public boolean handlesResponse(final OAuth2Accessor accessor, final HttpResponse response) { if (accessor == null || !accessor.isValid() || accessor.isErrorResponse()) { return false; } return response != null; }
private OAuth2Accessor getAccessor() { if (this.internalAccessor == null || !this.internalAccessor.isValid()) { this.internalAccessor = this.getAccessorInternal(); } return this.internalAccessor; }
public boolean handlesRequest(final OAuth2Accessor accessor, final HttpServletRequest request) { if (accessor == null) { return false; } else if (request == null) { return false; } else if (!accessor.isValid() || accessor.isErrorResponse() || !accessor.isRedirecting()) { return false; } else if (!accessor.getGrantType().equalsIgnoreCase(OAuth2Message.AUTHORIZATION)) { return false; } return true; }
if (!accessor.isValid() || accessor.isErrorResponse() || accessor.isRedirecting()) { throw new OAuth2RequestException(CodeGrantTypeHandler.ERROR, "accessor is invalid", null);
if (!accessor.isValid() || accessor.isErrorResponse() || accessor.isRedirecting()) { throw new OAuth2RequestException(ClientCredentialsGrantTypeHandler.ERROR, "accessor is invalid", null);
public OAuth2HandlerError addOAuth2Authentication(final HttpRequest request, final OAuth2Accessor accessor) { try { if (request == null) { return BasicAuthenticationHandler.getError("request is null"); } if (accessor == null || !accessor.isValid() || accessor.isErrorResponse()) { return BasicAuthenticationHandler.getError("accessor is invalid " + accessor); } final String clientId = accessor.getClientId(); if (clientId == null) { return BasicAuthenticationHandler.getError("client_id is null"); } final byte[] secretBytes = accessor.getClientSecret(); if (secretBytes == null) { return BasicAuthenticationHandler.getError("client_secret is secret"); } final String secret = new String(secretBytes, "UTF-8"); final String authString = clientId + ':' + secret; final byte[] authBytes = Base64.encodeBase64(authString.getBytes()); request.setHeader(OAuth2Message.AUTHORIZATION_HEADER, "Basic: " + new String(authBytes)); return null; } catch (final Exception e) { return BasicAuthenticationHandler.getError("Exception adding basic auth headers", e); } }
private static OAuth2HandlerError validateOAuth2Params(final OAuth2Accessor accessor, final HttpRequest request) { if (accessor == null || !accessor.isValid() || accessor.isErrorResponse()) { return MacTokenHandler.getError("accessor is invalid " + accessor);
public OAuth2HandlerError addOAuth2Params(final OAuth2Accessor accessor, final HttpRequest request) { try { if (accessor == null || !accessor.isValid() || accessor.isErrorResponse()) { return BearerTokenHandler.getError("accessor is invalid " + accessor);
public OAuth2HandlerError addOAuth2Authentication(final HttpRequest request, final OAuth2Accessor accessor) { try { if (request == null) { return StandardAuthenticationHandler.getError("request is null"); } if (accessor == null) { return StandardAuthenticationHandler.getError("accessor is null"); } if (!accessor.isValid() || accessor.isErrorResponse()) { return StandardAuthenticationHandler.getError("accessor is invalid"); } final String clientId = accessor.getClientId(); if (clientId == null) { return StandardAuthenticationHandler.getError("client_id is null"); } final byte[] secretBytes = accessor.getClientSecret(); if (secretBytes == null) { return StandardAuthenticationHandler.getError("client_secret is secret"); } final String secret = new String(secretBytes, "UTF-8"); request.setHeader(OAuth2Message.CLIENT_ID, clientId); request.setParam(OAuth2Message.CLIENT_ID, clientId); request.setHeader(OAuth2Message.CLIENT_SECRET, secret); request.setParam(OAuth2Message.CLIENT_SECRET, secret); return null; } catch (final Exception e) { return StandardAuthenticationHandler.getError("Exception adding standard auth headers", e); } }
if (!accessor.isValid() || accessor.isErrorResponse() || accessor.isRedirecting()) { throw new OAuth2RequestException(ClientCredentialsGrantTypeHandler.ERROR, "accessor is invalid", null);
} else if (request == null) { ret = new OAuth2HandlerError(OAuth2Error.AUTHORIZATION_CODE_PROBLEM, "request is null", null); } else if (!accessor.isValid() || accessor.isErrorResponse() || !accessor.isRedirecting()) { ret = new OAuth2HandlerError(OAuth2Error.AUTHORIZATION_CODE_PROBLEM, "accessor is invalid", null);
if (ret == null && (accessor == null || !accessor.isValid() || accessor.isErrorResponse())) { ret = TokenAuthorizationResponseHandler.getError("accessor is invalid " + accessor);
if (ret == null || !ret.isValid()) { final OAuth2Client client = this.getClient(gadgetUri, serviceName);
this.internalAccessor = null; } else { if (!accessor.isValid()) { if (BasicOAuth2Request.LOG.isLoggable()) { BasicOAuth2Request.LOG.log("accesssor is not valid", accessor);
@Test public void testGetOAuth2Accessor_4() throws Exception { final OAuth2Accessor result = GadgetOAuth2TokenStoreTest.gts.getOAuth2Accessor( GadgetOAuth2TokenStoreTest.securityToken, GadgetOAuth2TokenStoreTest.arguments, Uri.parse(MockUtils.GADGET_URI1)); Assert.assertNotNull(result); Assert.assertFalse(result.isErrorResponse()); Assert.assertEquals(null, result.getAccessToken()); Assert.assertEquals(MockUtils.AUTHORIZE_URL, result.getAuthorizationUrl()); Assert.assertEquals(OAuth2Message.BASIC_AUTH_TYPE, result.getClientAuthenticationType()); Assert.assertEquals(MockUtils.CLIENT_ID1, result.getClientId()); Assert.assertEquals(MockUtils.GADGET_URI1, result.getGadgetUri()); Assert.assertEquals(OAuth2Message.AUTHORIZATION, result.getGrantType()); Assert.assertEquals(MockUtils.REDIRECT_URI, result.getRedirectUri()); Assert.assertEquals(null, result.getRefreshToken()); Assert.assertEquals(MockUtils.SCOPE, result.getScope()); Assert.assertEquals(MockUtils.SERVICE_NAME, result.getServiceName()); Assert.assertEquals(MockUtils.TOKEN_URL, result.getTokenUrl()); Assert.assertEquals(OAuth2Accessor.Type.CONFIDENTIAL, result.getType()); Assert.assertEquals(MockUtils.USER, result.getUser()); Assert.assertTrue(result.isValid()); Assert.assertFalse(result.isAllowModuleOverrides()); Assert.assertFalse(result.isErrorResponse()); Assert.assertFalse(result.isRedirecting()); Assert.assertFalse(result.isUrlParameter()); Assert.assertTrue(result.isAuthorizationHeader()); }
@Test public void testGetOAuth2Accessor_4() throws Exception { final OAuth2Accessor result = GadgetOAuth2TokenStoreTest.gts.getOAuth2Accessor( GadgetOAuth2TokenStoreTest.securityToken, GadgetOAuth2TokenStoreTest.arguments, Uri.parse(MockUtils.GADGET_URI1)); Assert.assertNotNull(result); Assert.assertFalse(result.isErrorResponse()); Assert.assertEquals(null, result.getAccessToken()); Assert.assertEquals(MockUtils.AUTHORIZE_URL, result.getAuthorizationUrl()); Assert.assertEquals(OAuth2Message.BASIC_AUTH_TYPE, result.getClientAuthenticationType()); Assert.assertEquals(MockUtils.CLIENT_ID1, result.getClientId()); Assert.assertEquals(MockUtils.GADGET_URI1, result.getGadgetUri()); Assert.assertEquals(OAuth2Message.AUTHORIZATION, result.getGrantType()); Assert.assertEquals(MockUtils.REDIRECT_URI, result.getRedirectUri()); Assert.assertEquals(null, result.getRefreshToken()); Assert.assertEquals(MockUtils.SCOPE, result.getScope()); Assert.assertEquals(MockUtils.SERVICE_NAME, result.getServiceName()); Assert.assertEquals(MockUtils.TOKEN_URL, result.getTokenUrl()); Assert.assertEquals(OAuth2Accessor.Type.CONFIDENTIAL, result.getType()); Assert.assertEquals(MockUtils.USER, result.getUser()); Assert.assertTrue(result.isValid()); Assert.assertFalse(result.isAllowModuleOverrides()); Assert.assertFalse(result.isErrorResponse()); Assert.assertFalse(result.isRedirecting()); Assert.assertFalse(result.isUrlParameter()); Assert.assertTrue(result.isAuthorizationHeader()); }