Amanda Anganes
67edc1c191
Seems to be fixed! Added the "security:" prefix to the first http block in application-context. The compiler should have been catching that there was no matching for http w/o it, but it was just letting it through.
2012-04-16 12:23:23 -04:00
Amanda Anganes
f0f339d45f
current state
2012-04-16 11:05:36 -04:00
Amanda Anganes
69dc1fe361
Removing our custom authorization endpoint and token endpoint urls, as well as the filter required by those custom urls (in web.xml), fixes the infinite redirect problem. This has been submitted as an issue to the SECOAUTH team.
2012-04-11 17:08:15 -04:00
Amanda Anganes
2fc4ce177c
This commit fixes the infinite redirect, somewhat. See updated issue #8 .
2012-04-11 15:55:19 -04:00
Amanda Anganes
17f6e2a2fb
Removed tables.sql.
2012-04-10 14:05:39 -04:00
Amanda Anganes
486b7723d3
Merge branch 'master' of github.com:jricher/OpenID-Connect-Java-Spring-Server
2012-04-10 13:45:26 -04:00
Amanda Anganes
269a354f8c
Added tables.sql, which is just a concatenation of all the other sql files. Added redirect_uris.sql, which is a NEW table needed to support clients registering multiple redirect uris.
...
This updates us to the HEAD revision of SECOAUTH, where the redirect uri field on ClientDetails has been updated to be a Set<String> instead of a single string. I updated the UI code so that it will still work, but it will need to be updated to allow users to register multiple uris.
This also closes issue #2 from the issue tracker.
2012-04-10 13:44:10 -04:00
nemonik
d056079fea
Support for ECDSA JWT signer was removed as it would require the system-wide installation and configuration of the Bouncy Castle Security Provider in order for the server to work when deployed to Tomcat. See issue ticket #20
2012-04-10 13:41:18 -04:00
Amanda Anganes
14f6eca026
Merge branch 'fixing_redirects'
2012-04-09 10:53:39 -04:00
Amanda Anganes
5b09c93024
Cleaned up the context files a bit, no big changes yet.
2012-04-09 10:53:02 -04:00
Justin Richer
eabc49cb01
fixed documentation, included python source to generate signature
2012-04-09 10:52:17 -04:00
Justin Richer
c21607dcbe
fixed hmac unit test after signature base string was fixed in underlying code
2012-04-09 10:48:02 -04:00
Justin Richer
91c7c6153d
added submodule config
2012-04-03 14:29:58 -04:00
Justin Richer
287e39052e
added travis config file
2012-04-03 14:24:56 -04:00
nemonik
6c8661f3ad
the signature base created in the verify method of the AbstractJwtSigner did not match how the Jwt.getSignatureBase creates the signature base. also, modified the testGenerateHmacSignature to exercise
2012-04-02 22:12:03 -04:00
nemonik
267f1b2de3
bas64 decoded signature prior to verifying, modified unit rsa unit test, and fixed ecdsa signer verify
2012-04-02 21:32:42 -04:00
Justin Richer
985a4619fa
abstracted keystore loader to new function
2012-04-02 15:06:58 -04:00
Justin Richer
3dfe6df410
refactored algorithms out to their own separate Enum
2012-04-02 13:13:13 -04:00
Justin Richer
fec6a3a876
removed definition parsers, may be picked up again later
2012-04-02 12:40:53 -04:00
Amanda Anganes
b986b30695
Fixed unit tests - they were broken due to an error in application-context.xml; not because of the refactor. App context was trying to instantiate an Hmac signer with name "HMACSHA256", which should have been "HS256". I updated the exceptions thrown by the signer impls so that if an Algorithm name mismatch occurs it will tell you what it is trying to match against.
2012-03-30 13:45:04 -04:00
nemonik
0a29eba617
unit test correction, slight refactor of tested classes
2012-03-29 14:02:51 -04:00
nemonik
1209e9a83f
fix to JwtTest unit test
2012-03-29 12:54:03 -04:00
nemonik
f215cfc50c
fix for issue 5, code refactoring across signers
2012-03-29 12:34:51 -04:00
nemonik
4f407a3a11
added rsa1024 key to keystore
2012-03-28 18:02:03 -04:00
U-MITRE\mjwalsh
c84c751991
client refactoring, and javadocing
2012-03-26 14:18:54 -04:00
U-MITRE\mjwalsh
b8c953281e
integration changes to client
2012-03-23 17:01:43 -04:00
Stephen Moore
1a1ae4c5b5
Removed Replacer plugin
2012-03-23 15:55:30 -04:00
Amanda Anganes
c50f968748
Merged to use idToken.setNonce().
2012-03-23 11:11:38 -04:00
Amanda Anganes
268b82e31d
Merge branch 'Branch_master3-23-2012'
2012-03-23 11:09:27 -04:00
Amanda Anganes
8b10b83516
Added setNonce to JwtClaims.
2012-03-23 11:08:49 -04:00
Justin Richer
34f24deb3e
Merge branch 'mitreaccounts'
2012-03-23 10:52:36 -04:00
Justin Richer
4a15e51e12
pass through nonce
2012-03-23 10:52:04 -04:00
Justin Richer
6c3552ebfa
changed mitre account names
2012-03-23 10:37:58 -04:00
U-MITRE\mjwalsh
02d0471acf
scope wasn't quite right, needed a space
2012-03-22 17:55:59 -04:00
U-MITRE\mjwalsh
b4836a0302
mods to auth filter including config comments, http socket time out...
2012-03-22 17:49:30 -04:00
Amanda Anganes
27fe3c9eca
Implemented signing. Works, but validation does not fail if you remove the signature.
2012-03-22 14:49:02 -04:00
Amanda Anganes
68c8d1a9d2
Changed parameter for check id endpoint to access_token instead of auth_token
2012-03-22 14:19:45 -04:00
Justin Richer
826be5a1a1
changed parameter name to match spec change
2012-03-22 14:10:50 -04:00
Justin Richer
5fe036878a
fixed view for idtoken in checkid endpoint
2012-03-22 14:09:25 -04:00
Justin Richer
c51bb72fe5
merged keystore changes
2012-03-22 13:50:47 -04:00
Justin Richer
6c01134095
JWK display support for key maps, still no key ids
2012-03-22 13:48:16 -04:00
Amanda Anganes
776748f908
Merge branch '3-22-2012'
2012-03-22 13:43:59 -04:00
Amanda Anganes
ae9b5e792a
Added a ConfigurationPropertiesBean.java to hold configuration properties. Fixed up CheckIDEndpoint.java a bit - it works, but is outputting the wrong thing.
2012-03-22 13:43:30 -04:00
Justin Richer
d5e7000365
disabled custom namespace parsers for keystores
2012-03-22 13:39:51 -04:00
Justin Richer
524a8e153e
signers turned into a map
2012-03-22 13:37:21 -04:00
nemonik
3f2631367f
added comments on configuration of client
2012-03-22 12:16:24 -04:00
Justin Richer
664dd1df46
JWT claims can now have nulls in them without barfing
2012-03-22 11:46:48 -04:00
Justin Richer
c59d3fe963
it spits out JWTs! and id tokens! JWT still needs to handle nulls
2012-03-21 17:59:48 -04:00
Amanda Anganes
ebe72412fe
Authorization Grant flow works up to serializing the returned Access Token. Justin is investigating serialization problems.
2012-03-21 16:44:16 -04:00
Amanda Anganes
d94eb338ee
Auth code flow works through user approval page. Current problem is that it doesn't seem to be matching up auth codes correctly (I keep getting "invalid code" error). But, it looks like it's going through our custom token granter so that is good.
2012-03-20 15:07:18 -04:00