Commit Graph

55 Commits (59078cc68d450f6c4517f1a6db2241b5c82dfbe5)

Author SHA1 Message Date
Justin Richer 59078cc68d eclipse updates from maven
13 years ago
Amanda Anganes 6899a16c2f Merge branch 'Really_fixing_redirects'
13 years ago
Amanda Anganes 5d78bc4e0a Infinite redirect issue fully fixed, with our custom urls for the authorization and token endpoints. See issue #8.
13 years ago
Amanda Anganes 67edc1c191 Seems to be fixed! Added the "security:" prefix to the first http block in application-context. The compiler should have been catching that there was no matching for http w/o it, but it was just letting it through.
13 years ago
Justin Richer 05b2cf8fff removed vestigial user details code
13 years ago
Amanda Anganes f0f339d45f current state
13 years ago
nemonik 6eb8284695 version needed to be modified to 0.1-SNAPSHOT in order to deploy snapshot to nexus
13 years ago
Amanda Anganes 69dc1fe361 Removing our custom authorization endpoint and token endpoint urls, as well as the filter required by those custom urls (in web.xml), fixes the infinite redirect problem. This has been submitted as an issue to the SECOAUTH team.
13 years ago
Amanda Anganes 2fc4ce177c This commit fixes the infinite redirect, somewhat. See updated issue #8.
13 years ago
Amanda Anganes 17f6e2a2fb Removed tables.sql.
13 years ago
Amanda Anganes 486b7723d3 Merge branch 'master' of github.com:jricher/OpenID-Connect-Java-Spring-Server
13 years ago
Amanda Anganes 269a354f8c Added tables.sql, which is just a concatenation of all the other sql files. Added redirect_uris.sql, which is a NEW table needed to support clients registering multiple redirect uris.
13 years ago
nemonik d056079fea Support for ECDSA JWT signer was removed as it would require the system-wide installation and configuration of the Bouncy Castle Security Provider in order for the server to work when deployed to Tomcat. See issue ticket #20
13 years ago
Amanda Anganes 14f6eca026 Merge branch 'fixing_redirects'
13 years ago
Amanda Anganes 5b09c93024 Cleaned up the context files a bit, no big changes yet.
13 years ago
Justin Richer eabc49cb01 fixed documentation, included python source to generate signature
13 years ago
Justin Richer c21607dcbe fixed hmac unit test after signature base string was fixed in underlying code
13 years ago
nemonik 6c8661f3ad the signature base created in the verify method of the AbstractJwtSigner did not match how the Jwt.getSignatureBase creates the signature base. also, modified the testGenerateHmacSignature to exercise
13 years ago
nemonik 267f1b2de3 bas64 decoded signature prior to verifying, modified unit rsa unit test, and fixed ecdsa signer verify
13 years ago
Justin Richer 985a4619fa abstracted keystore loader to new function
13 years ago
Justin Richer 3dfe6df410 refactored algorithms out to their own separate Enum
13 years ago
Justin Richer fec6a3a876 removed definition parsers, may be picked up again later
13 years ago
Amanda Anganes b986b30695 Fixed unit tests - they were broken due to an error in application-context.xml; not because of the refactor. App context was trying to instantiate an Hmac signer with name "HMACSHA256", which should have been "HS256". I updated the exceptions thrown by the signer impls so that if an Algorithm name mismatch occurs it will tell you what it is trying to match against.
13 years ago
nemonik 0a29eba617 unit test correction, slight refactor of tested classes
13 years ago
nemonik 1209e9a83f fix to JwtTest unit test
13 years ago
nemonik f215cfc50c fix for issue 5, code refactoring across signers
13 years ago
nemonik 4f407a3a11 added rsa1024 key to keystore
13 years ago
Stephen Moore 1a1ae4c5b5 Removed Replacer plugin
13 years ago
Amanda Anganes c50f968748 Merged to use idToken.setNonce().
13 years ago
Amanda Anganes 268b82e31d Merge branch 'Branch_master3-23-2012'
13 years ago
Amanda Anganes 8b10b83516 Added setNonce to JwtClaims.
13 years ago
Justin Richer 34f24deb3e Merge branch 'mitreaccounts'
13 years ago
Justin Richer 4a15e51e12 pass through nonce
13 years ago
Justin Richer 6c3552ebfa changed mitre account names
13 years ago
U-MITRE\mjwalsh b4836a0302 mods to auth filter including config comments, http socket time out...
13 years ago
Amanda Anganes 27fe3c9eca Implemented signing. Works, but validation does not fail if you remove the signature.
13 years ago
Amanda Anganes 68c8d1a9d2 Changed parameter for check id endpoint to access_token instead of auth_token
13 years ago
Justin Richer 826be5a1a1 changed parameter name to match spec change
13 years ago
Justin Richer 5fe036878a fixed view for idtoken in checkid endpoint
13 years ago
Justin Richer c51bb72fe5 merged keystore changes
13 years ago
Justin Richer 6c01134095 JWK display support for key maps, still no key ids
13 years ago
Amanda Anganes 776748f908 Merge branch '3-22-2012'
13 years ago
Amanda Anganes ae9b5e792a Added a ConfigurationPropertiesBean.java to hold configuration properties. Fixed up CheckIDEndpoint.java a bit - it works, but is outputting the wrong thing.
13 years ago
Justin Richer d5e7000365 disabled custom namespace parsers for keystores
13 years ago
Justin Richer 524a8e153e signers turned into a map
13 years ago
Justin Richer 664dd1df46 JWT claims can now have nulls in them without barfing
13 years ago
Justin Richer c59d3fe963 it spits out JWTs! and id tokens! JWT still needs to handle nulls
13 years ago
Amanda Anganes ebe72412fe Authorization Grant flow works up to serializing the returned Access Token. Justin is investigating serialization problems.
13 years ago
Amanda Anganes d94eb338ee Auth code flow works through user approval page. Current problem is that it doesn't seem to be matching up auth codes correctly (I keep getting "invalid code" error). But, it looks like it's going through our custom token granter so that is good.
13 years ago
Justin Richer 8263ce0dd5 added external class to persistence context
13 years ago