All Downloads are FREE. Search and download functionalities are using the official Maven repository.

org.springframework.security.oauth2.client.token.grant.implicit.ImplicitAccessTokenProvider Maven / Gradle / Ivy

There is a newer version: 2.5.2.RELEASE
Show newest version
package org.springframework.security.oauth2.client.token.grant.implicit;

import java.io.IOException;
import java.net.URI;
import java.util.Collections;
import java.util.Iterator;
import java.util.List;

import org.springframework.http.HttpHeaders;
import org.springframework.http.client.ClientHttpResponse;
import org.springframework.security.access.AccessDeniedException;
import org.springframework.security.oauth2.client.resource.OAuth2AccessDeniedException;
import org.springframework.security.oauth2.client.resource.OAuth2ProtectedResourceDetails;
import org.springframework.security.oauth2.client.resource.UserRedirectRequiredException;
import org.springframework.security.oauth2.client.token.AccessTokenProvider;
import org.springframework.security.oauth2.client.token.AccessTokenRequest;
import org.springframework.security.oauth2.client.token.DefaultAccessTokenRequest;
import org.springframework.security.oauth2.client.token.OAuth2AccessTokenSupport;
import org.springframework.security.oauth2.common.DefaultOAuth2AccessToken;
import org.springframework.security.oauth2.common.OAuth2AccessToken;
import org.springframework.security.oauth2.common.OAuth2RefreshToken;
import org.springframework.security.oauth2.common.util.OAuth2Utils;
import org.springframework.util.LinkedMultiValueMap;
import org.springframework.util.MultiValueMap;
import org.springframework.web.client.ResponseExtractor;

/**
 * Provider for obtaining an oauth2 access token by using implicit grant. Normally the implicit grant is used by script
 * clients in a browser or device, but it can also be useful for native clients generally, so if those clients were
 * written in Java this would be a nice convenience. Web application clients are also a possiblity, although the
 * authorization code grant type is probably more common there, and requires no special customizations on the
 * authorization server. Callers add any additional form parameters they need to the {@link DefaultAccessTokenRequest}
 * and these will be passed onto the authorization endpoint on the server. The server then has to interpret those
 * parameters, together with any other information available (e.g. from a cookie), and decide if a user can be
 * authenticated and if the user has approved the grant of the access token. Only if those two conditions are met should
 * an access token be available through this provider.
 *
 * 

* @deprecated See the OAuth 2.0 Migration Guide for Spring Security 5. * * @author Dave Syer */ @Deprecated public class ImplicitAccessTokenProvider extends OAuth2AccessTokenSupport implements AccessTokenProvider { public boolean supportsResource(OAuth2ProtectedResourceDetails resource) { return resource instanceof ImplicitResourceDetails && "implicit".equals(resource.getGrantType()); } public boolean supportsRefresh(OAuth2ProtectedResourceDetails resource) { return false; } public OAuth2AccessToken refreshAccessToken(OAuth2ProtectedResourceDetails resource, OAuth2RefreshToken refreshToken, AccessTokenRequest request) throws UserRedirectRequiredException { return null; } public OAuth2AccessToken obtainAccessToken(OAuth2ProtectedResourceDetails details, AccessTokenRequest request) throws UserRedirectRequiredException, AccessDeniedException, OAuth2AccessDeniedException { ImplicitResourceDetails resource = (ImplicitResourceDetails) details; try { // We can assume here that the request contains all the parameters needed for authentication etc. OAuth2AccessToken token = retrieveToken(request, resource, getParametersForTokenRequest(resource, request), getHeadersForTokenRequest(request)); if (token==null) { // Probably an authenticated request, but approval is required. TODO: prompt somehow? throw new UserRedirectRequiredException(resource.getUserAuthorizationUri(), request.toSingleValueMap()); } return token; } catch (UserRedirectRequiredException e) { // ... but if it doesn't then capture the request parameters for the redirect throw new UserRedirectRequiredException(e.getRedirectUri(), request.toSingleValueMap()); } } @Override protected ResponseExtractor getResponseExtractor() { return new ImplicitResponseExtractor(); } private HttpHeaders getHeadersForTokenRequest(AccessTokenRequest request) { HttpHeaders headers = new HttpHeaders(); headers.putAll(request.getHeaders()); if (request.getCookie() != null) { headers.set("Cookie", request.getCookie()); } return headers; } private MultiValueMap getParametersForTokenRequest(ImplicitResourceDetails resource, AccessTokenRequest request) { MultiValueMap form = new LinkedMultiValueMap(); form.set("response_type", "token"); form.set("client_id", resource.getClientId()); if (resource.isScoped()) { StringBuilder builder = new StringBuilder(); List scope = resource.getScope(); if (scope != null) { Iterator scopeIt = scope.iterator(); while (scopeIt.hasNext()) { builder.append(scopeIt.next()); if (scopeIt.hasNext()) { builder.append(' '); } } } form.set("scope", builder.toString()); } for (String key : request.keySet()) { form.put(key, request.get(key)); } String redirectUri = resource.getRedirectUri(request); if (redirectUri == null) { throw new IllegalStateException("No redirect URI available in request"); } form.set("redirect_uri", redirectUri); return form; } private final class ImplicitResponseExtractor implements ResponseExtractor { public OAuth2AccessToken extractData(ClientHttpResponse response) throws IOException { // TODO: this should actually be a 401 if the request asked for JSON URI location = response.getHeaders().getLocation(); if (location == null) { return null; } String fragment = location.getFragment(); OAuth2AccessToken accessToken = DefaultOAuth2AccessToken.valueOf(OAuth2Utils.extractMap(fragment)); if (accessToken.getValue() == null) { throw new UserRedirectRequiredException(location.toString(), Collections. emptyMap()); } return accessToken; } } }





© 2015 - 2024 Weber Informatics LLC | Privacy Policy