalTo(token2.getExpiration()));
|
||||
assertThat(savedRefreshTokens.get(1).getValue(), equalTo(token2.getValue()));
|
||||
}
|
||||
|
||||
private class accessTokenIdComparator implements Comparator<OAuth2AccessTokenEntity> {
|
||||
|
@ -367,18 +367,18 @@ public class TestMITREidDataService_1_0 {
|
|||
//2 times for token, 2 times to update client, 2 times to update authHolder, 2 times to update id token, 2 times to update refresh token
|
||||
verify(tokenRepository, times(8)).saveAccessToken(capturedAccessTokens.capture());
|
||||
|
||||
List<OAuth2AccessTokenEntity> savedAccessTokens = new ArrayList(fakeDb.values()); //capturedAccessTokens.getAllValues();
|
||||
Collections.sort(savedAccessTokens, new accessTokenIdComparator());
|
||||
List<OAuth2AccessTokenEntity> savedAccessTokens = new ArrayList(fakeDb.values()); //capturedAccessTokens.getAllValues();
|
||||
Collections.sort(savedAccessTokens, new accessTokenIdComparator());
|
||||
|
||||
assertThat(savedAccessTokens.size(), is(2));
|
||||
assertThat(savedAccessTokens.size(), is(2));
|
||||
|
||||
assertThat(savedAccessTokens.get(0).getClient().getClientId(), equalTo(token1.getClient().getClientId()));
|
||||
assertThat(savedAccessTokens.get(0).getExpiration(), equalTo(token1.getExpiration()));
|
||||
assertThat(savedAccessTokens.get(0).getValue(), equalTo(token1.getValue()));
|
||||
assertThat(savedAccessTokens.get(0).getClient().getClientId(), equalTo(token1.getClient().getClientId()));
|
||||
assertThat(savedAccessTokens.get(0).getExpiration(), equalTo(token1.getExpiration()));
|
||||
assertThat(savedAccessTokens.get(0).getValue(), equalTo(token1.getValue()));
|
||||
|
||||
assertThat(savedAccessTokens.get(1).getClient().getClientId(), equalTo(token2.getClient().getClientId()));
|
||||
assertThat(savedAccessTokens.get(1).getExpiration(), equalTo(token2.getExpiration()));
|
||||
assertThat(savedAccessTokens.get(1).getValue(), equalTo(token2.getValue()));
|
||||
assertThat(savedAccessTokens.get(1).getClient().getClientId(), equalTo(token2.getClient().getClientId()));
|
||||
assertThat(savedAccessTokens.get(1).getExpiration(), equalTo(token2.getExpiration()));
|
||||
assertThat(savedAccessTokens.get(1).getValue(), equalTo(token2.getValue()));
|
||||
}
|
||||
|
||||
|
||||
|
@ -670,23 +670,23 @@ public class TestMITREidDataService_1_0 {
|
|||
//2 for sites, 1 for updating access token ref on #1
|
||||
verify(approvedSiteRepository, times(3)).save(capturedApprovedSites.capture());
|
||||
|
||||
List<ApprovedSite> savedSites = new ArrayList(fakeDb.values());
|
||||
List<ApprovedSite> savedSites = new ArrayList(fakeDb.values());
|
||||
|
||||
assertThat(savedSites.size(), is(2));
|
||||
assertThat(savedSites.size(), is(2));
|
||||
|
||||
assertThat(savedSites.get(0).getClientId(), equalTo(site1.getClientId()));
|
||||
assertThat(savedSites.get(0).getAccessDate(), equalTo(site1.getAccessDate()));
|
||||
assertThat(savedSites.get(0).getCreationDate(), equalTo(site1.getCreationDate()));
|
||||
assertThat(savedSites.get(0).getAllowedScopes(), equalTo(site1.getAllowedScopes()));
|
||||
assertThat(savedSites.get(0).getTimeoutDate(), equalTo(site1.getTimeoutDate()));
|
||||
assertThat(savedSites.get(0).getApprovedAccessTokens().size(), equalTo(site1.getApprovedAccessTokens().size()));
|
||||
assertThat(savedSites.get(0).getClientId(), equalTo(site1.getClientId()));
|
||||
assertThat(savedSites.get(0).getAccessDate(), equalTo(site1.getAccessDate()));
|
||||
assertThat(savedSites.get(0).getCreationDate(), equalTo(site1.getCreationDate()));
|
||||
assertThat(savedSites.get(0).getAllowedScopes(), equalTo(site1.getAllowedScopes()));
|
||||
assertThat(savedSites.get(0).getTimeoutDate(), equalTo(site1.getTimeoutDate()));
|
||||
assertThat(savedSites.get(0).getApprovedAccessTokens().size(), equalTo(site1.getApprovedAccessTokens().size()));
|
||||
|
||||
assertThat(savedSites.get(1).getClientId(), equalTo(site2.getClientId()));
|
||||
assertThat(savedSites.get(1).getAccessDate(), equalTo(site2.getAccessDate()));
|
||||
assertThat(savedSites.get(1).getCreationDate(), equalTo(site2.getCreationDate()));
|
||||
assertThat(savedSites.get(1).getAllowedScopes(), equalTo(site2.getAllowedScopes()));
|
||||
assertThat(savedSites.get(1).getTimeoutDate(), equalTo(site2.getTimeoutDate()));
|
||||
assertThat(savedSites.get(1).getApprovedAccessTokens().size(), equalTo(site2.getApprovedAccessTokens().size()));
|
||||
assertThat(savedSites.get(1).getClientId(), equalTo(site2.getClientId()));
|
||||
assertThat(savedSites.get(1).getAccessDate(), equalTo(site2.getAccessDate()));
|
||||
assertThat(savedSites.get(1).getCreationDate(), equalTo(site2.getCreationDate()));
|
||||
assertThat(savedSites.get(1).getAllowedScopes(), equalTo(site2.getAllowedScopes()));
|
||||
assertThat(savedSites.get(1).getTimeoutDate(), equalTo(site2.getTimeoutDate()));
|
||||
assertThat(savedSites.get(1).getApprovedAccessTokens().size(), equalTo(site2.getApprovedAccessTokens().size()));
|
||||
}
|
||||
|
||||
@Test
|
||||
|
|
|
@ -240,18 +240,18 @@ public class TestMITREidDataService_1_1 {
|
|||
//2 times for token, 2 times to update client, 2 times to update authHolder
|
||||
verify(tokenRepository, times(6)).saveRefreshToken(capturedRefreshTokens.capture());
|
||||
|
||||
List<OAuth2RefreshTokenEntity> savedRefreshTokens = new ArrayList(fakeDb.values()); //capturedRefreshTokens.getAllValues();
|
||||
Collections.sort(savedRefreshTokens, new refreshTokenIdComparator());
|
||||
List<OAuth2RefreshTokenEntity> savedRefreshTokens = new ArrayList(fakeDb.values()); //capturedRefreshTokens.getAllValues();
|
||||
Collections.sort(savedRefreshTokens, new refreshTokenIdComparator());
|
||||
|
||||
assertThat(savedRefreshTokens.size(), is(2));
|
||||
assertThat(savedRefreshTokens.size(), is(2));
|
||||
|
||||
assertThat(savedRefreshTokens.get(0).getClient().getClientId(), equalTo(token1.getClient().getClientId()));
|
||||
assertThat(savedRefreshTokens.get(0).getExpiration(), equalTo(token1.getExpiration()));
|
||||
assertThat(savedRefreshTokens.get(0).getValue(), equalTo(token1.getValue()));
|
||||
assertThat(savedRefreshTokens.get(0).getClient().getClientId(), equalTo(token1.getClient().getClientId()));
|
||||
assertThat(savedRefreshTokens.get(0).getExpiration(), equalTo(token1.getExpiration()));
|
||||
assertThat(savedRefreshTokens.get(0).getValue(), equalTo(token1.getValue()));
|
||||
|
||||
assertThat(savedRefreshTokens.get(1).getClient().getClientId(), equalTo(token2.getClient().getClientId()));
|
||||
assertThat(savedRefreshTokens.get(1).getExpiration(), equalTo(token2.getExpiration()));
|
||||
assertThat(savedRefreshTokens.get(1).getValue(), equalTo(token2.getValue()));
|
||||
assertThat(savedRefreshTokens.get(1).getClient().getClientId(), equalTo(token2.getClient().getClientId()));
|
||||
assertThat(savedRefreshTokens.get(1).getExpiration(), equalTo(token2.getExpiration()));
|
||||
assertThat(savedRefreshTokens.get(1).getValue(), equalTo(token2.getValue()));
|
||||
}
|
||||
|
||||
private class accessTokenIdComparator implements Comparator<OAuth2AccessTokenEntity> {
|
||||
|
@ -372,18 +372,18 @@ public class TestMITREidDataService_1_1 {
|
|||
//2 times for token, 2 times to update client, 2 times to update authHolder, 2 times to update id token, 2 times to update refresh token
|
||||
verify(tokenRepository, times(8)).saveAccessToken(capturedAccessTokens.capture());
|
||||
|
||||
List<OAuth2AccessTokenEntity> savedAccessTokens = new ArrayList(fakeDb.values()); //capturedAccessTokens.getAllValues();
|
||||
Collections.sort(savedAccessTokens, new accessTokenIdComparator());
|
||||
List<OAuth2AccessTokenEntity> savedAccessTokens = new ArrayList(fakeDb.values()); //capturedAccessTokens.getAllValues();
|
||||
Collections.sort(savedAccessTokens, new accessTokenIdComparator());
|
||||
|
||||
assertThat(savedAccessTokens.size(), is(2));
|
||||
assertThat(savedAccessTokens.size(), is(2));
|
||||
|
||||
assertThat(savedAccessTokens.get(0).getClient().getClientId(), equalTo(token1.getClient().getClientId()));
|
||||
assertThat(savedAccessTokens.get(0).getExpiration(), equalTo(token1.getExpiration()));
|
||||
assertThat(savedAccessTokens.get(0).getValue(), equalTo(token1.getValue()));
|
||||
assertThat(savedAccessTokens.get(0).getClient().getClientId(), equalTo(token1.getClient().getClientId()));
|
||||
assertThat(savedAccessTokens.get(0).getExpiration(), equalTo(token1.getExpiration()));
|
||||
assertThat(savedAccessTokens.get(0).getValue(), equalTo(token1.getValue()));
|
||||
|
||||
assertThat(savedAccessTokens.get(1).getClient().getClientId(), equalTo(token2.getClient().getClientId()));
|
||||
assertThat(savedAccessTokens.get(1).getExpiration(), equalTo(token2.getExpiration()));
|
||||
assertThat(savedAccessTokens.get(1).getValue(), equalTo(token2.getValue()));
|
||||
assertThat(savedAccessTokens.get(1).getClient().getClientId(), equalTo(token2.getClient().getClientId()));
|
||||
assertThat(savedAccessTokens.get(1).getExpiration(), equalTo(token2.getExpiration()));
|
||||
assertThat(savedAccessTokens.get(1).getValue(), equalTo(token2.getValue()));
|
||||
}
|
||||
|
||||
@Test
|
||||
|
@ -674,23 +674,23 @@ public class TestMITREidDataService_1_1 {
|
|||
//2 for sites, 1 for updating access token ref on #1
|
||||
verify(approvedSiteRepository, times(3)).save(capturedApprovedSites.capture());
|
||||
|
||||
List<ApprovedSite> savedSites = new ArrayList(fakeDb.values());
|
||||
List<ApprovedSite> savedSites = new ArrayList(fakeDb.values());
|
||||
|
||||
assertThat(savedSites.size(), is(2));
|
||||
assertThat(savedSites.size(), is(2));
|
||||
|
||||
assertThat(savedSites.get(0).getClientId(), equalTo(site1.getClientId()));
|
||||
assertThat(savedSites.get(0).getAccessDate(), equalTo(site1.getAccessDate()));
|
||||
assertThat(savedSites.get(0).getCreationDate(), equalTo(site1.getCreationDate()));
|
||||
assertThat(savedSites.get(0).getAllowedScopes(), equalTo(site1.getAllowedScopes()));
|
||||
assertThat(savedSites.get(0).getTimeoutDate(), equalTo(site1.getTimeoutDate()));
|
||||
assertThat(savedSites.get(0).getApprovedAccessTokens().size(), equalTo(site1.getApprovedAccessTokens().size()));
|
||||
assertThat(savedSites.get(0).getClientId(), equalTo(site1.getClientId()));
|
||||
assertThat(savedSites.get(0).getAccessDate(), equalTo(site1.getAccessDate()));
|
||||
assertThat(savedSites.get(0).getCreationDate(), equalTo(site1.getCreationDate()));
|
||||
assertThat(savedSites.get(0).getAllowedScopes(), equalTo(site1.getAllowedScopes()));
|
||||
assertThat(savedSites.get(0).getTimeoutDate(), equalTo(site1.getTimeoutDate()));
|
||||
assertThat(savedSites.get(0).getApprovedAccessTokens().size(), equalTo(site1.getApprovedAccessTokens().size()));
|
||||
|
||||
assertThat(savedSites.get(1).getClientId(), equalTo(site2.getClientId()));
|
||||
assertThat(savedSites.get(1).getAccessDate(), equalTo(site2.getAccessDate()));
|
||||
assertThat(savedSites.get(1).getCreationDate(), equalTo(site2.getCreationDate()));
|
||||
assertThat(savedSites.get(1).getAllowedScopes(), equalTo(site2.getAllowedScopes()));
|
||||
assertThat(savedSites.get(1).getTimeoutDate(), equalTo(site2.getTimeoutDate()));
|
||||
assertThat(savedSites.get(1).getApprovedAccessTokens().size(), equalTo(site2.getApprovedAccessTokens().size()));
|
||||
assertThat(savedSites.get(1).getClientId(), equalTo(site2.getClientId()));
|
||||
assertThat(savedSites.get(1).getAccessDate(), equalTo(site2.getAccessDate()));
|
||||
assertThat(savedSites.get(1).getCreationDate(), equalTo(site2.getCreationDate()));
|
||||
assertThat(savedSites.get(1).getAllowedScopes(), equalTo(site2.getAllowedScopes()));
|
||||
assertThat(savedSites.get(1).getTimeoutDate(), equalTo(site2.getTimeoutDate()));
|
||||
assertThat(savedSites.get(1).getApprovedAccessTokens().size(), equalTo(site2.getApprovedAccessTokens().size()));
|
||||
}
|
||||
|
||||
@Test
|
||||
|
|
|
@ -370,18 +370,18 @@ public class TestMITREidDataService_1_2 {
|
|||
//2 times for token, 2 times to update client, 2 times to update authHolder
|
||||
verify(tokenRepository, times(6)).saveRefreshToken(capturedRefreshTokens.capture());
|
||||
|
||||
List<OAuth2RefreshTokenEntity> savedRefreshTokens = new ArrayList(fakeDb.values()); //capturedRefreshTokens.getAllValues();
|
||||
Collections.sort(savedRefreshTokens, new refreshTokenIdComparator());
|
||||
List<OAuth2RefreshTokenEntity> savedRefreshTokens = new ArrayList(fakeDb.values()); //capturedRefreshTokens.getAllValues();
|
||||
Collections.sort(savedRefreshTokens, new refreshTokenIdComparator());
|
||||
|
||||
assertThat(savedRefreshTokens.size(), is(2));
|
||||
assertThat(savedRefreshTokens.size(), is(2));
|
||||
|
||||
assertThat(savedRefreshTokens.get(0).getClient().getClientId(), equalTo(token1.getClient().getClientId()));
|
||||
assertThat(savedRefreshTokens.get(0).getExpiration(), equalTo(token1.getExpiration()));
|
||||
assertThat(savedRefreshTokens.get(0).getValue(), equalTo(token1.getValue()));
|
||||
assertThat(savedRefreshTokens.get(0).getClient().getClientId(), equalTo(token1.getClient().getClientId()));
|
||||
assertThat(savedRefreshTokens.get(0).getExpiration(), equalTo(token1.getExpiration()));
|
||||
assertThat(savedRefreshTokens.get(0).getValue(), equalTo(token1.getValue()));
|
||||
|
||||
assertThat(savedRefreshTokens.get(1).getClient().getClientId(), equalTo(token2.getClient().getClientId()));
|
||||
assertThat(savedRefreshTokens.get(1).getExpiration(), equalTo(token2.getExpiration()));
|
||||
assertThat(savedRefreshTokens.get(1).getValue(), equalTo(token2.getValue()));
|
||||
assertThat(savedRefreshTokens.get(1).getClient().getClientId(), equalTo(token2.getClient().getClientId()));
|
||||
assertThat(savedRefreshTokens.get(1).getExpiration(), equalTo(token2.getExpiration()));
|
||||
assertThat(savedRefreshTokens.get(1).getValue(), equalTo(token2.getValue()));
|
||||
}
|
||||
|
||||
@Test
|
||||
|
@ -639,18 +639,18 @@ public class TestMITREidDataService_1_2 {
|
|||
//2 times for token, 2 times to update client, 2 times to update authHolder, 2 times to update id token, 2 times to update refresh token
|
||||
verify(tokenRepository, times(8)).saveAccessToken(capturedAccessTokens.capture());
|
||||
|
||||
List<OAuth2AccessTokenEntity> savedAccessTokens = new ArrayList(fakeDb.values()); //capturedAccessTokens.getAllValues();
|
||||
Collections.sort(savedAccessTokens, new accessTokenIdComparator());
|
||||
List<OAuth2AccessTokenEntity> savedAccessTokens = new ArrayList(fakeDb.values()); //capturedAccessTokens.getAllValues();
|
||||
Collections.sort(savedAccessTokens, new accessTokenIdComparator());
|
||||
|
||||
assertThat(savedAccessTokens.size(), is(2));
|
||||
assertThat(savedAccessTokens.size(), is(2));
|
||||
|
||||
assertThat(savedAccessTokens.get(0).getClient().getClientId(), equalTo(token1.getClient().getClientId()));
|
||||
assertThat(savedAccessTokens.get(0).getExpiration(), equalTo(token1.getExpiration()));
|
||||
assertThat(savedAccessTokens.get(0).getValue(), equalTo(token1.getValue()));
|
||||
assertThat(savedAccessTokens.get(0).getClient().getClientId(), equalTo(token1.getClient().getClientId()));
|
||||
assertThat(savedAccessTokens.get(0).getExpiration(), equalTo(token1.getExpiration()));
|
||||
assertThat(savedAccessTokens.get(0).getValue(), equalTo(token1.getValue()));
|
||||
|
||||
assertThat(savedAccessTokens.get(1).getClient().getClientId(), equalTo(token2.getClient().getClientId()));
|
||||
assertThat(savedAccessTokens.get(1).getExpiration(), equalTo(token2.getExpiration()));
|
||||
assertThat(savedAccessTokens.get(1).getValue(), equalTo(token2.getValue()));
|
||||
assertThat(savedAccessTokens.get(1).getClient().getClientId(), equalTo(token2.getClient().getClientId()));
|
||||
assertThat(savedAccessTokens.get(1).getExpiration(), equalTo(token2.getExpiration()));
|
||||
assertThat(savedAccessTokens.get(1).getValue(), equalTo(token2.getValue()));
|
||||
}
|
||||
|
||||
@Test
|
||||
|
@ -1357,23 +1357,23 @@ public class TestMITREidDataService_1_2 {
|
|||
//2 for sites, 1 for updating access token ref on #1
|
||||
verify(approvedSiteRepository, times(3)).save(capturedApprovedSites.capture());
|
||||
|
||||
List<ApprovedSite> savedSites = new ArrayList(fakeDb.values());
|
||||
List<ApprovedSite> savedSites = new ArrayList(fakeDb.values());
|
||||
|
||||
assertThat(savedSites.size(), is(2));
|
||||
assertThat(savedSites.size(), is(2));
|
||||
|
||||
assertThat(savedSites.get(0).getClientId(), equalTo(site1.getClientId()));
|
||||
assertThat(savedSites.get(0).getAccessDate(), equalTo(site1.getAccessDate()));
|
||||
assertThat(savedSites.get(0).getCreationDate(), equalTo(site1.getCreationDate()));
|
||||
assertThat(savedSites.get(0).getAllowedScopes(), equalTo(site1.getAllowedScopes()));
|
||||
assertThat(savedSites.get(0).getTimeoutDate(), equalTo(site1.getTimeoutDate()));
|
||||
assertThat(savedSites.get(0).getApprovedAccessTokens().size(), equalTo(site1.getApprovedAccessTokens().size()));
|
||||
assertThat(savedSites.get(0).getClientId(), equalTo(site1.getClientId()));
|
||||
assertThat(savedSites.get(0).getAccessDate(), equalTo(site1.getAccessDate()));
|
||||
assertThat(savedSites.get(0).getCreationDate(), equalTo(site1.getCreationDate()));
|
||||
assertThat(savedSites.get(0).getAllowedScopes(), equalTo(site1.getAllowedScopes()));
|
||||
assertThat(savedSites.get(0).getTimeoutDate(), equalTo(site1.getTimeoutDate()));
|
||||
assertThat(savedSites.get(0).getApprovedAccessTokens().size(), equalTo(site1.getApprovedAccessTokens().size()));
|
||||
|
||||
assertThat(savedSites.get(1).getClientId(), equalTo(site2.getClientId()));
|
||||
assertThat(savedSites.get(1).getAccessDate(), equalTo(site2.getAccessDate()));
|
||||
assertThat(savedSites.get(1).getCreationDate(), equalTo(site2.getCreationDate()));
|
||||
assertThat(savedSites.get(1).getAllowedScopes(), equalTo(site2.getAllowedScopes()));
|
||||
assertThat(savedSites.get(1).getTimeoutDate(), equalTo(site2.getTimeoutDate()));
|
||||
assertThat(savedSites.get(1).getApprovedAccessTokens().size(), equalTo(site2.getApprovedAccessTokens().size()));
|
||||
assertThat(savedSites.get(1).getClientId(), equalTo(site2.getClientId()));
|
||||
assertThat(savedSites.get(1).getAccessDate(), equalTo(site2.getAccessDate()));
|
||||
assertThat(savedSites.get(1).getCreationDate(), equalTo(site2.getCreationDate()));
|
||||
assertThat(savedSites.get(1).getAllowedScopes(), equalTo(site2.getAllowedScopes()));
|
||||
assertThat(savedSites.get(1).getTimeoutDate(), equalTo(site2.getTimeoutDate()));
|
||||
assertThat(savedSites.get(1).getApprovedAccessTokens().size(), equalTo(site2.getApprovedAccessTokens().size()));
|
||||
}
|
||||
|
||||
@Test
|
||||
|
|
|
@ -56,28 +56,28 @@ public class ResourceSetEntityAbbreviatedView extends AbstractView {
|
|||
private ConfigurationPropertiesBean config;
|
||||
|
||||
private Gson gson = new GsonBuilder()
|
||||
.setExclusionStrategies(new ExclusionStrategy() {
|
||||
.setExclusionStrategies(new ExclusionStrategy() {
|
||||
|
||||
@Override
|
||||
public boolean shouldSkipField(FieldAttributes f) {
|
||||
@Override
|
||||
public boolean shouldSkipField(FieldAttributes f) {
|
||||
|
||||
return false;
|
||||
return false;
|
||||
}
|
||||
|
||||
@Override
|
||||
public boolean shouldSkipClass(Class<?> clazz) {
|
||||
// skip the JPA binding wrapper
|
||||
if (clazz.equals(BeanPropertyBindingResult.class)) {
|
||||
return true;
|
||||
}
|
||||
return false;
|
||||
}
|
||||
|
||||
@Override
|
||||
public boolean shouldSkipClass(Class<?> clazz) {
|
||||
// skip the JPA binding wrapper
|
||||
if (clazz.equals(BeanPropertyBindingResult.class)) {
|
||||
return true;
|
||||
}
|
||||
return false;
|
||||
}
|
||||
|
||||
})
|
||||
.serializeNulls()
|
||||
.setDateFormat("yyyy-MM-dd'T'HH:mm:ssZ")
|
||||
.setLongSerializationPolicy(LongSerializationPolicy.STRING)
|
||||
.create();
|
||||
})
|
||||
.serializeNulls()
|
||||
.setDateFormat("yyyy-MM-dd'T'HH:mm:ssZ")
|
||||
.setLongSerializationPolicy(LongSerializationPolicy.STRING)
|
||||
.create();
|
||||
|
||||
@Override
|
||||
protected void renderMergedOutputModel(Map<String, Object> model, HttpServletRequest request, HttpServletResponse response) {
|
||||
|
|
|
@ -54,28 +54,28 @@ public class ResourceSetEntityView extends AbstractView {
|
|||
private ConfigurationPropertiesBean config;
|
||||
|
||||
private Gson gson = new GsonBuilder()
|
||||
.setExclusionStrategies(new ExclusionStrategy() {
|
||||
.setExclusionStrategies(new ExclusionStrategy() {
|
||||
|
||||
@Override
|
||||
public boolean shouldSkipField(FieldAttributes f) {
|
||||
@Override
|
||||
public boolean shouldSkipField(FieldAttributes f) {
|
||||
|
||||
return false;
|
||||
return false;
|
||||
}
|
||||
|
||||
@Override
|
||||
public boolean shouldSkipClass(Class<?> clazz) {
|
||||
// skip the JPA binding wrapper
|
||||
if (clazz.equals(BeanPropertyBindingResult.class)) {
|
||||
return true;
|
||||
}
|
||||
return false;
|
||||
}
|
||||
|
||||
@Override
|
||||
public boolean shouldSkipClass(Class<?> clazz) {
|
||||
// skip the JPA binding wrapper
|
||||
if (clazz.equals(BeanPropertyBindingResult.class)) {
|
||||
return true;
|
||||
}
|
||||
return false;
|
||||
}
|
||||
|
||||
})
|
||||
.serializeNulls()
|
||||
.setDateFormat("yyyy-MM-dd'T'HH:mm:ssZ")
|
||||
.setLongSerializationPolicy(LongSerializationPolicy.STRING)
|
||||
.create();
|
||||
})
|
||||
.serializeNulls()
|
||||
.setDateFormat("yyyy-MM-dd'T'HH:mm:ssZ")
|
||||
.setLongSerializationPolicy(LongSerializationPolicy.STRING)
|
||||
.create();
|
||||
|
||||
@Override
|
||||
protected void renderMergedOutputModel(Map<String, Object> model, HttpServletRequest request, HttpServletResponse response) {
|
||||
|
|
|
@ -109,7 +109,7 @@ public class ResourceSetRegistrationEndpoint {
|
|||
|
||||
if (Strings.isNullOrEmpty(rs.getName()) // there was no name (required)
|
||||
|| rs.getScopes() == null // there were no scopes (required)
|
||||
) {
|
||||
) {
|
||||
|
||||
logger.warn("Resource set registration missing one or more required fields.");
|
||||
|
||||
|
@ -168,7 +168,7 @@ public class ResourceSetRegistrationEndpoint {
|
|||
|| Strings.isNullOrEmpty(newRs.getName()) // there was no name (required)
|
||||
|| newRs.getScopes() == null // there were no scopes (required)
|
||||
|| newRs.getId() == null || !newRs.getId().equals(id) // the IDs didn't match
|
||||
) {
|
||||
) {
|
||||
|
||||
logger.warn("Resource set registration missing one or more required fields.");
|
||||
|
||||
|
|
|
@ -29,8 +29,8 @@ import org.mitre.uma.model.ResourceSet;
|
|||
import org.mitre.uma.repository.PermissionRepository;
|
||||
import org.mockito.AdditionalAnswers;
|
||||
import org.mockito.InjectMocks;
|
||||
import org.mockito.Matchers;
|
||||
import org.mockito.Mock;
|
||||
import org.mockito.Mockito;
|
||||
import org.mockito.invocation.InvocationOnMock;
|
||||
import org.mockito.runners.MockitoJUnitRunner;
|
||||
import org.mockito.stubbing.Answer;
|
||||
|
@ -94,7 +94,7 @@ public class TestDefaultPermissionService {
|
|||
rs2.setScopes(scopes2);
|
||||
|
||||
// have the repository just pass the argument through
|
||||
when(permissionRepository.save(Mockito.any(PermissionTicket.class))).then(AdditionalAnswers.returnsFirstArg());
|
||||
when(permissionRepository.save(Matchers.any(PermissionTicket.class))).then(AdditionalAnswers.returnsFirstArg());
|
||||
|
||||
when(scopeService.scopesMatch(anySetOf(String.class), anySetOf(String.class))).then(new Answer<Boolean>() {
|
||||
|
||||
|
|
Loading…
Reference in New Issue