Redid approved site -> token mapping so it is unidirectional from ApprovedSite side. Fixed some error logging, added a new view for ApprovedSite which will only show the IDs of the tokens in the approvedTokens list
parent
a79aca906e
commit
939a801048
|
@ -91,7 +91,23 @@ public class OAuth2AccessTokenEntity implements OAuth2AccessToken {
|
||||||
|
|
||||||
private Set<String> scope;
|
private Set<String> scope;
|
||||||
|
|
||||||
private ApprovedSite approvedSite; //Back-reference for one-to-many relationship
|
// private ApprovedSite approvedSite;
|
||||||
|
//
|
||||||
|
// /**
|
||||||
|
// * @return the approvedSite
|
||||||
|
// */
|
||||||
|
// @ManyToOne(fetch=FetchType.EAGER)
|
||||||
|
// @JoinColumn(name="approved_site_id", referencedColumnName="id")
|
||||||
|
// public ApprovedSite getApprovedSite() {
|
||||||
|
// return approvedSite;
|
||||||
|
// }
|
||||||
|
//
|
||||||
|
// /**
|
||||||
|
// * @param approvedSite the approvedSite to set
|
||||||
|
// */
|
||||||
|
// public void setApprovedSite(ApprovedSite approvedSite) {
|
||||||
|
// this.approvedSite = approvedSite;
|
||||||
|
// }
|
||||||
|
|
||||||
/**
|
/**
|
||||||
* Create a new, blank access token
|
* Create a new, blank access token
|
||||||
|
@ -167,7 +183,7 @@ public class OAuth2AccessTokenEntity implements OAuth2AccessToken {
|
||||||
@Basic
|
@Basic
|
||||||
@Column(name="token_value")
|
@Column(name="token_value")
|
||||||
public String getValue() {
|
public String getValue() {
|
||||||
return jwtValue.serialize();
|
return jwtValue.serialize();
|
||||||
}
|
}
|
||||||
|
|
||||||
/**
|
/**
|
||||||
|
@ -177,7 +193,7 @@ public class OAuth2AccessTokenEntity implements OAuth2AccessToken {
|
||||||
* @throws ParseException if "value" is not a properly formatted JWT string
|
* @throws ParseException if "value" is not a properly formatted JWT string
|
||||||
*/
|
*/
|
||||||
public void setValue(String value) throws ParseException {
|
public void setValue(String value) throws ParseException {
|
||||||
setJwt(JWTParser.parse(value));
|
setJwt(JWTParser.parse(value));
|
||||||
}
|
}
|
||||||
|
|
||||||
@Basic
|
@Basic
|
||||||
|
@ -286,19 +302,5 @@ public class OAuth2AccessTokenEntity implements OAuth2AccessToken {
|
||||||
return 0;
|
return 0;
|
||||||
}
|
}
|
||||||
|
|
||||||
/**
|
|
||||||
* @return the approvedSite
|
|
||||||
*/
|
|
||||||
@ManyToOne(fetch=FetchType.EAGER)
|
|
||||||
@JoinColumn(name="approved_site_id", referencedColumnName="id")
|
|
||||||
public ApprovedSite getApprovedSite() {
|
|
||||||
return approvedSite;
|
|
||||||
}
|
|
||||||
|
|
||||||
/**
|
|
||||||
* @param approvedSite the approvedSite to set
|
|
||||||
*/
|
|
||||||
public void setApprovedSite(ApprovedSite approvedSite) {
|
|
||||||
this.approvedSite = approvedSite;
|
|
||||||
}
|
|
||||||
}
|
}
|
||||||
|
|
|
@ -45,6 +45,8 @@ public interface OAuth2TokenEntityService extends AuthorizationServerTokenServic
|
||||||
public OAuth2RefreshTokenEntity saveRefreshToken(OAuth2RefreshTokenEntity refreshToken);
|
public OAuth2RefreshTokenEntity saveRefreshToken(OAuth2RefreshTokenEntity refreshToken);
|
||||||
|
|
||||||
public OAuth2AccessTokenEntity getAccessToken(OAuth2Authentication authentication);
|
public OAuth2AccessTokenEntity getAccessToken(OAuth2Authentication authentication);
|
||||||
|
|
||||||
|
public OAuth2AccessTokenEntity getAccessTokenById(Long id);
|
||||||
|
|
||||||
/**
|
/**
|
||||||
* @param incomingToken
|
* @param incomingToken
|
||||||
|
|
|
@ -246,10 +246,8 @@ public class ApprovedSite implements Serializable {
|
||||||
}
|
}
|
||||||
}
|
}
|
||||||
|
|
||||||
/**
|
@OneToMany(cascade=CascadeType.ALL, fetch=FetchType.EAGER)
|
||||||
* @return the approvedAccessTokens
|
@JoinColumn(name="approved_site_id")
|
||||||
*/
|
|
||||||
@OneToMany(cascade=CascadeType.ALL, fetch=FetchType.EAGER, mappedBy="approvedSite")
|
|
||||||
public Set<OAuth2AccessTokenEntity> getApprovedAccessTokens() {
|
public Set<OAuth2AccessTokenEntity> getApprovedAccessTokens() {
|
||||||
return approvedAccessTokens;
|
return approvedAccessTokens;
|
||||||
}
|
}
|
||||||
|
@ -261,11 +259,6 @@ public class ApprovedSite implements Serializable {
|
||||||
this.approvedAccessTokens = approvedAccessTokens;
|
this.approvedAccessTokens = approvedAccessTokens;
|
||||||
}
|
}
|
||||||
|
|
||||||
public void addApprovedAccessToken(OAuth2AccessTokenEntity token) {
|
|
||||||
this.getApprovedAccessTokens();
|
|
||||||
this.approvedAccessTokens.add(token);
|
|
||||||
}
|
|
||||||
|
|
||||||
/* (non-Javadoc)
|
/* (non-Javadoc)
|
||||||
* @see java.lang.Object#hashCode()
|
* @see java.lang.Object#hashCode()
|
||||||
*/
|
*/
|
||||||
|
|
|
@ -32,6 +32,8 @@ import org.mitre.oauth2.repository.AuthenticationHolderRepository;
|
||||||
import org.mitre.oauth2.repository.OAuth2TokenRepository;
|
import org.mitre.oauth2.repository.OAuth2TokenRepository;
|
||||||
import org.mitre.oauth2.service.ClientDetailsEntityService;
|
import org.mitre.oauth2.service.ClientDetailsEntityService;
|
||||||
import org.mitre.oauth2.service.OAuth2TokenEntityService;
|
import org.mitre.oauth2.service.OAuth2TokenEntityService;
|
||||||
|
import org.mitre.openid.connect.model.ApprovedSite;
|
||||||
|
import org.mitre.openid.connect.service.ApprovedSiteService;
|
||||||
import org.slf4j.Logger;
|
import org.slf4j.Logger;
|
||||||
import org.slf4j.LoggerFactory;
|
import org.slf4j.LoggerFactory;
|
||||||
import org.springframework.beans.factory.annotation.Autowired;
|
import org.springframework.beans.factory.annotation.Autowired;
|
||||||
|
@ -71,6 +73,9 @@ public class DefaultOAuth2ProviderTokenService implements OAuth2TokenEntityServi
|
||||||
@Autowired
|
@Autowired
|
||||||
private TokenEnhancer tokenEnhancer;
|
private TokenEnhancer tokenEnhancer;
|
||||||
|
|
||||||
|
@Autowired
|
||||||
|
private ApprovedSiteService approvedSiteService;
|
||||||
|
|
||||||
@Override
|
@Override
|
||||||
public OAuth2AccessTokenEntity createAccessToken(OAuth2Authentication authentication) throws AuthenticationException, InvalidClientException {
|
public OAuth2AccessTokenEntity createAccessToken(OAuth2Authentication authentication) throws AuthenticationException, InvalidClientException {
|
||||||
if (authentication != null && authentication.getAuthorizationRequest() != null) {
|
if (authentication != null && authentication.getAuthorizationRequest() != null) {
|
||||||
|
@ -140,11 +145,26 @@ public class DefaultOAuth2ProviderTokenService implements OAuth2TokenEntityServi
|
||||||
|
|
||||||
token.setRefreshToken(refreshToken);
|
token.setRefreshToken(refreshToken);
|
||||||
}
|
}
|
||||||
|
|
||||||
tokenEnhancer.enhance(token, authentication);
|
tokenEnhancer.enhance(token, authentication);
|
||||||
|
|
||||||
tokenRepository.saveAccessToken(token);
|
tokenRepository.saveAccessToken(token);
|
||||||
|
|
||||||
|
//Add approved site reference, if any
|
||||||
|
AuthorizationRequest originalAuthRequest = authHolder.getAuthentication().getAuthorizationRequest();
|
||||||
|
|
||||||
|
if (originalAuthRequest.getExtensionProperties().containsKey("approved_site")) {
|
||||||
|
|
||||||
|
Long apId = (Long) originalAuthRequest.getExtensionProperties().get("approved_site");
|
||||||
|
ApprovedSite ap = approvedSiteService.getById(apId);
|
||||||
|
//token.setApprovedSite(ap);
|
||||||
|
Set<OAuth2AccessTokenEntity> apTokens = ap.getApprovedAccessTokens();
|
||||||
|
apTokens.add(token);
|
||||||
|
ap.setApprovedAccessTokens(apTokens);
|
||||||
|
approvedSiteService.save(ap);
|
||||||
|
|
||||||
|
}
|
||||||
|
|
||||||
if (token.getRefreshToken() != null) {
|
if (token.getRefreshToken() != null) {
|
||||||
tokenRepository.saveRefreshToken(token.getRefreshToken()); // make sure we save any changes that might have been enhanced
|
tokenRepository.saveRefreshToken(token.getRefreshToken()); // make sure we save any changes that might have been enhanced
|
||||||
}
|
}
|
||||||
|
@ -410,5 +430,10 @@ public class DefaultOAuth2ProviderTokenService implements OAuth2TokenEntityServi
|
||||||
public OAuth2AccessTokenEntity getAccessTokenForIdToken(OAuth2AccessTokenEntity idToken) {
|
public OAuth2AccessTokenEntity getAccessTokenForIdToken(OAuth2AccessTokenEntity idToken) {
|
||||||
return tokenRepository.getAccessTokenForIdToken(idToken);
|
return tokenRepository.getAccessTokenForIdToken(idToken);
|
||||||
}
|
}
|
||||||
|
|
||||||
|
@Override
|
||||||
|
public OAuth2AccessTokenEntity getAccessTokenById(Long id) {
|
||||||
|
return tokenRepository.getAccessTokenById(id);
|
||||||
|
}
|
||||||
|
|
||||||
}
|
}
|
||||||
|
|
|
@ -24,7 +24,7 @@ import org.mitre.oauth2.model.ClientDetailsEntity;
|
||||||
import org.mitre.oauth2.model.OAuth2AccessTokenEntity;
|
import org.mitre.oauth2.model.OAuth2AccessTokenEntity;
|
||||||
import org.mitre.oauth2.service.ClientDetailsEntityService;
|
import org.mitre.oauth2.service.ClientDetailsEntityService;
|
||||||
import org.mitre.openid.connect.config.ConfigurationPropertiesBean;
|
import org.mitre.openid.connect.config.ConfigurationPropertiesBean;
|
||||||
import org.mitre.openid.connect.model.ApprovedSite;
|
import org.mitre.openid.connect.service.ApprovedSiteService;
|
||||||
import org.slf4j.Logger;
|
import org.slf4j.Logger;
|
||||||
import org.slf4j.LoggerFactory;
|
import org.slf4j.LoggerFactory;
|
||||||
import org.springframework.beans.factory.annotation.Autowired;
|
import org.springframework.beans.factory.annotation.Autowired;
|
||||||
|
@ -55,19 +55,15 @@ public class ConnectTokenEnhancer implements TokenEnhancer {
|
||||||
@Autowired
|
@Autowired
|
||||||
private ClientDetailsEntityService clientService;
|
private ClientDetailsEntityService clientService;
|
||||||
|
|
||||||
|
@Autowired
|
||||||
|
private ApprovedSiteService approvedSiteService;
|
||||||
|
|
||||||
@Override
|
@Override
|
||||||
public OAuth2AccessToken enhance(OAuth2AccessToken accessToken, OAuth2Authentication authentication) {
|
public OAuth2AccessToken enhance(OAuth2AccessToken accessToken, OAuth2Authentication authentication) {
|
||||||
|
|
||||||
OAuth2AccessTokenEntity token = (OAuth2AccessTokenEntity) accessToken;
|
OAuth2AccessTokenEntity token = (OAuth2AccessTokenEntity) accessToken;
|
||||||
AuthorizationRequest originalAuthRequest = authentication.getAuthorizationRequest();
|
AuthorizationRequest originalAuthRequest = authentication.getAuthorizationRequest();
|
||||||
|
|
||||||
if (originalAuthRequest.getExtensionProperties().containsKey("approved_site")) {
|
|
||||||
//Add the token to the approved site reference, if there is one
|
|
||||||
ApprovedSite ap = (ApprovedSite)originalAuthRequest.getExtensionProperties().get("approved_site");
|
|
||||||
//ap.addApprovedAccessToken(token);
|
|
||||||
token.setApprovedSite(ap);
|
|
||||||
}
|
|
||||||
|
|
||||||
String clientId = originalAuthRequest.getClientId();
|
String clientId = originalAuthRequest.getClientId();
|
||||||
ClientDetailsEntity client = clientService.loadClientByClientId(clientId);
|
ClientDetailsEntity client = clientService.loadClientByClientId(clientId);
|
||||||
|
|
||||||
|
|
|
@ -117,7 +117,7 @@ public class TofuUserApprovalHandler implements UserApprovalHandler {
|
||||||
ap.setAccessDate(new Date());
|
ap.setAccessDate(new Date());
|
||||||
approvedSiteService.save(ap);
|
approvedSiteService.save(ap);
|
||||||
|
|
||||||
authorizationRequest.getExtensionProperties().put("approved_site", ap);
|
authorizationRequest.getExtensionProperties().put("approved_site", ap.getId());
|
||||||
authorizationRequest.setApproved(true);
|
authorizationRequest.setApproved(true);
|
||||||
alreadyApproved = true;
|
alreadyApproved = true;
|
||||||
}
|
}
|
||||||
|
@ -130,7 +130,7 @@ public class TofuUserApprovalHandler implements UserApprovalHandler {
|
||||||
|
|
||||||
//Create an approved site
|
//Create an approved site
|
||||||
ApprovedSite newSite = approvedSiteService.createApprovedSite(clientId, userId, null, ws.getAllowedScopes(), ws);
|
ApprovedSite newSite = approvedSiteService.createApprovedSite(clientId, userId, null, ws.getAllowedScopes(), ws);
|
||||||
authorizationRequest.getExtensionProperties().put("approved_site", newSite);
|
authorizationRequest.getExtensionProperties().put("approved_site", newSite.getId());
|
||||||
authorizationRequest.setApproved(true);
|
authorizationRequest.setApproved(true);
|
||||||
}
|
}
|
||||||
}
|
}
|
||||||
|
@ -192,7 +192,7 @@ public class TofuUserApprovalHandler implements UserApprovalHandler {
|
||||||
}
|
}
|
||||||
|
|
||||||
ApprovedSite newSite = approvedSiteService.createApprovedSite(clientId, userId, timeout, allowedScopes, null);
|
ApprovedSite newSite = approvedSiteService.createApprovedSite(clientId, userId, timeout, allowedScopes, null);
|
||||||
authorizationRequest.getExtensionProperties().put("approved_site", newSite);
|
authorizationRequest.getExtensionProperties().put("approved_site", newSite.getId());
|
||||||
}
|
}
|
||||||
|
|
||||||
}
|
}
|
||||||
|
|
|
@ -0,0 +1,89 @@
|
||||||
|
/**
|
||||||
|
*
|
||||||
|
*/
|
||||||
|
package org.mitre.openid.connect.view;
|
||||||
|
|
||||||
|
import java.io.IOException;
|
||||||
|
import java.io.Writer;
|
||||||
|
import java.util.Map;
|
||||||
|
|
||||||
|
import javax.servlet.http.HttpServletRequest;
|
||||||
|
import javax.servlet.http.HttpServletResponse;
|
||||||
|
|
||||||
|
import org.mitre.oauth2.model.OAuth2AccessTokenEntity;
|
||||||
|
import org.slf4j.Logger;
|
||||||
|
import org.slf4j.LoggerFactory;
|
||||||
|
import org.springframework.http.HttpStatus;
|
||||||
|
import org.springframework.stereotype.Component;
|
||||||
|
import org.springframework.validation.BeanPropertyBindingResult;
|
||||||
|
import org.springframework.web.servlet.view.AbstractView;
|
||||||
|
|
||||||
|
import com.google.gson.ExclusionStrategy;
|
||||||
|
import com.google.gson.FieldAttributes;
|
||||||
|
import com.google.gson.Gson;
|
||||||
|
import com.google.gson.GsonBuilder;
|
||||||
|
|
||||||
|
/**
|
||||||
|
* @author jricher
|
||||||
|
*
|
||||||
|
*/
|
||||||
|
@Component("jsonApprovedSiteView")
|
||||||
|
public class JsonApprovedSiteView extends AbstractView {
|
||||||
|
|
||||||
|
private static Logger logger = LoggerFactory.getLogger(JsonApprovedSiteView.class);
|
||||||
|
|
||||||
|
private Gson gson = new GsonBuilder()
|
||||||
|
.setExclusionStrategies(new ExclusionStrategy() {
|
||||||
|
|
||||||
|
public boolean shouldSkipField(FieldAttributes f) {
|
||||||
|
|
||||||
|
if (f.getDeclaringClass() == OAuth2AccessTokenEntity.class) {
|
||||||
|
if (f.getName().equals("id")) {
|
||||||
|
return false;
|
||||||
|
}
|
||||||
|
return true;
|
||||||
|
}
|
||||||
|
|
||||||
|
return false;
|
||||||
|
}
|
||||||
|
|
||||||
|
public boolean shouldSkipClass(Class<?> clazz) {
|
||||||
|
// skip the JPA binding wrapper
|
||||||
|
if (clazz.equals(BeanPropertyBindingResult.class)) {
|
||||||
|
return true;
|
||||||
|
}
|
||||||
|
return false;
|
||||||
|
}
|
||||||
|
|
||||||
|
})
|
||||||
|
.serializeNulls()
|
||||||
|
.setDateFormat("yyyy-MM-dd'T'HH:mm:ssZ")
|
||||||
|
.create();
|
||||||
|
|
||||||
|
protected void renderMergedOutputModel(Map<String, Object> model, HttpServletRequest request, HttpServletResponse response) {
|
||||||
|
|
||||||
|
response.setContentType("application/json");
|
||||||
|
|
||||||
|
|
||||||
|
HttpStatus code = (HttpStatus) model.get("code");
|
||||||
|
if (code == null) {
|
||||||
|
code = HttpStatus.OK; // default to 200
|
||||||
|
}
|
||||||
|
|
||||||
|
response.setStatus(code.value());
|
||||||
|
|
||||||
|
try {
|
||||||
|
|
||||||
|
Writer out = response.getWriter();
|
||||||
|
Object obj = model.get("entity");
|
||||||
|
gson.toJson(obj, out);
|
||||||
|
|
||||||
|
} catch (IOException e) {
|
||||||
|
|
||||||
|
//TODO: Error Handling
|
||||||
|
logger.error("IOException in JsonEntityView.java: ", e);
|
||||||
|
|
||||||
|
}
|
||||||
|
}
|
||||||
|
|
||||||
|
}
|
|
@ -51,7 +51,7 @@ public class ApprovedSiteAPI {
|
||||||
|
|
||||||
m.put("entity", all);
|
m.put("entity", all);
|
||||||
|
|
||||||
return "jsonEntityView";
|
return "jsonApprovedSiteView";
|
||||||
}
|
}
|
||||||
|
|
||||||
/**
|
/**
|
||||||
|
@ -112,7 +112,7 @@ public class ApprovedSiteAPI {
|
||||||
return "jsonErrorView";
|
return "jsonErrorView";
|
||||||
} else {
|
} else {
|
||||||
m.put("entity", approvedSite);
|
m.put("entity", approvedSite);
|
||||||
return "jsonEntityView";
|
return "jsonApprovedSiteView";
|
||||||
}
|
}
|
||||||
|
|
||||||
}
|
}
|
||||||
|
|
Loading…
Reference in New Issue