Fixed up OIDC code so that it runs with new SECOAUTH changes; removed old AuthorizationRequestImpl class which is no longer needed
parent
a723c9d921
commit
e708f77eb3
|
@ -1,83 +0,0 @@
|
|||
package org.mitre.oauth2.introspectingfilter;
|
||||
|
||||
import com.google.gson.JsonElement;
|
||||
import com.google.gson.JsonObject;
|
||||
import java.util.Collection;
|
||||
import java.util.HashSet;
|
||||
import java.util.Map;
|
||||
import java.util.Set;
|
||||
import org.springframework.security.core.GrantedAuthority;
|
||||
import org.springframework.security.oauth2.provider.AuthorizationRequest;
|
||||
|
||||
public class AuthorizationRequestImpl implements AuthorizationRequest {
|
||||
|
||||
private JsonObject token;
|
||||
private String clientId;
|
||||
private Set<String> scopes = null;
|
||||
|
||||
public AuthorizationRequestImpl(JsonObject token) {
|
||||
this.token = token;
|
||||
clientId = token.get("client_id").getAsString();
|
||||
scopes = new HashSet<String>();
|
||||
for (JsonElement e : token.get("scope").getAsJsonArray()) {
|
||||
scopes.add(e.getAsString());
|
||||
}
|
||||
}
|
||||
|
||||
@Override
|
||||
public Map<String, String> getAuthorizationParameters() {
|
||||
return null;
|
||||
}
|
||||
|
||||
@Override
|
||||
public Map<String, String> getApprovalParameters() {
|
||||
return null;
|
||||
}
|
||||
|
||||
@Override
|
||||
public String getClientId() {
|
||||
return clientId;
|
||||
}
|
||||
|
||||
@Override
|
||||
public Set<String> getScope() {
|
||||
|
||||
return scopes;
|
||||
}
|
||||
|
||||
@Override
|
||||
public Set<String> getResourceIds() {
|
||||
return null;
|
||||
}
|
||||
|
||||
@Override
|
||||
public Collection<GrantedAuthority> getAuthorities() {
|
||||
return null;
|
||||
}
|
||||
|
||||
@Override
|
||||
public boolean isApproved() {
|
||||
return true;
|
||||
}
|
||||
|
||||
@Override
|
||||
public boolean isDenied() {
|
||||
return false;
|
||||
}
|
||||
|
||||
@Override
|
||||
public String getState() {
|
||||
return null;
|
||||
}
|
||||
|
||||
@Override
|
||||
public String getRedirectUri() {
|
||||
return null;
|
||||
}
|
||||
|
||||
@Override
|
||||
public Set<String> getResponseTypes() {
|
||||
return null;
|
||||
}
|
||||
|
||||
}
|
|
@ -1,27 +1,16 @@
|
|||
package org.mitre.oauth2.introspectingfilter;
|
||||
|
||||
import com.google.common.collect.Sets;
|
||||
import com.google.gson.JsonElement;
|
||||
import com.google.gson.JsonObject;
|
||||
import com.google.gson.JsonParser;
|
||||
import java.text.DateFormat;
|
||||
import java.text.ParseException;
|
||||
import java.text.SimpleDateFormat;
|
||||
import java.util.Collection;
|
||||
import java.util.Date;
|
||||
import java.util.HashMap;
|
||||
import java.util.HashSet;
|
||||
import java.util.Map;
|
||||
import java.util.Set;
|
||||
import java.util.logging.Level;
|
||||
import java.util.logging.Logger;
|
||||
|
||||
import org.slf4j.LoggerFactory;
|
||||
import org.springframework.security.core.Authentication;
|
||||
import org.springframework.security.core.AuthenticationException;
|
||||
import org.springframework.security.core.GrantedAuthority;
|
||||
import org.springframework.security.core.authority.AuthorityUtils;
|
||||
import org.springframework.security.oauth2.common.OAuth2AccessToken;
|
||||
import org.springframework.security.oauth2.common.OAuth2RefreshToken;
|
||||
import org.springframework.security.oauth2.provider.AuthorizationRequest;
|
||||
import org.springframework.security.oauth2.provider.OAuth2Authentication;
|
||||
import org.springframework.security.oauth2.provider.token.ResourceServerTokenServices;
|
||||
|
@ -31,6 +20,10 @@ import org.springframework.util.MultiValueMap;
|
|||
import org.springframework.web.client.RestClientException;
|
||||
import org.springframework.web.client.RestTemplate;
|
||||
|
||||
import com.google.gson.JsonElement;
|
||||
import com.google.gson.JsonObject;
|
||||
import com.google.gson.JsonParser;
|
||||
|
||||
public class IntrospectingTokenService implements ResourceServerTokenServices {
|
||||
|
||||
|
||||
|
@ -87,7 +80,15 @@ public class IntrospectingTokenService implements ResourceServerTokenServices {
|
|||
}
|
||||
|
||||
private AuthorizationRequest createAuthRequest(final JsonObject token) {
|
||||
AuthorizationRequest authReq = new AuthorizationRequestImpl(token);
|
||||
|
||||
clientId = token.get("client_id").getAsString();
|
||||
Set<String> scopes = new HashSet<String>();
|
||||
for (JsonElement e : token.get("scope").getAsJsonArray()) {
|
||||
scopes.add(e.getAsString());
|
||||
}
|
||||
AuthorizationRequest authReq = new AuthorizationRequest();
|
||||
authReq.setScope(scopes);
|
||||
authReq.setClientId(clientId);
|
||||
return authReq;
|
||||
}
|
||||
|
||||
|
|
|
@ -15,7 +15,6 @@ import org.springframework.security.core.AuthenticationException;
|
|||
import org.springframework.security.oauth2.common.exceptions.InvalidScopeException;
|
||||
import org.springframework.security.oauth2.common.exceptions.InvalidTokenException;
|
||||
import org.springframework.security.oauth2.provider.AuthorizationRequest;
|
||||
import org.springframework.security.oauth2.provider.AuthorizationRequestManager;
|
||||
import org.springframework.security.oauth2.provider.OAuth2Authentication;
|
||||
import org.springframework.security.oauth2.provider.token.AbstractTokenGranter;
|
||||
import org.springframework.stereotype.Component;
|
||||
|
@ -30,9 +29,6 @@ import com.google.common.collect.Sets;
|
|||
public class ChainedTokenGranter extends AbstractTokenGranter {
|
||||
|
||||
private static final String grantType = "urn:ietf:params:oauth:grant_type:redelegate";
|
||||
|
||||
@Autowired
|
||||
private static AuthorizationRequestManager authorizationRequestManager;
|
||||
|
||||
// keep down-cast versions so we can get to the right queries
|
||||
private OAuth2TokenEntityService tokenServices;
|
||||
|
@ -44,7 +40,7 @@ public class ChainedTokenGranter extends AbstractTokenGranter {
|
|||
*/
|
||||
@Autowired
|
||||
public ChainedTokenGranter(OAuth2TokenEntityService tokenServices, ClientDetailsEntityService clientDetailsService) {
|
||||
super(tokenServices, clientDetailsService, grantType, authorizationRequestManager);
|
||||
super(tokenServices, clientDetailsService, grantType);
|
||||
this.tokenServices = tokenServices;
|
||||
}
|
||||
|
||||
|
@ -76,21 +72,20 @@ public class ChainedTokenGranter extends AbstractTokenGranter {
|
|||
if (approvedScopes.containsAll(requestedScopes)) {
|
||||
|
||||
// build an appropriate auth request to hand to the token services layer
|
||||
AuthorizationRequest outgoingAuthRequest = authorizationRequestManager.createFromExisting(authorizationRequest);
|
||||
outgoingAuthRequest.setApproved(true);
|
||||
authorizationRequest.setApproved(true);
|
||||
if (requestedScopes.isEmpty()) {
|
||||
// if there are no scopes, inherit the original scopes from the token
|
||||
outgoingAuthRequest.setScope(approvedScopes);
|
||||
authorizationRequest.setScope(approvedScopes);
|
||||
} else {
|
||||
// if scopes were asked for, give only the subset of scopes requested
|
||||
// this allows safe downscoping
|
||||
outgoingAuthRequest.setScope(Sets.intersection(requestedScopes, approvedScopes));
|
||||
authorizationRequest.setScope(Sets.intersection(requestedScopes, approvedScopes));
|
||||
}
|
||||
|
||||
// NOTE: don't revoke the existing access token
|
||||
|
||||
// create a new access token
|
||||
OAuth2Authentication authentication = new OAuth2Authentication(outgoingAuthRequest, incomingToken.getAuthenticationHolder().getAuthentication().getUserAuthentication());
|
||||
OAuth2Authentication authentication = new OAuth2Authentication(authorizationRequest, incomingToken.getAuthenticationHolder().getAuthentication().getUserAuthentication());
|
||||
|
||||
return authentication;
|
||||
|
||||
|
|
|
@ -18,7 +18,6 @@ import org.springframework.security.oauth2.common.OAuth2AccessToken;
|
|||
import org.springframework.security.oauth2.common.exceptions.InvalidClientException;
|
||||
import org.springframework.security.oauth2.common.exceptions.InvalidTokenException;
|
||||
import org.springframework.security.oauth2.provider.AuthorizationRequest;
|
||||
import org.springframework.security.oauth2.provider.AuthorizationRequestManager;
|
||||
import org.springframework.security.oauth2.provider.token.AbstractTokenGranter;
|
||||
import org.springframework.stereotype.Component;
|
||||
|
||||
|
@ -46,12 +45,9 @@ public class JwtAssertionTokenGranter extends AbstractTokenGranter {
|
|||
@Autowired
|
||||
private ConfigurationPropertiesBean config;
|
||||
|
||||
@Autowired
|
||||
private static AuthorizationRequestManager authorizationRequestManager;
|
||||
|
||||
@Autowired
|
||||
public JwtAssertionTokenGranter(OAuth2TokenEntityService tokenServices, ClientDetailsEntityService clientDetailsService) {
|
||||
super(tokenServices, clientDetailsService, grantType, authorizationRequestManager);
|
||||
super(tokenServices, clientDetailsService, grantType);
|
||||
this.tokenServices = tokenServices;
|
||||
}
|
||||
|
||||
|
|
|
@ -1,195 +0,0 @@
|
|||
package org.mitre.openid.connect;
|
||||
|
||||
import java.util.Collection;
|
||||
import java.util.Map;
|
||||
import java.util.Set;
|
||||
|
||||
import org.mitre.openid.connect.model.ApprovedSite;
|
||||
import org.springframework.security.core.GrantedAuthority;
|
||||
import org.springframework.security.oauth2.provider.AuthorizationRequest;
|
||||
|
||||
import com.google.common.collect.Maps;
|
||||
import com.google.common.collect.Sets;
|
||||
|
||||
public class ConnectAuthorizationRequest implements AuthorizationRequest {
|
||||
|
||||
//SECOAUTH interface parameters
|
||||
private Map<String, String> authorizationParameters;
|
||||
private Map<String, String> approvalParameters;
|
||||
private String clientId;
|
||||
private Set<String> scope;
|
||||
private Set<String> resourceIds;
|
||||
private Collection<? extends GrantedAuthority> authorities;
|
||||
private boolean approved = false;
|
||||
private String state;
|
||||
private String redirectUri;
|
||||
private Set<String> responseTypes;
|
||||
|
||||
//Extra parameters
|
||||
private ApprovedSite approvedSite; //See issue 230
|
||||
|
||||
/**
|
||||
* Default constructor. Initialize maps & sets.
|
||||
*/
|
||||
public ConnectAuthorizationRequest() {
|
||||
authorizationParameters = Maps.newHashMap();
|
||||
approvalParameters = Maps.newHashMap();
|
||||
scope = Sets.newHashSet();
|
||||
resourceIds = Sets.newHashSet();
|
||||
authorities = Sets.newHashSet();
|
||||
responseTypes = Sets.newHashSet();
|
||||
}
|
||||
|
||||
/**
|
||||
* Constructor.
|
||||
*
|
||||
* @param authorizationParameters
|
||||
* @param approvalParameters
|
||||
* @param clientId
|
||||
* @param scope
|
||||
* @param resourceIds
|
||||
* @param authorities
|
||||
* @param approved
|
||||
* @param state
|
||||
* @param redirectUri
|
||||
* @param responseTypes
|
||||
*/
|
||||
public ConnectAuthorizationRequest(Map<String, String> authorizationParameters, Map<String, String> approvalParameters, String clientId, Set<String> scope, Set<String> resourceIds,
|
||||
Collection<? extends GrantedAuthority> authorities, boolean approved, String state, String redirectUri, Set<String> responseTypes) {
|
||||
this.authorizationParameters = authorizationParameters;
|
||||
this.approvalParameters = approvalParameters;
|
||||
this.clientId = clientId;
|
||||
this.scope = scope;
|
||||
this.resourceIds = resourceIds;
|
||||
this.authorities = authorities;
|
||||
this.approved = approved;
|
||||
this.state = state;
|
||||
this.redirectUri = redirectUri;
|
||||
this.responseTypes = responseTypes;
|
||||
}
|
||||
|
||||
@Override
|
||||
public Map<String, String> getAuthorizationParameters() {
|
||||
return authorizationParameters;
|
||||
}
|
||||
|
||||
@Override
|
||||
public void setAuthorizationParameters(Map<String, String> authorizationParameters) {
|
||||
this.authorizationParameters = authorizationParameters;
|
||||
}
|
||||
|
||||
@Override
|
||||
public Map<String, String> getApprovalParameters() {
|
||||
return approvalParameters;
|
||||
}
|
||||
|
||||
@Override
|
||||
public void setApprovalParameters(Map<String, String> approvalParameters) {
|
||||
this.approvalParameters = approvalParameters;
|
||||
}
|
||||
|
||||
@Override
|
||||
public String getClientId() {
|
||||
return clientId;
|
||||
}
|
||||
|
||||
@Override
|
||||
public void setClientId(String clientId) {
|
||||
this.clientId = clientId;
|
||||
}
|
||||
|
||||
@Override
|
||||
public Set<String> getScope() {
|
||||
return scope;
|
||||
}
|
||||
|
||||
@Override
|
||||
public void setScope(Set<String> scope) {
|
||||
this.scope = scope;
|
||||
}
|
||||
|
||||
@Override
|
||||
public Set<String> getResourceIds() {
|
||||
return resourceIds;
|
||||
}
|
||||
|
||||
@Override
|
||||
public void setResourceIds(Set<String> resourceIds) {
|
||||
this.resourceIds = resourceIds;
|
||||
}
|
||||
|
||||
@Override
|
||||
public Collection<? extends GrantedAuthority> getAuthorities() {
|
||||
return authorities;
|
||||
}
|
||||
|
||||
@Override
|
||||
public void setAuthorities(Collection<? extends GrantedAuthority> authorities) {
|
||||
this.authorities = authorities;
|
||||
}
|
||||
|
||||
@Override
|
||||
public boolean isApproved() {
|
||||
return approved;
|
||||
}
|
||||
|
||||
@Override
|
||||
public void setApproved(boolean approved) {
|
||||
this.approved = approved;
|
||||
}
|
||||
|
||||
@Override
|
||||
public boolean isDenied() {
|
||||
return !approved;
|
||||
}
|
||||
|
||||
@Override
|
||||
public void setDenied(boolean denied) {
|
||||
this.approved = !denied;
|
||||
}
|
||||
|
||||
@Override
|
||||
public String getState() {
|
||||
return state;
|
||||
}
|
||||
|
||||
@Override
|
||||
public void setState(String state) {
|
||||
this.state = state;
|
||||
}
|
||||
|
||||
@Override
|
||||
public String getRedirectUri() {
|
||||
return redirectUri;
|
||||
}
|
||||
|
||||
@Override
|
||||
public void setRedirectUri(String redirectUri) {
|
||||
this.redirectUri = redirectUri;
|
||||
}
|
||||
|
||||
@Override
|
||||
public Set<String> getResponseTypes() {
|
||||
return responseTypes;
|
||||
}
|
||||
|
||||
@Override
|
||||
public void setResponseTypes(Set<String> responseTypes) {
|
||||
this.responseTypes = responseTypes;
|
||||
}
|
||||
|
||||
/**
|
||||
* @return the approvedSite
|
||||
*/
|
||||
public ApprovedSite getApprovedSite() {
|
||||
return approvedSite;
|
||||
}
|
||||
|
||||
/**
|
||||
* @param approvedSite the approvedSite to set
|
||||
*/
|
||||
public void setApprovedSite(ApprovedSite approvedSite) {
|
||||
this.approvedSite = approvedSite;
|
||||
}
|
||||
|
||||
}
|
|
@ -27,7 +27,6 @@ import org.springframework.security.oauth2.common.util.OAuth2Utils;
|
|||
import org.springframework.security.oauth2.provider.AuthorizationRequest;
|
||||
import org.springframework.security.oauth2.provider.AuthorizationRequestManager;
|
||||
import org.springframework.security.oauth2.provider.ClientDetails;
|
||||
import org.springframework.security.oauth2.provider.DefaultAuthorizationRequest;
|
||||
import org.springframework.stereotype.Component;
|
||||
|
||||
import com.google.common.base.Strings;
|
||||
|
@ -72,13 +71,21 @@ public class ConnectAuthorizationRequestManager implements AuthorizationRequestM
|
|||
Map<String, String> parameters = processRequestObject(inputParams);
|
||||
|
||||
String clientId = parameters.get("client_id");
|
||||
if (clientId == null) {
|
||||
throw new InvalidClientException("A client id must be provided");
|
||||
ClientDetails client = null;
|
||||
|
||||
if (clientId != null) {
|
||||
client = clientDetailsService.loadClientByClientId(clientId);
|
||||
}
|
||||
ClientDetails client = clientDetailsService.loadClientByClientId(clientId);
|
||||
|
||||
String requestNonce = parameters.get("nonce");
|
||||
|
||||
AuthorizationRequest request = new AuthorizationRequest(inputParams, Collections.<String, String> emptyMap(),
|
||||
inputParams.get(AuthorizationRequest.CLIENT_ID),
|
||||
OAuth2Utils.parseParameterList(inputParams.get(AuthorizationRequest.SCOPE)), null,
|
||||
null, false, inputParams.get(AuthorizationRequest.STATE),
|
||||
inputParams.get(AuthorizationRequest.REDIRECT_URI),
|
||||
OAuth2Utils.parseParameterList(inputParams.get(AuthorizationRequest.RESPONSE_TYPE)));
|
||||
|
||||
//Only process if the user is authenticated. If the user is not authenticated yet, this
|
||||
//code will be called a second time once the user is redirected from the login page back
|
||||
//to the auth endpoint.
|
||||
|
@ -91,24 +98,21 @@ public class ConnectAuthorizationRequestManager implements AuthorizationRequestM
|
|||
nonceService.save(nonce);
|
||||
}
|
||||
else {
|
||||
throw new NonceReuseException(client.getClientId(), requestNonce);
|
||||
throw new NonceReuseException(client == null ? "unidentified client" : client.getClientId(), requestNonce);
|
||||
}
|
||||
|
||||
}
|
||||
|
||||
Set<String> scopes = OAuth2Utils.parseParameterList(parameters.get("scope"));
|
||||
if ((scopes == null || scopes.isEmpty())) {
|
||||
if ((scopes == null || scopes.isEmpty()) && client != null) {
|
||||
//TODO: do we want to allow default scoping at all?
|
||||
Set<String> clientScopes = client.getScope();
|
||||
scopes = clientScopes;
|
||||
}
|
||||
|
||||
ConnectAuthorizationRequest request = new ConnectAuthorizationRequest();
|
||||
request.setApprovalParameters(parameters);
|
||||
request.setClientId(clientId);
|
||||
request.setScope(scopes);
|
||||
|
||||
return request;
|
||||
|
||||
}
|
||||
|
||||
/**
|
||||
|
@ -234,20 +238,4 @@ public class ConnectAuthorizationRequestManager implements AuthorizationRequestM
|
|||
}
|
||||
}
|
||||
|
||||
@Override
|
||||
public AuthorizationRequest createFromExisting(AuthorizationRequest original) {
|
||||
ConnectAuthorizationRequest copy
|
||||
= new ConnectAuthorizationRequest(original.getAuthorizationParameters(), original.getApprovalParameters(),
|
||||
original.getClientId(), original.getScope(), original.getResourceIds(),
|
||||
original.getAuthorities(),original.isApproved(), original.getState(),
|
||||
original.getRedirectUri(), original.getResponseTypes());
|
||||
|
||||
//If original is a ConnectAuthorizationRequest, preserve extra properties
|
||||
if (original instanceof ConnectAuthorizationRequest) {
|
||||
copy.setApprovedSite(((ConnectAuthorizationRequest) original).getApprovedSite());
|
||||
}
|
||||
|
||||
return copy;
|
||||
}
|
||||
|
||||
}
|
||||
|
|
|
@ -64,17 +64,7 @@ public class TofuUserApprovalHandler implements UserApprovalHandler {
|
|||
private ClientDetailsService clientDetailsService;
|
||||
|
||||
|
||||
/**
|
||||
* Check if the user has already stored a positive approval decision for this site; or if the
|
||||
* site is whitelisted, approve it automatically.
|
||||
*
|
||||
* Otherwise, return false so that the user will see the approval page and can make their own decision.
|
||||
*
|
||||
* @param authorizationRequest the incoming authorization request
|
||||
* @param userAuthentication the Principal representing the currently-logged-in user
|
||||
*
|
||||
* @return true if the site is approved, false otherwise
|
||||
*/
|
||||
|
||||
@Override
|
||||
public boolean isApproved(AuthorizationRequest authorizationRequest, Authentication userAuthentication) {
|
||||
|
||||
|
@ -92,39 +82,29 @@ public class TofuUserApprovalHandler implements UserApprovalHandler {
|
|||
}
|
||||
|
||||
}
|
||||
|
||||
/**
|
||||
* Check whether the requested scope set is a proper subset of the allowed scopes.
|
||||
*
|
||||
* @param requestedScopes
|
||||
* @param allowedScopes
|
||||
* @return
|
||||
*/
|
||||
private boolean scopesMatch(Set<String> requestedScopes, Set<String> allowedScopes) {
|
||||
|
||||
for (String scope : requestedScopes) {
|
||||
|
||||
if (!allowedScopes.contains(scope)) {
|
||||
return false; //throw new InvalidScopeException("Invalid scope: " + scope, allowedScopes);
|
||||
}
|
||||
}
|
||||
|
||||
return true;
|
||||
}
|
||||
|
||||
/**
|
||||
* Pre-process the authorization request during the approval stage, check against whitelist, approved sites, and stuff.
|
||||
* Check if the user has already stored a positive approval decision for this site; or if the
|
||||
* site is whitelisted, approve it automatically.
|
||||
*
|
||||
* Otherwise the user will be directed to the approval page and can make their own decision.
|
||||
*
|
||||
* @param authorizationRequest the incoming authorization request
|
||||
* @param userAuthentication the Principal representing the currently-logged-in user
|
||||
*
|
||||
* @return the updated AuthorizationRequest
|
||||
*/
|
||||
@Override
|
||||
public AuthorizationRequest updateBeforeApproval(AuthorizationRequest authorizationRequest, Authentication userAuthentication) {
|
||||
public AuthorizationRequest checkForPreApproval(AuthorizationRequest authorizationRequest, Authentication userAuthentication) {
|
||||
|
||||
//First, check database to see if the user identified by the userAuthentication has stored an approval decision
|
||||
|
||||
//getName may not be filled in? TODO: investigate
|
||||
String userId = userAuthentication.getName();
|
||||
String clientId = authorizationRequest.getClientId();
|
||||
ClientDetails client = clientDetailsService.loadClientByClientId(clientId);
|
||||
|
||||
//lookup ApprovedSites by userId and clientId
|
||||
boolean alreadyApproved = false;
|
||||
Collection<ApprovedSite> aps = approvedSiteService.getByClientIdAndUserId(clientId, userId);
|
||||
for (ApprovedSite ap : aps) {
|
||||
|
||||
|
@ -137,28 +117,40 @@ public class TofuUserApprovalHandler implements UserApprovalHandler {
|
|||
ap.setAccessDate(new Date());
|
||||
approvedSiteService.save(ap);
|
||||
|
||||
authorizationRequest.setApproved(true);
|
||||
|
||||
return authorizationRequest;
|
||||
authorizationRequest.setApproved(true);
|
||||
alreadyApproved = true;
|
||||
}
|
||||
}
|
||||
}
|
||||
|
||||
WhitelistedSite ws = whitelistedSiteService.getByClientId(clientId);
|
||||
if (ws != null && scopesMatch(authorizationRequest.getScope(), ws.getAllowedScopes())) {
|
||||
|
||||
//Create an approved site
|
||||
approvedSiteService.createApprovedSite(clientId, userId, null, ws.getAllowedScopes(), ws);
|
||||
|
||||
authorizationRequest.setApproved(true);
|
||||
|
||||
return authorizationRequest;
|
||||
if (!alreadyApproved) {
|
||||
WhitelistedSite ws = whitelistedSiteService.getByClientId(clientId);
|
||||
if (ws != null && scopesMatch(authorizationRequest.getScope(), ws.getAllowedScopes())) {
|
||||
|
||||
//Create an approved site
|
||||
approvedSiteService.createApprovedSite(clientId, userId, null, ws.getAllowedScopes(), ws);
|
||||
authorizationRequest.setApproved(true);
|
||||
}
|
||||
}
|
||||
|
||||
return authorizationRequest;
|
||||
|
||||
}
|
||||
|
||||
|
||||
@Override
|
||||
public AuthorizationRequest updateAfterApproval(AuthorizationRequest authorizationRequest, Authentication userAuthentication) {
|
||||
|
||||
String userId = userAuthentication.getName();
|
||||
String clientId = authorizationRequest.getClientId();
|
||||
ClientDetails client = clientDetailsService.loadClientByClientId(clientId);
|
||||
|
||||
// This must be re-parsed here because SECOAUTH forces us to call things in a strange order
|
||||
boolean approved = Boolean.parseBoolean(authorizationRequest.getApprovalParameters().get("user_oauth_approval"));
|
||||
|
||||
if (approved && !authorizationRequest.getApprovalParameters().isEmpty()) {
|
||||
if (approved) {
|
||||
|
||||
authorizationRequest.setApproved(true);
|
||||
|
||||
// process scopes from user input
|
||||
Set<String> allowedScopes = Sets.newHashSet();
|
||||
|
@ -200,12 +192,28 @@ public class TofuUserApprovalHandler implements UserApprovalHandler {
|
|||
approvedSiteService.createApprovedSite(clientId, userId, timeout, allowedScopes, null);
|
||||
}
|
||||
|
||||
// TODO: should we set approved here? It gets called later via the isApproved method in this class...
|
||||
|
||||
return authorizationRequest;
|
||||
}
|
||||
|
||||
return authorizationRequest;
|
||||
}
|
||||
|
||||
/**
|
||||
* Check whether the requested scope set is a proper subset of the allowed scopes.
|
||||
*
|
||||
* @param requestedScopes
|
||||
* @param allowedScopes
|
||||
* @return
|
||||
*/
|
||||
private boolean scopesMatch(Set<String> requestedScopes, Set<String> allowedScopes) {
|
||||
|
||||
for (String scope : requestedScopes) {
|
||||
|
||||
if (!allowedScopes.contains(scope)) {
|
||||
return false; //throw new InvalidScopeException("Invalid scope: " + scope, allowedScopes);
|
||||
}
|
||||
}
|
||||
|
||||
return true;
|
||||
}
|
||||
|
||||
}
|
||||
|
|
|
@ -13,7 +13,7 @@
|
|||
http://www.springframework.org/schema/util http://www.springframework.org/schema/util/spring-util-3.1.xsd">
|
||||
|
||||
<bean id="configBean" class="org.mitre.openid.connect.config.ConfigurationPropertiesBean">
|
||||
<property name="issuer" value="http://localhost/" />
|
||||
<property name="issuer" value="http://localhost:8080/openid-connect-server/" />
|
||||
<property name="logoImageUrl" value="resources/images/openid_connect_small.png" />
|
||||
<property name="topbarTitle" value="OpenID Connect Server" />
|
||||
</bean>
|
||||
|
|
|
@ -1 +1 @@
|
|||
Subproject commit a063a7e0f2e622d93f5facf474e9c1d0c8e37603
|
||||
Subproject commit 2c0d469e50982baf15f1202561f00d54baa36c4e
|
Loading…
Reference in New Issue