Auto-generated method stub

This commit is contained in:
MaxKey
2021-11-09 22:44:35 +08:00
parent 86aa0f9ed9
commit 899d7b75f5
120 changed files with 180 additions and 226 deletions

View File

@@ -60,7 +60,7 @@ public final class OAuth2AccessTokenJackson2Deserializer extends StdDeserializer
Set<String> scope = null;
Map<String, Object> additionalInformation = new LinkedHashMap<String, Object>();
// TODO What should occur if a parameter exists twice
// What should occur if a parameter exists twice
while (jp.nextToken() != JsonToken.END_OBJECT) {
String name = jp.getCurrentName();
jp.nextToken();
@@ -88,7 +88,7 @@ public final class OAuth2AccessTokenJackson2Deserializer extends StdDeserializer
}
}
// TODO What should occur if a required parameter (tokenValue or tokenType) is missing?
// What should occur if a required parameter (tokenValue or tokenType) is missing?
DefaultOAuth2AccessToken accessToken = new DefaultOAuth2AccessToken(tokenValue);
accessToken.setTokenType(tokenType);

View File

@@ -50,7 +50,7 @@ public class JwtHelper {
throw new IllegalArgumentException("JWT must have 3 tokens");
}
CharBuffer buffer = CharBuffer.wrap(token, 0, firstPeriod);
// TODO: Use a Reader which supports CharBuffer
// Use a Reader which supports CharBuffer
JwtHeader header = JwtHeaderHelper.create(buffer.toString());
buffer.limit(lastPeriod).position(firstPeriod + 1);

View File

@@ -54,7 +54,7 @@ public interface OAuth2RequestFactory {
/**
* Create a new {@link OAuth2Request} by extracting the needed information from the current {@link TokenRequest}
* object.
* @param client TODO
* @param client
* @param tokenRequest the request to be converted
*
* @return am immutable object for storage

View File

@@ -126,7 +126,7 @@ public class JdbcClientDetailsService implements ClientDetailsService, ClientReg
}
public ClientDetails loadClientByClientId(String clientId) {
//TODO: cache in memory
// cache in memory
ClientDetails details = clientDetailsCache.getIfPresent(clientId);
if(details == null) {
try {

View File

@@ -188,7 +188,7 @@ public class AuthorizationEndpoint extends AbstractEndpoint {
// such logic here, and set the approved flag on the authorization request accordingly.
authorizationRequest = userApprovalHandler.checkForPreApproval(authorizationRequest,
(Authentication) principal);
// TODO: is this call necessary?
// is this call necessary?
boolean approved = userApprovalHandler.isApproved(authorizationRequest, (Authentication) principal);
authorizationRequest.setApproved(approved);
@@ -331,7 +331,7 @@ public class AuthorizationEndpoint extends AbstractEndpoint {
return accessToken;
}
//TODO: Authorization Code Response
// Authorization Code Response
private View getAuthorizationCodeResponse(AuthorizationRequest authorizationRequest, Authentication authUser) {
try {
return new RedirectView(getSuccessfulRedirect(authorizationRequest,
@@ -419,7 +419,7 @@ public class AuthorizationEndpoint extends AbstractEndpoint {
}
}
//TODO: Successful Redirect
// Successful Redirect
private String getSuccessfulRedirect(AuthorizationRequest authorizationRequest, String authorizationCode) {
if (authorizationCode == null) {

View File

@@ -56,13 +56,12 @@ public class OAuthDefaultUserInfoAdapter extends AbstractAuthorizeAdapter {
@Override
public String encrypt(String data, String algorithmKey, String algorithm) {
// TODO Auto-generated method stub
return null;
}
@Override
public ModelAndView authorize(UserInfo userInfo, Object app, String data,ModelAndView modelAndView) {
// TODO Auto-generated method stub
return null;
}

View File

@@ -125,7 +125,7 @@ public class OIDCIdTokenEnhancer implements TokenEnhancer {
// if the auth time claim was explicitly requested OR if the client always wants the auth time, put it in
if (request.getExtensions().containsKey("max_age")
|| (request.getExtensions().containsKey("idtoken")) // TODO: parse the ID Token claims (#473) -- for now assume it could be in there
|| (request.getExtensions().containsKey("idtoken")) // parse the ID Token claims (#473) -- for now assume it could be in there
) {
DateTime loginDate=DateTime.parse(WebContext.getUserInfo().getLastLoginTime(), DateTimeFormat.forPattern("yyyy-MM-dd HH:mm:ss"));
builder.claim("auth_time", loginDate.getMillis()/ 1000);

View File

@@ -339,7 +339,6 @@ public class Oauth20AutoConfiguration implements InitializingBean {
@Override
public void afterPropertiesSet() throws Exception {
// TODO Auto-generated method stub
}
}