Commit Graph

332 Commits (ce847dd4f72d9c87198a6319f7de2d2eed5b4356)
 

Author SHA1 Message Date
Amanda Anganes a9088b4999 Merge branch 'Single_Spring_Context_file'
13 years ago
Amanda Anganes 07a305b8b7 Refactored code to use a single spring context file. This uses the default oauth/authorize and oauth/token URLs, but it seems to be free of the infinite redirect issue. Next up: try putting in our custom URLs.
13 years ago
Michael Jett 8ab1fc1b60 Bootstrap 2 html tests
13 years ago
Michael Jett 9c86a23ee1 Bootstrap 2
13 years ago
Michael Jett ed304fa391 Edit client mock-up.
13 years ago
Michael Jett c4edd7111e Breadcrumb tag renders "crumb" attribute
13 years ago
Michael Jett dc42eb7789 Client management page now renders test JSON
13 years ago
Justin Richer 59078cc68d eclipse updates from maven
13 years ago
Justin Richer 614c4aa745 added archetecture writeup skeleton, needs a lot more work
13 years ago
Amanda Anganes 6899a16c2f Merge branch 'Really_fixing_redirects'
13 years ago
Amanda Anganes 5d78bc4e0a Infinite redirect issue fully fixed, with our custom urls for the authorization and token endpoints. See issue #8.
13 years ago
Amanda Anganes 67edc1c191 Seems to be fixed! Added the "security:" prefix to the first http block in application-context. The compiler should have been catching that there was no matching for http w/o it, but it was just letting it through.
13 years ago
Justin Richer 05b2cf8fff removed vestigial user details code
13 years ago
Amanda Anganes f0f339d45f current state
13 years ago
nemonik 31098b32ba fixed secoath reference
13 years ago
nemonik 6eb8284695 version needed to be modified to 0.1-SNAPSHOT in order to deploy snapshot to nexus
13 years ago
Amanda Anganes 69dc1fe361 Removing our custom authorization endpoint and token endpoint urls, as well as the filter required by those custom urls (in web.xml), fixes the infinite redirect problem. This has been submitted as an issue to the SECOAUTH team.
13 years ago
Amanda Anganes 2fc4ce177c This commit fixes the infinite redirect, somewhat. See updated issue #8.
13 years ago
Amanda Anganes 17f6e2a2fb Removed tables.sql.
13 years ago
Amanda Anganes 486b7723d3 Merge branch 'master' of github.com:jricher/OpenID-Connect-Java-Spring-Server
13 years ago
Amanda Anganes 269a354f8c Added tables.sql, which is just a concatenation of all the other sql files. Added redirect_uris.sql, which is a NEW table needed to support clients registering multiple redirect uris.
13 years ago
nemonik d056079fea Support for ECDSA JWT signer was removed as it would require the system-wide installation and configuration of the Bouncy Castle Security Provider in order for the server to work when deployed to Tomcat. See issue ticket #20
13 years ago
Amanda Anganes 14f6eca026 Merge branch 'fixing_redirects'
13 years ago
Amanda Anganes 5b09c93024 Cleaned up the context files a bit, no big changes yet.
13 years ago
Justin Richer eabc49cb01 fixed documentation, included python source to generate signature
13 years ago
Justin Richer c21607dcbe fixed hmac unit test after signature base string was fixed in underlying code
13 years ago
Justin Richer 91c7c6153d added submodule config
13 years ago
Justin Richer 287e39052e added travis config file
13 years ago
nemonik 6c8661f3ad the signature base created in the verify method of the AbstractJwtSigner did not match how the Jwt.getSignatureBase creates the signature base. also, modified the testGenerateHmacSignature to exercise
13 years ago
nemonik 267f1b2de3 bas64 decoded signature prior to verifying, modified unit rsa unit test, and fixed ecdsa signer verify
13 years ago
Justin Richer 985a4619fa abstracted keystore loader to new function
13 years ago
Justin Richer 3dfe6df410 refactored algorithms out to their own separate Enum
13 years ago
Justin Richer fec6a3a876 removed definition parsers, may be picked up again later
13 years ago
Amanda Anganes b986b30695 Fixed unit tests - they were broken due to an error in application-context.xml; not because of the refactor. App context was trying to instantiate an Hmac signer with name "HMACSHA256", which should have been "HS256". I updated the exceptions thrown by the signer impls so that if an Algorithm name mismatch occurs it will tell you what it is trying to match against.
13 years ago
nemonik 0a29eba617 unit test correction, slight refactor of tested classes
13 years ago
nemonik 1209e9a83f fix to JwtTest unit test
13 years ago
nemonik f215cfc50c fix for issue 5, code refactoring across signers
13 years ago
nemonik 4f407a3a11 added rsa1024 key to keystore
13 years ago
U-MITRE\mjwalsh c84c751991 client refactoring, and javadocing
13 years ago
U-MITRE\mjwalsh b8c953281e integration changes to client
13 years ago
Stephen Moore 1a1ae4c5b5 Removed Replacer plugin
13 years ago
Amanda Anganes c50f968748 Merged to use idToken.setNonce().
13 years ago
Amanda Anganes 268b82e31d Merge branch 'Branch_master3-23-2012'
13 years ago
Amanda Anganes 8b10b83516 Added setNonce to JwtClaims.
13 years ago
Justin Richer 34f24deb3e Merge branch 'mitreaccounts'
13 years ago
Justin Richer 4a15e51e12 pass through nonce
13 years ago
Justin Richer 6c3552ebfa changed mitre account names
13 years ago
U-MITRE\mjwalsh 02d0471acf scope wasn't quite right, needed a space
13 years ago
U-MITRE\mjwalsh b4836a0302 mods to auth filter including config comments, http socket time out...
13 years ago
Amanda Anganes 27fe3c9eca Implemented signing. Works, but validation does not fail if you remove the signature.
13 years ago