Commit Graph

932 Commits (e3392dd75932c77fa2f884e2d7d8b8bfb8646bfc)

Author SHA1 Message Date
Justin Richer b86abdd761 merge from pull request, plus cleanup 2012-06-15 15:36:14 -04:00
Justin Richer 731ad2e2e2 updated SECOAUTH reference, fixed some SQL files, temporarily closed token timeout issue 2012-06-15 12:05:08 -04:00
Justin Richer ace5dd1f1e imported userinfouserdetails filter from MITRE codebase 2012-06-13 16:33:55 -04:00
Mike Derryberry 65dc3daaf8 smart client 2012-06-12 16:09:01 -04:00
Amanda Anganes bbf9591c92 Merge branch 'master' into issue52
Conflicts:
	openid-connect-server/src/main/java/org/mitre/oauth2/service/impl/DefaultOAuth2ProviderTokenService.java
	openid-connect-server/src/main/webapp/WEB-INF/spring-servlet.xml
	openid-connect-server/src/main/webapp/WEB-INF/views/oauth/approve.jsp
2012-06-11 15:04:01 -04:00
Justin Richer 7a207dc162 Merge branch 'discoveryupdate' 2012-06-05 16:37:04 -04:00
Justin Richer 7df2663e00 added final slashification of configuration URLs 2012-06-05 16:36:11 -04:00
Justin Richer fbdccdb78e added Xrd support (fixes #63), updated configuration locations (fixes #47) 2012-06-05 16:32:49 -04:00
Justin Richer e44697cef9 updated JWK display to latest, closes #58 2012-06-05 16:07:19 -04:00
Justin Richer 5c72d8b95f revocation endpoint cleanup, still needs views 2012-06-05 11:24:11 -04:00
Justin Richer 27219c066d refactored our service to reflect upstream 2012-06-05 10:18:26 -04:00
Justin Richer e95528a08d added implementation to stub to read an access token by value 2012-06-05 10:11:24 -04:00
Amanda Anganes 424f8bb737 Refactored to use TokenEnhancer rather than a custom TokenGranter. 2012-05-30 16:14:00 -04:00
nemonik 8917e75010 see issue #19 2012-05-30 15:14:15 -04:00
Amanda Anganes 16aa0c59b5 Added token enhancer. Now to plug it in. 2012-05-30 12:31:12 -04:00
Amanda Anganes 2070d2e413 Updated to use AuthorizationRequestFactory rather than ClientCredentialsChecker. 2012-05-30 12:08:08 -04:00
Justin Richer ce847dd4f7 updated poco user view to contain name 2012-05-24 15:57:34 -04:00
Stephen Moore c418ccabb1 Merge branch 'master' into userInfoEndpoint 2012-05-24 13:06:29 -04:00
Stephen Moore 1bff5ef19f Added POCO view, Added UnknownUserInfoScheamException runtime exception 2012-05-24 11:00:49 -04:00
Stephen Moore 5c544dfe7c Merge branch 'master' into userInfoEndpoint 2012-05-23 13:43:32 -04:00
Justin Richer 7d4d65c359 Merge branch 'userinfo_integration' 2012-05-23 13:39:03 -04:00
Justin Richer a8e9f1d2cd fixed rendering issues with user info view 2012-05-23 13:36:53 -04:00
Stephen Moore 9612fde10e Check for null address, and added email 2012-05-23 13:35:05 -04:00
Justin Richer 08958d4137 Merge remote-tracking branch 'remotes/steve/userInfoEndpoint' into userinfo_integration 2012-05-23 13:11:40 -04:00
Justin Richer 06fadb5f2b oauth provider configuration started 2012-05-23 12:55:21 -04:00
Stephen Moore 9b03831d4e Filled in the UserInfoEndpoint, and added the JSON view for userInfo (openIdSchema) 2012-05-22 16:56:22 -04:00
Michael Jett e5312b4c99 Client secret now editable and dynamically generated if not present 2012-05-22 14:36:40 -04:00
Michael Jett 51fe98b383 ClientAPI now sets owner for clients 2012-05-18 14:23:19 -04:00
Michael Jett 2d980a4d8f Refactoring of routing. Client updates 2012-05-17 16:33:22 -04:00
Michael Jett b06640c921 First stages of client-side validation worked into application 2012-05-16 17:22:25 -04:00
Michael Jett 3402a3e463 ClientAPI now fully supports RESTful DELETE 2012-05-16 14:32:40 -04:00
Michael Jett 7f5b9e2c82 ClientAPI now supports DELETE method 2012-05-16 14:03:49 -04:00
Michael Jett af6e043239 Client Entity now initialized with non-null values so JPA won't flip. Added unified method for saving. Sync'd class member names to allow proper binding. 2012-05-16 13:27:53 -04:00
Michael Jett 0c7ea88323 Client updates. 2012-05-15 17:03:17 -04:00
Michael Jett 0f9b828066 ClientAPI admin requirement now global 2012-05-15 14:10:12 -04:00
Michael Jett 32e67730d8 ClientAPI maps to individual clients by IDs 2012-05-15 13:41:27 -04:00
Michael Jett 6b481cd3bb ClientAPI header updates 2012-05-15 13:09:16 -04:00
Michael Jett a4fc4e939e ClientAPI cleanup 2012-05-15 12:41:41 -04:00
Stephen Moore fd91c884bb Made interfaces... deleted a thing. 2012-05-10 17:45:10 -04:00
Amanda Anganes e33f277bbe Updated classes to track newest version of SECOAUTH. This update closes issues #3, #4, #8, and #36 (infinite redirects). This revision changes the authorization and token endpoints to be /openidconnect/auth and /openidconnect/token, respectively. 2012-05-09 15:16:56 -04:00
Michael Jett c8e3f70115 Now requiring homepage login 2012-05-08 14:09:24 -04:00
Michael Jett 7dd81ac2de Server-side dynamics 2012-05-08 13:53:21 -04:00
Michael Jett 23fd7b1b21 Renaming Client View class 2012-05-08 11:20:40 -04:00
Michael Jett eda7505b7b Client API now renders JSON for all Clients 2012-05-08 11:16:45 -04:00
Justin Richer 97dffb6414 added copyright to all java files. closes #11 2012-04-27 17:55:58 -04:00
Justin Richer 6724866099 moved jwt components, utilities, and various interfaces to -common from -server 2012-04-27 15:20:49 -04:00
Justin Richer 59ecb03548 added getter/setter for userinforepository, closes #40 2012-04-27 15:11:25 -04:00
Amanda Anganes 6899a16c2f Merge branch 'Really_fixing_redirects' 2012-04-16 12:39:06 -04:00
Justin Richer 05b2cf8fff removed vestigial user details code 2012-04-16 12:02:24 -04:00
Amanda Anganes f0f339d45f current state 2012-04-16 11:05:36 -04:00
Amanda Anganes 2fc4ce177c This commit fixes the infinite redirect, somewhat. See updated issue #8. 2012-04-11 15:55:19 -04:00
Amanda Anganes 486b7723d3 Merge branch 'master' of github.com:jricher/OpenID-Connect-Java-Spring-Server 2012-04-10 13:45:26 -04:00
Amanda Anganes 269a354f8c Added tables.sql, which is just a concatenation of all the other sql files. Added redirect_uris.sql, which is a NEW table needed to support clients registering multiple redirect uris.
This updates us to the HEAD revision of SECOAUTH, where the redirect uri field on ClientDetails has been updated to be a Set<String> instead of a single string. I updated the UI code so that it will still work, but it will need to be updated to allow users to register multiple uris.
This also closes issue #2 from the issue tracker.
2012-04-10 13:44:10 -04:00
nemonik d056079fea Support for ECDSA JWT signer was removed as it would require the system-wide installation and configuration of the Bouncy Castle Security Provider in order for the server to work when deployed to Tomcat. See issue ticket #20 2012-04-10 13:41:18 -04:00
nemonik 6c8661f3ad the signature base created in the verify method of the AbstractJwtSigner did not match how the Jwt.getSignatureBase creates the signature base. also, modified the testGenerateHmacSignature to exercise 2012-04-02 22:12:03 -04:00
nemonik 267f1b2de3 bas64 decoded signature prior to verifying, modified unit rsa unit test, and fixed ecdsa signer verify 2012-04-02 21:32:42 -04:00
Justin Richer 985a4619fa abstracted keystore loader to new function 2012-04-02 15:06:58 -04:00
Justin Richer 3dfe6df410 refactored algorithms out to their own separate Enum 2012-04-02 13:13:13 -04:00
Justin Richer fec6a3a876 removed definition parsers, may be picked up again later 2012-04-02 12:40:53 -04:00
Amanda Anganes b986b30695 Fixed unit tests - they were broken due to an error in application-context.xml; not because of the refactor. App context was trying to instantiate an Hmac signer with name "HMACSHA256", which should have been "HS256". I updated the exceptions thrown by the signer impls so that if an Algorithm name mismatch occurs it will tell you what it is trying to match against. 2012-03-30 13:45:04 -04:00
nemonik 0a29eba617 unit test correction, slight refactor of tested classes 2012-03-29 14:02:51 -04:00
nemonik f215cfc50c fix for issue 5, code refactoring across signers 2012-03-29 12:34:51 -04:00
Amanda Anganes c50f968748 Merged to use idToken.setNonce(). 2012-03-23 11:11:38 -04:00
Amanda Anganes 268b82e31d Merge branch 'Branch_master3-23-2012' 2012-03-23 11:09:27 -04:00
Amanda Anganes 8b10b83516 Added setNonce to JwtClaims. 2012-03-23 11:08:49 -04:00
Justin Richer 4a15e51e12 pass through nonce 2012-03-23 10:52:04 -04:00
Amanda Anganes 27fe3c9eca Implemented signing. Works, but validation does not fail if you remove the signature. 2012-03-22 14:49:02 -04:00
Amanda Anganes 68c8d1a9d2 Changed parameter for check id endpoint to access_token instead of auth_token 2012-03-22 14:19:45 -04:00
Justin Richer 826be5a1a1 changed parameter name to match spec change 2012-03-22 14:10:50 -04:00
Justin Richer 5fe036878a fixed view for idtoken in checkid endpoint 2012-03-22 14:09:25 -04:00
Justin Richer c51bb72fe5 merged keystore changes 2012-03-22 13:50:47 -04:00
Justin Richer 6c01134095 JWK display support for key maps, still no key ids 2012-03-22 13:48:16 -04:00
Amanda Anganes 776748f908 Merge branch '3-22-2012' 2012-03-22 13:43:59 -04:00
Amanda Anganes ae9b5e792a Added a ConfigurationPropertiesBean.java to hold configuration properties. Fixed up CheckIDEndpoint.java a bit - it works, but is outputting the wrong thing. 2012-03-22 13:43:30 -04:00
Justin Richer 524a8e153e signers turned into a map 2012-03-22 13:37:21 -04:00
Justin Richer 664dd1df46 JWT claims can now have nulls in them without barfing 2012-03-22 11:46:48 -04:00
Justin Richer c59d3fe963 it spits out JWTs! and id tokens! JWT still needs to handle nulls 2012-03-21 17:59:48 -04:00
Amanda Anganes ebe72412fe Authorization Grant flow works up to serializing the returned Access Token. Justin is investigating serialization problems. 2012-03-21 16:44:16 -04:00
Amanda Anganes d94eb338ee Auth code flow works through user approval page. Current problem is that it doesn't seem to be matching up auth codes correctly (I keep getting "invalid code" error). But, it looks like it's going through our custom token granter so that is good. 2012-03-20 15:07:18 -04:00
Justin Richer 2f29cc52b2 Merge branch 'client_refactor' 2012-03-16 16:28:51 -04:00
Justin Richer e6e7504213 added files and shuffled things to new packages 2012-03-16 15:46:23 -04:00
Justin Richer a0cdd8bf2f moved server to new package location 2012-03-16 15:01:53 -04:00