extracted http "code" view parameter
parent
1735dbca11
commit
e56161e223
|
@ -26,6 +26,7 @@ import java.util.Map;
|
|||
import javax.servlet.http.HttpServletRequest;
|
||||
import javax.servlet.http.HttpServletResponse;
|
||||
|
||||
import org.mitre.openid.connect.view.HttpCodeView;
|
||||
import org.slf4j.Logger;
|
||||
import org.slf4j.LoggerFactory;
|
||||
import org.springframework.http.HttpStatus;
|
||||
|
@ -81,7 +82,7 @@ public class WebfingerView extends AbstractView {
|
|||
response.setContentType("application/jrd+json");
|
||||
|
||||
|
||||
HttpStatus code = (HttpStatus) model.get("code");
|
||||
HttpStatus code = (HttpStatus) model.get(HttpCodeView.CODE);
|
||||
if (code == null) {
|
||||
code = HttpStatus.OK; // default to 200
|
||||
}
|
||||
|
|
|
@ -117,7 +117,7 @@ public class DiscoveryEndpoint {
|
|||
|
||||
if (user == null) {
|
||||
logger.info("User not found: " + resource);
|
||||
model.addAttribute("code", HttpStatus.NOT_FOUND);
|
||||
model.addAttribute(HttpCodeView.CODE, HttpStatus.NOT_FOUND);
|
||||
return HttpCodeView.VIEWNAME;
|
||||
}
|
||||
|
||||
|
@ -125,14 +125,14 @@ public class DiscoveryEndpoint {
|
|||
if (!Strings.nullToEmpty(issuerComponents.getHost())
|
||||
.equals(Strings.nullToEmpty(resourceUri.getHost()))) {
|
||||
logger.info("Host mismatch, expected " + issuerComponents.getHost() + " got " + resourceUri.getHost());
|
||||
model.addAttribute("code", HttpStatus.NOT_FOUND);
|
||||
model.addAttribute(HttpCodeView.CODE, HttpStatus.NOT_FOUND);
|
||||
return HttpCodeView.VIEWNAME;
|
||||
}
|
||||
|
||||
|
||||
} else {
|
||||
logger.info("Unknown URI format: " + resource);
|
||||
model.addAttribute("code", HttpStatus.NOT_FOUND);
|
||||
model.addAttribute(HttpCodeView.CODE, HttpStatus.NOT_FOUND);
|
||||
return HttpCodeView.VIEWNAME;
|
||||
}
|
||||
}
|
||||
|
|
|
@ -26,6 +26,7 @@ import javax.servlet.http.HttpServletResponse;
|
|||
|
||||
import org.mitre.oauth2.model.OAuth2AccessTokenEntity;
|
||||
import org.mitre.oauth2.model.OAuth2RefreshTokenEntity;
|
||||
import org.mitre.openid.connect.view.HttpCodeView;
|
||||
import org.slf4j.Logger;
|
||||
import org.slf4j.LoggerFactory;
|
||||
import org.springframework.http.HttpStatus;
|
||||
|
@ -127,7 +128,7 @@ public class TokenApiView extends AbstractView {
|
|||
response.setContentType(MediaType.APPLICATION_JSON_VALUE);
|
||||
|
||||
|
||||
HttpStatus code = (HttpStatus) model.get("code");
|
||||
HttpStatus code = (HttpStatus) model.get(HttpCodeView.CODE);
|
||||
if (code == null) {
|
||||
code = HttpStatus.OK; // default to 200
|
||||
}
|
||||
|
|
|
@ -152,12 +152,12 @@ public class IntrospectionEndpoint {
|
|||
return JsonEntityView.VIEWNAME;
|
||||
} else {
|
||||
logger.error("Verify failed; client configuration or scope don't permit token introspection");
|
||||
model.addAttribute("code", HttpStatus.FORBIDDEN);
|
||||
model.addAttribute(HttpCodeView.CODE, HttpStatus.FORBIDDEN);
|
||||
return HttpCodeView.VIEWNAME;
|
||||
}
|
||||
} else {
|
||||
logger.error("Verify failed; client " + clientId + " is not allowed to call introspection endpoint");
|
||||
model.addAttribute("code", HttpStatus.FORBIDDEN);
|
||||
model.addAttribute(HttpCodeView.CODE, HttpStatus.FORBIDDEN);
|
||||
return HttpCodeView.VIEWNAME;
|
||||
}
|
||||
|
||||
|
|
|
@ -109,7 +109,7 @@ public class OAuthConfirmationController {
|
|||
if (prompts.contains(PROMPT_NONE)) {
|
||||
// we're not supposed to prompt, so "return an error"
|
||||
logger.info("Client requested no prompt, returning 403 from confirmation endpoint");
|
||||
model.put("code", HttpStatus.FORBIDDEN);
|
||||
model.put(HttpCodeView.CODE, HttpStatus.FORBIDDEN);
|
||||
return HttpCodeView.VIEWNAME;
|
||||
}
|
||||
|
||||
|
@ -125,17 +125,17 @@ public class OAuthConfirmationController {
|
|||
client = clientService.loadClientByClientId(authRequest.getClientId());
|
||||
} catch (OAuth2Exception e) {
|
||||
logger.error("confirmAccess: OAuth2Exception was thrown when attempting to load client", e);
|
||||
model.put("code", HttpStatus.BAD_REQUEST);
|
||||
model.put(HttpCodeView.CODE, HttpStatus.BAD_REQUEST);
|
||||
return HttpCodeView.VIEWNAME;
|
||||
} catch (IllegalArgumentException e) {
|
||||
logger.error("confirmAccess: IllegalArgumentException was thrown when attempting to load client", e);
|
||||
model.put("code", HttpStatus.BAD_REQUEST);
|
||||
model.put(HttpCodeView.CODE, HttpStatus.BAD_REQUEST);
|
||||
return HttpCodeView.VIEWNAME;
|
||||
}
|
||||
|
||||
if (client == null) {
|
||||
logger.error("confirmAccess: could not find client " + authRequest.getClientId());
|
||||
model.put("code", HttpStatus.NOT_FOUND);
|
||||
model.put(HttpCodeView.CODE, HttpStatus.NOT_FOUND);
|
||||
return HttpCodeView.VIEWNAME;
|
||||
}
|
||||
|
||||
|
|
|
@ -68,14 +68,14 @@ public class RevocationEndpoint {
|
|||
// client acting on its own, make sure it owns the token
|
||||
if (!accessToken.getClient().getClientId().equals(authRequest.getClientId())) {
|
||||
// trying to revoke a token we don't own, throw a 403
|
||||
model.addAttribute("code", HttpStatus.FORBIDDEN);
|
||||
model.addAttribute(HttpCodeView.CODE, HttpStatus.FORBIDDEN);
|
||||
return HttpCodeView.VIEWNAME;
|
||||
}
|
||||
}
|
||||
|
||||
// if we got this far, we're allowed to do this
|
||||
tokenServices.revokeAccessToken(accessToken);
|
||||
model.addAttribute("code", HttpStatus.OK);
|
||||
model.addAttribute(HttpCodeView.CODE, HttpStatus.OK);
|
||||
return HttpCodeView.VIEWNAME;
|
||||
|
||||
} catch (InvalidTokenException e) {
|
||||
|
@ -88,21 +88,21 @@ public class RevocationEndpoint {
|
|||
// client acting on its own, make sure it owns the token
|
||||
if (!refreshToken.getClient().getClientId().equals(authRequest.getClientId())) {
|
||||
// trying to revoke a token we don't own, throw a 403
|
||||
model.addAttribute("code", HttpStatus.FORBIDDEN);
|
||||
model.addAttribute(HttpCodeView.CODE, HttpStatus.FORBIDDEN);
|
||||
return HttpCodeView.VIEWNAME;
|
||||
}
|
||||
}
|
||||
|
||||
// if we got this far, we're allowed to do this
|
||||
tokenServices.revokeRefreshToken(refreshToken);
|
||||
model.addAttribute("code", HttpStatus.OK);
|
||||
model.addAttribute(HttpCodeView.CODE, HttpStatus.OK);
|
||||
return HttpCodeView.VIEWNAME;
|
||||
|
||||
} catch (InvalidTokenException e1) {
|
||||
|
||||
// neither token type was found, simply say "OK" and be on our way.
|
||||
|
||||
model.addAttribute("code", HttpStatus.OK);
|
||||
model.addAttribute(HttpCodeView.CODE, HttpStatus.OK);
|
||||
return HttpCodeView.VIEWNAME;
|
||||
}
|
||||
}
|
||||
|
|
|
@ -94,7 +94,7 @@ public class ScopeAPI {
|
|||
|
||||
logger.error("getScope failed; scope not found: " + id);
|
||||
|
||||
m.put("code", HttpStatus.NOT_FOUND);
|
||||
m.put(HttpCodeView.CODE, HttpStatus.NOT_FOUND);
|
||||
m.put("errorMessage", "The requested scope with id " + id + " could not be found.");
|
||||
return JsonErrorView.VIEWNAME;
|
||||
}
|
||||
|
@ -123,7 +123,7 @@ public class ScopeAPI {
|
|||
logger.error("updateScope failed; scope ids to not match: got "
|
||||
+ existing.getId() + " and " + scope.getId());
|
||||
|
||||
m.put("code", HttpStatus.BAD_REQUEST);
|
||||
m.put(HttpCodeView.CODE, HttpStatus.BAD_REQUEST);
|
||||
m.put("errorMessage", "Could not update scope. Scope ids to not match: got "
|
||||
+ existing.getId() + " and " + scope.getId());
|
||||
return JsonErrorView.VIEWNAME;
|
||||
|
@ -132,7 +132,7 @@ public class ScopeAPI {
|
|||
} else {
|
||||
|
||||
logger.error("updateScope failed; scope with id " + id + " not found.");
|
||||
m.put("code", HttpStatus.NOT_FOUND);
|
||||
m.put(HttpCodeView.CODE, HttpStatus.NOT_FOUND);
|
||||
m.put("errorMessage", "Could not update scope. The scope with id " + id + " could not be found.");
|
||||
return JsonErrorView.VIEWNAME;
|
||||
}
|
||||
|
@ -147,7 +147,7 @@ public class ScopeAPI {
|
|||
if (alreadyExists != null) {
|
||||
//Error, cannot save a scope with the same value as an existing one
|
||||
logger.error("Error: attempting to save a scope with a value that already exists: " + scope.getValue());
|
||||
m.put("code", HttpStatus.CONFLICT);
|
||||
m.put(HttpCodeView.CODE, HttpStatus.CONFLICT);
|
||||
m.put("errorMessage", "A scope with value " + scope.getValue() + " already exists, please choose a different value.");
|
||||
return JsonErrorView.VIEWNAME;
|
||||
}
|
||||
|
@ -162,7 +162,7 @@ public class ScopeAPI {
|
|||
} else {
|
||||
|
||||
logger.error("createScope failed; JSON was invalid: " + json);
|
||||
m.put("code", HttpStatus.BAD_REQUEST);
|
||||
m.put(HttpCodeView.CODE, HttpStatus.BAD_REQUEST);
|
||||
m.put("errorMessage", "Could not save new scope " + scope + ". The scope service failed to return a saved entity.");
|
||||
return JsonErrorView.VIEWNAME;
|
||||
|
||||
|
@ -182,7 +182,7 @@ public class ScopeAPI {
|
|||
} else {
|
||||
|
||||
logger.error("deleteScope failed; scope with id " + id + " not found.");
|
||||
m.put("code", HttpStatus.NOT_FOUND);
|
||||
m.put(HttpCodeView.CODE, HttpStatus.NOT_FOUND);
|
||||
m.put("errorMessage", "Could not delete scope. The requested scope with id " + id + " could not be found.");
|
||||
return JsonErrorView.VIEWNAME;
|
||||
}
|
||||
|
|
|
@ -90,12 +90,12 @@ public class TokenAPI {
|
|||
|
||||
if (token == null) {
|
||||
logger.error("getToken failed; token not found: " + id);
|
||||
m.put("code", HttpStatus.NOT_FOUND);
|
||||
m.put(HttpCodeView.CODE, HttpStatus.NOT_FOUND);
|
||||
m.put("errorMessage", "The requested token with id " + id + " could not be found.");
|
||||
return JsonErrorView.VIEWNAME;
|
||||
} else if (!token.getAuthenticationHolder().getAuthentication().getName().equals(p.getName())) {
|
||||
logger.error("getToken failed; token does not belong to principal " + p.getName());
|
||||
m.put("code", HttpStatus.FORBIDDEN);
|
||||
m.put(HttpCodeView.CODE, HttpStatus.FORBIDDEN);
|
||||
m.put("errorMessage", "You do not have permission to view this token");
|
||||
return JsonErrorView.VIEWNAME;
|
||||
} else {
|
||||
|
@ -111,12 +111,12 @@ public class TokenAPI {
|
|||
|
||||
if (token == null) {
|
||||
logger.error("getToken failed; token not found: " + id);
|
||||
m.put("code", HttpStatus.NOT_FOUND);
|
||||
m.put(HttpCodeView.CODE, HttpStatus.NOT_FOUND);
|
||||
m.put("errorMessage", "The requested token with id " + id + " could not be found.");
|
||||
return JsonErrorView.VIEWNAME;
|
||||
} else if (!token.getAuthenticationHolder().getAuthentication().getName().equals(p.getName())) {
|
||||
logger.error("getToken failed; token does not belong to principal " + p.getName());
|
||||
m.put("code", HttpStatus.FORBIDDEN);
|
||||
m.put(HttpCodeView.CODE, HttpStatus.FORBIDDEN);
|
||||
m.put("errorMessage", "You do not have permission to view this token");
|
||||
return JsonErrorView.VIEWNAME;
|
||||
} else {
|
||||
|
@ -138,7 +138,7 @@ public class TokenAPI {
|
|||
return TokenApiView.VIEWNAME;
|
||||
} else {
|
||||
// client not found
|
||||
m.put("code", HttpStatus.NOT_FOUND);
|
||||
m.put(HttpCodeView.CODE, HttpStatus.NOT_FOUND);
|
||||
m.put("errorMessage", "The requested client with id " + clientId + " could not be found.");
|
||||
return JsonErrorView.VIEWNAME;
|
||||
}
|
||||
|
@ -157,13 +157,13 @@ public class TokenAPI {
|
|||
m.put("entity", token);
|
||||
return TokenApiView.VIEWNAME;
|
||||
} else {
|
||||
m.put("code", HttpStatus.NOT_FOUND);
|
||||
m.put(HttpCodeView.CODE, HttpStatus.NOT_FOUND);
|
||||
m.put("errorMessage", "No registration token could be found.");
|
||||
return JsonErrorView.VIEWNAME;
|
||||
}
|
||||
} else {
|
||||
// client not found
|
||||
m.put("code", HttpStatus.NOT_FOUND);
|
||||
m.put(HttpCodeView.CODE, HttpStatus.NOT_FOUND);
|
||||
m.put("errorMessage", "The requested client with id " + clientId + " could not be found.");
|
||||
return JsonErrorView.VIEWNAME;
|
||||
}
|
||||
|
@ -183,13 +183,13 @@ public class TokenAPI {
|
|||
m.put("entity", token);
|
||||
return TokenApiView.VIEWNAME;
|
||||
} else {
|
||||
m.put("code", HttpStatus.NOT_FOUND);
|
||||
m.put(HttpCodeView.CODE, HttpStatus.NOT_FOUND);
|
||||
m.put("errorMessage", "No registration token could be found.");
|
||||
return JsonErrorView.VIEWNAME;
|
||||
}
|
||||
} else {
|
||||
// client not found
|
||||
m.put("code", HttpStatus.NOT_FOUND);
|
||||
m.put(HttpCodeView.CODE, HttpStatus.NOT_FOUND);
|
||||
m.put("errorMessage", "The requested client with id " + clientId + " could not be found.");
|
||||
return JsonErrorView.VIEWNAME;
|
||||
}
|
||||
|
@ -213,12 +213,12 @@ public class TokenAPI {
|
|||
|
||||
if (token == null) {
|
||||
logger.error("refresh token not found: " + id);
|
||||
m.put("code", HttpStatus.NOT_FOUND);
|
||||
m.put(HttpCodeView.CODE, HttpStatus.NOT_FOUND);
|
||||
m.put("errorMessage", "The requested token with id " + id + " could not be found.");
|
||||
return JsonErrorView.VIEWNAME;
|
||||
} else if (!token.getAuthenticationHolder().getAuthentication().getName().equals(p.getName())) {
|
||||
logger.error("refresh token " + id + " does not belong to principal " + p.getName());
|
||||
m.put("code", HttpStatus.FORBIDDEN);
|
||||
m.put(HttpCodeView.CODE, HttpStatus.FORBIDDEN);
|
||||
m.put("errorMessage", "You do not have permission to view this token");
|
||||
return JsonErrorView.VIEWNAME;
|
||||
} else {
|
||||
|
@ -234,12 +234,12 @@ public class TokenAPI {
|
|||
|
||||
if (token == null) {
|
||||
logger.error("refresh token not found: " + id);
|
||||
m.put("code", HttpStatus.NOT_FOUND);
|
||||
m.put(HttpCodeView.CODE, HttpStatus.NOT_FOUND);
|
||||
m.put("errorMessage", "The requested token with id " + id + " could not be found.");
|
||||
return JsonErrorView.VIEWNAME;
|
||||
} else if (!token.getAuthenticationHolder().getAuthentication().getName().equals(p.getName())) {
|
||||
logger.error("refresh token " + id + " does not belong to principal " + p.getName());
|
||||
m.put("code", HttpStatus.FORBIDDEN);
|
||||
m.put(HttpCodeView.CODE, HttpStatus.FORBIDDEN);
|
||||
m.put("errorMessage", "You do not have permission to view this token");
|
||||
return JsonErrorView.VIEWNAME;
|
||||
} else {
|
||||
|
|
|
@ -109,7 +109,7 @@ public abstract class AbstractClientEntityView extends AbstractView {
|
|||
response.setContentType(MediaType.APPLICATION_JSON_VALUE);
|
||||
|
||||
|
||||
HttpStatus code = (HttpStatus) model.get("code");
|
||||
HttpStatus code = (HttpStatus) model.get(HttpCodeView.CODE);
|
||||
if (code == null) {
|
||||
code = HttpStatus.OK; // default to 200
|
||||
}
|
||||
|
|
|
@ -72,7 +72,7 @@ public class ClientInformationResponseView extends AbstractView {
|
|||
//OAuth2AccessTokenEntity token = (OAuth2AccessTokenEntity) model.get("token");
|
||||
//String uri = (String)model.get("uri"); //request.getRequestURL() + "/" + c.getClientId();
|
||||
|
||||
HttpStatus code = (HttpStatus) model.get("code");
|
||||
HttpStatus code = (HttpStatus) model.get(HttpCodeView.CODE);
|
||||
if (code == null) {
|
||||
code = HttpStatus.OK;
|
||||
}
|
||||
|
|
|
@ -37,10 +37,12 @@ import org.springframework.web.servlet.view.AbstractView;
|
|||
public class HttpCodeView extends AbstractView {
|
||||
|
||||
public static final String VIEWNAME = "httpCodeView";
|
||||
|
||||
public static final String CODE = "code";
|
||||
|
||||
@Override
|
||||
protected void renderMergedOutputModel(Map<String, Object> model, HttpServletRequest request, HttpServletResponse response) {
|
||||
HttpStatus code = (HttpStatus) model.get("code");
|
||||
HttpStatus code = (HttpStatus) model.get(CODE);
|
||||
if (code == null) {
|
||||
code = HttpStatus.OK; // default to 200
|
||||
}
|
||||
|
|
|
@ -102,7 +102,7 @@ public class JsonApprovedSiteView extends AbstractView {
|
|||
response.setContentType(MediaType.APPLICATION_JSON_VALUE);
|
||||
|
||||
|
||||
HttpStatus code = (HttpStatus) model.get("code");
|
||||
HttpStatus code = (HttpStatus) model.get(HttpCodeView.CODE);
|
||||
if (code == null) {
|
||||
code = HttpStatus.OK; // default to 200
|
||||
}
|
||||
|
|
|
@ -82,7 +82,7 @@ public class JsonEntityView extends AbstractView {
|
|||
response.setContentType(MediaType.APPLICATION_JSON_VALUE);
|
||||
|
||||
|
||||
HttpStatus code = (HttpStatus) model.get("code");
|
||||
HttpStatus code = (HttpStatus) model.get(HttpCodeView.CODE);
|
||||
if (code == null) {
|
||||
code = HttpStatus.OK; // default to 200
|
||||
}
|
||||
|
|
|
@ -81,7 +81,7 @@ public class JsonErrorView extends AbstractView {
|
|||
response.setContentType(MediaType.APPLICATION_JSON_VALUE);
|
||||
|
||||
|
||||
HttpStatus code = (HttpStatus) model.get("code");
|
||||
HttpStatus code = (HttpStatus) model.get(HttpCodeView.CODE);
|
||||
if (code == null) {
|
||||
code = HttpStatus.OK; // default to 200
|
||||
}
|
||||
|
|
|
@ -94,17 +94,17 @@ public class ApprovedSiteAPI {
|
|||
|
||||
if (approvedSite == null) {
|
||||
logger.error("deleteApprovedSite failed; no approved site found for id: " + id);
|
||||
m.put("code", HttpStatus.NOT_FOUND);
|
||||
m.put(HttpCodeView.CODE, HttpStatus.NOT_FOUND);
|
||||
m.put("errorMessage", "Could not delete approved site. The requested approved site with id: " + id + " could not be found.");
|
||||
return JsonErrorView.VIEWNAME;
|
||||
} else if (!approvedSite.getUserId().equals(p.getName())) {
|
||||
logger.error("deleteApprovedSite failed; principal "
|
||||
+ p.getName() + " does not own approved site" + id);
|
||||
m.put("code", HttpStatus.FORBIDDEN);
|
||||
m.put(HttpCodeView.CODE, HttpStatus.FORBIDDEN);
|
||||
m.put("errorMessage", "You do not have permission to delete this approved site. The approved site decision will not be deleted.");
|
||||
return JsonErrorView.VIEWNAME;
|
||||
} else {
|
||||
m.put("code", HttpStatus.OK);
|
||||
m.put(HttpCodeView.CODE, HttpStatus.OK);
|
||||
approvedSiteService.remove(approvedSite);
|
||||
}
|
||||
|
||||
|
@ -119,13 +119,13 @@ public class ApprovedSiteAPI {
|
|||
ApprovedSite approvedSite = approvedSiteService.getById(id);
|
||||
if (approvedSite == null) {
|
||||
logger.error("getApprovedSite failed; no approved site found for id: " + id);
|
||||
m.put("code", HttpStatus.NOT_FOUND);
|
||||
m.put(HttpCodeView.CODE, HttpStatus.NOT_FOUND);
|
||||
m.put("errorMessage", "The requested approved site with id: " + id + " could not be found.");
|
||||
return JsonErrorView.VIEWNAME;
|
||||
} else if (!approvedSite.getUserId().equals(p.getName())) {
|
||||
logger.error("getApprovedSite failed; principal "
|
||||
+ p.getName() + " does not own approved site" + id);
|
||||
m.put("code", HttpStatus.FORBIDDEN);
|
||||
m.put(HttpCodeView.CODE, HttpStatus.FORBIDDEN);
|
||||
m.put("errorMessage", "You do not have permission to view this approved site.");
|
||||
return JsonErrorView.VIEWNAME;
|
||||
} else {
|
||||
|
|
|
@ -113,12 +113,12 @@ public class BlacklistAPI {
|
|||
}
|
||||
catch (JsonSyntaxException e) {
|
||||
logger.error("addNewBlacklistedSite failed due to JsonSyntaxException: ", e);
|
||||
m.put("code", HttpStatus.BAD_REQUEST);
|
||||
m.put(HttpCodeView.CODE, HttpStatus.BAD_REQUEST);
|
||||
m.put("errorMessage", "Could not save new blacklisted site. The server encountered a JSON syntax exception. Contact a system administrator for assistance.");
|
||||
return JsonErrorView.VIEWNAME;
|
||||
} catch (IllegalStateException e) {
|
||||
logger.error("addNewBlacklistedSite failed due to IllegalStateException", e);
|
||||
m.put("code", HttpStatus.BAD_REQUEST);
|
||||
m.put(HttpCodeView.CODE, HttpStatus.BAD_REQUEST);
|
||||
m.put("errorMessage", "Could not save new blacklisted site. The server encountered an IllegalStateException. Refresh and try again - if the problem persists, contact a system administrator for assistance.");
|
||||
return JsonErrorView.VIEWNAME;
|
||||
}
|
||||
|
@ -145,12 +145,12 @@ public class BlacklistAPI {
|
|||
}
|
||||
catch (JsonSyntaxException e) {
|
||||
logger.error("updateBlacklistedSite failed due to JsonSyntaxException", e);
|
||||
m.put("code", HttpStatus.BAD_REQUEST);
|
||||
m.put(HttpCodeView.CODE, HttpStatus.BAD_REQUEST);
|
||||
m.put("errorMessage", "Could not update blacklisted site. The server encountered a JSON syntax exception. Contact a system administrator for assistance.");
|
||||
return JsonErrorView.VIEWNAME;
|
||||
} catch (IllegalStateException e) {
|
||||
logger.error("updateBlacklistedSite failed due to IllegalStateException", e);
|
||||
m.put("code", HttpStatus.BAD_REQUEST);
|
||||
m.put(HttpCodeView.CODE, HttpStatus.BAD_REQUEST);
|
||||
m.put("errorMessage", "Could not update blacklisted site. The server encountered an IllegalStateException. Refresh and try again - if the problem persists, contact a system administrator for assistance.");
|
||||
return JsonErrorView.VIEWNAME;
|
||||
}
|
||||
|
@ -160,7 +160,7 @@ public class BlacklistAPI {
|
|||
|
||||
if (oldBlacklist == null) {
|
||||
logger.error("updateBlacklistedSite failed; blacklist with id " + id + " could not be found");
|
||||
m.put("code", HttpStatus.NOT_FOUND);
|
||||
m.put(HttpCodeView.CODE, HttpStatus.NOT_FOUND);
|
||||
m.put("errorMessage", "Could not update blacklisted site. The requested blacklist with id " + id + "could not be found.");
|
||||
return JsonErrorView.VIEWNAME;
|
||||
} else {
|
||||
|
@ -186,7 +186,7 @@ public class BlacklistAPI {
|
|||
m.put("errorMessage", "Could not delete bladklist. The requested bladklist with id " + id + " could not be found.");
|
||||
return JsonErrorView.VIEWNAME;
|
||||
} else {
|
||||
m.put("code", HttpStatus.OK);
|
||||
m.put(HttpCodeView.CODE, HttpStatus.OK);
|
||||
blacklistService.remove(blacklist);
|
||||
}
|
||||
|
||||
|
@ -201,7 +201,7 @@ public class BlacklistAPI {
|
|||
BlacklistedSite blacklist = blacklistService.getById(id);
|
||||
if (blacklist == null) {
|
||||
logger.error("getBlacklistedSite failed; blacklist with id " + id + " could not be found");
|
||||
m.put("code", HttpStatus.NOT_FOUND);
|
||||
m.put(HttpCodeView.CODE, HttpStatus.NOT_FOUND);
|
||||
m.put("errorMessage", "Could not delete bladklist. The requested bladklist with id " + id + " could not be found.");
|
||||
return JsonErrorView.VIEWNAME;
|
||||
} else {
|
||||
|
|
|
@ -161,12 +161,12 @@ public class ClientAPI {
|
|||
}
|
||||
catch (JsonSyntaxException e) {
|
||||
logger.error("apiAddClient failed due to JsonSyntaxException", e);
|
||||
m.addAttribute("code", HttpStatus.BAD_REQUEST);
|
||||
m.addAttribute(HttpCodeView.CODE, HttpStatus.BAD_REQUEST);
|
||||
m.addAttribute("errorMessage", "Could not save new client. The server encountered a JSON syntax exception. Contact a system administrator for assistance.");
|
||||
return JsonErrorView.VIEWNAME;
|
||||
} catch (IllegalStateException e) {
|
||||
logger.error("apiAddClient failed due to IllegalStateException", e);
|
||||
m.addAttribute("code", HttpStatus.BAD_REQUEST);
|
||||
m.addAttribute(HttpCodeView.CODE, HttpStatus.BAD_REQUEST);
|
||||
m.addAttribute("errorMessage", "Could not save new client. The server encountered an IllegalStateException. Refresh and try again - if the problem persists, contact a system administrator for assistance.");
|
||||
return JsonErrorView.VIEWNAME;
|
||||
}
|
||||
|
@ -196,7 +196,7 @@ public class ClientAPI {
|
|||
|
||||
if (Strings.isNullOrEmpty(client.getJwksUri())) {
|
||||
logger.error("tried to create client with private key auth but no private key");
|
||||
m.addAttribute("code", HttpStatus.BAD_REQUEST);
|
||||
m.addAttribute(HttpCodeView.CODE, HttpStatus.BAD_REQUEST);
|
||||
m.addAttribute("errorMessage", "Can not create a client with private key authentication without registering a key via the JWS Set URI.");
|
||||
return JsonErrorView.VIEWNAME;
|
||||
}
|
||||
|
@ -207,7 +207,7 @@ public class ClientAPI {
|
|||
} else {
|
||||
|
||||
logger.error("unknown auth method");
|
||||
m.addAttribute("code", HttpStatus.BAD_REQUEST);
|
||||
m.addAttribute(HttpCodeView.CODE, HttpStatus.BAD_REQUEST);
|
||||
m.addAttribute("errorMessage", "Unknown auth method requested");
|
||||
return JsonErrorView.VIEWNAME;
|
||||
|
||||
|
@ -248,12 +248,12 @@ public class ClientAPI {
|
|||
}
|
||||
catch (JsonSyntaxException e) {
|
||||
logger.error("apiUpdateClient failed due to JsonSyntaxException", e);
|
||||
m.addAttribute("code", HttpStatus.BAD_REQUEST);
|
||||
m.addAttribute(HttpCodeView.CODE, HttpStatus.BAD_REQUEST);
|
||||
m.addAttribute("errorMessage", "Could not update client. The server encountered a JSON syntax exception. Contact a system administrator for assistance.");
|
||||
return JsonErrorView.VIEWNAME;
|
||||
} catch (IllegalStateException e) {
|
||||
logger.error("apiUpdateClient failed due to IllegalStateException", e);
|
||||
m.addAttribute("code", HttpStatus.BAD_REQUEST);
|
||||
m.addAttribute(HttpCodeView.CODE, HttpStatus.BAD_REQUEST);
|
||||
m.addAttribute("errorMessage", "Could not update client. The server encountered an IllegalStateException. Refresh and try again - if the problem persists, contact a system administrator for assistance.");
|
||||
return JsonErrorView.VIEWNAME;
|
||||
}
|
||||
|
@ -262,7 +262,7 @@ public class ClientAPI {
|
|||
|
||||
if (oldClient == null) {
|
||||
logger.error("apiUpdateClient failed; client with id " + id + " could not be found.");
|
||||
m.addAttribute("code", HttpStatus.NOT_FOUND);
|
||||
m.addAttribute(HttpCodeView.CODE, HttpStatus.NOT_FOUND);
|
||||
m.addAttribute("errorMessage", "Could not update client. The requested client with id " + id + "could not be found.");
|
||||
return JsonErrorView.VIEWNAME;
|
||||
}
|
||||
|
@ -292,7 +292,7 @@ public class ClientAPI {
|
|||
|
||||
if (Strings.isNullOrEmpty(client.getJwksUri())) {
|
||||
logger.error("tried to create client with private key auth but no private key");
|
||||
m.addAttribute("code", HttpStatus.BAD_REQUEST);
|
||||
m.addAttribute(HttpCodeView.CODE, HttpStatus.BAD_REQUEST);
|
||||
m.addAttribute("errorMessage", "Can not create a client with private key authentication without registering a key via the JWS Set URI.");
|
||||
return JsonErrorView.VIEWNAME;
|
||||
}
|
||||
|
@ -303,7 +303,7 @@ public class ClientAPI {
|
|||
} else {
|
||||
|
||||
logger.error("unknown auth method");
|
||||
m.addAttribute("code", HttpStatus.BAD_REQUEST);
|
||||
m.addAttribute(HttpCodeView.CODE, HttpStatus.BAD_REQUEST);
|
||||
m.addAttribute("errorMessage", "Unknown auth method requested");
|
||||
return JsonErrorView.VIEWNAME;
|
||||
|
||||
|
@ -334,11 +334,11 @@ public class ClientAPI {
|
|||
|
||||
if (client == null) {
|
||||
logger.error("apiDeleteClient failed; client with id " + id + " could not be found.");
|
||||
modelAndView.getModelMap().put("code", HttpStatus.NOT_FOUND);
|
||||
modelAndView.getModelMap().put(HttpCodeView.CODE, HttpStatus.NOT_FOUND);
|
||||
modelAndView.getModelMap().put("errorMessage", "Could not delete client. The requested client with id " + id + "could not be found.");
|
||||
return JsonErrorView.VIEWNAME;
|
||||
} else {
|
||||
modelAndView.getModelMap().put("code", HttpStatus.OK);
|
||||
modelAndView.getModelMap().put(HttpCodeView.CODE, HttpStatus.OK);
|
||||
clientService.deleteClient(client);
|
||||
}
|
||||
|
||||
|
@ -359,7 +359,7 @@ public class ClientAPI {
|
|||
|
||||
if (client == null) {
|
||||
logger.error("apiShowClient failed; client with id " + id + " could not be found.");
|
||||
model.addAttribute("code", HttpStatus.NOT_FOUND);
|
||||
model.addAttribute(HttpCodeView.CODE, HttpStatus.NOT_FOUND);
|
||||
model.addAttribute("errorMessage", "The requested client with id " + id + " could not be found.");
|
||||
return JsonErrorView.VIEWNAME;
|
||||
}
|
||||
|
|
|
@ -117,7 +117,7 @@ public class DynamicClientRegistrationEndpoint {
|
|||
// bad parse
|
||||
// didn't parse, this is a bad request
|
||||
logger.error("registerNewClient failed; submitted JSON is malformed");
|
||||
m.addAttribute("code", HttpStatus.BAD_REQUEST); // http 400
|
||||
m.addAttribute(HttpCodeView.CODE, HttpStatus.BAD_REQUEST); // http 400
|
||||
return HttpCodeView.VIEWNAME;
|
||||
}
|
||||
|
||||
|
@ -143,7 +143,7 @@ public class DynamicClientRegistrationEndpoint {
|
|||
// validation failed, return an error
|
||||
m.addAttribute("error", ve.getError());
|
||||
m.addAttribute("errorMessage", ve.getErrorDescription());
|
||||
m.addAttribute("code", ve.getStatus());
|
||||
m.addAttribute(HttpCodeView.CODE, ve.getStatus());
|
||||
return JsonErrorView.VIEWNAME;
|
||||
}
|
||||
|
||||
|
@ -182,26 +182,26 @@ public class DynamicClientRegistrationEndpoint {
|
|||
|
||||
RegisteredClient registered = new RegisteredClient(savedClient, token.getValue(), config.getIssuer() + "register/" + UriUtils.encodePathSegment(savedClient.getClientId(), "UTF-8"));
|
||||
m.addAttribute("client", registered);
|
||||
m.addAttribute("code", HttpStatus.CREATED); // http 201
|
||||
m.addAttribute(HttpCodeView.CODE, HttpStatus.CREATED); // http 201
|
||||
|
||||
return ClientInformationResponseView.VIEWNAME;
|
||||
} catch (UnsupportedEncodingException e) {
|
||||
logger.error("Unsupported encoding", e);
|
||||
m.addAttribute("code", HttpStatus.INTERNAL_SERVER_ERROR);
|
||||
m.addAttribute(HttpCodeView.CODE, HttpStatus.INTERNAL_SERVER_ERROR);
|
||||
return HttpCodeView.VIEWNAME;
|
||||
} catch (IllegalArgumentException e) {
|
||||
logger.error("Couldn't save client", e);
|
||||
|
||||
m.addAttribute("error", "invalid_client_metadata");
|
||||
m.addAttribute("errorMessage", "Unable to save client due to invalid or inconsistent metadata.");
|
||||
m.addAttribute("code", HttpStatus.BAD_REQUEST); // http 400
|
||||
m.addAttribute(HttpCodeView.CODE, HttpStatus.BAD_REQUEST); // http 400
|
||||
|
||||
return JsonErrorView.VIEWNAME;
|
||||
}
|
||||
} else {
|
||||
// didn't parse, this is a bad request
|
||||
logger.error("registerNewClient failed; submitted JSON is malformed");
|
||||
m.addAttribute("code", HttpStatus.BAD_REQUEST); // http 400
|
||||
m.addAttribute(HttpCodeView.CODE, HttpStatus.BAD_REQUEST); // http 400
|
||||
|
||||
return HttpCodeView.VIEWNAME;
|
||||
}
|
||||
|
@ -229,12 +229,12 @@ public class DynamicClientRegistrationEndpoint {
|
|||
|
||||
// send it all out to the view
|
||||
m.addAttribute("client", registered);
|
||||
m.addAttribute("code", HttpStatus.OK); // http 200
|
||||
m.addAttribute(HttpCodeView.CODE, HttpStatus.OK); // http 200
|
||||
|
||||
return ClientInformationResponseView.VIEWNAME;
|
||||
} catch (UnsupportedEncodingException e) {
|
||||
logger.error("Unsupported encoding", e);
|
||||
m.addAttribute("code", HttpStatus.INTERNAL_SERVER_ERROR);
|
||||
m.addAttribute(HttpCodeView.CODE, HttpStatus.INTERNAL_SERVER_ERROR);
|
||||
return HttpCodeView.VIEWNAME;
|
||||
}
|
||||
|
||||
|
@ -242,7 +242,7 @@ public class DynamicClientRegistrationEndpoint {
|
|||
// client mismatch
|
||||
logger.error("readClientConfiguration failed, client ID mismatch: "
|
||||
+ clientId + " and " + auth.getOAuth2Request().getClientId() + " do not match.");
|
||||
m.addAttribute("code", HttpStatus.FORBIDDEN); // http 403
|
||||
m.addAttribute(HttpCodeView.CODE, HttpStatus.FORBIDDEN); // http 403
|
||||
|
||||
return HttpCodeView.VIEWNAME;
|
||||
}
|
||||
|
@ -268,7 +268,7 @@ public class DynamicClientRegistrationEndpoint {
|
|||
// bad parse
|
||||
// didn't parse, this is a bad request
|
||||
logger.error("updateClient failed; submitted JSON is malformed");
|
||||
m.addAttribute("code", HttpStatus.BAD_REQUEST); // http 400
|
||||
m.addAttribute(HttpCodeView.CODE, HttpStatus.BAD_REQUEST); // http 400
|
||||
return HttpCodeView.VIEWNAME;
|
||||
}
|
||||
ClientDetailsEntity oldClient = clientService.loadClientByClientId(clientId);
|
||||
|
@ -303,7 +303,7 @@ public class DynamicClientRegistrationEndpoint {
|
|||
// validation failed, return an error
|
||||
m.addAttribute("error", ve.getError());
|
||||
m.addAttribute("errorMessage", ve.getErrorDescription());
|
||||
m.addAttribute("code", ve.getStatus());
|
||||
m.addAttribute(HttpCodeView.CODE, ve.getStatus());
|
||||
return JsonErrorView.VIEWNAME;
|
||||
}
|
||||
|
||||
|
@ -317,19 +317,19 @@ public class DynamicClientRegistrationEndpoint {
|
|||
|
||||
// send it all out to the view
|
||||
m.addAttribute("client", registered);
|
||||
m.addAttribute("code", HttpStatus.OK); // http 200
|
||||
m.addAttribute(HttpCodeView.CODE, HttpStatus.OK); // http 200
|
||||
|
||||
return ClientInformationResponseView.VIEWNAME;
|
||||
} catch (UnsupportedEncodingException e) {
|
||||
logger.error("Unsupported encoding", e);
|
||||
m.addAttribute("code", HttpStatus.INTERNAL_SERVER_ERROR);
|
||||
m.addAttribute(HttpCodeView.CODE, HttpStatus.INTERNAL_SERVER_ERROR);
|
||||
return HttpCodeView.VIEWNAME;
|
||||
} catch (IllegalArgumentException e) {
|
||||
logger.error("Couldn't save client", e);
|
||||
|
||||
m.addAttribute("error", "invalid_client_metadata");
|
||||
m.addAttribute("errorMessage", "Unable to save client due to invalid or inconsistent metadata.");
|
||||
m.addAttribute("code", HttpStatus.BAD_REQUEST); // http 400
|
||||
m.addAttribute(HttpCodeView.CODE, HttpStatus.BAD_REQUEST); // http 400
|
||||
|
||||
return JsonErrorView.VIEWNAME;
|
||||
}
|
||||
|
@ -337,7 +337,7 @@ public class DynamicClientRegistrationEndpoint {
|
|||
// client mismatch
|
||||
logger.error("updateClient failed, client ID mismatch: "
|
||||
+ clientId + " and " + auth.getOAuth2Request().getClientId() + " do not match.");
|
||||
m.addAttribute("code", HttpStatus.FORBIDDEN); // http 403
|
||||
m.addAttribute(HttpCodeView.CODE, HttpStatus.FORBIDDEN); // http 403
|
||||
|
||||
return HttpCodeView.VIEWNAME;
|
||||
}
|
||||
|
@ -360,14 +360,14 @@ public class DynamicClientRegistrationEndpoint {
|
|||
|
||||
clientService.deleteClient(client);
|
||||
|
||||
m.addAttribute("code", HttpStatus.NO_CONTENT); // http 204
|
||||
m.addAttribute(HttpCodeView.CODE, HttpStatus.NO_CONTENT); // http 204
|
||||
|
||||
return HttpCodeView.VIEWNAME;
|
||||
} else {
|
||||
// client mismatch
|
||||
logger.error("readClientConfiguration failed, client ID mismatch: "
|
||||
+ clientId + " and " + auth.getOAuth2Request().getClientId() + " do not match.");
|
||||
m.addAttribute("code", HttpStatus.FORBIDDEN); // http 403
|
||||
m.addAttribute(HttpCodeView.CODE, HttpStatus.FORBIDDEN); // http 403
|
||||
|
||||
return HttpCodeView.VIEWNAME;
|
||||
}
|
||||
|
|
|
@ -117,7 +117,7 @@ public class ProtectedResourceRegistrationEndpoint {
|
|||
// bad parse
|
||||
// didn't parse, this is a bad request
|
||||
logger.error("registerNewProtectedResource failed; submitted JSON is malformed");
|
||||
m.addAttribute("code", HttpStatus.BAD_REQUEST); // http 400
|
||||
m.addAttribute(HttpCodeView.CODE, HttpStatus.BAD_REQUEST); // http 400
|
||||
return HttpCodeView.VIEWNAME;
|
||||
}
|
||||
|
||||
|
@ -140,7 +140,7 @@ public class ProtectedResourceRegistrationEndpoint {
|
|||
// validation failed, return an error
|
||||
m.addAttribute("error", ve.getError());
|
||||
m.addAttribute("errorMessage", ve.getErrorDescription());
|
||||
m.addAttribute("code", ve.getStatus());
|
||||
m.addAttribute(HttpCodeView.CODE, ve.getStatus());
|
||||
return JsonErrorView.VIEWNAME;
|
||||
}
|
||||
|
||||
|
@ -190,26 +190,26 @@ public class ProtectedResourceRegistrationEndpoint {
|
|||
|
||||
RegisteredClient registered = new RegisteredClient(savedClient, token.getValue(), config.getIssuer() + "resource/" + UriUtils.encodePathSegment(savedClient.getClientId(), "UTF-8"));
|
||||
m.addAttribute("client", registered);
|
||||
m.addAttribute("code", HttpStatus.CREATED); // http 201
|
||||
m.addAttribute(HttpCodeView.CODE, HttpStatus.CREATED); // http 201
|
||||
|
||||
return ClientInformationResponseView.VIEWNAME;
|
||||
} catch (UnsupportedEncodingException e) {
|
||||
logger.error("Unsupported encoding", e);
|
||||
m.addAttribute("code", HttpStatus.INTERNAL_SERVER_ERROR);
|
||||
m.addAttribute(HttpCodeView.CODE, HttpStatus.INTERNAL_SERVER_ERROR);
|
||||
return HttpCodeView.VIEWNAME;
|
||||
} catch (IllegalArgumentException e) {
|
||||
logger.error("Couldn't save client", e);
|
||||
|
||||
m.addAttribute("error", "invalid_client_metadata");
|
||||
m.addAttribute("errorMessage", "Unable to save client due to invalid or inconsistent metadata.");
|
||||
m.addAttribute("code", HttpStatus.BAD_REQUEST); // http 400
|
||||
m.addAttribute(HttpCodeView.CODE, HttpStatus.BAD_REQUEST); // http 400
|
||||
|
||||
return JsonErrorView.VIEWNAME;
|
||||
}
|
||||
} else {
|
||||
// didn't parse, this is a bad request
|
||||
logger.error("registerNewClient failed; submitted JSON is malformed");
|
||||
m.addAttribute("code", HttpStatus.BAD_REQUEST); // http 400
|
||||
m.addAttribute(HttpCodeView.CODE, HttpStatus.BAD_REQUEST); // http 400
|
||||
|
||||
return HttpCodeView.VIEWNAME;
|
||||
}
|
||||
|
@ -258,19 +258,19 @@ public class ProtectedResourceRegistrationEndpoint {
|
|||
|
||||
// send it all out to the view
|
||||
m.addAttribute("client", registered);
|
||||
m.addAttribute("code", HttpStatus.OK); // http 200
|
||||
m.addAttribute(HttpCodeView.CODE, HttpStatus.OK); // http 200
|
||||
|
||||
return ClientInformationResponseView.VIEWNAME;
|
||||
} catch (UnsupportedEncodingException e) {
|
||||
logger.error("Unsupported encoding", e);
|
||||
m.addAttribute("code", HttpStatus.INTERNAL_SERVER_ERROR);
|
||||
m.addAttribute(HttpCodeView.CODE, HttpStatus.INTERNAL_SERVER_ERROR);
|
||||
return HttpCodeView.VIEWNAME;
|
||||
}
|
||||
} else {
|
||||
// client mismatch
|
||||
logger.error("readResourceConfiguration failed, client ID mismatch: "
|
||||
+ clientId + " and " + auth.getOAuth2Request().getClientId() + " do not match.");
|
||||
m.addAttribute("code", HttpStatus.FORBIDDEN); // http 403
|
||||
m.addAttribute(HttpCodeView.CODE, HttpStatus.FORBIDDEN); // http 403
|
||||
|
||||
return HttpCodeView.VIEWNAME;
|
||||
}
|
||||
|
@ -296,7 +296,7 @@ public class ProtectedResourceRegistrationEndpoint {
|
|||
// bad parse
|
||||
// didn't parse, this is a bad request
|
||||
logger.error("updateProtectedResource failed; submitted JSON is malformed");
|
||||
m.addAttribute("code", HttpStatus.BAD_REQUEST); // http 400
|
||||
m.addAttribute(HttpCodeView.CODE, HttpStatus.BAD_REQUEST); // http 400
|
||||
return HttpCodeView.VIEWNAME;
|
||||
}
|
||||
|
||||
|
@ -353,7 +353,7 @@ public class ProtectedResourceRegistrationEndpoint {
|
|||
// validation failed, return an error
|
||||
m.addAttribute("error", ve.getError());
|
||||
m.addAttribute("errorMessage", ve.getErrorDescription());
|
||||
m.addAttribute("code", ve.getStatus());
|
||||
m.addAttribute(HttpCodeView.CODE, ve.getStatus());
|
||||
return JsonErrorView.VIEWNAME;
|
||||
}
|
||||
|
||||
|
@ -369,19 +369,19 @@ public class ProtectedResourceRegistrationEndpoint {
|
|||
|
||||
// send it all out to the view
|
||||
m.addAttribute("client", registered);
|
||||
m.addAttribute("code", HttpStatus.OK); // http 200
|
||||
m.addAttribute(HttpCodeView.CODE, HttpStatus.OK); // http 200
|
||||
|
||||
return ClientInformationResponseView.VIEWNAME;
|
||||
} catch (UnsupportedEncodingException e) {
|
||||
logger.error("Unsupported encoding", e);
|
||||
m.addAttribute("code", HttpStatus.INTERNAL_SERVER_ERROR);
|
||||
m.addAttribute(HttpCodeView.CODE, HttpStatus.INTERNAL_SERVER_ERROR);
|
||||
return HttpCodeView.VIEWNAME;
|
||||
} catch (IllegalArgumentException e) {
|
||||
logger.error("Couldn't save client", e);
|
||||
|
||||
m.addAttribute("error", "invalid_client_metadata");
|
||||
m.addAttribute("errorMessage", "Unable to save client due to invalid or inconsistent metadata.");
|
||||
m.addAttribute("code", HttpStatus.BAD_REQUEST); // http 400
|
||||
m.addAttribute(HttpCodeView.CODE, HttpStatus.BAD_REQUEST); // http 400
|
||||
|
||||
return JsonErrorView.VIEWNAME;
|
||||
}
|
||||
|
@ -390,7 +390,7 @@ public class ProtectedResourceRegistrationEndpoint {
|
|||
logger.error("updateProtectedResource" +
|
||||
" failed, client ID mismatch: "
|
||||
+ clientId + " and " + auth.getOAuth2Request().getClientId() + " do not match.");
|
||||
m.addAttribute("code", HttpStatus.FORBIDDEN); // http 403
|
||||
m.addAttribute(HttpCodeView.CODE, HttpStatus.FORBIDDEN); // http 403
|
||||
|
||||
return HttpCodeView.VIEWNAME;
|
||||
}
|
||||
|
@ -413,14 +413,14 @@ public class ProtectedResourceRegistrationEndpoint {
|
|||
|
||||
clientService.deleteClient(client);
|
||||
|
||||
m.addAttribute("code", HttpStatus.NO_CONTENT); // http 204
|
||||
m.addAttribute(HttpCodeView.CODE, HttpStatus.NO_CONTENT); // http 204
|
||||
|
||||
return HttpCodeView.VIEWNAME;
|
||||
} else {
|
||||
// client mismatch
|
||||
logger.error("readClientConfiguration failed, client ID mismatch: "
|
||||
+ clientId + " and " + auth.getOAuth2Request().getClientId() + " do not match.");
|
||||
m.addAttribute("code", HttpStatus.FORBIDDEN); // http 403
|
||||
m.addAttribute(HttpCodeView.CODE, HttpStatus.FORBIDDEN); // http 403
|
||||
|
||||
return HttpCodeView.VIEWNAME;
|
||||
}
|
||||
|
|
|
@ -86,7 +86,7 @@ public class UserInfoEndpoint {
|
|||
|
||||
if (auth == null) {
|
||||
logger.error("getInfo failed; no principal. Requester is not authorized.");
|
||||
model.addAttribute("code", HttpStatus.FORBIDDEN);
|
||||
model.addAttribute(HttpCodeView.CODE, HttpStatus.FORBIDDEN);
|
||||
return HttpCodeView.VIEWNAME;
|
||||
}
|
||||
|
||||
|
@ -95,7 +95,7 @@ public class UserInfoEndpoint {
|
|||
|
||||
if (userInfo == null) {
|
||||
logger.error("getInfo failed; user not found: " + username);
|
||||
model.addAttribute("code", HttpStatus.NOT_FOUND);
|
||||
model.addAttribute(HttpCodeView.CODE, HttpStatus.NOT_FOUND);
|
||||
return HttpCodeView.VIEWNAME;
|
||||
}
|
||||
|
||||
|
|
|
@ -109,12 +109,12 @@ public class WhitelistAPI {
|
|||
|
||||
} catch (JsonParseException e) {
|
||||
logger.error("addNewWhitelistedSite failed due to JsonParseException", e);
|
||||
m.addAttribute("code", HttpStatus.BAD_REQUEST);
|
||||
m.addAttribute(HttpCodeView.CODE, HttpStatus.BAD_REQUEST);
|
||||
m.addAttribute("errorMessage", "Could not save new whitelisted site. The server encountered a JSON syntax exception. Contact a system administrator for assistance.");
|
||||
return JsonErrorView.VIEWNAME;
|
||||
} catch (IllegalStateException e) {
|
||||
logger.error("addNewWhitelistedSite failed due to IllegalStateException", e);
|
||||
m.addAttribute("code", HttpStatus.BAD_REQUEST);
|
||||
m.addAttribute(HttpCodeView.CODE, HttpStatus.BAD_REQUEST);
|
||||
m.addAttribute("errorMessage", "Could not save new whitelisted site. The server encountered an IllegalStateException. Refresh and try again - if the problem persists, contact a system administrator for assistance.");
|
||||
return JsonErrorView.VIEWNAME;
|
||||
}
|
||||
|
@ -146,12 +146,12 @@ public class WhitelistAPI {
|
|||
|
||||
} catch (JsonParseException e) {
|
||||
logger.error("updateWhitelistedSite failed due to JsonParseException", e);
|
||||
m.put("code", HttpStatus.BAD_REQUEST);
|
||||
m.put(HttpCodeView.CODE, HttpStatus.BAD_REQUEST);
|
||||
m.put("errorMessage", "Could not update whitelisted site. The server encountered a JSON syntax exception. Contact a system administrator for assistance.");
|
||||
return JsonErrorView.VIEWNAME;
|
||||
} catch (IllegalStateException e) {
|
||||
logger.error("updateWhitelistedSite failed due to IllegalStateException", e);
|
||||
m.put("code", HttpStatus.BAD_REQUEST);
|
||||
m.put(HttpCodeView.CODE, HttpStatus.BAD_REQUEST);
|
||||
m.put("errorMessage", "Could not update whitelisted site. The server encountered an IllegalStateException. Refresh and try again - if the problem persists, contact a system administrator for assistance.");
|
||||
return JsonErrorView.VIEWNAME;
|
||||
}
|
||||
|
@ -160,7 +160,7 @@ public class WhitelistAPI {
|
|||
|
||||
if (oldWhitelist == null) {
|
||||
logger.error("updateWhitelistedSite failed; whitelist with id " + id + " could not be found.");
|
||||
m.put("code", HttpStatus.NOT_FOUND);
|
||||
m.put(HttpCodeView.CODE, HttpStatus.NOT_FOUND);
|
||||
m.put("errorMessage", "Could not update whitelisted site. The requested whitelisted site with id " + id + "could not be found.");
|
||||
return JsonErrorView.VIEWNAME;
|
||||
} else {
|
||||
|
@ -184,11 +184,11 @@ public class WhitelistAPI {
|
|||
|
||||
if (whitelist == null) {
|
||||
logger.error("deleteWhitelistedSite failed; whitelist with id " + id + " could not be found.");
|
||||
m.put("code", HttpStatus.NOT_FOUND);
|
||||
m.put(HttpCodeView.CODE, HttpStatus.NOT_FOUND);
|
||||
m.put("errorMessage", "Could not delete whitelisted site. The requested whitelisted site with id " + id + "could not be found.");
|
||||
return JsonErrorView.VIEWNAME;
|
||||
} else {
|
||||
m.put("code", HttpStatus.OK);
|
||||
m.put(HttpCodeView.CODE, HttpStatus.OK);
|
||||
whitelistService.remove(whitelist);
|
||||
}
|
||||
|
||||
|
@ -203,7 +203,7 @@ public class WhitelistAPI {
|
|||
WhitelistedSite whitelist = whitelistService.getById(id);
|
||||
if (whitelist == null) {
|
||||
logger.error("getWhitelistedSite failed; whitelist with id " + id + " could not be found.");
|
||||
m.put("code", HttpStatus.NOT_FOUND);
|
||||
m.put(HttpCodeView.CODE, HttpStatus.NOT_FOUND);
|
||||
m.put("errorMessage", "The requested whitelisted site with id " + id + "could not be found.");
|
||||
return JsonErrorView.VIEWNAME;
|
||||
} else {
|
||||
|
|
Loading…
Reference in New Issue