Commit Graph

1438 Commits (11f3cccab95f84009f6cdbd203c54243b9a94954)

Author SHA1 Message Date
Justin Richer 11f3cccab9 fix JWKS parsing in software statements, closes #1220 2017-04-14 14:42:49 -04:00
Justin Richer 702a775881 handle creation time stamp in clients, closes #1210 2017-04-13 11:50:57 -04:00
Justin Richer 45ea899de8 made user codes case insensitive 2017-04-12 16:00:23 -04:00
Justin Richer d317cf5024 added exception handling to device code creation step 2017-04-12 15:59:17 -04:00
Justin Richer cc0622edd0 internalized random string generation for device codes 2017-04-12 14:59:18 -04:00
Mark Janssen 903168a949 Decrease log level of trailing slash warning
Having an issuer without trailing slash configured is just fine, so
there is no reason to log a warning for this every time the discovery
endpoint is called.
2017-04-07 14:59:58 -04:00
Justin Richer 835a326627 allow polling of device codes, fixed UI for device code input 2017-03-27 14:39:40 -05:00
Justin Richer 32ce21b5cd automated code formatting and cleanup 2017-03-21 14:07:20 -04:00
Justin Richer dd0f69ba6d [maven-release-plugin] prepare for next development iteration 2017-03-20 11:58:58 -04:00
Justin Richer 80358566a5 [maven-release-plugin] prepare release mitreid-connect-1.3.0-RC2 2017-03-20 11:58:52 -04:00
Justin Richer 2a75535dce fix unit tests and downstream calls 2017-03-16 18:00:05 -04:00
Justin Richer a926a8f0ab cleaned up server-side stats service, UI now uses per-client calls 2017-03-16 17:31:26 -04:00
Justin Richer 256b79ae51 lazy load client stats in UI 2017-03-16 17:20:04 -04:00
Justin Richer 02928b048f added software ID and version to data API 2017-03-15 17:38:46 -04:00
Justin Richer 8406a89fd1 added device flow expiration 2017-03-14 17:40:30 -04:00
Justin Richer f54d44cd9d added device code to discovery, moved device endpoints 2017-03-14 17:40:30 -04:00
Justin Richer f915196c2e fix approval display 2017-03-14 17:40:29 -04:00
Justin Richer cbf5bf742b added messages for display pages, better error handling in user-facing pages 2017-03-14 17:40:29 -04:00
Justin Richer 153776ecb5 Don’t catch OAuth2 errors, let the framework handle them here 2017-03-14 17:40:28 -04:00
Justin Richer 44b24af466 database storage for device flow 2017-03-14 17:40:28 -04:00
Justin Richer 548dad4e29 added expiration to device codes 2017-03-14 17:40:27 -04:00
Justin Richer 9cb5377ce8 added device code validity seconds to client model 2017-03-14 17:40:27 -04:00
Justin Richer a5b4115169 functioning device code flow 2017-03-14 17:40:26 -04:00
Justin Richer 3326eee934 shell for device flow 2017-03-14 17:40:26 -04:00
Justin Richer c42fe57367 changed task operations to print out name of operation on run 2017-03-14 17:40:26 -04:00
Justin Richer 72fd3c2b99 added ID Token Validity Seconds to data import/export API 2017-03-11 15:36:45 -05:00
Justin Richer 3e5e7a0f0b [maven-release-plugin] prepare for next development iteration 2017-03-03 18:03:26 -05:00
Justin Richer 0d84db49af [maven-release-plugin] prepare release mitreid-connect-1.3.0-RC1 2017-03-03 18:03:20 -05:00
Justin Richer 98a4d56cdd made extraction function less side-effect-ful 2017-03-03 17:20:15 -05:00
Leonard Brünings 00ecd3dd22 Fix NPE if no claims are requested for the userinfo object
This happens if clients only requests id_token claims, or just send an empty claims parameter.

Change-Id: I8bd176ad271bda8a1e2f26b6221bd8e2d0a3ebfb
2017-03-03 16:09:51 -05:00
Justin Richer 141f4da7f1 added PKCE editing capabilities to UI 2017-02-20 15:40:16 -05:00
Justin Richer c79b6da9d9 Javascript files for UI functionality loaded from configuration bean 2017-02-17 17:34:03 -05:00
Justin Richer b176d4d77e cleaned up old endpoints 2017-02-16 18:24:21 -05:00
Justin Richer 8178af87f0 further modularized data import/export service 2017-02-16 18:24:05 -05:00
Justin Richer 52d2298f99 begin modularization of data import/export API 2017-02-15 11:51:32 -05:00
Justin Richer db50a88fe5 Happy New Year 2017 2017-01-17 17:09:14 -05:00
Justin Richer b17a7f43ae removed structured scopes 2017-01-17 17:06:04 -05:00
strangeweaver 46046b574a Implemented paged operations and used for database cleanup tasks. 2017-01-17 15:36:57 -05:00
strangeweaver 099211593c Fix high load performance issue in token expiration task 2017-01-17 15:36:57 -05:00
Justin Richer 0e703ef9f9 update a few dependency versions, closes #1145 2016-12-21 15:50:24 -05:00
Justin Richer 91da3935f5 Made ID tokens ephemeral, made access token’s “additional information” extensible 2016-12-21 13:01:15 -05:00
Mikko Tommila 4f4c8de1c8 Fix JPA issues to allow using Hibernate 2016-12-09 15:15:50 -05:00
Justin Richer 22fa3605ef Patched unit tests, still needs updates for checking approved site to token mapping on data import/export 2016-12-09 12:56:06 -05:00
Justin Richer 55b1b00b73 Updated relationship between approved sites and access tokens, closes #874 2016-12-09 12:55:42 -05:00
Justin Richer d875d52be7 updated data import/export services for 1.3 2016-12-08 17:01:55 -05:00
HeXetic 7725fcfa2b createAuthorizationCode should be @Transactional
An Authentication should not exist without its matching AuthorizationCode, but typically an AuthorizationCode will have a foreign key on an Authentication, meaning it can't be saved first. This block should be wrapped in a transaction so that other DB clients (say, for example, clearExpiredAuthorizationCodes) don't see an inconsistent snapshot and then misbehave.
2016-12-02 16:29:48 -05:00
Julian Schlichtholz c3d0c18af5 make HttpClient configurable, closes #1071 2016-12-02 16:23:55 -05:00
Sofia Ang bb6bb81dbc Add new tests which asserts that `user_id` should not be present in the introspection response if there's no user authentication available 2016-12-02 16:08:32 -05:00
Sofia Ang 52da5e769a Fix test by returning a new OAuth2Authentication instead of mocking it 2016-12-02 16:08:32 -05:00
Sofia Ang b2fab9642e Fix such that `user_id` is only added if user authentication is available
OAuth2Authentication#getPrincipal() used by OAuth2Authentication#getName() defaults to the client id if user authentication is not available.
Prior to this fix, an introspection of a client-only access token would result to the user_id also being the client_id. This causes problems when this
introspection result is converted into an OAuth2Authentication by a resource server's IntrospectingTokenService -- the user_id is populated with
the client_id and so OAuth2Authentication's userAuthentication is populated falsely.
2016-12-02 16:08:32 -05:00