All Downloads are FREE. Search and download functionalities are using the official Maven repository.

org.cloudfoundry.identity.uaa.oauth.token.UserTokenGranter Maven / Gradle / Ivy

There is a newer version: 4.30.0
Show newest version
/*
 * *****************************************************************************
 *      Cloud Foundry
 *      Copyright (c) [2009-2016] Pivotal Software, Inc. All Rights Reserved.
 *      This product is licensed to you under the Apache License, Version 2.0 (the "License").
 *      You may not use this product except in compliance with the License.
 *
 *      This product includes a number of subcomponents with
 *      separate copyright notices and license terms. Your use of these
 *      subcomponents is subject to the terms and conditions of the
 *      subcomponent's license, as noted in the LICENSE file.
 * *****************************************************************************
 */

package org.cloudfoundry.identity.uaa.oauth.token;

import org.cloudfoundry.identity.uaa.oauth.UaaOauth2Authentication;
import org.cloudfoundry.identity.uaa.zone.ClientServicesExtension;
import org.cloudfoundry.identity.uaa.zone.IdentityZoneHolder;
import org.springframework.security.authentication.InsufficientAuthenticationException;
import org.springframework.security.core.Authentication;
import org.springframework.security.core.context.SecurityContextHolder;
import org.springframework.security.oauth2.common.DefaultOAuth2AccessToken;
import org.springframework.security.oauth2.common.OAuth2AccessToken;
import org.springframework.security.oauth2.common.exceptions.InvalidGrantException;
import org.springframework.security.oauth2.provider.ClientDetails;
import org.springframework.security.oauth2.provider.OAuth2Authentication;
import org.springframework.security.oauth2.provider.OAuth2Request;
import org.springframework.security.oauth2.provider.OAuth2RequestFactory;
import org.springframework.security.oauth2.provider.TokenRequest;
import org.springframework.security.oauth2.provider.token.AbstractTokenGranter;
import org.springframework.security.oauth2.provider.token.AuthorizationServerTokenServices;

import static org.cloudfoundry.identity.uaa.oauth.token.TokenConstants.GRANT_TYPE_REFRESH_TOKEN;
import static org.cloudfoundry.identity.uaa.oauth.token.TokenConstants.GRANT_TYPE_USER_TOKEN;
import static org.cloudfoundry.identity.uaa.oauth.token.TokenConstants.USER_TOKEN_REQUESTING_CLIENT_ID;
import static org.springframework.security.oauth2.common.util.OAuth2Utils.CLIENT_ID;

public class UserTokenGranter  extends AbstractTokenGranter {

    private ClientServicesExtension clientDetailsService;
    private RevocableTokenProvisioning tokenStore;

    public UserTokenGranter(AuthorizationServerTokenServices tokenServices,
                            ClientServicesExtension clientDetailsService,
                            OAuth2RequestFactory requestFactory,
                            RevocableTokenProvisioning tokenStore) {
        super(tokenServices, clientDetailsService, requestFactory, TokenConstants.GRANT_TYPE_USER_TOKEN);
        this.clientDetailsService = clientDetailsService;
        this.tokenStore = tokenStore;
    }

    @Override
    public OAuth2AccessToken grant(String grantType, TokenRequest tokenRequest) {
        //swap the client ID for the recipient
        //so that the rest of the flow continues as normal
        TokenRequest adjusted = new TokenRequest(
            tokenRequest.getRequestParameters(),
            tokenRequest.getRequestParameters().get(USER_TOKEN_REQUESTING_CLIENT_ID),
            tokenRequest.getScope(),
            tokenRequest.getGrantType()
        );
        return super.grant(grantType, adjusted);
    }

    @Override
    protected void validateGrantType(String grantType, ClientDetails clientDetails) {
        //no op. we do all this during validation
    }

    protected Authentication validateRequest(TokenRequest request) {
        //things to validate
        //1. Authentication must exist and be authenticated
        Authentication authentication = SecurityContextHolder.getContext().getAuthentication();
        if (authentication == null || !authentication.isAuthenticated() || !(authentication instanceof UaaOauth2Authentication)) {
            throw new InsufficientAuthenticationException("Invalid authentication object:"+authentication);
        }
        UaaOauth2Authentication oauth2Authentication = (UaaOauth2Authentication)authentication;
        //2. authentication must be a user, and authenticated
        if (oauth2Authentication.getUserAuthentication() == null || !oauth2Authentication.getUserAuthentication().isAuthenticated()) {
            throw new InsufficientAuthenticationException("Authentication containing a user is required");
        }
        //3. parameter requesting_client_id must be present
        if (request.getRequestParameters()==null || request.getRequestParameters().get(USER_TOKEN_REQUESTING_CLIENT_ID)==null) {
            throw new InvalidGrantException("Parameter "+USER_TOKEN_REQUESTING_CLIENT_ID+" is required.");
        }
        //4. grant_type must be user_token
        if (!TokenConstants.GRANT_TYPE_USER_TOKEN.equals(request.getGrantType())) {
            throw new InvalidGrantException("Invalid grant type");
        }

        //5. requesting client must have user_token grant type
        ClientDetails requesting = clientDetailsService.loadClientByClientId(request.getRequestParameters().get(USER_TOKEN_REQUESTING_CLIENT_ID), IdentityZoneHolder.get().getId());
        super.validateGrantType(GRANT_TYPE_USER_TOKEN, requesting);

        //6. receiving client must have refresh_token grant type
        ClientDetails receiving = clientDetailsService.loadClientByClientId(request.getRequestParameters().get(CLIENT_ID), IdentityZoneHolder.get().getId());
        super.validateGrantType(GRANT_TYPE_REFRESH_TOKEN, receiving);

        return oauth2Authentication.getUserAuthentication();
    }

    @Override
    protected OAuth2Authentication getOAuth2Authentication(ClientDetails client, TokenRequest tokenRequest) {
        Authentication userAuth = validateRequest(tokenRequest);
        OAuth2Request storedOAuth2Request = getRequestFactory().createOAuth2Request(client, tokenRequest);
        return new OAuth2Authentication(storedOAuth2Request, userAuth);
    }

    protected DefaultOAuth2AccessToken prepareForSerialization(DefaultOAuth2AccessToken token) {
        //get original ID
        String id = token.getValue();
        //nullify the access_token value
        token.setValue(null);
        //ensure that the ID is that of the refresh token
        token.getAdditionalInformation().put(ClaimConstants.JTI, token.getRefreshToken().getValue());
        //delete the access token from token store
        tokenStore.delete(id, 0, IdentityZoneHolder.get().getId());
        return token;
    }

    @Override
    protected OAuth2AccessToken getAccessToken(ClientDetails client, TokenRequest tokenRequest) {
        ClientDetails receivingClient = clientDetailsService.loadClientByClientId(tokenRequest.getRequestParameters().get(CLIENT_ID), IdentityZoneHolder.get().getId());
        return prepareForSerialization((DefaultOAuth2AccessToken) super.getAccessToken(receivingClient, tokenRequest));
    }
}




© 2015 - 2024 Weber Informatics LLC | Privacy Policy