public boolean handlesResponse(final OAuth2Accessor accessor, final HttpResponse response) { if (accessor == null || !accessor.isValid() || accessor.isErrorResponse()) { return false; } return response != null; }
public boolean handlesRequest(final OAuth2Accessor accessor, final HttpServletRequest request) { if (accessor == null) { return false; } else if (request == null) { return false; } else if (!accessor.isValid() || accessor.isErrorResponse() || !accessor.isRedirecting()) { return false; } else if (!accessor.getGrantType().equalsIgnoreCase(OAuth2Message.AUTHORIZATION)) { return false; } return true; }
if (!accessor.isValid() || accessor.isErrorResponse() || accessor.isRedirecting()) { throw new OAuth2RequestException(CodeGrantTypeHandler.ERROR, "accessor is invalid", null);
if (!accessor.isValid() || accessor.isErrorResponse() || accessor.isRedirecting()) { throw new OAuth2RequestException(ClientCredentialsGrantTypeHandler.ERROR, "accessor is invalid", null);
public OAuth2HandlerError addOAuth2Authentication(final HttpRequest request, final OAuth2Accessor accessor) { try { if (request == null) { return BasicAuthenticationHandler.getError("request is null"); } if (accessor == null || !accessor.isValid() || accessor.isErrorResponse()) { return BasicAuthenticationHandler.getError("accessor is invalid " + accessor); } final String clientId = accessor.getClientId(); if (clientId == null) { return BasicAuthenticationHandler.getError("client_id is null"); } final byte[] secretBytes = accessor.getClientSecret(); if (secretBytes == null) { return BasicAuthenticationHandler.getError("client_secret is secret"); } final String secret = new String(secretBytes, "UTF-8"); final String authString = clientId + ':' + secret; final byte[] authBytes = Base64.encodeBase64(authString.getBytes()); request.setHeader(OAuth2Message.AUTHORIZATION_HEADER, "Basic: " + new String(authBytes)); return null; } catch (final Exception e) { return BasicAuthenticationHandler.getError("Exception adding basic auth headers", e); } }
private static OAuth2HandlerError validateOAuth2Params(final OAuth2Accessor accessor, final HttpRequest request) { if (accessor == null || !accessor.isValid() || accessor.isErrorResponse()) { return MacTokenHandler.getError("accessor is invalid " + accessor);
public OAuth2HandlerError addOAuth2Params(final OAuth2Accessor accessor, final HttpRequest request) { try { if (accessor == null || !accessor.isValid() || accessor.isErrorResponse()) { return BearerTokenHandler.getError("accessor is invalid " + accessor);
@Test public void testGetOAuth2Accessor_1() throws Exception { final OAuth2Accessor result = GadgetOAuth2TokenStoreTest.gts.getOAuth2Accessor(null, GadgetOAuth2TokenStoreTest.arguments, GadgetOAuth2TokenStoreTest.gadgetUri); Assert.assertNotNull(result); Assert.assertTrue(result.isErrorResponse()); Assert.assertEquals(OAuth2Error.GET_OAUTH2_ACCESSOR_PROBLEM, result.getError()); Assert.assertTrue(result.getErrorContextMessage().startsWith( "OAuth2Accessor missing a param")); }
@Test public void testGetOAuth2Accessor_2() throws Exception { final OAuth2Accessor result = GadgetOAuth2TokenStoreTest.gts.getOAuth2Accessor( GadgetOAuth2TokenStoreTest.securityToken, GadgetOAuth2TokenStoreTest.arguments, null); Assert.assertNotNull(result); Assert.assertTrue(result.isErrorResponse()); Assert.assertEquals(OAuth2Error.GET_OAUTH2_ACCESSOR_PROBLEM, result.getError()); Assert.assertTrue(result.getErrorContextMessage().startsWith( "OAuth2Accessor missing a param")); }
@Test public void testGetOAuth2Accessor_2() throws Exception { final OAuth2Accessor result = GadgetOAuth2TokenStoreTest.gts.getOAuth2Accessor( GadgetOAuth2TokenStoreTest.securityToken, GadgetOAuth2TokenStoreTest.arguments, null); Assert.assertNotNull(result); Assert.assertTrue(result.isErrorResponse()); Assert.assertEquals(OAuth2Error.GET_OAUTH2_ACCESSOR_PROBLEM, result.getError()); Assert.assertTrue(result.getErrorContextMessage().startsWith( "OAuth2Accessor missing a param")); }
@Test public void testGetOAuth2Accessor_1() throws Exception { final OAuth2Accessor result = GadgetOAuth2TokenStoreTest.gts.getOAuth2Accessor(null, GadgetOAuth2TokenStoreTest.arguments, GadgetOAuth2TokenStoreTest.gadgetUri); Assert.assertNotNull(result); Assert.assertTrue(result.isErrorResponse()); Assert.assertEquals(OAuth2Error.GET_OAUTH2_ACCESSOR_PROBLEM, result.getError()); Assert.assertTrue(result.getErrorContextMessage().startsWith( "OAuth2Accessor missing a param")); }
public OAuth2HandlerError addOAuth2Authentication(final HttpRequest request, final OAuth2Accessor accessor) { try { if (request == null) { return StandardAuthenticationHandler.getError("request is null"); } if (accessor == null) { return StandardAuthenticationHandler.getError("accessor is null"); } if (!accessor.isValid() || accessor.isErrorResponse()) { return StandardAuthenticationHandler.getError("accessor is invalid"); } final String clientId = accessor.getClientId(); if (clientId == null) { return StandardAuthenticationHandler.getError("client_id is null"); } final byte[] secretBytes = accessor.getClientSecret(); if (secretBytes == null) { return StandardAuthenticationHandler.getError("client_secret is secret"); } final String secret = new String(secretBytes, "UTF-8"); request.setHeader(OAuth2Message.CLIENT_ID, clientId); request.setParam(OAuth2Message.CLIENT_ID, clientId); request.setHeader(OAuth2Message.CLIENT_SECRET, secret); request.setParam(OAuth2Message.CLIENT_SECRET, secret); return null; } catch (final Exception e) { return StandardAuthenticationHandler.getError("Exception adding standard auth headers", e); } }
@Test public void testGetOAuth2Accessor_3() throws Exception { final OAuth2Accessor result = GadgetOAuth2TokenStoreTest.gts.getOAuth2Accessor( GadgetOAuth2TokenStoreTest.securityToken, GadgetOAuth2TokenStoreTest.arguments, Uri.parse("bad")); Assert.assertNotNull(result); Assert.assertTrue(result.isErrorResponse()); Assert.assertEquals(OAuth2Error.NO_GADGET_SPEC, result.getError()); Assert.assertTrue(result.getErrorContextMessage().startsWith("gadgetUri =")); }
@Test public void testGetOAuth2Accessor_3() throws Exception { final OAuth2Accessor result = GadgetOAuth2TokenStoreTest.gts.getOAuth2Accessor( GadgetOAuth2TokenStoreTest.securityToken, GadgetOAuth2TokenStoreTest.arguments, Uri.parse("bad")); Assert.assertNotNull(result); Assert.assertTrue(result.isErrorResponse()); Assert.assertEquals(OAuth2Error.NO_GADGET_SPEC, result.getError()); Assert.assertTrue(result.getErrorContextMessage().startsWith("gadgetUri =")); }
if (!accessor.isValid() || accessor.isErrorResponse() || accessor.isRedirecting()) { throw new OAuth2RequestException(ClientCredentialsGrantTypeHandler.ERROR, "accessor is invalid", null);
} else if (request == null) { ret = new OAuth2HandlerError(OAuth2Error.AUTHORIZATION_CODE_PROBLEM, "request is null", null); } else if (!accessor.isValid() || accessor.isErrorResponse() || !accessor.isRedirecting()) { ret = new OAuth2HandlerError(OAuth2Error.AUTHORIZATION_CODE_PROBLEM, "accessor is invalid", null);
private HttpResponse processResponse(final OAuth2Accessor accessor, final HttpResponseBuilder responseBuilder) { final boolean isLogging = BasicOAuth2Request.LOG.isLoggable(); if (isLogging) { BasicOAuth2Request.LOG.entering(BasicOAuth2Request.LOG_CLASS, "processResponse", new Object[] { accessor, responseBuilder == null }); } if (accessor.isErrorResponse() || responseBuilder == null) { return this.sendErrorResponse(accessor.getErrorException(), accessor.getError(), accessor.getErrorContextMessage(), accessor.getErrorUri(), ""); } if (this.responseParams.getAuthorizationUrl() != null) { responseBuilder.setMetadata(OAuth2ResponseParams.APPROVAL_URL, this.responseParams.getAuthorizationUrl()); accessor.setRedirecting(true); } else { accessor.setRedirecting(false); } final HttpResponse ret = responseBuilder.create(); if (isLogging) { BasicOAuth2Request.LOG.exiting(BasicOAuth2Request.LOG_CLASS, "processResponse", "response logged in fetch()"); } return ret; }
this.authority = null; this.contextRoot = null; this.errorResponse = accessor.isErrorResponse(); this.redirecting = accessor.isRedirecting(); this.error = accessor.getError();
@Test public void testGetOAuth2Accessor_4() throws Exception { final OAuth2Accessor result = GadgetOAuth2TokenStoreTest.gts.getOAuth2Accessor( GadgetOAuth2TokenStoreTest.securityToken, GadgetOAuth2TokenStoreTest.arguments, Uri.parse(MockUtils.GADGET_URI1)); Assert.assertNotNull(result); Assert.assertFalse(result.isErrorResponse()); Assert.assertEquals(null, result.getAccessToken()); Assert.assertEquals(MockUtils.AUTHORIZE_URL, result.getAuthorizationUrl()); Assert.assertEquals(OAuth2Message.BASIC_AUTH_TYPE, result.getClientAuthenticationType()); Assert.assertEquals(MockUtils.CLIENT_ID1, result.getClientId()); Assert.assertEquals(MockUtils.GADGET_URI1, result.getGadgetUri()); Assert.assertEquals(OAuth2Message.AUTHORIZATION, result.getGrantType()); Assert.assertEquals(MockUtils.REDIRECT_URI, result.getRedirectUri()); Assert.assertEquals(null, result.getRefreshToken()); Assert.assertEquals(MockUtils.SCOPE, result.getScope()); Assert.assertEquals(MockUtils.SERVICE_NAME, result.getServiceName()); Assert.assertEquals(MockUtils.TOKEN_URL, result.getTokenUrl()); Assert.assertEquals(OAuth2Accessor.Type.CONFIDENTIAL, result.getType()); Assert.assertEquals(MockUtils.USER, result.getUser()); Assert.assertTrue(result.isValid()); Assert.assertFalse(result.isAllowModuleOverrides()); Assert.assertFalse(result.isErrorResponse()); Assert.assertFalse(result.isRedirecting()); Assert.assertFalse(result.isUrlParameter()); Assert.assertTrue(result.isAuthorizationHeader()); }
@Test public void testGetOAuth2Accessor_4() throws Exception { final OAuth2Accessor result = GadgetOAuth2TokenStoreTest.gts.getOAuth2Accessor( GadgetOAuth2TokenStoreTest.securityToken, GadgetOAuth2TokenStoreTest.arguments, Uri.parse(MockUtils.GADGET_URI1)); Assert.assertNotNull(result); Assert.assertFalse(result.isErrorResponse()); Assert.assertEquals(null, result.getAccessToken()); Assert.assertEquals(MockUtils.AUTHORIZE_URL, result.getAuthorizationUrl()); Assert.assertEquals(OAuth2Message.BASIC_AUTH_TYPE, result.getClientAuthenticationType()); Assert.assertEquals(MockUtils.CLIENT_ID1, result.getClientId()); Assert.assertEquals(MockUtils.GADGET_URI1, result.getGadgetUri()); Assert.assertEquals(OAuth2Message.AUTHORIZATION, result.getGrantType()); Assert.assertEquals(MockUtils.REDIRECT_URI, result.getRedirectUri()); Assert.assertEquals(null, result.getRefreshToken()); Assert.assertEquals(MockUtils.SCOPE, result.getScope()); Assert.assertEquals(MockUtils.SERVICE_NAME, result.getServiceName()); Assert.assertEquals(MockUtils.TOKEN_URL, result.getTokenUrl()); Assert.assertEquals(OAuth2Accessor.Type.CONFIDENTIAL, result.getType()); Assert.assertEquals(MockUtils.USER, result.getUser()); Assert.assertTrue(result.isValid()); Assert.assertFalse(result.isAllowModuleOverrides()); Assert.assertFalse(result.isErrorResponse()); Assert.assertFalse(result.isRedirecting()); Assert.assertFalse(result.isUrlParameter()); Assert.assertTrue(result.isAuthorizationHeader()); }