diff --git a/oauth2-authorization-server/src/main/java/org/springframework/security/oauth2/server/authorization/AuthorizationServerRuntimeHintsRegistrar.java b/oauth2-authorization-server/src/main/java/org/springframework/security/oauth2/server/authorization/AuthorizationServerRuntimeHintsRegistrar.java
deleted file mode 100644
index 06c162f7..00000000
--- a/oauth2-authorization-server/src/main/java/org/springframework/security/oauth2/server/authorization/AuthorizationServerRuntimeHintsRegistrar.java
+++ /dev/null
@@ -1,156 +0,0 @@
-/*
- * Copyright 2020-2021 the original author or authors.
- *
- * Licensed under the Apache License, Version 2.0 (the "License");
- * you may not use this file except in compliance with the License.
- * You may obtain a copy of the License at
- *
- * https://www.apache.org/licenses/LICENSE-2.0
- *
- * Unless required by applicable law or agreed to in writing, software
- * distributed under the License is distributed on an "AS IS" BASIS,
- * WITHOUT WARRANTIES OR CONDITIONS OF ANY KIND, either express or implied.
- * See the License for the specific language governing permissions and
- * limitations under the License.
- */
-package org.springframework.security.oauth2.server.authorization;
-
-import org.springframework.aot.hint.*;
-import org.springframework.security.authentication.AbstractAuthenticationToken;
-import org.springframework.security.authentication.UsernamePasswordAuthenticationToken;
-import org.springframework.security.core.authority.SimpleGrantedAuthority;
-import org.springframework.security.core.userdetails.User;
-import org.springframework.security.jackson2.CoreJackson2Module;
-import org.springframework.security.oauth2.core.AbstractOAuth2Token;
-import org.springframework.security.oauth2.core.AuthorizationGrantType;
-import org.springframework.security.oauth2.core.endpoint.OAuth2AuthorizationRequest;
-import org.springframework.security.oauth2.core.endpoint.OAuth2AuthorizationResponseType;
-import org.springframework.security.oauth2.core.oidc.OidcIdToken;
-import org.springframework.security.oauth2.core.oidc.OidcUserInfo;
-import org.springframework.security.oauth2.core.oidc.user.DefaultOidcUser;
-import org.springframework.security.oauth2.core.oidc.user.OidcUserAuthority;
-import org.springframework.security.oauth2.core.user.DefaultOAuth2User;
-import org.springframework.security.oauth2.core.user.OAuth2UserAuthority;
-import org.springframework.security.oauth2.server.authorization.jackson2.OAuth2AuthorizationServerJackson2Module;
-import org.springframework.security.oauth2.server.authorization.settings.OAuth2TokenFormat;
-import org.springframework.security.web.authentication.WebAuthenticationDetails;
-import org.springframework.security.web.jackson2.WebServletJackson2Module;
-import org.springframework.util.ClassUtils;
-
-import java.util.Arrays;
-import java.util.Collections;
-import java.util.HashSet;
-import java.util.Set;
-
-/**
- * {@link RuntimeHintsRegistrar} that registers {@link RuntimeHints} required for the
- * sample. Statically registered via META-INF/spring/aot.factories.
- *
- * @author Joe Grandja
- * @author Josh Long
- * @since 1.2
- */
-class AuthorizationServerRuntimeHintsRegistrar implements RuntimeHintsRegistrar {
-
- private final BindingReflectionHintsRegistrar reflectionHintsRegistrar = new BindingReflectionHintsRegistrar();
-
- @Override
- public void registerHints(RuntimeHints hints, ClassLoader classLoader) {
-
- // Collections -> UnmodifiableSet, UnmodifiableList, UnmodifiableMap,
- // UnmodifiableRandomAccessList, etc.
- hints.reflection().registerType(Collections.class, MemberCategory.DECLARED_CLASSES);
-
- // HashSet
- hints.reflection().registerType(HashSet.class, MemberCategory.DECLARED_FIELDS,
- MemberCategory.INVOKE_DECLARED_CONSTRUCTORS, MemberCategory.INVOKE_DECLARED_METHODS);
-
- // Spring Security and Spring Authorization Server
- if (ClassUtils.isPresent("org.springframework.security.oauth2.client.authentication.OAuth2AuthenticationToken",
- ClassUtils.getDefaultClassLoader()))
- hints.reflection().registerType(
- TypeReference
- .of("org.springframework.security.oauth2.client.authentication.OAuth2AuthenticationToken"),
- builder -> builder.withMembers(MemberCategory.DECLARED_FIELDS,
- MemberCategory.INVOKE_DECLARED_CONSTRUCTORS, MemberCategory.INVOKE_DECLARED_METHODS));
-
- hints.reflection().registerTypes(Arrays.asList(TypeReference.of(AbstractAuthenticationToken.class),
- TypeReference.of(WebAuthenticationDetails.class),
- TypeReference.of(UsernamePasswordAuthenticationToken.class), TypeReference.of(User.class),
- TypeReference.of(DefaultOidcUser.class), TypeReference.of(DefaultOAuth2User.class),
- TypeReference.of(OidcUserAuthority.class), TypeReference.of(OAuth2UserAuthority.class),
- TypeReference.of(SimpleGrantedAuthority.class), TypeReference.of(OidcIdToken.class),
- TypeReference.of(AbstractOAuth2Token.class), TypeReference.of(OidcUserInfo.class),
- TypeReference.of(OAuth2AuthorizationRequest.class), TypeReference.of(AuthorizationGrantType.class),
- TypeReference.of(OAuth2AuthorizationResponseType.class), TypeReference.of(OAuth2TokenFormat.class)),
- builder -> builder.withMembers(MemberCategory.DECLARED_FIELDS,
- MemberCategory.INVOKE_DECLARED_CONSTRUCTORS, MemberCategory.INVOKE_DECLARED_METHODS));
-
- // Jackson Modules - Spring Security and Spring Authorization Server
- hints.reflection().registerTypes(
- Set.of(CoreJackson2Module.class.getName(), WebServletJackson2Module.class.getName(),
- OAuth2AuthorizationServerJackson2Module.class.getName()).stream().map(TypeReference::of)
- .toList(),
- builder -> builder.withMembers(MemberCategory.DECLARED_FIELDS,
- MemberCategory.INVOKE_DECLARED_CONSTRUCTORS, MemberCategory.INVOKE_DECLARED_METHODS));
-
- if (ClassUtils.isPresent("org.springframework.security.oauth2.client.jackson2.OAuth2ClientJackson2Module",
- ClassUtils.getDefaultClassLoader()))
- hints.reflection().registerType(
- TypeReference.of("org.springframework.security.oauth2.client.jackson2.OAuth2ClientJackson2Module"),
- b -> b.withMembers(MemberCategory.DECLARED_FIELDS, MemberCategory.INVOKE_DECLARED_CONSTRUCTORS,
- MemberCategory.INVOKE_DECLARED_METHODS));
-
- hints.reflection().registerTypes(
- Set.of(CoreJackson2Module.class.getName(), WebServletJackson2Module.class.getName(),
- OAuth2AuthorizationServerJackson2Module.class.getName()).stream().map(TypeReference::of)
- .toList(),
- builder -> builder.withMembers(MemberCategory.DECLARED_FIELDS,
- MemberCategory.INVOKE_DECLARED_CONSTRUCTORS, MemberCategory.INVOKE_DECLARED_METHODS));
-
- // Jackson Mixins - Spring Security and Spring Authorization Server
- try {
- this.reflectionHintsRegistrar.registerReflectionHints(hints.reflection(),
- Class.forName("org.springframework.security.jackson2.UnmodifiableSetMixin"));
- this.reflectionHintsRegistrar.registerReflectionHints(hints.reflection(),
- Class.forName("org.springframework.security.jackson2.UnmodifiableListMixin"));
- this.reflectionHintsRegistrar.registerReflectionHints(hints.reflection(),
- Class.forName("org.springframework.security.jackson2.UnmodifiableMapMixin"));
- this.reflectionHintsRegistrar.registerReflectionHints(hints.reflection(), Class
- .forName("org.springframework.security.oauth2.server.authorization.jackson2.UnmodifiableMapMixin"));
- this.reflectionHintsRegistrar.registerReflectionHints(hints.reflection(),
- Class.forName("org.springframework.security.oauth2.server.authorization.jackson2.HashSetMixin"));
- this.reflectionHintsRegistrar.registerReflectionHints(hints.reflection(),
- Class.forName("org.springframework.security.web.jackson2.WebAuthenticationDetailsMixin"));
- this.reflectionHintsRegistrar.registerReflectionHints(hints.reflection(),
- Class.forName("org.springframework.security.jackson2.UsernamePasswordAuthenticationTokenMixin"));
- this.reflectionHintsRegistrar.registerReflectionHints(hints.reflection(),
- Class.forName("org.springframework.security.jackson2.UserMixin"));
- this.reflectionHintsRegistrar.registerReflectionHints(hints.reflection(), Class
- .forName("org.springframework.security.oauth2.client.jackson2.OAuth2AuthenticationTokenMixin"));
- this.reflectionHintsRegistrar.registerReflectionHints(hints.reflection(),
- Class.forName("org.springframework.security.oauth2.client.jackson2.DefaultOidcUserMixin"));
- this.reflectionHintsRegistrar.registerReflectionHints(hints.reflection(),
- Class.forName("org.springframework.security.oauth2.client.jackson2.DefaultOAuth2UserMixin"));
- this.reflectionHintsRegistrar.registerReflectionHints(hints.reflection(),
- Class.forName("org.springframework.security.oauth2.client.jackson2.OidcUserAuthorityMixin"));
- this.reflectionHintsRegistrar.registerReflectionHints(hints.reflection(),
- Class.forName("org.springframework.security.oauth2.client.jackson2.OAuth2UserAuthorityMixin"));
- this.reflectionHintsRegistrar.registerReflectionHints(hints.reflection(),
- Class.forName("org.springframework.security.jackson2.SimpleGrantedAuthorityMixin"));
- this.reflectionHintsRegistrar.registerReflectionHints(hints.reflection(),
- Class.forName("org.springframework.security.oauth2.client.jackson2.OidcIdTokenMixin"));
- this.reflectionHintsRegistrar.registerReflectionHints(hints.reflection(),
- Class.forName("org.springframework.security.oauth2.client.jackson2.OidcUserInfoMixin"));
- this.reflectionHintsRegistrar.registerReflectionHints(hints.reflection(), Class.forName(
- "org.springframework.security.oauth2.server.authorization.jackson2.OAuth2AuthorizationRequestMixin"));
- this.reflectionHintsRegistrar.registerReflectionHints(hints.reflection(), Class.forName(
- "org.springframework.security.oauth2.server.authorization.jackson2.OAuth2TokenFormatMixin"));
- }
- catch (ClassNotFoundException ex) {
- throw new RuntimeException(ex);
- }
-
- }
-
-}
diff --git a/oauth2-authorization-server/src/main/java/org/springframework/security/oauth2/server/authorization/JdbcOAuth2AuthorizationConsentService.java b/oauth2-authorization-server/src/main/java/org/springframework/security/oauth2/server/authorization/JdbcOAuth2AuthorizationConsentService.java
index 04e505b0..ed413de6 100644
--- a/oauth2-authorization-server/src/main/java/org/springframework/security/oauth2/server/authorization/JdbcOAuth2AuthorizationConsentService.java
+++ b/oauth2-authorization-server/src/main/java/org/springframework/security/oauth2/server/authorization/JdbcOAuth2AuthorizationConsentService.java
@@ -1,5 +1,5 @@
/*
- * Copyright 2020-2021 the original author or authors.
+ * Copyright 2020-2023 the original author or authors.
*
* Licensed under the Apache License, Version 2.0 (the "License");
* you may not use this file except in compliance with the License.
@@ -47,10 +47,10 @@ import org.springframework.util.StringUtils;
* {@link JdbcOperations} for {@link OAuth2AuthorizationConsent} persistence.
*
*
- * NOTE: This {@code OAuth2AuthorizationConsentService} depends on the table
- * definition described in
- * "classpath:org/springframework/security/oauth2/server/authorization/oauth2-authorization-consent-schema.sql"
- * and therefore MUST be defined in the database schema.
+ * NOTE: This {@code OAuth2AuthorizationConsentService} depends on the table definition
+ * described in
+ * "classpath:org/springframework/security/oauth2/server/authorization/oauth2-authorization-consent-schema.sql" and
+ * therefore MUST be defined in the database schema.
*
* @author Ovidiu Popa
* @author Josh Long
@@ -103,15 +103,13 @@ public class JdbcOAuth2AuthorizationConsentService implements OAuth2Authorizatio
private static final String REMOVE_AUTHORIZATION_CONSENT_SQL = "DELETE FROM " + TABLE_NAME + " WHERE " + PK_FILTER;
private final JdbcOperations jdbcOperations;
-
private RowMapper authorizationConsentRowMapper;
-
private Function> authorizationConsentParametersMapper;
/**
- * Constructs a {@code JdbcOAuth2AuthorizationConsentService} using the provided
- * parameters.
- * @param jdbcOperations the JDBC operations
+ * Constructs a {@code JdbcOAuth2AuthorizationConsentService} using the provided parameters.
+ *
+ * @param jdbcOperations the JDBC operations
* @param registeredClientRepository the registered client repository
*/
public JdbcOAuth2AuthorizationConsentService(JdbcOperations jdbcOperations,
@@ -126,12 +124,11 @@ public class JdbcOAuth2AuthorizationConsentService implements OAuth2Authorizatio
@Override
public void save(OAuth2AuthorizationConsent authorizationConsent) {
Assert.notNull(authorizationConsent, "authorizationConsent cannot be null");
- OAuth2AuthorizationConsent existingAuthorizationConsent = findById(authorizationConsent.getRegisteredClientId(),
- authorizationConsent.getPrincipalName());
+ OAuth2AuthorizationConsent existingAuthorizationConsent = findById(
+ authorizationConsent.getRegisteredClientId(), authorizationConsent.getPrincipalName());
if (existingAuthorizationConsent == null) {
insertAuthorizationConsent(authorizationConsent);
- }
- else {
+ } else {
updateAuthorizationConsent(authorizationConsent);
}
}
@@ -157,7 +154,8 @@ public class JdbcOAuth2AuthorizationConsentService implements OAuth2Authorizatio
Assert.notNull(authorizationConsent, "authorizationConsent cannot be null");
SqlParameterValue[] parameters = new SqlParameterValue[] {
new SqlParameterValue(Types.VARCHAR, authorizationConsent.getRegisteredClientId()),
- new SqlParameterValue(Types.VARCHAR, authorizationConsent.getPrincipalName()) };
+ new SqlParameterValue(Types.VARCHAR, authorizationConsent.getPrincipalName())
+ };
PreparedStatementSetter pss = new ArgumentPreparedStatementSetter(parameters);
this.jdbcOperations.update(REMOVE_AUTHORIZATION_CONSENT_SQL, pss);
}
@@ -169,7 +167,7 @@ public class JdbcOAuth2AuthorizationConsentService implements OAuth2Authorizatio
Assert.hasText(principalName, "principalName cannot be empty");
SqlParameterValue[] parameters = new SqlParameterValue[] {
new SqlParameterValue(Types.VARCHAR, registeredClientId),
- new SqlParameterValue(Types.VARCHAR, principalName) };
+ new SqlParameterValue(Types.VARCHAR, principalName)};
PreparedStatementSetter pss = new ArgumentPreparedStatementSetter(parameters);
List result = this.jdbcOperations.query(LOAD_AUTHORIZATION_CONSENT_SQL, pss,
this.authorizationConsentRowMapper);
@@ -180,21 +178,22 @@ public class JdbcOAuth2AuthorizationConsentService implements OAuth2Authorizatio
* Sets the {@link RowMapper} used for mapping the current row in
* {@code java.sql.ResultSet} to {@link OAuth2AuthorizationConsent}. The default is
* {@link OAuth2AuthorizationConsentRowMapper}.
- * @param authorizationConsentRowMapper the {@link RowMapper} used for mapping the
- * current row in {@code ResultSet} to {@link OAuth2AuthorizationConsent}
+ *
+ * @param authorizationConsentRowMapper the {@link RowMapper} used for mapping the current
+ * row in {@code ResultSet} to {@link OAuth2AuthorizationConsent}
*/
- public final void setAuthorizationConsentRowMapper(
- RowMapper authorizationConsentRowMapper) {
+ public final void setAuthorizationConsentRowMapper(RowMapper authorizationConsentRowMapper) {
Assert.notNull(authorizationConsentRowMapper, "authorizationConsentRowMapper cannot be null");
this.authorizationConsentRowMapper = authorizationConsentRowMapper;
}
/**
- * Sets the {@code Function} used for mapping {@link OAuth2AuthorizationConsent} to a
- * {@code List} of {@link SqlParameterValue}. The default is
+ * Sets the {@code Function} used for mapping {@link OAuth2AuthorizationConsent} to
+ * a {@code List} of {@link SqlParameterValue}. The default is
* {@link OAuth2AuthorizationConsentParametersMapper}.
+ *
* @param authorizationConsentParametersMapper the {@code Function} used for mapping
- * {@link OAuth2AuthorizationConsent} to a {@code List} of {@link SqlParameterValue}
+ * {@link OAuth2AuthorizationConsent} to a {@code List} of {@link SqlParameterValue}
*/
public final void setAuthorizationConsentParametersMapper(
Function> authorizationConsentParametersMapper) {
@@ -215,11 +214,10 @@ public class JdbcOAuth2AuthorizationConsentService implements OAuth2Authorizatio
}
/**
- * The default {@link RowMapper} that maps the current row in {@code ResultSet} to
- * {@link OAuth2AuthorizationConsent}.
+ * The default {@link RowMapper} that maps the current row in
+ * {@code ResultSet} to {@link OAuth2AuthorizationConsent}.
*/
public static class OAuth2AuthorizationConsentRowMapper implements RowMapper {
-
private final RegisteredClientRepository registeredClientRepository;
public OAuth2AuthorizationConsentRowMapper(RegisteredClientRepository registeredClientRepository) {
@@ -232,14 +230,13 @@ public class JdbcOAuth2AuthorizationConsentService implements OAuth2Authorizatio
String registeredClientId = rs.getString("registered_client_id");
RegisteredClient registeredClient = this.registeredClientRepository.findById(registeredClientId);
if (registeredClient == null) {
- throw new DataRetrievalFailureException("The RegisteredClient with id '" + registeredClientId
- + "' was not found in the RegisteredClientRepository.");
+ throw new DataRetrievalFailureException(
+ "The RegisteredClient with id '" + registeredClientId + "' was not found in the RegisteredClientRepository.");
}
String principalName = rs.getString("principal_name");
- OAuth2AuthorizationConsent.Builder builder = OAuth2AuthorizationConsent.withId(registeredClientId,
- principalName);
+ OAuth2AuthorizationConsent.Builder builder = OAuth2AuthorizationConsent.withId(registeredClientId, principalName);
String authorizationConsentAuthorities = rs.getString("authorities");
if (authorizationConsentAuthorities != null) {
for (String authority : StringUtils.commaDelimitedListToSet(authorizationConsentAuthorities)) {
@@ -259,8 +256,7 @@ public class JdbcOAuth2AuthorizationConsentService implements OAuth2Authorizatio
* The default {@code Function} that maps {@link OAuth2AuthorizationConsent} to a
* {@code List} of {@link SqlParameterValue}.
*/
- public static class OAuth2AuthorizationConsentParametersMapper
- implements Function> {
+ public static class OAuth2AuthorizationConsentParametersMapper implements Function> {
@Override
public List apply(OAuth2AuthorizationConsent authorizationConsent) {
@@ -272,8 +268,7 @@ public class JdbcOAuth2AuthorizationConsentService implements OAuth2Authorizatio
for (GrantedAuthority authority : authorizationConsent.getAuthorities()) {
authorities.add(authority.getAuthority());
}
- parameters.add(
- new SqlParameterValue(Types.VARCHAR, StringUtils.collectionToDelimitedString(authorities, ",")));
+ parameters.add(new SqlParameterValue(Types.VARCHAR, StringUtils.collectionToDelimitedString(authorities, ",")));
return parameters;
}
diff --git a/oauth2-authorization-server/src/main/java/org/springframework/security/oauth2/server/authorization/JdbcOAuth2AuthorizationService.java b/oauth2-authorization-server/src/main/java/org/springframework/security/oauth2/server/authorization/JdbcOAuth2AuthorizationService.java
index 0d6f8185..cc44d9e9 100644
--- a/oauth2-authorization-server/src/main/java/org/springframework/security/oauth2/server/authorization/JdbcOAuth2AuthorizationService.java
+++ b/oauth2-authorization-server/src/main/java/org/springframework/security/oauth2/server/authorization/JdbcOAuth2AuthorizationService.java
@@ -74,8 +74,8 @@ import org.springframework.util.StringUtils;
*
* NOTE: This {@code OAuth2AuthorizationService} depends on the table definition
* described in
- * "classpath:org/springframework/security/oauth2/server/authorization/oauth2-authorization-schema.sql"
- * and therefore MUST be defined in the database schema.
+ * "classpath:org/springframework/security/oauth2/server/authorization/oauth2-authorization-schema.sql" and
+ * therefore MUST be defined in the database schema.
*
* @author Ovidiu Popa
* @author Joe Grandja
@@ -86,10 +86,10 @@ import org.springframework.util.StringUtils;
* @see JdbcOperations
* @see RowMapper
*/
-@ImportRuntimeHints(JdbcOAuth2AuthorizationService.JdbcOAuth2AuthorizationServiceServiceRuntimeHintsRegistrar.class)
+@ImportRuntimeHints(JdbcOAuth2AuthorizationService.JdbcOAuth2AuthorizationServiceRuntimeHintsRegistrar.class)
public class JdbcOAuth2AuthorizationService implements OAuth2AuthorizationService {
- static class JdbcOAuth2AuthorizationServiceServiceRuntimeHintsRegistrar implements RuntimeHintsRegistrar {
+ static class JdbcOAuth2AuthorizationServiceRuntimeHintsRegistrar implements RuntimeHintsRegistrar {
@Override
public void registerHints(RuntimeHints hints, ClassLoader classLoader) {
@@ -138,23 +138,16 @@ public class JdbcOAuth2AuthorizationService implements OAuth2AuthorizationServic
private static final String TABLE_NAME = "oauth2_authorization";
private static final String PK_FILTER = "id = ?";
-
private static final String UNKNOWN_TOKEN_TYPE_FILTER = "state = ? OR authorization_code_value = ? OR "
+ "access_token_value = ? OR oidc_id_token_value = ? OR refresh_token_value = ? OR user_code_value = ? OR "
+ "device_code_value = ?";
private static final String STATE_FILTER = "state = ?";
-
private static final String AUTHORIZATION_CODE_FILTER = "authorization_code_value = ?";
-
private static final String ACCESS_TOKEN_FILTER = "access_token_value = ?";
-
private static final String ID_TOKEN_FILTER = "oidc_id_token_value = ?";
-
private static final String REFRESH_TOKEN_FILTER = "refresh_token_value = ?";
-
private static final String USER_CODE_FILTER = "user_code_value = ?";
-
private static final String DEVICE_CODE_FILTER = "device_code_value = ?";
// @formatter:off
@@ -185,16 +178,14 @@ public class JdbcOAuth2AuthorizationService implements OAuth2AuthorizationServic
private static Map columnMetadataMap;
private final JdbcOperations jdbcOperations;
-
private final LobHandler lobHandler;
-
private RowMapper authorizationRowMapper;
-
private Function> authorizationParametersMapper;
/**
* Constructs a {@code JdbcOAuth2AuthorizationService} using the provided parameters.
- * @param jdbcOperations the JDBC operations
+ *
+ * @param jdbcOperations the JDBC operations
* @param registeredClientRepository the registered client repository
*/
public JdbcOAuth2AuthorizationService(JdbcOperations jdbcOperations,
@@ -204,9 +195,10 @@ public class JdbcOAuth2AuthorizationService implements OAuth2AuthorizationServic
/**
* Constructs a {@code JdbcOAuth2AuthorizationService} using the provided parameters.
- * @param jdbcOperations the JDBC operations
+ *
+ * @param jdbcOperations the JDBC operations
* @param registeredClientRepository the registered client repository
- * @param lobHandler the handler for large binary fields and large text fields
+ * @param lobHandler the handler for large binary fields and large text fields
*/
public JdbcOAuth2AuthorizationService(JdbcOperations jdbcOperations,
RegisteredClientRepository registeredClientRepository, LobHandler lobHandler) {
@@ -215,8 +207,7 @@ public class JdbcOAuth2AuthorizationService implements OAuth2AuthorizationServic
Assert.notNull(lobHandler, "lobHandler cannot be null");
this.jdbcOperations = jdbcOperations;
this.lobHandler = lobHandler;
- OAuth2AuthorizationRowMapper authorizationRowMapper = new OAuth2AuthorizationRowMapper(
- registeredClientRepository);
+ OAuth2AuthorizationRowMapper authorizationRowMapper = new OAuth2AuthorizationRowMapper(registeredClientRepository);
authorizationRowMapper.setLobHandler(lobHandler);
this.authorizationRowMapper = authorizationRowMapper;
this.authorizationParametersMapper = new OAuth2AuthorizationParametersMapper();
@@ -229,8 +220,7 @@ public class JdbcOAuth2AuthorizationService implements OAuth2AuthorizationServic
OAuth2Authorization existingAuthorization = findById(authorization.getId());
if (existingAuthorization == null) {
insertAuthorization(authorization);
- }
- else {
+ } else {
updateAuthorization(authorization);
}
}
@@ -259,7 +249,8 @@ public class JdbcOAuth2AuthorizationService implements OAuth2AuthorizationServic
public void remove(OAuth2Authorization authorization) {
Assert.notNull(authorization, "authorization cannot be null");
SqlParameterValue[] parameters = new SqlParameterValue[] {
- new SqlParameterValue(Types.VARCHAR, authorization.getId()) };
+ new SqlParameterValue(Types.VARCHAR, authorization.getId())
+ };
PreparedStatementSetter pss = new ArgumentPreparedStatementSetter(parameters);
this.jdbcOperations.update(REMOVE_AUTHORIZATION_SQL, pss);
}
@@ -287,32 +278,25 @@ public class JdbcOAuth2AuthorizationService implements OAuth2AuthorizationServic
parameters.add(mapToSqlParameter("user_code_value", token));
parameters.add(mapToSqlParameter("device_code_value", token));
return findBy(UNKNOWN_TOKEN_TYPE_FILTER, parameters);
- }
- else if (OAuth2ParameterNames.STATE.equals(tokenType.getValue())) {
+ } else if (OAuth2ParameterNames.STATE.equals(tokenType.getValue())) {
parameters.add(new SqlParameterValue(Types.VARCHAR, token));
return findBy(STATE_FILTER, parameters);
- }
- else if (OAuth2ParameterNames.CODE.equals(tokenType.getValue())) {
+ } else if (OAuth2ParameterNames.CODE.equals(tokenType.getValue())) {
parameters.add(mapToSqlParameter("authorization_code_value", token));
return findBy(AUTHORIZATION_CODE_FILTER, parameters);
- }
- else if (OAuth2TokenType.ACCESS_TOKEN.equals(tokenType)) {
+ } else if (OAuth2TokenType.ACCESS_TOKEN.equals(tokenType)) {
parameters.add(mapToSqlParameter("access_token_value", token));
return findBy(ACCESS_TOKEN_FILTER, parameters);
- }
- else if (OidcParameterNames.ID_TOKEN.equals(tokenType.getValue())) {
+ } else if (OidcParameterNames.ID_TOKEN.equals(tokenType.getValue())) {
parameters.add(mapToSqlParameter("oidc_id_token_value", token));
return findBy(ID_TOKEN_FILTER, parameters);
- }
- else if (OAuth2TokenType.REFRESH_TOKEN.equals(tokenType)) {
+ } else if (OAuth2TokenType.REFRESH_TOKEN.equals(tokenType)) {
parameters.add(mapToSqlParameter("refresh_token_value", token));
return findBy(REFRESH_TOKEN_FILTER, parameters);
- }
- else if (OAuth2ParameterNames.USER_CODE.equals(tokenType.getValue())) {
+ } else if (OAuth2ParameterNames.USER_CODE.equals(tokenType.getValue())) {
parameters.add(mapToSqlParameter("user_code_value", token));
return findBy(USER_CODE_FILTER, parameters);
- }
- else if (OAuth2ParameterNames.DEVICE_CODE.equals(tokenType.getValue())) {
+ } else if (OAuth2ParameterNames.DEVICE_CODE.equals(tokenType.getValue())) {
parameters.add(mapToSqlParameter("device_code_value", token));
return findBy(DEVICE_CODE_FILTER, parameters);
}
@@ -323,8 +307,7 @@ public class JdbcOAuth2AuthorizationService implements OAuth2AuthorizationServic
try (LobCreator lobCreator = getLobHandler().getLobCreator()) {
PreparedStatementSetter pss = new LobCreatorArgumentPreparedStatementSetter(lobCreator,
parameters.toArray());
- List result = getJdbcOperations().query(LOAD_AUTHORIZATION_SQL + filter, pss,
- getAuthorizationRowMapper());
+ List result = getJdbcOperations().query(LOAD_AUTHORIZATION_SQL + filter, pss, getAuthorizationRowMapper());
return !result.isEmpty() ? result.get(0) : null;
}
}
@@ -333,8 +316,9 @@ public class JdbcOAuth2AuthorizationService implements OAuth2AuthorizationServic
* Sets the {@link RowMapper} used for mapping the current row in
* {@code java.sql.ResultSet} to {@link OAuth2Authorization}. The default is
* {@link OAuth2AuthorizationRowMapper}.
+ *
* @param authorizationRowMapper the {@link RowMapper} used for mapping the current
- * row in {@code ResultSet} to {@link OAuth2Authorization}
+ * row in {@code ResultSet} to {@link OAuth2Authorization}
*/
public final void setAuthorizationRowMapper(RowMapper authorizationRowMapper) {
Assert.notNull(authorizationRowMapper, "authorizationRowMapper cannot be null");
@@ -342,11 +326,12 @@ public class JdbcOAuth2AuthorizationService implements OAuth2AuthorizationServic
}
/**
- * Sets the {@code Function} used for mapping {@link OAuth2Authorization} to a
- * {@code List} of {@link SqlParameterValue}. The default is
+ * Sets the {@code Function} used for mapping {@link OAuth2Authorization} to
+ * a {@code List} of {@link SqlParameterValue}. The default is
* {@link OAuth2AuthorizationParametersMapper}.
+ *
* @param authorizationParametersMapper the {@code Function} used for mapping
- * {@link OAuth2Authorization} to a {@code List} of {@link SqlParameterValue}
+ * {@link OAuth2Authorization} to a {@code List} of {@link SqlParameterValue}
*/
public final void setAuthorizationParametersMapper(
Function> authorizationParametersMapper) {
@@ -375,11 +360,8 @@ public class JdbcOAuth2AuthorizationService implements OAuth2AuthorizationServic
* {@code java.sql.ResultSet} to {@link OAuth2Authorization}.
*/
public static class OAuth2AuthorizationRowMapper implements RowMapper {
-
private final RegisteredClientRepository registeredClientRepository;
-
private LobHandler lobHandler = new DefaultLobHandler();
-
private ObjectMapper objectMapper = new ObjectMapper();
public OAuth2AuthorizationRowMapper(RegisteredClientRepository registeredClientRepository) {
@@ -398,8 +380,8 @@ public class JdbcOAuth2AuthorizationService implements OAuth2AuthorizationServic
String registeredClientId = rs.getString("registered_client_id");
RegisteredClient registeredClient = this.registeredClientRepository.findById(registeredClientId);
if (registeredClient == null) {
- throw new DataRetrievalFailureException("The RegisteredClient with id '" + registeredClientId
- + "' was not found in the RegisteredClientRepository.");
+ throw new DataRetrievalFailureException(
+ "The RegisteredClient with id '" + registeredClientId + "' was not found in the RegisteredClientRepository.");
}
OAuth2Authorization.Builder builder = OAuth2Authorization.withRegisteredClient(registeredClient);
@@ -413,9 +395,11 @@ public class JdbcOAuth2AuthorizationService implements OAuth2AuthorizationServic
}
Map attributes = parseMap(getLobValue(rs, "attributes"));
- builder.id(id).principalName(principalName)
+ builder.id(id)
+ .principalName(principalName)
.authorizationGrantType(new AuthorizationGrantType(authorizationGrantType))
- .authorizedScopes(authorizedScopes).attributes((attrs) -> attrs.putAll(attributes));
+ .authorizedScopes(authorizedScopes)
+ .attributes((attrs) -> attrs.putAll(attributes));
String state = rs.getString("state");
if (StringUtils.hasText(state)) {
@@ -429,11 +413,10 @@ public class JdbcOAuth2AuthorizationService implements OAuth2AuthorizationServic
if (StringUtils.hasText(authorizationCodeValue)) {
tokenIssuedAt = rs.getTimestamp("authorization_code_issued_at").toInstant();
tokenExpiresAt = rs.getTimestamp("authorization_code_expires_at").toInstant();
- Map authorizationCodeMetadata = parseMap(
- getLobValue(rs, "authorization_code_metadata"));
+ Map authorizationCodeMetadata = parseMap(getLobValue(rs, "authorization_code_metadata"));
- OAuth2AuthorizationCode authorizationCode = new OAuth2AuthorizationCode(authorizationCodeValue,
- tokenIssuedAt, tokenExpiresAt);
+ OAuth2AuthorizationCode authorizationCode = new OAuth2AuthorizationCode(
+ authorizationCodeValue, tokenIssuedAt, tokenExpiresAt);
builder.token(authorizationCode, (metadata) -> metadata.putAll(authorizationCodeMetadata));
}
@@ -452,8 +435,7 @@ public class JdbcOAuth2AuthorizationService implements OAuth2AuthorizationServic
if (accessTokenScopes != null) {
scopes = StringUtils.commaDelimitedListToSet(accessTokenScopes);
}
- OAuth2AccessToken accessToken = new OAuth2AccessToken(tokenType, accessTokenValue, tokenIssuedAt,
- tokenExpiresAt, scopes);
+ OAuth2AccessToken accessToken = new OAuth2AccessToken(tokenType, accessTokenValue, tokenIssuedAt, tokenExpiresAt, scopes);
builder.token(accessToken, (metadata) -> metadata.putAll(accessTokenMetadata));
}
@@ -463,8 +445,8 @@ public class JdbcOAuth2AuthorizationService implements OAuth2AuthorizationServic
tokenExpiresAt = rs.getTimestamp("oidc_id_token_expires_at").toInstant();
Map oidcTokenMetadata = parseMap(getLobValue(rs, "oidc_id_token_metadata"));
- OidcIdToken oidcToken = new OidcIdToken(oidcIdTokenValue, tokenIssuedAt, tokenExpiresAt,
- (Map) oidcTokenMetadata.get(OAuth2Authorization.Token.CLAIMS_METADATA_NAME));
+ OidcIdToken oidcToken = new OidcIdToken(
+ oidcIdTokenValue, tokenIssuedAt, tokenExpiresAt, (Map) oidcTokenMetadata.get(OAuth2Authorization.Token.CLAIMS_METADATA_NAME));
builder.token(oidcToken, (metadata) -> metadata.putAll(oidcTokenMetadata));
}
@@ -478,8 +460,8 @@ public class JdbcOAuth2AuthorizationService implements OAuth2AuthorizationServic
}
Map refreshTokenMetadata = parseMap(getLobValue(rs, "refresh_token_metadata"));
- OAuth2RefreshToken refreshToken = new OAuth2RefreshToken(refreshTokenValue, tokenIssuedAt,
- tokenExpiresAt);
+ OAuth2RefreshToken refreshToken = new OAuth2RefreshToken(
+ refreshTokenValue, tokenIssuedAt, tokenExpiresAt);
builder.token(refreshToken, (metadata) -> metadata.putAll(refreshTokenMetadata));
}
@@ -514,11 +496,9 @@ public class JdbcOAuth2AuthorizationService implements OAuth2AuthorizationServic
if (columnValueBytes != null) {
columnValue = new String(columnValueBytes, StandardCharsets.UTF_8);
}
- }
- else if (Types.CLOB == columnMetadata.getDataType()) {
+ } else if (Types.CLOB == columnMetadata.getDataType()) {
columnValue = this.lobHandler.getClobAsString(rs, columnName);
- }
- else {
+ } else {
columnValue = rs.getString(columnName);
}
return columnValue;
@@ -548,10 +528,8 @@ public class JdbcOAuth2AuthorizationService implements OAuth2AuthorizationServic
private Map parseMap(String data) {
try {
- return this.objectMapper.readValue(data, new TypeReference