Propagate refresh token request to token enhancer

pull/1611/head
Andrea Ceccanti 2020-01-19 21:22:20 +01:00
parent 9d0967f529
commit be8f32452e
6 changed files with 533 additions and 498 deletions

View File

@ -22,7 +22,7 @@
<parent>
<artifactId>openid-connect-parent</artifactId>
<groupId>org.mitre</groupId>
<version>1.3.5.cnaf.20200115</version>
<version>1.3.5.cnaf.20200119</version>
<relativePath>..</relativePath>
</parent>
<artifactId>openid-connect-client</artifactId>

View File

@ -22,7 +22,7 @@
<parent>
<artifactId>openid-connect-parent</artifactId>
<groupId>org.mitre</groupId>
<version>1.3.5.cnaf.20200115</version>
<version>1.3.5.cnaf.20200119</version>
<relativePath>..</relativePath>
</parent>
<artifactId>openid-connect-common</artifactId>

View File

@ -23,7 +23,7 @@
<parent>
<groupId>org.mitre</groupId>
<artifactId>openid-connect-parent</artifactId>
<version>1.3.5.cnaf.20200115</version>
<version>1.3.5.cnaf.20200119</version>
<relativePath>..</relativePath>
</parent>
<build>

View File

@ -81,7 +81,8 @@ public class DefaultOAuth2ProviderTokenService implements OAuth2TokenEntityServi
/**
* Logger for this class
*/
private static final Logger logger = LoggerFactory.getLogger(DefaultOAuth2ProviderTokenService.class);
private static final Logger logger =
LoggerFactory.getLogger(DefaultOAuth2ProviderTokenService.class);
@Autowired
private OAuth2TokenRepository tokenRepository;
@ -123,6 +124,7 @@ public class DefaultOAuth2ProviderTokenService implements OAuth2TokenEntityServi
/**
* Utility function to delete an access token that's expired before returning it.
*
* @param token the token to check
* @return null if the token is null or expired, the input token (unchanged) if it hasn't
*/
@ -141,6 +143,7 @@ public class DefaultOAuth2ProviderTokenService implements OAuth2TokenEntityServi
/**
* Utility function to delete a refresh token that's expired before returning it.
*
* @param token the token to check
* @return null if the token is null or expired, the input token (unchanged) if it hasn't
*/
@ -158,8 +161,9 @@ public class DefaultOAuth2ProviderTokenService implements OAuth2TokenEntityServi
}
@Override
@Transactional(value="defaultTransactionManager")
public OAuth2AccessTokenEntity createAccessToken(OAuth2Authentication authentication) throws AuthenticationException, InvalidClientException {
@Transactional(value = "defaultTransactionManager")
public OAuth2AccessTokenEntity createAccessToken(OAuth2Authentication authentication)
throws AuthenticationException, InvalidClientException {
if (authentication != null && authentication.getOAuth2Request() != null) {
// look up our client
OAuth2Request request = authentication.getOAuth2Request();
@ -173,7 +177,8 @@ public class DefaultOAuth2ProviderTokenService implements OAuth2TokenEntityServi
// handle the PKCE code challenge if present
if (request.getExtensions().containsKey(CODE_CHALLENGE)) {
String challenge = (String) request.getExtensions().get(CODE_CHALLENGE);
PKCEAlgorithm alg = PKCEAlgorithm.parse((String) request.getExtensions().get(CODE_CHALLENGE_METHOD));
PKCEAlgorithm alg =
PKCEAlgorithm.parse((String) request.getExtensions().get(CODE_CHALLENGE_METHOD));
String verifier = request.getRequestParameters().get(CODE_VERIFIER);
@ -186,7 +191,9 @@ public class DefaultOAuth2ProviderTokenService implements OAuth2TokenEntityServi
// hash the verifier
try {
MessageDigest digest = MessageDigest.getInstance("SHA-256");
String hash = Base64URL.encode(digest.digest(verifier.getBytes(StandardCharsets.US_ASCII))).toString();
String hash =
Base64URL.encode(digest.digest(verifier.getBytes(StandardCharsets.US_ASCII)))
.toString();
if (!challenge.equals(hash)) {
throw new InvalidRequestException("Code challenge and verifier do not match");
}
@ -197,14 +204,14 @@ public class DefaultOAuth2ProviderTokenService implements OAuth2TokenEntityServi
}
OAuth2AccessTokenEntity token = new OAuth2AccessTokenEntity();//accessTokenFactory.createNewAccessToken();
OAuth2AccessTokenEntity token = new OAuth2AccessTokenEntity();// accessTokenFactory.createNewAccessToken();
// attach the client
token.setClient(client);
// inherit the scope from the auth, but make a new set so it is
//not unmodifiable. Unmodifiables don't play nicely with Eclipselink, which
//wants to use the clone operation.
// not unmodifiable. Unmodifiables don't play nicely with Eclipselink, which
// wants to use the clone operation.
Set<SystemScope> scopes = scopeService.fromStrings(request.getScope());
// remove any of the special system scopes
@ -213,8 +220,10 @@ public class DefaultOAuth2ProviderTokenService implements OAuth2TokenEntityServi
token.setScope(scopeService.toStrings(scopes));
// make it expire if necessary
if (client.getAccessTokenValiditySeconds() != null && client.getAccessTokenValiditySeconds() > 0) {
Date expiration = new Date(System.currentTimeMillis() + (client.getAccessTokenValiditySeconds() * 1000L));
if (client.getAccessTokenValiditySeconds() != null
&& client.getAccessTokenValiditySeconds() > 0) {
Date expiration =
new Date(System.currentTimeMillis() + (client.getAccessTokenValiditySeconds() * 1000L));
token.setExpiration(expiration);
}
@ -225,30 +234,36 @@ public class DefaultOAuth2ProviderTokenService implements OAuth2TokenEntityServi
token.setAuthenticationHolder(authHolder);
// attach a refresh token, if this client is allowed to request them and the user gets the offline scope
// attach a refresh token, if this client is allowed to request them and the user gets the
// offline scope
if (client.isAllowRefresh() && token.getScope().contains(SystemScopeService.OFFLINE_ACCESS)) {
OAuth2RefreshTokenEntity savedRefreshToken = createRefreshToken(client, authHolder);
token.setRefreshToken(savedRefreshToken);
}
//Add approved site reference, if any
// Add approved site reference, if any
OAuth2Request originalAuthRequest = authHolder.getAuthentication().getOAuth2Request();
if (originalAuthRequest.getExtensions() != null && originalAuthRequest.getExtensions().containsKey("approved_site")) {
if (originalAuthRequest.getExtensions() != null
&& originalAuthRequest.getExtensions().containsKey("approved_site")) {
Long apId = Long.parseLong((String) originalAuthRequest.getExtensions().get("approved_site"));
Long apId =
Long.parseLong((String) originalAuthRequest.getExtensions().get("approved_site"));
ApprovedSite ap = approvedSiteService.getById(apId);
token.setApprovedSite(ap);
}
OAuth2AccessTokenEntity enhancedToken = (OAuth2AccessTokenEntity) tokenEnhancer.enhance(token, authentication);
OAuth2AccessTokenEntity enhancedToken =
(OAuth2AccessTokenEntity) tokenEnhancer.enhance(token, authentication);
OAuth2AccessTokenEntity savedToken = saveAccessToken(enhancedToken);
if (savedToken.getRefreshToken() != null) {
tokenRepository.saveRefreshToken(savedToken.getRefreshToken()); // make sure we save any changes that might have been enhanced
tokenRepository.saveRefreshToken(savedToken.getRefreshToken()); // make sure we save any
// changes that might have
// been enhanced
}
return savedToken;
@ -258,14 +273,16 @@ public class DefaultOAuth2ProviderTokenService implements OAuth2TokenEntityServi
}
private OAuth2RefreshTokenEntity createRefreshToken(ClientDetailsEntity client, AuthenticationHolderEntity authHolder) {
OAuth2RefreshTokenEntity refreshToken = new OAuth2RefreshTokenEntity(); //refreshTokenFactory.createNewRefreshToken();
private OAuth2RefreshTokenEntity createRefreshToken(ClientDetailsEntity client,
AuthenticationHolderEntity authHolder) {
OAuth2RefreshTokenEntity refreshToken = new OAuth2RefreshTokenEntity(); // refreshTokenFactory.createNewRefreshToken();
JWTClaimsSet.Builder refreshClaims = new JWTClaimsSet.Builder();
// make it expire if necessary
if (client.getRefreshTokenValiditySeconds() != null) {
Date expiration = new Date(System.currentTimeMillis() + (client.getRefreshTokenValiditySeconds() * 1000L));
Date expiration =
new Date(System.currentTimeMillis() + (client.getRefreshTokenValiditySeconds() * 1000L));
refreshToken.setExpiration(expiration);
refreshClaims.expirationTime(expiration);
}
@ -278,25 +295,28 @@ public class DefaultOAuth2ProviderTokenService implements OAuth2TokenEntityServi
PlainJWT refreshJwt = new PlainJWT(refreshClaims.build());
refreshToken.setJwt(refreshJwt);
//Add the authentication
// Add the authentication
refreshToken.setAuthenticationHolder(authHolder);
refreshToken.setClient(client);
// save the token first so that we can set it to a member of the access token (NOTE: is this step necessary?)
// save the token first so that we can set it to a member of the access token (NOTE: is this
// step necessary?)
OAuth2RefreshTokenEntity savedRefreshToken = tokenRepository.saveRefreshToken(refreshToken);
return savedRefreshToken;
}
@Override
@Transactional(value="defaultTransactionManager")
public OAuth2AccessTokenEntity refreshAccessToken(String refreshTokenValue, TokenRequest authRequest) throws AuthenticationException {
@Transactional(value = "defaultTransactionManager")
public OAuth2AccessTokenEntity refreshAccessToken(String refreshTokenValue,
TokenRequest authRequest) throws AuthenticationException {
if (Strings.isNullOrEmpty(refreshTokenValue)) {
// throw an invalid token exception if there's no refresh token value at all
throw new InvalidTokenException("Invalid refresh token: " + refreshTokenValue);
}
OAuth2RefreshTokenEntity refreshToken = clearExpiredRefreshToken(tokenRepository.getRefreshTokenByValue(refreshTokenValue));
OAuth2RefreshTokenEntity refreshToken =
clearExpiredRefreshToken(tokenRepository.getRefreshTokenByValue(refreshTokenValue));
if (refreshToken == null) {
// throw an invalid token exception if we couldn't find the token
@ -308,13 +328,14 @@ public class DefaultOAuth2ProviderTokenService implements OAuth2TokenEntityServi
AuthenticationHolderEntity authHolder = refreshToken.getAuthenticationHolder();
// make sure that the client requesting the token is the one who owns the refresh token
ClientDetailsEntity requestingClient = clientDetailsService.loadClientByClientId(authRequest.getClientId());
ClientDetailsEntity requestingClient =
clientDetailsService.loadClientByClientId(authRequest.getClientId());
if (!client.getClientId().equals(requestingClient.getClientId())) {
tokenRepository.removeRefreshToken(refreshToken);
throw new InvalidClientException("Client does not own the presented refresh token");
}
//Make sure this client allows access token refreshing
// Make sure this client allows access token refreshing
if (!client.isAllowRefresh()) {
throw new InvalidClientException("Client does not allow refreshing access token!");
}
@ -334,7 +355,8 @@ public class DefaultOAuth2ProviderTokenService implements OAuth2TokenEntityServi
Set<String> reservedScopes = scopeService.toStrings(scopeService.getReserved());
// Scopes linked to the refresh token, i.e. authorized by the user
Set<String> authorizedScopes = Sets.newHashSet(refreshToken.getAuthenticationHolder().getAuthentication().getOAuth2Request().getScope());
Set<String> authorizedScopes = Sets.newHashSet(
refreshToken.getAuthenticationHolder().getAuthentication().getOAuth2Request().getScope());
authorizedScopes.removeAll(reservedScopes);
// Scopes requested in this refresh token flow
@ -363,7 +385,8 @@ public class DefaultOAuth2ProviderTokenService implements OAuth2TokenEntityServi
token.setClient(client);
if (client.getAccessTokenValiditySeconds() != null) {
Date expiration = new Date(System.currentTimeMillis() + (client.getAccessTokenValiditySeconds() * 1000L));
Date expiration =
new Date(System.currentTimeMillis() + (client.getAccessTokenValiditySeconds() * 1000L));
token.setExpiration(expiration);
}
@ -381,14 +404,10 @@ public class DefaultOAuth2ProviderTokenService implements OAuth2TokenEntityServi
token.setAuthenticationHolder(authHolder);
OAuth2Authentication auth = authHolder.getAuthentication();
OAuth2Authentication authentication = authHolder.getAuthentication();
// Pass down the audience to IAM specific logic
if (authRequest.getRequestParameters().containsKey("audience")) {
auth.getOAuth2Request().getExtensions().put("aud", authRequest.getRequestParameters().get("audience"));
}
tokenEnhancer.enhance(token, authHolder.getAuthentication());
tokenEnhancer.enhance(token, new OAuth2Authentication(
authentication.getOAuth2Request().refresh(authRequest), authHolder.getUserAuth()));
tokenRepository.saveAccessToken(token);
@ -396,8 +415,10 @@ public class DefaultOAuth2ProviderTokenService implements OAuth2TokenEntityServi
}
@Override
public OAuth2Authentication loadAuthentication(String accessTokenValue) throws AuthenticationException {
OAuth2AccessTokenEntity accessToken = clearExpiredAccessToken(tokenRepository.getAccessTokenByValue(accessTokenValue));
public OAuth2Authentication loadAuthentication(String accessTokenValue)
throws AuthenticationException {
OAuth2AccessTokenEntity accessToken =
clearExpiredAccessToken(tokenRepository.getAccessTokenByValue(accessTokenValue));
if (accessToken == null) {
throw new InvalidTokenException("Invalid access token: " + accessTokenValue);
@ -411,10 +432,13 @@ public class DefaultOAuth2ProviderTokenService implements OAuth2TokenEntityServi
* Get an access token from its token value.
*/
@Override
public OAuth2AccessTokenEntity readAccessToken(String accessTokenValue) throws AuthenticationException {
OAuth2AccessTokenEntity accessToken = clearExpiredAccessToken(tokenRepository.getAccessTokenByValue(accessTokenValue));
public OAuth2AccessTokenEntity readAccessToken(String accessTokenValue)
throws AuthenticationException {
OAuth2AccessTokenEntity accessToken =
clearExpiredAccessToken(tokenRepository.getAccessTokenByValue(accessTokenValue));
if (accessToken == null) {
throw new InvalidTokenException("Access token for value " + accessTokenValue + " was not found");
throw new InvalidTokenException(
"Access token for value " + accessTokenValue + " was not found");
} else {
return accessToken;
}
@ -426,19 +450,22 @@ public class DefaultOAuth2ProviderTokenService implements OAuth2TokenEntityServi
@Override
public OAuth2AccessTokenEntity getAccessToken(OAuth2Authentication authentication) {
// TODO: implement this against the new service (#825)
throw new UnsupportedOperationException("Unable to look up access token from authentication object.");
throw new UnsupportedOperationException(
"Unable to look up access token from authentication object.");
}
/**
* Get a refresh token by its token value.
*/
@Override
public OAuth2RefreshTokenEntity getRefreshToken(String refreshTokenValue) throws AuthenticationException {
OAuth2RefreshTokenEntity refreshToken = tokenRepository.getRefreshTokenByValue(refreshTokenValue);
public OAuth2RefreshTokenEntity getRefreshToken(String refreshTokenValue)
throws AuthenticationException {
OAuth2RefreshTokenEntity refreshToken =
tokenRepository.getRefreshTokenByValue(refreshTokenValue);
if (refreshToken == null) {
throw new InvalidTokenException("Refresh token for value " + refreshTokenValue + " was not found");
}
else {
throw new InvalidTokenException(
"Refresh token for value " + refreshTokenValue + " was not found");
} else {
return refreshToken;
}
}
@ -447,7 +474,7 @@ public class DefaultOAuth2ProviderTokenService implements OAuth2TokenEntityServi
* Revoke a refresh token and all access tokens issued to it.
*/
@Override
@Transactional(value="defaultTransactionManager")
@Transactional(value = "defaultTransactionManager")
public void revokeRefreshToken(OAuth2RefreshTokenEntity refreshToken) {
tokenRepository.clearAccessTokensForRefreshToken(refreshToken);
tokenRepository.removeRefreshToken(refreshToken);
@ -457,7 +484,7 @@ public class DefaultOAuth2ProviderTokenService implements OAuth2TokenEntityServi
* Revoke an access token.
*/
@Override
@Transactional(value="defaultTransactionManager")
@Transactional(value = "defaultTransactionManager")
public void revokeAccessToken(OAuth2AccessTokenEntity accessToken) {
tokenRepository.removeAccessToken(accessToken);
}
@ -503,10 +530,12 @@ public class DefaultOAuth2ProviderTokenService implements OAuth2TokenEntityServi
}
}.execute();
new AbstractPageOperationTemplate<AuthenticationHolderEntity>("clearExpiredAuthenticationHolders") {
new AbstractPageOperationTemplate<AuthenticationHolderEntity>(
"clearExpiredAuthenticationHolders") {
@Override
public Collection<AuthenticationHolderEntity> fetchPage() {
return authenticationHolderRepository.getOrphanedAuthenticationHolders(new DefaultPageCriteria());
return authenticationHolderRepository
.getOrphanedAuthenticationHolders(new DefaultPageCriteria());
}
@Override
@ -516,27 +545,35 @@ public class DefaultOAuth2ProviderTokenService implements OAuth2TokenEntityServi
}.execute();
}
/* (non-Javadoc)
* @see org.mitre.oauth2.service.OAuth2TokenEntityService#saveAccessToken(org.mitre.oauth2.model.OAuth2AccessTokenEntity)
/*
* (non-Javadoc)
*
* @see org.mitre.oauth2.service.OAuth2TokenEntityService#saveAccessToken(org.mitre.oauth2.model.
* OAuth2AccessTokenEntity)
*/
@Override
@Transactional(value="defaultTransactionManager")
@Transactional(value = "defaultTransactionManager")
public OAuth2AccessTokenEntity saveAccessToken(OAuth2AccessTokenEntity accessToken) {
OAuth2AccessTokenEntity newToken = tokenRepository.saveAccessToken(accessToken);
// if the old token has any additional information for the return from the token endpoint, carry it through here after save
if (accessToken.getAdditionalInformation() != null && !accessToken.getAdditionalInformation().isEmpty()) {
// if the old token has any additional information for the return from the token endpoint, carry
// it through here after save
if (accessToken.getAdditionalInformation() != null
&& !accessToken.getAdditionalInformation().isEmpty()) {
newToken.getAdditionalInformation().putAll(accessToken.getAdditionalInformation());
}
return newToken;
}
/* (non-Javadoc)
* @see org.mitre.oauth2.service.OAuth2TokenEntityService#saveRefreshToken(org.mitre.oauth2.model.OAuth2RefreshTokenEntity)
/*
* (non-Javadoc)
*
* @see org.mitre.oauth2.service.OAuth2TokenEntityService#saveRefreshToken(org.mitre.oauth2.model.
* OAuth2RefreshTokenEntity)
*/
@Override
@Transactional(value="defaultTransactionManager")
@Transactional(value = "defaultTransactionManager")
public OAuth2RefreshTokenEntity saveRefreshToken(OAuth2RefreshTokenEntity refreshToken) {
return tokenRepository.saveRefreshToken(refreshToken);
}
@ -560,7 +597,8 @@ public class DefaultOAuth2ProviderTokenService implements OAuth2TokenEntityServi
List<OAuth2AccessTokenEntity> allTokens = getAccessTokensForClient(client);
for (OAuth2AccessTokenEntity token : allTokens) {
if ((token.getScope().contains(SystemScopeService.REGISTRATION_TOKEN_SCOPE) || token.getScope().contains(SystemScopeService.RESOURCE_TOKEN_SCOPE))
if ((token.getScope().contains(SystemScopeService.REGISTRATION_TOKEN_SCOPE)
|| token.getScope().contains(SystemScopeService.RESOURCE_TOKEN_SCOPE))
&& token.getScope().size() == 1) {
// if it only has the registration scope, then it's a registration token
return token;

View File

@ -409,7 +409,6 @@ public class TestDefaultOAuth2ProviderTokenService {
assertThat(token.getRefreshToken(), equalTo(refreshToken));
assertThat(token.getAuthenticationHolder(), equalTo(storedAuthHolder));
verify(tokenEnhancer).enhance(token, storedAuthentication);
verify(tokenRepository).saveAccessToken(token);
}
@ -426,7 +425,6 @@ public class TestDefaultOAuth2ProviderTokenService {
assertThat(token.getRefreshToken(), not(equalTo(refreshToken)));
assertThat(token.getAuthenticationHolder(), equalTo(storedAuthHolder));
verify(tokenEnhancer).enhance(token, storedAuthentication);
verify(tokenRepository).saveAccessToken(token);
verify(tokenRepository).removeRefreshToken(refreshToken);
@ -444,7 +442,6 @@ public class TestDefaultOAuth2ProviderTokenService {
assertThat(token.getRefreshToken(), equalTo(refreshToken));
assertThat(token.getAuthenticationHolder(), equalTo(storedAuthHolder));
verify(tokenEnhancer).enhance(token, storedAuthentication);
verify(tokenRepository).saveAccessToken(token);
}

View File

@ -20,7 +20,7 @@
<modelVersion>4.0.0</modelVersion>
<groupId>org.mitre</groupId>
<artifactId>openid-connect-parent</artifactId>
<version>1.3.5.cnaf.20200115</version>
<version>1.3.5.cnaf.20200119</version>
<name>MITREid Connect</name>
<packaging>pom</packaging>
<parent>