From 1dd0ab0c5f14ed10a73b01d1e2b92ec39ee6b9e6 Mon Sep 17 00:00:00 2001
From: Joe Grandja <10884212+jgrandja@users.noreply.github.com>
Date: Fri, 17 May 2024 10:14:19 -0400
Subject: [PATCH 1/5] Apply Spring checkstyle conventions
Issue gh-1624
---
etc/checkstyle/checkstyle-suppressions.xml | 8 +++
etc/checkstyle/checkstyle.xml | 57 +++++-----------------
etc/checkstyle/header.txt | 2 +-
etc/checkstyle/suppressions.xml | 19 --------
4 files changed, 21 insertions(+), 65 deletions(-)
create mode 100644 etc/checkstyle/checkstyle-suppressions.xml
delete mode 100644 etc/checkstyle/suppressions.xml
diff --git a/etc/checkstyle/checkstyle-suppressions.xml b/etc/checkstyle/checkstyle-suppressions.xml
new file mode 100644
index 00000000..003a53d7
--- /dev/null
+++ b/etc/checkstyle/checkstyle-suppressions.xml
@@ -0,0 +1,8 @@
+
+
+
+
+
+
diff --git a/etc/checkstyle/checkstyle.xml b/etc/checkstyle/checkstyle.xml
index d7b39201..da8d0119 100644
--- a/etc/checkstyle/checkstyle.xml
+++ b/etc/checkstyle/checkstyle.xml
@@ -1,51 +1,18 @@
-
-
-
+
+
-
+
-
-
-
-
-
+
+
+
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
+
+
+
diff --git a/etc/checkstyle/header.txt b/etc/checkstyle/header.txt
index 5e5d28b9..92317df0 100644
--- a/etc/checkstyle/header.txt
+++ b/etc/checkstyle/header.txt
@@ -1,5 +1,5 @@
^\Q/*\E$
-^\Q * Copyright\E (\d{4}(\-\d{4})? the original author or authors\.|(\d{4}, )*(\d{4}) Acegi Technology Pty Limited)$
+^\Q * Copyright \E20\d\d\-20\d\d\Q the original author or authors.\E$
^\Q *\E$
^\Q * Licensed under the Apache License, Version 2.0 (the "License");\E$
^\Q * you may not use this file except in compliance with the License.\E$
diff --git a/etc/checkstyle/suppressions.xml b/etc/checkstyle/suppressions.xml
deleted file mode 100644
index 297f0624..00000000
--- a/etc/checkstyle/suppressions.xml
+++ /dev/null
@@ -1,19 +0,0 @@
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
From 9c45484c21a9c5944d790137cb7c63fe026f8be1 Mon Sep 17 00:00:00 2001
From: Joe Grandja <10884212+jgrandja@users.noreply.github.com>
Date: Fri, 17 May 2024 13:59:32 -0400
Subject: [PATCH 2/5] Fix checkstyle violations for main module
Issue gh-1624
---
...ractOAuth2AuthorizationServerMetadata.java | 11 +-
...moryOAuth2AuthorizationConsentService.java | 2 +-
.../InMemoryOAuth2AuthorizationService.java | 25 ++--
.../JdbcOAuth2AuthorizationService.java | 128 +++++++++---------
.../authorization/OAuth2Authorization.java | 5 +-
.../OAuth2AuthorizationConsentService.java | 4 +-
.../OAuth2AuthorizationServerMetadata.java | 4 +-
.../OAuth2TokenIntrospection.java | 8 +-
.../server/authorization/OAuth2TokenType.java | 6 +
...ClientAssertionAuthenticationProvider.java | 2 +-
...thorizationCodeAuthenticationProvider.java | 8 +-
...tionCodeRequestAuthenticationProvider.java | 4 +-
...izationCodeRequestAuthenticationToken.java | 6 +-
...rizationConsentAuthenticationProvider.java | 10 +-
...thorizationConsentAuthenticationToken.java | 4 +-
...AuthorizationGrantAuthenticationToken.java | 2 +-
.../OAuth2ClientAuthenticationToken.java | 2 +-
...ientCredentialsAuthenticationProvider.java | 6 +-
...2ClientCredentialsAuthenticationToken.java | 2 +-
...rizationConsentAuthenticationProvider.java | 20 +--
...thorizationConsentAuthenticationToken.java | 2 +-
...rizationRequestAuthenticationProvider.java | 6 +-
...thorizationRequestAuthenticationToken.java | 6 +-
...Auth2DeviceCodeAuthenticationProvider.java | 8 +-
...iceVerificationAuthenticationProvider.java | 6 +-
...DeviceVerificationAuthenticationToken.java | 2 +-
...th2RefreshTokenAuthenticationProvider.java | 6 +-
...OAuth2RefreshTokenAuthenticationToken.java | 2 +-
...enIntrospectionAuthenticationProvider.java | 6 +-
...TokenIntrospectionAuthenticationToken.java | 2 +-
...TokenRevocationAuthenticationProvider.java | 6 +-
.../InMemoryRegisteredClientRepository.java | 4 +-
.../JdbcRegisteredClientRepository.java | 16 +--
.../client/RegisteredClient.java | 4 +-
.../client/RegisteredClientRepository.java | 2 +-
...Auth2AuthorizationServerConfiguration.java | 4 +-
.../AuthorizationServerContextFilter.java | 2 +-
...OAuth2AuthorizationEndpointConfigurer.java | 5 +-
.../OAuth2AuthorizationServerConfigurer.java | 6 +-
...ationServerMetadataEndpointConfigurer.java | 9 +-
.../OAuth2ClientAuthenticationConfigurer.java | 3 +-
.../configurers/OAuth2ConfigurerUtils.java | 2 +-
...DeviceAuthorizationEndpointConfigurer.java | 3 +-
...2DeviceVerificationEndpointConfigurer.java | 3 +-
.../OAuth2TokenEndpointConfigurer.java | 3 +-
...2TokenIntrospectionEndpointConfigurer.java | 3 +-
...uth2TokenRevocationEndpointConfigurer.java | 3 +-
...cClientRegistrationEndpointConfigurer.java | 3 +-
.../web/configurers/OidcConfigurer.java | 5 +-
.../OidcLogoutEndpointConfigurer.java | 3 +-
...oviderConfigurationEndpointConfigurer.java | 9 +-
.../OidcUserInfoEndpointConfigurer.java | 3 +-
.../http/converter/HttpMessageConverters.java | 2 +-
.../oidc/OidcClientRegistration.java | 9 +-
.../oidc/OidcProviderConfiguration.java | 9 +-
...entRegistrationAuthenticationProvider.java | 25 ++--
.../OidcUserInfoAuthenticationProvider.java | 2 +-
...ClientOidcClientRegistrationConverter.java | 10 +-
.../http/converter/HttpMessageConverters.java | 2 +-
...lientRegistrationHttpMessageConverter.java | 2 +-
.../OidcClientRegistrationEndpointFilter.java | 4 +-
.../settings/AbstractSettings.java | 5 +-
.../settings/AuthorizationServerSettings.java | 4 +-
.../settings/ClientSettings.java | 4 +-
.../authorization/settings/TokenSettings.java | 6 +-
.../authorization/token/JwtGenerator.java | 6 +-
.../token/OAuth2TokenClaimsSet.java | 1 +
.../token/OAuth2TokenCustomizer.java | 2 +-
.../token/OAuth2TokenGenerator.java | 2 +-
.../authorization/web/DefaultConsentPage.java | 4 +-
.../web/NimbusJwkSetEndpointFilter.java | 9 +-
.../OAuth2AuthorizationEndpointFilter.java | 6 +-
...Auth2DeviceVerificationEndpointFilter.java | 4 +-
...Auth2TokenIntrospectionEndpointFilter.java | 2 +-
.../OAuth2TokenRevocationEndpointFilter.java | 2 +-
...ionCodeRequestAuthenticationConverter.java | 8 +-
76 files changed, 283 insertions(+), 253 deletions(-)
diff --git a/oauth2-authorization-server/src/main/java/org/springframework/security/oauth2/server/authorization/AbstractOAuth2AuthorizationServerMetadata.java b/oauth2-authorization-server/src/main/java/org/springframework/security/oauth2/server/authorization/AbstractOAuth2AuthorizationServerMetadata.java
index 09168646..5356ee03 100644
--- a/oauth2-authorization-server/src/main/java/org/springframework/security/oauth2/server/authorization/AbstractOAuth2AuthorizationServerMetadata.java
+++ b/oauth2-authorization-server/src/main/java/org/springframework/security/oauth2/server/authorization/AbstractOAuth2AuthorizationServerMetadata.java
@@ -35,8 +35,8 @@ import org.springframework.util.Assert;
* describes about its configuration.
*
* @author Daniel Garnier-Moiroux
- * @see OAuth2AuthorizationServerMetadataClaimAccessor
* @since 0.1.1
+ * @see OAuth2AuthorizationServerMetadataClaimAccessor
* @see 3.2.
* Authorization Server Metadata Response
* @see the type of object
+ * @param the type of the builder
*/
- protected static abstract class AbstractBuilder> {
+ protected abstract static class AbstractBuilder> {
private final Map claims = new LinkedHashMap<>();
@@ -492,7 +495,7 @@ public abstract class AbstractOAuth2AuthorizationServerMetadata
private void addClaimToClaimList(String name, String value) {
Assert.hasText(name, "name cannot be empty");
Assert.notNull(value, "value cannot be null");
- getClaims().computeIfAbsent(name, k -> new LinkedList());
+ getClaims().computeIfAbsent(name, (k) -> new LinkedList());
((List) getClaims().get(name)).add(value);
}
@@ -500,7 +503,7 @@ public abstract class AbstractOAuth2AuthorizationServerMetadata
private void acceptClaimValues(String name, Consumer> valuesConsumer) {
Assert.hasText(name, "name cannot be empty");
Assert.notNull(valuesConsumer, "valuesConsumer cannot be null");
- getClaims().computeIfAbsent(name, k -> new LinkedList());
+ getClaims().computeIfAbsent(name, (k) -> new LinkedList());
List values = (List) getClaims().get(name);
valuesConsumer.accept(values);
}
diff --git a/oauth2-authorization-server/src/main/java/org/springframework/security/oauth2/server/authorization/InMemoryOAuth2AuthorizationConsentService.java b/oauth2-authorization-server/src/main/java/org/springframework/security/oauth2/server/authorization/InMemoryOAuth2AuthorizationConsentService.java
index a2b351b7..15884b90 100644
--- a/oauth2-authorization-server/src/main/java/org/springframework/security/oauth2/server/authorization/InMemoryOAuth2AuthorizationConsentService.java
+++ b/oauth2-authorization-server/src/main/java/org/springframework/security/oauth2/server/authorization/InMemoryOAuth2AuthorizationConsentService.java
@@ -63,7 +63,7 @@ public final class InMemoryOAuth2AuthorizationConsentService implements OAuth2Au
*/
public InMemoryOAuth2AuthorizationConsentService(List authorizationConsents) {
Assert.notNull(authorizationConsents, "authorizationConsents cannot be null");
- authorizationConsents.forEach(authorizationConsent -> {
+ authorizationConsents.forEach((authorizationConsent) -> {
Assert.notNull(authorizationConsent, "authorizationConsent cannot be null");
int id = getId(authorizationConsent);
Assert.isTrue(!this.authorizationConsents.containsKey(id),
diff --git a/oauth2-authorization-server/src/main/java/org/springframework/security/oauth2/server/authorization/InMemoryOAuth2AuthorizationService.java b/oauth2-authorization-server/src/main/java/org/springframework/security/oauth2/server/authorization/InMemoryOAuth2AuthorizationService.java
index e69dad95..cc697df8 100644
--- a/oauth2-authorization-server/src/main/java/org/springframework/security/oauth2/server/authorization/InMemoryOAuth2AuthorizationService.java
+++ b/oauth2-authorization-server/src/main/java/org/springframework/security/oauth2/server/authorization/InMemoryOAuth2AuthorizationService.java
@@ -94,7 +94,7 @@ public final class InMemoryOAuth2AuthorizationService implements OAuth2Authoriza
*/
public InMemoryOAuth2AuthorizationService(List authorizations) {
Assert.notNull(authorizations, "authorizations cannot be null");
- authorizations.forEach(authorization -> {
+ authorizations.forEach((authorization) -> {
Assert.notNull(authorization, "authorization cannot be null");
Assert.isTrue(!this.authorizations.containsKey(authorization.getId()),
"The authorization must be unique. Found duplicate identifier: " + authorization.getId());
@@ -129,7 +129,7 @@ public final class InMemoryOAuth2AuthorizationService implements OAuth2Authoriza
public OAuth2Authorization findById(String id) {
Assert.hasText(id, "id cannot be empty");
OAuth2Authorization authorization = this.authorizations.get(id);
- return authorization != null ? authorization : this.initializedAuthorizations.get(id);
+ return (authorization != null) ? authorization : this.initializedAuthorizations.get(id);
}
@Nullable
@@ -164,19 +164,26 @@ public final class InMemoryOAuth2AuthorizationService implements OAuth2Authoriza
matchesRefreshToken(authorization, token) ||
matchesDeviceCode(authorization, token) ||
matchesUserCode(authorization, token);
- } else if (OAuth2ParameterNames.STATE.equals(tokenType.getValue())) {
+ }
+ else if (OAuth2ParameterNames.STATE.equals(tokenType.getValue())) {
return matchesState(authorization, token);
- } else if (OAuth2ParameterNames.CODE.equals(tokenType.getValue())) {
+ }
+ else if (OAuth2ParameterNames.CODE.equals(tokenType.getValue())) {
return matchesAuthorizationCode(authorization, token);
- } else if (OAuth2TokenType.ACCESS_TOKEN.equals(tokenType)) {
+ }
+ else if (OAuth2TokenType.ACCESS_TOKEN.equals(tokenType)) {
return matchesAccessToken(authorization, token);
- } else if (OidcParameterNames.ID_TOKEN.equals(tokenType.getValue())) {
+ }
+ else if (OidcParameterNames.ID_TOKEN.equals(tokenType.getValue())) {
return matchesIdToken(authorization, token);
- } else if (OAuth2TokenType.REFRESH_TOKEN.equals(tokenType)) {
+ }
+ else if (OAuth2TokenType.REFRESH_TOKEN.equals(tokenType)) {
return matchesRefreshToken(authorization, token);
- } else if (OAuth2ParameterNames.DEVICE_CODE.equals(tokenType.getValue())) {
+ }
+ else if (OAuth2ParameterNames.DEVICE_CODE.equals(tokenType.getValue())) {
return matchesDeviceCode(authorization, token);
- } else if (OAuth2ParameterNames.USER_CODE.equals(tokenType.getValue())) {
+ }
+ else if (OAuth2ParameterNames.USER_CODE.equals(tokenType.getValue())) {
return matchesUserCode(authorization, token);
}
// @formatter:on
diff --git a/oauth2-authorization-server/src/main/java/org/springframework/security/oauth2/server/authorization/JdbcOAuth2AuthorizationService.java b/oauth2-authorization-server/src/main/java/org/springframework/security/oauth2/server/authorization/JdbcOAuth2AuthorizationService.java
index 9bbbb912..21c3dfcb 100644
--- a/oauth2-authorization-server/src/main/java/org/springframework/security/oauth2/server/authorization/JdbcOAuth2AuthorizationService.java
+++ b/oauth2-authorization-server/src/main/java/org/springframework/security/oauth2/server/authorization/JdbcOAuth2AuthorizationService.java
@@ -362,6 +362,70 @@ public class JdbcOAuth2AuthorizationService implements OAuth2AuthorizationServic
return this.authorizationParametersMapper;
}
+ private static void initColumnMetadata(JdbcOperations jdbcOperations) {
+ columnMetadataMap = new HashMap<>();
+ ColumnMetadata columnMetadata;
+
+ columnMetadata = getColumnMetadata(jdbcOperations, "attributes", Types.BLOB);
+ columnMetadataMap.put(columnMetadata.getColumnName(), columnMetadata);
+ columnMetadata = getColumnMetadata(jdbcOperations, "authorization_code_value", Types.BLOB);
+ columnMetadataMap.put(columnMetadata.getColumnName(), columnMetadata);
+ columnMetadata = getColumnMetadata(jdbcOperations, "authorization_code_metadata", Types.BLOB);
+ columnMetadataMap.put(columnMetadata.getColumnName(), columnMetadata);
+ columnMetadata = getColumnMetadata(jdbcOperations, "access_token_value", Types.BLOB);
+ columnMetadataMap.put(columnMetadata.getColumnName(), columnMetadata);
+ columnMetadata = getColumnMetadata(jdbcOperations, "access_token_metadata", Types.BLOB);
+ columnMetadataMap.put(columnMetadata.getColumnName(), columnMetadata);
+ columnMetadata = getColumnMetadata(jdbcOperations, "oidc_id_token_value", Types.BLOB);
+ columnMetadataMap.put(columnMetadata.getColumnName(), columnMetadata);
+ columnMetadata = getColumnMetadata(jdbcOperations, "oidc_id_token_metadata", Types.BLOB);
+ columnMetadataMap.put(columnMetadata.getColumnName(), columnMetadata);
+ columnMetadata = getColumnMetadata(jdbcOperations, "refresh_token_value", Types.BLOB);
+ columnMetadataMap.put(columnMetadata.getColumnName(), columnMetadata);
+ columnMetadata = getColumnMetadata(jdbcOperations, "refresh_token_metadata", Types.BLOB);
+ columnMetadataMap.put(columnMetadata.getColumnName(), columnMetadata);
+ columnMetadata = getColumnMetadata(jdbcOperations, "user_code_value", Types.BLOB);
+ columnMetadataMap.put(columnMetadata.getColumnName(), columnMetadata);
+ columnMetadata = getColumnMetadata(jdbcOperations, "user_code_metadata", Types.BLOB);
+ columnMetadataMap.put(columnMetadata.getColumnName(), columnMetadata);
+ columnMetadata = getColumnMetadata(jdbcOperations, "device_code_value", Types.BLOB);
+ columnMetadataMap.put(columnMetadata.getColumnName(), columnMetadata);
+ columnMetadata = getColumnMetadata(jdbcOperations, "device_code_metadata", Types.BLOB);
+ columnMetadataMap.put(columnMetadata.getColumnName(), columnMetadata);
+ }
+
+ private static ColumnMetadata getColumnMetadata(JdbcOperations jdbcOperations, String columnName,
+ int defaultDataType) {
+ Integer dataType = jdbcOperations.execute((ConnectionCallback) (conn) -> {
+ DatabaseMetaData databaseMetaData = conn.getMetaData();
+ ResultSet rs = databaseMetaData.getColumns(null, null, TABLE_NAME, columnName);
+ if (rs.next()) {
+ return rs.getInt("DATA_TYPE");
+ }
+ // NOTE: (Applies to HSQL)
+ // When a database object is created with one of the CREATE statements or
+ // renamed with the ALTER statement,
+ // if the name is enclosed in double quotes, the exact name is used as the
+ // case-normal form.
+ // But if it is not enclosed in double quotes,
+ // the name is converted to uppercase and this uppercase version is stored in
+ // the database as the case-normal form.
+ rs = databaseMetaData.getColumns(null, null, TABLE_NAME.toUpperCase(), columnName.toUpperCase());
+ if (rs.next()) {
+ return rs.getInt("DATA_TYPE");
+ }
+ return null;
+ });
+ return new ColumnMetadata(columnName, (dataType != null) ? dataType : defaultDataType);
+ }
+
+ private static SqlParameterValue mapToSqlParameter(String columnName, String value) {
+ ColumnMetadata columnMetadata = columnMetadataMap.get(columnName);
+ return (Types.BLOB == columnMetadata.getDataType() && StringUtils.hasText(value))
+ ? new SqlParameterValue(Types.BLOB, value.getBytes(StandardCharsets.UTF_8))
+ : new SqlParameterValue(columnMetadata.getDataType(), value);
+ }
+
/**
* The default {@link RowMapper} that maps the current row in
* {@code java.sql.ResultSet} to {@link OAuth2Authorization}.
@@ -741,68 +805,4 @@ public class JdbcOAuth2AuthorizationService implements OAuth2AuthorizationServic
}
- private static void initColumnMetadata(JdbcOperations jdbcOperations) {
- columnMetadataMap = new HashMap<>();
- ColumnMetadata columnMetadata;
-
- columnMetadata = getColumnMetadata(jdbcOperations, "attributes", Types.BLOB);
- columnMetadataMap.put(columnMetadata.getColumnName(), columnMetadata);
- columnMetadata = getColumnMetadata(jdbcOperations, "authorization_code_value", Types.BLOB);
- columnMetadataMap.put(columnMetadata.getColumnName(), columnMetadata);
- columnMetadata = getColumnMetadata(jdbcOperations, "authorization_code_metadata", Types.BLOB);
- columnMetadataMap.put(columnMetadata.getColumnName(), columnMetadata);
- columnMetadata = getColumnMetadata(jdbcOperations, "access_token_value", Types.BLOB);
- columnMetadataMap.put(columnMetadata.getColumnName(), columnMetadata);
- columnMetadata = getColumnMetadata(jdbcOperations, "access_token_metadata", Types.BLOB);
- columnMetadataMap.put(columnMetadata.getColumnName(), columnMetadata);
- columnMetadata = getColumnMetadata(jdbcOperations, "oidc_id_token_value", Types.BLOB);
- columnMetadataMap.put(columnMetadata.getColumnName(), columnMetadata);
- columnMetadata = getColumnMetadata(jdbcOperations, "oidc_id_token_metadata", Types.BLOB);
- columnMetadataMap.put(columnMetadata.getColumnName(), columnMetadata);
- columnMetadata = getColumnMetadata(jdbcOperations, "refresh_token_value", Types.BLOB);
- columnMetadataMap.put(columnMetadata.getColumnName(), columnMetadata);
- columnMetadata = getColumnMetadata(jdbcOperations, "refresh_token_metadata", Types.BLOB);
- columnMetadataMap.put(columnMetadata.getColumnName(), columnMetadata);
- columnMetadata = getColumnMetadata(jdbcOperations, "user_code_value", Types.BLOB);
- columnMetadataMap.put(columnMetadata.getColumnName(), columnMetadata);
- columnMetadata = getColumnMetadata(jdbcOperations, "user_code_metadata", Types.BLOB);
- columnMetadataMap.put(columnMetadata.getColumnName(), columnMetadata);
- columnMetadata = getColumnMetadata(jdbcOperations, "device_code_value", Types.BLOB);
- columnMetadataMap.put(columnMetadata.getColumnName(), columnMetadata);
- columnMetadata = getColumnMetadata(jdbcOperations, "device_code_metadata", Types.BLOB);
- columnMetadataMap.put(columnMetadata.getColumnName(), columnMetadata);
- }
-
- private static ColumnMetadata getColumnMetadata(JdbcOperations jdbcOperations, String columnName,
- int defaultDataType) {
- Integer dataType = jdbcOperations.execute((ConnectionCallback) conn -> {
- DatabaseMetaData databaseMetaData = conn.getMetaData();
- ResultSet rs = databaseMetaData.getColumns(null, null, TABLE_NAME, columnName);
- if (rs.next()) {
- return rs.getInt("DATA_TYPE");
- }
- // NOTE: (Applies to HSQL)
- // When a database object is created with one of the CREATE statements or
- // renamed with the ALTER statement,
- // if the name is enclosed in double quotes, the exact name is used as the
- // case-normal form.
- // But if it is not enclosed in double quotes,
- // the name is converted to uppercase and this uppercase version is stored in
- // the database as the case-normal form.
- rs = databaseMetaData.getColumns(null, null, TABLE_NAME.toUpperCase(), columnName.toUpperCase());
- if (rs.next()) {
- return rs.getInt("DATA_TYPE");
- }
- return null;
- });
- return new ColumnMetadata(columnName, dataType != null ? dataType : defaultDataType);
- }
-
- private static SqlParameterValue mapToSqlParameter(String columnName, String value) {
- ColumnMetadata columnMetadata = columnMetadataMap.get(columnName);
- return Types.BLOB == columnMetadata.getDataType() && StringUtils.hasText(value)
- ? new SqlParameterValue(Types.BLOB, value.getBytes(StandardCharsets.UTF_8))
- : new SqlParameterValue(columnMetadata.getDataType(), value);
- }
-
}
diff --git a/oauth2-authorization-server/src/main/java/org/springframework/security/oauth2/server/authorization/OAuth2Authorization.java b/oauth2-authorization-server/src/main/java/org/springframework/security/oauth2/server/authorization/OAuth2Authorization.java
index d40399cc..364b2139 100644
--- a/oauth2-authorization-server/src/main/java/org/springframework/security/oauth2/server/authorization/OAuth2Authorization.java
+++ b/oauth2-authorization-server/src/main/java/org/springframework/security/oauth2/server/authorization/OAuth2Authorization.java
@@ -144,7 +144,7 @@ public class OAuth2Authorization implements Serializable {
public Token getToken(Class tokenType) {
Assert.notNull(tokenType, "tokenType cannot be null");
Token> token = this.tokens.get(tokenType);
- return token != null ? (Token) token : null;
+ return (token != null) ? (Token) token : null;
}
/**
@@ -234,12 +234,13 @@ public class OAuth2Authorization implements Serializable {
.authorizationGrantType(authorization.getAuthorizationGrantType())
.authorizedScopes(authorization.getAuthorizedScopes())
.tokens(authorization.tokens)
- .attributes(attrs -> attrs.putAll(authorization.getAttributes()));
+ .attributes((attrs) -> attrs.putAll(authorization.getAttributes()));
}
/**
* A holder of an OAuth 2.0 Token and it's associated metadata.
*
+ * @param the type of the {@link OAuth2Token}
* @author Joe Grandja
* @since 0.1.0
*/
diff --git a/oauth2-authorization-server/src/main/java/org/springframework/security/oauth2/server/authorization/OAuth2AuthorizationConsentService.java b/oauth2-authorization-server/src/main/java/org/springframework/security/oauth2/server/authorization/OAuth2AuthorizationConsentService.java
index 19e0622b..56d8b249 100644
--- a/oauth2-authorization-server/src/main/java/org/springframework/security/oauth2/server/authorization/OAuth2AuthorizationConsentService.java
+++ b/oauth2-authorization-server/src/main/java/org/springframework/security/oauth2/server/authorization/OAuth2AuthorizationConsentService.java
@@ -15,11 +15,11 @@
*/
package org.springframework.security.oauth2.server.authorization;
+import java.security.Principal;
+
import org.springframework.lang.Nullable;
import org.springframework.security.oauth2.server.authorization.client.RegisteredClient;
-import java.security.Principal;
-
/**
* Implementations of this interface are responsible for the management of
* {@link OAuth2AuthorizationConsent OAuth 2.0 Authorization Consent(s)}.
diff --git a/oauth2-authorization-server/src/main/java/org/springframework/security/oauth2/server/authorization/OAuth2AuthorizationServerMetadata.java b/oauth2-authorization-server/src/main/java/org/springframework/security/oauth2/server/authorization/OAuth2AuthorizationServerMetadata.java
index e62740a3..d2876d3e 100644
--- a/oauth2-authorization-server/src/main/java/org/springframework/security/oauth2/server/authorization/OAuth2AuthorizationServerMetadata.java
+++ b/oauth2-authorization-server/src/main/java/org/springframework/security/oauth2/server/authorization/OAuth2AuthorizationServerMetadata.java
@@ -52,13 +52,13 @@ public final class OAuth2AuthorizationServerMetadata extends AbstractOAuth2Autho
*/
public static Builder withClaims(Map claims) {
Assert.notEmpty(claims, "claims cannot be empty");
- return new Builder().claims(c -> c.putAll(claims));
+ return new Builder().claims((c) -> c.putAll(claims));
}
/**
* Helps configure an {@link OAuth2AuthorizationServerMetadata}.
*/
- public static class Builder extends AbstractBuilder {
+ public static final class Builder extends AbstractBuilder {
private Builder() {
}
diff --git a/oauth2-authorization-server/src/main/java/org/springframework/security/oauth2/server/authorization/OAuth2TokenIntrospection.java b/oauth2-authorization-server/src/main/java/org/springframework/security/oauth2/server/authorization/OAuth2TokenIntrospection.java
index f2652c3b..e8254202 100644
--- a/oauth2-authorization-server/src/main/java/org/springframework/security/oauth2/server/authorization/OAuth2TokenIntrospection.java
+++ b/oauth2-authorization-server/src/main/java/org/springframework/security/oauth2/server/authorization/OAuth2TokenIntrospection.java
@@ -88,13 +88,13 @@ public final class OAuth2TokenIntrospection implements OAuth2TokenIntrospectionC
*/
public static Builder withClaims(Map claims) {
Assert.notEmpty(claims, "claims cannot be empty");
- return builder().claims(c -> c.putAll(claims));
+ return builder().claims((c) -> c.putAll(claims));
}
/**
* A builder for {@link OAuth2TokenIntrospection}.
*/
- public static class Builder {
+ public static final class Builder {
private final Map claims = new LinkedHashMap<>();
@@ -312,7 +312,7 @@ public final class OAuth2TokenIntrospection implements OAuth2TokenIntrospectionC
private void addClaimToClaimList(String name, String value) {
Assert.hasText(name, "name cannot be empty");
Assert.notNull(value, "value cannot be null");
- this.claims.computeIfAbsent(name, k -> new LinkedList());
+ this.claims.computeIfAbsent(name, (k) -> new LinkedList());
((List) this.claims.get(name)).add(value);
}
@@ -320,7 +320,7 @@ public final class OAuth2TokenIntrospection implements OAuth2TokenIntrospectionC
private void acceptClaimValues(String name, Consumer> valuesConsumer) {
Assert.hasText(name, "name cannot be empty");
Assert.notNull(valuesConsumer, "valuesConsumer cannot be null");
- this.claims.computeIfAbsent(name, k -> new LinkedList());
+ this.claims.computeIfAbsent(name, (k) -> new LinkedList());
List values = (List) this.claims.get(name);
valuesConsumer.accept(values);
}
diff --git a/oauth2-authorization-server/src/main/java/org/springframework/security/oauth2/server/authorization/OAuth2TokenType.java b/oauth2-authorization-server/src/main/java/org/springframework/security/oauth2/server/authorization/OAuth2TokenType.java
index 63735785..9ddf3d05 100644
--- a/oauth2-authorization-server/src/main/java/org/springframework/security/oauth2/server/authorization/OAuth2TokenType.java
+++ b/oauth2-authorization-server/src/main/java/org/springframework/security/oauth2/server/authorization/OAuth2TokenType.java
@@ -32,8 +32,14 @@ public final class OAuth2TokenType implements Serializable {
private static final long serialVersionUID = SpringAuthorizationServerVersion.SERIAL_VERSION_UID;
+ /**
+ * {@code access_token} token type.
+ */
public static final OAuth2TokenType ACCESS_TOKEN = new OAuth2TokenType("access_token");
+ /**
+ * {@code refresh_token} token type.
+ */
public static final OAuth2TokenType REFRESH_TOKEN = new OAuth2TokenType("refresh_token");
private final String value;
diff --git a/oauth2-authorization-server/src/main/java/org/springframework/security/oauth2/server/authorization/authentication/JwtClientAssertionAuthenticationProvider.java b/oauth2-authorization-server/src/main/java/org/springframework/security/oauth2/server/authorization/authentication/JwtClientAssertionAuthenticationProvider.java
index 9c5c02b2..6352d6d5 100644
--- a/oauth2-authorization-server/src/main/java/org/springframework/security/oauth2/server/authorization/authentication/JwtClientAssertionAuthenticationProvider.java
+++ b/oauth2-authorization-server/src/main/java/org/springframework/security/oauth2/server/authorization/authentication/JwtClientAssertionAuthenticationProvider.java
@@ -128,7 +128,7 @@ public final class JwtClientAssertionAuthenticationProvider implements Authentic
// @formatter:off
ClientAuthenticationMethod clientAuthenticationMethod =
- registeredClient.getClientSettings().getTokenEndpointAuthenticationSigningAlgorithm() instanceof SignatureAlgorithm ?
+ (registeredClient.getClientSettings().getTokenEndpointAuthenticationSigningAlgorithm() instanceof SignatureAlgorithm) ?
ClientAuthenticationMethod.PRIVATE_KEY_JWT :
ClientAuthenticationMethod.CLIENT_SECRET_JWT;
// @formatter:on
diff --git a/oauth2-authorization-server/src/main/java/org/springframework/security/oauth2/server/authorization/authentication/OAuth2AuthorizationCodeAuthenticationProvider.java b/oauth2-authorization-server/src/main/java/org/springframework/security/oauth2/server/authorization/authentication/OAuth2AuthorizationCodeAuthenticationProvider.java
index 4de4aaaa..377dad03 100644
--- a/oauth2-authorization-server/src/main/java/org/springframework/security/oauth2/server/authorization/authentication/OAuth2AuthorizationCodeAuthenticationProvider.java
+++ b/oauth2-authorization-server/src/main/java/org/springframework/security/oauth2/server/authorization/authentication/OAuth2AuthorizationCodeAuthenticationProvider.java
@@ -64,8 +64,6 @@ import org.springframework.util.Assert;
import org.springframework.util.CollectionUtils;
import org.springframework.util.StringUtils;
-import static org.springframework.security.oauth2.server.authorization.authentication.OAuth2AuthenticationProviderUtils.getAuthenticatedClientElseThrowInvalidClient;
-
/**
* An {@link AuthenticationProvider} implementation for the OAuth 2.0 Authorization Code
* Grant.
@@ -120,8 +118,8 @@ public final class OAuth2AuthorizationCodeAuthenticationProvider implements Auth
public Authentication authenticate(Authentication authentication) throws AuthenticationException {
OAuth2AuthorizationCodeAuthenticationToken authorizationCodeAuthentication = (OAuth2AuthorizationCodeAuthenticationToken) authentication;
- OAuth2ClientAuthenticationToken clientPrincipal = getAuthenticatedClientElseThrowInvalidClient(
- authorizationCodeAuthentication);
+ OAuth2ClientAuthenticationToken clientPrincipal = OAuth2AuthenticationProviderUtils
+ .getAuthenticatedClientElseThrowInvalidClient(authorizationCodeAuthentication);
RegisteredClient registeredClient = clientPrincipal.getRegisteredClient();
if (this.logger.isTraceEnabled()) {
@@ -166,7 +164,7 @@ public final class OAuth2AuthorizationCodeAuthenticationProvider implements Auth
if (!authorizationCode.isActive()) {
if (authorizationCode.isInvalidated()) {
- OAuth2Authorization.Token extends OAuth2Token> token = authorization.getRefreshToken() != null
+ OAuth2Authorization.Token extends OAuth2Token> token = (authorization.getRefreshToken() != null)
? authorization.getRefreshToken() : authorization.getAccessToken();
if (token != null) {
// Invalidate the access (and refresh) token as the client is
diff --git a/oauth2-authorization-server/src/main/java/org/springframework/security/oauth2/server/authorization/authentication/OAuth2AuthorizationCodeRequestAuthenticationProvider.java b/oauth2-authorization-server/src/main/java/org/springframework/security/oauth2/server/authorization/authentication/OAuth2AuthorizationCodeRequestAuthenticationProvider.java
index 04db9883..d224ecc4 100644
--- a/oauth2-authorization-server/src/main/java/org/springframework/security/oauth2/server/authorization/authentication/OAuth2AuthorizationCodeRequestAuthenticationProvider.java
+++ b/oauth2-authorization-server/src/main/java/org/springframework/security/oauth2/server/authorization/authentication/OAuth2AuthorizationCodeRequestAuthenticationProvider.java
@@ -186,12 +186,12 @@ public final class OAuth2AuthorizationCodeRequestAuthenticationProvider implemen
.build();
if (this.logger.isTraceEnabled()) {
- logger.trace("Generated authorization consent state");
+ this.logger.trace("Generated authorization consent state");
}
this.authorizationService.save(authorization);
- Set currentAuthorizedScopes = currentAuthorizationConsent != null
+ Set currentAuthorizedScopes = (currentAuthorizationConsent != null)
? currentAuthorizationConsent.getScopes() : null;
if (this.logger.isTraceEnabled()) {
diff --git a/oauth2-authorization-server/src/main/java/org/springframework/security/oauth2/server/authorization/authentication/OAuth2AuthorizationCodeRequestAuthenticationToken.java b/oauth2-authorization-server/src/main/java/org/springframework/security/oauth2/server/authorization/authentication/OAuth2AuthorizationCodeRequestAuthenticationToken.java
index 83cf1651..ebf3121b 100644
--- a/oauth2-authorization-server/src/main/java/org/springframework/security/oauth2/server/authorization/authentication/OAuth2AuthorizationCodeRequestAuthenticationToken.java
+++ b/oauth2-authorization-server/src/main/java/org/springframework/security/oauth2/server/authorization/authentication/OAuth2AuthorizationCodeRequestAuthenticationToken.java
@@ -81,9 +81,9 @@ public class OAuth2AuthorizationCodeRequestAuthenticationToken extends AbstractA
this.principal = principal;
this.redirectUri = redirectUri;
this.state = state;
- this.scopes = Collections.unmodifiableSet(scopes != null ? new HashSet<>(scopes) : Collections.emptySet());
+ this.scopes = Collections.unmodifiableSet((scopes != null) ? new HashSet<>(scopes) : Collections.emptySet());
this.additionalParameters = Collections.unmodifiableMap(
- additionalParameters != null ? new HashMap<>(additionalParameters) : Collections.emptyMap());
+ (additionalParameters != null) ? new HashMap<>(additionalParameters) : Collections.emptyMap());
this.authorizationCode = null;
}
@@ -113,7 +113,7 @@ public class OAuth2AuthorizationCodeRequestAuthenticationToken extends AbstractA
this.authorizationCode = authorizationCode;
this.redirectUri = redirectUri;
this.state = state;
- this.scopes = Collections.unmodifiableSet(scopes != null ? new HashSet<>(scopes) : Collections.emptySet());
+ this.scopes = Collections.unmodifiableSet((scopes != null) ? new HashSet<>(scopes) : Collections.emptySet());
this.additionalParameters = Collections.emptyMap();
setAuthenticated(true);
}
diff --git a/oauth2-authorization-server/src/main/java/org/springframework/security/oauth2/server/authorization/authentication/OAuth2AuthorizationConsentAuthenticationProvider.java b/oauth2-authorization-server/src/main/java/org/springframework/security/oauth2/server/authorization/authentication/OAuth2AuthorizationConsentAuthenticationProvider.java
index a644b636..131b58ce 100644
--- a/oauth2-authorization-server/src/main/java/org/springframework/security/oauth2/server/authorization/authentication/OAuth2AuthorizationConsentAuthenticationProvider.java
+++ b/oauth2-authorization-server/src/main/java/org/springframework/security/oauth2/server/authorization/authentication/OAuth2AuthorizationConsentAuthenticationProvider.java
@@ -154,7 +154,7 @@ public final class OAuth2AuthorizationConsentAuthenticationProvider implements A
OAuth2AuthorizationConsent currentAuthorizationConsent = this.authorizationConsentService
.findById(authorization.getRegisteredClientId(), authorization.getPrincipalName());
- Set currentAuthorizedScopes = currentAuthorizationConsent != null
+ Set currentAuthorizedScopes = (currentAuthorizationConsent != null)
? currentAuthorizationConsent.getScopes() : Collections.emptySet();
if (!currentAuthorizedScopes.isEmpty()) {
@@ -242,9 +242,7 @@ public final class OAuth2AuthorizationConsentAuthenticationProvider implements A
OAuth2Authorization updatedAuthorization = OAuth2Authorization.from(authorization)
.authorizedScopes(authorizedScopes)
.token(authorizationCode)
- .attributes(attrs -> {
- attrs.remove(OAuth2ParameterNames.STATE);
- })
+ .attributes((attrs) -> attrs.remove(OAuth2ParameterNames.STATE))
.build();
this.authorizationService.save(updatedAuthorization);
@@ -353,9 +351,9 @@ public final class OAuth2AuthorizationConsentAuthenticationProvider implements A
redirectUri = null; // Prevent redirects
}
- String state = authorizationRequest != null ? authorizationRequest.getState()
+ String state = (authorizationRequest != null) ? authorizationRequest.getState()
: authorizationConsentAuthentication.getState();
- Set requestedScopes = authorizationRequest != null ? authorizationRequest.getScopes()
+ Set requestedScopes = (authorizationRequest != null) ? authorizationRequest.getScopes()
: authorizationConsentAuthentication.getScopes();
OAuth2AuthorizationCodeRequestAuthenticationToken authorizationCodeRequestAuthenticationResult = new OAuth2AuthorizationCodeRequestAuthenticationToken(
diff --git a/oauth2-authorization-server/src/main/java/org/springframework/security/oauth2/server/authorization/authentication/OAuth2AuthorizationConsentAuthenticationToken.java b/oauth2-authorization-server/src/main/java/org/springframework/security/oauth2/server/authorization/authentication/OAuth2AuthorizationConsentAuthenticationToken.java
index abe8fbc9..f22a5a9e 100644
--- a/oauth2-authorization-server/src/main/java/org/springframework/security/oauth2/server/authorization/authentication/OAuth2AuthorizationConsentAuthenticationToken.java
+++ b/oauth2-authorization-server/src/main/java/org/springframework/security/oauth2/server/authorization/authentication/OAuth2AuthorizationConsentAuthenticationToken.java
@@ -74,9 +74,9 @@ public class OAuth2AuthorizationConsentAuthenticationToken extends AbstractAuthe
this.clientId = clientId;
this.principal = principal;
this.state = state;
- this.scopes = Collections.unmodifiableSet(scopes != null ? new HashSet<>(scopes) : Collections.emptySet());
+ this.scopes = Collections.unmodifiableSet((scopes != null) ? new HashSet<>(scopes) : Collections.emptySet());
this.additionalParameters = Collections.unmodifiableMap(
- additionalParameters != null ? new HashMap<>(additionalParameters) : Collections.emptyMap());
+ (additionalParameters != null) ? new HashMap<>(additionalParameters) : Collections.emptyMap());
setAuthenticated(true);
}
diff --git a/oauth2-authorization-server/src/main/java/org/springframework/security/oauth2/server/authorization/authentication/OAuth2AuthorizationGrantAuthenticationToken.java b/oauth2-authorization-server/src/main/java/org/springframework/security/oauth2/server/authorization/authentication/OAuth2AuthorizationGrantAuthenticationToken.java
index 59f4e4b5..df49fd4a 100644
--- a/oauth2-authorization-server/src/main/java/org/springframework/security/oauth2/server/authorization/authentication/OAuth2AuthorizationGrantAuthenticationToken.java
+++ b/oauth2-authorization-server/src/main/java/org/springframework/security/oauth2/server/authorization/authentication/OAuth2AuthorizationGrantAuthenticationToken.java
@@ -62,7 +62,7 @@ public class OAuth2AuthorizationGrantAuthenticationToken extends AbstractAuthent
this.authorizationGrantType = authorizationGrantType;
this.clientPrincipal = clientPrincipal;
this.additionalParameters = Collections.unmodifiableMap(
- additionalParameters != null ? new HashMap<>(additionalParameters) : Collections.emptyMap());
+ (additionalParameters != null) ? new HashMap<>(additionalParameters) : Collections.emptyMap());
}
/**
diff --git a/oauth2-authorization-server/src/main/java/org/springframework/security/oauth2/server/authorization/authentication/OAuth2ClientAuthenticationToken.java b/oauth2-authorization-server/src/main/java/org/springframework/security/oauth2/server/authorization/authentication/OAuth2ClientAuthenticationToken.java
index cd898750..7a5c7e7d 100644
--- a/oauth2-authorization-server/src/main/java/org/springframework/security/oauth2/server/authorization/authentication/OAuth2ClientAuthenticationToken.java
+++ b/oauth2-authorization-server/src/main/java/org/springframework/security/oauth2/server/authorization/authentication/OAuth2ClientAuthenticationToken.java
@@ -73,7 +73,7 @@ public class OAuth2ClientAuthenticationToken extends AbstractAuthenticationToken
this.clientAuthenticationMethod = clientAuthenticationMethod;
this.credentials = credentials;
this.additionalParameters = Collections
- .unmodifiableMap(additionalParameters != null ? additionalParameters : Collections.emptyMap());
+ .unmodifiableMap((additionalParameters != null) ? additionalParameters : Collections.emptyMap());
}
/**
diff --git a/oauth2-authorization-server/src/main/java/org/springframework/security/oauth2/server/authorization/authentication/OAuth2ClientCredentialsAuthenticationProvider.java b/oauth2-authorization-server/src/main/java/org/springframework/security/oauth2/server/authorization/authentication/OAuth2ClientCredentialsAuthenticationProvider.java
index c8fcf167..192952e2 100644
--- a/oauth2-authorization-server/src/main/java/org/springframework/security/oauth2/server/authorization/authentication/OAuth2ClientCredentialsAuthenticationProvider.java
+++ b/oauth2-authorization-server/src/main/java/org/springframework/security/oauth2/server/authorization/authentication/OAuth2ClientCredentialsAuthenticationProvider.java
@@ -43,8 +43,6 @@ import org.springframework.security.oauth2.server.authorization.token.OAuth2Toke
import org.springframework.util.Assert;
import org.springframework.util.CollectionUtils;
-import static org.springframework.security.oauth2.server.authorization.authentication.OAuth2AuthenticationProviderUtils.getAuthenticatedClientElseThrowInvalidClient;
-
/**
* An {@link AuthenticationProvider} implementation for the OAuth 2.0 Client Credentials
* Grant.
@@ -92,8 +90,8 @@ public final class OAuth2ClientCredentialsAuthenticationProvider implements Auth
public Authentication authenticate(Authentication authentication) throws AuthenticationException {
OAuth2ClientCredentialsAuthenticationToken clientCredentialsAuthentication = (OAuth2ClientCredentialsAuthenticationToken) authentication;
- OAuth2ClientAuthenticationToken clientPrincipal = getAuthenticatedClientElseThrowInvalidClient(
- clientCredentialsAuthentication);
+ OAuth2ClientAuthenticationToken clientPrincipal = OAuth2AuthenticationProviderUtils
+ .getAuthenticatedClientElseThrowInvalidClient(clientCredentialsAuthentication);
RegisteredClient registeredClient = clientPrincipal.getRegisteredClient();
if (this.logger.isTraceEnabled()) {
diff --git a/oauth2-authorization-server/src/main/java/org/springframework/security/oauth2/server/authorization/authentication/OAuth2ClientCredentialsAuthenticationToken.java b/oauth2-authorization-server/src/main/java/org/springframework/security/oauth2/server/authorization/authentication/OAuth2ClientCredentialsAuthenticationToken.java
index 59ef7d3a..71c58338 100644
--- a/oauth2-authorization-server/src/main/java/org/springframework/security/oauth2/server/authorization/authentication/OAuth2ClientCredentialsAuthenticationToken.java
+++ b/oauth2-authorization-server/src/main/java/org/springframework/security/oauth2/server/authorization/authentication/OAuth2ClientCredentialsAuthenticationToken.java
@@ -47,7 +47,7 @@ public class OAuth2ClientCredentialsAuthenticationToken extends OAuth2Authorizat
public OAuth2ClientCredentialsAuthenticationToken(Authentication clientPrincipal, @Nullable Set scopes,
@Nullable Map additionalParameters) {
super(AuthorizationGrantType.CLIENT_CREDENTIALS, clientPrincipal, additionalParameters);
- this.scopes = Collections.unmodifiableSet(scopes != null ? new HashSet<>(scopes) : Collections.emptySet());
+ this.scopes = Collections.unmodifiableSet((scopes != null) ? new HashSet<>(scopes) : Collections.emptySet());
}
/**
diff --git a/oauth2-authorization-server/src/main/java/org/springframework/security/oauth2/server/authorization/authentication/OAuth2DeviceAuthorizationConsentAuthenticationProvider.java b/oauth2-authorization-server/src/main/java/org/springframework/security/oauth2/server/authorization/authentication/OAuth2DeviceAuthorizationConsentAuthenticationProvider.java
index 38f15c7b..55978f0a 100644
--- a/oauth2-authorization-server/src/main/java/org/springframework/security/oauth2/server/authorization/authentication/OAuth2DeviceAuthorizationConsentAuthenticationProvider.java
+++ b/oauth2-authorization-server/src/main/java/org/springframework/security/oauth2/server/authorization/authentication/OAuth2DeviceAuthorizationConsentAuthenticationProvider.java
@@ -133,7 +133,7 @@ public final class OAuth2DeviceAuthorizationConsentAuthenticationProvider implem
OAuth2AuthorizationConsent currentAuthorizationConsent = this.authorizationConsentService
.findById(authorization.getRegisteredClientId(), principal.getName());
- Set currentAuthorizedScopes = currentAuthorizationConsent != null
+ Set currentAuthorizedScopes = (currentAuthorizationConsent != null)
? currentAuthorizationConsent.getScopes() : Collections.emptySet();
if (!currentAuthorizedScopes.isEmpty()) {
@@ -187,11 +187,11 @@ public final class OAuth2DeviceAuthorizationConsentAuthenticationProvider implem
}
}
authorization = OAuth2Authorization.from(authorization)
- .token(deviceCodeToken.getToken(),
- metadata -> metadata.put(OAuth2Authorization.Token.INVALIDATED_METADATA_NAME, true))
- .token(userCodeToken.getToken(),
- metadata -> metadata.put(OAuth2Authorization.Token.INVALIDATED_METADATA_NAME, true))
- .attributes(attrs -> attrs.remove(OAuth2ParameterNames.STATE))
+ .token((deviceCodeToken.getToken()),
+ (metadata) -> metadata.put(OAuth2Authorization.Token.INVALIDATED_METADATA_NAME, true))
+ .token((userCodeToken.getToken()),
+ (metadata) -> metadata.put(OAuth2Authorization.Token.INVALIDATED_METADATA_NAME, true))
+ .attributes((attrs) -> attrs.remove(OAuth2ParameterNames.STATE))
.build();
this.authorizationService.save(authorization);
if (this.logger.isTraceEnabled()) {
@@ -210,10 +210,10 @@ public final class OAuth2DeviceAuthorizationConsentAuthenticationProvider implem
authorization = OAuth2Authorization.from(authorization)
.authorizedScopes(authorizedScopes)
- .token(userCodeToken.getToken(),
- metadata -> metadata.put(OAuth2Authorization.Token.INVALIDATED_METADATA_NAME, true))
- .attributes(attrs -> attrs.remove(OAuth2ParameterNames.STATE))
- .attributes(attrs -> attrs.remove(OAuth2ParameterNames.SCOPE))
+ .token((userCodeToken.getToken()),
+ (metadata) -> metadata.put(OAuth2Authorization.Token.INVALIDATED_METADATA_NAME, true))
+ .attributes((attrs) -> attrs.remove(OAuth2ParameterNames.STATE))
+ .attributes((attrs) -> attrs.remove(OAuth2ParameterNames.SCOPE))
.build();
this.authorizationService.save(authorization);
diff --git a/oauth2-authorization-server/src/main/java/org/springframework/security/oauth2/server/authorization/authentication/OAuth2DeviceAuthorizationConsentAuthenticationToken.java b/oauth2-authorization-server/src/main/java/org/springframework/security/oauth2/server/authorization/authentication/OAuth2DeviceAuthorizationConsentAuthenticationToken.java
index 12d34272..825ee536 100644
--- a/oauth2-authorization-server/src/main/java/org/springframework/security/oauth2/server/authorization/authentication/OAuth2DeviceAuthorizationConsentAuthenticationToken.java
+++ b/oauth2-authorization-server/src/main/java/org/springframework/security/oauth2/server/authorization/authentication/OAuth2DeviceAuthorizationConsentAuthenticationToken.java
@@ -82,7 +82,7 @@ public class OAuth2DeviceAuthorizationConsentAuthenticationToken extends OAuth2A
Assert.hasText(userCode, "userCode cannot be empty");
this.userCode = userCode;
this.requestedScopes = Collections
- .unmodifiableSet(requestedScopes != null ? new HashSet<>(requestedScopes) : Collections.emptySet());
+ .unmodifiableSet((requestedScopes != null) ? new HashSet<>(requestedScopes) : Collections.emptySet());
setAuthenticated(true);
}
diff --git a/oauth2-authorization-server/src/main/java/org/springframework/security/oauth2/server/authorization/authentication/OAuth2DeviceAuthorizationRequestAuthenticationProvider.java b/oauth2-authorization-server/src/main/java/org/springframework/security/oauth2/server/authorization/authentication/OAuth2DeviceAuthorizationRequestAuthenticationProvider.java
index 610c7c46..2a4164b7 100644
--- a/oauth2-authorization-server/src/main/java/org/springframework/security/oauth2/server/authorization/authentication/OAuth2DeviceAuthorizationRequestAuthenticationProvider.java
+++ b/oauth2-authorization-server/src/main/java/org/springframework/security/oauth2/server/authorization/authentication/OAuth2DeviceAuthorizationRequestAuthenticationProvider.java
@@ -49,8 +49,6 @@ import org.springframework.security.oauth2.server.authorization.token.OAuth2Toke
import org.springframework.util.Assert;
import org.springframework.util.CollectionUtils;
-import static org.springframework.security.oauth2.server.authorization.authentication.OAuth2AuthenticationProviderUtils.getAuthenticatedClientElseThrowInvalidClient;
-
/**
* An {@link AuthenticationProvider} implementation for the Device Authorization Request
* used in the OAuth 2.0 Device Authorization Grant.
@@ -97,8 +95,8 @@ public final class OAuth2DeviceAuthorizationRequestAuthenticationProvider implem
public Authentication authenticate(Authentication authentication) throws AuthenticationException {
OAuth2DeviceAuthorizationRequestAuthenticationToken deviceAuthorizationRequestAuthentication = (OAuth2DeviceAuthorizationRequestAuthenticationToken) authentication;
- OAuth2ClientAuthenticationToken clientPrincipal = getAuthenticatedClientElseThrowInvalidClient(
- deviceAuthorizationRequestAuthentication);
+ OAuth2ClientAuthenticationToken clientPrincipal = OAuth2AuthenticationProviderUtils
+ .getAuthenticatedClientElseThrowInvalidClient(deviceAuthorizationRequestAuthentication);
RegisteredClient registeredClient = clientPrincipal.getRegisteredClient();
if (this.logger.isTraceEnabled()) {
diff --git a/oauth2-authorization-server/src/main/java/org/springframework/security/oauth2/server/authorization/authentication/OAuth2DeviceAuthorizationRequestAuthenticationToken.java b/oauth2-authorization-server/src/main/java/org/springframework/security/oauth2/server/authorization/authentication/OAuth2DeviceAuthorizationRequestAuthenticationToken.java
index 7d4a7e91..883b4a97 100644
--- a/oauth2-authorization-server/src/main/java/org/springframework/security/oauth2/server/authorization/authentication/OAuth2DeviceAuthorizationRequestAuthenticationToken.java
+++ b/oauth2-authorization-server/src/main/java/org/springframework/security/oauth2/server/authorization/authentication/OAuth2DeviceAuthorizationRequestAuthenticationToken.java
@@ -70,9 +70,9 @@ public class OAuth2DeviceAuthorizationRequestAuthenticationToken extends Abstrac
Assert.hasText(authorizationUri, "authorizationUri cannot be empty");
this.clientPrincipal = clientPrincipal;
this.authorizationUri = authorizationUri;
- this.scopes = Collections.unmodifiableSet(scopes != null ? new HashSet<>(scopes) : Collections.emptySet());
+ this.scopes = Collections.unmodifiableSet((scopes != null) ? new HashSet<>(scopes) : Collections.emptySet());
this.additionalParameters = Collections.unmodifiableMap(
- additionalParameters != null ? new HashMap<>(additionalParameters) : Collections.emptyMap());
+ (additionalParameters != null) ? new HashMap<>(additionalParameters) : Collections.emptyMap());
this.deviceCode = null;
this.userCode = null;
}
@@ -92,7 +92,7 @@ public class OAuth2DeviceAuthorizationRequestAuthenticationToken extends Abstrac
Assert.notNull(deviceCode, "deviceCode cannot be null");
Assert.notNull(userCode, "userCode cannot be null");
this.clientPrincipal = clientPrincipal;
- this.scopes = Collections.unmodifiableSet(scopes != null ? new HashSet<>(scopes) : Collections.emptySet());
+ this.scopes = Collections.unmodifiableSet((scopes != null) ? new HashSet<>(scopes) : Collections.emptySet());
this.deviceCode = deviceCode;
this.userCode = userCode;
this.authorizationUri = null;
diff --git a/oauth2-authorization-server/src/main/java/org/springframework/security/oauth2/server/authorization/authentication/OAuth2DeviceCodeAuthenticationProvider.java b/oauth2-authorization-server/src/main/java/org/springframework/security/oauth2/server/authorization/authentication/OAuth2DeviceCodeAuthenticationProvider.java
index 6e5b51be..63826aa7 100644
--- a/oauth2-authorization-server/src/main/java/org/springframework/security/oauth2/server/authorization/authentication/OAuth2DeviceCodeAuthenticationProvider.java
+++ b/oauth2-authorization-server/src/main/java/org/springframework/security/oauth2/server/authorization/authentication/OAuth2DeviceCodeAuthenticationProvider.java
@@ -45,8 +45,6 @@ import org.springframework.security.oauth2.server.authorization.token.OAuth2Toke
import org.springframework.security.oauth2.server.authorization.token.OAuth2TokenGenerator;
import org.springframework.util.Assert;
-import static org.springframework.security.oauth2.server.authorization.authentication.OAuth2AuthenticationProviderUtils.getAuthenticatedClientElseThrowInvalidClient;
-
/**
* An {@link AuthenticationProvider} implementation for the Device Access Token Request
* used in the OAuth 2.0 Device Authorization Grant.
@@ -102,8 +100,8 @@ public final class OAuth2DeviceCodeAuthenticationProvider implements Authenticat
public Authentication authenticate(Authentication authentication) throws AuthenticationException {
OAuth2DeviceCodeAuthenticationToken deviceCodeAuthentication = (OAuth2DeviceCodeAuthenticationToken) authentication;
- OAuth2ClientAuthenticationToken clientPrincipal = getAuthenticatedClientElseThrowInvalidClient(
- deviceCodeAuthentication);
+ OAuth2ClientAuthenticationToken clientPrincipal = OAuth2AuthenticationProviderUtils
+ .getAuthenticatedClientElseThrowInvalidClient(deviceCodeAuthentication);
RegisteredClient registeredClient = clientPrincipal.getRegisteredClient();
if (this.logger.isTraceEnabled()) {
@@ -203,7 +201,7 @@ public final class OAuth2DeviceCodeAuthenticationProvider implements Authenticat
// @formatter:off
OAuth2Authorization.Builder authorizationBuilder = OAuth2Authorization.from(authorization)
// Invalidate the device code as it can only be used (successfully) once
- .token(deviceCode.getToken(), metadata ->
+ .token(deviceCode.getToken(), (metadata) ->
metadata.put(OAuth2Authorization.Token.INVALIDATED_METADATA_NAME, true));
// @formatter:on
diff --git a/oauth2-authorization-server/src/main/java/org/springframework/security/oauth2/server/authorization/authentication/OAuth2DeviceVerificationAuthenticationProvider.java b/oauth2-authorization-server/src/main/java/org/springframework/security/oauth2/server/authorization/authentication/OAuth2DeviceVerificationAuthenticationProvider.java
index 519dbe1a..6dc4e2de 100644
--- a/oauth2-authorization-server/src/main/java/org/springframework/security/oauth2/server/authorization/authentication/OAuth2DeviceVerificationAuthenticationProvider.java
+++ b/oauth2-authorization-server/src/main/java/org/springframework/security/oauth2/server/authorization/authentication/OAuth2DeviceVerificationAuthenticationProvider.java
@@ -149,7 +149,7 @@ public final class OAuth2DeviceVerificationAuthenticationProvider implements Aut
this.logger.trace("Saved authorization");
}
- Set currentAuthorizedScopes = currentAuthorizationConsent != null
+ Set currentAuthorizedScopes = (currentAuthorizationConsent != null)
? currentAuthorizationConsent.getScopes() : null;
AuthorizationServerSettings authorizationServerSettings = AuthorizationServerContextHolder.getContext()
@@ -166,10 +166,10 @@ public final class OAuth2DeviceVerificationAuthenticationProvider implements Aut
authorization = OAuth2Authorization.from(authorization)
.principalName(principal.getName())
.authorizedScopes(requestedScopes)
- .token(userCode.getToken(), metadata -> metadata
+ .token(userCode.getToken(), (metadata) -> metadata
.put(OAuth2Authorization.Token.INVALIDATED_METADATA_NAME, true))
.attribute(Principal.class.getName(), principal)
- .attributes(attributes -> attributes.remove(OAuth2ParameterNames.SCOPE))
+ .attributes((attributes) -> attributes.remove(OAuth2ParameterNames.SCOPE))
.build();
// @formatter:on
this.authorizationService.save(authorization);
diff --git a/oauth2-authorization-server/src/main/java/org/springframework/security/oauth2/server/authorization/authentication/OAuth2DeviceVerificationAuthenticationToken.java b/oauth2-authorization-server/src/main/java/org/springframework/security/oauth2/server/authorization/authentication/OAuth2DeviceVerificationAuthenticationToken.java
index 28f08f43..114d11b3 100644
--- a/oauth2-authorization-server/src/main/java/org/springframework/security/oauth2/server/authorization/authentication/OAuth2DeviceVerificationAuthenticationToken.java
+++ b/oauth2-authorization-server/src/main/java/org/springframework/security/oauth2/server/authorization/authentication/OAuth2DeviceVerificationAuthenticationToken.java
@@ -61,7 +61,7 @@ public class OAuth2DeviceVerificationAuthenticationToken extends AbstractAuthent
this.principal = principal;
this.userCode = userCode;
this.additionalParameters = Collections.unmodifiableMap(
- additionalParameters != null ? new HashMap<>(additionalParameters) : Collections.emptyMap());
+ (additionalParameters != null) ? new HashMap<>(additionalParameters) : Collections.emptyMap());
this.clientId = null;
}
diff --git a/oauth2-authorization-server/src/main/java/org/springframework/security/oauth2/server/authorization/authentication/OAuth2RefreshTokenAuthenticationProvider.java b/oauth2-authorization-server/src/main/java/org/springframework/security/oauth2/server/authorization/authentication/OAuth2RefreshTokenAuthenticationProvider.java
index 7f255b93..3005ce02 100644
--- a/oauth2-authorization-server/src/main/java/org/springframework/security/oauth2/server/authorization/authentication/OAuth2RefreshTokenAuthenticationProvider.java
+++ b/oauth2-authorization-server/src/main/java/org/springframework/security/oauth2/server/authorization/authentication/OAuth2RefreshTokenAuthenticationProvider.java
@@ -49,8 +49,6 @@ import org.springframework.security.oauth2.server.authorization.token.OAuth2Toke
import org.springframework.security.oauth2.server.authorization.token.OAuth2TokenGenerator;
import org.springframework.util.Assert;
-import static org.springframework.security.oauth2.server.authorization.authentication.OAuth2AuthenticationProviderUtils.getAuthenticatedClientElseThrowInvalidClient;
-
/**
* An {@link AuthenticationProvider} implementation for the OAuth 2.0 Refresh Token Grant.
*
@@ -100,8 +98,8 @@ public final class OAuth2RefreshTokenAuthenticationProvider implements Authentic
public Authentication authenticate(Authentication authentication) throws AuthenticationException {
OAuth2RefreshTokenAuthenticationToken refreshTokenAuthentication = (OAuth2RefreshTokenAuthenticationToken) authentication;
- OAuth2ClientAuthenticationToken clientPrincipal = getAuthenticatedClientElseThrowInvalidClient(
- refreshTokenAuthentication);
+ OAuth2ClientAuthenticationToken clientPrincipal = OAuth2AuthenticationProviderUtils
+ .getAuthenticatedClientElseThrowInvalidClient(refreshTokenAuthentication);
RegisteredClient registeredClient = clientPrincipal.getRegisteredClient();
if (this.logger.isTraceEnabled()) {
diff --git a/oauth2-authorization-server/src/main/java/org/springframework/security/oauth2/server/authorization/authentication/OAuth2RefreshTokenAuthenticationToken.java b/oauth2-authorization-server/src/main/java/org/springframework/security/oauth2/server/authorization/authentication/OAuth2RefreshTokenAuthenticationToken.java
index 19209c4a..a216854c 100644
--- a/oauth2-authorization-server/src/main/java/org/springframework/security/oauth2/server/authorization/authentication/OAuth2RefreshTokenAuthenticationToken.java
+++ b/oauth2-authorization-server/src/main/java/org/springframework/security/oauth2/server/authorization/authentication/OAuth2RefreshTokenAuthenticationToken.java
@@ -52,7 +52,7 @@ public class OAuth2RefreshTokenAuthenticationToken extends OAuth2AuthorizationGr
super(AuthorizationGrantType.REFRESH_TOKEN, clientPrincipal, additionalParameters);
Assert.hasText(refreshToken, "refreshToken cannot be empty");
this.refreshToken = refreshToken;
- this.scopes = Collections.unmodifiableSet(scopes != null ? new HashSet<>(scopes) : Collections.emptySet());
+ this.scopes = Collections.unmodifiableSet((scopes != null) ? new HashSet<>(scopes) : Collections.emptySet());
}
/**
diff --git a/oauth2-authorization-server/src/main/java/org/springframework/security/oauth2/server/authorization/authentication/OAuth2TokenIntrospectionAuthenticationProvider.java b/oauth2-authorization-server/src/main/java/org/springframework/security/oauth2/server/authorization/authentication/OAuth2TokenIntrospectionAuthenticationProvider.java
index 15ad6f05..2bb28427 100644
--- a/oauth2-authorization-server/src/main/java/org/springframework/security/oauth2/server/authorization/authentication/OAuth2TokenIntrospectionAuthenticationProvider.java
+++ b/oauth2-authorization-server/src/main/java/org/springframework/security/oauth2/server/authorization/authentication/OAuth2TokenIntrospectionAuthenticationProvider.java
@@ -39,8 +39,6 @@ import org.springframework.security.oauth2.server.authorization.client.Registere
import org.springframework.util.Assert;
import org.springframework.util.CollectionUtils;
-import static org.springframework.security.oauth2.server.authorization.authentication.OAuth2AuthenticationProviderUtils.getAuthenticatedClientElseThrowInvalidClient;
-
/**
* An {@link AuthenticationProvider} implementation for OAuth 2.0 Token Introspection.
*
@@ -84,8 +82,8 @@ public final class OAuth2TokenIntrospectionAuthenticationProvider implements Aut
public Authentication authenticate(Authentication authentication) throws AuthenticationException {
OAuth2TokenIntrospectionAuthenticationToken tokenIntrospectionAuthentication = (OAuth2TokenIntrospectionAuthenticationToken) authentication;
- OAuth2ClientAuthenticationToken clientPrincipal = getAuthenticatedClientElseThrowInvalidClient(
- tokenIntrospectionAuthentication);
+ OAuth2ClientAuthenticationToken clientPrincipal = OAuth2AuthenticationProviderUtils
+ .getAuthenticatedClientElseThrowInvalidClient(tokenIntrospectionAuthentication);
OAuth2Authorization authorization = this.authorizationService
.findByToken(tokenIntrospectionAuthentication.getToken(), null);
diff --git a/oauth2-authorization-server/src/main/java/org/springframework/security/oauth2/server/authorization/authentication/OAuth2TokenIntrospectionAuthenticationToken.java b/oauth2-authorization-server/src/main/java/org/springframework/security/oauth2/server/authorization/authentication/OAuth2TokenIntrospectionAuthenticationToken.java
index eb97771a..dff4a81e 100644
--- a/oauth2-authorization-server/src/main/java/org/springframework/security/oauth2/server/authorization/authentication/OAuth2TokenIntrospectionAuthenticationToken.java
+++ b/oauth2-authorization-server/src/main/java/org/springframework/security/oauth2/server/authorization/authentication/OAuth2TokenIntrospectionAuthenticationToken.java
@@ -67,7 +67,7 @@ public class OAuth2TokenIntrospectionAuthenticationToken extends AbstractAuthent
this.clientPrincipal = clientPrincipal;
this.tokenTypeHint = tokenTypeHint;
this.additionalParameters = Collections.unmodifiableMap(
- additionalParameters != null ? new HashMap<>(additionalParameters) : Collections.emptyMap());
+ (additionalParameters != null) ? new HashMap<>(additionalParameters) : Collections.emptyMap());
this.tokenClaims = OAuth2TokenIntrospection.builder().build();
}
diff --git a/oauth2-authorization-server/src/main/java/org/springframework/security/oauth2/server/authorization/authentication/OAuth2TokenRevocationAuthenticationProvider.java b/oauth2-authorization-server/src/main/java/org/springframework/security/oauth2/server/authorization/authentication/OAuth2TokenRevocationAuthenticationProvider.java
index 7f6699b9..604d7fba 100644
--- a/oauth2-authorization-server/src/main/java/org/springframework/security/oauth2/server/authorization/authentication/OAuth2TokenRevocationAuthenticationProvider.java
+++ b/oauth2-authorization-server/src/main/java/org/springframework/security/oauth2/server/authorization/authentication/OAuth2TokenRevocationAuthenticationProvider.java
@@ -29,8 +29,6 @@ import org.springframework.security.oauth2.server.authorization.OAuth2Authorizat
import org.springframework.security.oauth2.server.authorization.client.RegisteredClient;
import org.springframework.util.Assert;
-import static org.springframework.security.oauth2.server.authorization.authentication.OAuth2AuthenticationProviderUtils.getAuthenticatedClientElseThrowInvalidClient;
-
/**
* An {@link AuthenticationProvider} implementation for OAuth 2.0 Token Revocation.
*
@@ -62,8 +60,8 @@ public final class OAuth2TokenRevocationAuthenticationProvider implements Authen
public Authentication authenticate(Authentication authentication) throws AuthenticationException {
OAuth2TokenRevocationAuthenticationToken tokenRevocationAuthentication = (OAuth2TokenRevocationAuthenticationToken) authentication;
- OAuth2ClientAuthenticationToken clientPrincipal = getAuthenticatedClientElseThrowInvalidClient(
- tokenRevocationAuthentication);
+ OAuth2ClientAuthenticationToken clientPrincipal = OAuth2AuthenticationProviderUtils
+ .getAuthenticatedClientElseThrowInvalidClient(tokenRevocationAuthentication);
RegisteredClient registeredClient = clientPrincipal.getRegisteredClient();
OAuth2Authorization authorization = this.authorizationService
diff --git a/oauth2-authorization-server/src/main/java/org/springframework/security/oauth2/server/authorization/client/InMemoryRegisteredClientRepository.java b/oauth2-authorization-server/src/main/java/org/springframework/security/oauth2/server/authorization/client/InMemoryRegisteredClientRepository.java
index e230b358..69d91745 100644
--- a/oauth2-authorization-server/src/main/java/org/springframework/security/oauth2/server/authorization/client/InMemoryRegisteredClientRepository.java
+++ b/oauth2-authorization-server/src/main/java/org/springframework/security/oauth2/server/authorization/client/InMemoryRegisteredClientRepository.java
@@ -34,9 +34,9 @@ import org.springframework.util.StringUtils;
* @author Anoop Garlapati
* @author Ovidiu Popa
* @author Joe Grandja
+ * @since 0.0.1
* @see RegisteredClientRepository
* @see RegisteredClient
- * @since 0.0.1
*/
public final class InMemoryRegisteredClientRepository implements RegisteredClientRepository {
@@ -98,7 +98,7 @@ public final class InMemoryRegisteredClientRepository implements RegisteredClien
private void assertUniqueIdentifiers(RegisteredClient registeredClient,
Map registrations) {
- registrations.values().forEach(registration -> {
+ registrations.values().forEach((registration) -> {
if (registeredClient.getId().equals(registration.getId())) {
throw new IllegalArgumentException("Registered client must be unique. " + "Found duplicate identifier: "
+ registeredClient.getId());
diff --git a/oauth2-authorization-server/src/main/java/org/springframework/security/oauth2/server/authorization/client/JdbcRegisteredClientRepository.java b/oauth2-authorization-server/src/main/java/org/springframework/security/oauth2/server/authorization/client/JdbcRegisteredClientRepository.java
index c4faf0fe..d14919f0 100644
--- a/oauth2-authorization-server/src/main/java/org/springframework/security/oauth2/server/authorization/client/JdbcRegisteredClientRepository.java
+++ b/oauth2-authorization-server/src/main/java/org/springframework/security/oauth2/server/authorization/client/JdbcRegisteredClientRepository.java
@@ -262,15 +262,15 @@ public class JdbcRegisteredClientRepository implements RegisteredClientRepositor
// @formatter:off
RegisteredClient.Builder builder = RegisteredClient.withId(rs.getString("id"))
.clientId(rs.getString("client_id"))
- .clientIdIssuedAt(clientIdIssuedAt != null ? clientIdIssuedAt.toInstant() : null)
+ .clientIdIssuedAt((clientIdIssuedAt != null) ? clientIdIssuedAt.toInstant() : null)
.clientSecret(rs.getString("client_secret"))
- .clientSecretExpiresAt(clientSecretExpiresAt != null ? clientSecretExpiresAt.toInstant() : null)
+ .clientSecretExpiresAt((clientSecretExpiresAt != null) ? clientSecretExpiresAt.toInstant() : null)
.clientName(rs.getString("client_name"))
.clientAuthenticationMethods((authenticationMethods) ->
- clientAuthenticationMethods.forEach(authenticationMethod ->
+ clientAuthenticationMethods.forEach((authenticationMethod) ->
authenticationMethods.add(resolveClientAuthenticationMethod(authenticationMethod))))
.authorizationGrantTypes((grantTypes) ->
- authorizationGrantTypes.forEach(grantType ->
+ authorizationGrantTypes.forEach((grantType) ->
grantTypes.add(resolveAuthorizationGrantType(grantType))))
.redirectUris((uris) -> uris.addAll(redirectUris))
.postLogoutRedirectUris((uris) -> uris.addAll(postLogoutRedirectUris))
@@ -357,22 +357,22 @@ public class JdbcRegisteredClientRepository implements RegisteredClientRepositor
@Override
public List apply(RegisteredClient registeredClient) {
- Timestamp clientIdIssuedAt = registeredClient.getClientIdIssuedAt() != null
+ Timestamp clientIdIssuedAt = (registeredClient.getClientIdIssuedAt() != null)
? Timestamp.from(registeredClient.getClientIdIssuedAt()) : Timestamp.from(Instant.now());
- Timestamp clientSecretExpiresAt = registeredClient.getClientSecretExpiresAt() != null
+ Timestamp clientSecretExpiresAt = (registeredClient.getClientSecretExpiresAt() != null)
? Timestamp.from(registeredClient.getClientSecretExpiresAt()) : null;
List clientAuthenticationMethods = new ArrayList<>(
registeredClient.getClientAuthenticationMethods().size());
registeredClient.getClientAuthenticationMethods()
- .forEach(clientAuthenticationMethod -> clientAuthenticationMethods
+ .forEach((clientAuthenticationMethod) -> clientAuthenticationMethods
.add(clientAuthenticationMethod.getValue()));
List authorizationGrantTypes = new ArrayList<>(
registeredClient.getAuthorizationGrantTypes().size());
registeredClient.getAuthorizationGrantTypes()
- .forEach(authorizationGrantType -> authorizationGrantTypes.add(authorizationGrantType.getValue()));
+ .forEach((authorizationGrantType) -> authorizationGrantTypes.add(authorizationGrantType.getValue()));
return Arrays.asList(new SqlParameterValue(Types.VARCHAR, registeredClient.getId()),
new SqlParameterValue(Types.VARCHAR, registeredClient.getClientId()),
diff --git a/oauth2-authorization-server/src/main/java/org/springframework/security/oauth2/server/authorization/client/RegisteredClient.java b/oauth2-authorization-server/src/main/java/org/springframework/security/oauth2/server/authorization/client/RegisteredClient.java
index f21e2851..bb5918d7 100644
--- a/oauth2-authorization-server/src/main/java/org/springframework/security/oauth2/server/authorization/client/RegisteredClient.java
+++ b/oauth2-authorization-server/src/main/java/org/springframework/security/oauth2/server/authorization/client/RegisteredClient.java
@@ -40,9 +40,9 @@ import org.springframework.util.StringUtils;
*
* @author Joe Grandja
* @author Anoop Garlapati
+ * @since 0.0.1
* @see Section 2
* Client Registration
- * @since 0.0.1
*/
public class RegisteredClient implements Serializable {
@@ -594,7 +594,7 @@ public class RegisteredClient implements Serializable {
private static boolean validateScope(String scope) {
return scope == null || scope.chars()
- .allMatch(c -> withinTheRangeOf(c, 0x21, 0x21) || withinTheRangeOf(c, 0x23, 0x5B)
+ .allMatch((c) -> withinTheRangeOf(c, 0x21, 0x21) || withinTheRangeOf(c, 0x23, 0x5B)
|| withinTheRangeOf(c, 0x5D, 0x7E));
}
diff --git a/oauth2-authorization-server/src/main/java/org/springframework/security/oauth2/server/authorization/client/RegisteredClientRepository.java b/oauth2-authorization-server/src/main/java/org/springframework/security/oauth2/server/authorization/client/RegisteredClientRepository.java
index e9045852..66ffdeb7 100644
--- a/oauth2-authorization-server/src/main/java/org/springframework/security/oauth2/server/authorization/client/RegisteredClientRepository.java
+++ b/oauth2-authorization-server/src/main/java/org/springframework/security/oauth2/server/authorization/client/RegisteredClientRepository.java
@@ -23,8 +23,8 @@ import org.springframework.lang.Nullable;
* @author Joe Grandja
* @author Anoop Garlapati
* @author Ovidiu Popa
- * @see RegisteredClient
* @since 0.0.1
+ * @see RegisteredClient
*/
public interface RegisteredClientRepository {
diff --git a/oauth2-authorization-server/src/main/java/org/springframework/security/oauth2/server/authorization/config/annotation/web/configuration/OAuth2AuthorizationServerConfiguration.java b/oauth2-authorization-server/src/main/java/org/springframework/security/oauth2/server/authorization/config/annotation/web/configuration/OAuth2AuthorizationServerConfiguration.java
index 2dbb7b67..3af6b56d 100644
--- a/oauth2-authorization-server/src/main/java/org/springframework/security/oauth2/server/authorization/config/annotation/web/configuration/OAuth2AuthorizationServerConfiguration.java
+++ b/oauth2-authorization-server/src/main/java/org/springframework/security/oauth2/server/authorization/config/annotation/web/configuration/OAuth2AuthorizationServerConfiguration.java
@@ -64,10 +64,10 @@ public class OAuth2AuthorizationServerConfiguration {
http
.securityMatcher(endpointsMatcher)
- .authorizeHttpRequests(authorize ->
+ .authorizeHttpRequests((authorize) ->
authorize.anyRequest().authenticated()
)
- .csrf(csrf -> csrf.ignoringRequestMatchers(endpointsMatcher))
+ .csrf((csrf) -> csrf.ignoringRequestMatchers(endpointsMatcher))
.apply(authorizationServerConfigurer);
}
// @formatter:on
diff --git a/oauth2-authorization-server/src/main/java/org/springframework/security/oauth2/server/authorization/config/annotation/web/configurers/AuthorizationServerContextFilter.java b/oauth2-authorization-server/src/main/java/org/springframework/security/oauth2/server/authorization/config/annotation/web/configurers/AuthorizationServerContextFilter.java
index 3f7a4f3a..331b6723 100644
--- a/oauth2-authorization-server/src/main/java/org/springframework/security/oauth2/server/authorization/config/annotation/web/configurers/AuthorizationServerContextFilter.java
+++ b/oauth2-authorization-server/src/main/java/org/springframework/security/oauth2/server/authorization/config/annotation/web/configurers/AuthorizationServerContextFilter.java
@@ -67,7 +67,7 @@ final class AuthorizationServerContextFilter extends OncePerRequestFilter {
private static String resolveIssuer(AuthorizationServerSettings authorizationServerSettings,
HttpServletRequest request) {
- return authorizationServerSettings.getIssuer() != null ? authorizationServerSettings.getIssuer()
+ return (authorizationServerSettings.getIssuer() != null) ? authorizationServerSettings.getIssuer()
: getContextPath(request);
}
diff --git a/oauth2-authorization-server/src/main/java/org/springframework/security/oauth2/server/authorization/config/annotation/web/configurers/OAuth2AuthorizationEndpointConfigurer.java b/oauth2-authorization-server/src/main/java/org/springframework/security/oauth2/server/authorization/config/annotation/web/configurers/OAuth2AuthorizationEndpointConfigurer.java
index d2fc4213..595bc797 100644
--- a/oauth2-authorization-server/src/main/java/org/springframework/security/oauth2/server/authorization/config/annotation/web/configurers/OAuth2AuthorizationEndpointConfigurer.java
+++ b/oauth2-authorization-server/src/main/java/org/springframework/security/oauth2/server/authorization/config/annotation/web/configurers/OAuth2AuthorizationEndpointConfigurer.java
@@ -86,6 +86,7 @@ public final class OAuth2AuthorizationEndpointConfigurer extends AbstractOAuth2C
/**
* Restrict for internal use only.
+ * @param objectPostProcessor an {@code ObjectPostProcessor}
*/
OAuth2AuthorizationEndpointConfigurer(ObjectPostProcessor