Auto-generated method stub
This commit is contained in:
@@ -60,7 +60,7 @@ public final class OAuth2AccessTokenJackson2Deserializer extends StdDeserializer
|
||||
Set<String> scope = null;
|
||||
Map<String, Object> additionalInformation = new LinkedHashMap<String, Object>();
|
||||
|
||||
// TODO What should occur if a parameter exists twice
|
||||
// What should occur if a parameter exists twice
|
||||
while (jp.nextToken() != JsonToken.END_OBJECT) {
|
||||
String name = jp.getCurrentName();
|
||||
jp.nextToken();
|
||||
@@ -88,7 +88,7 @@ public final class OAuth2AccessTokenJackson2Deserializer extends StdDeserializer
|
||||
}
|
||||
}
|
||||
|
||||
// TODO What should occur if a required parameter (tokenValue or tokenType) is missing?
|
||||
// What should occur if a required parameter (tokenValue or tokenType) is missing?
|
||||
|
||||
DefaultOAuth2AccessToken accessToken = new DefaultOAuth2AccessToken(tokenValue);
|
||||
accessToken.setTokenType(tokenType);
|
||||
|
||||
@@ -50,7 +50,7 @@ public class JwtHelper {
|
||||
throw new IllegalArgumentException("JWT must have 3 tokens");
|
||||
}
|
||||
CharBuffer buffer = CharBuffer.wrap(token, 0, firstPeriod);
|
||||
// TODO: Use a Reader which supports CharBuffer
|
||||
// Use a Reader which supports CharBuffer
|
||||
JwtHeader header = JwtHeaderHelper.create(buffer.toString());
|
||||
|
||||
buffer.limit(lastPeriod).position(firstPeriod + 1);
|
||||
|
||||
@@ -54,7 +54,7 @@ public interface OAuth2RequestFactory {
|
||||
/**
|
||||
* Create a new {@link OAuth2Request} by extracting the needed information from the current {@link TokenRequest}
|
||||
* object.
|
||||
* @param client TODO
|
||||
* @param client
|
||||
* @param tokenRequest the request to be converted
|
||||
*
|
||||
* @return am immutable object for storage
|
||||
|
||||
@@ -126,7 +126,7 @@ public class JdbcClientDetailsService implements ClientDetailsService, ClientReg
|
||||
}
|
||||
|
||||
public ClientDetails loadClientByClientId(String clientId) {
|
||||
//TODO: cache in memory
|
||||
// cache in memory
|
||||
ClientDetails details = clientDetailsCache.getIfPresent(clientId);
|
||||
if(details == null) {
|
||||
try {
|
||||
|
||||
@@ -188,7 +188,7 @@ public class AuthorizationEndpoint extends AbstractEndpoint {
|
||||
// such logic here, and set the approved flag on the authorization request accordingly.
|
||||
authorizationRequest = userApprovalHandler.checkForPreApproval(authorizationRequest,
|
||||
(Authentication) principal);
|
||||
// TODO: is this call necessary?
|
||||
// is this call necessary?
|
||||
boolean approved = userApprovalHandler.isApproved(authorizationRequest, (Authentication) principal);
|
||||
authorizationRequest.setApproved(approved);
|
||||
|
||||
@@ -331,7 +331,7 @@ public class AuthorizationEndpoint extends AbstractEndpoint {
|
||||
return accessToken;
|
||||
}
|
||||
|
||||
//TODO: Authorization Code Response
|
||||
// Authorization Code Response
|
||||
private View getAuthorizationCodeResponse(AuthorizationRequest authorizationRequest, Authentication authUser) {
|
||||
try {
|
||||
return new RedirectView(getSuccessfulRedirect(authorizationRequest,
|
||||
@@ -419,7 +419,7 @@ public class AuthorizationEndpoint extends AbstractEndpoint {
|
||||
|
||||
}
|
||||
}
|
||||
//TODO: Successful Redirect
|
||||
// Successful Redirect
|
||||
private String getSuccessfulRedirect(AuthorizationRequest authorizationRequest, String authorizationCode) {
|
||||
|
||||
if (authorizationCode == null) {
|
||||
|
||||
@@ -56,13 +56,12 @@ public class OAuthDefaultUserInfoAdapter extends AbstractAuthorizeAdapter {
|
||||
|
||||
@Override
|
||||
public String encrypt(String data, String algorithmKey, String algorithm) {
|
||||
// TODO Auto-generated method stub
|
||||
return null;
|
||||
}
|
||||
|
||||
@Override
|
||||
public ModelAndView authorize(UserInfo userInfo, Object app, String data,ModelAndView modelAndView) {
|
||||
// TODO Auto-generated method stub
|
||||
|
||||
return null;
|
||||
}
|
||||
|
||||
|
||||
@@ -125,7 +125,7 @@ public class OIDCIdTokenEnhancer implements TokenEnhancer {
|
||||
|
||||
// if the auth time claim was explicitly requested OR if the client always wants the auth time, put it in
|
||||
if (request.getExtensions().containsKey("max_age")
|
||||
|| (request.getExtensions().containsKey("idtoken")) // TODO: parse the ID Token claims (#473) -- for now assume it could be in there
|
||||
|| (request.getExtensions().containsKey("idtoken")) // parse the ID Token claims (#473) -- for now assume it could be in there
|
||||
) {
|
||||
DateTime loginDate=DateTime.parse(WebContext.getUserInfo().getLastLoginTime(), DateTimeFormat.forPattern("yyyy-MM-dd HH:mm:ss"));
|
||||
builder.claim("auth_time", loginDate.getMillis()/ 1000);
|
||||
|
||||
@@ -339,7 +339,6 @@ public class Oauth20AutoConfiguration implements InitializingBean {
|
||||
|
||||
@Override
|
||||
public void afterPropertiesSet() throws Exception {
|
||||
// TODO Auto-generated method stub
|
||||
|
||||
}
|
||||
}
|
||||
|
||||
Reference in New Issue
Block a user